Home | History | Annotate | Line # | Download | only in sdpd
server.c revision 1.2
      1 /*	$NetBSD: server.c,v 1.2 2007/02/22 20:49:32 plunky Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2006 Itronix Inc.
      5  * All rights reserved.
      6  *
      7  * Redistribution and use in source and binary forms, with or without
      8  * modification, are permitted provided that the following conditions
      9  * are met:
     10  * 1. Redistributions of source code must retain the above copyright
     11  *    notice, this list of conditions and the following disclaimer.
     12  * 2. Redistributions in binary form must reproduce the above copyright
     13  *    notice, this list of conditions and the following disclaimer in the
     14  *    documentation and/or other materials provided with the distribution.
     15  * 3. The name of Itronix Inc. may not be used to endorse
     16  *    or promote products derived from this software without specific
     17  *    prior written permission.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     20  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     23  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     24  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     25  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     26  * ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 /*
     32  * server.c
     33  *
     34  * Copyright (c) 2004 Maksim Yevmenkin <m_evmenkin (at) yahoo.com>
     35  * All rights reserved.
     36  *
     37  * Redistribution and use in source and binary forms, with or without
     38  * modification, are permitted provided that the following conditions
     39  * are met:
     40  * 1. Redistributions of source code must retain the above copyright
     41  *    notice, this list of conditions and the following disclaimer.
     42  * 2. Redistributions in binary form must reproduce the above copyright
     43  *    notice, this list of conditions and the following disclaimer in the
     44  *    documentation and/or other materials provided with the distribution.
     45  *
     46  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
     47  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     48  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     49  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     50  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     51  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     52  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     53  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     54  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     55  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     56  * SUCH DAMAGE.
     57  *
     58  * $Id: server.c,v 1.2 2007/02/22 20:49:32 plunky Exp $
     59  * $FreeBSD: src/usr.sbin/bluetooth/sdpd/server.c,v 1.2 2005/12/06 17:56:36 emax Exp $
     60  */
     61 
     62 #include <sys/cdefs.h>
     63 __RCSID("$NetBSD: server.c,v 1.2 2007/02/22 20:49:32 plunky Exp $");
     64 
     65 #include <sys/param.h>
     66 #include <sys/select.h>
     67 #include <sys/stat.h>
     68 #include <sys/queue.h>
     69 #include <sys/ucred.h>
     70 #include <sys/un.h>
     71 #include <netinet/in.h>
     72 #include <arpa/inet.h>
     73 #include <assert.h>
     74 #include <bluetooth.h>
     75 #include <errno.h>
     76 #include <pwd.h>
     77 #include <sdp.h>
     78 #include <stdio.h>
     79 #include <stdlib.h>
     80 #include <string.h>
     81 #include <unistd.h>
     82 #include "log.h"
     83 #include "profile.h"
     84 #include "provider.h"
     85 #include "server.h"
     86 
     87 static void	server_accept_client		(server_p srv, int32_t fd);
     88 static int32_t	server_process_request		(server_p srv, int32_t fd);
     89 static int32_t	server_send_error_response	(server_p srv, int32_t fd,
     90 						 uint16_t error);
     91 static void	server_close_fd			(server_p srv, int32_t fd);
     92 
     93 /*
     94  * Initialize server
     95  */
     96 
     97 int32_t
     98 server_init(server_p srv, char const *control)
     99 {
    100 	struct sockaddr_un	un;
    101 	struct sockaddr_bt	l2;
