xref: /linux/net/ipv4/tcp.c (revision 295ff7edb8f72b77d524759266f7524deae379b3)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  * INET		An implementation of the TCP/IP protocol suite for the LINUX
31da177e4SLinus Torvalds  *		operating system.  INET is implemented using the  BSD Socket
41da177e4SLinus Torvalds  *		interface as the means of communication with the user level.
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *		Implementation of the Transmission Control Protocol(TCP).
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  * Version:	$Id: tcp.c,v 1.216 2002/02/01 22:01:04 davem Exp $
91da177e4SLinus Torvalds  *
1002c30a84SJesper Juhl  * Authors:	Ross Biro
111da177e4SLinus Torvalds  *		Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
121da177e4SLinus Torvalds  *		Mark Evans, <evansmp@uhura.aston.ac.uk>
131da177e4SLinus Torvalds  *		Corey Minyard <wf-rch!minyard@relay.EU.net>
141da177e4SLinus Torvalds  *		Florian La Roche, <flla@stud.uni-sb.de>
151da177e4SLinus Torvalds  *		Charles Hedrick, <hedrick@klinzhai.rutgers.edu>
161da177e4SLinus Torvalds  *		Linus Torvalds, <torvalds@cs.helsinki.fi>
171da177e4SLinus Torvalds  *		Alan Cox, <gw4pts@gw4pts.ampr.org>
181da177e4SLinus Torvalds  *		Matthew Dillon, <dillon@apollo.west.oic.com>
191da177e4SLinus Torvalds  *		Arnt Gulbrandsen, <agulbra@nvg.unit.no>
201da177e4SLinus Torvalds  *		Jorge Cwik, <jorge@laser.satlink.net>
211da177e4SLinus Torvalds  *
221da177e4SLinus Torvalds  * Fixes:
231da177e4SLinus Torvalds  *		Alan Cox	:	Numerous verify_area() calls
241da177e4SLinus Torvalds  *		Alan Cox	:	Set the ACK bit on a reset
251da177e4SLinus Torvalds  *		Alan Cox	:	Stopped it crashing if it closed while
261da177e4SLinus Torvalds  *					sk->inuse=1 and was trying to connect
271da177e4SLinus Torvalds  *					(tcp_err()).
281da177e4SLinus Torvalds  *		Alan Cox	:	All icmp error handling was broken
291da177e4SLinus Torvalds  *					pointers passed where wrong and the
301da177e4SLinus Torvalds  *					socket was looked up backwards. Nobody
311da177e4SLinus Torvalds  *					tested any icmp error code obviously.
321da177e4SLinus Torvalds  *		Alan Cox	:	tcp_err() now handled properly. It
331da177e4SLinus Torvalds  *					wakes people on errors. poll
341da177e4SLinus Torvalds  *					behaves and the icmp error race
351da177e4SLinus Torvalds  *					has gone by moving it into sock.c
361da177e4SLinus Torvalds  *		Alan Cox	:	tcp_send_reset() fixed to work for
371da177e4SLinus Torvalds  *					everything not just packets for
381da177e4SLinus Torvalds  *					unknown sockets.
391da177e4SLinus Torvalds  *		Alan Cox	:	tcp option processing.
401da177e4SLinus Torvalds  *		Alan Cox	:	Reset tweaked (still not 100%) [Had
411da177e4SLinus Torvalds  *					syn rule wrong]
421da177e4SLinus Torvalds  *		Herp Rosmanith  :	More reset fixes
431da177e4SLinus Torvalds  *		Alan Cox	:	No longer acks invalid rst frames.
441da177e4SLinus Torvalds  *					Acking any kind of RST is right out.
451da177e4SLinus Torvalds  *		Alan Cox	:	Sets an ignore me flag on an rst
461da177e4SLinus Torvalds  *					receive otherwise odd bits of prattle
471da177e4SLinus Torvalds  *					escape still
481da177e4SLinus Torvalds  *		Alan Cox	:	Fixed another acking RST frame bug.
491da177e4SLinus Torvalds  *					Should stop LAN workplace lockups.
501da177e4SLinus Torvalds  *		Alan Cox	: 	Some tidyups using the new skb list
511da177e4SLinus Torvalds  *					facilities
521da177e4SLinus Torvalds  *		Alan Cox	:	sk->keepopen now seems to work
531da177e4SLinus Torvalds  *		Alan Cox	:	Pulls options out correctly on accepts
541da177e4SLinus Torvalds  *		Alan Cox	:	Fixed assorted sk->rqueue->next errors
551da177e4SLinus Torvalds  *		Alan Cox	:	PSH doesn't end a TCP read. Switched a
561da177e4SLinus Torvalds  *					bit to skb ops.
571da177e4SLinus Torvalds  *		Alan Cox	:	Tidied tcp_data to avoid a potential
581da177e4SLinus Torvalds  *					nasty.
591da177e4SLinus Torvalds  *		Alan Cox	:	Added some better commenting, as the
601da177e4SLinus Torvalds  *					tcp is hard to follow
611da177e4SLinus Torvalds  *		Alan Cox	:	Removed incorrect check for 20 * psh
621da177e4SLinus Torvalds  *	Michael O'Reilly	:	ack < copied bug fix.
631da177e4SLinus Torvalds  *	Johannes Stille		:	Misc tcp fixes (not all in yet).
641da177e4SLinus Torvalds  *		Alan Cox	:	FIN with no memory -> CRASH
651da177e4SLinus Torvalds  *		Alan Cox	:	Added socket option proto entries.
661da177e4SLinus Torvalds  *					Also added awareness of them to accept.
671da177e4SLinus Torvalds  *		Alan Cox	:	Added TCP options (SOL_TCP)
681da177e4SLinus Torvalds  *		Alan Cox	:	Switched wakeup calls to callbacks,
691da177e4SLinus Torvalds  *					so the kernel can layer network
701da177e4SLinus Torvalds  *					sockets.
711da177e4SLinus Torvalds  *		Alan Cox	:	Use ip_tos/ip_ttl settings.
721da177e4SLinus Torvalds  *		Alan Cox	:	Handle FIN (more) properly (we hope).
731da177e4SLinus Torvalds  *		Alan Cox	:	RST frames sent on unsynchronised
741da177e4SLinus Torvalds  *					state ack error.
751da177e4SLinus Torvalds  *		Alan Cox	:	Put in missing check for SYN bit.
761da177e4SLinus Torvalds  *		Alan Cox	:	Added tcp_select_window() aka NET2E
771da177e4SLinus Torvalds  *					window non shrink trick.
781da177e4SLinus Torvalds  *		Alan Cox	:	Added a couple of small NET2E timer
791da177e4SLinus Torvalds  *					fixes
801da177e4SLinus Torvalds  *		Charles Hedrick :	TCP fixes
811da177e4SLinus Torvalds  *		Toomas Tamm	:	TCP window fixes
821da177e4SLinus Torvalds  *		Alan Cox	:	Small URG fix to rlogin ^C ack fight
831da177e4SLinus Torvalds  *		Charles Hedrick	:	Rewrote most of it to actually work
841da177e4SLinus Torvalds  *		Linus		:	Rewrote tcp_read() and URG handling
851da177e4SLinus Torvalds  *					completely
861da177e4SLinus Torvalds  *		Gerhard Koerting:	Fixed some missing timer handling
871da177e4SLinus Torvalds  *		Matthew Dillon  :	Reworked TCP machine states as per RFC
881da177e4SLinus Torvalds  *		Gerhard Koerting:	PC/TCP workarounds
891da177e4SLinus Torvalds  *		Adam Caldwell	:	Assorted timer/timing errors
901da177e4SLinus Torvalds  *		Matthew Dillon	:	Fixed another RST bug
911da177e4SLinus Torvalds  *		Alan Cox	:	Move to kernel side addressing changes.
921da177e4SLinus Torvalds  *		Alan Cox	:	Beginning work on TCP fastpathing
931da177e4SLinus Torvalds  *					(not yet usable)
941da177e4SLinus Torvalds  *		Arnt Gulbrandsen:	Turbocharged tcp_check() routine.
951da177e4SLinus Torvalds  *		Alan Cox	:	TCP fast path debugging
961da177e4SLinus Torvalds  *		Alan Cox	:	Window clamping
971da177e4SLinus Torvalds  *		Michael Riepe	:	Bug in tcp_check()
981da177e4SLinus Torvalds  *		Matt Dillon	:	More TCP improvements and RST bug fixes
991da177e4SLinus Torvalds  *		Matt Dillon	:	Yet more small nasties remove from the
1001da177e4SLinus Torvalds  *					TCP code (Be very nice to this man if
1011da177e4SLinus Torvalds  *					tcp finally works 100%) 8)
1021da177e4SLinus Torvalds  *		Alan Cox	:	BSD accept semantics.
1031da177e4SLinus Torvalds  *		Alan Cox	:	Reset on closedown bug.
1041da177e4SLinus Torvalds  *	Peter De Schrijver	:	ENOTCONN check missing in tcp_sendto().
1051da177e4SLinus Torvalds  *		Michael Pall	:	Handle poll() after URG properly in
1061da177e4SLinus Torvalds  *					all cases.
1071da177e4SLinus Torvalds  *		Michael Pall	:	Undo the last fix in tcp_read_urg()
1081da177e4SLinus Torvalds  *					(multi URG PUSH broke rlogin).
1091da177e4SLinus Torvalds  *		Michael Pall	:	Fix the multi URG PUSH problem in
1101da177e4SLinus Torvalds  *					tcp_readable(), poll() after URG
1111da177e4SLinus Torvalds  *					works now.
1121da177e4SLinus Torvalds  *		Michael Pall	:	recv(...,MSG_OOB) never blocks in the
1131da177e4SLinus Torvalds  *					BSD api.
1141da177e4SLinus Torvalds  *		Alan Cox	:	Changed the semantics of sk->socket to
1151da177e4SLinus Torvalds  *					fix a race and a signal problem with
1161da177e4SLinus Torvalds  *					accept() and async I/O.
1171da177e4SLinus Torvalds  *		Alan Cox	:	Relaxed the rules on tcp_sendto().
1181da177e4SLinus Torvalds  *		Yury Shevchuk	:	Really fixed accept() blocking problem.
1191da177e4SLinus Torvalds  *		Craig I. Hagan  :	Allow for BSD compatible TIME_WAIT for
1201da177e4SLinus Torvalds  *					clients/servers which listen in on
1211da177e4SLinus Torvalds  *					fixed ports.
1221da177e4SLinus Torvalds  *		Alan Cox	:	Cleaned the above up and shrank it to
1231da177e4SLinus Torvalds  *					a sensible code size.
1241da177e4SLinus Torvalds  *		Alan Cox	:	Self connect lockup fix.
1251da177e4SLinus Torvalds  *		Alan Cox	:	No connect to multicast.
1261da177e4SLinus Torvalds  *		Ross Biro	:	Close unaccepted children on master
1271da177e4SLinus Torvalds  *					socket close.
1281da177e4SLinus Torvalds  *		Alan Cox	:	Reset tracing code.
1291da177e4SLinus Torvalds  *		Alan Cox	:	Spurious resets on shutdown.
1301da177e4SLinus Torvalds  *		Alan Cox	:	Giant 15 minute/60 second timer error
1311da177e4SLinus Torvalds  *		Alan Cox	:	Small whoops in polling before an
1321da177e4SLinus Torvalds  *					accept.
1331da177e4SLinus Torvalds  *		Alan Cox	:	Kept the state trace facility since
1341da177e4SLinus Torvalds  *					it's handy for debugging.
1351da177e4SLinus Torvalds  *		Alan Cox	:	More reset handler fixes.
1361da177e4SLinus Torvalds  *		Alan Cox	:	Started rewriting the code based on
1371da177e4SLinus Torvalds  *					the RFC's for other useful protocol
1381da177e4SLinus Torvalds  *					references see: Comer, KA9Q NOS, and
1391da177e4SLinus Torvalds  *					for a reference on the difference
1401da177e4SLinus Torvalds  *					between specifications and how BSD
1411da177e4SLinus Torvalds  *					works see the 4.4lite source.
1421da177e4SLinus Torvalds  *		A.N.Kuznetsov	:	Don't time wait on completion of tidy
1431da177e4SLinus Torvalds  *					close.
1441da177e4SLinus Torvalds  *		Linus Torvalds	:	Fin/Shutdown & copied_seq changes.
1451da177e4SLinus Torvalds  *		Linus Torvalds	:	Fixed BSD port reuse to work first syn
1461da177e4SLinus Torvalds  *		Alan Cox	:	Reimplemented timers as per the RFC
1471da177e4SLinus Torvalds  *					and using multiple timers for sanity.
1481da177e4SLinus Torvalds  *		Alan Cox	:	Small bug fixes, and a lot of new
1491da177e4SLinus Torvalds  *					comments.
1501da177e4SLinus Torvalds  *		Alan Cox	:	Fixed dual reader crash by locking
1511da177e4SLinus Torvalds  *					the buffers (much like datagram.c)
1521da177e4SLinus Torvalds  *		Alan Cox	:	Fixed stuck sockets in probe. A probe
1531da177e4SLinus Torvalds  *					now gets fed up of retrying without
1541da177e4SLinus Torvalds  *					(even a no space) answer.
1551da177e4SLinus Torvalds  *		Alan Cox	:	Extracted closing code better
1561da177e4SLinus Torvalds  *		Alan Cox	:	Fixed the closing state machine to
1571da177e4SLinus Torvalds  *					resemble the RFC.
1581da177e4SLinus Torvalds  *		Alan Cox	:	More 'per spec' fixes.
1591da177e4SLinus Torvalds  *		Jorge Cwik	:	Even faster checksumming.
1601da177e4SLinus Torvalds  *		Alan Cox	:	tcp_data() doesn't ack illegal PSH
1611da177e4SLinus Torvalds  *					only frames. At least one pc tcp stack
1621da177e4SLinus Torvalds  *					generates them.
1631da177e4SLinus Torvalds  *		Alan Cox	:	Cache last socket.
1641da177e4SLinus Torvalds  *		Alan Cox	:	Per route irtt.
1651da177e4SLinus Torvalds  *		Matt Day	:	poll()->select() match BSD precisely on error
1661da177e4SLinus Torvalds  *		Alan Cox	:	New buffers
1671da177e4SLinus Torvalds  *		Marc Tamsky	:	Various sk->prot->retransmits and
1681da177e4SLinus Torvalds  *					sk->retransmits misupdating fixed.
1691da177e4SLinus Torvalds  *					Fixed tcp_write_timeout: stuck close,
1701da177e4SLinus Torvalds  *					and TCP syn retries gets used now.
1711da177e4SLinus Torvalds  *		Mark Yarvis	:	In tcp_read_wakeup(), don't send an
1721da177e4SLinus Torvalds  *					ack if state is TCP_CLOSED.
1731da177e4SLinus Torvalds  *		Alan Cox	:	Look up device on a retransmit - routes may
1741da177e4SLinus Torvalds  *					change. Doesn't yet cope with MSS shrink right
1751da177e4SLinus Torvalds  *					but it's a start!
1761da177e4SLinus Torvalds  *		Marc Tamsky	:	Closing in closing fixes.
1771da177e4SLinus Torvalds  *		Mike Shaver	:	RFC1122 verifications.
1781da177e4SLinus Torvalds  *		Alan Cox	:	rcv_saddr errors.
1791da177e4SLinus Torvalds  *		Alan Cox	:	Block double connect().
1801da177e4SLinus Torvalds  *		Alan Cox	:	Small hooks for enSKIP.
1811da177e4SLinus Torvalds  *		Alexey Kuznetsov:	Path MTU discovery.
1821da177e4SLinus Torvalds  *		Alan Cox	:	Support soft errors.
1831da177e4SLinus Torvalds  *		Alan Cox	:	Fix MTU discovery pathological case
1841da177e4SLinus Torvalds  *					when the remote claims no mtu!
1851da177e4SLinus Torvalds  *		Marc Tamsky	:	TCP_CLOSE fix.
1861da177e4SLinus Torvalds  *		Colin (G3TNE)	:	Send a reset on syn ack replies in
1871da177e4SLinus Torvalds  *					window but wrong (fixes NT lpd problems)
1881da177e4SLinus Torvalds  *		Pedro Roque	:	Better TCP window handling, delayed ack.
1891da177e4SLinus Torvalds  *		Joerg Reuter	:	No modification of locked buffers in
1901da177e4SLinus Torvalds  *					tcp_do_retransmit()
1911da177e4SLinus Torvalds  *		Eric Schenk	:	Changed receiver side silly window
1921da177e4SLinus Torvalds  *					avoidance algorithm to BSD style
1931da177e4SLinus Torvalds  *					algorithm. This doubles throughput
1941da177e4SLinus Torvalds  *					against machines running Solaris,
1951da177e4SLinus Torvalds  *					and seems to result in general
1961da177e4SLinus Torvalds  *					improvement.
1971da177e4SLinus Torvalds  *	Stefan Magdalinski	:	adjusted tcp_readable() to fix FIONREAD
1981da177e4SLinus Torvalds  *	Willy Konynenberg	:	Transparent proxying support.
1991da177e4SLinus Torvalds  *	Mike McLagan		:	Routing by source
2001da177e4SLinus Torvalds  *		Keith Owens	:	Do proper merging with partial SKB's in
2011da177e4SLinus Torvalds  *					tcp_do_sendmsg to avoid burstiness.
2021da177e4SLinus Torvalds  *		Eric Schenk	:	Fix fast close down bug with
2031da177e4SLinus Torvalds  *					shutdown() followed by close().
2041da177e4SLinus Torvalds  *		Andi Kleen 	:	Make poll agree with SIGIO
2051da177e4SLinus Torvalds  *	Salvatore Sanfilippo	:	Support SO_LINGER with linger == 1 and
2061da177e4SLinus Torvalds  *					lingertime == 0 (RFC 793 ABORT Call)
2071da177e4SLinus Torvalds  *	Hirokazu Takahashi	:	Use copy_from_user() instead of
2081da177e4SLinus Torvalds  *					csum_and_copy_from_user() if possible.
2091da177e4SLinus Torvalds  *
2101da177e4SLinus Torvalds  *		This program is free software; you can redistribute it and/or
2111da177e4SLinus Torvalds  *		modify it under the terms of the GNU General Public License
2121da177e4SLinus Torvalds  *		as published by the Free Software Foundation; either version
2131da177e4SLinus Torvalds  *		2 of the License, or(at your option) any later version.
2141da177e4SLinus Torvalds  *
2151da177e4SLinus Torvalds  * Description of States:
2161da177e4SLinus Torvalds  *
2171da177e4SLinus Torvalds  *	TCP_SYN_SENT		sent a connection request, waiting for ack
2181da177e4SLinus Torvalds  *
2191da177e4SLinus Torvalds  *	TCP_SYN_RECV		received a connection request, sent ack,
2201da177e4SLinus Torvalds  *				waiting for final ack in three-way handshake.
