[TIPC]: Add error check to detect non-blocking form of connect()
[linux-2.6-block.git] / net / tipc / socket.c
CommitLineData
b97bf3fd
PL
1/*
2 * net/tipc/socket.c: TIPC socket API
c4307285 3 *
5eee6a6d
AS
4 * Copyright (c) 2001-2007, Ericsson AB
5 * Copyright (c) 2004-2007, Wind River Systems
b97bf3fd
PL
6 * All rights reserved.
7 *
9ea1fd3c 8 * Redistribution and use in source and binary forms, with or without
b97bf3fd
PL
9 * modification, are permitted provided that the following conditions are met:
10 *
9ea1fd3c
PL
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
b97bf3fd 19 *
9ea1fd3c
PL
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
b97bf3fd
PL
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
37#include <linux/module.h>
38#include <linux/types.h>
39#include <linux/net.h>
40#include <linux/socket.h>
41#include <linux/errno.h>
42#include <linux/mm.h>
43#include <linux/slab.h>
44#include <linux/poll.h>
b97bf3fd 45#include <linux/fcntl.h>
26bad2c0 46#include <linux/mutex.h>
b97bf3fd
PL
47#include <asm/string.h>
48#include <asm/atomic.h>
49#include <net/sock.h>
50
51#include <linux/tipc.h>
ea714ccd 52#include <linux/tipc_config.h>
b97bf3fd
PL
53#include <net/tipc/tipc_msg.h>
54#include <net/tipc/tipc_port.h>
55
56#include "core.h"
57
58#define SS_LISTENING -1 /* socket is listening */
59#define SS_READY -2 /* socket is connectionless */
60
3654ea02
AS
61#define OVERLOAD_LIMIT_BASE 5000
62#define CONN_TIMEOUT_DEFAULT 8000 /* default connect timeout = 8s */
b97bf3fd
PL
63
64struct tipc_sock {
65 struct sock sk;
66 struct tipc_port *p;
26bad2c0 67 struct mutex lock;
b97bf3fd
PL
68};
69
70#define tipc_sk(sk) ((struct tipc_sock*)sk)
71
72static u32 dispatch(struct tipc_port *tport, struct sk_buff *buf);
73static void wakeupdispatch(struct tipc_port *tport);
74
bca65eae
FW
75static const struct proto_ops packet_ops;
76static const struct proto_ops stream_ops;
77static const struct proto_ops msg_ops;
b97bf3fd
PL
78
79static struct proto tipc_proto;
80
81static int sockets_enabled = 0;
82
83static atomic_t tipc_queue_size = ATOMIC_INIT(0);
84
85
c4307285
YH
86/*
87 * sock_lock(): Lock a port/socket pair. lock_sock() can
88 * not be used here, since the same lock must protect ports
b97bf3fd
PL
89 * with non-socket interfaces.
90 * See net.c for description of locking policy.
91 */
05790c64 92static void sock_lock(struct tipc_sock* tsock)
b97bf3fd 93{
c4307285 94 spin_lock_bh(tsock->p->lock);
b97bf3fd
PL
95}
96
c4307285 97/*
b97bf3fd
PL
98 * sock_unlock(): Unlock a port/socket pair
99 */
05790c64 100static void sock_unlock(struct tipc_sock* tsock)
b97bf3fd 101{
c4307285 102 spin_unlock_bh(tsock->p->lock);
b97bf3fd
PL
103}
104
b97bf3fd
PL
105/**
106 * advance_queue - discard first buffer in queue
107 * @tsock: TIPC socket
108 */
109
05790c64 110static void advance_queue(struct tipc_sock *tsock)
b97bf3fd 111{
c4307285 112 sock_lock(tsock);
b97bf3fd 113 buf_discard(skb_dequeue(&tsock->sk.sk_receive_queue));
c4307285 114 sock_unlock(tsock);
b97bf3fd
PL
115 atomic_dec(&tipc_queue_size);
116}
117
118/**
119 * tipc_create - create a TIPC socket
120 * @sock: pre-allocated socket structure
121 * @protocol: protocol indicator (must be 0)
c4307285 122 *
b97bf3fd
PL
123 * This routine creates and attaches a 'struct sock' to the 'struct socket',
124 * then create and attaches a TIPC port to the 'struct sock' part.
125 *
126 * Returns 0 on success, errno otherwise
127 */
1b8d7ae4 128static int tipc_create(struct net *net, struct socket *sock, int protocol)
b97bf3fd
PL
129{
130 struct tipc_sock *tsock;
131 struct tipc_port *port;
132 struct sock *sk;
c4307285 133 u32 ref;
b97bf3fd 134
1b8d7ae4
EB
135 if (net != &init_net)
136 return -EAFNOSUPPORT;
137
b97bf3fd
PL
138 if (unlikely(protocol != 0))
139 return -EPROTONOSUPPORT;
140
1fc54d8f 141 ref = tipc_createport_raw(NULL, &dispatch, &wakeupdispatch, TIPC_LOW_IMPORTANCE);
b97bf3fd
PL
142 if (unlikely(!ref))
143 return -ENOMEM;
144
145 sock->state = SS_UNCONNECTED;
146
147 switch (sock->type) {
148 case SOCK_STREAM:
149 sock->ops = &stream_ops;
150 break;
151 case SOCK_SEQPACKET:
152 sock->ops = &packet_ops;
153 break;
154 case SOCK_DGRAM:
155 tipc_set_portunreliable(ref, 1);
156 /* fall through */
157 case SOCK_RDM:
158 tipc_set_portunreturnable(ref, 1);
159 sock->ops = &msg_ops;
160 sock->state = SS_READY;
161 break;
49978651
AS
162 default:
163 tipc_deleteport(ref);
164 return -EPROTOTYPE;
b97bf3fd
PL
165 }
166
6257ff21 167 sk = sk_alloc(net, AF_TIPC, GFP_KERNEL, &tipc_proto);
b97bf3fd
PL
168 if (!sk) {
169 tipc_deleteport(ref);
170 return -ENOMEM;
171 }
172
173 sock_init_data(sock, sk);
3654ea02 174 sk->sk_rcvtimeo = msecs_to_jiffies(CONN_TIMEOUT_DEFAULT);
b97bf3fd
PL
175
176 tsock = tipc_sk(sk);
177 port = tipc_get_port(ref);
178
179 tsock->p = port;
180 port->usr_handle = tsock;
181
26bad2c0 182 mutex_init(&tsock->lock);
b97bf3fd
PL
183
184 dbg("sock_create: %x\n",tsock);
185
186 atomic_inc(&tipc_user_count);
187
188 return 0;
189}
190
191/**
192 * release - destroy a TIPC socket
193 * @sock: socket to destroy
194 *
195 * This routine cleans up any messages that are still queued on the socket.
196 * For DGRAM and RDM socket types, all queued messages are rejected.
197 * For SEQPACKET and STREAM socket types, the first message is rejected
198 * and any others are discarded. (If the first message on a STREAM socket
199 * is partially-read, it is discarded and the next one is rejected instead.)
c4307285 200 *
b97bf3fd
PL
201 * NOTE: Rejected messages are not necessarily returned to the sender! They
202 * are returned or discarded according to the "destination droppable" setting
203 * specified for the message by the sender.
