blob: c1ca2cc63b43fc525d7807163a5b2cb7ad2d74ea [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Jens Axboe5274f052006-03-30 15:15:30 +02002/*
3 * "splice": joining two ropes together by interweaving their strands.
4 *
5 * This is the "extended pipe" functionality, where a pipe is used as
6 * an arbitrary in-memory buffer. Think of a pipe as a small kernel
7 * buffer that you can use to transfer data from one end to the other.
8 *
9 * The traditional unix read/write is extended with a "splice()" operation
10 * that transfers data buffers to or from a pipe buffer.
11 *
12 * Named by Larry McVoy, original implementation from Linus, extended by
Jens Axboec2058e02006-04-11 13:56:34 +020013 * Jens to support splicing to files, network, direct splicing, etc and
14 * fixing lots of bugs.
Jens Axboe5274f052006-03-30 15:15:30 +020015 *
Jens Axboe0fe23472006-09-04 15:41:16 +020016 * Copyright (C) 2005-2006 Jens Axboe <axboe@kernel.dk>
Jens Axboec2058e02006-04-11 13:56:34 +020017 * Copyright (C) 2005-2006 Linus Torvalds <torvalds@osdl.org>
18 * Copyright (C) 2006 Ingo Molnar <mingo@elte.hu>
Jens Axboe5274f052006-03-30 15:15:30 +020019 *
20 */
Christoph Hellwigbe297962016-11-01 07:40:16 -060021#include <linux/bvec.h>
Jens Axboe5274f052006-03-30 15:15:30 +020022#include <linux/fs.h>
23#include <linux/file.h>
24#include <linux/pagemap.h>
Jens Axboed6b29d72007-06-04 09:59:47 +020025#include <linux/splice.h>
KAMEZAWA Hiroyuki08e552c2009-01-07 18:08:01 -080026#include <linux/memcontrol.h>
Jens Axboe5274f052006-03-30 15:15:30 +020027#include <linux/mm_inline.h>
Jens Axboe5abc97a2006-03-30 15:16:46 +020028#include <linux/swap.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020029#include <linux/writeback.h>
Paul Gortmaker630d9c42011-11-16 23:57:37 -050030#include <linux/export.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020031#include <linux/syscalls.h>
Jens Axboe912d35f2006-04-26 10:59:21 +020032#include <linux/uio.h>
James Morris29ce2052007-07-13 11:44:32 +020033#include <linux/security.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090034#include <linux/gfp.h>
Eric Dumazet35f9c092012-04-05 03:05:35 +000035#include <linux/socket.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010036#include <linux/sched/signal.h>
37
Al Viro06ae43f2013-03-20 13:19:30 -040038#include "internal.h"
Jens Axboe5274f052006-03-30 15:15:30 +020039
Jens Axboe83f91352006-04-02 23:05:09 +020040/*
41 * Attempt to steal a page from a pipe buffer. This should perhaps go into
42 * a vm helper function, it's already simplified quite a bit by the
43 * addition of remove_mapping(). If success is returned, the caller may
44 * attempt to reuse this page for another destination.
45 */
Christoph Hellwigc928f642020-05-20 17:58:16 +020046static bool page_cache_pipe_buf_try_steal(struct pipe_inode_info *pipe,
47 struct pipe_buffer *buf)
Jens Axboe5abc97a2006-03-30 15:16:46 +020048{
49 struct page *page = buf->page;
Jens Axboe9e94cd42006-06-20 15:01:12 +020050 struct address_space *mapping;
Jens Axboe5abc97a2006-03-30 15:16:46 +020051
Jens Axboe9e0267c2006-04-19 15:57:31 +020052 lock_page(page);
53
Jens Axboe9e94cd42006-06-20 15:01:12 +020054 mapping = page_mapping(page);
55 if (mapping) {
56 WARN_ON(!PageUptodate(page));
Jens Axboe5abc97a2006-03-30 15:16:46 +020057
Jens Axboe9e94cd42006-06-20 15:01:12 +020058 /*
59 * At least for ext2 with nobh option, we need to wait on
60 * writeback completing on this page, since we'll remove it
61 * from the pagecache. Otherwise truncate wont wait on the
62 * page, allowing the disk blocks to be reused by someone else
63 * before we actually wrote our data to them. fs corruption
64 * ensues.
65 */
66 wait_on_page_writeback(page);
Jens Axboead8d6f02006-04-02 23:10:32 +020067
David Howells266cf652009-04-03 16:42:36 +010068 if (page_has_private(page) &&
69 !try_to_release_page(page, GFP_KERNEL))
Jens Axboeca39d652008-05-20 21:27:41 +020070 goto out_unlock;
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020071
Jens Axboe9e94cd42006-06-20 15:01:12 +020072 /*
73 * If we succeeded in removing the mapping, set LRU flag
74 * and return good.
75 */
76 if (remove_mapping(mapping, page)) {
77 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +020078 return true;
Jens Axboe9e94cd42006-06-20 15:01:12 +020079 }
Jens Axboe9e0267c2006-04-19 15:57:31 +020080 }
Jens Axboe5abc97a2006-03-30 15:16:46 +020081
Jens Axboe9e94cd42006-06-20 15:01:12 +020082 /*
83 * Raced with truncate or failed to remove page from current
84 * address space, unlock and return failure.
85 */
Jens Axboeca39d652008-05-20 21:27:41 +020086out_unlock:
Jens Axboe9e94cd42006-06-20 15:01:12 +020087 unlock_page(page);
Christoph Hellwigc928f642020-05-20 17:58:16 +020088 return false;
Jens Axboe5abc97a2006-03-30 15:16:46 +020089}
90
Jens Axboe76ad4d12006-05-03 10:41:33 +020091static void page_cache_pipe_buf_release(struct pipe_inode_info *pipe,
Jens Axboe5274f052006-03-30 15:15:30 +020092 struct pipe_buffer *buf)
93{
Kirill A. Shutemov09cbfea2016-04-01 15:29:47 +030094 put_page(buf->page);
Jens Axboe14328732006-05-03 10:35:26 +020095 buf->flags &= ~PIPE_BUF_FLAG_LRU;
Jens Axboe5274f052006-03-30 15:15:30 +020096}
97
Jens Axboe08457182007-06-12 20:51:32 +020098/*
99 * Check whether the contents of buf is OK to access. Since the content
100 * is a page cache page, IO may be in flight.
101 */
Jens Axboecac36bb02007-06-14 13:10:48 +0200102static int page_cache_pipe_buf_confirm(struct pipe_inode_info *pipe,
103 struct pipe_buffer *buf)
Jens Axboe5274f052006-03-30 15:15:30 +0200104{
105 struct page *page = buf->page;
Jens Axboe49d0b212006-04-10 09:04:41 +0200106 int err;
Jens Axboe5274f052006-03-30 15:15:30 +0200107
108 if (!PageUptodate(page)) {
Jens Axboe49d0b212006-04-10 09:04:41 +0200109 lock_page(page);
110
111 /*
112 * Page got truncated/unhashed. This will cause a 0-byte
Ingo Molnar73d62d82006-04-11 13:57:21 +0200113 * splice, if this is the first page.
Jens Axboe49d0b212006-04-10 09:04:41 +0200114 */
115 if (!page->mapping) {
116 err = -ENODATA;
117 goto error;
118 }
119
120 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +0200121 * Uh oh, read-error from disk.
Jens Axboe49d0b212006-04-10 09:04:41 +0200122 */
123 if (!PageUptodate(page)) {
124 err = -EIO;
125 goto error;
126 }
127
128 /*
Jens Axboef84d7512006-05-01 19:59:03 +0200129 * Page is ok afterall, we are done.
Jens Axboe49d0b212006-04-10 09:04:41 +0200130 */
Jens Axboe5274f052006-03-30 15:15:30 +0200131 unlock_page(page);
Jens Axboe5274f052006-03-30 15:15:30 +0200132 }
133
Jens Axboef84d7512006-05-01 19:59:03 +0200134 return 0;
Jens Axboe49d0b212006-04-10 09:04:41 +0200135error:
136 unlock_page(page);
Jens Axboef84d7512006-05-01 19:59:03 +0200137 return err;
Jens Axboe70524492006-04-11 15:51:17 +0200138}
139
Hugh Dickins708e3502011-07-25 17:12:32 -0700140const struct pipe_buf_operations page_cache_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200141 .confirm = page_cache_pipe_buf_confirm,
142 .release = page_cache_pipe_buf_release,
143 .try_steal = page_cache_pipe_buf_try_steal,
144 .get = generic_pipe_buf_get,
Jens Axboe5274f052006-03-30 15:15:30 +0200145};
146
Christoph Hellwigc928f642020-05-20 17:58:16 +0200147static bool user_page_pipe_buf_try_steal(struct pipe_inode_info *pipe,
148 struct pipe_buffer *buf)
Jens Axboe912d35f2006-04-26 10:59:21 +0200149{
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200150 if (!(buf->flags & PIPE_BUF_FLAG_GIFT))
Christoph Hellwigc928f642020-05-20 17:58:16 +0200151 return false;
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200152
Jens Axboe14328732006-05-03 10:35:26 +0200153 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +0200154 return generic_pipe_buf_try_steal(pipe, buf);
Jens Axboe912d35f2006-04-26 10:59:21 +0200155}
156
Eric Dumazetd4c3cca2006-12-13 00:34:04 -0800157static const struct pipe_buf_operations user_page_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200158 .release = page_cache_pipe_buf_release,
159 .try_steal = user_page_pipe_buf_try_steal,
160 .get = generic_pipe_buf_get,
Jens Axboe912d35f2006-04-26 10:59:21 +0200161};
162
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200163static void wakeup_pipe_readers(struct pipe_inode_info *pipe)
164{
165 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800166 if (waitqueue_active(&pipe->rd_wait))
167 wake_up_interruptible(&pipe->rd_wait);
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200168 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
169}
170
Jens Axboe932cc6d2007-06-21 13:10:21 +0200171/**
172 * splice_to_pipe - fill passed data into a pipe
173 * @pipe: pipe to fill
174 * @spd: data to fill
175 *
176 * Description:
Randy Dunlap79685b82007-07-27 08:08:51 +0200177 * @spd contains a map of pages and len/offset tuples, along with
Jens Axboe932cc6d2007-06-21 13:10:21 +0200178 * the struct pipe_buf_operations associated with these pages. This
179 * function will link that data to the pipe.
