xprtsock.c 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065
  1. /*
  2. * linux/net/sunrpc/xprtsock.c
  3. *
  4. * Client-side transport implementation for sockets.
  5. *
  6. * TCP callback races fixes (C) 1998 Red Hat Software <alan@redhat.com>
  7. * TCP send fixes (C) 1998 Red Hat Software <alan@redhat.com>
  8. * TCP NFS related read + write fixes
  9. * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
  10. *
  11. * Rewrite of larges part of the code in order to stabilize TCP stuff.
  12. * Fix behaviour when socket buffer is full.
  13. * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
  14. *
  15. * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
  16. */
  17. #include <linux/types.h>
  18. #include <linux/slab.h>
  19. #include <linux/capability.h>
  20. #include <linux/sched.h>
  21. #include <linux/pagemap.h>
  22. #include <linux/errno.h>
  23. #include <linux/socket.h>
  24. #include <linux/in.h>
  25. #include <linux/net.h>
  26. #include <linux/mm.h>
  27. #include <linux/udp.h>
  28. #include <linux/tcp.h>
  29. #include <linux/sunrpc/clnt.h>
  30. #include <linux/file.h>
  31. #include <net/sock.h>
  32. #include <net/checksum.h>
  33. #include <net/udp.h>
  34. #include <net/tcp.h>
  35. /*
  36. * Maximum port number to use when requesting a reserved port.
  37. */
  38. #define XS_MAX_RESVPORT (800U)
  39. #ifdef RPC_DEBUG
  40. # undef RPC_DEBUG_DATA
  41. # define RPCDBG_FACILITY RPCDBG_TRANS
  42. #endif
  43. #ifdef RPC_DEBUG_DATA
  44. static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  45. {
  46. u8 *buf = (u8 *) packet;
  47. int j;
  48. dprintk("RPC: %s\n", msg);
  49. for (j = 0; j < count && j < 128; j += 4) {
  50. if (!(j & 31)) {
  51. if (j)
  52. dprintk("\n");
  53. dprintk("0x%04x ", j);
  54. }
  55. dprintk("%02x%02x%02x%02x ",
  56. buf[j], buf[j+1], buf[j+2], buf[j+3]);
  57. }
  58. dprintk("\n");
  59. }
  60. #else
  61. static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
  62. {
  63. /* NOP */
  64. }
  65. #endif
  66. #define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL)
  67. static inline int xs_send_head(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  68. {
  69. struct kvec iov = {
  70. .iov_base = xdr->head[0].iov_base + base,
  71. .iov_len = len - base,
  72. };
  73. struct msghdr msg = {
  74. .msg_name = addr,
  75. .msg_namelen = addrlen,
  76. .msg_flags = XS_SENDMSG_FLAGS,
  77. };
  78. if (xdr->len > len)
  79. msg.msg_flags |= MSG_MORE;
  80. if (likely(iov.iov_len))
  81. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  82. return kernel_sendmsg(sock, &msg, NULL, 0, 0);
  83. }
  84. static int xs_send_tail(struct socket *sock, struct xdr_buf *xdr, unsigned int base, unsigned int len)
  85. {
  86. struct kvec iov = {
  87. .iov_base = xdr->tail[0].iov_base + base,
  88. .iov_len = len - base,
  89. };
  90. struct msghdr msg = {
  91. .msg_flags = XS_SENDMSG_FLAGS,
  92. };
  93. return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
  94. }
  95. /**
  96. * xs_sendpages - write pages directly to a socket
  97. * @sock: socket to send on
  98. * @addr: UDP only -- address of destination
  99. * @addrlen: UDP only -- length of destination address
  100. * @xdr: buffer containing this request
  101. * @base: starting position in the buffer
  102. *
  103. */
  104. static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
  105. {
  106. struct page **ppage = xdr->pages;
  107. unsigned int len, pglen = xdr->page_len;
  108. int err, ret = 0;
  109. ssize_t (*sendpage)(struct socket *, struct page *, int, size_t, int);
  110. len = xdr->head[0].iov_len;
  111. if (base < len || (addr != NULL && base == 0)) {
  112. err = xs_send_head(sock, addr, addrlen, xdr, base, len);
  113. if (ret == 0)
  114. ret = err;
  115. else if (err > 0)
  116. ret += err;
  117. if (err != (len - base))
  118. goto out;
