pep.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080
  1. /*
  2. * File: pep.c
  3. *
  4. * Phonet pipe protocol end point socket
  5. *
  6. * Copyright (C) 2008 Nokia Corporation.
  7. *
  8. * Author: Rémi Denis-Courmont <remi.denis-courmont@nokia.com>
  9. *
  10. * This program is free software; you can redistribute it and/or
  11. * modify it under the terms of the GNU General Public License
  12. * version 2 as published by the Free Software Foundation.
  13. *
  14. * This program is distributed in the hope that it will be useful, but
  15. * WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  17. * General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU General Public License
  20. * along with this program; if not, write to the Free Software
  21. * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
  22. * 02110-1301 USA
  23. */
  24. #include <linux/kernel.h>
  25. #include <linux/socket.h>
  26. #include <net/sock.h>
  27. #include <net/tcp_states.h>
  28. #include <asm/ioctls.h>
  29. #include <linux/phonet.h>
  30. #include <net/phonet/phonet.h>
  31. #include <net/phonet/pep.h>
  32. #include <net/phonet/gprs.h>
  33. /* sk_state values:
  34. * TCP_CLOSE sock not in use yet
  35. * TCP_CLOSE_WAIT disconnected pipe
  36. * TCP_LISTEN listening pipe endpoint
  37. * TCP_SYN_RECV connected pipe in disabled state
  38. * TCP_ESTABLISHED connected pipe in enabled state
  39. *
  40. * pep_sock locking:
  41. * - sk_state, ackq, hlist: sock lock needed
  42. * - listener: read only
  43. * - pipe_handle: read only
  44. */
  45. #define CREDITS_MAX 10
  46. #define CREDITS_THR 7
  47. static const struct sockaddr_pn pipe_srv = {
  48. .spn_family = AF_PHONET,
  49. .spn_resource = 0xD9, /* pipe service */
  50. };
  51. #define pep_sb_size(s) (((s) + 5) & ~3) /* 2-bytes head, 32-bits aligned */
  52. /* Get the next TLV sub-block. */
  53. static unsigned char *pep_get_sb(struct sk_buff *skb, u8 *ptype, u8 *plen,
  54. void *buf)
  55. {
  56. void *data = NULL;
  57. struct {
  58. u8 sb_type;
  59. u8 sb_len;
  60. } *ph, h;
  61. int buflen = *plen;
  62. ph = skb_header_pointer(skb, 0, 2, &h);
  63. if (ph == NULL || ph->sb_len < 2 || !pskb_may_pull(skb, ph->sb_len))
  64. return NULL;
  65. ph->sb_len -= 2;
  66. *ptype = ph->sb_type;
  67. *plen = ph->sb_len;
  68. if (buflen > ph->sb_len)
  69. buflen = ph->sb_len;
  70. data = skb_header_pointer(skb, 2, buflen, buf);
  71. __skb_pull(skb, 2 + ph->sb_len);
  72. return data;
  73. }
  74. static int pep_reply(struct sock *sk, struct sk_buff *oskb,
  75. u8 code, const void *data, int len, gfp_t priority)
  76. {
  77. const struct pnpipehdr *oph = pnp_hdr(oskb);
  78. struct pnpipehdr *ph;
  79. struct sk_buff *skb;
  80. skb = alloc_skb(MAX_PNPIPE_HEADER + len, priority);
  81. if (!skb)
  82. return -ENOMEM;
  83. skb_set_owner_w(skb, sk);
  84. skb_reserve(skb, MAX_PNPIPE_HEADER);
  85. __skb_put(skb, len);
  86. skb_copy_to_linear_data(skb, data, len);
  87. __skb_push(skb, sizeof(*ph));
  88. skb_reset_transport_header(skb);
  89. ph = pnp_hdr(skb);
  90. ph->utid = oph->utid;
  91. ph->message_id = oph->message_id + 1; /* REQ -> RESP */
  92. ph->pipe_handle = oph->pipe_handle;
  93. ph->error_code = code;
  94. return pn_skb_send(sk, skb, &pipe_srv);
  95. }
  96. #define PAD 0x00
  97. static int pep_accept_conn(struct sock *sk, struct sk_buff *skb)
  98. {
  99. static const u8 data[20] = {
  100. PAD, PAD, PAD, 2 /* sub-blocks */,
  101. PN_PIPE_SB_REQUIRED_FC_TX, pep_sb_size(5), 3, PAD,
  102. PN_MULTI_CREDIT_FLOW_CONTROL,
  103. PN_ONE_CREDIT_FLOW_CONTROL,
  104. PN_LEGACY_FLOW_CONTROL,
  105. PAD,
  106. PN_PIPE_SB_PREFERRED_FC_RX, pep_sb_size(5), 3, PAD,
  107. PN_MULTI_CREDIT_FLOW_CONTROL,
  108. PN_ONE_CREDIT_FLOW_CONTROL,
  109. PN_LEGACY_FLOW_CONTROL,
  110. PAD,
  111. };
  112. might_sleep();
  113. return pep_reply(sk, skb, PN_PIPE_NO_ERROR, data, sizeof(data),
  114. GFP_KERNEL);
