svcsock.c 41.5 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7
/*
 * linux/net/sunrpc/svcsock.c
 *
 * These are the RPC server socket internals.
 *
 * The server scheduling algorithm does not always distribute the load
 * evenly when servicing a single client. May need to modify the
8
 * svc_xprt_enqueue procedure...
L
Linus Torvalds 已提交
9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * TCP support is largely untested and may be a little slow. The problem
 * is that we currently do two separate recvfrom's, one for the 4-byte
 * record length, and the second for the actual record. This could possibly
 * be improved by always reading a minimum size of around 100 bytes and
 * tucking any superfluous bytes away in a temporary store. Still, that
 * leaves write requests out in the rain. An alternative may be to peek at
 * the first skb in the queue, and if it matches the next TCP sequence
 * number, to extract the record marker. Yuck.
 *
 * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
 */

22
#include <linux/kernel.h>
L
Linus Torvalds 已提交
23 24 25 26 27 28 29
#include <linux/sched.h>
#include <linux/errno.h>
#include <linux/fcntl.h>
#include <linux/net.h>
#include <linux/in.h>
#include <linux/inet.h>
#include <linux/udp.h>
30
#include <linux/tcp.h>
L
Linus Torvalds 已提交
31 32 33 34
#include <linux/unistd.h>
#include <linux/slab.h>
#include <linux/netdevice.h>
#include <linux/skbuff.h>
35
#include <linux/file.h>
36
#include <linux/freezer.h>
L
Linus Torvalds 已提交
37 38 39
#include <net/sock.h>
#include <net/checksum.h>
#include <net/ip.h>
40
#include <net/ipv6.h>
41
#include <net/tcp.h>
42
#include <net/tcp_states.h>
L
Linus Torvalds 已提交
43 44 45 46
#include <asm/uaccess.h>
#include <asm/ioctls.h>

#include <linux/sunrpc/types.h>
47
#include <linux/sunrpc/clnt.h>
L
Linus Torvalds 已提交
48
#include <linux/sunrpc/xdr.h>
49
#include <linux/sunrpc/msg_prot.h>
L
Linus Torvalds 已提交
50 51
#include <linux/sunrpc/svcsock.h>
#include <linux/sunrpc/stats.h>
52
#include <linux/sunrpc/xprt.h>
L
Linus Torvalds 已提交
53

54
#define RPCDBG_FACILITY	RPCDBG_SVCXPRT
L
Linus Torvalds 已提交
55 56 57


static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
58
					 int *errp, int flags);
L
Linus Torvalds 已提交
59 60 61
static void		svc_udp_data_ready(struct sock *, int);
static int		svc_udp_recvfrom(struct svc_rqst *);
static int		svc_udp_sendto(struct svc_rqst *);
62
static void		svc_sock_detach(struct svc_xprt *);
63
static void		svc_tcp_sock_detach(struct svc_xprt *);
64
static void		svc_sock_free(struct svc_xprt *);
L
Linus Torvalds 已提交
65

66
static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
67 68
					  struct net *, struct sockaddr *,
					  int, int);
69 70 71 72 73 74 75
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);
#endif /* CONFIG_NFS_V4_1 */

76 77 78 79
#ifdef CONFIG_DEBUG_LOCK_ALLOC
static struct lock_class_key svc_key[2];
static struct lock_class_key svc_slock_key[2];

80
static void svc_reclassify_socket(struct socket *sock)
81 82
{
	struct sock *sk = sock->sk;
83
	BUG_ON(sock_owned_by_user(sk));
84 85 86
	switch (sk->sk_family) {
	case AF_INET:
		sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
87 88 89
					      &svc_slock_key[0],
					      "sk_xprt.xpt_lock-AF_INET-NFSD",
					      &svc_key[0]);
90 91 92 93
		break;

	case AF_INET6:
		sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
94 95 96
					      &svc_slock_key[1],
					      "sk_xprt.xpt_lock-AF_INET6-NFSD",
					      &svc_key[1]);
97 98 99 100 101 102 103
		break;

	default:
		BUG();
	}
}
#else
104
static void svc_reclassify_socket(struct socket *sock)
105 106 107 108
{
}
#endif

L
Linus Torvalds 已提交
109 110 111
/*
 * Release an skbuff after use
 */
112
static void svc_release_skb(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
113
{
114
	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
L
Linus Torvalds 已提交
115 116

	if (skb) {
117 118
		struct svc_sock *svsk =
			container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
119
		rqstp->rq_xprt_ctxt = NULL;
L
Linus Torvalds 已提交
120 121

		dprintk("svc: service %p, releasing skb %p\n", rqstp, skb);
122
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
123 124 125
	}
}

126 127 128 129
union svc_pktinfo_u {
	struct in_pktinfo pkti;
	struct in6_pktinfo pkti6;
};
130 131
#define SVC_PKTINFO_SPACE \
	CMSG_SPACE(sizeof(union svc_pktinfo_u))
132 133 134

static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
{
135 136 137
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	switch (svsk->sk_sk->sk_family) {
138 139 140 141 142 143 144 145 146 147
	case AF_INET: {
			struct in_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IP;
			cmh->cmsg_type = IP_PKTINFO;
			pki->ipi_ifindex = 0;
			pki->ipi_spec_dst.s_addr = rqstp->rq_daddr.addr.s_addr;
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
148

149 150 151 152 153 154 155 156 157 158 159 160 161 162
	case AF_INET6: {
			struct in6_pktinfo *pki = CMSG_DATA(cmh);

			cmh->cmsg_level = SOL_IPV6;
			cmh->cmsg_type = IPV6_PKTINFO;
			pki->ipi6_ifindex = 0;
			ipv6_addr_copy(&pki->ipi6_addr,
					&rqstp->rq_daddr.addr6);
			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
		}
		break;
	}
}

L
Linus Torvalds 已提交
163
/*
164
 * send routine intended to be shared by the fore- and back-channel
L
Linus Torvalds 已提交
165
 */
166 167 168
int svc_send_common(struct socket *sock, struct xdr_buf *xdr,
		    struct page *headpage, unsigned long headoffset,
		    struct page *tailpage, unsigned long tailoffset)
L
Linus Torvalds 已提交
169 170 171 172 173 174 175
{
	int		result;
	int		size;
	struct page	**ppage = xdr->pages;
	size_t		base = xdr->page_base;
	unsigned int	pglen = xdr->page_len;
	unsigned int	flags = MSG_MORE;
176 177
	int		slen;
	int		len = 0;
L
Linus Torvalds 已提交
178 179 180 181 182 183

	slen = xdr->len;

	/* send head */
	if (slen == xdr->head[0].iov_len)
		flags = 0;
184
	len = kernel_sendpage(sock, headpage, headoffset,
185
				  xdr->head[0].iov_len, flags);
L
Linus Torvalds 已提交
186 187 188 189 190 191 192 193 194 195 196
	if (len != xdr->head[0].iov_len)
		goto out;
	slen -= xdr->head[0].iov_len;
	if (slen == 0)
		goto out;

