]>
Commit | Line | Data |
---|---|---|
b97bf3fd PL |
1 | /* |
2 | * net/tipc/socket.c: TIPC socket API | |
c4307285 | 3 | * |
5eee6a6d AS |
4 | * Copyright (c) 2001-2007, Ericsson AB |
5 | * Copyright (c) 2004-2007, Wind River Systems | |
b97bf3fd PL |
6 | * All rights reserved. |
7 | * | |
9ea1fd3c | 8 | * Redistribution and use in source and binary forms, with or without |
b97bf3fd PL |
9 | * modification, are permitted provided that the following conditions are met: |
10 | * | |
9ea1fd3c PL |
11 | * 1. Redistributions of source code must retain the above copyright |
12 | * notice, this list of conditions and the following disclaimer. | |
13 | * 2. Redistributions in binary form must reproduce the above copyright | |
14 | * notice, this list of conditions and the following disclaimer in the | |
15 | * documentation and/or other materials provided with the distribution. | |
16 | * 3. Neither the names of the copyright holders nor the names of its | |
17 | * contributors may be used to endorse or promote products derived from | |
18 | * this software without specific prior written permission. | |
b97bf3fd | 19 | * |
9ea1fd3c PL |
20 | * Alternatively, this software may be distributed under the terms of the |
21 | * GNU General Public License ("GPL") version 2 as published by the Free | |
22 | * Software Foundation. | |
23 | * | |
24 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" | |
25 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE | |
28 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
29 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
30 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
31 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
32 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
33 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE | |
b97bf3fd PL |
34 | * POSSIBILITY OF SUCH DAMAGE. |
35 | */ | |
36 | ||
37 | #include <linux/module.h> | |
38 | #include <linux/types.h> | |
39 | #include <linux/net.h> | |
40 | #include <linux/socket.h> | |
41 | #include <linux/errno.h> | |
42 | #include <linux/mm.h> | |
43 | #include <linux/slab.h> | |
44 | #include <linux/poll.h> | |
b97bf3fd | 45 | #include <linux/fcntl.h> |
26bad2c0 | 46 | #include <linux/mutex.h> |
b97bf3fd PL |
47 | #include <asm/string.h> |
48 | #include <asm/atomic.h> | |
49 | #include <net/sock.h> | |
50 | ||
51 | #include <linux/tipc.h> | |
ea714ccd | 52 | #include <linux/tipc_config.h> |
b97bf3fd PL |
53 | #include <net/tipc/tipc_msg.h> |
54 | #include <net/tipc/tipc_port.h> | |
55 | ||
56 | #include "core.h" | |
57 | ||
58 | #define SS_LISTENING -1 /* socket is listening */ | |
59 | #define SS_READY -2 /* socket is connectionless */ | |
60 | ||
3654ea02 AS |
61 | #define OVERLOAD_LIMIT_BASE 5000 |
62 | #define CONN_TIMEOUT_DEFAULT 8000 /* default connect timeout = 8s */ | |
b97bf3fd PL |
63 | |
64 | struct tipc_sock { | |
65 | struct sock sk; | |
66 | struct tipc_port *p; | |
26bad2c0 | 67 | struct mutex lock; |
b97bf3fd PL |
68 | }; |
69 | ||
70 | #define tipc_sk(sk) ((struct tipc_sock*)sk) | |
71 | ||
72 | static u32 dispatch(struct tipc_port *tport, struct sk_buff *buf); | |
73 | static void wakeupdispatch(struct tipc_port *tport); | |
74 | ||
bca65eae FW |
75 | static const struct proto_ops packet_ops; |
76 | static const struct proto_ops stream_ops; | |
77 | static const struct proto_ops msg_ops; | |
b97bf3fd PL |
78 | |
79 | static struct proto tipc_proto; | |
80 | ||
81 | static int sockets_enabled = 0; | |
82 | ||
83 | static atomic_t tipc_queue_size = ATOMIC_INIT(0); | |
84 | ||
85 | ||
c4307285 YH |
86 | /* |
87 | * sock_lock(): Lock a port/socket pair. lock_sock() can | |
88 | * not be used here, since the same lock must protect ports | |
b97bf3fd PL |
89 | * with non-socket interfaces. |
90 | * See net.c for description of locking policy. | |
91 | */ | |
05790c64 | 92 | static void sock_lock(struct tipc_sock* tsock) |
b97bf3fd | 93 | { |
c4307285 | 94 | spin_lock_bh(tsock->p->lock); |
b97bf3fd PL |
95 | } |
96 | ||
c4307285 | 97 | /* |
b97bf3fd PL |
98 | * sock_unlock(): Unlock a port/socket pair |
99 | */ | |
05790c64 | 100 | static void sock_unlock(struct tipc_sock* tsock) |
b97bf3fd | 101 | { |
c4307285 | 102 | spin_unlock_bh(tsock->p->lock); |
b97bf3fd PL |
103 | } |
104 | ||
b97bf3fd PL |
105 | /** |
106 | * advance_queue - discard first buffer in queue | |
107 | * @tsock: TIPC socket | |
108 | */ | |
109 | ||
05790c64 | 110 | static void advance_queue(struct tipc_sock *tsock) |
b97bf3fd | 111 | { |
c4307285 | 112 | sock_lock(tsock); |
b97bf3fd | 113 | buf_discard(skb_dequeue(&tsock->sk.sk_receive_queue)); |
c4307285 | 114 | sock_unlock(tsock); |
b97bf3fd PL |
115 | atomic_dec(&tipc_queue_size); |
116 | } | |
117 | ||
118 | /** | |
119 | * tipc_create - create a TIPC socket | |
120 | * @sock: pre-allocated socket structure | |
121 | * @protocol: protocol indicator (must be 0) | |
c4307285 | 122 | * |
b97bf3fd PL |
123 | * This routine creates and attaches a 'struct sock' to the 'struct socket', |
124 | * then create and attaches a TIPC port to the 'struct sock' part. | |
125 | * | |
126 | * Returns 0 on success, errno otherwise | |
127 | */ | |
1b8d7ae4 | 128 | static int tipc_create(struct net *net, struct socket *sock, int protocol) |
b97bf3fd PL |
129 | { |
130 | struct tipc_sock *tsock; | |
131 | struct tipc_port *port; | |
132 | struct sock *sk; | |
c4307285 | 133 | u32 ref; |
b97bf3fd | 134 | |
1b8d7ae4 EB |
135 | if (net != &init_net) |
136 | return -EAFNOSUPPORT; | |
137 | ||
b97bf3fd PL |
138 | if (unlikely(protocol != 0)) |
139 | return -EPROTONOSUPPORT; | |
140 | ||
1fc54d8f | 141 | ref = tipc_createport_raw(NULL, &dispatch, &wakeupdispatch, TIPC_LOW_IMPORTANCE); |
b97bf3fd PL |
142 | if (unlikely(!ref)) |
143 | return -ENOMEM; | |
144 | ||
145 | sock->state = SS_UNCONNECTED; | |
146 | ||
147 | switch (sock->type) { | |
148 | case SOCK_STREAM: | |
149 | sock->ops = &stream_ops; | |
150 | break; | |
151 | case SOCK_SEQPACKET: | |
152 | sock->ops = &packet_ops; | |
153 | break; | |
154 | case SOCK_DGRAM: | |
155 | tipc_set_portunreliable(ref, 1); | |
156 | /* fall through */ | |
157 | case SOCK_RDM: | |
158 | tipc_set_portunreturnable(ref, 1); | |
159 | sock->ops = &msg_ops; | |
160 | sock->state = SS_READY; | |
161 | break; | |
49978651 AS |
162 | default: |
163 | tipc_deleteport(ref); | |
164 | return -EPROTOTYPE; | |
b97bf3fd PL |
165 | } |
166 | ||
6257ff21 | 167 | sk = sk_alloc(net, AF_TIPC, GFP_KERNEL, &tipc_proto); |
b97bf3fd PL |
168 | if (!sk) { |
169 | tipc_deleteport(ref); | |
170 | return -ENOMEM; | |
171 | } | |
172 | ||
173 | sock_init_data(sock, sk); | |
3654ea02 | 174 | sk->sk_rcvtimeo = msecs_to_jiffies(CONN_TIMEOUT_DEFAULT); |
b97bf3fd PL |
175 | |
176 | tsock = tipc_sk(sk); | |
177 | port = tipc_get_port(ref); | |
178 | ||
179 | tsock->p = port; | |
