1a246b010SChuck Lever /* 2a246b010SChuck Lever * linux/net/sunrpc/xprtsock.c 3a246b010SChuck Lever * 4a246b010SChuck Lever * Client-side transport implementation for sockets. 5a246b010SChuck Lever * 6113aa838SAlan Cox * TCP callback races fixes (C) 1998 Red Hat 7113aa838SAlan Cox * TCP send fixes (C) 1998 Red Hat 8a246b010SChuck Lever * TCP NFS related read + write fixes 9a246b010SChuck Lever * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie> 10a246b010SChuck Lever * 11a246b010SChuck Lever * Rewrite of larges part of the code in order to stabilize TCP stuff. 12a246b010SChuck Lever * Fix behaviour when socket buffer is full. 13a246b010SChuck Lever * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no> 1455aa4f58SChuck Lever * 1555aa4f58SChuck Lever * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com> 168f9d5b1aSChuck Lever * 178f9d5b1aSChuck Lever * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005. 188f9d5b1aSChuck Lever * <gilles.quillard@bull.net> 19a246b010SChuck Lever */ 20a246b010SChuck Lever 21a246b010SChuck Lever #include <linux/types.h> 22a246b010SChuck Lever #include <linux/slab.h> 23bc25571eS\"Talpey, Thomas\ #include <linux/module.h> 24a246b010SChuck Lever #include <linux/capability.h> 25a246b010SChuck Lever #include <linux/pagemap.h> 26a246b010SChuck Lever #include <linux/errno.h> 27a246b010SChuck Lever #include <linux/socket.h> 28a246b010SChuck Lever #include <linux/in.h> 29a246b010SChuck Lever #include <linux/net.h> 30a246b010SChuck Lever #include <linux/mm.h> 31a246b010SChuck Lever #include <linux/udp.h> 32a246b010SChuck Lever #include <linux/tcp.h> 33a246b010SChuck Lever #include <linux/sunrpc/clnt.h> 3402107148SChuck Lever #include <linux/sunrpc/sched.h> 354cfc7e60SRahul Iyer #include <linux/sunrpc/svcsock.h> 3649c36fccS\"Talpey, Thomas\ #include <linux/sunrpc/xprtsock.h> 37a246b010SChuck Lever #include <linux/file.h> 3844b98efdSRicardo Labiaga #ifdef CONFIG_NFS_V4_1 3944b98efdSRicardo Labiaga #include <linux/sunrpc/bc_xprt.h> 4044b98efdSRicardo Labiaga #endif 41a246b010SChuck Lever 42a246b010SChuck Lever #include <net/sock.h> 43a246b010SChuck Lever #include <net/checksum.h> 44a246b010SChuck Lever #include <net/udp.h> 45a246b010SChuck Lever #include <net/tcp.h> 46a246b010SChuck Lever 474cfc7e60SRahul Iyer #include "sunrpc.h" 489903cd1cSChuck Lever /* 49c556b754SChuck Lever * xprtsock tunables 50c556b754SChuck Lever */ 51c556b754SChuck Lever unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE; 52c556b754SChuck Lever unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE; 53c556b754SChuck Lever 54c556b754SChuck Lever unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT; 55c556b754SChuck Lever unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT; 56c556b754SChuck Lever 577d1e8255STrond Myklebust #define XS_TCP_LINGER_TO (15U * HZ) 5825fe6142STrond Myklebust static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO; 597d1e8255STrond Myklebust 60c556b754SChuck Lever /* 61fbf76683SChuck Lever * We can register our own files under /proc/sys/sunrpc by 62fbf76683SChuck Lever * calling register_sysctl_table() again. The files in that 63fbf76683SChuck Lever * directory become the union of all files registered there. 64fbf76683SChuck Lever * 65fbf76683SChuck Lever * We simply need to make sure that we don't collide with 66fbf76683SChuck Lever * someone else's file names! 67fbf76683SChuck Lever */ 68fbf76683SChuck Lever 69fbf76683SChuck Lever #ifdef RPC_DEBUG 70fbf76683SChuck Lever 71fbf76683SChuck Lever static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE; 72fbf76683SChuck Lever static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE; 73fbf76683SChuck Lever static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT; 74fbf76683SChuck Lever static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT; 75fbf76683SChuck Lever 76fbf76683SChuck Lever static struct ctl_table_header *sunrpc_table_header; 77fbf76683SChuck Lever 78fbf76683SChuck Lever /* 79fbf76683SChuck Lever * FIXME: changing the UDP slot table size should also resize the UDP 80fbf76683SChuck Lever * socket buffers for existing UDP transports 81fbf76683SChuck Lever */ 82fbf76683SChuck Lever static ctl_table xs_tunables_table[] = { 83fbf76683SChuck Lever { 84fbf76683SChuck Lever .procname = "udp_slot_table_entries", 85fbf76683SChuck Lever .data = &xprt_udp_slot_table_entries, 86fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 87fbf76683SChuck Lever .mode = 0644, 886d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 89fbf76683SChuck Lever .extra1 = &min_slot_table_size, 90fbf76683SChuck Lever .extra2 = &max_slot_table_size 91fbf76683SChuck Lever }, 92fbf76683SChuck Lever { 93fbf76683SChuck Lever .procname = "tcp_slot_table_entries", 94fbf76683SChuck Lever .data = &xprt_tcp_slot_table_entries, 95fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 96fbf76683SChuck Lever .mode = 0644, 976d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 98fbf76683SChuck Lever .extra1 = &min_slot_table_size, 99fbf76683SChuck Lever .extra2 = &max_slot_table_size 100fbf76683SChuck Lever }, 101fbf76683SChuck Lever { 102fbf76683SChuck Lever .procname = "min_resvport", 103fbf76683SChuck Lever .data = &xprt_min_resvport, 104fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 105fbf76683SChuck Lever .mode = 0644, 1066d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 107fbf76683SChuck Lever .extra1 = &xprt_min_resvport_limit, 108fbf76683SChuck Lever .extra2 = &xprt_max_resvport_limit 109fbf76683SChuck Lever }, 110fbf76683SChuck Lever { 111fbf76683SChuck Lever .procname = "max_resvport", 112fbf76683SChuck Lever .data = &xprt_max_resvport, 113fbf76683SChuck Lever .maxlen = sizeof(unsigned int), 114fbf76683SChuck Lever .mode = 0644, 1156d456111SEric W. Biederman .proc_handler = proc_dointvec_minmax, 116fbf76683SChuck Lever .extra1 = &xprt_min_resvport_limit, 117fbf76683SChuck Lever .extra2 = &xprt_max_resvport_limit 118fbf76683SChuck Lever }, 119fbf76683SChuck Lever { 12025fe6142STrond Myklebust .procname = "tcp_fin_timeout", 12125fe6142STrond Myklebust .data = &xs_tcp_fin_timeout, 12225fe6142STrond Myklebust .maxlen = sizeof(xs_tcp_fin_timeout), 12325fe6142STrond Myklebust .mode = 0644, 1246d456111SEric W. Biederman .proc_handler = proc_dointvec_jiffies, 12525fe6142STrond Myklebust }, 126f8572d8fSEric W. Biederman { }, 127fbf76683SChuck Lever }; 128fbf76683SChuck Lever 129fbf76683SChuck Lever static ctl_table sunrpc_table[] = { 130fbf76683SChuck Lever { 131fbf76683SChuck Lever .procname = "sunrpc", 132fbf76683SChuck Lever .mode = 0555, 133fbf76683SChuck Lever .child = xs_tunables_table 134fbf76683SChuck Lever }, 135f8572d8fSEric W. Biederman { }, 136fbf76683SChuck Lever }; 137fbf76683SChuck Lever 138fbf76683SChuck Lever #endif 139fbf76683SChuck Lever 140fbf76683SChuck Lever /* 14103bf4b70SChuck Lever * Wait duration for a reply from the RPC portmapper. 14203bf4b70SChuck Lever */ 14303bf4b70SChuck Lever #define XS_BIND_TO (60U * HZ) 14403bf4b70SChuck Lever 14503bf4b70SChuck Lever /* 14603bf4b70SChuck Lever * Delay if a UDP socket connect error occurs. This is most likely some 14703bf4b70SChuck Lever * kind of resource problem on the local host. 14803bf4b70SChuck Lever */ 14903bf4b70SChuck Lever #define XS_UDP_REEST_TO (2U * HZ) 15003bf4b70SChuck Lever 15103bf4b70SChuck Lever /* 15203bf4b70SChuck Lever * The reestablish timeout allows clients to delay for a bit before attempting 15303bf4b70SChuck Lever * to reconnect to a server that just dropped our connection. 15403bf4b70SChuck Lever * 15503bf4b70SChuck Lever * We implement an exponential backoff when trying to reestablish a TCP 15603bf4b70SChuck Lever * transport connection with the server. Some servers like to drop a TCP 15703bf4b70SChuck Lever * connection when they are overworked, so we start with a short timeout and 15803bf4b70SChuck Lever * increase over time if the server is down or not responding. 15903bf4b70SChuck Lever */ 16003bf4b70SChuck Lever #define XS_TCP_INIT_REEST_TO (3U * HZ) 16103bf4b70SChuck Lever #define XS_TCP_MAX_REEST_TO (5U * 60 * HZ) 16203bf4b70SChuck Lever 16303bf4b70SChuck Lever /* 16403bf4b70SChuck Lever * TCP idle timeout; client drops the transport socket if it is idle 16503bf4b70SChuck Lever * for this long. Note that we also timeout UDP sockets to prevent 16603bf4b70SChuck Lever * holding port numbers when there is no RPC traffic. 16703bf4b70SChuck Lever */ 16803bf4b70SChuck Lever #define XS_IDLE_DISC_TO (5U * 60 * HZ) 16903bf4b70SChuck Lever 170a246b010SChuck Lever #ifdef RPC_DEBUG 171a246b010SChuck Lever # undef RPC_DEBUG_DATA 1729903cd1cSChuck Lever # define RPCDBG_FACILITY RPCDBG_TRANS 173a246b010SChuck Lever #endif 174a246b010SChuck Lever 175a246b010SChuck Lever #ifdef RPC_DEBUG_DATA 1769903cd1cSChuck Lever static void xs_pktdump(char *msg, u32 *packet, unsigned int count) 177a246b010SChuck Lever { 178a246b010SChuck Lever u8 *buf = (u8 *) packet; 179a246b010SChuck Lever int j; 180a246b010SChuck Lever 181a246b010SChuck Lever dprintk("RPC: %s\n", msg); 182a246b010SChuck Lever for (j = 0; j < count && j < 128; j += 4) { 183a246b010SChuck Lever if (!(j & 31)) { 184a246b010SChuck Lever if (j) 185a246b010SChuck Lever dprintk("\n"); 186a246b010SChuck Lever dprintk("0x%04x ", j); 187a246b010SChuck Lever } 188a246b010SChuck Lever dprintk("%02x%02x%02x%02x ", 189a246b010SChuck Lever buf[j], buf[j+1], buf[j+2], buf[j+3]); 190a246b010SChuck Lever } 191a246b010SChuck Lever dprintk("\n"); 192a246b010SChuck Lever } 193a246b010SChuck Lever #else 1949903cd1cSChuck Lever static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count) 195a246b010SChuck Lever { 196a246b010SChuck Lever /* NOP */ 197a246b010SChuck Lever } 198a246b010SChuck Lever #endif 199a246b010SChuck Lever 200ffc2e518SChuck Lever struct sock_xprt { 201ffc2e518SChuck Lever struct rpc_xprt xprt; 202ee0ac0c2SChuck Lever 203ee0ac0c2SChuck Lever /* 204ee0ac0c2SChuck Lever * Network layer 205ee0ac0c2SChuck Lever */ 206ee0ac0c2SChuck Lever struct socket * sock; 207ee0ac0c2SChuck Lever struct sock * inet; 20851971139SChuck Lever 20951971139SChuck Lever /* 21051971139SChuck Lever * State of TCP reply receive 21151971139SChuck Lever */ 21251971139SChuck Lever __be32 tcp_fraghdr, 213b76ce561STrond Myklebust tcp_xid, 214b76ce561STrond Myklebust tcp_calldir; 21551971139SChuck Lever 21651971139SChuck Lever u32 tcp_offset, 21751971139SChuck Lever tcp_reclen; 21851971139SChuck Lever 21951971139SChuck Lever unsigned long tcp_copied, 22051971139SChuck Lever tcp_flags; 221c8475461SChuck Lever 222c8475461SChuck Lever /* 223c8475461SChuck Lever * Connection of transports 224c8475461SChuck Lever */ 22534161db6STrond Myklebust struct delayed_work connect_worker; 226fbfffbd5SChuck Lever struct sockaddr_storage srcaddr; 227fbfffbd5SChuck Lever unsigned short srcport; 2287c6e066eSChuck Lever 2297c6e066eSChuck Lever /* 2307c6e066eSChuck Lever * UDP socket buffer size parameters 2317c6e066eSChuck Lever */ 2327c6e066eSChuck Lever size_t rcvsize, 2337c6e066eSChuck Lever sndsize; 234314dfd79SChuck Lever 235314dfd79SChuck Lever /* 236314dfd79SChuck Lever * Saved socket callback addresses 237314dfd79SChuck Lever */ 238314dfd79SChuck Lever void (*old_data_ready)(struct sock *, int); 239314dfd79SChuck Lever void (*old_state_change)(struct sock *); 240314dfd79SChuck Lever void (*old_write_space)(struct sock *); 2412a9e1cfaSTrond Myklebust void (*old_error_report)(struct sock *); 242ffc2e518SChuck Lever }; 243ffc2e518SChuck Lever 244e136d092SChuck Lever /* 245e136d092SChuck Lever * TCP receive state flags 246e136d092SChuck Lever */ 247e136d092SChuck Lever #define TCP_RCV_LAST_FRAG (1UL << 0) 248e136d092SChuck Lever #define TCP_RCV_COPY_FRAGHDR (1UL << 1) 249e136d092SChuck Lever #define TCP_RCV_COPY_XID (1UL << 2) 250e136d092SChuck Lever #define TCP_RCV_COPY_DATA (1UL << 3) 251f4a2e418SRicardo Labiaga #define TCP_RCV_READ_CALLDIR (1UL << 4) 252f4a2e418SRicardo Labiaga #define TCP_RCV_COPY_CALLDIR (1UL << 5) 25318dca02aSRicardo Labiaga 25418dca02aSRicardo Labiaga /* 25518dca02aSRicardo Labiaga * TCP RPC flags 25618dca02aSRicardo Labiaga */ 257f4a2e418SRicardo Labiaga #define TCP_RPC_REPLY (1UL << 6) 258e136d092SChuck Lever 25995392c59SChuck Lever static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt) 260edb267a6SChuck Lever { 26195392c59SChuck Lever return (struct sockaddr *) &xprt->addr; 26295392c59SChuck Lever } 26395392c59SChuck Lever 26495392c59SChuck Lever static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt) 26595392c59SChuck Lever { 26695392c59SChuck Lever return (struct sockaddr_in *) &xprt->addr; 26795392c59SChuck Lever } 26895392c59SChuck Lever 26995392c59SChuck Lever static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt) 27095392c59SChuck Lever { 27195392c59SChuck Lever return (struct sockaddr_in6 *) &xprt->addr; 27295392c59SChuck Lever } 27395392c59SChuck Lever 274c877b849SChuck Lever static void xs_format_common_peer_addresses(struct rpc_xprt *xprt) 275c877b849SChuck Lever { 276c877b849SChuck Lever struct sockaddr *sap = xs_addr(xprt); 2779dc3b095SChuck Lever struct sockaddr_in6 *sin6; 2789dc3b095SChuck Lever struct sockaddr_in *sin; 279c877b849SChuck Lever char buf[128]; 280c877b849SChuck Lever 281c877b849SChuck Lever (void)rpc_ntop(sap, buf, sizeof(buf)); 282c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR] = kstrdup(buf, GFP_KERNEL); 283c877b849SChuck Lever 2849dc3b095SChuck Lever switch (sap->sa_family) { 2859dc3b095SChuck Lever case AF_INET: 2869dc3b095SChuck Lever sin = xs_addr_in(xprt); 287fc0b5791SJoe Perches snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr)); 2889dc3b095SChuck Lever break; 2899dc3b095SChuck Lever case AF_INET6: 2909dc3b095SChuck Lever sin6 = xs_addr_in6(xprt); 291fc0b5791SJoe Perches snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr); 2929dc3b095SChuck Lever break; 2939dc3b095SChuck Lever default: 2949dc3b095SChuck Lever BUG(); 2959dc3b095SChuck Lever } 2969dc3b095SChuck Lever xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL); 2979dc3b095SChuck Lever } 2989dc3b095SChuck Lever 2999dc3b095SChuck Lever static void xs_format_common_peer_ports(struct rpc_xprt *xprt) 3009dc3b095SChuck Lever { 3019dc3b095SChuck Lever struct sockaddr *sap = xs_addr(xprt); 3029dc3b095SChuck Lever char buf[128]; 3039dc3b095SChuck Lever 30481160e66SJoe Perches snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap)); 305c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL); 306c877b849SChuck Lever 30781160e66SJoe Perches snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap)); 308c877b849SChuck Lever xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL); 309c877b849SChuck Lever } 310c877b849SChuck Lever 3119dc3b095SChuck Lever static void xs_format_peer_addresses(struct rpc_xprt *xprt, 312b454ae90SChuck Lever const char *protocol, 313b454ae90SChuck Lever const char *netid) 314edb267a6SChuck Lever { 315b454ae90SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO] = protocol; 316b454ae90SChuck Lever xprt->address_strings[RPC_DISPLAY_NETID] = netid; 317c877b849SChuck Lever xs_format_common_peer_addresses(xprt); 3189dc3b095SChuck Lever xs_format_common_peer_ports(xprt); 319edb267a6SChuck Lever } 320edb267a6SChuck Lever 3219dc3b095SChuck Lever static void xs_update_peer_port(struct rpc_xprt *xprt) 3224b6473fbSChuck Lever { 3239dc3b095SChuck Lever kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]); 3249dc3b095SChuck Lever kfree(xprt->address_strings[RPC_DISPLAY_PORT]); 3254b6473fbSChuck Lever 3269dc3b095SChuck Lever xs_format_common_peer_ports(xprt); 327edb267a6SChuck Lever } 328edb267a6SChuck Lever 329edb267a6SChuck Lever static void xs_free_peer_addresses(struct rpc_xprt *xprt) 330edb267a6SChuck Lever { 33133e01dc7SChuck Lever unsigned int i; 33233e01dc7SChuck Lever 33333e01dc7SChuck Lever for (i = 0; i < RPC_DISPLAY_MAX; i++) 33433e01dc7SChuck Lever switch (i) { 33533e01dc7SChuck Lever case RPC_DISPLAY_PROTO: 33633e01dc7SChuck Lever case RPC_DISPLAY_NETID: 33733e01dc7SChuck Lever continue; 33833e01dc7SChuck Lever default: 33933e01dc7SChuck Lever kfree(xprt->address_strings[i]); 34033e01dc7SChuck Lever } 341edb267a6SChuck Lever } 342edb267a6SChuck Lever 343b4b5cc85SChuck Lever #define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL) 344b4b5cc85SChuck Lever 34524c5684bSTrond Myklebust static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more) 346b4b5cc85SChuck Lever { 347b4b5cc85SChuck Lever struct msghdr msg = { 348b4b5cc85SChuck Lever .msg_name = addr, 349b4b5cc85SChuck Lever .msg_namelen = addrlen, 35024c5684bSTrond Myklebust .msg_flags = XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0), 35124c5684bSTrond Myklebust }; 35224c5684bSTrond Myklebust struct kvec iov = { 35324c5684bSTrond Myklebust .iov_base = vec->iov_base + base, 35424c5684bSTrond Myklebust .iov_len = vec->iov_len - base, 355b4b5cc85SChuck Lever }; 356b4b5cc85SChuck Lever 35724c5684bSTrond Myklebust if (iov.iov_len != 0) 358b4b5cc85SChuck Lever return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len); 359b4b5cc85SChuck Lever return kernel_sendmsg(sock, &msg, NULL, 0, 0); 360b4b5cc85SChuck Lever } 361b4b5cc85SChuck Lever 36224c5684bSTrond Myklebust static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more) 363b4b5cc85SChuck Lever { 36424c5684bSTrond Myklebust struct page **ppage; 36524c5684bSTrond Myklebust unsigned int remainder; 36624c5684bSTrond Myklebust int err, sent = 0; 367b4b5cc85SChuck Lever 36824c5684bSTrond Myklebust remainder = xdr->page_len - base; 36924c5684bSTrond Myklebust base += xdr->page_base; 37024c5684bSTrond Myklebust ppage = xdr->pages + (base >> PAGE_SHIFT); 37124c5684bSTrond Myklebust base &= ~PAGE_MASK; 37224c5684bSTrond Myklebust for(;;) { 37324c5684bSTrond Myklebust unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder); 37424c5684bSTrond Myklebust int flags = XS_SENDMSG_FLAGS; 37524c5684bSTrond Myklebust 37624c5684bSTrond Myklebust remainder -= len; 37724c5684bSTrond Myklebust if (remainder != 0 || more) 37824c5684bSTrond Myklebust flags |= MSG_MORE; 37924c5684bSTrond Myklebust err = sock->ops->sendpage(sock, *ppage, base, len, flags); 38024c5684bSTrond Myklebust if (remainder == 0 || err != len) 38124c5684bSTrond Myklebust break; 38224c5684bSTrond Myklebust sent += err; 38324c5684bSTrond Myklebust ppage++; 38424c5684bSTrond Myklebust base = 0; 38524c5684bSTrond Myklebust } 38624c5684bSTrond Myklebust if (sent == 0) 38724c5684bSTrond Myklebust return err; 38824c5684bSTrond Myklebust if (err > 0) 38924c5684bSTrond Myklebust sent += err; 39024c5684bSTrond Myklebust return sent; 391b4b5cc85SChuck Lever } 392b4b5cc85SChuck Lever 3939903cd1cSChuck Lever /** 3949903cd1cSChuck Lever * xs_sendpages - write pages directly to a socket 3959903cd1cSChuck Lever * @sock: socket to send on 3969903cd1cSChuck Lever * @addr: UDP only -- address of destination 3979903cd1cSChuck Lever * @addrlen: UDP only -- length of destination address 3989903cd1cSChuck Lever * @xdr: buffer containing this request 3999903cd1cSChuck Lever * @base: starting position in the buffer 4009903cd1cSChuck Lever * 401a246b010SChuck Lever */ 40224c5684bSTrond Myklebust static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base) 403a246b010SChuck Lever { 40424c5684bSTrond Myklebust unsigned int remainder = xdr->len - base; 40524c5684bSTrond Myklebust int err, sent = 0; 406a246b010SChuck Lever 407262965f5SChuck Lever if (unlikely(!sock)) 408fba91afbSTrond Myklebust return -ENOTSOCK; 409262965f5SChuck Lever 410262965f5SChuck Lever clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags); 41124c5684bSTrond Myklebust if (base != 0) { 41224c5684bSTrond Myklebust addr = NULL; 41324c5684bSTrond Myklebust addrlen = 0; 41424c5684bSTrond Myklebust } 415262965f5SChuck Lever 41624c5684bSTrond Myklebust if (base < xdr->head[0].iov_len || addr != NULL) { 41724c5684bSTrond Myklebust unsigned int len = xdr->head[0].iov_len - base; 41824c5684bSTrond Myklebust remainder -= len; 41924c5684bSTrond Myklebust err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0); 42024c5684bSTrond Myklebust if (remainder == 0 || err != len) 421a246b010SChuck Lever goto out; 42224c5684bSTrond Myklebust sent += err; 423a246b010SChuck Lever base = 0; 424a246b010SChuck Lever } else 42524c5684bSTrond Myklebust base -= xdr->head[0].iov_len; 426a246b010SChuck Lever 42724c5684bSTrond Myklebust if (base < xdr->page_len) { 42824c5684bSTrond Myklebust unsigned int len = xdr->page_len - base; 42924c5684bSTrond Myklebust remainder -= len; 43024c5684bSTrond Myklebust err = xs_send_pagedata(sock, xdr, base, remainder != 0); 43124c5684bSTrond Myklebust if (remainder == 0 || err != len) 432a246b010SChuck Lever goto out; 43324c5684bSTrond Myklebust sent += err; 434a246b010SChuck Lever base = 0; 43524c5684bSTrond Myklebust } else 43624c5684bSTrond Myklebust base -= xdr->page_len; 43724c5684bSTrond Myklebust 43824c5684bSTrond Myklebust if (base >= xdr->tail[0].iov_len) 43924c5684bSTrond Myklebust return sent; 44024c5684bSTrond Myklebust err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0); 441a246b010SChuck Lever out: 44224c5684bSTrond Myklebust if (sent == 0) 44324c5684bSTrond Myklebust return err; 44424c5684bSTrond Myklebust if (err > 0) 44524c5684bSTrond Myklebust sent += err; 44624c5684bSTrond Myklebust return sent; 447a246b010SChuck Lever } 448a246b010SChuck Lever 449b6ddf64fSTrond Myklebust static void xs_nospace_callback(struct rpc_task *task) 450b6ddf64fSTrond Myklebust { 451b6ddf64fSTrond Myklebust struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt); 452b6ddf64fSTrond Myklebust 453b6ddf64fSTrond Myklebust transport->inet->sk_write_pending--; 454b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 455b6ddf64fSTrond Myklebust } 456b6ddf64fSTrond Myklebust 4579903cd1cSChuck Lever /** 458262965f5SChuck Lever * xs_nospace - place task on wait queue if transmit was incomplete 459262965f5SChuck Lever * @task: task to put to sleep 4609903cd1cSChuck Lever * 461a246b010SChuck Lever */ 4625e3771ceSTrond Myklebust static int xs_nospace(struct rpc_task *task) 463a246b010SChuck Lever { 464262965f5SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 465262965f5SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 466ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 4675e3771ceSTrond Myklebust int ret = 0; 468a246b010SChuck Lever 46946121cf7SChuck Lever dprintk("RPC: %5u xmit incomplete (%u left of %u)\n", 470262965f5SChuck Lever task->tk_pid, req->rq_slen - req->rq_bytes_sent, 471262965f5SChuck Lever req->rq_slen); 472a246b010SChuck Lever 473262965f5SChuck Lever /* Protect against races with write_space */ 474262965f5SChuck Lever spin_lock_bh(&xprt->transport_lock); 475a246b010SChuck Lever 476262965f5SChuck Lever /* Don't race with disconnect */ 477b6ddf64fSTrond Myklebust if (xprt_connected(xprt)) { 478b6ddf64fSTrond Myklebust if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) { 4795e3771ceSTrond Myklebust ret = -EAGAIN; 480b6ddf64fSTrond Myklebust /* 481b6ddf64fSTrond Myklebust * Notify TCP that we're limited by the application 482b6ddf64fSTrond Myklebust * window size 483b6ddf64fSTrond Myklebust */ 484b6ddf64fSTrond Myklebust set_bit(SOCK_NOSPACE, &transport->sock->flags); 485b6ddf64fSTrond Myklebust transport->inet->sk_write_pending++; 486b6ddf64fSTrond Myklebust /* ...and wait for more buffer space */ 487b6ddf64fSTrond Myklebust xprt_wait_for_buffer_space(task, xs_nospace_callback); 488b6ddf64fSTrond Myklebust } 489b6ddf64fSTrond Myklebust } else { 490b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 4915e3771ceSTrond Myklebust ret = -ENOTCONN; 492b6ddf64fSTrond Myklebust } 493a246b010SChuck Lever 494262965f5SChuck Lever spin_unlock_bh(&xprt->transport_lock); 4955e3771ceSTrond Myklebust return ret; 496a246b010SChuck Lever } 497a246b010SChuck Lever 4989903cd1cSChuck Lever /** 499262965f5SChuck Lever * xs_udp_send_request - write an RPC request to a UDP socket 5009903cd1cSChuck Lever * @task: address of RPC task that manages the state of an RPC request 5019903cd1cSChuck Lever * 5029903cd1cSChuck Lever * Return values: 5039903cd1cSChuck Lever * 0: The request has been sent 5049903cd1cSChuck Lever * EAGAIN: The socket was blocked, please call again later to 5059903cd1cSChuck Lever * complete the request 506262965f5SChuck Lever * ENOTCONN: Caller needs to invoke connect logic then call again 50725985edcSLucas De Marchi * other: Some other error occurred, the request was not sent 5089903cd1cSChuck Lever */ 509262965f5SChuck Lever static int xs_udp_send_request(struct rpc_task *task) 510a246b010SChuck Lever { 511a246b010SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 512a246b010SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 513ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 514262965f5SChuck Lever struct xdr_buf *xdr = &req->rq_snd_buf; 515262965f5SChuck Lever int status; 516262965f5SChuck Lever 517262965f5SChuck Lever xs_pktdump("packet data:", 518262965f5SChuck Lever req->rq_svec->iov_base, 519262965f5SChuck Lever req->rq_svec->iov_len); 520262965f5SChuck Lever 52101d37c42STrond Myklebust if (!xprt_bound(xprt)) 52201d37c42STrond Myklebust return -ENOTCONN; 523ee0ac0c2SChuck Lever status = xs_sendpages(transport->sock, 52495392c59SChuck Lever xs_addr(xprt), 525ee0ac0c2SChuck Lever xprt->addrlen, xdr, 526ee0ac0c2SChuck Lever req->rq_bytes_sent); 527262965f5SChuck Lever 528262965f5SChuck Lever dprintk("RPC: xs_udp_send_request(%u) = %d\n", 529262965f5SChuck Lever xdr->len - req->rq_bytes_sent, status); 530262965f5SChuck Lever 5312199700fSTrond Myklebust if (status >= 0) { 532d60dbb20STrond Myklebust req->rq_xmit_bytes_sent += status; 5332199700fSTrond Myklebust if (status >= req->rq_slen) 534262965f5SChuck Lever return 0; 535262965f5SChuck Lever /* Still some bytes left; set up for a retry later. */ 536262965f5SChuck Lever status = -EAGAIN; 5372199700fSTrond Myklebust } 538262965f5SChuck Lever 539262965f5SChuck Lever switch (status) { 540fba91afbSTrond Myklebust case -ENOTSOCK: 541fba91afbSTrond Myklebust status = -ENOTCONN; 542fba91afbSTrond Myklebust /* Should we call xs_close() here? */ 543fba91afbSTrond Myklebust break; 544b6ddf64fSTrond Myklebust case -EAGAIN: 5455e3771ceSTrond Myklebust status = xs_nospace(task); 546b6ddf64fSTrond Myklebust break; 547c8485e4dSTrond Myklebust default: 548c8485e4dSTrond Myklebust dprintk("RPC: sendmsg returned unrecognized error %d\n", 549c8485e4dSTrond Myklebust -status); 550262965f5SChuck Lever case -ENETUNREACH: 551262965f5SChuck Lever case -EPIPE: 552262965f5SChuck Lever case -ECONNREFUSED: 553262965f5SChuck Lever /* When the server has died, an ICMP port unreachable message 554262965f5SChuck Lever * prompts ECONNREFUSED. */ 555b6ddf64fSTrond Myklebust clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 556262965f5SChuck Lever } 5575fe46e9dSBian Naimeng 558262965f5SChuck Lever return status; 559262965f5SChuck Lever } 560262965f5SChuck Lever 561e06799f9STrond Myklebust /** 562e06799f9STrond Myklebust * xs_tcp_shutdown - gracefully shut down a TCP socket 563e06799f9STrond Myklebust * @xprt: transport 564e06799f9STrond Myklebust * 565e06799f9STrond Myklebust * Initiates a graceful shutdown of the TCP socket by calling the 566e06799f9STrond Myklebust * equivalent of shutdown(SHUT_WR); 567e06799f9STrond Myklebust */ 568e06799f9STrond Myklebust static void xs_tcp_shutdown(struct rpc_xprt *xprt) 569e06799f9STrond Myklebust { 570e06799f9STrond Myklebust struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 571e06799f9STrond Myklebust struct socket *sock = transport->sock; 572e06799f9STrond Myklebust 573e06799f9STrond Myklebust if (sock != NULL) 574e06799f9STrond Myklebust kernel_sock_shutdown(sock, SHUT_WR); 575e06799f9STrond Myklebust } 576e06799f9STrond Myklebust 577808012fbSChuck Lever static inline void xs_encode_tcp_record_marker(struct xdr_buf *buf) 578808012fbSChuck Lever { 579808012fbSChuck Lever u32 reclen = buf->len - sizeof(rpc_fraghdr); 580808012fbSChuck Lever rpc_fraghdr *base = buf->head[0].iov_base; 581808012fbSChuck Lever *base = htonl(RPC_LAST_STREAM_FRAGMENT | reclen); 582808012fbSChuck Lever } 583808012fbSChuck Lever 584262965f5SChuck Lever /** 585262965f5SChuck Lever * xs_tcp_send_request - write an RPC request to a TCP socket 586262965f5SChuck Lever * @task: address of RPC task that manages the state of an RPC request 587262965f5SChuck Lever * 588262965f5SChuck Lever * Return values: 589262965f5SChuck Lever * 0: The request has been sent 590262965f5SChuck Lever * EAGAIN: The socket was blocked, please call again later to 591262965f5SChuck Lever * complete the request 592262965f5SChuck Lever * ENOTCONN: Caller needs to invoke connect logic then call again 59325985edcSLucas De Marchi * other: Some other error occurred, the request was not sent 594262965f5SChuck Lever * 595262965f5SChuck Lever * XXX: In the case of soft timeouts, should we eventually give up 596262965f5SChuck Lever * if sendmsg is not able to make progress? 597262965f5SChuck Lever */ 598262965f5SChuck Lever static int xs_tcp_send_request(struct rpc_task *task) 599262965f5SChuck Lever { 600262965f5SChuck Lever struct rpc_rqst *req = task->tk_rqstp; 601262965f5SChuck Lever struct rpc_xprt *xprt = req->rq_xprt; 602ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 603262965f5SChuck Lever struct xdr_buf *xdr = &req->rq_snd_buf; 604b595bb15SChuck Lever int status; 605a246b010SChuck Lever 606808012fbSChuck Lever xs_encode_tcp_record_marker(&req->rq_snd_buf); 607262965f5SChuck Lever 608262965f5SChuck Lever xs_pktdump("packet data:", 609262965f5SChuck Lever req->rq_svec->iov_base, 610262965f5SChuck Lever req->rq_svec->iov_len); 611a246b010SChuck Lever 612a246b010SChuck Lever /* Continue transmitting the packet/record. We must be careful 613a246b010SChuck Lever * to cope with writespace callbacks arriving _after_ we have 614262965f5SChuck Lever * called sendmsg(). */ 615a246b010SChuck Lever while (1) { 616ee0ac0c2SChuck Lever status = xs_sendpages(transport->sock, 617ee0ac0c2SChuck Lever NULL, 0, xdr, req->rq_bytes_sent); 618a246b010SChuck Lever 619262965f5SChuck Lever dprintk("RPC: xs_tcp_send_request(%u) = %d\n", 620262965f5SChuck Lever xdr->len - req->rq_bytes_sent, status); 621262965f5SChuck Lever 622262965f5SChuck Lever if (unlikely(status < 0)) 623a246b010SChuck Lever break; 624a246b010SChuck Lever 625a246b010SChuck Lever /* If we've sent the entire packet, immediately 626a246b010SChuck Lever * reset the count of bytes sent. */ 627262965f5SChuck Lever req->rq_bytes_sent += status; 628d60dbb20STrond Myklebust req->rq_xmit_bytes_sent += status; 629262965f5SChuck Lever if (likely(req->rq_bytes_sent >= req->rq_slen)) { 630a246b010SChuck Lever req->rq_bytes_sent = 0; 631a246b010SChuck Lever return 0; 632a246b010SChuck Lever } 633262965f5SChuck Lever 63406b4b681STrond Myklebust if (status != 0) 63506b4b681STrond Myklebust continue; 636a246b010SChuck Lever status = -EAGAIN; 637a246b010SChuck Lever break; 638a246b010SChuck Lever } 639a246b010SChuck Lever 640262965f5SChuck Lever switch (status) { 641fba91afbSTrond Myklebust case -ENOTSOCK: 642fba91afbSTrond Myklebust status = -ENOTCONN; 643fba91afbSTrond Myklebust /* Should we call xs_close() here? */ 644fba91afbSTrond Myklebust break; 645262965f5SChuck Lever case -EAGAIN: 6465e3771ceSTrond Myklebust status = xs_nospace(task); 647262965f5SChuck Lever break; 648262965f5SChuck Lever default: 649262965f5SChuck Lever dprintk("RPC: sendmsg returned unrecognized error %d\n", 650262965f5SChuck Lever -status); 651a246b010SChuck Lever case -ECONNRESET: 65255420c24STrond Myklebust case -EPIPE: 653e06799f9STrond Myklebust xs_tcp_shutdown(xprt); 654a246b010SChuck Lever case -ECONNREFUSED: 655a246b010SChuck Lever case -ENOTCONN: 656a246b010SChuck Lever clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags); 657a246b010SChuck Lever } 6585fe46e9dSBian Naimeng 659a246b010SChuck Lever return status; 660a246b010SChuck Lever } 661a246b010SChuck Lever 6629903cd1cSChuck Lever /** 663e0ab53deSTrond Myklebust * xs_tcp_release_xprt - clean up after a tcp transmission 664e0ab53deSTrond Myklebust * @xprt: transport 665e0ab53deSTrond Myklebust * @task: rpc task 666e0ab53deSTrond Myklebust * 667e0ab53deSTrond Myklebust * This cleans up if an error causes us to abort the transmission of a request. 668e0ab53deSTrond Myklebust * In this case, the socket may need to be reset in order to avoid confusing 669e0ab53deSTrond Myklebust * the server. 