blob: ea7507979b0b4827c1a4671c571bc9f28c1b9143 [file] [log] [blame]
Chuck Levera246b012005-08-11 16:25:23 -04001/*
2 * linux/net/sunrpc/xprtsock.c
3 *
4 * Client-side transport implementation for sockets.
5 *
Alan Cox113aa832008-10-13 19:01:08 -07006 * TCP callback races fixes (C) 1998 Red Hat
7 * TCP send fixes (C) 1998 Red Hat
Chuck Levera246b012005-08-11 16:25:23 -04008 * TCP NFS related read + write fixes
9 * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
10 *
11 * Rewrite of larges part of the code in order to stabilize TCP stuff.
12 * Fix behaviour when socket buffer is full.
13 * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
Chuck Lever55aa4f52005-08-11 16:25:47 -040014 *
15 * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
Chuck Lever8f9d5b12007-08-06 11:57:53 -040016 *
17 * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
18 * <gilles.quillard@bull.net>
Chuck Levera246b012005-08-11 16:25:23 -040019 */
20
21#include <linux/types.h>
Chuck Lever176e21e2011-05-09 15:22:44 -040022#include <linux/string.h>
Chuck Levera246b012005-08-11 16:25:23 -040023#include <linux/slab.h>
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -040024#include <linux/module.h>
Chuck Levera246b012005-08-11 16:25:23 -040025#include <linux/capability.h>
Chuck Levera246b012005-08-11 16:25:23 -040026#include <linux/pagemap.h>
27#include <linux/errno.h>
28#include <linux/socket.h>
29#include <linux/in.h>
30#include <linux/net.h>
31#include <linux/mm.h>
Chuck Lever176e21e2011-05-09 15:22:44 -040032#include <linux/un.h>
Chuck Levera246b012005-08-11 16:25:23 -040033#include <linux/udp.h>
34#include <linux/tcp.h>
35#include <linux/sunrpc/clnt.h>
Chuck Lever02107142006-01-03 09:55:49 +010036#include <linux/sunrpc/sched.h>
Rahul Iyer4cfc7e62009-09-10 17:32:28 +030037#include <linux/sunrpc/svcsock.h>
\"Talpey, Thomas\49c36fc2007-09-10 13:47:31 -040038#include <linux/sunrpc/xprtsock.h>
Chuck Levera246b012005-08-11 16:25:23 -040039#include <linux/file.h>
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -040040#ifdef CONFIG_NFS_V4_1
41#include <linux/sunrpc/bc_xprt.h>
42#endif
Chuck Levera246b012005-08-11 16:25:23 -040043
44#include <net/sock.h>
45#include <net/checksum.h>
46#include <net/udp.h>
47#include <net/tcp.h>
48
Rahul Iyer4cfc7e62009-09-10 17:32:28 +030049#include "sunrpc.h"
Chuck Lever176e21e2011-05-09 15:22:44 -040050
51static void xs_close(struct rpc_xprt *xprt);
52
Chuck Lever9903cd12005-08-11 16:25:26 -040053/*
Chuck Leverc556b752005-11-01 12:24:48 -050054 * xprtsock tunables
55 */
56unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
57unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE;
58
59unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
60unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;
61
Trond Myklebust7d1e8252009-03-11 14:38:03 -040062#define XS_TCP_LINGER_TO (15U * HZ)
Trond Myklebust25fe6142009-03-11 14:38:03 -040063static unsigned int xs_tcp_fin_timeout __read_mostly = XS_TCP_LINGER_TO;
Trond Myklebust7d1e8252009-03-11 14:38:03 -040064
Chuck Leverc556b752005-11-01 12:24:48 -050065/*
Chuck Leverfbf76682006-12-05 16:35:54 -050066 * We can register our own files under /proc/sys/sunrpc by
67 * calling register_sysctl_table() again. The files in that
68 * directory become the union of all files registered there.
69 *
70 * We simply need to make sure that we don't collide with
71 * someone else's file names!
72 */
73
74#ifdef RPC_DEBUG
75
76static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
77static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
78static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
79static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;
80
81static struct ctl_table_header *sunrpc_table_header;
82
83/*
84 * FIXME: changing the UDP slot table size should also resize the UDP
85 * socket buffers for existing UDP transports
86 */
87static ctl_table xs_tunables_table[] = {
88 {
Chuck Leverfbf76682006-12-05 16:35:54 -050089 .procname = "udp_slot_table_entries",
90 .data = &xprt_udp_slot_table_entries,
91 .maxlen = sizeof(unsigned int),
92 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -080093 .proc_handler = proc_dointvec_minmax,
Chuck Leverfbf76682006-12-05 16:35:54 -050094 .extra1 = &min_slot_table_size,
95 .extra2 = &max_slot_table_size
96 },
97 {
Chuck Leverfbf76682006-12-05 16:35:54 -050098 .procname = "tcp_slot_table_entries",
99 .data = &xprt_tcp_slot_table_entries,
100 .maxlen = sizeof(unsigned int),
101 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800102 .proc_handler = proc_dointvec_minmax,
Chuck Leverfbf76682006-12-05 16:35:54 -0500103 .extra1 = &min_slot_table_size,
104 .extra2 = &max_slot_table_size
105 },
106 {
Chuck Leverfbf76682006-12-05 16:35:54 -0500107 .procname = "min_resvport",
108 .data = &xprt_min_resvport,
109 .maxlen = sizeof(unsigned int),
110 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800111 .proc_handler = proc_dointvec_minmax,
Chuck Leverfbf76682006-12-05 16:35:54 -0500112 .extra1 = &xprt_min_resvport_limit,
113 .extra2 = &xprt_max_resvport_limit
114 },
115 {
Chuck Leverfbf76682006-12-05 16:35:54 -0500116 .procname = "max_resvport",
117 .data = &xprt_max_resvport,
118 .maxlen = sizeof(unsigned int),
119 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800120 .proc_handler = proc_dointvec_minmax,
Chuck Leverfbf76682006-12-05 16:35:54 -0500121 .extra1 = &xprt_min_resvport_limit,
122 .extra2 = &xprt_max_resvport_limit
123 },
124 {
Trond Myklebust25fe6142009-03-11 14:38:03 -0400125 .procname = "tcp_fin_timeout",
126 .data = &xs_tcp_fin_timeout,
127 .maxlen = sizeof(xs_tcp_fin_timeout),
128 .mode = 0644,
Eric W. Biederman6d456112009-11-16 03:11:48 -0800129 .proc_handler = proc_dointvec_jiffies,
Trond Myklebust25fe6142009-03-11 14:38:03 -0400130 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800131 { },
Chuck Leverfbf76682006-12-05 16:35:54 -0500132};
133
134static ctl_table sunrpc_table[] = {
135 {
Chuck Leverfbf76682006-12-05 16:35:54 -0500136 .procname = "sunrpc",
137 .mode = 0555,
138 .child = xs_tunables_table
139 },
Eric W. Biedermanf8572d82009-11-05 13:32:03 -0800140 { },
Chuck Leverfbf76682006-12-05 16:35:54 -0500141};
142
143#endif
144
145/*
Chuck Lever03bf4b72005-08-25 16:25:55 -0700146 * Wait duration for a reply from the RPC portmapper.
147 */
148#define XS_BIND_TO (60U * HZ)
149
150/*
151 * Delay if a UDP socket connect error occurs. This is most likely some
152 * kind of resource problem on the local host.
153 */
154#define XS_UDP_REEST_TO (2U * HZ)
155
156/*
157 * The reestablish timeout allows clients to delay for a bit before attempting
158 * to reconnect to a server that just dropped our connection.
159 *
160 * We implement an exponential backoff when trying to reestablish a TCP
161 * transport connection with the server. Some servers like to drop a TCP
162 * connection when they are overworked, so we start with a short timeout and
163 * increase over time if the server is down or not responding.
164 */
165#define XS_TCP_INIT_REEST_TO (3U * HZ)
166#define XS_TCP_MAX_REEST_TO (5U * 60 * HZ)
167
168/*
169 * TCP idle timeout; client drops the transport socket if it is idle
170 * for this long. Note that we also timeout UDP sockets to prevent
171 * holding port numbers when there is no RPC traffic.
172 */
173#define XS_IDLE_DISC_TO (5U * 60 * HZ)
174
Chuck Levera246b012005-08-11 16:25:23 -0400175#ifdef RPC_DEBUG
176# undef RPC_DEBUG_DATA
Chuck Lever9903cd12005-08-11 16:25:26 -0400177# define RPCDBG_FACILITY RPCDBG_TRANS
Chuck Levera246b012005-08-11 16:25:23 -0400178#endif
179
Chuck Levera246b012005-08-11 16:25:23 -0400180#ifdef RPC_DEBUG_DATA
Chuck Lever9903cd12005-08-11 16:25:26 -0400181static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
Chuck Levera246b012005-08-11 16:25:23 -0400182{
Chuck Lever9903cd12005-08-11 16:25:26 -0400183 u8 *buf = (u8 *) packet;
184 int j;
Chuck Levera246b012005-08-11 16:25:23 -0400185
Chuck Lever46121cf2007-01-31 12:14:08 -0500186 dprintk("RPC: %s\n", msg);
Chuck Levera246b012005-08-11 16:25:23 -0400187 for (j = 0; j < count && j < 128; j += 4) {
188 if (!(j & 31)) {
189 if (j)
190 dprintk("\n");
191 dprintk("0x%04x ", j);
192 }
193 dprintk("%02x%02x%02x%02x ",
194 buf[j], buf[j+1], buf[j+2], buf[j+3]);
195 }
196 dprintk("\n");
197}
198#else
Chuck Lever9903cd12005-08-11 16:25:26 -0400199static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
Chuck Levera246b012005-08-11 16:25:23 -0400200{
201 /* NOP */
202}
203#endif
204
Chuck Leverffc2e512006-12-05 16:35:11 -0500205struct sock_xprt {
206 struct rpc_xprt xprt;
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500207
208 /*
209 * Network layer
210 */
211 struct socket * sock;
212 struct sock * inet;
Chuck Lever51971132006-12-05 16:35:19 -0500213
214 /*
215 * State of TCP reply receive
216 */
217 __be32 tcp_fraghdr,
Trond Myklebustb76ce562010-06-16 13:57:32 -0400218 tcp_xid,
219 tcp_calldir;
Chuck Lever51971132006-12-05 16:35:19 -0500220
221 u32 tcp_offset,
222 tcp_reclen;
223
224 unsigned long tcp_copied,
225 tcp_flags;
Chuck Leverc8475462006-12-05 16:35:26 -0500226
227 /*
228 * Connection of transports
229 */
Trond Myklebust34161db2006-12-07 15:48:15 -0500230 struct delayed_work connect_worker;
Chuck Leverfbfffbd2009-08-09 15:09:46 -0400231 struct sockaddr_storage srcaddr;
232 unsigned short srcport;
Chuck Lever7c6e0662006-12-05 16:35:30 -0500233
234 /*
235 * UDP socket buffer size parameters
236 */
237 size_t rcvsize,
238 sndsize;
Chuck Lever314dfd72006-12-05 16:35:34 -0500239
240 /*
241 * Saved socket callback addresses
242 */
243 void (*old_data_ready)(struct sock *, int);
244 void (*old_state_change)(struct sock *);
245 void (*old_write_space)(struct sock *);
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -0400246 void (*old_error_report)(struct sock *);
Chuck Leverffc2e512006-12-05 16:35:11 -0500247};
248
Chuck Levere136d092006-12-05 16:35:23 -0500249/*
250 * TCP receive state flags
251 */
252#define TCP_RCV_LAST_FRAG (1UL << 0)
253#define TCP_RCV_COPY_FRAGHDR (1UL << 1)
254#define TCP_RCV_COPY_XID (1UL << 2)
255#define TCP_RCV_COPY_DATA (1UL << 3)
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -0400256#define TCP_RCV_READ_CALLDIR (1UL << 4)
257#define TCP_RCV_COPY_CALLDIR (1UL << 5)
Ricardo Labiaga18dca022009-04-01 09:22:53 -0400258
259/*
260 * TCP RPC flags
261 */
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -0400262#define TCP_RPC_REPLY (1UL << 6)
Chuck Levere136d092006-12-05 16:35:23 -0500263
Chuck Lever95392c52007-08-06 11:57:58 -0400264static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
Chuck Leveredb267a2006-08-22 20:06:18 -0400265{
Chuck Lever95392c52007-08-06 11:57:58 -0400266 return (struct sockaddr *) &xprt->addr;
267}
268
Chuck Lever176e21e2011-05-09 15:22:44 -0400269static inline struct sockaddr_un *xs_addr_un(struct rpc_xprt *xprt)
270{
271 return (struct sockaddr_un *) &xprt->addr;
272}
273
Chuck Lever95392c52007-08-06 11:57:58 -0400274static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
275{
276 return (struct sockaddr_in *) &xprt->addr;
277}
278
279static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
280{
281 return (struct sockaddr_in6 *) &xprt->addr;
282}
283
Chuck Leverc877b842009-08-09 15:09:36 -0400284static void xs_format_common_peer_addresses(struct rpc_xprt *xprt)
Chuck Leveredb267a2006-08-22 20:06:18 -0400285{
Chuck Leverc877b842009-08-09 15:09:36 -0400286 struct sockaddr *sap = xs_addr(xprt);
Chuck Lever9dc3b092009-08-09 15:09:46 -0400287 struct sockaddr_in6 *sin6;
288 struct sockaddr_in *sin;
Chuck Lever176e21e2011-05-09 15:22:44 -0400289 struct sockaddr_un *sun;
Chuck Leverc877b842009-08-09 15:09:36 -0400290 char buf[128];
Chuck Leveredb267a2006-08-22 20:06:18 -0400291
Chuck Lever9dc3b092009-08-09 15:09:46 -0400292 switch (sap->sa_family) {
Chuck Lever176e21e2011-05-09 15:22:44 -0400293 case AF_LOCAL:
294 sun = xs_addr_un(xprt);
295 strlcpy(buf, sun->sun_path, sizeof(buf));
296 xprt->address_strings[RPC_DISPLAY_ADDR] =
297 kstrdup(buf, GFP_KERNEL);
298 break;
Chuck Lever9dc3b092009-08-09 15:09:46 -0400299 case AF_INET:
Chuck Lever176e21e2011-05-09 15:22:44 -0400300 (void)rpc_ntop(sap, buf, sizeof(buf));
301 xprt->address_strings[RPC_DISPLAY_ADDR] =
302 kstrdup(buf, GFP_KERNEL);
Chuck Lever9dc3b092009-08-09 15:09:46 -0400303 sin = xs_addr_in(xprt);
Joe Perchesfc0b5792010-03-08 12:15:28 -0800304 snprintf(buf, sizeof(buf), "%08x", ntohl(sin->sin_addr.s_addr));
Chuck Lever9dc3b092009-08-09 15:09:46 -0400305 break;
306 case AF_INET6:
Chuck Lever176e21e2011-05-09 15:22:44 -0400307 (void)rpc_ntop(sap, buf, sizeof(buf));
308 xprt->address_strings[RPC_DISPLAY_ADDR] =
309 kstrdup(buf, GFP_KERNEL);
Chuck Lever9dc3b092009-08-09 15:09:46 -0400310 sin6 = xs_addr_in6(xprt);
Joe Perchesfc0b5792010-03-08 12:15:28 -0800311 snprintf(buf, sizeof(buf), "%pi6", &sin6->sin6_addr);
Chuck Lever9dc3b092009-08-09 15:09:46 -0400312 break;
313 default:
314 BUG();
Chuck Leveredb267a2006-08-22 20:06:18 -0400315 }
Chuck Lever176e21e2011-05-09 15:22:44 -0400316
Chuck Lever9dc3b092009-08-09 15:09:46 -0400317 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = kstrdup(buf, GFP_KERNEL);
Chuck Leveredb267a2006-08-22 20:06:18 -0400318}
319
Chuck Lever9dc3b092009-08-09 15:09:46 -0400320static void xs_format_common_peer_ports(struct rpc_xprt *xprt)
Chuck Lever4b6473f2007-08-06 11:57:12 -0400321{
Chuck Lever9dc3b092009-08-09 15:09:46 -0400322 struct sockaddr *sap = xs_addr(xprt);
323 char buf[128];
Chuck Lever4b6473f2007-08-06 11:57:12 -0400324
Joe Perches81160e662010-03-08 12:15:59 -0800325 snprintf(buf, sizeof(buf), "%u", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400326 xprt->address_strings[RPC_DISPLAY_PORT] = kstrdup(buf, GFP_KERNEL);
Chuck Lever4b6473f2007-08-06 11:57:12 -0400327
Joe Perches81160e662010-03-08 12:15:59 -0800328 snprintf(buf, sizeof(buf), "%4hx", rpc_get_port(sap));
Chuck Leverc877b842009-08-09 15:09:36 -0400329 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = kstrdup(buf, GFP_KERNEL);
330}
Chuck Lever4b6473f2007-08-06 11:57:12 -0400331
Chuck Lever9dc3b092009-08-09 15:09:46 -0400332static void xs_format_peer_addresses(struct rpc_xprt *xprt,
333 const char *protocol,
334 const char *netid)
Chuck Leveredb267a2006-08-22 20:06:18 -0400335{
Chuck Leverb454ae92008-01-07 18:34:48 -0500336 xprt->address_strings[RPC_DISPLAY_PROTO] = protocol;
Chuck Leverb454ae92008-01-07 18:34:48 -0500337 xprt->address_strings[RPC_DISPLAY_NETID] = netid;
Chuck Leverc877b842009-08-09 15:09:36 -0400338 xs_format_common_peer_addresses(xprt);
Chuck Lever9dc3b092009-08-09 15:09:46 -0400339 xs_format_common_peer_ports(xprt);
Chuck Lever4b6473f2007-08-06 11:57:12 -0400340}
341
Chuck Lever9dc3b092009-08-09 15:09:46 -0400342static void xs_update_peer_port(struct rpc_xprt *xprt)
Chuck Lever4b6473f2007-08-06 11:57:12 -0400343{
Chuck Lever9dc3b092009-08-09 15:09:46 -0400344 kfree(xprt->address_strings[RPC_DISPLAY_HEX_PORT]);
345 kfree(xprt->address_strings[RPC_DISPLAY_PORT]);
Chuck Lever4b6473f2007-08-06 11:57:12 -0400346
Chuck Lever9dc3b092009-08-09 15:09:46 -0400347 xs_format_common_peer_ports(xprt);
Chuck Leveredb267a2006-08-22 20:06:18 -0400348}
349
350static void xs_free_peer_addresses(struct rpc_xprt *xprt)
351{
Chuck Lever33e01dc2008-01-14 12:32:20 -0500352 unsigned int i;
353
354 for (i = 0; i < RPC_DISPLAY_MAX; i++)
355 switch (i) {
356 case RPC_DISPLAY_PROTO:
357 case RPC_DISPLAY_NETID:
358 continue;
359 default:
360 kfree(xprt->address_strings[i]);
361 }
Chuck Leveredb267a2006-08-22 20:06:18 -0400362}
363
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400364#define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL)
365
Trond Myklebust24c56842006-10-17 15:06:22 -0400366static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400367{
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400368 struct msghdr msg = {
369 .msg_name = addr,
370 .msg_namelen = addrlen,
Trond Myklebust24c56842006-10-17 15:06:22 -0400371 .msg_flags = XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
372 };
373 struct kvec iov = {
374 .iov_base = vec->iov_base + base,
375 .iov_len = vec->iov_len - base,
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400376 };
377
Trond Myklebust24c56842006-10-17 15:06:22 -0400378 if (iov.iov_len != 0)
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400379 return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
380 return kernel_sendmsg(sock, &msg, NULL, 0, 0);
381}
382
Trond Myklebust24c56842006-10-17 15:06:22 -0400383static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more)
