Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    1) // SPDX-License-Identifier: GPL-2.0-only
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    2) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    3)  * linux/net/sunrpc/svcsock.c
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    4)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    5)  * These are the RPC server socket internals.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    6)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    7)  * The server scheduling algorithm does not always distribute the load
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    8)  * evenly when servicing a single client. May need to modify the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300    9)  * svc_xprt_enqueue procedure...
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   10)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   11)  * TCP support is largely untested and may be a little slow. The problem
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   12)  * is that we currently do two separate recvfrom's, one for the 4-byte
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   13)  * record length, and the second for the actual record. This could possibly
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   14)  * be improved by always reading a minimum size of around 100 bytes and
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   15)  * tucking any superfluous bytes away in a temporary store. Still, that
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   16)  * leaves write requests out in the rain. An alternative may be to peek at
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   17)  * the first skb in the queue, and if it matches the next TCP sequence
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   18)  * number, to extract the record marker. Yuck.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   19)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   20)  * Copyright (C) 1995, 1996 Olaf Kirch <okir@monad.swb.de>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   21)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   22) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   23) #include <linux/kernel.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   24) #include <linux/sched.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   25) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   26) #include <linux/errno.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   27) #include <linux/fcntl.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   28) #include <linux/net.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   29) #include <linux/in.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   30) #include <linux/inet.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   31) #include <linux/udp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   32) #include <linux/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   33) #include <linux/unistd.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   34) #include <linux/slab.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   35) #include <linux/netdevice.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   36) #include <linux/skbuff.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   37) #include <linux/file.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   38) #include <linux/freezer.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   39) #include <net/sock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   40) #include <net/checksum.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   41) #include <net/ip.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   42) #include <net/ipv6.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   43) #include <net/udp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   44) #include <net/tcp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   45) #include <net/tcp_states.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   46) #include <linux/uaccess.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   47) #include <linux/highmem.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   48) #include <asm/ioctls.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   49) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   50) #include <linux/sunrpc/types.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   51) #include <linux/sunrpc/clnt.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   52) #include <linux/sunrpc/xdr.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   53) #include <linux/sunrpc/msg_prot.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   54) #include <linux/sunrpc/svcsock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   55) #include <linux/sunrpc/stats.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   56) #include <linux/sunrpc/xprt.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   57) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   58) #include <trace/events/sunrpc.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   59) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   60) #include "socklib.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   61) #include "sunrpc.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   62) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   63) #define RPCDBG_FACILITY	RPCDBG_SVCXPRT
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   64) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   65) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   66) static struct svc_sock *svc_setup_socket(struct svc_serv *, struct socket *,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   67) 					 int flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   68) static int		svc_udp_recvfrom(struct svc_rqst *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   69) static int		svc_udp_sendto(struct svc_rqst *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   70) static void		svc_sock_detach(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   71) static void		svc_tcp_sock_detach(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   72) static void		svc_sock_free(struct svc_xprt *);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   73) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   74) static struct svc_xprt *svc_create_socket(struct svc_serv *, int,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   75) 					  struct net *, struct sockaddr *,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   76) 					  int, int);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   77) #ifdef CONFIG_DEBUG_LOCK_ALLOC
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   78) static struct lock_class_key svc_key[2];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   79) static struct lock_class_key svc_slock_key[2];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   80) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   81) static void svc_reclassify_socket(struct socket *sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   82) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   83) 	struct sock *sk = sock->sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   84) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   85) 	if (WARN_ON_ONCE(!sock_allow_reclassification(sk)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   86) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   87) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   88) 	switch (sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   89) 	case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   90) 		sock_lock_init_class_and_name(sk, "slock-AF_INET-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   91) 					      &svc_slock_key[0],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   92) 					      "sk_xprt.xpt_lock-AF_INET-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   93) 					      &svc_key[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   94) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   95) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   96) 	case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   97) 		sock_lock_init_class_and_name(sk, "slock-AF_INET6-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   98) 					      &svc_slock_key[1],
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300   99) 					      "sk_xprt.xpt_lock-AF_INET6-NFSD",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  100) 					      &svc_key[1]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  101) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  102) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  103) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  104) 		BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  105) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  106) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  107) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  108) static void svc_reclassify_socket(struct socket *sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  109) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  110) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  111) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  112) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  113) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  114)  * svc_tcp_release_rqst - Release transport-related resources
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  115)  * @rqstp: request structure with resources to be released
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  116)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  117)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  118) static void svc_tcp_release_rqst(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  119) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  120) 	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  121) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  122) 	if (skb) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  123) 		struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  124) 			container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  125) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  126) 		rqstp->rq_xprt_ctxt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  127) 		skb_free_datagram_locked(svsk->sk_sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  128) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  129) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  130) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  131) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  132)  * svc_udp_release_rqst - Release transport-related resources
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  133)  * @rqstp: request structure with resources to be released
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  134)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  135)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  136) static void svc_udp_release_rqst(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  137) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  138) 	struct sk_buff *skb = rqstp->rq_xprt_ctxt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  139) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  140) 	if (skb) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  141) 		rqstp->rq_xprt_ctxt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  142) 		consume_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  143) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  144) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  145) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  146) union svc_pktinfo_u {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  147) 	struct in_pktinfo pkti;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  148) 	struct in6_pktinfo pkti6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  149) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  150) #define SVC_PKTINFO_SPACE \
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  151) 	CMSG_SPACE(sizeof(union svc_pktinfo_u))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  152) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  153) static void svc_set_cmsg_data(struct svc_rqst *rqstp, struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  154) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  155) 	struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  156) 		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  157) 	switch (svsk->sk_sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  158) 	case AF_INET: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  159) 			struct in_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  160) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  161) 			cmh->cmsg_level = SOL_IP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  162) 			cmh->cmsg_type = IP_PKTINFO;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  163) 			pki->ipi_ifindex = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  164) 			pki->ipi_spec_dst.s_addr =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  165) 				 svc_daddr_in(rqstp)->sin_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  166) 			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  167) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  168) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  169) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  170) 	case AF_INET6: {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  171) 			struct in6_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  172) 			struct sockaddr_in6 *daddr = svc_daddr_in6(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  173) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  174) 			cmh->cmsg_level = SOL_IPV6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  175) 			cmh->cmsg_type = IPV6_PKTINFO;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  176) 			pki->ipi6_ifindex = daddr->sin6_scope_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  177) 			pki->ipi6_addr = daddr->sin6_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  178) 			cmh->cmsg_len = CMSG_LEN(sizeof(*pki));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  179) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  180) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  181) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  182) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  183) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  184) static int svc_sock_read_payload(struct svc_rqst *rqstp, unsigned int offset,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  185) 				 unsigned int length)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  186) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  187) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  188) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  189) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  190) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  191)  * Report socket names for nfsdfs
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  192)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  193) static int svc_one_sock_name(struct svc_sock *svsk, char *buf, int remaining)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  194) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  195) 	const struct sock *sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  196) 	const char *proto_name = sk->sk_protocol == IPPROTO_UDP ?
