/* * Process the RPC request. */ int svc_process(struct svc_rqst *rqstp) { struct kvec *argv = &rqstp->rq_arg.head[0]; struct kvec *resv = &rqstp->rq_res.head[0]; struct svc_serv *serv = rqstp->rq_server; u32 dir; /* * Setup response xdr_buf. * Initially it has just one page */ rqstp->rq_next_page = &rqstp->rq_respages[1]; resv->iov_base = page_address(rqstp->rq_respages[0]); resv->iov_len = 0; rqstp->rq_res.pages = rqstp->rq_respages + 1; rqstp->rq_res.len = 0; rqstp->rq_res.page_base = 0; rqstp->rq_res.page_len = 0; rqstp->rq_res.buflen = PAGE_SIZE; rqstp->rq_res.tail[0].iov_base = NULL; rqstp->rq_res.tail[0].iov_len = 0; dir = svc_getnl(argv); if (dir != 0) { /* direction != CALL */ svc_printk(rqstp, "bad direction %d, dropping request\n", dir); serv->sv_stats->rpcbadfmt++; goto out_drop; } /* Returns 1 for send, 0 for drop */ if (likely(svc_process_common(rqstp, argv, resv))) { int ret = svc_send(rqstp); trace_svc_process(rqstp, ret); return ret; } out_drop: trace_svc_process(rqstp, 0); svc_drop(rqstp); return 0; }
/* * Process the RPC request. */ int svc_process(struct svc_serv *serv, struct svc_rqst *rqstp) { struct svc_program *progp; struct svc_version *versp = NULL; /* compiler food */ struct svc_procedure *procp = NULL; struct svc_buf * argp = &rqstp->rq_argbuf; struct svc_buf * resp = &rqstp->rq_resbuf; kxdrproc_t xdr; u32 *bufp, *statp; u32 dir, prog, vers, proc, auth_stat, rpc_stat; rpc_stat = rpc_success; bufp = argp->buf; if (argp->len < 5) goto err_short_len; dir = ntohl(*bufp++); vers = ntohl(*bufp++); /* First words of reply: */ svc_putlong(resp, xdr_one); /* REPLY */ svc_putlong(resp, xdr_zero); /* ACCEPT */ if (dir != 0) /* direction != CALL */ goto err_bad_dir; if (vers != 2) /* RPC version number */ goto err_bad_rpc; rqstp->rq_prog = prog = ntohl(*bufp++); /* program number */ rqstp->rq_vers = vers = ntohl(*bufp++); /* version number */ rqstp->rq_proc = proc = ntohl(*bufp++); /* procedure number */ argp->buf += 5; argp->len -= 5; /* Used by nfsd to only allow the NULL procedure for amd. */ if (rqstp->rq_auth && !rqstp->rq_client && proc) { auth_stat = rpc_autherr_badcred; goto err_bad_auth; } /* * Decode auth data, and add verifier to reply buffer. * We do this before anything else in order to get a decent * auth verifier. */ svc_authenticate(rqstp, &rpc_stat, &auth_stat); if (rpc_stat != rpc_success) goto err_garbage; if (auth_stat != rpc_auth_ok) goto err_bad_auth; progp = serv->sv_program; if (prog != progp->pg_prog) goto err_bad_prog; versp = progp->pg_vers[vers]; if (!versp || vers >= progp->pg_nvers) goto err_bad_vers; procp = versp->vs_proc + proc; if (proc >= versp->vs_nproc || !procp->pc_func) goto err_bad_proc; rqstp->rq_server = serv; rqstp->rq_procinfo = procp; /* Syntactic check complete */ serv->sv_stats->rpccnt++; /* Build the reply header. */ statp = resp->buf; svc_putlong(resp, rpc_success); /* RPC_SUCCESS */ /* Bump per-procedure stats counter */ procp->pc_count++; /* Initialize storage for argp and resp */ memset(rqstp->rq_argp, 0, procp->pc_argsize); memset(rqstp->rq_resp, 0, procp->pc_ressize); /* Call the function that processes the request. */ if (!versp->vs_dispatch) { /* Decode arguments */ xdr = procp->pc_decode; if (xdr && !xdr(rqstp, rqstp->rq_argbuf.buf, rqstp->rq_argp)) goto err_garbage; *statp = procp->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp); /* Encode reply */ if (*statp == rpc_success && (xdr = procp->pc_encode) && !xdr(rqstp, rqstp->rq_resbuf.buf, rqstp->rq_resp)) { dprintk("svc: failed to encode reply\n"); /* serv->sv_stats->rpcsystemerr++; */ *statp = rpc_system_err; } } else { dprintk("svc: calling dispatcher\n"); if (!versp->vs_dispatch(rqstp, statp)) goto dropit; } /* Check