xprtsock.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043
  1. /*
  2. * linux/net/sunrpc/xprtsock.c
  3. *
  4. * Client-side transport implementation for sockets.
  5. *
  6. * TCP callback races fixes (C) 1998 Red Hat Software <alan@redhat.com>
  7. * TCP send fixes (C) 1998 Red Hat Software <alan@redhat.com>
  8. * TCP NFS related read + write fixes
  9. * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
  10. *
  11. * Rewrite of larges part of the code in order to stabilize TCP stuff.
  12. * Fix behaviour when socket buffer is full.
  13. * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
  14. *
  15. * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
  16. */
  17. #include <linux/types.h>
  18. #include <linux/slab.h>
  19. #include <linux/capability.h>
  20. #include <linux/sched.h>
  21. #include <linux/pagemap.h>
  22. #include <linux/errno.h>
  23. #include <linux/socket.h>
  24. #include <linux/in.h>
  25. #include <linux/net.h>
  26. #include <linux/mm.h>
  27. #include <linux/udp.h>
  28. #include <linux/tcp.h>
  29. #include <linux/sunrpc/clnt.h>
  30. #include <linux/file.h>
  31. #include <net/sock.h>
  32. #include <net/checksum.h>
  33. #include <net/udp.h>
  34. #include <net/tcp.h>
  35. /*
  36. * Maximum port number to use when requesting a reserved port.
  37. */
  38. #define XS_MAX_RESVPORT (800U)
  39. #ifdef RPC_DEBUG
  40. # undef RPC_DEBUG_DATA
  41. # define RPCDBG_FACILITY RPCDBG_TRANS
  42. #endif
  43. #ifdef RPC_DEBUG_DATA
  44. static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  45. {
  46. u8 *buf = (u8 *) packet;
  47. int j;
  48. dprintk("RPC: %s\n", msg);
  49. for (j = 0; j < count && j < 128; j += 4) {
  50. if (!(j & 31)) {
  51. if (j)
  52. dprintk("\n");
  53. dprintk("0x%04x ", j);
  54. }
  55. dprintk("%02x%02x%02x%02x ",
  56. buf[j], buf[j+1], buf[j+2], buf[j+3]);
  57. }
  58. dprintk("\n");
  59. }
  60. #else
  61. static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  62. {
  63. /* NOP */
  64. }
  65. #endif
  66. #define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL)
  67. static inline int xs_send_head(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  68. {
  69. struct kvec iov = {
  70. .iov_base = xdr->head[0].iov_base + base,
  71. .iov_len = len - base,
  72. };
  73. struct msghdr msg = {
  74. .msg_name = addr,
  75. .msg_namelen = addrlen,
  76. .msg_flags = XS_SENDMSG_FLAGS,
  77. };
  78. if (xdr->len > len)
  79. msg.msg_flags |= MSG_MORE;
  80. if (likely(iov.iov_len))
  81. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  82. return kernel_sendmsg(sock, &msg, NULL, 0, 0);
  83. }
  84. static int xs_send_tail(struct socket *sock, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  85. {
  86. struct kvec iov = {
  87. .iov_base = xdr->tail[0].iov_base + base,
  88. .iov_len = len - base,
  89. };
  90. struct msghdr msg = {
  91. .msg_flags = XS_SENDMSG_FLAGS,
  92. };
  93. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  94. }
  95. /**
  96. * xs_sendpages - write pages directly to a socket
  97. * @sock: socket to send on
  98. * @addr: UDP only -- address of destination
  99. * @addrlen: UDP only -- length of destination address
  100. * @xdr: buffer containing this request
  101. * @base: starting position in the buffer
  102. *
  103. */
  104. static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
  105. {
  106. struct page **ppage = xdr->pages;
  107. unsigned int len, pglen = xdr->page_len;
  108. int err, ret = 0;
  109. ssize_t (*sendpage)(struct socket *, struct page *, int, size_t, int);
  110. len = xdr->head[0].iov_len;
  111. if (base < len || (addr != NULL && base == 0)) {
  112. err = xs_send_head(sock, addr, addrlen, xdr, base, len);
  113. if (ret == 0)
  114. ret = err;
  115. else if (err > 0)
  116. ret += err;
  117. if (err != (len - base))
  118. goto out;