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400384{
Trond Myklebust24c56842006-10-17 15:06:22 -0400385 struct page **ppage;
386 unsigned int remainder;
387 int err, sent = 0;
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400388
Trond Myklebust24c56842006-10-17 15:06:22 -0400389 remainder = xdr->page_len - base;
390 base += xdr->page_base;
391 ppage = xdr->pages + (base >> PAGE_SHIFT);
392 base &= ~PAGE_MASK;
393 for(;;) {
394 unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
395 int flags = XS_SENDMSG_FLAGS;
396
397 remainder -= len;
398 if (remainder != 0 || more)
399 flags |= MSG_MORE;
400 err = sock->ops->sendpage(sock, *ppage, base, len, flags);
401 if (remainder == 0 || err != len)
402 break;
403 sent += err;
404 ppage++;
405 base = 0;
406 }
407 if (sent == 0)
408 return err;
409 if (err > 0)
410 sent += err;
411 return sent;
Chuck Leverb4b5cc82005-08-11 16:25:29 -0400412}
413
Chuck Lever9903cd12005-08-11 16:25:26 -0400414/**
415 * xs_sendpages - write pages directly to a socket
416 * @sock: socket to send on
417 * @addr: UDP only -- address of destination
418 * @addrlen: UDP only -- length of destination address
419 * @xdr: buffer containing this request
420 * @base: starting position in the buffer
421 *
Chuck Levera246b012005-08-11 16:25:23 -0400422 */
Trond Myklebust24c56842006-10-17 15:06:22 -0400423static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
Chuck Levera246b012005-08-11 16:25:23 -0400424{
Trond Myklebust24c56842006-10-17 15:06:22 -0400425 unsigned int remainder = xdr->len - base;
426 int err, sent = 0;
Chuck Levera246b012005-08-11 16:25:23 -0400427
Chuck Lever262965f2005-08-11 16:25:56 -0400428 if (unlikely(!sock))
Trond Myklebustfba91af2009-03-11 14:06:41 -0400429 return -ENOTSOCK;
Chuck Lever262965f2005-08-11 16:25:56 -0400430
431 clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
Trond Myklebust24c56842006-10-17 15:06:22 -0400432 if (base != 0) {
433 addr = NULL;
434 addrlen = 0;
435 }
Chuck Lever262965f2005-08-11 16:25:56 -0400436
Trond Myklebust24c56842006-10-17 15:06:22 -0400437 if (base < xdr->head[0].iov_len || addr != NULL) {
438 unsigned int len = xdr->head[0].iov_len - base;
439 remainder -= len;
440 err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
441 if (remainder == 0 || err != len)
Chuck Levera246b012005-08-11 16:25:23 -0400442 goto out;
Trond Myklebust24c56842006-10-17 15:06:22 -0400443 sent += err;
Chuck Levera246b012005-08-11 16:25:23 -0400444 base = 0;
445 } else
Trond Myklebust24c56842006-10-17 15:06:22 -0400446 base -= xdr->head[0].iov_len;
Chuck Levera246b012005-08-11 16:25:23 -0400447
Trond Myklebust24c56842006-10-17 15:06:22 -0400448 if (base < xdr->page_len) {
449 unsigned int len = xdr->page_len - base;
450 remainder -= len;
451 err = xs_send_pagedata(sock, xdr, base, remainder != 0);
452 if (remainder == 0 || err != len)
Chuck Levera246b012005-08-11 16:25:23 -0400453 goto out;
Trond Myklebust24c56842006-10-17 15:06:22 -0400454 sent += err;
Chuck Levera246b012005-08-11 16:25:23 -0400455 base = 0;
Trond Myklebust24c56842006-10-17 15:06:22 -0400456 } else
457 base -= xdr->page_len;
458
459 if (base >= xdr->tail[0].iov_len)
460 return sent;
461 err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
Chuck Levera246b012005-08-11 16:25:23 -0400462out:
Trond Myklebust24c56842006-10-17 15:06:22 -0400463 if (sent == 0)
464 return err;
465 if (err > 0)
466 sent += err;
467 return sent;
Chuck Levera246b012005-08-11 16:25:23 -0400468}
469
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400470static void xs_nospace_callback(struct rpc_task *task)
471{
472 struct sock_xprt *transport = container_of(task->tk_rqstp->rq_xprt, struct sock_xprt, xprt);
473
474 transport->inet->sk_write_pending--;
475 clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
476}
477
Chuck Lever9903cd12005-08-11 16:25:26 -0400478/**
Chuck Lever262965f2005-08-11 16:25:56 -0400479 * xs_nospace - place task on wait queue if transmit was incomplete
480 * @task: task to put to sleep
Chuck Lever9903cd12005-08-11 16:25:26 -0400481 *
Chuck Levera246b012005-08-11 16:25:23 -0400482 */
Trond Myklebust5e3771c2009-03-11 14:38:01 -0400483static int xs_nospace(struct rpc_task *task)
Chuck Levera246b012005-08-11 16:25:23 -0400484{
Chuck Lever262965f2005-08-11 16:25:56 -0400485 struct rpc_rqst *req = task->tk_rqstp;
486 struct rpc_xprt *xprt = req->rq_xprt;
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500487 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Trond Myklebust421f5592011-11-22 14:44:28 +0200488 int ret = -EAGAIN;
Chuck Levera246b012005-08-11 16:25:23 -0400489
Chuck Lever46121cf2007-01-31 12:14:08 -0500490 dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
Chuck Lever262965f2005-08-11 16:25:56 -0400491 task->tk_pid, req->rq_slen - req->rq_bytes_sent,
492 req->rq_slen);
493
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400494 /* Protect against races with write_space */
495 spin_lock_bh(&xprt->transport_lock);
Chuck Lever262965f2005-08-11 16:25:56 -0400496
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400497 /* Don't race with disconnect */
498 if (xprt_connected(xprt)) {
499 if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) {
500 /*
501 * Notify TCP that we're limited by the application
502 * window size
503 */
504 set_bit(SOCK_NOSPACE, &transport->sock->flags);
505 transport->inet->sk_write_pending++;
506 /* ...and wait for more buffer space */
507 xprt_wait_for_buffer_space(task, xs_nospace_callback);
508 }
509 } else {
510 clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
Trond Myklebust5e3771c2009-03-11 14:38:01 -0400511 ret = -ENOTCONN;
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400512 }
Chuck Lever262965f2005-08-11 16:25:56 -0400513
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400514 spin_unlock_bh(&xprt->transport_lock);
Trond Myklebust5e3771c2009-03-11 14:38:01 -0400515 return ret;
Chuck Lever262965f2005-08-11 16:25:56 -0400516}
517
Chuck Lever61677ee2011-05-09 15:22:34 -0400518/*
519 * Construct a stream transport record marker in @buf.
520 */
521static inline void xs_encode_stream_record_marker(struct xdr_buf *buf)
522{
523 u32 reclen = buf->len - sizeof(rpc_fraghdr);
524 rpc_fraghdr *base = buf->head[0].iov_base;
525 *base = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT | reclen);
526}
527
Chuck Lever262965f2005-08-11 16:25:56 -0400528/**
Chuck Lever176e21e2011-05-09 15:22:44 -0400529 * xs_local_send_request - write an RPC request to an AF_LOCAL socket
530 * @task: RPC task that manages the state of an RPC request
531 *
532 * Return values:
533 * 0: The request has been sent
534 * EAGAIN: The socket was blocked, please call again later to
535 * complete the request
536 * ENOTCONN: Caller needs to invoke connect logic then call again
537 * other: Some other error occured, the request was not sent
538 */
539static int xs_local_send_request(struct rpc_task *task)
540{
541 struct rpc_rqst *req = task->tk_rqstp;
542 struct rpc_xprt *xprt = req->rq_xprt;
543 struct sock_xprt *transport =
544 container_of(xprt, struct sock_xprt, xprt);
545 struct xdr_buf *xdr = &req->rq_snd_buf;
546 int status;
547
548 xs_encode_stream_record_marker(&req->rq_snd_buf);
549
550 xs_pktdump("packet data:",
551 req->rq_svec->iov_base, req->rq_svec->iov_len);
552
553 status = xs_sendpages(transport->sock, NULL, 0,
554 xdr, req->rq_bytes_sent);
555 dprintk("RPC: %s(%u) = %d\n",
556 __func__, xdr->len - req->rq_bytes_sent, status);
557 if (likely(status >= 0)) {
558 req->rq_bytes_sent += status;
559 req->rq_xmit_bytes_sent += status;
560 if (likely(req->rq_bytes_sent >= req->rq_slen)) {
561 req->rq_bytes_sent = 0;
562 return 0;
563 }
564 status = -EAGAIN;
565 }
566
567 switch (status) {
568 case -EAGAIN:
569 status = xs_nospace(task);
570 break;
571 default:
572 dprintk("RPC: sendmsg returned unrecognized error %d\n",
573 -status);
574 case -EPIPE:
575 xs_close(xprt);
576 status = -ENOTCONN;
577 }
578
579 return status;
580}
581
582/**
Chuck Lever262965f2005-08-11 16:25:56 -0400583 * xs_udp_send_request - write an RPC request to a UDP socket
584 * @task: address of RPC task that manages the state of an RPC request
585 *
586 * Return values:
587 * 0: The request has been sent
588 * EAGAIN: The socket was blocked, please call again later to
589 * complete the request
590 * ENOTCONN: Caller needs to invoke connect logic then call again
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300591 * other: Some other error occurred, the request was not sent
Chuck Lever262965f2005-08-11 16:25:56 -0400592 */
593static int xs_udp_send_request(struct rpc_task *task)
594{
595 struct rpc_rqst *req = task->tk_rqstp;
596 struct rpc_xprt *xprt = req->rq_xprt;
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500597 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Lever262965f2005-08-11 16:25:56 -0400598 struct xdr_buf *xdr = &req->rq_snd_buf;
599 int status;
Chuck Levera246b012005-08-11 16:25:23 -0400600
Chuck Lever9903cd12005-08-11 16:25:26 -0400601 xs_pktdump("packet data:",
Chuck Levera246b012005-08-11 16:25:23 -0400602 req->rq_svec->iov_base,
603 req->rq_svec->iov_len);
604
Trond Myklebust01d37c42009-03-11 14:09:39 -0400605 if (!xprt_bound(xprt))
606 return -ENOTCONN;
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500607 status = xs_sendpages(transport->sock,
Chuck Lever95392c52007-08-06 11:57:58 -0400608 xs_addr(xprt),
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500609 xprt->addrlen, xdr,
610 req->rq_bytes_sent);
Chuck Levera246b012005-08-11 16:25:23 -0400611
Chuck Lever46121cf2007-01-31 12:14:08 -0500612 dprintk("RPC: xs_udp_send_request(%u) = %d\n",
Chuck Lever262965f2005-08-11 16:25:56 -0400613 xdr->len - req->rq_bytes_sent, status);
Chuck Levera246b012005-08-11 16:25:23 -0400614
Trond Myklebust21997002007-10-01 11:43:37 -0400615 if (status >= 0) {
Trond Myklebustd60dbb22010-05-13 12:51:49 -0400616 req->rq_xmit_bytes_sent += status;
Trond Myklebust21997002007-10-01 11:43:37 -0400617 if (status >= req->rq_slen)
618 return 0;
619 /* Still some bytes left; set up for a retry later. */
Chuck Lever262965f2005-08-11 16:25:56 -0400620 status = -EAGAIN;
Trond Myklebust21997002007-10-01 11:43:37 -0400621 }
Chuck Levera246b012005-08-11 16:25:23 -0400622
Chuck Lever262965f2005-08-11 16:25:56 -0400623 switch (status) {
Trond Myklebustfba91af2009-03-11 14:06:41 -0400624 case -ENOTSOCK:
625 status = -ENOTCONN;
626 /* Should we call xs_close() here? */
627 break;
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400628 case -EAGAIN:
Trond Myklebust5e3771c2009-03-11 14:38:01 -0400629 status = xs_nospace(task);
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400630 break;
Trond Myklebustc8485e42009-03-11 14:37:59 -0400631 default:
632 dprintk("RPC: sendmsg returned unrecognized error %d\n",
633 -status);
Chuck Lever262965f2005-08-11 16:25:56 -0400634 case -ENETUNREACH:
635 case -EPIPE:
Chuck Levera246b012005-08-11 16:25:23 -0400636 case -ECONNREFUSED:
637 /* When the server has died, an ICMP port unreachable message
Chuck Lever9903cd12005-08-11 16:25:26 -0400638 * prompts ECONNREFUSED. */
Trond Myklebustb6ddf642008-04-17 18:52:19 -0400639 clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
Chuck Levera246b012005-08-11 16:25:23 -0400640 }
Bian Naimeng5fe46e92010-03-08 14:49:01 +0800641
Chuck Lever262965f2005-08-11 16:25:56 -0400642 return status;
Chuck Levera246b012005-08-11 16:25:23 -0400643}
644
Trond Myklebuste06799f2007-11-05 15:44:12 -0500645/**
646 * xs_tcp_shutdown - gracefully shut down a TCP socket
647 * @xprt: transport
648 *
649 * Initiates a graceful shutdown of the TCP socket by calling the
650 * equivalent of shutdown(SHUT_WR);
651 */
652static void xs_tcp_shutdown(struct rpc_xprt *xprt)
653{
654 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
655 struct socket *sock = transport->sock;
656
657 if (sock != NULL)
658 kernel_sock_shutdown(sock, SHUT_WR);
659}
660
Chuck Lever9903cd12005-08-11 16:25:26 -0400661/**
Chuck Lever262965f2005-08-11 16:25:56 -0400662 * xs_tcp_send_request - write an RPC request to a TCP socket
Chuck Lever9903cd12005-08-11 16:25:26 -0400663 * @task: address of RPC task that manages the state of an RPC request
664 *
665 * Return values:
Chuck Lever262965f2005-08-11 16:25:56 -0400666 * 0: The request has been sent
667 * EAGAIN: The socket was blocked, please call again later to
668 * complete the request
669 * ENOTCONN: Caller needs to invoke connect logic then call again
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300670 * other: Some other error occurred, the request was not sent
Chuck Lever9903cd12005-08-11 16:25:26 -0400671 *
672 * XXX: In the case of soft timeouts, should we eventually give up
Chuck Lever262965f2005-08-11 16:25:56 -0400673 * if sendmsg is not able to make progress?
Chuck Lever9903cd12005-08-11 16:25:26 -0400674 */
Chuck Lever262965f2005-08-11 16:25:56 -0400675static int xs_tcp_send_request(struct rpc_task *task)
Chuck Levera246b012005-08-11 16:25:23 -0400676{
677 struct rpc_rqst *req = task->tk_rqstp;
678 struct rpc_xprt *xprt = req->rq_xprt;
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500679 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Lever262965f2005-08-11 16:25:56 -0400680 struct xdr_buf *xdr = &req->rq_snd_buf;
Chuck Leverb595bb12007-08-06 11:56:42 -0400681 int status;
Chuck Levera246b012005-08-11 16:25:23 -0400682
Chuck Lever61677ee2011-05-09 15:22:34 -0400683 xs_encode_stream_record_marker(&req->rq_snd_buf);
Chuck Levera246b012005-08-11 16:25:23 -0400684
Chuck Lever262965f2005-08-11 16:25:56 -0400685 xs_pktdump("packet data:",
686 req->rq_svec->iov_base,
687 req->rq_svec->iov_len);
Chuck Levera246b012005-08-11 16:25:23 -0400688
689 /* Continue transmitting the packet/record. We must be careful
690 * to cope with writespace callbacks arriving _after_ we have
Chuck Lever262965f2005-08-11 16:25:56 -0400691 * called sendmsg(). */
Chuck Levera246b012005-08-11 16:25:23 -0400692 while (1) {
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500693 status = xs_sendpages(transport->sock,
694 NULL, 0, xdr, req->rq_bytes_sent);
Chuck Levera246b012005-08-11 16:25:23 -0400695
Chuck Lever46121cf2007-01-31 12:14:08 -0500696 dprintk("RPC: xs_tcp_send_request(%u) = %d\n",
Chuck Lever262965f2005-08-11 16:25:56 -0400697 xdr->len - req->rq_bytes_sent, status);
698
699 if (unlikely(status < 0))
Chuck Levera246b012005-08-11 16:25:23 -0400700 break;
701
Chuck Lever262965f2005-08-11 16:25:56 -0400702 /* If we've sent the entire packet, immediately
703 * reset the count of bytes sent. */
704 req->rq_bytes_sent += status;
Trond Myklebustd60dbb22010-05-13 12:51:49 -0400705 req->rq_xmit_bytes_sent += status;
Chuck Lever262965f2005-08-11 16:25:56 -0400706 if (likely(req->rq_bytes_sent >= req->rq_slen)) {
707 req->rq_bytes_sent = 0;
708 return 0;
Chuck Levera246b012005-08-11 16:25:23 -0400709 }
710
Trond Myklebust06b4b682008-04-16 16:51:38 -0400711 if (status != 0)
712 continue;
Chuck Levera246b012005-08-11 16:25:23 -0400713 status = -EAGAIN;
Trond Myklebust06b4b682008-04-16 16:51:38 -0400714 break;
Chuck Levera246b012005-08-11 16:25:23 -0400715 }
716
Chuck Lever262965f2005-08-11 16:25:56 -0400717 switch (status) {
Trond Myklebustfba91af2009-03-11 14:06:41 -0400718 case -ENOTSOCK:
719 status = -ENOTCONN;
720 /* Should we call xs_close() here? */
721 break;
Chuck Lever262965f2005-08-11 16:25:56 -0400722 case -EAGAIN:
Trond Myklebust5e3771c2009-03-11 14:38:01 -0400723 status = xs_nospace(task);
Chuck Lever262965f2005-08-11 16:25:56 -0400724 break;
725 default:
Chuck Lever46121cf2007-01-31 12:14:08 -0500726 dprintk("RPC: sendmsg returned unrecognized error %d\n",
Chuck Lever262965f2005-08-11 16:25:56 -0400727 -status);
Chuck Lever262965f2005-08-11 16:25:56 -0400728 case -ECONNRESET:
Trond Myklebust55420c22009-03-11 15:29:24 -0400729 case -EPIPE:
Trond Myklebuste06799f2007-11-05 15:44:12 -0500730 xs_tcp_shutdown(xprt);
Chuck Lever262965f2005-08-11 16:25:56 -0400731 case -ECONNREFUSED:
732 case -ENOTCONN:
Chuck Lever262965f2005-08-11 16:25:56 -0400733 clear_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags);
Chuck Levera246b012005-08-11 16:25:23 -0400734 }
Bian Naimeng5fe46e92010-03-08 14:49:01 +0800735
Chuck Levera246b012005-08-11 16:25:23 -0400736 return status;
737}
738
Chuck Lever9903cd12005-08-11 16:25:26 -0400739/**
Trond Myklebuste0ab53d2006-07-27 17:22:50 -0400740 * xs_tcp_release_xprt - clean up after a tcp transmission
741 * @xprt: transport
742 * @task: rpc task
743 *
744 * This cleans up if an error causes us to abort the transmission of a request.
