blob: bd31208bbb61b877b39e276c9e627548b6f2bcb7 [file] [log] [blame]
Tom Tucker1d8206b92007-12-30 21:07:15 -06001/*
2 * linux/net/sunrpc/svc_xprt.c
3 *
4 * Author: Tom Tucker <tom@opengridcomputing.com>
5 */
6
7#include <linux/sched.h>
8#include <linux/errno.h>
Tom Tucker1d8206b92007-12-30 21:07:15 -06009#include <linux/freezer.h>
Jeff Layton70867212008-02-07 16:34:54 -050010#include <linux/kthread.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090011#include <linux/slab.h>
Tom Tucker1d8206b92007-12-30 21:07:15 -060012#include <net/sock.h>
Tom Tucker1d8206b92007-12-30 21:07:15 -060013#include <linux/sunrpc/stats.h>
14#include <linux/sunrpc/svc_xprt.h>
H Hartley Sweetendcf1a352009-04-22 20:18:19 -040015#include <linux/sunrpc/svcsock.h>
J. Bruce Fields99de8ea2010-12-08 12:45:44 -050016#include <linux/sunrpc/xprt.h>
Tom Tucker1d8206b92007-12-30 21:07:15 -060017
18#define RPCDBG_FACILITY RPCDBG_SVCXPRT
19
Tom Tucker0f0257e2007-12-30 21:08:27 -060020static struct svc_deferred_req *svc_deferred_dequeue(struct svc_xprt *xprt);
21static int svc_deferred_recv(struct svc_rqst *rqstp);
22static struct cache_deferred_req *svc_defer(struct cache_req *req);
23static void svc_age_temp_xprts(unsigned long closure);
24
25/* apparently the "standard" is that clients close
26 * idle connections after 5 minutes, servers after
27 * 6 minutes
28 * http://www.connectathon.org/talks96/nfstcp.pdf
29 */
30static int svc_conn_age_period = 6*60;
31
Tom Tucker1d8206b92007-12-30 21:07:15 -060032/* List of registered transport classes */
33static DEFINE_SPINLOCK(svc_xprt_class_lock);
34static LIST_HEAD(svc_xprt_class_list);
35
Tom Tucker0f0257e2007-12-30 21:08:27 -060036/* SMP locking strategy:
37 *
38 * svc_pool->sp_lock protects most of the fields of that pool.
39 * svc_serv->sv_lock protects sv_tempsocks, sv_permsocks, sv_tmpcnt.
40 * when both need to be taken (rare), svc_serv->sv_lock is first.
41 * BKL protects svc_serv->sv_nrthread.
42 * svc_sock->sk_lock protects the svc_sock->sk_deferred list
43 * and the ->sk_info_authunix cache.
44 *
45 * The XPT_BUSY bit in xprt->xpt_flags prevents a transport being
46 * enqueued multiply. During normal transport processing this bit
47 * is set by svc_xprt_enqueue and cleared by svc_xprt_received.
48 * Providers should not manipulate this bit directly.
49 *
50 * Some flags can be set to certain values at any time
51 * providing that certain rules are followed:
52 *
53 * XPT_CONN, XPT_DATA:
54 * - Can be set or cleared at any time.
55 * - After a set, svc_xprt_enqueue must be called to enqueue
56 * the transport for processing.
57 * - After a clear, the transport must be read/accepted.
58 * If this succeeds, it must be set again.
59 * XPT_CLOSE:
60 * - Can set at any time. It is never cleared.
61 * XPT_DEAD:
62 * - Can only be set while XPT_BUSY is held which ensures
63 * that no other thread will be using the transport or will
64 * try to set XPT_DEAD.
65 */
66
Tom Tucker1d8206b92007-12-30 21:07:15 -060067int svc_reg_xprt_class(struct svc_xprt_class *xcl)
68{
69 struct svc_xprt_class *cl;
70 int res = -EEXIST;
71
72 dprintk("svc: Adding svc transport class '%s'\n", xcl->xcl_name);
73
74 INIT_LIST_HEAD(&xcl->xcl_list);
75 spin_lock(&svc_xprt_class_lock);
76 /* Make sure there isn't already a class with the same name */
77 list_for_each_entry(cl, &svc_xprt_class_list, xcl_list) {
78 if (strcmp(xcl->xcl_name, cl->xcl_name) == 0)
79 goto out;
80 }
81 list_add_tail(&xcl->xcl_list, &svc_xprt_class_list);
82 res = 0;
83out:
84 spin_unlock(&svc_xprt_class_lock);
85 return res;
86}
87EXPORT_SYMBOL_GPL(svc_reg_xprt_class);
88
89void svc_unreg_xprt_class(struct svc_xprt_class *xcl)
90{
91 dprintk("svc: Removing svc transport class '%s'\n", xcl->xcl_name);
92 spin_lock(&svc_xprt_class_lock);
93 list_del_init(&xcl->xcl_list);
94 spin_unlock(&svc_xprt_class_lock);
95}
96EXPORT_SYMBOL_GPL(svc_unreg_xprt_class);
97
Tom Tuckerdc9a16e2007-12-30 21:08:31 -060098/*
99 * Format the transport list for printing
100 */
101int svc_print_xprts(char *buf, int maxlen)
102{
Pavel Emelyanov8f3a6de2010-10-05 23:30:19 +0400103 struct svc_xprt_class *xcl;
Tom Tuckerdc9a16e2007-12-30 21:08:31 -0600104 char tmpstr[80];
105 int len = 0;
106 buf[0] = '\0';
107
108 spin_lock(&svc_xprt_class_lock);
Pavel Emelyanov8f3a6de2010-10-05 23:30:19 +0400109 list_for_each_entry(xcl, &svc_xprt_class_list, xcl_list) {
Tom Tuckerdc9a16e2007-12-30 21:08:31 -0600110 int slen;
Tom Tuckerdc9a16e2007-12-30 21:08:31 -0600111
112 sprintf(tmpstr, "%s %d\n", xcl->xcl_name, xcl->xcl_max_payload);
113 slen = strlen(tmpstr);
114 if (len + slen > maxlen)
115 break;
116 len += slen;
117 strcat(buf, tmpstr);
118 }
119 spin_unlock(&svc_xprt_class_lock);
120
121 return len;
122}
123
Tom Tuckere1b31572007-12-30 21:07:46 -0600124static void svc_xprt_free(struct kref *kref)
125{
126 struct svc_xprt *xprt =
127 container_of(kref, struct svc_xprt, xpt_ref);
128 struct module *owner = xprt->xpt_class->xcl_owner;
Pavel Emelyanove3bfca02010-09-27 13:58:42 +0400129 if (test_bit(XPT_CACHE_AUTH, &xprt->xpt_flags))
130 svcauth_unix_info_release(xprt);
Pavel Emelyanov4fb85182010-09-27 14:00:49 +0400131 put_net(xprt->xpt_net);
J. Bruce Fields99de8ea2010-12-08 12:45:44 -0500132 /* See comment on corresponding get in xs_setup_bc_tcp(): */
133 if (xprt->xpt_bc_xprt)
134 xprt_put(xprt->xpt_bc_xprt);
Tom Tuckere1b31572007-12-30 21:07:46 -0600135 xprt->xpt_ops->xpo_free(xprt);
136 module_put(owner);
137}
138
139void svc_xprt_put(struct svc_xprt *xprt)
140{
141 kref_put(&xprt->xpt_ref, svc_xprt_free);
142}
143EXPORT_SYMBOL_GPL(svc_xprt_put);
144
Tom Tucker1d8206b92007-12-30 21:07:15 -0600145/*
146 * Called by transport drivers to initialize the transport independent
147 * portion of the transport instance.
