^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) * linux/net/sunrpc/svcsock.c
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) * These are the RPC server socket internals.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) * The server scheduling algorithm does not always distribute the load
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8) * evenly when servicing a single client. May need to modify the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) * svc_xprt_enqueue procedure...
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) * TCP support is largely untested and may be a little slow. The problem
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) * is that we currently do two separate recvfrom's, one for the 4-byte
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) * record length, and the second for the actual record. This could possibly
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) * be improved by always reading a minimum size of around 100 bytes and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) * tucking any superfluous bytes away in a temporary store. Still, that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) * leaves write requests out in the rain. An alternative may be to peek at
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) * the first skb in the queue, and if it matches the next TCP sequence
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) * number, to extract the record marker. Yuck.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #include <linux/kernel.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) #include <linux/sched.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) #include <linux/errno.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27) #include <linux/fcntl.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) #include <linux/net.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) #include <linux/in.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) #include <linux/inet.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31) #include <linux/udp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) #include <linux/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) #include <linux/unistd.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) #include <linux/slab.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35) #include <linux/netdevice.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) #include <linux/skbuff.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) #include <linux/file.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) #include <linux/freezer.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39) #include <net/sock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) #include <net/checksum.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) #include <net/ip.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) #include <net/ipv6.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) #include <net/udp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44) #include <net/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) #include <net/tcp_states.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) #include <linux/uaccess.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) #include <linux/highmem.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) #include <asm/ioctls.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) #include <linux/sunrpc/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) #include <linux/sunrpc/clnt.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) #include <linux/sunrpc/xdr.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53) #include <linux/sunrpc/msg_prot.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) #include <linux/sunrpc/svcsock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) #include <linux/sunrpc/stats.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56) #include <linux/sunrpc/xprt.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) #include <trace/events/sunrpc.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) #include "socklib.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) #include "sunrpc.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63) #define RPCDBG_FACILITY RPCDBG_SVCXPRT
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66) static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) int flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) static int svc_udp_recvfrom(struct svc_rqst *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69) static int svc_udp_sendto(struct svc_rqst *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) static void svc_sock_detach(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) static void svc_tcp_sock_detach(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72) static void svc_sock_free(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) struct net *, struct sockaddr *,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) int, int);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77) #ifdef CONFIG_DEBUG_LOCK_ALLOC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) static struct lock_class_key svc_key[2];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) static struct lock_class_key svc_slock_key[2];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) static void svc_reclassify_socket(struct socket *sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) struct sock *sk = sock->sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) if (WARN_ON_ONCE(!sock_allow_reclassification(sk)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) switch (sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) &svc_slock_key[0],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) "sk_xprt.xpt_lock-AF_INET-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) &svc_key[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) &svc_slock_key[1],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) "sk_xprt.xpt_lock-AF_INET6-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) &svc_key[1]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) static void svc_reclassify_socket(struct socket *sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) * svc_tcp_release_rqst - Release transport-related resources
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) * @rqstp: request structure with resources to be released
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) static void svc_tcp_release_rqst(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) struct sk_buff *skb = rqstp->rq_xprt_ctxt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) if (skb) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124) container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) rqstp->rq_xprt_ctxt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) skb_free_datagram_locked(svsk->sk_sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) * svc_udp_release_rqst - Release transport-related resources
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) * @rqstp: request structure with resources to be released
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) static void svc_udp_release_rqst(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) struct sk_buff *skb = rqstp->rq_xprt_ctxt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) if (skb) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) rqstp->rq_xprt_ctxt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) consume_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) union svc_pktinfo_u {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) struct in_pktinfo pkti;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148) struct in6_pktinfo pkti6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) #define SVC_PKTINFO_SPACE \
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151) CMSG_SPACE(sizeof(union svc_pktinfo_u))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156) container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) switch (svsk->sk_sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) case AF_INET: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) struct in_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161) cmh->cmsg_level = SOL_IP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) cmh->cmsg_type = IP_PKTINFO;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) pki->ipi_ifindex = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164) pki->ipi_spec_dst.s_addr =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) svc_daddr_in(rqstp)->sin_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) case AF_INET6: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) struct in6_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) struct sockaddr_in6 *daddr = svc_daddr_in6(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) cmh->cmsg_level = SOL_IPV6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) cmh->cmsg_type = IPV6_PKTINFO;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) pki->ipi6_ifindex = daddr->sin6_scope_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177) pki->ipi6_addr = daddr->sin6_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184) static int svc_sock_read_payload(struct svc_rqst *rqstp, unsigned int offset,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) unsigned int length)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191) * Report socket names for nfsdfs
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) const struct sock *sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196) const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) "udp" : "tcp";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) int len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) switch (sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) case PF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) proto_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) &inet_sk(sk)->inet_rcv_saddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) inet_sk(sk)->inet_num);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) #if IS_ENABLED(CONFIG_IPV6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) case PF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) proto_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) &sk->sk_v6_rcv_saddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) inet_sk(sk)->inet_num);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) len = snprintf(buf, remaining, "*unknown-%d*\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) sk->sk_family);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220) if (len >= remaining) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) *buf = '\0';
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) return -ENAMETOOLONG;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224) return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) #if ARCH_IMPLEMENTS_FLUSH_DCACHE_PAGE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) static void svc_flush_bvec(const struct bio_vec *bvec, size_t size, size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) struct bvec_iter bi = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) .bi_size = size + seek,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233) struct bio_vec bv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) bvec_iter_advance(bvec, &bi, seek & PAGE_MASK);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) for_each_bvec(bv, bvec, bi, bi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) flush_dcache_page(bv.bv_page);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) static inline void svc_flush_bvec(const struct bio_vec *bvec, size_t size,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241) size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) * Read from @rqstp's transport socket. The incoming message fills whole
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) * pages in @rqstp's rq_pages array until the last page of the message
