caif: fix leaks and race in caif_queue_rcv_skb()
[linux-2.6-block.git] / net / caif / caif_socket.c
CommitLineData
e6f95ec8
SB
1/*
2 * Copyright (C) ST-Ericsson AB 2010
26ee65e6 3 * Author: Sjur Brendeland
e6f95ec8
SB
4 * License terms: GNU General Public License (GPL) version 2
5 */
6
b31fa5ba
JP
7#define pr_fmt(fmt) KBUILD_MODNAME ":%s(): " fmt, __func__
8
e6f95ec8
SB
9#include <linux/fs.h>
10#include <linux/init.h>
11#include <linux/module.h>
12#include <linux/sched.h>
13#include <linux/spinlock.h>
14#include <linux/mutex.h>
15#include <linux/list.h>
16#include <linux/wait.h>
17#include <linux/poll.h>
18#include <linux/tcp.h>
19#include <linux/uaccess.h>
bece7b23 20#include <linux/debugfs.h>
e6f95ec8 21#include <linux/caif/caif_socket.h>
44764812 22#include <linux/pkt_sched.h>
bece7b23
SB
23#include <net/sock.h>
24#include <net/tcp_states.h>
e6f95ec8
SB
25#include <net/caif/caif_layer.h>
26#include <net/caif/caif_dev.h>
27#include <net/caif/cfpkt.h>
28
29MODULE_LICENSE("GPL");
bece7b23
SB
30MODULE_ALIAS_NETPROTO(AF_CAIF);
31
bece7b23
SB
32/*
33 * CAIF state is re-using the TCP socket states.
34 * caif_states stored in sk_state reflect the state as reported by
35 * the CAIF stack, while sk_socket->state is the state of the socket.
36 */
37enum caif_states {
38 CAIF_CONNECTED = TCP_ESTABLISHED,
39 CAIF_CONNECTING = TCP_SYN_SENT,
40 CAIF_DISCONNECTED = TCP_CLOSE
41};
42
43#define TX_FLOW_ON_BIT 1
44#define RX_FLOW_ON_BIT 2
e6f95ec8 45
e6f95ec8 46struct caifsock {
bece7b23 47 struct sock sk; /* must be first member */
e6f95ec8 48 struct cflayer layer;
e6f95ec8 49 u32 flow_state;
e6f95ec8 50 struct caif_connect_request conn_req;
bece7b23 51 struct mutex readlock;
e6f95ec8 52 struct dentry *debugfs_socket_dir;
2aa40aef 53 int headroom, tailroom, maxframe;
e6f95ec8
SB
54};
55
bece7b23
SB
56static int rx_flow_is_on(struct caifsock *cf_sk)
57{
58 return test_bit(RX_FLOW_ON_BIT,
59 (void *) &cf_sk->flow_state);
60}
61
62static int tx_flow_is_on(struct caifsock *cf_sk)
63{
64 return test_bit(TX_FLOW_ON_BIT,
65 (void *) &cf_sk->flow_state);
66}
e6f95ec8 67
bece7b23 68static void set_rx_flow_off(struct caifsock *cf_sk)
e6f95ec8 69{
bece7b23
SB
70 clear_bit(RX_FLOW_ON_BIT,
71 (void *) &cf_sk->flow_state);
72}
e6f95ec8 73
bece7b23
SB
74static void set_rx_flow_on(struct caifsock *cf_sk)
75{
76 set_bit(RX_FLOW_ON_BIT,
77 (void *) &cf_sk->flow_state);
78}
e6f95ec8 79
bece7b23
SB
80static void set_tx_flow_off(struct caifsock *cf_sk)
81{
82 clear_bit(TX_FLOW_ON_BIT,
83 (void *) &cf_sk->flow_state);
84}
e6f95ec8 85
bece7b23
SB
86static void set_tx_flow_on(struct caifsock *cf_sk)
87{
88 set_bit(TX_FLOW_ON_BIT,
89 (void *) &cf_sk->flow_state);
90}
e6f95ec8 91
bece7b23
SB
92static void caif_read_lock(struct sock *sk)
93{
94 struct caifsock *cf_sk;
95 cf_sk = container_of(sk, struct caifsock, sk);
96 mutex_lock(&cf_sk->readlock);
97}
e6f95ec8 98
bece7b23
SB
99static void caif_read_unlock(struct sock *sk)
100{
101 struct caifsock *cf_sk;
102 cf_sk = container_of(sk, struct caifsock, sk);
103 mutex_unlock(&cf_sk->readlock);
104}
e6f95ec8 105
a9a8f107 106static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
bece7b23
SB
107{
108 /* A quarter of full buffer is used a low water mark */
109 return cf_sk->sk.sk_rcvbuf / 4;
110}
e6f95ec8 111
a9a8f107 112static void caif_flow_ctrl(struct sock *sk, int mode)
bece7b23
SB
113{
114 struct caifsock *cf_sk;
115 cf_sk = container_of(sk, struct caifsock, sk);
ca6a09f2 116 if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
bece7b23
SB
117 cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
118}
e6f95ec8 119
bece7b23
SB
120/*
121 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
122 * not dropped, but CAIF is sending flow off instead.
