xprtsock.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046
  1. /*
  2. * linux/net/sunrpc/xprtsock.c
  3. *
  4. * Client-side transport implementation for sockets.
  5. *
  6. * TCP callback races fixes (C) 1998 Red Hat Software <alan@redhat.com>
  7. * TCP send fixes (C) 1998 Red Hat Software <alan@redhat.com>
  8. * TCP NFS related read + write fixes
  9. * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
  10. *
  11. * Rewrite of larges part of the code in order to stabilize TCP stuff.
  12. * Fix behaviour when socket buffer is full.
  13. * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
  14. */
  15. #include <linux/types.h>
  16. #include <linux/slab.h>
  17. #include <linux/capability.h>
  18. #include <linux/sched.h>
  19. #include <linux/pagemap.h>
  20. #include <linux/errno.h>
  21. #include <linux/socket.h>
  22. #include <linux/in.h>
  23. #include <linux/net.h>
  24. #include <linux/mm.h>
  25. #include <linux/udp.h>
  26. #include <linux/tcp.h>
  27. #include <linux/sunrpc/clnt.h>
  28. #include <linux/file.h>
  29. #include <net/sock.h>
  30. #include <net/checksum.h>
  31. #include <net/udp.h>
  32. #include <net/tcp.h>
  33. /*
  34. * Maximum port number to use when requesting a reserved port.
  35. */
  36. #define XS_MAX_RESVPORT (800U)
  37. #ifdef RPC_DEBUG
  38. # undef RPC_DEBUG_DATA
  39. # define RPCDBG_FACILITY RPCDBG_TRANS
  40. #endif
  41. #ifdef RPC_DEBUG_DATA
  42. static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  43. {
  44. u8 *buf = (u8 *) packet;
  45. int j;
  46. dprintk("RPC: %s\n", msg);
  47. for (j = 0; j < count && j < 128; j += 4) {
  48. if (!(j & 31)) {
  49. if (j)
  50. dprintk("\n");
  51. dprintk("0x%04x ", j);
  52. }
  53. dprintk("%02x%02x%02x%02x ",
  54. buf[j], buf[j+1], buf[j+2], buf[j+3]);
  55. }
  56. dprintk("\n");
  57. }
  58. #else
  59. static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  60. {
  61. /* NOP */
  62. }
  63. #endif
  64. #define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL)
  65. static inline int xs_send_head(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  66. {
  67. struct kvec iov = {
  68. .iov_base = xdr->head[0].iov_base + base,
  69. .iov_len = len - base,
  70. };
  71. struct msghdr msg = {
  72. .msg_name = addr,
  73. .msg_namelen = addrlen,
  74. .msg_flags = XS_SENDMSG_FLAGS,
  75. };
  76. if (xdr->len > len)
  77. msg.msg_flags |= MSG_MORE;
  78. if (likely(iov.iov_len))
  79. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  80. return kernel_sendmsg(sock, &msg, NULL, 0, 0);
  81. }
  82. static int xs_send_tail(struct socket *sock, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  83. {
  84. struct kvec iov = {
  85. .iov_base = xdr->tail[0].iov_base + base,
  86. .iov_len = len - base,
  87. };
  88. struct msghdr msg = {
  89. .msg_flags = XS_SENDMSG_FLAGS,
  90. };
  91. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  92. }
  93. /**
  94. * xs_sendpages - write pages directly to a socket
  95. * @sock: socket to send on
  96. * @addr: UDP only -- address of destination
  97. * @addrlen: UDP only -- length of destination address
  98. * @xdr: buffer containing this request
  99. * @base: starting position in the buffer
  100. *
  101. */
  102. static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
  103. {
  104. struct page **ppage = xdr->pages;
  105. unsigned int len, pglen = xdr->page_len;
  106. int err, ret = 0;
  107. ssize_t (*sendpage)(struct socket *, struct page *, int, size_t, int);
  108. len = xdr->head[0].iov_len;
  109. if (base < len || (addr != NULL && base == 0)) {
  110. err = xs_send_head(sock, addr, addrlen, xdr, base, len);
  111. if (ret == 0)
  112. ret = err;
  113. else if (err > 0)
  114. ret += err;
  115. if (err != (len - base))
  116. goto out;
  117. base = 0;
  118. } else