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) * has been received into a partial page.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) static ssize_t svc_tcp_read_msg(struct svc_rqst *rqstp, size_t buflen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254) struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) struct bio_vec *bvec = rqstp->rq_bvec;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) struct msghdr msg = { NULL };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258) unsigned int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259) ssize_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260) size_t t;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) rqstp->rq_xprt_hlen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264) clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) for (i = 0, t = 0; t < buflen; i++, t += PAGE_SIZE) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267) bvec[i].bv_page = rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) bvec[i].bv_len = PAGE_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269) bvec[i].bv_offset = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271) rqstp->rq_respages = &rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272) rqstp->rq_next_page = rqstp->rq_respages + 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274) iov_iter_bvec(&msg.msg_iter, READ, bvec, i, buflen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) if (seek) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) iov_iter_advance(&msg.msg_iter, seek);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277) buflen -= seek;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) len = sock_recvmsg(svsk->sk_sock, &msg, MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280) if (len > 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) svc_flush_bvec(bvec, len, seek);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) /* If we read a full record, then assume there may be more
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284) * data to read (stream based sockets only!)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) if (len == buflen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287) set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289) return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) * Set socket snd and rcv buffer lengths
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295) static void svc_sock_setbufsize(struct svc_sock *svsk, unsigned int nreqs)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297) unsigned int max_mesg = svsk->sk_xprt.xpt_server->sv_max_mesg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298) struct socket *sock = svsk->sk_sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300) nreqs = min(nreqs, INT_MAX / 2 / max_mesg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302) lock_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303) sock->sk->sk_sndbuf = nreqs * max_mesg * 2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304) sock->sk->sk_rcvbuf = nreqs * max_mesg * 2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) sock->sk->sk_write_space(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) release_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309) static void svc_sock_secure_port(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) if (svc_port_is_privileged(svc_addr(rqstp)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312) set_bit(RQ_SECURE, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314) clear_bit(RQ_SECURE, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318) * INET callback when data has been received on the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320) static void svc_data_ready(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322) struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325) /* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326) rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327) svsk->sk_odata(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328) trace_svcsock_data_ready(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329) if (!test_and_set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330) svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335) * INET callback when space is newly available on the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337) static void svc_write_space(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339) struct svc_sock *svsk = (struct svc_sock *)(sk->sk_user_data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342) /* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343) rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344) trace_svcsock_write_space(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345) svsk->sk_owspace(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346) svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350) static int svc_tcp_has_wspace(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354) if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356) return !test_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) static void svc_tcp_kill_temp_xprt(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) sock_no_linger(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367) * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369) static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372) struct in_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) struct sockaddr_in *daddr = svc_daddr_in(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) if (cmh->cmsg_type != IP_PKTINFO)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378) daddr->sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379) daddr->sin_addr.s_addr = pki->ipi_spec_dst.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) * See net/ipv6/datagram.c : ip6_datagram_recv_ctl
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) struct in6_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390) struct sockaddr_in6 *daddr = svc_daddr_in6(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392) if (cmh->cmsg_type != IPV6_PKTINFO)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395) daddr->sin6_family = AF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) daddr->sin6_addr = pki->ipi6_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397) daddr->sin6_scope_id = pki->ipi6_ifindex;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402) * Copy the UDP datagram's destination address to the rqstp structure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 403) * The 'destination' address in this case is the address to which the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 404) * peer sent the datagram, i.e. our local address. For multihomed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 405) * hosts, this can change from msg to msg. Note that only the IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 406) * address changes, the port number should remain the same.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 407) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 408) static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 409) struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 410) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 411) switch (cmh->cmsg_level) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 412) case SOL_IP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 413) return svc_udp_get_dest_address4(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 414) case SOL_IPV6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 415) return svc_udp_get_dest_address6(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 416) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 417)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 418) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 419) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 420)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 421) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 422) * svc_udp_recvfrom - Receive a datagram from a UDP socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 423) * @rqstp: request structure into which to receive an RPC Call
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 424) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 425) * Called in a loop when XPT_DATA has been set.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 426) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 427) * Returns:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 428) * On success, the number of bytes in a received RPC Call, or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 429) * %0 if a complete RPC Call message was not ready to return
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 430) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 431) static int svc_udp_recvfrom(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 432) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 433) struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 434) container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 435) struct svc_serv *serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 436) struct sk_buff *skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 437) union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 438) struct cmsghdr hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 439) long all[SVC_PKTINFO_SPACE / sizeof(long)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 440) } buffer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 441) struct cmsghdr *cmh = &buffer.hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 442) struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 443) .msg_name = svc_addr(rqstp),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 444) .msg_control = cmh,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 445) .msg_controllen = sizeof(buffer),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 446) .msg_flags = MSG_DONTWAIT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 447) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 448) size_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 449) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 450)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 451) if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 452) /* udp sockets need large rcvbuf as all pending
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 453) * requests are still in that buffer. sndbuf must
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 454) * also be large enough that there is enough space
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 455) * for one reply per thread. We count all threads
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 456) * rather than threads in a particular pool, which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 457) * provides an upper bound on the number of threads
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 458) * which will access the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 459) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 460) svc_sock_setbufsize(svsk, serv->sv_nrthreads + 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 461)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 462) clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 463) err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 464) 0, 0, MSG_PEEK | MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 465) if (err < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 466) goto out_recv_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 467) skb = skb_recv_udp(svsk->sk_sk, 0, 1, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 468) if (!skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 469) goto out_recv_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 470)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 471) len = svc_addr_len(svc_addr(rqstp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 472) rqstp->rq_addrlen = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 473) if (skb->tstamp == 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 474) skb->tstamp = ktime_get_real();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 475) /* Don't enable netstamp, sunrpc doesn't
