xref: /netbsd-src/lib/libc/rpc/svc.c (revision d48f14661dda8638fee055ba15d35bdfb29b9fa8)
1 /*	$NetBSD: svc.c,v 1.27 2005/12/03 15:16:19 yamt Exp $	*/
2 
3 /*
4  * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5  * unrestricted use provided that this legend is included on all tape
6  * media and as a part of the software program in whole or part.  Users
7  * may copy or modify Sun RPC without charge, but are not authorized
8  * to license or distribute it to anyone else except as part of a product or
9  * program developed by the user.
10  *
11  * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12  * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
13  * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14  *
15  * Sun RPC is provided with no support and without any obligation on the
16  * part of Sun Microsystems, Inc. to assist in its use, correction,
17  * modification or enhancement.
18  *
19  * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20  * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21  * OR ANY PART THEREOF.
22  *
23  * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24  * or profits or other special, indirect and consequential damages, even if
25  * Sun has been advised of the possibility of such damages.
26  *
27  * Sun Microsystems, Inc.
28  * 2550 Garcia Avenue
29  * Mountain View, California  94043
30  */
31 
32 #include <sys/cdefs.h>
33 #if defined(LIBC_SCCS) && !defined(lint)
34 #if 0
35 static char *sccsid = "@(#)svc.c 1.44 88/02/08 Copyr 1984 Sun Micro";
36 static char *sccsid = "@(#)svc.c	2.4 88/08/11 4.0 RPCSRC";
37 #else
38 __RCSID("$NetBSD: svc.c,v 1.27 2005/12/03 15:16:19 yamt Exp $");
39 #endif
40 #endif
41 
42 /*
43  * svc.c, Server-side remote procedure call interface.
44  *
45  * There are two sets of procedures here.  The xprt routines are
46  * for handling transport handles.  The svc routines handle the
47  * list of service routines.
48  *
49  * Copyright (C) 1984, Sun Microsystems, Inc.
50  */
51 
52 #include "namespace.h"
53 #include "reentrant.h"
54 #include <sys/types.h>
55 #include <sys/poll.h>
56 #include <assert.h>
57 #include <errno.h>
58 #include <stdlib.h>
59 #include <string.h>
60 
61 #include <rpc/rpc.h>
62 #ifdef PORTMAP
63 #include <rpc/pmap_clnt.h>
64 #endif
65 
66 #include "rpc_internal.h"
67 
68 #ifdef __weak_alias
69 __weak_alias(svc_getreq,_svc_getreq)
70 __weak_alias(svc_getreqset,_svc_getreqset)
71 __weak_alias(svc_getreq_common,_svc_getreq_common)
72 __weak_alias(svc_register,_svc_register)
73 __weak_alias(svc_reg,_svc_reg)
74 __weak_alias(svc_unreg,_svc_unreg)
75 __weak_alias(svc_sendreply,_svc_sendreply)
76 __weak_alias(svc_unregister,_svc_unregister)
77 __weak_alias(svcerr_auth,_svcerr_auth)
78 __weak_alias(svcerr_decode,_svcerr_decode)
79 __weak_alias(svcerr_noproc,_svcerr_noproc)
80 __weak_alias(svcerr_noprog,_svcerr_noprog)
81 __weak_alias(svcerr_progvers,_svcerr_progvers)
82 __weak_alias(svcerr_systemerr,_svcerr_systemerr)
83 __weak_alias(svcerr_weakauth,_svcerr_weakauth)
84 __weak_alias(xprt_register,_xprt_register)
85 __weak_alias(xprt_unregister,_xprt_unregister)
86 __weak_alias(rpc_control,_rpc_control)
87 #endif
88 
89 SVCXPRT **__svc_xports;
90 int __svc_maxrec;
91 
92 #define	RQCRED_SIZE	400		/* this size is excessive */
93 
94 #define SVC_VERSQUIET 0x0001		/* keep quiet about vers mismatch */
95 #define version_keepquiet(xp) ((u_long)(xp)->xp_p3 & SVC_VERSQUIET)
96 
97 #define max(a, b) (a > b ? a : b)
98 
99 /*
100  * The services list
101  * Each entry represents a set of procedures (an rpc program).
