caif_socket.c 26.7 KB
Newer Older
1 2 3 4 5 6
/*
 * Copyright (C) ST-Ericsson AB 2010
 * Author:	Sjur Brendeland sjur.brandeland@stericsson.com
 * License terms: GNU General Public License (GPL) version 2
 */

Joe Perches's avatar
Joe Perches committed
7 8
#define pr_fmt(fmt) KBUILD_MODNAME ":%s(): " fmt, __func__

9 10 11 12 13 14 15 16 17 18 19
#include <linux/fs.h>
#include <linux/init.h>
#include <linux/module.h>
#include <linux/sched.h>
#include <linux/spinlock.h>
#include <linux/mutex.h>
#include <linux/list.h>
#include <linux/wait.h>
#include <linux/poll.h>
#include <linux/tcp.h>
#include <linux/uaccess.h>
20
#include <linux/debugfs.h>
21
#include <linux/caif/caif_socket.h>
22
#include <linux/pkt_sched.h>
23 24
#include <net/sock.h>
#include <net/tcp_states.h>
25 26 27 28 29
#include <net/caif/caif_layer.h>
#include <net/caif/caif_dev.h>
#include <net/caif/cfpkt.h>

MODULE_LICENSE("GPL");
30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
MODULE_ALIAS_NETPROTO(AF_CAIF);

/*
 * CAIF state is re-using the TCP socket states.
 * caif_states stored in sk_state reflect the state as reported by
 * the CAIF stack, while sk_socket->state is the state of the socket.
 */
enum caif_states {
	CAIF_CONNECTED		= TCP_ESTABLISHED,
	CAIF_CONNECTING	= TCP_SYN_SENT,
	CAIF_DISCONNECTED	= TCP_CLOSE
};

#define TX_FLOW_ON_BIT	1
#define RX_FLOW_ON_BIT	2
45 46

struct caifsock {
47
	struct sock sk; /* must be first member */
48 49 50
	struct cflayer layer;
	u32 flow_state;
	struct caif_connect_request conn_req;
51
	struct mutex readlock;
52
	struct dentry *debugfs_socket_dir;
53
	int headroom, tailroom, maxframe;
54 55
};

56 57 58 59 60 61 62 63 64 65 66
static int rx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}

static int tx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(TX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
67

68
static void set_rx_flow_off(struct caifsock *cf_sk)
69
{
70 71 72
	 clear_bit(RX_FLOW_ON_BIT,
		 (void *) &cf_sk->flow_state);
}
73

74 75 76 77 78
static void set_rx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
79

80 81 82 83 84
static void set_tx_flow_off(struct caifsock *cf_sk)
{
	 clear_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
85

86 87 88 89 90
static void set_tx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
91

92 93 94 95 96 97
static void caif_read_lock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_lock(&cf_sk->readlock);
}
98

99 100 101 102 103 104
static void caif_read_unlock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_unlock(&cf_sk->readlock);
}
105

106
static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
107 108 109 110
{
	/* A quarter of full buffer is used a low water mark */
	return cf_sk->sk.sk_rcvbuf / 4;
}
111

112
static void caif_flow_ctrl(struct sock *sk, int mode)
113 114 115
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
116
	if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
117 118
		cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
}
119

120 121 122 123
/*
 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
 * not dropped, but CAIF is sending flow off instead.
 */
124
static int caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
125 126 127 128 129 130
{
	int err;
	int skb_len;
	unsigned long flags;
	struct sk_buff_head *list = &sk->sk_receive_queue;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
131

132
	if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
133
		(unsigned int)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
134 135 136
		net_dbg_ratelimited("sending flow OFF (queue len = %d %d)\n",
				    atomic_read(&cf_sk->sk.sk_rmem_alloc),
				    sk_rcvbuf_lowwater(cf_sk));
137
		set_rx_flow_off(cf_sk);
138
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
139
	}
140

