⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 svc.c

📁 Linux Kernel 2.6.9 for OMAP1710
💻 C
字号:
/* * linux/net/sunrpc/svc.c * * High-level RPC service routines * * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de> */#include <linux/linkage.h>#include <linux/sched.h>#include <linux/errno.h>#include <linux/net.h>#include <linux/in.h>#include <linux/mm.h>#include <linux/sunrpc/types.h>#include <linux/sunrpc/xdr.h>#include <linux/sunrpc/stats.h>#include <linux/sunrpc/svcsock.h>#include <linux/sunrpc/clnt.h>#define RPCDBG_FACILITY	RPCDBG_SVCDSP#define RPC_PARANOIA 1/* * Create an RPC service */struct svc_serv *svc_create(struct svc_program *prog, unsigned int bufsize){	struct svc_serv	*serv;	int vers;	unsigned int xdrsize;	if (!(serv = (struct svc_serv *) kmalloc(sizeof(*serv), GFP_KERNEL)))		return NULL;	memset(serv, 0, sizeof(*serv));	serv->sv_program   = prog;	serv->sv_nrthreads = 1;	serv->sv_stats     = prog->pg_stats;	serv->sv_bufsz	   = bufsize? bufsize : 4096;	prog->pg_lovers = prog->pg_nvers-1;	xdrsize = 0;	for (vers=0; vers<prog->pg_nvers ; vers++)		if (prog->pg_vers[vers]) {			prog->pg_hivers = vers;			if (prog->pg_lovers > vers)				prog->pg_lovers = vers;			if (prog->pg_vers[vers]->vs_xdrsize > xdrsize)				xdrsize = prog->pg_vers[vers]->vs_xdrsize;		}	serv->sv_xdrsize   = xdrsize;	INIT_LIST_HEAD(&serv->sv_threads);	INIT_LIST_HEAD(&serv->sv_sockets);	INIT_LIST_HEAD(&serv->sv_tempsocks);	INIT_LIST_HEAD(&serv->sv_permsocks);	spin_lock_init(&serv->sv_lock);	serv->sv_name      = prog->pg_name;	/* Remove any stale portmap registrations */	svc_register(serv, 0, 0);	return serv;}/* * Destroy an RPC service */voidsvc_destroy(struct svc_serv *serv){	struct svc_sock	*svsk;	dprintk("RPC: svc_destroy(%s, %d)\n",				serv->sv_program->pg_name,				serv->sv_nrthreads);	if (serv->sv_nrthreads) {		if (--(serv->sv_nrthreads) != 0) {			svc_sock_update_bufs(serv);			return;		}	} else		printk("svc_destroy: no threads for serv=%p!\n", serv);	while (!list_empty(&serv->sv_tempsocks)) {		svsk = list_entry(serv->sv_tempsocks.next,				  struct svc_sock,				  sk_list);		svc_delete_socket(svsk);	}	while (!list_empty(&serv->sv_permsocks)) {		svsk = list_entry(serv->sv_permsocks.next,				  struct svc_sock,				  sk_list);		svc_delete_socket(svsk);	}		cache_clean_deferred(serv);	/* Unregister service with the portmapper */	svc_register(serv, 0, 0);	kfree(serv);}/* * Allocate an RPC server's buffer space. * We allocate pages and place them in rq_argpages. */static intsvc_init_buffer(struct svc_rqst *rqstp, unsigned int size){	int pages;	int arghi;		if (size > RPCSVC_MAXPAYLOAD)		size = RPCSVC_MAXPAYLOAD;	pages = 2 + (size+ PAGE_SIZE -1) / PAGE_SIZE;	rqstp->rq_argused = 0;	rqstp->rq_resused = 0;	arghi = 0;	if (pages > RPCSVC_MAXPAGES)		BUG();	while (pages) {		struct page *p = alloc_page(GFP_KERNEL);		if (!p)			break;		rqstp->rq_argpages[arghi++] = p;		pages--;	}	rqstp->rq_arghi = arghi;	return ! pages;}/* * Release an RPC server buffer */static voidsvc_release_buffer(struct svc_rqst *rqstp){	while (rqstp->rq_arghi)		put_page(rqstp->rq_argpages[--rqstp->rq_arghi]);	while (rqstp->rq_resused) {		if (rqstp->rq_respages[--rqstp->rq_resused] == NULL)			continue;		put_page(rqstp->rq_respages[rqstp->rq_resused]);	}	rqstp->rq_argused = 0;}/* * Create a server thread */intsvc_create_thread(svc_thread_fn func, struct svc_serv *serv){	struct svc_rqst	*rqstp;	int		error = -ENOMEM;	rqstp = kmalloc(sizeof(*rqstp), GFP_KERNEL);	if (!rqstp)		goto out;	memset(rqstp, 0, sizeof(*rqstp));	init_waitqueue_head(&rqstp->rq_wait);	if (!(rqstp->rq_argp = (u32 *) kmalloc(serv->sv_xdrsize, GFP_KERNEL))	 || !