xprtsock.c 83.7 KB
Newer Older
1 2 3 4 5
/*
 * linux/net/sunrpc/xprtsock.c
 *
 * Client-side transport implementation for sockets.
 *
6 7
 * TCP callback races fixes (C) 1998 Red Hat
 * TCP send fixes (C) 1998 Red Hat
8 9 10 11 12 13
 * TCP NFS related read + write fixes
 *  (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
 *
 * Rewrite of larges part of the code in order to stabilize TCP stuff.
 * Fix behaviour when socket buffer is full.
 *  (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
14 15
 *
 * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
16 17 18
 *
 * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
 *   <gilles.quillard@bull.net>
19 20 21
 */

#include <linux/types.h>
22
#include <linux/string.h>
23
#include <linux/slab.h>
24
#include <linux/module.h>
25 26 27 28 29 30 31
#include <linux/capability.h>
#include <linux/pagemap.h>
#include <linux/errno.h>
#include <linux/socket.h>
#include <linux/in.h>
#include <linux/net.h>
#include <linux/mm.h>
32
#include <linux/un.h>
33 34 35
#include <linux/udp.h>
#include <linux/tcp.h>
#include <linux/sunrpc/clnt.h>
36
#include <linux/sunrpc/addr.h>
37
#include <linux/sunrpc/sched.h>
38
#include <linux/sunrpc/svcsock.h>
39
#include <linux/sunrpc/xprtsock.h>
40
#include <linux/file.h>
41
#ifdef CONFIG_SUNRPC_BACKCHANNEL
R
Ricardo Labiaga 已提交
42 43
#include <linux/sunrpc/bc_xprt.h>
#endif
44 45 46 47 48 49

#include <net/sock.h>
#include <net/checksum.h>
#include <net/udp.h>
#include <net/tcp.h>

50 51
#include <trace/events/sunrpc.h>

52
#include "sunrpc.h"
53 54 55

static void xs_close(struct rpc_xprt *xprt);

56 57 58
/*
 * xprtsock tunables
 */
59 60 61
static unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
static unsigned int xprt_tcp_slot_table_entries = RPC_MIN_SLOT_TABLE;
static unsigned int xprt_max_tcp_slot_table_entries = RPC_MAX_SLOT_TABLE;
62

63 64
static unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
static unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;
65

66 67
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)

68
#define XS_TCP_LINGER_TO	(15U * HZ)
69
static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO;
70

71 72 73 74 75 76 77 78 79 80 81
/*
 * We can register our own files under /proc/sys/sunrpc by
 * calling register_sysctl_table() again.  The files in that
 * directory become the union of all files registered there.
 *
 * We simply need to make sure that we don't collide with
 * someone else's file names!
 */

static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
82
static unsigned int max_tcp_slot_table_limit = RPC_MAX_SLOT_TABLE_LIMIT;
83 84 85 86 87 88 89 90 91
static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;

static struct ctl_table_header *sunrpc_table_header;

/*
 * FIXME: changing the UDP slot table size should also resize the UDP
 *        socket buffers for existing UDP transports
 */
92
static struct ctl_table xs_tunables_table[] = {
93 94 95 96 97
	{
		.procname	= "udp_slot_table_entries",
		.data		= &xprt_udp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
98
		.proc_handler	= proc_dointvec_minmax,
99 100 101 102 103 104 105 106
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
	{
		.procname	= "tcp_slot_table_entries",
		.data		= &xprt_tcp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
107
		.proc_handler	= proc_dointvec_minmax,
108 109 110
		.extra1		= &min_slot_table_size,
		.extra2		= &max_slot_table_size
	},
111 112 113 114 115 116 117 118 119
	{
		.procname	= "tcp_max_slot_table_entries",
		.data		= &xprt_max_tcp_slot_table_entries,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
		.proc_handler	= proc_dointvec_minmax,
		.extra1		= &min_slot_table_size,
		.extra2		= &max_tcp_slot_table_limit
	},
120 121 122 123 124
	{
		.procname	= "min_resvport",
		.data		= &xprt_min_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
125
		.proc_handler	= proc_dointvec_minmax,
126
		.extra1		= &xprt_min_resvport_limit,
127
		.extra2		= &xprt_max_resvport
128 129 130 131 132 133
	},
	{
		.procname	= "max_resvport",
		.data		= &xprt_max_resvport,
		.maxlen		= sizeof(unsigned int),
		.mode		= 0644,
134
		.proc_handler	= proc_dointvec_minmax,
135
		.extra1		= &xprt_min_resvport,
136 137
		.extra2		= &xprt_max_resvport_limit
	},
138 139 140 141 142
	{
		.procname	= "tcp_fin_timeout",
		.data		= &xs_tcp_fin_timeout,
		.maxlen		= sizeof(xs_tcp_fin_timeout),
		.mode		= 0644,
143
		.proc_handler	= proc_dointvec_jiffies,
144
	},
145
	{ },
146 147
};

148
static struct ctl_table sunrpc_table[] = {
149 150 151 152 153
	{
		.procname	= "sunrpc",
		.mode		= 0555,
		.child		= xs_tunables_table
	},
154
	{ },
155 156 157 158
};

#endif

159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188
/*
 * Wait duration for a reply from the RPC portmapper.
 */
#define XS_BIND_TO		(60U * HZ)

/*
 * Delay if a UDP socket connect error occurs.  This is most likely some
 * kind of resource problem on the local host.
 */
#define XS_UDP_REEST_TO		(2U * HZ)

/*
 * The reestablish timeout allows clients to delay for a bit before attempting
 * to reconnect to a server that just dropped our connection.
 *
 * We implement an exponential backoff when trying to reestablish a TCP
 * transport connection with the server.  Some servers like to drop a TCP
 * connection when they are overworked, so we start with a short timeout and
 * increase over time if the server is down or not responding.
 */
#define XS_TCP_INIT_REEST_TO	(3U * HZ)
#define XS_TCP_MAX_REEST_TO	(5U * 60 * HZ)

/*
 * TCP idle timeout; client drops the transport socket if it is idle
 * for this long.  Note that we also timeout UDP sockets to prevent
 * holding port numbers when there is no RPC traffic.
 */
#define XS_IDLE_DISC_TO		(5U * 60 * HZ)

J
Jeff Layton 已提交
189
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
190
# undef  RPC_DEBUG_DATA
191
# define RPCDBG_FACILITY	RPCDBG_TRANS
192 193 194
#endif

#ifdef RPC_DEBUG_DATA
195
static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
196
{
197 198
	u8 *buf = (u8 *) packet;
	int j;
199

200
	dprintk("RPC:       %s\n", msg);
201 202 203 204 205 206 207 208 209 210 211 212
	for (j = 0; j < count && j < 128; j += 4) {
		if (!(j & 31)) {
			if (j)
				dprintk("\n");
			dprintk("0x%04x ", j);
		}
		dprintk("%02x%02x%02x%02x ",
			buf[j], buf[j+1], buf[j+2], buf[j+3]);
	}
	dprintk("\n");
}
#else
213
static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
214 215 216 217 218
{
	/* NOP */
}
#endif

219 220 221 222 223
static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
{
	return (struct rpc_xprt *) sk->sk_user_data;
}

224 225 226 227 228
static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
{
	return (struct sockaddr *) &xprt->addr;
}

229 230 231 232 233
static inline struct sockaddr_un *xs_addr_un(struct rpc_xprt *xprt)
{
	return (struct sockaddr_un *) &xprt->addr;
}

234
static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
235
{
236 237 238 239 240 241 242 243
	return (struct sockaddr_in *) &xprt->addr;
}

static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
{
	return (struct sockaddr_in6 *) &xprt->addr;
}

244
static void xs_format_common_peer_addresses(struct rpc_xprt *xprt)
245
{
246
	struct sockaddr *sap = xs_addr(xprt);
247 248
	struct sockaddr_in6 *sin6;
	struct sockaddr_in *sin;
249
	struct sockaddr_un *sun;
250
	char buf[128];
251

252
	switch (sap->sa_family) {
253 254 255 256 257 258
	case AF_LOCAL:
		sun = xs_addr_un(xprt);
		strlcpy(buf, sun->sun_path, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
		break;
259
	case AF_INET:
260 261 262
		(void)rpc_ntop(sap, buf, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
263
		sin = xs_addr_in(xprt);
264
		snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
265 266
		break;
	case AF_INET6:
267 268 269
		(void)rpc_ntop(sap, buf, sizeof(buf));
		xprt->address_strings[RPC_DISPLAY_ADDR] =
						kstrdup(buf, GFP_KERNEL);
270
		sin6 = xs_addr_in6(xprt);
271
		snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
272 273 274
		break;
	default:
		BUG();
275
	}
276

277
	xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
278 279
}

280
static void xs_format_common_peer_ports(struct rpc_xprt *xprt)
281
{
282 283
	struct sockaddr *sap = xs_addr(xprt);
	char buf[128];
284

285
	snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
286
	xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
287

288
	snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
289 290
	xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
}
291

292 293 294
static void xs_format_peer_addresses(struct rpc_xprt *xprt,
				     const char *protocol,
				     const char *netid)
295
{
296 297
	xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
	xprt->address_strings[RPC_DISPLAY_NETID] = netid;
298
	xs_format_common_peer_addresses(xprt);
299
	xs_format_common_peer_ports(xprt);
300
}
301

302
static void xs_update_peer_port(struct rpc_xprt *xprt)
303
{
304 305
	kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
	kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
306

307
	xs_format_common_peer_ports(xprt);
308 309 310 311
}

static void xs_free_peer_addresses(struct rpc_xprt *xprt)
{
312 313 314 315 316 317 318 319 320 321
	unsigned int i;

	for (i = 0; i < RPC_DISPLAY_MAX; i++)
		switch (i) {
		case RPC_DISPLAY_PROTO:
		case RPC_DISPLAY_NETID:
			continue;
		default:
			kfree(xprt->address_strings[i]);
		}
322 323
}

324 325
#define XS_SENDMSG_FLAGS	(MSG_DONTWAIT | MSG_NOSIGNAL)

T
Trond Myklebust 已提交
326
static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
327 328 329 330
{
	struct msghdr msg = {
		.msg_name	= addr,
		.msg_namelen	= addrlen,
T
Trond Myklebust 已提交
331 332 333 334 335
		.msg_flags	= XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
	};
	struct kvec iov = {
		.iov_base	= vec->iov_base + base,
		.iov_len	= vec->iov_len - base,
336 337
	};

T
Trond Myklebust 已提交
338
	if (iov.iov_len != 0)
339 340 341 342
		return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
	return kernel_sendmsg(sock, &msg, NULL, 0, 0);
}

343
static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more, bool zerocopy, int *sent_p)
344
{
345 346
	ssize_t (*do_sendpage)(struct socket *sock, struct page *page,
			int offset, size_t size, int flags);
T
Trond Myklebust 已提交
347 348
	struct page **ppage;
	unsigned int remainder;
349
	int err;
T
Trond Myklebust 已提交
350 351 352 353 354

	remainder = xdr->page_len - base;
	base += xdr->page_base;
	ppage = xdr->pages + (base >> PAGE_SHIFT);
	base &= ~PAGE_MASK;
355 356 357
	do_sendpage = sock->ops->sendpage;
	if (!zerocopy)
		do_sendpage = sock_no_sendpage;
T
Trond Myklebust 已提交
358 359 360
	for(;;) {
		unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
		int flags = XS_SENDMSG_FLAGS;
361

T
Trond Myklebust 已提交
362
		remainder -= len;
363
		if (more)
T
Trond Myklebust 已提交
364
			flags |= MSG_MORE;
365 366
		if (remainder != 0)
			flags |= MSG_SENDPAGE_NOTLAST | MSG_MORE;
367
		err = do_sendpage(sock, *ppage, base, len, flags);
T
Trond Myklebust 已提交
368 369
		if (remainder == 0 || err != len)
			break;
370
		*sent_p += err;
T
Trond Myklebust 已提交
371 372 373
		ppage++;
		base = 0;
	}
374 375 376 377 378
	if (err > 0) {
		*sent_p += err;
		err = 0;
	}
	return err;
379 380
}

381 382 383 384 385 386 387
/**
 * xs_sendpages - write pages directly to a socket
 * @sock: socket to send on
 * @addr: UDP only -- address of destination
 * @addrlen: UDP only -- length of destination address
 * @xdr: buffer containing this request
 * @base: starting position in the buffer
388
 * @zerocopy: true if it is safe to use sendpage()
389
 * @sent_p: return the total number of bytes successfully queued for sending
390
 *
391
 */
392
static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base, bool zerocopy, int *sent_p)
393
{
T
Trond Myklebust 已提交
394
	unsigned int remainder = xdr->len - base;
395 396
	int err = 0;
	int sent = 0;
397

398
	if (unlikely(!sock))
399
		return -ENOTSOCK;
400

T
Trond Myklebust 已提交
401 402 403 404
	if (base != 0) {
		addr = NULL;
		addrlen = 0;
	}
405

T
Trond Myklebust 已提交
406 407 408 409 410
	if (base < xdr->head[0].iov_len || addr != NULL) {
		unsigned int len = xdr->head[0].iov_len - base;
		remainder -= len;
		err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
		if (remainder == 0 || err != len)
411
			goto out;
412
		*sent_p += err;
413 414
		base = 0;
	} else
T
Trond Myklebust 已提交
415
		base -= xdr->head[0].iov_len;
416

