]> git.ipfire.org Git - thirdparty/kernel/stable.git/blob - net/sunrpc/clnt.c
Merge tag 'kvm-x86-mmu-6.7' of https://github.com/kvm-x86/linux into HEAD
[thirdparty/kernel/stable.git] / net / sunrpc / clnt.c
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * linux/net/sunrpc/clnt.c
4 *
5 * This file contains the high-level RPC interface.
6 * It is modeled as a finite state machine to support both synchronous
7 * and asynchronous requests.
8 *
9 * - RPC header generation and argument serialization.
10 * - Credential refresh.
11 * - TCP connect handling.
12 * - Retry of operation when it is suspected the operation failed because
13 * of uid squashing on the server, or when the credentials were stale
14 * and need to be refreshed, or when a packet was damaged in transit.
15 * This may be have to be moved to the VFS layer.
16 *
17 * Copyright (C) 1992,1993 Rick Sladkey <jrs@world.std.com>
18 * Copyright (C) 1995,1996 Olaf Kirch <okir@monad.swb.de>
19 */
20
21
22 #include <linux/module.h>
23 #include <linux/types.h>
24 #include <linux/kallsyms.h>
25 #include <linux/mm.h>
26 #include <linux/namei.h>
27 #include <linux/mount.h>
28 #include <linux/slab.h>
29 #include <linux/rcupdate.h>
30 #include <linux/utsname.h>
31 #include <linux/workqueue.h>
32 #include <linux/in.h>
33 #include <linux/in6.h>
34 #include <linux/un.h>
35
36 #include <linux/sunrpc/clnt.h>
37 #include <linux/sunrpc/addr.h>
38 #include <linux/sunrpc/rpc_pipe_fs.h>
39 #include <linux/sunrpc/metrics.h>
40 #include <linux/sunrpc/bc_xprt.h>
41 #include <trace/events/sunrpc.h>
42
43 #include "sunrpc.h"
44 #include "sysfs.h"
45 #include "netns.h"
46
47 #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
48 # define RPCDBG_FACILITY RPCDBG_CALL
49 #endif
50
51 /*
52 * All RPC clients are linked into this list
53 */
54
55 static DECLARE_WAIT_QUEUE_HEAD(destroy_wait);
56
57
58 static void call_start(struct rpc_task *task);
59 static void call_reserve(struct rpc_task *task);
60 static void call_reserveresult(struct rpc_task *task);
61 static void call_allocate(struct rpc_task *task);
62 static void call_encode(struct rpc_task *task);
63 static void call_decode(struct rpc_task *task);
64 static void call_bind(struct rpc_task *task);
65 static void call_bind_status(struct rpc_task *task);
66 static void call_transmit(struct rpc_task *task);
67 static void call_status(struct rpc_task *task);
68 static void call_transmit_status(struct rpc_task *task);
69 static void call_refresh(struct rpc_task *task);
70 static void call_refreshresult(struct rpc_task *task);
71 static void call_connect(struct rpc_task *task);
72 static void call_connect_status(struct rpc_task *task);
73
74 static int rpc_encode_header(struct rpc_task *task,
75 struct xdr_stream *xdr);
76 static int rpc_decode_header(struct rpc_task *task,
77 struct xdr_stream *xdr);
78 static int rpc_ping(struct rpc_clnt *clnt);
79 static int rpc_ping_noreply(struct rpc_clnt *clnt);
80 static void rpc_check_timeout(struct rpc_task *task);
81
82 static void rpc_register_client(struct rpc_clnt *clnt)
83 {
84 struct net *net = rpc_net_ns(clnt);
85 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
86
87 spin_lock(&sn->rpc_client_lock);
88 list_add(&clnt->cl_clients, &sn->all_clients);
89 spin_unlock(&sn->rpc_client_lock);
90 }
91
92 static void rpc_unregister_client(struct rpc_clnt *clnt)
93 {
94 struct net *net = rpc_net_ns(clnt);
95 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
96
97 spin_lock(&sn->rpc_client_lock);
98 list_del(&clnt->cl_clients);
99 spin_unlock(&sn->rpc_client_lock);
100 }
101
102 static void __rpc_clnt_remove_pipedir(struct rpc_clnt *clnt)
103 {
104 rpc_remove_client_dir(clnt);
105 }
106
107 static void rpc_clnt_remove_pipedir(struct rpc_clnt *clnt)
108 {
109 struct net *net = rpc_net_ns(clnt);
110 struct super_block *pipefs_sb;
111
112 pipefs_sb = rpc_get_sb_net(net);
113 if (pipefs_sb) {
114 __rpc_clnt_remove_pipedir(clnt);
115 rpc_put_sb_net(net);
116 }
117 }
118
119 static struct dentry *rpc_setup_pipedir_sb(struct super_block *sb,
120 struct rpc_clnt *clnt)
121 {
122 static uint32_t clntid;
123 const char *dir_name = clnt->cl_program->pipe_dir_name;
124 char name[15];
125 struct dentry *dir, *dentry;
126
127 dir = rpc_d_lookup_sb(sb, dir_name);
128 if (dir == NULL) {
129 pr_info("RPC: pipefs directory doesn't exist: %s\n", dir_name);
130 return dir;
131 }
132 for (;;) {
133 snprintf(name, sizeof(name), "clnt%x", (unsigned int)clntid++);
134 name[sizeof(name) - 1] = '\0';
135 dentry = rpc_create_client_dir(dir, name, clnt);
136 if (!IS_ERR(dentry))
137 break;
138 if (dentry == ERR_PTR(-EEXIST))
139 continue;
140 printk(KERN_INFO "RPC: Couldn't create pipefs entry"
141 " %s/%s, error %ld\n",
142 dir_name, name, PTR_ERR(dentry));
143 break;
144 }
145 dput(dir);
146 return dentry;
147 }
148
149 static int
150 rpc_setup_pipedir(struct super_block *pipefs_sb, struct rpc_clnt *clnt)
151 {
152 struct dentry *dentry;
153
154 if (clnt->cl_program->pipe_dir_name != NULL) {
155 dentry = rpc_setup_pipedir_sb(pipefs_sb, clnt);
156 if (IS_ERR(dentry))
157 return PTR_ERR(dentry);
158 }
159 return 0;
160 }
161
162 static int rpc_clnt_skip_event(struct rpc_clnt *clnt, unsigned long event)
163 {
164 if (clnt->cl_program->pipe_dir_name == NULL)
165 return 1;
166
167 switch (event) {
168 case RPC_PIPEFS_MOUNT:
169 if (clnt->cl_pipedir_objects.pdh_dentry != NULL)
170 return 1;
171 if (refcount_read(&clnt->cl_count) == 0)
172 return 1;
173 break;
174 case RPC_PIPEFS_UMOUNT:
175 if (clnt->cl_pipedir_objects.pdh_dentry == NULL)
176 return 1;
177 break;
178 }
179 return 0;
180 }
181
182 static int __rpc_clnt_handle_event(struct rpc_clnt *clnt, unsigned long event,
183 struct super_block *sb)
184 {
185 struct dentry *dentry;
186
187 switch (event) {
188 case RPC_PIPEFS_MOUNT:
189 dentry = rpc_setup_pipedir_sb(sb, clnt);
190 if (!dentry)
191 return -ENOENT;
192 if (IS_ERR(dentry))
193 return PTR_ERR(dentry);
194 break;
195 case RPC_PIPEFS_UMOUNT:
196 __rpc_clnt_remove_pipedir(clnt);
197 break;
198 default:
199 printk(KERN_ERR "%s: unknown event: %ld\n", __func__, event);
200 return -ENOTSUPP;
201 }
202 return 0;
203 }
204
205 static int __rpc_pipefs_event(struct rpc_clnt *clnt, unsigned long event,
206 struct super_block *sb)
207 {
208 int error = 0;
209
210 for (;; clnt = clnt->cl_parent) {
211 if (!rpc_clnt_skip_event(clnt, event))
212 error = __rpc_clnt_handle_event(clnt, event, sb);
213 if (error || clnt == clnt->cl_parent)
214 break;
215 }
216 return error;
217 }
218
219 static struct rpc_clnt *rpc_get_client_for_event(struct net *net, int event)
220 {
221 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
222 struct rpc_clnt *clnt;
223
224 spin_lock(&sn->rpc_client_lock);
225 list_for_each_entry(clnt, &sn->all_clients, cl_clients) {
226 if (rpc_clnt_skip_event(clnt, event))
227 continue;
228 spin_unlock(&sn->rpc_client_lock);
229 return clnt;
230 }
231 spin_unlock(&sn->rpc_client_lock);
232 return NULL;
233 }
234
235 static int rpc_pipefs_event(struct notifier_block *nb, unsigned long event,
236 void *ptr)
237 {
238 struct super_block *sb = ptr;
239 struct rpc_clnt *clnt;
240 int error = 0;
241
242 while ((clnt = rpc_get_client_for_event(sb->s_fs_info, event))) {
243 error = __rpc_pipefs_event(clnt, event, sb);
244 if (error)
245 break;
246 }
247 return error;
248 }
249
250 static struct notifier_block rpc_clients_block = {
251 .notifier_call = rpc_pipefs_event,
252 .priority = SUNRPC_PIPEFS_RPC_PRIO,
253 };
254
255 int rpc_clients_notifier_register(void)
256 {
257 return rpc_pipefs_notifier_register(&rpc_clients_block);
258 }
259
260 void rpc_clients_notifier_unregister(void)
261 {
262 return rpc_pipefs_notifier_unregister(&rpc_clients_block);
263 }
264
265 static struct rpc_xprt *rpc_clnt_set_transport(struct rpc_clnt *clnt,
266 struct rpc_xprt *xprt,
267 const struct rpc_timeout *timeout)
268 {
269 struct rpc_xprt *old;
270
271 spin_lock(&clnt->cl_lock);
272 old = rcu_dereference_protected(clnt->cl_xprt,
273 lockdep_is_held(&clnt->cl_lock));
274
275 if (!xprt_bound(xprt))
276 clnt->cl_autobind = 1;
277
278 clnt->cl_timeout = timeout;
279 rcu_assign_pointer(clnt->cl_xprt, xprt);
280 spin_unlock(&clnt->cl_lock);
281
282 return old;
283 }
284
285 static void rpc_clnt_set_nodename(struct rpc_clnt *clnt, const char *nodename)
286 {
287 clnt->cl_nodelen = strlcpy(clnt->cl_nodename,
288 nodename, sizeof(clnt->cl_nodename));
289 }
290
291 static int rpc_client_register(struct rpc_clnt *clnt,
292 rpc_authflavor_t pseudoflavor,
293 const char *client_name)
294 {
295 struct rpc_auth_create_args auth_args = {
296 .pseudoflavor = pseudoflavor,
297 .target_name = client_name,
298 };
299 struct rpc_auth *auth;
300 struct net *net = rpc_net_ns(clnt);
301 struct super_block *pipefs_sb;
302 int err;
303
304 rpc_clnt_debugfs_register(clnt);
305
306 pipefs_sb = rpc_get_sb_net(net);
307 if (pipefs_sb) {
308 err = rpc_setup_pipedir(pipefs_sb, clnt);
309 if (err)
310 goto out;
311 }
312
313 rpc_register_client(clnt);
314 if (pipefs_sb)
315 rpc_put_sb_net(net);
316
317 auth = rpcauth_create(&auth_args, clnt);
318 if (IS_ERR(auth)) {
319 dprintk("RPC: Couldn't create auth handle (flavor %u)\n",
320 pseudoflavor);
321 err = PTR_ERR(auth);
322 goto err_auth;
323 }
324 return 0;
325 err_auth:
326 pipefs_sb = rpc_get_sb_net(net);
327 rpc_unregister_client(clnt);
328 __rpc_clnt_remove_pipedir(clnt);
329 out:
330 if (pipefs_sb)
331 rpc_put_sb_net(net);
332 rpc_sysfs_client_destroy(clnt);
333 rpc_clnt_debugfs_unregister(clnt);
334 return err;
335 }
336
337 static DEFINE_IDA(rpc_clids);
338
339 void rpc_cleanup_clids(void)
340 {
341 ida_destroy(&rpc_clids);
342 }
343
344 static int rpc_alloc_clid(struct rpc_clnt *clnt)
345 {
346 int clid;
347
348 clid = ida_alloc(&rpc_clids, GFP_KERNEL);
349 if (clid < 0)
350 return clid;
351 clnt->cl_clid = clid;
352 return 0;
353 }
354
355 static void rpc_free_clid(struct rpc_clnt *clnt)
356 {
357 ida_free(&rpc_clids, clnt->cl_clid);
358 }
359
360 static struct rpc_clnt * rpc_new_client(const struct rpc_create_args *args,
361 struct rpc_xprt_switch *xps,
362 struct rpc_xprt *xprt,
363 struct rpc_clnt *parent)
364 {
365 const struct rpc_program *program = args->program;
366 const struct rpc_version *version;
367 struct rpc_clnt *clnt = NULL;
368 const struct rpc_timeout *timeout;
369 const char *nodename = args->nodename;
370 int err;
371
372 err = rpciod_up();
373 if (err)
374 goto out_no_rpciod;
375
376 err = -EINVAL;
377 if (args->version >= program->nrvers)
378 goto out_err;
379 version = program->version[args->version];
380 if (version == NULL)
381 goto out_err;
382
383 err = -ENOMEM;
384 clnt = kzalloc(sizeof(*clnt), GFP_KERNEL);
385 if (!clnt)
386 goto out_err;
387 clnt->cl_parent = parent ? : clnt;
388 clnt->cl_xprtsec = args->xprtsec;
389
390 err = rpc_alloc_clid(clnt);
391 if (err)
392 goto out_no_clid;
393
394 clnt->cl_cred = get_cred(args->cred);
395 clnt->cl_procinfo = version->procs;
396 clnt->cl_maxproc = version->nrprocs;
397 clnt->cl_prog = args->prognumber ? : program->number;
398 clnt->cl_vers = version->number;
399 clnt->cl_stats = program->stats;
400 clnt->cl_metrics = rpc_alloc_iostats(clnt);
401 rpc_init_pipe_dir_head(&clnt->cl_pipedir_objects);
402 err = -ENOMEM;
403 if (clnt->cl_metrics == NULL)
404 goto out_no_stats;
405 clnt->cl_program = program;
406 INIT_LIST_HEAD(&clnt->cl_tasks);
407 spin_lock_init(&clnt->cl_lock);
408
409 timeout = xprt->timeout;
410 if (args->timeout != NULL) {
411 memcpy(&clnt->cl_timeout_default, args->timeout,
412 sizeof(clnt->cl_timeout_default));
413 timeout = &clnt->cl_timeout_default;
414 }
415
416 rpc_clnt_set_transport(clnt, xprt, timeout);
417 xprt->main = true;
418 xprt_iter_init(&clnt->cl_xpi, xps);
419 xprt_switch_put(xps);
420
421 clnt->cl_rtt = &clnt->cl_rtt_default;
422 rpc_init_rtt(&clnt->cl_rtt_default, clnt->cl_timeout->to_initval);
423
424 refcount_set(&clnt->cl_count, 1);
425
426 if (nodename == NULL)
427 nodename = utsname()->nodename;
428 /* save the nodename */
429 rpc_clnt_set_nodename(clnt, nodename);
430
431 rpc_sysfs_client_setup(clnt, xps, rpc_net_ns(clnt));
432 err = rpc_client_register(clnt, args->authflavor, args->client_name);
433 if (err)
434 goto out_no_path;
435 if (parent)
436 refcount_inc(&parent->cl_count);
437
438 trace_rpc_clnt_new(clnt, xprt, args);
439 return clnt;
440
441 out_no_path:
442 rpc_free_iostats(clnt->cl_metrics);
443 out_no_stats:
444 put_cred(clnt->cl_cred);
445 rpc_free_clid(clnt);
446 out_no_clid:
447 kfree(clnt);
448 out_err:
449 rpciod_down();
450 out_no_rpciod:
451 xprt_switch_put(xps);
452 xprt_put(xprt);
453 trace_rpc_clnt_new_err(program->name, args->servername, err);
454 return ERR_PTR(err);
455 }
456
457 static struct rpc_clnt *rpc_create_xprt(struct rpc_create_args *args,
458 struct rpc_xprt *xprt)
459 {
460 struct rpc_clnt *clnt = NULL;
461 struct rpc_xprt_switch *xps;
462
463 if (args->bc_xprt && args->bc_xprt->xpt_bc_xps) {
464 WARN_ON_ONCE(!(args->protocol & XPRT_TRANSPORT_BC));
465 xps = args->bc_xprt->xpt_bc_xps;
466 xprt_switch_get(xps);
467 } else {
468 xps = xprt_switch_alloc(xprt, GFP_KERNEL);
469 if (xps == NULL) {
470 xprt_put(xprt);
471 return ERR_PTR(-ENOMEM);
472 }
473 if (xprt->bc_xprt) {
474 xprt_switch_get(xps);
475 xprt->bc_xprt->xpt_bc_xps = xps;
476 }
477 }
478 clnt = rpc_new_client(args, xps, xprt, NULL);
479 if (IS_ERR(clnt))
480 return clnt;
481
482 if (!(args->flags & RPC_CLNT_CREATE_NOPING)) {
483 int err = rpc_ping(clnt);
484 if (err != 0) {
485 rpc_shutdown_client(clnt);
486 return ERR_PTR(err);
487 }
488 } else if (args->flags & RPC_CLNT_CREATE_CONNECTED) {
489 int err = rpc_ping_noreply(clnt);
490 if (err != 0) {
491 rpc_shutdown_client(clnt);
492 return ERR_PTR(err);
493 }
494 }
495
496 clnt->cl_softrtry = 1;
497 if (args->flags & (RPC_CLNT_CREATE_HARDRTRY|RPC_CLNT_CREATE_SOFTERR)) {
498 clnt->cl_softrtry = 0;
499 if (args->flags & RPC_CLNT_CREATE_SOFTERR)
500 clnt->cl_softerr = 1;
501 }
502
503 if (args->flags & RPC_CLNT_CREATE_AUTOBIND)
504 clnt->cl_autobind = 1;
505 if (args->flags & RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT)
506 clnt->cl_noretranstimeo = 1;
507 if (args->flags & RPC_CLNT_CREATE_DISCRTRY)
508 clnt->cl_discrtry = 1;
509 if (!(args->flags & RPC_CLNT_CREATE_QUIET))
510 clnt->cl_chatty = 1;
511
512 return clnt;
513 }
514
515 /**
516 * rpc_create - create an RPC client and transport with one call
517 * @args: rpc_clnt create argument structure
518 *
519 * Creates and initializes an RPC transport and an RPC client.
