blob: d983d375ff1130b5b054241612f56d4510d65589 [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Jens Axboe5274f052006-03-30 15:15:30 +02002/*
3 * "splice": joining two ropes together by interweaving their strands.
4 *
5 * This is the "extended pipe" functionality, where a pipe is used as
6 * an arbitrary in-memory buffer. Think of a pipe as a small kernel
7 * buffer that you can use to transfer data from one end to the other.
8 *
9 * The traditional unix read/write is extended with a "splice()" operation
10 * that transfers data buffers to or from a pipe buffer.
11 *
12 * Named by Larry McVoy, original implementation from Linus, extended by
Jens Axboec2058e02006-04-11 13:56:34 +020013 * Jens to support splicing to files, network, direct splicing, etc and
14 * fixing lots of bugs.
Jens Axboe5274f052006-03-30 15:15:30 +020015 *
Jens Axboe0fe23472006-09-04 15:41:16 +020016 * Copyright (C) 2005-2006 Jens Axboe <axboe@kernel.dk>
Jens Axboec2058e02006-04-11 13:56:34 +020017 * Copyright (C) 2005-2006 Linus Torvalds <torvalds@osdl.org>
18 * Copyright (C) 2006 Ingo Molnar <mingo@elte.hu>
Jens Axboe5274f052006-03-30 15:15:30 +020019 *
20 */
Christoph Hellwigbe297962016-11-01 07:40:16 -060021#include <linux/bvec.h>
Jens Axboe5274f052006-03-30 15:15:30 +020022#include <linux/fs.h>
23#include <linux/file.h>
24#include <linux/pagemap.h>
Jens Axboed6b29d72007-06-04 09:59:47 +020025#include <linux/splice.h>
KAMEZAWA Hiroyuki08e552c2009-01-07 18:08:01 -080026#include <linux/memcontrol.h>
Jens Axboe5274f052006-03-30 15:15:30 +020027#include <linux/mm_inline.h>
Jens Axboe5abc97a2006-03-30 15:16:46 +020028#include <linux/swap.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020029#include <linux/writeback.h>
Paul Gortmaker630d9c42011-11-16 23:57:37 -050030#include <linux/export.h>
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020031#include <linux/syscalls.h>
Jens Axboe912d35f2006-04-26 10:59:21 +020032#include <linux/uio.h>
Chung-Chiang Cheng983652c2023-03-22 14:25:19 +080033#include <linux/fsnotify.h>
James Morris29ce2052007-07-13 11:44:32 +020034#include <linux/security.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090035#include <linux/gfp.h>
David Howells2dc334f2023-06-07 19:19:09 +010036#include <linux/net.h>
Eric Dumazet35f9c092012-04-05 03:05:35 +000037#include <linux/socket.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010038#include <linux/sched/signal.h>
39
Al Viro06ae43f32013-03-20 13:19:30 -040040#include "internal.h"
Jens Axboe5274f052006-03-30 15:15:30 +020041
Jens Axboe83f91352006-04-02 23:05:09 +020042/*
Jens Axboe0f99fc52023-04-24 16:32:55 -060043 * Splice doesn't support FMODE_NOWAIT. Since pipes may set this flag to
44 * indicate they support non-blocking reads or writes, we must clear it
45 * here if set to avoid blocking other users of this pipe if splice is
46 * being done on it.
47 */
48static noinline void noinline pipe_clear_nowait(struct file *file)
49{
50 fmode_t fmode = READ_ONCE(file->f_mode);
51
52 do {
53 if (!(fmode & FMODE_NOWAIT))
54 break;
55 } while (!try_cmpxchg(&file->f_mode, &fmode, fmode & ~FMODE_NOWAIT));
56}
57
58/*
Jens Axboe83f91352006-04-02 23:05:09 +020059 * Attempt to steal a page from a pipe buffer. This should perhaps go into
60 * a vm helper function, it's already simplified quite a bit by the
61 * addition of remove_mapping(). If success is returned, the caller may
62 * attempt to reuse this page for another destination.
63 */
Christoph Hellwigc928f642020-05-20 17:58:16 +020064static bool page_cache_pipe_buf_try_steal(struct pipe_inode_info *pipe,
65 struct pipe_buffer *buf)
Jens Axboe5abc97a2006-03-30 15:16:46 +020066{
Matthew Wilcox (Oracle)5100da32022-02-12 22:48:55 -050067 struct folio *folio = page_folio(buf->page);
Jens Axboe9e94cd42006-06-20 15:01:12 +020068 struct address_space *mapping;
Jens Axboe5abc97a2006-03-30 15:16:46 +020069
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050070 folio_lock(folio);
Jens Axboe9e0267c2006-04-19 15:57:31 +020071
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050072 mapping = folio_mapping(folio);
Jens Axboe9e94cd42006-06-20 15:01:12 +020073 if (mapping) {
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050074 WARN_ON(!folio_test_uptodate(folio));
Jens Axboe5abc97a2006-03-30 15:16:46 +020075
Jens Axboe9e94cd42006-06-20 15:01:12 +020076 /*
77 * At least for ext2 with nobh option, we need to wait on
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050078 * writeback completing on this folio, since we'll remove it
Jens Axboe9e94cd42006-06-20 15:01:12 +020079 * from the pagecache. Otherwise truncate wont wait on the
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050080 * folio, allowing the disk blocks to be reused by someone else
Jens Axboe9e94cd42006-06-20 15:01:12 +020081 * before we actually wrote our data to them. fs corruption
82 * ensues.
83 */
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -050084 folio_wait_writeback(folio);
Jens Axboead8d6f02006-04-02 23:10:32 +020085
David Howells0201ebf2023-06-28 11:48:51 +010086 if (!filemap_release_folio(folio, GFP_KERNEL))
Jens Axboeca39d652008-05-20 21:27:41 +020087 goto out_unlock;
Jens Axboe4f6f0bd2006-04-02 23:04:46 +020088
Jens Axboe9e94cd42006-06-20 15:01:12 +020089 /*
90 * If we succeeded in removing the mapping, set LRU flag
91 * and return good.
92 */
Matthew Wilcox (Oracle)5100da32022-02-12 22:48:55 -050093 if (remove_mapping(mapping, folio)) {
Jens Axboe9e94cd42006-06-20 15:01:12 +020094 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +020095 return true;
Jens Axboe9e94cd42006-06-20 15:01:12 +020096 }
Jens Axboe9e0267c2006-04-19 15:57:31 +020097 }
Jens Axboe5abc97a2006-03-30 15:16:46 +020098
Jens Axboe9e94cd42006-06-20 15:01:12 +020099 /*
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -0500100 * Raced with truncate or failed to remove folio from current
Jens Axboe9e94cd42006-06-20 15:01:12 +0200101 * address space, unlock and return failure.
102 */
Jens Axboeca39d652008-05-20 21:27:41 +0200103out_unlock:
Matthew Wilcox (Oracle)b9ccad22022-02-11 23:39:03 -0500104 folio_unlock(folio);
Christoph Hellwigc928f642020-05-20 17:58:16 +0200105 return false;
Jens Axboe5abc97a2006-03-30 15:16:46 +0200106}
107
Jens Axboe76ad4d12006-05-03 10:41:33 +0200108static void page_cache_pipe_buf_release(struct pipe_inode_info *pipe,
Jens Axboe5274f052006-03-30 15:15:30 +0200109 struct pipe_buffer *buf)
110{
Kirill A. Shutemov09cbfea2016-04-01 15:29:47 +0300111 put_page(buf->page);
Jens Axboe14328732006-05-03 10:35:26 +0200112 buf->flags &= ~PIPE_BUF_FLAG_LRU;
Jens Axboe5274f052006-03-30 15:15:30 +0200113}
114
Jens Axboe08457182007-06-12 20:51:32 +0200115/*
116 * Check whether the contents of buf is OK to access. Since the content
117 * is a page cache page, IO may be in flight.
118 */
Jens Axboecac36bb02007-06-14 13:10:48 +0200119static int page_cache_pipe_buf_confirm(struct pipe_inode_info *pipe,
120 struct pipe_buffer *buf)
Jens Axboe5274f052006-03-30 15:15:30 +0200121{
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100122 struct folio *folio = page_folio(buf->page);
Jens Axboe49d0b212006-04-10 09:04:41 +0200123 int err;
Jens Axboe5274f052006-03-30 15:15:30 +0200124
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100125 if (!folio_test_uptodate(folio)) {
126 folio_lock(folio);
Jens Axboe49d0b212006-04-10 09:04:41 +0200127
128 /*
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100129 * Folio got truncated/unhashed. This will cause a 0-byte
Ingo Molnar73d62d82006-04-11 13:57:21 +0200130 * splice, if this is the first page.
Jens Axboe49d0b212006-04-10 09:04:41 +0200131 */
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100132 if (!folio->mapping) {
Jens Axboe49d0b212006-04-10 09:04:41 +0200133 err = -ENODATA;
134 goto error;
135 }
136
137 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +0200138 * Uh oh, read-error from disk.
Jens Axboe49d0b212006-04-10 09:04:41 +0200139 */
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100140 if (!folio_test_uptodate(folio)) {
Jens Axboe49d0b212006-04-10 09:04:41 +0200141 err = -EIO;
142 goto error;
143 }
144
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100145 /* Folio is ok after all, we are done */
146 folio_unlock(folio);
Jens Axboe5274f052006-03-30 15:15:30 +0200147 }
148
Jens Axboef84d7512006-05-01 19:59:03 +0200149 return 0;
Jens Axboe49d0b212006-04-10 09:04:41 +0200150error:
Matthew Wilcox (Oracle)781ca602023-08-21 15:15:41 +0100151 folio_unlock(folio);
Jens Axboef84d7512006-05-01 19:59:03 +0200152 return err;
Jens Axboe70524492006-04-11 15:51:17 +0200153}
154
Hugh Dickins708e3502011-07-25 17:12:32 -0700155const struct pipe_buf_operations page_cache_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200156 .confirm = page_cache_pipe_buf_confirm,
157 .release = page_cache_pipe_buf_release,
158 .try_steal = page_cache_pipe_buf_try_steal,
159 .get = generic_pipe_buf_get,
Jens Axboe5274f052006-03-30 15:15:30 +0200160};
161
Christoph Hellwigc928f642020-05-20 17:58:16 +0200162static bool user_page_pipe_buf_try_steal(struct pipe_inode_info *pipe,
163 struct pipe_buffer *buf)
Jens Axboe912d35f2006-04-26 10:59:21 +0200164{
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200165 if (!(buf->flags & PIPE_BUF_FLAG_GIFT))
Christoph Hellwigc928f642020-05-20 17:58:16 +0200166 return false;
Jens Axboe7afa6fd2006-05-01 20:02:33 +0200167
Jens Axboe14328732006-05-03 10:35:26 +0200168 buf->flags |= PIPE_BUF_FLAG_LRU;
Christoph Hellwigc928f642020-05-20 17:58:16 +0200169 return generic_pipe_buf_try_steal(pipe, buf);
Jens Axboe912d35f2006-04-26 10:59:21 +0200170}
171
Eric Dumazetd4c3cca2006-12-13 00:34:04 -0800172static const struct pipe_buf_operations user_page_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200173 .release = page_cache_pipe_buf_release,
174 .try_steal = user_page_pipe_buf_try_steal,
175 .get = generic_pipe_buf_get,
Jens Axboe912d35f2006-04-26 10:59:21 +0200176};
177
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200178static void wakeup_pipe_readers(struct pipe_inode_info *pipe)
179{
180 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800181 if (waitqueue_active(&pipe->rd_wait))
182 wake_up_interruptible(&pipe->rd_wait);
Namhyung Kim825cdcb2011-05-23 19:58:53 +0200183 kill_fasync(&pipe->fasync_readers, SIGIO, POLL_IN);
184}
185
Jens Axboe932cc6d2007-06-21 13:10:21 +0200186/**
187 * splice_to_pipe - fill passed data into a pipe
188 * @pipe: pipe to fill
189 * @spd: data to fill
190 *
191 * Description:
Randy Dunlap79685b82007-07-27 08:08:51 +0200192 * @spd contains a map of pages and len/offset tuples, along with
Jens Axboe932cc6d2007-06-21 13:10:21 +0200193 * the struct pipe_buf_operations associated with these pages. This
194 * function will link that data to the pipe.