670e0ab53deSTrond Myklebust */ 671e0ab53deSTrond Myklebust static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task) 672e0ab53deSTrond Myklebust { 673e0ab53deSTrond Myklebust struct rpc_rqst *req; 674e0ab53deSTrond Myklebust 675e0ab53deSTrond Myklebust if (task != xprt->snd_task) 676e0ab53deSTrond Myklebust return; 677e0ab53deSTrond Myklebust if (task == NULL) 678e0ab53deSTrond Myklebust goto out_release; 679e0ab53deSTrond Myklebust req = task->tk_rqstp; 680e0ab53deSTrond Myklebust if (req->rq_bytes_sent == 0) 681e0ab53deSTrond Myklebust goto out_release; 682e0ab53deSTrond Myklebust if (req->rq_bytes_sent == req->rq_snd_buf.len) 683e0ab53deSTrond Myklebust goto out_release; 684e0ab53deSTrond Myklebust set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state); 685e0ab53deSTrond Myklebust out_release: 686e0ab53deSTrond Myklebust xprt_release_xprt(xprt, task); 687e0ab53deSTrond Myklebust } 688e0ab53deSTrond Myklebust 6892a9e1cfaSTrond Myklebust static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk) 6902a9e1cfaSTrond Myklebust { 6912a9e1cfaSTrond Myklebust transport->old_data_ready = sk->sk_data_ready; 6922a9e1cfaSTrond Myklebust transport->old_state_change = sk->sk_state_change; 6932a9e1cfaSTrond Myklebust transport->old_write_space = sk->sk_write_space; 6942a9e1cfaSTrond Myklebust transport->old_error_report = sk->sk_error_report; 6952a9e1cfaSTrond Myklebust } 6962a9e1cfaSTrond Myklebust 6972a9e1cfaSTrond Myklebust static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk) 6982a9e1cfaSTrond Myklebust { 6992a9e1cfaSTrond Myklebust sk->sk_data_ready = transport->old_data_ready; 7002a9e1cfaSTrond Myklebust sk->sk_state_change = transport->old_state_change; 7012a9e1cfaSTrond Myklebust sk->sk_write_space = transport->old_write_space; 7022a9e1cfaSTrond Myklebust sk->sk_error_report = transport->old_error_report; 7032a9e1cfaSTrond Myklebust } 7042a9e1cfaSTrond Myklebust 705fe315e76SChuck Lever static void xs_reset_transport(struct sock_xprt *transport) 706a246b010SChuck Lever { 707ee0ac0c2SChuck Lever struct socket *sock = transport->sock; 708ee0ac0c2SChuck Lever struct sock *sk = transport->inet; 709a246b010SChuck Lever 710fe315e76SChuck Lever if (sk == NULL) 711fe315e76SChuck Lever return; 7129903cd1cSChuck Lever 713246408dcSTrond Myklebust transport->srcport = 0; 714246408dcSTrond Myklebust 715a246b010SChuck Lever write_lock_bh(&sk->sk_callback_lock); 716ee0ac0c2SChuck Lever transport->inet = NULL; 717ee0ac0c2SChuck Lever transport->sock = NULL; 718a246b010SChuck Lever 719a246b010SChuck Lever sk->sk_user_data = NULL; 7202a9e1cfaSTrond Myklebust 7212a9e1cfaSTrond Myklebust xs_restore_old_callbacks(transport, sk); 722a246b010SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 723a246b010SChuck Lever 724a246b010SChuck Lever sk->sk_no_check = 0; 725a246b010SChuck Lever 726a246b010SChuck Lever sock_release(sock); 727fe315e76SChuck Lever } 728fe315e76SChuck Lever 729fe315e76SChuck Lever /** 730fe315e76SChuck Lever * xs_close - close a socket 731fe315e76SChuck Lever * @xprt: transport 732fe315e76SChuck Lever * 733fe315e76SChuck Lever * This is used when all requests are complete; ie, no DRC state remains 734fe315e76SChuck Lever * on the server we want to save. 735f75e6745STrond Myklebust * 736f75e6745STrond Myklebust * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with 737f75e6745STrond Myklebust * xs_reset_transport() zeroing the socket from underneath a writer. 738fe315e76SChuck Lever */ 739fe315e76SChuck Lever static void xs_close(struct rpc_xprt *xprt) 740fe315e76SChuck Lever { 741fe315e76SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 742fe315e76SChuck Lever 743fe315e76SChuck Lever dprintk("RPC: xs_close xprt %p\n", xprt); 744fe315e76SChuck Lever 745fe315e76SChuck Lever xs_reset_transport(transport); 74661d0a8e6SNeil Brown xprt->reestablish_timeout = 0; 747fe315e76SChuck Lever 748632e3bdcSTrond Myklebust smp_mb__before_clear_bit(); 7497d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 750632e3bdcSTrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 7513b948ae5STrond Myklebust clear_bit(XPRT_CLOSING, &xprt->state); 752632e3bdcSTrond Myklebust smp_mb__after_clear_bit(); 75362da3b24STrond Myklebust xprt_disconnect_done(xprt); 754a246b010SChuck Lever } 755a246b010SChuck Lever 756f75e6745STrond Myklebust static void xs_tcp_close(struct rpc_xprt *xprt) 757f75e6745STrond Myklebust { 758f75e6745STrond Myklebust if (test_and_clear_bit(XPRT_CONNECTION_CLOSE, &xprt->state)) 759f75e6745STrond Myklebust xs_close(xprt); 760f75e6745STrond Myklebust else 761f75e6745STrond Myklebust xs_tcp_shutdown(xprt); 762f75e6745STrond Myklebust } 763f75e6745STrond Myklebust 7649903cd1cSChuck Lever /** 7659903cd1cSChuck Lever * xs_destroy - prepare to shutdown a transport 7669903cd1cSChuck Lever * @xprt: doomed transport 7679903cd1cSChuck Lever * 7689903cd1cSChuck Lever */ 7699903cd1cSChuck Lever static void xs_destroy(struct rpc_xprt *xprt) 770a246b010SChuck Lever { 771c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 772c8475461SChuck Lever 7739903cd1cSChuck Lever dprintk("RPC: xs_destroy xprt %p\n", xprt); 7749903cd1cSChuck Lever 775afe2c511STejun Heo cancel_delayed_work_sync(&transport->connect_worker); 776a246b010SChuck Lever 7779903cd1cSChuck Lever xs_close(xprt); 778edb267a6SChuck Lever xs_free_peer_addresses(xprt); 779e204e621SPavel Emelyanov xprt_free(xprt); 780bc25571eS\"Talpey, Thomas\ module_put(THIS_MODULE); 781a246b010SChuck Lever } 782a246b010SChuck Lever 7839903cd1cSChuck Lever static inline struct rpc_xprt *xprt_from_sock(struct sock *sk) 7849903cd1cSChuck Lever { 7859903cd1cSChuck Lever return (struct rpc_xprt *) sk->sk_user_data; 7869903cd1cSChuck Lever } 7879903cd1cSChuck Lever 7889903cd1cSChuck Lever /** 7899903cd1cSChuck Lever * xs_udp_data_ready - "data ready" callback for UDP sockets 7909903cd1cSChuck Lever * @sk: socket with data to read 7919903cd1cSChuck Lever * @len: how much data to read 7929903cd1cSChuck Lever * 793a246b010SChuck Lever */ 7949903cd1cSChuck Lever static void xs_udp_data_ready(struct sock *sk, int len) 795a246b010SChuck Lever { 796a246b010SChuck Lever struct rpc_task *task; 797a246b010SChuck Lever struct rpc_xprt *xprt; 798a246b010SChuck Lever struct rpc_rqst *rovr; 799a246b010SChuck Lever struct sk_buff *skb; 800a246b010SChuck Lever int err, repsize, copied; 801d8ed029dSAlexey Dobriyan u32 _xid; 802d8ed029dSAlexey Dobriyan __be32 *xp; 803a246b010SChuck Lever 804f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 8059903cd1cSChuck Lever dprintk("RPC: xs_udp_data_ready...\n"); 8069903cd1cSChuck Lever if (!(xprt = xprt_from_sock(sk))) 807a246b010SChuck Lever goto out; 808a246b010SChuck Lever 809a246b010SChuck Lever if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL) 810a246b010SChuck Lever goto out; 811a246b010SChuck Lever 812a246b010SChuck Lever if (xprt->shutdown) 813a246b010SChuck Lever goto dropit; 814a246b010SChuck Lever 815a246b010SChuck Lever repsize = skb->len - sizeof(struct udphdr); 816a246b010SChuck Lever if (repsize < 4) { 8179903cd1cSChuck Lever dprintk("RPC: impossible RPC reply size %d!\n", repsize); 818a246b010SChuck Lever goto dropit; 819a246b010SChuck Lever } 820a246b010SChuck Lever 821a246b010SChuck Lever /* Copy the XID from the skb... */ 822a246b010SChuck Lever xp = skb_header_pointer(skb, sizeof(struct udphdr), 823a246b010SChuck Lever sizeof(_xid), &_xid); 824a246b010SChuck Lever if (xp == NULL) 825a246b010SChuck Lever goto dropit; 826a246b010SChuck Lever 827a246b010SChuck Lever /* Look up and lock the request corresponding to the given XID */ 8284a0f8c04SChuck Lever spin_lock(&xprt->transport_lock); 829a246b010SChuck Lever rovr = xprt_lookup_rqst(xprt, *xp); 830a246b010SChuck Lever if (!rovr) 831a246b010SChuck Lever goto out_unlock; 832a246b010SChuck Lever task = rovr->rq_task; 833a246b010SChuck Lever 834a246b010SChuck Lever if ((copied = rovr->rq_private_buf.buflen) > repsize) 835a246b010SChuck Lever copied = repsize; 836a246b010SChuck Lever 837a246b010SChuck Lever /* Suck it into the iovec, verify checksum if not done by hw. */ 8381781f7f5SHerbert Xu if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) { 8391781f7f5SHerbert Xu UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS); 840a246b010SChuck Lever goto out_unlock; 8411781f7f5SHerbert Xu } 8421781f7f5SHerbert Xu 8431781f7f5SHerbert Xu UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS); 844a246b010SChuck Lever 845a246b010SChuck Lever /* Something worked... */ 846adf30907SEric Dumazet dst_confirm(skb_dst(skb)); 847a246b010SChuck Lever 8481570c1e4SChuck Lever xprt_adjust_cwnd(task, copied); 8491570c1e4SChuck Lever xprt_complete_rqst(task, copied); 850a246b010SChuck Lever 851a246b010SChuck Lever out_unlock: 8524a0f8c04SChuck Lever spin_unlock(&xprt->transport_lock); 853a246b010SChuck Lever dropit: 854a246b010SChuck Lever skb_free_datagram(sk, skb); 855a246b010SChuck Lever out: 856f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 857a246b010SChuck Lever } 858a246b010SChuck Lever 859dd456471SChuck Lever static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc) 860a246b010SChuck Lever { 86151971139SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 862a246b010SChuck Lever size_t len, used; 863a246b010SChuck Lever char *p; 864a246b010SChuck Lever 86551971139SChuck Lever p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset; 86651971139SChuck Lever len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset; 8679d292316SChuck Lever used = xdr_skb_read_bits(desc, p, len); 86851971139SChuck Lever transport->tcp_offset += used; 869a246b010SChuck Lever if (used != len) 870a246b010SChuck Lever return; 871808012fbSChuck Lever 87251971139SChuck Lever transport->tcp_reclen = ntohl(transport->tcp_fraghdr); 87351971139SChuck Lever if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT) 874e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_LAST_FRAG; 875a246b010SChuck Lever else 876e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_LAST_FRAG; 87751971139SChuck Lever transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK; 878808012fbSChuck Lever 879e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR; 88051971139SChuck Lever transport->tcp_offset = 0; 881808012fbSChuck Lever 882a246b010SChuck Lever /* Sanity check of the record length */ 88318dca02aSRicardo Labiaga if (unlikely(transport->tcp_reclen < 8)) { 8849903cd1cSChuck Lever dprintk("RPC: invalid TCP record fragment length\n"); 8853ebb067dSTrond Myklebust xprt_force_disconnect(xprt); 8869903cd1cSChuck Lever return; 887a246b010SChuck Lever } 888a246b010SChuck Lever dprintk("RPC: reading TCP record fragment of length %d\n", 88951971139SChuck Lever transport->tcp_reclen); 890a246b010SChuck Lever } 891a246b010SChuck Lever 89251971139SChuck Lever static void xs_tcp_check_fraghdr(struct sock_xprt *transport) 893a246b010SChuck Lever { 89451971139SChuck Lever if (transport->tcp_offset == transport->tcp_reclen) { 895e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR; 89651971139SChuck Lever transport->tcp_offset = 0; 897e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_LAST_FRAG) { 898e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 899e136d092SChuck Lever transport->tcp_flags |= TCP_RCV_COPY_XID; 90051971139SChuck Lever transport->tcp_copied = 0; 901a246b010SChuck Lever } 902a246b010SChuck Lever } 903a246b010SChuck Lever } 904a246b010SChuck Lever 905dd456471SChuck Lever static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc) 906a246b010SChuck Lever { 907a246b010SChuck Lever size_t len, used; 908a246b010SChuck Lever char *p; 909a246b010SChuck Lever 91051971139SChuck Lever len = sizeof(transport->tcp_xid) - transport->tcp_offset; 911a246b010SChuck Lever dprintk("RPC: reading XID (%Zu bytes)\n", len); 91251971139SChuck Lever p = ((char *) &transport->tcp_xid) + transport->tcp_offset; 9139d292316SChuck Lever used = xdr_skb_read_bits(desc, p, len); 91451971139SChuck Lever transport->tcp_offset += used; 915a246b010SChuck Lever if (used != len) 916a246b010SChuck Lever return; 917e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_XID; 918f4a2e418SRicardo Labiaga transport->tcp_flags |= TCP_RCV_READ_CALLDIR; 91951971139SChuck Lever transport->tcp_copied = 4; 92018dca02aSRicardo Labiaga dprintk("RPC: reading %s XID %08x\n", 92118dca02aSRicardo Labiaga (transport->tcp_flags & TCP_RPC_REPLY) ? "reply for" 92218dca02aSRicardo Labiaga : "request with", 92351971139SChuck Lever ntohl(transport->tcp_xid)); 92451971139SChuck Lever xs_tcp_check_fraghdr(transport); 925a246b010SChuck Lever } 926a246b010SChuck Lever 92718dca02aSRicardo Labiaga static inline void xs_tcp_read_calldir(struct sock_xprt *transport, 92818dca02aSRicardo Labiaga struct xdr_skb_reader *desc) 929a246b010SChuck Lever { 93018dca02aSRicardo Labiaga size_t len, used; 93118dca02aSRicardo Labiaga u32 offset; 932b76ce561STrond Myklebust char *p; 93318dca02aSRicardo Labiaga 93418dca02aSRicardo Labiaga /* 93518dca02aSRicardo Labiaga * We want transport->tcp_offset to be 8 at the end of this routine 93618dca02aSRicardo Labiaga * (4 bytes for the xid and 4 bytes for the call/reply flag). 93718dca02aSRicardo Labiaga * When this function is called for the first time, 93818dca02aSRicardo Labiaga * transport->tcp_offset is 4 (after having already read the xid). 93918dca02aSRicardo Labiaga */ 94018dca02aSRicardo Labiaga offset = transport->tcp_offset - sizeof(transport->tcp_xid); 941b76ce561STrond Myklebust len = sizeof(transport->tcp_calldir) - offset; 94218dca02aSRicardo Labiaga dprintk("RPC: reading CALL/REPLY flag (%Zu bytes)\n", len); 943b76ce561STrond Myklebust p = ((char *) &transport->tcp_calldir) + offset; 944b76ce561STrond Myklebust used = xdr_skb_read_bits(desc, p, len); 94518dca02aSRicardo Labiaga transport->tcp_offset += used; 94618dca02aSRicardo Labiaga if (used != len) 94718dca02aSRicardo Labiaga return; 948f4a2e418SRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR; 949f4a2e418SRicardo Labiaga /* 950f4a2e418SRicardo Labiaga * We don't yet have the XDR buffer, so we will write the calldir 951f4a2e418SRicardo Labiaga * out after we get the buffer from the 'struct rpc_rqst' 952f4a2e418SRicardo Labiaga */ 953b76ce561STrond Myklebust switch (ntohl(transport->tcp_calldir)) { 954b76ce561STrond Myklebust case RPC_REPLY: 955b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_CALLDIR; 956b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_DATA; 95718dca02aSRicardo Labiaga transport->tcp_flags |= TCP_RPC_REPLY; 958b76ce561STrond Myklebust break; 959b76ce561STrond Myklebust case RPC_CALL: 960b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_CALLDIR; 961b76ce561STrond Myklebust transport->tcp_flags |= TCP_RCV_COPY_DATA; 96218dca02aSRicardo Labiaga transport->tcp_flags &= ~TCP_RPC_REPLY; 963b76ce561STrond Myklebust break; 964b76ce561STrond Myklebust default: 965b76ce561STrond Myklebust dprintk("RPC: invalid request message type\n"); 966b76ce561STrond Myklebust xprt_force_disconnect(&transport->xprt); 967b76ce561STrond Myklebust } 96818dca02aSRicardo Labiaga xs_tcp_check_fraghdr(transport); 96918dca02aSRicardo Labiaga } 97018dca02aSRicardo Labiaga 97144b98efdSRicardo Labiaga static inline void xs_tcp_read_common(struct rpc_xprt *xprt, 97244b98efdSRicardo Labiaga struct xdr_skb_reader *desc, 97344b98efdSRicardo Labiaga struct rpc_rqst *req) 974a246b010SChuck Lever { 97544b98efdSRicardo Labiaga struct sock_xprt *transport = 97644b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 977a246b010SChuck Lever struct xdr_buf *rcvbuf; 978a246b010SChuck Lever size_t len; 979a246b010SChuck Lever ssize_t r; 980a246b010SChuck Lever 981a246b010SChuck Lever rcvbuf = &req->rq_private_buf; 982f4a2e418SRicardo Labiaga 983f4a2e418SRicardo Labiaga if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) { 984f4a2e418SRicardo Labiaga /* 985f4a2e418SRicardo Labiaga * Save the RPC direction in the XDR buffer 986f4a2e418SRicardo Labiaga */ 987f4a2e418SRicardo Labiaga memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied, 988b76ce561STrond Myklebust &transport->tcp_calldir, 989b76ce561STrond Myklebust sizeof(transport->tcp_calldir)); 990b76ce561STrond Myklebust transport->tcp_copied += sizeof(transport->tcp_calldir); 991f4a2e418SRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR; 992a246b010SChuck Lever } 993a246b010SChuck Lever 994a246b010SChuck Lever len = desc->count; 99551971139SChuck Lever if (len > transport->tcp_reclen - transport->tcp_offset) { 996dd456471SChuck Lever struct xdr_skb_reader my_desc; 997a246b010SChuck Lever 99851971139SChuck Lever len = transport->tcp_reclen - transport->tcp_offset; 999a246b010SChuck Lever memcpy(&my_desc, desc, sizeof(my_desc)); 1000a246b010SChuck Lever my_desc.count = len; 100151971139SChuck Lever r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied, 10029d292316SChuck Lever &my_desc, xdr_skb_read_bits); 1003a246b010SChuck Lever desc->count -= r; 1004a246b010SChuck Lever desc->offset += r; 1005a246b010SChuck Lever } else 100651971139SChuck Lever r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied, 10079d292316SChuck Lever desc, xdr_skb_read_bits); 1008a246b010SChuck Lever 1009a246b010SChuck Lever if (r > 0) { 101051971139SChuck Lever transport->tcp_copied += r; 101151971139SChuck Lever transport->tcp_offset += r; 1012a246b010SChuck Lever } 1013a246b010SChuck Lever if (r != len) { 1014a246b010SChuck Lever /* Error when copying to the receive buffer, 1015a246b010SChuck Lever * usually because we weren't able to allocate 1016a246b010SChuck Lever * additional buffer pages. All we can do now 1017e136d092SChuck Lever * is turn off TCP_RCV_COPY_DATA, so the request 1018a246b010SChuck Lever * will not receive any additional updates, 1019a246b010SChuck Lever * and time out. 1020a246b010SChuck Lever * Any remaining data from this record will 1021a246b010SChuck Lever * be discarded. 