Lines Matching +full:route +full:- +full:ptp

1 /* SPDX-License-Identifier: GPL-2.0-or-later */
13 * Corey Minyard <wf-[email protected]>
14 * Florian La Roche <[email protected]-sb.de>
57 #include <linux/cgroup-defs.h>
79 /* This is the per-socket lock. The spinlock provides a synchronization
81 * mini-semaphore synchronizes multiple users amongst themselves.
88 * We express the mutex-alike socket_lock semantics
106 * struct sock_common - minimal network layer representation of sockets
109 * @skc_addrpair: 8-byte-aligned __u64 union of @skc_daddr & @skc_rcv_saddr
123 * @skc_portaddr_node: second hash linkage for UDP/UDP-Lite protocol
130 * @skc_nulls_node: main hash linkage for TCP/UDP/UDP-Lite protocol
238 * struct sock - network layer representation of sockets
246 * @sk_rx_dst: receive input route used by early demux
259 * @sk_reserved_mem: space reserved and non-reclaimable for the socket
269 * @sk_route_caps: route capabilities (e.g. %NETIF_F_TSO)
276 * @sk_backlog: always used with the per-socket spinlock held
306 * @sk_use_task_frag: allow sk_page_frag() to use current->task_frag.
309 * @sk_bind_phc: SO_TIMESTAMPING bind PHC index of PTP virtual clock
314 * @sk_user_data: RPC layer private data. Write-protected by @sk_callback_lock.
318 * @tcp_rtx_queue: TCP re-transmit queue [union with @sk_send_head]
335 * @sk_clockid: clockid used by time-based scheduling (SO_TXTIME)
347 * don't add nothing before this first member (__sk_common) --acme
392 * the per-socket spinlock held and requires low latency
568 * - SK_USER_DATA_NOCOPY: Pointer stored in sk_user_data might
573 * - SK_USER_DATA_BPF: Mark whether sk_user_data field is
577 * - SK_USER_DATA_PSOCK: Mark whether pointer stored in
588 * sk_user_data_is_nocopy - Test if sk_user_data pointer must not be copied
593 return ((uintptr_t)sk->sk_user_data & SK_USER_DATA_NOCOPY); in sk_user_data_is_nocopy()
596 #define __sk_user_data(sk) ((*((void __rcu **)&(sk)->sk_user_data)))
599 * __locked_read_sk_user_data_with_flags - return the pointer
606 * The caller must be holding sk->sk_callback_lock.
614 lockdep_is_held(&sk->sk_callback_lock)); in __locked_read_sk_user_data_with_flags()
624 * __rcu_dereference_sk_user_data_with_flags - return the pointer
661 return read_pnet(&sk->sk_net); in sock_net()
667 write_pnet(&sk->sk_net, net); in sock_net_set()
686 return READ_ONCE(sk->sk_peek_off); in sk_peek_offset()
694 s32 off = READ_ONCE(sk->sk_peek_off); in sk_peek_offset_bwd()
697 off = max_t(s32, off - val, 0); in sk_peek_offset_bwd()
698 WRITE_ONCE(sk->sk_peek_off, off); in sk_peek_offset_bwd()
704 sk_peek_offset_bwd(sk, -val); in sk_peek_offset_fwd()
717 return hlist_entry(head->first, struct sock, sk_node); in __sk_head()
727 return hlist_nulls_entry(head->first, struct sock, sk_nulls_node); in __sk_nulls_head()
737 return hlist_entry_safe(sk->sk_node.next, struct sock, sk_node); in sk_next()
742 return (!is_a_nulls(sk->sk_nulls_node.next)) ? in sk_nulls_next()
743 hlist_nulls_entry(sk->sk_nulls_node.next, in sk_nulls_next()
750 return hlist_unhashed(&sk->sk_node); in sk_unhashed()
760 node->pprev = NULL; in sk_node_init()
765 __hlist_del(&sk->sk_node); in __sk_del_node()
773 sk_node_init(&sk->sk_node); in __sk_del_node_init()
787 refcount_inc(&sk->sk_refcnt); in sock_hold()
795 refcount_dec(&sk->sk_refcnt); in __sock_put()
803 /* paranoid for a while -acme */ in sk_del_node_init()
804 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_del_node_init()
814 hlist_nulls_del_init_rcu(&sk->sk_nulls_node); in __sk_nulls_del_node_init_rcu()
825 /* paranoid for a while -acme */ in sk_nulls_del_node_init_rcu()
