Blame view
include/net/sock.h
52.1 KB
1da177e4c Linux-2.6.12-rc2 |
1 2 3 4 5 6 7 8 9 |
/* * INET An implementation of the TCP/IP protocol suite for the LINUX * operating system. INET is implemented using the BSD Socket * interface as the means of communication with the user level. * * Definitions for the AF_INET socket handler. * * Version: @(#)sock.h 1.0.4 05/13/93 * |
02c30a84e [PATCH] update Ro... |
10 |
* Authors: Ross Biro |
1da177e4c Linux-2.6.12-rc2 |
11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 |
* Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> * Corey Minyard <wf-rch!minyard@relay.EU.net> * Florian La Roche <flla@stud.uni-sb.de> * * Fixes: * Alan Cox : Volatiles in skbuff pointers. See * skbuff comments. May be overdone, * better to prove they can be removed * than the reverse. * Alan Cox : Added a zapped field for tcp to note * a socket is reset and must stay shut up * Alan Cox : New fields for options * Pauline Middelink : identd support * Alan Cox : Eliminate low level recv/recvfrom * David S. Miller : New socket lookup architecture. * Steve Whitehouse: Default routines for sock_ops * Arnaldo C. Melo : removed net_pinfo, tp_pinfo and made * protinfo be just a void pointer, as the * protocol specific parts were moved to * respective headers and ipv4/v6, etc now * use private slabcaches for its socks * Pedro Hortas : New flags field for socket options * * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. */ #ifndef _SOCK_H #define _SOCK_H |
a6b7a4078 net: remove inter... |
42 |
#include <linux/hardirq.h> |
172589ccd [NET]: DIV_ROUND_... |
43 |
#include <linux/kernel.h> |
1da177e4c Linux-2.6.12-rc2 |
44 |
#include <linux/list.h> |
88ab1932e udp: Use hlist_nu... |
45 |
#include <linux/list_nulls.h> |
1da177e4c Linux-2.6.12-rc2 |
46 47 |
#include <linux/timer.h> #include <linux/cache.h> |
a5b5bb9a0 [PATCH] lockdep: ... |
48 |
#include <linux/lockdep.h> |
1da177e4c Linux-2.6.12-rc2 |
49 50 |
#include <linux/netdevice.h> #include <linux/skbuff.h> /* struct sk_buff */ |
d7fe0f241 [PATCH] severing ... |
51 |
#include <linux/mm.h> |
1da177e4c Linux-2.6.12-rc2 |
52 |
#include <linux/security.h> |
5a0e3ad6a include cleanup: ... |
53 |
#include <linux/slab.h> |
c6e1a0d12 net: Allow no-cac... |
54 |
#include <linux/uaccess.h> |
1da177e4c Linux-2.6.12-rc2 |
55 56 |
#include <linux/filter.h> |
88ab1932e udp: Use hlist_nu... |
57 |
#include <linux/rculist_nulls.h> |
a57de0b43 net: adding memor... |
58 |
#include <linux/poll.h> |
1da177e4c Linux-2.6.12-rc2 |
59 |
|
c31504dc0 udp: use atomic_i... |
60 |
#include <linux/atomic.h> |
1da177e4c Linux-2.6.12-rc2 |
61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 |
#include <net/dst.h> #include <net/checksum.h> /* * This structure really needs to be cleaned up. * Most of it is for TCP, and not used by any of * the other protocols. */ /* Define this to get the SOCK_DBG debugging facility. */ #define SOCK_DEBUGGING #ifdef SOCK_DEBUGGING #define SOCK_DEBUG(sk, msg...) do { if ((sk) && sock_flag((sk), SOCK_DBG)) \ printk(KERN_DEBUG msg); } while (0) #else |
4cd9029d2 socket: SOCK_DEBU... |
76 |
/* Validate arguments and do nothing */ |
b9075fa96 treewide: use __p... |
77 78 |
static inline __printf(2, 3) void SOCK_DEBUG(struct sock *sk, const char *msg, ...) |
4cd9029d2 socket: SOCK_DEBU... |
79 80 |
{ } |
1da177e4c Linux-2.6.12-rc2 |
81 82 83 84 85 86 |
#endif /* This is the per-socket lock. The spinlock provides a synchronization * between user contexts and software interrupt processing, whereas the * mini-semaphore synchronizes multiple users amongst themselves. */ |
1da177e4c Linux-2.6.12-rc2 |
87 88 |
typedef struct { spinlock_t slock; |
d2e9117c7 [NET]: Change typ... |
89 |
int owned; |
1da177e4c Linux-2.6.12-rc2 |
90 |
wait_queue_head_t wq; |
a5b5bb9a0 [PATCH] lockdep: ... |
91 92 93 94 95 96 97 98 99 |
/* * We express the mutex-alike socket_lock semantics * to the lock validator by explicitly managing * the slock as a lock variant (in addition to * the slock itself): */ #ifdef CONFIG_DEBUG_LOCK_ALLOC struct lockdep_map dep_map; #endif |
1da177e4c Linux-2.6.12-rc2 |
100 |
} socket_lock_t; |
1da177e4c Linux-2.6.12-rc2 |
101 |
struct sock; |
8feaf0c0a [INET]: Generalis... |
102 |
struct proto; |
0eeb8ffcf [NET]: netns comp... |
103 |
struct net; |
1da177e4c Linux-2.6.12-rc2 |
104 105 |
/** |
4dc3b16ba [PATCH] DocBook: ... |
106 |
* struct sock_common - minimal network layer representation of sockets |
68835aba4 net: optimize INE... |
107 108 |
* @skc_daddr: Foreign IPv4 addr * @skc_rcv_saddr: Bound local IPv4 addr |
4dc6dc716 net: sock_copy() ... |
109 |
* @skc_hash: hash value used with various protocol lookup tables |
d4cada4ae udp: split sk_has... |
110 |
* @skc_u16hashes: two u16 hash values used by UDP lookup tables |
4dc3b16ba [PATCH] DocBook: ... |
111 112 113 114 |
* @skc_family: network address family * @skc_state: Connection state * @skc_reuse: %SO_REUSEADDR setting * @skc_bound_dev_if: bound device index if != 0 |
4dc3b16ba [PATCH] DocBook: ... |
115 |
* @skc_bind_node: bind hash linkage for various protocol lookup tables |
512615b6b udp: secondary ha... |
116 |
* @skc_portaddr_node: second hash linkage for UDP/UDP-Lite protocol |
8feaf0c0a [INET]: Generalis... |
117 |
* @skc_prot: protocol handlers inside a network family |
07feaebfc [NET]: Add a netw... |
118 |
* @skc_net: reference to the network namespace of this socket |
68835aba4 net: optimize INE... |
119 120 121 122 |
* @skc_node: main hash linkage for various protocol lookup tables * @skc_nulls_node: main hash linkage for TCP/UDP/UDP-Lite protocol * @skc_tx_queue_mapping: tx queue number for this connection * @skc_refcnt: reference count |
4dc3b16ba [PATCH] DocBook: ... |
123 124 |
* * This is the minimal network layer representation of sockets, the header |
8feaf0c0a [INET]: Generalis... |
125 126 |
* for struct sock and struct inet_timewait_sock. */ |
1da177e4c Linux-2.6.12-rc2 |
127 |
struct sock_common { |
68835aba4 net: optimize INE... |
128 129 |
/* skc_daddr and skc_rcv_saddr must be grouped : * cf INET_MATCH() and INET_TW_MATCH() |
4dc6dc716 net: sock_copy() ... |
130 |
*/ |
68835aba4 net: optimize INE... |
131 132 |
__be32 skc_daddr; __be32 skc_rcv_saddr; |
4dc6dc716 net: sock_copy() ... |
133 |
|
d4cada4ae udp: split sk_has... |
134 135 136 137 |
union { unsigned int skc_hash; __u16 skc_u16hashes[2]; }; |
4dc6dc716 net: sock_copy() ... |
138 139 140 141 |
unsigned short skc_family; volatile unsigned char skc_state; unsigned char skc_reuse; int skc_bound_dev_if; |
512615b6b udp: secondary ha... |
142 143 144 145 |
union { struct hlist_node skc_bind_node; struct hlist_nulls_node skc_portaddr_node; }; |
8feaf0c0a [INET]: Generalis... |
146 |
struct proto *skc_prot; |
3b1e0a655 [NET] NETNS: Omit... |
147 |
#ifdef CONFIG_NET_NS |
07feaebfc [NET]: Add a netw... |
148 |
struct net *skc_net; |
3b1e0a655 [NET] NETNS: Omit... |
149 |
#endif |
68835aba4 net: optimize INE... |
150 151 152 153 |
/* * fields between dontcopy_begin/dontcopy_end * are not copied in sock_copy() */ |
928c41e7a net/sock.h: make ... |
154 |
/* private: */ |
68835aba4 net: optimize INE... |
155 |
int skc_dontcopy_begin[0]; |
928c41e7a net/sock.h: make ... |
156 |
/* public: */ |
68835aba4 net: optimize INE... |
157 158 159 160 161 162 |
union { struct hlist_node skc_node; struct hlist_nulls_node skc_nulls_node; }; int skc_tx_queue_mapping; atomic_t skc_refcnt; |
928c41e7a net/sock.h: make ... |
163 |
/* private: */ |
68835aba4 net: optimize INE... |
164 |
int skc_dontcopy_end[0]; |
928c41e7a net/sock.h: make ... |
165 |
/* public: */ |
1da177e4c Linux-2.6.12-rc2 |
166 167 168 169 |
}; /** * struct sock - network layer representation of sockets |
8feaf0c0a [INET]: Generalis... |
170 |
* @__sk_common: shared layout with inet_timewait_sock |
4dc3b16ba [PATCH] DocBook: ... |
171 172 173 174 |
* @sk_shutdown: mask of %SEND_SHUTDOWN and/or %RCV_SHUTDOWN * @sk_userlocks: %SO_SNDBUF and %SO_RCVBUF settings * @sk_lock: synchronizer * @sk_rcvbuf: size of receive buffer in bytes |
438154823 net: sock_def_rea... |
175 |
* @sk_wq: sock wait queue and async head |
4dc3b16ba [PATCH] DocBook: ... |
176 177 178 |
* @sk_dst_cache: destination cache * @sk_dst_lock: destination cache lock * @sk_policy: flow policy |
4dc3b16ba [PATCH] DocBook: ... |
179 180 181 |
* @sk_receive_queue: incoming packets * @sk_wmem_alloc: transmit queue bytes committed * @sk_write_queue: Packet sending queue |
97fc2f084 [I/OAT]: Structur... |
182 |
* @sk_async_wait_queue: DMA copied packets |
4dc3b16ba [PATCH] DocBook: ... |
183 184 185 186 187 |
* @sk_omem_alloc: "o" is "option" or "other" * @sk_wmem_queued: persistent queue size * @sk_forward_alloc: space allocated forward * @sk_allocation: allocation mode * @sk_sndbuf: size of send buffer in bytes |
33c732c36 [IPV4]: Add raw d... |
188 |
* @sk_flags: %SO_LINGER (l_onoff), %SO_BROADCAST, %SO_KEEPALIVE, |
20d494735 net: socket infra... |
189 |
* %SO_OOBINLINE settings, %SO_TIMESTAMPING settings |
4dc3b16ba [PATCH] DocBook: ... |
190 191 |
* @sk_no_check: %SO_NO_CHECK setting, wether or not checkup packets * @sk_route_caps: route capabilities (e.g. %NETIF_F_TSO) |
a465419b1 net: Introduce sk... |
192 |
* @sk_route_nocaps: forbidden route capabilities (e.g NETIF_F_GSO_MASK) |
bcd761111 [NET]: Generalise... |
193 |
* @sk_gso_type: GSO type (e.g. %SKB_GSO_TCPV4) |
82cc1a7a5 [NET]: Add per-co... |
194 |
* @sk_gso_max_size: Maximum GSO segment size to build |
4dc3b16ba [PATCH] DocBook: ... |
195 |
* @sk_lingertime: %SO_LINGER l_linger setting |
4dc3b16ba [PATCH] DocBook: ... |
196 197 198 |