  115. }
  116. static int pep_reject_conn(struct sock *sk, struct sk_buff *skb, u8 code)
  117. {
  118. static const u8 data[4] = { PAD, PAD, PAD, 0 /* sub-blocks */ };
  119. WARN_ON(code == PN_PIPE_NO_ERROR);
  120. return pep_reply(sk, skb, code, data, sizeof(data), GFP_ATOMIC);
  121. }
  122. /* Control requests are not sent by the pipe service and have a specific
  123. * message format. */
  124. static int pep_ctrlreq_error(struct sock *sk, struct sk_buff *oskb, u8 code,
  125. gfp_t priority)
  126. {
  127. const struct pnpipehdr *oph = pnp_hdr(oskb);
  128. struct sk_buff *skb;
  129. struct pnpipehdr *ph;
  130. struct sockaddr_pn dst;
  131. skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
  132. if (!skb)
  133. return -ENOMEM;
  134. skb_set_owner_w(skb, sk);
  135. skb_reserve(skb, MAX_PHONET_HEADER);
  136. ph = (struct pnpipehdr *)skb_put(skb, sizeof(*ph) + 4);
  137. ph->utid = oph->utid;
  138. ph->message_id = PNS_PEP_CTRL_RESP;
  139. ph->pipe_handle = oph->pipe_handle;
  140. ph->data[0] = oph->data[1]; /* CTRL id */
  141. ph->data[1] = oph->data[0]; /* PEP type */
  142. ph->data[2] = code; /* error code, at an usual offset */
  143. ph->data[3] = PAD;
  144. ph->data[4] = PAD;
  145. pn_skb_get_src_sockaddr(oskb, &dst);
  146. return pn_skb_send(sk, skb, &dst);
  147. }
  148. static int pipe_snd_status(struct sock *sk, u8 type, u8 status, gfp_t priority)
  149. {
  150. struct pep_sock *pn = pep_sk(sk);
  151. struct pnpipehdr *ph;
  152. struct sk_buff *skb;
  153. skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
  154. if (!skb)
  155. return -ENOMEM;
  156. skb_set_owner_w(skb, sk);
  157. skb_reserve(skb, MAX_PNPIPE_HEADER + 4);
  158. __skb_push(skb, sizeof(*ph) + 4);
  159. skb_reset_transport_header(skb);
  160. ph = pnp_hdr(skb);
  161. ph->utid = 0;
  162. ph->message_id = PNS_PEP_STATUS_IND;
  163. ph->pipe_handle = pn->pipe_handle;
  164. ph->pep_type = PN_PEP_TYPE_COMMON;
  165. ph->data[1] = type;
  166. ph->data[2] = PAD;
  167. ph->data[3] = PAD;
  168. ph->data[4] = status;
  169. return pn_skb_send(sk, skb, &pipe_srv);
  170. }
  171. /* Send our RX flow control information to the sender.
  172. * Socket must be locked. */
  173. static void pipe_grant_credits(struct sock *sk)
  174. {
  175. struct pep_sock *pn = pep_sk(sk);
  176. BUG_ON(sk->sk_state != TCP_ESTABLISHED);
  177. switch (pn->rx_fc) {
  178. case PN_LEGACY_FLOW_CONTROL: /* TODO */
  179. break;
  180. case PN_ONE_CREDIT_FLOW_CONTROL:
  181. pipe_snd_status(sk, PN_PEP_IND_FLOW_CONTROL,
  182. PEP_IND_READY, GFP_ATOMIC);
  183. pn->rx_credits = 1;
  184. break;
  185. case PN_MULTI_CREDIT_FLOW_CONTROL:
  186. if ((pn->rx_credits + CREDITS_THR) > CREDITS_MAX)
  187. break;
  188. if (pipe_snd_status(sk, PN_PEP_IND_ID_MCFC_GRANT_CREDITS,
  189. CREDITS_MAX - pn->rx_credits,
  190. GFP_ATOMIC) == 0)
  191. pn->rx_credits = CREDITS_MAX;
  192. break;
  193. }
  194. }
  195. static int pipe_rcv_status(struct sock *sk, struct sk_buff *skb)
  196. {
  197. struct pep_sock *pn = pep_sk(sk);
  198. struct pnpipehdr *hdr = pnp_hdr(skb);
  199. int wake = 0;
  200. if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
  201. return -EINVAL;
  202. if (hdr->data[0] != PN_PEP_TYPE_COMMON) {
  203. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP type: %u\n",
  204. (unsigned)hdr->data[0]);
  205. return -EOPNOTSUPP;
  206. }
  207. switch (hdr->data[1]) {
  208. case PN_PEP_IND_FLOW_CONTROL:
  209. switch (pn->tx_fc) {
  210. case PN_LEGACY_FLOW_CONTROL:
  211. switch (hdr->data[4]) {
  212. case PEP_IND_BUSY:
  213. atomic_set(&pn->tx_credits, 0);
  214. break;
  215. case PEP_IND_READY:
  216. atomic_set(&pn->tx_credits, wake = 1);
  217. break;
  218. }
  219. break;
  220. case PN_ONE_CREDIT_FLOW_CONTROL:
  221. if (hdr->data[4] == PEP_IND_READY)
  222. atomic_set(&pn->tx_credits, wake = 1);
  223. break;
  224. }
  225. break;
  226. case PN_PEP_IND_ID_MCFC_GRANT_CREDITS:
