xprtsock.c 84.4 KB
Newer Older
1 2 3 4 5
/*
 * linux/net/sunrpc/xprtsock.c
 *
 * Client-side transport implementation for sockets.
 *
6 7
 * TCP callback races fixes (C) 1998 Red Hat
 * TCP send fixes (C) 1998 Red Hat
8 9 10 11 12 13
 * TCP NFS related read + write fixes
 *  (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
 *
 * Rewrite of larges part of the code in order to stabilize TCP stuff.
 * Fix behaviour when socket buffer is full.
 *  (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
14 15
 *
 * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
16 17 18
 *
 * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
 *   <gilles.quillard@bull.net>
19 20 21
 */

#include <linux/types.h>
22
#include <linux/string.h>
23
#include <linux/slab.h>
24
#include <linux/module.h>
25 26 27 28 29 30 31
#include <linux/capability.h>
#include <linux/pagemap.h>
#include <linux/errno.h>
#include <linux/socket.h>
#include <linux/in.h>
#include <linux/net.h>
#include <linux/mm.h>
32
#include <linux/un.h>
33 34 35
#include <linux/udp.h>
#include <linux/tcp.h>
#include <linux/sunrpc/clnt.h>
36
#include <linux/sunrpc/addr.h>
37
#include <linux/sunrpc/sched.h>
38
#include <linux/sunrpc/svcsock.h>
39
#include <linux/sunrpc/xprtsock.h>
40
#include <linux/file.h>
41
#ifdef CONFIG_SUNRPC_BACKCHANNEL
R
Ricardo Labiaga 已提交
42 43
#include <linux/sunrpc/bc_xprt.h>
#endif
44 45 46 47 48 49

#include <net/sock.h>
#include <net/checksum.h>
#include <net/udp.h>
#include <net/tcp.h>

50 51
#include <trace/events/sunrpc.h>

52
#include "sunrpc.h"
53 54 55

static void xs_close(struct rpc_xprt *xprt);

56 57 58
/*
 * xprtsock tunables
 */
59 60 61
static unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
static unsigned int xprt_tcp_slot_table_entries = RPC_MIN_SLOT_TABLE;
static unsigned int xprt_max_tcp_slot_table_entries = RPC_MAX_SLOT_TABLE;
62

63 64
static unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
static unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;
65

66 67
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)

68
#define XS_TCP_LINGER_TO	(15U * HZ)
69
static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO;
70

71 72 73 74 75 76 77 78 79 80 81
/*
 * We can register our own files under /proc/sys/sunrpc by
 * calling register_sysctl_table() again.  The files in that
 * directory become the union of all files registered there.
 *
 * We simply need to make sure that we don't collide with
 * someone else's file names!
 */

static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
82
static unsigned int max_tcp_slot_table_limit = RPC_MAX_SLOT_TABLE_LIMIT;
83 84 85 86 87 88 89 90 91
static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;

static struct ctl_table_header *sunrpc_table_header;

/*
 * FIXME: changing the UDP slot table size should also resize the UDP
 *        socket buffers for existing UDP transports
 */
92
static struct ctl_table xs_tunables_table[] = {
93 94 95 96 97
	{
		.procname	= "udp_slot_table_entries",
		.data		= &xprt_udp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
98
		.proc_handler	= proc_dointvec_minmax,
99 100 101 102 103 104 105 106
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
	{
		.procname	= "tcp_slot_table_entries",
		.data		= &xprt_tcp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
107
		.proc_handler	= proc_dointvec_minmax,
108 109 110
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
111 112 113 114 115 116 117 118 119
	{
		.procname	= "tcp_max_slot_table_entries",
		.data		= &xprt_max_tcp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= proc_dointvec_minmax,
		.extra1		= &min_slot_table_size,
		.extra2		= &max_tcp_slot_table_limit
	},
120 121 122 123 124
	{
		.procname	= "min_resvport",
		.data		= &xprt_min_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
125
		.proc_handler	= proc_dointvec_minmax,
126
		.extra1		= &xprt_min_resvport_limit,
127
		.extra2		= &xprt_max_resvport
128 129 130 131 132 133
	},
	{
		.procname	= "max_resvport",
		.data		= &xprt_max_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
134
		.proc_handler	= proc_dointvec_minmax,
135
		.extra1		= &xprt_min_resvport,
136 137
		.extra2		= &xprt_max_resvport_limit
	},
138 139 140 141 142
	{
		.procname	= "tcp_fin_timeout",
		.data		= &xs_tcp_fin_timeout,
		.maxlen		= sizeof(xs_tcp_fin_timeout),
		.mode		= 0644,
143
		.proc_handler	= proc_dointvec_jiffies,
144
	},
145
	{ },
146 147
};

148
static struct ctl_table sunrpc_table[] = {
149 150 151 152 153
	{
		.procname	= "sunrpc",
		.mode		= 0555,
		.child		= xs_tunables_table
	},
154
	{ },
155 156 157 158
};

#endif

159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
/*
 * Wait duration for a reply from the RPC portmapper.
 */
#define XS_BIND_TO		(60U * HZ)

/*
 * Delay if a UDP socket connect error occurs.  This is most likely some
 * kind of resource problem on the local host.
 */
#define XS_UDP_REEST_TO		(2U * HZ)

/*
 * The reestablish timeout allows clients to delay for a bit before attempting
 * to reconnect to a server that just dropped our connection.
 *
 * We implement an exponential backoff when trying to reestablish a TCP
 * transport connection with the server.  Some servers like to drop a TCP
 * connection when they are overworked, so we start with a short timeout and
 * increase over time if the server is down or not responding.
 */
#define XS_TCP_INIT_REEST_TO	(3U * HZ)
#define XS_TCP_MAX_REEST_TO	(5U * 60 * HZ)

/*
 * TCP idle timeout; client drops the transport socket if it is idle
 * for this long.  Note that we also timeout UDP sockets to prevent
 * holding port numbers when there is no RPC traffic.
 */
#define XS_IDLE_DISC_TO		(5U * 60 * HZ)

J
Jeff Layton 已提交
189
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
190
# undef  RPC_DEBUG_DATA
191
# define RPCDBG_FACILITY	RPCDBG_TRANS
192 193 194
#endif

#ifdef RPC_DEBUG_DATA
195
static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
196
{
197 198
	u8 *buf = (u8 *) packet;
	int j;
199

200
	dprintk("RPC:       %s\n", msg);
201 202 203 204 205 206 207 208 209 210 211 212
	for (j = 0; j < count && j < 128; j += 4) {
		if (!(j & 31)) {
			if (j)
				dprintk("\n");
			dprintk("0x%04x ", j);
		}
		dprintk("%02x%02x%02x%02x ",
			buf[j], buf[j+1], buf[j+2], buf[j+3]);
	}
	dprintk("\n");
}
#else
213
static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
214 215 216 217 218
{
	/* NOP */
}
#endif

219 220 221 222 223
static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
{
	return (struct rpc_xprt *) sk->sk_user_data;
}

224 225 226 227 228
static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
{
	return (struct sockaddr *) &xprt->addr;
}

229 230 231 232 233
static inline struct sockaddr_un *xs_addr_un(struct rpc_xprt *xprt)
{
	return (struct sockaddr_un *) &xprt->addr;
}

234
static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
235
{
236 237 238 239 240 241 242 243
	return (struct sockaddr_in *) &xprt->addr;
}

static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
{
	return (struct sockaddr_in6 *) &xprt->addr;
}

244
static void xs_format_common_peer_addresses(struct rpc_xprt *xprt)
245
{
246
	struct sockaddr *sap = xs_addr(xprt);
247 248
	struct sockaddr_in6 *sin6;
	struct sockaddr_in *sin;
249
	struct sockaddr_un *sun;
250
	char buf[128];
251

252
	switch (sap->sa_family) {
253 254 255 256 257 258
	case AF_LOCAL:
		sun = xs_addr_un(xprt);
		strlcpy(buf, sun->sun_path, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
		break;
259
	case AF_INET:
260 261 262
		(void)rpc_ntop(sap, buf, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
263
		sin = xs_addr_in(xprt);
264
		snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
265 266
		break;
	case AF_INET6:
267 268 269
		(void)rpc_ntop(sap, buf, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
270
		sin6 = xs_addr_in6(xprt);
271
		snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
272 273 274
		break;
	default:
		BUG();
275
	}
276

277
	xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
278 279
}

280
static void xs_format_common_peer_ports(struct rpc_xprt *xprt)
281
{
282 283
	struct sockaddr *sap = xs_addr(xprt);
	char buf[128];
284

285
	snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
286
	xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
287

288
	snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
289 290
	xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
}
291

292 293 294
static void xs_format_peer_addresses(struct rpc_xprt *xprt,
				     const char *protocol,
				     const char *netid)
295
{
296 297
	xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
	xprt->address_strings[RPC_DISPLAY_NETID] = netid;
298
	xs_format_common_peer_addresses(xprt);
299
	xs_format_common_peer_ports(xprt);
300
}
301

302
static void xs_update_peer_port(struct rpc_xprt *xprt)
303
{
304 305
	kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
	kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
306

307
	xs_format_common_peer_ports(xprt);
308 309 310 311
}

static void xs_free_peer_addresses(struct rpc_xprt *xprt)
{
312 313 314 315 316 317 318 319 320 321
	unsigned int i;

	for (i = 0; i < RPC_DISPLAY_MAX; i++)
		switch (i) {
		case RPC_DISPLAY_PROTO:
		case RPC_DISPLAY_NETID:
			continue;
		default:
			kfree(xprt->address_strings[i]);
		}
322 323
}

324 325
#define XS_SENDMSG_FLAGS	(MSG_DONTWAIT | MSG_NOSIGNAL)

T
Trond Myklebust 已提交
326
static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
327 328 329 330
{
	struct msghdr msg = {
		.msg_name	= addr,
		.msg_namelen	= addrlen,
T
Trond Myklebust 已提交
331 332 333 334 335
		.msg_flags	= XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
	};
	struct kvec iov = {
		.iov_base	= vec->iov_base + base,
		.iov_len	= vec->iov_len - base,
336 337
	};

T
Trond Myklebust 已提交
338
	if (iov.iov_len != 0)
339 340 341 342
		return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
	return kernel_sendmsg(sock, &msg, NULL, 0, 0);
}

343
static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more, bool zerocopy, int *sent_p)
344
{
345 346
	ssize_t (*do_sendpage)(struct socket *sock, struct page *page,
			int offset, size_t size, int flags);
T
Trond Myklebust 已提交
347 348
	struct page **ppage;
	unsigned int remainder;
349
	int err;
T
Trond Myklebust 已提交
350 351 352 353 354

	remainder = xdr->page_len - base;
	base += xdr->page_base;
	ppage = xdr->pages + (base >> PAGE_SHIFT);
	base &= ~PAGE_MASK;
355 356 357
	do_sendpage = sock->ops->sendpage;
	if (!zerocopy)
		do_sendpage = sock_no_sendpage;
T
Trond Myklebust 已提交
358 359 360
	for(;;) {
		unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
		int flags = XS_SENDMSG_FLAGS;
361

T
Trond Myklebust 已提交
362
		remainder -= len;
363
		if (more)
T
Trond Myklebust 已提交
364
			flags |= MSG_MORE;
365 366
		if (remainder != 0)
			flags |= MSG_SENDPAGE_NOTLAST | MSG_MORE;
367
		err = do_sendpage(sock, *ppage, base, len, flags);
T
Trond Myklebust 已提交
368 369
		if (remainder == 0 || err != len)
			break;
370
		*sent_p += err;
T
Trond Myklebust 已提交
371 372 373
		ppage++;
		base = 0;
	}
374 375 376 377 378
	if (err > 0) {
		*sent_p += err;
		err = 0;
	}
	return err;
379 380
}

381 382 383 384 385 386 387
/**
 * xs_sendpages - write pages directly to a socket
 * @sock: socket to send on
 * @addr: UDP only -- address of destination
 * @addrlen: UDP only -- length of destination address
 * @xdr: buffer containing this request
 * @base: starting position in the buffer
388
 * @zerocopy: true if it is safe to use sendpage()
389
 * @sent_p: return the total number of bytes successfully queued for sending
390
 *
391
 */
392
static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base, bool zerocopy, int *sent_p)
393
{
T
Trond Myklebust 已提交
394
	unsigned int remainder = xdr->len - base;
395 396
	int err = 0;
	int sent = 0;
397

398
	if (unlikely(!sock))
399
		return -ENOTSOCK;
400

T
Trond Myklebust 已提交
401 402 403 404
	if (base != 0) {
		addr = NULL;
		addrlen = 0;
	}
405

T
Trond Myklebust 已提交
406 407 408 409 410
	if (base < xdr->head[0].iov_len || addr != NULL) {
		unsigned int len = xdr->head[0].iov_len - base;
		remainder -= len;
		err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
		if (remainder == 0 || err != len)
411
			goto out;
412
		*sent_p += err;
413 414
		base = 0;
	} else
T
Trond Myklebust 已提交
415
		base -= xdr->head[0].iov_len;
416