180 | port->usr_handle = tsock; | |
181 | ||
26bad2c0 | 182 | mutex_init(&tsock->lock); |
b97bf3fd PL |
183 | |
184 | dbg("sock_create: %x\n",tsock); | |
185 | ||
186 | atomic_inc(&tipc_user_count); | |
187 | ||
188 | return 0; | |
189 | } | |
190 | ||
191 | /** | |
192 | * release - destroy a TIPC socket | |
193 | * @sock: socket to destroy | |
194 | * | |
195 | * This routine cleans up any messages that are still queued on the socket. | |
196 | * For DGRAM and RDM socket types, all queued messages are rejected. | |
197 | * For SEQPACKET and STREAM socket types, the first message is rejected | |
198 | * and any others are discarded. (If the first message on a STREAM socket | |
199 | * is partially-read, it is discarded and the next one is rejected instead.) | |
c4307285 | 200 | * |
b97bf3fd PL |
201 | * NOTE: Rejected messages are not necessarily returned to the sender! They |
202 | * are returned or discarded according to the "destination droppable" setting | |
203 | * specified for the message by the sender. | |
204 | * | |
205 | * Returns 0 on success, errno otherwise | |
206 | */ | |
207 | ||
208 | static int release(struct socket *sock) | |
209 | { | |
210 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
211 | struct sock *sk = sock->sk; | |
212 | int res = TIPC_OK; | |
213 | struct sk_buff *buf; | |
214 | ||
c4307285 | 215 | dbg("sock_delete: %x\n",tsock); |
b97bf3fd PL |
216 | if (!tsock) |
217 | return 0; | |
26bad2c0 | 218 | mutex_lock(&tsock->lock); |
b97bf3fd | 219 | if (!sock->sk) { |
26bad2c0 | 220 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
221 | return 0; |
222 | } | |
c4307285 | 223 | |
b97bf3fd PL |
224 | /* Reject unreceived messages, unless no longer connected */ |
225 | ||
226 | while (sock->state != SS_DISCONNECTING) { | |
227 | sock_lock(tsock); | |
228 | buf = skb_dequeue(&sk->sk_receive_queue); | |
229 | if (!buf) | |
1fc54d8f | 230 | tsock->p->usr_handle = NULL; |
b97bf3fd PL |
231 | sock_unlock(tsock); |
232 | if (!buf) | |
233 | break; | |
234 | if (TIPC_SKB_CB(buf)->handle != msg_data(buf_msg(buf))) | |
235 | buf_discard(buf); | |
236 | else | |
237 | tipc_reject_msg(buf, TIPC_ERR_NO_PORT); | |
238 | atomic_dec(&tipc_queue_size); | |
239 | } | |
240 | ||
241 | /* Delete TIPC port */ | |
242 | ||
243 | res = tipc_deleteport(tsock->p->ref); | |
244 | sock->sk = NULL; | |
245 | ||
246 | /* Discard any remaining messages */ | |
247 | ||
248 | while ((buf = skb_dequeue(&sk->sk_receive_queue))) { | |
249 | buf_discard(buf); | |
250 | atomic_dec(&tipc_queue_size); | |
251 | } | |
252 | ||
26bad2c0 | 253 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
254 | |
255 | sock_put(sk); | |
256 | ||
c4307285 | 257 | atomic_dec(&tipc_user_count); |
b97bf3fd PL |
258 | return res; |
259 | } | |
260 | ||
261 | /** | |
262 | * bind - associate or disassocate TIPC name(s) with a socket | |
263 | * @sock: socket structure | |
264 | * @uaddr: socket address describing name(s) and desired operation | |
265 | * @uaddr_len: size of socket address data structure | |
c4307285 | 266 | * |
b97bf3fd PL |
267 | * Name and name sequence binding is indicated using a positive scope value; |
268 | * a negative scope value unbinds the specified name. Specifying no name | |
269 | * (i.e. a socket address length of 0) unbinds all names from the socket. | |
c4307285 | 270 | * |
b97bf3fd PL |
271 | * Returns 0 on success, errno otherwise |
272 | */ | |
273 | ||
274 | static int bind(struct socket *sock, struct sockaddr *uaddr, int uaddr_len) | |
275 | { | |
276 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
277 | struct sockaddr_tipc *addr = (struct sockaddr_tipc *)uaddr; | |
278 | int res; | |
279 | ||
26bad2c0 | 280 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd | 281 | return -ERESTARTSYS; |
c4307285 | 282 | |
b97bf3fd | 283 | if (unlikely(!uaddr_len)) { |
1fc54d8f | 284 | res = tipc_withdraw(tsock->p->ref, 0, NULL); |
b97bf3fd PL |
285 | goto exit; |
286 | } | |
287 | ||
288 | if (uaddr_len < sizeof(struct sockaddr_tipc)) { | |
289 | res = -EINVAL; | |
290 | goto exit; | |
291 | } | |
292 | ||
293 | if (addr->family != AF_TIPC) { | |
294 | res = -EAFNOSUPPORT; | |
295 | goto exit; | |
296 | } | |
297 | if (addr->addrtype == TIPC_ADDR_NAME) | |
298 | addr->addr.nameseq.upper = addr->addr.nameseq.lower; | |
299 | else if (addr->addrtype != TIPC_ADDR_NAMESEQ) { | |
300 | res = -EAFNOSUPPORT; | |
301 | goto exit; | |
302 | } | |
c4307285 YH |
303 | |
304 | if (addr->scope > 0) | |
b97bf3fd PL |
305 | res = tipc_publish(tsock->p->ref, addr->scope, |
306 | &addr->addr.nameseq); | |
307 | else | |
308 | res = tipc_withdraw(tsock->p->ref, -addr->scope, | |
309 | &addr->addr.nameseq); | |
310 | exit: | |
26bad2c0 | 311 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
312 | return res; |
313 | } | |
314 | ||
c4307285 | 315 | /** |
b97bf3fd PL |
316 | * get_name - get port ID of socket or peer socket |
317 | * @sock: socket structure | |
318 | * @uaddr: area for returned socket address | |
319 | * @uaddr_len: area for returned length of socket address | |
320 | * @peer: 0 to obtain socket name, 1 to obtain peer socket name | |
c4307285 | 321 | * |
b97bf3fd PL |
322 | * Returns 0 on success, errno otherwise |
323 | */ | |
324 | ||
c4307285 | 325 | static int get_name(struct socket *sock, struct sockaddr *uaddr, |
b97bf3fd PL |
326 | int *uaddr_len, int peer) |
327 | { | |
328 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
329 | struct sockaddr_tipc *addr = (struct sockaddr_tipc *)uaddr; | |
330 | u32 res; | |
331 | ||
26bad2c0 | 332 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd PL |
333 | return -ERESTARTSYS; |
334 | ||
335 | *uaddr_len = sizeof(*addr); | |
336 | addr->addrtype = TIPC_ADDR_ID; | |
337 | addr->family = AF_TIPC; | |
338 | addr->scope = 0; | |
339 | if (peer) | |
340 | res = tipc_peer(tsock->p->ref, &addr->addr.id); | |
341 | else | |
342 | res = tipc_ownidentity(tsock->p->ref, &addr->addr.id); | |
343 | addr->addr.name.domain = 0; | |
344 | ||
26bad2c0 | 345 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
346 | return res; |
347 | } | |
348 | ||
349 | /** | |
350 | * poll - read and possibly block on pollmask | |
351 | * @file: file structure associated with the socket | |
352 | * @sock: socket for which to calculate the poll bits | |
353 | * @wait: ??? | |
354 | * | |
9b674e82 AS |
355 | * Returns pollmask value |
356 | * | |
357 | * COMMENTARY: | |
358 | * It appears that the usual socket locking mechanisms are not useful here | |
359 | * since the pollmask info is potentially out-of-date the moment this routine | |
360 | * exits. TCP and other protocols seem to rely on higher level poll routines | |
361 | * to handle any preventable race conditions, so TIPC will do the same ... | |
362 | * | |
363 | * TIPC sets the returned events as follows: | |
