svcsock.c 41.6 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7
/*
 * linux/net/sunrpc/svcsock.c
 *
 * These are the RPC server socket internals.
 *
 * The server scheduling algorithm does not always distribute the load
 * evenly when servicing a single client. May need to modify the
8
 * svc_xprt_enqueue procedure...
L
Linus Torvalds 已提交
9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * TCP support is largely untested and may be a little slow. The problem
 * is that we currently do two separate recvfrom's, one for the 4-byte
 * record length, and the second for the actual record. This could possibly
 * be improved by always reading a minimum size of around 100 bytes and
 * tucking any superfluous bytes away in a temporary store. Still, that
 * leaves write requests out in the rain. An alternative may be to peek at
 * the first skb in the queue, and if it matches the next TCP sequence
 * number, to extract the record marker. Yuck.
 *
 * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
 */

22
#include <linux/kernel.h>
L
Linus Torvalds 已提交
23 24 25 26 27 28 29
#include <linux/sched.h>
#include <linux/errno.h>
#include <linux/fcntl.h>
#include <linux/net.h>
#include <linux/in.h>
#include <linux/inet.h>
#include <linux/udp.h>
30
#include <linux/tcp.h>
L
Linus Torvalds 已提交
31 32 33 34
#include <linux/unistd.h>
#include <linux/slab.h>
#include <linux/netdevice.h>
#include <linux/skbuff.h>
35
#include <linux/file.h>
36
#include <linux/freezer.h>
L
Linus Torvalds 已提交
37 38 39
#include <net/sock.h>
#include <net/checksum.h>
#include <net/ip.h>
40
#include <net/ipv6.h>
41
#include <net/tcp.h>
42
#include <net/tcp_states.h>
L
Linus Torvalds 已提交
43 44 45 46
#include <asm/uaccess.h>
#include <asm/ioctls.h>

#include <linux/sunrpc/types.h>
47
#include <linux/sunrpc/clnt.h>
L
Linus Torvalds 已提交
48
#include <linux/sunrpc/xdr.h>
49
#include <linux/sunrpc/msg_prot.h>
L
Linus Torvalds 已提交
50 51
#include <linux/sunrpc/svcsock.h>
#include <linux/sunrpc/stats.h>
52
#include <linux/sunrpc/xprt.h>
L
Linus Torvalds 已提交
53

54
#define RPCDBG_FACILITY	RPCDBG_SVCXPRT
L
Linus Torvalds 已提交
55 56 57


static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
58
					 int *errp, int flags);
L
Linus Torvalds 已提交
59 60 61
static void		svc_udp_data_ready(struct sock *, int);
static int		svc_udp_recvfrom(struct svc_rqst *);
static int		svc_udp_sendto(struct svc_rqst *);
62
static void		svc_sock_detach(struct svc_xprt *);
63
static void		svc_tcp_sock_detach(struct svc_xprt *);
64
static void		svc_sock_free(struct svc_xprt *);
L
Linus Torvalds 已提交
65

66
static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
67 68
					  struct net *, struct sockaddr *,
					  int, int);
69 70 71 72 73 74 75
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);
#endif /* CONFIG_NFS_V4_1 */

76 77 78 79
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key svc_key[2];
static struct lock_class_key svc_slock_key[2];

80
static void svc_reclassify_socket(struct socket *sock)
81 82
{
	struct sock *sk = sock->sk;
83
	BUG_ON(sock_owned_by_user(sk));
84 85 86
	switch (sk->sk_family) {
	case AF_INET:
		sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
87 88 89
					      &svc_slock_key[0],
					      "sk_xprt.xpt_lock-AF_INET-NFSD",
					      &svc_key[0]);
90 91 92 93
		break;

	case AF_INET6:
		sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
94 95 96
					      &svc_slock_key[1],
					      "sk_xprt.xpt_lock-AF_INET6-NFSD",
					      &svc_key[1]);
97 98 99 100 101 102 103
		break;

	default:
		BUG();
	}
}
#else
104
static void svc_reclassify_socket(struct socket *sock)
105 106 107 108
{
}
#endif

L
Linus Torvalds 已提交
109 110 111
/*
 * Release an skbuff after use
 */
112
static void svc_release_skb(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
113
{
114
	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
L
Linus Torvalds 已提交
115 116

	if (skb) {
117 118
		struct svc_sock *svsk =
			container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
119
		rqstp->rq_xprt_ctxt = NULL;
L
Linus Torvalds 已提交
120 121

		dprintk("svc: service %p, releasing skb %p\n", rqstp, skb);
122
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
123 124 125
	}
}

126 127 128 129
union svc_pktinfo_u {
	struct in_pktinfo pkti;
	struct in6_pktinfo pkti6;
};
130 131
#define SVC_PKTINFO_SPACE \
	CMSG_SPACE(sizeof(union svc_pktinfo_u))
132 133 134

static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
{
135 136 137
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	switch (svsk->sk_sk->sk_family) {
138 139 140 141 142 143 144 145 146 147
	case AF_INET: {
			struct in_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IP;
			cmh->cmsg_type = IP_PKTINFO;
			pki->ipi_ifindex = 0;
			pki->ipi_spec_dst.s_addr = rqstp->rq_daddr.addr.s_addr;
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
148

149 150 151 152 153 154 155 156 157 158 159 160 161 162
	case AF_INET6: {
			struct in6_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IPV6;
			cmh->cmsg_type = IPV6_PKTINFO;
			pki->ipi6_ifindex = 0;
			ipv6_addr_copy(&pki->ipi6_addr,
					&rqstp->rq_daddr.addr6);
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
	}
}

L
Linus Torvalds 已提交
163
/*
164
 * send routine intended to be shared by the fore- and back-channel
L
Linus Torvalds 已提交
165
 */
166 167 168
int svc_send_common(struct socket *sock, struct xdr_buf *xdr,
		    struct page *headpage, unsigned long headoffset,
		    struct page *tailpage, unsigned long tailoffset)
L
Linus Torvalds 已提交
169 170 171 172 173 174 175
{
	int		result;
	int		size;
	struct page	**ppage = xdr->pages;
	size_t		base = xdr->page_base;
	unsigned int	pglen = xdr->page_len;
	unsigned int	flags = MSG_MORE;
176 177
	int		slen;
	int		len = 0;
L
Linus Torvalds 已提交
178 179 180 181 182 183

	slen = xdr->len;

	/* send head */
	if (slen == xdr->head[0].iov_len)
		flags = 0;
184
	len = kernel_sendpage(sock, headpage, headoffset,
185
				  xdr->head[0].iov_len, flags);
L
Linus Torvalds 已提交
186 187 188 189 190 191 192 193 194 195 196
	if (len != xdr->head[0].iov_len)
		goto out;
	slen -= xdr->head[0].iov_len;
	if (slen == 0)
		goto out;

	/* send page data */
	size = PAGE_SIZE - base < pglen ? PAGE_SIZE - base : pglen;
	while (pglen > 0) {
		if (slen == size)
			flags = 0;
197
		result = kernel_sendpage(sock, *ppage, base, size, flags);
L
Linus Torvalds 已提交
198 199 200 201 202 203 204 205 206 207
		if (result > 0)
			len += result;
		if (result != size)
			goto out;
		slen -= size;
		pglen -= size;
		size = PAGE_SIZE < pglen ? PAGE_SIZE : pglen;
		base = 0;
		ppage++;
	}
208