T
Trond Myklebust 已提交
417 418 419
	if (base < xdr->page_len) {
		unsigned int len = xdr->page_len - base;
		remainder -= len;
420 421 422
		err = xs_send_pagedata(sock, xdr, base, remainder != 0, zerocopy, &sent);
		*sent_p += sent;
		if (remainder == 0 || sent != len)
423 424
			goto out;
		base = 0;
T
Trond Myklebust 已提交
425 426 427 428
	} else
		base -= xdr->page_len;

	if (base >= xdr->tail[0].iov_len)
429
		return 0;
T
Trond Myklebust 已提交
430
	err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
431
out:
432 433 434 435 436
	if (err > 0) {
		*sent_p += err;
		err = 0;
	}
	return err;
437 438
}

439 440 441 442 443 444 445
static void xs_nospace_callback(struct rpc_task *task)
{
	struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt);

	transport->inet->sk_write_pending--;
}

446
/**
447 448
 * xs_nospace - place task on wait queue if transmit was incomplete
 * @task: task to put to sleep
449
 *
450
 */
451
static int xs_nospace(struct rpc_task *task)
452
{
453 454
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
455
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
456
	struct sock *sk = transport->inet;
457
	int ret = -EAGAIN;
458

459
	dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
460 461 462
			task->tk_pid, req->rq_slen - req->rq_bytes_sent,
			req->rq_slen);

463 464 465 466 467
	/* Protect against races with write_space */
	spin_lock_bh(&xprt->transport_lock);

	/* Don't race with disconnect */
	if (xprt_connected(xprt)) {
468 469 470 471
		/* wait for more buffer space */
		sk->sk_write_pending++;
		xprt_wait_for_buffer_space(task, xs_nospace_callback);
	} else
472
		ret = -ENOTCONN;
473

474
	spin_unlock_bh(&xprt->transport_lock);
475 476 477

	/* Race breaker in case memory is freed before above code is called */
	sk->sk_write_space(sk);
478
	return ret;
479 480
}

481 482 483 484 485 486 487 488 489 490
/*
 * Construct a stream transport record marker in @buf.
 */
static inline void xs_encode_stream_record_marker(struct xdr_buf *buf)
{
	u32 reclen = buf->len - sizeof(rpc_fraghdr);
	rpc_fraghdr *base = buf->head[0].iov_base;
	*base = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT | reclen);
}

491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
/**
 * xs_local_send_request - write an RPC request to an AF_LOCAL socket
 * @task: RPC task that manages the state of an RPC request
 *
 * Return values:
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
 *    other:	Some other error occured, the request was not sent
 */
static int xs_local_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct xdr_buf *xdr = &req->rq_snd_buf;
	int status;
510
	int sent = 0;
511 512 513 514 515 516

	xs_encode_stream_record_marker(&req->rq_snd_buf);

	xs_pktdump("packet data:",
			req->rq_svec->iov_base, req->rq_svec->iov_len);

517 518
	status = xs_sendpages(transport->sock, NULL, 0, xdr, req->rq_bytes_sent,
			      true, &sent);
519 520
	dprintk("RPC:       %s(%u) = %d\n",
			__func__, xdr->len - req->rq_bytes_sent, status);
521 522 523 524

	if (status == -EAGAIN && sock_writeable(transport->inet))
		status = -ENOBUFS;

525 526 527
	if (likely(sent > 0) || status == 0) {
		req->rq_bytes_sent += sent;
		req->rq_xmit_bytes_sent += sent;
528 529 530 531 532 533 534 535
		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
			req->rq_bytes_sent = 0;
			return 0;
		}
		status = -EAGAIN;
	}

	switch (status) {
536
	case -ENOBUFS:
537
		break;
538 539 540 541 542 543 544 545 546 547 548 549 550 551
	case -EAGAIN:
		status = xs_nospace(task);
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
	case -EPIPE:
		xs_close(xprt);
		status = -ENOTCONN;
	}

	return status;
}

552 553 554 555 556 557 558 559 560
/**
 * xs_udp_send_request - write an RPC request to a UDP socket
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
L
Lucas De Marchi 已提交
561
 *    other:	Some other error occurred, the request was not sent
562 563 564 565 566
 */
static int xs_udp_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
567
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
568
	struct xdr_buf *xdr = &req->rq_snd_buf;
569
	int sent = 0;
570
	int status;
571

572
	xs_pktdump("packet data:",
573 574 575
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);

576 577
	if (!xprt_bound(xprt))
		return -ENOTCONN;
578 579
	status = xs_sendpages(transport->sock, xs_addr(xprt), xprt->addrlen,
			      xdr, req->rq_bytes_sent, true, &sent);
580

581
	dprintk("RPC:       xs_udp_send_request(%u) = %d\n",
582
			xdr->len - req->rq_bytes_sent, status);
583

584 585 586 587
	/* firewall is blocking us, don't return -EAGAIN or we end up looping */
	if (status == -EPERM)
		goto process_status;

588 589 590
	if (status == -EAGAIN && sock_writeable(transport->inet))
		status = -ENOBUFS;

591 592 593
	if (sent > 0 || status == 0) {
		req->rq_xmit_bytes_sent += sent;
		if (sent >= req->rq_slen)
594 595
			return 0;
		/* Still some bytes left; set up for a retry later. */
596
		status = -EAGAIN;
597
	}
598

599
process_status:
600
	switch (status) {
601 602 603 604
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
605
	case -EAGAIN:
606
		status = xs_nospace(task);
607
		break;
608
	case -ENETUNREACH:
609
	case -ENOBUFS:
610
	case -EPIPE:
611
	case -ECONNREFUSED:
612
	case -EPERM:
613
		/* When the server has died, an ICMP port unreachable message
614
		 * prompts ECONNREFUSED. */
615 616 617 618
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
619
	}
620

621
	return status;
622 623
}

624
/**
625
 * xs_tcp_send_request - write an RPC request to a TCP socket
626 627 628
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
629 630 631 632
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
L
Lucas De Marchi 已提交
633
 *    other:	Some other error occurred, the request was not sent
634 635
 *
 * XXX: In the case of soft timeouts, should we eventually give up
636
 *	if sendmsg is not able to make progress?
637
 */
638
static int xs_tcp_send_request(struct rpc_task *task)
639 640 641
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
642
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
643
	struct xdr_buf *xdr = &req->rq_snd_buf;
644
	bool zerocopy = true;
645
	bool vm_wait = false;
646
	int status;
647
	int sent;
648

649
	xs_encode_stream_record_marker(&req->rq_snd_buf);
650

651 652 653
	xs_pktdump("packet data:",
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);
654 655 656 657 658 659
	/* Don't use zero copy if this is a resend. If the RPC call
	 * completes while the socket holds a reference to the pages,
	 * then we may end up resending corrupted data.
	 */
	if (task->tk_flags & RPC_TASK_SENT)
		zerocopy = false;
660 661 662

	/* Continue transmitting the packet/record. We must be careful
	 * to cope with writespace callbacks arriving _after_ we have
663
	 * called sendmsg(). */
664
	while (1) {
665 666 667
		sent = 0;
		status = xs_sendpages(transport->sock, NULL, 0, xdr,
				      req->rq_bytes_sent, zerocopy, &sent);
668

669
		dprintk("RPC:       xs_tcp_send_request(%u) = %d\n",
670
				xdr->len - req->rq_bytes_sent, status);
671

672 673
		/* If we've sent the entire packet, immediately
		 * reset the count of bytes sent. */
674 675
		req->rq_bytes_sent += sent;
		req->rq_xmit_bytes_sent += sent;
676 677 678 679
		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
			req->rq_bytes_sent = 0;
			return 0;
		}
680

681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703
		WARN_ON_ONCE(sent == 0 && status == 0);

		if (status == -EAGAIN ) {
			/*
			 * Return EAGAIN if we're sure we're hitting the
			 * socket send buffer limits.
			 */
			if (test_bit(SOCK_NOSPACE, &transport->sock->flags))
				break;
			/*
			 * Did we hit a memory allocation failure?
			 */
			if (sent == 0) {
				status = -ENOBUFS;
				if (vm_wait)
					break;
				/* Retry, knowing now that we're below the
				 * socket send buffer limit
				 */
				vm_wait = true;
			}
			continue;
		}
704 705
		if (status < 0)
			break;
706
		vm_wait = false;
707 708
	}

709
	switch (status) {
710 711 712 713
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
714
	case -EAGAIN:
715
		status = xs_nospace(task);
716 717
		break;
	case -ECONNRESET:
718
	case -ECONNREFUSED:
719
	case -ENOTCONN:
720
	case -EADDRINUSE:
721
	case -ENOBUFS:
722
	case -EPIPE:
723 724 725 726
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
727
	}
728

729 730 731
	return status;
}

732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749
/**
 * xs_tcp_release_xprt - clean up after a tcp transmission
 * @xprt: transport
 * @task: rpc task
 *
 * This cleans up if an error causes us to abort the transmission of a request.
 * In this case, the socket may need to be reset in order to avoid confusing
 * the server.
 */
static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
{
	struct rpc_rqst *req;

	if (task != xprt->snd_task)
		return;
	if (task == NULL)
		goto out_release;
	req = task->tk_rqstp;
750 751
	if (req == NULL)
		goto out_release;
752 753 754 755
	if (req->rq_bytes_sent == 0)
		goto out_release;
	if (req->rq_bytes_sent == req->rq_snd_buf.len)
		goto out_release;
756
	set_bit(XPRT_CLOSE_WAIT, &xprt->state);
757 758 759 760
out_release:
	xprt_release_xprt(xprt, task);
}

761 762 763 764 765
static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	transport->old_data_ready = sk->sk_data_ready;
	transport->old_state_change = sk->sk_state_change;
	transport->old_write_space = sk->sk_write_space;
766
	transport->old_error_report = sk->sk_error_report;
767 768 769 770 771 772 773
}

static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	sk->sk_data_ready = transport->old_data_ready;
	sk->sk_state_change = transport->old_state_change;
	sk->sk_write_space = transport->old_write_space;
774 775 776
	sk->sk_error_report = transport->old_error_report;
}

777 778 779 780 781 782 783
static void xs_sock_reset_state_flags(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state);
}

784 785 786 787 788
static void xs_sock_reset_connection_flags(struct rpc_xprt *xprt)
{
	smp_mb__before_atomic();
	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
	clear_bit(XPRT_CLOSING, &xprt->state);
789
	xs_sock_reset_state_flags(xprt);
790 791 792 793 794 795 796 797 798 799
	smp_mb__after_atomic();
}

static void xs_sock_mark_closed(struct rpc_xprt *xprt)
{
	xs_sock_reset_connection_flags(xprt);
	/* Mark transport as closed and wake up all pending tasks */
	xprt_disconnect_done(xprt);
}

800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818
/**
 * xs_error_report - callback to handle TCP socket state errors
 * @sk: socket
 *
 * Note: we don't call sock_error() since there may be a rpc_task
 * using the socket, and so we don't want to clear sk->sk_err.
 */
static void xs_error_report(struct sock *sk)
{
	struct rpc_xprt *xprt;
	int err;

	read_lock_bh(&sk->sk_callback_lock);
	if (!(xprt = xprt_from_sock(sk)))
		goto out;

	err = -sk->sk_err;
	if (err == 0)
		goto out;
819 820 821
	/* Is this a reset event? */
	if (sk->sk_state == TCP_CLOSE)
		xs_sock_mark_closed(xprt);
822 823
	dprintk("RPC:       xs_error_report client %p, error=%d...\n",
			xprt, -err);
824
	trace_rpc_socket_error(xprt, sk->sk_socket, err);
825 826 827
	xprt_wake_pending_tasks(xprt, err);
 out:
	read_unlock_bh(&sk->sk_callback_lock);
828 829
}

830
static void xs_reset_transport(struct sock_xprt *transport)
831
{
832 833
	struct socket *sock = transport->sock;
	struct sock *sk = transport->inet;
834
	struct rpc_xprt *xprt = &transport->xprt;
835

836 837
	if (sk == NULL)
		return;
838

839 840 841
	if (atomic_read(&transport->xprt.swapper))
		sk_clear_memalloc(sk);

842 843
	kernel_sock_shutdown(sock, SHUT_RDWR);

844
	mutex_lock(&transport->recv_mutex);
845
	write_lock_bh(&sk->sk_callback_lock);
846 847
	transport->inet = NULL;
	transport->sock = NULL;
848

849
	sk->sk_user_data = NULL;
850 851

	xs_restore_old_callbacks(transport, sk);
852
	xprt_clear_connected(xprt);
853
	write_unlock_bh(&sk->sk_callback_lock);
854
	xs_sock_reset_connection_flags(xprt);
855
	mutex_unlock(&transport->recv_mutex);
856

857
	trace_rpc_socket_close(xprt, sock);
858
	sock_release(sock);
859 860 861 862 863 864 865 866
}

/**
 * xs_close - close a socket
 * @xprt: transport
 *
 * This is used when all requests are complete; ie, no DRC state remains
 * on the server we want to save.
867 868 869
 *
 * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with
 * xs_reset_transport() zeroing the socket from underneath a writer.
870 871 872 873 874 875 876 877
 */
static void xs_close(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	dprintk("RPC:       xs_close xprt %p\n", xprt);

	xs_reset_transport(transport);
878
	xprt->reestablish_timeout = 0;
879

880
	xprt_disconnect_done(xprt);
881 882
}

C
Chuck Lever 已提交
883 884 885 886 887 888 889
static void xs_inject_disconnect(struct rpc_xprt *xprt)
{
	dprintk("RPC:       injecting transport disconnect on xprt=%p\n",
		xprt);
	xprt_disconnect_done(xprt);
}