180 *
Jens Axboe83f91352006-04-02 23:05:09 +0200181 */
Jens Axboed6b29d72007-06-04 09:59:47 +0200182ssize_t splice_to_pipe(struct pipe_inode_info *pipe,
183 struct splice_pipe_desc *spd)
Jens Axboe5274f052006-03-30 15:15:30 +0200184{
Jens Axboe00de00b2007-06-15 13:14:22 +0200185 unsigned int spd_pages = spd->nr_pages;
David Howells8cefc102019-11-15 13:30:32 +0000186 unsigned int tail = pipe->tail;
187 unsigned int head = pipe->head;
188 unsigned int mask = pipe->ring_size - 1;
Al Viro8924fef2016-09-17 20:44:45 -0400189 int ret = 0, page_nr = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200190
Rabin Vincentd6785d92016-03-10 21:19:06 +0100191 if (!spd_pages)
192 return 0;
193
Al Viro8924fef2016-09-17 20:44:45 -0400194 if (unlikely(!pipe->readers)) {
195 send_sig(SIGPIPE, current, 0);
196 ret = -EPIPE;
197 goto out;
Jens Axboe5274f052006-03-30 15:15:30 +0200198 }
199
David Howells6718b6f2019-10-16 16:47:32 +0100200 while (!pipe_full(head, tail, pipe->max_usage)) {
David Howells8cefc102019-11-15 13:30:32 +0000201 struct pipe_buffer *buf = &pipe->bufs[head & mask];
Jens Axboe5274f052006-03-30 15:15:30 +0200202
Al Viro8924fef2016-09-17 20:44:45 -0400203 buf->page = spd->pages[page_nr];
204 buf->offset = spd->partial[page_nr].offset;
205 buf->len = spd->partial[page_nr].len;
206 buf->private = spd->partial[page_nr].private;
207 buf->ops = spd->ops;
Miklos Szeredi5a81e6a2017-02-16 17:49:02 +0100208 buf->flags = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200209
David Howells8cefc102019-11-15 13:30:32 +0000210 head++;
211 pipe->head = head;
Al Viro8924fef2016-09-17 20:44:45 -0400212 page_nr++;
213 ret += buf->len;
214
215 if (!--spd->nr_pages)
216 break;
217 }
218
219 if (!ret)
220 ret = -EAGAIN;
221
222out:
Jens Axboe00de00b2007-06-15 13:14:22 +0200223 while (page_nr < spd_pages)
Jens Axboebbdfc2f2007-11-06 23:29:47 -0800224 spd->spd_release(spd, page_nr++);
Jens Axboe5274f052006-03-30 15:15:30 +0200225
226 return ret;
227}
Hannes Frederic Sowa2b514572015-05-21 17:00:01 +0200228EXPORT_SYMBOL_GPL(splice_to_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200229
Al Viro79fddc42016-09-17 22:38:20 -0400230ssize_t add_to_pipe(struct pipe_inode_info *pipe, struct pipe_buffer *buf)
231{
David Howells8cefc102019-11-15 13:30:32 +0000232 unsigned int head = pipe->head;
233 unsigned int tail = pipe->tail;
234 unsigned int mask = pipe->ring_size - 1;
Al Viro79fddc42016-09-17 22:38:20 -0400235 int ret;
236
237 if (unlikely(!pipe->readers)) {
238 send_sig(SIGPIPE, current, 0);
239 ret = -EPIPE;
David Howells6718b6f2019-10-16 16:47:32 +0100240 } else if (pipe_full(head, tail, pipe->max_usage)) {
Al Viro79fddc42016-09-17 22:38:20 -0400241 ret = -EAGAIN;
242 } else {
David Howells8cefc102019-11-15 13:30:32 +0000243 pipe->bufs[head & mask] = *buf;
244 pipe->head = head + 1;
Al Viro79fddc42016-09-17 22:38:20 -0400245 return buf->len;
246 }
Miklos Szeredia7796382016-09-27 10:45:12 +0200247 pipe_buf_release(pipe, buf);
Al Viro79fddc42016-09-17 22:38:20 -0400248 return ret;
249}
250EXPORT_SYMBOL(add_to_pipe);
251
Jens Axboe35f3d142010-05-20 10:43:18 +0200252/*
253 * Check if we need to grow the arrays holding pages and partial page
254 * descriptions.
255 */
Eric Dumazet047fe362012-06-12 15:24:40 +0200256int splice_grow_spd(const struct pipe_inode_info *pipe, struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200257{
David Howells6718b6f2019-10-16 16:47:32 +0100258 unsigned int max_usage = READ_ONCE(pipe->max_usage);
Eric Dumazet047fe362012-06-12 15:24:40 +0200259
David Howells8cefc102019-11-15 13:30:32 +0000260 spd->nr_pages_max = max_usage;
261 if (max_usage <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200262 return 0;
263
David Howells8cefc102019-11-15 13:30:32 +0000264 spd->pages = kmalloc_array(max_usage, sizeof(struct page *), GFP_KERNEL);
265 spd->partial = kmalloc_array(max_usage, sizeof(struct partial_page),
Kees Cook6da2ec52018-06-12 13:55:00 -0700266 GFP_KERNEL);
Jens Axboe35f3d142010-05-20 10:43:18 +0200267
268 if (spd->pages && spd->partial)
269 return 0;
270
271 kfree(spd->pages);
272 kfree(spd->partial);
273 return -ENOMEM;
274}
275
Eric Dumazet047fe362012-06-12 15:24:40 +0200276void splice_shrink_spd(struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200277{
Eric Dumazet047fe362012-06-12 15:24:40 +0200278 if (spd->nr_pages_max <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200279 return;
280
281 kfree(spd->pages);
282 kfree(spd->partial);
283}
284
Jens Axboe83f91352006-04-02 23:05:09 +0200285/**
286 * generic_file_splice_read - splice data from file to a pipe
287 * @in: file to splice from
Jens Axboe932cc6d2007-06-21 13:10:21 +0200288 * @ppos: position in @in
Jens Axboe83f91352006-04-02 23:05:09 +0200289 * @pipe: pipe to splice to
290 * @len: number of bytes to splice
291 * @flags: splice modifier flags
292 *
Jens Axboe932cc6d2007-06-21 13:10:21 +0200293 * Description:
294 * Will read pages from given file and fill them into a pipe. Can be
Al Viro82c156f2016-09-22 23:35:42 -0400295 * used as long as it has more or less sane ->read_iter().
Jens Axboe932cc6d2007-06-21 13:10:21 +0200296 *
Jens Axboe83f91352006-04-02 23:05:09 +0200297 */
Jens Axboecbb7e572006-04-11 14:57:50 +0200298ssize_t generic_file_splice_read(struct file *in, loff_t *ppos,
299 struct pipe_inode_info *pipe, size_t len,
300 unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200301{
Al Viro82c156f2016-09-22 23:35:42 -0400302 struct iov_iter to;
303 struct kiocb kiocb;
David Howells8cefc102019-11-15 13:30:32 +0000304 unsigned int i_head;
305 int ret;
Boaz Harroshbe64f882015-04-15 16:15:17 -0700306
David Howellsaa563d72018-10-20 00:57:56 +0100307 iov_iter_pipe(&to, READ, pipe, len);
David Howells8cefc102019-11-15 13:30:32 +0000308 i_head = to.head;
Al Viro82c156f2016-09-22 23:35:42 -0400309 init_sync_kiocb(&kiocb, in);
310 kiocb.ki_pos = *ppos;
Miklos Szeredibb7462b2017-02-20 16:51:23 +0100311 ret = call_read_iter(in, &kiocb, &to);
Miklos Szeredi723590e2009-08-15 08:43:22 +0200312 if (ret > 0) {
Al Viro82c156f2016-09-22 23:35:42 -0400313 *ppos = kiocb.ki_pos;
Miklos Szeredi723590e2009-08-15 08:43:22 +0200314 file_accessed(in);
Al Viro82c156f2016-09-22 23:35:42 -0400315 } else if (ret < 0) {
David Howells8cefc102019-11-15 13:30:32 +0000316 to.head = i_head;
Al Viroc3a69022016-10-10 13:26:27 -0400317 to.iov_offset = 0;
318 iov_iter_advance(&to, 0); /* to free what was emitted */
Al Viro82c156f2016-09-22 23:35:42 -0400319 /*
320 * callers of ->splice_read() expect -EAGAIN on
321 * "can't put anything in there", rather than -EFAULT.
322 */
323 if (ret == -EFAULT)
324 ret = -EAGAIN;
Miklos Szeredi723590e2009-08-15 08:43:22 +0200325 }
Jens Axboe5274f052006-03-30 15:15:30 +0200326
327 return ret;
328}
Jens Axboe059a8f32006-04-02 23:06:05 +0200329EXPORT_SYMBOL(generic_file_splice_read);
330
Al Viro241699c2016-09-22 16:33:12 -0400331const struct pipe_buf_operations default_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200332 .release = generic_pipe_buf_release,
333 .try_steal = generic_pipe_buf_try_steal,
334 .get = generic_pipe_buf_get,
Miklos Szeredi68181732009-05-07 15:37:36 +0200335};
336
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100337/* Pipe buffer operations for a socket and similar. */
338const struct pipe_buf_operations nosteal_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200339 .release = generic_pipe_buf_release,
340 .get = generic_pipe_buf_get,
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100341};
342EXPORT_SYMBOL(nosteal_pipe_buf_ops);
343
Jens Axboe5274f052006-03-30 15:15:30 +0200344/*
Jens Axboe4f6f0bd2006-04-02 23:04:46 +0200345 * Send 'sd->len' bytes to socket from 'sd->file' at position 'sd->pos'
Jens Axboe016b6612006-04-25 15:42:00 +0200346 * using sendpage(). Return the number of bytes sent.
