pep.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105
  1. /*
  2. * File: pep.c
  3. *
  4. * Phonet pipe protocol end point socket
  5. *
  6. * Copyright (C) 2008 Nokia Corporation.
  7. *
  8. * Author: Rémi Denis-Courmont <remi.denis-courmont@nokia.com>
  9. *
  10. * This program is free software; you can redistribute it and/or
  11. * modify it under the terms of the GNU General Public License
  12. * version 2 as published by the Free Software Foundation.
  13. *
  14. * This program is distributed in the hope that it will be useful, but
  15. * WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  17. * General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU General Public License
  20. * along with this program; if not, write to the Free Software
  21. * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
  22. * 02110-1301 USA
  23. */
  24. #include <linux/kernel.h>
  25. #include <linux/slab.h>
  26. #include <linux/socket.h>
  27. #include <net/sock.h>
  28. #include <net/tcp_states.h>
  29. #include <asm/ioctls.h>
  30. #include <linux/phonet.h>
  31. #include <net/phonet/phonet.h>
  32. #include <net/phonet/pep.h>
  33. #include <net/phonet/gprs.h>
  34. /* sk_state values:
  35. * TCP_CLOSE sock not in use yet
  36. * TCP_CLOSE_WAIT disconnected pipe
  37. * TCP_LISTEN listening pipe endpoint
  38. * TCP_SYN_RECV connected pipe in disabled state
  39. * TCP_ESTABLISHED connected pipe in enabled state
  40. *
  41. * pep_sock locking:
  42. * - sk_state, ackq, hlist: sock lock needed
  43. * - listener: read only
  44. * - pipe_handle: read only
  45. */
  46. #define CREDITS_MAX 10
  47. #define CREDITS_THR 7
  48. static const struct sockaddr_pn pipe_srv = {
  49. .spn_family = AF_PHONET,
  50. .spn_resource = 0xD9, /* pipe service */
  51. };
  52. #define pep_sb_size(s) (((s) + 5) & ~3) /* 2-bytes head, 32-bits aligned */
  53. /* Get the next TLV sub-block. */
  54. static unsigned char *pep_get_sb(struct sk_buff *skb, u8 *ptype, u8 *plen,
  55. void *buf)
  56. {
  57. void *data = NULL;
  58. struct {
  59. u8 sb_type;
  60. u8 sb_len;
  61. } *ph, h;
  62. int buflen = *plen;
  63. ph = skb_header_pointer(skb, 0, 2, &h);
  64. if (ph == NULL || ph->sb_len < 2 || !pskb_may_pull(skb, ph->sb_len))
  65. return NULL;
  66. ph->sb_len -= 2;
  67. *ptype = ph->sb_type;
  68. *plen = ph->sb_len;
  69. if (buflen > ph->sb_len)
  70. buflen = ph->sb_len;
  71. data = skb_header_pointer(skb, 2, buflen, buf);
  72. __skb_pull(skb, 2 + ph->sb_len);
  73. return data;
  74. }
  75. static int pep_reply(struct sock *sk, struct sk_buff *oskb,
  76. u8 code, const void *data, int len, gfp_t priority)
  77. {
  78. const struct pnpipehdr *oph = pnp_hdr(oskb);
  79. struct pnpipehdr *ph;
  80. struct sk_buff *skb;
  81. skb = alloc_skb(MAX_PNPIPE_HEADER + len, priority);
  82. if (!skb)
  83. return -ENOMEM;
  84. skb_set_owner_w(skb, sk);
  85. skb_reserve(skb, MAX_PNPIPE_HEADER);
  86. __skb_put(skb, len);
  87. skb_copy_to_linear_data(skb, data, len);
  88. __skb_push(skb, sizeof(*ph));
  89. skb_reset_transport_header(skb);
  90. ph = pnp_hdr(skb);
  91. ph->utid = oph->utid;
  92. ph->message_id = oph->message_id + 1; /* REQ -> RESP */
  93. ph->pipe_handle = oph->pipe_handle;
  94. ph->error_code = code;
  95. return pn_skb_send(sk, skb, &pipe_srv);
  96. }
  97. #define PAD 0x00
  98. static int pep_accept_conn(struct sock *sk, struct sk_buff *skb)
  99. {
  100. static const u8 data[20] = {
  101. PAD, PAD, PAD, 2 /* sub-blocks */,
  102. PN_PIPE_SB_REQUIRED_FC_TX, pep_sb_size(5), 3, PAD,
  103. PN_MULTI_CREDIT_FLOW_CONTROL,
  104. PN_ONE_CREDIT_FLOW_CONTROL,
  105. PN_LEGACY_FLOW_CONTROL,
  106. PAD,
  107. PN_PIPE_SB_PREFERRED_FC_RX, pep_sb_size(5), 3, PAD,
  108. PN_MULTI_CREDIT_FLOW_CONTROL,
  109. PN_ONE_CREDIT_FLOW_CONTROL,
  110. PN_LEGACY_FLOW_CONTROL,
  111. PAD,
  112. };
  113. might_sleep();
  114. return pep_reply(sk, skb, PN_PIPE_NO_ERROR, data, sizeof(data),
  115. GFP_KERNEL);
  116. }
