Lines Matching +full:ref +full:- +full:clock +full:- +full:period +full:- +full:ns
1 /* SPDX-License-Identifier: GPL-2.0-or-later */
13 * Corey Minyard <wf-rch!minyard@relay.EU.net>
14 * Florian La Roche <flla@stud.uni-sb.de>
57 #include <linux/cgroup-defs.h>
79 /* This is the per-socket lock. The spinlock provides a synchronization
81 * mini-semaphore synchronizes multiple users amongst themselves.
88 * We express the mutex-alike socket_lock semantics
106 * struct sock_common - minimal network layer representation of sockets
109 * @skc_addrpair: 8-byte-aligned __u64 union of @skc_daddr & @skc_rcv_saddr
120 * @skc_net_refcnt: socket is using net ref counting
123 * @skc_portaddr_node: second hash linkage for UDP/UDP-Lite protocol
130 * @skc_nulls_node: main hash linkage for TCP/UDP/UDP-Lite protocol
238 * struct sock - network layer representation of sockets
252 * @psp_assoc: PSP association, if socket is PSP-secured
260 * @sk_reserved_mem: space reserved and non-reclaimable for the socket
277 * @sk_backlog: always used with the per-socket spinlock held
310 * @sk_use_task_frag: allow sk_page_frag() to use current->task_frag.
313 * @sk_bind_phc: SO_TIMESTAMPING bind PHC index of PTP virtual clock
318 * @sk_user_data: RPC layer private data. Write-protected by @sk_callback_lock.
322 * @tcp_rtx_queue: TCP re-transmit queue [union with @sk_send_head]
338 * @sk_rcu: used during RCU grace period
339 * @sk_clockid: clockid used by time-based scheduling (SO_TXTIME)
357 * don't add nothing before this first member (__sk_common) --acme
402 * the per-socket spinlock held and requires low latency
556 #define SK_BPF_CB_FLAG_TEST(SK, FLAG) ((SK)->sk_bpf_cb_flags & (FLAG))
597 * - SK_USER_DATA_NOCOPY: Pointer stored in sk_user_data might
602 * - SK_USER_DATA_BPF: Mark whether sk_user_data field is
606 * - SK_USER_DATA_PSOCK: Mark whether pointer stored in
617 * sk_user_data_is_nocopy - Test if sk_user_data pointer must not be copied
622 return ((uintptr_t)sk->sk_user_data & SK_USER_DATA_NOCOPY); in sk_user_data_is_nocopy()
625 #define __sk_user_data(sk) ((*((void __rcu **)&(sk)->sk_user_data)))
628 * __locked_read_sk_user_data_with_flags - return the pointer
635 * The caller must be holding sk->sk_callback_lock.
643 lockdep_is_held(&sk->sk_callback_lock)); in __locked_read_sk_user_data_with_flags()
653 * __rcu_dereference_sk_user_data_with_flags - return the pointer
690 return read_pnet(&sk->sk_net); in sock_net()
696 write_pnet(&sk->sk_net, net); in sock_net_set()
715 return READ_ONCE(sk->sk_peek_off); in sk_peek_offset()
723 s32 off = READ_ONCE(sk->sk_peek_off); in sk_peek_offset_bwd()
726 off = max_t(s32, off - val, 0); in sk_peek_offset_bwd()
727 WRITE_ONCE(sk->sk_peek_off, off); in sk_peek_offset_bwd()
733 sk_peek_offset_bwd(sk, -val); in sk_peek_offset_fwd()
746 return hlist_entry(head->first, struct sock, sk_node); in __sk_head()
756 return hlist_nulls_entry(head->first, struct sock, sk_nulls_node); in __sk_nulls_head()
766 return hlist_entry_safe(sk->sk_node.next, struct sock, sk_node); in sk_next()
771 return (!is_a_nulls(sk->sk_nulls_node.next)) ? in sk_nulls_next()
772 hlist_nulls_entry(sk->sk_nulls_node.next, in sk_nulls_next()
779 return hlist_unhashed(&sk->sk_node); in sk_unhashed()
789 node->pprev = NULL; in sk_node_init()
794 __hlist_del(&sk->sk_node); in __sk_del_node()
802 sk_node_init(&sk->sk_node); in __sk_del_node_init()