  119. base = 0;
  120. } else
  121. base -= len;
  122. if (unlikely(pglen == 0))
  123. goto copy_tail;
  124. if (unlikely(base >= pglen)) {
  125. base -= pglen;
  126. goto copy_tail;
  127. }
  128. if (base || xdr->page_base) {
  129. pglen -= base;
  130. base += xdr->page_base;
  131. ppage += base >> PAGE_CACHE_SHIFT;
  132. base &= ~PAGE_CACHE_MASK;
  133. }
  134. sendpage = sock->ops->sendpage ? : sock_no_sendpage;
  135. do {
  136. int flags = XS_SENDMSG_FLAGS;
  137. len = PAGE_CACHE_SIZE;
  138. if (base)
  139. len -= base;
  140. if (pglen < len)
  141. len = pglen;
  142. if (pglen != len || xdr->tail[0].iov_len != 0)
  143. flags |= MSG_MORE;
  144. /* Hmm... We might be dealing with highmem pages */
  145. if (PageHighMem(*ppage))
  146. sendpage = sock_no_sendpage;
  147. err = sendpage(sock, *ppage, base, len, flags);
  148. if (ret == 0)
  149. ret = err;
  150. else if (err > 0)
  151. ret += err;
  152. if (err != len)
  153. goto out;
  154. base = 0;
  155. ppage++;
  156. } while ((pglen -= len) != 0);
  157. copy_tail:
  158. len = xdr->tail[0].iov_len;
  159. if (base < len) {
  160. err = xs_send_tail(sock, xdr, base, len);
  161. if (ret == 0)
  162. ret = err;
  163. else if (err > 0)
  164. ret += err;
  165. }
  166. out:
  167. return ret;
  168. }
  169. /**
  170. * xs_sendmsg - write an RPC request to a socket
  171. * @xprt: generic transport
  172. * @req: the RPC request to write
  173. *
  174. */
  175. static int xs_sendmsg(struct rpc_xprt *xprt, struct rpc_rqst *req)
  176. {
  177. struct socket *sock = xprt->sock;
  178. struct xdr_buf *xdr = &req->rq_snd_buf;
  179. struct sockaddr *addr = NULL;
  180. int addrlen = 0;
  181. unsigned int skip;
  182. int result;
  183. if (!sock)
  184. return -ENOTCONN;
  185. xs_pktdump("packet data:",
  186. req->rq_svec->iov_base,
  187. req->rq_svec->iov_len);
  188. /* For UDP, we need to provide an address */
  189. if (!xprt->stream) {
  190. addr = (struct sockaddr *) &xprt->addr;
  191. addrlen = sizeof(xprt->addr);
  192. }
  193. /* Don't repeat bytes */
  194. skip = req->rq_bytes_sent;
  195. clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
  196. result = xs_sendpages(sock, addr, addrlen, xdr, skip);
  197. dprintk("RPC: xs_sendmsg(%d) = %d\n", xdr->len - skip, result);
  198. if (result >= 0)
  199. return result;
  200. switch (result) {
  201. case -ECONNREFUSED:
  202. /* When the server has died, an ICMP port unreachable message
  203. * prompts ECONNREFUSED. */
  204. case -EAGAIN:
  205. break;
  206. case -ECONNRESET:
  207. case -ENOTCONN:
  208. case -EPIPE:
  209. /* connection broken */
  210. if (xprt->stream)
  211. result = -ENOTCONN;
  212. break;
  213. default:
  214. break;
  215. }
  216. return result;
  217. }
  218. /**
  219. * xs_send_request - write an RPC request to a socket
  220. * @task: address of RPC task that manages the state of an RPC request
  221. *
  222. * Return values:
  223. * 0: The request has been sent
  224. * EAGAIN: The socket was blocked, please call again later to
  225. * complete the request
  226. * other: Some other error occured, the request was not sent
  227. *
  228. * XXX: In the case of soft timeouts, should we eventually give up
  229. * if the socket is not able to make progress?
  230. */
  231. static int xs_send_request(struct rpc_task *task)
  232. {
  233. struct rpc_rqst *req = task->tk_rqstp;
  234. struct rpc_xprt *xprt = req->rq_xprt;
  235. int status, retry = 0;
  236. /* set up everything as needed. */
  237. /* Write the record marker */
  238. if (xprt->stream) {
  239. u32 *marker = req->rq_svec[0].iov_base;
  240. *marker = htonl(0x80000000|(req->rq_slen-sizeof(*marker)));
  241. }
  242. /* Continue transmitting the packet/record. We must be careful
  243. * to cope with writespace callbacks arriving _after_ we have
  244. * called sendmsg().