123 */
b8a23e8d 124static void caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
bece7b23
SB
125{
126 int err;
bece7b23
SB
127 unsigned long flags;
128 struct sk_buff_head *list = &sk->sk_receive_queue;
129 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
b8a23e8d 130 bool queued = false;
e6f95ec8 131
bece7b23 132 if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
95c96174 133 (unsigned int)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
e87cc472
JP
134 net_dbg_ratelimited("sending flow OFF (queue len = %d %d)\n",
135 atomic_read(&cf_sk->sk.sk_rmem_alloc),
136 sk_rcvbuf_lowwater(cf_sk));
bece7b23 137 set_rx_flow_off(cf_sk);
ca6a09f2 138 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23 139 }
e6f95ec8 140
bece7b23
SB
141 err = sk_filter(sk, skb);
142 if (err)
b8a23e8d
ED
143 goto out;
144
c76562b6 145 if (!sk_rmem_schedule(sk, skb, skb->truesize) && rx_flow_is_on(cf_sk)) {
bece7b23 146 set_rx_flow_off(cf_sk);
e87cc472 147 net_dbg_ratelimited("sending flow OFF due to rmem_schedule\n");
ca6a09f2 148 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23
SB
149 }
150 skb->dev = NULL;
151 skb_set_owner_r(skb, sk);
bece7b23 152 spin_lock_irqsave(&list->lock, flags);
b8a23e8d
ED
153 queued = !sock_flag(sk, SOCK_DEAD);
154 if (queued)
bece7b23
SB
155 __skb_queue_tail(list, skb);
156 spin_unlock_irqrestore(&list->lock, flags);
b8a23e8d
ED
157out:
158 if (queued)
676d2369 159 sk->sk_data_ready(sk);
bece7b23
SB
160 else
161 kfree_skb(skb);
e6f95ec8
SB
162}
163
bece7b23
SB
164/* Packet Receive Callback function called from CAIF Stack */
165static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
e6f95ec8
SB
166{
167 struct caifsock *cf_sk;
bece7b23 168 struct sk_buff *skb;
e6f95ec8
SB
169
170 cf_sk = container_of(layr, struct caifsock, layer);
bece7b23
SB
171 skb = cfpkt_tonative(pkt);
172
173 if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
3f874adc 174 kfree_skb(skb);
bece7b23
SB
175 return 0;
176 }
177 caif_queue_rcv_skb(&cf_sk->sk, skb);
178 return 0;
179}
e6f95ec8 180
b3ccfbe4 181static void cfsk_hold(struct cflayer *layr)
182{
183 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
184 sock_hold(&cf_sk->sk);
185}
186
187static void cfsk_put(struct cflayer *layr)
188{
189 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
190 sock_put(&cf_sk->sk);
191}
192
bece7b23
SB
193/* Packet Control Callback function called from CAIF */
194static void caif_ctrl_cb(struct cflayer *layr,
3bffc475
SMP
195 enum caif_ctrlcmd flow,
196 int phyid)
bece7b23
SB
197{
198 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
e6f95ec8
SB
199 switch (flow) {
200 case CAIF_CTRLCMD_FLOW_ON_IND:
bece7b23 201 /* OK from modem to start sending again */
bece7b23
SB
202 set_tx_flow_on(cf_sk);
203 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
204 break;
205
206 case CAIF_CTRLCMD_FLOW_OFF_IND:
bece7b23 207 /* Modem asks us to shut up */
bece7b23
SB
208 set_tx_flow_off(cf_sk);
209 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
210 break;
211
212 case CAIF_CTRLCMD_INIT_RSP:
bece7b23 213 /* We're now connected */
b3ccfbe4 214 caif_client_register_refcnt(&cf_sk->layer,
215 cfsk_hold, cfsk_put);
bece7b23
SB
216 cf_sk->sk.sk_state = CAIF_CONNECTED;
217 set_tx_flow_on(cf_sk);
eaa8c5f3 218 cf_sk->sk.sk_shutdown = 0;
bece7b23 219 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
220 break;
221
222 case CAIF_CTRLCMD_DEINIT_RSP:
bece7b23
SB
223 /* We're now disconnected */
224 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
225 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
226 break;
227
228 case CAIF_CTRLCMD_INIT_FAIL_RSP:
bece7b23 229 /* Connect request failed */
bece7b23
SB
230 cf_sk->sk.sk_err = ECONNREFUSED;
231 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
232 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
233 /*
234 * Socket "standards" seems to require POLLOUT to
235 * be set at connect failure.
236 */
237 set_tx_flow_on(cf_sk);
238 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
239 break;
240
241 case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
bece7b23 242 /* Modem has closed this connection, or device is down. */
bece7b23
SB
243 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
244 cf_sk->sk.sk_err = ECONNRESET;
245 set_rx_flow_on(cf_sk);
246 cf_sk->sk.sk_error_report(&cf_sk->sk);
e6f95ec8
SB
247 break;
248
249 default:
b31fa5ba 250 pr_debug("Unexpected flow command %d\n", flow);
e6f95ec8
SB
251 }
252}
253
bece7b23 254static void caif_check_flow_release(struct sock *sk)
e6f95ec8 255{
bece7b23 256 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 257
bece7b23
SB
258 if (rx_flow_is_on(cf_sk))
259 return;
e6f95ec8 260
bece7b23 261 if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
bece7b23 262 set_rx_flow_on(cf_sk);
ca6a09f2 263 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
bece7b23
SB
264 }
265}
dcda138d 266
bece7b23 267/*
dcda138d
SB
268 * Copied from unix_dgram_recvmsg, but removed credit checks,
269 * changed locking, address handling and added MSG_TRUNC.