204 *
205 * Returns 0 on success, errno otherwise
206 */
207
208static int release(struct socket *sock)
209{
210 struct tipc_sock *tsock = tipc_sk(sock->sk);
211 struct sock *sk = sock->sk;
212 int res = TIPC_OK;
213 struct sk_buff *buf;
214
c4307285 215 dbg("sock_delete: %x\n",tsock);
b97bf3fd
PL
216 if (!tsock)
217 return 0;
26bad2c0 218 mutex_lock(&tsock->lock);
b97bf3fd 219 if (!sock->sk) {
26bad2c0 220 mutex_unlock(&tsock->lock);
b97bf3fd
PL
221 return 0;
222 }
c4307285 223
b97bf3fd
PL
224 /* Reject unreceived messages, unless no longer connected */
225
226 while (sock->state != SS_DISCONNECTING) {
227 sock_lock(tsock);
228 buf = skb_dequeue(&sk->sk_receive_queue);
229 if (!buf)
1fc54d8f 230 tsock->p->usr_handle = NULL;
b97bf3fd
PL
231 sock_unlock(tsock);
232 if (!buf)
233 break;
234 if (TIPC_SKB_CB(buf)->handle != msg_data(buf_msg(buf)))
235 buf_discard(buf);
236 else
237 tipc_reject_msg(buf, TIPC_ERR_NO_PORT);
238 atomic_dec(&tipc_queue_size);
239 }
240
241 /* Delete TIPC port */
242
243 res = tipc_deleteport(tsock->p->ref);
244 sock->sk = NULL;
245
246 /* Discard any remaining messages */
247
248 while ((buf = skb_dequeue(&sk->sk_receive_queue))) {
249 buf_discard(buf);
250 atomic_dec(&tipc_queue_size);
251 }
252
26bad2c0 253 mutex_unlock(&tsock->lock);
b97bf3fd
PL
254
255 sock_put(sk);
256
c4307285 257 atomic_dec(&tipc_user_count);
b97bf3fd
PL
258 return res;
259}
260
261/**
262 * bind - associate or disassocate TIPC name(s) with a socket
263 * @sock: socket structure
264 * @uaddr: socket address describing name(s) and desired operation
265 * @uaddr_len: size of socket address data structure
c4307285 266 *
b97bf3fd
PL
267 * Name and name sequence binding is indicated using a positive scope value;
268 * a negative scope value unbinds the specified name. Specifying no name
269 * (i.e. a socket address length of 0) unbinds all names from the socket.
c4307285 270 *
b97bf3fd
PL
271 * Returns 0 on success, errno otherwise
272 */
273
274static int bind(struct socket *sock, struct sockaddr *uaddr, int uaddr_len)
275{
276 struct tipc_sock *tsock = tipc_sk(sock->sk);
277 struct sockaddr_tipc *addr = (struct sockaddr_tipc *)uaddr;
278 int res;
279
26bad2c0 280 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd 281 return -ERESTARTSYS;
c4307285 282
b97bf3fd 283 if (unlikely(!uaddr_len)) {
1fc54d8f 284 res = tipc_withdraw(tsock->p->ref, 0, NULL);
b97bf3fd
PL
285 goto exit;
286 }
287
288 if (uaddr_len < sizeof(struct sockaddr_tipc)) {
289 res = -EINVAL;
290 goto exit;
291 }
292
293 if (addr->family != AF_TIPC) {
294 res = -EAFNOSUPPORT;
295 goto exit;
296 }
297 if (addr->addrtype == TIPC_ADDR_NAME)
298 addr->addr.nameseq.upper = addr->addr.nameseq.lower;
299 else if (addr->addrtype != TIPC_ADDR_NAMESEQ) {
300 res = -EAFNOSUPPORT;
301 goto exit;
302 }
c4307285
YH
303
304 if (addr->scope > 0)
b97bf3fd
PL
305 res = tipc_publish(tsock->p->ref, addr->scope,
306 &addr->addr.nameseq);
307 else
308 res = tipc_withdraw(tsock->p->ref, -addr->scope,
309 &addr->addr.nameseq);
310exit:
26bad2c0 311 mutex_unlock(&tsock->lock);
b97bf3fd
PL
312 return res;
313}
314
c4307285 315/**
b97bf3fd
PL
316 * get_name - get port ID of socket or peer socket
317 * @sock: socket structure
318 * @uaddr: area for returned socket address
319 * @uaddr_len: area for returned length of socket address
320 * @peer: 0 to obtain socket name, 1 to obtain peer socket name
c4307285 321 *
b97bf3fd
PL
322 * Returns 0 on success, errno otherwise
323 */
324
c4307285 325static int get_name(struct socket *sock, struct sockaddr *uaddr,
b97bf3fd
PL
326 int *uaddr_len, int peer)
327{
328 struct tipc_sock *tsock = tipc_sk(sock->sk);
329 struct sockaddr_tipc *addr = (struct sockaddr_tipc *)uaddr;
330 u32 res;
331
26bad2c0 332 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd
PL
333 return -ERESTARTSYS;
334
335 *uaddr_len = sizeof(*addr);
336 addr->addrtype = TIPC_ADDR_ID;
337 addr->family = AF_TIPC;
338 addr->scope = 0;
339 if (peer)
340 res = tipc_peer(tsock->p->ref, &addr->addr.id);
341 else
342 res = tipc_ownidentity(tsock->p->ref, &addr->addr.id);
343 addr->addr.name.domain = 0;
344
26bad2c0 345 mutex_unlock(&tsock->lock);
b97bf3fd
PL
346 return res;
347}
348
349/**
350 * poll - read and possibly block on pollmask
351 * @file: file structure associated with the socket
352 * @sock: socket for which to calculate the poll bits
353 * @wait: ???
354 *
9b674e82
AS
355 * Returns pollmask value
356 *
357 * COMMENTARY:
358 * It appears that the usual socket locking mechanisms are not useful here
359 * since the pollmask info is potentially out-of-date the moment this routine
360 * exits. TCP and other protocols seem to rely on higher level poll routines
361 * to handle any preventable race conditions, so TIPC will do the same ...
362 *
363 * TIPC sets the returned events as follows:
364 * a) POLLRDNORM and POLLIN are set if the socket's receive queue is non-empty
365 * or if a connection-oriented socket is does not have an active connection
366 * (i.e. a read operation will not block).
367 * b) POLLOUT is set except when a socket's connection has been terminated
368 * (i.e. a write operation will not block).
369 * c) POLLHUP is set when a socket's connection has been terminated.
370 *
371 * IMPORTANT: The fact that a read or write operation will not block does NOT
372 * imply that the operation will succeed!
b97bf3fd
PL
373 */
374
c4307285 375static unsigned int poll(struct file *file, struct socket *sock,
b97bf3fd
PL
376 poll_table *wait)
377{
9b674e82
AS
378 struct sock *sk = sock->sk;
379 u32 mask;
380
381 poll_wait(file, sk->sk_sleep, wait);
382
383 if (!skb_queue_empty(&sk->sk_receive_queue) ||
384 (sock->state == SS_UNCONNECTED) ||
385 (sock->state == SS_DISCONNECTING))
386 mask = (POLLRDNORM | POLLIN);
387 else
388 mask = 0;
389
390 if (sock->state == SS_DISCONNECTING)
391 mask |= POLLHUP;
392 else
393 mask |= POLLOUT;
394
395 return mask;
b97bf3fd
PL
396}
397
c4307285 398/**
b97bf3fd
PL
399 * dest_name_check - verify user is permitted to send to specified port name
400 * @dest: destination address
401 * @m: descriptor for message to be sent
c4307285 402 *
b97bf3fd
PL
403 * Prevents restricted configuration commands from being issued by
404 * unauthorized users.
c4307285 405 *
b97bf3fd
PL
406 * Returns 0 if permission is granted, otherwise errno
407 */
408
05790c64 409static int dest_name_check(struct sockaddr_tipc *dest, struct msghdr *m)
b97bf3fd
PL
410{
411 struct tipc_cfg_msg_hdr hdr;
412
c4307285
YH
413 if (likely(dest->addr.name.name.type >= TIPC_RESERVED_TYPES))
414 return 0;
415 if (likely(dest->addr.name.name.type == TIPC_TOP_SRV))
416 return 0;
b97bf3fd 417
c4307285
YH
418 if (likely(dest->addr.name.name.type != TIPC_CFG_SRV))
419 return -EACCES;
b97bf3fd 420
c4307285 421 if (copy_from_user(&hdr, m->msg_iov[0].iov_base, sizeof(hdr)))
b97bf3fd 422 return -EFAULT;
70cb2347 423 if ((ntohs(hdr.tcm_type) & 0xC000) && (!capable(CAP_NET_ADMIN)))
b97bf3fd 424 return -EACCES;
c4307285 425
b97bf3fd
PL
426 return 0;
427}
428
429/**
430 * send_msg - send message in connectionless manner
431 * @iocb: (unused)
432 * @sock: socket structure
433 * @m: message to send
e9024f0f 434 * @total_len: length of message
c4307285 435 *
b97bf3fd 436 * Message must have an destination specified explicitly.
c4307285 437 * Used for SOCK_RDM and SOCK_DGRAM messages,
b97bf3fd
PL
438 * and for 'SYN' messages on SOCK_SEQPACKET and SOCK_STREAM connections.
