]>
Commit | Line | Data |
---|---|---|
e6f95ec8 SB |
1 | /* |
2 | * Copyright (C) ST-Ericsson AB 2010 | |
3 | * Author: Sjur Brendeland sjur.brandeland@stericsson.com | |
e6f95ec8 SB |
4 | * License terms: GNU General Public License (GPL) version 2 |
5 | */ | |
6 | ||
7 | #include <linux/fs.h> | |
8 | #include <linux/init.h> | |
9 | #include <linux/module.h> | |
10 | #include <linux/sched.h> | |
11 | #include <linux/spinlock.h> | |
12 | #include <linux/mutex.h> | |
13 | #include <linux/list.h> | |
14 | #include <linux/wait.h> | |
15 | #include <linux/poll.h> | |
16 | #include <linux/tcp.h> | |
17 | #include <linux/uaccess.h> | |
bece7b23 SB |
18 | #include <linux/mutex.h> |
19 | #include <linux/debugfs.h> | |
e6f95ec8 | 20 | #include <linux/caif/caif_socket.h> |
bece7b23 SB |
21 | #include <asm/atomic.h> |
22 | #include <net/sock.h> | |
23 | #include <net/tcp_states.h> | |
e6f95ec8 SB |
24 | #include <net/caif/caif_layer.h> |
25 | #include <net/caif/caif_dev.h> | |
26 | #include <net/caif/cfpkt.h> | |
27 | ||
28 | MODULE_LICENSE("GPL"); | |
bece7b23 SB |
29 | MODULE_ALIAS_NETPROTO(AF_CAIF); |
30 | ||
31 | #define CAIF_DEF_SNDBUF (CAIF_MAX_PAYLOAD_SIZE*10) | |
32 | #define CAIF_DEF_RCVBUF (CAIF_MAX_PAYLOAD_SIZE*100) | |
33 | ||
34 | /* | |
35 | * CAIF state is re-using the TCP socket states. | |
36 | * caif_states stored in sk_state reflect the state as reported by | |
37 | * the CAIF stack, while sk_socket->state is the state of the socket. | |
38 | */ | |
39 | enum caif_states { | |
40 | CAIF_CONNECTED = TCP_ESTABLISHED, | |
41 | CAIF_CONNECTING = TCP_SYN_SENT, | |
42 | CAIF_DISCONNECTED = TCP_CLOSE | |
43 | }; | |
44 | ||
45 | #define TX_FLOW_ON_BIT 1 | |
46 | #define RX_FLOW_ON_BIT 2 | |
e6f95ec8 | 47 | |
e6f95ec8 | 48 | static struct dentry *debugfsdir; |
e6f95ec8 SB |
49 | |
50 | #ifdef CONFIG_DEBUG_FS | |
51 | struct debug_fs_counter { | |
bece7b23 SB |
52 | atomic_t caif_nr_socks; |
53 | atomic_t num_connect_req; | |
54 | atomic_t num_connect_resp; | |
55 | atomic_t num_connect_fail_resp; | |
56 | atomic_t num_disconnect; | |
e6f95ec8 SB |
57 | atomic_t num_remote_shutdown_ind; |
58 | atomic_t num_tx_flow_off_ind; | |
59 | atomic_t num_tx_flow_on_ind; | |
60 | atomic_t num_rx_flow_off; | |
61 | atomic_t num_rx_flow_on; | |
e6f95ec8 | 62 | }; |
bece7b23 | 63 | struct debug_fs_counter cnt; |
e6f95ec8 SB |
64 | #define dbfs_atomic_inc(v) atomic_inc(v) |
65 | #define dbfs_atomic_dec(v) atomic_dec(v) | |
66 | #else | |
67 | #define dbfs_atomic_inc(v) | |
68 | #define dbfs_atomic_dec(v) | |
69 | #endif | |
70 | ||
e6f95ec8 | 71 | struct caifsock { |
bece7b23 | 72 | struct sock sk; /* must be first member */ |
e6f95ec8 | 73 | struct cflayer layer; |
bece7b23 | 74 | char name[CAIF_LAYER_NAME_SZ]; /* Used for debugging */ |
e6f95ec8 | 75 | u32 flow_state; |
e6f95ec8 | 76 | struct caif_connect_request conn_req; |
bece7b23 | 77 | struct mutex readlock; |
e6f95ec8 SB |
78 | struct dentry *debugfs_socket_dir; |
79 | }; | |
80 | ||
bece7b23 SB |
81 | static int rx_flow_is_on(struct caifsock *cf_sk) |
82 | { | |
83 | return test_bit(RX_FLOW_ON_BIT, | |
84 | (void *) &cf_sk->flow_state); | |
85 | } | |
86 | ||
87 | static int tx_flow_is_on(struct caifsock *cf_sk) | |
88 | { | |
89 | return test_bit(TX_FLOW_ON_BIT, | |
90 | (void *) &cf_sk->flow_state); | |
91 | } | |
e6f95ec8 | 92 | |
bece7b23 | 93 | static void set_rx_flow_off(struct caifsock *cf_sk) |
e6f95ec8 | 94 | { |
bece7b23 SB |
95 | clear_bit(RX_FLOW_ON_BIT, |
96 | (void *) &cf_sk->flow_state); | |
97 | } | |
e6f95ec8 | 98 | |
bece7b23 SB |
99 | static void set_rx_flow_on(struct caifsock *cf_sk) |
100 | { | |
101 | set_bit(RX_FLOW_ON_BIT, | |
102 | (void *) &cf_sk->flow_state); | |
103 | } | |
e6f95ec8 | 104 | |
bece7b23 SB |
105 | static void set_tx_flow_off(struct caifsock *cf_sk) |
106 | { | |
107 | clear_bit(TX_FLOW_ON_BIT, | |
108 | (void *) &cf_sk->flow_state); | |
109 | } | |
e6f95ec8 | 110 | |
bece7b23 SB |
111 | static void set_tx_flow_on(struct caifsock *cf_sk) |
112 | { | |
113 | set_bit(TX_FLOW_ON_BIT, | |
114 | (void *) &cf_sk->flow_state); | |
115 | } | |
e6f95ec8 | 116 | |
bece7b23 SB |
117 | static void caif_read_lock(struct sock *sk) |
118 | { | |
119 | struct caifsock *cf_sk; | |
120 | cf_sk = container_of(sk, struct caifsock, sk); | |
121 | mutex_lock(&cf_sk->readlock); | |
122 | } | |
e6f95ec8 | 123 | |
bece7b23 SB |
124 | static void caif_read_unlock(struct sock *sk) |
125 | { | |
126 | struct caifsock *cf_sk; | |
127 | cf_sk = container_of(sk, struct caifsock, sk); | |
128 | mutex_unlock(&cf_sk->readlock); | |
129 | } | |
e6f95ec8 | 130 | |
bece7b23 SB |
131 | int sk_rcvbuf_lowwater(struct caifsock *cf_sk) |
132 | { | |
133 | /* A quarter of full buffer is used a low water mark */ | |
134 | return cf_sk->sk.sk_rcvbuf / 4; | |
135 | } | |
e6f95ec8 | 136 | |
bece7b23 SB |
137 | void caif_flow_ctrl(struct sock *sk, int mode) |
138 | { | |
139 | struct caifsock *cf_sk; | |
140 | cf_sk = container_of(sk, struct caifsock, sk); | |
141 | if (cf_sk->layer.dn) | |
142 | cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode); | |
143 | } | |
e6f95ec8 | 144 | |
bece7b23 SB |
145 | /* |
146 | * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are | |
147 | * not dropped, but CAIF is sending flow off instead. | |
148 | */ | |
149 | int caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb) | |
150 | { | |
151 | int err; | |
152 | int skb_len; | |
153 | unsigned long flags; | |
154 | struct sk_buff_head *list = &sk->sk_receive_queue; | |
155 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); | |
e6f95ec8 | 156 | |
bece7b23 SB |
157 | if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >= |
158 | (unsigned)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) { | |
