svcsock.c 40.0 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7
/*
 * linux/net/sunrpc/svcsock.c
 *
 * These are the RPC server socket internals.
 *
 * The server scheduling algorithm does not always distribute the load
 * evenly when servicing a single client. May need to modify the
8
 * svc_xprt_enqueue procedure...
L
Linus Torvalds 已提交
9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * TCP support is largely untested and may be a little slow. The problem
 * is that we currently do two separate recvfrom's, one for the 4-byte
 * record length, and the second for the actual record. This could possibly
 * be improved by always reading a minimum size of around 100 bytes and
 * tucking any superfluous bytes away in a temporary store. Still, that
 * leaves write requests out in the rain. An alternative may be to peek at
 * the first skb in the queue, and if it matches the next TCP sequence
 * number, to extract the record marker. Yuck.
 *
 * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
 */

22
#include <linux/kernel.h>
L
Linus Torvalds 已提交
23 24 25 26 27 28 29
#include <linux/sched.h>
#include <linux/errno.h>
#include <linux/fcntl.h>
#include <linux/net.h>
#include <linux/in.h>
#include <linux/inet.h>
#include <linux/udp.h>
30
#include <linux/tcp.h>
L
Linus Torvalds 已提交
31 32 33 34
#include <linux/unistd.h>
#include <linux/slab.h>
#include <linux/netdevice.h>
#include <linux/skbuff.h>
35
#include <linux/file.h>
36
#include <linux/freezer.h>
L
Linus Torvalds 已提交
37 38 39
#include <net/sock.h>
#include <net/checksum.h>
#include <net/ip.h>
40
#include <net/ipv6.h>
41
#include <net/tcp.h>
42
#include <net/tcp_states.h>
L
Linus Torvalds 已提交
43 44 45 46
#include <asm/uaccess.h>
#include <asm/ioctls.h>

#include <linux/sunrpc/types.h>
47
#include <linux/sunrpc/clnt.h>
L
Linus Torvalds 已提交
48
#include <linux/sunrpc/xdr.h>
49
#include <linux/sunrpc/msg_prot.h>
L
Linus Torvalds 已提交
50 51
#include <linux/sunrpc/svcsock.h>
#include <linux/sunrpc/stats.h>
52
#include <linux/sunrpc/xprt.h>
L
Linus Torvalds 已提交
53

54
#define RPCDBG_FACILITY	RPCDBG_SVCXPRT
L
Linus Torvalds 已提交
55 56 57


static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
58
					 int *errp, int flags);
L
Linus Torvalds 已提交
59 60 61
static void		svc_udp_data_ready(struct sock *, int);
static int		svc_udp_recvfrom(struct svc_rqst *);
static int		svc_udp_sendto(struct svc_rqst *);
62
static void		svc_sock_detach(struct svc_xprt *);
63
static void		svc_tcp_sock_detach(struct svc_xprt *);
64
static void		svc_sock_free(struct svc_xprt *);
L
Linus Torvalds 已提交
65

66
static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
67 68
					  struct net *, struct sockaddr *,
					  int, int);
69 70 71 72
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key svc_key[2];
static struct lock_class_key svc_slock_key[2];

73
static void svc_reclassify_socket(struct socket *sock)
74 75
{
	struct sock *sk = sock->sk;
76
	BUG_ON(sock_owned_by_user(sk));
77 78 79
	switch (sk->sk_family) {
	case AF_INET:
		sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
80 81 82
					      &svc_slock_key[0],
					      "sk_xprt.xpt_lock-AF_INET-NFSD",
					      &svc_key[0]);
83 84 85 86
		break;

	case AF_INET6:
		sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
87 88 89
					      &svc_slock_key[1],
					      "sk_xprt.xpt_lock-AF_INET6-NFSD",
					      &svc_key[1]);
90 91 92 93 94 95 96
		break;

	default:
		BUG();
	}
}
#else
97
static void svc_reclassify_socket(struct socket *sock)
98 99 100 101
{
}
#endif

L
Linus Torvalds 已提交
102 103 104
/*
 * Release an skbuff after use
 */
105
static void svc_release_skb(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
106
{
107
	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
L
Linus Torvalds 已提交
108 109

	if (skb) {
110 111
		struct svc_sock *svsk =
			container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
112
		rqstp->rq_xprt_ctxt = NULL;
L
Linus Torvalds 已提交
113 114

		dprintk("svc: service %p, releasing skb %p\n", rqstp, skb);
115
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
116 117 118
	}
}

119 120 121 122
union svc_pktinfo_u {
	struct in_pktinfo pkti;
	struct in6_pktinfo pkti6;
};
123 124
#define SVC_PKTINFO_SPACE \
	CMSG_SPACE(sizeof(union svc_pktinfo_u))
125 126 127

static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
{
128 129 130
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	switch (svsk->sk_sk->sk_family) {
131 132 133 134 135 136 137 138 139 140
	case AF_INET: {
			struct in_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IP;
			cmh->cmsg_type = IP_PKTINFO;
			pki->ipi_ifindex = 0;
			pki->ipi_spec_dst.s_addr = rqstp->rq_daddr.addr.s_addr;
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
141

142 143 144 145 146 147 148 149 150 151 152 153 154 155
	case AF_INET6: {
			struct in6_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IPV6;
			cmh->cmsg_type = IPV6_PKTINFO;
			pki->ipi6_ifindex = 0;
			ipv6_addr_copy(&pki->ipi6_addr,
					&rqstp->rq_daddr.addr6);
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
	}
}

L
Linus Torvalds 已提交
156
/*
157
 * send routine intended to be shared by the fore- and back-channel
L
Linus Torvalds 已提交
158
 */
159 160 161
int svc_send_common(struct socket *sock, struct xdr_buf *xdr,
		    struct page *headpage, unsigned long headoffset,
		    struct page *tailpage, unsigned long tailoffset)
L
Linus Torvalds 已提交
162 163 164 165 166 167 168
{
	int		result;
	int		size;
	struct page	**ppage = xdr->pages;
	size_t		base = xdr->page_base;
	unsigned int	pglen = xdr->page_len;
	unsigned int	flags = MSG_MORE;
169 170
	int		slen;
	int		len = 0;
L
Linus Torvalds 已提交
171 172 173 174 175 176

	slen = xdr->len;

	/* send head */
	if (slen == xdr->head[0].iov_len)
		flags = 0;
177
	len = kernel_sendpage(sock, headpage, headoffset,
178
				  xdr->head[0].iov_len, flags);
L
Linus Torvalds 已提交
179 180 181 182 183 184 185 186 187 188 189
	if (len != xdr->head[0].iov_len)
		goto out;
	slen -= xdr->head[0].iov_len;
	if (slen == 0)
		goto out;

