svcsock.c 43.4 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7
/*
 * linux/net/sunrpc/svcsock.c
 *
 * These are the RPC server socket internals.
 *
 * The server scheduling algorithm does not always distribute the load
 * evenly when servicing a single client. May need to modify the
8
 * svc_xprt_enqueue procedure...
L
Linus Torvalds 已提交
9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * TCP support is largely untested and may be a little slow. The problem
 * is that we currently do two separate recvfrom's, one for the 4-byte
 * record length, and the second for the actual record. This could possibly
 * be improved by always reading a minimum size of around 100 bytes and
 * tucking any superfluous bytes away in a temporary store. Still, that
 * leaves write requests out in the rain. An alternative may be to peek at
 * the first skb in the queue, and if it matches the next TCP sequence
 * number, to extract the record marker. Yuck.
 *
 * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
 */

22
#include <linux/kernel.h>
L
Linus Torvalds 已提交
23 24 25 26 27 28 29
#include <linux/sched.h>
#include <linux/errno.h>
#include <linux/fcntl.h>
#include <linux/net.h>
#include <linux/in.h>
#include <linux/inet.h>
#include <linux/udp.h>
30
#include <linux/tcp.h>
L
Linus Torvalds 已提交
31 32 33 34
#include <linux/unistd.h>
#include <linux/slab.h>
#include <linux/netdevice.h>
#include <linux/skbuff.h>
35
#include <linux/file.h>
36
#include <linux/freezer.h>
L
Linus Torvalds 已提交
37 38 39
#include <net/sock.h>
#include <net/checksum.h>
#include <net/ip.h>
40
#include <net/ipv6.h>
41
#include <net/tcp.h>
42
#include <net/tcp_states.h>
L
Linus Torvalds 已提交
43 44 45 46
#include <asm/uaccess.h>
#include <asm/ioctls.h>

#include <linux/sunrpc/types.h>
47
#include <linux/sunrpc/clnt.h>
L
Linus Torvalds 已提交
48
#include <linux/sunrpc/xdr.h>
49
#include <linux/sunrpc/msg_prot.h>
L
Linus Torvalds 已提交
50 51
#include <linux/sunrpc/svcsock.h>
#include <linux/sunrpc/stats.h>
52
#include <linux/sunrpc/xprt.h>
L
Linus Torvalds 已提交
53

54
#define RPCDBG_FACILITY	RPCDBG_SVCXPRT
L
Linus Torvalds 已提交
55 56 57


static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
58
					 int *errp, int flags);
L
Linus Torvalds 已提交
59 60 61
static void		svc_udp_data_ready(struct sock *, int);
static int		svc_udp_recvfrom(struct svc_rqst *);
static int		svc_udp_sendto(struct svc_rqst *);
62
static void		svc_sock_detach(struct svc_xprt *);
63
static void		svc_tcp_sock_detach(struct svc_xprt *);
64
static void		svc_sock_free(struct svc_xprt *);
L
Linus Torvalds 已提交
65

66
static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
67 68
					  struct net *, struct sockaddr *,
					  int, int);
69 70 71 72 73 74 75
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);
#endif /* CONFIG_NFS_V4_1 */

76 77 78 79
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key svc_key[2];
static struct lock_class_key svc_slock_key[2];

80
static void svc_reclassify_socket(struct socket *sock)
81 82
{
	struct sock *sk = sock->sk;
83
	BUG_ON(sock_owned_by_user(sk));
84 85 86
	switch (sk->sk_family) {
	case AF_INET:
		sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
87 88 89
					      &svc_slock_key[0],
					      "sk_xprt.xpt_lock-AF_INET-NFSD",
					      &svc_key[0]);
90 91 92 93
		break;

	case AF_INET6:
		sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
94 95 96
					      &svc_slock_key[1],
					      "sk_xprt.xpt_lock-AF_INET6-NFSD",
					      &svc_key[1]);
97 98 99 100 101 102 103
		break;

	default:
		BUG();
	}
}
#else
104
static void svc_reclassify_socket(struct socket *sock)
105 106 107 108
{
}
#endif

L
Linus Torvalds 已提交
109 110 111
/*
 * Release an skbuff after use
 */
112
static void svc_release_skb(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
113
{
114
	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
L
Linus Torvalds 已提交
115 116

	if (skb) {
117 118
		struct svc_sock *svsk =
			container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
119
		rqstp->rq_xprt_ctxt = NULL;
L
Linus Torvalds 已提交
120 121

		dprintk("svc: service %p, releasing skb %p\n", rqstp, skb);
122
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
123 124 125
	}
}

126 127 128 129
union svc_pktinfo_u {
	struct in_pktinfo pkti;
	struct in6_pktinfo pkti6;
};
130 131
#define SVC_PKTINFO_SPACE \
	CMSG_SPACE(sizeof(union svc_pktinfo_u))
132 133 134

static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
{
135 136 137
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	switch (svsk->sk_sk->sk_family) {
138 139 140 141 142 143 144 145 146 147
	case AF_INET: {
			struct in_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IP;
			cmh->cmsg_type = IP_PKTINFO;
			pki->ipi_ifindex = 0;
			pki->ipi_spec_dst.s_addr = rqstp->rq_daddr.addr.s_addr;
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
148

149 150 151 152 153 154 155 156 157 158 159 160 161 162
	case AF_INET6: {
			struct in6_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IPV6;
			cmh->cmsg_type = IPV6_PKTINFO;
			pki->ipi6_ifindex = 0;
			ipv6_addr_copy(&pki->ipi6_addr,
					&rqstp->rq_daddr.addr6);
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
	}
}

L
Linus Torvalds 已提交
163
/*
164
 * send routine intended to be shared by the fore- and back-channel
L
Linus Torvalds 已提交
165
 */
166 167 168
int svc_send_common(struct socket *sock, struct xdr_buf *xdr,
		    struct page *headpage, unsigned long headoffset,
		    struct page *tailpage, unsigned long tailoffset)
L
Linus Torvalds 已提交
169 170 171 172 173 174 175
{
	int		result;
	int		size;
	struct page	**ppage = xdr->pages;
	size_t		base = xdr->page_base;
	unsigned int	pglen = xdr->page_len;
	unsigned int	flags = MSG_MORE;
176 177
	int		slen;
	int		len = 0;
L
Linus Torvalds 已提交
178 179 180 181 182 183

	slen = xdr->len;

	/* send head */
	if (slen == xdr->head[0].iov_len)
		flags = 0;
184
	len = kernel_sendpage(sock, headpage, headoffset,
185
				  xdr->head[0].iov_len, flags);
L
Linus Torvalds 已提交
186 187 188 189 190 191 192 193 194 195 196
	if (len != xdr->head[0].iov_len)
		goto out;
	slen -= xdr->head[0].iov_len;
	if (slen == 0)
		goto out;

	/* send page data */
	size = PAGE_SIZE - base < pglen ? PAGE_SIZE - base : pglen;
	while (pglen > 0) {
		if (slen == size)
			flags = 0;
197
		result = kernel_sendpage(sock, *ppage, base, size, flags);
L
Linus Torvalds 已提交
198 199 200 201 202 203 204 205 206 207
		if (result > 0)
			len += result;
		if (result != size)
			goto out;
		slen -= size;
		pglen -= size;
		size = PAGE_SIZE < pglen ? PAGE_SIZE : pglen;
		base = 0;
		ppage++;
	}
208