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  197) 							"udp" : "tcp";
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  198) 	int len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  199) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  200) 	switch (sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  201) 	case PF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  202) 		len = snprintf(buf, remaining, "ipv4 %s %pI4 %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  203) 				proto_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  204) 				&inet_sk(sk)->inet_rcv_saddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  205) 				inet_sk(sk)->inet_num);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  206) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  207) #if IS_ENABLED(CONFIG_IPV6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  208) 	case PF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  209) 		len = snprintf(buf, remaining, "ipv6 %s %pI6 %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  210) 				proto_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  211) 				&sk->sk_v6_rcv_saddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  212) 				inet_sk(sk)->inet_num);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  213) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  214) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  215) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  216) 		len = snprintf(buf, remaining, "*unknown-%d*\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  217) 				sk->sk_family);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  218) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  219) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  220) 	if (len >= remaining) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  221) 		*buf = '\0';
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  222) 		return -ENAMETOOLONG;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  223) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  224) 	return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  225) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  226) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  227) #if ARCH_IMPLEMENTS_FLUSH_DCACHE_PAGE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  228) static void svc_flush_bvec(const struct bio_vec *bvec, size_t size, size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  229) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  230) 	struct bvec_iter bi = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  231) 		.bi_size	= size + seek,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  232) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  233) 	struct bio_vec bv;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  234) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  235) 	bvec_iter_advance(bvec, &bi, seek & PAGE_MASK);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  236) 	for_each_bvec(bv, bvec, bi, bi)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  237) 		flush_dcache_page(bv.bv_page);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  238) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  239) #else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  240) static inline void svc_flush_bvec(const struct bio_vec *bvec, size_t size,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  241) 				  size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  242) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  243) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  244) #endif
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  245) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  246) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  247)  * Read from @rqstp's transport socket. The incoming message fills whole
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  248)  * pages in @rqstp's rq_pages array until the last page of the message
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  249)  * has been received into a partial page.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  250)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  251) static ssize_t svc_tcp_read_msg(struct svc_rqst *rqstp, size_t buflen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  252) 				size_t seek)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  253) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  254) 	struct svc_sock *svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  255) 		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  256) 	struct bio_vec *bvec = rqstp->rq_bvec;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  257) 	struct msghdr msg = { NULL };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  258) 	unsigned int i;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  259) 	ssize_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  260) 	size_t t;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  261) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  262) 	rqstp->rq_xprt_hlen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  263) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  264) 	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  265) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  266) 	for (i = 0, t = 0; t < buflen; i++, t += PAGE_SIZE) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  267) 		bvec[i].bv_page = rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  268) 		bvec[i].bv_len = PAGE_SIZE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  269) 		bvec[i].bv_offset = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  270) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  271) 	rqstp->rq_respages = &rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  272) 	rqstp->rq_next_page = rqstp->rq_respages + 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  273) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  274) 	iov_iter_bvec(&msg.msg_iter, READ, bvec, i, buflen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  275) 	if (seek) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  276) 		iov_iter_advance(&msg.msg_iter, seek);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  277) 		buflen -= seek;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  278) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  279) 	len = sock_recvmsg(svsk->sk_sock, &msg, MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  280) 	if (len > 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  281) 		svc_flush_bvec(bvec, len, seek);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  282) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  283) 	/* If we read a full record, then assume there may be more
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  284) 	 * data to read (stream based sockets only!)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  285) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  286) 	if (len == buflen)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  287) 		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  288) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  289) 	return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  290) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  291) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  292) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  293)  * Set socket snd and rcv buffer lengths
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  294)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  295) static void svc_sock_setbufsize(struct svc_sock *svsk, unsigned int nreqs)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  296) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  297) 	unsigned int max_mesg = svsk->sk_xprt.xpt_server->sv_max_mesg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  298) 	struct socket *sock = svsk->sk_sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  299) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  300) 	nreqs = min(nreqs, INT_MAX / 2 / max_mesg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  301) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  302) 	lock_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  303) 	sock->sk->sk_sndbuf = nreqs * max_mesg * 2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  304) 	sock->sk->sk_rcvbuf = nreqs * max_mesg * 2;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  305) 	sock->sk->sk_write_space(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  306) 	release_sock(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  307) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  308) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  309) static void svc_sock_secure_port(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  310) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  311) 	if (svc_port_is_privileged(svc_addr(rqstp)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  312) 		set_bit(RQ_SECURE, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  313) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  314) 		clear_bit(RQ_SECURE, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  315) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  316) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  317) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  318)  * INET callback when data has been received on the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  319)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  320) static void svc_data_ready(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  321) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  322) 	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  323) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  324) 	if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  325) 		/* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  326) 		rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  327) 		svsk->sk_odata(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  328) 		trace_svcsock_data_ready(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  329) 		if (!test_and_set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  330) 			svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  331) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  332) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  333) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  334) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  335)  * INET callback when space is newly available on the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  336)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  337) static void svc_write_space(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  338) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  339) 	struct svc_sock	*svsk = (struct svc_sock *)(sk->sk_user_data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  340) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  341) 	if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  342) 		/* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  343) 		rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  344) 		trace_svcsock_write_space(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  345) 		svsk->sk_owspace(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  346) 		svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  347) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  348) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  349) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  350) static int svc_tcp_has_wspace(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  351) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  352) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  353) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  354) 	if (test_bit(XPT_LISTENER, &xprt->xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  355) 		return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  356) 	return !test_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  357) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  358) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  359) static void svc_tcp_kill_temp_xprt(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  360) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  361) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  362) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  363) 	sock_no_linger(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  364) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  365) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  366) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  367)  * See net/ipv6/ip_sockglue.c : ip_cmsg_recv_pktinfo
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  368)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  369) static int svc_udp_get_dest_address4(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  370) 				     struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  371) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  372) 	struct in_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  373) 	struct sockaddr_in *daddr = svc_daddr_in(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  374) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  375) 	if (cmh->cmsg_type != IP_PKTINFO)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  376) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  377) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  378) 	daddr->sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  379) 	daddr->sin_addr.s_addr = pki->ipi_spec_dst.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  380) 	return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  381) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  382) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  383) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  384)  * See net/ipv6/datagram.c : ip6_datagram_recv_ctl
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  385)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  386) static int svc_udp_get_dest_address6(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  387) 				     struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  388) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  389) 	struct in6_pktinfo *pki = CMSG_DATA(cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  390) 	struct sockaddr_in6 *daddr = svc_daddr_in6(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  391) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  392) 	if (cmh->cmsg_type != IPV6_PKTINFO)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  393) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  394) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  395) 	daddr->sin6_family = AF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  396) 	daddr->sin6_addr = pki->ipi6_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  397) 	daddr->sin6_scope_id = pki->ipi6_ifindex;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  398) 	return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  399) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  400) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  401) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  402)  * Copy the UDP datagram's destination address to the rqstp structure.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  403)  * The 'destination' address in this case is the address to which the