159 | trace_printk("CAIF: %s():" | |
160 | " sending flow OFF (queue len = %d %d)\n", | |
161 | __func__, | |
162 | atomic_read(&cf_sk->sk.sk_rmem_alloc), | |
163 | sk_rcvbuf_lowwater(cf_sk)); | |
164 | set_rx_flow_off(cf_sk); | |
165 | if (cf_sk->layer.dn) | |
166 | cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, | |
167 | CAIF_MODEMCMD_FLOW_OFF_REQ); | |
168 | } | |
e6f95ec8 | 169 | |
bece7b23 SB |
170 | err = sk_filter(sk, skb); |
171 | if (err) | |
172 | return err; | |
173 | if (!sk_rmem_schedule(sk, skb->truesize) && rx_flow_is_on(cf_sk)) { | |
174 | set_rx_flow_off(cf_sk); | |
175 | trace_printk("CAIF: %s():" | |
176 | " sending flow OFF due to rmem_schedule\n", | |
177 | __func__); | |
178 | if (cf_sk->layer.dn) | |
179 | cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, | |
180 | CAIF_MODEMCMD_FLOW_OFF_REQ); | |
181 | } | |
182 | skb->dev = NULL; | |
183 | skb_set_owner_r(skb, sk); | |
184 | /* Cache the SKB length before we tack it onto the receive | |
185 | * queue. Once it is added it no longer belongs to us and | |
186 | * may be freed by other threads of control pulling packets | |
187 | * from the queue. | |
188 | */ | |
189 | skb_len = skb->len; | |
190 | spin_lock_irqsave(&list->lock, flags); | |
191 | if (!sock_flag(sk, SOCK_DEAD)) | |
192 | __skb_queue_tail(list, skb); | |
193 | spin_unlock_irqrestore(&list->lock, flags); | |
194 | ||
195 | if (!sock_flag(sk, SOCK_DEAD)) | |
196 | sk->sk_data_ready(sk, skb_len); | |
197 | else | |
198 | kfree_skb(skb); | |
e6f95ec8 SB |
199 | return 0; |
200 | } | |
201 | ||
bece7b23 SB |
202 | /* Packet Receive Callback function called from CAIF Stack */ |
203 | static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt) | |
e6f95ec8 SB |
204 | { |
205 | struct caifsock *cf_sk; | |
bece7b23 | 206 | struct sk_buff *skb; |
e6f95ec8 SB |
207 | |
208 | cf_sk = container_of(layr, struct caifsock, layer); | |
bece7b23 SB |
209 | skb = cfpkt_tonative(pkt); |
210 | ||
211 | if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) { | |
212 | cfpkt_destroy(pkt); | |
213 | return 0; | |
214 | } | |
215 | caif_queue_rcv_skb(&cf_sk->sk, skb); | |
216 | return 0; | |
217 | } | |
e6f95ec8 | 218 | |
bece7b23 SB |
219 | /* Packet Control Callback function called from CAIF */ |
220 | static void caif_ctrl_cb(struct cflayer *layr, | |
221 | enum caif_ctrlcmd flow, | |
222 | int phyid) | |
223 | { | |
224 | struct caifsock *cf_sk = container_of(layr, struct caifsock, layer); | |
e6f95ec8 SB |
225 | switch (flow) { |
226 | case CAIF_CTRLCMD_FLOW_ON_IND: | |
bece7b23 | 227 | /* OK from modem to start sending again */ |
e6f95ec8 | 228 | dbfs_atomic_inc(&cnt.num_tx_flow_on_ind); |
bece7b23 SB |
229 | set_tx_flow_on(cf_sk); |
230 | cf_sk->sk.sk_state_change(&cf_sk->sk); | |
e6f95ec8 SB |
231 | break; |
232 | ||
233 | case CAIF_CTRLCMD_FLOW_OFF_IND: | |
bece7b23 | 234 | /* Modem asks us to shut up */ |
e6f95ec8 | 235 | dbfs_atomic_inc(&cnt.num_tx_flow_off_ind); |
bece7b23 SB |
236 | set_tx_flow_off(cf_sk); |
237 | cf_sk->sk.sk_state_change(&cf_sk->sk); | |
e6f95ec8 SB |
238 | break; |
239 | ||
240 | case CAIF_CTRLCMD_INIT_RSP: | |
bece7b23 SB |
241 | /* We're now connected */ |
242 | dbfs_atomic_inc(&cnt.num_connect_resp); | |
243 | cf_sk->sk.sk_state = CAIF_CONNECTED; | |
244 | set_tx_flow_on(cf_sk); | |
245 | cf_sk->sk.sk_state_change(&cf_sk->sk); | |
e6f95ec8 SB |
246 | break; |
247 | ||
248 | case CAIF_CTRLCMD_DEINIT_RSP: | |
bece7b23 SB |
249 | /* We're now disconnected */ |
250 | cf_sk->sk.sk_state = CAIF_DISCONNECTED; | |
251 | cf_sk->sk.sk_state_change(&cf_sk->sk); | |
252 | cfcnfg_release_adap_layer(&cf_sk->layer); | |
e6f95ec8 SB |
253 | break; |
254 | ||
255 | case CAIF_CTRLCMD_INIT_FAIL_RSP: | |
bece7b23 SB |
256 | /* Connect request failed */ |
257 | dbfs_atomic_inc(&cnt.num_connect_fail_resp); | |
258 | cf_sk->sk.sk_err = ECONNREFUSED; | |
259 | cf_sk->sk.sk_state = CAIF_DISCONNECTED; | |
260 | cf_sk->sk.sk_shutdown = SHUTDOWN_MASK; | |
261 | /* | |
262 | * Socket "standards" seems to require POLLOUT to | |
263 | * be set at connect failure. | |
264 | */ | |
265 | set_tx_flow_on(cf_sk); | |
266 | cf_sk->sk.sk_state_change(&cf_sk->sk); | |
e6f95ec8 SB |
267 | break; |
268 | ||
269 | case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND: | |
bece7b23 | 270 | /* Modem has closed this connection, or device is down. */ |
e6f95ec8 | 271 | dbfs_atomic_inc(&cnt.num_remote_shutdown_ind); |
bece7b23 SB |
272 | cf_sk->sk.sk_shutdown = SHUTDOWN_MASK; |
273 | cf_sk->sk.sk_err = ECONNRESET; | |
274 | set_rx_flow_on(cf_sk); | |
275 | cf_sk->sk.sk_error_report(&cf_sk->sk); | |
e6f95ec8 SB |
276 | break; |
277 | ||
278 | default: | |
279 | pr_debug("CAIF: %s(): Unexpected flow command %d\n", | |
bece7b23 | 280 | __func__, flow); |
e6f95ec8 SB |
281 | } |
282 | } | |
283 | ||
bece7b23 | 284 | static void caif_check_flow_release(struct sock *sk) |
e6f95ec8 | 285 | { |
bece7b23 | 286 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); |
e6f95ec8 | 287 | |
bece7b23 SB |
288 | if (cf_sk->layer.dn == NULL || cf_sk->layer.dn->modemcmd == NULL) |
289 | return; | |
290 | if (rx_flow_is_on(cf_sk)) | |
291 | return; | |
e6f95ec8 | 292 | |
bece7b23 SB |
293 | if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) { |
294 | dbfs_atomic_inc(&cnt.num_rx_flow_on); | |
295 | set_rx_flow_on(cf_sk); | |
296 | cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, | |
297 | CAIF_MODEMCMD_FLOW_ON_REQ); | |
298 | } | |
299 | } | |
300 | /* | |
301 | * Copied from sock.c:sock_queue_rcv_skb(), and added check that user buffer | |
302 | * has sufficient size. | |
303 | */ | |
304 | ||
305 | static int caif_seqpkt_recvmsg(struct kiocb *iocb, struct socket *sock, | |
e6f95ec8 SB |
306 | struct msghdr *m, size_t buf_len, int flags) |