  227. if (pn->tx_fc != PN_MULTI_CREDIT_FLOW_CONTROL)
  228. break;
  229. atomic_add(wake = hdr->data[4], &pn->tx_credits);
  230. break;
  231. default:
  232. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP indication: %u\n",
  233. (unsigned)hdr->data[1]);
  234. return -EOPNOTSUPP;
  235. }
  236. if (wake)
  237. sk->sk_write_space(sk);
  238. return 0;
  239. }
  240. static int pipe_rcv_created(struct sock *sk, struct sk_buff *skb)
  241. {
  242. struct pep_sock *pn = pep_sk(sk);
  243. struct pnpipehdr *hdr = pnp_hdr(skb);
  244. u8 n_sb = hdr->data[0];
  245. pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
  246. __skb_pull(skb, sizeof(*hdr));
  247. while (n_sb > 0) {
  248. u8 type, buf[2], len = sizeof(buf);
  249. u8 *data = pep_get_sb(skb, &type, &len, buf);
  250. if (data == NULL)
  251. return -EINVAL;
  252. switch (type) {
  253. case PN_PIPE_SB_NEGOTIATED_FC:
  254. if (len < 2 || (data[0] | data[1]) > 3)
  255. break;
  256. pn->tx_fc = data[0] & 3;
  257. pn->rx_fc = data[1] & 3;
  258. break;
  259. }
  260. n_sb--;
  261. }
  262. return 0;
  263. }
  264. /* Queue an skb to a connected sock.
  265. * Socket lock must be held. */
  266. static int pipe_do_rcv(struct sock *sk, struct sk_buff *skb)
  267. {
  268. struct pep_sock *pn = pep_sk(sk);
  269. struct pnpipehdr *hdr = pnp_hdr(skb);
  270. struct sk_buff_head *queue;
  271. int err = 0;
  272. BUG_ON(sk->sk_state == TCP_CLOSE_WAIT);
  273. switch (hdr->message_id) {
  274. case PNS_PEP_CONNECT_REQ:
  275. pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
  276. break;
  277. case PNS_PEP_DISCONNECT_REQ:
  278. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  279. sk->sk_state = TCP_CLOSE_WAIT;
  280. if (!sock_flag(sk, SOCK_DEAD))
  281. sk->sk_state_change(sk);
  282. break;
  283. case PNS_PEP_ENABLE_REQ:
  284. /* Wait for PNS_PIPE_(ENABLED|REDIRECTED)_IND */
  285. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  286. break;
  287. case PNS_PEP_RESET_REQ:
  288. switch (hdr->state_after_reset) {
  289. case PN_PIPE_DISABLE:
  290. pn->init_enable = 0;
  291. break;
  292. case PN_PIPE_ENABLE:
  293. pn->init_enable = 1;
  294. break;
  295. default: /* not allowed to send an error here!? */
  296. err = -EINVAL;
  297. goto out;
  298. }
  299. /* fall through */
  300. case PNS_PEP_DISABLE_REQ:
  301. atomic_set(&pn->tx_credits, 0);
  302. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  303. break;
  304. case PNS_PEP_CTRL_REQ:
  305. if (skb_queue_len(&pn->ctrlreq_queue) >= PNPIPE_CTRLREQ_MAX)
  306. break;
  307. __skb_pull(skb, 4);
  308. queue = &pn->ctrlreq_queue;
  309. goto queue;
  310. case PNS_PIPE_DATA:
  311. __skb_pull(skb, 3); /* Pipe data header */
  312. if (!pn_flow_safe(pn->rx_fc)) {
  313. err = sock_queue_rcv_skb(sk, skb);
  314. if (!err)
  315. return 0;
  316. break;
  317. }
  318. if (pn->rx_credits == 0) {
  319. err = -ENOBUFS;
  320. break;
  321. }
  322. pn->rx_credits--;
  323. queue = &sk->sk_receive_queue;
  324. goto queue;
  325. case PNS_PEP_STATUS_IND:
  326. pipe_rcv_status(sk, skb);
  327. break;
  328. case PNS_PIPE_REDIRECTED_IND:
  329. err = pipe_rcv_created(sk, skb);
  330. break;
  331. case PNS_PIPE_CREATED_IND:
  332. err = pipe_rcv_created(sk, skb);
  333. if (err)
  334. break;
  335. /* fall through */
  336. case PNS_PIPE_RESET_IND:
  337. if (!pn->init_enable)
  338. break;
  339. /* fall through */
  340. case PNS_PIPE_ENABLED_IND:
  341. if (!pn_flow_safe(pn->tx_fc)) {
  342. atomic_set(&pn->tx_credits, 1);
  343. sk->sk_write_space(sk);
  344. }
  345. if (sk->sk_state == TCP_ESTABLISHED)
  346. break; /* Nothing to do */
  347. sk->sk_state = TCP_ESTABLISHED;
  348. pipe_grant_credits(sk);
  349. break;
  350. case PNS_PIPE_DISABLED_IND:
  351. sk->sk_state = TCP_SYN_RECV;
  352. pn->rx_credits = 0;
  353. break;
  354. default:
  355. LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP message: %u\n",