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  404)  * peer sent the datagram, i.e. our local address. For multihomed
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  405)  * hosts, this can change from msg to msg. Note that only the IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  406)  * address changes, the port number should remain the same.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  407)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  408) static int svc_udp_get_dest_address(struct svc_rqst *rqstp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  409) 				    struct cmsghdr *cmh)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  410) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  411) 	switch (cmh->cmsg_level) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  412) 	case SOL_IP:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  413) 		return svc_udp_get_dest_address4(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  414) 	case SOL_IPV6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  415) 		return svc_udp_get_dest_address6(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  416) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  417) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  418) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  419) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  420) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  421) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  422)  * svc_udp_recvfrom - Receive a datagram from a UDP socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  423)  * @rqstp: request structure into which to receive an RPC Call
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  424)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  425)  * Called in a loop when XPT_DATA has been set.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  426)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  427)  * Returns:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  428)  *   On success, the number of bytes in a received RPC Call, or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  429)  *   %0 if a complete RPC Call message was not ready to return
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  430)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  431) static int svc_udp_recvfrom(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  432) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  433) 	struct svc_sock	*svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  434) 		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  435) 	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  436) 	struct sk_buff	*skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  437) 	union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  438) 		struct cmsghdr	hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  439) 		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  440) 	} buffer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  441) 	struct cmsghdr *cmh = &buffer.hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  442) 	struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  443) 		.msg_name = svc_addr(rqstp),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  444) 		.msg_control = cmh,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  445) 		.msg_controllen = sizeof(buffer),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  446) 		.msg_flags = MSG_DONTWAIT,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  447) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  448) 	size_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  449) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  450) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  451) 	if (test_and_clear_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  452) 	    /* udp sockets need large rcvbuf as all pending
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  453) 	     * requests are still in that buffer.  sndbuf must
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  454) 	     * also be large enough that there is enough space
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  455) 	     * for one reply per thread.  We count all threads
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  456) 	     * rather than threads in a particular pool, which
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  457) 	     * provides an upper bound on the number of threads
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  458) 	     * which will access the socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  459) 	     */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  460) 	    svc_sock_setbufsize(svsk, serv->sv_nrthreads + 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  461) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  462) 	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  463) 	err = kernel_recvmsg(svsk->sk_sock, &msg, NULL,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  464) 			     0, 0, MSG_PEEK | MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  465) 	if (err < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  466) 		goto out_recv_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  467) 	skb = skb_recv_udp(svsk->sk_sk, 0, 1, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  468) 	if (!skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  469) 		goto out_recv_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  470) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  471) 	len = svc_addr_len(svc_addr(rqstp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  472) 	rqstp->rq_addrlen = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  473) 	if (skb->tstamp == 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  474) 		skb->tstamp = ktime_get_real();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  475) 		/* Don't enable netstamp, sunrpc doesn't
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  476) 		   need that much accuracy */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  477) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  478) 	sock_write_timestamp(svsk->sk_sk, skb->tstamp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  479) 	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags); /* there may be more data... */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  480) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  481) 	len = skb->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  482) 	rqstp->rq_arg.len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  483) 	trace_svcsock_udp_recv(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  484) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  485) 	rqstp->rq_prot = IPPROTO_UDP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  486) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  487) 	if (!svc_udp_get_dest_address(rqstp, cmh))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  488) 		goto out_cmsg_err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  489) 	rqstp->rq_daddrlen = svc_addr_len(svc_daddr(rqstp));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  490) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  491) 	if (skb_is_nonlinear(skb)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  492) 		/* we have to copy */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  493) 		local_bh_disable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  494) 		if (csum_partial_copy_to_xdr(&rqstp->rq_arg, skb))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  495) 			goto out_bh_enable;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  496) 		local_bh_enable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  497) 		consume_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  498) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  499) 		/* we can use it in-place */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  500) 		rqstp->rq_arg.head[0].iov_base = skb->data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  501) 		rqstp->rq_arg.head[0].iov_len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  502) 		if (skb_checksum_complete(skb))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  503) 			goto out_free;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  504) 		rqstp->rq_xprt_ctxt = skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  505) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  506) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  507) 	rqstp->rq_arg.page_base = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  508) 	if (len <= rqstp->rq_arg.head[0].iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  509) 		rqstp->rq_arg.head[0].iov_len = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  510) 		rqstp->rq_arg.page_len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  511) 		rqstp->rq_respages = rqstp->rq_pages+1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  512) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  513) 		rqstp->rq_arg.page_len = len - rqstp->rq_arg.head[0].iov_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  514) 		rqstp->rq_respages = rqstp->rq_pages + 1 +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  515) 			DIV_ROUND_UP(rqstp->rq_arg.page_len, PAGE_SIZE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  516) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  517) 	rqstp->rq_next_page = rqstp->rq_respages+1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  518) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  519) 	if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  520) 		serv->sv_stats->netudpcnt++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  521) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  522) 	return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  523) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  524) out_recv_err:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  525) 	if (err != -EAGAIN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  526) 		/* possibly an icmp error */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  527) 		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  528) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  529) 	trace_svcsock_udp_recv_err(&svsk->sk_xprt, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  530) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  531) out_cmsg_err:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  532) 	net_warn_ratelimited("svc: received unknown control message %d/%d; dropping RPC reply datagram\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  533) 			     cmh->cmsg_level, cmh->cmsg_type);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  534) 	goto out_free;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  535) out_bh_enable:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  536) 	local_bh_enable();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  537) out_free:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  538) 	kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  539) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  540) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  541) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  542) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  543)  * svc_udp_sendto - Send out a reply on a UDP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  544)  * @rqstp: completed svc_rqst
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  545)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  546)  * xpt_mutex ensures @rqstp's whole message is written to the socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  547)  * without interruption.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  548)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  549)  * Returns the number of bytes sent, or a negative errno.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  550)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  551) static int svc_udp_sendto(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  552) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  553) 	struct svc_xprt *xprt = rqstp->rq_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  554) 	struct svc_sock	*svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  555) 	struct xdr_buf *xdr = &rqstp->rq_res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  556) 	union {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  557) 		struct cmsghdr	hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  558) 		long		all[SVC_PKTINFO_SPACE / sizeof(long)];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  559) 	} buffer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  560) 	struct cmsghdr *cmh = &buffer.hdr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  561) 	struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  562) 		.msg_name	= &rqstp->rq_addr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  563) 		.msg_namelen	= rqstp->rq_addrlen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  564) 		.msg_control	= cmh,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  565) 		.msg_controllen	= sizeof(buffer),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  566) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  567) 	unsigned int sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  568) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  569) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  570) 	svc_udp_release_rqst(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  571) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  572) 	svc_set_cmsg_data(rqstp, cmh);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  573) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  574) 	mutex_lock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  575) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  576) 	if (svc_xprt_is_dead(xprt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  577) 		goto out_notconn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  578) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  579) 	err = xprt_sock_sendmsg(svsk->sk_sock, &msg, xdr, 0, 0, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  580) 	xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  581) 	if (err == -ECONNREFUSED) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  582) 		/* ICMP error on earlier request. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  583) 		err = xprt_sock_sendmsg(svsk->sk_sock, &msg, xdr, 0, 0, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  584) 		xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  585) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  586) 	trace_svcsock_udp_send(xprt, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  587) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  588) 	mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  589) 	if (err < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  590) 		return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  591) 	return sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  592) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  593) out_notconn:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  594) 	mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  595) 	return -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  596) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  597) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  598) static int svc_udp_has_wspace(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  599) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  600) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  601) 	struct svc_serv	*serv = xprt->xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  602) 	unsigned long required;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  603) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  604) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  605) 	 * Set the SOCK_NOSPACE flag before checking the available