195 *
Jens Axboe83f91352006-04-02 23:05:09 +0200196 */
Jens Axboed6b29d72007-06-04 09:59:47 +0200197ssize_t splice_to_pipe(struct pipe_inode_info *pipe,
198 struct splice_pipe_desc *spd)
Jens Axboe5274f052006-03-30 15:15:30 +0200199{
Jens Axboe00de00b2007-06-15 13:14:22 +0200200 unsigned int spd_pages = spd->nr_pages;
David Howells8cefc102019-11-15 13:30:32 +0000201 unsigned int tail = pipe->tail;
202 unsigned int head = pipe->head;
203 unsigned int mask = pipe->ring_size - 1;
Al Viro8924fef2016-09-17 20:44:45 -0400204 int ret = 0, page_nr = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200205
Rabin Vincentd6785d92016-03-10 21:19:06 +0100206 if (!spd_pages)
207 return 0;
208
Al Viro8924fef2016-09-17 20:44:45 -0400209 if (unlikely(!pipe->readers)) {
210 send_sig(SIGPIPE, current, 0);
211 ret = -EPIPE;
212 goto out;
Jens Axboe5274f052006-03-30 15:15:30 +0200213 }
214
David Howells6718b6f2019-10-16 16:47:32 +0100215 while (!pipe_full(head, tail, pipe->max_usage)) {
David Howells8cefc102019-11-15 13:30:32 +0000216 struct pipe_buffer *buf = &pipe->bufs[head & mask];
Jens Axboe5274f052006-03-30 15:15:30 +0200217
Al Viro8924fef2016-09-17 20:44:45 -0400218 buf->page = spd->pages[page_nr];
219 buf->offset = spd->partial[page_nr].offset;
220 buf->len = spd->partial[page_nr].len;
221 buf->private = spd->partial[page_nr].private;
222 buf->ops = spd->ops;
Miklos Szeredi5a81e6a2017-02-16 17:49:02 +0100223 buf->flags = 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200224
David Howells8cefc102019-11-15 13:30:32 +0000225 head++;
226 pipe->head = head;
Al Viro8924fef2016-09-17 20:44:45 -0400227 page_nr++;
228 ret += buf->len;
229
230 if (!--spd->nr_pages)
231 break;
232 }
233
234 if (!ret)
235 ret = -EAGAIN;
236
237out:
Jens Axboe00de00b2007-06-15 13:14:22 +0200238 while (page_nr < spd_pages)
Jens Axboebbdfc2f2007-11-06 23:29:47 -0800239 spd->spd_release(spd, page_nr++);
Jens Axboe5274f052006-03-30 15:15:30 +0200240
241 return ret;
242}
Hannes Frederic Sowa2b514572015-05-21 17:00:01 +0200243EXPORT_SYMBOL_GPL(splice_to_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200244
Al Viro79fddc42016-09-17 22:38:20 -0400245ssize_t add_to_pipe(struct pipe_inode_info *pipe, struct pipe_buffer *buf)
246{
David Howells8cefc102019-11-15 13:30:32 +0000247 unsigned int head = pipe->head;
248 unsigned int tail = pipe->tail;
249 unsigned int mask = pipe->ring_size - 1;
Al Viro79fddc42016-09-17 22:38:20 -0400250 int ret;
251
252 if (unlikely(!pipe->readers)) {
253 send_sig(SIGPIPE, current, 0);
254 ret = -EPIPE;
David Howells6718b6f2019-10-16 16:47:32 +0100255 } else if (pipe_full(head, tail, pipe->max_usage)) {
Al Viro79fddc42016-09-17 22:38:20 -0400256 ret = -EAGAIN;
257 } else {
David Howells8cefc102019-11-15 13:30:32 +0000258 pipe->bufs[head & mask] = *buf;
259 pipe->head = head + 1;
Al Viro79fddc42016-09-17 22:38:20 -0400260 return buf->len;
261 }
Miklos Szeredia7796382016-09-27 10:45:12 +0200262 pipe_buf_release(pipe, buf);
Al Viro79fddc42016-09-17 22:38:20 -0400263 return ret;
264}
265EXPORT_SYMBOL(add_to_pipe);
266
Jens Axboe35f3d142010-05-20 10:43:18 +0200267/*
268 * Check if we need to grow the arrays holding pages and partial page
269 * descriptions.
270 */
Eric Dumazet047fe362012-06-12 15:24:40 +0200271int splice_grow_spd(const struct pipe_inode_info *pipe, struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200272{
David Howells6718b6f2019-10-16 16:47:32 +0100273 unsigned int max_usage = READ_ONCE(pipe->max_usage);
Eric Dumazet047fe362012-06-12 15:24:40 +0200274
David Howells8cefc102019-11-15 13:30:32 +0000275 spd->nr_pages_max = max_usage;
276 if (max_usage <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200277 return 0;
278
David Howells8cefc102019-11-15 13:30:32 +0000279 spd->pages = kmalloc_array(max_usage, sizeof(struct page *), GFP_KERNEL);
280 spd->partial = kmalloc_array(max_usage, sizeof(struct partial_page),
Kees Cook6da2ec52018-06-12 13:55:00 -0700281 GFP_KERNEL);
Jens Axboe35f3d142010-05-20 10:43:18 +0200282
283 if (spd->pages && spd->partial)
284 return 0;
285
286 kfree(spd->pages);
287 kfree(spd->partial);
288 return -ENOMEM;
289}
290
Eric Dumazet047fe362012-06-12 15:24:40 +0200291void splice_shrink_spd(struct splice_pipe_desc *spd)
Jens Axboe35f3d142010-05-20 10:43:18 +0200292{
Eric Dumazet047fe362012-06-12 15:24:40 +0200293 if (spd->nr_pages_max <= PIPE_DEF_BUFFERS)
Jens Axboe35f3d142010-05-20 10:43:18 +0200294 return;
295
296 kfree(spd->pages);
297 kfree(spd->partial);
298}
299
David Howells9eee8bd2023-05-22 14:50:18 +0100300/**
301 * copy_splice_read - Copy data from a file and splice the copy into a pipe
302 * @in: The file to read from
303 * @ppos: Pointer to the file position to read from
304 * @pipe: The pipe to splice into
305 * @len: The amount to splice
306 * @flags: The SPLICE_F_* flags
307 *
308 * This function allocates a bunch of pages sufficient to hold the requested
309 * amount of data (but limited by the remaining pipe capacity), passes it to
310 * the file's ->read_iter() to read into and then splices the used pages into
311 * the pipe.
312 *
313 * Return: On success, the number of bytes read will be returned and *@ppos
314 * will be updated if appropriate; 0 will be returned if there is no more data
315 * to be read; -EAGAIN will be returned if the pipe had no space, and some
316 * other negative error code will be returned on error. A short read may occur
317 * if the pipe has insufficient space, we reach the end of the data or we hit a
318 * hole.
David Howells33b3b042023-02-07 10:45:40 +0000319 */
David Howells69df79a2023-05-22 14:49:50 +0100320ssize_t copy_splice_read(struct file *in, loff_t *ppos,
321 struct pipe_inode_info *pipe,
322 size_t len, unsigned int flags)
David Howells33b3b042023-02-07 10:45:40 +0000323{
324 struct iov_iter to;
325 struct bio_vec *bv;
326 struct kiocb kiocb;
327 struct page **pages;
328 ssize_t ret;
David Howellse69f37b2023-05-22 14:49:51 +0100329 size_t used, npages, chunk, remain, keep = 0;
David Howells33b3b042023-02-07 10:45:40 +0000330 int i;
331
332 /* Work out how much data we can actually add into the pipe */
333 used = pipe_occupancy(pipe->head, pipe->tail);
334 npages = max_t(ssize_t, pipe->max_usage - used, 0);
335 len = min_t(size_t, len, npages * PAGE_SIZE);
336 npages = DIV_ROUND_UP(len, PAGE_SIZE);
337
338 bv = kzalloc(array_size(npages, sizeof(bv[0])) +
339 array_size(npages, sizeof(struct page *)), GFP_KERNEL);
340 if (!bv)
341 return -ENOMEM;
342
David Howellse69f37b2023-05-22 14:49:51 +0100343 pages = (struct page **)(bv + npages);
David Howells33b3b042023-02-07 10:45:40 +0000344 npages = alloc_pages_bulk_array(GFP_USER, npages, pages);
345 if (!npages) {
346 kfree(bv);
347 return -ENOMEM;
348 }
349
350 remain = len = min_t(size_t, len, npages * PAGE_SIZE);
351
352 for (i = 0; i < npages; i++) {
353 chunk = min_t(size_t, PAGE_SIZE, remain);
354 bv[i].bv_page = pages[i];
355 bv[i].bv_offset = 0;
356 bv[i].bv_len = chunk;
357 remain -= chunk;
358 }
359
360 /* Do the I/O */
361 iov_iter_bvec(&to, ITER_DEST, bv, npages, len);
362 init_sync_kiocb(&kiocb, in);
363 kiocb.ki_pos = *ppos;
364 ret = call_read_iter(in, &kiocb, &to);
365
David Howells33b3b042023-02-07 10:45:40 +0000366 if (ret > 0) {
David Howellse69f37b2023-05-22 14:49:51 +0100367 keep = DIV_ROUND_UP(ret, PAGE_SIZE);
David Howells33b3b042023-02-07 10:45:40 +0000368 *ppos = kiocb.ki_pos;
David Howells33b3b042023-02-07 10:45:40 +0000369 }
370
Christoph Hellwig2e82f6c2023-06-14 16:03:39 +0200371 /*
372 * Callers of ->splice_read() expect -EAGAIN on "can't put anything in
373 * there", rather than -EFAULT.
374 */
375 if (ret == -EFAULT)
376 ret = -EAGAIN;
377
David Howells33b3b042023-02-07 10:45:40 +0000378 /* Free any pages that didn't get touched at all. */
David Howellse69f37b2023-05-22 14:49:51 +0100379 if (keep < npages)
380 release_pages(pages + keep, npages - keep);
David Howells33b3b042023-02-07 10:45:40 +0000381
382 /* Push the remaining pages into the pipe. */
David Howellse69f37b2023-05-22 14:49:51 +0100383 remain = ret;
384 for (i = 0; i < keep; i++) {
David Howells33b3b042023-02-07 10:45:40 +0000385 struct pipe_buffer *buf = pipe_head_buf(pipe);
386
387 chunk = min_t(size_t, remain, PAGE_SIZE);
388 *buf = (struct pipe_buffer) {
389 .ops = &default_pipe_buf_ops,
390 .page = bv[i].bv_page,
391 .offset = 0,
392 .len = chunk,
393 };
394 pipe->head++;
395 remain -= chunk;
396 }
397
398 kfree(bv);
399 return ret;
400}
David Howells69df79a2023-05-22 14:49:50 +0100401EXPORT_SYMBOL(copy_splice_read);
David Howells33b3b042023-02-07 10:45:40 +0000402
Al Viro241699c2016-09-22 16:33:12 -0400403const struct pipe_buf_operations default_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200404 .release = generic_pipe_buf_release,
405 .try_steal = generic_pipe_buf_try_steal,
406 .get = generic_pipe_buf_get,
Miklos Szeredi68181732009-05-07 15:37:36 +0200407};
408
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100409/* Pipe buffer operations for a socket and similar. */
410const struct pipe_buf_operations nosteal_pipe_buf_ops = {
Christoph Hellwigc928f642020-05-20 17:58:16 +0200411 .release = generic_pipe_buf_release,
412 .get = generic_pipe_buf_get,
Miklos Szeredi28a625c2014-01-22 19:36:57 +0100413};
414EXPORT_SYMBOL(nosteal_pipe_buf_ops);
415
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200416static void wakeup_pipe_writers(struct pipe_inode_info *pipe)
417{
418 smp_mb();
Linus Torvalds0ddad212019-12-09 09:48:27 -0800419 if (waitqueue_active(&pipe->wr_wait))
420 wake_up_interruptible(&pipe->wr_wait);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200421 kill_fasync(&pipe->fasync_writers, SIGIO, POLL_OUT);
422}
423
424/**
425 * splice_from_pipe_feed - feed available data from a pipe to a file
426 * @pipe: pipe to splice from
427 * @sd: information to @actor
428 * @actor: handler that splices the data
429 *
430 * Description:
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200431 * This function loops over the pipe and calls @actor to do the
432 * actual moving of a single struct pipe_buffer to the desired
433 * destination. It returns when there's no more buffers left in
434 * the pipe or if the requested number of bytes (@sd->total_len)
435 * have been copied. It returns a positive number (one) if the
436 * pipe needs to be filled with more data, zero if the required
437 * number of bytes have been copied and -errno on error.