	/* send page data */
	size = PAGE_SIZE - base < pglen ? PAGE_SIZE - base : pglen;
	while (pglen > 0) {
		if (slen == size)
			flags = 0;
190
		result = kernel_sendpage(sock, *ppage, base, size, flags);
L
Linus Torvalds 已提交
191 192 193 194 195 196 197 198 199 200
		if (result > 0)
			len += result;
		if (result != size)
			goto out;
		slen -= size;
		pglen -= size;
		size = PAGE_SIZE < pglen ? PAGE_SIZE : pglen;
		base = 0;
		ppage++;
	}
201

L
Linus Torvalds 已提交
202 203
	/* send tail */
	if (xdr->tail[0].iov_len) {
204 205
		result = kernel_sendpage(sock, tailpage, tailoffset,
				   xdr->tail[0].iov_len, 0);
L
Linus Torvalds 已提交
206 207 208
		if (result > 0)
			len += result;
	}
209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252

out:
	return len;
}


/*
 * Generic sendto routine
 */
static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct socket	*sock = svsk->sk_sock;
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
	int		len = 0;
	unsigned long tailoff;
	unsigned long headoff;
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);

	if (rqstp->rq_prot == IPPROTO_UDP) {
		struct msghdr msg = {
			.msg_name	= &rqstp->rq_addr,
			.msg_namelen	= rqstp->rq_addrlen,
			.msg_control	= cmh,
			.msg_controllen	= sizeof(buffer),
			.msg_flags	= MSG_MORE,
		};

		svc_set_cmsg_data(rqstp, cmh);

		if (sock_sendmsg(sock, &msg, 0) < 0)
			goto out;
	}

	tailoff = ((unsigned long)xdr->tail[0].iov_base) & (PAGE_SIZE-1);
	headoff = 0;
	len = svc_send_common(sock, xdr, rqstp->rq_respages[0], headoff,
			       rqstp->rq_respages[0], tailoff);

L
Linus Torvalds 已提交
253
out:
254
	dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
255
		svsk, xdr->head[0].iov_base, xdr->head[0].iov_len,
256
		xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
L
Linus Torvalds 已提交
257 258 259 260

	return len;
}

261 262 263
/*
 * Report socket names for nfsdfs
 */
264
static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
265
{
C
Chuck Lever 已提交
266 267 268
	const struct sock *sk = svsk->sk_sk;
	const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
							"udp" : "tcp";
269 270
	int len;

C
Chuck Lever 已提交
271
	switch (sk->sk_family) {
272 273
	case PF_INET:
		len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
C
Chuck Lever 已提交
274
				proto_name,
E
Eric Dumazet 已提交
275 276
				&inet_sk(sk)->inet_rcv_saddr,
				inet_sk(sk)->inet_num);
277
		break;
278 279
	case PF_INET6:
		len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
C
Chuck Lever 已提交
280 281
				proto_name,
				&inet6_sk(sk)->rcv_saddr,
E
Eric Dumazet 已提交
282
				inet_sk(sk)->inet_num);
283 284
		break;
	default:
285
		len = snprintf(buf, remaining, "*unknown-%d*\n",
C
Chuck Lever 已提交
286
				sk->sk_family);
287
	}
288 289 290 291

	if (len >= remaining) {
		*buf = '\0';
		return -ENAMETOOLONG;
292 293 294 295
	}
	return len;
}

296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312
/**
 * svc_sock_names - construct a list of listener names in a string
 * @serv: pointer to RPC service
 * @buf: pointer to a buffer to fill in with socket names
 * @buflen: size of the buffer to be filled
 * @toclose: pointer to '\0'-terminated C string containing the name
 *		of a listener to be closed
 *
 * Fills in @buf with a '\n'-separated list of names of listener
 * sockets.  If @toclose is not NULL, the socket named by @toclose
 * is closed, and is not included in the output list.
 *
 * Returns positive length of the socket name string, or a negative
 * errno value on error.
 */
int svc_sock_names(struct svc_serv *serv, char *buf, const size_t buflen,
		   const char *toclose)
313
{
314
	struct svc_sock *svsk, *closesk = NULL;
315 316 317 318
	int len = 0;

	if (!serv)
		return 0;
319

320
	spin_lock_bh(&serv->sv_lock);
321
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list) {
322 323 324 325 326 327
		int onelen = svc_one_sock_name(svsk, buf + len, buflen - len);
		if (onelen < 0) {
			len = onelen;
			break;
		}
		if (toclose && strcmp(toclose, buf + len) == 0)
328 329 330
			closesk = svsk;
		else
			len += onelen;
331
	}
332
	spin_unlock_bh(&serv->sv_lock);
333

334
	if (closesk)
335 336 337
		/* Should unregister with portmap, but you cannot
		 * unregister just one protocol...
		 */
338
		svc_close_xprt(&closesk->sk_xprt);
339 340
	else if (toclose)
		return -ENOENT;
341 342
	return len;
}
343
EXPORT_SYMBOL_GPL(svc_sock_names);
344

L
Linus Torvalds 已提交
345 346 347
/*
 * Check input queue length
 */
348
static int svc_recv_available(struct svc_sock *svsk)
L
Linus Torvalds 已提交
349 350 351 352
{
	struct socket	*sock = svsk->sk_sock;
	int		avail, err;

353
	err = kernel_sock_ioctl(sock, TIOCINQ, (unsigned long) &avail);
L
Linus Torvalds 已提交
354 355 356 357 358 359 360

	return (err >= 0)? avail : err;
}

/*
 * Generic recvfrom routine.
 */
361 362
static int svc_recvfrom(struct svc_rqst *rqstp, struct kvec *iov, int nr,
			int buflen)
L
Linus Torvalds 已提交
363
{
364 365
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
366 367 368 369
	struct msghdr msg = {
		.msg_flags	= MSG_DONTWAIT,
	};
	int len;
L
Linus Torvalds 已提交
370

371 372
	rqstp->rq_xprt_hlen = 0;

373 374
	len = kernel_recvmsg(svsk->sk_sock, &msg, iov, nr, buflen,
				msg.msg_flags);
L
Linus Torvalds 已提交
375 376

	dprintk("svc: socket %p recvfrom(%p, %Zu) = %d\n",
377
		svsk, iov[0].iov_base, iov[0].iov_len, len);
L
Linus Torvalds 已提交
378 379 380 381 382 383
	return len;
}

