tcp.c 103 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0-or-later
Linus Torvalds's avatar
Linus Torvalds committed
2 3 4 5 6 7 8
/*
 * INET		An implementation of the TCP/IP protocol suite for the LINUX
 *		operating system.  INET is implemented using the  BSD Socket
 *		interface as the means of communication with the user level.
 *
 *		Implementation of the Transmission Control Protocol(TCP).
 *
9
 * Authors:	Ross Biro
Linus Torvalds's avatar
Linus Torvalds committed
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243
 *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
 *		Mark Evans, <evansmp@uhura.aston.ac.uk>
 *		Corey Minyard <wf-rch!minyard@relay.EU.net>
 *		Florian La Roche, <flla@stud.uni-sb.de>
 *		Charles Hedrick, <hedrick@klinzhai.rutgers.edu>
 *		Linus Torvalds, <torvalds@cs.helsinki.fi>
 *		Alan Cox, <gw4pts@gw4pts.ampr.org>
 *		Matthew Dillon, <dillon@apollo.west.oic.com>
 *		Arnt Gulbrandsen, <agulbra@nvg.unit.no>
 *		Jorge Cwik, <jorge@laser.satlink.net>
 *
 * Fixes:
 *		Alan Cox	:	Numerous verify_area() calls
 *		Alan Cox	:	Set the ACK bit on a reset
 *		Alan Cox	:	Stopped it crashing if it closed while
 *					sk->inuse=1 and was trying to connect
 *					(tcp_err()).
 *		Alan Cox	:	All icmp error handling was broken
 *					pointers passed where wrong and the
 *					socket was looked up backwards. Nobody
 *					tested any icmp error code obviously.
 *		Alan Cox	:	tcp_err() now handled properly. It
 *					wakes people on errors. poll
 *					behaves and the icmp error race
 *					has gone by moving it into sock.c
 *		Alan Cox	:	tcp_send_reset() fixed to work for
 *					everything not just packets for
 *					unknown sockets.
 *		Alan Cox	:	tcp option processing.
 *		Alan Cox	:	Reset tweaked (still not 100%) [Had
 *					syn rule wrong]
 *		Herp Rosmanith  :	More reset fixes
 *		Alan Cox	:	No longer acks invalid rst frames.
 *					Acking any kind of RST is right out.
 *		Alan Cox	:	Sets an ignore me flag on an rst
 *					receive otherwise odd bits of prattle
 *					escape still
 *		Alan Cox	:	Fixed another acking RST frame bug.
 *					Should stop LAN workplace lockups.
 *		Alan Cox	: 	Some tidyups using the new skb list
 *					facilities
 *		Alan Cox	:	sk->keepopen now seems to work
 *		Alan Cox	:	Pulls options out correctly on accepts
 *		Alan Cox	:	Fixed assorted sk->rqueue->next errors
 *		Alan Cox	:	PSH doesn't end a TCP read. Switched a
 *					bit to skb ops.
 *		Alan Cox	:	Tidied tcp_data to avoid a potential
 *					nasty.
 *		Alan Cox	:	Added some better commenting, as the
 *					tcp is hard to follow
 *		Alan Cox	:	Removed incorrect check for 20 * psh
 *	Michael O'Reilly	:	ack < copied bug fix.
 *	Johannes Stille		:	Misc tcp fixes (not all in yet).
 *		Alan Cox	:	FIN with no memory -> CRASH
 *		Alan Cox	:	Added socket option proto entries.
 *					Also added awareness of them to accept.
 *		Alan Cox	:	Added TCP options (SOL_TCP)
 *		Alan Cox	:	Switched wakeup calls to callbacks,
 *					so the kernel can layer network
 *					sockets.
 *		Alan Cox	:	Use ip_tos/ip_ttl settings.
 *		Alan Cox	:	Handle FIN (more) properly (we hope).
 *		Alan Cox	:	RST frames sent on unsynchronised
 *					state ack error.
 *		Alan Cox	:	Put in missing check for SYN bit.
 *		Alan Cox	:	Added tcp_select_window() aka NET2E
 *					window non shrink trick.
 *		Alan Cox	:	Added a couple of small NET2E timer
 *					fixes
 *		Charles Hedrick :	TCP fixes
 *		Toomas Tamm	:	TCP window fixes
 *		Alan Cox	:	Small URG fix to rlogin ^C ack fight
 *		Charles Hedrick	:	Rewrote most of it to actually work
 *		Linus		:	Rewrote tcp_read() and URG handling
 *					completely
 *		Gerhard Koerting:	Fixed some missing timer handling
 *		Matthew Dillon  :	Reworked TCP machine states as per RFC
 *		Gerhard Koerting:	PC/TCP workarounds
 *		Adam Caldwell	:	Assorted timer/timing errors
 *		Matthew Dillon	:	Fixed another RST bug
 *		Alan Cox	:	Move to kernel side addressing changes.
 *		Alan Cox	:	Beginning work on TCP fastpathing
 *					(not yet usable)
 *		Arnt Gulbrandsen:	Turbocharged tcp_check() routine.
 *		Alan Cox	:	TCP fast path debugging
 *		Alan Cox	:	Window clamping
 *		Michael Riepe	:	Bug in tcp_check()
 *		Matt Dillon	:	More TCP improvements and RST bug fixes
 *		Matt Dillon	:	Yet more small nasties remove from the
 *					TCP code (Be very nice to this man if
 *					tcp finally works 100%) 8)
 *		Alan Cox	:	BSD accept semantics.
 *		Alan Cox	:	Reset on closedown bug.
 *	Peter De Schrijver	:	ENOTCONN check missing in tcp_sendto().
 *		Michael Pall	:	Handle poll() after URG properly in
 *					all cases.
 *		Michael Pall	:	Undo the last fix in tcp_read_urg()
 *					(multi URG PUSH broke rlogin).
 *		Michael Pall	:	Fix the multi URG PUSH problem in
 *					tcp_readable(), poll() after URG
 *					works now.
 *		Michael Pall	:	recv(...,MSG_OOB) never blocks in the
 *					BSD api.
 *		Alan Cox	:	Changed the semantics of sk->socket to
 *					fix a race and a signal problem with
 *					accept() and async I/O.
 *		Alan Cox	:	Relaxed the rules on tcp_sendto().
 *		Yury Shevchuk	:	Really fixed accept() blocking problem.
 *		Craig I. Hagan  :	Allow for BSD compatible TIME_WAIT for
 *					clients/servers which listen in on
 *					fixed ports.
 *		Alan Cox	:	Cleaned the above up and shrank it to
 *					a sensible code size.
 *		Alan Cox	:	Self connect lockup fix.
 *		Alan Cox	:	No connect to multicast.
 *		Ross Biro	:	Close unaccepted children on master
 *					socket close.
 *		Alan Cox	:	Reset tracing code.
 *		Alan Cox	:	Spurious resets on shutdown.
 *		Alan Cox	:	Giant 15 minute/60 second timer error
 *		Alan Cox	:	Small whoops in polling before an
 *					accept.
 *		Alan Cox	:	Kept the state trace facility since
 *					it's handy for debugging.
 *		Alan Cox	:	More reset handler fixes.
 *		Alan Cox	:	Started rewriting the code based on
 *					the RFC's for other useful protocol
 *					references see: Comer, KA9Q NOS, and
 *					for a reference on the difference
 *					between specifications and how BSD
 *					works see the 4.4lite source.
 *		A.N.Kuznetsov	:	Don't time wait on completion of tidy
 *					close.
 *		Linus Torvalds	:	Fin/Shutdown & copied_seq changes.
 *		Linus Torvalds	:	Fixed BSD port reuse to work first syn
 *		Alan Cox	:	Reimplemented timers as per the RFC
 *					and using multiple timers for sanity.
 *		Alan Cox	:	Small bug fixes, and a lot of new
 *					comments.
 *		Alan Cox	:	Fixed dual reader crash by locking
 *					the buffers (much like datagram.c)
 *		Alan Cox	:	Fixed stuck sockets in probe. A probe
 *					now gets fed up of retrying without
 *					(even a no space) answer.
 *		Alan Cox	:	Extracted closing code better
 *		Alan Cox	:	Fixed the closing state machine to
 *					resemble the RFC.
 *		Alan Cox	:	More 'per spec' fixes.
 *		Jorge Cwik	:	Even faster checksumming.
 *		Alan Cox	:	tcp_data() doesn't ack illegal PSH
 *					only frames. At least one pc tcp stack
 *					generates them.
 *		Alan Cox	:	Cache last socket.
 *		Alan Cox	:	Per route irtt.
 *		Matt Day	:	poll()->select() match BSD precisely on error
 *		Alan Cox	:	New buffers
 *		Marc Tamsky	:	Various sk->prot->retransmits and
 *					sk->retransmits misupdating fixed.
 *					Fixed tcp_write_timeout: stuck close,
 *					and TCP syn retries gets used now.
 *		Mark Yarvis	:	In tcp_read_wakeup(), don't send an
 *					ack if state is TCP_CLOSED.
 *		Alan Cox	:	Look up device on a retransmit - routes may
 *					change. Doesn't yet cope with MSS shrink right
 *					but it's a start!
 *		Marc Tamsky	:	Closing in closing fixes.
 *		Mike Shaver	:	RFC1122 verifications.
 *		Alan Cox	:	rcv_saddr errors.
 *		Alan Cox	:	Block double connect().
 *		Alan Cox	:	Small hooks for enSKIP.
 *		Alexey Kuznetsov:	Path MTU discovery.
 *		Alan Cox	:	Support soft errors.
 *		Alan Cox	:	Fix MTU discovery pathological case
 *					when the remote claims no mtu!
 *		Marc Tamsky	:	TCP_CLOSE fix.
 *		Colin (G3TNE)	:	Send a reset on syn ack replies in
 *					window but wrong (fixes NT lpd problems)
 *		Pedro Roque	:	Better TCP window handling, delayed ack.
 *		Joerg Reuter	:	No modification of locked buffers in
 *					tcp_do_retransmit()
 *		Eric Schenk	:	Changed receiver side silly window
 *					avoidance algorithm to BSD style
 *					algorithm. This doubles throughput
 *					against machines running Solaris,
 *					and seems to result in general
 *					improvement.
 *	Stefan Magdalinski	:	adjusted tcp_readable() to fix FIONREAD
 *	Willy Konynenberg	:	Transparent proxying support.
 *	Mike McLagan		:	Routing by source
 *		Keith Owens	:	Do proper merging with partial SKB's in
 *					tcp_do_sendmsg to avoid burstiness.
 *		Eric Schenk	:	Fix fast close down bug with
 *					shutdown() followed by close().
 *		Andi Kleen 	:	Make poll agree with SIGIO
 *	Salvatore Sanfilippo	:	Support SO_LINGER with linger == 1 and
 *					lingertime == 0 (RFC 793 ABORT Call)
 *	Hirokazu Takahashi	:	Use copy_from_user() instead of
 *					csum_and_copy_from_user() if possible.
 *
 * Description of States:
 *
 *	TCP_SYN_SENT		sent a connection request, waiting for ack
 *
 *	TCP_SYN_RECV		received a connection request, sent ack,
 *				waiting for final ack in three-way handshake.
 *
 *	TCP_ESTABLISHED		connection established
 *
 *	TCP_FIN_WAIT1		our side has shutdown, waiting to complete
 *				transmission of remaining buffered data
 *
 *	TCP_FIN_WAIT2		all buffered data sent, waiting for remote
 *				to shutdown
 *
 *	TCP_CLOSING		both sides have shutdown but we still have
 *				data we have to finish sending
 *
 *	TCP_TIME_WAIT		timeout to catch resent junk before entering
 *				closed, can only be entered from FIN_WAIT2
 *				or CLOSING.  Required because the other end
 *				may not have gotten our last ACK causing it
 *				to retransmit the data packet (which we ignore)
 *
 *	TCP_CLOSE_WAIT		remote side has shutdown and is waiting for
 *				us to finish writing our data and to shutdown
 *				(we have to close() to move on to LAST_ACK)
 *
 *	TCP_LAST_ACK		out side has shutdown after remote has
 *				shutdown.  There may still be data in our
 *				buffer that we have to finish sending
 *
 *	TCP_CLOSE		socket is finished
 */

244 245
#define pr_fmt(fmt) "TCP: " fmt

Herbert Xu's avatar
Herbert Xu committed
246
#include <crypto/hash.h>
247
#include <linux/kernel.h>
Linus Torvalds's avatar
Linus Torvalds committed
248 249 250 251
#include <linux/module.h>
#include <linux/types.h>
#include <linux/fcntl.h>
#include <linux/poll.h>
252
#include <linux/inet_diag.h>
Linus Torvalds's avatar
Linus Torvalds committed
253 254
#include <linux/init.h>
#include <linux/fs.h>
Jens Axboe's avatar
Jens Axboe committed
255
#include <linux/skbuff.h>
256
#include <linux/scatterlist.h>
Jens Axboe's avatar
Jens Axboe committed
257 258 259
#include <linux/splice.h>
#include <linux/net.h>
#include <linux/socket.h>
Linus Torvalds's avatar
Linus Torvalds committed
260
#include <linux/random.h>
261
#include <linux/memblock.h>
262 263
#include <linux/highmem.h>
#include <linux/swap.h>
264
#include <linux/cache.h>
Herbert Xu's avatar
Herbert Xu committed
265
#include <linux/err.h>
266
#include <linux/time.h>
267
#include <linux/slab.h>
268
#include <linux/errqueue.h>
269
#include <linux/static_key.h>
Linus Torvalds's avatar
Linus Torvalds committed
270 271

#include <net/icmp.h>
272
#include <net/inet_common.h>
Linus Torvalds's avatar
Linus Torvalds committed
273 274 275
#include <net/tcp.h>
#include <net/xfrm.h>
#include <net/ip.h>
Jens Axboe's avatar
Jens Axboe committed
276
#include <net/sock.h>
Linus Torvalds's avatar
Linus Torvalds committed
277

278
#include <linux/uaccess.h>
Linus Torvalds's avatar
Linus Torvalds committed
279
#include <asm/ioctls.h>
280
#include <net/busy_poll.h>
Linus Torvalds's avatar
Linus Torvalds committed
281

282
struct percpu_counter tcp_orphan_count;
283 284
EXPORT_SYMBOL_GPL(tcp_orphan_count);

285 286
long sysctl_tcp_mem[3] __read_mostly;
EXPORT_SYMBOL(sysctl_tcp_mem);
Linus Torvalds's avatar
Linus Torvalds committed
287

Eric Dumazet's avatar
Eric Dumazet committed
288
atomic_long_t tcp_memory_allocated;	/* Current allocated memory. */
Linus Torvalds's avatar
Linus Torvalds committed
289
EXPORT_SYMBOL(tcp_memory_allocated);
290

291 292 293 294 295
#if IS_ENABLED(CONFIG_SMC)
DEFINE_STATIC_KEY_FALSE(tcp_have_smc);
EXPORT_SYMBOL(tcp_have_smc);
#endif

296 297 298 299
/*
 * Current number of TCP sockets.
 */
struct percpu_counter tcp_sockets_allocated;
Linus Torvalds's avatar
Linus Torvalds committed
300 301
EXPORT_SYMBOL(tcp_sockets_allocated);

Jens Axboe's avatar
Jens Axboe committed
302 303 304 305 306 307 308 309 310
/*
 * TCP splice context
 */
struct tcp_splice_state {
	struct pipe_inode_info *pipe;
	size_t len;
	unsigned int flags;
};

Linus Torvalds's avatar
Linus Torvalds committed
311 312 313
/*
 * Pressure flag: try to collapse.
 * Technical note: it is used by multiple contexts non atomically.
314
 * All the __sk_mem_schedule() is of this nature: accounting
Linus Torvalds's avatar
Linus Torvalds committed
315 316
 * is strict, actions are advisory and have some latency.
 */
317 318
unsigned long tcp_memory_pressure __read_mostly;
EXPORT_SYMBOL_GPL(tcp_memory_pressure);
Linus Torvalds's avatar
Linus Torvalds committed
319

320 321 322 323 324
DEFINE_STATIC_KEY_FALSE(tcp_rx_skb_cache_key);
EXPORT_SYMBOL(tcp_rx_skb_cache_key);

DEFINE_STATIC_KEY_FALSE(tcp_tx_skb_cache_key);

325
void tcp_enter_memory_pressure(struct sock *sk)
Linus Torvalds's avatar
Linus Torvalds committed
326
{
327 328 329 330 331 332 333 334 335
	unsigned long val;

	if (tcp_memory_pressure)
		return;
	val = jiffies;

	if (!val)
		val--;
	if (!cmpxchg(&tcp_memory_pressure, 0, val))
336
		NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPMEMORYPRESSURES);
Linus Torvalds's avatar
Linus Torvalds committed
337
}
338 339 340 341 342 343 344 345 346 347 348 349 350 351
EXPORT_SYMBOL_GPL(tcp_enter_memory_pressure);

void tcp_leave_memory_pressure(struct sock *sk)
{
	unsigned long val;

	if (!tcp_memory_pressure)
		return;
	val = xchg(&tcp_memory_pressure, 0);
	if (val)
		NET_ADD_STATS(sock_net(sk), LINUX_MIB_TCPMEMORYPRESSURESCHRONO,
			      jiffies_to_msecs(jiffies - val));
}
EXPORT_SYMBOL_GPL(tcp_leave_memory_pressure);
Linus Torvalds's avatar
Linus Torvalds committed
352

353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389
/* Convert seconds to retransmits based on initial and max timeout */
static u8 secs_to_retrans(int seconds, int timeout, int rto_max)
{
	u8 res = 0;

	if (seconds > 0) {
		int period = timeout;

		res = 1;
		while (seconds > period && res < 255) {
			res++;
			timeout <<= 1;
			if (timeout > rto_max)
				timeout = rto_max;
			period += timeout;
		}
	}
	return res;
}

/* Convert retransmits to seconds based on initial and max timeout */
static int retrans_to_secs(u8 retrans, int timeout, int rto_max)
{
	int period = 0;

	if (retrans > 0) {
		period = timeout;
		while (--retrans) {
			timeout <<= 1;
			if (timeout > rto_max)
				timeout = rto_max;
			period += timeout;
		}
	}
	return period;
}

390 391 392 393 394 395 396 397 398 399 400 401 402
static u64 tcp_compute_delivery_rate(const struct tcp_sock *tp)
{
	u32 rate = READ_ONCE(tp->rate_delivered);
	u32 intv = READ_ONCE(tp->rate_interval_us);
	u64 rate64 = 0;

	if (rate && intv) {
		rate64 = (u64)rate * tp->mss_cache * USEC_PER_SEC;
		do_div(rate64, intv);
	}
	return rate64;
}

403 404 405 406 407 408 409 410 411 412
/* Address-family independent initialization for a tcp_sock.
 *
 * NOTE: A lot of things set to zero explicitly by call to
 *       sk_alloc() so need not be done here.
 */
void tcp_init_sock(struct sock *sk)
{
	struct inet_connection_sock *icsk = inet_csk(sk);
	struct tcp_sock *tp = tcp_sk(sk);

413
	tp->out_of_order_queue = RB_ROOT;
414
	sk->tcp_rtx_queue = RB_ROOT;
415
	tcp_init_xmit_timers(sk);
Eric Dumazet's avatar
Eric Dumazet committed
416
	INIT_LIST_HEAD(&tp->tsq_node);
417
	INIT_LIST_HEAD(&tp->tsorted_sent_queue);
418 419

	icsk->icsk_rto = TCP_TIMEOUT_INIT;
420
	tp->mdev_us = jiffies_to_usecs(TCP_TIMEOUT_INIT);
421
	minmax_reset(&tp->rtt_min, tcp_jiffies32, ~0U);
422 423 424 425 426 427 428 429

	/* So many TCP implementations out there (incorrectly) count the
	 * initial SYN frame in their delayed-ACK and congestion control
	 * algorithms that we must have the following bandaid to talk
	 * efficiently to them.  -DaveM
	 */
	tp->snd_cwnd = TCP_INIT_CWND;

430 431 432
	/* There's a bubble in the pipe until at least the first ACK. */
	tp->app_limited = ~0U;

433 434 435 436 437 438 439
	/* See draft-stevens-tcpca-spec-01 for discussion of the
	 * initialization of these values.
	 */
	tp->snd_ssthresh = TCP_INFINITE_SSTHRESH;
	tp->snd_cwnd_clamp = ~0;
	tp->mss_cache = TCP_MSS_DEFAULT;

440
	tp->reordering = sock_net(sk)->ipv4.sysctl_tcp_reordering;
441
	tcp_assign_congestion_control(sk);
442

443
	tp->tsoffset = 0;
444
	tp->rack.reo_wnd_steps = 1;
445

446 447 448 449 450 451 452
	sk->sk_state = TCP_CLOSE;

	sk->sk_write_space = sk_stream_write_space;
	sock_set_flag(sk, SOCK_USE_WRITE_QUEUE);

	icsk->icsk_sync_mss = tcp_sync_mss;

453 454
	sk->sk_sndbuf = sock_net(sk)->ipv4.sysctl_tcp_wmem[1];
	sk->sk_rcvbuf = sock_net(sk)->ipv4.sysctl_tcp_rmem[1];
455 456

	sk_sockets_allocated_inc(sk);
457
	sk->sk_route_forced_caps = NETIF_F_GSO;
458 459 460
}
EXPORT_SYMBOL(tcp_init_sock);

461
static void tcp_tx_timestamp(struct sock *sk, u16 tsflags)
462
{
463 464
	struct sk_buff *skb = tcp_write_queue_tail(sk);

465
	if (tsflags && skb) {
466
		struct skb_shared_info *shinfo = skb_shinfo(skb);
467
		struct tcp_skb_cb *tcb = TCP_SKB_CB(skb);
468

469
		sock_tx_timestamp(sk, tsflags, &shinfo->tx_flags);
470 471 472
		if (tsflags & SOF_TIMESTAMPING_TX_ACK)
			tcb->txstamp_ack = 1;
		if (tsflags & SOF_TIMESTAMPING_TX_RECORD_MASK)
473 474
			shinfo->tskey = TCP_SKB_CB(skb)->seq + skb->len - 1;
	}
475 476
}

477 478 479 480 481 482 483 484
static inline bool tcp_stream_is_readable(const struct tcp_sock *tp,
					  int target, struct sock *sk)
{
	return (tp->rcv_nxt - tp->copied_seq >= target) ||
		(sk->sk_prot->stream_memory_read ?
		sk->sk_prot->stream_memory_read(sk) : false);
}