RPC status result */ if (*statp != rpc_success) resp->len = statp + 1 - resp->base; /* Release reply info */ if (procp->pc_release) procp->pc_release(rqstp, NULL, rqstp->rq_resp); if (procp->pc_encode == NULL) goto dropit; sendit: return svc_send(rqstp); dropit: dprintk("svc: svc_process dropit\n"); svc_drop(rqstp); return 0; err_short_len: #ifdef RPC_PARANOIA printk("svc: short len %d, dropping request\n", argp->len); #endif goto dropit; /* drop request */ err_bad_dir: #ifdef RPC_PARANOIA printk("svc: bad direction %d, dropping request\n", dir); #endif serv->sv_stats->rpcbadfmt++; goto dropit; /* drop request */ err_bad_rpc: serv->sv_stats->rpcbadfmt++; resp->buf[-1] = xdr_one; /* REJECT */ svc_putlong(resp, xdr_zero); /* RPC_MISMATCH */ svc_putlong(resp, xdr_two); /* Only RPCv2 supported */ svc_putlong(resp, xdr_two); goto sendit; err_bad_auth: dprintk("svc: authentication failed (%ld)\n", ntohl(auth_stat)); serv->sv_stats->rpcbadauth++; resp->buf[-1] = xdr_one; /* REJECT */ svc_putlong(resp, xdr_one); /* AUTH_ERROR */ svc_putlong(resp, auth_stat); /* status */ goto sendit; err_bad_prog: #ifdef RPC_PARANOIA printk("svc: unknown program %d (me %d)\n", prog, progp->pg_prog); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_prog_unavail); goto sendit; err_bad_vers: #ifdef RPC_PARANOIA printk("svc: unknown version (%d)\n", vers); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_prog_mismatch); svc_putlong(resp, htonl(progp->pg_lovers)); svc_putlong(resp, htonl(progp->pg_hivers)); goto sendit; err_bad_proc: #ifdef RPC_PARANOIA printk("svc: unknown procedure (%d)\n", proc); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_proc_unavail); goto sendit; err_garbage: #ifdef RPC_PARANOIA printk("svc: failed to decode args\n"); #endif serv->sv_stats->rpcbadfmt++; svc_putlong(resp, rpc_garbage_args); goto sendit; }
/* * Process the RPC request. */ int svc_process(struct svc_serv *serv, struct svc_rqst *rqstp) { struct svc_program *progp; struct svc_version *versp = NULL; /* compiler food */ struct svc_procedure *procp = NULL; struct kvec * argv = &rqstp->rq_arg.head[0]; struct kvec * resv = &rqstp->rq_res.head[0]; kxdrproc_t xdr; u32 *statp; u32 dir, prog, vers, proc, auth_stat, rpc_stat; rpc_stat = rpc_success; if (argv->iov_len < 6*4) goto err_short_len; /* setup response xdr_buf. * Initially it has just one page */ svc_take_page(rqstp); /* must succeed */ resv->iov_base = page_address(rqstp->rq_respages[0]); resv->iov_len = 0; rqstp->rq_res.pages = rqstp->rq_respages+1; rqstp->rq_res.len = 0; rqstp->rq_res.page_base = 0; rqstp->rq_res.page_len = 0; rqstp->rq_res.tail[0].iov_len = 0; /* tcp needs a space for the record length... */ if (rqstp->rq_prot == IPPROTO_TCP) svc_putu32(resv, 0); rqstp->rq_xid = svc_getu32(argv); svc_putu32(resv, rqstp->rq_xid); dir = ntohl(svc_getu32(argv)); vers = ntohl(svc_getu32(argv)); /* First words of reply: */ svc_putu32(resv, xdr_one); /* REPLY */ if (dir != 0) /* direction != CALL */ goto err_bad_dir; if (vers != 2) /* RPC version number */ goto err_bad_rpc; svc_putu32(resv, xdr_zero); /* ACCEPT */ rqstp->rq_prog = prog = ntohl(svc_getu32(argv)); /* program number */ rqstp->rq_vers = vers = ntohl(svc_getu32(argv)); /* version number */ rqstp->rq_proc = proc = ntohl(svc_getu32(argv)); /* procedure number */ /* * Decode auth data, and add verifier to reply buffer. * We do this before anything else in order to get a decent * auth verifier. */ switch (svc_authenticate(rqstp, &auth_stat)) { case SVC_OK: break; case SVC_GARBAGE: rpc_stat = rpc_garbage_args; goto err_bad; case SVC_SYSERR: rpc_stat = rpc_system_err; goto err_bad; case SVC_DENIED: goto err_bad_auth; case SVC_DROP: goto dropit; case SVC_COMPLETE: goto sendit; } progp = serv->sv_program; if (prog != progp->pg_prog) goto err_bad_prog; if (vers >= progp->pg_nvers || !