439 * (Note: 'SYN+' is prohibited on SOCK_STREAM.)
c4307285 440 *
b97bf3fd
PL
441 * Returns the number of bytes sent on success, or errno otherwise
442 */
443
444static int send_msg(struct kiocb *iocb, struct socket *sock,
445 struct msghdr *m, size_t total_len)
446{
447 struct tipc_sock *tsock = tipc_sk(sock->sk);
c4307285 448 struct sockaddr_tipc *dest = (struct sockaddr_tipc *)m->msg_name;
b97bf3fd
PL
449 struct sk_buff *buf;
450 int needs_conn;
451 int res = -EINVAL;
452
453 if (unlikely(!dest))
454 return -EDESTADDRREQ;
51f9cc1f
AS
455 if (unlikely((m->msg_namelen < sizeof(*dest)) ||
456 (dest->family != AF_TIPC)))
b97bf3fd
PL
457 return -EINVAL;
458
459 needs_conn = (sock->state != SS_READY);
460 if (unlikely(needs_conn)) {
461 if (sock->state == SS_LISTENING)
462 return -EPIPE;
463 if (sock->state != SS_UNCONNECTED)
464 return -EISCONN;
465 if ((tsock->p->published) ||
466 ((sock->type == SOCK_STREAM) && (total_len != 0)))
467 return -EOPNOTSUPP;
3388007b
AS
468 if (dest->addrtype == TIPC_ADDR_NAME) {
469 tsock->p->conn_type = dest->addr.name.name.type;
470 tsock->p->conn_instance = dest->addr.name.name.instance;
471 }
b97bf3fd
PL
472 }
473
26bad2c0 474 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd
PL
475 return -ERESTARTSYS;
476
477 if (needs_conn) {
478
479 /* Abort any pending connection attempts (very unlikely) */
480
481 while ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) {
482 tipc_reject_msg(buf, TIPC_ERR_NO_PORT);
483 atomic_dec(&tipc_queue_size);
484 }
485
486 sock->state = SS_CONNECTING;
487 }
488
c4307285
YH
489 do {
490 if (dest->addrtype == TIPC_ADDR_NAME) {
491 if ((res = dest_name_check(dest, m)))
492 goto exit;
493 res = tipc_send2name(tsock->p->ref,
494 &dest->addr.name.name,
495 dest->addr.name.domain,
496 m->msg_iovlen,
497 m->msg_iov);
498 }
499 else if (dest->addrtype == TIPC_ADDR_ID) {
500 res = tipc_send2port(tsock->p->ref,
501 &dest->addr.id,
502 m->msg_iovlen,
503 m->msg_iov);
504 }
505 else if (dest->addrtype == TIPC_ADDR_MCAST) {
b97bf3fd
PL
506 if (needs_conn) {
507 res = -EOPNOTSUPP;
508 goto exit;
509 }
c4307285
YH
510 if ((res = dest_name_check(dest, m)))
511 goto exit;
512 res = tipc_multicast(tsock->p->ref,
513 &dest->addr.nameseq,
514 0,
515 m->msg_iovlen,
516 m->msg_iov);
517 }
518 if (likely(res != -ELINKCONG)) {
519exit:
26bad2c0 520 mutex_unlock(&tsock->lock);
c4307285
YH
521 return res;
522 }
b97bf3fd
PL
523 if (m->msg_flags & MSG_DONTWAIT) {
524 res = -EWOULDBLOCK;
525 goto exit;
526 }
c4307285
YH
527 if (wait_event_interruptible(*sock->sk->sk_sleep,
528 !tsock->p->congested)) {
529 res = -ERESTARTSYS;
530 goto exit;
531 }
532 } while (1);
b97bf3fd
PL
533}
534
c4307285 535/**
b97bf3fd
PL
536 * send_packet - send a connection-oriented message
537 * @iocb: (unused)
538 * @sock: socket structure
539 * @m: message to send
e9024f0f 540 * @total_len: length of message
c4307285 541 *
b97bf3fd 542 * Used for SOCK_SEQPACKET messages and SOCK_STREAM data.
c4307285 543 *
b97bf3fd
PL
544 * Returns the number of bytes sent on success, or errno otherwise
545 */
546
547static int send_packet(struct kiocb *iocb, struct socket *sock,
548 struct msghdr *m, size_t total_len)
549{
550 struct tipc_sock *tsock = tipc_sk(sock->sk);
c4307285 551 struct sockaddr_tipc *dest = (struct sockaddr_tipc *)m->msg_name;
b97bf3fd
PL
552 int res;
553
554 /* Handle implied connection establishment */
555
556 if (unlikely(dest))
557 return send_msg(iocb, sock, m, total_len);
558
26bad2c0 559 if (mutex_lock_interruptible(&tsock->lock)) {
b97bf3fd 560 return -ERESTARTSYS;
c4307285 561 }
b97bf3fd 562
c4307285 563 do {
bdd94789
AS
564 if (unlikely(sock->state != SS_CONNECTED)) {
565 if (sock->state == SS_DISCONNECTING)
c4307285 566 res = -EPIPE;
bdd94789
AS
567 else
568 res = -ENOTCONN;
569 goto exit;
570 }
571
c4307285
YH
572 res = tipc_send(tsock->p->ref, m->msg_iovlen, m->msg_iov);
573 if (likely(res != -ELINKCONG)) {
b97bf3fd 574exit:
26bad2c0 575 mutex_unlock(&tsock->lock);
c4307285
YH
576 return res;
577 }
b97bf3fd
PL
578 if (m->msg_flags & MSG_DONTWAIT) {
579 res = -EWOULDBLOCK;
580 goto exit;
581 }
c4307285
YH
582 if (wait_event_interruptible(*sock->sk->sk_sleep,
583 !tsock->p->congested)) {
584 res = -ERESTARTSYS;
585 goto exit;
586 }
587 } while (1);
b97bf3fd
PL
588}
589
c4307285 590/**
b97bf3fd
PL
591 * send_stream - send stream-oriented data
592 * @iocb: (unused)
593 * @sock: socket structure
594 * @m: data to send
595 * @total_len: total length of data to be sent
c4307285 596 *
b97bf3fd 597 * Used for SOCK_STREAM data.
c4307285
YH
598 *
599 * Returns the number of bytes sent on success (or partial success),
1303e8f1 600 * or errno if no data sent
b97bf3fd
PL
601 */
602
603
604static int send_stream(struct kiocb *iocb, struct socket *sock,
605 struct msghdr *m, size_t total_len)
606{
05646c91 607 struct tipc_port *tport;
b97bf3fd
PL
608 struct msghdr my_msg;
609 struct iovec my_iov;
610 struct iovec *curr_iov;
611 int curr_iovlen;
612 char __user *curr_start;
05646c91 613 u32 hdr_size;
b97bf3fd
PL
614 int curr_left;
615 int bytes_to_send;
1303e8f1 616 int bytes_sent;
b97bf3fd 617 int res;
c4307285 618
05646c91 619 /* Handle special cases where there is no connection */
b97bf3fd 620
c4307285 621 if (unlikely(sock->state != SS_CONNECTED)) {
05646c91
AS
622 if (sock->state == SS_UNCONNECTED)
623 return send_packet(iocb, sock, m, total_len);
624 else if (sock->state == SS_DISCONNECTING)
c4307285
YH
625 return -EPIPE;
626 else
627 return -ENOTCONN;
628 }
b97bf3fd 629
eb5959c2
AS
630 if (unlikely(m->msg_name))
631 return -EISCONN;
632
c4307285 633 /*
b97bf3fd
PL
634 * Send each iovec entry using one or more messages
635 *
c4307285 636 * Note: This algorithm is good for the most likely case
b97bf3fd
PL
637 * (i.e. one large iovec entry), but could be improved to pass sets
638 * of small iovec entries into send_packet().