	/* send page data */
	size = PAGE_SIZE - base < pglen ? PAGE_SIZE - base : pglen;
	while (pglen > 0) {
		if (slen == size)
			flags = 0;
197
		result = kernel_sendpage(sock, *ppage, base, size, flags);
L
Linus Torvalds 已提交
198 199 200 201 202 203 204 205 206 207
		if (result > 0)
			len += result;
		if (result != size)
			goto out;
		slen -= size;
		pglen -= size;
		size = PAGE_SIZE < pglen ? PAGE_SIZE : pglen;
		base = 0;
		ppage++;
	}
208

L
Linus Torvalds 已提交
209 210
	/* send tail */
	if (xdr->tail[0].iov_len) {
211 212
		result = kernel_sendpage(sock, tailpage, tailoffset,
				   xdr->tail[0].iov_len, 0);
L
Linus Torvalds 已提交
213 214 215
		if (result > 0)
			len += result;
	}
216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259

out:
	return len;
}


/*
 * Generic sendto routine
 */
static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct socket	*sock = svsk->sk_sock;
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
	int		len = 0;
	unsigned long tailoff;
	unsigned long headoff;
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);

	if (rqstp->rq_prot == IPPROTO_UDP) {
		struct msghdr msg = {
			.msg_name	= &rqstp->rq_addr,
			.msg_namelen	= rqstp->rq_addrlen,
			.msg_control	= cmh,
			.msg_controllen	= sizeof(buffer),
			.msg_flags	= MSG_MORE,
		};

		svc_set_cmsg_data(rqstp, cmh);

		if (sock_sendmsg(sock, &msg, 0) < 0)
			goto out;
	}

	tailoff = ((unsigned long)xdr->tail[0].iov_base) & (PAGE_SIZE-1);
	headoff = 0;
	len = svc_send_common(sock, xdr, rqstp->rq_respages[0], headoff,
			       rqstp->rq_respages[0], tailoff);

L
Linus Torvalds 已提交
260
out:
261
	dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
262
		svsk, xdr->head[0].iov_base, xdr->head[0].iov_len,
263
		xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
L
Linus Torvalds 已提交
264 265 266 267

	return len;
}

268 269 270
/*
 * Report socket names for nfsdfs
 */
271
static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
272
{
C
Chuck Lever 已提交
273 274 275
	const struct sock *sk = svsk->sk_sk;
	const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
							"udp" : "tcp";
276 277
	int len;

C
Chuck Lever 已提交
278
	switch (sk->sk_family) {
279 280
	case PF_INET:
		len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
C
Chuck Lever 已提交
281
				proto_name,
E
Eric Dumazet 已提交
282 283
				&inet_sk(sk)->inet_rcv_saddr,
				inet_sk(sk)->inet_num);
284
		break;
285 286
	case PF_INET6:
		len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
C
Chuck Lever 已提交
287 288
				proto_name,
				&inet6_sk(sk)->rcv_saddr,
E
Eric Dumazet 已提交
289
				inet_sk(sk)->inet_num);
290 291
		break;
	default:
292
		len = snprintf(buf, remaining, "*unknown-%d*\n",
C
Chuck Lever 已提交
293
				sk->sk_family);
294
	}
295 296 297 298

	if (len >= remaining) {
		*buf = '\0';
		return -ENAMETOOLONG;
299 300 301 302
	}
	return len;
}

303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319
/**
 * svc_sock_names - construct a list of listener names in a string
 * @serv: pointer to RPC service
 * @buf: pointer to a buffer to fill in with socket names
 * @buflen: size of the buffer to be filled
 * @toclose: pointer to '\0'-terminated C string containing the name
 *		of a listener to be closed
 *
 * Fills in @buf with a '\n'-separated list of names of listener
 * sockets.  If @toclose is not NULL, the socket named by @toclose
 * is closed, and is not included in the output list.
 *
 * Returns positive length of the socket name string, or a negative
 * errno value on error.
 */
int svc_sock_names(struct svc_serv *serv, char *buf, const size_t buflen,
		   const char *toclose)
320
{
321
	struct svc_sock *svsk, *closesk = NULL;
322 323 324 325
	int len = 0;

	if (!serv)
		return 0;
326

327
	spin_lock_bh(&serv->sv_lock);
328
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list) {
329 330 331 332 333 334
		int onelen = svc_one_sock_name(svsk, buf + len, buflen - len);
		if (onelen < 0) {
			len = onelen;
			break;
		}
		if (toclose && strcmp(toclose, buf + len) == 0)
335 336 337
			closesk = svsk;
		else
			len += onelen;
338
	}
339
	spin_unlock_bh(&serv->sv_lock);
340

341
	if (closesk)
342 343 344
		/* Should unregister with portmap, but you cannot
		 * unregister just one protocol...
		 */
345
		svc_close_xprt(&closesk->sk_xprt);
346 347
	else if (toclose)
		return -ENOENT;
348 349
	return len;
}
350
EXPORT_SYMBOL_GPL(svc_sock_names);
351

L
Linus Torvalds 已提交
352 353 354
/*
 * Check input queue length
 */
355
static int svc_recv_available(struct svc_sock *svsk)
L
Linus Torvalds 已提交
356 357 358 359
{
	struct socket	*sock = svsk->sk_sock;
	int		avail, err;

360
	err = kernel_sock_ioctl(sock, TIOCINQ, (unsigned long) &avail);
L
Linus Torvalds 已提交
361 362 363 364 365 366 367

	return (err >= 0)? avail : err;
}

/*
 * Generic recvfrom routine.
 */
368 369
static int svc_recvfrom(struct svc_rqst *rqstp, struct kvec *iov, int nr,
			int buflen)
L
Linus Torvalds 已提交
370
{
371 372
	struct svc_sock *svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
373 374 375 376
	struct msghdr msg = {
		.msg_flags	= MSG_DONTWAIT,
	};
	int len;
L
Linus Torvalds 已提交
377

378 379
	rqstp->rq_xprt_hlen = 0;

380 381
	len = kernel_recvmsg(svsk->sk_sock, &msg, iov, nr, buflen,
				msg.msg_flags);
L
Linus Torvalds 已提交
382 383

	dprintk("svc: socket %p recvfrom(%p, %Zu) = %d\n",
384
		svsk, iov[0].iov_base, iov[0].iov_len, len);
L
Linus Torvalds 已提交
385 386 387 388 389 390
	return len;
}

/*
 * Set socket snd and rcv buffer lengths
 */
391 392
static void svc_sock_setbufsize(struct socket *sock, unsigned int snd,
				unsigned int rcv)
L
Linus Torvalds 已提交
393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409
{
#if 0
	mm_segment_t	oldfs;
	oldfs = get_fs(); set_fs(KERNEL_DS);
	sock_setsockopt(sock, SOL_SOCKET, SO_SNDBUF,
			(char*)&snd, sizeof(snd));
	sock_setsockopt(sock, SOL_SOCKET, SO_RCVBUF,
			(char*)&rcv, sizeof(rcv));
#else
	/* sock_setsockopt limits use to sysctl_?mem_max,
	 * which isn't acceptable.  Until that is made conditional
	 * on not having CAP_SYS_RESOURCE or similar, we go direct...
	 * DaveM said I could!
	 */
	lock_sock(sock->sk);
	sock->sk->sk_sndbuf = snd * 2;
	sock->sk->sk_rcvbuf = rcv * 2;
410
	sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK|SOCK_RCVBUF_LOCK;
411
	sock->sk->sk_write_space(sock->sk);
L
Linus Torvalds 已提交
412 413 414 415 416 417
	release_sock(sock->sk);
#endif
}
/*
 * INET callback when data has been received on the socket.
 */
418
static void svc_udp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
419
{
420
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
421