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 476) need that much accuracy */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 477) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 478) sock_write_timestamp(svsk->sk_sk, skb->tstamp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 479) set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 480)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 481) len = skb->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 482) rqstp->rq_arg.len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 483) trace_svcsock_udp_recv(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 484)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 485) rqstp->rq_prot = IPPROTO_UDP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 486)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 487) if (!svc_udp_get_dest_address(rqstp, cmh))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 488) goto out_cmsg_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 489) rqstp->rq_daddrlen = svc_addr_len(svc_daddr(rqstp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 490)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 491) if (skb_is_nonlinear(skb)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 492) /* we have to copy */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 493) local_bh_disable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 494) if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 495) goto out_bh_enable;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 496) local_bh_enable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 497) consume_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 498) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 499) /* we can use it in-place */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 500) rqstp->rq_arg.head[0].iov_base = skb->data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 501) rqstp->rq_arg.head[0].iov_len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 502) if (skb_checksum_complete(skb))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 503) goto out_free;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 504) rqstp->rq_xprt_ctxt = skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 505) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 506)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 507) rqstp->rq_arg.page_base = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 508) if (len <= rqstp->rq_arg.head[0].iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 509) rqstp->rq_arg.head[0].iov_len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 510) rqstp->rq_arg.page_len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 511) rqstp->rq_respages = rqstp->rq_pages+1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 512) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 513) rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 514) rqstp->rq_respages = rqstp->rq_pages + 1 +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 515) DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 516) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 517) rqstp->rq_next_page = rqstp->rq_respages+1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 518)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 519) if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 520) serv->sv_stats->netudpcnt++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 521)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 522) return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 523)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 524) out_recv_err:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 525) if (err != -EAGAIN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 526) /* possibly an icmp error */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 527) set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 528) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 529) trace_svcsock_udp_recv_err(&svsk->sk_xprt, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 530) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 531) out_cmsg_err:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 532) net_warn_ratelimited("svc: received unknown control message %d/%d; dropping RPC reply datagram\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 533) cmh->cmsg_level, cmh->cmsg_type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 534) goto out_free;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 535) out_bh_enable:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 536) local_bh_enable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 537) out_free:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 538) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 539) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 540) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 541)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 542) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 543) * svc_udp_sendto - Send out a reply on a UDP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 544) * @rqstp: completed svc_rqst
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 545) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 546) * xpt_mutex ensures @rqstp's whole message is written to the socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 547) * without interruption.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 548) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 549) * Returns the number of bytes sent, or a negative errno.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 550) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 551) static int svc_udp_sendto(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 552) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 553) struct svc_xprt *xprt = rqstp->rq_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 554) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 555) struct xdr_buf *xdr = &rqstp->rq_res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 556) union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 557) struct cmsghdr hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 558) long all[SVC_PKTINFO_SPACE / sizeof(long)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 559) } buffer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 560) struct cmsghdr *cmh = &buffer.hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 561) struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 562) .msg_name = &rqstp->rq_addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 563) .msg_namelen = rqstp->rq_addrlen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 564) .msg_control = cmh,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 565) .msg_controllen = sizeof(buffer),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 566) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 567) unsigned int sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 568) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 569)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 570) svc_udp_release_rqst(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 571)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 572) svc_set_cmsg_data(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 573)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 574) mutex_lock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 575)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 576) if (svc_xprt_is_dead(xprt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 577) goto out_notconn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 578)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 579) err = xprt_sock_sendmsg(svsk->sk_sock, &msg, xdr, 0, 0, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 580) xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 581) if (err == -ECONNREFUSED) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 582) /* ICMP error on earlier request. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 583) err = xprt_sock_sendmsg(svsk->sk_sock, &msg, xdr, 0, 0, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 584) xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 585) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 586) trace_svcsock_udp_send(xprt, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 587)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 588) mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 589) if (err < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 590) return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 591) return sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 592)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 593) out_notconn:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 594) mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 595) return -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 596) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 597)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 598) static int svc_udp_has_wspace(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 599) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 600) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 601) struct svc_serv *serv = xprt->xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 602) unsigned long required;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 603)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 604) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 605) * Set the SOCK_NOSPACE flag before checking the available
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 606) * sock space.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 607) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 608) set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 609) required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 610) if (required*2 > sock_wspace(svsk->sk_sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 611) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 612) clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 613) return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 614) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 615)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 616) static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 617) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 618) BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 619) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 620) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 621)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 622) static void svc_udp_kill_temp_xprt(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 623) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 624) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 625)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 626) static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 627) struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 628) struct sockaddr *sa, int salen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 629) int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 630) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 631) return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 632) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 633)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 634) static const struct svc_xprt_ops svc_udp_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 635) .xpo_create = svc_udp_create,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 636) .xpo_recvfrom = svc_udp_recvfrom,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 637) .xpo_sendto = svc_udp_sendto,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 638) .xpo_read_payload = svc_sock_read_payload,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 639) .xpo_release_rqst = svc_udp_release_rqst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 640) .xpo_detach = svc_sock_detach,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 641) .xpo_free = svc_sock_free,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 642) .xpo_has_wspace = svc_udp_has_wspace,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 643) .xpo_accept = svc_udp_accept,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 644) .xpo_secure_port = svc_sock_secure_port,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 645) .xpo_kill_temp_xprt = svc_udp_kill_temp_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 646) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 647)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 648) static struct svc_xprt_class svc_udp_class = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 649) .xcl_name = "udp",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 650) .xcl_owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 651) .xcl_ops = &svc_udp_ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 652) .xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 653) .xcl_ident = XPRT_TRANSPORT_UDP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 654) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 655)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 656) static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 657) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 658) svc_xprt_init(sock_net(svsk->sk_sock->sk), &svc_udp_class,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 659) &svsk->sk_xprt, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 660) clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 661) svsk->sk_sk->sk_data_ready = svc_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 662) svsk->sk_sk->sk_write_space = svc_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 663)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 664) /* initialise setting must have enough space to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 665) * receive and respond to one request.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 666) * svc_udp_recvfrom will re-adjust if necessary