745 * In this case, the socket may need to be reset in order to avoid confusing
746 * the server.
747 */
748static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
749{
750 struct rpc_rqst *req;
751
752 if (task != xprt->snd_task)
753 return;
754 if (task == NULL)
755 goto out_release;
756 req = task->tk_rqstp;
757 if (req->rq_bytes_sent == 0)
758 goto out_release;
759 if (req->rq_bytes_sent == req->rq_snd_buf.len)
760 goto out_release;
761 set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state);
762out_release:
763 xprt_release_xprt(xprt, task);
764}
765
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -0400766static void xs_save_old_callbacks(struct sock_xprt *transport, struct sock *sk)
767{
768 transport->old_data_ready = sk->sk_data_ready;
769 transport->old_state_change = sk->sk_state_change;
770 transport->old_write_space = sk->sk_write_space;
771 transport->old_error_report = sk->sk_error_report;
772}
773
774static void xs_restore_old_callbacks(struct sock_xprt *transport, struct sock *sk)
775{
776 sk->sk_data_ready = transport->old_data_ready;
777 sk->sk_state_change = transport->old_state_change;
778 sk->sk_write_space = transport->old_write_space;
779 sk->sk_error_report = transport->old_error_report;
780}
781
Chuck Leverfe315e72009-03-11 14:10:21 -0400782static void xs_reset_transport(struct sock_xprt *transport)
Chuck Levera246b012005-08-11 16:25:23 -0400783{
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500784 struct socket *sock = transport->sock;
785 struct sock *sk = transport->inet;
Chuck Levera246b012005-08-11 16:25:23 -0400786
Chuck Leverfe315e72009-03-11 14:10:21 -0400787 if (sk == NULL)
788 return;
Chuck Lever9903cd12005-08-11 16:25:26 -0400789
Trond Myklebust246408d2011-03-22 18:40:10 -0400790 transport->srcport = 0;
791
Chuck Levera246b012005-08-11 16:25:23 -0400792 write_lock_bh(&sk->sk_callback_lock);
Chuck Leveree0ac0c2006-12-05 16:35:15 -0500793 transport->inet = NULL;
794 transport->sock = NULL;
Chuck Levera246b012005-08-11 16:25:23 -0400795
Chuck Lever9903cd12005-08-11 16:25:26 -0400796 sk->sk_user_data = NULL;
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -0400797
798 xs_restore_old_callbacks(transport, sk);
Chuck Levera246b012005-08-11 16:25:23 -0400799 write_unlock_bh(&sk->sk_callback_lock);
800
Chuck Lever9903cd12005-08-11 16:25:26 -0400801 sk->sk_no_check = 0;
Chuck Levera246b012005-08-11 16:25:23 -0400802
803 sock_release(sock);
Chuck Leverfe315e72009-03-11 14:10:21 -0400804}
805
806/**
807 * xs_close - close a socket
808 * @xprt: transport
809 *
810 * This is used when all requests are complete; ie, no DRC state remains
811 * on the server we want to save.
Trond Myklebustf75e6742009-04-21 17:18:20 -0400812 *
813 * The caller _must_ be holding XPRT_LOCKED in order to avoid issues with
814 * xs_reset_transport() zeroing the socket from underneath a writer.
Chuck Leverfe315e72009-03-11 14:10:21 -0400815 */
816static void xs_close(struct rpc_xprt *xprt)
817{
818 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
819
820 dprintk("RPC: xs_close xprt %p\n", xprt);
821
822 xs_reset_transport(transport);
Neil Brown61d0a8e2009-09-23 14:36:37 -0400823 xprt->reestablish_timeout = 0;
Chuck Leverfe315e72009-03-11 14:10:21 -0400824
Trond Myklebust632e3bd2006-01-03 09:55:55 +0100825 smp_mb__before_clear_bit();
Trond Myklebust7d1e8252009-03-11 14:38:03 -0400826 clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
Trond Myklebust632e3bd2006-01-03 09:55:55 +0100827 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
Trond Myklebust3b948ae2007-11-05 17:42:39 -0500828 clear_bit(XPRT_CLOSING, &xprt->state);
Trond Myklebust632e3bd2006-01-03 09:55:55 +0100829 smp_mb__after_clear_bit();
Trond Myklebust62da3b22007-11-06 18:44:20 -0500830 xprt_disconnect_done(xprt);
Chuck Levera246b012005-08-11 16:25:23 -0400831}
832
Trond Myklebustf75e6742009-04-21 17:18:20 -0400833static void xs_tcp_close(struct rpc_xprt *xprt)
834{
835 if (test_and_clear_bit(XPRT_CONNECTION_CLOSE, &xprt->state))
836 xs_close(xprt);
837 else
838 xs_tcp_shutdown(xprt);
839}
840
Chuck Lever9903cd12005-08-11 16:25:26 -0400841/**
842 * xs_destroy - prepare to shutdown a transport
843 * @xprt: doomed transport
844 *
845 */
846static void xs_destroy(struct rpc_xprt *xprt)
Chuck Levera246b012005-08-11 16:25:23 -0400847{
Chuck Leverc8475462006-12-05 16:35:26 -0500848 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
849
Chuck Lever46121cf2007-01-31 12:14:08 -0500850 dprintk("RPC: xs_destroy xprt %p\n", xprt);
Chuck Lever9903cd12005-08-11 16:25:26 -0400851
Tejun Heoafe2c512010-12-14 16:21:17 +0100852 cancel_delayed_work_sync(&transport->connect_worker);
Chuck Levera246b012005-08-11 16:25:23 -0400853
Chuck Lever9903cd12005-08-11 16:25:26 -0400854 xs_close(xprt);
Chuck Leveredb267a2006-08-22 20:06:18 -0400855 xs_free_peer_addresses(xprt);
Pavel Emelyanove204e622010-09-29 16:03:13 +0400856 xprt_free(xprt);
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -0400857 module_put(THIS_MODULE);
Chuck Levera246b012005-08-11 16:25:23 -0400858}
859
Chuck Lever9903cd12005-08-11 16:25:26 -0400860static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
Chuck Levera246b012005-08-11 16:25:23 -0400861{
Chuck Lever9903cd12005-08-11 16:25:26 -0400862 return (struct rpc_xprt *) sk->sk_user_data;
863}
864
Chuck Lever176e21e2011-05-09 15:22:44 -0400865static int xs_local_copy_to_xdr(struct xdr_buf *xdr, struct sk_buff *skb)
866{
867 struct xdr_skb_reader desc = {
868 .skb = skb,
869 .offset = sizeof(rpc_fraghdr),
870 .count = skb->len - sizeof(rpc_fraghdr),
871 };
872
873 if (xdr_partial_copy_from_skb(xdr, 0, &desc, xdr_skb_read_bits) < 0)
874 return -1;
875 if (desc.count)
876 return -1;
877 return 0;
878}
879
880/**
881 * xs_local_data_ready - "data ready" callback for AF_LOCAL sockets
882 * @sk: socket with data to read
883 * @len: how much data to read
884 *
885 * Currently this assumes we can read the whole reply in a single gulp.
886 */
887static void xs_local_data_ready(struct sock *sk, int len)
888{
889 struct rpc_task *task;
890 struct rpc_xprt *xprt;
891 struct rpc_rqst *rovr;
892 struct sk_buff *skb;
893 int err, repsize, copied;
894 u32 _xid;
895 __be32 *xp;
896
897 read_lock_bh(&sk->sk_callback_lock);
898 dprintk("RPC: %s...\n", __func__);
899 xprt = xprt_from_sock(sk);
900 if (xprt == NULL)
901 goto out;
902
903 skb = skb_recv_datagram(sk, 0, 1, &err);
904 if (skb == NULL)
905 goto out;
906
907 if (xprt->shutdown)
908 goto dropit;
909
910 repsize = skb->len - sizeof(rpc_fraghdr);
911 if (repsize < 4) {
912 dprintk("RPC: impossible RPC reply size %d\n", repsize);
913 goto dropit;
914 }
915
916 /* Copy the XID from the skb... */
917 xp = skb_header_pointer(skb, sizeof(rpc_fraghdr), sizeof(_xid), &_xid);
918 if (xp == NULL)
919 goto dropit;
920
921 /* Look up and lock the request corresponding to the given XID */
922 spin_lock(&xprt->transport_lock);
923 rovr = xprt_lookup_rqst(xprt, *xp);
924 if (!rovr)
925 goto out_unlock;
926 task = rovr->rq_task;
927
928 copied = rovr->rq_private_buf.buflen;
929 if (copied > repsize)
930 copied = repsize;
931
932 if (xs_local_copy_to_xdr(&rovr->rq_private_buf, skb)) {
933 dprintk("RPC: sk_buff copy failed\n");
934 goto out_unlock;
935 }
936
937 xprt_complete_rqst(task, copied);
938
939 out_unlock:
940 spin_unlock(&xprt->transport_lock);
941 dropit:
942 skb_free_datagram(sk, skb);
943 out:
944 read_unlock_bh(&sk->sk_callback_lock);
945}
946
Chuck Lever9903cd12005-08-11 16:25:26 -0400947/**
948 * xs_udp_data_ready - "data ready" callback for UDP sockets
949 * @sk: socket with data to read
950 * @len: how much data to read
951 *
952 */
953static void xs_udp_data_ready(struct sock *sk, int len)
954{
955 struct rpc_task *task;
956 struct rpc_xprt *xprt;
Chuck Levera246b012005-08-11 16:25:23 -0400957 struct rpc_rqst *rovr;
Chuck Lever9903cd12005-08-11 16:25:26 -0400958 struct sk_buff *skb;
Chuck Levera246b012005-08-11 16:25:23 -0400959 int err, repsize, copied;
Alexey Dobriyand8ed0292006-09-26 22:29:38 -0700960 u32 _xid;
961 __be32 *xp;
Chuck Levera246b012005-08-11 16:25:23 -0400962
Eric Dumazetf064af12010-09-22 12:43:39 +0000963 read_lock_bh(&sk->sk_callback_lock);
Chuck Lever46121cf2007-01-31 12:14:08 -0500964 dprintk("RPC: xs_udp_data_ready...\n");
Chuck Lever9903cd12005-08-11 16:25:26 -0400965 if (!(xprt = xprt_from_sock(sk)))
Chuck Levera246b012005-08-11 16:25:23 -0400966 goto out;
Chuck Levera246b012005-08-11 16:25:23 -0400967
968 if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
969 goto out;
970
971 if (xprt->shutdown)
972 goto dropit;
973
974 repsize = skb->len - sizeof(struct udphdr);
975 if (repsize < 4) {
Chuck Lever46121cf2007-01-31 12:14:08 -0500976 dprintk("RPC: impossible RPC reply size %d!\n", repsize);
Chuck Levera246b012005-08-11 16:25:23 -0400977 goto dropit;
978 }
979
980 /* Copy the XID from the skb... */
981 xp = skb_header_pointer(skb, sizeof(struct udphdr),
982 sizeof(_xid), &_xid);
983 if (xp == NULL)
984 goto dropit;
985
986 /* Look up and lock the request corresponding to the given XID */
Chuck Lever4a0f8c02005-08-11 16:25:32 -0400987 spin_lock(&xprt->transport_lock);
Chuck Levera246b012005-08-11 16:25:23 -0400988 rovr = xprt_lookup_rqst(xprt, *xp);
989 if (!rovr)
990 goto out_unlock;
991 task = rovr->rq_task;
992
Chuck Levera246b012005-08-11 16:25:23 -0400993 if ((copied = rovr->rq_private_buf.buflen) > repsize)
994 copied = repsize;
995
996 /* Suck it into the iovec, verify checksum if not done by hw. */
Herbert Xu1781f7f2007-12-11 11:30:32 -0800997 if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
998 UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS);
Chuck Levera246b012005-08-11 16:25:23 -0400999 goto out_unlock;
Herbert Xu1781f7f2007-12-11 11:30:32 -08001000 }
1001
1002 UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS);
Chuck Levera246b012005-08-11 16:25:23 -04001003
1004 /* Something worked... */
Eric Dumazetadf30902009-06-02 05:19:30 +00001005 dst_confirm(skb_dst(skb));
Chuck Levera246b012005-08-11 16:25:23 -04001006
Chuck Lever1570c1e2005-08-25 16:25:52 -07001007 xprt_adjust_cwnd(task, copied);
Chuck Lever1570c1e2005-08-25 16:25:52 -07001008 xprt_complete_rqst(task, copied);
Chuck Levera246b012005-08-11 16:25:23 -04001009
1010 out_unlock:
Chuck Lever4a0f8c02005-08-11 16:25:32 -04001011 spin_unlock(&xprt->transport_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001012 dropit:
1013 skb_free_datagram(sk, skb);
1014 out:
Eric Dumazetf064af12010-09-22 12:43:39 +00001015 read_unlock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001016}
1017
Chuck Leverdd456472006-12-05 16:35:44 -05001018static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
Chuck Levera246b012005-08-11 16:25:23 -04001019{
Chuck Lever51971132006-12-05 16:35:19 -05001020 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Levera246b012005-08-11 16:25:23 -04001021 size_t len, used;
1022 char *p;
1023
Chuck Lever51971132006-12-05 16:35:19 -05001024 p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
1025 len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
Chuck Lever9d292312006-12-05 16:35:41 -05001026 used = xdr_skb_read_bits(desc, p, len);
Chuck Lever51971132006-12-05 16:35:19 -05001027 transport->tcp_offset += used;
Chuck Levera246b012005-08-11 16:25:23 -04001028 if (used != len)
1029 return;
Chuck Lever808012f2005-08-25 16:25:49 -07001030
Chuck Lever51971132006-12-05 16:35:19 -05001031 transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
1032 if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
Chuck Levere136d092006-12-05 16:35:23 -05001033 transport->tcp_flags |= TCP_RCV_LAST_FRAG;
Chuck Levera246b012005-08-11 16:25:23 -04001034 else
Chuck Levere136d092006-12-05 16:35:23 -05001035 transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
Chuck Lever51971132006-12-05 16:35:19 -05001036 transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
Chuck Lever808012f2005-08-25 16:25:49 -07001037
Chuck Levere136d092006-12-05 16:35:23 -05001038 transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
Chuck Lever51971132006-12-05 16:35:19 -05001039 transport->tcp_offset = 0;
Chuck Lever808012f2005-08-25 16:25:49 -07001040
Chuck Levera246b012005-08-11 16:25:23 -04001041 /* Sanity check of the record length */
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001042 if (unlikely(transport->tcp_reclen < 8)) {
Chuck Lever46121cf2007-01-31 12:14:08 -05001043 dprintk("RPC: invalid TCP record fragment length\n");
Trond Myklebust3ebb0672007-11-06 18:40:12 -05001044 xprt_force_disconnect(xprt);
Chuck Lever9903cd12005-08-11 16:25:26 -04001045 return;
Chuck Levera246b012005-08-11 16:25:23 -04001046 }
Chuck Lever46121cf2007-01-31 12:14:08 -05001047 dprintk("RPC: reading TCP record fragment of length %d\n",
Chuck Lever51971132006-12-05 16:35:19 -05001048 transport->tcp_reclen);
Chuck Levera246b012005-08-11 16:25:23 -04001049}
1050
Chuck Lever51971132006-12-05 16:35:19 -05001051static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
Chuck Levera246b012005-08-11 16:25:23 -04001052{
Chuck Lever51971132006-12-05 16:35:19 -05001053 if (transport->tcp_offset == transport->tcp_reclen) {
Chuck Levere136d092006-12-05 16:35:23 -05001054 transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
Chuck Lever51971132006-12-05 16:35:19 -05001055 transport->tcp_offset = 0;
Chuck Levere136d092006-12-05 16:35:23 -05001056 if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
1057 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1058 transport->tcp_flags |= TCP_RCV_COPY_XID;
Chuck Lever51971132006-12-05 16:35:19 -05001059 transport->tcp_copied = 0;
Chuck Levera246b012005-08-11 16:25:23 -04001060 }
1061 }
1062}
1063
Chuck Leverdd456472006-12-05 16:35:44 -05001064static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
Chuck Levera246b012005-08-11 16:25:23 -04001065{
1066 size_t len, used;
1067 char *p;
1068
Chuck Lever51971132006-12-05 16:35:19 -05001069 len = sizeof(transport->tcp_xid) - transport->tcp_offset;
Chuck Lever46121cf2007-01-31 12:14:08 -05001070 dprintk("RPC: reading XID (%Zu bytes)\n", len);
Chuck Lever51971132006-12-05 16:35:19 -05001071 p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
Chuck Lever9d292312006-12-05 16:35:41 -05001072 used = xdr_skb_read_bits(desc, p, len);
Chuck Lever51971132006-12-05 16:35:19 -05001073 transport->tcp_offset += used;
Chuck Levera246b012005-08-11 16:25:23 -04001074 if (used != len)
1075 return;
Chuck Levere136d092006-12-05 16:35:23 -05001076 transport->tcp_flags &= ~TCP_RCV_COPY_XID;
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001077 transport->tcp_flags |= TCP_RCV_READ_CALLDIR;
Chuck Lever51971132006-12-05 16:35:19 -05001078 transport->tcp_copied = 4;
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001079 dprintk("RPC: reading %s XID %08x\n",
1080 (transport->tcp_flags & TCP_RPC_REPLY) ? "reply for"
1081 : "request with",
Chuck Lever51971132006-12-05 16:35:19 -05001082 ntohl(transport->tcp_xid));
1083 xs_tcp_check_fraghdr(transport);
Chuck Levera246b012005-08-11 16:25:23 -04001084}
1085
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001086static inline void xs_tcp_read_calldir(struct sock_xprt *transport,
1087 struct xdr_skb_reader *desc)
Chuck Levera246b012005-08-11 16:25:23 -04001088{
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001089 size_t len, used;
1090 u32 offset;
Trond Myklebustb76ce562010-06-16 13:57:32 -04001091 char *p;
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001092
1093 /*
1094 * We want transport->tcp_offset to be 8 at the end of this routine
1095 * (4 bytes for the xid and 4 bytes for the call/reply flag).
1096 * When this function is called for the first time,
1097 * transport->tcp_offset is 4 (after having already read the xid).