  117. static int pep_reject_conn(struct sock *sk, struct sk_buff *skb, u8 code)
  118. {
  119. static const u8 data[4] = { PAD, PAD, PAD, 0 /* sub-blocks */ };
  120. WARN_ON(code == PN_PIPE_NO_ERROR);
  121. return pep_reply(sk, skb, code, data, sizeof(data), GFP_ATOMIC);
  122. }
  123. /* Control requests are not sent by the pipe service and have a specific
  124. * message format. */
  125. static int pep_ctrlreq_error(struct sock *sk, struct sk_buff *oskb, u8 code,
  126. gfp_t priority)
  127. {
  128. const struct pnpipehdr *oph = pnp_hdr(oskb);
  129. struct sk_buff *skb;
  130. struct pnpipehdr *ph;
  131. struct sockaddr_pn dst;
  132. skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
  133. if (!skb)
  134. return -ENOMEM;
  135. skb_set_owner_w(skb, sk);
  136. skb_reserve(skb, MAX_PHONET_HEADER);
  137. ph = (struct pnpipehdr *)skb_put(skb, sizeof(*ph) + 4);
  138. ph->utid = oph->utid;
  139. ph->message_id = PNS_PEP_CTRL_RESP;
  140. ph->pipe_handle = oph->pipe_handle;
  141. ph->data[0] = oph->data[1]; /* CTRL id */
  142. ph->data[1] = oph->data[0]; /* PEP type */
  143. ph->data[2] = code; /* error code, at an usual offset */
  144. ph->data[3] = PAD;
  145. ph->data[4] = PAD;
  146. pn_skb_get_src_sockaddr(oskb, &dst);
  147. return pn_skb_send(sk, skb, &dst);
  148. }
  149. static int pipe_snd_status(struct sock *sk, u8 type, u8 status, gfp_t priority)
  150. {
  151. struct pep_sock *pn = pep_sk(sk);
  152. struct pnpipehdr *ph;
  153. struct sk_buff *skb;
  154. skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
  155. if (!skb)
  156. return -ENOMEM;
  157. skb_set_owner_w(skb, sk);
  158. skb_reserve(skb, MAX_PNPIPE_HEADER + 4);
  159. __skb_push(skb, sizeof(*ph) + 4);
  160. skb_reset_transport_header(skb);
  161. ph = pnp_hdr(skb);
  162. ph->utid = 0;
  163. ph->message_id = PNS_PEP_STATUS_IND;
  164. ph->pipe_handle = pn->pipe_handle;
  165. ph->pep_type = PN_PEP_TYPE_COMMON;
  166. ph->data[1] = type;
  167. ph->data[2] = PAD;
  168. ph->data[3] = PAD;
  169. ph->data[4] = status;
  170. return pn_skb_send(sk, skb, &pipe_srv);
  171. }
  172. /* Send our RX flow control information to the sender.
  173. * Socket must be locked. */
  174. static void pipe_grant_credits(struct sock *sk)
  175. {
  176. struct pep_sock *pn = pep_sk(sk);
  177. BUG_ON(sk->sk_state != TCP_ESTABLISHED);
  178. switch (pn->rx_fc) {
  179. case PN_LEGACY_FLOW_CONTROL: /* TODO */
  180. break;
  181. case PN_ONE_CREDIT_FLOW_CONTROL:
  182. pipe_snd_status(sk, PN_PEP_IND_FLOW_CONTROL,
  183. PEP_IND_READY, GFP_ATOMIC);
  184. pn->rx_credits = 1;
  185. break;
  186. case PN_MULTI_CREDIT_FLOW_CONTROL:
  187. if ((pn->rx_credits + CREDITS_THR) > CREDITS_MAX)
  188. break;
  189. if (pipe_snd_status(sk, PN_PEP_IND_ID_MCFC_GRANT_CREDITS,
  190. CREDITS_MAX - pn->rx_credits,
  191. GFP_ATOMIC) == 0)
  192. pn->rx_credits = CREDITS_MAX;
  193. break;
  194. }
  195. }
  196. static int pipe_rcv_status(struct sock *sk, struct sk_buff *skb)
  197. {
  198. struct pep_sock *pn = pep_sk(sk);
  199. struct pnpipehdr *hdr = pnp_hdr(skb);
  200. int wake = 0;
  201. if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
  202. return -EINVAL;
  203. if (hdr->data[0] != PN_PEP_TYPE_COMMON) {
  204. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP type: %u\n",
  205. (unsigned)hdr->data[0]);
  206. return -EOPNOTSUPP;
  207. }
  208. switch (hdr->data[1]) {
  209. case PN_PEP_IND_FLOW_CONTROL:
  210. switch (pn->tx_fc) {
  211. case PN_LEGACY_FLOW_CONTROL:
  212. switch (hdr->data[4]) {
  213. case PEP_IND_BUSY:
  214. atomic_set(&pn->tx_credits, 0);
  215. break;
  216. case PEP_IND_READY:
  217. atomic_set(&pn->tx_credits, wake = 1);
  218. break;
  219. }
  220. break;
  221. case PN_ONE_CREDIT_FLOW_CONTROL:
  222. if (hdr->data[4] == PEP_IND_READY)
  223. atomic_set(&pn->tx_credits, wake = 1);
  224. break;
  225. }
  226. break;
  227. case PN_PEP_IND_ID_MCFC_GRANT_CREDITS:
  228. if (pn->tx_fc != PN_MULTI_CREDIT_FLOW_CONTROL)
  229. break;
  230. atomic_add(wake = hdr->data[4], &pn->tx_credits);
