~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/net/rxrpc/recvmsg.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0-or-later
  2 /* RxRPC recvmsg() implementation
  3  *
  4  * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  5  * Written by David Howells (dhowells@redhat.com)
  6  */
  7 
  8 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  9 
 10 #include <linux/net.h>
 11 #include <linux/skbuff.h>
 12 #include <linux/export.h>
 13 #include <linux/sched/signal.h>
 14 
 15 #include <net/sock.h>
 16 #include <net/af_rxrpc.h>
 17 #include "ar-internal.h"
 18 
 19 /*
 20  * Post a call for attention by the socket or kernel service.  Further
 21  * notifications are suppressed by putting recvmsg_link on a dummy queue.
 22  */
 23 void rxrpc_notify_socket(struct rxrpc_call *call)
 24 {
 25         struct rxrpc_sock *rx;
 26         struct sock *sk;
 27 
 28         _enter("%d", call->debug_id);
 29 
 30         if (!list_empty(&call->recvmsg_link))
 31                 return;
 32 
 33         rcu_read_lock();
 34 
 35         rx = rcu_dereference(call->socket);
 36         sk = &rx->sk;
 37         if (rx && sk->sk_state < RXRPC_CLOSE) {
 38                 if (call->notify_rx) {
 39                         spin_lock(&call->notify_lock);
 40                         call->notify_rx(sk, call, call->user_call_ID);
 41                         spin_unlock(&call->notify_lock);
 42                 } else {
 43                         spin_lock(&rx->recvmsg_lock);
 44                         if (list_empty(&call->recvmsg_link)) {
 45                                 rxrpc_get_call(call, rxrpc_call_get_notify_socket);
 46                                 list_add_tail(&call->recvmsg_link, &rx->recvmsg_q);
 47                         }
 48                         spin_unlock(&rx->recvmsg_lock);
 49 
 50                         if (!sock_flag(sk, SOCK_DEAD)) {
 51                                 _debug("call %ps", sk->sk_data_ready);
 52                                 sk->sk_data_ready(sk);
 53                         }
 54                 }
 55         }
 56 
 57         rcu_read_unlock();
 58         _leave("");
 59 }
 60 
 61 /*
 62  * Pass a call terminating message to userspace.
 63  */
 64 static int rxrpc_recvmsg_term(struct rxrpc_call *call, struct msghdr *msg)
 65 {
 66         u32 tmp = 0;
 67         int ret;
 68 
 69         switch (call->completion) {
 70         case RXRPC_CALL_SUCCEEDED:
 71                 ret = 0;
 72                 if (rxrpc_is_service_call(call))
 73                         ret = put_cmsg(msg, SOL_RXRPC, RXRPC_ACK, 0, &tmp);
 74                 break;
 75         case RXRPC_CALL_REMOTELY_ABORTED:
 76                 tmp = call->abort_code;
 77                 ret = put_cmsg(msg, SOL_RXRPC, RXRPC_ABORT, 4, &tmp);
 78                 break;
 79         case RXRPC_CALL_LOCALLY_ABORTED:
 80                 tmp = call->abort_code;
 81                 ret = put_cmsg(msg, SOL_RXRPC, RXRPC_ABORT, 4, &tmp);
 82                 break;
 83         case RXRPC_CALL_NETWORK_ERROR:
 84                 tmp = -call->error;
 85                 ret = put_cmsg(msg, SOL_RXRPC, RXRPC_NET_ERROR, 4, &tmp);
 86                 break;
 87         case RXRPC_CALL_LOCAL_ERROR:
 88                 tmp = -call->error;
 89                 ret = put_cmsg(msg, SOL_RXRPC, RXRPC_LOCAL_ERROR, 4, &tmp);
 90                 break;
 91         default:
 92                 pr_err("Invalid terminal call state %u\n", call->completion);
 93                 BUG();
 94                 break;
 95         }
 96 
 97         trace_rxrpc_recvdata(call, rxrpc_recvmsg_terminal,
 98                              call->ackr_window - 1,
 99                              call->rx_pkt_offset, call->rx_pkt_len, ret);
100         return ret;
101 }
102 
103 /*
104  * Discard a packet we've used up and advance the Rx window by one.