141 142 143 144 145
	err = sk_filter(sk, skb);
	if (err)
		return err;
	if (!sk_rmem_schedule(sk, skb->truesize) && rx_flow_is_on(cf_sk)) {
		set_rx_flow_off(cf_sk);
146
		net_dbg_ratelimited("sending flow OFF due to rmem_schedule\n");
147
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165
	}
	skb->dev = NULL;
	skb_set_owner_r(skb, sk);
	/* Cache the SKB length before we tack it onto the receive
	 * queue. Once it is added it no longer belongs to us and
	 * may be freed by other threads of control pulling packets
	 * from the queue.
	 */
	skb_len = skb->len;
	spin_lock_irqsave(&list->lock, flags);
	if (!sock_flag(sk, SOCK_DEAD))
		__skb_queue_tail(list, skb);
	spin_unlock_irqrestore(&list->lock, flags);

	if (!sock_flag(sk, SOCK_DEAD))
		sk->sk_data_ready(sk, skb_len);
	else
		kfree_skb(skb);
166 167 168
	return 0;
}

169 170
/* Packet Receive Callback function called from CAIF Stack */
static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
171 172
{
	struct caifsock *cf_sk;
173
	struct sk_buff *skb;
174 175

	cf_sk = container_of(layr, struct caifsock, layer);
176 177 178
	skb = cfpkt_tonative(pkt);

	if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
179
		kfree_skb(skb);
180 181 182 183 184
		return 0;
	}
	caif_queue_rcv_skb(&cf_sk->sk, skb);
	return 0;
}
185

186 187 188 189 190 191 192 193 194 195 196 197
static void cfsk_hold(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_hold(&cf_sk->sk);
}

static void cfsk_put(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_put(&cf_sk->sk);
}

198 199 200 201 202 203
/* Packet Control Callback function called from CAIF */
static void caif_ctrl_cb(struct cflayer *layr,
				enum caif_ctrlcmd flow,
				int phyid)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
204 205
	switch (flow) {
	case CAIF_CTRLCMD_FLOW_ON_IND:
206 207 208
		/* OK from modem to start sending again */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
209 210 211
		break;

	case CAIF_CTRLCMD_FLOW_OFF_IND:
212 213 214
		/* Modem asks us to shut up */
		set_tx_flow_off(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
215 216 217
		break;

	case CAIF_CTRLCMD_INIT_RSP:
218
		/* We're now connected */
219 220
		caif_client_register_refcnt(&cf_sk->layer,
						cfsk_hold, cfsk_put);
221 222
		cf_sk->sk.sk_state = CAIF_CONNECTED;
		set_tx_flow_on(cf_sk);
223
		cf_sk->sk.sk_shutdown = 0;
224
		cf_sk->sk.sk_state_change(&cf_sk->sk);
225 226 227
		break;

	case CAIF_CTRLCMD_DEINIT_RSP:
228 229 230
		/* We're now disconnected */
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_state_change(&cf_sk->sk);
231 232 233
		break;

	case CAIF_CTRLCMD_INIT_FAIL_RSP:
234 235 236 237 238 239 240 241 242 243
		/* Connect request failed */
		cf_sk->sk.sk_err = ECONNREFUSED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		/*
		 * Socket "standards" seems to require POLLOUT to
		 * be set at connect failure.
		 */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
244 245 246
		break;

	case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
247 248 249 250 251
		/* Modem has closed this connection, or device is down. */
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		cf_sk->sk.sk_err = ECONNRESET;
		set_rx_flow_on(cf_sk);
		cf_sk->sk.sk_error_report(&cf_sk->sk);
252 253 254
		break;

	default:
Joe Perches's avatar
Joe Perches committed
255
		pr_debug("Unexpected flow command %d\n", flow);
256 257 258
	}
}

259
static void caif_check_flow_release(struct sock *sk)
260
{
261
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
262

263 264
	if (rx_flow_is_on(cf_sk))
		return;
265

266 267
	if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
			set_rx_flow_on(cf_sk);
268
			caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
269 270
	}
}
271

272
/*
273 274
 * Copied from unix_dgram_recvmsg, but removed credit checks,
 * changed locking, address handling and added MSG_TRUNC.
275 276
 */
static int caif_seqpkt_recvmsg(struct kiocb *iocb, struct socket *sock,
277
				struct msghdr *m, size_t len, int flags)
278 279 280 281

{
	struct sock *sk = sock->sk;
	struct sk_buff *skb;
282 283
	int ret;
	int copylen;
284

285 286 287
	ret = -EOPNOTSUPP;
	if (m->msg_flags&MSG_OOB)
		goto read_error;
288