  231. break;
  232. default:
  233. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP indication: %u\n",
  234. (unsigned)hdr->data[1]);
  235. return -EOPNOTSUPP;
  236. }
  237. if (wake)
  238. sk->sk_write_space(sk);
  239. return 0;
  240. }
  241. static int pipe_rcv_created(struct sock *sk, struct sk_buff *skb)
  242. {
  243. struct pep_sock *pn = pep_sk(sk);
  244. struct pnpipehdr *hdr = pnp_hdr(skb);
  245. u8 n_sb = hdr->data[0];
  246. pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
  247. __skb_pull(skb, sizeof(*hdr));
  248. while (n_sb > 0) {
  249. u8 type, buf[2], len = sizeof(buf);
  250. u8 *data = pep_get_sb(skb, &type, &len, buf);
  251. if (data == NULL)
  252. return -EINVAL;
  253. switch (type) {
  254. case PN_PIPE_SB_NEGOTIATED_FC:
  255. if (len < 2 || (data[0] | data[1]) > 3)
  256. break;
  257. pn->tx_fc = data[0] & 3;
  258. pn->rx_fc = data[1] & 3;
  259. break;
  260. }
  261. n_sb--;
  262. }
  263. return 0;
  264. }
  265. /* Queue an skb to a connected sock.
  266. * Socket lock must be held. */
  267. static int pipe_do_rcv(struct sock *sk, struct sk_buff *skb)
  268. {
  269. struct pep_sock *pn = pep_sk(sk);
  270. struct pnpipehdr *hdr = pnp_hdr(skb);
  271. struct sk_buff_head *queue;
  272. int err = 0;
  273. BUG_ON(sk->sk_state == TCP_CLOSE_WAIT);
  274. switch (hdr->message_id) {
  275. case PNS_PEP_CONNECT_REQ:
  276. pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
  277. break;
  278. case PNS_PEP_DISCONNECT_REQ:
  279. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  280. sk->sk_state = TCP_CLOSE_WAIT;
  281. if (!sock_flag(sk, SOCK_DEAD))
  282. sk->sk_state_change(sk);
  283. break;
  284. case PNS_PEP_ENABLE_REQ:
  285. /* Wait for PNS_PIPE_(ENABLED|REDIRECTED)_IND */
  286. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  287. break;
  288. case PNS_PEP_RESET_REQ:
  289. switch (hdr->state_after_reset) {
  290. case PN_PIPE_DISABLE:
  291. pn->init_enable = 0;
  292. break;
  293. case PN_PIPE_ENABLE:
  294. pn->init_enable = 1;
  295. break;
  296. default: /* not allowed to send an error here!? */
  297. err = -EINVAL;
  298. goto out;
  299. }
  300. /* fall through */
  301. case PNS_PEP_DISABLE_REQ:
  302. atomic_set(&pn->tx_credits, 0);
  303. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  304. break;
  305. case PNS_PEP_CTRL_REQ:
  306. if (skb_queue_len(&pn->ctrlreq_queue) >= PNPIPE_CTRLREQ_MAX) {
  307. atomic_inc(&sk->sk_drops);
  308. break;
  309. }
  310. __skb_pull(skb, 4);
  311. queue = &pn->ctrlreq_queue;
  312. goto queue;
  313. case PNS_PIPE_ALIGNED_DATA:
  314. __skb_pull(skb, 1);
  315. /* fall through */
  316. case PNS_PIPE_DATA:
  317. __skb_pull(skb, 3); /* Pipe data header */
  318. if (!pn_flow_safe(pn->rx_fc)) {
  319. err = sock_queue_rcv_skb(sk, skb);
  320. if (!err)
  321. return 0;
  322. break;
  323. }
  324. if (pn->rx_credits == 0) {
  325. atomic_inc(&sk->sk_drops);
  326. err = -ENOBUFS;
  327. break;
  328. }
  329. pn->rx_credits--;
  330. queue = &sk->sk_receive_queue;
  331. goto queue;
  332. case PNS_PEP_STATUS_IND:
  333. pipe_rcv_status(sk, skb);
  334. break;
  335. case PNS_PIPE_REDIRECTED_IND:
  336. err = pipe_rcv_created(sk, skb);
  337. break;
  338. case PNS_PIPE_CREATED_IND:
  339. err = pipe_rcv_created(sk, skb);
  340. if (err)
  341. break;
  342. /* fall through */
  343. case PNS_PIPE_RESET_IND:
  344. if (!pn->init_enable)
  345. break;
  346. /* fall through */
  347. case PNS_PIPE_ENABLED_IND:
  348. if (!pn_flow_safe(pn->tx_fc)) {
  349. atomic_set(&pn->tx_credits, 1);
  350. sk->sk_write_space(sk);
  351. }
  352. if (sk->sk_state == TCP_ESTABLISHED)
  353. break; /* Nothing to do */
  354. sk->sk_state = TCP_ESTABLISHED;
  355. pipe_grant_credits(sk);
  356. break;
  357. case PNS_PIPE_DISABLED_IND:
  358. sk->sk_state = TCP_SYN_RECV;
  359. pn->rx_credits = 0;
  360. break;
  361. default:
  362. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP message: %u\n",
  363. hdr->message_id);
  364. err = -EINVAL;