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  606) 	 * sock space.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  607) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  608) 	set_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  609) 	required = atomic_read(&svsk->sk_xprt.xpt_reserved) + serv->sv_max_mesg;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  610) 	if (required*2 > sock_wspace(svsk->sk_sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  611) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  612) 	clear_bit(SOCK_NOSPACE, &svsk->sk_sock->flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  613) 	return 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  614) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  615) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  616) static struct svc_xprt *svc_udp_accept(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  617) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  618) 	BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  619) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  620) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  621) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  622) static void svc_udp_kill_temp_xprt(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  623) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  624) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  625) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  626) static struct svc_xprt *svc_udp_create(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  627) 				       struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  628) 				       struct sockaddr *sa, int salen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  629) 				       int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  630) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  631) 	return svc_create_socket(serv, IPPROTO_UDP, net, sa, salen, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  632) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  633) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  634) static const struct svc_xprt_ops svc_udp_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  635) 	.xpo_create = svc_udp_create,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  636) 	.xpo_recvfrom = svc_udp_recvfrom,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  637) 	.xpo_sendto = svc_udp_sendto,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  638) 	.xpo_read_payload = svc_sock_read_payload,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  639) 	.xpo_release_rqst = svc_udp_release_rqst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  640) 	.xpo_detach = svc_sock_detach,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  641) 	.xpo_free = svc_sock_free,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  642) 	.xpo_has_wspace = svc_udp_has_wspace,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  643) 	.xpo_accept = svc_udp_accept,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  644) 	.xpo_secure_port = svc_sock_secure_port,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  645) 	.xpo_kill_temp_xprt = svc_udp_kill_temp_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  646) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  647) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  648) static struct svc_xprt_class svc_udp_class = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  649) 	.xcl_name = "udp",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  650) 	.xcl_owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  651) 	.xcl_ops = &svc_udp_ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  652) 	.xcl_max_payload = RPCSVC_MAXPAYLOAD_UDP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  653) 	.xcl_ident = XPRT_TRANSPORT_UDP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  654) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  655) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  656) static void svc_udp_init(struct svc_sock *svsk, struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  657) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  658) 	svc_xprt_init(sock_net(svsk->sk_sock->sk), &svc_udp_class,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  659) 		      &svsk->sk_xprt, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  660) 	clear_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  661) 	svsk->sk_sk->sk_data_ready = svc_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  662) 	svsk->sk_sk->sk_write_space = svc_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  663) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  664) 	/* initialise setting must have enough space to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  665) 	 * receive and respond to one request.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  666) 	 * svc_udp_recvfrom will re-adjust if necessary
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  667) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  668) 	svc_sock_setbufsize(svsk, 3);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  669) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  670) 	/* data might have come in before data_ready set up */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  671) 	set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  672) 	set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  673) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  674) 	/* make sure we get destination address info */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  675) 	switch (svsk->sk_sk->sk_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  676) 	case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  677) 		ip_sock_set_pktinfo(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  678) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  679) 	case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  680) 		ip6_sock_set_recvpktinfo(svsk->sk_sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  681) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  682) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  683) 		BUG();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  684) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  685) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  686) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  687) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  688)  * A data_ready event on a listening socket means there's a connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  689)  * pending. Do not use state_change as a substitute for it.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  690)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  691) static void svc_tcp_listen_data_ready(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  692) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  693) 	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  694) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  695) 	if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  696) 		/* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  697) 		rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  698) 		svsk->sk_odata(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  699) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  700) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  701) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  702) 	 * This callback may called twice when a new connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  703) 	 * is established as a child socket inherits everything
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  704) 	 * from a parent LISTEN socket.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  705) 	 * 1) data_ready method of the parent socket will be called
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  706) 	 *    when one of child sockets become ESTABLISHED.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  707) 	 * 2) data_ready method of the child socket may be called
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  708) 	 *    when it receives data before the socket is accepted.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  709) 	 * In case of 2, we should ignore it silently.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  710) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  711) 	if (sk->sk_state == TCP_LISTEN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  712) 		if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  713) 			set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  714) 			svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  715) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  716) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  717) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  718) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  719) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  720)  * A state change on a connected socket means it's dying or dead.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  721)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  722) static void svc_tcp_state_change(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  723) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  724) 	struct svc_sock	*svsk = (struct svc_sock *)sk->sk_user_data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  725) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  726) 	if (svsk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  727) 		/* Refer to svc_setup_socket() for details. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  728) 		rmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  729) 		svsk->sk_ostate(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  730) 		trace_svcsock_tcp_state(&svsk->sk_xprt, svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  731) 		if (sk->sk_state != TCP_ESTABLISHED) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  732) 			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  733) 			svc_xprt_enqueue(&svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  734) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  735) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  736) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  737) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  738) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  739)  * Accept a TCP connection
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  740)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  741) static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  742) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  743) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  744) 	struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  745) 	struct sockaddr	*sin = (struct sockaddr *) &addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  746) 	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  747) 	struct socket	*sock = svsk->sk_sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  748) 	struct socket	*newsock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  749) 	struct svc_sock	*newsvsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  750) 	int		err, slen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  751) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  752) 	if (!sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  753) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  754) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  755) 	clear_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  756) 	err = kernel_accept(sock, &newsock, O_NONBLOCK);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  757) 	if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  758) 		if (err == -ENOMEM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  759) 			printk(KERN_WARNING "%s: no more sockets!\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  760) 			       serv->sv_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  761) 		else if (err != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  762) 			net_warn_ratelimited("%s: accept failed (err %d)!\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  763) 					     serv->sv_name, -err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  764) 		trace_svcsock_accept_err(xprt, serv->sv_name, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  765) 		return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  766) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  767) 	set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  768) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  769) 	err = kernel_getpeername(newsock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  770) 	if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  771) 		trace_svcsock_getpeername_err(xprt, serv->sv_name, err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  772) 		goto failed;		/* aborted connection or whatever */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  773) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  774) 	slen = err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  775) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  776) 	/* Reset the inherited callbacks before calling svc_setup_socket */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  777) 	newsock->sk->sk_state_change = svsk->sk_ostate;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  778) 	newsock->sk->sk_data_ready = svsk->sk_odata;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  779) 	newsock->sk->sk_write_space = svsk->sk_owspace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  780) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  781) 	/* make sure that a write doesn't block forever when
