phonet: refcount leak in pep_sock_accep
[linux-2.6-block.git] / net / phonet / pep.c
CommitLineData
2b27bdcc 1// SPDX-License-Identifier: GPL-2.0-only
9641458d
RDC
2/*
3 * File: pep.c
4 *
5 * Phonet pipe protocol end point socket
6 *
7 * Copyright (C) 2008 Nokia Corporation.
8 *
31fdc555 9 * Author: Rémi Denis-Courmont
9641458d
RDC
10 */
11
12#include <linux/kernel.h>
174cd4b1 13#include <linux/sched/signal.h>
5a0e3ad6 14#include <linux/slab.h>
9641458d
RDC
15#include <linux/socket.h>
16#include <net/sock.h>
17#include <net/tcp_states.h>
18#include <asm/ioctls.h>
19
20#include <linux/phonet.h>
3a9a231d 21#include <linux/module.h>
9641458d
RDC
22#include <net/phonet/phonet.h>
23#include <net/phonet/pep.h>
02a47617 24#include <net/phonet/gprs.h>
9641458d
RDC
25
26/* sk_state values:
27 * TCP_CLOSE sock not in use yet
28 * TCP_CLOSE_WAIT disconnected pipe
29 * TCP_LISTEN listening pipe endpoint
30 * TCP_SYN_RECV connected pipe in disabled state
31 * TCP_ESTABLISHED connected pipe in enabled state
32 *
33 * pep_sock locking:
f7ae8d59 34 * - sk_state, hlist: sock lock needed
9641458d
RDC
35 * - listener: read only
36 * - pipe_handle: read only
37 */
38
39#define CREDITS_MAX 10
40#define CREDITS_THR 7
41
9641458d
RDC
42#define pep_sb_size(s) (((s) + 5) & ~3) /* 2-bytes head, 32-bits aligned */
43
44/* Get the next TLV sub-block. */
45static unsigned char *pep_get_sb(struct sk_buff *skb, u8 *ptype, u8 *plen,
46 void *buf)
47{
48 void *data = NULL;
49 struct {
50 u8 sb_type;
51 u8 sb_len;
52 } *ph, h;
53 int buflen = *plen;
54
55 ph = skb_header_pointer(skb, 0, 2, &h);
56 if (ph == NULL || ph->sb_len < 2 || !pskb_may_pull(skb, ph->sb_len))
57 return NULL;
58 ph->sb_len -= 2;
59 *ptype = ph->sb_type;
60 *plen = ph->sb_len;
61
62 if (buflen > ph->sb_len)
63 buflen = ph->sb_len;
64 data = skb_header_pointer(skb, 2, buflen, buf);
65 __skb_pull(skb, 2 + ph->sb_len);
66 return data;
67}
68
44c9ab16
RDC
69static struct sk_buff *pep_alloc_skb(struct sock *sk, const void *payload,
70 int len, gfp_t priority)
71{
72 struct sk_buff *skb = alloc_skb(MAX_PNPIPE_HEADER + len, priority);
73 if (!skb)
74 return NULL;
75 skb_set_owner_w(skb, sk);
76
77 skb_reserve(skb, MAX_PNPIPE_HEADER);
78 __skb_put(skb, len);
79 skb_copy_to_linear_data(skb, payload, len);
80 __skb_push(skb, sizeof(struct pnpipehdr));
81 skb_reset_transport_header(skb);
82 return skb;
83}
84
85static int pep_reply(struct sock *sk, struct sk_buff *oskb, u8 code,
86 const void *data, int len, gfp_t priority)
9641458d
RDC
87{
88 const struct pnpipehdr *oph = pnp_hdr(oskb);
89 struct pnpipehdr *ph;
90 struct sk_buff *skb;
14ba8fae 91 struct sockaddr_pn peer;
9641458d 92
44c9ab16 93 skb = pep_alloc_skb(sk, data, len, priority);
9641458d
RDC
94 if (!skb)
95 return -ENOMEM;
9641458d 96
9641458d
RDC
97 ph = pnp_hdr(skb);
98 ph->utid = oph->utid;
99 ph->message_id = oph->message_id + 1; /* REQ -> RESP */
100 ph->pipe_handle = oph->pipe_handle;
101 ph->error_code = code;
102
14ba8fae
RDC
103 pn_skb_get_src_sockaddr(oskb, &peer);
104 return pn_skb_send(sk, skb, &peer);
9641458d
RDC
105}
106
44c9ab16
RDC
107static int pep_indicate(struct sock *sk, u8 id, u8 code,
108 const void *data, int len, gfp_t priority)
8d98efa8 109{
44c9ab16 110 struct pep_sock *pn = pep_sk(sk);
8d98efa8
KS
111 struct pnpipehdr *ph;
112 struct sk_buff *skb;
8d98efa8 113
44c9ab16 114 skb = pep_alloc_skb(sk, data, len, priority);
8d98efa8
KS
115 if (!skb)
116 return -ENOMEM;
8d98efa8 117
8d98efa8 118 ph = pnp_hdr(skb);
44c9ab16
RDC
119 ph->utid = 0;
120 ph->message_id = id;
b3d62553 121 ph->pipe_handle = pn->pipe_handle;
6321aa19 122 ph->error_code = code;
14ba8fae 123 return pn_skb_send(sk, skb, NULL);
8d98efa8
KS
124}
125
44c9ab16
RDC
126#define PAD 0x00
127
44c9ab16
RDC
128static int pipe_handler_request(struct sock *sk, u8 id, u8 code,
129 const void *data, int len)
8d98efa8 130{
44c9ab16 131 struct pep_sock *pn = pep_sk(sk);
8d98efa8
KS
132 struct pnpipehdr *ph;
133 struct sk_buff *skb;
8d98efa8 134
44c9ab16 135 skb = pep_alloc_skb(sk, data, len, GFP_KERNEL);
8d98efa8
KS
136 if (!skb)
137 return -ENOMEM;
8d98efa8 138
8d98efa8 139 ph = pnp_hdr(skb);
44c9ab16
RDC
140 ph->utid = id; /* whatever */
141 ph->message_id = id;
b3d62553 142 ph->pipe_handle = pn->pipe_handle;
6321aa19 143 ph->error_code = code;
14ba8fae 144 return pn_skb_send(sk, skb, NULL);
8d98efa8
KS
145}
146
44c9ab16 147static int pipe_handler_send_created_ind(struct sock *sk)
8d98efa8 148{
b3d62553 149 struct pep_sock *pn = pep_sk(sk);
44c9ab16
RDC
150 u8 data[4] = {
151 PN_PIPE_SB_NEGOTIATED_FC, pep_sb_size(2),
152 pn->tx_fc, pn->rx_fc,
153 };
8d98efa8 154
44c9ab16
RDC
155 return pep_indicate(sk, PNS_PIPE_CREATED_IND, 1 /* sub-blocks */,
156 data, 4, GFP_ATOMIC);
157}
8d98efa8 158
9641458d
RDC
159static int pep_accept_conn(struct sock *sk, struct sk_buff *skb)
160{
161 static const u8 data[20] = {
162 PAD, PAD, PAD, 2 /* sub-blocks */,
163 PN_PIPE_SB_REQUIRED_FC_TX, pep_sb_size(5), 3, PAD,
164 PN_MULTI_CREDIT_FLOW_CONTROL,
165 PN_ONE_CREDIT_FLOW_CONTROL,
