blob: 74f968c65a9382011202acb781d311f3dfd4e34b [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Jens Axboe5274f052006-03-30 15:15:30 +02002/*
3 * "splice": joining two ropes together by interweaving their strands.
4 *
5 * This is the "extended pipe" functionality, where a pipe is used as
6 * an arbitrary in-memory buffer. Think of a pipe as a small kernel
7 * buffer that you can use to transfer data from one end to the other.
8 *
9 * The traditional unix read/write is extended with a "splice()" operation
10 * that transfers data buffers to or from a pipe buffer.
11 *
12 * Named by Larry McVoy, original implementation from Linus, extended by
Jens Axboec2058e02006-04-11 13:56:34 +020013 * Jens to support splicing to files, network, direct splicing, etc and
14 * fixing lots of bugs.
Jens Axboe5274f052006-03-30 15:15:30 +020015 *
Jens Axboe0fe23472006-09-04 15:41:16 +020016 * Copyright (C) 2005-2006 Jens Axboe <axboe@kernel.dk>
Jens Axboec2058e02006-04-11 13:56:34 +020017 * Copyright (C) 2005-2006 Linus Torvalds <torvalds@osdl.org>
18 * Copyright (C) 2006 Ingo Molnar <mingo@elte.hu>
Jens Axboe5274f052006-03-30 15:15:30 +020019 *
20 */
Christoph Hellwigbe297962016-11-01 07:40:16 -060021#include <linux/bvec.h>
Jens Axboe5274f052006-03-30 15:15:30 +020022#include <linux/fs.h>
23#include <linux/file.h>
24#include <linux/pagemap.h>
Jens Axboed6b29d72007-06-04 09:59:47 +020025#include <linux/splice.h>
KAMEZAWA Hiroyuki08e552c2009-01-07 18:08:01 -080026#include <linux/memcontrol.h>
Jens Axboe5274f052006-03-30 15:15:30 +020027#include <linux/mm_inline.h>
Jens Axboe5abc97a2006-03-30 15:16:46 +020028#include <linux/swap.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020029#include <linux/writeback.h>
Paul Gortmaker630d9c42011-11-16 23:57:37 -050030#include <linux/export.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020031#include <linux/syscalls.h>
Jens Axboe912d35f2006-04-26 10:59:21 +020032#include <linux/uio.h>
James Morris29ce2052007-07-13 11:44:32 +020033#include <linux/security.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090034#include <linux/gfp.h>
Eric Dumazet35f9c092012-04-05 03:05:35 +000035#include <linux/socket.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010036#include <linux/sched/signal.h>
37
Al Viro06ae43f2013-03-20 13:19:30 -040038#include "internal.h"
Jens Axboe5274f052006-03-30 15:15:30 +020039
Jens Axboe83f91352006-04-02 23:05:09 +020040/*
41 * Attempt to steal a page from a pipe buffer. This should perhaps go into
42 * a vm helper function, it's already simplified quite a bit by the
43 * addition of remove_mapping(). If success is returned, the caller may
44 * attempt to reuse this page for another destination.
45 */
Christoph Hellwigc928f642020-05-20 17:58:16 +020046static bool page_cache_pipe_buf_try_steal(struct pipe_inode_info *pipe,
47 struct pipe_buffer *buf)
Jens Axboe5abc97a2006-03-30 15:16:46 +020048{
49 struct page *page = buf->page;
Jens Axboe9e94cd42006-06-20 15:01:12 +020050 struct address_space *mapping;
Jens Axboe5abc97a2006-03-30 15:16:46 +020051
Jens Axboe9e0267c2006-04-19 15:57:31 +020052 lock_page(page);
53
Jens Axboe9e94cd42006-06-20 15:01:12 +020054 mapping = page_mapping(page);
55 if (mapping) {
56 WARN_ON(!PageUptodate(page));
Jens Axboe5abc97a2006-03-30 15:16:46 +020057
Jens Axboe9e94cd42006-06-20 15:01:12 +020058 /*
59 * At least for ext2 with nobh option, we need to wait on
60 * writeback completing on this page, since we'll remove it
61 * from the pagecache. Otherwise truncate wont wait on the
62 * page, allowing the disk blocks to be reused by someone else
63 * before we actually wrote our data to them. fs corruption
64 * ensues.
65 */
66 wait_on_page_writeback(page);
Jens Axboead8d6f02006-04-02 23:10:32 +020067
David Howells266cf652009-04-03 16:42:36 +010068 if (page_has_private(page) &&
69 !try_to_release_page(page, GFP_KERNEL))
Jens Axboeca39d652008-05-20 21:27:41 +020070 goto out_unlock;
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020071
Jens Axboe9e94cd42006-06-20 15:01:12 +020072 /*
73 * If we succeeded in removing the mapping, set LRU flag
74 * and return good.
75 */
76 if (remove_mapping(mapping, page)) {
77 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +020078 return true;
Jens Axboe9e94cd42006-06-20 15:01:12 +020079 }
Jens Axboe9e0267c2006-04-19 15:57:31 +020080 }
Jens Axboe5abc97a2006-03-30 15:16:46 +020081
Jens Axboe9e94cd42006-06-20 15:01:12 +020082 /*
83 * Raced with truncate or failed to remove page from current
84 * address space, unlock and return failure.
85 */
Jens Axboeca39d652008-05-20 21:27:41 +020086out_unlock:
Jens Axboe9e94cd42006-06-20 15:01:12 +020087 unlock_page(page);
Christoph Hellwigc928f642020-05-20 17:58:16 +020088 return false;
Jens Axboe5abc97a2006-03-30 15:16:46 +020089}
90
Jens Axboe76ad4d12006-05-03 10:41:33 +020091static void page_cache_pipe_buf_release(struct pipe_inode_info *pipe,
Jens Axboe5274f052006-03-30 15:15:30 +020092 struct pipe_buffer *buf)
93{
Kirill A. Shutemov09cbfea2016-04-01 15:29:47 +030094 put_page(buf->page);
Jens Axboe14328732006-05-03 10:35:26 +020095 buf->flags &= ~PIPE_BUF_FLAG_LRU;
Jens Axboe5274f052006-03-30 15:15:30 +020096}
97
Jens Axboe08457182007-06-12 20:51:32 +020098/*
99 * Check whether the contents of buf is OK to access. Since the content
100 * is a page cache page, IO may be in flight.
101 */
Jens Axboecac36bb02007-06-14 13:10:48 +0200102static int page_cache_pipe_buf_confirm(struct pipe_inode_info *pipe,
103 struct pipe_buffer *buf)
Jens Axboe5274f052006-03-30 15:15:30 +0200104{
105 struct page *page = buf->page;
Jens Axboe49d0b212006-04-10 09:04:41 +0200106 int err;
Jens Axboe5274f052006-03-30 15:15:30 +0200107
108 if (!PageUptodate(page)) {
Jens Axboe49d0b212006-04-10 09:04:41 +0200109 lock_page(page);
110
111 /*
112 * Page got truncated/unhashed. This will cause a 0-byte
Ingo Molnar73d62d82006-04-11 13:57:21 +0200113 * splice, if this is the first page.
Jens Axboe49d0b212006-04-10 09:04:41 +0200114 */
115 if (!page->mapping) {
116 err = -ENODATA;
117 goto error;
118 }
119
120 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +0200121 * Uh oh, read-error from disk.
Jens Axboe49d0b212006-04-10 09:04:41 +0200122 */
123 if (!PageUptodate(page)) {
124 err = -EIO;
125 goto error;
126 }
127
128 /*
Jens Axboef84d7512006-05-01 19:59:03 +0200129 * Page is ok afterall, we are done.
Jens Axboe49d0b212006-04-10 09:04:41 +0200130 */
Jens Axboe5274f052006-03-30 15:15:30 +0200131 unlock_page(page);
Jens Axboe5274f052006-03-30 15:15:30 +0200132 }
133
Jens Axboef84d7512006-05-01 19:59:03 +0200134 return 0;
Jens Axboe49d0b212006-04-10 09:04:41 +0200135error:
136 unlock_page(page);
Jens Axboef84d7512006-05-01 19:59:03 +0200137 return err;
Jens Axboe70524492006-04-11 15:51:17 +0200138}
139
Hugh Dickins708e3502011-07-25 17:12:32 -0700140const struct pipe_buf_operations page_cache_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200141 .confirm = page_cache_pipe_buf_confirm,
142 .release = page_cache_pipe_buf_release,
143 .try_steal = page_cache_pipe_buf_try_steal,
144 .get = generic_pipe_buf_get,
Jens Axboe5274f052006-03-30 15:15:30 +0200145};
146
Christoph Hellwigc928f642020-05-20 17:58:16 +0200147static bool user_page_pipe_buf_try_steal(struct pipe_inode_info *pipe,
148 struct pipe_buffer *buf)
Jens Axboe912d35f2006-04-26 10:59:21 +0200149{
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200150 if (!(buf->flags & PIPE_BUF_FLAG_GIFT))
Christoph Hellwigc928f642020-05-20 17:58:16 +0200151 return false;
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200152
Jens Axboe14328732006-05-03 10:35:26 +0200153 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +0200154 return generic_pipe_buf_try_steal(pipe, buf);
Jens Axboe912d35f2006-04-26 10:59:21 +0200155}
156
Eric Dumazetd4c3cca2006-12-13 00:34:04 -0800157static const struct pipe_buf_operations user_page_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200158 .release = page_cache_pipe_buf_release,
159 .try_steal = user_page_pipe_buf_try_steal,
160 .get = generic_pipe_buf_get,
Jens Axboe912d35f2006-04-26 10:59:21 +0200161};
162
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200163static void wakeup_pipe_readers(struct pipe_inode_info *pipe)
164{
165 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800166 if (waitqueue_active(&pipe->rd_wait))
167 wake_up_interruptible(&pipe->rd_wait);
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200168 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
169}
170
Jens Axboe932cc6d2007-06-21 13:10:21 +0200171/**
172 * splice_to_pipe - fill passed data into a pipe
173 * @pipe: pipe to fill
174 * @spd: data to fill
175 *
176 * Description:
Randy Dunlap79685b82007-07-27 08:08:51 +0200177 * @spd contains a map of pages and len/offset tuples, along with
Jens Axboe932cc6d2007-06-21 13:10:21 +0200178 * the struct pipe_buf_operations associated with these pages. This
179 * function will link that data to the pipe.
