xref: /openbmc/linux/net/sunrpc/xprtsock.c (revision 61677eeec29e87edc03a1061ae0a04b92507450d)
1a246b010SChuck Lever /*
2a246b010SChuck Lever  * linux/net/sunrpc/xprtsock.c
3a246b010SChuck Lever  *
4a246b010SChuck Lever  * Client-side transport implementation for sockets.
5a246b010SChuck Lever  *
6113aa838SAlan Cox  * TCP callback races fixes (C) 1998 Red Hat
7113aa838SAlan Cox  * TCP send fixes (C) 1998 Red Hat
8a246b010SChuck Lever  * TCP NFS related read + write fixes
9a246b010SChuck Lever  *  (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
10a246b010SChuck Lever  *
11a246b010SChuck Lever  * Rewrite of larges part of the code in order to stabilize TCP stuff.
12a246b010SChuck Lever  * Fix behaviour when socket buffer is full.
13a246b010SChuck Lever  *  (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
1455aa4f58SChuck Lever  *
1555aa4f58SChuck Lever  * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
168f9d5b1aSChuck Lever  *
178f9d5b1aSChuck Lever  * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
188f9d5b1aSChuck Lever  *   <gilles.quillard@bull.net>
19a246b010SChuck Lever  */
20a246b010SChuck Lever 
21a246b010SChuck Lever #include <linux/types.h>
22a246b010SChuck Lever #include <linux/slab.h>
23bc25571eS\"Talpey, Thomas\ #include <linux/module.h>
24a246b010SChuck Lever #include <linux/capability.h>
25a246b010SChuck Lever #include <linux/pagemap.h>
26a246b010SChuck Lever #include <linux/errno.h>
27a246b010SChuck Lever #include <linux/socket.h>
28a246b010SChuck Lever #include <linux/in.h>
29a246b010SChuck Lever #include <linux/net.h>
30a246b010SChuck Lever #include <linux/mm.h>
31a246b010SChuck Lever #include <linux/udp.h>
32a246b010SChuck Lever #include <linux/tcp.h>
33a246b010SChuck Lever #include <linux/sunrpc/clnt.h>
3402107148SChuck Lever #include <linux/sunrpc/sched.h>
354cfc7e60SRahul Iyer #include <linux/sunrpc/svcsock.h>
3649c36fccS\"Talpey, Thomas\ #include <linux/sunrpc/xprtsock.h>
37a246b010SChuck Lever #include <linux/file.h>
3844b98efdSRicardo Labiaga #ifdef CONFIG_NFS_V4_1
3944b98efdSRicardo Labiaga #include <linux/sunrpc/bc_xprt.h>
4044b98efdSRicardo Labiaga #endif
41a246b010SChuck Lever 
42a246b010SChuck Lever #include <net/sock.h>
43a246b010SChuck Lever #include <net/checksum.h>
44a246b010SChuck Lever #include <net/udp.h>
45a246b010SChuck Lever #include <net/tcp.h>
46a246b010SChuck Lever 
474cfc7e60SRahul Iyer #include "sunrpc.h"
489903cd1cSChuck Lever /*
49c556b754SChuck Lever  * xprtsock tunables
50c556b754SChuck Lever  */
51c556b754SChuck Lever unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
52c556b754SChuck Lever unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE;
53c556b754SChuck Lever 
54c556b754SChuck Lever unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
55c556b754SChuck Lever unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;
56c556b754SChuck Lever 
577d1e8255STrond Myklebust #define XS_TCP_LINGER_TO	(15U * HZ)
5825fe6142STrond Myklebust static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO;
597d1e8255STrond Myklebust 
60c556b754SChuck Lever /*
61fbf76683SChuck Lever  * We can register our own files under /proc/sys/sunrpc by
62fbf76683SChuck Lever  * calling register_sysctl_table() again.  The files in that
63fbf76683SChuck Lever  * directory become the union of all files registered there.
64fbf76683SChuck Lever  *
65fbf76683SChuck Lever  * We simply need to make sure that we don't collide with
66fbf76683SChuck Lever  * someone else's file names!
67fbf76683SChuck Lever  */
68fbf76683SChuck Lever 
69fbf76683SChuck Lever #ifdef RPC_DEBUG
70fbf76683SChuck Lever 
71fbf76683SChuck Lever static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
72fbf76683SChuck Lever static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
73fbf76683SChuck Lever static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
74fbf76683SChuck Lever static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;
75fbf76683SChuck Lever 
76fbf76683SChuck Lever static struct ctl_table_header *sunrpc_table_header;
77fbf76683SChuck Lever 
78fbf76683SChuck Lever /*
79fbf76683SChuck Lever  * FIXME: changing the UDP slot table size should also resize the UDP
80fbf76683SChuck Lever  *        socket buffers for existing UDP transports
81fbf76683SChuck Lever  */
82fbf76683SChuck Lever static ctl_table xs_tunables_table[] = {
83fbf76683SChuck Lever 	{
84fbf76683SChuck Lever 		.procname	= "udp_slot_table_entries",
85fbf76683SChuck Lever 		.data		= &xprt_udp_slot_table_entries,
86fbf76683SChuck Lever 		.maxlen		= sizeof(unsigned int),
87fbf76683SChuck Lever 		.mode		= 0644,
886d456111SEric W. Biederman 		.proc_handler	= proc_dointvec_minmax,
89fbf76683SChuck Lever 		.extra1		= &min_slot_table_size,
90fbf76683SChuck Lever 		.extra2		= &max_slot_table_size
91fbf76683SChuck Lever 	},
92fbf76683SChuck Lever 	{
93fbf76683SChuck Lever 		.procname	= "tcp_slot_table_entries",
94fbf76683SChuck Lever 		.data		= &xprt_tcp_slot_table_entries,
95fbf76683SChuck Lever 		.maxlen		= sizeof(unsigned int),
96fbf76683SChuck Lever 		.mode		= 0644,
976d456111SEric W. Biederman 		.proc_handler	= proc_dointvec_minmax,
98fbf76683SChuck Lever 		.extra1		= &min_slot_table_size,
99fbf76683SChuck Lever 		.extra2		= &max_slot_table_size
100fbf76683SChuck Lever 	},
101fbf76683SChuck Lever 	{
102fbf76683SChuck Lever 		.procname	= "min_resvport",
103fbf76683SChuck Lever 		.data		= &xprt_min_resvport,
104fbf76683SChuck Lever 		.maxlen		= sizeof(unsigned int),
105fbf76683SChuck Lever 		.mode		= 0644,
1066d456111SEric W. Biederman 		.proc_handler	= proc_dointvec_minmax,
107fbf76683SChuck Lever 		.extra1		= &xprt_min_resvport_limit,
108fbf76683SChuck Lever 		.extra2		= &xprt_max_resvport_limit
109fbf76683SChuck Lever 	},
110fbf76683SChuck Lever 	{
111fbf76683SChuck Lever 		.procname	= "max_resvport",
112fbf76683SChuck Lever 		.data		= &xprt_max_resvport,
113fbf76683SChuck Lever 		.maxlen		= sizeof(unsigned int),
114fbf76683SChuck Lever 		.mode		= 0644,
1156d456111SEric W. Biederman 		.proc_handler	= proc_dointvec_minmax,
116fbf76683SChuck Lever 		.extra1		= &xprt_min_resvport_limit,
117fbf76683SChuck Lever 		.extra2		= &xprt_max_resvport_limit
118fbf76683SChuck Lever 	},
119fbf76683SChuck Lever 	{
12025fe6142STrond Myklebust 		.procname	= "tcp_fin_timeout",
12125fe6142STrond Myklebust 		.data		= &xs_tcp_fin_timeout,
12225fe6142STrond Myklebust 		.maxlen		= sizeof(xs_tcp_fin_timeout),
12325fe6142STrond Myklebust 		.mode		= 0644,
1246d456111SEric W. Biederman 		.proc_handler	= proc_dointvec_jiffies,
12525fe6142STrond Myklebust 	},
126f8572d8fSEric W. Biederman 	{ },
127fbf76683SChuck Lever };
128fbf76683SChuck Lever 
129fbf76683SChuck Lever static ctl_table sunrpc_table[] = {
130fbf76683SChuck Lever 	{
131fbf76683SChuck Lever 		.procname	= "sunrpc",
132fbf76683SChuck Lever 		.mode		= 0555,
133fbf76683SChuck Lever 		.child		= xs_tunables_table
134fbf76683SChuck Lever 	},
135f8572d8fSEric W. Biederman 	{ },
136fbf76683SChuck Lever };
137fbf76683SChuck Lever 
138fbf76683SChuck Lever #endif
139fbf76683SChuck Lever 
140fbf76683SChuck Lever /*
14103bf4b70SChuck Lever  * Wait duration for a reply from the RPC portmapper.
14203bf4b70SChuck Lever  */
14303bf4b70SChuck Lever #define XS_BIND_TO		(60U * HZ)
14403bf4b70SChuck Lever 
14503bf4b70SChuck Lever /*
14603bf4b70SChuck Lever  * Delay if a UDP socket connect error occurs.  This is most likely some
14703bf4b70SChuck Lever  * kind of resource problem on the local host.
14803bf4b70SChuck Lever  */
14903bf4b70SChuck Lever #define XS_UDP_REEST_TO		(2U * HZ)
15003bf4b70SChuck Lever 
15103bf4b70SChuck Lever /*
15203bf4b70SChuck Lever  * The reestablish timeout allows clients to delay for a bit before attempting
15303bf4b70SChuck Lever  * to reconnect to a server that just dropped our connection.
15403bf4b70SChuck Lever  *
15503bf4b70SChuck Lever  * We implement an exponential backoff when trying to reestablish a TCP
15603bf4b70SChuck Lever  * transport connection with the server.  Some servers like to drop a TCP
15703bf4b70SChuck Lever  * connection when they are overworked, so we start with a short timeout and
15803bf4b70SChuck Lever  * increase over time if the server is down or not responding.
15903bf4b70SChuck Lever  */
16003bf4b70SChuck Lever #define XS_TCP_INIT_REEST_TO	(3U * HZ)
16103bf4b70SChuck Lever #define XS_TCP_MAX_REEST_TO	(5U * 60 * HZ)
16203bf4b70SChuck Lever 
16303bf4b70SChuck Lever /*
16403bf4b70SChuck Lever  * TCP idle timeout; client drops the transport socket if it is idle
16503bf4b70SChuck Lever  * for this long.  Note that we also timeout UDP sockets to prevent
16603bf4b70SChuck Lever  * holding port numbers when there is no RPC traffic.
16703bf4b70SChuck Lever  */
16803bf4b70SChuck Lever #define XS_IDLE_DISC_TO		(5U * 60 * HZ)
16903bf4b70SChuck Lever 
170a246b010SChuck Lever #ifdef RPC_DEBUG
171a246b010SChuck Lever # undef  RPC_DEBUG_DATA
1729903cd1cSChuck Lever # define RPCDBG_FACILITY	RPCDBG_TRANS
173a246b010SChuck Lever #endif
174a246b010SChuck Lever 
175a246b010SChuck Lever #ifdef RPC_DEBUG_DATA
1769903cd1cSChuck Lever static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
177a246b010SChuck Lever {
178a246b010SChuck Lever 	u8 *buf = (u8 *) packet;
179a246b010SChuck Lever 	int j;
180a246b010SChuck Lever 
181a246b010SChuck Lever 	dprintk("RPC:       %s\n", msg);
182a246b010SChuck Lever 	for (j = 0; j < count && j < 128; j += 4) {
183a246b010SChuck Lever 		if (!(j & 31)) {
184a246b010SChuck Lever 			if (j)
185a246b010SChuck Lever 				dprintk("\n");
186a246b010SChuck Lever 			dprintk("0x%04x ", j);
187a246b010SChuck Lever 		}
188a246b010SChuck Lever 		dprintk("%02x%02x%02x%02x ",
189a246b010SChuck Lever 			buf[j], buf[j+1], buf[j+2], buf[j+3]);
190a246b010SChuck Lever 	}
191a246b010SChuck Lever 	dprintk("\n");
192a246b010SChuck Lever }
193a246b010SChuck Lever #else
1949903cd1cSChuck Lever static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
195a246b010SChuck Lever {
196a246b010SChuck Lever 	/* NOP */
197a246b010SChuck Lever }
198a246b010SChuck Lever #endif
199a246b010SChuck Lever 
200ffc2e518SChuck Lever struct sock_xprt {
201ffc2e518SChuck Lever 	struct rpc_xprt		xprt;
202ee0ac0c2SChuck Lever 
203ee0ac0c2SChuck Lever 	/*
204ee0ac0c2SChuck Lever 	 * Network layer
205ee0ac0c2SChuck Lever 	 */
206ee0ac0c2SChuck Lever 	struct socket *		sock;
207ee0ac0c2SChuck Lever 	struct sock *		inet;
20851971139SChuck Lever 
20951971139SChuck Lever 	/*
21051971139SChuck Lever 	 * State of TCP reply receive
21151971139SChuck Lever 	 */
21251971139SChuck Lever 	__be32			tcp_fraghdr,
213b76ce561STrond Myklebust 				tcp_xid,
214b76ce561STrond Myklebust 				tcp_calldir;
21551971139SChuck Lever 
21651971139SChuck Lever 	u32			tcp_offset,
21751971139SChuck Lever 				tcp_reclen;
21851971139SChuck Lever 
21951971139SChuck Lever 	unsigned long		tcp_copied,
22051971139SChuck Lever 				tcp_flags;
221c8475461SChuck Lever 
222c8475461SChuck Lever 	/*
223c8475461SChuck Lever 	 * Connection of transports
224c8475461SChuck Lever 	 */
22534161db6STrond Myklebust 	struct delayed_work	connect_worker;
226fbfffbd5SChuck Lever 	struct sockaddr_storage	srcaddr;
227fbfffbd5SChuck Lever 	unsigned short		srcport;
2287c6e066eSChuck Lever 
2297c6e066eSChuck Lever 	/*
2307c6e066eSChuck Lever 	 * UDP socket buffer size parameters
2317c6e066eSChuck Lever 	 */
2327c6e066eSChuck Lever 	size_t			rcvsize,
2337c6e066eSChuck Lever 				sndsize;
234314dfd79SChuck Lever 
235314dfd79SChuck Lever 	/*
236314dfd79SChuck Lever 	 * Saved socket callback addresses
237314dfd79SChuck Lever 	 */
238314dfd79SChuck Lever 	void			(*old_data_ready)(struct sock *, int);
239314dfd79SChuck Lever 	void			(*old_state_change)(struct sock *);
240314dfd79SChuck Lever 	void			(*old_write_space)(struct sock *);
2412a9e1cfaSTrond Myklebust 	void			(*old_error_report)(struct sock *);
242ffc2e518SChuck Lever };
243ffc2e518SChuck Lever 
244e136d092SChuck Lever /*
245e136d092SChuck Lever  * TCP receive state flags
246e136d092SChuck Lever  */
247e136d092SChuck Lever #define TCP_RCV_LAST_FRAG	(1UL << 0)
248e136d092SChuck Lever #define TCP_RCV_COPY_FRAGHDR	(1UL << 1)
249e136d092SChuck Lever #define TCP_RCV_COPY_XID	(1UL << 2)
250e136d092SChuck Lever #define TCP_RCV_COPY_DATA	(1UL << 3)
251f4a2e418SRicardo Labiaga #define TCP_RCV_READ_CALLDIR	(1UL << 4)
252f4a2e418SRicardo Labiaga #define TCP_RCV_COPY_CALLDIR	(1UL << 5)
25318dca02aSRicardo Labiaga 
25418dca02aSRicardo Labiaga /*
25518dca02aSRicardo Labiaga  * TCP RPC flags
25618dca02aSRicardo Labiaga  */
257f4a2e418SRicardo Labiaga #define TCP_RPC_REPLY		(1UL << 6)
258e136d092SChuck Lever 
25995392c59SChuck Lever static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
260edb267a6SChuck Lever {
26195392c59SChuck Lever 	return (struct sockaddr *) &xprt->addr;
26295392c59SChuck Lever }
26395392c59SChuck Lever 
26495392c59SChuck Lever static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
26595392c59SChuck Lever {
26695392c59SChuck Lever 	return (struct sockaddr_in *) &xprt->addr;
26795392c59SChuck Lever }
26895392c59SChuck Lever 
26995392c59SChuck Lever static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
27095392c59SChuck Lever {
27195392c59SChuck Lever 	return (struct sockaddr_in6 *) &xprt->addr;
27295392c59SChuck Lever }
27395392c59SChuck Lever 
274c877b849SChuck Lever static void xs_format_common_peer_addresses(struct rpc_xprt *xprt)
275c877b849SChuck Lever {
276c877b849SChuck Lever 	struct sockaddr *sap = xs_addr(xprt);
2779dc3b095SChuck Lever 	struct sockaddr_in6 *sin6;
2789dc3b095SChuck Lever 	struct sockaddr_in *sin;
279c877b849SChuck Lever 	char buf[128];
280c877b849SChuck Lever 
281c877b849SChuck Lever 	(void)rpc_ntop(sap, buf, sizeof(buf));
282c877b849SChuck Lever 	xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL);
283c877b849SChuck Lever 
2849dc3b095SChuck Lever 	switch (sap->sa_family) {
2859dc3b095SChuck Lever 	case AF_INET:
2869dc3b095SChuck Lever 		sin = xs_addr_in(xprt);
287fc0b5791SJoe Perches 		snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
2889dc3b095SChuck Lever 		break;
2899dc3b095SChuck Lever 	case AF_INET6:
2909dc3b095SChuck Lever 		sin6 = xs_addr_in6(xprt);
291fc0b5791SJoe Perches 		snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
2929dc3b095SChuck Lever 		break;
2939dc3b095SChuck Lever 	default:
2949dc3b095SChuck Lever 		BUG();
2959dc3b095SChuck Lever 	}
2969dc3b095SChuck Lever 	xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
2979dc3b095SChuck Lever }
2989dc3b095SChuck Lever 
2999dc3b095SChuck Lever static void xs_format_common_peer_ports(struct rpc_xprt *xprt)
3009dc3b095SChuck Lever {
3019dc3b095SChuck Lever 	struct sockaddr *sap = xs_addr(xprt);
3029dc3b095SChuck Lever 	char buf[128];
3039dc3b095SChuck Lever 
30481160e66SJoe Perches 	snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
305c877b849SChuck Lever 	xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
306c877b849SChuck Lever 
30781160e66SJoe Perches 	snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
308c877b849SChuck Lever 	xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
309c877b849SChuck Lever }
310c877b849SChuck Lever 
3119dc3b095SChuck Lever static void xs_format_peer_addresses(struct rpc_xprt *xprt,
312b454ae90SChuck Lever 				     const char *protocol,
313b454ae90SChuck Lever 				     const char *netid)
314edb267a6SChuck Lever {
315b454ae90SChuck Lever 	xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
316b454ae90SChuck Lever 	xprt->address_strings[RPC_DISPLAY_NETID] = netid;
317c877b849SChuck Lever 	xs_format_common_peer_addresses(xprt);
3189dc3b095SChuck Lever 	xs_format_common_peer_ports(xprt);
319edb267a6SChuck Lever }
320edb267a6SChuck Lever 
3219dc3b095SChuck Lever static void xs_update_peer_port(struct rpc_xprt *xprt)
3224b6473fbSChuck Lever {
3239dc3b095SChuck Lever 	kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
3249dc3b095SChuck Lever 	kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
3254b6473fbSChuck Lever 
3269dc3b095SChuck Lever 	xs_format_common_peer_ports(xprt);
327edb267a6SChuck Lever }
328edb267a6SChuck Lever 
329edb267a6SChuck Lever static void xs_free_peer_addresses(struct rpc_xprt *xprt)
330edb267a6SChuck Lever {
33133e01dc7SChuck Lever 	unsigned int i;
33233e01dc7SChuck Lever 
33333e01dc7SChuck Lever 	for (i = 0; i < RPC_DISPLAY_MAX; i++)
33433e01dc7SChuck Lever 		switch (i) {
33533e01dc7SChuck Lever 		case RPC_DISPLAY_PROTO:
33633e01dc7SChuck Lever 		case RPC_DISPLAY_NETID:
33733e01dc7SChuck Lever 			continue;
33833e01dc7SChuck Lever 		default:
33933e01dc7SChuck Lever 			kfree(xprt->address_strings[i]);
34033e01dc7SChuck Lever 		}
341edb267a6SChuck Lever }
342edb267a6SChuck Lever 
343b4b5cc85SChuck Lever #define XS_SENDMSG_FLAGS	(MSG_DONTWAIT | MSG_NOSIGNAL)
344b4b5cc85SChuck Lever 