890 891 892 893 894 895
static void xs_xprt_free(struct rpc_xprt *xprt)
{
	xs_free_peer_addresses(xprt);
	xprt_free(xprt);
}

896 897 898 899 900 901
/**
 * xs_destroy - prepare to shutdown a transport
 * @xprt: doomed transport
 *
 */
static void xs_destroy(struct rpc_xprt *xprt)
902
{
903 904
	struct sock_xprt *transport = container_of(xprt,
			struct sock_xprt, xprt);
905
	dprintk("RPC:       xs_destroy xprt %p\n", xprt);
906

907
	cancel_delayed_work_sync(&transport->connect_worker);
T
Trond Myklebust 已提交
908
	xs_close(xprt);
909
	cancel_work_sync(&transport->recv_worker);
910
	xs_xprt_free(xprt);
T
Trond Myklebust 已提交
911
	module_put(THIS_MODULE);
912 913
}

914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929
static int xs_local_copy_to_xdr(struct xdr_buf *xdr, struct sk_buff *skb)
{
	struct xdr_skb_reader desc = {
		.skb		= skb,
		.offset		= sizeof(rpc_fraghdr),
		.count		= skb->len - sizeof(rpc_fraghdr),
	};

	if (xdr_partial_copy_from_skb(xdr, 0, &desc, xdr_skb_read_bits) < 0)
		return -1;
	if (desc.count)
		return -1;
	return 0;
}

/**
930 931 932 933
 * xs_local_data_read_skb
 * @xprt: transport
 * @sk: socket
 * @skb: skbuff
934 935 936
 *
 * Currently this assumes we can read the whole reply in a single gulp.
 */
937 938 939
static void xs_local_data_read_skb(struct rpc_xprt *xprt,
		struct sock *sk,
		struct sk_buff *skb)
940 941 942
{
	struct rpc_task *task;
	struct rpc_rqst *rovr;
943
	int repsize, copied;
944 945 946 947 948 949
	u32 _xid;
	__be32 *xp;

	repsize = skb->len - sizeof(rpc_fraghdr);
	if (repsize < 4) {
		dprintk("RPC:       impossible RPC reply size %d\n", repsize);
950
		return;
951 952 953 954 955
	}

	/* Copy the XID from the skb... */
	xp = skb_header_pointer(skb, sizeof(rpc_fraghdr), sizeof(_xid), &_xid);
	if (xp == NULL)
956
		return;
957 958

	/* Look up and lock the request corresponding to the given XID */
959
	spin_lock_bh(&xprt->transport_lock);
960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976
	rovr = xprt_lookup_rqst(xprt, *xp);
	if (!rovr)
		goto out_unlock;
	task = rovr->rq_task;

	copied = rovr->rq_private_buf.buflen;
	if (copied > repsize)
		copied = repsize;

	if (xs_local_copy_to_xdr(&rovr->rq_private_buf, skb)) {
		dprintk("RPC:       sk_buff copy failed\n");
		goto out_unlock;
	}

	xprt_complete_rqst(task, copied);

 out_unlock:
977 978 979 980 981 982 983 984 985 986 987 988 989 990 991
	spin_unlock_bh(&xprt->transport_lock);
}

static void xs_local_data_receive(struct sock_xprt *transport)
{
	struct sk_buff *skb;
	struct sock *sk;
	int err;

	mutex_lock(&transport->recv_mutex);
	sk = transport->inet;
	if (sk == NULL)
		goto out;
	for (;;) {
		skb = skb_recv_datagram(sk, 0, 1, &err);
992 993 994 995 996 997
		if (skb != NULL) {
			xs_local_data_read_skb(&transport->xprt, sk, skb);
			skb_free_datagram(sk, skb);
			continue;
		}
		if (!test_and_clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008
			break;
	}
out:
	mutex_unlock(&transport->recv_mutex);
}

static void xs_local_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_local_data_receive(transport);
1009 1010
}

1011
/**
1012 1013 1014 1015
 * xs_udp_data_read_skb - receive callback for UDP sockets
 * @xprt: transport
 * @sk: socket
 * @skb: skbuff
1016
 *
1017
 */
1018 1019 1020
static void xs_udp_data_read_skb(struct rpc_xprt *xprt,
		struct sock *sk,
		struct sk_buff *skb)
1021
{
1022
	struct rpc_task *task;
1023
	struct rpc_rqst *rovr;
1024
	int repsize, copied;
1025 1026
	u32 _xid;
	__be32 *xp;
1027

1028
	repsize = skb->len;
1029
	if (repsize < 4) {
1030
		dprintk("RPC:       impossible RPC reply size %d!\n", repsize);
1031
		return;
1032 1033 1034
	}

	/* Copy the XID from the skb... */
1035
	xp = skb_header_pointer(skb, 0, sizeof(_xid), &_xid);
1036
	if (xp == NULL)
1037
		return;
1038 1039

	/* Look up and lock the request corresponding to the given XID */
1040
	spin_lock_bh(&xprt->transport_lock);
1041 1042 1043 1044 1045 1046 1047 1048 1049
	rovr = xprt_lookup_rqst(xprt, *xp);
	if (!rovr)
		goto out_unlock;
	task = rovr->rq_task;

	if ((copied = rovr->rq_private_buf.buflen) > repsize)
		copied = repsize;

	/* Suck it into the iovec, verify checksum if not done by hw. */
1050
	if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
1051
		__UDPX_INC_STATS(sk, UDP_MIB_INERRORS);
1052
		goto out_unlock;
1053 1054
	}

1055
	__UDPX_INC_STATS(sk, UDP_MIB_INDATAGRAMS);
1056

1057
	xprt_adjust_cwnd(xprt, task, copied);
1058
	xprt_complete_rqst(task, copied);
1059 1060

 out_unlock:
1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075
	spin_unlock_bh(&xprt->transport_lock);
}

static void xs_udp_data_receive(struct sock_xprt *transport)
{
	struct sk_buff *skb;
	struct sock *sk;
	int err;

	mutex_lock(&transport->recv_mutex);
	sk = transport->inet;
	if (sk == NULL)
		goto out;
	for (;;) {
		skb = skb_recv_datagram(sk, 0, 1, &err);
1076 1077 1078 1079 1080 1081
		if (skb != NULL) {
			xs_udp_data_read_skb(&transport->xprt, sk, skb);
			skb_free_datagram(sk, skb);
			continue;
		}
		if (!test_and_clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109
			break;
	}
out:
	mutex_unlock(&transport->recv_mutex);
}

static void xs_udp_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_udp_data_receive(transport);
}

/**
 * xs_data_ready - "data ready" callback for UDP sockets
 * @sk: socket with data to read
 *
 */
static void xs_data_ready(struct sock *sk)
{
	struct rpc_xprt *xprt;

	read_lock_bh(&sk->sk_callback_lock);
	dprintk("RPC:       xs_data_ready...\n");
	xprt = xprt_from_sock(sk);
	if (xprt != NULL) {
		struct sock_xprt *transport = container_of(xprt,
				struct sock_xprt, xprt);
1110 1111 1112 1113 1114 1115
		transport->old_data_ready(sk);
		/* Any data means we had a useful conversation, so
		 * then we don't need to delay the next reconnect
		 */
		if (xprt->reestablish_timeout)
			xprt->reestablish_timeout = 0;
1116
		if (!test_and_set_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
1117
			queue_work(xprtiod_workqueue, &transport->recv_worker);
1118
	}
E
Eric Dumazet 已提交
1119
	read_unlock_bh(&sk->sk_callback_lock);
1120 1121
}

1122 1123 1124 1125 1126 1127 1128 1129 1130
/*
 * Helper function to force a TCP close if the server is sending
 * junk and/or it has put us in CLOSE_WAIT
 */
static void xs_tcp_force_close(struct rpc_xprt *xprt)
{
	xprt_force_disconnect(xprt);
}

1131
static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
1132
{
1133
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1134 1135 1136
	size_t len, used;
	char *p;

1137 1138
	p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
	len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
1139
	used = xdr_skb_read_bits(desc, p, len);
1140
	transport->tcp_offset += used;
1141 1142
	if (used != len)
		return;
1143

1144 1145
	transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
	if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
1146
		transport->tcp_flags |= TCP_RCV_LAST_FRAG;
1147
	else
1148
		transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
1149
	transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
1150

1151
	transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
1152
	transport->tcp_offset = 0;
1153

1154
	/* Sanity check of the record length */
1155
	if (unlikely(transport->tcp_reclen < 8)) {
1156
		dprintk("RPC:       invalid TCP record fragment length\n");
1157
		xs_tcp_force_close(xprt);
1158
		return;
1159
	}
1160
	dprintk("RPC:       reading TCP record fragment of length %d\n",
1161
			transport->tcp_reclen);
1162 1163
}

1164
static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
1165
{
1166
	if (transport->tcp_offset == transport->tcp_reclen) {
1167
		transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
1168
		transport->tcp_offset = 0;
1169 1170 1171
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
			transport->tcp_flags |= TCP_RCV_COPY_XID;
1172
			transport->tcp_copied = 0;
1173 1174 1175 1176
		}
	}
}

1177
static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1178 1179 1180 1181
{
	size_t len, used;
	char *p;

1182
	len = sizeof(transport->tcp_xid) - transport->tcp_offset;
1183
	dprintk("RPC:       reading XID (%Zu bytes)\n", len);
1184
	p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
1185
	used = xdr_skb_read_bits(desc, p, len);
1186
	transport->tcp_offset += used;
1187 1188
	if (used != len)
		return;
1189
	transport->tcp_flags &= ~TCP_RCV_COPY_XID;
1190
	transport->tcp_flags |= TCP_RCV_READ_CALLDIR;
1191
	transport->tcp_copied = 4;
1192 1193 1194
	dprintk("RPC:       reading %s XID %08x\n",
			(transport->tcp_flags & TCP_RPC_REPLY) ? "reply for"
							      : "request with",
1195 1196
			ntohl(transport->tcp_xid));
	xs_tcp_check_fraghdr(transport);
1197 1198
}

1199 1200
static inline void xs_tcp_read_calldir(struct sock_xprt *transport,
				       struct xdr_skb_reader *desc)
1201
{
1202 1203
	size_t len, used;
	u32 offset;
1204
	char *p;
1205 1206 1207 1208 1209 1210 1211 1212

	/*
	 * We want transport->tcp_offset to be 8 at the end of this routine
	 * (4 bytes for the xid and 4 bytes for the call/reply flag).
	 * When this function is called for the first time,
	 * transport->tcp_offset is 4 (after having already read the xid).
	 */
	offset = transport->tcp_offset - sizeof(transport->tcp_xid);
1213
	len = sizeof(transport->tcp_calldir) - offset;
1214
	dprintk("RPC:       reading CALL/REPLY flag (%Zu bytes)\n", len);
1215 1216
	p = ((char *) &transport->tcp_calldir) + offset;
	used = xdr_skb_read_bits(desc, p, len);
1217 1218 1219
	transport->tcp_offset += used;
	if (used != len)
		return;
1220 1221 1222 1223 1224
	transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR;
	/*
	 * We don't yet have the XDR buffer, so we will write the calldir
	 * out after we get the buffer from the 'struct rpc_rqst'
	 */
1225 1226 1227 1228
	switch (ntohl(transport->tcp_calldir)) {
	case RPC_REPLY:
		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
		transport->tcp_flags |= TCP_RCV_COPY_DATA;
1229
		transport->tcp_flags |= TCP_RPC_REPLY;
1230 1231 1232 1233
		break;
	case RPC_CALL:
		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
		transport->tcp_flags |= TCP_RCV_COPY_DATA;
1234
		transport->tcp_flags &= ~TCP_RPC_REPLY;
1235 1236 1237
		break;
	default:
		dprintk("RPC:       invalid request message type\n");
1238
		xs_tcp_force_close(&transport->xprt);
1239
	}
1240 1241 1242
	xs_tcp_check_fraghdr(transport);
}

R
Ricardo Labiaga 已提交
1243 1244 1245
static inline void xs_tcp_read_common(struct rpc_xprt *xprt,
				     struct xdr_skb_reader *desc,
				     struct rpc_rqst *req)
1246
{
R
Ricardo Labiaga 已提交
1247 1248
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
1249 1250 1251 1252 1253
	struct xdr_buf *rcvbuf;
	size_t len;
	ssize_t r;

	rcvbuf = &req->rq_private_buf;
1254 1255 1256 1257 1258 1259

	if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) {
		/*
		 * Save the RPC direction in the XDR buffer
		 */
		memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied,
1260 1261 1262
			&transport->tcp_calldir,
			sizeof(transport->tcp_calldir));
		transport->tcp_copied += sizeof(transport->tcp_calldir);
1263
		transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR;
1264 1265 1266
	}

	len = desc->count;
1267
	if (len > transport->tcp_reclen - transport->tcp_offset) {
1268
		struct xdr_skb_reader my_desc;
1269