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  782) 	 * low on memory
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  783) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  784) 	newsock->sk->sk_sndtimeo = HZ*30;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  785) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  786) 	newsvsk = svc_setup_socket(serv, newsock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  787) 				 (SVC_SOCK_ANONYMOUS | SVC_SOCK_TEMPORARY));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  788) 	if (IS_ERR(newsvsk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  789) 		goto failed;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  790) 	svc_xprt_set_remote(&newsvsk->sk_xprt, sin, slen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  791) 	err = kernel_getsockname(newsock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  792) 	slen = err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  793) 	if (unlikely(err < 0))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  794) 		slen = offsetof(struct sockaddr, sa_data);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  795) 	svc_xprt_set_local(&newsvsk->sk_xprt, sin, slen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  796) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  797) 	if (sock_is_loopback(newsock->sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  798) 		set_bit(XPT_LOCAL, &newsvsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  799) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  800) 		clear_bit(XPT_LOCAL, &newsvsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  801) 	if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  802) 		serv->sv_stats->nettcpconn++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  803) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  804) 	return &newsvsk->sk_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  805) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  806) failed:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  807) 	sock_release(newsock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  808) 	return NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  809) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  810) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  811) static size_t svc_tcp_restore_pages(struct svc_sock *svsk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  812) 				    struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  813) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  814) 	size_t len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  815) 	unsigned int i, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  816) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  817) 	if (!len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  818) 		return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  819) 	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  820) 	for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  821) 		if (rqstp->rq_pages[i] != NULL)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  822) 			put_page(rqstp->rq_pages[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  823) 		BUG_ON(svsk->sk_pages[i] == NULL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  824) 		rqstp->rq_pages[i] = svsk->sk_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  825) 		svsk->sk_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  826) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  827) 	rqstp->rq_arg.head[0].iov_base = page_address(rqstp->rq_pages[0]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  828) 	return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  829) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  830) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  831) static void svc_tcp_save_pages(struct svc_sock *svsk, struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  832) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  833) 	unsigned int i, len, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  834) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  835) 	if (svsk->sk_datalen == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  836) 		return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  837) 	len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  838) 	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  839) 	for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  840) 		svsk->sk_pages[i] = rqstp->rq_pages[i];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  841) 		rqstp->rq_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  842) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  843) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  844) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  845) static void svc_tcp_clear_pages(struct svc_sock *svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  846) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  847) 	unsigned int i, len, npages;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  848) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  849) 	if (svsk->sk_datalen == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  850) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  851) 	len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  852) 	npages = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  853) 	for (i = 0; i < npages; i++) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  854) 		if (svsk->sk_pages[i] == NULL) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  855) 			WARN_ON_ONCE(1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  856) 			continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  857) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  858) 		put_page(svsk->sk_pages[i]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  859) 		svsk->sk_pages[i] = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  860) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  861) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  862) 	svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  863) 	svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  864) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  865) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  866) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  867)  * Receive fragment record header into sk_marker.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  868)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  869) static ssize_t svc_tcp_read_marker(struct svc_sock *svsk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  870) 				   struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  871) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  872) 	ssize_t want, len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  873) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  874) 	/* If we haven't gotten the record length yet,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  875) 	 * get the next four bytes.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  876) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  877) 	if (svsk->sk_tcplen < sizeof(rpc_fraghdr)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  878) 		struct msghdr	msg = { NULL };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  879) 		struct kvec	iov;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  880) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  881) 		want = sizeof(rpc_fraghdr) - svsk->sk_tcplen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  882) 		iov.iov_base = ((char *)&svsk->sk_marker) + svsk->sk_tcplen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  883) 		iov.iov_len  = want;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  884) 		iov_iter_kvec(&msg.msg_iter, READ, &iov, 1, want);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  885) 		len = sock_recvmsg(svsk->sk_sock, &msg, MSG_DONTWAIT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  886) 		if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  887) 			return len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  888) 		svsk->sk_tcplen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  889) 		if (len < want) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  890) 			/* call again to read the remaining bytes */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  891) 			goto err_short;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  892) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  893) 		trace_svcsock_marker(&svsk->sk_xprt, svsk->sk_marker);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  894) 		if (svc_sock_reclen(svsk) + svsk->sk_datalen >
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  895) 		    svsk->sk_xprt.xpt_server->sv_max_mesg)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  896) 			goto err_too_large;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  897) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  898) 	return svc_sock_reclen(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  899) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  900) err_too_large:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  901) 	net_notice_ratelimited("svc: %s %s RPC fragment too large: %d\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  902) 			       __func__, svsk->sk_xprt.xpt_server->sv_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  903) 			       svc_sock_reclen(svsk));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  904) 	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  905) err_short:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  906) 	return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  907) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  908) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  909) static int receive_cb_reply(struct svc_sock *svsk, struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  910) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  911) 	struct rpc_xprt *bc_xprt = svsk->sk_xprt.xpt_bc_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  912) 	struct rpc_rqst *req = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  913) 	struct kvec *src, *dst;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  914) 	__be32 *p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  915) 	__be32 xid;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  916) 	__be32 calldir;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  917) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  918) 	xid = *p++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  919) 	calldir = *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  920) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  921) 	if (!bc_xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  922) 		return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  923) 	spin_lock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  924) 	req = xprt_lookup_rqst(bc_xprt, xid);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  925) 	if (!req)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  926) 		goto unlock_notfound;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  927) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  928) 	memcpy(&req->rq_private_buf, &req->rq_rcv_buf, sizeof(struct xdr_buf));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  929) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  930) 	 * XXX!: cheating for now!  Only copying HEAD.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  931) 	 * But we know this is good enough for now (in fact, for any
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  932) 	 * callback reply in the forseeable future).
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  933) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  934) 	dst = &req->rq_private_buf.head[0];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  935) 	src = &rqstp->rq_arg.head[0];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  936) 	if (dst->iov_len < src->iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  937) 		goto unlock_eagain; /* whatever; just giving up. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  938) 	memcpy(dst->iov_base, src->iov_base, src->iov_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  939) 	xprt_complete_rqst(req->rq_task, rqstp->rq_arg.len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  940) 	rqstp->rq_arg.len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  941) 	spin_unlock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  942) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  943) unlock_notfound:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  944) 	printk(KERN_NOTICE
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  945) 		"%s: Got unrecognized reply: "
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  946) 		"calldir 0x%x xpt_bc_xprt %p xid %08x\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  947) 		__func__, ntohl(calldir),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  948) 		bc_xprt, ntohl(xid));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  949) unlock_eagain:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  950) 	spin_unlock(&bc_xprt->queue_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  951) 	return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  952) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  953) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  954) static void svc_tcp_fragment_received(struct svc_sock *svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  955) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  956) 	/* If we have more data, signal svc_xprt_enqueue() to try again */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  957) 	svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  958) 	svsk->sk_marker = xdr_zero;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  959) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  960) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  961) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  962)  * svc_tcp_recvfrom - Receive data from a TCP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  963)  * @rqstp: request structure into which to receive an RPC Call