364 | * a) POLLRDNORM and POLLIN are set if the socket's receive queue is non-empty | |
365 | * or if a connection-oriented socket is does not have an active connection | |
366 | * (i.e. a read operation will not block). | |
367 | * b) POLLOUT is set except when a socket's connection has been terminated | |
368 | * (i.e. a write operation will not block). | |
369 | * c) POLLHUP is set when a socket's connection has been terminated. | |
370 | * | |
371 | * IMPORTANT: The fact that a read or write operation will not block does NOT | |
372 | * imply that the operation will succeed! | |
b97bf3fd PL |
373 | */ |
374 | ||
c4307285 | 375 | static unsigned int poll(struct file *file, struct socket *sock, |
b97bf3fd PL |
376 | poll_table *wait) |
377 | { | |
9b674e82 AS |
378 | struct sock *sk = sock->sk; |
379 | u32 mask; | |
380 | ||
381 | poll_wait(file, sk->sk_sleep, wait); | |
382 | ||
383 | if (!skb_queue_empty(&sk->sk_receive_queue) || | |
384 | (sock->state == SS_UNCONNECTED) || | |
385 | (sock->state == SS_DISCONNECTING)) | |
386 | mask = (POLLRDNORM | POLLIN); | |
387 | else | |
388 | mask = 0; | |
389 | ||
390 | if (sock->state == SS_DISCONNECTING) | |
391 | mask |= POLLHUP; | |
392 | else | |
393 | mask |= POLLOUT; | |
394 | ||
395 | return mask; | |
b97bf3fd PL |
396 | } |
397 | ||
c4307285 | 398 | /** |
b97bf3fd PL |
399 | * dest_name_check - verify user is permitted to send to specified port name |
400 | * @dest: destination address | |
401 | * @m: descriptor for message to be sent | |
c4307285 | 402 | * |
b97bf3fd PL |
403 | * Prevents restricted configuration commands from being issued by |
404 | * unauthorized users. | |
c4307285 | 405 | * |
b97bf3fd PL |
406 | * Returns 0 if permission is granted, otherwise errno |
407 | */ | |
408 | ||
05790c64 | 409 | static int dest_name_check(struct sockaddr_tipc *dest, struct msghdr *m) |
b97bf3fd PL |
410 | { |
411 | struct tipc_cfg_msg_hdr hdr; | |
412 | ||
c4307285 YH |
413 | if (likely(dest->addr.name.name.type >= TIPC_RESERVED_TYPES)) |
414 | return 0; | |
415 | if (likely(dest->addr.name.name.type == TIPC_TOP_SRV)) | |
416 | return 0; | |
b97bf3fd | 417 | |
c4307285 YH |
418 | if (likely(dest->addr.name.name.type != TIPC_CFG_SRV)) |
419 | return -EACCES; | |
b97bf3fd | 420 | |
c4307285 | 421 | if (copy_from_user(&hdr, m->msg_iov[0].iov_base, sizeof(hdr))) |
b97bf3fd | 422 | return -EFAULT; |
70cb2347 | 423 | if ((ntohs(hdr.tcm_type) & 0xC000) && (!capable(CAP_NET_ADMIN))) |
b97bf3fd | 424 | return -EACCES; |
c4307285 | 425 | |
b97bf3fd PL |
426 | return 0; |
427 | } | |
428 | ||
429 | /** | |
430 | * send_msg - send message in connectionless manner | |
431 | * @iocb: (unused) | |
432 | * @sock: socket structure | |
433 | * @m: message to send | |
e9024f0f | 434 | * @total_len: length of message |
c4307285 | 435 | * |
b97bf3fd | 436 | * Message must have an destination specified explicitly. |
c4307285 | 437 | * Used for SOCK_RDM and SOCK_DGRAM messages, |
b97bf3fd PL |
438 | * and for 'SYN' messages on SOCK_SEQPACKET and SOCK_STREAM connections. |
439 | * (Note: 'SYN+' is prohibited on SOCK_STREAM.) | |
c4307285 | 440 | * |
b97bf3fd PL |
441 | * Returns the number of bytes sent on success, or errno otherwise |
442 | */ | |
443 | ||
444 | static int send_msg(struct kiocb *iocb, struct socket *sock, | |
445 | struct msghdr *m, size_t total_len) | |
446 | { | |
447 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
c4307285 | 448 | struct sockaddr_tipc *dest = (struct sockaddr_tipc *)m->msg_name; |
b97bf3fd PL |
449 | struct sk_buff *buf; |
450 | int needs_conn; | |
451 | int res = -EINVAL; | |
452 | ||
453 | if (unlikely(!dest)) | |
454 | return -EDESTADDRREQ; | |
51f9cc1f AS |
455 | if (unlikely((m->msg_namelen < sizeof(*dest)) || |
456 | (dest->family != AF_TIPC))) | |
b97bf3fd PL |
457 | return -EINVAL; |
458 | ||
459 | needs_conn = (sock->state != SS_READY); | |
460 | if (unlikely(needs_conn)) { | |
461 | if (sock->state == SS_LISTENING) | |
462 | return -EPIPE; | |
463 | if (sock->state != SS_UNCONNECTED) | |
464 | return -EISCONN; | |
465 | if ((tsock->p->published) || | |
466 | ((sock->type == SOCK_STREAM) && (total_len != 0))) | |
467 | return -EOPNOTSUPP; | |
3388007b AS |
468 | if (dest->addrtype == TIPC_ADDR_NAME) { |
469 | tsock->p->conn_type = dest->addr.name.name.type; | |
470 | tsock->p->conn_instance = dest->addr.name.name.instance; | |
471 | } | |
b97bf3fd PL |
472 | } |
473 | ||
26bad2c0 | 474 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd PL |
475 | return -ERESTARTSYS; |
476 | ||
477 | if (needs_conn) { | |
478 | ||
479 | /* Abort any pending connection attempts (very unlikely) */ | |
480 | ||
481 | while ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) { | |
482 | tipc_reject_msg(buf, TIPC_ERR_NO_PORT); | |
483 | atomic_dec(&tipc_queue_size); | |
484 | } | |
485 | ||
486 | sock->state = SS_CONNECTING; | |
487 | } | |
488 | ||
c4307285 YH |
489 | do { |
490 | if (dest->addrtype == TIPC_ADDR_NAME) { | |
491 | if ((res = dest_name_check(dest, m))) | |
492 | goto exit; | |
493 | res = tipc_send2name(tsock->p->ref, | |
494 | &dest->addr.name.name, | |
495 | dest->addr.name.domain, | |
496 | m->msg_iovlen, | |
497 | m->msg_iov); | |
498 | } | |
499 | else if (dest->addrtype == TIPC_ADDR_ID) { | |
500 | res = tipc_send2port(tsock->p->ref, | |
501 | &dest->addr.id, | |
502 | m->msg_iovlen, | |
503 | m->msg_iov); | |
504 | } | |
505 | else if (dest->addrtype == TIPC_ADDR_MCAST) { | |
b97bf3fd PL |
506 | if (needs_conn) { |
507 | res = -EOPNOTSUPP; | |
508 | goto exit; | |
509 | } | |
c4307285 YH |
510 | if ((res = dest_name_check(dest, m))) |
511 | goto exit; | |
512 | res = tipc_multicast(tsock->p->ref, | |
513 | &dest->addr.nameseq, | |
514 | 0, | |
515 | m->msg_iovlen, | |
516 | m->msg_iov); | |
517 | } | |
518 | if (likely(res != -ELINKCONG)) { | |
519 | exit: | |
26bad2c0 | 520 | mutex_unlock(&tsock->lock); |
c4307285 YH |
521 | return res; |
522 | } | |
b97bf3fd PL |
523 | if (m->msg_flags & MSG_DONTWAIT) { |
524 | res = -EWOULDBLOCK; | |
525 | goto exit; | |
526 | } | |
c4307285 YH |
527 | if (wait_event_interruptible(*sock->sk->sk_sleep, |
528 | !tsock->p->congested)) { | |
529 | res = -ERESTARTSYS; | |
530 | goto exit; | |
531 | } | |
532 | } while (1); | |
b97bf3fd PL |
533 | } |
534 | ||
c4307285 | 535 | /** |
b97bf3fd PL |
536 | * send_packet - send a connection-oriented message |
537 | * @iocb: (unused) | |
538 | * @sock: socket structure | |
539 | * @m: message to send | |
e9024f0f | 540 | * @total_len: length of message |
c4307285 | 541 | * |
b97bf3fd | 542 | * Used for SOCK_SEQPACKET messages and SOCK_STREAM data. |
c4307285 | 543 | * |
b97bf3fd PL |
544 | * Returns the number of bytes sent on success, or errno otherwise |
545 | */ | |
546 | ||
547 | static int send_packet(struct kiocb *iocb, struct socket *sock, | |