/*
 * Set socket snd and rcv buffer lengths
 */
384 385
static void svc_sock_setbufsize(struct socket *sock, unsigned int snd,
				unsigned int rcv)
L
Linus Torvalds 已提交
386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402
{
#if 0
	mm_segment_t	oldfs;
	oldfs = get_fs(); set_fs(KERNEL_DS);
	sock_setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
			(char*)&snd, sizeof(snd));
	sock_setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
			(char*)&rcv, sizeof(rcv));
#else
	/* sock_setsockopt limits use to sysctl_?mem_max,
	 * which isn't acceptable.  Until that is made conditional
	 * on not having CAP_SYS_RESOURCE or similar, we go direct...
	 * DaveM said I could!
	 */
	lock_sock(sock->sk);
	sock->sk->sk_sndbuf = snd * 2;
	sock->sk->sk_rcvbuf = rcv * 2;
403
	sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK|SOCK_RCVBUF_LOCK;
404
	sock->sk->sk_write_space(sock->sk);
L
Linus Torvalds 已提交
405 406 407 408 409 410
	release_sock(sock->sk);
#endif
}
/*
 * INET callback when data has been received on the socket.
 */
411
static void svc_udp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
412
{
413
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
414

415 416
	if (svsk) {
		dprintk("svc: socket %p(inet %p), count=%d, busy=%d\n",
417 418 419
			svsk, sk, count,
			test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
420
		svc_xprt_enqueue(&svsk->sk_xprt);
421
	}
E
Eric Dumazet 已提交
422 423
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
424 425 426 427 428
}

/*
 * INET callback when space is newly available on the socket.
 */
429
static void svc_write_space(struct sock *sk)
L
Linus Torvalds 已提交
430 431 432 433 434
{
	struct svc_sock	*svsk = (struct svc_sock *)(sk->sk_user_data);

	if (svsk) {
		dprintk("svc: socket %p(inet %p), write_space busy=%d\n",
435
			svsk, sk, test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
436
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
437 438
	}

E
Eric Dumazet 已提交
439
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk))) {
440
		dprintk("RPC svc_write_space: someone sleeping on %p\n",
L
Linus Torvalds 已提交
441
		       svsk);
E
Eric Dumazet 已提交
442
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
443 444 445
	}
}

446 447 448 449 450 451 452 453 454
static void svc_tcp_write_space(struct sock *sk)
{
	struct socket *sock = sk->sk_socket;

	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk) && sock)
		clear_bit(SOCK_NOSPACE, &sock->flags);
	svc_write_space(sk);
}

455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480
/*
 * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
 */
static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IP_PKTINFO)
		return 0;
	rqstp->rq_daddr.addr.s_addr = pki->ipi_spec_dst.s_addr;
	return 1;
}

/*
 * See net/ipv6/datagram.c : datagram_recv_ctl
 */
static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in6_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IPV6_PKTINFO)
		return 0;
	ipv6_addr_copy(&rqstp->rq_daddr.addr6, &pki->ipi6_addr);
	return 1;
}

481 482 483 484 485 486 487
/*
 * Copy the UDP datagram's destination address to the rqstp structure.
 * The 'destination' address in this case is the address to which the
 * peer sent the datagram, i.e. our local address. For multihomed
 * hosts, this can change from msg to msg. Note that only the IP
 * address changes, the port number should remain the same.
 */
488 489
static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
				    struct cmsghdr *cmh)
490
{
491 492 493 494 495
	switch (cmh->cmsg_level) {
	case SOL_IP:
		return svc_udp_get_dest_address4(rqstp, cmh);
	case SOL_IPV6:
		return svc_udp_get_dest_address6(rqstp, cmh);
496
	}
497 498

	return 0;
499 500
}

L
Linus Torvalds 已提交
501 502 503
/*
 * Receive a datagram from a UDP socket.
 */
504
static int svc_udp_recvfrom(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
505
{
506 507
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
508
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
509
	struct sk_buff	*skb;
510 511 512 513 514
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
515 516 517 518 519 520
	struct msghdr msg = {
		.msg_name = svc_addr(rqstp),
		.msg_control = cmh,
		.msg_controllen = sizeof(buffer),
		.msg_flags = MSG_DONTWAIT,
	};
521 522
	size_t len;
	int err;
L
Linus Torvalds 已提交
523

524
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
L
Linus Torvalds 已提交
525 526 527
	    /* udp sockets need large rcvbuf as all pending
	     * requests are still in that buffer.  sndbuf must
	     * also be large enough that there is enough space
528 529 530 531
	     * for one reply per thread.  We count all threads
	     * rather than threads in a particular pool, which
	     * provides an upper bound on the number of threads
	     * which will access the socket.
L
Linus Torvalds 已提交
532 533
	     */
	    svc_sock_setbufsize(svsk->sk_sock,
534 535
				(serv->sv_nrthreads+3) * serv->sv_max_mesg,
				(serv->sv_nrthreads+3) * serv->sv_max_mesg);
L
Linus Torvalds 已提交
536

537
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
538 539 540 541 542 543 544 545 546 547
	skb = NULL;
	err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
			     0, 0, MSG_PEEK | MSG_DONTWAIT);
	if (err >= 0)
		skb = skb_recv_datagram(svsk->sk_sk, 0, 1, &err);

	if (skb == NULL) {
		if (err != -EAGAIN) {
			/* possibly an icmp error */
			dprintk("svc: recvfrom returned error %d\n", -err);
548
			set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
549
		}
550
		return -EAGAIN;
L
Linus Torvalds 已提交
551
	}
552
	len = svc_addr_len(svc_addr(rqstp));
553 554
	if (len == 0)
		return -EAFNOSUPPORT;
555
	rqstp->rq_addrlen = len;
556 557
	if (skb->tstamp.tv64 == 0) {
		skb->tstamp = ktime_get_real();
558
		/* Don't enable netstamp, sunrpc doesn't
L
Linus Torvalds 已提交
559 560
		   need that much accuracy */
	}
561
	svsk->sk_sk->sk_stamp = skb->tstamp;
562
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
L
Linus Torvalds 已提交
563 564 565 566

	len  = skb->len - sizeof(struct udphdr);
	rqstp->rq_arg.len = len;

567
	rqstp->rq_prot = IPPROTO_UDP;
568

569
	if (!svc_udp_get_dest_address(rqstp, cmh)) {
570
		if (net_ratelimit())
571 572 573 574
			printk(KERN_WARNING
				"svc: received unknown control message %d/%d; "
				"dropping RPC reply datagram\n",
					cmh->cmsg_level, cmh->cmsg_type);
575
		skb_free_datagram_locked(svsk->sk_sk, skb);
576 577
		return 0;
	}
L
Linus Torvalds 已提交
578 579 580 581 582 583 584

	if (skb_is_nonlinear(skb)) {
		/* we have to copy */
		local_bh_disable();
		if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb)) {
			local_bh_enable();
			/* checksum error */
585
			skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
586 587 588
			return 0;
		}
		local_bh_enable();
589
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
590 591
	} else {
		/* we can use it in-place */
592 593
		rqstp->rq_arg.head[0].iov_base = skb->data +
			sizeof(struct udphdr);
L
Linus Torvalds 已提交
594
		rqstp->rq_arg.head[0].iov_len = len;
595
		if (skb_checksum_complete(skb)) {
596
			skb_free_datagram_locked(svsk->sk_sk, skb);
597
			return 0;
L
Linus Torvalds 已提交
598
		}
599
		rqstp->rq_xprt_ctxt = skb;
L
Linus Torvalds 已提交
600 601 602 603 604 605
	}