bece7b23 270 */
1b784140
YX
271static int caif_seqpkt_recvmsg(struct socket *sock, struct msghdr *m,
272 size_t len, int flags)
e6f95ec8
SB
273
274{
275 struct sock *sk = sock->sk;
e6f95ec8 276 struct sk_buff *skb;
dcda138d
SB
277 int ret;
278 int copylen;
e6f95ec8 279
dcda138d 280 ret = -EOPNOTSUPP;
3eeff778 281 if (flags & MSG_OOB)
dcda138d 282 goto read_error;
e6f95ec8 283
bece7b23
SB
284 skb = skb_recv_datagram(sk, flags, 0 , &ret);
285 if (!skb)
e6f95ec8 286 goto read_error;
dcda138d
SB
287 copylen = skb->len;
288 if (len < copylen) {
289 m->msg_flags |= MSG_TRUNC;
290 copylen = len;
e6f95ec8
SB
291 }
292
51f3d02b 293 ret = skb_copy_datagram_msg(skb, 0, m, copylen);
bece7b23 294 if (ret)
dcda138d 295 goto out_free;
e6f95ec8 296
dcda138d
SB
297 ret = (flags & MSG_TRUNC) ? skb->len : copylen;
298out_free:
bece7b23 299 skb_free_datagram(sk, skb);
bece7b23 300 caif_check_flow_release(sk);
dcda138d 301 return ret;
e6f95ec8 302
bece7b23
SB
303read_error:
304 return ret;
305}
e6f95ec8 306
e6f95ec8 307
bece7b23
SB
308/* Copied from unix_stream_wait_data, identical except for lock call. */
309static long caif_stream_data_wait(struct sock *sk, long timeo)
310{
311 DEFINE_WAIT(wait);
312 lock_sock(sk);
313
314 for (;;) {
315 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
316
317 if (!skb_queue_empty(&sk->sk_receive_queue) ||
318 sk->sk_err ||
319 sk->sk_state != CAIF_CONNECTED ||
320 sock_flag(sk, SOCK_DEAD) ||
321 (sk->sk_shutdown & RCV_SHUTDOWN) ||
322 signal_pending(current) ||
323 !timeo)
324 break;
e6f95ec8 325
bece7b23
SB
326 set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
327 release_sock(sk);
328 timeo = schedule_timeout(timeo);
329 lock_sock(sk);
b48732e4
MS
330
331 if (sock_flag(sk, SOCK_DEAD))
332 break;
333
bece7b23 334 clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
e6f95ec8
SB
335 }
336
bece7b23
SB
337 finish_wait(sk_sleep(sk), &wait);
338 release_sock(sk);
339 return timeo;
340}
e6f95ec8
SB
341
342
bece7b23
SB
343/*
344 * Copied from unix_stream_recvmsg, but removed credit checks,
345 * changed locking calls, changed address handling.
346 */
1b784140
YX
347static int caif_stream_recvmsg(struct socket *sock, struct msghdr *msg,
348 size_t size, int flags)
bece7b23
SB
349{
350 struct sock *sk = sock->sk;
351 int copied = 0;
352 int target;
353 int err = 0;
354 long timeo;
e6f95ec8 355
bece7b23
SB
356 err = -EOPNOTSUPP;
357 if (flags&MSG_OOB)
358 goto out;
e6f95ec8 359
bece7b23
SB
360 /*
361 * Lock the socket to prevent queue disordering
362 * while sleeps in memcpy_tomsg
363 */
364 err = -EAGAIN;
365 if (sk->sk_state == CAIF_CONNECTING)
366 goto out;
e6f95ec8 367
bece7b23
SB
368 caif_read_lock(sk);
369 target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
370 timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
e6f95ec8 371
bece7b23
SB
372 do {
373 int chunk;
374 struct sk_buff *skb;
e6f95ec8 375
bece7b23 376 lock_sock(sk);
b48732e4
MS
377 if (sock_flag(sk, SOCK_DEAD)) {
378 err = -ECONNRESET;
379 goto unlock;
380 }
bece7b23
SB
381 skb = skb_dequeue(&sk->sk_receive_queue);
382 caif_check_flow_release(sk);
e6f95ec8 383
bece7b23
SB
384 if (skb == NULL) {
385 if (copied >= target)
386 goto unlock;
387 /*
388 * POSIX 1003.1g mandates this order.
389 */
390 err = sock_error(sk);
391 if (err)
392 goto unlock;
393 err = -ECONNRESET;
394 if (sk->sk_shutdown & RCV_SHUTDOWN)
395 goto unlock;
e6f95ec8 396
bece7b23
SB
397 err = -EPIPE;
398 if (sk->sk_state != CAIF_CONNECTED)
399 goto unlock;
400 if (sock_flag(sk, SOCK_DEAD))
401 goto unlock;
e6f95ec8 402
bece7b23 403 release_sock(sk);
e6f95ec8 404
bece7b23
SB
405 err = -EAGAIN;
406 if (!timeo)
407 break;
e6f95ec8 408
bece7b23 409 caif_read_unlock(sk);
e6f95ec8 410
bece7b23 411 timeo = caif_stream_data_wait(sk, timeo);
e6f95ec8 412
bece7b23
SB
413 if (signal_pending(current)) {
414 err = sock_intr_errno(timeo);
415 goto out;
416 }
417 caif_read_lock(sk);
418 continue;
419unlock:
420 release_sock(sk);
421 break;
e6f95ec8 422 }
bece7b23
SB
423 release_sock(sk);
424 chunk = min_t(unsigned int, skb->len, size);
7eab8d9e 425 if (memcpy_to_msg(msg, skb->data, chunk)) {
bece7b23
SB
426 skb_queue_head(&sk->sk_receive_queue, skb);
427 if (copied == 0)
428 copied = -EFAULT;
429 break;
430 }
431 copied += chunk;
432 size -= chunk;
e6f95ec8 433
bece7b23
SB
434 /* Mark read part of skb as used */
435 if (!(flags & MSG_PEEK)) {
436 skb_pull(skb, chunk);
e6f95ec8 437
bece7b23
SB
438 /* put the skb back if we didn't use it up. */
439 if (skb->len) {
440 skb_queue_head(&sk->sk_receive_queue, skb);
441 break;
442 }
443 kfree_skb(skb);
e6f95ec8 444
e6f95ec8 445 } else {
bece7b23
SB
446 /*
447 * It is questionable, see note in unix_dgram_recvmsg.