1022a246b010SChuck Lever */ 1023e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 1024a246b010SChuck Lever dprintk("RPC: XID %08x truncated request\n", 102551971139SChuck Lever ntohl(transport->tcp_xid)); 102646121cf7SChuck Lever dprintk("RPC: xprt = %p, tcp_copied = %lu, " 102746121cf7SChuck Lever "tcp_offset = %u, tcp_reclen = %u\n", 102846121cf7SChuck Lever xprt, transport->tcp_copied, 102946121cf7SChuck Lever transport->tcp_offset, transport->tcp_reclen); 103044b98efdSRicardo Labiaga return; 1031a246b010SChuck Lever } 1032a246b010SChuck Lever 1033a246b010SChuck Lever dprintk("RPC: XID %08x read %Zd bytes\n", 103451971139SChuck Lever ntohl(transport->tcp_xid), r); 103546121cf7SChuck Lever dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, " 103646121cf7SChuck Lever "tcp_reclen = %u\n", xprt, transport->tcp_copied, 103746121cf7SChuck Lever transport->tcp_offset, transport->tcp_reclen); 1038a246b010SChuck Lever 103951971139SChuck Lever if (transport->tcp_copied == req->rq_private_buf.buflen) 1040e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 104151971139SChuck Lever else if (transport->tcp_offset == transport->tcp_reclen) { 1042e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_LAST_FRAG) 1043e136d092SChuck Lever transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 1044a246b010SChuck Lever } 104544b98efdSRicardo Labiaga } 104644b98efdSRicardo Labiaga 104744b98efdSRicardo Labiaga /* 104844b98efdSRicardo Labiaga * Finds the request corresponding to the RPC xid and invokes the common 104944b98efdSRicardo Labiaga * tcp read code to read the data. 105044b98efdSRicardo Labiaga */ 105144b98efdSRicardo Labiaga static inline int xs_tcp_read_reply(struct rpc_xprt *xprt, 105244b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 105344b98efdSRicardo Labiaga { 105444b98efdSRicardo Labiaga struct sock_xprt *transport = 105544b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 105644b98efdSRicardo Labiaga struct rpc_rqst *req; 105744b98efdSRicardo Labiaga 105844b98efdSRicardo Labiaga dprintk("RPC: read reply XID %08x\n", ntohl(transport->tcp_xid)); 105944b98efdSRicardo Labiaga 106044b98efdSRicardo Labiaga /* Find and lock the request corresponding to this xid */ 106144b98efdSRicardo Labiaga spin_lock(&xprt->transport_lock); 106244b98efdSRicardo Labiaga req = xprt_lookup_rqst(xprt, transport->tcp_xid); 106344b98efdSRicardo Labiaga if (!req) { 106444b98efdSRicardo Labiaga dprintk("RPC: XID %08x request not found!\n", 106544b98efdSRicardo Labiaga ntohl(transport->tcp_xid)); 106644b98efdSRicardo Labiaga spin_unlock(&xprt->transport_lock); 106744b98efdSRicardo Labiaga return -1; 106844b98efdSRicardo Labiaga } 106944b98efdSRicardo Labiaga 107044b98efdSRicardo Labiaga xs_tcp_read_common(xprt, desc, req); 107144b98efdSRicardo Labiaga 1072e136d092SChuck Lever if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) 107351971139SChuck Lever xprt_complete_rqst(req->rq_task, transport->tcp_copied); 107444b98efdSRicardo Labiaga 10754a0f8c04SChuck Lever spin_unlock(&xprt->transport_lock); 107644b98efdSRicardo Labiaga return 0; 107744b98efdSRicardo Labiaga } 107844b98efdSRicardo Labiaga 107944b98efdSRicardo Labiaga #if defined(CONFIG_NFS_V4_1) 108044b98efdSRicardo Labiaga /* 108144b98efdSRicardo Labiaga * Obtains an rpc_rqst previously allocated and invokes the common 108244b98efdSRicardo Labiaga * tcp read code to read the data. The result is placed in the callback 108344b98efdSRicardo Labiaga * queue. 108444b98efdSRicardo Labiaga * If we're unable to obtain the rpc_rqst we schedule the closing of the 108544b98efdSRicardo Labiaga * connection and return -1. 108644b98efdSRicardo Labiaga */ 108744b98efdSRicardo Labiaga static inline int xs_tcp_read_callback(struct rpc_xprt *xprt, 108844b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 108944b98efdSRicardo Labiaga { 109044b98efdSRicardo Labiaga struct sock_xprt *transport = 109144b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 109244b98efdSRicardo Labiaga struct rpc_rqst *req; 109344b98efdSRicardo Labiaga 109444b98efdSRicardo Labiaga req = xprt_alloc_bc_request(xprt); 109544b98efdSRicardo Labiaga if (req == NULL) { 109644b98efdSRicardo Labiaga printk(KERN_WARNING "Callback slot table overflowed\n"); 109744b98efdSRicardo Labiaga xprt_force_disconnect(xprt); 109844b98efdSRicardo Labiaga return -1; 109944b98efdSRicardo Labiaga } 110044b98efdSRicardo Labiaga 110144b98efdSRicardo Labiaga req->rq_xid = transport->tcp_xid; 110244b98efdSRicardo Labiaga dprintk("RPC: read callback XID %08x\n", ntohl(req->rq_xid)); 110344b98efdSRicardo Labiaga xs_tcp_read_common(xprt, desc, req); 110444b98efdSRicardo Labiaga 110544b98efdSRicardo Labiaga if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) { 110644b98efdSRicardo Labiaga struct svc_serv *bc_serv = xprt->bc_serv; 110744b98efdSRicardo Labiaga 110844b98efdSRicardo Labiaga /* 110944b98efdSRicardo Labiaga * Add callback request to callback list. The callback 111044b98efdSRicardo Labiaga * service sleeps on the sv_cb_waitq waiting for new 111144b98efdSRicardo Labiaga * requests. Wake it up after adding enqueing the 111244b98efdSRicardo Labiaga * request. 111344b98efdSRicardo Labiaga */ 111444b98efdSRicardo Labiaga dprintk("RPC: add callback request to list\n"); 111544b98efdSRicardo Labiaga spin_lock(&bc_serv->sv_cb_lock); 111644b98efdSRicardo Labiaga list_add(&req->rq_bc_list, &bc_serv->sv_cb_list); 111744b98efdSRicardo Labiaga spin_unlock(&bc_serv->sv_cb_lock); 111844b98efdSRicardo Labiaga wake_up(&bc_serv->sv_cb_waitq); 111944b98efdSRicardo Labiaga } 112044b98efdSRicardo Labiaga 112144b98efdSRicardo Labiaga req->rq_private_buf.len = transport->tcp_copied; 112244b98efdSRicardo Labiaga 112344b98efdSRicardo Labiaga return 0; 112444b98efdSRicardo Labiaga } 112544b98efdSRicardo Labiaga 112644b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt, 112744b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 112844b98efdSRicardo Labiaga { 112944b98efdSRicardo Labiaga struct sock_xprt *transport = 113044b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 113144b98efdSRicardo Labiaga 113244b98efdSRicardo Labiaga return (transport->tcp_flags & TCP_RPC_REPLY) ? 113344b98efdSRicardo Labiaga xs_tcp_read_reply(xprt, desc) : 113444b98efdSRicardo Labiaga xs_tcp_read_callback(xprt, desc); 113544b98efdSRicardo Labiaga } 113644b98efdSRicardo Labiaga #else 113744b98efdSRicardo Labiaga static inline int _xs_tcp_read_data(struct rpc_xprt *xprt, 113844b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 113944b98efdSRicardo Labiaga { 114044b98efdSRicardo Labiaga return xs_tcp_read_reply(xprt, desc); 114144b98efdSRicardo Labiaga } 114244b98efdSRicardo Labiaga #endif /* CONFIG_NFS_V4_1 */ 114344b98efdSRicardo Labiaga 114444b98efdSRicardo Labiaga /* 114544b98efdSRicardo Labiaga * Read data off the transport. This can be either an RPC_CALL or an 114644b98efdSRicardo Labiaga * RPC_REPLY. Relay the processing to helper functions. 114744b98efdSRicardo Labiaga */ 114844b98efdSRicardo Labiaga static void xs_tcp_read_data(struct rpc_xprt *xprt, 114944b98efdSRicardo Labiaga struct xdr_skb_reader *desc) 115044b98efdSRicardo Labiaga { 115144b98efdSRicardo Labiaga struct sock_xprt *transport = 115244b98efdSRicardo Labiaga container_of(xprt, struct sock_xprt, xprt); 115344b98efdSRicardo Labiaga 115444b98efdSRicardo Labiaga if (_xs_tcp_read_data(xprt, desc) == 0) 115551971139SChuck Lever xs_tcp_check_fraghdr(transport); 115644b98efdSRicardo Labiaga else { 115744b98efdSRicardo Labiaga /* 115844b98efdSRicardo Labiaga * The transport_lock protects the request handling. 115944b98efdSRicardo Labiaga * There's no need to hold it to update the tcp_flags. 116044b98efdSRicardo Labiaga */ 116144b98efdSRicardo Labiaga transport->tcp_flags &= ~TCP_RCV_COPY_DATA; 116244b98efdSRicardo Labiaga } 1163a246b010SChuck Lever } 1164a246b010SChuck Lever 1165dd456471SChuck Lever static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc) 1166a246b010SChuck Lever { 1167a246b010SChuck Lever size_t len; 1168a246b010SChuck Lever 116951971139SChuck Lever len = transport->tcp_reclen - transport->tcp_offset; 1170a246b010SChuck Lever if (len > desc->count) 1171a246b010SChuck Lever len = desc->count; 1172a246b010SChuck Lever desc->count -= len; 1173a246b010SChuck Lever desc->offset += len; 117451971139SChuck Lever transport->tcp_offset += len; 1175a246b010SChuck Lever dprintk("RPC: discarded %Zu bytes\n", len); 117651971139SChuck Lever xs_tcp_check_fraghdr(transport); 1177a246b010SChuck Lever } 1178a246b010SChuck Lever 11799903cd1cSChuck Lever static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len) 1180a246b010SChuck Lever { 1181a246b010SChuck Lever struct rpc_xprt *xprt = rd_desc->arg.data; 118251971139SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1183dd456471SChuck Lever struct xdr_skb_reader desc = { 1184a246b010SChuck Lever .skb = skb, 1185a246b010SChuck Lever .offset = offset, 1186a246b010SChuck Lever .count = len, 1187a246b010SChuck Lever }; 1188a246b010SChuck Lever 11899903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_recv started\n"); 1190a246b010SChuck Lever do { 1191a246b010SChuck Lever /* Read in a new fragment marker if necessary */ 1192a246b010SChuck Lever /* Can we ever really expect to get completely empty fragments? */ 1193e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) { 11949903cd1cSChuck Lever xs_tcp_read_fraghdr(xprt, &desc); 1195a246b010SChuck Lever continue; 1196a246b010SChuck Lever } 1197a246b010SChuck Lever /* Read in the xid if necessary */ 1198e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_XID) { 119951971139SChuck Lever xs_tcp_read_xid(transport, &desc); 1200a246b010SChuck Lever continue; 1201a246b010SChuck Lever } 120218dca02aSRicardo Labiaga /* Read in the call/reply flag */ 1203f4a2e418SRicardo Labiaga if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) { 120418dca02aSRicardo Labiaga xs_tcp_read_calldir(transport, &desc); 120518dca02aSRicardo Labiaga continue; 120618dca02aSRicardo Labiaga } 1207a246b010SChuck Lever /* Read in the request data */ 1208e136d092SChuck Lever if (transport->tcp_flags & TCP_RCV_COPY_DATA) { 120944b98efdSRicardo Labiaga xs_tcp_read_data(xprt, &desc); 1210a246b010SChuck Lever continue; 1211a246b010SChuck Lever } 1212a246b010SChuck Lever /* Skip over any trailing bytes on short reads */ 121351971139SChuck Lever xs_tcp_read_discard(transport, &desc); 1214a246b010SChuck Lever } while (desc.count); 12159903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_recv done\n"); 1216a246b010SChuck Lever return len - desc.count; 1217a246b010SChuck Lever } 1218a246b010SChuck Lever 12199903cd1cSChuck Lever /** 12209903cd1cSChuck Lever * xs_tcp_data_ready - "data ready" callback for TCP sockets 12219903cd1cSChuck Lever * @sk: socket with data to read 12229903cd1cSChuck Lever * @bytes: how much data to read 12239903cd1cSChuck Lever * 12249903cd1cSChuck Lever */ 12259903cd1cSChuck Lever static void xs_tcp_data_ready(struct sock *sk, int bytes) 1226a246b010SChuck Lever { 1227a246b010SChuck Lever struct rpc_xprt *xprt; 1228a246b010SChuck Lever read_descriptor_t rd_desc; 1229ff2d7db8STrond Myklebust int read; 1230a246b010SChuck Lever 12319903cd1cSChuck Lever dprintk("RPC: xs_tcp_data_ready...\n"); 123246121cf7SChuck Lever 1233f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 12349903cd1cSChuck Lever if (!(xprt = xprt_from_sock(sk))) 1235a246b010SChuck Lever goto out; 1236a246b010SChuck Lever if (xprt->shutdown) 1237a246b010SChuck Lever goto out; 1238a246b010SChuck Lever 123961d0a8e6SNeil Brown /* Any data means we had a useful conversation, so 124061d0a8e6SNeil Brown * the we don't need to delay the next reconnect 124161d0a8e6SNeil Brown */ 124261d0a8e6SNeil Brown if (xprt->reestablish_timeout) 124361d0a8e6SNeil Brown xprt->reestablish_timeout = 0; 124461d0a8e6SNeil Brown 12459903cd1cSChuck Lever /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */ 1246a246b010SChuck Lever rd_desc.arg.data = xprt; 1247ff2d7db8STrond Myklebust do { 1248a246b010SChuck Lever rd_desc.count = 65536; 1249ff2d7db8STrond Myklebust read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv); 1250ff2d7db8STrond Myklebust } while (read > 0); 1251a246b010SChuck Lever out: 1252f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1253a246b010SChuck Lever } 1254a246b010SChuck Lever 12557d1e8255STrond Myklebust /* 12567d1e8255STrond Myklebust * Do the equivalent of linger/linger2 handling for dealing with 12577d1e8255STrond Myklebust * broken servers that don't close the socket in a timely 12587d1e8255STrond Myklebust * fashion 12597d1e8255STrond Myklebust */ 12607d1e8255STrond Myklebust static void xs_tcp_schedule_linger_timeout(struct rpc_xprt *xprt, 12617d1e8255STrond Myklebust unsigned long timeout) 12627d1e8255STrond Myklebust { 12637d1e8255STrond Myklebust struct sock_xprt *transport; 12647d1e8255STrond Myklebust 12657d1e8255STrond Myklebust if (xprt_test_and_set_connecting(xprt)) 12667d1e8255STrond Myklebust return; 12677d1e8255STrond Myklebust set_bit(XPRT_CONNECTION_ABORT, &xprt->state); 12687d1e8255STrond Myklebust transport = container_of(xprt, struct sock_xprt, xprt); 12697d1e8255STrond Myklebust queue_delayed_work(rpciod_workqueue, &transport->connect_worker, 12707d1e8255STrond Myklebust timeout); 12717d1e8255STrond Myklebust } 12727d1e8255STrond Myklebust 12737d1e8255STrond Myklebust static void xs_tcp_cancel_linger_timeout(struct rpc_xprt *xprt) 12747d1e8255STrond Myklebust { 12757d1e8255STrond Myklebust struct sock_xprt *transport; 12767d1e8255STrond Myklebust 12777d1e8255STrond Myklebust transport = container_of(xprt, struct sock_xprt, xprt); 12787d1e8255STrond Myklebust 12797d1e8255STrond Myklebust if (!test_bit(XPRT_CONNECTION_ABORT, &xprt->state) || 12807d1e8255STrond Myklebust !cancel_delayed_work(&transport->connect_worker)) 12817d1e8255STrond Myklebust return; 12827d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 12837d1e8255STrond Myklebust xprt_clear_connecting(xprt); 12847d1e8255STrond Myklebust } 12857d1e8255STrond Myklebust 12867d1e8255STrond Myklebust static void xs_sock_mark_closed(struct rpc_xprt *xprt) 12877d1e8255STrond Myklebust { 12887d1e8255STrond Myklebust smp_mb__before_clear_bit(); 12897d1e8255STrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 12907d1e8255STrond Myklebust clear_bit(XPRT_CLOSING, &xprt->state); 12917d1e8255STrond Myklebust smp_mb__after_clear_bit(); 12927d1e8255STrond Myklebust /* Mark transport as closed and wake up all pending tasks */ 12937d1e8255STrond Myklebust xprt_disconnect_done(xprt); 12947d1e8255STrond Myklebust } 12957d1e8255STrond Myklebust 12969903cd1cSChuck Lever /** 12979903cd1cSChuck Lever * xs_tcp_state_change - callback to handle TCP socket state changes 12989903cd1cSChuck Lever * @sk: socket whose state has changed 12999903cd1cSChuck Lever * 13009903cd1cSChuck Lever */ 13019903cd1cSChuck Lever static void xs_tcp_state_change(struct sock *sk) 1302a246b010SChuck Lever { 1303a246b010SChuck Lever struct rpc_xprt *xprt; 1304a246b010SChuck Lever 1305f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1306a246b010SChuck Lever if (!