148 */
Tom Tuckerbb5cf162007-12-30 21:07:50 -0600149void svc_xprt_init(struct svc_xprt_class *xcl, struct svc_xprt *xprt,
150 struct svc_serv *serv)
Tom Tucker1d8206b92007-12-30 21:07:15 -0600151{
152 memset(xprt, 0, sizeof(*xprt));
153 xprt->xpt_class = xcl;
154 xprt->xpt_ops = xcl->xcl_ops;
Tom Tuckere1b31572007-12-30 21:07:46 -0600155 kref_init(&xprt->xpt_ref);
Tom Tuckerbb5cf162007-12-30 21:07:50 -0600156 xprt->xpt_server = serv;
Tom Tucker7a182082007-12-30 21:07:53 -0600157 INIT_LIST_HEAD(&xprt->xpt_list);
158 INIT_LIST_HEAD(&xprt->xpt_ready);
Tom Tucker8c7b0172007-12-30 21:08:10 -0600159 INIT_LIST_HEAD(&xprt->xpt_deferred);
J. Bruce Fieldsedc7a892010-03-22 15:37:17 -0400160 INIT_LIST_HEAD(&xprt->xpt_users);
Tom Tuckera50fea22007-12-30 21:07:59 -0600161 mutex_init(&xprt->xpt_mutex);
Tom Tuckerdef13d72007-12-30 21:08:08 -0600162 spin_lock_init(&xprt->xpt_lock);
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600163 set_bit(XPT_BUSY, &xprt->xpt_flags);
Rahul Iyer4cfc7e62009-09-10 17:32:28 +0300164 rpc_init_wait_queue(&xprt->xpt_bc_pending, "xpt_bc_pending");
Pavel Emelyanov4fb85182010-09-27 14:00:49 +0400165 xprt->xpt_net = get_net(&init_net);
Tom Tucker1d8206b92007-12-30 21:07:15 -0600166}
167EXPORT_SYMBOL_GPL(svc_xprt_init);
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600168
Chuck Lever5dd248f2008-06-30 18:45:37 -0400169static struct svc_xprt *__svc_xpo_create(struct svc_xprt_class *xcl,
170 struct svc_serv *serv,
Pavel Emelyanov62832c02010-09-29 16:04:18 +0400171 struct net *net,
Chuck Lever9652ada2009-03-18 20:46:21 -0400172 const int family,
173 const unsigned short port,
174 int flags)
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600175{
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600176 struct sockaddr_in sin = {
177 .sin_family = AF_INET,
Al Viroe6f1ceb2008-03-17 22:44:53 -0700178 .sin_addr.s_addr = htonl(INADDR_ANY),
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600179 .sin_port = htons(port),
180 };
Chuck Leverd6783b22010-01-26 14:04:04 -0500181#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
Chuck Lever5dd248f2008-06-30 18:45:37 -0400182 struct sockaddr_in6 sin6 = {
183 .sin6_family = AF_INET6,
184 .sin6_addr = IN6ADDR_ANY_INIT,
185 .sin6_port = htons(port),
186 };
Chuck Leverd6783b22010-01-26 14:04:04 -0500187#endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */
Chuck Lever5dd248f2008-06-30 18:45:37 -0400188 struct sockaddr *sap;
189 size_t len;
190
Chuck Lever9652ada2009-03-18 20:46:21 -0400191 switch (family) {
192 case PF_INET:
Chuck Lever5dd248f2008-06-30 18:45:37 -0400193 sap = (struct sockaddr *)&sin;
194 len = sizeof(sin);
195 break;
Chuck Leverd6783b22010-01-26 14:04:04 -0500196#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
Chuck Lever9652ada2009-03-18 20:46:21 -0400197 case PF_INET6:
Chuck Lever5dd248f2008-06-30 18:45:37 -0400198 sap = (struct sockaddr *)&sin6;
199 len = sizeof(sin6);
200 break;
Chuck Leverd6783b22010-01-26 14:04:04 -0500201#endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */
Chuck Lever5dd248f2008-06-30 18:45:37 -0400202 default:
203 return ERR_PTR(-EAFNOSUPPORT);
204 }
205
Pavel Emelyanov62832c02010-09-29 16:04:18 +0400206 return xcl->xcl_ops->xpo_create(serv, net, sap, len, flags);
Chuck Lever5dd248f2008-06-30 18:45:37 -0400207}
208
Chuck Lever9652ada2009-03-18 20:46:21 -0400209int svc_create_xprt(struct svc_serv *serv, const char *xprt_name,
Pavel Emelyanovfc5d00b2010-09-29 16:03:50 +0400210 struct net *net, const int family,
211 const unsigned short port, int flags)
Chuck Lever5dd248f2008-06-30 18:45:37 -0400212{
213 struct svc_xprt_class *xcl;
214
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600215 dprintk("svc: creating transport %s[%d]\n", xprt_name, port);
216 spin_lock(&svc_xprt_class_lock);
217 list_for_each_entry(xcl, &svc_xprt_class_list, xcl_list) {
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600218 struct svc_xprt *newxprt;
NeilBrowned2849d2010-11-16 16:55:19 +1100219 unsigned short newport;
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600220
221 if (strcmp(xprt_name, xcl->xcl_name))
222 continue;
223
224 if (!try_module_get(xcl->xcl_owner))
225 goto err;
226
227 spin_unlock(&svc_xprt_class_lock);
Pavel Emelyanov62832c02010-09-29 16:04:18 +0400228 newxprt = __svc_xpo_create(xcl, serv, net, family, port, flags);
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600229 if (IS_ERR(newxprt)) {
230 module_put(xcl->xcl_owner);
231 return PTR_ERR(newxprt);
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600232 }
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600233
234 clear_bit(XPT_TEMP, &newxprt->xpt_flags);
235 spin_lock_bh(&serv->sv_lock);
236 list_add(&newxprt->xpt_list, &serv->sv_permsocks);
237 spin_unlock_bh(&serv->sv_lock);
NeilBrowned2849d2010-11-16 16:55:19 +1100238 newport = svc_xprt_local_port(newxprt);
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600239 clear_bit(XPT_BUSY, &newxprt->xpt_flags);
NeilBrowned2849d2010-11-16 16:55:19 +1100240 return newport;
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600241 }
Tom Tucker4e5caaa2007-12-30 21:08:20 -0600242 err:
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600243 spin_unlock(&svc_xprt_class_lock);
244 dprintk("svc: transport %s not found\n", xprt_name);
Chuck Lever68717902010-01-26 14:04:13 -0500245
246 /* This errno is exposed to user space. Provide a reasonable
247 * perror msg for a bad transport. */
248 return -EPROTONOSUPPORT;
Tom Tuckerb700cbb2007-12-30 21:07:42 -0600249}
250EXPORT_SYMBOL_GPL(svc_create_xprt);
Tom Tucker9dbc2402007-12-30 21:08:12 -0600251
252/*
253 * Copy the local and remote xprt addresses to the rqstp structure
254 */
255void svc_xprt_copy_addrs(struct svc_rqst *rqstp, struct svc_xprt *xprt)
256{
257 struct sockaddr *sin;
258
259 memcpy(&rqstp->rq_addr, &xprt->xpt_remote, xprt->xpt_remotelen);
260 rqstp->rq_addrlen = xprt->xpt_remotelen;
261
262 /*
263 * Destination address in request is needed for binding the
264 * source address in RPC replies/callbacks later.