826 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_nulls_del_node_init_rcu()
834 hlist_add_head(&sk->sk_node, list); in __sk_add_node()
846 if (IS_ENABLED(CONFIG_IPV6) && sk->sk_reuseport && in sk_add_node_rcu()
847 sk->sk_family == AF_INET6) in sk_add_node_rcu()
848 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_rcu()
850 hlist_add_head_rcu(&sk->sk_node, list); in sk_add_node_rcu()
856 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_tail_rcu()
861 hlist_nulls_add_head_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_rcu()
866 hlist_nulls_add_tail_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_tail_rcu()
877 __hlist_del(&sk->sk_bind_node); in __sk_del_bind_node()
883 hlist_add_head(&sk->sk_bind_node, list); in sk_add_bind_node()
897 if (__sk && ({ node = &(__sk)->sk_nulls_node; 1; })) \
907 * sk_for_each_entry_offset_rcu - iterate over a list at a given struct offset
917 ({ tpos = (typeof(*tpos) *)((void *)pos - offset); 1;}); \
926 return sk->sk_socket->file->f_cred->user_ns; in sk_user_ns()
940 SOCK_USE_WRITE_QUEUE, /* whether to call sk->sk_write_space in sock_wfree */
944 SOCK_LOCALROUTE, /* route locally only, %SO_DONTROUTE setting */
953 * user-space instead.
967 * The highest bit of sk_tsflags is reserved for kernel-internal
975 nsk->sk_flags = osk->sk_flags; in sock_copy_flags()
980 __set_bit(flag, &sk->sk_flags); in sock_set_flag()
985 __clear_bit(flag, &sk->sk_flags); in sock_reset_flag()
999 return test_bit(flag, &sk->sk_flags); in sock_flag()
1023 return gfp_mask | (sk->sk_allocation & __GFP_MEMALLOC); in sk_gfp_mask()
1028 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog - 1); in sk_acceptq_removed()
1033 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog + 1); in sk_acceptq_added()
1037 * return READ_ONCE(sk->sk_ack_backlog) >= READ_ONCE(sk->sk_max_ack_backlog);
1042 return READ_ONCE(sk->sk_ack_backlog) > READ_ONCE(sk->sk_max_ack_backlog); in sk_acceptq_is_full()
1050 return READ_ONCE(sk->sk_wmem_queued) >> 1; in sk_stream_min_wspace()
1055 return READ_ONCE(sk->sk_sndbuf) - READ_ONCE(sk->sk_wmem_queued); in sk_stream_wspace()
1060 WRITE_ONCE(sk->sk_wmem_queued, sk->sk_wmem_queued + val); in sk_wmem_queued_add()
1065 /* Paired with lockless reads of sk->sk_forward_alloc */ in sk_forward_alloc_add()
1066 WRITE_ONCE(sk->sk_forward_alloc, sk->sk_forward_alloc + val); in sk_forward_alloc_add()
1077 if (!sk->sk_backlog.tail) in __sk_add_backlog()
1078 WRITE_ONCE(sk->sk_backlog.head, skb); in __sk_add_backlog()
1080 sk->sk_backlog.tail->next = skb; in __sk_add_backlog()
1082 WRITE_ONCE(sk->sk_backlog.tail, skb); in __sk_add_backlog()
1083 skb->next = NULL; in __sk_add_backlog()
1093 unsigned int qsize = sk->sk_backlog.len + atomic_read(&sk->sk_rmem_alloc); in sk_rcvqueues_full()
1098 /* The per-socket spinlock must be held here. */
1103 return -ENOBUFS; in sk_add_backlog()
1111 return -ENOMEM; in sk_add_backlog()
1114 sk->sk_backlog.len += skb->truesize; in sk_add_backlog()
1128 return INDIRECT_CALL_INET(sk->sk_backlog_rcv, in sk_backlog_rcv()
1138 if (unlikely(READ_ONCE(sk->sk_incoming_cpu) != cpu)) in sk_incoming_cpu_update()
1139 WRITE_ONCE(sk->sk_incoming_cpu, cpu); in sk_incoming_cpu_update()
1150 if (unlikely(READ_ONCE(sk->sk_rxhash) != skb->hash)) in sock_rps_save_rxhash()
1151 WRITE_ONCE(sk->sk_rxhash, skb->hash); in sock_rps_save_rxhash()
1159 WRITE_ONCE(sk->sk_rxhash, 0); in sock_rps_reset_rxhash()
1164 ({ int __rc, __dis = __sk->sk_disconnects; \
1174 __rc = __dis == __sk->sk_disconnects ? __condition : -EPIPE; \
1190 if (unlikely(READ_ONCE(sk->sk_backlog.tail))) { in sk_flush_backlog()
1209 * un-modified. Special care is taken when initializing object to zero.