422 423
	if (svsk) {
		dprintk("svc: socket %p(inet %p), count=%d, busy=%d\n",
424 425 426
			svsk, sk, count,
			test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
427
		svc_xprt_enqueue(&svsk->sk_xprt);
428
	}
E
Eric Dumazet 已提交
429 430
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
431 432 433 434 435
}

/*
 * INET callback when space is newly available on the socket.
 */
436
static void svc_write_space(struct sock *sk)
L
Linus Torvalds 已提交
437 438 439 440 441
{
	struct svc_sock	*svsk = (struct svc_sock *)(sk->sk_user_data);

	if (svsk) {
		dprintk("svc: socket %p(inet %p), write_space busy=%d\n",
442
			svsk, sk, test_bit(XPT_BUSY, &svsk->sk_xprt.xpt_flags));
443
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
444 445
	}

E
Eric Dumazet 已提交
446
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk))) {
447
		dprintk("RPC svc_write_space: someone sleeping on %p\n",
L
Linus Torvalds 已提交
448
		       svsk);
E
Eric Dumazet 已提交
449
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
450 451 452
	}
}

453 454 455 456 457 458 459 460 461
static void svc_tcp_write_space(struct sock *sk)
{
	struct socket *sock = sk->sk_socket;

	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk) && sock)
		clear_bit(SOCK_NOSPACE, &sock->flags);
	svc_write_space(sk);
}

462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487
/*
 * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
 */
static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IP_PKTINFO)
		return 0;
	rqstp->rq_daddr.addr.s_addr = pki->ipi_spec_dst.s_addr;
	return 1;
}

/*
 * See net/ipv6/datagram.c : datagram_recv_ctl
 */
static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
				     struct cmsghdr *cmh)
{
	struct in6_pktinfo *pki = CMSG_DATA(cmh);
	if (cmh->cmsg_type != IPV6_PKTINFO)
		return 0;
	ipv6_addr_copy(&rqstp->rq_daddr.addr6, &pki->ipi6_addr);
	return 1;
}

488 489 490 491 492 493 494
/*
 * Copy the UDP datagram's destination address to the rqstp structure.
 * The 'destination' address in this case is the address to which the
 * peer sent the datagram, i.e. our local address. For multihomed
 * hosts, this can change from msg to msg. Note that only the IP
 * address changes, the port number should remain the same.
 */
495 496
static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
				    struct cmsghdr *cmh)
497
{
498 499 500 501 502
	switch (cmh->cmsg_level) {
	case SOL_IP:
		return svc_udp_get_dest_address4(rqstp, cmh);
	case SOL_IPV6:
		return svc_udp_get_dest_address6(rqstp, cmh);
503
	}
504 505

	return 0;
506 507
}

L
Linus Torvalds 已提交
508 509 510
/*
 * Receive a datagram from a UDP socket.
 */
511
static int svc_udp_recvfrom(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
512
{
513 514
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
515
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
516
	struct sk_buff	*skb;
517 518 519 520 521
	union {
		struct cmsghdr	hdr;
		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
	} buffer;
	struct cmsghdr *cmh = &buffer.hdr;
522 523 524 525 526 527
	struct msghdr msg = {
		.msg_name = svc_addr(rqstp),
		.msg_control = cmh,
		.msg_controllen = sizeof(buffer),
		.msg_flags = MSG_DONTWAIT,
	};
528 529
	size_t len;
	int err;
L
Linus Torvalds 已提交
530

531
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
L
Linus Torvalds 已提交
532 533 534
	    /* udp sockets need large rcvbuf as all pending
	     * requests are still in that buffer.  sndbuf must
	     * also be large enough that there is enough space
535 536 537 538
	     * for one reply per thread.  We count all threads
	     * rather than threads in a particular pool, which
	     * provides an upper bound on the number of threads
	     * which will access the socket.
L
Linus Torvalds 已提交
539 540
	     */
	    svc_sock_setbufsize(svsk->sk_sock,
541 542
				(serv->sv_nrthreads+3) * serv->sv_max_mesg,
				(serv->sv_nrthreads+3) * serv->sv_max_mesg);
L
Linus Torvalds 已提交
543

544
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
545 546 547 548 549 550 551 552 553 554
	skb = NULL;
	err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
			     0, 0, MSG_PEEK | MSG_DONTWAIT);
	if (err >= 0)
		skb = skb_recv_datagram(svsk->sk_sk, 0, 1, &err);

	if (skb == NULL) {
		if (err != -EAGAIN) {
			/* possibly an icmp error */
			dprintk("svc: recvfrom returned error %d\n", -err);
555
			set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
556
		}
557
		return -EAGAIN;
L
Linus Torvalds 已提交
558
	}
559
	len = svc_addr_len(svc_addr(rqstp));
560 561
	if (len == 0)
		return -EAFNOSUPPORT;
562
	rqstp->rq_addrlen = len;
563 564
	if (skb->tstamp.tv64 == 0) {
		skb->tstamp = ktime_get_real();
565
		/* Don't enable netstamp, sunrpc doesn't
L
Linus Torvalds 已提交
566 567
		   need that much accuracy */
	}
568
	svsk->sk_sk->sk_stamp = skb->tstamp;
569
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
L
Linus Torvalds 已提交
570 571 572 573

	len  = skb->len - sizeof(struct udphdr);
	rqstp->rq_arg.len = len;

574
	rqstp->rq_prot = IPPROTO_UDP;
575

576
	if (!svc_udp_get_dest_address(rqstp, cmh)) {
577
		if (net_ratelimit())
578 579 580 581
			printk(KERN_WARNING
				"svc: received unknown control message %d/%d; "
				"dropping RPC reply datagram\n",
					cmh->cmsg_level, cmh->cmsg_type);
582
		skb_free_datagram_locked(svsk->sk_sk, skb);
583 584
		return 0;
	}
L
Linus Torvalds 已提交
585 586 587 588 589 590 591

	if (skb_is_nonlinear(skb)) {
		/* we have to copy */
		local_bh_disable();
		if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb)) {
			local_bh_enable();
			/* checksum error */
592
			skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
593 594 595
			return 0;
		}
		local_bh_enable();
596
		skb_free_datagram_locked(svsk->sk_sk, skb);
L
Linus Torvalds 已提交
597 598
	} else {
		/* we can use it in-place */
599 600
		rqstp->rq_arg.head[0].iov_base = skb->data +
			sizeof(struct udphdr);
L
Linus Torvalds 已提交
601
		rqstp->rq_arg.head[0].iov_len = len;
602
		if (skb_checksum_complete(skb)) {
603
			skb_free_datagram_locked(svsk->sk_sk, skb);
604
			return 0;
L
Linus Torvalds 已提交
605
		}
606
		rqstp->rq_xprt_ctxt = skb;
L
Linus Torvalds 已提交
607 608 609 610 611 612
	}

