xprtsock.c 61.3 KB
Newer Older
1 2 3 4 5
/*
 * linux/net/sunrpc/xprtsock.c
 *
 * Client-side transport implementation for sockets.
 *
6 7
 * TCP callback races fixes (C) 1998 Red Hat
 * TCP send fixes (C) 1998 Red Hat
8 9 10 11 12 13
 * TCP NFS related read + write fixes
 *  (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
 *
 * Rewrite of larges part of the code in order to stabilize TCP stuff.
 * Fix behaviour when socket buffer is full.
 *  (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
14 15
 *
 * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
16 17 18
 *
 * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
 *   <gilles.quillard@bull.net>
19 20 21 22
 */

#include <linux/types.h>
#include <linux/slab.h>
23
#include <linux/module.h>
24 25 26 27 28 29 30 31 32 33
#include <linux/capability.h>
#include <linux/pagemap.h>
#include <linux/errno.h>
#include <linux/socket.h>
#include <linux/in.h>
#include <linux/net.h>
#include <linux/mm.h>
#include <linux/udp.h>
#include <linux/tcp.h>
#include <linux/sunrpc/clnt.h>
34
#include <linux/sunrpc/sched.h>
35
#include <linux/sunrpc/xprtsock.h>
36
#include <linux/file.h>
R
Ricardo Labiaga 已提交
37 38 39
#ifdef CONFIG_NFS_V4_1
#include <linux/sunrpc/bc_xprt.h>
#endif
40 41 42 43 44 45

#include <net/sock.h>
#include <net/checksum.h>
#include <net/udp.h>
#include <net/tcp.h>

46 47 48 49 50 51 52 53 54
/*
 * xprtsock tunables
 */
unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE;

unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;

55
#define XS_TCP_LINGER_TO	(15U * HZ)
56
static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO;
57

58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124
/*
 * We can register our own files under /proc/sys/sunrpc by
 * calling register_sysctl_table() again.  The files in that
 * directory become the union of all files registered there.
 *
 * We simply need to make sure that we don't collide with
 * someone else's file names!
 */

#ifdef RPC_DEBUG

static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;

static struct ctl_table_header *sunrpc_table_header;

/*
 * FIXME: changing the UDP slot table size should also resize the UDP
 *        socket buffers for existing UDP transports
 */
static ctl_table xs_tunables_table[] = {
	{
		.ctl_name	= CTL_SLOTTABLE_UDP,
		.procname	= "udp_slot_table_entries",
		.data		= &xprt_udp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
	{
		.ctl_name	= CTL_SLOTTABLE_TCP,
		.procname	= "tcp_slot_table_entries",
		.data		= &xprt_tcp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
	{
		.ctl_name	= CTL_MIN_RESVPORT,
		.procname	= "min_resvport",
		.data		= &xprt_min_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &xprt_min_resvport_limit,
		.extra2		= &xprt_max_resvport_limit
	},
	{
		.ctl_name	= CTL_MAX_RESVPORT,
		.procname	= "max_resvport",
		.data		= &xprt_max_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_minmax,
		.strategy	= &sysctl_intvec,
		.extra1		= &xprt_min_resvport_limit,
		.extra2		= &xprt_max_resvport_limit
	},
125 126 127 128 129 130 131 132
	{
		.procname	= "tcp_fin_timeout",
		.data		= &xs_tcp_fin_timeout,
		.maxlen		= sizeof(xs_tcp_fin_timeout),
		.mode		= 0644,
		.proc_handler	= &proc_dointvec_jiffies,
		.strategy	= sysctl_jiffies
	},
133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151
	{
		.ctl_name = 0,
	},
};

static ctl_table sunrpc_table[] = {
	{
		.ctl_name	= CTL_SUNRPC,
		.procname	= "sunrpc",
		.mode		= 0555,
		.child		= xs_tunables_table
	},
	{
		.ctl_name = 0,
	},
};

#endif

152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195
/*
 * Time out for an RPC UDP socket connect.  UDP socket connects are
 * synchronous, but we set a timeout anyway in case of resource
 * exhaustion on the local host.
 */
#define XS_UDP_CONN_TO		(5U * HZ)

/*
 * Wait duration for an RPC TCP connection to be established.  Solaris
 * NFS over TCP uses 60 seconds, for example, which is in line with how
 * long a server takes to reboot.
 */
#define XS_TCP_CONN_TO		(60U * HZ)

/*
 * Wait duration for a reply from the RPC portmapper.
 */
#define XS_BIND_TO		(60U * HZ)

/*
 * Delay if a UDP socket connect error occurs.  This is most likely some
 * kind of resource problem on the local host.
 */
#define XS_UDP_REEST_TO		(2U * HZ)

/*
 * The reestablish timeout allows clients to delay for a bit before attempting
 * to reconnect to a server that just dropped our connection.
 *
 * We implement an exponential backoff when trying to reestablish a TCP
 * transport connection with the server.  Some servers like to drop a TCP
 * connection when they are overworked, so we start with a short timeout and
 * increase over time if the server is down or not responding.
 */
#define XS_TCP_INIT_REEST_TO	(3U * HZ)
#define XS_TCP_MAX_REEST_TO	(5U * 60 * HZ)

/*
 * TCP idle timeout; client drops the transport socket if it is idle
 * for this long.  Note that we also timeout UDP sockets to prevent
 * holding port numbers when there is no RPC traffic.
 */
#define XS_IDLE_DISC_TO		(5U * 60 * HZ)

196 197
#ifdef RPC_DEBUG
# undef  RPC_DEBUG_DATA
198
# define RPCDBG_FACILITY	RPCDBG_TRANS
199 200 201
#endif

#ifdef RPC_DEBUG_DATA
202
static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
203
{
204 205
	u8 *buf = (u8 *) packet;
	int j;
206

207
	dprintk("RPC:       %s\n", msg);
208 209 210 211 212 213 214 215 216 217 218 219
	for (j = 0; j < count && j < 128; j += 4) {
		if (!(j & 31)) {
			if (j)
				dprintk("\n");
			dprintk("0x%04x ", j);
		}
		dprintk("%02x%02x%02x%02x ",
			buf[j], buf[j+1], buf[j+2], buf[j+3]);
	}
	dprintk("\n");
}
#else
220
static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
221 222 223 224 225
{
	/* NOP */
}
#endif

226 227
struct sock_xprt {
	struct rpc_xprt		xprt;
228 229 230 231 232 233

	/*
	 * Network layer
	 */
	struct socket *		sock;
	struct sock *		inet;
234 235 236 237 238 239 240 241 242 243 244 245

	/*
	 * State of TCP reply receive
	 */
	__be32			tcp_fraghdr,
				tcp_xid;

	u32			tcp_offset,
				tcp_reclen;

	unsigned long		tcp_copied,
				tcp_flags;
246 247 248 249

	/*
	 * Connection of transports
	 */
250
	struct delayed_work	connect_worker;
251
	struct sockaddr_storage	addr;
252
	unsigned short		port;
253 254 255 256 257 258

	/*
	 * UDP socket buffer size parameters
	 */
	size_t			rcvsize,
				sndsize;
259 260 261 262 263 264 265

	/*
	 * Saved socket callback addresses
	 */
	void			(*old_data_ready)(struct sock *, int);
	void			(*old_state_change)(struct sock *);
	void			(*old_write_space)(struct sock *);
266
	void			(*old_error_report)(struct sock *);
267 268
};

269 270 271 272 273 274 275
/*
 * TCP receive state flags
 */
#define TCP_RCV_LAST_FRAG	(1UL << 0)
#define TCP_RCV_COPY_FRAGHDR	(1UL << 1)
#define TCP_RCV_COPY_XID	(1UL << 2)
#define TCP_RCV_COPY_DATA	(1UL << 3)
276 277
#define TCP_RCV_READ_CALLDIR	(1UL << 4)
#define TCP_RCV_COPY_CALLDIR	(1UL << 5)
278 279 280 281

/*
 * TCP RPC flags
 */
282
#define TCP_RPC_REPLY		(1UL << 6)
283

284 285 286 287 288 289
static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
{
	return (struct sockaddr *) &xprt->addr;
}

static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
290
{
291 292 293 294 295 296 297 298
	return (struct sockaddr_in *) &xprt->addr;
}

static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
{
	return (struct sockaddr_in6 *) &xprt->addr;
}

299 300 301
static void xs_format_ipv4_peer_addresses(struct rpc_xprt *xprt,
					  const char *protocol,
					  const char *netid)
302
{
303
	struct sockaddr_in *addr = xs_addr_in(xprt);
304 305 306 307
	char *buf;

	buf = kzalloc(20, GFP_KERNEL);
	if (buf) {
308
		snprintf(buf, 20, "%pI4", &addr->sin_addr.s_addr);
309 310 311 312 313 314 315 316 317 318
	}
	xprt->address_strings[RPC_DISPLAY_ADDR] = buf;

	buf = kzalloc(8, GFP_KERNEL);
	if (buf) {
		snprintf(buf, 8, "%u",
				ntohs(addr->sin_port));
	}
	xprt->address_strings[RPC_DISPLAY_PORT] = buf;