1215 memset(&sk->sk_node.pprev, 0, in sk_prot_clear_nulls()
1216 size - offsetof(struct sock, sk_node.pprev)); in sk_prot_clear_nulls()
1227 * socket layer -> transport layer interface
1360 if (sk->sk_prot->forward_alloc_get) in sk_forward_alloc_get()
1361 return sk->sk_prot->forward_alloc_get(sk); in sk_forward_alloc_get()
1363 return READ_ONCE(sk->sk_forward_alloc); in sk_forward_alloc_get()
1368 if (READ_ONCE(sk->sk_wmem_queued) >= READ_ONCE(sk->sk_sndbuf)) in __sk_stream_memory_free()
1371 return sk->sk_prot->stream_memory_free ? in __sk_stream_memory_free()
1372 INDIRECT_CALL_INET_1(sk->sk_prot->stream_memory_free, in __sk_stream_memory_free()
1396 return cgroup_is_descendant(sock_cgroup_ptr(&sk->sk_cgrp_data), in sk_under_cgroup_hierarchy()
1399 return -ENOTSUPP; in sk_under_cgroup_hierarchy()
1407 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, -1, in sk_sockets_allocated_dec()
1413 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, 1, in sk_sockets_allocated_inc()
1420 return percpu_counter_read_positive(sk->sk_prot->sockets_allocated); in sk_sockets_allocated_read_positive()
1426 return percpu_counter_sum_positive(prot->sockets_allocated); in proto_sockets_allocated_sum_positive()
1439 this_cpu_add(net->core.prot_inuse->val[prot->inuse_idx], val); in sock_prot_inuse_add()
1444 this_cpu_add(net->core.prot_inuse->all, val); in sock_inuse_add()
1461 /* With per-bucket locks this operation is not-atomic, so that
1466 sk->sk_prot->unhash(sk); in __sk_prot_rehash()
1467 return sk->sk_prot->hash(sk); in __sk_prot_rehash()
1473 /* Sockets 0-1023 can't be bound to unless you are superuser */
1490 return &container_of(inode, struct socket_alloc, vfs_inode)->socket; in SOCKET_I()
1495 return &container_of(socket, struct socket_alloc, socket)->vfs_inode; in SOCK_INODE()
1512 return READ_ONCE(sk->sk_prot->sysctl_mem[index]); in sk_prot_mem_limits()
1517 return (amt + PAGE_SIZE - 1) >> PAGE_SHIFT; in sk_mem_pages()
1523 return !!sk->sk_prot->memory_allocated; in sk_has_account()
1532 delta = size - sk->sk_forward_alloc; in sk_wmem_schedule()
1543 delta = size - sk->sk_forward_alloc; in __sk_rmem_schedule()
1558 if (likely(!sk->sk_reserved_mem)) in sk_unused_reserved_mem()
1561 unused_mem = sk->sk_reserved_mem - sk->sk_wmem_queued - in sk_unused_reserved_mem()
1562 atomic_read(&sk->sk_rmem_alloc); in sk_unused_reserved_mem()
1574 reclaimable = sk->sk_forward_alloc - sk_unused_reserved_mem(sk); in sk_mem_reclaim()
1582 sk->sk_reserved_mem = 0; in sk_mem_reclaim_final()
1590 sk_forward_alloc_add(sk, -size); in sk_mem_charge()
1605 sk->sk_owner = owner; in sk_owner_set()
1610 sk->sk_owner = NULL; in sk_owner_clear()
1615 module_put(sk->sk_owner); in sk_owner_put()
1635 * per-address-family lock class.