2211da177e4SLinus Torvalds  *
2221da177e4SLinus Torvalds  *	TCP_ESTABLISHED		connection established
2231da177e4SLinus Torvalds  *
2241da177e4SLinus Torvalds  *	TCP_FIN_WAIT1		our side has shutdown, waiting to complete
2251da177e4SLinus Torvalds  *				transmission of remaining buffered data
2261da177e4SLinus Torvalds  *
2271da177e4SLinus Torvalds  *	TCP_FIN_WAIT2		all buffered data sent, waiting for remote
2281da177e4SLinus Torvalds  *				to shutdown
2291da177e4SLinus Torvalds  *
2301da177e4SLinus Torvalds  *	TCP_CLOSING		both sides have shutdown but we still have
2311da177e4SLinus Torvalds  *				data we have to finish sending
2321da177e4SLinus Torvalds  *
2331da177e4SLinus Torvalds  *	TCP_TIME_WAIT		timeout to catch resent junk before entering
2341da177e4SLinus Torvalds  *				closed, can only be entered from FIN_WAIT2
2351da177e4SLinus Torvalds  *				or CLOSING.  Required because the other end
2361da177e4SLinus Torvalds  *				may not have gotten our last ACK causing it
2371da177e4SLinus Torvalds  *				to retransmit the data packet (which we ignore)
2381da177e4SLinus Torvalds  *
2391da177e4SLinus Torvalds  *	TCP_CLOSE_WAIT		remote side has shutdown and is waiting for
2401da177e4SLinus Torvalds  *				us to finish writing our data and to shutdown
2411da177e4SLinus Torvalds  *				(we have to close() to move on to LAST_ACK)
2421da177e4SLinus Torvalds  *
2431da177e4SLinus Torvalds  *	TCP_LAST_ACK		out side has shutdown after remote has
2441da177e4SLinus Torvalds  *				shutdown.  There may still be data in our
2451da177e4SLinus Torvalds  *				buffer that we have to finish sending
2461da177e4SLinus Torvalds  *
2471da177e4SLinus Torvalds  *	TCP_CLOSE		socket is finished
2481da177e4SLinus Torvalds  */
2491da177e4SLinus Torvalds 
2501da177e4SLinus Torvalds #include <linux/config.h>
2511da177e4SLinus Torvalds #include <linux/module.h>
2521da177e4SLinus Torvalds #include <linux/types.h>
2531da177e4SLinus Torvalds #include <linux/fcntl.h>
2541da177e4SLinus Torvalds #include <linux/poll.h>
2551da177e4SLinus Torvalds #include <linux/init.h>
2561da177e4SLinus Torvalds #include <linux/smp_lock.h>
2571da177e4SLinus Torvalds #include <linux/fs.h>
2581da177e4SLinus Torvalds #include <linux/random.h>
2591da177e4SLinus Torvalds #include <linux/bootmem.h>
2601da177e4SLinus Torvalds 
2611da177e4SLinus Torvalds #include <net/icmp.h>
2621da177e4SLinus Torvalds #include <net/tcp.h>
2631da177e4SLinus Torvalds #include <net/xfrm.h>
2641da177e4SLinus Torvalds #include <net/ip.h>
2651da177e4SLinus Torvalds 
2661da177e4SLinus Torvalds 
2671da177e4SLinus Torvalds #include <asm/uaccess.h>
2681da177e4SLinus Torvalds #include <asm/ioctls.h>
2691da177e4SLinus Torvalds 
2701da177e4SLinus Torvalds int sysctl_tcp_fin_timeout = TCP_FIN_TIMEOUT;
2711da177e4SLinus Torvalds 
2721da177e4SLinus Torvalds DEFINE_SNMP_STAT(struct tcp_mib, tcp_statistics);
2731da177e4SLinus Torvalds 
2741da177e4SLinus Torvalds atomic_t tcp_orphan_count = ATOMIC_INIT(0);
2751da177e4SLinus Torvalds 
2760a5578cfSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(tcp_orphan_count);
2770a5578cfSArnaldo Carvalho de Melo 
2781da177e4SLinus Torvalds int sysctl_tcp_mem[3];
2791da177e4SLinus Torvalds int sysctl_tcp_wmem[3] = { 4 * 1024, 16 * 1024, 128 * 1024 };
2801da177e4SLinus Torvalds int sysctl_tcp_rmem[3] = { 4 * 1024, 87380, 87380 * 2 };
2811da177e4SLinus Torvalds 
2821da177e4SLinus Torvalds EXPORT_SYMBOL(sysctl_tcp_mem);
2831da177e4SLinus Torvalds EXPORT_SYMBOL(sysctl_tcp_rmem);
2841da177e4SLinus Torvalds EXPORT_SYMBOL(sysctl_tcp_wmem);
2851da177e4SLinus Torvalds 
2861da177e4SLinus Torvalds atomic_t tcp_memory_allocated;	/* Current allocated memory. */
2871da177e4SLinus Torvalds atomic_t tcp_sockets_allocated;	/* Current number of TCP sockets. */
2881da177e4SLinus Torvalds 
2891da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_memory_allocated);
2901da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_sockets_allocated);
2911da177e4SLinus Torvalds 
2921da177e4SLinus Torvalds /*
2931da177e4SLinus Torvalds  * Pressure flag: try to collapse.
2941da177e4SLinus Torvalds  * Technical note: it is used by multiple contexts non atomically.
2951da177e4SLinus Torvalds  * All the sk_stream_mem_schedule() is of this nature: accounting
2961da177e4SLinus Torvalds  * is strict, actions are advisory and have some latency.
2971da177e4SLinus Torvalds  */
2981da177e4SLinus Torvalds int tcp_memory_pressure;
2991da177e4SLinus Torvalds 
3001da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_memory_pressure);
3011da177e4SLinus Torvalds 
3021da177e4SLinus Torvalds void tcp_enter_memory_pressure(void)
3031da177e4SLinus Torvalds {
3041da177e4SLinus Torvalds 	if (!tcp_memory_pressure) {
3051da177e4SLinus Torvalds 		NET_INC_STATS(LINUX_MIB_TCPMEMORYPRESSURES);
3061da177e4SLinus Torvalds 		tcp_memory_pressure = 1;
3071da177e4SLinus Torvalds 	}
3081da177e4SLinus Torvalds }
3091da177e4SLinus Torvalds 
3101da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_enter_memory_pressure);
3111da177e4SLinus Torvalds 
3121da177e4SLinus Torvalds /*
3131da177e4SLinus Torvalds  * LISTEN is a special case for poll..
3141da177e4SLinus Torvalds  */
3151da177e4SLinus Torvalds static __inline__ unsigned int tcp_listen_poll(struct sock *sk,
3161da177e4SLinus Torvalds 					       poll_table *wait)
3171da177e4SLinus Torvalds {
318463c84b9SArnaldo Carvalho de Melo 	return !reqsk_queue_empty(&inet_csk(sk)->icsk_accept_queue) ? (POLLIN | POLLRDNORM) : 0;
3191da177e4SLinus Torvalds }
3201da177e4SLinus Torvalds 
3211da177e4SLinus Torvalds /*
3221da177e4SLinus Torvalds  *	Wait for a TCP event.
3231da177e4SLinus Torvalds  *
3241da177e4SLinus Torvalds  *	Note that we don't need to lock the socket, as the upper poll layers
3251da177e4SLinus Torvalds  *	take care of normal races (between the test and the event) and we don't
3261da177e4SLinus Torvalds  *	go look at any of the socket buffers directly.
3271da177e4SLinus Torvalds  */
3281da177e4SLinus Torvalds unsigned int tcp_poll(struct file *file, struct socket *sock, poll_table *wait)
3291da177e4SLinus Torvalds {
3301da177e4SLinus Torvalds 	unsigned int mask;
3311da177e4SLinus Torvalds 	struct sock *sk = sock->sk;
3321da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
3331da177e4SLinus Torvalds 
3341da177e4SLinus Torvalds 	poll_wait(file, sk->sk_sleep, wait);
3351da177e4SLinus Torvalds 	if (sk->sk_state == TCP_LISTEN)
3361da177e4SLinus Torvalds 		return tcp_listen_poll(sk, wait);
3371da177e4SLinus Torvalds 
3381da177e4SLinus Torvalds 	/* Socket is not locked. We are protected from async events
3391da177e4SLinus Torvalds 	   by poll logic and correct handling of state changes
3401da177e4SLinus Torvalds 	   made by another threads is impossible in any case.
3411da177e4SLinus Torvalds 	 */
3421da177e4SLinus Torvalds 
3431da177e4SLinus Torvalds 	mask = 0;
3441da177e4SLinus Torvalds 	if (sk->sk_err)
3451da177e4SLinus Torvalds 		mask = POLLERR;
3461da177e4SLinus Torvalds 
3471da177e4SLinus Torvalds 	/*
3481da177e4SLinus Torvalds 	 * POLLHUP is certainly not done right. But poll() doesn't
3491da177e4SLinus Torvalds 	 * have a notion of HUP in just one direction, and for a
3501da177e4SLinus Torvalds 	 * socket the read side is more interesting.
3511da177e4SLinus Torvalds 	 *
3521da177e4SLinus Torvalds 	 * Some poll() documentation says that POLLHUP is incompatible
3531da177e4SLinus Torvalds 	 * with the POLLOUT/POLLWR flags, so somebody should check this
3541da177e4SLinus Torvalds 	 * all. But careful, it tends to be safer to return too many
3551da177e4SLinus Torvalds 	 * bits than too few, and you can easily break real applications
3561da177e4SLinus Torvalds 	 * if you don't tell them that something has hung up!
3571da177e4SLinus Torvalds 	 *
3581da177e4SLinus Torvalds 	 * Check-me.
3591da177e4SLinus Torvalds 	 *
3601da177e4SLinus Torvalds 	 * Check number 1. POLLHUP is _UNMASKABLE_ event (see UNIX98 and
3611da177e4SLinus Torvalds 	 * our fs/select.c). It means that after we received EOF,
3621da177e4SLinus Torvalds 	 * poll always returns immediately, making impossible poll() on write()
3631da177e4SLinus Torvalds 	 * in state CLOSE_WAIT. One solution is evident --- to set POLLHUP
3641da177e4SLinus Torvalds 	 * if and only if shutdown has been made in both directions.
3651da177e4SLinus Torvalds 	 * Actually, it is interesting to look how Solaris and DUX
3661da177e4SLinus Torvalds 	 * solve this dilemma. I would prefer, if PULLHUP were maskable,
3671da177e4SLinus Torvalds 	 * then we could set it on SND_SHUTDOWN. BTW examples given
3681da177e4SLinus Torvalds 	 * in Stevens' books assume exactly this behaviour, it explains
3691da177e4SLinus Torvalds 	 * why PULLHUP is incompatible with POLLOUT.	--ANK
3701da177e4SLinus Torvalds 	 *
3711da177e4SLinus Torvalds 	 * NOTE. Check for TCP_CLOSE is added. The goal is to prevent
3721da177e4SLinus Torvalds 	 * blocking on fresh not-connected or disconnected socket. --ANK
3731da177e4SLinus Torvalds 	 */
3741da177e4SLinus Torvalds 	if (sk->sk_shutdown == SHUTDOWN_MASK || sk->sk_state == TCP_CLOSE)
3751da177e4SLinus Torvalds 		mask |= POLLHUP;
3761da177e4SLinus Torvalds 	if (sk->sk_shutdown & RCV_SHUTDOWN)
3771da177e4SLinus Torvalds 		mask |= POLLIN | POLLRDNORM;
3781da177e4SLinus Torvalds 
3791da177e4SLinus Torvalds 	/* Connected? */
3801da177e4SLinus Torvalds 	if ((1 << sk->sk_state) & ~(TCPF_SYN_SENT | TCPF_SYN_RECV)) {
3811da177e4SLinus Torvalds 		/* Potential race condition. If read of tp below will
3821da177e4SLinus Torvalds 		 * escape above sk->sk_state, we can be illegally awaken
3831da177e4SLinus Torvalds 		 * in SYN_* states. */
3841da177e4SLinus Torvalds 		if ((tp->rcv_nxt != tp->copied_seq) &&
3851da177e4SLinus Torvalds 		    (tp->urg_seq != tp->copied_seq ||
3861da177e4SLinus Torvalds 		     tp->rcv_nxt != tp->copied_seq + 1 ||
3871da177e4SLinus Torvalds 		     sock_flag(sk, SOCK_URGINLINE) || !tp->urg_data))
3881da177e4SLinus Torvalds 			mask |= POLLIN | POLLRDNORM;
3891da177e4SLinus Torvalds 
3901da177e4SLinus Torvalds 		if (!(sk->sk_shutdown & SEND_SHUTDOWN)) {
3911da177e4SLinus Torvalds 			if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk)) {
3921da177e4SLinus Torvalds 				mask |= POLLOUT | POLLWRNORM;
3931da177e4SLinus Torvalds 			} else {  /* send SIGIO later */
3941da177e4SLinus Torvalds 				set_bit(SOCK_ASYNC_NOSPACE,
3951da177e4SLinus Torvalds 					&sk->sk_socket->flags);
3961da177e4SLinus Torvalds 				set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
3971da177e4SLinus Torvalds 
3981da177e4SLinus Torvalds 				/* Race breaker. If space is freed after
3991da177e4SLinus Torvalds 				 * wspace test but before the flags are set,
4001da177e4SLinus Torvalds 				 * IO signal will be lost.
4011da177e4SLinus Torvalds 				 */
4021da177e4SLinus Torvalds 				if (sk_stream_wspace(sk) >= sk_stream_min_wspace(sk))
4031da177e4SLinus Torvalds 					mask |= POLLOUT | POLLWRNORM;
4041da177e4SLinus Torvalds 			}
4051da177e4SLinus Torvalds 		}
4061da177e4SLinus Torvalds 
4071da177e4SLinus Torvalds 		if (tp->urg_data & TCP_URG_VALID)
4081da177e4SLinus Torvalds 			mask |= POLLPRI;
4091da177e4SLinus Torvalds 	}
4101da177e4SLinus Torvalds 	return mask;
4111da177e4SLinus Torvalds }
4121da177e4SLinus Torvalds 
4131da177e4SLinus Torvalds int tcp_ioctl(struct sock *sk, int cmd, unsigned long arg)
4141da177e4SLinus Torvalds {
4151da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
4161da177e4SLinus Torvalds 	int answ;
4171da177e4SLinus Torvalds 
4181da177e4SLinus Torvalds 	switch (cmd) {
4191da177e4SLinus Torvalds 	case SIOCINQ:
4201da177e4SLinus Torvalds 		if (sk->sk_state == TCP_LISTEN)
4211da177e4SLinus Torvalds 			return -EINVAL;
4221da177e4SLinus Torvalds 
4231da177e4SLinus Torvalds 		lock_sock(sk);
4241da177e4SLinus Torvalds 		if ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV))
4251da177e4SLinus Torvalds 			answ = 0;
4261da177e4SLinus Torvalds 		else if (sock_flag(sk, SOCK_URGINLINE) ||
4271da177e4SLinus Torvalds 			 !tp->urg_data ||
4281da177e4SLinus Torvalds 			 before(tp->urg_seq, tp->copied_seq) ||
4291da177e4SLinus Torvalds 			 !before(tp->urg_seq, tp->rcv_nxt)) {
4301da177e4SLinus Torvalds 			answ = tp->rcv_nxt - tp->copied_seq;
4311da177e4SLinus Torvalds 
4321da177e4SLinus Torvalds 			/* Subtract 1, if FIN is in queue. */
4331da177e4SLinus Torvalds 			if (answ && !skb_queue_empty(&sk->sk_receive_queue))
4341da177e4SLinus Torvalds 				answ -=
4351da177e4SLinus Torvalds 		       ((struct sk_buff *)sk->sk_receive_queue.prev)->h.th->fin;
4361da177e4SLinus Torvalds 		} else
4371da177e4SLinus Torvalds 			answ = tp->urg_seq - tp->copied_seq;
4381da177e4SLinus Torvalds 		release_sock(sk);
4391da177e4SLinus Torvalds 		break;
4401da177e4SLinus Torvalds 	case SIOCATMARK:
4411da177e4SLinus Torvalds 		answ = tp->urg_data && tp->urg_seq == tp->copied_seq;
4421da177e4SLinus Torvalds 		break;
4431da177e4SLinus Torvalds 	case SIOCOUTQ:
4441da177e4SLinus Torvalds 		if (sk->sk_state == TCP_LISTEN)
4451da177e4SLinus Torvalds 			return -EINVAL;
4461da177e4SLinus Torvalds 
4471da177e4SLinus Torvalds 		if ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV))
4481da177e4SLinus Torvalds 			answ = 0;
4491da177e4SLinus Torvalds 		else
4501da177e4SLinus Torvalds 			answ = tp->write_seq - tp->snd_una;
4511da177e4SLinus Torvalds 		break;
4521da177e4SLinus Torvalds 	default:
4531da177e4SLinus Torvalds 		return -ENOIOCTLCMD;
4541da177e4SLinus Torvalds 	};
4551da177e4SLinus Torvalds 
4561da177e4SLinus Torvalds 	return put_user(answ, (int __user *)arg);
4571da177e4SLinus Torvalds }
4581da177e4SLinus Torvalds 
4591da177e4SLinus Torvalds static inline void tcp_mark_push(struct tcp_sock *tp, struct sk_buff *skb)
4601da177e4SLinus Torvalds {
4611da177e4SLinus Torvalds 	TCP_SKB_CB(skb)->flags |= TCPCB_FLAG_PSH;
4621da177e4SLinus Torvalds 	tp->pushed_seq = tp->write_seq;
4631da177e4SLinus Torvalds }
4641da177e4SLinus Torvalds 
4651da177e4SLinus Torvalds static inline int forced_push(struct tcp_sock *tp)
4661da177e4SLinus Torvalds {
4671da177e4SLinus Torvalds 	return after(tp->write_seq, tp->pushed_seq + (tp->max_window >> 1));
4681da177e4SLinus Torvalds }
4691da177e4SLinus Torvalds 
4701da177e4SLinus Torvalds static inline void skb_entail(struct sock *sk, struct tcp_sock *tp,
4711da177e4SLinus Torvalds 			      struct sk_buff *skb)
4721da177e4SLinus Torvalds {
4731da177e4SLinus Torvalds 	skb->csum = 0;
4741da177e4SLinus Torvalds 	TCP_SKB_CB(skb)->seq = tp->write_seq;
4751da177e4SLinus Torvalds 	TCP_SKB_CB(skb)->end_seq = tp->write_seq;
4761da177e4SLinus Torvalds 	TCP_SKB_CB(skb)->flags = TCPCB_FLAG_ACK;
4771da177e4SLinus Torvalds 	TCP_SKB_CB(skb)->sacked = 0;
4781da177e4SLinus Torvalds 	skb_header_release(skb);
4791da177e4SLinus Torvalds 	__skb_queue_tail(&sk->sk_write_queue, skb);
4801da177e4SLinus Torvalds 	sk_charge_skb(sk, skb);
4811da177e4SLinus Torvalds 	if (!sk->sk_send_head)
4821da177e4SLinus Torvalds 		sk->sk_send_head = skb;
48389ebd197SDavid S. Miller 	if (tp->nonagle & TCP_NAGLE_PUSH)
4841da177e4SLinus Torvalds 		tp->nonagle &= ~TCP_NAGLE_PUSH;
4851da177e4SLinus Torvalds }
4861da177e4SLinus Torvalds 
4871da177e4SLinus Torvalds static inline void tcp_mark_urg(struct tcp_sock *tp, int flags,
4881da177e4SLinus Torvalds 				struct sk_buff *skb)
4891da177e4SLinus Torvalds {
4901da177e4SLinus Torvalds 	if (flags & MSG_OOB) {
4911da177e4SLinus Torvalds 		tp->urg_mode = 1;
4921da177e4SLinus Torvalds 		tp->snd_up = tp->write_seq;
4931da177e4SLinus Torvalds 		TCP_SKB_CB(skb)->sacked |= TCPCB_URG;
4941da177e4SLinus Torvalds 	}
4951da177e4SLinus Torvalds }
4961da177e4SLinus Torvalds 
4971da177e4SLinus Torvalds static inline void tcp_push(struct sock *sk, struct tcp_sock *tp, int flags,