  245. */
  246. while (1) {
  247. req->rq_xtime = jiffies;
  248. status = xs_sendmsg(xprt, req);
  249. if (status < 0)
  250. break;
  251. if (xprt->stream) {
  252. req->rq_bytes_sent += status;
  253. /* If we've sent the entire packet, immediately
  254. * reset the count of bytes sent. */
  255. if (req->rq_bytes_sent >= req->rq_slen) {
  256. req->rq_bytes_sent = 0;
  257. return 0;
  258. }
  259. } else {
  260. if (status >= req->rq_slen)
  261. return 0;
  262. status = -EAGAIN;
  263. break;
  264. }
  265. dprintk("RPC: %4d xmit incomplete (%d left of %d)\n",
  266. task->tk_pid, req->rq_slen - req->rq_bytes_sent,
  267. req->rq_slen);
  268. status = -EAGAIN;
  269. if (retry++ > 50)
  270. break;
  271. }
  272. if (status == -EAGAIN) {
  273. if (test_bit(SOCK_ASYNC_NOSPACE, &xprt->sock->flags)) {
  274. /* Protect against races with xs_write_space */
  275. spin_lock_bh(&xprt->transport_lock);
  276. /* Don't race with disconnect */
  277. if (!xprt_connected(xprt))
  278. task->tk_status = -ENOTCONN;
  279. else if (test_bit(SOCK_NOSPACE, &xprt->sock->flags)) {
  280. task->tk_timeout = req->rq_timeout;
  281. rpc_sleep_on(&xprt->pending, task, NULL, NULL);
  282. }
  283. spin_unlock_bh(&xprt->transport_lock);
  284. return status;
  285. }
  286. /* Keep holding the socket if it is blocked */
  287. rpc_delay(task, HZ>>4);
  288. }
  289. return status;
  290. }
  291. /**
  292. * xs_close - close a socket
  293. * @xprt: transport
  294. *
  295. */
  296. static void xs_close(struct rpc_xprt *xprt)
  297. {
  298. struct socket *sock = xprt->sock;
  299. struct sock *sk = xprt->inet;
  300. if (!sk)
  301. return;
  302. dprintk("RPC: xs_close xprt %p\n", xprt);
  303. write_lock_bh(&sk->sk_callback_lock);
  304. xprt->inet = NULL;
  305. xprt->sock = NULL;
  306. sk->sk_user_data = NULL;
  307. sk->sk_data_ready = xprt->old_data_ready;
  308. sk->sk_state_change = xprt->old_state_change;
  309. sk->sk_write_space = xprt->old_write_space;
  310. write_unlock_bh(&sk->sk_callback_lock);
  311. sk->sk_no_check = 0;
  312. sock_release(sock);
  313. }
  314. /**
  315. * xs_destroy - prepare to shutdown a transport
  316. * @xprt: doomed transport
  317. *
  318. */
  319. static void xs_destroy(struct rpc_xprt *xprt)
  320. {
  321. dprintk("RPC: xs_destroy xprt %p\n", xprt);
  322. cancel_delayed_work(&xprt->connect_worker);
  323. flush_scheduled_work();
  324. xprt_disconnect(xprt);
  325. xs_close(xprt);
  326. kfree(xprt->slot);
  327. }
  328. static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
  329. {
  330. return (struct rpc_xprt *) sk->sk_user_data;
  331. }
  332. /**
  333. * xs_udp_data_ready - "data ready" callback for UDP sockets
  334. * @sk: socket with data to read
  335. * @len: how much data to read
  336. *
  337. */
  338. static void xs_udp_data_ready(struct sock *sk, int len)
  339. {
  340. struct rpc_task *task;
  341. struct rpc_xprt *xprt;
  342. struct rpc_rqst *rovr;
  343. struct sk_buff *skb;
  344. int err, repsize, copied;
  345. u32 _xid, *xp;
  346. read_lock(&sk->sk_callback_lock);
  347. dprintk("RPC: xs_udp_data_ready...\n");
  348. if (!(xprt = xprt_from_sock(sk)))
  349. goto out;
  350. if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
  351. goto out;
  352. if (xprt->shutdown)
  353. goto dropit;
  354. repsize = skb->len - sizeof(struct udphdr);
  355. if (repsize < 4) {
  356. dprintk("RPC: impossible RPC reply size %d!\n", repsize);
  357. goto dropit;
  358. }
  359. /* Copy the XID from the skb... */
  360. xp = skb_header_pointer(skb, sizeof(struct udphdr),
  361. sizeof(_xid), &_xid);
  362. if (xp == NULL)
  363. goto dropit;
  364. /* Look up and lock the request corresponding to the given XID */