  356. hdr->message_id);
  357. err = -EINVAL;
  358. }
  359. out:
  360. kfree_skb(skb);
  361. return err;
  362. queue:
  363. skb->dev = NULL;
  364. skb_set_owner_r(skb, sk);
  365. err = skb->len;
  366. skb_queue_tail(queue, skb);
  367. if (!sock_flag(sk, SOCK_DEAD))
  368. sk->sk_data_ready(sk, err);
  369. return 0;
  370. }
  371. /* Destroy connected sock. */
  372. static void pipe_destruct(struct sock *sk)
  373. {
  374. struct pep_sock *pn = pep_sk(sk);
  375. skb_queue_purge(&sk->sk_receive_queue);
  376. skb_queue_purge(&pn->ctrlreq_queue);
  377. }
  378. static int pep_connreq_rcv(struct sock *sk, struct sk_buff *skb)
  379. {
  380. struct sock *newsk;
  381. struct pep_sock *newpn, *pn = pep_sk(sk);
  382. struct pnpipehdr *hdr;
  383. struct sockaddr_pn dst;
  384. u16 peer_type;
  385. u8 pipe_handle, enabled, n_sb;
  386. if (!pskb_pull(skb, sizeof(*hdr) + 4))
  387. return -EINVAL;
  388. hdr = pnp_hdr(skb);
  389. pipe_handle = hdr->pipe_handle;
  390. switch (hdr->state_after_connect) {
  391. case PN_PIPE_DISABLE:
  392. enabled = 0;
  393. break;
  394. case PN_PIPE_ENABLE:
  395. enabled = 1;
  396. break;
  397. default:
  398. pep_reject_conn(sk, skb, PN_PIPE_ERR_INVALID_PARAM);
  399. return -EINVAL;
  400. }
  401. peer_type = hdr->other_pep_type << 8;
  402. if (unlikely(sk->sk_state != TCP_LISTEN) || sk_acceptq_is_full(sk)) {
  403. pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
  404. return -ENOBUFS;
  405. }
  406. /* Parse sub-blocks (options) */
  407. n_sb = hdr->data[4];
  408. while (n_sb > 0) {
  409. u8 type, buf[1], len = sizeof(buf);
  410. const u8 *data = pep_get_sb(skb, &type, &len, buf);
  411. if (data == NULL)
  412. return -EINVAL;
  413. switch (type) {
  414. case PN_PIPE_SB_CONNECT_REQ_PEP_SUB_TYPE:
  415. if (len < 1)
  416. return -EINVAL;
  417. peer_type = (peer_type & 0xff00) | data[0];
  418. break;
  419. }
  420. n_sb--;
  421. }
  422. skb = skb_clone(skb, GFP_ATOMIC);
  423. if (!skb)
  424. return -ENOMEM;
  425. /* Create a new to-be-accepted sock */
  426. newsk = sk_alloc(sock_net(sk), PF_PHONET, GFP_ATOMIC, sk->sk_prot);
  427. if (!newsk) {
  428. kfree_skb(skb);
  429. return -ENOMEM;
  430. }
  431. sock_init_data(NULL, newsk);
  432. newsk->sk_state = TCP_SYN_RECV;
  433. newsk->sk_backlog_rcv = pipe_do_rcv;
  434. newsk->sk_protocol = sk->sk_protocol;
  435. newsk->sk_destruct = pipe_destruct;
  436. newpn = pep_sk(newsk);
  437. pn_skb_get_dst_sockaddr(skb, &dst);
  438. newpn->pn_sk.sobject = pn_sockaddr_get_object(&dst);
  439. newpn->pn_sk.resource = pn->pn_sk.resource;
  440. skb_queue_head_init(&newpn->ctrlreq_queue);
  441. newpn->pipe_handle = pipe_handle;
  442. atomic_set(&newpn->tx_credits, 0);
  443. newpn->peer_type = peer_type;
  444. newpn->rx_credits = 0;
  445. newpn->rx_fc = newpn->tx_fc = PN_LEGACY_FLOW_CONTROL;
  446. newpn->init_enable = enabled;
  447. BUG_ON(!skb_queue_empty(&newsk->sk_receive_queue));
  448. skb_queue_head(&newsk->sk_receive_queue, skb);
  449. if (!sock_flag(sk, SOCK_DEAD))
  450. sk->sk_data_ready(sk, 0);
  451. sk_acceptq_added(sk);
  452. sk_add_node(newsk, &pn->ackq);
  453. return 0;
  454. }
  455. /* Listening sock must be locked */
  456. static struct sock *pep_find_pipe(const struct hlist_head *hlist,
  457. const struct sockaddr_pn *dst,
  458. u8 pipe_handle)
  459. {
  460. struct hlist_node *node;
  461. struct sock *sknode;
  462. u16 dobj = pn_sockaddr_get_object(dst);
  463. sk_for_each(sknode, node, hlist) {
  464. struct pep_sock *pnnode = pep_sk(sknode);
  465. /* Ports match, but addresses might not: */
  466. if (pnnode->pn_sk.sobject != dobj)
  467. continue;
  468. if (pnnode->pipe_handle != pipe_handle)
  469. continue;
  470. if (sknode->sk_state == TCP_CLOSE_WAIT)
  471. continue;
  472. sock_hold(sknode);
  473. return sknode;
  474. }
  475. return NULL;
  476. }
  477. /*
  478. * Deliver an skb to a listening sock.