4981da177e4SLinus Torvalds 			    int mss_now, int nonagle)
4991da177e4SLinus Torvalds {
5001da177e4SLinus Torvalds 	if (sk->sk_send_head) {
5011da177e4SLinus Torvalds 		struct sk_buff *skb = sk->sk_write_queue.prev;
5021da177e4SLinus Torvalds 		if (!(flags & MSG_MORE) || forced_push(tp))
5031da177e4SLinus Torvalds 			tcp_mark_push(tp, skb);
5041da177e4SLinus Torvalds 		tcp_mark_urg(tp, flags, skb);
5051da177e4SLinus Torvalds 		__tcp_push_pending_frames(sk, tp, mss_now,
5061da177e4SLinus Torvalds 					  (flags & MSG_MORE) ? TCP_NAGLE_CORK : nonagle);
5071da177e4SLinus Torvalds 	}
5081da177e4SLinus Torvalds }
5091da177e4SLinus Torvalds 
5101da177e4SLinus Torvalds static ssize_t do_tcp_sendpages(struct sock *sk, struct page **pages, int poffset,
5111da177e4SLinus Torvalds 			 size_t psize, int flags)
5121da177e4SLinus Torvalds {
5131da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
514c1b4a7e6SDavid S. Miller 	int mss_now, size_goal;
5151da177e4SLinus Torvalds 	int err;
5161da177e4SLinus Torvalds 	ssize_t copied;
5171da177e4SLinus Torvalds 	long timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
5181da177e4SLinus Torvalds 
5191da177e4SLinus Torvalds 	/* Wait for a connection to finish. */
5201da177e4SLinus Torvalds 	if ((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT))
5211da177e4SLinus Torvalds 		if ((err = sk_stream_wait_connect(sk, &timeo)) != 0)
5221da177e4SLinus Torvalds 			goto out_err;
5231da177e4SLinus Torvalds 
5241da177e4SLinus Torvalds 	clear_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
5251da177e4SLinus Torvalds 
5261da177e4SLinus Torvalds 	mss_now = tcp_current_mss(sk, !(flags&MSG_OOB));
527c1b4a7e6SDavid S. Miller 	size_goal = tp->xmit_size_goal;
5281da177e4SLinus Torvalds 	copied = 0;
5291da177e4SLinus Torvalds 
5301da177e4SLinus Torvalds 	err = -EPIPE;
5311da177e4SLinus Torvalds 	if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
5321da177e4SLinus Torvalds 		goto do_error;
5331da177e4SLinus Torvalds 
5341da177e4SLinus Torvalds 	while (psize > 0) {
5351da177e4SLinus Torvalds 		struct sk_buff *skb = sk->sk_write_queue.prev;
5361da177e4SLinus Torvalds 		struct page *page = pages[poffset / PAGE_SIZE];
5371da177e4SLinus Torvalds 		int copy, i, can_coalesce;
5381da177e4SLinus Torvalds 		int offset = poffset % PAGE_SIZE;
5391da177e4SLinus Torvalds 		int size = min_t(size_t, psize, PAGE_SIZE - offset);
5401da177e4SLinus Torvalds 
541c1b4a7e6SDavid S. Miller 		if (!sk->sk_send_head || (copy = size_goal - skb->len) <= 0) {
5421da177e4SLinus Torvalds new_segment:
5431da177e4SLinus Torvalds 			if (!sk_stream_memory_free(sk))
5441da177e4SLinus Torvalds 				goto wait_for_sndbuf;
5451da177e4SLinus Torvalds 
5461da177e4SLinus Torvalds 			skb = sk_stream_alloc_pskb(sk, 0, 0,
5471da177e4SLinus Torvalds 						   sk->sk_allocation);
5481da177e4SLinus Torvalds 			if (!skb)
5491da177e4SLinus Torvalds 				goto wait_for_memory;
5501da177e4SLinus Torvalds 
5511da177e4SLinus Torvalds 			skb_entail(sk, tp, skb);
552c1b4a7e6SDavid S. Miller 			copy = size_goal;
5531da177e4SLinus Torvalds 		}
5541da177e4SLinus Torvalds 
5551da177e4SLinus Torvalds 		if (copy > size)
5561da177e4SLinus Torvalds 			copy = size;
5571da177e4SLinus Torvalds 
5581da177e4SLinus Torvalds 		i = skb_shinfo(skb)->nr_frags;
5591da177e4SLinus Torvalds 		can_coalesce = skb_can_coalesce(skb, i, page, offset);
5601da177e4SLinus Torvalds 		if (!can_coalesce && i >= MAX_SKB_FRAGS) {
5611da177e4SLinus Torvalds 			tcp_mark_push(tp, skb);
5621da177e4SLinus Torvalds 			goto new_segment;
5631da177e4SLinus Torvalds 		}
5641da177e4SLinus Torvalds 		if (sk->sk_forward_alloc < copy &&
5651da177e4SLinus Torvalds 		    !sk_stream_mem_schedule(sk, copy, 0))
5661da177e4SLinus Torvalds 			goto wait_for_memory;
5671da177e4SLinus Torvalds 
5681da177e4SLinus Torvalds 		if (can_coalesce) {
5691da177e4SLinus Torvalds 			skb_shinfo(skb)->frags[i - 1].size += copy;
5701da177e4SLinus Torvalds 		} else {
5711da177e4SLinus Torvalds 			get_page(page);
5721da177e4SLinus Torvalds 			skb_fill_page_desc(skb, i, page, offset, copy);
5731da177e4SLinus Torvalds 		}
5741da177e4SLinus Torvalds 
5751da177e4SLinus Torvalds 		skb->len += copy;
5761da177e4SLinus Torvalds 		skb->data_len += copy;
5771da177e4SLinus Torvalds 		skb->truesize += copy;
5781da177e4SLinus Torvalds 		sk->sk_wmem_queued += copy;
5791da177e4SLinus Torvalds 		sk->sk_forward_alloc -= copy;
5801da177e4SLinus Torvalds 		skb->ip_summed = CHECKSUM_HW;
5811da177e4SLinus Torvalds 		tp->write_seq += copy;
5821da177e4SLinus Torvalds 		TCP_SKB_CB(skb)->end_seq += copy;
5831da177e4SLinus Torvalds 		skb_shinfo(skb)->tso_segs = 0;
5841da177e4SLinus Torvalds 
5851da177e4SLinus Torvalds 		if (!copied)
5861da177e4SLinus Torvalds 			TCP_SKB_CB(skb)->flags &= ~TCPCB_FLAG_PSH;
5871da177e4SLinus Torvalds 
5881da177e4SLinus Torvalds 		copied += copy;
5891da177e4SLinus Torvalds 		poffset += copy;
5901da177e4SLinus Torvalds 		if (!(psize -= copy))
5911da177e4SLinus Torvalds 			goto out;
5921da177e4SLinus Torvalds 
593c1b4a7e6SDavid S. Miller 		if (skb->len < mss_now || (flags & MSG_OOB))
5941da177e4SLinus Torvalds 			continue;
5951da177e4SLinus Torvalds 
5961da177e4SLinus Torvalds 		if (forced_push(tp)) {
5971da177e4SLinus Torvalds 			tcp_mark_push(tp, skb);
5981da177e4SLinus Torvalds 			__tcp_push_pending_frames(sk, tp, mss_now, TCP_NAGLE_PUSH);
5991da177e4SLinus Torvalds 		} else if (skb == sk->sk_send_head)
6001da177e4SLinus Torvalds 			tcp_push_one(sk, mss_now);
6011da177e4SLinus Torvalds 		continue;
6021da177e4SLinus Torvalds 
6031da177e4SLinus Torvalds wait_for_sndbuf:
6041da177e4SLinus Torvalds 		set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
6051da177e4SLinus Torvalds wait_for_memory:
6061da177e4SLinus Torvalds 		if (copied)
6071da177e4SLinus Torvalds 			tcp_push(sk, tp, flags & ~MSG_MORE, mss_now, TCP_NAGLE_PUSH);
6081da177e4SLinus Torvalds 
6091da177e4SLinus Torvalds 		if ((err = sk_stream_wait_memory(sk, &timeo)) != 0)
6101da177e4SLinus Torvalds 			goto do_error;
6111da177e4SLinus Torvalds 
6121da177e4SLinus Torvalds 		mss_now = tcp_current_mss(sk, !(flags&MSG_OOB));
613c1b4a7e6SDavid S. Miller 		size_goal = tp->xmit_size_goal;
6141da177e4SLinus Torvalds 	}
6151da177e4SLinus Torvalds 
6161da177e4SLinus Torvalds out:
6171da177e4SLinus Torvalds 	if (copied)
6181da177e4SLinus Torvalds 		tcp_push(sk, tp, flags, mss_now, tp->nonagle);
6191da177e4SLinus Torvalds 	return copied;
6201da177e4SLinus Torvalds 
6211da177e4SLinus Torvalds do_error:
6221da177e4SLinus Torvalds 	if (copied)
6231da177e4SLinus Torvalds 		goto out;
6241da177e4SLinus Torvalds out_err:
6251da177e4SLinus Torvalds 	return sk_stream_error(sk, flags, err);
6261da177e4SLinus Torvalds }
6271da177e4SLinus Torvalds 
6281da177e4SLinus Torvalds ssize_t tcp_sendpage(struct socket *sock, struct page *page, int offset,
6291da177e4SLinus Torvalds 		     size_t size, int flags)
6301da177e4SLinus Torvalds {
6311da177e4SLinus Torvalds 	ssize_t res;
6321da177e4SLinus Torvalds 	struct sock *sk = sock->sk;
6331da177e4SLinus Torvalds 
6341da177e4SLinus Torvalds #define TCP_ZC_CSUM_FLAGS (NETIF_F_IP_CSUM | NETIF_F_NO_CSUM | NETIF_F_HW_CSUM)
6351da177e4SLinus Torvalds 
6361da177e4SLinus Torvalds 	if (!(sk->sk_route_caps & NETIF_F_SG) ||
6371da177e4SLinus Torvalds 	    !(sk->sk_route_caps & TCP_ZC_CSUM_FLAGS))
6381da177e4SLinus Torvalds 		return sock_no_sendpage(sock, page, offset, size, flags);
6391da177e4SLinus Torvalds 
6401da177e4SLinus Torvalds #undef TCP_ZC_CSUM_FLAGS
6411da177e4SLinus Torvalds 
6421da177e4SLinus Torvalds 	lock_sock(sk);
6431da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
6441da177e4SLinus Torvalds 	res = do_tcp_sendpages(sk, &page, offset, size, flags);
6451da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
6461da177e4SLinus Torvalds 	release_sock(sk);
6471da177e4SLinus Torvalds 	return res;
6481da177e4SLinus Torvalds }
6491da177e4SLinus Torvalds 
6501da177e4SLinus Torvalds #define TCP_PAGE(sk)	(sk->sk_sndmsg_page)
6511da177e4SLinus Torvalds #define TCP_OFF(sk)	(sk->sk_sndmsg_off)
6521da177e4SLinus Torvalds 
6531da177e4SLinus Torvalds static inline int select_size(struct sock *sk, struct tcp_sock *tp)
6541da177e4SLinus Torvalds {
655c1b4a7e6SDavid S. Miller 	int tmp = tp->mss_cache;
6561da177e4SLinus Torvalds 
657b4e26f5eSDavid S. Miller 	if (sk->sk_route_caps & NETIF_F_SG) {
658b4e26f5eSDavid S. Miller 		if (sk->sk_route_caps & NETIF_F_TSO)
659c65f7f00SDavid S. Miller 			tmp = 0;
660b4e26f5eSDavid S. Miller 		else {
661b4e26f5eSDavid S. Miller 			int pgbreak = SKB_MAX_HEAD(MAX_TCP_HEADER);
662b4e26f5eSDavid S. Miller 
663b4e26f5eSDavid S. Miller 			if (tmp >= pgbreak &&
664b4e26f5eSDavid S. Miller 			    tmp <= pgbreak + (MAX_SKB_FRAGS - 1) * PAGE_SIZE)
665b4e26f5eSDavid S. Miller 				tmp = pgbreak;
666b4e26f5eSDavid S. Miller 		}
667b4e26f5eSDavid S. Miller 	}
6681da177e4SLinus Torvalds 
6691da177e4SLinus Torvalds 	return tmp;
6701da177e4SLinus Torvalds }
6711da177e4SLinus Torvalds 
6721da177e4SLinus Torvalds int tcp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
6731da177e4SLinus Torvalds 		size_t size)
6741da177e4SLinus Torvalds {
6751da177e4SLinus Torvalds 	struct iovec *iov;
6761da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
6771da177e4SLinus Torvalds 	struct sk_buff *skb;
6781da177e4SLinus Torvalds 	int iovlen, flags;
679c1b4a7e6SDavid S. Miller 	int mss_now, size_goal;
6801da177e4SLinus Torvalds 	int err, copied;
6811da177e4SLinus Torvalds 	long timeo;
6821da177e4SLinus Torvalds 
6831da177e4SLinus Torvalds 	lock_sock(sk);
6841da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
6851da177e4SLinus Torvalds 
6861da177e4SLinus Torvalds 	flags = msg->msg_flags;
6871da177e4SLinus Torvalds 	timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
6881da177e4SLinus Torvalds 
6891da177e4SLinus Torvalds 	/* Wait for a connection to finish. */
6901da177e4SLinus Torvalds 	if ((1 << sk->sk_state) & ~(TCPF_ESTABLISHED | TCPF_CLOSE_WAIT))
6911da177e4SLinus Torvalds 		if ((err = sk_stream_wait_connect(sk, &timeo)) != 0)
6921da177e4SLinus Torvalds 			goto out_err;
6931da177e4SLinus Torvalds 
6941da177e4SLinus Torvalds 	/* This should be in poll */
6951da177e4SLinus Torvalds 	clear_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
6961da177e4SLinus Torvalds 
6971da177e4SLinus Torvalds 	mss_now = tcp_current_mss(sk, !(flags&MSG_OOB));
698c1b4a7e6SDavid S. Miller 	size_goal = tp->xmit_size_goal;
6991da177e4SLinus Torvalds 
7001da177e4SLinus Torvalds 	/* Ok commence sending. */
7011da177e4SLinus Torvalds 	iovlen = msg->msg_iovlen;
7021da177e4SLinus Torvalds 	iov = msg->msg_iov;
7031da177e4SLinus Torvalds 	copied = 0;
7041da177e4SLinus Torvalds 
7051da177e4SLinus Torvalds 	err = -EPIPE;
7061da177e4SLinus Torvalds 	if (sk->sk_err || (sk->sk_shutdown & SEND_SHUTDOWN))
7071da177e4SLinus Torvalds 		goto do_error;
7081da177e4SLinus Torvalds 
7091da177e4SLinus Torvalds 	while (--iovlen >= 0) {
7101da177e4SLinus Torvalds 		int seglen = iov->iov_len;
7111da177e4SLinus Torvalds 		unsigned char __user *from = iov->iov_base;
7121da177e4SLinus Torvalds 
7131da177e4SLinus Torvalds 		iov++;
7141da177e4SLinus Torvalds 
7151da177e4SLinus Torvalds 		while (seglen > 0) {
7161da177e4SLinus Torvalds 			int copy;
7171da177e4SLinus Torvalds 
7181da177e4SLinus Torvalds 			skb = sk->sk_write_queue.prev;
7191da177e4SLinus Torvalds 
7201da177e4SLinus Torvalds 			if (!sk->sk_send_head ||
721c1b4a7e6SDavid S. Miller 			    (copy = size_goal - skb->len) <= 0) {
7221da177e4SLinus Torvalds 
7231da177e4SLinus Torvalds new_segment:
7241da177e4SLinus Torvalds 				/* Allocate new segment. If the interface is SG,
7251da177e4SLinus Torvalds 				 * allocate skb fitting to single page.
7261da177e4SLinus Torvalds 				 */
7271da177e4SLinus Torvalds 				if (!sk_stream_memory_free(sk))
7281da177e4SLinus Torvalds 					goto wait_for_sndbuf;
7291da177e4SLinus Torvalds 
7301da177e4SLinus Torvalds 				skb = sk_stream_alloc_pskb(sk, select_size(sk, tp),
7311da177e4SLinus Torvalds 							   0, sk->sk_allocation);
7321da177e4SLinus Torvalds 				if (!skb)
7331da177e4SLinus Torvalds 					goto wait_for_memory;
7341da177e4SLinus Torvalds 
7351da177e4SLinus Torvalds 				/*
7361da177e4SLinus Torvalds 				 * Check whether we can use HW checksum.
7371da177e4SLinus Torvalds 				 */
7381da177e4SLinus Torvalds 				if (sk->sk_route_caps &
7391da177e4SLinus Torvalds 				    (NETIF_F_IP_CSUM | NETIF_F_NO_CSUM |
7401da177e4SLinus Torvalds 				     NETIF_F_HW_CSUM))
7411da177e4SLinus Torvalds 					skb->ip_summed = CHECKSUM_HW;
7421da177e4SLinus Torvalds 
7431da177e4SLinus Torvalds 				skb_entail(sk, tp, skb);
744c1b4a7e6SDavid S. Miller 				copy = size_goal;
7451da177e4SLinus Torvalds 			}
7461da177e4SLinus Torvalds 
7471da177e4SLinus Torvalds 			/* Try to append data to the end of skb. */
7481da177e4SLinus Torvalds 			if (copy > seglen)
7491da177e4SLinus Torvalds 				copy = seglen;
7501da177e4SLinus Torvalds 
7511da177e4SLinus Torvalds 			/* Where to copy to? */
7521da177e4SLinus Torvalds 			if (skb_tailroom(skb) > 0) {
7531da177e4SLinus Torvalds 				/* We have some space in skb head. Superb! */
7541da177e4SLinus Torvalds 				if (copy > skb_tailroom(skb))
7551da177e4SLinus Torvalds 					copy = skb_tailroom(skb);
7561da177e4SLinus Torvalds 				if ((err = skb_add_data(skb, from, copy)) != 0)
7571da177e4SLinus Torvalds 					goto do_fault;
7581da177e4SLinus Torvalds 			} else {
7591da177e4SLinus Torvalds 				int merge = 0;
7601da177e4SLinus Torvalds 				int i = skb_shinfo(skb)->nr_frags;
7611da177e4SLinus Torvalds 				struct page *page = TCP_PAGE(sk);
7621da177e4SLinus Torvalds 				int off = TCP_OFF(sk);
7631da177e4SLinus Torvalds 
7641da177e4SLinus Torvalds 				if (skb_can_coalesce(skb, i, page, off) &&
7651da177e4SLinus Torvalds 				    off != PAGE_SIZE) {
7661da177e4SLinus Torvalds 					/* We can extend the last page
7671da177e4SLinus Torvalds 					 * fragment. */
7681da177e4SLinus Torvalds 					merge = 1;
7691da177e4SLinus Torvalds 				} else if (i == MAX_SKB_FRAGS ||
7701da177e4SLinus Torvalds 					   (!i &&
7711da177e4SLinus Torvalds 					   !(sk->sk_route_caps & NETIF_F_SG))) {
7721da177e4SLinus Torvalds 					/* Need to add new fragment and cannot
7731da177e4SLinus Torvalds 					 * do this because interface is non-SG,
7741da177e4SLinus Torvalds 					 * or because all the page slots are
7751da177e4SLinus Torvalds 					 * busy. */
7761da177e4SLinus Torvalds 					tcp_mark_push(tp, skb);
7771da177e4SLinus Torvalds 					goto new_segment;
7781da177e4SLinus Torvalds 				} else if (page) {
7791da177e4SLinus Torvalds 					if (off == PAGE_SIZE) {
7801da177e4SLinus Torvalds 						put_page(page);
7811da177e4SLinus Torvalds 						TCP_PAGE(sk) = page = NULL;
7821da177e4SLinus Torvalds 					}
7831da177e4SLinus Torvalds 				}
7841da177e4SLinus Torvalds 
7851da177e4SLinus Torvalds 				if (!page) {
7861da177e4SLinus Torvalds 					/* Allocate new cache page. */
7871da177e4SLinus Torvalds 					if (!(page = sk_stream_alloc_page(sk)))
7881da177e4SLinus Torvalds 						goto wait_for_memory;
7891da177e4SLinus Torvalds 					off = 0;
7901da177e4SLinus Torvalds 				}
7911da177e4SLinus Torvalds 
7921da177e4SLinus Torvalds 				if (copy > PAGE_SIZE - off)
7931da177e4SLinus Torvalds 					copy = PAGE_SIZE - off;
7941da177e4SLinus Torvalds 
7951da177e4SLinus Torvalds 				/* Time to copy data. We are close to
7961da177e4SLinus Torvalds 				 * the end! */
7971da177e4SLinus Torvalds 				err = skb_copy_to_page(sk, from, skb, page,
7981da177e4SLinus Torvalds 						       off, copy);
7991da177e4SLinus Torvalds 				if (err) {
8001da177e4SLinus Torvalds 					/* If this page was new, give it to the
8011da177e4SLinus Torvalds 					 * socket so it does not get leaked.