Linus Torvalds's avatar
Linus Torvalds committed
485
/*
486 487 488 489 490
 *	Wait for a TCP event.
 *
 *	Note that we don't need to lock the socket, as the upper poll layers
 *	take care of normal races (between the test and the event) and we don't
 *	go look at any of the socket buffers directly.
Linus Torvalds's avatar
Linus Torvalds committed
491
 */
492
__poll_t tcp_poll(struct file *file, struct socket *sock, poll_table *wait)
Linus Torvalds's avatar
Linus Torvalds committed
493
{
494
	__poll_t mask;
Linus Torvalds's avatar
Linus Torvalds committed
495
	struct sock *sk = sock->sk;
496
	const struct tcp_sock *tp = tcp_sk(sk);
497
	int state;
Linus Torvalds's avatar
Linus Torvalds committed
498

499
	sock_poll_wait(file, sock, wait);
500

501
	state = inet_sk_state_load(sk);
502
	if (state == TCP_LISTEN)
503
		return inet_csk_listen_poll(sk);
Linus Torvalds's avatar
Linus Torvalds committed
504

505 506 507 508 509 510 511
	/* Socket is not locked. We are protected from async events
	 * by poll logic and correct handling of state changes
	 * made by other threads is impossible in any case.
	 */

	mask = 0;

Linus Torvalds's avatar
Linus Torvalds committed
512
	/*
513
	 * EPOLLHUP is certainly not done right. But poll() doesn't
Linus Torvalds's avatar
Linus Torvalds committed
514 515 516
	 * have a notion of HUP in just one direction, and for a
	 * socket the read side is more interesting.
	 *
517 518
	 * Some poll() documentation says that EPOLLHUP is incompatible
	 * with the EPOLLOUT/POLLWR flags, so somebody should check this
Linus Torvalds's avatar
Linus Torvalds committed
519 520 521 522 523 524
	 * all. But careful, it tends to be safer to return too many
	 * bits than too few, and you can easily break real applications
	 * if you don't tell them that something has hung up!
	 *
	 * Check-me.
	 *
525
	 * Check number 1. EPOLLHUP is _UNMASKABLE_ event (see UNIX98 and
Linus Torvalds's avatar
Linus Torvalds committed
526 527
	 * our fs/select.c). It means that after we received EOF,
	 * poll always returns immediately, making impossible poll() on write()
528
	 * in state CLOSE_WAIT. One solution is evident --- to set EPOLLHUP
Linus Torvalds's avatar
Linus Torvalds committed
529 530
	 * if and only if shutdown has been made in both directions.
	 * Actually, it is interesting to look how Solaris and DUX
531
	 * solve this dilemma. I would prefer, if EPOLLHUP were maskable,
Linus Torvalds's avatar
Linus Torvalds committed
532 533
	 * then we could set it on SND_SHUTDOWN. BTW examples given
	 * in Stevens' books assume exactly this behaviour, it explains
534
	 * why EPOLLHUP is incompatible with EPOLLOUT.	--ANK
Linus Torvalds's avatar
Linus Torvalds committed
535 536 537 538
	 *
	 * NOTE. Check for TCP_CLOSE is added. The goal is to prevent
	 * blocking on fresh not-connected or disconnected socket. --ANK
	 */
539
	if (sk->sk_shutdown == SHUTDOWN_MASK || state == TCP_CLOSE)
540
		mask |= EPOLLHUP;
Linus Torvalds's avatar
Linus Torvalds committed
541
	if (sk->sk_shutdown & RCV_SHUTDOWN)
542
		mask |= EPOLLIN | EPOLLRDNORM | EPOLLRDHUP;
Linus Torvalds's avatar
Linus Torvalds committed
543

544
	/* Connected or passive Fast Open socket? */
545 546
	if (state != TCP_SYN_SENT &&
	    (state != TCP_SYN_RECV || tp->fastopen_rsk)) {
547 548 549 550 551
		int target = sock_rcvlowat(sk, 0, INT_MAX);

		if (tp->urg_seq == tp->copied_seq &&
		    !sock_flag(sk, SOCK_URGINLINE) &&
		    tp->urg_data)
552
			target++;
553

554
		if (tcp_stream_is_readable(tp, target, sk))
555
			mask |= EPOLLIN | EPOLLRDNORM;
Linus Torvalds's avatar
Linus Torvalds committed
556 557

		if (!(sk->sk_shutdown & SEND_SHUTDOWN)) {
558
			if (sk_stream_is_writeable(sk)) {
559
				mask |= EPOLLOUT | EPOLLWRNORM;
Linus Torvalds's avatar
Linus Torvalds committed
560
			} else {  /* send SIGIO later */
561
				sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds's avatar
Linus Torvalds committed
562 563 564 565
				set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);

				/* Race breaker. If space is freed after
				 * wspace test but before the flags are set,
566 567
				 * IO signal will be lost. Memory barrier
				 * pairs with the input side.
Linus Torvalds's avatar
Linus Torvalds committed
568
				 */
569
				smp_mb__after_atomic();
570
				if (sk_stream_is_writeable(sk))
571
					mask |= EPOLLOUT | EPOLLWRNORM;
Linus Torvalds's avatar
Linus Torvalds committed
572
			}
573
		} else
574
			mask |= EPOLLOUT | EPOLLWRNORM;
Linus Torvalds's avatar
Linus Torvalds committed
575 576

		if (tp->urg_data & TCP_URG_VALID)
577
			mask |= EPOLLPRI;
578
	} else if (state == TCP_SYN_SENT && inet_sk(sk)->defer_connect) {
579
		/* Active TCP fastopen socket with defer_connect
580
		 * Return EPOLLOUT so application can call write()
581 582
		 * in order for kernel to generate SYN+data
		 */
583
		mask |= EPOLLOUT | EPOLLWRNORM;
Linus Torvalds's avatar
Linus Torvalds committed
584
	}
Tom Marshall's avatar
Tom Marshall committed
585 586
	/* This barrier is coupled with smp_wmb() in tcp_reset() */
	smp_rmb();
587
	if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
588
		mask |= EPOLLERR;
Tom Marshall's avatar
Tom Marshall committed
589

Linus Torvalds's avatar
Linus Torvalds committed
590 591
	return mask;
}
592
EXPORT_SYMBOL(tcp_poll);
Linus Torvalds's avatar
Linus Torvalds committed
593 594 595 596 597

int tcp_ioctl(struct sock *sk, int cmd, unsigned long arg)
{
	struct tcp_sock *tp = tcp_sk(sk);
	int answ;
Eric Dumazet's avatar
Eric Dumazet committed
598
	bool slow;
Linus Torvalds's avatar
Linus Torvalds committed
599 600 601 602 603 604

	switch (cmd) {
	case SIOCINQ:
		if (sk->sk_state == TCP_LISTEN)
			return -EINVAL;

Eric Dumazet's avatar
Eric Dumazet committed
605
		slow = lock_sock_fast(sk);
606
		answ = tcp_inq(sk);
Eric Dumazet's avatar
Eric Dumazet committed
607
		unlock_sock_fast(sk, slow);
Linus Torvalds's avatar
Linus Torvalds committed
608 609 610 611 612 613 614 615 616 617 618 619 620
		break;
	case SIOCATMARK:
		answ = tp->urg_data && tp->urg_seq == tp->copied_seq;
		break;
	case SIOCOUTQ:
		if (sk->sk_state == TCP_LISTEN)
			return -EINVAL;

		if ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV))
			answ = 0;
		else
			answ = tp->write_seq - tp->snd_una;
		break;
621 622 623 624 625 626 627 628 629
	case SIOCOUTQNSD:
		if (sk->sk_state == TCP_LISTEN)
			return -EINVAL;

		if ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV))
			answ = 0;
		else
			answ = tp->write_seq - tp->snd_nxt;
		break;
Linus Torvalds's avatar
Linus Torvalds committed
630 631
	default:
		return -ENOIOCTLCMD;
632
	}
Linus Torvalds's avatar
Linus Torvalds committed
633 634 635

	return put_user(answ, (int __user *)arg);
}
636
EXPORT_SYMBOL(tcp_ioctl);
Linus Torvalds's avatar
Linus Torvalds committed
637 638 639

static inline void tcp_mark_push(struct tcp_sock *tp, struct sk_buff *skb)
{
Eric Dumazet's avatar
Eric Dumazet committed
640
	TCP_SKB_CB(skb)->tcp_flags |= TCPHDR_PSH;
Linus Torvalds's avatar
Linus Torvalds committed
641 642 643
	tp->pushed_seq = tp->write_seq;
}

Eric Dumazet's avatar
Eric Dumazet committed
644
static inline bool forced_push(const struct tcp_sock *tp)
Linus Torvalds's avatar
Linus Torvalds committed
645 646 647 648
{
	return after(tp->write_seq, tp->pushed_seq + (tp->max_window >> 1));
}

649
static void skb_entail(struct sock *sk, struct sk_buff *skb)
Linus Torvalds's avatar
Linus Torvalds committed
650
{
651
	struct tcp_sock *tp = tcp_sk(sk);
652 653 654 655
	struct tcp_skb_cb *tcb = TCP_SKB_CB(skb);

	skb->csum    = 0;
	tcb->seq     = tcb->end_seq = tp->write_seq;
Eric Dumazet's avatar
Eric Dumazet committed
656
	tcb->tcp_flags = TCPHDR_ACK;
657
	tcb->sacked  = 0;
658
	__skb_header_release(skb);
659
	tcp_add_write_queue_tail(sk, skb);
660 661
	sk->sk_wmem_queued += skb->truesize;
	sk_mem_charge(sk, skb->truesize);
662
	if (tp->nonagle & TCP_NAGLE_PUSH)
663
		tp->nonagle &= ~TCP_NAGLE_PUSH;
664 665

	tcp_slow_start_after_idle_check(sk);
Linus Torvalds's avatar
Linus Torvalds committed
666 667
}

668
static inline void tcp_mark_urg(struct tcp_sock *tp, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
669
{
670
	if (flags & MSG_OOB)
Linus Torvalds's avatar
Linus Torvalds committed
671 672 673
		tp->snd_up = tp->write_seq;
}

Eric Dumazet's avatar
Eric Dumazet committed
674
/* If a not yet filled skb is pushed, do not send it if
675
 * we have data packets in Qdisc or NIC queues :
Eric Dumazet's avatar
Eric Dumazet committed
676 677 678 679
 * Because TX completion will happen shortly, it gives a chance
 * to coalesce future sendmsg() payload into this skb, without
 * need for a timer, and with no latency trade off.
 * As packets containing data payload have a bigger truesize
680 681 682
 * than pure acks (dataless) packets, the last checks prevent
 * autocorking if we only have an ACK in Qdisc/NIC queues,
 * or if TX completion was delayed after we processed ACK packet.
Eric Dumazet's avatar
Eric Dumazet committed
683 684 685
 */
static bool tcp_should_autocork(struct sock *sk, struct sk_buff *skb,
				int size_goal)
Linus Torvalds's avatar
Linus Torvalds committed
686
{
Eric Dumazet's avatar
Eric Dumazet committed
687
	return skb->len < size_goal &&
688
	       sock_net(sk)->ipv4.sysctl_tcp_autocorking &&
Eric Dumazet's avatar
Eric Dumazet committed
689
	       !tcp_rtx_queue_empty(sk) &&
690
	       refcount_read(&sk->sk_wmem_alloc) > skb->truesize;
Eric Dumazet's avatar
Eric Dumazet committed
691 692 693 694 695 696 697
}

static void tcp_push(struct sock *sk, int flags, int mss_now,
		     int nonagle, int size_goal)
{
	struct tcp_sock *tp = tcp_sk(sk);
	struct sk_buff *skb;
698

Eric Dumazet's avatar
Eric Dumazet committed
699
	skb = tcp_write_queue_tail(sk);
700 701
	if (!skb)
		return;
Eric Dumazet's avatar
Eric Dumazet committed
702 703 704 705 706 707 708 709
	if (!(flags & MSG_MORE) || forced_push(tp))
		tcp_mark_push(tp, skb);

	tcp_mark_urg(tp, flags);

	if (tcp_should_autocork(sk, skb, size_goal)) {

		/* avoid atomic op if TSQ_THROTTLED bit is already set */
710
		if (!test_bit(TSQ_THROTTLED, &sk->sk_tsq_flags)) {
Eric Dumazet's avatar
Eric Dumazet committed
711
			NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPAUTOCORKING);
712
			set_bit(TSQ_THROTTLED, &sk->sk_tsq_flags);
Eric Dumazet's avatar
Eric Dumazet committed
713
		}
714 715 716
		/* It is possible TX completion already happened
		 * before we set TSQ_THROTTLED.
		 */
717
		if (refcount_read(&sk->sk_wmem_alloc) > skb->truesize)
718
			return;
Linus Torvalds's avatar
Linus Torvalds committed
719
	}
Eric Dumazet's avatar
Eric Dumazet committed
720 721 722 723 724

	if (flags & MSG_MORE)
		nonagle = TCP_NAGLE_CORK;

	__tcp_push_pending_frames(sk, mss_now, nonagle);
Linus Torvalds's avatar
Linus Torvalds committed
725 726
}

727 728
static int tcp_splice_data_recv(read_descriptor_t *rd_desc, struct sk_buff *skb,
				unsigned int offset, size_t len)
Jens Axboe's avatar
Jens Axboe committed
729 730
{
	struct tcp_splice_state *tss = rd_desc->arg.data;
731
	int ret;
Jens Axboe's avatar
Jens Axboe committed
732

733
	ret = skb_splice_bits(skb, skb->sk, offset, tss->pipe,
734
			      min(rd_desc->count, len), tss->flags);
735 736 737
	if (ret > 0)
		rd_desc->count -= ret;
	return ret;
Jens Axboe's avatar
Jens Axboe committed
738 739 740 741 742 743 744
}

static int __tcp_splice_read(struct sock *sk, struct tcp_splice_state *tss)
{
	/* Store TCP splice context information in read_descriptor_t. */
	read_descriptor_t rd_desc = {
		.arg.data = tss,
745
		.count	  = tss->len,
Jens Axboe's avatar
Jens Axboe committed
746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776
	};

	return tcp_read_sock(sk, &rd_desc, tcp_splice_data_recv);
}

/**
 *  tcp_splice_read - splice data from TCP socket to a pipe
 * @sock:	socket to splice from
 * @ppos:	position (not valid)
 * @pipe:	pipe to splice to
 * @len:	number of bytes to splice
 * @flags:	splice modifier flags
 *
 * Description:
 *    Will read pages from given socket and fill them into a pipe.
 *
 **/
ssize_t tcp_splice_read(struct socket *sock, loff_t *ppos,
			struct pipe_inode_info *pipe, size_t len,
			unsigned int flags)
{
	struct sock *sk = sock->sk;
	struct tcp_splice_state tss = {
		.pipe = pipe,
		.len = len,
		.flags = flags,
	};
	long timeo;
	ssize_t spliced;
	int ret;

777
	sock_rps_record_flow(sk);
Jens Axboe's avatar
Jens Axboe committed
778 779 780 781 782 783 784 785 786 787
	/*
	 * We can't seek on a socket input
	 */
	if (unlikely(*ppos))
		return -ESPIPE;

	ret = spliced = 0;

	lock_sock(sk);

788
	timeo = sock_rcvtimeo(sk, sock->file->f_flags & O_NONBLOCK);
Jens Axboe's avatar
Jens Axboe committed
789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808
	while (tss.len) {
		ret = __tcp_splice_read(sk, &tss);
		if (ret < 0)
			break;
		else if (!ret) {
			if (spliced)
				break;
			if (sock_flag(sk, SOCK_DONE))
				break;
			if (sk->sk_err) {
				ret = sock_error(sk);
				break;
			}
			if (sk->sk_shutdown & RCV_SHUTDOWN)
				break;
			if (sk->sk_state == TCP_CLOSE) {
				/*
				 * This occurs when user tries to read
				 * from never connected socket.
				 */
809
				ret = -ENOTCONN;
Jens Axboe's avatar
Jens Axboe committed
810 811 812 813 814 815
				break;
			}
			if (!timeo) {
				ret = -EAGAIN;
				break;
			}
816 817 818 819 820 821
			/* if __tcp_splice_read() got nothing while we have
			 * an skb in receive queue, we do not want to loop.
			 * This might happen with URG data.
			 */
			if (!skb_queue_empty(&sk->sk_receive_queue))
				break;
822
			sk_wait_data(sk, &timeo, NULL);
Jens Axboe's avatar
Jens Axboe committed
823 824 825 826 827 828 829 830 831
			if (signal_pending(current)) {
				ret = sock_intr_errno(timeo);
				break;
			}
			continue;
		}
		tss.len -= ret;
		spliced += ret;

832 833
		if (!timeo)
			break;
Jens Axboe's avatar
Jens Axboe committed
834 835 836 837
		release_sock(sk);
		lock_sock(sk);

		if (sk->sk_err || sk->sk_state == TCP_CLOSE ||
838
		    (sk->sk_shutdown & RCV_SHUTDOWN) ||
Jens Axboe's avatar
Jens Axboe committed
839 840 841 842 843 844 845 846 847 848 849
		    signal_pending(current))
			break;
	}

	release_sock(sk);

	if (spliced)
		return spliced;

	return ret;
}
850
EXPORT_SYMBOL(tcp_splice_read);
Jens Axboe's avatar
Jens Axboe committed
851

852 853
struct sk_buff *sk_stream_alloc_skb(struct sock *sk, int size, gfp_t gfp,
				    bool force_schedule)
854 855 856
{
	struct sk_buff *skb;

857 858
	if (likely(!size)) {
		skb = sk->sk_tx_skb_cache;
859
		if (skb) {
860
			skb->truesize = SKB_TRUESIZE(skb_end_offset(skb));
861 862 863
			sk->sk_tx_skb_cache = NULL;
			pskb_trim(skb, 0);
			INIT_LIST_HEAD(&skb->tcp_tsorted_anchor);
864 865
			skb_shinfo(skb)->tx_flags = 0;
			memset(TCP_SKB_CB(skb), 0, sizeof(struct tcp_skb_cb));
866 867 868
			return skb;
		}
	}
869 870 871
	/* The TCP header must be at least 32-bit aligned.  */
	size = ALIGN(size, 4);

872 873 874
	if (unlikely(tcp_under_memory_pressure(sk)))
		sk_mem_reclaim_partial(sk);

875
	skb = alloc_skb_fclone(size + sk->sk_prot->max_header, gfp);
876
	if (likely(skb)) {
877
		bool mem_scheduled;
878

879 880
		if (force_schedule) {
			mem_scheduled = true;
881 882
			sk_forced_mem_schedule(sk, skb->truesize);
		} else {
883
			mem_scheduled = sk_wmem_schedule(sk, skb->truesize);
884
		}
885
		if (likely(mem_scheduled)) {
886
			skb_reserve(skb, sk->sk_prot->max_header);
887 888 889 890
			/*
			 * Make sure that we have exactly size bytes
			 * available to the caller, no more, no less.
			 */
Eric Dumazet's avatar
Eric Dumazet committed
891
			skb->reserved_tailroom = skb->end - skb->tail - size;
892
			INIT_LIST_HEAD(&skb->tcp_tsorted_anchor);
893 894 895 896
			return skb;
		}
		__kfree_skb(skb);
	} else {
897
		sk->sk_prot->enter_memory_pressure(sk);
898 899 900 901 902
		sk_stream_moderate_sndbuf(sk);
	}
	return NULL;
}

903 904 905 906
static unsigned int tcp_xmit_size_goal(struct sock *sk, u32 mss_now,
				       int large_allowed)
{
	struct tcp_sock *tp = tcp_sk(sk);
907
	u32 new_size_goal, size_goal;
Eric Dumazet's avatar
Eric Dumazet committed
908

909
	if (!large_allowed)
Eric Dumazet's avatar
Eric Dumazet committed
910 911
		return mss_now;

912 913
	/* Note : tcp_tso_autosize() will eventually split this later */
	new_size_goal = sk->sk_gso_max_size - 1 - MAX_TCP_HEADER;
Eric Dumazet's avatar
Eric Dumazet committed
914 915 916 917 918 919 920 921 922
	new_size_goal = tcp_bound_to_half_wnd(tp, new_size_goal);

	/* We try hard to avoid divides here */
	size_goal = tp->gso_segs * mss_now;
	if (unlikely(new_size_goal < size_goal ||
		     new_size_goal >= size_goal + mss_now)) {
		tp->gso_segs = min_t(u16, new_size_goal / mss_now,
				     sk->sk_gso_max_segs);
		size_goal = tp->gso_segs * mss_now;
923 924
	}

Eric Dumazet's avatar
Eric Dumazet committed
925
	return max(size_goal, mss_now);
926 927 928 929 930 931 932 933 934 935 936 937
}

static int tcp_send_mss(struct sock *sk, int *size_goal, int flags)
{
	int mss_now;

	mss_now = tcp_current_mss(sk);
	*size_goal = tcp_xmit_size_goal(sk, mss_now, !(flags & MSG_OOB));

	return mss_now;
}

938 939
ssize_t do_tcp_sendpages(struct sock *sk, struct page *page, int offset,
			 size_t size, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
940 941
{
	struct tcp_sock *tp = tcp_sk(sk);
942
	int mss_now, size_goal;
Linus Torvalds's avatar
Linus Torvalds committed
943 944 945 946
	int err;
	ssize_t copied;
	long timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);

947 948 949 950
	if (IS_ENABLED(CONFIG_DEBUG_VM) &&
	    WARN_ONCE(PageSlab(page), "page must not be a Slab one"))
		return -EINVAL;

951 952 953 954 955 956
	/* Wait for a connection to finish. One exception is TCP Fast Open
	 * (passive side) where data is allowed to be sent before a connection
	 * is fully established.
	 */
	if (((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)) &&
	    !tcp_passive_fastopen(sk)) {
957 958
		err = sk_stream_wait_connect(sk, &timeo);
		if (err != 0)
Linus Torvalds's avatar
Linus Torvalds committed
959
			goto out_err;
960
	}
Linus Torvalds's avatar
Linus Torvalds committed
961

962
	sk_clear_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds's avatar
Linus Torvalds committed
963

964
	mss_now = tcp_send_mss(sk, &size_goal, flags);
Linus Torvalds's avatar
Linus Torvalds committed
965 966 967 968
	copied = 0;

	err = -EPIPE;
	if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
969
		goto out_err;
Linus Torvalds's avatar
Linus Torvalds committed
970

971
	while (size > 0) {
972
		struct sk_buff *skb = tcp_write_queue_tail(sk);
973 974
		int copy, i;
		bool can_coalesce;
Linus Torvalds's avatar
Linus Torvalds committed
975

976
		if (!skb || (copy = size_goal - skb->len) <= 0 ||
977
		    !tcp_skb_can_collapse_to(skb)) {
Linus Torvalds's avatar
Linus Torvalds committed
978 979 980 981
new_segment:
			if (!sk_stream_memory_free(sk))
				goto wait_for_sndbuf;