639 */
640
1303e8f1
AS
641 curr_iov = m->msg_iov;
642 curr_iovlen = m->msg_iovlen;
b97bf3fd
PL
643 my_msg.msg_iov = &my_iov;
644 my_msg.msg_iovlen = 1;
eb5959c2
AS
645 my_msg.msg_flags = m->msg_flags;
646 my_msg.msg_name = NULL;
1303e8f1 647 bytes_sent = 0;
b97bf3fd 648
05646c91
AS
649 tport = tipc_sk(sock->sk)->p;
650 hdr_size = msg_hdr_sz(&tport->phdr);
651
b97bf3fd
PL
652 while (curr_iovlen--) {
653 curr_start = curr_iov->iov_base;
654 curr_left = curr_iov->iov_len;
655
656 while (curr_left) {
05646c91
AS
657 bytes_to_send = tport->max_pkt - hdr_size;
658 if (bytes_to_send > TIPC_MAX_USER_MSG_SIZE)
659 bytes_to_send = TIPC_MAX_USER_MSG_SIZE;
660 if (curr_left < bytes_to_send)
661 bytes_to_send = curr_left;
b97bf3fd
PL
662 my_iov.iov_base = curr_start;
663 my_iov.iov_len = bytes_to_send;
c4307285 664 if ((res = send_packet(iocb, sock, &my_msg, 0)) < 0) {
05646c91
AS
665 if (bytes_sent != 0)
666 res = bytes_sent;
667 return res;
1303e8f1 668 }
b97bf3fd
PL
669 curr_left -= bytes_to_send;
670 curr_start += bytes_to_send;
1303e8f1 671 bytes_sent += bytes_to_send;
b97bf3fd
PL
672 }
673
674 curr_iov++;
675 }
676
1303e8f1 677 return bytes_sent;
b97bf3fd
PL
678}
679
680/**
681 * auto_connect - complete connection setup to a remote port
682 * @sock: socket structure
683 * @tsock: TIPC-specific socket structure
684 * @msg: peer's response message
c4307285 685 *
b97bf3fd
PL
686 * Returns 0 on success, errno otherwise
687 */
688
c4307285 689static int auto_connect(struct socket *sock, struct tipc_sock *tsock,
b97bf3fd
PL
690 struct tipc_msg *msg)
691{
692 struct tipc_portid peer;
693
694 if (msg_errcode(msg)) {
695 sock->state = SS_DISCONNECTING;
696 return -ECONNREFUSED;
697 }
698
699 peer.ref = msg_origport(msg);
700 peer.node = msg_orignode(msg);
701 tipc_connect2port(tsock->p->ref, &peer);
702 tipc_set_portimportance(tsock->p->ref, msg_importance(msg));
703 sock->state = SS_CONNECTED;
704 return 0;
705}
706
707/**
708 * set_orig_addr - capture sender's address for received message
709 * @m: descriptor for message info
710 * @msg: received message header
c4307285 711 *
b97bf3fd
PL
712 * Note: Address is not captured if not requested by receiver.
713 */
714
05790c64 715static void set_orig_addr(struct msghdr *m, struct tipc_msg *msg)
b97bf3fd 716{
c4307285 717 struct sockaddr_tipc *addr = (struct sockaddr_tipc *)m->msg_name;
b97bf3fd 718
c4307285 719 if (addr) {
b97bf3fd
PL
720 addr->family = AF_TIPC;
721 addr->addrtype = TIPC_ADDR_ID;
722 addr->addr.id.ref = msg_origport(msg);
723 addr->addr.id.node = msg_orignode(msg);
724 addr->addr.name.domain = 0; /* could leave uninitialized */
725 addr->scope = 0; /* could leave uninitialized */
726 m->msg_namelen = sizeof(struct sockaddr_tipc);
727 }
728}
729
730/**
c4307285 731 * anc_data_recv - optionally capture ancillary data for received message
b97bf3fd
PL
732 * @m: descriptor for message info
733 * @msg: received message header
734 * @tport: TIPC port associated with message
c4307285 735 *
b97bf3fd 736 * Note: Ancillary data is not captured if not requested by receiver.
c4307285 737 *
b97bf3fd
PL
738 * Returns 0 if successful, otherwise errno
739 */
740
05790c64 741static int anc_data_recv(struct msghdr *m, struct tipc_msg *msg,
b97bf3fd
PL
742 struct tipc_port *tport)
743{
744 u32 anc_data[3];
745 u32 err;
746 u32 dest_type;
3546c750 747 int has_name;
b97bf3fd
PL
748 int res;
749
750 if (likely(m->msg_controllen == 0))
751 return 0;
752
753 /* Optionally capture errored message object(s) */
754
755 err = msg ? msg_errcode(msg) : 0;
756 if (unlikely(err)) {
757 anc_data[0] = err;
758 anc_data[1] = msg_data_sz(msg);
4b087b28 759 if ((res = put_cmsg(m, SOL_TIPC, TIPC_ERRINFO, 8, anc_data)))
b97bf3fd
PL
760 return res;
761 if (anc_data[1] &&
c4307285 762 (res = put_cmsg(m, SOL_TIPC, TIPC_RETDATA, anc_data[1],
b97bf3fd
PL
763 msg_data(msg))))
764 return res;
765 }
766
767 /* Optionally capture message destination object */
768
769 dest_type = msg ? msg_type(msg) : TIPC_DIRECT_MSG;
770 switch (dest_type) {
771 case TIPC_NAMED_MSG:
3546c750 772 has_name = 1;
b97bf3fd
PL
773 anc_data[0] = msg_nametype(msg);
774 anc_data[1] = msg_namelower(msg);
775 anc_data[2] = msg_namelower(msg);
776 break;
777 case TIPC_MCAST_MSG:
3546c750 778 has_name = 1;
b97bf3fd
PL
779 anc_data[0] = msg_nametype(msg);
780 anc_data[1] = msg_namelower(msg);
781 anc_data[2] = msg_nameupper(msg);
782 break;
783 case TIPC_CONN_MSG:
3546c750 784 has_name = (tport->conn_type != 0);
b97bf3fd
PL
785 anc_data[0] = tport->conn_type;
786 anc_data[1] = tport->conn_instance;
787 anc_data[2] = tport->conn_instance;
788 break;
789 default:
3546c750 790 has_name = 0;
b97bf3fd 791 }
3546c750 792 if (has_name &&
4b087b28 793 (res = put_cmsg(m, SOL_TIPC, TIPC_DESTNAME, 12, anc_data)))
b97bf3fd
PL
794 return res;
795
796 return 0;
797}
798
c4307285 799/**
b97bf3fd
PL
800 * recv_msg - receive packet-oriented message
801 * @iocb: (unused)
802 * @m: descriptor for message info
803 * @buf_len: total size of user buffer area
804 * @flags: receive flags
c4307285 805 *
b97bf3fd
PL
806 * Used for SOCK_DGRAM, SOCK_RDM, and SOCK_SEQPACKET messages.
807 * If the complete message doesn't fit in user area, truncate it.
808 *
809 * Returns size of returned message data, errno otherwise
810 */
811
812static int recv_msg(struct kiocb *iocb, struct socket *sock,
813 struct msghdr *m, size_t buf_len, int flags)
814{
815 struct tipc_sock *tsock = tipc_sk(sock->sk);
816 struct sk_buff *buf;
817 struct tipc_msg *msg;
818 unsigned int q_len;
819 unsigned int sz;
820 u32 err;
821 int res;
822
823 /* Currently doesn't support receiving into multiple iovec entries */
824
825 if (m->msg_iovlen != 1)
826 return -EOPNOTSUPP;
827
828 /* Catch invalid receive attempts */
829
830 if (unlikely(!buf_len))
831 return -EINVAL;
832
833 if (sock->type == SOCK_SEQPACKET) {
834 if (unlikely(sock->state == SS_UNCONNECTED))
835 return -ENOTCONN;
c4307285 836 if (unlikely((sock->state == SS_DISCONNECTING) &&
b97bf3fd 837 (skb_queue_len(&sock->sk->sk_receive_queue) == 0)))
c4307285 838 return -ENOTCONN;
b97bf3fd
PL
839 }
840
841 /* Look for a message in receive queue; wait if necessary */
842
26bad2c0 843 if (unlikely(mutex_lock_interruptible(&tsock->lock)))
b97bf3fd
PL
844 return -ERESTARTSYS;
845
846restart:
847 if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) &&
848 (flags & MSG_DONTWAIT))) {
849 res = -EWOULDBLOCK;
850 goto exit;
851 }
852
853 if ((res = wait_event_interruptible(
c4307285 854 *sock->sk->sk_sleep,
b97bf3fd
PL
855 ((q_len = skb_queue_len(&sock->sk->sk_receive_queue)) ||
856 (sock->state == SS_DISCONNECTING))) )) {
857 goto exit;
858 }
859
860 /* Catch attempt to receive on an already terminated connection */
861 /* [THIS CHECK MAY OVERLAP WITH AN EARLIER CHECK] */
862
863 if (!q_len) {
864 res = -ENOTCONN;
865 goto exit;
866 }
867
868 /* Get access to first message in receive queue */
869
870 buf = skb_peek(&sock->sk->sk_receive_queue);
871 msg = buf_msg(buf);
872 sz = msg_data_sz(msg);
873 err = msg_errcode(msg);
874
875 /* Complete connection setup for an implied connect */
876
877 if (unlikely(sock->state == SS_CONNECTING)) {
878 if ((res = auto_connect(sock, tsock, msg)))
879 goto exit;
880 }
881
882 /* Discard an empty non-errored message & try again */
883
884 if ((!sz) && (!err)) {
885 advance_queue(tsock);
886 goto restart;
887 }
888
889 /* Capture sender's address (optional) */
890
891 set_orig_addr(m, msg);
892
893 /* Capture ancillary data (optional) */
894
895 if ((res = anc_data_recv(m, msg, tsock->p)))
896 goto exit;
897
898 /* Capture message data (if valid) & compute return value (always) */
c4307285 899
b97bf3fd
PL
900 if (!err) {
901 if (unlikely(buf_len < sz)) {
902 sz = buf_len;
903 m->msg_flags |= MSG_TRUNC;
904 }
905 if (unlikely(copy_to_user(m->msg_iov->iov_base, msg_data(msg),
906 sz))) {
907 res = -EFAULT;
908 goto exit;
909 }
910 res = sz;
911 } else {
912 if ((sock->state == SS_READY) ||
913 ((err == TIPC_CONN_SHUTDOWN) || m->msg_control))
914 res = 0;
915 else
916 res = -ECONNRESET;
917 }
918
919 /* Consume received message (optional) */
920
921 if (likely(!(flags & MSG_PEEK))) {
99009806
AS
922 if ((sock->state != SS_READY) &&
923 (++tsock->p->conn_unacked >= TIPC_FLOW_CONTROL_WIN))
c4307285 924 tipc_acknowledge(tsock->p->ref, tsock->p->conn_unacked);
b97bf3fd 925 advance_queue(tsock);
c4307285 926 }
b97bf3fd 927exit:
26bad2c0 928 mutex_unlock(&tsock->lock);
b97bf3fd
PL
929 return res;
930}
931
c4307285 932/**
b97bf3fd
PL
933 * recv_stream - receive stream-oriented data
934 * @iocb: (unused)
935 * @m: descriptor for message info
936 * @buf_len: total size of user buffer area
937 * @flags: receive flags
c4307285
YH
938 *
939 * Used for SOCK_STREAM messages only. If not enough data is available
b97bf3fd
PL
940 * will optionally wait for more; never truncates data.
