1a246b010SChuck Lever /* 2a246b010SChuck Lever * linux/net/sunrpc/xprtsock.c 3a246b010SChuck Lever * 4a246b010SChuck Lever * Client-side transport implementation for sockets. 5a246b010SChuck Lever * 6113aa838SAlan Cox * TCP callback races fixes (C) 1998 Red Hat 7113aa838SAlan Cox * TCP send fixes (C) 1998 Red Hat 8a246b010SChuck Lever * TCP NFS related read + write fixes 9a246b010SChuck Lever * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie> 10a246b010SChuck Lever * 11a246b010SChuck Lever * Rewrite of larges part of the code in order to stabilize TCP stuff. 12a246b010SChuck Lever * Fix behaviour when socket buffer is full. 13a246b010SChuck Lever * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no> 1455aa4f58SChuck Lever * 1555aa4f58SChuck Lever * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com> 168f9d5b1aSChuck Lever * 178f9d5b1aSChuck Lever * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005. 188f9d5b1aSChuck Lever * <gilles.quillard@bull.net> 19a246b010SChuck Lever */ 20a246b010SChuck Lever 21a246b010SChuck Lever #include <linux/types.h> 22a246b010SChuck Lever #include <linux/slab.h> 23bc25571eS\"Talpey, Thomas\ #include <linux/module.h> 24a246b010SChuck Lever #include <linux/capability.h> 25a246b010SChuck Lever #include <linux/pagemap.h> 26a246b010SChuck Lever #include <linux/errno.h> 27a246b010SChuck Lever #include <linux/socket.h> 28a246b010SChuck Lever #include <linux/in.h> 29a246b010SChuck Lever #include <linux/net.h> 30a246b010SChuck Lever #include <linux/mm.h> 31a246b010SChuck Lever #include <linux/udp.h> 32a246b010SChuck Lever #include <linux/tcp.h> 33a246b010SChuck Lever #include <linux/sunrpc/clnt.h> 3402107148SChuck Lever #include <linux/sunrpc/sched.h> 354cfc7e60SRahul Iyer #include <linux/sunrpc/svcsock.h> 3649c36fccS\"Talpey, Thomas\ #include <linux/sunrpc/xprtsock.h> 37a246b010SChuck Lever #include <linux/file.h> 3844b98efdSRicardo Labiaga #ifdef CONFIG_NFS_V4_1 3944b98efdSRicardo Labiaga #include <linux/sunrpc/bc_xprt.h> 4044b98efdSRicardo Labiaga #endif 41a246b010SChuck Lever 42a246b010SChuck Lever #include <net/sock.h> 43a246b010SChuck Lever #include <net/checksum.h> 44a246b010SChuck Lever #include <net/udp.h> 45a246b010SChuck Lever #include <net/tcp.h> 46a246b010SChuck Lever 474cfc7e60SRahul Iyer #include "sunrpc.h" 489903cd1cSChuck Lever /* 49c556b754SChuck Lever * xprtsock tunables 50c556b754SChuck Lever */ 51c556b754SChuck Lever unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE; 52c556b754SChuck Lever unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE; 53c556b754SChuck Lever 54c556b754SChuck Lever unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT; 55c556b754SChuck Lever unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT; 56c556b754SChuck Lever 577d1e8255STrond Myklebust #define XS_TCP_LINGER_TO (15U * HZ) 5825fe6142STrond Myklebust static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO; 597d1e8255STrond Myklebust 60c556b754SChuck Lever /* 61fbf76683SChuck Lever * We can register our own files under /proc/sys/sunrpc by 62fbf76683SChuck Lever * calling register_sysctl_table() again. The files in that 63fbf76683SChuck Lever * directory become the union of all files registered there. 64fbf76683SChuck Lever * 65fbf76683SChuck Lever * We simply need to make sure that we don't collide with 66fbf76683SChuck Lever * someone else's file names! 67fbf76683SChuck Lever */ 68fbf76683SChuck Lever 69fbf76683SChuck Lever #ifdef RPC_DEBUG 70fbf76683SChuck Lever 71fbf76683SChuck Lever static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE; 72fbf76683SChuck Lever static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE; 73fbf76683SChuck Lever static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT; 74fbf76683SChuck Lever static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT; 75fbf76683SChuck Lever 76fbf76683SChuck Lever static struct ctl_table_header *sunrpc_table_header; 77fbf76683SChuck Lever 78fbf76683SChuck Lever /* 79fbf76683SChuck Lever * FIXME: changing the UDP slot table size should also resize the UDP 80fbf76683SChuck Lever * socket buffers for existing UDP transports 81fbf76683SChuck Lever */ 82fbf76683SChuck Lever static ctl_table xs_tunables_table[] = { 83fbf76683SChuck Lever { 84fbf76683SChuck Lever .procname = "udp_slot_table_entries", 85fbf76683SChuck Lever .data = &xprt_udp_slot_table_entries, 86fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 87fbf76683SChuck Lever .mode = 0644, 886d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 89fbf76683SChuck Lever .extra1 = &min_slot_table_size, 90fbf76683SChuck Lever .extra2 = &max_slot_table_size 91fbf76683SChuck Lever }, 92fbf76683SChuck Lever { 93fbf76683SChuck Lever .procname = "tcp_slot_table_entries", 94fbf76683SChuck Lever .data = &xprt_tcp_slot_table_entries, 95fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 96fbf76683SChuck Lever .mode = 0644, 976d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 98fbf76683SChuck Lever .extra1 = &min_slot_table_size, 99fbf76683SChuck Lever .extra2 = &max_slot_table_size 100fbf76683SChuck Lever }, 101fbf76683SChuck Lever { 102fbf76683SChuck Lever .procname = "min_resvport", 103fbf76683SChuck Lever .data = &xprt_min_resvport, 104fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 105fbf76683SChuck Lever .mode = 0644, 1066d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 107fbf76683SChuck Lever .extra1 = &xprt_min_resvport_limit, 108fbf76683SChuck Lever .extra2 = &xprt_max_resvport_limit 109fbf76683SChuck Lever }, 110fbf76683SChuck Lever { 111fbf76683SChuck Lever .procname = "max_resvport", 112fbf76683SChuck Lever .data = &xprt_max_resvport, 113fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 114fbf76683SChuck Lever .mode = 0644, 1156d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 116fbf76683SChuck Lever .extra1 = &xprt_min_resvport_limit, 117fbf76683SChuck Lever .extra2 = &xprt_max_resvport_limit 118fbf76683SChuck Lever }, 119fbf76683SChuck Lever { 12025fe6142STrond Myklebust .procname = "tcp_fin_timeout", 12125fe6142STrond Myklebust .data = &xs_tcp_fin_timeout, 12225fe6142STrond Myklebust .maxlen = sizeof(xs_tcp_fin_timeout), 12325fe6142STrond Myklebust .mode = 0644, 1246d456111SEric W. Biederman .proc_handler = proc_dointvec_jiffies, 12525fe6142STrond Myklebust }, 126f8572d8fSEric W. Biederman { }, 127fbf76683SChuck Lever }; 128fbf76683SChuck Lever 129fbf76683SChuck Lever static ctl_table sunrpc_table[] = { 130fbf76683SChuck Lever { 131fbf76683SChuck Lever .procname = "sunrpc", 132fbf76683SChuck Lever .mode = 0555, 133fbf76683SChuck Lever .child = xs_tunables_table 134fbf76683SChuck Lever }, 135f8572d8fSEric W. Biederman { }, 136fbf76683SChuck Lever }; 137fbf76683SChuck Lever 138fbf76683SChuck Lever #endif 139fbf76683SChuck Lever 140fbf76683SChuck Lever /* 14103bf4b70SChuck Lever * Wait duration for a reply from the RPC portmapper. 14203bf4b70SChuck Lever */ 14303bf4b70SChuck Lever #define XS_BIND_TO (60U * HZ) 14403bf4b70SChuck Lever 14503bf4b70SChuck Lever /* 14603bf4b70SChuck Lever * Delay if a UDP socket connect error occurs. This is most likely some 14703bf4b70SChuck Lever * kind of resource problem on the local host. 14803bf4b70SChuck Lever */ 14903bf4b70SChuck Lever #define XS_UDP_REEST_TO (2U * HZ) 15003bf4b70SChuck Lever 15103bf4b70SChuck Lever /* 15203bf4b70SChuck Lever * The reestablish timeout allows clients to delay for a bit before attempting 15303bf4b70SChuck Lever * to reconnect to a server that just dropped our connection. 15403bf4b70SChuck Lever * 15503bf4b70SChuck Lever * We implement an exponential backoff when trying to reestablish a TCP 15603bf4b70SChuck Lever * transport connection with the server. Some servers like to drop a TCP 15703bf4b70SChuck Lever * connection when they are overworked, so we start with a short timeout and 15803bf4b70SChuck Lever * increase over time if the server is down or not responding. 15903bf4b70SChuck Lever */ 16003bf4b70SChuck Lever #define XS_TCP_INIT_REEST_TO (3U * HZ) 16103bf4b70SChuck Lever #define XS_TCP_MAX_REEST_TO (5U * 60 * HZ) 16203bf4b70SChuck Lever 16303bf4b70SChuck Lever /* 16403bf4b70SChuck Lever * TCP idle timeout; client drops the transport socket if it is idle 16503bf4b70SChuck Lever * for this long. Note that we also timeout UDP sockets to prevent 16603bf4b70SChuck Lever * holding port numbers when there is no RPC traffic. 16703bf4b70SChuck Lever */ 16803bf4b70SChuck Lever #define XS_IDLE_DISC_TO (5U * 60 * HZ) 16903bf4b70SChuck Lever 170a246b010SChuck Lever #ifdef RPC_DEBUG 171a246b010SChuck Lever # undef RPC_DEBUG_DATA 1729903cd1cSChuck Lever # define RPCDBG_FACILITY RPCDBG_TRANS 173a246b010SChuck Lever #endif 174a246b010SChuck Lever 175a246b010SChuck Lever #ifdef RPC_DEBUG_DATA 1769903cd1cSChuck Lever static void xs_pktdump(char *msg, u32 *packet, unsigned int count) 177a246b010SChuck Lever { 178a246b010SChuck Lever u8 *buf = (u8 *) packet; 179a246b010SChuck Lever int j; 180a246b010SChuck Lever 181a246b010SChuck Lever dprintk("RPC: %s\n", msg); 182a246b010SChuck Lever for (j = 0; j < count && j < 128; j += 4) { 183a246b010SChuck Lever if (!(j & 31)) { 184a246b010SChuck Lever if (j) 185a246b010SChuck Lever dprintk("\n"); 186a246b010SChuck Lever dprintk("0x%04x ", j); 187a246b010SChuck Lever } 188a246b010SChuck Lever dprintk("%02x%02x%02x%02x ", 189a246b010SChuck Lever buf[j], buf[j+1], buf[j+2], buf[j+3]); 190a246b010SChuck Lever } 191a246b010SChuck Lever dprintk("\n"); 192a246b010SChuck Lever } 193a246b010SChuck Lever #else 1949903cd1cSChuck Lever static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count) 195a246b010SChuck Lever { 196a246b010SChuck Lever /* NOP */ 197a246b010SChuck Lever } 198a246b010SChuck Lever #endif 199a246b010SChuck Lever 200ffc2e518SChuck Lever struct sock_xprt { 201ffc2e518SChuck Lever struct rpc_xprt xprt; 202ee0ac0c2SChuck Lever 203ee0ac0c2SChuck Lever /* 204ee0ac0c2SChuck Lever * Network layer 205ee0ac0c2SChuck Lever */ 206ee0ac0c2SChuck Lever struct socket * sock; 207ee0ac0c2SChuck Lever struct sock * inet; 20851971139SChuck Lever 20951971139SChuck Lever /* 21051971139SChuck Lever * State of TCP reply receive 21151971139SChuck Lever */ 21251971139SChuck Lever __be32 tcp_fraghdr, 213b76ce561STrond Myklebust tcp_xid, 214b76ce561STrond Myklebust tcp_calldir; 21551971139SChuck Lever 21651971139SChuck Lever u32 tcp_offset, 21751971139SChuck Lever tcp_reclen; 21851971139SChuck Lever 21951971139SChuck Lever unsigned long tcp_copied, 22051971139SChuck Lever tcp_flags; 221c8475461SChuck Lever 222c8475461SChuck Lever /* 223c8475461SChuck Lever * Connection of transports 224c8475461SChuck Lever */ 22534161db6STrond Myklebust struct delayed_work connect_worker; 226fbfffbd5SChuck Lever struct sockaddr_storage srcaddr; 227fbfffbd5SChuck Lever unsigned short srcport; 2287c6e066eSChuck Lever 2297c6e066eSChuck Lever /* 2307c6e066eSChuck Lever * UDP socket buffer size parameters 2317c6e066eSChuck Lever */ 2327c6e066eSChuck Lever size_t rcvsize, 2337c6e066eSChuck Lever sndsize; 234314dfd79SChuck Lever 235314dfd79SChuck Lever /* 236314dfd79SChuck Lever * Saved socket callback addresses 237314dfd79SChuck Lever */ 238314dfd79SChuck Lever void (*old_data_ready)(struct sock *, int); 239314dfd79SChuck Lever void (*old_state_change)(struct sock *); 240314dfd79SChuck Lever void (*old_write_space)(struct sock *); 2412a9e1cfaSTrond Myklebust void (*old_error_report)(struct sock *); 242ffc2e518SChuck Lever }; 243ffc2e518SChuck Lever 244e136d092SChuck Lever /* 245e136d092SChuck Lever * TCP receive state flags 246e136d092SChuck Lever */ 247e136d092SChuck Lever #define TCP_RCV_LAST_FRAG (1UL << 0) 248e136d092SChuck Lever #define TCP_RCV_COPY_FRAGHDR (1UL << 1) 249e136d092SChuck Lever #define TCP_RCV_COPY_XID (1UL << 2) 250e136d092SChuck Lever #define TCP_RCV_COPY_DATA (1UL << 3) 251f4a2e418SRicardo Labiaga #define TCP_RCV_READ_CALLDIR (1UL << 4) 252f4a2e418SRicardo Labiaga #define TCP_RCV_COPY_CALLDIR (1UL << 5) 25318dca02aSRicardo Labiaga 25418dca02aSRicardo Labiaga /* 25518dca02aSRicardo Labiaga * TCP RPC flags 25618dca02aSRicardo Labiaga */ 257f4a2e418SRicardo Labiaga #define TCP_RPC_REPLY (1UL << 6) 258e136d092SChuck Lever 25995392c59SChuck Lever static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt) 260edb267a6SChuck Lever { 26195392c59SChuck Lever return (struct sockaddr *) &xprt->addr; 26295392c59SChuck Lever } 26395392c59SChuck Lever 26495392c59SChuck Lever static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt) 26595392c59SChuck Lever { 26695392c59SChuck Lever return (struct sockaddr_in *) &xprt->addr; 26795392c59SChuck Lever } 26895392c59SChuck Lever 26995392c59SChuck Lever static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt) 27095392c59SChuck Lever { 27195392c59SChuck Lever return (struct sockaddr_in6 *) &xprt->addr; 27295392c59SChuck Lever } 27395392c59SChuck Lever 274c877b849SChuck Lever static void xs_format_common_peer_addresses(struct rpc_xprt *xprt) 275c877b849SChuck Lever { 276c877b849SChuck Lever struct sockaddr *sap = xs_addr(xprt); 2779dc3b095SChuck Lever struct sockaddr_in6 *sin6; 2789dc3b095SChuck Lever struct sockaddr_in *sin; 279c877b849SChuck Lever char buf[128]; 280c877b849SChuck Lever 281c877b849SChuck Lever (void)rpc_ntop(sap, buf, sizeof(buf)); 282c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL); 283c877b849SChuck Lever 2849dc3b095SChuck Lever switch (sap->sa_family) { 2859dc3b095SChuck Lever case AF_INET: 2869dc3b095SChuck Lever sin = xs_addr_in(xprt); 287fc0b5791SJoe Perches snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr)); 2889dc3b095SChuck Lever break; 2899dc3b095SChuck Lever case AF_INET6: 2909dc3b095SChuck Lever sin6 = xs_addr_in6(xprt); 291fc0b5791SJoe Perches snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr); 2929dc3b095SChuck Lever break; 2939dc3b095SChuck Lever default: 2949dc3b095SChuck Lever BUG(); 2959dc3b095SChuck Lever } 2969dc3b095SChuck Lever xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL); 2979dc3b095SChuck Lever } 2989dc3b095SChuck Lever 2999dc3b095SChuck Lever static void xs_format_common_peer_ports(struct rpc_xprt *xprt) 3009dc3b095SChuck Lever { 3019dc3b095SChuck Lever struct sockaddr *sap = xs_addr(xprt); 3029dc3b095SChuck Lever char buf[128]; 3039dc3b095SChuck Lever 30481160e66SJoe Perches snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap)); 305c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL); 306c877b849SChuck Lever 30781160e66SJoe Perches snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap)); 308c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL); 309c877b849SChuck Lever } 310c877b849SChuck Lever 3119dc3b095SChuck Lever static void xs_format_peer_addresses(struct rpc_xprt *xprt, 312b454ae90SChuck Lever const char *protocol, 313b454ae90SChuck Lever const char *netid) 314edb267a6SChuck Lever { 315b454ae90SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO] = protocol; 316b454ae90SChuck Lever xprt->address_strings[RPC_DISPLAY_NETID] = netid; 317c877b849SChuck Lever xs_format_common_peer_addresses(xprt); 3189dc3b095SChuck Lever xs_format_common_peer_ports(xprt); 319edb267a6SChuck Lever } 320edb267a6SChuck Lever 3219dc3b095SChuck Lever static void xs_update_peer_port(struct rpc_xprt *xprt) 3224b6473fbSChuck Lever { 3239dc3b095SChuck Lever kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]); 3249dc3b095SChuck Lever kfree(xprt->address_strings[RPC_DISPLAY_PORT]); 3254b6473fbSChuck Lever 3269dc3b095SChuck Lever xs_format_common_peer_ports(xprt); 327edb267a6SChuck Lever } 328edb267a6SChuck Lever 329edb267a6SChuck Lever static void xs_free_peer_addresses(struct rpc_xprt *xprt) 330edb267a6SChuck Lever { 33133e01dc7SChuck Lever unsigned int i; 33233e01dc7SChuck Lever 33333e01dc7SChuck Lever for (i = 0; i < RPC_DISPLAY_MAX; i++) 33433e01dc7SChuck Lever switch (i) { 33533e01dc7SChuck Lever case RPC_DISPLAY_PROTO: 33633e01dc7SChuck Lever case RPC_DISPLAY_NETID: 33733e01dc7SChuck Lever continue; 33833e01dc7SChuck Lever default: 33933e01dc7SChuck Lever kfree(xprt->address_strings[i]); 34033e01dc7SChuck Lever } 