307 | ||
308 | { | |
309 | struct sock *sk = sock->sk; | |
e6f95ec8 | 310 | struct sk_buff *skb; |
bece7b23 SB |
311 | int ret = 0; |
312 | int len; | |
e6f95ec8 SB |
313 | |
314 | if (unlikely(!buf_len)) | |
315 | return -EINVAL; | |
316 | ||
bece7b23 SB |
317 | skb = skb_recv_datagram(sk, flags, 0 , &ret); |
318 | if (!skb) | |
e6f95ec8 | 319 | goto read_error; |
e6f95ec8 | 320 | |
bece7b23 SB |
321 | len = skb->len; |
322 | ||
323 | if (skb && skb->len > buf_len && !(flags & MSG_PEEK)) { | |
324 | len = buf_len; | |
e6f95ec8 | 325 | /* |
bece7b23 SB |
326 | * Push skb back on receive queue if buffer too small. |
327 | * This has a built-in race where multi-threaded receive | |
328 | * may get packet in wrong order, but multiple read does | |
329 | * not really guarantee ordered delivery anyway. | |
330 | * Let's optimize for speed without taking locks. | |
e6f95ec8 | 331 | */ |
e6f95ec8 | 332 | |
bece7b23 SB |
333 | skb_queue_head(&sk->sk_receive_queue, skb); |
334 | ret = -EMSGSIZE; | |
335 | goto read_error; | |
e6f95ec8 SB |
336 | } |
337 | ||
bece7b23 SB |
338 | ret = skb_copy_datagram_iovec(skb, 0, m->msg_iov, len); |
339 | if (ret) | |
e6f95ec8 | 340 | goto read_error; |
e6f95ec8 | 341 | |
bece7b23 | 342 | skb_free_datagram(sk, skb); |
e6f95ec8 | 343 | |
bece7b23 | 344 | caif_check_flow_release(sk); |
e6f95ec8 | 345 | |
bece7b23 | 346 | return len; |
e6f95ec8 | 347 | |
bece7b23 SB |
348 | read_error: |
349 | return ret; | |
350 | } | |
e6f95ec8 | 351 | |
e6f95ec8 | 352 | |
bece7b23 SB |
353 | /* Copied from unix_stream_wait_data, identical except for lock call. */ |
354 | static long caif_stream_data_wait(struct sock *sk, long timeo) | |
355 | { | |
356 | DEFINE_WAIT(wait); | |
357 | lock_sock(sk); | |
358 | ||
359 | for (;;) { | |
360 | prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE); | |
361 | ||
362 | if (!skb_queue_empty(&sk->sk_receive_queue) || | |
363 | sk->sk_err || | |
364 | sk->sk_state != CAIF_CONNECTED || | |
365 | sock_flag(sk, SOCK_DEAD) || | |
366 | (sk->sk_shutdown & RCV_SHUTDOWN) || | |
367 | signal_pending(current) || | |
368 | !timeo) | |
369 | break; | |
e6f95ec8 | 370 | |
bece7b23 SB |
371 | set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); |
372 | release_sock(sk); | |
373 | timeo = schedule_timeout(timeo); | |
374 | lock_sock(sk); | |
375 | clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags); | |
e6f95ec8 SB |
376 | } |
377 | ||
bece7b23 SB |
378 | finish_wait(sk_sleep(sk), &wait); |
379 | release_sock(sk); | |
380 | return timeo; | |
381 | } | |
e6f95ec8 SB |
382 | |
383 | ||
bece7b23 SB |
384 | /* |
385 | * Copied from unix_stream_recvmsg, but removed credit checks, | |
386 | * changed locking calls, changed address handling. | |
387 | */ | |
388 | static int caif_stream_recvmsg(struct kiocb *iocb, struct socket *sock, | |
389 | struct msghdr *msg, size_t size, | |
390 | int flags) | |
391 | { | |
392 | struct sock *sk = sock->sk; | |
393 | int copied = 0; | |
394 | int target; | |
395 | int err = 0; | |
396 | long timeo; | |
e6f95ec8 | 397 | |
bece7b23 SB |
398 | err = -EOPNOTSUPP; |
399 | if (flags&MSG_OOB) | |
400 | goto out; | |
e6f95ec8 | 401 | |
bece7b23 | 402 | msg->msg_namelen = 0; |
e6f95ec8 | 403 | |
bece7b23 SB |
404 | /* |
405 | * Lock the socket to prevent queue disordering | |
406 | * while sleeps in memcpy_tomsg | |
407 | */ | |
408 | err = -EAGAIN; | |
409 | if (sk->sk_state == CAIF_CONNECTING) | |
410 | goto out; | |
e6f95ec8 | 411 | |
bece7b23 SB |
412 | caif_read_lock(sk); |
413 | target = sock_rcvlowat(sk, flags&MSG_WAITALL, size); | |
414 | timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT); | |
e6f95ec8 | 415 | |
bece7b23 SB |
416 | do { |
417 | int chunk; | |
418 | struct sk_buff *skb; | |
e6f95ec8 | 419 | |
bece7b23 SB |
420 | lock_sock(sk); |
421 | skb = skb_dequeue(&sk->sk_receive_queue); | |
422 | caif_check_flow_release(sk); | |
e6f95ec8 | 423 | |
bece7b23 SB |
424 | if (skb == NULL) { |
425 | if (copied >= target) | |
426 | goto unlock; | |
427 | /* | |
428 | * POSIX 1003.1g mandates this order. | |
429 | */ | |
430 | err = sock_error(sk); | |
431 | if (err) | |
432 | goto unlock; | |
433 | err = -ECONNRESET; | |
434 | if (sk->sk_shutdown & RCV_SHUTDOWN) | |
435 | goto unlock; | |
e6f95ec8 | 436 | |
bece7b23 SB |
437 | err = -EPIPE; |
438 | if (sk->sk_state != CAIF_CONNECTED) | |
439 | goto unlock; | |
440 | if (sock_flag(sk, SOCK_DEAD)) | |
441 | goto unlock; | |
e6f95ec8 | 442 | |
bece7b23 | 443 | release_sock(sk); |
e6f95ec8 | 444 | |
bece7b23 SB |
445 | err = -EAGAIN; |
446 | if (!timeo) | |
447 | break; | |
e6f95ec8 | 448 | |
bece7b23 | 449 | caif_read_unlock(sk); |
e6f95ec8 | 450 | |
bece7b23 | 451 | timeo = caif_stream_data_wait(sk, timeo); |
e6f95ec8 | 452 | |
bece7b23 SB |
453 | if (signal_pending(current)) { |
454 | err = sock_intr_errno(timeo); | |
455 | goto out; | |
456 | } | |
457 | caif_read_lock(sk); | |
458 | continue; | |
459 | unlock: | |
460 | release_sock(sk); | |
461 | break; | |
e6f95ec8 | 462 | } |
bece7b23 SB |
463 | release_sock(sk); |
464 | chunk = min_t(unsigned int, skb->len, size); | |
465 | if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) { | |
466 | skb_queue_head(&sk->sk_receive_queue, skb); | |
467 | if (copied == 0) | |
468 | copied = -EFAULT; | |
469 | break; | |
470 | } | |
471 | copied += chunk; | |
472 | size -= chunk; | |
e6f95ec8 | 473 | |
bece7b23 SB |
474 | /* Mark read part of skb as used */ |
475 | if (!(flags & MSG_PEEK)) { | |
476 | skb_pull(skb, chunk); | |
e6f95ec8 | 477 | |
bece7b23 SB |
478 | /* put the skb back if we didn't use it up. */ |
479 | if (skb->len) { | |
480 | skb_queue_head(&sk->sk_receive_queue, skb); | |
481 | break; | |
482 | } | |
483 | kfree_skb(skb); | |
e6f95ec8 | 484 | |