520 *
521 * It can ping the server in order to determine if it is up, and to see if
522 * it supports this program and version. RPC_CLNT_CREATE_NOPING disables
523 * this behavior so asynchronous tasks can also use rpc_create.
524 */
525 struct rpc_clnt *rpc_create(struct rpc_create_args *args)
526 {
527 struct rpc_xprt *xprt;
528 struct xprt_create xprtargs = {
529 .net = args->net,
530 .ident = args->protocol,
531 .srcaddr = args->saddress,
532 .dstaddr = args->address,
533 .addrlen = args->addrsize,
534 .servername = args->servername,
535 .bc_xprt = args->bc_xprt,
536 .xprtsec = args->xprtsec,
537 .connect_timeout = args->connect_timeout,
538 .reconnect_timeout = args->reconnect_timeout,
539 };
540 char servername[48];
541 struct rpc_clnt *clnt;
542 int i;
543
544 if (args->bc_xprt) {
545 WARN_ON_ONCE(!(args->protocol & XPRT_TRANSPORT_BC));
546 xprt = args->bc_xprt->xpt_bc_xprt;
547 if (xprt) {
548 xprt_get(xprt);
549 return rpc_create_xprt(args, xprt);
550 }
551 }
552
553 if (args->flags & RPC_CLNT_CREATE_INFINITE_SLOTS)
554 xprtargs.flags |= XPRT_CREATE_INFINITE_SLOTS;
555 if (args->flags & RPC_CLNT_CREATE_NO_IDLE_TIMEOUT)
556 xprtargs.flags |= XPRT_CREATE_NO_IDLE_TIMEOUT;
557 /*
558 * If the caller chooses not to specify a hostname, whip
559 * up a string representation of the passed-in address.
560 */
561 if (xprtargs.servername == NULL) {
562 struct sockaddr_un *sun =
563 (struct sockaddr_un *)args->address;
564 struct sockaddr_in *sin =
565 (struct sockaddr_in *)args->address;
566 struct sockaddr_in6 *sin6 =
567 (struct sockaddr_in6 *)args->address;
568
569 servername[0] = '\0';
570 switch (args->address->sa_family) {
571 case AF_LOCAL:
572 if (sun->sun_path[0])
573 snprintf(servername, sizeof(servername), "%s",
574 sun->sun_path);
575 else
576 snprintf(servername, sizeof(servername), "@%s",
577 sun->sun_path+1);
578 break;
579 case AF_INET:
580 snprintf(servername, sizeof(servername), "%pI4",
581 &sin->sin_addr.s_addr);
582 break;
583 case AF_INET6:
584 snprintf(servername, sizeof(servername), "%pI6",
585 &sin6->sin6_addr);
586 break;
587 default:
588 /* caller wants default server name, but
589 * address family isn't recognized. */
590 return ERR_PTR(-EINVAL);
591 }
592 xprtargs.servername = servername;
593 }
594
595 xprt = xprt_create_transport(&xprtargs);
596 if (IS_ERR(xprt))
597 return (struct rpc_clnt *)xprt;
598
599 /*
600 * By default, kernel RPC client connects from a reserved port.
601 * CAP_NET_BIND_SERVICE will not be set for unprivileged requesters,
602 * but it is always enabled for rpciod, which handles the connect
603 * operation.
604 */
605 xprt->resvport = 1;
606 if (args->flags & RPC_CLNT_CREATE_NONPRIVPORT)
607 xprt->resvport = 0;
608 xprt->reuseport = 0;
609 if (args->flags & RPC_CLNT_CREATE_REUSEPORT)
610 xprt->reuseport = 1;
611
612 clnt = rpc_create_xprt(args, xprt);
613 if (IS_ERR(clnt) || args->nconnect <= 1)
614 return clnt;
615
616 for (i = 0; i < args->nconnect - 1; i++) {
617 if (rpc_clnt_add_xprt(clnt, &xprtargs, NULL, NULL) < 0)
618 break;
619 }
620 return clnt;
621 }
622 EXPORT_SYMBOL_GPL(rpc_create);
623
624 /*
625 * This function clones the RPC client structure. It allows us to share the
626 * same transport while varying parameters such as the authentication
627 * flavour.
628 */
629 static struct rpc_clnt *__rpc_clone_client(struct rpc_create_args *args,
630 struct rpc_clnt *clnt)
631 {
632 struct rpc_xprt_switch *xps;
633 struct rpc_xprt *xprt;
634 struct rpc_clnt *new;
635 int err;
636
637 err = -ENOMEM;
638 rcu_read_lock();
639 xprt = xprt_get(rcu_dereference(clnt->cl_xprt));
640 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
641 rcu_read_unlock();
642 if (xprt == NULL || xps == NULL) {
643 xprt_put(xprt);
644 xprt_switch_put(xps);
645 goto out_err;
646 }
647 args->servername = xprt->servername;
648 args->nodename = clnt->cl_nodename;
649
650 new = rpc_new_client(args, xps, xprt, clnt);
651 if (IS_ERR(new))
652 return new;
653
654 /* Turn off autobind on clones */
655 new->cl_autobind = 0;
656 new->cl_softrtry = clnt->cl_softrtry;
657 new->cl_softerr = clnt->cl_softerr;
658 new->cl_noretranstimeo = clnt->cl_noretranstimeo;
659 new->cl_discrtry = clnt->cl_discrtry;
660 new->cl_chatty = clnt->cl_chatty;
661 new->cl_principal = clnt->cl_principal;
662 new->cl_max_connect = clnt->cl_max_connect;
663 return new;
664
665 out_err:
666 trace_rpc_clnt_clone_err(clnt, err);
667 return ERR_PTR(err);
668 }
669
670 /**
671 * rpc_clone_client - Clone an RPC client structure
672 *
673 * @clnt: RPC client whose parameters are copied
674 *
675 * Returns a fresh RPC client or an ERR_PTR.
676 */
677 struct rpc_clnt *rpc_clone_client(struct rpc_clnt *clnt)
678 {
679 struct rpc_create_args args = {
680 .program = clnt->cl_program,
681 .prognumber = clnt->cl_prog,
682 .version = clnt->cl_vers,
683 .authflavor = clnt->cl_auth->au_flavor,
684 .cred = clnt->cl_cred,
685 };
686 return __rpc_clone_client(&args, clnt);
687 }
688 EXPORT_SYMBOL_GPL(rpc_clone_client);
689
690 /**
691 * rpc_clone_client_set_auth - Clone an RPC client structure and set its auth
692 *
693 * @clnt: RPC client whose parameters are copied
694 * @flavor: security flavor for new client
695 *
696 * Returns a fresh RPC client or an ERR_PTR.
697 */
698 struct rpc_clnt *
699 rpc_clone_client_set_auth(struct rpc_clnt *clnt, rpc_authflavor_t flavor)
700 {
701 struct rpc_create_args args = {
702 .program = clnt->cl_program,
703 .prognumber = clnt->cl_prog,
704 .version = clnt->cl_vers,
705 .authflavor = flavor,
706 .cred = clnt->cl_cred,
707 };
708 return __rpc_clone_client(&args, clnt);
709 }
710 EXPORT_SYMBOL_GPL(rpc_clone_client_set_auth);
711
712 /**
713 * rpc_switch_client_transport: switch the RPC transport on the fly
714 * @clnt: pointer to a struct rpc_clnt
715 * @args: pointer to the new transport arguments
716 * @timeout: pointer to the new timeout parameters
717 *
718 * This function allows the caller to switch the RPC transport for the
719 * rpc_clnt structure 'clnt' to allow it to connect to a mirrored NFS
720 * server, for instance. It assumes that the caller has ensured that
721 * there are no active RPC tasks by using some form of locking.
722 *
723 * Returns zero if "clnt" is now using the new xprt. Otherwise a
724 * negative errno is returned, and "clnt" continues to use the old
725 * xprt.
726 */
727 int rpc_switch_client_transport(struct rpc_clnt *clnt,
728 struct xprt_create *args,
729 const struct rpc_timeout *timeout)
730 {
731 const struct rpc_timeout *old_timeo;
732 rpc_authflavor_t pseudoflavor;
733 struct rpc_xprt_switch *xps, *oldxps;
734 struct rpc_xprt *xprt, *old;
735 struct rpc_clnt *parent;
736 int err;
737
738 args->xprtsec = clnt->cl_xprtsec;
739 xprt = xprt_create_transport(args);
740 if (IS_ERR(xprt))
741 return PTR_ERR(xprt);
742
743 xps = xprt_switch_alloc(xprt, GFP_KERNEL);
744 if (xps == NULL) {
745 xprt_put(xprt);
746 return -ENOMEM;
747 }
748
749 pseudoflavor = clnt->cl_auth->au_flavor;
750
751 old_timeo = clnt->cl_timeout;
752 old = rpc_clnt_set_transport(clnt, xprt, timeout);
753 oldxps = xprt_iter_xchg_switch(&clnt->cl_xpi, xps);
754
755 rpc_unregister_client(clnt);
756 __rpc_clnt_remove_pipedir(clnt);
757 rpc_sysfs_client_destroy(clnt);
758 rpc_clnt_debugfs_unregister(clnt);
759
760 /*
761 * A new transport was created. "clnt" therefore
762 * becomes the root of a new cl_parent tree. clnt's
763 * children, if it has any, still point to the old xprt.
764 */
765 parent = clnt->cl_parent;
766 clnt->cl_parent = clnt;
767
768 /*
769 * The old rpc_auth cache cannot be re-used. GSS
770 * contexts in particular are between a single
771 * client and server.
772 */
773 err = rpc_client_register(clnt, pseudoflavor, NULL);
774 if (err)
775 goto out_revert;
776
777 synchronize_rcu();
778 if (parent != clnt)
779 rpc_release_client(parent);
780 xprt_switch_put(oldxps);
781 xprt_put(old);
782 trace_rpc_clnt_replace_xprt(clnt);
783 return 0;
784
785 out_revert:
786 xps = xprt_iter_xchg_switch(&clnt->cl_xpi, oldxps);
787 rpc_clnt_set_transport(clnt, old, old_timeo);
788 clnt->cl_parent = parent;
789 rpc_client_register(clnt, pseudoflavor, NULL);
790 xprt_switch_put(xps);
791 xprt_put(xprt);
792 trace_rpc_clnt_replace_xprt_err(clnt);
793 return err;
794 }
795 EXPORT_SYMBOL_GPL(rpc_switch_client_transport);
796
797 static
798 int _rpc_clnt_xprt_iter_init(struct rpc_clnt *clnt, struct rpc_xprt_iter *xpi,
799 void func(struct rpc_xprt_iter *xpi, struct rpc_xprt_switch *xps))
800 {
801 struct rpc_xprt_switch *xps;
802
803 rcu_read_lock();
804 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
805 rcu_read_unlock();
806 if (xps == NULL)
807 return -EAGAIN;
808 func(xpi, xps);
809 xprt_switch_put(xps);
810 return 0;
811 }
812
813 static
814 int rpc_clnt_xprt_iter_init(struct rpc_clnt *clnt, struct rpc_xprt_iter *xpi)
815 {
816 return _rpc_clnt_xprt_iter_init(clnt, xpi, xprt_iter_init_listall);
817 }
818
819 static
820 int rpc_clnt_xprt_iter_offline_init(struct rpc_clnt *clnt,
821 struct rpc_xprt_iter *xpi)
822 {
823 return _rpc_clnt_xprt_iter_init(clnt, xpi, xprt_iter_init_listoffline);
824 }
825
826 /**
827 * rpc_clnt_iterate_for_each_xprt - Apply a function to all transports
828 * @clnt: pointer to client
829 * @fn: function to apply
830 * @data: void pointer to function data
831 *
832 * Iterates through the list of RPC transports currently attached to the
833 * client and applies the function fn(clnt, xprt, data).
834 *
835 * On error, the iteration stops, and the function returns the error value.