T
Trond Myklebust 已提交
417 418 419
	if (base < xdr->page_len) {
		unsigned int len = xdr->page_len - base;
		remainder -= len;
420 421 422
		err = xs_send_pagedata(sock, xdr, base, remainder != 0, zerocopy, &sent);
		*sent_p += sent;
		if (remainder == 0 || sent != len)
423 424
			goto out;
		base = 0;
T
Trond Myklebust 已提交
425 426 427 428
	} else
		base -= xdr->page_len;

	if (base >= xdr->tail[0].iov_len)
429
		return 0;
T
Trond Myklebust 已提交
430
	err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
431
out:
432 433 434 435 436
	if (err > 0) {
		*sent_p += err;
		err = 0;
	}
	return err;
437 438
}

439 440 441 442 443 444 445
static void xs_nospace_callback(struct rpc_task *task)
{
	struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt);

	transport->inet->sk_write_pending--;
}

446
/**
447 448
 * xs_nospace - place task on wait queue if transmit was incomplete
 * @task: task to put to sleep
449
 *
450
 */
451
static int xs_nospace(struct rpc_task *task)
452
{
453 454
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
455
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
456
	struct sock *sk = transport->inet;
457
	int ret = -EAGAIN;
458

459
	dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
460 461 462
			task->tk_pid, req->rq_slen - req->rq_bytes_sent,
			req->rq_slen);

463 464 465 466 467
	/* Protect against races with write_space */
	spin_lock_bh(&xprt->transport_lock);

	/* Don't race with disconnect */
	if (xprt_connected(xprt)) {
468 469 470 471
		/* wait for more buffer space */
		sk->sk_write_pending++;
		xprt_wait_for_buffer_space(task, xs_nospace_callback);
	} else
472
		ret = -ENOTCONN;
473

474
	spin_unlock_bh(&xprt->transport_lock);
475 476 477

	/* Race breaker in case memory is freed before above code is called */
	sk->sk_write_space(sk);
478
	return ret;
479 480
}

481 482 483 484 485 486 487 488 489 490
/*
 * Construct a stream transport record marker in @buf.
 */
static inline void xs_encode_stream_record_marker(struct xdr_buf *buf)
{
	u32 reclen = buf->len - sizeof(rpc_fraghdr);
	rpc_fraghdr *base = buf->head[0].iov_base;
	*base = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT | reclen);
}

491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
/**
 * xs_local_send_request - write an RPC request to an AF_LOCAL socket
 * @task: RPC task that manages the state of an RPC request
 *
 * Return values:
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
 *    other:	Some other error occured, the request was not sent
 */
static int xs_local_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct xdr_buf *xdr = &req->rq_snd_buf;
	int status;
510
	int sent = 0;
511 512 513 514 515 516

	xs_encode_stream_record_marker(&req->rq_snd_buf);

	xs_pktdump("packet data:",
			req->rq_svec->iov_base, req->rq_svec->iov_len);

517 518
	status = xs_sendpages(transport->sock, NULL, 0, xdr, req->rq_bytes_sent,
			      true, &sent);
519 520
	dprintk("RPC:       %s(%u) = %d\n",
			__func__, xdr->len - req->rq_bytes_sent, status);
521 522 523 524

	if (status == -EAGAIN && sock_writeable(transport->inet))
		status = -ENOBUFS;

525 526 527
	if (likely(sent > 0) || status == 0) {
		req->rq_bytes_sent += sent;
		req->rq_xmit_bytes_sent += sent;
528 529 530 531 532 533 534 535
		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
			req->rq_bytes_sent = 0;
			return 0;
		}
		status = -EAGAIN;
	}

	switch (status) {
536
	case -ENOBUFS:
537
		break;
538 539 540 541 542 543 544 545 546 547 548 549 550 551
	case -EAGAIN:
		status = xs_nospace(task);
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
	case -EPIPE:
		xs_close(xprt);
		status = -ENOTCONN;
	}

	return status;
}

552 553 554 555 556 557 558 559 560
/**
 * xs_udp_send_request - write an RPC request to a UDP socket
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
L
Lucas De Marchi 已提交
561
 *    other:	Some other error occurred, the request was not sent
562 563 564 565 566
 */
static int xs_udp_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
567
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
568
	struct xdr_buf *xdr = &req->rq_snd_buf;
569
	int sent = 0;
570
	int status;
571

572
	xs_pktdump("packet data:",
573 574 575
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);

576 577
	if (!xprt_bound(xprt))
		return -ENOTCONN;
578 579
	status = xs_sendpages(transport->sock, xs_addr(xprt), xprt->addrlen,
			      xdr, req->rq_bytes_sent, true, &sent);
580

581
	dprintk("RPC:       xs_udp_send_request(%u) = %d\n",
582
			xdr->len - req->rq_bytes_sent, status);
583

584 585 586 587
	/* firewall is blocking us, don't return -EAGAIN or we end up looping */
	if (status == -EPERM)
		goto process_status;

588 589 590
	if (status == -EAGAIN && sock_writeable(transport->inet))
		status = -ENOBUFS;

591 592 593
	if (sent > 0 || status == 0) {
		req->rq_xmit_bytes_sent += sent;
		if (sent >= req->rq_slen)
594 595
			return 0;
		/* Still some bytes left; set up for a retry later. */
596
		status = -EAGAIN;
597
	}
598

599
process_status:
600
	switch (status) {
601 602 603 604
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
605
	case -EAGAIN:
606
		status = xs_nospace(task);
607
		break;
608
	case -ENETUNREACH:
609
	case -ENOBUFS:
610
	case -EPIPE:
611
	case -ECONNREFUSED:
612
	case -EPERM:
613
		/* When the server has died, an ICMP port unreachable message
614
		 * prompts ECONNREFUSED. */
615 616 617 618
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
619
	}
620

621
	return status;
622 623
}

624
/**
625
 * xs_tcp_send_request - write an RPC request to a TCP socket
626 627 628
 * @task: address of RPC task that manages the state of an RPC request
 *
 * Return values:
629 630 631 632
 *        0:	The request has been sent
 *   EAGAIN:	The socket was blocked, please call again later to
 *		complete the request
 * ENOTCONN:	Caller needs to invoke connect logic then call again
L
Lucas De Marchi 已提交
633
 *    other:	Some other error occurred, the request was not sent
634 635
 *
 * XXX: In the case of soft timeouts, should we eventually give up
636
 *	if sendmsg is not able to make progress?
637
 */
638
static int xs_tcp_send_request(struct rpc_task *task)
639 640 641
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct rpc_xprt *xprt = req->rq_xprt;
642
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
643
	struct xdr_buf *xdr = &req->rq_snd_buf;
644
	bool zerocopy = true;
645
	bool vm_wait = false;
646
	int status;
647
	int sent;
648

649
	xs_encode_stream_record_marker(&req->rq_snd_buf);
650

651 652 653
	xs_pktdump("packet data:",
				req->rq_svec->iov_base,
				req->rq_svec->iov_len);
654 655 656 657 658 659
	/* Don't use zero copy if this is a resend. If the RPC call
	 * completes while the socket holds a reference to the pages,
	 * then we may end up resending corrupted data.
	 */
	if (task->tk_flags & RPC_TASK_SENT)
		zerocopy = false;
660 661 662

	/* Continue transmitting the packet/record. We must be careful
	 * to cope with writespace callbacks arriving _after_ we have
663
	 * called sendmsg(). */
664
	while (1) {
665 666 667
		sent = 0;
		status = xs_sendpages(transport->sock, NULL, 0, xdr,
				      req->rq_bytes_sent, zerocopy, &sent);
668

669
		dprintk("RPC:       xs_tcp_send_request(%u) = %d\n",
670
				xdr->len - req->rq_bytes_sent, status);
671

672 673
		/* If we've sent the entire packet, immediately
		 * reset the count of bytes sent. */
674 675
		req->rq_bytes_sent += sent;
		req->rq_xmit_bytes_sent += sent;
676 677 678 679
		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
			req->rq_bytes_sent = 0;
			return 0;
		}
680

681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703
		WARN_ON_ONCE(sent == 0 && status == 0);

		if (status == -EAGAIN ) {
			/*
			 * Return EAGAIN if we're sure we're hitting the
			 * socket send buffer limits.
			 */
			if (test_bit(SOCK_NOSPACE, &transport->sock->flags))
				break;
			/*
			 * Did we hit a memory allocation failure?
			 */
			if (sent == 0) {
				status = -ENOBUFS;
				if (vm_wait)
					break;
				/* Retry, knowing now that we're below the
				 * socket send buffer limit
				 */
				vm_wait = true;
			}
			continue;
		}
704 705
		if (status < 0)
			break;
706
		vm_wait = false;
707 708
	}

709
	switch (status) {
710 711 712 713
	case -ENOTSOCK:
		status = -ENOTCONN;
		/* Should we call xs_close() here? */
		break;
714
	case -EAGAIN:
715
		status = xs_nospace(task);
716 717
		break;
	case -ECONNRESET:
718
	case -ECONNREFUSED:
719
	case -ENOTCONN:
720
	case -EADDRINUSE:
721
	case -ENOBUFS:
722
	case -EPIPE:
723 724 725 726
		break;
	default:
		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
			-status);
727
	}
728

729 730 731
	return status;
}

732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749
/**
 * xs_tcp_release_xprt - clean up after a tcp transmission
 * @xprt: transport
 * @task: rpc task
 *
 * This cleans up if an error causes us to abort the transmission of a request.
 * In this case, the socket may need to be reset in order to avoid confusing
 * the server.
 */
static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
{
	struct rpc_rqst *req;

	if (task != xprt->snd_task)
		return;
	if (task == NULL)
		goto out_release;
	req = task->tk_rqstp;
750 751
	if (req == NULL)
		goto out_release;
752 753 754 755
	if (req->rq_bytes_sent == 0)
		goto out_release;
	if (req->rq_bytes_sent == req->rq_snd_buf.len)
		goto out_release;
756
	set_bit(XPRT_CLOSE_WAIT, &xprt->state);
757 758 759 760
out_release:
	xprt_release_xprt(xprt, task);
}

761 762 763 764 765
static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	transport->old_data_ready = sk->sk_data_ready;
	transport->old_state_change = sk->sk_state_change;
	transport->old_write_space = sk->sk_write_space;
766
	transport->old_error_report = sk->sk_error_report;
767 768 769 770 771 772 773
}

static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk)
{
	sk->sk_data_ready = transport->old_data_ready;
	sk->sk_state_change = transport->old_state_change;
	sk->sk_write_space = transport->old_write_space;
774 775 776
	sk->sk_error_report = transport->old_error_report;
}

777 778 779 780 781 782 783
static void xs_sock_reset_state_flags(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state);
}

784 785 786 787 788
static void xs_sock_reset_connection_flags(struct rpc_xprt *xprt)
{
	smp_mb__before_atomic();
	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
	clear_bit(XPRT_CLOSING, &xprt->state);
789
	xs_sock_reset_state_flags(xprt);
790 791 792 793 794 795 796 797 798 799
	smp_mb__after_atomic();
}

static void xs_sock_mark_closed(struct rpc_xprt *xprt)
{
	xs_sock_reset_connection_flags(xprt);
	/* Mark transport as closed and wake up all pending tasks */
	xprt_disconnect_done(xprt);
}

800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818
/**
 * xs_error_report - callback to handle TCP socket state errors
 * @sk: socket
 *
 * Note: we don't call sock_error() since there may be a rpc_task
 * using the socket, and so we don't want to clear sk->sk_err.
 */
static void xs_error_report(struct sock *sk)
{
	struct rpc_xprt *xprt;
	int err;

	read_lock_bh(&sk->sk_callback_lock);
	if (!(xprt = xprt_from_sock(sk)))
		goto out;

	err = -sk->sk_err;
	if (err == 0)
		goto out;
819 820 821
	/* Is this a reset event? */
	if (sk->sk_state == TCP_CLOSE)
		xs_sock_mark_closed(xprt);
822 823
	dprintk("RPC:       xs_error_report client %p, error=%d...\n",
			xprt, -err);
824
	trace_rpc_socket_error(xprt, sk->sk_socket, err);
825 826 827
	xprt_wake_pending_tasks(xprt, err);
 out:
	read_unlock_bh(&sk->sk_callback_lock);
828 829
}

830
static void xs_reset_transport(struct sock_xprt *transport)
831
{
832 833
	struct socket *sock = transport->sock;
	struct sock *sk = transport->inet;
834
	struct rpc_xprt *xprt = &transport->xprt;
835

836 837
	if (sk == NULL)
		return;
838

839 840 841
	if (atomic_read(&transport->xprt.swapper))
		sk_clear_memalloc(sk);

842 843
	kernel_sock_shutdown(sock, SHUT_RDWR);

844
	mutex_lock(&transport->recv_mutex);
845
	write_lock_bh(&sk->sk_callback_lock);
846 847
	transport->inet = NULL;
	transport->sock = NULL;
848

849
	sk->sk_user_data = NULL;
850 851

	xs_restore_old_callbacks(transport, sk);
852
	xprt_clear_connected(xprt);
853
	write_unlock_bh(&sk->sk_callback_lock);
854
	xs_sock_reset_connection_flags(xprt);
855
	mutex_unlock(&transport->recv_mutex);
856

857
	trace_rpc_socket_close(xprt, sock);
858
	sock_release(sock);
859 860 861 862 863 864 865 866
}

