caif_socket.c 26.6 KB
Newer Older
1 2
/*
 * Copyright (C) ST-Ericsson AB 2010
3
 * Author:	Sjur Brendeland
4 5 6
 * License terms: GNU General Public License (GPL) version 2
 */

Joe Perches's avatar
Joe Perches committed
7 8
#define pr_fmt(fmt) KBUILD_MODNAME ":%s(): " fmt, __func__

9 10 11 12 13 14 15 16 17 18 19
#include <linux/fs.h>
#include <linux/init.h>
#include <linux/module.h>
#include <linux/sched.h>
#include <linux/spinlock.h>
#include <linux/mutex.h>
#include <linux/list.h>
#include <linux/wait.h>
#include <linux/poll.h>
#include <linux/tcp.h>
#include <linux/uaccess.h>
20
#include <linux/debugfs.h>
21
#include <linux/caif/caif_socket.h>
22
#include <linux/pkt_sched.h>
23 24
#include <net/sock.h>
#include <net/tcp_states.h>
25 26 27 28 29
#include <net/caif/caif_layer.h>
#include <net/caif/caif_dev.h>
#include <net/caif/cfpkt.h>

MODULE_LICENSE("GPL");
30 31 32 33 34 35 36 37 38 39 40 41 42 43 44
MODULE_ALIAS_NETPROTO(AF_CAIF);

/*
 * CAIF state is re-using the TCP socket states.
 * caif_states stored in sk_state reflect the state as reported by
 * the CAIF stack, while sk_socket->state is the state of the socket.
 */
enum caif_states {
	CAIF_CONNECTED		= TCP_ESTABLISHED,
	CAIF_CONNECTING	= TCP_SYN_SENT,
	CAIF_DISCONNECTED	= TCP_CLOSE
};

#define TX_FLOW_ON_BIT	1
#define RX_FLOW_ON_BIT	2
45 46

struct caifsock {
47
	struct sock sk; /* must be first member */
48 49 50
	struct cflayer layer;
	u32 flow_state;
	struct caif_connect_request conn_req;
51
	struct mutex readlock;
52
	struct dentry *debugfs_socket_dir;
53
	int headroom, tailroom, maxframe;
54 55
};

56 57 58 59 60 61 62 63 64 65 66
static int rx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}

static int tx_flow_is_on(struct caifsock *cf_sk)
{
	return test_bit(TX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
67

68
static void set_rx_flow_off(struct caifsock *cf_sk)
69
{
70 71 72
	 clear_bit(RX_FLOW_ON_BIT,
		 (void *) &cf_sk->flow_state);
}
73

74 75 76 77 78
static void set_rx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(RX_FLOW_ON_BIT,
			(void *) &cf_sk->flow_state);
}
79

80 81 82 83 84
static void set_tx_flow_off(struct caifsock *cf_sk)
{
	 clear_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
85

86 87 88 89 90
static void set_tx_flow_on(struct caifsock *cf_sk)
{
	 set_bit(TX_FLOW_ON_BIT,
		(void *) &cf_sk->flow_state);
}
91

92 93 94 95 96 97
static void caif_read_lock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_lock(&cf_sk->readlock);
}
98

99 100 101 102 103 104
static void caif_read_unlock(struct sock *sk)
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
	mutex_unlock(&cf_sk->readlock);
}
105

106
static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
107 108 109 110
{
	/* A quarter of full buffer is used a low water mark */
	return cf_sk->sk.sk_rcvbuf / 4;
}
111

112
static void caif_flow_ctrl(struct sock *sk, int mode)
113 114 115
{
	struct caifsock *cf_sk;
	cf_sk = container_of(sk, struct caifsock, sk);
116
	if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
117 118
		cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
}
119

120 121 122 123
/*
 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
 * not dropped, but CAIF is sending flow off instead.
 */
124
static int caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
125 126 127 128 129
{
	int err;
	unsigned long flags;
	struct sk_buff_head *list = &sk->sk_receive_queue;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
130

131
	if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
132
		(unsigned int)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
133 134 135
		net_dbg_ratelimited("sending flow OFF (queue len = %d %d)\n",
				    atomic_read(&cf_sk->sk.sk_rmem_alloc),
				    sk_rcvbuf_lowwater(cf_sk));
136
		set_rx_flow_off(cf_sk);
137
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
138
	}
139

140 141 142
	err = sk_filter(sk, skb);
	if (err)
		return err;
143
	if (!sk_rmem_schedule(sk, skb, skb->truesize) && rx_flow_is_on(cf_sk)) {
144
		set_rx_flow_off(cf_sk);
145
		net_dbg_ratelimited("sending flow OFF due to rmem_schedule\n");
146
		caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
147 148 149 150 151 152 153 154 155 156 157 158 159 160
	}
	skb->dev = NULL;
	skb_set_owner_r(skb, sk);
	/* Cache the SKB length before we tack it onto the receive
	 * queue. Once it is added it no longer belongs to us and
	 * may be freed by other threads of control pulling packets
	 * from the queue.
	 */
	spin_lock_irqsave(&list->lock, flags);
	if (!sock_flag(sk, SOCK_DEAD))
		__skb_queue_tail(list, skb);
	spin_unlock_irqrestore(&list->lock, flags);

	if (!sock_flag(sk, SOCK_DEAD))
161
		sk->sk_data_ready(sk);
162 163
	else
		kfree_skb(skb);
164 165 166
	return 0;
}

167 168
/* Packet Receive Callback function called from CAIF Stack */
static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
169 170
{
	struct caifsock *cf_sk;
171
	struct sk_buff *skb;
172 173

	cf_sk = container_of(layr, struct caifsock, layer);
174 175 176
	skb = cfpkt_tonative(pkt);

	if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
177
		kfree_skb(skb);
178 179 180 181 182
		return 0;
	}
	caif_queue_rcv_skb(&cf_sk->sk, skb);
	return 0;
}
183

184 185 186 187 188 189 190 191 192 193 194 195
static void cfsk_hold(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_hold(&cf_sk->sk);
}

static void cfsk_put(struct cflayer *layr)
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
	sock_put(&cf_sk->sk);
}

196 197
/* Packet Control Callback function called from CAIF */
static void caif_ctrl_cb(struct cflayer *layr,
198 199
			 enum caif_ctrlcmd flow,
			 int phyid)
200 201
{
	struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
202 203
	switch (flow) {
	case CAIF_CTRLCMD_FLOW_ON_IND:
204 205 206
		/* OK from modem to start sending again */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
207 208 209
		break;

	case CAIF_CTRLCMD_FLOW_OFF_IND:
210 211 212
		/* Modem asks us to shut up */
		set_tx_flow_off(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
213 214 215
		break;

	case CAIF_CTRLCMD_INIT_RSP:
216
		/* We're now connected */
217 218
		caif_client_register_refcnt(&cf_sk->layer,
						cfsk_hold, cfsk_put);
219 220
		cf_sk->sk.sk_state = CAIF_CONNECTED;
		set_tx_flow_on(cf_sk);
221
		cf_sk->sk.sk_shutdown = 0;
222
		cf_sk->sk.sk_state_change(&cf_sk->sk);
223 224 225
		break;

	case CAIF_CTRLCMD_DEINIT_RSP:
226 227 228
		/* We're now disconnected */
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_state_change(&cf_sk->sk);
229 230 231
		break;

	case CAIF_CTRLCMD_INIT_FAIL_RSP:
232 233 234 235 236 237 238 239 240 241
		/* Connect request failed */
		cf_sk->sk.sk_err = ECONNREFUSED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		/*
		 * Socket "standards" seems to require POLLOUT to
		 * be set at connect failure.
		 */
		set_tx_flow_on(cf_sk);
		cf_sk->sk.sk_state_change(&cf_sk->sk);
242 243 244
		break;

	case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
245 246 247 248 249
		/* Modem has closed this connection, or device is down. */
		cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
		cf_sk->sk.sk_err = ECONNRESET;
		set_rx_flow_on(cf_sk);
		cf_sk->sk.sk_error_report(&cf_sk->sk);
250 251 252
		break;

	default:
Joe Perches's avatar
Joe Perches committed
253
		pr_debug("Unexpected flow command %d\n", flow);
254 255 256
	}
}

257
static void caif_check_flow_release(struct sock *sk)
258
{
259
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
260

261 262
	if (rx_flow_is_on(cf_sk))
		return;
263

264 265
	if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
			set_rx_flow_on(cf_sk);
266
			caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
267 268
	}
}
269

270
/*
271 272
 * Copied from unix_dgram_recvmsg, but removed credit checks,
 * changed locking, address handling and added MSG_TRUNC.
273
 */
274 275
static int caif_seqpkt_recvmsg(struct socket *sock, struct msghdr *m,
			       size_t len, int flags)
276 277 278 279

{
	struct sock *sk = sock->sk;
	struct sk_buff *skb;
280 281
	int ret;
	int copylen;
282

283
	ret = -EOPNOTSUPP;
284
	if (flags & MSG_OOB)
285
		goto read_error;
286

287 288
	skb = skb_recv_datagram(sk, flags, 0 , &ret);
	if (!skb)
289
		goto read_error;
290 291 292 293
	copylen = skb->len;
	if (len < copylen) {
		m->msg_flags |= MSG_TRUNC;
		copylen = len;
294 295
	}

296
	ret = skb_copy_datagram_msg(skb, 0, m, copylen);
297
	if (ret)
298
		goto out_free;
299

300 301
	ret = (flags & MSG_TRUNC) ? skb->len : copylen;
out_free:
302 303
	skb_free_datagram(sk, skb);
	caif_check_flow_release(sk);
304
	return ret;
305

306 307 308
read_error:
	return ret;
}
309 310


311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327
/* Copied from unix_stream_wait_data, identical except for lock call. */
static long caif_stream_data_wait(struct sock *sk, long timeo)
{
	DEFINE_WAIT(wait);
	lock_sock(sk);

	for (;;) {
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);

		if (!skb_queue_empty(&sk->sk_receive_queue) ||
			sk->sk_err ||
			sk->sk_state != CAIF_CONNECTED ||
			sock_flag(sk, SOCK_DEAD) ||
			(sk->sk_shutdown & RCV_SHUTDOWN) ||
			signal_pending(current) ||
			!timeo)
			break;
328

329 330 331 332
		set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock(sk);
333 334 335 336

		if (sock_flag(sk, SOCK_DEAD))
			break;

337
		clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
338 339
	}

340 341 342 343
	finish_wait(sk_sleep(sk), &wait);
	release_sock(sk);
	return timeo;
}
344 345


346 347 348 349
/*
 * Copied from unix_stream_recvmsg, but removed credit checks,
 * changed locking calls, changed address handling.
 */
350 351
static int caif_stream_recvmsg(struct socket *sock, struct msghdr *msg,
			       size_t size, int flags)
352 353 354 355 356 357
{
	struct sock *sk = sock->sk;
	int copied = 0;
	int target;
	int err = 0;
	long timeo;
358

359 360 361
	err = -EOPNOTSUPP;
	if (flags&MSG_OOB)
		goto out;
362

363 364 365 366 367 368 369
	/*
	 * Lock the socket to prevent queue disordering
	 * while sleeps in memcpy_tomsg
	 */
	err = -EAGAIN;
	if (sk->sk_state == CAIF_CONNECTING)
		goto out;
370

371 372 373
	caif_read_lock(sk);
	target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
	timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
374

375 376 377
	do {
		int chunk;
		struct sk_buff *skb;
378

379
		lock_sock(sk);
380 381 382 383
		if (sock_flag(sk, SOCK_DEAD)) {
			err = -ECONNRESET;
			goto unlock;
		}
384 385
		skb = skb_dequeue(&sk->sk_receive_queue);
		caif_check_flow_release(sk);
386

387 388 389 390 391 392 393 394 395 396 397 398
		if (skb == NULL) {
			if (copied >= target)
				goto unlock;
			/*
			 *	POSIX 1003.1g mandates this order.
			 */
			err = sock_error(sk);
			if (err)
				goto unlock;
			err = -ECONNRESET;
			if (sk->sk_shutdown & RCV_SHUTDOWN)
				goto unlock;
399

400 401 402 403 404
			err = -EPIPE;
			if (sk->sk_state != CAIF_CONNECTED)
				goto unlock;
			if (sock_flag(sk, SOCK_DEAD))
				goto unlock;
405

406
			release_sock(sk);
407

408 409 410
			err = -EAGAIN;
			if (!timeo)
				break;
411

412
			caif_read_unlock(sk);
413

414
			timeo = caif_stream_data_wait(sk, timeo);
415

416 417 418 419 420 421 422 423 424
			if (signal_pending(current)) {
				err = sock_intr_errno(timeo);
				goto out;
			}
			caif_read_lock(sk);
			continue;
unlock:
			release_sock(sk);
			break;
425
		}
426 427
		release_sock(sk);
		chunk = min_t(unsigned int, skb->len, size);
Al Viro's avatar
Al Viro committed
428
		if (memcpy_to_msg(msg, skb->data, chunk)) {
429 430 431 432 433 434 435
			skb_queue_head(&sk->sk_receive_queue, skb);
			if (copied == 0)
				copied = -EFAULT;
			break;
		}
		copied += chunk;
		size -= chunk;
436

437 438 439
		/* Mark read part of skb as used */
		if (!(flags & MSG_PEEK)) {
			skb_pull(skb, chunk);
440

441 442 443 444 445 446
			/* put the skb back if we didn't use it up. */
			if (skb->len) {
				skb_queue_head(&sk->sk_receive_queue, skb);
				break;
			}
			kfree_skb(skb);
447 448

		} else {
449 450 451 452 453 454
			/*
			 * It is questionable, see note in unix_dgram_recvmsg.
			 */
			/* put message back and return */
			skb_queue_head(&sk->sk_receive_queue, skb);
			break;
455
		}
456 457
	} while (size);
	caif_read_unlock(sk);
458

459 460 461
out:
	return copied ? : err;
}
462

463 464 465 466 467
/*
 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
 * CAIF flow-on and sock_writable.
 */
static long caif_wait_for_flow_on(struct caifsock *cf_sk,
468
				  int wait_writeable, long timeo, int *err)
469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493
{
	struct sock *sk = &cf_sk->sk;
	DEFINE_WAIT(wait);
	for (;;) {
		*err = 0;
		if (tx_flow_is_on(cf_sk) &&
			(!wait_writeable || sock_writeable(&cf_sk->sk)))
			break;
		*err = -ETIMEDOUT;
		if (!timeo)
			break;
		*err = -ERESTARTSYS;
		if (signal_pending(current))
			break;
		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
		*err = -ECONNRESET;
		if (sk->sk_shutdown & SHUTDOWN_MASK)
			break;
		*err = -sk->sk_err;
		if (sk->sk_err)
			break;
		*err = -EPIPE;
		if (cf_sk->sk.sk_state != CAIF_CONNECTED)
			break;
		timeo = schedule_timeout(timeo);
494
	}
495 496 497
	finish_wait(sk_sleep(sk), &wait);
	return timeo;
}
498

499 500 501 502 503 504 505 506
/*
 * Transmit a SKB. The device may temporarily request re-transmission
 * by returning EAGAIN.
 */
static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
			int noblock, long timeo)
{
	struct cfpkt *pkt;
507

508
	pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
509
	memset(skb->cb, 0, sizeof(struct caif_payload_info));
510
	cfpkt_set_prio(pkt, cf_sk->sk.sk_priority);
511

512 513
	if (cf_sk->layer.dn == NULL) {
		kfree_skb(skb);
514
		return -EINVAL;
515
	}
516

517
	return cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
518
}
519

520
/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
521 522
static int caif_seqpkt_sendmsg(struct socket *sock, struct msghdr *msg,
			       size_t len)
523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int buffer_size;
	int ret = 0;
	struct sk_buff *skb = NULL;
	int noblock;
	long timeo;
	caif_assert(cf_sk);
	ret = sock_error(sk);
	if (ret)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_flags&MSG_OOB)
		goto err;

	ret = -EOPNOTSUPP;
	if (msg->msg_namelen)
		goto err;

	ret = -EINVAL;
Al Viro's avatar
Al Viro committed
545
	if (unlikely(msg->msg_iter.iov->iov_base == NULL))
546 547 548 549 550 551 552
		goto err;
	noblock = msg->msg_flags & MSG_DONTWAIT;

	timeo = sock_sndtimeo(sk, noblock);
	timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
				1, timeo, &ret);

553 554
	if (ret)
		goto err;
555 556 557 558 559 560
	ret = -EPIPE;
	if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
		sock_flag(sk, SOCK_DEAD) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		goto err;

561 562 563 564 565 566 567
	/* Error if trying to write more than maximum frame size. */
	ret = -EMSGSIZE;
	if (len > cf_sk->maxframe && cf_sk->sk.sk_protocol != CAIFPROTO_RFM)
		goto err;

	buffer_size = len + cf_sk->headroom + cf_sk->tailroom;

568 569
	ret = -ENOMEM;
	skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
570 571

	if (!skb || skb_tailroom(skb) < buffer_size)
572
		goto err;
573 574

	skb_reserve(skb, cf_sk->headroom);
575

Al Viro's avatar
Al Viro committed
576
	ret = memcpy_from_msg(skb_put(skb, len), msg, len);
577 578 579 580 581

	if (ret)
		goto err;
	ret = transmit_skb(skb, cf_sk, noblock, timeo);
	if (ret < 0)
582 583 584
		/* skb is already freed */
		return ret;

585 586 587 588 589
	return len;
err:
	kfree_skb(skb);
	return ret;
}
590

591 592 593 594 595
/*
 * Copied from unix_stream_sendmsg and adapted to CAIF:
 * Changed removed permission handling and added waiting for flow on
 * and other minor adaptations.
 */
596 597
static int caif_stream_sendmsg(struct socket *sock, struct msghdr *msg,
			       size_t len)
598 599 600 601 602 603 604
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	int err, size;
	struct sk_buff *skb;
	int sent = 0;
	long timeo;
605

606 607 608
	err = -EOPNOTSUPP;
	if (unlikely(msg->msg_flags&MSG_OOB))
		goto out_err;
609

610 611
	if (unlikely(msg->msg_namelen))
		goto out_err;
612

613 614
	timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
	timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
615

616 617
	if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
		goto pipe_err;
618

619
	while (sent < len) {
620

621
		size = len-sent;
622

623 624
		if (size > cf_sk->maxframe)
			size = cf_sk->maxframe;
625

626 627 628
		/* If size is more than half of sndbuf, chop up message */
		if (size > ((sk->sk_sndbuf >> 1) - 64))
			size = (sk->sk_sndbuf >> 1) - 64;
629

630 631
		if (size > SKB_MAX_ALLOC)
			size = SKB_MAX_ALLOC;
632

633
		skb = sock_alloc_send_skb(sk,
634 635
					size + cf_sk->headroom +
					cf_sk->tailroom,
636 637 638 639
					msg->msg_flags&MSG_DONTWAIT,
					&err);
		if (skb == NULL)
			goto out_err;
640

641
		skb_reserve(skb, cf_sk->headroom);
642 643 644 645 646 647 648 649
		/*
		 *	If you pass two values to the sock_alloc_send_skb
		 *	it tries to grab the large buffer with GFP_NOFS
		 *	(which can fail easily), and if it fails grab the
		 *	fallback size buffer which is under a page and will
		 *	succeed. [Alan]
		 */
		size = min_t(int, size, skb_tailroom(skb));
650

Al Viro's avatar
Al Viro committed
651
		err = memcpy_from_msg(skb_put(skb, size), msg, size);
652 653 654 655 656 657
		if (err) {
			kfree_skb(skb);
			goto out_err;
		}
		err = transmit_skb(skb, cf_sk,
				msg->msg_flags&MSG_DONTWAIT, timeo);
658 659
		if (err < 0)
			/* skb is already freed */
660
			goto pipe_err;
661

662
		sent += size;
663 664
	}

665
	return sent;
666

667 668 669 670 671 672
pipe_err:
	if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
		send_sig(SIGPIPE, current, 0);
	err = -EPIPE;
out_err:
	return sent ? : err;
673 674 675
}

static int setsockopt(struct socket *sock,
676
		      int lvl, int opt, char __user *ov, unsigned int ol)
677 678 679
{
	struct sock *sk = sock->sk;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
680
	int linksel;
681

682
	if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
683
		return -ENOPROTOOPT;
684

685 686
	switch (opt) {
	case CAIFSO_LINK_SELECT:
687
		if (ol < sizeof(int))
688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703
			return -EINVAL;
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (copy_from_user(&linksel, ov, sizeof(int)))
			return -EINVAL;
		lock_sock(&(cf_sk->sk));
		cf_sk->conn_req.link_selector = linksel;
		release_sock(&cf_sk->sk);
		return 0;

	case CAIFSO_REQ_PARAM:
		if (lvl != SOL_CAIF)
			goto bad_sol;
		if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
			return -ENOPROTOOPT;
		lock_sock(&(cf_sk->sk));
704 705
		if (ol > sizeof(cf_sk->conn_req.param.data) ||
			copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) {
706 707 708
			release_sock(&cf_sk->sk);
			return -EINVAL;
		}
709
		cf_sk->conn_req.param.size = ol;
710 711 712 713
		release_sock(&cf_sk->sk);
		return 0;

	default:
714
		return -ENOPROTOOPT;
715 716 717 718 719 720 721 722
	}

	return 0;
bad_sol:
	return -ENOPROTOOPT;

}

723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748
/*
 * caif_connect() - Connect a CAIF Socket
 * Copied and modified af_irda.c:irda_connect().
 *
 * Note : by consulting "errno", the user space caller may learn the cause
 * of the failure. Most of them are visible in the function, others may come
 * from subroutines called and are listed here :
 *  o -EAFNOSUPPORT: bad socket family or type.
 *  o -ESOCKTNOSUPPORT: bad socket type or protocol
 *  o -EINVAL: bad socket address, or CAIF link type
 *  o -ECONNREFUSED: remote end refused the connection.
 *  o -EINPROGRESS: connect request sent but timed out (or non-blocking)
 *  o -EISCONN: already connected.
 *  o -ETIMEDOUT: Connection timed out (send timeout)
 *  o -ENODEV: No link layer to send request
 *  o -ECONNRESET: Received Shutdown indication or lost link layer
 *  o -ENOMEM: Out of memory
 *
 *  State Strategy:
 *  o sk_state: holds the CAIF_* protocol state, it's updated by
 *	caif_ctrl_cb.
 *  o sock->state: holds the SS_* socket state and is updated by connect and
 *	disconnect.
 */
static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
			int addr_len, int flags)
749 750
{
	struct sock *sk = sock->sk;
751 752 753
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
	long timeo;
	int err;
754
	int ifindex, headroom, tailroom;
755
	unsigned int mtu;
756 757
	struct net_device *dev;

758
	lock_sock(sk);
759

760 761
	err = -EAFNOSUPPORT;
	if (uaddr->sa_family != AF_CAIF)
762 763
		goto out;

764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789
	switch (sock->state) {
	case SS_UNCONNECTED:
		/* Normal case, a fresh connect */
		caif_assert(sk->sk_state == CAIF_DISCONNECTED);
		break;
	case SS_CONNECTING:
		switch (sk->sk_state) {
		case CAIF_CONNECTED:
			sock->state = SS_CONNECTED;
			err = -EISCONN;
			goto out;
		case CAIF_DISCONNECTED:
			/* Reconnect allowed */
			break;
		case CAIF_CONNECTING:
			err = -EALREADY;
			if (flags & O_NONBLOCK)
				goto out;
			goto wait_connect;
		}
		break;
	case SS_CONNECTED:
		caif_assert(sk->sk_state == CAIF_CONNECTED ||
				sk->sk_state == CAIF_DISCONNECTED);
		if (sk->sk_shutdown & SHUTDOWN_MASK) {
			/* Allow re-connect after SHUTDOWN_IND */
790
			caif_disconnect_client(sock_net(sk), &cf_sk->layer);
791
			caif_free_client(&cf_sk->layer);
792 793 794 795 796 797 798 799 800
			break;
		}
		/* No reconnect on a seqpacket socket */
		err = -EISCONN;
		goto out;
	case SS_DISCONNECTING:
	case SS_FREE:
		caif_assert(1); /*Should never happen */
		break;
801
	}
802 803 804
	sk->sk_state = CAIF_DISCONNECTED;
	sock->state = SS_UNCONNECTED;
	sk_stream_kill_queues(&cf_sk->sk);
805

806
	err = -EINVAL;
807
	if (addr_len != sizeof(struct sockaddr_caif))
808
		goto out;
809

810
	memcpy(&cf_sk->conn_req.sockaddr, uaddr,
811 812
		sizeof(struct sockaddr_caif));

813 814 815 816
	/* Move to connecting socket, start sending Connect Requests */
	sock->state = SS_CONNECTING;
	sk->sk_state = CAIF_CONNECTING;

817
	/* Check priority value comming from socket */
818 819 820 821 822 823 824 825 826 827 828
	/* if priority value is out of range it will be ajusted */
	if (cf_sk->sk.sk_priority > CAIF_PRIO_MAX)
		cf_sk->conn_req.priority = CAIF_PRIO_MAX;
	else if (cf_sk->sk.sk_priority < CAIF_PRIO_MIN)
		cf_sk->conn_req.priority = CAIF_PRIO_MIN;
	else
		cf_sk->conn_req.priority = cf_sk->sk.sk_priority;

	/*ifindex = id of the interface.*/
	cf_sk->conn_req.ifindex = cf_sk->sk.sk_bound_dev_if;

829
	cf_sk->layer.receive = caif_sktrecv_cb;
830

831
	err = caif_connect_client(sock_net(sk), &cf_sk->conn_req,
832
				&cf_sk->layer, &ifindex, &headroom, &tailroom);
833

834 835 836 837
	if (err < 0) {
		cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
		cf_sk->sk.sk_state = CAIF_DISCONNECTED;
		goto out;
838
	}
839 840 841 842 843 844 845 846

	err = -ENODEV;
	rcu_read_lock();
	dev = dev_get_by_index_rcu(sock_net(sk), ifindex);
	if (!dev) {
		rcu_read_unlock();
		goto out;
	}
847
	cf_sk->headroom = LL_RESERVED_SPACE_EXTRA(dev, headroom);
848 849 850
	mtu = dev->mtu;
	rcu_read_unlock();

851
	cf_sk->tailroom = tailroom;
852
	cf_sk->maxframe = mtu - (headroom + tailroom);
853
	if (cf_sk->maxframe < 1) {
Joe Perches's avatar
Joe Perches committed
854
		pr_warn("CAIF Interface MTU too small (%d)\n", dev->mtu);
855
		err = -ENODEV;
856 857
		goto out;
	}
858

859 860
	err = -EINPROGRESS;
wait_connect:
861

862 863
	if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
		goto out;
864

865 866 867
	timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);

	release_sock(sk);
868 869
	err = -ERESTARTSYS;
	timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
870 871 872
			sk->sk_state != CAIF_CONNECTING,
			timeo);
	lock_sock(sk);
873
	if (timeo < 0)
874
		goto out; /* -ERESTARTSYS */
875

876 877 878
	err = -ETIMEDOUT;
	if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
		goto out;
879 880 881 882 883 884 885 886 887
	if (sk->sk_state != CAIF_CONNECTED) {
		sock->state = SS_UNCONNECTED;
		err = sock_error(sk);
		if (!err)
			err = -ECONNREFUSED;
		goto out;
	}
	sock->state = SS_CONNECTED;
	err = 0;
888
out:
889 890
	release_sock(sk);
	return err;
891 892
}

893 894 895 896 897
/*
 * caif_release() - Disconnect a CAIF Socket
 * Copied and modified af_irda.c:irda_release().
 */
static int caif_release(struct socket *sock)
898 899
{
	struct sock *sk = sock->sk;
900
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
901

902 903
	if (!sk)
		return 0;
904

905
	set_tx_flow_off(cf_sk);
906 907

	/*
908 909 910
	 * Ensure that packets are not queued after this point in time.
	 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
	 * this ensures no packets when sock is dead.
911
	 */
912
	spin_lock_bh(&sk->sk_receive_queue.lock);
913
	sock_set_flag(sk, SOCK_DEAD);
914
	spin_unlock_bh(&sk->sk_receive_queue.lock);
915
	sock->sk = NULL;
916

917
	WARN_ON(IS_ERR(cf_sk->debugfs_socket_dir));
918
	debugfs_remove_recursive(cf_sk->debugfs_socket_dir);
919 920

	lock_sock(&(cf_sk->sk));
921 922
	sk->sk_state = CAIF_DISCONNECTED;
	sk->sk_shutdown = SHUTDOWN_MASK;
923

924
	caif_disconnect_client(sock_net(sk), &cf_sk->layer);
925 926
	cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
	wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP);
927

928 929 930 931
	sock_orphan(sk);
	sk_stream_kill_queues(&cf_sk->sk);
	release_sock(sk);
	sock_put(sk);
932
	return 0;
933
}
934

935 936
/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
static unsigned int caif_poll(struct file *file,
937
			      struct socket *sock, poll_table *wait)
938 939 940 941
{
	struct sock *sk = sock->sk;
	unsigned int mask;
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
942

943 944
	sock_poll_wait(file, sk_sleep(sk), wait);
	mask = 0;
945

946 947 948 949 950 951 952
	/* exceptional events? */
	if (sk->sk_err)
		mask |= POLLERR;
	if (sk->sk_shutdown == SHUTDOWN_MASK)
		mask |= POLLHUP;
	if (sk->sk_shutdown & RCV_SHUTDOWN)
		mask |= POLLRDHUP;
953

954 955 956 957
	/* readable? */
	if (!skb_queue_empty(&sk->sk_receive_queue) ||
		(sk->sk_shutdown & RCV_SHUTDOWN))
		mask |= POLLIN | POLLRDNORM;
958 959

	/*
960 961
	 * we set writable also when the other side has shut down the
	 * connection. This prevents stuck sockets.
962
	 */
963 964 965 966
	if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
		mask |= POLLOUT | POLLWRNORM | POLLWRBAND;

	return mask;
967 968
}

969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990
static const struct proto_ops caif_seqpacket_ops = {
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
	.shutdown = sock_no_shutdown,
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
	.sendmsg = caif_seqpkt_sendmsg,
	.recvmsg = caif_seqpkt_recvmsg,
	.mmap = sock_no_mmap,
	.sendpage = sock_no_sendpage,
};

static const struct proto_ops caif_stream_ops = {
991 992 993 994 995 996 997 998 999 1000 1001
	.family = PF_CAIF,
	.owner = THIS_MODULE,
	.release = caif_release,
	.bind = sock_no_bind,
	.connect = caif_connect,
	.socketpair = sock_no_socketpair,
	.accept = sock_no_accept,
	.getname = sock_no_getname,
	.poll = caif_poll,
	.ioctl = sock_no_ioctl,
	.listen = sock_no_listen,
1002
	.shutdown = sock_no_shutdown,
1003 1004
	.setsockopt = setsockopt,
	.getsockopt = sock_no_getsockopt,
1005 1006
	.sendmsg = caif_stream_sendmsg,
	.recvmsg = caif_stream_recvmsg,
1007
	.mmap = sock_no_mmap,
1008
	.sendpage = sock_no_sendpage,
1009 1010 1011 1012 1013
};

/* This function is called when a socket is finally destroyed. */
static void caif_sock_destructor(struct sock *sk)
{
1014
	struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
1015 1016 1017 1018
	caif_assert(!atomic_read(&sk->sk_wmem_alloc));
	caif_assert(sk_unhashed(sk));
	caif_assert(!sk->sk_socket);
	if (!sock_flag(sk, SOCK_DEAD)) {
1019
		pr_debug("Attempt to release alive CAIF socket: %p\n", sk);
1020 1021
		return;
	}
1022
	sk_stream_kill_queues(&cf_sk->sk);
1023
	caif_free_client(&cf_sk->layer);
1024 1025 1026
}

static int caif_create(struct net *net, struct socket *sock, int protocol,
1027
		       int kern)
1028 1029 1030 1031 1032 1033 1034 1035
{
	struct sock *sk = NULL;
	struct caifsock *cf_sk = NULL;
	static struct proto prot = {.name = "PF_CAIF",
		.owner = THIS_MODULE,
		.obj_size = sizeof(struct caifsock),
	};

1036 1037
	if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
		return -EPERM;
1038 1039
	/*
	 * The sock->type specifies the socket type to use.
1040 1041 1042
	 * The CAIF socket is a packet stream in the sense
	 * that it is packet based. CAIF trusts the reliability
	 * of the link, no resending is implemented.
1043
	 */
1044 1045 1046 1047 1048
	if (sock->type == SOCK_SEQPACKET)
		sock->ops = &caif_seqpacket_ops;
	else if (sock->type == SOCK_STREAM)
		sock->ops = &caif_stream_ops;
	else
1049 1050 1051 1052 1053
		return -ESOCKTNOSUPPORT;

	if (protocol < 0 || protocol >= CAIFPROTO_MAX)
		return -EPROTONOSUPPORT;
	/*
1054 1055
	 * Set the socket state to unconnected.	 The socket state
	 * is really not used at all in the net/core or socket.c but the
1056 1057
	 * initialization makes sure that sock->state is not uninitialized.
	 */
1058
	sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot, kern);
1059 1060 1061 1062 1063 1064 1065 1066
	if (!sk)
		return -ENOMEM;

	cf_sk = container_of(sk, struct caifsock, sk);

	/* Store the protocol */
	sk->sk_protocol = (unsigned char) protocol;

1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078
	/* Initialize default priority for well-known cases */
	switch (protocol) {
	case CAIFPROTO_AT:
		sk->sk_priority = TC_PRIO_CONTROL;
		break;
	case CAIFPROTO_RFM:
		sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
		break;
	default:
		sk->sk_priority = TC_PRIO_BESTEFFORT;
	}

1079 1080 1081 1082 1083 1084 1085 1086 1087 1088
	/*
	 * Lock in order to try to stop someone from opening the socket
	 * too early.
	 */
	lock_sock(&(cf_sk->sk));

	/* Initialize the nozero default sock structure data. */
	sock_init_data(sock, sk);
	sk->sk_destruct = caif_sock_destructor;

1089 1090 1091 1092
	mutex_init(&cf_sk->readlock); /* single task reading lock */
	cf_sk->layer.ctrlcmd = caif_ctrl_cb;
	cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
	cf_sk->sk.sk_state = CAIF_DISCONNECTED;
1093

1094 1095
	set_tx_flow_off(cf_sk);
	set_rx_flow_on(cf_sk);
1096 1097

	/* Set default options on configuration */
1098
	cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
1099 1100 1101 1102 1103
	cf_sk->conn_req.protocol = protocol;
	release_sock(&cf_sk->sk);
	return 0;
}

1104

1105 1106 1107 1108 1109 1110
static struct net_proto_family caif_family_ops = {
	.family = PF_CAIF,
	.create = caif_create,
	.owner = THIS_MODULE,
};

1111
static int __init caif_sktinit_module(void)
1112
{
1113
	int err = sock_register(&caif_family_ops);
1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124
	if (!err)
		return err;
	return 0;
}

static void __exit caif_sktexit_module(void)
{
	sock_unregister(PF_CAIF);
}
module_init(caif_sktinit_module);
module_exit(caif_sktexit_module);