265 */
266 sin = (struct sockaddr *)&xprt->xpt_local;
267 switch (sin->sa_family) {
268 case AF_INET:
269 rqstp->rq_daddr.addr = ((struct sockaddr_in *)sin)->sin_addr;
270 break;
271 case AF_INET6:
272 rqstp->rq_daddr.addr6 = ((struct sockaddr_in6 *)sin)->sin6_addr;
273 break;
274 }
275}
276EXPORT_SYMBOL_GPL(svc_xprt_copy_addrs);
277
Tom Tucker0f0257e2007-12-30 21:08:27 -0600278/**
279 * svc_print_addr - Format rq_addr field for printing
280 * @rqstp: svc_rqst struct containing address to print
281 * @buf: target buffer for formatted address
282 * @len: length of target buffer
283 *
284 */
285char *svc_print_addr(struct svc_rqst *rqstp, char *buf, size_t len)
286{
287 return __svc_print_addr(svc_addr(rqstp), buf, len);
288}
289EXPORT_SYMBOL_GPL(svc_print_addr);
290
291/*
292 * Queue up an idle server thread. Must have pool->sp_lock held.
293 * Note: this is really a stack rather than a queue, so that we only
294 * use as many different threads as we need, and the rest don't pollute
295 * the cache.
296 */
297static void svc_thread_enqueue(struct svc_pool *pool, struct svc_rqst *rqstp)
298{
299 list_add(&rqstp->rq_list, &pool->sp_threads);
300}
301
302/*
303 * Dequeue an nfsd thread. Must have pool->sp_lock held.
304 */
305static void svc_thread_dequeue(struct svc_pool *pool, struct svc_rqst *rqstp)
306{
307 list_del(&rqstp->rq_list);
308}
309
J. Bruce Fields9c335c02010-10-26 11:32:03 -0400310static bool svc_xprt_has_something_to_do(struct svc_xprt *xprt)
311{
312 if (xprt->xpt_flags & ((1<<XPT_CONN)|(1<<XPT_CLOSE)))
313 return true;
314 if (xprt->xpt_flags & ((1<<XPT_DATA)|(1<<XPT_DEFERRED)))
315 return xprt->xpt_ops->xpo_has_wspace(xprt);
316 return false;
317}
318
Tom Tucker0f0257e2007-12-30 21:08:27 -0600319/*
320 * Queue up a transport with data pending. If there are idle nfsd
321 * processes, wake 'em up.
322 *
323 */
324void svc_xprt_enqueue(struct svc_xprt *xprt)
325{
326 struct svc_serv *serv = xprt->xpt_server;
327 struct svc_pool *pool;
328 struct svc_rqst *rqstp;
329 int cpu;
330
J. Bruce Fields9c335c02010-10-26 11:32:03 -0400331 if (!svc_xprt_has_something_to_do(xprt))
Tom Tucker0f0257e2007-12-30 21:08:27 -0600332 return;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600333
334 cpu = get_cpu();
335 pool = svc_pool_for_cpu(xprt->xpt_server, cpu);
336 put_cpu();
337
338 spin_lock_bh(&pool->sp_lock);
339
J. Bruce Fields78c210e2009-08-06 15:41:34 -0400340 if (!list_empty(&pool->sp_threads) &&
341 !list_empty(&pool->sp_sockets))
342 printk(KERN_ERR
343 "svc_xprt_enqueue: "
344 "threads and transports both waiting??\n");
345
Greg Banks03cf6c92009-01-13 21:26:36 +1100346 pool->sp_stats.packets++;
347
Tom Tucker0f0257e2007-12-30 21:08:27 -0600348 /* Mark transport as busy. It will remain in this state until
349 * the provider calls svc_xprt_received. We update XPT_BUSY
350 * atomically because it also guards against trying to enqueue
351 * the transport twice.
352 */
353 if (test_and_set_bit(XPT_BUSY, &xprt->xpt_flags)) {
354 /* Don't enqueue transport while already enqueued */
355 dprintk("svc: transport %p busy, not enqueued\n", xprt);
356 goto out_unlock;
357 }
Tom Tucker0f0257e2007-12-30 21:08:27 -0600358
J. Bruce Fields78c210e2009-08-06 15:41:34 -0400359 if (!list_empty(&pool->sp_threads)) {
Tom Tucker0f0257e2007-12-30 21:08:27 -0600360 rqstp = list_entry(pool->sp_threads.next,
361 struct svc_rqst,
362 rq_list);
363 dprintk("svc: transport %p served by daemon %p\n",
364 xprt, rqstp);
365 svc_thread_dequeue(pool, rqstp);
366 if (rqstp->rq_xprt)
367 printk(KERN_ERR
368 "svc_xprt_enqueue: server %p, rq_xprt=%p!\n",
369 rqstp, rqstp->rq_xprt);
370 rqstp->rq_xprt = xprt;
371 svc_xprt_get(xprt);
372 rqstp->rq_reserved = serv->sv_max_mesg;
373 atomic_add(rqstp->rq_reserved, &xprt->xpt_reserved);
Greg Banks03cf6c92009-01-13 21:26:36 +1100374 pool->sp_stats.threads_woken++;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600375 wake_up(&rqstp->rq_wait);
376 } else {
377 dprintk("svc: transport %p put into queue\n", xprt);
378 list_add_tail(&xprt->xpt_ready, &pool->sp_sockets);
Greg Banks03cf6c92009-01-13 21:26:36 +1100379 pool->sp_stats.sockets_queued++;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600380 }
381
382out_unlock:
383 spin_unlock_bh(&pool->sp_lock);
384}
385EXPORT_SYMBOL_GPL(svc_xprt_enqueue);
386
387/*
388 * Dequeue the first transport. Must be called with the pool->sp_lock held.
389 */
390static struct svc_xprt *svc_xprt_dequeue(struct svc_pool *pool)
391{
392 struct svc_xprt *xprt;
393
394 if (list_empty(&pool->sp_sockets))
395 return NULL;
396
397 xprt = list_entry(pool->sp_sockets.next,
398 struct svc_xprt, xpt_ready);
399 list_del_init(&xprt->xpt_ready);
400
401 dprintk("svc: transport %p dequeued, inuse=%d\n",
402 xprt, atomic_read(&xprt->xpt_ref.refcount));
403
404 return xprt;
405}
406
407/*
408 * svc_xprt_received conditionally queues the transport for processing
409 * by another thread. The caller must hold the XPT_BUSY bit and must
410 * not thereafter touch transport data.
411 *
412 * Note: XPT_DATA only gets cleared when a read-attempt finds no (or
413 * insufficient) data.
414 */
415void svc_xprt_received(struct svc_xprt *xprt)
416{
417 BUG_ON(!test_bit(XPT_BUSY, &xprt->xpt_flags));
NeilBrowned2849d2010-11-16 16:55:19 +1100418 /* As soon as we clear busy, the xprt could be closed and
419 * 'put', so we need a reference to call svc_xprt_enqueue with:
420 */
421 svc_xprt_get(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600422 clear_bit(XPT_BUSY, &xprt->xpt_flags);
423 svc_xprt_enqueue(xprt);
NeilBrowned2849d2010-11-16 16:55:19 +1100424 svc_xprt_put(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600425}
426EXPORT_SYMBOL_GPL(svc_xprt_received);
427
428/**
429 * svc_reserve - change the space reserved for the reply to a request.
430 * @rqstp: The request in question
431 * @space: new max space to reserve
432 *
433 * Each request reserves some space on the output queue of the transport
434 * to make sure the reply fits. This function reduces that reserved
435 * space to be the amount of space used already, plus @space.