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 667) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 668) svc_sock_setbufsize(svsk, 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 669)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 670) /* data might have come in before data_ready set up */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 671) set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 672) set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 673)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 674) /* make sure we get destination address info */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 675) switch (svsk->sk_sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 676) case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 677) ip_sock_set_pktinfo(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 678) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 679) case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 680) ip6_sock_set_recvpktinfo(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 681) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 682) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 683) BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 684) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 685) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 686)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 687) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 688) * A data_ready event on a listening socket means there's a connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 689) * pending. Do not use state_change as a substitute for it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 690) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 691) static void svc_tcp_listen_data_ready(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 692) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 693) struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 694)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 695) if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 696) /* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 697) rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 698) svsk->sk_odata(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 699) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 700)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 701) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 702) * This callback may called twice when a new connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 703) * is established as a child socket inherits everything
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 704) * from a parent LISTEN socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 705) * 1) data_ready method of the parent socket will be called
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 706) * when one of child sockets become ESTABLISHED.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 707) * 2) data_ready method of the child socket may be called
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 708) * when it receives data before the socket is accepted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 709) * In case of 2, we should ignore it silently.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 710) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 711) if (sk->sk_state == TCP_LISTEN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 712) if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 713) set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 714) svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 715) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 716) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 717) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 718)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 719) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 720) * A state change on a connected socket means it's dying or dead.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 721) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 722) static void svc_tcp_state_change(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 723) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 724) struct svc_sock *svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 725)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 726) if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 727) /* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 728) rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 729) svsk->sk_ostate(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 730) trace_svcsock_tcp_state(&svsk->sk_xprt, svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 731) if (sk->sk_state != TCP_ESTABLISHED) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 732) set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 733) svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 734) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 735) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 736) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 737)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 738) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 739) * Accept a TCP connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 740) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 741) static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 742) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 743) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 744) struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 745) struct sockaddr *sin = (struct sockaddr *) &addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 746) struct svc_serv *serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 747) struct socket *sock = svsk->sk_sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 748) struct socket *newsock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 749) struct svc_sock *newsvsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 750) int err, slen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 751)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 752) if (!sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 753) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 754)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 755) clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 756) err = kernel_accept(sock, &newsock, O_NONBLOCK);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 757) if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 758) if (err == -ENOMEM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 759) printk(KERN_WARNING "%s: no more sockets!\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 760) serv->sv_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 761) else if (err != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 762) net_warn_ratelimited("%s: accept failed (err %d)!\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 763) serv->sv_name, -err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 764) trace_svcsock_accept_err(xprt, serv->sv_name, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 765) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 766) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 767) set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 768)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 769) err = kernel_getpeername(newsock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 770) if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 771) trace_svcsock_getpeername_err(xprt, serv->sv_name, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 772) goto failed; /* aborted connection or whatever */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 773) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 774) slen = err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 775)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 776) /* Reset the inherited callbacks before calling svc_setup_socket */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 777) newsock->sk->sk_state_change = svsk->sk_ostate;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 778) newsock->sk->sk_data_ready = svsk->sk_odata;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 779) newsock->sk->sk_write_space = svsk->sk_owspace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 780)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 781) /* make sure that a write doesn't block forever when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 782) * low on memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 783) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 784) newsock->sk->sk_sndtimeo = HZ*30;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 785)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 786) newsvsk = svc_setup_socket(serv, newsock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 787) (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 788) if (IS_ERR(newsvsk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 789) goto failed;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 790) svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 791) err = kernel_getsockname(newsock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 792) slen = err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 793) if (unlikely(err < 0))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 794) slen = offsetof(struct sockaddr, sa_data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 795) svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 796)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 797) if (sock_is_loopback(newsock->sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 798) set_bit(XPT_LOCAL, &newsvsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 799) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 800) clear_bit(XPT_LOCAL, &newsvsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 801) if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 802) serv->sv_stats->nettcpconn++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 803)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 804) return &newsvsk->sk_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 805)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 806) failed:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 807) sock_release(newsock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 808) return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 809) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 810)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 811) static size_t svc_tcp_restore_pages(struct svc_sock *svsk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 812) struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 813) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 814) size_t len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 815) unsigned int i, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 816)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 817) if (!len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 818) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 819) npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 820) for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 821) if (rqstp->rq_pages[i] != NULL)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 822) put_page(rqstp->rq_pages[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 823) BUG_ON(svsk->sk_pages[i] == NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 824) rqstp->rq_pages[i] = svsk->sk_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 825) svsk->sk_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 826) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 827) rqstp->rq_arg.head[0].iov_base = page_address(rqstp->rq_pages[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 828) return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 829) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 830)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 831) static void svc_tcp_save_pages(struct svc_sock *svsk, struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 832) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 833) unsigned int i, len, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 834)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 835) if (svsk->sk_datalen == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 836) return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 837) len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 838) npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 839) for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 840) svsk->sk_pages[i] = rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 841) rqstp->rq_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 842) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 843) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 844)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 845) static void svc_tcp_clear_pages(struct svc_sock *svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 846) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 847) unsigned int i, len, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 848)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 849) if (svsk->sk_datalen == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 850) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 851) len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 852) npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 853) for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 854) if (svsk->sk_pages[i] == NULL) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 855) WARN_ON_ONCE(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 856) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 857) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 858) put_page(svsk->sk_pages[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 859) svsk->sk_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 860) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 861) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 862) svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 863) svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 864) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 865)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 866) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 867) * Receive fragment record header into sk_marker.