Lines Matching +full:dont +full:- +full:validate
1 /* SPDX-License-Identifier: GPL-2.0-or-later */
13 * Corey Minyard <wf-rch!minyard@relay.EU.net>
14 * Florian La Roche <flla@stud.uni-sb.de>
57 #include <linux/cgroup-defs.h>
79 /* This is the per-socket lock. The spinlock provides a synchronization
81 * mini-semaphore synchronizes multiple users amongst themselves.
88 * We express the mutex-alike socket_lock semantics
106 * struct sock_common - minimal network layer representation of sockets
109 * @skc_addrpair: 8-byte-aligned __u64 union of @skc_daddr & @skc_rcv_saddr
123 * @skc_portaddr_node: second hash linkage for UDP/UDP-Lite protocol
130 * @skc_nulls_node: main hash linkage for TCP/UDP/UDP-Lite protocol
238 * struct sock - network layer representation of sockets
259 * @sk_reserved_mem: space reserved and non-reclaimable for the socket
276 * @sk_backlog: always used with the per-socket spinlock held
306 * @sk_use_task_frag: allow sk_page_frag() to use current->task_frag.
314 * @sk_user_data: RPC layer private data. Write-protected by @sk_callback_lock.
318 * @tcp_rtx_queue: TCP re-transmit queue [union with @sk_send_head]
330 * @sk_validate_xmit_skb: ptr to an optional validate function
335 * @sk_clockid: clockid used by time-based scheduling (SO_TXTIME)
345 * don't add nothing before this first member (__sk_common) --acme
390 * the per-socket spinlock held and requires low latency
562 * - SK_USER_DATA_NOCOPY: Pointer stored in sk_user_data might
567 * - SK_USER_DATA_BPF: Mark whether sk_user_data field is
571 * - SK_USER_DATA_PSOCK: Mark whether pointer stored in
582 * sk_user_data_is_nocopy - Test if sk_user_data pointer must not be copied
587 return ((uintptr_t)sk->sk_user_data & SK_USER_DATA_NOCOPY); in sk_user_data_is_nocopy()
590 #define __sk_user_data(sk) ((*((void __rcu **)&(sk)->sk_user_data)))
593 * __locked_read_sk_user_data_with_flags - return the pointer
600 * The caller must be holding sk->sk_callback_lock.
608 lockdep_is_held(&sk->sk_callback_lock)); in __locked_read_sk_user_data_with_flags()
618 * __rcu_dereference_sk_user_data_with_flags - return the pointer
655 return read_pnet(&sk->sk_net); in sock_net()
661 write_pnet(&sk->sk_net, net); in sock_net_set()
680 return READ_ONCE(sk->sk_peek_off); in sk_peek_offset()
688 s32 off = READ_ONCE(sk->sk_peek_off); in sk_peek_offset_bwd()
691 off = max_t(s32, off - val, 0); in sk_peek_offset_bwd()
692 WRITE_ONCE(sk->sk_peek_off, off); in sk_peek_offset_bwd()
698 sk_peek_offset_bwd(sk, -val); in sk_peek_offset_fwd()
711 return hlist_entry(head->first, struct sock, sk_node); in __sk_head()
721 return hlist_nulls_entry(head->first, struct sock, sk_nulls_node); in __sk_nulls_head()
731 return hlist_entry_safe(sk->sk_node.next, struct sock, sk_node); in sk_next()
736 return (!is_a_nulls(sk->sk_nulls_node.next)) ? in sk_nulls_next()
737 hlist_nulls_entry(sk->sk_nulls_node.next, in sk_nulls_next()
744 return hlist_unhashed(&sk->sk_node); in sk_unhashed()
754 node->pprev = NULL; in sk_node_init()
759 __hlist_del(&sk->sk_node); in __sk_del_node()
767 sk_node_init(&sk->sk_node); in __sk_del_node_init()
781 refcount_inc(&sk->sk_refcnt); in sock_hold()
789 refcount_dec(&sk->sk_refcnt); in __sock_put()
797 /* paranoid for a while -acme */ in sk_del_node_init()
798 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_del_node_init()
808 hlist_nulls_del_init_rcu(&sk->sk_nulls_node); in __sk_nulls_del_node_init_rcu()
819 /* paranoid for a while -acme */ in sk_nulls_del_node_init_rcu()
820 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_nulls_del_node_init_rcu()
828 hlist_add_head(&sk->sk_node, list); in __sk_add_node()
840 if (IS_ENABLED(CONFIG_IPV6) && sk->sk_reuseport && in sk_add_node_rcu()
841 sk->sk_family == AF_INET6) in sk_add_node_rcu()
842 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_rcu()
844 hlist_add_head_rcu(&sk->sk_node, list); in sk_add_node_rcu()
850 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_tail_rcu()
855 hlist_nulls_add_head_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_rcu()
860 hlist_nulls_add_tail_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_tail_rcu()
871 __hlist_del(&sk->sk_bind_node); in __sk_del_bind_node()
877 hlist_add_head(&sk->sk_bind_node, list); in sk_add_bind_node()
891 if (__sk && ({ node = &(__sk)->sk_nulls_node; 1; })) \
901 * sk_for_each_entry_offset_rcu - iterate over a list at a given struct offset
911 ({ tpos = (typeof(*tpos) *)((void *)pos - offset); 1;}); \
920 return sk->sk_socket->file->f_cred->user_ns; in sk_user_ns()
934 SOCK_USE_WRITE_QUEUE, /* whether to call sk->sk_write_space in sock_wfree */
947 * user-space instead.