102  * The dispatch routine takes request structs and runs the
103  * apropriate procedure.
104  */
105 static struct svc_callout {
106 	struct svc_callout *sc_next;
107 	rpcprog_t	    sc_prog;
108 	rpcvers_t	    sc_vers;
109 	char		   *sc_netid;
110 	void		    (*sc_dispatch) __P((struct svc_req *, SVCXPRT *));
111 } *svc_head;
112 
113 #ifdef _REENTRANT
114 extern rwlock_t svc_lock;
115 extern rwlock_t svc_fd_lock;
116 #endif
117 
118 static struct svc_callout *svc_find __P((rpcprog_t, rpcvers_t,
119 					 struct svc_callout **, char *));
120 static void __xprt_do_unregister __P((SVCXPRT *xprt, bool_t dolock));
121 
122 /* ***************  SVCXPRT related stuff **************** */
123 
124 /*
125  * Activate a transport handle.
126  */
127 void
128 xprt_register(xprt)
129 	SVCXPRT *xprt;
130 {
131 	int sock;
132 
133 	_DIAGASSERT(xprt != NULL);
134 
135 	sock = xprt->xp_fd;
136 
137 	rwlock_wrlock(&svc_fd_lock);
138 	if (__svc_xports == NULL) {
139 		__svc_xports = (SVCXPRT **)
140 			mem_alloc(FD_SETSIZE * sizeof(SVCXPRT *));
141 		if (__svc_xports == NULL)
142 			return;
143 		memset(__svc_xports, '\0', FD_SETSIZE * sizeof(SVCXPRT *));
144 	}
145 	if (sock < FD_SETSIZE) {
146 		__svc_xports[sock] = xprt;
147 		FD_SET(sock, &svc_fdset);
148 		svc_maxfd = max(svc_maxfd, sock);
149 	}
150 	rwlock_unlock(&svc_fd_lock);
151 }
152 
153 void
154 xprt_unregister(SVCXPRT *xprt)
155 {
156 	__xprt_do_unregister(xprt, TRUE);
157 }
158 
159 void
160 __xprt_unregister_unlocked(SVCXPRT *xprt)
161 {
162 	__xprt_do_unregister(xprt, FALSE);
163 }
164 
165 /*
166  * De-activate a transport handle.
167  */
168 static void
169 __xprt_do_unregister(xprt, dolock)
170 	SVCXPRT *xprt;
171 	bool_t dolock;
172 {
173 	int sock;
174 
175 	_DIAGASSERT(xprt != NULL);
176 
177 	sock = xprt->xp_fd;
178 
179 	if (dolock)
180 		rwlock_wrlock(&svc_fd_lock);
181 	if ((sock < FD_SETSIZE) && (__svc_xports[sock] == xprt)) {
182 		__svc_xports[sock] = NULL;
183 		FD_CLR(sock, &svc_fdset);
184 		if (sock >= svc_maxfd) {
185 			for (svc_maxfd--; svc_maxfd>=0; svc_maxfd--)
186 				if (__svc_xports[svc_maxfd])
187 					break;
188 		}
189 	}
190 	if (dolock)
191 		rwlock_unlock(&svc_fd_lock);
192 }
193 
194 /*
195  * Add a service program to the callout list.
196  * The dispatch routine will be called when a rpc request for this
197  * program number comes in.