448 */
449 /* put message back and return */
450 skb_queue_head(&sk->sk_receive_queue, skb);
451 break;
e6f95ec8 452 }
bece7b23
SB
453 } while (size);
454 caif_read_unlock(sk);
e6f95ec8 455
bece7b23
SB
456out:
457 return copied ? : err;
458}
e6f95ec8 459
bece7b23
SB
460/*
461 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
462 * CAIF flow-on and sock_writable.
463 */
464static long caif_wait_for_flow_on(struct caifsock *cf_sk,
3bffc475 465 int wait_writeable, long timeo, int *err)
bece7b23
SB
466{
467 struct sock *sk = &cf_sk->sk;
468 DEFINE_WAIT(wait);
469 for (;;) {
470 *err = 0;
471 if (tx_flow_is_on(cf_sk) &&
472 (!wait_writeable || sock_writeable(&cf_sk->sk)))
473 break;
474 *err = -ETIMEDOUT;
475 if (!timeo)
476 break;
477 *err = -ERESTARTSYS;
478 if (signal_pending(current))
479 break;
480 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
481 *err = -ECONNRESET;
482 if (sk->sk_shutdown & SHUTDOWN_MASK)
483 break;
484 *err = -sk->sk_err;
485 if (sk->sk_err)
486 break;
487 *err = -EPIPE;
488 if (cf_sk->sk.sk_state != CAIF_CONNECTED)
489 break;
490 timeo = schedule_timeout(timeo);
e6f95ec8 491 }
bece7b23
SB
492 finish_wait(sk_sleep(sk), &wait);
493 return timeo;
494}
e6f95ec8 495
bece7b23
SB
496/*
497 * Transmit a SKB. The device may temporarily request re-transmission
498 * by returning EAGAIN.
499 */
500static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
501 int noblock, long timeo)
502{
503 struct cfpkt *pkt;
e6f95ec8 504
bece7b23 505 pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
3f874adc 506 memset(skb->cb, 0, sizeof(struct caif_payload_info));
44764812 507 cfpkt_set_prio(pkt, cf_sk->sk.sk_priority);
e6f95ec8 508
ba760574
DT
509 if (cf_sk->layer.dn == NULL) {
510 kfree_skb(skb);
4dd820c0 511 return -EINVAL;
ba760574 512 }
e6f95ec8 513
4dd820c0 514 return cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
bece7b23 515}
e6f95ec8 516
bece7b23 517/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
1b784140
YX
518static int caif_seqpkt_sendmsg(struct socket *sock, struct msghdr *msg,
519 size_t len)
bece7b23
SB
520{
521 struct sock *sk = sock->sk;
522 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
523 int buffer_size;
524 int ret = 0;
525 struct sk_buff *skb = NULL;
526 int noblock;
527 long timeo;
528 caif_assert(cf_sk);
529 ret = sock_error(sk);
530 if (ret)
531 goto err;
532
533 ret = -EOPNOTSUPP;
534 if (msg->msg_flags&MSG_OOB)
535 goto err;
536
537 ret = -EOPNOTSUPP;
538 if (msg->msg_namelen)
539 goto err;
540
541 ret = -EINVAL;
c0371da6 542 if (unlikely(msg->msg_iter.iov->iov_base == NULL))
bece7b23
SB
543 goto err;
544 noblock = msg->msg_flags & MSG_DONTWAIT;
545
bece7b23
SB
546 timeo = sock_sndtimeo(sk, noblock);
547 timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
548 1, timeo, &ret);
549
2aa40aef
SB
550 if (ret)
551 goto err;
bece7b23
SB
552 ret = -EPIPE;
553 if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
554 sock_flag(sk, SOCK_DEAD) ||
555 (sk->sk_shutdown & RCV_SHUTDOWN))
556 goto err;
557
2aa40aef
SB
558 /* Error if trying to write more than maximum frame size. */
559 ret = -EMSGSIZE;
560 if (len > cf_sk->maxframe && cf_sk->sk.sk_protocol != CAIFPROTO_RFM)
561 goto err;
562
563 buffer_size = len + cf_sk->headroom + cf_sk->tailroom;
564
bece7b23
SB
565 ret = -ENOMEM;
566 skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
2aa40aef
SB
567
568 if (!skb || skb_tailroom(skb) < buffer_size)
bece7b23 569 goto err;
2aa40aef
SB
570
571 skb_reserve(skb, cf_sk->headroom);
bece7b23 572
6ce8e9ce 573 ret = memcpy_from_msg(skb_put(skb, len), msg, len);
bece7b23
SB
574
575 if (ret)
576 goto err;
577 ret = transmit_skb(skb, cf_sk, noblock, timeo);
578 if (ret < 0)
c85c2951 579 /* skb is already freed */
580 return ret;
581
bece7b23
SB
582 return len;
583err:
584 kfree_skb(skb);
585 return ret;
586}
e6f95ec8 587
bece7b23
SB
588/*
589 * Copied from unix_stream_sendmsg and adapted to CAIF:
590 * Changed removed permission handling and added waiting for flow on
591 * and other minor adaptations.