836 */
837 int rpc_clnt_iterate_for_each_xprt(struct rpc_clnt *clnt,
838 int (*fn)(struct rpc_clnt *, struct rpc_xprt *, void *),
839 void *data)
840 {
841 struct rpc_xprt_iter xpi;
842 int ret;
843
844 ret = rpc_clnt_xprt_iter_init(clnt, &xpi);
845 if (ret)
846 return ret;
847 for (;;) {
848 struct rpc_xprt *xprt = xprt_iter_get_next(&xpi);
849
850 if (!xprt)
851 break;
852 ret = fn(clnt, xprt, data);
853 xprt_put(xprt);
854 if (ret < 0)
855 break;
856 }
857 xprt_iter_destroy(&xpi);
858 return ret;
859 }
860 EXPORT_SYMBOL_GPL(rpc_clnt_iterate_for_each_xprt);
861
862 /*
863 * Kill all tasks for the given client.
864 * XXX: kill their descendants as well?
865 */
866 void rpc_killall_tasks(struct rpc_clnt *clnt)
867 {
868 struct rpc_task *rovr;
869
870
871 if (list_empty(&clnt->cl_tasks))
872 return;
873
874 /*
875 * Spin lock all_tasks to prevent changes...
876 */
877 trace_rpc_clnt_killall(clnt);
878 spin_lock(&clnt->cl_lock);
879 list_for_each_entry(rovr, &clnt->cl_tasks, tk_task)
880 rpc_signal_task(rovr);
881 spin_unlock(&clnt->cl_lock);
882 }
883 EXPORT_SYMBOL_GPL(rpc_killall_tasks);
884
885 /**
886 * rpc_cancel_tasks - try to cancel a set of RPC tasks
887 * @clnt: Pointer to RPC client
888 * @error: RPC task error value to set
889 * @fnmatch: Pointer to selector function
890 * @data: User data
891 *
892 * Uses @fnmatch to define a set of RPC tasks that are to be cancelled.
893 * The argument @error must be a negative error value.
894 */
895 unsigned long rpc_cancel_tasks(struct rpc_clnt *clnt, int error,
896 bool (*fnmatch)(const struct rpc_task *,
897 const void *),
898 const void *data)
899 {
900 struct rpc_task *task;
901 unsigned long count = 0;
902
903 if (list_empty(&clnt->cl_tasks))
904 return 0;
905 /*
906 * Spin lock all_tasks to prevent changes...
907 */
908 spin_lock(&clnt->cl_lock);
909 list_for_each_entry(task, &clnt->cl_tasks, tk_task) {
910 if (!RPC_IS_ACTIVATED(task))
911 continue;
912 if (!fnmatch(task, data))
913 continue;
914 rpc_task_try_cancel(task, error);
915 count++;
916 }
917 spin_unlock(&clnt->cl_lock);
918 return count;
919 }
920 EXPORT_SYMBOL_GPL(rpc_cancel_tasks);
921
922 static int rpc_clnt_disconnect_xprt(struct rpc_clnt *clnt,
923 struct rpc_xprt *xprt, void *dummy)
924 {
925 if (xprt_connected(xprt))
926 xprt_force_disconnect(xprt);
927 return 0;
928 }
929
930 void rpc_clnt_disconnect(struct rpc_clnt *clnt)
931 {
932 rpc_clnt_iterate_for_each_xprt(clnt, rpc_clnt_disconnect_xprt, NULL);
933 }
934 EXPORT_SYMBOL_GPL(rpc_clnt_disconnect);
935
936 /*
937 * Properly shut down an RPC client, terminating all outstanding
938 * requests.
939 */
940 void rpc_shutdown_client(struct rpc_clnt *clnt)
941 {
942 might_sleep();
943
944 trace_rpc_clnt_shutdown(clnt);
945
946 while (!list_empty(&clnt->cl_tasks)) {
947 rpc_killall_tasks(clnt);
948 wait_event_timeout(destroy_wait,
949 list_empty(&clnt->cl_tasks), 1*HZ);
950 }
951
952 rpc_release_client(clnt);
953 }
954 EXPORT_SYMBOL_GPL(rpc_shutdown_client);
955
956 /*
957 * Free an RPC client
958 */
959 static void rpc_free_client_work(struct work_struct *work)
960 {
961 struct rpc_clnt *clnt = container_of(work, struct rpc_clnt, cl_work);
962
963 trace_rpc_clnt_free(clnt);
964
965 /* These might block on processes that might allocate memory,
966 * so they cannot be called in rpciod, so they are handled separately
967 * here.
968 */
969 rpc_sysfs_client_destroy(clnt);
970 rpc_clnt_debugfs_unregister(clnt);
971 rpc_free_clid(clnt);
972 rpc_clnt_remove_pipedir(clnt);
973 xprt_put(rcu_dereference_raw(clnt->cl_xprt));
974
975 kfree(clnt);
976 rpciod_down();
977 }
978 static struct rpc_clnt *
979 rpc_free_client(struct rpc_clnt *clnt)
980 {
981 struct rpc_clnt *parent = NULL;
982
983 trace_rpc_clnt_release(clnt);
984 if (clnt->cl_parent != clnt)
985 parent = clnt->cl_parent;
986 rpc_unregister_client(clnt);
987 rpc_free_iostats(clnt->cl_metrics);
988 clnt->cl_metrics = NULL;
989 xprt_iter_destroy(&clnt->cl_xpi);
990 put_cred(clnt->cl_cred);
991
992 INIT_WORK(&clnt->cl_work, rpc_free_client_work);
993 schedule_work(&clnt->cl_work);
994 return parent;
995 }
996
997 /*
998 * Free an RPC client
999 */
1000 static struct rpc_clnt *
1001 rpc_free_auth(struct rpc_clnt *clnt)
1002 {
1003 /*
1004 * Note: RPCSEC_GSS may need to send NULL RPC calls in order to
1005 * release remaining GSS contexts. This mechanism ensures
1006 * that it can do so safely.
1007 */
1008 if (clnt->cl_auth != NULL) {
1009 rpcauth_release(clnt->cl_auth);
1010 clnt->cl_auth = NULL;
1011 }
1012 if (refcount_dec_and_test(&clnt->cl_count))
1013 return rpc_free_client(clnt);
1014 return NULL;
1015 }
1016
1017 /*
1018 * Release reference to the RPC client
1019 */
1020 void
1021 rpc_release_client(struct rpc_clnt *clnt)
1022 {
1023 do {
1024 if (list_empty(&clnt->cl_tasks))
1025 wake_up(&destroy_wait);
1026 if (refcount_dec_not_one(&clnt->cl_count))
1027 break;
1028 clnt = rpc_free_auth(clnt);
1029 } while (clnt != NULL);
1030 }
1031 EXPORT_SYMBOL_GPL(rpc_release_client);
1032
1033 /**
1034 * rpc_bind_new_program - bind a new RPC program to an existing client
1035 * @old: old rpc_client
1036 * @program: rpc program to set
1037 * @vers: rpc program version
1038 *
1039 * Clones the rpc client and sets up a new RPC program. This is mainly
1040 * of use for enabling different RPC programs to share the same transport.
1041 * The Sun NFSv2/v3 ACL protocol can do this.
1042 */
1043 struct rpc_clnt *rpc_bind_new_program(struct rpc_clnt *old,
1044 const struct rpc_program *program,
1045 u32 vers)
1046 {
1047 struct rpc_create_args args = {
1048 .program = program,
1049 .prognumber = program->number,
1050 .version = vers,
1051 .authflavor = old->cl_auth->au_flavor,
1052 .cred = old->cl_cred,
1053 };
1054 struct rpc_clnt *clnt;
1055 int err;
1056
1057 clnt = __rpc_clone_client(&args, old);
1058 if (IS_ERR(clnt))
1059 goto out;
1060 err = rpc_ping(clnt);
1061 if (err != 0) {
1062 rpc_shutdown_client(clnt);
1063 clnt = ERR_PTR(err);
1064 }
1065 out:
1066 return clnt;
1067 }
1068 EXPORT_SYMBOL_GPL(rpc_bind_new_program);
1069
1070 struct rpc_xprt *
1071 rpc_task_get_xprt(struct rpc_clnt *clnt, struct rpc_xprt *xprt)
1072 {
1073 struct rpc_xprt_switch *xps;
1074
1075 if (!xprt)
1076 return NULL;
1077 rcu_read_lock();
1078 xps = rcu_dereference(clnt->cl_xpi.xpi_xpswitch);
1079 atomic_long_inc(&xps->xps_queuelen);
1080 rcu_read_unlock();
1081 atomic_long_inc(&xprt->queuelen);
1082
1083 return xprt;
1084 }
1085
1086 static void
1087 rpc_task_release_xprt(struct rpc_clnt *clnt, struct rpc_xprt *xprt)
1088 {
1089 struct rpc_xprt_switch *xps;
1090
1091 atomic_long_dec(&xprt->queuelen);
1092 rcu_read_lock();
1093 xps = rcu_dereference(clnt->cl_xpi.xpi_xpswitch);
1094 atomic_long_dec(&xps->xps_queuelen);
1095 rcu_read_unlock();
1096
1097 xprt_put(xprt);
1098 }
1099
1100 void rpc_task_release_transport(struct rpc_task *task)
1101 {
1102 struct rpc_xprt *xprt = task->tk_xprt;
1103
1104 if (xprt) {
1105 task->tk_xprt = NULL;
1106 if (task->tk_client)
1107 rpc_task_release_xprt(task->tk_client, xprt);
1108 else
1109 xprt_put(xprt);
1110 }
1111 }
1112 EXPORT_SYMBOL_GPL(rpc_task_release_transport);
1113
1114 void rpc_task_release_client(struct rpc_task *task)
1115 {
1116 struct rpc_clnt *clnt = task->tk_client;
1117
1118 rpc_task_release_transport(task);
1119 if (clnt != NULL) {
1120 /* Remove from client task list */
1121 spin_lock(&clnt->cl_lock);
1122 list_del(&task->tk_task);
1123 spin_unlock(&clnt->cl_lock);
1124 task->tk_client = NULL;
1125
1126 rpc_release_client(clnt);
1127 }
1128 }
1129
1130 static struct rpc_xprt *
1131 rpc_task_get_first_xprt(struct rpc_clnt *clnt)
1132 {
1133 struct rpc_xprt *xprt;
1134
1135 rcu_read_lock();
1136 xprt = xprt_get(rcu_dereference(clnt->cl_xprt));
1137 rcu_read_unlock();
1138 return rpc_task_get_xprt(clnt, xprt);
1139 }
1140
1141 static struct rpc_xprt *
1142 rpc_task_get_next_xprt(struct rpc_clnt *clnt)
1143 {
1144 return rpc_task_get_xprt(clnt, xprt_iter_get_next(&clnt->cl_xpi));
1145 }
1146
1147 static
1148 void rpc_task_set_transport(struct rpc_task *task, struct rpc_clnt *clnt)
1149 {
1150 if (task->tk_xprt) {
1151 if (!(test_bit(XPRT_OFFLINE, &task->tk_xprt->state) &&
1152 (task->tk_flags & RPC_TASK_MOVEABLE)))
1153 return;
1154 xprt_release(task);
1155 xprt_put(task->tk_xprt);
1156 }
1157 if (task->tk_flags & RPC_TASK_NO_ROUND_ROBIN)
1158 task->tk_xprt = rpc_task_get_first_xprt(clnt);
1159 else
1160 task->tk_xprt = rpc_task_get_next_xprt(clnt);
1161 }
1162
1163 static
1164 void rpc_task_set_client(struct rpc_task *task, struct rpc_clnt *clnt)
1165 {
1166 rpc_task_set_transport(task, clnt);
1167 task->tk_client = clnt;
1168 refcount_inc(&clnt->cl_count);
1169 if (clnt->cl_softrtry)
1170 task->tk_flags |= RPC_TASK_SOFT;
1171 if (clnt->cl_softerr)
1172 task->tk_flags |= RPC_TASK_TIMEOUT;
1173 if (clnt->cl_noretranstimeo)
1174 task->tk_flags |= RPC_TASK_NO_RETRANS_TIMEOUT;
1175 /* Add to the client's list of all tasks */
1176 spin_lock(&clnt->cl_lock);
1177 list_add_tail(&task->tk_task, &clnt->cl_tasks);
1178 spin_unlock(&clnt->cl_lock);
1179 }
1180
1181 static void
1182 rpc_task_set_rpc_message(struct rpc_task *task, const struct rpc_message *msg)
1183 {
1184 if (msg != NULL) {
1185 task->tk_msg.rpc_proc = msg->rpc_proc;
1186 task->tk_msg.rpc_argp = msg->rpc_argp;
1187 task->tk_msg.rpc_resp = msg->rpc_resp;
1188 task->tk_msg.rpc_cred = msg->rpc_cred;
1189 if (!(task->tk_flags & RPC_TASK_CRED_NOREF))
1190 get_cred(task->tk_msg.rpc_cred);
1191 }
1192 }
1193
1194 /*
1195 * Default callback for async RPC calls
1196 */
1197 static void
1198 rpc_default_callback(struct rpc_task *task, void *data)
1199 {
1200 }
1201
1202 static const struct rpc_call_ops rpc_default_ops = {
1203 .rpc_call_done = rpc_default_callback,
1204 };
1205
1206 /**
1207 * rpc_run_task - Allocate a new RPC task, then run rpc_execute against it
1208 * @task_setup_data: pointer to task initialisation data
1209 */
1210 struct rpc_task *rpc_run_task(const struct rpc_task_setup *task_setup_data)
1211 {
1212 struct rpc_task *task;
1213
1214 task = rpc_new_task(task_setup_data);
1215 if (IS_ERR(task))
1216 return task;
1217
1218 if (!RPC_IS_ASYNC(task))
1219 task->tk_flags |= RPC_TASK_CRED_NOREF;
1220
1221 rpc_task_set_client(task, task_setup_data->rpc_client);
1222 rpc_task_set_rpc_message(task, task_setup_data->rpc_message);
1223
1224 if (task->tk_action == NULL)
1225 rpc_call_start(task);
1226
1227 atomic_inc(&task->tk_count);
1228 rpc_execute(task);
1229 return task;
1230 }
1231 EXPORT_SYMBOL_GPL(rpc_run_task);
1232
1233 /**
1234 * rpc_call_sync - Perform a synchronous RPC call
1235 * @clnt: pointer to RPC client
1236 * @msg: RPC call parameters
1237 * @flags: RPC call flags
1238 */
1239 int rpc_call_sync(struct rpc_clnt *clnt, const struct rpc_message *msg, int flags)
1240 {
1241 struct rpc_task *task;
1242 struct rpc_task_setup task_setup_data = {
1243 .rpc_client = clnt,
1244 .rpc_message = msg,
1245 .callback_ops = &rpc_default_ops,
1246 .flags = flags,
1247 };
1248 int status;
1249
1250 WARN_ON_ONCE(flags & RPC_TASK_ASYNC);
1251 if (flags & RPC_TASK_ASYNC) {
1252 rpc_release_calldata(task_setup_data.callback_ops,
1253 task_setup_data.callback_data);
1254 return -EINVAL;
1255 }
1256
1257 task = rpc_run_task(&task_setup_data);
1258 if (IS_ERR(task))
1259 return PTR_ERR(task);
1260 status = task->tk_status;
1261 rpc_put_task(task);
1262 return status;
1263 }
1264 EXPORT_SYMBOL_GPL(rpc_call_sync);
1265
1266 /**
1267 * rpc_call_async - Perform an asynchronous RPC call
1268 * @clnt: pointer to RPC client
1269 * @msg: RPC call parameters
1270 * @flags: RPC call flags
1271 * @tk_ops: RPC call ops
1272 * @data: user call data
1273 */
1274 int
1275 rpc_call_async(struct rpc_clnt *clnt, const struct rpc_message *msg, int flags,
1276 const struct rpc_call_ops *tk_ops, void *data)
1277 {
1278 struct rpc_task *task;
1279 struct rpc_task_setup task_setup_data = {
1280 .rpc_client = clnt,
1281 .rpc_message = msg,
1282 .callback_ops = tk_ops,
1283 .callback_data = data,
1284 .flags = flags|RPC_TASK_ASYNC,
1285 };
1286
1287 task = rpc_run_task(&task_setup_data);
1288 if (IS_ERR(task))
1289 return PTR_ERR(task);
1290 rpc_put_task(task);
1291 return 0;
1292 }
1293 EXPORT_SYMBOL_GPL(rpc_call_async);
1294
1295 #if defined(CONFIG_SUNRPC_BACKCHANNEL)
1296 static void call_bc_encode(struct rpc_task *task);
1297
1298 /**
1299 * rpc_run_bc_task - Allocate a new RPC task for backchannel use, then run
1300 * rpc_execute against it
1301 * @req: RPC request
1302 */
1303 struct rpc_task *rpc_run_bc_task(struct rpc_rqst *req)
1304 {
1305 struct rpc_task *task;
1306 struct rpc_task_setup task_setup_data = {
1307 .callback_ops = &rpc_default_ops,
1308 .flags = RPC_TASK_SOFTCONN |
1309 RPC_TASK_NO_RETRANS_TIMEOUT,
1310 };
1311
1312 dprintk("RPC: rpc_run_bc_task req= %p\n", req);
1313 /*
1314 * Create an rpc_task to send the data
1315 */
1316 task = rpc_new_task(&task_setup_data);
1317 if (IS_ERR(task)) {
1318 xprt_free_bc_request(req);
1319 return task;
1320 }
1321
1322 xprt_init_bc_request(req, task);
1323
1324 task->tk_action = call_bc_encode;
1325 atomic_inc(&task->tk_count);
1326 WARN_ON_ONCE(atomic_read(&task->tk_count) != 2);
1327 rpc_execute(task);
1328
1329 dprintk("RPC: rpc_run_bc_task: task= %p\n", task);
1330 return task;
1331 }
1332 #endif /* CONFIG_SUNRPC_BACKCHANNEL */
1333
1334 /**
1335 * rpc_prepare_reply_pages - Prepare to receive a reply data payload into pages
1336 * @req: RPC request to prepare
1337 * @pages: vector of struct page pointers
1338 * @base: offset in first page where receive should start, in bytes
1339 * @len: expected size of the upper layer data payload, in bytes
1340 * @hdrsize: expected size of upper layer reply header, in XDR words
1341 *
1342 */
1343 void rpc_prepare_reply_pages(struct rpc_rqst *req, struct page **pages,
1344 unsigned int base, unsigned int len,
1345 unsigned int hdrsize)
1346 {
1347 hdrsize += RPC_REPHDRSIZE + req->rq_cred->cr_auth->au_ralign;
1348
1349 xdr_inline_pages(&req->rq_rcv_buf, hdrsize << 2, pages, base, len);
1350 trace_rpc_xdr_reply_pages(req->rq_task, &req->rq_rcv_buf);
1351 }
1352 EXPORT_SYMBOL_GPL(rpc_prepare_reply_pages);
1353
1354 void
1355 rpc_call_start(struct rpc_task *task)
1356 {
1357 task->tk_action = call_start;
1358 }
1359 EXPORT_SYMBOL_GPL(rpc_call_start);
1360
1361 /**
1362 * rpc_peeraddr - extract remote peer address from clnt's xprt
1363 * @clnt: RPC client structure
1364 * @buf: target buffer
1365 * @bufsize: length of target buffer
1366 *
1367 * Returns the number of bytes that are actually in the stored address.