(xprt = xprt_from_sock(sk))) 1307a246b010SChuck Lever goto out; 13089903cd1cSChuck Lever dprintk("RPC: xs_tcp_state_change client %p...\n", xprt); 1309669502ffSAndy Chittenden dprintk("RPC: state %x conn %d dead %d zapped %d sk_shutdown %d\n", 1310a246b010SChuck Lever sk->sk_state, xprt_connected(xprt), 1311a246b010SChuck Lever sock_flag(sk, SOCK_DEAD), 1312669502ffSAndy Chittenden sock_flag(sk, SOCK_ZAPPED), 1313669502ffSAndy Chittenden sk->sk_shutdown); 1314a246b010SChuck Lever 1315a246b010SChuck Lever switch (sk->sk_state) { 1316a246b010SChuck Lever case TCP_ESTABLISHED: 1317f064af1eSEric Dumazet spin_lock(&xprt->transport_lock); 1318a246b010SChuck Lever if (!xprt_test_and_set_connected(xprt)) { 131951971139SChuck Lever struct sock_xprt *transport = container_of(xprt, 132051971139SChuck Lever struct sock_xprt, xprt); 132151971139SChuck Lever 1322a246b010SChuck Lever /* Reset TCP record info */ 132351971139SChuck Lever transport->tcp_offset = 0; 132451971139SChuck Lever transport->tcp_reclen = 0; 132551971139SChuck Lever transport->tcp_copied = 0; 1326e136d092SChuck Lever transport->tcp_flags = 1327e136d092SChuck Lever TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID; 132851971139SChuck Lever 13292a491991STrond Myklebust xprt_wake_pending_tasks(xprt, -EAGAIN); 1330a246b010SChuck Lever } 1331f064af1eSEric Dumazet spin_unlock(&xprt->transport_lock); 1332a246b010SChuck Lever break; 13333b948ae5STrond Myklebust case TCP_FIN_WAIT1: 13343b948ae5STrond Myklebust /* The client initiated a shutdown of the socket */ 13357c1d71cfSTrond Myklebust xprt->connect_cookie++; 1336663b8858STrond Myklebust xprt->reestablish_timeout = 0; 13373b948ae5STrond Myklebust set_bit(XPRT_CLOSING, &xprt->state); 13383b948ae5STrond Myklebust smp_mb__before_clear_bit(); 13393b948ae5STrond Myklebust clear_bit(XPRT_CONNECTED, &xprt->state); 1340ef803670STrond Myklebust clear_bit(XPRT_CLOSE_WAIT, &xprt->state); 13413b948ae5STrond Myklebust smp_mb__after_clear_bit(); 134225fe6142STrond Myklebust xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout); 1343a246b010SChuck Lever break; 1344632e3bdcSTrond Myklebust case TCP_CLOSE_WAIT: 13453b948ae5STrond Myklebust /* The server initiated a shutdown of the socket */ 134666af1e55STrond Myklebust xprt_force_disconnect(xprt); 13477c1d71cfSTrond Myklebust xprt->connect_cookie++; 1348663b8858STrond Myklebust case TCP_CLOSING: 1349663b8858STrond Myklebust /* 1350663b8858STrond Myklebust * If the server closed down the connection, make sure that 1351663b8858STrond Myklebust * we back off before reconnecting 1352663b8858STrond Myklebust */ 1353663b8858STrond Myklebust if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO) 1354663b8858STrond Myklebust xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 13553b948ae5STrond Myklebust break; 13563b948ae5STrond Myklebust case TCP_LAST_ACK: 1357670f9457STrond Myklebust set_bit(XPRT_CLOSING, &xprt->state); 135825fe6142STrond Myklebust xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout); 13593b948ae5STrond Myklebust smp_mb__before_clear_bit(); 13603b948ae5STrond Myklebust clear_bit(XPRT_CONNECTED, &xprt->state); 13613b948ae5STrond Myklebust smp_mb__after_clear_bit(); 13623b948ae5STrond Myklebust break; 13633b948ae5STrond Myklebust case TCP_CLOSE: 13647d1e8255STrond Myklebust xs_tcp_cancel_linger_timeout(xprt); 13657d1e8255STrond Myklebust xs_sock_mark_closed(xprt); 1366a246b010SChuck Lever } 1367a246b010SChuck Lever out: 1368f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1369a246b010SChuck Lever } 1370a246b010SChuck Lever 13719903cd1cSChuck Lever /** 1372482f32e6STrond Myklebust * xs_error_report - callback mainly for catching socket errors 13732a9e1cfaSTrond Myklebust * @sk: socket 13742a9e1cfaSTrond Myklebust */ 1375482f32e6STrond Myklebust static void xs_error_report(struct sock *sk) 13762a9e1cfaSTrond Myklebust { 13772a9e1cfaSTrond Myklebust struct rpc_xprt *xprt; 13782a9e1cfaSTrond Myklebust 1379f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 13802a9e1cfaSTrond Myklebust if (!(xprt = xprt_from_sock(sk))) 13812a9e1cfaSTrond Myklebust goto out; 13822a9e1cfaSTrond Myklebust dprintk("RPC: %s client %p...\n" 13832a9e1cfaSTrond Myklebust "RPC: error %d\n", 13842a9e1cfaSTrond Myklebust __func__, xprt, sk->sk_err); 1385482f32e6STrond Myklebust xprt_wake_pending_tasks(xprt, -EAGAIN); 13862a9e1cfaSTrond Myklebust out: 1387f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 13882a9e1cfaSTrond Myklebust } 13892a9e1cfaSTrond Myklebust 13901f0fa154SIlpo Järvinen static void xs_write_space(struct sock *sk) 13911f0fa154SIlpo Järvinen { 13921f0fa154SIlpo Järvinen struct socket *sock; 13931f0fa154SIlpo Järvinen struct rpc_xprt *xprt; 13941f0fa154SIlpo Järvinen 13951f0fa154SIlpo Järvinen if (unlikely(!(sock = sk->sk_socket))) 13961f0fa154SIlpo Järvinen return; 13971f0fa154SIlpo Järvinen clear_bit(SOCK_NOSPACE, &sock->flags); 13981f0fa154SIlpo Järvinen 13991f0fa154SIlpo Järvinen if (unlikely(!(xprt = xprt_from_sock(sk)))) 14001f0fa154SIlpo Järvinen return; 14011f0fa154SIlpo Järvinen if (test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags) == 0) 14021f0fa154SIlpo Järvinen return; 14031f0fa154SIlpo Järvinen 14041f0fa154SIlpo Järvinen xprt_write_space(xprt); 14051f0fa154SIlpo Järvinen } 14061f0fa154SIlpo Järvinen 14072a9e1cfaSTrond Myklebust /** 1408c7b2cae8SChuck Lever * xs_udp_write_space - callback invoked when socket buffer space 1409c7b2cae8SChuck Lever * becomes available 14109903cd1cSChuck Lever * @sk: socket whose state has changed 14119903cd1cSChuck Lever * 1412a246b010SChuck Lever * Called when more output buffer space is available for this socket. 1413a246b010SChuck Lever * We try not to wake our writers until they can make "significant" 1414c7b2cae8SChuck Lever * progress, otherwise we'll waste resources thrashing kernel_sendmsg 1415a246b010SChuck Lever * with a bunch of small requests. 1416a246b010SChuck Lever */ 1417c7b2cae8SChuck Lever static void xs_udp_write_space(struct sock *sk) 1418a246b010SChuck Lever { 1419f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1420c7b2cae8SChuck Lever 1421c7b2cae8SChuck Lever /* from net/core/sock.c:sock_def_write_space */ 14221f0fa154SIlpo Järvinen if (sock_writeable(sk)) 14231f0fa154SIlpo Järvinen xs_write_space(sk); 1424c7b2cae8SChuck Lever 1425f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1426c7b2cae8SChuck Lever } 1427c7b2cae8SChuck Lever 1428c7b2cae8SChuck Lever /** 1429c7b2cae8SChuck Lever * xs_tcp_write_space - callback invoked when socket buffer space 1430c7b2cae8SChuck Lever * becomes available 1431c7b2cae8SChuck Lever * @sk: socket whose state has changed 1432c7b2cae8SChuck Lever * 1433c7b2cae8SChuck Lever * Called when more output buffer space is available for this socket. 1434c7b2cae8SChuck Lever * We try not to wake our writers until they can make "significant" 1435c7b2cae8SChuck Lever * progress, otherwise we'll waste resources thrashing kernel_sendmsg 1436c7b2cae8SChuck Lever * with a bunch of small requests. 1437c7b2cae8SChuck Lever */ 1438c7b2cae8SChuck Lever static void xs_tcp_write_space(struct sock *sk) 1439c7b2cae8SChuck Lever { 1440f064af1eSEric Dumazet read_lock_bh(&sk->sk_callback_lock); 1441c7b2cae8SChuck Lever 1442c7b2cae8SChuck Lever /* from net/core/stream.c:sk_stream_write_space */ 14431f0fa154SIlpo Järvinen if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk)) 14441f0fa154SIlpo Järvinen xs_write_space(sk); 1445c7b2cae8SChuck Lever 1446f064af1eSEric Dumazet read_unlock_bh(&sk->sk_callback_lock); 1447a246b010SChuck Lever } 1448a246b010SChuck Lever 1449470056c2SChuck Lever static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt) 1450a246b010SChuck Lever { 1451ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1452ee0ac0c2SChuck Lever struct sock *sk = transport->inet; 1453a246b010SChuck Lever 14547c6e066eSChuck Lever if (transport->rcvsize) { 1455a246b010SChuck Lever sk->sk_userlocks |= SOCK_RCVBUF_LOCK; 14567c6e066eSChuck Lever sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2; 1457a246b010SChuck Lever } 14587c6e066eSChuck Lever if (transport->sndsize) { 1459a246b010SChuck Lever sk->sk_userlocks |= SOCK_SNDBUF_LOCK; 14607c6e066eSChuck Lever sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2; 1461a246b010SChuck Lever sk->sk_write_space(sk); 1462a246b010SChuck Lever } 1463a246b010SChuck Lever } 1464a246b010SChuck Lever 146543118c29SChuck Lever /** 1466470056c2SChuck Lever * xs_udp_set_buffer_size - set send and receive limits 146743118c29SChuck Lever * @xprt: generic transport 1468470056c2SChuck Lever * @sndsize: requested size of send buffer, in bytes 1469470056c2SChuck Lever * @rcvsize: requested size of receive buffer, in bytes 147043118c29SChuck Lever * 1471470056c2SChuck Lever * Set socket send and receive buffer size limits. 147243118c29SChuck Lever */ 1473470056c2SChuck Lever static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize) 147443118c29SChuck Lever { 14757c6e066eSChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 14767c6e066eSChuck Lever 14777c6e066eSChuck Lever transport->sndsize = 0; 1478470056c2SChuck Lever if (sndsize) 14797c6e066eSChuck Lever transport->sndsize = sndsize + 1024; 14807c6e066eSChuck Lever transport->rcvsize = 0; 1481470056c2SChuck Lever if (rcvsize) 14827c6e066eSChuck Lever transport->rcvsize = rcvsize + 1024; 1483470056c2SChuck Lever 1484470056c2SChuck Lever xs_udp_do_set_buffer_size(xprt); 148543118c29SChuck Lever } 148643118c29SChuck Lever 148746c0ee8bSChuck Lever /** 148846c0ee8bSChuck Lever * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport 148946c0ee8bSChuck Lever * @task: task that timed out 149046c0ee8bSChuck Lever * 149146c0ee8bSChuck Lever * Adjust the congestion window after a retransmit timeout has occurred. 149246c0ee8bSChuck Lever */ 149346c0ee8bSChuck Lever static void xs_udp_timer(struct rpc_task *task) 149446c0ee8bSChuck Lever { 149546c0ee8bSChuck Lever xprt_adjust_cwnd(task, -ETIMEDOUT); 149646c0ee8bSChuck Lever } 149746c0ee8bSChuck Lever 1498b85d8806SChuck Lever static unsigned short xs_get_random_port(void) 1499b85d8806SChuck Lever { 1500b85d8806SChuck Lever unsigned short range = xprt_max_resvport - xprt_min_resvport; 1501b85d8806SChuck Lever unsigned short rand = (unsigned short) net_random() % range; 1502b85d8806SChuck Lever return rand + xprt_min_resvport; 1503b85d8806SChuck Lever } 1504b85d8806SChuck Lever 150592200412SChuck Lever /** 150692200412SChuck Lever * xs_set_port - reset the port number in the remote endpoint address 150792200412SChuck Lever * @xprt: generic transport 150892200412SChuck Lever * @port: new port number 150992200412SChuck Lever * 151092200412SChuck Lever */ 151192200412SChuck Lever static void xs_set_port(struct rpc_xprt *xprt, unsigned short port) 151292200412SChuck Lever { 151392200412SChuck Lever dprintk("RPC: setting port for xprt %p to %u\n", xprt, port); 1514c4efcb1dSChuck Lever 15159dc3b095SChuck Lever rpc_set_port(xs_addr(xprt), port); 15169dc3b095SChuck Lever xs_update_peer_port(xprt); 151792200412SChuck Lever } 151892200412SChuck Lever 15195d4ec932SPavel Emelyanov static unsigned short xs_get_srcport(struct sock_xprt *transport) 152067a391d7STrond Myklebust { 1521fbfffbd5SChuck Lever unsigned short port = transport->srcport; 152267a391d7STrond Myklebust 152367a391d7STrond Myklebust if (port == 0 && transport->xprt.resvport) 152467a391d7STrond Myklebust port = xs_get_random_port(); 152567a391d7STrond Myklebust return port; 152667a391d7STrond Myklebust } 152767a391d7STrond Myklebust 1528baaf4e48SPavel Emelyanov static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port) 152967a391d7STrond Myklebust { 1530fbfffbd5SChuck Lever if (transport->srcport != 0) 1531fbfffbd5SChuck Lever transport->srcport = 0; 153267a391d7STrond Myklebust if (!transport->xprt.resvport) 153367a391d7STrond Myklebust return 0; 153467a391d7STrond Myklebust if (port <= xprt_min_resvport || port > xprt_max_resvport) 153567a391d7STrond Myklebust return xprt_max_resvport; 153667a391d7STrond Myklebust return --port; 153767a391d7STrond Myklebust } 1538beb59b68SPavel Emelyanov static int xs_bind(struct sock_xprt *transport, struct socket *sock) 1539a246b010SChuck Lever { 1540beb59b68SPavel Emelyanov struct sockaddr_storage myaddr; 154167a391d7STrond Myklebust int err, nloop = 0; 15425d4ec932SPavel Emelyanov unsigned short port = xs_get_srcport(transport); 154367a391d7STrond Myklebust unsigned short last; 1544a246b010SChuck Lever 1545beb59b68SPavel Emelyanov memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen); 1546a246b010SChuck Lever do { 1547beb59b68SPavel Emelyanov rpc_set_port((struct sockaddr *)&myaddr, port); 1548e6242e92SSridhar Samudrala err = kernel_bind(sock, (struct sockaddr *)&myaddr, 1549beb59b68SPavel Emelyanov transport->xprt.addrlen); 155067a391d7STrond Myklebust if (port == 0) 1551d3bc9a1dSFrank van Maarseveen break; 1552a246b010SChuck Lever if (err == 0) { 1553fbfffbd5SChuck Lever transport->srcport = port; 1554d3bc9a1dSFrank van Maarseveen break; 1555a246b010SChuck Lever } 155667a391d7STrond Myklebust last = port; 1557baaf4e48SPavel Emelyanov port = xs_next_srcport(transport, port); 155867a391d7STrond Myklebust if (port > last) 155967a391d7STrond Myklebust nloop++; 156067a391d7STrond Myklebust } while (err == -EADDRINUSE && nloop != 2); 1561beb59b68SPavel Emelyanov 15624232e863SChuck Lever if (myaddr.ss_family == AF_INET) 1563beb59b68SPavel Emelyanov dprintk("RPC: %s %pI4:%u: %s (%d)\n", __func__, 1564beb59b68SPavel Emelyanov &((struct sockaddr_in *)&myaddr)->sin_addr, 1565beb59b68SPavel Emelyanov port, err ? "failed" : "ok", err); 1566beb59b68SPavel Emelyanov else 1567beb59b68SPavel Emelyanov dprintk("RPC: %s %pI6:%u: %s (%d)\n", __func__, 1568beb59b68SPavel Emelyanov &((struct sockaddr_in6 *)&myaddr)->sin6_addr, 15697dc753f0SChuck Lever port, err ? "failed" : "ok", err); 1570a246b010SChuck Lever return err; 1571a246b010SChuck Lever } 1572a246b010SChuck Lever 1573a246b010SChuck Lever 1574ed07536eSPeter Zijlstra #ifdef CONFIG_DEBUG_LOCK_ALLOC 1575ed07536eSPeter Zijlstra static struct lock_class_key xs_key[2]; 1576ed07536eSPeter Zijlstra static struct lock_class_key xs_slock_key[2]; 1577ed07536eSPeter Zijlstra 15788945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock) 1579ed07536eSPeter Zijlstra { 1580ed07536eSPeter Zijlstra struct sock *sk = sock->sk; 15818945ee5eSChuck Lever 158202b3d346SJohn Heffner BUG_ON(sock_owned_by_user(sk)); 15838945ee5eSChuck Lever sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC", 15848945ee5eSChuck Lever &xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]); 1585ed07536eSPeter Zijlstra } 15868945ee5eSChuck Lever 15878945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock) 15888945ee5eSChuck Lever { 15898945ee5eSChuck Lever struct sock *sk = sock->sk; 15908945ee5eSChuck Lever 1591f4921affSLinus Torvalds BUG_ON(sock_owned_by_user(sk)); 15928945ee5eSChuck Lever sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC", 15938945ee5eSChuck Lever &xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]); 1594ed07536eSPeter Zijlstra } 15956bc9638aSPavel Emelyanov 15966bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock) 15976bc9638aSPavel Emelyanov { 15984232e863SChuck Lever switch (family) { 15994232e863SChuck Lever case AF_INET: 16006bc9638aSPavel Emelyanov xs_reclassify_socket4(sock); 16014232e863SChuck Lever break; 16024232e863SChuck Lever case AF_INET6: 16036bc9638aSPavel Emelyanov xs_reclassify_socket6(sock); 16044232e863SChuck Lever break; 16054232e863SChuck Lever } 16066bc9638aSPavel Emelyanov } 1607ed07536eSPeter Zijlstra #else 16088945ee5eSChuck Lever static inline void xs_reclassify_socket4(struct socket *sock) 16098945ee5eSChuck Lever { 16108945ee5eSChuck Lever } 16118945ee5eSChuck Lever 16128945ee5eSChuck Lever static inline void xs_reclassify_socket6(struct socket *sock) 1613ed07536eSPeter Zijlstra { 1614ed07536eSPeter Zijlstra } 16156bc9638aSPavel Emelyanov 16166bc9638aSPavel Emelyanov static inline void xs_reclassify_socket(int family, struct socket *sock) 16176bc9638aSPavel Emelyanov { 16186bc9638aSPavel Emelyanov } 1619ed07536eSPeter Zijlstra #endif 1620ed07536eSPeter Zijlstra 16216bc9638aSPavel Emelyanov static struct socket *xs_create_sock(struct rpc_xprt *xprt, 16226bc9638aSPavel Emelyanov struct sock_xprt *transport, int family, int type, int protocol) 162322f79326SPavel Emelyanov { 162422f79326SPavel Emelyanov struct socket *sock; 162522f79326SPavel Emelyanov int err; 162622f79326SPavel Emelyanov 16276bc9638aSPavel Emelyanov err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1); 162822f79326SPavel Emelyanov if (err < 0) { 162922f79326SPavel Emelyanov dprintk("RPC: can't create %d transport socket (%d).