  119. base -= len;
  120. if (unlikely(pglen == 0))
  121. goto copy_tail;
  122. if (unlikely(base >= pglen)) {
  123. base -= pglen;
  124. goto copy_tail;
  125. }
  126. if (base || xdr->page_base) {
  127. pglen -= base;
  128. base += xdr->page_base;
  129. ppage += base >> PAGE_CACHE_SHIFT;
  130. base &= ~PAGE_CACHE_MASK;
  131. }
  132. sendpage = sock->ops->sendpage ? : sock_no_sendpage;
  133. do {
  134. int flags = XS_SENDMSG_FLAGS;
  135. len = PAGE_CACHE_SIZE;
  136. if (base)
  137. len -= base;
  138. if (pglen < len)
  139. len = pglen;
  140. if (pglen != len || xdr->tail[0].iov_len != 0)
  141. flags |= MSG_MORE;
  142. /* Hmm... We might be dealing with highmem pages */
  143. if (PageHighMem(*ppage))
  144. sendpage = sock_no_sendpage;
  145. err = sendpage(sock, *ppage, base, len, flags);
  146. if (ret == 0)
  147. ret = err;
  148. else if (err > 0)
  149. ret += err;
  150. if (err != len)
  151. goto out;
  152. base = 0;
  153. ppage++;
  154. } while ((pglen -= len) != 0);
  155. copy_tail:
  156. len = xdr->tail[0].iov_len;
  157. if (base < len) {
  158. err = xs_send_tail(sock, xdr, base, len);
  159. if (ret == 0)
  160. ret = err;
  161. else if (err > 0)
  162. ret += err;
  163. }
  164. out:
  165. return ret;
  166. }
  167. /**
  168. * xs_sendmsg - write an RPC request to a socket
  169. * @xprt: generic transport
  170. * @req: the RPC request to write
  171. *
  172. */
  173. static int xs_sendmsg(struct rpc_xprt *xprt, struct rpc_rqst *req)
  174. {
  175. struct socket *sock = xprt->sock;
  176. struct xdr_buf *xdr = &req->rq_snd_buf;
  177. struct sockaddr *addr = NULL;
  178. int addrlen = 0;
  179. unsigned int skip;
  180. int result;
  181. if (!sock)
  182. return -ENOTCONN;
  183. xs_pktdump("packet data:",
  184. req->rq_svec->iov_base,
  185. req->rq_svec->iov_len);
  186. /* For UDP, we need to provide an address */
  187. if (!xprt->stream) {
  188. addr = (struct sockaddr *) &xprt->addr;
  189. addrlen = sizeof(xprt->addr);
  190. }
  191. /* Don't repeat bytes */
  192. skip = req->rq_bytes_sent;
  193. clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
  194. result = xs_sendpages(sock, addr, addrlen, xdr, skip);
  195. dprintk("RPC: xs_sendmsg(%d) = %d\n", xdr->len - skip, result);
  196. if (result >= 0)
  197. return result;
  198. switch (result) {
  199. case -ECONNREFUSED:
  200. /* When the server has died, an ICMP port unreachable message
  201. * prompts ECONNREFUSED. */
  202. case -EAGAIN:
  203. break;
  204. case -ECONNRESET:
  205. case -ENOTCONN:
  206. case -EPIPE:
  207. /* connection broken */
  208. if (xprt->stream)
  209. result = -ENOTCONN;
  210. break;
  211. default:
  212. break;
  213. }
  214. return result;
  215. }
  216. /**
  217. * xs_send_request - write an RPC request to a socket
  218. * @task: address of RPC task that manages the state of an RPC request
  219. *
  220. * Return values:
  221. * 0: The request has been sent
  222. * EAGAIN: The socket was blocked, please call again later to
  223. * complete the request
  224. * other: Some other error occured, the request was not sent
  225. *
  226. * XXX: In the case of soft timeouts, should we eventually give up
  227. * if the socket is not able to make progress?
  228. */
  229. static int xs_send_request(struct rpc_task *task)
  230. {
  231. struct rpc_rqst *req = task->tk_rqstp;
  232. struct rpc_xprt *xprt = req->rq_xprt;
  233. int status, retry = 0;
  234. /* set up everything as needed. */
  235. /* Write the record marker */
  236. if (xprt->stream) {
  237. u32 *marker = req->rq_svec[0].iov_base;
  238. *marker = htonl(0x80000000|(req->rq_slen-sizeof(*marker)));
  239. }
  240. /* Continue transmitting the packet/record. We must be careful
  241. * to cope with writespace callbacks arriving _after_ we have
  242. * called sendmsg().
