Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp2970015rdb; Tue, 12 Sep 2023 19:25:29 -0700 (PDT) X-Google-Smtp-Source: AGHT+IF0iUxx5y8pwqbESJQBBZ57ITGeJDe8XRFPd781DrXU/3Z5ZisYpSK4+BxEppIZTywqTb/j X-Received: by 2002:a05:6870:508:b0:1d0:e371:d7b0 with SMTP id j8-20020a056870050800b001d0e371d7b0mr1314445oao.5.1694571928660; Tue, 12 Sep 2023 19:25:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694571928; cv=none; d=google.com; s=arc-20160816; b=lSxWZijiQLxyMB89U44YaFPF0juVh6yoF/VRON2hR+Atp5VyhH4qB+fyZ2HgWog7uV /uO15Cb6LMyhOpSSTVs3EK5vNcwG1dlZLFlVkx3GS55Aq7M+lBKqYmCTYzxpKFb2rP/u Atu+ICYcapRGEzGgk6eVHd4+Hw9SUOAYJsPXAELuLUJVACUkg+qDGkFmUxf49bM56Wgn q47USsqzzA3AF0+zxt6nDdLBRAafRJ6OkprmmySb1lPk2itDutffd0qivZVskHzvVfLc auIMoHYmCA1iQV6v2fzJNkAQJ+EYAdvtJEwG7NyKSf7tyjwaA9kv+PE7cR6FmW/rCvpJ 3R5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:cc:to:from :subject:message-id:dkim-signature; bh=lFvEVHqhU+e2PFkmxQBvXlSSPTjXEKHDQREd4bomtkc=; fh=3B50H4xNvCRDef2jUfm91CAX/RMJXf4fnty9VTErXT8=; b=aZ/qAa7Tr2Z6LnEvQILTOjy5DLFXqBUAZ+iD41q0S3jJdOu6k+8FItTaI59ZApJU9j YPjfNTf9nrV/1jm+9aHKJ4vDaqyq+qqT89qCR61BxOh9AuBxqkPlFAW94QMlavmVVD96 +8lfURSTc/VYJe0WpeT8jdwyHIbpqLBNPAd3yAn/X2r3LnyEndshisFXCgOCsOHrXr4q u/jf+UEyfVcn5C/8ZkBK4oyrr9GklN26ZAwmImJX+u7U53afukB/bLfmMZmyLZ6H+Wou MsoFoz8EGoUh34KtXVv+IiMqiyRb3hSkoX6puvtbf3ZfIDG/UyQezykN3LFafJ3KnUKK OAdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=g8EZfN47; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id u15-20020a63b54f000000b00577448019b5si6897878pgo.276.2023.09.12.19.25.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 19:25:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=g8EZfN47; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 5C1E483AFF6D; Tue, 12 Sep 2023 02:38:20 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.8 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232563AbjILJiV (ORCPT + 99 others); Tue, 12 Sep 2023 05:38:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47192 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232361AbjILJiU (ORCPT ); Tue, 12 Sep 2023 05:38:20 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8F7E2E64 for ; Tue, 12 Sep 2023 02:37:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1694511454; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=lFvEVHqhU+e2PFkmxQBvXlSSPTjXEKHDQREd4bomtkc=; b=g8EZfN47Q1cMGJdReujitw894+iz2FdLBdo1H6QGZ1siLJynjSNuKMx9olUUERUe22rGnx 76nTySlQlxDMJE6vVzQHgRLuIt4RzfhyS0WcPcc/9AvouIjb7FqG/+JMG54r+l4/GhdmWW UuBImYgmp539m2ya9bG7kpWFdWpqFTQ= Received: from mail-lf1-f71.google.com (mail-lf1-f71.google.com [209.85.167.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-550-HzW1wTDDOsSi-9IRsxx8cg-1; Tue, 12 Sep 2023 05:37:33 -0400 X-MC-Unique: HzW1wTDDOsSi-9IRsxx8cg-1 Received: by mail-lf1-f71.google.com with SMTP id 2adb3069b0e04-502c8388d97so296842e87.1 for ; Tue, 12 Sep 2023 02:37:32 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694511451; x=1695116251; h=mime-version:user-agent:content-transfer-encoding:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=lFvEVHqhU+e2PFkmxQBvXlSSPTjXEKHDQREd4bomtkc=; b=vH0XS9zx5Hj4YAU56xFXvSTtmdWl0LzjVDyYEVu3P+4aeyh1prDiOtsNbqO81ji8RI cU0RMmtLk2ML5oNtXPAWF+v3VTOfO68PP81o71gHiMNoO7BiSgHww4sw/zeJMqVvqGMW Qazkcv41O8wGYxHiksalDg3cdYizpmXvF1lz5ACuK5ei3ko90VSN1/nL9r+EN3c2d0mY rf/DmcR7Kpl6EBfchpJr8S3MOTN3phG64mjV4WhzUVDEwBMBp1uehrd5vW+2BwDSLveQ nNEzUMqqvRbiW54PgHPpzr52igKH+RBcvm5nSdeYZszMg31IaacCj+7e8rX7hHnY3yuK fBcg== X-Gm-Message-State: AOJu0YwmZKbBxAjss815YYjFL4yZ7COOcyBoR4+ifod/QDHXAGDmRS+A NjogPfo57lw25Uc+7yWcMOBNJn4N6fi/icUniqQpzWq9GbQ+hdRK6S2tnrnfaFKeIkOvpwNar/x 3fYZHxpnawlQ0zBL0+8FlLm1k X-Received: by 2002:a19:7402:0:b0:501:c223:fa22 with SMTP id v2-20020a197402000000b00501c223fa22mr7676645lfe.6.1694511451697; Tue, 12 Sep 2023 02:37:31 -0700 (PDT) X-Received: by 2002:a19:7402:0:b0:501:c223:fa22 with SMTP id v2-20020a197402000000b00501c223fa22mr7676633lfe.6.1694511451290; Tue, 12 Sep 2023 02:37:31 -0700 (PDT) Received: from gerbillo.redhat.com (146-241-249-231.dyn.eolo.it. [146.241.249.231]) by smtp.gmail.com with ESMTPSA id w20-20020a1709064a1400b00991faf3810esm6640960eju.146.2023.09.12.02.37.