L
Linus Torvalds 已提交
209 210
	/* send tail */
	if (xdr->tail[0].iov_len) {
211 212
		result = kernel_sendpage(sock, tailpage, tailoffset,
				   xdr->tail[0].iov_len, 0);
L
Linus Torvalds 已提交
213 214 215
		if (result > 0)
			len += result;
	}
216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

out:
	return len;
}


/*
 * Generic sendto routine
 */
static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct socket	*sock = svsk->sk_sock;
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
	int		len = 0;
	unsigned long tailoff;
	unsigned long headoff;
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);

	if (rqstp->rq_prot == IPPROTO_UDP) {
		struct msghdr msg = {
			.msg_name	= &rqstp->rq_addr,
			.msg_namelen	= rqstp->rq_addrlen,
			.msg_control	= cmh,
			.msg_controllen	= sizeof(buffer),
			.msg_flags	= MSG_MORE,
		};

		svc_set_cmsg_data(rqstp, cmh);

		if (sock_sendmsg(sock, &msg, 0) < 0)
			goto out;
	}

	tailoff = ((unsigned long)xdr->tail[0].iov_base) & (PAGE_SIZE-1);
	headoff = 0;
	len = svc_send_common(sock, xdr, rqstp->rq_respages[0], headoff,
			       rqstp->rq_respages[0], tailoff);

L
Linus Torvalds 已提交
260
out:
261
	dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
262
		svsk, xdr->head[0].iov_base, xdr->head[0].iov_len,
263
		xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
L
Linus Torvalds 已提交
264 265 266 267

	return len;
}

268 269 270
/*
 * Report socket names for nfsdfs
 */
271
static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
272
{
C
Chuck Lever 已提交
273 274 275
	const struct sock *sk = svsk->sk_sk;
	const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
							"udp" : "tcp";
276 277
	int len;

C
Chuck Lever 已提交
278
	switch (sk->sk_family) {
279 280
	case PF_INET:
		len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
C
Chuck Lever 已提交
281
				proto_name,
E
Eric Dumazet 已提交
282 283
				&inet_sk(sk)->inet_rcv_saddr,
				inet_sk(sk)->inet_num);
284
		break;
285 286
	case PF_INET6:
		len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
C
Chuck Lever 已提交
287 288
				proto_name,
				&inet6_sk(sk)->rcv_saddr,
E
Eric Dumazet 已提交
289
				inet_sk(sk)->inet_num);
290 291
		break;
	default:
292
		len = snprintf(buf, remaining, "*unknown-%d*\n",
C
Chuck Lever 已提交
293
				sk->sk_family);
294
	}
295 296 297 298

	if (len >= remaining) {
		*buf = '\0';
		return -ENAMETOOLONG;
299 300 301 302
	}
	return len;
}

303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319
/**
 * svc_sock_names - construct a list of listener names in a string
 * @serv: pointer to RPC service
 * @buf: pointer to a buffer to fill in with socket names
 * @buflen: size of the buffer to be filled
 * @toclose: pointer to '\0'-terminated C string containing the name
 *		of a listener to be closed
 *
 * Fills in @buf with a '\n'-separated list of names of listener
 * sockets.  If @toclose is not NULL, the socket named by @toclose
 * is closed, and is not included in the output list.
 *
 * Returns positive length of the socket name string, or a negative
 * errno value on error.
 */
int svc_sock_names(struct svc_serv *serv, char *buf, const size_t buflen,
		   const char *toclose)
320
{
321
	struct svc_sock *svsk, *closesk = NULL;
322 323 324 325
	int len = 0;

	if (!serv)
		return 0;
326

327
	spin_lock_bh(&serv->sv_lock);
328
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list) {
329 330 331 332 333
		int onelen = svc_one_sock_name(svsk, buf + len, buflen - len);
		if (onelen < 0) {
			len = onelen;
			break;
		}
334
		if (toclose && strcmp(toclose, buf + len) == 0) {
335
			closesk = svsk;
336 337
			svc_xprt_get(&closesk->sk_xprt);
		} else
338
			len += onelen;
339
	}
340
	spin_unlock_bh(&serv->sv_lock);
341

342
	if (closesk) {
343 344 345
		/* Should unregister with portmap, but you cannot
		 * unregister just one protocol...
		 */
346
		svc_close_xprt(&closesk->sk_xprt);
347 348
		svc_xprt_put(&closesk->sk_xprt);
	} else if (toclose)
349
		return -ENOENT;
350 351
	return len;
}
352
EXPORT_SYMBOL_GPL(svc_sock_names);
353

L
Linus Torvalds 已提交
354 355 356
/*
 * Check input queue length
 */
357
static int svc_recv_available(struct svc_sock *svsk)
L
Linus Torvalds 已提交
358 359 360 361
{
	struct socket	*sock = svsk->sk_sock;
	int		avail, err;

362
	err = kernel_sock_ioctl(sock, TIOCINQ, (unsigned long) &avail);
L
Linus Torvalds 已提交
363 364 365 366 367 368 369

	return (err >= 0)? avail : err;
}

/*
 * Generic recvfrom routine.
 */
370 371
static int svc_recvfrom(struct svc_rqst *rqstp, struct kvec *iov, int nr,
			int buflen)
L
Linus Torvalds 已提交
372
{
373 374
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
375 376 377 378
	struct msghdr msg = {
		.msg_flags	= MSG_DONTWAIT,
	};
	int len;
L
Linus Torvalds 已提交
379

380 381
	rqstp->rq_xprt_hlen = 0;

382 383
	len = kernel_recvmsg(svsk->sk_sock, &msg, iov, nr, buflen,
				msg.msg_flags);
L
Linus Torvalds 已提交
384 385

	dprintk("svc: socket %p recvfrom(%p, %Zu) = %d\n",
386
		svsk, iov[0].iov_base, iov[0].iov_len, len);
L
Linus Torvalds 已提交
387 388 389
	return len;
}

390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416
static int svc_partial_recvfrom(struct svc_rqst *rqstp,
				struct kvec *iov, int nr,
				int buflen, unsigned int base)
{
	size_t save_iovlen;
	void __user *save_iovbase;
	unsigned int i;
	int ret;

	if (base == 0)
		return svc_recvfrom(rqstp, iov, nr, buflen);

	for (i = 0; i < nr; i++) {
		if (iov[i].iov_len > base)
			break;
		base -= iov[i].iov_len;
	}
	save_iovlen = iov[i].iov_len;
	save_iovbase = iov[i].iov_base;
	iov[i].iov_len -= base;
	iov[i].iov_base += base;
	ret = svc_recvfrom(rqstp, &iov[i], nr - i, buflen);
	iov[i].iov_len = save_iovlen;
	iov[i].iov_base = save_iovbase;
	return ret;
}

L
Linus Torvalds 已提交
417 418 419
/*
 * Set socket snd and rcv buffer lengths
 */
420 421
static void svc_sock_setbufsize(struct socket *sock, unsigned int snd,
				unsigned int rcv)
L
Linus Torvalds 已提交
422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438
{
#if 0
	mm_segment_t	oldfs;
	oldfs = get_fs(); set_fs(KERNEL_DS);
	sock_setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
			(char*)&snd, sizeof(snd));
	sock_setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
			(char*)&rcv, sizeof(rcv));
#else
	/* sock_setsockopt limits use to sysctl_?mem_max,
	 * which isn't acceptable.  Until that is made conditional
	 * on not having CAP_SYS_RESOURCE or similar, we go direct...
	 * DaveM said I could!
	 */
	lock_sock(sock->sk);
	sock->sk->sk_sndbuf = snd * 2;
	sock->sk->sk_rcvbuf = rcv * 2;
439
	sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK|SOCK_RCVBUF_LOCK;
440
	sock->sk->sk_write_space(sock->sk);
L
Linus Torvalds 已提交
441 442 443 444 445 446
	release_sock(sock->sk);
#endif
}
/*
 * INET callback when data has been received on the socket.
 */
447
static void svc_udp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
448
{
449
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
450
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
451