198  */
199 bool_t
200 svc_reg(xprt, prog, vers, dispatch, nconf)
201 	SVCXPRT *xprt;
202 	const rpcprog_t prog;
203 	const rpcvers_t vers;
204 	void (*dispatch) __P((struct svc_req *, SVCXPRT *));
205 	const struct netconfig *nconf;
206 {
207 	bool_t dummy;
208 	struct svc_callout *prev;
209 	struct svc_callout *s;
210 	struct netconfig *tnconf;
211 	char *netid = NULL;
212 	int flag = 0;
213 
214 	_DIAGASSERT(xprt != NULL);
215 	/* XXX: dispatch may be NULL ??? */
216 
217 /* VARIABLES PROTECTED BY svc_lock: s, prev, svc_head */
218 
219 	if (xprt->xp_netid) {
220 		netid = strdup(xprt->xp_netid);
221 		flag = 1;
222 	} else if (nconf && nconf->nc_netid) {
223 		netid = strdup(nconf->nc_netid);
224 		flag = 1;
225 	} else if ((tnconf = __rpcgettp(xprt->xp_fd)) != NULL) {
226 		netid = strdup(tnconf->nc_netid);
227 		flag = 1;
228 		freenetconfigent(tnconf);
229 	} /* must have been created with svc_raw_create */
230 	if ((netid == NULL) && (flag == 1)) {
231 		return (FALSE);
232 	}
233 
234 	rwlock_wrlock(&svc_lock);
235 	if ((s = svc_find(prog, vers, &prev, netid)) != NULL) {
236 		if (netid)
237 			free(netid);
238 		if (s->sc_dispatch == dispatch)
239 			goto rpcb_it; /* he is registering another xptr */
240 		rwlock_unlock(&svc_lock);
241 		return (FALSE);
242 	}
243 	s = mem_alloc(sizeof (struct svc_callout));
244 	if (s == NULL) {
245 		if (netid)
246 			free(netid);
247 		rwlock_unlock(&svc_lock);
248 		return (FALSE);
249 	}
250 
251 	s->sc_prog = prog;
252 	s->sc_vers = vers;
253 	s->sc_dispatch = dispatch;
254 	s->sc_netid = netid;
255 	s->sc_next = svc_head;
256 	svc_head = s;
257 
258 	if ((xprt->xp_netid == NULL) && (flag == 1) && netid)
259 		((SVCXPRT *) xprt)->xp_netid = strdup(netid);
260 
261 rpcb_it:
262 	rwlock_unlock(&svc_lock);
263 	/* now register the information with the local binder service */
264 	if (nconf) {
265 		dummy = rpcb_set(prog, vers, __UNCONST(nconf),
266 		&((SVCXPRT *) xprt)->xp_ltaddr);
267 		return (dummy);
268 	}
269 	return (TRUE);
270 }
271 
272 /*
273  * Remove a service program from the callout list.
274  */
275 void
276 svc_unreg(prog, vers)
277 	const rpcprog_t prog;
278 	const rpcvers_t vers;
279 {
280 	struct svc_callout *prev;
281 	struct svc_callout *s;
282 
283 	/* unregister the information anyway */
284 	(void) rpcb_unset(prog, vers, NULL);
285 	rwlock_wrlock(&svc_lock);
286 	while ((s = svc_find(prog, vers, &prev, NULL)) != NULL) {
287 		if (prev == NULL) {
288 			svc_head = s->sc_next;
289 		} else {
290 			prev->sc_next = s->sc_next;
291 		}
292 		s->sc_next = NULL;
293 		if (s->sc_netid)
294 			mem_free(s->sc_netid, sizeof (s->sc_netid) + 1);
295 		mem_free(s, sizeof (struct svc_callout));
296 	}
297 	rwlock_unlock(&svc_lock);
298 }
299 
300 /* ********************** CALLOUT list related stuff ************* */
301 
302 #ifdef PORTMAP
303 /*
304  * Add a service program to the callout list.
305  * The dispatch routine will be called when a rpc request for this
306  * program number comes in.