    102 	socklen_t		size;
    103 	int32_t			unsock, l2sock;
    104 	uint16_t		imtu;
    105 	int			opt;
    106 
    107 	assert(srv != NULL);
    108 	assert(control != NULL);
    109 
    110 	memset(srv, 0, sizeof(srv));
    111 
    112 	/* Open control socket */
    113 	if (unlink(control) < 0 && errno != ENOENT) {
    114 		log_crit("Could not unlink(%s). %s (%d)",
    115 			control, strerror(errno), errno);
    116 		return (-1);
    117 	}
    118 
    119 	unsock = socket(PF_LOCAL, SOCK_STREAM, 0);
    120 	if (unsock < 0) {
    121 		log_crit("Could not create control socket. %s (%d)",
    122 			strerror(errno), errno);
    123 		return (-1);
    124 	}
    125 
    126 	opt = 1;
    127 	if (setsockopt(unsock, 0, LOCAL_CREDS, &opt, sizeof(opt)) < 0)
    128 		log_crit("Warning: No credential checks on control socket");
    129 
    130 	memset(&un, 0, sizeof(un));
    131 	un.sun_len = sizeof(un);
    132 	un.sun_family = AF_LOCAL;
    133 	strlcpy(un.sun_path, control, sizeof(un.sun_path));
    134 
    135 	if (bind(unsock, (struct sockaddr *) &un, sizeof(un)) < 0) {
    136 		log_crit("Could not bind control socket. %s (%d)",
    137 			strerror(errno), errno);
    138 		close(unsock);
    139 		return (-1);
    140 	}
    141 
    142 	if (chmod(control, S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH) < 0) {
    143 		log_crit("Could not change permissions on control socket. " \
    144 			"%s (%d)", strerror(errno), errno);
    145 		close(unsock);
    146 		return (-1);
    147 	}
    148 
    149 	if (listen(unsock, 10) < 0) {
    150 		log_crit("Could not listen on control socket. %s (%d)",
    151 			strerror(errno), errno);
    152 		close(unsock);
    153 		return (-1);
    154 	}
    155 
    156 	/* Open L2CAP socket */
    157 	l2sock = socket(PF_BLUETOOTH, SOCK_SEQPACKET, BTPROTO_L2CAP);
    158 	if (l2sock < 0) {
    159 		log_crit("Could not create L2CAP socket. %s (%d)",
    160 			strerror(errno), errno);
    161 		close(unsock);
    162 		return (-1);
    163 	}
    164 
    165 	size = sizeof(imtu);
    166         if (getsockopt(l2sock, BTPROTO_L2CAP, SO_L2CAP_IMTU, &imtu, &size) < 0) {
    167 		log_crit("Could not get L2CAP IMTU. %s (%d)",
    168 			strerror(errno), errno);
    169 		close(unsock);
    170 		close(l2sock);
    171 		return (-1);
    172         }
    173 
    174 	memset(&l2, 0, sizeof(l2));
    175 	l2.bt_len = sizeof(l2);
    176 	l2.bt_family = AF_BLUETOOTH;
    177 	l2.bt_psm = L2CAP_PSM_SDP;
    178 	bdaddr_copy(&l2.bt_bdaddr, BDADDR_ANY);
    179 
    180 	if (bind(l2sock, (struct sockaddr *) &l2, sizeof(l2)) < 0) {
    181 		log_crit("Could not bind L2CAP socket. %s (%d)",
    182 			strerror(errno), errno);
    183 		close(unsock);
    184 		close(l2sock);
    185 		return (-1);
    186 	}
    187 
    188 	if (listen(l2sock, 10) < 0) {
    189 		log_crit("Could not listen on L2CAP socket. %s (%d)",
    190 			strerror(errno), errno);
    191 		close(unsock);
    192 		close(l2sock);
    193 		return (-1);
    194 	}
    195 
    196 	/* Allocate incoming buffer */
    197 	srv->imtu = (imtu > SDP_LOCAL_MTU)? imtu : SDP_LOCAL_MTU;
    198 	srv->req = (uint8_t *) calloc(srv->imtu, sizeof(srv->req[0]));
    199 	if (srv->req == NULL) {
    200 		log_crit("Could not allocate request buffer");
    201 		close(unsock);
    202 		close(l2sock);
    203 		return (-1);
    204 	}
    205 
    206 	/* Allocate memory for descriptor index */
    207 	srv->fdidx = (fd_idx_p) calloc(FD_SETSIZE, sizeof(srv->fdidx[0]));
    208 	if (srv->fdidx == NULL) {
    209 		log_crit("Could not allocate fd index");
    210 		free(srv->req);
    211 		close(unsock);
    212 		close(l2sock);
    213 		return (-1);
    214 	}
    215 
    216 	/* Register Service Discovery profile (attach it to control socket) */
    217 	if (provider_register_sd(unsock) < 0) {
    218 		log_crit("Could not register Service Discovery profile");
    219 		free(srv->fdidx);
    220 		free(srv->req);
    221 		close(unsock);
    222 		close(l2sock);
    223 		return (-1);
    224 	}
    225 
    226 	/*
    227 	 * If we got here then everything is fine. Add both control sockets
    228 	 * to the index.