Jens Axboe5274f052006-03-30 15:15:30 +0200347 */
Jens Axboe76ad4d12006-05-03 10:41:33 +0200348static int pipe_to_sendpage(struct pipe_inode_info *pipe,
Jens Axboe5274f052006-03-30 15:15:30 +0200349 struct pipe_buffer *buf, struct splice_desc *sd)
350{
Jens Axboe6a14b902007-06-14 13:08:55 +0200351 struct file *file = sd->u.file;
Jens Axboe5274f052006-03-30 15:15:30 +0200352 loff_t pos = sd->pos;
Michał Mirosława8adbe32010-12-17 08:56:44 +0100353 int more;
Jens Axboe5274f052006-03-30 15:15:30 +0200354
Al Viro72c2d532013-09-22 16:27:52 -0400355 if (!likely(file->f_op->sendpage))
Michał Mirosława8adbe32010-12-17 08:56:44 +0100356 return -EINVAL;
Jens Axboe5274f052006-03-30 15:15:30 +0200357
Eric Dumazet35f9c092012-04-05 03:05:35 +0000358 more = (sd->flags & SPLICE_F_MORE) ? MSG_MORE : 0;
Eric Dumazetae62ca72013-01-06 18:21:49 +0000359
David Howells8cefc102019-11-15 13:30:32 +0000360 if (sd->len < sd->total_len &&
361 pipe_occupancy(pipe->head, pipe->tail) > 1)
Eric Dumazet35f9c092012-04-05 03:05:35 +0000362 more |= MSG_SENDPAGE_NOTLAST;
Eric Dumazetae62ca72013-01-06 18:21:49 +0000363
Michał Mirosława8adbe32010-12-17 08:56:44 +0100364 return file->f_op->sendpage(file, buf->page, buf->offset,
365 sd->len, &pos, more);
Jens Axboe5274f052006-03-30 15:15:30 +0200366}
367
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200368static void wakeup_pipe_writers(struct pipe_inode_info *pipe)
369{
370 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800371 if (waitqueue_active(&pipe->wr_wait))
372 wake_up_interruptible(&pipe->wr_wait);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200373 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
374}
375
376/**
377 * splice_from_pipe_feed - feed available data from a pipe to a file
378 * @pipe: pipe to splice from
379 * @sd: information to @actor
380 * @actor: handler that splices the data
381 *
382 * Description:
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200383 * This function loops over the pipe and calls @actor to do the
384 * actual moving of a single struct pipe_buffer to the desired
385 * destination. It returns when there's no more buffers left in
386 * the pipe or if the requested number of bytes (@sd->total_len)
387 * have been copied. It returns a positive number (one) if the
388 * pipe needs to be filled with more data, zero if the required
389 * number of bytes have been copied and -errno on error.
390 *
391 * This, together with splice_from_pipe_{begin,end,next}, may be
392 * used to implement the functionality of __splice_from_pipe() when
393 * locking is required around copying the pipe buffers to the
394 * destination.
395 */
Al Viro96f9bc82014-04-05 04:35:49 -0400396static int splice_from_pipe_feed(struct pipe_inode_info *pipe, struct splice_desc *sd,
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200397 splice_actor *actor)
398{
David Howells8cefc102019-11-15 13:30:32 +0000399 unsigned int head = pipe->head;
400 unsigned int tail = pipe->tail;
401 unsigned int mask = pipe->ring_size - 1;
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200402 int ret;
403
Linus Torvaldsec057592019-12-06 12:40:35 -0800404 while (!pipe_empty(head, tail)) {
David Howells8cefc102019-11-15 13:30:32 +0000405 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200406
407 sd->len = buf->len;
408 if (sd->len > sd->total_len)
409 sd->len = sd->total_len;
410
Miklos Szeredifba597d2016-09-27 10:45:12 +0200411 ret = pipe_buf_confirm(pipe, buf);
Michał Mirosława8adbe32010-12-17 08:56:44 +0100412 if (unlikely(ret)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200413 if (ret == -ENODATA)
414 ret = 0;
415 return ret;
416 }
Michał Mirosława8adbe32010-12-17 08:56:44 +0100417
418 ret = actor(pipe, buf, sd);
419 if (ret <= 0)
420 return ret;
421
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200422 buf->offset += ret;
423 buf->len -= ret;
424
425 sd->num_spliced += ret;
426 sd->len -= ret;
427 sd->pos += ret;
428 sd->total_len -= ret;
429
430 if (!buf->len) {
Miklos Szeredia7796382016-09-27 10:45:12 +0200431 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000432 tail++;
433 pipe->tail = tail;
Al Viro6447a3c2013-03-21 11:01:38 -0400434 if (pipe->files)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200435 sd->need_wakeup = true;
436 }
437
438 if (!sd->total_len)
439 return 0;
440 }
441
442 return 1;
443}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200444
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700445/* We know we have a pipe buffer, but maybe it's empty? */
446static inline bool eat_empty_buffer(struct pipe_inode_info *pipe)
447{
448 unsigned int tail = pipe->tail;
449 unsigned int mask = pipe->ring_size - 1;
450 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
451
452 if (unlikely(!buf->len)) {
453 pipe_buf_release(pipe, buf);
454 pipe->tail = tail+1;
455 return true;
456 }
457
458 return false;
459}
460
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200461/**
462 * splice_from_pipe_next - wait for some data to splice from
463 * @pipe: pipe to splice from
464 * @sd: information about the splice operation
465 *
466 * Description:
467 * This function will wait for some data and return a positive
468 * value (one) if pipe buffers are available. It will return zero
469 * or -errno if no more data needs to be spliced.
470 */
Al Viro96f9bc82014-04-05 04:35:49 -0400471static int splice_from_pipe_next(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200472{
Jan Karac725bfc2015-11-23 13:09:50 +0100473 /*
474 * Check for signal early to make process killable when there are
475 * always buffers available
476 */
477 if (signal_pending(current))
478 return -ERESTARTSYS;
479
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700480repeat:
David Howells8cefc102019-11-15 13:30:32 +0000481 while (pipe_empty(pipe->head, pipe->tail)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200482 if (!pipe->writers)
483 return 0;
484
Linus Torvaldsa28c8b92019-12-07 13:21:01 -0800485 if (sd->num_spliced)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200486 return 0;
487
488 if (sd->flags & SPLICE_F_NONBLOCK)
489 return -EAGAIN;
490
491 if (signal_pending(current))
492 return -ERESTARTSYS;
493
494 if (sd->need_wakeup) {
495 wakeup_pipe_writers(pipe);
496 sd->need_wakeup = false;
497 }
498
Linus Torvalds472e5b02020-10-01 19:14:36 -0700499 pipe_wait_readable(pipe);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200500 }
501
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700502 if (eat_empty_buffer(pipe))
503 goto repeat;
504
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200505 return 1;
506}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200507
508/**
509 * splice_from_pipe_begin - start splicing from pipe
Randy Dunlapb80901b2009-04-16 19:09:55 -0700510 * @sd: information about the splice operation
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200511 *
512 * Description:
513 * This function should be called before a loop containing
514 * splice_from_pipe_next() and splice_from_pipe_feed() to
515 * initialize the necessary fields of @sd.
516 */
Al Viro96f9bc82014-04-05 04:35:49 -0400517static void splice_from_pipe_begin(struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200518{
519 sd->num_spliced = 0;
520 sd->need_wakeup = false;
521}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200522
523/**
524 * splice_from_pipe_end - finish splicing from pipe
525 * @pipe: pipe to splice from
526 * @sd: information about the splice operation
527 *
528 * Description:
529 * This function will wake up pipe writers if necessary. It should
530 * be called after a loop containing splice_from_pipe_next() and
531 * splice_from_pipe_feed().
532 */
Al Viro96f9bc82014-04-05 04:35:49 -0400533static void splice_from_pipe_end(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200534{
535 if (sd->need_wakeup)
536 wakeup_pipe_writers(pipe);
537}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200538
Jens Axboe932cc6d2007-06-21 13:10:21 +0200539/**
540 * __splice_from_pipe - splice data from a pipe to given actor
541 * @pipe: pipe to splice from
542 * @sd: information to @actor
543 * @actor: handler that splices the data
544 *
545 * Description:
546 * This function does little more than loop over the pipe and call
547 * @actor to do the actual moving of a single struct pipe_buffer to
548 * the desired destination. See pipe_to_file, pipe_to_sendpage, or
549 * pipe_to_user.
550 *
Jens Axboe83f91352006-04-02 23:05:09 +0200551 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200552ssize_t __splice_from_pipe(struct pipe_inode_info *pipe, struct splice_desc *sd,
553 splice_actor *actor)
Jens Axboe5274f052006-03-30 15:15:30 +0200554{
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200555 int ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200556
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200557 splice_from_pipe_begin(sd);
558 do {
Jan Karac2489e02015-11-23 13:09:51 +0100559 cond_resched();
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200560 ret = splice_from_pipe_next(pipe, sd);
561 if (ret > 0)
562 ret = splice_from_pipe_feed(pipe, sd, actor);
563 } while (ret > 0);
564 splice_from_pipe_end(pipe, sd);
Jens Axboe5274f052006-03-30 15:15:30 +0200565
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200566 return sd->num_spliced ? sd->num_spliced : ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200567}
Mark Fasheh40bee44e2007-03-21 13:11:02 +0100568EXPORT_SYMBOL(__splice_from_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200569
Jens Axboe932cc6d2007-06-21 13:10:21 +0200570/**
571 * splice_from_pipe - splice data from a pipe to a file
572 * @pipe: pipe to splice from
573 * @out: file to splice to
574 * @ppos: position in @out
575 * @len: how many bytes to splice
576 * @flags: splice modifier flags
577 * @actor: handler that splices the data
578 *
579 * Description:
Miklos Szeredi29339702009-04-14 19:48:37 +0200580 * See __splice_from_pipe. This function locks the pipe inode,
Jens Axboe932cc6d2007-06-21 13:10:21 +0200581 * otherwise it's identical to __splice_from_pipe().
