PageRenderTime 137ms CodeModel.GetById 15ms RepoModel.GetById 0ms app.codeStats 0ms

/net/core/datagram.c

https://gitlab.com/kush/linux
C | 800 lines | 501 code | 99 blank | 200 comment | 111 complexity | fd215115d43b61b62f5730549f2755bf MD5 | raw file
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * SUCS NET3:
  4. *
  5. * Generic datagram handling routines. These are generic for all
  6. * protocols. Possibly a generic IP version on top of these would
  7. * make sense. Not tonight however 8-).
  8. * This is used because UDP, RAW, PACKET, DDP, IPX, AX.25 and
  9. * NetROM layer all have identical poll code and mostly
  10. * identical recvmsg() code. So we share it here. The poll was
  11. * shared before but buried in udp.c so I moved it.
  12. *
  13. * Authors: Alan Cox <alan@lxorguk.ukuu.org.uk>. (datagram_poll() from old
  14. * udp.c code)
  15. *
  16. * Fixes:
  17. * Alan Cox : NULL return from skb_peek_copy()
  18. * understood
  19. * Alan Cox : Rewrote skb_read_datagram to avoid the
  20. * skb_peek_copy stuff.
  21. * Alan Cox : Added support for SOCK_SEQPACKET.
  22. * IPX can no longer use the SO_TYPE hack
  23. * but AX.25 now works right, and SPX is
  24. * feasible.
  25. * Alan Cox : Fixed write poll of non IP protocol
  26. * crash.
  27. * Florian La Roche: Changed for my new skbuff handling.
  28. * Darryl Miles : Fixed non-blocking SOCK_SEQPACKET.
  29. * Linus Torvalds : BSD semantic fixes.
  30. * Alan Cox : Datagram iovec handling
  31. * Darryl Miles : Fixed non-blocking SOCK_STREAM.
  32. * Alan Cox : POSIXisms
  33. * Pete Wyckoff : Unconnected accept() fix.
  34. *
  35. */
  36. #include <linux/module.h>
  37. #include <linux/types.h>
  38. #include <linux/kernel.h>
  39. #include <linux/uaccess.h>
  40. #include <linux/mm.h>
  41. #include <linux/interrupt.h>
  42. #include <linux/errno.h>
  43. #include <linux/sched.h>
  44. #include <linux/inet.h>
  45. #include <linux/netdevice.h>
  46. #include <linux/rtnetlink.h>
  47. #include <linux/poll.h>
  48. #include <linux/highmem.h>
  49. #include <linux/spinlock.h>
  50. #include <linux/slab.h>
  51. #include <linux/pagemap.h>
  52. #include <linux/uio.h>
  53. #include <net/protocol.h>
  54. #include <linux/skbuff.h>
  55. #include <net/checksum.h>
  56. #include <net/sock.h>
  57. #include <net/tcp_states.h>
  58. #include <trace/events/skb.h>
  59. #include <net/busy_poll.h>
  60. #include "datagram.h"
  61. /*
  62. * Is a socket 'connection oriented' ?
  63. */
  64. static inline int connection_based(struct sock *sk)
  65. {
  66. return sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM;
  67. }
  68. static int receiver_wake_function(wait_queue_entry_t *wait, unsigned int mode, int sync,
  69. void *key)
  70. {
  71. /*
  72. * Avoid a wakeup if event not interesting for us
  73. */
  74. if (key && !(key_to_poll(key) & (EPOLLIN | EPOLLERR)))
  75. return 0;
  76. return autoremove_wake_function(wait, mode, sync, key);
  77. }
  78. /*
  79. * Wait for the last received packet to be different from skb
  80. */
  81. int __skb_wait_for_more_packets(struct sock *sk, int *err, long *timeo_p,
  82. const struct sk_buff *skb)
  83. {
  84. int error;
  85. DEFINE_WAIT_FUNC(wait, receiver_wake_function);
  86. prepare_to_wait_exclusive(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
  87. /* Socket errors? */
  88. error = sock_error(sk);
  89. if (error)
  90. goto out_err;
  91. if (sk->sk_receive_queue.prev != skb)
  92. goto out;
  93. /* Socket shut down? */
  94. if (sk->sk_shutdown & RCV_SHUTDOWN)
  95. goto out_noerr;
  96. /* Sequenced packets can come disconnected.
  97. * If so we report the problem
  98. */
  99. error = -ENOTCONN;
  100. if (connection_based(sk) &&
  101. !(sk->sk_state == TCP_ESTABLISHED || sk->sk_state == TCP_LISTEN))
  102. goto out_err;
  103. /* handle signals */
  104. if (signal_pending(current))
  105. goto interrupted;
  106. error = 0;
  107. *timeo_p = schedule_timeout(*timeo_p);
  108. out:
  109. finish_wait(sk_sleep(sk), &wait);
  110. return error;
  111. interrupted:
  112. error = sock_intr_errno(*timeo_p);
  113. out_err:
  114. *err = error;
  115. goto out;
  116. out_noerr:
  117. *err = 0;
  118. error = 1;
  119. goto out;
  120. }
  121. EXPORT_SYMBOL(__skb_wait_for_more_packets);
  122. static struct sk_buff *skb_set_peeked(struct sk_buff *skb)
  123. {
  124. struct sk_buff *nskb;
  125. if (skb->peeked)
  126. return skb;
  127. /* We have to unshare an skb before modifying it. */
  128. if (!skb_shared(skb))
  129. goto done;
  130. nskb = skb_clone(skb, GFP_ATOMIC);
  131. if (!nskb)
  132. return ERR_PTR(-ENOMEM);
  133. skb->prev->next = nskb;
  134. skb->next->prev = nskb;
  135. nskb->prev = skb->prev;
  136. nskb->next = skb->next;
  137. consume_skb(skb);
  138. skb = nskb;
  139. done:
  140. skb->peeked = 1;
  141. return skb;
  142. }
  143. struct sk_buff *__skb_try_recv_from_queue(struct sock *sk,
  144. struct sk_buff_head *queue,
  145. unsigned int flags,
  146. void (*destructor)(struct sock *sk,
  147. struct sk_buff *skb),
  148. int *off, int *err,
  149. struct sk_buff **last)
  150. {
  151. bool peek_at_off = false;
  152. struct sk_buff *skb;
  153. int _off = 0;
  154. if (unlikely(flags & MSG_PEEK && *off >= 0)) {
  155. peek_at_off = true;
  156. _off = *off;
  157. }
  158. *last = queue->prev;
  159. skb_queue_walk(queue, skb) {
  160. if (flags & MSG_PEEK) {
  161. if (peek_at_off && _off >= skb->len &&
  162. (_off || skb->peeked)) {
  163. _off -= skb->len;
  164. continue;
  165. }
  166. if (!skb->len) {
  167. skb = skb_set_peeked(skb);
  168. if (IS_ERR(skb)) {
  169. *err = PTR_ERR(skb);
  170. return NULL;
  171. }
  172. }
  173. refcount_inc(&skb->users);
  174. } else {
  175. __skb_unlink(skb, queue);
  176. if (destructor)
  177. destructor(sk, skb);
  178. }
  179. *off = _off;
  180. return skb;
  181. }
  182. return NULL;
  183. }
  184. /**
  185. * __skb_try_recv_datagram - Receive a datagram skbuff
  186. * @sk: socket
  187. * @flags: MSG\_ flags
  188. * @destructor: invoked under the receive lock on successful dequeue
  189. * @off: an offset in bytes to peek skb from. Returns an offset
  190. * within an skb where data actually starts
  191. * @err: error code returned
  192. * @last: set to last peeked message to inform the wait function
  193. * what to look for when peeking
  194. *
  195. * Get a datagram skbuff, understands the peeking, nonblocking wakeups
  196. * and possible races. This replaces identical code in packet, raw and
  197. * udp, as well as the IPX AX.25 and Appletalk. It also finally fixes
  198. * the long standing peek and read race for datagram sockets. If you
  199. * alter this routine remember it must be re-entrant.
  200. *
  201. * This function will lock the socket if a skb is returned, so
  202. * the caller needs to unlock the socket in that case (usually by
  203. * calling skb_free_datagram). Returns NULL with @err set to
  204. * -EAGAIN if no data was available or to some other value if an
  205. * error was detected.
  206. *
  207. * * It does not lock socket since today. This function is
  208. * * free of race conditions. This measure should/can improve
  209. * * significantly datagram socket latencies at high loads,
  210. * * when data copying to user space takes lots of time.
  211. * * (BTW I've just killed the last cli() in IP/IPv6/core/netlink/packet
  212. * * 8) Great win.)
  213. * * --ANK (980729)
  214. *
  215. * The order of the tests when we find no data waiting are specified
  216. * quite explicitly by POSIX 1003.1g, don't change them without having
  217. * the standard around please.
  218. */
  219. struct sk_buff *__skb_try_recv_datagram(struct sock *sk, unsigned int flags,
  220. void (*destructor)(struct sock *sk,
  221. struct sk_buff *skb),
  222. int *off, int *err,
  223. struct sk_buff **last)
  224. {
  225. struct sk_buff_head *queue = &sk->sk_receive_queue;
  226. struct sk_buff *skb;
  227. unsigned long cpu_flags;
  228. /*
  229. * Caller is allowed not to check sk->sk_err before skb_recv_datagram()
  230. */
  231. int error = sock_error(sk);
  232. if (error)
  233. goto no_packet;
  234. do {
  235. /* Again only user level code calls this function, so nothing
  236. * interrupt level will suddenly eat the receive_queue.
  237. *
  238. * Look at current nfs client by the way...
  239. * However, this function was correct in any case. 8)
  240. */
  241. spin_lock_irqsave(&queue->lock, cpu_flags);
  242. skb = __skb_try_recv_from_queue(sk, queue, flags, destructor,
  243. off, &error, last);
  244. spin_unlock_irqrestore(&queue->lock, cpu_flags);
  245. if (error)
  246. goto no_packet;
  247. if (skb)
  248. return skb;
  249. if (!sk_can_busy_loop(sk))
  250. break;
  251. sk_busy_loop(sk, flags & MSG_DONTWAIT);
  252. } while (sk->sk_receive_queue.prev != *last);
  253. error = -EAGAIN;
  254. no_packet:
  255. *err = error;
  256. return NULL;
  257. }
  258. EXPORT_SYMBOL(__skb_try_recv_datagram);
  259. struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags,
  260. void (*destructor)(struct sock *sk,
  261. struct sk_buff *skb),
  262. int *off, int *err)
  263. {
  264. struct sk_buff *skb, *last;
  265. long timeo;
  266. timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
  267. do {
  268. skb = __skb_try_recv_datagram(sk, flags, destructor, off, err,
  269. &last);
  270. if (skb)
  271. return skb;
  272. if (*err != -EAGAIN)
  273. break;
  274. } while (timeo &&
  275. !__skb_wait_for_more_packets(sk, err, &timeo, last));
  276. return NULL;
  277. }
  278. EXPORT_SYMBOL(__skb_recv_datagram);
  279. struct sk_buff *skb_recv_datagram(struct sock *sk, unsigned int flags,
  280. int noblock, int *err)
  281. {
  282. int off = 0;
  283. return __skb_recv_datagram(sk, flags | (noblock ? MSG_DONTWAIT : 0),
  284. NULL, &off, err);
  285. }
  286. EXPORT_SYMBOL(skb_recv_datagram);
  287. void skb_free_datagram(struct sock *sk, struct sk_buff *skb)
  288. {
  289. consume_skb(skb);
  290. sk_mem_reclaim_partial(sk);
  291. }
  292. EXPORT_SYMBOL(skb_free_datagram);
  293. void __skb_free_datagram_locked(struct sock *sk, struct sk_buff *skb, int len)
  294. {
  295. bool slow;
  296. if (!skb_unref(skb)) {
  297. sk_peek_offset_bwd(sk, len);
  298. return;
  299. }
  300. slow = lock_sock_fast(sk);
  301. sk_peek_offset_bwd(sk, len);
  302. skb_orphan(skb);
  303. sk_mem_reclaim_partial(sk);
  304. unlock_sock_fast(sk, slow);
  305. /* skb is now orphaned, can be freed outside of locked section */
  306. __kfree_skb(skb);
  307. }
  308. EXPORT_SYMBOL(__skb_free_datagram_locked);
  309. int __sk_queue_drop_skb(struct sock *sk, struct sk_buff_head *sk_queue,
  310. struct sk_buff *skb, unsigned int flags,
  311. void (*destructor)(struct sock *sk,
  312. struct sk_buff *skb))
  313. {
  314. int err = 0;
  315. if (flags & MSG_PEEK) {
  316. err = -ENOENT;
  317. spin_lock_bh(&sk_queue->lock);
  318. if (skb->next) {
  319. __skb_unlink(skb, sk_queue);
  320. refcount_dec(&skb->users);
  321. if (destructor)
  322. destructor(sk, skb);
  323. err = 0;
  324. }
  325. spin_unlock_bh(&sk_queue->lock);
  326. }
  327. atomic_inc(&sk->sk_drops);
  328. return err;
  329. }
  330. EXPORT_SYMBOL(__sk_queue_drop_skb);
  331. /**
  332. * skb_kill_datagram - Free a datagram skbuff forcibly
  333. * @sk: socket
  334. * @skb: datagram skbuff
  335. * @flags: MSG\_ flags
  336. *
  337. * This function frees a datagram skbuff that was received by
  338. * skb_recv_datagram. The flags argument must match the one
  339. * used for skb_recv_datagram.
  340. *
  341. * If the MSG_PEEK flag is set, and the packet is still on the
  342. * receive queue of the socket, it will be taken off the queue
  343. * before it is freed.
  344. *
  345. * This function currently only disables BH when acquiring the
  346. * sk_receive_queue lock. Therefore it must not be used in a
  347. * context where that lock is acquired in an IRQ context.
  348. *
  349. * It returns 0 if the packet was removed by us.
  350. */
  351. int skb_kill_datagram(struct sock *sk, struct sk_buff *skb, unsigned int flags)
  352. {
  353. int err = __sk_queue_drop_skb(sk, &sk->sk_receive_queue, skb, flags,
  354. NULL);
  355. kfree_skb(skb);
  356. sk_mem_reclaim_partial(sk);
  357. return err;
  358. }
  359. EXPORT_SYMBOL(skb_kill_datagram);
  360. static int __skb_datagram_iter(const struct sk_buff *skb, int offset,
  361. struct iov_iter *to, int len, bool fault_short,
  362. size_t (*cb)(const void *, size_t, void *,
  363. struct iov_iter *), void *data)
  364. {
  365. int start = skb_headlen(skb);
  366. int i, copy = start - offset, start_off = offset, n;
  367. struct sk_buff *frag_iter;
  368. /* Copy header. */
  369. if (copy > 0) {
  370. if (copy > len)
  371. copy = len;
  372. n = cb(skb->data + offset, copy, data, to);
  373. offset += n;
  374. if (n != copy)
  375. goto short_copy;
  376. if ((len -= copy) == 0)
  377. return 0;
  378. }
  379. /* Copy paged appendix. Hmm... why does this look so complicated? */
  380. for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
  381. int end;
  382. const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
  383. WARN_ON(start > offset + len);
  384. end = start + skb_frag_size(frag);
  385. if ((copy = end - offset) > 0) {
  386. struct page *page = skb_frag_page(frag);
  387. u8 *vaddr = kmap(page);
  388. if (copy > len)
  389. copy = len;
  390. n = cb(vaddr + frag->page_offset +
  391. offset - start, copy, data, to);
  392. kunmap(page);
  393. offset += n;
  394. if (n != copy)
  395. goto short_copy;
  396. if (!(len -= copy))
  397. return 0;
  398. }
  399. start = end;
  400. }
  401. skb_walk_frags(skb, frag_iter) {
  402. int end;
  403. WARN_ON(start > offset + len);
  404. end = start + frag_iter->len;
  405. if ((copy = end - offset) > 0) {
  406. if (copy > len)
  407. copy = len;
  408. if (__skb_datagram_iter(frag_iter, offset - start,
  409. to, copy, fault_short, cb, data))
  410. goto fault;
  411. if ((len -= copy) == 0)
  412. return 0;
  413. offset += copy;
  414. }
  415. start = end;
  416. }
  417. if (!len)
  418. return 0;
  419. /* This is not really a user copy fault, but rather someone
  420. * gave us a bogus length on the skb. We should probably
  421. * print a warning here as it may indicate a kernel bug.
  422. */
  423. fault:
  424. iov_iter_revert(to, offset - start_off);
  425. return -EFAULT;
  426. short_copy:
  427. if (fault_short || iov_iter_count(to))
  428. goto fault;
  429. return 0;
  430. }
  431. /**
  432. * skb_copy_and_hash_datagram_iter - Copy datagram to an iovec iterator
  433. * and update a hash.
  434. * @skb: buffer to copy
  435. * @offset: offset in the buffer to start copying from
  436. * @to: iovec iterator to copy to
  437. * @len: amount of data to copy from buffer to iovec
  438. * @hash: hash request to update
  439. */
  440. int skb_copy_and_hash_datagram_iter(const struct sk_buff *skb, int offset,
  441. struct iov_iter *to, int len,
  442. struct ahash_request *hash)
  443. {
  444. return __skb_datagram_iter(skb, offset, to, len, true,
  445. hash_and_copy_to_iter, hash);
  446. }
  447. EXPORT_SYMBOL(skb_copy_and_hash_datagram_iter);
  448. static size_t simple_copy_to_iter(const void *addr, size_t bytes,
  449. void *data __always_unused, struct iov_iter *i)
  450. {
  451. return copy_to_iter(addr, bytes, i);
  452. }
  453. /**
  454. * skb_copy_datagram_iter - Copy a datagram to an iovec iterator.
  455. * @skb: buffer to copy
  456. * @offset: offset in the buffer to start copying from
  457. * @to: iovec iterator to copy to
  458. * @len: amount of data to copy from buffer to iovec
  459. */
  460. int skb_copy_datagram_iter(const struct sk_buff *skb, int offset,
  461. struct iov_iter *to, int len)
  462. {
  463. trace_skb_copy_datagram_iovec(skb, len);
  464. return __skb_datagram_iter(skb, offset, to, len, false,
  465. simple_copy_to_iter, NULL);
  466. }
  467. EXPORT_SYMBOL(skb_copy_datagram_iter);
  468. /**
  469. * skb_copy_datagram_from_iter - Copy a datagram from an iov_iter.
  470. * @skb: buffer to copy
  471. * @offset: offset in the buffer to start copying to
  472. * @from: the copy source
  473. * @len: amount of data to copy to buffer from iovec
  474. *
  475. * Returns 0 or -EFAULT.
  476. */
  477. int skb_copy_datagram_from_iter(struct sk_buff *skb, int offset,
  478. struct iov_iter *from,
  479. int len)
  480. {
  481. int start = skb_headlen(skb);
  482. int i, copy = start - offset;
  483. struct sk_buff *frag_iter;
  484. /* Copy header. */
  485. if (copy > 0) {
  486. if (copy > len)
  487. copy = len;
  488. if (copy_from_iter(skb->data + offset, copy, from) != copy)
  489. goto fault;
  490. if ((len -= copy) == 0)
  491. return 0;
  492. offset += copy;
  493. }
  494. /* Copy paged appendix. Hmm... why does this look so complicated? */
  495. for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
  496. int end;
  497. const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
  498. WARN_ON(start > offset + len);
  499. end = start + skb_frag_size(frag);
  500. if ((copy = end - offset) > 0) {
  501. size_t copied;
  502. if (copy > len)
  503. copy = len;
  504. copied = copy_page_from_iter(skb_frag_page(frag),
  505. frag->page_offset + offset - start,
  506. copy, from);
  507. if (copied != copy)
  508. goto fault;
  509. if (!(len -= copy))
  510. return 0;
  511. offset += copy;
  512. }
  513. start = end;
  514. }
  515. skb_walk_frags(skb, frag_iter) {
  516. int end;
  517. WARN_ON(start > offset + len);
  518. end = start + frag_iter->len;
  519. if ((copy = end - offset) > 0) {
  520. if (copy > len)
  521. copy = len;
  522. if (skb_copy_datagram_from_iter(frag_iter,
  523. offset - start,
  524. from, copy))
  525. goto fault;
  526. if ((len -= copy) == 0)
  527. return 0;
  528. offset += copy;
  529. }
  530. start = end;
  531. }
  532. if (!len)
  533. return 0;
  534. fault:
  535. return -EFAULT;
  536. }
  537. EXPORT_SYMBOL(skb_copy_datagram_from_iter);
  538. int __zerocopy_sg_from_iter(struct sock *sk, struct sk_buff *skb,
  539. struct iov_iter *from, size_t length)
  540. {
  541. int frag = skb_shinfo(skb)->nr_frags;
  542. while (length && iov_iter_count(from)) {
  543. struct page *pages[MAX_SKB_FRAGS];
  544. size_t start;
  545. ssize_t copied;
  546. unsigned long truesize;
  547. int n = 0;
  548. if (frag == MAX_SKB_FRAGS)
  549. return -EMSGSIZE;
  550. copied = iov_iter_get_pages(from, pages, length,
  551. MAX_SKB_FRAGS - frag, &start);
  552. if (copied < 0)
  553. return -EFAULT;
  554. iov_iter_advance(from, copied);
  555. length -= copied;
  556. truesize = PAGE_ALIGN(copied + start);
  557. skb->data_len += copied;
  558. skb->len += copied;
  559. skb->truesize += truesize;
  560. if (sk && sk->sk_type == SOCK_STREAM) {
  561. sk->sk_wmem_queued += truesize;
  562. sk_mem_charge(sk, truesize);
  563. } else {
  564. refcount_add(truesize, &skb->sk->sk_wmem_alloc);
  565. }
  566. while (copied) {
  567. int size = min_t(int, copied, PAGE_SIZE - start);
  568. skb_fill_page_desc(skb, frag++, pages[n], start, size);
  569. start = 0;
  570. copied -= size;
  571. n++;
  572. }
  573. }
  574. return 0;
  575. }
  576. EXPORT_SYMBOL(__zerocopy_sg_from_iter);
  577. /**
  578. * zerocopy_sg_from_iter - Build a zerocopy datagram from an iov_iter
  579. * @skb: buffer to copy
  580. * @from: the source to copy from
  581. *
  582. * The function will first copy up to headlen, and then pin the userspace
  583. * pages and build frags through them.
  584. *
  585. * Returns 0, -EFAULT or -EMSGSIZE.
  586. */
  587. int zerocopy_sg_from_iter(struct sk_buff *skb, struct iov_iter *from)
  588. {
  589. int copy = min_t(int, skb_headlen(skb), iov_iter_count(from));
  590. /* copy up to skb headlen */
  591. if (skb_copy_datagram_from_iter(skb, 0, from, copy))
  592. return -EFAULT;
  593. return __zerocopy_sg_from_iter(NULL, skb, from, ~0U);
  594. }
  595. EXPORT_SYMBOL(zerocopy_sg_from_iter);
  596. /**
  597. * skb_copy_and_csum_datagram_iter - Copy datagram to an iovec iterator
  598. * and update a checksum.
  599. * @skb: buffer to copy
  600. * @offset: offset in the buffer to start copying from
  601. * @to: iovec iterator to copy to
  602. * @len: amount of data to copy from buffer to iovec
  603. * @csump: checksum pointer
  604. */
  605. static int skb_copy_and_csum_datagram(const struct sk_buff *skb, int offset,
  606. struct iov_iter *to, int len,
  607. __wsum *csump)
  608. {
  609. return __skb_datagram_iter(skb, offset, to, len, true,
  610. csum_and_copy_to_iter, csump);
  611. }
  612. /**
  613. * skb_copy_and_csum_datagram_msg - Copy and checksum skb to user iovec.
  614. * @skb: skbuff
  615. * @hlen: hardware length
  616. * @msg: destination
  617. *
  618. * Caller _must_ check that skb will fit to this iovec.
  619. *
  620. * Returns: 0 - success.
  621. * -EINVAL - checksum failure.
  622. * -EFAULT - fault during copy.
  623. */
  624. int skb_copy_and_csum_datagram_msg(struct sk_buff *skb,
  625. int hlen, struct msghdr *msg)
  626. {
  627. __wsum csum;
  628. int chunk = skb->len - hlen;
  629. if (!chunk)
  630. return 0;
  631. if (msg_data_left(msg) < chunk) {
  632. if (__skb_checksum_complete(skb))
  633. return -EINVAL;
  634. if (skb_copy_datagram_msg(skb, hlen, msg, chunk))
  635. goto fault;
  636. } else {
  637. csum = csum_partial(skb->data, hlen, skb->csum);
  638. if (skb_copy_and_csum_datagram(skb, hlen, &msg->msg_iter,
  639. chunk, &csum))
  640. goto fault;
  641. if (csum_fold(csum)) {
  642. iov_iter_revert(&msg->msg_iter, chunk);
  643. return -EINVAL;
  644. }
  645. if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
  646. !skb->csum_complete_sw)
  647. netdev_rx_csum_fault(NULL, skb);
  648. }
  649. return 0;
  650. fault:
  651. return -EFAULT;
  652. }
  653. EXPORT_SYMBOL(skb_copy_and_csum_datagram_msg);
  654. /**
  655. * datagram_poll - generic datagram poll
  656. * @file: file struct
  657. * @sock: socket
  658. * @wait: poll table
  659. *
  660. * Datagram poll: Again totally generic. This also handles
  661. * sequenced packet sockets providing the socket receive queue
  662. * is only ever holding data ready to receive.
  663. *
  664. * Note: when you *don't* use this routine for this protocol,
  665. * and you use a different write policy from sock_writeable()
  666. * then please supply your own write_space callback.
  667. */
  668. __poll_t datagram_poll(struct file *file, struct socket *sock,
  669. poll_table *wait)
  670. {
  671. struct sock *sk = sock->sk;
  672. __poll_t mask;
  673. sock_poll_wait(file, sock, wait);
  674. mask = 0;
  675. /* exceptional events? */
  676. if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
  677. mask |= EPOLLERR |
  678. (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? EPOLLPRI : 0);
  679. if (sk->sk_shutdown & RCV_SHUTDOWN)
  680. mask |= EPOLLRDHUP | EPOLLIN | EPOLLRDNORM;
  681. if (sk->sk_shutdown == SHUTDOWN_MASK)
  682. mask |= EPOLLHUP;
  683. /* readable? */
  684. if (!skb_queue_empty(&sk->sk_receive_queue))
  685. mask |= EPOLLIN | EPOLLRDNORM;
  686. /* Connection-based need to check for termination and startup */
  687. if (connection_based(sk)) {
  688. if (sk->sk_state == TCP_CLOSE)
  689. mask |= EPOLLHUP;
  690. /* connection hasn't started yet? */
  691. if (sk->sk_state == TCP_SYN_SENT)
  692. return mask;
  693. }
  694. /* writable? */
  695. if (sock_writeable(sk))
  696. mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
  697. else
  698. sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
  699. return mask;
  700. }
  701. EXPORT_SYMBOL(datagram_poll);