341edb267a6SChuck Lever } 342edb267a6SChuck Lever 343b4b5cc85SChuck Lever #define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL) 344b4b5cc85SChuck Lever 34524c5684bSTrond Myklebust static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more) 346b4b5cc85SChuck Lever { 347b4b5cc85SChuck Lever struct msghdr msg = { 348b4b5cc85SChuck Lever .msg_name = addr, 349b4b5cc85SChuck Lever .msg_namelen = addrlen, 35024c5684bSTrond Myklebust .msg_flags = XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0), 35124c5684bSTrond Myklebust }; 35224c5684bSTrond Myklebust struct kvec iov = { 35324c5684bSTrond Myklebust .iov_base = vec->iov_base + base, 35424c5684bSTrond Myklebust .iov_len = vec->iov_len - base, 355b4b5cc85SChuck Lever }; 356b4b5cc85SChuck Lever 35724c5684bSTrond Myklebust if (iov.iov_len != 0) 358b4b5cc85SChuck Lever return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len); 359b4b5cc85SChuck Lever return kernel_sendmsg(sock, &msg, NULL, 0, 0); 360b4b5cc85SChuck Lever } 361b4b5cc85SChuck Lever 36224c5684bSTrond Myklebust static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more) 363b4b5cc85SChuck Lever { 36424c5684bSTrond Myklebust struct page **ppage; 36524c5684bSTrond Myklebust unsigned int remainder; 36624c5684bSTrond Myklebust int err, sent = 0; 367b4b5cc85SChuck Lever 36824c5684bSTrond Myklebust remainder = xdr->page_len - base; 36924c5684bSTrond Myklebust base += xdr->page_base; 37024c5684bSTrond Myklebust ppage = xdr->pages + (base >> PAGE_SHIFT); 37124c5684bSTrond Myklebust base &= ~PAGE_MASK; 37224c5684bSTrond Myklebust for(;;) { 37324c5684bSTrond Myklebust unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder); 37424c5684bSTrond Myklebust int flags = XS_SENDMSG_FLAGS; 37524c5684bSTrond Myklebust 37624c5684bSTrond Myklebust remainder -= len; 37724c5684bSTrond Myklebust if (remainder != 0 || more) 37824c5684bSTrond Myklebust flags |= MSG_MORE; 37924c5684bSTrond Myklebust err = sock->ops->sendpage(sock, *ppage, base, len, flags); 38024c5684bSTrond Myklebust if (remainder == 0 || err != len) 38124c5684bSTrond Myklebust break; 38224c5684bSTrond Myklebust sent += err; 38324c5684bSTrond Myklebust ppage++; 38424c5684bSTrond Myklebust base = 0; 38524c5684bSTrond Myklebust } 38624c5684bSTrond Myklebust if (sent == 0) 38724c5684bSTrond Myklebust return err; 38824c5684bSTrond Myklebust if (err > 0) 38924c5684bSTrond Myklebust sent += err; 39024c5684bSTrond Myklebust return sent; 391b4b5cc85SChuck Lever } 392b4b5cc85SChuck Lever 3939903cd1cSChuck Lever /** 3949903cd1cSChuck Lever * xs_sendpages - write pages directly to a socket 3959903cd1cSChuck Lever * @sock: socket to send on 3969903cd1cSChuck Lever * @addr: UDP only -- address of destination 3979903cd1cSChuck Lever * @addrlen: UDP only -- length of destination address 3989903cd1cSChuck Lever * @xdr: buffer containing this request 3999903cd1cSChuck Lever * @base: starting position in the buffer 4009903cd1cSChuck Lever * 401a246b010SChuck Lever */ 40224c5684bSTrond Myklebust static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base) 403a246b010SChuck Lever { 40424c5684bSTrond Myklebust unsigned int remainder = xdr->len - base; 40524c5684bSTrond Myklebust int err, sent = 0; 406a246b010SChuck Lever 407262965f5SChuck Lever if (unlikely(!sock)) 408fba91afbSTrond Myklebust return -ENOTSOCK; 409262965f5SChuck Lever 410262965f5SChuck Lever clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags); 41124c5684bSTrond Myklebust if (base != 0) { 41224c5684bSTrond Myklebust addr = NULL; 41324c5684bSTrond Myklebust addrlen = 0; 41424c5684bSTrond Myklebust } 415262965f5SChuck Lever 41624c5684bSTrond Myklebust if (base < xdr->head[0].iov_len || addr != NULL) { 41724c5684bSTrond Myklebust unsigned int len = xdr->head[0].iov_len - base; 41824c5684bSTrond Myklebust remainder -= len; 41924c5684bSTrond Myklebust err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0); 42024c5684bSTrond Myklebust if (remainder == 0 || err != len) 421a246b010SChuck Lever goto out; 42224c5684bSTrond Myklebust sent += err; 423a246b010SChuck Lever base = 0; 424a246b010SChuck Lever } else 42524c5684bSTrond Myklebust base -= xdr->head[0].iov_len; 426a246b010SChuck Lever 42724c5684bSTrond Myklebust if (base < xdr->page_len) { 42824c5684bSTrond Myklebust unsigned int len = xdr->page_len - base; 42924c5684bSTrond Myklebust remainder -= len; 43024c5684bSTrond Myklebust err = xs_send_pagedata(sock, xdr, base, remainder != 0); 43124c5684bSTrond Myklebust if (remainder == 0 || err != len) 432a246b010SChuck Lever goto out; 43324c5684bSTrond Myklebust sent += err; 434a246b010SChuck Lever base = 0; 43524c5684bSTrond Myklebust } else 43624c5684bSTrond Myklebust base -= xdr->page_len; 43724c5684bSTrond Myklebust 43824c5684bSTrond Myklebust if (base >= xdr->tail[0].iov_len) 43924c5684bSTrond Myklebust return sent; 44024c5684bSTrond Myklebust err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0); 441a246b010SChuck Lever out: 44224c5684bSTrond Myklebust if (sent == 0) 44324c5684bSTrond Myklebust return err; 44424c5684bSTrond Myklebust if (err > 0) 44524c5684bSTrond Myklebust sent += err; 44624c5684bSTrond Myklebust return sent; 447a246b010SChuck Lever } 448a246b010SChuck Lever 449b6ddf64fSTrond Myklebust static void xs_nospace_callback(struct rpc_task *task) 450b6ddf64fSTrond Myklebust { 451b6ddf64fSTrond Myklebust struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt); 452b6ddf64fSTrond Myklebust 453b6ddf64fSTrond Myklebust transport->inet->sk_write_pending--; 454b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 455b6ddf64fSTrond Myklebust } 456b6ddf64fSTrond Myklebust 4579903cd1cSChuck Lever /** 458262965f5SChuck Lever * xs_nospace - place task on wait queue if transmit was incomplete 459262965f5SChuck Lever * @task: task to put to sleep 4609903cd1cSChuck Lever * 461a246b010SChuck Lever */ 4625e3771ceSTrond Myklebust static int xs_nospace(struct rpc_task *task) 463a246b010SChuck Lever { 464262965f5SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 465262965f5SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 466ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 4675e3771ceSTrond Myklebust int ret = 0; 468a246b010SChuck Lever 46946121cf7SChuck Lever dprintk("RPC: %5u xmit incomplete (%u left of %u)\n", 470262965f5SChuck Lever task->tk_pid, req->rq_slen - req->rq_bytes_sent, 471262965f5SChuck Lever req->rq_slen); 472a246b010SChuck Lever 473262965f5SChuck Lever /* Protect against races with write_space */ 474262965f5SChuck Lever spin_lock_bh(&xprt->transport_lock); 475a246b010SChuck Lever 476262965f5SChuck Lever /* Don't race with disconnect */ 477b6ddf64fSTrond Myklebust if (xprt_connected(xprt)) { 478b6ddf64fSTrond Myklebust if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) { 4795e3771ceSTrond Myklebust ret = -EAGAIN; 480b6ddf64fSTrond Myklebust /* 481b6ddf64fSTrond Myklebust * Notify TCP that we're limited by the application 482b6ddf64fSTrond Myklebust * window size 483b6ddf64fSTrond Myklebust */ 484b6ddf64fSTrond Myklebust set_bit(SOCK_NOSPACE, &transport->sock->flags); 485b6ddf64fSTrond Myklebust transport->inet->sk_write_pending++; 486b6ddf64fSTrond Myklebust /* ...and wait for more buffer space */ 487b6ddf64fSTrond Myklebust xprt_wait_for_buffer_space(task, xs_nospace_callback); 488b6ddf64fSTrond Myklebust } 489b6ddf64fSTrond Myklebust } else { 490b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 4915e3771ceSTrond Myklebust ret = -ENOTCONN; 492b6ddf64fSTrond Myklebust } 493a246b010SChuck Lever 494262965f5SChuck Lever spin_unlock_bh(&xprt->transport_lock); 4955e3771ceSTrond Myklebust return ret; 496a246b010SChuck Lever } 497a246b010SChuck Lever 4989903cd1cSChuck Lever /** 499262965f5SChuck Lever * xs_udp_send_request - write an RPC request to a UDP socket 5009903cd1cSChuck Lever * @task: address of RPC task that manages the state of an RPC request 5019903cd1cSChuck Lever * 5029903cd1cSChuck Lever * Return values: 5039903cd1cSChuck Lever * 0: The request has been sent 5049903cd1cSChuck Lever * EAGAIN: The socket was blocked, please call again later to 5059903cd1cSChuck Lever * complete the request 506262965f5SChuck Lever * ENOTCONN: Caller needs to invoke connect logic then call again 5079903cd1cSChuck Lever * other: Some other error occured, the request was not sent 5089903cd1cSChuck Lever */ 509262965f5SChuck Lever static int xs_udp_send_request(struct rpc_task *task) 510a246b010SChuck Lever { 511a246b010SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 512a246b010SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 513ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 514262965f5SChuck Lever struct xdr_buf *xdr = &req->rq_snd_buf; 515262965f5SChuck Lever int status; 516262965f5SChuck Lever 517262965f5SChuck Lever xs_pktdump("packet data:", 518262965f5SChuck Lever req->rq_svec->iov_base, 519262965f5SChuck Lever req->rq_svec->iov_len); 520262965f5SChuck Lever 52101d37c42STrond Myklebust if (!xprt_bound(xprt)) 52201d37c42STrond Myklebust return -ENOTCONN; 523ee0ac0c2SChuck Lever status = xs_sendpages(transport->sock, 52495392c59SChuck Lever xs_addr(xprt), 525ee0ac0c2SChuck Lever xprt->addrlen, xdr, 526ee0ac0c2SChuck Lever req->rq_bytes_sent); 527262965f5SChuck Lever 528262965f5SChuck Lever dprintk("RPC: xs_udp_send_request(%u) = %d\n", 529262965f5SChuck Lever xdr->len - req->rq_bytes_sent, status); 530262965f5SChuck Lever 5312199700fSTrond Myklebust if (status >= 0) { 532d60dbb20STrond Myklebust req->rq_xmit_bytes_sent += status; 5332199700fSTrond Myklebust if (status >= req->rq_slen) 534262965f5SChuck Lever return 0; 535262965f5SChuck Lever /* Still some bytes left; set up for a retry later. */ 536262965f5SChuck Lever status = -EAGAIN; 5372199700fSTrond Myklebust } 538262965f5SChuck Lever 539262965f5SChuck Lever switch (status) { 540fba91afbSTrond Myklebust case -ENOTSOCK: 541fba91afbSTrond Myklebust status = -ENOTCONN; 542fba91afbSTrond Myklebust /* Should we call xs_close() here? */ 543fba91afbSTrond Myklebust break; 544b6ddf64fSTrond Myklebust case -EAGAIN: 5455e3771ceSTrond Myklebust status = xs_nospace(task); 546b6ddf64fSTrond Myklebust break; 547c8485e4dSTrond Myklebust default: 548c8485e4dSTrond Myklebust dprintk("RPC: sendmsg returned unrecognized error %d\n", 549c8485e4dSTrond Myklebust -status); 550262965f5SChuck Lever case -ENETUNREACH: 551262965f5SChuck Lever case -EPIPE: 552262965f5SChuck Lever case -ECONNREFUSED: 553262965f5SChuck Lever /* When the server has died, an ICMP port unreachable message 554262965f5SChuck Lever * prompts ECONNREFUSED. */ 555b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 556262965f5SChuck Lever } 5575fe46e9dSBian Naimeng 558262965f5SChuck Lever return status; 559262965f5SChuck Lever } 560262965f5SChuck Lever 561e06799f9STrond Myklebust /** 562e06799f9STrond Myklebust * xs_tcp_shutdown - gracefully shut down a TCP socket 563e06799f9STrond Myklebust * @xprt: transport 564e06799f9STrond Myklebust * 565e06799f9STrond Myklebust * Initiates a graceful shutdown of the TCP socket by calling the 566e06799f9STrond Myklebust * equivalent of shutdown(SHUT_WR); 567e06799f9STrond Myklebust */ 568e06799f9STrond Myklebust static void xs_tcp_shutdown(struct rpc_xprt *xprt) 569e06799f9STrond Myklebust { 570e06799f9STrond Myklebust struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 571e06799f9STrond Myklebust struct socket *sock = transport->sock; 572e06799f9STrond Myklebust 573e06799f9STrond Myklebust if (sock != NULL) 574e06799f9STrond Myklebust kernel_sock_shutdown(sock, SHUT_WR); 575e06799f9STrond Myklebust } 576e06799f9STrond Myklebust 577808012fbSChuck Lever static inline void xs_encode_tcp_record_marker(struct xdr_buf *buf) 578808012fbSChuck Lever { 579808012fbSChuck Lever u32 reclen = buf->len - sizeof(rpc_fraghdr); 580808012fbSChuck Lever rpc_fraghdr *base = buf->head[0].iov_base; 581808012fbSChuck Lever *base = htonl(RPC_LAST_STREAM_FRAGMENT | reclen); 582808012fbSChuck Lever } 583808012fbSChuck Lever 584262965f5SChuck Lever /** 585262965f5SChuck Lever * xs_tcp_send_request - write an RPC request to a TCP socket 586262965f5SChuck Lever * @task: address of RPC task that manages the state of an RPC request 587262965f5SChuck Lever * 588262965f5SChuck Lever * Return values: 589262965f5SChuck Lever * 0: The request has been sent 590262965f5SChuck Lever * EAGAIN: The socket was blocked, please call again later to 591262965f5SChuck Lever * complete the request 592262965f5SChuck Lever * ENOTCONN: Caller needs to invoke connect logic then call again 593262965f5SChuck Lever * other: Some other error occured, the request was not sent 594262965f5SChuck Lever * 595262965f5SChuck Lever * XXX: In the case of soft timeouts, should we eventually give up 596262965f5SChuck Lever * if sendmsg is not able to make progress? 597262965f5SChuck Lever */ 598262965f5SChuck Lever static int xs_tcp_send_request(struct rpc_task *task) 599262965f5SChuck Lever { 600262965f5SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 601262965f5SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 602ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 603262965f5SChuck Lever struct xdr_buf *xdr = &req->rq_snd_buf; 604b595bb15SChuck Lever int status; 605a246b010SChuck Lever 606808012fbSChuck Lever xs_encode_tcp_record_marker(&req->rq_snd_buf); 607262965f5SChuck Lever 608262965f5SChuck Lever xs_pktdump("packet data:", 609262965f5SChuck Lever req->rq_svec->iov_base, 610262965f5SChuck Lever req->rq_svec->iov_len); 611a246b010SChuck Lever 612a246b010SChuck Lever /* Continue transmitting the packet/record. We must be careful 613a246b010SChuck Lever * to cope with writespace callbacks arriving _after_ we have 614262965f5SChuck Lever * called sendmsg(). */ 615a246b010SChuck Lever while (1) { 616ee0ac0c2SChuck Lever status = xs_sendpages(transport->sock, 617ee0ac0c2SChuck Lever NULL, 0, xdr, req->rq_bytes_sent); 618a246b010SChuck Lever 619262965f5SChuck Lever dprintk("RPC: xs_tcp_send_request(%u) = %d\n", 620262965f5SChuck Lever xdr->len - req->rq_bytes_sent, status); 621262965f5SChuck Lever 622262965f5SChuck Lever if (unlikely(status < 0)) 623a246b010SChuck Lever break; 624a246b010SChuck Lever 625a246b010SChuck Lever /* If we've sent the entire packet, immediately 626a246b010SChuck Lever * reset the count of bytes sent. */ 627262965f5SChuck Lever req->rq_bytes_sent += status; 628d60dbb20STrond Myklebust req->rq_xmit_bytes_sent += status; 629262965f5SChuck Lever if (likely(req->rq_bytes_sent >= req->rq_slen)) { 630a246b010SChuck Lever req->rq_bytes_sent = 0; 631a246b010SChuck Lever return 0; 632a246b010SChuck Lever } 633262965f5SChuck Lever 63406b4b681STrond Myklebust if (status != 0) 63506b4b681STrond Myklebust continue; 636a246b010SChuck Lever status = -EAGAIN; 637a246b010SChuck Lever break; 638a246b010SChuck Lever } 639a246b010SChuck Lever 640262965f5SChuck Lever switch (status) { 641fba91afbSTrond Myklebust case -ENOTSOCK: 642fba91afbSTrond Myklebust status = -ENOTCONN; 643fba91afbSTrond Myklebust /* Should we call xs_close() here? */ 644fba91afbSTrond Myklebust break; 645262965f5SChuck Lever case -EAGAIN: 6465e3771ceSTrond Myklebust status = xs_nospace(task); 647262965f5SChuck Lever break; 648262965f5SChuck Lever default: 649262965f5SChuck Lever dprintk("RPC: sendmsg returned unrecognized error %d\n", 650262965f5SChuck Lever -status); 651a246b010SChuck Lever case -ECONNRESET: 65255420c24STrond Myklebust case -EPIPE: 653e06799f9STrond Myklebust xs_tcp_shutdown(xprt); 654a246b010SChuck Lever case -ECONNREFUSED: 655a246b010SChuck Lever case -ENOTCONN: 656a246b010SChuck Lever clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 657a246b010SChuck Lever } 6585fe46e9dSBian Naimeng 659a246b010SChuck Lever return status; 660a246b010SChuck Lever } 661a246b010SChuck Lever 6629903cd1cSChuck Lever /** 663e0ab53deSTrond Myklebust * xs_tcp_release_xprt - clean up after a tcp transmission 664e0ab53deSTrond Myklebust * @xprt: transport 665e0ab53deSTrond Myklebust * @task: rpc task 666e0ab53deSTrond Myklebust * 667e0ab53deSTrond Myklebust * This cleans up if an error causes us to abort the transmission of a request. 