816 refcount_inc(&sk->sk_refcnt); in sock_hold()
824 refcount_dec(&sk->sk_refcnt); in __sock_put()
832 /* paranoid for a while -acme */ in sk_del_node_init()
833 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_del_node_init()
843 hlist_nulls_del_init_rcu(&sk->sk_nulls_node); in __sk_nulls_del_node_init_rcu()
854 /* paranoid for a while -acme */ in sk_nulls_del_node_init_rcu()
855 WARN_ON(refcount_read(&sk->sk_refcnt) == 1); in sk_nulls_del_node_init_rcu()
863 hlist_add_head(&sk->sk_node, list); in __sk_add_node()
875 if (IS_ENABLED(CONFIG_IPV6) && sk->sk_reuseport && in sk_add_node_rcu()
876 sk->sk_family == AF_INET6) in sk_add_node_rcu()
877 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_rcu()
879 hlist_add_head_rcu(&sk->sk_node, list); in sk_add_node_rcu()
885 hlist_add_tail_rcu(&sk->sk_node, list); in sk_add_node_tail_rcu()
890 hlist_nulls_add_head_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_rcu()
895 hlist_nulls_add_tail_rcu(&sk->sk_nulls_node, list); in __sk_nulls_add_node_tail_rcu()
906 __hlist_del(&sk->sk_bind_node); in __sk_del_bind_node()
912 hlist_add_head(&sk->sk_bind_node, list); in sk_add_bind_node()
926 if (__sk && ({ node = &(__sk)->sk_nulls_node; 1; })) \
936 * sk_for_each_entry_offset_rcu - iterate over a list at a given struct offset
946 ({ tpos = (typeof(*tpos) *)((void *)pos - offset); 1;}); \
955 return sk->sk_socket->file->f_cred->user_ns; in sk_user_ns()
969 SOCK_USE_WRITE_QUEUE, /* whether to call sk->sk_write_space in sock_wfree */
982 * user-space instead.
986 SOCK_RCU_FREE, /* wait rcu grace period in sk_destruct() */
997 * The highest bit of sk_tsflags is reserved for kernel-internal
1005 nsk->sk_flags = osk->sk_flags; in sock_copy_flags()
1010 __set_bit(flag, &sk->sk_flags); in sock_set_flag()
1015 __clear_bit(flag, &sk->sk_flags); in sock_reset_flag()
1029 return test_bit(flag, &sk->sk_flags); in sock_flag()
1053 return gfp_mask | (sk->sk_allocation & __GFP_MEMALLOC); in sk_gfp_mask()
1058 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog - 1); in sk_acceptq_removed()
1063 WRITE_ONCE(sk->sk_ack_backlog, sk->sk_ack_backlog + 1); in sk_acceptq_added()
1067 * return READ_ONCE(sk->sk_ack_backlog) >= READ_ONCE(sk->sk_max_ack_backlog);
1072 return READ_ONCE(sk->sk_ack_backlog) > READ_ONCE(sk->sk_max_ack_backlog); in sk_acceptq_is_full()
1080 return READ_ONCE(sk->sk_wmem_queued) >> 1; in sk_stream_min_wspace()
1085 return READ_ONCE(sk->sk_sndbuf) - READ_ONCE(sk->sk_wmem_queued); in sk_stream_wspace()
1090 WRITE_ONCE(sk->sk_wmem_queued, sk->sk_wmem_queued + val); in sk_wmem_queued_add()
1095 /* Paired with lockless reads of sk->sk_forward_alloc */ in sk_forward_alloc_add()
1096 WRITE_ONCE(sk->sk_forward_alloc, sk->sk_forward_alloc + val); in sk_forward_alloc_add()
1107 if (!sk->sk_backlog.tail) in __sk_add_backlog()
1108 WRITE_ONCE(sk->sk_backlog.head, skb); in __sk_add_backlog()
1110 sk->sk_backlog.tail->next = skb; in __sk_add_backlog()
1112 WRITE_ONCE(sk->sk_backlog.tail, skb); in __sk_add_backlog()
1113 skb->next = NULL; in __sk_add_backlog()
1123 unsigned int qsize = sk->sk_backlog.len + atomic_read(&sk->sk_rmem_alloc); in sk_rcvqueues_full()
1128 /* The per-socket spinlock must be held here. */
1133 return -ENOBUFS; in sk_add_backlog()
1141 return -ENOMEM; in sk_add_backlog()
1144 sk->sk_backlog.len += skb->truesize; in sk_add_backlog()