    229 	 */
    230 
    231 	FD_ZERO(&srv->fdset);
    232 	srv->maxfd = (unsock > l2sock)? unsock : l2sock;
    233 
    234 	FD_SET(unsock, &srv->fdset);
    235 	srv->fdidx[unsock].valid = 1;
    236 	srv->fdidx[unsock].server = 1;
    237 	srv->fdidx[unsock].control = 1;
    238 	srv->fdidx[unsock].priv = 0;
    239 	srv->fdidx[unsock].rsp_cs = 0;
    240 	srv->fdidx[unsock].rsp_size = 0;
    241 	srv->fdidx[unsock].rsp_limit = 0;
    242 	srv->fdidx[unsock].omtu = SDP_LOCAL_MTU;
    243 	srv->fdidx[unsock].rsp = NULL;
    244 
    245 	FD_SET(l2sock, &srv->fdset);
    246 	srv->fdidx[l2sock].valid = 1;
    247 	srv->fdidx[l2sock].server = 1;
    248 	srv->fdidx[l2sock].control = 0;
    249 	srv->fdidx[l2sock].priv = 0;
    250 	srv->fdidx[l2sock].rsp_cs = 0;
    251 	srv->fdidx[l2sock].rsp_size = 0;
    252 	srv->fdidx[l2sock].rsp_limit = 0;
    253 	srv->fdidx[l2sock].omtu = 0; /* unknown */
    254 	srv->fdidx[l2sock].rsp = NULL;
    255 
    256 	return (0);
    257 }
    258 
    259 /*
    260  * Shutdown server
    261  */
    262 
    263 void
    264 server_shutdown(server_p srv)
    265 {
    266 	int	fd;
    267 
    268 	assert(srv != NULL);
    269 
    270 	for (fd = 0; fd < srv->maxfd + 1; fd ++)
    271 		if (srv->fdidx[fd].valid)
    272 			server_close_fd(srv, fd);
    273 
    274 	free(srv->req);
    275 	free(srv->fdidx);
    276 
    277 	memset(srv, 0, sizeof(*srv));
    278 }
    279 
    280 /*
    281  * Do one server iteration
    282  */
    283 
    284 int32_t
    285 server_do(server_p srv)
    286 {
    287 	fd_set	fdset;
    288 	int32_t	n, fd;
    289 
    290 	assert(srv != NULL);
    291 
    292 	/* Copy cached version of the fd set and call select */
    293 	memcpy(&fdset, &srv->fdset, sizeof(fdset));
    294 	n = select(srv->maxfd + 1, &fdset, NULL, NULL, NULL);
    295 	if (n < 0) {
    296 		if (errno == EINTR)
    297 			return (0);
    298 
    299 		log_err("Could not select(%d, %p). %s (%d)",
    300 			srv->maxfd + 1, &fdset, strerror(errno), errno);
    301 
    302 		return (-1);
    303 	}
    304 
    305 	/* Process  descriptors */
    306 	for (fd = 0; fd < srv->maxfd + 1 && n > 0; fd ++) {
    307 		if (!FD_ISSET(fd, &fdset))
    308 			continue;
    309 
    310 		assert(srv->fdidx[fd].valid);
    311 		n --;
    312 
    313 		if (srv->fdidx[fd].server)
    314 			server_accept_client(srv, fd);
    315 		else if (server_process_request(srv, fd) != 0)
    316 			server_close_fd(srv, fd);
    317 	}
    318 
    319 	return (0);
    320 
    321 }
    322 
    323 /*
    324  * Accept new client connection and register it with index
    325  */
    326 
    327 static void
    328 server_accept_client(server_p srv, int32_t fd)
    329 {
    330 	uint8_t		*rsp = NULL;
    331 	socklen_t	 size;
    332 	int32_t		 cfd;
    333 	uint16_t	 omtu;
    334 
    335 	do {
    336 		cfd = accept(fd, NULL, NULL);
    337 	} while (cfd < 0 && errno == EINTR);
    338 
    339 	if (cfd < 0) {
    340 		log_err("Could not accept connection on %s socket. %s (%d)",
    341 			srv->fdidx[fd].control? "control" : "L2CAP",