452 453
	if (svsk) {
		dprintk("svc: socket %p(inet %p), count=%d, busy=%d\n",
454 455 456
			svsk, sk, count,
			test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
457
		svc_xprt_enqueue(&svsk->sk_xprt);
458
	}
459 460
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
461 462 463 464 465
}

/*
 * INET callback when space is newly available on the socket.
 */
466
static void svc_write_space(struct sock *sk)
L
Linus Torvalds 已提交
467 468
{
	struct svc_sock	*svsk = (struct svc_sock *)(sk->sk_user_data);
469
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
470 471 472

	if (svsk) {
		dprintk("svc: socket %p(inet %p), write_space busy=%d\n",
473
			svsk, sk, test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
474
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
475 476
	}

477
	if (wq && waitqueue_active(wq)) {
478
		dprintk("RPC svc_write_space: someone sleeping on %p\n",
L
Linus Torvalds 已提交
479
		       svsk);
480
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
481 482 483
	}
}

484 485 486 487 488 489 490 491 492
static void svc_tcp_write_space(struct sock *sk)
{
	struct socket *sock = sk->sk_socket;

	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk) && sock)
		clear_bit(SOCK_NOSPACE, &sock->flags);
	svc_write_space(sk);
}

493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518
/*
 * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
 */
static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IP_PKTINFO)
		return 0;
	rqstp->rq_daddr.addr.s_addr = pki->ipi_spec_dst.s_addr;
	return 1;
}

/*
 * See net/ipv6/datagram.c : datagram_recv_ctl
 */
static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in6_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IPV6_PKTINFO)
		return 0;
	ipv6_addr_copy(&rqstp->rq_daddr.addr6, &pki->ipi6_addr);
	return 1;
}

519 520 521 522 523 524 525
/*
 * Copy the UDP datagram's destination address to the rqstp structure.
 * The 'destination' address in this case is the address to which the
 * peer sent the datagram, i.e. our local address. For multihomed
 * hosts, this can change from msg to msg. Note that only the IP
 * address changes, the port number should remain the same.
 */
526 527
static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
				    struct cmsghdr *cmh)
528
{
529 530 531 532 533
	switch (cmh->cmsg_level) {
	case SOL_IP:
		return svc_udp_get_dest_address4(rqstp, cmh);
	case SOL_IPV6:
		return svc_udp_get_dest_address6(rqstp, cmh);
534
	}
535 536

	return 0;
537 538
}

L
Linus Torvalds 已提交
539 540 541
/*
 * Receive a datagram from a UDP socket.
 */
542
static int svc_udp_recvfrom(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
543
{
544 545
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
546
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
547
	struct sk_buff	*skb;
548 549 550 551 552
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
553 554 555 556 557 558
	struct msghdr msg = {
		.msg_name = svc_addr(rqstp),
		.msg_control = cmh,
		.msg_controllen = sizeof(buffer),
		.msg_flags = MSG_DONTWAIT,
	};
559 560
	size_t len;
	int err;
L
Linus Torvalds 已提交
561

562
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
L
Linus Torvalds 已提交
563 564 565
	    /* udp sockets need large rcvbuf as all pending
	     * requests are still in that buffer.  sndbuf must
	     * also be large enough that there is enough space
566 567 568 569
	     * for one reply per thread.  We count all threads
	     * rather than threads in a particular pool, which
	     * provides an upper bound on the number of threads
	     * which will access the socket.
L
Linus Torvalds 已提交
570 571
	     */
	    svc_sock_setbufsize(svsk->sk_sock,
572 573
				(serv->sv_nrthreads+3) * serv->sv_max_mesg,
				(serv->sv_nrthreads+3) * serv->sv_max_mesg);
L
Linus Torvalds 已提交
574

575
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
576 577 578 579 580 581 582 583 584 585
	skb = NULL;
	err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
			     0, 0, MSG_PEEK | MSG_DONTWAIT);
	if (err >= 0)
		skb = skb_recv_datagram(svsk->sk_sk, 0, 1, &err);

	if (skb == NULL) {
		if (err != -EAGAIN) {
			/* possibly an icmp error */
			dprintk("svc: recvfrom returned error %d\n", -err);
586
			set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
587
		}
588
		return -EAGAIN;
L
Linus Torvalds 已提交
589
	}
590
	len = svc_addr_len(svc_addr(rqstp));
591 592
	if (len == 0)
		return -EAFNOSUPPORT;
593
	rqstp->rq_addrlen = len;
594 595
	if (skb->tstamp.tv64 == 0) {
		skb->tstamp = ktime_get_real();
596
		/* Don't enable netstamp, sunrpc doesn't
L
Linus Torvalds 已提交
597 598
		   need that much accuracy */
	}
599
	svsk->sk_sk->sk_stamp = skb->tstamp;
600
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
L
Linus Torvalds 已提交
601 602 603 604

	len  = skb->len - sizeof(struct udphdr);
	rqstp->rq_arg.len = len;

605
	rqstp->rq_prot = IPPROTO_UDP;
606

607
	if (!svc_udp_get_dest_address(rqstp, cmh)) {
608
		if (net_ratelimit())
609 610 611 612
			printk(KERN_WARNING
				"svc: received unknown control message %d/%d; "
				"dropping RPC reply datagram\n",
					cmh->cmsg_level, cmh->cmsg_type);
613
		skb_free_datagram_locked(svsk->sk_sk, skb);
614 615
		return 0;
	}
L
Linus Torvalds 已提交
616 617 618 619 620 621 622

	if (skb_is_nonlinear(skb)) {
		/* we have to copy */
		local_bh_disable();
		if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb)) {
			local_bh_enable();
			/* checksum error */
623
			skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
624 625 626
			return 0;
		}
		local_bh_enable();
627
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
628 629
	} else {
		/* we can use it in-place */
630 631
		rqstp->rq_arg.head[0].iov_base = skb->data +
			sizeof(struct udphdr);
L
Linus Torvalds 已提交
632
		rqstp->rq_arg.head[0].iov_len = len;
633
		if (skb_checksum_complete(skb)) {
634
			skb_free_datagram_locked(svsk->sk_sk, skb);
635
			return 0;
L
Linus Torvalds 已提交
636
		}
637
		rqstp->rq_xprt_ctxt = skb;
L
Linus Torvalds 已提交
638 639 640 641 642 643
	}

	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
644
		rqstp->rq_respages = rqstp->rq_pages+1;
L
Linus Torvalds 已提交
645 646
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
647
		rqstp->rq_respages = rqstp->rq_pages + 1 +
648
			DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
L
Linus Torvalds 已提交
649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669
	}

	if (serv->sv_stats)
		serv->sv_stats->netudpcnt++;

	return len;
}

static int
svc_udp_sendto(struct svc_rqst *rqstp)
{
	int		error;

	error = svc_sendto(rqstp, &rqstp->rq_res);
	if (error == -ECONNREFUSED)
		/* ICMP error on earlier request. */
		error = svc_sendto(rqstp, &rqstp->rq_res);

	return error;
}

T
Tom Tucker 已提交
670 671 672 673
static void svc_udp_prep_reply_hdr(struct svc_rqst *rqstp)
{
}