  365. }
  366. out:
  367. kfree_skb(skb);
  368. return err;
  369. queue:
  370. skb->dev = NULL;
  371. skb_set_owner_r(skb, sk);
  372. err = skb->len;
  373. skb_queue_tail(queue, skb);
  374. if (!sock_flag(sk, SOCK_DEAD))
  375. sk->sk_data_ready(sk, err);
  376. return 0;
  377. }
  378. /* Destroy connected sock. */
  379. static void pipe_destruct(struct sock *sk)
  380. {
  381. struct pep_sock *pn = pep_sk(sk);
  382. skb_queue_purge(&sk->sk_receive_queue);
  383. skb_queue_purge(&pn->ctrlreq_queue);
  384. }
  385. static int pep_connreq_rcv(struct sock *sk, struct sk_buff *skb)
  386. {
  387. struct sock *newsk;
  388. struct pep_sock *newpn, *pn = pep_sk(sk);
  389. struct pnpipehdr *hdr;
  390. struct sockaddr_pn dst;
  391. u16 peer_type;
  392. u8 pipe_handle, enabled, n_sb;
  393. u8 aligned = 0;
  394. if (!pskb_pull(skb, sizeof(*hdr) + 4))
  395. return -EINVAL;
  396. hdr = pnp_hdr(skb);
  397. pipe_handle = hdr->pipe_handle;
  398. switch (hdr->state_after_connect) {
  399. case PN_PIPE_DISABLE:
  400. enabled = 0;
  401. break;
  402. case PN_PIPE_ENABLE:
  403. enabled = 1;
  404. break;
  405. default:
  406. pep_reject_conn(sk, skb, PN_PIPE_ERR_INVALID_PARAM);
  407. return -EINVAL;
  408. }
  409. peer_type = hdr->other_pep_type << 8;
  410. if (unlikely(sk->sk_state != TCP_LISTEN) || sk_acceptq_is_full(sk)) {
  411. pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
  412. return -ENOBUFS;
  413. }
  414. /* Parse sub-blocks (options) */
  415. n_sb = hdr->data[4];
  416. while (n_sb > 0) {
  417. u8 type, buf[1], len = sizeof(buf);
  418. const u8 *data = pep_get_sb(skb, &type, &len, buf);
  419. if (data == NULL)
  420. return -EINVAL;
  421. switch (type) {
  422. case PN_PIPE_SB_CONNECT_REQ_PEP_SUB_TYPE:
  423. if (len < 1)
  424. return -EINVAL;
  425. peer_type = (peer_type & 0xff00) | data[0];
  426. break;
  427. case PN_PIPE_SB_ALIGNED_DATA:
  428. aligned = data[0] != 0;
  429. break;
  430. }
  431. n_sb--;
  432. }
  433. skb = skb_clone(skb, GFP_ATOMIC);
  434. if (!skb)
  435. return -ENOMEM;
  436. /* Create a new to-be-accepted sock */
  437. newsk = sk_alloc(sock_net(sk), PF_PHONET, GFP_ATOMIC, sk->sk_prot);
  438. if (!newsk) {
  439. kfree_skb(skb);
  440. return -ENOMEM;
  441. }
  442. sock_init_data(NULL, newsk);
  443. newsk->sk_state = TCP_SYN_RECV;
  444. newsk->sk_backlog_rcv = pipe_do_rcv;
  445. newsk->sk_protocol = sk->sk_protocol;
  446. newsk->sk_destruct = pipe_destruct;
  447. newpn = pep_sk(newsk);
  448. pn_skb_get_dst_sockaddr(skb, &dst);
  449. newpn->pn_sk.sobject = pn_sockaddr_get_object(&dst);
  450. newpn->pn_sk.resource = pn->pn_sk.resource;
  451. skb_queue_head_init(&newpn->ctrlreq_queue);
  452. newpn->pipe_handle = pipe_handle;
  453. atomic_set(&newpn->tx_credits, 0);
  454. newpn->peer_type = peer_type;
  455. newpn->rx_credits = 0;
  456. newpn->rx_fc = newpn->tx_fc = PN_LEGACY_FLOW_CONTROL;
  457. newpn->init_enable = enabled;
  458. newpn->aligned = aligned;
  459. BUG_ON(!skb_queue_empty(&newsk->sk_receive_queue));
  460. skb_queue_head(&newsk->sk_receive_queue, skb);
  461. if (!sock_flag(sk, SOCK_DEAD))
  462. sk->sk_data_ready(sk, 0);
  463. sk_acceptq_added(sk);
  464. sk_add_node(newsk, &pn->ackq);
  465. return 0;
  466. }
  467. /* Listening sock must be locked */
  468. static struct sock *pep_find_pipe(const struct hlist_head *hlist,
  469. const struct sockaddr_pn *dst,
  470. u8 pipe_handle)
  471. {
  472. struct hlist_node *node;
  473. struct sock *sknode;
  474. u16 dobj = pn_sockaddr_get_object(dst);
  475. sk_for_each(sknode, node, hlist) {
  476. struct pep_sock *pnnode = pep_sk(sknode);
  477. /* Ports match, but addresses might not: */
  478. if (pnnode->pn_sk.sobject != dobj)
  479. continue;
  480. if (pnnode->pipe_handle != pipe_handle)
  481. continue;
  482. if (sknode->sk_state == TCP_CLOSE_WAIT)
  483. continue;
  484. sock_hold(sknode);
  485. return sknode;
  486. }
  487. return NULL;
  488. }
  489. /*
  490. * Deliver an skb to a listening sock.