* @sk_backlog: always used with the per-socket spinlock held * @sk_callback_lock: used with the callbacks in the end of this struct * @sk_error_queue: rarely used |
33c732c36 [IPV4]: Add raw d... |
199 200 |
* @sk_prot_creator: sk_prot of original sock creator (see ipv6_setsockopt, * IPV6_ADDRFORM for instance) |
4dc3b16ba [PATCH] DocBook: ... |
201 |
* @sk_err: last error |
33c732c36 [IPV4]: Add raw d... |
202 203 |
* @sk_err_soft: errors that don't cause failure but are the cause of a * persistent failure not just 'timed out' |
cb61cb9b8 udp: sk_drops han... |
204 |
* @sk_drops: raw/udp drops counter |
4dc3b16ba [PATCH] DocBook: ... |
205 206 207 208 209 |
* @sk_ack_backlog: current listen backlog * @sk_max_ack_backlog: listen backlog set in listen() * @sk_priority: %SO_PRIORITY setting * @sk_type: socket type (%SOCK_STREAM, etc) * @sk_protocol: which protocol this socket belongs in this network family |
53c3fa206 net/sock.h: add m... |
210 211 |
* @sk_peer_pid: &struct pid for this socket's peer * @sk_peer_cred: %SO_PEERCRED setting |
4dc3b16ba [PATCH] DocBook: ... |
212 213 214 |
* @sk_rcvlowat: %SO_RCVLOWAT setting * @sk_rcvtimeo: %SO_RCVTIMEO setting * @sk_sndtimeo: %SO_SNDTIMEO setting |
c58dc01ba net: Make RFS soc... |
215 |
* @sk_rxhash: flow hash received from netif layer |
4dc3b16ba [PATCH] DocBook: ... |
216 217 218 219 220 221 222 223 224 |
* @sk_filter: socket filtering instructions * @sk_protinfo: private area, net family specific, when not using slab * @sk_timer: sock cleanup timer * @sk_stamp: time stamp of last packet received * @sk_socket: Identd and reporting IO signals * @sk_user_data: RPC layer private data * @sk_sndmsg_page: cached page for sendmsg * @sk_sndmsg_off: cached offset for sendmsg * @sk_send_head: front of stuff to transmit |
67be2dd1b [PATCH] DocBook: ... |
225 |
* @sk_security: used by security modules |
317293634 net: fix kernel-d... |
226 |
* @sk_mark: generic packet mark |
53c3fa206 net/sock.h: add m... |
227 |
* @sk_classid: this socket's cgroup classid |
4dc3b16ba [PATCH] DocBook: ... |
228 229 230 231 232 233 234 |
* @sk_write_pending: a write to stream socket waits to start * @sk_state_change: callback to indicate change in the state of the sock * @sk_data_ready: callback to indicate there is data to be processed * @sk_write_space: callback to indicate there is bf sending space available * @sk_error_report: callback to indicate errors (e.g. %MSG_ERRQUEUE) * @sk_backlog_rcv: callback to process the backlog * @sk_destruct: called at sock freeing time, i.e. when all refcnt == 0 |
1da177e4c Linux-2.6.12-rc2 |
235 236 237 |
*/ struct sock { /* |
8feaf0c0a [INET]: Generalis... |
238 |
* Now struct inet_timewait_sock also uses sock_common, so please just |
1da177e4c Linux-2.6.12-rc2 |
239 240 241 |
* don't add nothing before this first member (__sk_common) --acme */ struct sock_common __sk_common; |
4dc6dc716 net: sock_copy() ... |
242 243 244 |
#define sk_node __sk_common.skc_node #define sk_nulls_node __sk_common.skc_nulls_node #define sk_refcnt __sk_common.skc_refcnt |
e022f0b4a net: Introduce sk... |
245 |
#define sk_tx_queue_mapping __sk_common.skc_tx_queue_mapping |
4dc6dc716 net: sock_copy() ... |
246 |
|
68835aba4 net: optimize INE... |
247 248 |
#define sk_dontcopy_begin __sk_common.skc_dontcopy_begin #define sk_dontcopy_end __sk_common.skc_dontcopy_end |
4dc6dc716 net: sock_copy() ... |
249 |
#define sk_hash __sk_common.skc_hash |
1da177e4c Linux-2.6.12-rc2 |
250 251 252 253 |
#define sk_family __sk_common.skc_family #define sk_state __sk_common.skc_state #define sk_reuse __sk_common.skc_reuse #define sk_bound_dev_if __sk_common.skc_bound_dev_if |
1da177e4c Linux-2.6.12-rc2 |
254 |
#define sk_bind_node __sk_common.skc_bind_node |
8feaf0c0a [INET]: Generalis... |
255 |
#define sk_prot __sk_common.skc_prot |
07feaebfc [NET]: Add a netw... |
256 |
#define sk_net __sk_common.skc_net |
1da177e4c Linux-2.6.12-rc2 |
257 |
socket_lock_t sk_lock; |
b178bb3df net: reorder stru... |
258 |
struct sk_buff_head sk_receive_queue; |
fa438ccfd [NET]: Keep sk_ba... |
259 260 261 262 |
/* * The backlog queue is special, it is always used with * the per-socket spinlock held and requires low latency * access. Therefore we special case it's implementation. |
b178bb3df net: reorder stru... |
263 264 265 |
* Note : rmem_alloc is in this structure to fill a hole * on 64bit arches, not because its logically part of * backlog. |
fa438ccfd [NET]: Keep sk_ba... |
266 267 |
*/ struct { |
b178bb3df net: reorder stru... |
268 269 270 271 |
atomic_t rmem_alloc; int len; struct sk_buff *head; struct sk_buff *tail; |
fa438ccfd [NET]: Keep sk_ba... |
272 |
} sk_backlog; |
b178bb3df net: reorder stru... |
273 274 275 276 277 278 279 280 281 |
#define sk_rmem_alloc sk_backlog.rmem_alloc int sk_forward_alloc; #ifdef CONFIG_RPS __u32 sk_rxhash; #endif atomic_t sk_drops; int sk_rcvbuf; struct sk_filter __rcu *sk_filter; |
eaefd1105 net: add __rcu an... |
282 |
struct socket_wq __rcu *sk_wq; |
b178bb3df net: reorder stru... |
283 284 285 286 |
#ifdef CONFIG_NET_DMA struct sk_buff_head sk_async_wait_queue; #endif |
def8b4faf net: reduce struc... |
287 |
#ifdef CONFIG_XFRM |
1da177e4c Linux-2.6.12-rc2 |
288 |
struct xfrm_policy *sk_policy[2]; |
def8b4faf net: reduce struc... |
289 |
#endif |
b178bb3df net: reorder stru... |
290 291 |
unsigned long sk_flags; struct dst_entry *sk_dst_cache; |
b6c6712a4 net: sk_dst_cache... |
292 |
spinlock_t sk_dst_lock; |
1da177e4c Linux-2.6.12-rc2 |
293 294 |
atomic_t sk_wmem_alloc; atomic_t sk_omem_alloc; |
4e07a91c3 [SOCK]: Shrink st... |
295 |
int sk_sndbuf; |
1da177e4c Linux-2.6.12-rc2 |
296 |
struct sk_buff_head sk_write_queue; |
b178bb3df net: reorder stru... |
297 298 299 300 301 302 303 |
kmemcheck_bitfield_begin(flags); unsigned int sk_shutdown : 2, sk_no_check : 2, sk_userlocks : 4, sk_protocol : 8, sk_type : 16; kmemcheck_bitfield_end(flags); |
1da177e4c Linux-2.6.12-rc2 |
304 |
int sk_wmem_queued; |
7d877f3bd [PATCH] gfp_t: net/* |
305 |
gfp_t sk_allocation; |
1da177e4c Linux-2.6.12-rc2 |
306 |
int sk_route_caps; |
a465419b1 net: Introduce sk... |
307 |
int sk_route_nocaps; |
bcd761111 [NET]: Generalise... |
308 |
int sk_gso_type; |
82cc1a7a5 [NET]: Add per-co... |
309 |
unsigned int sk_gso_max_size; |
9932cf954 [NET]: Fill in a ... |
310 |
int sk_rcvlowat; |
1da177e4c Linux-2.6.12-rc2 |
311 |
unsigned long sk_lingertime; |
1da177e4c Linux-2.6.12-rc2 |
312 |
struct sk_buff_head sk_error_queue; |
476e19cfa [IPV6]: Fix OOPS ... |
313 |
struct proto *sk_prot_creator; |
1da177e4c Linux-2.6.12-rc2 |
314 315 316 317 318 319 |
rwlock_t sk_callback_lock; int sk_err, sk_err_soft; unsigned short sk_ack_backlog; unsigned short sk_max_ack_backlog; __u32 sk_priority; |
109f6e39f af_unix: Allow SO... |
320 321 |
struct pid *sk_peer_pid; const struct cred *sk_peer_cred; |
1da177e4c Linux-2.6.12-rc2 |
322 323 |
long sk_rcvtimeo; long sk_sndtimeo; |
1da177e4c Linux-2.6.12-rc2 |
324 325 |
void *sk_protinfo; struct timer_list sk_timer; |
b7aa0bf70 [NET]: convert ne... |
326 |
ktime_t sk_stamp; |
1da177e4c Linux-2.6.12-rc2 |
327 328 329 330 331 332 |
struct socket *sk_socket; void *sk_user_data; struct page *sk_sndmsg_page; struct sk_buff *sk_send_head; __u32 sk_sndmsg_off; int sk_write_pending; |
d5f642384 net: #ifdef ->sk_... |
333 |
#ifdef CONFIG_SECURITY |
1da177e4c Linux-2.6.12-rc2 |
334 |
void *sk_security; |
d5f642384 net: #ifdef ->sk_... |
335 |
#endif |
4a19ec580 [NET]: Introducin... |
336 |
__u32 sk_mark; |
f84517253 cls_cgroup: Store... |
337 |
u32 sk_classid; |
1da177e4c Linux-2.6.12-rc2 |
338 339 340 341 342 343 344 345 346 347 348 349 |
void (*sk_state_change)(struct sock *sk); void (*sk_data_ready)(struct sock *sk, int bytes); void (*sk_write_space)(struct sock *sk); void (*sk_error_report)(struct sock *sk); int (*sk_backlog_rcv)(struct sock *sk, struct sk_buff *skb); void (*sk_destruct)(struct sock *sk); }; /* * Hashed lists helper routines */ |
c4146644a net: add a wrappe... |
350 351 352 353 |
static inline struct sock *sk_entry(const struct hlist_node *node) { return hlist_entry(node, struct sock, sk_node); } |
e48c414ee [INET]: Generalis... |
354 |
static inline struct sock *__sk_head(const struct hlist_head *head) |
1da177e4c Linux-2.6.12-rc2 |
355 356 357 |
{ return hlist_entry(head->first, struct sock, sk_node); } |
e48c414ee [INET]: Generalis... |
358 |
static inline struct sock *sk_head(const struct hlist_head *head) |
1da177e4c Linux-2.6.12-rc2 |
359 360 361 |
{ return hlist_empty(head) ? NULL : __sk_head(head); } |
88ab1932e udp: Use hlist_nu... |
362 363 364 365 366 367 368 369 370 |
static inline struct sock *__sk_nulls_head(const struct hlist_nulls_head *head) { return hlist_nulls_entry(head->first, struct sock, sk_nulls_node); } static inline struct sock *sk_nulls_head(const struct hlist_nulls_head *head) { return hlist_nulls_empty(head) ? NULL : __sk_nulls_head(head); } |
e48c414ee [INET]: Generalis... |
371 |
static inline struct sock *sk_next(const struct sock *sk) |
1da177e4c Linux-2.6.12-rc2 |
372 373 374 375 |
{ return sk->sk_node.next ? hlist_entry(sk->sk_node.next, struct sock, sk_node) : NULL; } |
88ab1932e udp: Use hlist_nu... |
376 377 378 379 380 381 382 |
static inline struct sock *sk_nulls_next(const struct sock *sk) { return (!is_a_nulls(sk->sk_nulls_node.next)) ? hlist_nulls_entry(sk->sk_nulls_node.next, struct sock, sk_nulls_node) : NULL; } |
e48c414ee [INET]: Generalis... |
383 |
static inline int sk_unhashed(const struct sock *sk) |
1da177e4c Linux-2.6.12-rc2 |
384 385 386 |
{ return hlist_unhashed(&sk->sk_node); } |
e48c414ee [INET]: Generalis... |
387 |