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Sep 2023 02:37:30 -0700 (PDT) Message-ID: Subject: Re: [PATCH v5 2/8] net/socket: Break down __sys_getsockopt From: Paolo Abeni To: Breno Leitao , sdf@google.com, axboe@kernel.dk, asml.silence@gmail.com, willemdebruijn.kernel@gmail.com, kuba@kernel.org, martin.lau@linux.dev, krisman@suse.de, "David S. Miller" , Eric Dumazet Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, io-uring@vger.kernel.org Date: Tue, 12 Sep 2023 11:37:29 +0200 In-Reply-To: <20230911103407.1393149-3-leitao@debian.org> References: <20230911103407.1393149-1-leitao@debian.org> <20230911103407.1393149-3-leitao@debian.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.46.4 (3.46.4-1.fc37) MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 12 Sep 2023 02:38:20 -0700 (PDT) On Mon, 2023-09-11 at 03:34 -0700, Breno Leitao wrote: > Split __sys_getsockopt() into two functions by removing the core > logic into a sub-function (do_sock_getsockopt()). This will avoid > code duplication when executing the same operation in other callers, for > instance. >=20 > do_sock_getsockopt() will be called by io_uring getsockopt() command > operation in the following patch. >=20 > Suggested-by: Martin KaFai Lau > Signed-off-by: Breno Leitao > --- > include/net/sock.h | 3 +++ > net/socket.c | 51 ++++++++++++++++++++++++++++------------------ > 2 files changed, 34 insertions(+), 20 deletions(-) >=20 > diff --git a/include/net/sock.h b/include/net/sock.h > index aa8fb54ad0af..fbd568a43d28 100644 > --- a/include/net/sock.h > +++ b/include/net/sock.h > @@ -1863,6 +1863,9 @@ int sock_setsockopt(struct socket *sock, int level,= int op, > sockptr_t optval, unsigned int optlen); > int do_sock_setsockopt(struct socket *sock, bool compat, int level, > int optname, char __user *user_optval, int optlen); > +int do_sock_getsockopt(struct socket *sock, bool compat, int level, > + int optname, char __user *user_optval, > + int __user *user_optlen); > =20 > int sk_getsockopt(struct sock *sk, int level, int optname, > sockptr_t optval, sockptr_t optlen); > diff --git a/net/socket.c b/net/socket.c > index 360332e098d4..3ec779a56f79 100644 > --- a/net/socket.c > +++ b/net/socket.c > @@ -2333,28 +2333,17 @@ SYSCALL_DEFINE5(setsockopt, int, fd, int, level, = int, optname, > INDIRECT_CALLABLE_DECLARE(bool tcp_bpf_bypass_getsockopt(int level, > int optname)); > =20 > -/* > - * Get a socket option. Because we don't know the option lengths we have > - * to pass a user mode parameter for the protocols to sort out. > - */ > -int __sys_getsockopt(int fd, int level, int optname, char __user *optval= , > - int __user *optlen) > +int do_sock_getsockopt(struct socket *sock, bool compat, int level, > + int optname, char __user *optval, > + int __user *optlen) > { > int max_optlen __maybe_unused; > const struct proto_ops *ops; > - int err, fput_needed; > - struct socket *sock; > - > - sock =3D sockfd_lookup_light(fd, &err, &fput_needed); > - if (!sock) > - return err; > + int err; > =20 > err =3D security_socket_getsockopt(sock, level, optname); > if (err) > - goto out_put; > - > - if (!in_compat_syscall()) > - max_optlen =3D BPF_CGROUP_GETSOCKOPT_MAX_OPTLEN(optlen); > + return err; > =20 > ops =3D READ_ONCE(sock->ops); > if (level =3D=3D SOL_SOCKET) > @@ -2362,14 +2351,36 @@ int __sys_getsockopt(int fd, int level, int optna= me, char __user *optval, > else if (unlikely(!ops->getsockopt)) > err =3D -EOPNOTSUPP; > else > - err =3D ops->getsockopt(sock, level, optname, optval, > - optlen); > + err =3D ops->getsockopt(sock, level, optname, optval, optlen); > =20 > - if (!in_compat_syscall()) > + if (!compat) { > + max_optlen =3D BPF_CGROUP_GETSOCKOPT_MAX_OPTLEN(optlen); > err =3D BPF_CGROUP_RUN_PROG_GETSOCKOPT(sock->sk, level, optname, > optval, optlen, max_optlen, > err); > -out_put: > + } > + > + return err; > +} > +EXPORT_SYMBOL(do_sock_getsockopt); > + > +/* Get a socket option. Because we don't know the option lengths we have > + * to pass a user mode parameter for the protocols to sort out. > + */ > +int __sys_getsockopt(int fd, int level, int optname, char __user *optval= , > + int __user *optlen) > +{ > + int err, fput_needed; > + bool compat =3D in_compat_syscall(); > + struct socket *sock; Please respect the reverse x-mas tree order, thanks! Paolo