	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
613
		rqstp->rq_respages = rqstp->rq_pages+1;
L
Linus Torvalds 已提交
614 615
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
616
		rqstp->rq_respages = rqstp->rq_pages + 1 +
617
			DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
L
Linus Torvalds 已提交
618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638
	}

	if (serv->sv_stats)
		serv->sv_stats->netudpcnt++;

	return len;
}

static int
svc_udp_sendto(struct svc_rqst *rqstp)
{
	int		error;

	error = svc_sendto(rqstp, &rqstp->rq_res);
	if (error == -ECONNREFUSED)
		/* ICMP error on earlier request. */
		error = svc_sendto(rqstp, &rqstp->rq_res);

	return error;
}

T
Tom Tucker 已提交
639 640 641 642
static void svc_udp_prep_reply_hdr(struct svc_rqst *rqstp)
{
}

643 644 645
static int svc_udp_has_wspace(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
646
	struct svc_serv	*serv = xprt->xpt_server;
647 648 649 650 651 652 653
	unsigned long required;

	/*
	 * Set the SOCK_NOSPACE flag before checking the available
	 * sock space.
	 */
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
T
Tom Tucker 已提交
654
	required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
655 656 657 658 659 660
	if (required*2 > sock_wspace(svsk->sk_sk))
		return 0;
	clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
	return 1;
}

661 662 663 664 665 666
static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
{
	BUG();
	return NULL;
}

667
static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
668
				       struct net *net,
669 670 671
				       struct sockaddr *sa, int salen,
				       int flags)
{
672
	return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
673 674
}

675
static struct svc_xprt_ops svc_udp_ops = {
676
	.xpo_create = svc_udp_create,
677 678
	.xpo_recvfrom = svc_udp_recvfrom,
	.xpo_sendto = svc_udp_sendto,
679
	.xpo_release_rqst = svc_release_skb,
680 681
	.xpo_detach = svc_sock_detach,
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
682
	.xpo_prep_reply_hdr = svc_udp_prep_reply_hdr,
683
	.xpo_has_wspace = svc_udp_has_wspace,
684
	.xpo_accept = svc_udp_accept,
685 686 687 688
};

static struct svc_xprt_class svc_udp_class = {
	.xcl_name = "udp",
689
	.xcl_owner = THIS_MODULE,
690
	.xcl_ops = &svc_udp_ops,
691
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
692 693
};

694
static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
695
{
696
	int err, level, optname, one = 1;
697

698
	svc_xprt_init(&svc_udp_class, &svsk->sk_xprt, serv);
699
	clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
700 701 702 703
	svsk->sk_sk->sk_data_ready = svc_udp_data_ready;
	svsk->sk_sk->sk_write_space = svc_write_space;

	/* initialise setting must have enough space to
704
	 * receive and respond to one request.
L
Linus Torvalds 已提交
705 706 707
	 * svc_udp_recvfrom will re-adjust if necessary
	 */
	svc_sock_setbufsize(svsk->sk_sock,
708 709
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
			    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);
L
Linus Torvalds 已提交
710

711 712
	/* data might have come in before data_ready set up */
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
713
	set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
714 715

	/* make sure we get destination address info */
716 717 718 719 720 721 722 723 724 725 726 727 728 729 730
	switch (svsk->sk_sk->sk_family) {
	case AF_INET:
		level = SOL_IP;
		optname = IP_PKTINFO;
		break;
	case AF_INET6:
		level = SOL_IPV6;
		optname = IPV6_RECVPKTINFO;
		break;
	default:
		BUG();
	}
	err = kernel_setsockopt(svsk->sk_sock, level, optname,
					(char *)&one, sizeof(one));
	dprintk("svc: kernel_setsockopt returned %d\n", err);
L
Linus Torvalds 已提交
731 732 733 734 735 736
}

/*
 * A data_ready event on a listening socket means there's a connection
 * pending. Do not use state_change as a substitute for it.
 */
737
static void svc_tcp_listen_data_ready(struct sock *sk, int count_unused)
L
Linus Torvalds 已提交
738
{
739
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
740 741

	dprintk("svc: socket %p TCP (listen) state change %d\n",
742
		sk, sk->sk_state);
L
Linus Torvalds 已提交
743

744 745 746 747 748 749 750 751 752 753 754 755
	/*
	 * This callback may called twice when a new connection
	 * is established as a child socket inherits everything
	 * from a parent LISTEN socket.
	 * 1) data_ready method of the parent socket will be called
	 *    when one of child sockets become ESTABLISHED.
	 * 2) data_ready method of the child socket may be called
	 *    when it receives data before the socket is accepted.
	 * In case of 2, we should ignore it silently.
	 */
	if (sk->sk_state == TCP_LISTEN) {
		if (svsk) {
756
			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
757
			svc_xprt_enqueue(&svsk->sk_xprt);
758 759
		} else
			printk("svc: socket %p: no user data\n", sk);
L
Linus Torvalds 已提交
760
	}
761

E
Eric Dumazet 已提交
762 763
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible_all(sk_sleep(sk));
L
Linus Torvalds 已提交
764 765 766 767 768
}

/*
 * A state change on a connected socket means it's dying or dead.
 */
769
static void svc_tcp_state_change(struct sock *sk)
L
Linus Torvalds 已提交
770
{
771
	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
772 773

	dprintk("svc: socket %p TCP (connected) state change %d (svsk %p)\n",
774
		sk, sk->sk_state, sk->sk_user_data);
L
Linus Torvalds 已提交
775

776
	if (!svsk)
L
Linus Torvalds 已提交
777
		printk("svc: socket %p: no user data\n", sk);
778
	else {
779
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
780
		svc_xprt_enqueue(&svsk->sk_xprt);
L
Linus Torvalds 已提交
781
	}
E
Eric Dumazet 已提交
782 783
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible_all(sk_sleep(sk));
L
Linus Torvalds 已提交
784 785
}

786
static void svc_tcp_data_ready(struct sock *sk, int count)
L
Linus Torvalds 已提交
787
{
788
	struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
L
Linus Torvalds 已提交
789 790

	dprintk("svc: socket %p TCP data ready (svsk %p)\n",
791 792
		sk, sk->sk_user_data);
	if (svsk) {
793
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
794
		svc_xprt_enqueue(&svsk->sk_xprt);
795
	}
E
Eric Dumazet 已提交
796 797
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
L
Linus Torvalds 已提交
798 799 800 801 802
}

/*
 * Accept a TCP connection
 */
803
static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
L
Linus Torvalds 已提交
804
{
805
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
806 807
	struct sockaddr_storage addr;
	struct sockaddr	*sin = (struct sockaddr *) &addr;
808
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
L
Linus Torvalds 已提交
809 810 811 812
	struct socket	*sock = svsk->sk_sock;
	struct socket	*newsock;
	struct svc_sock	*newsvsk;
	int		err, slen;
813
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
814 815 816

	dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
	if (!sock)
817
		return NULL;
L
Linus Torvalds 已提交
818

819
	clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
820 821
	err = kernel_accept(sock, &newsock, O_NONBLOCK);
	if (err < 0) {
L
Linus Torvalds 已提交
822 823 824
		if (err == -ENOMEM)
			printk(KERN_WARNING "%s: no more sockets!\n",
			       serv->sv_name);
825
		else if (err != -EAGAIN && net_ratelimit())
L
Linus Torvalds 已提交
826 827
			printk(KERN_WARNING "%s: accept failed (err %d)!\n",
				   serv->sv_name, -err);
828
		return NULL;
L
Linus Torvalds 已提交
829
	}
830
	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
831