e6f95ec8 | 485 | } else { |
bece7b23 SB |
486 | /* |
487 | * It is questionable, see note in unix_dgram_recvmsg. | |
488 | */ | |
489 | /* put message back and return */ | |
490 | skb_queue_head(&sk->sk_receive_queue, skb); | |
491 | break; | |
e6f95ec8 | 492 | } |
bece7b23 SB |
493 | } while (size); |
494 | caif_read_unlock(sk); | |
e6f95ec8 | 495 | |
bece7b23 SB |
496 | out: |
497 | return copied ? : err; | |
498 | } | |
e6f95ec8 | 499 | |
bece7b23 SB |
500 | /* |
501 | * Copied from sock.c:sock_wait_for_wmem, but change to wait for | |
502 | * CAIF flow-on and sock_writable. | |
503 | */ | |
504 | static long caif_wait_for_flow_on(struct caifsock *cf_sk, | |
505 | int wait_writeable, long timeo, int *err) | |
506 | { | |
507 | struct sock *sk = &cf_sk->sk; | |
508 | DEFINE_WAIT(wait); | |
509 | for (;;) { | |
510 | *err = 0; | |
511 | if (tx_flow_is_on(cf_sk) && | |
512 | (!wait_writeable || sock_writeable(&cf_sk->sk))) | |
513 | break; | |
514 | *err = -ETIMEDOUT; | |
515 | if (!timeo) | |
516 | break; | |
517 | *err = -ERESTARTSYS; | |
518 | if (signal_pending(current)) | |
519 | break; | |
520 | prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE); | |
521 | *err = -ECONNRESET; | |
522 | if (sk->sk_shutdown & SHUTDOWN_MASK) | |
523 | break; | |
524 | *err = -sk->sk_err; | |
525 | if (sk->sk_err) | |
526 | break; | |
527 | *err = -EPIPE; | |
528 | if (cf_sk->sk.sk_state != CAIF_CONNECTED) | |
529 | break; | |
530 | timeo = schedule_timeout(timeo); | |
e6f95ec8 | 531 | } |
bece7b23 SB |
532 | finish_wait(sk_sleep(sk), &wait); |
533 | return timeo; | |
534 | } | |
e6f95ec8 | 535 | |
bece7b23 SB |
536 | /* |
537 | * Transmit a SKB. The device may temporarily request re-transmission | |
538 | * by returning EAGAIN. | |
539 | */ | |
540 | static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk, | |
541 | int noblock, long timeo) | |
542 | { | |
543 | struct cfpkt *pkt; | |
544 | int ret, loopcnt = 0; | |
e6f95ec8 | 545 | |
bece7b23 SB |
546 | pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb); |
547 | memset(cfpkt_info(pkt), 0, sizeof(struct caif_payload_info)); | |
548 | do { | |
e6f95ec8 | 549 | |
bece7b23 | 550 | ret = -ETIMEDOUT; |
e6f95ec8 | 551 | |
bece7b23 SB |
552 | /* Slight paranoia, probably not needed. */ |
553 | if (unlikely(loopcnt++ > 1000)) { | |
554 | pr_warning("CAIF: %s(): transmit retries failed," | |
555 | " error = %d\n", __func__, ret); | |
556 | break; | |
e6f95ec8 SB |
557 | } |
558 | ||
bece7b23 SB |
559 | if (cf_sk->layer.dn != NULL) |
560 | ret = cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt); | |
561 | if (likely(ret >= 0)) | |
562 | break; | |
563 | /* if transmit return -EAGAIN, then retry */ | |
564 | if (noblock && ret == -EAGAIN) | |
565 | break; | |
566 | timeo = caif_wait_for_flow_on(cf_sk, 0, timeo, &ret); | |
567 | if (signal_pending(current)) { | |
568 | ret = sock_intr_errno(timeo); | |
569 | break; | |
e6f95ec8 | 570 | } |
bece7b23 SB |
571 | if (ret) |
572 | break; | |
573 | if (cf_sk->sk.sk_state != CAIF_CONNECTED || | |
574 | sock_flag(&cf_sk->sk, SOCK_DEAD) || | |
575 | (cf_sk->sk.sk_shutdown & RCV_SHUTDOWN)) { | |
576 | ret = -EPIPE; | |
577 | cf_sk->sk.sk_err = EPIPE; | |
578 | break; | |
e6f95ec8 | 579 | } |
bece7b23 SB |
580 | } while (ret == -EAGAIN); |
581 | return ret; | |
582 | } | |
e6f95ec8 | 583 | |
bece7b23 SB |
584 | /* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */ |
585 | static int caif_seqpkt_sendmsg(struct kiocb *kiocb, struct socket *sock, | |
586 | struct msghdr *msg, size_t len) | |
587 | { | |
588 | struct sock *sk = sock->sk; | |
589 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); | |
590 | int buffer_size; | |
591 | int ret = 0; | |
592 | struct sk_buff *skb = NULL; | |
593 | int noblock; | |
594 | long timeo; | |
595 | caif_assert(cf_sk); | |
596 | ret = sock_error(sk); | |
597 | if (ret) | |
598 | goto err; | |
599 | ||
600 | ret = -EOPNOTSUPP; | |
601 | if (msg->msg_flags&MSG_OOB) | |
602 | goto err; | |
603 | ||
604 | ret = -EOPNOTSUPP; | |
605 | if (msg->msg_namelen) | |
606 | goto err; | |
607 | ||
608 | ret = -EINVAL; | |
609 | if (unlikely(msg->msg_iov->iov_base == NULL)) | |
610 | goto err; | |
611 | noblock = msg->msg_flags & MSG_DONTWAIT; | |
612 | ||
613 | buffer_size = len + CAIF_NEEDED_HEADROOM + CAIF_NEEDED_TAILROOM; | |
614 | ||
615 | ret = -EMSGSIZE; | |
616 | if (buffer_size > CAIF_MAX_PAYLOAD_SIZE) | |
617 | goto err; | |
618 | ||
619 | timeo = sock_sndtimeo(sk, noblock); | |
620 | timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk), | |
621 | 1, timeo, &ret); | |
622 | ||
623 | ret = -EPIPE; | |
624 | if (cf_sk->sk.sk_state != CAIF_CONNECTED || | |
625 | sock_flag(sk, SOCK_DEAD) || | |
626 | (sk->sk_shutdown & RCV_SHUTDOWN)) | |
627 | goto err; | |
628 | ||
629 | ret = -ENOMEM; | |
630 | skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret); | |
631 | if (!skb) | |
632 | goto err; | |
633 | skb_reserve(skb, CAIF_NEEDED_HEADROOM); | |
634 | ||
635 | ret = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len); | |
636 | ||
637 | if (ret) | |
638 | goto err; | |
639 | ret = transmit_skb(skb, cf_sk, noblock, timeo); | |
640 | if (ret < 0) | |
641 | goto err; | |
642 | return len; | |
643 | err: | |
644 | kfree_skb(skb); | |
645 | return ret; | |
646 | } | |
e6f95ec8 | 647 | |
bece7b23 SB |
648 | /* |
649 | * Copied from unix_stream_sendmsg and adapted to CAIF: | |
650 | * Changed removed permission handling and added waiting for flow on | |
651 | * and other minor adaptations. | |
652 | */ | |
653 | static int caif_stream_sendmsg(struct kiocb *kiocb, struct socket *sock, | |
654 | struct msghdr *msg, size_t len) | |
655 | { | |
656 | struct sock *sk = sock->sk; | |
657 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); | |