668e0ab53deSTrond Myklebust * In this case, the socket may need to be reset in order to avoid confusing 669e0ab53deSTrond Myklebust * the server. 670e0ab53deSTrond Myklebust */ 671e0ab53deSTrond Myklebust static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task) 672e0ab53deSTrond Myklebust { 673e0ab53deSTrond Myklebust struct rpc_rqst *req; 674e0ab53deSTrond Myklebust 675e0ab53deSTrond Myklebust if (task != xprt->snd_task) 676e0ab53deSTrond Myklebust return; 677e0ab53deSTrond Myklebust if (task == NULL) 678e0ab53deSTrond Myklebust goto out_release; 679e0ab53deSTrond Myklebust req = task->tk_rqstp; 680e0ab53deSTrond Myklebust if (req->rq_bytes_sent == 0) 681e0ab53deSTrond Myklebust goto out_release; 682e0ab53deSTrond Myklebust if (req->rq_bytes_sent == req->rq_snd_buf.len) 683e0ab53deSTrond Myklebust goto out_release; 684e0ab53deSTrond Myklebust set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state); 685e0ab53deSTrond Myklebust out_release: 686e0ab53deSTrond Myklebust xprt_release_xprt(xprt, task); 687e0ab53deSTrond Myklebust } 688e0ab53deSTrond Myklebust 6892a9e1cfaSTrond Myklebust static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk) 6902a9e1cfaSTrond Myklebust { 6912a9e1cfaSTrond Myklebust transport->old_data_ready = sk->sk_data_ready; 6922a9e1cfaSTrond Myklebust transport->old_state_change = sk->sk_state_change; 6932a9e1cfaSTrond Myklebust transport->old_write_space = sk->sk_write_space; 6942a9e1cfaSTrond Myklebust transport->old_error_report = sk->sk_error_report; 6952a9e1cfaSTrond Myklebust } 6962a9e1cfaSTrond Myklebust 6972a9e1cfaSTrond Myklebust static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk) 6982a9e1cfaSTrond Myklebust { 6992a9e1cfaSTrond Myklebust sk->sk_data_ready = transport->old_data_ready; 7002a9e1cfaSTrond Myklebust sk->sk_state_change = transport->old_state_change; 7012a9e1cfaSTrond Myklebust sk->sk_write_space = transport->old_write_space; 7022a9e1cfaSTrond Myklebust sk->sk_error_report = transport->old_error_report; 7032a9e1cfaSTrond Myklebust } 7042a9e1cfaSTrond Myklebust 705fe315e76SChuck Lever static void xs_reset_transport(struct sock_xprt *transport) 706a246b010SChuck Lever { 707ee0ac0c2SChuck Lever struct socket *sock = transport->sock; 708ee0ac0c2SChuck Lever struct sock *sk = transport->inet; 709a246b010SChuck Lever 710fe315e76SChuck Lever if (sk == NULL) 711fe315e76SChuck Lever return; 7129903cd1cSChuck Lever 713a246b010SChuck Lever write_lock_bh(&sk->sk_callback_lock); 714ee0ac0c2SChuck Lever transport->inet = NULL; 715ee0ac0c2SChuck Lever transport->sock = NULL; 716a246b010SChuck Lever 717a246b010SChuck Lever sk->sk_user_data = NULL; 7182a9e1cfaSTrond Myklebust 7192a9e1cfaSTrond Myklebust xs_restore_old_callbacks(transport, sk); 720a246b010SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 721a246b010SChuck Lever 722a246b010SChuck Lever sk->sk_no_check = 0; 723a246b010SChuck Lever 724a246b010SChuck Lever sock_release(sock); 725fe315e76SChuck Lever } 726fe315e76SChuck Lever 727fe315e76SChuck Lever /** 728fe315e76SChuck Lever * xs_close - close a socket 729fe315e76SChuck Lever * @xprt: transport 730fe315e76SChuck Lever * 731fe315e76SChuck Lever * This is used when all requests are complete; ie, no DRC state remains 732fe315e76SChuck Lever * on the server we want to save. 733f75e6745STrond Myklebust * 734f75e6745STrond Myklebust * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with 735f75e6745STrond Myklebust * xs_reset_transport() zeroing the socket from underneath a writer. 736fe315e76SChuck Lever */ 737fe315e76SChuck Lever static void xs_close(struct rpc_xprt *xprt) 738fe315e76SChuck Lever { 739fe315e76SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 740fe315e76SChuck Lever 741fe315e76SChuck Lever dprintk("RPC: xs_close xprt %p\n", xprt); 742fe315e76SChuck Lever 743fe315e76SChuck Lever xs_reset_transport(transport); 74461d0a8e6SNeil Brown xprt->reestablish_timeout = 0; 745fe315e76SChuck Lever 746632e3bdcSTrond Myklebust smp_mb__before_clear_bit(); 7477d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 748632e3bdcSTrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 7493b948ae5STrond Myklebust clear_bit(XPRT_CLOSING, &xprt->state); 750632e3bdcSTrond Myklebust smp_mb__after_clear_bit(); 75162da3b24STrond Myklebust xprt_disconnect_done(xprt); 752a246b010SChuck Lever } 753a246b010SChuck Lever 754f75e6745STrond Myklebust static void xs_tcp_close(struct rpc_xprt *xprt) 755f75e6745STrond Myklebust { 756f75e6745STrond Myklebust if (test_and_clear_bit(XPRT_CONNECTION_CLOSE, &xprt->state)) 757f75e6745STrond Myklebust xs_close(xprt); 758f75e6745STrond Myklebust else 759f75e6745STrond Myklebust xs_tcp_shutdown(xprt); 760f75e6745STrond Myklebust } 761f75e6745STrond Myklebust 7629903cd1cSChuck Lever /** 7639903cd1cSChuck Lever * xs_destroy - prepare to shutdown a transport 7649903cd1cSChuck Lever * @xprt: doomed transport 7659903cd1cSChuck Lever * 7669903cd1cSChuck Lever */ 7679903cd1cSChuck Lever static void xs_destroy(struct rpc_xprt *xprt) 768a246b010SChuck Lever { 769c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 770c8475461SChuck Lever 7719903cd1cSChuck Lever dprintk("RPC: xs_destroy xprt %p\n", xprt); 7729903cd1cSChuck Lever 773c1384c9cSTrond Myklebust cancel_rearming_delayed_work(&transport->connect_worker); 774a246b010SChuck Lever 7759903cd1cSChuck Lever xs_close(xprt); 776edb267a6SChuck Lever xs_free_peer_addresses(xprt); 777e204e621SPavel Emelyanov xprt_free(xprt); 778bc25571eS\"Talpey, Thomas\ module_put(THIS_MODULE); 779a246b010SChuck Lever } 780a246b010SChuck Lever 7819903cd1cSChuck Lever static inline struct rpc_xprt *xprt_from_sock(struct sock *sk) 7829903cd1cSChuck Lever { 7839903cd1cSChuck Lever return (struct rpc_xprt *) sk->sk_user_data; 7849903cd1cSChuck Lever } 7859903cd1cSChuck Lever 7869903cd1cSChuck Lever /** 7879903cd1cSChuck Lever * xs_udp_data_ready - "data ready" callback for UDP sockets 7889903cd1cSChuck Lever * @sk: socket with data to read 7899903cd1cSChuck Lever * @len: how much data to read 7909903cd1cSChuck Lever * 791a246b010SChuck Lever */ 7929903cd1cSChuck Lever static void xs_udp_data_ready(struct sock *sk, int len) 793a246b010SChuck Lever { 794a246b010SChuck Lever struct rpc_task *task; 795a246b010SChuck Lever struct rpc_xprt *xprt; 796a246b010SChuck Lever struct rpc_rqst *rovr; 797a246b010SChuck Lever struct sk_buff *skb; 798a246b010SChuck Lever int err, repsize, copied; 799d8ed029dSAlexey Dobriyan u32 _xid; 800d8ed029dSAlexey Dobriyan __be32 *xp; 801a246b010SChuck Lever 802f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 8039903cd1cSChuck Lever dprintk("RPC: xs_udp_data_ready...\n"); 8049903cd1cSChuck Lever if (!(xprt = xprt_from_sock(sk))) 805a246b010SChuck Lever goto out; 806a246b010SChuck Lever 807a246b010SChuck Lever if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL) 808a246b010SChuck Lever goto out; 809a246b010SChuck Lever 810a246b010SChuck Lever if (xprt->shutdown) 811a246b010SChuck Lever goto dropit; 812a246b010SChuck Lever 813a246b010SChuck Lever repsize = skb->len - sizeof(struct udphdr); 814a246b010SChuck Lever if (repsize < 4) { 8159903cd1cSChuck Lever dprintk("RPC: impossible RPC reply size %d!\n", repsize); 816a246b010SChuck Lever goto dropit; 817a246b010SChuck Lever } 818a246b010SChuck Lever 819a246b010SChuck Lever /* Copy the XID from the skb... */ 820a246b010SChuck Lever xp = skb_header_pointer(skb, sizeof(struct udphdr), 821a246b010SChuck Lever sizeof(_xid), &_xid); 822a246b010SChuck Lever if (xp == NULL) 823a246b010SChuck Lever goto dropit; 824a246b010SChuck Lever 825a246b010SChuck Lever /* Look up and lock the request corresponding to the given XID */ 8264a0f8c04SChuck Lever spin_lock(&xprt->transport_lock); 827a246b010SChuck Lever rovr = xprt_lookup_rqst(xprt, *xp); 828a246b010SChuck Lever if (!rovr) 829a246b010SChuck Lever goto out_unlock; 830a246b010SChuck Lever task = rovr->rq_task; 831a246b010SChuck Lever 832a246b010SChuck Lever if ((copied = rovr->rq_private_buf.buflen) > repsize) 833a246b010SChuck Lever copied = repsize; 834a246b010SChuck Lever 835a246b010SChuck Lever /* Suck it into the iovec, verify checksum if not done by hw. */ 8361781f7f5SHerbert Xu if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) { 8371781f7f5SHerbert Xu UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS); 838a246b010SChuck Lever goto out_unlock; 8391781f7f5SHerbert Xu } 8401781f7f5SHerbert Xu 8411781f7f5SHerbert Xu UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS); 842a246b010SChuck Lever 843a246b010SChuck Lever /* Something worked... */ 844adf30907SEric Dumazet dst_confirm(skb_dst(skb)); 845a246b010SChuck Lever 8461570c1e4SChuck Lever xprt_adjust_cwnd(task, copied); 8471570c1e4SChuck Lever xprt_complete_rqst(task, copied); 848a246b010SChuck Lever 849a246b010SChuck Lever out_unlock: 8504a0f8c04SChuck Lever spin_unlock(&xprt->transport_lock); 851a246b010SChuck Lever dropit: 852a246b010SChuck Lever skb_free_datagram(sk, skb); 853a246b010SChuck Lever out: 854f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 855a246b010SChuck Lever } 856a246b010SChuck Lever 857dd456471SChuck Lever static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc) 858a246b010SChuck Lever { 85951971139SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 860a246b010SChuck Lever size_t len, used; 861a246b010SChuck Lever char *p; 862a246b010SChuck Lever 86351971139SChuck Lever p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset; 86451971139SChuck Lever len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset; 8659d292316SChuck Lever used = xdr_skb_read_bits(desc, p, len); 86651971139SChuck Lever transport->tcp_offset += used; 867a246b010SChuck Lever if (used != len) 868a246b010SChuck Lever return; 869808012fbSChuck Lever 87051971139SChuck Lever transport->tcp_reclen = ntohl(transport->tcp_fraghdr); 87151971139SChuck Lever if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT) 872e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_LAST_FRAG; 873a246b010SChuck Lever else 874e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_LAST_FRAG; 87551971139SChuck Lever transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK; 876808012fbSChuck Lever 877e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR; 87851971139SChuck Lever transport->tcp_offset = 0; 879808012fbSChuck Lever 880a246b010SChuck Lever /* Sanity check of the record length */ 88118dca02aSRicardo Labiaga if (unlikely(transport->tcp_reclen < 8)) { 8829903cd1cSChuck Lever dprintk("RPC: invalid TCP record fragment length\n"); 8833ebb067dSTrond Myklebust xprt_force_disconnect(xprt); 8849903cd1cSChuck Lever return; 885a246b010SChuck Lever } 886a246b010SChuck Lever dprintk("RPC: reading TCP record fragment of length %d\n", 88751971139SChuck Lever transport->tcp_reclen); 888a246b010SChuck Lever } 889a246b010SChuck Lever 89051971139SChuck Lever static void xs_tcp_check_fraghdr(struct sock_xprt *transport) 891a246b010SChuck Lever { 89251971139SChuck Lever if (transport->tcp_offset == transport->tcp_reclen) { 893e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR; 89451971139SChuck Lever transport->tcp_offset = 0; 895e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_LAST_FRAG) { 896e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 897e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_COPY_XID; 89851971139SChuck Lever transport->tcp_copied = 0; 899a246b010SChuck Lever } 900a246b010SChuck Lever } 901a246b010SChuck Lever } 902a246b010SChuck Lever 903dd456471SChuck Lever static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc) 904a246b010SChuck Lever { 905a246b010SChuck Lever size_t len, used; 906a246b010SChuck Lever char *p; 907a246b010SChuck Lever 90851971139SChuck Lever len = sizeof(transport->tcp_xid) - transport->tcp_offset; 909a246b010SChuck Lever dprintk("RPC: reading XID (%Zu bytes)\n", len); 91051971139SChuck Lever p = ((char *) &transport->tcp_xid) + transport->tcp_offset; 9119d292316SChuck Lever used = xdr_skb_read_bits(desc, p, len); 91251971139SChuck Lever transport->tcp_offset += used; 913a246b010SChuck Lever if (used != len) 914a246b010SChuck Lever return; 915e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_XID; 916f4a2e418SRicardo Labiaga transport->tcp_flags |= TCP_RCV_READ_CALLDIR; 91751971139SChuck Lever transport->tcp_copied = 4; 91818dca02aSRicardo Labiaga dprintk("RPC: reading %s XID %08x\n", 91918dca02aSRicardo Labiaga (transport->tcp_flags & TCP_RPC_REPLY) ? "reply for" 92018dca02aSRicardo Labiaga : "request with", 92151971139SChuck Lever ntohl(transport->tcp_xid)); 92251971139SChuck Lever xs_tcp_check_fraghdr(transport); 923a246b010SChuck Lever } 924a246b010SChuck Lever 92518dca02aSRicardo Labiaga static inline void xs_tcp_read_calldir(struct sock_xprt *transport, 92618dca02aSRicardo Labiaga struct xdr_skb_reader *desc) 927a246b010SChuck Lever { 92818dca02aSRicardo Labiaga size_t len, used; 92918dca02aSRicardo Labiaga u32 offset; 930b76ce561STrond Myklebust char *p; 93118dca02aSRicardo Labiaga 93218dca02aSRicardo Labiaga /* 93318dca02aSRicardo Labiaga * We want transport->tcp_offset to be 8 at the end of this routine 93418dca02aSRicardo Labiaga * (4 bytes for the xid and 4 bytes for the call/reply flag). 93518dca02aSRicardo Labiaga * When this function is called for the first time, 93618dca02aSRicardo Labiaga * transport->tcp_offset is 4 (after having already read the xid). 93718dca02aSRicardo Labiaga */ 93818dca02aSRicardo Labiaga offset = transport->tcp_offset - sizeof(transport->tcp_xid); 939b76ce561STrond Myklebust len = sizeof(transport->tcp_calldir) - offset; 94018dca02aSRicardo Labiaga dprintk("RPC: reading CALL/REPLY flag (%Zu bytes)\n", len); 941b76ce561STrond Myklebust p = ((char *) &transport->tcp_calldir) + offset; 942b76ce561STrond Myklebust used = xdr_skb_read_bits(desc, p, len); 94318dca02aSRicardo Labiaga transport->tcp_offset += used; 94418dca02aSRicardo Labiaga if (used != len) 94518dca02aSRicardo Labiaga return; 946f4a2e418SRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR; 947f4a2e418SRicardo Labiaga /* 948f4a2e418SRicardo Labiaga * We don't yet have the XDR buffer, so we will write the calldir 949f4a2e418SRicardo Labiaga * out after we get the buffer from the 'struct rpc_rqst' 950f4a2e418SRicardo Labiaga */ 951b76ce561STrond Myklebust switch (ntohl(transport->tcp_calldir)) { 952b76ce561STrond Myklebust case RPC_REPLY: 953b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_CALLDIR; 954b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_DATA; 95518dca02aSRicardo Labiaga transport->tcp_flags |= TCP_RPC_REPLY; 956b76ce561STrond Myklebust break; 957b76ce561STrond Myklebust case RPC_CALL: 958b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_CALLDIR; 959b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_DATA; 96018dca02aSRicardo Labiaga transport->tcp_flags &= ~TCP_RPC_REPLY; 961b76ce561STrond Myklebust break; 962b76ce561STrond Myklebust default: 963b76ce561STrond Myklebust dprintk("RPC: invalid request message type\n"); 964b76ce561STrond Myklebust xprt_force_disconnect(&transport->xprt); 965b76ce561STrond Myklebust } 96618dca02aSRicardo Labiaga xs_tcp_check_fraghdr(transport); 96718dca02aSRicardo Labiaga } 96818dca02aSRicardo Labiaga 96944b98efdSRicardo Labiaga static inline void xs_tcp_read_common(struct rpc_xprt *xprt, 97044b98efdSRicardo Labiaga struct xdr_skb_reader *desc, 97144b98efdSRicardo Labiaga struct rpc_rqst *req) 972a246b010SChuck Lever { 97344b98efdSRicardo Labiaga struct sock_xprt *transport = 97444b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 975a246b010SChuck Lever struct xdr_buf *rcvbuf; 976a246b010SChuck Lever size_t len; 977a246b010SChuck Lever ssize_t r; 978a246b010SChuck Lever 979a246b010SChuck Lever rcvbuf = &req->rq_private_buf; 980f4a2e418SRicardo Labiaga 981f4a2e418SRicardo Labiaga if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) { 982f4a2e418SRicardo Labiaga /* 983f4a2e418SRicardo Labiaga * Save the RPC direction in the XDR buffer 984f4a2e418SRicardo Labiaga */ 985f4a2e418SRicardo Labiaga memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied, 986b76ce561STrond Myklebust &transport->tcp_calldir, 987b76ce561STrond Myklebust sizeof(transport->tcp_calldir)); 988b76ce561STrond Myklebust transport->tcp_copied += sizeof(transport->tcp_calldir); 989f4a2e418SRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR; 990a246b010SChuck Lever } 991a246b010SChuck Lever 992a246b010SChuck Lever len = desc->count; 99351971139SChuck Lever if (len > transport->tcp_reclen - transport->tcp_offset) { 994dd456471SChuck Lever struct xdr_skb_reader my_desc; 995a246b010SChuck Lever 99651971139SChuck Lever len = transport->tcp_reclen - transport->tcp_offset; 997a246b010SChuck Lever memcpy(&my_desc, desc, sizeof(my_desc)); 998a246b010SChuck Lever my_desc.count = len; 99951971139SChuck Lever r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied, 10009d292316SChuck Lever &my_desc, xdr_skb_read_bits); 1001a246b010SChuck Lever desc->count -= r; 1002a246b010SChuck Lever desc->offset += r; 1003a246b010SChuck Lever } else 100451971139SChuck Lever r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied, 10059d292316SChuck Lever desc, xdr_skb_read_bits); 1006a246b010SChuck Lever 1007a246b010SChuck Lever if (r > 0) { 100851971139SChuck Lever transport->tcp_copied += r; 100951971139SChuck Lever transport->tcp_offset += r; 1010a246b010SChuck Lever } 1011a246b010SChuck Lever if (r != len) { 1012a246b010SChuck Lever /* Error when copying to the receive buffer, 1013a246b010SChuck Lever * usually because we weren't able to allocate 1014a246b010SChuck Lever * additional buffer pages. All we can do now 1015e136d092SChuck Lever * is turn off TCP_RCV_COPY_DATA, so the request 1016a246b010SChuck Lever * will not receive any additional updates, 1017a246b010SChuck Lever * and time out. 1018a246b010SChuck Lever * Any remaining data from this record will 1019a246b010SChuck Lever * be discarded. 