/**
 * xs_close - close a socket
 * @xprt: transport
 *
 * This is used when all requests are complete; ie, no DRC state remains
 * on the server we want to save.
867 868 869
 *
 * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with
 * xs_reset_transport() zeroing the socket from underneath a writer.
870 871 872 873 874 875 876 877
 */
static void xs_close(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	dprintk("RPC:       xs_close xprt %p\n", xprt);

	xs_reset_transport(transport);
878
	xprt->reestablish_timeout = 0;
879

880
	xprt_disconnect_done(xprt);
881 882
}

C
Chuck Lever 已提交
883 884 885 886 887 888 889
static void xs_inject_disconnect(struct rpc_xprt *xprt)
{
	dprintk("RPC:       injecting transport disconnect on xprt=%p\n",
		xprt);
	xprt_disconnect_done(xprt);
}

890 891 892 893 894 895
static void xs_xprt_free(struct rpc_xprt *xprt)
{
	xs_free_peer_addresses(xprt);
	xprt_free(xprt);
}

896 897 898 899 900 901
/**
 * xs_destroy - prepare to shutdown a transport
 * @xprt: doomed transport
 *
 */
static void xs_destroy(struct rpc_xprt *xprt)
902
{
903 904
	struct sock_xprt *transport = container_of(xprt,
			struct sock_xprt, xprt);
905
	dprintk("RPC:       xs_destroy xprt %p\n", xprt);
906

907
	cancel_delayed_work_sync(&transport->connect_worker);
T
Trond Myklebust 已提交
908
	xs_close(xprt);
909
	cancel_work_sync(&transport->recv_worker);
910
	xs_xprt_free(xprt);
T
Trond Myklebust 已提交
911
	module_put(THIS_MODULE);
912 913
}

914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929
static int xs_local_copy_to_xdr(struct xdr_buf *xdr, struct sk_buff *skb)
{
	struct xdr_skb_reader desc = {
		.skb		= skb,
		.offset		= sizeof(rpc_fraghdr),
		.count		= skb->len - sizeof(rpc_fraghdr),
	};

	if (xdr_partial_copy_from_skb(xdr, 0, &desc, xdr_skb_read_bits) < 0)
		return -1;
	if (desc.count)
		return -1;
	return 0;
}

/**
930 931 932 933
 * xs_local_data_read_skb
 * @xprt: transport
 * @sk: socket
 * @skb: skbuff
934 935 936
 *
 * Currently this assumes we can read the whole reply in a single gulp.
 */
937 938 939
static void xs_local_data_read_skb(struct rpc_xprt *xprt,
		struct sock *sk,
		struct sk_buff *skb)
940 941 942
{
	struct rpc_task *task;
	struct rpc_rqst *rovr;
943
	int repsize, copied;
944 945 946 947 948 949
	u32 _xid;
	__be32 *xp;

	repsize = skb->len - sizeof(rpc_fraghdr);
	if (repsize < 4) {
		dprintk("RPC:       impossible RPC reply size %d\n", repsize);
950
		return;
951 952 953 954 955
	}

	/* Copy the XID from the skb... */
	xp = skb_header_pointer(skb, sizeof(rpc_fraghdr), sizeof(_xid), &_xid);
	if (xp == NULL)
956
		return;
957 958

	/* Look up and lock the request corresponding to the given XID */
959
	spin_lock_bh(&xprt->transport_lock);
960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976
	rovr = xprt_lookup_rqst(xprt, *xp);
	if (!rovr)
		goto out_unlock;
	task = rovr->rq_task;

	copied = rovr->rq_private_buf.buflen;
	if (copied > repsize)
		copied = repsize;

	if (xs_local_copy_to_xdr(&rovr->rq_private_buf, skb)) {
		dprintk("RPC:       sk_buff copy failed\n");
		goto out_unlock;
	}

	xprt_complete_rqst(task, copied);

 out_unlock:
977 978 979 980 981 982 983 984 985 986 987 988 989 990 991
	spin_unlock_bh(&xprt->transport_lock);
}

static void xs_local_data_receive(struct sock_xprt *transport)
{
	struct sk_buff *skb;
	struct sock *sk;
	int err;

	mutex_lock(&transport->recv_mutex);
	sk = transport->inet;
	if (sk == NULL)
		goto out;
	for (;;) {
		skb = skb_recv_datagram(sk, 0, 1, &err);
992 993 994 995 996 997
		if (skb != NULL) {
			xs_local_data_read_skb(&transport->xprt, sk, skb);
			skb_free_datagram(sk, skb);
			continue;
		}
		if (!test_and_clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008
			break;
	}
out:
	mutex_unlock(&transport->recv_mutex);
}

static void xs_local_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_local_data_receive(transport);
1009 1010
}

1011
/**
1012 1013 1014 1015
 * xs_udp_data_read_skb - receive callback for UDP sockets
 * @xprt: transport
 * @sk: socket
 * @skb: skbuff
1016
 *
1017
 */
1018 1019 1020
static void xs_udp_data_read_skb(struct rpc_xprt *xprt,
		struct sock *sk,
		struct sk_buff *skb)
1021
{
1022
	struct rpc_task *task;
1023
	struct rpc_rqst *rovr;
1024
	int repsize, copied;
1025 1026
	u32 _xid;
	__be32 *xp;
1027

1028
	repsize = skb->len;
1029
	if (repsize < 4) {
1030
		dprintk("RPC:       impossible RPC reply size %d!\n", repsize);
1031
		return;
1032 1033 1034
	}

	/* Copy the XID from the skb... */
1035
	xp = skb_header_pointer(skb, 0, sizeof(_xid), &_xid);
1036
	if (xp == NULL)
1037
		return;
1038 1039

	/* Look up and lock the request corresponding to the given XID */
1040
	spin_lock_bh(&xprt->transport_lock);
1041 1042 1043 1044 1045 1046 1047 1048 1049
	rovr = xprt_lookup_rqst(xprt, *xp);
	if (!rovr)
		goto out_unlock;
	task = rovr->rq_task;

	if ((copied = rovr->rq_private_buf.buflen) > repsize)
		copied = repsize;

	/* Suck it into the iovec, verify checksum if not done by hw. */
1050
	if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
1051
		__UDPX_INC_STATS(sk, UDP_MIB_INERRORS);
1052
		goto out_unlock;
1053 1054
	}

1055
	__UDPX_INC_STATS(sk, UDP_MIB_INDATAGRAMS);
1056

1057
	xprt_adjust_cwnd(xprt, task, copied);
1058
	xprt_complete_rqst(task, copied);
1059 1060

 out_unlock:
1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075
	spin_unlock_bh(&xprt->transport_lock);
}

static void xs_udp_data_receive(struct sock_xprt *transport)
{
	struct sk_buff *skb;
	struct sock *sk;
	int err;

	mutex_lock(&transport->recv_mutex);
	sk = transport->inet;
	if (sk == NULL)
		goto out;
	for (;;) {
		skb = skb_recv_datagram(sk, 0, 1, &err);
1076 1077 1078 1079 1080 1081
		if (skb != NULL) {
			xs_udp_data_read_skb(&transport->xprt, sk, skb);
			skb_free_datagram(sk, skb);
			continue;
		}
		if (!test_and_clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109
			break;
	}
out:
	mutex_unlock(&transport->recv_mutex);
}

static void xs_udp_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_udp_data_receive(transport);
}

/**
 * xs_data_ready - "data ready" callback for UDP sockets
 * @sk: socket with data to read
 *
 */
static void xs_data_ready(struct sock *sk)
{
	struct rpc_xprt *xprt;

	read_lock_bh(&sk->sk_callback_lock);
	dprintk("RPC:       xs_data_ready...\n");
	xprt = xprt_from_sock(sk);
	if (xprt != NULL) {
		struct sock_xprt *transport = container_of(xprt,
				struct sock_xprt, xprt);
1110 1111 1112 1113 1114 1115
		transport->old_data_ready(sk);
		/* Any data means we had a useful conversation, so
		 * then we don't need to delay the next reconnect
		 */
		if (xprt->reestablish_timeout)
			xprt->reestablish_timeout = 0;
1116
		if (!test_and_set_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
1117
			queue_work(xprtiod_workqueue, &transport->recv_worker);
1118
	}
E
Eric Dumazet 已提交
1119
	read_unlock_bh(&sk->sk_callback_lock);
1120 1121
}

1122 1123 1124 1125 1126 1127 1128 1129 1130
/*
 * Helper function to force a TCP close if the server is sending
 * junk and/or it has put us in CLOSE_WAIT
 */
static void xs_tcp_force_close(struct rpc_xprt *xprt)
{
	xprt_force_disconnect(xprt);
}

1131
static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
1132
{
1133
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1134 1135 1136
	size_t len, used;
	char *p;

1137 1138
	p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
	len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
1139
	used = xdr_skb_read_bits(desc, p, len);
1140
	transport->tcp_offset += used;
1141 1142
	if (used != len)
		return;
1143

1144 1145
	transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
	if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
1146
		transport->tcp_flags |= TCP_RCV_LAST_FRAG;
1147
	else
1148
		transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
1149
	transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
1150

1151
	transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
1152
	transport->tcp_offset = 0;
1153

1154
	/* Sanity check of the record length */
1155
	if (unlikely(transport->tcp_reclen < 8)) {
1156
		dprintk("RPC:       invalid TCP record fragment length\n");
1157
		xs_tcp_force_close(xprt);
1158
		return;
1159
	}
1160
	dprintk("RPC:       reading TCP record fragment of length %d\n",
1161
			transport->tcp_reclen);
1162 1163
}

1164
static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
1165
{
1166
	if (transport->tcp_offset == transport->tcp_reclen) {
1167
		transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
1168
		transport->tcp_offset = 0;
1169 1170 1171
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
			transport->tcp_flags |= TCP_RCV_COPY_XID;
1172
			transport->tcp_copied = 0;
1173 1174 1175 1176
		}
	}
}

1177
static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1178 1179 1180 1181
{
	size_t len, used;
	char *p;

1182
	len = sizeof(transport->tcp_xid) - transport->tcp_offset;
1183
	dprintk("RPC:       reading XID (%Zu bytes)\n", len);
1184
	p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
1185
	used = xdr_skb_read_bits(desc, p, len);
1186
	transport->tcp_offset += used;
1187 1188
	if (used != len)
		return;
1189
	transport->tcp_flags &= ~TCP_RCV_COPY_XID;
1190
	transport->tcp_flags |= TCP_RCV_READ_CALLDIR;
1191
	transport->tcp_copied = 4;
1192 1193 1194
	dprintk("RPC:       reading %s XID %08x\n",
			(transport->tcp_flags & TCP_RPC_REPLY) ? "reply for"
							      : "request with",
1195 1196
			ntohl(transport->tcp_xid));
	xs_tcp_check_fraghdr(transport);
1197 1198
}

1199 1200
static inline void xs_tcp_read_calldir(struct sock_xprt *transport,
				       struct xdr_skb_reader *desc)
1201
{
1202 1203
	size_t len, used;
	u32 offset;
1204
	char *p;
1205 1206 1207 1208 1209 1210 1211 1212

	/*
	 * We want transport->tcp_offset to be 8 at the end of this routine
	 * (4 bytes for the xid and 4 bytes for the call/reply flag).
	 * When this function is called for the first time,
	 * transport->tcp_offset is 4 (after having already read the xid).
	 */
	offset = transport->tcp_offset - sizeof(transport->tcp_xid);
1213
	len = sizeof(transport->tcp_calldir) - offset;
1214
	dprintk("RPC:       reading CALL/REPLY flag (%Zu bytes)\n", len);
1215 1216
	p = ((char *) &transport->tcp_calldir) + offset;
	used = xdr_skb_read_bits(desc, p, len);
1217 1218 1219
	transport->tcp_offset += used;
	if (used != len)
		return;
1220 1221 1222 1223 1224
	transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR;
	/*
	 * We don't yet have the XDR buffer, so we will write the calldir
	 * out after we get the buffer from the 'struct rpc_rqst'
	 */
1225 1226 1227 1228
	switch (ntohl(transport->tcp_calldir)) {
	case RPC_REPLY:
		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
		transport->tcp_flags |= TCP_RCV_COPY_DATA;
1229
		transport->tcp_flags |= TCP_RPC_REPLY;
1230 1231 1232 1233
		break;
	case RPC_CALL:
		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
		transport->tcp_flags |= TCP_RCV_COPY_DATA;
1234
		transport->tcp_flags &= ~TCP_RPC_REPLY;
1235 1236 1237
		break;
	default:
		dprintk("RPC:       invalid request message type\n");
1238
		xs_tcp_force_close(&transport->xprt);
1239
	}
1240 1241 1242
	xs_tcp_check_fraghdr(transport);
}

R
Ricardo Labiaga 已提交
1243 1244 1245
static inline void xs_tcp_read_common(struct rpc_xprt *xprt,
				     struct xdr_skb_reader *desc,
				     struct rpc_rqst *req)
1246
{
R
Ricardo Labiaga 已提交
1247 1248
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
1249 1250 1251 1252 1253
	struct xdr_buf *rcvbuf;
	size_t len;
	ssize_t r;

	rcvbuf = &req->rq_private_buf;
1254 1255 1256 1257 1258 1259

	if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) {
		/*
		 * Save the RPC direction in the XDR buffer
		 */
		memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied,
1260 1261 1262
			&transport->tcp_calldir,
			sizeof(transport->tcp_calldir));
		transport->tcp_copied += sizeof(transport->tcp_calldir);
1263
		transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR;
1264 1265 1266
	}

	len = desc->count;
1267
	if (len > transport->tcp_reclen - transport->tcp_offset) {
1268
		struct xdr_skb_reader my_desc;
1269