832
	err = kernel_getpeername(newsock, sin, &slen);
L
Linus Torvalds 已提交
833 834 835 836 837 838 839 840
	if (err < 0) {
		if (net_ratelimit())
			printk(KERN_WARNING "%s: peername failed (err %d)!\n",
				   serv->sv_name, -err);
		goto failed;		/* aborted connection or whatever */
	}

	/* Ideally, we would want to reject connections from unauthorized
841 842
	 * hosts here, but when we get encryption, the IP of the host won't
	 * tell us anything.  For now just warn about unpriv connections.
L
Linus Torvalds 已提交
843
	 */
844
	if (!svc_port_is_privileged(sin)) {
L
Linus Torvalds 已提交
845
		dprintk(KERN_WARNING
846
			"%s: connect from unprivileged port: %s\n",
847
			serv->sv_name,
848
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
849
	}
850
	dprintk("%s: connect from %s\n", serv->sv_name,
851
		__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
852 853 854 855 856 857

	/* make sure that a write doesn't block forever when
	 * low on memory
	 */
	newsock->sk->sk_sndtimeo = HZ*30;

858 859
	if (!(newsvsk = svc_setup_socket(serv, newsock, &err,
				 (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY))))
L
Linus Torvalds 已提交
860
		goto failed;
861
	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
862 863 864 865 866
	err = kernel_getsockname(newsock, sin, &slen);
	if (unlikely(err < 0)) {
		dprintk("svc_tcp_accept: kernel_getsockname error %d\n", -err);
		slen = offsetof(struct sockaddr, sa_data);
	}
867
	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
868

869 870 871 872 873 874 875 876 877 878
	if (serv->sv_stats)
		serv->sv_stats->nettcpconn++;

	return &newsvsk->sk_xprt;

failed:
	sock_release(newsock);
	return NULL;
}

L
Linus Torvalds 已提交
879
/*
880 881 882 883
 * Receive data.
 * If we haven't gotten the record length yet, get the next four bytes.
 * Otherwise try to gobble up as much as possible up to the complete
 * record length.
L
Linus Torvalds 已提交
884
 */
885
static int svc_tcp_recv_record(struct svc_sock *svsk, struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
886
{
887
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
888
	int len;
L
Linus Torvalds 已提交
889

890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906
	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
		/* sndbuf needs to have room for one request
		 * per thread, otherwise we can stall even when the
		 * network isn't a bottleneck.
		 *
		 * We count all threads rather than threads in a
		 * particular pool, which provides an upper bound
		 * on the number of threads which will access the socket.
		 *
		 * rcvbuf just needs to be able to hold a few requests.
		 * Normally they will be removed from the queue
		 * as soon a a complete request arrives.
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    (serv->sv_nrthreads+3) * serv->sv_max_mesg,
				    3 * serv->sv_max_mesg);

907
	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
908

909 910
	if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
		int		want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
L
Linus Torvalds 已提交
911 912 913 914 915 916 917 918 919
		struct kvec	iov;

		iov.iov_base = ((char *) &svsk->sk_reclen) + svsk->sk_tcplen;
		iov.iov_len  = want;
		if ((len = svc_recvfrom(rqstp, &iov, 1, want)) < 0)
			goto error;
		svsk->sk_tcplen += len;

		if (len < want) {
920 921
			dprintk("svc: short recvfrom while reading record "
				"length (%d of %d)\n", len, want);
922
			goto err_again; /* record header not complete */
L
Linus Torvalds 已提交
923 924 925
		}

		svsk->sk_reclen = ntohl(svsk->sk_reclen);
926
		if (!(svsk->sk_reclen & RPC_LAST_STREAM_FRAGMENT)) {
L
Linus Torvalds 已提交
927 928 929 930 931
			/* FIXME: technically, a record can be fragmented,
			 *  and non-terminal fragments will not have the top
			 *  bit set in the fragment length header.
			 *  But apparently no known nfs clients send fragmented
			 *  records. */
932
			if (net_ratelimit())
933 934
				printk(KERN_NOTICE "RPC: multiple fragments "
					"per record not supported\n");
L
Linus Torvalds 已提交
935 936
			goto err_delete;
		}
937

938
		svsk->sk_reclen &= RPC_FRAGMENT_SIZE_MASK;
L
Linus Torvalds 已提交
939
		dprintk("svc: TCP record, %d bytes\n", svsk->sk_reclen);
940
		if (svsk->sk_reclen > serv->sv_max_mesg) {
941
			if (net_ratelimit())
942 943 944
				printk(KERN_NOTICE "RPC: "
					"fragment too large: 0x%08lx\n",
					(unsigned long)svsk->sk_reclen);
L
Linus Torvalds 已提交
945 946 947 948 949 950 951 952 953 954 955 956
			goto err_delete;
		}
	}

	/* Check whether enough data is available */
	len = svc_recv_available(svsk);
	if (len < 0)
		goto error;

	if (len < svsk->sk_reclen) {
		dprintk("svc: incomplete TCP record (%d of %d)\n",
			len, svsk->sk_reclen);
957
		goto err_again;	/* record not complete */
L
Linus Torvalds 已提交
958 959
	}
	len = svsk->sk_reclen;
960
	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
961

962 963
	return len;
 error:
964
	if (len == -EAGAIN)
965 966 967 968 969 970 971 972
		dprintk("RPC: TCP recv_record got EAGAIN\n");
	return len;
 err_delete:
	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
 err_again:
	return -EAGAIN;
}

973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023
static int svc_process_calldir(struct svc_sock *svsk, struct svc_rqst *rqstp,
			       struct rpc_rqst **reqpp, struct kvec *vec)
{
	struct rpc_rqst *req = NULL;
	u32 *p;
	u32 xid;
	u32 calldir;
	int len;

	len = svc_recvfrom(rqstp, vec, 1, 8);
	if (len < 0)
		goto error;

	p = (u32 *)rqstp->rq_arg.head[0].iov_base;
	xid = *p++;
	calldir = *p;

	if (calldir == 0) {
		/* REQUEST is the most common case */
		vec[0] = rqstp->rq_arg.head[0];
	} else {
		/* REPLY */
		if (svsk->sk_bc_xprt)
			req = xprt_lookup_rqst(svsk->sk_bc_xprt, xid);

		if (!req) {
			printk(KERN_NOTICE
				"%s: Got unrecognized reply: "
				"calldir 0x%x sk_bc_xprt %p xid %08x\n",
				__func__, ntohl(calldir),
				svsk->sk_bc_xprt, xid);
			vec[0] = rqstp->rq_arg.head[0];
			goto out;
		}

		memcpy(&req->rq_private_buf, &req->rq_rcv_buf,
		       sizeof(struct xdr_buf));
		/* copy the xid and call direction */
		memcpy(req->rq_private_buf.head[0].iov_base,
		       rqstp->rq_arg.head[0].iov_base, 8);
		vec[0] = req->rq_private_buf.head[0];
	}
 out:
	vec[0].iov_base += 8;
	vec[0].iov_len -= 8;
	len = svsk->sk_reclen - 8;
 error:
	*reqpp = req;
	return len;
}