  491. * Socket lock must be held.
  492. * We then queue the skb to the right connected sock (if any).
  493. */
  494. static int pep_do_rcv(struct sock *sk, struct sk_buff *skb)
  495. {
  496. struct pep_sock *pn = pep_sk(sk);
  497. struct sock *sknode;
  498. struct pnpipehdr *hdr;
  499. struct sockaddr_pn dst;
  500. int err = NET_RX_SUCCESS;
  501. u8 pipe_handle;
  502. if (!pskb_may_pull(skb, sizeof(*hdr)))
  503. goto drop;
  504. hdr = pnp_hdr(skb);
  505. pipe_handle = hdr->pipe_handle;
  506. if (pipe_handle == PN_PIPE_INVALID_HANDLE)
  507. goto drop;
  508. pn_skb_get_dst_sockaddr(skb, &dst);
  509. /* Look for an existing pipe handle */
  510. sknode = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
  511. if (sknode)
  512. return sk_receive_skb(sknode, skb, 1);
  513. /* Look for a pipe handle pending accept */
  514. sknode = pep_find_pipe(&pn->ackq, &dst, pipe_handle);
  515. if (sknode) {
  516. sock_put(sknode);
  517. if (net_ratelimit())
  518. printk(KERN_WARNING"Phonet unconnected PEP ignored");
  519. err = NET_RX_DROP;
  520. goto drop;
  521. }
  522. switch (hdr->message_id) {
  523. case PNS_PEP_CONNECT_REQ:
  524. err = pep_connreq_rcv(sk, skb);
  525. break;
  526. case PNS_PEP_DISCONNECT_REQ:
  527. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  528. break;
  529. case PNS_PEP_CTRL_REQ:
  530. pep_ctrlreq_error(sk, skb, PN_PIPE_INVALID_HANDLE, GFP_ATOMIC);
  531. break;
  532. case PNS_PEP_RESET_REQ:
  533. case PNS_PEP_ENABLE_REQ:
  534. case PNS_PEP_DISABLE_REQ:
  535. /* invalid handle is not even allowed here! */
  536. default:
  537. err = NET_RX_DROP;
  538. }
  539. drop:
  540. kfree_skb(skb);
  541. return err;
  542. }
  543. /* associated socket ceases to exist */
  544. static void pep_sock_close(struct sock *sk, long timeout)
  545. {
  546. struct pep_sock *pn = pep_sk(sk);
  547. int ifindex = 0;
  548. sock_hold(sk); /* keep a reference after sk_common_release() */
  549. sk_common_release(sk);
  550. lock_sock(sk);
  551. if (sk->sk_state == TCP_LISTEN) {
  552. /* Destroy the listen queue */
  553. struct sock *sknode;
  554. struct hlist_node *p, *n;
  555. sk_for_each_safe(sknode, p, n, &pn->ackq)
  556. sk_del_node_init(sknode);
  557. sk->sk_state = TCP_CLOSE;
  558. }
  559. ifindex = pn->ifindex;
  560. pn->ifindex = 0;
  561. release_sock(sk);
  562. if (ifindex)
  563. gprs_detach(sk);
  564. sock_put(sk);
  565. }
  566. static int pep_wait_connreq(struct sock *sk, int noblock)
  567. {
  568. struct task_struct *tsk = current;
  569. struct pep_sock *pn = pep_sk(sk);
  570. long timeo = sock_rcvtimeo(sk, noblock);
  571. for (;;) {
  572. DEFINE_WAIT(wait);
  573. if (sk->sk_state != TCP_LISTEN)
  574. return -EINVAL;
  575. if (!hlist_empty(&pn->ackq))
  576. break;
  577. if (!timeo)
  578. return -EWOULDBLOCK;
  579. if (signal_pending(tsk))
  580. return sock_intr_errno(timeo);
  581. prepare_to_wait_exclusive(sk_sleep(sk), &wait,
  582. TASK_INTERRUPTIBLE);
  583. release_sock(sk);
  584. timeo = schedule_timeout(timeo);
  585. lock_sock(sk);
  586. finish_wait(sk_sleep(sk), &wait);
  587. }
  588. return 0;
  589. }
  590. static struct sock *pep_sock_accept(struct sock *sk, int flags, int *errp)
  591. {
  592. struct pep_sock *pn = pep_sk(sk);
  593. struct sock *newsk = NULL;
  594. struct sk_buff *oskb;
  595. int err;
  596. lock_sock(sk);
  597. err = pep_wait_connreq(sk, flags & O_NONBLOCK);
  598. if (err)
  599. goto out;
  600. newsk = __sk_head(&pn->ackq);
  601. oskb = skb_dequeue(&newsk->sk_receive_queue);