180 *
Jens Axboe83f91352006-04-02 23:05:09 +0200181 */
Jens Axboed6b29d72007-06-04 09:59:47 +0200182ssize_t splice_to_pipe(struct pipe_inode_info *pipe,
183 struct splice_pipe_desc *spd)
Jens Axboe5274f052006-03-30 15:15:30 +0200184{
Jens Axboe00de00b2007-06-15 13:14:22 +0200185 unsigned int spd_pages = spd->nr_pages;
David Howells8cefc102019-11-15 13:30:32 +0000186 unsigned int tail = pipe->tail;
187 unsigned int head = pipe->head;
188 unsigned int mask = pipe->ring_size - 1;
Al Viro8924fef2016-09-17 20:44:45 -0400189 int ret = 0, page_nr = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200190
Rabin Vincentd6785d92016-03-10 21:19:06 +0100191 if (!spd_pages)
192 return 0;
193
Al Viro8924fef2016-09-17 20:44:45 -0400194 if (unlikely(!pipe->readers)) {
195 send_sig(SIGPIPE, current, 0);
196 ret = -EPIPE;
197 goto out;
Jens Axboe5274f052006-03-30 15:15:30 +0200198 }
199
David Howells6718b6f2019-10-16 16:47:32 +0100200 while (!pipe_full(head, tail, pipe->max_usage)) {
David Howells8cefc102019-11-15 13:30:32 +0000201 struct pipe_buffer *buf = &pipe->bufs[head & mask];
Jens Axboe5274f052006-03-30 15:15:30 +0200202
Al Viro8924fef2016-09-17 20:44:45 -0400203 buf->page = spd->pages[page_nr];
204 buf->offset = spd->partial[page_nr].offset;
205 buf->len = spd->partial[page_nr].len;
206 buf->private = spd->partial[page_nr].private;
207 buf->ops = spd->ops;
Miklos Szeredi5a81e6a2017-02-16 17:49:02 +0100208 buf->flags = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200209
David Howells8cefc102019-11-15 13:30:32 +0000210 head++;
211 pipe->head = head;
Al Viro8924fef2016-09-17 20:44:45 -0400212 page_nr++;
213 ret += buf->len;
214
215 if (!--spd->nr_pages)
216 break;
217 }
218
219 if (!ret)
220 ret = -EAGAIN;
221
222out:
Jens Axboe00de00b2007-06-15 13:14:22 +0200223 while (page_nr < spd_pages)
Jens Axboebbdfc2f2007-11-06 23:29:47 -0800224 spd->spd_release(spd, page_nr++);
Jens Axboe5274f052006-03-30 15:15:30 +0200225
226 return ret;
227}
Hannes Frederic Sowa2b514572015-05-21 17:00:01 +0200228EXPORT_SYMBOL_GPL(splice_to_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200229
Al Viro79fddc42016-09-17 22:38:20 -0400230ssize_t add_to_pipe(struct pipe_inode_info *pipe, struct pipe_buffer *buf)
231{
David Howells8cefc102019-11-15 13:30:32 +0000232 unsigned int head = pipe->head;
233 unsigned int tail = pipe->tail;
234 unsigned int mask = pipe->ring_size - 1;
Al Viro79fddc42016-09-17 22:38:20 -0400235 int ret;
236
237 if (unlikely(!pipe->readers)) {
238 send_sig(SIGPIPE, current, 0);
239 ret = -EPIPE;
David Howells6718b6f2019-10-16 16:47:32 +0100240 } else if (pipe_full(head, tail, pipe->max_usage)) {
Al Viro79fddc42016-09-17 22:38:20 -0400241 ret = -EAGAIN;
242 } else {
David Howells8cefc102019-11-15 13:30:32 +0000243 pipe->bufs[head & mask] = *buf;
244 pipe->head = head + 1;
Al Viro79fddc42016-09-17 22:38:20 -0400245 return buf->len;
246 }
Miklos Szeredia7796382016-09-27 10:45:12 +0200247 pipe_buf_release(pipe, buf);
Al Viro79fddc42016-09-17 22:38:20 -0400248 return ret;
249}
250EXPORT_SYMBOL(add_to_pipe);
251
Jens Axboe35f3d142010-05-20 10:43:18 +0200252/*
253 * Check if we need to grow the arrays holding pages and partial page
254 * descriptions.
255 */
Eric Dumazet047fe362012-06-12 15:24:40 +0200256int splice_grow_spd(const struct pipe_inode_info *pipe, struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200257{
David Howells6718b6f2019-10-16 16:47:32 +0100258 unsigned int max_usage = READ_ONCE(pipe->max_usage);
Eric Dumazet047fe362012-06-12 15:24:40 +0200259
David Howells8cefc102019-11-15 13:30:32 +0000260 spd->nr_pages_max = max_usage;
261 if (max_usage <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200262 return 0;
263
David Howells8cefc102019-11-15 13:30:32 +0000264 spd->pages = kmalloc_array(max_usage, sizeof(struct page *), GFP_KERNEL);
265 spd->partial = kmalloc_array(max_usage, sizeof(struct partial_page),
Kees Cook6da2ec52018-06-12 13:55:00 -0700266 GFP_KERNEL);
Jens Axboe35f3d142010-05-20 10:43:18 +0200267
268 if (spd->pages && spd->partial)
269 return 0;
270
271 kfree(spd->pages);
272 kfree(spd->partial);
273 return -ENOMEM;
274}
275
Eric Dumazet047fe362012-06-12 15:24:40 +0200276void splice_shrink_spd(struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200277{
Eric Dumazet047fe362012-06-12 15:24:40 +0200278 if (spd->nr_pages_max <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200279 return;
280
281 kfree(spd->pages);
282 kfree(spd->partial);
283}
284
Jens Axboe83f91352006-04-02 23:05:09 +0200285/**
286 * generic_file_splice_read - splice data from file to a pipe
287 * @in: file to splice from
Jens Axboe932cc6d2007-06-21 13:10:21 +0200288 * @ppos: position in @in
Jens Axboe83f91352006-04-02 23:05:09 +0200289 * @pipe: pipe to splice to
290 * @len: number of bytes to splice
291 * @flags: splice modifier flags
292 *
Jens Axboe932cc6d2007-06-21 13:10:21 +0200293 * Description:
294 * Will read pages from given file and fill them into a pipe. Can be
Al Viro82c156f2016-09-22 23:35:42 -0400295 * used as long as it has more or less sane ->read_iter().
Jens Axboe932cc6d2007-06-21 13:10:21 +0200296 *
Jens Axboe83f91352006-04-02 23:05:09 +0200297 */
Jens Axboecbb7e572006-04-11 14:57:50 +0200298ssize_t generic_file_splice_read(struct file *in, loff_t *ppos,
299 struct pipe_inode_info *pipe, size_t len,
300 unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200301{
Al Viro82c156f2016-09-22 23:35:42 -0400302 struct iov_iter to;
303 struct kiocb kiocb;
David Howells8cefc102019-11-15 13:30:32 +0000304 unsigned int i_head;
305 int ret;
Boaz Harroshbe64f882015-04-15 16:15:17 -0700306
David Howellsaa563d72018-10-20 00:57:56 +0100307 iov_iter_pipe(&to, READ, pipe, len);
David Howells8cefc102019-11-15 13:30:32 +0000308 i_head = to.head;
Al Viro82c156f2016-09-22 23:35:42 -0400309 init_sync_kiocb(&kiocb, in);
310 kiocb.ki_pos = *ppos;
Miklos Szeredibb7462b2017-02-20 16:51:23 +0100311 ret = call_read_iter(in, &kiocb, &to);
Miklos Szeredi723590e2009-08-15 08:43:22 +0200312 if (ret > 0) {
Al Viro82c156f2016-09-22 23:35:42 -0400313 *ppos = kiocb.ki_pos;
Miklos Szeredi723590e2009-08-15 08:43:22 +0200314 file_accessed(in);
Al Viro82c156f2016-09-22 23:35:42 -0400315 } else if (ret < 0) {
David Howells8cefc102019-11-15 13:30:32 +0000316 to.head = i_head;
Al Viroc3a69022016-10-10 13:26:27 -0400317 to.iov_offset = 0;
318 iov_iter_advance(&to, 0); /* to free what was emitted */
Al Viro82c156f2016-09-22 23:35:42 -0400319 /*
320 * callers of ->splice_read() expect -EAGAIN on
321 * "can't put anything in there", rather than -EFAULT.
322 */
323 if (ret == -EFAULT)
324 ret = -EAGAIN;
Miklos Szeredi723590e2009-08-15 08:43:22 +0200325 }
Jens Axboe5274f052006-03-30 15:15:30 +0200326
327 return ret;
328}
Jens Axboe059a8f32006-04-02 23:06:05 +0200329EXPORT_SYMBOL(generic_file_splice_read);
330
Al Viro241699c2016-09-22 16:33:12 -0400331const struct pipe_buf_operations default_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200332 .release = generic_pipe_buf_release,
333 .try_steal = generic_pipe_buf_try_steal,
334 .get = generic_pipe_buf_get,
Miklos Szeredi68181732009-05-07 15:37:36 +0200335};
336
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100337/* Pipe buffer operations for a socket and similar. */
338const struct pipe_buf_operations nosteal_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200339 .release = generic_pipe_buf_release,
340 .get = generic_pipe_buf_get,
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100341};
342EXPORT_SYMBOL(nosteal_pipe_buf_ops);
343
Jens Axboe5274f052006-03-30 15:15:30 +0200344/*
Jens Axboe4f6f0bd2006-04-02 23:04:46 +0200345 * Send 'sd->len' bytes to socket from 'sd->file' at position 'sd->pos'
Jens Axboe016b6612006-04-25 15:42:00 +0200346 * using sendpage(). Return the number of bytes sent.