1270
		len = transport->tcp_reclen - transport->tcp_offset;
1271 1272
		memcpy(&my_desc, desc, sizeof(my_desc));
		my_desc.count = len;
1273
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1274
					  &my_desc, xdr_skb_read_bits);
1275 1276 1277
		desc->count -= r;
		desc->offset += r;
	} else
1278
		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
1279
					  desc, xdr_skb_read_bits);
1280 1281

	if (r > 0) {
1282 1283
		transport->tcp_copied += r;
		transport->tcp_offset += r;
1284 1285 1286 1287 1288
	}
	if (r != len) {
		/* Error when copying to the receive buffer,
		 * usually because we weren't able to allocate
		 * additional buffer pages. All we can do now
1289
		 * is turn off TCP_RCV_COPY_DATA, so the request
1290 1291 1292 1293 1294
		 * will not receive any additional updates,
		 * and time out.
		 * Any remaining data from this record will
		 * be discarded.
		 */
1295
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1296
		dprintk("RPC:       XID %08x truncated request\n",
1297
				ntohl(transport->tcp_xid));
1298 1299 1300 1301
		dprintk("RPC:       xprt = %p, tcp_copied = %lu, "
				"tcp_offset = %u, tcp_reclen = %u\n",
				xprt, transport->tcp_copied,
				transport->tcp_offset, transport->tcp_reclen);
R
Ricardo Labiaga 已提交
1302
		return;
1303 1304
	}

1305
	dprintk("RPC:       XID %08x read %Zd bytes\n",
1306
			ntohl(transport->tcp_xid), r);
1307 1308 1309
	dprintk("RPC:       xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
			"tcp_reclen = %u\n", xprt, transport->tcp_copied,
			transport->tcp_offset, transport->tcp_reclen);
1310 1311

	if (transport->tcp_copied == req->rq_private_buf.buflen)
1312
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1313
	else if (transport->tcp_offset == transport->tcp_reclen) {
1314 1315
		if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1316
	}
R
Ricardo Labiaga 已提交
1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332
}

/*
 * Finds the request corresponding to the RPC xid and invokes the common
 * tcp read code to read the data.
 */
static inline int xs_tcp_read_reply(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

	dprintk("RPC:       read reply XID %08x\n", ntohl(transport->tcp_xid));

	/* Find and lock the request corresponding to this xid */
1333
	spin_lock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1334 1335 1336 1337
	req = xprt_lookup_rqst(xprt, transport->tcp_xid);
	if (!req) {
		dprintk("RPC:       XID %08x request not found!\n",
				ntohl(transport->tcp_xid));
1338
		spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1339 1340 1341 1342 1343
		return -1;
	}

	xs_tcp_read_common(xprt, desc, req);

1344
	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
1345
		xprt_complete_rqst(req->rq_task, transport->tcp_copied);
R
Ricardo Labiaga 已提交
1346

1347
	spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1348 1349 1350
	return 0;
}

1351
#if defined(CONFIG_SUNRPC_BACKCHANNEL)
R
Ricardo Labiaga 已提交
1352 1353 1354 1355 1356 1357 1358
/*
 * Obtains an rpc_rqst previously allocated and invokes the common
 * tcp read code to read the data.  The result is placed in the callback
 * queue.
 * If we're unable to obtain the rpc_rqst we schedule the closing of the
 * connection and return -1.
 */
1359
static int xs_tcp_read_callback(struct rpc_xprt *xprt,
R
Ricardo Labiaga 已提交
1360 1361 1362 1363 1364 1365
				       struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct rpc_rqst *req;

1366
	/* Look up and lock the request corresponding to the given XID */
1367
	spin_lock_bh(&xprt->transport_lock);
1368
	req = xprt_lookup_bc_request(xprt, transport->tcp_xid);
R
Ricardo Labiaga 已提交
1369
	if (req == NULL) {
1370
		spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1371 1372 1373 1374 1375 1376 1377 1378
		printk(KERN_WARNING "Callback slot table overflowed\n");
		xprt_force_disconnect(xprt);
		return -1;
	}

	dprintk("RPC:       read callback  XID %08x\n", ntohl(req->rq_xid));
	xs_tcp_read_common(xprt, desc, req);

1379 1380
	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
		xprt_complete_bc_request(req, transport->tcp_copied);
1381
	spin_unlock_bh(&xprt->transport_lock);
R
Ricardo Labiaga 已提交
1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395

	return 0;
}

static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	return (transport->tcp_flags & TCP_RPC_REPLY) ?
		xs_tcp_read_reply(xprt, desc) :
		xs_tcp_read_callback(xprt, desc);
}
1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406

static int xs_tcp_bc_up(struct svc_serv *serv, struct net *net)
{
	int ret;

	ret = svc_create_xprt(serv, "tcp-bc", net, PF_INET, 0,
			      SVC_SOCK_ANONYMOUS);
	if (ret < 0)
		return ret;
	return 0;
}
1407 1408 1409 1410 1411

static size_t xs_tcp_bc_maxpayload(struct rpc_xprt *xprt)
{
	return PAGE_SIZE;
}
R
Ricardo Labiaga 已提交
1412 1413 1414 1415 1416 1417
#else
static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
					struct xdr_skb_reader *desc)
{
	return xs_tcp_read_reply(xprt, desc);
}
1418
#endif /* CONFIG_SUNRPC_BACKCHANNEL */
R
Ricardo Labiaga 已提交
1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438

/*
 * Read data off the transport.  This can be either an RPC_CALL or an
 * RPC_REPLY.  Relay the processing to helper functions.
 */
static void xs_tcp_read_data(struct rpc_xprt *xprt,
				    struct xdr_skb_reader *desc)
{
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);

	if (_xs_tcp_read_data(xprt, desc) == 0)
		xs_tcp_check_fraghdr(transport);
	else {
		/*
		 * The transport_lock protects the request handling.
		 * There's no need to hold it to update the tcp_flags.
		 */
		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
	}
1439 1440
}

1441
static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1442 1443 1444
{
	size_t len;

1445
	len = transport->tcp_reclen - transport->tcp_offset;
1446 1447 1448 1449
	if (len > desc->count)
		len = desc->count;
	desc->count -= len;
	desc->offset += len;
1450
	transport->tcp_offset += len;
1451
	dprintk("RPC:       discarded %Zu bytes\n", len);
1452
	xs_tcp_check_fraghdr(transport);
1453 1454
}

1455
static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
1456 1457
{
	struct rpc_xprt *xprt = rd_desc->arg.data;
1458
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1459
	struct xdr_skb_reader desc = {
1460 1461 1462
		.skb	= skb,
		.offset	= offset,
		.count	= len,
1463
	};
1464

1465
	dprintk("RPC:       xs_tcp_data_recv started\n");
1466
	do {
1467
		trace_xs_tcp_data_recv(transport);
1468 1469
		/* Read in a new fragment marker if necessary */
		/* Can we ever really expect to get completely empty fragments? */
1470
		if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
1471
			xs_tcp_read_fraghdr(xprt, &desc);
1472 1473 1474
			continue;
		}
		/* Read in the xid if necessary */
1475
		if (transport->tcp_flags & TCP_RCV_COPY_XID) {
1476
			xs_tcp_read_xid(transport, &desc);
1477 1478
			continue;
		}
1479
		/* Read in the call/reply flag */
1480
		if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) {
1481 1482 1483
			xs_tcp_read_calldir(transport, &desc);
			continue;
		}
1484
		/* Read in the request data */
1485
		if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
R
Ricardo Labiaga 已提交
1486
			xs_tcp_read_data(xprt, &desc);
1487 1488 1489
			continue;
		}
		/* Skip over any trailing bytes on short reads */
1490
		xs_tcp_read_discard(transport, &desc);
1491
	} while (desc.count);
1492
	trace_xs_tcp_data_recv(transport);
1493
	dprintk("RPC:       xs_tcp_data_recv done\n");
1494 1495 1496
	return len - desc.count;
}

T
Trond Myklebust 已提交
1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507
static void xs_tcp_data_receive(struct sock_xprt *transport)
{
	struct rpc_xprt *xprt = &transport->xprt;
	struct sock *sk;
	read_descriptor_t rd_desc = {
		.count = 2*1024*1024,
		.arg.data = xprt,
	};
	unsigned long total = 0;
	int read = 0;

1508
	mutex_lock(&transport->recv_mutex);
T
Trond Myklebust 已提交
1509
	sk = transport->inet;
1510 1511
	if (sk == NULL)
		goto out;
T
Trond Myklebust 已提交
1512 1513 1514

	/* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
	for (;;) {
1515
		lock_sock(sk);
T
Trond Myklebust 已提交
1516
		read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
1517 1518 1519 1520 1521 1522 1523 1524 1525
		if (read <= 0) {
			clear_bit(XPRT_SOCK_DATA_READY, &transport->sock_state);
			release_sock(sk);
			if (!test_bit(XPRT_SOCK_DATA_READY, &transport->sock_state))
				break;
		} else {
			release_sock(sk);
			total += read;
		}
T
Trond Myklebust 已提交
1526 1527
		rd_desc.count = 65536;
	}
1528 1529
out:
	mutex_unlock(&transport->recv_mutex);
T
Trond Myklebust 已提交
1530 1531 1532
	trace_xs_tcp_data_ready(xprt, read, total);
}

1533 1534 1535 1536 1537 1538 1539
static void xs_tcp_data_receive_workfn(struct work_struct *work)
{
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, recv_worker);
	xs_tcp_data_receive(transport);
}

1540 1541 1542 1543 1544 1545
/**
 * xs_tcp_state_change - callback to handle TCP socket state changes
 * @sk: socket whose state has changed
 *
 */
static void xs_tcp_state_change(struct sock *sk)
1546
{
1547
	struct rpc_xprt *xprt;
1548
	struct sock_xprt *transport;
1549

E
Eric Dumazet 已提交
1550
	read_lock_bh(&sk->sk_callback_lock);
1551 1552
	if (!(xprt = xprt_from_sock(sk)))
		goto out;
1553
	dprintk("RPC:       xs_tcp_state_change client %p...\n", xprt);
1554
	dprintk("RPC:       state %x conn %d dead %d zapped %d sk_shutdown %d\n",
1555 1556
			sk->sk_state, xprt_connected(xprt),
			sock_flag(sk, SOCK_DEAD),
1557 1558
			sock_flag(sk, SOCK_ZAPPED),
			sk->sk_shutdown);
1559

1560
	transport = container_of(xprt, struct sock_xprt, xprt);
1561
	trace_rpc_socket_state_change(xprt, sk->sk_socket);
1562 1563
	switch (sk->sk_state) {
	case TCP_ESTABLISHED:
E
Eric Dumazet 已提交
1564
		spin_lock(&xprt->transport_lock);
1565
		if (!xprt_test_and_set_connected(xprt)) {
1566

1567
			/* Reset TCP record info */
1568 1569 1570
			transport->tcp_offset = 0;
			transport->tcp_reclen = 0;
			transport->tcp_copied = 0;
1571 1572
			transport->tcp_flags =
				TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
1573
			xprt->connect_cookie++;
1574 1575
			clear_bit(XPRT_SOCK_CONNECTING, &transport->sock_state);
			xprt_clear_connecting(xprt);
1576

1577
			xprt_wake_pending_tasks(xprt, -EAGAIN);
1578
		}
E
Eric Dumazet 已提交
1579
		spin_unlock(&xprt->transport_lock);
1580
		break;
1581 1582
	case TCP_FIN_WAIT1:
		/* The client initiated a shutdown of the socket */
1583
		xprt->connect_cookie++;
1584
		xprt->reestablish_timeout = 0;
1585
		set_bit(XPRT_CLOSING, &xprt->state);
1586
		smp_mb__before_atomic();
1587
		clear_bit(XPRT_CONNECTED, &xprt->state);
1588
		clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
1589
		smp_mb__after_atomic();
1590
		break;
1591
	case TCP_CLOSE_WAIT:
1592
		/* The server initiated a shutdown of the socket */
1593
		xprt->connect_cookie++;
1594
		clear_bit(XPRT_CONNECTED, &xprt->state);
1595
		xs_tcp_force_close(xprt);
1596 1597 1598 1599 1600 1601 1602
	case TCP_CLOSING:
		/*
		 * If the server closed down the connection, make sure that
		 * we back off before reconnecting
		 */
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
1603 1604
		break;
	case TCP_LAST_ACK:
1605
		set_bit(XPRT_CLOSING, &xprt->state);
1606
		smp_mb__before_atomic();
1607
		clear_bit(XPRT_CONNECTED, &xprt->state);
1608
		smp_mb__after_atomic();
1609 1610
		break;
	case TCP_CLOSE:
1611 1612 1613
		if (test_and_clear_bit(XPRT_SOCK_CONNECTING,
					&transport->sock_state))
			xprt_clear_connecting(xprt);
1614
		xs_sock_mark_closed(xprt);
1615 1616
	}
 out:
E
Eric Dumazet 已提交
1617
	read_unlock_bh(&sk->sk_callback_lock);
1618 1619
}

1620 1621
static void xs_write_space(struct sock *sk)
{
1622
	struct socket_wq *wq;
1623 1624
	struct rpc_xprt *xprt;

1625
	if (!sk->sk_socket)
1626
		return;
1627
	clear_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
1628 1629 1630

	if (unlikely(!(xprt = xprt_from_sock(sk))))
		return;
1631 1632 1633 1634
	rcu_read_lock();
	wq = rcu_dereference(sk->sk_wq);
	if (!wq || test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &wq->flags) == 0)
		goto out;
1635 1636

	xprt_write_space(xprt);
1637 1638
out:
	rcu_read_unlock();
1639 1640
}

1641
/**
1642 1643
 * xs_udp_write_space - callback invoked when socket buffer space
 *                             becomes available
1644 1645
 * @sk: socket whose state has changed
 *
1646 1647
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
1648
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1649 1650
 * with a bunch of small requests.
 */
1651
static void xs_udp_write_space(struct sock *sk)
1652
{
E
Eric Dumazet 已提交
1653
	read_lock_bh(&sk->sk_callback_lock);
1654