  365. spin_lock(&xprt->transport_lock);
  366. rovr = xprt_lookup_rqst(xprt, *xp);
  367. if (!rovr)
  368. goto out_unlock;
  369. task = rovr->rq_task;
  370. dprintk("RPC: %4d received reply\n", task->tk_pid);
  371. if ((copied = rovr->rq_private_buf.buflen) > repsize)
  372. copied = repsize;
  373. /* Suck it into the iovec, verify checksum if not done by hw. */
  374. if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb))
  375. goto out_unlock;
  376. /* Something worked... */
  377. dst_confirm(skb->dst);
  378. xprt_complete_rqst(xprt, rovr, copied);
  379. out_unlock:
  380. spin_unlock(&xprt->transport_lock);
  381. dropit:
  382. skb_free_datagram(sk, skb);
  383. out:
  384. read_unlock(&sk->sk_callback_lock);
  385. }
  386. static inline size_t xs_tcp_copy_data(skb_reader_t *desc, void *p, size_t len)
  387. {
  388. if (len > desc->count)
  389. len = desc->count;
  390. if (skb_copy_bits(desc->skb, desc->offset, p, len)) {
  391. dprintk("RPC: failed to copy %zu bytes from skb. %zu bytes remain\n",
  392. len, desc->count);
  393. return 0;
  394. }
  395. desc->offset += len;
  396. desc->count -= len;
  397. dprintk("RPC: copied %zu bytes from skb. %zu bytes remain\n",
  398. len, desc->count);
  399. return len;
  400. }
  401. static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, skb_reader_t *desc)
  402. {
  403. size_t len, used;
  404. char *p;
  405. p = ((char *) &xprt->tcp_recm) + xprt->tcp_offset;
  406. len = sizeof(xprt->tcp_recm) - xprt->tcp_offset;
  407. used = xs_tcp_copy_data(desc, p, len);
  408. xprt->tcp_offset += used;
  409. if (used != len)
  410. return;
  411. xprt->tcp_reclen = ntohl(xprt->tcp_recm);
  412. if (xprt->tcp_reclen & 0x80000000)
  413. xprt->tcp_flags |= XPRT_LAST_FRAG;
  414. else
  415. xprt->tcp_flags &= ~XPRT_LAST_FRAG;
  416. xprt->tcp_reclen &= 0x7fffffff;
  417. xprt->tcp_flags &= ~XPRT_COPY_RECM;
  418. xprt->tcp_offset = 0;
  419. /* Sanity check of the record length */
  420. if (xprt->tcp_reclen < 4) {
  421. dprintk("RPC: invalid TCP record fragment length\n");
  422. xprt_disconnect(xprt);
  423. return;
  424. }
  425. dprintk("RPC: reading TCP record fragment of length %d\n",
  426. xprt->tcp_reclen);
  427. }
  428. static void xs_tcp_check_recm(struct rpc_xprt *xprt)
  429. {
  430. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u, tcp_flags = %lx\n",
  431. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen, xprt->tcp_flags);
  432. if (xprt->tcp_offset == xprt->tcp_reclen) {
  433. xprt->tcp_flags |= XPRT_COPY_RECM;
  434. xprt->tcp_offset = 0;
  435. if (xprt->tcp_flags & XPRT_LAST_FRAG) {
  436. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  437. xprt->tcp_flags |= XPRT_COPY_XID;
  438. xprt->tcp_copied = 0;
  439. }
  440. }
  441. }
  442. static inline void xs_tcp_read_xid(struct rpc_xprt *xprt, skb_reader_t *desc)
  443. {
  444. size_t len, used;
  445. char *p;
  446. len = sizeof(xprt->tcp_xid) - xprt->tcp_offset;
  447. dprintk("RPC: reading XID (%Zu bytes)\n", len);
  448. p = ((char *) &xprt->tcp_xid) + xprt->tcp_offset;
  449. used = xs_tcp_copy_data(desc, p, len);
  450. xprt->tcp_offset += used;
  451. if (used != len)
  452. return;
  453. xprt->tcp_flags &= ~XPRT_COPY_XID;
  454. xprt->tcp_flags |= XPRT_COPY_DATA;
  455. xprt->tcp_copied = 4;
  456. dprintk("RPC: reading reply for XID %08x\n",
  457. ntohl(xprt->tcp_xid));
  458. xs_tcp_check_recm(xprt);
  459. }
  460. static inline void xs_tcp_read_request(struct rpc_xprt *xprt, skb_reader_t *desc)
  461. {
  462. struct rpc_rqst *req;
  463. struct xdr_buf *rcvbuf;
  464. size_t len;
  465. ssize_t r;
  466. /* Find and lock the request corresponding to this xid */