1640 sk->sk_lock.owned = 0; \
1641 init_waitqueue_head(&sk->sk_lock.wq); \
1642 spin_lock_init(&(sk)->sk_lock.slock); \
1643 debug_check_no_locks_freed((void *)&(sk)->sk_lock, \
1644 sizeof((sk)->sk_lock)); \
1645 lockdep_set_class_and_name(&(sk)->sk_lock.slock, \
1647 lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \
1652 return lockdep_is_held(&sk->sk_lock) || in lockdep_sock_is_held()
1653 lockdep_is_held(&sk->sk_lock.slock); in lockdep_sock_is_held()
1668 #define bh_lock_sock(__sk) spin_lock(&((__sk)->sk_lock.slock))
1670 spin_lock_nested(&((__sk)->sk_lock.slock), \
1672 #define bh_unlock_sock(__sk) spin_unlock(&((__sk)->sk_lock.slock))
1674 bool __lock_sock_fast(struct sock *sk) __acquires(&sk->sk_lock.slock);
1677 * lock_sock_fast - fast version of lock_sock
1692 mutex_acquire(&sk->sk_lock.dep_map, 0, 0, _RET_IP_); in lock_sock_fast()
1700 mutex_acquire(&sk->sk_lock.dep_map, SINGLE_DEPTH_NESTING, 0, _RET_IP_); in lock_sock_fast_nested()
1706 * unlock_sock_fast - complement of lock_sock_fast
1714 __releases(&sk->sk_lock.slock) in unlock_sock_fast()
1718 __release(&sk->sk_lock.slock); in unlock_sock_fast()
1720 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in unlock_sock_fast()
1721 spin_unlock_bh(&sk->sk_lock.slock); in unlock_sock_fast()
1761 return sk->sk_lock.owned; in sock_owned_by_user()
1766 return sk->sk_lock.owned; in sock_owned_by_user_nocheck()
1772 sk->sk_lock.owned = 0; in sock_release_ownership()
1775 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in sock_release_ownership()
1784 !spin_is_locked(&sk->sk_lock.slock); in sock_allow_reclassification()
1811 if (refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_edemux()
1812 skb->sk = sk; in skb_set_owner_edemux()
1813 skb->destructor = sock_edemux; in skb_set_owner_edemux()
1851 if (sk->sk_socket) in sock_replace_proto()
1852 clear_bit(SOCK_SUPPORT_ZC, &sk->sk_socket->flags); in sock_replace_proto()
1853 WRITE_ONCE(sk->sk_prot, proto); in sock_replace_proto()
1868 .tsflags = READ_ONCE(sk->sk_tsflags), in sockcm_init()
1869 .priority = READ_ONCE(sk->sk_priority), in sockcm_init()
1932 * it is called, socket has no references from outside -> sk_free
1949 if (refcount_dec_and_test(&sk->sk_refcnt)) in sock_put()
1967 /* sk_tx_queue_mapping accept only upto a 16-bit value */ in sk_tx_queue_set()
1973 WRITE_ONCE(sk->sk_tx_queue_mapping, tx_queue); in sk_tx_queue_set()
1983 WRITE_ONCE(sk->sk_tx_queue_mapping, NO_QUEUE_MAPPING); in sk_tx_queue_clear()
1992 int val = READ_ONCE(sk->sk_tx_queue_mapping); in sk_tx_queue_get()
1997 return -1; in sk_tx_queue_get()
2009 unlikely(READ_ONCE(sk->sk_rx_queue_mapping) != rx_queue)) in __sk_rx_queue_set()
2010 WRITE_ONCE(sk->sk_rx_queue_mapping, rx_queue); in __sk_rx_queue_set()
2028 WRITE_ONCE(sk->sk_rx_queue_mapping, NO_QUEUE_MAPPING); in sk_rx_queue_clear()
2036 int res = READ_ONCE(sk->sk_rx_queue_mapping); in sk_rx_queue_get()
2043 return -1; in sk_rx_queue_get()
2048 sk->sk_socket = sock; in sk_set_socket()
2054 return &rcu_dereference_raw(sk->sk_wq)->wait; in sk_sleep()
2065 write_lock_bh(&sk->sk_callback_lock); in sock_orphan()
2068 sk->sk_wq = NULL; in sock_orphan()