  119. base = 0;
  120. } else
  121. base -= len;
  122. if (unlikely(pglen == 0))
  123. goto copy_tail;
  124. if (unlikely(base >= pglen)) {
  125. base -= pglen;
  126. goto copy_tail;
  127. }
  128. if (base || xdr->page_base) {
  129. pglen -= base;
  130. base += xdr->page_base;
  131. ppage += base >> PAGE_CACHE_SHIFT;
  132. base &= ~PAGE_CACHE_MASK;
  133. }
  134. sendpage = sock->ops->sendpage ? : sock_no_sendpage;
  135. do {
  136. int flags = XS_SENDMSG_FLAGS;
  137. len = PAGE_CACHE_SIZE;
  138. if (base)
  139. len -= base;
  140. if (pglen < len)
  141. len = pglen;
  142. if (pglen != len || xdr->tail[0].iov_len != 0)
  143. flags |= MSG_MORE;
  144. /* Hmm... We might be dealing with highmem pages */
  145. if (PageHighMem(*ppage))
  146. sendpage = sock_no_sendpage;
  147. err = sendpage(sock, *ppage, base, len, flags);
  148. if (ret == 0)
  149. ret = err;
  150. else if (err > 0)
  151. ret += err;
  152. if (err != len)
  153. goto out;
  154. base = 0;
  155. ppage++;
  156. } while ((pglen -= len) != 0);
  157. copy_tail:
  158. len = xdr->tail[0].iov_len;
  159. if (base < len) {
  160. err = xs_send_tail(sock, xdr, base, len);
  161. if (ret == 0)
  162. ret = err;
  163. else if (err > 0)
  164. ret += err;
  165. }
  166. out:
  167. return ret;
  168. }
  169. /**
  170. * xs_sendmsg - write an RPC request to a socket
  171. * @xprt: generic transport
  172. * @req: the RPC request to write
  173. *
  174. */
  175. static int xs_sendmsg(struct rpc_xprt *xprt, struct rpc_rqst *req)
  176. {
  177. struct socket *sock = xprt->sock;
  178. struct xdr_buf *xdr = &req->rq_snd_buf;
  179. struct sockaddr *addr = NULL;
  180. int addrlen = 0;
  181. unsigned int skip;
  182. int result;
  183. if (!sock)
  184. return -ENOTCONN;
  185. xs_pktdump("packet data:",
  186. req->rq_svec->iov_base,
  187. req->rq_svec->iov_len);
  188. /* For UDP, we need to provide an address */
  189. if (!xprt->stream) {
  190. addr = (struct sockaddr *) &xprt->addr;
  191. addrlen = sizeof(xprt->addr);
  192. }
  193. /* Don't repeat bytes */
  194. skip = req->rq_bytes_sent;
  195. clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
  196. result = xs_sendpages(sock, addr, addrlen, xdr, skip);
  197. dprintk("RPC: xs_sendmsg(%d) = %d\n", xdr->len - skip, result);
  198. if (result >= 0)
  199. return result;
  200. switch (result) {
  201. case -ECONNREFUSED:
  202. /* When the server has died, an ICMP port unreachable message
  203. * prompts ECONNREFUSED. */
  204. case -EAGAIN:
  205. break;
  206. case -ECONNRESET:
  207. case -ENOTCONN:
  208. case -EPIPE:
  209. /* connection broken */
  210. if (xprt->stream)
  211. result = -ENOTCONN;
  212. break;
  213. default:
  214. break;
  215. }
  216. return result;
  217. }
  218. /**
  219. * xs_send_request - write an RPC request to a socket
  220. * @task: address of RPC task that manages the state of an RPC request
  221. *
  222. * Return values:
  223. * 0: The request has been sent
  224. * EAGAIN: The socket was blocked, please call again later to
  225. * complete the request
  226. * other: Some other error occured, the request was not sent
  227. *
  228. * XXX: In the case of soft timeouts, should we eventually give up
  229. * if the socket is not able to make progress?
  230. */
  231. static int xs_send_request(struct rpc_task *task)
  232. {
  233. struct rpc_rqst *req = task->tk_rqstp;
  234. struct rpc_xprt *xprt = req->rq_xprt;
  235. int status, retry = 0;
  236. /* set up everything as needed. */
  237. /* Write the record marker */
  238. if (xprt->stream) {
  239. u32 *marker = req->rq_svec[0].iov_base;
  240. *marker = htonl(0x80000000|(req->rq_slen-sizeof(*marker)));
  241. }
  242. /* Continue transmitting the packet/record. We must be careful
  243. * to cope with writespace callbacks arriving _after_ we have
  244. * called sendmsg().