1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034
/*
 * Receive data from a TCP socket.
 */
static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
{
	struct svc_sock	*svsk =
		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
	int		len;
	struct kvec *vec;
	int pnum, vlen;
1035
	struct rpc_rqst *req = NULL;
1036 1037 1038 1039 1040 1041 1042 1043 1044 1045

	dprintk("svc: tcp_recv %p data %d conn %d close %d\n",
		svsk, test_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags),
		test_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags));

	len = svc_tcp_recv_record(svsk, rqstp);
	if (len < 0)
		goto error;

1046
	vec = rqstp->rq_vec;
L
Linus Torvalds 已提交
1047 1048
	vec[0] = rqstp->rq_arg.head[0];
	vlen = PAGE_SIZE;
1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064

	/*
	 * We have enough data for the whole tcp record. Let's try and read the
	 * first 8 bytes to get the xid and the call direction. We can use this
	 * to figure out if this is a call or a reply to a callback. If
	 * sk_reclen is < 8 (xid and calldir), then this is a malformed packet.
	 * In that case, don't bother with the calldir and just read the data.
	 * It will be rejected in svc_process.
	 */
	if (len >= 8) {
		len = svc_process_calldir(svsk, rqstp, &req, vec);
		if (len < 0)
			goto err_again;
		vlen -= 8;
	}

L
Linus Torvalds 已提交
1065 1066
	pnum = 1;
	while (vlen < len) {
1067 1068 1069
		vec[pnum].iov_base = (req) ?
			page_address(req->rq_private_buf.pages[pnum - 1]) :
			page_address(rqstp->rq_pages[pnum]);
L
Linus Torvalds 已提交
1070 1071 1072 1073
		vec[pnum].iov_len = PAGE_SIZE;
		pnum++;
		vlen += PAGE_SIZE;
	}
1074
	rqstp->rq_respages = &rqstp->rq_pages[pnum];
L
Linus Torvalds 已提交
1075 1076 1077 1078

	/* Now receive data */
	len = svc_recvfrom(rqstp, vec, pnum, len);
	if (len < 0)
1079
		goto err_again;
L
Linus Torvalds 已提交
1080

1081 1082 1083 1084 1085 1086 1087 1088 1089 1090
	/*
	 * Account for the 8 bytes we read earlier
	 */
	len += 8;

	if (req) {
		xprt_complete_rqst(req->rq_task, len);
		len = 0;
		goto out;
	}
L
Linus Torvalds 已提交
1091 1092 1093 1094 1095 1096 1097 1098 1099 1100
	dprintk("svc: TCP complete record (%d bytes)\n", len);
	rqstp->rq_arg.len = len;
	rqstp->rq_arg.page_base = 0;
	if (len <= rqstp->rq_arg.head[0].iov_len) {
		rqstp->rq_arg.head[0].iov_len = len;
		rqstp->rq_arg.page_len = 0;
	} else {
		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
	}

1101
	rqstp->rq_xprt_ctxt   = NULL;
L
Linus Torvalds 已提交
1102 1103
	rqstp->rq_prot	      = IPPROTO_TCP;

1104
out:
L
Linus Torvalds 已提交
1105 1106 1107 1108
	/* Reset TCP read info */
	svsk->sk_reclen = 0;
	svsk->sk_tcplen = 0;

1109
	svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
L
Linus Torvalds 已提交
1110 1111 1112 1113 1114
	if (serv->sv_stats)
		serv->sv_stats->nettcpcnt++;

	return len;

1115
err_again:
L
Linus Torvalds 已提交
1116 1117
	if (len == -EAGAIN) {
		dprintk("RPC: TCP recvfrom got EAGAIN\n");
1118 1119 1120 1121
		return len;
	}
error:
	if (len != -EAGAIN) {
L
Linus Torvalds 已提交
1122
		printk(KERN_NOTICE "%s: recvfrom returned errno %d\n",
1123
		       svsk->sk_xprt.xpt_server->sv_name, -len);
1124
		set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1125
	}
1126
	return -EAGAIN;
L
Linus Torvalds 已提交
1127 1128 1129 1130 1131
}

/*
 * Send out data on TCP socket.
 */
1132
static int svc_tcp_sendto(struct svc_rqst *rqstp)
L
Linus Torvalds 已提交
1133 1134 1135
{
	struct xdr_buf	*xbufp = &rqstp->rq_res;
	int sent;
1136
	__be32 reclen;
L
Linus Torvalds 已提交
1137 1138 1139 1140 1141 1142 1143 1144 1145 1146

	/* Set up the first element of the reply kvec.
	 * Any other kvecs that may be in use have been taken
	 * care of by the server implementation itself.
	 */
	reclen = htonl(0x80000000|((xbufp->len ) - 4));
	memcpy(xbufp->head[0].iov_base, &reclen, 4);

	sent = svc_sendto(rqstp, &rqstp->rq_res);
	if (sent != xbufp->len) {
1147 1148 1149
		printk(KERN_NOTICE
		       "rpc-srv/tcp: %s: %s %d when sending %d bytes "
		       "- shutting down socket\n",
1150
		       rqstp->rq_xprt->xpt_server->sv_name,
L
Linus Torvalds 已提交
1151 1152
		       (sent<0)?"got error":"sent only",
		       sent, xbufp->len);
1153
		set_bit(XPT_CLOSE, &rqstp->rq_xprt->xpt_flags);
1154
		svc_xprt_enqueue(rqstp->rq_xprt);
L
Linus Torvalds 已提交
1155 1156 1157 1158 1159
		sent = -EAGAIN;
	}
	return sent;
}

T
Tom Tucker 已提交
1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170
/*
 * Setup response header. TCP has a 4B record length field.
 */
static void svc_tcp_prep_reply_hdr(struct svc_rqst *rqstp)
{
	struct kvec *resv = &rqstp->rq_res.head[0];

	/* tcp needs a space for the record length... */
	svc_putnl(resv, 0);
}

1171 1172
static int svc_tcp_has_wspace(struct svc_xprt *xprt)
{
1173
	struct svc_sock *svsk =	container_of(xprt, struct svc_sock, sk_xprt);
1174
	struct svc_serv *serv = svsk->sk_xprt.xpt_server;
1175 1176
	int required;

1177 1178 1179 1180 1181
	if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
		return 1;
	required = atomic_read(&xprt->xpt_reserved) + serv->sv_max_mesg;
	if (sk_stream_wspace(svsk->sk_sk) >= required)
		return 1;
1182
	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
1183
	return 0;
1184 1185
}

1186
static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
1187
				       struct net *net,
1188 1189 1190
				       struct sockaddr *sa, int salen,
				       int flags)
{
1191
	return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
1192 1193
}

1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224
#if defined(CONFIG_NFS_V4_1)
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *, int,
					     struct net *, struct sockaddr *,
					     int, int);
static void svc_bc_sock_free(struct svc_xprt *xprt);

static struct svc_xprt *svc_bc_tcp_create(struct svc_serv *serv,
				       struct net *net,
				       struct sockaddr *sa, int salen,
				       int flags)
{
	return svc_bc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
}

static void svc_bc_tcp_sock_detach(struct svc_xprt *xprt)
{
}

static struct svc_xprt_ops svc_tcp_bc_ops = {
	.xpo_create = svc_bc_tcp_create,
	.xpo_detach = svc_bc_tcp_sock_detach,
	.xpo_free = svc_bc_sock_free,
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
};

static struct svc_xprt_class svc_tcp_bc_class = {
	.xcl_name = "tcp-bc",
	.xcl_owner = THIS_MODULE,
	.xcl_ops = &svc_tcp_bc_ops,
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
};
1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242

static void svc_init_bc_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_bc_class);
}

static void svc_cleanup_bc_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_bc_class);
}
#else /* CONFIG_NFS_V4_1 */
static void svc_init_bc_xprt_sock(void)
{
}

static void svc_cleanup_bc_xprt_sock(void)
{
}
1243 1244
#endif /* CONFIG_NFS_V4_1 */