1158 return INDIRECT_CALL_INET(sk->sk_backlog_rcv, in sk_backlog_rcv()
1168 if (unlikely(READ_ONCE(sk->sk_incoming_cpu) != cpu)) in sk_incoming_cpu_update()
1169 WRITE_ONCE(sk->sk_incoming_cpu, cpu); in sk_incoming_cpu_update()
1180 if (unlikely(READ_ONCE(sk->sk_rxhash) != skb->hash)) in sock_rps_save_rxhash()
1181 WRITE_ONCE(sk->sk_rxhash, skb->hash); in sock_rps_save_rxhash()
1189 WRITE_ONCE(sk->sk_rxhash, 0); in sock_rps_reset_rxhash()
1194 ({ int __rc, __dis = __sk->sk_disconnects; \
1204 __rc = __dis == __sk->sk_disconnects ? __condition : -EPIPE; \
1220 if (unlikely(READ_ONCE(sk->sk_backlog.tail))) { in sk_flush_backlog()
1239 * un-modified. Special care is taken when initializing object to zero.
1245 memset(&sk->sk_node.pprev, 0, in sk_prot_clear_nulls()
1246 size - offsetof(struct sock, sk_node.pprev)); in sk_prot_clear_nulls()
1257 * socket layer -> transport layer interface
1383 if (READ_ONCE(sk->sk_wmem_queued) >= READ_ONCE(sk->sk_sndbuf)) in __sk_stream_memory_free()
1386 return sk->sk_prot->stream_memory_free ? in __sk_stream_memory_free()
1387 INDIRECT_CALL_INET_1(sk->sk_prot->stream_memory_free, in __sk_stream_memory_free()
1411 return cgroup_is_descendant(sock_cgroup_ptr(&sk->sk_cgrp_data), in sk_under_cgroup_hierarchy()
1414 return -ENOTSUPP; in sk_under_cgroup_hierarchy()
1422 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, -1, in sk_sockets_allocated_dec()
1428 percpu_counter_add_batch(sk->sk_prot->sockets_allocated, 1, in sk_sockets_allocated_inc()
1435 return percpu_counter_read_positive(sk->sk_prot->sockets_allocated); in sk_sockets_allocated_read_positive()
1441 return percpu_counter_sum_positive(prot->sockets_allocated); in proto_sockets_allocated_sum_positive()
1454 this_cpu_add(net->core.prot_inuse->val[prot->inuse_idx], val); in sock_prot_inuse_add()
1459 this_cpu_add(net->core.prot_inuse->all, val); in sock_inuse_add()
1476 /* With per-bucket locks this operation is not-atomic, so that
1481 sk->sk_prot->unhash(sk); in __sk_prot_rehash()
1482 return sk->sk_prot->hash(sk); in __sk_prot_rehash()
1488 /* Sockets 0-1023 can't be bound to unless you are superuser */
1498 * define SOCK_CONNECT_BIND - &sock->sk_userlocks flag for auto-bind at connect() time
1509 return &container_of(inode, struct socket_alloc, vfs_inode)->socket; in SOCKET_I()
1514 return &container_of(socket, struct socket_alloc, socket)->vfs_inode; in SOCK_INODE()
1531 return READ_ONCE(sk->sk_prot->sysctl_mem[index]); in sk_prot_mem_limits()
1536 return (amt + PAGE_SIZE - 1) >> PAGE_SHIFT; in sk_mem_pages()
1542 return !!sk->sk_prot->memory_allocated; in sk_has_account()
1551 delta = size - sk->sk_forward_alloc; in sk_wmem_schedule()
1562 delta = size - sk->sk_forward_alloc; in __sk_rmem_schedule()
1577 if (likely(!sk->sk_reserved_mem)) in sk_unused_reserved_mem()
1580 unused_mem = sk->sk_reserved_mem - sk->sk_wmem_queued - in sk_unused_reserved_mem()
1581 atomic_read(&sk->sk_rmem_alloc); in sk_unused_reserved_mem()
1593 reclaimable = sk->sk_forward_alloc - sk_unused_reserved_mem(sk); in sk_mem_reclaim()
1601 sk->sk_reserved_mem = 0; in sk_mem_reclaim_final()
1609 sk_forward_alloc_add(sk, -size); in sk_mem_charge()
1624 sk->sk_owner = owner; in sk_owner_set()
1629 sk->sk_owner = NULL; in sk_owner_clear()
1634 module_put(sk->sk_owner); in sk_owner_put()
1654 * per-address-family lock class.