548 | struct msghdr *m, size_t total_len) | |
549 | { | |
550 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
c4307285 | 551 | struct sockaddr_tipc *dest = (struct sockaddr_tipc *)m->msg_name; |
b97bf3fd PL |
552 | int res; |
553 | ||
554 | /* Handle implied connection establishment */ | |
555 | ||
556 | if (unlikely(dest)) | |
557 | return send_msg(iocb, sock, m, total_len); | |
558 | ||
26bad2c0 | 559 | if (mutex_lock_interruptible(&tsock->lock)) { |
b97bf3fd | 560 | return -ERESTARTSYS; |
c4307285 | 561 | } |
b97bf3fd | 562 | |
c4307285 | 563 | do { |
bdd94789 AS |
564 | if (unlikely(sock->state != SS_CONNECTED)) { |
565 | if (sock->state == SS_DISCONNECTING) | |
c4307285 | 566 | res = -EPIPE; |
bdd94789 AS |
567 | else |
568 | res = -ENOTCONN; | |
569 | goto exit; | |
570 | } | |
571 | ||
c4307285 YH |
572 | res = tipc_send(tsock->p->ref, m->msg_iovlen, m->msg_iov); |
573 | if (likely(res != -ELINKCONG)) { | |
b97bf3fd | 574 | exit: |
26bad2c0 | 575 | mutex_unlock(&tsock->lock); |
c4307285 YH |
576 | return res; |
577 | } | |
b97bf3fd PL |
578 | if (m->msg_flags & MSG_DONTWAIT) { |
579 | res = -EWOULDBLOCK; | |
580 | goto exit; | |
581 | } | |
c4307285 YH |
582 | if (wait_event_interruptible(*sock->sk->sk_sleep, |
583 | !tsock->p->congested)) { | |
584 | res = -ERESTARTSYS; | |
585 | goto exit; | |
586 | } | |
587 | } while (1); | |
b97bf3fd PL |
588 | } |
589 | ||
c4307285 | 590 | /** |
b97bf3fd PL |
591 | * send_stream - send stream-oriented data |
592 | * @iocb: (unused) | |
593 | * @sock: socket structure | |
594 | * @m: data to send | |
595 | * @total_len: total length of data to be sent | |
c4307285 | 596 | * |
b97bf3fd | 597 | * Used for SOCK_STREAM data. |
c4307285 YH |
598 | * |
599 | * Returns the number of bytes sent on success (or partial success), | |
1303e8f1 | 600 | * or errno if no data sent |
b97bf3fd PL |
601 | */ |
602 | ||
603 | ||
604 | static int send_stream(struct kiocb *iocb, struct socket *sock, | |
605 | struct msghdr *m, size_t total_len) | |
606 | { | |
05646c91 | 607 | struct tipc_port *tport; |
b97bf3fd PL |
608 | struct msghdr my_msg; |
609 | struct iovec my_iov; | |
610 | struct iovec *curr_iov; | |
611 | int curr_iovlen; | |
612 | char __user *curr_start; | |
05646c91 | 613 | u32 hdr_size; |
b97bf3fd PL |
614 | int curr_left; |
615 | int bytes_to_send; | |
1303e8f1 | 616 | int bytes_sent; |
b97bf3fd | 617 | int res; |
c4307285 | 618 | |
05646c91 | 619 | /* Handle special cases where there is no connection */ |
b97bf3fd | 620 | |
c4307285 | 621 | if (unlikely(sock->state != SS_CONNECTED)) { |
05646c91 AS |
622 | if (sock->state == SS_UNCONNECTED) |
623 | return send_packet(iocb, sock, m, total_len); | |
624 | else if (sock->state == SS_DISCONNECTING) | |
c4307285 YH |
625 | return -EPIPE; |
626 | else | |
627 | return -ENOTCONN; | |
628 | } | |
b97bf3fd | 629 | |
eb5959c2 AS |
630 | if (unlikely(m->msg_name)) |
631 | return -EISCONN; | |
632 | ||
c4307285 | 633 | /* |
b97bf3fd PL |
634 | * Send each iovec entry using one or more messages |
635 | * | |
c4307285 | 636 | * Note: This algorithm is good for the most likely case |
b97bf3fd PL |
637 | * (i.e. one large iovec entry), but could be improved to pass sets |
638 | * of small iovec entries into send_packet(). | |
639 | */ | |
640 | ||
1303e8f1 AS |
641 | curr_iov = m->msg_iov; |
642 | curr_iovlen = m->msg_iovlen; | |
b97bf3fd PL |
643 | my_msg.msg_iov = &my_iov; |
644 | my_msg.msg_iovlen = 1; | |
eb5959c2 AS |
645 | my_msg.msg_flags = m->msg_flags; |
646 | my_msg.msg_name = NULL; | |
1303e8f1 | 647 | bytes_sent = 0; |
b97bf3fd | 648 | |
05646c91 AS |
649 | tport = tipc_sk(sock->sk)->p; |
650 | hdr_size = msg_hdr_sz(&tport->phdr); | |
651 | ||
b97bf3fd PL |
652 | while (curr_iovlen--) { |
653 | curr_start = curr_iov->iov_base; | |
654 | curr_left = curr_iov->iov_len; | |
655 | ||
656 | while (curr_left) { | |
05646c91 AS |
657 | bytes_to_send = tport->max_pkt - hdr_size; |
658 | if (bytes_to_send > TIPC_MAX_USER_MSG_SIZE) | |
659 | bytes_to_send = TIPC_MAX_USER_MSG_SIZE; | |
660 | if (curr_left < bytes_to_send) | |
661 | bytes_to_send = curr_left; | |
b97bf3fd PL |
662 | my_iov.iov_base = curr_start; |
663 | my_iov.iov_len = bytes_to_send; | |
c4307285 | 664 | if ((res = send_packet(iocb, sock, &my_msg, 0)) < 0) { |
05646c91 AS |
665 | if (bytes_sent != 0) |
666 | res = bytes_sent; | |
667 | return res; | |
1303e8f1 | 668 | } |
b97bf3fd PL |
669 | curr_left -= bytes_to_send; |
670 | curr_start += bytes_to_send; | |
1303e8f1 | 671 | bytes_sent += bytes_to_send; |
b97bf3fd PL |
672 | } |
673 | ||
674 | curr_iov++; | |
675 | } | |
676 | ||
1303e8f1 | 677 | return bytes_sent; |
b97bf3fd PL |
678 | } |
679 | ||
680 | /** | |
681 | * auto_connect - complete connection setup to a remote port | |
682 | * @sock: socket structure | |
683 | * @tsock: TIPC-specific socket structure | |
684 | * @msg: peer's response message | |
c4307285 | 685 | * |
b97bf3fd PL |
686 | * Returns 0 on success, errno otherwise |
687 | */ | |
688 | ||
c4307285 | 689 | static int auto_connect(struct socket *sock, struct tipc_sock *tsock, |
b97bf3fd PL |
690 | struct tipc_msg *msg) |
691 | { | |
692 | struct tipc_portid peer; | |
693 | ||
694 | if (msg_errcode(msg)) { | |
695 | sock->state = SS_DISCONNECTING; | |
696 | return -ECONNREFUSED; | |
697 | } | |
698 | ||
699 | peer.ref = msg_origport(msg); | |
700 | peer.node = msg_orignode(msg); | |
701 | tipc_connect2port(tsock->p->ref, &peer); | |
702 | tipc_set_portimportance(tsock->p->ref, msg_importance(msg)); | |
703 | sock->state = SS_CONNECTED; | |
704 | return 0; | |
705 | } | |
706 | ||
707 | /** | |
708 | * set_orig_addr - capture sender's address for received message | |
709 | * @m: descriptor for message info | |
710 | * @msg: received message header | |
c4307285 | 711 | * |
b97bf3fd PL |
712 | * Note: Address is not captured if not requested by receiver. |
713 | */ | |
714 | ||
05790c64 | 715 | static void set_orig_addr(struct msghdr *m, struct tipc_msg *msg) |
b97bf3fd | 716 | { |
c4307285 | 717 | struct sockaddr_tipc *addr = (struct sockaddr_tipc *)m->msg_name; |
b97bf3fd | 718 | |
c4307285 | 719 | if (addr) { |
b97bf3fd PL |
720 | addr->family = AF_TIPC; |
721 | addr->addrtype = TIPC_ADDR_ID; | |
722 | addr->addr.id.ref = msg_origport(msg); | |
723 | addr->addr.id.node = msg_orignode(msg); | |
724 | addr->addr.name.domain = 0; /* could leave uninitialized */ | |
725 | addr->scope = 0; /* could leave uninitialized */ | |
726 | m->msg_namelen = sizeof(struct sockaddr_tipc); | |
727 | } | |
728 | } | |
729 | ||
730 | /** | |
c4307285 | 731 | * anc_data_recv - optionally capture ancillary data for received message |
b97bf3fd PL |
732 | * @m: descriptor for message info |
733 | * @msg: received message header | |
734 | * @tport: TIPC port associated with message | |
c4307285 | 735 | * |