static inline int sk_hashed(const struct sock *sk) |
1da177e4c Linux-2.6.12-rc2 |
388 |
{ |
da753beae [NET]: use hlist_... |
389 |
return !sk_unhashed(sk); |
1da177e4c Linux-2.6.12-rc2 |
390 391 392 393 394 395 |
} static __inline__ void sk_node_init(struct hlist_node *node) { node->pprev = NULL; } |
88ab1932e udp: Use hlist_nu... |
396 397 398 399 |
static __inline__ void sk_nulls_node_init(struct hlist_nulls_node *node) { node->pprev = NULL; } |
1da177e4c Linux-2.6.12-rc2 |
400 401 402 403 |
static __inline__ void __sk_del_node(struct sock *sk) { __hlist_del(&sk->sk_node); } |
808f5114a packet: convert s... |
404 |
/* NB: equivalent to hlist_del_init_rcu */ |
1da177e4c Linux-2.6.12-rc2 |
405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 |
static __inline__ int __sk_del_node_init(struct sock *sk) { if (sk_hashed(sk)) { __sk_del_node(sk); sk_node_init(&sk->sk_node); return 1; } return 0; } /* Grab socket reference count. This operation is valid only when sk is ALREADY grabbed f.e. it is found in hash table or a list and the lookup is made under lock preventing hash table modifications. */ static inline void sock_hold(struct sock *sk) { atomic_inc(&sk->sk_refcnt); } /* Ungrab socket in the context, which assumes that socket refcnt cannot hit zero, f.e. it is true in context of any socketcall. */ static inline void __sock_put(struct sock *sk) { atomic_dec(&sk->sk_refcnt); } static __inline__ int sk_del_node_init(struct sock *sk) { int rc = __sk_del_node_init(sk); if (rc) { /* paranoid for a while -acme */ WARN_ON(atomic_read(&sk->sk_refcnt) == 1); __sock_put(sk); } return rc; } |
808f5114a packet: convert s... |
445 |
#define sk_del_node_init_rcu(sk) sk_del_node_init(sk) |
1da177e4c Linux-2.6.12-rc2 |
446 |
|
88ab1932e udp: Use hlist_nu... |
447 |
static __inline__ int __sk_nulls_del_node_init_rcu(struct sock *sk) |
271b72c7f udp: RCU handling... |
448 449 |
{ if (sk_hashed(sk)) { |
88ab1932e udp: Use hlist_nu... |
450 |
hlist_nulls_del_init_rcu(&sk->sk_nulls_node); |
271b72c7f udp: RCU handling... |
451 452 453 454 |
return 1; } return 0; } |
88ab1932e udp: Use hlist_nu... |
455 |
static __inline__ int sk_nulls_del_node_init_rcu(struct sock *sk) |
271b72c7f udp: RCU handling... |
456 |
{ |
88ab1932e udp: Use hlist_nu... |
457 |
int rc = __sk_nulls_del_node_init_rcu(sk); |
271b72c7f udp: RCU handling... |
458 459 460 461 462 463 464 465 |
if (rc) { /* paranoid for a while -acme */ WARN_ON(atomic_read(&sk->sk_refcnt) == 1); __sock_put(sk); } return rc; } |
1da177e4c Linux-2.6.12-rc2 |
466 467 468 469 470 471 472 473 474 475 |
static __inline__ void __sk_add_node(struct sock *sk, struct hlist_head *list) { hlist_add_head(&sk->sk_node, list); } static __inline__ void sk_add_node(struct sock *sk, struct hlist_head *list) { sock_hold(sk); __sk_add_node(sk, list); } |
808f5114a packet: convert s... |
476 477 478 479 480 |
static __inline__ void sk_add_node_rcu(struct sock *sk, struct hlist_head *list) { sock_hold(sk); hlist_add_head_rcu(&sk->sk_node, list); } |
88ab1932e udp: Use hlist_nu... |
481 |
static __inline__ void __sk_nulls_add_node_rcu(struct sock *sk, struct hlist_nulls_head *list) |
271b72c7f udp: RCU handling... |
482 |
{ |
88ab1932e udp: Use hlist_nu... |
483 |
hlist_nulls_add_head_rcu(&sk->sk_nulls_node, list); |
271b72c7f udp: RCU handling... |
484 |
} |
88ab1932e udp: Use hlist_nu... |
485 |
static __inline__ void sk_nulls_add_node_rcu(struct sock *sk, struct hlist_nulls_head *list) |
271b72c7f udp: RCU handling... |
486 487 |
{ sock_hold(sk); |
88ab1932e udp: Use hlist_nu... |
488 |
__sk_nulls_add_node_rcu(sk, list); |
271b72c7f udp: RCU handling... |
489 |
} |
1da177e4c Linux-2.6.12-rc2 |
490 491 492 493 494 495 496 497 498 499 500 501 502 |
static __inline__ void __sk_del_bind_node(struct sock *sk) { __hlist_del(&sk->sk_bind_node); } static __inline__ void sk_add_bind_node(struct sock *sk, struct hlist_head *list) { hlist_add_head(&sk->sk_bind_node, list); } #define sk_for_each(__sk, node, list) \ hlist_for_each_entry(__sk, node, list, sk_node) |
808f5114a packet: convert s... |
503 504 |
#define sk_for_each_rcu(__sk, node, list) \ hlist_for_each_entry_rcu(__sk, node, list, sk_node) |
88ab1932e udp: Use hlist_nu... |
505 506 507 508 |
#define sk_nulls_for_each(__sk, node, list) \ hlist_nulls_for_each_entry(__sk, node, list, sk_nulls_node) #define sk_nulls_for_each_rcu(__sk, node, list) \ hlist_nulls_for_each_entry_rcu(__sk, node, list, sk_nulls_node) |
1da177e4c Linux-2.6.12-rc2 |
509 510 511 |
#define sk_for_each_from(__sk, node) \ if (__sk && ({ node = &(__sk)->sk_node; 1; })) \ hlist_for_each_entry_from(__sk, node, sk_node) |
88ab1932e udp: Use hlist_nu... |
512 513 514 |
#define sk_nulls_for_each_from(__sk, node) \ if (__sk && ({ node = &(__sk)->sk_nulls_node; 1; })) \ hlist_nulls_for_each_entry_from(__sk, node, sk_nulls_node) |
1da177e4c Linux-2.6.12-rc2 |
515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 |
#define sk_for_each_safe(__sk, node, tmp, list) \ hlist_for_each_entry_safe(__sk, node, tmp, list, sk_node) #define sk_for_each_bound(__sk, node, list) \ hlist_for_each_entry(__sk, node, list, sk_bind_node) /* Sock flags */ enum sock_flags { SOCK_DEAD, SOCK_DONE, SOCK_URGINLINE, SOCK_KEEPOPEN, SOCK_LINGER, SOCK_DESTROY, SOCK_BROADCAST, SOCK_TIMESTAMP, SOCK_ZAPPED, SOCK_USE_WRITE_QUEUE, /* whether to call sk->sk_write_space in sock_wfree */ SOCK_DBG, /* %SO_DEBUG setting */ SOCK_RCVTSTAMP, /* %SO_TIMESTAMP setting */ |
92f37fd2e [NET]: Adding SO_... |
534 |
SOCK_RCVTSTAMPNS, /* %SO_TIMESTAMPNS setting */ |
1da177e4c Linux-2.6.12-rc2 |
535 536 |
SOCK_LOCALROUTE, /* route locally only, %SO_DONTROUTE setting */ SOCK_QUEUE_SHRUNK, /* write queue has been shrunk recently */ |
20d494735 net: socket infra... |
537 538 539 540 541 542 543 |
SOCK_TIMESTAMPING_TX_HARDWARE, /* %SOF_TIMESTAMPING_TX_HARDWARE */ SOCK_TIMESTAMPING_TX_SOFTWARE, /* %SOF_TIMESTAMPING_TX_SOFTWARE */ SOCK_TIMESTAMPING_RX_HARDWARE, /* %SOF_TIMESTAMPING_RX_HARDWARE */ SOCK_TIMESTAMPING_RX_SOFTWARE, /* %SOF_TIMESTAMPING_RX_SOFTWARE */ SOCK_TIMESTAMPING_SOFTWARE, /* %SOF_TIMESTAMPING_SOFTWARE */ SOCK_TIMESTAMPING_RAW_HARDWARE, /* %SOF_TIMESTAMPING_RAW_HARDWARE */ SOCK_TIMESTAMPING_SYS_HARDWARE, /* %SOF_TIMESTAMPING_SYS_HARDWARE */ |
bcdce7195 net: speedup sk_w... |
544 |
SOCK_FASYNC, /* fasync() active */ |
3b885787e net: Generalize s... |
545 |
SOCK_RXQ_OVFL, |
1cdebb423 sock.h: Add a new... |
546 |
SOCK_ZEROCOPY, /* buffers from userspace */ |
1da177e4c Linux-2.6.12-rc2 |
547 |
}; |
53b924b31 [NET]: Fix socket... |
548 549 550 551 |
static inline void sock_copy_flags(struct sock *nsk, struct sock *osk) { nsk->sk_flags = osk->sk_flags; } |
1da177e4c Linux-2.6.12-rc2 |
552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 |
static inline void sock_set_flag(struct sock *sk, enum sock_flags flag) { __set_bit(flag, &sk->sk_flags); } static inline void sock_reset_flag(struct sock *sk, enum sock_flags flag) { __clear_bit(flag, &sk->sk_flags); } static inline int sock_flag(struct sock *sk, enum sock_flags flag) { return test_bit(flag, &sk->sk_flags); } static inline void sk_acceptq_removed(struct sock *sk) { sk->sk_ack_backlog--; } static inline void sk_acceptq_added(struct sock *sk) { sk->sk_ack_backlog++; } static inline int sk_acceptq_is_full(struct sock *sk) { |
64a146513 [NET]: Revert inc... |
579 |
return sk->sk_ack_backlog > sk->sk_max_ack_backlog; |
1da177e4c Linux-2.6.12-rc2 |
580 581 582 583 584 585 586 |
} /* * Compute minimal free write space needed to queue new packets. */ static inline int sk_stream_min_wspace(struct sock *sk) { |
8df09ea3b [SOCK] Avoid inte... |
587 |
return sk->sk_wmem_queued >> 1; |
1da177e4c Linux-2.6.12-rc2 |
588 589 590 591 592 593 594 595 596 597 598 599 600 |
} static inline int sk_stream_wspace(struct sock *sk) { return sk->sk_sndbuf - sk->sk_wmem_queued; } extern void sk_stream_write_space(struct sock *sk); static inline int sk_stream_memory_free(struct sock *sk) { return sk->sk_wmem_queued < sk->sk_sndbuf; } |
8eae939f1 net: add limit fo... |
601 |
/* OOB backlog add */ |
a3a858ff1 net: backlog func... |
602 |
static inline void __sk_add_backlog(struct sock *sk, struct sk_buff *skb) |
9ee6b535a [NET]: sk_add_bac... |
603 |
{ |
7fee226ad net: add a noref ... |
604 605 606 607 608 609 |
/* dont let skb dst not refcounted, we are going to leave rcu lock */ skb_dst_force(skb); if (!sk->sk_backlog.tail) sk->sk_backlog.head = skb; else |
9ee6b535a [NET]: sk_add_bac... |
610 |
sk->sk_backlog.tail->next = skb; |
7fee226ad net: add a noref ... |
611 612 |
sk->sk_backlog.tail = skb; |
9ee6b535a [NET]: sk_add_bac... |
613 614 |
skb->next = NULL; } |
1da177e4c Linux-2.6.12-rc2 |
615 |
|
c377411f2 net: sk_add_backl... |
616 617 |
/* * Take into account size of receive queue and backlog queue |
0fd7bac6b net: relax rcvbuf... |
618 619 |
* Do not take into account this skb truesize, * to allow even a single big packet to come. |
c377411f2 net: sk_add_backl... |
620 621 622 623 |
*/ static inline bool sk_rcvqueues_full(const struct sock *sk, const struct sk_buff *skb) { unsigned int qsize = sk->sk_backlog.len + atomic_read(&sk->sk_rmem_alloc); |
0fd7bac6b net: relax rcvbuf... |
624 |
return qsize > sk->sk_rcvbuf; |
c377411f2 net: sk_add_backl... |
625 |
} |
8eae939f1 net: add limit fo... |
626 |
/* The per-socket spinlock must be held here. */ |
404563531 net: add __must_c... |
627 |
static inline __must_check int sk_add_backlog(struct sock *sk, struct sk_buff *skb) |
8eae939f1 net: add limit fo... |
628 |
{ |
c377411f2 net: sk_add_backl... |
629 |
if (sk_rcvqueues_full(sk, skb)) |
8eae939f1 net: add limit fo... |
630 |
return -ENOBUFS; |
