git: e205fd318a29 - main - rpc: use new macros to lock socket buffers
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 09 Apr 2024 16:17:55 UTC
The branch main has been updated by glebius:
URL: https://cgit.FreeBSD.org/src/commit/?id=e205fd318a296ffdb7392486cdcec7f660fcffcf
commit e205fd318a296ffdb7392486cdcec7f660fcffcf
Author: Gleb Smirnoff <glebius@FreeBSD.org>
AuthorDate: 2024-04-09 16:17:19 +0000
Commit: Gleb Smirnoff <glebius@FreeBSD.org>
CommitDate: 2024-04-09 16:17:19 +0000
rpc: use new macros to lock socket buffers
Fixes: d80a97def9a1db6f07f5d2e68f7ad62b27918947
---
sys/rpc/clnt_bck.c | 4 ++--
sys/rpc/clnt_dg.c | 24 ++++++++++++------------
sys/rpc/clnt_vc.c | 24 ++++++++++++------------
sys/rpc/svc_dg.c | 16 ++++++++--------
sys/rpc/svc_vc.c | 20 ++++++++++----------
5 files changed, 44 insertions(+), 44 deletions(-)
diff --git a/sys/rpc/clnt_bck.c b/sys/rpc/clnt_bck.c
index ab8fd514465c..7e4781ec7e9d 100644
--- a/sys/rpc/clnt_bck.c
+++ b/sys/rpc/clnt_bck.c
@@ -318,9 +318,9 @@ if (error != 0) printf("sosend=%d\n", error);
mreq = NULL;
if (error == EMSGSIZE) {
printf("emsgsize\n");
- SOCKBUF_LOCK(&xprt->xp_socket->so_snd);
+ SOCK_SENDBUF_LOCK(xprt->xp_socket);
sbwait(xprt->xp_socket, SO_SND);
- SOCKBUF_UNLOCK(&xprt->xp_socket->so_snd);
+ SOCK_SENDBUF_UNLOCK(xprt->xp_socket);
sx_xunlock(&xprt->xp_lock);
AUTH_VALIDATE(auth, xid, NULL, NULL);
mtx_lock(&ct->ct_lock);
diff --git a/sys/rpc/clnt_dg.c b/sys/rpc/clnt_dg.c
index f06f6b034c9a..b6a8cdce0d76 100644
--- a/sys/rpc/clnt_dg.c
+++ b/sys/rpc/clnt_dg.c
@@ -112,7 +112,7 @@ TAILQ_HEAD(cu_request_list, cu_request);
* member. It is separate from the client private data to facilitate
* multiple clients sharing the same socket. The cs_lock mutex is used
* to protect all fields of this structure, the socket's receive
- * buffer SOCKBUF_LOCK is used to ensure that exactly one of these
+ * buffer lock is used to ensure that exactly one of these
* structures is installed on the socket.
*/
struct cu_socket {
@@ -270,11 +270,11 @@ clnt_dg_create(
}
sb = &so->so_rcv;
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
recheck_socket:
if (sb->sb_upcall) {
if (sb->sb_upcall != clnt_dg_soupcall) {
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
printf("clnt_dg_create(): socket already has an incompatible upcall\n");
goto err2;
}
@@ -287,9 +287,9 @@ recheck_socket:
* We are the first on this socket - allocate the
* structure and install it in the socket.
*/
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
cs = mem_alloc(sizeof(*cs));
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (sb->sb_upcall) {
/*
* We have lost a race with some other client.