674 675 676
static int svc_udp_has_wspace(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
677
	struct svc_serv	*serv = xprt->xpt_server;
678 679 680 681 682 683 684
	unsigned long required;

	/*
	 * Set the SOCK_NOSPACE flag before checking the available
	 * sock space.
	 */
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
T
Tom Tucker 已提交
685
	required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
686 687 688 689 690 691
	if (required*2 > sock_wspace(svsk->sk_sk))
		return 0;
	clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
	return 1;
}

692 693 694 695 696 697
static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
{
	BUG();
	return NULL;
}

698
static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
699
				       struct net *net,
700 701 702
				       struct sockaddr *sa, int salen,
				       int flags)
{
703
	return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
704 705
}

706
static struct svc_xprt_ops svc_udp_ops = {
707
	.xpo_create = svc_udp_create,
708 709
	.xpo_recvfrom = svc_udp_recvfrom,
	.xpo_sendto = svc_udp_sendto,
710
	.xpo_release_rqst = svc_release_skb,
711 712
	.xpo_detach = svc_sock_detach,
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
713
	.xpo_prep_reply_hdr = svc_udp_prep_reply_hdr,
714
	.xpo_has_wspace = svc_udp_has_wspace,
715
	.xpo_accept = svc_udp_accept,
716 717 718 719
};

static struct svc_xprt_class svc_udp_class = {
	.xcl_name = "udp",
720
	.xcl_owner = THIS_MODULE,
721
	.xcl_ops = &svc_udp_ops,
722
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
723 724
};

725
static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
726
{
727
	int err, level, optname, one = 1;
728

729
	svc_xprt_init(&svc_udp_class, &svsk->sk_xprt, serv);
730
	clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
731 732 733 734
	svsk->sk_sk->sk_data_ready = svc_udp_data_ready;
	svsk->sk_sk->sk_write_space = svc_write_space;

	/* initialise setting must have enough space to
735
	 * receive and respond to one request.
L
Linus Torvalds 已提交
736 737 738
	 * svc_udp_recvfrom will re-adjust if necessary
	 */
	svc_sock_setbufsize(svsk->sk_sock,
739 740
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);
L
Linus Torvalds 已提交
741

742 743
	/* data might have come in before data_ready set up */
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
744
	set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
745 746

	/* make sure we get destination address info */
747 748 749 750 751 752 753 754 755 756 757 758 759 760 761
	switch (svsk->sk_sk->sk_family) {
	case AF_INET:
		level = SOL_IP;
		optname = IP_PKTINFO;
		break;
	case AF_INET6:
		level = SOL_IPV6;
		optname = IPV6_RECVPKTINFO;
		break;
	default:
		BUG();
	}
	err = kernel_setsockopt(svsk->sk_sock, level, optname,
					(char *)&one, sizeof(one));
	dprintk("svc: kernel_setsockopt returned %d\n", err);
L
Linus Torvalds 已提交
762 763 764 765 766 767
}

/*
 * A data_ready event on a listening socket means there's a connection
 * pending. Do not use state_change as a substitute for it.
 */
768
static void svc_tcp_listen_data_ready(struct sock *sk, int count_unused)
L
Linus Torvalds 已提交
769
{
770
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
771
	wait_queue_head_t *wq;
L
Linus Torvalds 已提交
772 773

	dprintk("svc: socket %p TCP (listen) state change %d\n",
774
		sk, sk->sk_state);
L
Linus Torvalds 已提交
775

776 777 778 779 780 781 782 783 784 785 786 787
	/*
	 * This callback may called twice when a new connection
	 * is established as a child socket inherits everything
	 * from a parent LISTEN socket.
	 * 1) data_ready method of the parent socket will be called
	 *    when one of child sockets become ESTABLISHED.
	 * 2) data_ready method of the child socket may be called
	 *    when it receives data before the socket is accepted.
	 * In case of 2, we should ignore it silently.
	 */
	if (sk->sk_state == TCP_LISTEN) {
		if (svsk) {
788
			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
789
			svc_xprt_enqueue(&svsk->sk_xprt);
790 791
		} else
			printk("svc: socket %p: no user data\n", sk);
L
Linus Torvalds 已提交
792
	}
793

794 795 796
	wq = sk_sleep(sk);
	if (wq && waitqueue_active(wq))
		wake_up_interruptible_all(wq);
L
Linus Torvalds 已提交
797 798 799 800 801
}

/*
 * A state change on a connected socket means it's dying or dead.
 */
802
static void svc_tcp_state_change(struct sock *sk)
L
Linus Torvalds 已提交
803
{
804
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
805
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
806 807

	dprintk("svc: socket %p TCP (connected) state change %d (svsk %p)\n",
808
		sk, sk->sk_state, sk->sk_user_data);
L
Linus Torvalds 已提交
809

810
	if (!svsk)
L
Linus Torvalds 已提交
811
		printk("svc: socket %p: no user data\n", sk);
812
	else {
813
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
814
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
815
	}
816 817
	if (wq && waitqueue_active(wq))
		wake_up_interruptible_all(wq);
L
Linus Torvalds 已提交
818 819
}

820
static void svc_tcp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
821
{
822
	struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
823
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
824 825

	dprintk("svc: socket %p TCP data ready (svsk %p)\n",
826 827
		sk, sk->sk_user_data);
	if (svsk) {
828
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
829
		svc_xprt_enqueue(&svsk->sk_xprt);
830
	}
831 832
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
833 834 835 836 837
}

/*
 * Accept a TCP connection
 */
838
static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
L
Linus Torvalds 已提交
839
{
840
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
841 842
	struct sockaddr_storage addr;
	struct sockaddr	*sin = (struct sockaddr *) &addr;
843
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
844 845 846 847
	struct socket	*sock = svsk->sk_sock;
	struct socket	*newsock;
	struct svc_sock	*newsvsk;
	int		err, slen;
848
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
849 850 851

	dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
	if (!sock)
852
		return NULL;
L
Linus Torvalds 已提交
853

854
	clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
855 856
	err = kernel_accept(sock, &newsock, O_NONBLOCK);
	if (err < 0) {
L
Linus Torvalds 已提交
857 858 859
		if (err == -ENOMEM)
			printk(KERN_WARNING "%s: no more sockets!\n",
			       serv->sv_name);
860
		else if (err != -EAGAIN && net_ratelimit())
L
Linus Torvalds 已提交
861 862
			printk(KERN_WARNING "%s: accept failed (err %d)!\n",
				   serv->sv_name, -err);
863
		return NULL;
L
Linus Torvalds 已提交
864
	}
865
	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
866

867
	err = kernel_getpeername(newsock, sin, &slen);
L
Linus Torvalds 已提交
868 869 870 871 872 873 874 875
	if (err < 0) {
		if (net_ratelimit())
			printk(KERN_WARNING "%s: peername failed (err %d)!\n",
				   serv->sv_name, -err);
		goto failed;		/* aborted connection or whatever */
	}