289 290
	skb = skb_recv_datagram(sk, flags, 0 , &ret);
	if (!skb)
291
		goto read_error;
292 293 294 295
	copylen = skb->len;
	if (len < copylen) {
		m->msg_flags |= MSG_TRUNC;
		copylen = len;
296 297
	}

298
	ret = skb_copy_datagram_iovec(skb, 0, m->msg_iov, copylen);
299
	if (ret)
300
		goto out_free;
301

302 303
	ret = (flags & MSG_TRUNC) ? skb->len : copylen;
out_free:
304 305
	skb_free_datagram(sk, skb);
	caif_check_flow_release(sk);
306
	return ret;
307

308 309 310
read_error:
	return ret;
}
311 312


313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329
/* Copied from unix_stream_wait_data, identical except for lock call. */
static long caif_stream_data_wait(struct sock *sk, long timeo)
{
	DEFINE_WAIT(wait);
	lock_sock(sk);

	for (;;) {
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);

		if (!skb_queue_empty(&sk->sk_receive_queue) ||
			sk->sk_err ||
			sk->sk_state != CAIF_CONNECTED ||
			sock_flag(sk, SOCK_DEAD) ||
			(sk->sk_shutdown & RCV_SHUTDOWN) ||
			signal_pending(current) ||
			!timeo)
			break;
330

331 332 333 334 335
		set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock(sk);
		clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
336 337
	}

338 339 340 341
	finish_wait(sk_sleep(sk), &wait);
	release_sock(sk);
	return timeo;
}
342 343


344 345 346 347 348 349 350 351 352 353 354 355 356
/*
 * Copied from unix_stream_recvmsg, but removed credit checks,
 * changed locking calls, changed address handling.
 */
static int caif_stream_recvmsg(struct kiocb *iocb, struct socket *sock,
				struct msghdr *msg, size_t size,
				int flags)
{
	struct sock *sk = sock->sk;
	int copied = 0;
	int target;
	int err = 0;
	long timeo;
357

358 359 360
	err = -EOPNOTSUPP;
	if (flags&MSG_OOB)
		goto out;
361

362
	msg->msg_namelen = 0;
363

364 365 366 367 368 369 370
	/*
	 * Lock the socket to prevent queue disordering
	 * while sleeps in memcpy_tomsg
	 */
	err = -EAGAIN;
	if (sk->sk_state == CAIF_CONNECTING)
		goto out;
371

372 373 374
	caif_read_lock(sk);
	target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
	timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
375

376 377 378
	do {
		int chunk;
		struct sk_buff *skb;
379

380 381 382
		lock_sock(sk);
		skb = skb_dequeue(&sk->sk_receive_queue);
		caif_check_flow_release(sk);
383

384 385 386 387 388 389 390 391 392 393 394 395
		if (skb == NULL) {
			if (copied >= target)
				goto unlock;
			/*
			 *	POSIX 1003.1g mandates this order.
			 */
			err = sock_error(sk);
			if (err)
				goto unlock;
			err = -ECONNRESET;
			if (sk->sk_shutdown & RCV_SHUTDOWN)
				goto unlock;
396

397 398 399 400 401
			err = -EPIPE;
			if (sk->sk_state != CAIF_CONNECTED)
				goto unlock;
			if (sock_flag(sk, SOCK_DEAD))
				goto unlock;
402

403
			release_sock(sk);
404

405 406 407
			err = -EAGAIN;
			if (!timeo)
				break;
408

409
			caif_read_unlock(sk);
410

411
			timeo = caif_stream_data_wait(sk, timeo);
412

413 414 415 416 417 418 419 420 421
			if (signal_pending(current)) {
				err = sock_intr_errno(timeo);
				goto out;
			}
			caif_read_lock(sk);
			continue;
unlock:
			release_sock(sk);
			break;
422
		}
423 424 425 426 427 428 429 430 431 432
		release_sock(sk);
		chunk = min_t(unsigned int, skb->len, size);
		if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) {
			skb_queue_head(&sk->sk_receive_queue, skb);
			if (copied == 0)
				copied = -EFAULT;
			break;
		}
		copied += chunk;
		size -= chunk;
433

434 435 436
		/* Mark read part of skb as used */
		if (!(flags & MSG_PEEK)) {
			skb_pull(skb, chunk);
437

438 439 440 441 442 443
			/* put the skb back if we didn't use it up. */
			if (skb->len) {
				skb_queue_head(&sk->sk_receive_queue, skb);
				break;
			}
			kfree_skb(skb);
444 445