1270
		len = transport->tcp_reclen - transport->tcp_offset;
1271 1272
		memcpy(&my_desc, desc, sizeof(my_desc));
		my_desc.count = len;
1273
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1274
					  &my_desc, xdr_skb_read_bits);
1275 1276 1277
		desc->count -= r;
		desc->offset += r;
	} else
1278
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1279
					  desc, xdr_skb_read_bits);
1280 1281

	if (r > 0) {
1282 1283
		transport->tcp_copied += r;
		transport->tcp_offset += r;
1284 1285 1286 1287 1288
	}
	if (r != len) {
		/* Error when copying to the receive buffer,
		 * usually because we weren't able to allocate
		 * additional buffer pages. All we can do now
1289
		 * is turn off TCP_RCV_COPY_DATA, so the request
1290 1291 1292 1293 1294
		 * will not receive any additional updates,
		 * and time out.
		 * Any remaining data from this record will
		 * be discarded.
		 */
1295
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1296
		dprintk("RPC:       XID %08x truncated request\n",
1297
				ntohl(transport->tcp_xid));
1298 1299 1300 1301
		dprintk("RPC:       xprt = %p, tcp_copied = %lu, "
				"tcp_offset = %u, tcp_reclen = %u\n",
				xprt, transport->tcp_copied,
				transport->tcp_offset, transport->tcp_reclen);
R
Ricardo Labiaga 已提交
1302
		return;
1303 1304
	}

1305
	dprintk("RPC:       XID %08x read %Zd bytes\n",
1306
			ntohl(transport->tcp_xid), r);
1307 1308 1309
	dprintk("RPC:       xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
			"tcp_reclen = %u\n", xprt, transport->tcp_copied,
			transport->tcp_offset, transport->tcp_reclen);
1310 1311

	if (transport->tcp_copied == req->rq_private_buf.buflen)
1312
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1313
	else if (transport->tcp_offset == transport->tcp_reclen) {
1314 1315
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1316
	}
R
Ricardo Labiaga 已提交
1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332
}

/*
 * Finds the request corresponding to the RPC xid and invokes the common
 * tcp read code to read the data.
 */
static inline int xs_tcp_read_reply(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

	dprintk("RPC:       read reply XID %08x\n", ntohl(transport->tcp_xid));

	/* Find and lock the request corresponding to this xid */
1333
	spin_lock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1334 1335 1336 1337
	req = xprt_lookup_rqst(xprt, transport->tcp_xid);
	if (!req) {
		dprintk("RPC:       XID %08x request not found!\n",
				ntohl(transport->tcp_xid));
1338
		spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1339 1340 1341 1342 1343
		return -1;
	}

	xs_tcp_read_common(xprt, desc, req);

1344
	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
1345
		xprt_complete_rqst(req->rq_task, transport->tcp_copied);
R
Ricardo Labiaga 已提交
1346

1347
	spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1348 1349 1350
	return 0;
}

1351
#if defined(CONFIG_SUNRPC_BACKCHANNEL)
R
Ricardo Labiaga 已提交
1352 1353 1354 1355 1356 1357 1358
/*
 * Obtains an rpc_rqst previously allocated and invokes the common
 * tcp read code to read the data.  The result is placed in the callback
 * queue.
 * If we're unable to obtain the rpc_rqst we schedule the closing of the
 * connection and return -1.
 */
1359
static int xs_tcp_read_callback(struct rpc_xprt *xprt,
R
Ricardo Labiaga 已提交
1360 1361 1362 1363 1364 1365
				       struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

1366
	/* Look up and lock the request corresponding to the given XID */
1367
	spin_lock_bh(&xprt->transport_lock);
1368
	req = xprt_lookup_bc_request(xprt, transport->tcp_xid);
R
Ricardo Labiaga 已提交
1369
	if (req == NULL) {
1370
		spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1371 1372 1373 1374 1375 1376 1377 1378
		printk(KERN_WARNING "Callback slot table overflowed\n");
		xprt_force_disconnect(xprt);
		return -1;
	}

	dprintk("RPC:       read callback  XID %08x\n", ntohl(req->rq_xid));
	xs_tcp_read_common(xprt, desc, req);

1379 1380
	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
		xprt_complete_bc_request(req, transport->tcp_copied);
1381
	spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395

	return 0;
}

static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	return (transport->tcp_flags & TCP_RPC_REPLY) ?
		xs_tcp_read_reply(xprt, desc) :
		xs_tcp_read_callback(xprt, desc);
}
1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406

static int xs_tcp_bc_up(struct svc_serv *serv, struct net *net)
{
	int ret;

	ret = svc_create_xprt(serv, "tcp-bc", net, PF_INET, 0,
			      SVC_SOCK_ANONYMOUS);
	if (ret < 0)
		return ret;
	return 0;
}
1407 1408 1409 1410 1411

static size_t xs_tcp_bc_maxpayload(struct rpc_xprt *xprt)
{
	return PAGE_SIZE;
}
R
Ricardo Labiaga 已提交
1412 1413 1414 1415 1416 1417
#else
static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	return xs_tcp_read_reply(xprt, desc);
}
1418
#endif /* CONFIG_SUNRPC_BACKCHANNEL */
R
Ricardo Labiaga 已提交
1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438

/*
 * Read data off the transport.  This can be either an RPC_CALL or an
 * RPC_REPLY.  Relay the processing to helper functions.
 */
static void xs_tcp_read_data(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	if (_xs_tcp_read_data(xprt, desc) == 0)
		xs_tcp_check_fraghdr(transport);
	else {
		/*
		 * The transport_lock protects the request handling.
		 * There's no need to hold it to update the tcp_flags.
		 */
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
	}
1439 1440
}

1441
static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1442 1443 1444
{
	size_t len;

1445
	len = transport->tcp_reclen - transport->tcp_offset;
1446 1447 1448 1449
	if (len > desc->count)
		len = desc->count;
	desc->count -= len;
	desc->offset += len;
1450
	transport->tcp_offset += len;
1451
	dprintk("RPC:       discarded %Zu bytes\n", len);
1452
	xs_tcp_check_fraghdr(transport);
1453 1454
}

1455
static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
1456 1457
{
	struct rpc_xprt *xprt = rd_desc->arg.data;
1458
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1459
	struct xdr_skb_reader desc = {
1460 1461 1462
		.skb	= skb,
		.offset	= offset,
		.count	= len,
1463
	};
1464

1465
	dprintk("RPC:       xs_tcp_data_recv started\n");
1466
	do {
1467
		trace_xs_tcp_data_recv(transport);
1468 1469
		/* Read in a new fragment marker if necessary */
		/* Can we ever really expect to get completely empty fragments? */
1470
		if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
1471
			xs_tcp_read_fraghdr(xprt, &desc);
1472 1473 1474
			continue;
		}
		/* Read in the xid if necessary */
1475
		if (transport->tcp_flags & TCP_RCV_COPY_XID) {
1476
			xs_tcp_read_xid(transport, &desc);
1477 1478
			continue;
		}
1479
		/* Read in the call/reply flag */
1480
		if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) {
1481 1482 1483
			xs_tcp_read_calldir(transport, &desc);
			continue;
		}
1484
		/* Read in the request data */
1485
		if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
R
Ricardo Labiaga 已提交
1486
			xs_tcp_read_data(xprt, &desc);
1487 1488 1489
			continue;
		}
		/* Skip over any trailing bytes on short reads */
1490
		xs_tcp_read_discard(transport, &desc);
1491
	} while (desc.count);
1492
	trace_xs_tcp_data_recv(transport);
1493
	dprintk("RPC:       xs_tcp_data_recv done\n");
1494 1495 1496
	return len - desc.count;
}

T
Trond Myklebust 已提交
1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507
static void xs_tcp_data_receive(struct sock_xprt *transport)
{
	struct rpc_xprt *xprt = &transport->xprt;
	struct sock *sk;
	read_descriptor_t rd_desc = {
		.count = 2*1024*1024,
		.arg.data = xprt,
	};
	unsigned long total = 0;
	int read = 0;

1508
	mutex_lock(&transport->recv_mutex);
T
Trond Myklebust 已提交
1509
	sk = transport->inet;
1510 1511
	if (sk == NULL)
		goto out;
T
Trond Myklebust 已提交
1512 1513 1514

	/* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
	for (;;) {
1515
		lock_sock(sk);
T
Trond Myklebust 已提交
1516
		read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
1517 1518 1519 1520 1521 1522 1523 1524 1525
		if (read <= 0) {
			clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state);
			release_sock(sk);
			if (!test_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
				break;
		} else {
			release_sock(sk);
			total += read;
		}
T
Trond Myklebust 已提交
1526 1527
		rd_desc.count = 65536;
	}
1528 1529
out:
	mutex_unlock(&transport->recv_mutex);
T
Trond Myklebust 已提交
1530 1531 1532
	trace_xs_tcp_data_ready(xprt, read, total);
}

1533 1534 1535 1536 1537 1538 1539
static void xs_tcp_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_tcp_data_receive(transport);
}

1540 1541 1542 1543 1544 1545
/**
 * xs_tcp_state_change - callback to handle TCP socket state changes
 * @sk: socket whose state has changed
 *
 */
static void xs_tcp_state_change(struct sock *sk)
1546
{
1547
	struct rpc_xprt *xprt;
1548
	struct sock_xprt *transport;
1549

E
Eric Dumazet 已提交
1550
	read_lock_bh(&sk->sk_callback_lock);
1551 1552
	if (!(xprt = xprt_from_sock(sk)))
		goto out;
1553
	dprintk("RPC:       xs_tcp_state_change client %p...\n", xprt);
1554
	dprintk("RPC:       state %x conn %d dead %d zapped %d sk_shutdown %d\n",
1555 1556
			sk->sk_state, xprt_connected(xprt),
			sock_flag(sk, SOCK_DEAD),
1557 1558
			sock_flag(sk, SOCK_ZAPPED),
			sk->sk_shutdown);
1559

1560
	transport = container_of(xprt, struct sock_xprt, xprt);
1561
	trace_rpc_socket_state_change(xprt, sk->sk_socket);
1562 1563
	switch (sk->sk_state) {
	case TCP_ESTABLISHED:
E
Eric Dumazet 已提交
1564
		spin_lock(&xprt->transport_lock);
1565
		if (!xprt_test_and_set_connected(xprt)) {
1566

1567
			/* Reset TCP record info */
1568 1569 1570
			transport->tcp_offset = 0;
			transport->tcp_reclen = 0;
			transport->tcp_copied = 0;
1571 1572
			transport->tcp_flags =
				TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
1573
			xprt->connect_cookie++;
1574 1575
			clear_bit(XPRT_SOCK_CONNECTING, &transport->sock_state);
			xprt_clear_connecting(xprt);
1576

1577
			xprt_wake_pending_tasks(xprt, -EAGAIN);
1578
		}
E
Eric Dumazet 已提交
1579
		spin_unlock(&xprt->transport_lock);
1580
		break;
1581 1582
	case TCP_FIN_WAIT1:
		/* The client initiated a shutdown of the socket */
1583
		xprt->connect_cookie++;
1584
		xprt->reestablish_timeout = 0;
1585
		set_bit(XPRT_CLOSING, &xprt->state);
1586
		smp_mb__before_atomic();
1587
		clear_bit(XPRT_CONNECTED, &xprt->state);
1588
		clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
1589
		smp_mb__after_atomic();
1590
		break;
1591
	case TCP_CLOSE_WAIT:
1592
		/* The server initiated a shutdown of the socket */
1593
		xprt->connect_cookie++;
1594
		clear_bit(XPRT_CONNECTED, &xprt->state);
1595
		xs_tcp_force_close(xprt);
1596 1597 1598 1599 1600 1601 1602
	case TCP_CLOSING:
		/*
		 * If the server closed down the connection, make sure that
		 * we back off before reconnecting
		 */
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
1603 1604
		break;
	case TCP_LAST_ACK:
1605
		set_bit(XPRT_CLOSING, &xprt->state);
1606
		smp_mb__before_atomic();
1607
		clear_bit(XPRT_CONNECTED, &xprt->state);
1608
		smp_mb__after_atomic();
1609 1610
		break;
	case TCP_CLOSE:
1611 1612 1613
		if (test_and_clear_bit(XPRT_SOCK_CONNECTING,
					&transport->sock_state))
			xprt_clear_connecting(xprt);
1614
		xs_sock_mark_closed(xprt);
1615 1616
	}
 out:
E
Eric Dumazet 已提交
1617
	read_unlock_bh(&sk->sk_callback_lock);
1618 1619
}

1620 1621
static void xs_write_space(struct sock *sk)
{
1622
	struct socket_wq *wq;
1623 1624
	struct rpc_xprt *xprt;

1625
	if (!sk->sk_socket)
1626
		return;
1627
	clear_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
1628 1629 1630

	if (unlikely(!(xprt = xprt_from_sock(sk))))
		return;
1631 1632 1633 1634
	rcu_read_lock();
	wq = rcu_dereference(sk->sk_wq);
	if (!wq || test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags) == 0)
		goto out;
1635 1636

	xprt_write_space(xprt);
1637 1638
out:
	rcu_read_unlock();
1639 1640
}

1641
/**
1642 1643
 * xs_udp_write_space - callback invoked when socket buffer space
 *                             becomes available
1644 1645
 * @sk: socket whose state has changed
 *
1646 1647
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
1648
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1649 1650
 * with a bunch of small requests.
 */
1651
static void xs_udp_write_space(struct sock *sk)
1652
{
E
Eric Dumazet 已提交
1653
	read_lock_bh(&sk->sk_callback_lock);
1654