2069 write_unlock_bh(&sk->sk_callback_lock); in sock_orphan()
2074 WARN_ON(parent->sk); in sock_graft()
2075 write_lock_bh(&sk->sk_callback_lock); in sock_graft()
2076 rcu_assign_pointer(sk->sk_wq, &parent->wq); in sock_graft()
2077 parent->sk = sk; in sock_graft()
2079 sk->sk_uid = SOCK_INODE(parent)->i_uid; in sock_graft()
2081 write_unlock_bh(&sk->sk_callback_lock); in sock_graft()
2090 return sk ? sk->sk_uid : make_kuid(net->user_ns, 0); in sock_net_uid()
2103 WRITE_ONCE(sk->sk_txhash, net_tx_rndhash()); in sk_set_txhash()
2108 if (sk->sk_txhash && sk->sk_txrehash == SOCK_TXREHASH_ENABLED) { in sk_rethink_txhash()
2118 return rcu_dereference_check(sk->sk_dst_cache, in __sk_dst_get()
2128 dst = rcu_dereference(sk->sk_dst_cache); in sk_dst_get()
2129 if (dst && !rcuref_get(&dst->__rcuref)) in sk_dst_get()
2139 if (dst && dst->ops->negative_advice) in __dst_negative_advice()
2140 dst->ops->negative_advice(sk, dst); in __dst_negative_advice()
2155 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in __sk_dst_set()
2156 old_dst = rcu_dereference_protected(sk->sk_dst_cache, in __sk_dst_set()
2158 rcu_assign_pointer(sk->sk_dst_cache, dst); in __sk_dst_set()
2168 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sk_dst_set()
2169 old_dst = unrcu_pointer(xchg(&sk->sk_dst_cache, RCU_INITIALIZER(dst))); in sk_dst_set()
2191 if (!READ_ONCE(sk->sk_dst_pending_confirm)) in sk_dst_confirm()
2192 WRITE_ONCE(sk->sk_dst_pending_confirm, 1); in sk_dst_confirm()
2198 struct sock *sk = skb->sk; in sock_confirm_neigh()
2200 if (sk && READ_ONCE(sk->sk_dst_pending_confirm)) in sock_confirm_neigh()
2201 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sock_confirm_neigh()
2210 return net_gso_ok(sk->sk_route_caps, sk->sk_gso_type); in sk_can_gso()
2217 sk->sk_gso_disabled = 1; in sk_gso_disable()
2218 sk->sk_route_caps &= ~NETIF_F_GSO_MASK; in sk_gso_disable()
2225 if (skb->ip_summed == CHECKSUM_NONE) { in skb_do_copy_data_nocache()
2228 return -EFAULT; in skb_do_copy_data_nocache()
2229 skb->csum = csum_block_add(skb->csum, csum, offset); in skb_do_copy_data_nocache()
2230 } else if (sk->sk_route_caps & NETIF_F_NOCACHE_COPY) { in skb_do_copy_data_nocache()
2232 return -EFAULT; in skb_do_copy_data_nocache()
2234 return -EFAULT; in skb_do_copy_data_nocache()
2242 int err, offset = skb->len; in skb_add_data_nocache()
2260 copy, skb->len); in skb_copy_to_page_nocache()
2271 * sk_wmem_alloc_get - returns write allocations
2278 return refcount_read(&sk->sk_wmem_alloc) - 1; in sk_wmem_alloc_get()
2282 * sk_rmem_alloc_get - returns read allocations
2289 return atomic_read(&sk->sk_rmem_alloc); in sk_rmem_alloc_get()
2293 * sk_has_allocations - check if allocations are outstanding
2304 * skwq_has_sleeper - check if there are any waiting processes
2317 * __add_wait_queue update tp->rcv_nxt
2319 * tp->rcv_nxt check sock_def_readable
2322 * wq = rcu_dereference(sk->sk_wq);
2323 * if (wq && waitqueue_active(&wq->wait))
2324 * wake_up_interruptible(&wq->wait)
2329 * in its cache, and so does the tp->rcv_nxt update on CPU2 side. The CPU1
2336 return wq && wq_has_sleeper(&wq->wait); in skwq_has_sleeper()
2340 * sock_poll_wait - wrapper for the poll_wait call.
