]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/blame - net/core/datagram.c
net: fec: fix initial runtime PM refcount
[mirror_ubuntu-eoan-kernel.git] / net / core / datagram.c
CommitLineData
1da177e4
LT
1/*
2 * SUCS NET3:
3 *
4 * Generic datagram handling routines. These are generic for all
5 * protocols. Possibly a generic IP version on top of these would
6 * make sense. Not tonight however 8-).
7 * This is used because UDP, RAW, PACKET, DDP, IPX, AX.25 and
8 * NetROM layer all have identical poll code and mostly
9 * identical recvmsg() code. So we share it here. The poll was
10 * shared before but buried in udp.c so I moved it.
11 *
113aa838 12 * Authors: Alan Cox <alan@lxorguk.ukuu.org.uk>. (datagram_poll() from old
1da177e4
LT
13 * udp.c code)
14 *
15 * Fixes:
16 * Alan Cox : NULL return from skb_peek_copy()
17 * understood
18 * Alan Cox : Rewrote skb_read_datagram to avoid the
19 * skb_peek_copy stuff.
20 * Alan Cox : Added support for SOCK_SEQPACKET.
21 * IPX can no longer use the SO_TYPE hack
22 * but AX.25 now works right, and SPX is
23 * feasible.
24 * Alan Cox : Fixed write poll of non IP protocol
25 * crash.
26 * Florian La Roche: Changed for my new skbuff handling.
27 * Darryl Miles : Fixed non-blocking SOCK_SEQPACKET.
28 * Linus Torvalds : BSD semantic fixes.
29 * Alan Cox : Datagram iovec handling
30 * Darryl Miles : Fixed non-blocking SOCK_STREAM.
31 * Alan Cox : POSIXisms
32 * Pete Wyckoff : Unconnected accept() fix.
33 *
34 */
35
36#include <linux/module.h>
37#include <linux/types.h>
38#include <linux/kernel.h>
39#include <asm/uaccess.h>
1da177e4
LT
40#include <linux/mm.h>
41#include <linux/interrupt.h>
42#include <linux/errno.h>
43#include <linux/sched.h>
44#include <linux/inet.h>
1da177e4
LT
45#include <linux/netdevice.h>
46#include <linux/rtnetlink.h>
47#include <linux/poll.h>
48#include <linux/highmem.h>
3305b80c 49#include <linux/spinlock.h>
5a0e3ad6 50#include <linux/slab.h>
0433547a 51#include <linux/pagemap.h>
a8f820aa 52#include <linux/uio.h>
1da177e4
LT
53
54#include <net/protocol.h>
55#include <linux/skbuff.h>
1da177e4 56
c752f073
ACM
57#include <net/checksum.h>
58#include <net/sock.h>
59#include <net/tcp_states.h>
e9b3cc1b 60#include <trace/events/skb.h>
076bb0c8 61#include <net/busy_poll.h>
1da177e4
LT
62
63/*
64 * Is a socket 'connection oriented' ?
65 */
66static inline int connection_based(struct sock *sk)
67{
68 return sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM;
69}
70
95c96174 71static int receiver_wake_function(wait_queue_t *wait, unsigned int mode, int sync,
bf368e4e
ED
72 void *key)
73{
74 unsigned long bits = (unsigned long)key;
75
76 /*
77 * Avoid a wakeup if event not interesting for us
78 */
79 if (bits && !(bits & (POLLIN | POLLERR)))
80 return 0;
81 return autoremove_wake_function(wait, mode, sync, key);
82}
1da177e4 83/*
39cc8613 84 * Wait for the last received packet to be different from skb
1da177e4 85 */
39cc8613
BP
86static int wait_for_more_packets(struct sock *sk, int *err, long *timeo_p,
87 const struct sk_buff *skb)
1da177e4
LT
88{
89 int error;
bf368e4e 90 DEFINE_WAIT_FUNC(wait, receiver_wake_function);
1da177e4 91
aa395145 92 prepare_to_wait_exclusive(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
1da177e4
LT
93
94 /* Socket errors? */
95 error = sock_error(sk);
96 if (error)
97 goto out_err;
98
39cc8613 99 if (sk->sk_receive_queue.prev != skb)
1da177e4
LT
100 goto out;
101
102 /* Socket shut down? */
103 if (sk->sk_shutdown & RCV_SHUTDOWN)
104 goto out_noerr;
105
106 /* Sequenced packets can come disconnected.