L
Linus Torvalds 已提交
209 210
	/* send tail */
	if (xdr->tail[0].iov_len) {
211 212
		result = kernel_sendpage(sock, tailpage, tailoffset,
				   xdr->tail[0].iov_len, 0);
L
Linus Torvalds 已提交
213 214 215
		if (result > 0)
			len += result;
	}
216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

out:
	return len;
}


/*
 * Generic sendto routine
 */
static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct socket	*sock = svsk->sk_sock;
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
	int		len = 0;
	unsigned long tailoff;
	unsigned long headoff;
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);

	if (rqstp->rq_prot == IPPROTO_UDP) {
		struct msghdr msg = {
			.msg_name	= &rqstp->rq_addr,
			.msg_namelen	= rqstp->rq_addrlen,
			.msg_control	= cmh,
			.msg_controllen	= sizeof(buffer),
			.msg_flags	= MSG_MORE,
		};

		svc_set_cmsg_data(rqstp, cmh);

		if (sock_sendmsg(sock, &msg, 0) < 0)
			goto out;
	}

	tailoff = ((unsigned long)xdr->tail[0].iov_base) & (PAGE_SIZE-1);
	headoff = 0;
	len = svc_send_common(sock, xdr, rqstp->rq_respages[0], headoff,
			       rqstp->rq_respages[0], tailoff);

L
Linus Torvalds 已提交
260
out:
261
	dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
262
		svsk, xdr->head[0].iov_base, xdr->head[0].iov_len,
263
		xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
L
Linus Torvalds 已提交
264 265 266 267

	return len;
}

268 269 270
/*
 * Report socket names for nfsdfs
 */
271
static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
272
{
C
Chuck Lever 已提交
273 274 275
	const struct sock *sk = svsk->sk_sk;
	const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
							"udp" : "tcp";
276 277
	int len;

C
Chuck Lever 已提交
278
	switch (sk->sk_family) {
279 280
	case PF_INET:
		len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
C
Chuck Lever 已提交
281
				proto_name,
E
Eric Dumazet 已提交
282 283
				&inet_sk(sk)->inet_rcv_saddr,
				inet_sk(sk)->inet_num);
284
		break;
285 286
	case PF_INET6:
		len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
C
Chuck Lever 已提交
287 288
				proto_name,
				&inet6_sk(sk)->rcv_saddr,
E
Eric Dumazet 已提交
289
				inet_sk(sk)->inet_num);
290 291
		break;
	default:
292
		len = snprintf(buf, remaining, "*unknown-%d*\n",
C
Chuck Lever 已提交
293
				sk->sk_family);
294
	}
295 296 297 298

	if (len >= remaining) {
		*buf = '\0';
		return -ENAMETOOLONG;
299 300 301 302
	}
	return len;
}

303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319
/**
 * svc_sock_names - construct a list of listener names in a string
 * @serv: pointer to RPC service
 * @buf: pointer to a buffer to fill in with socket names
 * @buflen: size of the buffer to be filled
 * @toclose: pointer to '\0'-terminated C string containing the name
 *		of a listener to be closed
 *
 * Fills in @buf with a '\n'-separated list of names of listener
 * sockets.  If @toclose is not NULL, the socket named by @toclose
 * is closed, and is not included in the output list.
 *
 * Returns positive length of the socket name string, or a negative
 * errno value on error.
 */
int svc_sock_names(struct svc_serv *serv, char *buf, const size_t buflen,
		   const char *toclose)
320
{
321
	struct svc_sock *svsk, *closesk = NULL;
322 323 324 325
	int len = 0;

	if (!serv)
		return 0;
326

327
	spin_lock_bh(&serv->sv_lock);
328
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list) {
329 330 331 332 333
		int onelen = svc_one_sock_name(svsk, buf + len, buflen - len);
		if (onelen < 0) {
			len = onelen;
			break;
		}
334
		if (toclose && strcmp(toclose, buf + len) == 0) {
335
			closesk = svsk;
336 337
			svc_xprt_get(&closesk->sk_xprt);
		} else
338
			len += onelen;
339
	}
340
	spin_unlock_bh(&serv->sv_lock);
341

342
	if (closesk) {
343 344 345
		/* Should unregister with portmap, but you cannot
		 * unregister just one protocol...
		 */
346
		svc_close_xprt(&closesk->sk_xprt);
347 348
		svc_xprt_put(&closesk->sk_xprt);
	} else if (toclose)
349
		return -ENOENT;
350 351
	return len;
}
352
EXPORT_SYMBOL_GPL(svc_sock_names);
353

L
Linus Torvalds 已提交
354 355 356
/*
 * Check input queue length
 */
357
static int svc_recv_available(struct svc_sock *svsk)
L
Linus Torvalds 已提交
358 359 360 361
{
	struct socket	*sock = svsk->sk_sock;
	int		avail, err;

362
	err = kernel_sock_ioctl(sock, TIOCINQ, (unsigned long) &avail);
L
Linus Torvalds 已提交
363 364 365 366 367 368 369

	return (err >= 0)? avail : err;
}

/*
 * Generic recvfrom routine.
 */
370 371
static int svc_recvfrom(struct svc_rqst *rqstp, struct kvec *iov, int nr,
			int buflen)
L
Linus Torvalds 已提交
372
{
373 374
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
375 376 377 378
	struct msghdr msg = {
		.msg_flags	= MSG_DONTWAIT,
	};
	int len;
L
Linus Torvalds 已提交
379

380 381
	rqstp->rq_xprt_hlen = 0;

382 383
	len = kernel_recvmsg(svsk->sk_sock, &msg, iov, nr, buflen,
				msg.msg_flags);
L
Linus Torvalds 已提交
384 385

	dprintk("svc: socket %p recvfrom(%p, %Zu) = %d\n",
386
		svsk, iov[0].iov_base, iov[0].iov_len, len);
L
Linus Torvalds 已提交
387 388 389 390 391 392
	return len;
}

/*
 * Set socket snd and rcv buffer lengths
 */
393 394
static void svc_sock_setbufsize(struct socket *sock, unsigned int snd,
				unsigned int rcv)
L
Linus Torvalds 已提交
395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411
{
#if 0
	mm_segment_t	oldfs;
	oldfs = get_fs(); set_fs(KERNEL_DS);
	sock_setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
			(char*)&snd, sizeof(snd));
	sock_setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
			(char*)&rcv, sizeof(rcv));
#else
	/* sock_setsockopt limits use to sysctl_?mem_max,
	 * which isn't acceptable.  Until that is made conditional
	 * on not having CAP_SYS_RESOURCE or similar, we go direct...
	 * DaveM said I could!
	 */
	lock_sock(sock->sk);
	sock->sk->sk_sndbuf = snd * 2;
	sock->sk->sk_rcvbuf = rcv * 2;
412
	sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK|SOCK_RCVBUF_LOCK;
413
	sock->sk->sk_write_space(sock->sk);
L
Linus Torvalds 已提交
414 415 416 417 418 419
	release_sock(sock->sk);
#endif
}
/*
 * INET callback when data has been received on the socket.
 */
420
static void svc_udp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
421
{
422
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
423
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
424