1020a246b010SChuck Lever */ 1021e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 1022a246b010SChuck Lever dprintk("RPC: XID %08x truncated request\n", 102351971139SChuck Lever ntohl(transport->tcp_xid)); 102446121cf7SChuck Lever dprintk("RPC: xprt = %p, tcp_copied = %lu, " 102546121cf7SChuck Lever "tcp_offset = %u, tcp_reclen = %u\n", 102646121cf7SChuck Lever xprt, transport->tcp_copied, 102746121cf7SChuck Lever transport->tcp_offset, transport->tcp_reclen); 102844b98efdSRicardo Labiaga return; 1029a246b010SChuck Lever } 1030a246b010SChuck Lever 1031a246b010SChuck Lever dprintk("RPC: XID %08x read %Zd bytes\n", 103251971139SChuck Lever ntohl(transport->tcp_xid), r); 103346121cf7SChuck Lever dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, " 103446121cf7SChuck Lever "tcp_reclen = %u\n", xprt, transport->tcp_copied, 103546121cf7SChuck Lever transport->tcp_offset, transport->tcp_reclen); 1036a246b010SChuck Lever 103751971139SChuck Lever if (transport->tcp_copied == req->rq_private_buf.buflen) 1038e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 103951971139SChuck Lever else if (transport->tcp_offset == transport->tcp_reclen) { 1040e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_LAST_FRAG) 1041e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 1042a246b010SChuck Lever } 104344b98efdSRicardo Labiaga } 104444b98efdSRicardo Labiaga 104544b98efdSRicardo Labiaga /* 104644b98efdSRicardo Labiaga * Finds the request corresponding to the RPC xid and invokes the common 104744b98efdSRicardo Labiaga * tcp read code to read the data. 104844b98efdSRicardo Labiaga */ 104944b98efdSRicardo Labiaga static inline int xs_tcp_read_reply(struct rpc_xprt *xprt, 105044b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 105144b98efdSRicardo Labiaga { 105244b98efdSRicardo Labiaga struct sock_xprt *transport = 105344b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 105444b98efdSRicardo Labiaga struct rpc_rqst *req; 105544b98efdSRicardo Labiaga 105644b98efdSRicardo Labiaga dprintk("RPC: read reply XID %08x\n", ntohl(transport->tcp_xid)); 105744b98efdSRicardo Labiaga 105844b98efdSRicardo Labiaga /* Find and lock the request corresponding to this xid */ 105944b98efdSRicardo Labiaga spin_lock(&xprt->transport_lock); 106044b98efdSRicardo Labiaga req = xprt_lookup_rqst(xprt, transport->tcp_xid); 106144b98efdSRicardo Labiaga if (!req) { 106244b98efdSRicardo Labiaga dprintk("RPC: XID %08x request not found!\n", 106344b98efdSRicardo Labiaga ntohl(transport->tcp_xid)); 106444b98efdSRicardo Labiaga spin_unlock(&xprt->transport_lock); 106544b98efdSRicardo Labiaga return -1; 106644b98efdSRicardo Labiaga } 106744b98efdSRicardo Labiaga 106844b98efdSRicardo Labiaga xs_tcp_read_common(xprt, desc, req); 106944b98efdSRicardo Labiaga 1070e136d092SChuck Lever if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) 107151971139SChuck Lever xprt_complete_rqst(req->rq_task, transport->tcp_copied); 107244b98efdSRicardo Labiaga 10734a0f8c04SChuck Lever spin_unlock(&xprt->transport_lock); 107444b98efdSRicardo Labiaga return 0; 107544b98efdSRicardo Labiaga } 107644b98efdSRicardo Labiaga 107744b98efdSRicardo Labiaga #if defined(CONFIG_NFS_V4_1) 107844b98efdSRicardo Labiaga /* 107944b98efdSRicardo Labiaga * Obtains an rpc_rqst previously allocated and invokes the common 108044b98efdSRicardo Labiaga * tcp read code to read the data. The result is placed in the callback 108144b98efdSRicardo Labiaga * queue. 108244b98efdSRicardo Labiaga * If we're unable to obtain the rpc_rqst we schedule the closing of the 108344b98efdSRicardo Labiaga * connection and return -1. 108444b98efdSRicardo Labiaga */ 108544b98efdSRicardo Labiaga static inline int xs_tcp_read_callback(struct rpc_xprt *xprt, 108644b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 108744b98efdSRicardo Labiaga { 108844b98efdSRicardo Labiaga struct sock_xprt *transport = 108944b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 109044b98efdSRicardo Labiaga struct rpc_rqst *req; 109144b98efdSRicardo Labiaga 109244b98efdSRicardo Labiaga req = xprt_alloc_bc_request(xprt); 109344b98efdSRicardo Labiaga if (req == NULL) { 109444b98efdSRicardo Labiaga printk(KERN_WARNING "Callback slot table overflowed\n"); 109544b98efdSRicardo Labiaga xprt_force_disconnect(xprt); 109644b98efdSRicardo Labiaga return -1; 109744b98efdSRicardo Labiaga } 109844b98efdSRicardo Labiaga 109944b98efdSRicardo Labiaga req->rq_xid = transport->tcp_xid; 110044b98efdSRicardo Labiaga dprintk("RPC: read callback XID %08x\n", ntohl(req->rq_xid)); 110144b98efdSRicardo Labiaga xs_tcp_read_common(xprt, desc, req); 110244b98efdSRicardo Labiaga 110344b98efdSRicardo Labiaga if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) { 110444b98efdSRicardo Labiaga struct svc_serv *bc_serv = xprt->bc_serv; 110544b98efdSRicardo Labiaga 110644b98efdSRicardo Labiaga /* 110744b98efdSRicardo Labiaga * Add callback request to callback list. The callback 110844b98efdSRicardo Labiaga * service sleeps on the sv_cb_waitq waiting for new 110944b98efdSRicardo Labiaga * requests. Wake it up after adding enqueing the 111044b98efdSRicardo Labiaga * request. 111144b98efdSRicardo Labiaga */ 111244b98efdSRicardo Labiaga dprintk("RPC: add callback request to list\n"); 111344b98efdSRicardo Labiaga spin_lock(&bc_serv->sv_cb_lock); 111444b98efdSRicardo Labiaga list_add(&req->rq_bc_list, &bc_serv->sv_cb_list); 111544b98efdSRicardo Labiaga spin_unlock(&bc_serv->sv_cb_lock); 111644b98efdSRicardo Labiaga wake_up(&bc_serv->sv_cb_waitq); 111744b98efdSRicardo Labiaga } 111844b98efdSRicardo Labiaga 111944b98efdSRicardo Labiaga req->rq_private_buf.len = transport->tcp_copied; 112044b98efdSRicardo Labiaga 112144b98efdSRicardo Labiaga return 0; 112244b98efdSRicardo Labiaga } 112344b98efdSRicardo Labiaga 112444b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt, 112544b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 112644b98efdSRicardo Labiaga { 112744b98efdSRicardo Labiaga struct sock_xprt *transport = 112844b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 112944b98efdSRicardo Labiaga 113044b98efdSRicardo Labiaga return (transport->tcp_flags & TCP_RPC_REPLY) ? 113144b98efdSRicardo Labiaga xs_tcp_read_reply(xprt, desc) : 113244b98efdSRicardo Labiaga xs_tcp_read_callback(xprt, desc); 113344b98efdSRicardo Labiaga } 113444b98efdSRicardo Labiaga #else 113544b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt, 113644b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 113744b98efdSRicardo Labiaga { 113844b98efdSRicardo Labiaga return xs_tcp_read_reply(xprt, desc); 113944b98efdSRicardo Labiaga } 114044b98efdSRicardo Labiaga #endif /* CONFIG_NFS_V4_1 */ 114144b98efdSRicardo Labiaga 114244b98efdSRicardo Labiaga /* 114344b98efdSRicardo Labiaga * Read data off the transport. This can be either an RPC_CALL or an 114444b98efdSRicardo Labiaga * RPC_REPLY. Relay the processing to helper functions. 114544b98efdSRicardo Labiaga */ 114644b98efdSRicardo Labiaga static void xs_tcp_read_data(struct rpc_xprt *xprt, 114744b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 114844b98efdSRicardo Labiaga { 114944b98efdSRicardo Labiaga struct sock_xprt *transport = 115044b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 115144b98efdSRicardo Labiaga 115244b98efdSRicardo Labiaga if (_xs_tcp_read_data(xprt, desc) == 0) 115351971139SChuck Lever xs_tcp_check_fraghdr(transport); 115444b98efdSRicardo Labiaga else { 115544b98efdSRicardo Labiaga /* 115644b98efdSRicardo Labiaga * The transport_lock protects the request handling. 115744b98efdSRicardo Labiaga * There's no need to hold it to update the tcp_flags. 115844b98efdSRicardo Labiaga */ 115944b98efdSRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 116044b98efdSRicardo Labiaga } 1161a246b010SChuck Lever } 1162a246b010SChuck Lever 1163dd456471SChuck Lever static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc) 1164a246b010SChuck Lever { 1165a246b010SChuck Lever size_t len; 1166a246b010SChuck Lever 116751971139SChuck Lever len = transport->tcp_reclen - transport->tcp_offset; 1168a246b010SChuck Lever if (len > desc->count) 1169a246b010SChuck Lever len = desc->count; 1170a246b010SChuck Lever desc->count -= len; 1171a246b010SChuck Lever desc->offset += len; 117251971139SChuck Lever transport->tcp_offset += len; 1173a246b010SChuck Lever dprintk("RPC: discarded %Zu bytes\n", len); 117451971139SChuck Lever xs_tcp_check_fraghdr(transport); 1175a246b010SChuck Lever } 1176a246b010SChuck Lever 11779903cd1cSChuck Lever static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len) 1178a246b010SChuck Lever { 1179a246b010SChuck Lever struct rpc_xprt *xprt = rd_desc->arg.data; 118051971139SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1181dd456471SChuck Lever struct xdr_skb_reader desc = { 1182a246b010SChuck Lever .skb = skb, 1183a246b010SChuck Lever .offset = offset, 1184a246b010SChuck Lever .count = len, 1185a246b010SChuck Lever }; 1186a246b010SChuck Lever 11879903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_recv started\n"); 1188a246b010SChuck Lever do { 1189a246b010SChuck Lever /* Read in a new fragment marker if necessary */ 1190a246b010SChuck Lever /* Can we ever really expect to get completely empty fragments? */ 1191e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) { 11929903cd1cSChuck Lever xs_tcp_read_fraghdr(xprt, &desc); 1193a246b010SChuck Lever continue; 1194a246b010SChuck Lever } 1195a246b010SChuck Lever /* Read in the xid if necessary */ 1196e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_XID) { 119751971139SChuck Lever xs_tcp_read_xid(transport, &desc); 1198a246b010SChuck Lever continue; 1199a246b010SChuck Lever } 120018dca02aSRicardo Labiaga /* Read in the call/reply flag */ 1201f4a2e418SRicardo Labiaga if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) { 120218dca02aSRicardo Labiaga xs_tcp_read_calldir(transport, &desc); 120318dca02aSRicardo Labiaga continue; 120418dca02aSRicardo Labiaga } 1205a246b010SChuck Lever /* Read in the request data */ 1206e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_DATA) { 120744b98efdSRicardo Labiaga xs_tcp_read_data(xprt, &desc); 1208a246b010SChuck Lever continue; 1209a246b010SChuck Lever } 1210a246b010SChuck Lever /* Skip over any trailing bytes on short reads */ 121151971139SChuck Lever xs_tcp_read_discard(transport, &desc); 1212a246b010SChuck Lever } while (desc.count); 12139903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_recv done\n"); 1214a246b010SChuck Lever return len - desc.count; 1215a246b010SChuck Lever } 1216a246b010SChuck Lever 12179903cd1cSChuck Lever /** 12189903cd1cSChuck Lever * xs_tcp_data_ready - "data ready" callback for TCP sockets 12199903cd1cSChuck Lever * @sk: socket with data to read 12209903cd1cSChuck Lever * @bytes: how much data to read 12219903cd1cSChuck Lever * 12229903cd1cSChuck Lever */ 12239903cd1cSChuck Lever static void xs_tcp_data_ready(struct sock *sk, int bytes) 1224a246b010SChuck Lever { 1225a246b010SChuck Lever struct rpc_xprt *xprt; 1226a246b010SChuck Lever read_descriptor_t rd_desc; 1227ff2d7db8STrond Myklebust int read; 1228a246b010SChuck Lever 12299903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_ready...\n"); 123046121cf7SChuck Lever 1231f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 12329903cd1cSChuck Lever if (!(xprt = xprt_from_sock(sk))) 1233a246b010SChuck Lever goto out; 1234a246b010SChuck Lever if (xprt->shutdown) 1235a246b010SChuck Lever goto out; 1236a246b010SChuck Lever 123761d0a8e6SNeil Brown /* Any data means we had a useful conversation, so 123861d0a8e6SNeil Brown * the we don't need to delay the next reconnect 123961d0a8e6SNeil Brown */ 124061d0a8e6SNeil Brown if (xprt->reestablish_timeout) 124161d0a8e6SNeil Brown xprt->reestablish_timeout = 0; 124261d0a8e6SNeil Brown 12439903cd1cSChuck Lever /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */ 1244a246b010SChuck Lever rd_desc.arg.data = xprt; 1245ff2d7db8STrond Myklebust do { 1246a246b010SChuck Lever rd_desc.count = 65536; 1247ff2d7db8STrond Myklebust read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv); 1248ff2d7db8STrond Myklebust } while (read > 0); 1249a246b010SChuck Lever out: 1250f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1251a246b010SChuck Lever } 1252a246b010SChuck Lever 12537d1e8255STrond Myklebust /* 12547d1e8255STrond Myklebust * Do the equivalent of linger/linger2 handling for dealing with 12557d1e8255STrond Myklebust * broken servers that don't close the socket in a timely 12567d1e8255STrond Myklebust * fashion 12577d1e8255STrond Myklebust */ 12587d1e8255STrond Myklebust static void xs_tcp_schedule_linger_timeout(struct rpc_xprt *xprt, 12597d1e8255STrond Myklebust unsigned long timeout) 12607d1e8255STrond Myklebust { 12617d1e8255STrond Myklebust struct sock_xprt *transport; 12627d1e8255STrond Myklebust 12637d1e8255STrond Myklebust if (xprt_test_and_set_connecting(xprt)) 12647d1e8255STrond Myklebust return; 12657d1e8255STrond Myklebust set_bit(XPRT_CONNECTION_ABORT, &xprt->state); 12667d1e8255STrond Myklebust transport = container_of(xprt, struct sock_xprt, xprt); 12677d1e8255STrond Myklebust queue_delayed_work(rpciod_workqueue, &transport->connect_worker, 12687d1e8255STrond Myklebust timeout); 12697d1e8255STrond Myklebust } 12707d1e8255STrond Myklebust 12717d1e8255STrond Myklebust static void xs_tcp_cancel_linger_timeout(struct rpc_xprt *xprt) 12727d1e8255STrond Myklebust { 12737d1e8255STrond Myklebust struct sock_xprt *transport; 12747d1e8255STrond Myklebust 12757d1e8255STrond Myklebust transport = container_of(xprt, struct sock_xprt, xprt); 12767d1e8255STrond Myklebust 12777d1e8255STrond Myklebust if (!test_bit(XPRT_CONNECTION_ABORT, &xprt->state) || 12787d1e8255STrond Myklebust !cancel_delayed_work(&transport->connect_worker)) 12797d1e8255STrond Myklebust return; 12807d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 12817d1e8255STrond Myklebust xprt_clear_connecting(xprt); 12827d1e8255STrond Myklebust } 12837d1e8255STrond Myklebust 12847d1e8255STrond Myklebust static void xs_sock_mark_closed(struct rpc_xprt *xprt) 12857d1e8255STrond Myklebust { 12867d1e8255STrond Myklebust smp_mb__before_clear_bit(); 12877d1e8255STrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 12887d1e8255STrond Myklebust clear_bit(XPRT_CLOSING, &xprt->state); 12897d1e8255STrond Myklebust smp_mb__after_clear_bit(); 12907d1e8255STrond Myklebust /* Mark transport as closed and wake up all pending tasks */ 12917d1e8255STrond Myklebust xprt_disconnect_done(xprt); 12927d1e8255STrond Myklebust } 12937d1e8255STrond Myklebust 12949903cd1cSChuck Lever /** 12959903cd1cSChuck Lever * xs_tcp_state_change - callback to handle TCP socket state changes 12969903cd1cSChuck Lever * @sk: socket whose state has changed 12979903cd1cSChuck Lever * 12989903cd1cSChuck Lever */ 12999903cd1cSChuck Lever static void xs_tcp_state_change(struct sock *sk) 1300a246b010SChuck Lever { 1301a246b010SChuck Lever struct rpc_xprt *xprt; 1302a246b010SChuck Lever 1303f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1304a246b010SChuck Lever if (!