107 * If so we report the problem
108 */
109 error = -ENOTCONN;
110 if (connection_based(sk) &&
111 !(sk->sk_state == TCP_ESTABLISHED || sk->sk_state == TCP_LISTEN))
112 goto out_err;
113
114 /* handle signals */
115 if (signal_pending(current))
116 goto interrupted;
117
118 error = 0;
119 *timeo_p = schedule_timeout(*timeo_p);
120out:
aa395145 121 finish_wait(sk_sleep(sk), &wait);
1da177e4
LT
122 return error;
123interrupted:
124 error = sock_intr_errno(*timeo_p);
125out_err:
126 *err = error;
127 goto out;
128out_noerr:
129 *err = 0;
130 error = 1;
131 goto out;
132}
133
738ac1eb
HX
134static int skb_set_peeked(struct sk_buff *skb)
135{
136 struct sk_buff *nskb;
137
138 if (skb->peeked)
139 return 0;
140
141 /* We have to unshare an skb before modifying it. */
142 if (!skb_shared(skb))
143 goto done;
144
145 nskb = skb_clone(skb, GFP_ATOMIC);
146 if (!nskb)
147 return -ENOMEM;
148
149 skb->prev->next = nskb;
150 skb->next->prev = nskb;
151 nskb->prev = skb->prev;
152 nskb->next = skb->next;
153
154 consume_skb(skb);
155 skb = nskb;
156
157done:
158 skb->peeked = 1;
159
160 return 0;
161}
162
1da177e4 163/**
a59322be 164 * __skb_recv_datagram - Receive a datagram skbuff
4dc3b16b
PP
165 * @sk: socket
166 * @flags: MSG_ flags
39cc8613 167 * @peeked: returns non-zero if this packet has been seen before
3f518bf7
PE
168 * @off: an offset in bytes to peek skb from. Returns an offset
169 * within an skb where data actually starts
4dc3b16b 170 * @err: error code returned
1da177e4
LT
171 *
172 * Get a datagram skbuff, understands the peeking, nonblocking wakeups
173 * and possible races. This replaces identical code in packet, raw and
174 * udp, as well as the IPX AX.25 and Appletalk. It also finally fixes
175 * the long standing peek and read race for datagram sockets. If you
176 * alter this routine remember it must be re-entrant.
177 *
178 * This function will lock the socket if a skb is returned, so the caller
179 * needs to unlock the socket in that case (usually by calling
180 * skb_free_datagram)
181 *
182 * * It does not lock socket since today. This function is
183 * * free of race conditions. This measure should/can improve
184 * * significantly datagram socket latencies at high loads,
185 * * when data copying to user space takes lots of time.
186 * * (BTW I've just killed the last cli() in IP/IPv6/core/netlink/packet
187 * * 8) Great win.)
188 * * --ANK (980729)
189 *
190 * The order of the tests when we find no data waiting are specified
191 * quite explicitly by POSIX 1003.1g, don't change them without having
192 * the standard around please.
193 */
95c96174 194struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags,
3f518bf7 195 int *peeked, int *off, int *err)
1da177e4 196{
738ac1eb 197 struct sk_buff_head *queue = &sk->sk_receive_queue;
39cc8613 198 struct sk_buff *skb, *last;
738ac1eb 199 unsigned long cpu_flags;
1da177e4
LT
200 long timeo;
201 /*
202 * Caller is allowed not to check sk->sk_err before skb_recv_datagram()
203 */
204 int error = sock_error(sk);
205
206 if (error)
207 goto no_packet;
208
a59322be 209 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
1da177e4
LT
210
211 do {
212 /* Again only user level code calls this function, so nothing
213 * interrupt level will suddenly eat the receive_queue.
214 *
215 * Look at current nfs client by the way...
