blob: 7daff66d3d0bedf249b61e6bb393caed0263c789 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * SUCS NET3:
3 *
4 * Generic datagram handling routines. These are generic for all
5 * protocols. Possibly a generic IP version on top of these would
6 * make sense. Not tonight however 8-).
7 * This is used because UDP, RAW, PACKET, DDP, IPX, AX.25 and
8 * NetROM layer all have identical poll code and mostly
9 * identical recvmsg() code. So we share it here. The poll was
10 * shared before but buried in udp.c so I moved it.
11 *
Alan Cox113aa832008-10-13 19:01:08 -070012 * Authors: Alan Cox <alan@lxorguk.ukuu.org.uk>. (datagram_poll() from old
Linus Torvalds1da177e2005-04-16 15:20:36 -070013 * udp.c code)
14 *
15 * Fixes:
16 * Alan Cox : NULL return from skb_peek_copy()
17 * understood
18 * Alan Cox : Rewrote skb_read_datagram to avoid the
19 * skb_peek_copy stuff.
20 * Alan Cox : Added support for SOCK_SEQPACKET.
21 * IPX can no longer use the SO_TYPE hack
22 * but AX.25 now works right, and SPX is
23 * feasible.
24 * Alan Cox : Fixed write poll of non IP protocol
25 * crash.
26 * Florian La Roche: Changed for my new skbuff handling.
27 * Darryl Miles : Fixed non-blocking SOCK_SEQPACKET.
28 * Linus Torvalds : BSD semantic fixes.
29 * Alan Cox : Datagram iovec handling
30 * Darryl Miles : Fixed non-blocking SOCK_STREAM.
31 * Alan Cox : POSIXisms
32 * Pete Wyckoff : Unconnected accept() fix.
33 *
34 */
35
36#include <linux/module.h>
37#include <linux/types.h>
38#include <linux/kernel.h>
39#include <asm/uaccess.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070040#include <linux/mm.h>
41#include <linux/interrupt.h>
42#include <linux/errno.h>
43#include <linux/sched.h>
44#include <linux/inet.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070045#include <linux/netdevice.h>
46#include <linux/rtnetlink.h>
47#include <linux/poll.h>
48#include <linux/highmem.h>
Herbert Xu3305b802005-12-13 23:16:37 -080049#include <linux/spinlock.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090050#include <linux/slab.h>
Jason Wang04335472013-08-06 17:45:07 +080051#include <linux/pagemap.h>
Herbert Xua8f820aa2014-11-07 21:22:22 +080052#include <linux/uio.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070053
54#include <net/protocol.h>
55#include <linux/skbuff.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070056
Arnaldo Carvalho de Meloc752f072005-08-09 20:08:28 -070057#include <net/checksum.h>
58#include <net/sock.h>
59#include <net/tcp_states.h>
Neil Hormane9b3cc12009-08-13 05:19:44 +000060#include <trace/events/skb.h>
Eliezer Tamir076bb0c2013-07-10 17:13:17 +030061#include <net/busy_poll.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070062
63/*
64 * Is a socket 'connection oriented' ?
65 */
66static inline int connection_based(struct sock *sk)
67{
68 return sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM;
69}
70
Eric Dumazet95c96172012-04-15 05:58:06 +000071static int receiver_wake_function(wait_queue_t *wait, unsigned int mode, int sync,
Eric Dumazetbf368e42009-04-28 02:24:21 -070072 void *key)
73{
74 unsigned long bits = (unsigned long)key;
75
76 /*
77 * Avoid a wakeup if event not interesting for us
78 */
79 if (bits && !(bits & (POLLIN | POLLERR)))
80 return 0;
81 return autoremove_wake_function(wait, mode, sync, key);
82}
Linus Torvalds1da177e2005-04-16 15:20:36 -070083/*
Benjamin Poirier39cc8612013-04-29 11:42:13 +000084 * Wait for the last received packet to be different from skb
Linus Torvalds1da177e2005-04-16 15:20:36 -070085 */
Rainer Weikusatea3793e2015-12-06 21:11:34 +000086int __skb_wait_for_more_packets(struct sock *sk, int *err, long *timeo_p,
87 const struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -070088{
89 int error;
Eric Dumazetbf368e42009-04-28 02:24:21 -070090 DEFINE_WAIT_FUNC(wait, receiver_wake_function);
Linus Torvalds1da177e2005-04-16 15:20:36 -070091
Eric Dumazetaa395142010-04-20 13:03:51 +000092 prepare_to_wait_exclusive(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -070093
94 /* Socket errors? */
95 error = sock_error(sk);
96 if (error)
97 goto out_err;
98
Benjamin Poirier39cc8612013-04-29 11:42:13 +000099 if (sk->sk_receive_queue.prev != skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700100 goto out;
101
102 /* Socket shut down? */
103 if (sk->sk_shutdown & RCV_SHUTDOWN)
104 goto out_noerr;
105
106 /* Sequenced packets can come disconnected.
107 * If so we report the problem
108 */
109 error = -ENOTCONN;
110 if (connection_based(sk) &&
111 !(sk->sk_state == TCP_ESTABLISHED || sk->sk_state == TCP_LISTEN))
112 goto out_err;
113
114 /* handle signals */
115 if (signal_pending(current))
116 goto interrupted;
117
118 error = 0;
119 *timeo_p = schedule_timeout(*timeo_p);
120out:
Eric Dumazetaa395142010-04-20 13:03:51 +0000121 finish_wait(sk_sleep(sk), &wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122 return error;
123interrupted:
124 error = sock_intr_errno(*timeo_p);
125out_err:
126 *err = error;
127 goto out;
128out_noerr:
129 *err = 0;
130 error = 1;
131 goto out;
132}
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000133EXPORT_SYMBOL(__skb_wait_for_more_packets);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700134
Herbert Xua0a2a662015-08-04 15:42:47 +0800135static struct sk_buff *skb_set_peeked(struct sk_buff *skb)
Herbert Xu738ac1e2015-07-13 16:04:13 +0800136{
137 struct sk_buff *nskb;
138
139 if (skb->peeked)
Herbert Xua0a2a662015-08-04 15:42:47 +0800140 return skb;
Herbert Xu738ac1e2015-07-13 16:04:13 +0800141
142 /* We have to unshare an skb before modifying it. */
143 if (!skb_shared(skb))
144 goto done;
145
146 nskb = skb_clone(skb, GFP_ATOMIC);
147 if (!nskb)
Herbert Xua0a2a662015-08-04 15:42:47 +0800148 return ERR_PTR(-ENOMEM);
Herbert Xu738ac1e2015-07-13 16:04:13 +0800149
150 skb->prev->next = nskb;
151 skb->next->prev = nskb;
152 nskb->prev = skb->prev;
153 nskb->next = skb->next;
154
155 consume_skb(skb);
156 skb = nskb;
157
158done:
159 skb->peeked = 1;
160
Herbert Xua0a2a662015-08-04 15:42:47 +0800161 return skb;
Herbert Xu738ac1e2015-07-13 16:04:13 +0800162}
163
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164/**
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000165 * __skb_try_recv_datagram - Receive a datagram skbuff
Pavel Pisa4dc3b162005-05-01 08:59:25 -0700166 * @sk: socket
167 * @flags: MSG_ flags
Benjamin Poirier39cc8612013-04-29 11:42:13 +0000168 * @peeked: returns non-zero if this packet has been seen before
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000169 * @off: an offset in bytes to peek skb from. Returns an offset
170 * within an skb where data actually starts
Pavel Pisa4dc3b162005-05-01 08:59:25 -0700171 * @err: error code returned
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000172 * @last: set to last peeked message to inform the wait function
173 * what to look for when peeking
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174 *
175 * Get a datagram skbuff, understands the peeking, nonblocking wakeups
176 * and possible races. This replaces identical code in packet, raw and
177 * udp, as well as the IPX AX.25 and Appletalk. It also finally fixes
178 * the long standing peek and read race for datagram sockets. If you
179 * alter this routine remember it must be re-entrant.
180 *
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000181 * This function will lock the socket if a skb is returned, so
182 * the caller needs to unlock the socket in that case (usually by
183 * calling skb_free_datagram). Returns NULL with *err set to
184 * -EAGAIN if no data was available or to some other value if an
185 * error was detected.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700186 *
187 * * It does not lock socket since today. This function is
188 * * free of race conditions. This measure should/can improve
189 * * significantly datagram socket latencies at high loads,
190 * * when data copying to user space takes lots of time.
191 * * (BTW I've just killed the last cli() in IP/IPv6/core/netlink/packet
192 * * 8) Great win.)
193 * * --ANK (980729)
194 *
195 * The order of the tests when we find no data waiting are specified
196 * quite explicitly by POSIX 1003.1g, don't change them without having
197 * the standard around please.
198 */
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000199struct sk_buff *__skb_try_recv_datagram(struct sock *sk, unsigned int flags,
200 int *peeked, int *off, int *err,
201 struct sk_buff **last)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202{
Herbert Xu738ac1e2015-07-13 16:04:13 +0800203 struct sk_buff_head *queue = &sk->sk_receive_queue;
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000204 struct sk_buff *skb;
Herbert Xu738ac1e2015-07-13 16:04:13 +0800205 unsigned long cpu_flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206 /*
207 * Caller is allowed not to check sk->sk_err before skb_recv_datagram()
208 */
209 int error = sock_error(sk);
210
211 if (error)
212 goto no_packet;
213
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214 do {
215 /* Again only user level code calls this function, so nothing
216 * interrupt level will suddenly eat the receive_queue.
217 *
218 * Look at current nfs client by the way...
David Shwatrz8917a3c2010-12-02 09:01:55 +0000219 * However, this function was correct in any case. 8)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 */
Benjamin Poirier39cc8612013-04-29 11:42:13 +0000221 int _off = *off;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000223 *last = (struct sk_buff *)queue;
Pavel Emelyanov4934b032012-02-21 07:30:33 +0000224 spin_lock_irqsave(&queue->lock, cpu_flags);
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000225 skb_queue_walk(queue, skb) {
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000226 *last = skb;
Herbert Xua59322b2007-12-05 01:53:40 -0800227 *peeked = skb->peeked;
228 if (flags & MSG_PEEK) {
Benjamin Poirier39cc8612013-04-29 11:42:13 +0000229 if (_off >= skb->len && (skb->len || _off ||
Benjamin Poirieradd05ad2013-04-29 11:42:12 +0000230 skb->peeked)) {
Benjamin Poirier39cc8612013-04-29 11:42:13 +0000231 _off -= skb->len;
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000232 continue;
233 }
Herbert Xu738ac1e2015-07-13 16:04:13 +0800234
Herbert Xua0a2a662015-08-04 15:42:47 +0800235 skb = skb_set_peeked(skb);
236 error = PTR_ERR(skb);
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000237 if (IS_ERR(skb)) {
238 spin_unlock_irqrestore(&queue->lock,
239 cpu_flags);
240 goto no_packet;
241 }
Herbert Xu738ac1e2015-07-13 16:04:13 +0800242
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243 atomic_inc(&skb->users);
Herbert Xua59322b2007-12-05 01:53:40 -0800244 } else
Pavel Emelyanov4934b032012-02-21 07:30:33 +0000245 __skb_unlink(skb, queue);
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000246
247 spin_unlock_irqrestore(&queue->lock, cpu_flags);
Benjamin Poirier39cc8612013-04-29 11:42:13 +0000248 *off = _off;
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000249 return skb;
Herbert Xua59322b2007-12-05 01:53:40 -0800250 }
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000251
Pavel Emelyanov4934b032012-02-21 07:30:33 +0000252 spin_unlock_irqrestore(&queue->lock, cpu_flags);
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000253 } while (sk_can_busy_loop(sk) &&
254 sk_busy_loop(sk, flags & MSG_DONTWAIT));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000256 error = -EAGAIN;
Eliezer Tamira5b50472013-06-10 11:40:00 +0300257
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258no_packet:
259 *err = error;
260 return NULL;
261}
Rainer Weikusatea3793e2015-12-06 21:11:34 +0000262EXPORT_SYMBOL(__skb_try_recv_datagram);
263
264struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags,
265 int *peeked, int *off, int *err)
266{
267 struct sk_buff *skb, *last;
268 long timeo;
269
270 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
271
272 do {
273 skb = __skb_try_recv_datagram(sk, flags, peeked, off, err,
274 &last);
275 if (skb)
276 return skb;
277
278 if (*err != EAGAIN)
279 break;
280 } while (timeo &&
281 !__skb_wait_for_more_packets(sk, err, &timeo, last));
282
283 return NULL;
284}
Herbert Xua59322b2007-12-05 01:53:40 -0800285EXPORT_SYMBOL(__skb_recv_datagram);
286
Eric Dumazet95c96172012-04-15 05:58:06 +0000287struct sk_buff *skb_recv_datagram(struct sock *sk, unsigned int flags,
Herbert Xua59322b2007-12-05 01:53:40 -0800288 int noblock, int *err)
289{
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000290 int peeked, off = 0;
Herbert Xua59322b2007-12-05 01:53:40 -0800291
292 return __skb_recv_datagram(sk, flags | (noblock ? MSG_DONTWAIT : 0),
Pavel Emelyanov3f518bf2012-02-21 07:30:58 +0000293 &peeked, &off, err);
Herbert Xua59322b2007-12-05 01:53:40 -0800294}
Eric Dumazet9e34a5b2010-07-09 21:22:04 +0000295EXPORT_SYMBOL(skb_recv_datagram);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700296
297void skb_free_datagram(struct sock *sk, struct sk_buff *skb)
298{
Neil Hormanead2ceb2009-03-11 09:49:55 +0000299 consume_skb(skb);
Eric Dumazet270acef2008-11-05 01:38:06 -0800300 sk_mem_reclaim_partial(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700301}
Eric Dumazet9d410c72009-10-30 05:03:53 +0000302EXPORT_SYMBOL(skb_free_datagram);
303
304void skb_free_datagram_locked(struct sock *sk, struct sk_buff *skb)
305{
Eric Dumazet8a74ad62010-05-26 19:20:18 +0000306 bool slow;
307
Eric Dumazet93bb64e2010-05-03 23:18:14 -0700308 if (likely(atomic_read(&skb->users) == 1))
309 smp_rmb();
310 else if (likely(!atomic_dec_and_test(&skb->users)))
311 return;
312
Eric Dumazet8a74ad62010-05-26 19:20:18 +0000313 slow = lock_sock_fast(sk);
Eric Dumazet4b0b72f2010-04-28 14:35:48 -0700314 skb_orphan(skb);
315 sk_mem_reclaim_partial(sk);
Eric Dumazet8a74ad62010-05-26 19:20:18 +0000316 unlock_sock_fast(sk, slow);
Eric Dumazet4b0b72f2010-04-28 14:35:48 -0700317
Eric Dumazet93bb64e2010-05-03 23:18:14 -0700318 /* skb is now orphaned, can be freed outside of locked section */
319 __kfree_skb(skb);
Eric Dumazet9d410c72009-10-30 05:03:53 +0000320}
321EXPORT_SYMBOL(skb_free_datagram_locked);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700322
323/**
Herbert Xu3305b802005-12-13 23:16:37 -0800324 * skb_kill_datagram - Free a datagram skbuff forcibly
325 * @sk: socket
326 * @skb: datagram skbuff
327 * @flags: MSG_ flags
328 *
329 * This function frees a datagram skbuff that was received by
330 * skb_recv_datagram. The flags argument must match the one
331 * used for skb_recv_datagram.
332 *
333 * If the MSG_PEEK flag is set, and the packet is still on the
334 * receive queue of the socket, it will be taken off the queue
335 * before it is freed.
336 *
337 * This function currently only disables BH when acquiring the
338 * sk_receive_queue lock. Therefore it must not be used in a
339 * context where that lock is acquired in an IRQ context.
Herbert Xu27ab2562007-12-05 01:51:58 -0800340 *
341 * It returns 0 if the packet was removed by us.
Herbert Xu3305b802005-12-13 23:16:37 -0800342 */
343
Herbert Xu27ab2562007-12-05 01:51:58 -0800344int skb_kill_datagram(struct sock *sk, struct sk_buff *skb, unsigned int flags)
Herbert Xu3305b802005-12-13 23:16:37 -0800345{
Herbert Xu27ab2562007-12-05 01:51:58 -0800346 int err = 0;
347
Herbert Xu3305b802005-12-13 23:16:37 -0800348 if (flags & MSG_PEEK) {
Herbert Xu27ab2562007-12-05 01:51:58 -0800349 err = -ENOENT;
Herbert Xu3305b802005-12-13 23:16:37 -0800350 spin_lock_bh(&sk->sk_receive_queue.lock);
351 if (skb == skb_peek(&sk->sk_receive_queue)) {
352 __skb_unlink(skb, &sk->sk_receive_queue);
353 atomic_dec(&skb->users);
Herbert Xu27ab2562007-12-05 01:51:58 -0800354 err = 0;
Herbert Xu3305b802005-12-13 23:16:37 -0800355 }
356 spin_unlock_bh(&sk->sk_receive_queue.lock);
357 }
358
John Dykstra61de71c2009-05-08 14:57:01 -0700359 kfree_skb(skb);
Eric Dumazet8edf19c2009-10-15 00:12:40 +0000360 atomic_inc(&sk->sk_drops);
John Dykstra61de71c2009-05-08 14:57:01 -0700361 sk_mem_reclaim_partial(sk);
362
Herbert Xu27ab2562007-12-05 01:51:58 -0800363 return err;
Herbert Xu3305b802005-12-13 23:16:37 -0800364}
Herbert Xu3305b802005-12-13 23:16:37 -0800365EXPORT_SYMBOL(skb_kill_datagram);
366
367/**
Herbert Xua8f820aa2014-11-07 21:22:22 +0800368 * skb_copy_datagram_iter - Copy a datagram to an iovec iterator.
369 * @skb: buffer to copy
370 * @offset: offset in the buffer to start copying from
371 * @to: iovec iterator to copy to
372 * @len: amount of data to copy from buffer to iovec
373 */
374int skb_copy_datagram_iter(const struct sk_buff *skb, int offset,
375 struct iov_iter *to, int len)
376{
377 int start = skb_headlen(skb);
378 int i, copy = start - offset;
379 struct sk_buff *frag_iter;
380
381 trace_skb_copy_datagram_iovec(skb, len);
382
383 /* Copy header. */
384 if (copy > 0) {
385 if (copy > len)
386 copy = len;
387 if (copy_to_iter(skb->data + offset, copy, to) != copy)
388 goto short_copy;
389 if ((len -= copy) == 0)
390 return 0;
391 offset += copy;
392 }
393
394 /* Copy paged appendix. Hmm... why does this look so complicated? */
395 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
396 int end;
397 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
398
399 WARN_ON(start > offset + len);
400
401 end = start + skb_frag_size(frag);
402 if ((copy = end - offset) > 0) {
403 if (copy > len)
404 copy = len;
405 if (copy_page_to_iter(skb_frag_page(frag),
406 frag->page_offset + offset -
407 start, copy, to) != copy)
408 goto short_copy;
409 if (!(len -= copy))
410 return 0;
411 offset += copy;
412 }
413 start = end;
414 }
415
416 skb_walk_frags(skb, frag_iter) {
417 int end;
418
419 WARN_ON(start > offset + len);
420
421 end = start + frag_iter->len;
422 if ((copy = end - offset) > 0) {
423 if (copy > len)
424 copy = len;
425 if (skb_copy_datagram_iter(frag_iter, offset - start,
426 to, copy))
427 goto fault;
428 if ((len -= copy) == 0)
429 return 0;
430 offset += copy;
431 }
432 start = end;
433 }
434 if (!len)
435 return 0;
436
437 /* This is not really a user copy fault, but rather someone
438 * gave us a bogus length on the skb. We should probably
439 * print a warning here as it may indicate a kernel bug.
440 */
441
442fault:
443 return -EFAULT;
444
445short_copy:
446 if (iov_iter_count(to))
447 goto fault;
448
449 return 0;
450}
451EXPORT_SYMBOL(skb_copy_datagram_iter);
452
453/**
Al Viro8feb2fb2014-11-06 01:10:59 -0500454 * skb_copy_datagram_from_iter - Copy a datagram from an iov_iter.
Rusty Russelldb543c12008-08-15 15:13:53 -0700455 * @skb: buffer to copy
456 * @offset: offset in the buffer to start copying to
Al Viro8feb2fb2014-11-06 01:10:59 -0500457 * @from: the copy source
Rusty Russelldb543c12008-08-15 15:13:53 -0700458 * @len: amount of data to copy to buffer from iovec
459 *
460 * Returns 0 or -EFAULT.
Rusty Russelldb543c12008-08-15 15:13:53 -0700461 */
Al Viro3a654f92014-06-19 14:15:22 -0400462int skb_copy_datagram_from_iter(struct sk_buff *skb, int offset,
463 struct iov_iter *from,
464 int len)
465{
466 int start = skb_headlen(skb);
467 int i, copy = start - offset;
468 struct sk_buff *frag_iter;
469
470 /* Copy header. */
471 if (copy > 0) {
472 if (copy > len)
473 copy = len;
474 if (copy_from_iter(skb->data + offset, copy, from) != copy)
475 goto fault;
476 if ((len -= copy) == 0)
477 return 0;
478 offset += copy;
479 }
480
481 /* Copy paged appendix. Hmm... why does this look so complicated? */
482 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
483 int end;
484 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
485
486 WARN_ON(start > offset + len);
487
488 end = start + skb_frag_size(frag);
489 if ((copy = end - offset) > 0) {
490 size_t copied;
491
492 if (copy > len)
493 copy = len;
494 copied = copy_page_from_iter(skb_frag_page(frag),
495 frag->page_offset + offset - start,
496 copy, from);
497 if (copied != copy)
498 goto fault;
499
500 if (!(len -= copy))
501 return 0;
502 offset += copy;
503 }
504 start = end;
505 }
506
507 skb_walk_frags(skb, frag_iter) {
508 int end;
509
510 WARN_ON(start > offset + len);
511
512 end = start + frag_iter->len;
513 if ((copy = end - offset) > 0) {
514 if (copy > len)
515 copy = len;
516 if (skb_copy_datagram_from_iter(frag_iter,
517 offset - start,
518 from, copy))
519 goto fault;
520 if ((len -= copy) == 0)
521 return 0;
522 offset += copy;
523 }
524 start = end;
525 }
526 if (!len)
527 return 0;
528
529fault:
530 return -EFAULT;
531}
532EXPORT_SYMBOL(skb_copy_datagram_from_iter);
533
Jason Wangc3bdeb52013-08-06 17:45:04 +0800534/**
Al Viro195e9522014-11-06 00:56:48 -0500535 * zerocopy_sg_from_iter - Build a zerocopy datagram from an iov_iter
Jason Wangc3bdeb52013-08-06 17:45:04 +0800536 * @skb: buffer to copy
Al Viro195e9522014-11-06 00:56:48 -0500537 * @from: the source to copy from
Jason Wangc3bdeb52013-08-06 17:45:04 +0800538 *
539 * The function will first copy up to headlen, and then pin the userspace
540 * pages and build frags through them.
541 *
542 * Returns 0, -EFAULT or -EMSGSIZE.
Jason Wangc3bdeb52013-08-06 17:45:04 +0800543 */
Al Viro3a654f92014-06-19 14:15:22 -0400544int zerocopy_sg_from_iter(struct sk_buff *skb, struct iov_iter *from)
545{
546 int len = iov_iter_count(from);
547 int copy = min_t(int, skb_headlen(skb), len);
548 int frag = 0;
549
550 /* copy up to skb headlen */
551 if (skb_copy_datagram_from_iter(skb, 0, from, copy))
552 return -EFAULT;
553
554 while (iov_iter_count(from)) {
555 struct page *pages[MAX_SKB_FRAGS];
556 size_t start;
557 ssize_t copied;
558 unsigned long truesize;
559 int n = 0;
560
561 if (frag == MAX_SKB_FRAGS)
562 return -EMSGSIZE;
563
564 copied = iov_iter_get_pages(from, pages, ~0U,
565 MAX_SKB_FRAGS - frag, &start);
566 if (copied < 0)
567 return -EFAULT;
568
569 iov_iter_advance(from, copied);
570
571 truesize = PAGE_ALIGN(copied + start);
572 skb->data_len += copied;
573 skb->len += copied;
574 skb->truesize += truesize;
575 atomic_add(truesize, &skb->sk->sk_wmem_alloc);
576 while (copied) {
577 int size = min_t(int, copied, PAGE_SIZE - start);
578 skb_fill_page_desc(skb, frag++, pages[n], start, size);
579 start = 0;
580 copied -= size;
581 n++;
582 }
583 }
584 return 0;
585}
586EXPORT_SYMBOL(zerocopy_sg_from_iter);
587
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588static int skb_copy_and_csum_datagram(const struct sk_buff *skb, int offset,
Al Viroe5a4b0b2014-11-24 18:17:55 -0500589 struct iov_iter *to, int len,
Al Viro50842052006-11-14 21:36:34 -0800590 __wsum *csump)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591{
David S. Miller1a028e52007-04-27 15:21:23 -0700592 int start = skb_headlen(skb);
David S. Miller1a028e52007-04-27 15:21:23 -0700593 int i, copy = start - offset;
David S. Miller5b1a0022009-06-09 00:18:15 -0700594 struct sk_buff *frag_iter;
595 int pos = 0;
Al Viroe5a4b0b2014-11-24 18:17:55 -0500596 int n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700597
598 /* Copy header. */
599 if (copy > 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 if (copy > len)
601 copy = len;
Al Viroe5a4b0b2014-11-24 18:17:55 -0500602 n = csum_and_copy_to_iter(skb->data + offset, copy, csump, to);
603 if (n != copy)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700604 goto fault;
605 if ((len -= copy) == 0)
606 return 0;
607 offset += copy;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700608 pos = copy;
609 }
610
611 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
David S. Miller1a028e52007-04-27 15:21:23 -0700612 int end;
Eric Dumazet9e903e02011-10-18 21:00:24 +0000613 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700614
Ilpo Järvinen547b7922008-07-25 21:43:18 -0700615 WARN_ON(start > offset + len);
David S. Miller1a028e52007-04-27 15:21:23 -0700616
Eric Dumazet9e903e02011-10-18 21:00:24 +0000617 end = start + skb_frag_size(frag);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700618 if ((copy = end - offset) > 0) {
Al Viroe5a4b0b2014-11-24 18:17:55 -0500619 __wsum csum2 = 0;
Ian Campbellea2ab692011-08-22 23:44:58 +0000620 struct page *page = skb_frag_page(frag);
Al Viroe5a4b0b2014-11-24 18:17:55 -0500621 u8 *vaddr = kmap(page);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700622
623 if (copy > len)
624 copy = len;
Al Viroe5a4b0b2014-11-24 18:17:55 -0500625 n = csum_and_copy_to_iter(vaddr + frag->page_offset +
626 offset - start, copy,
627 &csum2, to);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700628 kunmap(page);
Al Viroe5a4b0b2014-11-24 18:17:55 -0500629 if (n != copy)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700630 goto fault;
631 *csump = csum_block_add(*csump, csum2, pos);
632 if (!(len -= copy))
633 return 0;
634 offset += copy;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635 pos += copy;
636 }
David S. Miller1a028e52007-04-27 15:21:23 -0700637 start = end;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700638 }
639
David S. Miller5b1a0022009-06-09 00:18:15 -0700640 skb_walk_frags(skb, frag_iter) {
641 int end;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700642
David S. Miller5b1a0022009-06-09 00:18:15 -0700643 WARN_ON(start > offset + len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700644
David S. Miller5b1a0022009-06-09 00:18:15 -0700645 end = start + frag_iter->len;
646 if ((copy = end - offset) > 0) {
647 __wsum csum2 = 0;
648 if (copy > len)
649 copy = len;
650 if (skb_copy_and_csum_datagram(frag_iter,
651 offset - start,
652 to, copy,
653 &csum2))
654 goto fault;
655 *csump = csum_block_add(*csump, csum2, pos);
656 if ((len -= copy) == 0)
657 return 0;
658 offset += copy;
David S. Miller5b1a0022009-06-09 00:18:15 -0700659 pos += copy;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700660 }
David S. Miller5b1a0022009-06-09 00:18:15 -0700661 start = end;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700662 }
663 if (!len)
664 return 0;
665
666fault:
667 return -EFAULT;
668}
669
Herbert Xu759e5d02007-03-25 20:10:56 -0700670__sum16 __skb_checksum_complete_head(struct sk_buff *skb, int len)
Herbert Xufb286bb2005-11-10 13:01:24 -0800671{
Al Virod3bc23e2006-11-14 21:24:49 -0800672 __sum16 sum;
Herbert Xufb286bb2005-11-10 13:01:24 -0800673
Herbert Xu759e5d02007-03-25 20:10:56 -0700674 sum = csum_fold(skb_checksum(skb, 0, len, skb->csum));
Tom Herbert46fb51e2014-06-14 23:24:03 -0700675 if (likely(!sum)) {
676 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
677 !skb->csum_complete_sw)
678 netdev_rx_csum_fault(skb->dev);
679 }
Herbert Xu89c22d82015-07-13 20:01:42 +0800680 if (!skb_shared(skb))
681 skb->csum_valid = !sum;
Herbert Xufb286bb2005-11-10 13:01:24 -0800682 return sum;
683}
Herbert Xu759e5d02007-03-25 20:10:56 -0700684EXPORT_SYMBOL(__skb_checksum_complete_head);
685
686__sum16 __skb_checksum_complete(struct sk_buff *skb)
687{
Tom Herbert46fb51e2014-06-14 23:24:03 -0700688 __wsum csum;
689 __sum16 sum;
690
691 csum = skb_checksum(skb, 0, skb->len, 0);
692
693 /* skb->csum holds pseudo checksum */
694 sum = csum_fold(csum_add(skb->csum, csum));
695 if (likely(!sum)) {
696 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
697 !skb->csum_complete_sw)
698 netdev_rx_csum_fault(skb->dev);
699 }
700
Herbert Xu89c22d82015-07-13 20:01:42 +0800701 if (!skb_shared(skb)) {
702 /* Save full packet checksum */
703 skb->csum = csum;
704 skb->ip_summed = CHECKSUM_COMPLETE;
705 skb->csum_complete_sw = 1;
706 skb->csum_valid = !sum;
707 }
Tom Herbert46fb51e2014-06-14 23:24:03 -0700708
709 return sum;
Herbert Xu759e5d02007-03-25 20:10:56 -0700710}
Herbert Xufb286bb2005-11-10 13:01:24 -0800711EXPORT_SYMBOL(__skb_checksum_complete);
712
Linus Torvalds1da177e2005-04-16 15:20:36 -0700713/**
Al Viroe5a4b0b2014-11-24 18:17:55 -0500714 * skb_copy_and_csum_datagram_msg - Copy and checksum skb to user iovec.
Pavel Pisa4dc3b162005-05-01 08:59:25 -0700715 * @skb: skbuff
716 * @hlen: hardware length
Al Viroe5a4b0b2014-11-24 18:17:55 -0500717 * @msg: destination
YOSHIFUJI Hideaki4ec93ed2007-02-09 23:24:36 +0900718 *
Linus Torvalds1da177e2005-04-16 15:20:36 -0700719 * Caller _must_ check that skb will fit to this iovec.
720 *
721 * Returns: 0 - success.
722 * -EINVAL - checksum failure.
Al Viroe5a4b0b2014-11-24 18:17:55 -0500723 * -EFAULT - fault during copy.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700724 */
Al Viroe5a4b0b2014-11-24 18:17:55 -0500725int skb_copy_and_csum_datagram_msg(struct sk_buff *skb,
726 int hlen, struct msghdr *msg)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700727{
Al Virod3bc23e2006-11-14 21:24:49 -0800728 __wsum csum;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700729 int chunk = skb->len - hlen;
730
Herbert Xuef8aef52007-09-06 14:06:35 +0100731 if (!chunk)
732 return 0;
733
Al Viro01e97e62014-12-15 21:39:31 -0500734 if (msg_data_left(msg) < chunk) {
Herbert Xufb286bb2005-11-10 13:01:24 -0800735 if (__skb_checksum_complete(skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736 goto csum_error;
Al Viroe5a4b0b2014-11-24 18:17:55 -0500737 if (skb_copy_datagram_msg(skb, hlen, msg, chunk))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700738 goto fault;
739 } else {
740 csum = csum_partial(skb->data, hlen, skb->csum);
Al Viroe5a4b0b2014-11-24 18:17:55 -0500741 if (skb_copy_and_csum_datagram(skb, hlen, &msg->msg_iter,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742 chunk, &csum))
743 goto fault;
Al Virod3bc23e2006-11-14 21:24:49 -0800744 if (csum_fold(csum))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700745 goto csum_error;
Patrick McHardy84fa7932006-08-29 16:44:56 -0700746 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE))
Herbert Xufb286bb2005-11-10 13:01:24 -0800747 netdev_rx_csum_fault(skb->dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700748 }
749 return 0;
750csum_error:
751 return -EINVAL;
752fault:
753 return -EFAULT;
754}
Al Viroe5a4b0b2014-11-24 18:17:55 -0500755EXPORT_SYMBOL(skb_copy_and_csum_datagram_msg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700756
757/**
758 * datagram_poll - generic datagram poll
Pavel Pisa4dc3b162005-05-01 08:59:25 -0700759 * @file: file struct
760 * @sock: socket
761 * @wait: poll table
Linus Torvalds1da177e2005-04-16 15:20:36 -0700762 *
763 * Datagram poll: Again totally generic. This also handles
764 * sequenced packet sockets providing the socket receive queue
765 * is only ever holding data ready to receive.
766 *
767 * Note: when you _don't_ use this routine for this protocol,
768 * and you use a different write policy from sock_writeable()
769 * then please supply your own write_space callback.
770 */
771unsigned int datagram_poll(struct file *file, struct socket *sock,
772 poll_table *wait)
773{
774 struct sock *sk = sock->sk;
775 unsigned int mask;
776
Eric Dumazetaa395142010-04-20 13:03:51 +0000777 sock_poll_wait(file, sk_sleep(sk), wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700778 mask = 0;
779
780 /* exceptional events? */
781 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
Keller, Jacob E7d4c04f2013-03-28 11:19:25 +0000782 mask |= POLLERR |
Jacob Keller8facd5f2013-04-02 13:55:40 -0700783 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? POLLPRI : 0);
Keller, Jacob E7d4c04f2013-03-28 11:19:25 +0000784
Davide Libenzif348d702006-03-25 03:07:39 -0800785 if (sk->sk_shutdown & RCV_SHUTDOWN)
Eric Dumazetdb409802010-09-06 11:13:50 +0000786 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700787 if (sk->sk_shutdown == SHUTDOWN_MASK)
788 mask |= POLLHUP;
789
790 /* readable? */
Eric Dumazetdb409802010-09-06 11:13:50 +0000791 if (!skb_queue_empty(&sk->sk_receive_queue))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792 mask |= POLLIN | POLLRDNORM;
793
794 /* Connection-based need to check for termination and startup */
795 if (connection_based(sk)) {
796 if (sk->sk_state == TCP_CLOSE)
797 mask |= POLLHUP;
798 /* connection hasn't started yet? */
799 if (sk->sk_state == TCP_SYN_SENT)
800 return mask;
801 }
802
803 /* writable? */
804 if (sock_writeable(sk))
805 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
806 else
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800807 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700808
809 return mask;
810}
Linus Torvalds1da177e2005-04-16 15:20:36 -0700811EXPORT_SYMBOL(datagram_poll);