1098 */
1099 offset = transport->tcp_offset - sizeof(transport->tcp_xid);
Trond Myklebustb76ce562010-06-16 13:57:32 -04001100 len = sizeof(transport->tcp_calldir) - offset;
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001101 dprintk("RPC: reading CALL/REPLY flag (%Zu bytes)\n", len);
Trond Myklebustb76ce562010-06-16 13:57:32 -04001102 p = ((char *) &transport->tcp_calldir) + offset;
1103 used = xdr_skb_read_bits(desc, p, len);
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001104 transport->tcp_offset += used;
1105 if (used != len)
1106 return;
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001107 transport->tcp_flags &= ~TCP_RCV_READ_CALLDIR;
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001108 /*
1109 * We don't yet have the XDR buffer, so we will write the calldir
1110 * out after we get the buffer from the 'struct rpc_rqst'
1111 */
Trond Myklebustb76ce562010-06-16 13:57:32 -04001112 switch (ntohl(transport->tcp_calldir)) {
1113 case RPC_REPLY:
1114 transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
1115 transport->tcp_flags |= TCP_RCV_COPY_DATA;
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001116 transport->tcp_flags |= TCP_RPC_REPLY;
Trond Myklebustb76ce562010-06-16 13:57:32 -04001117 break;
1118 case RPC_CALL:
1119 transport->tcp_flags |= TCP_RCV_COPY_CALLDIR;
1120 transport->tcp_flags |= TCP_RCV_COPY_DATA;
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001121 transport->tcp_flags &= ~TCP_RPC_REPLY;
Trond Myklebustb76ce562010-06-16 13:57:32 -04001122 break;
1123 default:
1124 dprintk("RPC: invalid request message type\n");
1125 xprt_force_disconnect(&transport->xprt);
1126 }
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001127 xs_tcp_check_fraghdr(transport);
1128}
1129
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001130static inline void xs_tcp_read_common(struct rpc_xprt *xprt,
1131 struct xdr_skb_reader *desc,
1132 struct rpc_rqst *req)
Chuck Levera246b012005-08-11 16:25:23 -04001133{
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001134 struct sock_xprt *transport =
1135 container_of(xprt, struct sock_xprt, xprt);
Chuck Levera246b012005-08-11 16:25:23 -04001136 struct xdr_buf *rcvbuf;
1137 size_t len;
1138 ssize_t r;
1139
Chuck Levera246b012005-08-11 16:25:23 -04001140 rcvbuf = &req->rq_private_buf;
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001141
1142 if (transport->tcp_flags & TCP_RCV_COPY_CALLDIR) {
1143 /*
1144 * Save the RPC direction in the XDR buffer
1145 */
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001146 memcpy(rcvbuf->head[0].iov_base + transport->tcp_copied,
Trond Myklebustb76ce562010-06-16 13:57:32 -04001147 &transport->tcp_calldir,
1148 sizeof(transport->tcp_calldir));
1149 transport->tcp_copied += sizeof(transport->tcp_calldir);
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001150 transport->tcp_flags &= ~TCP_RCV_COPY_CALLDIR;
Chuck Levera246b012005-08-11 16:25:23 -04001151 }
1152
Chuck Levera246b012005-08-11 16:25:23 -04001153 len = desc->count;
Chuck Lever51971132006-12-05 16:35:19 -05001154 if (len > transport->tcp_reclen - transport->tcp_offset) {
Chuck Leverdd456472006-12-05 16:35:44 -05001155 struct xdr_skb_reader my_desc;
Chuck Levera246b012005-08-11 16:25:23 -04001156
Chuck Lever51971132006-12-05 16:35:19 -05001157 len = transport->tcp_reclen - transport->tcp_offset;
Chuck Levera246b012005-08-11 16:25:23 -04001158 memcpy(&my_desc, desc, sizeof(my_desc));
1159 my_desc.count = len;
Chuck Lever51971132006-12-05 16:35:19 -05001160 r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
Chuck Lever9d292312006-12-05 16:35:41 -05001161 &my_desc, xdr_skb_read_bits);
Chuck Levera246b012005-08-11 16:25:23 -04001162 desc->count -= r;
1163 desc->offset += r;
1164 } else
Chuck Lever51971132006-12-05 16:35:19 -05001165 r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
Chuck Lever9d292312006-12-05 16:35:41 -05001166 desc, xdr_skb_read_bits);
Chuck Levera246b012005-08-11 16:25:23 -04001167
1168 if (r > 0) {
Chuck Lever51971132006-12-05 16:35:19 -05001169 transport->tcp_copied += r;
1170 transport->tcp_offset += r;
Chuck Levera246b012005-08-11 16:25:23 -04001171 }
1172 if (r != len) {
1173 /* Error when copying to the receive buffer,
1174 * usually because we weren't able to allocate
1175 * additional buffer pages. All we can do now
Chuck Levere136d092006-12-05 16:35:23 -05001176 * is turn off TCP_RCV_COPY_DATA, so the request
Chuck Levera246b012005-08-11 16:25:23 -04001177 * will not receive any additional updates,
1178 * and time out.
1179 * Any remaining data from this record will
1180 * be discarded.
1181 */
Chuck Levere136d092006-12-05 16:35:23 -05001182 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
Chuck Lever46121cf2007-01-31 12:14:08 -05001183 dprintk("RPC: XID %08x truncated request\n",
Chuck Lever51971132006-12-05 16:35:19 -05001184 ntohl(transport->tcp_xid));
Chuck Lever46121cf2007-01-31 12:14:08 -05001185 dprintk("RPC: xprt = %p, tcp_copied = %lu, "
1186 "tcp_offset = %u, tcp_reclen = %u\n",
1187 xprt, transport->tcp_copied,
1188 transport->tcp_offset, transport->tcp_reclen);
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001189 return;
Chuck Levera246b012005-08-11 16:25:23 -04001190 }
1191
Chuck Lever46121cf2007-01-31 12:14:08 -05001192 dprintk("RPC: XID %08x read %Zd bytes\n",
Chuck Lever51971132006-12-05 16:35:19 -05001193 ntohl(transport->tcp_xid), r);
Chuck Lever46121cf2007-01-31 12:14:08 -05001194 dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
1195 "tcp_reclen = %u\n", xprt, transport->tcp_copied,
1196 transport->tcp_offset, transport->tcp_reclen);
Chuck Levera246b012005-08-11 16:25:23 -04001197
Chuck Lever51971132006-12-05 16:35:19 -05001198 if (transport->tcp_copied == req->rq_private_buf.buflen)
Chuck Levere136d092006-12-05 16:35:23 -05001199 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
Chuck Lever51971132006-12-05 16:35:19 -05001200 else if (transport->tcp_offset == transport->tcp_reclen) {
Chuck Levere136d092006-12-05 16:35:23 -05001201 if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
1202 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
Chuck Levera246b012005-08-11 16:25:23 -04001203 }
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001204}
1205
1206/*
1207 * Finds the request corresponding to the RPC xid and invokes the common
1208 * tcp read code to read the data.
1209 */
1210static inline int xs_tcp_read_reply(struct rpc_xprt *xprt,
1211 struct xdr_skb_reader *desc)
1212{
1213 struct sock_xprt *transport =
1214 container_of(xprt, struct sock_xprt, xprt);
1215 struct rpc_rqst *req;
1216
1217 dprintk("RPC: read reply XID %08x\n", ntohl(transport->tcp_xid));
1218
1219 /* Find and lock the request corresponding to this xid */
1220 spin_lock(&xprt->transport_lock);
1221 req = xprt_lookup_rqst(xprt, transport->tcp_xid);
1222 if (!req) {
1223 dprintk("RPC: XID %08x request not found!\n",
1224 ntohl(transport->tcp_xid));
1225 spin_unlock(&xprt->transport_lock);
1226 return -1;
1227 }
1228
1229 xs_tcp_read_common(xprt, desc, req);
1230
Chuck Levere136d092006-12-05 16:35:23 -05001231 if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
Chuck Lever51971132006-12-05 16:35:19 -05001232 xprt_complete_rqst(req->rq_task, transport->tcp_copied);
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001233
Chuck Lever4a0f8c02005-08-11 16:25:32 -04001234 spin_unlock(&xprt->transport_lock);
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001235 return 0;
1236}
1237
1238#if defined(CONFIG_NFS_V4_1)
1239/*
1240 * Obtains an rpc_rqst previously allocated and invokes the common
1241 * tcp read code to read the data. The result is placed in the callback
1242 * queue.
1243 * If we're unable to obtain the rpc_rqst we schedule the closing of the
1244 * connection and return -1.
1245 */
1246static inline int xs_tcp_read_callback(struct rpc_xprt *xprt,
1247 struct xdr_skb_reader *desc)
1248{
1249 struct sock_xprt *transport =
1250 container_of(xprt, struct sock_xprt, xprt);
1251 struct rpc_rqst *req;
1252
1253 req = xprt_alloc_bc_request(xprt);
1254 if (req == NULL) {
1255 printk(KERN_WARNING "Callback slot table overflowed\n");
1256 xprt_force_disconnect(xprt);
1257 return -1;
1258 }
1259
1260 req->rq_xid = transport->tcp_xid;
1261 dprintk("RPC: read callback XID %08x\n", ntohl(req->rq_xid));
1262 xs_tcp_read_common(xprt, desc, req);
1263
1264 if (!(transport->tcp_flags & TCP_RCV_COPY_DATA)) {
1265 struct svc_serv *bc_serv = xprt->bc_serv;
1266
1267 /*
1268 * Add callback request to callback list. The callback
1269 * service sleeps on the sv_cb_waitq waiting for new
1270 * requests. Wake it up after adding enqueing the
1271 * request.
1272 */
1273 dprintk("RPC: add callback request to list\n");
1274 spin_lock(&bc_serv->sv_cb_lock);
1275 list_add(&req->rq_bc_list, &bc_serv->sv_cb_list);
1276 spin_unlock(&bc_serv->sv_cb_lock);
1277 wake_up(&bc_serv->sv_cb_waitq);
1278 }
1279
1280 req->rq_private_buf.len = transport->tcp_copied;
1281
1282 return 0;
1283}
1284
1285static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
1286 struct xdr_skb_reader *desc)
1287{
1288 struct sock_xprt *transport =
1289 container_of(xprt, struct sock_xprt, xprt);
1290
1291 return (transport->tcp_flags & TCP_RPC_REPLY) ?
1292 xs_tcp_read_reply(xprt, desc) :
1293 xs_tcp_read_callback(xprt, desc);
1294}
1295#else
1296static inline int _xs_tcp_read_data(struct rpc_xprt *xprt,
1297 struct xdr_skb_reader *desc)
1298{
1299 return xs_tcp_read_reply(xprt, desc);
1300}
1301#endif /* CONFIG_NFS_V4_1 */
1302
1303/*
1304 * Read data off the transport. This can be either an RPC_CALL or an
1305 * RPC_REPLY. Relay the processing to helper functions.
1306 */
1307static void xs_tcp_read_data(struct rpc_xprt *xprt,
1308 struct xdr_skb_reader *desc)
1309{
1310 struct sock_xprt *transport =
1311 container_of(xprt, struct sock_xprt, xprt);
1312
1313 if (_xs_tcp_read_data(xprt, desc) == 0)
1314 xs_tcp_check_fraghdr(transport);
1315 else {
1316 /*
1317 * The transport_lock protects the request handling.
1318 * There's no need to hold it to update the tcp_flags.
1319 */
1320 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
1321 }
Chuck Levera246b012005-08-11 16:25:23 -04001322}
1323
Chuck Leverdd456472006-12-05 16:35:44 -05001324static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
Chuck Levera246b012005-08-11 16:25:23 -04001325{
1326 size_t len;
1327
Chuck Lever51971132006-12-05 16:35:19 -05001328 len = transport->tcp_reclen - transport->tcp_offset;
Chuck Levera246b012005-08-11 16:25:23 -04001329 if (len > desc->count)
1330 len = desc->count;
1331 desc->count -= len;
1332 desc->offset += len;
Chuck Lever51971132006-12-05 16:35:19 -05001333 transport->tcp_offset += len;
Chuck Lever46121cf2007-01-31 12:14:08 -05001334 dprintk("RPC: discarded %Zu bytes\n", len);
Chuck Lever51971132006-12-05 16:35:19 -05001335 xs_tcp_check_fraghdr(transport);
Chuck Levera246b012005-08-11 16:25:23 -04001336}
1337
Chuck Lever9903cd12005-08-11 16:25:26 -04001338static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
Chuck Levera246b012005-08-11 16:25:23 -04001339{
1340 struct rpc_xprt *xprt = rd_desc->arg.data;
Chuck Lever51971132006-12-05 16:35:19 -05001341 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Leverdd456472006-12-05 16:35:44 -05001342 struct xdr_skb_reader desc = {
Chuck Levera246b012005-08-11 16:25:23 -04001343 .skb = skb,
1344 .offset = offset,
1345 .count = len,
Chuck Lever9903cd12005-08-11 16:25:26 -04001346 };
Chuck Levera246b012005-08-11 16:25:23 -04001347
Chuck Lever46121cf2007-01-31 12:14:08 -05001348 dprintk("RPC: xs_tcp_data_recv started\n");
Chuck Levera246b012005-08-11 16:25:23 -04001349 do {
1350 /* Read in a new fragment marker if necessary */
1351 /* Can we ever really expect to get completely empty fragments? */
Chuck Levere136d092006-12-05 16:35:23 -05001352 if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
Chuck Lever9903cd12005-08-11 16:25:26 -04001353 xs_tcp_read_fraghdr(xprt, &desc);
Chuck Levera246b012005-08-11 16:25:23 -04001354 continue;
1355 }
1356 /* Read in the xid if necessary */
Chuck Levere136d092006-12-05 16:35:23 -05001357 if (transport->tcp_flags & TCP_RCV_COPY_XID) {
Chuck Lever51971132006-12-05 16:35:19 -05001358 xs_tcp_read_xid(transport, &desc);
Chuck Levera246b012005-08-11 16:25:23 -04001359 continue;
1360 }
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001361 /* Read in the call/reply flag */
Ricardo Labiagaf4a2e412009-04-01 09:22:54 -04001362 if (transport->tcp_flags & TCP_RCV_READ_CALLDIR) {
Ricardo Labiaga18dca022009-04-01 09:22:53 -04001363 xs_tcp_read_calldir(transport, &desc);
1364 continue;
1365 }
Chuck Levera246b012005-08-11 16:25:23 -04001366 /* Read in the request data */
Chuck Levere136d092006-12-05 16:35:23 -05001367 if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
Ricardo Labiaga44b98ef2009-04-01 09:23:02 -04001368 xs_tcp_read_data(xprt, &desc);
Chuck Levera246b012005-08-11 16:25:23 -04001369 continue;
1370 }
1371 /* Skip over any trailing bytes on short reads */
Chuck Lever51971132006-12-05 16:35:19 -05001372 xs_tcp_read_discard(transport, &desc);
Chuck Levera246b012005-08-11 16:25:23 -04001373 } while (desc.count);
Chuck Lever46121cf2007-01-31 12:14:08 -05001374 dprintk("RPC: xs_tcp_data_recv done\n");
Chuck Levera246b012005-08-11 16:25:23 -04001375 return len - desc.count;
1376}
1377
Chuck Lever9903cd12005-08-11 16:25:26 -04001378/**
1379 * xs_tcp_data_ready - "data ready" callback for TCP sockets
1380 * @sk: socket with data to read
1381 * @bytes: how much data to read
1382 *
1383 */
1384static void xs_tcp_data_ready(struct sock *sk, int bytes)
Chuck Levera246b012005-08-11 16:25:23 -04001385{
1386 struct rpc_xprt *xprt;
1387 read_descriptor_t rd_desc;
Trond Myklebustff2d7db2008-02-25 21:40:51 -08001388 int read;
Chuck Levera246b012005-08-11 16:25:23 -04001389
Chuck Lever46121cf2007-01-31 12:14:08 -05001390 dprintk("RPC: xs_tcp_data_ready...\n");
1391
Eric Dumazetf064af12010-09-22 12:43:39 +00001392 read_lock_bh(&sk->sk_callback_lock);
Chuck Lever9903cd12005-08-11 16:25:26 -04001393 if (!(xprt = xprt_from_sock(sk)))
Chuck Levera246b012005-08-11 16:25:23 -04001394 goto out;
Chuck Levera246b012005-08-11 16:25:23 -04001395 if (xprt->shutdown)
1396 goto out;
1397
Neil Brown61d0a8e2009-09-23 14:36:37 -04001398 /* Any data means we had a useful conversation, so
1399 * the we don't need to delay the next reconnect
1400 */
1401 if (xprt->reestablish_timeout)
1402 xprt->reestablish_timeout = 0;
1403
Chuck Lever9903cd12005-08-11 16:25:26 -04001404 /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
Chuck Levera246b012005-08-11 16:25:23 -04001405 rd_desc.arg.data = xprt;
Trond Myklebustff2d7db2008-02-25 21:40:51 -08001406 do {
1407 rd_desc.count = 65536;
1408 read = tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
1409 } while (read > 0);
Chuck Levera246b012005-08-11 16:25:23 -04001410out:
Eric Dumazetf064af12010-09-22 12:43:39 +00001411 read_unlock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001412}
1413
Trond Myklebust7d1e8252009-03-11 14:38:03 -04001414/*
1415 * Do the equivalent of linger/linger2 handling for dealing with
1416 * broken servers that don't close the socket in a timely
1417 * fashion
1418 */
1419static void xs_tcp_schedule_linger_timeout(struct rpc_xprt *xprt,
1420 unsigned long timeout)
1421{
1422 struct sock_xprt *transport;
1423
1424 if (xprt_test_and_set_connecting(xprt))
1425 return;
1426 set_bit(XPRT_CONNECTION_ABORT, &xprt->state);
1427 transport = container_of(xprt, struct sock_xprt, xprt);
1428 queue_delayed_work(rpciod_workqueue, &transport->connect_worker,
1429 timeout);
1430}
1431
1432static void xs_tcp_cancel_linger_timeout(struct rpc_xprt *xprt)
1433{
1434 struct sock_xprt *transport;
1435
1436 transport = container_of(xprt, struct sock_xprt, xprt);
1437
1438 if (!test_bit(XPRT_CONNECTION_ABORT, &xprt->state) ||
1439 !cancel_delayed_work(&transport->connect_worker))
1440 return;
1441 clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
1442 xprt_clear_connecting(xprt);
1443}
1444
1445static void xs_sock_mark_closed(struct rpc_xprt *xprt)
1446{
1447 smp_mb__before_clear_bit();
1448 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
1449 clear_bit(XPRT_CLOSING, &xprt->state);
1450 smp_mb__after_clear_bit();
1451 /* Mark transport as closed and wake up all pending tasks */
1452 xprt_disconnect_done(xprt);
1453}
1454
Chuck Lever9903cd12005-08-11 16:25:26 -04001455/**
1456 * xs_tcp_state_change - callback to handle TCP socket state changes
1457 * @sk: socket whose state has changed
1458 *
1459 */
1460static void xs_tcp_state_change(struct sock *sk)
Chuck Levera246b012005-08-11 16:25:23 -04001461{
Chuck Lever9903cd12005-08-11 16:25:26 -04001462 struct rpc_xprt *xprt;
Chuck Levera246b012005-08-11 16:25:23 -04001463
Eric Dumazetf064af12010-09-22 12:43:39 +00001464 read_lock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001465 if (!(xprt = xprt_from_sock(sk)))
1466 goto out;
Chuck Lever46121cf2007-01-31 12:14:08 -05001467 dprintk("RPC: xs_tcp_state_change client %p...\n", xprt);
Andy Chittenden669502f2010-08-10 10:19:53 -04001468 dprintk("RPC: state %x conn %d dead %d zapped %d sk_shutdown %d\n",
Chuck Lever46121cf2007-01-31 12:14:08 -05001469 sk->sk_state, xprt_connected(xprt),
1470 sock_flag(sk, SOCK_DEAD),
Andy Chittenden669502f2010-08-10 10:19:53 -04001471 sock_flag(sk, SOCK_ZAPPED),
1472 sk->sk_shutdown);
Chuck Levera246b012005-08-11 16:25:23 -04001473
1474 switch (sk->sk_state) {
1475 case TCP_ESTABLISHED:
Eric Dumazetf064af12010-09-22 12:43:39 +00001476 spin_lock(&xprt->transport_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001477 if (!xprt_test_and_set_connected(xprt)) {
Chuck Lever51971132006-12-05 16:35:19 -05001478 struct sock_xprt *transport = container_of(xprt,
1479 struct sock_xprt, xprt);
1480
Chuck Levera246b012005-08-11 16:25:23 -04001481 /* Reset TCP record info */
Chuck Lever51971132006-12-05 16:35:19 -05001482 transport->tcp_offset = 0;
1483 transport->tcp_reclen = 0;
1484 transport->tcp_copied = 0;
Chuck Levere136d092006-12-05 16:35:23 -05001485 transport->tcp_flags =
1486 TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
Chuck Lever51971132006-12-05 16:35:19 -05001487
Trond Myklebust2a491992009-03-11 14:38:00 -04001488 xprt_wake_pending_tasks(xprt, -EAGAIN);
Chuck Levera246b012005-08-11 16:25:23 -04001489 }
Eric Dumazetf064af12010-09-22 12:43:39 +00001490 spin_unlock(&xprt->transport_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001491 break;
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001492 case TCP_FIN_WAIT1:
1493 /* The client initiated a shutdown of the socket */
Trond Myklebust7c1d71c2008-04-17 16:52:57 -04001494 xprt->connect_cookie++;
Trond Myklebust663b8852008-01-01 18:42:12 -05001495 xprt->reestablish_timeout = 0;
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001496 set_bit(XPRT_CLOSING, &xprt->state);
1497 smp_mb__before_clear_bit();
1498 clear_bit(XPRT_CONNECTED, &xprt->state);
Trond Myklebustef803672007-12-31 16:19:17 -05001499 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001500 smp_mb__after_clear_bit();
Trond Myklebust25fe6142009-03-11 14:38:03 -04001501 xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
Chuck Levera246b012005-08-11 16:25:23 -04001502 break;
Trond Myklebust632e3bd2006-01-03 09:55:55 +01001503 case TCP_CLOSE_WAIT:
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001504 /* The server initiated a shutdown of the socket */
Trond Myklebust66af1e52007-11-06 10:18:36 -05001505 xprt_force_disconnect(xprt);
Trond Myklebust7c1d71c2008-04-17 16:52:57 -04001506 xprt->connect_cookie++;
Trond Myklebust663b8852008-01-01 18:42:12 -05001507 case TCP_CLOSING:
1508 /*
1509 * If the server closed down the connection, make sure that
1510 * we back off before reconnecting
1511 */
1512 if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
1513 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001514 break;
1515 case TCP_LAST_ACK:
Trond Myklebust670f9452009-03-11 14:37:58 -04001516 set_bit(XPRT_CLOSING, &xprt->state);
Trond Myklebust25fe6142009-03-11 14:38:03 -04001517 xs_tcp_schedule_linger_timeout(xprt, xs_tcp_fin_timeout);
Trond Myklebust3b948ae2007-11-05 17:42:39 -05001518 smp_mb__before_clear_bit();
1519 clear_bit(XPRT_CONNECTED, &xprt->state);
1520 smp_mb__after_clear_bit();
1521 break;
1522 case TCP_CLOSE:
Trond Myklebust7d1e8252009-03-11 14:38:03 -04001523 xs_tcp_cancel_linger_timeout(xprt);
1524 xs_sock_mark_closed(xprt);
Chuck Levera246b012005-08-11 16:25:23 -04001525 }
1526 out:
Eric Dumazetf064af12010-09-22 12:43:39 +00001527 read_unlock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001528}
1529
Chuck Lever9903cd12005-08-11 16:25:26 -04001530/**
Trond Myklebust482f32e2009-03-11 14:38:00 -04001531 * xs_error_report - callback mainly for catching socket errors
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001532 * @sk: socket
1533 */
Trond Myklebust482f32e2009-03-11 14:38:00 -04001534static void xs_error_report(struct sock *sk)
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001535{
1536 struct rpc_xprt *xprt;
1537
Eric Dumazetf064af12010-09-22 12:43:39 +00001538 read_lock_bh(&sk->sk_callback_lock);
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001539 if (!(xprt = xprt_from_sock(sk)))
1540 goto out;
1541 dprintk("RPC: %s client %p...\n"
1542 "RPC: error %d\n",
1543 __func__, xprt, sk->sk_err);
Trond Myklebust482f32e2009-03-11 14:38:00 -04001544 xprt_wake_pending_tasks(xprt, -EAGAIN);
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001545out:
Eric Dumazetf064af12010-09-22 12:43:39 +00001546 read_unlock_bh(&sk->sk_callback_lock);
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001547}
1548
Ilpo Järvinen1f0fa152009-02-06 23:48:33 -08001549static void xs_write_space(struct sock *sk)
1550{
1551 struct socket *sock;
1552 struct rpc_xprt *xprt;
1553
1554 if (unlikely(!(sock = sk->sk_socket)))
1555 return;
1556 clear_bit(SOCK_NOSPACE, &sock->flags);
1557
1558 if (unlikely(!(xprt = xprt_from_sock(sk))))
1559 return;
1560 if (test_and_clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags) == 0)
1561 return;
1562
1563 xprt_write_space(xprt);
1564}
1565
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001566/**
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001567 * xs_udp_write_space - callback invoked when socket buffer space
1568 * becomes available
Chuck Lever9903cd12005-08-11 16:25:26 -04001569 * @sk: socket whose state has changed
1570 *
Chuck Levera246b012005-08-11 16:25:23 -04001571 * Called when more output buffer space is available for this socket.