1655
	/* from net/core/sock.c:sock_def_write_space */
1656 1657
	if (sock_writeable(sk))
		xs_write_space(sk);
1658

E
Eric Dumazet 已提交
1659
	read_unlock_bh(&sk->sk_callback_lock);
1660
}
1661

1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673
/**
 * xs_tcp_write_space - callback invoked when socket buffer space
 *                             becomes available
 * @sk: socket whose state has changed
 *
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
 * with a bunch of small requests.
 */
static void xs_tcp_write_space(struct sock *sk)
{
E
Eric Dumazet 已提交
1674
	read_lock_bh(&sk->sk_callback_lock);
1675 1676

	/* from net/core/stream.c:sk_stream_write_space */
1677
	if (sk_stream_is_writeable(sk))
1678
		xs_write_space(sk);
1679

E
Eric Dumazet 已提交
1680
	read_unlock_bh(&sk->sk_callback_lock);
1681 1682
}

1683
static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
1684
{
1685 1686
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct sock *sk = transport->inet;
1687

1688
	if (transport->rcvsize) {
1689
		sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
1690
		sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
1691
	}
1692
	if (transport->sndsize) {
1693
		sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
1694
		sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
1695 1696 1697 1698
		sk->sk_write_space(sk);
	}
}

1699
/**
1700
 * xs_udp_set_buffer_size - set send and receive limits
1701
 * @xprt: generic transport
1702 1703
 * @sndsize: requested size of send buffer, in bytes
 * @rcvsize: requested size of receive buffer, in bytes
1704
 *
1705
 * Set socket send and receive buffer size limits.
1706
 */
1707
static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
1708
{
1709 1710 1711
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	transport->sndsize = 0;
1712
	if (sndsize)
1713 1714
		transport->sndsize = sndsize + 1024;
	transport->rcvsize = 0;
1715
	if (rcvsize)
1716
		transport->rcvsize = rcvsize + 1024;
1717 1718

	xs_udp_do_set_buffer_size(xprt);
1719 1720
}

1721 1722 1723 1724 1725 1726
/**
 * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
 * @task: task that timed out
 *
 * Adjust the congestion window after a retransmit timeout has occurred.
 */
1727
static void xs_udp_timer(struct rpc_xprt *xprt, struct rpc_task *task)
1728
{
1729
	xprt_adjust_cwnd(xprt, task, -ETIMEDOUT);
1730 1731
}

1732 1733
static unsigned short xs_get_random_port(void)
{
1734
	unsigned short range = xprt_max_resvport - xprt_min_resvport + 1;
1735
	unsigned short rand = (unsigned short) prandom_u32() % range;
1736 1737 1738
	return rand + xprt_min_resvport;
}

1739 1740 1741 1742 1743 1744 1745 1746 1747
/**
 * xs_set_reuseaddr_port - set the socket's port and address reuse options
 * @sock: socket
 *
 * Note that this function has to be called on all sockets that share the
 * same port, and it must be called before binding.
 */
static void xs_sock_set_reuseport(struct socket *sock)
{
1748
	int opt = 1;
1749

1750 1751
	kernel_setsockopt(sock, SOL_SOCKET, SO_REUSEPORT,
			(char *)&opt, sizeof(opt));
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772
}

static unsigned short xs_sock_getport(struct socket *sock)
{
	struct sockaddr_storage buf;
	int buflen;
	unsigned short port = 0;

	if (kernel_getsockname(sock, (struct sockaddr *)&buf, &buflen) < 0)
		goto out;
	switch (buf.ss_family) {
	case AF_INET6:
		port = ntohs(((struct sockaddr_in6 *)&buf)->sin6_port);
		break;
	case AF_INET:
		port = ntohs(((struct sockaddr_in *)&buf)->sin_port);
	}
out:
	return port;
}

1773 1774 1775 1776 1777 1778 1779 1780
/**
 * xs_set_port - reset the port number in the remote endpoint address
 * @xprt: generic transport
 * @port: new port number
 *
 */
static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
{
1781
	dprintk("RPC:       setting port for xprt %p to %u\n", xprt, port);
1782

1783 1784
	rpc_set_port(xs_addr(xprt), port);
	xs_update_peer_port(xprt);
1785 1786
}

1787 1788 1789 1790 1791 1792
static void xs_set_srcport(struct sock_xprt *transport, struct socket *sock)
{
	if (transport->srcport == 0)
		transport->srcport = xs_sock_getport(sock);
}

1793
static unsigned short xs_get_srcport(struct sock_xprt *transport)
1794
{
1795
	unsigned short port = transport->srcport;
1796 1797 1798 1799 1800 1801

	if (port == 0 && transport->xprt.resvport)
		port = xs_get_random_port();
	return port;
}

1802
static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port)
1803
{
1804 1805
	if (transport->srcport != 0)
		transport->srcport = 0;
1806 1807 1808 1809 1810 1811
	if (!transport->xprt.resvport)
		return 0;
	if (port <= xprt_min_resvport || port > xprt_max_resvport)
		return xprt_max_resvport;
	return --port;
}
P
Pavel Emelyanov 已提交
1812
static int xs_bind(struct sock_xprt *transport, struct socket *sock)
1813
{
P
Pavel Emelyanov 已提交
1814
	struct sockaddr_storage myaddr;
1815
	int err, nloop = 0;
1816
	unsigned short port = xs_get_srcport(transport);
1817
	unsigned short last;
1818

1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836
	/*
	 * If we are asking for any ephemeral port (i.e. port == 0 &&
	 * transport->xprt.resvport == 0), don't bind.  Let the local
	 * port selection happen implicitly when the socket is used
	 * (for example at connect time).
	 *
	 * This ensures that we can continue to establish TCP
	 * connections even when all local ephemeral ports are already
	 * a part of some TCP connection.  This makes no difference
	 * for UDP sockets, but also doens't harm them.
	 *
	 * If we're asking for any reserved port (i.e. port == 0 &&
	 * transport->xprt.resvport == 1) xs_get_srcport above will
	 * ensure that port is non-zero and we will bind as needed.
	 */
	if (port == 0)
		return 0;

P
Pavel Emelyanov 已提交
1837
	memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen);
1838
	do {
P
Pavel Emelyanov 已提交
1839 1840 1841
		rpc_set_port((struct sockaddr *)&myaddr, port);
		err = kernel_bind(sock, (struct sockaddr *)&myaddr,
				transport->xprt.addrlen);
1842
		if (err == 0) {
1843
			transport->srcport = port;
1844
			break;
1845
		}
1846
		last = port;
1847
		port = xs_next_srcport(transport, port);
1848 1849 1850
		if (port > last)
			nloop++;
	} while (err == -EADDRINUSE && nloop != 2);
1851

1852
	if (myaddr.ss_family == AF_INET)
P
Pavel Emelyanov 已提交
1853 1854 1855 1856 1857 1858 1859
		dprintk("RPC:       %s %pI4:%u: %s (%d)\n", __func__,
				&((struct sockaddr_in *)&myaddr)->sin_addr,
				port, err ? "failed" : "ok", err);
	else
		dprintk("RPC:       %s %pI6:%u: %s (%d)\n", __func__,
				&((struct sockaddr_in6 *)&myaddr)->sin6_addr,
				port, err ? "failed" : "ok", err);
1860 1861 1862
	return err;
}

1863 1864 1865 1866 1867
/*
 * We don't support autobind on AF_LOCAL sockets
 */
static void xs_local_rpcbind(struct rpc_task *task)
{
1868
	xprt_set_bound(task->tk_xprt);
1869 1870 1871 1872 1873
}

static void xs_local_set_port(struct rpc_xprt *xprt, unsigned short port)
{
}
P
Pavel Emelyanov 已提交
1874

1875 1876 1877 1878
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key xs_key[2];
static struct lock_class_key xs_slock_key[2];

1879 1880 1881 1882 1883 1884 1885 1886
static inline void xs_reclassify_socketu(struct socket *sock)
{
	struct sock *sk = sock->sk;

	sock_lock_init_class_and_name(sk, "slock-AF_LOCAL-RPC",
		&xs_slock_key[1], "sk_lock-AF_LOCAL-RPC", &xs_key[1]);
}

1887
static inline void xs_reclassify_socket4(struct socket *sock)
1888 1889
{
	struct sock *sk = sock->sk;
1890 1891 1892 1893

	sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
		&xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
}
1894

1895 1896 1897
static inline void xs_reclassify_socket6(struct socket *sock)
{
	struct sock *sk = sock->sk;
1898

1899 1900
	sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
		&xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
1901
}
1902 1903 1904

static inline void xs_reclassify_socket(int family, struct socket *sock)
{
1905
	if (WARN_ON_ONCE(!sock_allow_reclassification(sock->sk)))
1906 1907
		return;

1908
	switch (family) {
1909 1910 1911
	case AF_LOCAL:
		xs_reclassify_socketu(sock);
		break;
1912
	case AF_INET:
1913
		xs_reclassify_socket4(sock);
1914 1915
		break;
	case AF_INET6:
1916
		xs_reclassify_socket6(sock);
1917 1918
		break;
	}
1919
}
1920
#else
1921 1922 1923
static inline void xs_reclassify_socket(int family, struct socket *sock)
{
}
1924 1925
#endif

1926 1927 1928 1929
static void xs_dummy_setup_socket(struct work_struct *work)
{
}

1930
static struct socket *xs_create_sock(struct rpc_xprt *xprt,
1931 1932
		struct sock_xprt *transport, int family, int type,
		int protocol, bool reuseport)
1933 1934 1935 1936
{
	struct socket *sock;
	int err;

1937
	err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1);
1938 1939 1940 1941 1942
	if (err < 0) {
		dprintk("RPC:       can't create %d transport socket (%d).\n",
				protocol, -err);
		goto out;
	}
1943
	xs_reclassify_socket(family, sock);
1944

1945 1946 1947
	if (reuseport)
		xs_sock_set_reuseport(sock);

1948 1949
	err = xs_bind(transport, sock);
	if (err) {
1950 1951 1952 1953 1954 1955 1956 1957 1958
		sock_release(sock);
		goto out;
	}

	return sock;
out:
	return ERR_PTR(err);
}

1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972
static int xs_local_finish_connecting(struct rpc_xprt *xprt,
				      struct socket *sock)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt,
									xprt);

	if (!transport->inet) {
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

		xs_save_old_callbacks(transport, sk);

		sk->sk_user_data = xprt;
1973
		sk->sk_data_ready = xs_data_ready;
1974
		sk->sk_write_space = xs_udp_write_space;
E
Eric Dumazet 已提交
1975
		sock_set_flag(sk, SOCK_FASYNC);
1976
		sk->sk_error_report = xs_error_report;
1977
		sk->sk_allocation = GFP_NOIO;
1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997

		xprt_clear_connected(xprt);

		/* Reset to new socket */
		transport->sock = sock;
		transport->inet = sk;

		write_unlock_bh(&sk->sk_callback_lock);
	}

	/* Tell the socket layer to start connecting... */
	xprt->stat.connect_count++;
	xprt->stat.connect_start = jiffies;
	return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, 0);
}

/**
 * xs_local_setup_socket - create AF_LOCAL socket, connect to a local endpoint
 * @transport: socket transport to connect
 */
1998
static int xs_local_setup_socket(struct sock_xprt *transport)
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
{
	struct rpc_xprt *xprt = &transport->xprt;
	struct socket *sock;
	int status = -EIO;

	status = __sock_create(xprt->xprt_net, AF_LOCAL,
					SOCK_STREAM, 0, &sock, 1);
	if (status < 0) {
		dprintk("RPC:       can't create AF_LOCAL "
			"transport socket (%d).\n", -status);
		goto out;
	}
2011
	xs_reclassify_socket(AF_LOCAL, sock);
2012 2013 2014 2015 2016

	dprintk("RPC:       worker connecting xprt %p via AF_LOCAL to %s\n",
			xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);

	status = xs_local_finish_connecting(xprt, sock);
2017
	trace_rpc_socket_connect(xprt, sock, status);
2018 2019 2020 2021 2022
	switch (status) {
	case 0:
		dprintk("RPC:       xprt %p connected to %s\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		xprt_set_connected(xprt);
2023
	case -ENOBUFS:
2024 2025 2026 2027 2028
		break;
	case -ENOENT:
		dprintk("RPC:       xprt %p: socket %s does not exist\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		break;
2029 2030 2031 2032
	case -ECONNREFUSED:
		dprintk("RPC:       xprt %p: connection refused for %s\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		break;
2033 2034 2035 2036 2037 2038 2039 2040 2041
	default:
		printk(KERN_ERR "%s: unhandled error (%d) connecting to %s\n",
				__func__, -status,
				xprt->address_strings[RPC_DISPLAY_ADDR]);
	}

out:
	xprt_clear_connecting(xprt);
	xprt_wake_pending_tasks(xprt, status);
2042 2043 2044
	return status;
}