166 PN_LEGACY_FLOW_CONTROL,
167 PAD,
168 PN_PIPE_SB_PREFERRED_FC_RX, pep_sb_size(5), 3, PAD,
169 PN_MULTI_CREDIT_FLOW_CONTROL,
170 PN_ONE_CREDIT_FLOW_CONTROL,
171 PN_LEGACY_FLOW_CONTROL,
172 PAD,
173 };
174
175 might_sleep();
176 return pep_reply(sk, skb, PN_PIPE_NO_ERROR, data, sizeof(data),
177 GFP_KERNEL);
178}
179
f7ae8d59
RDC
180static int pep_reject_conn(struct sock *sk, struct sk_buff *skb, u8 code,
181 gfp_t priority)
9641458d
RDC
182{
183 static const u8 data[4] = { PAD, PAD, PAD, 0 /* sub-blocks */ };
184 WARN_ON(code == PN_PIPE_NO_ERROR);
f7ae8d59 185 return pep_reply(sk, skb, code, data, sizeof(data), priority);
9641458d
RDC
186}
187
188/* Control requests are not sent by the pipe service and have a specific
189 * message format. */
c41bd97f
RDC
190static int pep_ctrlreq_error(struct sock *sk, struct sk_buff *oskb, u8 code,
191 gfp_t priority)
9641458d
RDC
192{
193 const struct pnpipehdr *oph = pnp_hdr(oskb);
194 struct sk_buff *skb;
195 struct pnpipehdr *ph;
196 struct sockaddr_pn dst;
44c9ab16 197 u8 data[4] = {
6321aa19 198 oph->pep_type, /* PEP type */
44c9ab16
RDC
199 code, /* error code, at an unusual offset */
200 PAD, PAD,
201 };
9641458d 202
44c9ab16 203 skb = pep_alloc_skb(sk, data, 4, priority);
9641458d
RDC
204 if (!skb)
205 return -ENOMEM;
9641458d 206
44c9ab16 207 ph = pnp_hdr(skb);
9641458d
RDC
208 ph->utid = oph->utid;
209 ph->message_id = PNS_PEP_CTRL_RESP;
210 ph->pipe_handle = oph->pipe_handle;
6321aa19 211 ph->data0 = oph->data[0]; /* CTRL id */
9641458d
RDC
212
213 pn_skb_get_src_sockaddr(oskb, &dst);
214 return pn_skb_send(sk, skb, &dst);
215}
216
217static int pipe_snd_status(struct sock *sk, u8 type, u8 status, gfp_t priority)
218{
44c9ab16 219 u8 data[4] = { type, PAD, PAD, status };
9641458d 220
44c9ab16
RDC
221 return pep_indicate(sk, PNS_PEP_STATUS_IND, PN_PEP_TYPE_COMMON,
222 data, 4, priority);
9641458d
RDC
223}
224
225/* Send our RX flow control information to the sender.
226 * Socket must be locked. */
44c9ab16 227static void pipe_grant_credits(struct sock *sk, gfp_t priority)
9641458d
RDC
228{
229 struct pep_sock *pn = pep_sk(sk);
230
231 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
232
233 switch (pn->rx_fc) {
234 case PN_LEGACY_FLOW_CONTROL: /* TODO */
235 break;
236 case PN_ONE_CREDIT_FLOW_CONTROL:
44c9ab16
RDC
237 if (pipe_snd_status(sk, PN_PEP_IND_FLOW_CONTROL,
238 PEP_IND_READY, priority) == 0)
239 pn->rx_credits = 1;
9641458d
RDC
240 break;
241 case PN_MULTI_CREDIT_FLOW_CONTROL:
242 if ((pn->rx_credits + CREDITS_THR) > CREDITS_MAX)
243 break;
244 if (pipe_snd_status(sk, PN_PEP_IND_ID_MCFC_GRANT_CREDITS,
245 CREDITS_MAX - pn->rx_credits,
44c9ab16 246 priority) == 0)
9641458d
RDC
247 pn->rx_credits = CREDITS_MAX;
248 break;
249 }
250}
251
252static int pipe_rcv_status(struct sock *sk, struct sk_buff *skb)
253{
254 struct pep_sock *pn = pep_sk(sk);
a91e7d47 255 struct pnpipehdr *hdr;
be677730 256 int wake = 0;
9641458d
RDC
257
258 if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
259 return -EINVAL;
260
a91e7d47 261 hdr = pnp_hdr(skb);
6321aa19 262 if (hdr->pep_type != PN_PEP_TYPE_COMMON) {
ba7a46f1 263 net_dbg_ratelimited("Phonet unknown PEP type: %u\n",
6321aa19 264 (unsigned int)hdr->pep_type);
9641458d
RDC
265 return -EOPNOTSUPP;
266 }
267
6321aa19 268 switch (hdr->data[0]) {
9641458d
RDC
269 case PN_PEP_IND_FLOW_CONTROL:
270 switch (pn->tx_fc) {
271 case PN_LEGACY_FLOW_CONTROL:
6321aa19 272 switch (hdr->data[3]) {
9641458d 273 case PEP_IND_BUSY:
be677730 274 atomic_set(&pn->tx_credits, 0);
9641458d
RDC
275 break;
276 case PEP_IND_READY:
be677730 277 atomic_set(&pn->tx_credits, wake = 1);
9641458d
RDC
278 break;
279 }
280 break;
281 case PN_ONE_CREDIT_FLOW_CONTROL:
6321aa19 282 if (hdr->data[3] == PEP_IND_READY)
be677730 283 atomic_set(&pn->tx_credits, wake = 1);
9641458d
RDC
284 break;
285 }
286 break;
287
288 case PN_PEP_IND_ID_MCFC_GRANT_CREDITS:
289 if (pn->tx_fc != PN_MULTI_CREDIT_FLOW_CONTROL)
290 break;
6321aa19 291 atomic_add(wake = hdr->data[3], &pn->tx_credits);
9641458d
RDC
292 break;
293
294 default:
ba7a46f1 295 net_dbg_ratelimited("Phonet unknown PEP indication: %u\n",
6321aa19 296 (unsigned int)hdr->data[0]);
9641458d
RDC
297 return -EOPNOTSUPP;
298 }
be677730 299 if (wake)
9641458d
RDC
300 sk->sk_write_space(sk);
301 return 0;
302}
303
304static int pipe_rcv_created(struct sock *sk, struct sk_buff *skb)
305{
306 struct pep_sock *pn = pep_sk(sk);
307 struct pnpipehdr *hdr = pnp_hdr(skb);
6321aa19 308 u8 n_sb = hdr->data0;
9641458d
RDC
309
310 pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
311 __skb_pull(skb, sizeof(*hdr));
312 while (n_sb > 0) {
313 u8 type, buf[2], len = sizeof(buf);
314 u8 *data = pep_get_sb(skb, &type, &len, buf);
315
316 if (data == NULL)
317 return -EINVAL;
318 switch (type) {
319 case PN_PIPE_SB_NEGOTIATED_FC:
320 if (len < 2 || (data[0] | data[1]) > 3)
321 break;
322 pn->tx_fc = data[0] & 3;
323 pn->rx_fc = data[1] & 3;
324 break;
325 }
326 n_sb--;
327 }
328 return 0;
329}
330
331/* Queue an skb to a connected sock.