  245. */
  246. while (1) {
  247. req->rq_xtime = jiffies;
  248. status = xs_sendmsg(xprt, req);
  249. if (status < 0)
  250. break;
  251. if (xprt->stream) {
  252. req->rq_bytes_sent += status;
  253. /* If we've sent the entire packet, immediately
  254. * reset the count of bytes sent. */
  255. if (req->rq_bytes_sent >= req->rq_slen) {
  256. req->rq_bytes_sent = 0;
  257. return 0;
  258. }
  259. } else {
  260. if (status >= req->rq_slen)
  261. return 0;
  262. status = -EAGAIN;
  263. break;
  264. }
  265. dprintk("RPC: %4d xmit incomplete (%d left of %d)\n",
  266. task->tk_pid, req->rq_slen - req->rq_bytes_sent,
  267. req->rq_slen);
  268. status = -EAGAIN;
  269. if (retry++ > 50)
  270. break;
  271. }
  272. if (status == -EAGAIN) {
  273. if (test_bit(SOCK_ASYNC_NOSPACE, &xprt->sock->flags)) {
  274. /* Protect against races with write_space */
  275. spin_lock_bh(&xprt->transport_lock);
  276. /* Don't race with disconnect */
  277. if (!xprt_connected(xprt))
  278. task->tk_status = -ENOTCONN;
  279. else if (test_bit(SOCK_NOSPACE, &xprt->sock->flags))
  280. xprt_wait_for_buffer_space(task);
  281. spin_unlock_bh(&xprt->transport_lock);
  282. return status;
  283. }
  284. /* Keep holding the socket if it is blocked */
  285. rpc_delay(task, HZ>>4);
  286. }
  287. return status;
  288. }
  289. /**
  290. * xs_close - close a socket
  291. * @xprt: transport
  292. *
  293. */
  294. static void xs_close(struct rpc_xprt *xprt)
  295. {
  296. struct socket *sock = xprt->sock;
  297. struct sock *sk = xprt->inet;
  298. if (!sk)
  299. return;
  300. dprintk("RPC: xs_close xprt %p\n", xprt);
  301. write_lock_bh(&sk->sk_callback_lock);
  302. xprt->inet = NULL;
  303. xprt->sock = NULL;
  304. sk->sk_user_data = NULL;
  305. sk->sk_data_ready = xprt->old_data_ready;
  306. sk->sk_state_change = xprt->old_state_change;
  307. sk->sk_write_space = xprt->old_write_space;
  308. write_unlock_bh(&sk->sk_callback_lock);
  309. sk->sk_no_check = 0;
  310. sock_release(sock);
  311. }
  312. /**
  313. * xs_destroy - prepare to shutdown a transport
  314. * @xprt: doomed transport
  315. *
  316. */
  317. static void xs_destroy(struct rpc_xprt *xprt)
  318. {
  319. dprintk("RPC: xs_destroy xprt %p\n", xprt);
  320. cancel_delayed_work(&xprt->connect_worker);
  321. flush_scheduled_work();
  322. xprt_disconnect(xprt);
  323. xs_close(xprt);
  324. kfree(xprt->slot);
  325. }
  326. static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
  327. {
  328. return (struct rpc_xprt *) sk->sk_user_data;
  329. }
  330. /**
  331. * xs_udp_data_ready - "data ready" callback for UDP sockets
  332. * @sk: socket with data to read
  333. * @len: how much data to read
  334. *
  335. */
  336. static void xs_udp_data_ready(struct sock *sk, int len)
  337. {
  338. struct rpc_task *task;
  339. struct rpc_xprt *xprt;
  340. struct rpc_rqst *rovr;
  341. struct sk_buff *skb;
  342. int err, repsize, copied;
  343. u32 _xid, *xp;
  344. read_lock(&sk->sk_callback_lock);
  345. dprintk("RPC: xs_udp_data_ready...\n");
  346. if (!(xprt = xprt_from_sock(sk)))
  347. goto out;
  348. if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
  349. goto out;
  350. if (xprt->shutdown)
  351. goto dropit;
  352. repsize = skb->len - sizeof(struct udphdr);
  353. if (repsize < 4) {
  354. dprintk("RPC: impossible RPC reply size %d!\n", repsize);
  355. goto dropit;
  356. }
  357. /* Copy the XID from the skb... */
  358. xp = skb_header_pointer(skb, sizeof(struct udphdr),
  359. sizeof(_xid), &_xid);
  360. if (xp == NULL)
  361. goto dropit;
  362. /* Look up and lock the request corresponding to the given XID */
  363. spin_lock(&xprt->transport_lock);
  364. rovr = xprt_lookup_rqst(xprt, *xp);
  365. if (!rovr)
  366. goto out_unlock;
  367. task = rovr->rq_task;
  368. dprintk("RPC: %4d received reply\n", task->tk_pid);
  369. if ((copied = rovr->rq_private_buf.buflen) > repsize)
  370. copied = repsize;
  371. /* Suck it into the iovec, verify checksum if not done by hw. */
  372. if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb))
  373. goto out_unlock;
  374. /* Something worked... */
  375. dst_confirm(skb->dst);
  376. xprt_complete_rqst(xprt, rovr, copied);
  377. out_unlock:
  378. spin_unlock(&xprt->transport_lock);