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  964)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  965)  * Called in a loop when XPT_DATA has been set.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  966)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  967)  * Read the 4-byte stream record marker, then use the record length
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  968)  * in that marker to set up exactly the resources needed to receive
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  969)  * the next RPC message into @rqstp.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  970)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  971)  * Returns:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  972)  *   On success, the number of bytes in a received RPC Call, or
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  973)  *   %0 if a complete RPC Call message was not ready to return
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  974)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  975)  * The zero return case handles partial receives and callback Replies.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  976)  * The state of a partial receive is preserved in the svc_sock for
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  977)  * the next call to svc_tcp_recvfrom.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  978)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  979) static int svc_tcp_recvfrom(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  980) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  981) 	struct svc_sock	*svsk =
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  982) 		container_of(rqstp->rq_xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  983) 	struct svc_serv	*serv = svsk->sk_xprt.xpt_server;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  984) 	size_t want, base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  985) 	ssize_t len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  986) 	__be32 *p;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  987) 	__be32 calldir;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  988) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  989) 	clear_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  990) 	len = svc_tcp_read_marker(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  991) 	if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  992) 		goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  993) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  994) 	base = svc_tcp_restore_pages(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  995) 	want = len - (svsk->sk_tcplen - sizeof(rpc_fraghdr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  996) 	len = svc_tcp_read_msg(rqstp, base + want, base);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  997) 	if (len >= 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  998) 		trace_svcsock_tcp_recv(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300  999) 		svsk->sk_tcplen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1000) 		svsk->sk_datalen += len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1001) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1002) 	if (len != want || !svc_sock_final_rec(svsk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1003) 		goto err_incomplete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1004) 	if (svsk->sk_datalen < 8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1005) 		goto err_nuts;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1006) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1007) 	rqstp->rq_arg.len = svsk->sk_datalen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1008) 	rqstp->rq_arg.page_base = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1009) 	if (rqstp->rq_arg.len <= rqstp->rq_arg.head[0].iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1010) 		rqstp->rq_arg.head[0].iov_len = rqstp->rq_arg.len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1011) 		rqstp->rq_arg.page_len = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1012) 	} else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1013) 		rqstp->rq_arg.page_len = rqstp->rq_arg.len - rqstp->rq_arg.head[0].iov_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1014) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1015) 	rqstp->rq_xprt_ctxt   = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1016) 	rqstp->rq_prot	      = IPPROTO_TCP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1017) 	if (test_bit(XPT_LOCAL, &svsk->sk_xprt.xpt_flags))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1018) 		set_bit(RQ_LOCAL, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1019) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1020) 		clear_bit(RQ_LOCAL, &rqstp->rq_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1021) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1022) 	p = (__be32 *)rqstp->rq_arg.head[0].iov_base;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1023) 	calldir = p[1];
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1024) 	if (calldir)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1025) 		len = receive_cb_reply(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1026) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1027) 	/* Reset TCP read info */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1028) 	svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1029) 	svc_tcp_fragment_received(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1030) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1031) 	if (len < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1032) 		goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1033) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1034) 	svc_xprt_copy_addrs(rqstp, &svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1035) 	if (serv->sv_stats)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1036) 		serv->sv_stats->nettcpcnt++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1037) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1038) 	return rqstp->rq_arg.len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1039) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1040) err_incomplete:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1041) 	svc_tcp_save_pages(svsk, rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1042) 	if (len < 0 && len != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1043) 		goto err_delete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1044) 	if (len == want)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1045) 		svc_tcp_fragment_received(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1046) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1047) 		trace_svcsock_tcp_recv_short(&svsk->sk_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1048) 				svc_sock_reclen(svsk),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1049) 				svsk->sk_tcplen - sizeof(rpc_fraghdr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1050) 	goto err_noclose;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1051) error:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1052) 	if (len != -EAGAIN)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1053) 		goto err_delete;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1054) 	trace_svcsock_tcp_recv_eagain(&svsk->sk_xprt, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1055) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1056) err_nuts:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1057) 	svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1058) err_delete:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1059) 	trace_svcsock_tcp_recv_err(&svsk->sk_xprt, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1060) 	set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1061) err_noclose:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1062) 	return 0;	/* record not complete */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1063) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1064) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1065) static int svc_tcp_send_kvec(struct socket *sock, const struct kvec *vec,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1066) 			      int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1067) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1068) 	return kernel_sendpage(sock, virt_to_page(vec->iov_base),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1069) 			       offset_in_page(vec->iov_base),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1070) 			       vec->iov_len, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1071) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1072) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1073) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1074)  * kernel_sendpage() is used exclusively to reduce the number of
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1075)  * copy operations in this path. Therefore the caller must ensure
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1076)  * that the pages backing @xdr are unchanging.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1077)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1078)  * In addition, the logic assumes that * .bv_len is never larger
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1079)  * than PAGE_SIZE.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1080)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1081) static int svc_tcp_sendmsg(struct socket *sock, struct msghdr *msg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1082) 			   struct xdr_buf *xdr, rpc_fraghdr marker,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1083) 			   unsigned int *sentp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1084) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1085) 	const struct kvec *head = xdr->head;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1086) 	const struct kvec *tail = xdr->tail;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1087) 	struct kvec rm = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1088) 		.iov_base	= &marker,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1089) 		.iov_len	= sizeof(marker),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1090) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1091) 	int flags, ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1092) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1093) 	*sentp = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1094) 	xdr_alloc_bvec(xdr, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1095) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1096) 	msg->msg_flags = MSG_MORE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1097) 	ret = kernel_sendmsg(sock, msg, &rm, 1, rm.iov_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1098) 	if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1099) 		return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1100) 	*sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1101) 	if (ret != rm.iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1102) 		return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1103) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1104) 	flags = head->iov_len < xdr->len ? MSG_MORE | MSG_SENDPAGE_NOTLAST : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1105) 	ret = svc_tcp_send_kvec(sock, head, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1106) 	if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1107) 		return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1108) 	*sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1109) 	if (ret != head->iov_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1110) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1111) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1112) 	if (xdr->page_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1113) 		unsigned int offset, len, remaining;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1114) 		struct bio_vec *bvec;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1115) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1116) 		bvec = xdr->bvec + (xdr->page_base >> PAGE_SHIFT);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1117) 		offset = offset_in_page(xdr->page_base);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1118) 		remaining = xdr->page_len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1119) 		flags = MSG_MORE | MSG_SENDPAGE_NOTLAST;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1120) 		while (remaining > 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1121) 			if (remaining <= PAGE_SIZE && tail->iov_len == 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1122) 				flags = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1123) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1124) 			len = min(remaining, bvec->bv_len - offset);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1125) 			ret = kernel_sendpage(sock, bvec->bv_page,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1126) 					      bvec->bv_offset + offset,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1127) 					      len, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1128) 			if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1129) 				return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1130) 			*sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1131) 			if (ret != len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1132) 				goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1133) 			remaining -= len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1134) 			offset = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1135) 			bvec++;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1136) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1137) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1138) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1139) 	if (tail->iov_len) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1140) 		ret = svc_tcp_send_kvec(sock, tail, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1141) 		if (ret < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1142) 			return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1143) 		*sentp += ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1144) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1145) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1146) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1147) 	return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1148) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1149) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1150) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1151)  * svc_tcp_sendto - Send out a reply on a TCP socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1152)  * @rqstp: completed svc_rqst
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1153)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1154)  * xpt_mutex ensures @rqstp's whole message is written to the socket