a3a858ff1 net: backlog func... |
631 |
__sk_add_backlog(sk, skb); |
8eae939f1 net: add limit fo... |
632 633 634 |
sk->sk_backlog.len += skb->truesize; return 0; } |
c57943a1c net: wrap sk->sk_... |
635 636 637 638 |
static inline int sk_backlog_rcv(struct sock *sk, struct sk_buff *skb) { return sk->sk_backlog_rcv(sk, skb); } |
c58dc01ba net: Make RFS soc... |
639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 |
static inline void sock_rps_record_flow(const struct sock *sk) { #ifdef CONFIG_RPS struct rps_sock_flow_table *sock_flow_table; rcu_read_lock(); sock_flow_table = rcu_dereference(rps_sock_flow_table); rps_record_sock_flow(sock_flow_table, sk->sk_rxhash); rcu_read_unlock(); #endif } static inline void sock_rps_reset_flow(const struct sock *sk) { #ifdef CONFIG_RPS struct rps_sock_flow_table *sock_flow_table; rcu_read_lock(); sock_flow_table = rcu_dereference(rps_sock_flow_table); rps_reset_sock_flow(sock_flow_table, sk->sk_rxhash); rcu_read_unlock(); #endif } |
bdeab9919 rps: Add flag to ... |
662 663 |
static inline void sock_rps_save_rxhash(struct sock *sk, const struct sk_buff *skb) |
c58dc01ba net: Make RFS soc... |
664 665 |
{ #ifdef CONFIG_RPS |
bdeab9919 rps: Add flag to ... |
666 |
if (unlikely(sk->sk_rxhash != skb->rxhash)) { |
c58dc01ba net: Make RFS soc... |
667 |
sock_rps_reset_flow(sk); |
bdeab9919 rps: Add flag to ... |
668 |
sk->sk_rxhash = skb->rxhash; |
c58dc01ba net: Make RFS soc... |
669 670 671 |
} #endif } |
bdeab9919 rps: Add flag to ... |
672 673 674 675 676 677 678 |
static inline void sock_rps_reset_rxhash(struct sock *sk) { #ifdef CONFIG_RPS sock_rps_reset_flow(sk); sk->sk_rxhash = 0; #endif } |
cfcabdcc2 [NET]: sparse war... |
679 680 681 682 683 684 685 686 687 688 689 |
#define sk_wait_event(__sk, __timeo, __condition) \ ({ int __rc; \ release_sock(__sk); \ __rc = __condition; \ if (!__rc) { \ *(__timeo) = schedule_timeout(*(__timeo)); \ } \ lock_sock(__sk); \ __rc = __condition; \ __rc; \ }) |
1da177e4c Linux-2.6.12-rc2 |
690 691 692 693 694 695 696 697 |
extern int sk_stream_wait_connect(struct sock *sk, long *timeo_p); extern int sk_stream_wait_memory(struct sock *sk, long *timeo_p); extern void sk_stream_wait_close(struct sock *sk, long timeo_p); extern int sk_stream_error(struct sock *sk, int flags, int err); extern void sk_stream_kill_queues(struct sock *sk); extern int sk_wait_data(struct sock *sk, long *timeo); |
60236fdd0 [NET] Rename open... |
698 |
struct request_sock_ops; |
6d6ee43e0 [TWSK]: Introduce... |
699 |
struct timewait_sock_ops; |
ab1e0a13d [SOCK] proto: Add... |
700 |
struct inet_hashinfo; |
fc8717baa [RAW]: Add raw_ha... |
701 |
struct raw_hashinfo; |
de4772542 include: replace ... |
702 |
struct module; |
2e6599cb8 [NET] Generalise ... |
703 |
|
1da177e4c Linux-2.6.12-rc2 |
704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 |
/* Networking protocol blocks we attach to sockets. * socket layer -> transport layer interface * transport -> network interface is defined by struct inet_proto */ struct proto { void (*close)(struct sock *sk, long timeout); int (*connect)(struct sock *sk, struct sockaddr *uaddr, int addr_len); int (*disconnect)(struct sock *sk, int flags); struct sock * (*accept) (struct sock *sk, int flags, int *err); int (*ioctl)(struct sock *sk, int cmd, unsigned long arg); int (*init)(struct sock *sk); |
7d06b2e05 net: change proto... |
721 |
void (*destroy)(struct sock *sk); |
1da177e4c Linux-2.6.12-rc2 |
722 723 724 |
void (*shutdown)(struct sock *sk, int how); int (*setsockopt)(struct sock *sk, int level, int optname, char __user *optval, |
b7058842c net: Make setsock... |
725 |
unsigned int optlen); |
1da177e4c Linux-2.6.12-rc2 |
726 727 728 |
int (*getsockopt)(struct sock *sk, int level, int optname, char __user *optval, int __user *option); |
af01d5374 net: more #ifdef ... |
729 |
#ifdef CONFIG_COMPAT |
3fdadf7d2 [NET]: {get|set}s... |
730 731 732 |
int (*compat_setsockopt)(struct sock *sk, int level, int optname, char __user *optval, |
b7058842c net: Make setsock... |
733 |
unsigned int optlen); |
3fdadf7d2 [NET]: {get|set}s... |
734 735 736 737 |
int (*compat_getsockopt)(struct sock *sk, int level, int optname, char __user *optval, int __user *option); |
709b46e8d net: Add compat i... |
738 739 |
int (*compat_ioctl)(struct sock *sk, unsigned int cmd, unsigned long arg); |
af01d5374 net: more #ifdef ... |
740 |
#endif |
1da177e4c Linux-2.6.12-rc2 |
741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 |
int (*sendmsg)(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, size_t len); int (*recvmsg)(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, size_t len, int noblock, int flags, int *addr_len); int (*sendpage)(struct sock *sk, struct page *page, int offset, size_t size, int flags); int (*bind)(struct sock *sk, struct sockaddr *uaddr, int addr_len); int (*backlog_rcv) (struct sock *sk, struct sk_buff *skb); /* Keeping track of sk's, looking them up, and port selection methods. */ void (*hash)(struct sock *sk); void (*unhash)(struct sock *sk); |
719f83585 udp: add rehash o... |
758 |
void (*rehash)(struct sock *sk); |
1da177e4c Linux-2.6.12-rc2 |
759 |
int (*get_port)(struct sock *sk, unsigned short snum); |
fcbdf09d9 net: fix nulls li... |
760 |
void (*clear_sk)(struct sock *sk, int size); |
1da177e4c Linux-2.6.12-rc2 |
761 |
|
286ab3d46 [NET]: Define inf... |
762 |
/* Keeping track of sockets in use */ |
65f765178 [NET]: prot_inuse... |
763 |
#ifdef CONFIG_PROC_FS |
13ff3d6fa [SOCK]: Enumerate... |
764 |
unsigned int inuse_idx; |
65f765178 [NET]: prot_inuse... |
765 |
#endif |
ebb53d756 [NET] proto: Use ... |
766 |
|
1da177e4c Linux-2.6.12-rc2 |
767 |
/* Memory pressure */ |
5c52ba170 sock: add net to ... |
768 |
void (*enter_memory_pressure)(struct sock *sk); |
8d987e5c7 net: avoid limits... |
769 |
atomic_long_t *memory_allocated; /* Current allocated memory. */ |
1748376b6 net: Use a percpu... |
770 |
struct percpu_counter *sockets_allocated; /* Current number of sockets. */ |
1da177e4c Linux-2.6.12-rc2 |
771 772 773 |
/* * Pressure flag: try to collapse. * Technical note: it is used by multiple contexts non atomically. |
3ab224be6 [NET] CORE: Intro... |
774 |
* All the __sk_mem_schedule() is of this nature: accounting |
1da177e4c Linux-2.6.12-rc2 |
775 776 777 |
* is strict, actions are advisory and have some latency. */ int *memory_pressure; |
8d987e5c7 net: avoid limits... |
778 |
long *sysctl_mem; |
1da177e4c Linux-2.6.12-rc2 |
779 780 781 |
int *sysctl_wmem; int *sysctl_rmem; int max_header; |
7ba429100 inet, inet6: make... |
782 |
bool no_autobind; |
1da177e4c Linux-2.6.12-rc2 |
783 |
|
271b72c7f udp: RCU handling... |
784 |
struct kmem_cache *slab; |
1da177e4c Linux-2.6.12-rc2 |
785 |
unsigned int obj_size; |
271b72c7f udp: RCU handling... |
786 |
int slab_flags; |
1da177e4c Linux-2.6.12-rc2 |
787 |
|
dd24c0019 net: Use a percpu... |
788 |
struct percpu_counter *orphan_count; |
8feaf0c0a [INET]: Generalis... |
789 |
|
60236fdd0 [NET] Rename open... |
790 |
struct request_sock_ops *rsk_prot; |
6d6ee43e0 [TWSK]: Introduce... |
791 |
struct timewait_sock_ops *twsk_prot; |
2e6599cb8 [NET] Generalise ... |
792 |
|
39d8cda76 [SOCK]: Add udp_h... |
793 794 |
union { struct inet_hashinfo *hashinfo; |
645ca708f udp: introduce st... |
795 |
struct udp_table *udp_table; |
fc8717baa [RAW]: Add raw_ha... |
796 |
struct raw_hashinfo *raw_hash; |
39d8cda76 [SOCK]: Add udp_h... |
797 |
} h; |
ab1e0a13d [SOCK] proto: Add... |
798 |
|
1da177e4c Linux-2.6.12-rc2 |
799 800 801 802 803 |
struct module *owner; char name[32]; struct list_head node; |
e6848976b [NET]: Cleanup IN... |
804 805 806 |
#ifdef SOCK_REFCNT_DEBUG atomic_t socks; #endif |
1da177e4c Linux-2.6.12-rc2 |
807 808 809 810 |
}; extern int proto_register(struct proto *prot, int alloc_slab); extern void proto_unregister(struct proto *prot); |
e6848976b [NET]: Cleanup IN... |
811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 |
#ifdef SOCK_REFCNT_DEBUG static inline void sk_refcnt_debug_inc(struct sock *sk) { atomic_inc(&sk->sk_prot->socks); } static inline void sk_refcnt_debug_dec(struct sock *sk) { atomic_dec(&sk->sk_prot->socks); printk(KERN_DEBUG "%s socket %p released, %d are still alive ", sk->sk_prot->name, sk, atomic_read(&sk->sk_prot->socks)); } static inline void sk_refcnt_debug_release(const struct sock *sk) { if (atomic_read(&sk->sk_refcnt) != 1) printk(KERN_DEBUG "Destruction of the %s socket %p delayed, refcnt=%d ", sk->sk_prot->name, sk, atomic_read(&sk->sk_refcnt)); } #else /* SOCK_REFCNT_DEBUG */ #define sk_refcnt_debug_inc(sk) do { } while (0) #define sk_refcnt_debug_dec(sk) do { } while (0) #define sk_refcnt_debug_release(sk) do { } while (0) #endif /* SOCK_REFCNT_DEBUG */ |
65f765178 [NET]: prot_inuse... |
837 838 |
#ifdef CONFIG_PROC_FS |
1da177e4c Linux-2.6.12-rc2 |
839 |
/* Called with local bh disabled */ |
c29a0bc4d [SOCK][NETNS]: Ad... |
840 841 |
extern void sock_prot_inuse_add(struct net *net, struct proto *prot, int inc); extern int sock_prot_inuse_get(struct net *net, struct proto *proto); |
65f765178 [NET]: prot_inuse... |
842 |
#else |
c29a0bc4d [SOCK][NETNS]: Ad... |
843 844 |
static void inline sock_prot_inuse_add(struct net *net, struct proto *prot, int inc) |
65f765178 [NET]: prot_inuse... |
845 846 |
{ } |
65f765178 [NET]: prot_inuse... |
847 |
#endif |
1da177e4c Linux-2.6.12-rc2 |
848 |
|
614c6cb4f [SOCK]: Rename __... |
849 850 851 852 853 854 855 856 |
/* With per-bucket locks this operation is not-atomic, so that * this version is not worse. */ static inline void __sk_prot_rehash(struct sock *sk) { sk->sk_prot->unhash(sk); sk->sk_prot->hash(sk); } |
