]> git.proxmox.com Git - mirror_ubuntu-focal-kernel.git/blame - net/sunrpc/xprtsock.c
lockd: Eliminate harmless mixed sign comparison in nlmdbg_cookie2a()
[mirror_ubuntu-focal-kernel.git] / net / sunrpc / xprtsock.c
CommitLineData
a246b010
CL
1/*
2 * linux/net/sunrpc/xprtsock.c
3 *
4 * Client-side transport implementation for sockets.
5 *
6 * TCP callback races fixes (C) 1998 Red Hat Software <alan@redhat.com>
7 * TCP send fixes (C) 1998 Red Hat Software <alan@redhat.com>
8 * TCP NFS related read + write fixes
9 * (C) 1999 Dave Airlie, University of Limerick, Ireland <airlied@linux.ie>
10 *
11 * Rewrite of larges part of the code in order to stabilize TCP stuff.
12 * Fix behaviour when socket buffer is full.
13 * (C) 1999 Trond Myklebust <trond.myklebust@fys.uio.no>
55aa4f58
CL
14 *
15 * IP socket transport implementation, (C) 2005 Chuck Lever <cel@netapp.com>
8f9d5b1a
CL
16 *
17 * IPv6 support contributed by Gilles Quillard, Bull Open Source, 2005.
18 * <gilles.quillard@bull.net>
a246b010
CL
19 */
20
21#include <linux/types.h>
22#include <linux/slab.h>
bc25571e 23#include <linux/module.h>
a246b010 24#include <linux/capability.h>
a246b010
CL
25#include <linux/pagemap.h>
26#include <linux/errno.h>
27#include <linux/socket.h>
28#include <linux/in.h>
29#include <linux/net.h>
30#include <linux/mm.h>
31#include <linux/udp.h>
32#include <linux/tcp.h>
33#include <linux/sunrpc/clnt.h>
02107148 34#include <linux/sunrpc/sched.h>
49c36fcc 35#include <linux/sunrpc/xprtsock.h>
a246b010
CL
36#include <linux/file.h>
37
38#include <net/sock.h>
39#include <net/checksum.h>
40#include <net/udp.h>
41#include <net/tcp.h>
42
c556b754
CL
43/*
44 * xprtsock tunables
45 */
46unsigned int xprt_udp_slot_table_entries = RPC_DEF_SLOT_TABLE;
47unsigned int xprt_tcp_slot_table_entries = RPC_DEF_SLOT_TABLE;
48
49unsigned int xprt_min_resvport = RPC_DEF_MIN_RESVPORT;
50unsigned int xprt_max_resvport = RPC_DEF_MAX_RESVPORT;
51
fbf76683
CL
52/*
53 * We can register our own files under /proc/sys/sunrpc by
54 * calling register_sysctl_table() again. The files in that
55 * directory become the union of all files registered there.
56 *
57 * We simply need to make sure that we don't collide with
58 * someone else's file names!
59 */
60
61#ifdef RPC_DEBUG
62
63static unsigned int min_slot_table_size = RPC_MIN_SLOT_TABLE;
64static unsigned int max_slot_table_size = RPC_MAX_SLOT_TABLE;
65static unsigned int xprt_min_resvport_limit = RPC_MIN_RESVPORT;
66static unsigned int xprt_max_resvport_limit = RPC_MAX_RESVPORT;
67
68static struct ctl_table_header *sunrpc_table_header;
69
70/*
71 * FIXME: changing the UDP slot table size should also resize the UDP
72 * socket buffers for existing UDP transports
73 */
74static ctl_table xs_tunables_table[] = {
75 {
76 .ctl_name = CTL_SLOTTABLE_UDP,
77 .procname = "udp_slot_table_entries",
78 .data = &xprt_udp_slot_table_entries,
79 .maxlen = sizeof(unsigned int),
80 .mode = 0644,
81 .proc_handler = &proc_dointvec_minmax,
82 .strategy = &sysctl_intvec,
83 .extra1 = &min_slot_table_size,
84 .extra2 = &max_slot_table_size
85 },
86 {
87 .ctl_name = CTL_SLOTTABLE_TCP,
88 .procname = "tcp_slot_table_entries",
89 .data = &xprt_tcp_slot_table_entries,
90 .maxlen = sizeof(unsigned int),
91 .mode = 0644,
92 .proc_handler = &proc_dointvec_minmax,
93 .strategy = &sysctl_intvec,
94 .extra1 = &min_slot_table_size,
95 .extra2 = &max_slot_table_size
96 },
97 {
98 .ctl_name = CTL_MIN_RESVPORT,
99 .procname = "min_resvport",
100 .data = &xprt_min_resvport,
101 .maxlen = sizeof(unsigned int),
102 .mode = 0644,
103 .proc_handler = &proc_dointvec_minmax,
104 .strategy = &sysctl_intvec,
105 .extra1 = &xprt_min_resvport_limit,
106 .extra2 = &xprt_max_resvport_limit
107 },
108 {
109 .ctl_name = CTL_MAX_RESVPORT,
110 .procname = "max_resvport",
111 .data = &xprt_max_resvport,
112 .maxlen = sizeof(unsigned int),
113 .mode = 0644,
114 .proc_handler = &proc_dointvec_minmax,
115 .strategy = &sysctl_intvec,
116 .extra1 = &xprt_min_resvport_limit,
117 .extra2 = &xprt_max_resvport_limit
118 },
119 {
120 .ctl_name = 0,
121 },
122};
123
124static ctl_table sunrpc_table[] = {
125 {
126 .ctl_name = CTL_SUNRPC,
127 .procname = "sunrpc",
128 .mode = 0555,
129 .child = xs_tunables_table
130 },
131 {
132 .ctl_name = 0,
133 },
134};
135
136#endif
137
262965f5
CL
138/*
139 * How many times to try sending a request on a socket before waiting
140 * for the socket buffer to clear.
141 */
142#define XS_SENDMSG_RETRY (10U)
143
03bf4b70
CL
144/*
145 * Time out for an RPC UDP socket connect. UDP socket connects are
146 * synchronous, but we set a timeout anyway in case of resource
147 * exhaustion on the local host.
148 */
149#define XS_UDP_CONN_TO (5U * HZ)
150
151/*
152 * Wait duration for an RPC TCP connection to be established. Solaris
153 * NFS over TCP uses 60 seconds, for example, which is in line with how
154 * long a server takes to reboot.
155 */
156#define XS_TCP_CONN_TO (60U * HZ)
157
158/*
159 * Wait duration for a reply from the RPC portmapper.
160 */
161#define XS_BIND_TO (60U * HZ)
162
163/*
164 * Delay if a UDP socket connect error occurs. This is most likely some
165 * kind of resource problem on the local host.
166 */
167#define XS_UDP_REEST_TO (2U * HZ)
168
169/*
170 * The reestablish timeout allows clients to delay for a bit before attempting
171 * to reconnect to a server that just dropped our connection.
172 *
173 * We implement an exponential backoff when trying to reestablish a TCP
174 * transport connection with the server. Some servers like to drop a TCP
175 * connection when they are overworked, so we start with a short timeout and
176 * increase over time if the server is down or not responding.
177 */
178#define XS_TCP_INIT_REEST_TO (3U * HZ)
179#define XS_TCP_MAX_REEST_TO (5U * 60 * HZ)
180
181/*
182 * TCP idle timeout; client drops the transport socket if it is idle
183 * for this long. Note that we also timeout UDP sockets to prevent
184 * holding port numbers when there is no RPC traffic.
185 */
186#define XS_IDLE_DISC_TO (5U * 60 * HZ)
187
a246b010
CL
188#ifdef RPC_DEBUG
189# undef RPC_DEBUG_DATA
9903cd1c 190# define RPCDBG_FACILITY RPCDBG_TRANS
a246b010
CL
191#endif
192
a246b010 193#ifdef RPC_DEBUG_DATA
9903cd1c 194static void xs_pktdump(char *msg, u32 *packet, unsigned int count)
a246b010 195{
9903cd1c
CL
196 u8 *buf = (u8 *) packet;
197 int j;
a246b010 198
46121cf7 199 dprintk("RPC: %s\n", msg);
a246b010
CL
200 for (j = 0; j < count && j < 128; j += 4) {
201 if (!(j & 31)) {
202 if (j)
203 dprintk("\n");
204 dprintk("0x%04x ", j);
205 }
206 dprintk("%02x%02x%02x%02x ",
207 buf[j], buf[j+1], buf[j+2], buf[j+3]);
208 }
209 dprintk("\n");
210}
211#else
9903cd1c 212static inline void xs_pktdump(char *msg, u32 *packet, unsigned int count)
a246b010
CL
213{
214 /* NOP */
215}
216#endif
217
ffc2e518
CL
218struct sock_xprt {
219 struct rpc_xprt xprt;
ee0ac0c2
CL
220
221 /*
222 * Network layer
223 */
224 struct socket * sock;
225 struct sock * inet;
51971139
CL
226
227 /*
228 * State of TCP reply receive
229 */
230 __be32 tcp_fraghdr,
231 tcp_xid;
232
233 u32 tcp_offset,
234 tcp_reclen;
235
236 unsigned long tcp_copied,
237 tcp_flags;
c8475461
CL
238
239 /*
240 * Connection of transports
241 */
34161db6 242 struct delayed_work connect_worker;
d3bc9a1d 243 struct sockaddr_storage addr;
c8475461 244 unsigned short port;
7c6e066e
CL
245
246 /*
247 * UDP socket buffer size parameters
248 */
249 size_t rcvsize,
250 sndsize;
314dfd79
CL
251
252 /*
253 * Saved socket callback addresses
254 */
255 void (*old_data_ready)(struct sock *, int);
256 void (*old_state_change)(struct sock *);
257 void (*old_write_space)(struct sock *);
ffc2e518
CL
258};
259
e136d092
CL
260/*
261 * TCP receive state flags
262 */
263#define TCP_RCV_LAST_FRAG (1UL << 0)
264#define TCP_RCV_COPY_FRAGHDR (1UL << 1)
265#define TCP_RCV_COPY_XID (1UL << 2)
266#define TCP_RCV_COPY_DATA (1UL << 3)
267
95392c59
CL
268static inline struct sockaddr *xs_addr(struct rpc_xprt *xprt)
269{
270 return (struct sockaddr *) &xprt->addr;
271}
272
273static inline struct sockaddr_in *xs_addr_in(struct rpc_xprt *xprt)
edb267a6 274{
95392c59
CL
275 return (struct sockaddr_in *) &xprt->addr;
276}
277
278static inline struct sockaddr_in6 *xs_addr_in6(struct rpc_xprt *xprt)
279{
280 return (struct sockaddr_in6 *) &xprt->addr;
281}
282
ba10f2c2 283static void xs_format_ipv4_peer_addresses(struct rpc_xprt *xprt)
edb267a6 284{
95392c59 285 struct sockaddr_in *addr = xs_addr_in(xprt);
edb267a6
CL
286 char *buf;
287
288 buf = kzalloc(20, GFP_KERNEL);
289 if (buf) {
bda243df 290 snprintf(buf, 20, NIPQUAD_FMT,
edb267a6
CL
291 NIPQUAD(addr->sin_addr.s_addr));
292 }
293 xprt->address_strings[RPC_DISPLAY_ADDR] = buf;
294
295 buf = kzalloc(8, GFP_KERNEL);
296 if (buf) {
297 snprintf(buf, 8, "%u",
298 ntohs(addr->sin_port));
299 }
300 xprt->address_strings[RPC_DISPLAY_PORT] = buf;
301
0c43b3d8
CL
302 buf = kzalloc(8, GFP_KERNEL);
303 if (buf) {
304 if (xprt->prot == IPPROTO_UDP)
305 snprintf(buf, 8, "udp");
306 else
307 snprintf(buf, 8, "tcp");
308 }
309 xprt->address_strings[RPC_DISPLAY_PROTO] = buf;
edb267a6
CL
310
311 buf = kzalloc(48, GFP_KERNEL);
312 if (buf) {
bda243df 313 snprintf(buf, 48, "addr="NIPQUAD_FMT" port=%u proto=%s",
edb267a6
CL
314 NIPQUAD(addr->sin_addr.s_addr),
315 ntohs(addr->sin_port),
316 xprt->prot == IPPROTO_UDP ? "udp" : "tcp");
317 }
318 xprt->address_strings[RPC_DISPLAY_ALL] = buf;
fbfe3cc6
CL
319
320 buf = kzalloc(10, GFP_KERNEL);
321 if (buf) {
322 snprintf(buf, 10, "%02x%02x%02x%02x",
323 NIPQUAD(addr->sin_addr.s_addr));
324 }
325 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = buf;
326
327 buf = kzalloc(8, GFP_KERNEL);
328 if (buf) {
329 snprintf(buf, 8, "%4hx",
330 ntohs(addr->sin_port));
331 }
332 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = buf;
756805e7
CL
333
334 buf = kzalloc(30, GFP_KERNEL);
335 if (buf) {
336 snprintf(buf, 30, NIPQUAD_FMT".%u.%u",
337 NIPQUAD(addr->sin_addr.s_addr),
338 ntohs(addr->sin_port) >> 8,
339 ntohs(addr->sin_port) & 0xff);
340 }
341 xprt->address_strings[RPC_DISPLAY_UNIVERSAL_ADDR] = buf;
4417c8c4
TT
342
343 xprt->address_strings[RPC_DISPLAY_NETID] =
344 kstrdup(xprt->prot == IPPROTO_UDP ?