961 * The highest bit of sk_tsflags is reserved for kernel-internal
969 nsk->sk_flags = osk->sk_flags; in sock_copy_flags()
974 __set_bit(flag, &sk->sk_flags); in sock_set_flag()
979 __clear_bit(flag, &sk->sk_flags); in sock_reset_flag()
993 return test_bit(flag, &sk->sk_flags); in sock_flag()
1017 return gfp_mask | (sk->sk_allocation & __GFP_MEMALLOC); in sk_gfp_mask()
1022 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog - 1); in sk_acceptq_removed()
1027 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog + 1); in sk_acceptq_added()
1031 * return READ_ONCE(sk->sk_ack_backlog) >= READ_ONCE(sk->sk_max_ack_backlog);
1036 return READ_ONCE(sk->sk_ack_backlog) > READ_ONCE(sk->sk_max_ack_backlog); in sk_acceptq_is_full()
1044 return READ_ONCE(sk->sk_wmem_queued) >> 1; in sk_stream_min_wspace()
1049 return READ_ONCE(sk->sk_sndbuf) - READ_ONCE(sk->sk_wmem_queued); in sk_stream_wspace()
1054 WRITE_ONCE(sk->sk_wmem_queued, sk->sk_wmem_queued + val); in sk_wmem_queued_add()
1059 /* Paired with lockless reads of sk->sk_forward_alloc */ in sk_forward_alloc_add()
1060 WRITE_ONCE(sk->sk_forward_alloc, sk->sk_forward_alloc + val); in sk_forward_alloc_add()
1068 /* dont let skb dst not refcounted, we are going to leave rcu lock */ in __sk_add_backlog()
1071 if (!sk->sk_backlog.tail) in __sk_add_backlog()
1072 WRITE_ONCE(sk->sk_backlog.head, skb); in __sk_add_backlog()
1074 sk->sk_backlog.tail->next = skb; in __sk_add_backlog()
1076 WRITE_ONCE(sk->sk_backlog.tail, skb); in __sk_add_backlog()
1077 skb->next = NULL; in __sk_add_backlog()
1087 unsigned int qsize = sk->sk_backlog.len + atomic_read(&sk->sk_rmem_alloc); in sk_rcvqueues_full()
1092 /* The per-socket spinlock must be held here. */
1097 return -ENOBUFS; in sk_add_backlog()
1105 return -ENOMEM; in sk_add_backlog()
1108 sk->sk_backlog.len += skb->truesize; in sk_add_backlog()
1122 return INDIRECT_CALL_INET(sk->sk_backlog_rcv, in sk_backlog_rcv()
1132 if (unlikely(READ_ONCE(sk->sk_incoming_cpu) != cpu)) in sk_incoming_cpu_update()
1133 WRITE_ONCE(sk->sk_incoming_cpu, cpu); in sk_incoming_cpu_update()
1144 if (unlikely(READ_ONCE(sk->sk_rxhash) != skb->hash)) in sock_rps_save_rxhash()
1145 WRITE_ONCE(sk->sk_rxhash, skb->hash); in sock_rps_save_rxhash()
1153 WRITE_ONCE(sk->sk_rxhash, 0); in sock_rps_reset_rxhash()
1158 ({ int __rc, __dis = __sk->sk_disconnects; \
1168 __rc = __dis == __sk->sk_disconnects ? __condition : -EPIPE; \
1184 if (unlikely(READ_ONCE(sk->sk_backlog.tail))) { in sk_flush_backlog()
1203 * un-modified. Special care is taken when initializing object to zero.