1659 sk->sk_lock.owned = 0; \
1660 init_waitqueue_head(&sk->sk_lock.wq); \
1661 spin_lock_init(&(sk)->sk_lock.slock); \
1662 debug_check_no_locks_freed((void *)&(sk)->sk_lock, \
1663 sizeof((sk)->sk_lock)); \
1664 lockdep_set_class_and_name(&(sk)->sk_lock.slock, \
1666 lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \
1671 return lockdep_is_held(&sk->sk_lock) || in lockdep_sock_is_held()
1672 lockdep_is_held(&sk->sk_lock.slock); in lockdep_sock_is_held()
1687 #define bh_lock_sock(__sk) spin_lock(&((__sk)->sk_lock.slock))
1689 spin_lock_nested(&((__sk)->sk_lock.slock), \
1691 #define bh_unlock_sock(__sk) spin_unlock(&((__sk)->sk_lock.slock))
1693 bool __lock_sock_fast(struct sock *sk) __acquires(&sk->sk_lock.slock);
1696 * lock_sock_fast - fast version of lock_sock
1711 mutex_acquire(&sk->sk_lock.dep_map, 0, 0, _RET_IP_); in lock_sock_fast()
1719 mutex_acquire(&sk->sk_lock.dep_map, SINGLE_DEPTH_NESTING, 0, _RET_IP_); in lock_sock_fast_nested()
1725 * unlock_sock_fast - complement of lock_sock_fast
1733 __releases(&sk->sk_lock.slock) in unlock_sock_fast()
1737 __release(&sk->sk_lock.slock); in unlock_sock_fast()
1739 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in unlock_sock_fast()
1740 spin_unlock_bh(&sk->sk_lock.slock); in unlock_sock_fast()
1746 bool sockopt_ns_capable(struct user_namespace *ns, int cap);
1780 return sk->sk_lock.owned; in sock_owned_by_user()
1785 return sk->sk_lock.owned; in sock_owned_by_user_nocheck()
1791 sk->sk_lock.owned = 0; in sock_release_ownership()
1794 mutex_release(&sk->sk_lock.dep_map, _RET_IP_); in sock_release_ownership()
1803 !spin_is_locked(&sk->sk_lock.slock); in sock_allow_reclassification()
1829 if (refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_edemux()
1830 skb->sk = sk; in skb_set_owner_edemux()
1831 skb->destructor = sock_edemux; in skb_set_owner_edemux()
1871 if (sk->sk_socket) in sock_replace_proto()
1872 clear_bit(SOCK_SUPPORT_ZC, &sk->sk_socket->flags); in sock_replace_proto()
1873 WRITE_ONCE(sk->sk_prot, proto); in sock_replace_proto()
1889 .mark = READ_ONCE(sk->sk_mark), in sockcm_init()
1890 .tsflags = READ_ONCE(sk->sk_tsflags), in sockcm_init()
1891 .priority = READ_ONCE(sk->sk_priority), in sockcm_init()
1954 * it is called, socket has no references from outside -> sk_free
1971 if (refcount_dec_and_test(&sk->sk_refcnt)) in sock_put()
1989 /* sk_tx_queue_mapping accept only upto a 16-bit value */ in sk_tx_queue_set()
1995 WRITE_ONCE(sk->sk_tx_queue_mapping, tx_queue); in sk_tx_queue_set()
2005 WRITE_ONCE(sk->sk_tx_queue_mapping, NO_QUEUE_MAPPING); in sk_tx_queue_clear()
2014 int val = READ_ONCE(sk->sk_tx_queue_mapping); in sk_tx_queue_get()
2019 return -1; in sk_tx_queue_get()
2031 unlikely(READ_ONCE(sk->sk_rx_queue_mapping) != rx_queue)) in __sk_rx_queue_set()