  379. dropit:
  380. skb_free_datagram(sk, skb);
  381. out:
  382. read_unlock(&sk->sk_callback_lock);
  383. }
  384. static inline size_t xs_tcp_copy_data(skb_reader_t *desc, void *p, size_t len)
  385. {
  386. if (len > desc->count)
  387. len = desc->count;
  388. if (skb_copy_bits(desc->skb, desc->offset, p, len)) {
  389. dprintk("RPC: failed to copy %zu bytes from skb. %zu bytes remain\n",
  390. len, desc->count);
  391. return 0;
  392. }
  393. desc->offset += len;
  394. desc->count -= len;
  395. dprintk("RPC: copied %zu bytes from skb. %zu bytes remain\n",
  396. len, desc->count);
  397. return len;
  398. }
  399. static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, skb_reader_t *desc)
  400. {
  401. size_t len, used;
  402. char *p;
  403. p = ((char *) &xprt->tcp_recm) + xprt->tcp_offset;
  404. len = sizeof(xprt->tcp_recm) - xprt->tcp_offset;
  405. used = xs_tcp_copy_data(desc, p, len);
  406. xprt->tcp_offset += used;
  407. if (used != len)
  408. return;
  409. xprt->tcp_reclen = ntohl(xprt->tcp_recm);
  410. if (xprt->tcp_reclen & 0x80000000)
  411. xprt->tcp_flags |= XPRT_LAST_FRAG;
  412. else
  413. xprt->tcp_flags &= ~XPRT_LAST_FRAG;
  414. xprt->tcp_reclen &= 0x7fffffff;
  415. xprt->tcp_flags &= ~XPRT_COPY_RECM;
  416. xprt->tcp_offset = 0;
  417. /* Sanity check of the record length */
  418. if (xprt->tcp_reclen < 4) {
  419. dprintk("RPC: invalid TCP record fragment length\n");
  420. xprt_disconnect(xprt);
  421. return;
  422. }
  423. dprintk("RPC: reading TCP record fragment of length %d\n",
  424. xprt->tcp_reclen);
  425. }
  426. static void xs_tcp_check_recm(struct rpc_xprt *xprt)
  427. {
  428. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u, tcp_flags = %lx\n",
  429. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen, xprt->tcp_flags);
  430. if (xprt->tcp_offset == xprt->tcp_reclen) {
  431. xprt->tcp_flags |= XPRT_COPY_RECM;
  432. xprt->tcp_offset = 0;
  433. if (xprt->tcp_flags & XPRT_LAST_FRAG) {
  434. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  435. xprt->tcp_flags |= XPRT_COPY_XID;
  436. xprt->tcp_copied = 0;
  437. }
  438. }
  439. }
  440. static inline void xs_tcp_read_xid(struct rpc_xprt *xprt, skb_reader_t *desc)
  441. {
  442. size_t len, used;
  443. char *p;
  444. len = sizeof(xprt->tcp_xid) - xprt->tcp_offset;
  445. dprintk("RPC: reading XID (%Zu bytes)\n", len);
  446. p = ((char *) &xprt->tcp_xid) + xprt->tcp_offset;
  447. used = xs_tcp_copy_data(desc, p, len);
  448. xprt->tcp_offset += used;
  449. if (used != len)
  450. return;
  451. xprt->tcp_flags &= ~XPRT_COPY_XID;
  452. xprt->tcp_flags |= XPRT_COPY_DATA;
  453. xprt->tcp_copied = 4;
  454. dprintk("RPC: reading reply for XID %08x\n",
  455. ntohl(xprt->tcp_xid));
  456. xs_tcp_check_recm(xprt);
  457. }
  458. static inline void xs_tcp_read_request(struct rpc_xprt *xprt, skb_reader_t *desc)
  459. {
  460. struct rpc_rqst *req;
  461. struct xdr_buf *rcvbuf;
  462. size_t len;
  463. ssize_t r;
  464. /* Find and lock the request corresponding to this xid */
  465. spin_lock(&xprt->transport_lock);
  466. req = xprt_lookup_rqst(xprt, xprt->tcp_xid);
  467. if (!req) {
  468. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  469. dprintk("RPC: XID %08x request not found!\n",
  470. ntohl(xprt->tcp_xid));
  471. spin_unlock(&xprt->transport_lock);
  472. return;
  473. }
  474. rcvbuf = &req->rq_private_buf;
  475. len = desc->count;
  476. if (len > xprt->tcp_reclen - xprt->tcp_offset) {
  477. skb_reader_t my_desc;
  478. len = xprt->tcp_reclen - xprt->tcp_offset;
  479. memcpy(&my_desc, desc, sizeof(my_desc));
  480. my_desc.count = len;
  481. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  482. &my_desc, xs_tcp_copy_data);
  483. desc->count -= r;
  484. desc->offset += r;
  485. } else
  486. r = xdr_partial_copy_from_skb(rcvbuf, xprt->tcp_copied,
  487. desc, xs_tcp_copy_data);
  488. if (r > 0) {
  489. xprt->tcp_copied += r;
  490. xprt->tcp_offset += r;
  491. }
  492. if (r != len) {
  493. /* Error when copying to the receive buffer,
  494. * usually because we weren't able to allocate
  495. * additional buffer pages. All we can do now
  496. * is turn off XPRT_COPY_DATA, so the request
  497. * will not receive any additional updates,
  498. * and time out.