\n", 163022f79326SPavel Emelyanov protocol, -err); 163122f79326SPavel Emelyanov goto out; 163222f79326SPavel Emelyanov } 16336bc9638aSPavel Emelyanov xs_reclassify_socket(family, sock); 163422f79326SPavel Emelyanov 16354cea288aSBen Hutchings err = xs_bind(transport, sock); 16364cea288aSBen Hutchings if (err) { 163722f79326SPavel Emelyanov sock_release(sock); 163822f79326SPavel Emelyanov goto out; 163922f79326SPavel Emelyanov } 164022f79326SPavel Emelyanov 164122f79326SPavel Emelyanov return sock; 164222f79326SPavel Emelyanov out: 164322f79326SPavel Emelyanov return ERR_PTR(err); 164422f79326SPavel Emelyanov } 164522f79326SPavel Emelyanov 164616be2d20SChuck Lever static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock) 1647a246b010SChuck Lever { 164816be2d20SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1649edb267a6SChuck Lever 1650ee0ac0c2SChuck Lever if (!transport->inet) { 1651b0d93ad5SChuck Lever struct sock *sk = sock->sk; 1652b0d93ad5SChuck Lever 1653b0d93ad5SChuck Lever write_lock_bh(&sk->sk_callback_lock); 1654b0d93ad5SChuck Lever 16552a9e1cfaSTrond Myklebust xs_save_old_callbacks(transport, sk); 16562a9e1cfaSTrond Myklebust 1657b0d93ad5SChuck Lever sk->sk_user_data = xprt; 1658b0d93ad5SChuck Lever sk->sk_data_ready = xs_udp_data_ready; 1659b0d93ad5SChuck Lever sk->sk_write_space = xs_udp_write_space; 1660482f32e6STrond Myklebust sk->sk_error_report = xs_error_report; 1661b0d93ad5SChuck Lever sk->sk_no_check = UDP_CSUM_NORCV; 1662b079fa7bSTrond Myklebust sk->sk_allocation = GFP_ATOMIC; 1663b0d93ad5SChuck Lever 1664b0d93ad5SChuck Lever xprt_set_connected(xprt); 1665b0d93ad5SChuck Lever 1666b0d93ad5SChuck Lever /* Reset to new socket */ 1667ee0ac0c2SChuck Lever transport->sock = sock; 1668ee0ac0c2SChuck Lever transport->inet = sk; 1669b0d93ad5SChuck Lever 1670b0d93ad5SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 1671b0d93ad5SChuck Lever } 1672470056c2SChuck Lever xs_udp_do_set_buffer_size(xprt); 167316be2d20SChuck Lever } 167416be2d20SChuck Lever 16758c14ff2aSPavel Emelyanov static void xs_udp_setup_socket(struct work_struct *work) 1676a246b010SChuck Lever { 1677a246b010SChuck Lever struct sock_xprt *transport = 1678a246b010SChuck Lever container_of(work, struct sock_xprt, connect_worker.work); 1679a246b010SChuck Lever struct rpc_xprt *xprt = &transport->xprt; 1680a246b010SChuck Lever struct socket *sock = transport->sock; 1681b65c0310SPavel Emelyanov int status = -EIO; 1682a246b010SChuck Lever 168301d37c42STrond Myklebust if (xprt->shutdown) 16849903cd1cSChuck Lever goto out; 16859903cd1cSChuck Lever 1686a246b010SChuck Lever /* Start by resetting any existing state */ 1687fe315e76SChuck Lever xs_reset_transport(transport); 16888c14ff2aSPavel Emelyanov sock = xs_create_sock(xprt, transport, 16898c14ff2aSPavel Emelyanov xs_addr(xprt)->sa_family, SOCK_DGRAM, IPPROTO_UDP); 1690b65c0310SPavel Emelyanov if (IS_ERR(sock)) 1691a246b010SChuck Lever goto out; 169268e220bdSChuck Lever 1693c740eff8SChuck Lever dprintk("RPC: worker connecting xprt %p via %s to " 1694c740eff8SChuck Lever "%s (port %s)\n", xprt, 1695c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO], 1696c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 1697c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT]); 169868e220bdSChuck Lever 169968e220bdSChuck Lever xs_udp_finish_connecting(xprt, sock); 1700a246b010SChuck Lever status = 0; 1701b0d93ad5SChuck Lever out: 1702b0d93ad5SChuck Lever xprt_clear_connecting(xprt); 17037d1e8255STrond Myklebust xprt_wake_pending_tasks(xprt, status); 1704b0d93ad5SChuck Lever } 1705b0d93ad5SChuck Lever 17063167e12cSChuck Lever /* 17073167e12cSChuck Lever * We need to preserve the port number so the reply cache on the server can 17083167e12cSChuck Lever * find our cached RPC replies when we get around to reconnecting. 17093167e12cSChuck Lever */ 171058dddac9SPavel Emelyanov static void xs_abort_connection(struct sock_xprt *transport) 17113167e12cSChuck Lever { 17123167e12cSChuck Lever int result; 17133167e12cSChuck Lever struct sockaddr any; 17143167e12cSChuck Lever 171558dddac9SPavel Emelyanov dprintk("RPC: disconnecting xprt %p to reuse port\n", transport); 17163167e12cSChuck Lever 17173167e12cSChuck Lever /* 17183167e12cSChuck Lever * Disconnect the transport socket by doing a connect operation 17193167e12cSChuck Lever * with AF_UNSPEC. This should return immediately... 17203167e12cSChuck Lever */ 17213167e12cSChuck Lever memset(&any, 0, sizeof(any)); 17223167e12cSChuck Lever any.sa_family = AF_UNSPEC; 1723ee0ac0c2SChuck Lever result = kernel_connect(transport->sock, &any, sizeof(any), 0); 17247d1e8255STrond Myklebust if (!result) 172558dddac9SPavel Emelyanov xs_sock_mark_closed(&transport->xprt); 17267d1e8255STrond Myklebust else 17273167e12cSChuck Lever dprintk("RPC: AF_UNSPEC connect return code %d\n", 17283167e12cSChuck Lever result); 17293167e12cSChuck Lever } 17303167e12cSChuck Lever 173158dddac9SPavel Emelyanov static void xs_tcp_reuse_connection(struct sock_xprt *transport) 173240d2549dSTrond Myklebust { 173340d2549dSTrond Myklebust unsigned int state = transport->inet->sk_state; 173440d2549dSTrond Myklebust 1735669502ffSAndy Chittenden if (state == TCP_CLOSE && transport->sock->state == SS_UNCONNECTED) { 1736669502ffSAndy Chittenden /* we don't need to abort the connection if the socket 1737669502ffSAndy Chittenden * hasn't undergone a shutdown 1738669502ffSAndy Chittenden */ 1739669502ffSAndy Chittenden if (transport->inet->sk_shutdown == 0) 174040d2549dSTrond Myklebust return; 1741669502ffSAndy Chittenden dprintk("RPC: %s: TCP_CLOSEd and sk_shutdown set to %d\n", 1742669502ffSAndy Chittenden __func__, transport->inet->sk_shutdown); 1743669502ffSAndy Chittenden } 1744669502ffSAndy Chittenden if ((1 << state) & (TCPF_ESTABLISHED|TCPF_SYN_SENT)) { 1745669502ffSAndy Chittenden /* we don't need to abort the connection if the socket 1746669502ffSAndy Chittenden * hasn't undergone a shutdown 1747669502ffSAndy Chittenden */ 1748669502ffSAndy Chittenden if (transport->inet->sk_shutdown == 0) 174940d2549dSTrond Myklebust return; 1750669502ffSAndy Chittenden dprintk("RPC: %s: ESTABLISHED/SYN_SENT " 1751669502ffSAndy Chittenden "sk_shutdown set to %d\n", 1752669502ffSAndy Chittenden __func__, transport->inet->sk_shutdown); 1753669502ffSAndy Chittenden } 175458dddac9SPavel Emelyanov xs_abort_connection(transport); 175540d2549dSTrond Myklebust } 175640d2549dSTrond Myklebust 175716be2d20SChuck Lever static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock) 1758b0d93ad5SChuck Lever { 175916be2d20SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1760*fe19a96bSTrond Myklebust int ret = -ENOTCONN; 1761edb267a6SChuck Lever 1762ee0ac0c2SChuck Lever if (!transport->inet) { 1763b0d93ad5SChuck Lever struct sock *sk = sock->sk; 1764b0d93ad5SChuck Lever 1765b0d93ad5SChuck Lever write_lock_bh(&sk->sk_callback_lock); 1766b0d93ad5SChuck Lever 17672a9e1cfaSTrond Myklebust xs_save_old_callbacks(transport, sk); 17682a9e1cfaSTrond Myklebust 1769b0d93ad5SChuck Lever sk->sk_user_data = xprt; 1770b0d93ad5SChuck Lever sk->sk_data_ready = xs_tcp_data_ready; 1771b0d93ad5SChuck Lever sk->sk_state_change = xs_tcp_state_change; 1772b0d93ad5SChuck Lever sk->sk_write_space = xs_tcp_write_space; 1773482f32e6STrond Myklebust sk->sk_error_report = xs_error_report; 1774b079fa7bSTrond Myklebust sk->sk_allocation = GFP_ATOMIC; 17753167e12cSChuck Lever 17763167e12cSChuck Lever /* socket options */ 17773167e12cSChuck Lever sk->sk_userlocks |= SOCK_BINDPORT_LOCK; 17783167e12cSChuck Lever sock_reset_flag(sk, SOCK_LINGER); 17793167e12cSChuck Lever tcp_sk(sk)->linger2 = 0; 17803167e12cSChuck Lever tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF; 1781b0d93ad5SChuck Lever 1782b0d93ad5SChuck Lever xprt_clear_connected(xprt); 1783b0d93ad5SChuck Lever 1784b0d93ad5SChuck Lever /* Reset to new socket */ 1785ee0ac0c2SChuck Lever transport->sock = sock; 1786ee0ac0c2SChuck Lever transport->inet = sk; 1787b0d93ad5SChuck Lever 1788b0d93ad5SChuck Lever write_unlock_bh(&sk->sk_callback_lock); 1789b0d93ad5SChuck Lever } 1790b0d93ad5SChuck Lever 179101d37c42STrond Myklebust if (!xprt_bound(xprt)) 1792*fe19a96bSTrond Myklebust goto out; 179301d37c42STrond Myklebust 1794b0d93ad5SChuck Lever /* Tell the socket layer to start connecting... */ 1795262ca07dSChuck Lever xprt->stat.connect_count++; 1796262ca07dSChuck Lever xprt->stat.connect_start = jiffies; 1797*fe19a96bSTrond Myklebust ret = kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK); 1798*fe19a96bSTrond Myklebust switch (ret) { 1799*fe19a96bSTrond Myklebust case 0: 1800*fe19a96bSTrond Myklebust case -EINPROGRESS: 1801*fe19a96bSTrond Myklebust /* SYN_SENT! */ 1802*fe19a96bSTrond Myklebust xprt->connect_cookie++; 1803*fe19a96bSTrond Myklebust if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO) 1804*fe19a96bSTrond Myklebust xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 1805*fe19a96bSTrond Myklebust } 1806*fe19a96bSTrond Myklebust out: 1807*fe19a96bSTrond Myklebust return ret; 180816be2d20SChuck Lever } 180916be2d20SChuck Lever 181016be2d20SChuck Lever /** 1811b61d59ffSTrond Myklebust * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint 1812b61d59ffSTrond Myklebust * @xprt: RPC transport to connect 1813b61d59ffSTrond Myklebust * @transport: socket transport to connect 1814b61d59ffSTrond Myklebust * @create_sock: function to create a socket of the correct type 181516be2d20SChuck Lever * 181616be2d20SChuck Lever * Invoked by a work queue tasklet. 181716be2d20SChuck Lever */ 1818cdd518d5SPavel Emelyanov static void xs_tcp_setup_socket(struct work_struct *work) 181916be2d20SChuck Lever { 1820cdd518d5SPavel Emelyanov struct sock_xprt *transport = 1821cdd518d5SPavel Emelyanov container_of(work, struct sock_xprt, connect_worker.work); 182216be2d20SChuck Lever struct socket *sock = transport->sock; 1823a9f5f0f7SPavel Emelyanov struct rpc_xprt *xprt = &transport->xprt; 1824b61d59ffSTrond Myklebust int status = -EIO; 182516be2d20SChuck Lever 182601d37c42STrond Myklebust if (xprt->shutdown) 182716be2d20SChuck Lever goto out; 182816be2d20SChuck Lever 182916be2d20SChuck Lever if (!sock) { 18307d1e8255STrond Myklebust clear_bit(XPRT_CONNECTION_ABORT, &xprt->state); 1831cdd518d5SPavel Emelyanov sock = xs_create_sock(xprt, transport, 1832cdd518d5SPavel Emelyanov xs_addr(xprt)->sa_family, SOCK_STREAM, IPPROTO_TCP); 1833b61d59ffSTrond Myklebust if (IS_ERR(sock)) { 1834b61d59ffSTrond Myklebust status = PTR_ERR(sock); 183516be2d20SChuck Lever goto out; 183616be2d20SChuck Lever } 18377d1e8255STrond Myklebust } else { 18387d1e8255STrond Myklebust int abort_and_exit; 18397d1e8255STrond Myklebust 18407d1e8255STrond Myklebust abort_and_exit = test_and_clear_bit(XPRT_CONNECTION_ABORT, 18417d1e8255STrond Myklebust &xprt->state); 184216be2d20SChuck Lever /* "close" the socket, preserving the local port */ 184358dddac9SPavel Emelyanov xs_tcp_reuse_connection(transport); 184416be2d20SChuck Lever 18457d1e8255STrond Myklebust if (abort_and_exit) 18467d1e8255STrond Myklebust goto out_eagain; 18477d1e8255STrond Myklebust } 18487d1e8255STrond Myklebust 1849c740eff8SChuck Lever dprintk("RPC: worker connecting xprt %p via %s to " 1850c740eff8SChuck Lever "%s (port %s)\n", xprt, 1851c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO], 1852c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 1853c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT]); 185416be2d20SChuck Lever 185516be2d20SChuck Lever status = xs_tcp_finish_connecting(xprt, sock); 1856a246b010SChuck Lever dprintk("RPC: %p connect status %d connected %d sock state %d\n", 185746121cf7SChuck Lever xprt, -status, xprt_connected(xprt), 185846121cf7SChuck Lever sock->sk->sk_state); 1859a246b010SChuck Lever switch (status) { 1860f75e6745STrond Myklebust default: 1861f75e6745STrond Myklebust printk("%s: connect returned unhandled error %d\n", 1862f75e6745STrond Myklebust __func__, status); 1863f75e6745STrond Myklebust case -EADDRNOTAVAIL: 1864f75e6745STrond Myklebust /* We're probably in TIME_WAIT. Get rid of existing socket, 1865f75e6745STrond Myklebust * and retry 1866f75e6745STrond Myklebust */ 1867f75e6745STrond Myklebust set_bit(XPRT_CONNECTION_CLOSE, &xprt->state); 1868f75e6745STrond Myklebust xprt_force_disconnect(xprt); 186988b5ed73STrond Myklebust break; 18708a2cec29STrond Myklebust case -ECONNREFUSED: 18718a2cec29STrond Myklebust case -ECONNRESET: 18728a2cec29STrond Myklebust case -ENETUNREACH: 18738a2cec29STrond Myklebust /* retry with existing socket, after a delay */ 18742a491991STrond Myklebust case 0: 1875a246b010SChuck Lever case -EINPROGRESS: 1876a246b010SChuck Lever case -EALREADY: 18777d1e8255STrond Myklebust xprt_clear_connecting(xprt); 18787d1e8255STrond Myklebust return; 18799fcfe0c8STrond Myklebust case -EINVAL: 18809fcfe0c8STrond Myklebust /* Happens, for instance, if the user specified a link 18819fcfe0c8STrond Myklebust * local IPv6 address without a scope-id. 18829fcfe0c8STrond Myklebust */ 18839fcfe0c8STrond Myklebust goto out; 18848a2cec29STrond Myklebust } 18857d1e8255STrond Myklebust out_eagain: 18862a491991STrond Myklebust status = -EAGAIN; 1887a246b010SChuck Lever out: 18882226feb6SChuck Lever xprt_clear_connecting(xprt); 18897d1e8255STrond Myklebust xprt_wake_pending_tasks(xprt, status); 1890a246b010SChuck Lever } 1891a246b010SChuck Lever 189268e220bdSChuck Lever /** 18939903cd1cSChuck Lever * xs_connect - connect a socket to a remote endpoint 18949903cd1cSChuck Lever * @task: address of RPC task that manages state of connect request 18959903cd1cSChuck Lever * 18969903cd1cSChuck Lever * TCP: If the remote end dropped the connection, delay reconnecting. 189703bf4b70SChuck Lever * 189803bf4b70SChuck Lever * UDP socket connects are synchronous, but we use a work queue anyway 189903bf4b70SChuck Lever * to guarantee that even unprivileged user processes can set up a 190003bf4b70SChuck Lever * socket on a privileged port. 190103bf4b70SChuck Lever * 190203bf4b70SChuck Lever * If a UDP socket connect fails, the delay behavior here prevents 190303bf4b70SChuck Lever * retry floods (hard mounts). 