1209 memset(&sk->sk_node.pprev, 0, in sk_prot_clear_nulls()
1210 size - offsetof(struct sock, sk_node.pprev)); in sk_prot_clear_nulls()
1221 * socket layer -> transport layer interface
1354 if (sk->sk_prot->forward_alloc_get) in sk_forward_alloc_get()
1355 return sk->sk_prot->forward_alloc_get(sk); in sk_forward_alloc_get()
1357 return READ_ONCE(sk->sk_forward_alloc); in sk_forward_alloc_get()
1362 if (READ_ONCE(sk->sk_wmem_queued) >= READ_ONCE(sk->sk_sndbuf)) in __sk_stream_memory_free()
1365 return sk->sk_prot->stream_memory_free ? in __sk_stream_memory_free()
1366 INDIRECT_CALL_INET_1(sk->sk_prot->stream_memory_free, in __sk_stream_memory_free()
1390 return cgroup_is_descendant(sock_cgroup_ptr(&sk->sk_cgrp_data), in sk_under_cgroup_hierarchy()
1393 return -ENOTSUPP; in sk_under_cgroup_hierarchy()
1401 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, -1, in sk_sockets_allocated_dec()
1407 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, 1, in sk_sockets_allocated_inc()
1414 return percpu_counter_read_positive(sk->sk_prot->sockets_allocated); in sk_sockets_allocated_read_positive()
1420 return percpu_counter_sum_positive(prot->sockets_allocated); in proto_sockets_allocated_sum_positive()
1433 this_cpu_add(net->core.prot_inuse->val[prot->inuse_idx], val); in sock_prot_inuse_add()
1438 this_cpu_add(net->core.prot_inuse->all, val); in sock_inuse_add()
1455 /* With per-bucket locks this operation is not-atomic, so that
1460 sk->sk_prot->unhash(sk); in __sk_prot_rehash()
1461 return sk->sk_prot->hash(sk); in __sk_prot_rehash()
1467 /* Sockets 0-1023 can't be bound to unless you are superuser */
1484 return &container_of(inode, struct socket_alloc, vfs_inode)->socket; in SOCKET_I()
1489 return &container_of(socket, struct socket_alloc, socket)->vfs_inode; in SOCK_INODE()
1506 return READ_ONCE(sk->sk_prot->sysctl_mem[index]); in sk_prot_mem_limits()
1511 return (amt + PAGE_SIZE - 1) >> PAGE_SHIFT; in sk_mem_pages()
1517 return !!sk->sk_prot->memory_allocated; in sk_has_account()
1526 delta = size - sk->sk_forward_alloc; in sk_wmem_schedule()
1537 delta = size - sk->sk_forward_alloc; in __sk_rmem_schedule()
1552 if (likely(!sk->sk_reserved_mem)) in sk_unused_reserved_mem()
1555 unused_mem = sk->sk_reserved_mem - sk->sk_wmem_queued - in sk_unused_reserved_mem()
1556 atomic_read(&sk->sk_rmem_alloc); in sk_unused_reserved_mem()
1568 reclaimable = sk->sk_forward_alloc - sk_unused_reserved_mem(sk); in sk_mem_reclaim()
1576 sk->sk_reserved_mem = 0; in sk_mem_reclaim_final()
1584 sk_forward_alloc_add(sk, -size); in sk_mem_charge()
1600 * per-address-family lock class.