332 * Socket lock must be held. */
333static int pipe_do_rcv(struct sock *sk, struct sk_buff *skb)
334{
335 struct pep_sock *pn = pep_sk(sk);
336 struct pnpipehdr *hdr = pnp_hdr(skb);
c41bd97f 337 struct sk_buff_head *queue;
9641458d
RDC
338 int err = 0;
339
340 BUG_ON(sk->sk_state == TCP_CLOSE_WAIT);
341
342 switch (hdr->message_id) {
343 case PNS_PEP_CONNECT_REQ:
f7ae8d59 344 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE, GFP_ATOMIC);
9641458d
RDC
345 break;
346
347 case PNS_PEP_DISCONNECT_REQ:
348 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
349 sk->sk_state = TCP_CLOSE_WAIT;
350 if (!sock_flag(sk, SOCK_DEAD))
351 sk->sk_state_change(sk);
352 break;
353
354 case PNS_PEP_ENABLE_REQ:
355 /* Wait for PNS_PIPE_(ENABLED|REDIRECTED)_IND */
356 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
357 break;
358
359 case PNS_PEP_RESET_REQ:
360 switch (hdr->state_after_reset) {
361 case PN_PIPE_DISABLE:
362 pn->init_enable = 0;
363 break;
364 case PN_PIPE_ENABLE:
365 pn->init_enable = 1;
366 break;
367 default: /* not allowed to send an error here!? */
368 err = -EINVAL;
369 goto out;
370 }
df561f66 371 fallthrough;
9641458d 372 case PNS_PEP_DISABLE_REQ:
be677730 373 atomic_set(&pn->tx_credits, 0);
9641458d
RDC
374 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
375 break;
376
377 case PNS_PEP_CTRL_REQ:
2e2fb4b3
RDC
378 if (skb_queue_len(&pn->ctrlreq_queue) >= PNPIPE_CTRLREQ_MAX) {
379 atomic_inc(&sk->sk_drops);
c41bd97f 380 break;
2e2fb4b3 381 }
c41bd97f
RDC
382 __skb_pull(skb, 4);
383 queue = &pn->ctrlreq_queue;
384 goto queue;
9641458d 385
fc6a1107
RDC
386 case PNS_PIPE_ALIGNED_DATA:
387 __skb_pull(skb, 1);
df561f66 388 fallthrough;
9641458d
RDC
389 case PNS_PIPE_DATA:
390 __skb_pull(skb, 3); /* Pipe data header */
391 if (!pn_flow_safe(pn->rx_fc)) {
392 err = sock_queue_rcv_skb(sk, skb);
393 if (!err)
0ebbf318
RDC
394 return NET_RX_SUCCESS;
395 err = -ENOBUFS;
9641458d
RDC
396 break;
397 }
398
399 if (pn->rx_credits == 0) {
2e2fb4b3 400 atomic_inc(&sk->sk_drops);
9641458d
RDC
401 err = -ENOBUFS;
402 break;
403 }
404 pn->rx_credits--;
c41bd97f
RDC
405 queue = &sk->sk_receive_queue;
406 goto queue;
9641458d
RDC
407
408 case PNS_PEP_STATUS_IND:
409 pipe_rcv_status(sk, skb);
410 break;
411
412 case PNS_PIPE_REDIRECTED_IND:
413 err = pipe_rcv_created(sk, skb);
414 break;
415
416 case PNS_PIPE_CREATED_IND:
417 err = pipe_rcv_created(sk, skb);
418 if (err)
419 break;
df561f66 420 fallthrough;
9641458d
RDC
421 case PNS_PIPE_RESET_IND:
422 if (!pn->init_enable)
423 break;
df561f66 424 fallthrough;
9641458d
RDC
425 case PNS_PIPE_ENABLED_IND:
426 if (!pn_flow_safe(pn->tx_fc)) {
be677730 427 atomic_set(&pn->tx_credits, 1);
9641458d
RDC
428 sk->sk_write_space(sk);
429 }
430 if (sk->sk_state == TCP_ESTABLISHED)
431 break; /* Nothing to do */
432 sk->sk_state = TCP_ESTABLISHED;
44c9ab16 433 pipe_grant_credits(sk, GFP_ATOMIC);
9641458d
RDC
434 break;
435
436 case PNS_PIPE_DISABLED_IND:
437 sk->sk_state = TCP_SYN_RECV;
438 pn->rx_credits = 0;
439 break;
440
441 default:
ba7a46f1
JP
442 net_dbg_ratelimited("Phonet unknown PEP message: %u\n",
443 hdr->message_id);
9641458d
RDC
444 err = -EINVAL;
445 }
446out:
447 kfree_skb(skb);
0ebbf318 448 return (err == -ENOBUFS) ? NET_RX_DROP : NET_RX_SUCCESS;
c41bd97f
RDC
449
450queue:
451 skb->dev = NULL;
452 skb_set_owner_r(skb, sk);
c41bd97f
RDC
453 skb_queue_tail(queue, skb);
454 if (!sock_flag(sk, SOCK_DEAD))
676d2369 455 sk->sk_data_ready(sk);
0ebbf318 456 return NET_RX_SUCCESS;
9641458d
RDC
457}
458
459/* Destroy connected sock. */
460static void pipe_destruct(struct sock *sk)
461{
c41bd97f
RDC
462 struct pep_sock *pn = pep_sk(sk);
463
9641458d 464 skb_queue_purge(&sk->sk_receive_queue);
c41bd97f 465 skb_queue_purge(&pn->ctrlreq_queue);
9641458d
RDC
466}
467
95c96174 468static u8 pipe_negotiate_fc(const u8 *fcs, unsigned int n)
8f44fcc7 469{
95c96174 470 unsigned int i;
8f44fcc7
RDC
471 u8 final_fc = PN_NO_FLOW_CONTROL;
472
473 for (i = 0; i < n; i++) {
474 u8 fc = fcs[i];
475
476 if (fc > final_fc && fc < PN_MAX_FLOW_CONTROL)
477 final_fc = fc;
478 }
479 return final_fc;
480}
481
b3d62553
KS
482static int pep_connresp_rcv(struct sock *sk, struct sk_buff *skb)
483{
484 struct pep_sock *pn = pep_sk(sk);
8f44fcc7
RDC
485 struct pnpipehdr *hdr;