319
	xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
320 321 322

	buf = kzalloc(48, GFP_KERNEL);
	if (buf) {
H
Harvey Harrison 已提交
323 324
		snprintf(buf, 48, "addr=%pI4 port=%u proto=%s",
			&addr->sin_addr.s_addr,
325
			ntohs(addr->sin_port),
326
			protocol);
327 328
	}
	xprt->address_strings[RPC_DISPLAY_ALL] = buf;
329 330 331 332 333 334 335 336 337 338 339 340 341 342

	buf = kzalloc(10, GFP_KERNEL);
	if (buf) {
		snprintf(buf, 10, "%02x%02x%02x%02x",
				NIPQUAD(addr->sin_addr.s_addr));
	}
	xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = buf;

	buf = kzalloc(8, GFP_KERNEL);
	if (buf) {
		snprintf(buf, 8, "%4hx",
				ntohs(addr->sin_port));
	}
	xprt->address_strings[RPC_DISPLAY_HEX_PORT] = buf;
343

344
	xprt->address_strings[RPC_DISPLAY_NETID] = netid;
345 346
}

347 348 349
static void xs_format_ipv6_peer_addresses(struct rpc_xprt *xprt,
					  const char *protocol,
					  const char *netid)
350
{
351
	struct sockaddr_in6 *addr = xs_addr_in6(xprt);
352 353 354 355
	char *buf;

	buf = kzalloc(40, GFP_KERNEL);
	if (buf) {
H
Harvey Harrison 已提交
356
		snprintf(buf, 40, "%pI6",&addr->sin6_addr);
357 358 359 360 361 362 363 364 365 366
	}
	xprt->address_strings[RPC_DISPLAY_ADDR] = buf;

	buf = kzalloc(8, GFP_KERNEL);
	if (buf) {
		snprintf(buf, 8, "%u",
				ntohs(addr->sin6_port));
	}
	xprt->address_strings[RPC_DISPLAY_PORT] = buf;

367
	xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
368 369 370

	buf = kzalloc(64, GFP_KERNEL);
	if (buf) {
H
Harvey Harrison 已提交
371
		snprintf(buf, 64, "addr=%pI6 port=%u proto=%s",
372
				&addr->sin6_addr,
373
				ntohs(addr->sin6_port),
374
				protocol);
375 376 377 378
	}
	xprt->address_strings[RPC_DISPLAY_ALL] = buf;

	buf = kzalloc(36, GFP_KERNEL);
379
	if (buf)
380
		snprintf(buf, 36, "%pi6", &addr->sin6_addr);
381

382 383 384 385 386 387 388 389
	xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = buf;

	buf = kzalloc(8, GFP_KERNEL);
	if (buf) {
		snprintf(buf, 8, "%4hx",
				ntohs(addr->sin6_port));
	}
	xprt->address_strings[RPC_DISPLAY_HEX_PORT] = buf;
390

391
	xprt->address_strings[RPC_DISPLAY_NETID] = netid;
392 393 394 395
}

static void xs_free_peer_addresses(struct rpc_xprt *xprt)
{
396 397 398 399 400 401 402 403 404 405
	unsigned int i;

	for (i = 0; i < RPC_DISPLAY_MAX; i++)
		switch (i) {
		case RPC_DISPLAY_PROTO:
		case RPC_DISPLAY_NETID:
			continue;
		default:
			kfree(xprt->address_strings[i]);
		}
406 407
}

408 409
#define XS_SENDMSG_FLAGS	(MSG_DONTWAIT | MSG_NOSIGNAL)

T
Trond Myklebust 已提交
410
static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
411 412 413 414
{
	struct msghdr msg = {
		.msg_name	= addr,
		.msg_namelen	= addrlen,
T
Trond Myklebust 已提交
415 416 417 418 419
		.msg_flags	= XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
	};
	struct kvec iov = {
		.iov_base	= vec->iov_base + base,
		.iov_len	= vec->iov_len - base,
420 421
	};

T
Trond Myklebust 已提交
422
	if (iov.iov_len != 0)
423 424 425 426
		return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
	return kernel_sendmsg(sock, &msg, NULL, 0, 0);
}

T
Trond Myklebust 已提交
427
static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more)
428
{
T
Trond Myklebust 已提交
429 430 431 432 433 434 435 436 437 438 439
	struct page **ppage;
	unsigned int remainder;
	int err, sent = 0;

	remainder = xdr->page_len - base;
	base += xdr->page_base;
	ppage = xdr->pages + (base >> PAGE_SHIFT);
	base &= ~PAGE_MASK;
	for(;;) {
		unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
		int flags = XS_SENDMSG_FLAGS;
440

T
Trond Myklebust 已提交
441 442 443 444 445 446 447 448 449 450 451 452 453 454 455
		remainder -= len;
		if (remainder != 0 || more)
			flags |= MSG_MORE;
		err = sock->ops->sendpage(sock, *ppage, base, len, flags);
		if (remainder == 0 || err != len)
			break;
		sent += err;
		ppage++;
		base = 0;
	}
	if (sent == 0)
		return err;
	if (err > 0)
		sent += err;
	return sent;
456 457
}

458 459 460 461 462 463 464 465
/**
 * xs_sendpages - write pages directly to a socket
 * @sock: socket to send on
 * @addr: UDP only -- address of destination
 * @addrlen: UDP only -- length of destination address
 * @xdr: buffer containing this request
 * @base: starting position in the buffer
 *
466
 */
T
Trond Myklebust 已提交
467
static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
468
{
T
Trond Myklebust 已提交
469 470
	unsigned int remainder = xdr->len - base;
	int err, sent = 0;
471

472
	if (unlikely(!sock))
473
		return -ENOTSOCK;
474 475

	clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
T
Trond Myklebust 已提交
476 477 478 479
	if (base != 0) {
		addr = NULL;
		addrlen = 0;
	}
480

T
Trond Myklebust 已提交
481 482 483 484 485
	if (base < xdr->head[0].iov_len || addr != NULL) {
		unsigned int len = xdr->head[0].iov_len - base;
		remainder -= len;
		err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
		if (remainder == 0 || err != len)
486
			goto out;
T
Trond Myklebust 已提交
487
		sent += err;
488 489
		base = 0;
	} else
T
Trond Myklebust 已提交
490
		base -= xdr->head[0].iov_len;
491

T
Trond Myklebust 已提交
492 493 494 495 496
	if (base < xdr->page_len) {
		unsigned int len = xdr->page_len - base;
		remainder -= len;
		err = xs_send_pagedata(sock, xdr, base, remainder != 0);
		if (remainder == 0 || err != len)
497
			goto out;
T
Trond Myklebust 已提交
498
		sent += err;
499
		base = 0;
T
Trond Myklebust 已提交
500 501 502 503 504 505
	} else
		base -= xdr->page_len;

	if (base >= xdr->tail[0].iov_len)
		return sent;
	err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
506
out:
T
Trond Myklebust 已提交
507 508 509 510 511
	if (sent == 0)
		return err;
	if (err > 0)
		sent += err;
	return sent;
512 513
}

514 515 516 517 518 519 520 521
static void xs_nospace_callback(struct rpc_task *task)
{
	struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt);

	transport->inet->sk_write_pending--;
	clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
}

522
/**
523 524
 * xs_nospace - place task on wait queue if transmit was incomplete
 * @task: task to put to sleep
525
 *
526
 */
527
static int xs_nospace(struct rpc_task *task)
528
{
529 530
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
531
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
532
	int ret = 0;
533

534
	dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
535 536 537
			task->tk_pid, req->rq_slen - req->rq_bytes_sent,
			req->rq_slen);

538 539 540 541 542 543
	/* Protect against races with write_space */
	spin_lock_bh(&xprt->transport_lock);

	/* Don't race with disconnect */
	if (xprt_connected(xprt)) {
		if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) {
544
			ret = -EAGAIN;
545 546 547 548 549 550 551 552 553 554 555
			/*
			 * Notify TCP that we're limited by the application
			 * window size
			 */
			set_bit(SOCK_NOSPACE, &transport->sock->flags);
			transport->inet->sk_write_pending++;
			/* ...and wait for more buffer space */
			xprt_wait_for_buffer_space(task, xs_nospace_callback);
		}
	} else {
		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
556
		ret = -ENOTCONN;
557
	}
558

559
	spin_unlock_bh(&xprt->transport_lock);
560
	return ret;
561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577
}

/**
 * xs_udp_send_request - write an RPC request to a UDP socket
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
 *    other:	Some other error occured, the request was not sent
 */
static int xs_udp_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
578
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
579 580
	struct xdr_buf *xdr = &req->rq_snd_buf;
	int status;
581

582
	xs_pktdump("packet data:",
583 584 585
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);

586 587
	if (!xprt_bound(xprt))
		return -ENOTCONN;
588
	status = xs_sendpages(transport->sock,
589
			      xs_addr(xprt),
590 591
			      xprt->addrlen, xdr,
			      req->rq_bytes_sent);
592

593
	dprintk("RPC:       xs_udp_send_request(%u) = %d\n",
594
			xdr->len - req->rq_bytes_sent, status);
595

596 597 598 599 600
	if (status >= 0) {
		task->tk_bytes_sent += status;
		if (status >= req->rq_slen)
			return 0;
		/* Still some bytes left; set up for a retry later. */
601
		status = -EAGAIN;
602
	}
603 604
	if (!transport->sock)
		goto out;
605

606
	switch (status) {
607 608 609 610
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
611
	case -EAGAIN:
612
		status = xs_nospace(task);
613
		break;
614 615 616
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
617 618
	case -ENETUNREACH:
	case -EPIPE:
619 620
	case -ECONNREFUSED:
		/* When the server has died, an ICMP port unreachable message
621
		 * prompts ECONNREFUSED. */
622
		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
623
	}
624
out:
625
	return status;
626 627
}