582 *
583 */
Mark Fasheh6da61802006-10-17 18:43:07 +0200584ssize_t splice_from_pipe(struct pipe_inode_info *pipe, struct file *out,
585 loff_t *ppos, size_t len, unsigned int flags,
586 splice_actor *actor)
587{
588 ssize_t ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200589 struct splice_desc sd = {
590 .total_len = len,
591 .flags = flags,
592 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +0200593 .u.file = out,
Jens Axboec66ab6f2007-06-12 21:17:17 +0200594 };
Mark Fasheh6da61802006-10-17 18:43:07 +0200595
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200596 pipe_lock(pipe);
Jens Axboec66ab6f2007-06-12 21:17:17 +0200597 ret = __splice_from_pipe(pipe, &sd, actor);
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200598 pipe_unlock(pipe);
Mark Fasheh6da61802006-10-17 18:43:07 +0200599
600 return ret;
601}
602
603/**
Al Viro8d020762014-04-05 04:27:08 -0400604 * iter_file_splice_write - splice data from a pipe to a file
605 * @pipe: pipe info
606 * @out: file to write to
607 * @ppos: position in @out
608 * @len: number of bytes to splice
609 * @flags: splice modifier flags
610 *
611 * Description:
612 * Will either move or copy pages (determined by @flags options) from
613 * the given pipe inode to the given file.
614 * This one is ->write_iter-based.
615 *
616 */
617ssize_t
618iter_file_splice_write(struct pipe_inode_info *pipe, struct file *out,
619 loff_t *ppos, size_t len, unsigned int flags)
620{
621 struct splice_desc sd = {
622 .total_len = len,
623 .flags = flags,
624 .pos = *ppos,
625 .u.file = out,
626 };
David Howells6718b6f2019-10-16 16:47:32 +0100627 int nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400628 struct bio_vec *array = kcalloc(nbufs, sizeof(struct bio_vec),
629 GFP_KERNEL);
630 ssize_t ret;
631
632 if (unlikely(!array))
633 return -ENOMEM;
634
635 pipe_lock(pipe);
636
637 splice_from_pipe_begin(&sd);
638 while (sd.total_len) {
639 struct iov_iter from;
Linus Torvaldsec057592019-12-06 12:40:35 -0800640 unsigned int head, tail, mask;
Al Viro8d020762014-04-05 04:27:08 -0400641 size_t left;
David Howells8cefc102019-11-15 13:30:32 +0000642 int n;
Al Viro8d020762014-04-05 04:27:08 -0400643
644 ret = splice_from_pipe_next(pipe, &sd);
645 if (ret <= 0)
646 break;
647
David Howells6718b6f2019-10-16 16:47:32 +0100648 if (unlikely(nbufs < pipe->max_usage)) {
Al Viro8d020762014-04-05 04:27:08 -0400649 kfree(array);
David Howells6718b6f2019-10-16 16:47:32 +0100650 nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400651 array = kcalloc(nbufs, sizeof(struct bio_vec),
652 GFP_KERNEL);
653 if (!array) {
654 ret = -ENOMEM;
655 break;
656 }
657 }
658
Linus Torvaldsec057592019-12-06 12:40:35 -0800659 head = pipe->head;
660 tail = pipe->tail;
661 mask = pipe->ring_size - 1;
662
Al Viro8d020762014-04-05 04:27:08 -0400663 /* build the vector */
664 left = sd.total_len;
David Howells8cefc102019-11-15 13:30:32 +0000665 for (n = 0; !pipe_empty(head, tail) && left && n < nbufs; tail++, n++) {
666 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400667 size_t this_len = buf->len;
668
669 if (this_len > left)
670 this_len = left;
671
Miklos Szeredifba597d2016-09-27 10:45:12 +0200672 ret = pipe_buf_confirm(pipe, buf);
Al Viro8d020762014-04-05 04:27:08 -0400673 if (unlikely(ret)) {
674 if (ret == -ENODATA)
675 ret = 0;
676 goto done;
677 }
678
679 array[n].bv_page = buf->page;
680 array[n].bv_len = this_len;
681 array[n].bv_offset = buf->offset;
682 left -= this_len;
683 }
684
David Howellsaa563d72018-10-20 00:57:56 +0100685 iov_iter_bvec(&from, WRITE, array, n, sd.total_len - left);
Christoph Hellwigabbb65892017-05-27 11:16:52 +0300686 ret = vfs_iter_write(out, &from, &sd.pos, 0);
Al Viro8d020762014-04-05 04:27:08 -0400687 if (ret <= 0)
688 break;
689
690 sd.num_spliced += ret;
691 sd.total_len -= ret;
Christoph Hellwigdbe4e192015-01-25 21:11:59 +0100692 *ppos = sd.pos;
Al Viro8d020762014-04-05 04:27:08 -0400693
694 /* dismiss the fully eaten buffers, adjust the partial one */
David Howells8cefc102019-11-15 13:30:32 +0000695 tail = pipe->tail;
Al Viro8d020762014-04-05 04:27:08 -0400696 while (ret) {
David Howells8cefc102019-11-15 13:30:32 +0000697 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400698 if (ret >= buf->len) {
Al Viro8d020762014-04-05 04:27:08 -0400699 ret -= buf->len;
700 buf->len = 0;
Miklos Szeredia7796382016-09-27 10:45:12 +0200701 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000702 tail++;
703 pipe->tail = tail;
Al Viro8d020762014-04-05 04:27:08 -0400704 if (pipe->files)
705 sd.need_wakeup = true;
706 } else {
707 buf->offset += ret;
708 buf->len -= ret;
709 ret = 0;
710 }
711 }
712 }
713done:
714 kfree(array);
715 splice_from_pipe_end(pipe, &sd);
716
717 pipe_unlock(pipe);
718
719 if (sd.num_spliced)
720 ret = sd.num_spliced;
721
722 return ret;
723}
724
725EXPORT_SYMBOL(iter_file_splice_write);
726
Jens Axboe83f91352006-04-02 23:05:09 +0200727/**
728 * generic_splice_sendpage - splice data from a pipe to a socket
Jens Axboe932cc6d2007-06-21 13:10:21 +0200729 * @pipe: pipe to splice from
Jens Axboe83f91352006-04-02 23:05:09 +0200730 * @out: socket to write to
Jens Axboe932cc6d2007-06-21 13:10:21 +0200731 * @ppos: position in @out
Jens Axboe83f91352006-04-02 23:05:09 +0200732 * @len: number of bytes to splice
733 * @flags: splice modifier flags
734 *
Jens Axboe932cc6d2007-06-21 13:10:21 +0200735 * Description:
736 * Will send @len bytes from the pipe to a network socket. No data copying
737 * is involved.
Jens Axboe83f91352006-04-02 23:05:09 +0200738 *
739 */
Ingo Molnar3a326a22006-04-10 15:18:35 +0200740ssize_t generic_splice_sendpage(struct pipe_inode_info *pipe, struct file *out,
Jens Axboecbb7e572006-04-11 14:57:50 +0200741 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200742{
Jens Axboe00522fb2006-04-26 14:39:29 +0200743 return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_sendpage);
Jens Axboe5274f052006-03-30 15:15:30 +0200744}
745
Jens Axboe059a8f32006-04-02 23:06:05 +0200746EXPORT_SYMBOL(generic_splice_sendpage);
Jeff Garzika0f06782006-03-30 23:06:13 -0500747
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200748static int warn_unsupported(struct file *file, const char *op)
749{
750 pr_debug_ratelimited(
751 "splice %s not supported for file %pD4 (pid: %d comm: %.20s)\n",
752 op, file, current->pid, current->comm);
753 return -EINVAL;
754}
755
Jens Axboe83f91352006-04-02 23:05:09 +0200756/*
757 * Attempt to initiate a splice from pipe to file.
758 */
Ingo Molnar3a326a22006-04-10 15:18:35 +0200759static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
Jens Axboecbb7e572006-04-11 14:57:50 +0200760 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200761{
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200762 if (unlikely(!out->f_op->splice_write))
763 return warn_unsupported(out, "write");
764 return out->f_op->splice_write(pipe, out, ppos, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200765}
766
Jens Axboe83f91352006-04-02 23:05:09 +0200767/*
768 * Attempt to initiate a splice from a file to a pipe.
769 */
Jens Axboecbb7e572006-04-11 14:57:50 +0200770static long do_splice_to(struct file *in, loff_t *ppos,
771 struct pipe_inode_info *pipe, size_t len,
772 unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200773{
Al Viro313d64a2021-01-24 23:49:04 -0500774 unsigned int p_space;
Jens Axboe5274f052006-03-30 15:15:30 +0200775 int ret;
776
Jens Axboe49570e92006-04-11 13:56:09 +0200777 if (unlikely(!(in->f_mode & FMODE_READ)))
Jens Axboe5274f052006-03-30 15:15:30 +0200778 return -EBADF;
779
Al Viro313d64a2021-01-24 23:49:04 -0500780 /* Don't try to read more the pipe has space for. */
781 p_space = pipe->max_usage - pipe_occupancy(pipe->head, pipe->tail);
782 len = min_t(size_t, len, p_space << PAGE_SHIFT);
783
Jens Axboecbb7e572006-04-11 14:57:50 +0200784 ret = rw_verify_area(READ, in, ppos, len);
Jens Axboe5274f052006-03-30 15:15:30 +0200785 if (unlikely(ret < 0))
786 return ret;
787
Al Viro03cc0782016-04-02 14:56:58 -0400788 if (unlikely(len > MAX_RW_COUNT))
789 len = MAX_RW_COUNT;
790
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200791 if (unlikely(!in->f_op->splice_read))
792 return warn_unsupported(in, "read");
793 return in->f_op->splice_read(in, ppos, pipe, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200794}
795
Jens Axboe932cc6d2007-06-21 13:10:21 +0200796/**
797 * splice_direct_to_actor - splices data directly between two non-pipes
798 * @in: file to splice from
799 * @sd: actor information on where to splice to
800 * @actor: handles the data splicing
801 *
802 * Description:
803 * This is a special case helper to splice directly between two
804 * points, without requiring an explicit pipe. Internally an allocated
Randy Dunlap79685b82007-07-27 08:08:51 +0200805 * pipe is cached in the process, and reused during the lifetime of
Jens Axboe932cc6d2007-06-21 13:10:21 +0200806 * that process.