  243. */
  244. while (1) {
  245. req->rq_xtime = jiffies;
  246. status = xs_sendmsg(xprt, req);
  247. if (status < 0)
  248. break;
  249. if (xprt->stream) {
  250. req->rq_bytes_sent += status;
  251. /* If we've sent the entire packet, immediately
  252. * reset the count of bytes sent. */
  253. if (req->rq_bytes_sent >= req->rq_slen) {
  254. req->rq_bytes_sent = 0;
  255. return 0;
  256. }
  257. } else {
  258. if (status >= req->rq_slen)
  259. return 0;
  260. status = -EAGAIN;
  261. break;
  262. }
  263. dprintk("RPC: %4d xmit incomplete (%d left of %d)\n",
  264. task->tk_pid, req->rq_slen - req->rq_bytes_sent,
  265. req->rq_slen);
  266. status = -EAGAIN;
  267. if (retry++ > 50)
  268. break;
  269. }
  270. if (status == -EAGAIN) {
  271. if (test_bit(SOCK_ASYNC_NOSPACE, &xprt->sock->flags)) {
  272. /* Protect against races with xs_write_space */
  273. spin_lock_bh(&xprt->sock_lock);
  274. /* Don't race with disconnect */
  275. if (!xprt_connected(xprt))
  276. task->tk_status = -ENOTCONN;
  277. else if (test_bit(SOCK_NOSPACE, &xprt->sock->flags)) {
  278. task->tk_timeout = req->rq_timeout;
  279. rpc_sleep_on(&xprt->pending, task, NULL, NULL);
  280. }
  281. spin_unlock_bh(&xprt->sock_lock);
  282. return status;
  283. }
  284. /* Keep holding the socket if it is blocked */
  285. rpc_delay(task, HZ>>4);
  286. }
  287. return status;
  288. }
  289. /**
  290. * xs_close - close a socket
  291. * @xprt: transport
  292. *
  293. */
  294. static void xs_close(struct rpc_xprt *xprt)
  295. {
  296. struct socket *sock = xprt->sock;
  297. struct sock *sk = xprt->inet;
  298. if (!sk)
  299. return;
  300. dprintk("RPC: xs_close xprt %p\n", xprt);
  301. write_lock_bh(&sk->sk_callback_lock);
  302. xprt->inet = NULL;
  303. xprt->sock = NULL;
  304. sk->sk_user_data = NULL;
  305. sk->sk_data_ready = xprt->old_data_ready;
  306. sk->sk_state_change = xprt->old_state_change;
  307. sk->sk_write_space = xprt->old_write_space;
  308. write_unlock_bh(&sk->sk_callback_lock);
  309. sk->sk_no_check = 0;
  310. sock_release(sock);
  311. }
  312. /**
  313. * xs_destroy - prepare to shutdown a transport
  314. * @xprt: doomed transport
  315. *
  316. */
  317. static void xs_destroy(struct rpc_xprt *xprt)
  318. {
  319. dprintk("RPC: xs_destroy xprt %p\n", xprt);
  320. cancel_delayed_work(&xprt->sock_connect);
  321. flush_scheduled_work();
  322. xprt_disconnect(xprt);
  323. xs_close(xprt);
  324. kfree(xprt->slot);
  325. }
  326. static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
  327. {
  328. return (struct rpc_xprt *) sk->sk_user_data;
  329. }
  330. /**
  331. * xs_udp_data_ready - "data ready" callback for UDP sockets
  332. * @sk: socket with data to read
  333. * @len: how much data to read
  334. *
  335. */
  336. static void xs_udp_data_ready(struct sock *sk, int len)
  337. {
  338. struct rpc_task *task;
  339. struct rpc_xprt *xprt;
  340. struct rpc_rqst *rovr;
  341. struct sk_buff *skb;
  342. int err, repsize, copied;
  343. u32 _xid, *xp;
  344. read_lock(&sk->sk_callback_lock);
  345. dprintk("RPC: xs_udp_data_ready...\n");
  346. if (!(xprt = xprt_from_sock(sk)))
  347. goto out;
  348. if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
  349. goto out;
  350. if (xprt->shutdown)
  351. goto dropit;
  352. repsize = skb->len - sizeof(struct udphdr);
  353. if (repsize < 4) {
  354. dprintk("RPC: impossible RPC reply size %d!\n", repsize);
  355. goto dropit;
  356. }
  357. /* Copy the XID from the skb... */
  358. xp = skb_header_pointer(skb, sizeof(struct udphdr),
  359. sizeof(_xid), &_xid);
  360. if (xp == NULL)
  361. goto dropit;
  362. /* Look up and lock the request corresponding to the given XID */
  363. spin_lock(&xprt->sock_lock);
  364. rovr = xprt_lookup_rqst(xprt, *xp);
  365. if (!rovr)
  366. goto out_unlock;
  367. task = rovr->rq_task;
  368. dprintk("RPC: %4d received reply\n", task->tk_pid);
  369. if ((copied = rovr->rq_private_buf.buflen) > repsize)
  370. copied = repsize;
  371. /* Suck it into the iovec, verify checksum if not done by hw. */
  372. if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb))
  373. goto out_unlock;
  374. /* Something worked... */
  375. dst_confirm(skb->dst);
  376. xprt_complete_rqst(xprt, rovr, copied);
  377. out_unlock:
  378. spin_unlock(&xprt->sock_lock);
  379. dropit:
  380. skb_free_datagram(sk, skb);
  381. out:
  382. read_unlock(&sk->sk_callback_lock);
  383. }
  384. static inline size_t xs_tcp_copy_data(skb_reader_t *desc, void *p, size_t len)
  385. {
  386. if (len > desc->count)
  387. len = desc->count;
  388. if (skb_copy_bits(desc->skb, desc->offset, p, len)) {
  389. dprintk("RPC: failed to copy %zu bytes from skb. %zu bytes remain\n",
  390. len, desc->count);
  391. return 0;
  392. }
  393. desc->offset += len;
  394. desc->count -= len;
  395. dprintk("RPC: copied %zu bytes from skb. %zu bytes remain\n",
  396. len, desc->count);
  397. return len;
  398. }
  399. static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, skb_reader_t *desc)
  400. {
  401. size_t len, used;
  402. char *p;
  403. p = ((char *) &xprt->tcp_recm) + xprt->tcp_offset;
  404. len = sizeof(xprt->tcp_recm) - xprt->tcp_offset;
  405. used = xs_tcp_copy_data(desc, p, len);
  406. xprt->tcp_offset += used;
  407. if (used != len)
  408. return;
  409. xprt->tcp_reclen = ntohl(xprt->tcp_recm);
  410. if (xprt->tcp_reclen & 0x80000000)
  411. xprt->tcp_flags |= XPRT_LAST_FRAG;
  412. else
  413. xprt->tcp_flags &= ~XPRT_LAST_FRAG;
  414. xprt->tcp_reclen &= 0x7fffffff;
  415. xprt->tcp_flags &= ~XPRT_COPY_RECM;
  416. xprt->tcp_offset = 0;
  417. /* Sanity check of the record length */
  418. if (xprt->tcp_reclen < 4) {
  419. dprintk("RPC: invalid TCP record fragment length\n");
  420. xprt_disconnect(xprt);
  421. return;
  422. }
  423. dprintk("RPC: reading TCP record fragment of length %d\n",
  424. xprt->tcp_reclen);
  425. }
  426. static void xs_tcp_check_recm(struct rpc_xprt *xprt)
  427. {
  428. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u, tcp_flags = %lx\n",
  429. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen, xprt->tcp_flags);
  430. if (xprt->tcp_offset == xprt->tcp_reclen) {
  431. xprt->tcp_flags |= XPRT_COPY_RECM;
  432. xprt->tcp_offset = 0;
  433. if (xprt->tcp_flags & XPRT_LAST_FRAG) {
  434. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  435. xprt->tcp_flags |= XPRT_COPY_XID;
  436. xprt->tcp_copied = 0;
  437. }
  438. }
  439. }
  440. static inline void xs_tcp_read_xid(struct rpc_xprt *xprt, skb_reader_t *desc)
  441. {
  442. size_t len, used;
  443. char *p;
  444. len = sizeof(xprt->tcp_xid) - xprt->tcp_offset;
  445. dprintk("RPC: reading XID (%Zu bytes)\n", len);
  446. p = ((char *) &xprt->tcp_xid) + xprt->tcp_offset;
  447. used = xs_tcp_copy_data(desc, p, len);
  448. xprt->tcp_offset += used;
  449. if (used != len)
  450. return;
  451. xprt->tcp_flags &= ~XPRT_COPY_XID;
  452. xprt->tcp_flags |= XPRT_COPY_DATA;
  453. xprt->tcp_copied = 4;
  454. dprintk("RPC: reading reply for XID %08x\n",
  455. ntohl(xprt->tcp_xid));
  456. xs_tcp_check_recm(xprt);
  457. }
  458. static inline void xs_tcp_read_request(struct rpc_xprt *xprt, skb_reader_t *desc)
  459. {
  460. struct rpc_rqst *req;
  461. struct xdr_buf *rcvbuf;
  462. size_t len;
  463. ssize_t r;
  464. /* Find and lock the request corresponding to this xid */
  465. spin_lock(&xprt->sock_lock);
  466. req = xprt_lookup_rqst(xprt, xprt->tcp_xid);
  467. if (!req) {
  468. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  469. dprintk("RPC: XID %08x request not found!\n",
  470. ntohl(xprt->tcp_xid));
  471. spin_unlock(&xprt->sock_lock);
  472. return;
  473. }
  474. rcvbuf = &req->rq_private_buf;
  475. len = desc->count;
  476. if (len > xprt->tcp_reclen - xprt->tcp_offset) {
  477. skb_reader_t my_desc;
  478. len = xprt->tcp_reclen - xprt->tcp_offset;
  479. memcpy(&my_desc, desc, sizeof(my_desc));
  480. my_desc.count = len;
  481. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  482. &my_desc, xs_tcp_copy_data);
  483. desc->count -= r;
  484. desc->offset += r;
  485. } else
  486. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  487. desc, xs_tcp_copy_data);
  488. if (r > 0) {
  489. xprt->tcp_copied += r;
  490. xprt->tcp_offset += r;
  491. }
  492. if (r != len) {
  493. /* Error when copying to the receive buffer,
  494. * usually because we weren't able to allocate
  495. * additional buffer pages. All we can do now
  496. * is turn off XPRT_COPY_DATA, so the request
  497. * will not receive any additional updates,
  498. * and time out.