2045
static void xs_local_connect(struct rpc_xprt *xprt, struct rpc_task *task)
2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	int ret;

	 if (RPC_IS_ASYNC(task)) {
		/*
		 * We want the AF_LOCAL connect to be resolved in the
		 * filesystem namespace of the process making the rpc
		 * call.  Thus we connect synchronously.
		 *
		 * If we want to support asynchronous AF_LOCAL calls,
		 * we'll need to figure out how to pass a namespace to
		 * connect.
		 */
		rpc_exit(task, -ENOTCONN);
		return;
	}
	ret = xs_local_setup_socket(transport);
	if (ret && !RPC_IS_SOFTCONN(task))
		msleep_interruptible(15000);
2066 2067
}

2068
#if IS_ENABLED(CONFIG_SUNRPC_SWAP)
2069 2070 2071 2072 2073
/*
 * Note that this should be called with XPRT_LOCKED held (or when we otherwise
 * know that we have exclusive access to the socket), to guard against
 * races with xs_reset_transport.
 */
M
Mel Gorman 已提交
2074 2075 2076 2077 2078
static void xs_set_memalloc(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt,
			xprt);

2079 2080 2081 2082 2083 2084
	/*
	 * If there's no sock, then we have nothing to set. The
	 * reconnecting process will get it for us.
	 */
	if (!transport->inet)
		return;
2085
	if (atomic_read(&xprt->swapper))
M
Mel Gorman 已提交
2086 2087 2088 2089
		sk_set_memalloc(transport->inet);
}

/**
2090
 * xs_enable_swap - Tag this transport as being used for swap.
M
Mel Gorman 已提交
2091 2092
 * @xprt: transport to tag
 *
2093 2094
 * Take a reference to this transport on behalf of the rpc_clnt, and
 * optionally mark it for swapping if it wasn't already.
M
Mel Gorman 已提交
2095
 */
2096 2097
static int
xs_enable_swap(struct rpc_xprt *xprt)
M
Mel Gorman 已提交
2098
{
2099
	struct sock_xprt *xs = container_of(xprt, struct sock_xprt, xprt);
M
Mel Gorman 已提交
2100

2101 2102 2103 2104 2105 2106 2107
	if (atomic_inc_return(&xprt->swapper) != 1)
		return 0;
	if (wait_on_bit_lock(&xprt->state, XPRT_LOCKED, TASK_KILLABLE))
		return -ERESTARTSYS;
	if (xs->inet)
		sk_set_memalloc(xs->inet);
	xprt_release_xprt(xprt, NULL);
2108 2109
	return 0;
}
M
Mel Gorman 已提交
2110

2111
/**
2112
 * xs_disable_swap - Untag this transport as being used for swap.
2113 2114 2115 2116 2117
 * @xprt: transport to tag
 *
 * Drop a "swapper" reference to this xprt on behalf of the rpc_clnt. If the
 * swapper refcount goes to 0, untag the socket as a memalloc socket.
 */
2118 2119
static void
xs_disable_swap(struct rpc_xprt *xprt)
2120
{
2121
	struct sock_xprt *xs = container_of(xprt, struct sock_xprt, xprt);
2122

2123 2124 2125 2126 2127 2128 2129
	if (!atomic_dec_and_test(&xprt->swapper))
		return;
	if (wait_on_bit_lock(&xprt->state, XPRT_LOCKED, TASK_KILLABLE))
		return;
	if (xs->inet)
		sk_clear_memalloc(xs->inet);
	xprt_release_xprt(xprt, NULL);
M
Mel Gorman 已提交
2130 2131 2132 2133 2134
}
#else
static void xs_set_memalloc(struct rpc_xprt *xprt)
{
}
2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145

static int
xs_enable_swap(struct rpc_xprt *xprt)
{
	return -EINVAL;
}

static void
xs_disable_swap(struct rpc_xprt *xprt)
{
}
M
Mel Gorman 已提交
2146 2147
#endif

2148 2149 2150 2151 2152 2153 2154 2155 2156
static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	if (!transport->inet) {
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

2157 2158
		xs_save_old_callbacks(transport, sk);

2159
		sk->sk_user_data = xprt;
2160
		sk->sk_data_ready = xs_data_ready;
2161
		sk->sk_write_space = xs_udp_write_space;
E
Eric Dumazet 已提交
2162
		sock_set_flag(sk, SOCK_FASYNC);
2163
		sk->sk_allocation = GFP_NOIO;
2164 2165 2166 2167 2168 2169 2170

		xprt_set_connected(xprt);

		/* Reset to new socket */
		transport->sock = sock;
		transport->inet = sk;

M
Mel Gorman 已提交
2171 2172
		xs_set_memalloc(xprt);

2173 2174 2175
		write_unlock_bh(&sk->sk_callback_lock);
	}
	xs_udp_do_set_buffer_size(xprt);
2176 2177

	xprt->stat.connect_start = jiffies;
2178 2179
}

2180
static void xs_udp_setup_socket(struct work_struct *work)
2181
{
2182 2183
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
2184
	struct rpc_xprt *xprt = &transport->xprt;
2185
	struct socket *sock = transport->sock;
2186
	int status = -EIO;
2187

2188
	sock = xs_create_sock(xprt, transport,
2189 2190
			xs_addr(xprt)->sa_family, SOCK_DGRAM,
			IPPROTO_UDP, false);
2191
	if (IS_ERR(sock))
2192
		goto out;
2193

C
Chuck Lever 已提交
2194 2195 2196 2197 2198
	dprintk("RPC:       worker connecting xprt %p via %s to "
				"%s (port %s)\n", xprt,
			xprt->address_strings[RPC_DISPLAY_PROTO],
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT]);
2199 2200

	xs_udp_finish_connecting(xprt, sock);
2201
	trace_rpc_socket_connect(xprt, sock, 0);
2202 2203
	status = 0;
out:
2204
	xprt_unlock_connect(xprt, transport);
2205
	xprt_clear_connecting(xprt);
2206
	xprt_wake_pending_tasks(xprt, status);
2207 2208
}

2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229
/**
 * xs_tcp_shutdown - gracefully shut down a TCP socket
 * @xprt: transport
 *
 * Initiates a graceful shutdown of the TCP socket by calling the
 * equivalent of shutdown(SHUT_RDWR);
 */
static void xs_tcp_shutdown(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct socket *sock = transport->sock;

	if (sock == NULL)
		return;
	if (xprt_connected(xprt)) {
		kernel_sock_shutdown(sock, SHUT_RDWR);
		trace_rpc_socket_shutdown(xprt, sock);
	} else
		xs_reset_transport(transport);
}

2230
static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
2231
{
2232
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2233
	int ret = -ENOTCONN;
2234

2235
	if (!transport->inet) {
2236
		struct sock *sk = sock->sk;
2237 2238 2239
		unsigned int keepidle = xprt->timeout->to_initval / HZ;
		unsigned int keepcnt = xprt->timeout->to_retries + 1;
		unsigned int opt_on = 1;
2240
		unsigned int timeo;
2241
		unsigned int addr_pref = IPV6_PREFER_SRC_PUBLIC;
2242 2243 2244 2245 2246 2247 2248 2249 2250 2251

		/* TCP Keepalive options */
		kernel_setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
				(char *)&opt_on, sizeof(opt_on));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPIDLE,
				(char *)&keepidle, sizeof(keepidle));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPINTVL,
				(char *)&keepidle, sizeof(keepidle));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPCNT,
				(char *)&keepcnt, sizeof(keepcnt));
2252

2253 2254 2255 2256 2257 2258 2259 2260 2261 2262
		/* Avoid temporary address, they are bad for long-lived
		 * connections such as NFS mounts.
		 * RFC4941, section 3.6 suggests that:
		 *    Individual applications, which have specific
		 *    knowledge about the normal duration of connections,
		 *    MAY override this as appropriate.
		 */
		kernel_setsockopt(sock, SOL_IPV6, IPV6_ADDR_PREFERENCES,
				(char *)&addr_pref, sizeof(addr_pref));

2263 2264 2265 2266 2267 2268
		/* TCP user timeout (see RFC5482) */
		timeo = jiffies_to_msecs(xprt->timeout->to_initval) *
			(xprt->timeout->to_retries + 1);
		kernel_setsockopt(sock, SOL_TCP, TCP_USER_TIMEOUT,
				(char *)&timeo, sizeof(timeo));

2269 2270
		write_lock_bh(&sk->sk_callback_lock);

2271 2272
		xs_save_old_callbacks(transport, sk);

2273
		sk->sk_user_data = xprt;
2274
		sk->sk_data_ready = xs_data_ready;
2275 2276
		sk->sk_state_change = xs_tcp_state_change;
		sk->sk_write_space = xs_tcp_write_space;
E
Eric Dumazet 已提交
2277
		sock_set_flag(sk, SOCK_FASYNC);
2278
		sk->sk_error_report = xs_error_report;
2279
		sk->sk_allocation = GFP_NOIO;
2280 2281 2282 2283

		/* socket options */
		sock_reset_flag(sk, SOCK_LINGER);
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
2284 2285 2286 2287

		xprt_clear_connected(xprt);

		/* Reset to new socket */
2288 2289
		transport->sock = sock;
		transport->inet = sk;
2290 2291 2292 2293

		write_unlock_bh(&sk->sk_callback_lock);
	}

2294
	if (!xprt_bound(xprt))
2295
		goto out;
2296

M
Mel Gorman 已提交
2297 2298
	xs_set_memalloc(xprt);

2299
	/* Tell the socket layer to start connecting... */
2300 2301
	xprt->stat.connect_count++;
	xprt->stat.connect_start = jiffies;
2302
	set_bit(XPRT_SOCK_CONNECTING, &transport->sock_state);
2303 2304 2305
	ret = kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
	switch (ret) {
	case 0:
2306
		xs_set_srcport(transport, sock);
2307 2308 2309 2310
	case -EINPROGRESS:
		/* SYN_SENT! */
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2311 2312 2313 2314
		break;
	case -EADDRNOTAVAIL:
		/* Source port number is unavailable. Try a new one! */
		transport->srcport = 0;
2315 2316 2317
	}
out:
	return ret;
2318 2319
}

2320
/**
2321
 * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint
2322 2323
 *
 * Invoked by a work queue tasklet.
2324
 */
2325
static void xs_tcp_setup_socket(struct work_struct *work)
2326
{
2327 2328
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
2329
	struct socket *sock = transport->sock;
2330
	struct rpc_xprt *xprt = &transport->xprt;
2331
	int status = -EIO;
2332

2333
	if (!sock) {
2334
		sock = xs_create_sock(xprt, transport,
2335 2336
				xs_addr(xprt)->sa_family, SOCK_STREAM,
				IPPROTO_TCP, true);
2337 2338
		if (IS_ERR(sock)) {
			status = PTR_ERR(sock);
2339 2340
			goto out;
		}
2341
	}
2342

C
Chuck Lever 已提交
2343 2344 2345 2346 2347
	dprintk("RPC:       worker connecting xprt %p via %s to "
				"%s (port %s)\n", xprt,
			xprt->address_strings[RPC_DISPLAY_PROTO],
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT]);
2348

2349
	status = xs_tcp_finish_connecting(xprt, sock);
2350
	trace_rpc_socket_connect(xprt, sock, status);
2351 2352 2353
	dprintk("RPC:       %p connect status %d connected %d sock state %d\n",
			xprt, -status, xprt_connected(xprt),
			sock->sk->sk_state);
2354
	switch (status) {
2355 2356 2357 2358 2359 2360 2361
	default:
		printk("%s: connect returned unhandled error %d\n",
			__func__, status);
	case -EADDRNOTAVAIL:
		/* We're probably in TIME_WAIT. Get rid of existing socket,
		 * and retry
		 */
2362
		xs_tcp_force_close(xprt);
2363
		break;
2364 2365 2366
	case 0:
	case -EINPROGRESS:
	case -EALREADY:
2367
		xprt_unlock_connect(xprt, transport);
2368
		return;
2369 2370 2371 2372
	case -EINVAL:
		/* Happens, for instance, if the user specified a link
		 * local IPv6 address without a scope-id.
		 */
2373 2374 2375
	case -ECONNREFUSED:
	case -ECONNRESET:
	case -ENETUNREACH:
2376
	case -EADDRINUSE:
2377
	case -ENOBUFS:
2378
		/* retry with existing socket, after a delay */
2379
		xs_tcp_force_close(xprt);
2380
		goto out;
2381
	}
2382
	status = -EAGAIN;
2383
out:
2384
	xprt_unlock_connect(xprt, transport);
2385
	xprt_clear_connecting(xprt);
2386
	xprt_wake_pending_tasks(xprt, status);
2387
}
2388

2389 2390 2391 2392 2393 2394 2395 2396 2397 2398
static unsigned long xs_reconnect_delay(const struct rpc_xprt *xprt)
{
	unsigned long start, now = jiffies;

	start = xprt->stat.connect_start + xprt->reestablish_timeout;
	if (time_after(start, now))
		return start - now;
	return 0;
}

2399 2400
/**
 * xs_connect - connect a socket to a remote endpoint
2401
 * @xprt: pointer to transport structure
2402 2403 2404
 * @task: address of RPC task that manages state of connect request
 *
 * TCP: If the remote end dropped the connection, delay reconnecting.
2405 2406 2407 2408 2409 2410 2411
 *
 * UDP socket connects are synchronous, but we use a work queue anyway
 * to guarantee that even unprivileged user processes can set up a
 * socket on a privileged port.
 *
 * If a UDP socket connect fails, the delay behavior here prevents
 * retry floods (hard mounts).
2412
 */
2413
static void xs_connect(struct rpc_xprt *xprt, struct rpc_task *task)
2414
{
2415
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2416
	unsigned long delay = 0;
2417