1655
	/* from net/core/sock.c:sock_def_write_space */
1656 1657
	if (sock_writeable(sk))
		xs_write_space(sk);
1658

E
Eric Dumazet 已提交
1659
	read_unlock_bh(&sk->sk_callback_lock);
1660
}
1661

1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673
/**
 * xs_tcp_write_space - callback invoked when socket buffer space
 *                             becomes available
 * @sk: socket whose state has changed
 *
 * Called when more output buffer space is available for this socket.
 * We try not to wake our writers until they can make "significant"
 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
 * with a bunch of small requests.
 */
static void xs_tcp_write_space(struct sock *sk)
{
E
Eric Dumazet 已提交
1674
	read_lock_bh(&sk->sk_callback_lock);
1675 1676

	/* from net/core/stream.c:sk_stream_write_space */
1677
	if (sk_stream_is_writeable(sk))
1678
		xs_write_space(sk);
1679

E
Eric Dumazet 已提交
1680
	read_unlock_bh(&sk->sk_callback_lock);
1681 1682
}

1683
static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
1684
{
1685 1686
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct sock *sk = transport->inet;
1687

1688
	if (transport->rcvsize) {
1689
		sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
1690
		sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
1691
	}
1692
	if (transport->sndsize) {
1693
		sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
1694
		sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
1695 1696 1697 1698
		sk->sk_write_space(sk);
	}
}

1699
/**
1700
 * xs_udp_set_buffer_size - set send and receive limits
1701
 * @xprt: generic transport
1702 1703
 * @sndsize: requested size of send buffer, in bytes
 * @rcvsize: requested size of receive buffer, in bytes
1704
 *
1705
 * Set socket send and receive buffer size limits.
1706
 */
1707
static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
1708
{
1709 1710 1711
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	transport->sndsize = 0;
1712
	if (sndsize)
1713 1714
		transport->sndsize = sndsize + 1024;
	transport->rcvsize = 0;
1715
	if (rcvsize)
1716
		transport->rcvsize = rcvsize + 1024;
1717 1718

	xs_udp_do_set_buffer_size(xprt);
1719 1720
}

1721 1722 1723 1724 1725 1726
/**
 * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
 * @task: task that timed out
 *
 * Adjust the congestion window after a retransmit timeout has occurred.
 */
1727
static void xs_udp_timer(struct rpc_xprt *xprt, struct rpc_task *task)
1728
{
1729
	xprt_adjust_cwnd(xprt, task, -ETIMEDOUT);
1730 1731
}

1732 1733
static unsigned short xs_get_random_port(void)
{
1734
	unsigned short range = xprt_max_resvport - xprt_min_resvport + 1;
1735
	unsigned short rand = (unsigned short) prandom_u32() % range;
1736 1737 1738
	return rand + xprt_min_resvport;
}

1739 1740 1741 1742 1743 1744 1745 1746 1747
/**
 * xs_set_reuseaddr_port - set the socket's port and address reuse options
 * @sock: socket
 *
 * Note that this function has to be called on all sockets that share the
 * same port, and it must be called before binding.
 */
static void xs_sock_set_reuseport(struct socket *sock)
{
1748
	int opt = 1;
1749

1750 1751
	kernel_setsockopt(sock, SOL_SOCKET, SO_REUSEPORT,
			(char *)&opt, sizeof(opt));
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772
}

static unsigned short xs_sock_getport(struct socket *sock)
{
	struct sockaddr_storage buf;
	int buflen;
	unsigned short port = 0;

	if (kernel_getsockname(sock, (struct sockaddr *)&buf, &buflen) < 0)
		goto out;
	switch (buf.ss_family) {
	case AF_INET6:
		port = ntohs(((struct sockaddr_in6 *)&buf)->sin6_port);
		break;
	case AF_INET:
		port = ntohs(((struct sockaddr_in *)&buf)->sin_port);
	}
out:
	return port;
}

1773 1774 1775 1776 1777 1778 1779 1780
/**
 * xs_set_port - reset the port number in the remote endpoint address
 * @xprt: generic transport
 * @port: new port number
 *
 */
static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
{
1781
	dprintk("RPC:       setting port for xprt %p to %u\n", xprt, port);
1782

1783 1784
	rpc_set_port(xs_addr(xprt), port);
	xs_update_peer_port(xprt);
1785 1786
}

1787 1788 1789 1790 1791 1792
static void xs_set_srcport(struct sock_xprt *transport, struct socket *sock)
{
	if (transport->srcport == 0)
		transport->srcport = xs_sock_getport(sock);
}

1793
static unsigned short xs_get_srcport(struct sock_xprt *transport)
1794
{
1795
	unsigned short port = transport->srcport;
1796 1797 1798 1799 1800 1801

	if (port == 0 && transport->xprt.resvport)
		port = xs_get_random_port();
	return port;
}

1802
static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port)
1803
{
1804 1805
	if (transport->srcport != 0)
		transport->srcport = 0;
1806 1807 1808 1809 1810 1811
	if (!transport->xprt.resvport)
		return 0;
	if (port <= xprt_min_resvport || port > xprt_max_resvport)
		return xprt_max_resvport;
	return --port;
}
P
Pavel Emelyanov 已提交
1812
static int xs_bind(struct sock_xprt *transport, struct socket *sock)
1813
{
P
Pavel Emelyanov 已提交
1814
	struct sockaddr_storage myaddr;
1815
	int err, nloop = 0;
1816
	unsigned short port = xs_get_srcport(transport);
1817
	unsigned short last;
1818

1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836
	/*
	 * If we are asking for any ephemeral port (i.e. port == 0 &&
	 * transport->xprt.resvport == 0), don't bind.  Let the local
	 * port selection happen implicitly when the socket is used
	 * (for example at connect time).
	 *
	 * This ensures that we can continue to establish TCP
	 * connections even when all local ephemeral ports are already
	 * a part of some TCP connection.  This makes no difference
	 * for UDP sockets, but also doens't harm them.
	 *
	 * If we're asking for any reserved port (i.e. port == 0 &&
	 * transport->xprt.resvport == 1) xs_get_srcport above will
	 * ensure that port is non-zero and we will bind as needed.
	 */
	if (port == 0)
		return 0;

P
Pavel Emelyanov 已提交
1837
	memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen);
1838
	do {
P
Pavel Emelyanov 已提交
1839 1840 1841
		rpc_set_port((struct sockaddr *)&myaddr, port);
		err = kernel_bind(sock, (struct sockaddr *)&myaddr,
				transport->xprt.addrlen);
1842
		if (err == 0) {
1843
			transport->srcport = port;
1844
			break;
1845
		}
1846
		last = port;
1847
		port = xs_next_srcport(transport, port);
1848 1849 1850
		if (port > last)
			nloop++;
	} while (err == -EADDRINUSE && nloop != 2);
1851

1852
	if (myaddr.ss_family == AF_INET)
P
Pavel Emelyanov 已提交
1853 1854 1855 1856 1857 1858 1859
		dprintk("RPC:       %s %pI4:%u: %s (%d)\n", __func__,
				&((struct sockaddr_in *)&myaddr)->sin_addr,
				port, err ? "failed" : "ok", err);
	else
		dprintk("RPC:       %s %pI6:%u: %s (%d)\n", __func__,
				&((struct sockaddr_in6 *)&myaddr)->sin6_addr,
				port, err ? "failed" : "ok", err);
1860 1861 1862
	return err;
}

1863 1864 1865 1866 1867
/*
 * We don't support autobind on AF_LOCAL sockets
 */
static void xs_local_rpcbind(struct rpc_task *task)
{
1868
	xprt_set_bound(task->tk_xprt);
1869 1870 1871 1872 1873
}

static void xs_local_set_port(struct rpc_xprt *xprt, unsigned short port)
{
}
P
Pavel Emelyanov 已提交
1874

1875 1876 1877 1878
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key xs_key[2];
static struct lock_class_key xs_slock_key[2];

1879 1880 1881 1882 1883 1884 1885 1886
static inline void xs_reclassify_socketu(struct socket *sock)
{
	struct sock *sk = sock->sk;

	sock_lock_init_class_and_name(sk, "slock-AF_LOCAL-RPC",
		&xs_slock_key[1], "sk_lock-AF_LOCAL-RPC", &xs_key[1]);
}

1887
static inline void xs_reclassify_socket4(struct socket *sock)
1888 1889
{
	struct sock *sk = sock->sk;
1890 1891 1892 1893

	sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
		&xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
}
1894

1895 1896 1897
static inline void xs_reclassify_socket6(struct socket *sock)
{
	struct sock *sk = sock->sk;
1898

1899 1900
	sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
		&xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
1901
}
1902 1903 1904

static inline void xs_reclassify_socket(int family, struct socket *sock)
{
1905
	if (WARN_ON_ONCE(!sock_allow_reclassification(sock->sk)))
1906 1907
		return;

1908
	switch (family) {
1909 1910 1911
	case AF_LOCAL:
		xs_reclassify_socketu(sock);
		break;
1912
	case AF_INET:
1913
		xs_reclassify_socket4(sock);
1914 1915
		break;
	case AF_INET6:
1916
		xs_reclassify_socket6(sock);
1917 1918
		break;
	}
1919
}
1920
#else
1921 1922 1923
static inline void xs_reclassify_socket(int family, struct socket *sock)
{
}
1924 1925
#endif

1926 1927 1928 1929
static void xs_dummy_setup_socket(struct work_struct *work)
{
}

1930
static struct socket *xs_create_sock(struct rpc_xprt *xprt,
1931 1932
		struct sock_xprt *transport, int family, int type,
		int protocol, bool reuseport)
1933 1934 1935 1936
{
	struct socket *sock;
	int err;

1937
	err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1);
1938 1939 1940 1941 1942
	if (err < 0) {
		dprintk("RPC:       can't create %d transport socket (%d).\n",
				protocol, -err);
		goto out;
	}
1943
	xs_reclassify_socket(family, sock);
1944

1945 1946 1947
	if (reuseport)
		xs_sock_set_reuseport(sock);

1948 1949
	err = xs_bind(transport, sock);
	if (err) {
1950 1951 1952 1953 1954 1955 1956 1957 1958
		sock_release(sock);
		goto out;
	}

	return sock;
out:
	return ERR_PTR(err);
}

1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972
static int xs_local_finish_connecting(struct rpc_xprt *xprt,
				      struct socket *sock)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt,
									xprt);

	if (!transport->inet) {
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

		xs_save_old_callbacks(transport, sk);

		sk->sk_user_data = xprt;
1973
		sk->sk_data_ready = xs_data_ready;
1974
		sk->sk_write_space = xs_udp_write_space;
E
Eric Dumazet 已提交
1975
		sock_set_flag(sk, SOCK_FASYNC);
1976
		sk->sk_error_report = xs_error_report;
1977
		sk->sk_allocation = GFP_NOIO;
1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997

		xprt_clear_connected(xprt);

		/* Reset to new socket */
		transport->sock = sock;
		transport->inet = sk;

		write_unlock_bh(&sk->sk_callback_lock);
	}

	/* Tell the socket layer to start connecting... */
	xprt->stat.connect_count++;
	xprt->stat.connect_start = jiffies;
	return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, 0);
}

/**
 * xs_local_setup_socket - create AF_LOCAL socket, connect to a local endpoint
 * @transport: socket transport to connect
 */
1998
static int xs_local_setup_socket(struct sock_xprt *transport)
1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
{
	struct rpc_xprt *xprt = &transport->xprt;
	struct socket *sock;
	int status = -EIO;

	status = __sock_create(xprt->xprt_net, AF_LOCAL,
					SOCK_STREAM, 0, &sock, 1);
	if (status < 0) {
		dprintk("RPC:       can't create AF_LOCAL "
			"transport socket (%d).\n", -status);
		goto out;
	}
2011
	xs_reclassify_socket(AF_LOCAL, sock);
2012 2013 2014 2015 2016

	dprintk("RPC:       worker connecting xprt %p via AF_LOCAL to %s\n",
			xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);

	status = xs_local_finish_connecting(xprt, sock);
2017
	trace_rpc_socket_connect(xprt, sock, status);
2018 2019 2020 2021 2022
	switch (status) {
	case 0:
		dprintk("RPC:       xprt %p connected to %s\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		xprt_set_connected(xprt);
2023
	case -ENOBUFS:
2024 2025 2026 2027 2028
		break;
	case -ENOENT:
		dprintk("RPC:       xprt %p: socket %s does not exist\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		break;
2029 2030 2031 2032
	case -ECONNREFUSED:
		dprintk("RPC:       xprt %p: connection refused for %s\n",
				xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
		break;
2033 2034 2035 2036 2037 2038 2039 2040 2041
	default:
		printk(KERN_ERR "%s: unhandled error (%d) connecting to %s\n",
				__func__, -status,
				xprt->address_strings[RPC_DISPLAY_ADDR]);
	}

out:
	xprt_clear_connecting(xprt);
	xprt_wake_pending_tasks(xprt, status);
2042 2043 2044
	return status;
}