425 426
	if (svsk) {
		dprintk("svc: socket %p(inet %p), count=%d, busy=%d\n",
427 428 429
			svsk, sk, count,
			test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
430
		svc_xprt_enqueue(&svsk->sk_xprt);
431
	}
432 433
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
434 435 436 437 438
}

/*
 * INET callback when space is newly available on the socket.
 */
439
static void svc_write_space(struct sock *sk)
L
Linus Torvalds 已提交
440 441
{
	struct svc_sock	*svsk = (struct svc_sock *)(sk->sk_user_data);
442
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
443 444 445

	if (svsk) {
		dprintk("svc: socket %p(inet %p), write_space busy=%d\n",
446
			svsk, sk, test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
447
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
448 449
	}

450
	if (wq && waitqueue_active(wq)) {
451
		dprintk("RPC svc_write_space: someone sleeping on %p\n",
L
Linus Torvalds 已提交
452
		       svsk);
453
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
454 455 456
	}
}

457 458 459 460 461 462 463 464 465
static void svc_tcp_write_space(struct sock *sk)
{
	struct socket *sock = sk->sk_socket;

	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk) && sock)
		clear_bit(SOCK_NOSPACE, &sock->flags);
	svc_write_space(sk);
}

466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491
/*
 * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
 */
static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IP_PKTINFO)
		return 0;
	rqstp->rq_daddr.addr.s_addr = pki->ipi_spec_dst.s_addr;
	return 1;
}

/*
 * See net/ipv6/datagram.c : datagram_recv_ctl
 */
static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in6_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IPV6_PKTINFO)
		return 0;
	ipv6_addr_copy(&rqstp->rq_daddr.addr6, &pki->ipi6_addr);
	return 1;
}

492 493 494 495 496 497 498
/*
 * Copy the UDP datagram's destination address to the rqstp structure.
 * The 'destination' address in this case is the address to which the
 * peer sent the datagram, i.e. our local address. For multihomed
 * hosts, this can change from msg to msg. Note that only the IP
 * address changes, the port number should remain the same.
 */
499 500
static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
				    struct cmsghdr *cmh)
501
{
502 503 504 505 506
	switch (cmh->cmsg_level) {
	case SOL_IP:
		return svc_udp_get_dest_address4(rqstp, cmh);
	case SOL_IPV6:
		return svc_udp_get_dest_address6(rqstp, cmh);
507
	}
508 509

	return 0;
510 511
}

L
Linus Torvalds 已提交
512 513 514
/*
 * Receive a datagram from a UDP socket.
 */
515
static int svc_udp_recvfrom(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
516
{
517 518
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
519
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
520
	struct sk_buff	*skb;
521 522 523 524 525
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
526 527 528 529 530 531
	struct msghdr msg = {
		.msg_name = svc_addr(rqstp),
		.msg_control = cmh,
		.msg_controllen = sizeof(buffer),
		.msg_flags = MSG_DONTWAIT,
	};
532 533
	size_t len;
	int err;
L
Linus Torvalds 已提交
534

535
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
L
Linus Torvalds 已提交
536 537 538
	    /* udp sockets need large rcvbuf as all pending
	     * requests are still in that buffer.  sndbuf must
	     * also be large enough that there is enough space
539 540 541 542
	     * for one reply per thread.  We count all threads
	     * rather than threads in a particular pool, which
	     * provides an upper bound on the number of threads
	     * which will access the socket.
L
Linus Torvalds 已提交
543 544
	     */
	    svc_sock_setbufsize(svsk->sk_sock,
545 546
				(serv->sv_nrthreads+3) * serv->sv_max_mesg,
				(serv->sv_nrthreads+3) * serv->sv_max_mesg);
L
Linus Torvalds 已提交
547

548
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
549 550 551 552 553 554 555 556 557 558
	skb = NULL;
	err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
			     0, 0, MSG_PEEK | MSG_DONTWAIT);
	if (err >= 0)
		skb = skb_recv_datagram(svsk->sk_sk, 0, 1, &err);

	if (skb == NULL) {
		if (err != -EAGAIN) {
			/* possibly an icmp error */
			dprintk("svc: recvfrom returned error %d\n", -err);
559
			set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
560
		}
561
		return -EAGAIN;
L
Linus Torvalds 已提交
562
	}
563
	len = svc_addr_len(svc_addr(rqstp));
564 565
	if (len == 0)
		return -EAFNOSUPPORT;
566
	rqstp->rq_addrlen = len;
567 568
	if (skb->tstamp.tv64 == 0) {
		skb->tstamp = ktime_get_real();
569
		/* Don't enable netstamp, sunrpc doesn't
L
Linus Torvalds 已提交
570 571
		   need that much accuracy */
	}
572
	svsk->sk_sk->sk_stamp = skb->tstamp;
573
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
L
Linus Torvalds 已提交
574 575 576 577

	len  = skb->len - sizeof(struct udphdr);
	rqstp->rq_arg.len = len;

578
	rqstp->rq_prot = IPPROTO_UDP;
579

580
	if (!svc_udp_get_dest_address(rqstp, cmh)) {
581
		if (net_ratelimit())
582 583 584 585
			printk(KERN_WARNING
				"svc: received unknown control message %d/%d; "
				"dropping RPC reply datagram\n",
					cmh->cmsg_level, cmh->cmsg_type);
586
		skb_free_datagram_locked(svsk->sk_sk, skb);
587 588
		return 0;
	}
L
Linus Torvalds 已提交
589 590 591 592 593 594 595

	if (skb_is_nonlinear(skb)) {
		/* we have to copy */
		local_bh_disable();
		if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb)) {
			local_bh_enable();
			/* checksum error */
596
			skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
597 598 599
			return 0;
		}
		local_bh_enable();
600
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
601 602
	} else {
		/* we can use it in-place */
603 604
		rqstp->rq_arg.head[0].iov_base = skb->data +
			sizeof(struct udphdr);
L
Linus Torvalds 已提交
605
		rqstp->rq_arg.head[0].iov_len = len;
606
		if (skb_checksum_complete(skb)) {
607
			skb_free_datagram_locked(svsk->sk_sk, skb);
608
			return 0;
L
Linus Torvalds 已提交
609
		}
610
		rqstp->rq_xprt_ctxt = skb;
L
Linus Torvalds 已提交
611 612 613 614 615 616
	}

	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
617
		rqstp->rq_respages = rqstp->rq_pages+1;
L
Linus Torvalds 已提交
618 619
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
620
		rqstp->rq_respages = rqstp->rq_pages + 1 +
621
			DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
L
Linus Torvalds 已提交
622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642
	}

	if (serv->sv_stats)
		serv->sv_stats->netudpcnt++;

	return len;
}

static int
svc_udp_sendto(struct svc_rqst *rqstp)
{
	int		error;

	error = svc_sendto(rqstp, &rqstp->rq_res);
	if (error == -ECONNREFUSED)
		/* ICMP error on earlier request. */
		error = svc_sendto(rqstp, &rqstp->rq_res);

	return error;
}

T
Tom Tucker 已提交
643 644 645 646
static void svc_udp_prep_reply_hdr(struct svc_rqst *rqstp)
{
}