8917a3c0 216 * However, this function was correct in any case. 8)
1da177e4 217 */
39cc8613 218 int _off = *off;
a59322be 219
39cc8613 220 last = (struct sk_buff *)queue;
4934b032 221 spin_lock_irqsave(&queue->lock, cpu_flags);
3f518bf7 222 skb_queue_walk(queue, skb) {
39cc8613 223 last = skb;
a59322be
HX
224 *peeked = skb->peeked;
225 if (flags & MSG_PEEK) {
39cc8613 226 if (_off >= skb->len && (skb->len || _off ||
add05ad4 227 skb->peeked)) {
39cc8613 228 _off -= skb->len;
3f518bf7
PE
229 continue;
230 }
738ac1eb
HX
231
232 error = skb_set_peeked(skb);
233 if (error)
234 goto unlock_err;
235
1da177e4 236 atomic_inc(&skb->users);
a59322be 237 } else
4934b032 238 __skb_unlink(skb, queue);
1da177e4 239
3f518bf7 240 spin_unlock_irqrestore(&queue->lock, cpu_flags);
39cc8613 241 *off = _off;
1da177e4 242 return skb;
3f518bf7
PE
243 }
244 spin_unlock_irqrestore(&queue->lock, cpu_flags);
1da177e4 245
cbf55001
ET
246 if (sk_can_busy_loop(sk) &&
247 sk_busy_loop(sk, flags & MSG_DONTWAIT))
a5b50476
ET
248 continue;
249
1da177e4
LT
250 /* User doesn't want to wait */
251 error = -EAGAIN;
252 if (!timeo)
253 goto no_packet;
254
39cc8613 255 } while (!wait_for_more_packets(sk, err, &timeo, last));
1da177e4
LT
256
257 return NULL;
258
738ac1eb
HX
259unlock_err:
260 spin_unlock_irqrestore(&queue->lock, cpu_flags);
1da177e4
LT
261no_packet:
262 *err = error;
263 return NULL;
264}
a59322be
HX
265EXPORT_SYMBOL(__skb_recv_datagram);
266
95c96174 267struct sk_buff *skb_recv_datagram(struct sock *sk, unsigned int flags,
a59322be
HX
268 int noblock, int *err)
269{
3f518bf7 270 int peeked, off = 0;
a59322be
HX
271
272 return __skb_recv_datagram(sk, flags | (noblock ? MSG_DONTWAIT : 0),
3f518bf7 273 &peeked, &off, err);
a59322be 274}
9e34a5b5 275EXPORT_SYMBOL(skb_recv_datagram);
1da177e4
LT
276
277void skb_free_datagram(struct sock *sk, struct sk_buff *skb)
278{
ead2ceb0 279 consume_skb(skb);
270acefa 280 sk_mem_reclaim_partial(sk);
1da177e4 281}
9d410c79
ED
282EXPORT_SYMBOL(skb_free_datagram);
283
284void skb_free_datagram_locked(struct sock *sk, struct sk_buff *skb)
285{
8a74ad60
ED
286 bool slow;
287
93bb64ea
ED
288 if (likely(atomic_read(&skb->users) == 1))
289 smp_rmb();
290 else if (likely(!atomic_dec_and_test(&skb->users)))
291 return;
292
8a74ad60 293 slow = lock_sock_fast(sk);
4b0b72f7
ED
294 skb_orphan(skb);
295 sk_mem_reclaim_partial(sk);
8a74ad60 296 unlock_sock_fast(sk, slow);
4b0b72f7 297
93bb64ea
ED
298 /* skb is now orphaned, can be freed outside of locked section */
299 __kfree_skb(skb);
9d410c79
ED
300}
301EXPORT_SYMBOL(skb_free_datagram_locked);
1da177e4 302
3305b80c
HX
303/**
304 * skb_kill_datagram - Free a datagram skbuff forcibly
305 * @sk: socket
306 * @skb: datagram skbuff
307 * @flags: MSG_ flags
308 *
309 * This function frees a datagram skbuff that was received by
310 * skb_recv_datagram. The flags argument must match the one
311 * used for skb_recv_datagram.
312 *
313 * If the MSG_PEEK flag is set, and the packet is still on the
314 * receive queue of the socket, it will be taken off the queue
315 * before it is freed.