@@ -303,7 +303,7 @@ recheck_socket:
TAILQ_INIT(&cs->cs_pending);
soupcall_set(so, SO_RCV, clnt_dg_soupcall, cs);
}
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
cl->cl_refs = 1;
cl->cl_ops = &clnt_dg_ops;
@@ -993,7 +993,7 @@ clnt_dg_destroy(CLIENT *cl)
cs = cu->cu_socket->so_rcv.sb_upcallarg;
clnt_dg_close(cl);
- SOCKBUF_LOCK(&cu->cu_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(cu->cu_socket);
mtx_lock(&cs->cs_lock);
cs->cs_refs--;
@@ -1001,13 +1001,13 @@ clnt_dg_destroy(CLIENT *cl)
mtx_unlock(&cs->cs_lock);
soupcall_clear(cu->cu_socket, SO_RCV);
clnt_dg_upcallsdone(cu->cu_socket, cs);
- SOCKBUF_UNLOCK(&cu->cu_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(cu->cu_socket);
mtx_destroy(&cs->cs_lock);
mem_free(cs, sizeof(*cs));
lastsocketref = TRUE;
} else {
mtx_unlock(&cs->cs_lock);
- SOCKBUF_UNLOCK(&cu->cu_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(cu->cu_socket);
lastsocketref = FALSE;
}
@@ -1052,14 +1052,14 @@ clnt_dg_soupcall(struct socket *so, void *arg, int waitflag)
uio.uio_resid = 1000000000;
uio.uio_td = curthread;
do {
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
m = NULL;
control = NULL;
rcvflag = MSG_DONTWAIT;
error = soreceive(so, NULL, &uio, &m, &control, &rcvflag);
if (control)
m_freem(control);
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (error == EWOULDBLOCK)
break;
@@ -1140,7 +1140,7 @@ static void
clnt_dg_upcallsdone(struct socket *so, struct cu_socket *cs)
{
- SOCKBUF_LOCK_ASSERT(&so->so_rcv);
+ SOCK_RECVBUF_LOCK_ASSERT(so);
while (cs->cs_upcallrefs > 0)
(void) msleep(&cs->cs_upcallrefs, SOCKBUF_MTX(&so->so_rcv), 0,
diff --git a/sys/rpc/clnt_vc.c b/sys/rpc/clnt_vc.c
index 8b69117ba2ac..386153dc1f36 100644
--- a/sys/rpc/clnt_vc.c
+++ b/sys/rpc/clnt_vc.c
@@ -263,9 +263,9 @@ clnt_vc_create(
cl->cl_private = ct;
cl->cl_auth = authnone_create();
- SOCKBUF_LOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(ct->ct_socket);
soupcall_set(ct->ct_socket, SO_RCV, clnt_vc_soupcall, ct);
- SOCKBUF_UNLOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(ct->ct_socket);
ct->ct_raw = NULL;
ct->ct_record = NULL;
@@ -437,9 +437,9 @@ call_again:
mreq = NULL;
if (error == EMSGSIZE || (error == ERESTART &&
(ct->ct_waitflag & PCATCH) == 0 && trycnt-- > 0)) {
- SOCKBUF_LOCK(&ct->ct_socket->so_snd);
+ SOCK_SENDBUF_LOCK(ct->ct_socket);
sbwait(ct->ct_socket, SO_SND);
- SOCKBUF_UNLOCK(&ct->ct_socket->so_snd);
+ SOCK_SENDBUF_UNLOCK(ct->ct_socket);
AUTH_VALIDATE(auth, xid, NULL, NULL);
mtx_lock(&ct->ct_lock);
TAILQ_REMOVE(&ct->ct_pending, cr, cr_link);
@@ -821,12 +821,12 @@ clnt_vc_close(CLIENT *cl)
ct->ct_closing = TRUE;
mtx_unlock(&ct->ct_lock);
- SOCKBUF_LOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(ct->ct_socket);
if (ct->ct_socket->so_rcv.sb_upcall != NULL) {
soupcall_clear(ct->ct_socket, SO_RCV);
clnt_vc_upcallsdone(ct);
}
- SOCKBUF_UNLOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(ct->ct_socket);
/*
* Abort any pending requests and wait until everyone
@@ -967,7 +967,7 @@ clnt_vc_soupcall(struct socket *so, void *arg, int waitflag)
/*
* If another thread is already here, it must be in
* soreceive(), so just return to avoid races with it.
- * ct_upcallrefs is protected by the SOCKBUF_LOCK(),
+ * ct_upcallrefs is protected by the socket receive buffer lock
* which is held in this function, except when
* soreceive() is called.
*/
@@ -987,9 +987,9 @@ clnt_vc_soupcall(struct socket *so, void *arg, int waitflag)
if (ct->ct_sslrefno != 0 && (ct->ct_rcvstate &
RPCRCVSTATE_NORMAL) != 0)
rcvflag |= MSG_TLSAPPDATA;
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
error = soreceive(so, NULL, &uio, &m, &m2, &rcvflag);
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (error == EWOULDBLOCK) {
/*
@@ -1255,7 +1255,7 @@ static void
clnt_vc_upcallsdone(struct ct_data *ct)
{
- SOCKBUF_LOCK_ASSERT(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_LOCK_ASSERT(ct->ct_socket);
while (ct->ct_upcallrefs > 0)
(void) msleep(&ct->ct_upcallrefs,
@@ -1296,9 +1296,9 @@ clnt_vc_dotlsupcall(void *data)
if ((ct->ct_rcvstate & RPCRCVSTATE_SOUPCALLNEEDED) != 0) {
ct->ct_rcvstate &= ~RPCRCVSTATE_SOUPCALLNEEDED;
mtx_unlock(&ct->ct_lock);
- SOCKBUF_LOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(ct->ct_socket);
clnt_vc_soupcall(ct->ct_socket, ct, M_NOWAIT);
- SOCKBUF_UNLOCK(&ct->ct_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(ct->ct_socket);
mtx_lock(&ct->ct_lock);
}
msleep(&ct->ct_sslrefno, &ct->ct_lock, 0, "clntvcdu", hz);
diff --git a/sys/rpc/svc_dg.c b/sys/rpc/svc_dg.c
index d77a727e820d..02e0c9a43fd9 100644
--- a/sys/rpc/svc_dg.c
+++ b/sys/rpc/svc_dg.c
@@ -130,9 +130,9 @@ svc_dg_create(SVCPOOL *pool, struct socket *so, size_t sendsize,
xprt_register(xprt);
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
soupcall_set(so, SO_RCV, svc_dg_soupcall, xprt);
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
return (xprt);
freedata:
@@ -190,18 +190,18 @@ svc_dg_recv(SVCXPRT *xprt, struct rpc_msg *msg,
* from racing the upcall after our soreadable() call
* returns false.