34524c5684bSTrond Myklebust static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
346b4b5cc85SChuck Lever {
347b4b5cc85SChuck Lever 	struct msghdr msg = {
348b4b5cc85SChuck Lever 		.msg_name	= addr,
349b4b5cc85SChuck Lever 		.msg_namelen	= addrlen,
35024c5684bSTrond Myklebust 		.msg_flags	= XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
35124c5684bSTrond Myklebust 	};
35224c5684bSTrond Myklebust 	struct kvec iov = {
35324c5684bSTrond Myklebust 		.iov_base	= vec->iov_base + base,
35424c5684bSTrond Myklebust 		.iov_len	= vec->iov_len - base,
355b4b5cc85SChuck Lever 	};
356b4b5cc85SChuck Lever 
35724c5684bSTrond Myklebust 	if (iov.iov_len != 0)
358b4b5cc85SChuck Lever 		return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
359b4b5cc85SChuck Lever 	return kernel_sendmsg(sock, &msg, NULL, 0, 0);
360b4b5cc85SChuck Lever }
361b4b5cc85SChuck Lever 
36224c5684bSTrond Myklebust static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more)
363b4b5cc85SChuck Lever {
36424c5684bSTrond Myklebust 	struct page **ppage;
36524c5684bSTrond Myklebust 	unsigned int remainder;
36624c5684bSTrond Myklebust 	int err, sent = 0;
367b4b5cc85SChuck Lever 
36824c5684bSTrond Myklebust 	remainder = xdr->page_len - base;
36924c5684bSTrond Myklebust 	base += xdr->page_base;
37024c5684bSTrond Myklebust 	ppage = xdr->pages + (base >> PAGE_SHIFT);
37124c5684bSTrond Myklebust 	base &= ~PAGE_MASK;
37224c5684bSTrond Myklebust 	for(;;) {
37324c5684bSTrond Myklebust 		unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
37424c5684bSTrond Myklebust 		int flags = XS_SENDMSG_FLAGS;
37524c5684bSTrond Myklebust 
37624c5684bSTrond Myklebust 		remainder -= len;
37724c5684bSTrond Myklebust 		if (remainder != 0 || more)
37824c5684bSTrond Myklebust 			flags |= MSG_MORE;
37924c5684bSTrond Myklebust 		err = sock->ops->sendpage(sock, *ppage, base, len, flags);
38024c5684bSTrond Myklebust 		if (remainder == 0 || err != len)
38124c5684bSTrond Myklebust 			break;
38224c5684bSTrond Myklebust 		sent += err;
38324c5684bSTrond Myklebust 		ppage++;
38424c5684bSTrond Myklebust 		base = 0;
38524c5684bSTrond Myklebust 	}
38624c5684bSTrond Myklebust 	if (sent == 0)
38724c5684bSTrond Myklebust 		return err;
38824c5684bSTrond Myklebust 	if (err > 0)
38924c5684bSTrond Myklebust 		sent += err;
39024c5684bSTrond Myklebust 	return sent;
391b4b5cc85SChuck Lever }
392b4b5cc85SChuck Lever 
3939903cd1cSChuck Lever /**
3949903cd1cSChuck Lever  * xs_sendpages - write pages directly to a socket
3959903cd1cSChuck Lever  * @sock: socket to send on
3969903cd1cSChuck Lever  * @addr: UDP only -- address of destination
3979903cd1cSChuck Lever  * @addrlen: UDP only -- length of destination address
3989903cd1cSChuck Lever  * @xdr: buffer containing this request
3999903cd1cSChuck Lever  * @base: starting position in the buffer
4009903cd1cSChuck Lever  *
401a246b010SChuck Lever  */
40224c5684bSTrond Myklebust static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
403a246b010SChuck Lever {
40424c5684bSTrond Myklebust 	unsigned int remainder = xdr->len - base;
40524c5684bSTrond Myklebust 	int err, sent = 0;
406a246b010SChuck Lever 
407262965f5SChuck Lever 	if (unlikely(!sock))
408fba91afbSTrond Myklebust 		return -ENOTSOCK;
409262965f5SChuck Lever 
410262965f5SChuck Lever 	clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
41124c5684bSTrond Myklebust 	if (base != 0) {
41224c5684bSTrond Myklebust 		addr = NULL;
41324c5684bSTrond Myklebust 		addrlen = 0;
41424c5684bSTrond Myklebust 	}
415262965f5SChuck Lever 
41624c5684bSTrond Myklebust 	if (base < xdr->head[0].iov_len || addr != NULL) {
41724c5684bSTrond Myklebust 		unsigned int len = xdr->head[0].iov_len - base;
41824c5684bSTrond Myklebust 		remainder -= len;
41924c5684bSTrond Myklebust 		err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
42024c5684bSTrond Myklebust 		if (remainder == 0 || err != len)
421a246b010SChuck Lever 			goto out;
42224c5684bSTrond Myklebust 		sent += err;
423a246b010SChuck Lever 		base = 0;
424a246b010SChuck Lever 	} else
42524c5684bSTrond Myklebust 		base -= xdr->head[0].iov_len;
426a246b010SChuck Lever 
42724c5684bSTrond Myklebust 	if (base < xdr->page_len) {
42824c5684bSTrond Myklebust 		unsigned int len = xdr->page_len - base;
42924c5684bSTrond Myklebust 		remainder -= len;
43024c5684bSTrond Myklebust 		err = xs_send_pagedata(sock, xdr, base, remainder != 0);
43124c5684bSTrond Myklebust 		if (remainder == 0 || err != len)
432a246b010SChuck Lever 			goto out;
43324c5684bSTrond Myklebust 		sent += err;
434a246b010SChuck Lever 		base = 0;
43524c5684bSTrond Myklebust 	} else
43624c5684bSTrond Myklebust 		base -= xdr->page_len;
43724c5684bSTrond Myklebust 
43824c5684bSTrond Myklebust 	if (base >= xdr->tail[0].iov_len)
43924c5684bSTrond Myklebust 		return sent;
44024c5684bSTrond Myklebust 	err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
441a246b010SChuck Lever out:
44224c5684bSTrond Myklebust 	if (sent == 0)
44324c5684bSTrond Myklebust 		return err;
44424c5684bSTrond Myklebust 	if (err > 0)
44524c5684bSTrond Myklebust 		sent += err;
44624c5684bSTrond Myklebust 	return sent;
447a246b010SChuck Lever }
448a246b010SChuck Lever 
449b6ddf64fSTrond Myklebust static void xs_nospace_callback(struct rpc_task *task)
450b6ddf64fSTrond Myklebust {
451b6ddf64fSTrond Myklebust 	struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt);
452b6ddf64fSTrond Myklebust 
453b6ddf64fSTrond Myklebust 	transport->inet->sk_write_pending--;
454b6ddf64fSTrond Myklebust 	clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
455b6ddf64fSTrond Myklebust }
456b6ddf64fSTrond Myklebust 
4579903cd1cSChuck Lever /**
458262965f5SChuck Lever  * xs_nospace - place task on wait queue if transmit was incomplete
459262965f5SChuck Lever  * @task: task to put to sleep
4609903cd1cSChuck Lever  *
461a246b010SChuck Lever  */
4625e3771ceSTrond Myklebust static int xs_nospace(struct rpc_task *task)
463a246b010SChuck Lever {
464262965f5SChuck Lever 	struct rpc_rqst *req = task->tk_rqstp;
465262965f5SChuck Lever 	struct rpc_xprt *xprt = req->rq_xprt;
466ee0ac0c2SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
4675e3771ceSTrond Myklebust 	int ret = 0;
468a246b010SChuck Lever 
46946121cf7SChuck Lever 	dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
470262965f5SChuck Lever 			task->tk_pid, req->rq_slen - req->rq_bytes_sent,
471262965f5SChuck Lever 			req->rq_slen);
472a246b010SChuck Lever 
473262965f5SChuck Lever 	/* Protect against races with write_space */
474262965f5SChuck Lever 	spin_lock_bh(&xprt->transport_lock);
475a246b010SChuck Lever 
476262965f5SChuck Lever 	/* Don't race with disconnect */
477b6ddf64fSTrond Myklebust 	if (xprt_connected(xprt)) {
478b6ddf64fSTrond Myklebust 		if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) {
4795e3771ceSTrond Myklebust 			ret = -EAGAIN;
480b6ddf64fSTrond Myklebust 			/*
481b6ddf64fSTrond Myklebust 			 * Notify TCP that we're limited by the application
482b6ddf64fSTrond Myklebust 			 * window size
483b6ddf64fSTrond Myklebust 			 */
484b6ddf64fSTrond Myklebust 			set_bit(SOCK_NOSPACE, &transport->sock->flags);
485b6ddf64fSTrond Myklebust 			transport->inet->sk_write_pending++;
486b6ddf64fSTrond Myklebust 			/* ...and wait for more buffer space */
487b6ddf64fSTrond Myklebust 			xprt_wait_for_buffer_space(task, xs_nospace_callback);
488b6ddf64fSTrond Myklebust 		}
489b6ddf64fSTrond Myklebust 	} else {
490b6ddf64fSTrond Myklebust 		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
4915e3771ceSTrond Myklebust 		ret = -ENOTCONN;
492b6ddf64fSTrond Myklebust 	}
493a246b010SChuck Lever 
494262965f5SChuck Lever 	spin_unlock_bh(&xprt->transport_lock);
4955e3771ceSTrond Myklebust 	return ret;
496a246b010SChuck Lever }
497a246b010SChuck Lever 
498*61677eeeSChuck Lever /*
499*61677eeeSChuck Lever  * Construct a stream transport record marker in @buf.
500*61677eeeSChuck Lever  */
501*61677eeeSChuck Lever static inline void xs_encode_stream_record_marker(struct xdr_buf *buf)
502*61677eeeSChuck Lever {
503*61677eeeSChuck Lever 	u32 reclen = buf->len - sizeof(rpc_fraghdr);
504*61677eeeSChuck Lever 	rpc_fraghdr *base = buf->head[0].iov_base;
505*61677eeeSChuck Lever 	*base = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT | reclen);
506*61677eeeSChuck Lever }
507*61677eeeSChuck Lever 
5089903cd1cSChuck Lever /**
509262965f5SChuck Lever  * xs_udp_send_request - write an RPC request to a UDP socket
5109903cd1cSChuck Lever  * @task: address of RPC task that manages the state of an RPC request
5119903cd1cSChuck Lever  *
5129903cd1cSChuck Lever  * Return values:
5139903cd1cSChuck Lever  *        0:	The request has been sent
5149903cd1cSChuck Lever  *   EAGAIN:	The socket was blocked, please call again later to
5159903cd1cSChuck Lever  *		complete the request
516262965f5SChuck Lever  * ENOTCONN:	Caller needs to invoke connect logic then call again
51725985edcSLucas De Marchi  *    other:	Some other error occurred, the request was not sent
5189903cd1cSChuck Lever  */
519262965f5SChuck Lever static int xs_udp_send_request(struct rpc_task *task)
520a246b010SChuck Lever {
521a246b010SChuck Lever 	struct rpc_rqst *req = task->tk_rqstp;
522a246b010SChuck Lever 	struct rpc_xprt *xprt = req->rq_xprt;
523ee0ac0c2SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
524262965f5SChuck Lever 	struct xdr_buf *xdr = &req->rq_snd_buf;
525262965f5SChuck Lever 	int status;
526262965f5SChuck Lever 
527262965f5SChuck Lever 	xs_pktdump("packet data:",
528262965f5SChuck Lever 				req->rq_svec->iov_base,
529262965f5SChuck Lever 				req->rq_svec->iov_len);
530262965f5SChuck Lever 
53101d37c42STrond Myklebust 	if (!xprt_bound(xprt))
53201d37c42STrond Myklebust 		return -ENOTCONN;
533ee0ac0c2SChuck Lever 	status = xs_sendpages(transport->sock,
53495392c59SChuck Lever 			      xs_addr(xprt),
535ee0ac0c2SChuck Lever 			      xprt->addrlen, xdr,
536ee0ac0c2SChuck Lever 			      req->rq_bytes_sent);
537262965f5SChuck Lever 
538262965f5SChuck Lever 	dprintk("RPC:       xs_udp_send_request(%u) = %d\n",
539262965f5SChuck Lever 			xdr->len - req->rq_bytes_sent, status);
540262965f5SChuck Lever 
5412199700fSTrond Myklebust 	if (status >= 0) {
542d60dbb20STrond Myklebust 		req->rq_xmit_bytes_sent += status;
5432199700fSTrond Myklebust 		if (status >= req->rq_slen)
544262965f5SChuck Lever 			return 0;
545262965f5SChuck Lever 		/* Still some bytes left; set up for a retry later. */
546262965f5SChuck Lever 		status = -EAGAIN;
5472199700fSTrond Myklebust 	}
548262965f5SChuck Lever 
549262965f5SChuck Lever 	switch (status) {
550fba91afbSTrond Myklebust 	case -ENOTSOCK:
551fba91afbSTrond Myklebust 		status = -ENOTCONN;
552fba91afbSTrond Myklebust 		/* Should we call xs_close() here? */
553fba91afbSTrond Myklebust 		break;
554b6ddf64fSTrond Myklebust 	case -EAGAIN:
5555e3771ceSTrond Myklebust 		status = xs_nospace(task);
556b6ddf64fSTrond Myklebust 		break;
557c8485e4dSTrond Myklebust 	default:
558c8485e4dSTrond Myklebust 		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
559c8485e4dSTrond Myklebust 			-status);
560262965f5SChuck Lever 	case -ENETUNREACH:
561262965f5SChuck Lever 	case -EPIPE:
562262965f5SChuck Lever 	case -ECONNREFUSED:
563262965f5SChuck Lever 		/* When the server has died, an ICMP port unreachable message
564262965f5SChuck Lever 		 * prompts ECONNREFUSED. */
565b6ddf64fSTrond Myklebust 		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
566262965f5SChuck Lever 	}
5675fe46e9dSBian Naimeng 
568262965f5SChuck Lever 	return status;
569262965f5SChuck Lever }
570262965f5SChuck Lever 
571e06799f9STrond Myklebust /**
572e06799f9STrond Myklebust  * xs_tcp_shutdown - gracefully shut down a TCP socket
573e06799f9STrond Myklebust  * @xprt: transport
574e06799f9STrond Myklebust  *
575e06799f9STrond Myklebust  * Initiates a graceful shutdown of the TCP socket by calling the
576e06799f9STrond Myklebust  * equivalent of shutdown(SHUT_WR);
577e06799f9STrond Myklebust  */
578e06799f9STrond Myklebust static void xs_tcp_shutdown(struct rpc_xprt *xprt)
579e06799f9STrond Myklebust {
580e06799f9STrond Myklebust 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
581e06799f9STrond Myklebust 	struct socket *sock = transport->sock;
582e06799f9STrond Myklebust 
583e06799f9STrond Myklebust 	if (sock != NULL)
584e06799f9STrond Myklebust 		kernel_sock_shutdown(sock, SHUT_WR);
585e06799f9STrond Myklebust }
586e06799f9STrond Myklebust 
587262965f5SChuck Lever /**
588262965f5SChuck Lever  * xs_tcp_send_request - write an RPC request to a TCP socket
589262965f5SChuck Lever  * @task: address of RPC task that manages the state of an RPC request
590262965f5SChuck Lever  *
591262965f5SChuck Lever  * Return values:
592262965f5SChuck Lever  *        0:	The request has been sent
593262965f5SChuck Lever  *   EAGAIN:	The socket was blocked, please call again later to
594262965f5SChuck Lever  *		complete the request
595262965f5SChuck Lever  * ENOTCONN:	Caller needs to invoke connect logic then call again
59625985edcSLucas De Marchi  *    other:	Some other error occurred, the request was not sent
597262965f5SChuck Lever  *
598262965f5SChuck Lever  * XXX: In the case of soft timeouts, should we eventually give up
599262965f5SChuck Lever  *	if sendmsg is not able to make progress?
600262965f5SChuck Lever  */
601262965f5SChuck Lever static int xs_tcp_send_request(struct rpc_task *task)
602262965f5SChuck Lever {
603262965f5SChuck Lever 	struct rpc_rqst *req = task->tk_rqstp;
604262965f5SChuck Lever 	struct rpc_xprt *xprt = req->rq_xprt;
605ee0ac0c2SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
606262965f5SChuck Lever 	struct xdr_buf *xdr = &req->rq_snd_buf;
607b595bb15SChuck Lever 	int status;
608a246b010SChuck Lever 
609*61677eeeSChuck Lever 	xs_encode_stream_record_marker(&req->rq_snd_buf);
610262965f5SChuck Lever 
611262965f5SChuck Lever 	xs_pktdump("packet data:",
612262965f5SChuck Lever 				req->rq_svec->iov_base,
613262965f5SChuck Lever 				req->rq_svec->iov_len);
614a246b010SChuck Lever 
615a246b010SChuck Lever 	/* Continue transmitting the packet/record. We must be careful
616a246b010SChuck Lever 	 * to cope with writespace callbacks arriving _after_ we have
617262965f5SChuck Lever 	 * called sendmsg(). */
618a246b010SChuck Lever 	while (1) {
619ee0ac0c2SChuck Lever 		status = xs_sendpages(transport->sock,
620ee0ac0c2SChuck Lever 					NULL, 0, xdr, req->rq_bytes_sent);
621a246b010SChuck Lever 
622262965f5SChuck Lever 		dprintk("RPC:       xs_tcp_send_request(%u) = %d\n",
623262965f5SChuck Lever 				xdr->len - req->rq_bytes_sent, status);
624262965f5SChuck Lever 
625262965f5SChuck Lever 		if (unlikely(status < 0))
626a246b010SChuck Lever 			break;
627a246b010SChuck Lever 
628a246b010SChuck Lever 		/* If we've sent the entire packet, immediately
629a246b010SChuck Lever 		 * reset the count of bytes sent. */
630262965f5SChuck Lever 		req->rq_bytes_sent += status;
631d60dbb20STrond Myklebust 		req->rq_xmit_bytes_sent += status;
632262965f5SChuck Lever 		if (likely(req->rq_bytes_sent >= req->rq_slen)) {
633a246b010SChuck Lever 			req->rq_bytes_sent = 0;
634a246b010SChuck Lever 			return 0;
635a246b010SChuck Lever 		}
636262965f5SChuck Lever 
63706b4b681STrond Myklebust 		if (status != 0)
63806b4b681STrond Myklebust 			continue;
639a246b010SChuck Lever 		status = -EAGAIN;
640a246b010SChuck Lever 		break;
641a246b010SChuck Lever 	}
642a246b010SChuck Lever 
643262965f5SChuck Lever 	switch (status) {
644fba91afbSTrond Myklebust 	case -ENOTSOCK:
645fba91afbSTrond Myklebust 		status = -ENOTCONN;
646fba91afbSTrond Myklebust 		/* Should we call xs_close() here? */
647fba91afbSTrond Myklebust 		break;
648262965f5SChuck Lever 	case -EAGAIN:
6495e3771ceSTrond Myklebust 		status = xs_nospace(task);
650262965f5SChuck Lever 		break;
651262965f5SChuck Lever 	default:
652262965f5SChuck Lever 		dprintk("RPC:       sendmsg returned unrecognized error %d\n",
653262965f5SChuck Lever 			-status);
654a246b010SChuck Lever 	case -ECONNRESET:
65555420c24STrond Myklebust 	case -EPIPE:
656e06799f9STrond Myklebust 		xs_tcp_shutdown(xprt);
657a246b010SChuck Lever 	case -ECONNREFUSED:
658a246b010SChuck Lever 	case -ENOTCONN:
659a246b010SChuck Lever 		clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
660a246b010SChuck Lever 	}
6615fe46e9dSBian Naimeng 
662a246b010SChuck Lever 	return status;
663a246b010SChuck Lever }
664a246b010SChuck Lever 
6659903cd1cSChuck Lever /**
666e0ab53deSTrond Myklebust  * xs_tcp_release_xprt - clean up after a tcp transmission
667e0ab53deSTrond Myklebust  * @xprt: transport
668e0ab53deSTrond Myklebust  * @task: rpc task
669e0ab53deSTrond Myklebust  *
670e0ab53deSTrond Myklebust  * This cleans up if an error causes us to abort the transmission of a request.
671e0ab53deSTrond Myklebust  * In this case, the socket may need to be reset in order to avoid confusing
672e0ab53deSTrond Myklebust  * the server.