307  */
308 bool_t
309 svc_register(xprt, prog, vers, dispatch, protocol)
310 	SVCXPRT *xprt;
311 	u_long prog;
312 	u_long vers;
313 	void (*dispatch) __P((struct svc_req *, SVCXPRT *));
314 	int protocol;
315 {
316 	struct svc_callout *prev;
317 	struct svc_callout *s;
318 
319 	_DIAGASSERT(xprt != NULL);
320 	_DIAGASSERT(dispatch != NULL);
321 
322 	if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) !=
323 	    NULL) {
324 		if (s->sc_dispatch == dispatch)
325 			goto pmap_it;  /* he is registering another xptr */
326 		return (FALSE);
327 	}
328 	s = mem_alloc(sizeof(struct svc_callout));
329 	if (s == NULL) {
330 		return (FALSE);
331 	}
332 	s->sc_prog = (rpcprog_t)prog;
333 	s->sc_vers = (rpcvers_t)vers;
334 	s->sc_dispatch = dispatch;
335 	s->sc_next = svc_head;
336 	svc_head = s;
337 pmap_it:
338 	/* now register the information with the local binder service */
339 	if (protocol) {
340 		return (pmap_set(prog, vers, protocol, xprt->xp_port));
341 	}
342 	return (TRUE);
343 }
344 
345 /*
346  * Remove a service program from the callout list.
347  */
348 void
349 svc_unregister(prog, vers)
350 	u_long prog;
351 	u_long vers;
352 {
353 	struct svc_callout *prev;
354 	struct svc_callout *s;
355 
356 	if ((s = svc_find((rpcprog_t)prog, (rpcvers_t)vers, &prev, NULL)) ==
357 	    NULL)
358 		return;
359 	if (prev == NULL) {
360 		svc_head = s->sc_next;
361 	} else {
362 		prev->sc_next = s->sc_next;
363 	}
364 	s->sc_next = NULL;
365 	mem_free(s, sizeof(struct svc_callout));
366 	/* now unregister the information with the local binder service */
367 	(void)pmap_unset(prog, vers);
368 }
369 #endif /* PORTMAP */
370 
371 /*
372  * Search the callout list for a program number, return the callout
373  * struct.
374  */
375 static struct svc_callout *
376 svc_find(prog, vers, prev, netid)
377 	rpcprog_t prog;
378 	rpcvers_t vers;
379 	struct svc_callout **prev;
380 	char *netid;
381 {
382 	struct svc_callout *s, *p;
383 
384 	_DIAGASSERT(prev != NULL);
385 	/* netid is handled below */
386 
387 	p = NULL;
388 	for (s = svc_head; s != NULL; s = s->sc_next) {
389 		if (((s->sc_prog == prog) && (s->sc_vers == vers)) &&
390 		    ((netid == NULL) || (s->sc_netid == NULL) ||
391 		    (strcmp(netid, s->sc_netid) == 0)))
392 			break;
393 		p = s;
394 	}
395 	*prev = p;
396 	return (s);
397 }
398 
399 /* ******************* REPLY GENERATION ROUTINES  ************ */
400 
401 /*
402  * Send a reply to an rpc request
403  */
404 bool_t
405 svc_sendreply(xprt, xdr_results, xdr_location)
406 	SVCXPRT *xprt;
407 	xdrproc_t xdr_results;
408 	const char *xdr_location;
409 {
410 	struct rpc_msg rply;
411 
412 	_DIAGASSERT(xprt != NULL);
413 
414 	rply.rm_direction = REPLY;
415 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
416 	rply.acpted_rply.ar_verf = xprt->xp_verf;
417 	rply.acpted_rply.ar_stat = SUCCESS;
418 	rply.acpted_rply.ar_results.where = xdr_location;
419 	rply.acpted_rply.ar_results.proc = xdr_results;
420 	return (SVC_REPLY(xprt, &rply));
421 }
422 
423 /*
424  * No procedure error reply
425  */
426 void
427 svcerr_noproc(xprt)
428 	SVCXPRT *xprt;
429 {
430 	struct rpc_msg rply;
431 
432 	_DIAGASSERT(xprt != NULL);
433 
434 	rply.rm_direction = REPLY;
435 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
436 	rply.acpted_rply.ar_verf = xprt->xp_verf;
437 	rply.acpted_rply.ar_stat = PROC_UNAVAIL;
438 	SVC_REPLY(xprt, &rply);
439 }
440 
441 /*
442  * Can't decode args error reply
443  */
444 void
445 svcerr_decode(xprt)
446 	SVCXPRT *xprt;
447 {
448 	struct rpc_msg rply;
449 
450 	_DIAGASSERT(xprt != NULL);
451 
452 	rply.rm_direction = REPLY;
453 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
454 	rply.acpted_rply.ar_verf = xprt->xp_verf;
455 	rply.acpted_rply.ar_stat = GARBAGE_ARGS;
456 	SVC_REPLY(xprt, &rply);
457 }
458 
459 /*
460  * Some system error
461  */
462 void
463 svcerr_systemerr(xprt)
464 	SVCXPRT *xprt;
465 {
466 	struct rpc_msg rply;
467 
468 	_DIAGASSERT(xprt != NULL);
469 
470 	rply.rm_direction = REPLY;
471 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
472 	rply.acpted_rply.ar_verf = xprt->xp_verf;
473 	rply.acpted_rply.ar_stat = SYSTEM_ERR;
474 	SVC_REPLY(xprt, &rply);
475 }
476 
477 #if 0
478 /*
479  * Tell RPC package to not complain about version errors to the client.	 This
480  * is useful when revving broadcast protocols that sit on a fixed address.