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1155)  * without interruption.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1156)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1157)  * Returns the number of bytes sent, or a negative errno.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1158)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1159) static int svc_tcp_sendto(struct svc_rqst *rqstp)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1160) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1161) 	struct svc_xprt *xprt = rqstp->rq_xprt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1162) 	struct svc_sock	*svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1163) 	struct xdr_buf *xdr = &rqstp->rq_res;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1164) 	rpc_fraghdr marker = cpu_to_be32(RPC_LAST_STREAM_FRAGMENT |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1165) 					 (u32)xdr->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1166) 	struct msghdr msg = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1167) 		.msg_flags	= 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1168) 	};
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1169) 	unsigned int sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1170) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1171) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1172) 	svc_tcp_release_rqst(rqstp);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1173) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1174) 	mutex_lock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1175) 	if (svc_xprt_is_dead(xprt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1176) 		goto out_notconn;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1177) 	err = svc_tcp_sendmsg(svsk->sk_sock, &msg, xdr, marker, &sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1178) 	xdr_free_bvec(xdr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1179) 	trace_svcsock_tcp_send(xprt, err < 0 ? (long)err : sent);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1180) 	if (err < 0 || sent != (xdr->len + sizeof(marker)))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1181) 		goto out_close;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1182) 	mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1183) 	return sent;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1184) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1185) out_notconn:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1186) 	mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1187) 	return -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1188) out_close:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1189) 	pr_notice("rpc-srv/tcp: %s: %s %d when sending %d bytes - shutting down socket\n",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1190) 		  xprt->xpt_server->sv_name,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1191) 		  (err < 0) ? "got error" : "sent",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1192) 		  (err < 0) ? err : sent, xdr->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1193) 	set_bit(XPT_CLOSE, &xprt->xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1194) 	svc_xprt_enqueue(xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1195) 	mutex_unlock(&xprt->xpt_mutex);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1196) 	return -EAGAIN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1197) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1198) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1199) static struct svc_xprt *svc_tcp_create(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1200) 				       struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1201) 				       struct sockaddr *sa, int salen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1202) 				       int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1203) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1204) 	return svc_create_socket(serv, IPPROTO_TCP, net, sa, salen, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1205) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1206) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1207) static const struct svc_xprt_ops svc_tcp_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1208) 	.xpo_create = svc_tcp_create,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1209) 	.xpo_recvfrom = svc_tcp_recvfrom,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1210) 	.xpo_sendto = svc_tcp_sendto,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1211) 	.xpo_read_payload = svc_sock_read_payload,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1212) 	.xpo_release_rqst = svc_tcp_release_rqst,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1213) 	.xpo_detach = svc_tcp_sock_detach,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1214) 	.xpo_free = svc_sock_free,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1215) 	.xpo_has_wspace = svc_tcp_has_wspace,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1216) 	.xpo_accept = svc_tcp_accept,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1217) 	.xpo_secure_port = svc_sock_secure_port,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1218) 	.xpo_kill_temp_xprt = svc_tcp_kill_temp_xprt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1219) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1220) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1221) static struct svc_xprt_class svc_tcp_class = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1222) 	.xcl_name = "tcp",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1223) 	.xcl_owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1224) 	.xcl_ops = &svc_tcp_ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1225) 	.xcl_max_payload = RPCSVC_MAXPAYLOAD_TCP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1226) 	.xcl_ident = XPRT_TRANSPORT_TCP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1227) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1228) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1229) void svc_init_xprt_sock(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1230) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1231) 	svc_reg_xprt_class(&svc_tcp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1232) 	svc_reg_xprt_class(&svc_udp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1233) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1234) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1235) void svc_cleanup_xprt_sock(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1236) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1237) 	svc_unreg_xprt_class(&svc_tcp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1238) 	svc_unreg_xprt_class(&svc_udp_class);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1239) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1240) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1241) static void svc_tcp_init(struct svc_sock *svsk, struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1242) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1243) 	struct sock	*sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1244) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1245) 	svc_xprt_init(sock_net(svsk->sk_sock->sk), &svc_tcp_class,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1246) 		      &svsk->sk_xprt, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1247) 	set_bit(XPT_CACHE_AUTH, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1248) 	set_bit(XPT_CONG_CTRL, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1249) 	if (sk->sk_state == TCP_LISTEN) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1250) 		strcpy(svsk->sk_xprt.xpt_remotebuf, "listener");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1251) 		set_bit(XPT_LISTENER, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1252) 		sk->sk_data_ready = svc_tcp_listen_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1253) 		set_bit(XPT_CONN, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1254) 	} else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1255) 		sk->sk_state_change = svc_tcp_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1256) 		sk->sk_data_ready = svc_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1257) 		sk->sk_write_space = svc_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1258) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1259) 		svsk->sk_marker = xdr_zero;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1260) 		svsk->sk_tcplen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1261) 		svsk->sk_datalen = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1262) 		memset(&svsk->sk_pages[0], 0, sizeof(svsk->sk_pages));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1263) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1264) 		tcp_sk(sk)->nonagle |= TCP_NAGLE_OFF;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1265) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1266) 		set_bit(XPT_DATA, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1267) 		switch (sk->sk_state) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1268) 		case TCP_SYN_RECV:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1269) 		case TCP_ESTABLISHED:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1270) 			break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1271) 		default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1272) 			set_bit(XPT_CLOSE, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1273) 		}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1274) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1275) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1276) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1277) void svc_sock_update_bufs(struct svc_serv *serv)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1278) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1279) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1280) 	 * The number of server threads has changed. Update
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1281) 	 * rcvbuf and sndbuf accordingly on all sockets
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1282) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1283) 	struct svc_sock *svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1284) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1285) 	spin_lock_bh(&serv->sv_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1286) 	list_for_each_entry(svsk, &serv->sv_permsocks, sk_xprt.xpt_list)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1287) 		set_bit(XPT_CHNGBUF, &svsk->sk_xprt.xpt_flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1288) 	spin_unlock_bh(&serv->sv_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1289) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1290) EXPORT_SYMBOL_GPL(svc_sock_update_bufs);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1291) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1292) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1293)  * Initialize socket for RPC use and create svc_sock struct
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1294)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1295) static struct svc_sock *svc_setup_socket(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1296) 						struct socket *sock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1297) 						int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1298) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1299) 	struct svc_sock	*svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1300) 	struct sock	*inet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1301) 	int		pmap_register = !(flags & SVC_SOCK_ANONYMOUS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1302) 	int		err = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1303) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1304) 	svsk = kzalloc(sizeof(*svsk), GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1305) 	if (!svsk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1306) 		return ERR_PTR(-ENOMEM);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1307) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1308) 	inet = sock->sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1309) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1310) 	/* Register socket with portmapper */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1311) 	if (pmap_register)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1312) 		err = svc_register(serv, sock_net(sock->sk), inet->sk_family,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1313) 				     inet->sk_protocol,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1314) 				     ntohs(inet_sk(inet)->inet_sport));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1315) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1316) 	if (err < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1317) 		kfree(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1318) 		return ERR_PTR(err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1319) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1320) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1321) 	svsk->sk_sock = sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1322) 	svsk->sk_sk = inet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1323) 	svsk->sk_ostate = inet->sk_state_change;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1324) 	svsk->sk_odata = inet->sk_data_ready;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1325) 	svsk->sk_owspace = inet->sk_write_space;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1326) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1327) 	 * This barrier is necessary in order to prevent race condition
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1328) 	 * with svc_data_ready(), svc_listen_data_ready() and others