592 */
1b784140
YX
593static int caif_stream_sendmsg(struct socket *sock, struct msghdr *msg,
594 size_t len)
bece7b23
SB
595{
596 struct sock *sk = sock->sk;
597 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
598 int err, size;
599 struct sk_buff *skb;
600 int sent = 0;
601 long timeo;
e6f95ec8 602
bece7b23 603 err = -EOPNOTSUPP;
bece7b23
SB
604 if (unlikely(msg->msg_flags&MSG_OOB))
605 goto out_err;
e6f95ec8 606
bece7b23
SB
607 if (unlikely(msg->msg_namelen))
608 goto out_err;
e6f95ec8 609
bece7b23
SB
610 timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
611 timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
e6f95ec8 612
bece7b23
SB
613 if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
614 goto pipe_err;
e6f95ec8 615
bece7b23 616 while (sent < len) {
e6f95ec8 617
bece7b23 618 size = len-sent;
e6f95ec8 619
2aa40aef
SB
620 if (size > cf_sk->maxframe)
621 size = cf_sk->maxframe;
e6f95ec8 622
bece7b23
SB
623 /* If size is more than half of sndbuf, chop up message */
624 if (size > ((sk->sk_sndbuf >> 1) - 64))
625 size = (sk->sk_sndbuf >> 1) - 64;
e6f95ec8 626
bece7b23
SB
627 if (size > SKB_MAX_ALLOC)
628 size = SKB_MAX_ALLOC;
e6f95ec8 629
bece7b23 630 skb = sock_alloc_send_skb(sk,
2aa40aef
SB
631 size + cf_sk->headroom +
632 cf_sk->tailroom,
bece7b23
SB
633 msg->msg_flags&MSG_DONTWAIT,
634 &err);
635 if (skb == NULL)
636 goto out_err;
e6f95ec8 637
2aa40aef 638 skb_reserve(skb, cf_sk->headroom);
bece7b23
SB
639 /*
640 * If you pass two values to the sock_alloc_send_skb
641 * it tries to grab the large buffer with GFP_NOFS
642 * (which can fail easily), and if it fails grab the
643 * fallback size buffer which is under a page and will
644 * succeed. [Alan]
645 */
646 size = min_t(int, size, skb_tailroom(skb));
e6f95ec8 647
6ce8e9ce 648 err = memcpy_from_msg(skb_put(skb, size), msg, size);
bece7b23
SB
649 if (err) {
650 kfree_skb(skb);
651 goto out_err;
652 }
653 err = transmit_skb(skb, cf_sk,
654 msg->msg_flags&MSG_DONTWAIT, timeo);
ba760574
DT
655 if (err < 0)
656 /* skb is already freed */
bece7b23 657 goto pipe_err;
ba760574 658
bece7b23 659 sent += size;
e6f95ec8 660 }
e6f95ec8 661
bece7b23 662 return sent;
e6f95ec8 663
bece7b23
SB
664pipe_err:
665 if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
666 send_sig(SIGPIPE, current, 0);
667 err = -EPIPE;
668out_err:
669 return sent ? : err;
e6f95ec8
SB
670}
671
672static int setsockopt(struct socket *sock,
3bffc475 673 int lvl, int opt, char __user *ov, unsigned int ol)
e6f95ec8
SB
674{
675 struct sock *sk = sock->sk;
676 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
f2527ec4 677 int linksel;
e6f95ec8 678
bece7b23 679 if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
e6f95ec8 680 return -ENOPROTOOPT;
bece7b23 681
e6f95ec8
SB
682 switch (opt) {
683 case CAIFSO_LINK_SELECT:
bece7b23 684 if (ol < sizeof(int))
e6f95ec8 685 return -EINVAL;
e6f95ec8
SB
686 if (lvl != SOL_CAIF)
687 goto bad_sol;
688 if (copy_from_user(&linksel, ov, sizeof(int)))
689 return -EINVAL;
690 lock_sock(&(cf_sk->sk));
691 cf_sk->conn_req.link_selector = linksel;
692 release_sock(&cf_sk->sk);
693 return 0;
694
e6f95ec8
SB
695 case CAIFSO_REQ_PARAM:
696 if (lvl != SOL_CAIF)
697 goto bad_sol;
698 if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
699 return -ENOPROTOOPT;
e6f95ec8 700 lock_sock(&(cf_sk->sk));
bece7b23
SB
701 if (ol > sizeof(cf_sk->conn_req.param.data) ||
702 copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) {
e6f95ec8 703 release_sock(&cf_sk->sk);
e6f95ec8
SB
704 return -EINVAL;
705 }
91b5c98c 706 cf_sk->conn_req.param.size = ol;
e6f95ec8
SB
707 release_sock(&cf_sk->sk);
708 return 0;
709
710 default:
bece7b23 711 return -ENOPROTOOPT;
e6f95ec8
SB
712 }
713
714 return 0;
715bad_sol:
e6f95ec8
SB
716 return -ENOPROTOOPT;
717
718}
719
bece7b23
SB
720/*
721 * caif_connect() - Connect a CAIF Socket
722 * Copied and modified af_irda.c:irda_connect().
723 *
724 * Note : by consulting "errno", the user space caller may learn the cause
725 * of the failure. Most of them are visible in the function, others may come
726 * from subroutines called and are listed here :
727 * o -EAFNOSUPPORT: bad socket family or type.
728 * o -ESOCKTNOSUPPORT: bad socket type or protocol
729 * o -EINVAL: bad socket address, or CAIF link type
730 * o -ECONNREFUSED: remote end refused the connection.