2418 2419
	WARN_ON_ONCE(!xprt_lock_connect(xprt, task, transport));

2420
	if (transport->sock != NULL) {
2421 2422
		dprintk("RPC:       xs_connect delayed xprt %p for %lu "
				"seconds\n",
2423
				xprt, xprt->reestablish_timeout / HZ);
2424 2425 2426 2427

		/* Start by resetting any existing state */
		xs_reset_transport(transport);

2428 2429
		delay = xs_reconnect_delay(xprt);

2430
		xprt->reestablish_timeout <<= 1;
2431 2432
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2433 2434
		if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
2435
	} else
2436
		dprintk("RPC:       xs_connect scheduled xprt %p\n", xprt);
2437 2438 2439 2440

	queue_delayed_work(xprtiod_workqueue,
			&transport->connect_worker,
			delay);
2441 2442
}

2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456
/**
 * xs_local_print_stats - display AF_LOCAL socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_local_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
	long idle_time = 0;

	if (xprt_connected(xprt))
		idle_time = (long)(jiffies - xprt->last_used) / HZ;

	seq_printf(seq, "\txprt:\tlocal %lu %lu %lu %ld %lu %lu %lu "
2457
			"%llu %llu %lu %llu %llu\n",
2458 2459 2460 2461 2462 2463 2464 2465
			xprt->stat.bind_count,
			xprt->stat.connect_count,
			xprt->stat.connect_time,
			idle_time,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2466 2467 2468 2469
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2470 2471
}

2472 2473 2474 2475 2476 2477 2478 2479
/**
 * xs_udp_print_stats - display UDP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2480 2481
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

2482 2483
	seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %llu %llu "
			"%lu %llu %llu\n",
2484
			transport->srcport,
2485 2486 2487 2488 2489
			xprt->stat.bind_count,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2490 2491 2492 2493
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2494 2495 2496 2497 2498 2499 2500 2501 2502 2503
}

/**
 * xs_tcp_print_stats - display TCP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2504
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2505 2506 2507 2508 2509
	long idle_time = 0;

	if (xprt_connected(xprt))
		idle_time = (long)(jiffies - xprt->last_used) / HZ;

2510 2511
	seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu "
			"%llu %llu %lu %llu %llu\n",
2512
			transport->srcport,
2513 2514 2515 2516 2517 2518 2519 2520
			xprt->stat.bind_count,
			xprt->stat.connect_count,
			xprt->stat.connect_time,
			idle_time,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2521 2522 2523 2524
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2525 2526
}

2527 2528 2529 2530 2531
/*
 * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason
 * we allocate pages instead doing a kmalloc like rpc_malloc is because we want
 * to use the server side send routines.
 */
2532
static void *bc_malloc(struct rpc_task *task, size_t size)
2533 2534 2535 2536
{
	struct page *page;
	struct rpc_buffer *buf;

2537 2538 2539
	WARN_ON_ONCE(size > PAGE_SIZE - sizeof(struct rpc_buffer));
	if (size > PAGE_SIZE - sizeof(struct rpc_buffer))
		return NULL;
2540

2541
	page = alloc_page(GFP_KERNEL);
2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553
	if (!page)
		return NULL;

	buf = page_address(page);
	buf->len = PAGE_SIZE;

	return buf->data;
}

/*
 * Free the space allocated in the bc_alloc routine
 */
2554
static void bc_free(void *buffer)
2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579
{
	struct rpc_buffer *buf;

	if (!buffer)
		return;

	buf = container_of(buffer, struct rpc_buffer, data);
	free_page((unsigned long)buf);
}

/*
 * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex
 * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request.
 */
static int bc_sendto(struct rpc_rqst *req)
{
	int len;
	struct xdr_buf *xbufp = &req->rq_snd_buf;
	struct rpc_xprt *xprt = req->rq_xprt;
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct socket *sock = transport->sock;
	unsigned long headoff;
	unsigned long tailoff;

2580
	xs_encode_stream_record_marker(xbufp);
2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602

	tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK;
	headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK;
	len = svc_send_common(sock, xbufp,
			      virt_to_page(xbufp->head[0].iov_base), headoff,
			      xbufp->tail[0].iov_base, tailoff);

	if (len != xbufp->len) {
		printk(KERN_NOTICE "Error sending entire callback!\n");
		len = -EAGAIN;
	}

	return len;
}

/*
 * The send routine. Borrows from svc_send
 */
static int bc_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct svc_xprt	*xprt;
A
Andrzej Hajda 已提交
2603
	int len;
2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642 2643 2644 2645 2646 2647

	dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid));
	/*
	 * Get the server socket associated with this callback xprt
	 */
	xprt = req->rq_xprt->bc_xprt;

	/*
	 * Grab the mutex to serialize data as the connection is shared
	 * with the fore channel
	 */
	if (!mutex_trylock(&xprt->xpt_mutex)) {
		rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL);
		if (!mutex_trylock(&xprt->xpt_mutex))
			return -EAGAIN;
		rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task);
	}
	if (test_bit(XPT_DEAD, &xprt->xpt_flags))
		len = -ENOTCONN;
	else
		len = bc_sendto(req);
	mutex_unlock(&xprt->xpt_mutex);

	if (len > 0)
		len = 0;

	return len;
}

/*
 * The close routine. Since this is client initiated, we do nothing
 */

static void bc_close(struct rpc_xprt *xprt)
{
}

/*
 * The xprt destroy routine. Again, because this connection is client
 * initiated, we do nothing
 */

static void bc_destroy(struct rpc_xprt *xprt)
{
2648 2649 2650 2651
	dprintk("RPC:       bc_destroy xprt %p\n", xprt);

	xs_xprt_free(xprt);
	module_put(THIS_MODULE);
2652 2653
}

2654 2655 2656
static struct rpc_xprt_ops xs_local_ops = {
	.reserve_xprt		= xprt_reserve_xprt,
	.release_xprt		= xs_tcp_release_xprt,
2657
	.alloc_slot		= xprt_alloc_slot,
2658 2659
	.rpcbind		= xs_local_rpcbind,
	.set_port		= xs_local_set_port,
2660
	.connect		= xs_local_connect,
2661 2662 2663 2664 2665
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
	.send_request		= xs_local_send_request,
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
	.close			= xs_close,
T
Trond Myklebust 已提交
2666
	.destroy		= xs_destroy,
2667
	.print_stats		= xs_local_print_stats,
2668 2669
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
2670 2671
};

2672
static struct rpc_xprt_ops xs_udp_ops = {
2673
	.set_buffer_size	= xs_udp_set_buffer_size,
2674
	.reserve_xprt		= xprt_reserve_xprt_cong,
2675
	.release_xprt		= xprt_release_xprt_cong,
2676
	.alloc_slot		= xprt_alloc_slot,
2677
	.rpcbind		= rpcb_getport_async,
2678
	.set_port		= xs_set_port,
2679
	.connect		= xs_connect,
2680 2681
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2682
	.send_request		= xs_udp_send_request,
2683
	.set_retrans_timeout	= xprt_set_retrans_timeout_rtt,
2684
	.timer			= xs_udp_timer,
2685
	.release_request	= xprt_release_rqst_cong,
2686 2687
	.close			= xs_close,
	.destroy		= xs_destroy,
2688
	.print_stats		= xs_udp_print_stats,
2689 2690
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2691
	.inject_disconnect	= xs_inject_disconnect,
2692 2693 2694
};

static struct rpc_xprt_ops xs_tcp_ops = {
2695
	.reserve_xprt		= xprt_reserve_xprt,
2696
	.release_xprt		= xs_tcp_release_xprt,
2697
	.alloc_slot		= xprt_lock_and_alloc_slot,
2698
	.rpcbind		= rpcb_getport_async,
2699
	.set_port		= xs_set_port,
2700
	.connect		= xs_connect,
2701 2702
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2703
	.send_request		= xs_tcp_send_request,
2704
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
2705
	.close			= xs_tcp_shutdown,
2706
	.destroy		= xs_destroy,
2707
	.print_stats		= xs_tcp_print_stats,
2708 2709
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2710
	.inject_disconnect	= xs_inject_disconnect,
2711 2712
#ifdef CONFIG_SUNRPC_BACKCHANNEL
	.bc_setup		= xprt_setup_bc,
2713
	.bc_up			= xs_tcp_bc_up,
2714
	.bc_maxpayload		= xs_tcp_bc_maxpayload,
2715 2716 2717
	.bc_free_rqst		= xprt_free_bc_rqst,
	.bc_destroy		= xprt_destroy_bc,
#endif
2718 2719
};

2720 2721 2722 2723 2724 2725 2726
/*
 * The rpc_xprt_ops for the server backchannel
 */

static struct rpc_xprt_ops bc_tcp_ops = {
	.reserve_xprt		= xprt_reserve_xprt,
	.release_xprt		= xprt_release_xprt,
2727
	.alloc_slot		= xprt_alloc_slot,
2728 2729 2730 2731 2732 2733 2734
	.buf_alloc		= bc_malloc,
	.buf_free		= bc_free,
	.send_request		= bc_send_request,
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
	.close			= bc_close,
	.destroy		= bc_destroy,
	.print_stats		= xs_tcp_print_stats,
2735 2736
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2737
	.inject_disconnect	= xs_inject_disconnect,
2738 2739
};

2740 2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751
static int xs_init_anyaddr(const int family, struct sockaddr *sap)
{
	static const struct sockaddr_in sin = {
		.sin_family		= AF_INET,
		.sin_addr.s_addr	= htonl(INADDR_ANY),
	};
	static const struct sockaddr_in6 sin6 = {
		.sin6_family		= AF_INET6,
		.sin6_addr		= IN6ADDR_ANY_INIT,
	};

	switch (family) {
2752 2753
	case AF_LOCAL:
		break;
2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766
	case AF_INET:
		memcpy(sap, &sin, sizeof(sin));
		break;
	case AF_INET6:
		memcpy(sap, &sin6, sizeof(sin6));
		break;
	default:
		dprintk("RPC:       %s: Bad address family\n", __func__);
		return -EAFNOSUPPORT;
	}
	return 0;
}

2767
static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
2768 2769
				      unsigned int slot_table_size,
				      unsigned int max_slot_table_size)
2770 2771
{
	struct rpc_xprt *xprt;
2772
	struct sock_xprt *new;
2773

2774
	if (args->addrlen > sizeof(xprt->addr)) {
2775
		dprintk("RPC:       xs_setup_xprt: address too large\n");
2776 2777 2778
		return ERR_PTR(-EBADF);
	}

2779 2780
	xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size,
			max_slot_table_size);
2781
	if (xprt == NULL) {
2782 2783
		dprintk("RPC:       xs_setup_xprt: couldn't allocate "
				"rpc_xprt\n");
2784 2785 2786
		return ERR_PTR(-ENOMEM);
	}

2787
	new = container_of(xprt, struct sock_xprt, xprt);
2788
	mutex_init(&new->recv_mutex);
2789 2790
	memcpy(&xprt->addr, args->dstaddr, args->addrlen);
	xprt->addrlen = args->addrlen;
2791
	if (args->srcaddr)
2792
		memcpy(&new->srcaddr, args->srcaddr, args->addrlen);
2793 2794 2795 2796
	else {
		int err;
		err = xs_init_anyaddr(args->dstaddr->sa_family,
					(struct sockaddr *)&new->srcaddr);
2797 2798
		if (err != 0) {
			xprt_free(xprt);
2799
			return ERR_PTR(err);
2800
		}
2801
	}
2802 2803 2804 2805

	return xprt;
}

2806 2807 2808 2809 2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824
static const struct rpc_timeout xs_local_default_timeout = {
	.to_initval = 10 * HZ,
	.to_maxval = 10 * HZ,
	.to_retries = 2,
};

/**
 * xs_setup_local - Set up transport to use an AF_LOCAL socket
 * @args: rpc transport creation arguments
 *
 * AF_LOCAL is a "tpi_cots_ord" transport, just like TCP
 */
static struct rpc_xprt *xs_setup_local(struct xprt_create *args)
{
	struct sockaddr_un *sun = (struct sockaddr_un *)args->dstaddr;
	struct sock_xprt *transport;
	struct rpc_xprt *xprt;
	struct rpc_xprt *ret;

2825 2826
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
			xprt_max_tcp_slot_table_entries);
2827 2828 2829 2830 2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841
	if (IS_ERR(xprt))
		return xprt;
	transport = container_of(xprt, struct sock_xprt, xprt);

	xprt->prot = 0;
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;

	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;

	xprt->ops = &xs_local_ops;
	xprt->timeout = &xs_local_default_timeout;

2842
	INIT_WORK(&transport->recv_worker, xs_local_data_receive_workfn);
2843 2844 2845
	INIT_DELAYED_WORK(&transport->connect_worker,
			xs_dummy_setup_socket);