  499. * Any remaining data from this record will
  500. * be discarded.
  501. */
  502. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  503. dprintk("RPC: XID %08x truncated request\n",
  504. ntohl(xprt->tcp_xid));
  505. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  506. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  507. goto out;
  508. }
  509. dprintk("RPC: XID %08x read %Zd bytes\n",
  510. ntohl(xprt->tcp_xid), r);
  511. dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, tcp_reclen = %u\n",
  512. xprt, xprt->tcp_copied, xprt->tcp_offset, xprt->tcp_reclen);
  513. if (xprt->tcp_copied == req->rq_private_buf.buflen)
  514. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  515. else if (xprt->tcp_offset == xprt->tcp_reclen) {
  516. if (xprt->tcp_flags & XPRT_LAST_FRAG)
  517. xprt->tcp_flags &= ~XPRT_COPY_DATA;
  518. }
  519. out:
  520. if (!(xprt->tcp_flags & XPRT_COPY_DATA)) {
  521. dprintk("RPC: %4d received reply complete\n",
  522. req->rq_task->tk_pid);
  523. xprt_complete_rqst(xprt, req, xprt->tcp_copied);
  524. }
  525. spin_unlock(&xprt->transport_lock);
  526. xs_tcp_check_recm(xprt);
  527. }
  528. static inline void xs_tcp_read_discard(struct rpc_xprt *xprt, skb_reader_t *desc)
  529. {
  530. size_t len;
  531. len = xprt->tcp_reclen - xprt->tcp_offset;
  532. if (len > desc->count)
  533. len = desc->count;
  534. desc->count -= len;
  535. desc->offset += len;
  536. xprt->tcp_offset += len;
  537. dprintk("RPC: discarded %Zu bytes\n", len);
  538. xs_tcp_check_recm(xprt);
  539. }
  540. static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
  541. {
  542. struct rpc_xprt *xprt = rd_desc->arg.data;
  543. skb_reader_t desc = {
  544. .skb = skb,
  545. .offset = offset,
  546. .count = len,
  547. .csum = 0
  548. };
  549. dprintk("RPC: xs_tcp_data_recv started\n");
  550. do {
  551. /* Read in a new fragment marker if necessary */
  552. /* Can we ever really expect to get completely empty fragments? */
  553. if (xprt->tcp_flags & XPRT_COPY_RECM) {
  554. xs_tcp_read_fraghdr(xprt, &desc);
  555. continue;
  556. }
  557. /* Read in the xid if necessary */
  558. if (xprt->tcp_flags & XPRT_COPY_XID) {
  559. xs_tcp_read_xid(xprt, &desc);
  560. continue;
  561. }
  562. /* Read in the request data */
  563. if (xprt->tcp_flags & XPRT_COPY_DATA) {
  564. xs_tcp_read_request(xprt, &desc);
  565. continue;
  566. }
  567. /* Skip over any trailing bytes on short reads */
  568. xs_tcp_read_discard(xprt, &desc);
  569. } while (desc.count);
  570. dprintk("RPC: xs_tcp_data_recv done\n");
  571. return len - desc.count;
  572. }
  573. /**
  574. * xs_tcp_data_ready - "data ready" callback for TCP sockets
  575. * @sk: socket with data to read
  576. * @bytes: how much data to read
  577. *
  578. */
  579. static void xs_tcp_data_ready(struct sock *sk, int bytes)
  580. {
  581. struct rpc_xprt *xprt;
  582. read_descriptor_t rd_desc;
  583. read_lock(&sk->sk_callback_lock);
  584. dprintk("RPC: xs_tcp_data_ready...\n");
  585. if (!(xprt = xprt_from_sock(sk)))
  586. goto out;
  587. if (xprt->shutdown)
  588. goto out;
  589. /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
  590. rd_desc.arg.data = xprt;
  591. rd_desc.count = 65536;
  592. tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
  593. out:
  594. read_unlock(&sk->sk_callback_lock);
  595. }
  596. /**
  597. * xs_tcp_state_change - callback to handle TCP socket state changes