673e0ab53deSTrond Myklebust  */
674e0ab53deSTrond Myklebust static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
675e0ab53deSTrond Myklebust {
676e0ab53deSTrond Myklebust 	struct rpc_rqst *req;
677e0ab53deSTrond Myklebust 
678e0ab53deSTrond Myklebust 	if (task != xprt->snd_task)
679e0ab53deSTrond Myklebust 		return;
680e0ab53deSTrond Myklebust 	if (task == NULL)
681e0ab53deSTrond Myklebust 		goto out_release;
682e0ab53deSTrond Myklebust 	req = task->tk_rqstp;
683e0ab53deSTrond Myklebust 	if (req->rq_bytes_sent == 0)
684e0ab53deSTrond Myklebust 		goto out_release;
685e0ab53deSTrond Myklebust 	if (req->rq_bytes_sent == req->rq_snd_buf.len)
686e0ab53deSTrond Myklebust 		goto out_release;
687e0ab53deSTrond Myklebust 	set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state);
688e0ab53deSTrond Myklebust out_release:
689e0ab53deSTrond Myklebust 	xprt_release_xprt(xprt, task);
690e0ab53deSTrond Myklebust }
691e0ab53deSTrond Myklebust 
6922a9e1cfaSTrond Myklebust static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk)
6932a9e1cfaSTrond Myklebust {
6942a9e1cfaSTrond Myklebust 	transport->old_data_ready = sk->sk_data_ready;
6952a9e1cfaSTrond Myklebust 	transport->old_state_change = sk->sk_state_change;
6962a9e1cfaSTrond Myklebust 	transport->old_write_space = sk->sk_write_space;
6972a9e1cfaSTrond Myklebust 	transport->old_error_report = sk->sk_error_report;
6982a9e1cfaSTrond Myklebust }
6992a9e1cfaSTrond Myklebust 
7002a9e1cfaSTrond Myklebust static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk)
7012a9e1cfaSTrond Myklebust {
7022a9e1cfaSTrond Myklebust 	sk->sk_data_ready = transport->old_data_ready;
7032a9e1cfaSTrond Myklebust 	sk->sk_state_change = transport->old_state_change;
7042a9e1cfaSTrond Myklebust 	sk->sk_write_space = transport->old_write_space;
7052a9e1cfaSTrond Myklebust 	sk->sk_error_report = transport->old_error_report;
7062a9e1cfaSTrond Myklebust }
7072a9e1cfaSTrond Myklebust 
708fe315e76SChuck Lever static void xs_reset_transport(struct sock_xprt *transport)
709a246b010SChuck Lever {
710ee0ac0c2SChuck Lever 	struct socket *sock = transport->sock;
711ee0ac0c2SChuck Lever 	struct sock *sk = transport->inet;
712a246b010SChuck Lever 
713fe315e76SChuck Lever 	if (sk == NULL)
714fe315e76SChuck Lever 		return;
7159903cd1cSChuck Lever 
716246408dcSTrond Myklebust 	transport->srcport = 0;
717246408dcSTrond Myklebust 
718a246b010SChuck Lever 	write_lock_bh(&sk->sk_callback_lock);
719ee0ac0c2SChuck Lever 	transport->inet = NULL;
720ee0ac0c2SChuck Lever 	transport->sock = NULL;
721a246b010SChuck Lever 
722a246b010SChuck Lever 	sk->sk_user_data = NULL;
7232a9e1cfaSTrond Myklebust 
7242a9e1cfaSTrond Myklebust 	xs_restore_old_callbacks(transport, sk);
725a246b010SChuck Lever 	write_unlock_bh(&sk->sk_callback_lock);
726a246b010SChuck Lever 
727a246b010SChuck Lever 	sk->sk_no_check = 0;
728a246b010SChuck Lever 
729a246b010SChuck Lever 	sock_release(sock);
730fe315e76SChuck Lever }
731fe315e76SChuck Lever 
732fe315e76SChuck Lever /**
733fe315e76SChuck Lever  * xs_close - close a socket
734fe315e76SChuck Lever  * @xprt: transport
735fe315e76SChuck Lever  *
736fe315e76SChuck Lever  * This is used when all requests are complete; ie, no DRC state remains
737fe315e76SChuck Lever  * on the server we want to save.
738f75e6745STrond Myklebust  *
739f75e6745STrond Myklebust  * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with
740f75e6745STrond Myklebust  * xs_reset_transport() zeroing the socket from underneath a writer.
741fe315e76SChuck Lever  */
742fe315e76SChuck Lever static void xs_close(struct rpc_xprt *xprt)
743fe315e76SChuck Lever {
744fe315e76SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
745fe315e76SChuck Lever 
746fe315e76SChuck Lever 	dprintk("RPC:       xs_close xprt %p\n", xprt);
747fe315e76SChuck Lever 
748fe315e76SChuck Lever 	xs_reset_transport(transport);
74961d0a8e6SNeil Brown 	xprt->reestablish_timeout = 0;
750fe315e76SChuck Lever 
751632e3bdcSTrond Myklebust 	smp_mb__before_clear_bit();
7527d1e8255STrond Myklebust 	clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
753632e3bdcSTrond Myklebust 	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
7543b948ae5STrond Myklebust 	clear_bit(XPRT_CLOSING, &xprt->state);
755632e3bdcSTrond Myklebust 	smp_mb__after_clear_bit();
75662da3b24STrond Myklebust 	xprt_disconnect_done(xprt);
757a246b010SChuck Lever }
758a246b010SChuck Lever 
759f75e6745STrond Myklebust static void xs_tcp_close(struct rpc_xprt *xprt)
760f75e6745STrond Myklebust {
761f75e6745STrond Myklebust 	if (test_and_clear_bit(XPRT_CONNECTION_CLOSE, &xprt->state))
762f75e6745STrond Myklebust 		xs_close(xprt);
763f75e6745STrond Myklebust 	else
764f75e6745STrond Myklebust 		xs_tcp_shutdown(xprt);
765f75e6745STrond Myklebust }
766f75e6745STrond Myklebust 
7679903cd1cSChuck Lever /**
7689903cd1cSChuck Lever  * xs_destroy - prepare to shutdown a transport
7699903cd1cSChuck Lever  * @xprt: doomed transport
7709903cd1cSChuck Lever  *
7719903cd1cSChuck Lever  */
7729903cd1cSChuck Lever static void xs_destroy(struct rpc_xprt *xprt)
773a246b010SChuck Lever {
774c8475461SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
775c8475461SChuck Lever 
7769903cd1cSChuck Lever 	dprintk("RPC:       xs_destroy xprt %p\n", xprt);
7779903cd1cSChuck Lever 
778afe2c511STejun Heo 	cancel_delayed_work_sync(&transport->connect_worker);
779a246b010SChuck Lever 
7809903cd1cSChuck Lever 	xs_close(xprt);
781edb267a6SChuck Lever 	xs_free_peer_addresses(xprt);
782e204e621SPavel Emelyanov 	xprt_free(xprt);
783bc25571eS\"Talpey, Thomas\ 	module_put(THIS_MODULE);
784a246b010SChuck Lever }
785a246b010SChuck Lever 
7869903cd1cSChuck Lever static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
7879903cd1cSChuck Lever {
7889903cd1cSChuck Lever 	return (struct rpc_xprt *) sk->sk_user_data;
7899903cd1cSChuck Lever }
7909903cd1cSChuck Lever 
7919903cd1cSChuck Lever /**
7929903cd1cSChuck Lever  * xs_udp_data_ready - "data ready" callback for UDP sockets
7939903cd1cSChuck Lever  * @sk: socket with data to read
7949903cd1cSChuck Lever  * @len: how much data to read
7959903cd1cSChuck Lever  *
796a246b010SChuck Lever  */
7979903cd1cSChuck Lever static void xs_udp_data_ready(struct sock *sk, int len)
798a246b010SChuck Lever {
799a246b010SChuck Lever 	struct rpc_task *task;
800a246b010SChuck Lever 	struct rpc_xprt *xprt;
801a246b010SChuck Lever 	struct rpc_rqst *rovr;
802a246b010SChuck Lever 	struct sk_buff *skb;
803a246b010SChuck Lever 	int err, repsize, copied;
804d8ed029dSAlexey Dobriyan 	u32 _xid;
805d8ed029dSAlexey Dobriyan 	__be32 *xp;
806a246b010SChuck Lever 
807f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
8089903cd1cSChuck Lever 	dprintk("RPC:       xs_udp_data_ready...\n");
8099903cd1cSChuck Lever 	if (!(xprt = xprt_from_sock(sk)))
810a246b010SChuck Lever 		goto out;
811a246b010SChuck Lever 
812a246b010SChuck Lever 	if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
813a246b010SChuck Lever 		goto out;
814a246b010SChuck Lever 
815a246b010SChuck Lever 	if (xprt->shutdown)
816a246b010SChuck Lever 		goto dropit;
817a246b010SChuck Lever 
818a246b010SChuck Lever 	repsize = skb->len - sizeof(struct udphdr);
819a246b010SChuck Lever 	if (repsize < 4) {
8209903cd1cSChuck Lever 		dprintk("RPC:       impossible RPC reply size %d!\n", repsize);
821a246b010SChuck Lever 		goto dropit;
822a246b010SChuck Lever 	}
823a246b010SChuck Lever 
824a246b010SChuck Lever 	/* Copy the XID from the skb... */
825a246b010SChuck Lever 	xp = skb_header_pointer(skb, sizeof(struct udphdr),
826a246b010SChuck Lever 				sizeof(_xid), &_xid);
827a246b010SChuck Lever 	if (xp == NULL)
828a246b010SChuck Lever 		goto dropit;
829a246b010SChuck Lever 
830a246b010SChuck Lever 	/* Look up and lock the request corresponding to the given XID */
8314a0f8c04SChuck Lever 	spin_lock(&xprt->transport_lock);
832a246b010SChuck Lever 	rovr = xprt_lookup_rqst(xprt, *xp);
833a246b010SChuck Lever 	if (!rovr)
834a246b010SChuck Lever 		goto out_unlock;
835a246b010SChuck Lever 	task = rovr->rq_task;
836a246b010SChuck Lever 
837a246b010SChuck Lever 	if ((copied = rovr->rq_private_buf.buflen) > repsize)
838a246b010SChuck Lever 		copied = repsize;
839a246b010SChuck Lever 
840a246b010SChuck Lever 	/* Suck it into the iovec, verify checksum if not done by hw. */
8411781f7f5SHerbert Xu 	if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
8421781f7f5SHerbert Xu 		UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS);
843a246b010SChuck Lever 		goto out_unlock;
8441781f7f5SHerbert Xu 	}
8451781f7f5SHerbert Xu 
8461781f7f5SHerbert Xu 	UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS);
847a246b010SChuck Lever 
848a246b010SChuck Lever 	/* Something worked... */
849adf30907SEric Dumazet 	dst_confirm(skb_dst(skb));
850a246b010SChuck Lever 
8511570c1e4SChuck Lever 	xprt_adjust_cwnd(task, copied);
8521570c1e4SChuck Lever 	xprt_complete_rqst(task, copied);
853a246b010SChuck Lever 
854a246b010SChuck Lever  out_unlock:
8554a0f8c04SChuck Lever 	spin_unlock(&xprt->transport_lock);
856a246b010SChuck Lever  dropit:
857a246b010SChuck Lever 	skb_free_datagram(sk, skb);
858a246b010SChuck Lever  out:
859f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
860a246b010SChuck Lever }
861a246b010SChuck Lever 
862dd456471SChuck Lever static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
863a246b010SChuck Lever {
86451971139SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
865a246b010SChuck Lever 	size_t len, used;
866a246b010SChuck Lever 	char *p;
867a246b010SChuck Lever 
86851971139SChuck Lever 	p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
86951971139SChuck Lever 	len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
8709d292316SChuck Lever 	used = xdr_skb_read_bits(desc, p, len);
87151971139SChuck Lever 	transport->tcp_offset += used;
872a246b010SChuck Lever 	if (used != len)
873a246b010SChuck Lever 		return;
874808012fbSChuck Lever 
87551971139SChuck Lever 	transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
87651971139SChuck Lever 	if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
877e136d092SChuck Lever 		transport->tcp_flags |= TCP_RCV_LAST_FRAG;
878a246b010SChuck Lever 	else
879e136d092SChuck Lever 		transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
88051971139SChuck Lever 	transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
881808012fbSChuck Lever 
882e136d092SChuck Lever 	transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
88351971139SChuck Lever 	transport->tcp_offset = 0;
884808012fbSChuck Lever 
885a246b010SChuck Lever 	/* Sanity check of the record length */
88618dca02aSRicardo Labiaga 	if (unlikely(transport->tcp_reclen < 8)) {
8879903cd1cSChuck Lever 		dprintk("RPC:       invalid TCP record fragment length\n");
8883ebb067dSTrond Myklebust 		xprt_force_disconnect(xprt);
8899903cd1cSChuck Lever 		return;
890a246b010SChuck Lever 	}
891a246b010SChuck Lever 	dprintk("RPC:       reading TCP record fragment of length %d\n",
89251971139SChuck Lever 			transport->tcp_reclen);
893a246b010SChuck Lever }
894a246b010SChuck Lever 
89551971139SChuck Lever static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
896a246b010SChuck Lever {
89751971139SChuck Lever 	if (transport->tcp_offset == transport->tcp_reclen) {
898e136d092SChuck Lever 		transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
89951971139SChuck Lever 		transport->tcp_offset = 0;
900e136d092SChuck Lever 		if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
901e136d092SChuck Lever 			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
902e136d092SChuck Lever 			transport->tcp_flags |= TCP_RCV_COPY_XID;
90351971139SChuck Lever 			transport->tcp_copied = 0;
904a246b010SChuck Lever 		}
905a246b010SChuck Lever 	}
906a246b010SChuck Lever }
907a246b010SChuck Lever 
908dd456471SChuck Lever static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
909a246b010SChuck Lever {
910a246b010SChuck Lever 	size_t len, used;
911a246b010SChuck Lever 	char *p;
912a246b010SChuck Lever 
91351971139SChuck Lever 	len = sizeof(transport->tcp_xid) - transport->tcp_offset;
914a246b010SChuck Lever 	dprintk("RPC:       reading XID (%Zu bytes)\n", len);
91551971139SChuck Lever 	p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
9169d292316SChuck Lever 	used = xdr_skb_read_bits(desc, p, len);
91751971139SChuck Lever 	transport->tcp_offset += used;
918a246b010SChuck Lever 	if (used != len)
919a246b010SChuck Lever 		return;
920e136d092SChuck Lever 	transport->tcp_flags &= ~TCP_RCV_COPY_XID;
921f4a2e418SRicardo Labiaga 	transport->tcp_flags |= TCP_RCV_READ_CALLDIR;
92251971139SChuck Lever 	transport->tcp_copied = 4;
92318dca02aSRicardo Labiaga 	dprintk("RPC:       reading %s XID %08x\n",
92418dca02aSRicardo Labiaga 			(transport->tcp_flags & TCP_RPC_REPLY) ? "reply for"
92518dca02aSRicardo Labiaga 							      : "request with",
92651971139SChuck Lever 			ntohl(transport->tcp_xid));
92751971139SChuck Lever 	xs_tcp_check_fraghdr(transport);
928a246b010SChuck Lever }
929a246b010SChuck Lever 
93018dca02aSRicardo Labiaga static inline void xs_tcp_read_calldir(struct sock_xprt *transport,
93118dca02aSRicardo Labiaga 				       struct xdr_skb_reader *desc)
932a246b010SChuck Lever {
93318dca02aSRicardo Labiaga 	size_t len, used;
93418dca02aSRicardo Labiaga 	u32 offset;
935b76ce561STrond Myklebust 	char *p;
93618dca02aSRicardo Labiaga 
93718dca02aSRicardo Labiaga 	/*
93818dca02aSRicardo Labiaga 	 * We want transport->tcp_offset to be 8 at the end of this routine
93918dca02aSRicardo Labiaga 	 * (4 bytes for the xid and 4 bytes for the call/reply flag).
94018dca02aSRicardo Labiaga 	 * When this function is called for the first time,
94118dca02aSRicardo Labiaga 	 * transport->tcp_offset is 4 (after having already read the xid).
94218dca02aSRicardo Labiaga 	 */
94318dca02aSRicardo Labiaga 	offset = transport->tcp_offset - sizeof(transport->tcp_xid);
944b76ce561STrond Myklebust 	len = sizeof(transport->tcp_calldir) - offset;
94518dca02aSRicardo Labiaga 	dprintk("RPC:       reading CALL/REPLY flag (%Zu bytes)\n", len);
946b76ce561STrond Myklebust 	p = ((char *) &transport->tcp_calldir) + offset;
947b76ce561STrond Myklebust 	used = xdr_skb_read_bits(desc, p, len);
94818dca02aSRicardo Labiaga 	transport->tcp_offset += used;
94918dca02aSRicardo Labiaga 	if (used != len)
95018dca02aSRicardo Labiaga 		return;
951f4a2e418SRicardo Labiaga 	transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR;
952f4a2e418SRicardo Labiaga 	/*
953f4a2e418SRicardo Labiaga 	 * We don't yet have the XDR buffer, so we will write the calldir
954f4a2e418SRicardo Labiaga 	 * out after we get the buffer from the 'struct rpc_rqst'
955f4a2e418SRicardo Labiaga 	 */
956b76ce561STrond Myklebust 	switch (ntohl(transport->tcp_calldir)) {
957b76ce561STrond Myklebust 	case RPC_REPLY:
958b76ce561STrond Myklebust 		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
959b76ce561STrond Myklebust 		transport->tcp_flags |= TCP_RCV_COPY_DATA;
96018dca02aSRicardo Labiaga 		transport->tcp_flags |= TCP_RPC_REPLY;
961b76ce561STrond Myklebust 		break;
962b76ce561STrond Myklebust 	case RPC_CALL:
963b76ce561STrond Myklebust 		transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
964b76ce561STrond Myklebust 		transport->tcp_flags |= TCP_RCV_COPY_DATA;
96518dca02aSRicardo Labiaga 		transport->tcp_flags &= ~TCP_RPC_REPLY;
966b76ce561STrond Myklebust 		break;
967b76ce561STrond Myklebust 	default:
968b76ce561STrond Myklebust 		dprintk("RPC:       invalid request message type\n");
969b76ce561STrond Myklebust 		xprt_force_disconnect(&transport->xprt);
970b76ce561STrond Myklebust 	}
97118dca02aSRicardo Labiaga 	xs_tcp_check_fraghdr(transport);
97218dca02aSRicardo Labiaga }
97318dca02aSRicardo Labiaga 
97444b98efdSRicardo Labiaga static inline void xs_tcp_read_common(struct rpc_xprt *xprt,
97544b98efdSRicardo Labiaga 				     struct xdr_skb_reader *desc,
97644b98efdSRicardo Labiaga 				     struct rpc_rqst *req)
977a246b010SChuck Lever {
97844b98efdSRicardo Labiaga 	struct sock_xprt *transport =
97944b98efdSRicardo Labiaga 				container_of(xprt, struct sock_xprt, xprt);
980a246b010SChuck Lever 	struct xdr_buf *rcvbuf;
981a246b010SChuck Lever 	size_t len;
982a246b010SChuck Lever 	ssize_t r;
983a246b010SChuck Lever 
984a246b010SChuck Lever 	rcvbuf = &req->rq_private_buf;
985f4a2e418SRicardo Labiaga 
986f4a2e418SRicardo Labiaga 	if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) {
987f4a2e418SRicardo Labiaga 		/*
988f4a2e418SRicardo Labiaga 		 * Save the RPC direction in the XDR buffer
989f4a2e418SRicardo Labiaga 		 */
990f4a2e418SRicardo Labiaga 		memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied,
991b76ce561STrond Myklebust 			&transport->tcp_calldir,
992b76ce561STrond Myklebust 			sizeof(transport->tcp_calldir));
993b76ce561STrond Myklebust 		transport->tcp_copied += sizeof(transport->tcp_calldir);
994f4a2e418SRicardo Labiaga 		transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR;
995a246b010SChuck Lever 	}
996a246b010SChuck Lever 
997a246b010SChuck Lever 	len = desc->count;
99851971139SChuck Lever 	if (len > transport->tcp_reclen - transport->tcp_offset) {
999dd456471SChuck Lever 		struct xdr_skb_reader my_desc;
1000a246b010SChuck Lever 
100151971139SChuck Lever 		len = transport->tcp_reclen - transport->tcp_offset;
1002a246b010SChuck Lever 		memcpy(&my_desc, desc, sizeof(my_desc));
1003a246b010SChuck Lever 		my_desc.count = len;
100451971139SChuck Lever 		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
10059d292316SChuck Lever 					  &my_desc, xdr_skb_read_bits);
1006a246b010SChuck Lever 		desc->count -= r;
1007a246b010SChuck Lever 		desc->offset += r;
1008a246b010SChuck Lever 	} else
100951971139SChuck Lever 		r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
10109d292316SChuck Lever 					  desc, xdr_skb_read_bits);
1011a246b010SChuck Lever 
1012a246b010SChuck Lever 	if (r > 0) {
101351971139SChuck Lever 		transport->tcp_copied += r;
101451971139SChuck Lever 		transport->tcp_offset += r;
1015a246b010SChuck Lever 	}
1016a246b010SChuck Lever 	if (r != len) {
1017a246b010SChuck Lever 		/* Error when copying to the receive buffer,
1018a246b010SChuck Lever 		 * usually because we weren't able to allocate
1019a246b010SChuck Lever 		 * additional buffer pages. All we can do now
1020e136d092SChuck Lever 		 * is turn off TCP_RCV_COPY_DATA, so the request
1021a246b010SChuck Lever 		 * will not receive any additional updates,
1022a246b010SChuck Lever 		 * and time out.