105  */
106 static void rxrpc_rotate_rx_window(struct rxrpc_call *call)
107 {
108         struct rxrpc_skb_priv *sp;
109         struct sk_buff *skb;
110         rxrpc_serial_t serial;
111         rxrpc_seq_t old_consumed = call->rx_consumed, tseq;
112         bool last;
113         int acked;
114 
115         _enter("%d", call->debug_id);
116 
117         skb = skb_dequeue(&call->recvmsg_queue);
118         rxrpc_see_skb(skb, rxrpc_skb_see_rotate);
119 
120         sp = rxrpc_skb(skb);
121         tseq   = sp->hdr.seq;
122         serial = sp->hdr.serial;
123         last   = sp->hdr.flags & RXRPC_LAST_PACKET;
124 
125         /* Barrier against rxrpc_input_data(). */
126         if (after(tseq, call->rx_consumed))
127                 smp_store_release(&call->rx_consumed, tseq);
128 
129         rxrpc_free_skb(skb, rxrpc_skb_put_rotate);
130 
131         trace_rxrpc_receive(call, last ? rxrpc_receive_rotate_last : rxrpc_receive_rotate,
132                             serial, call->rx_consumed);
133 
134         if (last)
135                 set_bit(RXRPC_CALL_RECVMSG_READ_ALL, &call->flags);
136 
137         /* Check to see if there's an ACK that needs sending. */
138         acked = atomic_add_return(call->rx_consumed - old_consumed,
139                                   &call->ackr_nr_consumed);
140         if (acked > 8 &&
141             !test_and_set_bit(RXRPC_CALL_RX_IS_IDLE, &call->flags))
142                 rxrpc_poke_call(call, rxrpc_call_poke_idle);
143 }
144 
145 /*
146  * Decrypt and verify a DATA packet.
147  */
148 static int rxrpc_verify_data(struct rxrpc_call *call, struct sk_buff *skb)
149 {
150         struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
151 
152         if (sp->flags & RXRPC_RX_VERIFIED)
153                 return 0;
154         return call->security->verify_packet(call, skb);
155 }
156 
157 /*
158  * Deliver messages to a call.  This keeps processing packets until the buffer
159  * is filled and we find either more DATA (returns 0) or the end of the DATA
160  * (returns 1).  If more packets are required, it returns -EAGAIN and if the
161  * call has failed it returns -EIO.
162  */
163 static int rxrpc_recvmsg_data(struct socket *sock, struct rxrpc_call *call,
164                               struct msghdr *msg, struct iov_iter *iter,
165                               size_t len, int flags, size_t *_offset)
166 {
167         struct rxrpc_skb_priv *sp;
168         struct sk_buff *skb;
169         rxrpc_seq_t seq = 0;
170         size_t remain;
171         unsigned int rx_pkt_offset, rx_pkt_len;
172         int copy, ret = -EAGAIN, ret2;
173 
174         rx_pkt_offset = call->rx_pkt_offset;
175         rx_pkt_len = call->rx_pkt_len;
176 
177         if (rxrpc_call_has_failed(call)) {
178                 seq = call->ackr_window - 1;
179                 ret = -EIO;
180                 goto done;
181         }
182 
183         if (test_bit(RXRPC_CALL_RECVMSG_READ_ALL, &call->flags)) {
184                 seq = call->ackr_window - 1;
185                 ret = 1;
186                 goto done;
187         }
188 
189         /* No one else can be removing stuff from the queue, so we shouldn't
190          * need the Rx lock to walk it.