436 *
437 */
438void svc_reserve(struct svc_rqst *rqstp, int space)
439{
440 space += rqstp->rq_res.head[0].iov_len;
441
442 if (space < rqstp->rq_reserved) {
443 struct svc_xprt *xprt = rqstp->rq_xprt;
444 atomic_sub((rqstp->rq_reserved - space), &xprt->xpt_reserved);
445 rqstp->rq_reserved = space;
446
447 svc_xprt_enqueue(xprt);
448 }
449}
Trond Myklebust24c37672008-12-23 16:30:12 -0500450EXPORT_SYMBOL_GPL(svc_reserve);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600451
452static void svc_xprt_release(struct svc_rqst *rqstp)
453{
454 struct svc_xprt *xprt = rqstp->rq_xprt;
455
456 rqstp->rq_xprt->xpt_ops->xpo_release_rqst(rqstp);
457
Tom Tucker2779e3a2009-01-05 11:12:52 -0600458 kfree(rqstp->rq_deferred);
459 rqstp->rq_deferred = NULL;
460
Tom Tucker0f0257e2007-12-30 21:08:27 -0600461 svc_free_res_pages(rqstp);
462 rqstp->rq_res.page_len = 0;
463 rqstp->rq_res.page_base = 0;
464
465 /* Reset response buffer and release
466 * the reservation.
467 * But first, check that enough space was reserved
468 * for the reply, otherwise we have a bug!
469 */
470 if ((rqstp->rq_res.len) > rqstp->rq_reserved)
471 printk(KERN_ERR "RPC request reserved %d but used %d\n",
472 rqstp->rq_reserved,
473 rqstp->rq_res.len);
474
475 rqstp->rq_res.head[0].iov_len = 0;
476 svc_reserve(rqstp, 0);
477 rqstp->rq_xprt = NULL;
478
479 svc_xprt_put(xprt);
480}
481
482/*
483 * External function to wake up a server waiting for data
484 * This really only makes sense for services like lockd
485 * which have exactly one thread anyway.
486 */
487void svc_wake_up(struct svc_serv *serv)
488{
489 struct svc_rqst *rqstp;
490 unsigned int i;
491 struct svc_pool *pool;
492
493 for (i = 0; i < serv->sv_nrpools; i++) {
494 pool = &serv->sv_pools[i];
495
496 spin_lock_bh(&pool->sp_lock);
497 if (!list_empty(&pool->sp_threads)) {
498 rqstp = list_entry(pool->sp_threads.next,
499 struct svc_rqst,
500 rq_list);
501 dprintk("svc: daemon %p woken up.\n", rqstp);
502 /*
503 svc_thread_dequeue(pool, rqstp);
504 rqstp->rq_xprt = NULL;
505 */
506 wake_up(&rqstp->rq_wait);
507 }
508 spin_unlock_bh(&pool->sp_lock);
509 }
510}
Trond Myklebust24c37672008-12-23 16:30:12 -0500511EXPORT_SYMBOL_GPL(svc_wake_up);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600512
513int svc_port_is_privileged(struct sockaddr *sin)
514{
515 switch (sin->sa_family) {
516 case AF_INET:
517 return ntohs(((struct sockaddr_in *)sin)->sin_port)
518 < PROT_SOCK;
519 case AF_INET6:
520 return ntohs(((struct sockaddr_in6 *)sin)->sin6_port)
521 < PROT_SOCK;
522 default:
523 return 0;
524 }
525}
526
527/*
Jeff Laytonc9233eb2008-10-20 11:51:57 -0400528 * Make sure that we don't have too many active connections. If we have,
529 * something must be dropped. It's not clear what will happen if we allow
530 * "too many" connections, but when dealing with network-facing software,
531 * we have to code defensively. Here we do that by imposing hard limits.
Tom Tucker0f0257e2007-12-30 21:08:27 -0600532 *
533 * There's no point in trying to do random drop here for DoS
534 * prevention. The NFS clients does 1 reconnect in 15 seconds. An
535 * attacker can easily beat that.
536 *
537 * The only somewhat efficient mechanism would be if drop old
538 * connections from the same IP first. But right now we don't even
539 * record the client IP in svc_sock.
Jeff Laytonc9233eb2008-10-20 11:51:57 -0400540 *
541 * single-threaded services that expect a lot of clients will probably
542 * need to set sv_maxconn to override the default value which is based
543 * on the number of threads
Tom Tucker0f0257e2007-12-30 21:08:27 -0600544 */
545static void svc_check_conn_limits(struct svc_serv *serv)
546{
Jeff Laytonc9233eb2008-10-20 11:51:57 -0400547 unsigned int limit = serv->sv_maxconn ? serv->sv_maxconn :
548 (serv->sv_nrthreads+3) * 20;
549
550 if (serv->sv_tmpcnt > limit) {
Tom Tucker0f0257e2007-12-30 21:08:27 -0600551 struct svc_xprt *xprt = NULL;
552 spin_lock_bh(&serv->sv_lock);
553 if (!list_empty(&serv->sv_tempsocks)) {
554 if (net_ratelimit()) {
555 /* Try to help the admin */
556 printk(KERN_NOTICE "%s: too many open "
Jeff Laytonc9233eb2008-10-20 11:51:57 -0400557 "connections, consider increasing %s\n",
558 serv->sv_name, serv->sv_maxconn ?
559 "the max number of connections." :
560 "the number of threads.");
Tom Tucker0f0257e2007-12-30 21:08:27 -0600561 }
562 /*
563 * Always select the oldest connection. It's not fair,
564 * but so is life
565 */
566 xprt = list_entry(serv->sv_tempsocks.prev,
567 struct svc_xprt,
568 xpt_list);
569 set_bit(XPT_CLOSE, &xprt->xpt_flags);
570 svc_xprt_get(xprt);
571 }
572 spin_unlock_bh(&serv->sv_lock);
573
574 if (xprt) {
575 svc_xprt_enqueue(xprt);
576 svc_xprt_put(xprt);
577 }
578 }
579}
580
581/*
582 * Receive the next request on any transport. This code is carefully
583 * organised not to touch any cachelines in the shared svc_serv
584 * structure, only cachelines in the local svc_pool.
585 */
586int svc_recv(struct svc_rqst *rqstp, long timeout)
587{
588 struct svc_xprt *xprt = NULL;
589 struct svc_serv *serv = rqstp->rq_server;
590 struct svc_pool *pool = rqstp->rq_pool;
591 int len, i;
592 int pages;
593 struct xdr_buf *arg;
594 DECLARE_WAITQUEUE(wait, current);
Greg Banks03cf6c92009-01-13 21:26:36 +1100595 long time_left;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600596
597 dprintk("svc: server %p waiting for data (to = %ld)\n",
598 rqstp, timeout);
599
600 if (rqstp->rq_xprt)
601 printk(KERN_ERR
602 "svc_recv: service %p, transport not NULL!\n",
603 rqstp);
604 if (waitqueue_active(&rqstp->rq_wait))
605 printk(KERN_ERR
606 "svc_recv: service %p, wait queue active!\n",
607 rqstp);
608
609 /* now allocate needed pages. If we get a failure, sleep briefly */
610 pages = (serv->sv_max_mesg + PAGE_SIZE) / PAGE_SIZE;
611 for (i = 0; i < pages ; i++)
612 while (rqstp->rq_pages[i] == NULL) {
613 struct page *p = alloc_page(GFP_KERNEL);
614 if (!p) {
Jeff Layton7b54fe62008-02-12 11:47:24 -0500615 set_current_state(TASK_INTERRUPTIBLE);
616 if (signalled() || kthread_should_stop()) {
617 set_current_state(TASK_RUNNING);
Jeff Layton70867212008-02-07 16:34:54 -0500618 return -EINTR;
Jeff Layton7b54fe62008-02-12 11:47:24 -0500619 }
620 schedule_timeout(msecs_to_jiffies(500));
Tom Tucker0f0257e2007-12-30 21:08:27 -0600621 }
622 rqstp->rq_pages[i] = p;
623 }
624 rqstp->rq_pages[i++] = NULL; /* this might be seen in nfs_read_actor */
625 BUG_ON(pages >= RPCSVC_MAXPAGES);
626
627 /* Make arg->head point to first page and arg->pages point to rest */
628 arg = &rqstp->rq_arg;
629 arg->head[0].iov_base = page_address(rqstp->rq_pages[0]);
630 arg->head[0].iov_len = PAGE_SIZE;
631 arg->pages = rqstp->rq_pages + 1;
632 arg->page_base = 0;
633 /* save at least one page for response */
634 arg->page_len = (pages-2)*PAGE_SIZE;
635 arg->len = (pages-1)*PAGE_SIZE;
636 arg->tail[0].iov_len = 0;
637
638 try_to_freeze();
639 cond_resched();
Jeff Layton70867212008-02-07 16:34:54 -0500640 if (signalled() || kthread_should_stop())
Tom Tucker0f0257e2007-12-30 21:08:27 -0600641 return -EINTR;
642
NeilBrownf16b6e82010-08-12 17:04:06 +1000643 /* Normally we will wait up to 5 seconds for any required
644 * cache information to be provided.