Jens Axboe5274f052006-03-30 15:15:30 +0200347 */
Jens Axboe76ad4d12006-05-03 10:41:33 +0200348static int pipe_to_sendpage(struct pipe_inode_info *pipe,
Jens Axboe5274f052006-03-30 15:15:30 +0200349 struct pipe_buffer *buf, struct splice_desc *sd)
350{
Jens Axboe6a14b902007-06-14 13:08:55 +0200351 struct file *file = sd->u.file;
Jens Axboe5274f052006-03-30 15:15:30 +0200352 loff_t pos = sd->pos;
Michał Mirosława8adbe32010-12-17 08:56:44 +0100353 int more;
Jens Axboe5274f052006-03-30 15:15:30 +0200354
Al Viro72c2d532013-09-22 16:27:52 -0400355 if (!likely(file->f_op->sendpage))
Michał Mirosława8adbe32010-12-17 08:56:44 +0100356 return -EINVAL;
Jens Axboe5274f052006-03-30 15:15:30 +0200357
Eric Dumazet35f9c092012-04-05 03:05:35 +0000358 more = (sd->flags & SPLICE_F_MORE) ? MSG_MORE : 0;
Eric Dumazetae62ca72013-01-06 18:21:49 +0000359
David Howells8cefc102019-11-15 13:30:32 +0000360 if (sd->len < sd->total_len &&
361 pipe_occupancy(pipe->head, pipe->tail) > 1)
Eric Dumazet35f9c092012-04-05 03:05:35 +0000362 more |= MSG_SENDPAGE_NOTLAST;
Eric Dumazetae62ca72013-01-06 18:21:49 +0000363
Michał Mirosława8adbe32010-12-17 08:56:44 +0100364 return file->f_op->sendpage(file, buf->page, buf->offset,
365 sd->len, &pos, more);
Jens Axboe5274f052006-03-30 15:15:30 +0200366}
367
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200368static void wakeup_pipe_writers(struct pipe_inode_info *pipe)
369{
370 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800371 if (waitqueue_active(&pipe->wr_wait))
372 wake_up_interruptible(&pipe->wr_wait);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200373 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
374}
375
376/**
377 * splice_from_pipe_feed - feed available data from a pipe to a file
378 * @pipe: pipe to splice from
379 * @sd: information to @actor
380 * @actor: handler that splices the data
381 *
382 * Description:
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200383 * This function loops over the pipe and calls @actor to do the
384 * actual moving of a single struct pipe_buffer to the desired
385 * destination. It returns when there's no more buffers left in
386 * the pipe or if the requested number of bytes (@sd->total_len)
387 * have been copied. It returns a positive number (one) if the
388 * pipe needs to be filled with more data, zero if the required
389 * number of bytes have been copied and -errno on error.
390 *
391 * This, together with splice_from_pipe_{begin,end,next}, may be
392 * used to implement the functionality of __splice_from_pipe() when
393 * locking is required around copying the pipe buffers to the
394 * destination.
395 */
Al Viro96f9bc82014-04-05 04:35:49 -0400396static int splice_from_pipe_feed(struct pipe_inode_info *pipe, struct splice_desc *sd,
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200397 splice_actor *actor)
398{
David Howells8cefc102019-11-15 13:30:32 +0000399 unsigned int head = pipe->head;
400 unsigned int tail = pipe->tail;
401 unsigned int mask = pipe->ring_size - 1;
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200402 int ret;
403
Linus Torvaldsec057592019-12-06 12:40:35 -0800404 while (!pipe_empty(head, tail)) {
David Howells8cefc102019-11-15 13:30:32 +0000405 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200406
407 sd->len = buf->len;
408 if (sd->len > sd->total_len)
409 sd->len = sd->total_len;
410
Miklos Szeredifba597d2016-09-27 10:45:12 +0200411 ret = pipe_buf_confirm(pipe, buf);
Michał Mirosława8adbe32010-12-17 08:56:44 +0100412 if (unlikely(ret)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200413 if (ret == -ENODATA)
414 ret = 0;
415 return ret;
416 }
Michał Mirosława8adbe32010-12-17 08:56:44 +0100417
418 ret = actor(pipe, buf, sd);
419 if (ret <= 0)
420 return ret;
421
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200422 buf->offset += ret;
423 buf->len -= ret;
424
425 sd->num_spliced += ret;
426 sd->len -= ret;
427 sd->pos += ret;
428 sd->total_len -= ret;
429
430 if (!buf->len) {
Miklos Szeredia7796382016-09-27 10:45:12 +0200431 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000432 tail++;
433 pipe->tail = tail;
Al Viro6447a3c2013-03-21 11:01:38 -0400434 if (pipe->files)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200435 sd->need_wakeup = true;
436 }
437
438 if (!sd->total_len)
439 return 0;
440 }
441
442 return 1;
443}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200444
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700445/* We know we have a pipe buffer, but maybe it's empty? */
446static inline bool eat_empty_buffer(struct pipe_inode_info *pipe)
447{
448 unsigned int tail = pipe->tail;
449 unsigned int mask = pipe->ring_size - 1;
450 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
451
452 if (unlikely(!buf->len)) {
453 pipe_buf_release(pipe, buf);
454 pipe->tail = tail+1;
455 return true;
456 }
457
458 return false;
459}
460
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200461/**
462 * splice_from_pipe_next - wait for some data to splice from
463 * @pipe: pipe to splice from
464 * @sd: information about the splice operation
465 *
466 * Description:
467 * This function will wait for some data and return a positive
468 * value (one) if pipe buffers are available. It will return zero
469 * or -errno if no more data needs to be spliced.
470 */
Al Viro96f9bc82014-04-05 04:35:49 -0400471static int splice_from_pipe_next(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200472{
Jan Karac725bfc2015-11-23 13:09:50 +0100473 /*
474 * Check for signal early to make process killable when there are
475 * always buffers available
476 */
477 if (signal_pending(current))
478 return -ERESTARTSYS;
479
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700480repeat:
David Howells8cefc102019-11-15 13:30:32 +0000481 while (pipe_empty(pipe->head, pipe->tail)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200482 if (!pipe->writers)
483 return 0;
484
Linus Torvaldsa28c8b92019-12-07 13:21:01 -0800485 if (sd->num_spliced)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200486 return 0;
487
488 if (sd->flags & SPLICE_F_NONBLOCK)
489 return -EAGAIN;
490
491 if (signal_pending(current))
492 return -ERESTARTSYS;
493
494 if (sd->need_wakeup) {
495 wakeup_pipe_writers(pipe);
496 sd->need_wakeup = false;
497 }
498
Linus Torvalds472e5b02020-10-01 19:14:36 -0700499 pipe_wait_readable(pipe);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200500 }
501
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700502 if (eat_empty_buffer(pipe))
503 goto repeat;
504
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200505 return 1;
506}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200507
508/**
509 * splice_from_pipe_begin - start splicing from pipe
Randy Dunlapb80901b2009-04-16 19:09:55 -0700510 * @sd: information about the splice operation
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200511 *
512 * Description:
513 * This function should be called before a loop containing
514 * splice_from_pipe_next() and splice_from_pipe_feed() to
515 * initialize the necessary fields of @sd.
516 */
Al Viro96f9bc82014-04-05 04:35:49 -0400517static void splice_from_pipe_begin(struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200518{
519 sd->num_spliced = 0;
520 sd->need_wakeup = false;
521}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200522
523/**
524 * splice_from_pipe_end - finish splicing from pipe
525 * @pipe: pipe to splice from
526 * @sd: information about the splice operation
527 *
528 * Description:
529 * This function will wake up pipe writers if necessary. It should
530 * be called after a loop containing splice_from_pipe_next() and
531 * splice_from_pipe_feed().
532 */
Al Viro96f9bc82014-04-05 04:35:49 -0400533static void splice_from_pipe_end(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200534{
535 if (sd->need_wakeup)
536 wakeup_pipe_writers(pipe);
537}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200538
Jens Axboe932cc6d2007-06-21 13:10:21 +0200539/**
540 * __splice_from_pipe - splice data from a pipe to given actor
541 * @pipe: pipe to splice from
542 * @sd: information to @actor
543 * @actor: handler that splices the data
544 *
545 * Description:
546 * This function does little more than loop over the pipe and call
547 * @actor to do the actual moving of a single struct pipe_buffer to
548 * the desired destination. See pipe_to_file, pipe_to_sendpage, or
549 * pipe_to_user.
550 *
Jens Axboe83f91352006-04-02 23:05:09 +0200551 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200552ssize_t __splice_from_pipe(struct pipe_inode_info *pipe, struct splice_desc *sd,
553 splice_actor *actor)
Jens Axboe5274f052006-03-30 15:15:30 +0200554{
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200555 int ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200556
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200557 splice_from_pipe_begin(sd);
558 do {
Jan Karac2489e02015-11-23 13:09:51 +0100559 cond_resched();
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200560 ret = splice_from_pipe_next(pipe, sd);
561 if (ret > 0)
562 ret = splice_from_pipe_feed(pipe, sd, actor);
563 } while (ret > 0);
564 splice_from_pipe_end(pipe, sd);
Jens Axboe5274f052006-03-30 15:15:30 +0200565
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200566 return sd->num_spliced ? sd->num_spliced : ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200567}
Mark Fasheh40bee44e2007-03-21 13:11:02 +0100568EXPORT_SYMBOL(__splice_from_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200569
Jens Axboe932cc6d2007-06-21 13:10:21 +0200570/**
571 * splice_from_pipe - splice data from a pipe to a file
572 * @pipe: pipe to splice from
573 * @out: file to splice to
574 * @ppos: position in @out
575 * @len: how many bytes to splice
576 * @flags: splice modifier flags
577 * @actor: handler that splices the data
578 *
579 * Description:
Miklos Szeredi29339702009-04-14 19:48:37 +0200580 * See __splice_from_pipe. This function locks the pipe inode,
Jens Axboe932cc6d2007-06-21 13:10:21 +0200581 * otherwise it's identical to __splice_from_pipe().