731 * o -EINPROGRESS: connect request sent but timed out (or non-blocking)
732 * o -EISCONN: already connected.
733 * o -ETIMEDOUT: Connection timed out (send timeout)
734 * o -ENODEV: No link layer to send request
735 * o -ECONNRESET: Received Shutdown indication or lost link layer
736 * o -ENOMEM: Out of memory
737 *
738 * State Strategy:
739 * o sk_state: holds the CAIF_* protocol state, it's updated by
740 * caif_ctrl_cb.
741 * o sock->state: holds the SS_* socket state and is updated by connect and
742 * disconnect.
743 */
744static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
745 int addr_len, int flags)
e6f95ec8 746{
e6f95ec8 747 struct sock *sk = sock->sk;
bece7b23
SB
748 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
749 long timeo;
750 int err;
2aa40aef 751 int ifindex, headroom, tailroom;
79315068 752 unsigned int mtu;
2aa40aef
SB
753 struct net_device *dev;
754
bece7b23 755 lock_sock(sk);
e6f95ec8 756
bece7b23
SB
757 err = -EAFNOSUPPORT;
758 if (uaddr->sa_family != AF_CAIF)
e6f95ec8
SB
759 goto out;
760
bece7b23
SB
761 switch (sock->state) {
762 case SS_UNCONNECTED:
763 /* Normal case, a fresh connect */
764 caif_assert(sk->sk_state == CAIF_DISCONNECTED);
765 break;
766 case SS_CONNECTING:
767 switch (sk->sk_state) {
768 case CAIF_CONNECTED:
769 sock->state = SS_CONNECTED;
770 err = -EISCONN;
771 goto out;
772 case CAIF_DISCONNECTED:
773 /* Reconnect allowed */
774 break;
775 case CAIF_CONNECTING:
776 err = -EALREADY;
777 if (flags & O_NONBLOCK)
778 goto out;
779 goto wait_connect;
780 }
781 break;
782 case SS_CONNECTED:
783 caif_assert(sk->sk_state == CAIF_CONNECTED ||
784 sk->sk_state == CAIF_DISCONNECTED);
785 if (sk->sk_shutdown & SHUTDOWN_MASK) {
786 /* Allow re-connect after SHUTDOWN_IND */
bee925db 787 caif_disconnect_client(sock_net(sk), &cf_sk->layer);
54e90fb5 788 caif_free_client(&cf_sk->layer);
bece7b23
SB
789 break;
790 }
791 /* No reconnect on a seqpacket socket */
792 err = -EISCONN;
793 goto out;
794 case SS_DISCONNECTING:
795 case SS_FREE:
796 caif_assert(1); /*Should never happen */
797 break;
e6f95ec8 798 }
bece7b23
SB
799 sk->sk_state = CAIF_DISCONNECTED;
800 sock->state = SS_UNCONNECTED;
801 sk_stream_kill_queues(&cf_sk->sk);
e6f95ec8 802
bece7b23 803 err = -EINVAL;
f5d72af9 804 if (addr_len != sizeof(struct sockaddr_caif))
bece7b23 805 goto out;
e6f95ec8 806
bece7b23 807 memcpy(&cf_sk->conn_req.sockaddr, uaddr,
e6f95ec8
SB
808 sizeof(struct sockaddr_caif));
809
bece7b23
SB
810 /* Move to connecting socket, start sending Connect Requests */
811 sock->state = SS_CONNECTING;
812 sk->sk_state = CAIF_CONNECTING;
813
33b2f559 814 /* Check priority value comming from socket */
f2527ec4
ACM
815 /* if priority value is out of range it will be ajusted */
816 if (cf_sk->sk.sk_priority > CAIF_PRIO_MAX)
817 cf_sk->conn_req.priority = CAIF_PRIO_MAX;
818 else if (cf_sk->sk.sk_priority < CAIF_PRIO_MIN)
819 cf_sk->conn_req.priority = CAIF_PRIO_MIN;
820 else
821 cf_sk->conn_req.priority = cf_sk->sk.sk_priority;
822
823 /*ifindex = id of the interface.*/
824 cf_sk->conn_req.ifindex = cf_sk->sk.sk_bound_dev_if;
825
bece7b23 826 cf_sk->layer.receive = caif_sktrecv_cb;
b3ccfbe4 827
bee925db 828 err = caif_connect_client(sock_net(sk), &cf_sk->conn_req,
2aa40aef 829 &cf_sk->layer, &ifindex, &headroom, &tailroom);
b3ccfbe4 830
bece7b23
SB
831 if (err < 0) {
832 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
833 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
834 goto out;
e6f95ec8 835 }
79315068
ED
836
837 err = -ENODEV;
838 rcu_read_lock();
839 dev = dev_get_by_index_rcu(sock_net(sk), ifindex);
840 if (!dev) {
841 rcu_read_unlock();
842 goto out;
843 }
2aa40aef 844 cf_sk->headroom = LL_RESERVED_SPACE_EXTRA(dev, headroom);
79315068
ED
845 mtu = dev->mtu;
846 rcu_read_unlock();
847
2aa40aef 848 cf_sk->tailroom = tailroom;
79315068 849 cf_sk->maxframe = mtu - (headroom + tailroom);
2aa40aef 850 if (cf_sk->maxframe < 1) {
b31fa5ba 851 pr_warn("CAIF Interface MTU too small (%d)\n", dev->mtu);
f2527ec4 852 err = -ENODEV;
2aa40aef
SB
853 goto out;
854 }
e6f95ec8 855
bece7b23
SB
856 err = -EINPROGRESS;
857wait_connect:
e6f95ec8 858
bece7b23
SB
859 if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
860 goto out;
e6f95ec8 861
bece7b23
SB
862 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
863
864 release_sock(sk);
9e4b816b
SB
865 err = -ERESTARTSYS;
866 timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
bece7b23
SB
867 sk->sk_state != CAIF_CONNECTING,
868 timeo);
869 lock_sock(sk);
9e4b816b 870 if (timeo < 0)
bece7b23 871 goto out; /* -ERESTARTSYS */
e6f95ec8 872
9e4b816b
SB
873 err = -ETIMEDOUT;
874 if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
875 goto out;
bece7b23
SB
876 if (sk->sk_state != CAIF_CONNECTED) {
877 sock->state = SS_UNCONNECTED;
878 err = sock_error(sk);
879 if (!err)
880 err = -ECONNREFUSED;
881 goto out;
882 }
883 sock->state = SS_CONNECTED;
884 err = 0;
e6f95ec8 885out:
bece7b23
SB
886 release_sock(sk);
887 return err;
e6f95ec8
SB
888}
889
bece7b23
SB
890/*
891 * caif_release() - Disconnect a CAIF Socket
892 * Copied and modified af_irda.c:irda_release().