658 | int err, size; | |
659 | struct sk_buff *skb; | |
660 | int sent = 0; | |
661 | long timeo; | |
e6f95ec8 | 662 | |
bece7b23 | 663 | err = -EOPNOTSUPP; |
e6f95ec8 | 664 | |
bece7b23 SB |
665 | if (unlikely(msg->msg_flags&MSG_OOB)) |
666 | goto out_err; | |
e6f95ec8 | 667 | |
bece7b23 SB |
668 | if (unlikely(msg->msg_namelen)) |
669 | goto out_err; | |
e6f95ec8 | 670 | |
bece7b23 SB |
671 | timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT); |
672 | timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err); | |
e6f95ec8 | 673 | |
bece7b23 SB |
674 | if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN)) |
675 | goto pipe_err; | |
e6f95ec8 | 676 | |
bece7b23 | 677 | while (sent < len) { |
e6f95ec8 | 678 | |
bece7b23 | 679 | size = len-sent; |
e6f95ec8 | 680 | |
bece7b23 SB |
681 | if (size > CAIF_MAX_PAYLOAD_SIZE) |
682 | size = CAIF_MAX_PAYLOAD_SIZE; | |
e6f95ec8 | 683 | |
bece7b23 SB |
684 | /* If size is more than half of sndbuf, chop up message */ |
685 | if (size > ((sk->sk_sndbuf >> 1) - 64)) | |
686 | size = (sk->sk_sndbuf >> 1) - 64; | |
e6f95ec8 | 687 | |
bece7b23 SB |
688 | if (size > SKB_MAX_ALLOC) |
689 | size = SKB_MAX_ALLOC; | |
e6f95ec8 | 690 | |
bece7b23 SB |
691 | skb = sock_alloc_send_skb(sk, |
692 | size + CAIF_NEEDED_HEADROOM | |
693 | + CAIF_NEEDED_TAILROOM, | |
694 | msg->msg_flags&MSG_DONTWAIT, | |
695 | &err); | |
696 | if (skb == NULL) | |
697 | goto out_err; | |
e6f95ec8 | 698 | |
bece7b23 SB |
699 | skb_reserve(skb, CAIF_NEEDED_HEADROOM); |
700 | /* | |
701 | * If you pass two values to the sock_alloc_send_skb | |
702 | * it tries to grab the large buffer with GFP_NOFS | |
703 | * (which can fail easily), and if it fails grab the | |
704 | * fallback size buffer which is under a page and will | |
705 | * succeed. [Alan] | |
706 | */ | |
707 | size = min_t(int, size, skb_tailroom(skb)); | |
e6f95ec8 | 708 | |
bece7b23 SB |
709 | err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size); |
710 | if (err) { | |
711 | kfree_skb(skb); | |
712 | goto out_err; | |
713 | } | |
714 | err = transmit_skb(skb, cf_sk, | |
715 | msg->msg_flags&MSG_DONTWAIT, timeo); | |
716 | if (err < 0) { | |
717 | kfree_skb(skb); | |
718 | goto pipe_err; | |
719 | } | |
720 | sent += size; | |
e6f95ec8 | 721 | } |
e6f95ec8 | 722 | |
bece7b23 | 723 | return sent; |
e6f95ec8 | 724 | |
bece7b23 SB |
725 | pipe_err: |
726 | if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL)) | |
727 | send_sig(SIGPIPE, current, 0); | |
728 | err = -EPIPE; | |
729 | out_err: | |
730 | return sent ? : err; | |
e6f95ec8 SB |
731 | } |
732 | ||
733 | static int setsockopt(struct socket *sock, | |
734 | int lvl, int opt, char __user *ov, unsigned int ol) | |
735 | { | |
736 | struct sock *sk = sock->sk; | |
737 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); | |
738 | int prio, linksel; | |
739 | struct ifreq ifreq; | |
740 | ||
bece7b23 | 741 | if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED) |
e6f95ec8 | 742 | return -ENOPROTOOPT; |
bece7b23 | 743 | |
e6f95ec8 SB |
744 | switch (opt) { |
745 | case CAIFSO_LINK_SELECT: | |
bece7b23 | 746 | if (ol < sizeof(int)) |
e6f95ec8 | 747 | return -EINVAL; |
e6f95ec8 SB |
748 | if (lvl != SOL_CAIF) |
749 | goto bad_sol; | |
750 | if (copy_from_user(&linksel, ov, sizeof(int))) | |
751 | return -EINVAL; | |
752 | lock_sock(&(cf_sk->sk)); | |
753 | cf_sk->conn_req.link_selector = linksel; | |
754 | release_sock(&cf_sk->sk); | |
755 | return 0; | |
756 | ||
757 | case SO_PRIORITY: | |
758 | if (lvl != SOL_SOCKET) | |
759 | goto bad_sol; | |
bece7b23 | 760 | if (ol < sizeof(int)) |
e6f95ec8 | 761 | return -EINVAL; |
e6f95ec8 SB |
762 | if (copy_from_user(&prio, ov, sizeof(int))) |
763 | return -EINVAL; | |
764 | lock_sock(&(cf_sk->sk)); | |
765 | cf_sk->conn_req.priority = prio; | |
e6f95ec8 SB |
766 | release_sock(&cf_sk->sk); |
767 | return 0; | |
768 | ||
769 | case SO_BINDTODEVICE: | |
770 | if (lvl != SOL_SOCKET) | |
771 | goto bad_sol; | |
bece7b23 | 772 | if (ol < sizeof(struct ifreq)) |
e6f95ec8 | 773 | return -EINVAL; |
e6f95ec8 SB |
774 | if (copy_from_user(&ifreq, ov, sizeof(ifreq))) |
775 | return -EFAULT; | |
776 | lock_sock(&(cf_sk->sk)); | |
777 | strncpy(cf_sk->conn_req.link_name, ifreq.ifr_name, | |
778 | sizeof(cf_sk->conn_req.link_name)); | |
779 | cf_sk->conn_req.link_name | |
780 | [sizeof(cf_sk->conn_req.link_name)-1] = 0; | |
781 | release_sock(&cf_sk->sk); | |
782 | return 0; | |
783 | ||
784 | case CAIFSO_REQ_PARAM: | |
785 | if (lvl != SOL_CAIF) | |
786 | goto bad_sol; | |
787 | if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL) | |
788 | return -ENOPROTOOPT; | |
e6f95ec8 SB |
789 | lock_sock(&(cf_sk->sk)); |
790 | cf_sk->conn_req.param.size = ol; | |
bece7b23 SB |
791 | if (ol > sizeof(cf_sk->conn_req.param.data) || |
792 | copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) { | |
e6f95ec8 | 793 | release_sock(&cf_sk->sk); |
e6f95ec8 SB |
794 | return -EINVAL; |
795 | } | |
e6f95ec8 SB |
796 | release_sock(&cf_sk->sk); |
797 | return 0; | |
798 | ||
799 | default: | |
bece7b23 | 800 | return -ENOPROTOOPT; |
e6f95ec8 SB |
801 | } |
802 | ||
803 | return 0; | |
804 | bad_sol: | |
e6f95ec8 SB |
805 | return -ENOPROTOOPT; |
806 | ||
807 | } | |
808 | ||
bece7b23 SB |
809 | /* |
810 | * caif_connect() - Connect a CAIF Socket | |
811 | * Copied and modified af_irda.c:irda_connect(). | |
812 | * | |
813 | * Note : by consulting "errno", the user space caller may learn the cause | |
814 | * of the failure. Most of them are visible in the function, others may come | |
815 | * from subroutines called and are listed here : | |
816 | * o -EAFNOSUPPORT: bad socket family or type. | |
817 | * o -ESOCKTNOSUPPORT: bad socket type or protocol | |