	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
606
		rqstp->rq_respages = rqstp->rq_pages+1;
L
Linus Torvalds 已提交
607 608
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
609
		rqstp->rq_respages = rqstp->rq_pages + 1 +
610
			DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
L
Linus Torvalds 已提交
611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631
	}

	if (serv->sv_stats)
		serv->sv_stats->netudpcnt++;

	return len;
}

static int
svc_udp_sendto(struct svc_rqst *rqstp)
{
	int		error;

	error = svc_sendto(rqstp, &rqstp->rq_res);
	if (error == -ECONNREFUSED)
		/* ICMP error on earlier request. */
		error = svc_sendto(rqstp, &rqstp->rq_res);

	return error;
}

T
Tom Tucker 已提交
632 633 634 635
static void svc_udp_prep_reply_hdr(struct svc_rqst *rqstp)
{
}

636 637 638
static int svc_udp_has_wspace(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
639
	struct svc_serv	*serv = xprt->xpt_server;
640 641 642 643 644 645 646
	unsigned long required;

	/*
	 * Set the SOCK_NOSPACE flag before checking the available
	 * sock space.
	 */
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
T
Tom Tucker 已提交
647
	required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
648 649 650 651 652 653
	if (required*2 > sock_wspace(svsk->sk_sk))
		return 0;
	clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
	return 1;
}

654 655 656 657 658 659
static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
{
	BUG();
	return NULL;
}

660
static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
661
				       struct net *net,
662 663 664
				       struct sockaddr *sa, int salen,
				       int flags)
{
665
	return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
666 667
}

668
static struct svc_xprt_ops svc_udp_ops = {
669
	.xpo_create = svc_udp_create,
670 671
	.xpo_recvfrom = svc_udp_recvfrom,
	.xpo_sendto = svc_udp_sendto,
672
	.xpo_release_rqst = svc_release_skb,
673 674
	.xpo_detach = svc_sock_detach,
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
675
	.xpo_prep_reply_hdr = svc_udp_prep_reply_hdr,
676
	.xpo_has_wspace = svc_udp_has_wspace,
677
	.xpo_accept = svc_udp_accept,
678 679 680 681
};

static struct svc_xprt_class svc_udp_class = {
	.xcl_name = "udp",
682
	.xcl_owner = THIS_MODULE,
683
	.xcl_ops = &svc_udp_ops,
684
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
685 686
};

687
static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
688
{
689
	int err, level, optname, one = 1;
690

691
	svc_xprt_init(&svc_udp_class, &svsk->sk_xprt, serv);
692
	clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
693 694 695 696
	svsk->sk_sk->sk_data_ready = svc_udp_data_ready;
	svsk->sk_sk->sk_write_space = svc_write_space;

	/* initialise setting must have enough space to
697
	 * receive and respond to one request.
L
Linus Torvalds 已提交
698 699 700
	 * svc_udp_recvfrom will re-adjust if necessary
	 */
	svc_sock_setbufsize(svsk->sk_sock,
701 702
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);
L
Linus Torvalds 已提交
703

704 705
	/* data might have come in before data_ready set up */
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
706
	set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
707 708

	/* make sure we get destination address info */
709 710 711 712 713 714 715 716 717 718 719 720 721 722 723
	switch (svsk->sk_sk->sk_family) {
	case AF_INET:
		level = SOL_IP;
		optname = IP_PKTINFO;
		break;
	case AF_INET6:
		level = SOL_IPV6;
		optname = IPV6_RECVPKTINFO;
		break;
	default:
		BUG();
	}
	err = kernel_setsockopt(svsk->sk_sock, level, optname,
					(char *)&one, sizeof(one));
	dprintk("svc: kernel_setsockopt returned %d\n", err);
L
Linus Torvalds 已提交
724 725 726 727 728 729
}

/*
 * A data_ready event on a listening socket means there's a connection
 * pending. Do not use state_change as a substitute for it.
 */
730
static void svc_tcp_listen_data_ready(struct sock *sk, int count_unused)
L
Linus Torvalds 已提交
731
{
732
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
733 734

	dprintk("svc: socket %p TCP (listen) state change %d\n",
735
		sk, sk->sk_state);
L
Linus Torvalds 已提交
736

737 738 739 740 741 742 743 744 745 746 747 748
	/*
	 * This callback may called twice when a new connection
	 * is established as a child socket inherits everything
	 * from a parent LISTEN socket.
	 * 1) data_ready method of the parent socket will be called
	 *    when one of child sockets become ESTABLISHED.
	 * 2) data_ready method of the child socket may be called
	 *    when it receives data before the socket is accepted.
	 * In case of 2, we should ignore it silently.
	 */
	if (sk->sk_state == TCP_LISTEN) {
		if (svsk) {
749
			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
750
			svc_xprt_enqueue(&svsk->sk_xprt);
751 752
		} else
			printk("svc: socket %p: no user data\n", sk);
L
Linus Torvalds 已提交
753
	}
754

E
Eric Dumazet 已提交
755 756
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible_all(sk_sleep(sk));
L
Linus Torvalds 已提交
757 758 759 760 761
}

/*
 * A state change on a connected socket means it's dying or dead.
 */
762
static void svc_tcp_state_change(struct sock *sk)
L
Linus Torvalds 已提交
763
{
764
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
765 766

	dprintk("svc: socket %p TCP (connected) state change %d (svsk %p)\n",
767
		sk, sk->sk_state, sk->sk_user_data);
L
Linus Torvalds 已提交
768

769
	if (!svsk)
L
Linus Torvalds 已提交
770
		printk("svc: socket %p: no user data\n", sk);
771
	else {
772
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
773
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
774
	}
E
Eric Dumazet 已提交
775 776
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible_all(sk_sleep(sk));
L
Linus Torvalds 已提交
777 778
}

779
static void svc_tcp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
780
{
781
	struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
782 783

	dprintk("svc: socket %p TCP data ready (svsk %p)\n",
784 785
		sk, sk->sk_user_data);
	if (svsk) {
786
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
787
		svc_xprt_enqueue(&svsk->sk_xprt);
788
	}
E
Eric Dumazet 已提交
789 790
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
791 792 793 794 795
}