647 648 649
static int svc_udp_has_wspace(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
650
	struct svc_serv	*serv = xprt->xpt_server;
651 652 653 654 655 656 657
	unsigned long required;

	/*
	 * Set the SOCK_NOSPACE flag before checking the available
	 * sock space.
	 */
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
T
Tom Tucker 已提交
658
	required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
659 660 661 662 663 664
	if (required*2 > sock_wspace(svsk->sk_sk))
		return 0;
	clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
	return 1;
}

665 666 667 668 669 670
static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
{
	BUG();
	return NULL;
}

671
static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
672
				       struct net *net,
673 674 675
				       struct sockaddr *sa, int salen,
				       int flags)
{
676
	return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
677 678
}

679
static struct svc_xprt_ops svc_udp_ops = {
680
	.xpo_create = svc_udp_create,
681 682
	.xpo_recvfrom = svc_udp_recvfrom,
	.xpo_sendto = svc_udp_sendto,
683
	.xpo_release_rqst = svc_release_skb,
684 685
	.xpo_detach = svc_sock_detach,
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
686
	.xpo_prep_reply_hdr = svc_udp_prep_reply_hdr,
687
	.xpo_has_wspace = svc_udp_has_wspace,
688
	.xpo_accept = svc_udp_accept,
689 690 691 692
};

static struct svc_xprt_class svc_udp_class = {
	.xcl_name = "udp",
693
	.xcl_owner = THIS_MODULE,
694
	.xcl_ops = &svc_udp_ops,
695
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
696 697
};

698
static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
699
{
700
	int err, level, optname, one = 1;
701

702
	svc_xprt_init(&svc_udp_class, &svsk->sk_xprt, serv);
703
	clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
704 705 706 707
	svsk->sk_sk->sk_data_ready = svc_udp_data_ready;
	svsk->sk_sk->sk_write_space = svc_write_space;

	/* initialise setting must have enough space to
708
	 * receive and respond to one request.
L
Linus Torvalds 已提交
709 710 711
	 * svc_udp_recvfrom will re-adjust if necessary
	 */
	svc_sock_setbufsize(svsk->sk_sock,
712 713
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);
L
Linus Torvalds 已提交
714

715 716
	/* data might have come in before data_ready set up */
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
717
	set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
718 719

	/* make sure we get destination address info */
720 721 722 723 724 725 726 727 728 729 730 731 732 733 734
	switch (svsk->sk_sk->sk_family) {
	case AF_INET:
		level = SOL_IP;
		optname = IP_PKTINFO;
		break;
	case AF_INET6:
		level = SOL_IPV6;
		optname = IPV6_RECVPKTINFO;
		break;
	default:
		BUG();
	}
	err = kernel_setsockopt(svsk->sk_sock, level, optname,
					(char *)&one, sizeof(one));
	dprintk("svc: kernel_setsockopt returned %d\n", err);
L
Linus Torvalds 已提交
735 736 737 738 739 740
}

/*
 * A data_ready event on a listening socket means there's a connection
 * pending. Do not use state_change as a substitute for it.
 */
741
static void svc_tcp_listen_data_ready(struct sock *sk, int count_unused)
L
Linus Torvalds 已提交
742
{
743
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
744
	wait_queue_head_t *wq;
L
Linus Torvalds 已提交
745 746

	dprintk("svc: socket %p TCP (listen) state change %d\n",
747
		sk, sk->sk_state);
L
Linus Torvalds 已提交
748

749 750 751 752 753 754 755 756 757 758 759 760
	/*
	 * This callback may called twice when a new connection
	 * is established as a child socket inherits everything
	 * from a parent LISTEN socket.
	 * 1) data_ready method of the parent socket will be called
	 *    when one of child sockets become ESTABLISHED.
	 * 2) data_ready method of the child socket may be called
	 *    when it receives data before the socket is accepted.
	 * In case of 2, we should ignore it silently.
	 */
	if (sk->sk_state == TCP_LISTEN) {
		if (svsk) {
761
			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
762
			svc_xprt_enqueue(&svsk->sk_xprt);
763 764
		} else
			printk("svc: socket %p: no user data\n", sk);
L
Linus Torvalds 已提交
765
	}
766

767 768 769
	wq = sk_sleep(sk);
	if (wq && waitqueue_active(wq))
		wake_up_interruptible_all(wq);
L
Linus Torvalds 已提交
770 771 772 773 774
}

/*
 * A state change on a connected socket means it's dying or dead.
 */
775
static void svc_tcp_state_change(struct sock *sk)
L
Linus Torvalds 已提交
776
{
777
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
778
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
779 780

	dprintk("svc: socket %p TCP (connected) state change %d (svsk %p)\n",
781
		sk, sk->sk_state, sk->sk_user_data);
L
Linus Torvalds 已提交
782

783
	if (!svsk)
L
Linus Torvalds 已提交
784
		printk("svc: socket %p: no user data\n", sk);
785
	else {
786
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
787
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
788
	}
789 790
	if (wq && waitqueue_active(wq))
		wake_up_interruptible_all(wq);
L
Linus Torvalds 已提交
791 792
}

793
static void svc_tcp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
794
{
795
	struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
796
	wait_queue_head_t *wq = sk_sleep(sk);
L
Linus Torvalds 已提交
797 798

	dprintk("svc: socket %p TCP data ready (svsk %p)\n",
799 800
		sk, sk->sk_user_data);
	if (svsk) {
801
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
802
		svc_xprt_enqueue(&svsk->sk_xprt);
803
	}
804 805
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
L
Linus Torvalds 已提交
806 807 808 809 810
}

/*
 * Accept a TCP connection
 */
811
static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
L
Linus Torvalds 已提交
812
{
813
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
814 815
	struct sockaddr_storage addr;
	struct sockaddr	*sin = (struct sockaddr *) &addr;
816
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
817 818 819 820
	struct socket	*sock = svsk->sk_sock;
	struct socket	*newsock;
	struct svc_sock	*newsvsk;
	int		err, slen;
821
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
822 823 824

	dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
	if (!sock)
825
		return NULL;
L
Linus Torvalds 已提交
826

827
	clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
828 829
	err = kernel_accept(sock, &newsock, O_NONBLOCK);
	if (err < 0) {
L
Linus Torvalds 已提交
830 831 832
		if (err == -ENOMEM)
			printk(KERN_WARNING "%s: no more sockets!\n",
			       serv->sv_name);
833
		else if (err != -EAGAIN && net_ratelimit())
L
Linus Torvalds 已提交
834 835
			printk(KERN_WARNING "%s: accept failed (err %d)!\n",
				   serv->sv_name, -err);
836
		return NULL;
L
Linus Torvalds 已提交
837
	}
838
	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
839