1245
static struct svc_xprt_ops svc_tcp_ops = {
1246
	.xpo_create = svc_tcp_create,
1247 1248
	.xpo_recvfrom = svc_tcp_recvfrom,
	.xpo_sendto = svc_tcp_sendto,
1249
	.xpo_release_rqst = svc_release_skb,
1250
	.xpo_detach = svc_tcp_sock_detach,
1251
	.xpo_free = svc_sock_free,
T
Tom Tucker 已提交
1252
	.xpo_prep_reply_hdr = svc_tcp_prep_reply_hdr,
1253
	.xpo_has_wspace = svc_tcp_has_wspace,
1254
	.xpo_accept = svc_tcp_accept,
1255 1256 1257 1258
};

static struct svc_xprt_class svc_tcp_class = {
	.xcl_name = "tcp",
1259
	.xcl_owner = THIS_MODULE,
1260
	.xcl_ops = &svc_tcp_ops,
1261
	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
1262 1263 1264 1265 1266 1267
};

void svc_init_xprt_sock(void)
{
	svc_reg_xprt_class(&svc_tcp_class);
	svc_reg_xprt_class(&svc_udp_class);
1268
	svc_init_bc_xprt_sock();
1269 1270 1271 1272 1273 1274
}

void svc_cleanup_xprt_sock(void)
{
	svc_unreg_xprt_class(&svc_tcp_class);
	svc_unreg_xprt_class(&svc_udp_class);
1275
	svc_cleanup_bc_xprt_sock();
1276 1277
}

1278
static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
L
Linus Torvalds 已提交
1279 1280 1281
{
	struct sock	*sk = svsk->sk_sk;

1282
	svc_xprt_init(&svc_tcp_class, &svsk->sk_xprt, serv);
1283
	set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1284 1285
	if (sk->sk_state == TCP_LISTEN) {
		dprintk("setting up TCP socket for listening\n");
1286
		set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1287
		sk->sk_data_ready = svc_tcp_listen_data_ready;
1288
		set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1289 1290 1291 1292
	} else {
		dprintk("setting up TCP socket for reading\n");
		sk->sk_state_change = svc_tcp_state_change;
		sk->sk_data_ready = svc_tcp_data_ready;
1293
		sk->sk_write_space = svc_tcp_write_space;
L
Linus Torvalds 已提交
1294 1295 1296 1297

		svsk->sk_reclen = 0;
		svsk->sk_tcplen = 0;

1298
		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
L
Linus Torvalds 已提交
1299

1300 1301 1302 1303 1304 1305 1306 1307 1308
		/* initialise setting must have enough space to
		 * receive and respond to one request.
		 * svc_tcp_recvfrom will re-adjust if necessary
		 */
		svc_sock_setbufsize(svsk->sk_sock,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg,
				    3 * svsk->sk_xprt.xpt_server->sv_max_mesg);

		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1309
		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
1310
		if (sk->sk_state != TCP_ESTABLISHED)
1311
			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1312 1313 1314
	}
}

1315
void svc_sock_update_bufs(struct svc_serv *serv)
L
Linus Torvalds 已提交
1316 1317 1318 1319 1320
{
	/*
	 * The number of server threads has changed. Update
	 * rcvbuf and sndbuf accordingly on all sockets
	 */
1321
	struct svc_sock *svsk;
L
Linus Torvalds 已提交
1322 1323

	spin_lock_bh(&serv->sv_lock);
1324
	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
1325
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
1326
	list_for_each_entry(svsk, &serv->sv_tempsocks, sk_xprt.xpt_list)
1327
		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
L
Linus Torvalds 已提交
1328 1329
	spin_unlock_bh(&serv->sv_lock);
}
1330
EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
L
Linus Torvalds 已提交
1331 1332 1333 1334 1335

/*
 * Initialize socket for RPC use and create svc_sock struct
 * XXX: May want to setsockopt SO_SNDBUF and SO_RCVBUF.
 */
1336 1337 1338
static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
						struct socket *sock,
						int *errp, int flags)
L
Linus Torvalds 已提交
1339 1340 1341
{
	struct svc_sock	*svsk;
	struct sock	*inet;
1342
	int		pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
L
Linus Torvalds 已提交
1343 1344

	dprintk("svc: svc_setup_socket %p\n", sock);
1345
	if (!(svsk = kzalloc(sizeof(*svsk), GFP_KERNEL))) {
L
Linus Torvalds 已提交
1346 1347 1348 1349 1350 1351 1352 1353
		*errp = -ENOMEM;
		return NULL;
	}

	inet = sock->sk;

	/* Register socket with portmapper */
	if (*errp >= 0 && pmap_register)
1354
		*errp = svc_register(serv, inet->sk_family, inet->sk_protocol,
E
Eric Dumazet 已提交
1355
				     ntohs(inet_sk(inet)->inet_sport));
L
Linus Torvalds 已提交
1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370

	if (*errp < 0) {
		kfree(svsk);
		return NULL;
	}

	inet->sk_user_data = svsk;
	svsk->sk_sock = sock;
	svsk->sk_sk = inet;
	svsk->sk_ostate = inet->sk_state_change;
	svsk->sk_odata = inet->sk_data_ready;
	svsk->sk_owspace = inet->sk_write_space;

	/* Initialize the socket */
	if (sock->type == SOCK_DGRAM)
1371
		svc_udp_init(svsk, serv);
1372
	else
1373
		svc_tcp_init(svsk, serv);
L
Linus Torvalds 已提交
1374 1375 1376 1377 1378 1379 1380

	dprintk("svc: svc_setup_socket created %p (inet %p)\n",
				svsk, svsk->sk_sk);

	return svsk;
}

1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393
/**
 * svc_addsock - add a listener socket to an RPC service
 * @serv: pointer to RPC service to which to add a new listener
 * @fd: file descriptor of the new listener
 * @name_return: pointer to buffer to fill in with name of listener
 * @len: size of the buffer
 *
 * Fills in socket name and returns positive length of name if successful.
 * Name is terminated with '\n'.  On error, returns a negative errno
 * value.
 */
int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
		const size_t len)
1394 1395 1396 1397 1398 1399 1400
{
	int err = 0;
	struct socket *so = sockfd_lookup(fd, &err);
	struct svc_sock *svsk = NULL;