628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643
/**
 * xs_tcp_shutdown - gracefully shut down a TCP socket
 * @xprt: transport
 *
 * Initiates a graceful shutdown of the TCP socket by calling the
 * equivalent of shutdown(SHUT_WR);
 */
static void xs_tcp_shutdown(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct socket *sock = transport->sock;

	if (sock != NULL)
		kernel_sock_shutdown(sock, SHUT_WR);
}

644 645 646 647 648 649 650
static inline void xs_encode_tcp_record_marker(struct xdr_buf *buf)
{
	u32 reclen = buf->len - sizeof(rpc_fraghdr);
	rpc_fraghdr *base = buf->head[0].iov_base;
	*base = htonl(RPC_LAST_STREAM_FRAGMENT | reclen);
}

651
/**
652
 * xs_tcp_send_request - write an RPC request to a TCP socket
653 654 655
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
656 657 658 659 660
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
 *    other:	Some other error occured, the request was not sent
661 662
 *
 * XXX: In the case of soft timeouts, should we eventually give up
663
 *	if sendmsg is not able to make progress?
664
 */
665
static int xs_tcp_send_request(struct rpc_task *task)
666 667 668
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
669
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
670
	struct xdr_buf *xdr = &req->rq_snd_buf;
671
	int status;
672

673
	xs_encode_tcp_record_marker(&req->rq_snd_buf);
674

675 676 677
	xs_pktdump("packet data:",
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);
678 679 680

	/* Continue transmitting the packet/record. We must be careful
	 * to cope with writespace callbacks arriving _after_ we have
681
	 * called sendmsg(). */
682
	while (1) {
683 684
		status = xs_sendpages(transport->sock,
					NULL, 0, xdr, req->rq_bytes_sent);
685

686
		dprintk("RPC:       xs_tcp_send_request(%u) = %d\n",
687
				xdr->len - req->rq_bytes_sent, status);
688

689
		if (unlikely(status < 0))
690 691
			break;

692 693 694
		/* If we've sent the entire packet, immediately
		 * reset the count of bytes sent. */
		req->rq_bytes_sent += status;
695
		task->tk_bytes_sent += status;
696 697 698 699
		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
			req->rq_bytes_sent = 0;
			return 0;
		}
700

701 702
		if (status != 0)
			continue;
703
		status = -EAGAIN;
704
		break;
705
	}
706 707
	if (!transport->sock)
		goto out;
708

709
	switch (status) {
710 711 712 713
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
714
	case -EAGAIN:
715
		status = xs_nospace(task);
716
		break;
717 718 719
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
720
	case -ECONNRESET:
721
	case -EPIPE:
722 723
		xs_tcp_shutdown(xprt);
	case -ECONNREFUSED:
724
	case -ENOTCONN:
725
		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
726
	}
727
out:
728 729 730
	return status;
}

731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757
/**
 * xs_tcp_release_xprt - clean up after a tcp transmission
 * @xprt: transport
 * @task: rpc task
 *
 * This cleans up if an error causes us to abort the transmission of a request.
 * In this case, the socket may need to be reset in order to avoid confusing
 * the server.
 */
static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
{
	struct rpc_rqst *req;

	if (task != xprt->snd_task)
		return;
	if (task == NULL)
		goto out_release;
	req = task->tk_rqstp;
	if (req->rq_bytes_sent == 0)
		goto out_release;
	if (req->rq_bytes_sent == req->rq_snd_buf.len)
		goto out_release;
	set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state);
out_release:
	xprt_release_xprt(xprt, task);
}

758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773
static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	transport->old_data_ready = sk->sk_data_ready;
	transport->old_state_change = sk->sk_state_change;
	transport->old_write_space = sk->sk_write_space;
	transport->old_error_report = sk->sk_error_report;
}

static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	sk->sk_data_ready = transport->old_data_ready;
	sk->sk_state_change = transport->old_state_change;
	sk->sk_write_space = transport->old_write_space;
	sk->sk_error_report = transport->old_error_report;
}

774
static void xs_reset_transport(struct sock_xprt *transport)
775
{
776 777
	struct socket *sock = transport->sock;
	struct sock *sk = transport->inet;
778

779 780
	if (sk == NULL)
		return;
781

782
	write_lock_bh(&sk->sk_callback_lock);
783 784
	transport->inet = NULL;
	transport->sock = NULL;
785

786
	sk->sk_user_data = NULL;
787 788

	xs_restore_old_callbacks(transport, sk);
789 790
	write_unlock_bh(&sk->sk_callback_lock);

791
	sk->sk_no_check = 0;
792 793

	sock_release(sock);
794 795 796 797 798 799 800 801
}

/**
 * xs_close - close a socket
 * @xprt: transport
 *
 * This is used when all requests are complete; ie, no DRC state remains
 * on the server we want to save.
802 803 804
 *
 * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with
 * xs_reset_transport() zeroing the socket from underneath a writer.
805 806 807 808 809 810 811 812 813
 */
static void xs_close(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	dprintk("RPC:       xs_close xprt %p\n", xprt);

	xs_reset_transport(transport);

814
	smp_mb__before_clear_bit();
815
	clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
816
	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
817
	clear_bit(XPRT_CLOSING, &xprt->state);
818
	smp_mb__after_clear_bit();
819
	xprt_disconnect_done(xprt);
820 821
}

822 823 824 825 826 827 828 829
static void xs_tcp_close(struct rpc_xprt *xprt)
{
	if (test_and_clear_bit(XPRT_CONNECTION_CLOSE, &xprt->state))
		xs_close(xprt);
	else
		xs_tcp_shutdown(xprt);
}

830 831 832 833 834 835
/**
 * xs_destroy - prepare to shutdown a transport
 * @xprt: doomed transport
 *
 */
static void xs_destroy(struct rpc_xprt *xprt)
836
{
837 838
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

839
	dprintk("RPC:       xs_destroy xprt %p\n", xprt);
840

841
	cancel_rearming_delayed_work(&transport->connect_worker);
842

843
	xs_close(xprt);
844
	xs_free_peer_addresses(xprt);
845
	kfree(xprt->slot);
846
	kfree(xprt);
847
	module_put(THIS_MODULE);
848 849
}

850 851 852 853 854 855 856 857 858 859
static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
{
	return (struct rpc_xprt *) sk->sk_user_data;
}

/**
 * xs_udp_data_ready - "data ready" callback for UDP sockets
 * @sk: socket with data to read
 * @len: how much data to read
 *
860
 */
861
static void xs_udp_data_ready(struct sock *sk, int len)
862
{
863 864
	struct rpc_task *task;
	struct rpc_xprt *xprt;
865
	struct rpc_rqst *rovr;
866
	struct sk_buff *skb;
867
	int err, repsize, copied;
868 869
	u32 _xid;
	__be32 *xp;
870 871

	read_lock(&sk->sk_callback_lock);
872
	dprintk("RPC:       xs_udp_data_ready...\n");
873
	if (!(xprt = xprt_from_sock(sk)))
874 875 876 877 878 879 880 881 882 883
		goto out;

	if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
		goto out;

	if (xprt->shutdown)
		goto dropit;

	repsize = skb->len - sizeof(struct udphdr);
	if (repsize < 4) {
884
		dprintk("RPC:       impossible RPC reply size %d!\n", repsize);
885 886 887 888 889 890 891 892 893 894
		goto dropit;
	}

	/* Copy the XID from the skb... */
	xp = skb_header_pointer(skb, sizeof(struct udphdr),
				sizeof(_xid), &_xid);
	if (xp == NULL)
		goto dropit;

	/* Look up and lock the request corresponding to the given XID */
C
Chuck Lever 已提交
895
	spin_lock(&xprt->transport_lock);
896 897 898 899 900 901 902 903 904
	rovr = xprt_lookup_rqst(xprt, *xp);
	if (!rovr)
		goto out_unlock;
	task = rovr->rq_task;

	if ((copied = rovr->rq_private_buf.buflen) > repsize)
		copied = repsize;

	/* Suck it into the iovec, verify checksum if not done by hw. */
905 906
	if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
		UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS);
907
		goto out_unlock;
908 909 910
	}

	UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS);
911 912

	/* Something worked... */
E
Eric Dumazet 已提交
913
	dst_confirm(skb_dst(skb));
914

915 916 917
	xprt_adjust_cwnd(task, copied);
	xprt_update_rtt(task);
	xprt_complete_rqst(task, copied);
918 919

 out_unlock:
C
Chuck Lever 已提交
920
	spin_unlock(&xprt->transport_lock);
921 922 923 924 925 926
 dropit:
	skb_free_datagram(sk, skb);
 out:
	read_unlock(&sk->sk_callback_lock);
}

927
static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
928
{
929
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
930 931 932
	size_t len, used;
	char *p;

933 934
	p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
	len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
935
	used = xdr_skb_read_bits(desc, p, len);
936
	transport->tcp_offset += used;
937 938
	if (used != len)
		return;
939

940 941
	transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
	if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
942
		transport->tcp_flags |= TCP_RCV_LAST_FRAG;
943
	else
944
		transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
945
	transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
946

947
	transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
948
	transport->tcp_offset = 0;
949

950
	/* Sanity check of the record length */
951
	if (unlikely(transport->tcp_reclen < 8)) {
952
		dprintk("RPC:       invalid TCP record fragment length\n");
953
		xprt_force_disconnect(xprt);
954
		return;
955
	}
956
	dprintk("RPC:       reading TCP record fragment of length %d\n",
957
			transport->tcp_reclen);
958 959
}