486 u8 n_sb;
487
488 if (!pskb_pull(skb, sizeof(*hdr) + 4))
489 return -EINVAL;
490
491 hdr = pnp_hdr(skb);
297edb60
RDC
492 if (hdr->error_code != PN_PIPE_NO_ERROR)
493 return -ECONNREFUSED;
8f44fcc7
RDC
494
495 /* Parse sub-blocks */
6321aa19 496 n_sb = hdr->data[3];
8f44fcc7
RDC
497 while (n_sb > 0) {
498 u8 type, buf[6], len = sizeof(buf);
499 const u8 *data = pep_get_sb(skb, &type, &len, buf);
500
501 if (data == NULL)
502 return -EINVAL;
503
504 switch (type) {
505 case PN_PIPE_SB_REQUIRED_FC_TX:
506 if (len < 2 || len < data[0])
507 break;
508 pn->tx_fc = pipe_negotiate_fc(data + 2, len - 2);
509 break;
510
511 case PN_PIPE_SB_PREFERRED_FC_RX:
512 if (len < 2 || len < data[0])
513 break;
514 pn->rx_fc = pipe_negotiate_fc(data + 2, len - 2);
515 break;
516
517 }
518 n_sb--;
519 }
b3d62553 520
44c9ab16 521 return pipe_handler_send_created_ind(sk);
b3d62553 522}
297edb60 523
bdb6e697
DKS
524static int pep_enableresp_rcv(struct sock *sk, struct sk_buff *skb)
525{
526 struct pnpipehdr *hdr = pnp_hdr(skb);
527
528 if (hdr->error_code != PN_PIPE_NO_ERROR)
529 return -ECONNREFUSED;
530
531 return pep_indicate(sk, PNS_PIPE_ENABLED_IND, 0 /* sub-blocks */,
532 NULL, 0, GFP_ATOMIC);
533
534}
535
536static void pipe_start_flow_control(struct sock *sk)
537{
538 struct pep_sock *pn = pep_sk(sk);
539
540 if (!pn_flow_safe(pn->tx_fc)) {
541 atomic_set(&pn->tx_credits, 1);
542 sk->sk_write_space(sk);
543 }
544 pipe_grant_credits(sk, GFP_ATOMIC);
545}
546
297edb60
RDC
547/* Queue an skb to an actively connected sock.
548 * Socket lock must be held. */
549static int pipe_handler_do_rcv(struct sock *sk, struct sk_buff *skb)
550{
551 struct pep_sock *pn = pep_sk(sk);
552 struct pnpipehdr *hdr = pnp_hdr(skb);
553 int err = NET_RX_SUCCESS;
554
555 switch (hdr->message_id) {
556 case PNS_PIPE_ALIGNED_DATA:
557 __skb_pull(skb, 1);
df561f66 558 fallthrough;
297edb60
RDC
559 case PNS_PIPE_DATA:
560 __skb_pull(skb, 3); /* Pipe data header */
561 if (!pn_flow_safe(pn->rx_fc)) {
562 err = sock_queue_rcv_skb(sk, skb);
563 if (!err)
564 return NET_RX_SUCCESS;
565 err = NET_RX_DROP;
566 break;
567 }
568
569 if (pn->rx_credits == 0) {
570 atomic_inc(&sk->sk_drops);
571 err = NET_RX_DROP;
572 break;
573 }
574 pn->rx_credits--;
575 skb->dev = NULL;
576 skb_set_owner_r(skb, sk);
297edb60
RDC
577 skb_queue_tail(&sk->sk_receive_queue, skb);
578 if (!sock_flag(sk, SOCK_DEAD))
676d2369 579 sk->sk_data_ready(sk);
297edb60
RDC
580 return NET_RX_SUCCESS;
581
582 case PNS_PEP_CONNECT_RESP:
583 if (sk->sk_state != TCP_SYN_SENT)
584 break;
585 if (!sock_flag(sk, SOCK_DEAD))
586 sk->sk_state_change(sk);
587 if (pep_connresp_rcv(sk, skb)) {
588 sk->sk_state = TCP_CLOSE_WAIT;
589 break;
590 }
bdb6e697
DKS
591 if (pn->init_enable == PN_PIPE_DISABLE)
592 sk->sk_state = TCP_SYN_RECV;
593 else {
594 sk->sk_state = TCP_ESTABLISHED;
595 pipe_start_flow_control(sk);
596 }
597 break;
297edb60 598
bdb6e697
DKS
599 case PNS_PEP_ENABLE_RESP:
600 if (sk->sk_state != TCP_SYN_SENT)
601 break;
602
603 if (pep_enableresp_rcv(sk, skb)) {
604 sk->sk_state = TCP_CLOSE_WAIT;
605 break;
297edb60 606 }
bdb6e697
DKS
607
608 sk->sk_state = TCP_ESTABLISHED;
609 pipe_start_flow_control(sk);
297edb60
RDC
610 break;
611
612 case PNS_PEP_DISCONNECT_RESP:
613 /* sock should already be dead, nothing to do */
614 break;
615
616 case PNS_PEP_STATUS_IND:
617 pipe_rcv_status(sk, skb);
618 break;
619 }
620 kfree_skb(skb);
621 return err;
622}
b3d62553 623
9641458d
RDC
624/* Listening sock must be locked */
625static struct sock *pep_find_pipe(const struct hlist_head *hlist,
626 const struct sockaddr_pn *dst,
627 u8 pipe_handle)
628{
9641458d
RDC
629 struct sock *sknode;
630 u16 dobj = pn_sockaddr_get_object(dst);
631
b67bfe0d 632 sk_for_each(sknode, hlist) {
9641458d
RDC
633 struct pep_sock *pnnode = pep_sk(sknode);
634
635 /* Ports match, but addresses might not: */
636 if (pnnode->pn_sk.sobject != dobj)
637 continue;
638 if (pnnode->pipe_handle != pipe_handle)
639 continue;
640 if (sknode->sk_state == TCP_CLOSE_WAIT)
641 continue;
642
643 sock_hold(sknode);
644 return sknode;
645 }
646 return NULL;
647}
648
649/*
650 * Deliver an skb to a listening sock.
651 * Socket lock must be held.
652 * We then queue the skb to the right connected sock (if any).