941 *
942 * Returns size of returned message data, errno otherwise
943 */
944
945static int recv_stream(struct kiocb *iocb, struct socket *sock,
946 struct msghdr *m, size_t buf_len, int flags)
947{
948 struct tipc_sock *tsock = tipc_sk(sock->sk);
949 struct sk_buff *buf;
950 struct tipc_msg *msg;
951 unsigned int q_len;
952 unsigned int sz;
953 int sz_to_copy;
954 int sz_copied = 0;
955 int needed;
28c4dadd 956 char __user *crs = m->msg_iov->iov_base;
b97bf3fd
PL
957 unsigned char *buf_crs;
958 u32 err;
959 int res;
960
961 /* Currently doesn't support receiving into multiple iovec entries */
962
963 if (m->msg_iovlen != 1)
964 return -EOPNOTSUPP;
965
966 /* Catch invalid receive attempts */
967
968 if (unlikely(!buf_len))
969 return -EINVAL;
970
971 if (unlikely(sock->state == SS_DISCONNECTING)) {
972 if (skb_queue_len(&sock->sk->sk_receive_queue) == 0)
973 return -ENOTCONN;
974 } else if (unlikely(sock->state != SS_CONNECTED))
975 return -ENOTCONN;
976
977 /* Look for a message in receive queue; wait if necessary */
978
26bad2c0 979 if (unlikely(mutex_lock_interruptible(&tsock->lock)))
b97bf3fd
PL
980 return -ERESTARTSYS;
981
982restart:
983 if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) &&
984 (flags & MSG_DONTWAIT))) {
a3b0a5a9 985 res = -EWOULDBLOCK;
b97bf3fd
PL
986 goto exit;
987 }
988
989 if ((res = wait_event_interruptible(
c4307285 990 *sock->sk->sk_sleep,
b97bf3fd
PL
991 ((q_len = skb_queue_len(&sock->sk->sk_receive_queue)) ||
992 (sock->state == SS_DISCONNECTING))) )) {
993 goto exit;
994 }
995
996 /* Catch attempt to receive on an already terminated connection */
997 /* [THIS CHECK MAY OVERLAP WITH AN EARLIER CHECK] */
998
999 if (!q_len) {
1000 res = -ENOTCONN;
1001 goto exit;
1002 }
1003
1004 /* Get access to first message in receive queue */
1005
1006 buf = skb_peek(&sock->sk->sk_receive_queue);
1007 msg = buf_msg(buf);
1008 sz = msg_data_sz(msg);
1009 err = msg_errcode(msg);
1010
1011 /* Discard an empty non-errored message & try again */
1012
1013 if ((!sz) && (!err)) {
1014 advance_queue(tsock);
1015 goto restart;
1016 }
1017
1018 /* Optionally capture sender's address & ancillary data of first msg */
1019
1020 if (sz_copied == 0) {
1021 set_orig_addr(m, msg);
1022 if ((res = anc_data_recv(m, msg, tsock->p)))
1023 goto exit;
1024 }
1025
1026 /* Capture message data (if valid) & compute return value (always) */
c4307285 1027
b97bf3fd
PL
1028 if (!err) {
1029 buf_crs = (unsigned char *)(TIPC_SKB_CB(buf)->handle);
7a8036c2 1030 sz = (unsigned char *)msg + msg_size(msg) - buf_crs;
b97bf3fd
PL
1031
1032 needed = (buf_len - sz_copied);
1033 sz_to_copy = (sz <= needed) ? sz : needed;
1034 if (unlikely(copy_to_user(crs, buf_crs, sz_to_copy))) {
1035 res = -EFAULT;
1036 goto exit;
1037 }
1038 sz_copied += sz_to_copy;
1039
1040 if (sz_to_copy < sz) {
1041 if (!(flags & MSG_PEEK))
1042 TIPC_SKB_CB(buf)->handle = buf_crs + sz_to_copy;
1043 goto exit;
1044 }
1045
1046 crs += sz_to_copy;
1047 } else {
1048 if (sz_copied != 0)
1049 goto exit; /* can't add error msg to valid data */
1050
1051 if ((err == TIPC_CONN_SHUTDOWN) || m->msg_control)
1052 res = 0;
1053 else
1054 res = -ECONNRESET;
1055 }
1056
1057 /* Consume received message (optional) */
1058
1059 if (likely(!(flags & MSG_PEEK))) {
c4307285
YH
1060 if (unlikely(++tsock->p->conn_unacked >= TIPC_FLOW_CONTROL_WIN))
1061 tipc_acknowledge(tsock->p->ref, tsock->p->conn_unacked);
b97bf3fd 1062 advance_queue(tsock);
c4307285 1063 }
b97bf3fd
PL
1064
1065 /* Loop around if more data is required */
1066
c4307285 1067 if ((sz_copied < buf_len) /* didn't get all requested data */
a198d3a2
AS
1068 && (!skb_queue_empty(&sock->sk->sk_receive_queue) ||
1069 (flags & MSG_WAITALL))
1070 /* ... and more is ready or required */
b97bf3fd
PL
1071 && (!(flags & MSG_PEEK)) /* ... and aren't just peeking at data */
1072 && (!err) /* ... and haven't reached a FIN */
1073 )
1074 goto restart;
1075
1076exit:
26bad2c0 1077 mutex_unlock(&tsock->lock);
a3b0a5a9 1078 return sz_copied ? sz_copied : res;
b97bf3fd
PL
1079}
1080
1081/**
1819b837
AS
1082 * rx_queue_full - determine if receive queue can accept another message
1083 * @msg: message to be added to queue
b97bf3fd
PL
1084 * @queue_size: current size of queue
1085 * @base: nominal maximum size of queue
c4307285 1086 *
1819b837 1087 * Returns 1 if queue is unable to accept message, 0 otherwise
b97bf3fd
PL
1088 */
1089
1819b837 1090static int rx_queue_full(struct tipc_msg *msg, u32 queue_size, u32 base)
b97bf3fd
PL
1091{
1092 u32 threshold;
1093 u32 imp = msg_importance(msg);
1094
1095 if (imp == TIPC_LOW_IMPORTANCE)
1096 threshold = base;
1097 else if (imp == TIPC_MEDIUM_IMPORTANCE)
1098 threshold = base * 2;
1099 else if (imp == TIPC_HIGH_IMPORTANCE)
1100 threshold = base * 100;
1101 else
1102 return 0;
1103
1104 if (msg_connected(msg))
1105 threshold *= 4;
1106
1819b837 1107 return (queue_size >= threshold);
b97bf3fd
PL
1108}
1109
c4307285 1110/**
b97bf3fd
PL
1111 * async_disconnect - wrapper function used to disconnect port
1112 * @portref: TIPC port reference (passed as pointer-sized value)
1113 */
1114
1115static void async_disconnect(unsigned long portref)
1116{
1117 tipc_disconnect((u32)portref);
1118}
1119
c4307285 1120/**
b97bf3fd
PL
1121 * dispatch - handle arriving message
1122 * @tport: TIPC port that received message
1123 * @buf: message
c4307285 1124 *
b97bf3fd 1125 * Called with port locked. Must not take socket lock to avoid deadlock risk.