818 | * o -EINVAL: bad socket address, or CAIF link type | |
819 | * o -ECONNREFUSED: remote end refused the connection. | |
820 | * o -EINPROGRESS: connect request sent but timed out (or non-blocking) | |
821 | * o -EISCONN: already connected. | |
822 | * o -ETIMEDOUT: Connection timed out (send timeout) | |
823 | * o -ENODEV: No link layer to send request | |
824 | * o -ECONNRESET: Received Shutdown indication or lost link layer | |
825 | * o -ENOMEM: Out of memory | |
826 | * | |
827 | * State Strategy: | |
828 | * o sk_state: holds the CAIF_* protocol state, it's updated by | |
829 | * caif_ctrl_cb. | |
830 | * o sock->state: holds the SS_* socket state and is updated by connect and | |
831 | * disconnect. | |
832 | */ | |
833 | static int caif_connect(struct socket *sock, struct sockaddr *uaddr, | |
834 | int addr_len, int flags) | |
e6f95ec8 | 835 | { |
e6f95ec8 | 836 | struct sock *sk = sock->sk; |
bece7b23 SB |
837 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); |
838 | long timeo; | |
839 | int err; | |
840 | lock_sock(sk); | |
e6f95ec8 | 841 | |
bece7b23 SB |
842 | err = -EAFNOSUPPORT; |
843 | if (uaddr->sa_family != AF_CAIF) | |
e6f95ec8 SB |
844 | goto out; |
845 | ||
bece7b23 SB |
846 | err = -ESOCKTNOSUPPORT; |
847 | if (unlikely(!(sk->sk_type == SOCK_STREAM && | |
848 | cf_sk->sk.sk_protocol == CAIFPROTO_AT) && | |
849 | sk->sk_type != SOCK_SEQPACKET)) | |
850 | goto out; | |
851 | switch (sock->state) { | |
852 | case SS_UNCONNECTED: | |
853 | /* Normal case, a fresh connect */ | |
854 | caif_assert(sk->sk_state == CAIF_DISCONNECTED); | |
855 | break; | |
856 | case SS_CONNECTING: | |
857 | switch (sk->sk_state) { | |
858 | case CAIF_CONNECTED: | |
859 | sock->state = SS_CONNECTED; | |
860 | err = -EISCONN; | |
861 | goto out; | |
862 | case CAIF_DISCONNECTED: | |
863 | /* Reconnect allowed */ | |
864 | break; | |
865 | case CAIF_CONNECTING: | |
866 | err = -EALREADY; | |
867 | if (flags & O_NONBLOCK) | |
868 | goto out; | |
869 | goto wait_connect; | |
870 | } | |
871 | break; | |
872 | case SS_CONNECTED: | |
873 | caif_assert(sk->sk_state == CAIF_CONNECTED || | |
874 | sk->sk_state == CAIF_DISCONNECTED); | |
875 | if (sk->sk_shutdown & SHUTDOWN_MASK) { | |
876 | /* Allow re-connect after SHUTDOWN_IND */ | |
877 | caif_disconnect_client(&cf_sk->layer); | |
878 | break; | |
879 | } | |
880 | /* No reconnect on a seqpacket socket */ | |
881 | err = -EISCONN; | |
882 | goto out; | |
883 | case SS_DISCONNECTING: | |
884 | case SS_FREE: | |
885 | caif_assert(1); /*Should never happen */ | |
886 | break; | |
e6f95ec8 | 887 | } |
bece7b23 SB |
888 | sk->sk_state = CAIF_DISCONNECTED; |
889 | sock->state = SS_UNCONNECTED; | |
890 | sk_stream_kill_queues(&cf_sk->sk); | |
e6f95ec8 | 891 | |
bece7b23 SB |
892 | err = -EINVAL; |
893 | if (addr_len != sizeof(struct sockaddr_caif) || | |
894 | !uaddr) | |
895 | goto out; | |
e6f95ec8 | 896 | |
bece7b23 | 897 | memcpy(&cf_sk->conn_req.sockaddr, uaddr, |
e6f95ec8 SB |
898 | sizeof(struct sockaddr_caif)); |
899 | ||
bece7b23 SB |
900 | /* Move to connecting socket, start sending Connect Requests */ |
901 | sock->state = SS_CONNECTING; | |
902 | sk->sk_state = CAIF_CONNECTING; | |
903 | ||
904 | dbfs_atomic_inc(&cnt.num_connect_req); | |
905 | cf_sk->layer.receive = caif_sktrecv_cb; | |
906 | err = caif_connect_client(&cf_sk->conn_req, | |
907 | &cf_sk->layer); | |
908 | if (err < 0) { | |
909 | cf_sk->sk.sk_socket->state = SS_UNCONNECTED; | |
910 | cf_sk->sk.sk_state = CAIF_DISCONNECTED; | |
911 | goto out; | |
e6f95ec8 SB |
912 | } |
913 | ||
bece7b23 SB |
914 | err = -EINPROGRESS; |
915 | wait_connect: | |
e6f95ec8 | 916 | |
bece7b23 SB |
917 | if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK)) |
918 | goto out; | |
e6f95ec8 | 919 | |
bece7b23 SB |
920 | timeo = sock_sndtimeo(sk, flags & O_NONBLOCK); |
921 | ||
922 | release_sock(sk); | |
923 | err = wait_event_interruptible_timeout(*sk_sleep(sk), | |
924 | sk->sk_state != CAIF_CONNECTING, | |
925 | timeo); | |
926 | lock_sock(sk); | |
927 | if (err < 0) | |
928 | goto out; /* -ERESTARTSYS */ | |
929 | if (err == 0 && sk->sk_state != CAIF_CONNECTED) { | |
930 | err = -ETIMEDOUT; | |
931 | goto out; | |
e6f95ec8 | 932 | } |
e6f95ec8 | 933 | |
bece7b23 SB |
934 | if (sk->sk_state != CAIF_CONNECTED) { |
935 | sock->state = SS_UNCONNECTED; | |
936 | err = sock_error(sk); | |
937 | if (!err) | |
938 | err = -ECONNREFUSED; | |
939 | goto out; | |
940 | } | |
941 | sock->state = SS_CONNECTED; | |
942 | err = 0; | |
e6f95ec8 | 943 | out: |
bece7b23 SB |
944 | release_sock(sk); |
945 | return err; | |
e6f95ec8 SB |
946 | } |
947 | ||
bece7b23 SB |
948 | |
949 | /* | |
950 | * caif_release() - Disconnect a CAIF Socket | |
951 | * Copied and modified af_irda.c:irda_release(). | |
952 | */ | |
953 | static int caif_release(struct socket *sock) | |
e6f95ec8 | 954 | { |
e6f95ec8 | 955 | struct sock *sk = sock->sk; |
bece7b23 SB |
956 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); |
957 | int res = 0; | |
e6f95ec8 | 958 | |
bece7b23 SB |
959 | if (!sk) |
960 | return 0; | |
e6f95ec8 | 961 | |
bece7b23 | 962 | set_tx_flow_off(cf_sk); |
e6f95ec8 SB |
963 | |
964 | /* | |
bece7b23 SB |
965 | * Ensure that packets are not queued after this point in time. |
966 | * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock, | |
967 | * this ensures no packets when sock is dead. | |
e6f95ec8 | 968 | */ |
bece7b23 SB |
969 | spin_lock(&sk->sk_receive_queue.lock); |
970 | sock_set_flag(sk, SOCK_DEAD); | |
971 | spin_unlock(&sk->sk_receive_queue.lock); | |
972 | sock->sk = NULL; | |
e6f95ec8 | 973 | |
bece7b23 | 974 | dbfs_atomic_inc(&cnt.num_disconnect); |
e6f95ec8 SB |
975 | |
976 | if (cf_sk->debugfs_socket_dir != NULL) | |