982
			skb = sk_stream_alloc_skb(sk, 0, sk->sk_allocation,
983
					tcp_rtx_and_write_queues_empty(sk));
Linus Torvalds's avatar
Linus Torvalds committed
984 985 986
			if (!skb)
				goto wait_for_memory;

987
			skb_entail(sk, skb);
988
			copy = size_goal;
Linus Torvalds's avatar
Linus Torvalds committed
989 990 991 992 993 994 995
		}

		if (copy > size)
			copy = size;

		i = skb_shinfo(skb)->nr_frags;
		can_coalesce = skb_can_coalesce(skb, i, page, offset);
996
		if (!can_coalesce && i >= sysctl_max_skb_frags) {
Linus Torvalds's avatar
Linus Torvalds committed
997 998 999
			tcp_mark_push(tp, skb);
			goto new_segment;
		}
1000
		if (!sk_wmem_schedule(sk, copy))
Linus Torvalds's avatar
Linus Torvalds committed
1001
			goto wait_for_memory;
1002

Linus Torvalds's avatar
Linus Torvalds committed
1003
		if (can_coalesce) {
1004
			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
Linus Torvalds's avatar
Linus Torvalds committed
1005 1006 1007 1008
		} else {
			get_page(page);
			skb_fill_page_desc(skb, i, page, offset, copy);
		}
1009 1010 1011

		if (!(flags & MSG_NO_SHARED_FRAGS))
			skb_shinfo(skb)->tx_flags |= SKBTX_SHARED_FRAG;
1012

Linus Torvalds's avatar
Linus Torvalds committed
1013 1014 1015 1016
		skb->len += copy;
		skb->data_len += copy;
		skb->truesize += copy;
		sk->sk_wmem_queued += copy;
1017
		sk_mem_charge(sk, copy);
1018
		skb->ip_summed = CHECKSUM_PARTIAL;
Linus Torvalds's avatar
Linus Torvalds committed
1019 1020
		tp->write_seq += copy;
		TCP_SKB_CB(skb)->end_seq += copy;
1021
		tcp_skb_pcount_set(skb, 0);
Linus Torvalds's avatar
Linus Torvalds committed
1022 1023

		if (!copied)
Eric Dumazet's avatar
Eric Dumazet committed
1024
			TCP_SKB_CB(skb)->tcp_flags &= ~TCPHDR_PSH;
Linus Torvalds's avatar
Linus Torvalds committed
1025 1026

		copied += copy;
1027
		offset += copy;
1028
		size -= copy;
1029
		if (!size)
Linus Torvalds's avatar
Linus Torvalds committed
1030 1031
			goto out;

1032
		if (skb->len < size_goal || (flags & MSG_OOB))
Linus Torvalds's avatar
Linus Torvalds committed
1033 1034 1035 1036
			continue;

		if (forced_push(tp)) {
			tcp_mark_push(tp, skb);
1037
			__tcp_push_pending_frames(sk, mss_now, TCP_NAGLE_PUSH);
1038
		} else if (skb == tcp_send_head(sk))
Linus Torvalds's avatar
Linus Torvalds committed
1039 1040 1041 1042 1043 1044
			tcp_push_one(sk, mss_now);
		continue;

wait_for_sndbuf:
		set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
wait_for_memory:
Eric Dumazet's avatar
Eric Dumazet committed
1045 1046
		tcp_push(sk, flags & ~MSG_MORE, mss_now,
			 TCP_NAGLE_PUSH, size_goal);
Linus Torvalds's avatar
Linus Torvalds committed
1047

1048 1049
		err = sk_stream_wait_memory(sk, &timeo);
		if (err != 0)
Linus Torvalds's avatar
Linus Torvalds committed
1050 1051
			goto do_error;

1052
		mss_now = tcp_send_mss(sk, &size_goal, flags);
Linus Torvalds's avatar
Linus Torvalds committed
1053 1054 1055
	}

out:
1056
	if (copied) {
1057
		tcp_tx_timestamp(sk, sk->sk_tsflags);
1058 1059 1060
		if (!(flags & MSG_SENDPAGE_NOTLAST))
			tcp_push(sk, flags, mss_now, tp->nonagle, size_goal);
	}
Linus Torvalds's avatar
Linus Torvalds committed
1061 1062 1063 1064 1065 1066
	return copied;

do_error:
	if (copied)
		goto out;
out_err:
1067
	/* make sure we wake any epoll edge trigger waiter */
1068 1069
	if (unlikely(skb_queue_len(&sk->sk_write_queue) == 0 &&
		     err == -EAGAIN)) {
1070
		sk->sk_write_space(sk);
1071 1072
		tcp_chrono_stop(sk, TCP_CHRONO_SNDBUF_LIMITED);
	}
Linus Torvalds's avatar
Linus Torvalds committed
1073 1074
	return sk_stream_error(sk, flags, err);
}
1075
EXPORT_SYMBOL_GPL(do_tcp_sendpages);
Linus Torvalds's avatar
Linus Torvalds committed
1076

1077 1078
int tcp_sendpage_locked(struct sock *sk, struct page *page, int offset,
			size_t size, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
1079
{
1080
	if (!(sk->sk_route_caps & NETIF_F_SG))
1081
		return sock_no_sendpage_locked(sk, page, offset, size, flags);
Linus Torvalds's avatar
Linus Torvalds committed
1082

1083 1084
	tcp_rate_check_app_limited(sk);  /* is sending application-limited? */

1085 1086
	return do_tcp_sendpages(sk, page, offset, size, flags);
}
1087
EXPORT_SYMBOL_GPL(tcp_sendpage_locked);
1088 1089 1090 1091 1092 1093 1094 1095

int tcp_sendpage(struct sock *sk, struct page *page, int offset,
		 size_t size, int flags)
{
	int ret;

	lock_sock(sk);
	ret = tcp_sendpage_locked(sk, page, offset, size, flags);
Linus Torvalds's avatar
Linus Torvalds committed
1096
	release_sock(sk);
1097 1098

	return ret;
Linus Torvalds's avatar
Linus Torvalds committed
1099
}
1100
EXPORT_SYMBOL(tcp_sendpage);
Linus Torvalds's avatar
Linus Torvalds committed
1101

1102 1103
void tcp_free_fastopen_req(struct tcp_sock *tp)
{
1104
	if (tp->fastopen_req) {
1105 1106 1107 1108 1109
		kfree(tp->fastopen_req);
		tp->fastopen_req = NULL;
	}
}

1110
static int tcp_sendmsg_fastopen(struct sock *sk, struct msghdr *msg,
1111 1112
				int *copied, size_t size,
				struct ubuf_info *uarg)
1113 1114
{
	struct tcp_sock *tp = tcp_sk(sk);
1115
	struct inet_sock *inet = inet_sk(sk);
1116
	struct sockaddr *uaddr = msg->msg_name;
1117 1118
	int err, flags;

1119
	if (!(sock_net(sk)->ipv4.sysctl_tcp_fastopen & TFO_CLIENT_ENABLE) ||
1120 1121
	    (uaddr && msg->msg_namelen >= sizeof(uaddr->sa_family) &&
	     uaddr->sa_family == AF_UNSPEC))
1122
		return -EOPNOTSUPP;
1123
	if (tp->fastopen_req)
1124 1125 1126 1127
		return -EALREADY; /* Another Fast Open is in progress */

	tp->fastopen_req = kzalloc(sizeof(struct tcp_fastopen_request),
				   sk->sk_allocation);
1128
	if (unlikely(!tp->fastopen_req))
1129 1130
		return -ENOBUFS;
	tp->fastopen_req->data = msg;
1131
	tp->fastopen_req->size = size;
1132
	tp->fastopen_req->uarg = uarg;
1133

1134 1135 1136 1137 1138 1139 1140 1141 1142
	if (inet->defer_connect) {
		err = tcp_connect(sk);
		/* Same failure procedure as in tcp_v4/6_connect */
		if (err) {
			tcp_set_state(sk, TCP_CLOSE);
			inet->inet_dport = 0;
			sk->sk_route_caps = 0;
		}
	}
1143
	flags = (msg->msg_flags & MSG_DONTWAIT) ? O_NONBLOCK : 0;
1144
	err = __inet_stream_connect(sk->sk_socket, uaddr,
1145
				    msg->msg_namelen, flags, 1);
1146 1147 1148 1149 1150 1151 1152 1153
	/* fastopen_req could already be freed in __inet_stream_connect
	 * if the connection times out or gets rst
	 */
	if (tp->fastopen_req) {
		*copied = tp->fastopen_req->copied;
		tcp_free_fastopen_req(tp);
		inet->defer_connect = 0;
	}
1154 1155 1156
	return err;
}

1157
int tcp_sendmsg_locked(struct sock *sk, struct msghdr *msg, size_t size)
Linus Torvalds's avatar
Linus Torvalds committed
1158 1159
{
	struct tcp_sock *tp = tcp_sk(sk);
1160
	struct ubuf_info *uarg = NULL;
Linus Torvalds's avatar
Linus Torvalds committed
1161
	struct sk_buff *skb;
1162
	struct sockcm_cookie sockc;
1163 1164
	int flags, err, copied = 0;
	int mss_now = 0, size_goal, copied_syn = 0;
1165
	bool process_backlog = false;
1166
	bool zc = false;
Linus Torvalds's avatar
Linus Torvalds committed
1167 1168 1169
	long timeo;

	flags = msg->msg_flags;
1170

1171
	if (flags & MSG_ZEROCOPY && size && sock_flag(sk, SOCK_ZEROCOPY)) {
1172
		skb = tcp_write_queue_tail(sk);
1173 1174 1175 1176 1177 1178
		uarg = sock_zerocopy_realloc(sk, size, skb_zcopy(skb));
		if (!uarg) {
			err = -ENOBUFS;
			goto out_err;
		}

1179
		zc = sk->sk_route_caps & NETIF_F_SG;
1180
		if (!zc)
1181 1182 1183
			uarg->zerocopy = 0;
	}

1184 1185
	if (unlikely(flags & MSG_FASTOPEN || inet_sk(sk)->defer_connect) &&
	    !tp->repair) {
1186
		err = tcp_sendmsg_fastopen(sk, msg, &copied_syn, size, uarg);
1187 1188 1189 1190 1191 1192
		if (err == -EINPROGRESS && copied_syn > 0)
			goto out;
		else if (err)
			goto out_err;
	}

Linus Torvalds's avatar
Linus Torvalds committed
1193 1194
	timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);

1195 1196
	tcp_rate_check_app_limited(sk);  /* is sending application-limited? */

1197 1198 1199 1200 1201 1202
	/* Wait for a connection to finish. One exception is TCP Fast Open
	 * (passive side) where data is allowed to be sent before a connection
	 * is fully established.
	 */
	if (((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT)) &&
	    !tcp_passive_fastopen(sk)) {
1203 1204
		err = sk_stream_wait_connect(sk, &timeo);
		if (err != 0)
1205
			goto do_error;
1206
	}
Linus Torvalds's avatar
Linus Torvalds committed
1207

Pavel Emelyanov's avatar
Pavel Emelyanov committed
1208 1209 1210
	if (unlikely(tp->repair)) {
		if (tp->repair_queue == TCP_RECV_QUEUE) {
			copied = tcp_send_rcvq(sk, msg, size);
1211
			goto out_nopush;
Pavel Emelyanov's avatar
Pavel Emelyanov committed
1212 1213 1214 1215 1216 1217 1218 1219 1220
		}

		err = -EINVAL;
		if (tp->repair_queue == TCP_NO_QUEUE)
			goto out_err;

		/* 'common' sending to sendq */
	}

1221
	sockcm_init(&sockc, sk);
1222 1223 1224 1225 1226 1227 1228 1229
	if (msg->msg_controllen) {
		err = sock_cmsg_send(sk, msg, &sockc);
		if (unlikely(err)) {
			err = -EINVAL;
			goto out_err;
		}
	}

Linus Torvalds's avatar
Linus Torvalds committed
1230
	/* This should be in poll */
1231
	sk_clear_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds's avatar
Linus Torvalds committed
1232 1233 1234 1235

	/* Ok commence sending. */
	copied = 0;

1236 1237 1238
restart:
	mss_now = tcp_send_mss(sk, &size_goal, flags);

Linus Torvalds's avatar
Linus Torvalds committed
1239 1240
	err = -EPIPE;
	if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
1241
		goto do_error;
Linus Torvalds's avatar
Linus Torvalds committed
1242

Al Viro's avatar
Al Viro committed
1243
	while (msg_data_left(msg)) {
1244
		int copy = 0;
Linus Torvalds's avatar
Linus Torvalds committed
1245

1246
		skb = tcp_write_queue_tail(sk);
1247 1248
		if (skb)
			copy = size_goal - skb->len;
Linus Torvalds's avatar
Linus Torvalds committed
1249

1250
		if (copy <= 0 || !tcp_skb_can_collapse_to(skb)) {
1251 1252
			bool first_skb;

Linus Torvalds's avatar
Linus Torvalds committed
1253
new_segment:
1254 1255
			if (!sk_stream_memory_free(sk))
				goto wait_for_sndbuf;
Linus Torvalds's avatar
Linus Torvalds committed
1256

1257 1258
			if (process_backlog && sk_flush_backlog(sk)) {
				process_backlog = false;
1259
				goto restart;
1260
			}
1261
			first_skb = tcp_rtx_and_write_queues_empty(sk);
1262
			skb = sk_stream_alloc_skb(sk, 0, sk->sk_allocation,
1263
						  first_skb);
1264 1265
			if (!skb)
				goto wait_for_memory;
Linus Torvalds's avatar
Linus Torvalds committed
1266

1267
			process_backlog = true;
1268
			skb->ip_summed = CHECKSUM_PARTIAL;
Linus Torvalds's avatar
Linus Torvalds committed
1269

1270 1271
			skb_entail(sk, skb);
			copy = size_goal;
1272

1273
			/* All packets are restored as if they have
1274
			 * already been sent. skb_mstamp_ns isn't set to
1275 1276 1277 1278 1279
			 * avoid wrong rtt estimation.
			 */
			if (tp->repair)
				TCP_SKB_CB(skb)->sacked |= TCPCB_REPAIRED;
		}
Linus Torvalds's avatar
Linus Torvalds committed
1280

1281
		/* Try to append data to the end of skb. */
Al Viro's avatar
Al Viro committed
1282 1283
		if (copy > msg_data_left(msg))
			copy = msg_data_left(msg);
1284 1285

		/* Where to copy to? */
1286
		if (skb_availroom(skb) > 0 && !zc) {
1287 1288 1289 1290 1291
			/* We have some space in skb head. Superb! */
			copy = min_t(int, copy, skb_availroom(skb));
			err = skb_add_data_nocache(sk, skb, &msg->msg_iter, copy);
			if (err)
				goto do_fault;
1292
		} else if (!zc) {
1293 1294 1295 1296 1297 1298
			bool merge = true;
			int i = skb_shinfo(skb)->nr_frags;
			struct page_frag *pfrag = sk_page_frag(sk);

			if (!sk_page_frag_refill(sk, pfrag))
				goto wait_for_memory;
1299

1300 1301
			if (!skb_can_coalesce(skb, i, pfrag->page,
					      pfrag->offset)) {
1302
				if (i >= sysctl_max_skb_frags) {
1303 1304
					tcp_mark_push(tp, skb);
					goto new_segment;
Linus Torvalds's avatar
Linus Torvalds committed
1305
				}
1306
				merge = false;
Linus Torvalds's avatar
Linus Torvalds committed
1307 1308
			}

1309 1310 1311 1312
			copy = min_t(int, copy, pfrag->size - pfrag->offset);

			if (!sk_wmem_schedule(sk, copy))
				goto wait_for_memory;
Linus Torvalds's avatar
Linus Torvalds committed
1313

1314 1315 1316 1317 1318 1319
			err = skb_copy_to_page_nocache(sk, &msg->msg_iter, skb,
						       pfrag->page,
						       pfrag->offset,
						       copy);
			if (err)
				goto do_error;
Linus Torvalds's avatar
Linus Torvalds committed
1320

1321 1322 1323 1324 1325 1326
			/* Update the skb. */
			if (merge) {
				skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
			} else {
				skb_fill_page_desc(skb, i, pfrag->page,
						   pfrag->offset, copy);
1327
				page_ref_inc(pfrag->page);
1328
			}
1329
			pfrag->offset += copy;
1330 1331
		} else {
			err = skb_zerocopy_iter_stream(sk, skb, msg, copy, uarg);
1332 1333
			if (err == -EMSGSIZE || err == -EEXIST) {
				tcp_mark_push(tp, skb);
1334
				goto new_segment;
1335
			}
1336 1337 1338
			if (err < 0)
				goto do_error;
			copy = err;
1339 1340 1341 1342 1343 1344 1345 1346
		}

		if (!copied)
			TCP_SKB_CB(skb)->tcp_flags &= ~TCPHDR_PSH;

		tp->write_seq += copy;
		TCP_SKB_CB(skb)->end_seq += copy;
		tcp_skb_pcount_set(skb, 0);
Linus Torvalds's avatar
Linus Torvalds committed
1347

1348
		copied += copy;
Al Viro's avatar
Al Viro committed
1349
		if (!msg_data_left(msg)) {
1350 1351
			if (unlikely(flags & MSG_EOR))
				TCP_SKB_CB(skb)->eor = 1;
1352 1353
			goto out;
		}
Linus Torvalds's avatar
Linus Torvalds committed
1354

1355
		if (skb->len < size_goal || (flags & MSG_OOB) || unlikely(tp->repair))
Linus Torvalds's avatar
Linus Torvalds committed
1356 1357
			continue;

1358 1359 1360 1361 1362 1363 1364
		if (forced_push(tp)) {
			tcp_mark_push(tp, skb);
			__tcp_push_pending_frames(sk, mss_now, TCP_NAGLE_PUSH);
		} else if (skb == tcp_send_head(sk))
			tcp_push_one(sk, mss_now);
		continue;

Linus Torvalds's avatar
Linus Torvalds committed
1365
wait_for_sndbuf:
1366
		set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
Linus Torvalds's avatar
Linus Torvalds committed
1367
wait_for_memory:
1368 1369 1370
		if (copied)
			tcp_push(sk, flags & ~MSG_MORE, mss_now,
				 TCP_NAGLE_PUSH, size_goal);
Linus Torvalds's avatar
Linus Torvalds committed
1371

1372 1373
		err = sk_stream_wait_memory(sk, &timeo);
		if (err != 0)
1374
			goto do_error;
Linus Torvalds's avatar
Linus Torvalds committed
1375

1376
		mss_now = tcp_send_mss(sk, &size_goal, flags);
Linus Torvalds's avatar
Linus Torvalds committed
1377 1378 1379
	}

out:
1380
	if (copied) {
1381
		tcp_tx_timestamp(sk, sockc.tsflags);
Eric Dumazet's avatar
Eric Dumazet committed
1382
		tcp_push(sk, flags, mss_now, tp->nonagle, size_goal);
1383
	}
1384
out_nopush:
1385
	sock_zerocopy_put(uarg);
1386
	return copied + copied_syn;
Linus Torvalds's avatar
Linus Torvalds committed
1387 1388 1389

do_fault:
	if (!skb->len) {
1390 1391 1392 1393
		tcp_unlink_write_queue(skb, sk);
		/* It is the one place in all of TCP, except connection
		 * reset, where we can be unlinking the send_head.
		 */
1394 1395
		if (tcp_write_queue_empty(sk))
			tcp_chrono_stop(sk, TCP_CHRONO_BUSY);
1396
		sk_wmem_free_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1397 1398 1399
	}

do_error:
1400
	if (copied + copied_syn)
Linus Torvalds's avatar
Linus Torvalds committed
1401 1402
		goto out;
out_err:
1403
	sock_zerocopy_put_abort(uarg, true);
Linus Torvalds's avatar
Linus Torvalds committed
1404
	err = sk_stream_error(sk, flags, err);
1405
	/* make sure we wake any epoll edge trigger waiter */
1406 1407
	if (unlikely(skb_queue_len(&sk->sk_write_queue) == 0 &&
		     err == -EAGAIN)) {
1408
		sk->sk_write_space(sk);
1409 1410
		tcp_chrono_stop(sk, TCP_CHRONO_SNDBUF_LIMITED);
	}
Linus Torvalds's avatar
Linus Torvalds committed
1411 1412
	return err;
}
1413
EXPORT_SYMBOL_GPL(tcp_sendmsg_locked);
1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424

int tcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t size)
{
	int ret;

	lock_sock(sk);
	ret = tcp_sendmsg_locked(sk, msg, size);
	release_sock(sk);

	return ret;
}
1425
EXPORT_SYMBOL(tcp_sendmsg);
Linus Torvalds's avatar
Linus Torvalds committed
1426 1427 1428 1429 1430 1431

/*
 *	Handle reading urgent data. BSD has very simple semantics for
 *	this, no blocking and very strange errors 8)
 */

1432
static int tcp_recv_urg(struct sock *sk, struct msghdr *msg, int len, int flags)
Linus Torvalds's avatar
Linus Torvalds committed
1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455
{
	struct tcp_sock *tp = tcp_sk(sk);

	/* No URG data to read. */
	if (sock_flag(sk, SOCK_URGINLINE) || !tp->urg_data ||
	    tp->urg_data == TCP_URG_READ)
		return -EINVAL;	/* Yes this is right ! */

	if (sk->sk_state == TCP_CLOSE && !sock_flag(sk, SOCK_DONE))
		return -ENOTCONN;

	if (tp->urg_data & TCP_URG_VALID) {
		int err = 0;
		char c = tp->urg_data;

		if (!(flags & MSG_PEEK))
			tp->urg_data = TCP_URG_READ;

		/* Read urgent data. */
		msg->msg_flags |= MSG_OOB;

		if (len > 0) {
			if (!(flags & MSG_TRUNC))
Al Viro's avatar
Al Viro committed
1456
				err = memcpy_to_msg(msg, &c, 1);
Linus Torvalds's avatar
Linus Torvalds committed
1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475
			len = 1;
		} else
			msg->msg_flags |= MSG_TRUNC;

		return err ? -EFAULT : len;
	}

	if (sk->sk_state == TCP_CLOSE || (sk->sk_shutdown & RCV_SHUTDOWN))
		return 0;

	/* Fixed the recv(..., MSG_OOB) behaviour.  BSD docs and
	 * the available implementations agree in this case:
	 * this call should never block, independent of the
	 * blocking state of the socket.
	 * Mike <pall@rz.uni-karlsruhe.de>
	 */
	return -EAGAIN;
}

Pavel Emelyanov's avatar
Pavel Emelyanov committed
1476 1477 1478 1479 1480 1481 1482
static int tcp_peek_sndq(struct sock *sk, struct msghdr *msg, int len)
{
	struct sk_buff *skb;
	int copied = 0, err = 0;