191          */
192         skb = skb_peek(&call->recvmsg_queue);
193         while (skb) {
194                 rxrpc_see_skb(skb, rxrpc_skb_see_recvmsg);
195                 sp = rxrpc_skb(skb);
196                 seq = sp->hdr.seq;
197 
198                 if (!(flags & MSG_PEEK))
199                         trace_rxrpc_receive(call, rxrpc_receive_front,
200                                             sp->hdr.serial, seq);
201 
202                 if (msg)
203                         sock_recv_timestamp(msg, sock->sk, skb);
204 
205                 if (rx_pkt_offset == 0) {
206                         ret2 = rxrpc_verify_data(call, skb);
207                         trace_rxrpc_recvdata(call, rxrpc_recvmsg_next, seq,
208                                              sp->offset, sp->len, ret2);
209                         if (ret2 < 0) {
210                                 kdebug("verify = %d", ret2);
211                                 ret = ret2;
212                                 goto out;
213                         }
214                         rx_pkt_offset = sp->offset;
215                         rx_pkt_len = sp->len;
216                 } else {
217                         trace_rxrpc_recvdata(call, rxrpc_recvmsg_cont, seq,
218                                              rx_pkt_offset, rx_pkt_len, 0);
219                 }
220 
221                 /* We have to handle short, empty and used-up DATA packets. */
222                 remain = len - *_offset;
223                 copy = rx_pkt_len;
224                 if (copy > remain)
225                         copy = remain;
226                 if (copy > 0) {
227                         ret2 = skb_copy_datagram_iter(skb, rx_pkt_offset, iter,
228                                                       copy);
229                         if (ret2 < 0) {
230                                 ret = ret2;
231                                 goto out;
232                         }
233 
234                         /* handle piecemeal consumption of data packets */
235                         rx_pkt_offset += copy;
236                         rx_pkt_len -= copy;
237                         *_offset += copy;
238                 }
239 
240                 if (rx_pkt_len > 0) {
241                         trace_rxrpc_recvdata(call, rxrpc_recvmsg_full, seq,
242                                              rx_pkt_offset, rx_pkt_len, 0);
243                         ASSERTCMP(*_offset, ==, len);
244                         ret = 0;
245                         break;
246                 }
247 
248                 /* The whole packet has been transferred. */
249                 if (sp->hdr.flags & RXRPC_LAST_PACKET)
250                         ret = 1;
251                 rx_pkt_offset = 0;
252                 rx_pkt_len = 0;
253 
254                 skb = skb_peek_next(skb, &call->recvmsg_queue);
255 
256                 if (!(flags & MSG_PEEK))
257                         rxrpc_rotate_rx_window(call);
258         }
259 
260 out:
261         if (!(flags & MSG_PEEK)) {
262                 call->rx_pkt_offset = rx_pkt_offset;
263                 call->rx_pkt_len = rx_pkt_len;
264         }
265 done:
266         trace_rxrpc_recvdata(call, rxrpc_recvmsg_data_return, seq,
267                              rx_pkt_offset, rx_pkt_len, ret);
268         if (ret == -EAGAIN)
269                 set_bit(RXRPC_CALL_RX_IS_IDLE, &call->flags);
270         return ret;
271 }
272 
273 /*
274  * Receive a message from an RxRPC socket
275  * - we need to be careful about two or more threads calling recvmsg
276  *   simultaneously
277  */
278 int rxrpc_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
279                   int flags)
280 {
281         struct rxrpc_call *call;
282         struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
283         struct list_head *l;
284         unsigned int call_debug_id = 0;
285         size_t copied = 0;
286         long timeo;
287         int ret;
288 
289         DEFINE_WAIT(wait);
290 
291         trace_rxrpc_recvmsg(0, rxrpc_recvmsg_enter, 0);
292 
293         if (flags & (MSG_OOB | MSG_TRUNC))
294                 return -EOPNOTSUPP;
295 
296         timeo = sock_rcvtimeo(&rx->sk, flags & MSG_DONTWAIT);
297 
298 try_again:
299         lock_sock(&rx->sk);
300 
301         /* Return immediately if a client socket has no outstanding calls */
302         if (RB_EMPTY_ROOT(&rx->calls) &&
303             list_empty(&rx->recvmsg_q) &&
304             rx->sk.sk_state != RXRPC_SERVER_LISTENING) {
305                 release_sock(&rx->sk);
306                 return -EAGAIN;
307         }
308 
309         if (list_empty(&rx->recvmsg_q)) {
310                 ret = -EWOULDBLOCK;
311                 if (timeo == 0) {
312                         call = NULL;
313                         goto error_no_call;
314                 }
315 
316                 release_sock(&rx->sk);
317 
318                 /* Wait for something to happen */
319                 prepare_to_wait_exclusive(sk_sleep(&rx->sk), &wait,
320                                           TASK_INTERRUPTIBLE);
321                 ret = sock_error(&rx->sk);
322                 if (ret)
323                         goto wait_error;
324 
325                 if (list_empty(&rx->recvmsg_q)) {
326                         if (signal_pending(current))
327                                 goto wait_interrupted;
328                         trace_rxrpc_recvmsg(0, rxrpc_recvmsg_wait, 0);
329                         timeo = schedule_timeout(timeo);
330                 }
331                 finish_wait(sk_sleep(&rx->sk), &wait);
332                 goto try_again;
333         }
334 
335         /* Find the next call and dequeue it if we're not just peeking.  If we
336          * do dequeue it, that comes with a ref that we will need to release.