19049903cd1cSChuck Lever */ 19059903cd1cSChuck Lever static void xs_connect(struct rpc_task *task) 1906a246b010SChuck Lever { 1907a246b010SChuck Lever struct rpc_xprt *xprt = task->tk_xprt; 1908ee0ac0c2SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1909a246b010SChuck Lever 191009a21c41SChuck Lever if (transport->sock != NULL && !RPC_IS_SOFTCONN(task)) { 191146121cf7SChuck Lever dprintk("RPC: xs_connect delayed xprt %p for %lu " 191246121cf7SChuck Lever "seconds\n", 191303bf4b70SChuck Lever xprt, xprt->reestablish_timeout / HZ); 1914c1384c9cSTrond Myklebust queue_delayed_work(rpciod_workqueue, 1915c1384c9cSTrond Myklebust &transport->connect_worker, 191603bf4b70SChuck Lever xprt->reestablish_timeout); 191703bf4b70SChuck Lever xprt->reestablish_timeout <<= 1; 191861d0a8e6SNeil Brown if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO) 191961d0a8e6SNeil Brown xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 192003bf4b70SChuck Lever if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO) 192103bf4b70SChuck Lever xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO; 19229903cd1cSChuck Lever } else { 19239903cd1cSChuck Lever dprintk("RPC: xs_connect scheduled xprt %p\n", xprt); 1924c1384c9cSTrond Myklebust queue_delayed_work(rpciod_workqueue, 1925c1384c9cSTrond Myklebust &transport->connect_worker, 0); 1926a246b010SChuck Lever } 1927a246b010SChuck Lever } 1928a246b010SChuck Lever 1929262ca07dSChuck Lever /** 1930262ca07dSChuck Lever * xs_udp_print_stats - display UDP socket-specifc stats 1931262ca07dSChuck Lever * @xprt: rpc_xprt struct containing statistics 1932262ca07dSChuck Lever * @seq: output file 1933262ca07dSChuck Lever * 1934262ca07dSChuck Lever */ 1935262ca07dSChuck Lever static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq) 1936262ca07dSChuck Lever { 1937c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1938c8475461SChuck Lever 1939262ca07dSChuck Lever seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n", 1940fbfffbd5SChuck Lever transport->srcport, 1941262ca07dSChuck Lever xprt->stat.bind_count, 1942262ca07dSChuck Lever xprt->stat.sends, 1943262ca07dSChuck Lever xprt->stat.recvs, 1944262ca07dSChuck Lever xprt->stat.bad_xids, 1945262ca07dSChuck Lever xprt->stat.req_u, 1946262ca07dSChuck Lever xprt->stat.bklog_u); 1947262ca07dSChuck Lever } 1948262ca07dSChuck Lever 1949262ca07dSChuck Lever /** 1950262ca07dSChuck Lever * xs_tcp_print_stats - display TCP socket-specifc stats 1951262ca07dSChuck Lever * @xprt: rpc_xprt struct containing statistics 1952262ca07dSChuck Lever * @seq: output file 1953262ca07dSChuck Lever * 1954262ca07dSChuck Lever */ 1955262ca07dSChuck Lever static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq) 1956262ca07dSChuck Lever { 1957c8475461SChuck Lever struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt); 1958262ca07dSChuck Lever long idle_time = 0; 1959262ca07dSChuck Lever 1960262ca07dSChuck Lever if (xprt_connected(xprt)) 1961262ca07dSChuck Lever idle_time = (long)(jiffies - xprt->last_used) / HZ; 1962262ca07dSChuck Lever 1963262ca07dSChuck Lever seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n", 1964fbfffbd5SChuck Lever transport->srcport, 1965262ca07dSChuck Lever xprt->stat.bind_count, 1966262ca07dSChuck Lever xprt->stat.connect_count, 1967262ca07dSChuck Lever xprt->stat.connect_time, 1968262ca07dSChuck Lever idle_time, 1969262ca07dSChuck Lever xprt->stat.sends, 1970262ca07dSChuck Lever xprt->stat.recvs, 1971262ca07dSChuck Lever xprt->stat.bad_xids, 1972262ca07dSChuck Lever xprt->stat.req_u, 1973262ca07dSChuck Lever xprt->stat.bklog_u); 1974262ca07dSChuck Lever } 1975262ca07dSChuck Lever 19764cfc7e60SRahul Iyer /* 19774cfc7e60SRahul Iyer * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason 19784cfc7e60SRahul Iyer * we allocate pages instead doing a kmalloc like rpc_malloc is because we want 19794cfc7e60SRahul Iyer * to use the server side send routines. 19804cfc7e60SRahul Iyer */ 19815a51f13aSH Hartley Sweeten static void *bc_malloc(struct rpc_task *task, size_t size) 19824cfc7e60SRahul Iyer { 19834cfc7e60SRahul Iyer struct page *page; 19844cfc7e60SRahul Iyer struct rpc_buffer *buf; 19854cfc7e60SRahul Iyer 19864cfc7e60SRahul Iyer BUG_ON(size > PAGE_SIZE - sizeof(struct rpc_buffer)); 19874cfc7e60SRahul Iyer page = alloc_page(GFP_KERNEL); 19884cfc7e60SRahul Iyer 19894cfc7e60SRahul Iyer if (!page) 19904cfc7e60SRahul Iyer return NULL; 19914cfc7e60SRahul Iyer 19924cfc7e60SRahul Iyer buf = page_address(page); 19934cfc7e60SRahul Iyer buf->len = PAGE_SIZE; 19944cfc7e60SRahul Iyer 19954cfc7e60SRahul Iyer return buf->data; 19964cfc7e60SRahul Iyer } 19974cfc7e60SRahul Iyer 19984cfc7e60SRahul Iyer /* 19994cfc7e60SRahul Iyer * Free the space allocated in the bc_alloc routine 20004cfc7e60SRahul Iyer */ 20015a51f13aSH Hartley Sweeten static void bc_free(void *buffer) 20024cfc7e60SRahul Iyer { 20034cfc7e60SRahul Iyer struct rpc_buffer *buf; 20044cfc7e60SRahul Iyer 20054cfc7e60SRahul Iyer if (!buffer) 20064cfc7e60SRahul Iyer return; 20074cfc7e60SRahul Iyer 20084cfc7e60SRahul Iyer buf = container_of(buffer, struct rpc_buffer, data); 20094cfc7e60SRahul Iyer free_page((unsigned long)buf); 20104cfc7e60SRahul Iyer } 20114cfc7e60SRahul Iyer 20124cfc7e60SRahul Iyer /* 20134cfc7e60SRahul Iyer * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex 20144cfc7e60SRahul Iyer * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request. 20154cfc7e60SRahul Iyer */ 20164cfc7e60SRahul Iyer static int bc_sendto(struct rpc_rqst *req) 20174cfc7e60SRahul Iyer { 20184cfc7e60SRahul Iyer int len; 20194cfc7e60SRahul Iyer struct xdr_buf *xbufp = &req->rq_snd_buf; 20204cfc7e60SRahul Iyer struct rpc_xprt *xprt = req->rq_xprt; 20214cfc7e60SRahul Iyer struct sock_xprt *transport = 20224cfc7e60SRahul Iyer container_of(xprt, struct sock_xprt, xprt); 20234cfc7e60SRahul Iyer struct socket *sock = transport->sock; 20244cfc7e60SRahul Iyer unsigned long headoff; 20254cfc7e60SRahul Iyer unsigned long tailoff; 20264cfc7e60SRahul Iyer 20274cfc7e60SRahul Iyer /* 20284cfc7e60SRahul Iyer * Set up the rpc header and record marker stuff 20294cfc7e60SRahul Iyer */ 20304cfc7e60SRahul Iyer xs_encode_tcp_record_marker(xbufp); 20314cfc7e60SRahul Iyer 20324cfc7e60SRahul Iyer tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK; 20334cfc7e60SRahul Iyer headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK; 20344cfc7e60SRahul Iyer len = svc_send_common(sock, xbufp, 20354cfc7e60SRahul Iyer virt_to_page(xbufp->head[0].iov_base), headoff, 20364cfc7e60SRahul Iyer xbufp->tail[0].iov_base, tailoff); 20374cfc7e60SRahul Iyer 20384cfc7e60SRahul Iyer if (len != xbufp->len) { 20394cfc7e60SRahul Iyer printk(KERN_NOTICE "Error sending entire callback!\n"); 20404cfc7e60SRahul Iyer len = -EAGAIN; 20414cfc7e60SRahul Iyer } 20424cfc7e60SRahul Iyer 20434cfc7e60SRahul Iyer return len; 20444cfc7e60SRahul Iyer } 20454cfc7e60SRahul Iyer 20464cfc7e60SRahul Iyer /* 20474cfc7e60SRahul Iyer * The send routine. Borrows from svc_send 20484cfc7e60SRahul Iyer */ 20494cfc7e60SRahul Iyer static int bc_send_request(struct rpc_task *task) 20504cfc7e60SRahul Iyer { 20514cfc7e60SRahul Iyer struct rpc_rqst *req = task->tk_rqstp; 20524cfc7e60SRahul Iyer struct svc_xprt *xprt; 20534cfc7e60SRahul Iyer struct svc_sock *svsk; 20544cfc7e60SRahul Iyer u32 len; 20554cfc7e60SRahul Iyer 20564cfc7e60SRahul Iyer dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid)); 20574cfc7e60SRahul Iyer /* 20584cfc7e60SRahul Iyer * Get the server socket associated with this callback xprt 20594cfc7e60SRahul Iyer */ 20604cfc7e60SRahul Iyer xprt = req->rq_xprt->bc_xprt; 20614cfc7e60SRahul Iyer svsk = container_of(xprt, struct svc_sock, sk_xprt); 20624cfc7e60SRahul Iyer 20634cfc7e60SRahul Iyer /* 20644cfc7e60SRahul Iyer * Grab the mutex to serialize data as the connection is shared 20654cfc7e60SRahul Iyer * with the fore channel 20664cfc7e60SRahul Iyer */ 20674cfc7e60SRahul Iyer if (!mutex_trylock(&xprt->xpt_mutex)) { 20684cfc7e60SRahul Iyer rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL); 20694cfc7e60SRahul Iyer if (!mutex_trylock(&xprt->xpt_mutex)) 20704cfc7e60SRahul Iyer return -EAGAIN; 20714cfc7e60SRahul Iyer rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task); 20724cfc7e60SRahul Iyer } 20734cfc7e60SRahul Iyer if (test_bit(XPT_DEAD, &xprt->xpt_flags)) 20744cfc7e60SRahul Iyer len = -ENOTCONN; 20754cfc7e60SRahul Iyer else 20764cfc7e60SRahul Iyer len = bc_sendto(req); 20774cfc7e60SRahul Iyer mutex_unlock(&xprt->xpt_mutex); 20784cfc7e60SRahul Iyer 20794cfc7e60SRahul Iyer if (len > 0) 20804cfc7e60SRahul Iyer len = 0; 20814cfc7e60SRahul Iyer 20824cfc7e60SRahul Iyer return len; 20834cfc7e60SRahul Iyer } 20844cfc7e60SRahul Iyer 20854cfc7e60SRahul Iyer /* 20864cfc7e60SRahul Iyer * The close routine. Since this is client initiated, we do nothing 20874cfc7e60SRahul Iyer */ 20884cfc7e60SRahul Iyer 20894cfc7e60SRahul Iyer static void bc_close(struct rpc_xprt *xprt) 20904cfc7e60SRahul Iyer { 20914cfc7e60SRahul Iyer } 20924cfc7e60SRahul Iyer 20934cfc7e60SRahul Iyer /* 20944cfc7e60SRahul Iyer * The xprt destroy routine. Again, because this connection is client 20954cfc7e60SRahul Iyer * initiated, we do nothing 20964cfc7e60SRahul Iyer */ 20974cfc7e60SRahul Iyer 20984cfc7e60SRahul Iyer static void bc_destroy(struct rpc_xprt *xprt) 20994cfc7e60SRahul Iyer { 21004cfc7e60SRahul Iyer } 21014cfc7e60SRahul Iyer 2102262965f5SChuck Lever static struct rpc_xprt_ops xs_udp_ops = { 210343118c29SChuck Lever .set_buffer_size = xs_udp_set_buffer_size, 210412a80469SChuck Lever .reserve_xprt = xprt_reserve_xprt_cong, 210549e9a890SChuck Lever .release_xprt = xprt_release_xprt_cong, 210645160d62SChuck Lever .rpcbind = rpcb_getport_async, 210792200412SChuck Lever .set_port = xs_set_port, 21089903cd1cSChuck Lever .connect = xs_connect, 210902107148SChuck Lever .buf_alloc = rpc_malloc, 211002107148SChuck Lever .buf_free = rpc_free, 2111262965f5SChuck Lever .send_request = xs_udp_send_request, 2112fe3aca29SChuck Lever .set_retrans_timeout = xprt_set_retrans_timeout_rtt, 211346c0ee8bSChuck Lever .timer = xs_udp_timer, 2114a58dd398SChuck Lever .release_request = xprt_release_rqst_cong, 2115262965f5SChuck Lever .close = xs_close, 2116262965f5SChuck Lever .destroy = xs_destroy, 2117262ca07dSChuck Lever .print_stats = xs_udp_print_stats, 2118262965f5SChuck Lever }; 2119262965f5SChuck Lever 2120262965f5SChuck Lever static struct rpc_xprt_ops xs_tcp_ops = { 212112a80469SChuck Lever .reserve_xprt = xprt_reserve_xprt, 2122e0ab53deSTrond Myklebust .release_xprt = xs_tcp_release_xprt, 212345160d62SChuck Lever .rpcbind = rpcb_getport_async, 212492200412SChuck Lever .set_port = xs_set_port, 21250b9e7943STrond Myklebust .connect = xs_connect, 212602107148SChuck Lever .buf_alloc = rpc_malloc, 212702107148SChuck Lever .buf_free = rpc_free, 2128262965f5SChuck Lever .send_request = xs_tcp_send_request, 2129fe3aca29SChuck Lever .set_retrans_timeout = xprt_set_retrans_timeout_def, 2130f75e6745STrond Myklebust .close = xs_tcp_close, 21319903cd1cSChuck Lever .destroy = xs_destroy, 2132262ca07dSChuck Lever .print_stats = xs_tcp_print_stats, 2133a246b010SChuck Lever }; 2134a246b010SChuck Lever 21354cfc7e60SRahul Iyer /* 21364cfc7e60SRahul Iyer * The rpc_xprt_ops for the server backchannel 21374cfc7e60SRahul Iyer */ 21384cfc7e60SRahul Iyer 21394cfc7e60SRahul Iyer static struct rpc_xprt_ops bc_tcp_ops = { 21404cfc7e60SRahul Iyer .reserve_xprt = xprt_reserve_xprt, 21414cfc7e60SRahul Iyer .release_xprt = xprt_release_xprt, 21424cfc7e60SRahul Iyer .buf_alloc = bc_malloc, 21434cfc7e60SRahul Iyer .buf_free = bc_free, 21444cfc7e60SRahul Iyer .send_request = bc_send_request, 21454cfc7e60SRahul Iyer .set_retrans_timeout = xprt_set_retrans_timeout_def, 21464cfc7e60SRahul Iyer .close = bc_close, 21474cfc7e60SRahul Iyer .destroy = bc_destroy, 21484cfc7e60SRahul Iyer .print_stats = xs_tcp_print_stats, 21494cfc7e60SRahul Iyer }; 21504cfc7e60SRahul Iyer 215192476850SChuck Lever static int xs_init_anyaddr(const int family, struct sockaddr *sap) 215292476850SChuck Lever { 215392476850SChuck Lever static const struct sockaddr_in sin = { 215492476850SChuck Lever .sin_family = AF_INET, 215592476850SChuck Lever .sin_addr.s_addr = htonl(INADDR_ANY), 215692476850SChuck Lever }; 215792476850SChuck Lever static const struct sockaddr_in6 sin6 = { 215892476850SChuck Lever .sin6_family = AF_INET6, 215992476850SChuck Lever .sin6_addr = IN6ADDR_ANY_INIT, 216092476850SChuck Lever }; 216192476850SChuck Lever 216292476850SChuck Lever switch (family) { 216392476850SChuck Lever case AF_INET: 216492476850SChuck Lever memcpy(sap, &sin, sizeof(sin)); 216592476850SChuck Lever break; 216692476850SChuck Lever case AF_INET6: 216792476850SChuck Lever memcpy(sap, &sin6, sizeof(sin6)); 216892476850SChuck Lever break; 216992476850SChuck Lever default: 217092476850SChuck Lever dprintk("RPC: %s: Bad address family\n", __func__); 217192476850SChuck Lever return -EAFNOSUPPORT; 217292476850SChuck Lever } 217392476850SChuck Lever return 0; 217492476850SChuck Lever } 217592476850SChuck Lever 21763c341b0bS\"Talpey, Thomas\ static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args, 2177bc25571eS\"Talpey, Thomas\ unsigned int slot_table_size) 2178c8541ecdSChuck Lever { 2179c8541ecdSChuck Lever struct rpc_xprt *xprt; 2180ffc2e518SChuck Lever struct sock_xprt *new; 2181c8541ecdSChuck Lever 218296802a09SFrank van Maarseveen if (args->addrlen > sizeof(xprt->addr)) { 2183c8541ecdSChuck Lever dprintk("RPC: xs_setup_xprt: address too large\n"); 2184c8541ecdSChuck Lever return ERR_PTR(-EBADF); 2185c8541ecdSChuck Lever } 2186c8541ecdSChuck Lever 218737aa2133SPavel Emelyanov xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size); 2188bd1722d4SPavel Emelyanov if (xprt == NULL) { 218946121cf7SChuck Lever dprintk("RPC: xs_setup_xprt: couldn't allocate " 219046121cf7SChuck Lever "rpc_xprt\n"); 2191c8541ecdSChuck Lever return ERR_PTR(-ENOMEM); 2192c8541ecdSChuck Lever } 2193c8541ecdSChuck Lever 2194bd1722d4SPavel Emelyanov new = container_of(xprt, struct sock_xprt, xprt); 219596802a09SFrank van Maarseveen memcpy(&xprt->addr, args->dstaddr, args->addrlen); 219696802a09SFrank van Maarseveen xprt->addrlen = args->addrlen; 2197d3bc9a1dSFrank van Maarseveen if (args->srcaddr) 2198fbfffbd5SChuck Lever memcpy(&new->srcaddr, args->srcaddr, args->addrlen); 219992476850SChuck Lever else { 220092476850SChuck Lever int err; 220192476850SChuck Lever err = xs_init_anyaddr(args->dstaddr->sa_family, 220292476850SChuck Lever (struct sockaddr *)&new->srcaddr); 220392476850SChuck Lever if (err != 0) 220492476850SChuck Lever return ERR_PTR(err); 220592476850SChuck Lever } 2206c8541ecdSChuck Lever 2207c8541ecdSChuck Lever return xprt; 2208c8541ecdSChuck Lever } 2209c8541ecdSChuck Lever 22102881ae74STrond Myklebust static const struct rpc_timeout xs_udp_default_timeout = { 22112881ae74STrond Myklebust .to_initval = 5 * HZ, 22122881ae74STrond Myklebust .to_maxval = 30 * HZ, 22132881ae74STrond Myklebust .to_increment = 5 * HZ, 22142881ae74STrond Myklebust .to_retries = 5, 22152881ae74STrond Myklebust }; 22162881ae74STrond Myklebust 22179903cd1cSChuck Lever /** 22189903cd1cSChuck Lever * xs_setup_udp - Set up transport to use a UDP socket 221996802a09SFrank van Maarseveen * @args: rpc transport creation arguments 22209903cd1cSChuck Lever * 22219903cd1cSChuck Lever */ 2222483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_udp(struct xprt_create *args) 2223a246b010SChuck Lever { 22248f9d5b1aSChuck Lever struct sockaddr *addr = args->dstaddr; 2225c8541ecdSChuck Lever struct rpc_xprt *xprt; 2226c8475461SChuck Lever struct sock_xprt *transport; 22270a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2228a246b010SChuck Lever 222996802a09SFrank van Maarseveen xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries); 2230c8541ecdSChuck Lever if (IS_ERR(xprt)) 2231c8541ecdSChuck Lever return xprt; 2232c8475461SChuck Lever transport = container_of(xprt, struct sock_xprt, xprt); 2233a246b010SChuck Lever 2234ec739ef0SChuck Lever xprt->prot = IPPROTO_UDP; 2235808012fbSChuck Lever xprt->tsh_size = 0; 2236a246b010SChuck Lever /* XXX: header size can vary due to auth type, IPv6, etc. */ 2237a246b010SChuck Lever xprt->max_payload = (1U << 16) - (MAX_HEADER << 3); 2238a246b010SChuck Lever 223903bf4b70SChuck Lever xprt->bind_timeout = XS_BIND_TO; 224003bf4b70SChuck Lever xprt->reestablish_timeout = XS_UDP_REEST_TO; 224103bf4b70SChuck Lever xprt->idle_timeout = XS_IDLE_DISC_TO; 2242a246b010SChuck Lever 2243262965f5SChuck Lever xprt->ops = &xs_udp_ops; 2244a246b010SChuck Lever 2245ba7392bbSTrond Myklebust xprt->timeout = &xs_udp_default_timeout; 2246a246b010SChuck Lever 22478f9d5b1aSChuck Lever switch (addr->sa_family) { 22488f9d5b1aSChuck Lever case AF_INET: 22498f9d5b1aSChuck Lever if (((struct sockaddr_in *)addr)->sin_port != htons(0)) 22508f9d5b1aSChuck Lever xprt_set_bound(xprt); 22518f9d5b1aSChuck Lever 22528f9d5b1aSChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 22538c14ff2aSPavel Emelyanov xs_udp_setup_socket); 22549dc3b095SChuck Lever xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP); 22558f9d5b1aSChuck Lever break; 22568f9d5b1aSChuck Lever case AF_INET6: 22578f9d5b1aSChuck Lever