/*
 * Accept a TCP connection
 */
796
static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
L
Linus Torvalds 已提交
797
{
798
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
799 800
	struct sockaddr_storage addr;
	struct sockaddr	*sin = (struct sockaddr *) &addr;
801
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
802 803 804 805
	struct socket	*sock = svsk->sk_sock;
	struct socket	*newsock;
	struct svc_sock	*newsvsk;
	int		err, slen;
806
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
807 808 809

	dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
	if (!sock)
810
		return NULL;
L
Linus Torvalds 已提交
811

812
	clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
813 814
	err = kernel_accept(sock, &newsock, O_NONBLOCK);
	if (err < 0) {
L
Linus Torvalds 已提交
815 816 817
		if (err == -ENOMEM)
			printk(KERN_WARNING "%s: no more sockets!\n",
			       serv->sv_name);
818
		else if (err != -EAGAIN && net_ratelimit())
L
Linus Torvalds 已提交
819 820
			printk(KERN_WARNING "%s: accept failed (err %d)!\n",
				   serv->sv_name, -err);
821
		return NULL;
L
Linus Torvalds 已提交
822
	}
823
	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
824

825
	err = kernel_getpeername(newsock, sin, &slen);
L
Linus Torvalds 已提交
826 827 828 829 830 831 832 833
	if (err < 0) {
		if (net_ratelimit())
			printk(KERN_WARNING "%s: peername failed (err %d)!\n",
				   serv->sv_name, -err);
		goto failed;		/* aborted connection or whatever */
	}

	/* Ideally, we would want to reject connections from unauthorized
834 835
	 * hosts here, but when we get encryption, the IP of the host won't
	 * tell us anything.  For now just warn about unpriv connections.
L
Linus Torvalds 已提交
836
	 */
837
	if (!svc_port_is_privileged(sin)) {
L
Linus Torvalds 已提交
838
		dprintk(KERN_WARNING
839
			"%s: connect from unprivileged port: %s\n",
840
			serv->sv_name,
841
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
842
	}
843
	dprintk("%s: connect from %s\n", serv->sv_name,
844
		__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
845 846 847 848 849 850

	/* make sure that a write doesn't block forever when
	 * low on memory
	 */
	newsock->sk->sk_sndtimeo = HZ*30;

851 852
	if (!(newsvsk = svc_setup_socket(serv, newsock, &err,
				 (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY))))
L
Linus Torvalds 已提交
853
		goto failed;
854
	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
855 856 857 858 859
	err = kernel_getsockname(newsock, sin, &slen);
	if (unlikely(err < 0)) {
		dprintk("svc_tcp_accept: kernel_getsockname error %d\n", -err);
		slen = offsetof(struct sockaddr, sa_data);
	}
860
	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
861

862 863 864 865 866 867 868 869 870 871
	if (serv->sv_stats)
		serv->sv_stats->nettcpconn++;

	return &newsvsk->sk_xprt;

failed:
	sock_release(newsock);
	return NULL;
}

L
Linus Torvalds 已提交
872
/*
873 874 875 876
 * Receive data.
 * If we haven't gotten the record length yet, get the next four bytes.
 * Otherwise try to gobble up as much as possible up to the complete
 * record length.
L
Linus Torvalds 已提交
877
 */
878
static int svc_tcp_recv_record(struct svc_sock *svsk, struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
879
{
880
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
881
	int len;
L
Linus Torvalds 已提交
882

883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
		/* sndbuf needs to have room for one request
		 * per thread, otherwise we can stall even when the
		 * network isn't a bottleneck.
		 *
		 * We count all threads rather than threads in a
		 * particular pool, which provides an upper bound
		 * on the number of threads which will access the socket.
		 *
		 * rcvbuf just needs to be able to hold a few requests.
		 * Normally they will be removed from the queue
		 * as soon a a complete request arrives.
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    (serv->sv_nrthreads+3) * serv->sv_max_mesg,
				    3 * serv->sv_max_mesg);

900
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
901

902 903
	if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
		int		want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
L
Linus Torvalds 已提交
904 905 906 907 908 909 910 911 912
		struct kvec	iov;

		iov.iov_base = ((char *) &svsk->sk_reclen) + svsk->sk_tcplen;
		iov.iov_len  = want;
		if ((len = svc_recvfrom(rqstp, &iov, 1, want)) < 0)
			goto error;
		svsk->sk_tcplen += len;

		if (len < want) {
913 914
			dprintk("svc: short recvfrom while reading record "
				"length (%d of %d)\n", len, want);
915
			goto err_again; /* record header not complete */
L
Linus Torvalds 已提交
916 917 918
		}

		svsk->sk_reclen = ntohl(svsk->sk_reclen);
919
		if (!(svsk->sk_reclen & RPC_LAST_STREAM_FRAGMENT)) {
L
Linus Torvalds 已提交
920 921 922 923 924
			/* FIXME: technically, a record can be fragmented,
			 *  and non-terminal fragments will not have the top
			 *  bit set in the fragment length header.
			 *  But apparently no known nfs clients send fragmented
			 *  records. */
925
			if (net_ratelimit())
926 927
				printk(KERN_NOTICE "RPC: multiple fragments "
					"per record not supported\n");
L
Linus Torvalds 已提交
928 929
			goto err_delete;
		}
930

931
		svsk->sk_reclen &= RPC_FRAGMENT_SIZE_MASK;
L
Linus Torvalds 已提交
932
		dprintk("svc: TCP record, %d bytes\n", svsk->sk_reclen);
933
		if (svsk->sk_reclen > serv->sv_max_mesg) {
934
			if (net_ratelimit())
935 936 937
				printk(KERN_NOTICE "RPC: "
					"fragment too large: 0x%08lx\n",
					(unsigned long)svsk->sk_reclen);
L
Linus Torvalds 已提交
938 939 940 941 942 943 944 945 946 947 948 949
			goto err_delete;
		}
	}

	/* Check whether enough data is available */
	len = svc_recv_available(svsk);
	if (len < 0)
		goto error;

	if (len < svsk->sk_reclen) {
		dprintk("svc: incomplete TCP record (%d of %d)\n",
			len, svsk->sk_reclen);
950
		goto err_again;	/* record not complete */
L
Linus Torvalds 已提交
951 952
	}
	len = svsk->sk_reclen;
953
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
954

955 956
	return len;
 error:
957
	if (len == -EAGAIN)
958 959 960 961 962 963 964 965
		dprintk("RPC: TCP recv_record got EAGAIN\n");
	return len;
 err_delete:
	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
 err_again:
	return -EAGAIN;
}