960
static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
961
{
962
	if (transport->tcp_offset == transport->tcp_reclen) {
963
		transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
964
		transport->tcp_offset = 0;
965 966 967
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
			transport->tcp_flags |= TCP_RCV_COPY_XID;
968
			transport->tcp_copied = 0;
969 970 971 972
		}
	}
}

973
static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
974 975 976 977
{
	size_t len, used;
	char *p;

978
	len = sizeof(transport->tcp_xid) - transport->tcp_offset;
979
	dprintk("RPC:       reading XID (%Zu bytes)\n", len);
980
	p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
981
	used = xdr_skb_read_bits(desc, p, len);
982
	transport->tcp_offset += used;
983 984
	if (used != len)
		return;
985
	transport->tcp_flags &= ~TCP_RCV_COPY_XID;
986
	transport->tcp_flags |= TCP_RCV_READ_CALLDIR;
987
	transport->tcp_copied = 4;
988 989 990
	dprintk("RPC:       reading %s XID %08x\n",
			(transport->tcp_flags & TCP_RPC_REPLY) ? "reply for"
							      : "request with",
991 992
			ntohl(transport->tcp_xid));
	xs_tcp_check_fraghdr(transport);
993 994
}

995 996
static inline void xs_tcp_read_calldir(struct sock_xprt *transport,
				       struct xdr_skb_reader *desc)
997
{
998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014
	size_t len, used;
	u32 offset;
	__be32	calldir;

	/*
	 * We want transport->tcp_offset to be 8 at the end of this routine
	 * (4 bytes for the xid and 4 bytes for the call/reply flag).
	 * When this function is called for the first time,
	 * transport->tcp_offset is 4 (after having already read the xid).
	 */
	offset = transport->tcp_offset - sizeof(transport->tcp_xid);
	len = sizeof(calldir) - offset;
	dprintk("RPC:       reading CALL/REPLY flag (%Zu bytes)\n", len);
	used = xdr_skb_read_bits(desc, &calldir, len);
	transport->tcp_offset += used;
	if (used != len)
		return;
1015 1016
	transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR;
	transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
1017
	transport->tcp_flags |= TCP_RCV_COPY_DATA;
1018 1019 1020 1021
	/*
	 * We don't yet have the XDR buffer, so we will write the calldir
	 * out after we get the buffer from the 'struct rpc_rqst'
	 */
1022 1023 1024 1025 1026 1027 1028 1029 1030 1031
	if (ntohl(calldir) == RPC_REPLY)
		transport->tcp_flags |= TCP_RPC_REPLY;
	else
		transport->tcp_flags &= ~TCP_RPC_REPLY;
	dprintk("RPC:       reading %s CALL/REPLY flag %08x\n",
			(transport->tcp_flags & TCP_RPC_REPLY) ?
				"reply for" : "request with", calldir);
	xs_tcp_check_fraghdr(transport);
}

R
Ricardo Labiaga 已提交
1032 1033 1034
static inline void xs_tcp_read_common(struct rpc_xprt *xprt,
				     struct xdr_skb_reader *desc,
				     struct rpc_rqst *req)
1035
{
R
Ricardo Labiaga 已提交
1036 1037
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
1038 1039 1040 1041 1042
	struct xdr_buf *rcvbuf;
	size_t len;
	ssize_t r;

	rcvbuf = &req->rq_private_buf;
1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054

	if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) {
		/*
		 * Save the RPC direction in the XDR buffer
		 */
		__be32	calldir = transport->tcp_flags & TCP_RPC_REPLY ?
					htonl(RPC_REPLY) : 0;

		memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied,
			&calldir, sizeof(calldir));
		transport->tcp_copied += sizeof(calldir);
		transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR;
1055 1056 1057
	}

	len = desc->count;
1058
	if (len > transport->tcp_reclen - transport->tcp_offset) {
1059
		struct xdr_skb_reader my_desc;
1060

1061
		len = transport->tcp_reclen - transport->tcp_offset;
1062 1063
		memcpy(&my_desc, desc, sizeof(my_desc));
		my_desc.count = len;
1064
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1065
					  &my_desc, xdr_skb_read_bits);
1066 1067 1068
		desc->count -= r;
		desc->offset += r;
	} else
1069
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1070
					  desc, xdr_skb_read_bits);
1071 1072

	if (r > 0) {
1073 1074
		transport->tcp_copied += r;
		transport->tcp_offset += r;
1075 1076 1077 1078 1079
	}
	if (r != len) {
		/* Error when copying to the receive buffer,
		 * usually because we weren't able to allocate
		 * additional buffer pages. All we can do now
1080
		 * is turn off TCP_RCV_COPY_DATA, so the request
1081 1082 1083 1084 1085
		 * will not receive any additional updates,
		 * and time out.
		 * Any remaining data from this record will
		 * be discarded.
		 */
1086
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1087
		dprintk("RPC:       XID %08x truncated request\n",
1088
				ntohl(transport->tcp_xid));
1089 1090 1091 1092
		dprintk("RPC:       xprt = %p, tcp_copied = %lu, "
				"tcp_offset = %u, tcp_reclen = %u\n",
				xprt, transport->tcp_copied,
				transport->tcp_offset, transport->tcp_reclen);
R
Ricardo Labiaga 已提交
1093
		return;
1094 1095
	}

1096
	dprintk("RPC:       XID %08x read %Zd bytes\n",
1097
			ntohl(transport->tcp_xid), r);
1098 1099 1100
	dprintk("RPC:       xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
			"tcp_reclen = %u\n", xprt, transport->tcp_copied,
			transport->tcp_offset, transport->tcp_reclen);
1101 1102

	if (transport->tcp_copied == req->rq_private_buf.buflen)
1103
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1104
	else if (transport->tcp_offset == transport->tcp_reclen) {
1105 1106
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1107 1108
	}

R
Ricardo Labiaga 已提交
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136
	return;
}

/*
 * Finds the request corresponding to the RPC xid and invokes the common
 * tcp read code to read the data.
 */
static inline int xs_tcp_read_reply(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

	dprintk("RPC:       read reply XID %08x\n", ntohl(transport->tcp_xid));

	/* Find and lock the request corresponding to this xid */
	spin_lock(&xprt->transport_lock);
	req = xprt_lookup_rqst(xprt, transport->tcp_xid);
	if (!req) {
		dprintk("RPC:       XID %08x request not found!\n",
				ntohl(transport->tcp_xid));
		spin_unlock(&xprt->transport_lock);
		return -1;
	}

	xs_tcp_read_common(xprt, desc, req);

1137
	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
1138
		xprt_complete_rqst(req->rq_task, transport->tcp_copied);
R
Ricardo Labiaga 已提交
1139

C
Chuck Lever 已提交
1140
	spin_unlock(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227
	return 0;
}

#if defined(CONFIG_NFS_V4_1)
/*
 * Obtains an rpc_rqst previously allocated and invokes the common
 * tcp read code to read the data.  The result is placed in the callback
 * queue.
 * If we're unable to obtain the rpc_rqst we schedule the closing of the
 * connection and return -1.
 */
static inline int xs_tcp_read_callback(struct rpc_xprt *xprt,
				       struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

	req = xprt_alloc_bc_request(xprt);
	if (req == NULL) {
		printk(KERN_WARNING "Callback slot table overflowed\n");
		xprt_force_disconnect(xprt);
		return -1;
	}

	req->rq_xid = transport->tcp_xid;
	dprintk("RPC:       read callback  XID %08x\n", ntohl(req->rq_xid));
	xs_tcp_read_common(xprt, desc, req);

	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) {
		struct svc_serv *bc_serv = xprt->bc_serv;

		/*
		 * Add callback request to callback list.  The callback
		 * service sleeps on the sv_cb_waitq waiting for new
		 * requests.  Wake it up after adding enqueing the
		 * request.
		 */
		dprintk("RPC:       add callback request to list\n");
		spin_lock(&bc_serv->sv_cb_lock);
		list_add(&req->rq_bc_list, &bc_serv->sv_cb_list);
		spin_unlock(&bc_serv->sv_cb_lock);
		wake_up(&bc_serv->sv_cb_waitq);
	}

	req->rq_private_buf.len = transport->tcp_copied;

	return 0;
}

static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	return (transport->tcp_flags & TCP_RPC_REPLY) ?
		xs_tcp_read_reply(xprt, desc) :
		xs_tcp_read_callback(xprt, desc);
}
#else
static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	return xs_tcp_read_reply(xprt, desc);
}
#endif /* CONFIG_NFS_V4_1 */

/*
 * Read data off the transport.  This can be either an RPC_CALL or an
 * RPC_REPLY.  Relay the processing to helper functions.
 */
static void xs_tcp_read_data(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	if (_xs_tcp_read_data(xprt, desc) == 0)
		xs_tcp_check_fraghdr(transport);
	else {
		/*
		 * The transport_lock protects the request handling.
		 * There's no need to hold it to update the tcp_flags.
		 */
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
	}
1228 1229
}

1230
static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1231 1232 1233
{
	size_t len;

1234
	len = transport->tcp_reclen - transport->tcp_offset;
1235 1236 1237 1238
	if (len > desc->count)
		len = desc->count;
	desc->count -= len;
	desc->offset += len;
1239
	transport->tcp_offset += len;
1240
	dprintk("RPC:       discarded %Zu bytes\n", len);
1241
	xs_tcp_check_fraghdr(transport);
1242 1243
}

1244
static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
1245 1246
{
	struct rpc_xprt *xprt = rd_desc->arg.data;
1247
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1248
	struct xdr_skb_reader desc = {
1249 1250 1251
		.skb	= skb,
		.offset	= offset,
		.count	= len,
1252
	};
1253