(xprt = xprt_from_sock(sk))) 1305a246b010SChuck Lever goto out; 13069903cd1cSChuck Lever dprintk("RPC: xs_tcp_state_change client %p...\n", xprt); 1307669502ffSAndy Chittenden dprintk("RPC: state %x conn %d dead %d zapped %d sk_shutdown %d\n", 1308a246b010SChuck Lever sk->sk_state, xprt_connected(xprt), 1309a246b010SChuck Lever sock_flag(sk, SOCK_DEAD), 1310669502ffSAndy Chittenden sock_flag(sk, SOCK_ZAPPED), 1311669502ffSAndy Chittenden sk->sk_shutdown); 1312a246b010SChuck Lever 1313a246b010SChuck Lever switch (sk->sk_state) { 1314a246b010SChuck Lever case TCP_ESTABLISHED: 1315f064af1eSEric Dumazet spin_lock(&xprt->transport_lock); 1316a246b010SChuck Lever if (!xprt_test_and_set_connected(xprt)) { 131751971139SChuck Lever struct sock_xprt *transport = container_of(xprt, 131851971139SChuck Lever struct sock_xprt, xprt); 131951971139SChuck Lever 1320a246b010SChuck Lever /* Reset TCP record info */ 132151971139SChuck Lever transport->tcp_offset = 0; 132251971139SChuck Lever transport->tcp_reclen = 0; 132351971139SChuck Lever transport->tcp_copied = 0; 1324e136d092SChuck Lever transport->tcp_flags = 1325e136d092SChuck Lever TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID; 132651971139SChuck Lever 13272a491991STrond Myklebust xprt_wake_pending_tasks(xprt, -EAGAIN); 1328a246b010SChuck Lever } 1329f064af1eSEric Dumazet spin_unlock(&xprt->transport_lock); 1330a246b010SChuck Lever break; 13313b948ae5STrond Myklebust case TCP_FIN_WAIT1: 13323b948ae5STrond Myklebust /* The client initiated a shutdown of the socket */ 13337c1d71cfSTrond Myklebust xprt->connect_cookie++; 1334663b8858STrond Myklebust xprt->reestablish_timeout = 0; 13353b948ae5STrond Myklebust set_bit(XPRT_CLOSING, &xprt->state); 13363b948ae5STrond Myklebust smp_mb__before_clear_bit(); 13373b948ae5STrond Myklebust clear_bit(XPRT_CONNECTED, &xprt->state); 1338ef803670STrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 13393b948ae5STrond Myklebust smp_mb__after_clear_bit(); 134025fe6142STrond Myklebust xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout); 1341a246b010SChuck Lever break; 1342632e3bdcSTrond Myklebust case TCP_CLOSE_WAIT: 13433b948ae5STrond Myklebust /* The server initiated a shutdown of the socket */ 134466af1e55STrond Myklebust xprt_force_disconnect(xprt); 1345663b8858STrond Myklebust case TCP_SYN_SENT: 13467c1d71cfSTrond Myklebust xprt->connect_cookie++; 1347663b8858STrond Myklebust case TCP_CLOSING: 1348663b8858STrond Myklebust /* 1349663b8858STrond Myklebust * If the server closed down the connection, make sure that 1350663b8858STrond Myklebust * we back off before reconnecting 1351663b8858STrond Myklebust */ 1352663b8858STrond Myklebust if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO) 1353663b8858STrond Myklebust xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 13543b948ae5STrond Myklebust break; 13553b948ae5STrond Myklebust case TCP_LAST_ACK: 1356670f9457STrond Myklebust set_bit(XPRT_CLOSING, &xprt->state); 135725fe6142STrond Myklebust xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout); 13583b948ae5STrond Myklebust smp_mb__before_clear_bit(); 13593b948ae5STrond Myklebust clear_bit(XPRT_CONNECTED, &xprt->state); 13603b948ae5STrond Myklebust smp_mb__after_clear_bit(); 13613b948ae5STrond Myklebust break; 13623b948ae5STrond Myklebust case TCP_CLOSE: 13637d1e8255STrond Myklebust xs_tcp_cancel_linger_timeout(xprt); 13647d1e8255STrond Myklebust xs_sock_mark_closed(xprt); 1365a246b010SChuck Lever } 1366a246b010SChuck Lever out: 1367f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1368a246b010SChuck Lever } 1369a246b010SChuck Lever 13709903cd1cSChuck Lever /** 1371482f32e6STrond Myklebust * xs_error_report - callback mainly for catching socket errors 13722a9e1cfaSTrond Myklebust * @sk: socket 13732a9e1cfaSTrond Myklebust */ 1374482f32e6STrond Myklebust static void xs_error_report(struct sock *sk) 13752a9e1cfaSTrond Myklebust { 13762a9e1cfaSTrond Myklebust struct rpc_xprt *xprt; 13772a9e1cfaSTrond Myklebust 1378f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 13792a9e1cfaSTrond Myklebust if (!(xprt = xprt_from_sock(sk))) 13802a9e1cfaSTrond Myklebust goto out; 13812a9e1cfaSTrond Myklebust dprintk("RPC: %s client %p...\n" 13822a9e1cfaSTrond Myklebust "RPC: error %d\n", 13832a9e1cfaSTrond Myklebust __func__, xprt, sk->sk_err); 1384482f32e6STrond Myklebust xprt_wake_pending_tasks(xprt, -EAGAIN); 13852a9e1cfaSTrond Myklebust out: 1386f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 13872a9e1cfaSTrond Myklebust } 13882a9e1cfaSTrond Myklebust 13891f0fa154SIlpo Järvinen static void xs_write_space(struct sock *sk) 13901f0fa154SIlpo Järvinen { 13911f0fa154SIlpo Järvinen struct socket *sock; 13921f0fa154SIlpo Järvinen struct rpc_xprt *xprt; 13931f0fa154SIlpo Järvinen 13941f0fa154SIlpo Järvinen if (unlikely(!(sock = sk->sk_socket))) 13951f0fa154SIlpo Järvinen return; 13961f0fa154SIlpo Järvinen clear_bit(SOCK_NOSPACE, &sock->flags); 13971f0fa154SIlpo Järvinen 13981f0fa154SIlpo Järvinen if (unlikely(!(xprt = xprt_from_sock(sk)))) 13991f0fa154SIlpo Järvinen return; 14001f0fa154SIlpo Järvinen if (test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags) == 0) 14011f0fa154SIlpo Järvinen return; 14021f0fa154SIlpo Järvinen 14031f0fa154SIlpo Järvinen xprt_write_space(xprt); 14041f0fa154SIlpo Järvinen } 14051f0fa154SIlpo Järvinen 14062a9e1cfaSTrond Myklebust /** 1407c7b2cae8SChuck Lever * xs_udp_write_space - callback invoked when socket buffer space 1408c7b2cae8SChuck Lever * becomes available 14099903cd1cSChuck Lever * @sk: socket whose state has changed 14109903cd1cSChuck Lever * 1411a246b010SChuck Lever * Called when more output buffer space is available for this socket. 1412a246b010SChuck Lever * We try not to wake our writers until they can make "significant" 1413c7b2cae8SChuck Lever * progress, otherwise we'll waste resources thrashing kernel_sendmsg 1414a246b010SChuck Lever * with a bunch of small requests. 1415a246b010SChuck Lever */ 1416c7b2cae8SChuck Lever static void xs_udp_write_space(struct sock *sk) 1417a246b010SChuck Lever { 1418f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1419c7b2cae8SChuck Lever 1420c7b2cae8SChuck Lever /* from net/core/sock.c:sock_def_write_space */ 14211f0fa154SIlpo Järvinen if (sock_writeable(sk)) 14221f0fa154SIlpo Järvinen xs_write_space(sk); 1423c7b2cae8SChuck Lever 1424f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1425c7b2cae8SChuck Lever } 1426c7b2cae8SChuck Lever 1427c7b2cae8SChuck Lever /** 1428c7b2cae8SChuck Lever * xs_tcp_write_space - callback invoked when socket buffer space 1429c7b2cae8SChuck Lever * becomes available 1430c7b2cae8SChuck Lever * @sk: socket whose state has changed 1431c7b2cae8SChuck Lever * 1432c7b2cae8SChuck Lever * Called when more output buffer space is available for this socket. 1433c7b2cae8SChuck Lever * We try not to wake our writers until they can make "significant" 1434c7b2cae8SChuck Lever * progress, otherwise we'll waste resources thrashing kernel_sendmsg 1435c7b2cae8SChuck Lever * with a bunch of small requests. 1436c7b2cae8SChuck Lever */ 1437c7b2cae8SChuck Lever static void xs_tcp_write_space(struct sock *sk) 1438c7b2cae8SChuck Lever { 1439f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1440c7b2cae8SChuck Lever 1441c7b2cae8SChuck Lever /* from net/core/stream.c:sk_stream_write_space */ 14421f0fa154SIlpo Järvinen if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk)) 14431f0fa154SIlpo Järvinen xs_write_space(sk); 1444c7b2cae8SChuck Lever 1445f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1446a246b010SChuck Lever } 1447a246b010SChuck Lever 1448470056c2SChuck Lever static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt) 1449a246b010SChuck Lever { 1450ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1451ee0ac0c2SChuck Lever struct sock *sk = transport->inet; 1452a246b010SChuck Lever 14537c6e066eSChuck Lever if (transport->rcvsize) { 1454a246b010SChuck Lever sk->sk_userlocks |= SOCK_RCVBUF_LOCK; 14557c6e066eSChuck Lever sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2; 1456a246b010SChuck Lever } 14577c6e066eSChuck Lever if (transport->sndsize) { 1458a246b010SChuck Lever sk->sk_userlocks |= SOCK_SNDBUF_LOCK; 14597c6e066eSChuck Lever sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2; 1460a246b010SChuck Lever sk->sk_write_space(sk); 1461a246b010SChuck Lever } 1462a246b010SChuck Lever } 1463a246b010SChuck Lever 146443118c29SChuck Lever /** 1465470056c2SChuck Lever * xs_udp_set_buffer_size - set send and receive limits 146643118c29SChuck Lever * @xprt: generic transport 1467470056c2SChuck Lever * @sndsize: requested size of send buffer, in bytes 1468470056c2SChuck Lever * @rcvsize: requested size of receive buffer, in bytes 146943118c29SChuck Lever * 1470470056c2SChuck Lever * Set socket send and receive buffer size limits. 147143118c29SChuck Lever */ 1472470056c2SChuck Lever static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize) 147343118c29SChuck Lever { 14747c6e066eSChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 14757c6e066eSChuck Lever 14767c6e066eSChuck Lever transport->sndsize = 0; 1477470056c2SChuck Lever if (sndsize) 14787c6e066eSChuck Lever transport->sndsize = sndsize + 1024; 14797c6e066eSChuck Lever transport->rcvsize = 0; 1480470056c2SChuck Lever if (rcvsize) 14817c6e066eSChuck Lever transport->rcvsize = rcvsize + 1024; 1482470056c2SChuck Lever 1483470056c2SChuck Lever xs_udp_do_set_buffer_size(xprt); 148443118c29SChuck Lever } 148543118c29SChuck Lever 148646c0ee8bSChuck Lever /** 148746c0ee8bSChuck Lever * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport 148846c0ee8bSChuck Lever * @task: task that timed out 148946c0ee8bSChuck Lever * 149046c0ee8bSChuck Lever * Adjust the congestion window after a retransmit timeout has occurred. 149146c0ee8bSChuck Lever */ 149246c0ee8bSChuck Lever static void xs_udp_timer(struct rpc_task *task) 149346c0ee8bSChuck Lever { 149446c0ee8bSChuck Lever xprt_adjust_cwnd(task, -ETIMEDOUT); 149546c0ee8bSChuck Lever } 149646c0ee8bSChuck Lever 1497b85d8806SChuck Lever static unsigned short xs_get_random_port(void) 1498b85d8806SChuck Lever { 1499b85d8806SChuck Lever unsigned short range = xprt_max_resvport - xprt_min_resvport; 1500b85d8806SChuck Lever unsigned short rand = (unsigned short) net_random() % range; 1501b85d8806SChuck Lever return rand + xprt_min_resvport; 1502b85d8806SChuck Lever } 1503b85d8806SChuck Lever 150492200412SChuck Lever /** 150592200412SChuck Lever * xs_set_port - reset the port number in the remote endpoint address 150692200412SChuck Lever * @xprt: generic transport 150792200412SChuck Lever * @port: new port number 150892200412SChuck Lever * 150992200412SChuck Lever */ 151092200412SChuck Lever static void xs_set_port(struct rpc_xprt *xprt, unsigned short port) 151192200412SChuck Lever { 151292200412SChuck Lever dprintk("RPC: setting port for xprt %p to %u\n", xprt, port); 1513c4efcb1dSChuck Lever 15149dc3b095SChuck Lever rpc_set_port(xs_addr(xprt), port); 15159dc3b095SChuck Lever xs_update_peer_port(xprt); 151692200412SChuck Lever } 151792200412SChuck Lever 15185d4ec932SPavel Emelyanov static unsigned short xs_get_srcport(struct sock_xprt *transport) 151967a391d7STrond Myklebust { 1520fbfffbd5SChuck Lever unsigned short port = transport->srcport; 152167a391d7STrond Myklebust 152267a391d7STrond Myklebust if (port == 0 && transport->xprt.resvport) 152367a391d7STrond Myklebust port = xs_get_random_port(); 152467a391d7STrond Myklebust return port; 152567a391d7STrond Myklebust } 152667a391d7STrond Myklebust 1527baaf4e48SPavel Emelyanov static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port) 152867a391d7STrond Myklebust { 1529fbfffbd5SChuck Lever if (transport->srcport != 0) 1530fbfffbd5SChuck Lever transport->srcport = 0; 153167a391d7STrond Myklebust if (!transport->xprt.resvport) 153267a391d7STrond Myklebust return 0; 153367a391d7STrond Myklebust if (port <= xprt_min_resvport || port > xprt_max_resvport) 153467a391d7STrond Myklebust return xprt_max_resvport; 153567a391d7STrond Myklebust return --port; 153667a391d7STrond Myklebust } 1537beb59b68SPavel Emelyanov static int xs_bind(struct sock_xprt *transport, struct socket *sock) 1538a246b010SChuck Lever { 1539beb59b68SPavel Emelyanov struct sockaddr_storage myaddr; 154067a391d7STrond Myklebust int err, nloop = 0; 15415d4ec932SPavel Emelyanov unsigned short port = xs_get_srcport(transport); 154267a391d7STrond Myklebust unsigned short last; 1543a246b010SChuck Lever 1544beb59b68SPavel Emelyanov memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen); 1545a246b010SChuck Lever do { 1546beb59b68SPavel Emelyanov rpc_set_port((struct sockaddr *)&myaddr, port); 1547e6242e92SSridhar Samudrala err = kernel_bind(sock, (struct sockaddr *)&myaddr, 1548beb59b68SPavel Emelyanov transport->xprt.addrlen); 154967a391d7STrond Myklebust if (port == 0) 1550d3bc9a1dSFrank van Maarseveen break; 1551a246b010SChuck Lever if (err == 0) { 1552fbfffbd5SChuck Lever transport->srcport = port; 1553d3bc9a1dSFrank van Maarseveen break; 1554a246b010SChuck Lever } 155567a391d7STrond Myklebust last = port; 1556baaf4e48SPavel Emelyanov port = xs_next_srcport(transport, port); 155767a391d7STrond Myklebust if (port > last) 155867a391d7STrond Myklebust nloop++; 155967a391d7STrond Myklebust } while (err == -EADDRINUSE && nloop != 2); 1560beb59b68SPavel Emelyanov 15614232e863SChuck Lever if (myaddr.ss_family == AF_INET) 1562beb59b68SPavel Emelyanov dprintk("RPC: %s %pI4:%u: %s (%d)\n", __func__, 1563beb59b68SPavel Emelyanov &((struct sockaddr_in *)&myaddr)->sin_addr, 1564beb59b68SPavel Emelyanov port, err ? "failed" : "ok", err); 1565beb59b68SPavel Emelyanov else 1566beb59b68SPavel Emelyanov dprintk("RPC: %s %pI6:%u: %s (%d)\n", __func__, 1567beb59b68SPavel Emelyanov &((struct sockaddr_in6 *)&myaddr)->sin6_addr, 15687dc753f0SChuck Lever port, err ? "failed" : "ok", err); 1569a246b010SChuck Lever return err; 1570a246b010SChuck Lever } 1571a246b010SChuck Lever 1572a246b010SChuck Lever 1573ed07536eSPeter Zijlstra #ifdef CONFIG_DEBUG_LOCK_ALLOC 1574ed07536eSPeter Zijlstra static struct lock_class_key xs_key[2]; 1575ed07536eSPeter Zijlstra static struct lock_class_key xs_slock_key[2]; 1576ed07536eSPeter Zijlstra 15778945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock) 1578ed07536eSPeter Zijlstra { 1579ed07536eSPeter Zijlstra struct sock *sk = sock->sk; 15808945ee5eSChuck Lever 158102b3d346SJohn Heffner BUG_ON(sock_owned_by_user(sk)); 15828945ee5eSChuck Lever sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC", 15838945ee5eSChuck Lever &xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]); 1584ed07536eSPeter Zijlstra } 15858945ee5eSChuck Lever 15868945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock) 15878945ee5eSChuck Lever { 15888945ee5eSChuck Lever struct sock *sk = sock->sk; 15898945ee5eSChuck Lever 1590f4921affSLinus Torvalds BUG_ON(sock_owned_by_user(sk)); 15918945ee5eSChuck Lever sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC", 15928945ee5eSChuck Lever &xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]); 1593ed07536eSPeter Zijlstra } 15946bc9638aSPavel Emelyanov 15956bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock) 15966bc9638aSPavel Emelyanov { 15974232e863SChuck Lever switch (family) { 15984232e863SChuck Lever case AF_INET: 15996bc9638aSPavel Emelyanov xs_reclassify_socket4(sock); 16004232e863SChuck Lever break; 16014232e863SChuck Lever case AF_INET6: 16026bc9638aSPavel Emelyanov xs_reclassify_socket6(sock); 16034232e863SChuck Lever break; 16044232e863SChuck Lever } 16056bc9638aSPavel Emelyanov } 1606ed07536eSPeter Zijlstra #else 16078945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock) 16088945ee5eSChuck Lever { 16098945ee5eSChuck Lever } 16108945ee5eSChuck Lever 16118945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock) 1612ed07536eSPeter Zijlstra { 1613ed07536eSPeter Zijlstra } 16146bc9638aSPavel Emelyanov 16156bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock) 16166bc9638aSPavel Emelyanov { 16176bc9638aSPavel Emelyanov } 1618ed07536eSPeter Zijlstra #endif 1619ed07536eSPeter Zijlstra 16206bc9638aSPavel Emelyanov static struct socket *xs_create_sock(struct rpc_xprt *xprt, 16216bc9638aSPavel Emelyanov struct sock_xprt *transport, int family, int type, int protocol) 162222f79326SPavel Emelyanov { 162322f79326SPavel Emelyanov struct socket *sock; 162422f79326SPavel Emelyanov int err; 162522f79326SPavel Emelyanov 16266bc9638aSPavel Emelyanov err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1); 162722f79326SPavel Emelyanov if (err < 0) { 162822f79326SPavel Emelyanov dprintk("RPC: can't create %d transport socket (%d).