316 *
317 * This function currently only disables BH when acquiring the
318 * sk_receive_queue lock. Therefore it must not be used in a
319 * context where that lock is acquired in an IRQ context.
27ab2568
HX
320 *
321 * It returns 0 if the packet was removed by us.
3305b80c
HX
322 */
323
27ab2568 324int skb_kill_datagram(struct sock *sk, struct sk_buff *skb, unsigned int flags)
3305b80c 325{
27ab2568
HX
326 int err = 0;
327
3305b80c 328 if (flags & MSG_PEEK) {
27ab2568 329 err = -ENOENT;
3305b80c
HX
330 spin_lock_bh(&sk->sk_receive_queue.lock);
331 if (skb == skb_peek(&sk->sk_receive_queue)) {
332 __skb_unlink(skb, &sk->sk_receive_queue);
333 atomic_dec(&skb->users);
27ab2568 334 err = 0;
3305b80c
HX
335 }
336 spin_unlock_bh(&sk->sk_receive_queue.lock);
337 }
338
61de71c6 339 kfree_skb(skb);
8edf19c2 340 atomic_inc(&sk->sk_drops);
61de71c6
JD
341 sk_mem_reclaim_partial(sk);
342
27ab2568 343 return err;
3305b80c 344}
3305b80c
HX
345EXPORT_SYMBOL(skb_kill_datagram);
346
a8f820aa
HX
347/**
348 * skb_copy_datagram_iter - Copy a datagram to an iovec iterator.
349 * @skb: buffer to copy
350 * @offset: offset in the buffer to start copying from
351 * @to: iovec iterator to copy to
352 * @len: amount of data to copy from buffer to iovec
353 */
354int skb_copy_datagram_iter(const struct sk_buff *skb, int offset,
355 struct iov_iter *to, int len)
356{
357 int start = skb_headlen(skb);
358 int i, copy = start - offset;
359 struct sk_buff *frag_iter;
360
361 trace_skb_copy_datagram_iovec(skb, len);
362
363 /* Copy header. */
364 if (copy > 0) {
365 if (copy > len)
366 copy = len;
367 if (copy_to_iter(skb->data + offset, copy, to) != copy)
368 goto short_copy;
369 if ((len -= copy) == 0)
370 return 0;
371 offset += copy;
372 }
373
374 /* Copy paged appendix. Hmm... why does this look so complicated? */
375 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
376 int end;
377 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
378
379 WARN_ON(start > offset + len);
380
381 end = start + skb_frag_size(frag);
382 if ((copy = end - offset) > 0) {
383 if (copy > len)
384 copy = len;
385 if (copy_page_to_iter(skb_frag_page(frag),
386 frag->page_offset + offset -
387 start, copy, to) != copy)
388 goto short_copy;
389 if (!(len -= copy))
390 return 0;
391 offset += copy;
392 }
393 start = end;
394 }
395
396 skb_walk_frags(skb, frag_iter) {
397 int end;
398
399 WARN_ON(start > offset + len);
400
401 end = start + frag_iter->len;
402 if ((copy = end - offset) > 0) {
403 if (copy > len)
404 copy = len;
405 if (skb_copy_datagram_iter(frag_iter, offset - start,
406 to, copy))
407 goto fault;
408 if ((len -= copy) == 0)
409 return 0;
410 offset += copy;
411 }
412 start = end;
413 }
414 if (!len)
415 return 0;
416
417 /* This is not really a user copy fault, but rather someone
418 * gave us a bogus length on the skb. We should probably
419 * print a warning here as it may indicate a kernel bug.
420 */
421
422fault:
423 return -EFAULT;
424
425short_copy:
426 if (iov_iter_count(to))
427 goto fault;
428
429 return 0;
430}
431EXPORT_SYMBOL(skb_copy_datagram_iter);
432
db543c1f 433/**
8feb2fb2 434 * skb_copy_datagram_from_iter - Copy a datagram from an iov_iter.
db543c1f
RR
435 * @skb: buffer to copy
436 * @offset: offset in the buffer to start copying to
8feb2fb2 437 * @from: the copy source
db543c1f
RR
438 * @len: amount of data to copy to buffer from iovec
439 *
440 * Returns 0 or -EFAULT.