1604 sk->sk_lock.owned = 0; \
1605 init_waitqueue_head(&sk->sk_lock.wq); \
1606 spin_lock_init(&(sk)->sk_lock.slock); \
1607 debug_check_no_locks_freed((void *)&(sk)->sk_lock, \
1608 sizeof((sk)->sk_lock)); \
1609 lockdep_set_class_and_name(&(sk)->sk_lock.slock, \
1611 lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \
1616 return lockdep_is_held(&sk->sk_lock) || in lockdep_sock_is_held()
1617 lockdep_is_held(&sk->sk_lock.slock); in lockdep_sock_is_held()
1632 #define bh_lock_sock(__sk) spin_lock(&((__sk)->sk_lock.slock))
1634 spin_lock_nested(&((__sk)->sk_lock.slock), \
1636 #define bh_unlock_sock(__sk) spin_unlock(&((__sk)->sk_lock.slock))
1638 bool __lock_sock_fast(struct sock *sk) __acquires(&sk->sk_lock.slock);
1641 * lock_sock_fast - fast version of lock_sock
1656 mutex_acquire(&sk->sk_lock.dep_map, 0, 0, _RET_IP_); in lock_sock_fast()
1664 mutex_acquire(&sk->sk_lock.dep_map, SINGLE_DEPTH_NESTING, 0, _RET_IP_); in lock_sock_fast_nested()
1670 * unlock_sock_fast - complement of lock_sock_fast
1678 __releases(&sk->sk_lock.slock) in unlock_sock_fast()
1682 __release(&sk->sk_lock.slock); in unlock_sock_fast()
1684 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in unlock_sock_fast()
1685 spin_unlock_bh(&sk->sk_lock.slock); in unlock_sock_fast()
1725 return sk->sk_lock.owned; in sock_owned_by_user()
1730 return sk->sk_lock.owned; in sock_owned_by_user_nocheck()
1736 sk->sk_lock.owned = 0; in sock_release_ownership()
1739 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in sock_release_ownership()
1748 !spin_is_locked(&sk->sk_lock.slock); in sock_allow_reclassification()
1775 if (refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_edemux()
1776 skb->sk = sk; in skb_set_owner_edemux()
1777 skb->destructor = sock_edemux; in skb_set_owner_edemux()
1815 if (sk->sk_socket) in sock_replace_proto()
1816 clear_bit(SOCK_SUPPORT_ZC, &sk->sk_socket->flags); in sock_replace_proto()
1817 WRITE_ONCE(sk->sk_prot, proto); in sock_replace_proto()
1832 .tsflags = READ_ONCE(sk->sk_tsflags), in sockcm_init()
1833 .priority = READ_ONCE(sk->sk_priority), in sockcm_init()
1896 * it is called, socket has no references from outside -> sk_free
1913 if (refcount_dec_and_test(&sk->sk_refcnt)) in sock_put()
1931 /* sk_tx_queue_mapping accept only upto a 16-bit value */ in sk_tx_queue_set()
1937 WRITE_ONCE(sk->sk_tx_queue_mapping, tx_queue); in sk_tx_queue_set()
1947 WRITE_ONCE(sk->sk_tx_queue_mapping, NO_QUEUE_MAPPING); in sk_tx_queue_clear()
1956 int val = READ_ONCE(sk->sk_tx_queue_mapping); in sk_tx_queue_get()
1961 return -1; in sk_tx_queue_get()
1973 unlikely(READ_ONCE(sk->sk_rx_queue_mapping) != rx_queue)) in __sk_rx_queue_set()
1974 WRITE_ONCE(sk->sk_rx_queue_mapping, rx_queue); in __sk_rx_queue_set()
1992 WRITE_ONCE(sk->sk_rx_queue_mapping, NO_QUEUE_MAPPING); in sk_rx_queue_clear()
2000 int res = READ_ONCE(sk->sk_rx_queue_mapping); in sk_rx_queue_get()
2007 return -1; in sk_rx_queue_get()
2012 sk->sk_socket = sock; in sk_set_socket()
2018 return &rcu_dereference_raw(sk->sk_wq)->wait; in sk_sleep()
2029 write_lock_bh(&sk->sk_callback_lock); in sock_orphan()
2032 sk->sk_wq = NULL; in sock_orphan()