807 *
Jens Axboec66ab6f2007-06-12 21:17:17 +0200808 */
809ssize_t splice_direct_to_actor(struct file *in, struct splice_desc *sd,
810 splice_direct_actor *actor)
Jens Axboeb92ce552006-04-11 13:52:07 +0200811{
812 struct pipe_inode_info *pipe;
813 long ret, bytes;
814 umode_t i_mode;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200815 size_t len;
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200816 int i, flags, more;
Jens Axboeb92ce552006-04-11 13:52:07 +0200817
818 /*
819 * We require the input being a regular file, as we don't want to
820 * randomly drop data for eg socket -> socket splicing. Use the
821 * piped splicing for that!
822 */
Al Viro496ad9a2013-01-23 17:07:38 -0500823 i_mode = file_inode(in)->i_mode;
Jens Axboeb92ce552006-04-11 13:52:07 +0200824 if (unlikely(!S_ISREG(i_mode) && !S_ISBLK(i_mode)))
825 return -EINVAL;
826
827 /*
828 * neither in nor out is a pipe, setup an internal pipe attached to
829 * 'out' and transfer the wanted data from 'in' to 'out' through that
830 */
831 pipe = current->splice_pipe;
Jens Axboe49570e92006-04-11 13:56:09 +0200832 if (unlikely(!pipe)) {
Al Viro7bee1302013-03-21 11:04:15 -0400833 pipe = alloc_pipe_info();
Jens Axboeb92ce552006-04-11 13:52:07 +0200834 if (!pipe)
835 return -ENOMEM;
836
837 /*
838 * We don't have an immediate reader, but we'll read the stuff
Jens Axboe00522fb2006-04-26 14:39:29 +0200839 * out of the pipe right after the splice_to_pipe(). So set
Jens Axboeb92ce552006-04-11 13:52:07 +0200840 * PIPE_READERS appropriately.
841 */
842 pipe->readers = 1;
843
844 current->splice_pipe = pipe;
845 }
846
847 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +0200848 * Do the splice.
Jens Axboeb92ce552006-04-11 13:52:07 +0200849 */
850 ret = 0;
851 bytes = 0;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200852 len = sd->total_len;
853 flags = sd->flags;
854
855 /*
856 * Don't block on output, we have to drain the direct pipe.
857 */
858 sd->flags &= ~SPLICE_F_NONBLOCK;
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200859 more = sd->flags & SPLICE_F_MORE;
Jens Axboeb92ce552006-04-11 13:52:07 +0200860
David Howells8cefc102019-11-15 13:30:32 +0000861 WARN_ON_ONCE(!pipe_empty(pipe->head, pipe->tail));
Darrick J. Wong17614442018-11-30 10:37:49 -0800862
Jens Axboeb92ce552006-04-11 13:52:07 +0200863 while (len) {
Jens Axboe51a92c02007-07-13 14:11:43 +0200864 size_t read_len;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200865 loff_t pos = sd->pos, prev_pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200866
Al Viro313d64a2021-01-24 23:49:04 -0500867 ret = do_splice_to(in, &pos, pipe, len, flags);
Jens Axboe51a92c02007-07-13 14:11:43 +0200868 if (unlikely(ret <= 0))
Jens Axboeb92ce552006-04-11 13:52:07 +0200869 goto out_release;
870
871 read_len = ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200872 sd->total_len = read_len;
Jens Axboeb92ce552006-04-11 13:52:07 +0200873
874 /*
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200875 * If more data is pending, set SPLICE_F_MORE
876 * If this is the last data and SPLICE_F_MORE was not set
877 * initially, clears it.
878 */
879 if (read_len < len)
880 sd->flags |= SPLICE_F_MORE;
881 else if (!more)
882 sd->flags &= ~SPLICE_F_MORE;
883 /*
Jens Axboeb92ce552006-04-11 13:52:07 +0200884 * NOTE: nonblocking mode only applies to the input. We
885 * must not do the output in nonblocking mode as then we
886 * could get stuck data in the internal pipe:
887 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200888 ret = actor(pipe, sd);
Tom Zanussia82c53a2008-05-09 13:28:36 +0200889 if (unlikely(ret <= 0)) {
890 sd->pos = prev_pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200891 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200892 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200893
894 bytes += ret;
895 len -= ret;
Jens Axboebcd4f3a2007-07-16 14:41:49 +0200896 sd->pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200897
Tom Zanussia82c53a2008-05-09 13:28:36 +0200898 if (ret < read_len) {
899 sd->pos = prev_pos + ret;
Jens Axboe51a92c02007-07-13 14:11:43 +0200900 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200901 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200902 }
903
Jens Axboe9e971982008-01-29 21:05:57 +0100904done:
David Howells8cefc102019-11-15 13:30:32 +0000905 pipe->tail = pipe->head = 0;
Jens Axboe80848702008-01-30 12:24:48 +0100906 file_accessed(in);
Jens Axboeb92ce552006-04-11 13:52:07 +0200907 return bytes;
908
909out_release:
910 /*
911 * If we did an incomplete transfer we must release
912 * the pipe buffers in question:
913 */
David Howells8cefc102019-11-15 13:30:32 +0000914 for (i = 0; i < pipe->ring_size; i++) {
915 struct pipe_buffer *buf = &pipe->bufs[i];
Jens Axboeb92ce552006-04-11 13:52:07 +0200916
Miklos Szeredia7796382016-09-27 10:45:12 +0200917 if (buf->ops)
918 pipe_buf_release(pipe, buf);
Jens Axboeb92ce552006-04-11 13:52:07 +0200919 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200920
Jens Axboe9e971982008-01-29 21:05:57 +0100921 if (!bytes)
922 bytes = ret;
Jens Axboeb92ce552006-04-11 13:52:07 +0200923
Jens Axboe9e971982008-01-29 21:05:57 +0100924 goto done;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200925}
926EXPORT_SYMBOL(splice_direct_to_actor);
927
928static int direct_splice_actor(struct pipe_inode_info *pipe,
929 struct splice_desc *sd)
930{
Jens Axboe6a14b902007-06-14 13:08:55 +0200931 struct file *file = sd->u.file;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200932
Al Viro7995bd22013-06-20 18:58:36 +0400933 return do_splice_from(pipe, file, sd->opos, sd->total_len,
Changli Gao2cb4b052010-06-29 13:09:18 +0200934 sd->flags);
Jens Axboec66ab6f2007-06-12 21:17:17 +0200935}
936
Jens Axboe932cc6d2007-06-21 13:10:21 +0200937/**
938 * do_splice_direct - splices data directly between two files
939 * @in: file to splice from
940 * @ppos: input file offset
941 * @out: file to splice to
Randy Dunlapacdb37c2013-06-22 19:44:08 -0700942 * @opos: output file offset
Jens Axboe932cc6d2007-06-21 13:10:21 +0200943 * @len: number of bytes to splice
944 * @flags: splice modifier flags
945 *
946 * Description:
947 * For use by do_sendfile(). splice can easily emulate sendfile, but
948 * doing it in the application would incur an extra system call
949 * (splice in + splice out, as compared to just sendfile()). So this helper
950 * can splice directly through a process-private pipe.
951 *
952 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200953long do_splice_direct(struct file *in, loff_t *ppos, struct file *out,
Al Viro7995bd22013-06-20 18:58:36 +0400954 loff_t *opos, size_t len, unsigned int flags)
Jens Axboec66ab6f2007-06-12 21:17:17 +0200955{
956 struct splice_desc sd = {
957 .len = len,
958 .total_len = len,
959 .flags = flags,
960 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +0200961 .u.file = out,
Al Viro7995bd22013-06-20 18:58:36 +0400962 .opos = opos,
Jens Axboec66ab6f2007-06-12 21:17:17 +0200963 };
Jens Axboe51a92c02007-07-13 14:11:43 +0200964 long ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200965
Al Viro18c67cb2013-06-19 15:41:54 +0400966 if (unlikely(!(out->f_mode & FMODE_WRITE)))
967 return -EBADF;
968
969 if (unlikely(out->f_flags & O_APPEND))
970 return -EINVAL;
971
972 ret = rw_verify_area(WRITE, out, opos, len);
973 if (unlikely(ret < 0))
974 return ret;
975
Jens Axboec66ab6f2007-06-12 21:17:17 +0200976 ret = splice_direct_to_actor(in, &sd, direct_splice_actor);
Jens Axboe51a92c02007-07-13 14:11:43 +0200977 if (ret > 0)
Tom Zanussia82c53a2008-05-09 13:28:36 +0200978 *ppos = sd.pos;
Jens Axboe51a92c02007-07-13 14:11:43 +0200979
Jens Axboec66ab6f2007-06-12 21:17:17 +0200980 return ret;
Jens Axboeb92ce552006-04-11 13:52:07 +0200981}
Miklos Szeredi1c118592014-10-24 00:14:35 +0200982EXPORT_SYMBOL(do_splice_direct);
Jens Axboeb92ce552006-04-11 13:52:07 +0200983
Al Viro8924fef2016-09-17 20:44:45 -0400984static int wait_for_space(struct pipe_inode_info *pipe, unsigned flags)
985{
Linus Torvalds52bce912016-12-21 10:59:34 -0800986 for (;;) {
987 if (unlikely(!pipe->readers)) {
988 send_sig(SIGPIPE, current, 0);
989 return -EPIPE;
990 }
David Howells6718b6f2019-10-16 16:47:32 +0100991 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Linus Torvalds52bce912016-12-21 10:59:34 -0800992 return 0;
Al Viro8924fef2016-09-17 20:44:45 -0400993 if (flags & SPLICE_F_NONBLOCK)
994 return -EAGAIN;
995 if (signal_pending(current))
996 return -ERESTARTSYS;
Linus Torvalds472e5b02020-10-01 19:14:36 -0700997 pipe_wait_writable(pipe);
Al Viro8924fef2016-09-17 20:44:45 -0400998 }
Al Viro8924fef2016-09-17 20:44:45 -0400999}
1000
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001001static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1002 struct pipe_inode_info *opipe,
1003 size_t len, unsigned int flags);
Jens Axboeddac0d32006-11-04 12:49:32 +01001004
1005/*
Jens Axboe83f91352006-04-02 23:05:09 +02001006 * Determine where to splice to/from.