481  * There is really one (or should be only one) example of this kind of
482  * protocol: the portmapper (or rpc binder).
483  */
484 void
485 __svc_versquiet_on(xprt)
486 	SVCXPRT *xprt;
487 {
488 	u_long	tmp;
489 
490 	_DIAGASSERT(xprt != NULL);
491 
492 	tmp = ((u_long) xprt->xp_p3) | SVC_VERSQUIET;
493 	xprt->xp_p3 = (caddr_t) tmp;
494 }
495 
496 void
497 __svc_versquiet_off(xprt)
498 	SVCXPRT *xprt;
499 {
500 	u_long	tmp;
501 
502 	_DIAGASSERT(xprt != NULL);
503 
504 	tmp = ((u_long) xprt->xp_p3) & ~SVC_VERSQUIET;
505 	xprt->xp_p3 = (caddr_t) tmp;
506 }
507 
508 void
509 svc_versquiet(xprt)
510 	SVCXPRT *xprt;
511 {
512 	__svc_versquiet_on(xprt);
513 }
514 
515 int
516 __svc_versquiet_get(xprt)
517 	SVCXPRT *xprt;
518 {
519 
520 	_DIAGASSERT(xprt != NULL);
521 
522 	return ((int) xprt->xp_p3) & SVC_VERSQUIET;
523 }
524 #endif
525 
526 /*
527  * Authentication error reply
528  */
529 void
530 svcerr_auth(xprt, why)
531 	SVCXPRT *xprt;
532 	enum auth_stat why;
533 {
534 	struct rpc_msg rply;
535 
536 	_DIAGASSERT(xprt != NULL);
537 
538 	rply.rm_direction = REPLY;
539 	rply.rm_reply.rp_stat = MSG_DENIED;
540 	rply.rjcted_rply.rj_stat = AUTH_ERROR;
541 	rply.rjcted_rply.rj_why = why;
542 	SVC_REPLY(xprt, &rply);
543 }
544 
545 /*
546  * Auth too weak error reply
547  */
548 void
549 svcerr_weakauth(xprt)
550 	SVCXPRT *xprt;
551 {
552 
553 	_DIAGASSERT(xprt != NULL);
554 
555 	svcerr_auth(xprt, AUTH_TOOWEAK);
556 }
557 
558 /*
559  * Program unavailable error reply
560  */
561 void
562 svcerr_noprog(xprt)
563 	SVCXPRT *xprt;
564 {
565 	struct rpc_msg rply;
566 
567 	_DIAGASSERT(xprt != NULL);
568 
569 	rply.rm_direction = REPLY;
570 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
571 	rply.acpted_rply.ar_verf = xprt->xp_verf;
572 	rply.acpted_rply.ar_stat = PROG_UNAVAIL;
573 	SVC_REPLY(xprt, &rply);
574 }
575 
576 /*
577  * Program version mismatch error reply
578  */
579 void
580 svcerr_progvers(xprt, low_vers, high_vers)
581 	SVCXPRT *xprt;
582 	rpcvers_t low_vers;
583 	rpcvers_t high_vers;
584 {
585 	struct rpc_msg rply;
586 
587 	_DIAGASSERT(xprt != NULL);
588 
589 	rply.rm_direction = REPLY;
590 	rply.rm_reply.rp_stat = MSG_ACCEPTED;
591 	rply.acpted_rply.ar_verf = xprt->xp_verf;
592 	rply.acpted_rply.ar_stat = PROG_MISMATCH;
593 	rply.acpted_rply.ar_vers.low = (u_int32_t)low_vers;
594 	rply.acpted_rply.ar_vers.high = (u_int32_t)high_vers;
595 	SVC_REPLY(xprt, &rply);
596 }
597 
598 /* ******************* SERVER INPUT STUFF ******************* */
599 
600 /*
601  * Get server side input from some transport.