653 */
654static int pep_do_rcv(struct sock *sk, struct sk_buff *skb)
655{
656 struct pep_sock *pn = pep_sk(sk);
657 struct sock *sknode;
2ddc1ac1 658 struct pnpipehdr *hdr;
9641458d 659 struct sockaddr_pn dst;
9641458d
RDC
660 u8 pipe_handle;
661
662 if (!pskb_may_pull(skb, sizeof(*hdr)))
663 goto drop;
664
665 hdr = pnp_hdr(skb);
666 pipe_handle = hdr->pipe_handle;
667 if (pipe_handle == PN_PIPE_INVALID_HANDLE)
668 goto drop;
669
670 pn_skb_get_dst_sockaddr(skb, &dst);
671
672 /* Look for an existing pipe handle */
673 sknode = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
674 if (sknode)
675 return sk_receive_skb(sknode, skb, 1);
676
9641458d
RDC
677 switch (hdr->message_id) {
678 case PNS_PEP_CONNECT_REQ:
f7ae8d59
RDC
679 if (sk->sk_state != TCP_LISTEN || sk_acceptq_is_full(sk)) {
680 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE,
681 GFP_ATOMIC);
682 break;
683 }
684 skb_queue_head(&sk->sk_receive_queue, skb);
685 sk_acceptq_added(sk);
686 if (!sock_flag(sk, SOCK_DEAD))
676d2369 687 sk->sk_data_ready(sk);
f7ae8d59 688 return NET_RX_SUCCESS;
9641458d
RDC
689
690 case PNS_PEP_DISCONNECT_REQ:
691 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
692 break;
693
694 case PNS_PEP_CTRL_REQ:
c41bd97f 695 pep_ctrlreq_error(sk, skb, PN_PIPE_INVALID_HANDLE, GFP_ATOMIC);
9641458d
RDC
696 break;
697
698 case PNS_PEP_RESET_REQ:
699 case PNS_PEP_ENABLE_REQ:
700 case PNS_PEP_DISABLE_REQ:
701 /* invalid handle is not even allowed here! */
0ebbf318 702 break;
297edb60
RDC
703
704 default:
705 if ((1 << sk->sk_state)
706 & ~(TCPF_CLOSE|TCPF_LISTEN|TCPF_CLOSE_WAIT))
707 /* actively connected socket */
708 return pipe_handler_do_rcv(sk, skb);
9641458d
RDC
709 }
710drop:
711 kfree_skb(skb);
0ebbf318 712 return NET_RX_SUCCESS;
9641458d
RDC
713}
714
6482f554
RDC
715static int pipe_do_remove(struct sock *sk)
716{
717 struct pep_sock *pn = pep_sk(sk);
718 struct pnpipehdr *ph;
719 struct sk_buff *skb;
720
44c9ab16 721 skb = pep_alloc_skb(sk, NULL, 0, GFP_KERNEL);
6482f554
RDC
722 if (!skb)
723 return -ENOMEM;
724
6482f554
RDC
725 ph = pnp_hdr(skb);
726 ph->utid = 0;
727 ph->message_id = PNS_PIPE_REMOVE_REQ;
728 ph->pipe_handle = pn->pipe_handle;
6321aa19 729 ph->data0 = PAD;
14ba8fae 730 return pn_skb_send(sk, skb, NULL);
6482f554
RDC
731}
732
9641458d
RDC
733/* associated socket ceases to exist */
734static void pep_sock_close(struct sock *sk, long timeout)
735{
736 struct pep_sock *pn = pep_sk(sk);
02a47617 737 int ifindex = 0;
9641458d 738
e513480e 739 sock_hold(sk); /* keep a reference after sk_common_release() */
9641458d
RDC
740 sk_common_release(sk);
741
742 lock_sock(sk);
f7ae8d59 743 if ((1 << sk->sk_state) & (TCPF_SYN_RECV|TCPF_ESTABLISHED)) {
297edb60
RDC
744 if (sk->sk_backlog_rcv == pipe_do_rcv)
745 /* Forcefully remove dangling Phonet pipe */
746 pipe_do_remove(sk);
747 else
748 pipe_handler_request(sk, PNS_PEP_DISCONNECT_REQ, PAD,
749 NULL, 0);
2feb6181 750 }
f7ae8d59 751 sk->sk_state = TCP_CLOSE;
b3d62553 752
02a47617
RDC
753 ifindex = pn->ifindex;
754 pn->ifindex = 0;
9641458d 755 release_sock(sk);
02a47617
RDC
756
757 if (ifindex)
758 gprs_detach(sk);
e513480e 759 sock_put(sk);
9641458d
RDC
760}
761
cdfbabfb
DH
762static struct sock *pep_sock_accept(struct sock *sk, int flags, int *errp,
763 bool kern)
9641458d 764{
f7ae8d59
RDC
765 struct pep_sock *pn = pep_sk(sk), *newpn;
766 struct sock *newsk = NULL;
767 struct sk_buff *skb;
768 struct pnpipehdr *hdr;
769 struct sockaddr_pn dst, src;
770 int err;
771 u16 peer_type;
772 u8 pipe_handle, enabled, n_sb;
773 u8 aligned = 0;
9641458d 774
f7ae8d59
RDC
775 skb = skb_recv_datagram(sk, 0, flags & O_NONBLOCK, errp);
776 if (!skb)
777 return NULL;
9641458d 778
f7ae8d59
RDC
779 lock_sock(sk);
780 if (sk->sk_state != TCP_LISTEN) {
781 err = -EINVAL;
782 goto drop;
9641458d 783 }
f7ae8d59 784 sk_acceptq_removed(sk);
9641458d 785
f7ae8d59
RDC
786 err = -EPROTO;
787 if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
788 goto drop;
9641458d 789
f7ae8d59
RDC
790 hdr = pnp_hdr(skb);
791 pipe_handle = hdr->pipe_handle;
792 switch (hdr->state_after_connect) {
793 case PN_PIPE_DISABLE:
794 enabled = 0;
795 break;
796 case PN_PIPE_ENABLE:
797 enabled = 1;
798 break;
799 default:
800 pep_reject_conn(sk, skb, PN_PIPE_ERR_INVALID_PARAM,
801 GFP_KERNEL);
802 goto drop;
803 }
804 peer_type = hdr->other_pep_type << 8;
9641458d 805
f7ae8d59 806 /* Parse sub-blocks (options) */
6321aa19 807 n_sb = hdr->data[3];
f7ae8d59
RDC
808 while (n_sb > 0) {
809 u8 type, buf[1], len = sizeof(buf);
810 const u8 *data = pep_get_sb(skb, &type, &len, buf);
9641458d 811
f7ae8d59
RDC
812 if (data == NULL)
813 goto drop;
814 switch (type) {
815 case PN_PIPE_SB_CONNECT_REQ_PEP_SUB_TYPE:
816 if (len < 1)
817 goto drop;
818 peer_type = (peer_type & 0xff00) | data[0];
819 break;
820 case PN_PIPE_SB_ALIGNED_DATA:
821 aligned = data[0] != 0;
822 break;
823 }
824 n_sb--;
825 }
9641458d 826
f7ae8d59
RDC
827 /* Check for duplicate pipe handle */