b97bf3fd | 736 | * Note: Ancillary data is not captured if not requested by receiver. |
c4307285 | 737 | * |
b97bf3fd PL |
738 | * Returns 0 if successful, otherwise errno |
739 | */ | |
740 | ||
05790c64 | 741 | static int anc_data_recv(struct msghdr *m, struct tipc_msg *msg, |
b97bf3fd PL |
742 | struct tipc_port *tport) |
743 | { | |
744 | u32 anc_data[3]; | |
745 | u32 err; | |
746 | u32 dest_type; | |
3546c750 | 747 | int has_name; |
b97bf3fd PL |
748 | int res; |
749 | ||
750 | if (likely(m->msg_controllen == 0)) | |
751 | return 0; | |
752 | ||
753 | /* Optionally capture errored message object(s) */ | |
754 | ||
755 | err = msg ? msg_errcode(msg) : 0; | |
756 | if (unlikely(err)) { | |
757 | anc_data[0] = err; | |
758 | anc_data[1] = msg_data_sz(msg); | |
4b087b28 | 759 | if ((res = put_cmsg(m, SOL_TIPC, TIPC_ERRINFO, 8, anc_data))) |
b97bf3fd PL |
760 | return res; |
761 | if (anc_data[1] && | |
c4307285 | 762 | (res = put_cmsg(m, SOL_TIPC, TIPC_RETDATA, anc_data[1], |
b97bf3fd PL |
763 | msg_data(msg)))) |
764 | return res; | |
765 | } | |
766 | ||
767 | /* Optionally capture message destination object */ | |
768 | ||
769 | dest_type = msg ? msg_type(msg) : TIPC_DIRECT_MSG; | |
770 | switch (dest_type) { | |
771 | case TIPC_NAMED_MSG: | |
3546c750 | 772 | has_name = 1; |
b97bf3fd PL |
773 | anc_data[0] = msg_nametype(msg); |
774 | anc_data[1] = msg_namelower(msg); | |
775 | anc_data[2] = msg_namelower(msg); | |
776 | break; | |
777 | case TIPC_MCAST_MSG: | |
3546c750 | 778 | has_name = 1; |
b97bf3fd PL |
779 | anc_data[0] = msg_nametype(msg); |
780 | anc_data[1] = msg_namelower(msg); | |
781 | anc_data[2] = msg_nameupper(msg); | |
782 | break; | |
783 | case TIPC_CONN_MSG: | |
3546c750 | 784 | has_name = (tport->conn_type != 0); |
b97bf3fd PL |
785 | anc_data[0] = tport->conn_type; |
786 | anc_data[1] = tport->conn_instance; | |
787 | anc_data[2] = tport->conn_instance; | |
788 | break; | |
789 | default: | |
3546c750 | 790 | has_name = 0; |
b97bf3fd | 791 | } |
3546c750 | 792 | if (has_name && |
4b087b28 | 793 | (res = put_cmsg(m, SOL_TIPC, TIPC_DESTNAME, 12, anc_data))) |
b97bf3fd PL |
794 | return res; |
795 | ||
796 | return 0; | |
797 | } | |
798 | ||
c4307285 | 799 | /** |
b97bf3fd PL |
800 | * recv_msg - receive packet-oriented message |
801 | * @iocb: (unused) | |
802 | * @m: descriptor for message info | |
803 | * @buf_len: total size of user buffer area | |
804 | * @flags: receive flags | |
c4307285 | 805 | * |
b97bf3fd PL |
806 | * Used for SOCK_DGRAM, SOCK_RDM, and SOCK_SEQPACKET messages. |
807 | * If the complete message doesn't fit in user area, truncate it. | |
808 | * | |
809 | * Returns size of returned message data, errno otherwise | |
810 | */ | |
811 | ||
812 | static int recv_msg(struct kiocb *iocb, struct socket *sock, | |
813 | struct msghdr *m, size_t buf_len, int flags) | |
814 | { | |
815 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
816 | struct sk_buff *buf; | |
817 | struct tipc_msg *msg; | |
818 | unsigned int q_len; | |
819 | unsigned int sz; | |
820 | u32 err; | |
821 | int res; | |
822 | ||
823 | /* Currently doesn't support receiving into multiple iovec entries */ | |
824 | ||
825 | if (m->msg_iovlen != 1) | |
826 | return -EOPNOTSUPP; | |
827 | ||
828 | /* Catch invalid receive attempts */ | |
829 | ||
830 | if (unlikely(!buf_len)) | |
831 | return -EINVAL; | |
832 | ||
833 | if (sock->type == SOCK_SEQPACKET) { | |
834 | if (unlikely(sock->state == SS_UNCONNECTED)) | |
835 | return -ENOTCONN; | |
c4307285 | 836 | if (unlikely((sock->state == SS_DISCONNECTING) && |
b97bf3fd | 837 | (skb_queue_len(&sock->sk->sk_receive_queue) == 0))) |
c4307285 | 838 | return -ENOTCONN; |
b97bf3fd PL |
839 | } |
840 | ||
841 | /* Look for a message in receive queue; wait if necessary */ | |
842 | ||
26bad2c0 | 843 | if (unlikely(mutex_lock_interruptible(&tsock->lock))) |
b97bf3fd PL |
844 | return -ERESTARTSYS; |
845 | ||
846 | restart: | |
847 | if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) && | |
848 | (flags & MSG_DONTWAIT))) { | |
849 | res = -EWOULDBLOCK; | |
850 | goto exit; | |
851 | } | |
852 | ||
853 | if ((res = wait_event_interruptible( | |
c4307285 | 854 | *sock->sk->sk_sleep, |
b97bf3fd PL |
855 | ((q_len = skb_queue_len(&sock->sk->sk_receive_queue)) || |
856 | (sock->state == SS_DISCONNECTING))) )) { | |
857 | goto exit; | |
858 | } | |
859 | ||
860 | /* Catch attempt to receive on an already terminated connection */ | |
861 | /* [THIS CHECK MAY OVERLAP WITH AN EARLIER CHECK] */ | |
862 | ||
863 | if (!q_len) { | |
864 | res = -ENOTCONN; | |
865 | goto exit; | |
866 | } | |
867 | ||
868 | /* Get access to first message in receive queue */ | |
869 | ||
870 | buf = skb_peek(&sock->sk->sk_receive_queue); | |
871 | msg = buf_msg(buf); | |
872 | sz = msg_data_sz(msg); | |
873 | err = msg_errcode(msg); | |
874 | ||
875 | /* Complete connection setup for an implied connect */ | |
876 | ||
877 | if (unlikely(sock->state == SS_CONNECTING)) { | |
878 | if ((res = auto_connect(sock, tsock, msg))) | |
879 | goto exit; | |
880 | } | |
881 | ||
882 | /* Discard an empty non-errored message & try again */ | |
883 | ||
884 | if ((!sz) && (!err)) { | |
885 | advance_queue(tsock); | |
886 | goto restart; | |
887 | } | |
888 | ||
889 | /* Capture sender's address (optional) */ | |
890 | ||
891 | set_orig_addr(m, msg); | |
892 | ||
893 | /* Capture ancillary data (optional) */ | |
894 | ||
895 | if ((res = anc_data_recv(m, msg, tsock->p))) | |
896 | goto exit; | |
897 | ||
898 | /* Capture message data (if valid) & compute return value (always) */ | |
c4307285 | 899 | |
b97bf3fd PL |
900 | if (!err) { |
901 | if (unlikely(buf_len < sz)) { | |
902 | sz = buf_len; | |
903 | m->msg_flags |= MSG_TRUNC; | |
904 | } | |
905 | if (unlikely(copy_to_user(m->msg_iov->iov_base, msg_data(msg), | |
906 | sz))) { | |
907 | res = -EFAULT; | |
908 | goto exit; | |
909 | } | |
910 | res = sz; | |
911 | } else { | |
912 | if ((sock->state == SS_READY) || | |
913 | ((err == TIPC_CONN_SHUTDOWN) || m->msg_control)) | |
914 | res = 0; | |
915 | else | |
916 | res = -ECONNRESET; | |
917 | } | |
918 | ||
919 | /* Consume received message (optional) */ | |
920 | ||
921 | if (likely(!(flags & MSG_PEEK))) { | |
c4307285 YH |
922 | if (unlikely(++tsock->p->conn_unacked >= TIPC_FLOW_CONTROL_WIN)) |
923 | tipc_acknowledge(tsock->p->ref, tsock->p->conn_unacked); | |
b97bf3fd | 924 | advance_queue(tsock); |
c4307285 | 925 | } |
b97bf3fd | 926 | exit: |
26bad2c0 | 927 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
928 | return res; |
929 | } | |
930 | ||
c4307285 | 931 | /** |
b97bf3fd PL |
932 | * recv_stream - receive stream-oriented data |
933 | * @iocb: (unused) | |
934 | * @m: descriptor for message info | |
935 | * @buf_len: total size of user buffer area | |
936 | * @flags: receive flags | |
c4307285 YH |
937 | * |