2355 poll_wait(filp, &sock->wq.wait, p); in sock_poll_wait()
2361 u32 txhash = READ_ONCE(sk->sk_txhash); in skb_set_hash_from_sk()
2364 skb->l4_hash = 1; in skb_set_hash_from_sk()
2365 skb->hash = txhash; in skb_set_hash_from_sk()
2382 skb->sk = sk; in skb_set_owner_r()
2383 skb->destructor = sock_rfree; in skb_set_owner_r()
2384 atomic_add(skb->truesize, &sk->sk_rmem_alloc); in skb_set_owner_r()
2385 sk_mem_charge(sk, skb->truesize); in skb_set_owner_r()
2390 if (sk && refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_sk_safe()
2392 skb->destructor = sock_efree; in skb_set_owner_sk_safe()
2393 skb->sk = sk; in skb_set_owner_sk_safe()
2403 if (sk_rmem_schedule(sk, skb, skb->truesize)) { in skb_clone_and_charge_r()
2414 if (skb->destructor != sock_wfree) { in skb_prepare_for_gro()
2418 skb->slow_gro = 1; in skb_prepare_for_gro()
2456 if (likely(data_race(!sk->sk_err))) in sock_error()
2459 err = xchg(&sk->sk_err, 0); in sock_error()
2460 return -err; in sock_error()
2469 if (!(sk->sk_shutdown & SEND_SHUTDOWN)) { in sock_wspace()
2470 amt = sk->sk_sndbuf - refcount_read(&sk->sk_wmem_alloc); in sock_wspace()
2478 * We use sk->sk_wq_raw, from contexts knowing this
2487 set_bit(nr, &sk->sk_wq_raw->flags); in sk_set_bit()
2496 clear_bit(nr, &sk->sk_wq_raw->flags); in sk_clear_bit()
2503 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async()
2511 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async_rcu()
2514 /* Since sk_{r,w}mem_alloc sums skb->truesize, even a small frame might
2528 if (sk->sk_userlocks & SOCK_SNDBUF_LOCK) in sk_stream_moderate_sndbuf()
2531 val = min(sk->sk_sndbuf, sk->sk_wmem_queued >> 1); in sk_stream_moderate_sndbuf()
2534 WRITE_ONCE(sk->sk_sndbuf, max_t(u32, val, SOCK_MIN_SNDBUF)); in sk_stream_moderate_sndbuf()
2538 * sk_page_frag - return an appropriate page_frag
2555 if (sk->sk_use_task_frag) in sk_page_frag()
2556 return &current->task_frag; in sk_page_frag()
2558 return &sk->sk_frag; in sk_page_frag()
2568 return refcount_read(&sk->sk_wmem_alloc) < (READ_ONCE(sk->sk_sndbuf) >> 1); in sock_writeable()
2583 return noblock ? 0 : sk->sk_rcvtimeo; in sock_rcvtimeo()
2588 return noblock ? 0 : sk->sk_sndtimeo; in sock_sndtimeo()
2593 int v = waitall ? len : min_t(int, READ_ONCE(sk->sk_rcvlowat), len); in sock_rcvlowat()
2603 return timeo == MAX_SCHEDULE_TIMEOUT ? -ERESTARTSYS : -EINTR; in sock_intr_errno()
2610 /* Store sock_skb_cb at the end of skb->cb[] so protocol families
2611 * using skb->cb[] would keep using it directly and utilize its
2614 #define SOCK_SKB_CB_OFFSET ((sizeof_field(struct sk_buff, cb) - \
2617 #define SOCK_SKB_CB(__skb) ((struct sock_skb_cb *)((__skb)->cb + \
2626 SOCK_SKB_CB(skb)->dropcount = sock_flag(sk, SOCK_RXQ_OVFL) ? in sock_skb_set_dropcount()
2627 atomic_read(&sk->sk_drops) : 0; in sock_skb_set_dropcount()
2632 int segs = max_t(u16, 1, skb_shinfo(skb)->gso_segs); in sk_drops_add()
2634 atomic_add(segs, &sk->sk_drops); in sk_drops_add()
2644 seq = read_seqbegin(&sk->sk_stamp_seq); in sock_read_timestamp()
2645 kt = sk->sk_stamp; in sock_read_timestamp()
2646 } while (read_seqretry(&sk->sk_stamp_seq, seq)); in sock_read_timestamp()
2650 return READ_ONCE(sk->sk_stamp); in sock_read_timestamp()
2657 write_seqlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2658 sk->sk_stamp = kt; in sock_write_timestamp()