	/* XXX -- need to support SO_PEEK_OFF */

1483 1484 1485 1486 1487 1488 1489
	skb_rbtree_walk(skb, &sk->tcp_rtx_queue) {
		err = skb_copy_datagram_msg(skb, 0, msg, skb->len);
		if (err)
			return err;
		copied += skb->len;
	}

Pavel Emelyanov's avatar
Pavel Emelyanov committed
1490
	skb_queue_walk(&sk->sk_write_queue, skb) {
1491
		err = skb_copy_datagram_msg(skb, 0, msg, skb->len);
Pavel Emelyanov's avatar
Pavel Emelyanov committed
1492 1493 1494 1495 1496 1497 1498 1499 1500
		if (err)
			break;

		copied += skb->len;
	}

	return err ?: copied;
}

Linus Torvalds's avatar
Linus Torvalds committed
1501 1502 1503 1504 1505 1506
/* Clean up the receive buffer for full frames taken by the user,
 * then send an ACK if necessary.  COPIED is the number of bytes
 * tcp_recvmsg has given to the user so far, it speeds up the
 * calculation of whether or not we must ACK for the sake of
 * a window update.
 */
1507
static void tcp_cleanup_rbuf(struct sock *sk, int copied)
Linus Torvalds's avatar
Linus Torvalds committed
1508 1509
{
	struct tcp_sock *tp = tcp_sk(sk);
Eric Dumazet's avatar
Eric Dumazet committed
1510
	bool time_to_ack = false;
Linus Torvalds's avatar
Linus Torvalds committed
1511 1512 1513

	struct sk_buff *skb = skb_peek(&sk->sk_receive_queue);

1514
	WARN(skb && !before(tp->copied_seq, TCP_SKB_CB(skb)->end_seq),
1515
	     "cleanup rbuf bug: copied %X seq %X rcvnxt %X\n",
1516
	     tp->copied_seq, TCP_SKB_CB(skb)->end_seq, tp->rcv_nxt);
Linus Torvalds's avatar
Linus Torvalds committed
1517

1518 1519
	if (inet_csk_ack_scheduled(sk)) {
		const struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
1520 1521
		   /* Delayed ACKs frequently hit locked sockets during bulk
		    * receive. */
1522
		if (icsk->icsk_ack.blocked ||
Linus Torvalds's avatar
Linus Torvalds committed
1523
		    /* Once-per-two-segments ACK was not sent by tcp_input.c */
1524
		    tp->rcv_nxt - tp->rcv_wup > icsk->icsk_ack.rcv_mss ||
Linus Torvalds's avatar
Linus Torvalds committed
1525 1526 1527 1528 1529 1530
		    /*
		     * If this read emptied read buffer, we send ACK, if
		     * connection is not bidirectional, user drained
		     * receive buffer and there was a small segment
		     * in queue.
		     */
1531 1532 1533
		    (copied > 0 &&
		     ((icsk->icsk_ack.pending & ICSK_ACK_PUSHED2) ||
		      ((icsk->icsk_ack.pending & ICSK_ACK_PUSHED) &&
Wei Wang's avatar
Wei Wang committed
1534
		       !inet_csk_in_pingpong_mode(sk))) &&
1535
		      !atomic_read(&sk->sk_rmem_alloc)))
Eric Dumazet's avatar
Eric Dumazet committed
1536
			time_to_ack = true;
Linus Torvalds's avatar
Linus Torvalds committed
1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557
	}

	/* We send an ACK if we can now advertise a non-zero window
	 * which has been raised "significantly".
	 *
	 * Even if window raised up to infinity, do not send window open ACK
	 * in states, where we will not receive more. It is useless.
	 */
	if (copied > 0 && !time_to_ack && !(sk->sk_shutdown & RCV_SHUTDOWN)) {
		__u32 rcv_window_now = tcp_receive_window(tp);

		/* Optimize, __tcp_select_window() is not cheap. */
		if (2*rcv_window_now <= tp->window_clamp) {
			__u32 new_window = __tcp_select_window(sk);

			/* Send ACK now, if this read freed lots of space
			 * in our buffer. Certainly, new_window is new window.
			 * We can advertise it now, if it is not less than current one.
			 * "Lots" means "at least twice" here.
			 */
			if (new_window && new_window >= 2 * rcv_window_now)
Eric Dumazet's avatar
Eric Dumazet committed
1558
				time_to_ack = true;
Linus Torvalds's avatar
Linus Torvalds committed
1559 1560 1561 1562 1563 1564
		}
	}
	if (time_to_ack)
		tcp_send_ack(sk);
}

1565
static struct sk_buff *tcp_recv_skb(struct sock *sk, u32 seq, u32 *off)
Linus Torvalds's avatar
Linus Torvalds committed
1566 1567 1568 1569
{
	struct sk_buff *skb;
	u32 offset;

1570
	while ((skb = skb_peek(&sk->sk_receive_queue)) != NULL) {
Linus Torvalds's avatar
Linus Torvalds committed
1571
		offset = seq - TCP_SKB_CB(skb)->seq;
1572 1573
		if (unlikely(TCP_SKB_CB(skb)->tcp_flags & TCPHDR_SYN)) {
			pr_err_once("%s: found a SYN, please report !\n", __func__);
Linus Torvalds's avatar
Linus Torvalds committed
1574
			offset--;
1575
		}
1576
		if (offset < skb->len || (TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN)) {
Linus Torvalds's avatar
Linus Torvalds committed
1577 1578 1579
			*off = offset;
			return skb;
		}
1580 1581 1582 1583
		/* This looks weird, but this can happen if TCP collapsing
		 * splitted a fat GRO packet, while we released socket lock
		 * in skb_splice_bits()
		 */
Dan Williams's avatar
Dan Williams committed
1584
		sk_eat_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612
	}
	return NULL;
}

/*
 * This routine provides an alternative to tcp_recvmsg() for routines
 * that would like to handle copying from skbuffs directly in 'sendfile'
 * fashion.
 * Note:
 *	- It is assumed that the socket was locked by the caller.
 *	- The routine does not block.
 *	- At present, there is no support for reading OOB data
 *	  or for 'peeking' the socket using this routine
 *	  (although both would be easy to implement).
 */
int tcp_read_sock(struct sock *sk, read_descriptor_t *desc,
		  sk_read_actor_t recv_actor)
{
	struct sk_buff *skb;
	struct tcp_sock *tp = tcp_sk(sk);
	u32 seq = tp->copied_seq;
	u32 offset;
	int copied = 0;

	if (sk->sk_state == TCP_LISTEN)
		return -ENOTCONN;
	while ((skb = tcp_recv_skb(sk, seq, &offset)) != NULL) {
		if (offset < skb->len) {
1613 1614
			int used;
			size_t len;
Linus Torvalds's avatar
Linus Torvalds committed
1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625

			len = skb->len - offset;
			/* Stop reading if we hit a patch of urgent data */
			if (tp->urg_data) {
				u32 urg_offset = tp->urg_seq - seq;
				if (urg_offset < len)
					len = urg_offset;
				if (!len)
					break;
			}
			used = recv_actor(desc, skb, offset, len);
1626
			if (used <= 0) {
1627 1628 1629 1630
				if (!copied)
					copied = used;
				break;
			} else if (used <= len) {
Linus Torvalds's avatar
Linus Torvalds committed
1631 1632 1633 1634
				seq += used;
				copied += used;
				offset += used;
			}
1635
			/* If recv_actor drops the lock (e.g. TCP splice
1636 1637 1638 1639
			 * receive) the skb pointer might be invalid when
			 * getting here: tcp_collapse might have deleted it
			 * while aggregating skbs from the socket queue.
			 */
1640 1641
			skb = tcp_recv_skb(sk, seq - 1, &offset);
			if (!skb)
Linus Torvalds's avatar
Linus Torvalds committed
1642
				break;
1643 1644 1645 1646 1647
			/* TCP coalescing might have appended data to the skb.
			 * Try to splice more frags
			 */
			if (offset + 1 != skb->len)
				continue;
Linus Torvalds's avatar
Linus Torvalds committed
1648
		}
1649
		if (TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN) {
Dan Williams's avatar
Dan Williams committed
1650
			sk_eat_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1651 1652 1653
			++seq;
			break;
		}
Dan Williams's avatar
Dan Williams committed
1654
		sk_eat_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
1655 1656
		if (!desc->count)
			break;
1657
		tp->copied_seq = seq;
Linus Torvalds's avatar
Linus Torvalds committed
1658 1659 1660 1661 1662 1663
	}
	tp->copied_seq = seq;

	tcp_rcv_space_adjust(sk);

	/* Clean up data we have read: This will do ACK frames. */
1664 1665
	if (copied > 0) {
		tcp_recv_skb(sk, seq, &offset);
1666
		tcp_cleanup_rbuf(sk, copied);
1667
	}
Linus Torvalds's avatar
Linus Torvalds committed
1668 1669
	return copied;
}
1670
EXPORT_SYMBOL(tcp_read_sock);
Linus Torvalds's avatar
Linus Torvalds committed
1671

1672 1673 1674 1675 1676 1677
int tcp_peek_len(struct socket *sock)
{
	return tcp_inq(sock->sk);
}
EXPORT_SYMBOL(tcp_peek_len);

1678 1679 1680
/* Make sure sk_rcvbuf is big enough to satisfy SO_RCVLOWAT hint */
int tcp_set_rcvlowat(struct sock *sk, int val)
{
1681 1682 1683 1684 1685 1686 1687
	int cap;

	if (sk->sk_userlocks & SOCK_RCVBUF_LOCK)
		cap = sk->sk_rcvbuf >> 1;
	else
		cap = sock_net(sk)->ipv4.sysctl_tcp_rmem[2] >> 1;
	val = min(val, cap);
1688
	sk->sk_rcvlowat = val ? : 1;
1689 1690 1691 1692

	/* Check if we need to signal EPOLLIN right now */
	tcp_data_ready(sk);

1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704
	if (sk->sk_userlocks & SOCK_RCVBUF_LOCK)
		return 0;

	val <<= 1;
	if (val > sk->sk_rcvbuf) {
		sk->sk_rcvbuf = val;
		tcp_sk(sk)->window_clamp = tcp_win_from_space(sk, val);
	}
	return 0;
}
EXPORT_SYMBOL(tcp_set_rcvlowat);

1705 1706 1707 1708
#ifdef CONFIG_MMU
static const struct vm_operations_struct tcp_vm_ops = {
};

1709 1710 1711
int tcp_mmap(struct file *file, struct socket *sock,
	     struct vm_area_struct *vma)
{
1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731
	if (vma->vm_flags & (VM_WRITE | VM_EXEC))
		return -EPERM;
	vma->vm_flags &= ~(VM_MAYWRITE | VM_MAYEXEC);

	/* Instruct vm_insert_page() to not down_read(mmap_sem) */
	vma->vm_flags |= VM_MIXEDMAP;

	vma->vm_ops = &tcp_vm_ops;
	return 0;
}
EXPORT_SYMBOL(tcp_mmap);

static int tcp_zerocopy_receive(struct sock *sk,
				struct tcp_zerocopy_receive *zc)
{
	unsigned long address = (unsigned long)zc->address;
	const skb_frag_t *frags = NULL;
	u32 length = 0, seq, offset;
	struct vm_area_struct *vma;
	struct sk_buff *skb = NULL;
1732
	struct tcp_sock *tp;
1733
	int inq;
1734 1735
	int ret;

1736
	if (address & (PAGE_SIZE - 1) || address != zc->address)
1737 1738 1739
		return -EINVAL;

	if (sk->sk_state == TCP_LISTEN)
1740
		return -ENOTCONN;
1741 1742 1743

	sock_rps_record_flow(sk);

1744 1745 1746 1747 1748
	down_read(&current->mm->mmap_sem);

	ret = -EINVAL;
	vma = find_vma(current->mm, address);
	if (!vma || vma->vm_start > address || vma->vm_ops != &tcp_vm_ops)
1749
		goto out;
1750 1751
	zc->length = min_t(unsigned long, zc->length, vma->vm_end - address);

1752 1753
	tp = tcp_sk(sk);
	seq = tp->copied_seq;
1754 1755
	inq = tcp_inq(sk);
	zc->length = min_t(u32, zc->length, inq);
1756
	zc->length &= ~(PAGE_SIZE - 1);
1757 1758 1759 1760 1761 1762
	if (zc->length) {
		zap_page_range(vma, address, zc->length);
		zc->recv_skip_hint = 0;
	} else {
		zc->recv_skip_hint = inq;
	}
1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778
	ret = 0;
	while (length + PAGE_SIZE <= zc->length) {
		if (zc->recv_skip_hint < PAGE_SIZE) {
			if (skb) {
				skb = skb->next;
				offset = seq - TCP_SKB_CB(skb)->seq;
			} else {
				skb = tcp_recv_skb(sk, seq, &offset);
			}

			zc->recv_skip_hint = skb->len - offset;
			offset -= skb_headlen(skb);
			if ((int)offset < 0 || skb_has_frag_list(skb))
				break;
			frags = skb_shinfo(skb)->frags;
			while (offset) {
1779
				if (skb_frag_size(frags) > offset)
1780
					goto out;
1781
				offset -= skb_frag_size(frags);
1782 1783
				frags++;
			}
1784
		}
1785
		if (skb_frag_size(frags) != PAGE_SIZE || frags->page_offset) {
1786
			int remaining = zc->recv_skip_hint;
1787
			int size = skb_frag_size(frags);
1788

1789
			while (remaining && (size != PAGE_SIZE ||
1790
					     frags->page_offset)) {
1791
				remaining -= size;
1792
				frags++;
1793
				size = skb_frag_size(frags);
1794 1795
			}
			zc->recv_skip_hint -= remaining;
1796
			break;
1797
		}
1798 1799
		ret = vm_insert_page(vma, address + length,
				     skb_frag_page(frags));
1800
		if (ret)
1801 1802 1803 1804 1805
			break;
		length += PAGE_SIZE;
		seq += PAGE_SIZE;
		zc->recv_skip_hint -= PAGE_SIZE;
		frags++;
1806 1807
	}
out:
1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823
	up_read(&current->mm->mmap_sem);
	if (length) {
		tp->copied_seq = seq;
		tcp_rcv_space_adjust(sk);

		/* Clean up data we have read: This will do ACK frames. */
		tcp_recv_skb(sk, seq, &offset);
		tcp_cleanup_rbuf(sk, length);
		ret = 0;
		if (length == zc->length)
			zc->recv_skip_hint = 0;
	} else {
		if (!zc->recv_skip_hint && sock_flag(sk, SOCK_DONE))
			ret = -EIO;
	}
	zc->length = length;
1824 1825
	return ret;
}
1826
#endif
1827

1828
static void tcp_update_recv_tstamps(struct sk_buff *skb,
1829
				    struct scm_timestamping_internal *tss)
1830 1831
{
	if (skb->tstamp)
1832
		tss->ts[0] = ktime_to_timespec64(skb->tstamp);
1833
	else
1834
		tss->ts[0] = (struct timespec64) {0};
1835 1836

	if (skb_hwtstamps(skb)->hwtstamp)
1837
		tss->ts[2] = ktime_to_timespec64(skb_hwtstamps(skb)->hwtstamp);
1838
	else
1839
		tss->ts[2] = (struct timespec64) {0};
1840 1841 1842
}

/* Similar to __sock_recv_timestamp, but does not require an skb */
1843
static void tcp_recv_timestamp(struct msghdr *msg, const struct sock *sk,
1844
			       struct scm_timestamping_internal *tss)
1845
{
1846
	int new_tstamp = sock_flag(sk, SOCK_TSTAMP_NEW);
1847 1848 1849 1850 1851
	bool has_timestamping = false;

	if (tss->ts[0].tv_sec || tss->ts[0].tv_nsec) {
		if (sock_flag(sk, SOCK_RCVTSTAMP)) {
			if (sock_flag(sk, SOCK_RCVTSTAMPNS)) {
1852 1853 1854 1855 1856 1857
				if (new_tstamp) {
					struct __kernel_timespec kts = {tss->ts[0].tv_sec, tss->ts[0].tv_nsec};

					put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_NEW,
						 sizeof(kts), &kts);
				} else {
1858 1859
					struct timespec ts_old = timespec64_to_timespec(tss->ts[0]);

1860
					put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMPNS_OLD,
1861
						 sizeof(ts_old), &ts_old);
1862
				}
1863
			} else {
1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878
				if (new_tstamp) {
					struct __kernel_sock_timeval stv;

					stv.tv_sec = tss->ts[0].tv_sec;
					stv.tv_usec = tss->ts[0].tv_nsec / 1000;
					put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_NEW,
						 sizeof(stv), &stv);
				} else {
					struct __kernel_old_timeval tv;

					tv.tv_sec = tss->ts[0].tv_sec;
					tv.tv_usec = tss->ts[0].tv_nsec / 1000;
					put_cmsg(msg, SOL_SOCKET, SO_TIMESTAMP_OLD,
						 sizeof(tv), &tv);
				}
1879 1880 1881 1882 1883 1884
			}
		}

		if (sk->sk_tsflags & SOF_TIMESTAMPING_SOFTWARE)
			has_timestamping = true;
		else
1885
			tss->ts[0] = (struct timespec64) {0};
1886 1887 1888 1889 1890 1891
	}

	if (tss->ts[2].tv_sec || tss->ts[2].tv_nsec) {
		if (sk->sk_tsflags & SOF_TIMESTAMPING_RAW_HARDWARE)
			has_timestamping = true;
		else
1892
			tss->ts[2] = (struct timespec64) {0};
1893 1894 1895
	}

	if (has_timestamping) {
1896 1897 1898 1899 1900
		tss->ts[1] = (struct timespec64) {0};
		if (sock_flag(sk, SOCK_TSTAMP_NEW))
			put_cmsg_scm_timestamping64(msg, tss);
		else
			put_cmsg_scm_timestamping(msg, tss);
1901 1902 1903
	}
}

1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916
static int tcp_inq_hint(struct sock *sk)
{
	const struct tcp_sock *tp = tcp_sk(sk);
	u32 copied_seq = READ_ONCE(tp->copied_seq);
	u32 rcv_nxt = READ_ONCE(tp->rcv_nxt);
	int inq;

	inq = rcv_nxt - copied_seq;
	if (unlikely(inq < 0 || copied_seq != READ_ONCE(tp->copied_seq))) {
		lock_sock(sk);
		inq = tp->rcv_nxt - tp->copied_seq;
		release_sock(sk);
	}
1917 1918 1919 1920 1921
	/* After receiving a FIN, tell the user-space to continue reading
	 * by returning a non-zero inq.
	 */
	if (inq == 0 && sock_flag(sk, SOCK_DONE))
		inq = 1;
1922 1923 1924
	return inq;
}

Linus Torvalds's avatar
Linus Torvalds committed
1925 1926 1927 1928 1929 1930 1931 1932
/*
 *	This routine copies from a sock struct into the user buffer.
 *
 *	Technical note: in 2.3 we work on _locked_ socket, so that
 *	tricks with *seq access order and skb->users are not required.
 *	Probably, code can be easily improved even more.
 */

1933 1934
int tcp_recvmsg(struct sock *sk, struct msghdr *msg, size_t len, int nonblock,
		int flags, int *addr_len)
Linus Torvalds's avatar
Linus Torvalds committed
1935 1936 1937 1938 1939 1940
{
	struct tcp_sock *tp = tcp_sk(sk);
	int copied = 0;
	u32 peek_seq;
	u32 *seq;
	unsigned long used;
1941
	int err, inq;
Linus Torvalds's avatar
Linus Torvalds committed
1942 1943
	int target;		/* Read at least this many bytes */
	long timeo;
1944
	struct sk_buff *skb, *last;
1945
	u32 urg_hole = 0;
1946
	struct scm_timestamping_internal tss;
1947
	bool has_tss = false;
1948
	bool has_cmsg;
Linus Torvalds's avatar
Linus Torvalds committed
1949

1950
	if (unlikely(flags & MSG_ERRQUEUE))
1951
		return inet_recv_error(sk, msg, len, addr_len);
1952

1953 1954 1955
	if (sk_can_busy_loop(sk) && skb_queue_empty(&sk->sk_receive_queue) &&
	    (sk->sk_state == TCP_ESTABLISHED))
		sk_busy_loop(sk, nonblock);
1956

Linus Torvalds's avatar
Linus Torvalds committed
1957 1958 1959 1960 1961 1962
	lock_sock(sk);

	err = -ENOTCONN;
	if (sk->sk_state == TCP_LISTEN)
		goto out;

1963
	has_cmsg = tp->recvmsg_inq;
Linus Torvalds's avatar
Linus Torvalds committed
1964 1965 1966 1967 1968 1969
	timeo = sock_rcvtimeo(sk, nonblock);

	/* Urgent data needs to be handled specially. */
	if (flags & MSG_OOB)
		goto recv_urg;

Pavel Emelyanov's avatar
Pavel Emelyanov committed
1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984
	if (unlikely(tp->repair)) {
		err = -EPERM;
		if (!(flags & MSG_PEEK))
			goto out;

		if (tp->repair_queue == TCP_SEND_QUEUE)
			goto recv_sndq;

		err = -EINVAL;
		if (tp->repair_queue == TCP_NO_QUEUE)
			goto out;

		/* 'common' recv queue MSG_PEEK-ing */
	}

Linus Torvalds's avatar
Linus Torvalds committed
1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007
	seq = &tp->copied_seq;
	if (flags & MSG_PEEK) {
		peek_seq = tp->copied_seq;
		seq = &peek_seq;
	}

	target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);

	do {
		u32 offset;

		/* Are we at urgent data? Stop if we have read anything or have SIGURG pending. */
		if (tp->urg_data && tp->urg_seq == *seq) {
			if (copied)
				break;
			if (signal_pending(current)) {
				copied = timeo ? sock_intr_errno(timeo) : -EAGAIN;
				break;
			}
		}

		/* Next get a buffer. */

2008
		last = skb_peek_tail(&sk->sk_receive_queue);
2009
		skb_queue_walk(&sk->sk_receive_queue, skb) {
2010
			last = skb;
Linus Torvalds's avatar
Linus Torvalds committed
2011 2012 2013
			/* Now that we have two receive queues this
			 * shouldn't happen.
			 */
2014
			if (WARN(before(*seq, TCP_SKB_CB(skb)->seq),
2015
				 "TCP recvmsg seq # bug: copied %X, seq %X, rcvnxt %X, fl %X\n",
2016 2017
				 *seq, TCP_SKB_CB(skb)->seq, tp->rcv_nxt,
				 flags))
Linus Torvalds's avatar
Linus Torvalds committed
2018
				break;
2019