345 RPCBIND_NETID_UDP : RPCBIND_NETID_TCP, GFP_KERNEL);
edb267a6
CL
346}
347
4b6473fb
CL
348static void xs_format_ipv6_peer_addresses(struct rpc_xprt *xprt)
349{
95392c59 350 struct sockaddr_in6 *addr = xs_addr_in6(xprt);
4b6473fb
CL
351 char *buf;
352
353 buf = kzalloc(40, GFP_KERNEL);
354 if (buf) {
355 snprintf(buf, 40, NIP6_FMT,
356 NIP6(addr->sin6_addr));
357 }
358 xprt->address_strings[RPC_DISPLAY_ADDR] = buf;
359
360 buf = kzalloc(8, GFP_KERNEL);
361 if (buf) {
362 snprintf(buf, 8, "%u",
363 ntohs(addr->sin6_port));
364 }
365 xprt->address_strings[RPC_DISPLAY_PORT] = buf;
366
367 buf = kzalloc(8, GFP_KERNEL);
368 if (buf) {
369 if (xprt->prot == IPPROTO_UDP)
370 snprintf(buf, 8, "udp");
371 else
372 snprintf(buf, 8, "tcp");
373 }
374 xprt->address_strings[RPC_DISPLAY_PROTO] = buf;
375
376 buf = kzalloc(64, GFP_KERNEL);
377 if (buf) {
378 snprintf(buf, 64, "addr="NIP6_FMT" port=%u proto=%s",
379 NIP6(addr->sin6_addr),
380 ntohs(addr->sin6_port),
381 xprt->prot == IPPROTO_UDP ? "udp" : "tcp");
382 }
383 xprt->address_strings[RPC_DISPLAY_ALL] = buf;
384
385 buf = kzalloc(36, GFP_KERNEL);
386 if (buf) {
387 snprintf(buf, 36, NIP6_SEQFMT,
388 NIP6(addr->sin6_addr));
389 }
390 xprt->address_strings[RPC_DISPLAY_HEX_ADDR] = buf;
391
392 buf = kzalloc(8, GFP_KERNEL);
393 if (buf) {
394 snprintf(buf, 8, "%4hx",
395 ntohs(addr->sin6_port));
396 }
397 xprt->address_strings[RPC_DISPLAY_HEX_PORT] = buf;
756805e7
CL
398
399 buf = kzalloc(50, GFP_KERNEL);
400 if (buf) {
401 snprintf(buf, 50, NIP6_FMT".%u.%u",
402 NIP6(addr->sin6_addr),
403 ntohs(addr->sin6_port) >> 8,
404 ntohs(addr->sin6_port) & 0xff);
405 }
406 xprt->address_strings[RPC_DISPLAY_UNIVERSAL_ADDR] = buf;
4417c8c4
TT
407
408 xprt->address_strings[RPC_DISPLAY_NETID] =
409 kstrdup(xprt->prot == IPPROTO_UDP ?
410 RPCBIND_NETID_UDP6 : RPCBIND_NETID_TCP6, GFP_KERNEL);
edb267a6
CL
411}
412
413static void xs_free_peer_addresses(struct rpc_xprt *xprt)
414{
0c43b3d8
CL
415 int i;
416
417 for (i = 0; i < RPC_DISPLAY_MAX; i++)
418 kfree(xprt->address_strings[i]);
edb267a6
CL
419}
420
b4b5cc85
CL
421#define XS_SENDMSG_FLAGS (MSG_DONTWAIT | MSG_NOSIGNAL)
422
24c5684b 423static int xs_send_kvec(struct socket *sock, struct sockaddr *addr, int addrlen, struct kvec *vec, unsigned int base, int more)
b4b5cc85 424{
b4b5cc85
CL
425 struct msghdr msg = {
426 .msg_name = addr,
427 .msg_namelen = addrlen,
24c5684b
TM
428 .msg_flags = XS_SENDMSG_FLAGS | (more ? MSG_MORE : 0),
429 };
430 struct kvec iov = {
431 .iov_base = vec->iov_base + base,
432 .iov_len = vec->iov_len - base,
b4b5cc85
CL
433 };
434
24c5684b 435 if (iov.iov_len != 0)
b4b5cc85
CL
436 return kernel_sendmsg(sock, &msg, &iov, 1, iov.iov_len);
437 return kernel_sendmsg(sock, &msg, NULL, 0, 0);
438}
439
24c5684b 440static int xs_send_pagedata(struct socket *sock, struct xdr_buf *xdr, unsigned int base, int more)
b4b5cc85 441{
24c5684b
TM
442 struct page **ppage;
443 unsigned int remainder;
444 int err, sent = 0;
445
446 remainder = xdr->page_len - base;
447 base += xdr->page_base;
448 ppage = xdr->pages + (base >> PAGE_SHIFT);
449 base &= ~PAGE_MASK;
450 for(;;) {
451 unsigned int len = min_t(unsigned int, PAGE_SIZE - base, remainder);
452 int flags = XS_SENDMSG_FLAGS;
b4b5cc85 453
24c5684b
TM
454 remainder -= len;
455 if (remainder != 0 || more)
456 flags |= MSG_MORE;
457 err = sock->ops->sendpage(sock, *ppage, base, len, flags);
458 if (remainder == 0 || err != len)
459 break;
460 sent += err;
461 ppage++;
462 base = 0;
463 }
464 if (sent == 0)
465 return err;
466 if (err > 0)
467 sent += err;
468 return sent;
b4b5cc85
CL
469}
470
9903cd1c
CL
471/**
472 * xs_sendpages - write pages directly to a socket
473 * @sock: socket to send on
474 * @addr: UDP only -- address of destination
475 * @addrlen: UDP only -- length of destination address
476 * @xdr: buffer containing this request
477 * @base: starting position in the buffer
478 *
a246b010 479 */
24c5684b 480static int xs_sendpages(struct socket *sock, struct sockaddr *addr, int addrlen, struct xdr_buf *xdr, unsigned int base)
a246b010 481{
24c5684b
TM
482 unsigned int remainder = xdr->len - base;
483 int err, sent = 0;
a246b010 484
262965f5
CL
485 if (unlikely(!sock))
486 return -ENOTCONN;
487
488 clear_bit(SOCK_ASYNC_NOSPACE, &sock->flags);
24c5684b
TM
489 if (base != 0) {
490 addr = NULL;
491 addrlen = 0;
492 }
262965f5 493
24c5684b
TM
494 if (base < xdr->head[0].iov_len || addr != NULL) {
495 unsigned int len = xdr->head[0].iov_len - base;
496 remainder -= len;
497 err = xs_send_kvec(sock, addr, addrlen, &xdr->head[0], base, remainder != 0);
498 if (remainder == 0 || err != len)
a246b010 499 goto out;
24c5684b 500 sent += err;
a246b010
CL
501 base = 0;
502 } else
24c5684b 503 base -= xdr->head[0].iov_len;
a246b010 504
24c5684b
TM
505 if (base < xdr->page_len) {
506 unsigned int len = xdr->page_len - base;
507 remainder -= len;
508 err = xs_send_pagedata(sock, xdr, base, remainder != 0);
509 if (remainder == 0 || err != len)
a246b010 510 goto out;
24c5684b 511 sent += err;
a246b010 512 base = 0;
24c5684b
TM
513 } else
514 base -= xdr->page_len;
515
516 if (base >= xdr->tail[0].iov_len)
517 return sent;
518 err = xs_send_kvec(sock, NULL, 0, &xdr->tail[0], base, 0);
a246b010 519out:
24c5684b
TM
520 if (sent == 0)
521 return err;
522 if (err > 0)
523 sent += err;
524 return sent;
a246b010
CL
525}
526
9903cd1c 527/**
262965f5
CL
528 * xs_nospace - place task on wait queue if transmit was incomplete
529 * @task: task to put to sleep
9903cd1c 530 *
a246b010 531 */
262965f5 532static void xs_nospace(struct rpc_task *task)
a246b010 533{
262965f5
CL
534 struct rpc_rqst *req = task->tk_rqstp;
535 struct rpc_xprt *xprt = req->rq_xprt;
ee0ac0c2 536 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
a246b010 537
46121cf7 538 dprintk("RPC: %5u xmit incomplete (%u left of %u)\n",
262965f5
CL
539 task->tk_pid, req->rq_slen - req->rq_bytes_sent,
540 req->rq_slen);
541
ee0ac0c2 542 if (test_bit(SOCK_ASYNC_NOSPACE, &transport->sock->flags)) {
262965f5
CL
543 /* Protect against races with write_space */
544 spin_lock_bh(&xprt->transport_lock);
545
546 /* Don't race with disconnect */
547 if (!xprt_connected(xprt))
548 task->tk_status = -ENOTCONN;
ee0ac0c2 549 else if (test_bit(SOCK_NOSPACE, &transport->sock->flags))
262965f5
CL
550 xprt_wait_for_buffer_space(task);
551
552 spin_unlock_bh(&xprt->transport_lock);
553 } else
554 /* Keep holding the socket if it is blocked */
555 rpc_delay(task, HZ>>4);
556}
557
558/**
559 * xs_udp_send_request - write an RPC request to a UDP socket
560 * @task: address of RPC task that manages the state of an RPC request
561 *
562 * Return values:
563 * 0: The request has been sent
564 * EAGAIN: The socket was blocked, please call again later to
565 * complete the request
566 * ENOTCONN: Caller needs to invoke connect logic then call again
567 * other: Some other error occured, the request was not sent
568 */
569static int xs_udp_send_request(struct rpc_task *task)
570{
571 struct rpc_rqst *req = task->tk_rqstp;
572 struct rpc_xprt *xprt = req->rq_xprt;
ee0ac0c2 573 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
262965f5
CL
574 struct xdr_buf *xdr = &req->rq_snd_buf;
575 int status;
a246b010 576
9903cd1c 577 xs_pktdump("packet data:",
a246b010
CL
578 req->rq_svec->iov_base,
579 req->rq_svec->iov_len);
580
262965f5 581 req->rq_xtime = jiffies;
ee0ac0c2 582 status = xs_sendpages(transport->sock,
95392c59 583 xs_addr(xprt),
ee0ac0c2
CL
584 xprt->addrlen, xdr,
585 req->rq_bytes_sent);
a246b010 586
46121cf7 587 dprintk("RPC: xs_udp_send_request(%u) = %d\n",
262965f5 588 xdr->len - req->rq_bytes_sent, status);
a246b010 589
2199700f
TM
590 if (status >= 0) {
591 task->tk_bytes_sent += status;
592 if (status >= req->rq_slen)
593 return 0;
594 /* Still some bytes left; set up for a retry later. */
262965f5 595 status = -EAGAIN;
2199700f 596 }
a246b010 597
262965f5
CL
598 switch (status) {
599 case -ENETUNREACH:
600 case -EPIPE:
a246b010
CL