893 */
894static int caif_release(struct socket *sock)
e6f95ec8 895{
e6f95ec8 896 struct sock *sk = sock->sk;
bece7b23 897 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 898
bece7b23
SB
899 if (!sk)
900 return 0;
e6f95ec8 901
bece7b23 902 set_tx_flow_off(cf_sk);
e6f95ec8
SB
903
904 /*
bece7b23
SB
905 * Ensure that packets are not queued after this point in time.
906 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
907 * this ensures no packets when sock is dead.
e6f95ec8 908 */
c85c2951 909 spin_lock_bh(&sk->sk_receive_queue.lock);
bece7b23 910 sock_set_flag(sk, SOCK_DEAD);
c85c2951 911 spin_unlock_bh(&sk->sk_receive_queue.lock);
bece7b23 912 sock->sk = NULL;
e6f95ec8 913
33b2f559 914 WARN_ON(IS_ERR(cf_sk->debugfs_socket_dir));
fb0d164c 915 debugfs_remove_recursive(cf_sk->debugfs_socket_dir);
e6f95ec8 916
e6f95ec8 917 lock_sock(&(cf_sk->sk));
bece7b23
SB
918 sk->sk_state = CAIF_DISCONNECTED;
919 sk->sk_shutdown = SHUTDOWN_MASK;
e6f95ec8 920
54e90fb5 921 caif_disconnect_client(sock_net(sk), &cf_sk->layer);
bece7b23
SB
922 cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
923 wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP);
e6f95ec8 924
bece7b23 925 sock_orphan(sk);
bece7b23
SB
926 sk_stream_kill_queues(&cf_sk->sk);
927 release_sock(sk);
928 sock_put(sk);
54e90fb5 929 return 0;
bece7b23 930}
e6f95ec8 931
bece7b23
SB
932/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
933static unsigned int caif_poll(struct file *file,
3bffc475 934 struct socket *sock, poll_table *wait)
bece7b23
SB
935{
936 struct sock *sk = sock->sk;
937 unsigned int mask;
938 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 939
bece7b23
SB
940 sock_poll_wait(file, sk_sleep(sk), wait);
941 mask = 0;
e6f95ec8 942
bece7b23
SB
943 /* exceptional events? */
944 if (sk->sk_err)
945 mask |= POLLERR;
946 if (sk->sk_shutdown == SHUTDOWN_MASK)
947 mask |= POLLHUP;
948 if (sk->sk_shutdown & RCV_SHUTDOWN)
949 mask |= POLLRDHUP;
e6f95ec8 950
bece7b23
SB
951 /* readable? */
952 if (!skb_queue_empty(&sk->sk_receive_queue) ||
953 (sk->sk_shutdown & RCV_SHUTDOWN))
954 mask |= POLLIN | POLLRDNORM;
e6f95ec8 955
e6f95ec8 956 /*
bece7b23
SB
957 * we set writable also when the other side has shut down the
958 * connection. This prevents stuck sockets.
