blob: e9489696f694540bfb90d12aba6e1cd3c5dd1d57 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * SUCS NET3:
3 *
4 * Generic stream handling routines. These are generic for most
5 * protocols. Even IP. Tonight 8-).
6 * This is used because TCP, LLC (others too) layer all have mostly
7 * identical sendmsg() and recvmsg() code.
8 * So we (will) share it here.
9 *
10 * Authors: Arnaldo Carvalho de Melo <acme@conectiva.com.br>
11 * (from old tcp.c code)
12 * Alan Cox <alan@redhat.com> (Borrowed comments 8-))
13 */
14
15#include <linux/module.h>
16#include <linux/net.h>
17#include <linux/signal.h>
18#include <linux/tcp.h>
19#include <linux/wait.h>
20#include <net/sock.h>
21
22/**
23 * sk_stream_write_space - stream socket write_space callback.
Pavel Pisa4dc3b162005-05-01 08:59:25 -070024 * @sk: socket
Linus Torvalds1da177e2005-04-16 15:20:36 -070025 *
26 * FIXME: write proper description
27 */
28void sk_stream_write_space(struct sock *sk)
29{
30 struct socket *sock = sk->sk_socket;
31
32 if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk) && sock) {
33 clear_bit(SOCK_NOSPACE, &sock->flags);
34
35 if (sk->sk_sleep && waitqueue_active(sk->sk_sleep))
36 wake_up_interruptible(sk->sk_sleep);
37 if (sock->fasync_list && !(sk->sk_shutdown & SEND_SHUTDOWN))
38 sock_wake_async(sock, 2, POLL_OUT);
39 }
40}
41
42EXPORT_SYMBOL(sk_stream_write_space);
43
44/**
45 * sk_stream_wait_connect - Wait for a socket to get into the connected state
Pavel Pisa4dc3b162005-05-01 08:59:25 -070046 * @sk: sock to wait on
47 * @timeo_p: for how long to wait
Linus Torvalds1da177e2005-04-16 15:20:36 -070048 *
49 * Must be called with the socket locked.
50 */
51int sk_stream_wait_connect(struct sock *sk, long *timeo_p)
52{
53 struct task_struct *tsk = current;
54 DEFINE_WAIT(wait);
Herbert Xu6151b312005-11-04 09:56:56 +110055 int done;
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
Herbert Xu6151b312005-11-04 09:56:56 +110057 do {
Benjamin LaHaisec1cbe4b2005-12-13 23:22:19 -080058 int err = sock_error(sk);
59 if (err)
60 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -070061 if ((1 << sk->sk_state) & ~(TCPF_SYN_SENT | TCPF_SYN_RECV))
62 return -EPIPE;
63 if (!*timeo_p)
64 return -EAGAIN;
65 if (signal_pending(tsk))
66 return sock_intr_errno(*timeo_p);
67
68 prepare_to_wait(sk->sk_sleep, &wait, TASK_INTERRUPTIBLE);
69 sk->sk_write_pending++;
Herbert Xu6151b312005-11-04 09:56:56 +110070 done = sk_wait_event(sk, timeo_p,
Benjamin LaHaisec1cbe4b2005-12-13 23:22:19 -080071 !sk->sk_err &&
Herbert Xu6151b312005-11-04 09:56:56 +110072 !((1 << sk->sk_state) &
73 ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)));
Linus Torvalds1da177e2005-04-16 15:20:36 -070074 finish_wait(sk->sk_sleep, &wait);
75 sk->sk_write_pending--;
Herbert Xu6151b312005-11-04 09:56:56 +110076 } while (!done);
Linus Torvalds1da177e2005-04-16 15:20:36 -070077 return 0;
78}
79
80EXPORT_SYMBOL(sk_stream_wait_connect);
81
82/**
83 * sk_stream_closing - Return 1 if we still have things to send in our buffers.
Pavel Pisa4dc3b162005-05-01 08:59:25 -070084 * @sk: socket to verify
Linus Torvalds1da177e2005-04-16 15:20:36 -070085 */
86static inline int sk_stream_closing(struct sock *sk)
87{
88 return (1 << sk->sk_state) &
89 (TCPF_FIN_WAIT1 | TCPF_CLOSING | TCPF_LAST_ACK);
90}
91
92void sk_stream_wait_close(struct sock *sk, long timeout)
93{
94 if (timeout) {
95 DEFINE_WAIT(wait);
96
97 do {
98 prepare_to_wait(sk->sk_sleep, &wait,
99 TASK_INTERRUPTIBLE);
100 if (sk_wait_event(sk, &timeout, !sk_stream_closing(sk)))
101 break;
102 } while (!signal_pending(current) && timeout);
103
104 finish_wait(sk->sk_sleep, &wait);
105 }
106}
107
108EXPORT_SYMBOL(sk_stream_wait_close);
109
110/**
111 * sk_stream_wait_memory - Wait for more memory for a socket
Pavel Pisa4dc3b162005-05-01 08:59:25 -0700112 * @sk: socket to wait for memory
113 * @timeo_p: for how long
Linus Torvalds1da177e2005-04-16 15:20:36 -0700114 */
115int sk_stream_wait_memory(struct sock *sk, long *timeo_p)
116{
117 int err = 0;
118 long vm_wait = 0;
119 long current_timeo = *timeo_p;
120 DEFINE_WAIT(wait);
121
122 if (sk_stream_memory_free(sk))
123 current_timeo = vm_wait = (net_random() % (HZ / 5)) + 2;
124
125 while (1) {
126 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
127
128 prepare_to_wait(sk->sk_sleep, &wait, TASK_INTERRUPTIBLE);
129
130 if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
131 goto do_error;
132 if (!*timeo_p)
133 goto do_nonblock;
134 if (signal_pending(current))
135 goto do_interrupted;
136 clear_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
137 if (sk_stream_memory_free(sk) && !vm_wait)
138 break;
139
140 set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
141 sk->sk_write_pending++;
Benjamin LaHaisec1cbe4b2005-12-13 23:22:19 -0800142 sk_wait_event(sk, &current_timeo, !sk->sk_err &&
143 !(sk->sk_shutdown & SEND_SHUTDOWN) &&
144 sk_stream_memory_free(sk) &&
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145 vm_wait);
146 sk->sk_write_pending--;
147
148 if (vm_wait) {
149 vm_wait -= current_timeo;
150 current_timeo = *timeo_p;
151 if (current_timeo != MAX_SCHEDULE_TIMEOUT &&
152 (current_timeo -= vm_wait) < 0)
153 current_timeo = 0;
154 vm_wait = 0;
155 }
156 *timeo_p = current_timeo;
157 }
158out:
159 finish_wait(sk->sk_sleep, &wait);
160 return err;
161
162do_error:
163 err = -EPIPE;
164 goto out;
165do_nonblock:
166 err = -EAGAIN;
167 goto out;
168do_interrupted:
169 err = sock_intr_errno(*timeo_p);
170 goto out;
171}
172
173EXPORT_SYMBOL(sk_stream_wait_memory);
174
175void sk_stream_rfree(struct sk_buff *skb)
176{
177 struct sock *sk = skb->sk;
178
David S. Millerdc6de332006-04-20 00:10:50 -0700179 skb_truesize_check(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700180 atomic_sub(skb->truesize, &sk->sk_rmem_alloc);
181 sk->sk_forward_alloc += skb->truesize;
182}
183
184EXPORT_SYMBOL(sk_stream_rfree);
185
186int sk_stream_error(struct sock *sk, int flags, int err)
187{
188 if (err == -EPIPE)
189 err = sock_error(sk) ? : -EPIPE;
190 if (err == -EPIPE && !(flags & MSG_NOSIGNAL))
191 send_sig(SIGPIPE, current, 0);
192 return err;
193}
194
195EXPORT_SYMBOL(sk_stream_error);
196
197void __sk_stream_mem_reclaim(struct sock *sk)
198{
199 if (sk->sk_forward_alloc >= SK_STREAM_MEM_QUANTUM) {
200 atomic_sub(sk->sk_forward_alloc / SK_STREAM_MEM_QUANTUM,
201 sk->sk_prot->memory_allocated);
202 sk->sk_forward_alloc &= SK_STREAM_MEM_QUANTUM - 1;
203 if (*sk->sk_prot->memory_pressure &&
204 (atomic_read(sk->sk_prot->memory_allocated) <
205 sk->sk_prot->sysctl_mem[0]))
206 *sk->sk_prot->memory_pressure = 0;
207 }
208}
209
210EXPORT_SYMBOL(__sk_stream_mem_reclaim);
211
212int sk_stream_mem_schedule(struct sock *sk, int size, int kind)
213{
214 int amt = sk_stream_pages(size);
215
216 sk->sk_forward_alloc += amt * SK_STREAM_MEM_QUANTUM;
217 atomic_add(amt, sk->sk_prot->memory_allocated);
218
219 /* Under limit. */
220 if (atomic_read(sk->sk_prot->memory_allocated) < sk->sk_prot->sysctl_mem[0]) {
221 if (*sk->sk_prot->memory_pressure)
222 *sk->sk_prot->memory_pressure = 0;
223 return 1;
224 }
225
226 /* Over hard limit. */
227 if (atomic_read(sk->sk_prot->memory_allocated) > sk->sk_prot->sysctl_mem[2]) {
228 sk->sk_prot->enter_memory_pressure();
229 goto suppress_allocation;
230 }
231
232 /* Under pressure. */
233 if (atomic_read(sk->sk_prot->memory_allocated) > sk->sk_prot->sysctl_mem[1])
234 sk->sk_prot->enter_memory_pressure();
235
236 if (kind) {
237 if (atomic_read(&sk->sk_rmem_alloc) < sk->sk_prot->sysctl_rmem[0])
238 return 1;
239 } else if (sk->sk_wmem_queued < sk->sk_prot->sysctl_wmem[0])
240 return 1;
241
242 if (!*sk->sk_prot->memory_pressure ||
243 sk->sk_prot->sysctl_mem[2] > atomic_read(sk->sk_prot->sockets_allocated) *
244 sk_stream_pages(sk->sk_wmem_queued +
245 atomic_read(&sk->sk_rmem_alloc) +
246 sk->sk_forward_alloc))
247 return 1;
248
249suppress_allocation:
250
251 if (!kind) {
252 sk_stream_moderate_sndbuf(sk);
253
254 /* Fail only if socket is _under_ its sndbuf.
255 * In this case we cannot block, so that we have to fail.
256 */
257 if (sk->sk_wmem_queued + size >= sk->sk_sndbuf)
258 return 1;
259 }
260
261 /* Alas. Undo changes. */
262 sk->sk_forward_alloc -= amt * SK_STREAM_MEM_QUANTUM;
263 atomic_sub(amt, sk->sk_prot->memory_allocated);
264 return 0;
265}
266
267EXPORT_SYMBOL(sk_stream_mem_schedule);
268
269void sk_stream_kill_queues(struct sock *sk)
270{
271 /* First the read buffer. */
272 __skb_queue_purge(&sk->sk_receive_queue);
273
274 /* Next, the error queue. */
275 __skb_queue_purge(&sk->sk_error_queue);
276
277 /* Next, the write queue. */
278 BUG_TRAP(skb_queue_empty(&sk->sk_write_queue));
279
280 /* Account for returned memory. */
281 sk_stream_mem_reclaim(sk);
282
283 BUG_TRAP(!sk->sk_wmem_queued);
284 BUG_TRAP(!sk->sk_forward_alloc);
285
286 /* It is _impossible_ for the backlog to contain anything
287 * when we get here. All user references to this socket
288 * have gone away, only the net layer knows can touch it.
289 */
290}
291
292EXPORT_SYMBOL(sk_stream_kill_queues);