  499. * Any remaining data from this record will
  500. * be discarded.
  501. */
  502. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  503. dprintk("RPC: XID %08x truncated request\n",
  504. ntohl(xprt->tcp_xid));
  505. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  506. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  507. goto out;
  508. }
  509. dprintk("RPC: XID %08x read %Zd bytes\n",
  510. ntohl(xprt->tcp_xid), r);
  511. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  512. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  513. if (xprt->tcp_copied == req->rq_private_buf.buflen)
  514. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  515. else if (xprt->tcp_offset == xprt->tcp_reclen) {
  516. if (xprt->tcp_flags & XPRT_LAST_FRAG)
  517. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  518. }
  519. out:
  520. if (!(xprt->tcp_flags & XPRT_COPY_DATA)) {
  521. dprintk("RPC: %4d received reply complete\n",
  522. req->rq_task->tk_pid);
  523. xprt_complete_rqst(xprt, req, xprt->tcp_copied);
  524. }
  525. spin_unlock(&xprt->sock_lock);
  526. xs_tcp_check_recm(xprt);
  527. }
  528. static inline void xs_tcp_read_discard(struct rpc_xprt *xprt, skb_reader_t *desc)
  529. {
  530. size_t len;
  531. len = xprt->tcp_reclen - xprt->tcp_offset;
  532. if (len > desc->count)
  533. len = desc->count;
  534. desc->count -= len;
  535. desc->offset += len;
  536. xprt->tcp_offset += len;
  537. dprintk("RPC: discarded %Zu bytes\n", len);
  538. xs_tcp_check_recm(xprt);
  539. }
  540. static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
  541. {
  542. struct rpc_xprt *xprt = rd_desc->arg.data;
  543. skb_reader_t desc = {
  544. .skb = skb,
  545. .offset = offset,
  546. .count = len,
  547. .csum = 0
  548. };
  549. dprintk("RPC: xs_tcp_data_recv started\n");
  550. do {
  551. /* Read in a new fragment marker if necessary */
  552. /* Can we ever really expect to get completely empty fragments? */
  553. if (xprt->tcp_flags & XPRT_COPY_RECM) {
  554. xs_tcp_read_fraghdr(xprt, &desc);
  555. continue;
  556. }
  557. /* Read in the xid if necessary */
  558. if (xprt->tcp_flags & XPRT_COPY_XID) {
  559. xs_tcp_read_xid(xprt, &desc);
  560. continue;
  561. }
  562. /* Read in the request data */
  563. if (xprt->tcp_flags & XPRT_COPY_DATA) {
  564. xs_tcp_read_request(xprt, &desc);
  565. continue;
  566. }
  567. /* Skip over any trailing bytes on short reads */
  568. xs_tcp_read_discard(xprt, &desc);
  569. } while (desc.count);
  570. dprintk("RPC: xs_tcp_data_recv done\n");
  571. return len - desc.count;
  572. }
  573. /**
  574. * xs_tcp_data_ready - "data ready" callback for TCP sockets
  575. * @sk: socket with data to read
  576. * @bytes: how much data to read
  577. *
  578. */
  579. static void xs_tcp_data_ready(struct sock *sk, int bytes)
  580. {
  581. struct rpc_xprt *xprt;
  582. read_descriptor_t rd_desc;
  583. read_lock(&sk->sk_callback_lock);
  584. dprintk("RPC: xs_tcp_data_ready...\n");
  585. if (!(xprt = xprt_from_sock(sk)))
  586. goto out;
  587. if (xprt->shutdown)