1007 */
Jens Axboeee6e00c2020-10-22 14:15:51 -06001008long do_splice(struct file *in, loff_t *off_in, struct file *out,
1009 loff_t *off_out, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001010{
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001011 struct pipe_inode_info *ipipe;
1012 struct pipe_inode_info *opipe;
Al Viro7995bd22013-06-20 18:58:36 +04001013 loff_t offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001014 long ret;
Jens Axboe5274f052006-03-30 15:15:30 +02001015
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001016 if (unlikely(!(in->f_mode & FMODE_READ) ||
1017 !(out->f_mode & FMODE_WRITE)))
1018 return -EBADF;
1019
David Howellsc73be612020-01-14 17:07:11 +00001020 ipipe = get_pipe_info(in, true);
1021 opipe = get_pipe_info(out, true);
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001022
1023 if (ipipe && opipe) {
1024 if (off_in || off_out)
1025 return -ESPIPE;
1026
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001027 /* Splicing to self would be fun, but... */
1028 if (ipipe == opipe)
1029 return -EINVAL;
1030
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001031 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1032 flags |= SPLICE_F_NONBLOCK;
1033
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001034 return splice_pipe_to_pipe(ipipe, opipe, len, flags);
1035 }
1036
1037 if (ipipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001038 if (off_in)
1039 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001040 if (off_out) {
Changli Gao19c9a492010-06-29 13:10:36 +02001041 if (!(out->f_mode & FMODE_PWRITE))
Jens Axboeb92ce552006-04-11 13:52:07 +02001042 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001043 offset = *off_out;
Al Viro7995bd22013-06-20 18:58:36 +04001044 } else {
1045 offset = out->f_pos;
1046 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001047
Al Viro18c67cb2013-06-19 15:41:54 +04001048 if (unlikely(out->f_flags & O_APPEND))
1049 return -EINVAL;
1050
1051 ret = rw_verify_area(WRITE, out, &offset, len);
1052 if (unlikely(ret < 0))
1053 return ret;
1054
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001055 if (in->f_flags & O_NONBLOCK)
1056 flags |= SPLICE_F_NONBLOCK;
1057
Al Viro500368f2013-05-23 20:07:11 -04001058 file_start_write(out);
Al Viro7995bd22013-06-20 18:58:36 +04001059 ret = do_splice_from(ipipe, out, &offset, len, flags);
Al Viro500368f2013-05-23 20:07:11 -04001060 file_end_write(out);
Jens Axboea4514eb2006-04-19 15:57:05 +02001061
Al Viro7995bd22013-06-20 18:58:36 +04001062 if (!off_out)
1063 out->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001064 else
1065 *off_out = offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001066
1067 return ret;
Ingo Molnar529565dc2006-04-10 15:18:58 +02001068 }
Jens Axboe5274f052006-03-30 15:15:30 +02001069
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001070 if (opipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001071 if (off_out)
1072 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001073 if (off_in) {
Changli Gao19c9a492010-06-29 13:10:36 +02001074 if (!(in->f_mode & FMODE_PREAD))
Jens Axboeb92ce552006-04-11 13:52:07 +02001075 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001076 offset = *off_in;
Al Viro7995bd22013-06-20 18:58:36 +04001077 } else {
1078 offset = in->f_pos;
1079 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001080
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001081 if (out->f_flags & O_NONBLOCK)
1082 flags |= SPLICE_F_NONBLOCK;
1083
Al Viro8924fef2016-09-17 20:44:45 -04001084 pipe_lock(opipe);
1085 ret = wait_for_space(opipe, flags);
Al Viro313d64a2021-01-24 23:49:04 -05001086 if (!ret)
Al Viro8924fef2016-09-17 20:44:45 -04001087 ret = do_splice_to(in, &offset, opipe, len, flags);
1088 pipe_unlock(opipe);
1089 if (ret > 0)
1090 wakeup_pipe_readers(opipe);
Al Viro7995bd22013-06-20 18:58:36 +04001091 if (!off_in)
1092 in->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001093 else
1094 *off_in = offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001095
1096 return ret;
Ingo Molnar529565dc2006-04-10 15:18:58 +02001097 }
Jens Axboe5274f052006-03-30 15:15:30 +02001098
1099 return -EINVAL;
1100}
1101
Jens Axboeee6e00c2020-10-22 14:15:51 -06001102static long __do_splice(struct file *in, loff_t __user *off_in,
1103 struct file *out, loff_t __user *off_out,
1104 size_t len, unsigned int flags)
1105{
1106 struct pipe_inode_info *ipipe;
1107 struct pipe_inode_info *opipe;
1108 loff_t offset, *__off_in = NULL, *__off_out = NULL;
1109 long ret;
1110
1111 ipipe = get_pipe_info(in, true);
1112 opipe = get_pipe_info(out, true);
1113
1114 if (ipipe && off_in)
1115 return -ESPIPE;
1116 if (opipe && off_out)
1117 return -ESPIPE;
1118
1119 if (off_out) {
1120 if (copy_from_user(&offset, off_out, sizeof(loff_t)))
1121 return -EFAULT;
1122 __off_out = &offset;
1123 }
1124 if (off_in) {
1125 if (copy_from_user(&offset, off_in, sizeof(loff_t)))
1126 return -EFAULT;
1127 __off_in = &offset;
1128 }
1129
1130 ret = do_splice(in, __off_in, out, __off_out, len, flags);
1131 if (ret < 0)
1132 return ret;
1133
1134 if (__off_out && copy_to_user(off_out, __off_out, sizeof(loff_t)))
1135 return -EFAULT;
1136 if (__off_in && copy_to_user(off_in, __off_in, sizeof(loff_t)))
1137 return -EFAULT;
1138
1139 return ret;
1140}
1141
Al Viro79fddc42016-09-17 22:38:20 -04001142static int iter_to_pipe(struct iov_iter *from,
1143 struct pipe_inode_info *pipe,
1144 unsigned flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001145{
Al Viro79fddc42016-09-17 22:38:20 -04001146 struct pipe_buffer buf = {
1147 .ops = &user_page_pipe_buf_ops,
1148 .flags = flags
1149 };
1150 size_t total = 0;
1151 int ret = 0;
1152 bool failed = false;
1153
1154 while (iov_iter_count(from) && !failed) {
1155 struct page *pages[16];
Al Virodb85a9e2016-09-17 20:25:06 -04001156 ssize_t copied;
1157 size_t start;
Al Viro79fddc42016-09-17 22:38:20 -04001158 int n;
Jens Axboe912d35f2006-04-26 10:59:21 +02001159
Al Viro79fddc42016-09-17 22:38:20 -04001160 copied = iov_iter_get_pages(from, pages, ~0UL, 16, &start);
1161 if (copied <= 0) {
1162 ret = copied;
1163 break;
1164 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001165
Al Viro79fddc42016-09-17 22:38:20 -04001166 for (n = 0; copied; n++, start = 0) {
Al Virodb85a9e2016-09-17 20:25:06 -04001167 int size = min_t(int, copied, PAGE_SIZE - start);
Al Viro79fddc42016-09-17 22:38:20 -04001168 if (!failed) {
1169 buf.page = pages[n];
1170 buf.offset = start;
1171 buf.len = size;
1172 ret = add_to_pipe(pipe, &buf);
1173 if (unlikely(ret < 0)) {
1174 failed = true;
1175 } else {
1176 iov_iter_advance(from, ret);
1177 total += ret;
1178 }
1179 } else {
1180 put_page(pages[n]);
1181 }
Al Virodb85a9e2016-09-17 20:25:06 -04001182 copied -= size;
Jens Axboe912d35f2006-04-26 10:59:21 +02001183 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001184 }
Al Viro79fddc42016-09-17 22:38:20 -04001185 return total ? total : ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001186}
1187
Jens Axboe6a14b902007-06-14 13:08:55 +02001188static int pipe_to_user(struct pipe_inode_info *pipe, struct pipe_buffer *buf,
1189 struct splice_desc *sd)
1190{
Al Viro6130f532014-02-03 18:19:51 -05001191 int n = copy_page_to_iter(buf->page, buf->offset, sd->len, sd->u.data);
1192 return n == sd->len ? n : -EFAULT;
Jens Axboe6a14b902007-06-14 13:08:55 +02001193}
1194
1195/*
1196 * For lack of a better implementation, implement vmsplice() to userspace
1197 * as a simple copy of the pipes pages to the user iov.
1198 */
Al Viro87a30022018-05-26 21:39:52 -04001199static long vmsplice_to_user(struct file *file, struct iov_iter *iter,
1200 unsigned int flags)
Jens Axboe6a14b902007-06-14 13:08:55 +02001201{
David Howellsc73be612020-01-14 17:07:11 +00001202 struct pipe_inode_info *pipe = get_pipe_info(file, true);
Al Viro87a30022018-05-26 21:39:52 -04001203 struct splice_desc sd = {
1204 .total_len = iov_iter_count(iter),
1205 .flags = flags,
1206 .u.data = iter
1207 };
1208 long ret = 0;
Jens Axboe6a14b902007-06-14 13:08:55 +02001209
Jens Axboe6a14b902007-06-14 13:08:55 +02001210 if (!pipe)
1211 return -EBADF;
1212
Al Viro345995f2015-03-21 19:17:55 -04001213 if (sd.total_len) {
1214 pipe_lock(pipe);
1215 ret = __splice_from_pipe(pipe, &sd, pipe_to_user);
1216 pipe_unlock(pipe);
1217 }
Jens Axboe6a14b902007-06-14 13:08:55 +02001218
Jens Axboe6a14b902007-06-14 13:08:55 +02001219 return ret;
1220}
1221
Jens Axboe912d35f2006-04-26 10:59:21 +02001222/*
1223 * vmsplice splices a user address range into a pipe. It can be thought of
1224 * as splice-from-memory, where the regular splice is splice-from-file (or
1225 * to file). In both cases the output is a pipe, naturally.