    342 			strerror(errno), errno);
    343 		return;
    344 	}
    345 
    346 	assert(!FD_ISSET(cfd, &srv->fdset));
    347 	assert(!srv->fdidx[cfd].valid);
    348 
    349 	if (!srv->fdidx[fd].control) {
    350 		/* Get local BD_ADDR */
    351 		size = sizeof(srv->req_sa);
    352 		if (getsockname(cfd,(struct sockaddr*)&srv->req_sa, &size) < 0) {
    353 			log_err("Could not get local BD_ADDR. %s (%d)",
    354 				strerror(errno), errno);
    355 			close(cfd);
    356 			return;
    357 		}
    358 
    359 		/* Get outgoing MTU */
    360 		size = sizeof(omtu);
    361 	        if (getsockopt(cfd, BTPROTO_L2CAP, SO_L2CAP_OMTU, &omtu, &size) < 0) {
    362 			log_err("Could not get L2CAP OMTU. %s (%d)",
    363 				strerror(errno), errno);
    364 			close(cfd);
    365 			return;
    366 		}
    367 
    368 		/*
    369 		 * The maximum size of the L2CAP packet is 65536 bytes.
    370 		 * The minimum L2CAP MTU is 43 bytes. That means we need
    371 		 * 65536 / 43 = ~1524 chunks to transfer maximum packet
    372 		 * size with minimum MTU. The "rsp_cs" field in fd_idx_t
    373 		 * is 11 bit wide that gives us upto 2048 chunks.
    374 		 */
    375 
    376 		if (omtu < L2CAP_MTU_MINIMUM) {
    377 			log_err("L2CAP OMTU is too small (%d bytes)", omtu);
    378 			close(cfd);
    379 			return;
    380 		}
    381 	} else {
    382 		bdaddr_copy(&srv->req_sa.bt_bdaddr, BDADDR_ANY);
    383 		omtu = srv->fdidx[fd].omtu;
    384 	}
    385 
    386 	/*
    387 	 * Allocate buffer. This is an overkill, but we can not know how
    388 	 * big our reply is going to be.
    389 	 */
    390 
    391 	rsp = (uint8_t *) calloc(L2CAP_MTU_MAXIMUM, sizeof(rsp[0]));
    392 	if (rsp == NULL) {
    393 		log_crit("Could not allocate response buffer");
    394 		close(cfd);
    395 		return;
    396 	}
    397 
    398 	/* Add client descriptor to the index */
    399 	FD_SET(cfd, &srv->fdset);
    400 	if (srv->maxfd < cfd)
    401 		srv->maxfd = cfd;
    402 	srv->fdidx[cfd].valid = 1;
    403 	srv->fdidx[cfd].server = 0;
    404 	srv->fdidx[cfd].control = srv->fdidx[fd].control;
    405 	srv->fdidx[cfd].priv = 0;
    406 	srv->fdidx[cfd].rsp_cs = 0;
    407 	srv->fdidx[cfd].rsp_size = 0;
    408 	srv->fdidx[cfd].rsp_limit = 0;
    409 	srv->fdidx[cfd].omtu = omtu;
    410 	srv->fdidx[cfd].rsp = rsp;
    411 }
    412 
    413 /*
    414  * Process request from the client
    415  */
    416 
    417 static int32_t
    418 server_process_request(server_p srv, int32_t fd)
    419 {
    420 	uint8_t		ctl[128];
    421 	sdp_pdu_p	pdu = (sdp_pdu_p) srv->req;
    422 	struct msghdr	msg;
    423 	struct iovec	iov;
    424 	int32_t		len, error;
    425 	struct cmsghdr	*cmsg;
    426 	struct sockcred *cred;
    427 
    428 	assert(srv->imtu > 0);
    429 	assert(srv->req != NULL);
    430 	assert(FD_ISSET(fd, &srv->fdset));
    431 	assert(srv->fdidx[fd].valid);
    432 	assert(!srv->fdidx[fd].server);
    433 	assert(srv->fdidx[fd].rsp != NULL);
    434 	assert(srv->fdidx[fd].omtu >= L2CAP_MTU_MINIMUM);
    435 
    436 	iov.iov_base = srv->req;