645 */
646 rqstp->rq_chandle.thread_wait = 5*HZ;
647
Tom Tucker0f0257e2007-12-30 21:08:27 -0600648 spin_lock_bh(&pool->sp_lock);
649 xprt = svc_xprt_dequeue(pool);
650 if (xprt) {
651 rqstp->rq_xprt = xprt;
652 svc_xprt_get(xprt);
653 rqstp->rq_reserved = serv->sv_max_mesg;
654 atomic_add(rqstp->rq_reserved, &xprt->xpt_reserved);
NeilBrownf16b6e82010-08-12 17:04:06 +1000655
656 /* As there is a shortage of threads and this request
J. Bruce Fields6610f722010-08-26 13:19:52 -0400657 * had to be queued, don't allow the thread to wait so
NeilBrownf16b6e82010-08-12 17:04:06 +1000658 * long for cache updates.
659 */
660 rqstp->rq_chandle.thread_wait = 1*HZ;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600661 } else {
662 /* No data pending. Go to sleep */
663 svc_thread_enqueue(pool, rqstp);
664
665 /*
666 * We have to be able to interrupt this wait
667 * to bring down the daemons ...
668 */
669 set_current_state(TASK_INTERRUPTIBLE);
Jeff Layton70867212008-02-07 16:34:54 -0500670
671 /*
672 * checking kthread_should_stop() here allows us to avoid
673 * locking and signalling when stopping kthreads that call
674 * svc_recv. If the thread has already been woken up, then
675 * we can exit here without sleeping. If not, then it
676 * it'll be woken up quickly during the schedule_timeout
677 */
678 if (kthread_should_stop()) {
679 set_current_state(TASK_RUNNING);
680 spin_unlock_bh(&pool->sp_lock);
681 return -EINTR;
682 }
683
Tom Tucker0f0257e2007-12-30 21:08:27 -0600684 add_wait_queue(&rqstp->rq_wait, &wait);
685 spin_unlock_bh(&pool->sp_lock);
686
Greg Banks03cf6c92009-01-13 21:26:36 +1100687 time_left = schedule_timeout(timeout);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600688
689 try_to_freeze();
690
691 spin_lock_bh(&pool->sp_lock);
692 remove_wait_queue(&rqstp->rq_wait, &wait);
Greg Banks03cf6c92009-01-13 21:26:36 +1100693 if (!time_left)
694 pool->sp_stats.threads_timedout++;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600695
696 xprt = rqstp->rq_xprt;
697 if (!xprt) {
698 svc_thread_dequeue(pool, rqstp);
699 spin_unlock_bh(&pool->sp_lock);
700 dprintk("svc: server %p, no data yet\n", rqstp);
Jeff Layton70867212008-02-07 16:34:54 -0500701 if (signalled() || kthread_should_stop())
702 return -EINTR;
703 else
704 return -EAGAIN;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600705 }
706 }
707 spin_unlock_bh(&pool->sp_lock);
708
709 len = 0;
J. Bruce Fields1b644b62010-02-28 16:33:31 -0500710 if (test_bit(XPT_CLOSE, &xprt->xpt_flags)) {
711 dprintk("svc_recv: found XPT_CLOSE\n");
712 svc_delete_xprt(xprt);
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400713 /* Leave XPT_BUSY set on the dead xprt: */
714 goto out;
715 }
716 if (test_bit(XPT_LISTENER, &xprt->xpt_flags)) {
Tom Tucker0f0257e2007-12-30 21:08:27 -0600717 struct svc_xprt *newxpt;
718 newxpt = xprt->xpt_ops->xpo_accept(xprt);
719 if (newxpt) {
720 /*
721 * We know this module_get will succeed because the
722 * listener holds a reference too
723 */
724 __module_get(newxpt->xpt_class->xcl_owner);
725 svc_check_conn_limits(xprt->xpt_server);
726 spin_lock_bh(&serv->sv_lock);
727 set_bit(XPT_TEMP, &newxpt->xpt_flags);
728 list_add(&newxpt->xpt_list, &serv->sv_tempsocks);
729 serv->sv_tmpcnt++;
730 if (serv->sv_temptimer.function == NULL) {
731 /* setup timer to age temp transports */
732 setup_timer(&serv->sv_temptimer,
733 svc_age_temp_xprts,
734 (unsigned long)serv);
735 mod_timer(&serv->sv_temptimer,
736 jiffies + svc_conn_age_period * HZ);
737 }
738 spin_unlock_bh(&serv->sv_lock);
739 svc_xprt_received(newxpt);
740 }
J. Bruce Fields9c335c02010-10-26 11:32:03 -0400741 } else if (xprt->xpt_ops->xpo_has_wspace(xprt)) {
Tom Tucker0f0257e2007-12-30 21:08:27 -0600742 dprintk("svc: server %p, pool %u, transport %p, inuse=%d\n",
743 rqstp, pool->sp_id, xprt,
744 atomic_read(&xprt->xpt_ref.refcount));
745 rqstp->rq_deferred = svc_deferred_dequeue(xprt);
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400746 if (rqstp->rq_deferred)
Tom Tucker0f0257e2007-12-30 21:08:27 -0600747 len = svc_deferred_recv(rqstp);
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400748 else
Tom Tucker0f0257e2007-12-30 21:08:27 -0600749 len = xprt->xpt_ops->xpo_recvfrom(rqstp);
750 dprintk("svc: got len=%d\n", len);
751 }
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400752 svc_xprt_received(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600753
754 /* No data, incomplete (TCP) read, or accept() */
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400755 if (len == 0 || len == -EAGAIN)
756 goto out;
757
Tom Tucker0f0257e2007-12-30 21:08:27 -0600758 clear_bit(XPT_OLD, &xprt->xpt_flags);
759
760 rqstp->rq_secure = svc_port_is_privileged(svc_addr(rqstp));
761 rqstp->rq_chandle.defer = svc_defer;
762
763 if (serv->sv_stats)
764 serv->sv_stats->netcnt++;
765 return len;
J. Bruce Fieldsca7896cd2010-10-25 14:12:40 -0400766out:
767 rqstp->rq_res.len = 0;
768 svc_xprt_release(rqstp);
769 return -EAGAIN;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600770}
Trond Myklebust24c37672008-12-23 16:30:12 -0500771EXPORT_SYMBOL_GPL(svc_recv);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600772
773/*
774 * Drop request
775 */
776void svc_drop(struct svc_rqst *rqstp)
777{
778 dprintk("svc: xprt %p dropped request\n", rqstp->rq_xprt);
779 svc_xprt_release(rqstp);
780}
Trond Myklebust24c37672008-12-23 16:30:12 -0500781EXPORT_SYMBOL_GPL(svc_drop);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600782
783/*
784 * Return reply to client.