1572 * We try not to wake our writers until they can make "significant"
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001573 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
Chuck Levera246b012005-08-11 16:25:23 -04001574 * with a bunch of small requests.
1575 */
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001576static void xs_udp_write_space(struct sock *sk)
Chuck Levera246b012005-08-11 16:25:23 -04001577{
Eric Dumazetf064af12010-09-22 12:43:39 +00001578 read_lock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001579
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001580 /* from net/core/sock.c:sock_def_write_space */
Ilpo Järvinen1f0fa152009-02-06 23:48:33 -08001581 if (sock_writeable(sk))
1582 xs_write_space(sk);
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001583
Eric Dumazetf064af12010-09-22 12:43:39 +00001584 read_unlock_bh(&sk->sk_callback_lock);
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001585}
Chuck Levera246b012005-08-11 16:25:23 -04001586
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001587/**
1588 * xs_tcp_write_space - callback invoked when socket buffer space
1589 * becomes available
1590 * @sk: socket whose state has changed
1591 *
1592 * Called when more output buffer space is available for this socket.
1593 * We try not to wake our writers until they can make "significant"
1594 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1595 * with a bunch of small requests.
1596 */
1597static void xs_tcp_write_space(struct sock *sk)
1598{
Eric Dumazetf064af12010-09-22 12:43:39 +00001599 read_lock_bh(&sk->sk_callback_lock);
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001600
1601 /* from net/core/stream.c:sk_stream_write_space */
Ilpo Järvinen1f0fa152009-02-06 23:48:33 -08001602 if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk))
1603 xs_write_space(sk);
Chuck Leverc7b2cae2005-08-11 16:25:50 -04001604
Eric Dumazetf064af12010-09-22 12:43:39 +00001605 read_unlock_bh(&sk->sk_callback_lock);
Chuck Levera246b012005-08-11 16:25:23 -04001606}
1607
Chuck Lever470056c2005-08-25 16:25:56 -07001608static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
Chuck Levera246b012005-08-11 16:25:23 -04001609{
Chuck Leveree0ac0c2006-12-05 16:35:15 -05001610 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1611 struct sock *sk = transport->inet;
Chuck Levera246b012005-08-11 16:25:23 -04001612
Chuck Lever7c6e0662006-12-05 16:35:30 -05001613 if (transport->rcvsize) {
Chuck Levera246b012005-08-11 16:25:23 -04001614 sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
Chuck Lever7c6e0662006-12-05 16:35:30 -05001615 sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
Chuck Levera246b012005-08-11 16:25:23 -04001616 }
Chuck Lever7c6e0662006-12-05 16:35:30 -05001617 if (transport->sndsize) {
Chuck Levera246b012005-08-11 16:25:23 -04001618 sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
Chuck Lever7c6e0662006-12-05 16:35:30 -05001619 sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
Chuck Levera246b012005-08-11 16:25:23 -04001620 sk->sk_write_space(sk);
1621 }
1622}
1623
Chuck Lever43118c22005-08-25 16:25:49 -07001624/**
Chuck Lever470056c2005-08-25 16:25:56 -07001625 * xs_udp_set_buffer_size - set send and receive limits
Chuck Lever43118c22005-08-25 16:25:49 -07001626 * @xprt: generic transport
Chuck Lever470056c2005-08-25 16:25:56 -07001627 * @sndsize: requested size of send buffer, in bytes
1628 * @rcvsize: requested size of receive buffer, in bytes
Chuck Lever43118c22005-08-25 16:25:49 -07001629 *
Chuck Lever470056c2005-08-25 16:25:56 -07001630 * Set socket send and receive buffer size limits.
Chuck Lever43118c22005-08-25 16:25:49 -07001631 */
Chuck Lever470056c2005-08-25 16:25:56 -07001632static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
Chuck Lever43118c22005-08-25 16:25:49 -07001633{
Chuck Lever7c6e0662006-12-05 16:35:30 -05001634 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1635
1636 transport->sndsize = 0;
Chuck Lever470056c2005-08-25 16:25:56 -07001637 if (sndsize)
Chuck Lever7c6e0662006-12-05 16:35:30 -05001638 transport->sndsize = sndsize + 1024;
1639 transport->rcvsize = 0;
Chuck Lever470056c2005-08-25 16:25:56 -07001640 if (rcvsize)
Chuck Lever7c6e0662006-12-05 16:35:30 -05001641 transport->rcvsize = rcvsize + 1024;
Chuck Lever470056c2005-08-25 16:25:56 -07001642
1643 xs_udp_do_set_buffer_size(xprt);
Chuck Lever43118c22005-08-25 16:25:49 -07001644}
1645
Chuck Lever46c0ee82005-08-25 16:25:52 -07001646/**
1647 * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
1648 * @task: task that timed out
1649 *
1650 * Adjust the congestion window after a retransmit timeout has occurred.
1651 */
1652static void xs_udp_timer(struct rpc_task *task)
1653{
1654 xprt_adjust_cwnd(task, -ETIMEDOUT);
1655}
1656
Chuck Leverb85d8802006-05-25 01:40:49 -04001657static unsigned short xs_get_random_port(void)
1658{
1659 unsigned short range = xprt_max_resvport - xprt_min_resvport;
1660 unsigned short rand = (unsigned short) net_random() % range;
1661 return rand + xprt_min_resvport;
1662}
1663
Chuck Lever92200412006-01-03 09:55:51 +01001664/**
1665 * xs_set_port - reset the port number in the remote endpoint address
1666 * @xprt: generic transport
1667 * @port: new port number
1668 *
1669 */
1670static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
1671{
Chuck Lever46121cf2007-01-31 12:14:08 -05001672 dprintk("RPC: setting port for xprt %p to %u\n", xprt, port);
Chuck Leverc4efcb12006-08-22 20:06:19 -04001673
Chuck Lever9dc3b092009-08-09 15:09:46 -04001674 rpc_set_port(xs_addr(xprt), port);
1675 xs_update_peer_port(xprt);
Chuck Lever92200412006-01-03 09:55:51 +01001676}
1677
Pavel Emelyanov5d4ec932010-10-04 16:51:23 +04001678static unsigned short xs_get_srcport(struct sock_xprt *transport)
Trond Myklebust67a391d2007-11-05 17:40:58 -05001679{
Chuck Leverfbfffbd2009-08-09 15:09:46 -04001680 unsigned short port = transport->srcport;
Trond Myklebust67a391d2007-11-05 17:40:58 -05001681
1682 if (port == 0 && transport->xprt.resvport)
1683 port = xs_get_random_port();
1684 return port;
1685}
1686
Pavel Emelyanovbaaf4e42010-10-04 16:51:56 +04001687static unsigned short xs_next_srcport(struct sock_xprt *transport, unsigned short port)
Trond Myklebust67a391d2007-11-05 17:40:58 -05001688{
Chuck Leverfbfffbd2009-08-09 15:09:46 -04001689 if (transport->srcport != 0)
1690 transport->srcport = 0;
Trond Myklebust67a391d2007-11-05 17:40:58 -05001691 if (!transport->xprt.resvport)
1692 return 0;
1693 if (port <= xprt_min_resvport || port > xprt_max_resvport)
1694 return xprt_max_resvport;
1695 return --port;
1696}
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001697static int xs_bind(struct sock_xprt *transport, struct socket *sock)
Chuck Levera246b012005-08-11 16:25:23 -04001698{
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001699 struct sockaddr_storage myaddr;
Trond Myklebust67a391d2007-11-05 17:40:58 -05001700 int err, nloop = 0;
Pavel Emelyanov5d4ec932010-10-04 16:51:23 +04001701 unsigned short port = xs_get_srcport(transport);
Trond Myklebust67a391d2007-11-05 17:40:58 -05001702 unsigned short last;
Chuck Levera246b012005-08-11 16:25:23 -04001703
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001704 memcpy(&myaddr, &transport->srcaddr, transport->xprt.addrlen);
Chuck Levera246b012005-08-11 16:25:23 -04001705 do {
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001706 rpc_set_port((struct sockaddr *)&myaddr, port);
1707 err = kernel_bind(sock, (struct sockaddr *)&myaddr,
1708 transport->xprt.addrlen);
Trond Myklebust67a391d2007-11-05 17:40:58 -05001709 if (port == 0)
Frank van Maarseveend3bc9a12007-07-09 22:23:35 +02001710 break;
Chuck Levera246b012005-08-11 16:25:23 -04001711 if (err == 0) {
Chuck Leverfbfffbd2009-08-09 15:09:46 -04001712 transport->srcport = port;
Frank van Maarseveend3bc9a12007-07-09 22:23:35 +02001713 break;
Chuck Levera246b012005-08-11 16:25:23 -04001714 }
Trond Myklebust67a391d2007-11-05 17:40:58 -05001715 last = port;
Pavel Emelyanovbaaf4e42010-10-04 16:51:56 +04001716 port = xs_next_srcport(transport, port);
Trond Myklebust67a391d2007-11-05 17:40:58 -05001717 if (port > last)
1718 nloop++;
1719 } while (err == -EADDRINUSE && nloop != 2);
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001720
Chuck Lever4232e862010-10-20 11:52:51 -04001721 if (myaddr.ss_family == AF_INET)
Pavel Emelyanovbeb59b62010-10-05 15:53:08 +04001722 dprintk("RPC: %s %pI4:%u: %s (%d)\n", __func__,
1723 &((struct sockaddr_in *)&myaddr)->sin_addr,
1724 port, err ? "failed" : "ok", err);
1725 else
1726 dprintk("RPC: %s %pI6:%u: %s (%d)\n", __func__,
1727 &((struct sockaddr_in6 *)&myaddr)->sin6_addr,
1728 port, err ? "failed" : "ok", err);
Chuck Levera246b012005-08-11 16:25:23 -04001729 return err;
1730}
1731
Chuck Lever176e21e2011-05-09 15:22:44 -04001732/*
1733 * We don't support autobind on AF_LOCAL sockets
1734 */
1735static void xs_local_rpcbind(struct rpc_task *task)
1736{
1737 xprt_set_bound(task->tk_xprt);
1738}
1739
1740static void xs_local_set_port(struct rpc_xprt *xprt, unsigned short port)
1741{
1742}
Chuck Levera246b012005-08-11 16:25:23 -04001743
Peter Zijlstraed075362006-12-06 20:35:24 -08001744#ifdef CONFIG_DEBUG_LOCK_ALLOC
1745static struct lock_class_key xs_key[2];
1746static struct lock_class_key xs_slock_key[2];
1747
Chuck Lever176e21e2011-05-09 15:22:44 -04001748static inline void xs_reclassify_socketu(struct socket *sock)
1749{
1750 struct sock *sk = sock->sk;
1751
1752 BUG_ON(sock_owned_by_user(sk));
1753 sock_lock_init_class_and_name(sk, "slock-AF_LOCAL-RPC",
1754 &xs_slock_key[1], "sk_lock-AF_LOCAL-RPC", &xs_key[1]);
1755}
1756
Chuck Lever8945ee52007-08-06 11:58:04 -04001757static inline void xs_reclassify_socket4(struct socket *sock)
Peter Zijlstraed075362006-12-06 20:35:24 -08001758{
1759 struct sock *sk = sock->sk;
Chuck Lever8945ee52007-08-06 11:58:04 -04001760
John Heffner02b3d342007-09-12 10:42:12 +02001761 BUG_ON(sock_owned_by_user(sk));
Chuck Lever8945ee52007-08-06 11:58:04 -04001762 sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
1763 &xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
1764}
Peter Zijlstraed075362006-12-06 20:35:24 -08001765
Chuck Lever8945ee52007-08-06 11:58:04 -04001766static inline void xs_reclassify_socket6(struct socket *sock)
1767{
1768 struct sock *sk = sock->sk;
Peter Zijlstraed075362006-12-06 20:35:24 -08001769
Linus Torvaldsf4921af2007-10-15 10:46:05 -07001770 BUG_ON(sock_owned_by_user(sk));
Chuck Lever8945ee52007-08-06 11:58:04 -04001771 sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
1772 &xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
Peter Zijlstraed075362006-12-06 20:35:24 -08001773}
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001774
1775static inline void xs_reclassify_socket(int family, struct socket *sock)
1776{
Chuck Lever4232e862010-10-20 11:52:51 -04001777 switch (family) {
Chuck Lever176e21e2011-05-09 15:22:44 -04001778 case AF_LOCAL:
1779 xs_reclassify_socketu(sock);
1780 break;
Chuck Lever4232e862010-10-20 11:52:51 -04001781 case AF_INET:
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001782 xs_reclassify_socket4(sock);
Chuck Lever4232e862010-10-20 11:52:51 -04001783 break;
1784 case AF_INET6:
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001785 xs_reclassify_socket6(sock);
Chuck Lever4232e862010-10-20 11:52:51 -04001786 break;
1787 }
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001788}
Peter Zijlstraed075362006-12-06 20:35:24 -08001789#else
Chuck Lever176e21e2011-05-09 15:22:44 -04001790static inline void xs_reclassify_socketu(struct socket *sock)
1791{
1792}
1793
Chuck Lever8945ee52007-08-06 11:58:04 -04001794static inline void xs_reclassify_socket4(struct socket *sock)
1795{
1796}
1797
1798static inline void xs_reclassify_socket6(struct socket *sock)
Peter Zijlstraed075362006-12-06 20:35:24 -08001799{
1800}
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001801
1802static inline void xs_reclassify_socket(int family, struct socket *sock)
1803{
1804}
Peter Zijlstraed075362006-12-06 20:35:24 -08001805#endif
1806
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001807static struct socket *xs_create_sock(struct rpc_xprt *xprt,
1808 struct sock_xprt *transport, int family, int type, int protocol)
Pavel Emelyanov22f79322010-10-04 16:54:26 +04001809{
1810 struct socket *sock;
1811 int err;
1812
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001813 err = __sock_create(xprt->xprt_net, family, type, protocol, &sock, 1);
Pavel Emelyanov22f79322010-10-04 16:54:26 +04001814 if (err < 0) {
1815 dprintk("RPC: can't create %d transport socket (%d).\n",
1816 protocol, -err);
1817 goto out;
1818 }
Pavel Emelyanov6bc96382010-10-04 16:56:38 +04001819 xs_reclassify_socket(family, sock);
Pavel Emelyanov22f79322010-10-04 16:54:26 +04001820
Ben Hutchings4cea2882011-02-22 21:54:34 +00001821 err = xs_bind(transport, sock);
1822 if (err) {
Pavel Emelyanov22f79322010-10-04 16:54:26 +04001823 sock_release(sock);
1824 goto out;
1825 }
1826
1827 return sock;
1828out:
1829 return ERR_PTR(err);
1830}
1831
Chuck Lever176e21e2011-05-09 15:22:44 -04001832static int xs_local_finish_connecting(struct rpc_xprt *xprt,
1833 struct socket *sock)
1834{
1835 struct sock_xprt *transport = container_of(xprt, struct sock_xprt,
1836 xprt);
1837
1838 if (!transport->inet) {
1839 struct sock *sk = sock->sk;
1840
1841 write_lock_bh(&sk->sk_callback_lock);
1842
1843 xs_save_old_callbacks(transport, sk);
1844
1845 sk->sk_user_data = xprt;
1846 sk->sk_data_ready = xs_local_data_ready;
1847 sk->sk_write_space = xs_udp_write_space;
1848 sk->sk_error_report = xs_error_report;
1849 sk->sk_allocation = GFP_ATOMIC;
1850
1851 xprt_clear_connected(xprt);
1852
1853 /* Reset to new socket */
1854 transport->sock = sock;
1855 transport->inet = sk;
1856
1857 write_unlock_bh(&sk->sk_callback_lock);
1858 }
1859
1860 /* Tell the socket layer to start connecting... */
1861 xprt->stat.connect_count++;
1862 xprt->stat.connect_start = jiffies;
1863 return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, 0);
1864}
1865
1866/**
1867 * xs_local_setup_socket - create AF_LOCAL socket, connect to a local endpoint
1868 * @xprt: RPC transport to connect
1869 * @transport: socket transport to connect
1870 * @create_sock: function to create a socket of the correct type
1871 *
1872 * Invoked by a work queue tasklet.