840
	err = kernel_getpeername(newsock, sin, &slen);
L
Linus Torvalds 已提交
841 842 843 844 845 846 847 848
	if (err < 0) {
		if (net_ratelimit())
			printk(KERN_WARNING "%s: peername failed (err %d)!\n",
				   serv->sv_name, -err);
		goto failed;		/* aborted connection or whatever */
	}

	/* Ideally, we would want to reject connections from unauthorized
849 850
	 * hosts here, but when we get encryption, the IP of the host won't
	 * tell us anything.  For now just warn about unpriv connections.
L
Linus Torvalds 已提交
851
	 */
852
	if (!svc_port_is_privileged(sin)) {
L
Linus Torvalds 已提交
853
		dprintk(KERN_WARNING
854
			"%s: connect from unprivileged port: %s\n",
855
			serv->sv_name,
856
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
857
	}
858
	dprintk("%s: connect from %s\n", serv->sv_name,
859
		__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
860 861 862 863 864 865

	/* make sure that a write doesn't block forever when
	 * low on memory
	 */
	newsock->sk->sk_sndtimeo = HZ*30;

866 867
	if (!(newsvsk = svc_setup_socket(serv, newsock, &err,
				 (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY))))
L
Linus Torvalds 已提交
868
		goto failed;
869
	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
870 871 872 873 874
	err = kernel_getsockname(newsock, sin, &slen);
	if (unlikely(err < 0)) {
		dprintk("svc_tcp_accept: kernel_getsockname error %d\n", -err);
		slen = offsetof(struct sockaddr, sa_data);
	}
875
	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
876

877 878 879 880 881 882 883 884 885 886
	if (serv->sv_stats)
		serv->sv_stats->nettcpconn++;

	return &newsvsk->sk_xprt;

failed:
	sock_release(newsock);
	return NULL;
}

L
Linus Torvalds 已提交
887
/*
888 889 890 891
 * Receive data.
 * If we haven't gotten the record length yet, get the next four bytes.
 * Otherwise try to gobble up as much as possible up to the complete
 * record length.
L
Linus Torvalds 已提交
892
 */
893
static int svc_tcp_recv_record(struct svc_sock *svsk, struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
894
{
895
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
896
	unsigned int want;
897
	int len;
L
Linus Torvalds 已提交
898

899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
		/* sndbuf needs to have room for one request
		 * per thread, otherwise we can stall even when the
		 * network isn't a bottleneck.
		 *
		 * We count all threads rather than threads in a
		 * particular pool, which provides an upper bound
		 * on the number of threads which will access the socket.
		 *
		 * rcvbuf just needs to be able to hold a few requests.
		 * Normally they will be removed from the queue
		 * as soon a a complete request arrives.
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    (serv->sv_nrthreads+3) * serv->sv_max_mesg,
				    3 * serv->sv_max_mesg);

916
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
917

918
	if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
L
Linus Torvalds 已提交
919 920
		struct kvec	iov;

921
		want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
L
Linus Torvalds 已提交
922 923 924 925 926 927 928
		iov.iov_base = ((char *) &svsk->sk_reclen) + svsk->sk_tcplen;
		iov.iov_len  = want;
		if ((len = svc_recvfrom(rqstp, &iov, 1, want)) < 0)
			goto error;
		svsk->sk_tcplen += len;

		if (len < want) {
929 930
			dprintk("svc: short recvfrom while reading record "
				"length (%d of %d)\n", len, want);
931
			goto err_again; /* record header not complete */
L
Linus Torvalds 已提交
932 933 934
		}

		svsk->sk_reclen = ntohl(svsk->sk_reclen);
935
		if (!(svsk->sk_reclen & RPC_LAST_STREAM_FRAGMENT)) {
L
Linus Torvalds 已提交
936 937 938 939 940
			/* FIXME: technically, a record can be fragmented,
			 *  and non-terminal fragments will not have the top
			 *  bit set in the fragment length header.
			 *  But apparently no known nfs clients send fragmented
			 *  records. */
941
			if (net_ratelimit())
942 943
				printk(KERN_NOTICE "RPC: multiple fragments "
					"per record not supported\n");
L
Linus Torvalds 已提交
944 945
			goto err_delete;
		}
946

947
		svsk->sk_reclen &= RPC_FRAGMENT_SIZE_MASK;
L
Linus Torvalds 已提交
948
		dprintk("svc: TCP record, %d bytes\n", svsk->sk_reclen);
949
		if (svsk->sk_reclen > serv->sv_max_mesg) {
950
			if (net_ratelimit())
951 952 953
				printk(KERN_NOTICE "RPC: "
					"fragment too large: 0x%08lx\n",
					(unsigned long)svsk->sk_reclen);
L
Linus Torvalds 已提交
954 955 956 957
			goto err_delete;
		}
	}

958 959 960
	if (svsk->sk_reclen < 8)
		goto err_delete; /* client is nuts. */

L
Linus Torvalds 已提交
961 962 963 964 965 966 967 968
	/* Check whether enough data is available */
	len = svc_recv_available(svsk);
	if (len < 0)
		goto error;

	if (len < svsk->sk_reclen) {
		dprintk("svc: incomplete TCP record (%d of %d)\n",
			len, svsk->sk_reclen);
969
		goto err_again;	/* record not complete */
L
Linus Torvalds 已提交
970 971 972
	}
	len = svsk->sk_reclen;

973 974
	return len;
 error:
975
	if (len == -EAGAIN)
976 977 978 979 980 981 982 983
		dprintk("RPC: TCP recv_record got EAGAIN\n");
	return len;
 err_delete:
	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
 err_again:
	return -EAGAIN;
}

984 985 986 987
static int svc_process_calldir(struct svc_sock *svsk, struct svc_rqst *rqstp,
			       struct rpc_rqst **reqpp, struct kvec *vec)
{
	struct rpc_rqst *req = NULL;
988 989 990
	__be32 *p;
	__be32 xid;
	__be32 calldir;
991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005
	int len;

	len = svc_recvfrom(rqstp, vec, 1, 8);
	if (len < 0)
		goto error;

	p = (u32 *)rqstp->rq_arg.head[0].iov_base;
	xid = *p++;
	calldir = *p;

	if (calldir == 0) {
		/* REQUEST is the most common case */
		vec[0] = rqstp->rq_arg.head[0];
	} else {
		/* REPLY */
1006 1007 1008 1009
		struct rpc_xprt *bc_xprt = svsk->sk_xprt.xpt_bc_xprt;

		if (bc_xprt)
			req = xprt_lookup_rqst(bc_xprt, xid);
1010 1011 1012 1013

		if (!req) {
			printk(KERN_NOTICE
				"%s: Got unrecognized reply: "
1014
				"calldir 0x%x xpt_bc_xprt %p xid %08x\n",
1015
				__func__, ntohl(calldir),
1016
				bc_xprt, xid);
1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036
			vec[0] = rqstp->rq_arg.head[0];
			goto out;
		}

		memcpy(&req->rq_private_buf, &req->rq_rcv_buf,
		       sizeof(struct xdr_buf));
		/* copy the xid and call direction */
		memcpy(req->rq_private_buf.head[0].iov_base,
		       rqstp->rq_arg.head[0].iov_base, 8);
		vec[0] = req->rq_private_buf.head[0];
	}
 out:
	vec[0].iov_base += 8;
	vec[0].iov_len -= 8;
	len = svsk->sk_reclen - 8;
 error:
	*reqpp = req;
	return len;
}