Linus Torvalds's avatar
Linus Torvalds committed
2020
			offset = *seq - TCP_SKB_CB(skb)->seq;
2021 2022
			if (unlikely(TCP_SKB_CB(skb)->tcp_flags & TCPHDR_SYN)) {
				pr_err_once("%s: found a SYN, please report !\n", __func__);
Linus Torvalds's avatar
Linus Torvalds committed
2023
				offset--;
2024
			}
Linus Torvalds's avatar
Linus Torvalds committed
2025 2026
			if (offset < skb->len)
				goto found_ok_skb;
2027
			if (TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN)
Linus Torvalds's avatar
Linus Torvalds committed
2028
				goto found_fin_ok;
2029
			WARN(!(flags & MSG_PEEK),
2030
			     "TCP recvmsg seq # bug 2: copied %X, seq %X, rcvnxt %X, fl %X\n",
2031
			     *seq, TCP_SKB_CB(skb)->seq, tp->rcv_nxt, flags);
2032
		}
Linus Torvalds's avatar
Linus Torvalds committed
2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043

		/* Well, if we have backlog, try to process it now yet. */

		if (copied >= target && !sk->sk_backlog.tail)
			break;

		if (copied) {
			if (sk->sk_err ||
			    sk->sk_state == TCP_CLOSE ||
			    (sk->sk_shutdown & RCV_SHUTDOWN) ||
			    !timeo ||
2044
			    signal_pending(current))
Linus Torvalds's avatar
Linus Torvalds committed
2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058
				break;
		} else {
			if (sock_flag(sk, SOCK_DONE))
				break;

			if (sk->sk_err) {
				copied = sock_error(sk);
				break;
			}

			if (sk->sk_shutdown & RCV_SHUTDOWN)
				break;

			if (sk->sk_state == TCP_CLOSE) {
2059 2060 2061 2062
				/* This occurs when user tries to read
				 * from never connected socket.
				 */
				copied = -ENOTCONN;
Linus Torvalds's avatar
Linus Torvalds committed
2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076
				break;
			}

			if (!timeo) {
				copied = -EAGAIN;
				break;
			}

			if (signal_pending(current)) {
				copied = sock_intr_errno(timeo);
				break;
			}
		}

2077
		tcp_cleanup_rbuf(sk, copied);
Linus Torvalds's avatar
Linus Torvalds committed
2078 2079 2080 2081 2082

		if (copied >= target) {
			/* Do not sleep, just process backlog. */
			release_sock(sk);
			lock_sock(sk);
2083 2084 2085
		} else {
			sk_wait_data(sk, &timeo, last);
		}
Linus Torvalds's avatar
Linus Torvalds committed
2086

2087 2088
		if ((flags & MSG_PEEK) &&
		    (peek_seq - copied - urg_hole != tp->copied_seq)) {
2089 2090 2091
			net_dbg_ratelimited("TCP(%s:%d): Application bug, race in MSG_PEEK\n",
					    current->comm,
					    task_pid_nr(current));
Linus Torvalds's avatar
Linus Torvalds committed
2092 2093 2094 2095
			peek_seq = tp->copied_seq;
		}
		continue;

2096
found_ok_skb:
Linus Torvalds's avatar
Linus Torvalds committed
2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108
		/* Ok so how much can we use? */
		used = skb->len - offset;
		if (len < used)
			used = len;

		/* Do we have urgent data here? */
		if (tp->urg_data) {
			u32 urg_offset = tp->urg_seq - *seq;
			if (urg_offset < used) {
				if (!urg_offset) {
					if (!sock_flag(sk, SOCK_URGINLINE)) {
						++*seq;
2109
						urg_hole++;
Linus Torvalds's avatar
Linus Torvalds committed
2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120
						offset++;
						used--;
						if (!used)
							goto skip_copy;
					}
				} else
					used = urg_offset;
			}
		}

		if (!(flags & MSG_TRUNC)) {
2121
			err = skb_copy_datagram_msg(skb, offset, msg, used);
Dan Williams's avatar
Dan Williams committed
2122 2123 2124 2125 2126
			if (err) {
				/* Exception. Bailout! */
				if (!copied)
					copied = -EFAULT;
				break;
Linus Torvalds's avatar
Linus Torvalds committed
2127 2128 2129 2130 2131 2132 2133 2134 2135 2136
			}
		}

		*seq += used;
		copied += used;
		len -= used;

		tcp_rcv_space_adjust(sk);

skip_copy:
2137
		if (tp->urg_data && after(tp->copied_seq, tp->urg_seq)) {
Linus Torvalds's avatar
Linus Torvalds committed
2138
			tp->urg_data = 0;
2139 2140
			tcp_fast_path_check(sk);
		}
Linus Torvalds's avatar
Linus Torvalds committed
2141 2142 2143
		if (used + offset < skb->len)
			continue;

2144 2145 2146
		if (TCP_SKB_CB(skb)->has_rxtstamp) {
			tcp_update_recv_tstamps(skb, &tss);
			has_tss = true;
2147
			has_cmsg = true;
2148
		}
2149
		if (TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN)
Linus Torvalds's avatar
Linus Torvalds committed
2150
			goto found_fin_ok;
Dan Williams's avatar
Dan Williams committed
2151 2152
		if (!(flags & MSG_PEEK))
			sk_eat_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
2153 2154
		continue;

2155
found_fin_ok:
Linus Torvalds's avatar
Linus Torvalds committed
2156 2157
		/* Process the FIN. */
		++*seq;
Dan Williams's avatar
Dan Williams committed
2158 2159
		if (!(flags & MSG_PEEK))
			sk_eat_skb(sk, skb);
Linus Torvalds's avatar
Linus Torvalds committed
2160 2161 2162 2163 2164 2165 2166 2167
		break;
	} while (len > 0);

	/* According to UNIX98, msg_name/msg_namelen are ignored
	 * on connected socket. I was just happy when found this 8) --ANK
	 */

	/* Clean up data we have read: This will do ACK frames. */
2168
	tcp_cleanup_rbuf(sk, copied);
Linus Torvalds's avatar
Linus Torvalds committed
2169 2170

	release_sock(sk);
2171 2172 2173 2174 2175 2176 2177 2178 2179 2180

	if (has_cmsg) {
		if (has_tss)
			tcp_recv_timestamp(msg, sk, &tss);
		if (tp->recvmsg_inq) {
			inq = tcp_inq_hint(sk);
			put_cmsg(msg, SOL_TCP, TCP_CM_INQ, sizeof(inq), &inq);
		}
	}

Linus Torvalds's avatar
Linus Torvalds committed
2181 2182 2183 2184 2185 2186 2187
	return copied;

out:
	release_sock(sk);
	return err;

recv_urg:
2188
	err = tcp_recv_urg(sk, msg, len, flags);
Linus Torvalds's avatar
Linus Torvalds committed
2189
	goto out;
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2190 2191 2192 2193

recv_sndq:
	err = tcp_peek_sndq(sk, msg, len);
	goto out;
Linus Torvalds's avatar
Linus Torvalds committed
2194
}
2195
EXPORT_SYMBOL(tcp_recvmsg);
Linus Torvalds's avatar
Linus Torvalds committed
2196

2197 2198 2199 2200
void tcp_set_state(struct sock *sk, int state)
{
	int oldstate = sk->sk_state;

2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223
	/* We defined a new enum for TCP states that are exported in BPF
	 * so as not force the internal TCP states to be frozen. The
	 * following checks will detect if an internal state value ever
	 * differs from the BPF value. If this ever happens, then we will
	 * need to remap the internal value to the BPF value before calling
	 * tcp_call_bpf_2arg.
	 */
	BUILD_BUG_ON((int)BPF_TCP_ESTABLISHED != (int)TCP_ESTABLISHED);
	BUILD_BUG_ON((int)BPF_TCP_SYN_SENT != (int)TCP_SYN_SENT);
	BUILD_BUG_ON((int)BPF_TCP_SYN_RECV != (int)TCP_SYN_RECV);
	BUILD_BUG_ON((int)BPF_TCP_FIN_WAIT1 != (int)TCP_FIN_WAIT1);
	BUILD_BUG_ON((int)BPF_TCP_FIN_WAIT2 != (int)TCP_FIN_WAIT2);
	BUILD_BUG_ON((int)BPF_TCP_TIME_WAIT != (int)TCP_TIME_WAIT);
	BUILD_BUG_ON((int)BPF_TCP_CLOSE != (int)TCP_CLOSE);
	BUILD_BUG_ON((int)BPF_TCP_CLOSE_WAIT != (int)TCP_CLOSE_WAIT);
	BUILD_BUG_ON((int)BPF_TCP_LAST_ACK != (int)TCP_LAST_ACK);
	BUILD_BUG_ON((int)BPF_TCP_LISTEN != (int)TCP_LISTEN);
	BUILD_BUG_ON((int)BPF_TCP_CLOSING != (int)TCP_CLOSING);
	BUILD_BUG_ON((int)BPF_TCP_NEW_SYN_RECV != (int)TCP_NEW_SYN_RECV);
	BUILD_BUG_ON((int)BPF_TCP_MAX_STATES != (int)TCP_MAX_STATES);

	if (BPF_SOCK_OPS_TEST_FLAG(tcp_sk(sk), BPF_SOCK_OPS_STATE_CB_FLAG))
		tcp_call_bpf_2arg(sk, BPF_SOCK_OPS_STATE_CB, oldstate, state);
2224

2225 2226 2227
	switch (state) {
	case TCP_ESTABLISHED:
		if (oldstate != TCP_ESTABLISHED)
2228
			TCP_INC_STATS(sock_net(sk), TCP_MIB_CURRESTAB);
2229 2230 2231 2232
		break;

	case TCP_CLOSE:
		if (oldstate == TCP_CLOSE_WAIT || oldstate == TCP_ESTABLISHED)
2233
			TCP_INC_STATS(sock_net(sk), TCP_MIB_ESTABRESETS);
2234 2235 2236 2237

		sk->sk_prot->unhash(sk);
		if (inet_csk(sk)->icsk_bind_hash &&
		    !(sk->sk_userlocks & SOCK_BINDPORT_LOCK))
2238
			inet_put_port(sk);
2239 2240
		/* fall through */
	default:
2241
		if (oldstate == TCP_ESTABLISHED)
2242
			TCP_DEC_STATS(sock_net(sk), TCP_MIB_CURRESTAB);
2243 2244 2245 2246 2247
	}

	/* Change state AFTER socket is unhashed to avoid closed
	 * socket sitting in hash tables.
	 */
2248
	inet_sk_state_store(sk, state);
2249 2250 2251
}
EXPORT_SYMBOL_GPL(tcp_set_state);

Linus Torvalds's avatar
Linus Torvalds committed
2252 2253 2254 2255 2256 2257 2258
/*
 *	State processing on a close. This implements the state shift for
 *	sending our FIN frame. Note that we only send a FIN for some
 *	states. A shutdown() may have already sent the FIN, or we may be
 *	closed.
 */

2259
static const unsigned char new_state[16] = {
Linus Torvalds's avatar
Linus Torvalds committed
2260
  /* current state:        new state:      action:	*/
2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273
  [0 /* (Invalid) */]	= TCP_CLOSE,
  [TCP_ESTABLISHED]	= TCP_FIN_WAIT1 | TCP_ACTION_FIN,
  [TCP_SYN_SENT]	= TCP_CLOSE,
  [TCP_SYN_RECV]	= TCP_FIN_WAIT1 | TCP_ACTION_FIN,
  [TCP_FIN_WAIT1]	= TCP_FIN_WAIT1,
  [TCP_FIN_WAIT2]	= TCP_FIN_WAIT2,
  [TCP_TIME_WAIT]	= TCP_CLOSE,
  [TCP_CLOSE]		= TCP_CLOSE,
  [TCP_CLOSE_WAIT]	= TCP_LAST_ACK  | TCP_ACTION_FIN,
  [TCP_LAST_ACK]	= TCP_LAST_ACK,
  [TCP_LISTEN]		= TCP_CLOSE,
  [TCP_CLOSING]		= TCP_CLOSING,
  [TCP_NEW_SYN_RECV]	= TCP_CLOSE,	/* should not happen ! */
Linus Torvalds's avatar
Linus Torvalds committed
2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287
};

static int tcp_close_state(struct sock *sk)
{
	int next = (int)new_state[sk->sk_state];
	int ns = next & TCP_STATE_MASK;

	tcp_set_state(sk, ns);

	return next & TCP_ACTION_FIN;
}

/*
 *	Shutdown the sending side of a connection. Much like close except
2288
 *	that we don't receive shut down or sock_set_flag(sk, SOCK_DEAD).
Linus Torvalds's avatar
Linus Torvalds committed
2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308
 */

void tcp_shutdown(struct sock *sk, int how)
{
	/*	We need to grab some memory, and put together a FIN,
	 *	and then put it into the queue to be sent.
	 *		Tim MacKenzie(tym@dibbler.cs.monash.edu.au) 4 Dec '92.
	 */
	if (!(how & SEND_SHUTDOWN))
		return;

	/* If we've already sent a FIN, or it's a closed state, skip this. */
	if ((1 << sk->sk_state) &
	    (TCPF_ESTABLISHED | TCPF_SYN_SENT |
	     TCPF_SYN_RECV | TCPF_CLOSE_WAIT)) {
		/* Clear out any half completed packets.  FIN if needed. */
		if (tcp_close_state(sk))
			tcp_send_fin(sk);
	}
}
2309
EXPORT_SYMBOL(tcp_shutdown);
Linus Torvalds's avatar
Linus Torvalds committed
2310

2311 2312 2313 2314 2315 2316 2317
bool tcp_check_oom(struct sock *sk, int shift)
{
	bool too_many_orphans, out_of_socket_memory;

	too_many_orphans = tcp_too_many_orphans(sk, shift);
	out_of_socket_memory = tcp_out_of_memory(sk);

2318 2319 2320 2321
	if (too_many_orphans)
		net_info_ratelimited("too many orphaned sockets\n");
	if (out_of_socket_memory)
		net_info_ratelimited("out of memory -- consider tuning tcp_mem\n");
2322 2323 2324
	return too_many_orphans || out_of_socket_memory;
}

Linus Torvalds's avatar
Linus Torvalds committed
2325 2326 2327 2328
void tcp_close(struct sock *sk, long timeout)
{
	struct sk_buff *skb;
	int data_was_unread = 0;
2329
	int state;
Linus Torvalds's avatar
Linus Torvalds committed
2330 2331 2332 2333 2334 2335 2336 2337

	lock_sock(sk);
	sk->sk_shutdown = SHUTDOWN_MASK;

	if (sk->sk_state == TCP_LISTEN) {
		tcp_set_state(sk, TCP_CLOSE);

		/* Special case. */
2338
		inet_csk_listen_stop(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2339 2340 2341 2342 2343 2344 2345 2346 2347

		goto adjudge_to_death;
	}

	/*  We need to flush the recv. buffs.  We do this only on the
	 *  descriptor close, not protocol-sourced closes, because the
	 *  reader process may not have drained the data yet!
	 */
	while ((skb = __skb_dequeue(&sk->sk_receive_queue)) != NULL) {
2348 2349 2350 2351
		u32 len = TCP_SKB_CB(skb)->end_seq - TCP_SKB_CB(skb)->seq;

		if (TCP_SKB_CB(skb)->tcp_flags & TCPHDR_FIN)
			len--;
Linus Torvalds's avatar
Linus Torvalds committed
2352 2353 2354 2355
		data_was_unread += len;
		__kfree_skb(skb);
	}

2356
	sk_mem_reclaim(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2357

2358 2359 2360 2361
	/* If socket has been already reset (e.g. in tcp_reset()) - kill it. */
	if (sk->sk_state == TCP_CLOSE)
		goto adjudge_to_death;

2362 2363 2364 2365 2366 2367
	/* As outlined in RFC 2525, section 2.17, we send a RST here because
	 * data was lost. To witness the awful effects of the old behavior of
	 * always doing a FIN, run an older 2.1.x kernel or 2.0.x, start a bulk
	 * GET in an FTP client, suspend the process, wait for the client to
	 * advertise a zero window, then kill -9 the FTP client, wheee...
	 * Note: timeout is always zero in such a case.
Linus Torvalds's avatar
Linus Torvalds committed
2368
	 */
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2369 2370 2371
	if (unlikely(tcp_sk(sk)->repair)) {
		sk->sk_prot->disconnect(sk, 0);
	} else if (data_was_unread) {
Linus Torvalds's avatar
Linus Torvalds committed
2372
		/* Unread data was tossed, zap the connection. */
2373
		NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPABORTONCLOSE);
Linus Torvalds's avatar
Linus Torvalds committed
2374
		tcp_set_state(sk, TCP_CLOSE);
2375
		tcp_send_active_reset(sk, sk->sk_allocation);
Linus Torvalds's avatar
Linus Torvalds committed
2376 2377 2378
	} else if (sock_flag(sk, SOCK_LINGER) && !sk->sk_lingertime) {
		/* Check zero linger _after_ checking for unread data. */
		sk->sk_prot->disconnect(sk, 0);
2379
		NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPABORTONDATA);
Linus Torvalds's avatar
Linus Torvalds committed
2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404
	} else if (tcp_close_state(sk)) {
		/* We FIN if the application ate all the data before
		 * zapping the connection.
		 */

		/* RED-PEN. Formally speaking, we have broken TCP state
		 * machine. State transitions:
		 *
		 * TCP_ESTABLISHED -> TCP_FIN_WAIT1
		 * TCP_SYN_RECV	-> TCP_FIN_WAIT1 (forget it, it's impossible)
		 * TCP_CLOSE_WAIT -> TCP_LAST_ACK
		 *
		 * are legal only when FIN has been sent (i.e. in window),
		 * rather than queued out of window. Purists blame.
		 *
		 * F.e. "RFC state" is ESTABLISHED,
		 * if Linux state is FIN-WAIT-1, but FIN is still not sent.
		 *
		 * The visible declinations are that sometimes
		 * we enter time-wait state, when it is not required really
		 * (harmless), do not send active resets, when they are
		 * required by specs (TCP_ESTABLISHED, TCP_CLOSE_WAIT, when
		 * they look as CLOSING or LAST_ACK for Linux)
		 * Probably, I missed some more holelets.
		 * 						--ANK
2405 2406 2407 2408
		 * XXX (TFO) - To start off we don't support SYN+ACK+FIN
		 * in a single packet! (May consider it later but will
		 * probably need API support or TCP_CORK SYN-ACK until
		 * data is written and socket is closed.)
Linus Torvalds's avatar
Linus Torvalds committed
2409 2410 2411 2412 2413 2414 2415
		 */
		tcp_send_fin(sk);
	}

	sk_stream_wait_close(sk, timeout);

adjudge_to_death:
2416 2417 2418 2419
	state = sk->sk_state;
	sock_hold(sk);
	sock_orphan(sk);

Linus Torvalds's avatar
Linus Torvalds committed
2420 2421
	local_bh_disable();
	bh_lock_sock(sk);
2422 2423
	/* remove backlog if any, without releasing ownership. */
	__release_sock(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2424

2425 2426
	percpu_counter_inc(sk->sk_prot->orphan_count);

2427 2428 2429
	/* Have we already been destroyed by a softirq or backlog? */
	if (state != TCP_CLOSE && sk->sk_state == TCP_CLOSE)
		goto out;
Linus Torvalds's avatar
Linus Torvalds committed
2430 2431 2432 2433

	/*	This is a (useful) BSD violating of the RFC. There is a
	 *	problem with TCP as specified in that the other end could
	 *	keep a socket open forever with no application left this end.
2434
	 *	We use a 1 minute timeout (about the same as BSD) then kill
Linus Torvalds's avatar
Linus Torvalds committed
2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449
	 *	our end. If they send after that then tough - BUT: long enough
	 *	that we won't make the old 4*rto = almost no time - whoops
	 *	reset mistake.
	 *
	 *	Nope, it was not mistake. It is really desired behaviour
	 *	f.e. on http servers, when such sockets are useless, but
	 *	consume significant resources. Let's do it with special
	 *	linger2	option.					--ANK
	 */

	if (sk->sk_state == TCP_FIN_WAIT2) {
		struct tcp_sock *tp = tcp_sk(sk);
		if (tp->linger2 < 0) {
			tcp_set_state(sk, TCP_CLOSE);
			tcp_send_active_reset(sk, GFP_ATOMIC);
2450
			__NET_INC_STATS(sock_net(sk),
2451
					LINUX_MIB_TCPABORTONLINGER);
Linus Torvalds's avatar
Linus Torvalds committed
2452
		} else {
2453
			const int tmo = tcp_fin_time(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2454 2455

			if (tmo > TCP_TIMEWAIT_LEN) {
2456 2457
				inet_csk_reset_keepalive_timer(sk,
						tmo - TCP_TIMEWAIT_LEN);
Linus Torvalds's avatar
Linus Torvalds committed
2458 2459 2460 2461 2462 2463 2464
			} else {
				tcp_time_wait(sk, TCP_FIN_WAIT2, tmo);
				goto out;
			}
		}
	}
	if (sk->sk_state != TCP_CLOSE) {
2465
		sk_mem_reclaim(sk);
2466
		if (tcp_check_oom(sk, 0)) {
Linus Torvalds's avatar
Linus Torvalds committed
2467 2468
			tcp_set_state(sk, TCP_CLOSE);
			tcp_send_active_reset(sk, GFP_ATOMIC);
2469
			__NET_INC_STATS(sock_net(sk),
2470
					LINUX_MIB_TCPABORTONMEMORY);
2471 2472 2473
		} else if (!check_net(sock_net(sk))) {
			/* Not possible to send reset; just close */
			tcp_set_state(sk, TCP_CLOSE);
Linus Torvalds's avatar
Linus Torvalds committed
2474 2475 2476
		}
	}

2477 2478 2479 2480 2481 2482
	if (sk->sk_state == TCP_CLOSE) {
		struct request_sock *req = tcp_sk(sk)->fastopen_rsk;
		/* We could get here with a non-NULL req if the socket is
		 * aborted (e.g., closed with unread data) before 3WHS
		 * finishes.
		 */
2483
		if (req)
2484
			reqsk_fastopen_remove(sk, req, false);
2485
		inet_csk_destroy_sock(sk);
2486
	}
Linus Torvalds's avatar
Linus Torvalds committed
2487 2488 2489 2490 2491
	/* Otherwise, socket is reprieved until protocol close. */

out:
	bh_unlock_sock(sk);
	local_bh_enable();
2492
	release_sock(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2493 2494
	sock_put(sk);
}
2495
EXPORT_SYMBOL(tcp_close);
Linus Torvalds's avatar
Linus Torvalds committed
2496 2497 2498

/* These states need RST on ABORT according to RFC793 */

Eric Dumazet's avatar
Eric Dumazet committed
2499
static inline bool tcp_need_reset(int state)
Linus Torvalds's avatar
Linus Torvalds committed
2500 2501 2502 2503 2504 2505
{
	return (1 << state) &
	       (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT | TCPF_FIN_WAIT1 |
		TCPF_FIN_WAIT2 | TCPF_SYN_RECV);
}