938 | * Used for SOCK_STREAM messages only. If not enough data is available | |
b97bf3fd PL |
939 | * will optionally wait for more; never truncates data. |
940 | * | |
941 | * Returns size of returned message data, errno otherwise | |
942 | */ | |
943 | ||
944 | static int recv_stream(struct kiocb *iocb, struct socket *sock, | |
945 | struct msghdr *m, size_t buf_len, int flags) | |
946 | { | |
947 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
948 | struct sk_buff *buf; | |
949 | struct tipc_msg *msg; | |
950 | unsigned int q_len; | |
951 | unsigned int sz; | |
952 | int sz_to_copy; | |
953 | int sz_copied = 0; | |
954 | int needed; | |
28c4dadd | 955 | char __user *crs = m->msg_iov->iov_base; |
b97bf3fd PL |
956 | unsigned char *buf_crs; |
957 | u32 err; | |
958 | int res; | |
959 | ||
960 | /* Currently doesn't support receiving into multiple iovec entries */ | |
961 | ||
962 | if (m->msg_iovlen != 1) | |
963 | return -EOPNOTSUPP; | |
964 | ||
965 | /* Catch invalid receive attempts */ | |
966 | ||
967 | if (unlikely(!buf_len)) | |
968 | return -EINVAL; | |
969 | ||
970 | if (unlikely(sock->state == SS_DISCONNECTING)) { | |
971 | if (skb_queue_len(&sock->sk->sk_receive_queue) == 0) | |
972 | return -ENOTCONN; | |
973 | } else if (unlikely(sock->state != SS_CONNECTED)) | |
974 | return -ENOTCONN; | |
975 | ||
976 | /* Look for a message in receive queue; wait if necessary */ | |
977 | ||
26bad2c0 | 978 | if (unlikely(mutex_lock_interruptible(&tsock->lock))) |
b97bf3fd PL |
979 | return -ERESTARTSYS; |
980 | ||
981 | restart: | |
982 | if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) && | |
983 | (flags & MSG_DONTWAIT))) { | |
a3b0a5a9 | 984 | res = -EWOULDBLOCK; |
b97bf3fd PL |
985 | goto exit; |
986 | } | |
987 | ||
988 | if ((res = wait_event_interruptible( | |
c4307285 | 989 | *sock->sk->sk_sleep, |
b97bf3fd PL |
990 | ((q_len = skb_queue_len(&sock->sk->sk_receive_queue)) || |
991 | (sock->state == SS_DISCONNECTING))) )) { | |
992 | goto exit; | |
993 | } | |
994 | ||
995 | /* Catch attempt to receive on an already terminated connection */ | |
996 | /* [THIS CHECK MAY OVERLAP WITH AN EARLIER CHECK] */ | |
997 | ||
998 | if (!q_len) { | |
999 | res = -ENOTCONN; | |
1000 | goto exit; | |
1001 | } | |
1002 | ||
1003 | /* Get access to first message in receive queue */ | |
1004 | ||
1005 | buf = skb_peek(&sock->sk->sk_receive_queue); | |
1006 | msg = buf_msg(buf); | |
1007 | sz = msg_data_sz(msg); | |
1008 | err = msg_errcode(msg); | |
1009 | ||
1010 | /* Discard an empty non-errored message & try again */ | |
1011 | ||
1012 | if ((!sz) && (!err)) { | |
1013 | advance_queue(tsock); | |
1014 | goto restart; | |
1015 | } | |
1016 | ||
1017 | /* Optionally capture sender's address & ancillary data of first msg */ | |
1018 | ||
1019 | if (sz_copied == 0) { | |
1020 | set_orig_addr(m, msg); | |
1021 | if ((res = anc_data_recv(m, msg, tsock->p))) | |
1022 | goto exit; | |
1023 | } | |
1024 | ||
1025 | /* Capture message data (if valid) & compute return value (always) */ | |
c4307285 | 1026 | |
b97bf3fd PL |
1027 | if (!err) { |
1028 | buf_crs = (unsigned char *)(TIPC_SKB_CB(buf)->handle); | |
27a884dc | 1029 | sz = skb_tail_pointer(buf) - buf_crs; |
b97bf3fd PL |
1030 | |
1031 | needed = (buf_len - sz_copied); | |
1032 | sz_to_copy = (sz <= needed) ? sz : needed; | |
1033 | if (unlikely(copy_to_user(crs, buf_crs, sz_to_copy))) { | |
1034 | res = -EFAULT; | |
1035 | goto exit; | |
1036 | } | |
1037 | sz_copied += sz_to_copy; | |
1038 | ||
1039 | if (sz_to_copy < sz) { | |
1040 | if (!(flags & MSG_PEEK)) | |
1041 | TIPC_SKB_CB(buf)->handle = buf_crs + sz_to_copy; | |
1042 | goto exit; | |
1043 | } | |
1044 | ||
1045 | crs += sz_to_copy; | |
1046 | } else { | |
1047 | if (sz_copied != 0) | |
1048 | goto exit; /* can't add error msg to valid data */ | |
1049 | ||
1050 | if ((err == TIPC_CONN_SHUTDOWN) || m->msg_control) | |
1051 | res = 0; | |
1052 | else | |
1053 | res = -ECONNRESET; | |
1054 | } | |
1055 | ||
1056 | /* Consume received message (optional) */ | |
1057 | ||
1058 | if (likely(!(flags & MSG_PEEK))) { | |
c4307285 YH |
1059 | if (unlikely(++tsock->p->conn_unacked >= TIPC_FLOW_CONTROL_WIN)) |
1060 | tipc_acknowledge(tsock->p->ref, tsock->p->conn_unacked); | |
b97bf3fd | 1061 | advance_queue(tsock); |
c4307285 | 1062 | } |
b97bf3fd PL |
1063 | |
1064 | /* Loop around if more data is required */ | |
1065 | ||
c4307285 | 1066 | if ((sz_copied < buf_len) /* didn't get all requested data */ |
b97bf3fd PL |
1067 | && (flags & MSG_WAITALL) /* ... and need to wait for more */ |
1068 | && (!(flags & MSG_PEEK)) /* ... and aren't just peeking at data */ | |
1069 | && (!err) /* ... and haven't reached a FIN */ | |
1070 | ) | |
1071 | goto restart; | |
1072 | ||
1073 | exit: | |
26bad2c0 | 1074 | mutex_unlock(&tsock->lock); |
a3b0a5a9 | 1075 | return sz_copied ? sz_copied : res; |
b97bf3fd PL |
1076 | } |
1077 | ||
1078 | /** | |
1079 | * queue_overloaded - test if queue overload condition exists | |
1080 | * @queue_size: current size of queue | |
1081 | * @base: nominal maximum size of queue | |
1082 | * @msg: message to be added to queue | |
c4307285 | 1083 | * |
b97bf3fd PL |
1084 | * Returns 1 if queue is currently overloaded, 0 otherwise |
1085 | */ | |
1086 | ||
1087 | static int queue_overloaded(u32 queue_size, u32 base, struct tipc_msg *msg) | |
1088 | { | |
1089 | u32 threshold; | |
1090 | u32 imp = msg_importance(msg); | |
1091 | ||
1092 | if (imp == TIPC_LOW_IMPORTANCE) | |
1093 | threshold = base; | |
1094 | else if (imp == TIPC_MEDIUM_IMPORTANCE) | |
1095 | threshold = base * 2; | |
1096 | else if (imp == TIPC_HIGH_IMPORTANCE) | |
1097 | threshold = base * 100; | |
1098 | else | |
1099 | return 0; | |
1100 | ||
1101 | if (msg_connected(msg)) | |
1102 | threshold *= 4; | |
1103 | ||
1104 | return (queue_size > threshold); | |
1105 | } | |
1106 | ||
c4307285 | 1107 | /** |
b97bf3fd PL |
1108 | * async_disconnect - wrapper function used to disconnect port |
1109 | * @portref: TIPC port reference (passed as pointer-sized value) | |
1110 | */ | |
1111 | ||
1112 | static void async_disconnect(unsigned long portref) | |
1113 | { | |
1114 | tipc_disconnect((u32)portref); | |
1115 | } | |
1116 | ||
c4307285 | 1117 | /** |
b97bf3fd PL |
1118 | * dispatch - handle arriving message |
1119 | * @tport: TIPC port that received message | |
1120 | * @buf: message | |
c4307285 | 1121 | * |
b97bf3fd | 1122 | * Called with port locked. Must not take socket lock to avoid deadlock risk. |
c4307285 | 1123 | * |
b97bf3fd PL |
1124 | * Returns TIPC error status code (TIPC_OK if message is not to be rejected) |
1125 | */ | |
1126 | ||
1127 | static u32 dispatch(struct tipc_port *tport, struct sk_buff *buf) | |
1128 | { | |
1129 | struct tipc_msg *msg = buf_msg(buf); | |
1130 | struct tipc_sock *tsock = (struct tipc_sock *)tport->usr_handle; | |