1368 */
1369 size_t rpc_peeraddr(struct rpc_clnt *clnt, struct sockaddr *buf, size_t bufsize)
1370 {
1371 size_t bytes;
1372 struct rpc_xprt *xprt;
1373
1374 rcu_read_lock();
1375 xprt = rcu_dereference(clnt->cl_xprt);
1376
1377 bytes = xprt->addrlen;
1378 if (bytes > bufsize)
1379 bytes = bufsize;
1380 memcpy(buf, &xprt->addr, bytes);
1381 rcu_read_unlock();
1382
1383 return bytes;
1384 }
1385 EXPORT_SYMBOL_GPL(rpc_peeraddr);
1386
1387 /**
1388 * rpc_peeraddr2str - return remote peer address in printable format
1389 * @clnt: RPC client structure
1390 * @format: address format
1391 *
1392 * NB: the lifetime of the memory referenced by the returned pointer is
1393 * the same as the rpc_xprt itself. As long as the caller uses this
1394 * pointer, it must hold the RCU read lock.
1395 */
1396 const char *rpc_peeraddr2str(struct rpc_clnt *clnt,
1397 enum rpc_display_format_t format)
1398 {
1399 struct rpc_xprt *xprt;
1400
1401 xprt = rcu_dereference(clnt->cl_xprt);
1402
1403 if (xprt->address_strings[format] != NULL)
1404 return xprt->address_strings[format];
1405 else
1406 return "unprintable";
1407 }
1408 EXPORT_SYMBOL_GPL(rpc_peeraddr2str);
1409
1410 static const struct sockaddr_in rpc_inaddr_loopback = {
1411 .sin_family = AF_INET,
1412 .sin_addr.s_addr = htonl(INADDR_ANY),
1413 };
1414
1415 static const struct sockaddr_in6 rpc_in6addr_loopback = {
1416 .sin6_family = AF_INET6,
1417 .sin6_addr = IN6ADDR_ANY_INIT,
1418 };
1419
1420 /*
1421 * Try a getsockname() on a connected datagram socket. Using a
1422 * connected datagram socket prevents leaving a socket in TIME_WAIT.
1423 * This conserves the ephemeral port number space.
1424 *
1425 * Returns zero and fills in "buf" if successful; otherwise, a
1426 * negative errno is returned.
1427 */
1428 static int rpc_sockname(struct net *net, struct sockaddr *sap, size_t salen,
1429 struct sockaddr *buf)
1430 {
1431 struct socket *sock;
1432 int err;
1433
1434 err = __sock_create(net, sap->sa_family,
1435 SOCK_DGRAM, IPPROTO_UDP, &sock, 1);
1436 if (err < 0) {
1437 dprintk("RPC: can't create UDP socket (%d)\n", err);
1438 goto out;
1439 }
1440
1441 switch (sap->sa_family) {
1442 case AF_INET:
1443 err = kernel_bind(sock,
1444 (struct sockaddr *)&rpc_inaddr_loopback,
1445 sizeof(rpc_inaddr_loopback));
1446 break;
1447 case AF_INET6:
1448 err = kernel_bind(sock,
1449 (struct sockaddr *)&rpc_in6addr_loopback,
1450 sizeof(rpc_in6addr_loopback));
1451 break;
1452 default:
1453 err = -EAFNOSUPPORT;
1454 goto out_release;
1455 }
1456 if (err < 0) {
1457 dprintk("RPC: can't bind UDP socket (%d)\n", err);
1458 goto out_release;
1459 }
1460
1461 err = kernel_connect(sock, sap, salen, 0);
1462 if (err < 0) {
1463 dprintk("RPC: can't connect UDP socket (%d)\n", err);
1464 goto out_release;
1465 }
1466
1467 err = kernel_getsockname(sock, buf);
1468 if (err < 0) {
1469 dprintk("RPC: getsockname failed (%d)\n", err);
1470 goto out_release;
1471 }
1472
1473 err = 0;
1474 if (buf->sa_family == AF_INET6) {
1475 struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)buf;
1476 sin6->sin6_scope_id = 0;
1477 }
1478 dprintk("RPC: %s succeeded\n", __func__);
1479
1480 out_release:
1481 sock_release(sock);
1482 out:
1483 return err;
1484 }
1485
1486 /*
1487 * Scraping a connected socket failed, so we don't have a useable
1488 * local address. Fallback: generate an address that will prevent
1489 * the server from calling us back.
1490 *
1491 * Returns zero and fills in "buf" if successful; otherwise, a
1492 * negative errno is returned.
1493 */
1494 static int rpc_anyaddr(int family, struct sockaddr *buf, size_t buflen)
1495 {
1496 switch (family) {
1497 case AF_INET:
1498 if (buflen < sizeof(rpc_inaddr_loopback))
1499 return -EINVAL;
1500 memcpy(buf, &rpc_inaddr_loopback,
1501 sizeof(rpc_inaddr_loopback));
1502 break;
1503 case AF_INET6:
1504 if (buflen < sizeof(rpc_in6addr_loopback))
1505 return -EINVAL;
1506 memcpy(buf, &rpc_in6addr_loopback,
1507 sizeof(rpc_in6addr_loopback));
1508 break;
1509 default:
1510 dprintk("RPC: %s: address family not supported\n",
1511 __func__);
1512 return -EAFNOSUPPORT;
1513 }
1514 dprintk("RPC: %s: succeeded\n", __func__);
1515 return 0;
1516 }
1517
1518 /**
1519 * rpc_localaddr - discover local endpoint address for an RPC client
1520 * @clnt: RPC client structure
1521 * @buf: target buffer
1522 * @buflen: size of target buffer, in bytes
1523 *
1524 * Returns zero and fills in "buf" and "buflen" if successful;
1525 * otherwise, a negative errno is returned.
1526 *
1527 * This works even if the underlying transport is not currently connected,
1528 * or if the upper layer never previously provided a source address.
1529 *
1530 * The result of this function call is transient: multiple calls in
1531 * succession may give different results, depending on how local
1532 * networking configuration changes over time.
1533 */
1534 int rpc_localaddr(struct rpc_clnt *clnt, struct sockaddr *buf, size_t buflen)
1535 {
1536 struct sockaddr_storage address;
1537 struct sockaddr *sap = (struct sockaddr *)&address;
1538 struct rpc_xprt *xprt;
1539 struct net *net;
1540 size_t salen;
1541 int err;
1542
1543 rcu_read_lock();
1544 xprt = rcu_dereference(clnt->cl_xprt);
1545 salen = xprt->addrlen;
1546 memcpy(sap, &xprt->addr, salen);
1547 net = get_net(xprt->xprt_net);
1548 rcu_read_unlock();
1549
1550 rpc_set_port(sap, 0);
1551 err = rpc_sockname(net, sap, salen, buf);
1552 put_net(net);
1553 if (err != 0)
1554 /* Couldn't discover local address, return ANYADDR */
1555 return rpc_anyaddr(sap->sa_family, buf, buflen);
1556 return 0;
1557 }
1558 EXPORT_SYMBOL_GPL(rpc_localaddr);
1559
1560 void
1561 rpc_setbufsize(struct rpc_clnt *clnt, unsigned int sndsize, unsigned int rcvsize)
1562 {
1563 struct rpc_xprt *xprt;
1564
1565 rcu_read_lock();
1566 xprt = rcu_dereference(clnt->cl_xprt);
1567 if (xprt->ops->set_buffer_size)
1568 xprt->ops->set_buffer_size(xprt, sndsize, rcvsize);
1569 rcu_read_unlock();
1570 }
1571 EXPORT_SYMBOL_GPL(rpc_setbufsize);
1572
1573 /**
1574 * rpc_net_ns - Get the network namespace for this RPC client
1575 * @clnt: RPC client to query
1576 *
1577 */
1578 struct net *rpc_net_ns(struct rpc_clnt *clnt)
1579 {
1580 struct net *ret;
1581
1582 rcu_read_lock();
1583 ret = rcu_dereference(clnt->cl_xprt)->xprt_net;
1584 rcu_read_unlock();
1585 return ret;
1586 }
1587 EXPORT_SYMBOL_GPL(rpc_net_ns);
1588
1589 /**
1590 * rpc_max_payload - Get maximum payload size for a transport, in bytes
1591 * @clnt: RPC client to query
1592 *
1593 * For stream transports, this is one RPC record fragment (see RFC
1594 * 1831), as we don't support multi-record requests yet. For datagram
1595 * transports, this is the size of an IP packet minus the IP, UDP, and
1596 * RPC header sizes.
1597 */
1598 size_t rpc_max_payload(struct rpc_clnt *clnt)
1599 {
1600 size_t ret;
1601
1602 rcu_read_lock();
1603 ret = rcu_dereference(clnt->cl_xprt)->max_payload;
1604 rcu_read_unlock();
1605 return ret;
1606 }
1607 EXPORT_SYMBOL_GPL(rpc_max_payload);
1608
1609 /**
1610 * rpc_max_bc_payload - Get maximum backchannel payload size, in bytes
1611 * @clnt: RPC client to query
1612 */
1613 size_t rpc_max_bc_payload(struct rpc_clnt *clnt)
1614 {
1615 struct rpc_xprt *xprt;
1616 size_t ret;
1617
1618 rcu_read_lock();
1619 xprt = rcu_dereference(clnt->cl_xprt);
1620 ret = xprt->ops->bc_maxpayload(xprt);
1621 rcu_read_unlock();
1622 return ret;
1623 }
1624 EXPORT_SYMBOL_GPL(rpc_max_bc_payload);
1625
1626 unsigned int rpc_num_bc_slots(struct rpc_clnt *clnt)
1627 {
1628 struct rpc_xprt *xprt;
1629 unsigned int ret;
1630
1631 rcu_read_lock();
1632 xprt = rcu_dereference(clnt->cl_xprt);
1633 ret = xprt->ops->bc_num_slots(xprt);
1634 rcu_read_unlock();
1635 return ret;
1636 }
1637 EXPORT_SYMBOL_GPL(rpc_num_bc_slots);
1638
1639 /**
1640 * rpc_force_rebind - force transport to check that remote port is unchanged
1641 * @clnt: client to rebind
1642 *
1643 */
1644 void rpc_force_rebind(struct rpc_clnt *clnt)
1645 {
1646 if (clnt->cl_autobind) {
1647 rcu_read_lock();
1648 xprt_clear_bound(rcu_dereference(clnt->cl_xprt));
1649 rcu_read_unlock();
1650 }
1651 }
1652 EXPORT_SYMBOL_GPL(rpc_force_rebind);
1653
1654 static int
1655 __rpc_restart_call(struct rpc_task *task, void (*action)(struct rpc_task *))
1656 {
1657 task->tk_status = 0;
1658 task->tk_rpc_status = 0;
1659 task->tk_action = action;
1660 return 1;
1661 }
1662
1663 /*
1664 * Restart an (async) RPC call. Usually called from within the
1665 * exit handler.
1666 */
1667 int
1668 rpc_restart_call(struct rpc_task *task)
1669 {
1670 return __rpc_restart_call(task, call_start);
1671 }
1672 EXPORT_SYMBOL_GPL(rpc_restart_call);
1673
1674 /*
1675 * Restart an (async) RPC call from the call_prepare state.
1676 * Usually called from within the exit handler.