1873 */
1874static void xs_local_setup_socket(struct work_struct *work)
1875{
1876 struct sock_xprt *transport =
1877 container_of(work, struct sock_xprt, connect_worker.work);
1878 struct rpc_xprt *xprt = &transport->xprt;
1879 struct socket *sock;
1880 int status = -EIO;
1881
1882 if (xprt->shutdown)
1883 goto out;
1884
1885 clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
1886 status = __sock_create(xprt->xprt_net, AF_LOCAL,
1887 SOCK_STREAM, 0, &sock, 1);
1888 if (status < 0) {
1889 dprintk("RPC: can't create AF_LOCAL "
1890 "transport socket (%d).\n", -status);
1891 goto out;
1892 }
1893 xs_reclassify_socketu(sock);
1894
1895 dprintk("RPC: worker connecting xprt %p via AF_LOCAL to %s\n",
1896 xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
1897
1898 status = xs_local_finish_connecting(xprt, sock);
1899 switch (status) {
1900 case 0:
1901 dprintk("RPC: xprt %p connected to %s\n",
1902 xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
1903 xprt_set_connected(xprt);
1904 break;
1905 case -ENOENT:
1906 dprintk("RPC: xprt %p: socket %s does not exist\n",
1907 xprt, xprt->address_strings[RPC_DISPLAY_ADDR]);
1908 break;
1909 default:
1910 printk(KERN_ERR "%s: unhandled error (%d) connecting to %s\n",
1911 __func__, -status,
1912 xprt->address_strings[RPC_DISPLAY_ADDR]);
1913 }
1914
1915out:
1916 xprt_clear_connecting(xprt);
1917 xprt_wake_pending_tasks(xprt, status);
1918}
1919
Chuck Lever16be2d22007-08-06 11:57:38 -04001920static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
Chuck Levera246b012005-08-11 16:25:23 -04001921{
Chuck Lever16be2d22007-08-06 11:57:38 -04001922 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Leveredb267a2006-08-22 20:06:18 -04001923
Chuck Leveree0ac0c2006-12-05 16:35:15 -05001924 if (!transport->inet) {
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001925 struct sock *sk = sock->sk;
1926
1927 write_lock_bh(&sk->sk_callback_lock);
1928
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04001929 xs_save_old_callbacks(transport, sk);
1930
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001931 sk->sk_user_data = xprt;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001932 sk->sk_data_ready = xs_udp_data_ready;
1933 sk->sk_write_space = xs_udp_write_space;
Trond Myklebust482f32e2009-03-11 14:38:00 -04001934 sk->sk_error_report = xs_error_report;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001935 sk->sk_no_check = UDP_CSUM_NORCV;
Trond Myklebustb079fa72005-12-13 16:13:52 -05001936 sk->sk_allocation = GFP_ATOMIC;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001937
1938 xprt_set_connected(xprt);
1939
1940 /* Reset to new socket */
Chuck Leveree0ac0c2006-12-05 16:35:15 -05001941 transport->sock = sock;
1942 transport->inet = sk;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001943
1944 write_unlock_bh(&sk->sk_callback_lock);
1945 }
Chuck Lever470056c2005-08-25 16:25:56 -07001946 xs_udp_do_set_buffer_size(xprt);
Chuck Lever16be2d22007-08-06 11:57:38 -04001947}
1948
Pavel Emelyanov8c14ff22010-10-04 16:58:02 +04001949static void xs_udp_setup_socket(struct work_struct *work)
Chuck Levera246b012005-08-11 16:25:23 -04001950{
1951 struct sock_xprt *transport =
1952 container_of(work, struct sock_xprt, connect_worker.work);
1953 struct rpc_xprt *xprt = &transport->xprt;
1954 struct socket *sock = transport->sock;
Pavel Emelyanovb65c0312010-10-04 16:53:46 +04001955 int status = -EIO;
Chuck Levera246b012005-08-11 16:25:23 -04001956
Trond Myklebust01d37c42009-03-11 14:09:39 -04001957 if (xprt->shutdown)
Chuck Lever9903cd12005-08-11 16:25:26 -04001958 goto out;
1959
Chuck Levera246b012005-08-11 16:25:23 -04001960 /* Start by resetting any existing state */
Chuck Leverfe315e72009-03-11 14:10:21 -04001961 xs_reset_transport(transport);
Pavel Emelyanov8c14ff22010-10-04 16:58:02 +04001962 sock = xs_create_sock(xprt, transport,
1963 xs_addr(xprt)->sa_family, SOCK_DGRAM, IPPROTO_UDP);
Pavel Emelyanovb65c0312010-10-04 16:53:46 +04001964 if (IS_ERR(sock))
Chuck Levera246b012005-08-11 16:25:23 -04001965 goto out;
Chuck Lever68e220b2007-08-06 11:57:48 -04001966
Chuck Leverc740eff2009-08-09 15:09:46 -04001967 dprintk("RPC: worker connecting xprt %p via %s to "
1968 "%s (port %s)\n", xprt,
1969 xprt->address_strings[RPC_DISPLAY_PROTO],
1970 xprt->address_strings[RPC_DISPLAY_ADDR],
1971 xprt->address_strings[RPC_DISPLAY_PORT]);
Chuck Lever68e220b2007-08-06 11:57:48 -04001972
1973 xs_udp_finish_connecting(xprt, sock);
Chuck Levera246b012005-08-11 16:25:23 -04001974 status = 0;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001975out:
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001976 xprt_clear_connecting(xprt);
Trond Myklebust7d1e8252009-03-11 14:38:03 -04001977 xprt_wake_pending_tasks(xprt, status);
Chuck Leverb0d93ad2005-08-11 16:25:53 -04001978}
1979
Chuck Lever3167e122005-08-25 16:25:55 -07001980/*
1981 * We need to preserve the port number so the reply cache on the server can
1982 * find our cached RPC replies when we get around to reconnecting.
1983 */
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04001984static void xs_abort_connection(struct sock_xprt *transport)
Chuck Lever3167e122005-08-25 16:25:55 -07001985{
1986 int result;
Chuck Lever3167e122005-08-25 16:25:55 -07001987 struct sockaddr any;
1988
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04001989 dprintk("RPC: disconnecting xprt %p to reuse port\n", transport);
Chuck Lever3167e122005-08-25 16:25:55 -07001990
1991 /*
1992 * Disconnect the transport socket by doing a connect operation
1993 * with AF_UNSPEC. This should return immediately...
1994 */
1995 memset(&any, 0, sizeof(any));
1996 any.sa_family = AF_UNSPEC;
Chuck Leveree0ac0c2006-12-05 16:35:15 -05001997 result = kernel_connect(transport->sock, &any, sizeof(any), 0);
Trond Myklebust7d1e8252009-03-11 14:38:03 -04001998 if (!result)
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04001999 xs_sock_mark_closed(&transport->xprt);
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002000 else
Chuck Lever46121cf2007-01-31 12:14:08 -05002001 dprintk("RPC: AF_UNSPEC connect return code %d\n",
Chuck Lever3167e122005-08-25 16:25:55 -07002002 result);
2003}
2004
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04002005static void xs_tcp_reuse_connection(struct sock_xprt *transport)
Trond Myklebust40d25492009-03-11 14:37:58 -04002006{
2007 unsigned int state = transport->inet->sk_state;
2008
Andy Chittenden669502f2010-08-10 10:19:53 -04002009 if (state == TCP_CLOSE && transport->sock->state == SS_UNCONNECTED) {
2010 /* we don't need to abort the connection if the socket
2011 * hasn't undergone a shutdown
2012 */
2013 if (transport->inet->sk_shutdown == 0)
2014 return;
2015 dprintk("RPC: %s: TCP_CLOSEd and sk_shutdown set to %d\n",
2016 __func__, transport->inet->sk_shutdown);
2017 }
2018 if ((1 << state) & (TCPF_ESTABLISHED|TCPF_SYN_SENT)) {
2019 /* we don't need to abort the connection if the socket
2020 * hasn't undergone a shutdown
2021 */
2022 if (transport->inet->sk_shutdown == 0)
2023 return;
2024 dprintk("RPC: %s: ESTABLISHED/SYN_SENT "
2025 "sk_shutdown set to %d\n",
2026 __func__, transport->inet->sk_shutdown);
2027 }
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04002028 xs_abort_connection(transport);
Trond Myklebust40d25492009-03-11 14:37:58 -04002029}
2030
Chuck Lever16be2d22007-08-06 11:57:38 -04002031static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002032{
Chuck Lever16be2d22007-08-06 11:57:38 -04002033 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Trond Myklebustfe19a962011-03-18 20:21:23 -04002034 int ret = -ENOTCONN;
Chuck Leveredb267a2006-08-22 20:06:18 -04002035
Chuck Leveree0ac0c2006-12-05 16:35:15 -05002036 if (!transport->inet) {
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002037 struct sock *sk = sock->sk;
2038
2039 write_lock_bh(&sk->sk_callback_lock);
2040
Trond Myklebust2a9e1cf2008-10-28 15:21:39 -04002041 xs_save_old_callbacks(transport, sk);
2042
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002043 sk->sk_user_data = xprt;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002044 sk->sk_data_ready = xs_tcp_data_ready;
2045 sk->sk_state_change = xs_tcp_state_change;
2046 sk->sk_write_space = xs_tcp_write_space;
Trond Myklebust482f32e2009-03-11 14:38:00 -04002047 sk->sk_error_report = xs_error_report;
Trond Myklebustb079fa72005-12-13 16:13:52 -05002048 sk->sk_allocation = GFP_ATOMIC;
Chuck Lever3167e122005-08-25 16:25:55 -07002049
2050 /* socket options */
2051 sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
2052 sock_reset_flag(sk, SOCK_LINGER);
2053 tcp_sk(sk)->linger2 = 0;
2054 tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002055
2056 xprt_clear_connected(xprt);
2057
2058 /* Reset to new socket */
Chuck Leveree0ac0c2006-12-05 16:35:15 -05002059 transport->sock = sock;
2060 transport->inet = sk;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002061
2062 write_unlock_bh(&sk->sk_callback_lock);
2063 }
2064
Trond Myklebust01d37c42009-03-11 14:09:39 -04002065 if (!xprt_bound(xprt))
Trond Myklebustfe19a962011-03-18 20:21:23 -04002066 goto out;
Trond Myklebust01d37c42009-03-11 14:09:39 -04002067
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002068 /* Tell the socket layer to start connecting... */
Chuck Lever262ca072006-03-20 13:44:16 -05002069 xprt->stat.connect_count++;
2070 xprt->stat.connect_start = jiffies;
Trond Myklebustfe19a962011-03-18 20:21:23 -04002071 ret = kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
2072 switch (ret) {
2073 case 0:
2074 case -EINPROGRESS:
2075 /* SYN_SENT! */
2076 xprt->connect_cookie++;
2077 if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
2078 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2079 }
2080out:
2081 return ret;
Chuck Lever16be2d22007-08-06 11:57:38 -04002082}
2083
2084/**
Trond Myklebustb61d59f2009-03-11 14:38:04 -04002085 * xs_tcp_setup_socket - create a TCP socket and connect to a remote endpoint
2086 * @xprt: RPC transport to connect
2087 * @transport: socket transport to connect
2088 * @create_sock: function to create a socket of the correct type
Chuck Lever16be2d22007-08-06 11:57:38 -04002089 *
2090 * Invoked by a work queue tasklet.
2091 */
Pavel Emelyanovcdd518d2010-10-04 16:57:40 +04002092static void xs_tcp_setup_socket(struct work_struct *work)
Chuck Lever16be2d22007-08-06 11:57:38 -04002093{
Pavel Emelyanovcdd518d2010-10-04 16:57:40 +04002094 struct sock_xprt *transport =
2095 container_of(work, struct sock_xprt, connect_worker.work);
Chuck Lever16be2d22007-08-06 11:57:38 -04002096 struct socket *sock = transport->sock;
Pavel Emelyanova9f5f0f2010-10-04 16:52:25 +04002097 struct rpc_xprt *xprt = &transport->xprt;
Trond Myklebustb61d59f2009-03-11 14:38:04 -04002098 int status = -EIO;
Chuck Lever16be2d22007-08-06 11:57:38 -04002099
Trond Myklebust01d37c42009-03-11 14:09:39 -04002100 if (xprt->shutdown)
Chuck Lever16be2d22007-08-06 11:57:38 -04002101 goto out;
2102
2103 if (!sock) {
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002104 clear_bit(XPRT_CONNECTION_ABORT, &xprt->state);
Pavel Emelyanovcdd518d2010-10-04 16:57:40 +04002105 sock = xs_create_sock(xprt, transport,
2106 xs_addr(xprt)->sa_family, SOCK_STREAM, IPPROTO_TCP);
Trond Myklebustb61d59f2009-03-11 14:38:04 -04002107 if (IS_ERR(sock)) {
2108 status = PTR_ERR(sock);
Chuck Lever16be2d22007-08-06 11:57:38 -04002109 goto out;
2110 }
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002111 } else {
2112 int abort_and_exit;
2113
2114 abort_and_exit = test_and_clear_bit(XPRT_CONNECTION_ABORT,
2115 &xprt->state);
Chuck Lever16be2d22007-08-06 11:57:38 -04002116 /* "close" the socket, preserving the local port */
Pavel Emelyanov58dddac2010-10-04 16:52:55 +04002117 xs_tcp_reuse_connection(transport);
Chuck Lever16be2d22007-08-06 11:57:38 -04002118
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002119 if (abort_and_exit)
2120 goto out_eagain;
2121 }
2122
Chuck Leverc740eff2009-08-09 15:09:46 -04002123 dprintk("RPC: worker connecting xprt %p via %s to "
2124 "%s (port %s)\n", xprt,
2125 xprt->address_strings[RPC_DISPLAY_PROTO],
2126 xprt->address_strings[RPC_DISPLAY_ADDR],
2127 xprt->address_strings[RPC_DISPLAY_PORT]);
Chuck Lever16be2d22007-08-06 11:57:38 -04002128
2129 status = xs_tcp_finish_connecting(xprt, sock);
Chuck Lever46121cf2007-01-31 12:14:08 -05002130 dprintk("RPC: %p connect status %d connected %d sock state %d\n",
2131 xprt, -status, xprt_connected(xprt),
2132 sock->sk->sk_state);
Trond Myklebust2a491992009-03-11 14:38:00 -04002133 switch (status) {
Trond Myklebustf75e6742009-04-21 17:18:20 -04002134 default:
2135 printk("%s: connect returned unhandled error %d\n",
2136 __func__, status);
2137 case -EADDRNOTAVAIL:
2138 /* We're probably in TIME_WAIT. Get rid of existing socket,
2139 * and retry
2140 */
2141 set_bit(XPRT_CONNECTION_CLOSE, &xprt->state);
2142 xprt_force_disconnect(xprt);
Trond Myklebust88b5ed72009-06-17 13:22:57 -07002143 break;
Trond Myklebust8a2cec22009-03-11 14:38:01 -04002144 case -ECONNREFUSED:
2145 case -ECONNRESET:
2146 case -ENETUNREACH:
2147 /* retry with existing socket, after a delay */
Trond Myklebust2a491992009-03-11 14:38:00 -04002148 case 0:
2149 case -EINPROGRESS:
2150 case -EALREADY:
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002151 xprt_clear_connecting(xprt);
2152 return;
Trond Myklebust9fcfe0c2010-03-02 13:06:21 -05002153 case -EINVAL:
2154 /* Happens, for instance, if the user specified a link
2155 * local IPv6 address without a scope-id.
2156 */
2157 goto out;
Chuck Levera246b012005-08-11 16:25:23 -04002158 }
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002159out_eagain:
Trond Myklebust2a491992009-03-11 14:38:00 -04002160 status = -EAGAIN;
Chuck Levera246b012005-08-11 16:25:23 -04002161out:
Chuck Lever2226feb2005-08-11 16:25:38 -04002162 xprt_clear_connecting(xprt);
Trond Myklebust7d1e8252009-03-11 14:38:03 -04002163 xprt_wake_pending_tasks(xprt, status);
Chuck Levera246b012005-08-11 16:25:23 -04002164}
2165
Chuck Lever68e220b2007-08-06 11:57:48 -04002166/**
Chuck Lever9903cd12005-08-11 16:25:26 -04002167 * xs_connect - connect a socket to a remote endpoint
2168 * @task: address of RPC task that manages state of connect request
2169 *
2170 * TCP: If the remote end dropped the connection, delay reconnecting.
Chuck Lever03bf4b72005-08-25 16:25:55 -07002171 *
2172 * UDP socket connects are synchronous, but we use a work queue anyway
2173 * to guarantee that even unprivileged user processes can set up a
2174 * socket on a privileged port.
2175 *
2176 * If a UDP socket connect fails, the delay behavior here prevents
2177 * retry floods (hard mounts).