  479. * Socket lock must be held.
  480. * We then queue the skb to the right connected sock (if any).
  481. */
  482. static int pep_do_rcv(struct sock *sk, struct sk_buff *skb)
  483. {
  484. struct pep_sock *pn = pep_sk(sk);
  485. struct sock *sknode;
  486. struct pnpipehdr *hdr;
  487. struct sockaddr_pn dst;
  488. int err = NET_RX_SUCCESS;
  489. u8 pipe_handle;
  490. if (!pskb_may_pull(skb, sizeof(*hdr)))
  491. goto drop;
  492. hdr = pnp_hdr(skb);
  493. pipe_handle = hdr->pipe_handle;
  494. if (pipe_handle == PN_PIPE_INVALID_HANDLE)
  495. goto drop;
  496. pn_skb_get_dst_sockaddr(skb, &dst);
  497. /* Look for an existing pipe handle */
  498. sknode = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
  499. if (sknode)
  500. return sk_receive_skb(sknode, skb, 1);
  501. /* Look for a pipe handle pending accept */
  502. sknode = pep_find_pipe(&pn->ackq, &dst, pipe_handle);
  503. if (sknode) {
  504. sock_put(sknode);
  505. if (net_ratelimit())
  506. printk(KERN_WARNING"Phonet unconnected PEP ignored");
  507. err = NET_RX_DROP;
  508. goto drop;
  509. }
  510. switch (hdr->message_id) {
  511. case PNS_PEP_CONNECT_REQ:
  512. err = pep_connreq_rcv(sk, skb);
  513. break;
  514. case PNS_PEP_DISCONNECT_REQ:
  515. pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
  516. break;
  517. case PNS_PEP_CTRL_REQ:
  518. pep_ctrlreq_error(sk, skb, PN_PIPE_INVALID_HANDLE, GFP_ATOMIC);
  519. break;
  520. case PNS_PEP_RESET_REQ:
  521. case PNS_PEP_ENABLE_REQ:
  522. case PNS_PEP_DISABLE_REQ:
  523. /* invalid handle is not even allowed here! */
  524. default:
  525. err = NET_RX_DROP;
  526. }
  527. drop:
  528. kfree_skb(skb);
  529. return err;
  530. }
  531. /* associated socket ceases to exist */
  532. static void pep_sock_close(struct sock *sk, long timeout)
  533. {
  534. struct pep_sock *pn = pep_sk(sk);
  535. int ifindex = 0;
  536. sk_common_release(sk);
  537. lock_sock(sk);
  538. if (sk->sk_state == TCP_LISTEN) {
  539. /* Destroy the listen queue */
  540. struct sock *sknode;
  541. struct hlist_node *p, *n;
  542. sk_for_each_safe(sknode, p, n, &pn->ackq)
  543. sk_del_node_init(sknode);
  544. sk->sk_state = TCP_CLOSE;
  545. }
  546. ifindex = pn->ifindex;
  547. pn->ifindex = 0;
  548. release_sock(sk);
  549. if (ifindex)
  550. gprs_detach(sk);
  551. }
  552. static int pep_wait_connreq(struct sock *sk, int noblock)
  553. {
  554. struct task_struct *tsk = current;
  555. struct pep_sock *pn = pep_sk(sk);
  556. long timeo = sock_rcvtimeo(sk, noblock);
  557. for (;;) {
  558. DEFINE_WAIT(wait);
  559. if (sk->sk_state != TCP_LISTEN)
  560. return -EINVAL;
  561. if (!hlist_empty(&pn->ackq))
  562. break;
  563. if (!timeo)
  564. return -EWOULDBLOCK;
  565. if (signal_pending(tsk))
  566. return sock_intr_errno(timeo);
  567. prepare_to_wait_exclusive(&sk->sk_socket->wait, &wait,
  568. TASK_INTERRUPTIBLE);
  569. release_sock(sk);
  570. timeo = schedule_timeout(timeo);
  571. lock_sock(sk);
  572. finish_wait(&sk->sk_socket->wait, &wait);
  573. }
  574. return 0;
  575. }
  576. static struct sock *pep_sock_accept(struct sock *sk, int flags, int *errp)
  577. {
  578. struct pep_sock *pn = pep_sk(sk);
  579. struct sock *newsk = NULL;
  580. struct sk_buff *oskb;
  581. int err;
  582. lock_sock(sk);
  583. err = pep_wait_connreq(sk, flags & O_NONBLOCK);
  584. if (err)
  585. goto out;
  586. newsk = __sk_head(&pn->ackq);
  587. oskb = skb_dequeue(&newsk->sk_receive_queue);