fcbdf09d9 net: fix nulls li... |
857 |
void sk_prot_clear_portaddr_nulls(struct sock *sk, int size); |
1da177e4c Linux-2.6.12-rc2 |
858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 |
/* About 10 seconds */ #define SOCK_DESTROY_TIME (10*HZ) /* Sockets 0-1023 can't be bound to unless you are superuser */ #define PROT_SOCK 1024 #define SHUTDOWN_MASK 3 #define RCV_SHUTDOWN 1 #define SEND_SHUTDOWN 2 #define SOCK_SNDBUF_LOCK 1 #define SOCK_RCVBUF_LOCK 2 #define SOCK_BINDADDR_LOCK 4 #define SOCK_BINDPORT_LOCK 8 /* sock_iocb: used to kick off async processing of socket ios */ struct sock_iocb { struct list_head list; int flags; int size; struct socket *sock; struct sock *sk; struct scm_cookie *scm; struct msghdr *msg, async_msg; |
1da177e4c Linux-2.6.12-rc2 |
883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 |
struct kiocb *kiocb; }; static inline struct sock_iocb *kiocb_to_siocb(struct kiocb *iocb) { return (struct sock_iocb *)iocb->private; } static inline struct kiocb *siocb_to_kiocb(struct sock_iocb *si) { return si->kiocb; } struct socket_alloc { struct socket socket; struct inode vfs_inode; }; static inline struct socket *SOCKET_I(struct inode *inode) { return &container_of(inode, struct socket_alloc, vfs_inode)->socket; } static inline struct inode *SOCK_INODE(struct socket *socket) { return &container_of(socket, struct socket_alloc, socket)->vfs_inode; } |
3ab224be6 [NET] CORE: Intro... |
910 911 912 913 914 |
/* * Functions for memory accounting */ extern int __sk_mem_schedule(struct sock *sk, int size, int kind); extern void __sk_mem_reclaim(struct sock *sk); |
1da177e4c Linux-2.6.12-rc2 |
915 |
|
3ab224be6 [NET] CORE: Intro... |
916 917 918 919 |
#define SK_MEM_QUANTUM ((int)PAGE_SIZE) #define SK_MEM_QUANTUM_SHIFT ilog2(SK_MEM_QUANTUM) #define SK_MEM_SEND 0 #define SK_MEM_RECV 1 |
1da177e4c Linux-2.6.12-rc2 |
920 |
|
3ab224be6 [NET] CORE: Intro... |
921 |
static inline int sk_mem_pages(int amt) |
1da177e4c Linux-2.6.12-rc2 |
922 |
{ |
3ab224be6 [NET] CORE: Intro... |
923 |
return (amt + SK_MEM_QUANTUM - 1) >> SK_MEM_QUANTUM_SHIFT; |
1da177e4c Linux-2.6.12-rc2 |
924 |
} |
3ab224be6 [NET] CORE: Intro... |
925 |
static inline int sk_has_account(struct sock *sk) |
1da177e4c Linux-2.6.12-rc2 |
926 |
{ |
3ab224be6 [NET] CORE: Intro... |
927 928 |
/* return true if protocol supports memory accounting */ return !!sk->sk_prot->memory_allocated; |
1da177e4c Linux-2.6.12-rc2 |
929 |
} |
3ab224be6 [NET] CORE: Intro... |
930 |
static inline int sk_wmem_schedule(struct sock *sk, int size) |
1da177e4c Linux-2.6.12-rc2 |
931 |
{ |
3ab224be6 [NET] CORE: Intro... |
932 933 934 935 |
if (!sk_has_account(sk)) return 1; return size <= sk->sk_forward_alloc || __sk_mem_schedule(sk, size, SK_MEM_SEND); |
1da177e4c Linux-2.6.12-rc2 |
936 |
} |
3ab224be6 [NET] CORE: Intro... |
937 |
static inline int sk_rmem_schedule(struct sock *sk, int size) |
d80d99d64 [NET]: Add sk_str... |
938 |
{ |
3ab224be6 [NET] CORE: Intro... |
939 940 |
if (!sk_has_account(sk)) return 1; |
d80d99d64 [NET]: Add sk_str... |
941 |
return size <= sk->sk_forward_alloc || |
3ab224be6 [NET] CORE: Intro... |
942 943 944 945 946 947 948 949 950 951 |
__sk_mem_schedule(sk, size, SK_MEM_RECV); } static inline void sk_mem_reclaim(struct sock *sk) { if (!sk_has_account(sk)) return; if (sk->sk_forward_alloc >= SK_MEM_QUANTUM) __sk_mem_reclaim(sk); } |
9993e7d31 [TCP]: Do not pur... |
952 953 954 955 956 957 958 |
static inline void sk_mem_reclaim_partial(struct sock *sk) { if (!sk_has_account(sk)) return; if (sk->sk_forward_alloc > SK_MEM_QUANTUM) __sk_mem_reclaim(sk); } |
3ab224be6 [NET] CORE: Intro... |
959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 |
static inline void sk_mem_charge(struct sock *sk, int size) { if (!sk_has_account(sk)) return; sk->sk_forward_alloc -= size; } static inline void sk_mem_uncharge(struct sock *sk, int size) { if (!sk_has_account(sk)) return; sk->sk_forward_alloc += size; } static inline void sk_wmem_free_skb(struct sock *sk, struct sk_buff *skb) { |
3ab224be6 [NET] CORE: Intro... |
975 976 977 978 |
sock_set_flag(sk, SOCK_QUEUE_SHRUNK); sk->sk_wmem_queued -= skb->truesize; sk_mem_uncharge(sk, skb->truesize); __kfree_skb(skb); |
d80d99d64 [NET]: Add sk_str... |
979 |
} |
1da177e4c Linux-2.6.12-rc2 |
980 981 982 983 984 985 986 987 988 989 990 991 992 |
/* Used by processes to "lock" a socket state, so that * interrupts and bottom half handlers won't change it * from under us. It essentially blocks any incoming * packets, so that we won't get any new data or any * packets that change the state of the socket. * * While locked, BH processing will add new packets to * the backlog queue. This queue is processed by the * owner of the socket lock right before it is released. * * Since ~2.3.5 it is also exclusive sleep lock serializing * accesses from user process context. */ |
d2e9117c7 [NET]: Change typ... |
993 |
#define sock_owned_by_user(sk) ((sk)->sk_lock.owned) |
1da177e4c Linux-2.6.12-rc2 |
994 |
|
ed07536ed [PATCH] lockdep: ... |
995 996 997 998 999 1000 1001 1002 1003 |
/* * Macro so as to not evaluate some arguments when * lockdep is not enabled. * * Mark both the sk_lock and the sk_lock.slock as a * per-address-family lock class. */ #define sock_lock_init_class_and_name(sk, sname, skey, name, key) \ do { \ |
e8f6fbf62 lockdep: include/... |
1004 |
sk->sk_lock.owned = 0; \ |
ed07536ed [PATCH] lockdep: ... |
1005 1006 1007 1008 1009 1010 1011 1012 |
init_waitqueue_head(&sk->sk_lock.wq); \ spin_lock_init(&(sk)->sk_lock.slock); \ debug_check_no_locks_freed((void *)&(sk)->sk_lock, \ sizeof((sk)->sk_lock)); \ lockdep_set_class_and_name(&(sk)->sk_lock.slock, \ (skey), (sname)); \ lockdep_init_map(&(sk)->sk_lock.dep_map, (name), (key), 0); \ } while (0) |
41380930d [NET]: Remove FAS... |
1013 |
extern void lock_sock_nested(struct sock *sk, int subclass); |
fcc70d5fd [BLUETOOTH] lockd... |
1014 1015 1016 1017 1018 |
static inline void lock_sock(struct sock *sk) { lock_sock_nested(sk, 0); } |
41380930d [NET]: Remove FAS... |
1019 |
extern void release_sock(struct sock *sk); |
1da177e4c Linux-2.6.12-rc2 |
1020 1021 1022 |
/* BH context may only use the following locking interface. */ #define bh_lock_sock(__sk) spin_lock(&((__sk)->sk_lock.slock)) |
c63661848 [PATCH] lockdep: ... |
1023 1024 1025 |
#define bh_lock_sock_nested(__sk) \ spin_lock_nested(&((__sk)->sk_lock.slock), \ SINGLE_DEPTH_NESTING) |
1da177e4c Linux-2.6.12-rc2 |
1026 |
#define bh_unlock_sock(__sk) spin_unlock(&((__sk)->sk_lock.slock)) |
8a74ad60a net: fix lock_soc... |
1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 |
extern bool lock_sock_fast(struct sock *sk); /** * unlock_sock_fast - complement of lock_sock_fast * @sk: socket * @slow: slow mode * * fast unlock socket for user context. * If slow mode is on, we call regular release_sock() */ static inline void unlock_sock_fast(struct sock *sk, bool slow) |
4b0b72f7d net: speedup udp ... |
1037 |
{ |
8a74ad60a net: fix lock_soc... |
1038 1039 1040 1041 |
if (slow) release_sock(sk); else spin_unlock_bh(&sk->sk_lock.slock); |
4b0b72f7d net: speedup udp ... |
1042 |
} |
4b0b72f7d net: speedup udp ... |
1043 |
|
1b8d7ae42 [NET]: Make socke... |
1044 |
extern struct sock *sk_alloc(struct net *net, int family, |
dd0fc66fb [PATCH] gfp flags... |
1045 |
gfp_t priority, |
6257ff217 [NET]: Forget the... |
1046 |
struct proto *prot); |
1da177e4c Linux-2.6.12-rc2 |
1047 |
extern void sk_free(struct sock *sk); |
edf020870 [NET]: Make netli... |
1048 |
extern void sk_release_kernel(struct sock *sk); |
87d11ceb9 [SOCK]: Introduce... |
1049 |
extern struct sock *sk_clone(const struct sock *sk, |
dd0fc66fb [PATCH] gfp flags... |
1050 |
const gfp_t priority); |
1da177e4c Linux-2.6.12-rc2 |
1051 1052 1053 |
extern struct sk_buff *sock_wmalloc(struct sock *sk, unsigned long size, int force, |
dd0fc66fb [PATCH] gfp flags... |
1054 |
gfp_t priority); |
1da177e4c Linux-2.6.12-rc2 |
1055 1056 |
extern struct sk_buff *sock_rmalloc(struct sock *sk, unsigned long size, int force, |
dd0fc66fb [PATCH] gfp flags... |
1057 |
gfp_t priority); |
1da177e4c Linux-2.6.12-rc2 |
1058 1059 1060 1061 1062 |
extern void sock_wfree(struct sk_buff *skb); extern void sock_rfree(struct sk_buff *skb); extern int sock_setsockopt(struct socket *sock, int level, int op, char __user *optval, |
b7058842c net: Make setsock... |
1063 |
unsigned int optlen); |
1da177e4c Linux-2.6.12-rc2 |
1064 1065 1066 1067 1068 1069 1070 1071 |
extern int sock_getsockopt(struct socket *sock, int level, int op, char __user *optval, int __user *optlen); extern struct sk_buff *sock_alloc_send_skb(struct sock *sk, unsigned long size, int noblock, int *errcode); |
4cc7f68d6 net: Reexport soc... |
1072 1073 1074 1075 1076 |
extern struct sk_buff *sock_alloc_send_pskb(struct sock *sk, unsigned long header_len, unsigned long data_len, int noblock, int *errcode); |
86a76caf8 [NET]: Fix sparse... |
1077 |
extern void *sock_kmalloc(struct sock *sk, int size, |
dd0fc66fb [PATCH] gfp flags... |
1078 |
gfp_t priority); |
1da177e4c Linux-2.6.12-rc2 |
1079 1080 |
extern void sock_kfree_s(struct sock *sk, void *mem, int size); extern void sk_send_sigurg(struct sock *sk); |
f84517253 cls_cgroup: Store... |
1081 1082 1083 1084 1085 1086 1087 |
#ifdef CONFIG_CGROUPS extern void sock_update_classid(struct sock *sk); #else static inline void sock_update_classid(struct sock *sk) { } #endif |
1da177e4c Linux-2.6.12-rc2 |
1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 |