438 *
439 * This, together with splice_from_pipe_{begin,end,next}, may be
440 * used to implement the functionality of __splice_from_pipe() when
441 * locking is required around copying the pipe buffers to the
442 * destination.
443 */
Al Viro96f9bc82014-04-05 04:35:49 -0400444static int splice_from_pipe_feed(struct pipe_inode_info *pipe, struct splice_desc *sd,
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200445 splice_actor *actor)
446{
David Howells8cefc102019-11-15 13:30:32 +0000447 unsigned int head = pipe->head;
448 unsigned int tail = pipe->tail;
449 unsigned int mask = pipe->ring_size - 1;
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200450 int ret;
451
Linus Torvaldsec057592019-12-06 12:40:35 -0800452 while (!pipe_empty(head, tail)) {
David Howells8cefc102019-11-15 13:30:32 +0000453 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200454
455 sd->len = buf->len;
456 if (sd->len > sd->total_len)
457 sd->len = sd->total_len;
458
Miklos Szeredifba597d2016-09-27 10:45:12 +0200459 ret = pipe_buf_confirm(pipe, buf);
MichaƂ MirosƂawa8adbe32010-12-17 08:56:44 +0100460 if (unlikely(ret)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200461 if (ret == -ENODATA)
462 ret = 0;
463 return ret;
464 }
MichaƂ MirosƂawa8adbe32010-12-17 08:56:44 +0100465
466 ret = actor(pipe, buf, sd);
467 if (ret <= 0)
468 return ret;
469
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200470 buf->offset += ret;
471 buf->len -= ret;
472
473 sd->num_spliced += ret;
474 sd->len -= ret;
475 sd->pos += ret;
476 sd->total_len -= ret;
477
478 if (!buf->len) {
Miklos Szeredia7796382016-09-27 10:45:12 +0200479 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000480 tail++;
481 pipe->tail = tail;
Al Viro6447a3c2013-03-21 11:01:38 -0400482 if (pipe->files)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200483 sd->need_wakeup = true;
484 }
485
486 if (!sd->total_len)
487 return 0;
488 }
489
490 return 1;
491}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200492
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700493/* We know we have a pipe buffer, but maybe it's empty? */
494static inline bool eat_empty_buffer(struct pipe_inode_info *pipe)
495{
496 unsigned int tail = pipe->tail;
497 unsigned int mask = pipe->ring_size - 1;
498 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
499
500 if (unlikely(!buf->len)) {
501 pipe_buf_release(pipe, buf);
502 pipe->tail = tail+1;
503 return true;
504 }
505
506 return false;
507}
508
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200509/**
510 * splice_from_pipe_next - wait for some data to splice from
511 * @pipe: pipe to splice from
512 * @sd: information about the splice operation
513 *
514 * Description:
515 * This function will wait for some data and return a positive
516 * value (one) if pipe buffers are available. It will return zero
517 * or -errno if no more data needs to be spliced.
518 */
Al Viro96f9bc82014-04-05 04:35:49 -0400519static int splice_from_pipe_next(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200520{
Jan Karac725bfc2015-11-23 13:09:50 +0100521 /*
522 * Check for signal early to make process killable when there are
523 * always buffers available
524 */
525 if (signal_pending(current))
526 return -ERESTARTSYS;
527
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700528repeat:
David Howells8cefc102019-11-15 13:30:32 +0000529 while (pipe_empty(pipe->head, pipe->tail)) {
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200530 if (!pipe->writers)
531 return 0;
532
Linus Torvaldsa28c8b92019-12-07 13:21:01 -0800533 if (sd->num_spliced)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200534 return 0;
535
536 if (sd->flags & SPLICE_F_NONBLOCK)
537 return -EAGAIN;
538
539 if (signal_pending(current))
540 return -ERESTARTSYS;
541
542 if (sd->need_wakeup) {
543 wakeup_pipe_writers(pipe);
544 sd->need_wakeup = false;
545 }
546
Linus Torvalds472e5b02020-10-01 19:14:36 -0700547 pipe_wait_readable(pipe);
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200548 }
549
Linus Torvaldsd1a819a2020-10-05 11:26:27 -0700550 if (eat_empty_buffer(pipe))
551 goto repeat;
552
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200553 return 1;
554}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200555
556/**
557 * splice_from_pipe_begin - start splicing from pipe
Randy Dunlapb80901b2009-04-16 19:09:55 -0700558 * @sd: information about the splice operation
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200559 *
560 * Description:
561 * This function should be called before a loop containing
562 * splice_from_pipe_next() and splice_from_pipe_feed() to
563 * initialize the necessary fields of @sd.
564 */
Al Viro96f9bc82014-04-05 04:35:49 -0400565static void splice_from_pipe_begin(struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200566{
567 sd->num_spliced = 0;
568 sd->need_wakeup = false;
569}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200570
571/**
572 * splice_from_pipe_end - finish splicing from pipe
573 * @pipe: pipe to splice from
574 * @sd: information about the splice operation
575 *
576 * Description:
577 * This function will wake up pipe writers if necessary. It should
578 * be called after a loop containing splice_from_pipe_next() and
579 * splice_from_pipe_feed().
580 */
Al Viro96f9bc82014-04-05 04:35:49 -0400581static void splice_from_pipe_end(struct pipe_inode_info *pipe, struct splice_desc *sd)
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200582{
583 if (sd->need_wakeup)
584 wakeup_pipe_writers(pipe);
585}
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200586
Jens Axboe932cc6d2007-06-21 13:10:21 +0200587/**
588 * __splice_from_pipe - splice data from a pipe to given actor
589 * @pipe: pipe to splice from
590 * @sd: information to @actor
591 * @actor: handler that splices the data
592 *
593 * Description:
594 * This function does little more than loop over the pipe and call
595 * @actor to do the actual moving of a single struct pipe_buffer to
David Howells2dc334f2023-06-07 19:19:09 +0100596 * the desired destination. See pipe_to_file, pipe_to_sendmsg, or
Jens Axboe932cc6d2007-06-21 13:10:21 +0200597 * pipe_to_user.
598 *
Jens Axboe83f91352006-04-02 23:05:09 +0200599 */
Jens Axboec66ab6f2007-06-12 21:17:17 +0200600ssize_t __splice_from_pipe(struct pipe_inode_info *pipe, struct splice_desc *sd,
601 splice_actor *actor)
Jens Axboe5274f052006-03-30 15:15:30 +0200602{
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200603 int ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200604
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200605 splice_from_pipe_begin(sd);
606 do {
Jan Karac2489e02015-11-23 13:09:51 +0100607 cond_resched();
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200608 ret = splice_from_pipe_next(pipe, sd);
609 if (ret > 0)
610 ret = splice_from_pipe_feed(pipe, sd, actor);
611 } while (ret > 0);
612 splice_from_pipe_end(pipe, sd);
Jens Axboe5274f052006-03-30 15:15:30 +0200613
Miklos Szeredib3c2d2d2009-04-14 19:48:36 +0200614 return sd->num_spliced ? sd->num_spliced : ret;
Jens Axboe5274f052006-03-30 15:15:30 +0200615}
Mark Fasheh40bee44e2007-03-21 13:11:02 +0100616EXPORT_SYMBOL(__splice_from_pipe);
Jens Axboe5274f052006-03-30 15:15:30 +0200617
Jens Axboe932cc6d2007-06-21 13:10:21 +0200618/**
619 * splice_from_pipe - splice data from a pipe to a file
620 * @pipe: pipe to splice from
621 * @out: file to splice to
622 * @ppos: position in @out
623 * @len: how many bytes to splice
624 * @flags: splice modifier flags
625 * @actor: handler that splices the data
626 *
627 * Description:
Miklos Szeredi29339702009-04-14 19:48:37 +0200628 * See __splice_from_pipe. This function locks the pipe inode,
Jens Axboe932cc6d2007-06-21 13:10:21 +0200629 * otherwise it's identical to __splice_from_pipe().
630 *
631 */
Mark Fasheh6da61802006-10-17 18:43:07 +0200632ssize_t splice_from_pipe(struct pipe_inode_info *pipe, struct file *out,
633 loff_t *ppos, size_t len, unsigned int flags,
634 splice_actor *actor)
635{
636 ssize_t ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +0200637 struct splice_desc sd = {
638 .total_len = len,
639 .flags = flags,
640 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +0200641 .u.file = out,
Jens Axboec66ab6f2007-06-12 21:17:17 +0200642 };
Mark Fasheh6da61802006-10-17 18:43:07 +0200643
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200644 pipe_lock(pipe);
Jens Axboec66ab6f2007-06-12 21:17:17 +0200645 ret = __splice_from_pipe(pipe, &sd, actor);
Miklos Szeredi61e0d472009-04-14 19:48:41 +0200646 pipe_unlock(pipe);
Mark Fasheh6da61802006-10-17 18:43:07 +0200647
648 return ret;
649}
650
651/**
Al Viro8d020762014-04-05 04:27:08 -0400652 * iter_file_splice_write - splice data from a pipe to a file
653 * @pipe: pipe info
654 * @out: file to write to
655 * @ppos: position in @out
656 * @len: number of bytes to splice
657 * @flags: splice modifier flags
658 *
659 * Description:
660 * Will either move or copy pages (determined by @flags options) from
661 * the given pipe inode to the given file.
662 * This one is ->write_iter-based.