  588. goto out;
  589. /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
  590. rd_desc.arg.data = xprt;
  591. rd_desc.count = 65536;
  592. tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
  593. out:
  594. read_unlock(&sk->sk_callback_lock);
  595. }
  596. /**
  597. * xs_tcp_state_change - callback to handle TCP socket state changes
  598. * @sk: socket whose state has changed
  599. *
  600. */
  601. static void xs_tcp_state_change(struct sock *sk)
  602. {
  603. struct rpc_xprt *xprt;
  604. read_lock(&sk->sk_callback_lock);
  605. if (!(xprt = xprt_from_sock(sk)))
  606. goto out;
  607. dprintk("RPC: xs_tcp_state_change client %p...\n", xprt);
  608. dprintk("RPC: state %x conn %d dead %d zapped %d\n",
  609. sk->sk_state, xprt_connected(xprt),
  610. sock_flag(sk, SOCK_DEAD),
  611. sock_flag(sk, SOCK_ZAPPED));
  612. switch (sk->sk_state) {
  613. case TCP_ESTABLISHED:
  614. spin_lock_bh(&xprt->sock_lock);
  615. if (!xprt_test_and_set_connected(xprt)) {
  616. /* Reset TCP record info */
  617. xprt->tcp_offset = 0;
  618. xprt->tcp_reclen = 0;
  619. xprt->tcp_copied = 0;
  620. xprt->tcp_flags = XPRT_COPY_RECM | XPRT_COPY_XID;
  621. rpc_wake_up(&xprt->pending);
  622. }
  623. spin_unlock_bh(&xprt->sock_lock);
  624. break;
  625. case TCP_SYN_SENT:
  626. case TCP_SYN_RECV:
  627. break;
  628. default:
  629. xprt_disconnect(xprt);
  630. break;
  631. }
  632. out:
  633. read_unlock(&sk->sk_callback_lock);
  634. }
  635. /**
  636. * xs_write_space - callback invoked when socket buffer space becomes
  637. * available
  638. * @sk: socket whose state has changed
  639. *
  640. * Called when more output buffer space is available for this socket.
  641. * We try not to wake our writers until they can make "significant"
  642. * progress, otherwise we'll waste resources thrashing sock_sendmsg
  643. * with a bunch of small requests.
  644. */
  645. static void xs_write_space(struct sock *sk)
  646. {
  647. struct rpc_xprt *xprt;
  648. struct socket *sock;
  649. read_lock(&sk->sk_callback_lock);
  650. if (!(xprt = xprt_from_sock(sk)) || !(sock = sk->sk_socket))
  651. goto out;
  652. if (xprt->shutdown)
  653. goto out;
  654. /* Wait until we have enough socket memory */
  655. if (xprt->stream) {
  656. /* from net/core/stream.c:sk_stream_write_space */
  657. if (sk_stream_wspace(sk) < sk_stream_min_wspace(sk))
  658. goto out;
  659. } else {
  660. /* from net/core/sock.c:sock_def_write_space */
  661. if (!sock_writeable(sk))
  662. goto out;
  663. }
  664. if (!test_and_clear_bit(SOCK_NOSPACE, &sock->flags))
  665. goto out;
  666. spin_lock_bh(&xprt->sock_lock);
  667. if (xprt->snd_task)
  668. rpc_wake_up_task(xprt->snd_task);
  669. spin_unlock_bh(&xprt->sock_lock);
  670. out:
  671. read_unlock(&sk->sk_callback_lock);
  672. }
  673. /**
  674. * xs_set_buffer_size - set send and receive limits
  675. * @xprt: generic transport
  676. *
  677. * Set socket send and receive limits based on the
  678. * sndsize and rcvsize fields in the generic transport
  679. * structure. This applies only to UDP sockets.