1023a246b010SChuck Lever 		 * Any remaining data from this record will
1024a246b010SChuck Lever 		 * be discarded.
1025a246b010SChuck Lever 		 */
1026e136d092SChuck Lever 		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1027a246b010SChuck Lever 		dprintk("RPC:       XID %08x truncated request\n",
102851971139SChuck Lever 				ntohl(transport->tcp_xid));
102946121cf7SChuck Lever 		dprintk("RPC:       xprt = %p, tcp_copied = %lu, "
103046121cf7SChuck Lever 				"tcp_offset = %u, tcp_reclen = %u\n",
103146121cf7SChuck Lever 				xprt, transport->tcp_copied,
103246121cf7SChuck Lever 				transport->tcp_offset, transport->tcp_reclen);
103344b98efdSRicardo Labiaga 		return;
1034a246b010SChuck Lever 	}
1035a246b010SChuck Lever 
1036a246b010SChuck Lever 	dprintk("RPC:       XID %08x read %Zd bytes\n",
103751971139SChuck Lever 			ntohl(transport->tcp_xid), r);
103846121cf7SChuck Lever 	dprintk("RPC:       xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
103946121cf7SChuck Lever 			"tcp_reclen = %u\n", xprt, transport->tcp_copied,
104046121cf7SChuck Lever 			transport->tcp_offset, transport->tcp_reclen);
1041a246b010SChuck Lever 
104251971139SChuck Lever 	if (transport->tcp_copied == req->rq_private_buf.buflen)
1043e136d092SChuck Lever 		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
104451971139SChuck Lever 	else if (transport->tcp_offset == transport->tcp_reclen) {
1045e136d092SChuck Lever 		if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
1046e136d092SChuck Lever 			transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1047a246b010SChuck Lever 	}
104844b98efdSRicardo Labiaga }
104944b98efdSRicardo Labiaga 
105044b98efdSRicardo Labiaga /*
105144b98efdSRicardo Labiaga  * Finds the request corresponding to the RPC xid and invokes the common
105244b98efdSRicardo Labiaga  * tcp read code to read the data.
105344b98efdSRicardo Labiaga  */
105444b98efdSRicardo Labiaga static inline int xs_tcp_read_reply(struct rpc_xprt *xprt,
105544b98efdSRicardo Labiaga 				    struct xdr_skb_reader *desc)
105644b98efdSRicardo Labiaga {
105744b98efdSRicardo Labiaga 	struct sock_xprt *transport =
105844b98efdSRicardo Labiaga 				container_of(xprt, struct sock_xprt, xprt);
105944b98efdSRicardo Labiaga 	struct rpc_rqst *req;
106044b98efdSRicardo Labiaga 
106144b98efdSRicardo Labiaga 	dprintk("RPC:       read reply XID %08x\n", ntohl(transport->tcp_xid));
106244b98efdSRicardo Labiaga 
106344b98efdSRicardo Labiaga 	/* Find and lock the request corresponding to this xid */
106444b98efdSRicardo Labiaga 	spin_lock(&xprt->transport_lock);
106544b98efdSRicardo Labiaga 	req = xprt_lookup_rqst(xprt, transport->tcp_xid);
106644b98efdSRicardo Labiaga 	if (!req) {
106744b98efdSRicardo Labiaga 		dprintk("RPC:       XID %08x request not found!\n",
106844b98efdSRicardo Labiaga 				ntohl(transport->tcp_xid));
106944b98efdSRicardo Labiaga 		spin_unlock(&xprt->transport_lock);
107044b98efdSRicardo Labiaga 		return -1;
107144b98efdSRicardo Labiaga 	}
107244b98efdSRicardo Labiaga 
107344b98efdSRicardo Labiaga 	xs_tcp_read_common(xprt, desc, req);
107444b98efdSRicardo Labiaga 
1075e136d092SChuck Lever 	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
107651971139SChuck Lever 		xprt_complete_rqst(req->rq_task, transport->tcp_copied);
107744b98efdSRicardo Labiaga 
10784a0f8c04SChuck Lever 	spin_unlock(&xprt->transport_lock);
107944b98efdSRicardo Labiaga 	return 0;
108044b98efdSRicardo Labiaga }
108144b98efdSRicardo Labiaga 
108244b98efdSRicardo Labiaga #if defined(CONFIG_NFS_V4_1)
108344b98efdSRicardo Labiaga /*
108444b98efdSRicardo Labiaga  * Obtains an rpc_rqst previously allocated and invokes the common
108544b98efdSRicardo Labiaga  * tcp read code to read the data.  The result is placed in the callback
108644b98efdSRicardo Labiaga  * queue.
108744b98efdSRicardo Labiaga  * If we're unable to obtain the rpc_rqst we schedule the closing of the
108844b98efdSRicardo Labiaga  * connection and return -1.
108944b98efdSRicardo Labiaga  */
109044b98efdSRicardo Labiaga static inline int xs_tcp_read_callback(struct rpc_xprt *xprt,
109144b98efdSRicardo Labiaga 				       struct xdr_skb_reader *desc)
109244b98efdSRicardo Labiaga {
109344b98efdSRicardo Labiaga 	struct sock_xprt *transport =
109444b98efdSRicardo Labiaga 				container_of(xprt, struct sock_xprt, xprt);
109544b98efdSRicardo Labiaga 	struct rpc_rqst *req;
109644b98efdSRicardo Labiaga 
109744b98efdSRicardo Labiaga 	req = xprt_alloc_bc_request(xprt);
109844b98efdSRicardo Labiaga 	if (req == NULL) {
109944b98efdSRicardo Labiaga 		printk(KERN_WARNING "Callback slot table overflowed\n");
110044b98efdSRicardo Labiaga 		xprt_force_disconnect(xprt);
110144b98efdSRicardo Labiaga 		return -1;
110244b98efdSRicardo Labiaga 	}
110344b98efdSRicardo Labiaga 
110444b98efdSRicardo Labiaga 	req->rq_xid = transport->tcp_xid;
110544b98efdSRicardo Labiaga 	dprintk("RPC:       read callback  XID %08x\n", ntohl(req->rq_xid));
110644b98efdSRicardo Labiaga 	xs_tcp_read_common(xprt, desc, req);
110744b98efdSRicardo Labiaga 
110844b98efdSRicardo Labiaga 	if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) {
110944b98efdSRicardo Labiaga 		struct svc_serv *bc_serv = xprt->bc_serv;
111044b98efdSRicardo Labiaga 
111144b98efdSRicardo Labiaga 		/*
111244b98efdSRicardo Labiaga 		 * Add callback request to callback list.  The callback
111344b98efdSRicardo Labiaga 		 * service sleeps on the sv_cb_waitq waiting for new
111444b98efdSRicardo Labiaga 		 * requests.  Wake it up after adding enqueing the
111544b98efdSRicardo Labiaga 		 * request.
111644b98efdSRicardo Labiaga 		 */
111744b98efdSRicardo Labiaga 		dprintk("RPC:       add callback request to list\n");
111844b98efdSRicardo Labiaga 		spin_lock(&bc_serv->sv_cb_lock);
111944b98efdSRicardo Labiaga 		list_add(&req->rq_bc_list, &bc_serv->sv_cb_list);
112044b98efdSRicardo Labiaga 		spin_unlock(&bc_serv->sv_cb_lock);
112144b98efdSRicardo Labiaga 		wake_up(&bc_serv->sv_cb_waitq);
112244b98efdSRicardo Labiaga 	}
112344b98efdSRicardo Labiaga 
112444b98efdSRicardo Labiaga 	req->rq_private_buf.len = transport->tcp_copied;
112544b98efdSRicardo Labiaga 
112644b98efdSRicardo Labiaga 	return 0;
112744b98efdSRicardo Labiaga }
112844b98efdSRicardo Labiaga 
112944b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
113044b98efdSRicardo Labiaga 					struct xdr_skb_reader *desc)
113144b98efdSRicardo Labiaga {
113244b98efdSRicardo Labiaga 	struct sock_xprt *transport =
113344b98efdSRicardo Labiaga 				container_of(xprt, struct sock_xprt, xprt);
113444b98efdSRicardo Labiaga 
113544b98efdSRicardo Labiaga 	return (transport->tcp_flags & TCP_RPC_REPLY) ?
113644b98efdSRicardo Labiaga 		xs_tcp_read_reply(xprt, desc) :
113744b98efdSRicardo Labiaga 		xs_tcp_read_callback(xprt, desc);
113844b98efdSRicardo Labiaga }
113944b98efdSRicardo Labiaga #else
114044b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
114144b98efdSRicardo Labiaga 					struct xdr_skb_reader *desc)
114244b98efdSRicardo Labiaga {
114344b98efdSRicardo Labiaga 	return xs_tcp_read_reply(xprt, desc);
114444b98efdSRicardo Labiaga }
114544b98efdSRicardo Labiaga #endif /* CONFIG_NFS_V4_1 */
114644b98efdSRicardo Labiaga 
114744b98efdSRicardo Labiaga /*
114844b98efdSRicardo Labiaga  * Read data off the transport.  This can be either an RPC_CALL or an
114944b98efdSRicardo Labiaga  * RPC_REPLY.  Relay the processing to helper functions.
115044b98efdSRicardo Labiaga  */
115144b98efdSRicardo Labiaga static void xs_tcp_read_data(struct rpc_xprt *xprt,
115244b98efdSRicardo Labiaga 				    struct xdr_skb_reader *desc)
115344b98efdSRicardo Labiaga {
115444b98efdSRicardo Labiaga 	struct sock_xprt *transport =
115544b98efdSRicardo Labiaga 				container_of(xprt, struct sock_xprt, xprt);
115644b98efdSRicardo Labiaga 
115744b98efdSRicardo Labiaga 	if (_xs_tcp_read_data(xprt, desc) == 0)
115851971139SChuck Lever 		xs_tcp_check_fraghdr(transport);
115944b98efdSRicardo Labiaga 	else {
116044b98efdSRicardo Labiaga 		/*
116144b98efdSRicardo Labiaga 		 * The transport_lock protects the request handling.
116244b98efdSRicardo Labiaga 		 * There's no need to hold it to update the tcp_flags.
116344b98efdSRicardo Labiaga 		 */
116444b98efdSRicardo Labiaga 		transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
116544b98efdSRicardo Labiaga 	}
1166a246b010SChuck Lever }
1167a246b010SChuck Lever 
1168dd456471SChuck Lever static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
1169a246b010SChuck Lever {
1170a246b010SChuck Lever 	size_t len;
1171a246b010SChuck Lever 
117251971139SChuck Lever 	len = transport->tcp_reclen - transport->tcp_offset;
1173a246b010SChuck Lever 	if (len > desc->count)
1174a246b010SChuck Lever 		len = desc->count;
1175a246b010SChuck Lever 	desc->count -= len;
1176a246b010SChuck Lever 	desc->offset += len;
117751971139SChuck Lever 	transport->tcp_offset += len;
1178a246b010SChuck Lever 	dprintk("RPC:       discarded %Zu bytes\n", len);
117951971139SChuck Lever 	xs_tcp_check_fraghdr(transport);
1180a246b010SChuck Lever }
1181a246b010SChuck Lever 
11829903cd1cSChuck Lever static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
1183a246b010SChuck Lever {
1184a246b010SChuck Lever 	struct rpc_xprt *xprt = rd_desc->arg.data;
118551971139SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1186dd456471SChuck Lever 	struct xdr_skb_reader desc = {
1187a246b010SChuck Lever 		.skb	= skb,
1188a246b010SChuck Lever 		.offset	= offset,
1189a246b010SChuck Lever 		.count	= len,
1190a246b010SChuck Lever 	};
1191a246b010SChuck Lever 
11929903cd1cSChuck Lever 	dprintk("RPC:       xs_tcp_data_recv started\n");
1193a246b010SChuck Lever 	do {
1194a246b010SChuck Lever 		/* Read in a new fragment marker if necessary */
1195a246b010SChuck Lever 		/* Can we ever really expect to get completely empty fragments? */
1196e136d092SChuck Lever 		if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
11979903cd1cSChuck Lever 			xs_tcp_read_fraghdr(xprt, &desc);
1198a246b010SChuck Lever 			continue;
1199a246b010SChuck Lever 		}
1200a246b010SChuck Lever 		/* Read in the xid if necessary */
1201e136d092SChuck Lever 		if (transport->tcp_flags & TCP_RCV_COPY_XID) {
120251971139SChuck Lever 			xs_tcp_read_xid(transport, &desc);
1203a246b010SChuck Lever 			continue;
1204a246b010SChuck Lever 		}
120518dca02aSRicardo Labiaga 		/* Read in the call/reply flag */
1206f4a2e418SRicardo Labiaga 		if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) {
120718dca02aSRicardo Labiaga 			xs_tcp_read_calldir(transport, &desc);
120818dca02aSRicardo Labiaga 			continue;
120918dca02aSRicardo Labiaga 		}
1210a246b010SChuck Lever 		/* Read in the request data */
1211e136d092SChuck Lever 		if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
121244b98efdSRicardo Labiaga 			xs_tcp_read_data(xprt, &desc);
1213a246b010SChuck Lever 			continue;
1214a246b010SChuck Lever 		}
1215a246b010SChuck Lever 		/* Skip over any trailing bytes on short reads */
121651971139SChuck Lever 		xs_tcp_read_discard(transport, &desc);
1217a246b010SChuck Lever 	} while (desc.count);
12189903cd1cSChuck Lever 	dprintk("RPC:       xs_tcp_data_recv done\n");
1219a246b010SChuck Lever 	return len - desc.count;
1220a246b010SChuck Lever }
1221a246b010SChuck Lever 
12229903cd1cSChuck Lever /**
12239903cd1cSChuck Lever  * xs_tcp_data_ready - "data ready" callback for TCP sockets
12249903cd1cSChuck Lever  * @sk: socket with data to read
12259903cd1cSChuck Lever  * @bytes: how much data to read
12269903cd1cSChuck Lever  *
12279903cd1cSChuck Lever  */
12289903cd1cSChuck Lever static void xs_tcp_data_ready(struct sock *sk, int bytes)
1229a246b010SChuck Lever {
1230a246b010SChuck Lever 	struct rpc_xprt *xprt;
1231a246b010SChuck Lever 	read_descriptor_t rd_desc;
1232ff2d7db8STrond Myklebust 	int read;
1233a246b010SChuck Lever 
12349903cd1cSChuck Lever 	dprintk("RPC:       xs_tcp_data_ready...\n");
123546121cf7SChuck Lever 
1236f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
12379903cd1cSChuck Lever 	if (!(xprt = xprt_from_sock(sk)))
1238a246b010SChuck Lever 		goto out;
1239a246b010SChuck Lever 	if (xprt->shutdown)
1240a246b010SChuck Lever 		goto out;
1241a246b010SChuck Lever 
124261d0a8e6SNeil Brown 	/* Any data means we had a useful conversation, so
124361d0a8e6SNeil Brown 	 * the we don't need to delay the next reconnect
124461d0a8e6SNeil Brown 	 */
124561d0a8e6SNeil Brown 	if (xprt->reestablish_timeout)
124661d0a8e6SNeil Brown 		xprt->reestablish_timeout = 0;
124761d0a8e6SNeil Brown 
12489903cd1cSChuck Lever 	/* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
1249a246b010SChuck Lever 	rd_desc.arg.data = xprt;
1250ff2d7db8STrond Myklebust 	do {
1251a246b010SChuck Lever 		rd_desc.count = 65536;
1252ff2d7db8STrond Myklebust 		read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
1253ff2d7db8STrond Myklebust 	} while (read > 0);
1254a246b010SChuck Lever out:
1255f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
1256a246b010SChuck Lever }
1257a246b010SChuck Lever 
12587d1e8255STrond Myklebust /*
12597d1e8255STrond Myklebust  * Do the equivalent of linger/linger2 handling for dealing with
12607d1e8255STrond Myklebust  * broken servers that don't close the socket in a timely
12617d1e8255STrond Myklebust  * fashion
12627d1e8255STrond Myklebust  */
12637d1e8255STrond Myklebust static void xs_tcp_schedule_linger_timeout(struct rpc_xprt *xprt,
12647d1e8255STrond Myklebust 		unsigned long timeout)
12657d1e8255STrond Myklebust {
12667d1e8255STrond Myklebust 	struct sock_xprt *transport;
12677d1e8255STrond Myklebust 
12687d1e8255STrond Myklebust 	if (xprt_test_and_set_connecting(xprt))
12697d1e8255STrond Myklebust 		return;
12707d1e8255STrond Myklebust 	set_bit(XPRT_CONNECTION_ABORT, &xprt->state);
12717d1e8255STrond Myklebust 	transport = container_of(xprt, struct sock_xprt, xprt);
12727d1e8255STrond Myklebust 	queue_delayed_work(rpciod_workqueue, &transport->connect_worker,
12737d1e8255STrond Myklebust 			   timeout);
12747d1e8255STrond Myklebust }
12757d1e8255STrond Myklebust 
12767d1e8255STrond Myklebust static void xs_tcp_cancel_linger_timeout(struct rpc_xprt *xprt)
12777d1e8255STrond Myklebust {
12787d1e8255STrond Myklebust 	struct sock_xprt *transport;
12797d1e8255STrond Myklebust 
12807d1e8255STrond Myklebust 	transport = container_of(xprt, struct sock_xprt, xprt);
12817d1e8255STrond Myklebust 
12827d1e8255STrond Myklebust 	if (!test_bit(XPRT_CONNECTION_ABORT, &xprt->state) ||
12837d1e8255STrond Myklebust 	    !cancel_delayed_work(&transport->connect_worker))
12847d1e8255STrond Myklebust 		return;
12857d1e8255STrond Myklebust 	clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
12867d1e8255STrond Myklebust 	xprt_clear_connecting(xprt);
12877d1e8255STrond Myklebust }
12887d1e8255STrond Myklebust 
12897d1e8255STrond Myklebust static void xs_sock_mark_closed(struct rpc_xprt *xprt)
12907d1e8255STrond Myklebust {
12917d1e8255STrond Myklebust 	smp_mb__before_clear_bit();
12927d1e8255STrond Myklebust 	clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
12937d1e8255STrond Myklebust 	clear_bit(XPRT_CLOSING, &xprt->state);
12947d1e8255STrond Myklebust 	smp_mb__after_clear_bit();
12957d1e8255STrond Myklebust 	/* Mark transport as closed and wake up all pending tasks */
12967d1e8255STrond Myklebust 	xprt_disconnect_done(xprt);
12977d1e8255STrond Myklebust }
12987d1e8255STrond Myklebust 
12999903cd1cSChuck Lever /**
13009903cd1cSChuck Lever  * xs_tcp_state_change - callback to handle TCP socket state changes
13019903cd1cSChuck Lever  * @sk: socket whose state has changed
13029903cd1cSChuck Lever  *
13039903cd1cSChuck Lever  */
13049903cd1cSChuck Lever static void xs_tcp_state_change(struct sock *sk)
1305a246b010SChuck Lever {
1306a246b010SChuck Lever 	struct rpc_xprt *xprt;
1307a246b010SChuck Lever 
1308f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
1309a246b010SChuck Lever 	if (!(xprt = xprt_from_sock(sk)))
1310a246b010SChuck Lever 		goto out;
13119903cd1cSChuck Lever 	dprintk("RPC:       xs_tcp_state_change client %p...\n", xprt);
1312669502ffSAndy Chittenden 	dprintk("RPC:       state %x conn %d dead %d zapped %d sk_shutdown %d\n",
1313a246b010SChuck Lever 			sk->sk_state, xprt_connected(xprt),
1314a246b010SChuck Lever 			sock_flag(sk, SOCK_DEAD),
1315669502ffSAndy Chittenden 			sock_flag(sk, SOCK_ZAPPED),
1316669502ffSAndy Chittenden 			sk->sk_shutdown);
1317a246b010SChuck Lever 
1318a246b010SChuck Lever 	switch (sk->sk_state) {
1319a246b010SChuck Lever 	case TCP_ESTABLISHED:
1320f064af1eSEric Dumazet 		spin_lock(&xprt->transport_lock);
1321a246b010SChuck Lever 		if (!xprt_test_and_set_connected(xprt)) {
132251971139SChuck Lever 			struct sock_xprt *transport = container_of(xprt,
132351971139SChuck Lever 					struct sock_xprt, xprt);
132451971139SChuck Lever 
1325a246b010SChuck Lever 			/* Reset TCP record info */
132651971139SChuck Lever 			transport->tcp_offset = 0;
132751971139SChuck Lever 			transport->tcp_reclen = 0;
132851971139SChuck Lever 			transport->tcp_copied = 0;
1329e136d092SChuck Lever 			transport->tcp_flags =
1330e136d092SChuck Lever 				TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
133151971139SChuck Lever 
13322a491991STrond Myklebust 			xprt_wake_pending_tasks(xprt, -EAGAIN);
1333a246b010SChuck Lever 		}
1334f064af1eSEric Dumazet 		spin_unlock(&xprt->transport_lock);
1335a246b010SChuck Lever 		break;
13363b948ae5STrond Myklebust 	case TCP_FIN_WAIT1:
13373b948ae5STrond Myklebust 		/* The client initiated a shutdown of the socket */
13387c1d71cfSTrond Myklebust 		xprt->connect_cookie++;
1339663b8858STrond Myklebust 		xprt->reestablish_timeout = 0;
13403b948ae5STrond Myklebust 		set_bit(XPRT_CLOSING, &xprt->state);
13413b948ae5STrond Myklebust 		smp_mb__before_clear_bit();
13423b948ae5STrond Myklebust 		clear_bit(XPRT_CONNECTED, &xprt->state);
1343ef803670STrond Myklebust 		clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
13443b948ae5STrond Myklebust 		smp_mb__after_clear_bit();
134525fe6142STrond Myklebust 		xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
1346a246b010SChuck Lever 		break;
1347632e3bdcSTrond Myklebust 	case TCP_CLOSE_WAIT:
13483b948ae5STrond Myklebust 		/* The server initiated a shutdown of the socket */
134966af1e55STrond Myklebust 		xprt_force_disconnect(xprt);
13507c1d71cfSTrond Myklebust 		xprt->connect_cookie++;
1351663b8858STrond Myklebust 	case TCP_CLOSING:
1352663b8858STrond Myklebust 		/*
1353663b8858STrond Myklebust 		 * If the server closed down the connection, make sure that