977 | debugfs_remove_recursive(cf_sk->debugfs_socket_dir); | |
978 | ||
e6f95ec8 | 979 | lock_sock(&(cf_sk->sk)); |
bece7b23 SB |
980 | sk->sk_state = CAIF_DISCONNECTED; |
981 | sk->sk_shutdown = SHUTDOWN_MASK; | |
e6f95ec8 | 982 | |
bece7b23 SB |
983 | if (cf_sk->sk.sk_socket->state == SS_CONNECTED || |
984 | cf_sk->sk.sk_socket->state == SS_CONNECTING) | |
985 | res = caif_disconnect_client(&cf_sk->layer); | |
e6f95ec8 | 986 | |
bece7b23 SB |
987 | cf_sk->sk.sk_socket->state = SS_DISCONNECTING; |
988 | wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP); | |
e6f95ec8 | 989 | |
bece7b23 SB |
990 | sock_orphan(sk); |
991 | cf_sk->layer.dn = NULL; | |
992 | sk_stream_kill_queues(&cf_sk->sk); | |
993 | release_sock(sk); | |
994 | sock_put(sk); | |
995 | return res; | |
996 | } | |
e6f95ec8 | 997 | |
bece7b23 SB |
998 | /* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */ |
999 | static unsigned int caif_poll(struct file *file, | |
1000 | struct socket *sock, poll_table *wait) | |
1001 | { | |
1002 | struct sock *sk = sock->sk; | |
1003 | unsigned int mask; | |
1004 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); | |
e6f95ec8 | 1005 | |
bece7b23 SB |
1006 | sock_poll_wait(file, sk_sleep(sk), wait); |
1007 | mask = 0; | |
e6f95ec8 | 1008 | |
bece7b23 SB |
1009 | /* exceptional events? */ |
1010 | if (sk->sk_err) | |
1011 | mask |= POLLERR; | |
1012 | if (sk->sk_shutdown == SHUTDOWN_MASK) | |
1013 | mask |= POLLHUP; | |
1014 | if (sk->sk_shutdown & RCV_SHUTDOWN) | |
1015 | mask |= POLLRDHUP; | |
e6f95ec8 | 1016 | |
bece7b23 SB |
1017 | /* readable? */ |
1018 | if (!skb_queue_empty(&sk->sk_receive_queue) || | |
1019 | (sk->sk_shutdown & RCV_SHUTDOWN)) | |
1020 | mask |= POLLIN | POLLRDNORM; | |
e6f95ec8 | 1021 | |
bece7b23 SB |
1022 | /* Connection-based need to check for termination and startup */ |
1023 | if (sk->sk_state == CAIF_DISCONNECTED) | |
1024 | mask |= POLLHUP; | |
e6f95ec8 SB |
1025 | |
1026 | /* | |
bece7b23 SB |
1027 | * we set writable also when the other side has shut down the |
1028 | * connection. This prevents stuck sockets. | |
e6f95ec8 | 1029 | */ |
bece7b23 SB |
1030 | if (sock_writeable(sk) && tx_flow_is_on(cf_sk)) |
1031 | mask |= POLLOUT | POLLWRNORM | POLLWRBAND; | |
1032 | ||
1033 | return mask; | |
e6f95ec8 SB |
1034 | } |
1035 | ||
bece7b23 SB |
1036 | static const struct proto_ops caif_seqpacket_ops = { |
1037 | .family = PF_CAIF, | |
1038 | .owner = THIS_MODULE, | |
1039 | .release = caif_release, | |
1040 | .bind = sock_no_bind, | |
1041 | .connect = caif_connect, | |
1042 | .socketpair = sock_no_socketpair, | |
1043 | .accept = sock_no_accept, | |
1044 | .getname = sock_no_getname, | |
1045 | .poll = caif_poll, | |
1046 | .ioctl = sock_no_ioctl, | |
1047 | .listen = sock_no_listen, | |
1048 | .shutdown = sock_no_shutdown, | |
1049 | .setsockopt = setsockopt, | |
1050 | .getsockopt = sock_no_getsockopt, | |
1051 | .sendmsg = caif_seqpkt_sendmsg, | |
1052 | .recvmsg = caif_seqpkt_recvmsg, | |
1053 | .mmap = sock_no_mmap, | |
1054 | .sendpage = sock_no_sendpage, | |
1055 | }; | |
1056 | ||
1057 | static const struct proto_ops caif_stream_ops = { | |
e6f95ec8 SB |
1058 | .family = PF_CAIF, |
1059 | .owner = THIS_MODULE, | |
1060 | .release = caif_release, | |
1061 | .bind = sock_no_bind, | |
1062 | .connect = caif_connect, | |
1063 | .socketpair = sock_no_socketpair, | |
1064 | .accept = sock_no_accept, | |
1065 | .getname = sock_no_getname, | |
1066 | .poll = caif_poll, | |
1067 | .ioctl = sock_no_ioctl, | |
1068 | .listen = sock_no_listen, | |
bece7b23 | 1069 | .shutdown = sock_no_shutdown, |
e6f95ec8 SB |
1070 | .setsockopt = setsockopt, |
1071 | .getsockopt = sock_no_getsockopt, | |
bece7b23 SB |
1072 | .sendmsg = caif_stream_sendmsg, |
1073 | .recvmsg = caif_stream_recvmsg, | |
e6f95ec8 | 1074 | .mmap = sock_no_mmap, |
bece7b23 | 1075 | .sendpage = sock_no_sendpage, |
e6f95ec8 SB |
1076 | }; |
1077 | ||
1078 | /* This function is called when a socket is finally destroyed. */ | |
1079 | static void caif_sock_destructor(struct sock *sk) | |
1080 | { | |
bece7b23 | 1081 | struct caifsock *cf_sk = container_of(sk, struct caifsock, sk); |
e6f95ec8 SB |
1082 | caif_assert(!atomic_read(&sk->sk_wmem_alloc)); |
1083 | caif_assert(sk_unhashed(sk)); | |
1084 | caif_assert(!sk->sk_socket); | |
1085 | if (!sock_flag(sk, SOCK_DEAD)) { | |
bece7b23 | 1086 | pr_info("Attempt to release alive CAIF socket: %p\n", sk); |
e6f95ec8 SB |
1087 | return; |
1088 | } | |
bece7b23 SB |
1089 | sk_stream_kill_queues(&cf_sk->sk); |
1090 | dbfs_atomic_dec(&cnt.caif_nr_socks); | |
e6f95ec8 SB |
1091 | } |
1092 | ||
1093 | static int caif_create(struct net *net, struct socket *sock, int protocol, | |
bece7b23 | 1094 | int kern) |
e6f95ec8 SB |
1095 | { |
1096 | struct sock *sk = NULL; | |
1097 | struct caifsock *cf_sk = NULL; | |
e6f95ec8 SB |
1098 | static struct proto prot = {.name = "PF_CAIF", |
1099 | .owner = THIS_MODULE, | |
1100 | .obj_size = sizeof(struct caifsock), | |
1101 | }; | |
1102 | ||
bece7b23 SB |
1103 | if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN)) |
1104 | return -EPERM; | |
e6f95ec8 SB |
1105 | /* |
1106 | * The sock->type specifies the socket type to use. | |
bece7b23 SB |
1107 | * The CAIF socket is a packet stream in the sense |
1108 | * that it is packet based. CAIF trusts the reliability | |
1109 | * of the link, no resending is implemented. | |
e6f95ec8 | 1110 | */ |
bece7b23 SB |
1111 | if (sock->type == SOCK_SEQPACKET) |
1112 | sock->ops = &caif_seqpacket_ops; | |
1113 | else if (sock->type == SOCK_STREAM) | |
1114 | sock->ops = &caif_stream_ops; | |
1115 | else | |
e6f95ec8 SB |
1116 | return -ESOCKTNOSUPPORT; |
1117 | ||
e6f95ec8 SB |
1118 | if (protocol < 0 || protocol >= CAIFPROTO_MAX) |
1119 | return -EPROTONOSUPPORT; | |