2045
static void xs_local_connect(struct rpc_xprt *xprt, struct rpc_task *task)
2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	int ret;

	 if (RPC_IS_ASYNC(task)) {
		/*
		 * We want the AF_LOCAL connect to be resolved in the
		 * filesystem namespace of the process making the rpc
		 * call.  Thus we connect synchronously.
		 *
		 * If we want to support asynchronous AF_LOCAL calls,
		 * we'll need to figure out how to pass a namespace to
		 * connect.
		 */
		rpc_exit(task, -ENOTCONN);
		return;
	}
	ret = xs_local_setup_socket(transport);
	if (ret && !RPC_IS_SOFTCONN(task))
		msleep_interruptible(15000);
2066 2067
}

2068
#if IS_ENABLED(CONFIG_SUNRPC_SWAP)
2069 2070 2071 2072 2073
/*
 * Note that this should be called with XPRT_LOCKED held (or when we otherwise
 * know that we have exclusive access to the socket), to guard against
 * races with xs_reset_transport.
 */
M
Mel Gorman 已提交
2074 2075 2076 2077 2078
static void xs_set_memalloc(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt,
			xprt);

2079 2080 2081 2082 2083 2084
	/*
	 * If there's no sock, then we have nothing to set. The
	 * reconnecting process will get it for us.
	 */
	if (!transport->inet)
		return;
2085
	if (atomic_read(&xprt->swapper))
M
Mel Gorman 已提交
2086 2087 2088 2089
		sk_set_memalloc(transport->inet);
}

/**
2090
 * xs_enable_swap - Tag this transport as being used for swap.
M
Mel Gorman 已提交
2091 2092
 * @xprt: transport to tag
 *
2093 2094
 * Take a reference to this transport on behalf of the rpc_clnt, and
 * optionally mark it for swapping if it wasn't already.
M
Mel Gorman 已提交
2095
 */
2096 2097
static int
xs_enable_swap(struct rpc_xprt *xprt)
M
Mel Gorman 已提交
2098
{
2099
	struct sock_xprt *xs = container_of(xprt, struct sock_xprt, xprt);
M
Mel Gorman 已提交
2100

2101 2102 2103 2104 2105 2106 2107
	if (atomic_inc_return(&xprt->swapper) != 1)
		return 0;
	if (wait_on_bit_lock(&xprt->state, XPRT_LOCKED, TASK_KILLABLE))
		return -ERESTARTSYS;
	if (xs->inet)
		sk_set_memalloc(xs->inet);
	xprt_release_xprt(xprt, NULL);
2108 2109
	return 0;
}
M
Mel Gorman 已提交
2110

2111
/**
2112
 * xs_disable_swap - Untag this transport as being used for swap.
2113 2114 2115 2116 2117
 * @xprt: transport to tag
 *
 * Drop a "swapper" reference to this xprt on behalf of the rpc_clnt. If the
 * swapper refcount goes to 0, untag the socket as a memalloc socket.
 */
2118 2119
static void
xs_disable_swap(struct rpc_xprt *xprt)
2120
{
2121
	struct sock_xprt *xs = container_of(xprt, struct sock_xprt, xprt);
2122

2123 2124 2125 2126 2127 2128 2129
	if (!atomic_dec_and_test(&xprt->swapper))
		return;
	if (wait_on_bit_lock(&xprt->state, XPRT_LOCKED, TASK_KILLABLE))
		return;
	if (xs->inet)
		sk_clear_memalloc(xs->inet);
	xprt_release_xprt(xprt, NULL);
M
Mel Gorman 已提交
2130 2131 2132 2133 2134
}
#else
static void xs_set_memalloc(struct rpc_xprt *xprt)
{
}
2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145

static int
xs_enable_swap(struct rpc_xprt *xprt)
{
	return -EINVAL;
}

static void
xs_disable_swap(struct rpc_xprt *xprt)
{
}
M
Mel Gorman 已提交
2146 2147
#endif

2148 2149 2150 2151 2152 2153 2154 2155 2156
static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

	if (!transport->inet) {
		struct sock *sk = sock->sk;

		write_lock_bh(&sk->sk_callback_lock);

2157 2158
		xs_save_old_callbacks(transport, sk);

2159
		sk->sk_user_data = xprt;
2160
		sk->sk_data_ready = xs_data_ready;
2161
		sk->sk_write_space = xs_udp_write_space;
E
Eric Dumazet 已提交
2162
		sock_set_flag(sk, SOCK_FASYNC);
2163
		sk->sk_allocation = GFP_NOIO;
2164 2165 2166 2167 2168 2169 2170

		xprt_set_connected(xprt);

		/* Reset to new socket */
		transport->sock = sock;
		transport->inet = sk;

M
Mel Gorman 已提交
2171 2172
		xs_set_memalloc(xprt);

2173 2174 2175 2176 2177
		write_unlock_bh(&sk->sk_callback_lock);
	}
	xs_udp_do_set_buffer_size(xprt);
}

2178
static void xs_udp_setup_socket(struct work_struct *work)
2179
{
2180 2181
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
2182
	struct rpc_xprt *xprt = &transport->xprt;
2183
	struct socket *sock = transport->sock;
2184
	int status = -EIO;
2185

2186
	sock = xs_create_sock(xprt, transport,
2187 2188
			xs_addr(xprt)->sa_family, SOCK_DGRAM,
			IPPROTO_UDP, false);
2189
	if (IS_ERR(sock))
2190
		goto out;
2191

C
Chuck Lever 已提交
2192 2193 2194 2195 2196
	dprintk("RPC:       worker connecting xprt %p via %s to "
				"%s (port %s)\n", xprt,
			xprt->address_strings[RPC_DISPLAY_PROTO],
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT]);
2197 2198

	xs_udp_finish_connecting(xprt, sock);
2199
	trace_rpc_socket_connect(xprt, sock, 0);
2200 2201
	status = 0;
out:
2202
	xprt_unlock_connect(xprt, transport);
2203
	xprt_clear_connecting(xprt);
2204
	xprt_wake_pending_tasks(xprt, status);
2205 2206
}

2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227
/**
 * xs_tcp_shutdown - gracefully shut down a TCP socket
 * @xprt: transport
 *
 * Initiates a graceful shutdown of the TCP socket by calling the
 * equivalent of shutdown(SHUT_RDWR);
 */
static void xs_tcp_shutdown(struct rpc_xprt *xprt)
{
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
	struct socket *sock = transport->sock;

	if (sock == NULL)
		return;
	if (xprt_connected(xprt)) {
		kernel_sock_shutdown(sock, SHUT_RDWR);
		trace_rpc_socket_shutdown(xprt, sock);
	} else
		xs_reset_transport(transport);
}

2228
static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
2229
{
2230
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2231
	int ret = -ENOTCONN;
2232

2233
	if (!transport->inet) {
2234
		struct sock *sk = sock->sk;
2235 2236 2237
		unsigned int keepidle = xprt->timeout->to_initval / HZ;
		unsigned int keepcnt = xprt->timeout->to_retries + 1;
		unsigned int opt_on = 1;
2238
		unsigned int timeo;
2239 2240 2241 2242 2243 2244 2245 2246 2247 2248

		/* TCP Keepalive options */
		kernel_setsockopt(sock, SOL_SOCKET, SO_KEEPALIVE,
				(char *)&opt_on, sizeof(opt_on));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPIDLE,
				(char *)&keepidle, sizeof(keepidle));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPINTVL,
				(char *)&keepidle, sizeof(keepidle));
		kernel_setsockopt(sock, SOL_TCP, TCP_KEEPCNT,
				(char *)&keepcnt, sizeof(keepcnt));
2249

2250 2251 2252 2253 2254 2255
		/* TCP user timeout (see RFC5482) */
		timeo = jiffies_to_msecs(xprt->timeout->to_initval) *
			(xprt->timeout->to_retries + 1);
		kernel_setsockopt(sock, SOL_TCP, TCP_USER_TIMEOUT,
				(char *)&timeo, sizeof(timeo));

2256 2257
		write_lock_bh(&sk->sk_callback_lock);

2258 2259
		xs_save_old_callbacks(transport, sk);

2260
		sk->sk_user_data = xprt;
2261
		sk->sk_data_ready = xs_data_ready;
2262 2263
		sk->sk_state_change = xs_tcp_state_change;
		sk->sk_write_space = xs_tcp_write_space;
E
Eric Dumazet 已提交
2264
		sock_set_flag(sk, SOCK_FASYNC);
2265
		sk->sk_error_report = xs_error_report;
2266
		sk->sk_allocation = GFP_NOIO;
2267 2268 2269 2270

		/* socket options */
		sock_reset_flag(sk, SOCK_LINGER);
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
2271 2272 2273 2274

		xprt_clear_connected(xprt);

		/* Reset to new socket */
2275 2276
		transport->sock = sock;
		transport->inet = sk;
2277 2278 2279 2280

		write_unlock_bh(&sk->sk_callback_lock);
	}

2281
	if (!xprt_bound(xprt))
2282
		goto out;
2283

M
Mel Gorman 已提交
2284 2285
	xs_set_memalloc(xprt);

2286
	/* Tell the socket layer to start connecting... */
2287 2288
	xprt->stat.connect_count++;
	xprt->stat.connect_start = jiffies;
2289
	set_bit(XPRT_SOCK_CONNECTING, &transport->sock_state);
2290 2291 2292
	ret = kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
	switch (ret) {
	case 0:
2293
		xs_set_srcport(transport, sock);
2294 2295 2296 2297 2298 2299 2300
	case -EINPROGRESS:
		/* SYN_SENT! */
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	}
out:
	return ret;
2301 2302
}

2303
/**
2304
 * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint
2305 2306
 *
 * Invoked by a work queue tasklet.
2307
 */
2308
static void xs_tcp_setup_socket(struct work_struct *work)
2309
{
2310 2311
	struct sock_xprt *transport =
		container_of(work, struct sock_xprt, connect_worker.work);
2312
	struct socket *sock = transport->sock;
2313
	struct rpc_xprt *xprt = &transport->xprt;
2314
	int status = -EIO;
2315

2316
	if (!sock) {
2317
		sock = xs_create_sock(xprt, transport,
2318 2319
				xs_addr(xprt)->sa_family, SOCK_STREAM,
				IPPROTO_TCP, true);
2320 2321
		if (IS_ERR(sock)) {
			status = PTR_ERR(sock);
2322 2323
			goto out;
		}
2324
	}
2325

C
Chuck Lever 已提交
2326 2327 2328 2329 2330
	dprintk("RPC:       worker connecting xprt %p via %s to "
				"%s (port %s)\n", xprt,
			xprt->address_strings[RPC_DISPLAY_PROTO],
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT]);
2331

2332
	status = xs_tcp_finish_connecting(xprt, sock);
2333
	trace_rpc_socket_connect(xprt, sock, status);
2334 2335 2336
	dprintk("RPC:       %p connect status %d connected %d sock state %d\n",
			xprt, -status, xprt_connected(xprt),
			sock->sk->sk_state);
2337
	switch (status) {
2338 2339 2340 2341 2342 2343 2344
	default:
		printk("%s: connect returned unhandled error %d\n",
			__func__, status);
	case -EADDRNOTAVAIL:
		/* We're probably in TIME_WAIT. Get rid of existing socket,
		 * and retry
		 */
2345
		xs_tcp_force_close(xprt);
2346
		break;
2347 2348 2349
	case 0:
	case -EINPROGRESS:
	case -EALREADY:
2350
		xprt_unlock_connect(xprt, transport);
2351
		return;
2352 2353 2354 2355
	case -EINVAL:
		/* Happens, for instance, if the user specified a link
		 * local IPv6 address without a scope-id.
		 */
2356 2357 2358
	case -ECONNREFUSED:
	case -ECONNRESET:
	case -ENETUNREACH:
2359
	case -EADDRINUSE:
2360
	case -ENOBUFS:
2361
		/* retry with existing socket, after a delay */
2362
		xs_tcp_force_close(xprt);
2363
		goto out;
2364
	}
2365
	status = -EAGAIN;
2366
out:
2367
	xprt_unlock_connect(xprt, transport);
2368
	xprt_clear_connecting(xprt);
2369
	xprt_wake_pending_tasks(xprt, status);
2370
}
2371

2372 2373
/**
 * xs_connect - connect a socket to a remote endpoint
2374
 * @xprt: pointer to transport structure
2375 2376 2377
 * @task: address of RPC task that manages state of connect request
 *
 * TCP: If the remote end dropped the connection, delay reconnecting.
2378 2379 2380 2381 2382 2383 2384
 *
 * UDP socket connects are synchronous, but we use a work queue anyway
 * to guarantee that even unprivileged user processes can set up a
 * socket on a privileged port.
 *
 * If a UDP socket connect fails, the delay behavior here prevents
 * retry floods (hard mounts).
2385
 */
2386
static void xs_connect(struct rpc_xprt *xprt, struct rpc_task *task)
2387
{
2388
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2389

2390 2391
	WARN_ON_ONCE(!xprt_lock_connect(xprt, task, transport));

2392
	if (transport->sock != NULL) {
2393 2394
		dprintk("RPC:       xs_connect delayed xprt %p for %lu "
				"seconds\n",
2395
				xprt, xprt->reestablish_timeout / HZ);
2396 2397 2398 2399

		/* Start by resetting any existing state */
		xs_reset_transport(transport);

2400
		queue_delayed_work(xprtiod_workqueue,
2401 2402
				   &transport->connect_worker,
				   xprt->reestablish_timeout);
2403
		xprt->reestablish_timeout <<= 1;
2404 2405
		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2406 2407
		if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
			xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
2408
	} else {
2409
		dprintk("RPC:       xs_connect scheduled xprt %p\n", xprt);
2410
		queue_delayed_work(xprtiod_workqueue,
2411
				   &transport->connect_worker, 0);
2412 2413 2414
	}
}