		} else {
446 447 448 449 450 451
			/*
			 * It is questionable, see note in unix_dgram_recvmsg.
			 */
			/* put message back and return */
			skb_queue_head(&sk->sk_receive_queue, skb);
			break;
452
		}
453 454
	} while (size);
	caif_read_unlock(sk);
455

456 457 458
out:
	return copied ? : err;
}
459

460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490
/*
 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
 * CAIF flow-on and sock_writable.
 */
static long caif_wait_for_flow_on(struct caifsock *cf_sk,
				int wait_writeable, long timeo, int *err)
{
	struct sock *sk = &cf_sk->sk;
	DEFINE_WAIT(wait);
	for (;;) {
		*err = 0;
		if (tx_flow_is_on(cf_sk) &&
			(!wait_writeable || sock_writeable(&cf_sk->sk)))
			break;
		*err = -ETIMEDOUT;
		if (!timeo)
			break;
		*err = -ERESTARTSYS;
		if (signal_pending(current))
			break;
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
		*err = -ECONNRESET;
		if (sk->sk_shutdown & SHUTDOWN_MASK)
			break;
		*err = -sk->sk_err;
		if (sk->sk_err)
			break;
		*err = -EPIPE;
		if (cf_sk->sk.sk_state != CAIF_CONNECTED)
			break;
		timeo = schedule_timeout(timeo);
491
	}
492 493 494
	finish_wait(sk_sleep(sk), &wait);
	return timeo;
}
495

496 497 498 499 500 501 502 503
/*
 * Transmit a SKB. The device may temporarily request re-transmission
 * by returning EAGAIN.
 */
static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
			int noblock, long timeo)
{
	struct cfpkt *pkt;
504

505
	pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
506
	memset(skb->cb, 0, sizeof(struct caif_payload_info));
507
	cfpkt_set_prio(pkt, cf_sk->sk.sk_priority);
508

509 510
	if (cf_sk->layer.dn == NULL) {
		kfree_skb(skb);
511
		return -EINVAL;
512
	}
513

514
	return cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
515
}
516

517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
static int caif_seqpkt_sendmsg(struct kiocb *kiocb, struct socket *sock,
			struct msghdr *msg, size_t len)
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int buffer_size;
	int ret = 0;
	struct sk_buff *skb = NULL;
	int noblock;
	long timeo;
	caif_assert(cf_sk);
	ret = sock_error(sk);
	if (ret)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_flags&MSG_OOB)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_namelen)
		goto err;

	ret = -EINVAL;
	if (unlikely(msg->msg_iov->iov_base == NULL))
		goto err;
	noblock = msg->msg_flags & MSG_DONTWAIT;

	timeo = sock_sndtimeo(sk, noblock);
	timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
				1, timeo, &ret);

550 551
	if (ret)
		goto err;
552 553 554 555 556 557
	ret = -EPIPE;
	if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
		sock_flag(sk, SOCK_DEAD) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		goto err;

558 559 560 561 562 563 564
	/* Error if trying to write more than maximum frame size. */
	ret = -EMSGSIZE;
	if (len > cf_sk->maxframe && cf_sk->sk.sk_protocol != CAIFPROTO_RFM)
		goto err;

	buffer_size = len + cf_sk->headroom + cf_sk->tailroom;

565 566
	ret = -ENOMEM;
	skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
567 568

	if (!skb || skb_tailroom(skb) < buffer_size)
569
		goto err;
570 571

	skb_reserve(skb, cf_sk->headroom);
572 573 574 575 576 577 578

	ret = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);

	if (ret)
		goto err;
	ret = transmit_skb(skb, cf_sk, noblock, timeo);
	if (ret < 0)
579 580 581
		/* skb is already freed */
		return ret;

582 583 584 585 586
	return len;
err:
	kfree_skb(skb);
	return ret;
}
587

588 589 590 591 592 593 594 595 596 597 598 599 600 601
/*
 * Copied from unix_stream_sendmsg and adapted to CAIF:
 * Changed removed permission handling and added waiting for flow on
 * and other minor adaptations.
 */
static int caif_stream_sendmsg(struct kiocb *kiocb, struct socket *sock,
				struct msghdr *msg, size_t len)
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int err, size;
	struct sk_buff *skb;
	int sent = 0;
	long timeo;
602