966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016
static int svc_process_calldir(struct svc_sock *svsk, struct svc_rqst *rqstp,
			       struct rpc_rqst **reqpp, struct kvec *vec)
{
	struct rpc_rqst *req = NULL;
	u32 *p;
	u32 xid;
	u32 calldir;
	int len;

	len = svc_recvfrom(rqstp, vec, 1, 8);
	if (len < 0)
		goto error;

	p = (u32 *)rqstp->rq_arg.head[0].iov_base;
	xid = *p++;
	calldir = *p;

	if (calldir == 0) {
		/* REQUEST is the most common case */
		vec[0] = rqstp->rq_arg.head[0];
	} else {
		/* REPLY */
		if (svsk->sk_bc_xprt)
			req = xprt_lookup_rqst(svsk->sk_bc_xprt, xid);

		if (!req) {
			printk(KERN_NOTICE
				"%s: Got unrecognized reply: "
				"calldir 0x%x sk_bc_xprt %p xid %08x\n",
				__func__, ntohl(calldir),
				svsk->sk_bc_xprt, xid);
			vec[0] = rqstp->rq_arg.head[0];
			goto out;
		}

		memcpy(&req->rq_private_buf, &req->rq_rcv_buf,
		       sizeof(struct xdr_buf));
		/* copy the xid and call direction */
		memcpy(req->rq_private_buf.head[0].iov_base,
		       rqstp->rq_arg.head[0].iov_base, 8);
		vec[0] = req->rq_private_buf.head[0];
	}
 out:
	vec[0].iov_base += 8;
	vec[0].iov_len -= 8;
	len = svsk->sk_reclen - 8;
 error:
	*reqpp = req;
	return len;
}

1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027
/*
 * Receive data from a TCP socket.
 */
static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
	int		len;
	struct kvec *vec;
	int pnum, vlen;
1028
	struct rpc_rqst *req = NULL;
1029 1030 1031 1032 1033 1034 1035 1036 1037 1038

	dprintk("svc: tcp_recv %p data %d conn %d close %d\n",
		svsk, test_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags));

	len = svc_tcp_recv_record(svsk, rqstp);
	if (len < 0)
		goto error;

1039
	vec = rqstp->rq_vec;
L
Linus Torvalds 已提交
1040 1041
	vec[0] = rqstp->rq_arg.head[0];
	vlen = PAGE_SIZE;
1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057

	/*
	 * We have enough data for the whole tcp record. Let's try and read the
	 * first 8 bytes to get the xid and the call direction. We can use this
	 * to figure out if this is a call or a reply to a callback. If
	 * sk_reclen is < 8 (xid and calldir), then this is a malformed packet.
	 * In that case, don't bother with the calldir and just read the data.
	 * It will be rejected in svc_process.
	 */
	if (len >= 8) {
		len = svc_process_calldir(svsk, rqstp, &req, vec);
		if (len < 0)
			goto err_again;
		vlen -= 8;
	}

L
Linus Torvalds 已提交
1058 1059
	pnum = 1;
	while (vlen < len) {
1060 1061 1062
		vec[pnum].iov_base = (req) ?
			page_address(req->rq_private_buf.pages[pnum - 1]) :
			page_address(rqstp->rq_pages[pnum]);
L
Linus Torvalds 已提交
1063 1064 1065 1066
		vec[pnum].iov_len = PAGE_SIZE;
		pnum++;
		vlen += PAGE_SIZE;
	}
1067
	rqstp->rq_respages = &rqstp->rq_pages[pnum];
L
Linus Torvalds 已提交
1068 1069 1070 1071

	/* Now receive data */
	len = svc_recvfrom(rqstp, vec, pnum, len);
	if (len < 0)
1072
		goto err_again;
L
Linus Torvalds 已提交
1073

1074 1075 1076 1077 1078 1079 1080 1081 1082 1083
	/*
	 * Account for the 8 bytes we read earlier
	 */
	len += 8;

	if (req) {
		xprt_complete_rqst(req->rq_task, len);
		len = 0;
		goto out;
	}
L
Linus Torvalds 已提交
1084 1085 1086 1087 1088 1089 1090 1091 1092 1093
	dprintk("svc: TCP complete record (%d bytes)\n", len);
	rqstp->rq_arg.len = len;
	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
	}

1094
	rqstp->rq_xprt_ctxt   = NULL;
L
Linus Torvalds 已提交
1095 1096
	rqstp->rq_prot	      = IPPROTO_TCP;

1097
out:
L
Linus Torvalds 已提交
1098 1099 1100 1101
	/* Reset TCP read info */
	svsk->sk_reclen = 0;
	svsk->sk_tcplen = 0;

1102
	svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
L
Linus Torvalds 已提交
1103 1104 1105 1106 1107
	if (serv->sv_stats)
		serv->sv_stats->nettcpcnt++;

	return len;

1108
err_again:
L
Linus Torvalds 已提交
1109 1110
	if (len == -EAGAIN) {
		dprintk("RPC: TCP recvfrom got EAGAIN\n");
1111 1112 1113 1114
		return len;
	}
error:
	if (len != -EAGAIN) {
L
Linus Torvalds 已提交
1115
		printk(KERN_NOTICE "%s: recvfrom returned errno %d\n",
1116
		       svsk->sk_xprt.xpt_server->sv_name, -len);
1117
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1118
	}
1119
	return -EAGAIN;
L
Linus Torvalds 已提交
1120 1121 1122 1123 1124
}

/*
 * Send out data on TCP socket.
 */
1125
static int svc_tcp_sendto(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
1126 1127 1128
{
	struct xdr_buf	*xbufp = &rqstp->rq_res;
	int sent;
1129
	__be32 reclen;
L
Linus Torvalds 已提交
1130 1131 1132 1133 1134 1135 1136 1137 1138 1139

	/* Set up the first element of the reply kvec.
	 * Any other kvecs that may be in use have been taken
	 * care of by the server implementation itself.
	 */
	reclen = htonl(0x80000000|((xbufp->len ) - 4));
	memcpy(xbufp->head[0].iov_base, &reclen, 4);

	sent = svc_sendto(rqstp, &rqstp->rq_res);
	if (sent != xbufp->len) {
1140 1141 1142
		printk(KERN_NOTICE
		       "rpc-srv/tcp: %s: %s %d when sending %d bytes "
		       "- shutting down socket\n",
1143
		       rqstp->rq_xprt->xpt_server->sv_name,
L
Linus Torvalds 已提交
1144 1145
		       (sent<0)?"got error":"sent only",
		       sent, xbufp->len);
1146
		set_bit(XPT_CLOSE, &rqstp->rq_xprt->xpt_flags);
1147
		svc_xprt_enqueue(rqstp->rq_xprt);
L
Linus Torvalds 已提交
1148 1149 1150 1151 1152
		sent = -EAGAIN;
	}
	return sent;
}

T
Tom Tucker 已提交
1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163
/*
 * Setup response header. TCP has a 4B record length field.
 */
static void svc_tcp_prep_reply_hdr(struct svc_rqst *rqstp)
{
	struct kvec *resv = &rqstp->rq_res.head[0];