	/* Ideally, we would want to reject connections from unauthorized
876 877
	 * hosts here, but when we get encryption, the IP of the host won't
	 * tell us anything.  For now just warn about unpriv connections.
L
Linus Torvalds 已提交
878
	 */
879
	if (!svc_port_is_privileged(sin)) {
L
Linus Torvalds 已提交
880
		dprintk(KERN_WARNING
881
			"%s: connect from unprivileged port: %s\n",
882
			serv->sv_name,
883
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
884
	}
885
	dprintk("%s: connect from %s\n", serv->sv_name,
886
		__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
887 888 889 890 891 892

	/* make sure that a write doesn't block forever when
	 * low on memory
	 */
	newsock->sk->sk_sndtimeo = HZ*30;

893 894
	if (!(newsvsk = svc_setup_socket(serv, newsock, &err,
				 (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY))))
L
Linus Torvalds 已提交
895
		goto failed;
896
	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
897 898 899 900 901
	err = kernel_getsockname(newsock, sin, &slen);
	if (unlikely(err < 0)) {
		dprintk("svc_tcp_accept: kernel_getsockname error %d\n", -err);
		slen = offsetof(struct sockaddr, sa_data);
	}
902
	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
903

904 905 906 907 908 909 910 911 912 913
	if (serv->sv_stats)
		serv->sv_stats->nettcpconn++;

	return &newsvsk->sk_xprt;

failed:
	sock_release(newsock);
	return NULL;
}

914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963
static unsigned int svc_tcp_restore_pages(struct svc_sock *svsk, struct svc_rqst *rqstp)
{
	unsigned int i, len, npages;

	if (svsk->sk_tcplen <= sizeof(rpc_fraghdr))
		return 0;
	len = svsk->sk_tcplen - sizeof(rpc_fraghdr);
	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
	for (i = 0; i < npages; i++) {
		if (rqstp->rq_pages[i] != NULL)
			put_page(rqstp->rq_pages[i]);
		BUG_ON(svsk->sk_pages[i] == NULL);
		rqstp->rq_pages[i] = svsk->sk_pages[i];
		svsk->sk_pages[i] = NULL;
	}
	rqstp->rq_arg.head[0].iov_base = page_address(rqstp->rq_pages[0]);
	return len;
}

static void svc_tcp_save_pages(struct svc_sock *svsk, struct svc_rqst *rqstp)
{
	unsigned int i, len, npages;

	if (svsk->sk_tcplen <= sizeof(rpc_fraghdr))
		return;
	len = svsk->sk_tcplen - sizeof(rpc_fraghdr);
	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
	for (i = 0; i < npages; i++) {
		svsk->sk_pages[i] = rqstp->rq_pages[i];
		rqstp->rq_pages[i] = NULL;
	}
}

static void svc_tcp_clear_pages(struct svc_sock *svsk)
{
	unsigned int i, len, npages;

	if (svsk->sk_tcplen <= sizeof(rpc_fraghdr))
		goto out;
	len = svsk->sk_tcplen - sizeof(rpc_fraghdr);
	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
	for (i = 0; i < npages; i++) {
		BUG_ON(svsk->sk_pages[i] == NULL);
		put_page(svsk->sk_pages[i]);
		svsk->sk_pages[i] = NULL;
	}
out:
	svsk->sk_tcplen = 0;
}

L
Linus Torvalds 已提交
964
/*
965 966 967 968
 * Receive data.
 * If we haven't gotten the record length yet, get the next four bytes.
 * Otherwise try to gobble up as much as possible up to the complete
 * record length.
L
Linus Torvalds 已提交
969
 */
970
static int svc_tcp_recv_record(struct svc_sock *svsk, struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
971
{
972
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
973
	unsigned int want;
974
	int len;
L
Linus Torvalds 已提交
975

976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
		/* sndbuf needs to have room for one request
		 * per thread, otherwise we can stall even when the
		 * network isn't a bottleneck.
		 *
		 * We count all threads rather than threads in a
		 * particular pool, which provides an upper bound
		 * on the number of threads which will access the socket.
		 *
		 * rcvbuf just needs to be able to hold a few requests.
		 * Normally they will be removed from the queue
		 * as soon a a complete request arrives.
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    (serv->sv_nrthreads+3) * serv->sv_max_mesg,
				    3 * serv->sv_max_mesg);

993
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
994

995
	if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
L
Linus Torvalds 已提交
996 997
		struct kvec	iov;

998
		want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
L
Linus Torvalds 已提交
999 1000 1001 1002 1003 1004 1005
		iov.iov_base = ((char *) &svsk->sk_reclen) + svsk->sk_tcplen;
		iov.iov_len  = want;
		if ((len = svc_recvfrom(rqstp, &iov, 1, want)) < 0)
			goto error;
		svsk->sk_tcplen += len;

		if (len < want) {
1006 1007
			dprintk("svc: short recvfrom while reading record "
				"length (%d of %d)\n", len, want);
1008
			return -EAGAIN;
L
Linus Torvalds 已提交
1009 1010 1011
		}

		svsk->sk_reclen = ntohl(svsk->sk_reclen);
1012
		if (!(svsk->sk_reclen & RPC_LAST_STREAM_FRAGMENT)) {
L
Linus Torvalds 已提交
1013 1014 1015 1016 1017
			/* FIXME: technically, a record can be fragmented,
			 *  and non-terminal fragments will not have the top
			 *  bit set in the fragment length header.
			 *  But apparently no known nfs clients send fragmented
			 *  records. */
1018
			if (net_ratelimit())
1019 1020
				printk(KERN_NOTICE "RPC: multiple fragments "
					"per record not supported\n");
L
Linus Torvalds 已提交
1021 1022
			goto err_delete;
		}
1023

1024
		svsk->sk_reclen &= RPC_FRAGMENT_SIZE_MASK;
L
Linus Torvalds 已提交
1025
		dprintk("svc: TCP record, %d bytes\n", svsk->sk_reclen);
1026
		if (svsk->sk_reclen > serv->sv_max_mesg) {
1027
			if (net_ratelimit())
1028 1029 1030
				printk(KERN_NOTICE "RPC: "
					"fragment too large: 0x%08lx\n",
					(unsigned long)svsk->sk_reclen);
L
Linus Torvalds 已提交
1031 1032 1033 1034
			goto err_delete;
		}
	}

1035 1036 1037
	if (svsk->sk_reclen < 8)
		goto err_delete; /* client is nuts. */

L
Linus Torvalds 已提交
1038 1039
	len = svsk->sk_reclen;

1040
	return len;
1041 1042
error:
	dprintk("RPC: TCP recv_record got %d\n", len);
1043
	return len;
1044
err_delete:
1045 1046 1047 1048
	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
	return -EAGAIN;
}

1049
static int receive_cb_reply(struct svc_sock *svsk, struct svc_rqst *rqstp)
1050
{
1051
	struct rpc_xprt *bc_xprt = svsk->sk_xprt.xpt_bc_xprt;
1052
	struct rpc_rqst *req = NULL;
1053 1054
	struct kvec *src, *dst;
	__be32 *p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
1055 1056
	__be32 xid;
	__be32 calldir;
1057 1058 1059 1060

	xid = *p++;
	calldir = *p;