Chuck Lever9903cd12005-08-11 16:25:26 -04002178 */
2179static void xs_connect(struct rpc_task *task)
Chuck Levera246b012005-08-11 16:25:23 -04002180{
2181 struct rpc_xprt *xprt = task->tk_xprt;
Chuck Leveree0ac0c2006-12-05 16:35:15 -05002182 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Levera246b012005-08-11 16:25:23 -04002183
Chuck Lever09a21c42009-12-03 15:58:56 -05002184 if (transport->sock != NULL && !RPC_IS_SOFTCONN(task)) {
Chuck Lever46121cf2007-01-31 12:14:08 -05002185 dprintk("RPC: xs_connect delayed xprt %p for %lu "
2186 "seconds\n",
Chuck Lever03bf4b72005-08-25 16:25:55 -07002187 xprt, xprt->reestablish_timeout / HZ);
Trond Myklebustc1384c92007-06-14 18:00:42 -04002188 queue_delayed_work(rpciod_workqueue,
2189 &transport->connect_worker,
2190 xprt->reestablish_timeout);
Chuck Lever03bf4b72005-08-25 16:25:55 -07002191 xprt->reestablish_timeout <<= 1;
Neil Brown61d0a8e2009-09-23 14:36:37 -04002192 if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
2193 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
Chuck Lever03bf4b72005-08-25 16:25:55 -07002194 if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
2195 xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
Chuck Leverb0d93ad2005-08-11 16:25:53 -04002196 } else {
Chuck Lever46121cf2007-01-31 12:14:08 -05002197 dprintk("RPC: xs_connect scheduled xprt %p\n", xprt);
Trond Myklebustc1384c92007-06-14 18:00:42 -04002198 queue_delayed_work(rpciod_workqueue,
2199 &transport->connect_worker, 0);
Chuck Levera246b012005-08-11 16:25:23 -04002200 }
2201}
2202
Chuck Lever262ca072006-03-20 13:44:16 -05002203/**
Chuck Lever176e21e2011-05-09 15:22:44 -04002204 * xs_local_print_stats - display AF_LOCAL socket-specifc stats
2205 * @xprt: rpc_xprt struct containing statistics
2206 * @seq: output file
2207 *
2208 */
2209static void xs_local_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
2210{
2211 long idle_time = 0;
2212
2213 if (xprt_connected(xprt))
2214 idle_time = (long)(jiffies - xprt->last_used) / HZ;
2215
2216 seq_printf(seq, "\txprt:\tlocal %lu %lu %lu %ld %lu %lu %lu "
2217 "%llu %llu\n",
2218 xprt->stat.bind_count,
2219 xprt->stat.connect_count,
2220 xprt->stat.connect_time,
2221 idle_time,
2222 xprt->stat.sends,
2223 xprt->stat.recvs,
2224 xprt->stat.bad_xids,
2225 xprt->stat.req_u,
2226 xprt->stat.bklog_u);
2227}
2228
2229/**
Chuck Lever262ca072006-03-20 13:44:16 -05002230 * xs_udp_print_stats - display UDP socket-specifc stats
2231 * @xprt: rpc_xprt struct containing statistics
2232 * @seq: output file
2233 *
2234 */
2235static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
2236{
Chuck Leverc8475462006-12-05 16:35:26 -05002237 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
2238
Chuck Lever262ca072006-03-20 13:44:16 -05002239 seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n",
Chuck Leverfbfffbd2009-08-09 15:09:46 -04002240 transport->srcport,
Chuck Lever262ca072006-03-20 13:44:16 -05002241 xprt->stat.bind_count,
2242 xprt->stat.sends,
2243 xprt->stat.recvs,
2244 xprt->stat.bad_xids,
2245 xprt->stat.req_u,
2246 xprt->stat.bklog_u);
2247}
2248
2249/**
2250 * xs_tcp_print_stats - display TCP socket-specifc stats
2251 * @xprt: rpc_xprt struct containing statistics
2252 * @seq: output file
2253 *
2254 */
2255static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
2256{
Chuck Leverc8475462006-12-05 16:35:26 -05002257 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Lever262ca072006-03-20 13:44:16 -05002258 long idle_time = 0;
2259
2260 if (xprt_connected(xprt))
2261 idle_time = (long)(jiffies - xprt->last_used) / HZ;
2262
2263 seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n",
Chuck Leverfbfffbd2009-08-09 15:09:46 -04002264 transport->srcport,
Chuck Lever262ca072006-03-20 13:44:16 -05002265 xprt->stat.bind_count,
2266 xprt->stat.connect_count,
2267 xprt->stat.connect_time,
2268 idle_time,
2269 xprt->stat.sends,
2270 xprt->stat.recvs,
2271 xprt->stat.bad_xids,
2272 xprt->stat.req_u,
2273 xprt->stat.bklog_u);
2274}
2275
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002276/*
2277 * Allocate a bunch of pages for a scratch buffer for the rpc code. The reason
2278 * we allocate pages instead doing a kmalloc like rpc_malloc is because we want
2279 * to use the server side send routines.
2280 */
H Hartley Sweeten5a51f132010-01-14 15:38:31 -07002281static void *bc_malloc(struct rpc_task *task, size_t size)
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002282{
2283 struct page *page;
2284 struct rpc_buffer *buf;
2285
2286 BUG_ON(size > PAGE_SIZE - sizeof(struct rpc_buffer));
2287 page = alloc_page(GFP_KERNEL);
2288
2289 if (!page)
2290 return NULL;
2291
2292 buf = page_address(page);
2293 buf->len = PAGE_SIZE;
2294
2295 return buf->data;
2296}
2297
2298/*
2299 * Free the space allocated in the bc_alloc routine
2300 */
H Hartley Sweeten5a51f132010-01-14 15:38:31 -07002301static void bc_free(void *buffer)
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002302{
2303 struct rpc_buffer *buf;
2304
2305 if (!buffer)
2306 return;
2307
2308 buf = container_of(buffer, struct rpc_buffer, data);
2309 free_page((unsigned long)buf);
2310}
2311
2312/*
2313 * Use the svc_sock to send the callback. Must be called with svsk->sk_mutex
2314 * held. Borrows heavily from svc_tcp_sendto and xs_tcp_send_request.
2315 */
2316static int bc_sendto(struct rpc_rqst *req)
2317{
2318 int len;
2319 struct xdr_buf *xbufp = &req->rq_snd_buf;
2320 struct rpc_xprt *xprt = req->rq_xprt;
2321 struct sock_xprt *transport =
2322 container_of(xprt, struct sock_xprt, xprt);
2323 struct socket *sock = transport->sock;
2324 unsigned long headoff;
2325 unsigned long tailoff;
2326
Chuck Lever61677ee2011-05-09 15:22:34 -04002327 xs_encode_stream_record_marker(xbufp);
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002328
2329 tailoff = (unsigned long)xbufp->tail[0].iov_base & ~PAGE_MASK;
2330 headoff = (unsigned long)xbufp->head[0].iov_base & ~PAGE_MASK;
2331 len = svc_send_common(sock, xbufp,
2332 virt_to_page(xbufp->head[0].iov_base), headoff,
2333 xbufp->tail[0].iov_base, tailoff);
2334
2335 if (len != xbufp->len) {
2336 printk(KERN_NOTICE "Error sending entire callback!\n");
2337 len = -EAGAIN;
2338 }
2339
2340 return len;
2341}
2342
2343/*
2344 * The send routine. Borrows from svc_send
2345 */
2346static int bc_send_request(struct rpc_task *task)
2347{
2348 struct rpc_rqst *req = task->tk_rqstp;
2349 struct svc_xprt *xprt;
2350 struct svc_sock *svsk;
2351 u32 len;
2352
2353 dprintk("sending request with xid: %08x\n", ntohl(req->rq_xid));
2354 /*
2355 * Get the server socket associated with this callback xprt
2356 */
2357 xprt = req->rq_xprt->bc_xprt;
2358 svsk = container_of(xprt, struct svc_sock, sk_xprt);
2359
2360 /*
2361 * Grab the mutex to serialize data as the connection is shared
2362 * with the fore channel
2363 */
2364 if (!mutex_trylock(&xprt->xpt_mutex)) {
2365 rpc_sleep_on(&xprt->xpt_bc_pending, task, NULL);
2366 if (!mutex_trylock(&xprt->xpt_mutex))
2367 return -EAGAIN;
2368 rpc_wake_up_queued_task(&xprt->xpt_bc_pending, task);
2369 }
2370 if (test_bit(XPT_DEAD, &xprt->xpt_flags))
2371 len = -ENOTCONN;
2372 else
2373 len = bc_sendto(req);
2374 mutex_unlock(&xprt->xpt_mutex);
2375
2376 if (len > 0)
2377 len = 0;
2378
2379 return len;
2380}
2381
2382/*
2383 * The close routine. Since this is client initiated, we do nothing
2384 */
2385
2386static void bc_close(struct rpc_xprt *xprt)
2387{
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002388}
2389
2390/*
2391 * The xprt destroy routine. Again, because this connection is client
2392 * initiated, we do nothing
2393 */
2394
2395static void bc_destroy(struct rpc_xprt *xprt)
2396{
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002397}
2398
Chuck Lever176e21e2011-05-09 15:22:44 -04002399static struct rpc_xprt_ops xs_local_ops = {
2400 .reserve_xprt = xprt_reserve_xprt,
2401 .release_xprt = xs_tcp_release_xprt,
2402 .rpcbind = xs_local_rpcbind,
2403 .set_port = xs_local_set_port,
2404 .connect = xs_connect,
2405 .buf_alloc = rpc_malloc,
2406 .buf_free = rpc_free,
2407 .send_request = xs_local_send_request,
2408 .set_retrans_timeout = xprt_set_retrans_timeout_def,
2409 .close = xs_close,
2410 .destroy = xs_destroy,
2411 .print_stats = xs_local_print_stats,
2412};
2413
Chuck Lever262965f2005-08-11 16:25:56 -04002414static struct rpc_xprt_ops xs_udp_ops = {
Chuck Lever43118c22005-08-25 16:25:49 -07002415 .set_buffer_size = xs_udp_set_buffer_size,
Chuck Lever12a80462005-08-25 16:25:51 -07002416 .reserve_xprt = xprt_reserve_xprt_cong,
Chuck Lever49e9a892005-08-25 16:25:51 -07002417 .release_xprt = xprt_release_xprt_cong,
Chuck Lever45160d62007-07-01 12:13:17 -04002418 .rpcbind = rpcb_getport_async,
Chuck Lever92200412006-01-03 09:55:51 +01002419 .set_port = xs_set_port,
Chuck Lever9903cd12005-08-11 16:25:26 -04002420 .connect = xs_connect,
Chuck Lever02107142006-01-03 09:55:49 +01002421 .buf_alloc = rpc_malloc,
2422 .buf_free = rpc_free,
Chuck Lever262965f2005-08-11 16:25:56 -04002423 .send_request = xs_udp_send_request,
Chuck Leverfe3aca22005-08-25 16:25:50 -07002424 .set_retrans_timeout = xprt_set_retrans_timeout_rtt,
Chuck Lever46c0ee82005-08-25 16:25:52 -07002425 .timer = xs_udp_timer,
Chuck Levera58dd392005-08-25 16:25:53 -07002426 .release_request = xprt_release_rqst_cong,
Chuck Lever262965f2005-08-11 16:25:56 -04002427 .close = xs_close,
2428 .destroy = xs_destroy,
Chuck Lever262ca072006-03-20 13:44:16 -05002429 .print_stats = xs_udp_print_stats,
Chuck Lever262965f2005-08-11 16:25:56 -04002430};
2431
2432static struct rpc_xprt_ops xs_tcp_ops = {
Chuck Lever12a80462005-08-25 16:25:51 -07002433 .reserve_xprt = xprt_reserve_xprt,
Trond Myklebuste0ab53d2006-07-27 17:22:50 -04002434 .release_xprt = xs_tcp_release_xprt,
Chuck Lever45160d62007-07-01 12:13:17 -04002435 .rpcbind = rpcb_getport_async,
Chuck Lever92200412006-01-03 09:55:51 +01002436 .set_port = xs_set_port,
Trond Myklebust0b9e7942010-04-16 16:41:57 -04002437 .connect = xs_connect,
Chuck Lever02107142006-01-03 09:55:49 +01002438 .buf_alloc = rpc_malloc,
2439 .buf_free = rpc_free,
Chuck Lever262965f2005-08-11 16:25:56 -04002440 .send_request = xs_tcp_send_request,
Chuck Leverfe3aca22005-08-25 16:25:50 -07002441 .set_retrans_timeout = xprt_set_retrans_timeout_def,
Trond Myklebustf75e6742009-04-21 17:18:20 -04002442 .close = xs_tcp_close,
Chuck Lever9903cd12005-08-11 16:25:26 -04002443 .destroy = xs_destroy,
Chuck Lever262ca072006-03-20 13:44:16 -05002444 .print_stats = xs_tcp_print_stats,
Chuck Levera246b012005-08-11 16:25:23 -04002445};
2446
Rahul Iyer4cfc7e62009-09-10 17:32:28 +03002447/*
2448 * The rpc_xprt_ops for the server backchannel
2449 */
2450
2451static struct rpc_xprt_ops bc_tcp_ops = {
2452 .reserve_xprt = xprt_reserve_xprt,
2453 .release_xprt = xprt_release_xprt,
2454 .buf_alloc = bc_malloc,
2455 .buf_free = bc_free,
2456 .send_request = bc_send_request,
2457 .set_retrans_timeout = xprt_set_retrans_timeout_def,
2458 .close = bc_close,
2459 .destroy = bc_destroy,
2460 .print_stats = xs_tcp_print_stats,
2461};
2462
Chuck Lever92476852010-10-20 11:53:01 -04002463static int xs_init_anyaddr(const int family, struct sockaddr *sap)
2464{
2465 static const struct sockaddr_in sin = {
2466 .sin_family = AF_INET,
2467 .sin_addr.s_addr = htonl(INADDR_ANY),
2468 };
2469 static const struct sockaddr_in6 sin6 = {
2470 .sin6_family = AF_INET6,
2471 .sin6_addr = IN6ADDR_ANY_INIT,
2472 };
2473
2474 switch (family) {
Chuck Lever176e21e2011-05-09 15:22:44 -04002475 case AF_LOCAL:
2476 break;
Chuck Lever92476852010-10-20 11:53:01 -04002477 case AF_INET:
2478 memcpy(sap, &sin, sizeof(sin));
2479 break;
2480 case AF_INET6:
2481 memcpy(sap, &sin6, sizeof(sin6));
2482 break;
2483 default:
2484 dprintk("RPC: %s: Bad address family\n", __func__);
2485 return -EAFNOSUPPORT;
2486 }
2487 return 0;
2488}
2489
\"Talpey, Thomas\3c341b02007-09-10 13:47:07 -04002490static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002491 unsigned int slot_table_size)
Chuck Leverc8541ec2006-10-17 14:44:27 -04002492{
2493 struct rpc_xprt *xprt;
Chuck Leverffc2e512006-12-05 16:35:11 -05002494 struct sock_xprt *new;
Chuck Leverc8541ec2006-10-17 14:44:27 -04002495
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002496 if (args->addrlen > sizeof(xprt->addr)) {
Chuck Lever46121cf2007-01-31 12:14:08 -05002497 dprintk("RPC: xs_setup_xprt: address too large\n");
Chuck Leverc8541ec2006-10-17 14:44:27 -04002498 return ERR_PTR(-EBADF);
2499 }
2500
Pavel Emelyanov37aa2132010-09-29 16:05:43 +04002501 xprt = xprt_alloc(args->net, sizeof(*new), slot_table_size);
Pavel Emelyanovbd1722d2010-09-29 16:02:43 +04002502 if (xprt == NULL) {
Chuck Lever46121cf2007-01-31 12:14:08 -05002503 dprintk("RPC: xs_setup_xprt: couldn't allocate "
2504 "rpc_xprt\n");
Chuck Leverc8541ec2006-10-17 14:44:27 -04002505 return ERR_PTR(-ENOMEM);
2506 }
2507
Pavel Emelyanovbd1722d2010-09-29 16:02:43 +04002508 new = container_of(xprt, struct sock_xprt, xprt);
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002509 memcpy(&xprt->addr, args->dstaddr, args->addrlen);
2510 xprt->addrlen = args->addrlen;
Frank van Maarseveend3bc9a12007-07-09 22:23:35 +02002511 if (args->srcaddr)
Chuck Leverfbfffbd2009-08-09 15:09:46 -04002512 memcpy(&new->srcaddr, args->srcaddr, args->addrlen);
Chuck Lever92476852010-10-20 11:53:01 -04002513 else {
2514 int err;
2515 err = xs_init_anyaddr(args->dstaddr->sa_family,
2516 (struct sockaddr *)&new->srcaddr);
2517 if (err != 0)
2518 return ERR_PTR(err);
2519 }
Chuck Leverc8541ec2006-10-17 14:44:27 -04002520
2521 return xprt;
2522}
2523
Chuck Lever176e21e2011-05-09 15:22:44 -04002524static const struct rpc_timeout xs_local_default_timeout = {
2525 .to_initval = 10 * HZ,
2526 .to_maxval = 10 * HZ,
2527 .to_retries = 2,
2528};
2529
2530/**
2531 * xs_setup_local - Set up transport to use an AF_LOCAL socket
2532 * @args: rpc transport creation arguments
2533 *
2534 * AF_LOCAL is a "tpi_cots_ord" transport, just like TCP
2535 */
2536static struct rpc_xprt *xs_setup_local(struct xprt_create *args)
2537{
2538 struct sockaddr_un *sun = (struct sockaddr_un *)args->dstaddr;
2539 struct sock_xprt *transport;
2540 struct rpc_xprt *xprt;
2541 struct rpc_xprt *ret;
2542
2543 xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
2544 if (IS_ERR(xprt))
2545 return xprt;
2546 transport = container_of(xprt, struct sock_xprt, xprt);
2547
2548 xprt->prot = 0;
2549 xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
2550 xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2551
2552 xprt->bind_timeout = XS_BIND_TO;
2553 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2554 xprt->idle_timeout = XS_IDLE_DISC_TO;
2555
2556 xprt->ops = &xs_local_ops;
2557 xprt->timeout = &xs_local_default_timeout;
2558
2559 switch (sun->sun_family) {
2560 case AF_LOCAL:
2561 if (sun->sun_path[0] != '/') {
2562 dprintk("RPC: bad AF_LOCAL address: %s\n",
2563 sun->sun_path);
2564 ret = ERR_PTR(-EINVAL);
2565 goto out_err;
2566 }
2567 xprt_set_bound(xprt);
2568 INIT_DELAYED_WORK(&transport->connect_worker,
2569 xs_local_setup_socket);
2570 xs_format_peer_addresses(xprt, "local", RPCBIND_NETID_LOCAL);
2571 break;
2572 default:
2573 ret = ERR_PTR(-EAFNOSUPPORT);
2574 goto out_err;
2575 }
2576
2577 dprintk("RPC: set up xprt to %s via AF_LOCAL\n",
2578 xprt->address_strings[RPC_DISPLAY_ADDR]);
2579
2580 if (try_module_get(THIS_MODULE))
2581 return xprt;
2582 ret = ERR_PTR(-EINVAL);
2583out_err:
2584 xprt_free(xprt);
2585 return ret;
2586}
2587
Trond Myklebust2881ae72007-12-20 16:03:54 -05002588static const struct rpc_timeout xs_udp_default_timeout = {
2589 .to_initval = 5 * HZ,
2590 .to_maxval = 30 * HZ,
2591 .to_increment = 5 * HZ,
2592 .to_retries = 5,
2593};
2594
Chuck Lever9903cd12005-08-11 16:25:26 -04002595/**
2596 * xs_setup_udp - Set up transport to use a UDP socket
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002597 * @args: rpc transport creation arguments
Chuck Lever9903cd12005-08-11 16:25:26 -04002598 *
2599 */
Adrian Bunk483066d2007-10-24 18:24:02 +02002600static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
Chuck Levera246b012005-08-11 16:25:23 -04002601{
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002602 struct sockaddr *addr = args->dstaddr;
Chuck Leverc8541ec2006-10-17 14:44:27 -04002603 struct rpc_xprt *xprt;
Chuck Leverc8475462006-12-05 16:35:26 -05002604 struct sock_xprt *transport;
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002605 struct rpc_xprt *ret;