Jens Axboe912d35f2006-04-26 10:59:21 +02001226 */
Al Viro87a30022018-05-26 21:39:52 -04001227static long vmsplice_to_pipe(struct file *file, struct iov_iter *iter,
1228 unsigned int flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001229{
Jens Axboeddac0d32006-11-04 12:49:32 +01001230 struct pipe_inode_info *pipe;
Al Viro87a30022018-05-26 21:39:52 -04001231 long ret = 0;
Al Viro79fddc42016-09-17 22:38:20 -04001232 unsigned buf_flag = 0;
1233
1234 if (flags & SPLICE_F_GIFT)
1235 buf_flag = PIPE_BUF_FLAG_GIFT;
Jens Axboe912d35f2006-04-26 10:59:21 +02001236
David Howellsc73be612020-01-14 17:07:11 +00001237 pipe = get_pipe_info(file, true);
Jens Axboeddac0d32006-11-04 12:49:32 +01001238 if (!pipe)
Jens Axboe912d35f2006-04-26 10:59:21 +02001239 return -EBADF;
Jens Axboe912d35f2006-04-26 10:59:21 +02001240
Al Viro8924fef2016-09-17 20:44:45 -04001241 pipe_lock(pipe);
1242 ret = wait_for_space(pipe, flags);
Al Viro79fddc42016-09-17 22:38:20 -04001243 if (!ret)
Al Viro87a30022018-05-26 21:39:52 -04001244 ret = iter_to_pipe(iter, pipe, buf_flag);
Al Viro8924fef2016-09-17 20:44:45 -04001245 pipe_unlock(pipe);
1246 if (ret > 0)
1247 wakeup_pipe_readers(pipe);
Jens Axboe35f3d142010-05-20 10:43:18 +02001248 return ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001249}
1250
Al Viro87a30022018-05-26 21:39:52 -04001251static int vmsplice_type(struct fd f, int *type)
1252{
1253 if (!f.file)
1254 return -EBADF;
1255 if (f.file->f_mode & FMODE_WRITE) {
1256 *type = WRITE;
1257 } else if (f.file->f_mode & FMODE_READ) {
1258 *type = READ;
1259 } else {
1260 fdput(f);
1261 return -EBADF;
1262 }
1263 return 0;
1264}
1265
Jens Axboe6a14b902007-06-14 13:08:55 +02001266/*
1267 * Note that vmsplice only really supports true splicing _from_ user memory
1268 * to a pipe, not the other way around. Splicing from user memory is a simple
1269 * operation that can be supported without any funky alignment restrictions
1270 * or nasty vm tricks. We simply map in the user memory and fill them into
1271 * a pipe. The reverse isn't quite as easy, though. There are two possible
1272 * solutions for that:
1273 *
1274 * - memcpy() the data internally, at which point we might as well just
1275 * do a regular read() on the buffer anyway.
1276 * - Lots of nasty vm tricks, that are neither fast nor flexible (it
1277 * has restriction limitations on both ends of the pipe).
1278 *
1279 * Currently we punt and implement it as a normal copy, see pipe_to_user().
1280 *
1281 */
Al Viro87a30022018-05-26 21:39:52 -04001282SYSCALL_DEFINE4(vmsplice, int, fd, const struct iovec __user *, uiov,
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001283 unsigned long, nr_segs, unsigned int, flags)
1284{
Al Viro87a30022018-05-26 21:39:52 -04001285 struct iovec iovstack[UIO_FASTIOV];
1286 struct iovec *iov = iovstack;
1287 struct iov_iter iter;
Jens Axboe87e5e6d2019-05-14 16:02:22 -06001288 ssize_t error;
Al Viro87a30022018-05-26 21:39:52 -04001289 struct fd f;
1290 int type;
1291
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001292 if (unlikely(flags & ~SPLICE_F_ALL))
1293 return -EINVAL;
1294
Al Viro87a30022018-05-26 21:39:52 -04001295 f = fdget(fd);
1296 error = vmsplice_type(f, &type);
1297 if (error)
1298 return error;
1299
1300 error = import_iovec(type, uiov, nr_segs,
1301 ARRAY_SIZE(iovstack), &iov, &iter);
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001302 if (error < 0)
1303 goto out_fdput;
1304
1305 if (!iov_iter_count(&iter))
1306 error = 0;
1307 else if (iov_iter_rw(&iter) == WRITE)
1308 error = vmsplice_to_pipe(f.file, &iter, flags);
1309 else
1310 error = vmsplice_to_user(f.file, &iter, flags);
1311
1312 kfree(iov);
1313out_fdput:
Al Viro87a30022018-05-26 21:39:52 -04001314 fdput(f);
1315 return error;
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001316}
1317
Heiko Carstens836f92a2009-01-14 14:14:33 +01001318SYSCALL_DEFINE6(splice, int, fd_in, loff_t __user *, off_in,
1319 int, fd_out, loff_t __user *, off_out,
1320 size_t, len, unsigned int, flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001321{
Al Viro2903ff02012-08-28 12:52:22 -04001322 struct fd in, out;
Jens Axboe5274f052006-03-30 15:15:30 +02001323 long error;
Jens Axboe5274f052006-03-30 15:15:30 +02001324
1325 if (unlikely(!len))
1326 return 0;
1327
Al Viro3d6ea292016-12-10 13:17:32 -05001328 if (unlikely(flags & ~SPLICE_F_ALL))
1329 return -EINVAL;
1330
Jens Axboe5274f052006-03-30 15:15:30 +02001331 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001332 in = fdget(fd_in);
1333 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001334 out = fdget(fd_out);
1335 if (out.file) {
Jens Axboeee6e00c2020-10-22 14:15:51 -06001336 error = __do_splice(in.file, off_in, out.file, off_out,
1337 len, flags);
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001338 fdput(out);
Jens Axboe5274f052006-03-30 15:15:30 +02001339 }
Al Viro2903ff02012-08-28 12:52:22 -04001340 fdput(in);
Jens Axboe5274f052006-03-30 15:15:30 +02001341 }
Jens Axboe5274f052006-03-30 15:15:30 +02001342 return error;
1343}
Jens Axboe70524492006-04-11 15:51:17 +02001344
1345/*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001346 * Make sure there's data to read. Wait for input if we can, otherwise
1347 * return an appropriate error.
1348 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001349static int ipipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001350{
1351 int ret;
1352
1353 /*
David Howells8cefc102019-11-15 13:30:32 +00001354 * Check the pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001355 * is speculative anyways, so missing one is ok.
1356 */
David Howells8cefc102019-11-15 13:30:32 +00001357 if (!pipe_empty(pipe->head, pipe->tail))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001358 return 0;
1359
1360 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001361 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001362
David Howells8cefc102019-11-15 13:30:32 +00001363 while (pipe_empty(pipe->head, pipe->tail)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001364 if (signal_pending(current)) {
1365 ret = -ERESTARTSYS;
1366 break;
1367 }
1368 if (!pipe->writers)
1369 break;
Linus Torvaldsa28c8b92019-12-07 13:21:01 -08001370 if (flags & SPLICE_F_NONBLOCK) {
1371 ret = -EAGAIN;
1372 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001373 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001374 pipe_wait_readable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001375 }
1376
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001377 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001378 return ret;
1379}
1380
1381/*
1382 * Make sure there's writeable room. Wait for room if we can, otherwise
1383 * return an appropriate error.
1384 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001385static int opipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001386{
1387 int ret;
1388
1389 /*
David Howells8cefc102019-11-15 13:30:32 +00001390 * Check pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001391 * is speculative anyways, so missing one is ok.
1392 */
Tetsuo Handa566d1362020-05-20 08:51:59 +09001393 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001394 return 0;
1395
1396 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001397 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001398
David Howells6718b6f2019-10-16 16:47:32 +01001399 while (pipe_full(pipe->head, pipe->tail, pipe->max_usage)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001400 if (!pipe->readers) {
1401 send_sig(SIGPIPE, current, 0);
1402 ret = -EPIPE;
1403 break;
1404 }
1405 if (flags & SPLICE_F_NONBLOCK) {
1406 ret = -EAGAIN;
1407 break;
1408 }
1409 if (signal_pending(current)) {
1410 ret = -ERESTARTSYS;
1411 break;
1412 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001413 pipe_wait_writable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001414 }
1415
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001416 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001417 return ret;
1418}
1419
1420/*
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001421 * Splice contents of ipipe to opipe.
1422 */
1423static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1424 struct pipe_inode_info *opipe,
1425 size_t len, unsigned int flags)
1426{
1427 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001428 unsigned int i_head, o_head;
1429 unsigned int i_tail, o_tail;
1430 unsigned int i_mask, o_mask;
1431 int ret = 0;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001432 bool input_wakeup = false;
1433
1434
1435retry:
1436 ret = ipipe_prep(ipipe, flags);
1437 if (ret)
1438 return ret;
1439
1440 ret = opipe_prep(opipe, flags);
1441 if (ret)
1442 return ret;
1443
1444 /*
1445 * Potential ABBA deadlock, work around it by ordering lock
1446 * grabbing by pipe info address. Otherwise two different processes
1447 * could deadlock (one doing tee from A -> B, the other from B -> A).
1448 */
1449 pipe_double_lock(ipipe, opipe);
1450
David Howells8cefc102019-11-15 13:30:32 +00001451 i_tail = ipipe->tail;
1452 i_mask = ipipe->ring_size - 1;
1453 o_head = opipe->head;
1454 o_mask = opipe->ring_size - 1;
1455
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001456 do {
David Howells8cefc102019-11-15 13:30:32 +00001457 size_t o_len;
1458
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001459 if (!opipe->readers) {
1460 send_sig(SIGPIPE, current, 0);
1461 if (!ret)
1462 ret = -EPIPE;
1463 break;
1464 }
1465
David Howells8cefc102019-11-15 13:30:32 +00001466 i_head = ipipe->head;
1467 o_tail = opipe->tail;
1468
1469 if (pipe_empty(i_head, i_tail) && !ipipe->writers)
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001470 break;
1471
1472 /*
1473 * Cannot make any progress, because either the input
1474 * pipe is empty or the output pipe is full.