1677 */
1678 int
1679 rpc_restart_call_prepare(struct rpc_task *task)
1680 {
1681 if (task->tk_ops->rpc_call_prepare != NULL)
1682 return __rpc_restart_call(task, rpc_prepare_task);
1683 return rpc_restart_call(task);
1684 }
1685 EXPORT_SYMBOL_GPL(rpc_restart_call_prepare);
1686
1687 const char
1688 *rpc_proc_name(const struct rpc_task *task)
1689 {
1690 const struct rpc_procinfo *proc = task->tk_msg.rpc_proc;
1691
1692 if (proc) {
1693 if (proc->p_name)
1694 return proc->p_name;
1695 else
1696 return "NULL";
1697 } else
1698 return "no proc";
1699 }
1700
1701 static void
1702 __rpc_call_rpcerror(struct rpc_task *task, int tk_status, int rpc_status)
1703 {
1704 trace_rpc_call_rpcerror(task, tk_status, rpc_status);
1705 rpc_task_set_rpc_status(task, rpc_status);
1706 rpc_exit(task, tk_status);
1707 }
1708
1709 static void
1710 rpc_call_rpcerror(struct rpc_task *task, int status)
1711 {
1712 __rpc_call_rpcerror(task, status, status);
1713 }
1714
1715 /*
1716 * 0. Initial state
1717 *
1718 * Other FSM states can be visited zero or more times, but
1719 * this state is visited exactly once for each RPC.
1720 */
1721 static void
1722 call_start(struct rpc_task *task)
1723 {
1724 struct rpc_clnt *clnt = task->tk_client;
1725 int idx = task->tk_msg.rpc_proc->p_statidx;
1726
1727 trace_rpc_request(task);
1728
1729 if (task->tk_client->cl_shutdown) {
1730 rpc_call_rpcerror(task, -EIO);
1731 return;
1732 }
1733
1734 /* Increment call count (version might not be valid for ping) */
1735 if (clnt->cl_program->version[clnt->cl_vers])
1736 clnt->cl_program->version[clnt->cl_vers]->counts[idx]++;
1737 clnt->cl_stats->rpccnt++;
1738 task->tk_action = call_reserve;
1739 rpc_task_set_transport(task, clnt);
1740 }
1741
1742 /*
1743 * 1. Reserve an RPC call slot
1744 */
1745 static void
1746 call_reserve(struct rpc_task *task)
1747 {
1748 task->tk_status = 0;
1749 task->tk_action = call_reserveresult;
1750 xprt_reserve(task);
1751 }
1752
1753 static void call_retry_reserve(struct rpc_task *task);
1754
1755 /*
1756 * 1b. Grok the result of xprt_reserve()
1757 */
1758 static void
1759 call_reserveresult(struct rpc_task *task)
1760 {
1761 int status = task->tk_status;
1762
1763 /*
1764 * After a call to xprt_reserve(), we must have either
1765 * a request slot or else an error status.
1766 */
1767 task->tk_status = 0;
1768 if (status >= 0) {
1769 if (task->tk_rqstp) {
1770 task->tk_action = call_refresh;
1771 return;
1772 }
1773
1774 rpc_call_rpcerror(task, -EIO);
1775 return;
1776 }
1777
1778 switch (status) {
1779 case -ENOMEM:
1780 rpc_delay(task, HZ >> 2);
1781 fallthrough;
1782 case -EAGAIN: /* woken up; retry */
1783 task->tk_action = call_retry_reserve;
1784 return;
1785 default:
1786 rpc_call_rpcerror(task, status);
1787 }
1788 }
1789
1790 /*
1791 * 1c. Retry reserving an RPC call slot
1792 */
1793 static void
1794 call_retry_reserve(struct rpc_task *task)
1795 {
1796 task->tk_status = 0;
1797 task->tk_action = call_reserveresult;
1798 xprt_retry_reserve(task);
1799 }
1800
1801 /*
1802 * 2. Bind and/or refresh the credentials
1803 */
1804 static void
1805 call_refresh(struct rpc_task *task)
1806 {
1807 task->tk_action = call_refreshresult;
1808 task->tk_status = 0;
1809 task->tk_client->cl_stats->rpcauthrefresh++;
1810 rpcauth_refreshcred(task);
1811 }
1812
1813 /*
1814 * 2a. Process the results of a credential refresh
1815 */
1816 static void
1817 call_refreshresult(struct rpc_task *task)
1818 {
1819 int status = task->tk_status;
1820
1821 task->tk_status = 0;
1822 task->tk_action = call_refresh;
1823 switch (status) {
1824 case 0:
1825 if (rpcauth_uptodatecred(task)) {
1826 task->tk_action = call_allocate;
1827 return;
1828 }
1829 /* Use rate-limiting and a max number of retries if refresh
1830 * had status 0 but failed to update the cred.
1831 */
1832 fallthrough;
1833 case -ETIMEDOUT:
1834 rpc_delay(task, 3*HZ);
1835 fallthrough;
1836 case -EAGAIN:
1837 status = -EACCES;
1838 fallthrough;
1839 case -EKEYEXPIRED:
1840 if (!task->tk_cred_retry)
1841 break;
1842 task->tk_cred_retry--;
1843 trace_rpc_retry_refresh_status(task);
1844 return;
1845 case -ENOMEM:
1846 rpc_delay(task, HZ >> 4);
1847 return;
1848 }
1849 trace_rpc_refresh_status(task);
1850 rpc_call_rpcerror(task, status);
1851 }
1852
1853 /*
1854 * 2b. Allocate the buffer. For details, see sched.c:rpc_malloc.
1855 * (Note: buffer memory is freed in xprt_release).
1856 */
1857 static void
1858 call_allocate(struct rpc_task *task)
1859 {
1860 const struct rpc_auth *auth = task->tk_rqstp->rq_cred->cr_auth;
1861 struct rpc_rqst *req = task->tk_rqstp;
1862 struct rpc_xprt *xprt = req->rq_xprt;
1863 const struct rpc_procinfo *proc = task->tk_msg.rpc_proc;
1864 int status;
1865
1866 task->tk_status = 0;
1867 task->tk_action = call_encode;
1868
1869 if (req->rq_buffer)
1870 return;
1871
1872 if (proc->p_proc != 0) {
1873 BUG_ON(proc->p_arglen == 0);
1874 if (proc->p_decode != NULL)
1875 BUG_ON(proc->p_replen == 0);
1876 }
1877
1878 /*
1879 * Calculate the size (in quads) of the RPC call
1880 * and reply headers, and convert both values
1881 * to byte sizes.
1882 */
1883 req->rq_callsize = RPC_CALLHDRSIZE + (auth->au_cslack << 1) +
1884 proc->p_arglen;
1885 req->rq_callsize <<= 2;
1886 /*
1887 * Note: the reply buffer must at minimum allocate enough space
1888 * for the 'struct accepted_reply' from RFC5531.
1889 */
1890 req->rq_rcvsize = RPC_REPHDRSIZE + auth->au_rslack + \
1891 max_t(size_t, proc->p_replen, 2);
1892 req->rq_rcvsize <<= 2;
1893
1894 status = xprt->ops->buf_alloc(task);
1895 trace_rpc_buf_alloc(task, status);
1896 if (status == 0)
1897 return;
1898 if (status != -ENOMEM) {
1899 rpc_call_rpcerror(task, status);
1900 return;
1901 }
1902
1903 if (RPC_IS_ASYNC(task) || !fatal_signal_pending(current)) {
1904 task->tk_action = call_allocate;
1905 rpc_delay(task, HZ>>4);
1906 return;
1907 }
1908
1909 rpc_call_rpcerror(task, -ERESTARTSYS);
1910 }
1911
1912 static int
1913 rpc_task_need_encode(struct rpc_task *task)
1914 {
1915 return test_bit(RPC_TASK_NEED_XMIT, &task->tk_runstate) == 0 &&
1916 (!(task->tk_flags & RPC_TASK_SENT) ||
1917 !(task->tk_flags & RPC_TASK_NO_RETRANS_TIMEOUT) ||
1918 xprt_request_need_retransmit(task));
1919 }
1920
1921 static void
1922 rpc_xdr_encode(struct rpc_task *task)
1923 {
1924 struct rpc_rqst *req = task->tk_rqstp;
1925 struct xdr_stream xdr;
1926
1927 xdr_buf_init(&req->rq_snd_buf,
1928 req->rq_buffer,
1929 req->rq_callsize);
1930 xdr_buf_init(&req->rq_rcv_buf,
1931 req->rq_rbuffer,
1932 req->rq_rcvsize);
1933
1934 req->rq_reply_bytes_recvd = 0;
1935 req->rq_snd_buf.head[0].iov_len = 0;
1936 xdr_init_encode(&xdr, &req->rq_snd_buf,
1937 req->rq_snd_buf.head[0].iov_base, req);
1938 if (rpc_encode_header(task, &xdr))
1939 return;
1940
1941 task->tk_status = rpcauth_wrap_req(task, &xdr);
1942 }
1943
1944 /*
1945 * 3. Encode arguments of an RPC call
1946 */
1947 static void
1948 call_encode(struct rpc_task *task)
1949 {
1950 if (!rpc_task_need_encode(task))
1951 goto out;
1952
1953 /* Dequeue task from the receive queue while we're encoding */
1954 xprt_request_dequeue_xprt(task);
1955 /* Encode here so that rpcsec_gss can use correct sequence number. */
1956 rpc_xdr_encode(task);
1957 /* Add task to reply queue before transmission to avoid races */
1958 if (task->tk_status == 0 && rpc_reply_expected(task))
1959 task->tk_status = xprt_request_enqueue_receive(task);
1960 /* Did the encode result in an error condition? */
1961 if (task->tk_status != 0) {
1962 /* Was the error nonfatal? */
1963 switch (task->tk_status) {
1964 case -EAGAIN:
1965 case -ENOMEM:
1966 rpc_delay(task, HZ >> 4);
1967 break;
1968 case -EKEYEXPIRED:
1969 if (!task->tk_cred_retry) {
1970 rpc_call_rpcerror(task, task->tk_status);
1971 } else {
1972 task->tk_action = call_refresh;
1973 task->tk_cred_retry--;
1974 trace_rpc_retry_refresh_status(task);
1975 }
1976 break;
1977 default:
1978 rpc_call_rpcerror(task, task->tk_status);
1979 }
1980 return;
1981 }
1982
1983 xprt_request_enqueue_transmit(task);
1984 out:
1985 task->tk_action = call_transmit;
1986 /* Check that the connection is OK */
1987 if (!xprt_bound(task->tk_xprt))
1988 task->tk_action = call_bind;
1989 else if (!xprt_connected(task->tk_xprt))
1990 task->tk_action = call_connect;
1991 }
1992
1993 /*
1994 * Helpers to check if the task was already transmitted, and
1995 * to take action when that is the case.
1996 */
1997 static bool
1998 rpc_task_transmitted(struct rpc_task *task)
1999 {
2000 return !test_bit(RPC_TASK_NEED_XMIT, &task->tk_runstate);
2001 }
2002
2003 static void
2004 rpc_task_handle_transmitted(struct rpc_task *task)
2005 {
2006 xprt_end_transmit(task);
2007 task->tk_action = call_transmit_status;
2008 }
2009
2010 /*
2011 * 4. Get the server port number if not yet set
2012 */
2013 static void
2014 call_bind(struct rpc_task *task)
2015 {
2016 struct rpc_xprt *xprt = task->tk_rqstp->rq_xprt;
2017
2018 if (rpc_task_transmitted(task)) {
2019 rpc_task_handle_transmitted(task);
2020 return;
2021 }
2022
2023 if (xprt_bound(xprt)) {
2024 task->tk_action = call_connect;
2025 return;
2026 }
2027
2028 task->tk_action = call_bind_status;
2029 if (!xprt_prepare_transmit(task))
2030 return;
2031
2032 xprt->ops->rpcbind(task);
2033 }
2034
2035 /*
2036 * 4a. Sort out bind result
2037 */
2038 static void
2039 call_bind_status(struct rpc_task *task)
2040 {
2041 struct rpc_xprt *xprt = task->tk_rqstp->rq_xprt;
2042 int status = -EIO;
2043
2044 if (rpc_task_transmitted(task)) {
2045 rpc_task_handle_transmitted(task);
2046 return;
2047 }
2048
2049 if (task->tk_status >= 0)
2050 goto out_next;
2051 if (xprt_bound(xprt)) {
2052 task->tk_status = 0;
2053 goto out_next;
2054 }
2055
2056 switch (task->tk_status) {
2057 case -ENOMEM:
2058 rpc_delay(task, HZ >> 2);
2059 goto retry_timeout;
2060 case -EACCES:
2061 trace_rpcb_prog_unavail_err(task);
2062 /* fail immediately if this is an RPC ping */
2063 if (task->tk_msg.rpc_proc->p_proc == 0) {
2064 status = -EOPNOTSUPP;
2065 break;
2066 }
2067 rpc_delay(task, 3*HZ);
2068 goto retry_timeout;
2069 case -ENOBUFS:
2070 rpc_delay(task, HZ >> 2);
2071 goto retry_timeout;
2072 case -EAGAIN:
2073 goto retry_timeout;
2074 case -ETIMEDOUT:
2075 trace_rpcb_timeout_err(task);
2076 goto retry_timeout;
2077 case -EPFNOSUPPORT:
2078 /* server doesn't support any rpcbind version we know of */
2079 trace_rpcb_bind_version_err(task);
2080 break;
2081 case -EPROTONOSUPPORT:
2082 trace_rpcb_bind_version_err(task);
2083 goto retry_timeout;
2084 case -ECONNREFUSED: /* connection problems */
2085 case -ECONNRESET:
2086 case -ECONNABORTED:
2087 case -ENOTCONN:
2088 case -EHOSTDOWN:
2089 case -ENETDOWN:
2090 case -EHOSTUNREACH:
2091 case -ENETUNREACH:
2092 case -EPIPE:
2093 trace_rpcb_unreachable_err(task);
2094 if (!RPC_IS_SOFTCONN(task)) {
2095 rpc_delay(task, 5*HZ);
2096 goto retry_timeout;
2097 }
2098 status = task->tk_status;
2099 break;
2100 default:
2101 trace_rpcb_unrecognized_err(task);
2102 }
2103
2104 rpc_call_rpcerror(task, status);
2105 return;
2106 out_next:
2107 task->tk_action = call_connect;
2108 return;
2109 retry_timeout:
2110 task->tk_status = 0;
2111 task->tk_action = call_bind;
2112 rpc_check_timeout(task);
2113 }
2114
2115 /*
2116 * 4b. Connect to the RPC server
2117 */
2118 static void
2119 call_connect(struct rpc_task *task)
2120 {
2121 struct rpc_xprt *xprt = task->tk_rqstp->rq_xprt;
2122
2123 if (rpc_task_transmitted(task)) {
2124 rpc_task_handle_transmitted(task);
2125 return;
2126 }
2127
2128 if (xprt_connected(xprt)) {
2129 task->tk_action = call_transmit;
2130 return;
2131 }
2132
2133 task->tk_action = call_connect_status;
2134 if (task->tk_status < 0)
2135 return;
2136 if (task->tk_flags & RPC_TASK_NOCONNECT) {
2137 rpc_call_rpcerror(task, -ENOTCONN);
2138 return;
2139 }
2140 if (!xprt_prepare_transmit(task))
2141 return;
2142 xprt_connect(task);
2143 }
2144
2145 /*
2146 * 4c. Sort out connect result
2147 */
2148 static void
2149 call_connect_status(struct rpc_task *task)
2150 {
2151 struct rpc_xprt *xprt = task->tk_rqstp->rq_xprt;
2152 struct rpc_clnt *clnt = task->tk_client;
2153 int status = task->tk_status;
2154
2155 if (rpc_task_transmitted(task)) {
2156 rpc_task_handle_transmitted(task);
2157 return;
2158 }
2159
2160 trace_rpc_connect_status(task);
2161
2162 if (task->tk_status == 0) {
2163 clnt->cl_stats->netreconn++;
2164 goto out_next;
2165 }
2166 if (xprt_connected(xprt)) {
2167 task->tk_status = 0;
2168 goto out_next;
2169 }
2170
2171 task->tk_status = 0;
2172 switch (status) {
2173 case -ECONNREFUSED:
2174 /* A positive refusal suggests a rebind is needed. */
2175 if (RPC_IS_SOFTCONN(task))
2176 break;
2177 if (clnt->cl_autobind) {
2178 rpc_force_rebind(clnt);
2179 goto out_retry;
2180 }
2181 fallthrough;
2182 case -ECONNRESET:
2183 case -ECONNABORTED:
2184 case -ENETDOWN:
2185 case -ENETUNREACH:
2186 case -EHOSTUNREACH:
2187 case -EPIPE:
2188 case -EPROTO:
2189 xprt_conditional_disconnect(task->tk_rqstp->rq_xprt,
2190 task->tk_rqstp->rq_connect_cookie);
2191 if (RPC_IS_SOFTCONN(task))
2192 break;
2193 /* retry with existing socket, after a delay */
2194 rpc_delay(task, 3*HZ);
2195 fallthrough;
2196 case -EADDRINUSE:
2197 case -ENOTCONN:
2198 case -EAGAIN:
2199 case -ETIMEDOUT:
2200 if (!(task->tk_flags & RPC_TASK_NO_ROUND_ROBIN) &&
2201 (task->tk_flags & RPC_TASK_MOVEABLE) &&
2202 test_bit(XPRT_REMOVE, &xprt->state)) {
2203 struct rpc_xprt *saved = task->tk_xprt;
2204 struct rpc_xprt_switch *xps;
2205
2206 rcu_read_lock();
2207 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
2208 rcu_read_unlock();
2209 if (xps->xps_nxprts > 1) {
2210 long value;
2211
2212 xprt_release(task);
2213 value = atomic_long_dec_return(&xprt->queuelen);
2214 if (value == 0)
2215 rpc_xprt_switch_remove_xprt(xps, saved,
2216 true);
2217 xprt_put(saved);
2218 task->tk_xprt = NULL;
2219 task->tk_action = call_start;
2220 }
2221 xprt_switch_put(xps);
2222 if (!task->tk_xprt)
2223 return;
2224 }
2225 goto out_retry;
2226 case -ENOBUFS:
2227 rpc_delay(task, HZ >> 2);
2228 goto out_retry;
2229 }
2230 rpc_call_rpcerror(task, status);
2231 return;
2232 out_next:
2233 task->tk_action = call_transmit;
2234 return;
2235 out_retry:
2236 /* Check for timeouts before looping back to call_bind */
2237 task->tk_action = call_bind;
2238 rpc_check_timeout(task);
2239 }
2240
2241 /*
2242 * 5. Transmit the RPC request, and wait for reply
2243 */
2244 static void
2245 call_transmit(struct rpc_task *task)
2246 {
2247 if (rpc_task_transmitted(task)) {
2248 rpc_task_handle_transmitted(task);
2249 return;
2250 }
2251
2252 task->tk_action = call_transmit_status;
2253 if (!xprt_prepare_transmit(task))
2254 return;
2255 task->tk_status = 0;
2256 if (test_bit(RPC_TASK_NEED_XMIT, &task->tk_runstate)) {
2257 if (!xprt_connected(task->tk_xprt)) {
2258 task->tk_status = -ENOTCONN;
2259 return;
2260 }
2261 xprt_transmit(task);
2262 }
2263 xprt_end_transmit(task);
2264 }
2265
2266 /*
2267 * 5a. Handle cleanup after a transmission
2268 */
2269 static void
2270 call_transmit_status(struct rpc_task *task)
2271 {
2272 task->tk_action = call_status;
2273
2274 /*
2275 * Common case: success. Force the compiler to put this
2276 * test first.