db543c1f 441 */
3a654f97
AV
442int skb_copy_datagram_from_iter(struct sk_buff *skb, int offset,
443 struct iov_iter *from,
444 int len)
445{
446 int start = skb_headlen(skb);
447 int i, copy = start - offset;
448 struct sk_buff *frag_iter;
449
450 /* Copy header. */
451 if (copy > 0) {
452 if (copy > len)
453 copy = len;
454 if (copy_from_iter(skb->data + offset, copy, from) != copy)
455 goto fault;
456 if ((len -= copy) == 0)
457 return 0;
458 offset += copy;
459 }
460
461 /* Copy paged appendix. Hmm... why does this look so complicated? */
462 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
463 int end;
464 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
465
466 WARN_ON(start > offset + len);
467
468 end = start + skb_frag_size(frag);
469 if ((copy = end - offset) > 0) {
470 size_t copied;
471
472 if (copy > len)
473 copy = len;
474 copied = copy_page_from_iter(skb_frag_page(frag),
475 frag->page_offset + offset - start,
476 copy, from);
477 if (copied != copy)
478 goto fault;
479
480 if (!(len -= copy))
481 return 0;
482 offset += copy;
483 }
484 start = end;
485 }
486
487 skb_walk_frags(skb, frag_iter) {
488 int end;
489
490 WARN_ON(start > offset + len);
491
492 end = start + frag_iter->len;
493 if ((copy = end - offset) > 0) {
494 if (copy > len)
495 copy = len;
496 if (skb_copy_datagram_from_iter(frag_iter,
497 offset - start,
498 from, copy))
499 goto fault;
500 if ((len -= copy) == 0)
501 return 0;
502 offset += copy;
503 }
504 start = end;
505 }
506 if (!len)
507 return 0;
508
509fault:
510 return -EFAULT;
511}
512EXPORT_SYMBOL(skb_copy_datagram_from_iter);
513
c3bdeb5c 514/**
195e952d 515 * zerocopy_sg_from_iter - Build a zerocopy datagram from an iov_iter
c3bdeb5c 516 * @skb: buffer to copy
195e952d 517 * @from: the source to copy from
c3bdeb5c
JW
518 *
519 * The function will first copy up to headlen, and then pin the userspace
520 * pages and build frags through them.
521 *
522 * Returns 0, -EFAULT or -EMSGSIZE.
c3bdeb5c 523 */
3a654f97
AV
524int zerocopy_sg_from_iter(struct sk_buff *skb, struct iov_iter *from)
525{
526 int len = iov_iter_count(from);
527 int copy = min_t(int, skb_headlen(skb), len);
528 int frag = 0;
529
530 /* copy up to skb headlen */
531 if (skb_copy_datagram_from_iter(skb, 0, from, copy))
532 return -EFAULT;
533
534 while (iov_iter_count(from)) {
535 struct page *pages[MAX_SKB_FRAGS];
536 size_t start;
537 ssize_t copied;
538 unsigned long truesize;
539 int n = 0;
540
541 if (frag == MAX_SKB_FRAGS)
542 return -EMSGSIZE;
543
544 copied = iov_iter_get_pages(from, pages, ~0U,
545 MAX_SKB_FRAGS - frag, &start);
546 if (copied < 0)
547 return -EFAULT;
548
549 iov_iter_advance(from, copied);
550
551 truesize = PAGE_ALIGN(copied + start);
552 skb->data_len += copied;
553 skb->len += copied;
554 skb->truesize += truesize;
555 atomic_add(truesize, &skb->sk->sk_wmem_alloc);
556 while (copied) {
557 int size = min_t(int, copied, PAGE_SIZE - start);
558 skb_fill_page_desc(skb, frag++, pages[n], start, size);
559 start = 0;
560 copied -= size;
561 n++;
562 }
563 }
564 return 0;
565}
566EXPORT_SYMBOL(zerocopy_sg_from_iter);
567
1da177e4 568static int skb_copy_and_csum_datagram(const struct sk_buff *skb, int offset,
e5a4b0bb 569 struct iov_iter *to, int len,
5084205f 570 __wsum *csump)
1da177e4 571{
1a028e50 572 int start = skb_headlen(skb);