1120 | /* | |
bece7b23 SB |
1121 | * Set the socket state to unconnected. The socket state |
1122 | * is really not used at all in the net/core or socket.c but the | |
e6f95ec8 SB |
1123 | * initialization makes sure that sock->state is not uninitialized. |
1124 | */ | |
e6f95ec8 SB |
1125 | sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot); |
1126 | if (!sk) | |
1127 | return -ENOMEM; | |
1128 | ||
1129 | cf_sk = container_of(sk, struct caifsock, sk); | |
1130 | ||
1131 | /* Store the protocol */ | |
1132 | sk->sk_protocol = (unsigned char) protocol; | |
1133 | ||
bece7b23 SB |
1134 | /* Sendbuf dictates the amount of outbound packets not yet sent */ |
1135 | sk->sk_sndbuf = CAIF_DEF_SNDBUF; | |
1136 | sk->sk_rcvbuf = CAIF_DEF_RCVBUF; | |
e6f95ec8 SB |
1137 | |
1138 | /* | |
1139 | * Lock in order to try to stop someone from opening the socket | |
1140 | * too early. | |
1141 | */ | |
1142 | lock_sock(&(cf_sk->sk)); | |
1143 | ||
1144 | /* Initialize the nozero default sock structure data. */ | |
1145 | sock_init_data(sock, sk); | |
e6f95ec8 | 1146 | sk->sk_destruct = caif_sock_destructor; |
e6f95ec8 | 1147 | |
bece7b23 SB |
1148 | mutex_init(&cf_sk->readlock); /* single task reading lock */ |
1149 | cf_sk->layer.ctrlcmd = caif_ctrl_cb; | |
1150 | cf_sk->sk.sk_socket->state = SS_UNCONNECTED; | |
1151 | cf_sk->sk.sk_state = CAIF_DISCONNECTED; | |
e6f95ec8 | 1152 | |
bece7b23 SB |
1153 | set_tx_flow_off(cf_sk); |
1154 | set_rx_flow_on(cf_sk); | |
e6f95ec8 SB |
1155 | |
1156 | /* Set default options on configuration */ | |
1157 | cf_sk->conn_req.priority = CAIF_PRIO_NORMAL; | |
bece7b23 | 1158 | cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY; |
e6f95ec8 SB |
1159 | cf_sk->conn_req.protocol = protocol; |
1160 | /* Increase the number of sockets created. */ | |
bece7b23 SB |
1161 | dbfs_atomic_inc(&cnt.caif_nr_socks); |
1162 | #ifdef CONFIG_DEBUG_FS | |
e6f95ec8 | 1163 | if (!IS_ERR(debugfsdir)) { |
bece7b23 SB |
1164 | /* Fill in some information concerning the misc socket. */ |
1165 | snprintf(cf_sk->name, sizeof(cf_sk->name), "cfsk%d", | |
1166 | atomic_read(&cnt.caif_nr_socks)); | |
1167 | ||
e6f95ec8 SB |
1168 | cf_sk->debugfs_socket_dir = |
1169 | debugfs_create_dir(cf_sk->name, debugfsdir); | |
bece7b23 SB |
1170 | debugfs_create_u32("sk_state", S_IRUSR | S_IWUSR, |
1171 | cf_sk->debugfs_socket_dir, | |
1172 | (u32 *) &cf_sk->sk.sk_state); | |
e6f95ec8 SB |
1173 | debugfs_create_u32("flow_state", S_IRUSR | S_IWUSR, |
1174 | cf_sk->debugfs_socket_dir, &cf_sk->flow_state); | |
bece7b23 SB |
1175 | debugfs_create_u32("sk_rmem_alloc", S_IRUSR | S_IWUSR, |
1176 | cf_sk->debugfs_socket_dir, | |
1177 | (u32 *) &cf_sk->sk.sk_rmem_alloc); | |
1178 | debugfs_create_u32("sk_wmem_alloc", S_IRUSR | S_IWUSR, | |
e6f95ec8 | 1179 | cf_sk->debugfs_socket_dir, |
bece7b23 | 1180 | (u32 *) &cf_sk->sk.sk_wmem_alloc); |
e6f95ec8 SB |
1181 | debugfs_create_u32("identity", S_IRUSR | S_IWUSR, |
1182 | cf_sk->debugfs_socket_dir, | |
1183 | (u32 *) &cf_sk->layer.id); | |
1184 | } | |
bece7b23 | 1185 | #endif |
e6f95ec8 SB |
1186 | release_sock(&cf_sk->sk); |
1187 | return 0; | |
e6f95ec8 SB |
1188 | } |
1189 | ||
bece7b23 | 1190 | |
e6f95ec8 SB |
1191 | static struct net_proto_family caif_family_ops = { |
1192 | .family = PF_CAIF, | |
1193 | .create = caif_create, | |
1194 | .owner = THIS_MODULE, | |
1195 | }; | |
1196 | ||
bece7b23 | 1197 | int af_caif_init(void) |
e6f95ec8 | 1198 | { |
bece7b23 | 1199 | int err = sock_register(&caif_family_ops); |
e6f95ec8 SB |
1200 | if (!err) |
1201 | return err; | |
e6f95ec8 SB |
1202 | return 0; |
1203 | } | |
1204 | ||
1205 | static int __init caif_sktinit_module(void) | |
1206 | { | |
e6f95ec8 | 1207 | #ifdef CONFIG_DEBUG_FS |
bece7b23 | 1208 | debugfsdir = debugfs_create_dir("caif_sk", NULL); |
e6f95ec8 | 1209 | if (!IS_ERR(debugfsdir)) { |
e6f95ec8 SB |
1210 | debugfs_create_u32("num_sockets", S_IRUSR | S_IWUSR, |
1211 | debugfsdir, | |
bece7b23 SB |
1212 | (u32 *) &cnt.caif_nr_socks); |
1213 | debugfs_create_u32("num_connect_req", S_IRUSR | S_IWUSR, | |
e6f95ec8 | 1214 | debugfsdir, |
bece7b23 SB |
1215 | (u32 *) &cnt.num_connect_req); |
1216 | debugfs_create_u32("num_connect_resp", S_IRUSR | S_IWUSR, | |
e6f95ec8 | 1217 | debugfsdir, |
bece7b23 SB |
1218 | (u32 *) &cnt.num_connect_resp); |
1219 | debugfs_create_u32("num_connect_fail_resp", S_IRUSR | S_IWUSR, | |
e6f95ec8 | 1220 | debugfsdir, |
bece7b23 SB |
1221 | (u32 *) &cnt.num_connect_fail_resp); |
1222 | debugfs_create_u32("num_disconnect", S_IRUSR | S_IWUSR, | |
e6f95ec8 | 1223 | debugfsdir, |
bece7b23 | 1224 | (u32 *) &cnt.num_disconnect); |
e6f95ec8 SB |
1225 | debugfs_create_u32("num_remote_shutdown_ind", |
1226 | S_IRUSR | S_IWUSR, debugfsdir, | |
1227 | (u32 *) &cnt.num_remote_shutdown_ind); | |
1228 | debugfs_create_u32("num_tx_flow_off_ind", S_IRUSR | S_IWUSR, | |
1229 | debugfsdir, | |
1230 | (u32 *) &cnt.num_tx_flow_off_ind); | |
1231 | debugfs_create_u32("num_tx_flow_on_ind", S_IRUSR | S_IWUSR, | |
1232 | debugfsdir, | |
1233 | (u32 *) &cnt.num_tx_flow_on_ind); | |
1234 | debugfs_create_u32("num_rx_flow_off", S_IRUSR | S_IWUSR, | |
1235 | debugfsdir, | |
1236 | (u32 *) &cnt.num_rx_flow_off); | |
1237 | debugfs_create_u32("num_rx_flow_on", S_IRUSR | S_IWUSR, | |
1238 | debugfsdir, | |
1239 | (u32 *) &cnt.num_rx_flow_on); | |
1240 | } | |
1241 | #endif | |
bece7b23 | 1242 | return af_caif_init(); |
e6f95ec8 SB |
1243 | } |
1244 | ||
1245 | static void __exit caif_sktexit_module(void) | |
1246 | { | |
1247 | sock_unregister(PF_CAIF); | |
1248 | if (debugfsdir != NULL) | |
1249 | debugfs_remove_recursive(debugfsdir); | |
1250 | } | |
e6f95ec8 SB |
1251 | module_init(caif_sktinit_module); |
1252 | module_exit(caif_sktexit_module); |