1254
	dprintk("RPC:       xs_tcp_data_recv started\n");
1255 1256 1257
	do {
		/* Read in a new fragment marker if necessary */
		/* Can we ever really expect to get completely empty fragments? */
1258
		if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
1259
			xs_tcp_read_fraghdr(xprt, &desc);
1260 1261 1262
			continue;
		}
		/* Read in the xid if necessary */
1263
		if (transport->tcp_flags & TCP_RCV_COPY_XID) {
1264
			xs_tcp_read_xid(transport, &desc);
1265 1266
			continue;
		}
1267
		/* Read in the call/reply flag */
1268
		if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) {
1269 1270 1271
			xs_tcp_read_calldir(transport, &desc);
			continue;
		}
1272
		/* Read in the request data */
1273
		if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
R
Ricardo Labiaga 已提交
1274
			xs_tcp_read_data(xprt, &desc);
1275 1276 1277
			continue;
		}
		/* Skip over any trailing bytes on short reads */
1278
		xs_tcp_read_discard(transport, &desc);
1279
	} while (desc.count);
1280
	dprintk("RPC:       xs_tcp_data_recv done\n");
1281 1282 1283
	return len - desc.count;
}

1284 1285 1286 1287 1288 1289 1290
/**
 * xs_tcp_data_ready - "data ready" callback for TCP sockets
 * @sk: socket with data to read
 * @bytes: how much data to read
 *
 */
static void xs_tcp_data_ready(struct sock *sk, int bytes)
1291 1292 1293
{
	struct rpc_xprt *xprt;
	read_descriptor_t rd_desc;
1294
	int read;
1295

1296 1297
	dprintk("RPC:       xs_tcp_data_ready...\n");

1298
	read_lock(&sk->sk_callback_lock);
1299
	if (!(xprt = xprt_from_sock(sk)))
1300 1301 1302 1303
		goto out;
	if (xprt->shutdown)
		goto out;

1304
	/* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
1305
	rd_desc.arg.data = xprt;
1306 1307 1308 1309
	do {
		rd_desc.count = 65536;
		read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
	} while (read > 0);
1310 1311 1312 1313
out:
	read_unlock(&sk->sk_callback_lock);
}

1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354
/*
 * Do the equivalent of linger/linger2 handling for dealing with
 * broken servers that don't close the socket in a timely
 * fashion
 */
static void xs_tcp_schedule_linger_timeout(struct rpc_xprt *xprt,
		unsigned long timeout)
{
	struct sock_xprt *transport;

	if (xprt_test_and_set_connecting(xprt))
		return;
	set_bit(XPRT_CONNECTION_ABORT, &xprt->state);
	transport = container_of(xprt, struct sock_xprt, xprt);
	queue_delayed_work(rpciod_workqueue, &transport->connect_worker,
			   timeout);
}

static void xs_tcp_cancel_linger_timeout(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport;

	transport = container_of(xprt, struct sock_xprt, xprt);

	if (!test_bit(XPRT_CONNECTION_ABORT, &xprt->state) ||
	    !cancel_delayed_work(&transport->connect_worker))
		return;
	clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
	xprt_clear_connecting(xprt);
}

static void xs_sock_mark_closed(struct rpc_xprt *xprt)
{
	smp_mb__before_clear_bit();
	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
	clear_bit(XPRT_CLOSING, &xprt->state);
	smp_mb__after_clear_bit();
	/* Mark transport as closed and wake up all pending tasks */
	xprt_disconnect_done(xprt);
}

1355 1356 1357 1358 1359 1360
/**
 * xs_tcp_state_change - callback to handle TCP socket state changes
 * @sk: socket whose state has changed
 *
 */
static void xs_tcp_state_change(struct sock *sk)
1361
{
1362
	struct rpc_xprt *xprt;
1363 1364 1365 1366

	read_lock(&sk->sk_callback_lock);
	if (!(xprt = xprt_from_sock(sk)))
		goto out;
1367 1368 1369 1370 1371
	dprintk("RPC:       xs_tcp_state_change client %p...\n", xprt);
	dprintk("RPC:       state %x conn %d dead %d zapped %d\n",
			sk->sk_state, xprt_connected(xprt),
			sock_flag(sk, SOCK_DEAD),
			sock_flag(sk, SOCK_ZAPPED));
1372 1373 1374

	switch (sk->sk_state) {
	case TCP_ESTABLISHED:
C
Chuck Lever 已提交
1375
		spin_lock_bh(&xprt->transport_lock);
1376
		if (!xprt_test_and_set_connected(xprt)) {
1377 1378 1379
			struct sock_xprt *transport = container_of(xprt,
					struct sock_xprt, xprt);

1380
			/* Reset TCP record info */
1381 1382 1383
			transport->tcp_offset = 0;
			transport->tcp_reclen = 0;
			transport->tcp_copied = 0;
1384 1385
			transport->tcp_flags =
				TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
1386

1387
			xprt_wake_pending_tasks(xprt, -EAGAIN);
1388
		}
C
Chuck Lever 已提交
1389
		spin_unlock_bh(&xprt->transport_lock);
1390
		break;
1391 1392
	case TCP_FIN_WAIT1:
		/* The client initiated a shutdown of the socket */
1393
		xprt->connect_cookie++;
1394
		xprt->reestablish_timeout = 0;
1395 1396 1397
		set_bit(XPRT_CLOSING, &xprt->state);
		smp_mb__before_clear_bit();
		clear_bit(XPRT_CONNECTED, &xprt->state);
1398
		clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
1399
		smp_mb__after_clear_bit();
1400
		xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
1401
		break;
1402
	case TCP_CLOSE_WAIT:
1403
		/* The server initiated a shutdown of the socket */
1404
		xprt_force_disconnect(xprt);
1405
	case TCP_SYN_SENT:
1406
		xprt->connect_cookie++;
1407 1408 1409 1410 1411 1412 1413
	case TCP_CLOSING:
		/*
		 * If the server closed down the connection, make sure that
		 * we back off before reconnecting
		 */
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
1414 1415
		break;
	case TCP_LAST_ACK:
1416
		set_bit(XPRT_CLOSING, &xprt->state);
1417
		xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
1418 1419 1420 1421 1422
		smp_mb__before_clear_bit();
		clear_bit(XPRT_CONNECTED, &xprt->state);
		smp_mb__after_clear_bit();
		break;
	case TCP_CLOSE:
1423 1424
		xs_tcp_cancel_linger_timeout(xprt);
		xs_sock_mark_closed(xprt);
1425 1426 1427 1428 1429
	}
 out:
	read_unlock(&sk->sk_callback_lock);
}

1430
/**
1431
 * xs_error_report - callback mainly for catching socket errors
1432 1433
 * @sk: socket
 */
1434
static void xs_error_report(struct sock *sk)
1435 1436 1437 1438 1439 1440 1441 1442 1443
{
	struct rpc_xprt *xprt;

	read_lock(&sk->sk_callback_lock);
	if (!(xprt = xprt_from_sock(sk)))
		goto out;
	dprintk("RPC:       %s client %p...\n"
			"RPC:       error %d\n",
			__func__, xprt, sk->sk_err);
1444
	xprt_wake_pending_tasks(xprt, -EAGAIN);
1445 1446 1447 1448
out:
	read_unlock(&sk->sk_callback_lock);
}

1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465
static void xs_write_space(struct sock *sk)
{
	struct socket *sock;
	struct rpc_xprt *xprt;

	if (unlikely(!(sock = sk->sk_socket)))
		return;
	clear_bit(SOCK_NOSPACE, &sock->flags);

	if (unlikely(!(xprt = xprt_from_sock(sk))))
		return;
	if (test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags) == 0)
		return;

	xprt_write_space(xprt);
}

1466
/**
1467 1468
 * xs_udp_write_space - callback invoked when socket buffer space
 *                             becomes available
1469 1470
 * @sk: socket whose state has changed
 *
1471 1472
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
1473
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1474 1475
 * with a bunch of small requests.
 */
1476
static void xs_udp_write_space(struct sock *sk)
1477 1478 1479
{
	read_lock(&sk->sk_callback_lock);

1480
	/* from net/core/sock.c:sock_def_write_space */
1481 1482
	if (sock_writeable(sk))
		xs_write_space(sk);
1483

1484 1485
	read_unlock(&sk->sk_callback_lock);
}
1486

1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501
/**
 * xs_tcp_write_space - callback invoked when socket buffer space
 *                             becomes available
 * @sk: socket whose state has changed
 *
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
 * with a bunch of small requests.
 */
static void xs_tcp_write_space(struct sock *sk)
{
	read_lock(&sk->sk_callback_lock);

	/* from net/core/stream.c:sk_stream_write_space */
1502 1503
	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk))
		xs_write_space(sk);
1504

1505 1506 1507
	read_unlock(&sk->sk_callback_lock);
}

1508
static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
1509
{
1510 1511
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct sock *sk = transport->inet;
1512

1513
	if (transport->rcvsize) {
1514
		sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
1515
		sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
1516
	}
1517
	if (transport->sndsize) {
1518
		sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
1519
		sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
1520 1521 1522 1523
		sk->sk_write_space(sk);
	}
}