1037 1038 1039 1040 1041 1042 1043 1044 1045 1046
/*
 * Receive data from a TCP socket.
 */
static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
	int		len;
	struct kvec *vec;
1047
	struct rpc_rqst *req = NULL;
1048 1049
	unsigned int vlen;
	int pnum;
1050 1051 1052 1053 1054 1055 1056 1057 1058 1059

	dprintk("svc: tcp_recv %p data %d conn %d close %d\n",
		svsk, test_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags));

	len = svc_tcp_recv_record(svsk, rqstp);
	if (len < 0)
		goto error;

1060
	vec = rqstp->rq_vec;
L
Linus Torvalds 已提交
1061 1062
	vec[0] = rqstp->rq_arg.head[0];
	vlen = PAGE_SIZE;
1063

1064 1065 1066 1067
	len = svc_process_calldir(svsk, rqstp, &req, vec);
	if (len < 0)
		goto err_again;
	vlen -= 8;
1068

L
Linus Torvalds 已提交
1069
	pnum = 1;
1070
	while (vlen < svsk->sk_reclen - 8) {
1071 1072 1073
		vec[pnum].iov_base = (req) ?
			page_address(req->rq_private_buf.pages[pnum - 1]) :
			page_address(rqstp->rq_pages[pnum]);
L
Linus Torvalds 已提交
1074 1075 1076 1077
		vec[pnum].iov_len = PAGE_SIZE;
		pnum++;
		vlen += PAGE_SIZE;
	}
1078
	rqstp->rq_respages = &rqstp->rq_pages[pnum];
L
Linus Torvalds 已提交
1079 1080

	/* Now receive data */
1081
	len = svc_recvfrom(rqstp, vec, pnum, svsk->sk_reclen - 8);
L
Linus Torvalds 已提交
1082
	if (len < 0)
1083
		goto err_again;
L
Linus Torvalds 已提交
1084

1085
	if (req) {
1086 1087
		xprt_complete_rqst(req->rq_task, svsk->sk_reclen);
		rqstp->rq_arg.len = 0;
1088 1089
		goto out;
	}
1090 1091
	dprintk("svc: TCP complete record (%d bytes)\n", svsk->sk_reclen);
	rqstp->rq_arg.len = svsk->sk_reclen;
L
Linus Torvalds 已提交
1092
	rqstp->rq_arg.page_base = 0;
1093 1094
	if (rqstp->rq_arg.len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = rqstp->rq_arg.len;
L
Linus Torvalds 已提交
1095
		rqstp->rq_arg.page_len = 0;
1096 1097
	} else
		rqstp->rq_arg.page_len = rqstp->rq_arg.len - rqstp->rq_arg.head[0].iov_len;
L
Linus Torvalds 已提交
1098

1099
	rqstp->rq_xprt_ctxt   = NULL;
L
Linus Torvalds 已提交
1100 1101
	rqstp->rq_prot	      = IPPROTO_TCP;

1102
out:
L
Linus Torvalds 已提交
1103 1104 1105
	/* Reset TCP read info */
	svsk->sk_reclen = 0;
	svsk->sk_tcplen = 0;
1106 1107 1108 1109
	/* If we have more data, signal svc_xprt_enqueue() to try again */
	if (svc_recv_available(svsk) > sizeof(rpc_fraghdr))
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);

L
Linus Torvalds 已提交
1110

1111
	svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
L
Linus Torvalds 已提交
1112 1113 1114
	if (serv->sv_stats)
		serv->sv_stats->nettcpcnt++;

1115
	return rqstp->rq_arg.len;
L
Linus Torvalds 已提交
1116

1117
err_again:
L
Linus Torvalds 已提交
1118 1119
	if (len == -EAGAIN) {
		dprintk("RPC: TCP recvfrom got EAGAIN\n");
1120 1121 1122 1123
		return len;
	}
error:
	if (len != -EAGAIN) {
L
Linus Torvalds 已提交
1124
		printk(KERN_NOTICE "%s: recvfrom returned errno %d\n",
1125
		       svsk->sk_xprt.xpt_server->sv_name, -len);
1126
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1127
	}
1128
	return -EAGAIN;
L
Linus Torvalds 已提交
1129 1130 1131 1132 1133
}

/*
 * Send out data on TCP socket.
 */
1134
static int svc_tcp_sendto(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
1135 1136 1137
{
	struct xdr_buf	*xbufp = &rqstp->rq_res;
	int sent;
1138
	__be32 reclen;
L
Linus Torvalds 已提交
1139 1140 1141 1142 1143 1144 1145 1146 1147 1148

	/* Set up the first element of the reply kvec.
	 * Any other kvecs that may be in use have been taken
	 * care of by the server implementation itself.
	 */
	reclen = htonl(0x80000000|((xbufp->len ) - 4));
	memcpy(xbufp->head[0].iov_base, &reclen, 4);

	sent = svc_sendto(rqstp, &rqstp->rq_res);
	if (sent != xbufp->len) {
1149 1150 1151
		printk(KERN_NOTICE
		       "rpc-srv/tcp: %s: %s %d when sending %d bytes "
		       "- shutting down socket\n",
1152
		       rqstp->rq_xprt->xpt_server->sv_name,
L
Linus Torvalds 已提交
1153 1154
		       (sent<0)?"got error":"sent only",
		       sent, xbufp->len);
1155
		set_bit(XPT_CLOSE, &rqstp->rq_xprt->xpt_flags);
1156
		svc_xprt_enqueue(rqstp->rq_xprt);
L
Linus Torvalds 已提交
1157 1158 1159 1160 1161
		sent = -EAGAIN;
	}
	return sent;
}

T
Tom Tucker 已提交
1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172
/*
 * Setup response header. TCP has a 4B record length field.
 */
static void svc_tcp_prep_reply_hdr(struct svc_rqst *rqstp)
{
	struct kvec *resv = &rqstp->rq_res.head[0];

	/* tcp needs a space for the record length... */
	svc_putnl(resv, 0);
}

1173 1174
static int svc_tcp_has_wspace(struct svc_xprt *xprt)
{
1175
	struct svc_sock *svsk =	container_of(xprt, struct svc_sock, sk_xprt);
1176
	struct svc_serv *serv = svsk->sk_xprt.xpt_server;
1177 1178
	int required;

1179 1180 1181 1182 1183
	if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
		return 1;
	required = atomic_read(&xprt->xpt_reserved) + serv->sv_max_mesg;
	if (sk_stream_wspace(svsk->sk_sk) >= required)
		return 1;
1184
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
1185
	return 0;
1186 1187
}

1188
static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
1189
				       struct net *net,
1190 1191 1192
				       struct sockaddr *sa, int salen,
				       int flags)
{
1193
	return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
1194 1195
}