601 case -ECONNREFUSED:
602 /* When the server has died, an ICMP port unreachable message
9903cd1c 603 * prompts ECONNREFUSED. */
a246b010 604 break;
262965f5
CL
605 case -EAGAIN:
606 xs_nospace(task);
a246b010
CL
607 break;
608 default:
46121cf7 609 dprintk("RPC: sendmsg returned unrecognized error %d\n",
262965f5 610 -status);
9903cd1c 611 break;
a246b010 612 }
262965f5
CL
613
614 return status;
a246b010
CL
615}
616
e06799f9
TM
617/**
618 * xs_tcp_shutdown - gracefully shut down a TCP socket
619 * @xprt: transport
620 *
621 * Initiates a graceful shutdown of the TCP socket by calling the
622 * equivalent of shutdown(SHUT_WR);
623 */
624static void xs_tcp_shutdown(struct rpc_xprt *xprt)
625{
626 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
627 struct socket *sock = transport->sock;
628
629 if (sock != NULL)
630 kernel_sock_shutdown(sock, SHUT_WR);
631}
632
808012fb
CL
633static inline void xs_encode_tcp_record_marker(struct xdr_buf *buf)
634{
635 u32 reclen = buf->len - sizeof(rpc_fraghdr);
636 rpc_fraghdr *base = buf->head[0].iov_base;
637 *base = htonl(RPC_LAST_STREAM_FRAGMENT | reclen);
638}
639
9903cd1c 640/**
262965f5 641 * xs_tcp_send_request - write an RPC request to a TCP socket
9903cd1c
CL
642 * @task: address of RPC task that manages the state of an RPC request
643 *
644 * Return values:
262965f5
CL
645 * 0: The request has been sent
646 * EAGAIN: The socket was blocked, please call again later to
647 * complete the request
648 * ENOTCONN: Caller needs to invoke connect logic then call again
649 * other: Some other error occured, the request was not sent
9903cd1c
CL
650 *
651 * XXX: In the case of soft timeouts, should we eventually give up
262965f5 652 * if sendmsg is not able to make progress?
9903cd1c 653 */
262965f5 654static int xs_tcp_send_request(struct rpc_task *task)
a246b010
CL
655{
656 struct rpc_rqst *req = task->tk_rqstp;
657 struct rpc_xprt *xprt = req->rq_xprt;
ee0ac0c2 658 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
262965f5 659 struct xdr_buf *xdr = &req->rq_snd_buf;
b595bb15
CL
660 int status;
661 unsigned int retry = 0;
a246b010 662
808012fb 663 xs_encode_tcp_record_marker(&req->rq_snd_buf);
a246b010 664
262965f5
CL
665 xs_pktdump("packet data:",
666 req->rq_svec->iov_base,
667 req->rq_svec->iov_len);
a246b010
CL
668
669 /* Continue transmitting the packet/record. We must be careful
670 * to cope with writespace callbacks arriving _after_ we have
262965f5 671 * called sendmsg(). */
a246b010
CL
672 while (1) {
673 req->rq_xtime = jiffies;
ee0ac0c2
CL
674 status = xs_sendpages(transport->sock,
675 NULL, 0, xdr, req->rq_bytes_sent);
a246b010 676
46121cf7 677 dprintk("RPC: xs_tcp_send_request(%u) = %d\n",
262965f5 678 xdr->len - req->rq_bytes_sent, status);
a246b010 679
262965f5 680 if (unlikely(status < 0))
a246b010 681 break;
a246b010 682
262965f5
CL
683 /* If we've sent the entire packet, immediately
684 * reset the count of bytes sent. */
685 req->rq_bytes_sent += status;
ef759a2e 686 task->tk_bytes_sent += status;
262965f5
CL
687 if (likely(req->rq_bytes_sent >= req->rq_slen)) {
688 req->rq_bytes_sent = 0;
689 return 0;
690 }
a246b010
CL
691
692 status = -EAGAIN;
262965f5 693 if (retry++ > XS_SENDMSG_RETRY)
a246b010
CL
694 break;
695 }
696
262965f5
CL
697 switch (status) {
698 case -EAGAIN:
699 xs_nospace(task);
700 break;
701 case -ECONNREFUSED:
702 case -ECONNRESET:
703 case -ENOTCONN:
704 case -EPIPE:
705 status = -ENOTCONN;
706 break;
707 default:
46121cf7 708 dprintk("RPC: sendmsg returned unrecognized error %d\n",
262965f5 709 -status);
e06799f9 710 xs_tcp_shutdown(xprt);
262965f5 711 break;
a246b010 712 }
262965f5 713
a246b010
CL
714 return status;
715}
716
e0ab53de
TM
717/**
718 * xs_tcp_release_xprt - clean up after a tcp transmission
719 * @xprt: transport
720 * @task: rpc task
721 *
722 * This cleans up if an error causes us to abort the transmission of a request.
723 * In this case, the socket may need to be reset in order to avoid confusing
724 * the server.
725 */
726static void xs_tcp_release_xprt(struct rpc_xprt *xprt, struct rpc_task *task)
727{
728 struct rpc_rqst *req;
729
730 if (task != xprt->snd_task)
731 return;
732 if (task == NULL)
733 goto out_release;
734 req = task->tk_rqstp;
735 if (req->rq_bytes_sent == 0)
736 goto out_release;
737 if (req->rq_bytes_sent == req->rq_snd_buf.len)
738 goto out_release;
739 set_bit(XPRT_CLOSE_WAIT, &task->tk_xprt->state);
740out_release:
741 xprt_release_xprt(xprt, task);
742}
743
9903cd1c
CL
744/**
745 * xs_close - close a socket
746 * @xprt: transport
747 *
3167e12c
CL
748 * This is used when all requests are complete; ie, no DRC state remains
749 * on the server we want to save.
a246b010 750 */
9903cd1c 751static void xs_close(struct rpc_xprt *xprt)
a246b010 752{
ee0ac0c2
CL
753 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
754 struct socket *sock = transport->sock;
755 struct sock *sk = transport->inet;
a246b010
CL
756
757 if (!sk)
632e3bdc 758 goto clear_close_wait;
a246b010 759
46121cf7 760 dprintk("RPC: xs_close xprt %p\n", xprt);
9903cd1c 761
a246b010 762 write_lock_bh(&sk->sk_callback_lock);
ee0ac0c2
CL
763 transport->inet = NULL;
764 transport->sock = NULL;
a246b010 765
9903cd1c 766 sk->sk_user_data = NULL;
314dfd79
CL
767 sk->sk_data_ready = transport->old_data_ready;
768 sk->sk_state_change = transport->old_state_change;
769 sk->sk_write_space = transport->old_write_space;
a246b010
CL
770 write_unlock_bh(&sk->sk_callback_lock);
771
9903cd1c 772 sk->sk_no_check = 0;
a246b010
CL
773
774 sock_release(sock);
632e3bdc
TM
775clear_close_wait:
776 smp_mb__before_clear_bit();
777 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
3b948ae5 778 clear_bit(XPRT_CLOSING, &xprt->state);
632e3bdc 779 smp_mb__after_clear_bit();
62da3b24 780 xprt_disconnect_done(xprt);
a246b010
CL
781}
782
9903cd1c
CL
783/**
784 * xs_destroy - prepare to shutdown a transport
785 * @xprt: doomed transport
786 *
787 */
788static void xs_destroy(struct rpc_xprt *xprt)
a246b010 789{
c8475461
CL
790 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
791
46121cf7 792 dprintk("RPC: xs_destroy xprt %p\n", xprt);
9903cd1c 793
c1384c9c 794 cancel_rearming_delayed_work(&transport->connect_worker);
a246b010 795
9903cd1c 796 xs_close(xprt);
edb267a6 797 xs_free_peer_addresses(xprt);
a246b010 798 kfree(xprt->slot);
c8541ecd 799 kfree(xprt);
bc25571e 800 module_put(THIS_MODULE);
a246b010
CL
801}
802
9903cd1c
CL
803static inline struct rpc_xprt *xprt_from_sock(struct sock *sk)
804{
805 return (struct rpc_xprt *) sk->sk_user_data;
806}
807
808/**
809 * xs_udp_data_ready - "data ready" callback for UDP sockets
810 * @sk: socket with data to read
811 * @len: how much data to read
812 *
a246b010 813 */
9903cd1c 814static void xs_udp_data_ready(struct sock *sk, int len)
a246b010 815{
9903cd1c
CL
816 struct rpc_task *task;
817 struct rpc_xprt *xprt;
a246b010 818 struct rpc_rqst *rovr;
9903cd1c 819 struct sk_buff *skb;
a246b010 820 int err, repsize, copied;
d8ed029d
AD
821 u32 _xid;
822 __be32 *xp;
a246b010
CL
823
824 read_lock(&sk->sk_callback_lock);
46121cf7 825 dprintk("RPC: xs_udp_data_ready...\n");
9903cd1c 826 if (!(xprt = xprt_from_sock(sk)))
a246b010 827 goto out;
a246b010
CL
828
829 if ((skb = skb_recv_datagram(sk, 0, 1, &err)) == NULL)
830 goto out;
831
832 if (xprt->shutdown)
833 goto dropit;
834
835 repsize = skb->len - sizeof(struct udphdr);
836 if (repsize < 4) {
46121cf7 837 dprintk("RPC: impossible RPC reply size %d!\n", repsize);
a246b010
CL
838 goto dropit;
839 }
840
841 /* Copy the XID from the skb... */
842 xp = skb_header_pointer(skb, sizeof(struct udphdr),
843 sizeof(_xid), &_xid);
844 if (xp == NULL)
845 goto dropit;
846
847 /* Look up and lock the request corresponding to the given XID */
4a0f8c04 848 spin_lock(&xprt->transport_lock);
a246b010
CL
849 rovr = xprt_lookup_rqst(xprt, *xp);
850 if (!rovr)
851 goto out_unlock;
852 task = rovr->rq_task;
853
a246b010
CL
854 if ((copied = rovr->rq_private_buf.buflen) > repsize)