Chuck Levera246b012005-08-11 16:25:23 -04002606
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002607 xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries);
Chuck Leverc8541ec2006-10-17 14:44:27 -04002608 if (IS_ERR(xprt))
2609 return xprt;
Chuck Leverc8475462006-12-05 16:35:26 -05002610 transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Levera246b012005-08-11 16:25:23 -04002611
Chuck Leverec739ef2006-08-22 20:06:15 -04002612 xprt->prot = IPPROTO_UDP;
Chuck Lever808012f2005-08-25 16:25:49 -07002613 xprt->tsh_size = 0;
Chuck Levera246b012005-08-11 16:25:23 -04002614 /* XXX: header size can vary due to auth type, IPv6, etc. */
2615 xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
2616
Chuck Lever03bf4b72005-08-25 16:25:55 -07002617 xprt->bind_timeout = XS_BIND_TO;
Chuck Lever03bf4b72005-08-25 16:25:55 -07002618 xprt->reestablish_timeout = XS_UDP_REEST_TO;
2619 xprt->idle_timeout = XS_IDLE_DISC_TO;
Chuck Levera246b012005-08-11 16:25:23 -04002620
Chuck Lever262965f2005-08-11 16:25:56 -04002621 xprt->ops = &xs_udp_ops;
Chuck Levera246b012005-08-11 16:25:23 -04002622
Trond Myklebustba7392b2007-12-20 16:03:55 -05002623 xprt->timeout = &xs_udp_default_timeout;
Chuck Levera246b012005-08-11 16:25:23 -04002624
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002625 switch (addr->sa_family) {
2626 case AF_INET:
2627 if (((struct sockaddr_in *)addr)->sin_port != htons(0))
2628 xprt_set_bound(xprt);
2629
2630 INIT_DELAYED_WORK(&transport->connect_worker,
Pavel Emelyanov8c14ff22010-10-04 16:58:02 +04002631 xs_udp_setup_socket);
Chuck Lever9dc3b092009-08-09 15:09:46 -04002632 xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP);
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002633 break;
2634 case AF_INET6:
2635 if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
2636 xprt_set_bound(xprt);
2637
2638 INIT_DELAYED_WORK(&transport->connect_worker,
Pavel Emelyanov8c14ff22010-10-04 16:58:02 +04002639 xs_udp_setup_socket);
Chuck Lever9dc3b092009-08-09 15:09:46 -04002640 xs_format_peer_addresses(xprt, "udp", RPCBIND_NETID_UDP6);
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002641 break;
2642 default:
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002643 ret = ERR_PTR(-EAFNOSUPPORT);
2644 goto out_err;
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002645 }
2646
Chuck Leverc740eff2009-08-09 15:09:46 -04002647 if (xprt_bound(xprt))
2648 dprintk("RPC: set up xprt to %s (port %s) via %s\n",
2649 xprt->address_strings[RPC_DISPLAY_ADDR],
2650 xprt->address_strings[RPC_DISPLAY_PORT],
2651 xprt->address_strings[RPC_DISPLAY_PROTO]);
2652 else
2653 dprintk("RPC: set up xprt to %s (autobind) via %s\n",
2654 xprt->address_strings[RPC_DISPLAY_ADDR],
2655 xprt->address_strings[RPC_DISPLAY_PROTO]);
Chuck Leveredb267a2006-08-22 20:06:18 -04002656
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002657 if (try_module_get(THIS_MODULE))
2658 return xprt;
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002659 ret = ERR_PTR(-EINVAL);
2660out_err:
Pavel Emelyanove204e622010-09-29 16:03:13 +04002661 xprt_free(xprt);
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002662 return ret;
Chuck Levera246b012005-08-11 16:25:23 -04002663}
2664
Trond Myklebust2881ae72007-12-20 16:03:54 -05002665static const struct rpc_timeout xs_tcp_default_timeout = {
2666 .to_initval = 60 * HZ,
2667 .to_maxval = 60 * HZ,
2668 .to_retries = 2,
2669};
2670
Chuck Lever9903cd12005-08-11 16:25:26 -04002671/**
2672 * xs_setup_tcp - Set up transport to use a TCP socket
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002673 * @args: rpc transport creation arguments
Chuck Lever9903cd12005-08-11 16:25:26 -04002674 *
2675 */
Adrian Bunk483066d2007-10-24 18:24:02 +02002676static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
Chuck Levera246b012005-08-11 16:25:23 -04002677{
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002678 struct sockaddr *addr = args->dstaddr;
Chuck Leverc8541ec2006-10-17 14:44:27 -04002679 struct rpc_xprt *xprt;
Chuck Leverc8475462006-12-05 16:35:26 -05002680 struct sock_xprt *transport;
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002681 struct rpc_xprt *ret;
Chuck Levera246b012005-08-11 16:25:23 -04002682
Frank van Maarseveen96802a02007-07-08 13:08:54 +02002683 xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
Chuck Leverc8541ec2006-10-17 14:44:27 -04002684 if (IS_ERR(xprt))
2685 return xprt;
Chuck Leverc8475462006-12-05 16:35:26 -05002686 transport = container_of(xprt, struct sock_xprt, xprt);
Chuck Levera246b012005-08-11 16:25:23 -04002687
Chuck Leverec739ef2006-08-22 20:06:15 -04002688 xprt->prot = IPPROTO_TCP;
Chuck Lever808012f2005-08-25 16:25:49 -07002689 xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
Chuck Lever808012f2005-08-25 16:25:49 -07002690 xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
Chuck Levera246b012005-08-11 16:25:23 -04002691
Chuck Lever03bf4b72005-08-25 16:25:55 -07002692 xprt->bind_timeout = XS_BIND_TO;
Chuck Lever03bf4b72005-08-25 16:25:55 -07002693 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
2694 xprt->idle_timeout = XS_IDLE_DISC_TO;
Chuck Levera246b012005-08-11 16:25:23 -04002695
Chuck Lever262965f2005-08-11 16:25:56 -04002696 xprt->ops = &xs_tcp_ops;
Trond Myklebustba7392b2007-12-20 16:03:55 -05002697 xprt->timeout = &xs_tcp_default_timeout;
Chuck Levera246b012005-08-11 16:25:23 -04002698
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002699 switch (addr->sa_family) {
2700 case AF_INET:
2701 if (((struct sockaddr_in *)addr)->sin_port != htons(0))
2702 xprt_set_bound(xprt);
2703
Chuck Lever9dc3b092009-08-09 15:09:46 -04002704 INIT_DELAYED_WORK(&transport->connect_worker,
Pavel Emelyanovcdd518d2010-10-04 16:57:40 +04002705 xs_tcp_setup_socket);
Chuck Lever9dc3b092009-08-09 15:09:46 -04002706 xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP);
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002707 break;
2708 case AF_INET6:
2709 if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
2710 xprt_set_bound(xprt);
2711
Chuck Lever9dc3b092009-08-09 15:09:46 -04002712 INIT_DELAYED_WORK(&transport->connect_worker,
Pavel Emelyanovcdd518d2010-10-04 16:57:40 +04002713 xs_tcp_setup_socket);
Chuck Lever9dc3b092009-08-09 15:09:46 -04002714 xs_format_peer_addresses(xprt, "tcp", RPCBIND_NETID_TCP6);
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002715 break;
2716 default:
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002717 ret = ERR_PTR(-EAFNOSUPPORT);
2718 goto out_err;
Chuck Lever8f9d5b12007-08-06 11:57:53 -04002719 }
2720
Chuck Leverc740eff2009-08-09 15:09:46 -04002721 if (xprt_bound(xprt))
2722 dprintk("RPC: set up xprt to %s (port %s) via %s\n",
2723 xprt->address_strings[RPC_DISPLAY_ADDR],
2724 xprt->address_strings[RPC_DISPLAY_PORT],
2725 xprt->address_strings[RPC_DISPLAY_PROTO]);
2726 else
2727 dprintk("RPC: set up xprt to %s (autobind) via %s\n",
2728 xprt->address_strings[RPC_DISPLAY_ADDR],
2729 xprt->address_strings[RPC_DISPLAY_PROTO]);
2730
Chuck Leveredb267a2006-08-22 20:06:18 -04002731
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002732 if (try_module_get(THIS_MODULE))
2733 return xprt;
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002734 ret = ERR_PTR(-EINVAL);
2735out_err:
Pavel Emelyanove204e622010-09-29 16:03:13 +04002736 xprt_free(xprt);
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002737 return ret;
Chuck Levera246b012005-08-11 16:25:23 -04002738}
Chuck Lever282b32e2006-12-05 16:35:51 -05002739
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002740/**
2741 * xs_setup_bc_tcp - Set up transport to use a TCP backchannel socket
2742 * @args: rpc transport creation arguments
2743 *
2744 */
2745static struct rpc_xprt *xs_setup_bc_tcp(struct xprt_create *args)
2746{
2747 struct sockaddr *addr = args->dstaddr;
2748 struct rpc_xprt *xprt;
2749 struct sock_xprt *transport;
2750 struct svc_sock *bc_sock;
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002751 struct rpc_xprt *ret;
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002752
J. Bruce Fieldsf0418aa2010-12-08 13:48:19 -05002753 if (args->bc_xprt->xpt_bc_xprt) {
2754 /*
2755 * This server connection already has a backchannel
2756 * export; we can't create a new one, as we wouldn't be
2757 * able to match replies based on xid any more. So,
2758 * reuse the already-existing one:
2759 */
2760 return args->bc_xprt->xpt_bc_xprt;
2761 }
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002762 xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
2763 if (IS_ERR(xprt))
2764 return xprt;
2765 transport = container_of(xprt, struct sock_xprt, xprt);
2766
2767 xprt->prot = IPPROTO_TCP;
2768 xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
2769 xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
2770 xprt->timeout = &xs_tcp_default_timeout;
2771
2772 /* backchannel */
2773 xprt_set_bound(xprt);
2774 xprt->bind_timeout = 0;
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002775 xprt->reestablish_timeout = 0;
2776 xprt->idle_timeout = 0;
2777
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002778 xprt->ops = &bc_tcp_ops;
2779
2780 switch (addr->sa_family) {
2781 case AF_INET:
2782 xs_format_peer_addresses(xprt, "tcp",
2783 RPCBIND_NETID_TCP);
2784 break;
2785 case AF_INET6:
2786 xs_format_peer_addresses(xprt, "tcp",
2787 RPCBIND_NETID_TCP6);
2788 break;
2789 default:
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002790 ret = ERR_PTR(-EAFNOSUPPORT);
2791 goto out_err;
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002792 }
2793
Pavel Emelyanov50fa0d42010-10-05 20:49:35 +04002794 dprintk("RPC: set up xprt to %s (port %s) via %s\n",
2795 xprt->address_strings[RPC_DISPLAY_ADDR],
2796 xprt->address_strings[RPC_DISPLAY_PORT],
2797 xprt->address_strings[RPC_DISPLAY_PROTO]);
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002798
2799 /*
J. Bruce Fields99de8ea2010-12-08 12:45:44 -05002800 * Once we've associated a backchannel xprt with a connection,
2801 * we want to keep it around as long as long as the connection
2802 * lasts, in case we need to start using it for a backchannel
2803 * again; this reference won't be dropped until bc_xprt is
2804 * destroyed.
2805 */
2806 xprt_get(xprt);
2807 args->bc_xprt->xpt_bc_xprt = xprt;
2808 xprt->bc_xprt = args->bc_xprt;
2809 bc_sock = container_of(args->bc_xprt, struct svc_sock, sk_xprt);
2810 transport->sock = bc_sock->sk_sock;
2811 transport->inet = bc_sock->sk_sk;
2812
2813 /*
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002814 * Since we don't want connections for the backchannel, we set
2815 * the xprt status to connected
2816 */
2817 xprt_set_connected(xprt);
2818
2819
2820 if (try_module_get(THIS_MODULE))
2821 return xprt;
J. Bruce Fields99de8ea2010-12-08 12:45:44 -05002822 xprt_put(xprt);
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002823 ret = ERR_PTR(-EINVAL);
2824out_err:
Pavel Emelyanove204e622010-09-29 16:03:13 +04002825 xprt_free(xprt);
J. Bruce Fields0a68b0b2010-05-26 08:42:24 -04002826 return ret;
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002827}
2828
Chuck Lever176e21e2011-05-09 15:22:44 -04002829static struct xprt_class xs_local_transport = {
2830 .list = LIST_HEAD_INIT(xs_local_transport.list),
2831 .name = "named UNIX socket",
2832 .owner = THIS_MODULE,
2833 .ident = XPRT_TRANSPORT_LOCAL,
2834 .setup = xs_setup_local,
2835};
2836
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002837static struct xprt_class xs_udp_transport = {
2838 .list = LIST_HEAD_INIT(xs_udp_transport.list),
2839 .name = "udp",
2840 .owner = THIS_MODULE,
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002841 .ident = XPRT_TRANSPORT_UDP,
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002842 .setup = xs_setup_udp,
2843};
2844
2845static struct xprt_class xs_tcp_transport = {
2846 .list = LIST_HEAD_INIT(xs_tcp_transport.list),
2847 .name = "tcp",
2848 .owner = THIS_MODULE,
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002849 .ident = XPRT_TRANSPORT_TCP,
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002850 .setup = xs_setup_tcp,
2851};
2852
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002853static struct xprt_class xs_bc_tcp_transport = {
2854 .list = LIST_HEAD_INIT(xs_bc_tcp_transport.list),
2855 .name = "tcp NFSv4.1 backchannel",
2856 .owner = THIS_MODULE,
2857 .ident = XPRT_TRANSPORT_BC_TCP,
2858 .setup = xs_setup_bc_tcp,
2859};
2860
Chuck Lever282b32e2006-12-05 16:35:51 -05002861/**
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002862 * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
Chuck Lever282b32e2006-12-05 16:35:51 -05002863 *
2864 */
2865int init_socket_xprt(void)
2866{
Chuck Leverfbf76682006-12-05 16:35:54 -05002867#ifdef RPC_DEBUG
Eric W. Biederman2b1bec52007-02-14 00:33:24 -08002868 if (!sunrpc_table_header)
Eric W. Biederman0b4d4142007-02-14 00:34:09 -08002869 sunrpc_table_header = register_sysctl_table(sunrpc_table);
Chuck Leverfbf76682006-12-05 16:35:54 -05002870#endif
2871
Chuck Lever176e21e2011-05-09 15:22:44 -04002872 xprt_register_transport(&xs_local_transport);
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002873 xprt_register_transport(&xs_udp_transport);
2874 xprt_register_transport(&xs_tcp_transport);
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002875 xprt_register_transport(&xs_bc_tcp_transport);
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002876
Chuck Lever282b32e2006-12-05 16:35:51 -05002877 return 0;
2878}
2879
2880/**
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002881 * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
Chuck Lever282b32e2006-12-05 16:35:51 -05002882 *
2883 */
2884void cleanup_socket_xprt(void)
2885{
Chuck Leverfbf76682006-12-05 16:35:54 -05002886#ifdef RPC_DEBUG
2887 if (sunrpc_table_header) {
2888 unregister_sysctl_table(sunrpc_table_header);
2889 sunrpc_table_header = NULL;
2890 }
2891#endif
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002892
Chuck Lever176e21e2011-05-09 15:22:44 -04002893 xprt_unregister_transport(&xs_local_transport);
\"Talpey, Thomas\bc255712007-09-10 13:46:39 -04002894 xprt_unregister_transport(&xs_udp_transport);
2895 xprt_unregister_transport(&xs_tcp_transport);
Alexandros Batsakisf300bab2009-09-10 17:33:30 +03002896 xprt_unregister_transport(&xs_bc_tcp_transport);
Chuck Lever282b32e2006-12-05 16:35:51 -05002897}
Trond Myklebustcbf11072009-08-09 15:06:19 -04002898
Rusty Russell9bbb9e52010-08-11 23:04:12 -06002899static int param_set_uint_minmax(const char *val,
2900 const struct kernel_param *kp,
Trond Myklebustcbf11072009-08-09 15:06:19 -04002901 unsigned int min, unsigned int max)
2902{
2903 unsigned long num;
2904 int ret;
2905
2906 if (!val)
2907 return -EINVAL;
2908 ret = strict_strtoul(val, 0, &num);
2909 if (ret == -EINVAL || num < min || num > max)
2910 return -EINVAL;
2911 *((unsigned int *)kp->arg) = num;
2912 return 0;
2913}
2914
Rusty Russell9bbb9e52010-08-11 23:04:12 -06002915static int param_set_portnr(const char *val, const struct kernel_param *kp)
Trond Myklebustcbf11072009-08-09 15:06:19 -04002916{
2917 return param_set_uint_minmax(val, kp,
2918 RPC_MIN_RESVPORT,
2919 RPC_MAX_RESVPORT);
2920}
2921
Rusty Russell9bbb9e52010-08-11 23:04:12 -06002922static struct kernel_param_ops param_ops_portnr = {
2923 .set = param_set_portnr,
2924 .get = param_get_uint,
2925};
2926
Trond Myklebustcbf11072009-08-09 15:06:19 -04002927#define param_check_portnr(name, p) \
2928 __param_check(name, p, unsigned int);
2929
2930module_param_named(min_resvport, xprt_min_resvport, portnr, 0644);
2931module_param_named(max_resvport, xprt_max_resvport, portnr, 0644);
2932
Rusty Russell9bbb9e52010-08-11 23:04:12 -06002933static int param_set_slot_table_size(const char *val,
2934 const struct kernel_param *kp)
Trond Myklebustcbf11072009-08-09 15:06:19 -04002935{
2936 return param_set_uint_minmax(val, kp,
2937 RPC_MIN_SLOT_TABLE,
2938 RPC_MAX_SLOT_TABLE);
2939}
2940
Rusty Russell9bbb9e52010-08-11 23:04:12 -06002941static struct kernel_param_ops param_ops_slot_table_size = {
2942 .set = param_set_slot_table_size,
2943 .get = param_get_uint,
2944};
2945
Trond Myklebustcbf11072009-08-09 15:06:19 -04002946#define param_check_slot_table_size(name, p) \
2947 __param_check(name, p, unsigned int);
2948
2949module_param_named(tcp_slot_table_entries, xprt_tcp_slot_table_entries,
2950 slot_table_size, 0644);
2951module_param_named(udp_slot_table_entries, xprt_udp_slot_table_entries,
2952 slot_table_size, 0644);
2953