*/
- SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(xprt->xp_socket);
if (!soreadable(xprt->xp_socket))
xprt_inactive_self(xprt);
- SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(xprt->xp_socket);
sx_xunlock(&xprt->xp_lock);
return (FALSE);
}
if (error) {
- SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(xprt->xp_socket);
soupcall_clear(xprt->xp_socket, SO_RCV);
- SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(xprt->xp_socket);
xprt_inactive_self(xprt);
sx_xunlock(&xprt->xp_lock);
return (FALSE);
@@ -266,9 +266,9 @@ static void
svc_dg_destroy(SVCXPRT *xprt)
{
- SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(xprt->xp_socket);
soupcall_clear(xprt->xp_socket, SO_RCV);
- SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(xprt->xp_socket);
sx_destroy(&xprt->xp_lock);
if (xprt->xp_socket)
diff --git a/sys/rpc/svc_vc.c b/sys/rpc/svc_vc.c
index 8e7ff888eaa2..9fc4108a5149 100644
--- a/sys/rpc/svc_vc.c
+++ b/sys/rpc/svc_vc.c
@@ -315,10 +315,10 @@ svc_vc_create_conn(SVCPOOL *pool, struct socket *so, struct sockaddr *raddr)
xprt_register(xprt);
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
xprt->xp_upcallset = 1;
soupcall_set(so, SO_RCV, svc_vc_soupcall, xprt);
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
/*
* Throw the transport into the active list in case it already
@@ -537,13 +537,13 @@ svc_vc_destroy(SVCXPRT *xprt)
struct cf_conn *cd = (struct cf_conn *)xprt->xp_p1;
CLIENT *cl = (CLIENT *)xprt->xp_p2;
- SOCKBUF_LOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_LOCK(xprt->xp_socket);
if (xprt->xp_upcallset) {
xprt->xp_upcallset = 0;
if (xprt->xp_socket->so_rcv.sb_upcall != NULL)
soupcall_clear(xprt->xp_socket, SO_RCV);
}
- SOCKBUF_UNLOCK(&xprt->xp_socket->so_rcv);
+ SOCK_RECVBUF_UNLOCK(xprt->xp_socket);
if (cl != NULL)
CLNT_RELEASE(cl);
@@ -780,10 +780,10 @@ svc_vc_recv(SVCXPRT *xprt, struct rpc_msg *msg,
/* Check for next request in a pending queue. */
svc_vc_process_pending(xprt);
if (cd->mreq == NULL || cd->resid != 0) {
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (!soreadable(so))
xprt_inactive_self(xprt);
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
}
sx_xunlock(&xprt->xp_lock);
@@ -834,10 +834,10 @@ tryagain:
* after our call to soreceive fails with
* EWOULDBLOCK.
*/
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (!soreadable(so))
xprt_inactive_self(xprt);
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
sx_xunlock(&xprt->xp_lock);
return (FALSE);
}
@@ -877,12 +877,12 @@ tryagain:
if (error) {
KRPC_CURVNET_RESTORE();
- SOCKBUF_LOCK(&so->so_rcv);
+ SOCK_RECVBUF_LOCK(so);
if (xprt->xp_upcallset) {
xprt->xp_upcallset = 0;
soupcall_clear(so, SO_RCV);
}
- SOCKBUF_UNLOCK(&so->so_rcv);
+ SOCK_RECVBUF_UNLOCK(so);
xprt_inactive_self(xprt);
cd->strm_stat = XPRT_DIED;
sx_xunlock(&xprt->xp_lock);