e6f95ec8 959 */
bece7b23
SB
960 if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
961 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
962
963 return mask;
e6f95ec8
SB
964}
965
bece7b23
SB
966static const struct proto_ops caif_seqpacket_ops = {
967 .family = PF_CAIF,
968 .owner = THIS_MODULE,
969 .release = caif_release,
970 .bind = sock_no_bind,
971 .connect = caif_connect,
972 .socketpair = sock_no_socketpair,
973 .accept = sock_no_accept,
974 .getname = sock_no_getname,
975 .poll = caif_poll,
976 .ioctl = sock_no_ioctl,
977 .listen = sock_no_listen,
978 .shutdown = sock_no_shutdown,
979 .setsockopt = setsockopt,
980 .getsockopt = sock_no_getsockopt,
981 .sendmsg = caif_seqpkt_sendmsg,
982 .recvmsg = caif_seqpkt_recvmsg,
983 .mmap = sock_no_mmap,
984 .sendpage = sock_no_sendpage,
985};
986
987static const struct proto_ops caif_stream_ops = {
e6f95ec8
SB
988 .family = PF_CAIF,
989 .owner = THIS_MODULE,
990 .release = caif_release,
991 .bind = sock_no_bind,
992 .connect = caif_connect,
993 .socketpair = sock_no_socketpair,
994 .accept = sock_no_accept,
995 .getname = sock_no_getname,
996 .poll = caif_poll,
997 .ioctl = sock_no_ioctl,
998 .listen = sock_no_listen,
bece7b23 999 .shutdown = sock_no_shutdown,
e6f95ec8
SB
1000 .setsockopt = setsockopt,
1001 .getsockopt = sock_no_getsockopt,
bece7b23
SB
1002 .sendmsg = caif_stream_sendmsg,
1003 .recvmsg = caif_stream_recvmsg,
e6f95ec8 1004 .mmap = sock_no_mmap,
bece7b23 1005 .sendpage = sock_no_sendpage,
e6f95ec8
SB
1006};
1007
1008/* This function is called when a socket is finally destroyed. */
1009static void caif_sock_destructor(struct sock *sk)
1010{
bece7b23 1011 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8
SB
1012 caif_assert(!atomic_read(&sk->sk_wmem_alloc));
1013 caif_assert(sk_unhashed(sk));
1014 caif_assert(!sk->sk_socket);
1015 if (!sock_flag(sk, SOCK_DEAD)) {
33b2f559 1016 pr_debug("Attempt to release alive CAIF socket: %p\n", sk);
e6f95ec8
SB
1017 return;
1018 }
bece7b23 1019 sk_stream_kill_queues(&cf_sk->sk);
b3ccfbe4 1020 caif_free_client(&cf_sk->layer);
e6f95ec8
SB
1021}
1022
1023static int caif_create(struct net *net, struct socket *sock, int protocol,
3bffc475 1024 int kern)
e6f95ec8
SB
1025{
1026 struct sock *sk = NULL;
1027 struct caifsock *cf_sk = NULL;
e6f95ec8
SB
1028 static struct proto prot = {.name = "PF_CAIF",
1029 .owner = THIS_MODULE,
1030 .obj_size = sizeof(struct caifsock),
1031 };
1032
bece7b23
SB
1033 if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
1034 return -EPERM;
e6f95ec8
SB
1035 /*
1036 * The sock->type specifies the socket type to use.
bece7b23
SB
1037 * The CAIF socket is a packet stream in the sense
1038 * that it is packet based. CAIF trusts the reliability
1039 * of the link, no resending is implemented.
e6f95ec8 1040 */
bece7b23
SB
1041 if (sock->type == SOCK_SEQPACKET)
1042 sock->ops = &caif_seqpacket_ops;
1043 else if (sock->type == SOCK_STREAM)
1044 sock->ops = &caif_stream_ops;
1045 else
e6f95ec8
SB
1046 return -ESOCKTNOSUPPORT;
1047
e6f95ec8
SB
1048 if (protocol < 0 || protocol >= CAIFPROTO_MAX)
1049 return -EPROTONOSUPPORT;
1050 /*
bece7b23
SB
1051 * Set the socket state to unconnected. The socket state
1052 * is really not used at all in the net/core or socket.c but the
e6f95ec8
SB
1053 * initialization makes sure that sock->state is not uninitialized.
1054 */
11aa9c28 1055 sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot, kern);
e6f95ec8
SB
1056 if (!sk)
1057 return -ENOMEM;
1058
1059 cf_sk = container_of(sk, struct caifsock, sk);
1060
1061 /* Store the protocol */
1062 sk->sk_protocol = (unsigned char) protocol;
1063
44764812
DT
1064 /* Initialize default priority for well-known cases */
1065 switch (protocol) {
1066 case CAIFPROTO_AT:
1067 sk->sk_priority = TC_PRIO_CONTROL;
1068 break;
1069 case CAIFPROTO_RFM:
1070 sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
1071 break;
1072 default:
1073 sk->sk_priority = TC_PRIO_BESTEFFORT;
1074 }
1075
e6f95ec8
SB
1076 /*
1077 * Lock in order to try to stop someone from opening the socket
1078 * too early.
1079 */
1080 lock_sock(&(cf_sk->sk));
1081
1082 /* Initialize the nozero default sock structure data. */
1083 sock_init_data(sock, sk);
e6f95ec8 1084 sk->sk_destruct = caif_sock_destructor;
e6f95ec8 1085
bece7b23
SB
1086 mutex_init(&cf_sk->readlock); /* single task reading lock */
1087 cf_sk->layer.ctrlcmd = caif_ctrl_cb;
1088 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
1089 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
e6f95ec8 1090
bece7b23
SB
1091 set_tx_flow_off(cf_sk);
1092 set_rx_flow_on(cf_sk);
e6f95ec8
SB
1093
1094 /* Set default options on configuration */
bece7b23 1095 cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
e6f95ec8 1096 cf_sk->conn_req.protocol = protocol;
e6f95ec8
SB
1097 release_sock(&cf_sk->sk);
1098 return 0;
e6f95ec8
SB
1099}
1100
bece7b23 1101
e6f95ec8
SB
1102static struct net_proto_family caif_family_ops = {
1103 .family = PF_CAIF,
1104 .create = caif_create,
1105 .owner = THIS_MODULE,
1106};
1107
4a695823 1108static int __init caif_sktinit_module(void)
e6f95ec8 1109{
bece7b23 1110 int err = sock_register(&caif_family_ops);
e6f95ec8
SB
1111 if (!err)
1112 return err;
e6f95ec8
SB
1113 return 0;
1114}
1115
e6f95ec8
SB
1116static void __exit caif_sktexit_module(void)
1117{
1118 sock_unregister(PF_CAIF);
e6f95ec8 1119}
e6f95ec8
SB
1120module_init(caif_sktinit_module);
1121module_exit(caif_sktexit_module);