\n", 162922f79326SPavel Emelyanov protocol, -err); 163022f79326SPavel Emelyanov goto out; 163122f79326SPavel Emelyanov } 16326bc9638aSPavel Emelyanov xs_reclassify_socket(family, sock); 163322f79326SPavel Emelyanov 1634beb59b68SPavel Emelyanov if (xs_bind(transport, sock)) { 163522f79326SPavel Emelyanov sock_release(sock); 163622f79326SPavel Emelyanov goto out; 163722f79326SPavel Emelyanov } 163822f79326SPavel Emelyanov 163922f79326SPavel Emelyanov return sock; 164022f79326SPavel Emelyanov out: 164122f79326SPavel Emelyanov return ERR_PTR(err); 164222f79326SPavel Emelyanov } 164322f79326SPavel Emelyanov 164416be2d20SChuck Lever static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock) 1645a246b010SChuck Lever { 164616be2d20SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1647edb267a6SChuck Lever 1648ee0ac0c2SChuck Lever if (!transport->inet) { 1649b0d93ad5SChuck Lever struct sock *sk = sock->sk; 1650b0d93ad5SChuck Lever 1651b0d93ad5SChuck Lever write_lock_bh(&sk->sk_callback_lock); 1652b0d93ad5SChuck Lever 16532a9e1cfaSTrond Myklebust xs_save_old_callbacks(transport, sk); 16542a9e1cfaSTrond Myklebust 1655b0d93ad5SChuck Lever sk->sk_user_data = xprt; 1656b0d93ad5SChuck Lever sk->sk_data_ready = xs_udp_data_ready; 1657b0d93ad5SChuck Lever sk->sk_write_space = xs_udp_write_space; 1658482f32e6STrond Myklebust sk->sk_error_report = xs_error_report; 1659b0d93ad5SChuck Lever sk->sk_no_check = UDP_CSUM_NORCV; 1660b079fa7bSTrond Myklebust sk->sk_allocation = GFP_ATOMIC; 1661b0d93ad5SChuck Lever 1662b0d93ad5SChuck Lever xprt_set_connected(xprt); 1663b0d93ad5SChuck Lever 1664b0d93ad5SChuck Lever /* Reset to new socket */ 1665ee0ac0c2SChuck Lever transport->sock = sock; 1666ee0ac0c2SChuck Lever transport->inet = sk; 1667b0d93ad5SChuck Lever 1668b0d93ad5SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 1669b0d93ad5SChuck Lever } 1670470056c2SChuck Lever xs_udp_do_set_buffer_size(xprt); 167116be2d20SChuck Lever } 167216be2d20SChuck Lever 16738c14ff2aSPavel Emelyanov static void xs_udp_setup_socket(struct work_struct *work) 1674a246b010SChuck Lever { 1675a246b010SChuck Lever struct sock_xprt *transport = 1676a246b010SChuck Lever container_of(work, struct sock_xprt, connect_worker.work); 1677a246b010SChuck Lever struct rpc_xprt *xprt = &transport->xprt; 1678a246b010SChuck Lever struct socket *sock = transport->sock; 1679b65c0310SPavel Emelyanov int status = -EIO; 1680a246b010SChuck Lever 168101d37c42STrond Myklebust if (xprt->shutdown) 16829903cd1cSChuck Lever goto out; 16839903cd1cSChuck Lever 1684a246b010SChuck Lever /* Start by resetting any existing state */ 1685fe315e76SChuck Lever xs_reset_transport(transport); 16868c14ff2aSPavel Emelyanov sock = xs_create_sock(xprt, transport, 16878c14ff2aSPavel Emelyanov xs_addr(xprt)->sa_family, SOCK_DGRAM, IPPROTO_UDP); 1688b65c0310SPavel Emelyanov if (IS_ERR(sock)) 1689a246b010SChuck Lever goto out; 169068e220bdSChuck Lever 1691c740eff8SChuck Lever dprintk("RPC: worker connecting xprt %p via %s to " 1692c740eff8SChuck Lever "%s (port %s)\n", xprt, 1693c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO], 1694c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 1695c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT]); 169668e220bdSChuck Lever 169768e220bdSChuck Lever xs_udp_finish_connecting(xprt, sock); 1698a246b010SChuck Lever status = 0; 1699b0d93ad5SChuck Lever out: 1700b0d93ad5SChuck Lever xprt_clear_connecting(xprt); 17017d1e8255STrond Myklebust xprt_wake_pending_tasks(xprt, status); 1702b0d93ad5SChuck Lever } 1703b0d93ad5SChuck Lever 17043167e12cSChuck Lever /* 17053167e12cSChuck Lever * We need to preserve the port number so the reply cache on the server can 17063167e12cSChuck Lever * find our cached RPC replies when we get around to reconnecting. 17073167e12cSChuck Lever */ 170858dddac9SPavel Emelyanov static void xs_abort_connection(struct sock_xprt *transport) 17093167e12cSChuck Lever { 17103167e12cSChuck Lever int result; 17113167e12cSChuck Lever struct sockaddr any; 17123167e12cSChuck Lever 171358dddac9SPavel Emelyanov dprintk("RPC: disconnecting xprt %p to reuse port\n", transport); 17143167e12cSChuck Lever 17153167e12cSChuck Lever /* 17163167e12cSChuck Lever * Disconnect the transport socket by doing a connect operation 17173167e12cSChuck Lever * with AF_UNSPEC. This should return immediately... 17183167e12cSChuck Lever */ 17193167e12cSChuck Lever memset(&any, 0, sizeof(any)); 17203167e12cSChuck Lever any.sa_family = AF_UNSPEC; 1721ee0ac0c2SChuck Lever result = kernel_connect(transport->sock, &any, sizeof(any), 0); 17227d1e8255STrond Myklebust if (!result) 172358dddac9SPavel Emelyanov xs_sock_mark_closed(&transport->xprt); 17247d1e8255STrond Myklebust else 17253167e12cSChuck Lever dprintk("RPC: AF_UNSPEC connect return code %d\n", 17263167e12cSChuck Lever result); 17273167e12cSChuck Lever } 17283167e12cSChuck Lever 172958dddac9SPavel Emelyanov static void xs_tcp_reuse_connection(struct sock_xprt *transport) 173040d2549dSTrond Myklebust { 173140d2549dSTrond Myklebust unsigned int state = transport->inet->sk_state; 173240d2549dSTrond Myklebust 1733669502ffSAndy Chittenden if (state == TCP_CLOSE && transport->sock->state == SS_UNCONNECTED) { 1734669502ffSAndy Chittenden /* we don't need to abort the connection if the socket 1735669502ffSAndy Chittenden * hasn't undergone a shutdown 1736669502ffSAndy Chittenden */ 1737669502ffSAndy Chittenden if (transport->inet->sk_shutdown == 0) 173840d2549dSTrond Myklebust return; 1739669502ffSAndy Chittenden dprintk("RPC: %s: TCP_CLOSEd and sk_shutdown set to %d\n", 1740669502ffSAndy Chittenden __func__, transport->inet->sk_shutdown); 1741669502ffSAndy Chittenden } 1742669502ffSAndy Chittenden if ((1 << state) & (TCPF_ESTABLISHED|TCPF_SYN_SENT)) { 1743669502ffSAndy Chittenden /* we don't need to abort the connection if the socket 1744669502ffSAndy Chittenden * hasn't undergone a shutdown 1745669502ffSAndy Chittenden */ 1746669502ffSAndy Chittenden if (transport->inet->sk_shutdown == 0) 174740d2549dSTrond Myklebust return; 1748669502ffSAndy Chittenden dprintk("RPC: %s: ESTABLISHED/SYN_SENT " 1749669502ffSAndy Chittenden "sk_shutdown set to %d\n", 1750669502ffSAndy Chittenden __func__, transport->inet->sk_shutdown); 1751669502ffSAndy Chittenden } 175258dddac9SPavel Emelyanov xs_abort_connection(transport); 175340d2549dSTrond Myklebust } 175440d2549dSTrond Myklebust 175516be2d20SChuck Lever static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock) 1756b0d93ad5SChuck Lever { 175716be2d20SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1758edb267a6SChuck Lever 1759ee0ac0c2SChuck Lever if (!transport->inet) { 1760b0d93ad5SChuck Lever struct sock *sk = sock->sk; 1761b0d93ad5SChuck Lever 1762b0d93ad5SChuck Lever write_lock_bh(&sk->sk_callback_lock); 1763b0d93ad5SChuck Lever 17642a9e1cfaSTrond Myklebust xs_save_old_callbacks(transport, sk); 17652a9e1cfaSTrond Myklebust 1766b0d93ad5SChuck Lever sk->sk_user_data = xprt; 1767b0d93ad5SChuck Lever sk->sk_data_ready = xs_tcp_data_ready; 1768b0d93ad5SChuck Lever sk->sk_state_change = xs_tcp_state_change; 1769b0d93ad5SChuck Lever sk->sk_write_space = xs_tcp_write_space; 1770482f32e6STrond Myklebust sk->sk_error_report = xs_error_report; 1771b079fa7bSTrond Myklebust sk->sk_allocation = GFP_ATOMIC; 17723167e12cSChuck Lever 17733167e12cSChuck Lever /* socket options */ 17743167e12cSChuck Lever sk->sk_userlocks |= SOCK_BINDPORT_LOCK; 17753167e12cSChuck Lever sock_reset_flag(sk, SOCK_LINGER); 17763167e12cSChuck Lever tcp_sk(sk)->linger2 = 0; 17773167e12cSChuck Lever tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF; 1778b0d93ad5SChuck Lever 1779b0d93ad5SChuck Lever xprt_clear_connected(xprt); 1780b0d93ad5SChuck Lever 1781b0d93ad5SChuck Lever /* Reset to new socket */ 1782ee0ac0c2SChuck Lever transport->sock = sock; 1783ee0ac0c2SChuck Lever transport->inet = sk; 1784b0d93ad5SChuck Lever 1785b0d93ad5SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 1786b0d93ad5SChuck Lever } 1787b0d93ad5SChuck Lever 178801d37c42STrond Myklebust if (!xprt_bound(xprt)) 178901d37c42STrond Myklebust return -ENOTCONN; 179001d37c42STrond Myklebust 1791b0d93ad5SChuck Lever /* Tell the socket layer to start connecting... */ 1792262ca07dSChuck Lever xprt->stat.connect_count++; 1793262ca07dSChuck Lever xprt->stat.connect_start = jiffies; 179495392c59SChuck Lever return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK); 179516be2d20SChuck Lever } 179616be2d20SChuck Lever 179716be2d20SChuck Lever /** 1798b61d59ffSTrond Myklebust * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint 1799b61d59ffSTrond Myklebust * @xprt: RPC transport to connect 1800b61d59ffSTrond Myklebust * @transport: socket transport to connect 1801b61d59ffSTrond Myklebust * @create_sock: function to create a socket of the correct type 180216be2d20SChuck Lever * 180316be2d20SChuck Lever * Invoked by a work queue tasklet. 180416be2d20SChuck Lever */ 1805cdd518d5SPavel Emelyanov static void xs_tcp_setup_socket(struct work_struct *work) 180616be2d20SChuck Lever { 1807cdd518d5SPavel Emelyanov struct sock_xprt *transport = 1808cdd518d5SPavel Emelyanov container_of(work, struct sock_xprt, connect_worker.work); 180916be2d20SChuck Lever struct socket *sock = transport->sock; 1810a9f5f0f7SPavel Emelyanov struct rpc_xprt *xprt = &transport->xprt; 1811b61d59ffSTrond Myklebust int status = -EIO; 181216be2d20SChuck Lever 181301d37c42STrond Myklebust if (xprt->shutdown) 181416be2d20SChuck Lever goto out; 181516be2d20SChuck Lever 181616be2d20SChuck Lever if (!sock) { 18177d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 1818cdd518d5SPavel Emelyanov sock = xs_create_sock(xprt, transport, 1819cdd518d5SPavel Emelyanov xs_addr(xprt)->sa_family, SOCK_STREAM, IPPROTO_TCP); 1820b61d59ffSTrond Myklebust if (IS_ERR(sock)) { 1821b61d59ffSTrond Myklebust status = PTR_ERR(sock); 182216be2d20SChuck Lever goto out; 182316be2d20SChuck Lever } 18247d1e8255STrond Myklebust } else { 18257d1e8255STrond Myklebust int abort_and_exit; 18267d1e8255STrond Myklebust 18277d1e8255STrond Myklebust abort_and_exit = test_and_clear_bit(XPRT_CONNECTION_ABORT, 18287d1e8255STrond Myklebust &xprt->state); 182916be2d20SChuck Lever /* "close" the socket, preserving the local port */ 183058dddac9SPavel Emelyanov xs_tcp_reuse_connection(transport); 183116be2d20SChuck Lever 18327d1e8255STrond Myklebust if (abort_and_exit) 18337d1e8255STrond Myklebust goto out_eagain; 18347d1e8255STrond Myklebust } 18357d1e8255STrond Myklebust 1836c740eff8SChuck Lever dprintk("RPC: worker connecting xprt %p via %s to " 1837c740eff8SChuck Lever "%s (port %s)\n", xprt, 1838c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO], 1839c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 1840c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT]); 184116be2d20SChuck Lever 184216be2d20SChuck Lever status = xs_tcp_finish_connecting(xprt, sock); 1843a246b010SChuck Lever dprintk("RPC: %p connect status %d connected %d sock state %d\n", 184446121cf7SChuck Lever xprt, -status, xprt_connected(xprt), 184546121cf7SChuck Lever sock->sk->sk_state); 1846a246b010SChuck Lever switch (status) { 1847f75e6745STrond Myklebust default: 1848f75e6745STrond Myklebust printk("%s: connect returned unhandled error %d\n", 1849f75e6745STrond Myklebust __func__, status); 1850f75e6745STrond Myklebust case -EADDRNOTAVAIL: 1851f75e6745STrond Myklebust /* We're probably in TIME_WAIT. Get rid of existing socket, 1852f75e6745STrond Myklebust * and retry 1853f75e6745STrond Myklebust */ 1854f75e6745STrond Myklebust set_bit(XPRT_CONNECTION_CLOSE, &xprt->state); 1855f75e6745STrond Myklebust xprt_force_disconnect(xprt); 185688b5ed73STrond Myklebust break; 18578a2cec29STrond Myklebust case -ECONNREFUSED: 18588a2cec29STrond Myklebust case -ECONNRESET: 18598a2cec29STrond Myklebust case -ENETUNREACH: 18608a2cec29STrond Myklebust /* retry with existing socket, after a delay */ 18612a491991STrond Myklebust case 0: 1862a246b010SChuck Lever case -EINPROGRESS: 1863a246b010SChuck Lever case -EALREADY: 18647d1e8255STrond Myklebust xprt_clear_connecting(xprt); 18657d1e8255STrond Myklebust return; 18669fcfe0c8STrond Myklebust case -EINVAL: 18679fcfe0c8STrond Myklebust /* Happens, for instance, if the user specified a link 18689fcfe0c8STrond Myklebust * local IPv6 address without a scope-id. 18699fcfe0c8STrond Myklebust */ 18709fcfe0c8STrond Myklebust goto out; 18718a2cec29STrond Myklebust } 18727d1e8255STrond Myklebust out_eagain: 18732a491991STrond Myklebust status = -EAGAIN; 1874a246b010SChuck Lever out: 18752226feb6SChuck Lever xprt_clear_connecting(xprt); 18767d1e8255STrond Myklebust xprt_wake_pending_tasks(xprt, status); 1877a246b010SChuck Lever } 1878a246b010SChuck Lever 187968e220bdSChuck Lever /** 18809903cd1cSChuck Lever * xs_connect - connect a socket to a remote endpoint 18819903cd1cSChuck Lever * @task: address of RPC task that manages state of connect request 18829903cd1cSChuck Lever * 18839903cd1cSChuck Lever * TCP: If the remote end dropped the connection, delay reconnecting. 188403bf4b70SChuck Lever * 188503bf4b70SChuck Lever * UDP socket connects are synchronous, but we use a work queue anyway 188603bf4b70SChuck Lever * to guarantee that even unprivileged user processes can set up a 188703bf4b70SChuck Lever * socket on a privileged port. 188803bf4b70SChuck Lever * 188903bf4b70SChuck Lever * If a UDP socket connect fails, the delay behavior here prevents 189003bf4b70SChuck Lever * retry floods (hard mounts). 