2032 WRITE_ONCE(sk->sk_rx_queue_mapping, rx_queue); in __sk_rx_queue_set()
2050 WRITE_ONCE(sk->sk_rx_queue_mapping, NO_QUEUE_MAPPING); in sk_rx_queue_clear()
2058 int res = READ_ONCE(sk->sk_rx_queue_mapping); in sk_rx_queue_get()
2065 return -1; in sk_rx_queue_get()
2070 sk->sk_socket = sock; in sk_set_socket()
2072 WRITE_ONCE(sk->sk_uid, SOCK_INODE(sock)->i_uid); in sk_set_socket()
2073 WRITE_ONCE(sk->sk_ino, SOCK_INODE(sock)->i_ino); in sk_set_socket()
2076 WRITE_ONCE(sk->sk_ino, 0); in sk_set_socket()
2083 return &rcu_dereference_raw(sk->sk_wq)->wait; in sk_sleep()
2094 write_lock_bh(&sk->sk_callback_lock); in sock_orphan()
2097 sk->sk_wq = NULL; in sock_orphan()
2098 write_unlock_bh(&sk->sk_callback_lock); in sock_orphan()
2103 WARN_ON(parent->sk); in sock_graft()
2104 write_lock_bh(&sk->sk_callback_lock); in sock_graft()
2105 rcu_assign_pointer(sk->sk_wq, &parent->wq); in sock_graft()
2106 parent->sk = sk; in sock_graft()
2109 write_unlock_bh(&sk->sk_callback_lock); in sock_graft()
2115 return READ_ONCE(sk->sk_ino); in sock_i_ino()
2121 return READ_ONCE(sk->sk_uid); in sk_uid()
2126 return sk ? sk_uid(sk) : make_kuid(net->user_ns, 0); in sock_net_uid()
2139 WRITE_ONCE(sk->sk_txhash, net_tx_rndhash()); in sk_set_txhash()
2144 if (sk->sk_txhash && sk->sk_txrehash == SOCK_TXREHASH_ENABLED) { in sk_rethink_txhash()
2154 return rcu_dereference_check(sk->sk_dst_cache, in __sk_dst_get()
2164 dst = rcu_dereference(sk->sk_dst_cache); in sk_dst_get()
2165 if (dst && !rcuref_get(&dst->__rcuref)) in sk_dst_get()
2175 if (dst && dst->ops->negative_advice) in __dst_negative_advice()
2176 dst->ops->negative_advice(sk, dst); in __dst_negative_advice()
2191 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in __sk_dst_set()
2192 old_dst = rcu_dereference_protected(sk->sk_dst_cache, in __sk_dst_set()
2194 rcu_assign_pointer(sk->sk_dst_cache, dst); in __sk_dst_set()
2204 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sk_dst_set()
2205 old_dst = unrcu_pointer(xchg(&sk->sk_dst_cache, RCU_INITIALIZER(dst))); in sk_dst_set()
2227 if (!READ_ONCE(sk->sk_dst_pending_confirm)) in sk_dst_confirm()
2228 WRITE_ONCE(sk->sk_dst_pending_confirm, 1); in sk_dst_confirm()
2234 struct sock *sk = skb->sk; in sock_confirm_neigh()
2236 if (sk && READ_ONCE(sk->sk_dst_pending_confirm)) in sock_confirm_neigh()
2237 WRITE_ONCE(sk->sk_dst_pending_confirm, 0); in sock_confirm_neigh()
2246 return net_gso_ok(sk->sk_route_caps, sk->sk_gso_type); in sk_can_gso()
2253 sk->sk_gso_disabled = 1; in sk_gso_disable()
2254 sk->sk_route_caps &= ~NETIF_F_GSO_MASK; in sk_gso_disable()
2261 if (skb->ip_summed == CHECKSUM_NONE) { in skb_do_copy_data_nocache()
2264 return -EFAULT; in skb_do_copy_data_nocache()