663 *
664 */
665ssize_t
666iter_file_splice_write(struct pipe_inode_info *pipe, struct file *out,
667 loff_t *ppos, size_t len, unsigned int flags)
668{
669 struct splice_desc sd = {
670 .total_len = len,
671 .flags = flags,
672 .pos = *ppos,
673 .u.file = out,
674 };
David Howells6718b6f2019-10-16 16:47:32 +0100675 int nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400676 struct bio_vec *array = kcalloc(nbufs, sizeof(struct bio_vec),
677 GFP_KERNEL);
678 ssize_t ret;
679
680 if (unlikely(!array))
681 return -ENOMEM;
682
683 pipe_lock(pipe);
684
685 splice_from_pipe_begin(&sd);
686 while (sd.total_len) {
687 struct iov_iter from;
Linus Torvaldsec057592019-12-06 12:40:35 -0800688 unsigned int head, tail, mask;
Al Viro8d020762014-04-05 04:27:08 -0400689 size_t left;
David Howells8cefc102019-11-15 13:30:32 +0000690 int n;
Al Viro8d020762014-04-05 04:27:08 -0400691
692 ret = splice_from_pipe_next(pipe, &sd);
693 if (ret <= 0)
694 break;
695
David Howells6718b6f2019-10-16 16:47:32 +0100696 if (unlikely(nbufs < pipe->max_usage)) {
Al Viro8d020762014-04-05 04:27:08 -0400697 kfree(array);
David Howells6718b6f2019-10-16 16:47:32 +0100698 nbufs = pipe->max_usage;
Al Viro8d020762014-04-05 04:27:08 -0400699 array = kcalloc(nbufs, sizeof(struct bio_vec),
700 GFP_KERNEL);
701 if (!array) {
702 ret = -ENOMEM;
703 break;
704 }
705 }
706
Linus Torvaldsec057592019-12-06 12:40:35 -0800707 head = pipe->head;
708 tail = pipe->tail;
709 mask = pipe->ring_size - 1;
710
Al Viro8d020762014-04-05 04:27:08 -0400711 /* build the vector */
712 left = sd.total_len;
Pavel Begunkov0f1d3442021-01-09 16:02:57 +0000713 for (n = 0; !pipe_empty(head, tail) && left && n < nbufs; tail++) {
David Howells8cefc102019-11-15 13:30:32 +0000714 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400715 size_t this_len = buf->len;
716
Pavel Begunkov0f1d3442021-01-09 16:02:57 +0000717 /* zero-length bvecs are not supported, skip them */
718 if (!this_len)
719 continue;
720 this_len = min(this_len, left);
Al Viro8d020762014-04-05 04:27:08 -0400721
Miklos Szeredifba597d2016-09-27 10:45:12 +0200722 ret = pipe_buf_confirm(pipe, buf);
Al Viro8d020762014-04-05 04:27:08 -0400723 if (unlikely(ret)) {
724 if (ret == -ENODATA)
725 ret = 0;
726 goto done;
727 }
728
Christoph Hellwig664e4072023-02-03 16:06:28 +0100729 bvec_set_page(&array[n], buf->page, this_len,
730 buf->offset);
Al Viro8d020762014-04-05 04:27:08 -0400731 left -= this_len;
Pavel Begunkov0f1d3442021-01-09 16:02:57 +0000732 n++;
Al Viro8d020762014-04-05 04:27:08 -0400733 }
734
Al Virode4eda92022-09-15 20:25:47 -0400735 iov_iter_bvec(&from, ITER_SOURCE, array, n, sd.total_len - left);
Christoph Hellwigabbb65892017-05-27 11:16:52 +0300736 ret = vfs_iter_write(out, &from, &sd.pos, 0);
Al Viro8d020762014-04-05 04:27:08 -0400737 if (ret <= 0)
738 break;
739
740 sd.num_spliced += ret;
741 sd.total_len -= ret;
Christoph Hellwigdbe4e192015-01-25 21:11:59 +0100742 *ppos = sd.pos;
Al Viro8d020762014-04-05 04:27:08 -0400743
744 /* dismiss the fully eaten buffers, adjust the partial one */
David Howells8cefc102019-11-15 13:30:32 +0000745 tail = pipe->tail;
Al Viro8d020762014-04-05 04:27:08 -0400746 while (ret) {
David Howells8cefc102019-11-15 13:30:32 +0000747 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
Al Viro8d020762014-04-05 04:27:08 -0400748 if (ret >= buf->len) {
Al Viro8d020762014-04-05 04:27:08 -0400749 ret -= buf->len;
750 buf->len = 0;
Miklos Szeredia7796382016-09-27 10:45:12 +0200751 pipe_buf_release(pipe, buf);
David Howells8cefc102019-11-15 13:30:32 +0000752 tail++;
753 pipe->tail = tail;
Al Viro8d020762014-04-05 04:27:08 -0400754 if (pipe->files)
755 sd.need_wakeup = true;
756 } else {
757 buf->offset += ret;
758 buf->len -= ret;
759 ret = 0;
760 }
761 }
762 }
763done:
764 kfree(array);
765 splice_from_pipe_end(pipe, &sd);
766
767 pipe_unlock(pipe);
768
769 if (sd.num_spliced)
770 ret = sd.num_spliced;
771
772 return ret;
773}
774
775EXPORT_SYMBOL(iter_file_splice_write);
776
David Howells2dc334f2023-06-07 19:19:09 +0100777#ifdef CONFIG_NET
Jens Axboe83f91352006-04-02 23:05:09 +0200778/**
David Howells2dc334f2023-06-07 19:19:09 +0100779 * splice_to_socket - splice data from a pipe to a socket
Jens Axboe932cc6d2007-06-21 13:10:21 +0200780 * @pipe: pipe to splice from
Jens Axboe83f91352006-04-02 23:05:09 +0200781 * @out: socket to write to
Jens Axboe932cc6d2007-06-21 13:10:21 +0200782 * @ppos: position in @out
Jens Axboe83f91352006-04-02 23:05:09 +0200783 * @len: number of bytes to splice
784 * @flags: splice modifier flags
785 *
Jens Axboe932cc6d2007-06-21 13:10:21 +0200786 * Description:
787 * Will send @len bytes from the pipe to a network socket. No data copying
788 * is involved.
Jens Axboe83f91352006-04-02 23:05:09 +0200789 *
790 */
David Howells2dc334f2023-06-07 19:19:09 +0100791ssize_t splice_to_socket(struct pipe_inode_info *pipe, struct file *out,
792 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200793{
David Howells2dc334f2023-06-07 19:19:09 +0100794 struct socket *sock = sock_from_file(out);
795 struct bio_vec bvec[16];
796 struct msghdr msg = {};
797 ssize_t ret = 0;
798 size_t spliced = 0;
799 bool need_wakeup = false;
Jens Axboe5274f052006-03-30 15:15:30 +0200800
David Howells2dc334f2023-06-07 19:19:09 +0100801 pipe_lock(pipe);
802
803 while (len > 0) {
804 unsigned int head, tail, mask, bc = 0;
805 size_t remain = len;
806
807 /*
808 * Check for signal early to make process killable when there
809 * are always buffers available
810 */
811 ret = -ERESTARTSYS;
812 if (signal_pending(current))
813 break;
814
815 while (pipe_empty(pipe->head, pipe->tail)) {
816 ret = 0;
817 if (!pipe->writers)
818 goto out;
819
820 if (spliced)
821 goto out;
822
823 ret = -EAGAIN;
824 if (flags & SPLICE_F_NONBLOCK)
825 goto out;
826
827 ret = -ERESTARTSYS;
828 if (signal_pending(current))
829 goto out;
830
831 if (need_wakeup) {
832 wakeup_pipe_writers(pipe);
833 need_wakeup = false;
834 }
835
836 pipe_wait_readable(pipe);
837 }
838
839 head = pipe->head;
840 tail = pipe->tail;
841 mask = pipe->ring_size - 1;
842
843 while (!pipe_empty(head, tail)) {
844 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
845 size_t seg;
846
847 if (!buf->len) {
848 tail++;
849 continue;
850 }
851
852 seg = min_t(size_t, remain, buf->len);
David Howells2dc334f2023-06-07 19:19:09 +0100853
854 ret = pipe_buf_confirm(pipe, buf);
855 if (unlikely(ret)) {
856 if (ret == -ENODATA)
857 ret = 0;
858 break;
859 }
860
861 bvec_set_page(&bvec[bc++], buf->page, seg, buf->offset);
862 remain -= seg;
David Howellsca2d49f2023-06-14 11:09:48 +0100863 if (remain == 0 || bc >= ARRAY_SIZE(bvec))
David Howells2dc334f2023-06-07 19:19:09 +0100864 break;
David Howellsca2d49f2023-06-14 11:09:48 +0100865 tail++;
David Howells2dc334f2023-06-07 19:19:09 +0100866 }
867
868 if (!bc)
869 break;
870
871 msg.msg_flags = MSG_SPLICE_PAGES;
872 if (flags & SPLICE_F_MORE)
873 msg.msg_flags |= MSG_MORE;
874 if (remain && pipe_occupancy(pipe->head, tail) > 0)
875 msg.msg_flags |= MSG_MORE;
Jan Stancek0f0fa272023-07-24 19:39:04 +0200876 if (out->f_flags & O_NONBLOCK)
877 msg.msg_flags |= MSG_DONTWAIT;
David Howells2dc334f2023-06-07 19:19:09 +0100878
879 iov_iter_bvec(&msg.msg_iter, ITER_SOURCE, bvec, bc,
880 len - remain);
881 ret = sock_sendmsg(sock, &msg);
882 if (ret <= 0)
883 break;
884
885 spliced += ret;
886 len -= ret;
887 tail = pipe->tail;
888 while (ret > 0) {
889 struct pipe_buffer *buf = &pipe->bufs[tail & mask];
890 size_t seg = min_t(size_t, ret, buf->len);
891
892 buf->offset += seg;
893 buf->len -= seg;
894 ret -= seg;
895
896 if (!buf->len) {
897 pipe_buf_release(pipe, buf);
898 tail++;
899 }
900 }
901
902 if (tail != pipe->tail) {
903 pipe->tail = tail;
904 if (pipe->files)
905 need_wakeup = true;
906 }
907 }
908
909out:
910 pipe_unlock(pipe);
911 if (need_wakeup)
912 wakeup_pipe_writers(pipe);
913 return spliced ?: ret;
914}
915#endif
Jeff Garzika0f06782006-03-30 23:06:13 -0500916
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200917static int warn_unsupported(struct file *file, const char *op)
918{
919 pr_debug_ratelimited(
920 "splice %s not supported for file %pD4 (pid: %d comm: %.20s)\n",
921 op, file, current->pid, current->comm);
922 return -EINVAL;
923}
924
Jens Axboe83f91352006-04-02 23:05:09 +0200925/*
926 * Attempt to initiate a splice from pipe to file.
927 */
Ingo Molnar3a326a22006-04-10 15:18:35 +0200928static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
Jens Axboecbb7e572006-04-11 14:57:50 +0200929 loff_t *ppos, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200930{
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200931 if (unlikely(!out->f_op->splice_write))
932 return warn_unsupported(out, "write");
933 return out->f_op->splice_write(pipe, out, ppos, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200934}
935
Jens Axboe83f91352006-04-02 23:05:09 +0200936/*
David Howells2bfc6682023-06-07 19:19:10 +0100937 * Indicate to the caller that there was a premature EOF when reading from the
938 * source and the caller didn't indicate they would be sending more data after
939 * this.
940 */
941static void do_splice_eof(struct splice_desc *sd)
942{
943 if (sd->splice_eof)
944 sd->splice_eof(sd);
945}
946
David Howells6a3f30b2023-05-22 14:49:52 +0100947/**
948 * vfs_splice_read - Read data from a file and splice it into a pipe
949 * @in: File to splice from
950 * @ppos: Input file offset
951 * @pipe: Pipe to splice to
952 * @len: Number of bytes to splice
953 * @flags: Splice modifier flags (SPLICE_F_*)
954 *
955 * Splice the requested amount of data from the input file to the pipe. This
956 * is synchronous as the caller must hold the pipe lock across the entire
957 * operation.
958 *
959 * If successful, it returns the amount of data spliced, 0 if it hit the EOF or
960 * a hole and a negative error code otherwise.
Jens Axboe83f91352006-04-02 23:05:09 +0200961 */
David Howells6a3f30b2023-05-22 14:49:52 +0100962long vfs_splice_read(struct file *in, loff_t *ppos,
963 struct pipe_inode_info *pipe, size_t len,
964 unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +0200965{
Al Viro313d64a2021-01-24 23:49:04 -0500966 unsigned int p_space;
Jens Axboe5274f052006-03-30 15:15:30 +0200967 int ret;
968
Jens Axboe49570e92006-04-11 13:56:09 +0200969 if (unlikely(!(in->f_mode & FMODE_READ)))
Jens Axboe5274f052006-03-30 15:15:30 +0200970 return -EBADF;
David Howells123856f2023-05-22 14:49:53 +0100971 if (!len)
972 return 0;
Jens Axboe5274f052006-03-30 15:15:30 +0200973
Al Viro313d64a2021-01-24 23:49:04 -0500974 /* Don't try to read more the pipe has space for. */
975 p_space = pipe->max_usage - pipe_occupancy(pipe->head, pipe->tail);
976 len = min_t(size_t, len, p_space << PAGE_SHIFT);
977
Jens Axboecbb7e572006-04-11 14:57:50 +0200978 ret = rw_verify_area(READ, in, ppos, len);
Jens Axboe5274f052006-03-30 15:15:30 +0200979 if (unlikely(ret < 0))
980 return ret;
981
Al Viro03cc0782016-04-02 14:56:58 -0400982 if (unlikely(len > MAX_RW_COUNT))
983 len = MAX_RW_COUNT;
984
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200985 if (unlikely(!in->f_op->splice_read))
986 return warn_unsupported(in, "read");
David Howellsaa3dbde2023-05-22 14:49:54 +0100987 /*
David Howellsb85930a2023-05-22 14:49:55 +0100988 * O_DIRECT and DAX don't deal with the pagecache, so we allocate a
989 * buffer, copy into it and splice that into the pipe.
David Howellsaa3dbde2023-05-22 14:49:54 +0100990 */
David Howellsb85930a2023-05-22 14:49:55 +0100991 if ((in->f_flags & O_DIRECT) || IS_DAX(in->f_mapping->host))
David Howellsaa3dbde2023-05-22 14:49:54 +0100992 return copy_splice_read(in, ppos, pipe, len, flags);
Christoph Hellwig36e2c742020-09-03 16:22:34 +0200993 return in->f_op->splice_read(in, ppos, pipe, len, flags);
Jens Axboe5274f052006-03-30 15:15:30 +0200994}
David Howells6a3f30b2023-05-22 14:49:52 +0100995EXPORT_SYMBOL_GPL(vfs_splice_read);
Jens Axboe5274f052006-03-30 15:15:30 +0200996
Jens Axboe932cc6d2007-06-21 13:10:21 +0200997/**
998 * splice_direct_to_actor - splices data directly between two non-pipes
999 * @in: file to splice from
1000 * @sd: actor information on where to splice to
1001 * @actor: handles the data splicing
1002 *
1003 * Description:
1004 * This is a special case helper to splice directly between two
1005 * points, without requiring an explicit pipe. Internally an allocated
Randy Dunlap79685b82007-07-27 08:08:51 +02001006 * pipe is cached in the process, and reused during the lifetime of
Jens Axboe932cc6d2007-06-21 13:10:21 +02001007 * that process.