c4307285 1126 *
b97bf3fd
PL
1127 * Returns TIPC error status code (TIPC_OK if message is not to be rejected)
1128 */
1129
1130static u32 dispatch(struct tipc_port *tport, struct sk_buff *buf)
1131{
1132 struct tipc_msg *msg = buf_msg(buf);
1133 struct tipc_sock *tsock = (struct tipc_sock *)tport->usr_handle;
1134 struct socket *sock;
1135 u32 recv_q_len;
1136
1137 /* Reject message if socket is closing */
1138
1139 if (!tsock)
1140 return TIPC_ERR_NO_PORT;
1141
1142 /* Reject message if it is wrong sort of message for socket */
1143
1144 /*
1145 * WOULD IT BE BETTER TO JUST DISCARD THESE MESSAGES INSTEAD?
1146 * "NO PORT" ISN'T REALLY THE RIGHT ERROR CODE, AND THERE MAY
1147 * BE SECURITY IMPLICATIONS INHERENT IN REJECTING INVALID TRAFFIC
1148 */
1149 sock = tsock->sk.sk_socket;
1150 if (sock->state == SS_READY) {
1151 if (msg_connected(msg)) {
1152 msg_dbg(msg, "dispatch filter 1\n");
1153 return TIPC_ERR_NO_PORT;
1154 }
1155 } else {
1156 if (msg_mcast(msg)) {
1157 msg_dbg(msg, "dispatch filter 2\n");
1158 return TIPC_ERR_NO_PORT;
1159 }
1160 if (sock->state == SS_CONNECTED) {
1161 if (!msg_connected(msg)) {
1162 msg_dbg(msg, "dispatch filter 3\n");
1163 return TIPC_ERR_NO_PORT;
1164 }
1165 }
1166 else if (sock->state == SS_CONNECTING) {
1167 if (!msg_connected(msg) && (msg_errcode(msg) == 0)) {
1168 msg_dbg(msg, "dispatch filter 4\n");
1169 return TIPC_ERR_NO_PORT;
1170 }
c4307285 1171 }
b97bf3fd
PL
1172 else if (sock->state == SS_LISTENING) {
1173 if (msg_connected(msg) || msg_errcode(msg)) {
1174 msg_dbg(msg, "dispatch filter 5\n");
1175 return TIPC_ERR_NO_PORT;
1176 }
c4307285 1177 }
b97bf3fd
PL
1178 else if (sock->state == SS_DISCONNECTING) {
1179 msg_dbg(msg, "dispatch filter 6\n");
1180 return TIPC_ERR_NO_PORT;
1181 }
1182 else /* (sock->state == SS_UNCONNECTED) */ {
1183 if (msg_connected(msg) || msg_errcode(msg)) {
1184 msg_dbg(msg, "dispatch filter 7\n");
1185 return TIPC_ERR_NO_PORT;
1186 }
1187 }
1188 }
1189
1190 /* Reject message if there isn't room to queue it */
1191
1819b837
AS
1192 recv_q_len = (u32)atomic_read(&tipc_queue_size);
1193 if (unlikely(recv_q_len >= OVERLOAD_LIMIT_BASE)) {
1194 if (rx_queue_full(msg, recv_q_len, OVERLOAD_LIMIT_BASE))
b97bf3fd 1195 return TIPC_ERR_OVERLOAD;
c4307285 1196 }
b97bf3fd 1197 recv_q_len = skb_queue_len(&tsock->sk.sk_receive_queue);
1819b837
AS
1198 if (unlikely(recv_q_len >= (OVERLOAD_LIMIT_BASE / 2))) {
1199 if (rx_queue_full(msg, recv_q_len, OVERLOAD_LIMIT_BASE / 2))
b97bf3fd 1200 return TIPC_ERR_OVERLOAD;
c4307285 1201 }
b97bf3fd
PL
1202
1203 /* Initiate connection termination for an incoming 'FIN' */
1204
1205 if (unlikely(msg_errcode(msg) && (sock->state == SS_CONNECTED))) {
1206 sock->state = SS_DISCONNECTING;
1207 /* Note: Use signal since port lock is already taken! */
4323add6 1208 tipc_k_signal((Handler)async_disconnect, tport->ref);
b97bf3fd
PL
1209 }
1210
1211 /* Enqueue message (finally!) */
1212
1213 msg_dbg(msg,"<DISP<: ");
1214 TIPC_SKB_CB(buf)->handle = msg_data(msg);
1215 atomic_inc(&tipc_queue_size);
1216 skb_queue_tail(&sock->sk->sk_receive_queue, buf);
1217
cfb0c089
AS
1218 if (waitqueue_active(sock->sk->sk_sleep))
1219 wake_up_interruptible(sock->sk->sk_sleep);
b97bf3fd
PL
1220 return TIPC_OK;
1221}
1222
c4307285 1223/**
b97bf3fd
PL
1224 * wakeupdispatch - wake up port after congestion
1225 * @tport: port to wakeup
c4307285 1226 *
b97bf3fd
PL
1227 * Called with port lock on.
1228 */
1229
1230static void wakeupdispatch(struct tipc_port *tport)
1231{
1232 struct tipc_sock *tsock = (struct tipc_sock *)tport->usr_handle;
1233
cfb0c089
AS
1234 if (waitqueue_active(tsock->sk.sk_sleep))
1235 wake_up_interruptible(tsock->sk.sk_sleep);
b97bf3fd
PL
1236}
1237
1238/**
1239 * connect - establish a connection to another TIPC port
1240 * @sock: socket structure
1241 * @dest: socket address for destination port
1242 * @destlen: size of socket address data structure
1243 * @flags: (unused)
1244 *
1245 * Returns 0 on success, errno otherwise
1246 */
1247
c4307285 1248static int connect(struct socket *sock, struct sockaddr *dest, int destlen,
b97bf3fd
PL
1249 int flags)
1250{
1251 struct tipc_sock *tsock = tipc_sk(sock->sk);
1252 struct sockaddr_tipc *dst = (struct sockaddr_tipc *)dest;
1fc54d8f 1253 struct msghdr m = {NULL,};
b97bf3fd
PL
1254 struct sk_buff *buf;
1255 struct tipc_msg *msg;
1256 int res;
1257
1258 /* For now, TIPC does not allow use of connect() with DGRAM or RDM types */
1259
1260 if (sock->state == SS_READY)
1261 return -EOPNOTSUPP;
1262
4934c69a
AS
1263 /* For now, TIPC does not support the non-blocking form of connect() */
1264
1265 if (flags & O_NONBLOCK)
1266 return -EWOULDBLOCK;
1267
51f9cc1f
AS
1268 /* Issue Posix-compliant error code if socket is in the wrong state */
1269
b97bf3fd
PL
1270 if (sock->state == SS_LISTENING)
1271 return -EOPNOTSUPP;
1272 if (sock->state == SS_CONNECTING)
1273 return -EALREADY;
1274 if (sock->state != SS_UNCONNECTED)
c4307285 1275 return -EISCONN;
b97bf3fd 1276
51f9cc1f
AS
1277 /*
1278 * Reject connection attempt using multicast address
1279 *
1280 * Note: send_msg() validates the rest of the address fields,
1281 * so there's no need to do it here
1282 */
1283
1284 if (dst->addrtype == TIPC_ADDR_MCAST)
c4307285 1285 return -EINVAL;
b97bf3fd
PL
1286
1287 /* Send a 'SYN-' to destination */
1288
1289 m.msg_name = dest;
51f9cc1f 1290 m.msg_namelen = destlen;
1fc54d8f 1291 if ((res = send_msg(NULL, sock, &m, 0)) < 0) {
b97bf3fd
PL
1292 sock->state = SS_DISCONNECTING;
1293 return res;
1294 }
1295
26bad2c0 1296 if (mutex_lock_interruptible(&tsock->lock))
c4307285
YH
1297 return -ERESTARTSYS;
1298
b97bf3fd
PL
1299 /* Wait for destination's 'ACK' response */