1524
/**
1525
 * xs_udp_set_buffer_size - set send and receive limits
1526
 * @xprt: generic transport
1527 1528
 * @sndsize: requested size of send buffer, in bytes
 * @rcvsize: requested size of receive buffer, in bytes
1529
 *
1530
 * Set socket send and receive buffer size limits.
1531
 */
1532
static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
1533
{
1534 1535 1536
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	transport->sndsize = 0;
1537
	if (sndsize)
1538 1539
		transport->sndsize = sndsize + 1024;
	transport->rcvsize = 0;
1540
	if (rcvsize)
1541
		transport->rcvsize = rcvsize + 1024;
1542 1543

	xs_udp_do_set_buffer_size(xprt);
1544 1545
}

1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556
/**
 * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
 * @task: task that timed out
 *
 * Adjust the congestion window after a retransmit timeout has occurred.
 */
static void xs_udp_timer(struct rpc_task *task)
{
	xprt_adjust_cwnd(task, -ETIMEDOUT);
}

1557 1558 1559 1560 1561 1562 1563
static unsigned short xs_get_random_port(void)
{
	unsigned short range = xprt_max_resvport - xprt_min_resvport;
	unsigned short rand = (unsigned short) net_random() % range;
	return rand + xprt_min_resvport;
}

1564 1565 1566 1567 1568 1569 1570 1571
/**
 * xs_set_port - reset the port number in the remote endpoint address
 * @xprt: generic transport
 * @port: new port number
 *
 */
static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
{
1572
	struct sockaddr *addr = xs_addr(xprt);
1573

1574
	dprintk("RPC:       setting port for xprt %p to %u\n", xprt, port);
1575

1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
	switch (addr->sa_family) {
	case AF_INET:
		((struct sockaddr_in *)addr)->sin_port = htons(port);
		break;
	case AF_INET6:
		((struct sockaddr_in6 *)addr)->sin6_port = htons(port);
		break;
	default:
		BUG();
	}
1586 1587
}

1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607
static unsigned short xs_get_srcport(struct sock_xprt *transport, struct socket *sock)
{
	unsigned short port = transport->port;

	if (port == 0 && transport->xprt.resvport)
		port = xs_get_random_port();
	return port;
}

static unsigned short xs_next_srcport(struct sock_xprt *transport, struct socket *sock, unsigned short port)
{
	if (transport->port != 0)
		transport->port = 0;
	if (!transport->xprt.resvport)
		return 0;
	if (port <= xprt_min_resvport || port > xprt_max_resvport)
		return xprt_max_resvport;
	return --port;
}

1608
static int xs_bind4(struct sock_xprt *transport, struct socket *sock)
1609 1610 1611 1612
{
	struct sockaddr_in myaddr = {
		.sin_family = AF_INET,
	};
1613
	struct sockaddr_in *sa;
1614 1615 1616
	int err, nloop = 0;
	unsigned short port = xs_get_srcport(transport, sock);
	unsigned short last;
1617

1618 1619
	sa = (struct sockaddr_in *)&transport->addr;
	myaddr.sin_addr = sa->sin_addr;
1620 1621
	do {
		myaddr.sin_port = htons(port);
1622
		err = kernel_bind(sock, (struct sockaddr *) &myaddr,
1623
						sizeof(myaddr));
1624
		if (port == 0)
1625
			break;
1626
		if (err == 0) {
1627
			transport->port = port;
1628
			break;
1629
		}
1630 1631 1632 1633 1634
		last = port;
		port = xs_next_srcport(transport, sock, port);
		if (port > last)
			nloop++;
	} while (err == -EADDRINUSE && nloop != 2);
H
Harvey Harrison 已提交
1635 1636
	dprintk("RPC:       %s %pI4:%u: %s (%d)\n",
			__func__, &myaddr.sin_addr,
1637
			port, err ? "failed" : "ok", err);
1638 1639 1640
	return err;
}

1641 1642 1643 1644 1645 1646
static int xs_bind6(struct sock_xprt *transport, struct socket *sock)
{
	struct sockaddr_in6 myaddr = {
		.sin6_family = AF_INET6,
	};
	struct sockaddr_in6 *sa;
1647 1648 1649
	int err, nloop = 0;
	unsigned short port = xs_get_srcport(transport, sock);
	unsigned short last;
1650 1651 1652 1653 1654 1655 1656

	sa = (struct sockaddr_in6 *)&transport->addr;
	myaddr.sin6_addr = sa->sin6_addr;
	do {
		myaddr.sin6_port = htons(port);
		err = kernel_bind(sock, (struct sockaddr *) &myaddr,
						sizeof(myaddr));
1657
		if (port == 0)
1658 1659 1660 1661 1662
			break;
		if (err == 0) {
			transport->port = port;
			break;
		}
1663 1664 1665 1666 1667
		last = port;
		port = xs_next_srcport(transport, sock, port);
		if (port > last)
			nloop++;
	} while (err == -EADDRINUSE && nloop != 2);
H
Harvey Harrison 已提交
1668
	dprintk("RPC:       xs_bind6 %pI6:%u: %s (%d)\n",
1669
		&myaddr.sin6_addr, port, err ? "failed" : "ok", err);
1670 1671 1672
	return err;
}

1673 1674 1675 1676
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key xs_key[2];
static struct lock_class_key xs_slock_key[2];

1677
static inline void xs_reclassify_socket4(struct socket *sock)
1678 1679
{
	struct sock *sk = sock->sk;
1680

1681
	BUG_ON(sock_owned_by_user(sk));
1682 1683 1684
	sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
		&xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
}
1685

1686 1687 1688
static inline void xs_reclassify_socket6(struct socket *sock)
{
	struct sock *sk = sock->sk;
1689

1690
	BUG_ON(sock_owned_by_user(sk));
1691 1692
	sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
		&xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
1693 1694
}
#else
1695 1696 1697 1698 1699
static inline void xs_reclassify_socket4(struct socket *sock)
{
}

static inline void xs_reclassify_socket6(struct socket *sock)
1700 1701 1702 1703
{
}
#endif

1704 1705 1706 1707 1708 1709 1710 1711 1712
static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	if (!transport->inet) {
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

1713 1714
		xs_save_old_callbacks(transport, sk);

1715 1716 1717
		sk->sk_user_data = xprt;
		sk->sk_data_ready = xs_udp_data_ready;
		sk->sk_write_space = xs_udp_write_space;
1718
		sk->sk_error_report = xs_error_report;
1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732
		sk->sk_no_check = UDP_CSUM_NORCV;
		sk->sk_allocation = GFP_ATOMIC;

		xprt_set_connected(xprt);

		/* Reset to new socket */
		transport->sock = sock;
		transport->inet = sk;

		write_unlock_bh(&sk->sk_callback_lock);
	}
	xs_udp_do_set_buffer_size(xprt);
}

1733
/**
C
Chuck Lever 已提交
1734
 * xs_udp_connect_worker4 - set up a UDP socket
1735
 * @work: RPC transport to connect
1736 1737 1738
 *
 * Invoked by a work queue tasklet.
 */
C
Chuck Lever 已提交
1739
static void xs_udp_connect_worker4(struct work_struct *work)
1740
{
1741 1742
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
1743
	struct rpc_xprt *xprt = &transport->xprt;
1744
	struct socket *sock = transport->sock;
1745
	int err, status = -EIO;
1746

1747
	if (xprt->shutdown)
1748
		goto out;
1749

1750
	/* Start by resetting any existing state */
1751
	xs_reset_transport(transport);
1752

1753 1754
	err = sock_create_kern(PF_INET, SOCK_DGRAM, IPPROTO_UDP, &sock);
	if (err < 0) {
1755
		dprintk("RPC:       can't create UDP transport socket (%d).\n", -err);
1756 1757
		goto out;
	}
1758
	xs_reclassify_socket4(sock);
1759

1760
	if (xs_bind4(transport, sock)) {
1761 1762 1763
		sock_release(sock);
		goto out;
	}
1764

1765
	dprintk("RPC:       worker connecting xprt %p to address: %s\n",
1766
			xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
1767

1768
	xs_udp_finish_connecting(xprt, sock);
1769 1770 1771
	status = 0;
out:
	xprt_clear_connecting(xprt);
1772
	xprt_wake_pending_tasks(xprt, status);
1773 1774
}

1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787
/**
 * xs_udp_connect_worker6 - set up a UDP socket
 * @work: RPC transport to connect
 *
 * Invoked by a work queue tasklet.
 */
static void xs_udp_connect_worker6(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
	struct rpc_xprt *xprt = &transport->xprt;
	struct socket *sock = transport->sock;
	int err, status = -EIO;
1788

1789
	if (xprt->shutdown)
1790
		goto out;
1791

1792
	/* Start by resetting any existing state */
1793
	xs_reset_transport(transport);
1794

1795 1796
	err = sock_create_kern(PF_INET6, SOCK_DGRAM, IPPROTO_UDP, &sock);
	if (err < 0) {
1797 1798 1799
		dprintk("RPC:       can't create UDP transport socket (%d).\n", -err);
		goto out;
	}
1800
	xs_reclassify_socket6(sock);
1801

1802 1803 1804
	if (xs_bind6(transport, sock) < 0) {
		sock_release(sock);
		goto out;
1805
	}
1806 1807 1808 1809 1810

	dprintk("RPC:       worker connecting xprt %p to address: %s\n",
			xprt, xprt->address_strings[RPC_DISPLAY_ALL]);

	xs_udp_finish_connecting(xprt, sock);
1811 1812 1813
	status = 0;
out:
	xprt_clear_connecting(xprt);
1814
	xprt_wake_pending_tasks(xprt, status);
1815 1816
}

1817 1818 1819 1820
/*
 * We need to preserve the port number so the reply cache on the server can
 * find our cached RPC replies when we get around to reconnecting.
 */
1821
static void xs_abort_connection(struct rpc_xprt *xprt, struct sock_xprt *transport)
1822 1823 1824 1825
{
	int result;
	struct sockaddr any;

