/* * linux/net/sunrpc/svc.c * * High-level RPC service routines * * Copyright (C) 1995, 1996 Olaf Kirch */ #define __KERNEL_SYSCALLS__ #include #include #include #include #include #include #include #include #include #include #include #define RPCDBG_FACILITY RPCDBG_SVCDSP #define RPC_PARANOIA 1 /* * Create an RPC service */ struct svc_serv * svc_create(struct svc_program *prog, unsigned int bufsize, unsigned int xdrsize) { struct svc_serv *serv; xdr_init(); if (!(serv = (struct svc_serv *) kmalloc(sizeof(*serv), GFP_KERNEL))) return NULL; memset(serv, 0, sizeof(*serv)); serv->sv_program = prog; serv->sv_nrthreads = 1; serv->sv_stats = prog->pg_stats; serv->sv_bufsz = bufsize? bufsize : 4096; serv->sv_xdrsize = xdrsize; serv->sv_name = prog->pg_name; /* Remove any stale portmap registrations */ svc_register(serv, 0, 0); return serv; } /* * Destroy an RPC service */ void svc_destroy(struct svc_serv *serv) { struct svc_sock *svsk; dprintk("RPC: svc_destroy(%s, %d)\n", serv->sv_program->pg_name, serv->sv_nrthreads); if (serv->sv_nrthreads) { if (--(serv->sv_nrthreads) != 0) return; } else printk("svc_destroy: no threads for serv=%p!\n", serv); while ((svsk = serv->sv_allsocks) != NULL) svc_delete_socket(svsk); /* Unregister service with the portmapper */ svc_register(serv, 0, 0); kfree(serv); } /* * Allocate an RPC server buffer * Later versions may do nifty things by allocating multiple pages * of memory directly and putting them into the bufp->iov. */ int svc_init_buffer(struct svc_buf *bufp, unsigned int size) { if (!(bufp->area = (u32 *) kmalloc(size, GFP_KERNEL))) return 0; bufp->base = bufp->area; bufp->buf = bufp->area; bufp->len = 0; bufp->buflen = size >> 2; bufp->iov[0].iov_base = bufp->area; bufp->iov[0].iov_len = size; bufp->nriov = 1; return 1; } /* * Release an RPC server buffer */ void svc_release_buffer(struct svc_buf *bufp) { kfree(bufp->area); bufp->area = 0; } /* * Create a server thread */ int svc_create_thread(svc_thread_fn func, struct svc_serv *serv) { struct svc_rqst *rqstp; int error = -ENOMEM; rqstp = kmalloc(sizeof(*rqstp), GFP_KERNEL); if (!rqstp) goto out; memset(rqstp, 0, sizeof(*rqstp)); if (!(rqstp->rq_argp = (u32 *) kmalloc(serv->sv_xdrsize, GFP_KERNEL)) || !(rqstp->rq_resp = (u32 *) kmalloc(serv->sv_xdrsize, GFP_KERNEL)) || !svc_init_buffer(&rqstp->rq_defbuf, serv->sv_bufsz)) goto out_thread; serv->sv_nrthreads++; rqstp->rq_server = serv; error = kernel_thread((int (*)(void *)) func, rqstp, 0); if (error < 0) goto out_thread; error = 0; out: return error; out_thread: svc_exit_thread(rqstp); goto out; } /* * Destroy an RPC server thread */ void svc_exit_thread(struct svc_rqst *rqstp) { struct svc_serv *serv = rqstp->rq_server; svc_release_buffer(&rqstp->rq_defbuf); if (rqstp->rq_resp) kfree(rqstp->rq_resp); if (rqstp->rq_argp) kfree(rqstp->rq_argp); kfree(rqstp); /* Release the server */ if (serv) svc_destroy(serv); } /* * Register an RPC service with the local portmapper. * To unregister a service, call this routine with * proto and port == 0. */ int svc_register(struct svc_serv *serv, int proto, unsigned short port) { struct svc_program *progp; unsigned long flags; int i, error = 0, dummy; progp = serv->sv_program; dprintk("RPC: svc_register(%s, %s, %d)\n", progp->pg_name, proto == IPPROTO_UDP? "udp" : "tcp", port); if (!port) current->sigpending = 0; for (i = 0; i < progp->pg_nvers; i++) { if (progp->pg_vers[i] == NULL) continue; error = rpc_register(progp->pg_prog, i, proto, port, &dummy); if (error < 0) break; if (port && !dummy) { error = -EACCES; break; } } if (!port) { spin_lock_irqsave(¤t->sigmask_lock, flags); recalc_sigpending(current); spin_unlock_irqrestore(¤t->sigmask_lock, flags); } return error; } /* * Process the RPC request. */ int svc_process(struct svc_serv *serv, struct svc_rqst *rqstp) { struct svc_program *progp; struct svc_version *versp = NULL; /* compiler food */ struct svc_procedure *procp = NULL; struct svc_buf * argp = &rqstp->rq_argbuf; struct svc_buf * resp = &rqstp->rq_resbuf; kxdrproc_t xdr; u32 *bufp, *statp; u32 dir, prog, vers, proc, auth_stat, rpc_stat; rpc_stat = rpc_success; bufp = argp->buf; if (argp->len < 5) goto err_short_len; dir = ntohl(*bufp++); vers = ntohl(*bufp++); /* First words of reply: */ svc_putlong(resp, xdr_one); /* REPLY */ svc_putlong(resp, xdr_zero); /* ACCEPT */ if (dir != 0) /* direction != CALL */ goto err_bad_dir; if (vers != 2) /* RPC version number */ goto err_bad_rpc; rqstp->rq_prog = prog = ntohl(*bufp++); /* program number */ rqstp->rq_vers = vers = ntohl(*bufp++); /* version number */ rqstp->rq_proc = proc = ntohl(*bufp++); /* procedure number */ argp->buf += 5; argp->len -= 5; /* * Decode auth data, and add verifier to reply buffer. * We do this before anything else in order to get a decent * auth verifier. */ svc_authenticate(rqstp, &rpc_stat, &auth_stat); if (rpc_stat != rpc_success) goto err_garbage; if (auth_stat != rpc_auth_ok) goto err_bad_auth; progp = serv->sv_program; if (prog != progp->pg_prog) goto err_bad_prog; versp = progp->pg_vers[vers]; if (!versp || vers >= progp->pg_nvers) goto err_bad_vers; procp = versp->vs_proc + proc; if (proc >= versp->vs_nproc || !procp->pc_func) goto err_bad_proc; rqstp->rq_server = serv; rqstp->rq_procinfo = procp; /* Syntactic check complete */ serv->sv_stats->rpccnt++; /* Build the reply header. */ statp = resp->buf; svc_putlong(resp, rpc_success); /* RPC_SUCCESS */ /* Bump per-procedure stats counter */ procp->pc_count++; /* Initialize storage for argp and resp */ memset(rqstp->rq_argp, 0, procp->pc_argsize); memset(rqstp->rq_resp, 0, procp->pc_ressize); /* Call the function that processes the request. */ if (!versp->vs_dispatch) { /* Decode arguments */ xdr = procp->pc_decode; if (xdr && !xdr(rqstp, rqstp->rq_argbuf.buf, rqstp->rq_argp)) goto err_garbage; *statp = procp->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp); /* Encode reply */ if (*statp == rpc_success && (xdr = procp->pc_encode) && !xdr(rqstp, rqstp->rq_resbuf.buf, rqstp->rq_resp)) { dprintk("svc: failed to encode reply\n"); /* serv->sv_stats->rpcsystemerr++; */ *statp = rpc_system_err; } } else { dprintk("svc: calling dispatcher\n"); if (!versp->vs_dispatch(rqstp, statp)) goto dropit; } /* Check RPC status result */ if (*statp != rpc_success) resp->len = statp + 1 - resp->base; /* Release reply info */ if (procp->pc_release) procp->pc_release(rqstp, NULL, rqstp->rq_resp); if (procp->pc_encode == NULL) goto dropit; sendit: return svc_send(rqstp); dropit: dprintk("svc: svc_process dropit\n"); svc_drop(rqstp); return 0; err_short_len: #ifdef RPC_PARANOIA printk("svc: short len %d, dropping request\n", argp->len); #endif goto dropit; /* drop request */ err_bad_dir: #ifdef RPC_PARANOIA printk("svc: bad direction %d, dropping request\n", dir); #endif serv->sv_stats->rpcbadfmt++; goto dropit; /* drop request */ err_bad_rpc: serv->sv_stats->rpcbadfmt++; resp->buf[-1] = xdr_one; /* REJECT */ svc_putlong(resp, xdr_zero); /* RPC_MISMATCH */ svc_putlong(resp, xdr_two); /* Only RPCv2 supported */ svc_putlong(resp, xdr_two); goto sendit; err_bad_auth: dprintk("svc: authentication failed (%ld)\n", ntohl(auth_stat)); serv->sv_stats->rpcbadauth++; resp->buf[-1] = xdr_one; /* REJECT */ svc_putlong(resp, xdr_one); /* AUTH_ERROR */ svc_putlong(resp, auth_stat); /* status */ goto sendit; err_bad_prog: #ifdef RPC_PARANOIA printk("svc: unknown program %d (me %d)\n", prog, progp->pg_prog); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_prog_unavail); goto sendit; err_bad_vers: #ifdef RPC_PARANOIA printk("svc: unknown version (%d)\n", vers); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_prog_mismatch); svc_putlong(resp, htonl(progp->pg_lovers)); svc_putlong(resp, htonl(progp->pg_hivers)); goto sendit; err_bad_proc: #ifdef RPC_PARANOIA printk("svc: unknown procedure (%d)\n", proc); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_proc_unavail); goto sendit; err_garbage: #ifdef RPC_PARANOIA printk("svc: failed to decode args\n"); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_garbage_args); goto sendit; }