2265 skb->csum = csum_block_add(skb->csum, csum, offset); in skb_do_copy_data_nocache()
2266 } else if (sk->sk_route_caps & NETIF_F_NOCACHE_COPY) { in skb_do_copy_data_nocache()
2268 return -EFAULT; in skb_do_copy_data_nocache()
2270 return -EFAULT; in skb_do_copy_data_nocache()
2278 int err, offset = skb->len; in skb_add_data_nocache()
2296 copy, skb->len); in skb_copy_to_page_nocache()
2307 * sk_wmem_alloc_get - returns write allocations
2314 return refcount_read(&sk->sk_wmem_alloc) - 1; in sk_wmem_alloc_get()
2318 * sk_rmem_alloc_get - returns read allocations
2325 return atomic_read(&sk->sk_rmem_alloc); in sk_rmem_alloc_get()
2329 * sk_has_allocations - check if allocations are outstanding
2340 * skwq_has_sleeper - check if there are any waiting processes
2353 * __add_wait_queue update tp->rcv_nxt
2355 * tp->rcv_nxt check sock_def_readable
2358 * wq = rcu_dereference(sk->sk_wq);
2359 * if (wq && waitqueue_active(&wq->wait))
2360 * wake_up_interruptible(&wq->wait)
2365 * in its cache, and so does the tp->rcv_nxt update on CPU2 side. The CPU1
2372 return wq && wq_has_sleeper(&wq->wait); in skwq_has_sleeper()
2376 * sock_poll_wait - wrapper for the poll_wait call.
2391 poll_wait(filp, &sock->wq.wait, p); in sock_poll_wait()
2397 u32 txhash = READ_ONCE(sk->sk_txhash); in skb_set_hash_from_sk()
2400 skb->l4_hash = 1; in skb_set_hash_from_sk()
2401 skb->hash = txhash; in skb_set_hash_from_sk()
2418 skb->sk = sk; in skb_set_owner_r()
2419 skb->destructor = sock_rfree; in skb_set_owner_r()
2420 atomic_add(skb->truesize, &sk->sk_rmem_alloc); in skb_set_owner_r()
2421 sk_mem_charge(sk, skb->truesize); in skb_set_owner_r()
2426 if (sk && refcount_inc_not_zero(&sk->sk_refcnt)) { in skb_set_owner_sk_safe()
2428 skb->destructor = sock_efree; in skb_set_owner_sk_safe()
2429 skb->sk = sk; in skb_set_owner_sk_safe()
2439 if (sk_rmem_schedule(sk, skb, skb->truesize)) { in skb_clone_and_charge_r()
2450 if (skb->destructor != sock_wfree) { in skb_prepare_for_gro()
2454 skb->slow_gro = 1; in skb_prepare_for_gro()
2492 if (likely(data_race(!sk->sk_err))) in sock_error()
2495 err = xchg(&sk->sk_err, 0); in sock_error()
2496 return -err; in sock_error()
2505 if (!(sk->sk_shutdown & SEND_SHUTDOWN)) { in sock_wspace()
2506 amt = sk->sk_sndbuf - refcount_read(&sk->sk_wmem_alloc); in sock_wspace()
2514 * We use sk->sk_wq_raw, from contexts knowing this
2523 set_bit(nr, &sk->sk_wq_raw->flags); in sk_set_bit()
2532 clear_bit(nr, &sk->sk_wq_raw->flags); in sk_clear_bit()
2539 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async()
2547 sock_wake_async(rcu_dereference(sk->sk_wq), how, band); in sk_wake_async_rcu()
2550 /* Since sk_{r,w}mem_alloc sums skb->truesize, even a small frame might
2564 if (sk->sk_userlocks & SOCK_SNDBUF_LOCK) in sk_stream_moderate_sndbuf()
