caif_socket.c 26.5 KB
Newer Older
1 2
/*
 * Copyright (C) ST-Ericsson AB 2010
3
 * Author:	Sjur Brendeland
4 5 6
 * License terms: GNU General Public License (GPL) version 2
 */

Joe Perches's avatar
Joe Perches committed
7 8
#define pr_fmt(fmt) KBUILD_MODNAME ":%s(): " fmt, __func__

9 10 11 12 13 14 15 16 17 18 19
#include <linux/fs.h>
#include <linux/init.h>
#include <linux/module.h>
#include <linux/sched.h>
#include <linux/spinlock.h>
#include <linux/mutex.h>
#include <linux/list.h>
#include <linux/wait.h>
#include <linux/poll.h>
#include <linux/tcp.h>
#include <linux/uaccess.h>
20
#include <linux/debugfs.h>
21
#include <linux/caif/caif_socket.h>
22
#include <linux/pkt_sched.h>
23 24
#include <net/sock.h>
#include <net/tcp_states.h>
25 26 27 28 29
#include <net/caif/caif_layer.h>
#include <net/caif/caif_dev.h>
#include <net/caif/cfpkt.h>

MODULE_LICENSE("GPL");
30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
MODULE_ALIAS_NETPROTO(AF_CAIF);

/*
 * CAIF state is re-using the TCP socket states.
 * caif_states stored in sk_state reflect the state as reported by
 * the CAIF stack, while sk_socket->state is the state of the socket.
 */
enum caif_states {
	CAIF_CONNECTED		= TCP_ESTABLISHED,
	CAIF_CONNECTING	= TCP_SYN_SENT,
	CAIF_DISCONNECTED	= TCP_CLOSE
};

#define TX_FLOW_ON_BIT	1
#define RX_FLOW_ON_BIT	2
45 46

struct caifsock {
47
	struct sock sk; /* must be first member */
48 49 50
	struct cflayer layer;
	u32 flow_state;
	struct caif_connect_request conn_req;
51
	struct mutex readlock;
52
	struct dentry *debugfs_socket_dir;
53
	int headroom, tailroom, maxframe;
54 55
};

56 57 58 59 60 61 62 63 64 65 66
static int rx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}

static int tx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(TX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
67

68
static void set_rx_flow_off(struct caifsock *cf_sk)
69
{
70 71 72
	 clear_bit(RX_FLOW_ON_BIT,
		 (void *) &cf_sk->flow_state);
}
73

74 75 76 77 78
static void set_rx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
79

80 81 82 83 84
static void set_tx_flow_off(struct caifsock *cf_sk)
{
	 clear_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
85

86 87 88 89 90
static void set_tx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
91

92 93 94 95 96 97
static void caif_read_lock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_lock(&cf_sk->readlock);
}
98

99 100 101 102 103 104
static void caif_read_unlock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_unlock(&cf_sk->readlock);
}
105

106
static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
107 108 109 110
{
	/* A quarter of full buffer is used a low water mark */
	return cf_sk->sk.sk_rcvbuf / 4;
}
111

112
static void caif_flow_ctrl(struct sock *sk, int mode)
113 114 115
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
116
	if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
117 118
		cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
}
119

120 121 122 123
/*
 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
 * not dropped, but CAIF is sending flow off instead.
 */
124
static int caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
125 126 127 128 129
{
	int err;
	unsigned long flags;
	struct sk_buff_head *list = &sk->sk_receive_queue;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
130

131
	if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
132
		(unsigned int)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
133 134 135
		net_dbg_ratelimited("sending flow OFF (queue len = %d %d)\n",
				    atomic_read(&cf_sk->sk.sk_rmem_alloc),
				    sk_rcvbuf_lowwater(cf_sk));
136
		set_rx_flow_off(cf_sk);
137
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
138
	}
139