/* * Functions to fill in entries in struct proto_ops when a protocol * does not implement a particular function. */ extern int sock_no_bind(struct socket *, struct sockaddr *, int); extern int sock_no_connect(struct socket *, struct sockaddr *, int, int); extern int sock_no_socketpair(struct socket *, struct socket *); extern int sock_no_accept(struct socket *, struct socket *, int); extern int sock_no_getname(struct socket *, struct sockaddr *, int *, int); extern unsigned int sock_no_poll(struct file *, struct socket *, struct poll_table_struct *); extern int sock_no_ioctl(struct socket *, unsigned int, unsigned long); extern int sock_no_listen(struct socket *, int); extern int sock_no_shutdown(struct socket *, int); extern int sock_no_getsockopt(struct socket *, int , int, char __user *, int __user *); extern int sock_no_setsockopt(struct socket *, int, int, |
b7058842c net: Make setsock... |
1111 |
char __user *, unsigned int); |
1da177e4c Linux-2.6.12-rc2 |
1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 |
extern int sock_no_sendmsg(struct kiocb *, struct socket *, struct msghdr *, size_t); extern int sock_no_recvmsg(struct kiocb *, struct socket *, struct msghdr *, size_t, int); extern int sock_no_mmap(struct file *file, struct socket *sock, struct vm_area_struct *vma); extern ssize_t sock_no_sendpage(struct socket *sock, struct page *page, int offset, size_t size, int flags); /* * Functions to fill in entries in struct proto_ops when a protocol * uses the inet style. */ extern int sock_common_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen); extern int sock_common_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t size, int flags); extern int sock_common_setsockopt(struct socket *sock, int level, int optname, |
b7058842c net: Make setsock... |
1133 |
char __user *optval, unsigned int optlen); |
3fdadf7d2 [NET]: {get|set}s... |
1134 1135 1136 |
extern int compat_sock_common_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen); extern int compat_sock_common_setsockopt(struct socket *sock, int level, |
b7058842c net: Make setsock... |
1137 |
int optname, char __user *optval, unsigned int optlen); |
1da177e4c Linux-2.6.12-rc2 |
1138 1139 1140 1141 1142 1143 1144 1145 1146 |
extern void sk_common_release(struct sock *sk); /* * Default socket callbacks and setup code */ /* Initialise core socket variables */ extern void sock_init_data(struct socket *sock, struct sock *sk); |
46bcf14f4 filter: fix sk_fi... |
1147 |
extern void sk_filter_release_rcu(struct rcu_head *rcu); |
1da177e4c Linux-2.6.12-rc2 |
1148 |
/** |
1a5778aa0 net: Fix first li... |
1149 |
* sk_filter_release - release a socket filter |
dc9b33462 [NET]: Re-fix of ... |
1150 1151 1152 1153 |
* @fp: filter to remove * * Remove a filter from a socket and release its resources. */ |
309dd5fc8 [NET]: Move the f... |
1154 1155 1156 |
static inline void sk_filter_release(struct sk_filter *fp) { if (atomic_dec_and_test(&fp->refcnt)) |
80f8f1027 net: filter: dont... |
1157 |
call_rcu(&fp->rcu, sk_filter_release_rcu); |
309dd5fc8 [NET]: Move the f... |
1158 1159 1160 |
} static inline void sk_filter_uncharge(struct sock *sk, struct sk_filter *fp) |
1da177e4c Linux-2.6.12-rc2 |
1161 1162 1163 1164 |
{ unsigned int size = sk_filter_len(fp); atomic_sub(size, &sk->sk_omem_alloc); |
309dd5fc8 [NET]: Move the f... |
1165 |
sk_filter_release(fp); |
1da177e4c Linux-2.6.12-rc2 |
1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 |
} static inline void sk_filter_charge(struct sock *sk, struct sk_filter *fp) { atomic_inc(&fp->refcnt); atomic_add(sk_filter_len(fp), &sk->sk_omem_alloc); } /* * Socket reference counting postulates. * * * Each user of socket SHOULD hold a reference count. * * Each access point to socket (an hash table bucket, reference from a list, * running timer, skb in flight MUST hold a reference count. * * When reference count hits 0, it means it will never increase back. * * When reference count hits 0, it means that no references from * outside exist to this socket and current process on current CPU * is last user and may/should destroy this socket. * * sk_free is called from any context: process, BH, IRQ. When * it is called, socket has no references from outside -> sk_free * may release descendant resources allocated by the socket, but * to the time when it is called, socket is NOT referenced by any * hash tables, lists etc. * * Packets, delivered from outside (from network or from another process) * and enqueued on receive/error queues SHOULD NOT grab reference count, * when they sit in queue. Otherwise, packets will leak to hole, when * socket is looked up by one cpu and unhasing is made by another CPU. * It is true for udp/raw, netlink (leak to receive and error queues), tcp * (leak to backlog). Packet socket does all the processing inside * BR_NETPROTO_LOCK, so that it has not this race condition. UNIX sockets * use separate SMP lock, so that they are prone too. */ /* Ungrab socket and destroy it, if it was the last reference. */ static inline void sock_put(struct sock *sk) { if (atomic_dec_and_test(&sk->sk_refcnt)) sk_free(sk); } |
58a5a7b95 [NET]: Conditiona... |
1205 1206 |
extern int sk_receive_skb(struct sock *sk, struct sk_buff *skb, const int nested); |
25995ff57 [SOCK]: Introduce... |
1207 |
|
e022f0b4a net: Introduce sk... |
1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 |
static inline void sk_tx_queue_set(struct sock *sk, int tx_queue) { sk->sk_tx_queue_mapping = tx_queue; } static inline void sk_tx_queue_clear(struct sock *sk) { sk->sk_tx_queue_mapping = -1; } static inline int sk_tx_queue_get(const struct sock *sk) { |
b0f77d0ea net: fix problem ... |
1220 |
return sk ? sk->sk_tx_queue_mapping : -1; |
e022f0b4a net: Introduce sk... |
1221 |
} |
972692e0d net: Add sk_set_s... |
1222 1223 |
static inline void sk_set_socket(struct sock *sk, struct socket *sock) { |
e022f0b4a net: Introduce sk... |
1224 |
sk_tx_queue_clear(sk); |
972692e0d net: Add sk_set_s... |
1225 1226 |
sk->sk_socket = sock; } |
aa3951451 net: sk_sleep() h... |
1227 1228 |
static inline wait_queue_head_t *sk_sleep(struct sock *sk) { |
eaefd1105 net: add __rcu an... |
1229 1230 |
BUILD_BUG_ON(offsetof(struct socket_wq, wait) != 0); return &rcu_dereference_raw(sk->sk_wq)->wait; |
aa3951451 net: sk_sleep() h... |
1231 |
} |
1da177e4c Linux-2.6.12-rc2 |
1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 |
/* Detach socket from process context. * Announce socket dead, detach it from wait queue and inode. * Note that parent inode held reference count on this struct sock, * we do not release it in this function, because protocol * probably wants some additional cleanups or even continuing * to work with this socket (TCP). */ static inline void sock_orphan(struct sock *sk) { write_lock_bh(&sk->sk_callback_lock); sock_set_flag(sk, SOCK_DEAD); |
972692e0d net: Add sk_set_s... |
1243 |
sk_set_socket(sk, NULL); |
438154823 net: sock_def_rea... |
1244 |
sk->sk_wq = NULL; |
1da177e4c Linux-2.6.12-rc2 |
1245 1246 1247 1248 1249 1250 |
write_unlock_bh(&sk->sk_callback_lock); } static inline void sock_graft(struct sock *sk, struct socket *parent) { write_lock_bh(&sk->sk_callback_lock); |
eaefd1105 net: add __rcu an... |
1251 |
sk->sk_wq = parent->wq; |
1da177e4c Linux-2.6.12-rc2 |
1252 |
parent->sk = sk; |
972692e0d net: Add sk_set_s... |
1253 |
sk_set_socket(sk, parent); |
4237c75c0 [MLSXFRM]: Auto-l... |
1254 |
security_sock_graft(sk, parent); |
1da177e4c Linux-2.6.12-rc2 |
1255 1256 1257 1258 1259 1260 1261 1262 1263 |
write_unlock_bh(&sk->sk_callback_lock); } extern int sock_i_uid(struct sock *sk); extern unsigned long sock_i_ino(struct sock *sk); static inline struct dst_entry * __sk_dst_get(struct sock *sk) { |
d8bf4ca9c rcu: treewide: Do... |
1264 |
return rcu_dereference_check(sk->sk_dst_cache, sock_owned_by_user(sk) || |
f68c224fe dst: rcu check re... |
1265 |
lockdep_is_held(&sk->sk_lock.slock)); |
1da177e4c Linux-2.6.12-rc2 |
1266 1267 1268 1269 1270 1271 |
} static inline struct dst_entry * sk_dst_get(struct sock *sk) { struct dst_entry *dst; |
b6c6712a4 net: sk_dst_cache... |
1272 1273 |
rcu_read_lock(); dst = rcu_dereference(sk->sk_dst_cache); |
1da177e4c Linux-2.6.12-rc2 |
1274 1275 |
if (dst) dst_hold(dst); |
b6c6712a4 net: sk_dst_cache... |
1276 |
rcu_read_unlock(); |
1da177e4c Linux-2.6.12-rc2 |
1277 1278 |
return dst; } |
b6c6712a4 net: sk_dst_cache... |
1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 |
extern void sk_reset_txq(struct sock *sk); static inline void dst_negative_advice(struct sock *sk) { struct dst_entry *ndst, *dst = __sk_dst_get(sk); if (dst && dst->ops->negative_advice) { ndst = dst->ops->negative_advice(dst); if (ndst != dst) { rcu_assign_pointer(sk->sk_dst_cache, ndst); sk_reset_txq(sk); } } } |
1da177e4c Linux-2.6.12-rc2 |
1294 1295 1296 1297 |
static inline void __sk_dst_set(struct sock *sk, struct dst_entry *dst) { struct dst_entry *old_dst; |
e022f0b4a net: Introduce sk... |
1298 |
sk_tx_queue_clear(sk); |
0b53ff2ea net: fix a lockde... |
1299 1300 1301 1302 1303 |
/* * This can be called while sk is owned by the caller only, * with no state that can be checked in a rcu_dereference_check() cond */ old_dst = rcu_dereference_raw(sk->sk_dst_cache); |
b6c6712a4 net: sk_dst_cache... |
1304 |
rcu_assign_pointer(sk->sk_dst_cache, dst); |
1da177e4c Linux-2.6.12-rc2 |
1305 1306 1307 1308 1309 1310 |
dst_release(old_dst); } static inline void sk_dst_set(struct sock *sk, struct dst_entry *dst) { |
b6c6712a4 net: sk_dst_cache... |
1311 |
spin_lock(&sk->sk_dst_lock); |
1da177e4c Linux-2.6.12-rc2 |
1312 |
__sk_dst_set(sk, dst); |
b6c6712a4 net: sk_dst_cache... |
1313 |
spin_unlock(&sk->sk_dst_lock); |
1da177e4c Linux-2.6.12-rc2 |