(rqstp->rq_resp = (u32 *) kmalloc(serv->sv_xdrsize, GFP_KERNEL))	 || !svc_init_buffer(rqstp, serv->sv_bufsz))		goto out_thread;	serv->sv_nrthreads++;	rqstp->rq_server = serv;	error = kernel_thread((int (*)(void *)) func, rqstp, 0);	if (error < 0)		goto out_thread;	svc_sock_update_bufs(serv);	error = 0;out:	return error;out_thread:	svc_exit_thread(rqstp);	goto out;}/* * Destroy an RPC server thread */voidsvc_exit_thread(struct svc_rqst *rqstp){	struct svc_serv	*serv = rqstp->rq_server;	svc_release_buffer(rqstp);	if (rqstp->rq_resp)		kfree(rqstp->rq_resp);	if (rqstp->rq_argp)		kfree(rqstp->rq_argp);	if (rqstp->rq_auth_data)		kfree(rqstp->rq_auth_data);	kfree(rqstp);	/* Release the server */	if (serv)		svc_destroy(serv);}/* * Register an RPC service with the local portmapper. * To unregister a service, call this routine with  * proto and port == 0. */intsvc_register(struct svc_serv *serv, int proto, unsigned short port){	struct svc_program	*progp;	unsigned long		flags;	int			i, error = 0, dummy;	progp = serv->sv_program;	dprintk("RPC: svc_register(%s, %s, %d)\n",		progp->pg_name, proto == IPPROTO_UDP? "udp" : "tcp", port);	if (!port)		clear_thread_flag(TIF_SIGPENDING);	for (i = 0; i < progp->pg_nvers; i++) {		if (progp->pg_vers[i] == NULL)			continue;		error = rpc_register(progp->pg_prog, i, proto, port, &dummy);		if (error < 0)			break;		if (port && !dummy) {			error = -EACCES;			break;		}	}	if (!port) {		spin_lock_irqsave(&current->sighand->siglock, flags);		recalc_sigpending();		spin_unlock_irqrestore(&current->sighand->siglock, flags);	}	return error;}/* * Process the RPC request. */intsvc_process(struct svc_serv *serv, struct svc_rqst *rqstp){	struct svc_program	*progp;	struct svc_version	*versp = NULL;	/* compiler food */	struct svc_procedure	*procp = NULL;	struct kvec *		argv = &rqstp->rq_arg.head[0];	struct kvec *		resv = &rqstp->rq_res.head[0];	kxdrproc_t		xdr;	u32			*statp;	u32			dir, prog, vers, proc,				auth_stat, rpc_stat;	int			auth_res;	rpc_stat = rpc_success;	if (argv->iov_len < 6*4)		goto err_short_len;	/* setup response xdr_buf.	 * Initially it has just one page 	 */	svc_take_page(rqstp); /* must succeed */	resv->iov_base = page_address(rqstp->rq_respages[0]);	resv->iov_len = 0;	rqstp->rq_res.pages = rqstp->rq_respages+1;	rqstp->rq_res.len = 0;	rqstp->rq_res.page_base = 0;	rqstp->rq_res.page_len = 0;	rqstp->rq_res.tail[0].iov_len = 0;	/* tcp needs a space for the record length... */	if (rqstp->rq_prot == IPPROTO_TCP)		svc_putu32(resv, 0);	rqstp->rq_xid = svc_getu32(argv);	svc_putu32(resv, rqstp->rq_xid);	dir  = ntohl(svc_getu32(argv));	vers = ntohl(svc_getu32(argv));	/* First words of reply: */	svc_putu32(resv, xdr_one);		/* REPLY */	if (dir != 0)		/* direction != CALL */		goto err_bad_dir;	if (vers != 2)		/* RPC version number */		goto err_bad_rpc;	svc_putu32(resv, xdr_zero);		/* ACCEPT */	rqstp->rq_prog = prog = ntohl(svc_getu32(argv));	/* program number */	rqstp->rq_vers = vers = ntohl(svc_getu32(argv));	/* version number */	rqstp->rq_proc = proc = ntohl(svc_getu32(argv));	/* procedure number */	progp = serv->sv_program;	/*	 * Decode auth data, and add verifier to reply buffer.	 * We do this before anything else in order to get a decent	 * auth verifier.	 */	if (progp->pg_authenticate != NULL)		auth_res = progp->pg_authenticate(rqstp, &auth_stat);	else		auth_res = svc_authenticate(rqstp, &auth_stat);	switch (auth_res) {	case SVC_OK:		break;	case SVC_GARBAGE:		rpc_stat = rpc_garbage_args;		goto err_bad;	case SVC_SYSERR:		rpc_stat = rpc_system_err;		goto err_bad;	case SVC_DENIED:		goto err_bad_auth;	case SVC_DROP:		goto dropit;	case SVC_COMPLETE:		goto sendit;	}			if (prog != progp->pg_prog)		goto err_bad_prog;	if (vers >= progp->pg_nvers ||	  !