603 604 605
	err = -EOPNOTSUPP;
	if (unlikely(msg->msg_flags&MSG_OOB))
		goto out_err;
606

607 608
	if (unlikely(msg->msg_namelen))
		goto out_err;
609

610 611
	timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
	timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
612

613 614
	if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
		goto pipe_err;
615

616
	while (sent < len) {
617

618
		size = len-sent;
619

620 621
		if (size > cf_sk->maxframe)
			size = cf_sk->maxframe;
622

623 624 625
		/* If size is more than half of sndbuf, chop up message */
		if (size > ((sk->sk_sndbuf >> 1) - 64))
			size = (sk->sk_sndbuf >> 1) - 64;
626

627 628
		if (size > SKB_MAX_ALLOC)
			size = SKB_MAX_ALLOC;
629

630
		skb = sock_alloc_send_skb(sk,
631 632
					size + cf_sk->headroom +
					cf_sk->tailroom,
633 634 635 636
					msg->msg_flags&MSG_DONTWAIT,
					&err);
		if (skb == NULL)
			goto out_err;
637

638
		skb_reserve(skb, cf_sk->headroom);
639 640 641 642 643 644 645 646
		/*
		 *	If you pass two values to the sock_alloc_send_skb
		 *	it tries to grab the large buffer with GFP_NOFS
		 *	(which can fail easily), and if it fails grab the
		 *	fallback size buffer which is under a page and will
		 *	succeed. [Alan]
		 */
		size = min_t(int, size, skb_tailroom(skb));
647

648 649 650 651 652 653 654
		err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
		if (err) {
			kfree_skb(skb);
			goto out_err;
		}
		err = transmit_skb(skb, cf_sk,
				msg->msg_flags&MSG_DONTWAIT, timeo);
655 656
		if (err < 0)
			/* skb is already freed */
657
			goto pipe_err;
658

659
		sent += size;
660 661
	}

662
	return sent;
663

664 665 666 667 668 669
pipe_err:
	if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
		send_sig(SIGPIPE, current, 0);
	err = -EPIPE;
out_err:
	return sent ? : err;
670 671 672 673 674 675 676
}

static int setsockopt(struct socket *sock,
			int lvl, int opt, char __user *ov, unsigned int ol)
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
677
	int linksel;
678

679
	if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
680
		return -ENOPROTOOPT;
681

682 683
	switch (opt) {
	case CAIFSO_LINK_SELECT:
684
		if (ol < sizeof(int))
685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700
			return -EINVAL;
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (copy_from_user(&linksel, ov, sizeof(int)))
			return -EINVAL;
		lock_sock(&(cf_sk->sk));
		cf_sk->conn_req.link_selector = linksel;
		release_sock(&cf_sk->sk);
		return 0;

	case CAIFSO_REQ_PARAM:
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
			return -ENOPROTOOPT;
		lock_sock(&(cf_sk->sk));
701 702
		if (ol > sizeof(cf_sk->conn_req.param.data) ||
			copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) {
703 704 705
			release_sock(&cf_sk->sk);
			return -EINVAL;
		}
706
		cf_sk->conn_req.param.size = ol;
707 708 709 710
		release_sock(&cf_sk->sk);
		return 0;

	default:
711
		return -ENOPROTOOPT;
712 713 714 715 716 717 718 719
	}

	return 0;
bad_sol:
	return -ENOPROTOOPT;

}

720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745
/*
 * caif_connect() - Connect a CAIF Socket
 * Copied and modified af_irda.c:irda_connect().
 *
 * Note : by consulting "errno", the user space caller may learn the cause
 * of the failure. Most of them are visible in the function, others may come
 * from subroutines called and are listed here :
 *  o -EAFNOSUPPORT: bad socket family or type.
 *  o -ESOCKTNOSUPPORT: bad socket type or protocol
 *  o -EINVAL: bad socket address, or CAIF link type
 *  o -ECONNREFUSED: remote end refused the connection.
 *  o -EINPROGRESS: connect request sent but timed out (or non-blocking)
 *  o -EISCONN: already connected.
 *  o -ETIMEDOUT: Connection timed out (send timeout)
 *  o -ENODEV: No link layer to send request
 *  o -ECONNRESET: Received Shutdown indication or lost link layer
 *  o -ENOMEM: Out of memory
 *
 *  State Strategy:
 *  o sk_state: holds the CAIF_* protocol state, it's updated by
 *	caif_ctrl_cb.
 *  o sock->state: holds the SS_* socket state and is updated by connect and
 *	disconnect.
 */
static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
			int addr_len, int flags)
746 747
{
	struct sock *sk = sock->sk;
748 749 750
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	long timeo;
	int err;
751
	int ifindex, headroom, tailroom;
752
	unsigned int mtu;
753 754
	struct net_device *dev;