1061 1062
	if (bc_xprt)
		req = xprt_lookup_rqst(bc_xprt, xid);
1063

1064 1065 1066 1067 1068 1069 1070
	if (!req) {
		printk(KERN_NOTICE
			"%s: Got unrecognized reply: "
			"calldir 0x%x xpt_bc_xprt %p xid %08x\n",
			__func__, ntohl(calldir),
			bc_xprt, xid);
		return -EAGAIN;
1071
	}
1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100

	memcpy(&req->rq_private_buf, &req->rq_rcv_buf, sizeof(struct xdr_buf));
	/*
	 * XXX!: cheating for now!  Only copying HEAD.
	 * But we know this is good enough for now (in fact, for any
	 * callback reply in the forseeable future).
	 */
	dst = &req->rq_private_buf.head[0];
	src = &rqstp->rq_arg.head[0];
	if (dst->iov_len < src->iov_len)
		return -EAGAIN; /* whatever; just giving up. */
	memcpy(dst->iov_base, src->iov_base, src->iov_len);
	xprt_complete_rqst(req->rq_task, svsk->sk_reclen);
	rqstp->rq_arg.len = 0;
	return 0;
}

static int copy_pages_to_kvecs(struct kvec *vec, struct page **pages, int len)
{
	int i = 0;
	int t = 0;

	while (t < len) {
		vec[i].iov_base = page_address(pages[i]);
		vec[i].iov_len = PAGE_SIZE;
		i++;
		t += PAGE_SIZE;
	}
	return i;
1101 1102
}

1103

1104 1105 1106 1107 1108 1109 1110 1111 1112 1113
/*
 * Receive data from a TCP socket.
 */
static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
	int		len;
	struct kvec *vec;
1114
	unsigned int want, base;
1115 1116
	__be32 *p;
	__be32 calldir;
1117
	int pnum;
1118 1119 1120 1121 1122 1123 1124 1125 1126 1127

	dprintk("svc: tcp_recv %p data %d conn %d close %d\n",
		svsk, test_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags));

	len = svc_tcp_recv_record(svsk, rqstp);
	if (len < 0)
		goto error;

1128 1129 1130
	base = svc_tcp_restore_pages(svsk, rqstp);
	want = svsk->sk_reclen - base;

1131
	vec = rqstp->rq_vec;
1132

1133 1134 1135
	pnum = copy_pages_to_kvecs(&vec[0], &rqstp->rq_pages[0],
						svsk->sk_reclen);

1136
	rqstp->rq_respages = &rqstp->rq_pages[pnum];
L
Linus Torvalds 已提交
1137 1138

	/* Now receive data */
1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149
	len = svc_partial_recvfrom(rqstp, vec, pnum, want, base);
	if (len >= 0)
		svsk->sk_tcplen += len;
	if (len != want) {
		if (len < 0 && len != -EAGAIN)
			goto err_other;
		svc_tcp_save_pages(svsk, rqstp);
		dprintk("svc: incomplete TCP record (%d of %d)\n",
			svsk->sk_tcplen, svsk->sk_reclen);
		goto err_noclose;
	}
L
Linus Torvalds 已提交
1150

1151
	rqstp->rq_arg.len = svsk->sk_reclen;
L
Linus Torvalds 已提交
1152
	rqstp->rq_arg.page_base = 0;
1153 1154
	if (rqstp->rq_arg.len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = rqstp->rq_arg.len;
L
Linus Torvalds 已提交
1155
		rqstp->rq_arg.page_len = 0;
1156 1157
	} else
		rqstp->rq_arg.page_len = rqstp->rq_arg.len - rqstp->rq_arg.head[0].iov_len;
L
Linus Torvalds 已提交
1158

1159
	rqstp->rq_xprt_ctxt   = NULL;
L
Linus Torvalds 已提交
1160 1161
	rqstp->rq_prot	      = IPPROTO_TCP;

1162 1163 1164 1165 1166
	p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
	calldir = p[1];
	if (calldir) {
		len = receive_cb_reply(svsk, rqstp);
		if (len < 0)
1167
			goto error;
1168 1169
	}

L
Linus Torvalds 已提交
1170 1171 1172
	/* Reset TCP read info */
	svsk->sk_reclen = 0;
	svsk->sk_tcplen = 0;
1173 1174 1175 1176
	/* If we have more data, signal svc_xprt_enqueue() to try again */
	if (svc_recv_available(svsk) > sizeof(rpc_fraghdr))
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);

L
Linus Torvalds 已提交
1177

1178
	svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
L
Linus Torvalds 已提交
1179 1180 1181
	if (serv->sv_stats)
		serv->sv_stats->nettcpcnt++;

1182
	dprintk("svc: TCP complete record (%d bytes)\n", rqstp->rq_arg.len);
1183
	return rqstp->rq_arg.len;
L
Linus Torvalds 已提交
1184

1185
error:
1186 1187 1188
	if (len != -EAGAIN)
		goto err_other;
	dprintk("RPC: TCP recvfrom got EAGAIN\n");
1189
	return -EAGAIN;
1190 1191 1192 1193 1194 1195
err_other:
	printk(KERN_NOTICE "%s: recvfrom returned errno %d\n",
	       svsk->sk_xprt.xpt_server->sv_name, -len);
	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
err_noclose:
	return -EAGAIN;	/* record not complete */
L
Linus Torvalds 已提交
1196 1197 1198 1199 1200
}

/*
 * Send out data on TCP socket.
 */
1201
static int svc_tcp_sendto(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
1202 1203 1204
{
	struct xdr_buf	*xbufp = &rqstp->rq_res;
	int sent;
1205
	__be32 reclen;
L
Linus Torvalds 已提交
1206 1207 1208 1209 1210 1211 1212 1213 1214 1215

	/* Set up the first element of the reply kvec.
	 * Any other kvecs that may be in use have been taken
	 * care of by the server implementation itself.
	 */
	reclen = htonl(0x80000000|((xbufp->len ) - 4));
	memcpy(xbufp->head[0].iov_base, &reclen, 4);

	sent = svc_sendto(rqstp, &rqstp->rq_res);
	if (sent != xbufp->len) {
1216 1217 1218
		printk(KERN_NOTICE
		       "rpc-srv/tcp: %s: %s %d when sending %d bytes "
		       "- shutting down socket\n",
1219
		       rqstp->rq_xprt->xpt_server->sv_name,
L
Linus Torvalds 已提交
1220 1221
		       (sent<0)?"got error":"sent only",
		       sent, xbufp->len);
1222
		set_bit(XPT_CLOSE, &rqstp->rq_xprt->xpt_flags);
1223
		svc_xprt_enqueue(rqstp->rq_xprt);
L
Linus Torvalds 已提交
1224 1225 1226 1227 1228
		sent = -EAGAIN;
	}
	return sent;
}

T
Tom Tucker 已提交
1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239
/*
 * Setup response header. TCP has a 4B record length field.
 */
static void svc_tcp_prep_reply_hdr(struct svc_rqst *rqstp)
{
	struct kvec *resv = &rqstp->rq_res.head[0];

	/* tcp needs a space for the record length... */
	svc_putnl(resv, 0);
}

1240 1241
static int svc_tcp_has_wspace(struct svc_xprt *xprt)
{
1242
	struct svc_sock *svsk =	container_of(xprt, struct svc_sock, sk_xprt);
1243
	struct svc_serv *serv = svsk->sk_xprt.xpt_server;
1244 1245
	int required;

1246 1247 1248 1249 1250
	if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
		return 1;
	required = atomic_read(&xprt->xpt_reserved) + serv->sv_max_mesg;
	if (sk_stream_wspace(svsk->sk_sk) >= required)
		return 1;
1251
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
1252
	return 0;
1253 1254
}