  602. err = pep_accept_conn(newsk, oskb);
  603. if (err) {
  604. skb_queue_head(&newsk->sk_receive_queue, oskb);
  605. newsk = NULL;
  606. goto out;
  607. }
  608. kfree_skb(oskb);
  609. sock_hold(sk);
  610. pep_sk(newsk)->listener = sk;
  611. sock_hold(newsk);
  612. sk_del_node_init(newsk);
  613. sk_acceptq_removed(sk);
  614. sk_add_node(newsk, &pn->hlist);
  615. __sock_put(newsk);
  616. out:
  617. release_sock(sk);
  618. *errp = err;
  619. return newsk;
  620. }
  621. static int pep_ioctl(struct sock *sk, int cmd, unsigned long arg)
  622. {
  623. struct pep_sock *pn = pep_sk(sk);
  624. int answ;
  625. switch (cmd) {
  626. case SIOCINQ:
  627. if (sk->sk_state == TCP_LISTEN)
  628. return -EINVAL;
  629. lock_sock(sk);
  630. if (sock_flag(sk, SOCK_URGINLINE) &&
  631. !skb_queue_empty(&pn->ctrlreq_queue))
  632. answ = skb_peek(&pn->ctrlreq_queue)->len;
  633. else if (!skb_queue_empty(&sk->sk_receive_queue))
  634. answ = skb_peek(&sk->sk_receive_queue)->len;
  635. else
  636. answ = 0;
  637. release_sock(sk);
  638. return put_user(answ, (int __user *)arg);
  639. }
  640. return -ENOIOCTLCMD;
  641. }
  642. static int pep_init(struct sock *sk)
  643. {
  644. struct pep_sock *pn = pep_sk(sk);
  645. INIT_HLIST_HEAD(&pn->ackq);
  646. INIT_HLIST_HEAD(&pn->hlist);
  647. skb_queue_head_init(&pn->ctrlreq_queue);
  648. pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
  649. return 0;
  650. }
  651. static int pep_setsockopt(struct sock *sk, int level, int optname,
  652. char __user *optval, unsigned int optlen)
  653. {
  654. struct pep_sock *pn = pep_sk(sk);
  655. int val = 0, err = 0;
  656. if (level != SOL_PNPIPE)
  657. return -ENOPROTOOPT;
  658. if (optlen >= sizeof(int)) {
  659. if (get_user(val, (int __user *) optval))
  660. return -EFAULT;
  661. }
  662. lock_sock(sk);
  663. switch (optname) {
  664. case PNPIPE_ENCAP:
  665. if (val && val != PNPIPE_ENCAP_IP) {
  666. err = -EINVAL;
  667. break;
  668. }
  669. if (!pn->ifindex == !val)
  670. break; /* Nothing to do! */
  671. if (!capable(CAP_NET_ADMIN)) {
  672. err = -EPERM;
  673. break;
  674. }
  675. if (val) {
  676. release_sock(sk);
  677. err = gprs_attach(sk);
  678. if (err > 0) {
  679. pn->ifindex = err;
  680. err = 0;
  681. }
  682. } else {
  683. pn->ifindex = 0;
  684. release_sock(sk);
  685. gprs_detach(sk);
  686. err = 0;
  687. }
  688. goto out_norel;
  689. default:
  690. err = -ENOPROTOOPT;
  691. }
  692. release_sock(sk);
  693. out_norel:
  694. return err;
  695. }
  696. static int pep_getsockopt(struct sock *sk, int level, int optname,
  697. char __user *optval, int __user *optlen)
  698. {
  699. struct pep_sock *pn = pep_sk(sk);
  700. int len, val;
  701. if (level != SOL_PNPIPE)
  702. return -ENOPROTOOPT;
  703. if (get_user(len, optlen))
  704. return -EFAULT;
  705. switch (optname) {
  706. case PNPIPE_ENCAP:
  707. val = pn->ifindex ? PNPIPE_ENCAP_IP : PNPIPE_ENCAP_NONE;
  708. break;
  709. case PNPIPE_IFINDEX:
  710. val = pn->ifindex;
  711. break;
  712. default:
  713. return -ENOPROTOOPT;
  714. }
  715. len = min_t(unsigned int, sizeof(int), len);
  716. if (put_user(len, optlen))
  717. return -EFAULT;
  718. if (put_user(val, (int __user *) optval))
  719. return -EFAULT;
  720. return 0;
  721. }
  722. static int pipe_skb_send(struct sock *sk, struct sk_buff *skb)
  723. {
  724. struct pep_sock *pn = pep_sk(sk);
  725. struct pnpipehdr *ph;
  726. if (pn_flow_safe(pn->tx_fc) &&
  727. !atomic_add_unless(&pn->tx_credits, -1, 0)) {
  728. kfree_skb(skb);