8021da177e4SLinus Torvalds 					 */
8031da177e4SLinus Torvalds 					if (!TCP_PAGE(sk)) {
8041da177e4SLinus Torvalds 						TCP_PAGE(sk) = page;
8051da177e4SLinus Torvalds 						TCP_OFF(sk) = 0;
8061da177e4SLinus Torvalds 					}
8071da177e4SLinus Torvalds 					goto do_error;
8081da177e4SLinus Torvalds 				}
8091da177e4SLinus Torvalds 
8101da177e4SLinus Torvalds 				/* Update the skb. */
8111da177e4SLinus Torvalds 				if (merge) {
8121da177e4SLinus Torvalds 					skb_shinfo(skb)->frags[i - 1].size +=
8131da177e4SLinus Torvalds 									copy;
8141da177e4SLinus Torvalds 				} else {
8151da177e4SLinus Torvalds 					skb_fill_page_desc(skb, i, page, off, copy);
8161da177e4SLinus Torvalds 					if (TCP_PAGE(sk)) {
8171da177e4SLinus Torvalds 						get_page(page);
8181da177e4SLinus Torvalds 					} else if (off + copy < PAGE_SIZE) {
8191da177e4SLinus Torvalds 						get_page(page);
8201da177e4SLinus Torvalds 						TCP_PAGE(sk) = page;
8211da177e4SLinus Torvalds 					}
8221da177e4SLinus Torvalds 				}
8231da177e4SLinus Torvalds 
8241da177e4SLinus Torvalds 				TCP_OFF(sk) = off + copy;
8251da177e4SLinus Torvalds 			}
8261da177e4SLinus Torvalds 
8271da177e4SLinus Torvalds 			if (!copied)
8281da177e4SLinus Torvalds 				TCP_SKB_CB(skb)->flags &= ~TCPCB_FLAG_PSH;
8291da177e4SLinus Torvalds 
8301da177e4SLinus Torvalds 			tp->write_seq += copy;
8311da177e4SLinus Torvalds 			TCP_SKB_CB(skb)->end_seq += copy;
8321da177e4SLinus Torvalds 			skb_shinfo(skb)->tso_segs = 0;
8331da177e4SLinus Torvalds 
8341da177e4SLinus Torvalds 			from += copy;
8351da177e4SLinus Torvalds 			copied += copy;
8361da177e4SLinus Torvalds 			if ((seglen -= copy) == 0 && iovlen == 0)
8371da177e4SLinus Torvalds 				goto out;
8381da177e4SLinus Torvalds 
839c1b4a7e6SDavid S. Miller 			if (skb->len < mss_now || (flags & MSG_OOB))
8401da177e4SLinus Torvalds 				continue;
8411da177e4SLinus Torvalds 
8421da177e4SLinus Torvalds 			if (forced_push(tp)) {
8431da177e4SLinus Torvalds 				tcp_mark_push(tp, skb);
8441da177e4SLinus Torvalds 				__tcp_push_pending_frames(sk, tp, mss_now, TCP_NAGLE_PUSH);
8451da177e4SLinus Torvalds 			} else if (skb == sk->sk_send_head)
8461da177e4SLinus Torvalds 				tcp_push_one(sk, mss_now);
8471da177e4SLinus Torvalds 			continue;
8481da177e4SLinus Torvalds 
8491da177e4SLinus Torvalds wait_for_sndbuf:
8501da177e4SLinus Torvalds 			set_bit(SOCK_NOSPACE, &sk->sk_socket->flags);
8511da177e4SLinus Torvalds wait_for_memory:
8521da177e4SLinus Torvalds 			if (copied)
8531da177e4SLinus Torvalds 				tcp_push(sk, tp, flags & ~MSG_MORE, mss_now, TCP_NAGLE_PUSH);
8541da177e4SLinus Torvalds 
8551da177e4SLinus Torvalds 			if ((err = sk_stream_wait_memory(sk, &timeo)) != 0)
8561da177e4SLinus Torvalds 				goto do_error;
8571da177e4SLinus Torvalds 
8581da177e4SLinus Torvalds 			mss_now = tcp_current_mss(sk, !(flags&MSG_OOB));
859c1b4a7e6SDavid S. Miller 			size_goal = tp->xmit_size_goal;
8601da177e4SLinus Torvalds 		}
8611da177e4SLinus Torvalds 	}
8621da177e4SLinus Torvalds 
8631da177e4SLinus Torvalds out:
8641da177e4SLinus Torvalds 	if (copied)
8651da177e4SLinus Torvalds 		tcp_push(sk, tp, flags, mss_now, tp->nonagle);
8661da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
8671da177e4SLinus Torvalds 	release_sock(sk);
8681da177e4SLinus Torvalds 	return copied;
8691da177e4SLinus Torvalds 
8701da177e4SLinus Torvalds do_fault:
8711da177e4SLinus Torvalds 	if (!skb->len) {
8721da177e4SLinus Torvalds 		if (sk->sk_send_head == skb)
8731da177e4SLinus Torvalds 			sk->sk_send_head = NULL;
8748728b834SDavid S. Miller 		__skb_unlink(skb, &sk->sk_write_queue);
8751da177e4SLinus Torvalds 		sk_stream_free_skb(sk, skb);
8761da177e4SLinus Torvalds 	}
8771da177e4SLinus Torvalds 
8781da177e4SLinus Torvalds do_error:
8791da177e4SLinus Torvalds 	if (copied)
8801da177e4SLinus Torvalds 		goto out;
8811da177e4SLinus Torvalds out_err:
8821da177e4SLinus Torvalds 	err = sk_stream_error(sk, flags, err);
8831da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
8841da177e4SLinus Torvalds 	release_sock(sk);
8851da177e4SLinus Torvalds 	return err;
8861da177e4SLinus Torvalds }
8871da177e4SLinus Torvalds 
8881da177e4SLinus Torvalds /*
8891da177e4SLinus Torvalds  *	Handle reading urgent data. BSD has very simple semantics for
8901da177e4SLinus Torvalds  *	this, no blocking and very strange errors 8)
8911da177e4SLinus Torvalds  */
8921da177e4SLinus Torvalds 
8931da177e4SLinus Torvalds static int tcp_recv_urg(struct sock *sk, long timeo,
8941da177e4SLinus Torvalds 			struct msghdr *msg, int len, int flags,
8951da177e4SLinus Torvalds 			int *addr_len)
8961da177e4SLinus Torvalds {
8971da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
8981da177e4SLinus Torvalds 
8991da177e4SLinus Torvalds 	/* No URG data to read. */
9001da177e4SLinus Torvalds 	if (sock_flag(sk, SOCK_URGINLINE) || !tp->urg_data ||
9011da177e4SLinus Torvalds 	    tp->urg_data == TCP_URG_READ)
9021da177e4SLinus Torvalds 		return -EINVAL;	/* Yes this is right ! */
9031da177e4SLinus Torvalds 
9041da177e4SLinus Torvalds 	if (sk->sk_state == TCP_CLOSE && !sock_flag(sk, SOCK_DONE))
9051da177e4SLinus Torvalds 		return -ENOTCONN;
9061da177e4SLinus Torvalds 
9071da177e4SLinus Torvalds 	if (tp->urg_data & TCP_URG_VALID) {
9081da177e4SLinus Torvalds 		int err = 0;
9091da177e4SLinus Torvalds 		char c = tp->urg_data;
9101da177e4SLinus Torvalds 
9111da177e4SLinus Torvalds 		if (!(flags & MSG_PEEK))
9121da177e4SLinus Torvalds 			tp->urg_data = TCP_URG_READ;
9131da177e4SLinus Torvalds 
9141da177e4SLinus Torvalds 		/* Read urgent data. */
9151da177e4SLinus Torvalds 		msg->msg_flags |= MSG_OOB;
9161da177e4SLinus Torvalds 
9171da177e4SLinus Torvalds 		if (len > 0) {
9181da177e4SLinus Torvalds 			if (!(flags & MSG_TRUNC))
9191da177e4SLinus Torvalds 				err = memcpy_toiovec(msg->msg_iov, &c, 1);
9201da177e4SLinus Torvalds 			len = 1;
9211da177e4SLinus Torvalds 		} else
9221da177e4SLinus Torvalds 			msg->msg_flags |= MSG_TRUNC;
9231da177e4SLinus Torvalds 
9241da177e4SLinus Torvalds 		return err ? -EFAULT : len;
9251da177e4SLinus Torvalds 	}
9261da177e4SLinus Torvalds 
9271da177e4SLinus Torvalds 	if (sk->sk_state == TCP_CLOSE || (sk->sk_shutdown & RCV_SHUTDOWN))
9281da177e4SLinus Torvalds 		return 0;
9291da177e4SLinus Torvalds 
9301da177e4SLinus Torvalds 	/* Fixed the recv(..., MSG_OOB) behaviour.  BSD docs and
9311da177e4SLinus Torvalds 	 * the available implementations agree in this case:
9321da177e4SLinus Torvalds 	 * this call should never block, independent of the
9331da177e4SLinus Torvalds 	 * blocking state of the socket.
9341da177e4SLinus Torvalds 	 * Mike <pall@rz.uni-karlsruhe.de>
9351da177e4SLinus Torvalds 	 */
9361da177e4SLinus Torvalds 	return -EAGAIN;
9371da177e4SLinus Torvalds }
9381da177e4SLinus Torvalds 
9391da177e4SLinus Torvalds /* Clean up the receive buffer for full frames taken by the user,
9401da177e4SLinus Torvalds  * then send an ACK if necessary.  COPIED is the number of bytes
9411da177e4SLinus Torvalds  * tcp_recvmsg has given to the user so far, it speeds up the
9421da177e4SLinus Torvalds  * calculation of whether or not we must ACK for the sake of
9431da177e4SLinus Torvalds  * a window update.
9441da177e4SLinus Torvalds  */
9451da177e4SLinus Torvalds static void cleanup_rbuf(struct sock *sk, int copied)
9461da177e4SLinus Torvalds {
9471da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
9481da177e4SLinus Torvalds 	int time_to_ack = 0;
9491da177e4SLinus Torvalds 
9501da177e4SLinus Torvalds #if TCP_DEBUG
9511da177e4SLinus Torvalds 	struct sk_buff *skb = skb_peek(&sk->sk_receive_queue);
9521da177e4SLinus Torvalds 
9531da177e4SLinus Torvalds 	BUG_TRAP(!skb || before(tp->copied_seq, TCP_SKB_CB(skb)->end_seq));
9541da177e4SLinus Torvalds #endif
9551da177e4SLinus Torvalds 
956463c84b9SArnaldo Carvalho de Melo 	if (inet_csk_ack_scheduled(sk)) {
957463c84b9SArnaldo Carvalho de Melo 		const struct inet_connection_sock *icsk = inet_csk(sk);
9581da177e4SLinus Torvalds 		   /* Delayed ACKs frequently hit locked sockets during bulk
9591da177e4SLinus Torvalds 		    * receive. */
960463c84b9SArnaldo Carvalho de Melo 		if (icsk->icsk_ack.blocked ||
9611da177e4SLinus Torvalds 		    /* Once-per-two-segments ACK was not sent by tcp_input.c */
962463c84b9SArnaldo Carvalho de Melo 		    tp->rcv_nxt - tp->rcv_wup > icsk->icsk_ack.rcv_mss ||
9631da177e4SLinus Torvalds 		    /*
9641da177e4SLinus Torvalds 		     * If this read emptied read buffer, we send ACK, if
9651da177e4SLinus Torvalds 		     * connection is not bidirectional, user drained
9661da177e4SLinus Torvalds 		     * receive buffer and there was a small segment
9671da177e4SLinus Torvalds 		     * in queue.
9681da177e4SLinus Torvalds 		     */
969463c84b9SArnaldo Carvalho de Melo 		    (copied > 0 && (icsk->icsk_ack.pending & ICSK_ACK_PUSHED) &&
970463c84b9SArnaldo Carvalho de Melo 		     !icsk->icsk_ack.pingpong && !atomic_read(&sk->sk_rmem_alloc)))
9711da177e4SLinus Torvalds 			time_to_ack = 1;
9721da177e4SLinus Torvalds 	}
9731da177e4SLinus Torvalds 
9741da177e4SLinus Torvalds 	/* We send an ACK if we can now advertise a non-zero window
9751da177e4SLinus Torvalds 	 * which has been raised "significantly".
9761da177e4SLinus Torvalds 	 *
9771da177e4SLinus Torvalds 	 * Even if window raised up to infinity, do not send window open ACK
9781da177e4SLinus Torvalds 	 * in states, where we will not receive more. It is useless.
9791da177e4SLinus Torvalds 	 */
9801da177e4SLinus Torvalds 	if (copied > 0 && !time_to_ack && !(sk->sk_shutdown & RCV_SHUTDOWN)) {
9811da177e4SLinus Torvalds 		__u32 rcv_window_now = tcp_receive_window(tp);
9821da177e4SLinus Torvalds 
9831da177e4SLinus Torvalds 		/* Optimize, __tcp_select_window() is not cheap. */
9841da177e4SLinus Torvalds 		if (2*rcv_window_now <= tp->window_clamp) {
9851da177e4SLinus Torvalds 			__u32 new_window = __tcp_select_window(sk);
9861da177e4SLinus Torvalds 
9871da177e4SLinus Torvalds 			/* Send ACK now, if this read freed lots of space
9881da177e4SLinus Torvalds 			 * in our buffer. Certainly, new_window is new window.
9891da177e4SLinus Torvalds 			 * We can advertise it now, if it is not less than current one.
9901da177e4SLinus Torvalds 			 * "Lots" means "at least twice" here.
9911da177e4SLinus Torvalds 			 */
9921da177e4SLinus Torvalds 			if (new_window && new_window >= 2 * rcv_window_now)
9931da177e4SLinus Torvalds 				time_to_ack = 1;
9941da177e4SLinus Torvalds 		}
9951da177e4SLinus Torvalds 	}
9961da177e4SLinus Torvalds 	if (time_to_ack)
9971da177e4SLinus Torvalds 		tcp_send_ack(sk);
9981da177e4SLinus Torvalds }
9991da177e4SLinus Torvalds 
10001da177e4SLinus Torvalds static void tcp_prequeue_process(struct sock *sk)
10011da177e4SLinus Torvalds {
10021da177e4SLinus Torvalds 	struct sk_buff *skb;
10031da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
10041da177e4SLinus Torvalds 
1005b03efcfbSDavid S. Miller 	NET_INC_STATS_USER(LINUX_MIB_TCPPREQUEUED);
10061da177e4SLinus Torvalds 
10071da177e4SLinus Torvalds 	/* RX process wants to run with disabled BHs, though it is not
10081da177e4SLinus Torvalds 	 * necessary */
10091da177e4SLinus Torvalds 	local_bh_disable();
10101da177e4SLinus Torvalds 	while ((skb = __skb_dequeue(&tp->ucopy.prequeue)) != NULL)
10111da177e4SLinus Torvalds 		sk->sk_backlog_rcv(sk, skb);
10121da177e4SLinus Torvalds 	local_bh_enable();
10131da177e4SLinus Torvalds 
10141da177e4SLinus Torvalds 	/* Clear memory counter. */
10151da177e4SLinus Torvalds 	tp->ucopy.memory = 0;
10161da177e4SLinus Torvalds }
10171da177e4SLinus Torvalds 
10181da177e4SLinus Torvalds static inline struct sk_buff *tcp_recv_skb(struct sock *sk, u32 seq, u32 *off)
10191da177e4SLinus Torvalds {
10201da177e4SLinus Torvalds 	struct sk_buff *skb;
10211da177e4SLinus Torvalds 	u32 offset;
10221da177e4SLinus Torvalds 
10231da177e4SLinus Torvalds 	skb_queue_walk(&sk->sk_receive_queue, skb) {
10241da177e4SLinus Torvalds 		offset = seq - TCP_SKB_CB(skb)->seq;
10251da177e4SLinus Torvalds 		if (skb->h.th->syn)
10261da177e4SLinus Torvalds 			offset--;
10271da177e4SLinus Torvalds 		if (offset < skb->len || skb->h.th->fin) {
10281da177e4SLinus Torvalds 			*off = offset;
10291da177e4SLinus Torvalds 			return skb;
10301da177e4SLinus Torvalds 		}
10311da177e4SLinus Torvalds 	}
10321da177e4SLinus Torvalds 	return NULL;
10331da177e4SLinus Torvalds }
10341da177e4SLinus Torvalds 
10351da177e4SLinus Torvalds /*
10361da177e4SLinus Torvalds  * This routine provides an alternative to tcp_recvmsg() for routines
10371da177e4SLinus Torvalds  * that would like to handle copying from skbuffs directly in 'sendfile'
10381da177e4SLinus Torvalds  * fashion.
10391da177e4SLinus Torvalds  * Note:
10401da177e4SLinus Torvalds  *	- It is assumed that the socket was locked by the caller.
10411da177e4SLinus Torvalds  *	- The routine does not block.
10421da177e4SLinus Torvalds  *	- At present, there is no support for reading OOB data
10431da177e4SLinus Torvalds  *	  or for 'peeking' the socket using this routine
10441da177e4SLinus Torvalds  *	  (although both would be easy to implement).
10451da177e4SLinus Torvalds  */
10461da177e4SLinus Torvalds int tcp_read_sock(struct sock *sk, read_descriptor_t *desc,
10471da177e4SLinus Torvalds 		  sk_read_actor_t recv_actor)
10481da177e4SLinus Torvalds {
10491da177e4SLinus Torvalds 	struct sk_buff *skb;
10501da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
10511da177e4SLinus Torvalds 	u32 seq = tp->copied_seq;
10521da177e4SLinus Torvalds 	u32 offset;
10531da177e4SLinus Torvalds 	int copied = 0;
10541da177e4SLinus Torvalds 
10551da177e4SLinus Torvalds 	if (sk->sk_state == TCP_LISTEN)
10561da177e4SLinus Torvalds 		return -ENOTCONN;
10571da177e4SLinus Torvalds 	while ((skb = tcp_recv_skb(sk, seq, &offset)) != NULL) {
10581da177e4SLinus Torvalds 		if (offset < skb->len) {
10591da177e4SLinus Torvalds 			size_t used, len;
10601da177e4SLinus Torvalds 
10611da177e4SLinus Torvalds 			len = skb->len - offset;
10621da177e4SLinus Torvalds 			/* Stop reading if we hit a patch of urgent data */
10631da177e4SLinus Torvalds 			if (tp->urg_data) {
10641da177e4SLinus Torvalds 				u32 urg_offset = tp->urg_seq - seq;
10651da177e4SLinus Torvalds 				if (urg_offset < len)
10661da177e4SLinus Torvalds 					len = urg_offset;
10671da177e4SLinus Torvalds 				if (!len)
10681da177e4SLinus Torvalds 					break;
10691da177e4SLinus Torvalds 			}
10701da177e4SLinus Torvalds 			used = recv_actor(desc, skb, offset, len);
10711da177e4SLinus Torvalds 			if (used <= len) {
10721da177e4SLinus Torvalds 				seq += used;
10731da177e4SLinus Torvalds 				copied += used;
10741da177e4SLinus Torvalds 				offset += used;
10751da177e4SLinus Torvalds 			}
10761da177e4SLinus Torvalds 			if (offset != skb->len)
10771da177e4SLinus Torvalds 				break;
10781da177e4SLinus Torvalds 		}
10791da177e4SLinus Torvalds 		if (skb->h.th->fin) {
10801da177e4SLinus Torvalds 			sk_eat_skb(sk, skb);
10811da177e4SLinus Torvalds 			++seq;
10821da177e4SLinus Torvalds 			break;
10831da177e4SLinus Torvalds 		}
10841da177e4SLinus Torvalds 		sk_eat_skb(sk, skb);
10851da177e4SLinus Torvalds 		if (!desc->count)
10861da177e4SLinus Torvalds 			break;
10871da177e4SLinus Torvalds 	}
10881da177e4SLinus Torvalds 	tp->copied_seq = seq;
10891da177e4SLinus Torvalds 
10901da177e4SLinus Torvalds 	tcp_rcv_space_adjust(sk);
10911da177e4SLinus Torvalds 
10921da177e4SLinus Torvalds 	/* Clean up data we have read: This will do ACK frames. */
10931da177e4SLinus Torvalds 	if (copied)
10941da177e4SLinus Torvalds 		cleanup_rbuf(sk, copied);
10951da177e4SLinus Torvalds 	return copied;
10961da177e4SLinus Torvalds }
10971da177e4SLinus Torvalds 
10981da177e4SLinus Torvalds /*
10991da177e4SLinus Torvalds  *	This routine copies from a sock struct into the user buffer.