2567 val = min(sk->sk_sndbuf, sk->sk_wmem_queued >> 1); in sk_stream_moderate_sndbuf()
2570 WRITE_ONCE(sk->sk_sndbuf, max_t(u32, val, SOCK_MIN_SNDBUF)); in sk_stream_moderate_sndbuf()
2574 * sk_page_frag - return an appropriate page_frag
2591 if (sk->sk_use_task_frag) in sk_page_frag()
2592 return ¤t->task_frag; in sk_page_frag()
2594 return &sk->sk_frag; in sk_page_frag()
2604 return refcount_read(&sk->sk_wmem_alloc) < (READ_ONCE(sk->sk_sndbuf) >> 1); in sock_writeable()
2620 return sk->sk_memcg; in mem_cgroup_from_sk()
2634 return !!memcg->tcpmem_pressure; in mem_cgroup_sk_under_memory_pressure()
2663 return noblock ? 0 : READ_ONCE(sk->sk_rcvtimeo); in sock_rcvtimeo()
2668 return noblock ? 0 : READ_ONCE(sk->sk_sndtimeo); in sock_sndtimeo()
2673 int v = waitall ? len : min_t(int, READ_ONCE(sk->sk_rcvlowat), len); in sock_rcvlowat()
2683 return timeo == MAX_SCHEDULE_TIMEOUT ? -ERESTARTSYS : -EINTR; in sock_intr_errno()
2690 /* Store sock_skb_cb at the end of skb->cb[] so protocol families
2691 * using skb->cb[] would keep using it directly and utilize its
2694 #define SOCK_SKB_CB_OFFSET (sizeof_field(struct sk_buff, cb) - \
2697 #define SOCK_SKB_CB(__skb) ((struct sock_skb_cb *)((__skb)->cb + \
2705 struct numa_drop_counters *ndc = sk->sk_drop_counters; in sk_drops_add()
2710 atomic_add(segs, &sk->sk_drops); in sk_drops_add()
2720 const struct numa_drop_counters *ndc = sk->sk_drop_counters; in sk_drops_read()
2723 DEBUG_NET_WARN_ON_ONCE(atomic_read(&sk->sk_drops)); in sk_drops_read()
2726 return atomic_read(&sk->sk_drops); in sk_drops_read()
2731 struct numa_drop_counters *ndc = sk->sk_drop_counters; in sk_drops_reset()
2735 atomic_set(&sk->sk_drops, 0); in sk_drops_reset()
2741 SOCK_SKB_CB(skb)->dropcount = sock_flag(sk, SOCK_RXQ_OVFL) ? in sock_skb_set_dropcount()
2747 int segs = max_t(u16, 1, skb_shinfo(skb)->gso_segs); in sk_drops_skbadd()
2759 seq = read_seqbegin(&sk->sk_stamp_seq); in sock_read_timestamp()
2760 kt = sk->sk_stamp; in sock_read_timestamp()
2761 } while (read_seqretry(&sk->sk_stamp_seq, seq)); in sock_read_timestamp()
2765 return READ_ONCE(sk->sk_stamp); in sock_read_timestamp()
2772 write_seqlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2773 sk->sk_stamp = kt; in sock_write_timestamp()
2774 write_sequnlock(&sk->sk_stamp_seq); in sock_write_timestamp()
2776 WRITE_ONCE(sk->sk_stamp, kt); in sock_write_timestamp()
2793 u32 tsflags = READ_ONCE(sk->sk_tsflags); in sock_recv_timestamp()
2794 ktime_t kt = skb->tstamp; in sock_recv_timestamp()
2797 * - receive time stamping in software requested in sock_recv_timestamp()
2798 * - software time stamp available and wanted in sock_recv_timestamp()
2799 * - hardware time stamps available and wanted in sock_recv_timestamp()
2804 (hwtstamps->hwtstamp && in sock_recv_timestamp()