828 newsk = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
829 if (unlikely(newsk)) {
830 __sock_put(newsk);
9641458d 831 newsk = NULL;
f7ae8d59
RDC
832 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE, GFP_KERNEL);
833 goto drop;
9641458d
RDC
834 }
835
f7ae8d59 836 /* Create a new to-be-accepted sock */
cdfbabfb
DH
837 newsk = sk_alloc(sock_net(sk), PF_PHONET, GFP_KERNEL, sk->sk_prot,
838 kern);
f7ae8d59
RDC
839 if (!newsk) {
840 pep_reject_conn(sk, skb, PN_PIPE_ERR_OVERLOAD, GFP_KERNEL);
841 err = -ENOBUFS;
842 goto drop;
843 }
844
845 sock_init_data(NULL, newsk);
846 newsk->sk_state = TCP_SYN_RECV;
847 newsk->sk_backlog_rcv = pipe_do_rcv;
848 newsk->sk_protocol = sk->sk_protocol;
849 newsk->sk_destruct = pipe_destruct;
850
851 newpn = pep_sk(newsk);
852 pn_skb_get_dst_sockaddr(skb, &dst);
853 pn_skb_get_src_sockaddr(skb, &src);
854 newpn->pn_sk.sobject = pn_sockaddr_get_object(&dst);
855 newpn->pn_sk.dobject = pn_sockaddr_get_object(&src);
856 newpn->pn_sk.resource = pn_sockaddr_get_resource(&dst);
9641458d 857 sock_hold(sk);
f7ae8d59
RDC
858 newpn->listener = sk;
859 skb_queue_head_init(&newpn->ctrlreq_queue);
860 newpn->pipe_handle = pipe_handle;
861 atomic_set(&newpn->tx_credits, 0);
862 newpn->ifindex = 0;
863 newpn->peer_type = peer_type;
864 newpn->rx_credits = 0;
865 newpn->rx_fc = newpn->tx_fc = PN_LEGACY_FLOW_CONTROL;
866 newpn->init_enable = enabled;
867 newpn->aligned = aligned;
9641458d 868
f7ae8d59
RDC
869 err = pep_accept_conn(newsk, skb);
870 if (err) {
bcd0f933 871 __sock_put(sk);
f7ae8d59
RDC
872 sock_put(newsk);
873 newsk = NULL;
874 goto drop;
875 }
9641458d 876 sk_add_node(newsk, &pn->hlist);
f7ae8d59 877drop:
9641458d 878 release_sock(sk);
f7ae8d59 879 kfree_skb(skb);
9641458d
RDC
880 *errp = err;
881 return newsk;
882}
883
b3d62553
KS
884static int pep_sock_connect(struct sock *sk, struct sockaddr *addr, int len)
885{
886 struct pep_sock *pn = pep_sk(sk);
297edb60 887 int err;
44c9ab16 888 u8 data[4] = { 0 /* sub-blocks */, PAD, PAD, PAD };
b3d62553 889
bdb6e697
DKS
890 if (pn->pipe_handle == PN_PIPE_INVALID_HANDLE)
891 pn->pipe_handle = 1; /* anything but INVALID_HANDLE */
892
297edb60 893 err = pipe_handler_request(sk, PNS_PEP_CONNECT_REQ,
bdb6e697 894 pn->init_enable, data, 4);
297edb60
RDC
895 if (err) {
896 pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
897 return err;
898 }
bdb6e697 899
297edb60 900 sk->sk_state = TCP_SYN_SENT;
bdb6e697
DKS
901
902 return 0;
903}
904
905static int pep_sock_enable(struct sock *sk, struct sockaddr *addr, int len)
906{
907 int err;
908
909 err = pipe_handler_request(sk, PNS_PEP_ENABLE_REQ, PAD,
910 NULL, 0);
911 if (err)
912 return err;
913
914 sk->sk_state = TCP_SYN_SENT;
915
297edb60 916 return 0;
b3d62553 917}
b3d62553 918
9641458d
RDC
919static int pep_ioctl(struct sock *sk, int cmd, unsigned long arg)
920{
c41bd97f 921 struct pep_sock *pn = pep_sk(sk);
9641458d 922 int answ;
bdb6e697 923 int ret = -ENOIOCTLCMD;
9641458d
RDC
924
925 switch (cmd) {
926 case SIOCINQ:
bdb6e697
DKS
927 if (sk->sk_state == TCP_LISTEN) {
928 ret = -EINVAL;
929 break;
930 }
9641458d
RDC
931
932 lock_sock(sk);
f64f9e71
JP
933 if (sock_flag(sk, SOCK_URGINLINE) &&
934 !skb_queue_empty(&pn->ctrlreq_queue))
c41bd97f
RDC
935 answ = skb_peek(&pn->ctrlreq_queue)->len;
936 else if (!skb_queue_empty(&sk->sk_receive_queue))
9641458d
RDC
937 answ = skb_peek(&sk->sk_receive_queue)->len;
938 else
939 answ = 0;
940 release_sock(sk);
bdb6e697
DKS
941 ret = put_user(answ, (int __user *)arg);
942 break;
943
944 case SIOCPNENABLEPIPE:
945 lock_sock(sk);
946 if (sk->sk_state == TCP_SYN_SENT)
947 ret = -EBUSY;
948 else if (sk->sk_state == TCP_ESTABLISHED)
949 ret = -EISCONN;
950 else
951 ret = pep_sock_enable(sk, NULL, 0);
952 release_sock(sk);
953 break;
9641458d
RDC
954 }
955
bdb6e697 956 return ret;
9641458d
RDC
957}
958
959static int pep_init(struct sock *sk)
960{
961 struct pep_sock *pn = pep_sk(sk);
962
f7ae8d59 963 sk->sk_destruct = pipe_destruct;
9641458d 964 INIT_HLIST_HEAD(&pn->hlist);
297edb60 965 pn->listener = NULL;
c41bd97f 966 skb_queue_head_init(&pn->ctrlreq_queue);
297edb60
RDC
967 atomic_set(&pn->tx_credits, 0);
968 pn->ifindex = 0;
969 pn->peer_type = 0;
9641458d 970 pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
297edb60
RDC
971 pn->rx_credits = 0;
972 pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
973 pn->init_enable = 1;
974 pn->aligned = 0;
9641458d
RDC
975 return 0;
976}
977
02a47617 978static int pep_setsockopt(struct sock *sk, int level, int optname,
a7b75c5a 979 sockptr_t optval, unsigned int optlen)
02a47617
RDC
980{
981 struct pep_sock *pn = pep_sk(sk);
982 int val = 0, err = 0;
983
984 if (level != SOL_PNPIPE)
985 return -ENOPROTOOPT;
986 if (optlen >= sizeof(int)) {
a7b75c5a 987 if (copy_from_sockptr(&val, optval, sizeof(int)))
02a47617
RDC
988 return -EFAULT;
989 }
990
991 lock_sock(sk);
992 switch (optname) {
993 case PNPIPE_ENCAP:
994 if (val && val != PNPIPE_ENCAP_IP) {
995 err = -EINVAL;
996 break;
997 }
998 if (!pn->ifindex == !val)