855 copied = repsize;
856
857 /* Suck it into the iovec, verify checksum if not done by hw. */
1781f7f5
HX
858 if (csum_partial_copy_to_xdr(&rovr->rq_private_buf, skb)) {
859 UDPX_INC_STATS_BH(sk, UDP_MIB_INERRORS);
a246b010 860 goto out_unlock;
1781f7f5
HX
861 }
862
863 UDPX_INC_STATS_BH(sk, UDP_MIB_INDATAGRAMS);
a246b010
CL
864
865 /* Something worked... */
866 dst_confirm(skb->dst);
867
1570c1e4
CL
868 xprt_adjust_cwnd(task, copied);
869 xprt_update_rtt(task);
870 xprt_complete_rqst(task, copied);
a246b010
CL
871
872 out_unlock:
4a0f8c04 873 spin_unlock(&xprt->transport_lock);
a246b010
CL
874 dropit:
875 skb_free_datagram(sk, skb);
876 out:
877 read_unlock(&sk->sk_callback_lock);
878}
879
dd456471 880static inline void xs_tcp_read_fraghdr(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
a246b010 881{
51971139 882 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
a246b010
CL
883 size_t len, used;
884 char *p;
885
51971139
CL
886 p = ((char *) &transport->tcp_fraghdr) + transport->tcp_offset;
887 len = sizeof(transport->tcp_fraghdr) - transport->tcp_offset;
9d292316 888 used = xdr_skb_read_bits(desc, p, len);
51971139 889 transport->tcp_offset += used;
a246b010
CL
890 if (used != len)
891 return;
808012fb 892
51971139
CL
893 transport->tcp_reclen = ntohl(transport->tcp_fraghdr);
894 if (transport->tcp_reclen & RPC_LAST_STREAM_FRAGMENT)
e136d092 895 transport->tcp_flags |= TCP_RCV_LAST_FRAG;
a246b010 896 else
e136d092 897 transport->tcp_flags &= ~TCP_RCV_LAST_FRAG;
51971139 898 transport->tcp_reclen &= RPC_FRAGMENT_SIZE_MASK;
808012fb 899
e136d092 900 transport->tcp_flags &= ~TCP_RCV_COPY_FRAGHDR;
51971139 901 transport->tcp_offset = 0;
808012fb 902
a246b010 903 /* Sanity check of the record length */
51971139 904 if (unlikely(transport->tcp_reclen < 4)) {
46121cf7 905 dprintk("RPC: invalid TCP record fragment length\n");
3ebb067d 906 xprt_force_disconnect(xprt);
9903cd1c 907 return;
a246b010 908 }
46121cf7 909 dprintk("RPC: reading TCP record fragment of length %d\n",
51971139 910 transport->tcp_reclen);
a246b010
CL
911}
912
51971139 913static void xs_tcp_check_fraghdr(struct sock_xprt *transport)
a246b010 914{
51971139 915 if (transport->tcp_offset == transport->tcp_reclen) {
e136d092 916 transport->tcp_flags |= TCP_RCV_COPY_FRAGHDR;
51971139 917 transport->tcp_offset = 0;
e136d092
CL
918 if (transport->tcp_flags & TCP_RCV_LAST_FRAG) {
919 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
920 transport->tcp_flags |= TCP_RCV_COPY_XID;
51971139 921 transport->tcp_copied = 0;
a246b010
CL
922 }
923 }
924}
925
dd456471 926static inline void xs_tcp_read_xid(struct sock_xprt *transport, struct xdr_skb_reader *desc)
a246b010
CL
927{
928 size_t len, used;
929 char *p;
930
51971139 931 len = sizeof(transport->tcp_xid) - transport->tcp_offset;
46121cf7 932 dprintk("RPC: reading XID (%Zu bytes)\n", len);
51971139 933 p = ((char *) &transport->tcp_xid) + transport->tcp_offset;
9d292316 934 used = xdr_skb_read_bits(desc, p, len);
51971139 935 transport->tcp_offset += used;
a246b010
CL
936 if (used != len)
937 return;
e136d092
CL
938 transport->tcp_flags &= ~TCP_RCV_COPY_XID;
939 transport->tcp_flags |= TCP_RCV_COPY_DATA;
51971139 940 transport->tcp_copied = 4;
46121cf7 941 dprintk("RPC: reading reply for XID %08x\n",
51971139
CL
942 ntohl(transport->tcp_xid));
943 xs_tcp_check_fraghdr(transport);
a246b010
CL
944}
945
dd456471 946static inline void xs_tcp_read_request(struct rpc_xprt *xprt, struct xdr_skb_reader *desc)
a246b010 947{
51971139 948 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
a246b010
CL
949 struct rpc_rqst *req;
950 struct xdr_buf *rcvbuf;
951 size_t len;
952 ssize_t r;
953
954 /* Find and lock the request corresponding to this xid */
4a0f8c04 955 spin_lock(&xprt->transport_lock);
51971139 956 req = xprt_lookup_rqst(xprt, transport->tcp_xid);
a246b010 957 if (!req) {
e136d092 958 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
46121cf7 959 dprintk("RPC: XID %08x request not found!\n",
51971139 960 ntohl(transport->tcp_xid));
4a0f8c04 961 spin_unlock(&xprt->transport_lock);
a246b010
CL
962 return;
963 }
964
965 rcvbuf = &req->rq_private_buf;
966 len = desc->count;
51971139 967 if (len > transport->tcp_reclen - transport->tcp_offset) {
dd456471 968 struct xdr_skb_reader my_desc;
a246b010 969
51971139 970 len = transport->tcp_reclen - transport->tcp_offset;
a246b010
CL
971 memcpy(&my_desc, desc, sizeof(my_desc));
972 my_desc.count = len;
51971139 973 r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
9d292316 974 &my_desc, xdr_skb_read_bits);
a246b010
CL
975 desc->count -= r;
976 desc->offset += r;
977 } else
51971139 978 r = xdr_partial_copy_from_skb(rcvbuf, transport->tcp_copied,
9d292316 979 desc, xdr_skb_read_bits);
a246b010
CL
980
981 if (r > 0) {
51971139
CL
982 transport->tcp_copied += r;
983 transport->tcp_offset += r;
a246b010
CL
984 }
985 if (r != len) {
986 /* Error when copying to the receive buffer,
987 * usually because we weren't able to allocate
988 * additional buffer pages. All we can do now
e136d092 989 * is turn off TCP_RCV_COPY_DATA, so the request
a246b010
CL
990 * will not receive any additional updates,
991 * and time out.
992 * Any remaining data from this record will
993 * be discarded.
994 */
e136d092 995 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
46121cf7 996 dprintk("RPC: XID %08x truncated request\n",
51971139 997 ntohl(transport->tcp_xid));
46121cf7
CL
998 dprintk("RPC: xprt = %p, tcp_copied = %lu, "
999 "tcp_offset = %u, tcp_reclen = %u\n",
1000 xprt, transport->tcp_copied,
1001 transport->tcp_offset, transport->tcp_reclen);
a246b010
CL
1002 goto out;
1003 }
1004
46121cf7 1005 dprintk("RPC: XID %08x read %Zd bytes\n",
51971139 1006 ntohl(transport->tcp_xid), r);
46121cf7
CL
1007 dprintk("RPC: xprt = %p, tcp_copied = %lu, tcp_offset = %u, "
1008 "tcp_reclen = %u\n", xprt, transport->tcp_copied,
1009 transport->tcp_offset, transport->tcp_reclen);
51971139
CL
1010
1011 if (transport->tcp_copied == req->rq_private_buf.buflen)
e136d092 1012 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
51971139 1013 else if (transport->tcp_offset == transport->tcp_reclen) {
e136d092
CL
1014 if (transport->tcp_flags & TCP_RCV_LAST_FRAG)
1015 transport->tcp_flags &= ~TCP_RCV_COPY_DATA;
a246b010
CL
1016 }
1017
1018out:
e136d092 1019 if (!(transport->tcp_flags & TCP_RCV_COPY_DATA))
51971139 1020 xprt_complete_rqst(req->rq_task, transport->tcp_copied);
4a0f8c04 1021 spin_unlock(&xprt->transport_lock);
51971139 1022 xs_tcp_check_fraghdr(transport);
a246b010
CL
1023}
1024
dd456471 1025static inline void xs_tcp_read_discard(struct sock_xprt *transport, struct xdr_skb_reader *desc)
a246b010
CL
1026{
1027 size_t len;
1028
51971139 1029 len = transport->tcp_reclen - transport->tcp_offset;
a246b010
CL
1030 if (len > desc->count)
1031 len = desc->count;
1032 desc->count -= len;
1033 desc->offset += len;
51971139 1034 transport->tcp_offset += len;
46121cf7 1035 dprintk("RPC: discarded %Zu bytes\n", len);
51971139 1036 xs_tcp_check_fraghdr(transport);
a246b010
CL
1037}
1038
9903cd1c 1039static int xs_tcp_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb, unsigned int offset, size_t len)
a246b010
CL
1040{
1041 struct rpc_xprt *xprt = rd_desc->arg.data;
51971139 1042 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
dd456471 1043 struct xdr_skb_reader desc = {
a246b010
CL
1044 .skb = skb,
1045 .offset = offset,
1046 .count = len,
9903cd1c 1047 };
a246b010 1048
46121cf7 1049 dprintk("RPC: xs_tcp_data_recv started\n");
a246b010
CL
1050 do {
1051 /* Read in a new fragment marker if necessary */
1052 /* Can we ever really expect to get completely empty fragments? */
e136d092 1053 if (transport->tcp_flags & TCP_RCV_COPY_FRAGHDR) {
9903cd1c 1054 xs_tcp_read_fraghdr(xprt, &desc);
a246b010
CL
1055 continue;
1056 }
1057 /* Read in the xid if necessary */
e136d092 1058 if (transport->tcp_flags & TCP_RCV_COPY_XID) {