  588. err = pep_accept_conn(newsk, oskb);
  589. if (err) {
  590. skb_queue_head(&newsk->sk_receive_queue, oskb);
  591. newsk = NULL;
  592. goto out;
  593. }
  594. sock_hold(sk);
  595. pep_sk(newsk)->listener = sk;
  596. sock_hold(newsk);
  597. sk_del_node_init(newsk);
  598. sk_acceptq_removed(sk);
  599. sk_add_node(newsk, &pn->hlist);
  600. __sock_put(newsk);
  601. out:
  602. release_sock(sk);
  603. *errp = err;
  604. return newsk;
  605. }
  606. static int pep_ioctl(struct sock *sk, int cmd, unsigned long arg)
  607. {
  608. struct pep_sock *pn = pep_sk(sk);
  609. int answ;
  610. switch (cmd) {
  611. case SIOCINQ:
  612. if (sk->sk_state == TCP_LISTEN)
  613. return -EINVAL;
  614. lock_sock(sk);
  615. if (sock_flag(sk, SOCK_URGINLINE)
  616. && !skb_queue_empty(&pn->ctrlreq_queue))
  617. answ = skb_peek(&pn->ctrlreq_queue)->len;
  618. else if (!skb_queue_empty(&sk->sk_receive_queue))
  619. answ = skb_peek(&sk->sk_receive_queue)->len;
  620. else
  621. answ = 0;
  622. release_sock(sk);
  623. return put_user(answ, (int __user *)arg);
  624. }
  625. return -ENOIOCTLCMD;
  626. }
  627. static int pep_init(struct sock *sk)
  628. {
  629. struct pep_sock *pn = pep_sk(sk);
  630. INIT_HLIST_HEAD(&pn->ackq);
  631. INIT_HLIST_HEAD(&pn->hlist);
  632. skb_queue_head_init(&pn->ctrlreq_queue);
  633. pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
  634. return 0;
  635. }
  636. static int pep_setsockopt(struct sock *sk, int level, int optname,
  637. char __user *optval, int optlen)
  638. {
  639. struct pep_sock *pn = pep_sk(sk);
  640. int val = 0, err = 0;
  641. if (level != SOL_PNPIPE)
  642. return -ENOPROTOOPT;
  643. if (optlen >= sizeof(int)) {
  644. if (get_user(val, (int __user *) optval))
  645. return -EFAULT;
  646. }
  647. lock_sock(sk);
  648. switch (optname) {
  649. case PNPIPE_ENCAP:
  650. if (val && val != PNPIPE_ENCAP_IP) {
  651. err = -EINVAL;
  652. break;
  653. }
  654. if (!pn->ifindex == !val)
  655. break; /* Nothing to do! */
  656. if (!capable(CAP_NET_ADMIN)) {
  657. err = -EPERM;
  658. break;
  659. }
  660. if (val) {
  661. release_sock(sk);
  662. err = gprs_attach(sk);
  663. if (err > 0) {
  664. pn->ifindex = err;
  665. err = 0;
  666. }
  667. } else {
  668. pn->ifindex = 0;
  669. release_sock(sk);
  670. gprs_detach(sk);
  671. err = 0;
  672. }
  673. goto out_norel;
  674. default:
  675. err = -ENOPROTOOPT;
  676. }
  677. release_sock(sk);
  678. out_norel:
  679. return err;
  680. }
  681. static int pep_getsockopt(struct sock *sk, int level, int optname,
  682. char __user *optval, int __user *optlen)
  683. {
  684. struct pep_sock *pn = pep_sk(sk);
  685. int len, val;
  686. if (level != SOL_PNPIPE)
  687. return -ENOPROTOOPT;
  688. if (get_user(len, optlen))
  689. return -EFAULT;
  690. switch (optname) {
  691. case PNPIPE_ENCAP:
  692. val = pn->ifindex ? PNPIPE_ENCAP_IP : PNPIPE_ENCAP_NONE;
  693. break;
  694. case PNPIPE_IFINDEX:
  695. val = pn->ifindex;
  696. break;
  697. default:
  698. return -ENOPROTOOPT;
  699. }
  700. len = min_t(unsigned int, sizeof(int), len);
  701. if (put_user(len, optlen))
  702. return -EFAULT;
  703. if (put_user(val, (int __user *) optval))
  704. return -EFAULT;
  705. return 0;
  706. }
  707. static int pipe_skb_send(struct sock *sk, struct sk_buff *skb)
  708. {
  709. struct pep_sock *pn = pep_sk(sk);
  710. struct pnpipehdr *ph;
  711. if (pn_flow_safe(pn->tx_fc) &&