18919903cd1cSChuck Lever */ 18929903cd1cSChuck Lever static void xs_connect(struct rpc_task *task) 1893a246b010SChuck Lever { 1894a246b010SChuck Lever struct rpc_xprt *xprt = task->tk_xprt; 1895ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1896a246b010SChuck Lever 189709a21c41SChuck Lever if (transport->sock != NULL && !RPC_IS_SOFTCONN(task)) { 189846121cf7SChuck Lever dprintk("RPC: xs_connect delayed xprt %p for %lu " 189946121cf7SChuck Lever "seconds\n", 190003bf4b70SChuck Lever xprt, xprt->reestablish_timeout / HZ); 1901c1384c9cSTrond Myklebust queue_delayed_work(rpciod_workqueue, 1902c1384c9cSTrond Myklebust &transport->connect_worker, 190303bf4b70SChuck Lever xprt->reestablish_timeout); 190403bf4b70SChuck Lever xprt->reestablish_timeout <<= 1; 190561d0a8e6SNeil Brown if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO) 190661d0a8e6SNeil Brown xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 190703bf4b70SChuck Lever if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO) 190803bf4b70SChuck Lever xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO; 19099903cd1cSChuck Lever } else { 19109903cd1cSChuck Lever dprintk("RPC: xs_connect scheduled xprt %p\n", xprt); 1911c1384c9cSTrond Myklebust queue_delayed_work(rpciod_workqueue, 1912c1384c9cSTrond Myklebust &transport->connect_worker, 0); 1913a246b010SChuck Lever } 1914a246b010SChuck Lever } 1915a246b010SChuck Lever 1916262ca07dSChuck Lever /** 1917262ca07dSChuck Lever * xs_udp_print_stats - display UDP socket-specifc stats 1918262ca07dSChuck Lever * @xprt: rpc_xprt struct containing statistics 1919262ca07dSChuck Lever * @seq: output file 1920262ca07dSChuck Lever * 1921262ca07dSChuck Lever */ 1922262ca07dSChuck Lever static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq) 1923262ca07dSChuck Lever { 1924c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1925c8475461SChuck Lever 1926262ca07dSChuck Lever seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n", 1927fbfffbd5SChuck Lever transport->srcport, 1928262ca07dSChuck Lever xprt->stat.bind_count, 1929262ca07dSChuck Lever xprt->stat.sends, 1930262ca07dSChuck Lever xprt->stat.recvs, 1931262ca07dSChuck Lever xprt->stat.bad_xids, 1932262ca07dSChuck Lever xprt->stat.req_u, 1933262ca07dSChuck Lever xprt->stat.bklog_u); 1934262ca07dSChuck Lever } 1935262ca07dSChuck Lever 1936262ca07dSChuck Lever /** 1937262ca07dSChuck Lever * xs_tcp_print_stats - display TCP socket-specifc stats 1938262ca07dSChuck Lever * @xprt: rpc_xprt struct containing statistics 1939262ca07dSChuck Lever * @seq: output file 1940262ca07dSChuck Lever * 1941262ca07dSChuck Lever */ 1942262ca07dSChuck Lever static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq) 1943262ca07dSChuck Lever { 1944c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1945262ca07dSChuck Lever long idle_time = 0; 1946262ca07dSChuck Lever 1947262ca07dSChuck Lever if (xprt_connected(xprt)) 1948262ca07dSChuck Lever idle_time = (long)(jiffies - xprt->last_used) / HZ; 1949262ca07dSChuck Lever 1950262ca07dSChuck Lever seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n", 1951fbfffbd5SChuck Lever transport->srcport, 1952262ca07dSChuck Lever xprt->stat.bind_count, 1953262ca07dSChuck Lever xprt->stat.connect_count, 1954262ca07dSChuck Lever xprt->stat.connect_time, 1955262ca07dSChuck Lever idle_time, 1956262ca07dSChuck Lever xprt->stat.sends, 1957262ca07dSChuck Lever xprt->stat.recvs, 1958262ca07dSChuck Lever xprt->stat.bad_xids, 1959262ca07dSChuck Lever xprt->stat.req_u, 1960262ca07dSChuck Lever xprt->stat.bklog_u); 1961262ca07dSChuck Lever } 1962262ca07dSChuck Lever 19634cfc7e60SRahul Iyer /* 19644cfc7e60SRahul Iyer * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason 19654cfc7e60SRahul Iyer * we allocate pages instead doing a kmalloc like rpc_malloc is because we want 19664cfc7e60SRahul Iyer * to use the server side send routines. 19674cfc7e60SRahul Iyer */ 19685a51f13aSH Hartley Sweeten static void *bc_malloc(struct rpc_task *task, size_t size) 19694cfc7e60SRahul Iyer { 19704cfc7e60SRahul Iyer struct page *page; 19714cfc7e60SRahul Iyer struct rpc_buffer *buf; 19724cfc7e60SRahul Iyer 19734cfc7e60SRahul Iyer BUG_ON(size > PAGE_SIZE - sizeof(struct rpc_buffer)); 19744cfc7e60SRahul Iyer page = alloc_page(GFP_KERNEL); 19754cfc7e60SRahul Iyer 19764cfc7e60SRahul Iyer if (!page) 19774cfc7e60SRahul Iyer return NULL; 19784cfc7e60SRahul Iyer 19794cfc7e60SRahul Iyer buf = page_address(page); 19804cfc7e60SRahul Iyer buf->len = PAGE_SIZE; 19814cfc7e60SRahul Iyer 19824cfc7e60SRahul Iyer return buf->data; 19834cfc7e60SRahul Iyer } 19844cfc7e60SRahul Iyer 19854cfc7e60SRahul Iyer /* 19864cfc7e60SRahul Iyer * Free the space allocated in the bc_alloc routine 19874cfc7e60SRahul Iyer */ 19885a51f13aSH Hartley Sweeten static void bc_free(void *buffer) 19894cfc7e60SRahul Iyer { 19904cfc7e60SRahul Iyer struct rpc_buffer *buf; 19914cfc7e60SRahul Iyer 19924cfc7e60SRahul Iyer if (!buffer) 19934cfc7e60SRahul Iyer return; 19944cfc7e60SRahul Iyer 19954cfc7e60SRahul Iyer buf = container_of(buffer, struct rpc_buffer, data); 19964cfc7e60SRahul Iyer free_page((unsigned long)buf); 19974cfc7e60SRahul Iyer } 19984cfc7e60SRahul Iyer 19994cfc7e60SRahul Iyer /* 20004cfc7e60SRahul Iyer * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex 20014cfc7e60SRahul Iyer * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request. 20024cfc7e60SRahul Iyer */ 20034cfc7e60SRahul Iyer static int bc_sendto(struct rpc_rqst *req) 20044cfc7e60SRahul Iyer { 20054cfc7e60SRahul Iyer int len; 20064cfc7e60SRahul Iyer struct xdr_buf *xbufp = &req->rq_snd_buf; 20074cfc7e60SRahul Iyer struct rpc_xprt *xprt = req->rq_xprt; 20084cfc7e60SRahul Iyer struct sock_xprt *transport = 20094cfc7e60SRahul Iyer container_of(xprt, struct sock_xprt, xprt); 20104cfc7e60SRahul Iyer struct socket *sock = transport->sock; 20114cfc7e60SRahul Iyer unsigned long headoff; 20124cfc7e60SRahul Iyer unsigned long tailoff; 20134cfc7e60SRahul Iyer 20144cfc7e60SRahul Iyer /* 20154cfc7e60SRahul Iyer * Set up the rpc header and record marker stuff 20164cfc7e60SRahul Iyer */ 20174cfc7e60SRahul Iyer xs_encode_tcp_record_marker(xbufp); 20184cfc7e60SRahul Iyer 20194cfc7e60SRahul Iyer tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK; 20204cfc7e60SRahul Iyer headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK; 20214cfc7e60SRahul Iyer len = svc_send_common(sock, xbufp, 20224cfc7e60SRahul Iyer virt_to_page(xbufp->head[0].iov_base), headoff, 20234cfc7e60SRahul Iyer xbufp->tail[0].iov_base, tailoff); 20244cfc7e60SRahul Iyer 20254cfc7e60SRahul Iyer if (len != xbufp->len) { 20264cfc7e60SRahul Iyer printk(KERN_NOTICE "Error sending entire callback!\n"); 20274cfc7e60SRahul Iyer len = -EAGAIN; 20284cfc7e60SRahul Iyer } 20294cfc7e60SRahul Iyer 20304cfc7e60SRahul Iyer return len; 20314cfc7e60SRahul Iyer } 20324cfc7e60SRahul Iyer 20334cfc7e60SRahul Iyer /* 20344cfc7e60SRahul Iyer * The send routine. Borrows from svc_send 20354cfc7e60SRahul Iyer */ 20364cfc7e60SRahul Iyer static int bc_send_request(struct rpc_task *task) 20374cfc7e60SRahul Iyer { 20384cfc7e60SRahul Iyer struct rpc_rqst *req = task->tk_rqstp; 20394cfc7e60SRahul Iyer struct svc_xprt *xprt; 20404cfc7e60SRahul Iyer struct svc_sock *svsk; 20414cfc7e60SRahul Iyer u32 len; 20424cfc7e60SRahul Iyer 20434cfc7e60SRahul Iyer dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid)); 20444cfc7e60SRahul Iyer /* 20454cfc7e60SRahul Iyer * Get the server socket associated with this callback xprt 20464cfc7e60SRahul Iyer */ 20474cfc7e60SRahul Iyer xprt = req->rq_xprt->bc_xprt; 20484cfc7e60SRahul Iyer svsk = container_of(xprt, struct svc_sock, sk_xprt); 20494cfc7e60SRahul Iyer 20504cfc7e60SRahul Iyer /* 20514cfc7e60SRahul Iyer * Grab the mutex to serialize data as the connection is shared 20524cfc7e60SRahul Iyer * with the fore channel 20534cfc7e60SRahul Iyer */ 20544cfc7e60SRahul Iyer if (!mutex_trylock(&xprt->xpt_mutex)) { 20554cfc7e60SRahul Iyer rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL); 20564cfc7e60SRahul Iyer if (!mutex_trylock(&xprt->xpt_mutex)) 20574cfc7e60SRahul Iyer return -EAGAIN; 20584cfc7e60SRahul Iyer rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task); 20594cfc7e60SRahul Iyer } 20604cfc7e60SRahul Iyer if (test_bit(XPT_DEAD, &xprt->xpt_flags)) 20614cfc7e60SRahul Iyer len = -ENOTCONN; 20624cfc7e60SRahul Iyer else 20634cfc7e60SRahul Iyer len = bc_sendto(req); 20644cfc7e60SRahul Iyer mutex_unlock(&xprt->xpt_mutex); 20654cfc7e60SRahul Iyer 20664cfc7e60SRahul Iyer if (len > 0) 20674cfc7e60SRahul Iyer len = 0; 20684cfc7e60SRahul Iyer 20694cfc7e60SRahul Iyer return len; 20704cfc7e60SRahul Iyer } 20714cfc7e60SRahul Iyer 20724cfc7e60SRahul Iyer /* 20734cfc7e60SRahul Iyer * The close routine. Since this is client initiated, we do nothing 20744cfc7e60SRahul Iyer */ 20754cfc7e60SRahul Iyer 20764cfc7e60SRahul Iyer static void bc_close(struct rpc_xprt *xprt) 20774cfc7e60SRahul Iyer { 20784cfc7e60SRahul Iyer } 20794cfc7e60SRahul Iyer 20804cfc7e60SRahul Iyer /* 20814cfc7e60SRahul Iyer * The xprt destroy routine. Again, because this connection is client 20824cfc7e60SRahul Iyer * initiated, we do nothing 20834cfc7e60SRahul Iyer */ 20844cfc7e60SRahul Iyer 20854cfc7e60SRahul Iyer static void bc_destroy(struct rpc_xprt *xprt) 20864cfc7e60SRahul Iyer { 20874cfc7e60SRahul Iyer } 20884cfc7e60SRahul Iyer 2089262965f5SChuck Lever static struct rpc_xprt_ops xs_udp_ops = { 209043118c29SChuck Lever .set_buffer_size = xs_udp_set_buffer_size, 209112a80469SChuck Lever .reserve_xprt = xprt_reserve_xprt_cong, 209249e9a890SChuck Lever .release_xprt = xprt_release_xprt_cong, 209345160d62SChuck Lever .rpcbind = rpcb_getport_async, 209492200412SChuck Lever .set_port = xs_set_port, 20959903cd1cSChuck Lever .connect = xs_connect, 209602107148SChuck Lever .buf_alloc = rpc_malloc, 209702107148SChuck Lever .buf_free = rpc_free, 2098262965f5SChuck Lever .send_request = xs_udp_send_request, 2099fe3aca29SChuck Lever .set_retrans_timeout = xprt_set_retrans_timeout_rtt, 210046c0ee8bSChuck Lever .timer = xs_udp_timer, 2101a58dd398SChuck Lever .release_request = xprt_release_rqst_cong, 2102262965f5SChuck Lever .close = xs_close, 2103262965f5SChuck Lever .destroy = xs_destroy, 2104262ca07dSChuck Lever .print_stats = xs_udp_print_stats, 2105262965f5SChuck Lever }; 2106262965f5SChuck Lever 2107262965f5SChuck Lever static struct rpc_xprt_ops xs_tcp_ops = { 210812a80469SChuck Lever .reserve_xprt = xprt_reserve_xprt, 2109e0ab53deSTrond Myklebust .release_xprt = xs_tcp_release_xprt, 211045160d62SChuck Lever .rpcbind = rpcb_getport_async, 211192200412SChuck Lever .set_port = xs_set_port, 21120b9e7943STrond Myklebust .connect = xs_connect, 211302107148SChuck Lever .buf_alloc = rpc_malloc, 211402107148SChuck Lever .buf_free = rpc_free, 2115262965f5SChuck Lever .send_request = xs_tcp_send_request, 2116fe3aca29SChuck Lever .set_retrans_timeout = xprt_set_retrans_timeout_def, 2117f75e6745STrond Myklebust .close = xs_tcp_close, 21189903cd1cSChuck Lever .destroy = xs_destroy, 2119262ca07dSChuck Lever .print_stats = xs_tcp_print_stats, 2120a246b010SChuck Lever }; 2121a246b010SChuck Lever 21224cfc7e60SRahul Iyer /* 21234cfc7e60SRahul Iyer * The rpc_xprt_ops for the server backchannel 21244cfc7e60SRahul Iyer */ 21254cfc7e60SRahul Iyer 21264cfc7e60SRahul Iyer static struct rpc_xprt_ops bc_tcp_ops = { 21274cfc7e60SRahul Iyer .reserve_xprt = xprt_reserve_xprt, 21284cfc7e60SRahul Iyer .release_xprt = xprt_release_xprt, 21294cfc7e60SRahul Iyer .buf_alloc = bc_malloc, 21304cfc7e60SRahul Iyer .buf_free = bc_free, 21314cfc7e60SRahul Iyer .send_request = bc_send_request, 21324cfc7e60SRahul Iyer .set_retrans_timeout = xprt_set_retrans_timeout_def, 21334cfc7e60SRahul Iyer .close = bc_close, 21344cfc7e60SRahul Iyer .destroy = bc_destroy, 21354cfc7e60SRahul Iyer .print_stats = xs_tcp_print_stats, 21364cfc7e60SRahul Iyer }; 21374cfc7e60SRahul Iyer 213892476850SChuck Lever static int xs_init_anyaddr(const int family, struct sockaddr *sap) 213992476850SChuck Lever { 214092476850SChuck Lever static const struct sockaddr_in sin = { 214192476850SChuck Lever .sin_family = AF_INET, 214292476850SChuck Lever .sin_addr.s_addr = htonl(INADDR_ANY), 214392476850SChuck Lever }; 214492476850SChuck Lever static const struct sockaddr_in6 sin6 = { 214592476850SChuck Lever .sin6_family = AF_INET6, 214692476850SChuck Lever .sin6_addr = IN6ADDR_ANY_INIT, 214792476850SChuck Lever }; 214892476850SChuck Lever 214992476850SChuck Lever switch (family) { 215092476850SChuck Lever case AF_INET: 215192476850SChuck Lever memcpy(sap, &sin, sizeof(sin)); 215292476850SChuck Lever break; 215392476850SChuck Lever case AF_INET6: 215492476850SChuck Lever memcpy(sap, &sin6, sizeof(sin6)); 215592476850SChuck Lever break; 215692476850SChuck Lever default: 215792476850SChuck Lever dprintk("RPC: %s: Bad address family\n", __func__); 215892476850SChuck Lever return -EAFNOSUPPORT; 215992476850SChuck Lever } 216092476850SChuck Lever return 0; 216192476850SChuck Lever } 216292476850SChuck Lever 21633c341b0bS\"Talpey, Thomas\ static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args, 2164bc25571eS\"Talpey, Thomas\ unsigned int slot_table_size) 2165c8541ecdSChuck Lever { 2166c8541ecdSChuck Lever struct rpc_xprt *xprt; 2167ffc2e518SChuck Lever struct sock_xprt *new; 2168c8541ecdSChuck Lever 216996802a09SFrank van Maarseveen if (args->addrlen > sizeof(xprt->addr)) { 2170c8541ecdSChuck Lever dprintk("RPC: xs_setup_xprt: address too large\n"); 2171c8541ecdSChuck Lever return ERR_PTR(-EBADF); 2172c8541ecdSChuck Lever } 2173c8541ecdSChuck Lever 217437aa2133SPavel Emelyanov xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size); 2175bd1722d4SPavel Emelyanov if (xprt == NULL) { 217646121cf7SChuck Lever dprintk("RPC: xs_setup_xprt: couldn't allocate " 217746121cf7SChuck Lever "rpc_xprt\n"); 2178c8541ecdSChuck Lever return ERR_PTR(-ENOMEM); 2179c8541ecdSChuck Lever } 2180c8541ecdSChuck Lever 2181bd1722d4SPavel Emelyanov new = container_of(xprt, struct sock_xprt, xprt); 218296802a09SFrank van Maarseveen memcpy(&xprt->addr, args->dstaddr, args->addrlen); 218396802a09SFrank van Maarseveen xprt->addrlen = args->addrlen; 2184d3bc9a1dSFrank van Maarseveen if (args->srcaddr) 2185fbfffbd5SChuck Lever memcpy(&new->srcaddr, args->srcaddr, args->addrlen); 218692476850SChuck Lever else { 218792476850SChuck Lever int err; 218892476850SChuck Lever err = xs_init_anyaddr(args->dstaddr->sa_family, 218992476850SChuck Lever (struct sockaddr *)&new->srcaddr); 219092476850SChuck Lever if (err != 0) 219192476850SChuck Lever return ERR_PTR(err); 219292476850SChuck Lever } 2193c8541ecdSChuck Lever 2194c8541ecdSChuck Lever return xprt; 2195c8541ecdSChuck Lever } 2196c8541ecdSChuck Lever 21972881ae74STrond Myklebust static const struct rpc_timeout xs_udp_default_timeout = { 21982881ae74STrond Myklebust .to_initval = 5 * HZ, 21992881ae74STrond Myklebust .to_maxval = 30 * HZ, 22002881ae74STrond Myklebust .to_increment = 5 * HZ, 22012881ae74STrond Myklebust .to_retries = 5, 22022881ae74STrond Myklebust }; 22032881ae74STrond Myklebust 22049903cd1cSChuck Lever /** 22059903cd1cSChuck Lever * xs_setup_udp - Set up transport to use a UDP socket 220696802a09SFrank van Maarseveen * @args: rpc transport creation arguments 22079903cd1cSChuck Lever * 22089903cd1cSChuck Lever */ 2209483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_udp(struct xprt_create *args) 2210a246b010SChuck Lever { 22118f9d5b1aSChuck Lever struct sockaddr *addr = args->dstaddr; 2212c8541ecdSChuck Lever struct rpc_xprt *xprt; 2213c8475461SChuck Lever struct sock_xprt *transport; 22140a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2215a246b010SChuck Lever 221696802a09SFrank van Maarseveen xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries); 2217c8541ecdSChuck Lever if (IS_ERR(xprt)) 2218c8541ecdSChuck Lever return xprt; 2219c8475461SChuck Lever transport = container_of(xprt, struct sock_xprt, xprt); 2220a246b010SChuck Lever 2221ec739ef0SChuck Lever xprt->prot = IPPROTO_UDP; 2222808012fbSChuck Lever xprt->tsh_size = 0; 2223a246b010SChuck Lever /* XXX: header size can vary due to auth type, IPv6, etc. */ 2224a246b010SChuck Lever xprt->max_payload = (1U << 16) - (MAX_HEADER << 3); 2225a246b010SChuck Lever 222603bf4b70SChuck Lever xprt->bind_timeout = XS_BIND_TO; 222703bf4b70SChuck Lever xprt->reestablish_timeout = XS_UDP_REEST_TO; 222803bf4b70SChuck Lever xprt->idle_timeout = XS_IDLE_DISC_TO; 2229a246b010SChuck Lever 2230262965f5SChuck Lever xprt->ops = &xs_udp_ops; 2231a246b010SChuck Lever 2232ba7392bbSTrond Myklebust xprt->timeout = &xs_udp_default_timeout; 2233a246b010SChuck Lever 22348f9d5b1aSChuck Lever switch (addr->sa_family) { 22358f9d5b1aSChuck Lever case AF_INET: 22368f9d5b1aSChuck Lever if (((struct sockaddr_in *)addr)->sin_port != htons(0)) 22378f9d5b1aSChuck Lever xprt_set_bound(xprt); 22388f9d5b1aSChuck Lever 22398f9d5b1aSChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 22408c14ff2aSPavel Emelyanov xs_udp_setup_socket); 22419dc3b095SChuck Lever xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP); 22428f9d5b1aSChuck Lever break; 22438f9d5b1aSChuck Lever case AF_INET6: 22448f9d5b1aSChuck Lever if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0)) 