  467. spin_lock(&xprt->transport_lock);
  468. req = xprt_lookup_rqst(xprt, xprt->tcp_xid);
  469. if (!req) {
  470. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  471. dprintk("RPC: XID %08x request not found!\n",
  472. ntohl(xprt->tcp_xid));
  473. spin_unlock(&xprt->transport_lock);
  474. return;
  475. }
  476. rcvbuf = &req->rq_private_buf;
  477. len = desc->count;
  478. if (len > xprt->tcp_reclen - xprt->tcp_offset) {
  479. skb_reader_t my_desc;
  480. len = xprt->tcp_reclen - xprt->tcp_offset;
  481. memcpy(&my_desc, desc, sizeof(my_desc));
  482. my_desc.count = len;
  483. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  484. &my_desc, xs_tcp_copy_data);
  485. desc->count -= r;
  486. desc->offset += r;
  487. } else
  488. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  489. desc, xs_tcp_copy_data);
  490. if (r > 0) {
  491. xprt->tcp_copied += r;
  492. xprt->tcp_offset += r;
  493. }
  494. if (r != len) {
  495. /* Error when copying to the receive buffer,
  496. * usually because we weren't able to allocate
  497. * additional buffer pages. All we can do now
  498. * is turn off XPRT_COPY_DATA, so the request
  499. * will not receive any additional updates,
  500. * and time out.
  501. * Any remaining data from this record will
  502. * be discarded.
  503. */
  504. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  505. dprintk("RPC: XID %08x truncated request\n",
  506. ntohl(xprt->tcp_xid));
  507. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  508. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  509. goto out;
  510. }
  511. dprintk("RPC: XID %08x read %Zd bytes\n",
  512. ntohl(xprt->tcp_xid), r);
  513. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  514. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  515. if (xprt->tcp_copied == req->rq_private_buf.buflen)
  516. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  517. else if (xprt->tcp_offset == xprt->tcp_reclen) {
  518. if (xprt->tcp_flags & XPRT_LAST_FRAG)
  519. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  520. }
  521. out:
  522. if (!(xprt->tcp_flags & XPRT_COPY_DATA)) {
  523. dprintk("RPC: %4d received reply complete\n",
  524. req->rq_task->tk_pid);
  525. xprt_complete_rqst(xprt, req, xprt->tcp_copied);
  526. }
  527. spin_unlock(&xprt->transport_lock);
  528. xs_tcp_check_recm(xprt);
  529. }
  530. static inline void xs_tcp_read_discard(struct rpc_xprt *xprt, skb_reader_t *desc)
  531. {
  532. size_t len;
  533. len = xprt->tcp_reclen - xprt->tcp_offset;
  534. if (len > desc->count)
  535. len = desc->count;
  536. desc->count -= len;
  537. desc->offset += len;
  538. xprt->tcp_offset += len;
  539. dprintk("RPC: discarded %Zu bytes\n", len);
  540. xs_tcp_check_recm(xprt);
  541. }
  542. static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
  543. {
  544. struct rpc_xprt *xprt = rd_desc->arg.data;
  545. skb_reader_t desc = {
  546. .skb = skb,
  547. .offset = offset,
  548. .count = len,
  549. .csum = 0
  550. };
  551. dprintk("RPC: xs_tcp_data_recv started\n");
  552. do {
  553. /* Read in a new fragment marker if necessary */
  554. /* Can we ever really expect to get completely empty fragments? */
  555. if (xprt->tcp_flags & XPRT_COPY_RECM) {
  556. xs_tcp_read_fraghdr(xprt, &desc);
  557. continue;
  558. }
  559. /* Read in the xid if necessary */
  560. if (xprt->tcp_flags & XPRT_COPY_XID) {
  561. xs_tcp_read_xid(xprt, &desc);
  562. continue;
  563. }
  564. /* Read in the request data */
  565. if (xprt->tcp_flags & XPRT_COPY_DATA) {
  566. xs_tcp_read_request(xprt, &desc);
  567. continue;
  568. }
  569. /* Skip over any trailing bytes on short reads */
  570. xs_tcp_read_discard(xprt, &desc);