785 */
786int svc_send(struct svc_rqst *rqstp)
787{
788 struct svc_xprt *xprt;
789 int len;
790 struct xdr_buf *xb;
791
792 xprt = rqstp->rq_xprt;
793 if (!xprt)
794 return -EFAULT;
795
796 /* release the receive skb before sending the reply */
797 rqstp->rq_xprt->xpt_ops->xpo_release_rqst(rqstp);
798
799 /* calculate over-all length */
800 xb = &rqstp->rq_res;
801 xb->len = xb->head[0].iov_len +
802 xb->page_len +
803 xb->tail[0].iov_len;
804
805 /* Grab mutex to serialize outgoing data. */
806 mutex_lock(&xprt->xpt_mutex);
807 if (test_bit(XPT_DEAD, &xprt->xpt_flags))
808 len = -ENOTCONN;
809 else
810 len = xprt->xpt_ops->xpo_sendto(rqstp);
811 mutex_unlock(&xprt->xpt_mutex);
Rahul Iyer4cfc7e62009-09-10 17:32:28 +0300812 rpc_wake_up(&xprt->xpt_bc_pending);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600813 svc_xprt_release(rqstp);
814
815 if (len == -ECONNREFUSED || len == -ENOTCONN || len == -EAGAIN)
816 return 0;
817 return len;
818}
819
820/*
821 * Timer function to close old temporary transports, using
822 * a mark-and-sweep algorithm.
823 */
824static void svc_age_temp_xprts(unsigned long closure)
825{
826 struct svc_serv *serv = (struct svc_serv *)closure;
827 struct svc_xprt *xprt;
828 struct list_head *le, *next;
829 LIST_HEAD(to_be_aged);
830
831 dprintk("svc_age_temp_xprts\n");
832
833 if (!spin_trylock_bh(&serv->sv_lock)) {
834 /* busy, try again 1 sec later */
835 dprintk("svc_age_temp_xprts: busy\n");
836 mod_timer(&serv->sv_temptimer, jiffies + HZ);
837 return;
838 }
839
840 list_for_each_safe(le, next, &serv->sv_tempsocks) {
841 xprt = list_entry(le, struct svc_xprt, xpt_list);
842
843 /* First time through, just mark it OLD. Second time
844 * through, close it. */
845 if (!test_and_set_bit(XPT_OLD, &xprt->xpt_flags))
846 continue;
Joe Perchesf64f9e72009-11-29 16:55:45 -0800847 if (atomic_read(&xprt->xpt_ref.refcount) > 1 ||
848 test_bit(XPT_BUSY, &xprt->xpt_flags))
Tom Tucker0f0257e2007-12-30 21:08:27 -0600849 continue;
850 svc_xprt_get(xprt);
851 list_move(le, &to_be_aged);
852 set_bit(XPT_CLOSE, &xprt->xpt_flags);
853 set_bit(XPT_DETACHED, &xprt->xpt_flags);
854 }
855 spin_unlock_bh(&serv->sv_lock);
856
857 while (!list_empty(&to_be_aged)) {
858 le = to_be_aged.next;
859 /* fiddling the xpt_list node is safe 'cos we're XPT_DETACHED */
860 list_del_init(le);
861 xprt = list_entry(le, struct svc_xprt, xpt_list);
862
863 dprintk("queuing xprt %p for closing\n", xprt);
864
865 /* a thread will dequeue and close it soon */
866 svc_xprt_enqueue(xprt);
867 svc_xprt_put(xprt);
868 }
869
870 mod_timer(&serv->sv_temptimer, jiffies + svc_conn_age_period * HZ);
871}
872
J. Bruce Fieldsedc7a892010-03-22 15:37:17 -0400873static void call_xpt_users(struct svc_xprt *xprt)
874{
875 struct svc_xpt_user *u;
876
877 spin_lock(&xprt->xpt_lock);
878 while (!list_empty(&xprt->xpt_users)) {
879 u = list_first_entry(&xprt->xpt_users, struct svc_xpt_user, list);
880 list_del(&u->list);
881 u->callback(u);
882 }
883 spin_unlock(&xprt->xpt_lock);
884}
885
Tom Tucker0f0257e2007-12-30 21:08:27 -0600886/*
887 * Remove a dead transport
888 */
889void svc_delete_xprt(struct svc_xprt *xprt)
890{
891 struct svc_serv *serv = xprt->xpt_server;
Tom Tucker22945e42009-01-05 15:21:19 -0600892 struct svc_deferred_req *dr;
893
894 /* Only do this once */
895 if (test_and_set_bit(XPT_DEAD, &xprt->xpt_flags))
J. Bruce Fieldsac9303e2010-10-23 11:16:10 -0400896 BUG();
Tom Tucker0f0257e2007-12-30 21:08:27 -0600897
898 dprintk("svc: svc_delete_xprt(%p)\n", xprt);
899 xprt->xpt_ops->xpo_detach(xprt);
900
901 spin_lock_bh(&serv->sv_lock);
902 if (!test_and_set_bit(XPT_DETACHED, &xprt->xpt_flags))
903 list_del_init(&xprt->xpt_list);
904 /*
J. Bruce Fieldsebc63e52011-06-29 16:49:04 -0400905 * The only time we're called while xpt_ready is still on a list
906 * is while the list itself is about to be destroyed (in
907 * svc_destroy). BUT svc_xprt_enqueue could still be attempting
908 * to add new entries to the sp_sockets list, so we can't leave
909 * a freed xprt on it.
Tom Tucker0f0257e2007-12-30 21:08:27 -0600910 */
J. Bruce Fieldsebc63e52011-06-29 16:49:04 -0400911 list_del_init(&xprt->xpt_ready);
Tom Tucker22945e42009-01-05 15:21:19 -0600912 if (test_bit(XPT_TEMP, &xprt->xpt_flags))
913 serv->sv_tmpcnt--;
J. Bruce Fields788e69e2010-03-29 21:02:31 -0400914 spin_unlock_bh(&serv->sv_lock);
Tom Tucker22945e42009-01-05 15:21:19 -0600915
Neil Brownab1b18f2010-02-27 09:33:40 +1100916 while ((dr = svc_deferred_dequeue(xprt)) != NULL)
Tom Tucker22945e42009-01-05 15:21:19 -0600917 kfree(dr);
Tom Tucker22945e42009-01-05 15:21:19 -0600918
J. Bruce Fieldsedc7a892010-03-22 15:37:17 -0400919 call_xpt_users(xprt);
Tom Tucker22945e42009-01-05 15:21:19 -0600920 svc_xprt_put(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600921}
922
923void svc_close_xprt(struct svc_xprt *xprt)
924{
925 set_bit(XPT_CLOSE, &xprt->xpt_flags);
926 if (test_and_set_bit(XPT_BUSY, &xprt->xpt_flags))
927 /* someone else will have to effect the close */
928 return;
J. Bruce Fieldsb1763312010-10-25 20:24:48 -0400929 /*
930 * We expect svc_close_xprt() to work even when no threads are
931 * running (e.g., while configuring the server before starting
932 * any threads), so if the transport isn't busy, we delete
933 * it ourself:
934 */
Tom Tucker0f0257e2007-12-30 21:08:27 -0600935 svc_delete_xprt(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600936}
Tom Tuckera2178132007-12-30 21:08:35 -0600937EXPORT_SYMBOL_GPL(svc_close_xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600938
939void svc_close_all(struct list_head *xprt_list)
940{
941 struct svc_xprt *xprt;
942 struct svc_xprt *tmp;
943
J. Bruce Fieldsf8c0d222010-10-25 18:11:21 -0400944 /*
945 * The server is shutting down, and no more threads are running.