	/* tcp needs a space for the record length... */
	svc_putnl(resv, 0);
}

1164 1165
static int svc_tcp_has_wspace(struct svc_xprt *xprt)
{
1166
	struct svc_sock *svsk =	container_of(xprt, struct svc_sock, sk_xprt);
1167
	struct svc_serv *serv = svsk->sk_xprt.xpt_server;
1168 1169
	int required;

1170 1171 1172 1173 1174
	if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
		return 1;
	required = atomic_read(&xprt->xpt_reserved) + serv->sv_max_mesg;
	if (sk_stream_wspace(svsk->sk_sk) >= required)
		return 1;
1175
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
1176
	return 0;
1177 1178
}

1179
static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
1180
				       struct net *net,
1181 1182 1183
				       struct sockaddr *sa, int salen,
				       int flags)
{
1184
	return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
1185 1186
}

1187
static struct svc_xprt_ops svc_tcp_ops = {
1188
	.xpo_create = svc_tcp_create,
1189 1190
	.xpo_recvfrom = svc_tcp_recvfrom,
	.xpo_sendto = svc_tcp_sendto,
1191
	.xpo_release_rqst = svc_release_skb,
1192
	.xpo_detach = svc_tcp_sock_detach,
1193
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
1194
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
1195
	.xpo_has_wspace = svc_tcp_has_wspace,
1196
	.xpo_accept = svc_tcp_accept,
1197 1198 1199 1200
};

static struct svc_xprt_class svc_tcp_class = {
	.xcl_name = "tcp",
1201
	.xcl_owner = THIS_MODULE,
1202
	.xcl_ops = &svc_tcp_ops,
1203
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217
};

void svc_init_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_class);
	svc_reg_xprt_class(&svc_udp_class);
}

void svc_cleanup_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_class);
	svc_unreg_xprt_class(&svc_udp_class);
}

1218
static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
1219 1220 1221
{
	struct sock	*sk = svsk->sk_sk;

1222
	svc_xprt_init(&svc_tcp_class, &svsk->sk_xprt, serv);
1223
	set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1224 1225
	if (sk->sk_state == TCP_LISTEN) {
		dprintk("setting up TCP socket for listening\n");
1226
		set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1227
		sk->sk_data_ready = svc_tcp_listen_data_ready;
1228
		set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1229 1230 1231 1232
	} else {
		dprintk("setting up TCP socket for reading\n");
		sk->sk_state_change = svc_tcp_state_change;
		sk->sk_data_ready = svc_tcp_data_ready;
1233
		sk->sk_write_space = svc_tcp_write_space;
L
Linus Torvalds 已提交
1234 1235 1236 1237

		svsk->sk_reclen = 0;
		svsk->sk_tcplen = 0;

1238
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
L
Linus Torvalds 已提交
1239

1240 1241 1242 1243 1244 1245 1246 1247 1248
		/* initialise setting must have enough space to
		 * receive and respond to one request.
		 * svc_tcp_recvfrom will re-adjust if necessary
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);

		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1249
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
1250
		if (sk->sk_state != TCP_ESTABLISHED)
1251
			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1252 1253 1254
	}
}

1255
void svc_sock_update_bufs(struct svc_serv *serv)
L
Linus Torvalds 已提交
1256 1257 1258 1259 1260
{
	/*
	 * The number of server threads has changed. Update
	 * rcvbuf and sndbuf accordingly on all sockets
	 */
1261
	struct svc_sock *svsk;
L
Linus Torvalds 已提交
1262 1263

	spin_lock_bh(&serv->sv_lock);
1264
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
1265
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1266
	list_for_each_entry(svsk, &serv->sv_tempsocks, sk_xprt.xpt_list)
1267
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1268 1269
	spin_unlock_bh(&serv->sv_lock);
}
1270
EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
L
Linus Torvalds 已提交
1271 1272 1273 1274 1275

/*
 * Initialize socket for RPC use and create svc_sock struct
 * XXX: May want to setsockopt SO_SNDBUF and SO_RCVBUF.
 */
1276 1277 1278
static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
						struct socket *sock,
						int *errp, int flags)
L
Linus Torvalds 已提交
1279 1280 1281
{
	struct svc_sock	*svsk;
	struct sock	*inet;
1282
	int		pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
L
Linus Torvalds 已提交
1283 1284

	dprintk("svc: svc_setup_socket %p\n", sock);
1285
	if (!(svsk = kzalloc(sizeof(*svsk), GFP_KERNEL))) {
L
Linus Torvalds 已提交
1286 1287 1288 1289 1290 1291 1292 1293
		*errp = -ENOMEM;
		return NULL;
	}

	inet = sock->sk;

	/* Register socket with portmapper */
	if (*errp >= 0 && pmap_register)
1294
		*errp = svc_register(serv, inet->sk_family, inet->sk_protocol,
E
Eric Dumazet 已提交
1295
				     ntohs(inet_sk(inet)->inet_sport));
L
Linus Torvalds 已提交
1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310

	if (*errp < 0) {
		kfree(svsk);
		return NULL;
	}

	inet->sk_user_data = svsk;
	svsk->sk_sock = sock;
	svsk->sk_sk = inet;
	svsk->sk_ostate = inet->sk_state_change;
	svsk->sk_odata = inet->sk_data_ready;
	svsk->sk_owspace = inet->sk_write_space;

	/* Initialize the socket */
	if (sock->type == SOCK_DGRAM)
1311
		svc_udp_init(svsk, serv);
1312
	else
1313
		svc_tcp_init(svsk, serv);
L
Linus Torvalds 已提交
1314 1315 1316 1317 1318 1319 1320

	dprintk("svc: svc_setup_socket created %p (inet %p)\n",
				svsk, svsk->sk_sk);

	return svsk;
}

1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333
/**
 * svc_addsock - add a listener socket to an RPC service
 * @serv: pointer to RPC service to which to add a new listener
 * @fd: file descriptor of the new listener
 * @name_return: pointer to buffer to fill in with name of listener
 * @len: size of the buffer
 *
 * Fills in socket name and returns positive length of name if successful.
 * Name is terminated with '\n'.  On error, returns a negative errno
 * value.
 */
int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
		const size_t len)
1334 1335 1336 1337 1338 1339 1340
{
	int err = 0;
	struct socket *so = sockfd_lookup(fd, &err);
	struct svc_sock *svsk = NULL;