11001da177e4SLinus Torvalds  *
11011da177e4SLinus Torvalds  *	Technical note: in 2.3 we work on _locked_ socket, so that
11021da177e4SLinus Torvalds  *	tricks with *seq access order and skb->users are not required.
11031da177e4SLinus Torvalds  *	Probably, code can be easily improved even more.
11041da177e4SLinus Torvalds  */
11051da177e4SLinus Torvalds 
11061da177e4SLinus Torvalds int tcp_recvmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
11071da177e4SLinus Torvalds 		size_t len, int nonblock, int flags, int *addr_len)
11081da177e4SLinus Torvalds {
11091da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
11101da177e4SLinus Torvalds 	int copied = 0;
11111da177e4SLinus Torvalds 	u32 peek_seq;
11121da177e4SLinus Torvalds 	u32 *seq;
11131da177e4SLinus Torvalds 	unsigned long used;
11141da177e4SLinus Torvalds 	int err;
11151da177e4SLinus Torvalds 	int target;		/* Read at least this many bytes */
11161da177e4SLinus Torvalds 	long timeo;
11171da177e4SLinus Torvalds 	struct task_struct *user_recv = NULL;
11181da177e4SLinus Torvalds 
11191da177e4SLinus Torvalds 	lock_sock(sk);
11201da177e4SLinus Torvalds 
11211da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
11221da177e4SLinus Torvalds 
11231da177e4SLinus Torvalds 	err = -ENOTCONN;
11241da177e4SLinus Torvalds 	if (sk->sk_state == TCP_LISTEN)
11251da177e4SLinus Torvalds 		goto out;
11261da177e4SLinus Torvalds 
11271da177e4SLinus Torvalds 	timeo = sock_rcvtimeo(sk, nonblock);
11281da177e4SLinus Torvalds 
11291da177e4SLinus Torvalds 	/* Urgent data needs to be handled specially. */
11301da177e4SLinus Torvalds 	if (flags & MSG_OOB)
11311da177e4SLinus Torvalds 		goto recv_urg;
11321da177e4SLinus Torvalds 
11331da177e4SLinus Torvalds 	seq = &tp->copied_seq;
11341da177e4SLinus Torvalds 	if (flags & MSG_PEEK) {
11351da177e4SLinus Torvalds 		peek_seq = tp->copied_seq;
11361da177e4SLinus Torvalds 		seq = &peek_seq;
11371da177e4SLinus Torvalds 	}
11381da177e4SLinus Torvalds 
11391da177e4SLinus Torvalds 	target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
11401da177e4SLinus Torvalds 
11411da177e4SLinus Torvalds 	do {
11421da177e4SLinus Torvalds 		struct sk_buff *skb;
11431da177e4SLinus Torvalds 		u32 offset;
11441da177e4SLinus Torvalds 
11451da177e4SLinus Torvalds 		/* Are we at urgent data? Stop if we have read anything or have SIGURG pending. */
11461da177e4SLinus Torvalds 		if (tp->urg_data && tp->urg_seq == *seq) {
11471da177e4SLinus Torvalds 			if (copied)
11481da177e4SLinus Torvalds 				break;
11491da177e4SLinus Torvalds 			if (signal_pending(current)) {
11501da177e4SLinus Torvalds 				copied = timeo ? sock_intr_errno(timeo) : -EAGAIN;
11511da177e4SLinus Torvalds 				break;
11521da177e4SLinus Torvalds 			}
11531da177e4SLinus Torvalds 		}
11541da177e4SLinus Torvalds 
11551da177e4SLinus Torvalds 		/* Next get a buffer. */
11561da177e4SLinus Torvalds 
11571da177e4SLinus Torvalds 		skb = skb_peek(&sk->sk_receive_queue);
11581da177e4SLinus Torvalds 		do {
11591da177e4SLinus Torvalds 			if (!skb)
11601da177e4SLinus Torvalds 				break;
11611da177e4SLinus Torvalds 
11621da177e4SLinus Torvalds 			/* Now that we have two receive queues this
11631da177e4SLinus Torvalds 			 * shouldn't happen.
11641da177e4SLinus Torvalds 			 */
11651da177e4SLinus Torvalds 			if (before(*seq, TCP_SKB_CB(skb)->seq)) {
11661da177e4SLinus Torvalds 				printk(KERN_INFO "recvmsg bug: copied %X "
11671da177e4SLinus Torvalds 				       "seq %X\n", *seq, TCP_SKB_CB(skb)->seq);
11681da177e4SLinus Torvalds 				break;
11691da177e4SLinus Torvalds 			}
11701da177e4SLinus Torvalds 			offset = *seq - TCP_SKB_CB(skb)->seq;
11711da177e4SLinus Torvalds 			if (skb->h.th->syn)
11721da177e4SLinus Torvalds 				offset--;
11731da177e4SLinus Torvalds 			if (offset < skb->len)
11741da177e4SLinus Torvalds 				goto found_ok_skb;
11751da177e4SLinus Torvalds 			if (skb->h.th->fin)
11761da177e4SLinus Torvalds 				goto found_fin_ok;
11771da177e4SLinus Torvalds 			BUG_TRAP(flags & MSG_PEEK);
11781da177e4SLinus Torvalds 			skb = skb->next;
11791da177e4SLinus Torvalds 		} while (skb != (struct sk_buff *)&sk->sk_receive_queue);
11801da177e4SLinus Torvalds 
11811da177e4SLinus Torvalds 		/* Well, if we have backlog, try to process it now yet. */
11821da177e4SLinus Torvalds 
11831da177e4SLinus Torvalds 		if (copied >= target && !sk->sk_backlog.tail)
11841da177e4SLinus Torvalds 			break;
11851da177e4SLinus Torvalds 
11861da177e4SLinus Torvalds 		if (copied) {
11871da177e4SLinus Torvalds 			if (sk->sk_err ||
11881da177e4SLinus Torvalds 			    sk->sk_state == TCP_CLOSE ||
11891da177e4SLinus Torvalds 			    (sk->sk_shutdown & RCV_SHUTDOWN) ||
11901da177e4SLinus Torvalds 			    !timeo ||
11911da177e4SLinus Torvalds 			    signal_pending(current) ||
11921da177e4SLinus Torvalds 			    (flags & MSG_PEEK))
11931da177e4SLinus Torvalds 				break;
11941da177e4SLinus Torvalds 		} else {
11951da177e4SLinus Torvalds 			if (sock_flag(sk, SOCK_DONE))
11961da177e4SLinus Torvalds 				break;
11971da177e4SLinus Torvalds 
11981da177e4SLinus Torvalds 			if (sk->sk_err) {
11991da177e4SLinus Torvalds 				copied = sock_error(sk);
12001da177e4SLinus Torvalds 				break;
12011da177e4SLinus Torvalds 			}
12021da177e4SLinus Torvalds 
12031da177e4SLinus Torvalds 			if (sk->sk_shutdown & RCV_SHUTDOWN)
12041da177e4SLinus Torvalds 				break;
12051da177e4SLinus Torvalds 
12061da177e4SLinus Torvalds 			if (sk->sk_state == TCP_CLOSE) {
12071da177e4SLinus Torvalds 				if (!sock_flag(sk, SOCK_DONE)) {
12081da177e4SLinus Torvalds 					/* This occurs when user tries to read
12091da177e4SLinus Torvalds 					 * from never connected socket.
12101da177e4SLinus Torvalds 					 */
12111da177e4SLinus Torvalds 					copied = -ENOTCONN;
12121da177e4SLinus Torvalds 					break;
12131da177e4SLinus Torvalds 				}
12141da177e4SLinus Torvalds 				break;
12151da177e4SLinus Torvalds 			}
12161da177e4SLinus Torvalds 
12171da177e4SLinus Torvalds 			if (!timeo) {
12181da177e4SLinus Torvalds 				copied = -EAGAIN;
12191da177e4SLinus Torvalds 				break;
12201da177e4SLinus Torvalds 			}
12211da177e4SLinus Torvalds 
12221da177e4SLinus Torvalds 			if (signal_pending(current)) {
12231da177e4SLinus Torvalds 				copied = sock_intr_errno(timeo);
12241da177e4SLinus Torvalds 				break;
12251da177e4SLinus Torvalds 			}
12261da177e4SLinus Torvalds 		}
12271da177e4SLinus Torvalds 
12281da177e4SLinus Torvalds 		cleanup_rbuf(sk, copied);
12291da177e4SLinus Torvalds 
12307df55125SDavid S. Miller 		if (!sysctl_tcp_low_latency && tp->ucopy.task == user_recv) {
12311da177e4SLinus Torvalds 			/* Install new reader */
12321da177e4SLinus Torvalds 			if (!user_recv && !(flags & (MSG_TRUNC | MSG_PEEK))) {
12331da177e4SLinus Torvalds 				user_recv = current;
12341da177e4SLinus Torvalds 				tp->ucopy.task = user_recv;
12351da177e4SLinus Torvalds 				tp->ucopy.iov = msg->msg_iov;
12361da177e4SLinus Torvalds 			}
12371da177e4SLinus Torvalds 
12381da177e4SLinus Torvalds 			tp->ucopy.len = len;
12391da177e4SLinus Torvalds 
12401da177e4SLinus Torvalds 			BUG_TRAP(tp->copied_seq == tp->rcv_nxt ||
12411da177e4SLinus Torvalds 				 (flags & (MSG_PEEK | MSG_TRUNC)));
12421da177e4SLinus Torvalds 
12431da177e4SLinus Torvalds 			/* Ugly... If prequeue is not empty, we have to
12441da177e4SLinus Torvalds 			 * process it before releasing socket, otherwise
12451da177e4SLinus Torvalds 			 * order will be broken at second iteration.
12461da177e4SLinus Torvalds 			 * More elegant solution is required!!!
12471da177e4SLinus Torvalds 			 *
12481da177e4SLinus Torvalds 			 * Look: we have the following (pseudo)queues:
12491da177e4SLinus Torvalds 			 *
12501da177e4SLinus Torvalds 			 * 1. packets in flight
12511da177e4SLinus Torvalds 			 * 2. backlog
12521da177e4SLinus Torvalds 			 * 3. prequeue
12531da177e4SLinus Torvalds 			 * 4. receive_queue
12541da177e4SLinus Torvalds 			 *
12551da177e4SLinus Torvalds 			 * Each queue can be processed only if the next ones
12561da177e4SLinus Torvalds 			 * are empty. At this point we have empty receive_queue.
12571da177e4SLinus Torvalds 			 * But prequeue _can_ be not empty after 2nd iteration,
12581da177e4SLinus Torvalds 			 * when we jumped to start of loop because backlog
12591da177e4SLinus Torvalds 			 * processing added something to receive_queue.
12601da177e4SLinus Torvalds 			 * We cannot release_sock(), because backlog contains
12611da177e4SLinus Torvalds 			 * packets arrived _after_ prequeued ones.
12621da177e4SLinus Torvalds 			 *
12631da177e4SLinus Torvalds 			 * Shortly, algorithm is clear --- to process all
12641da177e4SLinus Torvalds 			 * the queues in order. We could make it more directly,
12651da177e4SLinus Torvalds 			 * requeueing packets from backlog to prequeue, if
12661da177e4SLinus Torvalds 			 * is not empty. It is more elegant, but eats cycles,
12671da177e4SLinus Torvalds 			 * unfortunately.
12681da177e4SLinus Torvalds 			 */
1269b03efcfbSDavid S. Miller 			if (!skb_queue_empty(&tp->ucopy.prequeue))
12701da177e4SLinus Torvalds 				goto do_prequeue;
12711da177e4SLinus Torvalds 
12721da177e4SLinus Torvalds 			/* __ Set realtime policy in scheduler __ */
12731da177e4SLinus Torvalds 		}
12741da177e4SLinus Torvalds 
12751da177e4SLinus Torvalds 		if (copied >= target) {
12761da177e4SLinus Torvalds 			/* Do not sleep, just process backlog. */
12771da177e4SLinus Torvalds 			release_sock(sk);
12781da177e4SLinus Torvalds 			lock_sock(sk);
12791da177e4SLinus Torvalds 		} else
12801da177e4SLinus Torvalds 			sk_wait_data(sk, &timeo);
12811da177e4SLinus Torvalds 
12821da177e4SLinus Torvalds 		if (user_recv) {
12831da177e4SLinus Torvalds 			int chunk;
12841da177e4SLinus Torvalds 
12851da177e4SLinus Torvalds 			/* __ Restore normal policy in scheduler __ */
12861da177e4SLinus Torvalds 
12871da177e4SLinus Torvalds 			if ((chunk = len - tp->ucopy.len) != 0) {
12881da177e4SLinus Torvalds 				NET_ADD_STATS_USER(LINUX_MIB_TCPDIRECTCOPYFROMBACKLOG, chunk);
12891da177e4SLinus Torvalds 				len -= chunk;
12901da177e4SLinus Torvalds 				copied += chunk;
12911da177e4SLinus Torvalds 			}
12921da177e4SLinus Torvalds 
12931da177e4SLinus Torvalds 			if (tp->rcv_nxt == tp->copied_seq &&
1294b03efcfbSDavid S. Miller 			    !skb_queue_empty(&tp->ucopy.prequeue)) {
12951da177e4SLinus Torvalds do_prequeue:
12961da177e4SLinus Torvalds 				tcp_prequeue_process(sk);
12971da177e4SLinus Torvalds 
12981da177e4SLinus Torvalds 				if ((chunk = len - tp->ucopy.len) != 0) {
12991da177e4SLinus Torvalds 					NET_ADD_STATS_USER(LINUX_MIB_TCPDIRECTCOPYFROMPREQUEUE, chunk);
13001da177e4SLinus Torvalds 					len -= chunk;
13011da177e4SLinus Torvalds 					copied += chunk;
13021da177e4SLinus Torvalds 				}
13031da177e4SLinus Torvalds 			}
13041da177e4SLinus Torvalds 		}
13051da177e4SLinus Torvalds 		if ((flags & MSG_PEEK) && peek_seq != tp->copied_seq) {
13061da177e4SLinus Torvalds 			if (net_ratelimit())
13071da177e4SLinus Torvalds 				printk(KERN_DEBUG "TCP(%s:%d): Application bug, race in MSG_PEEK.\n",
13081da177e4SLinus Torvalds 				       current->comm, current->pid);
13091da177e4SLinus Torvalds 			peek_seq = tp->copied_seq;
13101da177e4SLinus Torvalds 		}
13111da177e4SLinus Torvalds 		continue;
13121da177e4SLinus Torvalds 
13131da177e4SLinus Torvalds 	found_ok_skb:
13141da177e4SLinus Torvalds 		/* Ok so how much can we use? */
13151da177e4SLinus Torvalds 		used = skb->len - offset;
13161da177e4SLinus Torvalds 		if (len < used)
13171da177e4SLinus Torvalds 			used = len;
13181da177e4SLinus Torvalds 
13191da177e4SLinus Torvalds 		/* Do we have urgent data here? */
13201da177e4SLinus Torvalds 		if (tp->urg_data) {
13211da177e4SLinus Torvalds 			u32 urg_offset = tp->urg_seq - *seq;
13221da177e4SLinus Torvalds 			if (urg_offset < used) {
13231da177e4SLinus Torvalds 				if (!urg_offset) {
13241da177e4SLinus Torvalds 					if (!sock_flag(sk, SOCK_URGINLINE)) {
13251da177e4SLinus Torvalds 						++*seq;
13261da177e4SLinus Torvalds 						offset++;
13271da177e4SLinus Torvalds 						used--;
13281da177e4SLinus Torvalds 						if (!used)
13291da177e4SLinus Torvalds 							goto skip_copy;
13301da177e4SLinus Torvalds 					}
13311da177e4SLinus Torvalds 				} else
13321da177e4SLinus Torvalds 					used = urg_offset;
13331da177e4SLinus Torvalds 			}
13341da177e4SLinus Torvalds 		}
13351da177e4SLinus Torvalds 
13361da177e4SLinus Torvalds 		if (!(flags & MSG_TRUNC)) {
13371da177e4SLinus Torvalds 			err = skb_copy_datagram_iovec(skb, offset,
13381da177e4SLinus Torvalds 						      msg->msg_iov, used);
13391da177e4SLinus Torvalds 			if (err) {
13401da177e4SLinus Torvalds 				/* Exception. Bailout! */
13411da177e4SLinus Torvalds 				if (!copied)
13421da177e4SLinus Torvalds 					copied = -EFAULT;
13431da177e4SLinus Torvalds 				break;
13441da177e4SLinus Torvalds 			}
13451da177e4SLinus Torvalds 		}
13461da177e4SLinus Torvalds 
13471da177e4SLinus Torvalds 		*seq += used;
13481da177e4SLinus Torvalds 		copied += used;
13491da177e4SLinus Torvalds 		len -= used;
13501da177e4SLinus Torvalds 
13511da177e4SLinus Torvalds 		tcp_rcv_space_adjust(sk);
13521da177e4SLinus Torvalds 
13531da177e4SLinus Torvalds skip_copy:
13541da177e4SLinus Torvalds 		if (tp->urg_data && after(tp->copied_seq, tp->urg_seq)) {
13551da177e4SLinus Torvalds 			tp->urg_data = 0;
13561da177e4SLinus Torvalds 			tcp_fast_path_check(sk, tp);
13571da177e4SLinus Torvalds 		}
13581da177e4SLinus Torvalds 		if (used + offset < skb->len)
13591da177e4SLinus Torvalds 			continue;
13601da177e4SLinus Torvalds 
13611da177e4SLinus Torvalds 		if (skb->h.th->fin)
13621da177e4SLinus Torvalds 			goto found_fin_ok;
13631da177e4SLinus Torvalds 		if (!(flags & MSG_PEEK))
13641da177e4SLinus Torvalds 			sk_eat_skb(sk, skb);
13651da177e4SLinus Torvalds 		continue;
13661da177e4SLinus Torvalds 
13671da177e4SLinus Torvalds 	found_fin_ok:
13681da177e4SLinus Torvalds 		/* Process the FIN. */
13691da177e4SLinus Torvalds 		++*seq;
13701da177e4SLinus Torvalds 		if (!(flags & MSG_PEEK))
13711da177e4SLinus Torvalds 			sk_eat_skb(sk, skb);
13721da177e4SLinus Torvalds 		break;
13731da177e4SLinus Torvalds 	} while (len > 0);
13741da177e4SLinus Torvalds 
13751da177e4SLinus Torvalds 	if (user_recv) {
1376b03efcfbSDavid S. Miller 		if (!skb_queue_empty(&tp->ucopy.prequeue)) {
13771da177e4SLinus Torvalds 			int chunk;
13781da177e4SLinus Torvalds 
13791da177e4SLinus Torvalds 			tp->ucopy.len = copied > 0 ? len : 0;
13801da177e4SLinus Torvalds 
13811da177e4SLinus Torvalds 			tcp_prequeue_process(sk);
13821da177e4SLinus Torvalds 
13831da177e4SLinus Torvalds 			if (copied > 0 && (chunk = len - tp->ucopy.len) != 0) {
13841da177e4SLinus Torvalds 				NET_ADD_STATS_USER(LINUX_MIB_TCPDIRECTCOPYFROMPREQUEUE, chunk);
13851da177e4SLinus Torvalds 				len -= chunk;
13861da177e4SLinus Torvalds 				copied += chunk;
13871da177e4SLinus Torvalds 			}
13881da177e4SLinus Torvalds 		}
13891da177e4SLinus Torvalds 
13901da177e4SLinus Torvalds 		tp->ucopy.task = NULL;
13911da177e4SLinus Torvalds 		tp->ucopy.len = 0;
13921da177e4SLinus Torvalds 	}
13931da177e4SLinus Torvalds 
13941da177e4SLinus Torvalds 	/* According to UNIX98, msg_name/msg_namelen are ignored
13951da177e4SLinus Torvalds 	 * on connected socket. I was just happy when found this 8) --ANK
13961da177e4SLinus Torvalds 	 */
13971da177e4SLinus Torvalds 
13981da177e4SLinus Torvalds 	/* Clean up data we have read: This will do ACK frames. */
13991da177e4SLinus Torvalds 	cleanup_rbuf(sk, copied);
14001da177e4SLinus Torvalds 
14011da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
14021da177e4SLinus Torvalds 	release_sock(sk);
14031da177e4SLinus Torvalds 	return copied;
14041da177e4SLinus Torvalds 
14051da177e4SLinus Torvalds out:
14061da177e4SLinus Torvalds 	TCP_CHECK_TIMER(sk);
14071da177e4SLinus Torvalds 	release_sock(sk);
14081da177e4SLinus Torvalds 	return err;
14091da177e4SLinus Torvalds 
14101da177e4SLinus Torvalds recv_urg:
14111da177e4SLinus Torvalds 	err = tcp_recv_urg(sk, timeo, msg, len, flags, addr_len);
14121da177e4SLinus Torvalds 	goto out;
14131da177e4SLinus Torvalds }
14141da177e4SLinus Torvalds 
14151da177e4SLinus Torvalds /*
14161da177e4SLinus Torvalds  *	State processing on a close. This implements the state shift for
14171da177e4SLinus Torvalds  *	sending our FIN frame. Note that we only send a FIN for some
14181da177e4SLinus Torvalds  *	states. A shutdown() may have already sent the FIN, or we may be
14191da177e4SLinus Torvalds  *	closed.