  598. * @sk: socket whose state has changed
  599. *
  600. */
  601. static void xs_tcp_state_change(struct sock *sk)
  602. {
  603. struct rpc_xprt *xprt;
  604. read_lock(&sk->sk_callback_lock);
  605. if (!(xprt = xprt_from_sock(sk)))
  606. goto out;
  607. dprintk("RPC: xs_tcp_state_change client %p...\n", xprt);
  608. dprintk("RPC: state %x conn %d dead %d zapped %d\n",
  609. sk->sk_state, xprt_connected(xprt),
  610. sock_flag(sk, SOCK_DEAD),
  611. sock_flag(sk, SOCK_ZAPPED));
  612. switch (sk->sk_state) {
  613. case TCP_ESTABLISHED:
  614. spin_lock_bh(&xprt->transport_lock);
  615. if (!xprt_test_and_set_connected(xprt)) {
  616. /* Reset TCP record info */
  617. xprt->tcp_offset = 0;
  618. xprt->tcp_reclen = 0;
  619. xprt->tcp_copied = 0;
  620. xprt->tcp_flags = XPRT_COPY_RECM | XPRT_COPY_XID;
  621. xprt_wake_pending_tasks(xprt, 0);
  622. }
  623. spin_unlock_bh(&xprt->transport_lock);
  624. break;
  625. case TCP_SYN_SENT:
  626. case TCP_SYN_RECV:
  627. break;
  628. default:
  629. xprt_disconnect(xprt);
  630. break;
  631. }
  632. out:
  633. read_unlock(&sk->sk_callback_lock);
  634. }
  635. /**
  636. * xs_udp_write_space - callback invoked when socket buffer space
  637. * becomes available
  638. * @sk: socket whose state has changed
  639. *
  640. * Called when more output buffer space is available for this socket.
  641. * We try not to wake our writers until they can make "significant"
  642. * progress, otherwise we'll waste resources thrashing kernel_sendmsg
  643. * with a bunch of small requests.
  644. */
  645. static void xs_udp_write_space(struct sock *sk)
  646. {
  647. read_lock(&sk->sk_callback_lock);
  648. /* from net/core/sock.c:sock_def_write_space */
  649. if (sock_writeable(sk)) {
  650. struct socket *sock;
  651. struct rpc_xprt *xprt;
  652. if (unlikely(!(sock = sk->sk_socket)))
  653. goto out;
  654. if (unlikely(!(xprt = xprt_from_sock(sk))))
  655. goto out;
  656. if (unlikely(!test_and_clear_bit(SOCK_NOSPACE, &sock->flags)))
  657. goto out;
  658. xprt_write_space(xprt);
  659. }
  660. out:
  661. read_unlock(&sk->sk_callback_lock);
  662. }
  663. /**
  664. * xs_tcp_write_space - callback invoked when socket buffer space
  665. * becomes available
  666. * @sk: socket whose state has changed
  667. *
  668. * Called when more output buffer space is available for this socket.
  669. * We try not to wake our writers until they can make "significant"
  670. * progress, otherwise we'll waste resources thrashing kernel_sendmsg
  671. * with a bunch of small requests.
  672. */
  673. static void xs_tcp_write_space(struct sock *sk)
  674. {
  675. read_lock(&sk->sk_callback_lock);
  676. /* from net/core/stream.c:sk_stream_write_space */
  677. if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk)) {
  678. struct socket *sock;
  679. struct rpc_xprt *xprt;
  680. if (unlikely(!(sock = sk->sk_socket)))
  681. goto out;
  682. if (unlikely(!(xprt = xprt_from_sock(sk))))
  683. goto out;
  684. if (unlikely(!test_and_clear_bit(SOCK_NOSPACE, &sock->flags)))
  685. goto out;
  686. xprt_write_space(xprt);
  687. }
  688. out:
  689. read_unlock(&sk->sk_callback_lock);
  690. }
  691. /**
  692. * xs_set_buffer_size - set send and receive limits
  693. * @xprt: generic transport
  694. *
  695. * Set socket send and receive limits based on the
  696. * sndsize and rcvsize fields in the generic transport
  697. * structure. This applies only to UDP sockets.