1255
static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
1256
				       struct net *net,
1257 1258 1259
				       struct sockaddr *sa, int salen,
				       int flags)
{
1260
	return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
1261 1262
}

1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);

static struct svc_xprt *svc_bc_tcp_create(struct svc_serv *serv,
				       struct net *net,
				       struct sockaddr *sa, int salen,
				       int flags)
{
	return svc_bc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
}

static void svc_bc_tcp_sock_detach(struct svc_xprt *xprt)
{
}

static struct svc_xprt_ops svc_tcp_bc_ops = {
	.xpo_create = svc_bc_tcp_create,
	.xpo_detach = svc_bc_tcp_sock_detach,
	.xpo_free = svc_bc_sock_free,
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
};

static struct svc_xprt_class svc_tcp_bc_class = {
	.xcl_name = "tcp-bc",
	.xcl_owner = THIS_MODULE,
	.xcl_ops = &svc_tcp_bc_ops,
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
};
1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311

static void svc_init_bc_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_bc_class);
}

static void svc_cleanup_bc_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_bc_class);
}
#else /* CONFIG_NFS_V4_1 */
static void svc_init_bc_xprt_sock(void)
{
}

static void svc_cleanup_bc_xprt_sock(void)
{
}
1312 1313
#endif /* CONFIG_NFS_V4_1 */

1314
static struct svc_xprt_ops svc_tcp_ops = {
1315
	.xpo_create = svc_tcp_create,
1316 1317
	.xpo_recvfrom = svc_tcp_recvfrom,
	.xpo_sendto = svc_tcp_sendto,
1318
	.xpo_release_rqst = svc_release_skb,
1319
	.xpo_detach = svc_tcp_sock_detach,
1320
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
1321
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
1322
	.xpo_has_wspace = svc_tcp_has_wspace,
1323
	.xpo_accept = svc_tcp_accept,
1324 1325 1326 1327
};

static struct svc_xprt_class svc_tcp_class = {
	.xcl_name = "tcp",
1328
	.xcl_owner = THIS_MODULE,
1329
	.xcl_ops = &svc_tcp_ops,
1330
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
1331 1332 1333 1334 1335 1336
};

void svc_init_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_class);
	svc_reg_xprt_class(&svc_udp_class);
1337
	svc_init_bc_xprt_sock();
1338 1339 1340 1341 1342 1343
}

void svc_cleanup_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_class);
	svc_unreg_xprt_class(&svc_udp_class);
1344
	svc_cleanup_bc_xprt_sock();
1345 1346
}

1347
static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
1348 1349 1350
{
	struct sock	*sk = svsk->sk_sk;

1351
	svc_xprt_init(&svc_tcp_class, &svsk->sk_xprt, serv);
1352
	set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1353 1354
	if (sk->sk_state == TCP_LISTEN) {
		dprintk("setting up TCP socket for listening\n");
1355
		set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1356
		sk->sk_data_ready = svc_tcp_listen_data_ready;
1357
		set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1358 1359 1360 1361
	} else {
		dprintk("setting up TCP socket for reading\n");
		sk->sk_state_change = svc_tcp_state_change;
		sk->sk_data_ready = svc_tcp_data_ready;
1362
		sk->sk_write_space = svc_tcp_write_space;
L
Linus Torvalds 已提交
1363 1364 1365

		svsk->sk_reclen = 0;
		svsk->sk_tcplen = 0;
1366
		memset(&svsk->sk_pages[0], 0, sizeof(svsk->sk_pages));
L
Linus Torvalds 已提交
1367

1368
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
L
Linus Torvalds 已提交
1369

1370 1371 1372 1373 1374 1375 1376 1377 1378
		/* initialise setting must have enough space to
		 * receive and respond to one request.
		 * svc_tcp_recvfrom will re-adjust if necessary
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);

		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1379
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
1380
		if (sk->sk_state != TCP_ESTABLISHED)
1381
			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1382 1383 1384
	}
}

1385
void svc_sock_update_bufs(struct svc_serv *serv)
L
Linus Torvalds 已提交
1386 1387 1388 1389 1390
{
	/*
	 * The number of server threads has changed. Update
	 * rcvbuf and sndbuf accordingly on all sockets
	 */
1391
	struct svc_sock *svsk;
L
Linus Torvalds 已提交
1392 1393

	spin_lock_bh(&serv->sv_lock);
1394
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
1395
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1396
	list_for_each_entry(svsk, &serv->sv_tempsocks, sk_xprt.xpt_list)
1397
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1398 1399
	spin_unlock_bh(&serv->sv_lock);
}
1400
EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
L
Linus Torvalds 已提交
1401 1402 1403 1404 1405

/*
 * Initialize socket for RPC use and create svc_sock struct
 * XXX: May want to setsockopt SO_SNDBUF and SO_RCVBUF.
 */
1406 1407 1408
static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
						struct socket *sock,
						int *errp, int flags)
L
Linus Torvalds 已提交
1409 1410 1411
{
	struct svc_sock	*svsk;
	struct sock	*inet;
1412
	int		pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
L
Linus Torvalds 已提交
1413 1414

	dprintk("svc: svc_setup_socket %p\n", sock);
1415
	if (!(svsk = kzalloc(sizeof(*svsk), GFP_KERNEL))) {
L
Linus Torvalds 已提交
1416 1417 1418 1419 1420 1421 1422 1423
		*errp = -ENOMEM;
		return NULL;
	}

	inet = sock->sk;

	/* Register socket with portmapper */
	if (*errp >= 0 && pmap_register)
1424
		*errp = svc_register(serv, inet->sk_family, inet->sk_protocol,
E
Eric Dumazet 已提交
1425
				     ntohs(inet_sk(inet)->inet_sport));
L
Linus Torvalds 已提交
1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440

	if (*errp < 0) {
		kfree(svsk);
		return NULL;
	}

	inet->sk_user_data = svsk;
	svsk->sk_sock = sock;
	svsk->sk_sk = inet;
	svsk->sk_ostate = inet->sk_state_change;
	svsk->sk_odata = inet->sk_data_ready;
	svsk->sk_owspace = inet->sk_write_space;

	/* Initialize the socket */
	if (sock->type == SOCK_DGRAM)
1441
		svc_udp_init(svsk, serv);
1442
	else
1443
		svc_tcp_init(svsk, serv);
L
Linus Torvalds 已提交
1444 1445 1446 1447 1448 1449 1450

	dprintk("svc: svc_setup_socket created %p (inet %p)\n",
				svsk, svsk->sk_sk);

	return svsk;
}

1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463
/**
 * svc_addsock - add a listener socket to an RPC service
 * @serv: pointer to RPC service to which to add a new listener
 * @fd: file descriptor of the new listener
 * @name_return: pointer to buffer to fill in with name of listener
 * @len: size of the buffer
 *
 * Fills in socket name and returns positive length of name if successful.
 * Name is terminated with '\n'.  On error, returns a negative errno
 * value.
 */
int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
		const size_t len)
1464 1465 1466 1467 1468 1469 1470
{
	int err = 0;
	struct socket *so = sockfd_lookup(fd, &err);
	struct svc_sock *svsk = NULL;