14201da177e4SLinus Torvalds  */
14211da177e4SLinus Torvalds 
14221da177e4SLinus Torvalds static unsigned char new_state[16] = {
14231da177e4SLinus Torvalds   /* current state:        new state:      action:	*/
14241da177e4SLinus Torvalds   /* (Invalid)		*/ TCP_CLOSE,
14251da177e4SLinus Torvalds   /* TCP_ESTABLISHED	*/ TCP_FIN_WAIT1 | TCP_ACTION_FIN,
14261da177e4SLinus Torvalds   /* TCP_SYN_SENT	*/ TCP_CLOSE,
14271da177e4SLinus Torvalds   /* TCP_SYN_RECV	*/ TCP_FIN_WAIT1 | TCP_ACTION_FIN,
14281da177e4SLinus Torvalds   /* TCP_FIN_WAIT1	*/ TCP_FIN_WAIT1,
14291da177e4SLinus Torvalds   /* TCP_FIN_WAIT2	*/ TCP_FIN_WAIT2,
14301da177e4SLinus Torvalds   /* TCP_TIME_WAIT	*/ TCP_CLOSE,
14311da177e4SLinus Torvalds   /* TCP_CLOSE		*/ TCP_CLOSE,
14321da177e4SLinus Torvalds   /* TCP_CLOSE_WAIT	*/ TCP_LAST_ACK  | TCP_ACTION_FIN,
14331da177e4SLinus Torvalds   /* TCP_LAST_ACK	*/ TCP_LAST_ACK,
14341da177e4SLinus Torvalds   /* TCP_LISTEN		*/ TCP_CLOSE,
14351da177e4SLinus Torvalds   /* TCP_CLOSING	*/ TCP_CLOSING,
14361da177e4SLinus Torvalds };
14371da177e4SLinus Torvalds 
14381da177e4SLinus Torvalds static int tcp_close_state(struct sock *sk)
14391da177e4SLinus Torvalds {
14401da177e4SLinus Torvalds 	int next = (int)new_state[sk->sk_state];
14411da177e4SLinus Torvalds 	int ns = next & TCP_STATE_MASK;
14421da177e4SLinus Torvalds 
14431da177e4SLinus Torvalds 	tcp_set_state(sk, ns);
14441da177e4SLinus Torvalds 
14451da177e4SLinus Torvalds 	return next & TCP_ACTION_FIN;
14461da177e4SLinus Torvalds }
14471da177e4SLinus Torvalds 
14481da177e4SLinus Torvalds /*
14491da177e4SLinus Torvalds  *	Shutdown the sending side of a connection. Much like close except
14501da177e4SLinus Torvalds  *	that we don't receive shut down or set_sock_flag(sk, SOCK_DEAD).
14511da177e4SLinus Torvalds  */
14521da177e4SLinus Torvalds 
14531da177e4SLinus Torvalds void tcp_shutdown(struct sock *sk, int how)
14541da177e4SLinus Torvalds {
14551da177e4SLinus Torvalds 	/*	We need to grab some memory, and put together a FIN,
14561da177e4SLinus Torvalds 	 *	and then put it into the queue to be sent.
14571da177e4SLinus Torvalds 	 *		Tim MacKenzie(tym@dibbler.cs.monash.edu.au) 4 Dec '92.
14581da177e4SLinus Torvalds 	 */
14591da177e4SLinus Torvalds 	if (!(how & SEND_SHUTDOWN))
14601da177e4SLinus Torvalds 		return;
14611da177e4SLinus Torvalds 
14621da177e4SLinus Torvalds 	/* If we've already sent a FIN, or it's a closed state, skip this. */
14631da177e4SLinus Torvalds 	if ((1 << sk->sk_state) &
14641da177e4SLinus Torvalds 	    (TCPF_ESTABLISHED | TCPF_SYN_SENT |
14651da177e4SLinus Torvalds 	     TCPF_SYN_RECV | TCPF_CLOSE_WAIT)) {
14661da177e4SLinus Torvalds 		/* Clear out any half completed packets.  FIN if needed. */
14671da177e4SLinus Torvalds 		if (tcp_close_state(sk))
14681da177e4SLinus Torvalds 			tcp_send_fin(sk);
14691da177e4SLinus Torvalds 	}
14701da177e4SLinus Torvalds }
14711da177e4SLinus Torvalds 
14721da177e4SLinus Torvalds void tcp_close(struct sock *sk, long timeout)
14731da177e4SLinus Torvalds {
14741da177e4SLinus Torvalds 	struct sk_buff *skb;
14751da177e4SLinus Torvalds 	int data_was_unread = 0;
14761da177e4SLinus Torvalds 
14771da177e4SLinus Torvalds 	lock_sock(sk);
14781da177e4SLinus Torvalds 	sk->sk_shutdown = SHUTDOWN_MASK;
14791da177e4SLinus Torvalds 
14801da177e4SLinus Torvalds 	if (sk->sk_state == TCP_LISTEN) {
14811da177e4SLinus Torvalds 		tcp_set_state(sk, TCP_CLOSE);
14821da177e4SLinus Torvalds 
14831da177e4SLinus Torvalds 		/* Special case. */
14840a5578cfSArnaldo Carvalho de Melo 		inet_csk_listen_stop(sk);
14851da177e4SLinus Torvalds 
14861da177e4SLinus Torvalds 		goto adjudge_to_death;
14871da177e4SLinus Torvalds 	}
14881da177e4SLinus Torvalds 
14891da177e4SLinus Torvalds 	/*  We need to flush the recv. buffs.  We do this only on the
14901da177e4SLinus Torvalds 	 *  descriptor close, not protocol-sourced closes, because the
14911da177e4SLinus Torvalds 	 *  reader process may not have drained the data yet!
14921da177e4SLinus Torvalds 	 */
14931da177e4SLinus Torvalds 	while ((skb = __skb_dequeue(&sk->sk_receive_queue)) != NULL) {
14941da177e4SLinus Torvalds 		u32 len = TCP_SKB_CB(skb)->end_seq - TCP_SKB_CB(skb)->seq -
14951da177e4SLinus Torvalds 			  skb->h.th->fin;
14961da177e4SLinus Torvalds 		data_was_unread += len;
14971da177e4SLinus Torvalds 		__kfree_skb(skb);
14981da177e4SLinus Torvalds 	}
14991da177e4SLinus Torvalds 
15001da177e4SLinus Torvalds 	sk_stream_mem_reclaim(sk);
15011da177e4SLinus Torvalds 
15021da177e4SLinus Torvalds 	/* As outlined in draft-ietf-tcpimpl-prob-03.txt, section
15031da177e4SLinus Torvalds 	 * 3.10, we send a RST here because data was lost.  To
15041da177e4SLinus Torvalds 	 * witness the awful effects of the old behavior of always
15051da177e4SLinus Torvalds 	 * doing a FIN, run an older 2.1.x kernel or 2.0.x, start
15061da177e4SLinus Torvalds 	 * a bulk GET in an FTP client, suspend the process, wait
15071da177e4SLinus Torvalds 	 * for the client to advertise a zero window, then kill -9
15081da177e4SLinus Torvalds 	 * the FTP client, wheee...  Note: timeout is always zero
15091da177e4SLinus Torvalds 	 * in such a case.
15101da177e4SLinus Torvalds 	 */
15111da177e4SLinus Torvalds 	if (data_was_unread) {
15121da177e4SLinus Torvalds 		/* Unread data was tossed, zap the connection. */
15131da177e4SLinus Torvalds 		NET_INC_STATS_USER(LINUX_MIB_TCPABORTONCLOSE);
15141da177e4SLinus Torvalds 		tcp_set_state(sk, TCP_CLOSE);
15151da177e4SLinus Torvalds 		tcp_send_active_reset(sk, GFP_KERNEL);
15161da177e4SLinus Torvalds 	} else if (sock_flag(sk, SOCK_LINGER) && !sk->sk_lingertime) {
15171da177e4SLinus Torvalds 		/* Check zero linger _after_ checking for unread data. */
15181da177e4SLinus Torvalds 		sk->sk_prot->disconnect(sk, 0);
15191da177e4SLinus Torvalds 		NET_INC_STATS_USER(LINUX_MIB_TCPABORTONDATA);
15201da177e4SLinus Torvalds 	} else if (tcp_close_state(sk)) {
15211da177e4SLinus Torvalds 		/* We FIN if the application ate all the data before
15221da177e4SLinus Torvalds 		 * zapping the connection.
15231da177e4SLinus Torvalds 		 */
15241da177e4SLinus Torvalds 
15251da177e4SLinus Torvalds 		/* RED-PEN. Formally speaking, we have broken TCP state
15261da177e4SLinus Torvalds 		 * machine. State transitions:
15271da177e4SLinus Torvalds 		 *
15281da177e4SLinus Torvalds 		 * TCP_ESTABLISHED -> TCP_FIN_WAIT1
15291da177e4SLinus Torvalds 		 * TCP_SYN_RECV	-> TCP_FIN_WAIT1 (forget it, it's impossible)
15301da177e4SLinus Torvalds 		 * TCP_CLOSE_WAIT -> TCP_LAST_ACK
15311da177e4SLinus Torvalds 		 *
15321da177e4SLinus Torvalds 		 * are legal only when FIN has been sent (i.e. in window),
15331da177e4SLinus Torvalds 		 * rather than queued out of window. Purists blame.
15341da177e4SLinus Torvalds 		 *
15351da177e4SLinus Torvalds 		 * F.e. "RFC state" is ESTABLISHED,
15361da177e4SLinus Torvalds 		 * if Linux state is FIN-WAIT-1, but FIN is still not sent.
15371da177e4SLinus Torvalds 		 *
15381da177e4SLinus Torvalds 		 * The visible declinations are that sometimes
15391da177e4SLinus Torvalds 		 * we enter time-wait state, when it is not required really
15401da177e4SLinus Torvalds 		 * (harmless), do not send active resets, when they are
15411da177e4SLinus Torvalds 		 * required by specs (TCP_ESTABLISHED, TCP_CLOSE_WAIT, when
15421da177e4SLinus Torvalds 		 * they look as CLOSING or LAST_ACK for Linux)
15431da177e4SLinus Torvalds 		 * Probably, I missed some more holelets.
15441da177e4SLinus Torvalds 		 * 						--ANK
15451da177e4SLinus Torvalds 		 */
15461da177e4SLinus Torvalds 		tcp_send_fin(sk);
15471da177e4SLinus Torvalds 	}
15481da177e4SLinus Torvalds 
15491da177e4SLinus Torvalds 	sk_stream_wait_close(sk, timeout);
15501da177e4SLinus Torvalds 
15511da177e4SLinus Torvalds adjudge_to_death:
15521da177e4SLinus Torvalds 	/* It is the last release_sock in its life. It will remove backlog. */
15531da177e4SLinus Torvalds 	release_sock(sk);
15541da177e4SLinus Torvalds 
15551da177e4SLinus Torvalds 
15561da177e4SLinus Torvalds 	/* Now socket is owned by kernel and we acquire BH lock
15571da177e4SLinus Torvalds 	   to finish close. No need to check for user refs.
15581da177e4SLinus Torvalds 	 */
15591da177e4SLinus Torvalds 	local_bh_disable();
15601da177e4SLinus Torvalds 	bh_lock_sock(sk);
15611da177e4SLinus Torvalds 	BUG_TRAP(!sock_owned_by_user(sk));
15621da177e4SLinus Torvalds 
15631da177e4SLinus Torvalds 	sock_hold(sk);
15641da177e4SLinus Torvalds 	sock_orphan(sk);
15651da177e4SLinus Torvalds 
15661da177e4SLinus Torvalds 	/*	This is a (useful) BSD violating of the RFC. There is a
15671da177e4SLinus Torvalds 	 *	problem with TCP as specified in that the other end could
15681da177e4SLinus Torvalds 	 *	keep a socket open forever with no application left this end.
15691da177e4SLinus Torvalds 	 *	We use a 3 minute timeout (about the same as BSD) then kill
15701da177e4SLinus Torvalds 	 *	our end. If they send after that then tough - BUT: long enough
15711da177e4SLinus Torvalds 	 *	that we won't make the old 4*rto = almost no time - whoops
15721da177e4SLinus Torvalds 	 *	reset mistake.