  712. !atomic_add_unless(&pn->tx_credits, -1, 0)) {
  713. kfree_skb(skb);
  714. return -ENOBUFS;
  715. }
  716. skb_push(skb, 3);
  717. skb_reset_transport_header(skb);
  718. ph = pnp_hdr(skb);
  719. ph->utid = 0;
  720. ph->message_id = PNS_PIPE_DATA;
  721. ph->pipe_handle = pn->pipe_handle;
  722. return pn_skb_send(sk, skb, &pipe_srv);
  723. }
  724. static int pep_sendmsg(struct kiocb *iocb, struct sock *sk,
  725. struct msghdr *msg, size_t len)
  726. {
  727. struct pep_sock *pn = pep_sk(sk);
  728. struct sk_buff *skb = NULL;
  729. long timeo;
  730. int flags = msg->msg_flags;
  731. int err, done;
  732. if (msg->msg_flags & MSG_OOB || !(msg->msg_flags & MSG_EOR))
  733. return -EOPNOTSUPP;
  734. lock_sock(sk);
  735. timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
  736. if ((1 << sk->sk_state) & (TCPF_LISTEN|TCPF_CLOSE)) {
  737. err = -ENOTCONN;
  738. goto out;
  739. }
  740. if (sk->sk_state != TCP_ESTABLISHED) {
  741. /* Wait until the pipe gets to enabled state */
  742. disabled:
  743. err = sk_stream_wait_connect(sk, &timeo);
  744. if (err)
  745. goto out;
  746. if (sk->sk_state == TCP_CLOSE_WAIT) {
  747. err = -ECONNRESET;
  748. goto out;
  749. }
  750. }
  751. BUG_ON(sk->sk_state != TCP_ESTABLISHED);
  752. /* Wait until flow control allows TX */
  753. done = atomic_read(&pn->tx_credits);
  754. while (!done) {
  755. DEFINE_WAIT(wait);
  756. if (!timeo) {
  757. err = -EAGAIN;
  758. goto out;
  759. }
  760. if (signal_pending(current)) {
  761. err = sock_intr_errno(timeo);
  762. goto out;
  763. }
  764. prepare_to_wait(&sk->sk_socket->wait, &wait,
  765. TASK_INTERRUPTIBLE);
  766. done = sk_wait_event(sk, &timeo, atomic_read(&pn->tx_credits));
  767. finish_wait(&sk->sk_socket->wait, &wait);
  768. if (sk->sk_state != TCP_ESTABLISHED)
  769. goto disabled;
  770. }
  771. if (!skb) {
  772. skb = sock_alloc_send_skb(sk, MAX_PNPIPE_HEADER + len,
  773. flags & MSG_DONTWAIT, &err);
  774. if (skb == NULL)
  775. goto out;
  776. skb_reserve(skb, MAX_PHONET_HEADER + 3);
  777. if (sk->sk_state != TCP_ESTABLISHED ||
  778. !atomic_read(&pn->tx_credits))
  779. goto disabled; /* sock_alloc_send_skb might sleep */
  780. }
  781. err = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
  782. if (err < 0)
  783. goto out;
  784. err = pipe_skb_send(sk, skb);
  785. if (err >= 0)
  786. err = len; /* success! */
  787. skb = NULL;
  788. out:
  789. release_sock(sk);
  790. kfree_skb(skb);
  791. return err;
  792. }
  793. int pep_writeable(struct sock *sk)
  794. {
  795. struct pep_sock *pn = pep_sk(sk);
  796. return atomic_read(&pn->tx_credits);
  797. }
  798. int pep_write(struct sock *sk, struct sk_buff *skb)
  799. {
  800. struct sk_buff *rskb, *fs;
  801. int flen = 0;
  802. rskb = alloc_skb(MAX_PNPIPE_HEADER, GFP_ATOMIC);
  803. if (!rskb) {
  804. kfree_skb(skb);
  805. return -ENOMEM;
  806. }
  807. skb_shinfo(rskb)->frag_list = skb;
  808. rskb->len += skb->len;
  809. rskb->data_len += rskb->len;
  810. rskb->truesize += rskb->len;
  811. /* Avoid nested fragments */
  812. for (fs = skb_shinfo(skb)->frag_list; fs; fs = fs->next)
  813. flen += fs->len;
  814. skb->next = skb_shinfo(skb)->frag_list;
  815. skb_shinfo(skb)->frag_list = NULL;
  816. skb->len -= flen;
  817. skb->data_len -= flen;
  818. skb->truesize -= flen;
  819. skb_reserve(rskb, MAX_PHONET_HEADER + 3);
  820. return pipe_skb_send(sk, rskb);
  821. }
  822. struct sk_buff *pep_read(struct sock *sk)