2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428
/**
 * xs_local_print_stats - display AF_LOCAL socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_local_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
	long idle_time = 0;

	if (xprt_connected(xprt))
		idle_time = (long)(jiffies - xprt->last_used) / HZ;

	seq_printf(seq, "\txprt:\tlocal %lu %lu %lu %ld %lu %lu %lu "
2429
			"%llu %llu %lu %llu %llu\n",
2430 2431 2432 2433 2434 2435 2436 2437
			xprt->stat.bind_count,
			xprt->stat.connect_count,
			xprt->stat.connect_time,
			idle_time,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2438 2439 2440 2441
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2442 2443
}

2444 2445 2446 2447 2448 2449 2450 2451
/**
 * xs_udp_print_stats - display UDP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2452 2453
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);

2454 2455
	seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %llu %llu "
			"%lu %llu %llu\n",
2456
			transport->srcport,
2457 2458 2459 2460 2461
			xprt->stat.bind_count,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2462 2463 2464 2465
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2466 2467 2468 2469 2470 2471 2472 2473 2474 2475
}

/**
 * xs_tcp_print_stats - display TCP socket-specifc stats
 * @xprt: rpc_xprt struct containing statistics
 * @seq: output file
 *
 */
static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
{
2476
	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2477 2478 2479 2480 2481
	long idle_time = 0;

	if (xprt_connected(xprt))
		idle_time = (long)(jiffies - xprt->last_used) / HZ;

2482 2483
	seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu "
			"%llu %llu %lu %llu %llu\n",
2484
			transport->srcport,
2485 2486 2487 2488 2489 2490 2491 2492
			xprt->stat.bind_count,
			xprt->stat.connect_count,
			xprt->stat.connect_time,
			idle_time,
			xprt->stat.sends,
			xprt->stat.recvs,
			xprt->stat.bad_xids,
			xprt->stat.req_u,
2493 2494 2495 2496
			xprt->stat.bklog_u,
			xprt->stat.max_slots,
			xprt->stat.sending_u,
			xprt->stat.pending_u);
2497 2498
}

2499 2500 2501 2502 2503
/*
 * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason
 * we allocate pages instead doing a kmalloc like rpc_malloc is because we want
 * to use the server side send routines.
 */
2504
static void *bc_malloc(struct rpc_task *task, size_t size)
2505 2506 2507 2508
{
	struct page *page;
	struct rpc_buffer *buf;

2509 2510 2511
	WARN_ON_ONCE(size > PAGE_SIZE - sizeof(struct rpc_buffer));
	if (size > PAGE_SIZE - sizeof(struct rpc_buffer))
		return NULL;
2512

2513
	page = alloc_page(GFP_KERNEL);
2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525
	if (!page)
		return NULL;

	buf = page_address(page);
	buf->len = PAGE_SIZE;

	return buf->data;
}

/*
 * Free the space allocated in the bc_alloc routine
 */
2526
static void bc_free(void *buffer)
2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551
{
	struct rpc_buffer *buf;

	if (!buffer)
		return;

	buf = container_of(buffer, struct rpc_buffer, data);
	free_page((unsigned long)buf);
}

/*
 * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex
 * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request.
 */
static int bc_sendto(struct rpc_rqst *req)
{
	int len;
	struct xdr_buf *xbufp = &req->rq_snd_buf;
	struct rpc_xprt *xprt = req->rq_xprt;
	struct sock_xprt *transport =
				container_of(xprt, struct sock_xprt, xprt);
	struct socket *sock = transport->sock;
	unsigned long headoff;
	unsigned long tailoff;

2552
	xs_encode_stream_record_marker(xbufp);
2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574

	tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK;
	headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK;
	len = svc_send_common(sock, xbufp,
			      virt_to_page(xbufp->head[0].iov_base), headoff,
			      xbufp->tail[0].iov_base, tailoff);

	if (len != xbufp->len) {
		printk(KERN_NOTICE "Error sending entire callback!\n");
		len = -EAGAIN;
	}

	return len;
}

/*
 * The send routine. Borrows from svc_send
 */
static int bc_send_request(struct rpc_task *task)
{
	struct rpc_rqst *req = task->tk_rqstp;
	struct svc_xprt	*xprt;
A
Andrzej Hajda 已提交
2575
	int len;
2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619

	dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid));
	/*
	 * Get the server socket associated with this callback xprt
	 */
	xprt = req->rq_xprt->bc_xprt;

	/*
	 * Grab the mutex to serialize data as the connection is shared
	 * with the fore channel
	 */
	if (!mutex_trylock(&xprt->xpt_mutex)) {
		rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL);
		if (!mutex_trylock(&xprt->xpt_mutex))
			return -EAGAIN;
		rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task);
	}
	if (test_bit(XPT_DEAD, &xprt->xpt_flags))
		len = -ENOTCONN;
	else
		len = bc_sendto(req);
	mutex_unlock(&xprt->xpt_mutex);

	if (len > 0)
		len = 0;

	return len;
}

/*
 * The close routine. Since this is client initiated, we do nothing
 */

static void bc_close(struct rpc_xprt *xprt)
{
}

/*
 * The xprt destroy routine. Again, because this connection is client
 * initiated, we do nothing
 */

static void bc_destroy(struct rpc_xprt *xprt)
{
2620 2621 2622 2623
	dprintk("RPC:       bc_destroy xprt %p\n", xprt);

	xs_xprt_free(xprt);
	module_put(THIS_MODULE);
2624 2625
}

2626 2627 2628
static struct rpc_xprt_ops xs_local_ops = {
	.reserve_xprt		= xprt_reserve_xprt,
	.release_xprt		= xs_tcp_release_xprt,
2629
	.alloc_slot		= xprt_alloc_slot,
2630 2631
	.rpcbind		= xs_local_rpcbind,
	.set_port		= xs_local_set_port,
2632
	.connect		= xs_local_connect,
2633 2634 2635 2636 2637
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
	.send_request		= xs_local_send_request,
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
	.close			= xs_close,
T
Trond Myklebust 已提交
2638
	.destroy		= xs_destroy,
2639
	.print_stats		= xs_local_print_stats,
2640 2641
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
2642 2643
};

2644
static struct rpc_xprt_ops xs_udp_ops = {
2645
	.set_buffer_size	= xs_udp_set_buffer_size,
2646
	.reserve_xprt		= xprt_reserve_xprt_cong,
2647
	.release_xprt		= xprt_release_xprt_cong,
2648
	.alloc_slot		= xprt_alloc_slot,
2649
	.rpcbind		= rpcb_getport_async,
2650
	.set_port		= xs_set_port,
2651
	.connect		= xs_connect,
2652 2653
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2654
	.send_request		= xs_udp_send_request,
2655
	.set_retrans_timeout	= xprt_set_retrans_timeout_rtt,
2656
	.timer			= xs_udp_timer,
2657
	.release_request	= xprt_release_rqst_cong,
2658 2659
	.close			= xs_close,
	.destroy		= xs_destroy,
2660
	.print_stats		= xs_udp_print_stats,
2661 2662
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2663
	.inject_disconnect	= xs_inject_disconnect,
2664 2665 2666
};

static struct rpc_xprt_ops xs_tcp_ops = {
2667
	.reserve_xprt		= xprt_reserve_xprt,
2668
	.release_xprt		= xs_tcp_release_xprt,
2669
	.alloc_slot		= xprt_lock_and_alloc_slot,
2670
	.rpcbind		= rpcb_getport_async,
2671
	.set_port		= xs_set_port,
2672
	.connect		= xs_connect,
2673 2674
	.buf_alloc		= rpc_malloc,
	.buf_free		= rpc_free,
2675
	.send_request		= xs_tcp_send_request,
2676
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
2677
	.close			= xs_tcp_shutdown,
2678
	.destroy		= xs_destroy,
2679
	.print_stats		= xs_tcp_print_stats,
2680 2681
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2682
	.inject_disconnect	= xs_inject_disconnect,
2683 2684
#ifdef CONFIG_SUNRPC_BACKCHANNEL
	.bc_setup		= xprt_setup_bc,
2685
	.bc_up			= xs_tcp_bc_up,
2686
	.bc_maxpayload		= xs_tcp_bc_maxpayload,
2687 2688 2689
	.bc_free_rqst		= xprt_free_bc_rqst,
	.bc_destroy		= xprt_destroy_bc,
#endif
2690 2691
};

2692 2693 2694 2695 2696 2697 2698
/*
 * The rpc_xprt_ops for the server backchannel
 */

static struct rpc_xprt_ops bc_tcp_ops = {
	.reserve_xprt		= xprt_reserve_xprt,
	.release_xprt		= xprt_release_xprt,
2699
	.alloc_slot		= xprt_alloc_slot,
2700 2701 2702 2703 2704 2705 2706
	.buf_alloc		= bc_malloc,
	.buf_free		= bc_free,
	.send_request		= bc_send_request,
	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
	.close			= bc_close,
	.destroy		= bc_destroy,
	.print_stats		= xs_tcp_print_stats,
2707 2708
	.enable_swap		= xs_enable_swap,
	.disable_swap		= xs_disable_swap,
C
Chuck Lever 已提交
2709
	.inject_disconnect	= xs_inject_disconnect,
2710 2711
};

2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723
static int xs_init_anyaddr(const int family, struct sockaddr *sap)
{
	static const struct sockaddr_in sin = {
		.sin_family		= AF_INET,
		.sin_addr.s_addr	= htonl(INADDR_ANY),
	};
	static const struct sockaddr_in6 sin6 = {
		.sin6_family		= AF_INET6,
		.sin6_addr		= IN6ADDR_ANY_INIT,
	};

	switch (family) {
2724 2725
	case AF_LOCAL:
		break;
2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738
	case AF_INET:
		memcpy(sap, &sin, sizeof(sin));
		break;
	case AF_INET6:
		memcpy(sap, &sin6, sizeof(sin6));
		break;
	default:
		dprintk("RPC:       %s: Bad address family\n", __func__);
		return -EAFNOSUPPORT;
	}
	return 0;
}

2739
static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
2740 2741
				      unsigned int slot_table_size,
				      unsigned int max_slot_table_size)
2742 2743
{
	struct rpc_xprt *xprt;
2744
	struct sock_xprt *new;
2745

2746
	if (args->addrlen > sizeof(xprt->addr)) {
2747
		dprintk("RPC:       xs_setup_xprt: address too large\n");
2748 2749 2750
		return ERR_PTR(-EBADF);
	}

2751 2752
	xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size,
			max_slot_table_size);
2753
	if (xprt == NULL) {
2754 2755
		dprintk("RPC:       xs_setup_xprt: couldn't allocate "
				"rpc_xprt\n");
2756 2757 2758
		return ERR_PTR(-ENOMEM);
	}

2759
	new = container_of(xprt, struct sock_xprt, xprt);
2760
	mutex_init(&new->recv_mutex);
2761 2762
	memcpy(&xprt->addr, args->dstaddr, args->addrlen);
	xprt->addrlen = args->addrlen;
2763
	if (args->srcaddr)
2764
		memcpy(&new->srcaddr, args->srcaddr, args->addrlen);
2765 2766 2767 2768
	else {
		int err;
		err = xs_init_anyaddr(args->dstaddr->sa_family,
					(struct sockaddr *)&new->srcaddr);
2769 2770
		if (err != 0) {
			xprt_free(xprt);
2771
			return ERR_PTR(err);
2772
		}
2773
	}
2774 2775 2776 2777

	return xprt;
}

2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789 2790 2791 2792 2793 2794 2795 2796
static const struct rpc_timeout xs_local_default_timeout = {
	.to_initval = 10 * HZ,
	.to_maxval = 10 * HZ,
	.to_retries = 2,
};

/**
 * xs_setup_local - Set up transport to use an AF_LOCAL socket
 * @args: rpc transport creation arguments
 *
 * AF_LOCAL is a "tpi_cots_ord" transport, just like TCP
 */
static struct rpc_xprt *xs_setup_local(struct xprt_create *args)
{
	struct sockaddr_un *sun = (struct sockaddr_un *)args->dstaddr;
	struct sock_xprt *transport;
	struct rpc_xprt *xprt;
	struct rpc_xprt *ret;

2797 2798
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
			xprt_max_tcp_slot_table_entries);
2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813
	if (IS_ERR(xprt))
		return xprt;
	transport = container_of(xprt, struct sock_xprt, xprt);

	xprt->prot = 0;
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;

	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;

	xprt->ops = &xs_local_ops;
	xprt->timeout = &xs_local_default_timeout;

2814
	INIT_WORK(&transport->recv_worker, xs_local_data_receive_workfn);
2815 2816 2817
	INIT_DELAYED_WORK(&transport->connect_worker,
			xs_dummy_setup_socket);

2818 2819 2820 2821 2822 2823 2824 2825 2826 2827
	switch (sun->sun_family) {
	case AF_LOCAL:
		if (sun->sun_path[0] != '/') {
			dprintk("RPC:       bad AF_LOCAL address: %s\n",
					sun->sun_path);
			ret = ERR_PTR(-EINVAL);
			goto out_err;
		}
		xprt_set_bound(xprt);
		xs_format_peer_addresses(xprt, "local", RPCBIND_NETID_LOCAL);
2828 2829 2830
		ret = ERR_PTR(xs_local_setup_socket(transport));
		if (ret)
			goto out_err;
2831 2832 2833 2834 2835 2836 2837 2838 2839 2840 2841 2842 2843
		break;
	default:
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
	}

	dprintk("RPC:       set up xprt to %s via AF_LOCAL\n",
			xprt->address_strings[RPC_DISPLAY_ADDR]);

	if (try_module_get(THIS_MODULE))
		return xprt;
	ret = ERR_PTR(-EINVAL);
out_err:
2844
	xs_xprt_free(xprt);
2845 2846 2847
	return ret;
}