582 *
583 */
Mark Fasheh6da61802006-10-17 18:43:07 +0200584ssize_t splice_from_pipe(struct pipe_inode_info *pipe, struct file *out,
585 loff_t *ppos, size_t len, unsigned int flags,
586 splice_actor *actor)
587{
588 ssize_t ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200589 struct splice_desc sd = {
590 .total_len = len,
591 .flags = flags,
592 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +0200593 .u.file = out,
Jens Axboec66ab6f2007-06-12 21:17:17 +0200594 };
Mark Fasheh6da61802006-10-17 18:43:07 +0200595
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200596 pipe_lock(pipe);
Jens Axboec66ab6f2007-06-12 21:17:17 +0200597 ret = __splice_from_pipe(pipe, &sd, actor);
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200598 pipe_unlock(pipe);
Mark Fasheh6da61802006-10-17 18:43:07 +0200599
600 return ret;
601}
602
603/**
Al Viro8d020762014-04-05 04:27:08 -0400604 * iter_file_splice_write - splice data from a pipe to a file
605 * @pipe: pipe info
606 * @out: file to write to
607 * @ppos: position in @out
608 * @len: number of bytes to splice
609 * @flags: splice modifier flags
610 *
611 * Description:
612 * Will either move or copy pages (determined by @flags options) from
613 * the given pipe inode to the given file.
614 * This one is ->write_iter-based.
615 *
616 */
617ssize_t
618iter_file_splice_write(struct pipe_inode_info *pipe, struct file *out,
619 loff_t *ppos, size_t len, unsigned int flags)
620{
621 struct splice_desc sd = {
622 .total_len = len,
623 .flags = flags,
624 .pos = *ppos,
625 .u.file = out,
626 };
David Howells6718b6f2019-10-16 16:47:32 +0100627 int nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400628 struct bio_vec *array = kcalloc(nbufs, sizeof(struct bio_vec),
629 GFP_KERNEL);
630 ssize_t ret;
631
632 if (unlikely(!array))
633 return -ENOMEM;
634
635 pipe_lock(pipe);
636
637 splice_from_pipe_begin(&sd);
638 while (sd.total_len) {
639 struct iov_iter from;
Linus Torvaldsec057592019-12-06 12:40:35 -0800640 unsigned int head, tail, mask;
Al Viro8d020762014-04-05 04:27:08 -0400641 size_t left;
David Howells8cefc102019-11-15 13:30:32 +0000642 int n;
Al Viro8d020762014-04-05 04:27:08 -0400643
644 ret = splice_from_pipe_next(pipe, &sd);
645 if (ret <= 0)
646 break;
647
David Howells6718b6f2019-10-16 16:47:32 +0100648 if (unlikely(nbufs < pipe->max_usage)) {
Al Viro8d020762014-04-05 04:27:08 -0400649 kfree(array);
David Howells6718b6f2019-10-16 16:47:32 +0100650 nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400651 array = kcalloc(nbufs, sizeof(struct bio_vec),
652 GFP_KERNEL);
653 if (!array) {
654 ret = -ENOMEM;
655 break;
656 }
657 }
658
Linus Torvaldsec057592019-12-06 12:40:35 -0800659 head = pipe->head;
660 tail = pipe->tail;
661 mask = pipe->ring_size - 1;
662
Al Viro8d020762014-04-05 04:27:08 -0400663 /* build the vector */
664 left = sd.total_len;
David Howells8cefc102019-11-15 13:30:32 +0000665 for (n = 0; !pipe_empty(head, tail) && left && n < nbufs; tail++, n++) {
666 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400667 size_t this_len = buf->len;
668
669 if (this_len > left)
670 this_len = left;
671
Miklos Szeredifba597d2016-09-27 10:45:12 +0200672 ret = pipe_buf_confirm(pipe, buf);
Al Viro8d020762014-04-05 04:27:08 -0400673 if (unlikely(ret)) {
674 if (ret == -ENODATA)
675 ret = 0;
676 goto done;
677 }
678
679 array[n].bv_page = buf->page;
680 array[n].bv_len = this_len;
681 array[n].bv_offset = buf->offset;
682 left -= this_len;
683 }
684
David Howellsaa563d72018-10-20 00:57:56 +0100685 iov_iter_bvec(&from, WRITE, array, n, sd.total_len - left);
Christoph Hellwigabbb65892017-05-27 11:16:52 +0300686 ret = vfs_iter_write(out, &from, &sd.pos, 0);
Al Viro8d020762014-04-05 04:27:08 -0400687 if (ret <= 0)
688 break;
689
690 sd.num_spliced += ret;
691 sd.total_len -= ret;
Christoph Hellwigdbe4e192015-01-25 21:11:59 +0100692 *ppos = sd.pos;
Al Viro8d020762014-04-05 04:27:08 -0400693
694 /* dismiss the fully eaten buffers, adjust the partial one */
David Howells8cefc102019-11-15 13:30:32 +0000695 tail = pipe->tail;
Al Viro8d020762014-04-05 04:27:08 -0400696 while (ret) {
David Howells8cefc102019-11-15 13:30:32 +0000697 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400698 if (ret >= buf->len) {
Al Viro8d020762014-04-05 04:27:08 -0400699 ret -= buf->len;
700 buf->len = 0;
Miklos Szeredia7796382016-09-27 10:45:12 +0200701 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000702 tail++;
703 pipe->tail = tail;
Al Viro8d020762014-04-05 04:27:08 -0400704 if (pipe->files)
705 sd.need_wakeup = true;
706 } else {
707 buf->offset += ret;
708 buf->len -= ret;
709 ret = 0;
710 }
711 }
712 }
713done:
714 kfree(array);
715 splice_from_pipe_end(pipe, &sd);
716
717 pipe_unlock(pipe);
718
719 if (sd.num_spliced)
720 ret = sd.num_spliced;
721
722 return ret;
723}
724
725EXPORT_SYMBOL(iter_file_splice_write);
726
Jens Axboe83f91352006-04-02 23:05:09 +0200727/**
728 * generic_splice_sendpage - splice data from a pipe to a socket
Jens Axboe932cc6d2007-06-21 13:10:21 +0200729 * @pipe: pipe to splice from
Jens Axboe83f91352006-04-02 23:05:09 +0200730 * @out: socket to write to
Jens Axboe932cc6d2007-06-21 13:10:21 +0200731 * @ppos: position in @out
Jens Axboe83f91352006-04-02 23:05:09 +0200732 * @len: number of bytes to splice
733 * @flags: splice modifier flags
734 *
Jens Axboe932cc6d2007-06-21 13:10:21 +0200735 * Description:
736 * Will send @len bytes from the pipe to a network socket. No data copying
737 * is involved.
Jens Axboe83f91352006-04-02 23:05:09 +0200738 *
739 */
Ingo Molnar3a326a22006-04-10 15:18:35 +0200740ssize_t generic_splice_sendpage(struct pipe_inode_info *pipe, struct file *out,
Jens Axboecbb7e572006-04-11 14:57:50 +0200741 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200742{
Jens Axboe00522fb2006-04-26 14:39:29 +0200743 return splice_from_pipe(pipe, out, ppos, len, flags, pipe_to_sendpage);
Jens Axboe5274f052006-03-30 15:15:30 +0200744}
745
Jens Axboe059a8f32006-04-02 23:06:05 +0200746EXPORT_SYMBOL(generic_splice_sendpage);
Jeff Garzika0f06782006-03-30 23:06:13 -0500747
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200748static int warn_unsupported(struct file *file, const char *op)
749{
750 pr_debug_ratelimited(
751 "splice %s not supported for file %pD4 (pid: %d comm: %.20s)\n",
752 op, file, current->pid, current->comm);
753 return -EINVAL;
754}
755
Jens Axboe83f91352006-04-02 23:05:09 +0200756/*
757 * Attempt to initiate a splice from pipe to file.
758 */
Ingo Molnar3a326a22006-04-10 15:18:35 +0200759static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
Jens Axboecbb7e572006-04-11 14:57:50 +0200760 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200761{
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200762 if (unlikely(!out->f_op->splice_write))
763 return warn_unsupported(out, "write");
764 return out->f_op->splice_write(pipe, out, ppos, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200765}
766
Jens Axboe83f91352006-04-02 23:05:09 +0200767/*
768 * Attempt to initiate a splice from a file to a pipe.
769 */
Jens Axboecbb7e572006-04-11 14:57:50 +0200770static long do_splice_to(struct file *in, loff_t *ppos,
771 struct pipe_inode_info *pipe, size_t len,
772 unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200773{
Al Viro313d64a2021-01-24 23:49:04 -0500774 unsigned int p_space;
Jens Axboe5274f052006-03-30 15:15:30 +0200775 int ret;
776
Jens Axboe49570e92006-04-11 13:56:09 +0200777 if (unlikely(!(in->f_mode & FMODE_READ)))
Jens Axboe5274f052006-03-30 15:15:30 +0200778 return -EBADF;
779
Al Viro313d64a2021-01-24 23:49:04 -0500780 /* Don't try to read more the pipe has space for. */
781 p_space = pipe->max_usage - pipe_occupancy(pipe->head, pipe->tail);
782 len = min_t(size_t, len, p_space << PAGE_SHIFT);
783
Jens Axboecbb7e572006-04-11 14:57:50 +0200784 ret = rw_verify_area(READ, in, ppos, len);
Jens Axboe5274f052006-03-30 15:15:30 +0200785 if (unlikely(ret < 0))
786 return ret;
787
Al Viro03cc0782016-04-02 14:56:58 -0400788 if (unlikely(len > MAX_RW_COUNT))
789 len = MAX_RW_COUNT;
790
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200791 if (unlikely(!in->f_op->splice_read))
792 return warn_unsupported(in, "read");
793 return in->f_op->splice_read(in, ppos, pipe, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200794}
795
Jens Axboe932cc6d2007-06-21 13:10:21 +0200796/**
797 * splice_direct_to_actor - splices data directly between two non-pipes
798 * @in: file to splice from
799 * @sd: actor information on where to splice to
800 * @actor: handles the data splicing
801 *
802 * Description:
803 * This is a special case helper to splice directly between two
804 * points, without requiring an explicit pipe. Internally an allocated
Randy Dunlap79685b82007-07-27 08:08:51 +0200805 * pipe is cached in the process, and reused during the lifetime of
Jens Axboe932cc6d2007-06-21 13:10:21 +0200806 * that process.