2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521
static void tcp_rtx_queue_purge(struct sock *sk)
{
	struct rb_node *p = rb_first(&sk->tcp_rtx_queue);

	while (p) {
		struct sk_buff *skb = rb_to_skb(p);

		p = rb_next(p);
		/* Since we are deleting whole queue, no need to
		 * list_del(&skb->tcp_tsorted_anchor)
		 */
		tcp_rtx_queue_unlink(skb, sk);
		sk_wmem_free_skb(sk, skb);
	}
}

2522 2523 2524 2525 2526 2527 2528 2529 2530
void tcp_write_queue_purge(struct sock *sk)
{
	struct sk_buff *skb;

	tcp_chrono_stop(sk, TCP_CHRONO_BUSY);
	while ((skb = __skb_dequeue(&sk->sk_write_queue)) != NULL) {
		tcp_skb_tsorted_anchor_cleanup(skb);
		sk_wmem_free_skb(sk, skb);
	}
2531
	tcp_rtx_queue_purge(sk);
2532 2533 2534 2535 2536
	skb = sk->sk_tx_skb_cache;
	if (skb) {
		__kfree_skb(skb);
		sk->sk_tx_skb_cache = NULL;
	}
2537 2538 2539
	INIT_LIST_HEAD(&tcp_sk(sk)->tsorted_sent_queue);
	sk_mem_reclaim(sk);
	tcp_clear_all_retrans_hints(tcp_sk(sk));
2540
	tcp_sk(sk)->packets_out = 0;
2541
	inet_csk(sk)->icsk_backoff = 0;
2542 2543
}

Linus Torvalds's avatar
Linus Torvalds committed
2544 2545 2546
int tcp_disconnect(struct sock *sk, int flags)
{
	struct inet_sock *inet = inet_sk(sk);
2547
	struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2548 2549 2550 2551 2552 2553 2554 2555
	struct tcp_sock *tp = tcp_sk(sk);
	int old_state = sk->sk_state;

	if (old_state != TCP_CLOSE)
		tcp_set_state(sk, TCP_CLOSE);

	/* ABORT function of RFC793 */
	if (old_state == TCP_LISTEN) {
2556
		inet_csk_listen_stop(sk);
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2557 2558
	} else if (unlikely(tp->repair)) {
		sk->sk_err = ECONNABORTED;
Linus Torvalds's avatar
Linus Torvalds committed
2559 2560 2561
	} else if (tcp_need_reset(old_state) ||
		   (tp->snd_nxt != tp->write_seq &&
		    (1 << old_state) & (TCPF_CLOSING | TCPF_LAST_ACK))) {
Stephen Hemminger's avatar
Stephen Hemminger committed
2562
		/* The last check adjusts for discrepancy of Linux wrt. RFC
Linus Torvalds's avatar
Linus Torvalds committed
2563 2564 2565 2566 2567 2568 2569 2570 2571
		 * states
		 */
		tcp_send_active_reset(sk, gfp_any());
		sk->sk_err = ECONNRESET;
	} else if (old_state == TCP_SYN_SENT)
		sk->sk_err = ECONNRESET;

	tcp_clear_xmit_timers(sk);
	__skb_queue_purge(&sk->sk_receive_queue);
2572 2573 2574 2575
	if (sk->sk_rx_skb_cache) {
		__kfree_skb(sk->sk_rx_skb_cache);
		sk->sk_rx_skb_cache = NULL;
	}
2576 2577
	tp->copied_seq = tp->rcv_nxt;
	tp->urg_data = 0;
2578
	tcp_write_queue_purge(sk);
2579
	tcp_fastopen_active_disable_ofo_check(sk);
2580
	skb_rbtree_purge(&tp->out_of_order_queue);
Linus Torvalds's avatar
Linus Torvalds committed
2581

2582
	inet->inet_dport = 0;
Linus Torvalds's avatar
Linus Torvalds committed
2583 2584 2585 2586 2587 2588

	if (!(sk->sk_userlocks & SOCK_BINDADDR_LOCK))
		inet_reset_saddr(sk);

	sk->sk_shutdown = 0;
	sock_reset_flag(sk, SOCK_DONE);
2589
	tp->srtt_us = 0;
2590
	tp->mdev_us = jiffies_to_usecs(TCP_TIMEOUT_INIT);
2591
	tp->rcv_rtt_last_tsecr = 0;
2592 2593
	tp->write_seq += tp->max_window + 2;
	if (tp->write_seq == 0)
Linus Torvalds's avatar
Linus Torvalds committed
2594
		tp->write_seq = 1;
2595
	icsk->icsk_backoff = 0;
Linus Torvalds's avatar
Linus Torvalds committed
2596
	tp->snd_cwnd = 2;
2597
	icsk->icsk_probes_out = 0;
2598
	icsk->icsk_rto = TCP_TIMEOUT_INIT;
2599
	tp->snd_ssthresh = TCP_INFINITE_SSTHRESH;
2600
	tp->snd_cwnd = TCP_INIT_CWND;
Linus Torvalds's avatar
Linus Torvalds committed
2601
	tp->snd_cwnd_cnt = 0;
2602
	tp->window_clamp = 0;
2603
	tp->delivered_ce = 0;
2604
	tcp_set_ca_state(sk, TCP_CA_Open);
2605
	tp->is_sack_reneg = 0;
Linus Torvalds's avatar
Linus Torvalds committed
2606
	tcp_clear_retrans(tp);
2607
	inet_csk_delack_init(sk);
2608 2609 2610 2611
	/* Initialize rcv_mss to TCP_MIN_MSS to avoid division by 0
	 * issue in __tcp_select_window()
	 */
	icsk->icsk_ack.rcv_mss = TCP_MIN_MSS;
2612
	memset(&tp->rx_opt, 0, sizeof(tp->rx_opt));
Linus Torvalds's avatar
Linus Torvalds committed
2613
	__sk_dst_reset(sk);
2614 2615
	dst_release(sk->sk_rx_dst);
	sk->sk_rx_dst = NULL;
2616
	tcp_saved_syn_free(tp);
Eric Dumazet's avatar
Eric Dumazet committed
2617
	tp->compressed_ack = 0;
Wei Wang's avatar
Wei Wang committed
2618
	tp->bytes_sent = 0;
2619 2620
	tp->bytes_acked = 0;
	tp->bytes_received = 0;
2621
	tp->bytes_retrans = 0;
2622 2623
	tp->duplicate_sack[0].start_seq = 0;
	tp->duplicate_sack[0].end_seq = 0;
2624
	tp->dsack_dups = 0;
2625
	tp->reord_seen = 0;
2626 2627 2628 2629
	tp->retrans_out = 0;
	tp->sacked_out = 0;
	tp->tlp_high_seq = 0;
	tp->last_oow_ack_time = 0;
2630 2631
	/* There's a bubble in the pipe until at least the first ACK. */
	tp->app_limited = ~0U;
2632 2633 2634 2635 2636 2637
	tp->rack.mstamp = 0;
	tp->rack.advanced = 0;
	tp->rack.reo_wnd_steps = 1;
	tp->rack.last_delivered = 0;
	tp->rack.reo_wnd_persist = 0;
	tp->rack.dsack_seen = 0;
2638 2639 2640 2641
	tp->syn_data_acked = 0;
	tp->rx_opt.saw_tstamp = 0;
	tp->rx_opt.dsack = 0;
	tp->rx_opt.num_sacks = 0;
2642

Linus Torvalds's avatar
Linus Torvalds committed
2643

2644 2645 2646 2647
	/* Clean up fastopen related fields */
	tcp_free_fastopen_req(tp);
	inet->defer_connect = 0;

2648
	WARN_ON(inet->inet_num && !icsk->icsk_bind_hash);
Linus Torvalds's avatar
Linus Torvalds committed
2649

2650 2651 2652 2653 2654 2655
	if (sk->sk_frag.page) {
		put_page(sk->sk_frag.page);
		sk->sk_frag.page = NULL;
		sk->sk_frag.offset = 0;
	}

Linus Torvalds's avatar
Linus Torvalds committed
2656
	sk->sk_error_report(sk);
2657
	return 0;
Linus Torvalds's avatar
Linus Torvalds committed
2658
}
2659
EXPORT_SYMBOL(tcp_disconnect);
Linus Torvalds's avatar
Linus Torvalds committed
2660

Eric Dumazet's avatar
Eric Dumazet committed
2661
static inline bool tcp_can_repair_sock(const struct sock *sk)
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2662
{
2663
	return ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN) &&
2664
		(sk->sk_state != TCP_LISTEN);
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2665 2666
}

2667 2668 2669 2670 2671 2672 2673 2674 2675 2676 2677 2678 2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697 2698
static int tcp_repair_set_window(struct tcp_sock *tp, char __user *optbuf, int len)
{
	struct tcp_repair_window opt;

	if (!tp->repair)
		return -EPERM;

	if (len != sizeof(opt))
		return -EINVAL;

	if (copy_from_user(&opt, optbuf, sizeof(opt)))
		return -EFAULT;

	if (opt.max_window < opt.snd_wnd)
		return -EINVAL;

	if (after(opt.snd_wl1, tp->rcv_nxt + opt.rcv_wnd))
		return -EINVAL;

	if (after(opt.rcv_wup, tp->rcv_nxt))
		return -EINVAL;

	tp->snd_wl1	= opt.snd_wl1;
	tp->snd_wnd	= opt.snd_wnd;
	tp->max_window	= opt.max_window;

	tp->rcv_wnd	= opt.rcv_wnd;
	tp->rcv_wup	= opt.rcv_wup;

	return 0;
}

2699
static int tcp_repair_options_est(struct sock *sk,
2700
		struct tcp_repair_opt __user *optbuf, unsigned int len)
2701
{
2702
	struct tcp_sock *tp = tcp_sk(sk);
2703
	struct tcp_repair_opt opt;
2704

2705 2706
	while (len >= sizeof(opt)) {
		if (copy_from_user(&opt, optbuf, sizeof(opt)))
2707 2708 2709
			return -EFAULT;

		optbuf++;
2710
		len -= sizeof(opt);
2711

2712 2713 2714
		switch (opt.opt_code) {
		case TCPOPT_MSS:
			tp->rx_opt.mss_clamp = opt.opt_val;
2715
			tcp_mtup_init(sk);
2716
			break;
2717
		case TCPOPT_WINDOW:
2718 2719 2720 2721
			{
				u16 snd_wscale = opt.opt_val & 0xFFFF;
				u16 rcv_wscale = opt.opt_val >> 16;

2722
				if (snd_wscale > TCP_MAX_WSCALE || rcv_wscale > TCP_MAX_WSCALE)
2723
					return -EFBIG;
2724

2725 2726 2727 2728
				tp->rx_opt.snd_wscale = snd_wscale;
				tp->rx_opt.rcv_wscale = rcv_wscale;
				tp->rx_opt.wscale_ok = 1;
			}
2729 2730
			break;
		case TCPOPT_SACK_PERM:
2731 2732 2733
			if (opt.opt_val != 0)
				return -EINVAL;

2734 2735 2736
			tp->rx_opt.sack_ok |= TCP_SACK_SEEN;
			break;
		case TCPOPT_TIMESTAMP:
2737 2738 2739
			if (opt.opt_val != 0)
				return -EINVAL;

2740 2741 2742 2743 2744 2745 2746 2747
			tp->rx_opt.tstamp_ok = 1;
			break;
		}
	}

	return 0;
}

2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762
DEFINE_STATIC_KEY_FALSE(tcp_tx_delay_enabled);
EXPORT_SYMBOL(tcp_tx_delay_enabled);

static void tcp_enable_tx_delay(void)
{
	if (!static_branch_unlikely(&tcp_tx_delay_enabled)) {
		static int __tcp_tx_delay_enabled = 0;

		if (cmpxchg(&__tcp_tx_delay_enabled, 0, 1) == 0) {
			static_branch_enable(&tcp_tx_delay_enabled);
			pr_info("TCP_TX_DELAY enabled\n");
		}
	}
}

Linus Torvalds's avatar
Linus Torvalds committed
2763 2764 2765
/*
 *	Socket option code for TCP.
 */
2766
static int do_tcp_setsockopt(struct sock *sk, int level,
2767
		int optname, char __user *optval, unsigned int optlen)
Linus Torvalds's avatar
Linus Torvalds committed
2768 2769
{
	struct tcp_sock *tp = tcp_sk(sk);
2770
	struct inet_connection_sock *icsk = inet_csk(sk);
2771
	struct net *net = sock_net(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2772 2773 2774
	int val;
	int err = 0;

2775 2776 2777
	/* These are data/string values, all the others are ints */
	switch (optname) {
	case TCP_CONGESTION: {
2778 2779 2780 2781 2782 2783
		char name[TCP_CA_NAME_MAX];

		if (optlen < 1)
			return -EINVAL;

		val = strncpy_from_user(name, optval,
2784
					min_t(long, TCP_CA_NAME_MAX-1, optlen));
2785 2786 2787 2788 2789
		if (val < 0)
			return -EFAULT;
		name[val] = 0;

		lock_sock(sk);
2790 2791 2792
		err = tcp_set_congestion_control(sk, name, true, true,
						 ns_capable(sock_net(sk)->user_ns,
							    CAP_NET_ADMIN));
2793 2794 2795
		release_sock(sk);
		return err;
	}
Dave Watson's avatar
Dave Watson committed
2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813
	case TCP_ULP: {
		char name[TCP_ULP_NAME_MAX];

		if (optlen < 1)
			return -EINVAL;

		val = strncpy_from_user(name, optval,
					min_t(long, TCP_ULP_NAME_MAX - 1,
					      optlen));
		if (val < 0)
			return -EFAULT;
		name[val] = 0;

		lock_sock(sk);
		err = tcp_set_ulp(sk, name);
		release_sock(sk);
		return err;
	}
2814
	case TCP_FASTOPEN_KEY: {
2815 2816
		__u8 key[TCP_FASTOPEN_KEY_BUF_LENGTH];
		__u8 *backup_key = NULL;
2817

2818 2819 2820 2821 2822
		/* Allow a backup key as well to facilitate key rotation
		 * First key is the active one.
		 */
		if (optlen != TCP_FASTOPEN_KEY_LENGTH &&
		    optlen != TCP_FASTOPEN_KEY_BUF_LENGTH)
2823 2824 2825 2826 2827
			return -EINVAL;

		if (copy_from_user(key, optval, optlen))
			return -EFAULT;

2828 2829 2830
		if (optlen == TCP_FASTOPEN_KEY_BUF_LENGTH)
			backup_key = key + TCP_FASTOPEN_KEY_LENGTH;

2831
		return tcp_fastopen_reset_cipher(net, sk, key, backup_key);
2832
	}
2833 2834 2835
	default:
		/* fallthru */
		break;
2836
	}
2837

Linus Torvalds's avatar
Linus Torvalds committed
2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849
	if (optlen < sizeof(int))
		return -EINVAL;

	if (get_user(val, (int __user *)optval))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case TCP_MAXSEG:
		/* Values greater than interface MTU won't take effect. However
		 * at the point when this call is done we typically don't yet
2850 2851
		 * know which interface is going to be used
		 */
2852
		if (val && (val < TCP_MIN_MSS || val > MAX_TCP_WINDOW)) {
Linus Torvalds's avatar
Linus Torvalds committed
2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869
			err = -EINVAL;
			break;
		}
		tp->rx_opt.user_mss = val;
		break;

	case TCP_NODELAY:
		if (val) {
			/* TCP_NODELAY is weaker than TCP_CORK, so that
			 * this option on corked socket is remembered, but
			 * it is not activated until cork is cleared.
			 *
			 * However, when TCP_NODELAY is set we make
			 * an explicit push, which overrides even TCP_CORK
			 * for currently queued segments.
			 */
			tp->nonagle |= TCP_NAGLE_OFF|TCP_NAGLE_PUSH;
2870
			tcp_push_pending_frames(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2871 2872 2873 2874 2875
		} else {
			tp->nonagle &= ~TCP_NAGLE_OFF;
		}
		break;

2876 2877 2878 2879 2880 2881 2882
	case TCP_THIN_LINEAR_TIMEOUTS:
		if (val < 0 || val > 1)
			err = -EINVAL;
		else
			tp->thin_lto = val;
		break;

Andreas Petlund's avatar
Andreas Petlund committed
2883 2884 2885 2886 2887
	case TCP_THIN_DUPACK:
		if (val < 0 || val > 1)
			err = -EINVAL;
		break;

Pavel Emelyanov's avatar
Pavel Emelyanov committed
2888 2889 2890
	case TCP_REPAIR:
		if (!tcp_can_repair_sock(sk))
			err = -EPERM;
2891
		else if (val == TCP_REPAIR_ON) {
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2892 2893 2894
			tp->repair = 1;
			sk->sk_reuse = SK_FORCE_REUSE;
			tp->repair_queue = TCP_NO_QUEUE;
2895
		} else if (val == TCP_REPAIR_OFF) {
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2896 2897 2898
			tp->repair = 0;
			sk->sk_reuse = SK_NO_REUSE;
			tcp_send_window_probe(sk);
2899
		} else if (val == TCP_REPAIR_OFF_NO_WP) {
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2900 2901 2902 2903 2904 2905 2906 2907 2908 2909
			tp->repair = 0;
			sk->sk_reuse = SK_NO_REUSE;
		} else
			err = -EINVAL;

		break;

	case TCP_REPAIR_QUEUE:
		if (!tp->repair)
			err = -EPERM;
2910
		else if ((unsigned int)val < TCP_QUEUES_NR)
Pavel Emelyanov's avatar
Pavel Emelyanov committed
2911 2912 2913 2914 2915 2916 2917 2918 2919 2920 2921 2922 2923 2924 2925 2926
			tp->repair_queue = val;
		else
			err = -EINVAL;
		break;

	case TCP_QUEUE_SEQ:
		if (sk->sk_state != TCP_CLOSE)
			err = -EPERM;
		else if (tp->repair_queue == TCP_SEND_QUEUE)
			tp->write_seq = val;
		else if (tp->repair_queue == TCP_RECV_QUEUE)
			tp->rcv_nxt = val;
		else
			err = -EINVAL;
		break;

2927 2928 2929 2930
	case TCP_REPAIR_OPTIONS:
		if (!tp->repair)
			err = -EINVAL;
		else if (sk->sk_state == TCP_ESTABLISHED)
2931
			err = tcp_repair_options_est(sk,
2932 2933
					(struct tcp_repair_opt __user *)optval,
					optlen);
2934 2935 2936 2937
		else
			err = -EPERM;
		break;

Linus Torvalds's avatar
Linus Torvalds committed
2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952 2953 2954 2955
	case TCP_CORK:
		/* When set indicates to always queue non-full frames.
		 * Later the user clears this option and we transmit
		 * any pending partial frames in the queue.  This is
		 * meant to be used alongside sendfile() to get properly
		 * filled frames when the user (for example) must write
		 * out headers with a write() call first and then use
		 * sendfile to send out the data parts.
		 *
		 * TCP_CORK can be set together with TCP_NODELAY and it is
		 * stronger than TCP_NODELAY.
		 */
		if (val) {
			tp->nonagle |= TCP_NAGLE_CORK;
		} else {
			tp->nonagle &= ~TCP_NAGLE_CORK;
			if (tp->nonagle&TCP_NAGLE_OFF)
				tp->nonagle |= TCP_NAGLE_PUSH;
2956
			tcp_push_pending_frames(sk);
Linus Torvalds's avatar
Linus Torvalds committed
2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967
		}
		break;

	case TCP_KEEPIDLE:
		if (val < 1 || val > MAX_TCP_KEEPIDLE)
			err = -EINVAL;
		else {
			tp->keepalive_time = val * HZ;
			if (sock_flag(sk, SOCK_KEEPOPEN) &&
			    !((1 << sk->sk_state) &
			      (TCPF_CLOSE | TCPF_LISTEN))) {
2968
				u32 elapsed = keepalive_time_elapsed(tp);
Linus Torvalds's avatar
Linus Torvalds committed
2969 2970 2971 2972
				if (tp->keepalive_time > elapsed)
					elapsed = tp->keepalive_time - elapsed;
				else
					elapsed = 0;
2973
				inet_csk_reset_keepalive_timer(sk, elapsed);
Linus Torvalds's avatar
Linus Torvalds committed
2974 2975 2976 2977 2978 2979 2980 2981 2982 2983 2984 2985 2986 2987 2988 2989 2990 2991 2992
			}
		}
		break;
	case TCP_KEEPINTVL:
		if (val < 1 || val > MAX_TCP_KEEPINTVL)
			err = -EINVAL;
		else
			tp->keepalive_intvl = val * HZ;
		break;
	case TCP_KEEPCNT:
		if (val < 1 || val > MAX_TCP_KEEPCNT)
			err = -EINVAL;
		else
			tp->keepalive_probes = val;
		break;
	case TCP_SYNCNT:
		if (val < 1 || val > MAX_TCP_SYNCNT)
			err = -EINVAL;
		else
2993
			icsk->icsk_syn_retries = val;
Linus Torvalds's avatar
Linus Torvalds committed
2994 2995
		break;

2996 2997 2998 2999 3000 3001 3002
	case TCP_SAVE_SYN:
		if (val < 0 || val > 1)
			err = -EINVAL;
		else
			tp->save_syn = val;
		break;

Linus Torvalds's avatar
Linus Torvalds committed
3003 3004 3005
	case TCP_LINGER2:
		if (val < 0)
			tp->linger2 = -1;
3006
		else if (val > net->ipv4.sysctl_tcp_fin_timeout / HZ)
Linus Torvalds's avatar
Linus Torvalds committed
3007 3008 3009 3010 3011 3012
			tp->linger2 = 0;
		else
			tp->linger2 = val * HZ;
		break;

	case TCP_DEFER_ACCEPT:
3013 3014 3015 3016
		/* Translate value in seconds to number of retransmits */
		icsk->icsk_accept_queue.rskq_defer_accept =
			secs_to_retrans(val, TCP_TIMEOUT_INIT / HZ,
					TCP_RTO_MAX / HZ);
Linus Torvalds's avatar
Linus Torvalds committed
3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030 3031 3032
		break;

	case TCP_WINDOW_CLAMP:
		if (!val) {
			if (sk->sk_state != TCP_CLOSE) {
				err = -EINVAL;
				break;
			}
			tp->window_clamp = 0;
		} else
			tp->window_clamp = val < SOCK_MIN_RCVBUF / 2 ?
						SOCK_MIN_RCVBUF / 2 : val;
		break;

	case TCP_QUICKACK:
		if (!val) {
Wei Wang's avatar
Wei Wang committed
3033
			inet_csk_enter_pingpong_mode(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3034
		} else {
Wei Wang's avatar
Wei Wang committed
3035
			inet_csk_exit_pingpong_mode(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3036 3037
			if ((1 << sk->sk_state) &
			    (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT) &&
3038 3039
			    inet_csk_ack_scheduled(sk)) {
				icsk->icsk_ack.pending |= ICSK_ACK_PUSHED;
3040
				tcp_cleanup_rbuf(sk, 1);
Linus Torvalds's avatar
Linus Torvalds committed
3041
				if (!(val & 1))
Wei Wang's avatar
Wei Wang committed
3042
					inet_csk_enter_pingpong_mode(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3043 3044 3045 3046
			}
		}
		break;