if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0)) 22588f9d5b1aSChuck Lever xprt_set_bound(xprt); 22598f9d5b1aSChuck Lever 22608f9d5b1aSChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 22618c14ff2aSPavel Emelyanov xs_udp_setup_socket); 22629dc3b095SChuck Lever xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6); 22638f9d5b1aSChuck Lever break; 22648f9d5b1aSChuck Lever default: 22650a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 22660a68b0beSJ. Bruce Fields goto out_err; 22678f9d5b1aSChuck Lever } 22688f9d5b1aSChuck Lever 2269c740eff8SChuck Lever if (xprt_bound(xprt)) 2270c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2271c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2272c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT], 2273c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2274c740eff8SChuck Lever else 2275c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (autobind) via %s\n", 2276c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2277c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2278edb267a6SChuck Lever 2279bc25571eS\"Talpey, Thomas\ if (try_module_get(THIS_MODULE)) 2280c8541ecdSChuck Lever return xprt; 22810a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 22820a68b0beSJ. Bruce Fields out_err: 2283e204e621SPavel Emelyanov xprt_free(xprt); 22840a68b0beSJ. Bruce Fields return ret; 2285a246b010SChuck Lever } 2286a246b010SChuck Lever 22872881ae74STrond Myklebust static const struct rpc_timeout xs_tcp_default_timeout = { 22882881ae74STrond Myklebust .to_initval = 60 * HZ, 22892881ae74STrond Myklebust .to_maxval = 60 * HZ, 22902881ae74STrond Myklebust .to_retries = 2, 22912881ae74STrond Myklebust }; 22922881ae74STrond Myklebust 22939903cd1cSChuck Lever /** 22949903cd1cSChuck Lever * xs_setup_tcp - Set up transport to use a TCP socket 229596802a09SFrank van Maarseveen * @args: rpc transport creation arguments 22969903cd1cSChuck Lever * 22979903cd1cSChuck Lever */ 2298483066d6SAdrian Bunk static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args) 2299a246b010SChuck Lever { 23008f9d5b1aSChuck Lever struct sockaddr *addr = args->dstaddr; 2301c8541ecdSChuck Lever struct rpc_xprt *xprt; 2302c8475461SChuck Lever struct sock_xprt *transport; 23030a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2304a246b010SChuck Lever 230596802a09SFrank van Maarseveen xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries); 2306c8541ecdSChuck Lever if (IS_ERR(xprt)) 2307c8541ecdSChuck Lever return xprt; 2308c8475461SChuck Lever transport = container_of(xprt, struct sock_xprt, xprt); 2309a246b010SChuck Lever 2310ec739ef0SChuck Lever xprt->prot = IPPROTO_TCP; 2311808012fbSChuck Lever xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32); 2312808012fbSChuck Lever xprt->max_payload = RPC_MAX_FRAGMENT_SIZE; 2313a246b010SChuck Lever 231403bf4b70SChuck Lever xprt->bind_timeout = XS_BIND_TO; 231503bf4b70SChuck Lever xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO; 231603bf4b70SChuck Lever xprt->idle_timeout = XS_IDLE_DISC_TO; 2317a246b010SChuck Lever 2318262965f5SChuck Lever xprt->ops = &xs_tcp_ops; 2319ba7392bbSTrond Myklebust xprt->timeout = &xs_tcp_default_timeout; 2320a246b010SChuck Lever 23218f9d5b1aSChuck Lever switch (addr->sa_family) { 23228f9d5b1aSChuck Lever case AF_INET: 23238f9d5b1aSChuck Lever if (((struct sockaddr_in *)addr)->sin_port != htons(0)) 23248f9d5b1aSChuck Lever xprt_set_bound(xprt); 23258f9d5b1aSChuck Lever 23269dc3b095SChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 2327cdd518d5SPavel Emelyanov xs_tcp_setup_socket); 23289dc3b095SChuck Lever xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP); 23298f9d5b1aSChuck Lever break; 23308f9d5b1aSChuck Lever case AF_INET6: 23318f9d5b1aSChuck Lever if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0)) 23328f9d5b1aSChuck Lever xprt_set_bound(xprt); 23338f9d5b1aSChuck Lever 23349dc3b095SChuck Lever INIT_DELAYED_WORK(&transport->connect_worker, 2335cdd518d5SPavel Emelyanov xs_tcp_setup_socket); 23369dc3b095SChuck Lever xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6); 23378f9d5b1aSChuck Lever break; 23388f9d5b1aSChuck Lever default: 23390a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 23400a68b0beSJ. Bruce Fields goto out_err; 23418f9d5b1aSChuck Lever } 23428f9d5b1aSChuck Lever 2343c740eff8SChuck Lever if (xprt_bound(xprt)) 2344c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2345c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2346c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PORT], 2347c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2348c740eff8SChuck Lever else 2349c740eff8SChuck Lever dprintk("RPC: set up xprt to %s (autobind) via %s\n", 2350c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_ADDR], 2351c740eff8SChuck Lever xprt->address_strings[RPC_DISPLAY_PROTO]); 2352c740eff8SChuck Lever 2353edb267a6SChuck Lever 2354bc25571eS\"Talpey, Thomas\ if (try_module_get(THIS_MODULE)) 2355c8541ecdSChuck Lever return xprt; 23560a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 23570a68b0beSJ. Bruce Fields out_err: 2358e204e621SPavel Emelyanov xprt_free(xprt); 23590a68b0beSJ. Bruce Fields return ret; 2360a246b010SChuck Lever } 2361282b32e1SChuck Lever 2362f300babaSAlexandros Batsakis /** 2363f300babaSAlexandros Batsakis * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket 2364f300babaSAlexandros Batsakis * @args: rpc transport creation arguments 2365f300babaSAlexandros Batsakis * 2366f300babaSAlexandros Batsakis */ 2367f300babaSAlexandros Batsakis static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args) 2368f300babaSAlexandros Batsakis { 2369f300babaSAlexandros Batsakis struct sockaddr *addr = args->dstaddr; 2370f300babaSAlexandros Batsakis struct rpc_xprt *xprt; 2371f300babaSAlexandros Batsakis struct sock_xprt *transport; 2372f300babaSAlexandros Batsakis struct svc_sock *bc_sock; 23730a68b0beSJ. Bruce Fields struct rpc_xprt *ret; 2374f300babaSAlexandros Batsakis 2375f0418aa4SJ. Bruce Fields if (args->bc_xprt->xpt_bc_xprt) { 2376f0418aa4SJ. Bruce Fields /* 2377f0418aa4SJ. Bruce Fields * This server connection already has a backchannel 2378f0418aa4SJ. Bruce Fields * export; we can't create a new one, as we wouldn't be 2379f0418aa4SJ. Bruce Fields * able to match replies based on xid any more. So, 2380f0418aa4SJ. Bruce Fields * reuse the already-existing one: 2381f0418aa4SJ. Bruce Fields */ 2382f0418aa4SJ. Bruce Fields return args->bc_xprt->xpt_bc_xprt; 2383f0418aa4SJ. Bruce Fields } 2384f300babaSAlexandros Batsakis xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries); 2385f300babaSAlexandros Batsakis if (IS_ERR(xprt)) 2386f300babaSAlexandros Batsakis return xprt; 2387f300babaSAlexandros Batsakis transport = container_of(xprt, struct sock_xprt, xprt); 2388f300babaSAlexandros Batsakis 2389f300babaSAlexandros Batsakis xprt->prot = IPPROTO_TCP; 2390f300babaSAlexandros Batsakis xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32); 2391f300babaSAlexandros Batsakis xprt->max_payload = RPC_MAX_FRAGMENT_SIZE; 2392f300babaSAlexandros Batsakis xprt->timeout = &xs_tcp_default_timeout; 2393f300babaSAlexandros Batsakis 2394f300babaSAlexandros Batsakis /* backchannel */ 2395f300babaSAlexandros Batsakis xprt_set_bound(xprt); 2396f300babaSAlexandros Batsakis xprt->bind_timeout = 0; 2397f300babaSAlexandros Batsakis xprt->reestablish_timeout = 0; 2398f300babaSAlexandros Batsakis xprt->idle_timeout = 0; 2399f300babaSAlexandros Batsakis 2400f300babaSAlexandros Batsakis xprt->ops = &bc_tcp_ops; 2401f300babaSAlexandros Batsakis 2402f300babaSAlexandros Batsakis switch (addr->sa_family) { 2403f300babaSAlexandros Batsakis case AF_INET: 2404f300babaSAlexandros Batsakis xs_format_peer_addresses(xprt, "tcp", 2405f300babaSAlexandros Batsakis RPCBIND_NETID_TCP); 2406f300babaSAlexandros Batsakis break; 2407f300babaSAlexandros Batsakis case AF_INET6: 2408f300babaSAlexandros Batsakis xs_format_peer_addresses(xprt, "tcp", 2409f300babaSAlexandros Batsakis RPCBIND_NETID_TCP6); 2410f300babaSAlexandros Batsakis break; 2411f300babaSAlexandros Batsakis default: 24120a68b0beSJ. Bruce Fields ret = ERR_PTR(-EAFNOSUPPORT); 24130a68b0beSJ. Bruce Fields goto out_err; 2414f300babaSAlexandros Batsakis } 2415f300babaSAlexandros Batsakis 2416f300babaSAlexandros Batsakis dprintk("RPC: set up xprt to %s (port %s) via %s\n", 2417f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_ADDR], 2418f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_PORT], 2419f300babaSAlexandros Batsakis xprt->address_strings[RPC_DISPLAY_PROTO]); 2420f300babaSAlexandros Batsakis 2421f300babaSAlexandros Batsakis /* 242299de8ea9SJ. Bruce Fields * Once we've associated a backchannel xprt with a connection, 242399de8ea9SJ. Bruce Fields * we want to keep it around as long as long as the connection 242499de8ea9SJ. Bruce Fields * lasts, in case we need to start using it for a backchannel 242599de8ea9SJ. Bruce Fields * again; this reference won't be dropped until bc_xprt is 242699de8ea9SJ. Bruce Fields * destroyed. 242799de8ea9SJ. Bruce Fields */ 242899de8ea9SJ. Bruce Fields xprt_get(xprt); 242999de8ea9SJ. Bruce Fields args->bc_xprt->xpt_bc_xprt = xprt; 243099de8ea9SJ. Bruce Fields xprt->bc_xprt = args->bc_xprt; 243199de8ea9SJ. Bruce Fields bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt); 243299de8ea9SJ. Bruce Fields transport->sock = bc_sock->sk_sock; 243399de8ea9SJ. Bruce Fields transport->inet = bc_sock->sk_sk; 243499de8ea9SJ. Bruce Fields 243599de8ea9SJ. Bruce Fields /* 2436f300babaSAlexandros Batsakis * Since we don't want connections for the backchannel, we set 2437f300babaSAlexandros Batsakis * the xprt status to connected 2438f300babaSAlexandros Batsakis */ 2439f300babaSAlexandros Batsakis xprt_set_connected(xprt); 2440f300babaSAlexandros Batsakis 2441f300babaSAlexandros Batsakis 2442f300babaSAlexandros Batsakis if (try_module_get(THIS_MODULE)) 2443f300babaSAlexandros Batsakis return xprt; 244499de8ea9SJ. Bruce Fields xprt_put(xprt); 24450a68b0beSJ. Bruce Fields ret = ERR_PTR(-EINVAL); 24460a68b0beSJ. Bruce Fields out_err: 2447e204e621SPavel Emelyanov xprt_free(xprt); 24480a68b0beSJ. Bruce Fields return ret; 2449f300babaSAlexandros Batsakis } 2450f300babaSAlexandros Batsakis 2451bc25571eS\"Talpey, Thomas\ static struct xprt_class xs_udp_transport = { 2452bc25571eS\"Talpey, Thomas\ .list = LIST_HEAD_INIT(xs_udp_transport.list), 2453bc25571eS\"Talpey, Thomas\ .name = "udp", 2454bc25571eS\"Talpey, Thomas\ .owner = THIS_MODULE, 2455f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_UDP, 2456bc25571eS\"Talpey, Thomas\ .setup = xs_setup_udp, 2457bc25571eS\"Talpey, Thomas\ }; 2458bc25571eS\"Talpey, Thomas\ 2459bc25571eS\"Talpey, Thomas\ static struct xprt_class xs_tcp_transport = { 2460bc25571eS\"Talpey, Thomas\ .list = LIST_HEAD_INIT(xs_tcp_transport.list), 2461bc25571eS\"Talpey, Thomas\ .name = "tcp", 2462bc25571eS\"Talpey, Thomas\ .owner = THIS_MODULE, 2463f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_TCP, 2464bc25571eS\"Talpey, Thomas\ .setup = xs_setup_tcp, 2465bc25571eS\"Talpey, Thomas\ }; 2466bc25571eS\"Talpey, Thomas\ 2467f300babaSAlexandros Batsakis static struct xprt_class xs_bc_tcp_transport = { 2468f300babaSAlexandros Batsakis .list = LIST_HEAD_INIT(xs_bc_tcp_transport.list), 2469f300babaSAlexandros Batsakis .name = "tcp NFSv4.1 backchannel", 2470f300babaSAlexandros Batsakis .owner = THIS_MODULE, 2471f300babaSAlexandros Batsakis .ident = XPRT_TRANSPORT_BC_TCP, 2472f300babaSAlexandros Batsakis .setup = xs_setup_bc_tcp, 2473f300babaSAlexandros Batsakis }; 2474f300babaSAlexandros Batsakis 2475282b32e1SChuck Lever /** 2476bc25571eS\"Talpey, Thomas\ * init_socket_xprt - set up xprtsock's sysctls, register with RPC client 2477282b32e1SChuck Lever * 2478282b32e1SChuck Lever */ 2479282b32e1SChuck Lever int init_socket_xprt(void) 2480282b32e1SChuck Lever { 2481fbf76683SChuck Lever #ifdef RPC_DEBUG 24822b1bec5fSEric W. Biederman if (!sunrpc_table_header) 24830b4d4147SEric W. Biederman sunrpc_table_header = register_sysctl_table(sunrpc_table); 2484fbf76683SChuck Lever #endif 2485fbf76683SChuck Lever 2486bc25571eS\"Talpey, Thomas\ xprt_register_transport(&xs_udp_transport); 2487bc25571eS\"Talpey, Thomas\ xprt_register_transport(&xs_tcp_transport); 2488f300babaSAlexandros Batsakis xprt_register_transport(&xs_bc_tcp_transport); 2489bc25571eS\"Talpey, Thomas\ 2490282b32e1SChuck Lever return 0; 2491282b32e1SChuck Lever } 2492282b32e1SChuck Lever 2493282b32e1SChuck Lever /** 2494bc25571eS\"Talpey, Thomas\ * cleanup_socket_xprt - remove xprtsock's sysctls, unregister 2495282b32e1SChuck Lever * 2496282b32e1SChuck Lever */ 2497282b32e1SChuck Lever void cleanup_socket_xprt(void) 2498282b32e1SChuck Lever { 2499fbf76683SChuck Lever #ifdef RPC_DEBUG 2500fbf76683SChuck Lever if (sunrpc_table_header) { 2501fbf76683SChuck Lever unregister_sysctl_table(sunrpc_table_header); 2502fbf76683SChuck Lever sunrpc_table_header = NULL; 2503fbf76683SChuck Lever } 2504fbf76683SChuck Lever #endif 2505bc25571eS\"Talpey, Thomas\ 2506bc25571eS\"Talpey, Thomas\ xprt_unregister_transport(&xs_udp_transport); 2507bc25571eS\"Talpey, Thomas\ xprt_unregister_transport(&xs_tcp_transport); 2508f300babaSAlexandros Batsakis xprt_unregister_transport(&xs_bc_tcp_transport); 2509282b32e1SChuck Lever } 2510cbf11071STrond Myklebust 25119bbb9e5aSRusty Russell static int param_set_uint_minmax(const char *val, 25129bbb9e5aSRusty Russell const struct kernel_param *kp, 2513cbf11071STrond Myklebust unsigned int min, unsigned int max) 2514cbf11071STrond Myklebust { 2515cbf11071STrond Myklebust unsigned long num; 2516cbf11071STrond Myklebust int ret; 2517cbf11071STrond Myklebust 2518cbf11071STrond Myklebust if (!val) 2519cbf11071STrond Myklebust return -EINVAL; 2520cbf11071STrond Myklebust ret = strict_strtoul(val, 0, &num); 2521cbf11071STrond Myklebust if (ret == -EINVAL || num < min || num > max) 2522cbf11071STrond Myklebust return -EINVAL; 2523cbf11071STrond Myklebust *((unsigned int *)kp->arg) = num; 2524cbf11071STrond Myklebust return 0; 2525cbf11071STrond Myklebust } 2526cbf11071STrond Myklebust 25279bbb9e5aSRusty Russell static int param_set_portnr(const char *val, const struct kernel_param *kp) 2528cbf11071STrond Myklebust { 2529cbf11071STrond Myklebust return param_set_uint_minmax(val, kp, 2530cbf11071STrond Myklebust RPC_MIN_RESVPORT, 2531cbf11071STrond Myklebust RPC_MAX_RESVPORT); 2532cbf11071STrond Myklebust } 2533cbf11071STrond Myklebust 25349bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_portnr = { 25359bbb9e5aSRusty Russell .set = param_set_portnr, 25369bbb9e5aSRusty Russell .get = param_get_uint, 25379bbb9e5aSRusty Russell }; 25389bbb9e5aSRusty Russell 2539cbf11071STrond Myklebust #define param_check_portnr(name, p) \ 2540cbf11071STrond Myklebust __param_check(name, p, unsigned int); 2541cbf11071STrond Myklebust 2542cbf11071STrond Myklebust module_param_named(min_resvport, xprt_min_resvport, portnr, 0644); 2543cbf11071STrond Myklebust module_param_named(max_resvport, xprt_max_resvport, portnr, 0644); 2544cbf11071STrond Myklebust 25459bbb9e5aSRusty Russell static int param_set_slot_table_size(const char *val, 25469bbb9e5aSRusty Russell const struct kernel_param *kp) 2547cbf11071STrond Myklebust { 2548cbf11071STrond Myklebust return param_set_uint_minmax(val, kp, 2549cbf11071STrond Myklebust RPC_MIN_SLOT_TABLE, 2550cbf11071STrond Myklebust RPC_MAX_SLOT_TABLE); 2551cbf11071STrond Myklebust } 2552cbf11071STrond Myklebust 25539bbb9e5aSRusty Russell static struct kernel_param_ops param_ops_slot_table_size = { 25549bbb9e5aSRusty Russell .set = param_set_slot_table_size, 25559bbb9e5aSRusty Russell .get = param_get_uint, 25569bbb9e5aSRusty Russell }; 25579bbb9e5aSRusty Russell 2558cbf11071STrond Myklebust #define param_check_slot_table_size(name, p) \ 2559cbf11071STrond Myklebust __param_check(name, p, unsigned int); 2560cbf11071STrond Myklebust 2561cbf11071STrond Myklebust module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries, 2562cbf11071STrond Myklebust slot_table_size, 0644); 2563cbf11071STrond Myklebust module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries, 2564cbf11071STrond Myklebust slot_table_size, 0644); 2565cbf11071STrond Myklebust 2566