807 *
Jens Axboec66ab6f2007-06-12 21:17:17 +0200808 */
809ssize_t splice_direct_to_actor(struct file *in, struct splice_desc *sd,
810 splice_direct_actor *actor)
Jens Axboeb92ce552006-04-11 13:52:07 +0200811{
812 struct pipe_inode_info *pipe;
813 long ret, bytes;
814 umode_t i_mode;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200815 size_t len;
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200816 int i, flags, more;
Jens Axboeb92ce552006-04-11 13:52:07 +0200817
818 /*
819 * We require the input being a regular file, as we don't want to
820 * randomly drop data for eg socket -> socket splicing. Use the
821 * piped splicing for that!
822 */
Al Viro496ad9a2013-01-23 17:07:38 -0500823 i_mode = file_inode(in)->i_mode;
Jens Axboeb92ce552006-04-11 13:52:07 +0200824 if (unlikely(!S_ISREG(i_mode) && !S_ISBLK(i_mode)))
825 return -EINVAL;
826
827 /*
828 * neither in nor out is a pipe, setup an internal pipe attached to
829 * 'out' and transfer the wanted data from 'in' to 'out' through that
830 */
831 pipe = current->splice_pipe;
Jens Axboe49570e92006-04-11 13:56:09 +0200832 if (unlikely(!pipe)) {
Al Viro7bee1302013-03-21 11:04:15 -0400833 pipe = alloc_pipe_info();
Jens Axboeb92ce552006-04-11 13:52:07 +0200834 if (!pipe)
835 return -ENOMEM;
836
837 /*
838 * We don't have an immediate reader, but we'll read the stuff
Jens Axboe00522fb2006-04-26 14:39:29 +0200839 * out of the pipe right after the splice_to_pipe(). So set
Jens Axboeb92ce552006-04-11 13:52:07 +0200840 * PIPE_READERS appropriately.
841 */
842 pipe->readers = 1;
843
844 current->splice_pipe = pipe;
845 }
846
847 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +0200848 * Do the splice.
Jens Axboeb92ce552006-04-11 13:52:07 +0200849 */
850 ret = 0;
851 bytes = 0;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200852 len = sd->total_len;
853 flags = sd->flags;
854
855 /*
856 * Don't block on output, we have to drain the direct pipe.
857 */
858 sd->flags &= ~SPLICE_F_NONBLOCK;
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200859 more = sd->flags & SPLICE_F_MORE;
Jens Axboeb92ce552006-04-11 13:52:07 +0200860
David Howells8cefc102019-11-15 13:30:32 +0000861 WARN_ON_ONCE(!pipe_empty(pipe->head, pipe->tail));
Darrick J. Wong17614442018-11-30 10:37:49 -0800862
Jens Axboeb92ce552006-04-11 13:52:07 +0200863 while (len) {
Jens Axboe51a92c02007-07-13 14:11:43 +0200864 size_t read_len;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200865 loff_t pos = sd->pos, prev_pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200866
Al Viro313d64a2021-01-24 23:49:04 -0500867 ret = do_splice_to(in, &pos, pipe, len, flags);
Jens Axboe51a92c02007-07-13 14:11:43 +0200868 if (unlikely(ret <= 0))
Jens Axboeb92ce552006-04-11 13:52:07 +0200869 goto out_release;
870
871 read_len = ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200872 sd->total_len = read_len;
Jens Axboeb92ce552006-04-11 13:52:07 +0200873
874 /*
Christophe Leroy0ff28d92015-05-06 17:26:47 +0200875 * If more data is pending, set SPLICE_F_MORE
876 * If this is the last data and SPLICE_F_MORE was not set
877 * initially, clears it.
878 */
879 if (read_len < len)
880 sd->flags |= SPLICE_F_MORE;
881 else if (!more)
882 sd->flags &= ~SPLICE_F_MORE;
883 /*
Jens Axboeb92ce552006-04-11 13:52:07 +0200884 * NOTE: nonblocking mode only applies to the input. We
885 * must not do the output in nonblocking mode as then we
886 * could get stuck data in the internal pipe:
887 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200888 ret = actor(pipe, sd);
Tom Zanussia82c53a2008-05-09 13:28:36 +0200889 if (unlikely(ret <= 0)) {
890 sd->pos = prev_pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200891 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200892 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200893
894 bytes += ret;
895 len -= ret;
Jens Axboebcd4f3a2007-07-16 14:41:49 +0200896 sd->pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +0200897
Tom Zanussia82c53a2008-05-09 13:28:36 +0200898 if (ret < read_len) {
899 sd->pos = prev_pos + ret;
Jens Axboe51a92c02007-07-13 14:11:43 +0200900 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +0200901 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200902 }
903
Jens Axboe9e971982008-01-29 21:05:57 +0100904done:
David Howells8cefc102019-11-15 13:30:32 +0000905 pipe->tail = pipe->head = 0;
Jens Axboe80848702008-01-30 12:24:48 +0100906 file_accessed(in);
Jens Axboeb92ce552006-04-11 13:52:07 +0200907 return bytes;
908
909out_release:
910 /*
911 * If we did an incomplete transfer we must release
912 * the pipe buffers in question:
913 */
David Howells8cefc102019-11-15 13:30:32 +0000914 for (i = 0; i < pipe->ring_size; i++) {
915 struct pipe_buffer *buf = &pipe->bufs[i];
Jens Axboeb92ce552006-04-11 13:52:07 +0200916
Miklos Szeredia7796382016-09-27 10:45:12 +0200917 if (buf->ops)
918 pipe_buf_release(pipe, buf);
Jens Axboeb92ce552006-04-11 13:52:07 +0200919 }
Jens Axboeb92ce552006-04-11 13:52:07 +0200920
Jens Axboe9e971982008-01-29 21:05:57 +0100921 if (!bytes)
922 bytes = ret;
Jens Axboeb92ce552006-04-11 13:52:07 +0200923
Jens Axboe9e971982008-01-29 21:05:57 +0100924 goto done;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200925}
926EXPORT_SYMBOL(splice_direct_to_actor);
927
928static int direct_splice_actor(struct pipe_inode_info *pipe,
929 struct splice_desc *sd)
930{
Jens Axboe6a14b902007-06-14 13:08:55 +0200931 struct file *file = sd->u.file;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200932
Al Viro7995bd22013-06-20 18:58:36 +0400933 return do_splice_from(pipe, file, sd->opos, sd->total_len,
Changli Gao2cb4b052010-06-29 13:09:18 +0200934 sd->flags);
Jens Axboec66ab6f2007-06-12 21:17:17 +0200935}
936
Jens Axboe932cc6d2007-06-21 13:10:21 +0200937/**
938 * do_splice_direct - splices data directly between two files
939 * @in: file to splice from
940 * @ppos: input file offset
941 * @out: file to splice to
Randy Dunlapacdb37c2013-06-22 19:44:08 -0700942 * @opos: output file offset
Jens Axboe932cc6d2007-06-21 13:10:21 +0200943 * @len: number of bytes to splice
944 * @flags: splice modifier flags
945 *
946 * Description:
947 * For use by do_sendfile(). splice can easily emulate sendfile, but
948 * doing it in the application would incur an extra system call
949 * (splice in + splice out, as compared to just sendfile()). So this helper
950 * can splice directly through a process-private pipe.
951 *
952 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200953long do_splice_direct(struct file *in, loff_t *ppos, struct file *out,
Al Viro7995bd22013-06-20 18:58:36 +0400954 loff_t *opos, size_t len, unsigned int flags)
Jens Axboec66ab6f2007-06-12 21:17:17 +0200955{
956 struct splice_desc sd = {
957 .len = len,
958 .total_len = len,
959 .flags = flags,
960 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +0200961 .u.file = out,
Al Viro7995bd22013-06-20 18:58:36 +0400962 .opos = opos,
Jens Axboec66ab6f2007-06-12 21:17:17 +0200963 };
Jens Axboe51a92c02007-07-13 14:11:43 +0200964 long ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200965
Al Viro18c67cb2013-06-19 15:41:54 +0400966 if (unlikely(!(out->f_mode & FMODE_WRITE)))
967 return -EBADF;
968
969 if (unlikely(out->f_flags & O_APPEND))
970 return -EINVAL;
971
972 ret = rw_verify_area(WRITE, out, opos, len);
973 if (unlikely(ret < 0))
974 return ret;
975
Jens Axboec66ab6f2007-06-12 21:17:17 +0200976 ret = splice_direct_to_actor(in, &sd, direct_splice_actor);
Jens Axboe51a92c02007-07-13 14:11:43 +0200977 if (ret > 0)
Tom Zanussia82c53a2008-05-09 13:28:36 +0200978 *ppos = sd.pos;
Jens Axboe51a92c02007-07-13 14:11:43 +0200979
Jens Axboec66ab6f2007-06-12 21:17:17 +0200980 return ret;
Jens Axboeb92ce552006-04-11 13:52:07 +0200981}
Miklos Szeredi1c118592014-10-24 00:14:35 +0200982EXPORT_SYMBOL(do_splice_direct);
Jens Axboeb92ce552006-04-11 13:52:07 +0200983
Al Viro8924fef2016-09-17 20:44:45 -0400984static int wait_for_space(struct pipe_inode_info *pipe, unsigned flags)
985{
Linus Torvalds52bce912016-12-21 10:59:34 -0800986 for (;;) {
987 if (unlikely(!pipe->readers)) {
988 send_sig(SIGPIPE, current, 0);
989 return -EPIPE;
990 }
David Howells6718b6f2019-10-16 16:47:32 +0100991 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Linus Torvalds52bce912016-12-21 10:59:34 -0800992 return 0;
Al Viro8924fef2016-09-17 20:44:45 -0400993 if (flags & SPLICE_F_NONBLOCK)
994 return -EAGAIN;
995 if (signal_pending(current))
996 return -ERESTARTSYS;
Linus Torvalds472e5b02020-10-01 19:14:36 -0700997 pipe_wait_writable(pipe);
Al Viro8924fef2016-09-17 20:44:45 -0400998 }
Al Viro8924fef2016-09-17 20:44:45 -0400999}
1000
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001001static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1002 struct pipe_inode_info *opipe,
1003 size_t len, unsigned int flags);
Jens Axboeddac0d32006-11-04 12:49:32 +01001004
Al Virofaa97c42021-01-25 22:23:03 -05001005static long splice_file_to_pipe(struct file *in,
1006 struct pipe_inode_info *opipe,
1007 loff_t *offset,
1008 size_t len, unsigned int flags)
1009{
1010 long ret;
1011
1012 pipe_lock(opipe);
1013 ret = wait_for_space(opipe, flags);
1014 if (!ret)
1015 ret = do_splice_to(in, offset, opipe, len, flags);
1016 pipe_unlock(opipe);
1017 if (ret > 0)
1018 wakeup_pipe_readers(opipe);
1019 return ret;
1020}
1021
Jens Axboeddac0d32006-11-04 12:49:32 +01001022/*
Jens Axboe83f91352006-04-02 23:05:09 +02001023 * Determine where to splice to/from.