1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);

static struct svc_xprt *svc_bc_tcp_create(struct svc_serv *serv,
				       struct net *net,
				       struct sockaddr *sa, int salen,
				       int flags)
{
	return svc_bc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
}

static void svc_bc_tcp_sock_detach(struct svc_xprt *xprt)
{
}

static struct svc_xprt_ops svc_tcp_bc_ops = {
	.xpo_create = svc_bc_tcp_create,
	.xpo_detach = svc_bc_tcp_sock_detach,
	.xpo_free = svc_bc_sock_free,
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
};

static struct svc_xprt_class svc_tcp_bc_class = {
	.xcl_name = "tcp-bc",
	.xcl_owner = THIS_MODULE,
	.xcl_ops = &svc_tcp_bc_ops,
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
};
1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244

static void svc_init_bc_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_bc_class);
}

static void svc_cleanup_bc_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_bc_class);
}
#else /* CONFIG_NFS_V4_1 */
static void svc_init_bc_xprt_sock(void)
{
}

static void svc_cleanup_bc_xprt_sock(void)
{
}
1245 1246
#endif /* CONFIG_NFS_V4_1 */

1247
static struct svc_xprt_ops svc_tcp_ops = {
1248
	.xpo_create = svc_tcp_create,
1249 1250
	.xpo_recvfrom = svc_tcp_recvfrom,
	.xpo_sendto = svc_tcp_sendto,
1251
	.xpo_release_rqst = svc_release_skb,
1252
	.xpo_detach = svc_tcp_sock_detach,
1253
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
1254
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
1255
	.xpo_has_wspace = svc_tcp_has_wspace,
1256
	.xpo_accept = svc_tcp_accept,
1257 1258 1259 1260
};

static struct svc_xprt_class svc_tcp_class = {
	.xcl_name = "tcp",
1261
	.xcl_owner = THIS_MODULE,
1262
	.xcl_ops = &svc_tcp_ops,
1263
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
1264 1265 1266 1267 1268 1269
};

void svc_init_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_class);
	svc_reg_xprt_class(&svc_udp_class);
1270
	svc_init_bc_xprt_sock();
1271 1272 1273 1274 1275 1276
}

void svc_cleanup_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_class);
	svc_unreg_xprt_class(&svc_udp_class);
1277
	svc_cleanup_bc_xprt_sock();
1278 1279
}

1280
static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
1281 1282 1283
{
	struct sock	*sk = svsk->sk_sk;

1284
	svc_xprt_init(&svc_tcp_class, &svsk->sk_xprt, serv);
1285
	set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1286 1287
	if (sk->sk_state == TCP_LISTEN) {
		dprintk("setting up TCP socket for listening\n");
1288
		set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1289
		sk->sk_data_ready = svc_tcp_listen_data_ready;
1290
		set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1291 1292 1293 1294
	} else {
		dprintk("setting up TCP socket for reading\n");
		sk->sk_state_change = svc_tcp_state_change;
		sk->sk_data_ready = svc_tcp_data_ready;
1295
		sk->sk_write_space = svc_tcp_write_space;
L
Linus Torvalds 已提交
1296 1297 1298 1299

		svsk->sk_reclen = 0;
		svsk->sk_tcplen = 0;

1300
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
L
Linus Torvalds 已提交
1301

1302 1303 1304 1305 1306 1307 1308 1309 1310
		/* initialise setting must have enough space to
		 * receive and respond to one request.
		 * svc_tcp_recvfrom will re-adjust if necessary
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);

		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1311
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
1312
		if (sk->sk_state != TCP_ESTABLISHED)
1313
			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1314 1315 1316
	}
}

1317
void svc_sock_update_bufs(struct svc_serv *serv)
L
Linus Torvalds 已提交
1318 1319 1320 1321 1322
{
	/*
	 * The number of server threads has changed. Update
	 * rcvbuf and sndbuf accordingly on all sockets
	 */
1323
	struct svc_sock *svsk;
L
Linus Torvalds 已提交
1324 1325

	spin_lock_bh(&serv->sv_lock);
1326
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
1327
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1328
	list_for_each_entry(svsk, &serv->sv_tempsocks, sk_xprt.xpt_list)
1329
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1330 1331
	spin_unlock_bh(&serv->sv_lock);
}
1332
EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
L
Linus Torvalds 已提交
1333 1334 1335 1336 1337

/*
 * Initialize socket for RPC use and create svc_sock struct
 * XXX: May want to setsockopt SO_SNDBUF and SO_RCVBUF.
 */
1338 1339 1340
static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
						struct socket *sock,
						int *errp, int flags)
L
Linus Torvalds 已提交
1341 1342 1343
{
	struct svc_sock	*svsk;
	struct sock	*inet;
1344
	int		pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
L
Linus Torvalds 已提交
1345 1346

	dprintk("svc: svc_setup_socket %p\n", sock);
1347
	if (!(svsk = kzalloc(sizeof(*svsk), GFP_KERNEL))) {
L
Linus Torvalds 已提交
1348 1349 1350 1351 1352 1353 1354 1355
		*errp = -ENOMEM;
		return NULL;
	}

	inet = sock->sk;

	/* Register socket with portmapper */
	if (*errp >= 0 && pmap_register)
1356
		*errp = svc_register(serv, inet->sk_family, inet->sk_protocol,
E
Eric Dumazet 已提交
1357
				     ntohs(inet_sk(inet)->inet_sport));
L
Linus Torvalds 已提交
1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372

	if (*errp < 0) {
		kfree(svsk);
		return NULL;
	}

	inet->sk_user_data = svsk;
	svsk->sk_sock = sock;
	svsk->sk_sk = inet;
	svsk->sk_ostate = inet->sk_state_change;
	svsk->sk_odata = inet->sk_data_ready;
	svsk->sk_owspace = inet->sk_write_space;

	/* Initialize the socket */
	if (sock->type == SOCK_DGRAM)
1373
		svc_udp_init(svsk, serv);
1374
	else
1375
		svc_tcp_init(svsk, serv);
L
Linus Torvalds 已提交
1376 1377 1378 1379 1380 1381 1382

	dprintk("svc: svc_setup_socket created %p (inet %p)\n",
				svsk, svsk->sk_sk);

	return svsk;
}

1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395
/**
 * svc_addsock - add a listener socket to an RPC service
 * @serv: pointer to RPC service to which to add a new listener
 * @fd: file descriptor of the new listener
 * @name_return: pointer to buffer to fill in with name of listener
 * @len: size of the buffer
 *
 * Fills in socket name and returns positive length of name if successful.
 * Name is terminated with '\n'.  On error, returns a negative errno
 * value.
 */
int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
		const size_t len)
1396 1397 1398 1399 1400 1401 1402
{
	int err = 0;
	struct socket *so = sockfd_lookup(fd, &err);
	struct svc_sock *svsk = NULL;