  571. } while (desc.count);
  572. dprintk("RPC: xs_tcp_data_recv done\n");
  573. return len - desc.count;
  574. }
  575. /**
  576. * xs_tcp_data_ready - "data ready" callback for TCP sockets
  577. * @sk: socket with data to read
  578. * @bytes: how much data to read
  579. *
  580. */
  581. static void xs_tcp_data_ready(struct sock *sk, int bytes)
  582. {
  583. struct rpc_xprt *xprt;
  584. read_descriptor_t rd_desc;
  585. read_lock(&sk->sk_callback_lock);
  586. dprintk("RPC: xs_tcp_data_ready...\n");
  587. if (!(xprt = xprt_from_sock(sk)))
  588. goto out;
  589. if (xprt->shutdown)
  590. goto out;
  591. /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
  592. rd_desc.arg.data = xprt;
  593. rd_desc.count = 65536;
  594. tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
  595. out:
  596. read_unlock(&sk->sk_callback_lock);
  597. }
  598. /**
  599. * xs_tcp_state_change - callback to handle TCP socket state changes
  600. * @sk: socket whose state has changed
  601. *
  602. */
  603. static void xs_tcp_state_change(struct sock *sk)
  604. {
  605. struct rpc_xprt *xprt;
  606. read_lock(&sk->sk_callback_lock);
  607. if (!(xprt = xprt_from_sock(sk)))
  608. goto out;
  609. dprintk("RPC: xs_tcp_state_change client %p...\n", xprt);
  610. dprintk("RPC: state %x conn %d dead %d zapped %d\n",
  611. sk->sk_state, xprt_connected(xprt),
  612. sock_flag(sk, SOCK_DEAD),
  613. sock_flag(sk, SOCK_ZAPPED));
  614. switch (sk->sk_state) {
  615. case TCP_ESTABLISHED:
  616. spin_lock_bh(&xprt->transport_lock);
  617. if (!xprt_test_and_set_connected(xprt)) {
  618. /* Reset TCP record info */
  619. xprt->tcp_offset = 0;
  620. xprt->tcp_reclen = 0;
  621. xprt->tcp_copied = 0;
  622. xprt->tcp_flags = XPRT_COPY_RECM | XPRT_COPY_XID;
  623. xprt_wake_pending_tasks(xprt, 0);
  624. }
  625. spin_unlock_bh(&xprt->transport_lock);
  626. break;
  627. case TCP_SYN_SENT:
  628. case TCP_SYN_RECV:
  629. break;
  630. default:
  631. xprt_disconnect(xprt);
  632. break;
  633. }
  634. out:
  635. read_unlock(&sk->sk_callback_lock);
  636. }
  637. /**
  638. * xs_write_space - callback invoked when socket buffer space becomes
  639. * available
  640. * @sk: socket whose state has changed
  641. *
  642. * Called when more output buffer space is available for this socket.
  643. * We try not to wake our writers until they can make "significant"
  644. * progress, otherwise we'll waste resources thrashing sock_sendmsg
  645. * with a bunch of small requests.
  646. */
  647. static void xs_write_space(struct sock *sk)
  648. {
  649. struct rpc_xprt *xprt;
  650. struct socket *sock;
  651. read_lock(&sk->sk_callback_lock);
  652. if (!(xprt = xprt_from_sock(sk)) || !(sock = sk->sk_socket))
  653. goto out;
  654. if (xprt->shutdown)
  655. goto out;
  656. /* Wait until we have enough socket memory */
  657. if (xprt->stream) {
  658. /* from net/core/stream.c:sk_stream_write_space */
  659. if (sk_stream_wspace(sk) < sk_stream_min_wspace(sk))
  660. goto out;
  661. } else {
  662. /* from net/core/sock.c:sock_def_write_space */
  663. if (!sock_writeable(sk))
  664. goto out;
  665. }
  666. if (!test_and_clear_bit(SOCK_NOSPACE, &sock->flags))
  667. goto out;
  668. spin_lock_bh(&xprt->transport_lock);
  669. if (xprt->snd_task)
  670. rpc_wake_up_task(xprt->snd_task);
  671. spin_unlock_bh(&xprt->transport_lock);
  672. out:
  673. read_unlock(&sk->sk_callback_lock);
  674. }
  675. /**
  676. * xs_set_buffer_size - set send and receive limits
  677. * @xprt: generic transport
  678. *
  679. * Set socket send and receive limits based on the
  680. * sndsize and rcvsize fields in the generic transport
  681. * structure. This applies only to UDP sockets.