15731da177e4SLinus Torvalds 	 *
15741da177e4SLinus Torvalds 	 *	Nope, it was not mistake. It is really desired behaviour
15751da177e4SLinus Torvalds 	 *	f.e. on http servers, when such sockets are useless, but
15761da177e4SLinus Torvalds 	 *	consume significant resources. Let's do it with special
15771da177e4SLinus Torvalds 	 *	linger2	option.					--ANK
15781da177e4SLinus Torvalds 	 */
15791da177e4SLinus Torvalds 
15801da177e4SLinus Torvalds 	if (sk->sk_state == TCP_FIN_WAIT2) {
15811da177e4SLinus Torvalds 		struct tcp_sock *tp = tcp_sk(sk);
15821da177e4SLinus Torvalds 		if (tp->linger2 < 0) {
15831da177e4SLinus Torvalds 			tcp_set_state(sk, TCP_CLOSE);
15841da177e4SLinus Torvalds 			tcp_send_active_reset(sk, GFP_ATOMIC);
15851da177e4SLinus Torvalds 			NET_INC_STATS_BH(LINUX_MIB_TCPABORTONLINGER);
15861da177e4SLinus Torvalds 		} else {
1587463c84b9SArnaldo Carvalho de Melo 			const int tmo = tcp_fin_time(sk);
15881da177e4SLinus Torvalds 
15891da177e4SLinus Torvalds 			if (tmo > TCP_TIMEWAIT_LEN) {
1590463c84b9SArnaldo Carvalho de Melo 				inet_csk_reset_keepalive_timer(sk, tcp_fin_time(sk));
15911da177e4SLinus Torvalds 			} else {
15920a5578cfSArnaldo Carvalho de Melo 				atomic_inc(sk->sk_prot->orphan_count);
15931da177e4SLinus Torvalds 				tcp_time_wait(sk, TCP_FIN_WAIT2, tmo);
15941da177e4SLinus Torvalds 				goto out;
15951da177e4SLinus Torvalds 			}
15961da177e4SLinus Torvalds 		}
15971da177e4SLinus Torvalds 	}
15981da177e4SLinus Torvalds 	if (sk->sk_state != TCP_CLOSE) {
15991da177e4SLinus Torvalds 		sk_stream_mem_reclaim(sk);
16000a5578cfSArnaldo Carvalho de Melo 		if (atomic_read(sk->sk_prot->orphan_count) > sysctl_tcp_max_orphans ||
16011da177e4SLinus Torvalds 		    (sk->sk_wmem_queued > SOCK_MIN_SNDBUF &&
16021da177e4SLinus Torvalds 		     atomic_read(&tcp_memory_allocated) > sysctl_tcp_mem[2])) {
16031da177e4SLinus Torvalds 			if (net_ratelimit())
16041da177e4SLinus Torvalds 				printk(KERN_INFO "TCP: too many of orphaned "
16051da177e4SLinus Torvalds 				       "sockets\n");
16061da177e4SLinus Torvalds 			tcp_set_state(sk, TCP_CLOSE);
16071da177e4SLinus Torvalds 			tcp_send_active_reset(sk, GFP_ATOMIC);
16081da177e4SLinus Torvalds 			NET_INC_STATS_BH(LINUX_MIB_TCPABORTONMEMORY);
16091da177e4SLinus Torvalds 		}
16101da177e4SLinus Torvalds 	}
16110a5578cfSArnaldo Carvalho de Melo 	atomic_inc(sk->sk_prot->orphan_count);
16121da177e4SLinus Torvalds 
16131da177e4SLinus Torvalds 	if (sk->sk_state == TCP_CLOSE)
16140a5578cfSArnaldo Carvalho de Melo 		inet_csk_destroy_sock(sk);
16151da177e4SLinus Torvalds 	/* Otherwise, socket is reprieved until protocol close. */
16161da177e4SLinus Torvalds 
16171da177e4SLinus Torvalds out:
16181da177e4SLinus Torvalds 	bh_unlock_sock(sk);
16191da177e4SLinus Torvalds 	local_bh_enable();
16201da177e4SLinus Torvalds 	sock_put(sk);
16211da177e4SLinus Torvalds }
16221da177e4SLinus Torvalds 
16231da177e4SLinus Torvalds /* These states need RST on ABORT according to RFC793 */
16241da177e4SLinus Torvalds 
16251da177e4SLinus Torvalds static inline int tcp_need_reset(int state)
16261da177e4SLinus Torvalds {
16271da177e4SLinus Torvalds 	return (1 << state) &
16281da177e4SLinus Torvalds 	       (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT | TCPF_FIN_WAIT1 |
16291da177e4SLinus Torvalds 		TCPF_FIN_WAIT2 | TCPF_SYN_RECV);
16301da177e4SLinus Torvalds }
16311da177e4SLinus Torvalds 
16321da177e4SLinus Torvalds int tcp_disconnect(struct sock *sk, int flags)
16331da177e4SLinus Torvalds {
16341da177e4SLinus Torvalds 	struct inet_sock *inet = inet_sk(sk);
1635463c84b9SArnaldo Carvalho de Melo 	struct inet_connection_sock *icsk = inet_csk(sk);
16361da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
16371da177e4SLinus Torvalds 	int err = 0;
16381da177e4SLinus Torvalds 	int old_state = sk->sk_state;
16391da177e4SLinus Torvalds 
16401da177e4SLinus Torvalds 	if (old_state != TCP_CLOSE)
16411da177e4SLinus Torvalds 		tcp_set_state(sk, TCP_CLOSE);
16421da177e4SLinus Torvalds 
16431da177e4SLinus Torvalds 	/* ABORT function of RFC793 */
16441da177e4SLinus Torvalds 	if (old_state == TCP_LISTEN) {
16450a5578cfSArnaldo Carvalho de Melo 		inet_csk_listen_stop(sk);
16461da177e4SLinus Torvalds 	} else if (tcp_need_reset(old_state) ||
16471da177e4SLinus Torvalds 		   (tp->snd_nxt != tp->write_seq &&
16481da177e4SLinus Torvalds 		    (1 << old_state) & (TCPF_CLOSING | TCPF_LAST_ACK))) {
16491da177e4SLinus Torvalds 		/* The last check adjusts for discrepance of Linux wrt. RFC
16501da177e4SLinus Torvalds 		 * states
16511da177e4SLinus Torvalds 		 */
16521da177e4SLinus Torvalds 		tcp_send_active_reset(sk, gfp_any());
16531da177e4SLinus Torvalds 		sk->sk_err = ECONNRESET;
16541da177e4SLinus Torvalds 	} else if (old_state == TCP_SYN_SENT)
16551da177e4SLinus Torvalds 		sk->sk_err = ECONNRESET;
16561da177e4SLinus Torvalds 
16571da177e4SLinus Torvalds 	tcp_clear_xmit_timers(sk);
16581da177e4SLinus Torvalds 	__skb_queue_purge(&sk->sk_receive_queue);
16591da177e4SLinus Torvalds 	sk_stream_writequeue_purge(sk);
16601da177e4SLinus Torvalds 	__skb_queue_purge(&tp->out_of_order_queue);
16611da177e4SLinus Torvalds 
16621da177e4SLinus Torvalds 	inet->dport = 0;
16631da177e4SLinus Torvalds 
16641da177e4SLinus Torvalds 	if (!(sk->sk_userlocks & SOCK_BINDADDR_LOCK))
16651da177e4SLinus Torvalds 		inet_reset_saddr(sk);
16661da177e4SLinus Torvalds 
16671da177e4SLinus Torvalds 	sk->sk_shutdown = 0;
16681da177e4SLinus Torvalds 	sock_reset_flag(sk, SOCK_DONE);
16691da177e4SLinus Torvalds 	tp->srtt = 0;
16701da177e4SLinus Torvalds 	if ((tp->write_seq += tp->max_window + 2) == 0)
16711da177e4SLinus Torvalds 		tp->write_seq = 1;
1672463c84b9SArnaldo Carvalho de Melo 	icsk->icsk_backoff = 0;
16731da177e4SLinus Torvalds 	tp->snd_cwnd = 2;
16741da177e4SLinus Torvalds 	tp->probes_out = 0;
16751da177e4SLinus Torvalds 	tp->packets_out = 0;
16761da177e4SLinus Torvalds 	tp->snd_ssthresh = 0x7fffffff;
16771da177e4SLinus Torvalds 	tp->snd_cwnd_cnt = 0;
16781da177e4SLinus Torvalds 	tcp_set_ca_state(tp, TCP_CA_Open);
16791da177e4SLinus Torvalds 	tcp_clear_retrans(tp);
1680463c84b9SArnaldo Carvalho de Melo 	inet_csk_delack_init(sk);
16811da177e4SLinus Torvalds 	sk->sk_send_head = NULL;
16821da177e4SLinus Torvalds 	tp->rx_opt.saw_tstamp = 0;
16831da177e4SLinus Torvalds 	tcp_sack_reset(&tp->rx_opt);
16841da177e4SLinus Torvalds 	__sk_dst_reset(sk);
16851da177e4SLinus Torvalds 
1686463c84b9SArnaldo Carvalho de Melo 	BUG_TRAP(!inet->num || icsk->icsk_bind_hash);
16871da177e4SLinus Torvalds 
16881da177e4SLinus Torvalds 	sk->sk_error_report(sk);
16891da177e4SLinus Torvalds 	return err;
16901da177e4SLinus Torvalds }
16911da177e4SLinus Torvalds 
16921da177e4SLinus Torvalds /*
16931da177e4SLinus Torvalds  *	Socket option code for TCP.
16941da177e4SLinus Torvalds  */
16951da177e4SLinus Torvalds int tcp_setsockopt(struct sock *sk, int level, int optname, char __user *optval,
16961da177e4SLinus Torvalds 		   int optlen)
16971da177e4SLinus Torvalds {
16981da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
1699463c84b9SArnaldo Carvalho de Melo 	struct inet_connection_sock *icsk = inet_csk(sk);
17001da177e4SLinus Torvalds 	int val;
17011da177e4SLinus Torvalds 	int err = 0;
17021da177e4SLinus Torvalds 
17031da177e4SLinus Torvalds 	if (level != SOL_TCP)
17041da177e4SLinus Torvalds 		return tp->af_specific->setsockopt(sk, level, optname,
17051da177e4SLinus Torvalds 						   optval, optlen);
17061da177e4SLinus Torvalds 
17075f8ef48dSStephen Hemminger 	/* This is a string value all the others are int's */
17085f8ef48dSStephen Hemminger 	if (optname == TCP_CONGESTION) {
17095f8ef48dSStephen Hemminger 		char name[TCP_CA_NAME_MAX];
17105f8ef48dSStephen Hemminger 
17115f8ef48dSStephen Hemminger 		if (optlen < 1)
17125f8ef48dSStephen Hemminger 			return -EINVAL;
17135f8ef48dSStephen Hemminger 
17145f8ef48dSStephen Hemminger 		val = strncpy_from_user(name, optval,
17155f8ef48dSStephen Hemminger 					min(TCP_CA_NAME_MAX-1, optlen));
17165f8ef48dSStephen Hemminger 		if (val < 0)
17175f8ef48dSStephen Hemminger 			return -EFAULT;
17185f8ef48dSStephen Hemminger 		name[val] = 0;
17195f8ef48dSStephen Hemminger 
17205f8ef48dSStephen Hemminger 		lock_sock(sk);
17215f8ef48dSStephen Hemminger 		err = tcp_set_congestion_control(tp, name);
17225f8ef48dSStephen Hemminger 		release_sock(sk);
17235f8ef48dSStephen Hemminger 		return err;
17245f8ef48dSStephen Hemminger 	}
17255f8ef48dSStephen Hemminger 
17261da177e4SLinus Torvalds 	if (optlen < sizeof(int))
17271da177e4SLinus Torvalds 		return -EINVAL;
17281da177e4SLinus Torvalds 
17291da177e4SLinus Torvalds 	if (get_user(val, (int __user *)optval))
17301da177e4SLinus Torvalds 		return -EFAULT;
17311da177e4SLinus Torvalds 
17321da177e4SLinus Torvalds 	lock_sock(sk);
17331da177e4SLinus Torvalds 
17341da177e4SLinus Torvalds 	switch (optname) {
17351da177e4SLinus Torvalds 	case TCP_MAXSEG:
17361da177e4SLinus Torvalds 		/* Values greater than interface MTU won't take effect. However
17371da177e4SLinus Torvalds 		 * at the point when this call is done we typically don't yet
17381da177e4SLinus Torvalds 		 * know which interface is going to be used */
17391da177e4SLinus Torvalds 		if (val < 8 || val > MAX_TCP_WINDOW) {
17401da177e4SLinus Torvalds 			err = -EINVAL;
17411da177e4SLinus Torvalds 			break;
17421da177e4SLinus Torvalds 		}
17431da177e4SLinus Torvalds 		tp->rx_opt.user_mss = val;
17441da177e4SLinus Torvalds 		break;
17451da177e4SLinus Torvalds 
17461da177e4SLinus Torvalds 	case TCP_NODELAY:
17471da177e4SLinus Torvalds 		if (val) {
17481da177e4SLinus Torvalds 			/* TCP_NODELAY is weaker than TCP_CORK, so that
17491da177e4SLinus Torvalds 			 * this option on corked socket is remembered, but
17501da177e4SLinus Torvalds 			 * it is not activated until cork is cleared.
17511da177e4SLinus Torvalds 			 *
17521da177e4SLinus Torvalds 			 * However, when TCP_NODELAY is set we make
17531da177e4SLinus Torvalds 			 * an explicit push, which overrides even TCP_CORK
17541da177e4SLinus Torvalds 			 * for currently queued segments.
17551da177e4SLinus Torvalds 			 */
17561da177e4SLinus Torvalds 			tp->nonagle |= TCP_NAGLE_OFF|TCP_NAGLE_PUSH;
17571da177e4SLinus Torvalds 			tcp_push_pending_frames(sk, tp);
17581da177e4SLinus Torvalds 		} else {
17591da177e4SLinus Torvalds 			tp->nonagle &= ~TCP_NAGLE_OFF;
17601da177e4SLinus Torvalds 		}
17611da177e4SLinus Torvalds 		break;
17621da177e4SLinus Torvalds 
17631da177e4SLinus Torvalds 	case TCP_CORK:
17641da177e4SLinus Torvalds 		/* When set indicates to always queue non-full frames.
17651da177e4SLinus Torvalds 		 * Later the user clears this option and we transmit
17661da177e4SLinus Torvalds 		 * any pending partial frames in the queue.  This is
17671da177e4SLinus Torvalds 		 * meant to be used alongside sendfile() to get properly
17681da177e4SLinus Torvalds 		 * filled frames when the user (for example) must write
17691da177e4SLinus Torvalds 		 * out headers with a write() call first and then use
17701da177e4SLinus Torvalds 		 * sendfile to send out the data parts.
17711da177e4SLinus Torvalds 		 *
17721da177e4SLinus Torvalds 		 * TCP_CORK can be set together with TCP_NODELAY and it is
17731da177e4SLinus Torvalds 		 * stronger than TCP_NODELAY.
17741da177e4SLinus Torvalds 		 */
17751da177e4SLinus Torvalds 		if (val) {
17761da177e4SLinus Torvalds 			tp->nonagle |= TCP_NAGLE_CORK;
17771da177e4SLinus Torvalds 		} else {
17781da177e4SLinus Torvalds 			tp->nonagle &= ~TCP_NAGLE_CORK;
17791da177e4SLinus Torvalds 			if (tp->nonagle&TCP_NAGLE_OFF)
17801da177e4SLinus Torvalds 				tp->nonagle |= TCP_NAGLE_PUSH;
17811da177e4SLinus Torvalds 			tcp_push_pending_frames(sk, tp);
17821da177e4SLinus Torvalds 		}
17831da177e4SLinus Torvalds 		break;
17841da177e4SLinus Torvalds 
17851da177e4SLinus Torvalds 	case TCP_KEEPIDLE:
17861da177e4SLinus Torvalds 		if (val < 1 || val > MAX_TCP_KEEPIDLE)
17871da177e4SLinus Torvalds 			err = -EINVAL;
17881da177e4SLinus Torvalds 		else {
17891da177e4SLinus Torvalds 			tp->keepalive_time = val * HZ;
17901da177e4SLinus Torvalds 			if (sock_flag(sk, SOCK_KEEPOPEN) &&
17911da177e4SLinus Torvalds 			    !((1 << sk->sk_state) &
17921da177e4SLinus Torvalds 			      (TCPF_CLOSE | TCPF_LISTEN))) {
17931da177e4SLinus Torvalds 				__u32 elapsed = tcp_time_stamp - tp->rcv_tstamp;
17941da177e4SLinus Torvalds 				if (tp->keepalive_time > elapsed)
17951da177e4SLinus Torvalds 					elapsed = tp->keepalive_time - elapsed;
17961da177e4SLinus Torvalds 				else
17971da177e4SLinus Torvalds 					elapsed = 0;
1798463c84b9SArnaldo Carvalho de Melo 				inet_csk_reset_keepalive_timer(sk, elapsed);
17991da177e4SLinus Torvalds 			}
18001da177e4SLinus Torvalds 		}
18011da177e4SLinus Torvalds 		break;
18021da177e4SLinus Torvalds 	case TCP_KEEPINTVL:
18031da177e4SLinus Torvalds 		if (val < 1 || val > MAX_TCP_KEEPINTVL)
18041da177e4SLinus Torvalds 			err = -EINVAL;
18051da177e4SLinus Torvalds 		else
18061da177e4SLinus Torvalds 			tp->keepalive_intvl = val * HZ;
18071da177e4SLinus Torvalds 		break;
18081da177e4SLinus Torvalds 	case TCP_KEEPCNT:
18091da177e4SLinus Torvalds 		if (val < 1 || val > MAX_TCP_KEEPCNT)
18101da177e4SLinus Torvalds 			err = -EINVAL;
18111da177e4SLinus Torvalds 		else
18121da177e4SLinus Torvalds 			tp->keepalive_probes = val;
18131da177e4SLinus Torvalds 		break;
18141da177e4SLinus Torvalds 	case TCP_SYNCNT:
18151da177e4SLinus Torvalds 		if (val < 1 || val > MAX_TCP_SYNCNT)
18161da177e4SLinus Torvalds 			err = -EINVAL;
18171da177e4SLinus Torvalds 		else
1818463c84b9SArnaldo Carvalho de Melo 			icsk->icsk_syn_retries = val;
18191da177e4SLinus Torvalds 		break;
18201da177e4SLinus Torvalds 
18211da177e4SLinus Torvalds 	case TCP_LINGER2:
18221da177e4SLinus Torvalds 		if (val < 0)
18231da177e4SLinus Torvalds 			tp->linger2 = -1;
18241da177e4SLinus Torvalds 		else if (val > sysctl_tcp_fin_timeout / HZ)
18251da177e4SLinus Torvalds 			tp->linger2 = 0;
18261da177e4SLinus Torvalds 		else
18271da177e4SLinus Torvalds 			tp->linger2 = val * HZ;
18281da177e4SLinus Torvalds 		break;
18291da177e4SLinus Torvalds 
18301da177e4SLinus Torvalds 	case TCP_DEFER_ACCEPT:
1831295f7324SArnaldo Carvalho de Melo 		icsk->icsk_accept_queue.rskq_defer_accept = 0;
18321da177e4SLinus Torvalds 		if (val > 0) {
18331da177e4SLinus Torvalds 			/* Translate value in seconds to number of
18341da177e4SLinus Torvalds 			 * retransmits */
1835295f7324SArnaldo Carvalho de Melo 			while (icsk->icsk_accept_queue.rskq_defer_accept < 32 &&
18361da177e4SLinus Torvalds 			       val > ((TCP_TIMEOUT_INIT / HZ) <<
1837295f7324SArnaldo Carvalho de Melo 				       icsk->icsk_accept_queue.rskq_defer_accept))
1838295f7324SArnaldo Carvalho de Melo 				icsk->icsk_accept_queue.rskq_defer_accept++;
1839295f7324SArnaldo Carvalho de Melo 			icsk->icsk_accept_queue.rskq_defer_accept++;
18401da177e4SLinus Torvalds 		}
18411da177e4SLinus Torvalds 		break;
18421da177e4SLinus Torvalds 
18431da177e4SLinus Torvalds 	case TCP_WINDOW_CLAMP:
18441da177e4SLinus Torvalds 		if (!val) {
18451da177e4SLinus Torvalds 			if (sk->sk_state != TCP_CLOSE) {
18461da177e4SLinus Torvalds 				err = -EINVAL;
18471da177e4SLinus Torvalds 				break;
18481da177e4SLinus Torvalds 			}
18491da177e4SLinus Torvalds 			tp->window_clamp = 0;
18501da177e4SLinus Torvalds 		} else
18511da177e4SLinus Torvalds 			tp->window_clamp = val < SOCK_MIN_RCVBUF / 2 ?