1314 1315 1316 1317 1318 |
} static inline void __sk_dst_reset(struct sock *sk) { |
b6c6712a4 net: sk_dst_cache... |
1319 |
__sk_dst_set(sk, NULL); |
1da177e4c Linux-2.6.12-rc2 |
1320 1321 1322 1323 1324 |
} static inline void sk_dst_reset(struct sock *sk) { |
b6c6712a4 net: sk_dst_cache... |
1325 |
spin_lock(&sk->sk_dst_lock); |
1da177e4c Linux-2.6.12-rc2 |
1326 |
__sk_dst_reset(sk); |
b6c6712a4 net: sk_dst_cache... |
1327 |
spin_unlock(&sk->sk_dst_lock); |
1da177e4c Linux-2.6.12-rc2 |
1328 |
} |
f0088a50e [NET]: deinline 2... |
1329 |
extern struct dst_entry *__sk_dst_check(struct sock *sk, u32 cookie); |
1da177e4c Linux-2.6.12-rc2 |
1330 |
|
f0088a50e [NET]: deinline 2... |
1331 |
extern struct dst_entry *sk_dst_check(struct sock *sk, u32 cookie); |
1da177e4c Linux-2.6.12-rc2 |
1332 |
|
bcd761111 [NET]: Generalise... |
1333 1334 1335 1336 |
static inline int sk_can_gso(const struct sock *sk) { return net_gso_ok(sk->sk_route_caps, sk->sk_gso_type); } |
9958089a4 [NET]: Move sk_se... |
1337 |
extern void sk_setup_caps(struct sock *sk, struct dst_entry *dst); |
6cbb0df78 [SOCK]: Introduce... |
1338 |
|
a465419b1 net: Introduce sk... |
1339 1340 1341 1342 1343 |
static inline void sk_nocaps_add(struct sock *sk, int flags) { sk->sk_route_nocaps |= flags; sk->sk_route_caps &= ~flags; } |
c6e1a0d12 net: Allow no-cac... |
1344 1345 |
static inline int skb_do_copy_data_nocache(struct sock *sk, struct sk_buff *skb, char __user *from, char *to, |
912d398d2 net: fix skb_add_... |
1346 |
int copy, int offset) |
c6e1a0d12 net: Allow no-cac... |
1347 1348 1349 1350 1351 1352 |
{ if (skb->ip_summed == CHECKSUM_NONE) { int err = 0; __wsum csum = csum_and_copy_from_user(from, to, copy, 0, &err); if (err) return err; |
912d398d2 net: fix skb_add_... |
1353 |
skb->csum = csum_block_add(skb->csum, csum, offset); |
c6e1a0d12 net: Allow no-cac... |
1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 |
} else if (sk->sk_route_caps & NETIF_F_NOCACHE_COPY) { if (!access_ok(VERIFY_READ, from, copy) || __copy_from_user_nocache(to, from, copy)) return -EFAULT; } else if (copy_from_user(to, from, copy)) return -EFAULT; return 0; } static inline int skb_add_data_nocache(struct sock *sk, struct sk_buff *skb, char __user *from, int copy) { |
912d398d2 net: fix skb_add_... |
1367 |
int err, offset = skb->len; |
c6e1a0d12 net: Allow no-cac... |
1368 |
|
912d398d2 net: fix skb_add_... |
1369 1370 |
err = skb_do_copy_data_nocache(sk, skb, from, skb_put(skb, copy), copy, offset); |
c6e1a0d12 net: Allow no-cac... |
1371 |
if (err) |
912d398d2 net: fix skb_add_... |
1372 |
__skb_trim(skb, offset); |
c6e1a0d12 net: Allow no-cac... |
1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 |
return err; } static inline int skb_copy_to_page_nocache(struct sock *sk, char __user *from, struct sk_buff *skb, struct page *page, int off, int copy) { int err; |
912d398d2 net: fix skb_add_... |
1383 1384 |
err = skb_do_copy_data_nocache(sk, skb, from, page_address(page) + off, copy, skb->len); |
c6e1a0d12 net: Allow no-cac... |
1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 |
if (err) return err; skb->len += copy; skb->data_len += copy; skb->truesize += copy; sk->sk_wmem_queued += copy; sk_mem_charge(sk, copy); return 0; } |
1da177e4c Linux-2.6.12-rc2 |
1395 1396 1397 1398 1399 1400 |
static inline int skb_copy_to_page(struct sock *sk, char __user *from, struct sk_buff *skb, struct page *page, int off, int copy) { if (skb->ip_summed == CHECKSUM_NONE) { int err = 0; |
5084205fa [NET]: Annotate c... |
1401 |
__wsum csum = csum_and_copy_from_user(from, |
1da177e4c Linux-2.6.12-rc2 |
1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 |
page_address(page) + off, copy, 0, &err); if (err) return err; skb->csum = csum_block_add(skb->csum, csum, skb->len); } else if (copy_from_user(page_address(page) + off, from, copy)) return -EFAULT; skb->len += copy; skb->data_len += copy; skb->truesize += copy; sk->sk_wmem_queued += copy; |
3ab224be6 [NET] CORE: Intro... |
1414 |
sk_mem_charge(sk, copy); |
1da177e4c Linux-2.6.12-rc2 |
1415 1416 |
return 0; } |
c564039fd net: sk_wmem_allo... |
1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 |
/** * sk_wmem_alloc_get - returns write allocations * @sk: socket * * Returns sk_wmem_alloc minus initial offset of one */ static inline int sk_wmem_alloc_get(const struct sock *sk) { return atomic_read(&sk->sk_wmem_alloc) - 1; } /** * sk_rmem_alloc_get - returns read allocations * @sk: socket * * Returns sk_rmem_alloc */ static inline int sk_rmem_alloc_get(const struct sock *sk) { return atomic_read(&sk->sk_rmem_alloc); } /** * sk_has_allocations - check if allocations are outstanding * @sk: socket * * Returns true if socket has write or read allocations */ static inline int sk_has_allocations(const struct sock *sk) { return sk_wmem_alloc_get(sk) || sk_rmem_alloc_get(sk); } |
a57de0b43 net: adding memor... |
1449 |
/** |
438154823 net: sock_def_rea... |
1450 |
* wq_has_sleeper - check if there are any waiting processes |
acfbe96a3 sock.h: fix kerne... |
1451 |
* @wq: struct socket_wq |
a57de0b43 net: adding memor... |
1452 |
* |
438154823 net: sock_def_rea... |
1453 |
* Returns true if socket_wq has waiting processes |
a57de0b43 net: adding memor... |
1454 |
* |
438154823 net: sock_def_rea... |
1455 |
* The purpose of the wq_has_sleeper and sock_poll_wait is to wrap the memory |
a57de0b43 net: adding memor... |
1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 |
* barrier call. They were added due to the race found within the tcp code. * * Consider following tcp code paths: * * CPU1 CPU2 * * sys_select receive packet * ... ... * __add_wait_queue update tp->rcv_nxt * ... ... * tp->rcv_nxt check sock_def_readable * ... { |
438154823 net: sock_def_rea... |
1468 1469 1470 1471 |
* schedule rcu_read_lock(); * wq = rcu_dereference(sk->sk_wq); * if (wq && waitqueue_active(&wq->wait)) * wake_up_interruptible(&wq->wait) |
a57de0b43 net: adding memor... |
1472 1473 1474 1475 1476 1477 1478 |
* ... * } * * The race for tcp fires when the __add_wait_queue changes done by CPU1 stay * in its cache, and so does the tp->rcv_nxt update on CPU2 side. The CPU1 * could then endup calling schedule and sleep forever if there are no more * data on the socket. |
ad4627695 memory barrier: a... |
1479 |
* |
a57de0b43 net: adding memor... |
1480 |
*/ |
438154823 net: sock_def_rea... |
1481 |
static inline bool wq_has_sleeper(struct socket_wq *wq) |
a57de0b43 net: adding memor... |
1482 |
{ |
438154823 net: sock_def_rea... |
1483 |
|
a57de0b43 net: adding memor... |
1484 1485 1486 1487 1488 1489 |
/* * We need to be sure we are in sync with the * add_wait_queue modifications to the wait queue. * * This memory barrier is paired in the sock_poll_wait. */ |
438154823 net: sock_def_rea... |
1490 1491 |
smp_mb(); return wq && waitqueue_active(&wq->wait); |
a57de0b43 net: adding memor... |
1492 1493 1494 1495 1496 1497 1498 1499 |
} /** * sock_poll_wait - place memory barrier behind the poll_wait call. * @filp: file * @wait_address: socket wait queue * @p: poll_table * |
438154823 net: sock_def_rea... |
1500 |
* See the comments in the wq_has_sleeper function. |
a57de0b43 net: adding memor... |
1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 |
*/ static inline void sock_poll_wait(struct file *filp, wait_queue_head_t *wait_address, poll_table *p) { if (p && wait_address) { poll_wait(filp, wait_address, p); /* * We need to be sure we are in sync with the * socket flags modification. * |
438154823 net: sock_def_rea... |
1511 |
* This memory barrier is paired in the wq_has_sleeper. |
a57de0b43 net: adding memor... |
1512 1513 1514 1515 |
*/ smp_mb(); } } |
1da177e4c Linux-2.6.12-rc2 |
1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 |
/* * Queue a received datagram if it will fit. Stream and sequenced * protocols can't normally use this as they need to fit buffers in * and play with them. * * Inlined as it's very short and called for pretty much every * packet ever received. */ static inline void skb_set_owner_w(struct sk_buff *skb, struct sock *sk) { |
d55d87fdf net: Move rx skb_... |
1527 |
skb_orphan(skb); |
1da177e4c Linux-2.6.12-rc2 |
1528 1529 |
skb->sk = sk; skb->destructor = sock_wfree; |
2b85a34e9 net: No more expe... |
1530 1531 1532 1533 1534 |
/* * We used to take a refcount on sk, but following operation * is enough to guarantee sk_free() wont free this sock until * all in-flight packets are completed */ |
1da177e4c Linux-2.6.12-rc2 |
1535 1536 1537 1538 1539 |
atomic_add(skb->truesize, &sk->sk_wmem_alloc); } static inline void skb_set_owner_r(struct sk_buff *skb, struct sock *sk) { |
d55d87fdf net: Move rx skb_... |
1540 |
skb_orphan(skb); |
1da177e4c Linux-2.6.12-rc2 |
1541 1542 1543 |
skb->sk = sk; skb->destructor = sock_rfree; atomic_add(skb->truesize, &sk->sk_rmem_alloc); |
3ab224be6 [NET] CORE: Intro... |
1544 |
sk_mem_charge(sk, skb->truesize); |
1da177e4c Linux-2.6.12-rc2 |
1545 1546 1547 1548 1549 1550 |
} extern void sk_reset_timer(struct sock *sk, struct timer_list* timer, unsigned long expires); extern void sk_stop_timer(struct sock *sk, struct timer_list* timer); |
f0088a50e [NET]: deinline 2... |
1551 |
extern int sock_queue_rcv_skb(struct sock *sk, struct sk_buff *skb); |
1da177e4c Linux-2.6.12-rc2 |
1552 |
|
b1faf5666 net: sock_queue_e... |
1553 |
extern int sock_queue_err_skb(struct sock *sk, struct sk_buff *skb); |
1da177e4c Linux-2.6.12-rc2 |
1554 1555 1556 1557 1558 1559 1560 |
/* * Recover an error report and clear atomically */ static inline int sock_error(struct sock *sk) { |
c1cbe4b7a [NET]: Avoid atom... |
1561 1562 1563 1564 |