2848 2849 2850 2851 2852 2853 2854
static const struct rpc_timeout xs_udp_default_timeout = {
	.to_initval = 5 * HZ,
	.to_maxval = 30 * HZ,
	.to_increment = 5 * HZ,
	.to_retries = 5,
};

2855 2856
/**
 * xs_setup_udp - Set up transport to use a UDP socket
2857
 * @args: rpc transport creation arguments
2858 2859
 *
 */
2860
static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
2861
{
2862
	struct sockaddr *addr = args->dstaddr;
2863
	struct rpc_xprt *xprt;
2864
	struct sock_xprt *transport;
2865
	struct rpc_xprt *ret;
2866

2867 2868
	xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries,
			xprt_udp_slot_table_entries);
2869 2870
	if (IS_ERR(xprt))
		return xprt;
2871
	transport = container_of(xprt, struct sock_xprt, xprt);
2872

2873
	xprt->prot = IPPROTO_UDP;
2874
	xprt->tsh_size = 0;
2875 2876 2877
	/* XXX: header size can vary due to auth type, IPv6, etc. */
	xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);

2878 2879 2880
	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_UDP_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2881

2882
	xprt->ops = &xs_udp_ops;
2883

2884
	xprt->timeout = &xs_udp_default_timeout;
2885

2886
	INIT_WORK(&transport->recv_worker, xs_udp_data_receive_workfn);
2887 2888
	INIT_DELAYED_WORK(&transport->connect_worker, xs_udp_setup_socket);

2889 2890 2891 2892 2893
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

2894
		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP);
2895 2896 2897 2898 2899
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

2900
		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6);
2901 2902
		break;
	default:
2903 2904
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
2905 2906
	}

C
Chuck Lever 已提交
2907 2908 2909 2910 2911 2912 2913 2914 2915
	if (xprt_bound(xprt))
		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PORT],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
	else
		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
2916

2917 2918
	if (try_module_get(THIS_MODULE))
		return xprt;
2919 2920
	ret = ERR_PTR(-EINVAL);
out_err:
2921
	xs_xprt_free(xprt);
2922
	return ret;
2923 2924
}

2925 2926 2927 2928 2929 2930
static const struct rpc_timeout xs_tcp_default_timeout = {
	.to_initval = 60 * HZ,
	.to_maxval = 60 * HZ,
	.to_retries = 2,
};

2931 2932
/**
 * xs_setup_tcp - Set up transport to use a TCP socket
2933
 * @args: rpc transport creation arguments
2934 2935
 *
 */
2936
static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
2937
{
2938
	struct sockaddr *addr = args->dstaddr;
2939
	struct rpc_xprt *xprt;
2940
	struct sock_xprt *transport;
2941
	struct rpc_xprt *ret;
2942 2943 2944 2945
	unsigned int max_slot_table_size = xprt_max_tcp_slot_table_entries;

	if (args->flags & XPRT_CREATE_INFINITE_SLOTS)
		max_slot_table_size = RPC_MAX_SLOT_TABLE_LIMIT;
2946

2947
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
2948
			max_slot_table_size);
2949 2950
	if (IS_ERR(xprt))
		return xprt;
2951
	transport = container_of(xprt, struct sock_xprt, xprt);
2952

2953
	xprt->prot = IPPROTO_TCP;
2954 2955
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2956

2957 2958 2959
	xprt->bind_timeout = XS_BIND_TO;
	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
	xprt->idle_timeout = XS_IDLE_DISC_TO;
2960

2961
	xprt->ops = &xs_tcp_ops;
2962
	xprt->timeout = &xs_tcp_default_timeout;
2963

2964 2965 2966
	INIT_WORK(&transport->recv_worker, xs_tcp_data_receive_workfn);
	INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_setup_socket);

2967 2968 2969 2970 2971
	switch (addr->sa_family) {
	case AF_INET:
		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
			xprt_set_bound(xprt);

2972
		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP);
2973 2974 2975 2976 2977
		break;
	case AF_INET6:
		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
			xprt_set_bound(xprt);

2978
		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6);
2979 2980
		break;
	default:
2981 2982
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
2983 2984
	}

C
Chuck Lever 已提交
2985 2986 2987 2988 2989 2990 2991 2992 2993 2994
	if (xprt_bound(xprt))
		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PORT],
				xprt->address_strings[RPC_DISPLAY_PROTO]);
	else
		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
				xprt->address_strings[RPC_DISPLAY_ADDR],
				xprt->address_strings[RPC_DISPLAY_PROTO]);

2995 2996
	if (try_module_get(THIS_MODULE))
		return xprt;
2997 2998
	ret = ERR_PTR(-EINVAL);
out_err:
2999
	xs_xprt_free(xprt);
3000
	return ret;
3001
}
3002

3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013
/**
 * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket
 * @args: rpc transport creation arguments
 *
 */
static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args)
{
	struct sockaddr *addr = args->dstaddr;
	struct rpc_xprt *xprt;
	struct sock_xprt *transport;
	struct svc_sock *bc_sock;
3014
	struct rpc_xprt *ret;
3015

3016 3017
	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries,
			xprt_tcp_slot_table_entries);
3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032 3033 3034 3035 3036 3037 3038 3039 3040 3041 3042 3043 3044
	if (IS_ERR(xprt))
		return xprt;
	transport = container_of(xprt, struct sock_xprt, xprt);

	xprt->prot = IPPROTO_TCP;
	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
	xprt->timeout = &xs_tcp_default_timeout;

	/* backchannel */
	xprt_set_bound(xprt);
	xprt->bind_timeout = 0;
	xprt->reestablish_timeout = 0;
	xprt->idle_timeout = 0;

	xprt->ops = &bc_tcp_ops;

	switch (addr->sa_family) {
	case AF_INET:
		xs_format_peer_addresses(xprt, "tcp",
					 RPCBIND_NETID_TCP);
		break;
	case AF_INET6:
		xs_format_peer_addresses(xprt, "tcp",
				   RPCBIND_NETID_TCP6);
		break;
	default:
3045 3046
		ret = ERR_PTR(-EAFNOSUPPORT);
		goto out_err;
3047 3048
	}

3049 3050 3051 3052
	dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
			xprt->address_strings[RPC_DISPLAY_ADDR],
			xprt->address_strings[RPC_DISPLAY_PORT],
			xprt->address_strings[RPC_DISPLAY_PROTO]);
3053

3054 3055
	/*
	 * Once we've associated a backchannel xprt with a connection,
W
Weng Meiling 已提交
3056 3057 3058
	 * we want to keep it around as long as the connection lasts,
	 * in case we need to start using it for a backchannel again;
	 * this reference won't be dropped until bc_xprt is destroyed.
3059 3060 3061 3062 3063 3064 3065 3066
	 */
	xprt_get(xprt);
	args->bc_xprt->xpt_bc_xprt = xprt;
	xprt->bc_xprt = args->bc_xprt;
	bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt);
	transport->sock = bc_sock->sk_sock;
	transport->inet = bc_sock->sk_sk;

3067 3068 3069 3070 3071 3072 3073 3074
	/*
	 * Since we don't want connections for the backchannel, we set
	 * the xprt status to connected
	 */
	xprt_set_connected(xprt);

	if (try_module_get(THIS_MODULE))
		return xprt;
3075 3076

	args->bc_xprt->xpt_bc_xprt = NULL;
3077
	args->bc_xprt->xpt_bc_xps = NULL;
3078
	xprt_put(xprt);
3079 3080
	ret = ERR_PTR(-EINVAL);
out_err:
3081
	xs_xprt_free(xprt);
3082
	return ret;
3083 3084
}

3085 3086 3087 3088 3089 3090 3091 3092
static struct xprt_class	xs_local_transport = {
	.list		= LIST_HEAD_INIT(xs_local_transport.list),
	.name		= "named UNIX socket",
	.owner		= THIS_MODULE,
	.ident		= XPRT_TRANSPORT_LOCAL,
	.setup		= xs_setup_local,
};

3093 3094 3095 3096
static struct xprt_class	xs_udp_transport = {
	.list		= LIST_HEAD_INIT(xs_udp_transport.list),
	.name		= "udp",
	.owner		= THIS_MODULE,
3097
	.ident		= XPRT_TRANSPORT_UDP,
3098 3099 3100 3101 3102 3103 3104
	.setup		= xs_setup_udp,
};

static struct xprt_class	xs_tcp_transport = {
	.list		= LIST_HEAD_INIT(xs_tcp_transport.list),
	.name		= "tcp",
	.owner		= THIS_MODULE,
3105
	.ident		= XPRT_TRANSPORT_TCP,
3106 3107 3108
	.setup		= xs_setup_tcp,
};

3109 3110 3111 3112 3113 3114 3115 3116
static struct xprt_class	xs_bc_tcp_transport = {
	.list		= LIST_HEAD_INIT(xs_bc_tcp_transport.list),
	.name		= "tcp NFSv4.1 backchannel",
	.owner		= THIS_MODULE,
	.ident		= XPRT_TRANSPORT_BC_TCP,
	.setup		= xs_setup_bc_tcp,
};

3117
/**
3118
 * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
3119 3120 3121 3122
 *
 */
int init_socket_xprt(void)
{
J
Jeff Layton 已提交
3123
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
3124
	if (!sunrpc_table_header)
3125
		sunrpc_table_header = register_sysctl_table(sunrpc_table);
3126 3127
#endif

3128
	xprt_register_transport(&xs_local_transport);
3129 3130
	xprt_register_transport(&xs_udp_transport);
	xprt_register_transport(&xs_tcp_transport);
3131
	xprt_register_transport(&xs_bc_tcp_transport);
3132

3133 3134 3135 3136
	return 0;
}

/**
3137
 * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
3138 3139 3140 3141
 *
 */
void cleanup_socket_xprt(void)
{
J
Jeff Layton 已提交
3142
#if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
3143 3144 3145 3146 3147
	if (sunrpc_table_header) {
		unregister_sysctl_table(sunrpc_table_header);
		sunrpc_table_header = NULL;
	}
#endif
3148

3149
	xprt_unregister_transport(&xs_local_transport);
3150 3151
	xprt_unregister_transport(&xs_udp_transport);
	xprt_unregister_transport(&xs_tcp_transport);
3152
	xprt_unregister_transport(&xs_bc_tcp_transport);
3153
}
3154

3155 3156
static int param_set_uint_minmax(const char *val,
		const struct kernel_param *kp,
3157 3158
		unsigned int min, unsigned int max)
{
D
Daniel Walter 已提交
3159
	unsigned int num;
3160 3161 3162 3163
	int ret;

	if (!val)
		return -EINVAL;
D
Daniel Walter 已提交
3164
	ret = kstrtouint(val, 0, &num);
3165 3166 3167 3168 3169 3170
	if (ret == -EINVAL || num < min || num > max)
		return -EINVAL;
	*((unsigned int *)kp->arg) = num;
	return 0;
}

3171
static int param_set_portnr(const char *val, const struct kernel_param *kp)
3172
{
3173 3174
	if (kp->arg == &xprt_min_resvport)
		return param_set_uint_minmax(val, kp,
3175
			RPC_MIN_RESVPORT,
3176 3177 3178
			xprt_max_resvport);
	return param_set_uint_minmax(val, kp,
			xprt_min_resvport,
3179 3180 3181
			RPC_MAX_RESVPORT);
}

3182
static const struct kernel_param_ops param_ops_portnr = {
3183 3184 3185 3186
	.set = param_set_portnr,
	.get = param_get_uint,
};

3187 3188 3189 3190 3191 3192
#define param_check_portnr(name, p) \
	__param_check(name, p, unsigned int);

module_param_named(min_resvport, xprt_min_resvport, portnr, 0644);
module_param_named(max_resvport, xprt_max_resvport, portnr, 0644);

3193 3194
static int param_set_slot_table_size(const char *val,
				     const struct kernel_param *kp)
3195 3196 3197 3198 3199 3200
{
	return param_set_uint_minmax(val, kp,
			RPC_MIN_SLOT_TABLE,
			RPC_MAX_SLOT_TABLE);
}

3201
static const struct kernel_param_ops param_ops_slot_table_size = {
3202 3203 3204 3205
	.set = param_set_slot_table_size,
	.get = param_get_uint,
};

3206 3207 3208
#define param_check_slot_table_size(name, p) \
	__param_check(name, p, unsigned int);

3209 3210 3211 3212 3213 3214 3215 3216
static int param_set_max_slot_table_size(const char *val,
				     const struct kernel_param *kp)
{
	return param_set_uint_minmax(val, kp,
			RPC_MIN_SLOT_TABLE,
			RPC_MAX_SLOT_TABLE_LIMIT);
}

3217
static const struct kernel_param_ops param_ops_max_slot_table_size = {
3218 3219 3220 3221 3222 3223 3224
	.set = param_set_max_slot_table_size,
	.get = param_get_uint,
};

#define param_check_max_slot_table_size(name, p) \
	__param_check(name, p, unsigned int);

3225 3226
module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries,
		   slot_table_size, 0644);
3227 3228
module_param_named(tcp_max_slot_table_entries, xprt_max_tcp_slot_table_entries,
		   max_slot_table_size, 0644);
3229 3230 3231
module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries,
		   slot_table_size, 0644);