51971139 1059 xs_tcp_read_xid(transport, &desc);
a246b010
CL
1060 continue;
1061 }
1062 /* Read in the request data */
e136d092 1063 if (transport->tcp_flags & TCP_RCV_COPY_DATA) {
9903cd1c 1064 xs_tcp_read_request(xprt, &desc);
a246b010
CL
1065 continue;
1066 }
1067 /* Skip over any trailing bytes on short reads */
51971139 1068 xs_tcp_read_discard(transport, &desc);
a246b010 1069 } while (desc.count);
46121cf7 1070 dprintk("RPC: xs_tcp_data_recv done\n");
a246b010
CL
1071 return len - desc.count;
1072}
1073
9903cd1c
CL
1074/**
1075 * xs_tcp_data_ready - "data ready" callback for TCP sockets
1076 * @sk: socket with data to read
1077 * @bytes: how much data to read
1078 *
1079 */
1080static void xs_tcp_data_ready(struct sock *sk, int bytes)
a246b010
CL
1081{
1082 struct rpc_xprt *xprt;
1083 read_descriptor_t rd_desc;
1084
46121cf7
CL
1085 dprintk("RPC: xs_tcp_data_ready...\n");
1086
a246b010 1087 read_lock(&sk->sk_callback_lock);
9903cd1c 1088 if (!(xprt = xprt_from_sock(sk)))
a246b010 1089 goto out;
a246b010
CL
1090 if (xprt->shutdown)
1091 goto out;
1092
9903cd1c 1093 /* We use rd_desc to pass struct xprt to xs_tcp_data_recv */
a246b010
CL
1094 rd_desc.arg.data = xprt;
1095 rd_desc.count = 65536;
9903cd1c 1096 tcp_read_sock(sk, &rd_desc, xs_tcp_data_recv);
a246b010
CL
1097out:
1098 read_unlock(&sk->sk_callback_lock);
1099}
1100
9903cd1c
CL
1101/**
1102 * xs_tcp_state_change - callback to handle TCP socket state changes
1103 * @sk: socket whose state has changed
1104 *
1105 */
1106static void xs_tcp_state_change(struct sock *sk)
a246b010 1107{
9903cd1c 1108 struct rpc_xprt *xprt;
a246b010
CL
1109
1110 read_lock(&sk->sk_callback_lock);
1111 if (!(xprt = xprt_from_sock(sk)))
1112 goto out;
46121cf7
CL
1113 dprintk("RPC: xs_tcp_state_change client %p...\n", xprt);
1114 dprintk("RPC: state %x conn %d dead %d zapped %d\n",
1115 sk->sk_state, xprt_connected(xprt),
1116 sock_flag(sk, SOCK_DEAD),
1117 sock_flag(sk, SOCK_ZAPPED));
a246b010
CL
1118
1119 switch (sk->sk_state) {
1120 case TCP_ESTABLISHED:
4a0f8c04 1121 spin_lock_bh(&xprt->transport_lock);
a246b010 1122 if (!xprt_test_and_set_connected(xprt)) {
51971139
CL
1123 struct sock_xprt *transport = container_of(xprt,
1124 struct sock_xprt, xprt);
1125
a246b010 1126 /* Reset TCP record info */
51971139
CL
1127 transport->tcp_offset = 0;
1128 transport->tcp_reclen = 0;
1129 transport->tcp_copied = 0;
e136d092
CL
1130 transport->tcp_flags =
1131 TCP_RCV_COPY_FRAGHDR | TCP_RCV_COPY_XID;
51971139 1132
44fbac22 1133 xprt_wake_pending_tasks(xprt, 0);
a246b010 1134 }
4a0f8c04 1135 spin_unlock_bh(&xprt->transport_lock);
a246b010 1136 break;
3b948ae5
TM
1137 case TCP_FIN_WAIT1:
1138 /* The client initiated a shutdown of the socket */
663b8858 1139 xprt->reestablish_timeout = 0;
3b948ae5
TM
1140 set_bit(XPRT_CLOSING, &xprt->state);
1141 smp_mb__before_clear_bit();
1142 clear_bit(XPRT_CONNECTED, &xprt->state);
ef803670 1143 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
3b948ae5 1144 smp_mb__after_clear_bit();
a246b010 1145 break;
632e3bdc 1146 case TCP_CLOSE_WAIT:
3b948ae5
TM
1147 /* The server initiated a shutdown of the socket */
1148 set_bit(XPRT_CLOSING, &xprt->state);
66af1e55 1149 xprt_force_disconnect(xprt);
663b8858
TM
1150 case TCP_SYN_SENT:
1151 case TCP_CLOSING:
1152 /*
1153 * If the server closed down the connection, make sure that
1154 * we back off before reconnecting
1155 */
1156 if (xprt->reestablish_timeout < XS_TCP_INIT_REEST_TO)
1157 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
3b948ae5
TM
1158 break;
1159 case TCP_LAST_ACK:
1160 smp_mb__before_clear_bit();
1161 clear_bit(XPRT_CONNECTED, &xprt->state);
1162 smp_mb__after_clear_bit();
1163 break;
1164 case TCP_CLOSE:
1165 smp_mb__before_clear_bit();
ef803670 1166 clear_bit(XPRT_CLOSE_WAIT, &xprt->state);
3b948ae5
TM
1167 clear_bit(XPRT_CLOSING, &xprt->state);
1168 smp_mb__after_clear_bit();
1169 /* Mark transport as closed and wake up all pending tasks */
62da3b24 1170 xprt_disconnect_done(xprt);
a246b010
CL
1171 }
1172 out:
1173 read_unlock(&sk->sk_callback_lock);
1174}
1175
9903cd1c 1176/**
c7b2cae8
CL
1177 * xs_udp_write_space - callback invoked when socket buffer space
1178 * becomes available
9903cd1c
CL
1179 * @sk: socket whose state has changed
1180 *
a246b010
CL
1181 * Called when more output buffer space is available for this socket.
1182 * We try not to wake our writers until they can make "significant"
c7b2cae8 1183 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
a246b010
CL
1184 * with a bunch of small requests.
1185 */
c7b2cae8 1186static void xs_udp_write_space(struct sock *sk)
a246b010 1187{
a246b010 1188 read_lock(&sk->sk_callback_lock);
a246b010 1189
c7b2cae8
CL
1190 /* from net/core/sock.c:sock_def_write_space */
1191 if (sock_writeable(sk)) {
1192 struct socket *sock;
1193 struct rpc_xprt *xprt;
1194
1195 if (unlikely(!(sock = sk->sk_socket)))
a246b010 1196 goto out;
c7b2cae8
CL
1197 if (unlikely(!(xprt = xprt_from_sock(sk))))
1198 goto out;
1199 if (unlikely(!test_and_clear_bit(SOCK_NOSPACE, &sock->flags)))
a246b010 1200 goto out;
c7b2cae8
CL
1201
1202 xprt_write_space(xprt);
a246b010
CL
1203 }
1204
c7b2cae8
CL
1205 out:
1206 read_unlock(&sk->sk_callback_lock);
1207}
a246b010 1208
c7b2cae8
CL
1209/**
1210 * xs_tcp_write_space - callback invoked when socket buffer space
1211 * becomes available
1212 * @sk: socket whose state has changed
1213 *
1214 * Called when more output buffer space is available for this socket.
1215 * We try not to wake our writers until they can make "significant"
1216 * progress, otherwise we'll waste resources thrashing kernel_sendmsg
1217 * with a bunch of small requests.
1218 */
1219static void xs_tcp_write_space(struct sock *sk)
1220{
1221 read_lock(&sk->sk_callback_lock);
1222
1223 /* from net/core/stream.c:sk_stream_write_space */
1224 if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk)) {
1225 struct socket *sock;
1226 struct rpc_xprt *xprt;
1227
1228 if (unlikely(!(sock = sk->sk_socket)))
1229 goto out;
1230 if (unlikely(!(xprt = xprt_from_sock(sk))))
1231 goto out;
1232 if (unlikely(!test_and_clear_bit(SOCK_NOSPACE, &sock->flags)))
1233 goto out;
1234
1235 xprt_write_space(xprt);
1236 }
1237
1238 out:
a246b010
CL
1239 read_unlock(&sk->sk_callback_lock);
1240}
1241
470056c2 1242static void xs_udp_do_set_buffer_size(struct rpc_xprt *xprt)
a246b010 1243{
ee0ac0c2
CL
1244 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1245 struct sock *sk = transport->inet;
a246b010 1246
7c6e066e 1247 if (transport->rcvsize) {
a246b010 1248 sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
7c6e066e 1249 sk->sk_rcvbuf = transport->rcvsize * xprt->max_reqs * 2;
a246b010 1250 }
7c6e066e 1251 if (transport->sndsize) {
a246b010 1252 sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
7c6e066e 1253 sk->sk_sndbuf = transport->sndsize * xprt->max_reqs * 2;
a246b010
CL
1254 sk->sk_write_space(sk);
1255 }
1256}
1257
43118c29 1258/**
470056c2 1259 * xs_udp_set_buffer_size - set send and receive limits
43118c29 1260 * @xprt: generic transport
470056c2
CL
1261 * @sndsize: requested size of send buffer, in bytes
1262 * @rcvsize: requested size of receive buffer, in bytes
43118c29 1263 *
470056c2 1264 * Set socket send and receive buffer size limits.
43118c29 1265 */
470056c2 1266static void xs_udp_set_buffer_size(struct rpc_xprt *xprt, size_t sndsize, size_t rcvsize)
43118c29 1267{
7c6e066e
CL
1268 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1269
1270 transport->sndsize = 0;
470056c2 1271 if (sndsize)
7c6e066e
CL
1272 transport->sndsize = sndsize + 1024;
1273 transport->rcvsize = 0;
470056c2 1274 if (rcvsize)
7c6e066e 1275 transport->rcvsize = rcvsize + 1024;
470056c2
CL
1276
1277 xs_udp_do_set_buffer_size(xprt);
43118c29
CL
1278}
1279
46c0ee8b
CL
1280/**
1281 * xs_udp_timer - called when a retransmit timeout occurs on a UDP transport
1282 * @task: task that timed out
1283 *
1284 * Adjust the congestion window after a retransmit timeout has occurred.