22458f9d5b1aSChuck Lever xprt_set_bound(xprt); 22468f9d5b1aSChuck Lever 22478f9d5b1aSChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 22488c14ff2aSPavel Emelyanov xs_udp_setup_socket); 22499dc3b095SChuck Lever xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6); 22508f9d5b1aSChuck Lever break; 22518f9d5b1aSChuck Lever default: 22520a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 22530a68b0beSJ. Bruce Fields goto out_err; 22548f9d5b1aSChuck Lever } 22558f9d5b1aSChuck Lever 2256c740eff8SChuck Lever if (xprt_bound(xprt)) 2257c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2258c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2259c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT], 2260c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2261c740eff8SChuck Lever else 2262c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (autobind) via %s\n", 2263c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2264c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2265edb267a6SChuck Lever 2266bc25571eS\"Talpey, Thomas\ if (try_module_get(THIS_MODULE)) 2267c8541ecdSChuck Lever return xprt; 22680a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 22690a68b0beSJ. Bruce Fields out_err: 2270e204e621SPavel Emelyanov xprt_free(xprt); 22710a68b0beSJ. Bruce Fields return ret; 2272a246b010SChuck Lever } 2273a246b010SChuck Lever 22742881ae74STrond Myklebust static const struct rpc_timeout xs_tcp_default_timeout = { 22752881ae74STrond Myklebust .to_initval = 60 * HZ, 22762881ae74STrond Myklebust .to_maxval = 60 * HZ, 22772881ae74STrond Myklebust .to_retries = 2, 22782881ae74STrond Myklebust }; 22792881ae74STrond Myklebust 22809903cd1cSChuck Lever /** 22819903cd1cSChuck Lever * xs_setup_tcp - Set up transport to use a TCP socket 228296802a09SFrank van Maarseveen * @args: rpc transport creation arguments 22839903cd1cSChuck Lever * 22849903cd1cSChuck Lever */ 2285483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args) 2286a246b010SChuck Lever { 22878f9d5b1aSChuck Lever struct sockaddr *addr = args->dstaddr; 2288c8541ecdSChuck Lever struct rpc_xprt *xprt; 2289c8475461SChuck Lever struct sock_xprt *transport; 22900a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2291a246b010SChuck Lever 229296802a09SFrank van Maarseveen xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries); 2293c8541ecdSChuck Lever if (IS_ERR(xprt)) 2294c8541ecdSChuck Lever return xprt; 2295c8475461SChuck Lever transport = container_of(xprt, struct sock_xprt, xprt); 2296a246b010SChuck Lever 2297ec739ef0SChuck Lever xprt->prot = IPPROTO_TCP; 2298808012fbSChuck Lever xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32); 2299808012fbSChuck Lever xprt->max_payload = RPC_MAX_FRAGMENT_SIZE; 2300a246b010SChuck Lever 230103bf4b70SChuck Lever xprt->bind_timeout = XS_BIND_TO; 230203bf4b70SChuck Lever xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 230303bf4b70SChuck Lever xprt->idle_timeout = XS_IDLE_DISC_TO; 2304a246b010SChuck Lever 2305262965f5SChuck Lever xprt->ops = &xs_tcp_ops; 2306ba7392bbSTrond Myklebust xprt->timeout = &xs_tcp_default_timeout; 2307a246b010SChuck Lever 23088f9d5b1aSChuck Lever switch (addr->sa_family) { 23098f9d5b1aSChuck Lever case AF_INET: 23108f9d5b1aSChuck Lever if (((struct sockaddr_in *)addr)->sin_port != htons(0)) 23118f9d5b1aSChuck Lever xprt_set_bound(xprt); 23128f9d5b1aSChuck Lever 23139dc3b095SChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 2314cdd518d5SPavel Emelyanov xs_tcp_setup_socket); 23159dc3b095SChuck Lever xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP); 23168f9d5b1aSChuck Lever break; 23178f9d5b1aSChuck Lever case AF_INET6: 23188f9d5b1aSChuck Lever if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0)) 23198f9d5b1aSChuck Lever xprt_set_bound(xprt); 23208f9d5b1aSChuck Lever 23219dc3b095SChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 2322cdd518d5SPavel Emelyanov xs_tcp_setup_socket); 23239dc3b095SChuck Lever xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6); 23248f9d5b1aSChuck Lever break; 23258f9d5b1aSChuck Lever default: 23260a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 23270a68b0beSJ. Bruce Fields goto out_err; 23288f9d5b1aSChuck Lever } 23298f9d5b1aSChuck Lever 2330c740eff8SChuck Lever if (xprt_bound(xprt)) 2331c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2332c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2333c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT], 2334c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2335c740eff8SChuck Lever else 2336c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (autobind) via %s\n", 2337c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2338c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2339c740eff8SChuck Lever 2340edb267a6SChuck Lever 2341bc25571eS\"Talpey, Thomas\ if (try_module_get(THIS_MODULE)) 2342c8541ecdSChuck Lever return xprt; 23430a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 23440a68b0beSJ. Bruce Fields out_err: 2345e204e621SPavel Emelyanov xprt_free(xprt); 23460a68b0beSJ. Bruce Fields return ret; 2347a246b010SChuck Lever } 2348282b32e1SChuck Lever 2349f300babaSAlexandros Batsakis /** 2350f300babaSAlexandros Batsakis * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket 2351f300babaSAlexandros Batsakis * @args: rpc transport creation arguments 2352f300babaSAlexandros Batsakis * 2353f300babaSAlexandros Batsakis */ 2354f300babaSAlexandros Batsakis static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args) 2355f300babaSAlexandros Batsakis { 2356f300babaSAlexandros Batsakis struct sockaddr *addr = args->dstaddr; 2357f300babaSAlexandros Batsakis struct rpc_xprt *xprt; 2358f300babaSAlexandros Batsakis struct sock_xprt *transport; 2359f300babaSAlexandros Batsakis struct svc_sock *bc_sock; 23600a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2361f300babaSAlexandros Batsakis 2362f300babaSAlexandros Batsakis xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries); 2363f300babaSAlexandros Batsakis if (IS_ERR(xprt)) 2364f300babaSAlexandros Batsakis return xprt; 2365f300babaSAlexandros Batsakis transport = container_of(xprt, struct sock_xprt, xprt); 2366f300babaSAlexandros Batsakis 2367f300babaSAlexandros Batsakis xprt->prot = IPPROTO_TCP; 2368f300babaSAlexandros Batsakis xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32); 2369f300babaSAlexandros Batsakis xprt->max_payload = RPC_MAX_FRAGMENT_SIZE; 2370f300babaSAlexandros Batsakis xprt->timeout = &xs_tcp_default_timeout; 2371f300babaSAlexandros Batsakis 2372f300babaSAlexandros Batsakis /* backchannel */ 2373f300babaSAlexandros Batsakis xprt_set_bound(xprt); 2374f300babaSAlexandros Batsakis xprt->bind_timeout = 0; 2375f300babaSAlexandros Batsakis xprt->reestablish_timeout = 0; 2376f300babaSAlexandros Batsakis xprt->idle_timeout = 0; 2377f300babaSAlexandros Batsakis 2378f300babaSAlexandros Batsakis xprt->ops = &bc_tcp_ops; 2379f300babaSAlexandros Batsakis 2380f300babaSAlexandros Batsakis switch (addr->sa_family) { 2381f300babaSAlexandros Batsakis case AF_INET: 2382f300babaSAlexandros Batsakis xs_format_peer_addresses(xprt, "tcp", 2383f300babaSAlexandros Batsakis RPCBIND_NETID_TCP); 2384f300babaSAlexandros Batsakis break; 2385f300babaSAlexandros Batsakis case AF_INET6: 2386f300babaSAlexandros Batsakis xs_format_peer_addresses(xprt, "tcp", 2387f300babaSAlexandros Batsakis RPCBIND_NETID_TCP6); 2388f300babaSAlexandros Batsakis break; 2389f300babaSAlexandros Batsakis default: 23900a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 23910a68b0beSJ. Bruce Fields goto out_err; 2392f300babaSAlexandros Batsakis } 2393f300babaSAlexandros Batsakis 2394f300babaSAlexandros Batsakis dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2395f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_ADDR], 2396f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_PORT], 2397f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_PROTO]); 2398f300babaSAlexandros Batsakis 2399f300babaSAlexandros Batsakis /* 2400*99de8ea9SJ. Bruce Fields * The backchannel uses the same socket connection as the 2401*99de8ea9SJ. Bruce Fields * forechannel 2402*99de8ea9SJ. Bruce Fields */ 2403*99de8ea9SJ. Bruce Fields if (args->bc_xprt->xpt_bc_xprt) { 2404*99de8ea9SJ. Bruce Fields /* XXX: actually, want to catch this case... */ 2405*99de8ea9SJ. Bruce Fields ret = ERR_PTR(-EINVAL); 2406*99de8ea9SJ. Bruce Fields goto out_err; 2407*99de8ea9SJ. Bruce Fields } 2408*99de8ea9SJ. Bruce Fields /* 2409*99de8ea9SJ. Bruce Fields * Once we've associated a backchannel xprt with a connection, 2410*99de8ea9SJ. Bruce Fields * we want to keep it around as long as long as the connection 2411*99de8ea9SJ. Bruce Fields * lasts, in case we need to start using it for a backchannel 2412*99de8ea9SJ. Bruce Fields * again; this reference won't be dropped until bc_xprt is 2413*99de8ea9SJ. Bruce Fields * destroyed. 2414*99de8ea9SJ. Bruce Fields */ 2415*99de8ea9SJ. Bruce Fields xprt_get(xprt); 2416*99de8ea9SJ. Bruce Fields args->bc_xprt->xpt_bc_xprt = xprt; 2417*99de8ea9SJ. Bruce Fields xprt->bc_xprt = args->bc_xprt; 2418*99de8ea9SJ. Bruce Fields bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt); 2419*99de8ea9SJ. Bruce Fields transport->sock = bc_sock->sk_sock; 2420*99de8ea9SJ. Bruce Fields transport->inet = bc_sock->sk_sk; 2421*99de8ea9SJ. Bruce Fields 2422*99de8ea9SJ. Bruce Fields /* 2423f300babaSAlexandros Batsakis * Since we don't want connections for the backchannel, we set 2424f300babaSAlexandros Batsakis * the xprt status to connected 2425f300babaSAlexandros Batsakis */ 2426f300babaSAlexandros Batsakis xprt_set_connected(xprt); 2427f300babaSAlexandros Batsakis 2428f300babaSAlexandros Batsakis 2429f300babaSAlexandros Batsakis if (try_module_get(THIS_MODULE)) 2430f300babaSAlexandros Batsakis return xprt; 2431*99de8ea9SJ. Bruce Fields xprt_put(xprt); 24320a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 24330a68b0beSJ. Bruce Fields out_err: 2434e204e621SPavel Emelyanov xprt_free(xprt); 24350a68b0beSJ. Bruce Fields return ret; 2436f300babaSAlexandros Batsakis } 2437f300babaSAlexandros Batsakis 2438bc25571eS\"Talpey, Thomas\ static struct xprt_class xs_udp_transport = { 2439bc25571eS\"Talpey, Thomas\ .list = LIST_HEAD_INIT(xs_udp_transport.list), 2440bc25571eS\"Talpey, Thomas\ .name = "udp", 2441bc25571eS\"Talpey, Thomas\ .owner = THIS_MODULE, 2442f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_UDP, 2443bc25571eS\"Talpey, Thomas\ .setup = xs_setup_udp, 2444bc25571eS\"Talpey, Thomas\ }; 2445bc25571eS\"Talpey, Thomas\ 2446bc25571eS\"Talpey, Thomas\ static struct xprt_class xs_tcp_transport = { 2447bc25571eS\"Talpey, Thomas\ .list = LIST_HEAD_INIT(xs_tcp_transport.list), 2448bc25571eS\"Talpey, Thomas\ .name = "tcp", 2449bc25571eS\"Talpey, Thomas\ .owner = THIS_MODULE, 2450f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_TCP, 2451bc25571eS\"Talpey, Thomas\ .setup = xs_setup_tcp, 2452bc25571eS\"Talpey, Thomas\ }; 2453bc25571eS\"Talpey, Thomas\ 2454f300babaSAlexandros Batsakis static struct xprt_class xs_bc_tcp_transport = { 2455f300babaSAlexandros Batsakis .list = LIST_HEAD_INIT(xs_bc_tcp_transport.list), 2456f300babaSAlexandros Batsakis .name = "tcp NFSv4.1 backchannel", 2457f300babaSAlexandros Batsakis .owner = THIS_MODULE, 2458f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_BC_TCP, 2459f300babaSAlexandros Batsakis .setup = xs_setup_bc_tcp, 2460f300babaSAlexandros Batsakis }; 2461f300babaSAlexandros Batsakis 2462282b32e1SChuck Lever /** 2463bc25571eS\"Talpey, Thomas\ * init_socket_xprt - set up xprtsock's sysctls, register with RPC client 2464282b32e1SChuck Lever * 2465282b32e1SChuck Lever */ 2466282b32e1SChuck Lever int init_socket_xprt(void) 2467282b32e1SChuck Lever { 2468fbf76683SChuck Lever #ifdef RPC_DEBUG 24692b1bec5fSEric W. Biederman if (!sunrpc_table_header) 24700b4d4147SEric W. Biederman sunrpc_table_header = register_sysctl_table(sunrpc_table); 2471fbf76683SChuck Lever #endif 2472fbf76683SChuck Lever 2473bc25571eS\"Talpey, Thomas\ xprt_register_transport(&xs_udp_transport); 2474bc25571eS\"Talpey, Thomas\ xprt_register_transport(&xs_tcp_transport); 2475f300babaSAlexandros Batsakis xprt_register_transport(&xs_bc_tcp_transport); 2476bc25571eS\"Talpey, Thomas\ 2477282b32e1SChuck Lever return 0; 2478282b32e1SChuck Lever } 2479282b32e1SChuck Lever 2480282b32e1SChuck Lever /** 2481bc25571eS\"Talpey, Thomas\ * cleanup_socket_xprt - remove xprtsock's sysctls, unregister 2482282b32e1SChuck Lever * 2483282b32e1SChuck Lever */ 2484282b32e1SChuck Lever void cleanup_socket_xprt(void) 2485282b32e1SChuck Lever { 2486fbf76683SChuck Lever #ifdef RPC_DEBUG 2487fbf76683SChuck Lever if (sunrpc_table_header) { 2488fbf76683SChuck Lever unregister_sysctl_table(sunrpc_table_header); 2489fbf76683SChuck Lever sunrpc_table_header = NULL; 2490fbf76683SChuck Lever } 2491fbf76683SChuck Lever #endif 2492bc25571eS\"Talpey, Thomas\ 2493bc25571eS\"Talpey, Thomas\ xprt_unregister_transport(&xs_udp_transport); 2494bc25571eS\"Talpey, Thomas\ xprt_unregister_transport(&xs_tcp_transport); 2495f300babaSAlexandros Batsakis xprt_unregister_transport(&xs_bc_tcp_transport); 2496282b32e1SChuck Lever } 2497cbf11071STrond Myklebust 24989bbb9e5aSRusty Russell static int param_set_uint_minmax(const char *val, 24999bbb9e5aSRusty Russell const struct kernel_param *kp, 2500cbf11071STrond Myklebust unsigned int min, unsigned int max) 2501cbf11071STrond Myklebust { 2502cbf11071STrond Myklebust unsigned long num; 2503cbf11071STrond Myklebust int ret; 2504cbf11071STrond Myklebust 2505cbf11071STrond Myklebust if (!val) 2506cbf11071STrond Myklebust return -EINVAL; 2507cbf11071STrond Myklebust ret = strict_strtoul(val, 0, &num); 2508cbf11071STrond Myklebust if (ret == -EINVAL || num < min || num > max) 2509cbf11071STrond Myklebust return -EINVAL; 2510cbf11071STrond Myklebust *((unsigned int *)kp->arg) = num; 2511cbf11071STrond Myklebust return 0; 2512cbf11071STrond Myklebust } 2513cbf11071STrond Myklebust 25149bbb9e5aSRusty Russell static int param_set_portnr(const char *val, const struct kernel_param *kp) 2515cbf11071STrond Myklebust { 2516cbf11071STrond Myklebust return param_set_uint_minmax(val, kp, 2517cbf11071STrond Myklebust RPC_MIN_RESVPORT, 2518cbf11071STrond Myklebust RPC_MAX_RESVPORT); 2519cbf11071STrond Myklebust } 2520cbf11071STrond Myklebust 25219bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_portnr = { 25229bbb9e5aSRusty Russell .set = param_set_portnr, 25239bbb9e5aSRusty Russell .get = param_get_uint, 25249bbb9e5aSRusty Russell }; 25259bbb9e5aSRusty Russell 2526cbf11071STrond Myklebust #define param_check_portnr(name, p) \ 2527cbf11071STrond Myklebust __param_check(name, p, unsigned int); 2528cbf11071STrond Myklebust 2529cbf11071STrond Myklebust module_param_named(min_resvport, xprt_min_resvport, portnr, 0644); 2530cbf11071STrond Myklebust module_param_named(max_resvport, xprt_max_resvport, portnr, 0644); 2531cbf11071STrond Myklebust 25329bbb9e5aSRusty Russell static int param_set_slot_table_size(const char *val, 25339bbb9e5aSRusty Russell const struct kernel_param *kp) 2534cbf11071STrond Myklebust { 2535cbf11071STrond Myklebust return param_set_uint_minmax(val, kp, 2536cbf11071STrond Myklebust RPC_MIN_SLOT_TABLE, 2537cbf11071STrond Myklebust RPC_MAX_SLOT_TABLE); 2538cbf11071STrond Myklebust } 2539cbf11071STrond Myklebust 25409bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_slot_table_size = { 25419bbb9e5aSRusty Russell .set = param_set_slot_table_size, 25429bbb9e5aSRusty Russell .get = param_get_uint, 25439bbb9e5aSRusty Russell }; 25449bbb9e5aSRusty Russell 2545cbf11071STrond Myklebust #define param_check_slot_table_size(name, p) \ 2546cbf11071STrond Myklebust __param_check(name, p, unsigned int); 2547cbf11071STrond Myklebust 2548cbf11071STrond Myklebust module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries, 2549cbf11071STrond Myklebust slot_table_size, 0644); 2550cbf11071STrond Myklebust module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries, 2551cbf11071STrond Myklebust slot_table_size, 0644); 2552cbf11071STrond Myklebust 2553