2659 write_sequnlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2661 WRITE_ONCE(sk->sk_stamp, kt); in sock_write_timestamp()
2674 u32 tsflags = READ_ONCE(sk->sk_tsflags); in sock_recv_timestamp()
2675 ktime_t kt = skb->tstamp; in sock_recv_timestamp()
2678 * - receive time stamping in software requested in sock_recv_timestamp()
2679 * - software time stamp available and wanted in sock_recv_timestamp()
2680 * - hardware time stamps available and wanted in sock_recv_timestamp()
2685 (hwtstamps->hwtstamp && in sock_recv_timestamp()
2698 #define SK_DEFAULT_STAMP (-1L * NSEC_PER_SEC)
2709 if (sk->sk_flags & FLAGS_RECV_CMSGS || in sock_recv_cmsgs()
2710 READ_ONCE(sk->sk_tsflags) & TSFLAGS_ANY) in sock_recv_cmsgs()
2713 sock_write_timestamp(sk, skb->tstamp); in sock_recv_cmsgs()
2721 * _sock_tx_timestamp - checks whether the outgoing packet is to be time stamped
2733 __u32 tsflags = sockc->tsflags; in _sock_tx_timestamp()
2740 *tskey = sockc->ts_opt_id; in _sock_tx_timestamp()
2742 *tskey = atomic_inc_return(&sk->sk_tskey) - 1; in _sock_tx_timestamp()
2759 _sock_tx_timestamp(skb->sk, sockc, &skb_shinfo(skb)->tx_flags, in skb_setup_tx_timestamp()
2760 &skb_shinfo(skb)->tskey); in skb_setup_tx_timestamp()
2765 int family = READ_ONCE(sk->sk_family); in sk_is_inet()
2773 sk->sk_type == SOCK_STREAM && in sk_is_tcp()
2774 sk->sk_protocol == IPPROTO_TCP; in sk_is_tcp()
2780 sk->sk_type == SOCK_DGRAM && in sk_is_udp()
2781 sk->sk_protocol == IPPROTO_UDP; in sk_is_udp()
2786 return sk->sk_family == AF_UNIX && sk->sk_type == SOCK_STREAM; in sk_is_stream_unix()
2791 return sk->sk_family == AF_VSOCK; in sk_is_vsock()
2795 * sk_eat_skb - Release a skb if it is no longer needed
2804 __skb_unlink(skb, &sk->sk_receive_queue); in sk_eat_skb()
2812 return skb->destructor == sock_pfree; in skb_sk_is_prefetched()
2823 return (1 << sk->sk_state) & ~(TCPF_TIME_WAIT | TCPF_NEW_SYN_RECV); in sk_fullsock()
2829 /* Only full sockets have sk->sk_flags. */ in sk_is_refcounted()
2841 struct sock *sk = skb->sk; in sk_validate_xmit_skb()
2843 if (sk && sk_fullsock(sk) && sk->sk_validate_xmit_skb) { in sk_validate_xmit_skb()
2844 skb = sk->sk_validate_xmit_skb(sk, dev, skb); in sk_validate_xmit_skb()
2846 pr_warn_ratelimited("unencrypted skb with no associated socket - dropping\n"); in sk_validate_xmit_skb()
2860 return (1 << sk->sk_state) & (TCPF_LISTEN | TCPF_NEW_SYN_RECV); in sk_listener()
2869 return (1 << READ_ONCE(sk->sk_state)) & in sk_listener_or_tw()
2885 * determination of these values, since that is non-constant across
2906 if (proto->sysctl_wmem_offset) in sk_get_wmem0()
2907 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_wmem_offset)); in sk_get_wmem0()
2909 return READ_ONCE(*proto->sysctl_wmem); in sk_get_wmem0()
2915 if (proto->sysctl_rmem_offset) in sk_get_rmem0()
2916 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_rmem_offset)); in sk_get_rmem0()
2918 return READ_ONCE(*proto->sysctl_rmem); in sk_get_rmem0()
2927 if (!sk || !sk_fullsock(sk) || READ_ONCE(sk->sk_pacing_shift) == val) in sk_pacing_shift_update()
2929 WRITE_ONCE(sk->sk_pacing_shift, val); in sk_pacing_shift_update()
2939 int bound_dev_if = READ_ONCE(sk->sk_bound_dev_if); in sk_dev_equal_l3scope()
2980 if (sk->sk_prot->sock_is_readable) in sk_is_readable()
2981 return sk->sk_prot->sock_is_readable(sk); in sk_is_readable()