2277 */
2278 if (rpc_task_transmitted(task)) {
2279 task->tk_status = 0;
2280 xprt_request_wait_receive(task);
2281 return;
2282 }
2283
2284 switch (task->tk_status) {
2285 default:
2286 break;
2287 case -EBADMSG:
2288 task->tk_status = 0;
2289 task->tk_action = call_encode;
2290 break;
2291 /*
2292 * Special cases: if we've been waiting on the
2293 * socket's write_space() callback, or if the
2294 * socket just returned a connection error,
2295 * then hold onto the transport lock.
2296 */
2297 case -ENOMEM:
2298 case -ENOBUFS:
2299 rpc_delay(task, HZ>>2);
2300 fallthrough;
2301 case -EBADSLT:
2302 case -EAGAIN:
2303 task->tk_action = call_transmit;
2304 task->tk_status = 0;
2305 break;
2306 case -ECONNREFUSED:
2307 case -EHOSTDOWN:
2308 case -ENETDOWN:
2309 case -EHOSTUNREACH:
2310 case -ENETUNREACH:
2311 case -EPERM:
2312 if (RPC_IS_SOFTCONN(task)) {
2313 if (!task->tk_msg.rpc_proc->p_proc)
2314 trace_xprt_ping(task->tk_xprt,
2315 task->tk_status);
2316 rpc_call_rpcerror(task, task->tk_status);
2317 return;
2318 }
2319 fallthrough;
2320 case -ECONNRESET:
2321 case -ECONNABORTED:
2322 case -EADDRINUSE:
2323 case -ENOTCONN:
2324 case -EPIPE:
2325 task->tk_action = call_bind;
2326 task->tk_status = 0;
2327 break;
2328 }
2329 rpc_check_timeout(task);
2330 }
2331
2332 #if defined(CONFIG_SUNRPC_BACKCHANNEL)
2333 static void call_bc_transmit(struct rpc_task *task);
2334 static void call_bc_transmit_status(struct rpc_task *task);
2335
2336 static void
2337 call_bc_encode(struct rpc_task *task)
2338 {
2339 xprt_request_enqueue_transmit(task);
2340 task->tk_action = call_bc_transmit;
2341 }
2342
2343 /*
2344 * 5b. Send the backchannel RPC reply. On error, drop the reply. In
2345 * addition, disconnect on connectivity errors.
2346 */
2347 static void
2348 call_bc_transmit(struct rpc_task *task)
2349 {
2350 task->tk_action = call_bc_transmit_status;
2351 if (test_bit(RPC_TASK_NEED_XMIT, &task->tk_runstate)) {
2352 if (!xprt_prepare_transmit(task))
2353 return;
2354 task->tk_status = 0;
2355 xprt_transmit(task);
2356 }
2357 xprt_end_transmit(task);
2358 }
2359
2360 static void
2361 call_bc_transmit_status(struct rpc_task *task)
2362 {
2363 struct rpc_rqst *req = task->tk_rqstp;
2364
2365 if (rpc_task_transmitted(task))
2366 task->tk_status = 0;
2367
2368 switch (task->tk_status) {
2369 case 0:
2370 /* Success */
2371 case -ENETDOWN:
2372 case -EHOSTDOWN:
2373 case -EHOSTUNREACH:
2374 case -ENETUNREACH:
2375 case -ECONNRESET:
2376 case -ECONNREFUSED:
2377 case -EADDRINUSE:
2378 case -ENOTCONN:
2379 case -EPIPE:
2380 break;
2381 case -ENOMEM:
2382 case -ENOBUFS:
2383 rpc_delay(task, HZ>>2);
2384 fallthrough;
2385 case -EBADSLT:
2386 case -EAGAIN:
2387 task->tk_status = 0;
2388 task->tk_action = call_bc_transmit;
2389 return;
2390 case -ETIMEDOUT:
2391 /*
2392 * Problem reaching the server. Disconnect and let the
2393 * forechannel reestablish the connection. The server will
2394 * have to retransmit the backchannel request and we'll
2395 * reprocess it. Since these ops are idempotent, there's no
2396 * need to cache our reply at this time.
2397 */
2398 printk(KERN_NOTICE "RPC: Could not send backchannel reply "
2399 "error: %d\n", task->tk_status);
2400 xprt_conditional_disconnect(req->rq_xprt,
2401 req->rq_connect_cookie);
2402 break;
2403 default:
2404 /*
2405 * We were unable to reply and will have to drop the
2406 * request. The server should reconnect and retransmit.
2407 */
2408 printk(KERN_NOTICE "RPC: Could not send backchannel reply "
2409 "error: %d\n", task->tk_status);
2410 break;
2411 }
2412 task->tk_action = rpc_exit_task;
2413 }
2414 #endif /* CONFIG_SUNRPC_BACKCHANNEL */
2415
2416 /*
2417 * 6. Sort out the RPC call status
2418 */
2419 static void
2420 call_status(struct rpc_task *task)
2421 {
2422 struct rpc_clnt *clnt = task->tk_client;
2423 int status;
2424
2425 if (!task->tk_msg.rpc_proc->p_proc)
2426 trace_xprt_ping(task->tk_xprt, task->tk_status);
2427
2428 status = task->tk_status;
2429 if (status >= 0) {
2430 task->tk_action = call_decode;
2431 return;
2432 }
2433
2434 trace_rpc_call_status(task);
2435 task->tk_status = 0;
2436 switch(status) {
2437 case -EHOSTDOWN:
2438 case -ENETDOWN:
2439 case -EHOSTUNREACH:
2440 case -ENETUNREACH:
2441 case -EPERM:
2442 if (RPC_IS_SOFTCONN(task))
2443 goto out_exit;
2444 /*
2445 * Delay any retries for 3 seconds, then handle as if it
2446 * were a timeout.
2447 */
2448 rpc_delay(task, 3*HZ);
2449 fallthrough;
2450 case -ETIMEDOUT:
2451 break;
2452 case -ECONNREFUSED:
2453 case -ECONNRESET:
2454 case -ECONNABORTED:
2455 case -ENOTCONN:
2456 rpc_force_rebind(clnt);
2457 break;
2458 case -EADDRINUSE:
2459 rpc_delay(task, 3*HZ);
2460 fallthrough;
2461 case -EPIPE:
2462 case -EAGAIN:
2463 break;
2464 case -ENFILE:
2465 case -ENOBUFS:
2466 case -ENOMEM:
2467 rpc_delay(task, HZ>>2);
2468 break;
2469 case -EIO:
2470 /* shutdown or soft timeout */
2471 goto out_exit;
2472 default:
2473 if (clnt->cl_chatty)
2474 printk("%s: RPC call returned error %d\n",
2475 clnt->cl_program->name, -status);
2476 goto out_exit;
2477 }
2478 task->tk_action = call_encode;
2479 rpc_check_timeout(task);
2480 return;
2481 out_exit:
2482 rpc_call_rpcerror(task, status);
2483 }
2484
2485 static bool
2486 rpc_check_connected(const struct rpc_rqst *req)
2487 {
2488 /* No allocated request or transport? return true */
2489 if (!req || !req->rq_xprt)
2490 return true;
2491 return xprt_connected(req->rq_xprt);
2492 }
2493
2494 static void
2495 rpc_check_timeout(struct rpc_task *task)
2496 {
2497 struct rpc_clnt *clnt = task->tk_client;
2498
2499 if (RPC_SIGNALLED(task))
2500 return;
2501
2502 if (xprt_adjust_timeout(task->tk_rqstp) == 0)
2503 return;
2504
2505 trace_rpc_timeout_status(task);
2506 task->tk_timeouts++;
2507
2508 if (RPC_IS_SOFTCONN(task) && !rpc_check_connected(task->tk_rqstp)) {
2509 rpc_call_rpcerror(task, -ETIMEDOUT);
2510 return;
2511 }
2512
2513 if (RPC_IS_SOFT(task)) {
2514 /*
2515 * Once a "no retrans timeout" soft tasks (a.k.a NFSv4) has
2516 * been sent, it should time out only if the transport
2517 * connection gets terminally broken.
2518 */
2519 if ((task->tk_flags & RPC_TASK_NO_RETRANS_TIMEOUT) &&
2520 rpc_check_connected(task->tk_rqstp))
2521 return;
2522
2523 if (clnt->cl_chatty) {
2524 pr_notice_ratelimited(
2525 "%s: server %s not responding, timed out\n",
2526 clnt->cl_program->name,
2527 task->tk_xprt->servername);
2528 }
2529 if (task->tk_flags & RPC_TASK_TIMEOUT)
2530 rpc_call_rpcerror(task, -ETIMEDOUT);
2531 else
2532 __rpc_call_rpcerror(task, -EIO, -ETIMEDOUT);
2533 return;
2534 }
2535
2536 if (!(task->tk_flags & RPC_CALL_MAJORSEEN)) {
2537 task->tk_flags |= RPC_CALL_MAJORSEEN;
2538 if (clnt->cl_chatty) {
2539 pr_notice_ratelimited(
2540 "%s: server %s not responding, still trying\n",
2541 clnt->cl_program->name,
2542 task->tk_xprt->servername);
2543 }
2544 }
2545 rpc_force_rebind(clnt);
2546 /*
2547 * Did our request time out due to an RPCSEC_GSS out-of-sequence
2548 * event? RFC2203 requires the server to drop all such requests.
2549 */
2550 rpcauth_invalcred(task);
2551 }
2552
2553 /*
2554 * 7. Decode the RPC reply
2555 */
2556 static void
2557 call_decode(struct rpc_task *task)
2558 {
2559 struct rpc_clnt *clnt = task->tk_client;
2560 struct rpc_rqst *req = task->tk_rqstp;
2561 struct xdr_stream xdr;
2562 int err;
2563
2564 if (!task->tk_msg.rpc_proc->p_decode) {
2565 task->tk_action = rpc_exit_task;
2566 return;
2567 }
2568
2569 if (task->tk_flags & RPC_CALL_MAJORSEEN) {
2570 if (clnt->cl_chatty) {
2571 pr_notice_ratelimited("%s: server %s OK\n",
2572 clnt->cl_program->name,
2573 task->tk_xprt->servername);
2574 }
2575 task->tk_flags &= ~RPC_CALL_MAJORSEEN;
2576 }
2577
2578 /*
2579 * Did we ever call xprt_complete_rqst()? If not, we should assume
2580 * the message is incomplete.
2581 */
2582 err = -EAGAIN;
2583 if (!req->rq_reply_bytes_recvd)
2584 goto out;
2585
2586 /* Ensure that we see all writes made by xprt_complete_rqst()
2587 * before it changed req->rq_reply_bytes_recvd.