337          * We also want to weed out calls that got requeued whilst we were
338          * shovelling data out.
339          */
340         spin_lock(&rx->recvmsg_lock);
341         l = rx->recvmsg_q.next;
342         call = list_entry(l, struct rxrpc_call, recvmsg_link);
343 
344         if (!rxrpc_call_is_complete(call) &&
345             skb_queue_empty(&call->recvmsg_queue)) {
346                 list_del_init(&call->recvmsg_link);
347                 spin_unlock(&rx->recvmsg_lock);
348                 release_sock(&rx->sk);
349                 trace_rxrpc_recvmsg(call->debug_id, rxrpc_recvmsg_unqueue, 0);
350                 rxrpc_put_call(call, rxrpc_call_put_recvmsg);
351                 goto try_again;
352         }
353 
354         if (!(flags & MSG_PEEK))
355                 list_del_init(&call->recvmsg_link);
356         else
357                 rxrpc_get_call(call, rxrpc_call_get_recvmsg);
358         spin_unlock(&rx->recvmsg_lock);
359 
360         call_debug_id = call->debug_id;
361         trace_rxrpc_recvmsg(call_debug_id, rxrpc_recvmsg_dequeue, 0);
362 
363         /* We're going to drop the socket lock, so we need to lock the call
364          * against interference by sendmsg.
365          */
366         if (!mutex_trylock(&call->user_mutex)) {
367                 ret = -EWOULDBLOCK;
368                 if (flags & MSG_DONTWAIT)
369                         goto error_requeue_call;
370                 ret = -ERESTARTSYS;
371                 if (mutex_lock_interruptible(&call->user_mutex) < 0)
372                         goto error_requeue_call;
373         }
374 
375         release_sock(&rx->sk);
376 
377         if (test_bit(RXRPC_CALL_RELEASED, &call->flags))
378                 BUG();
379 
380         if (test_bit(RXRPC_CALL_HAS_USERID, &call->flags)) {
381                 if (flags & MSG_CMSG_COMPAT) {
382                         unsigned int id32 = call->user_call_ID;
383 
384                         ret = put_cmsg(msg, SOL_RXRPC, RXRPC_USER_CALL_ID,
385                                        sizeof(unsigned int), &id32);
386                 } else {
387                         unsigned long idl = call->user_call_ID;
388 
389                         ret = put_cmsg(msg, SOL_RXRPC, RXRPC_USER_CALL_ID,
390                                        sizeof(unsigned long), &idl);
391                 }
392                 if (ret < 0)
393                         goto error_unlock_call;
394         }
395 
396         if (msg->msg_name && call->peer) {
397                 size_t len = sizeof(call->dest_srx);
398 
399                 memcpy(msg->msg_name, &call->dest_srx, len);
400                 msg->msg_namelen = len;
401         }
402 
403         ret = rxrpc_recvmsg_data(sock, call, msg, &msg->msg_iter, len,
404                                  flags, &copied);
405         if (ret == -EAGAIN)
406                 ret = 0;
407         if (ret == -EIO)
408                 goto call_failed;
409         if (ret < 0)
410                 goto error_unlock_call;
411 
412         if (rxrpc_call_is_complete(call) &&
413             skb_queue_empty(&call->recvmsg_queue))
414                 goto call_complete;
415         if (rxrpc_call_has_failed(call))
416                 goto call_failed;
417 
418         if (!skb_queue_empty(&call->recvmsg_queue))
419                 rxrpc_notify_socket(call);
420         goto not_yet_complete;
421 
422 call_failed:
423         rxrpc_purge_queue(&call->recvmsg_queue);
424 call_complete:
425         ret = rxrpc_recvmsg_term(call, msg);
426         if (ret < 0)
427                 goto error_unlock_call;
428         if (!(flags & MSG_PEEK))
429                 rxrpc_release_call(rx, call);
430         msg->msg_flags |= MSG_EOR;
431         ret = 1;
432 
433 not_yet_complete:
434         if (ret == 0)
435                 msg->msg_flags |= MSG_MORE;
436         else
437                 msg->msg_flags &= ~MSG_MORE;
438         ret = copied;
439 
440 error_unlock_call:
441         mutex_unlock(&call->user_mutex);
442         rxrpc_put_call(call, rxrpc_call_put_recvmsg);
443         trace_rxrpc_recvmsg(call_debug_id, rxrpc_recvmsg_return, ret);
444         return ret;
445 
446 error_requeue_call:
447         if (!(flags & MSG_PEEK)) {
448                 spin_lock(&rx->recvmsg_lock);
449                 list_add(&call->recvmsg_link, &rx->recvmsg_q);
450                 spin_unlock(&rx->recvmsg_lock);
451                 trace_rxrpc_recvmsg(call_debug_id, rxrpc_recvmsg_requeue, 0);
452         } else {
453                 rxrpc_put_call(call, rxrpc_call_put_recvmsg);
454         }
455 error_no_call:
456         release_sock(&rx->sk);
457 error_trace:
458         trace_rxrpc_recvmsg(call_debug_id, rxrpc_recvmsg_return, ret);
459         return ret;
460 
461 wait_interrupted:
462         ret = sock_intr_errno(timeo);
463 wait_error:
464         finish_wait(sk_sleep(&rx->sk), &wait);
465         call = NULL;
466         goto error_trace;
467 }
468 
469 /**
470  * rxrpc_kernel_recv_data - Allow a kernel service to receive data/info
471  * @sock: The socket that the call exists on
472  * @call: The call to send data through
473  * @iter: The buffer to receive into
474  * @_len: The amount of data we want to receive (decreased on return)
475  * @want_more: True if more data is expected to be read
476  * @_abort: Where the abort code is stored if -ECONNABORTED is returned
477  * @_service: Where to store the actual service ID (may be upgraded)
478  *
479  * Allow a kernel service to receive data and pick up information about the
480  * state of a call.  Returns 0 if got what was asked for and there's more
481  * available, 1 if we got what was asked for and we're at the end of the data
482  * and -EAGAIN if we need more data.
483  *
484  * Note that we may return -EAGAIN to drain empty packets at the end of the
485  * data, even if we've already copied over the requested data.
486  *
487  * *_abort should also be initialised to 0.
488  */
489 int rxrpc_kernel_recv_data(struct socket *sock, struct rxrpc_call *call,
490                            struct iov_iter *iter, size_t *_len,
491                            bool want_more, u32 *_abort, u16 *_service)
492 {
493         size_t offset = 0;
494         int ret;
495 
496         _enter("{%d},%zu,%d", call->debug_id, *_len, want_more);
497 
498         mutex_lock(&call->user_mutex);
499 
500         ret = rxrpc_recvmsg_data(sock, call, NULL, iter, *_len, 0, &offset);
501         *_len -= offset;
502         if (ret == -EIO)
503                 goto call_failed;
504         if (ret < 0)
505                 goto out;
506 
507         /* We can only reach here with a partially full buffer if we have
508          * reached the end of the data.  We must otherwise have a full buffer
509          * or have been given -EAGAIN.
510          */
511         if (ret == 1) {
512                 if (iov_iter_count(iter) > 0)
513                         goto short_data;
514                 if (!want_more)
515                         goto read_phase_complete;
516                 ret = 0;
517                 goto out;
518         }
519 
520         if (!want_more)
521                 goto excess_data;
522         goto out;
523 
524 read_phase_complete:
525         ret = 1;
526 out:
527         if (_service)
528                 *_service = call->dest_srx.srx_service;
529         mutex_unlock(&call->user_mutex);
530         _leave(" = %d [%zu,%d]", ret, iov_iter_count(iter), *_abort);
531         return ret;
532 
533 short_data:
534         trace_rxrpc_abort(call->debug_id, rxrpc_recvmsg_short_data,
535                           call->cid, call->call_id, call->rx_consumed,
536                           0, -EBADMSG);
537         ret = -EBADMSG;
538         goto out;
539 excess_data:
540         trace_rxrpc_abort(call->debug_id, rxrpc_recvmsg_excess_data,
541                           call->cid, call->call_id, call->rx_consumed,
542                           0, -EMSGSIZE);
543         ret = -EMSGSIZE;
544         goto out;
545 call_failed:
546         *_abort = call->abort_code;
547         ret = call->error;
548         if (call->completion == RXRPC_CALL_SUCCEEDED) {
549                 ret = 1;
550                 if (iov_iter_count(iter) > 0)
551                         ret = -ECONNRESET;
552         }
553         goto out;
554 }
555 EXPORT_SYMBOL(rxrpc_kernel_recv_data);
556 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php