  729. return -ENOBUFS;
  730. }
  731. skb_push(skb, 3 + pn->aligned);
  732. skb_reset_transport_header(skb);
  733. ph = pnp_hdr(skb);
  734. ph->utid = 0;
  735. if (pn->aligned) {
  736. ph->message_id = PNS_PIPE_ALIGNED_DATA;
  737. ph->data[0] = 0; /* padding */
  738. } else
  739. ph->message_id = PNS_PIPE_DATA;
  740. ph->pipe_handle = pn->pipe_handle;
  741. return pn_skb_send(sk, skb, &pipe_srv);
  742. }
  743. static int pep_sendmsg(struct kiocb *iocb, struct sock *sk,
  744. struct msghdr *msg, size_t len)
  745. {
  746. struct pep_sock *pn = pep_sk(sk);
  747. struct sk_buff *skb;
  748. long timeo;
  749. int flags = msg->msg_flags;
  750. int err, done;
  751. if ((msg->msg_flags & ~(MSG_DONTWAIT|MSG_EOR|MSG_NOSIGNAL|
  752. MSG_CMSG_COMPAT)) ||
  753. !(msg->msg_flags & MSG_EOR))
  754. return -EOPNOTSUPP;
  755. skb = sock_alloc_send_skb(sk, MAX_PNPIPE_HEADER + len,
  756. flags & MSG_DONTWAIT, &err);
  757. if (!skb)
  758. return -ENOBUFS;
  759. skb_reserve(skb, MAX_PHONET_HEADER + 3);
  760. err = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
  761. if (err < 0)
  762. goto outfree;
  763. lock_sock(sk);
  764. timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
  765. if ((1 << sk->sk_state) & (TCPF_LISTEN|TCPF_CLOSE)) {
  766. err = -ENOTCONN;
  767. goto out;
  768. }
  769. if (sk->sk_state != TCP_ESTABLISHED) {
  770. /* Wait until the pipe gets to enabled state */
  771. disabled:
  772. err = sk_stream_wait_connect(sk, &timeo);
  773. if (err)
  774. goto out;
  775. if (sk->sk_state == TCP_CLOSE_WAIT) {
  776. err = -ECONNRESET;
  777. goto out;
  778. }
  779. }
  780. BUG_ON(sk->sk_state != TCP_ESTABLISHED);
  781. /* Wait until flow control allows TX */
  782. done = atomic_read(&pn->tx_credits);
  783. while (!done) {
  784. DEFINE_WAIT(wait);
  785. if (!timeo) {
  786. err = -EAGAIN;
  787. goto out;
  788. }
  789. if (signal_pending(current)) {
  790. err = sock_intr_errno(timeo);
  791. goto out;
  792. }
  793. prepare_to_wait(sk_sleep(sk), &wait,
  794. TASK_INTERRUPTIBLE);
  795. done = sk_wait_event(sk, &timeo, atomic_read(&pn->tx_credits));
  796. finish_wait(sk_sleep(sk), &wait);
  797. if (sk->sk_state != TCP_ESTABLISHED)
  798. goto disabled;
  799. }
  800. err = pipe_skb_send(sk, skb);
  801. if (err >= 0)
  802. err = len; /* success! */
  803. skb = NULL;
  804. out:
  805. release_sock(sk);
  806. outfree:
  807. kfree_skb(skb);
  808. return err;
  809. }
  810. int pep_writeable(struct sock *sk)
  811. {
  812. struct pep_sock *pn = pep_sk(sk);
  813. return atomic_read(&pn->tx_credits);
  814. }
  815. int pep_write(struct sock *sk, struct sk_buff *skb)
  816. {
  817. struct sk_buff *rskb, *fs;
  818. int flen = 0;
  819. if (pep_sk(sk)->aligned)
  820. return pipe_skb_send(sk, skb);
  821. rskb = alloc_skb(MAX_PNPIPE_HEADER, GFP_ATOMIC);
  822. if (!rskb) {
  823. kfree_skb(skb);
  824. return -ENOMEM;
  825. }
  826. skb_shinfo(rskb)->frag_list = skb;
  827. rskb->len += skb->len;
  828. rskb->data_len += rskb->len;
  829. rskb->truesize += rskb->len;
  830. /* Avoid nested fragments */
  831. skb_walk_frags(skb, fs)
  832. flen += fs->len;
  833. skb->next = skb_shinfo(skb)->frag_list;
  834. skb_frag_list_init(skb);
  835. skb->len -= flen;
  836. skb->data_len -= flen;
  837. skb->truesize -= flen;
  838. skb_reserve(rskb, MAX_PHONET_HEADER + 3);
  839. return pipe_skb_send(sk, rskb);
  840. }
  841. struct sk_buff *pep_read(struct sock *sk)
  842. {
  843. struct sk_buff *skb = skb_dequeue(&sk->sk_receive_queue);
  844. if (sk->sk_state == TCP_ESTABLISHED)