1354663b8858STrond Myklebust 		 * we back off before reconnecting
1355663b8858STrond Myklebust 		 */
1356663b8858STrond Myklebust 		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
1357663b8858STrond Myklebust 			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
13583b948ae5STrond Myklebust 		break;
13593b948ae5STrond Myklebust 	case TCP_LAST_ACK:
1360670f9457STrond Myklebust 		set_bit(XPRT_CLOSING, &xprt->state);
136125fe6142STrond Myklebust 		xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
13623b948ae5STrond Myklebust 		smp_mb__before_clear_bit();
13633b948ae5STrond Myklebust 		clear_bit(XPRT_CONNECTED, &xprt->state);
13643b948ae5STrond Myklebust 		smp_mb__after_clear_bit();
13653b948ae5STrond Myklebust 		break;
13663b948ae5STrond Myklebust 	case TCP_CLOSE:
13677d1e8255STrond Myklebust 		xs_tcp_cancel_linger_timeout(xprt);
13687d1e8255STrond Myklebust 		xs_sock_mark_closed(xprt);
1369a246b010SChuck Lever 	}
1370a246b010SChuck Lever  out:
1371f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
1372a246b010SChuck Lever }
1373a246b010SChuck Lever 
13749903cd1cSChuck Lever /**
1375482f32e6STrond Myklebust  * xs_error_report - callback mainly for catching socket errors
13762a9e1cfaSTrond Myklebust  * @sk: socket
13772a9e1cfaSTrond Myklebust  */
1378482f32e6STrond Myklebust static void xs_error_report(struct sock *sk)
13792a9e1cfaSTrond Myklebust {
13802a9e1cfaSTrond Myklebust 	struct rpc_xprt *xprt;
13812a9e1cfaSTrond Myklebust 
1382f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
13832a9e1cfaSTrond Myklebust 	if (!(xprt = xprt_from_sock(sk)))
13842a9e1cfaSTrond Myklebust 		goto out;
13852a9e1cfaSTrond Myklebust 	dprintk("RPC:       %s client %p...\n"
13862a9e1cfaSTrond Myklebust 			"RPC:       error %d\n",
13872a9e1cfaSTrond Myklebust 			__func__, xprt, sk->sk_err);
1388482f32e6STrond Myklebust 	xprt_wake_pending_tasks(xprt, -EAGAIN);
13892a9e1cfaSTrond Myklebust out:
1390f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
13912a9e1cfaSTrond Myklebust }
13922a9e1cfaSTrond Myklebust 
13931f0fa154SIlpo Järvinen static void xs_write_space(struct sock *sk)
13941f0fa154SIlpo Järvinen {
13951f0fa154SIlpo Järvinen 	struct socket *sock;
13961f0fa154SIlpo Järvinen 	struct rpc_xprt *xprt;
13971f0fa154SIlpo Järvinen 
13981f0fa154SIlpo Järvinen 	if (unlikely(!(sock = sk->sk_socket)))
13991f0fa154SIlpo Järvinen 		return;
14001f0fa154SIlpo Järvinen 	clear_bit(SOCK_NOSPACE, &sock->flags);
14011f0fa154SIlpo Järvinen 
14021f0fa154SIlpo Järvinen 	if (unlikely(!(xprt = xprt_from_sock(sk))))
14031f0fa154SIlpo Järvinen 		return;
14041f0fa154SIlpo Järvinen 	if (test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags) == 0)
14051f0fa154SIlpo Järvinen 		return;
14061f0fa154SIlpo Järvinen 
14071f0fa154SIlpo Järvinen 	xprt_write_space(xprt);
14081f0fa154SIlpo Järvinen }
14091f0fa154SIlpo Järvinen 
14102a9e1cfaSTrond Myklebust /**
1411c7b2cae8SChuck Lever  * xs_udp_write_space - callback invoked when socket buffer space
1412c7b2cae8SChuck Lever  *                             becomes available
14139903cd1cSChuck Lever  * @sk: socket whose state has changed
14149903cd1cSChuck Lever  *
1415a246b010SChuck Lever  * Called when more output buffer space is available for this socket.
1416a246b010SChuck Lever  * We try not to wake our writers until they can make "significant"
1417c7b2cae8SChuck Lever  * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1418a246b010SChuck Lever  * with a bunch of small requests.
1419a246b010SChuck Lever  */
1420c7b2cae8SChuck Lever static void xs_udp_write_space(struct sock *sk)
1421a246b010SChuck Lever {
1422f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
1423c7b2cae8SChuck Lever 
1424c7b2cae8SChuck Lever 	/* from net/core/sock.c:sock_def_write_space */
14251f0fa154SIlpo Järvinen 	if (sock_writeable(sk))
14261f0fa154SIlpo Järvinen 		xs_write_space(sk);
1427c7b2cae8SChuck Lever 
1428f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
1429c7b2cae8SChuck Lever }
1430c7b2cae8SChuck Lever 
1431c7b2cae8SChuck Lever /**
1432c7b2cae8SChuck Lever  * xs_tcp_write_space - callback invoked when socket buffer space
1433c7b2cae8SChuck Lever  *                             becomes available
1434c7b2cae8SChuck Lever  * @sk: socket whose state has changed
1435c7b2cae8SChuck Lever  *
1436c7b2cae8SChuck Lever  * Called when more output buffer space is available for this socket.
1437c7b2cae8SChuck Lever  * We try not to wake our writers until they can make "significant"
1438c7b2cae8SChuck Lever  * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1439c7b2cae8SChuck Lever  * with a bunch of small requests.
1440c7b2cae8SChuck Lever  */
1441c7b2cae8SChuck Lever static void xs_tcp_write_space(struct sock *sk)
1442c7b2cae8SChuck Lever {
1443f064af1eSEric Dumazet 	read_lock_bh(&sk->sk_callback_lock);
1444c7b2cae8SChuck Lever 
1445c7b2cae8SChuck Lever 	/* from net/core/stream.c:sk_stream_write_space */
14461f0fa154SIlpo Järvinen 	if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk))
14471f0fa154SIlpo Järvinen 		xs_write_space(sk);
1448c7b2cae8SChuck Lever 
1449f064af1eSEric Dumazet 	read_unlock_bh(&sk->sk_callback_lock);
1450a246b010SChuck Lever }
1451a246b010SChuck Lever 
1452470056c2SChuck Lever static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
1453a246b010SChuck Lever {
1454ee0ac0c2SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1455ee0ac0c2SChuck Lever 	struct sock *sk = transport->inet;
1456a246b010SChuck Lever 
14577c6e066eSChuck Lever 	if (transport->rcvsize) {
1458a246b010SChuck Lever 		sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
14597c6e066eSChuck Lever 		sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
1460a246b010SChuck Lever 	}
14617c6e066eSChuck Lever 	if (transport->sndsize) {
1462a246b010SChuck Lever 		sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
14637c6e066eSChuck Lever 		sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
1464a246b010SChuck Lever 		sk->sk_write_space(sk);
1465a246b010SChuck Lever 	}
1466a246b010SChuck Lever }
1467a246b010SChuck Lever 
146843118c29SChuck Lever /**
1469470056c2SChuck Lever  * xs_udp_set_buffer_size - set send and receive limits
147043118c29SChuck Lever  * @xprt: generic transport
1471470056c2SChuck Lever  * @sndsize: requested size of send buffer, in bytes
1472470056c2SChuck Lever  * @rcvsize: requested size of receive buffer, in bytes
147343118c29SChuck Lever  *
1474470056c2SChuck Lever  * Set socket send and receive buffer size limits.
147543118c29SChuck Lever  */
1476470056c2SChuck Lever static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
147743118c29SChuck Lever {
14787c6e066eSChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
14797c6e066eSChuck Lever 
14807c6e066eSChuck Lever 	transport->sndsize = 0;
1481470056c2SChuck Lever 	if (sndsize)
14827c6e066eSChuck Lever 		transport->sndsize = sndsize + 1024;
14837c6e066eSChuck Lever 	transport->rcvsize = 0;
1484470056c2SChuck Lever 	if (rcvsize)
14857c6e066eSChuck Lever 		transport->rcvsize = rcvsize + 1024;
1486470056c2SChuck Lever 
1487470056c2SChuck Lever 	xs_udp_do_set_buffer_size(xprt);
148843118c29SChuck Lever }
148943118c29SChuck Lever 
149046c0ee8bSChuck Lever /**
149146c0ee8bSChuck Lever  * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
149246c0ee8bSChuck Lever  * @task: task that timed out
149346c0ee8bSChuck Lever  *
149446c0ee8bSChuck Lever  * Adjust the congestion window after a retransmit timeout has occurred.
149546c0ee8bSChuck Lever  */
149646c0ee8bSChuck Lever static void xs_udp_timer(struct rpc_task *task)
149746c0ee8bSChuck Lever {
149846c0ee8bSChuck Lever 	xprt_adjust_cwnd(task, -ETIMEDOUT);
149946c0ee8bSChuck Lever }
150046c0ee8bSChuck Lever 
1501b85d8806SChuck Lever static unsigned short xs_get_random_port(void)
1502b85d8806SChuck Lever {
1503b85d8806SChuck Lever 	unsigned short range = xprt_max_resvport - xprt_min_resvport;
1504b85d8806SChuck Lever 	unsigned short rand = (unsigned short) net_random() % range;
1505b85d8806SChuck Lever 	return rand + xprt_min_resvport;
1506b85d8806SChuck Lever }
1507b85d8806SChuck Lever 
150892200412SChuck Lever /**
150992200412SChuck Lever  * xs_set_port - reset the port number in the remote endpoint address
151092200412SChuck Lever  * @xprt: generic transport
151192200412SChuck Lever  * @port: new port number
151292200412SChuck Lever  *
151392200412SChuck Lever  */
151492200412SChuck Lever static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
151592200412SChuck Lever {
151692200412SChuck Lever 	dprintk("RPC:       setting port for xprt %p to %u\n", xprt, port);
1517c4efcb1dSChuck Lever 
15189dc3b095SChuck Lever 	rpc_set_port(xs_addr(xprt), port);
15199dc3b095SChuck Lever 	xs_update_peer_port(xprt);
152092200412SChuck Lever }
152192200412SChuck Lever 
15225d4ec932SPavel Emelyanov static unsigned short xs_get_srcport(struct sock_xprt *transport)
152367a391d7STrond Myklebust {
1524fbfffbd5SChuck Lever 	unsigned short port = transport->srcport;
152567a391d7STrond Myklebust 
152667a391d7STrond Myklebust 	if (port == 0 && transport->xprt.resvport)
152767a391d7STrond Myklebust 		port = xs_get_random_port();
152867a391d7STrond Myklebust 	return port;
152967a391d7STrond Myklebust }
153067a391d7STrond Myklebust 
1531baaf4e48SPavel Emelyanov static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port)
153267a391d7STrond Myklebust {
1533fbfffbd5SChuck Lever 	if (transport->srcport != 0)
1534fbfffbd5SChuck Lever 		transport->srcport = 0;
153567a391d7STrond Myklebust 	if (!transport->xprt.resvport)
153667a391d7STrond Myklebust 		return 0;
153767a391d7STrond Myklebust 	if (port <= xprt_min_resvport || port > xprt_max_resvport)
153867a391d7STrond Myklebust 		return xprt_max_resvport;
153967a391d7STrond Myklebust 	return --port;
154067a391d7STrond Myklebust }
1541beb59b68SPavel Emelyanov static int xs_bind(struct sock_xprt *transport, struct socket *sock)
1542a246b010SChuck Lever {
1543beb59b68SPavel Emelyanov 	struct sockaddr_storage myaddr;
154467a391d7STrond Myklebust 	int err, nloop = 0;
15455d4ec932SPavel Emelyanov 	unsigned short port = xs_get_srcport(transport);
154667a391d7STrond Myklebust 	unsigned short last;
1547a246b010SChuck Lever 
1548beb59b68SPavel Emelyanov 	memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen);
1549a246b010SChuck Lever 	do {
1550beb59b68SPavel Emelyanov 		rpc_set_port((struct sockaddr *)&myaddr, port);
1551e6242e92SSridhar Samudrala 		err = kernel_bind(sock, (struct sockaddr *)&myaddr,
1552beb59b68SPavel Emelyanov 				transport->xprt.addrlen);
155367a391d7STrond Myklebust 		if (port == 0)
1554d3bc9a1dSFrank van Maarseveen 			break;
1555a246b010SChuck Lever 		if (err == 0) {
1556fbfffbd5SChuck Lever 			transport->srcport = port;
1557d3bc9a1dSFrank van Maarseveen 			break;
1558a246b010SChuck Lever 		}
155967a391d7STrond Myklebust 		last = port;
1560baaf4e48SPavel Emelyanov 		port = xs_next_srcport(transport, port);
156167a391d7STrond Myklebust 		if (port > last)
156267a391d7STrond Myklebust 			nloop++;
156367a391d7STrond Myklebust 	} while (err == -EADDRINUSE && nloop != 2);
1564beb59b68SPavel Emelyanov 
15654232e863SChuck Lever 	if (myaddr.ss_family == AF_INET)
1566beb59b68SPavel Emelyanov 		dprintk("RPC:       %s %pI4:%u: %s (%d)\n", __func__,
1567beb59b68SPavel Emelyanov 				&((struct sockaddr_in *)&myaddr)->sin_addr,
1568beb59b68SPavel Emelyanov 				port, err ? "failed" : "ok", err);
1569beb59b68SPavel Emelyanov 	else
1570beb59b68SPavel Emelyanov 		dprintk("RPC:       %s %pI6:%u: %s (%d)\n", __func__,
1571beb59b68SPavel Emelyanov 				&((struct sockaddr_in6 *)&myaddr)->sin6_addr,
15727dc753f0SChuck Lever 				port, err ? "failed" : "ok", err);
1573a246b010SChuck Lever 	return err;
1574a246b010SChuck Lever }
1575a246b010SChuck Lever 
1576a246b010SChuck Lever 
1577ed07536eSPeter Zijlstra #ifdef CONFIG_DEBUG_LOCK_ALLOC
1578ed07536eSPeter Zijlstra static struct lock_class_key xs_key[2];
1579ed07536eSPeter Zijlstra static struct lock_class_key xs_slock_key[2];
1580ed07536eSPeter Zijlstra 
15818945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock)
1582ed07536eSPeter Zijlstra {
1583ed07536eSPeter Zijlstra 	struct sock *sk = sock->sk;
15848945ee5eSChuck Lever 
158502b3d346SJohn Heffner 	BUG_ON(sock_owned_by_user(sk));
15868945ee5eSChuck Lever 	sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
15878945ee5eSChuck Lever 		&xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
1588ed07536eSPeter Zijlstra }
15898945ee5eSChuck Lever 
15908945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock)
15918945ee5eSChuck Lever {
15928945ee5eSChuck Lever 	struct sock *sk = sock->sk;
15938945ee5eSChuck Lever 
1594f4921affSLinus Torvalds 	BUG_ON(sock_owned_by_user(sk));
15958945ee5eSChuck Lever 	sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
15968945ee5eSChuck Lever 		&xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
1597ed07536eSPeter Zijlstra }
15986bc9638aSPavel Emelyanov 
15996bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock)
16006bc9638aSPavel Emelyanov {
16014232e863SChuck Lever 	switch (family) {
16024232e863SChuck Lever 	case AF_INET:
16036bc9638aSPavel Emelyanov 		xs_reclassify_socket4(sock);
16044232e863SChuck Lever 		break;
16054232e863SChuck Lever 	case AF_INET6:
16066bc9638aSPavel Emelyanov 		xs_reclassify_socket6(sock);
16074232e863SChuck Lever 		break;
16084232e863SChuck Lever 	}
16096bc9638aSPavel Emelyanov }
1610ed07536eSPeter Zijlstra #else
16118945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock)
16128945ee5eSChuck Lever {
16138945ee5eSChuck Lever }
16148945ee5eSChuck Lever 
16158945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock)
1616ed07536eSPeter Zijlstra {
1617ed07536eSPeter Zijlstra }
16186bc9638aSPavel Emelyanov 
16196bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock)
16206bc9638aSPavel Emelyanov {
16216bc9638aSPavel Emelyanov }
1622ed07536eSPeter Zijlstra #endif
1623ed07536eSPeter Zijlstra 
16246bc9638aSPavel Emelyanov static struct socket *xs_create_sock(struct rpc_xprt *xprt,
16256bc9638aSPavel Emelyanov 		struct sock_xprt *transport, int family, int type, int protocol)
162622f79326SPavel Emelyanov {
162722f79326SPavel Emelyanov 	struct socket *sock;
162822f79326SPavel Emelyanov 	int err;
162922f79326SPavel Emelyanov 
16306bc9638aSPavel Emelyanov 	err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1);
163122f79326SPavel Emelyanov 	if (err < 0) {
163222f79326SPavel Emelyanov 		dprintk("RPC:       can't create %d transport socket (%d).\n",
163322f79326SPavel Emelyanov 				protocol, -err);
163422f79326SPavel Emelyanov 		goto out;
163522f79326SPavel Emelyanov 	}
16366bc9638aSPavel Emelyanov 	xs_reclassify_socket(family, sock);
163722f79326SPavel Emelyanov 
16384cea288aSBen Hutchings 	err = xs_bind(transport, sock);
16394cea288aSBen Hutchings 	if (err) {
164022f79326SPavel Emelyanov 		sock_release(sock);
164122f79326SPavel Emelyanov 		goto out;
164222f79326SPavel Emelyanov 	}
164322f79326SPavel Emelyanov 
164422f79326SPavel Emelyanov 	return sock;
164522f79326SPavel Emelyanov out:
164622f79326SPavel Emelyanov 	return ERR_PTR(err);
164722f79326SPavel Emelyanov }
164822f79326SPavel Emelyanov 
164916be2d20SChuck Lever static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
1650a246b010SChuck Lever {
165116be2d20SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1652edb267a6SChuck Lever 
1653ee0ac0c2SChuck Lever 	if (!transport->inet) {
1654b0d93ad5SChuck Lever 		struct sock *sk = sock->sk;
1655b0d93ad5SChuck Lever 
1656b0d93ad5SChuck Lever 		write_lock_bh(&sk->sk_callback_lock);
1657b0d93ad5SChuck Lever 
16582a9e1cfaSTrond Myklebust 		xs_save_old_callbacks(transport, sk);
16592a9e1cfaSTrond Myklebust 
1660b0d93ad5SChuck Lever 		sk->sk_user_data = xprt;
1661b0d93ad5SChuck Lever 		sk->sk_data_ready = xs_udp_data_ready;
1662b0d93ad5SChuck Lever 		sk->sk_write_space = xs_udp_write_space;
1663482f32e6STrond Myklebust 		sk->sk_error_report = xs_error_report;
1664b0d93ad5SChuck Lever 		sk->sk_no_check = UDP_CSUM_NORCV;
1665b079fa7bSTrond Myklebust 		sk->sk_allocation = GFP_ATOMIC;
1666b0d93ad5SChuck Lever 
1667b0d93ad5SChuck Lever 		xprt_set_connected(xprt);
1668b0d93ad5SChuck Lever 
1669b0d93ad5SChuck Lever 		/* Reset to new socket */
1670ee0ac0c2SChuck Lever 		transport->sock = sock;
1671ee0ac0c2SChuck Lever 		transport->inet = sk;
1672b0d93ad5SChuck Lever 
1673b0d93ad5SChuck Lever 		write_unlock_bh(&sk->sk_callback_lock);
1674b0d93ad5SChuck Lever 	}
1675470056c2SChuck Lever 	xs_udp_do_set_buffer_size(xprt);
167616be2d20SChuck Lever }
167716be2d20SChuck Lever 
16788c14ff2aSPavel Emelyanov static void xs_udp_setup_socket(struct work_struct *work)
1679a246b010SChuck Lever {
1680a246b010SChuck Lever 	struct sock_xprt *transport =
1681a246b010SChuck Lever 		container_of(work, struct sock_xprt, connect_worker.work);
1682a246b010SChuck Lever 	struct rpc_xprt *xprt = &transport->xprt;
1683a246b010SChuck Lever 	struct socket *sock = transport->sock;
1684b65c0310SPavel Emelyanov 	int status = -EIO;
1685a246b010SChuck Lever 
168601d37c42STrond Myklebust 	if (xprt->shutdown)
16879903cd1cSChuck Lever 		goto out;
16889903cd1cSChuck Lever 
1689a246b010SChuck Lever 	/* Start by resetting any existing state */
1690fe315e76SChuck Lever 	xs_reset_transport(transport);
16918c14ff2aSPavel Emelyanov 	sock = xs_create_sock(xprt, transport,
16928c14ff2aSPavel Emelyanov 			xs_addr(xprt)->sa_family, SOCK_DGRAM, IPPROTO_UDP);
1693b65c0310SPavel Emelyanov 	if (IS_ERR(sock))
1694a246b010SChuck Lever 		goto out;
169568e220bdSChuck Lever 
1696c740eff8SChuck Lever 	dprintk("RPC:       worker connecting xprt %p via %s to "
1697c740eff8SChuck Lever 				"%s (port %s)\n", xprt,
1698c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_PROTO],
1699c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_ADDR],
1700c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_PORT]);
170168e220bdSChuck Lever 
170268e220bdSChuck Lever 	xs_udp_finish_connecting(xprt, sock);
1703a246b010SChuck Lever 	status = 0;
1704b0d93ad5SChuck Lever out:
1705b0d93ad5SChuck Lever 	xprt_clear_connecting(xprt);
17067d1e8255STrond Myklebust 	xprt_wake_pending_tasks(xprt, status);
1707b0d93ad5SChuck Lever }
1708b0d93ad5SChuck Lever 
17093167e12cSChuck Lever /*
17103167e12cSChuck Lever  * We need to preserve the port number so the reply cache on the server can
17113167e12cSChuck Lever  * find our cached RPC replies when we get around to reconnecting.