1285 */
1286static void xs_udp_timer(struct rpc_task *task)
1287{
1288 xprt_adjust_cwnd(task, -ETIMEDOUT);
1289}
1290
b85d8806
CL
1291static unsigned short xs_get_random_port(void)
1292{
1293 unsigned short range = xprt_max_resvport - xprt_min_resvport;
1294 unsigned short rand = (unsigned short) net_random() % range;
1295 return rand + xprt_min_resvport;
1296}
1297
92200412
CL
1298/**
1299 * xs_set_port - reset the port number in the remote endpoint address
1300 * @xprt: generic transport
1301 * @port: new port number
1302 *
1303 */
1304static void xs_set_port(struct rpc_xprt *xprt, unsigned short port)
1305{
95392c59 1306 struct sockaddr *addr = xs_addr(xprt);
c4efcb1d 1307
46121cf7 1308 dprintk("RPC: setting port for xprt %p to %u\n", xprt, port);
c4efcb1d 1309
20612005
CL
1310 switch (addr->sa_family) {
1311 case AF_INET:
1312 ((struct sockaddr_in *)addr)->sin_port = htons(port);
1313 break;
1314 case AF_INET6:
1315 ((struct sockaddr_in6 *)addr)->sin6_port = htons(port);
1316 break;
1317 default:
1318 BUG();
1319 }
92200412
CL
1320}
1321
67a391d7
TM
1322static unsigned short xs_get_srcport(struct sock_xprt *transport, struct socket *sock)
1323{
1324 unsigned short port = transport->port;
1325
1326 if (port == 0 && transport->xprt.resvport)
1327 port = xs_get_random_port();
1328 return port;
1329}
1330
1331static unsigned short xs_next_srcport(struct sock_xprt *transport, struct socket *sock, unsigned short port)
1332{
1333 if (transport->port != 0)
1334 transport->port = 0;
1335 if (!transport->xprt.resvport)
1336 return 0;
1337 if (port <= xprt_min_resvport || port > xprt_max_resvport)
1338 return xprt_max_resvport;
1339 return --port;
1340}
1341
7dc753f0 1342static int xs_bind4(struct sock_xprt *transport, struct socket *sock)
a246b010
CL
1343{
1344 struct sockaddr_in myaddr = {
1345 .sin_family = AF_INET,
1346 };
d3bc9a1d 1347 struct sockaddr_in *sa;
67a391d7
TM
1348 int err, nloop = 0;
1349 unsigned short port = xs_get_srcport(transport, sock);
1350 unsigned short last;
a246b010 1351
d3bc9a1d
FM
1352 sa = (struct sockaddr_in *)&transport->addr;
1353 myaddr.sin_addr = sa->sin_addr;
a246b010
CL
1354 do {
1355 myaddr.sin_port = htons(port);
e6242e92 1356 err = kernel_bind(sock, (struct sockaddr *) &myaddr,
a246b010 1357 sizeof(myaddr));
67a391d7 1358 if (port == 0)
d3bc9a1d 1359 break;
a246b010 1360 if (err == 0) {
c8475461 1361 transport->port = port;
d3bc9a1d 1362 break;
a246b010 1363 }
67a391d7
TM
1364 last = port;
1365 port = xs_next_srcport(transport, sock, port);
1366 if (port > last)
1367 nloop++;
1368 } while (err == -EADDRINUSE && nloop != 2);
7dc753f0
CL
1369 dprintk("RPC: %s "NIPQUAD_FMT":%u: %s (%d)\n",
1370 __FUNCTION__, NIPQUAD(myaddr.sin_addr),
1371 port, err ? "failed" : "ok", err);
a246b010
CL
1372 return err;
1373}
1374
90058d37
CL
1375static int xs_bind6(struct sock_xprt *transport, struct socket *sock)
1376{
1377 struct sockaddr_in6 myaddr = {
1378 .sin6_family = AF_INET6,
1379 };
1380 struct sockaddr_in6 *sa;
67a391d7
TM
1381 int err, nloop = 0;
1382 unsigned short port = xs_get_srcport(transport, sock);
1383 unsigned short last;
90058d37 1384
90058d37
CL
1385 sa = (struct sockaddr_in6 *)&transport->addr;
1386 myaddr.sin6_addr = sa->sin6_addr;
1387 do {
1388 myaddr.sin6_port = htons(port);
1389 err = kernel_bind(sock, (struct sockaddr *) &myaddr,
1390 sizeof(myaddr));
67a391d7 1391 if (port == 0)
90058d37
CL
1392 break;
1393 if (err == 0) {
1394 transport->port = port;
1395 break;
1396 }
67a391d7
TM
1397 last = port;
1398 port = xs_next_srcport(transport, sock, port);
1399 if (port > last)
1400 nloop++;
1401 } while (err == -EADDRINUSE && nloop != 2);
90058d37
CL
1402 dprintk("RPC: xs_bind6 "NIP6_FMT":%u: %s (%d)\n",
1403 NIP6(myaddr.sin6_addr), port, err ? "failed" : "ok", err);
a246b010
CL
1404 return err;
1405}
1406
ed07536e
PZ
1407#ifdef CONFIG_DEBUG_LOCK_ALLOC
1408static struct lock_class_key xs_key[2];
1409static struct lock_class_key xs_slock_key[2];
1410
8945ee5e 1411static inline void xs_reclassify_socket4(struct socket *sock)
ed07536e
PZ
1412{
1413 struct sock *sk = sock->sk;
8945ee5e 1414
02b3d346 1415 BUG_ON(sock_owned_by_user(sk));
8945ee5e
CL
1416 sock_lock_init_class_and_name(sk, "slock-AF_INET-RPC",
1417 &xs_slock_key[0], "sk_lock-AF_INET-RPC", &xs_key[0]);
1418}
ed07536e 1419
8945ee5e
CL
1420static inline void xs_reclassify_socket6(struct socket *sock)
1421{
1422 struct sock *sk = sock->sk;
ed07536e 1423
f4921aff 1424 BUG_ON(sock_owned_by_user(sk));
8945ee5e
CL
1425 sock_lock_init_class_and_name(sk, "slock-AF_INET6-RPC",
1426 &xs_slock_key[1], "sk_lock-AF_INET6-RPC", &xs_key[1]);
ed07536e
PZ
1427}
1428#else
8945ee5e
CL
1429static inline void xs_reclassify_socket4(struct socket *sock)
1430{
1431}
1432
1433static inline void xs_reclassify_socket6(struct socket *sock)
ed07536e
PZ
1434{
1435}
1436#endif
1437
16be2d20
CL
1438static void xs_udp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
1439{
1440 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1441
1442 if (!transport->inet) {
1443 struct sock *sk = sock->sk;
1444
1445 write_lock_bh(&sk->sk_callback_lock);
1446
1447 sk->sk_user_data = xprt;
1448 transport->old_data_ready = sk->sk_data_ready;
1449 transport->old_state_change = sk->sk_state_change;
1450 transport->old_write_space = sk->sk_write_space;
1451 sk->sk_data_ready = xs_udp_data_ready;
1452 sk->sk_write_space = xs_udp_write_space;
1453 sk->sk_no_check = UDP_CSUM_NORCV;
1454 sk->sk_allocation = GFP_ATOMIC;
1455
1456 xprt_set_connected(xprt);
1457
1458 /* Reset to new socket */
1459 transport->sock = sock;
1460 transport->inet = sk;
1461
1462 write_unlock_bh(&sk->sk_callback_lock);
1463 }
1464 xs_udp_do_set_buffer_size(xprt);
1465}
1466
b0d93ad5 1467/**
9c3d72de 1468 * xs_udp_connect_worker4 - set up a UDP socket
65f27f38 1469 * @work: RPC transport to connect
b0d93ad5
CL
1470 *
1471 * Invoked by a work queue tasklet.
1472 */
9c3d72de 1473static void xs_udp_connect_worker4(struct work_struct *work)
a246b010 1474{
34161db6
TM
1475 struct sock_xprt *transport =
1476 container_of(work, struct sock_xprt, connect_worker.work);
c8475461 1477 struct rpc_xprt *xprt = &transport->xprt;
ee0ac0c2 1478 struct socket *sock = transport->sock;
b0d93ad5 1479 int err, status = -EIO;
9903cd1c 1480
ec739ef0 1481 if (xprt->shutdown || !xprt_bound(xprt))
b0d93ad5 1482 goto out;
9903cd1c 1483
b0d93ad5
CL
1484 /* Start by resetting any existing state */
1485 xs_close(xprt);
9903cd1c 1486
b0d93ad5 1487 if ((err = sock_create_kern(PF_INET, SOCK_DGRAM, IPPROTO_UDP, &sock)) < 0) {
46121cf7 1488 dprintk("RPC: can't create UDP transport socket (%d).\n", -err);
b0d93ad5
CL
1489 goto out;
1490 }
8945ee5e 1491 xs_reclassify_socket4(sock);
9903cd1c 1492
7dc753f0 1493 if (xs_bind4(transport, sock)) {
b0d93ad5
CL
1494 sock_release(sock);
1495 goto out;
1496 }
9903cd1c 1497
46121cf7 1498 dprintk("RPC: worker connecting xprt %p to address: %s\n",
7559c7a2 1499 xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
edb267a6 1500
16be2d20 1501 xs_udp_finish_connecting(xprt, sock);
b0d93ad5
CL
1502 status = 0;
1503out:
1504 xprt_wake_pending_tasks(xprt, status);
1505 xprt_clear_connecting(xprt);
a246b010 1506}
a246b010 1507
68e220bd
CL
1508/**
1509 * xs_udp_connect_worker6 - set up a UDP socket
1510 * @work: RPC transport to connect
1511 *
1512 * Invoked by a work queue tasklet.
1513 */
1514static void xs_udp_connect_worker6(struct work_struct *work)
1515{
1516 struct sock_xprt *transport =
1517 container_of(work, struct sock_xprt, connect_worker.work);
1518 struct rpc_xprt *xprt = &transport->xprt;
1519 struct socket *sock = transport->sock;
1520 int err, status = -EIO;
a246b010 1521
68e220bd
CL
1522 if (xprt->shutdown || !xprt_bound(xprt))
1523 goto out;
b0d93ad5 1524
68e220bd
CL
1525 /* Start by resetting any existing state */
1526 xs_close(xprt);
a246b010 1527
68e220bd
CL
1528 if ((err = sock_create_kern(PF_INET6, SOCK_DGRAM, IPPROTO_UDP, &sock)) < 0) {
1529 dprintk("RPC: can't create UDP transport socket (%d).\n", -err);
1530 goto out;
1531 }
8945ee5e 1532 xs_reclassify_socket6(sock);
a246b010 1533
68e220bd
CL
1534 if (xs_bind6(transport, sock) < 0) {
1535 sock_release(sock);
1536 goto out;
b0d93ad5 1537 }
68e220bd
CL
1538
1539 dprintk("RPC: worker connecting xprt %p to address: %s\n",
1540 xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
1541
1542 xs_udp_finish_connecting(xprt, sock);
b0d93ad5
CL
1543 status = 0;
1544out:
1545 xprt_wake_pending_tasks(xprt, status);
1546 xprt_clear_connecting(xprt);
a246b010
CL
1547}
1548
3167e12c
CL
1549/*
1550 * We need to preserve the port number so the reply cache on the server can
1551 * find our cached RPC replies when we get around to reconnecting.
1552 */
1553static void xs_tcp_reuse_connection(struct rpc_xprt *xprt)
1554{
1555 int result;
ee0ac0c2 1556 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
3167e12c
CL
1557 struct sockaddr any;
1558
46121cf7 1559 dprintk("RPC: disconnecting xprt %p to reuse port\n", xprt);
3167e12c
CL
1560
1561 /*
1562 * Disconnect the transport socket by doing a connect operation
1563 * with AF_UNSPEC. This should return immediately...