1131 | struct socket *sock; | |
1132 | u32 recv_q_len; | |
1133 | ||
1134 | /* Reject message if socket is closing */ | |
1135 | ||
1136 | if (!tsock) | |
1137 | return TIPC_ERR_NO_PORT; | |
1138 | ||
1139 | /* Reject message if it is wrong sort of message for socket */ | |
1140 | ||
1141 | /* | |
1142 | * WOULD IT BE BETTER TO JUST DISCARD THESE MESSAGES INSTEAD? | |
1143 | * "NO PORT" ISN'T REALLY THE RIGHT ERROR CODE, AND THERE MAY | |
1144 | * BE SECURITY IMPLICATIONS INHERENT IN REJECTING INVALID TRAFFIC | |
1145 | */ | |
1146 | sock = tsock->sk.sk_socket; | |
1147 | if (sock->state == SS_READY) { | |
1148 | if (msg_connected(msg)) { | |
1149 | msg_dbg(msg, "dispatch filter 1\n"); | |
1150 | return TIPC_ERR_NO_PORT; | |
1151 | } | |
1152 | } else { | |
1153 | if (msg_mcast(msg)) { | |
1154 | msg_dbg(msg, "dispatch filter 2\n"); | |
1155 | return TIPC_ERR_NO_PORT; | |
1156 | } | |
1157 | if (sock->state == SS_CONNECTED) { | |
1158 | if (!msg_connected(msg)) { | |
1159 | msg_dbg(msg, "dispatch filter 3\n"); | |
1160 | return TIPC_ERR_NO_PORT; | |
1161 | } | |
1162 | } | |
1163 | else if (sock->state == SS_CONNECTING) { | |
1164 | if (!msg_connected(msg) && (msg_errcode(msg) == 0)) { | |
1165 | msg_dbg(msg, "dispatch filter 4\n"); | |
1166 | return TIPC_ERR_NO_PORT; | |
1167 | } | |
c4307285 | 1168 | } |
b97bf3fd PL |
1169 | else if (sock->state == SS_LISTENING) { |
1170 | if (msg_connected(msg) || msg_errcode(msg)) { | |
1171 | msg_dbg(msg, "dispatch filter 5\n"); | |
1172 | return TIPC_ERR_NO_PORT; | |
1173 | } | |
c4307285 | 1174 | } |
b97bf3fd PL |
1175 | else if (sock->state == SS_DISCONNECTING) { |
1176 | msg_dbg(msg, "dispatch filter 6\n"); | |
1177 | return TIPC_ERR_NO_PORT; | |
1178 | } | |
1179 | else /* (sock->state == SS_UNCONNECTED) */ { | |
1180 | if (msg_connected(msg) || msg_errcode(msg)) { | |
1181 | msg_dbg(msg, "dispatch filter 7\n"); | |
1182 | return TIPC_ERR_NO_PORT; | |
1183 | } | |
1184 | } | |
1185 | } | |
1186 | ||
1187 | /* Reject message if there isn't room to queue it */ | |
1188 | ||
c4307285 | 1189 | if (unlikely((u32)atomic_read(&tipc_queue_size) > |
b97bf3fd | 1190 | OVERLOAD_LIMIT_BASE)) { |
c4307285 | 1191 | if (queue_overloaded(atomic_read(&tipc_queue_size), |
b97bf3fd PL |
1192 | OVERLOAD_LIMIT_BASE, msg)) |
1193 | return TIPC_ERR_OVERLOAD; | |
c4307285 | 1194 | } |
b97bf3fd PL |
1195 | recv_q_len = skb_queue_len(&tsock->sk.sk_receive_queue); |
1196 | if (unlikely(recv_q_len > (OVERLOAD_LIMIT_BASE / 2))) { | |
c4307285 YH |
1197 | if (queue_overloaded(recv_q_len, |
1198 | OVERLOAD_LIMIT_BASE / 2, msg)) | |
b97bf3fd | 1199 | return TIPC_ERR_OVERLOAD; |
c4307285 | 1200 | } |
b97bf3fd PL |
1201 | |
1202 | /* Initiate connection termination for an incoming 'FIN' */ | |
1203 | ||
1204 | if (unlikely(msg_errcode(msg) && (sock->state == SS_CONNECTED))) { | |
1205 | sock->state = SS_DISCONNECTING; | |
1206 | /* Note: Use signal since port lock is already taken! */ | |
4323add6 | 1207 | tipc_k_signal((Handler)async_disconnect, tport->ref); |
b97bf3fd PL |
1208 | } |
1209 | ||
1210 | /* Enqueue message (finally!) */ | |
1211 | ||
1212 | msg_dbg(msg,"<DISP<: "); | |
1213 | TIPC_SKB_CB(buf)->handle = msg_data(msg); | |
1214 | atomic_inc(&tipc_queue_size); | |
1215 | skb_queue_tail(&sock->sk->sk_receive_queue, buf); | |
1216 | ||
cfb0c089 AS |
1217 | if (waitqueue_active(sock->sk->sk_sleep)) |
1218 | wake_up_interruptible(sock->sk->sk_sleep); | |
b97bf3fd PL |
1219 | return TIPC_OK; |
1220 | } | |
1221 | ||
c4307285 | 1222 | /** |
b97bf3fd PL |
1223 | * wakeupdispatch - wake up port after congestion |
1224 | * @tport: port to wakeup | |
c4307285 | 1225 | * |
b97bf3fd PL |
1226 | * Called with port lock on. |
1227 | */ | |
1228 | ||
1229 | static void wakeupdispatch(struct tipc_port *tport) | |
1230 | { | |
1231 | struct tipc_sock *tsock = (struct tipc_sock *)tport->usr_handle; | |
1232 | ||
cfb0c089 AS |
1233 | if (waitqueue_active(tsock->sk.sk_sleep)) |
1234 | wake_up_interruptible(tsock->sk.sk_sleep); | |
b97bf3fd PL |
1235 | } |
1236 | ||
1237 | /** | |
1238 | * connect - establish a connection to another TIPC port | |
1239 | * @sock: socket structure | |
1240 | * @dest: socket address for destination port | |
1241 | * @destlen: size of socket address data structure | |
1242 | * @flags: (unused) | |
1243 | * | |
1244 | * Returns 0 on success, errno otherwise | |
1245 | */ | |
1246 | ||
c4307285 | 1247 | static int connect(struct socket *sock, struct sockaddr *dest, int destlen, |
b97bf3fd PL |
1248 | int flags) |
1249 | { | |
1250 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
1251 | struct sockaddr_tipc *dst = (struct sockaddr_tipc *)dest; | |
1fc54d8f | 1252 | struct msghdr m = {NULL,}; |
b97bf3fd PL |
1253 | struct sk_buff *buf; |
1254 | struct tipc_msg *msg; | |
1255 | int res; | |
1256 | ||
1257 | /* For now, TIPC does not allow use of connect() with DGRAM or RDM types */ | |
1258 | ||
1259 | if (sock->state == SS_READY) | |
1260 | return -EOPNOTSUPP; | |
1261 | ||
51f9cc1f AS |
1262 | /* Issue Posix-compliant error code if socket is in the wrong state */ |
1263 | ||
b97bf3fd PL |
1264 | if (sock->state == SS_LISTENING) |
1265 | return -EOPNOTSUPP; | |
1266 | if (sock->state == SS_CONNECTING) | |
1267 | return -EALREADY; | |
1268 | if (sock->state != SS_UNCONNECTED) | |
c4307285 | 1269 | return -EISCONN; |
b97bf3fd | 1270 | |
51f9cc1f AS |
1271 | /* |
1272 | * Reject connection attempt using multicast address | |
1273 | * | |
1274 | * Note: send_msg() validates the rest of the address fields, | |
1275 | * so there's no need to do it here | |
1276 | */ | |
1277 | ||
1278 | if (dst->addrtype == TIPC_ADDR_MCAST) | |
c4307285 | 1279 | return -EINVAL; |
b97bf3fd PL |
1280 | |
1281 | /* Send a 'SYN-' to destination */ | |
1282 | ||
1283 | m.msg_name = dest; | |
51f9cc1f | 1284 | m.msg_namelen = destlen; |
1fc54d8f | 1285 | if ((res = send_msg(NULL, sock, &m, 0)) < 0) { |
b97bf3fd PL |
1286 | sock->state = SS_DISCONNECTING; |
1287 | return res; | |
1288 | } | |
1289 | ||
26bad2c0 | 1290 | if (mutex_lock_interruptible(&tsock->lock)) |
c4307285 YH |
1291 | return -ERESTARTSYS; |
1292 | ||
b97bf3fd PL |
1293 | /* Wait for destination's 'ACK' response */ |
1294 | ||
1295 | res = wait_event_interruptible_timeout(*sock->sk->sk_sleep, | |
c4307285 | 1296 | skb_queue_len(&sock->sk->sk_receive_queue), |
b97bf3fd PL |
1297 | sock->sk->sk_rcvtimeo); |
1298 | buf = skb_peek(&sock->sk->sk_receive_queue); | |
1299 | if (res > 0) { | |
1300 | msg = buf_msg(buf); | |
c4307285 YH |
1301 | res = auto_connect(sock, tsock, msg); |
1302 | if (!res) { | |
b97bf3fd PL |
1303 | if (!msg_data_sz(msg)) |
1304 | advance_queue(tsock); | |
1305 | } | |
1306 | } else { | |
1307 | if (res == 0) { | |
1308 | res = -ETIMEDOUT; | |
1309 | } else | |
c4307285 | 1310 | { /* leave "res" unchanged */ } |
b97bf3fd PL |