946 * svc_xprt_enqueue() might still be running, but at worst it
947 * will re-add the xprt to sp_sockets, which will soon get
948 * freed. So we don't bother with any more locking, and don't
949 * leave the close to the (nonexistent) server threads:
950 */
Tom Tucker0f0257e2007-12-30 21:08:27 -0600951 list_for_each_entry_safe(xprt, tmp, xprt_list, xpt_list) {
952 set_bit(XPT_CLOSE, &xprt->xpt_flags);
J. Bruce Fieldsf8c0d222010-10-25 18:11:21 -0400953 svc_delete_xprt(xprt);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600954 }
955}
956
957/*
958 * Handle defer and revisit of requests
959 */
960
961static void svc_revisit(struct cache_deferred_req *dreq, int too_many)
962{
963 struct svc_deferred_req *dr =
964 container_of(dreq, struct svc_deferred_req, handle);
965 struct svc_xprt *xprt = dr->xprt;
966
Tom Tucker22945e42009-01-05 15:21:19 -0600967 spin_lock(&xprt->xpt_lock);
968 set_bit(XPT_DEFERRED, &xprt->xpt_flags);
969 if (too_many || test_bit(XPT_DEAD, &xprt->xpt_flags)) {
970 spin_unlock(&xprt->xpt_lock);
971 dprintk("revisit canceled\n");
Tom Tucker0f0257e2007-12-30 21:08:27 -0600972 svc_xprt_put(xprt);
973 kfree(dr);
974 return;
975 }
976 dprintk("revisit queued\n");
977 dr->xprt = NULL;
Tom Tucker0f0257e2007-12-30 21:08:27 -0600978 list_add(&dr->handle.recent, &xprt->xpt_deferred);
979 spin_unlock(&xprt->xpt_lock);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600980 svc_xprt_enqueue(xprt);
981 svc_xprt_put(xprt);
982}
983
Tom Tucker260c1d12007-12-30 21:08:29 -0600984/*
985 * Save the request off for later processing. The request buffer looks
986 * like this:
987 *
988 * <xprt-header><rpc-header><rpc-pagelist><rpc-tail>
989 *
990 * This code can only handle requests that consist of an xprt-header
991 * and rpc-header.
992 */
Tom Tucker0f0257e2007-12-30 21:08:27 -0600993static struct cache_deferred_req *svc_defer(struct cache_req *req)
994{
995 struct svc_rqst *rqstp = container_of(req, struct svc_rqst, rq_chandle);
Tom Tucker0f0257e2007-12-30 21:08:27 -0600996 struct svc_deferred_req *dr;
997
Andy Adamson2f425872009-04-03 08:27:32 +0300998 if (rqstp->rq_arg.page_len || !rqstp->rq_usedeferral)
Tom Tucker0f0257e2007-12-30 21:08:27 -0600999 return NULL; /* if more than a page, give up FIXME */
1000 if (rqstp->rq_deferred) {
1001 dr = rqstp->rq_deferred;
1002 rqstp->rq_deferred = NULL;
1003 } else {
Tom Tucker260c1d12007-12-30 21:08:29 -06001004 size_t skip;
1005 size_t size;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001006 /* FIXME maybe discard if size too large */
Tom Tucker260c1d12007-12-30 21:08:29 -06001007 size = sizeof(struct svc_deferred_req) + rqstp->rq_arg.len;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001008 dr = kmalloc(size, GFP_KERNEL);
1009 if (dr == NULL)
1010 return NULL;
1011
1012 dr->handle.owner = rqstp->rq_server;
1013 dr->prot = rqstp->rq_prot;
1014 memcpy(&dr->addr, &rqstp->rq_addr, rqstp->rq_addrlen);
1015 dr->addrlen = rqstp->rq_addrlen;
1016 dr->daddr = rqstp->rq_daddr;
1017 dr->argslen = rqstp->rq_arg.len >> 2;
Tom Tucker260c1d12007-12-30 21:08:29 -06001018 dr->xprt_hlen = rqstp->rq_xprt_hlen;
1019
1020 /* back up head to the start of the buffer and copy */
1021 skip = rqstp->rq_arg.len - rqstp->rq_arg.head[0].iov_len;
1022 memcpy(dr->args, rqstp->rq_arg.head[0].iov_base - skip,
1023 dr->argslen << 2);
Tom Tucker0f0257e2007-12-30 21:08:27 -06001024 }
1025 svc_xprt_get(rqstp->rq_xprt);
1026 dr->xprt = rqstp->rq_xprt;
J. Bruce Fields9e701c62011-01-02 21:56:36 -05001027 rqstp->rq_dropme = true;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001028
1029 dr->handle.revisit = svc_revisit;
1030 return &dr->handle;
1031}
1032
1033/*
1034 * recv data from a deferred request into an active one
1035 */
1036static int svc_deferred_recv(struct svc_rqst *rqstp)
1037{
1038 struct svc_deferred_req *dr = rqstp->rq_deferred;
1039
Tom Tucker260c1d12007-12-30 21:08:29 -06001040 /* setup iov_base past transport header */
1041 rqstp->rq_arg.head[0].iov_base = dr->args + (dr->xprt_hlen>>2);
1042 /* The iov_len does not include the transport header bytes */
1043 rqstp->rq_arg.head[0].iov_len = (dr->argslen<<2) - dr->xprt_hlen;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001044 rqstp->rq_arg.page_len = 0;
Tom Tucker260c1d12007-12-30 21:08:29 -06001045 /* The rq_arg.len includes the transport header bytes */
1046 rqstp->rq_arg.len = dr->argslen<<2;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001047 rqstp->rq_prot = dr->prot;
1048 memcpy(&rqstp->rq_addr, &dr->addr, dr->addrlen);
1049 rqstp->rq_addrlen = dr->addrlen;
Tom Tucker260c1d12007-12-30 21:08:29 -06001050 /* Save off transport header len in case we get deferred again */
1051 rqstp->rq_xprt_hlen = dr->xprt_hlen;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001052 rqstp->rq_daddr = dr->daddr;
1053 rqstp->rq_respages = rqstp->rq_pages;
Tom Tucker260c1d12007-12-30 21:08:29 -06001054 return (dr->argslen<<2) - dr->xprt_hlen;
Tom Tucker0f0257e2007-12-30 21:08:27 -06001055}
1056
1057
1058static struct svc_deferred_req *svc_deferred_dequeue(struct svc_xprt *xprt)
1059{
1060 struct svc_deferred_req *dr = NULL;
1061
1062 if (!test_bit(XPT_DEFERRED, &xprt->xpt_flags))
1063 return NULL;
1064 spin_lock(&xprt->xpt_lock);
Tom Tucker0f0257e2007-12-30 21:08:27 -06001065 if (!list_empty(&xprt->xpt_deferred)) {
1066 dr = list_entry(xprt->xpt_deferred.next,
1067 struct svc_deferred_req,
1068 handle.recent);
1069 list_del_init(&dr->handle.recent);
J. Bruce Fields62bac4a2010-10-25 12:50:15 -04001070 } else
1071 clear_bit(XPT_DEFERRED, &xprt->xpt_flags);
Tom Tucker0f0257e2007-12-30 21:08:27 -06001072 spin_unlock(&xprt->xpt_lock);
1073 return dr;
1074}
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001075
Chuck Lever156e6202009-03-18 20:45:58 -04001076/**
1077 * svc_find_xprt - find an RPC transport instance
1078 * @serv: pointer to svc_serv to search
1079 * @xcl_name: C string containing transport's class name
1080 * @af: Address family of transport's local address
1081 * @port: transport's IP port number
1082 *
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001083 * Return the transport instance pointer for the endpoint accepting
1084 * connections/peer traffic from the specified transport class,
1085 * address family and port.