2817 #define SK_DEFAULT_STAMP (-1L * NSEC_PER_SEC)
2829 if (READ_ONCE(sk->sk_flags) & FLAGS_RECV_CMSGS) in sock_recv_cmsgs()
2832 sock_write_timestamp(sk, skb->tstamp); in sock_recv_cmsgs()
2840 * _sock_tx_timestamp - checks whether the outgoing packet is to be time stamped
2852 __u32 tsflags = sockc->tsflags; in _sock_tx_timestamp()
2859 *tskey = sockc->ts_opt_id; in _sock_tx_timestamp()
2861 *tskey = atomic_inc_return(&sk->sk_tskey) - 1; in _sock_tx_timestamp()
2876 _sock_tx_timestamp(skb->sk, sockc, &skb_shinfo(skb)->tx_flags, in skb_setup_tx_timestamp()
2877 &skb_shinfo(skb)->tskey); in skb_setup_tx_timestamp()
2882 int family = READ_ONCE(sk->sk_family); in sk_is_inet()
2890 sk->sk_type == SOCK_STREAM && in sk_is_tcp()
2891 sk->sk_protocol == IPPROTO_TCP; in sk_is_tcp()
2897 sk->sk_type == SOCK_DGRAM && in sk_is_udp()
2898 sk->sk_protocol == IPPROTO_UDP; in sk_is_udp()
2903 return sk->sk_family == AF_UNIX; in sk_is_unix()
2908 return sk_is_unix(sk) && sk->sk_type == SOCK_STREAM; in sk_is_stream_unix()
2913 return sk->sk_family == AF_VSOCK; in sk_is_vsock()
2918 return (IS_ENABLED(CONFIG_UNIX) && sk->sk_family == AF_UNIX) || in sk_may_scm_recv()
2919 sk->sk_family == AF_NETLINK || in sk_may_scm_recv()
2920 (IS_ENABLED(CONFIG_BT) && sk->sk_family == AF_BLUETOOTH); in sk_may_scm_recv()
2924 * sk_eat_skb - Release a skb if it is no longer needed
2933 __skb_unlink(skb, &sk->sk_receive_queue); in sk_eat_skb()
2941 return skb->destructor == sock_pfree; in skb_sk_is_prefetched()
2952 return (1 << sk->sk_state) & ~(TCPF_TIME_WAIT | TCPF_NEW_SYN_RECV); in sk_fullsock()
2958 /* Only full sockets have sk->sk_flags. */ in sk_is_refcounted()
2973 return (1 << sk->sk_state) & (TCPF_LISTEN | TCPF_NEW_SYN_RECV); in sk_listener()
2982 return (1 << READ_ONCE(sk->sk_state)) & in sk_listener_or_tw()
2998 * determination of these values, since that is non-constant across
3019 if (proto->sysctl_wmem_offset) in sk_get_wmem0()
3020 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_wmem_offset)); in sk_get_wmem0()
3022 return READ_ONCE(*proto->sysctl_wmem); in sk_get_wmem0()
3028 if (proto->sysctl_rmem_offset) in sk_get_rmem0()
3029 return READ_ONCE(*(int *)((void *)sock_net(sk) + proto->sysctl_rmem_offset)); in sk_get_rmem0()
3031 return READ_ONCE(*proto->sysctl_rmem); in sk_get_rmem0()
3040 if (!sk || !sk_fullsock(sk) || READ_ONCE(sk->sk_pacing_shift) == val) in sk_pacing_shift_update()
3042 WRITE_ONCE(sk->sk_pacing_shift, val); in sk_pacing_shift_update()
3052 int bound_dev_if = READ_ONCE(sk->sk_bound_dev_if); in sk_dev_equal_l3scope()
3099 const struct proto *prot = READ_ONCE(sk->sk_prot); in sk_is_readable()
3101 if (prot->sock_is_readable) in sk_is_readable()
3102 return prot->sock_is_readable(sk); in sk_is_readable()