	if (!so)
		return err;
1471
	if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
1472 1473 1474 1475 1476 1477 1478
		err =  -EAFNOSUPPORT;
	else if (so->sk->sk_protocol != IPPROTO_TCP &&
	    so->sk->sk_protocol != IPPROTO_UDP)
		err =  -EPROTONOSUPPORT;
	else if (so->state > SS_UNCONNECTED)
		err = -EISCONN;
	else {
1479 1480 1481 1482 1483
		if (!try_module_get(THIS_MODULE))
			err = -ENOENT;
		else
			svsk = svc_setup_socket(serv, so, &err,
						SVC_SOCK_DEFAULTS);
1484
		if (svsk) {
1485 1486 1487 1488 1489
			struct sockaddr_storage addr;
			struct sockaddr *sin = (struct sockaddr *)&addr;
			int salen;
			if (kernel_getsockname(svsk->sk_sock, sin, &salen) == 0)
				svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
1490 1491 1492 1493
			clear_bit(XPT_TEMP, &svsk->sk_xprt.xpt_flags);
			spin_lock_bh(&serv->sv_lock);
			list_add(&svsk->sk_xprt.xpt_list, &serv->sv_permsocks);
			spin_unlock_bh(&serv->sv_lock);
1494
			svc_xprt_received(&svsk->sk_xprt);
1495
			err = 0;
1496 1497
		} else
			module_put(THIS_MODULE);
1498 1499 1500 1501 1502
	}
	if (err) {
		sockfd_put(so);
		return err;
	}
1503
	return svc_one_sock_name(svsk, name_return, len);
1504 1505 1506
}
EXPORT_SYMBOL_GPL(svc_addsock);

L
Linus Torvalds 已提交
1507 1508 1509
/*
 * Create socket for RPC service.
 */
1510 1511
static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
					  int protocol,
1512
					  struct net *net,
1513 1514
					  struct sockaddr *sin, int len,
					  int flags)
L
Linus Torvalds 已提交
1515 1516 1517 1518 1519
{
	struct svc_sock	*svsk;
	struct socket	*sock;
	int		error;
	int		type;
1520 1521 1522
	struct sockaddr_storage addr;
	struct sockaddr *newsin = (struct sockaddr *)&addr;
	int		newlen;
1523 1524
	int		family;
	int		val;
1525
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
1526

1527 1528
	dprintk("svc: svc_create_socket(%s, %d, %s)\n",
			serv->sv_program->pg_name, protocol,
1529
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
1530 1531 1532 1533

	if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only UDP and TCP "
				"sockets supported\n");
1534
		return ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
1535
	}
1536

L
Linus Torvalds 已提交
1537
	type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
1538 1539 1540 1541 1542 1543 1544 1545 1546 1547
	switch (sin->sa_family) {
	case AF_INET6:
		family = PF_INET6;
		break;
	case AF_INET:
		family = PF_INET;
		break;
	default:
		return ERR_PTR(-EINVAL);
	}
L
Linus Torvalds 已提交
1548

1549
	error = __sock_create(net, family, type, protocol, &sock, 1);
1550
	if (error < 0)
1551
		return ERR_PTR(error);
L
Linus Torvalds 已提交
1552

1553 1554
	svc_reclassify_socket(sock);

1555 1556 1557 1558 1559 1560 1561 1562 1563 1564
	/*
	 * If this is an PF_INET6 listener, we want to avoid
	 * getting requests from IPv4 remotes.  Those should
	 * be shunted to a PF_INET listener via rpcbind.
	 */
	val = 1;
	if (family == PF_INET6)
		kernel_setsockopt(sock, SOL_IPV6, IPV6_V6ONLY,
					(char *)&val, sizeof(val));

1565
	if (type == SOCK_STREAM)
1566 1567
		sock->sk->sk_reuse = 1;		/* allow address reuse */
	error = kernel_bind(sock, sin, len);
1568 1569
	if (error < 0)
		goto bummer;
L
Linus Torvalds 已提交
1570

1571 1572 1573 1574 1575
	newlen = len;
	error = kernel_getsockname(sock, newsin, &newlen);
	if (error < 0)
		goto bummer;

L
Linus Torvalds 已提交
1576
	if (protocol == IPPROTO_TCP) {
1577
		if ((error = kernel_listen(sock, 64)) < 0)
L
Linus Torvalds 已提交
1578 1579 1580
			goto bummer;
	}

1581
	if ((svsk = svc_setup_socket(serv, sock, &error, flags)) != NULL) {
1582
		svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
1583
		return (struct svc_xprt *)svsk;
1584
	}
L
Linus Torvalds 已提交
1585 1586 1587 1588

bummer:
	dprintk("svc: svc_create_socket error = %d\n", -error);
	sock_release(sock);
1589
	return ERR_PTR(error);
L
Linus Torvalds 已提交
1590 1591
}

1592 1593 1594 1595 1596 1597 1598 1599
/*
 * Detach the svc_sock from the socket so that no
 * more callbacks occur.
 */
static void svc_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	struct sock *sk = svsk->sk_sk;
1600
	wait_queue_head_t *wq;
1601 1602 1603 1604 1605 1606 1607

	dprintk("svc: svc_sock_detach(%p)\n", svsk);

	/* put back the old socket callbacks */
	sk->sk_state_change = svsk->sk_ostate;
	sk->sk_data_ready = svsk->sk_odata;
	sk->sk_write_space = svsk->sk_owspace;
1608

1609 1610 1611
	wq = sk_sleep(sk);
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624
}

/*
 * Disconnect the socket, and reset the callbacks
 */
static void svc_tcp_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);

	dprintk("svc: svc_tcp_sock_detach(%p)\n", svsk);

	svc_sock_detach(xprt);

1625 1626
	if (!test_bit(XPT_LISTENER, &xprt->xpt_flags)) {
		svc_tcp_clear_pages(svsk);
1627
		kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
1628
	}
1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644
}

/*
 * Free the svc_sock's socket resources and the svc_sock itself.
 */
static void svc_sock_free(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	dprintk("svc: svc_sock_free(%p)\n", svsk);

	if (svsk->sk_sock->file)
		sockfd_put(svsk->sk_sock);
	else
		sock_release(svsk->sk_sock);
	kfree(svsk);
}
1645

1646
#if defined(CONFIG_NFS_V4_1)
1647
/*
1648
 * Create a back channel svc_xprt which shares the fore channel socket.
1649
 */
1650 1651 1652 1653 1654
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *serv,
					     int protocol,
					     struct net *net,
					     struct sockaddr *sin, int len,
					     int flags)
1655 1656
{
	struct svc_sock *svsk;
1657 1658 1659 1660 1661 1662 1663
	struct svc_xprt *xprt;

	if (protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only TCP sockets"
			" supported on shared back channel\n");
		return ERR_PTR(-EINVAL);
	}
1664 1665 1666

	svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
	if (!svsk)
1667
		return ERR_PTR(-ENOMEM);
1668 1669

	xprt = &svsk->sk_xprt;
1670 1671
	svc_xprt_init(&svc_tcp_bc_class, xprt, serv);

1672
	serv->sv_bc_xprt = xprt;
1673

1674 1675 1676 1677
	return xprt;
}

/*
1678
 * Free a back channel svc_sock.
1679
 */
1680
static void svc_bc_sock_free(struct svc_xprt *xprt)
1681
{
1682
	if (xprt)
1683 1684
		kfree(container_of(xprt, struct svc_sock, sk_xprt));
}
1685
#endif /* CONFIG_NFS_V4_1 */