2033 write_unlock_bh(&sk->sk_callback_lock); in sock_orphan()
2038 WARN_ON(parent->sk); in sock_graft()
2039 write_lock_bh(&sk->sk_callback_lock); in sock_graft()
2040 rcu_assign_pointer(sk->sk_wq, &parent->wq); in sock_graft()
2041 parent->sk = sk; in sock_graft()
2043 sk->sk_uid = SOCK_INODE(parent)->i_uid; in sock_graft()
2045 write_unlock_bh(&sk->sk_callback_lock); in sock_graft()
2054 return sk ? sk->sk_uid : make_kuid(net->user_ns, 0); in sock_net_uid()
2067 WRITE_ONCE(sk->sk_txhash, net_tx_rndhash()); in sk_set_txhash()
2072 if (sk->sk_txhash && sk->sk_txrehash == SOCK_TXREHASH_ENABLED) { in sk_rethink_txhash()
2082 return rcu_dereference_check(sk->sk_dst_cache, in __sk_dst_get()
2092 dst = rcu_dereference(sk->sk_dst_cache); in sk_dst_get()
2093 if (dst && !rcuref_get(&dst->__rcuref)) in sk_dst_get()
2103 if (dst && dst->ops->negative_advice) in __dst_negative_advice()
2104 dst->ops->negative_advice(sk, dst); in __dst_negative_advice()
2119 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in __sk_dst_set()
2120 old_dst = rcu_dereference_protected(sk->sk_dst_cache, in __sk_dst_set()
2122 rcu_assign_pointer(sk->sk_dst_cache, dst); in __sk_dst_set()
2132 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sk_dst_set()
2133 old_dst = unrcu_pointer(xchg(&sk->sk_dst_cache, RCU_INITIALIZER(dst))); in sk_dst_set()
2155 if (!READ_ONCE(sk->sk_dst_pending_confirm)) in sk_dst_confirm()
2156 WRITE_ONCE(sk->sk_dst_pending_confirm, 1); in sk_dst_confirm()
2162 struct sock *sk = skb->sk; in sock_confirm_neigh()
2164 if (sk && READ_ONCE(sk->sk_dst_pending_confirm)) in sock_confirm_neigh()
2165 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sock_confirm_neigh()
2174 return net_gso_ok(sk->sk_route_caps, sk->sk_gso_type); in sk_can_gso()
2181 sk->sk_gso_disabled = 1; in sk_gso_disable()
2182 sk->sk_route_caps &= ~NETIF_F_GSO_MASK; in sk_gso_disable()
2189 if (skb->ip_summed == CHECKSUM_NONE) { in skb_do_copy_data_nocache()
2192 return -EFAULT; in skb_do_copy_data_nocache()
2193 skb->csum = csum_block_add(skb->csum, csum, offset); in skb_do_copy_data_nocache()
2194 } else if (sk->sk_route_caps & NETIF_F_NOCACHE_COPY) { in skb_do_copy_data_nocache()
2196 return -EFAULT; in skb_do_copy_data_nocache()
2198 return -EFAULT; in skb_do_copy_data_nocache()
2206 int err, offset = skb->len; in skb_add_data_nocache()
2224 copy, skb->len); in skb_copy_to_page_nocache()
2235 * sk_wmem_alloc_get - returns write allocations
2242 return refcount_read(&sk->sk_wmem_alloc) - 1; in sk_wmem_alloc_get()
2246 * sk_rmem_alloc_get - returns read allocations
2253 return atomic_read(&sk->sk_rmem_alloc); in sk_rmem_alloc_get()
2257 * sk_has_allocations - check if allocations are outstanding
2268 * skwq_has_sleeper - check if there are any waiting processes
2281 * __add_wait_queue update tp->rcv_nxt
2283 * tp->rcv_nxt check sock_def_readable
2286 * wq = rcu_dereference(sk->sk_wq);
2287 * if (wq && waitqueue_active(&wq->wait))
2288 * wake_up_interruptible(&wq->wait)
2293 * in its cache, and so does the tp->rcv_nxt update on CPU2 side. The CPU1
2300 return wq && wq_has_sleeper(&wq->wait); in skwq_has_sleeper()
2304 * sock_poll_wait - wrapper for the poll_wait call.