	if (!so)
		return err;
1403
	if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
1404 1405 1406 1407 1408 1409 1410
		err =  -EAFNOSUPPORT;
	else if (so->sk->sk_protocol != IPPROTO_TCP &&
	    so->sk->sk_protocol != IPPROTO_UDP)
		err =  -EPROTONOSUPPORT;
	else if (so->state > SS_UNCONNECTED)
		err = -EISCONN;
	else {
1411 1412 1413 1414 1415
		if (!try_module_get(THIS_MODULE))
			err = -ENOENT;
		else
			svsk = svc_setup_socket(serv, so, &err,
						SVC_SOCK_DEFAULTS);
1416
		if (svsk) {
1417 1418 1419 1420 1421
			struct sockaddr_storage addr;
			struct sockaddr *sin = (struct sockaddr *)&addr;
			int salen;
			if (kernel_getsockname(svsk->sk_sock, sin, &salen) == 0)
				svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
1422 1423 1424 1425
			clear_bit(XPT_TEMP, &svsk->sk_xprt.xpt_flags);
			spin_lock_bh(&serv->sv_lock);
			list_add(&svsk->sk_xprt.xpt_list, &serv->sv_permsocks);
			spin_unlock_bh(&serv->sv_lock);
1426
			svc_xprt_received(&svsk->sk_xprt);
1427
			err = 0;
1428 1429
		} else
			module_put(THIS_MODULE);
1430 1431 1432 1433 1434
	}
	if (err) {
		sockfd_put(so);
		return err;
	}
1435
	return svc_one_sock_name(svsk, name_return, len);
1436 1437 1438
}
EXPORT_SYMBOL_GPL(svc_addsock);

L
Linus Torvalds 已提交
1439 1440 1441
/*
 * Create socket for RPC service.
 */
1442 1443
static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
					  int protocol,
1444
					  struct net *net,
1445 1446
					  struct sockaddr *sin, int len,
					  int flags)
L
Linus Torvalds 已提交
1447 1448 1449 1450 1451
{
	struct svc_sock	*svsk;
	struct socket	*sock;
	int		error;
	int		type;
1452 1453 1454
	struct sockaddr_storage addr;
	struct sockaddr *newsin = (struct sockaddr *)&addr;
	int		newlen;
1455 1456
	int		family;
	int		val;
1457
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
1458

1459 1460
	dprintk("svc: svc_create_socket(%s, %d, %s)\n",
			serv->sv_program->pg_name, protocol,
1461
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
1462 1463 1464 1465

	if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only UDP and TCP "
				"sockets supported\n");
1466
		return ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
1467
	}
1468

L
Linus Torvalds 已提交
1469
	type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
1470 1471 1472 1473 1474 1475 1476 1477 1478 1479
	switch (sin->sa_family) {
	case AF_INET6:
		family = PF_INET6;
		break;
	case AF_INET:
		family = PF_INET;
		break;
	default:
		return ERR_PTR(-EINVAL);
	}
L
Linus Torvalds 已提交
1480

1481
	error = __sock_create(net, family, type, protocol, &sock, 1);
1482
	if (error < 0)
1483
		return ERR_PTR(error);
L
Linus Torvalds 已提交
1484

1485 1486
	svc_reclassify_socket(sock);

1487 1488 1489 1490 1491 1492 1493 1494 1495 1496
	/*
	 * If this is an PF_INET6 listener, we want to avoid
	 * getting requests from IPv4 remotes.  Those should
	 * be shunted to a PF_INET listener via rpcbind.
	 */
	val = 1;
	if (family == PF_INET6)
		kernel_setsockopt(sock, SOL_IPV6, IPV6_V6ONLY,
					(char *)&val, sizeof(val));

1497
	if (type == SOCK_STREAM)
1498 1499
		sock->sk->sk_reuse = 1;		/* allow address reuse */
	error = kernel_bind(sock, sin, len);
1500 1501
	if (error < 0)
		goto bummer;
L
Linus Torvalds 已提交
1502

1503 1504 1505 1506 1507
	newlen = len;
	error = kernel_getsockname(sock, newsin, &newlen);
	if (error < 0)
		goto bummer;

L
Linus Torvalds 已提交
1508
	if (protocol == IPPROTO_TCP) {
1509
		if ((error = kernel_listen(sock, 64)) < 0)
L
Linus Torvalds 已提交
1510 1511 1512
			goto bummer;
	}

1513
	if ((svsk = svc_setup_socket(serv, sock, &error, flags)) != NULL) {
1514
		svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
1515
		return (struct svc_xprt *)svsk;
1516
	}
L
Linus Torvalds 已提交
1517 1518 1519 1520

bummer:
	dprintk("svc: svc_create_socket error = %d\n", -error);
	sock_release(sock);
1521
	return ERR_PTR(error);
L
Linus Torvalds 已提交
1522 1523
}

1524 1525 1526 1527 1528 1529 1530 1531
/*
 * Detach the svc_sock from the socket so that no
 * more callbacks occur.
 */
static void svc_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	struct sock *sk = svsk->sk_sk;
1532
	wait_queue_head_t *wq;
1533 1534 1535 1536 1537 1538 1539

	dprintk("svc: svc_sock_detach(%p)\n", svsk);

	/* put back the old socket callbacks */
	sk->sk_state_change = svsk->sk_ostate;
	sk->sk_data_ready = svsk->sk_odata;
	sk->sk_write_space = svsk->sk_owspace;
1540

1541 1542 1543
	wq = sk_sleep(sk);
	if (wq && waitqueue_active(wq))
		wake_up_interruptible(wq);
1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558
}

/*
 * Disconnect the socket, and reset the callbacks
 */
static void svc_tcp_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);

	dprintk("svc: svc_tcp_sock_detach(%p)\n", svsk);

	svc_sock_detach(xprt);

	if (!test_bit(XPT_LISTENER, &xprt->xpt_flags))
		kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574
}

/*
 * Free the svc_sock's socket resources and the svc_sock itself.
 */
static void svc_sock_free(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	dprintk("svc: svc_sock_free(%p)\n", svsk);

	if (svsk->sk_sock->file)
		sockfd_put(svsk->sk_sock);
	else
		sock_release(svsk->sk_sock);
	kfree(svsk);
}
1575

1576
#if defined(CONFIG_NFS_V4_1)
1577
/*
1578
 * Create a back channel svc_xprt which shares the fore channel socket.
1579
 */
1580 1581 1582 1583 1584
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *serv,
					     int protocol,
					     struct net *net,
					     struct sockaddr *sin, int len,
					     int flags)
1585 1586
{
	struct svc_sock *svsk;
1587 1588 1589 1590 1591 1592 1593
	struct svc_xprt *xprt;

	if (protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only TCP sockets"
			" supported on shared back channel\n");
		return ERR_PTR(-EINVAL);
	}
1594 1595 1596

	svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
	if (!svsk)
1597
		return ERR_PTR(-ENOMEM);
1598 1599

	xprt = &svsk->sk_xprt;
1600 1601
	svc_xprt_init(&svc_tcp_bc_class, xprt, serv);

1602
	serv->sv_bc_xprt = xprt;
1603

1604 1605 1606 1607
	return xprt;
}

/*
1608
 * Free a back channel svc_sock.
1609
 */
1610
static void svc_bc_sock_free(struct svc_xprt *xprt)
1611
{
1612
	if (xprt)
1613 1614
		kfree(container_of(xprt, struct svc_sock, sk_xprt));
}
1615
#endif /* CONFIG_NFS_V4_1 */