1008 *
Jens Axboec66ab6f2007-06-12 21:17:17 +02001009 */
1010ssize_t splice_direct_to_actor(struct file *in, struct splice_desc *sd,
1011 splice_direct_actor *actor)
Jens Axboeb92ce552006-04-11 13:52:07 +02001012{
1013 struct pipe_inode_info *pipe;
1014 long ret, bytes;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001015 size_t len;
Christophe Leroy0ff28d92015-05-06 17:26:47 +02001016 int i, flags, more;
Jens Axboeb92ce552006-04-11 13:52:07 +02001017
1018 /*
Jason A. Donenfeld97ef77c2022-06-29 15:06:58 +02001019 * We require the input to be seekable, as we don't want to randomly
1020 * drop data for eg socket -> socket splicing. Use the piped splicing
1021 * for that!
Jens Axboeb92ce552006-04-11 13:52:07 +02001022 */
Jason A. Donenfeld97ef77c2022-06-29 15:06:58 +02001023 if (unlikely(!(in->f_mode & FMODE_LSEEK)))
Jens Axboeb92ce552006-04-11 13:52:07 +02001024 return -EINVAL;
1025
1026 /*
1027 * neither in nor out is a pipe, setup an internal pipe attached to
1028 * 'out' and transfer the wanted data from 'in' to 'out' through that
1029 */
1030 pipe = current->splice_pipe;
Jens Axboe49570e92006-04-11 13:56:09 +02001031 if (unlikely(!pipe)) {
Al Viro7bee1302013-03-21 11:04:15 -04001032 pipe = alloc_pipe_info();
Jens Axboeb92ce552006-04-11 13:52:07 +02001033 if (!pipe)
1034 return -ENOMEM;
1035
1036 /*
1037 * We don't have an immediate reader, but we'll read the stuff
Jens Axboe00522fb2006-04-26 14:39:29 +02001038 * out of the pipe right after the splice_to_pipe(). So set
Jens Axboeb92ce552006-04-11 13:52:07 +02001039 * PIPE_READERS appropriately.
1040 */
1041 pipe->readers = 1;
1042
1043 current->splice_pipe = pipe;
1044 }
1045
1046 /*
Ingo Molnar73d62d82006-04-11 13:57:21 +02001047 * Do the splice.
Jens Axboeb92ce552006-04-11 13:52:07 +02001048 */
Jens Axboeb92ce552006-04-11 13:52:07 +02001049 bytes = 0;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001050 len = sd->total_len;
David Howells219d9202023-06-07 19:19:16 +01001051
1052 /* Don't block on output, we have to drain the direct pipe. */
Jens Axboec66ab6f2007-06-12 21:17:17 +02001053 flags = sd->flags;
David Howells219d9202023-06-07 19:19:16 +01001054 sd->flags &= ~SPLICE_F_NONBLOCK;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001055
1056 /*
David Howells219d9202023-06-07 19:19:16 +01001057 * We signal MORE until we've read sufficient data to fulfill the
1058 * request and we keep signalling it if the caller set it.
Jens Axboec66ab6f2007-06-12 21:17:17 +02001059 */
Christophe Leroy0ff28d92015-05-06 17:26:47 +02001060 more = sd->flags & SPLICE_F_MORE;
David Howells219d9202023-06-07 19:19:16 +01001061 sd->flags |= SPLICE_F_MORE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001062
David Howells8cefc102019-11-15 13:30:32 +00001063 WARN_ON_ONCE(!pipe_empty(pipe->head, pipe->tail));
Darrick J. Wong17614442018-11-30 10:37:49 -08001064
Jens Axboeb92ce552006-04-11 13:52:07 +02001065 while (len) {
Jens Axboe51a92c02007-07-13 14:11:43 +02001066 size_t read_len;
Tom Zanussia82c53a2008-05-09 13:28:36 +02001067 loff_t pos = sd->pos, prev_pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +02001068
David Howells6a3f30b2023-05-22 14:49:52 +01001069 ret = vfs_splice_read(in, &pos, pipe, len, flags);
Jens Axboe51a92c02007-07-13 14:11:43 +02001070 if (unlikely(ret <= 0))
David Howells2bfc6682023-06-07 19:19:10 +01001071 goto read_failure;
Jens Axboeb92ce552006-04-11 13:52:07 +02001072
1073 read_len = ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001074 sd->total_len = read_len;
Jens Axboeb92ce552006-04-11 13:52:07 +02001075
1076 /*
David Howells219d9202023-06-07 19:19:16 +01001077 * If we now have sufficient data to fulfill the request then
1078 * we clear SPLICE_F_MORE if it was not set initially.
Christophe Leroy0ff28d92015-05-06 17:26:47 +02001079 */
David Howells219d9202023-06-07 19:19:16 +01001080 if (read_len >= len && !more)
Christophe Leroy0ff28d92015-05-06 17:26:47 +02001081 sd->flags &= ~SPLICE_F_MORE;
David Howells219d9202023-06-07 19:19:16 +01001082
Christophe Leroy0ff28d92015-05-06 17:26:47 +02001083 /*
Jens Axboeb92ce552006-04-11 13:52:07 +02001084 * NOTE: nonblocking mode only applies to the input. We
1085 * must not do the output in nonblocking mode as then we
1086 * could get stuck data in the internal pipe:
1087 */
Jens Axboec66ab6f2007-06-12 21:17:17 +02001088 ret = actor(pipe, sd);
Tom Zanussia82c53a2008-05-09 13:28:36 +02001089 if (unlikely(ret <= 0)) {
1090 sd->pos = prev_pos;
Jens Axboeb92ce552006-04-11 13:52:07 +02001091 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +02001092 }
Jens Axboeb92ce552006-04-11 13:52:07 +02001093
1094 bytes += ret;
1095 len -= ret;
Jens Axboebcd4f3a2007-07-16 14:41:49 +02001096 sd->pos = pos;
Jens Axboeb92ce552006-04-11 13:52:07 +02001097
Tom Zanussia82c53a2008-05-09 13:28:36 +02001098 if (ret < read_len) {
1099 sd->pos = prev_pos + ret;
Jens Axboe51a92c02007-07-13 14:11:43 +02001100 goto out_release;
Tom Zanussia82c53a2008-05-09 13:28:36 +02001101 }
Jens Axboeb92ce552006-04-11 13:52:07 +02001102 }
1103
Jens Axboe9e971982008-01-29 21:05:57 +01001104done:
David Howells8cefc102019-11-15 13:30:32 +00001105 pipe->tail = pipe->head = 0;
Jens Axboe80848702008-01-30 12:24:48 +01001106 file_accessed(in);
Jens Axboeb92ce552006-04-11 13:52:07 +02001107 return bytes;
1108
David Howells2bfc6682023-06-07 19:19:10 +01001109read_failure:
1110 /*
1111 * If the user did *not* set SPLICE_F_MORE *and* we didn't hit that
1112 * "use all of len" case that cleared SPLICE_F_MORE, *and* we did a
1113 * "->splice_in()" that returned EOF (ie zero) *and* we have sent at
1114 * least 1 byte *then* we will also do the ->splice_eof() call.
1115 */
1116 if (ret == 0 && !more && len > 0 && bytes)
1117 do_splice_eof(sd);
Jens Axboeb92ce552006-04-11 13:52:07 +02001118out_release:
1119 /*
1120 * If we did an incomplete transfer we must release
1121 * the pipe buffers in question:
1122 */
David Howells8cefc102019-11-15 13:30:32 +00001123 for (i = 0; i < pipe->ring_size; i++) {
1124 struct pipe_buffer *buf = &pipe->bufs[i];
Jens Axboeb92ce552006-04-11 13:52:07 +02001125
Miklos Szeredia7796382016-09-27 10:45:12 +02001126 if (buf->ops)
1127 pipe_buf_release(pipe, buf);
Jens Axboeb92ce552006-04-11 13:52:07 +02001128 }
Jens Axboeb92ce552006-04-11 13:52:07 +02001129
Jens Axboe9e971982008-01-29 21:05:57 +01001130 if (!bytes)
1131 bytes = ret;
Jens Axboeb92ce552006-04-11 13:52:07 +02001132
Jens Axboe9e971982008-01-29 21:05:57 +01001133 goto done;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001134}
1135EXPORT_SYMBOL(splice_direct_to_actor);
1136
1137static int direct_splice_actor(struct pipe_inode_info *pipe,
1138 struct splice_desc *sd)
1139{
Jens Axboe6a14b902007-06-14 13:08:55 +02001140 struct file *file = sd->u.file;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001141
Al Viro7995bd22013-06-20 18:58:36 +04001142 return do_splice_from(pipe, file, sd->opos, sd->total_len,
Changli Gao2cb4b052010-06-29 13:09:18 +02001143 sd->flags);
Jens Axboec66ab6f2007-06-12 21:17:17 +02001144}
1145
David Howells2bfc6682023-06-07 19:19:10 +01001146static void direct_file_splice_eof(struct splice_desc *sd)
1147{
1148 struct file *file = sd->u.file;
1149
1150 if (file->f_op->splice_eof)
1151 file->f_op->splice_eof(file);
1152}
1153
Jens Axboe932cc6d2007-06-21 13:10:21 +02001154/**
1155 * do_splice_direct - splices data directly between two files
1156 * @in: file to splice from
1157 * @ppos: input file offset
1158 * @out: file to splice to
Randy Dunlapacdb37c2013-06-22 19:44:08 -07001159 * @opos: output file offset
Jens Axboe932cc6d2007-06-21 13:10:21 +02001160 * @len: number of bytes to splice
1161 * @flags: splice modifier flags
1162 *
1163 * Description:
1164 * For use by do_sendfile(). splice can easily emulate sendfile, but
1165 * doing it in the application would incur an extra system call
1166 * (splice in + splice out, as compared to just sendfile()). So this helper
1167 * can splice directly through a process-private pipe.
1168 *
1169 */
Jens Axboec66ab6f2007-06-12 21:17:17 +02001170long do_splice_direct(struct file *in, loff_t *ppos, struct file *out,
Al Viro7995bd22013-06-20 18:58:36 +04001171 loff_t *opos, size_t len, unsigned int flags)
Jens Axboec66ab6f2007-06-12 21:17:17 +02001172{
1173 struct splice_desc sd = {
1174 .len = len,
1175 .total_len = len,
1176 .flags = flags,
1177 .pos = *ppos,
Jens Axboe6a14b902007-06-14 13:08:55 +02001178 .u.file = out,
David Howells2bfc6682023-06-07 19:19:10 +01001179 .splice_eof = direct_file_splice_eof,
Al Viro7995bd22013-06-20 18:58:36 +04001180 .opos = opos,
Jens Axboec66ab6f2007-06-12 21:17:17 +02001181 };
Jens Axboe51a92c02007-07-13 14:11:43 +02001182 long ret;
Jens Axboec66ab6f2007-06-12 21:17:17 +02001183
Al Viro18c67cb2013-06-19 15:41:54 +04001184 if (unlikely(!(out->f_mode & FMODE_WRITE)))
1185 return -EBADF;
1186
1187 if (unlikely(out->f_flags & O_APPEND))
1188 return -EINVAL;
1189
1190 ret = rw_verify_area(WRITE, out, opos, len);
1191 if (unlikely(ret < 0))
1192 return ret;
1193
Jens Axboec66ab6f2007-06-12 21:17:17 +02001194 ret = splice_direct_to_actor(in, &sd, direct_splice_actor);
Jens Axboe51a92c02007-07-13 14:11:43 +02001195 if (ret > 0)
Tom Zanussia82c53a2008-05-09 13:28:36 +02001196 *ppos = sd.pos;
Jens Axboe51a92c02007-07-13 14:11:43 +02001197
Jens Axboec66ab6f2007-06-12 21:17:17 +02001198 return ret;
Jens Axboeb92ce552006-04-11 13:52:07 +02001199}
Miklos Szeredi1c118592014-10-24 00:14:35 +02001200EXPORT_SYMBOL(do_splice_direct);
Jens Axboeb92ce552006-04-11 13:52:07 +02001201
Al Viro8924fef2016-09-17 20:44:45 -04001202static int wait_for_space(struct pipe_inode_info *pipe, unsigned flags)
1203{
Linus Torvalds52bce912016-12-21 10:59:34 -08001204 for (;;) {
1205 if (unlikely(!pipe->readers)) {
1206 send_sig(SIGPIPE, current, 0);
1207 return -EPIPE;
1208 }
David Howells6718b6f2019-10-16 16:47:32 +01001209 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Linus Torvalds52bce912016-12-21 10:59:34 -08001210 return 0;
Al Viro8924fef2016-09-17 20:44:45 -04001211 if (flags & SPLICE_F_NONBLOCK)
1212 return -EAGAIN;
1213 if (signal_pending(current))
1214 return -ERESTARTSYS;
Linus Torvalds472e5b02020-10-01 19:14:36 -07001215 pipe_wait_writable(pipe);
Al Viro8924fef2016-09-17 20:44:45 -04001216 }
Al Viro8924fef2016-09-17 20:44:45 -04001217}
1218
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001219static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1220 struct pipe_inode_info *opipe,
1221 size_t len, unsigned int flags);
Jens Axboeddac0d32006-11-04 12:49:32 +01001222
Al Virob964bf52021-01-25 22:24:28 -05001223long splice_file_to_pipe(struct file *in,
Al Virofaa97c42021-01-25 22:23:03 -05001224 struct pipe_inode_info *opipe,
1225 loff_t *offset,
1226 size_t len, unsigned int flags)
1227{
1228 long ret;
1229
1230 pipe_lock(opipe);
1231 ret = wait_for_space(opipe, flags);
1232 if (!ret)
David Howells6a3f30b2023-05-22 14:49:52 +01001233 ret = vfs_splice_read(in, offset, opipe, len, flags);
Al Virofaa97c42021-01-25 22:23:03 -05001234 pipe_unlock(opipe);
1235 if (ret > 0)
1236 wakeup_pipe_readers(opipe);
1237 return ret;
1238}
1239
Jens Axboeddac0d32006-11-04 12:49:32 +01001240/*
Jens Axboe83f91352006-04-02 23:05:09 +02001241 * Determine where to splice to/from.