  845. pipe_grant_credits(sk);
  846. return skb;
  847. }
  848. static int pep_recvmsg(struct kiocb *iocb, struct sock *sk,
  849. struct msghdr *msg, size_t len, int noblock,
  850. int flags, int *addr_len)
  851. {
  852. struct sk_buff *skb;
  853. int err;
  854. if (flags & ~(MSG_OOB|MSG_PEEK|MSG_TRUNC|MSG_DONTWAIT|MSG_WAITALL|
  855. MSG_NOSIGNAL|MSG_CMSG_COMPAT))
  856. return -EOPNOTSUPP;
  857. if (unlikely(1 << sk->sk_state & (TCPF_LISTEN | TCPF_CLOSE)))
  858. return -ENOTCONN;
  859. if ((flags & MSG_OOB) || sock_flag(sk, SOCK_URGINLINE)) {
  860. /* Dequeue and acknowledge control request */
  861. struct pep_sock *pn = pep_sk(sk);
  862. if (flags & MSG_PEEK)
  863. return -EOPNOTSUPP;
  864. skb = skb_dequeue(&pn->ctrlreq_queue);
  865. if (skb) {
  866. pep_ctrlreq_error(sk, skb, PN_PIPE_NO_ERROR,
  867. GFP_KERNEL);
  868. msg->msg_flags |= MSG_OOB;
  869. goto copy;
  870. }
  871. if (flags & MSG_OOB)
  872. return -EINVAL;
  873. }
  874. skb = skb_recv_datagram(sk, flags, noblock, &err);
  875. lock_sock(sk);
  876. if (skb == NULL) {
  877. if (err == -ENOTCONN && sk->sk_state == TCP_CLOSE_WAIT)
  878. err = -ECONNRESET;
  879. release_sock(sk);
  880. return err;
  881. }
  882. if (sk->sk_state == TCP_ESTABLISHED)
  883. pipe_grant_credits(sk);
  884. release_sock(sk);
  885. copy:
  886. msg->msg_flags |= MSG_EOR;
  887. if (skb->len > len)
  888. msg->msg_flags |= MSG_TRUNC;
  889. else
  890. len = skb->len;
  891. err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, len);
  892. if (!err)
  893. err = (flags & MSG_TRUNC) ? skb->len : len;
  894. skb_free_datagram(sk, skb);
  895. return err;
  896. }
  897. static void pep_sock_unhash(struct sock *sk)
  898. {
  899. struct pep_sock *pn = pep_sk(sk);
  900. struct sock *skparent = NULL;
  901. lock_sock(sk);
  902. if ((1 << sk->sk_state) & ~(TCPF_CLOSE|TCPF_LISTEN)) {
  903. skparent = pn->listener;
  904. release_sock(sk);
  905. pn = pep_sk(skparent);
  906. lock_sock(skparent);
  907. sk_del_node_init(sk);
  908. sk = skparent;
  909. }
  910. /* Unhash a listening sock only when it is closed
  911. * and all of its active connected pipes are closed. */
  912. if (hlist_empty(&pn->hlist))
  913. pn_sock_unhash(&pn->pn_sk.sk);
  914. release_sock(sk);
  915. if (skparent)
  916. sock_put(skparent);
  917. }
  918. static struct proto pep_proto = {
  919. .close = pep_sock_close,
  920. .accept = pep_sock_accept,
  921. .ioctl = pep_ioctl,
  922. .init = pep_init,
  923. .setsockopt = pep_setsockopt,
  924. .getsockopt = pep_getsockopt,
  925. .sendmsg = pep_sendmsg,
  926. .recvmsg = pep_recvmsg,
  927. .backlog_rcv = pep_do_rcv,
  928. .hash = pn_sock_hash,
  929. .unhash = pep_sock_unhash,
  930. .get_port = pn_sock_get_port,
  931. .obj_size = sizeof(struct pep_sock),
  932. .owner = THIS_MODULE,
  933. .name = "PNPIPE",
  934. };
  935. static struct phonet_protocol pep_pn_proto = {
  936. .ops = &phonet_stream_ops,
  937. .prot = &pep_proto,
  938. .sock_type = SOCK_SEQPACKET,
  939. };
  940. static int __init pep_register(void)
  941. {
  942. return phonet_proto_register(PN_PROTO_PIPE, &pep_pn_proto);
  943. }
  944. static void __exit pep_unregister(void)
  945. {
  946. phonet_proto_unregister(PN_PROTO_PIPE, &pep_pn_proto);
  947. }
  948. module_init(pep_register);
  949. module_exit(pep_unregister);
  950. MODULE_AUTHOR("Remi Denis-Courmont, Nokia");
  951. MODULE_DESCRIPTION("Phonet pipe protocol");
  952. MODULE_LICENSE("GPL");
  953. MODULE_ALIAS_NET_PF_PROTO(PF_PHONET, PN_PROTO_PIPE);