602  *
603  * Statement of authentication parameters management:
604  * This function owns and manages all authentication parameters, specifically
605  * the "raw" parameters (msg.rm_call.cb_cred and msg.rm_call.cb_verf) and
606  * the "cooked" credentials (rqst->rq_clntcred).
607  * However, this function does not know the structure of the cooked
608  * credentials, so it make the following assumptions:
609  *   a) the structure is contiguous (no pointers), and
610  *   b) the cred structure size does not exceed RQCRED_SIZE bytes.
611  * In all events, all three parameters are freed upon exit from this routine.
612  * The storage is trivially management on the call stack in user land, but
613  * is mallocated in kernel land.
614  */
615 
616 void
617 svc_getreq(rdfds)
618 	int rdfds;
619 {
620 	fd_set readfds;
621 
622 	FD_ZERO(&readfds);
623 	readfds.fds_bits[0] = rdfds;
624 	svc_getreqset(&readfds);
625 }
626 
627 void
628 svc_getreqset(readfds)
629 	fd_set *readfds;
630 {
631 	int bit, fd;
632 	int32_t mask, *maskp;
633 	int sock;
634 
635 	_DIAGASSERT(readfds != NULL);
636 
637 	maskp = readfds->fds_bits;
638 	for (sock = 0; sock < FD_SETSIZE; sock += NFDBITS) {
639 	    for (mask = *maskp++; (bit = ffs(mask)) != 0;
640 		mask ^= (1 << (bit - 1))) {
641 		/* sock has input waiting */
642 		fd = sock + bit - 1;
643 		svc_getreq_common(fd);
644 	    }
645 	}
646 }
647 
648 void
649 svc_getreq_common(fd)
650 	int fd;
651 {
652 	SVCXPRT *xprt;
653 	struct svc_req r;
654 	struct rpc_msg msg;
655 	int prog_found;
656 	rpcvers_t low_vers;
657 	rpcvers_t high_vers;
658 	enum xprt_stat stat;
659 	char cred_area[2*MAX_AUTH_BYTES + RQCRED_SIZE];
660 
661 	msg.rm_call.cb_cred.oa_base = cred_area;
662 	msg.rm_call.cb_verf.oa_base = &(cred_area[MAX_AUTH_BYTES]);
663 	r.rq_clntcred = &(cred_area[2*MAX_AUTH_BYTES]);
664 
665 	rwlock_rdlock(&svc_fd_lock);
666 	xprt = __svc_xports[fd];
667 	rwlock_unlock(&svc_fd_lock);
668 	if (xprt == NULL)
669 		/* But do we control sock? */
670 		return;
671 	/* now receive msgs from xprtprt (support batch calls) */
672 	do {
673 		if (SVC_RECV(xprt, &msg)) {
674 
675 			/* now find the exported program and call it */
676 			struct svc_callout *s;
677 			enum auth_stat why;
678 
679 			r.rq_xprt = xprt;
680 			r.rq_prog = msg.rm_call.cb_prog;
681 			r.rq_vers = msg.rm_call.cb_vers;
682 			r.rq_proc = msg.rm_call.cb_proc;
683 			r.rq_cred = msg.rm_call.cb_cred;
684 			/* first authenticate the message */
685 			if ((why = _authenticate(&r, &msg)) != AUTH_OK) {
686 				svcerr_auth(xprt, why);
687 				goto call_done;
688 			}
689 			/* now match message with a registered service*/
690 			prog_found = FALSE;