  698. */
  699. static void xs_set_buffer_size(struct rpc_xprt *xprt)
  700. {
  701. struct sock *sk = xprt->inet;
  702. if (xprt->stream)
  703. return;
  704. if (xprt->rcvsize) {
  705. sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
  706. sk->sk_rcvbuf = xprt->rcvsize * xprt->max_reqs * 2;
  707. }
  708. if (xprt->sndsize) {
  709. sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
  710. sk->sk_sndbuf = xprt->sndsize * xprt->max_reqs * 2;
  711. sk->sk_write_space(sk);
  712. }
  713. }
  714. static int xs_bindresvport(struct rpc_xprt *xprt, struct socket *sock)
  715. {
  716. struct sockaddr_in myaddr = {
  717. .sin_family = AF_INET,
  718. };
  719. int err, port;
  720. /* Were we already bound to a given port? Try to reuse it */
  721. port = xprt->port;
  722. do {
  723. myaddr.sin_port = htons(port);
  724. err = sock->ops->bind(sock, (struct sockaddr *) &myaddr,
  725. sizeof(myaddr));
  726. if (err == 0) {
  727. xprt->port = port;
  728. dprintk("RPC: xs_bindresvport bound to port %u\n",
  729. port);
  730. return 0;
  731. }
  732. if (--port == 0)
  733. port = XS_MAX_RESVPORT;
  734. } while (err == -EADDRINUSE && port != xprt->port);
  735. dprintk("RPC: can't bind to reserved port (%d).\n", -err);
  736. return err;
  737. }
  738. static struct socket *xs_create(struct rpc_xprt *xprt, int proto, int resvport)
  739. {
  740. struct socket *sock;
  741. int type, err;
  742. dprintk("RPC: xs_create(%s %d)\n",
  743. (proto == IPPROTO_UDP)? "udp" : "tcp", proto);
  744. type = (proto == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
  745. if ((err = sock_create_kern(PF_INET, type, proto, &sock)) < 0) {
  746. dprintk("RPC: can't create socket (%d).\n", -err);
  747. return NULL;
  748. }
  749. /* If the caller has the capability, bind to a reserved port */
  750. if (resvport && xs_bindresvport(xprt, sock) < 0)
  751. goto failed;
  752. return sock;
  753. failed:
  754. sock_release(sock);
  755. return NULL;
  756. }
  757. static void xs_bind(struct rpc_xprt *xprt, struct socket *sock)
  758. {
  759. struct sock *sk = sock->sk;
  760. if (xprt->inet)
  761. return;
  762. write_lock_bh(&sk->sk_callback_lock);
  763. sk->sk_user_data = xprt;
  764. xprt->old_data_ready = sk->sk_data_ready;
  765. xprt->old_state_change = sk->sk_state_change;
  766. xprt->old_write_space = sk->sk_write_space;
  767. if (xprt->prot == IPPROTO_UDP) {
  768. sk->sk_data_ready = xs_udp_data_ready;
  769. sk->sk_write_space = xs_udp_write_space;
  770. sk->sk_no_check = UDP_CSUM_NORCV;
  771. xprt_set_connected(xprt);
  772. } else {
  773. tcp_sk(sk)->nonagle = 1; /* disable Nagle's algorithm */
  774. sk->sk_data_ready = xs_tcp_data_ready;
  775. sk->sk_state_change = xs_tcp_state_change;
  776. sk->sk_write_space = xs_tcp_write_space;
  777. xprt_clear_connected(xprt);
  778. }
  779. /* Reset to new socket */
  780. xprt->sock = sock;
  781. xprt->inet = sk;
  782. write_unlock_bh(&sk->sk_callback_lock);
  783. return;
  784. }
  785. /**
  786. * xs_connect_worker - try to connect a socket to a remote endpoint
  787. * @args: RPC transport to connect
  788. *
  789. * Invoked by a work queue tasklet.
  790. */
  791. static void xs_connect_worker(void *args)
  792. {
  793. struct rpc_xprt *xprt = (struct rpc_xprt *)args;
  794. struct socket *sock = xprt->sock;
  795. int status = -EIO;
  796. if (xprt->shutdown || xprt->addr.sin_port == 0)
  797. goto out;
  798. dprintk("RPC: xs_connect_worker xprt %p\n", xprt);
  799. /*
  800. * Start by resetting any existing state
  801. */
  802. xs_close(xprt);
  803. sock = xs_create(xprt, xprt->prot, xprt->resvport);
  804. if (sock == NULL) {
  805. /* couldn't create socket or bind to reserved port;
  806. * this is likely a permanent error, so cause an abort */
  807. goto out;
  808. }
  809. xs_bind(xprt, sock);
  810. xs_set_buffer_size(xprt);
  811. status = 0;
  812. if (!xprt->stream)
  813. goto out;
  814. /*
  815. * Tell the socket layer to start connecting...