1242 */
Jens Axboeee6e00c2020-10-22 14:15:51 -06001243long do_splice(struct file *in, loff_t *off_in, struct file *out,
1244 loff_t *off_out, size_t len, unsigned int flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001245{
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001246 struct pipe_inode_info *ipipe;
1247 struct pipe_inode_info *opipe;
Al Viro7995bd22013-06-20 18:58:36 +04001248 loff_t offset;
Jens Axboea4514eb2006-04-19 15:57:05 +02001249 long ret;
Jens Axboe5274f052006-03-30 15:15:30 +02001250
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001251 if (unlikely(!(in->f_mode & FMODE_READ) ||
1252 !(out->f_mode & FMODE_WRITE)))
1253 return -EBADF;
1254
David Howellsc73be612020-01-14 17:07:11 +00001255 ipipe = get_pipe_info(in, true);
1256 opipe = get_pipe_info(out, true);
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001257
1258 if (ipipe && opipe) {
1259 if (off_in || off_out)
1260 return -ESPIPE;
1261
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001262 /* Splicing to self would be fun, but... */
1263 if (ipipe == opipe)
1264 return -EINVAL;
1265
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001266 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1267 flags |= SPLICE_F_NONBLOCK;
1268
Ahelenia ZiemiaƄska12ee4b62023-07-03 16:42:13 +02001269 ret = splice_pipe_to_pipe(ipipe, opipe, len, flags);
1270 } else if (ipipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001271 if (off_in)
1272 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001273 if (off_out) {
Changli Gao19c9a492010-06-29 13:10:36 +02001274 if (!(out->f_mode & FMODE_PWRITE))
Jens Axboeb92ce552006-04-11 13:52:07 +02001275 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001276 offset = *off_out;
Al Viro7995bd22013-06-20 18:58:36 +04001277 } else {
1278 offset = out->f_pos;
1279 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001280
Al Viro18c67cb2013-06-19 15:41:54 +04001281 if (unlikely(out->f_flags & O_APPEND))
1282 return -EINVAL;
1283
1284 ret = rw_verify_area(WRITE, out, &offset, len);
1285 if (unlikely(ret < 0))
1286 return ret;
1287
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001288 if (in->f_flags & O_NONBLOCK)
1289 flags |= SPLICE_F_NONBLOCK;
1290
Al Viro500368f2013-05-23 20:07:11 -04001291 file_start_write(out);
Al Viro7995bd22013-06-20 18:58:36 +04001292 ret = do_splice_from(ipipe, out, &offset, len, flags);
Al Viro500368f2013-05-23 20:07:11 -04001293 file_end_write(out);
Jens Axboea4514eb2006-04-19 15:57:05 +02001294
Al Viro7995bd22013-06-20 18:58:36 +04001295 if (!off_out)
1296 out->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001297 else
1298 *off_out = offset;
Ahelenia ZiemiaƄska12ee4b62023-07-03 16:42:13 +02001299 } else if (opipe) {
Ingo Molnar529565dc2006-04-10 15:18:58 +02001300 if (off_out)
1301 return -ESPIPE;
Jens Axboeb92ce552006-04-11 13:52:07 +02001302 if (off_in) {
Changli Gao19c9a492010-06-29 13:10:36 +02001303 if (!(in->f_mode & FMODE_PREAD))
Jens Axboeb92ce552006-04-11 13:52:07 +02001304 return -EINVAL;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001305 offset = *off_in;
Al Viro7995bd22013-06-20 18:58:36 +04001306 } else {
1307 offset = in->f_pos;
1308 }
Ingo Molnar529565dc2006-04-10 15:18:58 +02001309
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001310 if (out->f_flags & O_NONBLOCK)
1311 flags |= SPLICE_F_NONBLOCK;
1312
Al Virofaa97c42021-01-25 22:23:03 -05001313 ret = splice_file_to_pipe(in, opipe, &offset, len, flags);
Chung-Chiang Cheng983652c2023-03-22 14:25:19 +08001314
Al Viro7995bd22013-06-20 18:58:36 +04001315 if (!off_in)
1316 in->f_pos = offset;
Jens Axboeee6e00c2020-10-22 14:15:51 -06001317 else
1318 *off_in = offset;
Ahelenia ZiemiaƄska12ee4b62023-07-03 16:42:13 +02001319 } else {
1320 ret = -EINVAL;
Ingo Molnar529565dc2006-04-10 15:18:58 +02001321 }
Jens Axboe5274f052006-03-30 15:15:30 +02001322
Ahelenia ZiemiaƄska12ee4b62023-07-03 16:42:13 +02001323 if (ret > 0) {
1324 /*
1325 * Generate modify out before access in:
1326 * do_splice_from() may've already sent modify out,
1327 * and this ensures the events get merged.
1328 */
1329 fsnotify_modify(out);
1330 fsnotify_access(in);
1331 }
1332
1333 return ret;
Jens Axboe5274f052006-03-30 15:15:30 +02001334}
1335
Jens Axboeee6e00c2020-10-22 14:15:51 -06001336static long __do_splice(struct file *in, loff_t __user *off_in,
1337 struct file *out, loff_t __user *off_out,
1338 size_t len, unsigned int flags)
1339{
1340 struct pipe_inode_info *ipipe;
1341 struct pipe_inode_info *opipe;
1342 loff_t offset, *__off_in = NULL, *__off_out = NULL;
1343 long ret;
1344
1345 ipipe = get_pipe_info(in, true);
1346 opipe = get_pipe_info(out, true);
1347
Jens Axboe0f99fc52023-04-24 16:32:55 -06001348 if (ipipe) {
1349 if (off_in)
1350 return -ESPIPE;
1351 pipe_clear_nowait(in);
1352 }
1353 if (opipe) {
1354 if (off_out)
1355 return -ESPIPE;
1356 pipe_clear_nowait(out);
1357 }
Jens Axboeee6e00c2020-10-22 14:15:51 -06001358
1359 if (off_out) {
1360 if (copy_from_user(&offset, off_out, sizeof(loff_t)))
1361 return -EFAULT;
1362 __off_out = &offset;
1363 }
1364 if (off_in) {
1365 if (copy_from_user(&offset, off_in, sizeof(loff_t)))
1366 return -EFAULT;
1367 __off_in = &offset;
1368 }
1369
1370 ret = do_splice(in, __off_in, out, __off_out, len, flags);
1371 if (ret < 0)
1372 return ret;
1373
1374 if (__off_out && copy_to_user(off_out, __off_out, sizeof(loff_t)))
1375 return -EFAULT;
1376 if (__off_in && copy_to_user(off_in, __off_in, sizeof(loff_t)))
1377 return -EFAULT;
1378
1379 return ret;
1380}
1381
Al Viro79fddc42016-09-17 22:38:20 -04001382static int iter_to_pipe(struct iov_iter *from,
1383 struct pipe_inode_info *pipe,
1384 unsigned flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001385{
Al Viro79fddc42016-09-17 22:38:20 -04001386 struct pipe_buffer buf = {
1387 .ops = &user_page_pipe_buf_ops,
1388 .flags = flags
1389 };
1390 size_t total = 0;
1391 int ret = 0;
Al Viro79fddc42016-09-17 22:38:20 -04001392
Al Viro7d690c12022-06-09 11:07:52 -04001393 while (iov_iter_count(from)) {
Al Viro79fddc42016-09-17 22:38:20 -04001394 struct page *pages[16];
Al Viro7d690c12022-06-09 11:07:52 -04001395 ssize_t left;
Al Virodb85a9e2016-09-17 20:25:06 -04001396 size_t start;
Al Viro7d690c12022-06-09 11:07:52 -04001397 int i, n;
Jens Axboe912d35f2006-04-26 10:59:21 +02001398
Al Viro7d690c12022-06-09 11:07:52 -04001399 left = iov_iter_get_pages2(from, pages, ~0UL, 16, &start);
1400 if (left <= 0) {
1401 ret = left;
Al Viro79fddc42016-09-17 22:38:20 -04001402 break;
1403 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001404
Al Viro7d690c12022-06-09 11:07:52 -04001405 n = DIV_ROUND_UP(left + start, PAGE_SIZE);
1406 for (i = 0; i < n; i++) {
1407 int size = min_t(int, left, PAGE_SIZE - start);
1408
1409 buf.page = pages[i];
1410 buf.offset = start;
1411 buf.len = size;
1412 ret = add_to_pipe(pipe, &buf);
1413 if (unlikely(ret < 0)) {
1414 iov_iter_revert(from, left);
1415 // this one got dropped by add_to_pipe()
1416 while (++i < n)
1417 put_page(pages[i]);
1418 goto out;
Al Viro79fddc42016-09-17 22:38:20 -04001419 }
Al Viro7d690c12022-06-09 11:07:52 -04001420 total += ret;
1421 left -= size;
1422 start = 0;
Jens Axboe912d35f2006-04-26 10:59:21 +02001423 }
Jens Axboe912d35f2006-04-26 10:59:21 +02001424 }
Al Viro7d690c12022-06-09 11:07:52 -04001425out:
Al Viro79fddc42016-09-17 22:38:20 -04001426 return total ? total : ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001427}
1428
Jens Axboe6a14b902007-06-14 13:08:55 +02001429static int pipe_to_user(struct pipe_inode_info *pipe, struct pipe_buffer *buf,
1430 struct splice_desc *sd)
1431{
Al Viro6130f532014-02-03 18:19:51 -05001432 int n = copy_page_to_iter(buf->page, buf->offset, sd->len, sd->u.data);
1433 return n == sd->len ? n : -EFAULT;
Jens Axboe6a14b902007-06-14 13:08:55 +02001434}
1435
1436/*
1437 * For lack of a better implementation, implement vmsplice() to userspace
1438 * as a simple copy of the pipes pages to the user iov.