  680. */
  681. static void xs_set_buffer_size(struct rpc_xprt *xprt)
  682. {
  683. struct sock *sk = xprt->inet;
  684. if (xprt->stream)
  685. return;
  686. if (xprt->rcvsize) {
  687. sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
  688. sk->sk_rcvbuf = xprt->rcvsize * xprt->max_reqs * 2;
  689. }
  690. if (xprt->sndsize) {
  691. sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
  692. sk->sk_sndbuf = xprt->sndsize * xprt->max_reqs * 2;
  693. sk->sk_write_space(sk);
  694. }
  695. }
  696. static int xs_bindresvport(struct rpc_xprt *xprt, struct socket *sock)
  697. {
  698. struct sockaddr_in myaddr = {
  699. .sin_family = AF_INET,
  700. };
  701. int err, port;
  702. /* Were we already bound to a given port? Try to reuse it */
  703. port = xprt->port;
  704. do {
  705. myaddr.sin_port = htons(port);
  706. err = sock->ops->bind(sock, (struct sockaddr *) &myaddr,
  707. sizeof(myaddr));
  708. if (err == 0) {
  709. xprt->port = port;
  710. dprintk("RPC: xs_bindresvport bound to port %u\n",
  711. port);
  712. return 0;
  713. }
  714. if (--port == 0)
  715. port = XS_MAX_RESVPORT;
  716. } while (err == -EADDRINUSE && port != xprt->port);
  717. dprintk("RPC: can't bind to reserved port (%d).\n", -err);
  718. return err;
  719. }
  720. static struct socket *xs_create(struct rpc_xprt *xprt, int proto, int resvport)
  721. {
  722. struct socket *sock;
  723. int type, err;
  724. dprintk("RPC: xs_create(%s %d)\n",
  725. (proto == IPPROTO_UDP)? "udp" : "tcp", proto);
  726. type = (proto == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
  727. if ((err = sock_create_kern(PF_INET, type, proto, &sock)) < 0) {
  728. dprintk("RPC: can't create socket (%d).\n", -err);
  729. return NULL;
  730. }
  731. /* If the caller has the capability, bind to a reserved port */
  732. if (resvport && xs_bindresvport(xprt, sock) < 0)
  733. goto failed;
  734. return sock;
  735. failed:
  736. sock_release(sock);
  737. return NULL;
  738. }
  739. static void xs_bind(struct rpc_xprt *xprt, struct socket *sock)
  740. {
  741. struct sock *sk = sock->sk;
  742. if (xprt->inet)
  743. return;
  744. write_lock_bh(&sk->sk_callback_lock);
  745. sk->sk_user_data = xprt;
  746. xprt->old_data_ready = sk->sk_data_ready;
  747. xprt->old_state_change = sk->sk_state_change;
  748. xprt->old_write_space = sk->sk_write_space;
  749. if (xprt->prot == IPPROTO_UDP) {
  750. sk->sk_data_ready = xs_udp_data_ready;
  751. sk->sk_no_check = UDP_CSUM_NORCV;
  752. xprt_set_connected(xprt);
  753. } else {
  754. tcp_sk(sk)->nonagle = 1; /* disable Nagle's algorithm */
  755. sk->sk_data_ready = xs_tcp_data_ready;
  756. sk->sk_state_change = xs_tcp_state_change;
  757. xprt_clear_connected(xprt);
  758. }
  759. sk->sk_write_space = xs_write_space;
  760. /* Reset to new socket */
  761. xprt->sock = sock;
  762. xprt->inet = sk;
  763. write_unlock_bh(&sk->sk_callback_lock);
  764. return;
  765. }
  766. /**
  767. * xs_connect_worker - try to connect a socket to a remote endpoint
  768. * @args: RPC transport to connect
  769. *
  770. * Invoked by a work queue tasklet.
  771. */
  772. static void xs_connect_worker(void *args)
  773. {
  774. struct rpc_xprt *xprt = (struct rpc_xprt *)args;
  775. struct socket *sock = xprt->sock;
  776. int status = -EIO;
  777. if (xprt->shutdown || xprt->addr.sin_port == 0)
  778. goto out;
  779. dprintk("RPC: xs_connect_worker xprt %p\n", xprt);
  780. /*
  781. * Start by resetting any existing state
  782. */
  783. xs_close(xprt);
  784. sock = xs_create(xprt, xprt->prot, xprt->resvport);
  785. if (sock == NULL) {
  786. /* couldn't create socket or bind to reserved port;
  787. * this is likely a permanent error, so cause an abort */
  788. goto out;
  789. }
  790. xs_bind(xprt, sock);
  791. xs_set_buffer_size(xprt);
  792. status = 0;
  793. if (!xprt->stream)
  794. goto out;
  795. /*
  796. * Tell the socket layer to start connecting...