1024 */
Jens Axboeee6e00c2020-10-22 14:15:51 -06001025long do_splice(struct file *in, loff_t *off_in, struct file *out,
1026 loff_t *off_out, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001027{
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001028 struct pipe_inode_info *ipipe;
1029 struct pipe_inode_info *opipe;
Al Viro7995bd22013-06-20 18:58:36 +04001030 loff_t offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001031 long ret;
Jens Axboe5274f052006-03-30 15:15:30 +02001032
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001033 if (unlikely(!(in->f_mode & FMODE_READ) ||
1034 !(out->f_mode & FMODE_WRITE)))
1035 return -EBADF;
1036
David Howellsc73be612020-01-14 17:07:11 +00001037 ipipe = get_pipe_info(in, true);
1038 opipe = get_pipe_info(out, true);
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001039
1040 if (ipipe && opipe) {
1041 if (off_in || off_out)
1042 return -ESPIPE;
1043
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001044 /* Splicing to self would be fun, but... */
1045 if (ipipe == opipe)
1046 return -EINVAL;
1047
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001048 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1049 flags |= SPLICE_F_NONBLOCK;
1050
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001051 return splice_pipe_to_pipe(ipipe, opipe, len, flags);
1052 }
1053
1054 if (ipipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001055 if (off_in)
1056 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001057 if (off_out) {
Changli Gao19c9a492010-06-29 13:10:36 +02001058 if (!(out->f_mode & FMODE_PWRITE))
Jens Axboeb92ce552006-04-11 13:52:07 +02001059 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001060 offset = *off_out;
Al Viro7995bd22013-06-20 18:58:36 +04001061 } else {
1062 offset = out->f_pos;
1063 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001064
Al Viro18c67cb2013-06-19 15:41:54 +04001065 if (unlikely(out->f_flags & O_APPEND))
1066 return -EINVAL;
1067
1068 ret = rw_verify_area(WRITE, out, &offset, len);
1069 if (unlikely(ret < 0))
1070 return ret;
1071
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001072 if (in->f_flags & O_NONBLOCK)
1073 flags |= SPLICE_F_NONBLOCK;
1074
Al Viro500368f2013-05-23 20:07:11 -04001075 file_start_write(out);
Al Viro7995bd22013-06-20 18:58:36 +04001076 ret = do_splice_from(ipipe, out, &offset, len, flags);
Al Viro500368f2013-05-23 20:07:11 -04001077 file_end_write(out);
Jens Axboea4514eb2006-04-19 15:57:05 +02001078
Al Viro7995bd22013-06-20 18:58:36 +04001079 if (!off_out)
1080 out->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001081 else
1082 *off_out = offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001083
1084 return ret;
Ingo Molnar529565dc2006-04-10 15:18:58 +02001085 }
Jens Axboe5274f052006-03-30 15:15:30 +02001086
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001087 if (opipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001088 if (off_out)
1089 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001090 if (off_in) {
Changli Gao19c9a492010-06-29 13:10:36 +02001091 if (!(in->f_mode & FMODE_PREAD))
Jens Axboeb92ce552006-04-11 13:52:07 +02001092 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001093 offset = *off_in;
Al Viro7995bd22013-06-20 18:58:36 +04001094 } else {
1095 offset = in->f_pos;
1096 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001097
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001098 if (out->f_flags & O_NONBLOCK)
1099 flags |= SPLICE_F_NONBLOCK;
1100
Al Virofaa97c42021-01-25 22:23:03 -05001101 ret = splice_file_to_pipe(in, opipe, &offset, len, flags);
Al Viro7995bd22013-06-20 18:58:36 +04001102 if (!off_in)
1103 in->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001104 else
1105 *off_in = offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001106
1107 return ret;
Ingo Molnar529565dc2006-04-10 15:18:58 +02001108 }
Jens Axboe5274f052006-03-30 15:15:30 +02001109
1110 return -EINVAL;
1111}
1112
Jens Axboeee6e00c2020-10-22 14:15:51 -06001113static long __do_splice(struct file *in, loff_t __user *off_in,
1114 struct file *out, loff_t __user *off_out,
1115 size_t len, unsigned int flags)
1116{
1117 struct pipe_inode_info *ipipe;
1118 struct pipe_inode_info *opipe;
1119 loff_t offset, *__off_in = NULL, *__off_out = NULL;
1120 long ret;
1121
1122 ipipe = get_pipe_info(in, true);
1123 opipe = get_pipe_info(out, true);
1124
1125 if (ipipe && off_in)
1126 return -ESPIPE;
1127 if (opipe && off_out)
1128 return -ESPIPE;
1129
1130 if (off_out) {
1131 if (copy_from_user(&offset, off_out, sizeof(loff_t)))
1132 return -EFAULT;
1133 __off_out = &offset;
1134 }
1135 if (off_in) {
1136 if (copy_from_user(&offset, off_in, sizeof(loff_t)))
1137 return -EFAULT;
1138 __off_in = &offset;
1139 }
1140
1141 ret = do_splice(in, __off_in, out, __off_out, len, flags);
1142 if (ret < 0)
1143 return ret;
1144
1145 if (__off_out && copy_to_user(off_out, __off_out, sizeof(loff_t)))
1146 return -EFAULT;
1147 if (__off_in && copy_to_user(off_in, __off_in, sizeof(loff_t)))
1148 return -EFAULT;
1149
1150 return ret;
1151}
1152
Al Viro79fddc42016-09-17 22:38:20 -04001153static int iter_to_pipe(struct iov_iter *from,
1154 struct pipe_inode_info *pipe,
1155 unsigned flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001156{
Al Viro79fddc42016-09-17 22:38:20 -04001157 struct pipe_buffer buf = {
1158 .ops = &user_page_pipe_buf_ops,
1159 .flags = flags
1160 };
1161 size_t total = 0;
1162 int ret = 0;
1163 bool failed = false;
1164
1165 while (iov_iter_count(from) && !failed) {
1166 struct page *pages[16];
Al Virodb85a9e2016-09-17 20:25:06 -04001167 ssize_t copied;
1168 size_t start;
Al Viro79fddc42016-09-17 22:38:20 -04001169 int n;
Jens Axboe912d35f2006-04-26 10:59:21 +02001170
Al Viro79fddc42016-09-17 22:38:20 -04001171 copied = iov_iter_get_pages(from, pages, ~0UL, 16, &start);
1172 if (copied <= 0) {
1173 ret = copied;
1174 break;
1175 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001176
Al Viro79fddc42016-09-17 22:38:20 -04001177 for (n = 0; copied; n++, start = 0) {
Al Virodb85a9e2016-09-17 20:25:06 -04001178 int size = min_t(int, copied, PAGE_SIZE - start);
Al Viro79fddc42016-09-17 22:38:20 -04001179 if (!failed) {
1180 buf.page = pages[n];
1181 buf.offset = start;
1182 buf.len = size;
1183 ret = add_to_pipe(pipe, &buf);
1184 if (unlikely(ret < 0)) {
1185 failed = true;
1186 } else {
1187 iov_iter_advance(from, ret);
1188 total += ret;
1189 }
1190 } else {
1191 put_page(pages[n]);
1192 }
Al Virodb85a9e2016-09-17 20:25:06 -04001193 copied -= size;
Jens Axboe912d35f2006-04-26 10:59:21 +02001194 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001195 }
Al Viro79fddc42016-09-17 22:38:20 -04001196 return total ? total : ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001197}
1198
Jens Axboe6a14b902007-06-14 13:08:55 +02001199static int pipe_to_user(struct pipe_inode_info *pipe, struct pipe_buffer *buf,
1200 struct splice_desc *sd)
1201{
Al Viro6130f532014-02-03 18:19:51 -05001202 int n = copy_page_to_iter(buf->page, buf->offset, sd->len, sd->u.data);
1203 return n == sd->len ? n : -EFAULT;
Jens Axboe6a14b902007-06-14 13:08:55 +02001204}
1205
1206/*
1207 * For lack of a better implementation, implement vmsplice() to userspace
1208 * as a simple copy of the pipes pages to the user iov.
1209 */
Al Viro87a30022018-05-26 21:39:52 -04001210static long vmsplice_to_user(struct file *file, struct iov_iter *iter,
1211 unsigned int flags)
Jens Axboe6a14b902007-06-14 13:08:55 +02001212{
David Howellsc73be612020-01-14 17:07:11 +00001213 struct pipe_inode_info *pipe = get_pipe_info(file, true);
Al Viro87a30022018-05-26 21:39:52 -04001214 struct splice_desc sd = {
1215 .total_len = iov_iter_count(iter),
1216 .flags = flags,
1217 .u.data = iter
1218 };
1219 long ret = 0;
Jens Axboe6a14b902007-06-14 13:08:55 +02001220
Jens Axboe6a14b902007-06-14 13:08:55 +02001221 if (!pipe)
1222 return -EBADF;
1223
Al Viro345995f2015-03-21 19:17:55 -04001224 if (sd.total_len) {
1225 pipe_lock(pipe);
1226 ret = __splice_from_pipe(pipe, &sd, pipe_to_user);
1227 pipe_unlock(pipe);
1228 }
Jens Axboe6a14b902007-06-14 13:08:55 +02001229
Jens Axboe6a14b902007-06-14 13:08:55 +02001230 return ret;
1231}
1232
Jens Axboe912d35f2006-04-26 10:59:21 +02001233/*
1234 * vmsplice splices a user address range into a pipe. It can be thought of
1235 * as splice-from-memory, where the regular splice is splice-from-file (or
1236 * to file). In both cases the output is a pipe, naturally.