755
	lock_sock(sk);
756

757 758
	err = -EAFNOSUPPORT;
	if (uaddr->sa_family != AF_CAIF)
759 760
		goto out;

761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786
	switch (sock->state) {
	case SS_UNCONNECTED:
		/* Normal case, a fresh connect */
		caif_assert(sk->sk_state == CAIF_DISCONNECTED);
		break;
	case SS_CONNECTING:
		switch (sk->sk_state) {
		case CAIF_CONNECTED:
			sock->state = SS_CONNECTED;
			err = -EISCONN;
			goto out;
		case CAIF_DISCONNECTED:
			/* Reconnect allowed */
			break;
		case CAIF_CONNECTING:
			err = -EALREADY;
			if (flags & O_NONBLOCK)
				goto out;
			goto wait_connect;
		}
		break;
	case SS_CONNECTED:
		caif_assert(sk->sk_state == CAIF_CONNECTED ||
				sk->sk_state == CAIF_DISCONNECTED);
		if (sk->sk_shutdown & SHUTDOWN_MASK) {
			/* Allow re-connect after SHUTDOWN_IND */
787
			caif_disconnect_client(sock_net(sk), &cf_sk->layer);
788
			caif_free_client(&cf_sk->layer);
789 790 791 792 793 794 795 796 797
			break;
		}
		/* No reconnect on a seqpacket socket */
		err = -EISCONN;
		goto out;
	case SS_DISCONNECTING:
	case SS_FREE:
		caif_assert(1); /*Should never happen */
		break;
798
	}
799 800 801
	sk->sk_state = CAIF_DISCONNECTED;
	sock->state = SS_UNCONNECTED;
	sk_stream_kill_queues(&cf_sk->sk);
802

803
	err = -EINVAL;
804
	if (addr_len != sizeof(struct sockaddr_caif))
805
		goto out;
806

807
	memcpy(&cf_sk->conn_req.sockaddr, uaddr,
808 809
		sizeof(struct sockaddr_caif));

810 811 812 813
	/* Move to connecting socket, start sending Connect Requests */
	sock->state = SS_CONNECTING;
	sk->sk_state = CAIF_CONNECTING;

814
	/* Check priority value comming from socket */
815 816 817 818 819 820 821 822 823 824 825
	/* if priority value is out of range it will be ajusted */
	if (cf_sk->sk.sk_priority > CAIF_PRIO_MAX)
		cf_sk->conn_req.priority = CAIF_PRIO_MAX;
	else if (cf_sk->sk.sk_priority < CAIF_PRIO_MIN)
		cf_sk->conn_req.priority = CAIF_PRIO_MIN;
	else
		cf_sk->conn_req.priority = cf_sk->sk.sk_priority;

	/*ifindex = id of the interface.*/
	cf_sk->conn_req.ifindex = cf_sk->sk.sk_bound_dev_if;

826
	cf_sk->layer.receive = caif_sktrecv_cb;
827

828
	err = caif_connect_client(sock_net(sk), &cf_sk->conn_req,
829
				&cf_sk->layer, &ifindex, &headroom, &tailroom);
830

831 832 833 834
	if (err < 0) {
		cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		goto out;
835
	}
836 837 838 839 840 841 842 843

	err = -ENODEV;
	rcu_read_lock();
	dev = dev_get_by_index_rcu(sock_net(sk), ifindex);
	if (!dev) {
		rcu_read_unlock();
		goto out;
	}
844
	cf_sk->headroom = LL_RESERVED_SPACE_EXTRA(dev, headroom);
845 846 847
	mtu = dev->mtu;
	rcu_read_unlock();