3047 3048
#ifdef CONFIG_TCP_MD5SIG
	case TCP_MD5SIG:
3049
	case TCP_MD5SIG_EXT:
3050 3051 3052 3053
		if ((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN))
			err = tp->af_specific->md5_parse(sk, optname, optval, optlen);
		else
			err = -EINVAL;
3054 3055
		break;
#endif
3056
	case TCP_USER_TIMEOUT:
3057
		/* Cap the max time in ms TCP will retry or probe the window
3058 3059
		 * before giving up and aborting (ETIMEDOUT) a connection.
		 */
3060 3061 3062
		if (val < 0)
			err = -EINVAL;
		else
3063
			icsk->icsk_user_timeout = val;
3064
		break;
3065 3066 3067

	case TCP_FASTOPEN:
		if (val >= 0 && ((1 << sk->sk_state) & (TCPF_CLOSE |
3068
		    TCPF_LISTEN))) {
3069
			tcp_fastopen_init_key_once(net);
3070

3071
			fastopen_queue_tune(sk, val);
3072
		} else {
3073
			err = -EINVAL;
3074
		}
3075
		break;
3076 3077 3078
	case TCP_FASTOPEN_CONNECT:
		if (val > 1 || val < 0) {
			err = -EINVAL;
3079
		} else if (net->ipv4.sysctl_tcp_fastopen & TFO_CLIENT_ENABLE) {
3080 3081 3082 3083 3084 3085 3086 3087
			if (sk->sk_state == TCP_CLOSE)
				tp->fastopen_connect = val;
			else
				err = -EINVAL;
		} else {
			err = -EOPNOTSUPP;
		}
		break;
3088 3089 3090 3091 3092 3093 3094 3095
	case TCP_FASTOPEN_NO_COOKIE:
		if (val > 1 || val < 0)
			err = -EINVAL;
		else if (!((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN)))
			err = -EINVAL;
		else
			tp->fastopen_no_cookie = val;
		break;
3096 3097 3098 3099
	case TCP_TIMESTAMP:
		if (!tp->repair)
			err = -EPERM;
		else
3100
			tp->tsoffset = val - tcp_time_stamp_raw();
3101
		break;
3102 3103 3104
	case TCP_REPAIR_WINDOW:
		err = tcp_repair_set_window(tp, optval, optlen);
		break;
3105 3106 3107 3108
	case TCP_NOTSENT_LOWAT:
		tp->notsent_lowat = val;
		sk->sk_write_space(sk);
		break;
3109 3110 3111 3112 3113 3114
	case TCP_INQ:
		if (val > 1 || val < 0)
			err = -EINVAL;
		else
			tp->recvmsg_inq = val;
		break;
3115 3116 3117 3118 3119
	case TCP_TX_DELAY:
		if (val)
			tcp_enable_tx_delay();
		tp->tcp_tx_delay = val;
		break;
Linus Torvalds's avatar
Linus Torvalds committed
3120 3121 3122
	default:
		err = -ENOPROTOOPT;
		break;
3123 3124
	}

Linus Torvalds's avatar
Linus Torvalds committed
3125 3126 3127 3128
	release_sock(sk);
	return err;
}

3129
int tcp_setsockopt(struct sock *sk, int level, int optname, char __user *optval,
3130
		   unsigned int optlen)
3131
{
3132
	const struct inet_connection_sock *icsk = inet_csk(sk);
3133 3134 3135 3136 3137 3138

	if (level != SOL_TCP)
		return icsk->icsk_af_ops->setsockopt(sk, level, optname,
						     optval, optlen);
	return do_tcp_setsockopt(sk, level, optname, optval, optlen);
}
3139
EXPORT_SYMBOL(tcp_setsockopt);
3140 3141

#ifdef CONFIG_COMPAT
3142
int compat_tcp_setsockopt(struct sock *sk, int level, int optname,
3143
			  char __user *optval, unsigned int optlen)
3144
{
3145 3146 3147
	if (level != SOL_TCP)
		return inet_csk_compat_setsockopt(sk, level, optname,
						  optval, optlen);
3148 3149
	return do_tcp_setsockopt(sk, level, optname, optval, optlen);
}
3150
EXPORT_SYMBOL(compat_tcp_setsockopt);
3151 3152
#endif

3153 3154 3155 3156 3157 3158 3159 3160 3161
static void tcp_get_info_chrono_stats(const struct tcp_sock *tp,
				      struct tcp_info *info)
{
	u64 stats[__TCP_CHRONO_MAX], total = 0;
	enum tcp_chrono i;

	for (i = TCP_CHRONO_BUSY; i < __TCP_CHRONO_MAX; ++i) {
		stats[i] = tp->chrono_stat[i - 1];
		if (i == tp->chrono_type)
3162
			stats[i] += tcp_jiffies32 - tp->chrono_start;
3163 3164 3165 3166 3167 3168 3169 3170 3171
		stats[i] *= USEC_PER_SEC / HZ;
		total += stats[i];
	}

	info->tcpi_busy_time = total;
	info->tcpi_rwnd_limited = stats[TCP_CHRONO_RWND_LIMITED];
	info->tcpi_sndbuf_limited = stats[TCP_CHRONO_SNDBUF_LIMITED];
}

Linus Torvalds's avatar
Linus Torvalds committed
3172
/* Return information about state of tcp endpoint in API format. */
3173
void tcp_get_info(struct sock *sk, struct tcp_info *info)
Linus Torvalds's avatar
Linus Torvalds committed
3174
{
3175
	const struct tcp_sock *tp = tcp_sk(sk); /* iff sk_type == SOCK_STREAM */
3176
	const struct inet_connection_sock *icsk = inet_csk(sk);
3177
	unsigned long rate;
3178
	u32 now;
3179
	u64 rate64;
3180
	bool slow;
Linus Torvalds's avatar
Linus Torvalds committed
3181 3182

	memset(info, 0, sizeof(*info));
3183 3184
	if (sk->sk_type != SOCK_STREAM)
		return;
Linus Torvalds's avatar
Linus Torvalds committed
3185

3186
	info->tcpi_state = inet_sk_state_load(sk);
3187

3188 3189
	/* Report meaningful fields for all TCP states, including listeners */
	rate = READ_ONCE(sk->sk_pacing_rate);
3190
	rate64 = (rate != ~0UL) ? rate : ~0ULL;
3191
	info->tcpi_pacing_rate = rate64;
3192 3193

	rate = READ_ONCE(sk->sk_max_pacing_rate);
3194
	rate64 = (rate != ~0UL) ? rate : ~0ULL;
3195
	info->tcpi_max_pacing_rate = rate64;
3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208

	info->tcpi_reordering = tp->reordering;
	info->tcpi_snd_cwnd = tp->snd_cwnd;

	if (info->tcpi_state == TCP_LISTEN) {
		/* listeners aliased fields :
		 * tcpi_unacked -> Number of children ready for accept()
		 * tcpi_sacked  -> max backlog
		 */
		info->tcpi_unacked = sk->sk_ack_backlog;
		info->tcpi_sacked = sk->sk_max_ack_backlog;
		return;
	}
3209 3210 3211

	slow = lock_sock_fast(sk);

3212
	info->tcpi_ca_state = icsk->icsk_ca_state;
3213
	info->tcpi_retransmits = icsk->icsk_retransmits;
3214
	info->tcpi_probes = icsk->icsk_probes_out;
3215
	info->tcpi_backoff = icsk->icsk_backoff;
Linus Torvalds's avatar
Linus Torvalds committed
3216 3217 3218

	if (tp->rx_opt.tstamp_ok)
		info->tcpi_options |= TCPI_OPT_TIMESTAMPS;
3219
	if (tcp_is_sack(tp))
Linus Torvalds's avatar
Linus Torvalds committed
3220 3221 3222 3223 3224
		info->tcpi_options |= TCPI_OPT_SACK;
	if (tp->rx_opt.wscale_ok) {
		info->tcpi_options |= TCPI_OPT_WSCALE;
		info->tcpi_snd_wscale = tp->rx_opt.snd_wscale;
		info->tcpi_rcv_wscale = tp->rx_opt.rcv_wscale;
3225
	}
Linus Torvalds's avatar
Linus Torvalds committed
3226

3227
	if (tp->ecn_flags & TCP_ECN_OK)
Linus Torvalds's avatar
Linus Torvalds committed
3228
		info->tcpi_options |= TCPI_OPT_ECN;
3229 3230
	if (tp->ecn_flags & TCP_ECN_SEEN)
		info->tcpi_options |= TCPI_OPT_ECN_SEEN;
3231 3232
	if (tp->syn_data_acked)
		info->tcpi_options |= TCPI_OPT_SYN_DATA;
Linus Torvalds's avatar
Linus Torvalds committed
3233

3234 3235
	info->tcpi_rto = jiffies_to_usecs(icsk->icsk_rto);
	info->tcpi_ato = jiffies_to_usecs(icsk->icsk_ack.ato);
3236
	info->tcpi_snd_mss = tp->mss_cache;
3237
	info->tcpi_rcv_mss = icsk->icsk_ack.rcv_mss;
Linus Torvalds's avatar
Linus Torvalds committed
3238

3239 3240 3241
	info->tcpi_unacked = tp->packets_out;
	info->tcpi_sacked = tp->sacked_out;

Linus Torvalds's avatar
Linus Torvalds committed
3242 3243 3244
	info->tcpi_lost = tp->lost_out;
	info->tcpi_retrans = tp->retrans_out;

3245
	now = tcp_jiffies32;
Linus Torvalds's avatar
Linus Torvalds committed
3246
	info->tcpi_last_data_sent = jiffies_to_msecs(now - tp->lsndtime);
3247
	info->tcpi_last_data_recv = jiffies_to_msecs(now - icsk->icsk_ack.lrcvtime);
Linus Torvalds's avatar
Linus Torvalds committed
3248 3249
	info->tcpi_last_ack_recv = jiffies_to_msecs(now - tp->rcv_tstamp);

3250
	info->tcpi_pmtu = icsk->icsk_pmtu_cookie;
Linus Torvalds's avatar
Linus Torvalds committed
3251
	info->tcpi_rcv_ssthresh = tp->rcv_ssthresh;
3252 3253
	info->tcpi_rtt = tp->srtt_us >> 3;
	info->tcpi_rttvar = tp->mdev_us >> 2;
Linus Torvalds's avatar
Linus Torvalds committed
3254 3255 3256
	info->tcpi_snd_ssthresh = tp->snd_ssthresh;
	info->tcpi_advmss = tp->advmss;

3257
	info->tcpi_rcv_rtt = tp->rcv_rtt_est.rtt_us >> 3;
Linus Torvalds's avatar
Linus Torvalds committed
3258 3259 3260
	info->tcpi_rcv_space = tp->rcvq_space.space;

	info->tcpi_total_retrans = tp->total_retrans;
3261

3262 3263
	info->tcpi_bytes_acked = tp->bytes_acked;
	info->tcpi_bytes_received = tp->bytes_received;
3264
	info->tcpi_notsent_bytes = max_t(int, 0, tp->write_seq - tp->snd_nxt);
3265
	tcp_get_info_chrono_stats(tp, info);
3266

3267 3268
	info->tcpi_segs_out = tp->segs_out;
	info->tcpi_segs_in = tp->segs_in;
3269 3270

	info->tcpi_min_rtt = tcp_min_rtt(tp);
3271 3272
	info->tcpi_data_segs_in = tp->data_segs_in;
	info->tcpi_data_segs_out = tp->data_segs_out;
3273 3274

	info->tcpi_delivery_rate_app_limited = tp->rate_app_limited ? 1 : 0;
3275 3276
	rate64 = tcp_compute_delivery_rate(tp);
	if (rate64)
3277
		info->tcpi_delivery_rate = rate64;
3278 3279
	info->tcpi_delivered = tp->delivered;
	info->tcpi_delivered_ce = tp->delivered_ce;
Wei Wang's avatar
Wei Wang committed
3280
	info->tcpi_bytes_sent = tp->bytes_sent;
3281
	info->tcpi_bytes_retrans = tp->bytes_retrans;
3282
	info->tcpi_dsack_dups = tp->dsack_dups;
3283
	info->tcpi_reord_seen = tp->reord_seen;
3284
	unlock_sock_fast(sk, slow);
Linus Torvalds's avatar
Linus Torvalds committed
3285 3286 3287
}
EXPORT_SYMBOL_GPL(tcp_get_info);

3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307
static size_t tcp_opt_stats_get_size(void)
{
	return
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_BUSY */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_RWND_LIMITED */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_SNDBUF_LIMITED */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_DATA_SEGS_OUT */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_TOTAL_RETRANS */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_PACING_RATE */
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_DELIVERY_RATE */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_SND_CWND */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_REORDERING */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_MIN_RTT */
		nla_total_size(sizeof(u8)) + /* TCP_NLA_RECUR_RETRANS */
		nla_total_size(sizeof(u8)) + /* TCP_NLA_DELIVERY_RATE_APP_LMT */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_SNDQ_SIZE */
		nla_total_size(sizeof(u8)) + /* TCP_NLA_CA_STATE */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_SND_SSTHRESH */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_DELIVERED */
		nla_total_size(sizeof(u32)) + /* TCP_NLA_DELIVERED_CE */
Wei Wang's avatar
Wei Wang committed
3308
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_BYTES_SENT */
3309
		nla_total_size_64bit(sizeof(u64)) + /* TCP_NLA_BYTES_RETRANS */
3310
		nla_total_size(sizeof(u32)) + /* TCP_NLA_DSACK_DUPS */
3311
		nla_total_size(sizeof(u32)) + /* TCP_NLA_REORD_SEEN */
3312
		nla_total_size(sizeof(u32)) + /* TCP_NLA_SRTT */
3313 3314 3315
		0;
}

3316 3317 3318 3319 3320
struct sk_buff *tcp_get_timestamping_opt_stats(const struct sock *sk)
{
	const struct tcp_sock *tp = tcp_sk(sk);
	struct sk_buff *stats;
	struct tcp_info info;
3321
	unsigned long rate;
3322
	u64 rate64;
3323

3324
	stats = alloc_skb(tcp_opt_stats_get_size(), GFP_ATOMIC);
3325 3326 3327 3328 3329 3330 3331 3332 3333 3334
	if (!stats)
		return NULL;

	tcp_get_info_chrono_stats(tp, &info);
	nla_put_u64_64bit(stats, TCP_NLA_BUSY,
			  info.tcpi_busy_time, TCP_NLA_PAD);
	nla_put_u64_64bit(stats, TCP_NLA_RWND_LIMITED,
			  info.tcpi_rwnd_limited, TCP_NLA_PAD);
	nla_put_u64_64bit(stats, TCP_NLA_SNDBUF_LIMITED,
			  info.tcpi_sndbuf_limited, TCP_NLA_PAD);
3335 3336 3337 3338
	nla_put_u64_64bit(stats, TCP_NLA_DATA_SEGS_OUT,
			  tp->data_segs_out, TCP_NLA_PAD);
	nla_put_u64_64bit(stats, TCP_NLA_TOTAL_RETRANS,
			  tp->total_retrans, TCP_NLA_PAD);
3339 3340

	rate = READ_ONCE(sk->sk_pacing_rate);
3341
	rate64 = (rate != ~0UL) ? rate : ~0ULL;
3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352
	nla_put_u64_64bit(stats, TCP_NLA_PACING_RATE, rate64, TCP_NLA_PAD);

	rate64 = tcp_compute_delivery_rate(tp);
	nla_put_u64_64bit(stats, TCP_NLA_DELIVERY_RATE, rate64, TCP_NLA_PAD);

	nla_put_u32(stats, TCP_NLA_SND_CWND, tp->snd_cwnd);
	nla_put_u32(stats, TCP_NLA_REORDERING, tp->reordering);
	nla_put_u32(stats, TCP_NLA_MIN_RTT, tcp_min_rtt(tp));

	nla_put_u8(stats, TCP_NLA_RECUR_RETRANS, inet_csk(sk)->icsk_retransmits);
	nla_put_u8(stats, TCP_NLA_DELIVERY_RATE_APP_LMT, !!tp->rate_app_limited);
3353
	nla_put_u32(stats, TCP_NLA_SND_SSTHRESH, tp->snd_ssthresh);
3354 3355
	nla_put_u32(stats, TCP_NLA_DELIVERED, tp->delivered);
	nla_put_u32(stats, TCP_NLA_DELIVERED_CE, tp->delivered_ce);
3356 3357

	nla_put_u32(stats, TCP_NLA_SNDQ_SIZE, tp->write_seq - tp->snd_una);
3358
	nla_put_u8(stats, TCP_NLA_CA_STATE, inet_csk(sk)->icsk_ca_state);
3359

Wei Wang's avatar
Wei Wang committed
3360 3361
	nla_put_u64_64bit(stats, TCP_NLA_BYTES_SENT, tp->bytes_sent,
			  TCP_NLA_PAD);
3362 3363
	nla_put_u64_64bit(stats, TCP_NLA_BYTES_RETRANS, tp->bytes_retrans,
			  TCP_NLA_PAD);
3364
	nla_put_u32(stats, TCP_NLA_DSACK_DUPS, tp->dsack_dups);
3365
	nla_put_u32(stats, TCP_NLA_REORD_SEEN, tp->reord_seen);
3366
	nla_put_u32(stats, TCP_NLA_SRTT, tp->srtt_us >> 3);
Wei Wang's avatar
Wei Wang committed
3367

3368 3369 3370
	return stats;
}

3371 3372
static int do_tcp_getsockopt(struct sock *sk, int level,
		int optname, char __user *optval, int __user *optlen)
Linus Torvalds's avatar
Linus Torvalds committed
3373
{
3374
	struct inet_connection_sock *icsk = inet_csk(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3375
	struct tcp_sock *tp = tcp_sk(sk);
3376
	struct net *net = sock_net(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3377 3378 3379 3380 3381 3382 3383 3384 3385 3386 3387 3388
	int val, len;

	if (get_user(len, optlen))
		return -EFAULT;

	len = min_t(unsigned int, len, sizeof(int));

	if (len < 0)
		return -EINVAL;

	switch (optname) {
	case TCP_MAXSEG:
3389
		val = tp->mss_cache;
Linus Torvalds's avatar
Linus Torvalds committed
3390 3391
		if (!val && ((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN)))
			val = tp->rx_opt.user_mss;
3392 3393
		if (tp->repair)
			val = tp->rx_opt.mss_clamp;
Linus Torvalds's avatar
Linus Torvalds committed
3394 3395 3396 3397 3398 3399 3400 3401
		break;
	case TCP_NODELAY:
		val = !!(tp->nonagle&TCP_NAGLE_OFF);
		break;
	case TCP_CORK:
		val = !!(tp->nonagle&TCP_NAGLE_CORK);
		break;
	case TCP_KEEPIDLE:
Eric Dumazet's avatar
Eric Dumazet committed
3402
		val = keepalive_time_when(tp) / HZ;
Linus Torvalds's avatar
Linus Torvalds committed
3403 3404
		break;
	case TCP_KEEPINTVL:
Eric Dumazet's avatar
Eric Dumazet committed
3405
		val = keepalive_intvl_when(tp) / HZ;
Linus Torvalds's avatar
Linus Torvalds committed
3406 3407
		break;
	case TCP_KEEPCNT:
Eric Dumazet's avatar
Eric Dumazet committed
3408
		val = keepalive_probes(tp);
Linus Torvalds's avatar
Linus Torvalds committed
3409 3410
		break;
	case TCP_SYNCNT:
3411
		val = icsk->icsk_syn_retries ? : net->ipv4.sysctl_tcp_syn_retries;
Linus Torvalds's avatar
Linus Torvalds committed
3412 3413 3414 3415
		break;
	case TCP_LINGER2:
		val = tp->linger2;
		if (val >= 0)
3416
			val = (val ? : net->ipv4.sysctl_tcp_fin_timeout) / HZ;
Linus Torvalds's avatar
Linus Torvalds committed
3417 3418
		break;
	case TCP_DEFER_ACCEPT:
3419 3420
		val = retrans_to_secs(icsk->icsk_accept_queue.rskq_defer_accept,
				      TCP_TIMEOUT_INIT / HZ, TCP_RTO_MAX / HZ);
Linus Torvalds's avatar
Linus Torvalds committed
3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439
		break;
	case TCP_WINDOW_CLAMP:
		val = tp->window_clamp;
		break;
	case TCP_INFO: {
		struct tcp_info info;

		if (get_user(len, optlen))
			return -EFAULT;

		tcp_get_info(sk, &info);

		len = min_t(unsigned int, len, sizeof(info));
		if (put_user(len, optlen))
			return -EFAULT;
		if (copy_to_user(optval, &info, len))
			return -EFAULT;
		return 0;
	}
3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459
	case TCP_CC_INFO: {
		const struct tcp_congestion_ops *ca_ops;
		union tcp_cc_info info;
		size_t sz = 0;
		int attr;

		if (get_user(len, optlen))
			return -EFAULT;

		ca_ops = icsk->icsk_ca_ops;
		if (ca_ops && ca_ops->get_info)
			sz = ca_ops->get_info(sk, ~0U, &attr, &info);

		len = min_t(unsigned int, len, sz);
		if (put_user(len, optlen))
			return -EFAULT;
		if (copy_to_user(optval, &info, len))
			return -EFAULT;
		return 0;
	}
Linus Torvalds's avatar
Linus Torvalds committed
3460
	case TCP_QUICKACK:
Wei Wang's avatar
Wei Wang committed
3461
		val = !inet_csk_in_pingpong_mode(sk);
Linus Torvalds's avatar
Linus Torvalds committed
3462
		break;
3463 3464 3465 3466 3467 3468 3469

	case TCP_CONGESTION:
		if (get_user(len, optlen))
			return -EFAULT;
		len = min_t(unsigned int, len, TCP_CA_NAME_MAX);
		if (put_user(len, optlen))
			return -EFAULT;
3470
		if (copy_to_user(optval, icsk->icsk_ca_ops->name, len))
3471 3472
			return -EFAULT;
		return 0;
3473