Jens Axboe912d35f2006-04-26 10:59:21 +02001237 */
Al Viro87a30022018-05-26 21:39:52 -04001238static long vmsplice_to_pipe(struct file *file, struct iov_iter *iter,
1239 unsigned int flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001240{
Jens Axboeddac0d32006-11-04 12:49:32 +01001241 struct pipe_inode_info *pipe;
Al Viro87a30022018-05-26 21:39:52 -04001242 long ret = 0;
Al Viro79fddc42016-09-17 22:38:20 -04001243 unsigned buf_flag = 0;
1244
1245 if (flags & SPLICE_F_GIFT)
1246 buf_flag = PIPE_BUF_FLAG_GIFT;
Jens Axboe912d35f2006-04-26 10:59:21 +02001247
David Howellsc73be612020-01-14 17:07:11 +00001248 pipe = get_pipe_info(file, true);
Jens Axboeddac0d32006-11-04 12:49:32 +01001249 if (!pipe)
Jens Axboe912d35f2006-04-26 10:59:21 +02001250 return -EBADF;
Jens Axboe912d35f2006-04-26 10:59:21 +02001251
Al Viro8924fef2016-09-17 20:44:45 -04001252 pipe_lock(pipe);
1253 ret = wait_for_space(pipe, flags);
Al Viro79fddc42016-09-17 22:38:20 -04001254 if (!ret)
Al Viro87a30022018-05-26 21:39:52 -04001255 ret = iter_to_pipe(iter, pipe, buf_flag);
Al Viro8924fef2016-09-17 20:44:45 -04001256 pipe_unlock(pipe);
1257 if (ret > 0)
1258 wakeup_pipe_readers(pipe);
Jens Axboe35f3d142010-05-20 10:43:18 +02001259 return ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001260}
1261
Al Viro87a30022018-05-26 21:39:52 -04001262static int vmsplice_type(struct fd f, int *type)
1263{
1264 if (!f.file)
1265 return -EBADF;
1266 if (f.file->f_mode & FMODE_WRITE) {
1267 *type = WRITE;
1268 } else if (f.file->f_mode & FMODE_READ) {
1269 *type = READ;
1270 } else {
1271 fdput(f);
1272 return -EBADF;
1273 }
1274 return 0;
1275}
1276
Jens Axboe6a14b902007-06-14 13:08:55 +02001277/*
1278 * Note that vmsplice only really supports true splicing _from_ user memory
1279 * to a pipe, not the other way around. Splicing from user memory is a simple
1280 * operation that can be supported without any funky alignment restrictions
1281 * or nasty vm tricks. We simply map in the user memory and fill them into
1282 * a pipe. The reverse isn't quite as easy, though. There are two possible
1283 * solutions for that:
1284 *
1285 * - memcpy() the data internally, at which point we might as well just
1286 * do a regular read() on the buffer anyway.
1287 * - Lots of nasty vm tricks, that are neither fast nor flexible (it
1288 * has restriction limitations on both ends of the pipe).
1289 *
1290 * Currently we punt and implement it as a normal copy, see pipe_to_user().
1291 *
1292 */
Al Viro87a30022018-05-26 21:39:52 -04001293SYSCALL_DEFINE4(vmsplice, int, fd, const struct iovec __user *, uiov,
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001294 unsigned long, nr_segs, unsigned int, flags)
1295{
Al Viro87a30022018-05-26 21:39:52 -04001296 struct iovec iovstack[UIO_FASTIOV];
1297 struct iovec *iov = iovstack;
1298 struct iov_iter iter;
Jens Axboe87e5e6d2019-05-14 16:02:22 -06001299 ssize_t error;
Al Viro87a30022018-05-26 21:39:52 -04001300 struct fd f;
1301 int type;
1302
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001303 if (unlikely(flags & ~SPLICE_F_ALL))
1304 return -EINVAL;
1305
Al Viro87a30022018-05-26 21:39:52 -04001306 f = fdget(fd);
1307 error = vmsplice_type(f, &type);
1308 if (error)
1309 return error;
1310
1311 error = import_iovec(type, uiov, nr_segs,
1312 ARRAY_SIZE(iovstack), &iov, &iter);
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001313 if (error < 0)
1314 goto out_fdput;
1315
1316 if (!iov_iter_count(&iter))
1317 error = 0;
1318 else if (iov_iter_rw(&iter) == WRITE)
1319 error = vmsplice_to_pipe(f.file, &iter, flags);
1320 else
1321 error = vmsplice_to_user(f.file, &iter, flags);
1322
1323 kfree(iov);
1324out_fdput:
Al Viro87a30022018-05-26 21:39:52 -04001325 fdput(f);
1326 return error;
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001327}
1328
Heiko Carstens836f92a2009-01-14 14:14:33 +01001329SYSCALL_DEFINE6(splice, int, fd_in, loff_t __user *, off_in,
1330 int, fd_out, loff_t __user *, off_out,
1331 size_t, len, unsigned int, flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001332{
Al Viro2903ff02012-08-28 12:52:22 -04001333 struct fd in, out;
Jens Axboe5274f052006-03-30 15:15:30 +02001334 long error;
Jens Axboe5274f052006-03-30 15:15:30 +02001335
1336 if (unlikely(!len))
1337 return 0;
1338
Al Viro3d6ea292016-12-10 13:17:32 -05001339 if (unlikely(flags & ~SPLICE_F_ALL))
1340 return -EINVAL;
1341
Jens Axboe5274f052006-03-30 15:15:30 +02001342 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001343 in = fdget(fd_in);
1344 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001345 out = fdget(fd_out);
1346 if (out.file) {
Jens Axboeee6e00c2020-10-22 14:15:51 -06001347 error = __do_splice(in.file, off_in, out.file, off_out,
1348 len, flags);
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001349 fdput(out);
Jens Axboe5274f052006-03-30 15:15:30 +02001350 }
Al Viro2903ff02012-08-28 12:52:22 -04001351 fdput(in);
Jens Axboe5274f052006-03-30 15:15:30 +02001352 }
Jens Axboe5274f052006-03-30 15:15:30 +02001353 return error;
1354}
Jens Axboe70524492006-04-11 15:51:17 +02001355
1356/*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001357 * Make sure there's data to read. Wait for input if we can, otherwise
1358 * return an appropriate error.
1359 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001360static int ipipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001361{
1362 int ret;
1363
1364 /*
David Howells8cefc102019-11-15 13:30:32 +00001365 * Check the pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001366 * is speculative anyways, so missing one is ok.
1367 */
David Howells8cefc102019-11-15 13:30:32 +00001368 if (!pipe_empty(pipe->head, pipe->tail))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001369 return 0;
1370
1371 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001372 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001373
David Howells8cefc102019-11-15 13:30:32 +00001374 while (pipe_empty(pipe->head, pipe->tail)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001375 if (signal_pending(current)) {
1376 ret = -ERESTARTSYS;
1377 break;
1378 }
1379 if (!pipe->writers)
1380 break;
Linus Torvaldsa28c8b92019-12-07 13:21:01 -08001381 if (flags & SPLICE_F_NONBLOCK) {
1382 ret = -EAGAIN;
1383 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001384 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001385 pipe_wait_readable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001386 }
1387
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001388 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001389 return ret;
1390}
1391
1392/*
1393 * Make sure there's writeable room. Wait for room if we can, otherwise
1394 * return an appropriate error.
1395 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001396static int opipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001397{
1398 int ret;
1399
1400 /*
David Howells8cefc102019-11-15 13:30:32 +00001401 * Check pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001402 * is speculative anyways, so missing one is ok.
1403 */
Tetsuo Handa566d1362020-05-20 08:51:59 +09001404 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001405 return 0;
1406
1407 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001408 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001409
David Howells6718b6f2019-10-16 16:47:32 +01001410 while (pipe_full(pipe->head, pipe->tail, pipe->max_usage)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001411 if (!pipe->readers) {
1412 send_sig(SIGPIPE, current, 0);
1413 ret = -EPIPE;
1414 break;
1415 }
1416 if (flags & SPLICE_F_NONBLOCK) {
1417 ret = -EAGAIN;
1418 break;
1419 }
1420 if (signal_pending(current)) {
1421 ret = -ERESTARTSYS;
1422 break;
1423 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001424 pipe_wait_writable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001425 }
1426
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001427 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001428 return ret;
1429}
1430
1431/*
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001432 * Splice contents of ipipe to opipe.
1433 */
1434static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1435 struct pipe_inode_info *opipe,
1436 size_t len, unsigned int flags)
1437{
1438 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001439 unsigned int i_head, o_head;
1440 unsigned int i_tail, o_tail;
1441 unsigned int i_mask, o_mask;
1442 int ret = 0;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001443 bool input_wakeup = false;
1444
1445
1446retry:
1447 ret = ipipe_prep(ipipe, flags);
1448 if (ret)
1449 return ret;
1450
1451 ret = opipe_prep(opipe, flags);
1452 if (ret)
1453 return ret;
1454
1455 /*
1456 * Potential ABBA deadlock, work around it by ordering lock
1457 * grabbing by pipe info address. Otherwise two different processes
1458 * could deadlock (one doing tee from A -> B, the other from B -> A).
1459 */
1460 pipe_double_lock(ipipe, opipe);
1461
David Howells8cefc102019-11-15 13:30:32 +00001462 i_tail = ipipe->tail;
1463 i_mask = ipipe->ring_size - 1;
1464 o_head = opipe->head;
1465 o_mask = opipe->ring_size - 1;
1466
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001467 do {
David Howells8cefc102019-11-15 13:30:32 +00001468 size_t o_len;
1469
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001470 if (!opipe->readers) {
1471 send_sig(SIGPIPE, current, 0);
1472 if (!ret)
1473 ret = -EPIPE;
1474 break;
1475 }
1476
David Howells8cefc102019-11-15 13:30:32 +00001477 i_head = ipipe->head;
1478 o_tail = opipe->tail;
1479
1480 if (pipe_empty(i_head, i_tail) && !ipipe->writers)
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001481 break;
1482
1483 /*
1484 * Cannot make any progress, because either the input
1485 * pipe is empty or the output pipe is full.