	if (!so)
		return err;
1341
	if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
1342 1343 1344 1345 1346 1347 1348
		err =  -EAFNOSUPPORT;
	else if (so->sk->sk_protocol != IPPROTO_TCP &&
	    so->sk->sk_protocol != IPPROTO_UDP)
		err =  -EPROTONOSUPPORT;
	else if (so->state > SS_UNCONNECTED)
		err = -EISCONN;
	else {
1349 1350 1351 1352 1353
		if (!try_module_get(THIS_MODULE))
			err = -ENOENT;
		else
			svsk = svc_setup_socket(serv, so, &err,
						SVC_SOCK_DEFAULTS);
1354
		if (svsk) {
1355 1356 1357 1358 1359
			struct sockaddr_storage addr;
			struct sockaddr *sin = (struct sockaddr *)&addr;
			int salen;
			if (kernel_getsockname(svsk->sk_sock, sin, &salen) == 0)
				svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
1360 1361 1362 1363
			clear_bit(XPT_TEMP, &svsk->sk_xprt.xpt_flags);
			spin_lock_bh(&serv->sv_lock);
			list_add(&svsk->sk_xprt.xpt_list, &serv->sv_permsocks);
			spin_unlock_bh(&serv->sv_lock);
1364
			svc_xprt_received(&svsk->sk_xprt);
1365
			err = 0;
1366 1367
		} else
			module_put(THIS_MODULE);
1368 1369 1370 1371 1372
	}
	if (err) {
		sockfd_put(so);
		return err;
	}
1373
	return svc_one_sock_name(svsk, name_return, len);
1374 1375 1376
}
EXPORT_SYMBOL_GPL(svc_addsock);

L
Linus Torvalds 已提交
1377 1378 1379
/*
 * Create socket for RPC service.
 */
1380 1381
static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
					  int protocol,
1382
					  struct net *net,
1383 1384
					  struct sockaddr *sin, int len,
					  int flags)
L
Linus Torvalds 已提交
1385 1386 1387 1388 1389
{
	struct svc_sock	*svsk;
	struct socket	*sock;
	int		error;
	int		type;
1390 1391 1392
	struct sockaddr_storage addr;
	struct sockaddr *newsin = (struct sockaddr *)&addr;
	int		newlen;
1393 1394
	int		family;
	int		val;
1395
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
1396

1397 1398
	dprintk("svc: svc_create_socket(%s, %d, %s)\n",
			serv->sv_program->pg_name, protocol,
1399
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
1400 1401 1402 1403

	if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only UDP and TCP "
				"sockets supported\n");
1404
		return ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
1405
	}
1406

L
Linus Torvalds 已提交
1407
	type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
1408 1409 1410 1411 1412 1413 1414 1415 1416 1417
	switch (sin->sa_family) {
	case AF_INET6:
		family = PF_INET6;
		break;
	case AF_INET:
		family = PF_INET;
		break;
	default:
		return ERR_PTR(-EINVAL);
	}
L
Linus Torvalds 已提交
1418

1419
	error = __sock_create(net, family, type, protocol, &sock, 1);
1420
	if (error < 0)
1421
		return ERR_PTR(error);
L
Linus Torvalds 已提交
1422

1423 1424
	svc_reclassify_socket(sock);

1425 1426 1427 1428 1429 1430 1431 1432 1433 1434
	/*
	 * If this is an PF_INET6 listener, we want to avoid
	 * getting requests from IPv4 remotes.  Those should
	 * be shunted to a PF_INET listener via rpcbind.
	 */
	val = 1;
	if (family == PF_INET6)
		kernel_setsockopt(sock, SOL_IPV6, IPV6_V6ONLY,
					(char *)&val, sizeof(val));

1435
	if (type == SOCK_STREAM)
1436 1437
		sock->sk->sk_reuse = 1;		/* allow address reuse */
	error = kernel_bind(sock, sin, len);
1438 1439
	if (error < 0)
		goto bummer;
L
Linus Torvalds 已提交
1440

1441 1442 1443 1444 1445
	newlen = len;
	error = kernel_getsockname(sock, newsin, &newlen);
	if (error < 0)
		goto bummer;

L
Linus Torvalds 已提交
1446
	if (protocol == IPPROTO_TCP) {
1447
		if ((error = kernel_listen(sock, 64)) < 0)
L
Linus Torvalds 已提交
1448 1449 1450
			goto bummer;
	}

1451
	if ((svsk = svc_setup_socket(serv, sock, &error, flags)) != NULL) {
1452
		svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
1453
		return (struct svc_xprt *)svsk;
1454
	}
L
Linus Torvalds 已提交
1455 1456 1457 1458

bummer:
	dprintk("svc: svc_create_socket error = %d\n", -error);
	sock_release(sock);
1459
	return ERR_PTR(error);
L
Linus Torvalds 已提交
1460 1461
}

1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476
/*
 * Detach the svc_sock from the socket so that no
 * more callbacks occur.
 */
static void svc_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	struct sock *sk = svsk->sk_sk;

	dprintk("svc: svc_sock_detach(%p)\n", svsk);

	/* put back the old socket callbacks */
	sk->sk_state_change = svsk->sk_ostate;
	sk->sk_data_ready = svsk->sk_odata;
	sk->sk_write_space = svsk->sk_owspace;
1477

E
Eric Dumazet 已提交
1478 1479
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494
}

/*
 * Disconnect the socket, and reset the callbacks
 */
static void svc_tcp_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);

	dprintk("svc: svc_tcp_sock_detach(%p)\n", svsk);

	svc_sock_detach(xprt);

	if (!test_bit(XPT_LISTENER, &xprt->xpt_flags))
		kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510
}

/*
 * Free the svc_sock's socket resources and the svc_sock itself.
 */
static void svc_sock_free(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	dprintk("svc: svc_sock_free(%p)\n", svsk);

	if (svsk->sk_sock->file)
		sockfd_put(svsk->sk_sock);
	else
		sock_release(svsk->sk_sock);
	kfree(svsk);
}
1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549

/*
 * Create a svc_xprt.
 *
 * For internal use only (e.g. nfsv4.1 backchannel).
 * Callers should typically use the xpo_create() method.
 */
struct svc_xprt *svc_sock_create(struct svc_serv *serv, int prot)
{
	struct svc_sock *svsk;
	struct svc_xprt *xprt = NULL;

	dprintk("svc: %s\n", __func__);
	svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
	if (!svsk)
		goto out;

	xprt = &svsk->sk_xprt;
	if (prot == IPPROTO_TCP)
		svc_xprt_init(&svc_tcp_class, xprt, serv);
	else if (prot == IPPROTO_UDP)
		svc_xprt_init(&svc_udp_class, xprt, serv);
	else
		BUG();
out:
	dprintk("svc: %s return %p\n", __func__, xprt);
	return xprt;
}
EXPORT_SYMBOL_GPL(svc_sock_create);

/*
 * Destroy a svc_sock.
 */
void svc_sock_destroy(struct svc_xprt *xprt)
{
	if (xprt)
		kfree(container_of(xprt, struct svc_sock, sk_xprt));
}
EXPORT_SYMBOL_GPL(svc_sock_destroy);