140 141 142
	err = sk_filter(sk, skb);
	if (err)
		return err;
143
	if (!sk_rmem_schedule(sk, skb, skb->truesize) && rx_flow_is_on(cf_sk)) {
144
		set_rx_flow_off(cf_sk);
145
		net_dbg_ratelimited("sending flow OFF due to rmem_schedule\n");
146
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
147 148 149 150 151 152 153 154 155 156 157 158 159 160
	}
	skb->dev = NULL;
	skb_set_owner_r(skb, sk);
	/* Cache the SKB length before we tack it onto the receive
	 * queue. Once it is added it no longer belongs to us and
	 * may be freed by other threads of control pulling packets
	 * from the queue.
	 */
	spin_lock_irqsave(&list->lock, flags);
	if (!sock_flag(sk, SOCK_DEAD))
		__skb_queue_tail(list, skb);
	spin_unlock_irqrestore(&list->lock, flags);

	if (!sock_flag(sk, SOCK_DEAD))
161
		sk->sk_data_ready(sk);
162 163
	else
		kfree_skb(skb);
164 165 166
	return 0;
}

167 168
/* Packet Receive Callback function called from CAIF Stack */
static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
169 170
{
	struct caifsock *cf_sk;
171
	struct sk_buff *skb;
172 173

	cf_sk = container_of(layr, struct caifsock, layer);
174 175 176
	skb = cfpkt_tonative(pkt);

	if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
177
		kfree_skb(skb);
178 179 180 181 182
		return 0;
	}
	caif_queue_rcv_skb(&cf_sk->sk, skb);
	return 0;
}
183

184 185 186 187 188 189 190 191 192 193 194 195
static void cfsk_hold(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_hold(&cf_sk->sk);
}

static void cfsk_put(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_put(&cf_sk->sk);
}

196 197
/* Packet Control Callback function called from CAIF */
static void caif_ctrl_cb(struct cflayer *layr,
198 199
			 enum caif_ctrlcmd flow,
			 int phyid)
200 201
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
202 203
	switch (flow) {
	case CAIF_CTRLCMD_FLOW_ON_IND:
204 205 206
		/* OK from modem to start sending again */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
207 208 209
		break;

	case CAIF_CTRLCMD_FLOW_OFF_IND:
210 211 212
		/* Modem asks us to shut up */
		set_tx_flow_off(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
213 214 215
		break;

	case CAIF_CTRLCMD_INIT_RSP:
216
		/* We're now connected */
217 218
		caif_client_register_refcnt(&cf_sk->layer,
						cfsk_hold, cfsk_put);
219 220
		cf_sk->sk.sk_state = CAIF_CONNECTED;
		set_tx_flow_on(cf_sk);
221
		cf_sk->sk.sk_shutdown = 0;
222
		cf_sk->sk.sk_state_change(&cf_sk->sk);
223 224 225
		break;

	case CAIF_CTRLCMD_DEINIT_RSP:
226 227 228
		/* We're now disconnected */
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_state_change(&cf_sk->sk);
229 230 231
		break;

	case CAIF_CTRLCMD_INIT_FAIL_RSP:
232 233 234 235 236 237 238 239 240 241
		/* Connect request failed */
		cf_sk->sk.sk_err = ECONNREFUSED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		/*
		 * Socket "standards" seems to require POLLOUT to
		 * be set at connect failure.
		 */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
242 243 244
		break;

	case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
245 246 247 248 249
		/* Modem has closed this connection, or device is down. */
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		cf_sk->sk.sk_err = ECONNRESET;
		set_rx_flow_on(cf_sk);
		cf_sk->sk.sk_error_report(&cf_sk->sk);
250 251 252
		break;

	default:
Joe Perches's avatar
Joe Perches committed
253
		pr_debug("Unexpected flow command %d\n", flow);
254 255 256
	}
}

257
static void caif_check_flow_release(struct sock *sk)
258
{
259
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
260

261 262
	if (rx_flow_is_on(cf_sk))
		return;
263

264 265
	if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
			set_rx_flow_on(cf_sk);
266
			caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
267 268
	}
}
269

270
/*
271 272
 * Copied from unix_dgram_recvmsg, but removed credit checks,
 * changed locking, address handling and added MSG_TRUNC.
273
 */
274 275
static int caif_seqpkt_recvmsg(struct socket *sock, struct msghdr *m,
			       size_t len, int flags)
276 277 278 279

{
	struct sock *sk = sock->sk;
	struct sk_buff *skb;
280 281
	int ret;
	int copylen;
282

283
	ret = -EOPNOTSUPP;
284
	if (flags & MSG_OOB)
285
		goto read_error;
286

287 288
	skb = skb_recv_datagram(sk, flags, 0 , &ret);
	if (!skb)
289
		goto read_error;
290 291 292 293
	copylen = skb->len;
	if (len < copylen) {
		m->msg_flags |= MSG_TRUNC;
		copylen = len;
294 295
	}