17123167e12cSChuck Lever  */
171358dddac9SPavel Emelyanov static void xs_abort_connection(struct sock_xprt *transport)
17143167e12cSChuck Lever {
17153167e12cSChuck Lever 	int result;
17163167e12cSChuck Lever 	struct sockaddr any;
17173167e12cSChuck Lever 
171858dddac9SPavel Emelyanov 	dprintk("RPC:       disconnecting xprt %p to reuse port\n", transport);
17193167e12cSChuck Lever 
17203167e12cSChuck Lever 	/*
17213167e12cSChuck Lever 	 * Disconnect the transport socket by doing a connect operation
17223167e12cSChuck Lever 	 * with AF_UNSPEC.  This should return immediately...
17233167e12cSChuck Lever 	 */
17243167e12cSChuck Lever 	memset(&any, 0, sizeof(any));
17253167e12cSChuck Lever 	any.sa_family = AF_UNSPEC;
1726ee0ac0c2SChuck Lever 	result = kernel_connect(transport->sock, &any, sizeof(any), 0);
17277d1e8255STrond Myklebust 	if (!result)
172858dddac9SPavel Emelyanov 		xs_sock_mark_closed(&transport->xprt);
17297d1e8255STrond Myklebust 	else
17303167e12cSChuck Lever 		dprintk("RPC:       AF_UNSPEC connect return code %d\n",
17313167e12cSChuck Lever 				result);
17323167e12cSChuck Lever }
17333167e12cSChuck Lever 
173458dddac9SPavel Emelyanov static void xs_tcp_reuse_connection(struct sock_xprt *transport)
173540d2549dSTrond Myklebust {
173640d2549dSTrond Myklebust 	unsigned int state = transport->inet->sk_state;
173740d2549dSTrond Myklebust 
1738669502ffSAndy Chittenden 	if (state == TCP_CLOSE && transport->sock->state == SS_UNCONNECTED) {
1739669502ffSAndy Chittenden 		/* we don't need to abort the connection if the socket
1740669502ffSAndy Chittenden 		 * hasn't undergone a shutdown
1741669502ffSAndy Chittenden 		 */
1742669502ffSAndy Chittenden 		if (transport->inet->sk_shutdown == 0)
174340d2549dSTrond Myklebust 			return;
1744669502ffSAndy Chittenden 		dprintk("RPC:       %s: TCP_CLOSEd and sk_shutdown set to %d\n",
1745669502ffSAndy Chittenden 				__func__, transport->inet->sk_shutdown);
1746669502ffSAndy Chittenden 	}
1747669502ffSAndy Chittenden 	if ((1 << state) & (TCPF_ESTABLISHED|TCPF_SYN_SENT)) {
1748669502ffSAndy Chittenden 		/* we don't need to abort the connection if the socket
1749669502ffSAndy Chittenden 		 * hasn't undergone a shutdown
1750669502ffSAndy Chittenden 		 */
1751669502ffSAndy Chittenden 		if (transport->inet->sk_shutdown == 0)
175240d2549dSTrond Myklebust 			return;
1753669502ffSAndy Chittenden 		dprintk("RPC:       %s: ESTABLISHED/SYN_SENT "
1754669502ffSAndy Chittenden 				"sk_shutdown set to %d\n",
1755669502ffSAndy Chittenden 				__func__, transport->inet->sk_shutdown);
1756669502ffSAndy Chittenden 	}
175758dddac9SPavel Emelyanov 	xs_abort_connection(transport);
175840d2549dSTrond Myklebust }
175940d2549dSTrond Myklebust 
176016be2d20SChuck Lever static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
1761b0d93ad5SChuck Lever {
176216be2d20SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1763fe19a96bSTrond Myklebust 	int ret = -ENOTCONN;
1764edb267a6SChuck Lever 
1765ee0ac0c2SChuck Lever 	if (!transport->inet) {
1766b0d93ad5SChuck Lever 		struct sock *sk = sock->sk;
1767b0d93ad5SChuck Lever 
1768b0d93ad5SChuck Lever 		write_lock_bh(&sk->sk_callback_lock);
1769b0d93ad5SChuck Lever 
17702a9e1cfaSTrond Myklebust 		xs_save_old_callbacks(transport, sk);
17712a9e1cfaSTrond Myklebust 
1772b0d93ad5SChuck Lever 		sk->sk_user_data = xprt;
1773b0d93ad5SChuck Lever 		sk->sk_data_ready = xs_tcp_data_ready;
1774b0d93ad5SChuck Lever 		sk->sk_state_change = xs_tcp_state_change;
1775b0d93ad5SChuck Lever 		sk->sk_write_space = xs_tcp_write_space;
1776482f32e6STrond Myklebust 		sk->sk_error_report = xs_error_report;
1777b079fa7bSTrond Myklebust 		sk->sk_allocation = GFP_ATOMIC;
17783167e12cSChuck Lever 
17793167e12cSChuck Lever 		/* socket options */
17803167e12cSChuck Lever 		sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
17813167e12cSChuck Lever 		sock_reset_flag(sk, SOCK_LINGER);
17823167e12cSChuck Lever 		tcp_sk(sk)->linger2 = 0;
17833167e12cSChuck Lever 		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
1784b0d93ad5SChuck Lever 
1785b0d93ad5SChuck Lever 		xprt_clear_connected(xprt);
1786b0d93ad5SChuck Lever 
1787b0d93ad5SChuck Lever 		/* Reset to new socket */
1788ee0ac0c2SChuck Lever 		transport->sock = sock;
1789ee0ac0c2SChuck Lever 		transport->inet = sk;
1790b0d93ad5SChuck Lever 
1791b0d93ad5SChuck Lever 		write_unlock_bh(&sk->sk_callback_lock);
1792b0d93ad5SChuck Lever 	}
1793b0d93ad5SChuck Lever 
179401d37c42STrond Myklebust 	if (!xprt_bound(xprt))
1795fe19a96bSTrond Myklebust 		goto out;
179601d37c42STrond Myklebust 
1797b0d93ad5SChuck Lever 	/* Tell the socket layer to start connecting... */
1798262ca07dSChuck Lever 	xprt->stat.connect_count++;
1799262ca07dSChuck Lever 	xprt->stat.connect_start = jiffies;
1800fe19a96bSTrond Myklebust 	ret = kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
1801fe19a96bSTrond Myklebust 	switch (ret) {
1802fe19a96bSTrond Myklebust 	case 0:
1803fe19a96bSTrond Myklebust 	case -EINPROGRESS:
1804fe19a96bSTrond Myklebust 		/* SYN_SENT! */
1805fe19a96bSTrond Myklebust 		xprt->connect_cookie++;
1806fe19a96bSTrond Myklebust 		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
1807fe19a96bSTrond Myklebust 			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
1808fe19a96bSTrond Myklebust 	}
1809fe19a96bSTrond Myklebust out:
1810fe19a96bSTrond Myklebust 	return ret;
181116be2d20SChuck Lever }
181216be2d20SChuck Lever 
181316be2d20SChuck Lever /**
1814b61d59ffSTrond Myklebust  * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint
1815b61d59ffSTrond Myklebust  * @xprt: RPC transport to connect
1816b61d59ffSTrond Myklebust  * @transport: socket transport to connect
1817b61d59ffSTrond Myklebust  * @create_sock: function to create a socket of the correct type
181816be2d20SChuck Lever  *
181916be2d20SChuck Lever  * Invoked by a work queue tasklet.
182016be2d20SChuck Lever  */
1821cdd518d5SPavel Emelyanov static void xs_tcp_setup_socket(struct work_struct *work)
182216be2d20SChuck Lever {
1823cdd518d5SPavel Emelyanov 	struct sock_xprt *transport =
1824cdd518d5SPavel Emelyanov 		container_of(work, struct sock_xprt, connect_worker.work);
182516be2d20SChuck Lever 	struct socket *sock = transport->sock;
1826a9f5f0f7SPavel Emelyanov 	struct rpc_xprt *xprt = &transport->xprt;
1827b61d59ffSTrond Myklebust 	int status = -EIO;
182816be2d20SChuck Lever 
182901d37c42STrond Myklebust 	if (xprt->shutdown)
183016be2d20SChuck Lever 		goto out;
183116be2d20SChuck Lever 
183216be2d20SChuck Lever 	if (!sock) {
18337d1e8255STrond Myklebust 		clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
1834cdd518d5SPavel Emelyanov 		sock = xs_create_sock(xprt, transport,
1835cdd518d5SPavel Emelyanov 				xs_addr(xprt)->sa_family, SOCK_STREAM, IPPROTO_TCP);
1836b61d59ffSTrond Myklebust 		if (IS_ERR(sock)) {
1837b61d59ffSTrond Myklebust 			status = PTR_ERR(sock);
183816be2d20SChuck Lever 			goto out;
183916be2d20SChuck Lever 		}
18407d1e8255STrond Myklebust 	} else {
18417d1e8255STrond Myklebust 		int abort_and_exit;
18427d1e8255STrond Myklebust 
18437d1e8255STrond Myklebust 		abort_and_exit = test_and_clear_bit(XPRT_CONNECTION_ABORT,
18447d1e8255STrond Myklebust 				&xprt->state);
184516be2d20SChuck Lever 		/* "close" the socket, preserving the local port */
184658dddac9SPavel Emelyanov 		xs_tcp_reuse_connection(transport);
184716be2d20SChuck Lever 
18487d1e8255STrond Myklebust 		if (abort_and_exit)
18497d1e8255STrond Myklebust 			goto out_eagain;
18507d1e8255STrond Myklebust 	}
18517d1e8255STrond Myklebust 
1852c740eff8SChuck Lever 	dprintk("RPC:       worker connecting xprt %p via %s to "
1853c740eff8SChuck Lever 				"%s (port %s)\n", xprt,
1854c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_PROTO],
1855c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_ADDR],
1856c740eff8SChuck Lever 			xprt->address_strings[RPC_DISPLAY_PORT]);
185716be2d20SChuck Lever 
185816be2d20SChuck Lever 	status = xs_tcp_finish_connecting(xprt, sock);
1859a246b010SChuck Lever 	dprintk("RPC:       %p connect status %d connected %d sock state %d\n",
186046121cf7SChuck Lever 			xprt, -status, xprt_connected(xprt),
186146121cf7SChuck Lever 			sock->sk->sk_state);
1862a246b010SChuck Lever 	switch (status) {
1863f75e6745STrond Myklebust 	default:
1864f75e6745STrond Myklebust 		printk("%s: connect returned unhandled error %d\n",
1865f75e6745STrond Myklebust 			__func__, status);
1866f75e6745STrond Myklebust 	case -EADDRNOTAVAIL:
1867f75e6745STrond Myklebust 		/* We're probably in TIME_WAIT. Get rid of existing socket,
1868f75e6745STrond Myklebust 		 * and retry
1869f75e6745STrond Myklebust 		 */
1870f75e6745STrond Myklebust 		set_bit(XPRT_CONNECTION_CLOSE, &xprt->state);
1871f75e6745STrond Myklebust 		xprt_force_disconnect(xprt);
187288b5ed73STrond Myklebust 		break;
18738a2cec29STrond Myklebust 	case -ECONNREFUSED:
18748a2cec29STrond Myklebust 	case -ECONNRESET:
18758a2cec29STrond Myklebust 	case -ENETUNREACH:
18768a2cec29STrond Myklebust 		/* retry with existing socket, after a delay */
18772a491991STrond Myklebust 	case 0:
1878a246b010SChuck Lever 	case -EINPROGRESS:
1879a246b010SChuck Lever 	case -EALREADY:
18807d1e8255STrond Myklebust 		xprt_clear_connecting(xprt);
18817d1e8255STrond Myklebust 		return;
18829fcfe0c8STrond Myklebust 	case -EINVAL:
18839fcfe0c8STrond Myklebust 		/* Happens, for instance, if the user specified a link
18849fcfe0c8STrond Myklebust 		 * local IPv6 address without a scope-id.
18859fcfe0c8STrond Myklebust 		 */
18869fcfe0c8STrond Myklebust 		goto out;
18878a2cec29STrond Myklebust 	}
18887d1e8255STrond Myklebust out_eagain:
18892a491991STrond Myklebust 	status = -EAGAIN;
1890a246b010SChuck Lever out:
18912226feb6SChuck Lever 	xprt_clear_connecting(xprt);
18927d1e8255STrond Myklebust 	xprt_wake_pending_tasks(xprt, status);
1893a246b010SChuck Lever }
1894a246b010SChuck Lever 
189568e220bdSChuck Lever /**
18969903cd1cSChuck Lever  * xs_connect - connect a socket to a remote endpoint
18979903cd1cSChuck Lever  * @task: address of RPC task that manages state of connect request
18989903cd1cSChuck Lever  *
18999903cd1cSChuck Lever  * TCP: If the remote end dropped the connection, delay reconnecting.
190003bf4b70SChuck Lever  *
190103bf4b70SChuck Lever  * UDP socket connects are synchronous, but we use a work queue anyway
190203bf4b70SChuck Lever  * to guarantee that even unprivileged user processes can set up a
190303bf4b70SChuck Lever  * socket on a privileged port.
190403bf4b70SChuck Lever  *
190503bf4b70SChuck Lever  * If a UDP socket connect fails, the delay behavior here prevents
190603bf4b70SChuck Lever  * retry floods (hard mounts).
19079903cd1cSChuck Lever  */
19089903cd1cSChuck Lever static void xs_connect(struct rpc_task *task)
1909a246b010SChuck Lever {
1910a246b010SChuck Lever 	struct rpc_xprt *xprt = task->tk_xprt;
1911ee0ac0c2SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1912a246b010SChuck Lever 
191309a21c41SChuck Lever 	if (transport->sock != NULL && !RPC_IS_SOFTCONN(task)) {
191446121cf7SChuck Lever 		dprintk("RPC:       xs_connect delayed xprt %p for %lu "
191546121cf7SChuck Lever 				"seconds\n",
191603bf4b70SChuck Lever 				xprt, xprt->reestablish_timeout / HZ);
1917c1384c9cSTrond Myklebust 		queue_delayed_work(rpciod_workqueue,
1918c1384c9cSTrond Myklebust 				   &transport->connect_worker,
191903bf4b70SChuck Lever 				   xprt->reestablish_timeout);
192003bf4b70SChuck Lever 		xprt->reestablish_timeout <<= 1;
192161d0a8e6SNeil Brown 		if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
192261d0a8e6SNeil Brown 			xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
192303bf4b70SChuck Lever 		if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
192403bf4b70SChuck Lever 			xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
19259903cd1cSChuck Lever 	} else {
19269903cd1cSChuck Lever 		dprintk("RPC:       xs_connect scheduled xprt %p\n", xprt);
1927c1384c9cSTrond Myklebust 		queue_delayed_work(rpciod_workqueue,
1928c1384c9cSTrond Myklebust 				   &transport->connect_worker, 0);
1929a246b010SChuck Lever 	}
1930a246b010SChuck Lever }
1931a246b010SChuck Lever 
1932262ca07dSChuck Lever /**
1933262ca07dSChuck Lever  * xs_udp_print_stats - display UDP socket-specifc stats
1934262ca07dSChuck Lever  * @xprt: rpc_xprt struct containing statistics
1935262ca07dSChuck Lever  * @seq: output file
1936262ca07dSChuck Lever  *
1937262ca07dSChuck Lever  */
1938262ca07dSChuck Lever static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
1939262ca07dSChuck Lever {
1940c8475461SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1941c8475461SChuck Lever 
1942262ca07dSChuck Lever 	seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n",
1943fbfffbd5SChuck Lever 			transport->srcport,
1944262ca07dSChuck Lever 			xprt->stat.bind_count,
1945262ca07dSChuck Lever 			xprt->stat.sends,
1946262ca07dSChuck Lever 			xprt->stat.recvs,
1947262ca07dSChuck Lever 			xprt->stat.bad_xids,
1948262ca07dSChuck Lever 			xprt->stat.req_u,
1949262ca07dSChuck Lever 			xprt->stat.bklog_u);
1950262ca07dSChuck Lever }
1951262ca07dSChuck Lever 
1952262ca07dSChuck Lever /**
1953262ca07dSChuck Lever  * xs_tcp_print_stats - display TCP socket-specifc stats
1954262ca07dSChuck Lever  * @xprt: rpc_xprt struct containing statistics
1955262ca07dSChuck Lever  * @seq: output file
1956262ca07dSChuck Lever  *
1957262ca07dSChuck Lever  */
1958262ca07dSChuck Lever static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
1959262ca07dSChuck Lever {
1960c8475461SChuck Lever 	struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1961262ca07dSChuck Lever 	long idle_time = 0;
1962262ca07dSChuck Lever 
1963262ca07dSChuck Lever 	if (xprt_connected(xprt))
1964262ca07dSChuck Lever 		idle_time = (long)(jiffies - xprt->last_used) / HZ;
1965262ca07dSChuck Lever 
1966262ca07dSChuck Lever 	seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n",
1967fbfffbd5SChuck Lever 			transport->srcport,
1968262ca07dSChuck Lever 			xprt->stat.bind_count,
1969262ca07dSChuck Lever 			xprt->stat.connect_count,
1970262ca07dSChuck Lever 			xprt->stat.connect_time,
1971262ca07dSChuck Lever 			idle_time,
1972262ca07dSChuck Lever 			xprt->stat.sends,
1973262ca07dSChuck Lever 			xprt->stat.recvs,
1974262ca07dSChuck Lever 			xprt->stat.bad_xids,
1975262ca07dSChuck Lever 			xprt->stat.req_u,
1976262ca07dSChuck Lever 			xprt->stat.bklog_u);
1977262ca07dSChuck Lever }
1978262ca07dSChuck Lever 
19794cfc7e60SRahul Iyer /*
19804cfc7e60SRahul Iyer  * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason
19814cfc7e60SRahul Iyer  * we allocate pages instead doing a kmalloc like rpc_malloc is because we want
19824cfc7e60SRahul Iyer  * to use the server side send routines.