1826
	dprintk("RPC:       disconnecting xprt %p to reuse port\n", xprt);
1827 1828 1829 1830 1831 1832 1833

	/*
	 * Disconnect the transport socket by doing a connect operation
	 * with AF_UNSPEC.  This should return immediately...
	 */
	memset(&any, 0, sizeof(any));
	any.sa_family = AF_UNSPEC;
1834
	result = kernel_connect(transport->sock, &any, sizeof(any), 0);
1835 1836 1837
	if (!result)
		xs_sock_mark_closed(xprt);
	else
1838
		dprintk("RPC:       AF_UNSPEC connect return code %d\n",
1839 1840 1841
				result);
}

1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852
static void xs_tcp_reuse_connection(struct rpc_xprt *xprt, struct sock_xprt *transport)
{
	unsigned int state = transport->inet->sk_state;

	if (state == TCP_CLOSE && transport->sock->state == SS_UNCONNECTED)
		return;
	if ((1 << state) & (TCPF_ESTABLISHED|TCPF_SYN_SENT))
		return;
	xs_abort_connection(xprt, transport);
}

1853
static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
1854
{
1855
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1856

1857
	if (!transport->inet) {
1858 1859 1860 1861
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

1862 1863
		xs_save_old_callbacks(transport, sk);

1864 1865 1866 1867
		sk->sk_user_data = xprt;
		sk->sk_data_ready = xs_tcp_data_ready;
		sk->sk_state_change = xs_tcp_state_change;
		sk->sk_write_space = xs_tcp_write_space;
1868
		sk->sk_error_report = xs_error_report;
1869
		sk->sk_allocation = GFP_ATOMIC;
1870 1871 1872 1873 1874 1875

		/* socket options */
		sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
		sock_reset_flag(sk, SOCK_LINGER);
		tcp_sk(sk)->linger2 = 0;
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
1876 1877 1878 1879

		xprt_clear_connected(xprt);

		/* Reset to new socket */
1880 1881
		transport->sock = sock;
		transport->inet = sk;
1882 1883 1884 1885

		write_unlock_bh(&sk->sk_callback_lock);
	}

1886 1887 1888
	if (!xprt_bound(xprt))
		return -ENOTCONN;

1889
	/* Tell the socket layer to start connecting... */
1890 1891
	xprt->stat.connect_count++;
	xprt->stat.connect_start = jiffies;
1892
	return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
1893 1894
}

1895
/**
1896 1897 1898 1899
 * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint
 * @xprt: RPC transport to connect
 * @transport: socket transport to connect
 * @create_sock: function to create a socket of the correct type
1900 1901
 *
 * Invoked by a work queue tasklet.
1902
 */
1903 1904 1905 1906
static void xs_tcp_setup_socket(struct rpc_xprt *xprt,
		struct sock_xprt *transport,
		struct socket *(*create_sock)(struct rpc_xprt *,
			struct sock_xprt *))
1907
{
1908
	struct socket *sock = transport->sock;
1909
	int status = -EIO;
1910

1911
	if (xprt->shutdown)
1912 1913
		goto out;

1914
	if (!sock) {
1915
		clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
1916 1917 1918
		sock = create_sock(xprt, transport);
		if (IS_ERR(sock)) {
			status = PTR_ERR(sock);
1919 1920
			goto out;
		}
1921 1922
	} else {
		int abort_and_exit;
1923

1924 1925
		abort_and_exit = test_and_clear_bit(XPRT_CONNECTION_ABORT,
				&xprt->state);
1926
		/* "close" the socket, preserving the local port */
1927
		xs_tcp_reuse_connection(xprt, transport);
1928

1929 1930 1931
		if (abort_and_exit)
			goto out_eagain;
	}
1932

1933
	dprintk("RPC:       worker connecting xprt %p to address: %s\n",
1934
			xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
1935

1936
	status = xs_tcp_finish_connecting(xprt, sock);
1937 1938 1939
	dprintk("RPC:       %p connect status %d connected %d sock state %d\n",
			xprt, -status, xprt_connected(xprt),
			sock->sk->sk_state);
1940
	switch (status) {
1941 1942 1943 1944 1945 1946 1947 1948 1949
	default:
		printk("%s: connect returned unhandled error %d\n",
			__func__, status);
	case -EADDRNOTAVAIL:
		/* We're probably in TIME_WAIT. Get rid of existing socket,
		 * and retry
		 */
		set_bit(XPRT_CONNECTION_CLOSE, &xprt->state);
		xprt_force_disconnect(xprt);
1950
		break;
1951 1952 1953 1954
	case -ECONNREFUSED:
	case -ECONNRESET:
	case -ENETUNREACH:
		/* retry with existing socket, after a delay */
1955 1956 1957
	case 0:
	case -EINPROGRESS:
	case -EALREADY:
1958 1959
		xprt_clear_connecting(xprt);
		return;
1960
	}
1961
out_eagain:
1962
	status = -EAGAIN;
1963
out:
1964
	xprt_clear_connecting(xprt);
1965
	xprt_wake_pending_tasks(xprt, status);
1966
}
1967

1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989
static struct socket *xs_create_tcp_sock4(struct rpc_xprt *xprt,
		struct sock_xprt *transport)
{
	struct socket *sock;
	int err;

	/* start from scratch */
	err = sock_create_kern(PF_INET, SOCK_STREAM, IPPROTO_TCP, &sock);
	if (err < 0) {
		dprintk("RPC:       can't create TCP transport socket (%d).\n",
				-err);
		goto out_err;
	}
	xs_reclassify_socket4(sock);

	if (xs_bind4(transport, sock) < 0) {
		sock_release(sock);
		goto out_err;
	}
	return sock;
out_err:
	return ERR_PTR(-EIO);
1990
}
1991

1992
/**
1993
 * xs_tcp_connect_worker4 - connect a TCP socket to a remote endpoint
1994 1995 1996 1997
 * @work: RPC transport to connect
 *
 * Invoked by a work queue tasklet.
 */
1998
static void xs_tcp_connect_worker4(struct work_struct *work)
1999 2000 2001 2002
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
	struct rpc_xprt *xprt = &transport->xprt;
2003

2004 2005
	xs_tcp_setup_socket(xprt, transport, xs_create_tcp_sock4);
}
2006

2007 2008 2009 2010 2011
static struct socket *xs_create_tcp_sock6(struct rpc_xprt *xprt,
		struct sock_xprt *transport)
{
	struct socket *sock;
	int err;
2012

2013 2014 2015 2016 2017 2018 2019 2020
	/* start from scratch */
	err = sock_create_kern(PF_INET6, SOCK_STREAM, IPPROTO_TCP, &sock);
	if (err < 0) {
		dprintk("RPC:       can't create TCP transport socket (%d).\n",
				-err);
		goto out_err;
	}
	xs_reclassify_socket6(sock);
2021

2022 2023 2024
	if (xs_bind6(transport, sock) < 0) {
		sock_release(sock);
		goto out_err;
2025
	}
2026 2027 2028 2029
	return sock;
out_err:
	return ERR_PTR(-EIO);
}
2030

2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041
/**
 * xs_tcp_connect_worker6 - connect a TCP socket to a remote endpoint
 * @work: RPC transport to connect
 *
 * Invoked by a work queue tasklet.
 */
static void xs_tcp_connect_worker6(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
	struct rpc_xprt *xprt = &transport->xprt;
2042

2043
	xs_tcp_setup_socket(xprt, transport, xs_create_tcp_sock6);
2044 2045
}

2046 2047 2048 2049 2050
/**
 * xs_connect - connect a socket to a remote endpoint
 * @task: address of RPC task that manages state of connect request
 *
 * TCP: If the remote end dropped the connection, delay reconnecting.
2051 2052 2053 2054 2055 2056 2057
 *
 * UDP socket connects are synchronous, but we use a work queue anyway
 * to guarantee that even unprivileged user processes can set up a
 * socket on a privileged port.
 *
 * If a UDP socket connect fails, the delay behavior here prevents
 * retry floods (hard mounts).
2058 2059
 */
static void xs_connect(struct rpc_task *task)
2060 2061
{
	struct rpc_xprt *xprt = task->tk_xprt;
2062
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2063

2064 2065 2066
	if (xprt_test_and_set_connecting(xprt))
		return;

2067
	if (transport->sock != NULL) {
2068 2069
		dprintk("RPC:       xs_connect delayed xprt %p for %lu "
				"seconds\n",
2070
				xprt, xprt->reestablish_timeout / HZ);
2071 2072 2073
		queue_delayed_work(rpciod_workqueue,
				   &transport->connect_worker,
				   xprt->reestablish_timeout);
2074 2075 2076
		xprt->reestablish_timeout <<= 1;
		if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
2077
	} else {
2078
		dprintk("RPC:       xs_connect scheduled xprt %p\n", xprt);
2079 2080
		queue_delayed_work(rpciod_workqueue,
				   &transport->connect_worker, 0);
2081 2082 2083
	}
}

2084 2085 2086 2087 2088 2089 2090 2091 2092 2093
static void xs_tcp_connect(struct rpc_task *task)
{
	struct rpc_xprt *xprt = task->tk_xprt;

	/* Exit if we need to wait for socket shutdown to complete */
	if (test_bit(XPRT_CLOSING, &xprt->state))
		return;
	xs_connect(task);
}

2094 2095 2096 2097 2098 2099 2100 2101
/**
 * xs_udp_print_stats - display UDP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2102 2103
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