  682. */
  683. static void xs_set_buffer_size(struct rpc_xprt *xprt)
  684. {
  685. struct sock *sk = xprt->inet;
  686. if (xprt->stream)
  687. return;
  688. if (xprt->rcvsize) {
  689. sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
  690. sk->sk_rcvbuf = xprt->rcvsize * xprt->max_reqs * 2;
  691. }
  692. if (xprt->sndsize) {
  693. sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
  694. sk->sk_sndbuf = xprt->sndsize * xprt->max_reqs * 2;
  695. sk->sk_write_space(sk);
  696. }
  697. }
  698. static int xs_bindresvport(struct rpc_xprt *xprt, struct socket *sock)
  699. {
  700. struct sockaddr_in myaddr = {
  701. .sin_family = AF_INET,
  702. };
  703. int err, port;
  704. /* Were we already bound to a given port? Try to reuse it */
  705. port = xprt->port;
  706. do {
  707. myaddr.sin_port = htons(port);
  708. err = sock->ops->bind(sock, (struct sockaddr *) &myaddr,
  709. sizeof(myaddr));
  710. if (err == 0) {
  711. xprt->port = port;
  712. dprintk("RPC: xs_bindresvport bound to port %u\n",
  713. port);
  714. return 0;
  715. }
  716. if (--port == 0)
  717. port = XS_MAX_RESVPORT;
  718. } while (err == -EADDRINUSE && port != xprt->port);
  719. dprintk("RPC: can't bind to reserved port (%d).\n", -err);
  720. return err;
  721. }
  722. static struct socket *xs_create(struct rpc_xprt *xprt, int proto, int resvport)
  723. {
  724. struct socket *sock;
  725. int type, err;
  726. dprintk("RPC: xs_create(%s %d)\n",
  727. (proto == IPPROTO_UDP)? "udp" : "tcp", proto);
  728. type = (proto == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
  729. if ((err = sock_create_kern(PF_INET, type, proto, &sock)) < 0) {
  730. dprintk("RPC: can't create socket (%d).\n", -err);
  731. return NULL;
  732. }
  733. /* If the caller has the capability, bind to a reserved port */
  734. if (resvport && xs_bindresvport(xprt, sock) < 0)
  735. goto failed;
  736. return sock;
  737. failed:
  738. sock_release(sock);
  739. return NULL;
  740. }
  741. static void xs_bind(struct rpc_xprt *xprt, struct socket *sock)
  742. {
  743. struct sock *sk = sock->sk;
  744. if (xprt->inet)
  745. return;
  746. write_lock_bh(&sk->sk_callback_lock);
  747. sk->sk_user_data = xprt;
  748. xprt->old_data_ready = sk->sk_data_ready;
  749. xprt->old_state_change = sk->sk_state_change;
  750. xprt->old_write_space = sk->sk_write_space;
  751. if (xprt->prot == IPPROTO_UDP) {
  752. sk->sk_data_ready = xs_udp_data_ready;
  753. sk->sk_no_check = UDP_CSUM_NORCV;
  754. xprt_set_connected(xprt);
  755. } else {
  756. tcp_sk(sk)->nonagle = 1; /* disable Nagle's algorithm */
  757. sk->sk_data_ready = xs_tcp_data_ready;
  758. sk->sk_state_change = xs_tcp_state_change;
  759. xprt_clear_connected(xprt);
  760. }
  761. sk->sk_write_space = xs_write_space;
  762. /* Reset to new socket */
  763. xprt->sock = sock;
  764. xprt->inet = sk;
  765. write_unlock_bh(&sk->sk_callback_lock);
  766. return;
  767. }
  768. /**
  769. * xs_connect_worker - try to connect a socket to a remote endpoint
  770. * @args: RPC transport to connect
  771. *
  772. * Invoked by a work queue tasklet.
  773. */
  774. static void xs_connect_worker(void *args)
  775. {
  776. struct rpc_xprt *xprt = (struct rpc_xprt *)args;
  777. struct socket *sock = xprt->sock;
  778. int status = -EIO;
  779. if (xprt->shutdown || xprt->addr.sin_port == 0)
  780. goto out;
  781. dprintk("RPC: xs_connect_worker xprt %p\n", xprt);
  782. /*
  783. * Start by resetting any existing state
  784. */
  785. xs_close(xprt);
  786. sock = xs_create(xprt, xprt->prot, xprt->resvport);
  787. if (sock == NULL) {
  788. /* couldn't create socket or bind to reserved port;
  789. * this is likely a permanent error, so cause an abort */
  790. goto out;
  791. }
  792. xs_bind(xprt, sock);
  793. xs_set_buffer_size(xprt);
  794. status = 0;
  795. if (!xprt->stream)
  796. goto out;
  797. /*
  798. * Tell the socket layer to start connecting...