(versp = progp->pg_vers[vers]))		goto err_bad_vers;	procp = versp->vs_proc + proc;	if (proc >= versp->vs_nproc || !procp->pc_func)		goto err_bad_proc;	rqstp->rq_server   = serv;	rqstp->rq_procinfo = procp;	/* Syntactic check complete */	serv->sv_stats->rpccnt++;	/* Build the reply header. */	statp = resv->iov_base +resv->iov_len;	svc_putu32(resv, rpc_success);		/* RPC_SUCCESS */	/* Bump per-procedure stats counter */	procp->pc_count++;	/* Initialize storage for argp and resp */	memset(rqstp->rq_argp, 0, procp->pc_argsize);	memset(rqstp->rq_resp, 0, procp->pc_ressize);	/* un-reserve some of the out-queue now that we have a 	 * better idea of reply size	 */	if (procp->pc_xdrressize)		svc_reserve(rqstp, procp->pc_xdrressize<<2);	/* Call the function that processes the request. */	if (!versp->vs_dispatch) {		/* Decode arguments */		xdr = procp->pc_decode;		if (xdr && !xdr(rqstp, argv->iov_base, rqstp->rq_argp))			goto err_garbage;		*statp = procp->pc_func(rqstp, rqstp->rq_argp, rqstp->rq_resp);		/* Encode reply */		if (*statp == rpc_success && (xdr = procp->pc_encode)		 && !xdr(rqstp, resv->iov_base+resv->iov_len, rqstp->rq_resp)) {			dprintk("svc: failed to encode reply\n");			/* serv->sv_stats->rpcsystemerr++; */			*statp = rpc_system_err;		}	} else {		dprintk("svc: calling dispatcher\n");		if (!versp->vs_dispatch(rqstp, statp)) {			/* Release reply info */			if (procp->pc_release)				procp->pc_release(rqstp, NULL, rqstp->rq_resp);			goto dropit;		}	}	/* Check RPC status result */	if (*statp != rpc_success)		resv->iov_len = ((void*)statp)  - resv->iov_base + 4;	/* Release reply info */	if (procp->pc_release)		procp->pc_release(rqstp, NULL, rqstp->rq_resp);	if (procp->pc_encode == NULL)		goto dropit; sendit:	if (svc_authorise(rqstp))		goto dropit;	return svc_send(rqstp); dropit:	svc_authorise(rqstp);	/* doesn't hurt to call this twice */	dprintk("svc: svc_process dropit\n");	svc_drop(rqstp);	return 0;err_short_len:#ifdef RPC_PARANOIA	printk("svc: short len %Zd, dropping request\n", argv->iov_len);#endif	goto dropit;			/* drop request */err_bad_dir:#ifdef RPC_PARANOIA	printk("svc: bad direction %d, dropping request\n", dir);#endif	serv->sv_stats->rpcbadfmt++;	goto dropit;			/* drop request */err_bad_rpc:	serv->sv_stats->rpcbadfmt++;	svc_putu32(resv, xdr_one);	/* REJECT */	svc_putu32(resv, xdr_zero);	/* RPC_MISMATCH */	svc_putu32(resv, xdr_two);	/* Only RPCv2 supported */	svc_putu32(resv, xdr_two);	goto sendit;err_bad_auth:	dprintk("svc: authentication failed (%d)\n", ntohl(auth_stat));	serv->sv_stats->rpcbadauth++;	resv->iov_len -= 4;	svc_putu32(resv, xdr_one);	/* REJECT */	svc_putu32(resv, xdr_one);	/* AUTH_ERROR */	svc_putu32(resv, auth_stat);	/* status */	goto sendit;err_bad_prog:#ifdef RPC_PARANOIA	if (prog != 100227 || progp->pg_prog != 100003)		printk("svc: unknown program %d (me %d)\n", prog, progp->pg_prog);	/* else it is just a Solaris client seeing if ACLs are supported */#endif	serv->sv_stats->rpcbadfmt++;	svc_putu32(resv, rpc_prog_unavail);	goto sendit;err_bad_vers:#ifdef RPC_PARANOIA	printk("svc: unknown version (%d)\n", vers);#endif	serv->sv_stats->rpcbadfmt++;	svc_putu32(resv, rpc_prog_mismatch);	svc_putu32(resv, htonl(progp->pg_lovers));	svc_putu32(resv, htonl(progp->pg_hivers));	goto sendit;err_bad_proc:#ifdef RPC_PARANOIA	printk("svc: unknown procedure (%d)\n", proc);#endif	serv->sv_stats->rpcbadfmt++;	svc_putu32(resv, rpc_proc_unavail);	goto sendit;err_garbage:#ifdef RPC_PARANOIA	printk("svc: failed to decode args\n");#endif	rpc_stat = rpc_garbage_args;err_bad:	serv->sv_stats->rpcbadfmt++;	svc_putu32(resv, rpc_stat);	goto sendit;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -