PageRenderTime 34ms CodeModel.GetById 19ms RepoModel.GetById 1ms app.codeStats 0ms

/net/core/datagram.c

https://gitlab.com/deepcypher/linux
C | 835 lines | 527 code | 103 blank | 205 comment | 119 complexity | 523cd0c1d48f67ce3785f9bf5659c38a MD5 | raw file
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * SUCS NET3:
  4. *
  5. * Generic datagram handling routines. These are generic for all
  6. * protocols. Possibly a generic IP version on top of these would
  7. * make sense. Not tonight however 8-).
  8. * This is used because UDP, RAW, PACKET, DDP, IPX, AX.25 and
  9. * NetROM layer all have identical poll code and mostly
  10. * identical recvmsg() code. So we share it here. The poll was
  11. * shared before but buried in udp.c so I moved it.
  12. *
  13. * Authors: Alan Cox <alan@lxorguk.ukuu.org.uk>. (datagram_poll() from old
  14. * udp.c code)
  15. *
  16. * Fixes:
  17. * Alan Cox : NULL return from skb_peek_copy()
  18. * understood
  19. * Alan Cox : Rewrote skb_read_datagram to avoid the
  20. * skb_peek_copy stuff.
  21. * Alan Cox : Added support for SOCK_SEQPACKET.
  22. * IPX can no longer use the SO_TYPE hack
  23. * but AX.25 now works right, and SPX is
  24. * feasible.
  25. * Alan Cox : Fixed write poll of non IP protocol
  26. * crash.
  27. * Florian La Roche: Changed for my new skbuff handling.
  28. * Darryl Miles : Fixed non-blocking SOCK_SEQPACKET.
  29. * Linus Torvalds : BSD semantic fixes.
  30. * Alan Cox : Datagram iovec handling
  31. * Darryl Miles : Fixed non-blocking SOCK_STREAM.
  32. * Alan Cox : POSIXisms
  33. * Pete Wyckoff : Unconnected accept() fix.
  34. *
  35. */
  36. #include <linux/module.h>
  37. #include <linux/types.h>
  38. #include <linux/kernel.h>
  39. #include <linux/uaccess.h>
  40. #include <linux/mm.h>
  41. #include <linux/interrupt.h>
  42. #include <linux/errno.h>
  43. #include <linux/sched.h>
  44. #include <linux/inet.h>
  45. #include <linux/netdevice.h>
  46. #include <linux/rtnetlink.h>
  47. #include <linux/poll.h>
  48. #include <linux/highmem.h>
  49. #include <linux/spinlock.h>
  50. #include <linux/slab.h>
  51. #include <linux/pagemap.h>
  52. #include <linux/uio.h>
  53. #include <linux/indirect_call_wrapper.h>
  54. #include <net/protocol.h>
  55. #include <linux/skbuff.h>
  56. #include <net/checksum.h>
  57. #include <net/sock.h>
  58. #include <net/tcp_states.h>
  59. #include <trace/events/skb.h>
  60. #include <net/busy_poll.h>
  61. /*
  62. * Is a socket 'connection oriented' ?
  63. */
  64. static inline int connection_based(struct sock *sk)
  65. {
  66. return sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM;
  67. }
  68. static int receiver_wake_function(wait_queue_entry_t *wait, unsigned int mode, int sync,
  69. void *key)
  70. {
  71. /*
  72. * Avoid a wakeup if event not interesting for us
  73. */
  74. if (key && !(key_to_poll(key) & (EPOLLIN | EPOLLERR)))
  75. return 0;
  76. return autoremove_wake_function(wait, mode, sync, key);
  77. }
  78. /*
  79. * Wait for the last received packet to be different from skb
  80. */
  81. int __skb_wait_for_more_packets(struct sock *sk, struct sk_buff_head *queue,
  82. int *err, long *timeo_p,
  83. const struct sk_buff *skb)
  84. {
  85. int error;
  86. DEFINE_WAIT_FUNC(wait, receiver_wake_function);
  87. prepare_to_wait_exclusive(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
  88. /* Socket errors? */
  89. error = sock_error(sk);
  90. if (error)
  91. goto out_err;
  92. if (READ_ONCE(queue->prev) != skb)
  93. goto out;
  94. /* Socket shut down? */
  95. if (sk->sk_shutdown & RCV_SHUTDOWN)
  96. goto out_noerr;
  97. /* Sequenced packets can come disconnected.
  98. * If so we report the problem
  99. */
  100. error = -ENOTCONN;
  101. if (connection_based(sk) &&
  102. !(sk->sk_state == TCP_ESTABLISHED || sk->sk_state == TCP_LISTEN))
  103. goto out_err;
  104. /* handle signals */
  105. if (signal_pending(current))
  106. goto interrupted;
  107. error = 0;
  108. *timeo_p = schedule_timeout(*timeo_p);
  109. out:
  110. finish_wait(sk_sleep(sk), &wait);
  111. return error;
  112. interrupted:
  113. error = sock_intr_errno(*timeo_p);
  114. out_err:
  115. *err = error;
  116. goto out;
  117. out_noerr:
  118. *err = 0;
  119. error = 1;
  120. goto out;
  121. }
  122. EXPORT_SYMBOL(__skb_wait_for_more_packets);
  123. static struct sk_buff *skb_set_peeked(struct sk_buff *skb)
  124. {
  125. struct sk_buff *nskb;
  126. if (skb->peeked)
  127. return skb;
  128. /* We have to unshare an skb before modifying it. */
  129. if (!skb_shared(skb))
  130. goto done;
  131. nskb = skb_clone(skb, GFP_ATOMIC);
  132. if (!nskb)
  133. return ERR_PTR(-ENOMEM);
  134. skb->prev->next = nskb;
  135. skb->next->prev = nskb;
  136. nskb->prev = skb->prev;
  137. nskb->next = skb->next;
  138. consume_skb(skb);
  139. skb = nskb;
  140. done:
  141. skb->peeked = 1;
  142. return skb;
  143. }
  144. struct sk_buff *__skb_try_recv_from_queue(struct sock *sk,
  145. struct sk_buff_head *queue,
  146. unsigned int flags,
  147. int *off, int *err,
  148. struct sk_buff **last)
  149. {
  150. bool peek_at_off = false;
  151. struct sk_buff *skb;
  152. int _off = 0;
  153. if (unlikely(flags & MSG_PEEK && *off >= 0)) {
  154. peek_at_off = true;
  155. _off = *off;
  156. }
  157. *last = queue->prev;
  158. skb_queue_walk(queue, skb) {
  159. if (flags & MSG_PEEK) {
  160. if (peek_at_off && _off >= skb->len &&
  161. (_off || skb->peeked)) {
  162. _off -= skb->len;
  163. continue;
  164. }
  165. if (!skb->len) {
  166. skb = skb_set_peeked(skb);
  167. if (IS_ERR(skb)) {
  168. *err = PTR_ERR(skb);
  169. return NULL;
  170. }
  171. }
  172. refcount_inc(&skb->users);
  173. } else {
  174. __skb_unlink(skb, queue);
  175. }
  176. *off = _off;
  177. return skb;
  178. }
  179. return NULL;
  180. }
  181. /**
  182. * __skb_try_recv_datagram - Receive a datagram skbuff
  183. * @sk: socket
  184. * @queue: socket queue from which to receive
  185. * @flags: MSG\_ flags
  186. * @off: an offset in bytes to peek skb from. Returns an offset
  187. * within an skb where data actually starts
  188. * @err: error code returned
  189. * @last: set to last peeked message to inform the wait function
  190. * what to look for when peeking
  191. *
  192. * Get a datagram skbuff, understands the peeking, nonblocking wakeups
  193. * and possible races. This replaces identical code in packet, raw and
  194. * udp, as well as the IPX AX.25 and Appletalk. It also finally fixes
  195. * the long standing peek and read race for datagram sockets. If you
  196. * alter this routine remember it must be re-entrant.
  197. *
  198. * This function will lock the socket if a skb is returned, so
  199. * the caller needs to unlock the socket in that case (usually by
  200. * calling skb_free_datagram). Returns NULL with @err set to
  201. * -EAGAIN if no data was available or to some other value if an
  202. * error was detected.
  203. *
  204. * * It does not lock socket since today. This function is
  205. * * free of race conditions. This measure should/can improve
  206. * * significantly datagram socket latencies at high loads,
  207. * * when data copying to user space takes lots of time.
  208. * * (BTW I've just killed the last cli() in IP/IPv6/core/netlink/packet
  209. * * 8) Great win.)
  210. * * --ANK (980729)
  211. *
  212. * The order of the tests when we find no data waiting are specified
  213. * quite explicitly by POSIX 1003.1g, don't change them without having
  214. * the standard around please.
  215. */
  216. struct sk_buff *__skb_try_recv_datagram(struct sock *sk,
  217. struct sk_buff_head *queue,
  218. unsigned int flags, int *off, int *err,
  219. struct sk_buff **last)
  220. {
  221. struct sk_buff *skb;
  222. unsigned long cpu_flags;
  223. /*
  224. * Caller is allowed not to check sk->sk_err before skb_recv_datagram()
  225. */
  226. int error = sock_error(sk);
  227. if (error)
  228. goto no_packet;
  229. do {
  230. /* Again only user level code calls this function, so nothing
  231. * interrupt level will suddenly eat the receive_queue.
  232. *
  233. * Look at current nfs client by the way...
  234. * However, this function was correct in any case. 8)
  235. */
  236. spin_lock_irqsave(&queue->lock, cpu_flags);
  237. skb = __skb_try_recv_from_queue(sk, queue, flags, off, &error,
  238. last);
  239. spin_unlock_irqrestore(&queue->lock, cpu_flags);
  240. if (error)
  241. goto no_packet;
  242. if (skb)
  243. return skb;
  244. if (!sk_can_busy_loop(sk))
  245. break;
  246. sk_busy_loop(sk, flags & MSG_DONTWAIT);
  247. } while (READ_ONCE(queue->prev) != *last);
  248. error = -EAGAIN;
  249. no_packet:
  250. *err = error;
  251. return NULL;
  252. }
  253. EXPORT_SYMBOL(__skb_try_recv_datagram);
  254. struct sk_buff *__skb_recv_datagram(struct sock *sk,
  255. struct sk_buff_head *sk_queue,
  256. unsigned int flags, int *off, int *err)
  257. {
  258. struct sk_buff *skb, *last;
  259. long timeo;
  260. timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
  261. do {
  262. skb = __skb_try_recv_datagram(sk, sk_queue, flags, off, err,
  263. &last);
  264. if (skb)
  265. return skb;
  266. if (*err != -EAGAIN)
  267. break;
  268. } while (timeo &&
  269. !__skb_wait_for_more_packets(sk, sk_queue, err,
  270. &timeo, last));
  271. return NULL;
  272. }
  273. EXPORT_SYMBOL(__skb_recv_datagram);
  274. struct sk_buff *skb_recv_datagram(struct sock *sk, unsigned int flags,
  275. int *err)
  276. {
  277. int off = 0;
  278. return __skb_recv_datagram(sk, &sk->sk_receive_queue, flags,
  279. &off, err);
  280. }
  281. EXPORT_SYMBOL(skb_recv_datagram);
  282. void skb_free_datagram(struct sock *sk, struct sk_buff *skb)
  283. {
  284. consume_skb(skb);
  285. sk_mem_reclaim_partial(sk);
  286. }
  287. EXPORT_SYMBOL(skb_free_datagram);
  288. void __skb_free_datagram_locked(struct sock *sk, struct sk_buff *skb, int len)
  289. {
  290. bool slow;
  291. if (!skb_unref(skb)) {
  292. sk_peek_offset_bwd(sk, len);
  293. return;
  294. }
  295. slow = lock_sock_fast(sk);
  296. sk_peek_offset_bwd(sk, len);
  297. skb_orphan(skb);
  298. sk_mem_reclaim_partial(sk);
  299. unlock_sock_fast(sk, slow);
  300. /* skb is now orphaned, can be freed outside of locked section */
  301. __kfree_skb(skb);
  302. }
  303. EXPORT_SYMBOL(__skb_free_datagram_locked);
  304. int __sk_queue_drop_skb(struct sock *sk, struct sk_buff_head *sk_queue,
  305. struct sk_buff *skb, unsigned int flags,
  306. void (*destructor)(struct sock *sk,
  307. struct sk_buff *skb))
  308. {
  309. int err = 0;
  310. if (flags & MSG_PEEK) {
  311. err = -ENOENT;
  312. spin_lock_bh(&sk_queue->lock);
  313. if (skb->next) {
  314. __skb_unlink(skb, sk_queue);
  315. refcount_dec(&skb->users);
  316. if (destructor)
  317. destructor(sk, skb);
  318. err = 0;
  319. }
  320. spin_unlock_bh(&sk_queue->lock);
  321. }
  322. atomic_inc(&sk->sk_drops);
  323. return err;
  324. }
  325. EXPORT_SYMBOL(__sk_queue_drop_skb);
  326. /**
  327. * skb_kill_datagram - Free a datagram skbuff forcibly
  328. * @sk: socket
  329. * @skb: datagram skbuff
  330. * @flags: MSG\_ flags
  331. *
  332. * This function frees a datagram skbuff that was received by
  333. * skb_recv_datagram. The flags argument must match the one
  334. * used for skb_recv_datagram.
  335. *
  336. * If the MSG_PEEK flag is set, and the packet is still on the
  337. * receive queue of the socket, it will be taken off the queue
  338. * before it is freed.
  339. *
  340. * This function currently only disables BH when acquiring the
  341. * sk_receive_queue lock. Therefore it must not be used in a
  342. * context where that lock is acquired in an IRQ context.
  343. *
  344. * It returns 0 if the packet was removed by us.
  345. */
  346. int skb_kill_datagram(struct sock *sk, struct sk_buff *skb, unsigned int flags)
  347. {
  348. int err = __sk_queue_drop_skb(sk, &sk->sk_receive_queue, skb, flags,
  349. NULL);
  350. kfree_skb(skb);
  351. sk_mem_reclaim_partial(sk);
  352. return err;
  353. }
  354. EXPORT_SYMBOL(skb_kill_datagram);
  355. INDIRECT_CALLABLE_DECLARE(static size_t simple_copy_to_iter(const void *addr,
  356. size_t bytes,
  357. void *data __always_unused,
  358. struct iov_iter *i));
  359. static int __skb_datagram_iter(const struct sk_buff *skb, int offset,
  360. struct iov_iter *to, int len, bool fault_short,
  361. size_t (*cb)(const void *, size_t, void *,
  362. struct iov_iter *), void *data)
  363. {
  364. int start = skb_headlen(skb);
  365. int i, copy = start - offset, start_off = offset, n;
  366. struct sk_buff *frag_iter;
  367. /* Copy header. */
  368. if (copy > 0) {
  369. if (copy > len)
  370. copy = len;
  371. n = INDIRECT_CALL_1(cb, simple_copy_to_iter,
  372. skb->data + offset, copy, data, to);
  373. offset += n;
  374. if (n != copy)
  375. goto short_copy;
  376. if ((len -= copy) == 0)
  377. return 0;
  378. }
  379. /* Copy paged appendix. Hmm... why does this look so complicated? */
  380. for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
  381. int end;
  382. const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
  383. WARN_ON(start > offset + len);
  384. end = start + skb_frag_size(frag);
  385. if ((copy = end - offset) > 0) {
  386. struct page *page = skb_frag_page(frag);
  387. u8 *vaddr = kmap(page);
  388. if (copy > len)
  389. copy = len;
  390. n = INDIRECT_CALL_1(cb, simple_copy_to_iter,
  391. vaddr + skb_frag_off(frag) + offset - start,
  392. copy, data, to);
  393. kunmap(page);
  394. offset += n;
  395. if (n != copy)
  396. goto short_copy;
  397. if (!(len -= copy))
  398. return 0;
  399. }
  400. start = end;
  401. }
  402. skb_walk_frags(skb, frag_iter) {
  403. int end;
  404. WARN_ON(start > offset + len);
  405. end = start + frag_iter->len;
  406. if ((copy = end - offset) > 0) {
  407. if (copy > len)
  408. copy = len;
  409. if (__skb_datagram_iter(frag_iter, offset - start,
  410. to, copy, fault_short, cb, data))
  411. goto fault;
  412. if ((len -= copy) == 0)
  413. return 0;
  414. offset += copy;
  415. }
  416. start = end;
  417. }
  418. if (!len)
  419. return 0;
  420. /* This is not really a user copy fault, but rather someone
  421. * gave us a bogus length on the skb. We should probably
  422. * print a warning here as it may indicate a kernel bug.
  423. */
  424. fault:
  425. iov_iter_revert(to, offset - start_off);
  426. return -EFAULT;
  427. short_copy:
  428. if (fault_short || iov_iter_count(to))
  429. goto fault;
  430. return 0;
  431. }
  432. /**
  433. * skb_copy_and_hash_datagram_iter - Copy datagram to an iovec iterator
  434. * and update a hash.
  435. * @skb: buffer to copy
  436. * @offset: offset in the buffer to start copying from
  437. * @to: iovec iterator to copy to
  438. * @len: amount of data to copy from buffer to iovec
  439. * @hash: hash request to update
  440. */
  441. int skb_copy_and_hash_datagram_iter(const struct sk_buff *skb, int offset,
  442. struct iov_iter *to, int len,
  443. struct ahash_request *hash)
  444. {
  445. return __skb_datagram_iter(skb, offset, to, len, true,
  446. hash_and_copy_to_iter, hash);
  447. }
  448. EXPORT_SYMBOL(skb_copy_and_hash_datagram_iter);
  449. static size_t simple_copy_to_iter(const void *addr, size_t bytes,
  450. void *data __always_unused, struct iov_iter *i)
  451. {
  452. return copy_to_iter(addr, bytes, i);
  453. }
  454. /**
  455. * skb_copy_datagram_iter - Copy a datagram to an iovec iterator.
  456. * @skb: buffer to copy
  457. * @offset: offset in the buffer to start copying from
  458. * @to: iovec iterator to copy to
  459. * @len: amount of data to copy from buffer to iovec
  460. */
  461. int skb_copy_datagram_iter(const struct sk_buff *skb, int offset,
  462. struct iov_iter *to, int len)
  463. {
  464. trace_skb_copy_datagram_iovec(skb, len);
  465. return __skb_datagram_iter(skb, offset, to, len, false,
  466. simple_copy_to_iter, NULL);
  467. }
  468. EXPORT_SYMBOL(skb_copy_datagram_iter);
  469. /**
  470. * skb_copy_datagram_from_iter - Copy a datagram from an iov_iter.
  471. * @skb: buffer to copy
  472. * @offset: offset in the buffer to start copying to
  473. * @from: the copy source
  474. * @len: amount of data to copy to buffer from iovec
  475. *
  476. * Returns 0 or -EFAULT.
  477. */
  478. int skb_copy_datagram_from_iter(struct sk_buff *skb, int offset,
  479. struct iov_iter *from,
  480. int len)
  481. {
  482. int start = skb_headlen(skb);
  483. int i, copy = start - offset;
  484. struct sk_buff *frag_iter;
  485. /* Copy header. */
  486. if (copy > 0) {
  487. if (copy > len)
  488. copy = len;
  489. if (copy_from_iter(skb->data + offset, copy, from) != copy)
  490. goto fault;
  491. if ((len -= copy) == 0)
  492. return 0;
  493. offset += copy;
  494. }
  495. /* Copy paged appendix. Hmm... why does this look so complicated? */
  496. for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
  497. int end;
  498. const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
  499. WARN_ON(start > offset + len);
  500. end = start + skb_frag_size(frag);
  501. if ((copy = end - offset) > 0) {
  502. size_t copied;
  503. if (copy > len)
  504. copy = len;
  505. copied = copy_page_from_iter(skb_frag_page(frag),
  506. skb_frag_off(frag) + offset - start,
  507. copy, from);
  508. if (copied != copy)
  509. goto fault;
  510. if (!(len -= copy))
  511. return 0;
  512. offset += copy;
  513. }
  514. start = end;
  515. }
  516. skb_walk_frags(skb, frag_iter) {
  517. int end;
  518. WARN_ON(start > offset + len);
  519. end = start + frag_iter->len;
  520. if ((copy = end - offset) > 0) {
  521. if (copy > len)
  522. copy = len;
  523. if (skb_copy_datagram_from_iter(frag_iter,
  524. offset - start,
  525. from, copy))
  526. goto fault;
  527. if ((len -= copy) == 0)
  528. return 0;
  529. offset += copy;
  530. }
  531. start = end;
  532. }
  533. if (!len)
  534. return 0;
  535. fault:
  536. return -EFAULT;
  537. }
  538. EXPORT_SYMBOL(skb_copy_datagram_from_iter);
  539. int __zerocopy_sg_from_iter(struct sock *sk, struct sk_buff *skb,
  540. struct iov_iter *from, size_t length)
  541. {
  542. int frag = skb_shinfo(skb)->nr_frags;
  543. while (length && iov_iter_count(from)) {
  544. struct page *pages[MAX_SKB_FRAGS];
  545. struct page *last_head = NULL;
  546. size_t start;
  547. ssize_t copied;
  548. unsigned long truesize;
  549. int refs, n = 0;
  550. if (frag == MAX_SKB_FRAGS)
  551. return -EMSGSIZE;
  552. copied = iov_iter_get_pages(from, pages, length,
  553. MAX_SKB_FRAGS - frag, &start);
  554. if (copied < 0)
  555. return -EFAULT;
  556. iov_iter_advance(from, copied);
  557. length -= copied;
  558. truesize = PAGE_ALIGN(copied + start);
  559. skb->data_len += copied;
  560. skb->len += copied;
  561. skb->truesize += truesize;
  562. if (sk && sk->sk_type == SOCK_STREAM) {
  563. sk_wmem_queued_add(sk, truesize);
  564. if (!skb_zcopy_pure(skb))
  565. sk_mem_charge(sk, truesize);
  566. } else {
  567. refcount_add(truesize, &skb->sk->sk_wmem_alloc);
  568. }
  569. for (refs = 0; copied != 0; start = 0) {
  570. int size = min_t(int, copied, PAGE_SIZE - start);
  571. struct page *head = compound_head(pages[n]);
  572. start += (pages[n] - head) << PAGE_SHIFT;
  573. copied -= size;
  574. n++;
  575. if (frag) {
  576. skb_frag_t *last = &skb_shinfo(skb)->frags[frag - 1];
  577. if (head == skb_frag_page(last) &&
  578. start == skb_frag_off(last) + skb_frag_size(last)) {
  579. skb_frag_size_add(last, size);
  580. /* We combined this page, we need to release
  581. * a reference. Since compound pages refcount
  582. * is shared among many pages, batch the refcount
  583. * adjustments to limit false sharing.
  584. */
  585. last_head = head;
  586. refs++;
  587. continue;
  588. }
  589. }
  590. if (refs) {
  591. page_ref_sub(last_head, refs);
  592. refs = 0;
  593. }
  594. skb_fill_page_desc(skb, frag++, head, start, size);
  595. }
  596. if (refs)
  597. page_ref_sub(last_head, refs);
  598. }
  599. return 0;
  600. }
  601. EXPORT_SYMBOL(__zerocopy_sg_from_iter);
  602. /**
  603. * zerocopy_sg_from_iter - Build a zerocopy datagram from an iov_iter
  604. * @skb: buffer to copy
  605. * @from: the source to copy from
  606. *
  607. * The function will first copy up to headlen, and then pin the userspace
  608. * pages and build frags through them.
  609. *
  610. * Returns 0, -EFAULT or -EMSGSIZE.
  611. */
  612. int zerocopy_sg_from_iter(struct sk_buff *skb, struct iov_iter *from)
  613. {
  614. int copy = min_t(int, skb_headlen(skb), iov_iter_count(from));
  615. /* copy up to skb headlen */
  616. if (skb_copy_datagram_from_iter(skb, 0, from, copy))
  617. return -EFAULT;
  618. return __zerocopy_sg_from_iter(NULL, skb, from, ~0U);
  619. }
  620. EXPORT_SYMBOL(zerocopy_sg_from_iter);
  621. /**
  622. * skb_copy_and_csum_datagram - Copy datagram to an iovec iterator
  623. * and update a checksum.
  624. * @skb: buffer to copy
  625. * @offset: offset in the buffer to start copying from
  626. * @to: iovec iterator to copy to
  627. * @len: amount of data to copy from buffer to iovec
  628. * @csump: checksum pointer
  629. */
  630. static int skb_copy_and_csum_datagram(const struct sk_buff *skb, int offset,
  631. struct iov_iter *to, int len,
  632. __wsum *csump)
  633. {
  634. struct csum_state csdata = { .csum = *csump };
  635. int ret;
  636. ret = __skb_datagram_iter(skb, offset, to, len, true,
  637. csum_and_copy_to_iter, &csdata);
  638. if (ret)
  639. return ret;
  640. *csump = csdata.csum;
  641. return 0;
  642. }
  643. /**
  644. * skb_copy_and_csum_datagram_msg - Copy and checksum skb to user iovec.
  645. * @skb: skbuff
  646. * @hlen: hardware length
  647. * @msg: destination
  648. *
  649. * Caller _must_ check that skb will fit to this iovec.
  650. *
  651. * Returns: 0 - success.
  652. * -EINVAL - checksum failure.
  653. * -EFAULT - fault during copy.
  654. */
  655. int skb_copy_and_csum_datagram_msg(struct sk_buff *skb,
  656. int hlen, struct msghdr *msg)
  657. {
  658. __wsum csum;
  659. int chunk = skb->len - hlen;
  660. if (!chunk)
  661. return 0;
  662. if (msg_data_left(msg) < chunk) {
  663. if (__skb_checksum_complete(skb))
  664. return -EINVAL;
  665. if (skb_copy_datagram_msg(skb, hlen, msg, chunk))
  666. goto fault;
  667. } else {
  668. csum = csum_partial(skb->data, hlen, skb->csum);
  669. if (skb_copy_and_csum_datagram(skb, hlen, &msg->msg_iter,
  670. chunk, &csum))
  671. goto fault;
  672. if (csum_fold(csum)) {
  673. iov_iter_revert(&msg->msg_iter, chunk);
  674. return -EINVAL;
  675. }
  676. if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
  677. !skb->csum_complete_sw)
  678. netdev_rx_csum_fault(NULL, skb);
  679. }
  680. return 0;
  681. fault:
  682. return -EFAULT;
  683. }
  684. EXPORT_SYMBOL(skb_copy_and_csum_datagram_msg);
  685. /**
  686. * datagram_poll - generic datagram poll
  687. * @file: file struct
  688. * @sock: socket
  689. * @wait: poll table
  690. *
  691. * Datagram poll: Again totally generic. This also handles
  692. * sequenced packet sockets providing the socket receive queue
  693. * is only ever holding data ready to receive.
  694. *
  695. * Note: when you *don't* use this routine for this protocol,
  696. * and you use a different write policy from sock_writeable()
  697. * then please supply your own write_space callback.
  698. */
  699. __poll_t datagram_poll(struct file *file, struct socket *sock,
  700. poll_table *wait)
  701. {
  702. struct sock *sk = sock->sk;
  703. __poll_t mask;
  704. sock_poll_wait(file, sock, wait);
  705. mask = 0;
  706. /* exceptional events? */
  707. if (sk->sk_err || !skb_queue_empty_lockless(&sk->sk_error_queue))
  708. mask |= EPOLLERR |
  709. (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? EPOLLPRI : 0);
  710. if (sk->sk_shutdown & RCV_SHUTDOWN)
  711. mask |= EPOLLRDHUP | EPOLLIN | EPOLLRDNORM;
  712. if (sk->sk_shutdown == SHUTDOWN_MASK)
  713. mask |= EPOLLHUP;
  714. /* readable? */
  715. if (!skb_queue_empty_lockless(&sk->sk_receive_queue))
  716. mask |= EPOLLIN | EPOLLRDNORM;
  717. /* Connection-based need to check for termination and startup */
  718. if (connection_based(sk)) {
  719. if (sk->sk_state == TCP_CLOSE)
  720. mask |= EPOLLHUP;
  721. /* connection hasn't started yet? */
  722. if (sk->sk_state == TCP_SYN_SENT)
  723. return mask;
  724. }
  725. /* writable? */
  726. if (sock_writeable(sk))
  727. mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
  728. else
  729. sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
  730. return mask;
  731. }
  732. EXPORT_SYMBOL(datagram_poll);