2588 */
2589 smp_rmb();
2590
2591 req->rq_rcv_buf.len = req->rq_private_buf.len;
2592 trace_rpc_xdr_recvfrom(task, &req->rq_rcv_buf);
2593
2594 /* Check that the softirq receive buffer is valid */
2595 WARN_ON(memcmp(&req->rq_rcv_buf, &req->rq_private_buf,
2596 sizeof(req->rq_rcv_buf)) != 0);
2597
2598 xdr_init_decode(&xdr, &req->rq_rcv_buf,
2599 req->rq_rcv_buf.head[0].iov_base, req);
2600 err = rpc_decode_header(task, &xdr);
2601 out:
2602 switch (err) {
2603 case 0:
2604 task->tk_action = rpc_exit_task;
2605 task->tk_status = rpcauth_unwrap_resp(task, &xdr);
2606 xdr_finish_decode(&xdr);
2607 return;
2608 case -EAGAIN:
2609 task->tk_status = 0;
2610 if (task->tk_client->cl_discrtry)
2611 xprt_conditional_disconnect(req->rq_xprt,
2612 req->rq_connect_cookie);
2613 task->tk_action = call_encode;
2614 rpc_check_timeout(task);
2615 break;
2616 case -EKEYREJECTED:
2617 task->tk_action = call_reserve;
2618 rpc_check_timeout(task);
2619 rpcauth_invalcred(task);
2620 /* Ensure we obtain a new XID if we retry! */
2621 xprt_release(task);
2622 }
2623 }
2624
2625 static int
2626 rpc_encode_header(struct rpc_task *task, struct xdr_stream *xdr)
2627 {
2628 struct rpc_clnt *clnt = task->tk_client;
2629 struct rpc_rqst *req = task->tk_rqstp;
2630 __be32 *p;
2631 int error;
2632
2633 error = -EMSGSIZE;
2634 p = xdr_reserve_space(xdr, RPC_CALLHDRSIZE << 2);
2635 if (!p)
2636 goto out_fail;
2637 *p++ = req->rq_xid;
2638 *p++ = rpc_call;
2639 *p++ = cpu_to_be32(RPC_VERSION);
2640 *p++ = cpu_to_be32(clnt->cl_prog);
2641 *p++ = cpu_to_be32(clnt->cl_vers);
2642 *p = cpu_to_be32(task->tk_msg.rpc_proc->p_proc);
2643
2644 error = rpcauth_marshcred(task, xdr);
2645 if (error < 0)
2646 goto out_fail;
2647 return 0;
2648 out_fail:
2649 trace_rpc_bad_callhdr(task);
2650 rpc_call_rpcerror(task, error);
2651 return error;
2652 }
2653
2654 static noinline int
2655 rpc_decode_header(struct rpc_task *task, struct xdr_stream *xdr)
2656 {
2657 struct rpc_clnt *clnt = task->tk_client;
2658 int error;
2659 __be32 *p;
2660
2661 /* RFC-1014 says that the representation of XDR data must be a
2662 * multiple of four bytes
2663 * - if it isn't pointer subtraction in the NFS client may give
2664 * undefined results
2665 */
2666 if (task->tk_rqstp->rq_rcv_buf.len & 3)
2667 goto out_unparsable;
2668
2669 p = xdr_inline_decode(xdr, 3 * sizeof(*p));
2670 if (!p)
2671 goto out_unparsable;
2672 p++; /* skip XID */
2673 if (*p++ != rpc_reply)
2674 goto out_unparsable;
2675 if (*p++ != rpc_msg_accepted)
2676 goto out_msg_denied;
2677
2678 error = rpcauth_checkverf(task, xdr);
2679 if (error)
2680 goto out_verifier;
2681
2682 p = xdr_inline_decode(xdr, sizeof(*p));
2683 if (!p)
2684 goto out_unparsable;
2685 switch (*p) {
2686 case rpc_success:
2687 return 0;
2688 case rpc_prog_unavail:
2689 trace_rpc__prog_unavail(task);
2690 error = -EPFNOSUPPORT;
2691 goto out_err;
2692 case rpc_prog_mismatch:
2693 trace_rpc__prog_mismatch(task);
2694 error = -EPROTONOSUPPORT;
2695 goto out_err;
2696 case rpc_proc_unavail:
2697 trace_rpc__proc_unavail(task);
2698 error = -EOPNOTSUPP;
2699 goto out_err;
2700 case rpc_garbage_args:
2701 case rpc_system_err:
2702 trace_rpc__garbage_args(task);
2703 error = -EIO;
2704 break;
2705 default:
2706 goto out_unparsable;
2707 }
2708
2709 out_garbage:
2710 clnt->cl_stats->rpcgarbage++;
2711 if (task->tk_garb_retry) {
2712 task->tk_garb_retry--;
2713 task->tk_action = call_encode;
2714 return -EAGAIN;
2715 }
2716 out_err:
2717 rpc_call_rpcerror(task, error);
2718 return error;
2719
2720 out_unparsable:
2721 trace_rpc__unparsable(task);
2722 error = -EIO;
2723 goto out_garbage;
2724
2725 out_verifier:
2726 trace_rpc_bad_verifier(task);
2727 switch (error) {
2728 case -EPROTONOSUPPORT:
2729 goto out_err;
2730 case -EACCES:
2731 /* Re-encode with a fresh cred */
2732 fallthrough;
2733 default:
2734 goto out_garbage;
2735 }
2736
2737 out_msg_denied:
2738 error = -EACCES;
2739 p = xdr_inline_decode(xdr, sizeof(*p));
2740 if (!p)
2741 goto out_unparsable;
2742 switch (*p++) {
2743 case rpc_auth_error:
2744 break;
2745 case rpc_mismatch:
2746 trace_rpc__mismatch(task);
2747 error = -EPROTONOSUPPORT;
2748 goto out_err;
2749 default:
2750 goto out_unparsable;
2751 }
2752
2753 p = xdr_inline_decode(xdr, sizeof(*p));
2754 if (!p)
2755 goto out_unparsable;
2756 switch (*p++) {
2757 case rpc_autherr_rejectedcred:
2758 case rpc_autherr_rejectedverf:
2759 case rpcsec_gsserr_credproblem:
2760 case rpcsec_gsserr_ctxproblem:
2761 rpcauth_invalcred(task);
2762 if (!task->tk_cred_retry)
2763 break;
2764 task->tk_cred_retry--;
2765 trace_rpc__stale_creds(task);
2766 return -EKEYREJECTED;
2767 case rpc_autherr_badcred:
2768 case rpc_autherr_badverf:
2769 /* possibly garbled cred/verf? */
2770 if (!task->tk_garb_retry)
2771 break;
2772 task->tk_garb_retry--;
2773 trace_rpc__bad_creds(task);
2774 task->tk_action = call_encode;
2775 return -EAGAIN;
2776 case rpc_autherr_tooweak:
2777 trace_rpc__auth_tooweak(task);
2778 pr_warn("RPC: server %s requires stronger authentication.\n",
2779 task->tk_xprt->servername);
2780 break;
2781 default:
2782 goto out_unparsable;
2783 }
2784 goto out_err;
2785 }
2786
2787 static void rpcproc_encode_null(struct rpc_rqst *rqstp, struct xdr_stream *xdr,
2788 const void *obj)
2789 {
2790 }
2791
2792 static int rpcproc_decode_null(struct rpc_rqst *rqstp, struct xdr_stream *xdr,
2793 void *obj)
2794 {
2795 return 0;
2796 }
2797
2798 static const struct rpc_procinfo rpcproc_null = {
2799 .p_encode = rpcproc_encode_null,
2800 .p_decode = rpcproc_decode_null,
2801 };
2802
2803 static const struct rpc_procinfo rpcproc_null_noreply = {
2804 .p_encode = rpcproc_encode_null,
2805 };
2806
2807 static void
2808 rpc_null_call_prepare(struct rpc_task *task, void *data)
2809 {
2810 task->tk_flags &= ~RPC_TASK_NO_RETRANS_TIMEOUT;
2811 rpc_call_start(task);
2812 }
2813
2814 static const struct rpc_call_ops rpc_null_ops = {
2815 .rpc_call_prepare = rpc_null_call_prepare,
2816 .rpc_call_done = rpc_default_callback,
2817 };
2818
2819 static
2820 struct rpc_task *rpc_call_null_helper(struct rpc_clnt *clnt,
2821 struct rpc_xprt *xprt, struct rpc_cred *cred, int flags,
2822 const struct rpc_call_ops *ops, void *data)
2823 {
2824 struct rpc_message msg = {
2825 .rpc_proc = &rpcproc_null,
2826 };
2827 struct rpc_task_setup task_setup_data = {
2828 .rpc_client = clnt,
2829 .rpc_xprt = xprt,
2830 .rpc_message = &msg,
2831 .rpc_op_cred = cred,
2832 .callback_ops = ops ?: &rpc_null_ops,
2833 .callback_data = data,
2834 .flags = flags | RPC_TASK_SOFT | RPC_TASK_SOFTCONN |
2835 RPC_TASK_NULLCREDS,
2836 };
2837
2838 return rpc_run_task(&task_setup_data);
2839 }
2840
2841 struct rpc_task *rpc_call_null(struct rpc_clnt *clnt, struct rpc_cred *cred, int flags)
2842 {
2843 return rpc_call_null_helper(clnt, NULL, cred, flags, NULL, NULL);
2844 }
2845 EXPORT_SYMBOL_GPL(rpc_call_null);
2846
2847 static int rpc_ping(struct rpc_clnt *clnt)
2848 {
2849 struct rpc_task *task;
2850 int status;
2851
2852 if (clnt->cl_auth->au_ops->ping)
2853 return clnt->cl_auth->au_ops->ping(clnt);
2854
2855 task = rpc_call_null_helper(clnt, NULL, NULL, 0, NULL, NULL);
2856 if (IS_ERR(task))
2857 return PTR_ERR(task);
2858 status = task->tk_status;
2859 rpc_put_task(task);
2860 return status;
2861 }
2862
2863 static int rpc_ping_noreply(struct rpc_clnt *clnt)
2864 {
2865 struct rpc_message msg = {
2866 .rpc_proc = &rpcproc_null_noreply,
2867 };
2868 struct rpc_task_setup task_setup_data = {
2869 .rpc_client = clnt,
2870 .rpc_message = &msg,
2871 .callback_ops = &rpc_null_ops,
2872 .flags = RPC_TASK_SOFT | RPC_TASK_SOFTCONN | RPC_TASK_NULLCREDS,
2873 };
2874 struct rpc_task *task;
2875 int status;
2876
2877 task = rpc_run_task(&task_setup_data);
2878 if (IS_ERR(task))
2879 return PTR_ERR(task);
2880 status = task->tk_status;
2881 rpc_put_task(task);
2882 return status;
2883 }
2884
2885 struct rpc_cb_add_xprt_calldata {
2886 struct rpc_xprt_switch *xps;
2887 struct rpc_xprt *xprt;
2888 };
2889
2890 static void rpc_cb_add_xprt_done(struct rpc_task *task, void *calldata)
2891 {
2892 struct rpc_cb_add_xprt_calldata *data = calldata;
2893
2894 if (task->tk_status == 0)
2895 rpc_xprt_switch_add_xprt(data->xps, data->xprt);
2896 }
2897
2898 static void rpc_cb_add_xprt_release(void *calldata)
2899 {
2900 struct rpc_cb_add_xprt_calldata *data = calldata;
2901
2902 xprt_put(data->xprt);
2903 xprt_switch_put(data->xps);
2904 kfree(data);
2905 }
2906
2907 static const struct rpc_call_ops rpc_cb_add_xprt_call_ops = {
2908 .rpc_call_prepare = rpc_null_call_prepare,
2909 .rpc_call_done = rpc_cb_add_xprt_done,
2910 .rpc_release = rpc_cb_add_xprt_release,
2911 };
2912
2913 /**
2914 * rpc_clnt_test_and_add_xprt - Test and add a new transport to a rpc_clnt
2915 * @clnt: pointer to struct rpc_clnt
2916 * @xps: pointer to struct rpc_xprt_switch,
2917 * @xprt: pointer struct rpc_xprt
2918 * @in_max_connect: pointer to the max_connect value for the passed in xprt transport
2919 */
2920 int rpc_clnt_test_and_add_xprt(struct rpc_clnt *clnt,
2921 struct rpc_xprt_switch *xps, struct rpc_xprt *xprt,
2922 void *in_max_connect)
2923 {
2924 struct rpc_cb_add_xprt_calldata *data;
2925 struct rpc_task *task;
2926 int max_connect = clnt->cl_max_connect;
2927
2928 if (in_max_connect)
2929 max_connect = *(int *)in_max_connect;
2930 if (xps->xps_nunique_destaddr_xprts + 1 > max_connect) {
2931 rcu_read_lock();
2932 pr_warn("SUNRPC: reached max allowed number (%d) did not add "
2933 "transport to server: %s\n", max_connect,
2934 rpc_peeraddr2str(clnt, RPC_DISPLAY_ADDR));
2935 rcu_read_unlock();
2936 return -EINVAL;
2937 }
2938
2939 data = kmalloc(sizeof(*data), GFP_KERNEL);
2940 if (!data)
2941 return -ENOMEM;
2942 data->xps = xprt_switch_get(xps);
2943 data->xprt = xprt_get(xprt);
2944 if (rpc_xprt_switch_has_addr(data->xps, (struct sockaddr *)&xprt->addr)) {
2945 rpc_cb_add_xprt_release(data);
2946 goto success;
2947 }
2948
2949 task = rpc_call_null_helper(clnt, xprt, NULL, RPC_TASK_ASYNC,
2950 &rpc_cb_add_xprt_call_ops, data);
2951 if (IS_ERR(task))
2952 return PTR_ERR(task);
2953
2954 data->xps->xps_nunique_destaddr_xprts++;
2955 rpc_put_task(task);
2956 success:
2957 return 1;
2958 }
2959 EXPORT_SYMBOL_GPL(rpc_clnt_test_and_add_xprt);
2960
2961 static int rpc_clnt_add_xprt_helper(struct rpc_clnt *clnt,
2962 struct rpc_xprt *xprt,
2963 struct rpc_add_xprt_test *data)
2964 {
2965 struct rpc_task *task;
2966 int status = -EADDRINUSE;
2967
2968 /* Test the connection */
2969 task = rpc_call_null_helper(clnt, xprt, NULL, 0, NULL, NULL);
2970 if (IS_ERR(task))
2971 return PTR_ERR(task);
2972
2973 status = task->tk_status;
2974 rpc_put_task(task);
2975
2976 if (status < 0)
2977 return status;
2978
2979 /* rpc_xprt_switch and rpc_xprt are deferrenced by add_xprt_test() */
2980 data->add_xprt_test(clnt, xprt, data->data);
2981
2982 return 0;
2983 }
2984
2985 /**
2986 * rpc_clnt_setup_test_and_add_xprt()
2987 *
2988 * This is an rpc_clnt_add_xprt setup() function which returns 1 so:
2989 * 1) caller of the test function must dereference the rpc_xprt_switch
2990 * and the rpc_xprt.
2991 * 2) test function must call rpc_xprt_switch_add_xprt, usually in
2992 * the rpc_call_done routine.