1475 */
David Howells8cefc102019-11-15 13:30:32 +00001476 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001477 pipe_full(o_head, o_tail, opipe->max_usage)) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001478 /* Already processed some buffers, break */
1479 if (ret)
1480 break;
1481
1482 if (flags & SPLICE_F_NONBLOCK) {
1483 ret = -EAGAIN;
1484 break;
1485 }
1486
1487 /*
1488 * We raced with another reader/writer and haven't
1489 * managed to process any buffers. A zero return
1490 * value means EOF, so retry instead.
1491 */
1492 pipe_unlock(ipipe);
1493 pipe_unlock(opipe);
1494 goto retry;
1495 }
1496
David Howells8cefc102019-11-15 13:30:32 +00001497 ibuf = &ipipe->bufs[i_tail & i_mask];
1498 obuf = &opipe->bufs[o_head & o_mask];
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001499
1500 if (len >= ibuf->len) {
1501 /*
1502 * Simply move the whole buffer from ipipe to opipe
1503 */
1504 *obuf = *ibuf;
1505 ibuf->ops = NULL;
David Howells8cefc102019-11-15 13:30:32 +00001506 i_tail++;
1507 ipipe->tail = i_tail;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001508 input_wakeup = true;
David Howells8cefc102019-11-15 13:30:32 +00001509 o_len = obuf->len;
1510 o_head++;
1511 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001512 } else {
1513 /*
1514 * Get a reference to this pipe buffer,
1515 * so we can copy the contents over.
1516 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001517 if (!pipe_buf_get(ipipe, ibuf)) {
1518 if (ret == 0)
1519 ret = -EFAULT;
1520 break;
1521 }
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001522 *obuf = *ibuf;
1523
1524 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001525 * Don't inherit the gift and merge flags, we need to
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001526 * prevent multiple steals of this page.
1527 */
1528 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001529 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001530
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001531 obuf->len = len;
David Howells8cefc102019-11-15 13:30:32 +00001532 ibuf->offset += len;
1533 ibuf->len -= len;
1534 o_len = len;
1535 o_head++;
1536 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001537 }
David Howells8cefc102019-11-15 13:30:32 +00001538 ret += o_len;
1539 len -= o_len;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001540 } while (len);
1541
1542 pipe_unlock(ipipe);
1543 pipe_unlock(opipe);
1544
1545 /*
1546 * If we put data in the output pipe, wakeup any potential readers.
1547 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001548 if (ret > 0)
1549 wakeup_pipe_readers(opipe);
1550
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001551 if (input_wakeup)
1552 wakeup_pipe_writers(ipipe);
1553
1554 return ret;
1555}
1556
1557/*
Jens Axboe70524492006-04-11 15:51:17 +02001558 * Link contents of ipipe to opipe.
1559 */
1560static int link_pipe(struct pipe_inode_info *ipipe,
1561 struct pipe_inode_info *opipe,
1562 size_t len, unsigned int flags)
1563{
1564 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001565 unsigned int i_head, o_head;
1566 unsigned int i_tail, o_tail;
1567 unsigned int i_mask, o_mask;
1568 int ret = 0;
Jens Axboe70524492006-04-11 15:51:17 +02001569
1570 /*
1571 * Potential ABBA deadlock, work around it by ordering lock
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001572 * grabbing by pipe info address. Otherwise two different processes
Jens Axboe70524492006-04-11 15:51:17 +02001573 * could deadlock (one doing tee from A -> B, the other from B -> A).
1574 */
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001575 pipe_double_lock(ipipe, opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001576
David Howells8cefc102019-11-15 13:30:32 +00001577 i_tail = ipipe->tail;
1578 i_mask = ipipe->ring_size - 1;
1579 o_head = opipe->head;
1580 o_mask = opipe->ring_size - 1;
1581
Jens Axboeaadd06e2006-07-10 11:00:01 +02001582 do {
Jens Axboe70524492006-04-11 15:51:17 +02001583 if (!opipe->readers) {
1584 send_sig(SIGPIPE, current, 0);
1585 if (!ret)
1586 ret = -EPIPE;
1587 break;
1588 }
Jens Axboe70524492006-04-11 15:51:17 +02001589
David Howells8cefc102019-11-15 13:30:32 +00001590 i_head = ipipe->head;
1591 o_tail = opipe->tail;
1592
Jens Axboe70524492006-04-11 15:51:17 +02001593 /*
David Howells8cefc102019-11-15 13:30:32 +00001594 * If we have iterated all input buffers or run out of
Jens Axboeaadd06e2006-07-10 11:00:01 +02001595 * output room, break.
Jens Axboe70524492006-04-11 15:51:17 +02001596 */
David Howells8cefc102019-11-15 13:30:32 +00001597 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001598 pipe_full(o_head, o_tail, opipe->max_usage))
Jens Axboe70524492006-04-11 15:51:17 +02001599 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001600
David Howells8cefc102019-11-15 13:30:32 +00001601 ibuf = &ipipe->bufs[i_tail & i_mask];
1602 obuf = &opipe->bufs[o_head & o_mask];
Jens Axboeaadd06e2006-07-10 11:00:01 +02001603
Jens Axboe2a27250e2006-04-19 15:56:40 +02001604 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001605 * Get a reference to this pipe buffer,
1606 * so we can copy the contents over.
Jens Axboe2a27250e2006-04-19 15:56:40 +02001607 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001608 if (!pipe_buf_get(ipipe, ibuf)) {
1609 if (ret == 0)
1610 ret = -EFAULT;
1611 break;
1612 }
Jens Axboe70524492006-04-11 15:51:17 +02001613
Jens Axboeaadd06e2006-07-10 11:00:01 +02001614 *obuf = *ibuf;
Jens Axboe70524492006-04-11 15:51:17 +02001615
Jens Axboeaadd06e2006-07-10 11:00:01 +02001616 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001617 * Don't inherit the gift and merge flag, we need to prevent
1618 * multiple steals of this page.
Jens Axboeaadd06e2006-07-10 11:00:01 +02001619 */
1620 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001621 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001622
Jens Axboeaadd06e2006-07-10 11:00:01 +02001623 if (obuf->len > len)
1624 obuf->len = len;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001625 ret += obuf->len;
1626 len -= obuf->len;
David Howells8cefc102019-11-15 13:30:32 +00001627
1628 o_head++;
1629 opipe->head = o_head;
1630 i_tail++;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001631 } while (len);
Jens Axboe70524492006-04-11 15:51:17 +02001632
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001633 pipe_unlock(ipipe);
1634 pipe_unlock(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001635
Jens Axboeaadd06e2006-07-10 11:00:01 +02001636 /*
1637 * If we put data in the output pipe, wakeup any potential readers.
1638 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001639 if (ret > 0)
1640 wakeup_pipe_readers(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001641
1642 return ret;
1643}
1644
1645/*
1646 * This is a tee(1) implementation that works on pipes. It doesn't copy
1647 * any data, it simply references the 'in' pages on the 'out' pipe.
1648 * The 'flags' used are the SPLICE_F_* variants, currently the only
1649 * applicable one is SPLICE_F_NONBLOCK.
1650 */
Pavel Begunkov9dafdfc2020-05-17 14:18:05 +03001651long do_tee(struct file *in, struct file *out, size_t len, unsigned int flags)
Jens Axboe70524492006-04-11 15:51:17 +02001652{
David Howellsc73be612020-01-14 17:07:11 +00001653 struct pipe_inode_info *ipipe = get_pipe_info(in, true);
1654 struct pipe_inode_info *opipe = get_pipe_info(out, true);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001655 int ret = -EINVAL;
Jens Axboe70524492006-04-11 15:51:17 +02001656
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001657 if (unlikely(!(in->f_mode & FMODE_READ) ||
1658 !(out->f_mode & FMODE_WRITE)))
1659 return -EBADF;
1660
Jens Axboe70524492006-04-11 15:51:17 +02001661 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001662 * Duplicate the contents of ipipe to opipe without actually
1663 * copying the data.
Jens Axboe70524492006-04-11 15:51:17 +02001664 */
Jens Axboeaadd06e2006-07-10 11:00:01 +02001665 if (ipipe && opipe && ipipe != opipe) {
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001666 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1667 flags |= SPLICE_F_NONBLOCK;
1668
Jens Axboeaadd06e2006-07-10 11:00:01 +02001669 /*
1670 * Keep going, unless we encounter an error. The ipipe/opipe
1671 * ordering doesn't really matter.
1672 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001673 ret = ipipe_prep(ipipe, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001674 if (!ret) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001675 ret = opipe_prep(opipe, flags);
Jens Axboe02cf01a2008-02-20 10:34:51 +01001676 if (!ret)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001677 ret = link_pipe(ipipe, opipe, len, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001678 }
1679 }
Jens Axboe70524492006-04-11 15:51:17 +02001680
Jens Axboeaadd06e2006-07-10 11:00:01 +02001681 return ret;
Jens Axboe70524492006-04-11 15:51:17 +02001682}
1683
Heiko Carstens836f92a2009-01-14 14:14:33 +01001684SYSCALL_DEFINE4(tee, int, fdin, int, fdout, size_t, len, unsigned int, flags)
Jens Axboe70524492006-04-11 15:51:17 +02001685{
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001686 struct fd in, out;
Al Viro2903ff02012-08-28 12:52:22 -04001687 int error;
Jens Axboe70524492006-04-11 15:51:17 +02001688
Al Viro3d6ea292016-12-10 13:17:32 -05001689 if (unlikely(flags & ~SPLICE_F_ALL))
1690 return -EINVAL;
1691
Jens Axboe70524492006-04-11 15:51:17 +02001692 if (unlikely(!len))
1693 return 0;
1694
1695 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001696 in = fdget(fdin);
1697 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001698 out = fdget(fdout);
1699 if (out.file) {
1700 error = do_tee(in.file, out.file, len, flags);
1701 fdput(out);
Jens Axboe70524492006-04-11 15:51:17 +02001702 }
Al Viro2903ff02012-08-28 12:52:22 -04001703 fdput(in);
Jens Axboe70524492006-04-11 15:51:17 +02001704 }
1705
1706 return error;
1707}