1a028e50 573 int i, copy = start - offset;
5b1a002a
DM
574 struct sk_buff *frag_iter;
575 int pos = 0;
e5a4b0bb 576 int n;
1da177e4
LT
577
578 /* Copy header. */
579 if (copy > 0) {
1da177e4
LT
580 if (copy > len)
581 copy = len;
e5a4b0bb
AV
582 n = csum_and_copy_to_iter(skb->data + offset, copy, csump, to);
583 if (n != copy)
1da177e4
LT
584 goto fault;
585 if ((len -= copy) == 0)
586 return 0;
587 offset += copy;
1da177e4
LT
588 pos = copy;
589 }
590
591 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
1a028e50 592 int end;
9e903e08 593 const skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
1da177e4 594
547b792c 595 WARN_ON(start > offset + len);
1a028e50 596
9e903e08 597 end = start + skb_frag_size(frag);
1da177e4 598 if ((copy = end - offset) > 0) {
e5a4b0bb 599 __wsum csum2 = 0;
ea2ab693 600 struct page *page = skb_frag_page(frag);
e5a4b0bb 601 u8 *vaddr = kmap(page);
1da177e4
LT
602
603 if (copy > len)
604 copy = len;
e5a4b0bb
AV
605 n = csum_and_copy_to_iter(vaddr + frag->page_offset +
606 offset - start, copy,
607 &csum2, to);
1da177e4 608 kunmap(page);
e5a4b0bb 609 if (n != copy)
1da177e4
LT
610 goto fault;
611 *csump = csum_block_add(*csump, csum2, pos);
612 if (!(len -= copy))
613 return 0;
614 offset += copy;
1da177e4
LT
615 pos += copy;
616 }
1a028e50 617 start = end;
1da177e4
LT
618 }
619
5b1a002a
DM
620 skb_walk_frags(skb, frag_iter) {
621 int end;
622
623 WARN_ON(start > offset + len);
624
625 end = start + frag_iter->len;
626 if ((copy = end - offset) > 0) {
627 __wsum csum2 = 0;
628 if (copy > len)
629 copy = len;
630 if (skb_copy_and_csum_datagram(frag_iter,
631 offset - start,
632 to, copy,
633 &csum2))
634 goto fault;
635 *csump = csum_block_add(*csump, csum2, pos);
636 if ((len -= copy) == 0)
637 return 0;
638 offset += copy;
5b1a002a 639 pos += copy;
1da177e4 640 }
5b1a002a 641 start = end;
1da177e4
LT
642 }
643 if (!len)
644 return 0;
645
646fault:
647 return -EFAULT;
648}
649
759e5d00 650__sum16 __skb_checksum_complete_head(struct sk_buff *skb, int len)
fb286bb2 651{
d3bc23e7 652 __sum16 sum;
fb286bb2 653
759e5d00 654 sum = csum_fold(skb_checksum(skb, 0, len, skb->csum));
46fb51eb
TH
655 if (likely(!sum)) {
656 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
657 !skb->csum_complete_sw)
658 netdev_rx_csum_fault(skb->dev);
659 }
89c22d8c
HX
660 if (!skb_shared(skb))
661 skb->csum_valid = !sum;
fb286bb2
HX
662 return sum;
663}
759e5d00
HX
664EXPORT_SYMBOL(__skb_checksum_complete_head);
665
666__sum16 __skb_checksum_complete(struct sk_buff *skb)
667{
46fb51eb
TH
668 __wsum csum;
669 __sum16 sum;
670
671 csum = skb_checksum(skb, 0, skb->len, 0);
672
673 /* skb->csum holds pseudo checksum */
674 sum = csum_fold(csum_add(skb->csum, csum));
675 if (likely(!sum)) {
676 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE) &&
677 !skb->csum_complete_sw)
678 netdev_rx_csum_fault(skb->dev);
679 }
680
89c22d8c
HX
681 if (!skb_shared(skb)) {
682 /* Save full packet checksum */
683 skb->csum = csum;
684 skb->ip_summed = CHECKSUM_COMPLETE;
685 skb->csum_complete_sw = 1;
686 skb->csum_valid = !sum;
687 }
46fb51eb
TH
688
689 return sum;
759e5d00 690}
fb286bb2
HX
691EXPORT_SYMBOL(__skb_checksum_complete);
692
1da177e4 693/**
e5a4b0bb 694 * skb_copy_and_csum_datagram_msg - Copy and checksum skb to user iovec.