999 break; /* Nothing to do! */
1000 if (!capable(CAP_NET_ADMIN)) {
1001 err = -EPERM;
1002 break;
1003 }
1004 if (val) {
1005 release_sock(sk);
1006 err = gprs_attach(sk);
1007 if (err > 0) {
1008 pn->ifindex = err;
1009 err = 0;
1010 }
1011 } else {
1012 pn->ifindex = 0;
1013 release_sock(sk);
1014 gprs_detach(sk);
1015 err = 0;
1016 }
1017 goto out_norel;
03789f26 1018
bdb6e697
DKS
1019 case PNPIPE_HANDLE:
1020 if ((sk->sk_state == TCP_CLOSE) &&
1021 (val >= 0) && (val < PN_PIPE_INVALID_HANDLE))
1022 pn->pipe_handle = val;
1023 else
1024 err = -EINVAL;
1025 break;
1026
1027 case PNPIPE_INITSTATE:
1028 pn->init_enable = !!val;
1029 break;
1030
02a47617
RDC
1031 default:
1032 err = -ENOPROTOOPT;
1033 }
1034 release_sock(sk);
1035
1036out_norel:
1037 return err;
1038}
1039
1040static int pep_getsockopt(struct sock *sk, int level, int optname,
1041 char __user *optval, int __user *optlen)
1042{
1043 struct pep_sock *pn = pep_sk(sk);
1044 int len, val;
1045
1046 if (level != SOL_PNPIPE)
1047 return -ENOPROTOOPT;
1048 if (get_user(len, optlen))
1049 return -EFAULT;
1050
1051 switch (optname) {
1052 case PNPIPE_ENCAP:
1053 val = pn->ifindex ? PNPIPE_ENCAP_IP : PNPIPE_ENCAP_NONE;
1054 break;
8d98efa8 1055
03789f26
RDC
1056 case PNPIPE_IFINDEX:
1057 val = pn->ifindex;
1058 break;
1059
acaf7df6
RDC
1060 case PNPIPE_HANDLE:
1061 val = pn->pipe_handle;
1062 if (val == PN_PIPE_INVALID_HANDLE)
1063 return -EINVAL;
1064 break;
1065
bdb6e697
DKS
1066 case PNPIPE_INITSTATE:
1067 val = pn->init_enable;
1068 break;
1069
02a47617
RDC
1070 default:
1071 return -ENOPROTOOPT;
1072 }
1073
1074 len = min_t(unsigned int, sizeof(int), len);
1075 if (put_user(len, optlen))
1076 return -EFAULT;
1077 if (put_user(val, (int __user *) optval))
1078 return -EFAULT;
1079 return 0;
1080}
1081
1082static int pipe_skb_send(struct sock *sk, struct sk_buff *skb)
1083{
1084 struct pep_sock *pn = pep_sk(sk);
1085 struct pnpipehdr *ph;
e1a5964f 1086 int err;
02a47617 1087
be677730
RDC
1088 if (pn_flow_safe(pn->tx_fc) &&
1089 !atomic_add_unless(&pn->tx_credits, -1, 0)) {
1090 kfree_skb(skb);
1091 return -ENOBUFS;
1092 }
1093
fea93ece 1094 skb_push(skb, 3 + pn->aligned);
02a47617
RDC
1095 skb_reset_transport_header(skb);
1096 ph = pnp_hdr(skb);
1097 ph->utid = 0;
fea93ece
RDC
1098 if (pn->aligned) {
1099 ph->message_id = PNS_PIPE_ALIGNED_DATA;
6321aa19 1100 ph->data0 = 0; /* padding */
fea93ece
RDC
1101 } else
1102 ph->message_id = PNS_PIPE_DATA;
02a47617 1103 ph->pipe_handle = pn->pipe_handle;
14ba8fae 1104 err = pn_skb_send(sk, skb, NULL);
e1a5964f
RDC
1105
1106 if (err && pn_flow_safe(pn->tx_fc))
1107 atomic_inc(&pn->tx_credits);
1108 return err;
1109
02a47617
RDC
1110}
1111
1b784140 1112static int pep_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
9641458d
RDC
1113{
1114 struct pep_sock *pn = pep_sk(sk);
b1704374 1115 struct sk_buff *skb;
9641458d
RDC
1116 long timeo;
1117 int flags = msg->msg_flags;
1118 int err, done;
1119
bcf1b70a
SL
1120 if (len > USHRT_MAX)
1121 return -EMSGSIZE;
1122
82ecbcb9
RDC
1123 if ((msg->msg_flags & ~(MSG_DONTWAIT|MSG_EOR|MSG_NOSIGNAL|
1124 MSG_CMSG_COMPAT)) ||
1125 !(msg->msg_flags & MSG_EOR))
9641458d
RDC
1126 return -EOPNOTSUPP;
1127
b1704374
RDC
1128 skb = sock_alloc_send_skb(sk, MAX_PNPIPE_HEADER + len,
1129 flags & MSG_DONTWAIT, &err);
1130 if (!skb)
02ac3268 1131 return err;
b1704374 1132
638be344 1133 skb_reserve(skb, MAX_PHONET_HEADER + 3 + pn->aligned);
6ce8e9ce 1134 err = memcpy_from_msg(skb_put(skb, len), msg, len);
b1704374
RDC
1135 if (err < 0)
1136 goto outfree;
1137
9641458d
RDC
1138 lock_sock(sk);
1139 timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
1140 if ((1 << sk->sk_state) & (TCPF_LISTEN|TCPF_CLOSE)) {
1141 err = -ENOTCONN;
1142 goto out;
1143 }
1144 if (sk->sk_state != TCP_ESTABLISHED) {
1145 /* Wait until the pipe gets to enabled state */
1146disabled:
1147 err = sk_stream_wait_connect(sk, &timeo);
1148 if (err)
1149 goto out;
1150
1151 if (sk->sk_state == TCP_CLOSE_WAIT) {
1152 err = -ECONNRESET;
1153 goto out;
1154 }
1155 }
1156 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
1157
1158 /* Wait until flow control allows TX */
be677730 1159 done = atomic_read(&pn->tx_credits);
9641458d 1160 while (!done) {
d9dc8b0f 1161 DEFINE_WAIT_FUNC(wait, woken_wake_function);
9641458d
RDC
1162
1163 if (!timeo) {
1164 err = -EAGAIN;
1165 goto out;
1166 }
1167 if (signal_pending(current)) {
1168 err = sock_intr_errno(timeo);
1169 goto out;
1170 }
1171
d9dc8b0f
WC
1172 add_wait_queue(sk_sleep(sk), &wait);
1173 done = sk_wait_event(sk, &timeo, atomic_read(&pn->tx_credits), &wait);
1174 remove_wait_queue(sk_sleep(sk), &wait);
9641458d
RDC
1175
1176 if (sk->sk_state != TCP_ESTABLISHED)
1177 goto disabled;
1178 }
1179
02a47617 1180 err = pipe_skb_send(sk, skb);
9641458d
RDC
1181 if (err >= 0)
1182 err = len; /* success! */
1183 skb = NULL;
1184out:
1185 release_sock(sk);
b1704374 1186outfree:
9641458d
RDC
1187 kfree_skb(skb);
1188 return err;
1189}
1190
02a47617
RDC