1439 */
Al Viro87a30022018-05-26 21:39:52 -04001440static long vmsplice_to_user(struct file *file, struct iov_iter *iter,
1441 unsigned int flags)
Jens Axboe6a14b902007-06-14 13:08:55 +02001442{
David Howellsc73be612020-01-14 17:07:11 +00001443 struct pipe_inode_info *pipe = get_pipe_info(file, true);
Al Viro87a30022018-05-26 21:39:52 -04001444 struct splice_desc sd = {
1445 .total_len = iov_iter_count(iter),
1446 .flags = flags,
1447 .u.data = iter
1448 };
1449 long ret = 0;
Jens Axboe6a14b902007-06-14 13:08:55 +02001450
Jens Axboe6a14b902007-06-14 13:08:55 +02001451 if (!pipe)
1452 return -EBADF;
1453
Jens Axboe0f99fc52023-04-24 16:32:55 -06001454 pipe_clear_nowait(file);
1455
Al Viro345995f2015-03-21 19:17:55 -04001456 if (sd.total_len) {
1457 pipe_lock(pipe);
1458 ret = __splice_from_pipe(pipe, &sd, pipe_to_user);
1459 pipe_unlock(pipe);
1460 }
Jens Axboe6a14b902007-06-14 13:08:55 +02001461
Ahelenia ZiemiaƄska7f0f1ea02023-07-03 16:42:17 +02001462 if (ret > 0)
1463 fsnotify_access(file);
1464
Jens Axboe6a14b902007-06-14 13:08:55 +02001465 return ret;
1466}
1467
Jens Axboe912d35f2006-04-26 10:59:21 +02001468/*
1469 * vmsplice splices a user address range into a pipe. It can be thought of
1470 * as splice-from-memory, where the regular splice is splice-from-file (or
1471 * to file). In both cases the output is a pipe, naturally.
Jens Axboe912d35f2006-04-26 10:59:21 +02001472 */
Al Viro87a30022018-05-26 21:39:52 -04001473static long vmsplice_to_pipe(struct file *file, struct iov_iter *iter,
1474 unsigned int flags)
Jens Axboe912d35f2006-04-26 10:59:21 +02001475{
Jens Axboeddac0d32006-11-04 12:49:32 +01001476 struct pipe_inode_info *pipe;
Al Viro87a30022018-05-26 21:39:52 -04001477 long ret = 0;
Al Viro79fddc42016-09-17 22:38:20 -04001478 unsigned buf_flag = 0;
1479
1480 if (flags & SPLICE_F_GIFT)
1481 buf_flag = PIPE_BUF_FLAG_GIFT;
Jens Axboe912d35f2006-04-26 10:59:21 +02001482
David Howellsc73be612020-01-14 17:07:11 +00001483 pipe = get_pipe_info(file, true);
Jens Axboeddac0d32006-11-04 12:49:32 +01001484 if (!pipe)
Jens Axboe912d35f2006-04-26 10:59:21 +02001485 return -EBADF;
Jens Axboe912d35f2006-04-26 10:59:21 +02001486
Jens Axboe0f99fc52023-04-24 16:32:55 -06001487 pipe_clear_nowait(file);
1488
Al Viro8924fef2016-09-17 20:44:45 -04001489 pipe_lock(pipe);
1490 ret = wait_for_space(pipe, flags);
Al Viro79fddc42016-09-17 22:38:20 -04001491 if (!ret)
Al Viro87a30022018-05-26 21:39:52 -04001492 ret = iter_to_pipe(iter, pipe, buf_flag);
Al Viro8924fef2016-09-17 20:44:45 -04001493 pipe_unlock(pipe);
Ahelenia ZiemiaƄska7f0f1ea02023-07-03 16:42:17 +02001494 if (ret > 0) {
Al Viro8924fef2016-09-17 20:44:45 -04001495 wakeup_pipe_readers(pipe);
Ahelenia ZiemiaƄska7f0f1ea02023-07-03 16:42:17 +02001496 fsnotify_modify(file);
1497 }
Jens Axboe35f3d142010-05-20 10:43:18 +02001498 return ret;
Jens Axboe912d35f2006-04-26 10:59:21 +02001499}
1500
Al Viro87a30022018-05-26 21:39:52 -04001501static int vmsplice_type(struct fd f, int *type)
1502{
1503 if (!f.file)
1504 return -EBADF;
1505 if (f.file->f_mode & FMODE_WRITE) {
Al Virode4eda92022-09-15 20:25:47 -04001506 *type = ITER_SOURCE;
Al Viro87a30022018-05-26 21:39:52 -04001507 } else if (f.file->f_mode & FMODE_READ) {
Al Virode4eda92022-09-15 20:25:47 -04001508 *type = ITER_DEST;
Al Viro87a30022018-05-26 21:39:52 -04001509 } else {
1510 fdput(f);
1511 return -EBADF;
1512 }
1513 return 0;
1514}
1515
Jens Axboe6a14b902007-06-14 13:08:55 +02001516/*
1517 * Note that vmsplice only really supports true splicing _from_ user memory
1518 * to a pipe, not the other way around. Splicing from user memory is a simple
1519 * operation that can be supported without any funky alignment restrictions
1520 * or nasty vm tricks. We simply map in the user memory and fill them into
1521 * a pipe. The reverse isn't quite as easy, though. There are two possible
1522 * solutions for that:
1523 *
1524 * - memcpy() the data internally, at which point we might as well just
1525 * do a regular read() on the buffer anyway.
1526 * - Lots of nasty vm tricks, that are neither fast nor flexible (it
1527 * has restriction limitations on both ends of the pipe).
1528 *
1529 * Currently we punt and implement it as a normal copy, see pipe_to_user().
1530 *
1531 */
Al Viro87a30022018-05-26 21:39:52 -04001532SYSCALL_DEFINE4(vmsplice, int, fd, const struct iovec __user *, uiov,
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001533 unsigned long, nr_segs, unsigned int, flags)
1534{
Al Viro87a30022018-05-26 21:39:52 -04001535 struct iovec iovstack[UIO_FASTIOV];
1536 struct iovec *iov = iovstack;
1537 struct iov_iter iter;
Jens Axboe87e5e6d2019-05-14 16:02:22 -06001538 ssize_t error;
Al Viro87a30022018-05-26 21:39:52 -04001539 struct fd f;
1540 int type;
1541
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001542 if (unlikely(flags & ~SPLICE_F_ALL))
1543 return -EINVAL;
1544
Al Viro87a30022018-05-26 21:39:52 -04001545 f = fdget(fd);
1546 error = vmsplice_type(f, &type);
1547 if (error)
1548 return error;
1549
1550 error = import_iovec(type, uiov, nr_segs,
1551 ARRAY_SIZE(iovstack), &iov, &iter);
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001552 if (error < 0)
1553 goto out_fdput;
1554
1555 if (!iov_iter_count(&iter))
1556 error = 0;
Al Virode4eda92022-09-15 20:25:47 -04001557 else if (type == ITER_SOURCE)
Christoph Hellwig598b3ce2020-09-25 06:51:44 +02001558 error = vmsplice_to_pipe(f.file, &iter, flags);
1559 else
1560 error = vmsplice_to_user(f.file, &iter, flags);
1561
1562 kfree(iov);
1563out_fdput:
Al Viro87a30022018-05-26 21:39:52 -04001564 fdput(f);
1565 return error;
Dominik Brodowski30cfe4e2018-03-17 15:00:24 +01001566}
1567
Heiko Carstens836f92a2009-01-14 14:14:33 +01001568SYSCALL_DEFINE6(splice, int, fd_in, loff_t __user *, off_in,
1569 int, fd_out, loff_t __user *, off_out,
1570 size_t, len, unsigned int, flags)
Jens Axboe5274f052006-03-30 15:15:30 +02001571{
Al Viro2903ff02012-08-28 12:52:22 -04001572 struct fd in, out;
Jens Axboe5274f052006-03-30 15:15:30 +02001573 long error;
Jens Axboe5274f052006-03-30 15:15:30 +02001574
1575 if (unlikely(!len))
1576 return 0;
1577
Al Viro3d6ea292016-12-10 13:17:32 -05001578 if (unlikely(flags & ~SPLICE_F_ALL))
1579 return -EINVAL;
1580
Jens Axboe5274f052006-03-30 15:15:30 +02001581 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001582 in = fdget(fd_in);
1583 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001584 out = fdget(fd_out);
1585 if (out.file) {
Jens Axboeee6e00c2020-10-22 14:15:51 -06001586 error = __do_splice(in.file, off_in, out.file, off_out,
1587 len, flags);
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001588 fdput(out);
Jens Axboe5274f052006-03-30 15:15:30 +02001589 }
Al Viro2903ff02012-08-28 12:52:22 -04001590 fdput(in);
Jens Axboe5274f052006-03-30 15:15:30 +02001591 }
Jens Axboe5274f052006-03-30 15:15:30 +02001592 return error;
1593}
Jens Axboe70524492006-04-11 15:51:17 +02001594
1595/*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001596 * Make sure there's data to read. Wait for input if we can, otherwise
1597 * return an appropriate error.
1598 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001599static int ipipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001600{
1601 int ret;
1602
1603 /*
David Howells8cefc102019-11-15 13:30:32 +00001604 * Check the pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001605 * is speculative anyways, so missing one is ok.
1606 */
David Howells8cefc102019-11-15 13:30:32 +00001607 if (!pipe_empty(pipe->head, pipe->tail))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001608 return 0;
1609
1610 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001611 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001612
David Howells8cefc102019-11-15 13:30:32 +00001613 while (pipe_empty(pipe->head, pipe->tail)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001614 if (signal_pending(current)) {
1615 ret = -ERESTARTSYS;
1616 break;
1617 }
1618 if (!pipe->writers)
1619 break;
Linus Torvaldsa28c8b92019-12-07 13:21:01 -08001620 if (flags & SPLICE_F_NONBLOCK) {
1621 ret = -EAGAIN;
1622 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001623 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001624 pipe_wait_readable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001625 }
1626
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001627 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001628 return ret;
1629}
1630
1631/*
1632 * Make sure there's writeable room. Wait for room if we can, otherwise
1633 * return an appropriate error.
1634 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001635static int opipe_prep(struct pipe_inode_info *pipe, unsigned int flags)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001636{
1637 int ret;
1638
1639 /*
David Howells8cefc102019-11-15 13:30:32 +00001640 * Check pipe occupancy without the inode lock first. This function
Jens Axboeaadd06e2006-07-10 11:00:01 +02001641 * is speculative anyways, so missing one is ok.
1642 */
Tetsuo Handa566d1362020-05-20 08:51:59 +09001643 if (!pipe_full(pipe->head, pipe->tail, pipe->max_usage))
Jens Axboeaadd06e2006-07-10 11:00:01 +02001644 return 0;
1645
1646 ret = 0;
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001647 pipe_lock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001648
David Howells6718b6f2019-10-16 16:47:32 +01001649 while (pipe_full(pipe->head, pipe->tail, pipe->max_usage)) {
Jens Axboeaadd06e2006-07-10 11:00:01 +02001650 if (!pipe->readers) {
1651 send_sig(SIGPIPE, current, 0);
1652 ret = -EPIPE;
1653 break;
1654 }
1655 if (flags & SPLICE_F_NONBLOCK) {
1656 ret = -EAGAIN;
1657 break;
1658 }
1659 if (signal_pending(current)) {
1660 ret = -ERESTARTSYS;
1661 break;
1662 }
Linus Torvalds472e5b02020-10-01 19:14:36 -07001663 pipe_wait_writable(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001664 }
1665
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001666 pipe_unlock(pipe);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001667 return ret;
1668}
1669
1670/*
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001671 * Splice contents of ipipe to opipe.
1672 */
1673static int splice_pipe_to_pipe(struct pipe_inode_info *ipipe,
1674 struct pipe_inode_info *opipe,
1675 size_t len, unsigned int flags)
1676{
1677 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001678 unsigned int i_head, o_head;
1679 unsigned int i_tail, o_tail;
1680 unsigned int i_mask, o_mask;
1681 int ret = 0;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001682 bool input_wakeup = false;
1683
1684
1685retry:
1686 ret = ipipe_prep(ipipe, flags);
1687 if (ret)
1688 return ret;
1689
1690 ret = opipe_prep(opipe, flags);
1691 if (ret)
1692 return ret;
1693
1694 /*
1695 * Potential ABBA deadlock, work around it by ordering lock
1696 * grabbing by pipe info address. Otherwise two different processes
1697 * could deadlock (one doing tee from A -> B, the other from B -> A).