4dc3b16b
PP
695 * @skb: skbuff
696 * @hlen: hardware length
e5a4b0bb 697 * @msg: destination
4ec93edb 698 *
1da177e4
LT
699 * Caller _must_ check that skb will fit to this iovec.
700 *
701 * Returns: 0 - success.
702 * -EINVAL - checksum failure.
e5a4b0bb 703 * -EFAULT - fault during copy.
1da177e4 704 */
e5a4b0bb
AV
705int skb_copy_and_csum_datagram_msg(struct sk_buff *skb,
706 int hlen, struct msghdr *msg)
1da177e4 707{
d3bc23e7 708 __wsum csum;
1da177e4
LT
709 int chunk = skb->len - hlen;
710
ef8aef55
HX
711 if (!chunk)
712 return 0;
713
01e97e65 714 if (msg_data_left(msg) < chunk) {
fb286bb2 715 if (__skb_checksum_complete(skb))
1da177e4 716 goto csum_error;
e5a4b0bb 717 if (skb_copy_datagram_msg(skb, hlen, msg, chunk))
1da177e4
LT
718 goto fault;
719 } else {
720 csum = csum_partial(skb->data, hlen, skb->csum);
e5a4b0bb 721 if (skb_copy_and_csum_datagram(skb, hlen, &msg->msg_iter,
1da177e4
LT
722 chunk, &csum))
723 goto fault;
d3bc23e7 724 if (csum_fold(csum))
1da177e4 725 goto csum_error;
84fa7933 726 if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE))
fb286bb2 727 netdev_rx_csum_fault(skb->dev);
1da177e4
LT
728 }
729 return 0;
730csum_error:
731 return -EINVAL;
732fault:
733 return -EFAULT;
734}
e5a4b0bb 735EXPORT_SYMBOL(skb_copy_and_csum_datagram_msg);
1da177e4
LT
736
737/**
738 * datagram_poll - generic datagram poll
4dc3b16b
PP
739 * @file: file struct
740 * @sock: socket
741 * @wait: poll table
1da177e4
LT
742 *
743 * Datagram poll: Again totally generic. This also handles
744 * sequenced packet sockets providing the socket receive queue
745 * is only ever holding data ready to receive.
746 *
747 * Note: when you _don't_ use this routine for this protocol,
748 * and you use a different write policy from sock_writeable()
749 * then please supply your own write_space callback.
750 */
751unsigned int datagram_poll(struct file *file, struct socket *sock,
752 poll_table *wait)
753{
754 struct sock *sk = sock->sk;
755 unsigned int mask;
756
aa395145 757 sock_poll_wait(file, sk_sleep(sk), wait);
1da177e4
LT
758 mask = 0;
759
760 /* exceptional events? */
761 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
7d4c04fc 762 mask |= POLLERR |
8facd5fb 763 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? POLLPRI : 0);
7d4c04fc 764
f348d70a 765 if (sk->sk_shutdown & RCV_SHUTDOWN)
db40980f 766 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
1da177e4
LT
767 if (sk->sk_shutdown == SHUTDOWN_MASK)
768 mask |= POLLHUP;
769
770 /* readable? */
db40980f 771 if (!skb_queue_empty(&sk->sk_receive_queue))
1da177e4
LT
772 mask |= POLLIN | POLLRDNORM;
773
774 /* Connection-based need to check for termination and startup */
775 if (connection_based(sk)) {
776 if (sk->sk_state == TCP_CLOSE)
777 mask |= POLLHUP;
778 /* connection hasn't started yet? */
779 if (sk->sk_state == TCP_SYN_SENT)
780 return mask;
781 }
782
783 /* writable? */
784 if (sock_writeable(sk))
785 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
786 else
787 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
788
789 return mask;
790}
1da177e4 791EXPORT_SYMBOL(datagram_poll);