  823. {
  824. struct sk_buff *skb = skb_dequeue(&sk->sk_receive_queue);
  825. if (sk->sk_state == TCP_ESTABLISHED)
  826. pipe_grant_credits(sk);
  827. return skb;
  828. }
  829. static int pep_recvmsg(struct kiocb *iocb, struct sock *sk,
  830. struct msghdr *msg, size_t len, int noblock,
  831. int flags, int *addr_len)
  832. {
  833. struct sk_buff *skb;
  834. int err;
  835. if (unlikely(1 << sk->sk_state & (TCPF_LISTEN | TCPF_CLOSE)))
  836. return -ENOTCONN;
  837. if ((flags & MSG_OOB) || sock_flag(sk, SOCK_URGINLINE)) {
  838. /* Dequeue and acknowledge control request */
  839. struct pep_sock *pn = pep_sk(sk);
  840. skb = skb_dequeue(&pn->ctrlreq_queue);
  841. if (skb) {
  842. pep_ctrlreq_error(sk, skb, PN_PIPE_NO_ERROR,
  843. GFP_KERNEL);
  844. msg->msg_flags |= MSG_OOB;
  845. goto copy;
  846. }
  847. if (flags & MSG_OOB)
  848. return -EINVAL;
  849. }
  850. skb = skb_recv_datagram(sk, flags, noblock, &err);
  851. lock_sock(sk);
  852. if (skb == NULL) {
  853. if (err == -ENOTCONN && sk->sk_state == TCP_CLOSE_WAIT)
  854. err = -ECONNRESET;
  855. release_sock(sk);
  856. return err;
  857. }
  858. if (sk->sk_state == TCP_ESTABLISHED)
  859. pipe_grant_credits(sk);
  860. release_sock(sk);
  861. copy:
  862. msg->msg_flags |= MSG_EOR;
  863. if (skb->len > len)
  864. msg->msg_flags |= MSG_TRUNC;
  865. else
  866. len = skb->len;
  867. err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, len);
  868. if (!err)
  869. err = (flags & MSG_TRUNC) ? skb->len : len;
  870. skb_free_datagram(sk, skb);
  871. return err;
  872. }
  873. static void pep_sock_unhash(struct sock *sk)
  874. {
  875. struct pep_sock *pn = pep_sk(sk);
  876. struct sock *skparent = NULL;
  877. lock_sock(sk);
  878. if ((1 << sk->sk_state) & ~(TCPF_CLOSE|TCPF_LISTEN)) {
  879. skparent = pn->listener;
  880. sk_del_node_init(sk);
  881. release_sock(sk);
  882. sk = skparent;
  883. pn = pep_sk(skparent);
  884. lock_sock(sk);
  885. }
  886. /* Unhash a listening sock only when it is closed
  887. * and all of its active connected pipes are closed. */
  888. if (hlist_empty(&pn->hlist))
  889. pn_sock_unhash(&pn->pn_sk.sk);
  890. release_sock(sk);
  891. if (skparent)
  892. sock_put(skparent);
  893. }
  894. static struct proto pep_proto = {
  895. .close = pep_sock_close,
  896. .accept = pep_sock_accept,
  897. .ioctl = pep_ioctl,
  898. .init = pep_init,
  899. .setsockopt = pep_setsockopt,
  900. .getsockopt = pep_getsockopt,
  901. .sendmsg = pep_sendmsg,
  902. .recvmsg = pep_recvmsg,
  903. .backlog_rcv = pep_do_rcv,
  904. .hash = pn_sock_hash,
  905. .unhash = pep_sock_unhash,
  906. .get_port = pn_sock_get_port,
  907. .obj_size = sizeof(struct pep_sock),
  908. .owner = THIS_MODULE,
  909. .name = "PNPIPE",
  910. };
  911. static struct phonet_protocol pep_pn_proto = {
  912. .ops = &phonet_stream_ops,
  913. .prot = &pep_proto,
  914. .sock_type = SOCK_SEQPACKET,
  915. };
  916. static int __init pep_register(void)
  917. {
  918. return phonet_proto_register(PN_PROTO_PIPE, &pep_pn_proto);
  919. }
  920. static void __exit pep_unregister(void)
  921. {
  922. phonet_proto_unregister(PN_PROTO_PIPE, &pep_pn_proto);
  923. }
  924. module_init(pep_register);
  925. module_exit(pep_unregister);
  926. MODULE_AUTHOR("Remi Denis-Courmont, Nokia");
  927. MODULE_DESCRIPTION("Phonet pipe protocol");
  928. MODULE_LICENSE("GPL");
  929. MODULE_ALIAS_NET_PF_PROTO(PF_PHONET, PN_PROTO_PIPE);