1191int pep_writeable(struct sock *sk)
1192{
1193 struct pep_sock *pn = pep_sk(sk);
1194
be677730 1195 return atomic_read(&pn->tx_credits);
02a47617
RDC
1196}
1197
1198int pep_write(struct sock *sk, struct sk_buff *skb)
1199{
1200 struct sk_buff *rskb, *fs;
1201 int flen = 0;
1202
fea93ece
RDC
1203 if (pep_sk(sk)->aligned)
1204 return pipe_skb_send(sk, skb);
1205
02a47617
RDC
1206 rskb = alloc_skb(MAX_PNPIPE_HEADER, GFP_ATOMIC);
1207 if (!rskb) {
1208 kfree_skb(skb);
1209 return -ENOMEM;
1210 }
1211 skb_shinfo(rskb)->frag_list = skb;
1212 rskb->len += skb->len;
1213 rskb->data_len += rskb->len;
1214 rskb->truesize += rskb->len;
1215
1216 /* Avoid nested fragments */
5c313e9a 1217 skb_walk_frags(skb, fs)
02a47617
RDC
1218 flen += fs->len;
1219 skb->next = skb_shinfo(skb)->frag_list;
5c313e9a 1220 skb_frag_list_init(skb);
02a47617
RDC
1221 skb->len -= flen;
1222 skb->data_len -= flen;
1223 skb->truesize -= flen;
1224
1225 skb_reserve(rskb, MAX_PHONET_HEADER + 3);
1226 return pipe_skb_send(sk, rskb);
1227}
1228
1229struct sk_buff *pep_read(struct sock *sk)
1230{
1231 struct sk_buff *skb = skb_dequeue(&sk->sk_receive_queue);
1232
1233 if (sk->sk_state == TCP_ESTABLISHED)
44c9ab16 1234 pipe_grant_credits(sk, GFP_ATOMIC);
02a47617
RDC
1235 return skb;
1236}
1237
1b784140
YX
1238static int pep_recvmsg(struct sock *sk, struct msghdr *msg, size_t len,
1239 int noblock, int flags, int *addr_len)
9641458d
RDC
1240{
1241 struct sk_buff *skb;
1242 int err;
1243
82ecbcb9
RDC
1244 if (flags & ~(MSG_OOB|MSG_PEEK|MSG_TRUNC|MSG_DONTWAIT|MSG_WAITALL|
1245 MSG_NOSIGNAL|MSG_CMSG_COMPAT))
1246 return -EOPNOTSUPP;
1247
9641458d
RDC
1248 if (unlikely(1 << sk->sk_state & (TCPF_LISTEN | TCPF_CLOSE)))
1249 return -ENOTCONN;
1250
c41bd97f
RDC
1251 if ((flags & MSG_OOB) || sock_flag(sk, SOCK_URGINLINE)) {
1252 /* Dequeue and acknowledge control request */
1253 struct pep_sock *pn = pep_sk(sk);
1254
82ecbcb9
RDC
1255 if (flags & MSG_PEEK)
1256 return -EOPNOTSUPP;
c41bd97f
RDC
1257 skb = skb_dequeue(&pn->ctrlreq_queue);
1258 if (skb) {
1259 pep_ctrlreq_error(sk, skb, PN_PIPE_NO_ERROR,
1260 GFP_KERNEL);
1261 msg->msg_flags |= MSG_OOB;
1262 goto copy;
1263 }
1264 if (flags & MSG_OOB)
1265 return -EINVAL;
1266 }
1267
9641458d
RDC
1268 skb = skb_recv_datagram(sk, flags, noblock, &err);
1269 lock_sock(sk);
1270 if (skb == NULL) {
1271 if (err == -ENOTCONN && sk->sk_state == TCP_CLOSE_WAIT)
1272 err = -ECONNRESET;
1273 release_sock(sk);
1274 return err;
1275 }
1276
1277 if (sk->sk_state == TCP_ESTABLISHED)
44c9ab16 1278 pipe_grant_credits(sk, GFP_KERNEL);
9641458d 1279 release_sock(sk);
c41bd97f 1280copy:
9641458d 1281 msg->msg_flags |= MSG_EOR;
9641458d
RDC
1282 if (skb->len > len)
1283 msg->msg_flags |= MSG_TRUNC;
1284 else
1285 len = skb->len;
1286
51f3d02b 1287 err = skb_copy_datagram_msg(skb, 0, msg, len);
9641458d
RDC
1288 if (!err)
1289 err = (flags & MSG_TRUNC) ? skb->len : len;
1290
1291 skb_free_datagram(sk, skb);
1292 return err;
1293}
1294
1295static void pep_sock_unhash(struct sock *sk)
1296{
1297 struct pep_sock *pn = pep_sk(sk);
1298 struct sock *skparent = NULL;
1299
1300 lock_sock(sk);
b3d62553 1301
297edb60 1302 if (pn->listener != NULL) {
9641458d 1303 skparent = pn->listener;
297edb60 1304 pn->listener = NULL;
9641458d
RDC
1305 release_sock(sk);
1306
9641458d 1307 pn = pep_sk(skparent);
7dfde179
RDC
1308 lock_sock(skparent);
1309 sk_del_node_init(sk);
1310 sk = skparent;
9641458d 1311 }
297edb60 1312
9641458d
RDC
1313 /* Unhash a listening sock only when it is closed
1314 * and all of its active connected pipes are closed. */
1315 if (hlist_empty(&pn->hlist))
1316 pn_sock_unhash(&pn->pn_sk.sk);
1317 release_sock(sk);
1318
1319 if (skparent)
1320 sock_put(skparent);
1321}
1322
1323static struct proto pep_proto = {
1324 .close = pep_sock_close,
1325 .accept = pep_sock_accept,
b3d62553 1326 .connect = pep_sock_connect,
9641458d
RDC
1327 .ioctl = pep_ioctl,
1328 .init = pep_init,
02a47617
RDC
1329 .setsockopt = pep_setsockopt,
1330 .getsockopt = pep_getsockopt,
9641458d
RDC
1331 .sendmsg = pep_sendmsg,
1332 .recvmsg = pep_recvmsg,
1333 .backlog_rcv = pep_do_rcv,
1334 .hash = pn_sock_hash,
1335 .unhash = pep_sock_unhash,
1336 .get_port = pn_sock_get_port,
1337 .obj_size = sizeof(struct pep_sock),
1338 .owner = THIS_MODULE,
1339 .name = "PNPIPE",
1340};
1341
548ec114 1342static const struct phonet_protocol pep_pn_proto = {
9641458d
RDC
1343 .ops = &phonet_stream_ops,
1344 .prot = &pep_proto,
1345 .sock_type = SOCK_SEQPACKET,
1346};
1347
1348static int __init pep_register(void)
1349{
1350 return phonet_proto_register(PN_PROTO_PIPE, &pep_pn_proto);
1351}
1352
1353static void __exit pep_unregister(void)
1354{
1355 phonet_proto_unregister(PN_PROTO_PIPE, &pep_pn_proto);
1356}
1357
1358module_init(pep_register);
1359module_exit(pep_unregister);
1360MODULE_AUTHOR("Remi Denis-Courmont, Nokia");
1361MODULE_DESCRIPTION("Phonet pipe protocol");
1362MODULE_LICENSE("GPL");
1363MODULE_ALIAS_NET_PF_PROTO(PF_PHONET, PN_PROTO_PIPE);