int err; if (likely(!sk->sk_err)) return 0; err = xchg(&sk->sk_err, 0); |
1da177e4c Linux-2.6.12-rc2 |
1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 |
return -err; } static inline unsigned long sock_wspace(struct sock *sk) { int amt = 0; if (!(sk->sk_shutdown & SEND_SHUTDOWN)) { amt = sk->sk_sndbuf - atomic_read(&sk->sk_wmem_alloc); if (amt < 0) amt = 0; } return amt; } static inline void sk_wake_async(struct sock *sk, int how, int band) { |
bcdce7195 net: speedup sk_w... |
1582 |
if (sock_flag(sk, SOCK_FASYNC)) |
1da177e4c Linux-2.6.12-rc2 |
1583 1584 1585 1586 |
sock_wake_async(sk->sk_socket, how, band); } #define SOCK_MIN_SNDBUF 2048 |
7a91b434e net: update SOCK_... |
1587 1588 1589 1590 1591 |
/* * Since sk_rmem_alloc sums skb->truesize, even a small frame might need * sizeof(sk_buff) + MTU + padding, unless net driver perform copybreak */ #define SOCK_MIN_RCVBUF (2048 + sizeof(struct sk_buff)) |
1da177e4c Linux-2.6.12-rc2 |
1592 1593 1594 1595 |
static inline void sk_stream_moderate_sndbuf(struct sock *sk) { if (!(sk->sk_userlocks & SOCK_SNDBUF_LOCK)) { |
8df09ea3b [SOCK] Avoid inte... |
1596 |
sk->sk_sndbuf = min(sk->sk_sndbuf, sk->sk_wmem_queued >> 1); |
1da177e4c Linux-2.6.12-rc2 |
1597 1598 1599 |
sk->sk_sndbuf = max(sk->sk_sndbuf, SOCK_MIN_SNDBUF); } } |
df97c708d [NET]: Eliminate ... |
1600 |
struct sk_buff *sk_stream_alloc_skb(struct sock *sk, int size, gfp_t gfp); |
1da177e4c Linux-2.6.12-rc2 |
1601 1602 1603 1604 |
static inline struct page *sk_stream_alloc_page(struct sock *sk) { struct page *page = NULL; |
ef0157861 [TCP]: Fix sk_for... |
1605 1606 |
page = alloc_pages(sk->sk_allocation, 0); if (!page) { |
5c52ba170 sock: add net to ... |
1607 |
sk->sk_prot->enter_memory_pressure(sk); |
1da177e4c Linux-2.6.12-rc2 |
1608 1609 1610 1611 |
sk_stream_moderate_sndbuf(sk); } return page; } |
1da177e4c Linux-2.6.12-rc2 |
1612 1613 1614 1615 1616 |
/* * Default write policy as shown to user space via poll/select/SIGIO */ static inline int sock_writeable(const struct sock *sk) { |
8df09ea3b [SOCK] Avoid inte... |
1617 |
return atomic_read(&sk->sk_wmem_alloc) < (sk->sk_sndbuf >> 1); |
1da177e4c Linux-2.6.12-rc2 |
1618 |
} |
dd0fc66fb [PATCH] gfp flags... |
1619 |
static inline gfp_t gfp_any(void) |
1da177e4c Linux-2.6.12-rc2 |
1620 |
{ |
997093727 net: don't use in... |
1621 |
return in_softirq() ? GFP_ATOMIC : GFP_KERNEL; |
1da177e4c Linux-2.6.12-rc2 |
1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 |
} static inline long sock_rcvtimeo(const struct sock *sk, int noblock) { return noblock ? 0 : sk->sk_rcvtimeo; } static inline long sock_sndtimeo(const struct sock *sk, int noblock) { return noblock ? 0 : sk->sk_sndtimeo; } static inline int sock_rcvlowat(const struct sock *sk, int waitall, int len) { return (waitall ? len : min_t(int, sk->sk_rcvlowat, len)) ? : 1; } /* Alas, with timeout socket operations are not restartable. * Compare this to poll(). */ static inline int sock_intr_errno(long timeo) { return timeo == MAX_SCHEDULE_TIMEOUT ? -ERESTARTSYS : -EINTR; } |
92f37fd2e [NET]: Adding SO_... |
1646 1647 |
extern void __sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb); |
1da177e4c Linux-2.6.12-rc2 |
1648 1649 1650 |
static __inline__ void sock_recv_timestamp(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { |
b7aa0bf70 [NET]: convert ne... |
1651 |
ktime_t kt = skb->tstamp; |
20d494735 net: socket infra... |
1652 |
struct skb_shared_hwtstamps *hwtstamps = skb_hwtstamps(skb); |
a61bbcf28 [NET]: Store skb-... |
1653 |
|
20d494735 net: socket infra... |
1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 |
/* * generate control messages if * - receive time stamping in software requested (SOCK_RCVTSTAMP * or SOCK_TIMESTAMPING_RX_SOFTWARE) * - software time stamp available and wanted * (SOCK_TIMESTAMPING_SOFTWARE) * - hardware time stamps available and wanted * (SOCK_TIMESTAMPING_SYS_HARDWARE or * SOCK_TIMESTAMPING_RAW_HARDWARE) */ if (sock_flag(sk, SOCK_RCVTSTAMP) || sock_flag(sk, SOCK_TIMESTAMPING_RX_SOFTWARE) || (kt.tv64 && sock_flag(sk, SOCK_TIMESTAMPING_SOFTWARE)) || (hwtstamps->hwtstamp.tv64 && sock_flag(sk, SOCK_TIMESTAMPING_RAW_HARDWARE)) || (hwtstamps->syststamp.tv64 && sock_flag(sk, SOCK_TIMESTAMPING_SYS_HARDWARE))) |
92f37fd2e [NET]: Adding SO_... |
1671 1672 |
__sock_recv_timestamp(msg, sk, skb); else |
b7aa0bf70 [NET]: convert ne... |
1673 |
sk->sk_stamp = kt; |
1da177e4c Linux-2.6.12-rc2 |
1674 |
} |
767dd0336 net: speedup sock... |
1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 |
extern void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk, struct sk_buff *skb); static inline void sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk, struct sk_buff *skb) { #define FLAGS_TS_OR_DROPS ((1UL << SOCK_RXQ_OVFL) | \ (1UL << SOCK_RCVTSTAMP) | \ (1UL << SOCK_TIMESTAMPING_RX_SOFTWARE) | \ (1UL << SOCK_TIMESTAMPING_SOFTWARE) | \ (1UL << SOCK_TIMESTAMPING_RAW_HARDWARE) | \ (1UL << SOCK_TIMESTAMPING_SYS_HARDWARE)) if (sk->sk_flags & FLAGS_TS_OR_DROPS) __sock_recv_ts_and_drops(msg, sk, skb); else sk->sk_stamp = skb->tstamp; } |
3b885787e net: Generalize s... |
1693 |
|
1da177e4c Linux-2.6.12-rc2 |
1694 |
/** |
20d494735 net: socket infra... |
1695 |
* sock_tx_timestamp - checks whether the outgoing packet is to be time stamped |
20d494735 net: socket infra... |
1696 |
* @sk: socket sending this packet |
2244d07bf net: simplify fla... |
1697 |
* @tx_flags: filled with instructions for time stamping |
20d494735 net: socket infra... |
1698 1699 1700 1701 |
* * Currently only depends on SOCK_TIMESTAMPING* flags. Returns error code if * parameters are invalid. */ |
2244d07bf net: simplify fla... |
1702 |
extern int sock_tx_timestamp(struct sock *sk, __u8 *tx_flags); |
20d494735 net: socket infra... |
1703 1704 |
/** |
1da177e4c Linux-2.6.12-rc2 |
1705 |
* sk_eat_skb - Release a skb if it is no longer needed |
4dc3b16ba [PATCH] DocBook: ... |
1706 1707 |
* @sk: socket to eat this skb from * @skb: socket buffer to eat |
f4b8ea784 [NET]: fix net-co... |
1708 |
* @copied_early: flag indicating whether DMA operations copied this data early |
1da177e4c Linux-2.6.12-rc2 |
1709 1710 1711 1712 |
* * This routine must be called with interrupts disabled or with the socket * locked so that the sk_buff queue operation is ok. */ |
624d11647 [I/OAT]: Make sk_... |
1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 |
#ifdef CONFIG_NET_DMA static inline void sk_eat_skb(struct sock *sk, struct sk_buff *skb, int copied_early) { __skb_unlink(skb, &sk->sk_receive_queue); if (!copied_early) __kfree_skb(skb); else __skb_queue_tail(&sk->sk_async_wait_queue, skb); } #else static inline void sk_eat_skb(struct sock *sk, struct sk_buff *skb, int copied_early) |
1da177e4c Linux-2.6.12-rc2 |
1724 1725 1726 1727 |
{ __skb_unlink(skb, &sk->sk_receive_queue); __kfree_skb(skb); } |
624d11647 [I/OAT]: Make sk_... |
1728 |
#endif |
1da177e4c Linux-2.6.12-rc2 |
1729 |
|
3b1e0a655 [NET] NETNS: Omit... |
1730 1731 1732 |
static inline struct net *sock_net(const struct sock *sk) { |
c2d9ba9bc net: CONFIG_NET_N... |
1733 |
return read_pnet(&sk->sk_net); |
3b1e0a655 [NET] NETNS: Omit... |
1734 1735 1736 |
} static inline |
f5aa23fd4 [NETNS]: Compilat... |
1737 |
void sock_net_set(struct sock *sk, struct net *net) |
3b1e0a655 [NET] NETNS: Omit... |
1738 |
{ |
c2d9ba9bc net: CONFIG_NET_N... |
1739 |
write_pnet(&sk->sk_net, net); |
3b1e0a655 [NET] NETNS: Omit... |
1740 |
} |
edf020870 [NET]: Make netli... |
1741 1742 |
/* * Kernel sockets, f.e. rtnl or icmp_socket, are a part of a namespace. |
25985edce Fix common misspe... |
1743 |
* They should not hold a reference to a namespace in order to allow |
edf020870 [NET]: Make netli... |
1744 1745 1746 1747 1748 |
* to stop it. * Sockets after sk_change_net should be released using sk_release_kernel */ static inline void sk_change_net(struct sock *sk, struct net *net) { |
3b1e0a655 [NET] NETNS: Omit... |
1749 |
put_net(sock_net(sk)); |
65a18ec58 [NETNS]: Add netn... |
1750 |
sock_net_set(sk, hold_net(net)); |
edf020870 [NET]: Make netli... |
1751 |
} |
23542618d inet: Don't looku... |
1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 |
static inline struct sock *skb_steal_sock(struct sk_buff *skb) { if (unlikely(skb->sk)) { struct sock *sk = skb->sk; skb->destructor = NULL; skb->sk = NULL; return sk; } return NULL; } |
20d494735 net: socket infra... |
1763 |
extern void sock_enable_timestamp(struct sock *sk, int flag); |
1da177e4c Linux-2.6.12-rc2 |
1764 |
extern int sock_get_timestamp(struct sock *, struct timeval __user *); |
ae40eb1ef [NET]: Introduce ... |
1765 |
extern int sock_get_timestampns(struct sock *, struct timespec __user *); |
1da177e4c Linux-2.6.12-rc2 |
1766 1767 1768 1769 |
/* * Enable debug/info messages */ |
a2a316fd0 [NET]: Replace CO... |
1770 1771 1772 |
extern int net_msg_warn; #define NETDEBUG(fmt, args...) \ do { if (net_msg_warn) printk(fmt,##args); } while (0) |
1da177e4c Linux-2.6.12-rc2 |
1773 |
|
a2a316fd0 [NET]: Replace CO... |
1774 1775 |
#define LIMIT_NETDEBUG(fmt, args...) \ do { if (net_msg_warn && net_ratelimit()) printk(fmt,##args); } while(0) |
1da177e4c Linux-2.6.12-rc2 |
1776 |
|
1da177e4c Linux-2.6.12-rc2 |
1777 1778 |
extern __u32 sysctl_wmem_max; extern __u32 sysctl_rmem_max; |
20380731b [NET]: Fix sparse... |
1779 |
extern void sk_init(void); |
6baf1f417 [NET]: Do not pro... |
1780 |
extern int sysctl_optmem_max; |
20380731b [NET]: Fix sparse... |
1781 1782 |
extern __u32 sysctl_wmem_default; extern __u32 sysctl_rmem_default; |
20380731b [NET]: Fix sparse... |
1783 |
|
1da177e4c Linux-2.6.12-rc2 |
1784 |
#endif /* _SOCK_H */ |