    437 	iov.iov_len = srv->imtu;
    438 
    439 	msg.msg_name = NULL;
    440 	msg.msg_namelen = 0;
    441 	msg.msg_iov = &iov;
    442 	msg.msg_iovlen = 1;
    443 	msg.msg_control = ctl;
    444 	msg.msg_controllen = sizeof(ctl);
    445 	msg.msg_flags = 0;
    446 
    447 	do {
    448 		len = recvmsg(fd, &msg, 0);
    449 	} while (len < 0 && errno == EINTR);
    450 
    451 	if (len < 0) {
    452 		log_err("Could not receive SDP request from %s socket. %s (%d)",
    453 			srv->fdidx[fd].control? "control" : "L2CAP",
    454 			strerror(errno), errno);
    455 		return (-1);
    456 	}
    457 	if (len == 0) {
    458 		log_info("Client on %s socket has disconnected",
    459 			srv->fdidx[fd].control? "control" : "L2CAP");
    460 		return (-1);
    461 	}
    462 
    463 	if ((cmsg = CMSG_FIRSTHDR(&msg)) != NULL
    464 	    && cmsg->cmsg_level == SOL_SOCKET
    465 	    && cmsg->cmsg_type == SCM_CREDS
    466 	    && cmsg->cmsg_len >= CMSG_LEN(SOCKCREDSIZE(0))
    467 	    && (cred = (struct sockcred *)CMSG_DATA(cmsg)) != NULL
    468 	    && (cred->sc_uid == 0 || cred->sc_euid == 0))
    469 		srv->fdidx[fd].priv = 1;
    470 
    471 	if (len >= sizeof(*pdu)
    472 	    && (sizeof(*pdu) + (pdu->len = ntohs(pdu->len))) == len) {
    473 		switch (pdu->pid) {
    474 		case SDP_PDU_SERVICE_SEARCH_REQUEST:
    475 			error = server_prepare_service_search_response(srv, fd);
    476 			break;
    477 
    478 		case SDP_PDU_SERVICE_ATTRIBUTE_REQUEST:
    479 			error = server_prepare_service_attribute_response(srv, fd);
    480 			break;
    481 
    482 		case SDP_PDU_SERVICE_SEARCH_ATTRIBUTE_REQUEST:
    483 			error = server_prepare_service_search_attribute_response(srv, fd);
    484 			break;
    485 
    486 		case SDP_PDU_SERVICE_REGISTER_REQUEST:
    487 			error = server_prepare_service_register_response(srv, fd);
    488 			break;
    489 
    490 		case SDP_PDU_SERVICE_UNREGISTER_REQUEST:
    491 			error = server_prepare_service_unregister_response(srv, fd);
    492 			break;
    493 
    494 		case SDP_PDU_SERVICE_CHANGE_REQUEST:
    495 			error = server_prepare_service_change_response(srv, fd);
    496 			break;
    497 
    498 		default:
    499 			error = SDP_ERROR_CODE_INVALID_REQUEST_SYNTAX;
    500 			break;
    501 		}
    502 	} else
    503 		error = SDP_ERROR_CODE_INVALID_PDU_SIZE;
    504 
    505 	if (error == 0) {
    506 		switch (pdu->pid) {
    507 		case SDP_PDU_SERVICE_SEARCH_REQUEST:
    508 			error = server_send_service_search_response(srv, fd);
    509 			break;
    510 
    511 		case SDP_PDU_SERVICE_ATTRIBUTE_REQUEST:
    512 			error = server_send_service_attribute_response(srv, fd);
    513 			break;
    514 
    515 		case SDP_PDU_SERVICE_SEARCH_ATTRIBUTE_REQUEST:
    516 			error = server_send_service_search_attribute_response(srv, fd);
    517 			break;
    518 
    519 		case SDP_PDU_SERVICE_REGISTER_REQUEST:
    520 			error = server_send_service_register_response(srv, fd);
    521 			break;
    522 
    523 		case SDP_PDU_SERVICE_UNREGISTER_REQUEST:
    524 			error = server_send_service_unregister_response(srv, fd);
    525 			break;
    526 
    527 		case SDP_PDU_SERVICE_CHANGE_REQUEST:
    528 			error = server_send_service_change_response(srv, fd);
    529 			break;
    530 
    531 		default:
    532 			error = SDP_ERROR_CODE_INVALID_REQUEST_SYNTAX;
    533 			break;
    534 		}
    535 
    536 		if (error != 0)
    537 			log_err("Could not send SDP response to %s socket, " \
    538 				"pdu->pid=%d, pdu->tid=%d, error=%d",
    539 				srv->fdidx[fd].control? "control" : "L2CAP",
    540 				pdu->pid, ntohs(pdu->tid), error);
    541 	} else {
    542 		log_err("Could not process SDP request from %s socket, " \
    543 			"pdu->pid=%d, pdu->tid=%d, pdu->len=%d, len=%d, " \
    544 			"error=%d",
    545 			srv->fdidx[fd].control? "control" : "L2CAP",
    546 			pdu->pid, ntohs(pdu->tid), pdu->len, len, error);
    547 
    548 		error = server_send_error_response(srv, fd, error);
    549 		if (error != 0)
    550 			log_err("Could not send SDP error response to %s " \
    551 				"socket, pdu->pid=%d, pdu->tid=%d, error=%d",
    552 				srv->fdidx[fd].control? "control" : "L2CAP",
    553 				pdu->pid, ntohs(pdu->tid), error);
    554 	}
    555 
    556 	/* On error forget response (if any) */
    557 	if (error != 0) {
    558 		srv->fdidx[fd].rsp_cs = 0;
    559 		srv->fdidx[fd].rsp_size = 0;
    560 		srv->fdidx[fd].rsp_limit = 0;
    561 	}
    562 
    563 	return (error);
    564 }
    565 
    566 /*
    567  * Send SDP_Error_Response PDU
    568  */
    569 
    570 static int32_t
    571 server_send_error_response(server_p srv, int32_t fd, uint16_t error)
    572 {
    573 	int32_t	size;
    574 
    575 	struct {
    576 		sdp_pdu_t		pdu;
    577 		uint16_t		error;
    578 	} __attribute__ ((packed))	rsp;
    579 
    580 	/* Prepare and send SDP error response */
    581 	rsp.pdu.pid = SDP_PDU_ERROR_RESPONSE;
    582 	rsp.pdu.tid = ((sdp_pdu_p)(srv->req))->tid;
    583 	rsp.pdu.len = htons(sizeof(rsp.error));
    584 	rsp.error   = htons(error);
    585 
    586 	do {
    587 		size = write(fd, &rsp, sizeof(rsp));
    588 	} while (size < 0 && errno == EINTR);
    589 
    590 	return ((size < 0)? errno : 0);
    591 }
    592 
    593 /*
    594  * Close descriptor and remove it from index
    595  */
    596 
    597 static void
    598 server_close_fd(server_p srv, int32_t fd)
    599 {
    600 	provider_p	provider = NULL, provider_next = NULL;
    601 
    602 	assert(FD_ISSET(fd, &srv->fdset));
    603 	assert(srv->fdidx[fd].valid);
    604 
    605 	close(fd);
    606 
    607 	FD_CLR(fd, &srv->fdset);
    608 	if (fd == srv->maxfd)
    609 		srv->maxfd --;
    610 
    611 	if (srv->fdidx[fd].rsp != NULL)
    612 		free(srv->fdidx[fd].rsp);
    613 
    614 	memset(&srv->fdidx[fd], 0, sizeof(srv->fdidx[fd]));
    615 
    616 	for (provider = provider_get_first();
    617 	     provider != NULL;
    618 	     provider = provider_next) {
    619 		provider_next = provider_get_next(provider);
    620 
    621 		if (provider->fd == fd)
    622 			provider_unregister(provider);
    623 	}
    624 }
    625