848
	cf_sk->tailroom = tailroom;
849
	cf_sk->maxframe = mtu - (headroom + tailroom);
850
	if (cf_sk->maxframe < 1) {
Joe Perches's avatar
Joe Perches committed
851
		pr_warn("CAIF Interface MTU too small (%d)\n", dev->mtu);
852
		err = -ENODEV;
853 854
		goto out;
	}
855

856 857
	err = -EINPROGRESS;
wait_connect:
858

859 860
	if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
		goto out;
861

862 863 864
	timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);

	release_sock(sk);
865 866
	err = -ERESTARTSYS;
	timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
867 868 869
			sk->sk_state != CAIF_CONNECTING,
			timeo);
	lock_sock(sk);
870
	if (timeo < 0)
871
		goto out; /* -ERESTARTSYS */
872

873 874 875
	err = -ETIMEDOUT;
	if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
		goto out;
876 877 878 879 880 881 882 883 884
	if (sk->sk_state != CAIF_CONNECTED) {
		sock->state = SS_UNCONNECTED;
		err = sock_error(sk);
		if (!err)
			err = -ECONNREFUSED;
		goto out;
	}
	sock->state = SS_CONNECTED;
	err = 0;
885
out:
886 887
	release_sock(sk);
	return err;
888 889
}

890 891 892 893 894
/*
 * caif_release() - Disconnect a CAIF Socket
 * Copied and modified af_irda.c:irda_release().
 */
static int caif_release(struct socket *sock)
895 896
{
	struct sock *sk = sock->sk;
897
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
898

899 900
	if (!sk)
		return 0;
901

902
	set_tx_flow_off(cf_sk);
903 904

	/*
905 906 907
	 * Ensure that packets are not queued after this point in time.
	 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
	 * this ensures no packets when sock is dead.
908
	 */
909
	spin_lock_bh(&sk->sk_receive_queue.lock);
910
	sock_set_flag(sk, SOCK_DEAD);
911
	spin_unlock_bh(&sk->sk_receive_queue.lock);
912
	sock->sk = NULL;
913

914
	WARN_ON(IS_ERR(cf_sk->debugfs_socket_dir));
915 916 917 918
	if (cf_sk->debugfs_socket_dir != NULL)
		debugfs_remove_recursive(cf_sk->debugfs_socket_dir);

	lock_sock(&(cf_sk->sk));
919 920
	sk->sk_state = CAIF_DISCONNECTED;
	sk->sk_shutdown = SHUTDOWN_MASK;
921

922
	caif_disconnect_client(sock_net(sk), &cf_sk->layer);
923 924
	cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
	wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP);
925

926 927 928 929
	sock_orphan(sk);
	sk_stream_kill_queues(&cf_sk->sk);
	release_sock(sk);
	sock_put(sk);
930
	return 0;
931
}
932

933 934 935 936 937 938 939
/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
static unsigned int caif_poll(struct file *file,
				struct socket *sock, poll_table *wait)
{
	struct sock *sk = sock->sk;
	unsigned int mask;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
940

941 942
	sock_poll_wait(file, sk_sleep(sk), wait);
	mask = 0;
943

944 945 946 947 948 949 950
	/* exceptional events? */
	if (sk->sk_err)
		mask |= POLLERR;
	if (sk->sk_shutdown == SHUTDOWN_MASK)
		mask |= POLLHUP;
	if (sk->sk_shutdown & RCV_SHUTDOWN)
		mask |= POLLRDHUP;
951

952 953 954 955
	/* readable? */
	if (!skb_queue_empty(&sk->sk_receive_queue) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		mask |= POLLIN | POLLRDNORM;
956 957

	/*
958 959
	 * we set writable also when the other side has shut down the
	 * connection. This prevents stuck sockets.
960
	 */
961 962 963 964
	if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
		mask |= POLLOUT | POLLWRNORM | POLLWRBAND;

	return mask;
965 966
}

967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988
static const struct proto_ops caif_seqpacket_ops = {
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
	.shutdown = sock_no_shutdown,
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
	.sendmsg = caif_seqpkt_sendmsg,
	.recvmsg = caif_seqpkt_recvmsg,
	.mmap = sock_no_mmap,
	.sendpage = sock_no_sendpage,
};

static const struct proto_ops caif_stream_ops = {
989 990 991 992 993 994 995 996 997 998 999
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
1000
	.shutdown = sock_no_shutdown,
1001 1002
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
1003 1004
	.sendmsg = caif_stream_sendmsg,
	.recvmsg = caif_stream_recvmsg,
1005
	.mmap = sock_no_mmap,
1006
	.sendpage = sock_no_sendpage,
1007 1008 1009 1010 1011
};

/* This function is called when a socket is finally destroyed. */
static void caif_sock_destructor(struct sock *sk)
{
1012
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
1013 1014 1015 1016
	caif_assert(!atomic_read(&sk->sk_wmem_alloc));
	caif_assert(sk_unhashed(sk));
	caif_assert(!sk->sk_socket);
	if (!sock_flag(sk, SOCK_DEAD)) {
1017
		pr_debug("Attempt to release alive CAIF socket: %p\n", sk);
1018 1019
		return;
	}
1020
	sk_stream_kill_queues(&cf_sk->sk);
1021
	caif_free_client(&cf_sk->layer);
1022 1023 1024
}

static int caif_create(struct net *net, struct socket *sock, int protocol,
1025
			int kern)
1026 1027 1028 1029 1030 1031 1032 1033
{
	struct sock *sk = NULL;
	struct caifsock *cf_sk = NULL;
	static struct proto prot = {.name = "PF_CAIF",
		.owner = THIS_MODULE,
		.obj_size = sizeof(struct caifsock),
	};

1034 1035
	if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
		return -EPERM;
1036 1037
	/*
	 * The sock->type specifies the socket type to use.
1038 1039 1040
	 * The CAIF socket is a packet stream in the sense
	 * that it is packet based. CAIF trusts the reliability
	 * of the link, no resending is implemented.
1041
	 */
1042 1043 1044 1045 1046
	if (sock->type == SOCK_SEQPACKET)
		sock->ops = &caif_seqpacket_ops;
	else if (sock->type == SOCK_STREAM)
		sock->ops = &caif_stream_ops;
	else
1047 1048 1049 1050 1051
		return -ESOCKTNOSUPPORT;

	if (protocol < 0 || protocol >= CAIFPROTO_MAX)
		return -EPROTONOSUPPORT;
	/*
1052 1053
	 * Set the socket state to unconnected.	 The socket state
	 * is really not used at all in the net/core or socket.c but the
1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064
	 * initialization makes sure that sock->state is not uninitialized.
	 */
	sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot);
	if (!sk)
		return -ENOMEM;

	cf_sk = container_of(sk, struct caifsock, sk);

	/* Store the protocol */
	sk->sk_protocol = (unsigned char) protocol;

1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076
	/* Initialize default priority for well-known cases */
	switch (protocol) {
	case CAIFPROTO_AT:
		sk->sk_priority = TC_PRIO_CONTROL;
		break;
	case CAIFPROTO_RFM:
		sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
		break;
	default:
		sk->sk_priority = TC_PRIO_BESTEFFORT;
	}

1077 1078 1079 1080 1081 1082 1083 1084 1085 1086
	/*
	 * Lock in order to try to stop someone from opening the socket
	 * too early.
	 */
	lock_sock(&(cf_sk->sk));

	/* Initialize the nozero default sock structure data. */
	sock_init_data(sock, sk);
	sk->sk_destruct = caif_sock_destructor;

1087 1088 1089 1090
	mutex_init(&cf_sk->readlock); /* single task reading lock */
	cf_sk->layer.ctrlcmd = caif_ctrl_cb;
	cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
	cf_sk->sk.sk_state = CAIF_DISCONNECTED;
1091

1092 1093
	set_tx_flow_off(cf_sk);
	set_rx_flow_on(cf_sk);
1094 1095

	/* Set default options on configuration */
1096
	cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
1097 1098 1099 1100 1101
	cf_sk->conn_req.protocol = protocol;
	release_sock(&cf_sk->sk);
	return 0;
}

1102

1103 1104 1105 1106 1107 1108
static struct net_proto_family caif_family_ops = {
	.family = PF_CAIF,
	.create = caif_create,
	.owner = THIS_MODULE,
};

1109
static int __init caif_sktinit_module(void)
1110
{
1111
	int err = sock_register(&caif_family_ops);
1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122
	if (!err)
		return err;
	return 0;
}

static void __exit caif_sktexit_module(void)
{
	sock_unregister(PF_CAIF);
}
module_init(caif_sktinit_module);
module_exit(caif_sktexit_module);