(versp = progp->pg_vers[vers])) goto err_bad_vers; procp = versp->vs_proc + proc; if (proc >= versp->vs_nproc || !procp->pc_func) goto err_bad_proc; rqstp->rq_server = serv; rqstp->rq_procinfo = procp; /* Syntactic check complete */ serv->sv_stats->rpccnt++; /* Build the reply header. */ statp = resv->iov_base +resv->iov_len; svc_putu32(resv, rpc_success); /* RPC_SUCCESS */ /* Bump per-procedure stats counter */ procp->pc_count++; /* Initialize storage for argp and resp */ memset(rqstp->rq_argp, 0, procp->pc_argsize); memset(rqstp->rq_resp, 0, procp->pc_ressize); /* un-reserve some of the out-queue now that we have a * better idea of reply size */ if (procp->pc_xdrressize) svc_reserve(rqstp, procp->pc_xdrressize<<2); /* Call the function that processes the request. */ if (!versp->vs_dispatch) { /* Decode arguments */ xdr = procp->pc_decode; if (xdr && !xdr(rqstp, argv->iov_base, rqstp->rq_argp)) goto err_garbage; *statp = procp->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp); /* Encode reply */ if (*statp == rpc_success && (xdr = procp->pc_encode) && !xdr(rqstp, resv->iov_base+resv->iov_len, rqstp->rq_resp)) { dprintk("svc: failed to encode reply\n"); /* serv->sv_stats->rpcsystemerr++; */ *statp = rpc_system_err; } } else { dprintk("svc: calling dispatcher\n"); if (!versp->vs_dispatch(rqstp, statp)) { /* Release reply info */ if (procp->pc_release) procp->pc_release(rqstp, NULL, rqstp->rq_resp); goto dropit; } } /* Check RPC status result */ if (*statp != rpc_success) resv->iov_len = ((void*)statp) - resv->iov_base + 4; /* Release reply info */ if (procp->pc_release) procp->pc_release(rqstp, NULL, rqstp->rq_resp); if (procp->pc_encode == NULL) goto dropit; sendit: if (svc_authorise(rqstp)) goto dropit; return svc_send(rqstp); dropit: svc_authorise(rqstp); /* doesn't hurt to call this twice */ dprintk("svc: svc_process dropit\n"); svc_drop(rqstp); return 0; err_short_len: #ifdef RPC_PARANOIA printk("svc: short len %Zd, dropping request\n", argv->iov_len); #endif goto dropit; /* drop request */ err_bad_dir: #ifdef RPC_PARANOIA printk("svc: bad direction %d, dropping request\n", dir); #endif serv->sv_stats->rpcbadfmt++; goto dropit; /* drop request */ err_bad_rpc: serv->sv_stats->rpcbadfmt++; svc_putu32(resv, xdr_one); /* REJECT */ svc_putu32(resv, xdr_zero); /* RPC_MISMATCH */ svc_putu32(resv, xdr_two); /* Only RPCv2 supported */ svc_putu32(resv, xdr_two); goto sendit; err_bad_auth: dprintk("svc: authentication failed (%d)\n", ntohl(auth_stat)); serv->sv_stats->rpcbadauth++; resv->iov_len -= 4; svc_putu32(resv, xdr_one); /* REJECT */ svc_putu32(resv, xdr_one); /* AUTH_ERROR */ svc_putu32(resv, auth_stat); /* status */ goto sendit; err_bad_prog: #ifdef RPC_PARANOIA if (prog != 100227 || progp->pg_prog != 100003) printk("svc: unknown program %d (me %d)\n", prog, progp->pg_prog); /* else it is just a Solaris client seeing if ACLs are supported */ #endif serv->sv_stats->rpcbadfmt++; svc_putu32(resv, rpc_prog_unavail); goto sendit; err_bad_vers: #ifdef RPC_PARANOIA printk("svc: unknown version (%d)\n", vers); #endif serv->sv_stats->rpcbadfmt++; svc_putu32(resv, rpc_prog_mismatch); svc_putu32(resv, htonl(progp->pg_lovers)); svc_putu32(resv, htonl(progp->pg_hivers)); goto sendit; err_bad_proc: #ifdef RPC_PARANOIA printk("svc: unknown procedure (%d)\n", proc); #endif serv->sv_stats->rpcbadfmt++; svc_putu32(resv, rpc_proc_unavail); goto sendit; err_garbage: #ifdef RPC_PARANOIA printk("svc: failed to decode args\n"); #endif rpc_stat = rpc_garbage_args; err_bad: serv->sv_stats->rpcbadfmt++; svc_putu32(resv, rpc_stat); goto sendit; }