2319 poll_wait(filp, &sock->wq.wait, p); in sock_poll_wait()
2325 u32 txhash = READ_ONCE(sk->sk_txhash); in skb_set_hash_from_sk()
2328 skb->l4_hash = 1; in skb_set_hash_from_sk()
2329 skb->hash = txhash; in skb_set_hash_from_sk()
2346 skb->sk = sk; in skb_set_owner_r()
2347 skb->destructor = sock_rfree; in skb_set_owner_r()
2348 atomic_add(skb->truesize, &sk->sk_rmem_alloc); in skb_set_owner_r()
2349 sk_mem_charge(sk, skb->truesize); in skb_set_owner_r()
2354 if (sk && refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_sk_safe()
2356 skb->destructor = sock_efree; in skb_set_owner_sk_safe()
2357 skb->sk = sk; in skb_set_owner_sk_safe()
2367 if (sk_rmem_schedule(sk, skb, skb->truesize)) { in skb_clone_and_charge_r()
2378 if (skb->destructor != sock_wfree) { in skb_prepare_for_gro()
2382 skb->slow_gro = 1; in skb_prepare_for_gro()
2420 if (likely(data_race(!sk->sk_err))) in sock_error()
2423 err = xchg(&sk->sk_err, 0); in sock_error()
2424 return -err; in sock_error()
2433 if (!(sk->sk_shutdown & SEND_SHUTDOWN)) { in sock_wspace()
2434 amt = sk->sk_sndbuf - refcount_read(&sk->sk_wmem_alloc); in sock_wspace()
2442 * We use sk->sk_wq_raw, from contexts knowing this
2451 set_bit(nr, &sk->sk_wq_raw->flags); in sk_set_bit()
2460 clear_bit(nr, &sk->sk_wq_raw->flags); in sk_clear_bit()
2467 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async()
2475 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async_rcu()
2478 /* Since sk_{r,w}mem_alloc sums skb->truesize, even a small frame might
2492 if (sk->sk_userlocks & SOCK_SNDBUF_LOCK) in sk_stream_moderate_sndbuf()
2495 val = min(sk->sk_sndbuf, sk->sk_wmem_queued >> 1); in sk_stream_moderate_sndbuf()
2498 WRITE_ONCE(sk->sk_sndbuf, max_t(u32, val, SOCK_MIN_SNDBUF)); in sk_stream_moderate_sndbuf()
2502 * sk_page_frag - return an appropriate page_frag
2519 if (sk->sk_use_task_frag) in sk_page_frag()
2520 return ¤t->task_frag; in sk_page_frag()
2522 return &sk->sk_frag; in sk_page_frag()
2532 return refcount_read(&sk->sk_wmem_alloc) < (READ_ONCE(sk->sk_sndbuf) >> 1); in sock_writeable()
2547 return noblock ? 0 : sk->sk_rcvtimeo; in sock_rcvtimeo()
2552 return noblock ? 0 : sk->sk_sndtimeo; in sock_sndtimeo()
2557 int v = waitall ? len : min_t(int, READ_ONCE(sk->sk_rcvlowat), len); in sock_rcvlowat()
2567 return timeo == MAX_SCHEDULE_TIMEOUT ? -ERESTARTSYS : -EINTR; in sock_intr_errno()
2574 /* Store sock_skb_cb at the end of skb->cb[] so protocol families
2575 * using skb->cb[] would keep using it directly and utilize its
2578 #define SOCK_SKB_CB_OFFSET ((sizeof_field(struct sk_buff, cb) - \
2581 #define SOCK_SKB_CB(__skb) ((struct sock_skb_cb *)((__skb)->cb + \
2590 SOCK_SKB_CB(skb)->dropcount = sock_flag(sk, SOCK_RXQ_OVFL) ? in sock_skb_set_dropcount()
2591 atomic_read(&sk->sk_drops) : 0; in sock_skb_set_dropcount()
2596 int segs = max_t(u16, 1, skb_shinfo(skb)->gso_segs); in sk_drops_add()
2598 atomic_add(segs, &sk->sk_drops); in sk_drops_add()
2608 seq = read_seqbegin(&sk->sk_stamp_seq); in sock_read_timestamp()
2609 kt = sk->sk_stamp; in sock_read_timestamp()
2610 } while (read_seqretry(&sk->sk_stamp_seq, seq)); in sock_read_timestamp()
2614 return READ_ONCE(sk->sk_stamp); in sock_read_timestamp()
2621 write_seqlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2622 sk->sk_stamp = kt; in sock_write_timestamp()