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1329) 	 * when calling callbacks above.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1330) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1331) 	wmb();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1332) 	inet->sk_user_data = svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1333) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1334) 	/* Initialize the socket */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1335) 	if (sock->type == SOCK_DGRAM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1336) 		svc_udp_init(svsk, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1337) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1338) 		svc_tcp_init(svsk, serv);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1339) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1340) 	trace_svcsock_new_socket(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1341) 	return svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1342) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1343) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1344) bool svc_alien_sock(struct net *net, int fd)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1345) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1346) 	int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1347) 	struct socket *sock = sockfd_lookup(fd, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1348) 	bool ret = false;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1349) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1350) 	if (!sock)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1351) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1352) 	if (sock_net(sock->sk) != net)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1353) 		ret = true;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1354) 	sockfd_put(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1355) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1356) 	return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1357) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1358) EXPORT_SYMBOL_GPL(svc_alien_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1359) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1360) /**
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1361)  * svc_addsock - add a listener socket to an RPC service
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1362)  * @serv: pointer to RPC service to which to add a new listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1363)  * @fd: file descriptor of the new listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1364)  * @name_return: pointer to buffer to fill in with name of listener
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1365)  * @len: size of the buffer
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1366)  * @cred: credential
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1367)  *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1368)  * Fills in socket name and returns positive length of name if successful.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1369)  * Name is terminated with '\n'.  On error, returns a negative errno
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1370)  * value.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1371)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1372) int svc_addsock(struct svc_serv *serv, const int fd, char *name_return,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1373) 		const size_t len, const struct cred *cred)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1374) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1375) 	int err = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1376) 	struct socket *so = sockfd_lookup(fd, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1377) 	struct svc_sock *svsk = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1378) 	struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1379) 	struct sockaddr *sin = (struct sockaddr *)&addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1380) 	int salen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1381) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1382) 	if (!so)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1383) 		return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1384) 	err = -EAFNOSUPPORT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1385) 	if ((so->sk->sk_family != PF_INET) && (so->sk->sk_family != PF_INET6))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1386) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1387) 	err =  -EPROTONOSUPPORT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1388) 	if (so->sk->sk_protocol != IPPROTO_TCP &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1389) 	    so->sk->sk_protocol != IPPROTO_UDP)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1390) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1391) 	err = -EISCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1392) 	if (so->state > SS_UNCONNECTED)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1393) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1394) 	err = -ENOENT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1395) 	if (!try_module_get(THIS_MODULE))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1396) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1397) 	svsk = svc_setup_socket(serv, so, SVC_SOCK_DEFAULTS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1398) 	if (IS_ERR(svsk)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1399) 		module_put(THIS_MODULE);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1400) 		err = PTR_ERR(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1401) 		goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1402) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1403) 	salen = kernel_getsockname(svsk->sk_sock, sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1404) 	if (salen >= 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1405) 		svc_xprt_set_local(&svsk->sk_xprt, sin, salen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1406) 	svsk->sk_xprt.xpt_cred = get_cred(cred);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1407) 	svc_add_new_perm_xprt(serv, &svsk->sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1408) 	return svc_one_sock_name(svsk, name_return, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1409) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1410) 	sockfd_put(so);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1411) 	return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1412) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1413) EXPORT_SYMBOL_GPL(svc_addsock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1414) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1415) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1416)  * Create socket for RPC service.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1417)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1418) static struct svc_xprt *svc_create_socket(struct svc_serv *serv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1419) 					  int protocol,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1420) 					  struct net *net,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1421) 					  struct sockaddr *sin, int len,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1422) 					  int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1423) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1424) 	struct svc_sock	*svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1425) 	struct socket	*sock;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1426) 	int		error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1427) 	int		type;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1428) 	struct sockaddr_storage addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1429) 	struct sockaddr *newsin = (struct sockaddr *)&addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1430) 	int		newlen;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1431) 	int		family;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1432) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1433) 	if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1434) 		printk(KERN_WARNING "svc: only UDP and TCP "
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1435) 				"sockets supported\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1436) 		return ERR_PTR(-EINVAL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1437) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1438) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1439) 	type = (protocol == IPPROTO_UDP)? SOCK_DGRAM : SOCK_STREAM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1440) 	switch (sin->sa_family) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1441) 	case AF_INET6:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1442) 		family = PF_INET6;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1443) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1444) 	case AF_INET:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1445) 		family = PF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1446) 		break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1447) 	default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1448) 		return ERR_PTR(-EINVAL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1449) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1450) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1451) 	error = __sock_create(net, family, type, protocol, &sock, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1452) 	if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1453) 		return ERR_PTR(error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1454) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1455) 	svc_reclassify_socket(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1456) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1457) 	/*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1458) 	 * If this is an PF_INET6 listener, we want to avoid
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1459) 	 * getting requests from IPv4 remotes.  Those should
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1460) 	 * be shunted to a PF_INET listener via rpcbind.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1461) 	 */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1462) 	if (family == PF_INET6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1463) 		ip6_sock_set_v6only(sock->sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1464) 	if (type == SOCK_STREAM)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1465) 		sock->sk->sk_reuse = SK_CAN_REUSE; /* allow address reuse */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1466) 	error = kernel_bind(sock, sin, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1467) 	if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1468) 		goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1469) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1470) 	error = kernel_getsockname(sock, newsin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1471) 	if (error < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1472) 		goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1473) 	newlen = error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1474) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1475) 	if (protocol == IPPROTO_TCP) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1476) 		if ((error = kernel_listen(sock, 64)) < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1477) 			goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1478) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1479) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1480) 	svsk = svc_setup_socket(serv, sock, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1481) 	if (IS_ERR(svsk)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1482) 		error = PTR_ERR(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1483) 		goto bummer;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1484) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1485) 	svc_xprt_set_local(&svsk->sk_xprt, newsin, newlen);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1486) 	return (struct svc_xprt *)svsk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1487) bummer:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1488) 	sock_release(sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1489) 	return ERR_PTR(error);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1490) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1491) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1492) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1493)  * Detach the svc_sock from the socket so that no
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1494)  * more callbacks occur.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1495)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1496) static void svc_sock_detach(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1497) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1498) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1499) 	struct sock *sk = svsk->sk_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1500) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1501) 	/* put back the old socket callbacks */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1502) 	lock_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1503) 	sk->sk_state_change = svsk->sk_ostate;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1504) 	sk->sk_data_ready = svsk->sk_odata;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1505) 	sk->sk_write_space = svsk->sk_owspace;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1506) 	sk->sk_user_data = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1507) 	release_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1508) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1509) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1510) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1511)  * Disconnect the socket, and reset the callbacks
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1512)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1513) static void svc_tcp_sock_detach(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1514) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1515) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1516) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1517) 	svc_sock_detach(xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1518) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1519) 	if (!test_bit(XPT_LISTENER, &xprt->xpt_flags)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1520) 		svc_tcp_clear_pages(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1521) 		kernel_sock_shutdown(svsk->sk_sock, SHUT_RDWR);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1522) 	}
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1523) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1524) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1525) /*
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1526)  * Free the svc_sock's socket resources and the svc_sock itself.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1527)  */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1528) static void svc_sock_free(struct svc_xprt *xprt)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1529) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1530) 	struct svc_sock *svsk = container_of(xprt, struct svc_sock, sk_xprt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1531) 
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1532) 	if (svsk->sk_sock->file)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1533) 		sockfd_put(svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1534) 	else
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1535) 		sock_release(svsk->sk_sock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1536) 	kfree(svsk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1537) }