2104
	seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n",
2105
			transport->port,
2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121
			xprt->stat.bind_count,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
			xprt->stat.bklog_u);
}

/**
 * xs_tcp_print_stats - display TCP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2122
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2123 2124 2125 2126 2127 2128
	long idle_time = 0;

	if (xprt_connected(xprt))
		idle_time = (long)(jiffies - xprt->last_used) / HZ;

	seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n",
2129
			transport->port,
2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140
			xprt->stat.bind_count,
			xprt->stat.connect_count,
			xprt->stat.connect_time,
			idle_time,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
			xprt->stat.bklog_u);
}

2141
static struct rpc_xprt_ops xs_udp_ops = {
2142
	.set_buffer_size	= xs_udp_set_buffer_size,
2143
	.reserve_xprt		= xprt_reserve_xprt_cong,
2144
	.release_xprt		= xprt_release_xprt_cong,
2145
	.rpcbind		= rpcb_getport_async,
2146
	.set_port		= xs_set_port,
2147
	.connect		= xs_connect,
2148 2149
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2150
	.send_request		= xs_udp_send_request,
2151
	.set_retrans_timeout	= xprt_set_retrans_timeout_rtt,
2152
	.timer			= xs_udp_timer,
2153
	.release_request	= xprt_release_rqst_cong,
2154 2155
	.close			= xs_close,
	.destroy		= xs_destroy,
2156
	.print_stats		= xs_udp_print_stats,
2157 2158 2159
};

static struct rpc_xprt_ops xs_tcp_ops = {
2160
	.reserve_xprt		= xprt_reserve_xprt,
2161
	.release_xprt		= xs_tcp_release_xprt,
2162
	.rpcbind		= rpcb_getport_async,
2163
	.set_port		= xs_set_port,
2164
	.connect		= xs_tcp_connect,
2165 2166
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2167
	.send_request		= xs_tcp_send_request,
2168
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
2169 2170 2171
#if defined(CONFIG_NFS_V4_1)
	.release_request	= bc_release_request,
#endif /* CONFIG_NFS_V4_1 */
2172
	.close			= xs_tcp_close,
2173
	.destroy		= xs_destroy,
2174
	.print_stats		= xs_tcp_print_stats,
2175 2176
};

2177
static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
2178
				      unsigned int slot_table_size)
2179 2180
{
	struct rpc_xprt *xprt;
2181
	struct sock_xprt *new;
2182

2183
	if (args->addrlen > sizeof(xprt->addr)) {
2184
		dprintk("RPC:       xs_setup_xprt: address too large\n");
2185 2186 2187
		return ERR_PTR(-EBADF);
	}

2188 2189
	new = kzalloc(sizeof(*new), GFP_KERNEL);
	if (new == NULL) {
2190 2191
		dprintk("RPC:       xs_setup_xprt: couldn't allocate "
				"rpc_xprt\n");
2192 2193
		return ERR_PTR(-ENOMEM);
	}
2194
	xprt = &new->xprt;
2195 2196 2197 2198 2199

	xprt->max_reqs = slot_table_size;
	xprt->slot = kcalloc(xprt->max_reqs, sizeof(struct rpc_rqst), GFP_KERNEL);
	if (xprt->slot == NULL) {
		kfree(xprt);
2200 2201
		dprintk("RPC:       xs_setup_xprt: couldn't allocate slot "
				"table\n");
2202 2203 2204
		return ERR_PTR(-ENOMEM);
	}

2205 2206
	memcpy(&xprt->addr, args->dstaddr, args->addrlen);
	xprt->addrlen = args->addrlen;
2207 2208
	if (args->srcaddr)
		memcpy(&new->addr, args->srcaddr, args->addrlen);
2209 2210 2211 2212

	return xprt;
}

2213 2214 2215 2216 2217 2218 2219
static const struct rpc_timeout xs_udp_default_timeout = {
	.to_initval = 5 * HZ,
	.to_maxval = 30 * HZ,
	.to_increment = 5 * HZ,
	.to_retries = 5,
};

2220 2221
/**
 * xs_setup_udp - Set up transport to use a UDP socket
2222
 * @args: rpc transport creation arguments
2223 2224
 *
 */
2225
static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
2226
{
2227
	struct sockaddr *addr = args->dstaddr;
2228
	struct rpc_xprt *xprt;
2229
	struct sock_xprt *transport;
2230

2231
	xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries);
2232 2233
	if (IS_ERR(xprt))
		return xprt;
2234
	transport = container_of(xprt, struct sock_xprt, xprt);
2235

2236
	xprt->prot = IPPROTO_UDP;
2237
	xprt->tsh_size = 0;
2238 2239 2240
	/* XXX: header size can vary due to auth type, IPv6, etc. */
	xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);

2241 2242 2243 2244
	xprt->bind_timeout = XS_BIND_TO;
	xprt->connect_timeout = XS_UDP_CONN_TO;
	xprt->reestablish_timeout = XS_UDP_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2245

2246
	xprt->ops = &xs_udp_ops;
2247

2248
	xprt->timeout = &xs_udp_default_timeout;
2249

2250 2251 2252 2253 2254 2255 2256
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

		INIT_DELAYED_WORK(&transport->connect_worker,
					xs_udp_connect_worker4);
2257
		xs_format_ipv4_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP);
2258 2259 2260 2261 2262 2263 2264
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

		INIT_DELAYED_WORK(&transport->connect_worker,
					xs_udp_connect_worker6);
2265
		xs_format_ipv6_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6);
2266 2267 2268 2269 2270 2271
		break;
	default:
		kfree(xprt);
		return ERR_PTR(-EAFNOSUPPORT);
	}

2272
	dprintk("RPC:       set up transport to address %s\n",
2273
			xprt->address_strings[RPC_DISPLAY_ALL]);
2274

2275 2276 2277 2278 2279 2280
	if (try_module_get(THIS_MODULE))
		return xprt;

	kfree(xprt->slot);
	kfree(xprt);
	return ERR_PTR(-EINVAL);
2281 2282
}

2283 2284 2285 2286 2287 2288
static const struct rpc_timeout xs_tcp_default_timeout = {
	.to_initval = 60 * HZ,
	.to_maxval = 60 * HZ,
	.to_retries = 2,
};

2289 2290
/**
 * xs_setup_tcp - Set up transport to use a TCP socket
2291
 * @args: rpc transport creation arguments
2292 2293
 *
 */
2294
static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
2295
{
2296
	struct sockaddr *addr = args->dstaddr;
2297
	struct rpc_xprt *xprt;
2298
	struct sock_xprt *transport;
2299

2300
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
2301 2302
	if (IS_ERR(xprt))
		return xprt;
2303
	transport = container_of(xprt, struct sock_xprt, xprt);
2304

2305
	xprt->prot = IPPROTO_TCP;
2306 2307
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2308

2309 2310 2311 2312
	xprt->bind_timeout = XS_BIND_TO;
	xprt->connect_timeout = XS_TCP_CONN_TO;
	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2313

2314
	xprt->ops = &xs_tcp_ops;
2315
	xprt->timeout = &xs_tcp_default_timeout;
2316

2317 2318 2319 2320 2321 2322
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

		INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_connect_worker4);
2323
		xs_format_ipv4_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP);
2324 2325 2326 2327 2328 2329
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

		INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_connect_worker6);
2330
		xs_format_ipv6_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6);
2331 2332 2333 2334 2335 2336
		break;
	default:
		kfree(xprt);
		return ERR_PTR(-EAFNOSUPPORT);
	}

2337
	dprintk("RPC:       set up transport to address %s\n",
2338
			xprt->address_strings[RPC_DISPLAY_ALL]);
2339

2340 2341 2342 2343 2344 2345
	if (try_module_get(THIS_MODULE))
		return xprt;

	kfree(xprt->slot);
	kfree(xprt);
	return ERR_PTR(-EINVAL);
2346
}
2347

2348 2349 2350 2351
static struct xprt_class	xs_udp_transport = {
	.list		= LIST_HEAD_INIT(xs_udp_transport.list),
	.name		= "udp",
	.owner		= THIS_MODULE,
2352
	.ident		= IPPROTO_UDP,
2353 2354 2355 2356 2357 2358 2359
	.setup		= xs_setup_udp,
};

static struct xprt_class	xs_tcp_transport = {
	.list		= LIST_HEAD_INIT(xs_tcp_transport.list),
	.name		= "tcp",
	.owner		= THIS_MODULE,
2360
	.ident		= IPPROTO_TCP,
2361 2362 2363
	.setup		= xs_setup_tcp,
};

2364
/**
2365
 * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
2366 2367 2368 2369
 *
 */
int init_socket_xprt(void)
{
2370
#ifdef RPC_DEBUG
2371
	if (!sunrpc_table_header)
2372
		sunrpc_table_header = register_sysctl_table(sunrpc_table);
2373 2374
#endif

2375 2376 2377
	xprt_register_transport(&xs_udp_transport);
	xprt_register_transport(&xs_tcp_transport);

2378 2379 2380 2381
	return 0;
}

/**
2382
 * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
2383 2384 2385 2386
 *
 */
void cleanup_socket_xprt(void)
{
2387 2388 2389 2390 2391 2392
#ifdef RPC_DEBUG
	if (sunrpc_table_header) {
		unregister_sysctl_table(sunrpc_table_header);
		sunrpc_table_header = NULL;
	}
#endif
2393 2394 2395

	xprt_unregister_transport(&xs_udp_transport);
	xprt_unregister_transport(&xs_tcp_transport);
2396
}