  816. */
  817. status = sock->ops->connect(sock, (struct sockaddr *) &xprt->addr,
  818. sizeof(xprt->addr), O_NONBLOCK);
  819. dprintk("RPC: %p connect status %d connected %d sock state %d\n",
  820. xprt, -status, xprt_connected(xprt), sock->sk->sk_state);
  821. if (status < 0) {
  822. switch (status) {
  823. case -EINPROGRESS:
  824. case -EALREADY:
  825. goto out_clear;
  826. }
  827. }
  828. out:
  829. xprt_wake_pending_tasks(xprt, status);
  830. out_clear:
  831. xprt_clear_connecting(xprt);
  832. }
  833. /**
  834. * xs_connect - connect a socket to a remote endpoint
  835. * @task: address of RPC task that manages state of connect request
  836. *
  837. * TCP: If the remote end dropped the connection, delay reconnecting.
  838. */
  839. static void xs_connect(struct rpc_task *task)
  840. {
  841. struct rpc_xprt *xprt = task->tk_xprt;
  842. if (!xprt_test_and_set_connecting(xprt)) {
  843. if (xprt->sock != NULL) {
  844. dprintk("RPC: xs_connect delayed xprt %p\n", xprt);
  845. schedule_delayed_work(&xprt->connect_worker,
  846. RPC_REESTABLISH_TIMEOUT);
  847. } else {
  848. dprintk("RPC: xs_connect scheduled xprt %p\n", xprt);
  849. schedule_work(&xprt->connect_worker);
  850. /* flush_scheduled_work can sleep... */
  851. if (!RPC_IS_ASYNC(task))
  852. flush_scheduled_work();
  853. }
  854. }
  855. }
  856. static struct rpc_xprt_ops xs_ops = {
  857. .set_buffer_size = xs_set_buffer_size,
  858. .connect = xs_connect,
  859. .send_request = xs_send_request,
  860. .close = xs_close,
  861. .destroy = xs_destroy,
  862. };
  863. extern unsigned int xprt_udp_slot_table_entries;
  864. extern unsigned int xprt_tcp_slot_table_entries;
  865. /**
  866. * xs_setup_udp - Set up transport to use a UDP socket
  867. * @xprt: transport to set up
  868. * @to: timeout parameters
  869. *
  870. */
  871. int xs_setup_udp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  872. {
  873. size_t slot_table_size;
  874. dprintk("RPC: setting up udp-ipv4 transport...\n");
  875. xprt->max_reqs = xprt_udp_slot_table_entries;
  876. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  877. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  878. if (xprt->slot == NULL)
  879. return -ENOMEM;
  880. memset(xprt->slot, 0, slot_table_size);
  881. xprt->prot = IPPROTO_UDP;
  882. xprt->port = XS_MAX_RESVPORT;
  883. xprt->stream = 0;
  884. xprt->nocong = 0;
  885. xprt->cwnd = RPC_INITCWND;
  886. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  887. /* XXX: header size can vary due to auth type, IPv6, etc. */
  888. xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
  889. INIT_WORK(&xprt->connect_worker, xs_connect_worker, xprt);
  890. xprt->ops = &xs_ops;
  891. if (to)
  892. xprt->timeout = *to;
  893. else
  894. xprt_set_timeout(&xprt->timeout, 5, 5 * HZ);
  895. return 0;
  896. }
  897. /**
  898. * xs_setup_tcp - Set up transport to use a TCP socket
  899. * @xprt: transport to set up
  900. * @to: timeout parameters
  901. *
  902. */
  903. int xs_setup_tcp(struct rpc_xprt *xprt, struct rpc_timeout *to)
  904. {
  905. size_t slot_table_size;
  906. dprintk("RPC: setting up tcp-ipv4 transport...\n");
  907. xprt->max_reqs = xprt_tcp_slot_table_entries;
  908. slot_table_size = xprt->max_reqs * sizeof(xprt->slot[0]);
  909. xprt->slot = kmalloc(slot_table_size, GFP_KERNEL);
  910. if (xprt->slot == NULL)
  911. return -ENOMEM;
  912. memset(xprt->slot, 0, slot_table_size);
  913. xprt->prot = IPPROTO_TCP;
  914. xprt->port = XS_MAX_RESVPORT;
  915. xprt->stream = 1;
  916. xprt->nocong = 1;
  917. xprt->cwnd = RPC_MAXCWND(xprt);
  918. xprt->resvport = capable(CAP_NET_BIND_SERVICE) ? 1 : 0;
  919. xprt->max_payload = (1U << 31) - 1;
  920. INIT_WORK(&xprt->connect_worker, xs_connect_worker, xprt);
  921. xprt->ops = &xs_ops;
  922. if (to)
  923. xprt->timeout = *to;
  924. else
  925. xprt_set_timeout(&xprt->timeout, 2, 60 * HZ);
  926. return 0;
  927. }