2623 write_sequnlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2625 WRITE_ONCE(sk->sk_stamp, kt); in sock_write_timestamp()
2638 u32 tsflags = READ_ONCE(sk->sk_tsflags); in sock_recv_timestamp()
2639 ktime_t kt = skb->tstamp; in sock_recv_timestamp()
2642 * - receive time stamping in software requested in sock_recv_timestamp()
2643 * - software time stamp available and wanted in sock_recv_timestamp()
2644 * - hardware time stamps available and wanted in sock_recv_timestamp()
2649 (hwtstamps->hwtstamp && in sock_recv_timestamp()
2662 #define SK_DEFAULT_STAMP (-1L * NSEC_PER_SEC)
2673 if (sk->sk_flags & FLAGS_RECV_CMSGS || in sock_recv_cmsgs()
2674 READ_ONCE(sk->sk_tsflags) & TSFLAGS_ANY) in sock_recv_cmsgs()
2677 sock_write_timestamp(sk, skb->tstamp); in sock_recv_cmsgs()
2685 * _sock_tx_timestamp - checks whether the outgoing packet is to be time stamped
2697 __u32 tsflags = sockc->tsflags; in _sock_tx_timestamp()
2704 *tskey = sockc->ts_opt_id; in _sock_tx_timestamp()
2706 *tskey = atomic_inc_return(&sk->sk_tskey) - 1; in _sock_tx_timestamp()
2723 _sock_tx_timestamp(skb->sk, sockc, &skb_shinfo(skb)->tx_flags, in skb_setup_tx_timestamp()
2724 &skb_shinfo(skb)->tskey); in skb_setup_tx_timestamp()
2729 int family = READ_ONCE(sk->sk_family); in sk_is_inet()
2737 sk->sk_type == SOCK_STREAM && in sk_is_tcp()
2738 sk->sk_protocol == IPPROTO_TCP; in sk_is_tcp()
2744 sk->sk_type == SOCK_DGRAM && in sk_is_udp()
2745 sk->sk_protocol == IPPROTO_UDP; in sk_is_udp()
2750 return sk->sk_family == AF_UNIX && sk->sk_type == SOCK_STREAM; in sk_is_stream_unix()
2755 return sk->sk_family == AF_VSOCK; in sk_is_vsock()
2759 * sk_eat_skb - Release a skb if it is no longer needed
2768 __skb_unlink(skb, &sk->sk_receive_queue); in sk_eat_skb()
2776 return skb->destructor == sock_pfree; in skb_sk_is_prefetched()
2787 return (1 << sk->sk_state) & ~(TCPF_TIME_WAIT | TCPF_NEW_SYN_RECV); in sk_fullsock()
2793 /* Only full sockets have sk->sk_flags. */ in sk_is_refcounted()
2805 struct sock *sk = skb->sk; in sk_validate_xmit_skb()
2807 if (sk && sk_fullsock(sk) && sk->sk_validate_xmit_skb) { in sk_validate_xmit_skb()
2808 skb = sk->sk_validate_xmit_skb(sk, dev, skb); in sk_validate_xmit_skb()
2810 pr_warn_ratelimited("unencrypted skb with no associated socket - dropping\n"); in sk_validate_xmit_skb()
2824 return (1 << sk->sk_state) & (TCPF_LISTEN | TCPF_NEW_SYN_RECV); in sk_listener()
2833 return (1 << READ_ONCE(sk->sk_state)) & in sk_listener_or_tw()
2849 * determination of these values, since that is non-constant across
2870 if (proto->sysctl_wmem_offset) in sk_get_wmem0()
2871 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_wmem_offset)); in sk_get_wmem0()
2873 return READ_ONCE(*proto->sysctl_wmem); in sk_get_wmem0()
2879 if (proto->sysctl_rmem_offset) in sk_get_rmem0()
2880 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_rmem_offset)); in sk_get_rmem0()
2882 return READ_ONCE(*proto->sysctl_rmem); in sk_get_rmem0()
2891 if (!sk || !sk_fullsock(sk) || READ_ONCE(sk->sk_pacing_shift) == val) in sk_pacing_shift_update()
2893 WRITE_ONCE(sk->sk_pacing_shift, val); in sk_pacing_shift_update()
2903 int bound_dev_if = READ_ONCE(sk->sk_bound_dev_if); in sk_dev_equal_l3scope()
2944 if (sk->sk_prot->sock_is_readable) in sk_is_readable()
2945 return sk->sk_prot->sock_is_readable(sk); in sk_is_readable()