18521da177e4SLinus Torvalds 						SOCK_MIN_RCVBUF / 2 : val;
18531da177e4SLinus Torvalds 		break;
18541da177e4SLinus Torvalds 
18551da177e4SLinus Torvalds 	case TCP_QUICKACK:
18561da177e4SLinus Torvalds 		if (!val) {
1857463c84b9SArnaldo Carvalho de Melo 			icsk->icsk_ack.pingpong = 1;
18581da177e4SLinus Torvalds 		} else {
1859463c84b9SArnaldo Carvalho de Melo 			icsk->icsk_ack.pingpong = 0;
18601da177e4SLinus Torvalds 			if ((1 << sk->sk_state) &
18611da177e4SLinus Torvalds 			    (TCPF_ESTABLISHED | TCPF_CLOSE_WAIT) &&
1862463c84b9SArnaldo Carvalho de Melo 			    inet_csk_ack_scheduled(sk)) {
1863463c84b9SArnaldo Carvalho de Melo 				icsk->icsk_ack.pending |= ICSK_ACK_PUSHED;
18641da177e4SLinus Torvalds 				cleanup_rbuf(sk, 1);
18651da177e4SLinus Torvalds 				if (!(val & 1))
1866463c84b9SArnaldo Carvalho de Melo 					icsk->icsk_ack.pingpong = 1;
18671da177e4SLinus Torvalds 			}
18681da177e4SLinus Torvalds 		}
18691da177e4SLinus Torvalds 		break;
18701da177e4SLinus Torvalds 
18711da177e4SLinus Torvalds 	default:
18721da177e4SLinus Torvalds 		err = -ENOPROTOOPT;
18731da177e4SLinus Torvalds 		break;
18741da177e4SLinus Torvalds 	};
18751da177e4SLinus Torvalds 	release_sock(sk);
18761da177e4SLinus Torvalds 	return err;
18771da177e4SLinus Torvalds }
18781da177e4SLinus Torvalds 
18791da177e4SLinus Torvalds /* Return information about state of tcp endpoint in API format. */
18801da177e4SLinus Torvalds void tcp_get_info(struct sock *sk, struct tcp_info *info)
18811da177e4SLinus Torvalds {
18821da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
1883463c84b9SArnaldo Carvalho de Melo 	const struct inet_connection_sock *icsk = inet_csk(sk);
18841da177e4SLinus Torvalds 	u32 now = tcp_time_stamp;
18851da177e4SLinus Torvalds 
18861da177e4SLinus Torvalds 	memset(info, 0, sizeof(*info));
18871da177e4SLinus Torvalds 
18881da177e4SLinus Torvalds 	info->tcpi_state = sk->sk_state;
18891da177e4SLinus Torvalds 	info->tcpi_ca_state = tp->ca_state;
1890463c84b9SArnaldo Carvalho de Melo 	info->tcpi_retransmits = icsk->icsk_retransmits;
18911da177e4SLinus Torvalds 	info->tcpi_probes = tp->probes_out;
1892463c84b9SArnaldo Carvalho de Melo 	info->tcpi_backoff = icsk->icsk_backoff;
18931da177e4SLinus Torvalds 
18941da177e4SLinus Torvalds 	if (tp->rx_opt.tstamp_ok)
18951da177e4SLinus Torvalds 		info->tcpi_options |= TCPI_OPT_TIMESTAMPS;
18961da177e4SLinus Torvalds 	if (tp->rx_opt.sack_ok)
18971da177e4SLinus Torvalds 		info->tcpi_options |= TCPI_OPT_SACK;
18981da177e4SLinus Torvalds 	if (tp->rx_opt.wscale_ok) {
18991da177e4SLinus Torvalds 		info->tcpi_options |= TCPI_OPT_WSCALE;
19001da177e4SLinus Torvalds 		info->tcpi_snd_wscale = tp->rx_opt.snd_wscale;
19011da177e4SLinus Torvalds 		info->tcpi_rcv_wscale = tp->rx_opt.rcv_wscale;
19021da177e4SLinus Torvalds 	}
19031da177e4SLinus Torvalds 
19041da177e4SLinus Torvalds 	if (tp->ecn_flags&TCP_ECN_OK)
19051da177e4SLinus Torvalds 		info->tcpi_options |= TCPI_OPT_ECN;
19061da177e4SLinus Torvalds 
1907463c84b9SArnaldo Carvalho de Melo 	info->tcpi_rto = jiffies_to_usecs(icsk->icsk_rto);
1908463c84b9SArnaldo Carvalho de Melo 	info->tcpi_ato = jiffies_to_usecs(icsk->icsk_ack.ato);
1909c1b4a7e6SDavid S. Miller 	info->tcpi_snd_mss = tp->mss_cache;
1910463c84b9SArnaldo Carvalho de Melo 	info->tcpi_rcv_mss = icsk->icsk_ack.rcv_mss;
19111da177e4SLinus Torvalds 
19121da177e4SLinus Torvalds 	info->tcpi_unacked = tp->packets_out;
19131da177e4SLinus Torvalds 	info->tcpi_sacked = tp->sacked_out;
19141da177e4SLinus Torvalds 	info->tcpi_lost = tp->lost_out;
19151da177e4SLinus Torvalds 	info->tcpi_retrans = tp->retrans_out;
19161da177e4SLinus Torvalds 	info->tcpi_fackets = tp->fackets_out;
19171da177e4SLinus Torvalds 
19181da177e4SLinus Torvalds 	info->tcpi_last_data_sent = jiffies_to_msecs(now - tp->lsndtime);
1919463c84b9SArnaldo Carvalho de Melo 	info->tcpi_last_data_recv = jiffies_to_msecs(now - icsk->icsk_ack.lrcvtime);
19201da177e4SLinus Torvalds 	info->tcpi_last_ack_recv = jiffies_to_msecs(now - tp->rcv_tstamp);
19211da177e4SLinus Torvalds 
19221da177e4SLinus Torvalds 	info->tcpi_pmtu = tp->pmtu_cookie;
19231da177e4SLinus Torvalds 	info->tcpi_rcv_ssthresh = tp->rcv_ssthresh;
19241da177e4SLinus Torvalds 	info->tcpi_rtt = jiffies_to_usecs(tp->srtt)>>3;
19251da177e4SLinus Torvalds 	info->tcpi_rttvar = jiffies_to_usecs(tp->mdev)>>2;
19261da177e4SLinus Torvalds 	info->tcpi_snd_ssthresh = tp->snd_ssthresh;
19271da177e4SLinus Torvalds 	info->tcpi_snd_cwnd = tp->snd_cwnd;
19281da177e4SLinus Torvalds 	info->tcpi_advmss = tp->advmss;
19291da177e4SLinus Torvalds 	info->tcpi_reordering = tp->reordering;
19301da177e4SLinus Torvalds 
19311da177e4SLinus Torvalds 	info->tcpi_rcv_rtt = jiffies_to_usecs(tp->rcv_rtt_est.rtt)>>3;
19321da177e4SLinus Torvalds 	info->tcpi_rcv_space = tp->rcvq_space.space;
19331da177e4SLinus Torvalds 
19341da177e4SLinus Torvalds 	info->tcpi_total_retrans = tp->total_retrans;
19351da177e4SLinus Torvalds }
19361da177e4SLinus Torvalds 
19371da177e4SLinus Torvalds EXPORT_SYMBOL_GPL(tcp_get_info);
19381da177e4SLinus Torvalds 
19391da177e4SLinus Torvalds int tcp_getsockopt(struct sock *sk, int level, int optname, char __user *optval,
19401da177e4SLinus Torvalds 		   int __user *optlen)
19411da177e4SLinus Torvalds {
1942295f7324SArnaldo Carvalho de Melo 	struct inet_connection_sock *icsk = inet_csk(sk);
19431da177e4SLinus Torvalds 	struct tcp_sock *tp = tcp_sk(sk);
19441da177e4SLinus Torvalds 	int val, len;
19451da177e4SLinus Torvalds 
19461da177e4SLinus Torvalds 	if (level != SOL_TCP)
19471da177e4SLinus Torvalds 		return tp->af_specific->getsockopt(sk, level, optname,
19481da177e4SLinus Torvalds 						   optval, optlen);
19491da177e4SLinus Torvalds 
19501da177e4SLinus Torvalds 	if (get_user(len, optlen))
19511da177e4SLinus Torvalds 		return -EFAULT;
19521da177e4SLinus Torvalds 
19531da177e4SLinus Torvalds 	len = min_t(unsigned int, len, sizeof(int));
19541da177e4SLinus Torvalds 
19551da177e4SLinus Torvalds 	if (len < 0)
19561da177e4SLinus Torvalds 		return -EINVAL;
19571da177e4SLinus Torvalds 
19581da177e4SLinus Torvalds 	switch (optname) {
19591da177e4SLinus Torvalds 	case TCP_MAXSEG:
1960c1b4a7e6SDavid S. Miller 		val = tp->mss_cache;
19611da177e4SLinus Torvalds 		if (!val && ((1 << sk->sk_state) & (TCPF_CLOSE | TCPF_LISTEN)))
19621da177e4SLinus Torvalds 			val = tp->rx_opt.user_mss;
19631da177e4SLinus Torvalds 		break;
19641da177e4SLinus Torvalds 	case TCP_NODELAY:
19651da177e4SLinus Torvalds 		val = !!(tp->nonagle&TCP_NAGLE_OFF);
19661da177e4SLinus Torvalds 		break;
19671da177e4SLinus Torvalds 	case TCP_CORK:
19681da177e4SLinus Torvalds 		val = !!(tp->nonagle&TCP_NAGLE_CORK);
19691da177e4SLinus Torvalds 		break;
19701da177e4SLinus Torvalds 	case TCP_KEEPIDLE:
19711da177e4SLinus Torvalds 		val = (tp->keepalive_time ? : sysctl_tcp_keepalive_time) / HZ;
19721da177e4SLinus Torvalds 		break;
19731da177e4SLinus Torvalds 	case TCP_KEEPINTVL:
19741da177e4SLinus Torvalds 		val = (tp->keepalive_intvl ? : sysctl_tcp_keepalive_intvl) / HZ;
19751da177e4SLinus Torvalds 		break;
19761da177e4SLinus Torvalds 	case TCP_KEEPCNT:
19771da177e4SLinus Torvalds 		val = tp->keepalive_probes ? : sysctl_tcp_keepalive_probes;
19781da177e4SLinus Torvalds 		break;
19791da177e4SLinus Torvalds 	case TCP_SYNCNT:
1980295f7324SArnaldo Carvalho de Melo 		val = icsk->icsk_syn_retries ? : sysctl_tcp_syn_retries;
19811da177e4SLinus Torvalds 		break;
19821da177e4SLinus Torvalds 	case TCP_LINGER2:
19831da177e4SLinus Torvalds 		val = tp->linger2;
19841da177e4SLinus Torvalds 		if (val >= 0)
19851da177e4SLinus Torvalds 			val = (val ? : sysctl_tcp_fin_timeout) / HZ;
19861da177e4SLinus Torvalds 		break;
19871da177e4SLinus Torvalds 	case TCP_DEFER_ACCEPT:
1988295f7324SArnaldo Carvalho de Melo 		val = !icsk->icsk_accept_queue.rskq_defer_accept ? 0 :
1989295f7324SArnaldo Carvalho de Melo 			((TCP_TIMEOUT_INIT / HZ) << (icsk->icsk_accept_queue.rskq_defer_accept - 1));
19901da177e4SLinus Torvalds 		break;
19911da177e4SLinus Torvalds 	case TCP_WINDOW_CLAMP:
19921da177e4SLinus Torvalds 		val = tp->window_clamp;
19931da177e4SLinus Torvalds 		break;
19941da177e4SLinus Torvalds 	case TCP_INFO: {
19951da177e4SLinus Torvalds 		struct tcp_info info;
19961da177e4SLinus Torvalds 
19971da177e4SLinus Torvalds 		if (get_user(len, optlen))
19981da177e4SLinus Torvalds 			return -EFAULT;
19991da177e4SLinus Torvalds 
20001da177e4SLinus Torvalds 		tcp_get_info(sk, &info);
20011da177e4SLinus Torvalds 
20021da177e4SLinus Torvalds 		len = min_t(unsigned int, len, sizeof(info));
20031da177e4SLinus Torvalds 		if (put_user(len, optlen))
20041da177e4SLinus Torvalds 			return -EFAULT;
20051da177e4SLinus Torvalds 		if (copy_to_user(optval, &info, len))
20061da177e4SLinus Torvalds 			return -EFAULT;
20071da177e4SLinus Torvalds 		return 0;
20081da177e4SLinus Torvalds 	}
20091da177e4SLinus Torvalds 	case TCP_QUICKACK:
2010295f7324SArnaldo Carvalho de Melo 		val = !icsk->icsk_ack.pingpong;
20111da177e4SLinus Torvalds 		break;
20125f8ef48dSStephen Hemminger 
20135f8ef48dSStephen Hemminger 	case TCP_CONGESTION:
20145f8ef48dSStephen Hemminger 		if (get_user(len, optlen))
20155f8ef48dSStephen Hemminger 			return -EFAULT;
20165f8ef48dSStephen Hemminger 		len = min_t(unsigned int, len, TCP_CA_NAME_MAX);
20175f8ef48dSStephen Hemminger 		if (put_user(len, optlen))
20185f8ef48dSStephen Hemminger 			return -EFAULT;
20195f8ef48dSStephen Hemminger 		if (copy_to_user(optval, tp->ca_ops->name, len))
20205f8ef48dSStephen Hemminger 			return -EFAULT;
20215f8ef48dSStephen Hemminger 		return 0;
20221da177e4SLinus Torvalds 	default:
20231da177e4SLinus Torvalds 		return -ENOPROTOOPT;
20241da177e4SLinus Torvalds 	};
20251da177e4SLinus Torvalds 
20261da177e4SLinus Torvalds 	if (put_user(len, optlen))
20271da177e4SLinus Torvalds 		return -EFAULT;
20281da177e4SLinus Torvalds 	if (copy_to_user(optval, &val, len))
20291da177e4SLinus Torvalds 		return -EFAULT;
20301da177e4SLinus Torvalds 	return 0;
20311da177e4SLinus Torvalds }
20321da177e4SLinus Torvalds 
20331da177e4SLinus Torvalds 
20341da177e4SLinus Torvalds extern void __skb_cb_too_small_for_tcp(int, int);
20355f8ef48dSStephen Hemminger extern struct tcp_congestion_ops tcp_reno;
20361da177e4SLinus Torvalds 
20371da177e4SLinus Torvalds static __initdata unsigned long thash_entries;
20381da177e4SLinus Torvalds static int __init set_thash_entries(char *str)
20391da177e4SLinus Torvalds {
20401da177e4SLinus Torvalds 	if (!str)
20411da177e4SLinus Torvalds 		return 0;
20421da177e4SLinus Torvalds 	thash_entries = simple_strtoul(str, &str, 0);
20431da177e4SLinus Torvalds 	return 1;
20441da177e4SLinus Torvalds }
20451da177e4SLinus Torvalds __setup("thash_entries=", set_thash_entries);
20461da177e4SLinus Torvalds 
20471da177e4SLinus Torvalds void __init tcp_init(void)
20481da177e4SLinus Torvalds {
20491da177e4SLinus Torvalds 	struct sk_buff *skb = NULL;
20501da177e4SLinus Torvalds 	int order, i;
20511da177e4SLinus Torvalds 
20521da177e4SLinus Torvalds 	if (sizeof(struct tcp_skb_cb) > sizeof(skb->cb))
20531da177e4SLinus Torvalds 		__skb_cb_too_small_for_tcp(sizeof(struct tcp_skb_cb),
20541da177e4SLinus Torvalds 					   sizeof(skb->cb));
20551da177e4SLinus Torvalds 
20566e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.bind_bucket_cachep =
20576e04e021SArnaldo Carvalho de Melo 		kmem_cache_create("tcp_bind_bucket",
20586e04e021SArnaldo Carvalho de Melo 				  sizeof(struct inet_bind_bucket), 0,
20596e04e021SArnaldo Carvalho de Melo 				  SLAB_HWCACHE_ALIGN, NULL, NULL);
20606e04e021SArnaldo Carvalho de Melo 	if (!tcp_hashinfo.bind_bucket_cachep)
20611da177e4SLinus Torvalds 		panic("tcp_init: Cannot alloc tcp_bind_bucket cache.");
20621da177e4SLinus Torvalds 
20631da177e4SLinus Torvalds 	/* Size and allocate the main established and bind bucket
20641da177e4SLinus Torvalds 	 * hash tables.
20651da177e4SLinus Torvalds 	 *
20661da177e4SLinus Torvalds 	 * The methodology is similar to that of the buffer cache.
20671da177e4SLinus Torvalds 	 */
20686e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.ehash =
20691da177e4SLinus Torvalds 		alloc_large_system_hash("TCP established",
20700f7ff927SArnaldo Carvalho de Melo 					sizeof(struct inet_ehash_bucket),
20711da177e4SLinus Torvalds 					thash_entries,
20721da177e4SLinus Torvalds 					(num_physpages >= 128 * 1024) ?
20731da177e4SLinus Torvalds 						(25 - PAGE_SHIFT) :
20741da177e4SLinus Torvalds 						(27 - PAGE_SHIFT),
20751da177e4SLinus Torvalds 					HASH_HIGHMEM,
20766e04e021SArnaldo Carvalho de Melo 					&tcp_hashinfo.ehash_size,
20771da177e4SLinus Torvalds 					NULL,
20781da177e4SLinus Torvalds 					0);
20796e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.ehash_size = (1 << tcp_hashinfo.ehash_size) >> 1;
20806e04e021SArnaldo Carvalho de Melo 	for (i = 0; i < (tcp_hashinfo.ehash_size << 1); i++) {
20816e04e021SArnaldo Carvalho de Melo 		rwlock_init(&tcp_hashinfo.ehash[i].lock);
20826e04e021SArnaldo Carvalho de Melo 		INIT_HLIST_HEAD(&tcp_hashinfo.ehash[i].chain);
20831da177e4SLinus Torvalds 	}
20841da177e4SLinus Torvalds 
20856e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.bhash =
20861da177e4SLinus Torvalds 		alloc_large_system_hash("TCP bind",
20870f7ff927SArnaldo Carvalho de Melo 					sizeof(struct inet_bind_hashbucket),
20886e04e021SArnaldo Carvalho de Melo 					tcp_hashinfo.ehash_size,
20891da177e4SLinus Torvalds 					(num_physpages >= 128 * 1024) ?
20901da177e4SLinus Torvalds 						(25 - PAGE_SHIFT) :
20911da177e4SLinus Torvalds 						(27 - PAGE_SHIFT),
20921da177e4SLinus Torvalds 					HASH_HIGHMEM,
20936e04e021SArnaldo Carvalho de Melo 					&tcp_hashinfo.bhash_size,
20941da177e4SLinus Torvalds 					NULL,
20951da177e4SLinus Torvalds 					64 * 1024);
20966e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.bhash_size = 1 << tcp_hashinfo.bhash_size;
20976e04e021SArnaldo Carvalho de Melo 	for (i = 0; i < tcp_hashinfo.bhash_size; i++) {
20986e04e021SArnaldo Carvalho de Melo 		spin_lock_init(&tcp_hashinfo.bhash[i].lock);
20996e04e021SArnaldo Carvalho de Melo 		INIT_HLIST_HEAD(&tcp_hashinfo.bhash[i].chain);
21001da177e4SLinus Torvalds 	}
21011da177e4SLinus Torvalds 
21021da177e4SLinus Torvalds 	/* Try to be a bit smarter and adjust defaults depending
21031da177e4SLinus Torvalds 	 * on available memory.
21041da177e4SLinus Torvalds 	 */
21051da177e4SLinus Torvalds 	for (order = 0; ((1 << order) << PAGE_SHIFT) <
21066e04e021SArnaldo Carvalho de Melo 			(tcp_hashinfo.bhash_size * sizeof(struct inet_bind_hashbucket));
21071da177e4SLinus Torvalds 			order++)
21081da177e4SLinus Torvalds 		;
2109e7626486SAndi Kleen 	if (order >= 4) {
21101da177e4SLinus Torvalds 		sysctl_local_port_range[0] = 32768;
21111da177e4SLinus Torvalds 		sysctl_local_port_range[1] = 61000;
2112*295ff7edSArnaldo Carvalho de Melo 		tcp_death_row.sysctl_max_tw_buckets = 180000;
21131da177e4SLinus Torvalds 		sysctl_tcp_max_orphans = 4096 << (order - 4);
21141da177e4SLinus Torvalds 		sysctl_max_syn_backlog = 1024;
21151da177e4SLinus Torvalds 	} else if (order < 3) {
21161da177e4SLinus Torvalds 		sysctl_local_port_range[0] = 1024 * (3 - order);
2117*295ff7edSArnaldo Carvalho de Melo 		tcp_death_row.sysctl_max_tw_buckets >>= (3 - order);
21181da177e4SLinus Torvalds 		sysctl_tcp_max_orphans >>= (3 - order);
21191da177e4SLinus Torvalds 		sysctl_max_syn_backlog = 128;
21201da177e4SLinus Torvalds 	}
21216e04e021SArnaldo Carvalho de Melo 	tcp_hashinfo.port_rover = sysctl_local_port_range[0] - 1;
21221da177e4SLinus Torvalds 
21231da177e4SLinus Torvalds 	sysctl_tcp_mem[0] =  768 << order;
21241da177e4SLinus Torvalds 	sysctl_tcp_mem[1] = 1024 << order;
21251da177e4SLinus Torvalds 	sysctl_tcp_mem[2] = 1536 << order;
21261da177e4SLinus Torvalds 
21271da177e4SLinus Torvalds 	if (order < 3) {
21281da177e4SLinus Torvalds 		sysctl_tcp_wmem[2] = 64 * 1024;
21291da177e4SLinus Torvalds 		sysctl_tcp_rmem[0] = PAGE_SIZE;
21301da177e4SLinus Torvalds 		sysctl_tcp_rmem[1] = 43689;
21311da177e4SLinus Torvalds 		sysctl_tcp_rmem[2] = 2 * 43689;
21321da177e4SLinus Torvalds 	}
21331da177e4SLinus Torvalds 
21341da177e4SLinus Torvalds 	printk(KERN_INFO "TCP: Hash tables configured "
21351da177e4SLinus Torvalds 	       "(established %d bind %d)\n",
21366e04e021SArnaldo Carvalho de Melo 	       tcp_hashinfo.ehash_size << 1, tcp_hashinfo.bhash_size);
2137317a76f9SStephen Hemminger 
2138317a76f9SStephen Hemminger 	tcp_register_congestion_control(&tcp_reno);
21391da177e4SLinus Torvalds }
21401da177e4SLinus Torvalds 
21411da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_close);
21421da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_disconnect);
21431da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_getsockopt);
21441da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_ioctl);
21451da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_poll);
21461da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_read_sock);
21471da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_recvmsg);
21481da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_sendmsg);
21491da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_sendpage);
21501da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_setsockopt);
21511da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_shutdown);
21521da177e4SLinus Torvalds EXPORT_SYMBOL(tcp_statistics);
2153