  799. */
  800. status = sock->ops->connect(sock, (struct sockaddr *) &xprt->addr,
  801. sizeof(xprt->addr), O_NONBLOCK);
  802. dprintk("RPC: %p connect status %d connected %d sock state %d\n",
  803. xprt, -status, xprt_connected(xprt), sock->sk->sk_state);
  804. if (status < 0) {
  805. switch (status) {
  806. case -EINPROGRESS:
  807. case -EALREADY:
  808. goto out_clear;
  809. }
  810. }
  811. out:
  812. xprt_wake_pending_tasks(xprt, status);
  813. out_clear:
  814. xprt_clear_connecting(xprt);
  815. }
  816. /**
  817. * xs_connect - connect a socket to a remote endpoint
  818. * @task: address of RPC task that manages state of connect request
  819. *
  820. * TCP: If the remote end dropped the connection, delay reconnecting.
  821. */
  822. static void xs_connect(struct rpc_task *task)
  823. {
  824. struct rpc_xprt *xprt = task->tk_xprt;
  825. if (!xprt_test_and_set_connecting(xprt)) {
  826. if (xprt->sock != NULL) {
  827. dprintk("RPC: xs_connect delayed xprt %p\n", xprt);
  828. schedule_delayed_work(&xprt->connect_worker,
  829. RPC_REESTABLISH_TIMEOUT);
  830. } else {
  831. dprintk("RPC: xs_connect scheduled xprt %p\n", xprt);
  832. schedule_work(&xprt->connect_worker);
  833. /* flush_scheduled_work can sleep... */
  834. if (!RPC_IS_ASYNC(task))
  835. flush_scheduled_work();
  836. }
  837. }
  838. }
  839. static struct rpc_xprt_ops xs_ops = {
  840. .set_buffer_size = xs_set_buffer_size,
  841. .connect = xs_connect,
  842. .send_request = xs_send_request,
  843. .close = xs_close,
  844. .destroy = xs_destroy,
  845. };
  846. extern unsigned int xprt_udp_slot_table_entries;
  847. extern unsigned int xprt_tcp_slot_table_entries;
  848. /**
  849. * xs_setup_udp - Set up transport to use a UDP socket
  850. * @xprt: transport to set up
  851. * @to: timeout parameters
  852. *
  853. */
  854. int xs_setup_udp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  855. {
  856. size_t slot_table_size;
  857. dprintk("RPC: setting up udp-ipv4 transport...\n");
  858. xprt->max_reqs = xprt_udp_slot_table_entries;
  859. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  860. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  861. if (xprt->slot == NULL)
  862. return -ENOMEM;
  863. memset(xprt->slot, 0, slot_table_size);
  864. xprt->prot = IPPROTO_UDP;
  865. xprt->port = XS_MAX_RESVPORT;
  866. xprt->stream = 0;
  867. xprt->nocong = 0;
  868. xprt->cwnd = RPC_INITCWND;
  869. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  870. /* XXX: header size can vary due to auth type, IPv6, etc. */
  871. xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
  872. INIT_WORK(&xprt->connect_worker, xs_connect_worker, xprt);
  873. xprt->ops = &xs_ops;
  874. if (to)
  875. xprt->timeout = *to;
  876. else
  877. xprt_set_timeout(&xprt->timeout, 5, 5 * HZ);
  878. return 0;
  879. }
  880. /**
  881. * xs_setup_tcp - Set up transport to use a TCP socket
  882. * @xprt: transport to set up
  883. * @to: timeout parameters
  884. *
  885. */
  886. int xs_setup_tcp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  887. {
  888. size_t slot_table_size;
  889. dprintk("RPC: setting up tcp-ipv4 transport...\n");
  890. xprt->max_reqs = xprt_tcp_slot_table_entries;
  891. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  892. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  893. if (xprt->slot == NULL)
  894. return -ENOMEM;
  895. memset(xprt->slot, 0, slot_table_size);
  896. xprt->prot = IPPROTO_TCP;
  897. xprt->port = XS_MAX_RESVPORT;
  898. xprt->stream = 1;
  899. xprt->nocong = 1;
  900. xprt->cwnd = RPC_MAXCWND(xprt);
  901. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  902. xprt->max_payload = (1U << 31) - 1;
  903. INIT_WORK(&xprt->connect_worker, xs_connect_worker, xprt);
  904. xprt->ops = &xs_ops;
  905. if (to)
  906. xprt->timeout = *to;
  907. else
  908. xprt_set_timeout(&xprt->timeout, 2, 60 * HZ);
  909. return 0;
  910. }