19834cfc7e60SRahul Iyer  */
19845a51f13aSH Hartley Sweeten static void *bc_malloc(struct rpc_task *task, size_t size)
19854cfc7e60SRahul Iyer {
19864cfc7e60SRahul Iyer 	struct page *page;
19874cfc7e60SRahul Iyer 	struct rpc_buffer *buf;
19884cfc7e60SRahul Iyer 
19894cfc7e60SRahul Iyer 	BUG_ON(size > PAGE_SIZE - sizeof(struct rpc_buffer));
19904cfc7e60SRahul Iyer 	page = alloc_page(GFP_KERNEL);
19914cfc7e60SRahul Iyer 
19924cfc7e60SRahul Iyer 	if (!page)
19934cfc7e60SRahul Iyer 		return NULL;
19944cfc7e60SRahul Iyer 
19954cfc7e60SRahul Iyer 	buf = page_address(page);
19964cfc7e60SRahul Iyer 	buf->len = PAGE_SIZE;
19974cfc7e60SRahul Iyer 
19984cfc7e60SRahul Iyer 	return buf->data;
19994cfc7e60SRahul Iyer }
20004cfc7e60SRahul Iyer 
20014cfc7e60SRahul Iyer /*
20024cfc7e60SRahul Iyer  * Free the space allocated in the bc_alloc routine
20034cfc7e60SRahul Iyer  */
20045a51f13aSH Hartley Sweeten static void bc_free(void *buffer)
20054cfc7e60SRahul Iyer {
20064cfc7e60SRahul Iyer 	struct rpc_buffer *buf;
20074cfc7e60SRahul Iyer 
20084cfc7e60SRahul Iyer 	if (!buffer)
20094cfc7e60SRahul Iyer 		return;
20104cfc7e60SRahul Iyer 
20114cfc7e60SRahul Iyer 	buf = container_of(buffer, struct rpc_buffer, data);
20124cfc7e60SRahul Iyer 	free_page((unsigned long)buf);
20134cfc7e60SRahul Iyer }
20144cfc7e60SRahul Iyer 
20154cfc7e60SRahul Iyer /*
20164cfc7e60SRahul Iyer  * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex
20174cfc7e60SRahul Iyer  * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request.
20184cfc7e60SRahul Iyer  */
20194cfc7e60SRahul Iyer static int bc_sendto(struct rpc_rqst *req)
20204cfc7e60SRahul Iyer {
20214cfc7e60SRahul Iyer 	int len;
20224cfc7e60SRahul Iyer 	struct xdr_buf *xbufp = &req->rq_snd_buf;
20234cfc7e60SRahul Iyer 	struct rpc_xprt *xprt = req->rq_xprt;
20244cfc7e60SRahul Iyer 	struct sock_xprt *transport =
20254cfc7e60SRahul Iyer 				container_of(xprt, struct sock_xprt, xprt);
20264cfc7e60SRahul Iyer 	struct socket *sock = transport->sock;
20274cfc7e60SRahul Iyer 	unsigned long headoff;
20284cfc7e60SRahul Iyer 	unsigned long tailoff;
20294cfc7e60SRahul Iyer 
2030*61677eeeSChuck Lever 	xs_encode_stream_record_marker(xbufp);
20314cfc7e60SRahul Iyer 
20324cfc7e60SRahul Iyer 	tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK;
20334cfc7e60SRahul Iyer 	headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK;
20344cfc7e60SRahul Iyer 	len = svc_send_common(sock, xbufp,
20354cfc7e60SRahul Iyer 			      virt_to_page(xbufp->head[0].iov_base), headoff,
20364cfc7e60SRahul Iyer 			      xbufp->tail[0].iov_base, tailoff);
20374cfc7e60SRahul Iyer 
20384cfc7e60SRahul Iyer 	if (len != xbufp->len) {
20394cfc7e60SRahul Iyer 		printk(KERN_NOTICE "Error sending entire callback!\n");
20404cfc7e60SRahul Iyer 		len = -EAGAIN;
20414cfc7e60SRahul Iyer 	}
20424cfc7e60SRahul Iyer 
20434cfc7e60SRahul Iyer 	return len;
20444cfc7e60SRahul Iyer }
20454cfc7e60SRahul Iyer 
20464cfc7e60SRahul Iyer /*
20474cfc7e60SRahul Iyer  * The send routine. Borrows from svc_send
20484cfc7e60SRahul Iyer  */
20494cfc7e60SRahul Iyer static int bc_send_request(struct rpc_task *task)
20504cfc7e60SRahul Iyer {
20514cfc7e60SRahul Iyer 	struct rpc_rqst *req = task->tk_rqstp;
20524cfc7e60SRahul Iyer 	struct svc_xprt	*xprt;
20534cfc7e60SRahul Iyer 	struct svc_sock         *svsk;
20544cfc7e60SRahul Iyer 	u32                     len;
20554cfc7e60SRahul Iyer 
20564cfc7e60SRahul Iyer 	dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid));
20574cfc7e60SRahul Iyer 	/*
20584cfc7e60SRahul Iyer 	 * Get the server socket associated with this callback xprt
20594cfc7e60SRahul Iyer 	 */
20604cfc7e60SRahul Iyer 	xprt = req->rq_xprt->bc_xprt;
20614cfc7e60SRahul Iyer 	svsk = container_of(xprt, struct svc_sock, sk_xprt);
20624cfc7e60SRahul Iyer 
20634cfc7e60SRahul Iyer 	/*
20644cfc7e60SRahul Iyer 	 * Grab the mutex to serialize data as the connection is shared
20654cfc7e60SRahul Iyer 	 * with the fore channel
20664cfc7e60SRahul Iyer 	 */
20674cfc7e60SRahul Iyer 	if (!mutex_trylock(&xprt->xpt_mutex)) {
20684cfc7e60SRahul Iyer 		rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL);
20694cfc7e60SRahul Iyer 		if (!mutex_trylock(&xprt->xpt_mutex))
20704cfc7e60SRahul Iyer 			return -EAGAIN;
20714cfc7e60SRahul Iyer 		rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task);
20724cfc7e60SRahul Iyer 	}
20734cfc7e60SRahul Iyer 	if (test_bit(XPT_DEAD, &xprt->xpt_flags))
20744cfc7e60SRahul Iyer 		len = -ENOTCONN;
20754cfc7e60SRahul Iyer 	else
20764cfc7e60SRahul Iyer 		len = bc_sendto(req);
20774cfc7e60SRahul Iyer 	mutex_unlock(&xprt->xpt_mutex);
20784cfc7e60SRahul Iyer 
20794cfc7e60SRahul Iyer 	if (len > 0)
20804cfc7e60SRahul Iyer 		len = 0;
20814cfc7e60SRahul Iyer 
20824cfc7e60SRahul Iyer 	return len;
20834cfc7e60SRahul Iyer }
20844cfc7e60SRahul Iyer 
20854cfc7e60SRahul Iyer /*
20864cfc7e60SRahul Iyer  * The close routine. Since this is client initiated, we do nothing
20874cfc7e60SRahul Iyer  */
20884cfc7e60SRahul Iyer 
20894cfc7e60SRahul Iyer static void bc_close(struct rpc_xprt *xprt)
20904cfc7e60SRahul Iyer {
20914cfc7e60SRahul Iyer }
20924cfc7e60SRahul Iyer 
20934cfc7e60SRahul Iyer /*
20944cfc7e60SRahul Iyer  * The xprt destroy routine. Again, because this connection is client
20954cfc7e60SRahul Iyer  * initiated, we do nothing
20964cfc7e60SRahul Iyer  */
20974cfc7e60SRahul Iyer 
20984cfc7e60SRahul Iyer static void bc_destroy(struct rpc_xprt *xprt)
20994cfc7e60SRahul Iyer {
21004cfc7e60SRahul Iyer }
21014cfc7e60SRahul Iyer 
2102262965f5SChuck Lever static struct rpc_xprt_ops xs_udp_ops = {
210343118c29SChuck Lever 	.set_buffer_size	= xs_udp_set_buffer_size,
210412a80469SChuck Lever 	.reserve_xprt		= xprt_reserve_xprt_cong,
210549e9a890SChuck Lever 	.release_xprt		= xprt_release_xprt_cong,
210645160d62SChuck Lever 	.rpcbind		= rpcb_getport_async,
210792200412SChuck Lever 	.set_port		= xs_set_port,
21089903cd1cSChuck Lever 	.connect		= xs_connect,
210902107148SChuck Lever 	.buf_alloc		= rpc_malloc,
211002107148SChuck Lever 	.buf_free		= rpc_free,
2111262965f5SChuck Lever 	.send_request		= xs_udp_send_request,
2112fe3aca29SChuck Lever 	.set_retrans_timeout	= xprt_set_retrans_timeout_rtt,
211346c0ee8bSChuck Lever 	.timer			= xs_udp_timer,
2114a58dd398SChuck Lever 	.release_request	= xprt_release_rqst_cong,
2115262965f5SChuck Lever 	.close			= xs_close,
2116262965f5SChuck Lever 	.destroy		= xs_destroy,
2117262ca07dSChuck Lever 	.print_stats		= xs_udp_print_stats,
2118262965f5SChuck Lever };
2119262965f5SChuck Lever 
2120262965f5SChuck Lever static struct rpc_xprt_ops xs_tcp_ops = {
212112a80469SChuck Lever 	.reserve_xprt		= xprt_reserve_xprt,
2122e0ab53deSTrond Myklebust 	.release_xprt		= xs_tcp_release_xprt,
212345160d62SChuck Lever 	.rpcbind		= rpcb_getport_async,
212492200412SChuck Lever 	.set_port		= xs_set_port,
21250b9e7943STrond Myklebust 	.connect		= xs_connect,
212602107148SChuck Lever 	.buf_alloc		= rpc_malloc,
212702107148SChuck Lever 	.buf_free		= rpc_free,
2128262965f5SChuck Lever 	.send_request		= xs_tcp_send_request,
2129fe3aca29SChuck Lever 	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
2130f75e6745STrond Myklebust 	.close			= xs_tcp_close,
21319903cd1cSChuck Lever 	.destroy		= xs_destroy,
2132262ca07dSChuck Lever 	.print_stats		= xs_tcp_print_stats,
2133a246b010SChuck Lever };
2134a246b010SChuck Lever 
21354cfc7e60SRahul Iyer /*
21364cfc7e60SRahul Iyer  * The rpc_xprt_ops for the server backchannel
21374cfc7e60SRahul Iyer  */
21384cfc7e60SRahul Iyer 
21394cfc7e60SRahul Iyer static struct rpc_xprt_ops bc_tcp_ops = {
21404cfc7e60SRahul Iyer 	.reserve_xprt		= xprt_reserve_xprt,
21414cfc7e60SRahul Iyer 	.release_xprt		= xprt_release_xprt,
21424cfc7e60SRahul Iyer 	.buf_alloc		= bc_malloc,
21434cfc7e60SRahul Iyer 	.buf_free		= bc_free,
21444cfc7e60SRahul Iyer 	.send_request		= bc_send_request,
21454cfc7e60SRahul Iyer 	.set_retrans_timeout	= xprt_set_retrans_timeout_def,
21464cfc7e60SRahul Iyer 	.close			= bc_close,
21474cfc7e60SRahul Iyer 	.destroy		= bc_destroy,
21484cfc7e60SRahul Iyer 	.print_stats		= xs_tcp_print_stats,
21494cfc7e60SRahul Iyer };
21504cfc7e60SRahul Iyer 
215192476850SChuck Lever static int xs_init_anyaddr(const int family, struct sockaddr *sap)
215292476850SChuck Lever {
215392476850SChuck Lever 	static const struct sockaddr_in sin = {
215492476850SChuck Lever 		.sin_family		= AF_INET,
215592476850SChuck Lever 		.sin_addr.s_addr	= htonl(INADDR_ANY),
215692476850SChuck Lever 	};
215792476850SChuck Lever 	static const struct sockaddr_in6 sin6 = {
215892476850SChuck Lever 		.sin6_family		= AF_INET6,
215992476850SChuck Lever 		.sin6_addr		= IN6ADDR_ANY_INIT,
216092476850SChuck Lever 	};
216192476850SChuck Lever 
216292476850SChuck Lever 	switch (family) {
216392476850SChuck Lever 	case AF_INET:
216492476850SChuck Lever 		memcpy(sap, &sin, sizeof(sin));
216592476850SChuck Lever 		break;
216692476850SChuck Lever 	case AF_INET6:
216792476850SChuck Lever 		memcpy(sap, &sin6, sizeof(sin6));
216892476850SChuck Lever 		break;
216992476850SChuck Lever 	default:
217092476850SChuck Lever 		dprintk("RPC:       %s: Bad address family\n", __func__);
217192476850SChuck Lever 		return -EAFNOSUPPORT;
217292476850SChuck Lever 	}
217392476850SChuck Lever 	return 0;
217492476850SChuck Lever }
217592476850SChuck Lever 
21763c341b0bS\"Talpey, Thomas\ static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
2177bc25571eS\"Talpey, Thomas\ 				      unsigned int slot_table_size)
2178c8541ecdSChuck Lever {
2179c8541ecdSChuck Lever 	struct rpc_xprt *xprt;
2180ffc2e518SChuck Lever 	struct sock_xprt *new;
2181c8541ecdSChuck Lever 
218296802a09SFrank van Maarseveen 	if (args->addrlen > sizeof(xprt->addr)) {
2183c8541ecdSChuck Lever 		dprintk("RPC:       xs_setup_xprt: address too large\n");
2184c8541ecdSChuck Lever 		return ERR_PTR(-EBADF);
2185c8541ecdSChuck Lever 	}
2186c8541ecdSChuck Lever 
218737aa2133SPavel Emelyanov 	xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size);
2188bd1722d4SPavel Emelyanov 	if (xprt == NULL) {
218946121cf7SChuck Lever 		dprintk("RPC:       xs_setup_xprt: couldn't allocate "
219046121cf7SChuck Lever 				"rpc_xprt\n");
2191c8541ecdSChuck Lever 		return ERR_PTR(-ENOMEM);
2192c8541ecdSChuck Lever 	}
2193c8541ecdSChuck Lever 
2194bd1722d4SPavel Emelyanov 	new = container_of(xprt, struct sock_xprt, xprt);
219596802a09SFrank van Maarseveen 	memcpy(&xprt->addr, args->dstaddr, args->addrlen);
219696802a09SFrank van Maarseveen 	xprt->addrlen = args->addrlen;
2197d3bc9a1dSFrank van Maarseveen 	if (args->srcaddr)
2198fbfffbd5SChuck Lever 		memcpy(&new->srcaddr, args->srcaddr, args->addrlen);
219992476850SChuck Lever 	else {
220092476850SChuck Lever 		int err;
220192476850SChuck Lever 		err = xs_init_anyaddr(args->dstaddr->sa_family,
220292476850SChuck Lever 					(struct sockaddr *)&new->srcaddr);
220392476850SChuck Lever 		if (err != 0)
220492476850SChuck Lever 			return ERR_PTR(err);
220592476850SChuck Lever 	}
2206c8541ecdSChuck Lever 
2207c8541ecdSChuck Lever 	return xprt;
2208c8541ecdSChuck Lever }
2209c8541ecdSChuck Lever 
22102881ae74STrond Myklebust static const struct rpc_timeout xs_udp_default_timeout = {
22112881ae74STrond Myklebust 	.to_initval = 5 * HZ,
22122881ae74STrond Myklebust 	.to_maxval = 30 * HZ,
22132881ae74STrond Myklebust 	.to_increment = 5 * HZ,
22142881ae74STrond Myklebust 	.to_retries = 5,
22152881ae74STrond Myklebust };
22162881ae74STrond Myklebust 
22179903cd1cSChuck Lever /**
22189903cd1cSChuck Lever  * xs_setup_udp - Set up transport to use a UDP socket
221996802a09SFrank van Maarseveen  * @args: rpc transport creation arguments
22209903cd1cSChuck Lever  *
22219903cd1cSChuck Lever  */
2222483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
2223a246b010SChuck Lever {
22248f9d5b1aSChuck Lever 	struct sockaddr *addr = args->dstaddr;
2225c8541ecdSChuck Lever 	struct rpc_xprt *xprt;
2226c8475461SChuck Lever 	struct sock_xprt *transport;
22270a68b0beSJ. Bruce Fields 	struct rpc_xprt *ret;
2228a246b010SChuck Lever 
222996802a09SFrank van Maarseveen 	xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries);
2230c8541ecdSChuck Lever 	if (IS_ERR(xprt))
2231c8541ecdSChuck Lever 		return xprt;
2232c8475461SChuck Lever 	transport = container_of(xprt, struct sock_xprt, xprt);
2233a246b010SChuck Lever 
2234ec739ef0SChuck Lever 	xprt->prot = IPPROTO_UDP;
2235808012fbSChuck Lever 	xprt->tsh_size = 0;
2236a246b010SChuck Lever 	/* XXX: header size can vary due to auth type, IPv6, etc. */
2237a246b010SChuck Lever 	xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
2238a246b010SChuck Lever 
223903bf4b70SChuck Lever 	xprt->bind_timeout = XS_BIND_TO;
224003bf4b70SChuck Lever 	xprt->reestablish_timeout = XS_UDP_REEST_TO;
224103bf4b70SChuck Lever 	xprt->idle_timeout = XS_IDLE_DISC_TO;
2242a246b010SChuck Lever 
2243262965f5SChuck Lever 	xprt->ops = &xs_udp_ops;
2244a246b010SChuck Lever 
2245ba7392bbSTrond Myklebust 	xprt->timeout = &xs_udp_default_timeout;
2246a246b010SChuck Lever 
22478f9d5b1aSChuck Lever 	switch (addr->sa_family) {
22488f9d5b1aSChuck Lever 	case AF_INET:
22498f9d5b1aSChuck Lever 		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
22508f9d5b1aSChuck Lever 			xprt_set_bound(xprt);
22518f9d5b1aSChuck Lever 
22528f9d5b1aSChuck Lever 		INIT_DELAYED_WORK(&transport->connect_worker,
22538c14ff2aSPavel Emelyanov 					xs_udp_setup_socket);
22549dc3b095SChuck Lever 		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP);
22558f9d5b1aSChuck Lever 		break;
22568f9d5b1aSChuck Lever 	case AF_INET6:
22578f9d5b1aSChuck Lever 		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
22588f9d5b1aSChuck Lever 			xprt_set_bound(xprt);
22598f9d5b1aSChuck Lever 
22608f9d5b1aSChuck Lever 		INIT_DELAYED_WORK(&transport->connect_worker,
22618c14ff2aSPavel Emelyanov 					xs_udp_setup_socket);
22629dc3b095SChuck Lever 		xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6);
22638f9d5b1aSChuck Lever 		break;
22648f9d5b1aSChuck Lever 	default:
22650a68b0beSJ. Bruce Fields 		ret = ERR_PTR(-EAFNOSUPPORT);
22660a68b0beSJ. Bruce Fields 		goto out_err;
22678f9d5b1aSChuck Lever 	}
22688f9d5b1aSChuck Lever 
2269c740eff8SChuck Lever 	if (xprt_bound(xprt))
2270c740eff8SChuck Lever 		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
2271c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_ADDR],
2272c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PORT],
2273c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PROTO]);
2274c740eff8SChuck Lever 	else
2275c740eff8SChuck Lever 		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
2276c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_ADDR],
2277c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PROTO]);
2278edb267a6SChuck Lever 
2279bc25571eS\"Talpey, Thomas\ 	if (try_module_get(THIS_MODULE))
2280c8541ecdSChuck Lever 		return xprt;
22810a68b0beSJ. Bruce Fields 	ret = ERR_PTR(-EINVAL);
22820a68b0beSJ. Bruce Fields out_err:
2283e204e621SPavel Emelyanov 	xprt_free(xprt);
22840a68b0beSJ. Bruce Fields 	return ret;
2285a246b010SChuck Lever }
2286a246b010SChuck Lever 