1300
1301 res = wait_event_interruptible_timeout(*sock->sk->sk_sleep,
c4307285 1302 skb_queue_len(&sock->sk->sk_receive_queue),
b97bf3fd
PL
1303 sock->sk->sk_rcvtimeo);
1304 buf = skb_peek(&sock->sk->sk_receive_queue);
1305 if (res > 0) {
1306 msg = buf_msg(buf);
c4307285
YH
1307 res = auto_connect(sock, tsock, msg);
1308 if (!res) {
b97bf3fd
PL
1309 if (!msg_data_sz(msg))
1310 advance_queue(tsock);
1311 }
1312 } else {
1313 if (res == 0) {
1314 res = -ETIMEDOUT;
1315 } else
c4307285 1316 { /* leave "res" unchanged */ }
b97bf3fd
PL
1317 sock->state = SS_DISCONNECTING;
1318 }
1319
26bad2c0 1320 mutex_unlock(&tsock->lock);
b97bf3fd
PL
1321 return res;
1322}
1323
c4307285 1324/**
b97bf3fd
PL
1325 * listen - allow socket to listen for incoming connections
1326 * @sock: socket structure
1327 * @len: (unused)
c4307285 1328 *
b97bf3fd
PL
1329 * Returns 0 on success, errno otherwise
1330 */
1331
1332static int listen(struct socket *sock, int len)
1333{
1334 /* REQUIRES SOCKET LOCKING OF SOME SORT? */
1335
1336 if (sock->state == SS_READY)
1337 return -EOPNOTSUPP;
1338 if (sock->state != SS_UNCONNECTED)
1339 return -EINVAL;
1340 sock->state = SS_LISTENING;
c4307285 1341 return 0;
b97bf3fd
PL
1342}
1343
c4307285 1344/**
b97bf3fd
PL
1345 * accept - wait for connection request
1346 * @sock: listening socket
1347 * @newsock: new socket that is to be connected
1348 * @flags: file-related flags associated with socket
c4307285 1349 *
b97bf3fd
PL
1350 * Returns 0 on success, errno otherwise
1351 */
1352
1353static int accept(struct socket *sock, struct socket *newsock, int flags)
1354{
1355 struct tipc_sock *tsock = tipc_sk(sock->sk);
1356 struct sk_buff *buf;
1357 int res = -EFAULT;
1358
1359 if (sock->state == SS_READY)
1360 return -EOPNOTSUPP;
1361 if (sock->state != SS_LISTENING)
1362 return -EINVAL;
c4307285
YH
1363
1364 if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) &&
b97bf3fd
PL
1365 (flags & O_NONBLOCK)))
1366 return -EWOULDBLOCK;
1367
26bad2c0 1368 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd
PL
1369 return -ERESTARTSYS;
1370
c4307285 1371 if (wait_event_interruptible(*sock->sk->sk_sleep,
b97bf3fd
PL
1372 skb_queue_len(&sock->sk->sk_receive_queue))) {
1373 res = -ERESTARTSYS;
1374 goto exit;
1375 }
1376 buf = skb_peek(&sock->sk->sk_receive_queue);
1377
3b1e0a65 1378 res = tipc_create(sock_net(sock->sk), newsock, 0);
b97bf3fd
PL
1379 if (!res) {
1380 struct tipc_sock *new_tsock = tipc_sk(newsock->sk);
1381 struct tipc_portid id;
1382 struct tipc_msg *msg = buf_msg(buf);
1383 u32 new_ref = new_tsock->p->ref;
1384
1385 id.ref = msg_origport(msg);
1386 id.node = msg_orignode(msg);
1387 tipc_connect2port(new_ref, &id);
1388 newsock->state = SS_CONNECTED;
1389
1390 tipc_set_portimportance(new_ref, msg_importance(msg));
1391 if (msg_named(msg)) {
1392 new_tsock->p->conn_type = msg_nametype(msg);
1393 new_tsock->p->conn_instance = msg_nameinst(msg);
1394 }
1395
c4307285 1396 /*
b97bf3fd
PL
1397 * Respond to 'SYN-' by discarding it & returning 'ACK'-.
1398 * Respond to 'SYN+' by queuing it on new socket.
1399 */
1400
1401 msg_dbg(msg,"<ACC<: ");
c4307285
YH
1402 if (!msg_data_sz(msg)) {
1403 struct msghdr m = {NULL,};
b97bf3fd 1404
c4307285
YH
1405 send_packet(NULL, newsock, &m, 0);
1406 advance_queue(tsock);
1407 } else {
b97bf3fd
PL
1408 sock_lock(tsock);
1409 skb_dequeue(&sock->sk->sk_receive_queue);
1410 sock_unlock(tsock);
1411 skb_queue_head(&newsock->sk->sk_receive_queue, buf);
1412 }
1413 }
1414exit:
26bad2c0 1415 mutex_unlock(&tsock->lock);
b97bf3fd
PL
1416 return res;
1417}
1418
1419/**
1420 * shutdown - shutdown socket connection
1421 * @sock: socket structure
e247a8f5 1422 * @how: direction to close (must be SHUT_RDWR)
b97bf3fd
PL
1423 *
1424 * Terminates connection (if necessary), then purges socket's receive queue.
c4307285 1425 *
b97bf3fd
PL
1426 * Returns 0 on success, errno otherwise
1427 */
1428
1429static int shutdown(struct socket *sock, int how)
1430{
1431 struct tipc_sock* tsock = tipc_sk(sock->sk);
1432 struct sk_buff *buf;
1433 int res;
1434
e247a8f5
AS
1435 if (how != SHUT_RDWR)
1436 return -EINVAL;
b97bf3fd 1437
26bad2c0 1438 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd
PL
1439 return -ERESTARTSYS;
1440
1441 sock_lock(tsock);
1442
1443 switch (sock->state) {
1444 case SS_CONNECTED:
1445
1446 /* Send 'FIN+' or 'FIN-' message to peer */
1447
1448 sock_unlock(tsock);
1449restart:
1450 if ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) {
1451 atomic_dec(&tipc_queue_size);
1452 if (TIPC_SKB_CB(buf)->handle != msg_data(buf_msg(buf))) {
1453 buf_discard(buf);
1454 goto restart;
1455 }
1456 tipc_reject_msg(buf, TIPC_CONN_SHUTDOWN);
1457 }
1458 else {
1459 tipc_shutdown(tsock->p->ref);
1460 }
1461 sock_lock(tsock);
1462
1463 /* fall through */
1464
1465 case SS_DISCONNECTING:
1466
1467 /* Discard any unreceived messages */
1468
1469 while ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) {
1470 atomic_dec(&tipc_queue_size);
1471 buf_discard(buf);
1472 }
1473 tsock->p->conn_unacked = 0;
1474
1475 /* fall through */
1476
1477 case SS_CONNECTING:
1478 sock->state = SS_DISCONNECTING;
1479 res = 0;
1480 break;
1481
1482 default:
1483 res = -ENOTCONN;
1484 }
1485
1486 sock_unlock(tsock);
1487
26bad2c0 1488 mutex_unlock(&tsock->lock);
b97bf3fd
PL
1489 return res;
1490}
1491
1492/**
1493 * setsockopt - set socket option
1494 * @sock: socket structure
1495 * @lvl: option level
1496 * @opt: option identifier
1497 * @ov: pointer to new option value
1498 * @ol: length of option value
c4307285
YH
1499 *
1500 * For stream sockets only, accepts and ignores all IPPROTO_TCP options
b97bf3fd 1501 * (to ease compatibility).