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 868) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 869) static ssize_t svc_tcp_read_marker(struct svc_sock *svsk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 870) struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 871) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 872) ssize_t want, len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 873)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 874) /* If we haven't gotten the record length yet,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 875) * get the next four bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 876) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 877) if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 878) struct msghdr msg = { NULL };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 879) struct kvec iov;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 880)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 881) want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 882) iov.iov_base = ((char *)&svsk->sk_marker) + svsk->sk_tcplen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 883) iov.iov_len = want;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 884) iov_iter_kvec(&msg.msg_iter, READ, &iov, 1, want);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 885) len = sock_recvmsg(svsk->sk_sock, &msg, MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 886) if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 887) return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 888) svsk->sk_tcplen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 889) if (len < want) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 890) /* call again to read the remaining bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 891) goto err_short;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 892) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 893) trace_svcsock_marker(&svsk->sk_xprt, svsk->sk_marker);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 894) if (svc_sock_reclen(svsk) + svsk->sk_datalen >
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 895) svsk->sk_xprt.xpt_server->sv_max_mesg)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 896) goto err_too_large;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 897) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 898) return svc_sock_reclen(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 899)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 900) err_too_large:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 901) net_notice_ratelimited("svc: %s %s RPC fragment too large: %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 902) __func__, svsk->sk_xprt.xpt_server->sv_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 903) svc_sock_reclen(svsk));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 904) set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 905) err_short:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 906) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 907) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 908)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 909) static int receive_cb_reply(struct svc_sock *svsk, struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 910) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 911) struct rpc_xprt *bc_xprt = svsk->sk_xprt.xpt_bc_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 912) struct rpc_rqst *req = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 913) struct kvec *src, *dst;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 914) __be32 *p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 915) __be32 xid;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 916) __be32 calldir;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 917)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 918) xid = *p++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 919) calldir = *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 920)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 921) if (!bc_xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 922) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 923) spin_lock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 924) req = xprt_lookup_rqst(bc_xprt, xid);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 925) if (!req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 926) goto unlock_notfound;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 927)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 928) memcpy(&req->rq_private_buf, &req->rq_rcv_buf, sizeof(struct xdr_buf));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 929) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 930) * XXX!: cheating for now! Only copying HEAD.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 931) * But we know this is good enough for now (in fact, for any
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 932) * callback reply in the forseeable future).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 933) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 934) dst = &req->rq_private_buf.head[0];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 935) src = &rqstp->rq_arg.head[0];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 936) if (dst->iov_len < src->iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 937) goto unlock_eagain; /* whatever; just giving up. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 938) memcpy(dst->iov_base, src->iov_base, src->iov_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 939) xprt_complete_rqst(req->rq_task, rqstp->rq_arg.len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 940) rqstp->rq_arg.len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 941) spin_unlock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 942) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 943) unlock_notfound:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 944) printk(KERN_NOTICE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 945) "%s: Got unrecognized reply: "
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 946) "calldir 0x%x xpt_bc_xprt %p xid %08x\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 947) __func__, ntohl(calldir),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 948) bc_xprt, ntohl(xid));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 949) unlock_eagain:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 950) spin_unlock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 951) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 952) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 953)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 954) static void svc_tcp_fragment_received(struct svc_sock *svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 955) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 956) /* If we have more data, signal svc_xprt_enqueue() to try again */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 957) svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 958) svsk->sk_marker = xdr_zero;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 959) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 960)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 961) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 962) * svc_tcp_recvfrom - Receive data from a TCP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 963) * @rqstp: request structure into which to receive an RPC Call
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 964) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 965) * Called in a loop when XPT_DATA has been set.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 966) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 967) * Read the 4-byte stream record marker, then use the record length
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 968) * in that marker to set up exactly the resources needed to receive
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 969) * the next RPC message into @rqstp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 970) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 971) * Returns:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 972) * On success, the number of bytes in a received RPC Call, or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 973) * %0 if a complete RPC Call message was not ready to return
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 974) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 975) * The zero return case handles partial receives and callback Replies.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 976) * The state of a partial receive is preserved in the svc_sock for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 977) * the next call to svc_tcp_recvfrom.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 978) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 979) static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 980) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 981) struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 982) container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 983) struct svc_serv *serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 984) size_t want, base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 985) ssize_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 986) __be32 *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 987) __be32 calldir;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 988)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 989) clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 990) len = svc_tcp_read_marker(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 991) if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 992) goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 993)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 994) base = svc_tcp_restore_pages(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 995) want = len - (svsk->sk_tcplen - sizeof(rpc_fraghdr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 996) len = svc_tcp_read_msg(rqstp, base + want, base);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 997) if (len >= 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 998) trace_svcsock_tcp_recv(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 999) svsk->sk_tcplen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1000) svsk->sk_datalen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1001) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1002) if (len != want || !svc_sock_final_rec(svsk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1003) goto err_incomplete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1004) if (svsk->sk_datalen < 8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1005) goto err_nuts;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1006)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1007) rqstp->rq_arg.len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1008) rqstp->rq_arg.page_base = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1009) if (rqstp->rq_arg.len <= rqstp->rq_arg.head[0].iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1010) rqstp->rq_arg.head[0].iov_len = rqstp->rq_arg.len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1011) rqstp->rq_arg.page_len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1012) } else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1013) rqstp->rq_arg.page_len = rqstp->rq_arg.len - rqstp->rq_arg.head[0].iov_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1014)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1015) rqstp->rq_xprt_ctxt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1016) rqstp->rq_prot = IPPROTO_TCP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1017) if (test_bit(XPT_LOCAL, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1018) set_bit(RQ_LOCAL, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1019) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1020) clear_bit(RQ_LOCAL, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1021)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1022) p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1023) calldir = p[1];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1024) if (calldir)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1025) len = receive_cb_reply(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1026)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1027) /* Reset TCP read info */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1028) svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1029) svc_tcp_fragment_received(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1030)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1031) if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1032) goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1033)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1034) svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1035) if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1036) serv->sv_stats->nettcpcnt++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1037)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1038) return rqstp->rq_arg.len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1039)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1040) err_incomplete:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1041) svc_tcp_save_pages(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1042) if (len < 0 && len != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1043) goto err_delete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1044) if (len == want)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1045) svc_tcp_fragment_received(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1046) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1047) trace_svcsock_tcp_recv_short(&svsk->sk_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1048) svc_sock_reclen(svsk),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1049) svsk->sk_tcplen - sizeof(rpc_fraghdr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1050) goto err_noclose;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1051) error:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1052) if (len != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1053) goto err_delete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1054) trace_svcsock_tcp_recv_eagain(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1055) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1056) err_nuts:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1057) svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1058) err_delete:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1059) trace_svcsock_tcp_recv_err(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1060) set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1061) err_noclose:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1062) return 0; /* record not complete */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1063) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1064)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1065) static int svc_tcp_send_kvec(struct socket *sock, const struct kvec *vec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1066) int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1067) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1068) return kernel_sendpage(sock, virt_to_page(vec->iov_base),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1069) offset_in_page(vec->iov_base),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1070) vec->iov_len, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1071) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1072)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1073) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1074) * kernel_sendpage() is used exclusively to reduce the number of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1075) * copy operations in this path. Therefore the caller must ensure
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1076) * that the pages backing @xdr are unchanging.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1077) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1078) * In addition, the logic assumes that * .bv_len is never larger
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1079) * than PAGE_SIZE.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1080) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1081) static int svc_tcp_sendmsg(struct socket *sock, struct msghdr *msg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1082) struct xdr_buf *xdr, rpc_fraghdr marker,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1083) unsigned int *sentp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1084) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1085) const struct kvec *head = xdr->head;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1086) const struct kvec *tail = xdr->tail;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1087) struct kvec rm = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1088) .iov_base = &marker,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1089) .iov_len = sizeof(marker),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1090) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1091) int flags, ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1092)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1093) *sentp = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1094) xdr_alloc_bvec(xdr, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1095)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1096) msg->msg_flags = MSG_MORE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1097) ret = kernel_sendmsg(sock, msg, &rm, 1, rm.iov_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1098) if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1099) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1100) *sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1101) if (ret != rm.iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1102) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1103)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1104) flags = head->iov_len < xdr->len ? MSG_MORE | MSG_SENDPAGE_NOTLAST : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1105) ret = svc_tcp_send_kvec(sock, head, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1106) if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1107) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1108) *sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1109) if (ret != head->iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1110) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1111)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1112) if (xdr->page_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1113) unsigned int offset, len, remaining;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1114) struct bio_vec *bvec;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1115)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1116) bvec = xdr->bvec + (xdr->page_base >> PAGE_SHIFT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1117) offset = offset_in_page(xdr->page_base);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1118) remaining = xdr->page_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1119) flags = MSG_MORE | MSG_SENDPAGE_NOTLAST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1120) while (remaining > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1121) if (remaining <= PAGE_SIZE && tail->iov_len == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1122) flags = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1123)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1124) len = min(remaining, bvec->bv_len - offset);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1125) ret = kernel_sendpage(sock, bvec->bv_page,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1126) bvec->bv_offset + offset,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1127) len, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1128) if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1129) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1130) *sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1131) if (ret != len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1132) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1133) remaining -= len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1134) offset = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1135) bvec++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1136) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1137) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1138)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1139) if (tail->iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1140) ret = svc_tcp_send_kvec(sock, tail, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1141) if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1142) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1143) *sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1144) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1145)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1146) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1147) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1148) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1149)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1150) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1151) * svc_tcp_sendto - Send out a reply on a TCP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1152) * @rqstp: completed svc_rqst
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1153) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1154) * xpt_mutex ensures @rqstp's whole message is written to the socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1155) * without interruption.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1156) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1157) * Returns the number of bytes sent, or a negative errno.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1158) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1159) static int svc_tcp_sendto(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1160) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1161) struct svc_xprt *xprt = rqstp->rq_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1162) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1163) struct xdr_buf *xdr = &rqstp->rq_res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1164) rpc_fraghdr marker = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1165) (u32)xdr->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1166) struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1167) .msg_flags = 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1168) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1169) unsigned int sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1170) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1171)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1172) svc_tcp_release_rqst(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1173)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1174) mutex_lock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1175) if (svc_xprt_is_dead(xprt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1176) goto out_notconn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1177) err = svc_tcp_sendmsg(svsk->sk_sock, &msg, xdr, marker, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1178) xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1179) trace_svcsock_tcp_send(xprt, err < 0 ? (long)err : sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1180) if (err < 0 || sent != (xdr->len + sizeof(marker)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1181) goto out_close;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1182) mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1183) return sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1184)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1185) out_notconn:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1186) mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1187) return -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1188) out_close:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1189) pr_notice("rpc-srv/tcp: %s: %s %d when sending %d bytes - shutting down socket\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1190) xprt->xpt_server->sv_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1191) (err < 0) ? "got error" : "sent",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1192) (err < 0) ? err : sent, xdr->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1193) set_bit(XPT_CLOSE, &xprt->xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1194) svc_xprt_enqueue(xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1195) mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1196) return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1197) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1198)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1199) static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1200) struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1201) struct sockaddr *sa, int salen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1202) int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1203) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1204) return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1205) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1206)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1207) static const struct svc_xprt_ops svc_tcp_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1208) .xpo_create = svc_tcp_create,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1209) .xpo_recvfrom = svc_tcp_recvfrom,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1210) .xpo_sendto = svc_tcp_sendto,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1211) .xpo_read_payload = svc_sock_read_payload,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1212) .xpo_release_rqst = svc_tcp_release_rqst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1213) .xpo_detach = svc_tcp_sock_detach,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1214) .xpo_free = svc_sock_free,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1215) .xpo_has_wspace = svc_tcp_has_wspace,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1216) .xpo_accept = svc_tcp_accept,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1217) .xpo_secure_port = svc_sock_secure_port,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1218) .xpo_kill_temp_xprt = svc_tcp_kill_temp_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1219) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1220)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1221) static struct svc_xprt_class svc_tcp_class = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1222) .xcl_name = "tcp",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1223) .xcl_owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1224) .xcl_ops = &svc_tcp_ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1225) .xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1226) .xcl_ident = XPRT_TRANSPORT_TCP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1227) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1228)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1229) void svc_init_xprt_sock(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1230) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1231) svc_reg_xprt_class(&svc_tcp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1232) svc_reg_xprt_class(&svc_udp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1233) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1234)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1235) void svc_cleanup_xprt_sock(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1236) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1237) svc_unreg_xprt_class(&svc_tcp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1238) svc_unreg_xprt_class(&svc_udp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1239) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1240)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1241) static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1242) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1243) struct sock *sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1244)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1245) svc_xprt_init(sock_net(svsk->sk_sock->sk), &svc_tcp_class,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1246) &svsk->sk_xprt, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1247) set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1248) set_bit(XPT_CONG_CTRL, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1249) if (sk->sk_state == TCP_LISTEN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1250) strcpy(svsk->sk_xprt.xpt_remotebuf, "listener");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1251) set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1252) sk->sk_data_ready = svc_tcp_listen_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1253) set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1254) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1255) sk->sk_state_change = svc_tcp_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1256) sk->sk_data_ready = svc_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1257) sk->sk_write_space = svc_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1258)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1259) svsk->sk_marker = xdr_zero;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1260) svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1261) svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1262) memset(&svsk->sk_pages[0], 0, sizeof(svsk->sk_pages));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1263)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1264) tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1265)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1266) set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1267) switch (sk->sk_state) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1268) case TCP_SYN_RECV:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1269) case TCP_ESTABLISHED:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1270) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1271) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1272) set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1273) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1274) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1275) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1276)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1277) void svc_sock_update_bufs(struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1278) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1279) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1280) * The number of server threads has changed. Update
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1281) * rcvbuf and sndbuf accordingly on all sockets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1282) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1283) struct svc_sock *svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1284)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1285) spin_lock_bh(&serv->sv_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1286) list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1287) set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1288) spin_unlock_bh(&serv->sv_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1289) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1290) EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1291)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1292) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1293) * Initialize socket for RPC use and create svc_sock struct
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1294) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1295) static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1296) struct socket *sock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1297) int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1298) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1299) struct svc_sock *svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1300) struct sock *inet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1301) int pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1302) int err = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1303)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1304) svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1305) if (!svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1306) return ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1307)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1308) inet = sock->sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1309)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1310) /* Register socket with portmapper */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1311) if (pmap_register)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1312) err = svc_register(serv, sock_net(sock->sk), inet->sk_family,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1313) inet->sk_protocol,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1314) ntohs(inet_sk(inet)->inet_sport));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1315)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1316) if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1317) kfree(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1318) return ERR_PTR(err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1319) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1320)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1321) svsk->sk_sock = sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1322) svsk->sk_sk = inet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1323) svsk->sk_ostate = inet->sk_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1324) svsk->sk_odata = inet->sk_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1325) svsk->sk_owspace = inet->sk_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1326) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1327) * This barrier is necessary in order to prevent race condition
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1328) * with svc_data_ready(), svc_listen_data_ready() and others
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1329) * when calling callbacks above.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1330) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1331) wmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1332) inet->sk_user_data = svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1333)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1334) /* Initialize the socket */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1335) if (sock->type == SOCK_DGRAM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1336) svc_udp_init(svsk, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1337) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1338) svc_tcp_init(svsk, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1339)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1340) trace_svcsock_new_socket(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1341) return svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1342) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1343)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1344) bool svc_alien_sock(struct net *net, int fd)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1345) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1346) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1347) struct socket *sock = sockfd_lookup(fd, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1348) bool ret = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1349)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1350) if (!sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1351) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1352) if (sock_net(sock->sk) != net)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1353) ret = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1354) sockfd_put(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1355) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1356) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1357) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1358) EXPORT_SYMBOL_GPL(svc_alien_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1359)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1360) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1361) * svc_addsock - add a listener socket to an RPC service