Dave Watson's avatar
Dave Watson committed
3474 3475 3476 3477
	case TCP_ULP:
		if (get_user(len, optlen))
			return -EFAULT;
		len = min_t(unsigned int, len, TCP_ULP_NAME_MAX);
3478 3479 3480 3481 3482
		if (!icsk->icsk_ulp_ops) {
			if (put_user(0, optlen))
				return -EFAULT;
			return 0;
		}
Dave Watson's avatar
Dave Watson committed
3483 3484 3485 3486 3487 3488
		if (put_user(len, optlen))
			return -EFAULT;
		if (copy_to_user(optval, icsk->icsk_ulp_ops->name, len))
			return -EFAULT;
		return 0;

3489
	case TCP_FASTOPEN_KEY: {
3490
		__u8 key[TCP_FASTOPEN_KEY_BUF_LENGTH];
3491
		struct tcp_fastopen_context *ctx;
3492
		unsigned int key_len = 0;
3493 3494 3495 3496 3497 3498

		if (get_user(len, optlen))
			return -EFAULT;

		rcu_read_lock();
		ctx = rcu_dereference(icsk->icsk_accept_queue.fastopenq.ctx);
3499 3500 3501 3502 3503
		if (ctx) {
			key_len = tcp_fastopen_context_len(ctx) *
					TCP_FASTOPEN_KEY_LENGTH;
			memcpy(&key[0], &ctx->key[0], key_len);
		}
3504 3505
		rcu_read_unlock();

3506
		len = min_t(unsigned int, len, key_len);
3507 3508 3509 3510 3511 3512
		if (put_user(len, optlen))
			return -EFAULT;
		if (copy_to_user(optval, key, len))
			return -EFAULT;
		return 0;
	}
3513 3514 3515
	case TCP_THIN_LINEAR_TIMEOUTS:
		val = tp->thin_lto;
		break;
3516

3517
	case TCP_THIN_DUPACK:
3518
		val = 0;
3519
		break;
3520

Pavel Emelyanov's avatar
Pavel Emelyanov committed
3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531
	case TCP_REPAIR:
		val = tp->repair;
		break;

	case TCP_REPAIR_QUEUE:
		if (tp->repair)
			val = tp->repair_queue;
		else
			return -EINVAL;
		break;

3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553
	case TCP_REPAIR_WINDOW: {
		struct tcp_repair_window opt;

		if (get_user(len, optlen))
			return -EFAULT;

		if (len != sizeof(opt))
			return -EINVAL;

		if (!tp->repair)
			return -EPERM;

		opt.snd_wl1	= tp->snd_wl1;
		opt.snd_wnd	= tp->snd_wnd;
		opt.max_window	= tp->max_window;
		opt.rcv_wnd	= tp->rcv_wnd;
		opt.rcv_wup	= tp->rcv_wup;

		if (copy_to_user(optval, &opt, len))
			return -EFAULT;
		return 0;
	}
Pavel Emelyanov's avatar
Pavel Emelyanov committed
3554 3555 3556 3557 3558 3559 3560 3561 3562
	case TCP_QUEUE_SEQ:
		if (tp->repair_queue == TCP_SEND_QUEUE)
			val = tp->write_seq;
		else if (tp->repair_queue == TCP_RECV_QUEUE)
			val = tp->rcv_nxt;
		else
			return -EINVAL;
		break;

3563
	case TCP_USER_TIMEOUT:
3564
		val = icsk->icsk_user_timeout;
3565
		break;
3566 3567

	case TCP_FASTOPEN:
3568
		val = icsk->icsk_accept_queue.fastopenq.max_qlen;
3569 3570
		break;

3571 3572 3573 3574
	case TCP_FASTOPEN_CONNECT:
		val = tp->fastopen_connect;
		break;

3575 3576 3577 3578
	case TCP_FASTOPEN_NO_COOKIE:
		val = tp->fastopen_no_cookie;
		break;

3579 3580 3581 3582
	case TCP_TX_DELAY:
		val = tp->tcp_tx_delay;
		break;

3583
	case TCP_TIMESTAMP:
3584
		val = tcp_time_stamp_raw() + tp->tsoffset;
3585
		break;
3586 3587 3588
	case TCP_NOTSENT_LOWAT:
		val = tp->notsent_lowat;
		break;
3589 3590 3591
	case TCP_INQ:
		val = tp->recvmsg_inq;
		break;
3592 3593 3594 3595 3596 3597 3598 3599 3600
	case TCP_SAVE_SYN:
		val = tp->save_syn;
		break;
	case TCP_SAVED_SYN: {
		if (get_user(len, optlen))
			return -EFAULT;

		lock_sock(sk);
		if (tp->saved_syn) {
3601 3602 3603 3604 3605 3606 3607 3608 3609
			if (len < tp->saved_syn[0]) {
				if (put_user(tp->saved_syn[0], optlen)) {
					release_sock(sk);
					return -EFAULT;
				}
				release_sock(sk);
				return -EINVAL;
			}
			len = tp->saved_syn[0];
3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627
			if (put_user(len, optlen)) {
				release_sock(sk);
				return -EFAULT;
			}
			if (copy_to_user(optval, tp->saved_syn + 1, len)) {
				release_sock(sk);
				return -EFAULT;
			}
			tcp_saved_syn_free(tp);
			release_sock(sk);
		} else {
			release_sock(sk);
			len = 0;
			if (put_user(len, optlen))
				return -EFAULT;
		}
		return 0;
	}
3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646
#ifdef CONFIG_MMU
	case TCP_ZEROCOPY_RECEIVE: {
		struct tcp_zerocopy_receive zc;
		int err;

		if (get_user(len, optlen))
			return -EFAULT;
		if (len != sizeof(zc))
			return -EINVAL;
		if (copy_from_user(&zc, optval, len))
			return -EFAULT;
		lock_sock(sk);
		err = tcp_zerocopy_receive(sk, &zc);
		release_sock(sk);
		if (!err && copy_to_user(optval, &zc, len))
			err = -EFAULT;
		return err;
	}
#endif
Linus Torvalds's avatar
Linus Torvalds committed
3647 3648
	default:
		return -ENOPROTOOPT;
3649
	}
Linus Torvalds's avatar
Linus Torvalds committed
3650 3651 3652 3653 3654 3655 3656 3657

	if (put_user(len, optlen))
		return -EFAULT;
	if (copy_to_user(optval, &val, len))
		return -EFAULT;
	return 0;
}

3658 3659 3660 3661 3662 3663 3664 3665 3666 3667
int tcp_getsockopt(struct sock *sk, int level, int optname, char __user *optval,
		   int __user *optlen)
{
	struct inet_connection_sock *icsk = inet_csk(sk);

	if (level != SOL_TCP)
		return icsk->icsk_af_ops->getsockopt(sk, level, optname,
						     optval, optlen);
	return do_tcp_getsockopt(sk, level, optname, optval, optlen);
}
3668
EXPORT_SYMBOL(tcp_getsockopt);
3669 3670

#ifdef CONFIG_COMPAT
3671 3672
int compat_tcp_getsockopt(struct sock *sk, int level, int optname,
			  char __user *optval, int __user *optlen)
3673
{
3674 3675 3676
	if (level != SOL_TCP)
		return inet_csk_compat_getsockopt(sk, level, optname,
						  optval, optlen);
3677 3678
	return do_tcp_getsockopt(sk, level, optname, optval, optlen);
}
3679
EXPORT_SYMBOL(compat_tcp_getsockopt);
3680
#endif
Linus Torvalds's avatar
Linus Torvalds committed
3681

3682
#ifdef CONFIG_TCP_MD5SIG
3683
static DEFINE_PER_CPU(struct tcp_md5sig_pool, tcp_md5sig_pool);
3684
static DEFINE_MUTEX(tcp_md5sig_mutex);
3685
static bool tcp_md5sig_pool_populated = false;
3686

3687
static void __tcp_alloc_md5sig_pool(void)
3688
{
Herbert Xu's avatar
Herbert Xu committed
3689
	struct crypto_ahash *hash;
3690 3691
	int cpu;

Herbert Xu's avatar
Herbert Xu committed
3692
	hash = crypto_alloc_ahash("md5", 0, CRYPTO_ALG_ASYNC);
3693
	if (IS_ERR(hash))
Herbert Xu's avatar
Herbert Xu committed
3694 3695
		return;

3696
	for_each_possible_cpu(cpu) {
3697
		void *scratch = per_cpu(tcp_md5sig_pool, cpu).scratch;
Herbert Xu's avatar
Herbert Xu committed
3698
		struct ahash_request *req;
3699

3700 3701 3702 3703 3704 3705 3706 3707 3708
		if (!scratch) {
			scratch = kmalloc_node(sizeof(union tcp_md5sum_block) +
					       sizeof(struct tcphdr),
					       GFP_KERNEL,
					       cpu_to_node(cpu));
			if (!scratch)
				return;
			per_cpu(tcp_md5sig_pool, cpu).scratch = scratch;
		}
Herbert Xu's avatar
Herbert Xu committed
3709 3710 3711 3712 3713 3714 3715 3716 3717 3718
		if (per_cpu(tcp_md5sig_pool, cpu).md5_req)
			continue;

		req = ahash_request_alloc(hash, GFP_KERNEL);
		if (!req)
			return;

		ahash_request_set_callback(req, 0, NULL, NULL);

		per_cpu(tcp_md5sig_pool, cpu).md5_req = req;
3719
	}
3720 3721
	/* before setting tcp_md5sig_pool_populated, we must commit all writes
	 * to memory. See smp_rmb() in tcp_get_md5sig_pool()
3722 3723
	 */
	smp_wmb();
3724
	tcp_md5sig_pool_populated = true;
3725 3726
}

3727
bool tcp_alloc_md5sig_pool(void)
3728
{
3729
	if (unlikely(!tcp_md5sig_pool_populated)) {
3730 3731
		mutex_lock(&tcp_md5sig_mutex);

3732
		if (!tcp_md5sig_pool_populated) {
3733
			__tcp_alloc_md5sig_pool();
3734
			if (tcp_md5sig_pool_populated)
3735
				static_branch_inc(&tcp_md5_needed);
3736
		}
3737 3738

		mutex_unlock(&tcp_md5sig_mutex);
3739
	}
3740
	return tcp_md5sig_pool_populated;
3741 3742 3743
}
EXPORT_SYMBOL(tcp_alloc_md5sig_pool);

3744 3745 3746 3747 3748 3749 3750 3751 3752

/**
 *	tcp_get_md5sig_pool - get md5sig_pool for this user
 *
 *	We use percpu structure, so if we succeed, we exit with preemption
 *	and BH disabled, to make sure another thread or softirq handling
 *	wont try to get same context.
 */
struct tcp_md5sig_pool *tcp_get_md5sig_pool(void)
3753
{
3754
	local_bh_disable();
3755

3756 3757 3758 3759 3760
	if (tcp_md5sig_pool_populated) {
		/* coupled with smp_wmb() in __tcp_alloc_md5sig_pool() */
		smp_rmb();
		return this_cpu_ptr(&tcp_md5sig_pool);
	}
3761 3762 3763 3764
	local_bh_enable();
	return NULL;
}
EXPORT_SYMBOL(tcp_get_md5sig_pool);
3765

3766
int tcp_md5_hash_skb_data(struct tcp_md5sig_pool *hp,
3767
			  const struct sk_buff *skb, unsigned int header_len)
3768 3769 3770
{
	struct scatterlist sg;
	const struct tcphdr *tp = tcp_hdr(skb);
Herbert Xu's avatar
Herbert Xu committed
3771
	struct ahash_request *req = hp->md5_req;
3772 3773 3774
	unsigned int i;
	const unsigned int head_data_len = skb_headlen(skb) > header_len ?
					   skb_headlen(skb) - header_len : 0;
3775
	const struct skb_shared_info *shi = skb_shinfo(skb);
3776
	struct sk_buff *frag_iter;
3777 3778 3779 3780

	sg_init_table(&sg, 1);

	sg_set_buf(&sg, ((u8 *) tp) + header_len, head_data_len);
Herbert Xu's avatar
Herbert Xu committed
3781 3782
	ahash_request_set_crypt(req, &sg, NULL, head_data_len);
	if (crypto_ahash_update(req))
3783 3784 3785
		return 1;

	for (i = 0; i < shi->nr_frags; ++i) {
3786
		const skb_frag_t *f = &shi->frags[i];
3787 3788 3789 3790 3791
		unsigned int offset = f->page_offset;
		struct page *page = skb_frag_page(f) + (offset >> PAGE_SHIFT);

		sg_set_page(&sg, page, skb_frag_size(f),
			    offset_in_page(offset));
Herbert Xu's avatar
Herbert Xu committed
3792 3793
		ahash_request_set_crypt(req, &sg, NULL, skb_frag_size(f));
		if (crypto_ahash_update(req))
3794 3795 3796
			return 1;
	}

3797 3798 3799 3800
	skb_walk_frags(skb, frag_iter)
		if (tcp_md5_hash_skb_data(hp, frag_iter, 0))
			return 1;

3801 3802 3803 3804
	return 0;
}
EXPORT_SYMBOL(tcp_md5_hash_skb_data);

3805
int tcp_md5_hash_key(struct tcp_md5sig_pool *hp, const struct tcp_md5sig_key *key)
3806 3807 3808 3809
{
	struct scatterlist sg;

	sg_init_one(&sg, key->key, key->keylen);
Herbert Xu's avatar
Herbert Xu committed
3810 3811
	ahash_request_set_crypt(hp->md5_req, &sg, NULL, key->keylen);
	return crypto_ahash_update(hp->md5_req);
3812 3813 3814
}
EXPORT_SYMBOL(tcp_md5_hash_key);

3815 3816
#endif

Andi Kleen's avatar
Andi Kleen committed
3817 3818
void tcp_done(struct sock *sk)
{
3819 3820
	struct request_sock *req = tcp_sk(sk)->fastopen_rsk;

3821
	if (sk->sk_state == TCP_SYN_SENT || sk->sk_state == TCP_SYN_RECV)
3822
		TCP_INC_STATS(sock_net(sk), TCP_MIB_ATTEMPTFAILS);
Andi Kleen's avatar
Andi Kleen committed
3823 3824 3825

	tcp_set_state(sk, TCP_CLOSE);
	tcp_clear_xmit_timers(sk);
3826
	if (req)
3827
		reqsk_fastopen_remove(sk, req, false);
Andi Kleen's avatar
Andi Kleen committed
3828 3829 3830 3831 3832 3833 3834 3835 3836 3837

	sk->sk_shutdown = SHUTDOWN_MASK;

	if (!sock_flag(sk, SOCK_DEAD))
		sk->sk_state_change(sk);
	else
		inet_csk_destroy_sock(sk);
}
EXPORT_SYMBOL_GPL(tcp_done);

3838 3839 3840
int tcp_abort(struct sock *sk, int err)
{
	if (!sk_fullsock(sk)) {
3841 3842 3843 3844
		if (sk->sk_state == TCP_NEW_SYN_RECV) {
			struct request_sock *req = inet_reqsk(sk);

			local_bh_disable();
3845
			inet_csk_reqsk_queue_drop(req->rsk_listener, req);
3846 3847 3848
			local_bh_enable();
			return 0;
		}
3849 3850 3851 3852 3853 3854
		return -EOPNOTSUPP;
	}

	/* Don't race with userspace socket closes such as tcp_close. */
	lock_sock(sk);

3855 3856 3857 3858 3859
	if (sk->sk_state == TCP_LISTEN) {
		tcp_set_state(sk, TCP_CLOSE);
		inet_csk_listen_stop(sk);
	}

3860 3861 3862 3863 3864 3865 3866 3867 3868 3869 3870 3871 3872 3873 3874 3875
	/* Don't race with BH socket closes such as inet_csk_listen_stop. */
	local_bh_disable();
	bh_lock_sock(sk);

	if (!sock_flag(sk, SOCK_DEAD)) {
		sk->sk_err = err;
		/* This barrier is coupled with smp_rmb() in tcp_poll() */
		smp_wmb();
		sk->sk_error_report(sk);
		if (tcp_need_reset(sk->sk_state))
			tcp_send_active_reset(sk, GFP_ATOMIC);
		tcp_done(sk);
	}

	bh_unlock_sock(sk);
	local_bh_enable();
3876
	tcp_write_queue_purge(sk);
3877 3878 3879 3880 3881
	release_sock(sk);
	return 0;
}
EXPORT_SYMBOL_GPL(tcp_abort);

3882
extern struct tcp_congestion_ops tcp_reno;
Linus Torvalds's avatar
Linus Torvalds committed
3883 3884 3885 3886

static __initdata unsigned long thash_entries;
static int __init set_thash_entries(char *str)
{
3887 3888
	ssize_t ret;

Linus Torvalds's avatar
Linus Torvalds committed
3889 3890
	if (!str)
		return 0;
3891 3892 3893 3894 3895

	ret = kstrtoul(str, 0, &thash_entries);
	if (ret)
		return 0;

Linus Torvalds's avatar
Linus Torvalds committed
3896 3897 3898 3899
	return 1;
}
__setup("thash_entries=", set_thash_entries);

3900
static void __init tcp_init_mem(void)
3901
{
3902 3903
	unsigned long limit = nr_free_buffer_pages() / 16;

3904
	limit = max(limit, 128UL);
3905 3906 3907
	sysctl_tcp_mem[0] = limit / 4 * 3;		/* 4.68 % */
	sysctl_tcp_mem[1] = limit;			/* 6.25 % */
	sysctl_tcp_mem[2] = sysctl_tcp_mem[0] * 2;	/* 9.37 % */
3908 3909
}

Linus Torvalds's avatar
Linus Torvalds committed
3910 3911
void __init tcp_init(void)
{
3912
	int max_rshare, max_wshare, cnt;
3913
	unsigned long limit;
3914
	unsigned int i;
Linus Torvalds's avatar
Linus Torvalds committed
3915

3916
	BUILD_BUG_ON(TCP_MIN_SND_MSS <= MAX_TCP_OPTION_SPACE);
3917 3918
	BUILD_BUG_ON(sizeof(struct tcp_skb_cb) >
		     FIELD_SIZEOF(struct sk_buff, cb));
Linus Torvalds's avatar
Linus Torvalds committed
3919

3920 3921
	percpu_counter_init(&tcp_sockets_allocated, 0, GFP_KERNEL);
	percpu_counter_init(&tcp_orphan_count, 0, GFP_KERNEL);
3922
	inet_hashinfo_init(&tcp_hashinfo);
3923 3924 3925
	inet_hashinfo2_init(&tcp_hashinfo, "tcp_listen_portaddr_hash",
			    thash_entries, 21,  /* one slot per 2 MB*/
			    0, 64 * 1024);
3926 3927 3928
	tcp_hashinfo.bind_bucket_cachep =
		kmem_cache_create("tcp_bind_bucket",
				  sizeof(struct inet_bind_bucket), 0,
3929
				  SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
Linus Torvalds's avatar
Linus Torvalds committed
3930 3931 3932 3933 3934 3935

	/* Size and allocate the main established and bind bucket
	 * hash tables.
	 *
	 * The methodology is similar to that of the buffer cache.
	 */
3936
	tcp_hashinfo.ehash =
Linus Torvalds's avatar
Linus Torvalds committed
3937
		alloc_large_system_hash("TCP established",
3938
					sizeof(struct inet_ehash_bucket),
Linus Torvalds's avatar
Linus Torvalds committed
3939
					thash_entries,
3940
					17, /* one slot per 128 KB of memory */
3941
					0,
Linus Torvalds's avatar
Linus Torvalds committed
3942
					NULL,
3943
					&tcp_hashinfo.ehash_mask,
3944
					0,
3945
					thash_entries ? 0 : 512 * 1024);
Eric Dumazet's avatar
Eric Dumazet committed
3946
	for (i = 0; i <= tcp_hashinfo.ehash_mask; i++)
3947
		INIT_HLIST_NULLS_HEAD(&tcp_hashinfo.ehash[i].chain, i);
Eric Dumazet's avatar
Eric Dumazet committed
3948

3949 3950
	if (inet_ehash_locks_alloc(&tcp_hashinfo))
		panic("TCP: failed to alloc ehash_locks");
3951
	tcp_hashinfo.bhash =
Linus Torvalds's avatar
Linus Torvalds committed
3952
		alloc_large_system_hash("TCP bind",
3953
					sizeof(struct inet_bind_hashbucket),
3954
					tcp_hashinfo.ehash_mask + 1,
3955
					17, /* one slot per 128 KB of memory */
3956
					0,
3957
					&tcp_hashinfo.bhash_size,
Linus Torvalds's avatar
Linus Torvalds committed
3958
					NULL,
3959
					0,
Linus Torvalds's avatar
Linus Torvalds committed
3960
					64 * 1024);
3961
	tcp_hashinfo.bhash_size = 1U << tcp_hashinfo.bhash_size;
3962 3963 3964
	for (i = 0; i < tcp_hashinfo.bhash_size; i++) {
		spin_lock_init(&tcp_hashinfo.bhash[i].lock);
		INIT_HLIST_HEAD(&tcp_hashinfo.bhash[i].chain);
Linus Torvalds's avatar
Linus Torvalds committed
3965 3966
	}

3967 3968 3969

	cnt = tcp_hashinfo.ehash_mask + 1;
	sysctl_tcp_max_orphans = cnt / 2;
Linus Torvalds's avatar
Linus Torvalds committed
3970

3971
	tcp_init_mem();
3972
	/* Set per-socket limits to no more than 1/128 the pressure threshold */
Eric Dumazet's avatar
Eric Dumazet committed
3973
	limit = nr_free_buffer_pages() << (PAGE_SHIFT - 7);
3974 3975
	max_wshare = min(4UL*1024*1024, limit);
	max_rshare = min(6UL*1024*1024, limit);
3976

3977 3978 3979
	init_net.ipv4.sysctl_tcp_wmem[0] = SK_MEM_QUANTUM;
	init_net.ipv4.sysctl_tcp_wmem[1] = 16*1024;
	init_net.ipv4.sysctl_tcp_wmem[2] = max(64*1024, max_wshare);
3980

3981
	init_net.ipv4.sysctl_tcp_rmem[0] = SK_MEM_QUANTUM;
3982 3983
	init_net.ipv4.sysctl_tcp_rmem[1] = 131072;
	init_net.ipv4.sysctl_tcp_rmem[2] = max(131072, max_rshare);
Linus Torvalds's avatar
Linus Torvalds committed
3984

3985
	pr_info("Hash tables configured (established %u bind %u)\n",
3986
		tcp_hashinfo.ehash_mask + 1, tcp_hashinfo.bhash_size);
3987

3988
	tcp_v4_init();
3989
	tcp_metrics_init();
3990
	BUG_ON(tcp_register_congestion_control(&tcp_reno) != 0);
Eric Dumazet's avatar
Eric Dumazet committed
3991
	tcp_tasklet_init();
Linus Torvalds's avatar
Linus Torvalds committed
3992
}