c4307285 1502 *
b97bf3fd
PL
1503 * Returns 0 on success, errno otherwise
1504 */
1505
c4307285 1506static int setsockopt(struct socket *sock,
e9024f0f 1507 int lvl, int opt, char __user *ov, int ol)
b97bf3fd
PL
1508{
1509 struct tipc_sock *tsock = tipc_sk(sock->sk);
1510 u32 value;
1511 int res;
1512
c4307285
YH
1513 if ((lvl == IPPROTO_TCP) && (sock->type == SOCK_STREAM))
1514 return 0;
b97bf3fd
PL
1515 if (lvl != SOL_TIPC)
1516 return -ENOPROTOOPT;
1517 if (ol < sizeof(value))
1518 return -EINVAL;
c4307285 1519 if ((res = get_user(value, (u32 __user *)ov)))
b97bf3fd
PL
1520 return res;
1521
26bad2c0 1522 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd 1523 return -ERESTARTSYS;
c4307285 1524
b97bf3fd
PL
1525 switch (opt) {
1526 case TIPC_IMPORTANCE:
1527 res = tipc_set_portimportance(tsock->p->ref, value);
1528 break;
1529 case TIPC_SRC_DROPPABLE:
1530 if (sock->type != SOCK_STREAM)
1531 res = tipc_set_portunreliable(tsock->p->ref, value);
c4307285 1532 else
b97bf3fd
PL
1533 res = -ENOPROTOOPT;
1534 break;
1535 case TIPC_DEST_DROPPABLE:
1536 res = tipc_set_portunreturnable(tsock->p->ref, value);
1537 break;
1538 case TIPC_CONN_TIMEOUT:
3654ea02 1539 sock->sk->sk_rcvtimeo = msecs_to_jiffies(value);
b97bf3fd
PL
1540 break;
1541 default:
1542 res = -EINVAL;
1543 }
1544
26bad2c0 1545 mutex_unlock(&tsock->lock);
b97bf3fd
PL
1546 return res;
1547}
1548
1549/**
1550 * getsockopt - get socket option
1551 * @sock: socket structure
1552 * @lvl: option level
1553 * @opt: option identifier
1554 * @ov: receptacle for option value
1555 * @ol: receptacle for length of option value
c4307285
YH
1556 *
1557 * For stream sockets only, returns 0 length result for all IPPROTO_TCP options
b97bf3fd 1558 * (to ease compatibility).
c4307285 1559 *
b97bf3fd
PL
1560 * Returns 0 on success, errno otherwise
1561 */
1562
c4307285 1563static int getsockopt(struct socket *sock,
28c4dadd 1564 int lvl, int opt, char __user *ov, int __user *ol)
b97bf3fd
PL
1565{
1566 struct tipc_sock *tsock = tipc_sk(sock->sk);
c4307285 1567 int len;
b97bf3fd 1568 u32 value;
c4307285 1569 int res;
b97bf3fd 1570
c4307285
YH
1571 if ((lvl == IPPROTO_TCP) && (sock->type == SOCK_STREAM))
1572 return put_user(0, ol);
b97bf3fd
PL
1573 if (lvl != SOL_TIPC)
1574 return -ENOPROTOOPT;
c4307285
YH
1575 if ((res = get_user(len, ol)))
1576 return res;
b97bf3fd 1577
26bad2c0 1578 if (mutex_lock_interruptible(&tsock->lock))
b97bf3fd
PL
1579 return -ERESTARTSYS;
1580
1581 switch (opt) {
1582 case TIPC_IMPORTANCE:
1583 res = tipc_portimportance(tsock->p->ref, &value);
1584 break;
1585 case TIPC_SRC_DROPPABLE:
1586 res = tipc_portunreliable(tsock->p->ref, &value);
1587 break;
1588 case TIPC_DEST_DROPPABLE:
1589 res = tipc_portunreturnable(tsock->p->ref, &value);
1590 break;
1591 case TIPC_CONN_TIMEOUT:
3654ea02 1592 value = jiffies_to_msecs(sock->sk->sk_rcvtimeo);
b97bf3fd
PL
1593 break;
1594 default:
1595 res = -EINVAL;
1596 }
1597
1598 if (res) {
1599 /* "get" failed */
1600 }
1601 else if (len < sizeof(value)) {
1602 res = -EINVAL;
1603 }
1604 else if ((res = copy_to_user(ov, &value, sizeof(value)))) {
1605 /* couldn't return value */
1606 }
1607 else {
1608 res = put_user(sizeof(value), ol);
1609 }
1610
26bad2c0 1611 mutex_unlock(&tsock->lock);
b97bf3fd
PL
1612 return res;
1613}
1614
b97bf3fd
PL
1615/**
1616 * Protocol switches for the various types of TIPC sockets
1617 */
1618
bca65eae 1619static const struct proto_ops msg_ops = {
b97bf3fd
PL
1620 .owner = THIS_MODULE,
1621 .family = AF_TIPC,
1622 .release = release,
1623 .bind = bind,
1624 .connect = connect,
5eee6a6d 1625 .socketpair = sock_no_socketpair,
b97bf3fd
PL
1626 .accept = accept,
1627 .getname = get_name,
1628 .poll = poll,
5eee6a6d 1629 .ioctl = sock_no_ioctl,
b97bf3fd
PL
1630 .listen = listen,
1631 .shutdown = shutdown,
1632 .setsockopt = setsockopt,
1633 .getsockopt = getsockopt,
1634 .sendmsg = send_msg,
1635 .recvmsg = recv_msg,
8238745a
YH
1636 .mmap = sock_no_mmap,
1637 .sendpage = sock_no_sendpage
b97bf3fd
PL
1638};
1639
bca65eae 1640static const struct proto_ops packet_ops = {
b97bf3fd
PL
1641 .owner = THIS_MODULE,
1642 .family = AF_TIPC,
1643 .release = release,
1644 .bind = bind,
1645 .connect = connect,
5eee6a6d 1646 .socketpair = sock_no_socketpair,
b97bf3fd
PL
1647 .accept = accept,
1648 .getname = get_name,
1649 .poll = poll,
5eee6a6d 1650 .ioctl = sock_no_ioctl,
b97bf3fd
PL
1651 .listen = listen,
1652 .shutdown = shutdown,
1653 .setsockopt = setsockopt,
1654 .getsockopt = getsockopt,
1655 .sendmsg = send_packet,
1656 .recvmsg = recv_msg,
8238745a
YH
1657 .mmap = sock_no_mmap,
1658 .sendpage = sock_no_sendpage
b97bf3fd
PL
1659};
1660
bca65eae 1661static const struct proto_ops stream_ops = {
b97bf3fd
PL
1662 .owner = THIS_MODULE,
1663 .family = AF_TIPC,
1664 .release = release,
1665 .bind = bind,
1666 .connect = connect,
5eee6a6d 1667 .socketpair = sock_no_socketpair,
b97bf3fd
PL
1668 .accept = accept,
1669 .getname = get_name,
1670 .poll = poll,
5eee6a6d 1671 .ioctl = sock_no_ioctl,
b97bf3fd
PL
1672 .listen = listen,
1673 .shutdown = shutdown,
1674 .setsockopt = setsockopt,
1675 .getsockopt = getsockopt,
1676 .sendmsg = send_stream,
1677 .recvmsg = recv_stream,
8238745a
YH
1678 .mmap = sock_no_mmap,
1679 .sendpage = sock_no_sendpage
b97bf3fd
PL
1680};
1681
bca65eae 1682static const struct net_proto_family tipc_family_ops = {
b97bf3fd
PL
1683 .owner = THIS_MODULE,
1684 .family = AF_TIPC,
1685 .create = tipc_create
1686};
1687
1688static struct proto tipc_proto = {
1689 .name = "TIPC",
1690 .owner = THIS_MODULE,
1691 .obj_size = sizeof(struct tipc_sock)
1692};
1693
1694/**
4323add6 1695 * tipc_socket_init - initialize TIPC socket interface
c4307285 1696 *
b97bf3fd
PL
1697 * Returns 0 on success, errno otherwise
1698 */
4323add6 1699int tipc_socket_init(void)
b97bf3fd
PL
1700{
1701 int res;
1702
c4307285 1703 res = proto_register(&tipc_proto, 1);
b97bf3fd 1704 if (res) {
d0a14a9d 1705 err("Failed to register TIPC protocol type\n");
b97bf3fd
PL
1706 goto out;
1707 }
1708
1709 res = sock_register(&tipc_family_ops);
1710 if (res) {
d0a14a9d 1711 err("Failed to register TIPC socket type\n");
b97bf3fd
PL
1712 proto_unregister(&tipc_proto);
1713 goto out;
1714 }
1715
1716 sockets_enabled = 1;
1717 out:
1718 return res;
1719}
1720
1721/**
4323add6 1722 * tipc_socket_stop - stop TIPC socket interface
b97bf3fd 1723 */
4323add6 1724void tipc_socket_stop(void)
b97bf3fd
PL
1725{
1726 if (!sockets_enabled)
1727 return;
1728
1729 sockets_enabled = 0;
1730 sock_unregister(tipc_family_ops.family);
1731 proto_unregister(&tipc_proto);
1732}
1733