1564 */
1565 memset(&any, 0, sizeof(any));
1566 any.sa_family = AF_UNSPEC;
ee0ac0c2 1567 result = kernel_connect(transport->sock, &any, sizeof(any), 0);
3167e12c 1568 if (result)
46121cf7 1569 dprintk("RPC: AF_UNSPEC connect return code %d\n",
3167e12c
CL
1570 result);
1571}
1572
16be2d20 1573static int xs_tcp_finish_connecting(struct rpc_xprt *xprt, struct socket *sock)
a246b010 1574{
16be2d20 1575 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
edb267a6 1576
ee0ac0c2 1577 if (!transport->inet) {
b0d93ad5
CL
1578 struct sock *sk = sock->sk;
1579
1580 write_lock_bh(&sk->sk_callback_lock);
1581
1582 sk->sk_user_data = xprt;
314dfd79
CL
1583 transport->old_data_ready = sk->sk_data_ready;
1584 transport->old_state_change = sk->sk_state_change;
1585 transport->old_write_space = sk->sk_write_space;
b0d93ad5
CL
1586 sk->sk_data_ready = xs_tcp_data_ready;
1587 sk->sk_state_change = xs_tcp_state_change;
1588 sk->sk_write_space = xs_tcp_write_space;
b079fa7b 1589 sk->sk_allocation = GFP_ATOMIC;
3167e12c
CL
1590
1591 /* socket options */
1592 sk->sk_userlocks |= SOCK_BINDPORT_LOCK;
1593 sock_reset_flag(sk, SOCK_LINGER);
1594 tcp_sk(sk)->linger2 = 0;
1595 tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
b0d93ad5
CL
1596
1597 xprt_clear_connected(xprt);
1598
1599 /* Reset to new socket */
ee0ac0c2
CL
1600 transport->sock = sock;
1601 transport->inet = sk;
b0d93ad5
CL
1602
1603 write_unlock_bh(&sk->sk_callback_lock);
1604 }
1605
1606 /* Tell the socket layer to start connecting... */
262ca07d
CL
1607 xprt->stat.connect_count++;
1608 xprt->stat.connect_start = jiffies;
95392c59 1609 return kernel_connect(sock, xs_addr(xprt), xprt->addrlen, O_NONBLOCK);
16be2d20
CL
1610}
1611
9903cd1c 1612/**
9c3d72de 1613 * xs_tcp_connect_worker4 - connect a TCP socket to a remote endpoint
65f27f38 1614 * @work: RPC transport to connect
9903cd1c
CL
1615 *
1616 * Invoked by a work queue tasklet.
a246b010 1617 */
9c3d72de 1618static void xs_tcp_connect_worker4(struct work_struct *work)
a246b010 1619{
34161db6
TM
1620 struct sock_xprt *transport =
1621 container_of(work, struct sock_xprt, connect_worker.work);
c8475461 1622 struct rpc_xprt *xprt = &transport->xprt;
ee0ac0c2 1623 struct socket *sock = transport->sock;
b0d93ad5 1624 int err, status = -EIO;
a246b010 1625
ec739ef0 1626 if (xprt->shutdown || !xprt_bound(xprt))
a246b010
CL
1627 goto out;
1628
ee0ac0c2 1629 if (!sock) {
3167e12c
CL
1630 /* start from scratch */
1631 if ((err = sock_create_kern(PF_INET, SOCK_STREAM, IPPROTO_TCP, &sock)) < 0) {
16be2d20 1632 dprintk("RPC: can't create TCP transport socket (%d).\n", -err);
3167e12c
CL
1633 goto out;
1634 }
8945ee5e 1635 xs_reclassify_socket4(sock);
a246b010 1636
16be2d20 1637 if (xs_bind4(transport, sock) < 0) {
3167e12c
CL
1638 sock_release(sock);
1639 goto out;
1640 }
1641 } else
1642 /* "close" the socket, preserving the local port */
1643 xs_tcp_reuse_connection(xprt);
a246b010 1644
46121cf7 1645 dprintk("RPC: worker connecting xprt %p to address: %s\n",
7559c7a2 1646 xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
edb267a6 1647
16be2d20 1648 status = xs_tcp_finish_connecting(xprt, sock);
46121cf7
CL
1649 dprintk("RPC: %p connect status %d connected %d sock state %d\n",
1650 xprt, -status, xprt_connected(xprt),
1651 sock->sk->sk_state);
a246b010
CL
1652 if (status < 0) {
1653 switch (status) {
1654 case -EINPROGRESS:
1655 case -EALREADY:
1656 goto out_clear;
3167e12c
CL
1657 case -ECONNREFUSED:
1658 case -ECONNRESET:
1659 /* retry with existing socket, after a delay */
1660 break;
1661 default:
1662 /* get rid of existing socket, and retry */
e06799f9 1663 xs_tcp_shutdown(xprt);
a246b010
CL
1664 }
1665 }
1666out:
44fbac22 1667 xprt_wake_pending_tasks(xprt, status);
68e220bd
CL
1668out_clear:
1669 xprt_clear_connecting(xprt);
1670}
b0d93ad5 1671
68e220bd
CL
1672/**
1673 * xs_tcp_connect_worker6 - connect a TCP socket to a remote endpoint
1674 * @work: RPC transport to connect
1675 *
1676 * Invoked by a work queue tasklet.
1677 */
1678static void xs_tcp_connect_worker6(struct work_struct *work)
1679{
1680 struct sock_xprt *transport =
1681 container_of(work, struct sock_xprt, connect_worker.work);
1682 struct rpc_xprt *xprt = &transport->xprt;
1683 struct socket *sock = transport->sock;
1684 int err, status = -EIO;
3167e12c 1685
68e220bd
CL
1686 if (xprt->shutdown || !xprt_bound(xprt))
1687 goto out;
b0d93ad5 1688
68e220bd
CL
1689 if (!sock) {
1690 /* start from scratch */
1691 if ((err = sock_create_kern(PF_INET6, SOCK_STREAM, IPPROTO_TCP, &sock)) < 0) {
1692 dprintk("RPC: can't create TCP transport socket (%d).\n", -err);
1693 goto out;
1694 }
8945ee5e 1695 xs_reclassify_socket6(sock);
b0d93ad5 1696
68e220bd
CL
1697 if (xs_bind6(transport, sock) < 0) {
1698 sock_release(sock);
1699 goto out;
1700 }
1701 } else
1702 /* "close" the socket, preserving the local port */
1703 xs_tcp_reuse_connection(xprt);
b0d93ad5 1704
68e220bd
CL
1705 dprintk("RPC: worker connecting xprt %p to address: %s\n",
1706 xprt, xprt->address_strings[RPC_DISPLAY_ALL]);
b0d93ad5 1707
68e220bd 1708 status = xs_tcp_finish_connecting(xprt, sock);
46121cf7 1709 dprintk("RPC: %p connect status %d connected %d sock state %d\n",
68e220bd 1710 xprt, -status, xprt_connected(xprt), sock->sk->sk_state);
a246b010
CL
1711 if (status < 0) {
1712 switch (status) {
1713 case -EINPROGRESS:
1714 case -EALREADY:
1715 goto out_clear;
3167e12c
CL
1716 case -ECONNREFUSED:
1717 case -ECONNRESET:
1718 /* retry with existing socket, after a delay */
1719 break;
1720 default:
1721 /* get rid of existing socket, and retry */
e06799f9 1722 xs_tcp_shutdown(xprt);
a246b010
CL
1723 }
1724 }
1725out:
44fbac22 1726 xprt_wake_pending_tasks(xprt, status);
a246b010 1727out_clear:
2226feb6 1728 xprt_clear_connecting(xprt);
a246b010
CL
1729}
1730
9903cd1c
CL
1731/**
1732 * xs_connect - connect a socket to a remote endpoint
1733 * @task: address of RPC task that manages state of connect request
1734 *
1735 * TCP: If the remote end dropped the connection, delay reconnecting.
03bf4b70
CL
1736 *
1737 * UDP socket connects are synchronous, but we use a work queue anyway
1738 * to guarantee that even unprivileged user processes can set up a
1739 * socket on a privileged port.
1740 *
1741 * If a UDP socket connect fails, the delay behavior here prevents
1742 * retry floods (hard mounts).
9903cd1c
CL
1743 */
1744static void xs_connect(struct rpc_task *task)
a246b010
CL
1745{
1746 struct rpc_xprt *xprt = task->tk_xprt;
ee0ac0c2 1747 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
a246b010 1748
b0d93ad5
CL
1749 if (xprt_test_and_set_connecting(xprt))
1750 return;
1751
ee0ac0c2 1752 if (transport->sock != NULL) {
46121cf7
CL
1753 dprintk("RPC: xs_connect delayed xprt %p for %lu "
1754 "seconds\n",
03bf4b70 1755 xprt, xprt->reestablish_timeout / HZ);
c1384c9c
TM
1756 queue_delayed_work(rpciod_workqueue,
1757 &transport->connect_worker,
1758 xprt->reestablish_timeout);
03bf4b70
CL
1759 xprt->reestablish_timeout <<= 1;
1760 if (xprt->reestablish_timeout > XS_TCP_MAX_REEST_TO)
1761 xprt->reestablish_timeout = XS_TCP_MAX_REEST_TO;
b0d93ad5 1762 } else {
46121cf7 1763 dprintk("RPC: xs_connect scheduled xprt %p\n", xprt);
c1384c9c
TM
1764 queue_delayed_work(rpciod_workqueue,
1765 &transport->connect_worker, 0);
a246b010
CL
1766 }
1767}
1768
e06799f9
TM
1769static void xs_tcp_connect(struct rpc_task *task)
1770{
1771 struct rpc_xprt *xprt = task->tk_xprt;
1772
1773 /* Initiate graceful shutdown of the socket if not already done */
1774 if (test_bit(XPRT_CONNECTED, &xprt->state))
1775 xs_tcp_shutdown(xprt);
1776 /* Exit if we need to wait for socket shutdown to complete */
1777 if (test_bit(XPRT_CLOSING, &xprt->state))
1778 return;
1779 xs_connect(task);
1780}
1781
262ca07d
CL
1782/**
1783 * xs_udp_print_stats - display UDP socket-specifc stats
1784 * @xprt: rpc_xprt struct containing statistics
1785 * @seq: output file
1786 *
1787 */
1788static void xs_udp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
1789{
c8475461
CL
1790 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
1791
262ca07d 1792 seq_printf(seq, "\txprt:\tudp %u %lu %lu %lu %lu %Lu %Lu\n",
c8475461 1793 transport->port,
262ca07d
CL
1794 xprt->stat.bind_count,
1795 xprt->stat.sends,
1796 xprt->stat.recvs,
1797 xprt->stat.bad_xids,
1798 xprt->stat.req_u,
1799 xprt->stat.bklog_u);
1800}
1801
1802/**
1803 * xs_tcp_print_stats - display TCP socket-specifc stats
1804 * @xprt: rpc_xprt struct containing statistics
1805 * @seq: output file
1806 *
1807 */
1808static void xs_tcp_print_stats(struct rpc_xprt *xprt, struct seq_file *seq)
1809{
c8475461 1810 struct sock_xprt *transport = container_of(xprt, struct sock_xprt, xprt);
262ca07d
CL
1811 long idle_time = 0;
1812
1813 if (xprt_connected(xprt))
1814 idle_time = (long)(jiffies - xprt->last_used) / HZ;
1815