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1362) * @serv: pointer to RPC service to which to add a new listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1363) * @fd: file descriptor of the new listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1364) * @name_return: pointer to buffer to fill in with name of listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1365) * @len: size of the buffer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1366) * @cred: credential
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1367) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1368) * Fills in socket name and returns positive length of name if successful.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1369) * Name is terminated with '\n'. On error, returns a negative errno
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1370) * value.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1371) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1372) int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1373) const size_t len, const struct cred *cred)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1374) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1375) int err = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1376) struct socket *so = sockfd_lookup(fd, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1377) struct svc_sock *svsk = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1378) struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1379) struct sockaddr *sin = (struct sockaddr *)&addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1380) int salen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1381)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1382) if (!so)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1383) return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1384) err = -EAFNOSUPPORT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1385) if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1386) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1387) err = -EPROTONOSUPPORT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1388) if (so->sk->sk_protocol != IPPROTO_TCP &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1389) so->sk->sk_protocol != IPPROTO_UDP)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1390) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1391) err = -EISCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1392) if (so->state > SS_UNCONNECTED)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1393) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1394) err = -ENOENT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1395) if (!try_module_get(THIS_MODULE))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1396) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1397) svsk = svc_setup_socket(serv, so, SVC_SOCK_DEFAULTS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1398) if (IS_ERR(svsk)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1399) module_put(THIS_MODULE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1400) err = PTR_ERR(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1401) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1402) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1403) salen = kernel_getsockname(svsk->sk_sock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1404) if (salen >= 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1405) svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1406) svsk->sk_xprt.xpt_cred = get_cred(cred);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1407) svc_add_new_perm_xprt(serv, &svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1408) return svc_one_sock_name(svsk, name_return, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1409) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1410) sockfd_put(so);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1411) return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1412) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1413) EXPORT_SYMBOL_GPL(svc_addsock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1414)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1415) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1416) * Create socket for RPC service.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1417) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1418) static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1419) int protocol,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1420) struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1421) struct sockaddr *sin, int len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1422) int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1423) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1424) struct svc_sock *svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1425) struct socket *sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1426) int error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1427) int type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1428) struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1429) struct sockaddr *newsin = (struct sockaddr *)&addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1430) int newlen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1431) int family;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1432)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1433) if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1434) printk(KERN_WARNING "svc: only UDP and TCP "
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1435) "sockets supported\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1436) return ERR_PTR(-EINVAL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1437) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1438)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1439) type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1440) switch (sin->sa_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1441) case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1442) family = PF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1443) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1444) case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1445) family = PF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1446) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1447) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1448) return ERR_PTR(-EINVAL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1449) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1450)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1451) error = __sock_create(net, family, type, protocol, &sock, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1452) if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1453) return ERR_PTR(error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1454)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1455) svc_reclassify_socket(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1456)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1457) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1458) * If this is an PF_INET6 listener, we want to avoid
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1459) * getting requests from IPv4 remotes. Those should
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1460) * be shunted to a PF_INET listener via rpcbind.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1461) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1462) if (family == PF_INET6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1463) ip6_sock_set_v6only(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1464) if (type == SOCK_STREAM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1465) sock->sk->sk_reuse = SK_CAN_REUSE; /* allow address reuse */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1466) error = kernel_bind(sock, sin, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1467) if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1468) goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1469)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1470) error = kernel_getsockname(sock, newsin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1471) if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1472) goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1473) newlen = error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1474)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1475) if (protocol == IPPROTO_TCP) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1476) if ((error = kernel_listen(sock, 64)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1477) goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1478) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1479)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1480) svsk = svc_setup_socket(serv, sock, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1481) if (IS_ERR(svsk)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1482) error = PTR_ERR(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1483) goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1484) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1485) svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1486) return (struct svc_xprt *)svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1487) bummer:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1488) sock_release(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1489) return ERR_PTR(error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1490) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1491)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1492) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1493) * Detach the svc_sock from the socket so that no
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1494) * more callbacks occur.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1495) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1496) static void svc_sock_detach(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1497) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1498) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1499) struct sock *sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1500)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1501) /* put back the old socket callbacks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1502) lock_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1503) sk->sk_state_change = svsk->sk_ostate;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1504) sk->sk_data_ready = svsk->sk_odata;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1505) sk->sk_write_space = svsk->sk_owspace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1506) sk->sk_user_data = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1507) release_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1508) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1509)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1510) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1511) * Disconnect the socket, and reset the callbacks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1512) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1513) static void svc_tcp_sock_detach(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1514) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1515) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1516)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1517) svc_sock_detach(xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1518)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1519) if (!test_bit(XPT_LISTENER, &xprt->xpt_flags)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1520) svc_tcp_clear_pages(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1521) kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1522) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1523) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1524)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1525) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1526) * Free the svc_sock's socket resources and the svc_sock itself.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1527) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1528) static void svc_sock_free(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1529) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1530) struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1531)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1532) if (svsk->sk_sock->file)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1533) sockfd_put(svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1534) else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1535) sock_release(svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1536) kfree(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1537) }