1086 *
1087 * Specifying 0 for the address family or port is effectively a
1088 * wild-card, and will result in matching the first transport in the
1089 * service's list that has a matching class name.
1090 */
Chuck Lever156e6202009-03-18 20:45:58 -04001091struct svc_xprt *svc_find_xprt(struct svc_serv *serv, const char *xcl_name,
1092 const sa_family_t af, const unsigned short port)
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001093{
1094 struct svc_xprt *xprt;
1095 struct svc_xprt *found = NULL;
1096
1097 /* Sanity check the args */
Chuck Lever156e6202009-03-18 20:45:58 -04001098 if (serv == NULL || xcl_name == NULL)
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001099 return found;
1100
1101 spin_lock_bh(&serv->sv_lock);
1102 list_for_each_entry(xprt, &serv->sv_permsocks, xpt_list) {
1103 if (strcmp(xprt->xpt_class->xcl_name, xcl_name))
1104 continue;
1105 if (af != AF_UNSPEC && af != xprt->xpt_local.ss_family)
1106 continue;
Chuck Lever156e6202009-03-18 20:45:58 -04001107 if (port != 0 && port != svc_xprt_local_port(xprt))
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001108 continue;
1109 found = xprt;
Tom Tuckera2178132007-12-30 21:08:35 -06001110 svc_xprt_get(xprt);
Tom Tucker7fcb98d2007-12-30 21:08:33 -06001111 break;
1112 }
1113 spin_unlock_bh(&serv->sv_lock);
1114 return found;
1115}
1116EXPORT_SYMBOL_GPL(svc_find_xprt);
Tom Tucker9571af12007-12-30 21:08:37 -06001117
Chuck Lever335c54b2009-04-23 19:32:25 -04001118static int svc_one_xprt_name(const struct svc_xprt *xprt,
1119 char *pos, int remaining)
1120{
1121 int len;
1122
1123 len = snprintf(pos, remaining, "%s %u\n",
1124 xprt->xpt_class->xcl_name,
1125 svc_xprt_local_port(xprt));
1126 if (len >= remaining)
1127 return -ENAMETOOLONG;
1128 return len;
1129}
1130
1131/**
1132 * svc_xprt_names - format a buffer with a list of transport names
1133 * @serv: pointer to an RPC service
1134 * @buf: pointer to a buffer to be filled in
1135 * @buflen: length of buffer to be filled in
1136 *
1137 * Fills in @buf with a string containing a list of transport names,
1138 * each name terminated with '\n'.
1139 *
1140 * Returns positive length of the filled-in string on success; otherwise
1141 * a negative errno value is returned if an error occurs.
Tom Tucker9571af12007-12-30 21:08:37 -06001142 */
Chuck Lever335c54b2009-04-23 19:32:25 -04001143int svc_xprt_names(struct svc_serv *serv, char *buf, const int buflen)
Tom Tucker9571af12007-12-30 21:08:37 -06001144{
1145 struct svc_xprt *xprt;
Chuck Lever335c54b2009-04-23 19:32:25 -04001146 int len, totlen;
1147 char *pos;
Tom Tucker9571af12007-12-30 21:08:37 -06001148
1149 /* Sanity check args */
1150 if (!serv)
1151 return 0;
1152
1153 spin_lock_bh(&serv->sv_lock);
Chuck Lever335c54b2009-04-23 19:32:25 -04001154
1155 pos = buf;
1156 totlen = 0;
Tom Tucker9571af12007-12-30 21:08:37 -06001157 list_for_each_entry(xprt, &serv->sv_permsocks, xpt_list) {
Chuck Lever335c54b2009-04-23 19:32:25 -04001158 len = svc_one_xprt_name(xprt, pos, buflen - totlen);
1159 if (len < 0) {
1160 *buf = '\0';
1161 totlen = len;
1162 }
1163 if (len <= 0)
Tom Tucker9571af12007-12-30 21:08:37 -06001164 break;
Chuck Lever335c54b2009-04-23 19:32:25 -04001165
1166 pos += len;
Tom Tucker9571af12007-12-30 21:08:37 -06001167 totlen += len;
1168 }
Chuck Lever335c54b2009-04-23 19:32:25 -04001169
Tom Tucker9571af12007-12-30 21:08:37 -06001170 spin_unlock_bh(&serv->sv_lock);
1171 return totlen;
1172}
1173EXPORT_SYMBOL_GPL(svc_xprt_names);
Greg Banks03cf6c92009-01-13 21:26:36 +11001174
1175
1176/*----------------------------------------------------------------------------*/
1177
1178static void *svc_pool_stats_start(struct seq_file *m, loff_t *pos)
1179{
1180 unsigned int pidx = (unsigned int)*pos;
1181 struct svc_serv *serv = m->private;
1182
1183 dprintk("svc_pool_stats_start, *pidx=%u\n", pidx);
1184
Greg Banks03cf6c92009-01-13 21:26:36 +11001185 if (!pidx)
1186 return SEQ_START_TOKEN;
1187 return (pidx > serv->sv_nrpools ? NULL : &serv->sv_pools[pidx-1]);
1188}
1189
1190static void *svc_pool_stats_next(struct seq_file *m, void *p, loff_t *pos)
1191{
1192 struct svc_pool *pool = p;
1193 struct svc_serv *serv = m->private;
1194
1195 dprintk("svc_pool_stats_next, *pos=%llu\n", *pos);
1196
1197 if (p == SEQ_START_TOKEN) {
1198 pool = &serv->sv_pools[0];
1199 } else {
1200 unsigned int pidx = (pool - &serv->sv_pools[0]);
1201 if (pidx < serv->sv_nrpools-1)
1202 pool = &serv->sv_pools[pidx+1];
1203 else
1204 pool = NULL;
1205 }
1206 ++*pos;
1207 return pool;
1208}
1209
1210static void svc_pool_stats_stop(struct seq_file *m, void *p)
1211{
Greg Banks03cf6c92009-01-13 21:26:36 +11001212}
1213
1214static int svc_pool_stats_show(struct seq_file *m, void *p)
1215{
1216 struct svc_pool *pool = p;
1217
1218 if (p == SEQ_START_TOKEN) {
J. Bruce Fields78c210e2009-08-06 15:41:34 -04001219 seq_puts(m, "# pool packets-arrived sockets-enqueued threads-woken threads-timedout\n");
Greg Banks03cf6c92009-01-13 21:26:36 +11001220 return 0;
1221 }
1222
J. Bruce Fields78c210e2009-08-06 15:41:34 -04001223 seq_printf(m, "%u %lu %lu %lu %lu\n",
Greg Banks03cf6c92009-01-13 21:26:36 +11001224 pool->sp_id,
1225 pool->sp_stats.packets,
1226 pool->sp_stats.sockets_queued,
1227 pool->sp_stats.threads_woken,
Greg Banks03cf6c92009-01-13 21:26:36 +11001228 pool->sp_stats.threads_timedout);
1229
1230 return 0;
1231}
1232
1233static const struct seq_operations svc_pool_stats_seq_ops = {
1234 .start = svc_pool_stats_start,
1235 .next = svc_pool_stats_next,
1236 .stop = svc_pool_stats_stop,
1237 .show = svc_pool_stats_show,
1238};
1239
1240int svc_pool_stats_open(struct svc_serv *serv, struct file *file)
1241{
1242 int err;
1243
1244 err = seq_open(file, &svc_pool_stats_seq_ops);
1245 if (!err)
1246 ((struct seq_file *) file->private_data)->private = serv;
1247 return err;
1248}
1249EXPORT_SYMBOL(svc_pool_stats_open);
1250
1251/*----------------------------------------------------------------------------*/