1486 */
David Howells8cefc102019-11-15 13:30:32 +00001487 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001488 pipe_full(o_head, o_tail, opipe->max_usage)) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001489 /* Already processed some buffers, break */
1490 if (ret)
1491 break;
1492
1493 if (flags & SPLICE_F_NONBLOCK) {
1494 ret = -EAGAIN;
1495 break;
1496 }
1497
1498 /*
1499 * We raced with another reader/writer and haven't
1500 * managed to process any buffers. A zero return
1501 * value means EOF, so retry instead.
1502 */
1503 pipe_unlock(ipipe);
1504 pipe_unlock(opipe);
1505 goto retry;
1506 }
1507
David Howells8cefc102019-11-15 13:30:32 +00001508 ibuf = &ipipe->bufs[i_tail & i_mask];
1509 obuf = &opipe->bufs[o_head & o_mask];
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001510
1511 if (len >= ibuf->len) {
1512 /*
1513 * Simply move the whole buffer from ipipe to opipe
1514 */
1515 *obuf = *ibuf;
1516 ibuf->ops = NULL;
David Howells8cefc102019-11-15 13:30:32 +00001517 i_tail++;
1518 ipipe->tail = i_tail;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001519 input_wakeup = true;
David Howells8cefc102019-11-15 13:30:32 +00001520 o_len = obuf->len;
1521 o_head++;
1522 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001523 } else {
1524 /*
1525 * Get a reference to this pipe buffer,
1526 * so we can copy the contents over.
1527 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001528 if (!pipe_buf_get(ipipe, ibuf)) {
1529 if (ret == 0)
1530 ret = -EFAULT;
1531 break;
1532 }
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001533 *obuf = *ibuf;
1534
1535 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001536 * Don't inherit the gift and merge flags, we need to
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001537 * prevent multiple steals of this page.
1538 */
1539 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001540 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001541
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001542 obuf->len = len;
David Howells8cefc102019-11-15 13:30:32 +00001543 ibuf->offset += len;
1544 ibuf->len -= len;
1545 o_len = len;
1546 o_head++;
1547 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001548 }
David Howells8cefc102019-11-15 13:30:32 +00001549 ret += o_len;
1550 len -= o_len;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001551 } while (len);
1552
1553 pipe_unlock(ipipe);
1554 pipe_unlock(opipe);
1555
1556 /*
1557 * If we put data in the output pipe, wakeup any potential readers.
1558 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001559 if (ret > 0)
1560 wakeup_pipe_readers(opipe);
1561
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001562 if (input_wakeup)
1563 wakeup_pipe_writers(ipipe);
1564
1565 return ret;
1566}
1567
1568/*
Jens Axboe70524492006-04-11 15:51:17 +02001569 * Link contents of ipipe to opipe.
1570 */
1571static int link_pipe(struct pipe_inode_info *ipipe,
1572 struct pipe_inode_info *opipe,
1573 size_t len, unsigned int flags)
1574{
1575 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001576 unsigned int i_head, o_head;
1577 unsigned int i_tail, o_tail;
1578 unsigned int i_mask, o_mask;
1579 int ret = 0;
Jens Axboe70524492006-04-11 15:51:17 +02001580
1581 /*
1582 * Potential ABBA deadlock, work around it by ordering lock
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001583 * grabbing by pipe info address. Otherwise two different processes
Jens Axboe70524492006-04-11 15:51:17 +02001584 * could deadlock (one doing tee from A -> B, the other from B -> A).
1585 */
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001586 pipe_double_lock(ipipe, opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001587
David Howells8cefc102019-11-15 13:30:32 +00001588 i_tail = ipipe->tail;
1589 i_mask = ipipe->ring_size - 1;
1590 o_head = opipe->head;
1591 o_mask = opipe->ring_size - 1;
1592
Jens Axboeaadd06e2006-07-10 11:00:01 +02001593 do {
Jens Axboe70524492006-04-11 15:51:17 +02001594 if (!opipe->readers) {
1595 send_sig(SIGPIPE, current, 0);
1596 if (!ret)
1597 ret = -EPIPE;
1598 break;
1599 }
Jens Axboe70524492006-04-11 15:51:17 +02001600
David Howells8cefc102019-11-15 13:30:32 +00001601 i_head = ipipe->head;
1602 o_tail = opipe->tail;
1603
Jens Axboe70524492006-04-11 15:51:17 +02001604 /*
David Howells8cefc102019-11-15 13:30:32 +00001605 * If we have iterated all input buffers or run out of
Jens Axboeaadd06e2006-07-10 11:00:01 +02001606 * output room, break.
Jens Axboe70524492006-04-11 15:51:17 +02001607 */
David Howells8cefc102019-11-15 13:30:32 +00001608 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001609 pipe_full(o_head, o_tail, opipe->max_usage))
Jens Axboe70524492006-04-11 15:51:17 +02001610 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001611
David Howells8cefc102019-11-15 13:30:32 +00001612 ibuf = &ipipe->bufs[i_tail & i_mask];
1613 obuf = &opipe->bufs[o_head & o_mask];
Jens Axboeaadd06e2006-07-10 11:00:01 +02001614
Jens Axboe2a27250e2006-04-19 15:56:40 +02001615 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001616 * Get a reference to this pipe buffer,
1617 * so we can copy the contents over.
Jens Axboe2a27250e2006-04-19 15:56:40 +02001618 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001619 if (!pipe_buf_get(ipipe, ibuf)) {
1620 if (ret == 0)
1621 ret = -EFAULT;
1622 break;
1623 }
Jens Axboe70524492006-04-11 15:51:17 +02001624
Jens Axboeaadd06e2006-07-10 11:00:01 +02001625 *obuf = *ibuf;
Jens Axboe70524492006-04-11 15:51:17 +02001626
Jens Axboeaadd06e2006-07-10 11:00:01 +02001627 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001628 * Don't inherit the gift and merge flag, we need to prevent
1629 * multiple steals of this page.
Jens Axboeaadd06e2006-07-10 11:00:01 +02001630 */
1631 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001632 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001633
Jens Axboeaadd06e2006-07-10 11:00:01 +02001634 if (obuf->len > len)
1635 obuf->len = len;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001636 ret += obuf->len;
1637 len -= obuf->len;
David Howells8cefc102019-11-15 13:30:32 +00001638
1639 o_head++;
1640 opipe->head = o_head;
1641 i_tail++;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001642 } while (len);
Jens Axboe70524492006-04-11 15:51:17 +02001643
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001644 pipe_unlock(ipipe);
1645 pipe_unlock(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001646
Jens Axboeaadd06e2006-07-10 11:00:01 +02001647 /*
1648 * If we put data in the output pipe, wakeup any potential readers.
1649 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001650 if (ret > 0)
1651 wakeup_pipe_readers(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001652
1653 return ret;
1654}
1655
1656/*
1657 * This is a tee(1) implementation that works on pipes. It doesn't copy
1658 * any data, it simply references the 'in' pages on the 'out' pipe.
1659 * The 'flags' used are the SPLICE_F_* variants, currently the only
1660 * applicable one is SPLICE_F_NONBLOCK.
1661 */
Pavel Begunkov9dafdfc2020-05-17 14:18:05 +03001662long do_tee(struct file *in, struct file *out, size_t len, unsigned int flags)
Jens Axboe70524492006-04-11 15:51:17 +02001663{
David Howellsc73be612020-01-14 17:07:11 +00001664 struct pipe_inode_info *ipipe = get_pipe_info(in, true);
1665 struct pipe_inode_info *opipe = get_pipe_info(out, true);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001666 int ret = -EINVAL;
Jens Axboe70524492006-04-11 15:51:17 +02001667
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001668 if (unlikely(!(in->f_mode & FMODE_READ) ||
1669 !(out->f_mode & FMODE_WRITE)))
1670 return -EBADF;
1671
Jens Axboe70524492006-04-11 15:51:17 +02001672 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001673 * Duplicate the contents of ipipe to opipe without actually
1674 * copying the data.
Jens Axboe70524492006-04-11 15:51:17 +02001675 */
Jens Axboeaadd06e2006-07-10 11:00:01 +02001676 if (ipipe && opipe && ipipe != opipe) {
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001677 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1678 flags |= SPLICE_F_NONBLOCK;
1679
Jens Axboeaadd06e2006-07-10 11:00:01 +02001680 /*
1681 * Keep going, unless we encounter an error. The ipipe/opipe
1682 * ordering doesn't really matter.
1683 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001684 ret = ipipe_prep(ipipe, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001685 if (!ret) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001686 ret = opipe_prep(opipe, flags);
Jens Axboe02cf01a2008-02-20 10:34:51 +01001687 if (!ret)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001688 ret = link_pipe(ipipe, opipe, len, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001689 }
1690 }
Jens Axboe70524492006-04-11 15:51:17 +02001691
Jens Axboeaadd06e2006-07-10 11:00:01 +02001692 return ret;
Jens Axboe70524492006-04-11 15:51:17 +02001693}
1694
Heiko Carstens836f92a2009-01-14 14:14:33 +01001695SYSCALL_DEFINE4(tee, int, fdin, int, fdout, size_t, len, unsigned int, flags)
Jens Axboe70524492006-04-11 15:51:17 +02001696{
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001697 struct fd in, out;
Al Viro2903ff02012-08-28 12:52:22 -04001698 int error;
Jens Axboe70524492006-04-11 15:51:17 +02001699
Al Viro3d6ea292016-12-10 13:17:32 -05001700 if (unlikely(flags & ~SPLICE_F_ALL))
1701 return -EINVAL;
1702
Jens Axboe70524492006-04-11 15:51:17 +02001703 if (unlikely(!len))
1704 return 0;
1705
1706 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001707 in = fdget(fdin);
1708 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001709 out = fdget(fdout);
1710 if (out.file) {
1711 error = do_tee(in.file, out.file, len, flags);
1712 fdput(out);
Jens Axboe70524492006-04-11 15:51:17 +02001713 }
Al Viro2903ff02012-08-28 12:52:22 -04001714 fdput(in);
Jens Axboe70524492006-04-11 15:51:17 +02001715 }
1716
1717 return error;
1718}