22872881ae74STrond Myklebust static const struct rpc_timeout xs_tcp_default_timeout = {
22882881ae74STrond Myklebust 	.to_initval = 60 * HZ,
22892881ae74STrond Myklebust 	.to_maxval = 60 * HZ,
22902881ae74STrond Myklebust 	.to_retries = 2,
22912881ae74STrond Myklebust };
22922881ae74STrond Myklebust 
22939903cd1cSChuck Lever /**
22949903cd1cSChuck Lever  * xs_setup_tcp - Set up transport to use a TCP socket
229596802a09SFrank van Maarseveen  * @args: rpc transport creation arguments
22969903cd1cSChuck Lever  *
22979903cd1cSChuck Lever  */
2298483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
2299a246b010SChuck Lever {
23008f9d5b1aSChuck Lever 	struct sockaddr *addr = args->dstaddr;
2301c8541ecdSChuck Lever 	struct rpc_xprt *xprt;
2302c8475461SChuck Lever 	struct sock_xprt *transport;
23030a68b0beSJ. Bruce Fields 	struct rpc_xprt *ret;
2304a246b010SChuck Lever 
230596802a09SFrank van Maarseveen 	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
2306c8541ecdSChuck Lever 	if (IS_ERR(xprt))
2307c8541ecdSChuck Lever 		return xprt;
2308c8475461SChuck Lever 	transport = container_of(xprt, struct sock_xprt, xprt);
2309a246b010SChuck Lever 
2310ec739ef0SChuck Lever 	xprt->prot = IPPROTO_TCP;
2311808012fbSChuck Lever 	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
2312808012fbSChuck Lever 	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2313a246b010SChuck Lever 
231403bf4b70SChuck Lever 	xprt->bind_timeout = XS_BIND_TO;
231503bf4b70SChuck Lever 	xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
231603bf4b70SChuck Lever 	xprt->idle_timeout = XS_IDLE_DISC_TO;
2317a246b010SChuck Lever 
2318262965f5SChuck Lever 	xprt->ops = &xs_tcp_ops;
2319ba7392bbSTrond Myklebust 	xprt->timeout = &xs_tcp_default_timeout;
2320a246b010SChuck Lever 
23218f9d5b1aSChuck Lever 	switch (addr->sa_family) {
23228f9d5b1aSChuck Lever 	case AF_INET:
23238f9d5b1aSChuck Lever 		if (((struct sockaddr_in *)addr)->sin_port != htons(0))
23248f9d5b1aSChuck Lever 			xprt_set_bound(xprt);
23258f9d5b1aSChuck Lever 
23269dc3b095SChuck Lever 		INIT_DELAYED_WORK(&transport->connect_worker,
2327cdd518d5SPavel Emelyanov 					xs_tcp_setup_socket);
23289dc3b095SChuck Lever 		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP);
23298f9d5b1aSChuck Lever 		break;
23308f9d5b1aSChuck Lever 	case AF_INET6:
23318f9d5b1aSChuck Lever 		if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
23328f9d5b1aSChuck Lever 			xprt_set_bound(xprt);
23338f9d5b1aSChuck Lever 
23349dc3b095SChuck Lever 		INIT_DELAYED_WORK(&transport->connect_worker,
2335cdd518d5SPavel Emelyanov 					xs_tcp_setup_socket);
23369dc3b095SChuck Lever 		xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6);
23378f9d5b1aSChuck Lever 		break;
23388f9d5b1aSChuck Lever 	default:
23390a68b0beSJ. Bruce Fields 		ret = ERR_PTR(-EAFNOSUPPORT);
23400a68b0beSJ. Bruce Fields 		goto out_err;
23418f9d5b1aSChuck Lever 	}
23428f9d5b1aSChuck Lever 
2343c740eff8SChuck Lever 	if (xprt_bound(xprt))
2344c740eff8SChuck Lever 		dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
2345c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_ADDR],
2346c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PORT],
2347c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PROTO]);
2348c740eff8SChuck Lever 	else
2349c740eff8SChuck Lever 		dprintk("RPC:       set up xprt to %s (autobind) via %s\n",
2350c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_ADDR],
2351c740eff8SChuck Lever 				xprt->address_strings[RPC_DISPLAY_PROTO]);
2352c740eff8SChuck Lever 
2353edb267a6SChuck Lever 
2354bc25571eS\"Talpey, Thomas\ 	if (try_module_get(THIS_MODULE))
2355c8541ecdSChuck Lever 		return xprt;
23560a68b0beSJ. Bruce Fields 	ret = ERR_PTR(-EINVAL);
23570a68b0beSJ. Bruce Fields out_err:
2358e204e621SPavel Emelyanov 	xprt_free(xprt);
23590a68b0beSJ. Bruce Fields 	return ret;
2360a246b010SChuck Lever }
2361282b32e1SChuck Lever 
2362f300babaSAlexandros Batsakis /**
2363f300babaSAlexandros Batsakis  * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket
2364f300babaSAlexandros Batsakis  * @args: rpc transport creation arguments
2365f300babaSAlexandros Batsakis  *
2366f300babaSAlexandros Batsakis  */
2367f300babaSAlexandros Batsakis static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args)
2368f300babaSAlexandros Batsakis {
2369f300babaSAlexandros Batsakis 	struct sockaddr *addr = args->dstaddr;
2370f300babaSAlexandros Batsakis 	struct rpc_xprt *xprt;
2371f300babaSAlexandros Batsakis 	struct sock_xprt *transport;
2372f300babaSAlexandros Batsakis 	struct svc_sock *bc_sock;
23730a68b0beSJ. Bruce Fields 	struct rpc_xprt *ret;
2374f300babaSAlexandros Batsakis 
2375f0418aa4SJ. Bruce Fields 	if (args->bc_xprt->xpt_bc_xprt) {
2376f0418aa4SJ. Bruce Fields 		/*
2377f0418aa4SJ. Bruce Fields 		 * This server connection already has a backchannel
2378f0418aa4SJ. Bruce Fields 		 * export; we can't create a new one, as we wouldn't be
2379f0418aa4SJ. Bruce Fields 		 * able to match replies based on xid any more.  So,
2380f0418aa4SJ. Bruce Fields 		 * reuse the already-existing one:
2381f0418aa4SJ. Bruce Fields 		 */
2382f0418aa4SJ. Bruce Fields 		 return args->bc_xprt->xpt_bc_xprt;
2383f0418aa4SJ. Bruce Fields 	}
2384f300babaSAlexandros Batsakis 	xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
2385f300babaSAlexandros Batsakis 	if (IS_ERR(xprt))
2386f300babaSAlexandros Batsakis 		return xprt;
2387f300babaSAlexandros Batsakis 	transport = container_of(xprt, struct sock_xprt, xprt);
2388f300babaSAlexandros Batsakis 
2389f300babaSAlexandros Batsakis 	xprt->prot = IPPROTO_TCP;
2390f300babaSAlexandros Batsakis 	xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
2391f300babaSAlexandros Batsakis 	xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2392f300babaSAlexandros Batsakis 	xprt->timeout = &xs_tcp_default_timeout;
2393f300babaSAlexandros Batsakis 
2394f300babaSAlexandros Batsakis 	/* backchannel */
2395f300babaSAlexandros Batsakis 	xprt_set_bound(xprt);
2396f300babaSAlexandros Batsakis 	xprt->bind_timeout = 0;
2397f300babaSAlexandros Batsakis 	xprt->reestablish_timeout = 0;
2398f300babaSAlexandros Batsakis 	xprt->idle_timeout = 0;
2399f300babaSAlexandros Batsakis 
2400f300babaSAlexandros Batsakis 	xprt->ops = &bc_tcp_ops;
2401f300babaSAlexandros Batsakis 
2402f300babaSAlexandros Batsakis 	switch (addr->sa_family) {
2403f300babaSAlexandros Batsakis 	case AF_INET:
2404f300babaSAlexandros Batsakis 		xs_format_peer_addresses(xprt, "tcp",
2405f300babaSAlexandros Batsakis 					 RPCBIND_NETID_TCP);
2406f300babaSAlexandros Batsakis 		break;
2407f300babaSAlexandros Batsakis 	case AF_INET6:
2408f300babaSAlexandros Batsakis 		xs_format_peer_addresses(xprt, "tcp",
2409f300babaSAlexandros Batsakis 				   RPCBIND_NETID_TCP6);
2410f300babaSAlexandros Batsakis 		break;
2411f300babaSAlexandros Batsakis 	default:
24120a68b0beSJ. Bruce Fields 		ret = ERR_PTR(-EAFNOSUPPORT);
24130a68b0beSJ. Bruce Fields 		goto out_err;
2414f300babaSAlexandros Batsakis 	}
2415f300babaSAlexandros Batsakis 
2416f300babaSAlexandros Batsakis 	dprintk("RPC:       set up xprt to %s (port %s) via %s\n",
2417f300babaSAlexandros Batsakis 			xprt->address_strings[RPC_DISPLAY_ADDR],
2418f300babaSAlexandros Batsakis 			xprt->address_strings[RPC_DISPLAY_PORT],
2419f300babaSAlexandros Batsakis 			xprt->address_strings[RPC_DISPLAY_PROTO]);
2420f300babaSAlexandros Batsakis 
2421f300babaSAlexandros Batsakis 	/*
242299de8ea9SJ. Bruce Fields 	 * Once we've associated a backchannel xprt with a connection,
242399de8ea9SJ. Bruce Fields 	 * we want to keep it around as long as long as the connection
242499de8ea9SJ. Bruce Fields 	 * lasts, in case we need to start using it for a backchannel
242599de8ea9SJ. Bruce Fields 	 * again; this reference won't be dropped until bc_xprt is
242699de8ea9SJ. Bruce Fields 	 * destroyed.
242799de8ea9SJ. Bruce Fields 	 */
242899de8ea9SJ. Bruce Fields 	xprt_get(xprt);
242999de8ea9SJ. Bruce Fields 	args->bc_xprt->xpt_bc_xprt = xprt;
243099de8ea9SJ. Bruce Fields 	xprt->bc_xprt = args->bc_xprt;
243199de8ea9SJ. Bruce Fields 	bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt);
243299de8ea9SJ. Bruce Fields 	transport->sock = bc_sock->sk_sock;
243399de8ea9SJ. Bruce Fields 	transport->inet = bc_sock->sk_sk;
243499de8ea9SJ. Bruce Fields 
243599de8ea9SJ. Bruce Fields 	/*
2436f300babaSAlexandros Batsakis 	 * Since we don't want connections for the backchannel, we set
2437f300babaSAlexandros Batsakis 	 * the xprt status to connected
2438f300babaSAlexandros Batsakis 	 */
2439f300babaSAlexandros Batsakis 	xprt_set_connected(xprt);
2440f300babaSAlexandros Batsakis 
2441f300babaSAlexandros Batsakis 
2442f300babaSAlexandros Batsakis 	if (try_module_get(THIS_MODULE))
2443f300babaSAlexandros Batsakis 		return xprt;
244499de8ea9SJ. Bruce Fields 	xprt_put(xprt);
24450a68b0beSJ. Bruce Fields 	ret = ERR_PTR(-EINVAL);
24460a68b0beSJ. Bruce Fields out_err:
2447e204e621SPavel Emelyanov 	xprt_free(xprt);
24480a68b0beSJ. Bruce Fields 	return ret;
2449f300babaSAlexandros Batsakis }
2450f300babaSAlexandros Batsakis 
2451bc25571eS\"Talpey, Thomas\ static struct xprt_class	xs_udp_transport = {
2452bc25571eS\"Talpey, Thomas\ 	.list		= LIST_HEAD_INIT(xs_udp_transport.list),
2453bc25571eS\"Talpey, Thomas\ 	.name		= "udp",
2454bc25571eS\"Talpey, Thomas\ 	.owner		= THIS_MODULE,
2455f300babaSAlexandros Batsakis 	.ident		= XPRT_TRANSPORT_UDP,
2456bc25571eS\"Talpey, Thomas\ 	.setup		= xs_setup_udp,
2457bc25571eS\"Talpey, Thomas\ };
2458bc25571eS\"Talpey, Thomas\ 
2459bc25571eS\"Talpey, Thomas\ static struct xprt_class	xs_tcp_transport = {
2460bc25571eS\"Talpey, Thomas\ 	.list		= LIST_HEAD_INIT(xs_tcp_transport.list),
2461bc25571eS\"Talpey, Thomas\ 	.name		= "tcp",
2462bc25571eS\"Talpey, Thomas\ 	.owner		= THIS_MODULE,
2463f300babaSAlexandros Batsakis 	.ident		= XPRT_TRANSPORT_TCP,
2464bc25571eS\"Talpey, Thomas\ 	.setup		= xs_setup_tcp,
2465bc25571eS\"Talpey, Thomas\ };
2466bc25571eS\"Talpey, Thomas\ 
2467f300babaSAlexandros Batsakis static struct xprt_class	xs_bc_tcp_transport = {
2468f300babaSAlexandros Batsakis 	.list		= LIST_HEAD_INIT(xs_bc_tcp_transport.list),
2469f300babaSAlexandros Batsakis 	.name		= "tcp NFSv4.1 backchannel",
2470f300babaSAlexandros Batsakis 	.owner		= THIS_MODULE,
2471f300babaSAlexandros Batsakis 	.ident		= XPRT_TRANSPORT_BC_TCP,
2472f300babaSAlexandros Batsakis 	.setup		= xs_setup_bc_tcp,
2473f300babaSAlexandros Batsakis };
2474f300babaSAlexandros Batsakis 
2475282b32e1SChuck Lever /**
2476bc25571eS\"Talpey, Thomas\  * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
2477282b32e1SChuck Lever  *
2478282b32e1SChuck Lever  */
2479282b32e1SChuck Lever int init_socket_xprt(void)
2480282b32e1SChuck Lever {
2481fbf76683SChuck Lever #ifdef RPC_DEBUG
24822b1bec5fSEric W. Biederman 	if (!sunrpc_table_header)
24830b4d4147SEric W. Biederman 		sunrpc_table_header = register_sysctl_table(sunrpc_table);
2484fbf76683SChuck Lever #endif
2485fbf76683SChuck Lever 
2486bc25571eS\"Talpey, Thomas\ 	xprt_register_transport(&xs_udp_transport);
2487bc25571eS\"Talpey, Thomas\ 	xprt_register_transport(&xs_tcp_transport);
2488f300babaSAlexandros Batsakis 	xprt_register_transport(&xs_bc_tcp_transport);
2489bc25571eS\"Talpey, Thomas\ 
2490282b32e1SChuck Lever 	return 0;
2491282b32e1SChuck Lever }
2492282b32e1SChuck Lever 
2493282b32e1SChuck Lever /**
2494bc25571eS\"Talpey, Thomas\  * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
2495282b32e1SChuck Lever  *
2496282b32e1SChuck Lever  */
2497282b32e1SChuck Lever void cleanup_socket_xprt(void)
2498282b32e1SChuck Lever {
2499fbf76683SChuck Lever #ifdef RPC_DEBUG
2500fbf76683SChuck Lever 	if (sunrpc_table_header) {
2501fbf76683SChuck Lever 		unregister_sysctl_table(sunrpc_table_header);
2502fbf76683SChuck Lever 		sunrpc_table_header = NULL;
2503fbf76683SChuck Lever 	}
2504fbf76683SChuck Lever #endif
2505bc25571eS\"Talpey, Thomas\ 
2506bc25571eS\"Talpey, Thomas\ 	xprt_unregister_transport(&xs_udp_transport);
2507bc25571eS\"Talpey, Thomas\ 	xprt_unregister_transport(&xs_tcp_transport);
2508f300babaSAlexandros Batsakis 	xprt_unregister_transport(&xs_bc_tcp_transport);
2509282b32e1SChuck Lever }
2510cbf11071STrond Myklebust 
25119bbb9e5aSRusty Russell static int param_set_uint_minmax(const char *val,
25129bbb9e5aSRusty Russell 		const struct kernel_param *kp,
2513cbf11071STrond Myklebust 		unsigned int min, unsigned int max)
2514cbf11071STrond Myklebust {
2515cbf11071STrond Myklebust 	unsigned long num;
2516cbf11071STrond Myklebust 	int ret;
2517cbf11071STrond Myklebust 
2518cbf11071STrond Myklebust 	if (!val)
2519cbf11071STrond Myklebust 		return -EINVAL;
2520cbf11071STrond Myklebust 	ret = strict_strtoul(val, 0, &num);
2521cbf11071STrond Myklebust 	if (ret == -EINVAL || num < min || num > max)
2522cbf11071STrond Myklebust 		return -EINVAL;
2523cbf11071STrond Myklebust 	*((unsigned int *)kp->arg) = num;
2524cbf11071STrond Myklebust 	return 0;
2525cbf11071STrond Myklebust }
2526cbf11071STrond Myklebust 
25279bbb9e5aSRusty Russell static int param_set_portnr(const char *val, const struct kernel_param *kp)
2528cbf11071STrond Myklebust {
2529cbf11071STrond Myklebust 	return param_set_uint_minmax(val, kp,
2530cbf11071STrond Myklebust 			RPC_MIN_RESVPORT,
2531cbf11071STrond Myklebust 			RPC_MAX_RESVPORT);
2532cbf11071STrond Myklebust }
2533cbf11071STrond Myklebust 
25349bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_portnr = {
25359bbb9e5aSRusty Russell 	.set = param_set_portnr,
25369bbb9e5aSRusty Russell 	.get = param_get_uint,
25379bbb9e5aSRusty Russell };
25389bbb9e5aSRusty Russell 
2539cbf11071STrond Myklebust #define param_check_portnr(name, p) \
2540cbf11071STrond Myklebust 	__param_check(name, p, unsigned int);
2541cbf11071STrond Myklebust 
2542cbf11071STrond Myklebust module_param_named(min_resvport, xprt_min_resvport, portnr, 0644);
2543cbf11071STrond Myklebust module_param_named(max_resvport, xprt_max_resvport, portnr, 0644);
2544cbf11071STrond Myklebust 
25459bbb9e5aSRusty Russell static int param_set_slot_table_size(const char *val,
25469bbb9e5aSRusty Russell 				     const struct kernel_param *kp)
2547cbf11071STrond Myklebust {
2548cbf11071STrond Myklebust 	return param_set_uint_minmax(val, kp,
2549cbf11071STrond Myklebust 			RPC_MIN_SLOT_TABLE,
2550cbf11071STrond Myklebust 			RPC_MAX_SLOT_TABLE);
2551cbf11071STrond Myklebust }
2552cbf11071STrond Myklebust 
25539bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_slot_table_size = {
25549bbb9e5aSRusty Russell 	.set = param_set_slot_table_size,
25559bbb9e5aSRusty Russell 	.get = param_get_uint,
25569bbb9e5aSRusty Russell };
25579bbb9e5aSRusty Russell 
2558cbf11071STrond Myklebust #define param_check_slot_table_size(name, p) \
2559cbf11071STrond Myklebust 	__param_check(name, p, unsigned int);
2560cbf11071STrond Myklebust 
2561cbf11071STrond Myklebust module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries,
2562cbf11071STrond Myklebust 		   slot_table_size, 0644);
2563cbf11071STrond Myklebust module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries,
2564cbf11071STrond Myklebust 		   slot_table_size, 0644);
2565cbf11071STrond Myklebust 
2566