1698 */
1699 pipe_double_lock(ipipe, opipe);
1700
David Howells8cefc102019-11-15 13:30:32 +00001701 i_tail = ipipe->tail;
1702 i_mask = ipipe->ring_size - 1;
1703 o_head = opipe->head;
1704 o_mask = opipe->ring_size - 1;
1705
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001706 do {
David Howells8cefc102019-11-15 13:30:32 +00001707 size_t o_len;
1708
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001709 if (!opipe->readers) {
1710 send_sig(SIGPIPE, current, 0);
1711 if (!ret)
1712 ret = -EPIPE;
1713 break;
1714 }
1715
David Howells8cefc102019-11-15 13:30:32 +00001716 i_head = ipipe->head;
1717 o_tail = opipe->tail;
1718
1719 if (pipe_empty(i_head, i_tail) && !ipipe->writers)
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001720 break;
1721
1722 /*
1723 * Cannot make any progress, because either the input
1724 * pipe is empty or the output pipe is full.
1725 */
David Howells8cefc102019-11-15 13:30:32 +00001726 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001727 pipe_full(o_head, o_tail, opipe->max_usage)) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001728 /* Already processed some buffers, break */
1729 if (ret)
1730 break;
1731
1732 if (flags & SPLICE_F_NONBLOCK) {
1733 ret = -EAGAIN;
1734 break;
1735 }
1736
1737 /*
1738 * We raced with another reader/writer and haven't
1739 * managed to process any buffers. A zero return
1740 * value means EOF, so retry instead.
1741 */
1742 pipe_unlock(ipipe);
1743 pipe_unlock(opipe);
1744 goto retry;
1745 }
1746
David Howells8cefc102019-11-15 13:30:32 +00001747 ibuf = &ipipe->bufs[i_tail & i_mask];
1748 obuf = &opipe->bufs[o_head & o_mask];
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001749
1750 if (len >= ibuf->len) {
1751 /*
1752 * Simply move the whole buffer from ipipe to opipe
1753 */
1754 *obuf = *ibuf;
1755 ibuf->ops = NULL;
David Howells8cefc102019-11-15 13:30:32 +00001756 i_tail++;
1757 ipipe->tail = i_tail;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001758 input_wakeup = true;
David Howells8cefc102019-11-15 13:30:32 +00001759 o_len = obuf->len;
1760 o_head++;
1761 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001762 } else {
1763 /*
1764 * Get a reference to this pipe buffer,
1765 * so we can copy the contents over.
1766 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001767 if (!pipe_buf_get(ipipe, ibuf)) {
1768 if (ret == 0)
1769 ret = -EFAULT;
1770 break;
1771 }
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001772 *obuf = *ibuf;
1773
1774 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001775 * Don't inherit the gift and merge flags, we need to
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001776 * prevent multiple steals of this page.
1777 */
1778 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001779 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001780
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001781 obuf->len = len;
David Howells8cefc102019-11-15 13:30:32 +00001782 ibuf->offset += len;
1783 ibuf->len -= len;
1784 o_len = len;
1785 o_head++;
1786 opipe->head = o_head;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001787 }
David Howells8cefc102019-11-15 13:30:32 +00001788 ret += o_len;
1789 len -= o_len;
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001790 } while (len);
1791
1792 pipe_unlock(ipipe);
1793 pipe_unlock(opipe);
1794
1795 /*
1796 * If we put data in the output pipe, wakeup any potential readers.
1797 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001798 if (ret > 0)
1799 wakeup_pipe_readers(opipe);
1800
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001801 if (input_wakeup)
1802 wakeup_pipe_writers(ipipe);
1803
1804 return ret;
1805}
1806
1807/*
Jens Axboe70524492006-04-11 15:51:17 +02001808 * Link contents of ipipe to opipe.
1809 */
1810static int link_pipe(struct pipe_inode_info *ipipe,
1811 struct pipe_inode_info *opipe,
1812 size_t len, unsigned int flags)
1813{
1814 struct pipe_buffer *ibuf, *obuf;
David Howells8cefc102019-11-15 13:30:32 +00001815 unsigned int i_head, o_head;
1816 unsigned int i_tail, o_tail;
1817 unsigned int i_mask, o_mask;
1818 int ret = 0;
Jens Axboe70524492006-04-11 15:51:17 +02001819
1820 /*
1821 * Potential ABBA deadlock, work around it by ordering lock
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001822 * grabbing by pipe info address. Otherwise two different processes
Jens Axboe70524492006-04-11 15:51:17 +02001823 * could deadlock (one doing tee from A -> B, the other from B -> A).
1824 */
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001825 pipe_double_lock(ipipe, opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001826
David Howells8cefc102019-11-15 13:30:32 +00001827 i_tail = ipipe->tail;
1828 i_mask = ipipe->ring_size - 1;
1829 o_head = opipe->head;
1830 o_mask = opipe->ring_size - 1;
1831
Jens Axboeaadd06e2006-07-10 11:00:01 +02001832 do {
Jens Axboe70524492006-04-11 15:51:17 +02001833 if (!opipe->readers) {
1834 send_sig(SIGPIPE, current, 0);
1835 if (!ret)
1836 ret = -EPIPE;
1837 break;
1838 }
Jens Axboe70524492006-04-11 15:51:17 +02001839
David Howells8cefc102019-11-15 13:30:32 +00001840 i_head = ipipe->head;
1841 o_tail = opipe->tail;
1842
Jens Axboe70524492006-04-11 15:51:17 +02001843 /*
David Howells8cefc102019-11-15 13:30:32 +00001844 * If we have iterated all input buffers or run out of
Jens Axboeaadd06e2006-07-10 11:00:01 +02001845 * output room, break.
Jens Axboe70524492006-04-11 15:51:17 +02001846 */
David Howells8cefc102019-11-15 13:30:32 +00001847 if (pipe_empty(i_head, i_tail) ||
David Howells6718b6f2019-10-16 16:47:32 +01001848 pipe_full(o_head, o_tail, opipe->max_usage))
Jens Axboe70524492006-04-11 15:51:17 +02001849 break;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001850
David Howells8cefc102019-11-15 13:30:32 +00001851 ibuf = &ipipe->bufs[i_tail & i_mask];
1852 obuf = &opipe->bufs[o_head & o_mask];
Jens Axboeaadd06e2006-07-10 11:00:01 +02001853
Jens Axboe2a27250e2006-04-19 15:56:40 +02001854 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001855 * Get a reference to this pipe buffer,
1856 * so we can copy the contents over.
Jens Axboe2a27250e2006-04-19 15:56:40 +02001857 */
Matthew Wilcox15fab632019-04-05 14:02:10 -07001858 if (!pipe_buf_get(ipipe, ibuf)) {
1859 if (ret == 0)
1860 ret = -EFAULT;
1861 break;
1862 }
Jens Axboe70524492006-04-11 15:51:17 +02001863
Jens Axboeaadd06e2006-07-10 11:00:01 +02001864 *obuf = *ibuf;
Jens Axboe70524492006-04-11 15:51:17 +02001865
Jens Axboeaadd06e2006-07-10 11:00:01 +02001866 /*
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001867 * Don't inherit the gift and merge flag, we need to prevent
1868 * multiple steals of this page.
Jens Axboeaadd06e2006-07-10 11:00:01 +02001869 */
1870 obuf->flags &= ~PIPE_BUF_FLAG_GIFT;
Christoph Hellwigf6dd9752020-05-20 17:58:12 +02001871 obuf->flags &= ~PIPE_BUF_FLAG_CAN_MERGE;
Jann Horna0ce2f02019-01-23 15:19:17 +01001872
Jens Axboeaadd06e2006-07-10 11:00:01 +02001873 if (obuf->len > len)
1874 obuf->len = len;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001875 ret += obuf->len;
1876 len -= obuf->len;
David Howells8cefc102019-11-15 13:30:32 +00001877
1878 o_head++;
1879 opipe->head = o_head;
1880 i_tail++;
Jens Axboeaadd06e2006-07-10 11:00:01 +02001881 } while (len);
Jens Axboe70524492006-04-11 15:51:17 +02001882
Miklos Szeredi61e0d472009-04-14 19:48:41 +02001883 pipe_unlock(ipipe);
1884 pipe_unlock(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001885
Jens Axboeaadd06e2006-07-10 11:00:01 +02001886 /*
1887 * If we put data in the output pipe, wakeup any potential readers.
1888 */
Namhyung Kim825cdcb2011-05-23 19:58:53 +02001889 if (ret > 0)
1890 wakeup_pipe_readers(opipe);
Jens Axboe70524492006-04-11 15:51:17 +02001891
1892 return ret;
1893}
1894
1895/*
1896 * This is a tee(1) implementation that works on pipes. It doesn't copy
1897 * any data, it simply references the 'in' pages on the 'out' pipe.
1898 * The 'flags' used are the SPLICE_F_* variants, currently the only
1899 * applicable one is SPLICE_F_NONBLOCK.
1900 */
Pavel Begunkov9dafdfc2020-05-17 14:18:05 +03001901long do_tee(struct file *in, struct file *out, size_t len, unsigned int flags)
Jens Axboe70524492006-04-11 15:51:17 +02001902{
David Howellsc73be612020-01-14 17:07:11 +00001903 struct pipe_inode_info *ipipe = get_pipe_info(in, true);
1904 struct pipe_inode_info *opipe = get_pipe_info(out, true);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001905 int ret = -EINVAL;
Jens Axboe70524492006-04-11 15:51:17 +02001906
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001907 if (unlikely(!(in->f_mode & FMODE_READ) ||
1908 !(out->f_mode & FMODE_WRITE)))
1909 return -EBADF;
1910
Jens Axboe70524492006-04-11 15:51:17 +02001911 /*
Jens Axboeaadd06e2006-07-10 11:00:01 +02001912 * Duplicate the contents of ipipe to opipe without actually
1913 * copying the data.
Jens Axboe70524492006-04-11 15:51:17 +02001914 */
Jens Axboeaadd06e2006-07-10 11:00:01 +02001915 if (ipipe && opipe && ipipe != opipe) {
Slavomir Kaslevee5e0012019-02-07 17:45:19 +02001916 if ((in->f_flags | out->f_flags) & O_NONBLOCK)
1917 flags |= SPLICE_F_NONBLOCK;
1918
Jens Axboeaadd06e2006-07-10 11:00:01 +02001919 /*
1920 * Keep going, unless we encounter an error. The ipipe/opipe
1921 * ordering doesn't really matter.
1922 */
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001923 ret = ipipe_prep(ipipe, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001924 if (!ret) {
Miklos Szeredi7c77f0b2009-05-07 15:37:35 +02001925 ret = opipe_prep(opipe, flags);
Jens Axboe02cf01a2008-02-20 10:34:51 +01001926 if (!ret)
Jens Axboeaadd06e2006-07-10 11:00:01 +02001927 ret = link_pipe(ipipe, opipe, len, flags);
Jens Axboeaadd06e2006-07-10 11:00:01 +02001928 }
1929 }
Jens Axboe70524492006-04-11 15:51:17 +02001930
Ahelenia ZiemiaƄska576d4982023-07-03 16:42:21 +02001931 if (ret > 0) {
1932 fsnotify_access(in);
1933 fsnotify_modify(out);
1934 }
1935
Jens Axboeaadd06e2006-07-10 11:00:01 +02001936 return ret;
Jens Axboe70524492006-04-11 15:51:17 +02001937}
1938
Heiko Carstens836f92a2009-01-14 14:14:33 +01001939SYSCALL_DEFINE4(tee, int, fdin, int, fdout, size_t, len, unsigned int, flags)
Jens Axboe70524492006-04-11 15:51:17 +02001940{
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001941 struct fd in, out;
Al Viro2903ff02012-08-28 12:52:22 -04001942 int error;
Jens Axboe70524492006-04-11 15:51:17 +02001943
Al Viro3d6ea292016-12-10 13:17:32 -05001944 if (unlikely(flags & ~SPLICE_F_ALL))
1945 return -EINVAL;
1946
Jens Axboe70524492006-04-11 15:51:17 +02001947 if (unlikely(!len))
1948 return 0;
1949
1950 error = -EBADF;
Al Viro2903ff02012-08-28 12:52:22 -04001951 in = fdget(fdin);
1952 if (in.file) {
Pavel Begunkov90da2e32020-05-04 22:39:35 +03001953 out = fdget(fdout);
1954 if (out.file) {
1955 error = do_tee(in.file, out.file, len, flags);
1956 fdput(out);
Jens Axboe70524492006-04-11 15:51:17 +02001957 }
Al Viro2903ff02012-08-28 12:52:22 -04001958 fdput(in);
Jens Axboe70524492006-04-11 15:51:17 +02001959 }
1960
1961 return error;
1962}