1816 seq_printf(seq, "\txprt:\ttcp %u %lu %lu %lu %ld %lu %lu %lu %Lu %Lu\n",
c8475461 1817 transport->port,
262ca07d
CL
1818 xprt->stat.bind_count,
1819 xprt->stat.connect_count,
1820 xprt->stat.connect_time,
1821 idle_time,
1822 xprt->stat.sends,
1823 xprt->stat.recvs,
1824 xprt->stat.bad_xids,
1825 xprt->stat.req_u,
1826 xprt->stat.bklog_u);
1827}
1828
262965f5 1829static struct rpc_xprt_ops xs_udp_ops = {
43118c29 1830 .set_buffer_size = xs_udp_set_buffer_size,
12a80469 1831 .reserve_xprt = xprt_reserve_xprt_cong,
49e9a890 1832 .release_xprt = xprt_release_xprt_cong,
45160d62 1833 .rpcbind = rpcb_getport_async,
92200412 1834 .set_port = xs_set_port,
262965f5 1835 .connect = xs_connect,
02107148
CL
1836 .buf_alloc = rpc_malloc,
1837 .buf_free = rpc_free,
262965f5 1838 .send_request = xs_udp_send_request,
fe3aca29 1839 .set_retrans_timeout = xprt_set_retrans_timeout_rtt,
46c0ee8b 1840 .timer = xs_udp_timer,
a58dd398 1841 .release_request = xprt_release_rqst_cong,
262965f5
CL
1842 .close = xs_close,
1843 .destroy = xs_destroy,
262ca07d 1844 .print_stats = xs_udp_print_stats,
262965f5
CL
1845};
1846
1847static struct rpc_xprt_ops xs_tcp_ops = {
12a80469 1848 .reserve_xprt = xprt_reserve_xprt,
e0ab53de 1849 .release_xprt = xs_tcp_release_xprt,
45160d62 1850 .rpcbind = rpcb_getport_async,
92200412 1851 .set_port = xs_set_port,
e06799f9 1852 .connect = xs_tcp_connect,
02107148
CL
1853 .buf_alloc = rpc_malloc,
1854 .buf_free = rpc_free,
262965f5 1855 .send_request = xs_tcp_send_request,
fe3aca29 1856 .set_retrans_timeout = xprt_set_retrans_timeout_def,
e06799f9 1857 .close = xs_tcp_shutdown,
9903cd1c 1858 .destroy = xs_destroy,
262ca07d 1859 .print_stats = xs_tcp_print_stats,
a246b010
CL
1860};
1861
3c341b0b 1862static struct rpc_xprt *xs_setup_xprt(struct xprt_create *args,
bc25571e 1863 unsigned int slot_table_size)
c8541ecd
CL
1864{
1865 struct rpc_xprt *xprt;
ffc2e518 1866 struct sock_xprt *new;
c8541ecd 1867
96802a09 1868 if (args->addrlen > sizeof(xprt->addr)) {
46121cf7 1869 dprintk("RPC: xs_setup_xprt: address too large\n");
c8541ecd
CL
1870 return ERR_PTR(-EBADF);
1871 }
1872
ffc2e518
CL
1873 new = kzalloc(sizeof(*new), GFP_KERNEL);
1874 if (new == NULL) {
46121cf7
CL
1875 dprintk("RPC: xs_setup_xprt: couldn't allocate "
1876 "rpc_xprt\n");
c8541ecd
CL
1877 return ERR_PTR(-ENOMEM);
1878 }
ffc2e518 1879 xprt = &new->xprt;
c8541ecd
CL
1880
1881 xprt->max_reqs = slot_table_size;
1882 xprt->slot = kcalloc(xprt->max_reqs, sizeof(struct rpc_rqst), GFP_KERNEL);
1883 if (xprt->slot == NULL) {
1884 kfree(xprt);
46121cf7
CL
1885 dprintk("RPC: xs_setup_xprt: couldn't allocate slot "
1886 "table\n");
c8541ecd
CL
1887 return ERR_PTR(-ENOMEM);
1888 }
1889
96802a09
FM
1890 memcpy(&xprt->addr, args->dstaddr, args->addrlen);
1891 xprt->addrlen = args->addrlen;
d3bc9a1d
FM
1892 if (args->srcaddr)
1893 memcpy(&new->addr, args->srcaddr, args->addrlen);
c8541ecd
CL
1894
1895 return xprt;
1896}
1897
2881ae74
TM
1898static const struct rpc_timeout xs_udp_default_timeout = {
1899 .to_initval = 5 * HZ,
1900 .to_maxval = 30 * HZ,
1901 .to_increment = 5 * HZ,
1902 .to_retries = 5,
1903};
1904
9903cd1c
CL
1905/**
1906 * xs_setup_udp - Set up transport to use a UDP socket
96802a09 1907 * @args: rpc transport creation arguments
9903cd1c
CL
1908 *
1909 */
483066d6 1910static struct rpc_xprt *xs_setup_udp(struct xprt_create *args)
a246b010 1911{
8f9d5b1a 1912 struct sockaddr *addr = args->dstaddr;
c8541ecd 1913 struct rpc_xprt *xprt;
c8475461 1914 struct sock_xprt *transport;
a246b010 1915
96802a09 1916 xprt = xs_setup_xprt(args, xprt_udp_slot_table_entries);
c8541ecd
CL
1917 if (IS_ERR(xprt))
1918 return xprt;
c8475461 1919 transport = container_of(xprt, struct sock_xprt, xprt);
a246b010 1920
ec739ef0 1921 xprt->prot = IPPROTO_UDP;
808012fb 1922 xprt->tsh_size = 0;
a246b010
CL
1923 /* XXX: header size can vary due to auth type, IPv6, etc. */
1924 xprt->max_payload = (1U << 16) - (MAX_HEADER << 3);
1925
03bf4b70
CL
1926 xprt->bind_timeout = XS_BIND_TO;
1927 xprt->connect_timeout = XS_UDP_CONN_TO;
1928 xprt->reestablish_timeout = XS_UDP_REEST_TO;
1929 xprt->idle_timeout = XS_IDLE_DISC_TO;
a246b010 1930
262965f5 1931 xprt->ops = &xs_udp_ops;
a246b010 1932
ba7392bb 1933 xprt->timeout = &xs_udp_default_timeout;
a246b010 1934
8f9d5b1a
CL
1935 switch (addr->sa_family) {
1936 case AF_INET:
1937 if (((struct sockaddr_in *)addr)->sin_port != htons(0))
1938 xprt_set_bound(xprt);
1939
1940 INIT_DELAYED_WORK(&transport->connect_worker,
1941 xs_udp_connect_worker4);
1942 xs_format_ipv4_peer_addresses(xprt);
1943 break;
1944 case AF_INET6:
1945 if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
1946 xprt_set_bound(xprt);
1947
1948 INIT_DELAYED_WORK(&transport->connect_worker,
1949 xs_udp_connect_worker6);
1950 xs_format_ipv6_peer_addresses(xprt);
1951 break;
1952 default:
1953 kfree(xprt);
1954 return ERR_PTR(-EAFNOSUPPORT);
1955 }
1956
46121cf7 1957 dprintk("RPC: set up transport to address %s\n",
7559c7a2 1958 xprt->address_strings[RPC_DISPLAY_ALL]);
edb267a6 1959
bc25571e
TT
1960 if (try_module_get(THIS_MODULE))
1961 return xprt;
1962
1963 kfree(xprt->slot);
1964 kfree(xprt);
1965 return ERR_PTR(-EINVAL);
a246b010
CL
1966}
1967
2881ae74
TM
1968static const struct rpc_timeout xs_tcp_default_timeout = {
1969 .to_initval = 60 * HZ,
1970 .to_maxval = 60 * HZ,
1971 .to_retries = 2,
1972};
1973
9903cd1c
CL
1974/**
1975 * xs_setup_tcp - Set up transport to use a TCP socket
96802a09 1976 * @args: rpc transport creation arguments
9903cd1c
CL
1977 *
1978 */
483066d6 1979static struct rpc_xprt *xs_setup_tcp(struct xprt_create *args)
a246b010 1980{
8f9d5b1a 1981 struct sockaddr *addr = args->dstaddr;
c8541ecd 1982 struct rpc_xprt *xprt;
c8475461 1983 struct sock_xprt *transport;
a246b010 1984
96802a09 1985 xprt = xs_setup_xprt(args, xprt_tcp_slot_table_entries);
c8541ecd
CL
1986 if (IS_ERR(xprt))
1987 return xprt;
c8475461 1988 transport = container_of(xprt, struct sock_xprt, xprt);
a246b010 1989
ec739ef0 1990 xprt->prot = IPPROTO_TCP;
808012fb 1991 xprt->tsh_size = sizeof(rpc_fraghdr) / sizeof(u32);
808012fb 1992 xprt->max_payload = RPC_MAX_FRAGMENT_SIZE;
a246b010 1993
03bf4b70
CL
1994 xprt->bind_timeout = XS_BIND_TO;
1995 xprt->connect_timeout = XS_TCP_CONN_TO;
1996 xprt->reestablish_timeout = XS_TCP_INIT_REEST_TO;
1997 xprt->idle_timeout = XS_IDLE_DISC_TO;
a246b010 1998
262965f5 1999 xprt->ops = &xs_tcp_ops;
ba7392bb 2000 xprt->timeout = &xs_tcp_default_timeout;
a246b010 2001
8f9d5b1a
CL
2002 switch (addr->sa_family) {
2003 case AF_INET:
2004 if (((struct sockaddr_in *)addr)->sin_port != htons(0))
2005 xprt_set_bound(xprt);
2006
2007 INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_connect_worker4);
2008 xs_format_ipv4_peer_addresses(xprt);
2009 break;
2010 case AF_INET6:
2011 if (((struct sockaddr_in6 *)addr)->sin6_port != htons(0))
2012 xprt_set_bound(xprt);
2013
2014 INIT_DELAYED_WORK(&transport->connect_worker, xs_tcp_connect_worker6);
2015 xs_format_ipv6_peer_addresses(xprt);
2016 break;
2017 default:
2018 kfree(xprt);
2019 return ERR_PTR(-EAFNOSUPPORT);
2020 }
2021
46121cf7 2022 dprintk("RPC: set up transport to address %s\n",
7559c7a2 2023 xprt->address_strings[RPC_DISPLAY_ALL]);
edb267a6 2024
bc25571e
TT
2025 if (try_module_get(THIS_MODULE))
2026 return xprt;
2027
2028 kfree(xprt->slot);
2029 kfree(xprt);
2030 return ERR_PTR(-EINVAL);
a246b010 2031}
282b32e1 2032
bc25571e
TT
2033static struct xprt_class xs_udp_transport = {
2034 .list = LIST_HEAD_INIT(xs_udp_transport.list),
2035 .name = "udp",
2036 .owner = THIS_MODULE,
4fa016eb 2037 .ident = IPPROTO_UDP,
bc25571e
TT
2038 .setup = xs_setup_udp,
2039};
2040
2041static struct xprt_class xs_tcp_transport = {
2042 .list = LIST_HEAD_INIT(xs_tcp_transport.list),
2043 .name = "tcp",
2044 .owner = THIS_MODULE,
4fa016eb 2045 .ident = IPPROTO_TCP,
bc25571e
TT
2046 .setup = xs_setup_tcp,
2047};
2048
282b32e1 2049/**
bc25571e 2050 * init_socket_xprt - set up xprtsock's sysctls, register with RPC client
282b32e1
CL
2051 *
2052 */
2053int init_socket_xprt(void)
2054{
fbf76683 2055#ifdef RPC_DEBUG
2b1bec5f 2056 if (!sunrpc_table_header)
0b4d4147 2057 sunrpc_table_header = register_sysctl_table(sunrpc_table);
fbf76683
CL
2058#endif
2059
bc25571e
TT
2060 xprt_register_transport(&xs_udp_transport);
2061 xprt_register_transport(&xs_tcp_transport);
2062
282b32e1
CL
2063 return 0;
2064}
2065
2066/**
bc25571e 2067 * cleanup_socket_xprt - remove xprtsock's sysctls, unregister
282b32e1
CL
2068 *
2069 */
2070void cleanup_socket_xprt(void)
2071{
fbf76683
CL
2072#ifdef RPC_DEBUG
2073 if (sunrpc_table_header) {
2074 unregister_sysctl_table(sunrpc_table_header);
2075 sunrpc_table_header = NULL;
2076 }
2077#endif
bc25571e
TT
2078
2079 xprt_unregister_transport(&xs_udp_transport);
2080 xprt_unregister_transport(&xs_tcp_transport);
282b32e1 2081}