691 			low_vers = (rpcvers_t) -1L;
692 			high_vers = (rpcvers_t) 0L;
693 			for (s = svc_head; s != NULL; s = s->sc_next) {
694 				if (s->sc_prog == r.rq_prog) {
695 					if (s->sc_vers == r.rq_vers) {
696 						(*s->sc_dispatch)(&r, xprt);
697 						goto call_done;
698 					}  /* found correct version */
699 					prog_found = TRUE;
700 					if (s->sc_vers < low_vers)
701 						low_vers = s->sc_vers;
702 					if (s->sc_vers > high_vers)
703 						high_vers = s->sc_vers;
704 				}   /* found correct program */
705 			}
706 			/*
707 			 * if we got here, the program or version
708 			 * is not served ...
709 			 */
710 			if (prog_found)
711 				svcerr_progvers(xprt, low_vers, high_vers);
712 			else
713 				 svcerr_noprog(xprt);
714 			/* Fall through to ... */
715 		}
716 		/*
717 		 * Check if the xprt has been disconnected in a
718 		 * recursive call in the service dispatch routine.
719 		 * If so, then break.
720 		 */
721 		rwlock_rdlock(&svc_fd_lock);
722 		if (xprt != __svc_xports[fd]) {
723 			rwlock_unlock(&svc_fd_lock);
724 			break;
725 		}
726 		rwlock_unlock(&svc_fd_lock);
727 call_done:
728 		if ((stat = SVC_STAT(xprt)) == XPRT_DIED){
729 			SVC_DESTROY(xprt);
730 			break;
731 		}
732 	} while (stat == XPRT_MOREREQS);
733 }
734 
735 
736 void
737 svc_getreq_poll(pfdp, pollretval)
738 	struct pollfd	*pfdp;
739 	int	pollretval;
740 {
741 	int i;
742 	int fds_found;
743 
744 	_DIAGASSERT(pfdp != NULL);
745 
746 	for (i = fds_found = 0; fds_found < pollretval; i++) {
747 		struct pollfd *p = &pfdp[i];
748 
749 		if (p->revents) {
750 			/* fd has input waiting */
751 			fds_found++;
752 			/*
753 			 *	We assume that this function is only called
754 			 *	via someone select()ing from svc_fdset or
755 			 *	pollts()ing from svc_pollset[].  Thus it's safe
756 			 *	to handle the POLLNVAL event by simply turning
757 			 *	the corresponding bit off in svc_fdset.  The
758 			 *	svc_pollset[] array is derived from svc_fdset
759 			 *	and so will also be updated eventually.
760 			 *
761 			 *	XXX Should we do an xprt_unregister() instead?
762 			 */
763 			if (p->revents & POLLNVAL) {
764 				rwlock_wrlock(&svc_fd_lock);
765 				FD_CLR(p->fd, &svc_fdset);
766 				rwlock_unlock(&svc_fd_lock);
767 			} else
768 				svc_getreq_common(p->fd);
769 		}
770 	}
771 }
772 
773 bool_t
774 rpc_control(int what, void *arg)
775 {
776 	int val;
777 
778 	switch (what) {
779 	case RPC_SVC_CONNMAXREC_SET:
780 		val = *(int *)arg;
781 		if (val <= 0)
782 			return FALSE;
783 		__svc_maxrec = val;
784 		return TRUE;
785 	case RPC_SVC_CONNMAXREC_GET:
786 		*(int *)arg = __svc_maxrec;
787 		return TRUE;
788 	default:
789 		break;
790 	}
791 	return FALSE;
792 }
793