2846 2847 2848 2849 2850 2851 2852 2853 2854 2855
	switch (sun->sun_family) {
	case AF_LOCAL:
		if (sun->sun_path[0] != '/') {
			dprintk("RPC:       bad AF_LOCAL address: %s\n",
					sun->sun_path);
			ret = ERR_PTR(-EINVAL);
			goto out_err;
		}
		xprt_set_bound(xprt);
		xs_format_peer_addresses(xprt, "local", RPCBIND_NETID_LOCAL);
2856 2857 2858
		ret = ERR_PTR(xs_local_setup_socket(transport));
		if (ret)
			goto out_err;
2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870 2871
		break;
	default:
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
	}

	dprintk("RPC:       set up xprt to %s via AF_LOCAL\n",
			xprt->address_strings[RPC_DISPLAY_ADDR]);

	if (try_module_get(THIS_MODULE))
		return xprt;
	ret = ERR_PTR(-EINVAL);
out_err:
2872
	xs_xprt_free(xprt);
2873 2874 2875
	return ret;
}

2876 2877 2878 2879 2880 2881 2882
static const struct rpc_timeout xs_udp_default_timeout = {
	.to_initval = 5 * HZ,
	.to_maxval = 30 * HZ,
	.to_increment = 5 * HZ,
	.to_retries = 5,
};

2883 2884
/**
 * xs_setup_udp - Set up transport to use a UDP socket
2885
 * @args: rpc transport creation arguments
2886 2887
 *
 */
2888
static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
2889
{
2890
	struct sockaddr *addr = args->dstaddr;
2891
	struct rpc_xprt *xprt;
2892
	struct sock_xprt *transport;
2893
	struct rpc_xprt *ret;
2894

2895 2896
	xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries,
			xprt_udp_slot_table_entries);
2897 2898
	if (IS_ERR(xprt))
		return xprt;
2899
	transport = container_of(xprt, struct sock_xprt, xprt);
2900

2901
	xprt->prot = IPPROTO_UDP;
2902
	xprt->tsh_size = 0;
2903 2904 2905
	/* XXX: header size can vary due to auth type, IPv6, etc. */
	xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);

2906 2907 2908
	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_UDP_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2909

2910
	xprt->ops = &xs_udp_ops;
2911

2912
	xprt->timeout = &xs_udp_default_timeout;
2913

2914
	INIT_WORK(&transport->recv_worker, xs_udp_data_receive_workfn);
2915 2916
	INIT_DELAYED_WORK(&transport->connect_worker, xs_udp_setup_socket);

2917 2918 2919 2920 2921
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

2922
		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP);
2923 2924 2925 2926 2927
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

2928
		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6);
2929 2930
		break;
	default:
2931 2932
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
2933 2934
	}

C
Chuck Lever 已提交
2935 2936 2937 2938 2939 2940 2941 2942 2943
	if (xprt_bound(xprt))
		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PORT],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
	else
		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
2944

2945 2946
	if (try_module_get(THIS_MODULE))
		return xprt;
2947 2948
	ret = ERR_PTR(-EINVAL);
out_err:
2949
	xs_xprt_free(xprt);
2950
	return ret;
2951 2952
}

2953 2954 2955 2956 2957 2958
static const struct rpc_timeout xs_tcp_default_timeout = {
	.to_initval = 60 * HZ,
	.to_maxval = 60 * HZ,
	.to_retries = 2,
};

2959 2960
/**
 * xs_setup_tcp - Set up transport to use a TCP socket
2961
 * @args: rpc transport creation arguments
2962 2963
 *
 */
2964
static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
2965
{
2966
	struct sockaddr *addr = args->dstaddr;
2967
	struct rpc_xprt *xprt;
2968
	struct sock_xprt *transport;
2969
	struct rpc_xprt *ret;
2970 2971 2972 2973
	unsigned int max_slot_table_size = xprt_max_tcp_slot_table_entries;

	if (args->flags & XPRT_CREATE_INFINITE_SLOTS)
		max_slot_table_size = RPC_MAX_SLOT_TABLE_LIMIT;
2974

2975
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
2976
			max_slot_table_size);
2977 2978
	if (IS_ERR(xprt))
		return xprt;
2979
	transport = container_of(xprt, struct sock_xprt, xprt);
2980

2981
	xprt->prot = IPPROTO_TCP;
2982 2983
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2984

2985 2986 2987
	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2988

2989
	xprt->ops = &xs_tcp_ops;
2990
	xprt->timeout = &xs_tcp_default_timeout;
2991

2992 2993 2994
	INIT_WORK(&transport->recv_worker, xs_tcp_data_receive_workfn);
	INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_setup_socket);

2995 2996 2997 2998 2999
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

3000
		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP);
3001 3002 3003 3004 3005
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

3006
		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6);
3007 3008
		break;
	default:
3009 3010
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
3011 3012
	}

C
Chuck Lever 已提交
3013 3014 3015 3016 3017 3018 3019 3020 3021 3022
	if (xprt_bound(xprt))
		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PORT],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
	else
		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PROTO]);

3023 3024
	if (try_module_get(THIS_MODULE))
		return xprt;
3025 3026
	ret = ERR_PTR(-EINVAL);
out_err:
3027
	xs_xprt_free(xprt);
3028
	return ret;
3029
}
3030

3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041
/**
 * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket
 * @args: rpc transport creation arguments
 *
 */
static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args)
{
	struct sockaddr *addr = args->dstaddr;
	struct rpc_xprt *xprt;
	struct sock_xprt *transport;
	struct svc_sock *bc_sock;
3042
	struct rpc_xprt *ret;
3043

3044 3045
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
			xprt_tcp_slot_table_entries);
3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072
	if (IS_ERR(xprt))
		return xprt;
	transport = container_of(xprt, struct sock_xprt, xprt);

	xprt->prot = IPPROTO_TCP;
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
	xprt->timeout = &xs_tcp_default_timeout;

	/* backchannel */
	xprt_set_bound(xprt);
	xprt->bind_timeout = 0;
	xprt->reestablish_timeout = 0;
	xprt->idle_timeout = 0;

	xprt->ops = &bc_tcp_ops;

	switch (addr->sa_family) {
	case AF_INET:
		xs_format_peer_addresses(xprt, "tcp",
					 RPCBIND_NETID_TCP);
		break;
	case AF_INET6:
		xs_format_peer_addresses(xprt, "tcp",
				   RPCBIND_NETID_TCP6);
		break;
	default:
3073 3074
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
3075 3076
	}

3077 3078 3079 3080
	dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT],
			xprt->address_strings[RPC_DISPLAY_PROTO]);
3081

3082 3083
	/*
	 * Once we've associated a backchannel xprt with a connection,
W
Weng Meiling 已提交
3084 3085 3086
	 * we want to keep it around as long as the connection lasts,
	 * in case we need to start using it for a backchannel again;
	 * this reference won't be dropped until bc_xprt is destroyed.
3087 3088 3089 3090 3091 3092 3093 3094
	 */
	xprt_get(xprt);
	args->bc_xprt->xpt_bc_xprt = xprt;
	xprt->bc_xprt = args->bc_xprt;
	bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt);
	transport->sock = bc_sock->sk_sock;
	transport->inet = bc_sock->sk_sk;

3095 3096 3097 3098 3099 3100 3101 3102
	/*
	 * Since we don't want connections for the backchannel, we set
	 * the xprt status to connected
	 */
	xprt_set_connected(xprt);

	if (try_module_get(THIS_MODULE))
		return xprt;
3103 3104

	args->bc_xprt->xpt_bc_xprt = NULL;
3105
	args->bc_xprt->xpt_bc_xps = NULL;
3106
	xprt_put(xprt);
3107 3108
	ret = ERR_PTR(-EINVAL);
out_err:
3109
	xs_xprt_free(xprt);
3110
	return ret;
3111 3112
}

3113 3114 3115 3116 3117 3118 3119 3120
static struct xprt_class	xs_local_transport = {
	.list		= LIST_HEAD_INIT(xs_local_transport.list),
	.name		= "named UNIX socket",
	.owner		= THIS_MODULE,
	.ident		= XPRT_TRANSPORT_LOCAL,
	.setup		= xs_setup_local,
};

3121 3122 3123 3124
static struct xprt_class	xs_udp_transport = {
	.list		= LIST_HEAD_INIT(xs_udp_transport.list),
	.name		= "udp",
	.owner		= THIS_MODULE,
3125
	.ident		= XPRT_TRANSPORT_UDP,
3126 3127 3128 3129 3130 3131 3132
	.setup		= xs_setup_udp,
};

static struct xprt_class	xs_tcp_transport = {
	.list		= LIST_HEAD_INIT(xs_tcp_transport.list),
	.name		= "tcp",
	.owner		= THIS_MODULE,
3133
	.ident		= XPRT_TRANSPORT_TCP,
3134 3135 3136
	.setup		= xs_setup_tcp,
};

3137 3138 3139 3140 3141 3142 3143 3144
static struct xprt_class	xs_bc_tcp_transport = {
	.list		= LIST_HEAD_INIT(xs_bc_tcp_transport.list),
	.name		= "tcp NFSv4.1 backchannel",
	.owner		= THIS_MODULE,
	.ident		= XPRT_TRANSPORT_BC_TCP,
	.setup		= xs_setup_bc_tcp,
};

3145
/**
3146
 * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
3147 3148 3149 3150
 *
 */
int init_socket_xprt(void)
{
J
Jeff Layton 已提交
3151
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
3152
	if (!sunrpc_table_header)
3153
		sunrpc_table_header = register_sysctl_table(sunrpc_table);
3154 3155
#endif

3156
	xprt_register_transport(&xs_local_transport);
3157 3158
	xprt_register_transport(&xs_udp_transport);
	xprt_register_transport(&xs_tcp_transport);
3159
	xprt_register_transport(&xs_bc_tcp_transport);
3160

3161 3162 3163 3164
	return 0;
}

/**
3165
 * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
3166 3167 3168 3169
 *
 */
void cleanup_socket_xprt(void)
{
J
Jeff Layton 已提交
3170
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
3171 3172 3173 3174 3175
	if (sunrpc_table_header) {
		unregister_sysctl_table(sunrpc_table_header);
		sunrpc_table_header = NULL;
	}
#endif
3176

3177
	xprt_unregister_transport(&xs_local_transport);
3178 3179
	xprt_unregister_transport(&xs_udp_transport);
	xprt_unregister_transport(&xs_tcp_transport);
3180
	xprt_unregister_transport(&xs_bc_tcp_transport);
3181
}
3182

3183 3184
static int param_set_uint_minmax(const char *val,
		const struct kernel_param *kp,
3185 3186
		unsigned int min, unsigned int max)
{
D
Daniel Walter 已提交
3187
	unsigned int num;
3188 3189 3190 3191
	int ret;

	if (!val)
		return -EINVAL;
D
Daniel Walter 已提交
3192
	ret = kstrtouint(val, 0, &num);
3193 3194 3195 3196 3197 3198
	if (ret == -EINVAL || num < min || num > max)
		return -EINVAL;
	*((unsigned int *)kp->arg) = num;
	return 0;
}

3199
static int param_set_portnr(const char *val, const struct kernel_param *kp)
3200
{
3201 3202
	if (kp->arg == &xprt_min_resvport)
		return param_set_uint_minmax(val, kp,
3203
			RPC_MIN_RESVPORT,
3204 3205 3206
			xprt_max_resvport);
	return param_set_uint_minmax(val, kp,
			xprt_min_resvport,
3207 3208 3209
			RPC_MAX_RESVPORT);
}

3210
static const struct kernel_param_ops param_ops_portnr = {
3211 3212 3213 3214
	.set = param_set_portnr,
	.get = param_get_uint,
};

3215 3216 3217 3218 3219 3220
#define param_check_portnr(name, p) \
	__param_check(name, p, unsigned int);

module_param_named(min_resvport, xprt_min_resvport, portnr, 0644);
module_param_named(max_resvport, xprt_max_resvport, portnr, 0644);

3221 3222
static int param_set_slot_table_size(const char *val,
				     const struct kernel_param *kp)
3223 3224 3225 3226 3227 3228
{
	return param_set_uint_minmax(val, kp,
			RPC_MIN_SLOT_TABLE,
			RPC_MAX_SLOT_TABLE);
}

3229
static const struct kernel_param_ops param_ops_slot_table_size = {
3230 3231 3232 3233
	.set = param_set_slot_table_size,
	.get = param_get_uint,
};

3234 3235 3236
#define param_check_slot_table_size(name, p) \
	__param_check(name, p, unsigned int);

3237 3238 3239 3240 3241 3242 3243 3244
static int param_set_max_slot_table_size(const char *val,
				     const struct kernel_param *kp)
{
	return param_set_uint_minmax(val, kp,
			RPC_MIN_SLOT_TABLE,
			RPC_MAX_SLOT_TABLE_LIMIT);
}

3245
static const struct kernel_param_ops param_ops_max_slot_table_size = {
3246 3247 3248 3249 3250 3251 3252
	.set = param_set_max_slot_table_size,
	.get = param_get_uint,
};

#define param_check_max_slot_table_size(name, p) \
	__param_check(name, p, unsigned int);

3253 3254
module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries,
		   slot_table_size, 0644);
3255 3256
module_param_named(tcp_max_slot_table_entries, xprt_max_tcp_slot_table_entries,
		   max_slot_table_size, 0644);
3257 3258 3259
module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries,
		   slot_table_size, 0644);