296
	ret = skb_copy_datagram_msg(skb, 0, m, copylen);
297
	if (ret)
298
		goto out_free;
299

300 301
	ret = (flags & MSG_TRUNC) ? skb->len : copylen;
out_free:
302 303
	skb_free_datagram(sk, skb);
	caif_check_flow_release(sk);
304
	return ret;
305

306 307 308
read_error:
	return ret;
}
309 310


311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327
/* Copied from unix_stream_wait_data, identical except for lock call. */
static long caif_stream_data_wait(struct sock *sk, long timeo)
{
	DEFINE_WAIT(wait);
	lock_sock(sk);

	for (;;) {
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);

		if (!skb_queue_empty(&sk->sk_receive_queue) ||
			sk->sk_err ||
			sk->sk_state != CAIF_CONNECTED ||
			sock_flag(sk, SOCK_DEAD) ||
			(sk->sk_shutdown & RCV_SHUTDOWN) ||
			signal_pending(current) ||
			!timeo)
			break;
328

329 330 331 332 333
		set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock(sk);
		clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
334 335
	}

336 337 338 339
	finish_wait(sk_sleep(sk), &wait);
	release_sock(sk);
	return timeo;
}
340 341


342 343 344 345
/*
 * Copied from unix_stream_recvmsg, but removed credit checks,
 * changed locking calls, changed address handling.
 */
346 347
static int caif_stream_recvmsg(struct socket *sock, struct msghdr *msg,
			       size_t size, int flags)
348 349 350 351 352 353
{
	struct sock *sk = sock->sk;
	int copied = 0;
	int target;
	int err = 0;
	long timeo;
354

355 356 357
	err = -EOPNOTSUPP;
	if (flags&MSG_OOB)
		goto out;
358

359 360 361 362 363 364 365
	/*
	 * Lock the socket to prevent queue disordering
	 * while sleeps in memcpy_tomsg
	 */
	err = -EAGAIN;
	if (sk->sk_state == CAIF_CONNECTING)
		goto out;
366

367 368 369
	caif_read_lock(sk);
	target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
	timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
370

371 372 373
	do {
		int chunk;
		struct sk_buff *skb;
374

375 376 377
		lock_sock(sk);
		skb = skb_dequeue(&sk->sk_receive_queue);
		caif_check_flow_release(sk);
378

379 380 381 382 383 384 385 386 387 388 389 390
		if (skb == NULL) {
			if (copied >= target)
				goto unlock;
			/*
			 *	POSIX 1003.1g mandates this order.
			 */
			err = sock_error(sk);
			if (err)
				goto unlock;
			err = -ECONNRESET;
			if (sk->sk_shutdown & RCV_SHUTDOWN)
				goto unlock;
391

392 393 394 395 396
			err = -EPIPE;
			if (sk->sk_state != CAIF_CONNECTED)
				goto unlock;
			if (sock_flag(sk, SOCK_DEAD))
				goto unlock;
397

398
			release_sock(sk);
399

400 401 402
			err = -EAGAIN;
			if (!timeo)
				break;
403

404
			caif_read_unlock(sk);
405

406
			timeo = caif_stream_data_wait(sk, timeo);
407

408 409 410 411 412 413 414 415 416
			if (signal_pending(current)) {
				err = sock_intr_errno(timeo);
				goto out;
			}
			caif_read_lock(sk);
			continue;
unlock:
			release_sock(sk);
			break;
417
		}
418 419
		release_sock(sk);
		chunk = min_t(unsigned int, skb->len, size);
Al Viro's avatar
Al Viro committed
420
		if (memcpy_to_msg(msg, skb->data, chunk)) {
421 422 423 424 425 426 427
			skb_queue_head(&sk->sk_receive_queue, skb);
			if (copied == 0)
				copied = -EFAULT;
			break;
		}
		copied += chunk;
		size -= chunk;
428

429 430 431
		/* Mark read part of skb as used */
		if (!(flags & MSG_PEEK)) {
			skb_pull(skb, chunk);
432

433 434 435 436 437 438
			/* put the skb back if we didn't use it up. */
			if (skb->len) {
				skb_queue_head(&sk->sk_receive_queue, skb);
				break;
			}
			kfree_skb(skb);
439 440

		} else {
441 442 443 444 445 446
			/*
			 * It is questionable, see note in unix_dgram_recvmsg.
			 */
			/* put message back and return */
			skb_queue_head(&sk->sk_receive_queue, skb);
			break;
447
		}
448 449
	} while (size);
	caif_read_unlock(sk);
450

451 452 453
out:
	return copied ? : err;
}
454

455 456 457 458 459
/*
 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
 * CAIF flow-on and sock_writable.
 */
static long caif_wait_for_flow_on(struct caifsock *cf_sk,
460
				  int wait_writeable, long timeo, int *err)
461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
{
	struct sock *sk = &cf_sk->sk;
	DEFINE_WAIT(wait);
	for (;;) {
		*err = 0;
		if (tx_flow_is_on(cf_sk) &&
			(!wait_writeable || sock_writeable(&cf_sk->sk)))
			break;
		*err = -ETIMEDOUT;
		if (!timeo)
			break;
		*err = -ERESTARTSYS;
		if (signal_pending(current))
			break;
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
		*err = -ECONNRESET;
		if (sk->sk_shutdown & SHUTDOWN_MASK)
			break;
		*err = -sk->sk_err;
		if (sk->sk_err)
			break;
		*err = -EPIPE;
		if (cf_sk->sk.sk_state != CAIF_CONNECTED)
			break;
		timeo = schedule_timeout(timeo);
486
	}
487 488 489
	finish_wait(sk_sleep(sk), &wait);
	return timeo;
}
490

491 492 493 494 495 496 497 498
/*
 * Transmit a SKB. The device may temporarily request re-transmission
 * by returning EAGAIN.
 */
static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
			int noblock, long timeo)
{
	struct cfpkt *pkt;
499

500
	pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
501
	memset(skb->cb, 0, sizeof(struct caif_payload_info));
502
	cfpkt_set_prio(pkt, cf_sk->sk.sk_priority);
503

504 505
	if (cf_sk->layer.dn == NULL) {
		kfree_skb(skb);
506
		return -EINVAL;
507
	}
508

509
	return cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
510
}
511

512
/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
513 514
static int caif_seqpkt_sendmsg(struct socket *sock, struct msghdr *msg,
			       size_t len)
515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int buffer_size;
	int ret = 0;
	struct sk_buff *skb = NULL;
	int noblock;
	long timeo;
	caif_assert(cf_sk);
	ret = sock_error(sk);
	if (ret)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_flags&MSG_OOB)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_namelen)
		goto err;

	ret = -EINVAL;
Al Viro's avatar
Al Viro committed
537
	if (unlikely(msg->msg_iter.iov->iov_base == NULL))
538 539 540 541 542 543 544
		goto err;
	noblock = msg->msg_flags & MSG_DONTWAIT;

	timeo = sock_sndtimeo(sk, noblock);
	timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
				1, timeo, &ret);

545 546
	if (ret)
		goto err;
547 548 549 550 551 552
	ret = -EPIPE;
	if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
		sock_flag(sk, SOCK_DEAD) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		goto err;

553 554 555 556 557 558 559
	/* Error if trying to write more than maximum frame size. */
	ret = -EMSGSIZE;
	if (len > cf_sk->maxframe && cf_sk->sk.sk_protocol != CAIFPROTO_RFM)
		goto err;

	buffer_size = len + cf_sk->headroom + cf_sk->tailroom;

560 561
	ret = -ENOMEM;
	skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
562 563

	if (!skb || skb_tailroom(skb) < buffer_size)
564
		goto err;
565 566

	skb_reserve(skb, cf_sk->headroom);
567

Al Viro's avatar
Al Viro committed
568
	ret = memcpy_from_msg(skb_put(skb, len), msg, len);
569 570 571 572 573

	if (ret)
		goto err;
	ret = transmit_skb(skb, cf_sk, noblock, timeo);
	if (ret < 0)
574 575 576
		/* skb is already freed */
		return ret;

577 578 579 580 581
	return len;
err:
	kfree_skb(skb);
	return ret;
}
582

583 584 585 586 587
/*
 * Copied from unix_stream_sendmsg and adapted to CAIF:
 * Changed removed permission handling and added waiting for flow on
 * and other minor adaptations.
 */
588 589
static int caif_stream_sendmsg(struct socket *sock, struct msghdr *msg,
			       size_t len)
590 591 592 593 594 595 596
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int err, size;
	struct sk_buff *skb;
	int sent = 0;
	long timeo;
597

598 599 600
	err = -EOPNOTSUPP;
	if (unlikely(msg->msg_flags&MSG_OOB))
		goto out_err;
601

602 603
	if (unlikely(msg->msg_namelen))
		goto out_err;
604

605 606
	timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
	timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
607

608 609
	if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
		goto pipe_err;
610

611
	while (sent < len) {
612

613
		size = len-sent;
614

615 616
		if (size > cf_sk->maxframe)
			size = cf_sk->maxframe;
617

618 619 620
		/* If size is more than half of sndbuf, chop up message */
		if (size > ((sk->sk_sndbuf >> 1) - 64))
			size = (sk->sk_sndbuf >> 1) - 64;
621

622 623
		if (size > SKB_MAX_ALLOC)
			size = SKB_MAX_ALLOC;
624

625
		skb = sock_alloc_send_skb(sk,
626 627
					size + cf_sk->headroom +
					cf_sk->tailroom,
628 629 630 631
					msg->msg_flags&MSG_DONTWAIT,
					&err);
		if (skb == NULL)
			goto out_err;
632

633
		skb_reserve(skb, cf_sk->headroom);
634 635 636 637 638 639 640 641
		/*
		 *	If you pass two values to the sock_alloc_send_skb
		 *	it tries to grab the large buffer with GFP_NOFS
		 *	(which can fail easily), and if it fails grab the
		 *	fallback size buffer which is under a page and will
		 *	succeed. [Alan]
		 */
		size = min_t(int, size, skb_tailroom(skb));
642

Al Viro's avatar
Al Viro committed
643
		err = memcpy_from_msg(skb_put(skb, size), msg, size);
644 645 646 647 648 649
		if (err) {
			kfree_skb(skb);
			goto out_err;
		}
		err = transmit_skb(skb, cf_sk,
				msg->msg_flags&MSG_DONTWAIT, timeo);
650 651
		if (err < 0)
			/* skb is already freed */
652
			goto pipe_err;
653

654
		sent += size;
655 656
	}

657
	return sent;
658

659 660 661 662 663 664
pipe_err:
	if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
		send_sig(SIGPIPE, current, 0);
	err = -EPIPE;
out_err:
	return sent ? : err;
665 666 667
}

static int setsockopt(struct socket *sock,
668
		      int lvl, int opt, char __user *ov, unsigned int ol)
669 670 671
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
672
	int linksel;
673

674
	if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
675
		return -ENOPROTOOPT;
676

677 678
	switch (opt) {
	case CAIFSO_LINK_SELECT:
679
		if (ol < sizeof(int))
680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695
			return -EINVAL;
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (copy_from_user(&linksel, ov, sizeof(int)))
			return -EINVAL;
		lock_sock(&(cf_sk->sk));
		cf_sk->conn_req.link_selector = linksel;
		release_sock(&cf_sk->sk);
		return 0;

	case CAIFSO_REQ_PARAM:
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
			return -ENOPROTOOPT;
		lock_sock(&(cf_sk->sk));
696 697
		if (ol > sizeof(cf_sk->conn_req.param.data) ||
			copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) {
698 699 700
			release_sock(&cf_sk->sk);
			return -EINVAL;
		}
701
		cf_sk->conn_req.param.size = ol;
702 703 704 705
		release_sock(&cf_sk->sk);
		return 0;

	default:
706
		return -ENOPROTOOPT;
707 708 709 710 711 712 713 714
	}

	return 0;
bad_sol:
	return -ENOPROTOOPT;

}

715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740
/*
 * caif_connect() - Connect a CAIF Socket
 * Copied and modified af_irda.c:irda_connect().
 *
 * Note : by consulting "errno", the user space caller may learn the cause
 * of the failure. Most of them are visible in the function, others may come
 * from subroutines called and are listed here :
 *  o -EAFNOSUPPORT: bad socket family or type.
 *  o -ESOCKTNOSUPPORT: bad socket type or protocol
 *  o -EINVAL: bad socket address, or CAIF link type
 *  o -ECONNREFUSED: remote end refused the connection.
 *  o -EINPROGRESS: connect request sent but timed out (or non-blocking)
 *  o -EISCONN: already connected.
 *  o -ETIMEDOUT: Connection timed out (send timeout)
 *  o -ENODEV: No link layer to send request
 *  o -ECONNRESET: Received Shutdown indication or lost link layer
 *  o -ENOMEM: Out of memory
 *
 *  State Strategy:
 *  o sk_state: holds the CAIF_* protocol state, it's updated by
 *	caif_ctrl_cb.
 *  o sock->state: holds the SS_* socket state and is updated by connect and
 *	disconnect.
 */
static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
			int addr_len, int flags)
741 742
{
	struct sock *sk = sock->sk;
743 744 745
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	long timeo;
	int err;
746
	int ifindex, headroom, tailroom;
747
	unsigned int mtu;
748 749
	struct net_device *dev;

750
	lock_sock(sk);
751

752 753
	err = -EAFNOSUPPORT;
	if (uaddr->sa_family != AF_CAIF)
754 755
		goto out;

756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781
	switch (sock->state) {
	case SS_UNCONNECTED:
		/* Normal case, a fresh connect */
		caif_assert(sk->sk_state == CAIF_DISCONNECTED);
		break;
	case SS_CONNECTING:
		switch (sk->sk_state) {
		case CAIF_CONNECTED:
			sock->state = SS_CONNECTED;
			err = -EISCONN;
			goto out;
		case CAIF_DISCONNECTED:
			/* Reconnect allowed */
			break;
		case CAIF_CONNECTING:
			err = -EALREADY;
			if (flags & O_NONBLOCK)
				goto out;
			goto wait_connect;
		}
		break;
	case SS_CONNECTED:
		caif_assert(sk->sk_state == CAIF_CONNECTED ||
				sk->sk_state == CAIF_DISCONNECTED);
		if (sk->sk_shutdown & SHUTDOWN_MASK) {
			/* Allow re-connect after SHUTDOWN_IND */
782
			caif_disconnect_client(sock_net(sk), &cf_sk->layer);
783
			caif_free_client(&cf_sk->layer);
784 785 786 787 788 789 790 791 792
			break;
		}
		/* No reconnect on a seqpacket socket */
		err = -EISCONN;
		goto out;
	case SS_DISCONNECTING:
	case SS_FREE:
		caif_assert(1); /*Should never happen */
		break;
793
	}
794 795 796
	sk->sk_state = CAIF_DISCONNECTED;
	sock->state = SS_UNCONNECTED;
	sk_stream_kill_queues(&cf_sk->sk);
797

798
	err = -EINVAL;
799
	if (addr_len != sizeof(struct sockaddr_caif))
800
		goto out;
801

802
	memcpy(&cf_sk->conn_req.sockaddr, uaddr,
803 804
		sizeof(struct sockaddr_caif));

805 806 807 808
	/* Move to connecting socket, start sending Connect Requests */
	sock->state = SS_CONNECTING;
	sk->sk_state = CAIF_CONNECTING;

809
	/* Check priority value comming from socket */
810 811 812 813 814 815 816 817 818 819 820
	/* if priority value is out of range it will be ajusted */
	if (cf_sk->sk.sk_priority > CAIF_PRIO_MAX)
		cf_sk->conn_req.priority = CAIF_PRIO_MAX;
	else if (cf_sk->sk.sk_priority < CAIF_PRIO_MIN)
		cf_sk->conn_req.priority = CAIF_PRIO_MIN;
	else
		cf_sk->conn_req.priority = cf_sk->sk.sk_priority;

	/*ifindex = id of the interface.*/
	cf_sk->conn_req.ifindex = cf_sk->sk.sk_bound_dev_if;

821
	cf_sk->layer.receive = caif_sktrecv_cb;
822

823
	err = caif_connect_client(sock_net(sk), &cf_sk->conn_req,
824
				&cf_sk->layer, &ifindex, &headroom, &tailroom);
825

826 827 828 829
	if (err < 0) {
		cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		goto out;
830
	}
831 832 833 834 835 836 837 838

	err = -ENODEV;
	rcu_read_lock();
	dev = dev_get_by_index_rcu(sock_net(sk), ifindex);
	if (!dev) {
		rcu_read_unlock();
		goto out;
	}
839
	cf_sk->headroom = LL_RESERVED_SPACE_EXTRA(dev, headroom);
840 841 842
	mtu = dev->mtu;
	rcu_read_unlock();

843
	cf_sk->tailroom = tailroom;
844
	cf_sk->maxframe = mtu - (headroom + tailroom);
845
	if (cf_sk->maxframe < 1) {
Joe Perches's avatar
Joe Perches committed
846
		pr_warn("CAIF Interface MTU too small (%d)\n", dev->mtu);
847
		err = -ENODEV;
848 849
		goto out;
	}
850

851 852
	err = -EINPROGRESS;
wait_connect:
853

854 855
	if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
		goto out;
856

857 858 859
	timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);

	release_sock(sk);
860 861
	err = -ERESTARTSYS;
	timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
862 863 864
			sk->sk_state != CAIF_CONNECTING,
			timeo);
	lock_sock(sk);
865
	if (timeo < 0)
866
		goto out; /* -ERESTARTSYS */
867

868 869 870
	err = -ETIMEDOUT;
	if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
		goto out;
871 872 873 874 875 876 877 878 879
	if (sk->sk_state != CAIF_CONNECTED) {
		sock->state = SS_UNCONNECTED;
		err = sock_error(sk);
		if (!err)
			err = -ECONNREFUSED;
		goto out;
	}
	sock->state = SS_CONNECTED;
	err = 0;
880
out:
881 882
	release_sock(sk);
	return err;
883 884
}

885 886 887 888 889
/*
 * caif_release() - Disconnect a CAIF Socket
 * Copied and modified af_irda.c:irda_release().
 */
static int caif_release(struct socket *sock)
890 891
{
	struct sock *sk = sock->sk;
892
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
893

894 895
	if (!sk)
		return 0;
896

897
	set_tx_flow_off(cf_sk);
898 899

	/*
900 901 902
	 * Ensure that packets are not queued after this point in time.
	 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
	 * this ensures no packets when sock is dead.
903
	 */
904
	spin_lock_bh(&sk->sk_receive_queue.lock);
905
	sock_set_flag(sk, SOCK_DEAD);
906
	spin_unlock_bh(&sk->sk_receive_queue.lock);
907
	sock->sk = NULL;
908

909
	WARN_ON(IS_ERR(cf_sk->debugfs_socket_dir));
910
	debugfs_remove_recursive(cf_sk->debugfs_socket_dir);
911 912

	lock_sock(&(cf_sk->sk));
913 914
	sk->sk_state = CAIF_DISCONNECTED;
	sk->sk_shutdown = SHUTDOWN_MASK;
915

916
	caif_disconnect_client(sock_net(sk), &cf_sk->layer);
917 918
	cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
	wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP);
919

920 921 922 923
	sock_orphan(sk);
	sk_stream_kill_queues(&cf_sk->sk);
	release_sock(sk);
	sock_put(sk);
924
	return 0;
925
}
926

927 928
/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
static unsigned int caif_poll(struct file *file,
929
			      struct socket *sock, poll_table *wait)
930 931 932 933
{
	struct sock *sk = sock->sk;
	unsigned int mask;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
934

935 936
	sock_poll_wait(file, sk_sleep(sk), wait);
	mask = 0;
937

938 939 940 941 942 943 944
	/* exceptional events? */
	if (sk->sk_err)
		mask |= POLLERR;
	if (sk->sk_shutdown == SHUTDOWN_MASK)
		mask |= POLLHUP;
	if (sk->sk_shutdown & RCV_SHUTDOWN)
		mask |= POLLRDHUP;
945

946 947 948 949
	/* readable? */
	if (!skb_queue_empty(&sk->sk_receive_queue) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		mask |= POLLIN | POLLRDNORM;
950 951

	/*
952 953
	 * we set writable also when the other side has shut down the
	 * connection. This prevents stuck sockets.
954
	 */
955 956 957 958
	if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
		mask |= POLLOUT | POLLWRNORM | POLLWRBAND;

	return mask;
959 960
}

961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982
static const struct proto_ops caif_seqpacket_ops = {
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
	.shutdown = sock_no_shutdown,
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
	.sendmsg = caif_seqpkt_sendmsg,
	.recvmsg = caif_seqpkt_recvmsg,
	.mmap = sock_no_mmap,
	.sendpage = sock_no_sendpage,
};

static const struct proto_ops caif_stream_ops = {
983 984 985 986 987 988 989 990 991 992 993
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
994
	.shutdown = sock_no_shutdown,
995 996
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
997 998
	.sendmsg = caif_stream_sendmsg,
	.recvmsg = caif_stream_recvmsg,
999
	.mmap = sock_no_mmap,
1000
	.sendpage = sock_no_sendpage,
1001 1002 1003 1004 1005
};

/* This function is called when a socket is finally destroyed. */
static void caif_sock_destructor(struct sock *sk)
{
1006
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
1007 1008 1009 1010
	caif_assert(!atomic_read(&sk->sk_wmem_alloc));
	caif_assert(sk_unhashed(sk));
	caif_assert(!sk->sk_socket);
	if (!sock_flag(sk, SOCK_DEAD)) {
1011
		pr_debug("Attempt to release alive CAIF socket: %p\n", sk);
1012 1013
		return;
	}
1014
	sk_stream_kill_queues(&cf_sk->sk);
1015
	caif_free_client(&cf_sk->layer);
1016 1017 1018
}

static int caif_create(struct net *net, struct socket *sock, int protocol,
1019
		       int kern)
1020 1021 1022 1023 1024 1025 1026 1027
{
	struct sock *sk = NULL;
	struct caifsock *cf_sk = NULL;
	static struct proto prot = {.name = "PF_CAIF",
		.owner = THIS_MODULE,
		.obj_size = sizeof(struct caifsock),
	};

1028 1029
	if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
		return -EPERM;
1030 1031
	/*
	 * The sock->type specifies the socket type to use.
1032 1033 1034
	 * The CAIF socket is a packet stream in the sense
	 * that it is packet based. CAIF trusts the reliability
	 * of the link, no resending is implemented.
1035
	 */
1036 1037 1038 1039 1040
	if (sock->type == SOCK_SEQPACKET)
		sock->ops = &caif_seqpacket_ops;
	else if (sock->type == SOCK_STREAM)
		sock->ops = &caif_stream_ops;
	else
1041 1042 1043 1044 1045
		return -ESOCKTNOSUPPORT;

	if (protocol < 0 || protocol >= CAIFPROTO_MAX)
		return -EPROTONOSUPPORT;
	/*
1046 1047
	 * Set the socket state to unconnected.	 The socket state
	 * is really not used at all in the net/core or socket.c but the
1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058
	 * initialization makes sure that sock->state is not uninitialized.
	 */
	sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot);
	if (!sk)
		return -ENOMEM;

	cf_sk = container_of(sk, struct caifsock, sk);

	/* Store the protocol */
	sk->sk_protocol = (unsigned char) protocol;

1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070
	/* Initialize default priority for well-known cases */
	switch (protocol) {
	case CAIFPROTO_AT:
		sk->sk_priority = TC_PRIO_CONTROL;
		break;
	case CAIFPROTO_RFM:
		sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
		break;
	default:
		sk->sk_priority = TC_PRIO_BESTEFFORT;
	}

1071 1072 1073 1074 1075 1076 1077 1078 1079 1080
	/*
	 * Lock in order to try to stop someone from opening the socket
	 * too early.
	 */
	lock_sock(&(cf_sk->sk));

	/* Initialize the nozero default sock structure data. */
	sock_init_data(sock, sk);
	sk->sk_destruct = caif_sock_destructor;

1081 1082 1083 1084
	mutex_init(&cf_sk->readlock); /* single task reading lock */
	cf_sk->layer.ctrlcmd = caif_ctrl_cb;
	cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
	cf_sk->sk.sk_state = CAIF_DISCONNECTED;
1085

1086 1087
	set_tx_flow_off(cf_sk);
	set_rx_flow_on(cf_sk);
1088 1089

	/* Set default options on configuration */
1090
	cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
1091 1092 1093 1094 1095
	cf_sk->conn_req.protocol = protocol;
	release_sock(&cf_sk->sk);
	return 0;
}

1096

1097 1098 1099 1100 1101 1102
static struct net_proto_family caif_family_ops = {
	.family = PF_CAIF,
	.create = caif_create,
	.owner = THIS_MODULE,
};

1103
static int __init caif_sktinit_module(void)
1104
{
1105
	int err = sock_register(&caif_family_ops);
1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116
	if (!err)
		return err;
	return 0;
}

static void __exit caif_sktexit_module(void)
{
	sock_unregister(PF_CAIF);
}
module_init(caif_sktinit_module);
module_exit(caif_sktexit_module);