| .. | .. |
|---|
| 28 | 28 | |
|---|
| 29 | 29 | /* private TCP part */ |
|---|
| 30 | 30 | /* On-the-wire fragment header: */ |
|---|
| 31 | | - __be32 sk_reclen; |
|---|
| 31 | + __be32 sk_marker; |
|---|
| 32 | 32 | /* As we receive a record, this includes the length received so |
|---|
| 33 | 33 | * far (including the fragment header): */ |
|---|
| 34 | 34 | u32 sk_tcplen; |
|---|
| .. | .. |
|---|
| 41 | 41 | |
|---|
| 42 | 42 | static inline u32 svc_sock_reclen(struct svc_sock *svsk) |
|---|
| 43 | 43 | { |
|---|
| 44 | | - return ntohl(svsk->sk_reclen) & RPC_FRAGMENT_SIZE_MASK; |
|---|
| 44 | + return be32_to_cpu(svsk->sk_marker) & RPC_FRAGMENT_SIZE_MASK; |
|---|
| 45 | 45 | } |
|---|
| 46 | 46 | |
|---|
| 47 | 47 | static inline u32 svc_sock_final_rec(struct svc_sock *svsk) |
|---|
| 48 | 48 | { |
|---|
| 49 | | - return ntohl(svsk->sk_reclen) & RPC_LAST_STREAM_FRAGMENT; |
|---|
| 49 | + return be32_to_cpu(svsk->sk_marker) & RPC_LAST_STREAM_FRAGMENT; |
|---|
| 50 | 50 | } |
|---|
| 51 | 51 | |
|---|
| 52 | 52 | /* |
|---|
| .. | .. |
|---|
| 59 | 59 | void svc_sock_update_bufs(struct svc_serv *serv); |
|---|
| 60 | 60 | bool svc_alien_sock(struct net *net, int fd); |
|---|
| 61 | 61 | int svc_addsock(struct svc_serv *serv, const int fd, |
|---|
| 62 | | - char *name_return, const size_t len); |
|---|
| 62 | + char *name_return, const size_t len, |
|---|
| 63 | + const struct cred *cred); |
|---|
| 63 | 64 | void svc_init_xprt_sock(void); |
|---|
| 64 | 65 | void svc_cleanup_xprt_sock(void); |
|---|
| 65 | 66 | struct svc_xprt *svc_sock_create(struct svc_serv *serv, int prot); |
|---|