2993 *
2994 * Upon success (return of 1), the test function adds the new
2995 * transport to the rpc_clnt xprt switch
2996 *
2997 * @clnt: struct rpc_clnt to get the new transport
2998 * @xps: the rpc_xprt_switch to hold the new transport
2999 * @xprt: the rpc_xprt to test
3000 * @data: a struct rpc_add_xprt_test pointer that holds the test function
3001 * and test function call data
3002 */
3003 int rpc_clnt_setup_test_and_add_xprt(struct rpc_clnt *clnt,
3004 struct rpc_xprt_switch *xps,
3005 struct rpc_xprt *xprt,
3006 void *data)
3007 {
3008 int status = -EADDRINUSE;
3009
3010 xprt = xprt_get(xprt);
3011 xprt_switch_get(xps);
3012
3013 if (rpc_xprt_switch_has_addr(xps, (struct sockaddr *)&xprt->addr))
3014 goto out_err;
3015
3016 status = rpc_clnt_add_xprt_helper(clnt, xprt, data);
3017 if (status < 0)
3018 goto out_err;
3019
3020 status = 1;
3021 out_err:
3022 xprt_put(xprt);
3023 xprt_switch_put(xps);
3024 if (status < 0)
3025 pr_info("RPC: rpc_clnt_test_xprt failed: %d addr %s not "
3026 "added\n", status,
3027 xprt->address_strings[RPC_DISPLAY_ADDR]);
3028 /* so that rpc_clnt_add_xprt does not call rpc_xprt_switch_add_xprt */
3029 return status;
3030 }
3031 EXPORT_SYMBOL_GPL(rpc_clnt_setup_test_and_add_xprt);
3032
3033 /**
3034 * rpc_clnt_add_xprt - Add a new transport to a rpc_clnt
3035 * @clnt: pointer to struct rpc_clnt
3036 * @xprtargs: pointer to struct xprt_create
3037 * @setup: callback to test and/or set up the connection
3038 * @data: pointer to setup function data
3039 *
3040 * Creates a new transport using the parameters set in args and
3041 * adds it to clnt.
3042 * If ping is set, then test that connectivity succeeds before
3043 * adding the new transport.
3044 *
3045 */
3046 int rpc_clnt_add_xprt(struct rpc_clnt *clnt,
3047 struct xprt_create *xprtargs,
3048 int (*setup)(struct rpc_clnt *,
3049 struct rpc_xprt_switch *,
3050 struct rpc_xprt *,
3051 void *),
3052 void *data)
3053 {
3054 struct rpc_xprt_switch *xps;
3055 struct rpc_xprt *xprt;
3056 unsigned long connect_timeout;
3057 unsigned long reconnect_timeout;
3058 unsigned char resvport, reuseport;
3059 int ret = 0, ident;
3060
3061 rcu_read_lock();
3062 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
3063 xprt = xprt_iter_xprt(&clnt->cl_xpi);
3064 if (xps == NULL || xprt == NULL) {
3065 rcu_read_unlock();
3066 xprt_switch_put(xps);
3067 return -EAGAIN;
3068 }
3069 resvport = xprt->resvport;
3070 reuseport = xprt->reuseport;
3071 connect_timeout = xprt->connect_timeout;
3072 reconnect_timeout = xprt->max_reconnect_timeout;
3073 ident = xprt->xprt_class->ident;
3074 rcu_read_unlock();
3075
3076 if (!xprtargs->ident)
3077 xprtargs->ident = ident;
3078 xprtargs->xprtsec = clnt->cl_xprtsec;
3079 xprt = xprt_create_transport(xprtargs);
3080 if (IS_ERR(xprt)) {
3081 ret = PTR_ERR(xprt);
3082 goto out_put_switch;
3083 }
3084 xprt->resvport = resvport;
3085 xprt->reuseport = reuseport;
3086
3087 if (xprtargs->connect_timeout)
3088 connect_timeout = xprtargs->connect_timeout;
3089 if (xprtargs->reconnect_timeout)
3090 reconnect_timeout = xprtargs->reconnect_timeout;
3091 if (xprt->ops->set_connect_timeout != NULL)
3092 xprt->ops->set_connect_timeout(xprt,
3093 connect_timeout,
3094 reconnect_timeout);
3095
3096 rpc_xprt_switch_set_roundrobin(xps);
3097 if (setup) {
3098 ret = setup(clnt, xps, xprt, data);
3099 if (ret != 0)
3100 goto out_put_xprt;
3101 }
3102 rpc_xprt_switch_add_xprt(xps, xprt);
3103 out_put_xprt:
3104 xprt_put(xprt);
3105 out_put_switch:
3106 xprt_switch_put(xps);
3107 return ret;
3108 }
3109 EXPORT_SYMBOL_GPL(rpc_clnt_add_xprt);
3110
3111 static int rpc_xprt_probe_trunked(struct rpc_clnt *clnt,
3112 struct rpc_xprt *xprt,
3113 struct rpc_add_xprt_test *data)
3114 {
3115 struct rpc_xprt_switch *xps;
3116 struct rpc_xprt *main_xprt;
3117 int status = 0;
3118
3119 xprt_get(xprt);
3120
3121 rcu_read_lock();
3122 main_xprt = xprt_get(rcu_dereference(clnt->cl_xprt));
3123 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
3124 status = rpc_cmp_addr_port((struct sockaddr *)&xprt->addr,
3125 (struct sockaddr *)&main_xprt->addr);
3126 rcu_read_unlock();
3127 xprt_put(main_xprt);
3128 if (status || !test_bit(XPRT_OFFLINE, &xprt->state))
3129 goto out;
3130
3131 status = rpc_clnt_add_xprt_helper(clnt, xprt, data);
3132 out:
3133 xprt_put(xprt);
3134 xprt_switch_put(xps);
3135 return status;
3136 }
3137
3138 /* rpc_clnt_probe_trunked_xprt -- probe offlined transport for session trunking
3139 * @clnt rpc_clnt structure
3140 *
3141 * For each offlined transport found in the rpc_clnt structure call
3142 * the function rpc_xprt_probe_trunked() which will determine if this
3143 * transport still belongs to the trunking group.
3144 */
3145 void rpc_clnt_probe_trunked_xprts(struct rpc_clnt *clnt,
3146 struct rpc_add_xprt_test *data)
3147 {
3148 struct rpc_xprt_iter xpi;
3149 int ret;
3150
3151 ret = rpc_clnt_xprt_iter_offline_init(clnt, &xpi);
3152 if (ret)
3153 return;
3154 for (;;) {
3155 struct rpc_xprt *xprt = xprt_iter_get_next(&xpi);
3156
3157 if (!xprt)
3158 break;
3159 ret = rpc_xprt_probe_trunked(clnt, xprt, data);
3160 xprt_put(xprt);
3161 if (ret < 0)
3162 break;
3163 xprt_iter_rewind(&xpi);
3164 }
3165 xprt_iter_destroy(&xpi);
3166 }
3167 EXPORT_SYMBOL_GPL(rpc_clnt_probe_trunked_xprts);
3168
3169 static int rpc_xprt_offline(struct rpc_clnt *clnt,
3170 struct rpc_xprt *xprt,
3171 void *data)
3172 {
3173 struct rpc_xprt *main_xprt;
3174 struct rpc_xprt_switch *xps;
3175 int err = 0;
3176
3177 xprt_get(xprt);
3178
3179 rcu_read_lock();
3180 main_xprt = xprt_get(rcu_dereference(clnt->cl_xprt));
3181 xps = xprt_switch_get(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
3182 err = rpc_cmp_addr_port((struct sockaddr *)&xprt->addr,
3183 (struct sockaddr *)&main_xprt->addr);
3184 rcu_read_unlock();
3185 xprt_put(main_xprt);
3186 if (err)
3187 goto out;
3188
3189 if (wait_on_bit_lock(&xprt->state, XPRT_LOCKED, TASK_KILLABLE)) {
3190 err = -EINTR;
3191 goto out;
3192 }
3193 xprt_set_offline_locked(xprt, xps);
3194
3195 xprt_release_write(xprt, NULL);
3196 out:
3197 xprt_put(xprt);
3198 xprt_switch_put(xps);
3199 return err;
3200 }
3201
3202 /* rpc_clnt_manage_trunked_xprts -- offline trunked transports
3203 * @clnt rpc_clnt structure
3204 *
3205 * For each active transport found in the rpc_clnt structure call
3206 * the function rpc_xprt_offline() which will identify trunked transports
3207 * and will mark them offline.
3208 */
3209 void rpc_clnt_manage_trunked_xprts(struct rpc_clnt *clnt)
3210 {
3211 rpc_clnt_iterate_for_each_xprt(clnt, rpc_xprt_offline, NULL);
3212 }
3213 EXPORT_SYMBOL_GPL(rpc_clnt_manage_trunked_xprts);
3214
3215 struct connect_timeout_data {
3216 unsigned long connect_timeout;
3217 unsigned long reconnect_timeout;
3218 };
3219
3220 static int
3221 rpc_xprt_set_connect_timeout(struct rpc_clnt *clnt,
3222 struct rpc_xprt *xprt,
3223 void *data)
3224 {
3225 struct connect_timeout_data *timeo = data;
3226
3227 if (xprt->ops->set_connect_timeout)
3228 xprt->ops->set_connect_timeout(xprt,
3229 timeo->connect_timeout,
3230 timeo->reconnect_timeout);
3231 return 0;
3232 }
3233
3234 void
3235 rpc_set_connect_timeout(struct rpc_clnt *clnt,
3236 unsigned long connect_timeout,
3237 unsigned long reconnect_timeout)
3238 {
3239 struct connect_timeout_data timeout = {
3240 .connect_timeout = connect_timeout,
3241 .reconnect_timeout = reconnect_timeout,
3242 };
3243 rpc_clnt_iterate_for_each_xprt(clnt,
3244 rpc_xprt_set_connect_timeout,
3245 &timeout);
3246 }
3247 EXPORT_SYMBOL_GPL(rpc_set_connect_timeout);
3248
3249 void rpc_clnt_xprt_switch_put(struct rpc_clnt *clnt)
3250 {
3251 rcu_read_lock();
3252 xprt_switch_put(rcu_dereference(clnt->cl_xpi.xpi_xpswitch));
3253 rcu_read_unlock();
3254 }
3255 EXPORT_SYMBOL_GPL(rpc_clnt_xprt_switch_put);
3256
3257 void rpc_clnt_xprt_set_online(struct rpc_clnt *clnt, struct rpc_xprt *xprt)
3258 {
3259 struct rpc_xprt_switch *xps;
3260
3261 rcu_read_lock();
3262 xps = rcu_dereference(clnt->cl_xpi.xpi_xpswitch);
3263 rcu_read_unlock();
3264 xprt_set_online_locked(xprt, xps);
3265 }
3266
3267 void rpc_clnt_xprt_switch_add_xprt(struct rpc_clnt *clnt, struct rpc_xprt *xprt)
3268 {
3269 if (rpc_clnt_xprt_switch_has_addr(clnt,
3270 (const struct sockaddr *)&xprt->addr)) {
3271 return rpc_clnt_xprt_set_online(clnt, xprt);
3272 }
3273 rcu_read_lock();
3274 rpc_xprt_switch_add_xprt(rcu_dereference(clnt->cl_xpi.xpi_xpswitch),
3275 xprt);
3276 rcu_read_unlock();
3277 }
3278 EXPORT_SYMBOL_GPL(rpc_clnt_xprt_switch_add_xprt);
3279
3280 void rpc_clnt_xprt_switch_remove_xprt(struct rpc_clnt *clnt, struct rpc_xprt *xprt)
3281 {
3282 struct rpc_xprt_switch *xps;
3283
3284 rcu_read_lock();
3285 xps = rcu_dereference(clnt->cl_xpi.xpi_xpswitch);
3286 rpc_xprt_switch_remove_xprt(rcu_dereference(clnt->cl_xpi.xpi_xpswitch),
3287 xprt, 0);
3288 xps->xps_nunique_destaddr_xprts--;
3289 rcu_read_unlock();
3290 }
3291 EXPORT_SYMBOL_GPL(rpc_clnt_xprt_switch_remove_xprt);
3292
3293 bool rpc_clnt_xprt_switch_has_addr(struct rpc_clnt *clnt,
3294 const struct sockaddr *sap)
3295 {
3296 struct rpc_xprt_switch *xps;
3297 bool ret;
3298
3299 rcu_read_lock();
3300 xps = rcu_dereference(clnt->cl_xpi.xpi_xpswitch);
3301 ret = rpc_xprt_switch_has_addr(xps, sap);
3302 rcu_read_unlock();
3303 return ret;
3304 }
3305 EXPORT_SYMBOL_GPL(rpc_clnt_xprt_switch_has_addr);
3306
3307 #if IS_ENABLED(CONFIG_SUNRPC_DEBUG)
3308 static void rpc_show_header(void)
3309 {
3310 printk(KERN_INFO "-pid- flgs status -client- --rqstp- "
3311 "-timeout ---ops--\n");
3312 }
3313
3314 static void rpc_show_task(const struct rpc_clnt *clnt,
3315 const struct rpc_task *task)
3316 {
3317 const char *rpc_waitq = "none";
3318
3319 if (RPC_IS_QUEUED(task))
3320 rpc_waitq = rpc_qname(task->tk_waitqueue);
3321
3322 printk(KERN_INFO "%5u %04x %6d %8p %8p %8ld %8p %sv%u %s a:%ps q:%s\n",
3323 task->tk_pid, task->tk_flags, task->tk_status,
3324 clnt, task->tk_rqstp, rpc_task_timeout(task), task->tk_ops,
3325 clnt->cl_program->name, clnt->cl_vers, rpc_proc_name(task),
3326 task->tk_action, rpc_waitq);
3327 }
3328
3329 void rpc_show_tasks(struct net *net)
3330 {
3331 struct rpc_clnt *clnt;
3332 struct rpc_task *task;
3333 int header = 0;
3334 struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
3335
3336 spin_lock(&sn->rpc_client_lock);
3337 list_for_each_entry(clnt, &sn->all_clients, cl_clients) {
3338 spin_lock(&clnt->cl_lock);
3339 list_for_each_entry(task, &clnt->cl_tasks, tk_task) {
3340 if (!header) {
3341 rpc_show_header();
3342 header++;
3343 }
3344 rpc_show_task(clnt, task);
3345 }
3346 spin_unlock(&clnt->cl_lock);
3347 }
3348 spin_unlock(&sn->rpc_client_lock);
3349 }
3350 #endif
3351
3352 #if IS_ENABLED(CONFIG_SUNRPC_SWAP)
3353 static int
3354 rpc_clnt_swap_activate_callback(struct rpc_clnt *clnt,
3355 struct rpc_xprt *xprt,
3356 void *dummy)
3357 {
3358 return xprt_enable_swap(xprt);
3359 }
3360
3361 int
3362 rpc_clnt_swap_activate(struct rpc_clnt *clnt)
3363 {
3364 while (clnt != clnt->cl_parent)
3365 clnt = clnt->cl_parent;
3366 if (atomic_inc_return(&clnt->cl_swapper) == 1)
3367 return rpc_clnt_iterate_for_each_xprt(clnt,
3368 rpc_clnt_swap_activate_callback, NULL);
3369 return 0;
3370 }
3371 EXPORT_SYMBOL_GPL(rpc_clnt_swap_activate);
3372
3373 static int
3374 rpc_clnt_swap_deactivate_callback(struct rpc_clnt *clnt,
3375 struct rpc_xprt *xprt,
3376 void *dummy)
3377 {
3378 xprt_disable_swap(xprt);
3379 return 0;
3380 }
3381
3382 void
3383 rpc_clnt_swap_deactivate(struct rpc_clnt *clnt)
3384 {
3385 while (clnt != clnt->cl_parent)
3386 clnt = clnt->cl_parent;
3387 if (atomic_dec_if_positive(&clnt->cl_swapper) == 0)
3388 rpc_clnt_iterate_for_each_xprt(clnt,
3389 rpc_clnt_swap_deactivate_callback, NULL);
3390 }
3391 EXPORT_SYMBOL_GPL(rpc_clnt_swap_deactivate);
3392 #endif /* CONFIG_SUNRPC_SWAP */