	if (!so)
		return err;
1401
	if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
1402 1403 1404 1405 1406 1407 1408
		err =  -EAFNOSUPPORT;
	else if (so->sk->sk_protocol != IPPROTO_TCP &&
	    so->sk->sk_protocol != IPPROTO_UDP)
		err =  -EPROTONOSUPPORT;
	else if (so->state > SS_UNCONNECTED)
		err = -EISCONN;
	else {
1409 1410 1411 1412 1413
		if (!try_module_get(THIS_MODULE))
			err = -ENOENT;
		else
			svsk = svc_setup_socket(serv, so, &err,
						SVC_SOCK_DEFAULTS);
1414
		if (svsk) {
1415 1416 1417 1418 1419
			struct sockaddr_storage addr;
			struct sockaddr *sin = (struct sockaddr *)&addr;
			int salen;
			if (kernel_getsockname(svsk->sk_sock, sin, &salen) == 0)
				svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
1420 1421 1422 1423
			clear_bit(XPT_TEMP, &svsk->sk_xprt.xpt_flags);
			spin_lock_bh(&serv->sv_lock);
			list_add(&svsk->sk_xprt.xpt_list, &serv->sv_permsocks);
			spin_unlock_bh(&serv->sv_lock);
1424
			svc_xprt_received(&svsk->sk_xprt);
1425
			err = 0;
1426 1427
		} else
			module_put(THIS_MODULE);
1428 1429 1430 1431 1432
	}
	if (err) {
		sockfd_put(so);
		return err;
	}
1433
	return svc_one_sock_name(svsk, name_return, len);
1434 1435 1436
}
EXPORT_SYMBOL_GPL(svc_addsock);

L
Linus Torvalds 已提交
1437 1438 1439
/*
 * Create socket for RPC service.
 */
1440 1441
static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
					  int protocol,
1442
					  struct net *net,
1443 1444
					  struct sockaddr *sin, int len,
					  int flags)
L
Linus Torvalds 已提交
1445 1446 1447 1448 1449
{
	struct svc_sock	*svsk;
	struct socket	*sock;
	int		error;
	int		type;
1450 1451 1452
	struct sockaddr_storage addr;
	struct sockaddr *newsin = (struct sockaddr *)&addr;
	int		newlen;
1453 1454
	int		family;
	int		val;
1455
	RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]);
L
Linus Torvalds 已提交
1456

1457 1458
	dprintk("svc: svc_create_socket(%s, %d, %s)\n",
			serv->sv_program->pg_name, protocol,
1459
			__svc_print_addr(sin, buf, sizeof(buf)));
L
Linus Torvalds 已提交
1460 1461 1462 1463

	if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only UDP and TCP "
				"sockets supported\n");
1464
		return ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
1465
	}
1466

L
Linus Torvalds 已提交
1467
	type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
1468 1469 1470 1471 1472 1473 1474 1475 1476 1477
	switch (sin->sa_family) {
	case AF_INET6:
		family = PF_INET6;
		break;
	case AF_INET:
		family = PF_INET;
		break;
	default:
		return ERR_PTR(-EINVAL);
	}
L
Linus Torvalds 已提交
1478

1479
	error = __sock_create(net, family, type, protocol, &sock, 1);
1480
	if (error < 0)
1481
		return ERR_PTR(error);
L
Linus Torvalds 已提交
1482

1483 1484
	svc_reclassify_socket(sock);

1485 1486 1487 1488 1489 1490 1491 1492 1493 1494
	/*
	 * If this is an PF_INET6 listener, we want to avoid
	 * getting requests from IPv4 remotes.  Those should
	 * be shunted to a PF_INET listener via rpcbind.
	 */
	val = 1;
	if (family == PF_INET6)
		kernel_setsockopt(sock, SOL_IPV6, IPV6_V6ONLY,
					(char *)&val, sizeof(val));

1495
	if (type == SOCK_STREAM)
1496 1497
		sock->sk->sk_reuse = 1;		/* allow address reuse */
	error = kernel_bind(sock, sin, len);
1498 1499
	if (error < 0)
		goto bummer;
L
Linus Torvalds 已提交
1500

1501 1502 1503 1504 1505
	newlen = len;
	error = kernel_getsockname(sock, newsin, &newlen);
	if (error < 0)
		goto bummer;

L
Linus Torvalds 已提交
1506
	if (protocol == IPPROTO_TCP) {
1507
		if ((error = kernel_listen(sock, 64)) < 0)
L
Linus Torvalds 已提交
1508 1509 1510
			goto bummer;
	}

1511
	if ((svsk = svc_setup_socket(serv, sock, &error, flags)) != NULL) {
1512
		svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
1513
		return (struct svc_xprt *)svsk;
1514
	}
L
Linus Torvalds 已提交
1515 1516 1517 1518

bummer:
	dprintk("svc: svc_create_socket error = %d\n", -error);
	sock_release(sock);
1519
	return ERR_PTR(error);
L
Linus Torvalds 已提交
1520 1521
}

1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536
/*
 * Detach the svc_sock from the socket so that no
 * more callbacks occur.
 */
static void svc_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	struct sock *sk = svsk->sk_sk;

	dprintk("svc: svc_sock_detach(%p)\n", svsk);

	/* put back the old socket callbacks */
	sk->sk_state_change = svsk->sk_ostate;
	sk->sk_data_ready = svsk->sk_odata;
	sk->sk_write_space = svsk->sk_owspace;
1537

E
Eric Dumazet 已提交
1538 1539
	if (sk_sleep(sk) && waitqueue_active(sk_sleep(sk)))
		wake_up_interruptible(sk_sleep(sk));
1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554
}

/*
 * Disconnect the socket, and reset the callbacks
 */
static void svc_tcp_sock_detach(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);

	dprintk("svc: svc_tcp_sock_detach(%p)\n", svsk);

	svc_sock_detach(xprt);

	if (!test_bit(XPT_LISTENER, &xprt->xpt_flags))
		kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570
}

/*
 * Free the svc_sock's socket resources and the svc_sock itself.
 */
static void svc_sock_free(struct svc_xprt *xprt)
{
	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
	dprintk("svc: svc_sock_free(%p)\n", svsk);

	if (svsk->sk_sock->file)
		sockfd_put(svsk->sk_sock);
	else
		sock_release(svsk->sk_sock);
	kfree(svsk);
}
1571

1572
#if defined(CONFIG_NFS_V4_1)
1573
/*
1574
 * Create a back channel svc_xprt which shares the fore channel socket.
1575
 */
1576 1577 1578 1579 1580
static struct svc_xprt *svc_bc_create_socket(struct svc_serv *serv,
					     int protocol,
					     struct net *net,
					     struct sockaddr *sin, int len,
					     int flags)
1581 1582
{
	struct svc_sock *svsk;
1583 1584 1585 1586 1587 1588 1589
	struct svc_xprt *xprt;

	if (protocol != IPPROTO_TCP) {
		printk(KERN_WARNING "svc: only TCP sockets"
			" supported on shared back channel\n");
		return ERR_PTR(-EINVAL);
	}
1590 1591 1592

	svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
	if (!svsk)
1593
		return ERR_PTR(-ENOMEM);
1594 1595

	xprt = &svsk->sk_xprt;
1596 1597 1598 1599
	svc_xprt_init(&svc_tcp_bc_class, xprt, serv);

	serv->bc_xprt = xprt;

1600 1601 1602 1603
	return xprt;
}

/*
1604
 * Free a back channel svc_sock.
1605
 */
1606
static void svc_bc_sock_free(struct svc_xprt *xprt)
1607 1608 1609 1610
{
	if (xprt)
		kfree(container_of(xprt, struct svc_sock, sk_xprt));
}
1611
#endif /* CONFIG_NFS_V4_1 */