  797. */
  798. status = sock->ops->connect(sock, (struct sockaddr *) &xprt->addr,
  799. sizeof(xprt->addr), O_NONBLOCK);
  800. dprintk("RPC: %p connect status %d connected %d sock state %d\n",
  801. xprt, -status, xprt_connected(xprt), sock->sk->sk_state);
  802. if (status < 0) {
  803. switch (status) {
  804. case -EINPROGRESS:
  805. case -EALREADY:
  806. goto out_clear;
  807. }
  808. }
  809. out:
  810. if (status < 0)
  811. rpc_wake_up_status(&xprt->pending, status);
  812. else
  813. rpc_wake_up(&xprt->pending);
  814. out_clear:
  815. smp_mb__before_clear_bit();
  816. clear_bit(XPRT_CONNECTING, &xprt->sockstate);
  817. smp_mb__after_clear_bit();
  818. }
  819. /**
  820. * xs_connect - connect a socket to a remote endpoint
  821. * @task: address of RPC task that manages state of connect request
  822. *
  823. * TCP: If the remote end dropped the connection, delay reconnecting.
  824. */
  825. static void xs_connect(struct rpc_task *task)
  826. {
  827. struct rpc_xprt *xprt = task->tk_xprt;
  828. if (!test_and_set_bit(XPRT_CONNECTING, &xprt->sockstate)) {
  829. if (xprt->sock != NULL) {
  830. dprintk("RPC: xs_connect delayed xprt %p\n", xprt);
  831. schedule_delayed_work(&xprt->sock_connect,
  832. RPC_REESTABLISH_TIMEOUT);
  833. } else {
  834. dprintk("RPC: xs_connect scheduled xprt %p\n", xprt);
  835. schedule_work(&xprt->sock_connect);
  836. /* flush_scheduled_work can sleep... */
  837. if (!RPC_IS_ASYNC(task))
  838. flush_scheduled_work();
  839. }
  840. }
  841. }
  842. static struct rpc_xprt_ops xs_ops = {
  843. .set_buffer_size = xs_set_buffer_size,
  844. .connect = xs_connect,
  845. .send_request = xs_send_request,
  846. .close = xs_close,
  847. .destroy = xs_destroy,
  848. };
  849. extern unsigned int xprt_udp_slot_table_entries;
  850. extern unsigned int xprt_tcp_slot_table_entries;
  851. /**
  852. * xs_setup_udp - Set up transport to use a UDP socket
  853. * @xprt: transport to set up
  854. * @to: timeout parameters
  855. *
  856. */
  857. int xs_setup_udp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  858. {
  859. size_t slot_table_size;
  860. dprintk("RPC: setting up udp-ipv4 transport...\n");
  861. xprt->max_reqs = xprt_udp_slot_table_entries;
  862. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  863. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  864. if (xprt->slot == NULL)
  865. return -ENOMEM;
  866. memset(xprt->slot, 0, slot_table_size);
  867. xprt->prot = IPPROTO_UDP;
  868. xprt->port = XS_MAX_RESVPORT;
  869. xprt->stream = 0;
  870. xprt->nocong = 0;
  871. xprt->cwnd = RPC_INITCWND;
  872. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  873. /* XXX: header size can vary due to auth type, IPv6, etc. */
  874. xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
  875. INIT_WORK(&xprt->sock_connect, xs_connect_worker, xprt);
  876. xprt->ops = &xs_ops;
  877. if (to)
  878. xprt->timeout = *to;
  879. else
  880. xprt_set_timeout(&xprt->timeout, 5, 5 * HZ);
  881. return 0;
  882. }
  883. /**
  884. * xs_setup_tcp - Set up transport to use a TCP socket
  885. * @xprt: transport to set up
  886. * @to: timeout parameters
  887. *
  888. */
  889. int xs_setup_tcp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  890. {
  891. size_t slot_table_size;
  892. dprintk("RPC: setting up tcp-ipv4 transport...\n");
  893. xprt->max_reqs = xprt_tcp_slot_table_entries;
  894. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  895. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  896. if (xprt->slot == NULL)
  897. return -ENOMEM;
  898. memset(xprt->slot, 0, slot_table_size);
  899. xprt->prot = IPPROTO_TCP;
  900. xprt->port = XS_MAX_RESVPORT;
  901. xprt->stream = 1;
  902. xprt->nocong = 1;
  903. xprt->cwnd = RPC_MAXCWND(xprt);
  904. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  905. xprt->max_payload = (1U << 31) - 1;
  906. INIT_WORK(&xprt->sock_connect, xs_connect_worker, xprt);
  907. xprt->ops = &xs_ops;
  908. if (to)
  909. xprt->timeout = *to;
  910. else
  911. xprt_set_timeout(&xprt->timeout, 2, 60 * HZ);
  912. return 0;
  913. }