1311 | sock->state = SS_DISCONNECTING; |
1312 | } | |
1313 | ||
26bad2c0 | 1314 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
1315 | return res; |
1316 | } | |
1317 | ||
c4307285 | 1318 | /** |
b97bf3fd PL |
1319 | * listen - allow socket to listen for incoming connections |
1320 | * @sock: socket structure | |
1321 | * @len: (unused) | |
c4307285 | 1322 | * |
b97bf3fd PL |
1323 | * Returns 0 on success, errno otherwise |
1324 | */ | |
1325 | ||
1326 | static int listen(struct socket *sock, int len) | |
1327 | { | |
1328 | /* REQUIRES SOCKET LOCKING OF SOME SORT? */ | |
1329 | ||
1330 | if (sock->state == SS_READY) | |
1331 | return -EOPNOTSUPP; | |
1332 | if (sock->state != SS_UNCONNECTED) | |
1333 | return -EINVAL; | |
1334 | sock->state = SS_LISTENING; | |
c4307285 | 1335 | return 0; |
b97bf3fd PL |
1336 | } |
1337 | ||
c4307285 | 1338 | /** |
b97bf3fd PL |
1339 | * accept - wait for connection request |
1340 | * @sock: listening socket | |
1341 | * @newsock: new socket that is to be connected | |
1342 | * @flags: file-related flags associated with socket | |
c4307285 | 1343 | * |
b97bf3fd PL |
1344 | * Returns 0 on success, errno otherwise |
1345 | */ | |
1346 | ||
1347 | static int accept(struct socket *sock, struct socket *newsock, int flags) | |
1348 | { | |
1349 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
1350 | struct sk_buff *buf; | |
1351 | int res = -EFAULT; | |
1352 | ||
1353 | if (sock->state == SS_READY) | |
1354 | return -EOPNOTSUPP; | |
1355 | if (sock->state != SS_LISTENING) | |
1356 | return -EINVAL; | |
c4307285 YH |
1357 | |
1358 | if (unlikely((skb_queue_len(&sock->sk->sk_receive_queue) == 0) && | |
b97bf3fd PL |
1359 | (flags & O_NONBLOCK))) |
1360 | return -EWOULDBLOCK; | |
1361 | ||
26bad2c0 | 1362 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd PL |
1363 | return -ERESTARTSYS; |
1364 | ||
c4307285 | 1365 | if (wait_event_interruptible(*sock->sk->sk_sleep, |
b97bf3fd PL |
1366 | skb_queue_len(&sock->sk->sk_receive_queue))) { |
1367 | res = -ERESTARTSYS; | |
1368 | goto exit; | |
1369 | } | |
1370 | buf = skb_peek(&sock->sk->sk_receive_queue); | |
1371 | ||
3b1e0a65 | 1372 | res = tipc_create(sock_net(sock->sk), newsock, 0); |
b97bf3fd PL |
1373 | if (!res) { |
1374 | struct tipc_sock *new_tsock = tipc_sk(newsock->sk); | |
1375 | struct tipc_portid id; | |
1376 | struct tipc_msg *msg = buf_msg(buf); | |
1377 | u32 new_ref = new_tsock->p->ref; | |
1378 | ||
1379 | id.ref = msg_origport(msg); | |
1380 | id.node = msg_orignode(msg); | |
1381 | tipc_connect2port(new_ref, &id); | |
1382 | newsock->state = SS_CONNECTED; | |
1383 | ||
1384 | tipc_set_portimportance(new_ref, msg_importance(msg)); | |
1385 | if (msg_named(msg)) { | |
1386 | new_tsock->p->conn_type = msg_nametype(msg); | |
1387 | new_tsock->p->conn_instance = msg_nameinst(msg); | |
1388 | } | |
1389 | ||
c4307285 | 1390 | /* |
b97bf3fd PL |
1391 | * Respond to 'SYN-' by discarding it & returning 'ACK'-. |
1392 | * Respond to 'SYN+' by queuing it on new socket. | |
1393 | */ | |
1394 | ||
1395 | msg_dbg(msg,"<ACC<: "); | |
c4307285 YH |
1396 | if (!msg_data_sz(msg)) { |
1397 | struct msghdr m = {NULL,}; | |
b97bf3fd | 1398 | |
c4307285 YH |
1399 | send_packet(NULL, newsock, &m, 0); |
1400 | advance_queue(tsock); | |
1401 | } else { | |
b97bf3fd PL |
1402 | sock_lock(tsock); |
1403 | skb_dequeue(&sock->sk->sk_receive_queue); | |
1404 | sock_unlock(tsock); | |
1405 | skb_queue_head(&newsock->sk->sk_receive_queue, buf); | |
1406 | } | |
1407 | } | |
1408 | exit: | |
26bad2c0 | 1409 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
1410 | return res; |
1411 | } | |
1412 | ||
1413 | /** | |
1414 | * shutdown - shutdown socket connection | |
1415 | * @sock: socket structure | |
e247a8f5 | 1416 | * @how: direction to close (must be SHUT_RDWR) |
b97bf3fd PL |
1417 | * |
1418 | * Terminates connection (if necessary), then purges socket's receive queue. | |
c4307285 | 1419 | * |
b97bf3fd PL |
1420 | * Returns 0 on success, errno otherwise |
1421 | */ | |
1422 | ||
1423 | static int shutdown(struct socket *sock, int how) | |
1424 | { | |
1425 | struct tipc_sock* tsock = tipc_sk(sock->sk); | |
1426 | struct sk_buff *buf; | |
1427 | int res; | |
1428 | ||
e247a8f5 AS |
1429 | if (how != SHUT_RDWR) |
1430 | return -EINVAL; | |
b97bf3fd | 1431 | |
26bad2c0 | 1432 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd PL |
1433 | return -ERESTARTSYS; |
1434 | ||
1435 | sock_lock(tsock); | |
1436 | ||
1437 | switch (sock->state) { | |
1438 | case SS_CONNECTED: | |
1439 | ||
1440 | /* Send 'FIN+' or 'FIN-' message to peer */ | |
1441 | ||
1442 | sock_unlock(tsock); | |
1443 | restart: | |
1444 | if ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) { | |
1445 | atomic_dec(&tipc_queue_size); | |
1446 | if (TIPC_SKB_CB(buf)->handle != msg_data(buf_msg(buf))) { | |
1447 | buf_discard(buf); | |
1448 | goto restart; | |
1449 | } | |
1450 | tipc_reject_msg(buf, TIPC_CONN_SHUTDOWN); | |
1451 | } | |
1452 | else { | |
1453 | tipc_shutdown(tsock->p->ref); | |
1454 | } | |
1455 | sock_lock(tsock); | |
1456 | ||
1457 | /* fall through */ | |
1458 | ||
1459 | case SS_DISCONNECTING: | |
1460 | ||
1461 | /* Discard any unreceived messages */ | |
1462 | ||
1463 | while ((buf = skb_dequeue(&sock->sk->sk_receive_queue))) { | |
1464 | atomic_dec(&tipc_queue_size); | |
1465 | buf_discard(buf); | |
1466 | } | |
1467 | tsock->p->conn_unacked = 0; | |
1468 | ||
1469 | /* fall through */ | |
1470 | ||
1471 | case SS_CONNECTING: | |
1472 | sock->state = SS_DISCONNECTING; | |
1473 | res = 0; | |
1474 | break; | |
1475 | ||
1476 | default: | |
1477 | res = -ENOTCONN; | |
1478 | } | |
1479 | ||
1480 | sock_unlock(tsock); | |
1481 | ||
26bad2c0 | 1482 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
1483 | return res; |
1484 | } | |
1485 | ||
1486 | /** | |
1487 | * setsockopt - set socket option | |
1488 | * @sock: socket structure | |
1489 | * @lvl: option level | |
1490 | * @opt: option identifier | |
1491 | * @ov: pointer to new option value | |
1492 | * @ol: length of option value | |
c4307285 YH |
1493 | * |
1494 | * For stream sockets only, accepts and ignores all IPPROTO_TCP options | |
b97bf3fd | 1495 | * (to ease compatibility). |
c4307285 | 1496 | * |
b97bf3fd PL |
1497 | * Returns 0 on success, errno otherwise |
1498 | */ | |
1499 | ||
c4307285 | 1500 | static int setsockopt(struct socket *sock, |
e9024f0f | 1501 | int lvl, int opt, char __user *ov, int ol) |
b97bf3fd PL |
1502 | { |
1503 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
1504 | u32 value; | |
1505 | int res; | |
1506 | ||
c4307285 YH |
1507 | if ((lvl == IPPROTO_TCP) && (sock->type == SOCK_STREAM)) |
1508 | return 0; | |
b97bf3fd PL |
1509 | if (lvl != SOL_TIPC) |
1510 | return -ENOPROTOOPT; | |
1511 | if (ol < sizeof(value)) | |
1512 | return -EINVAL; | |
c4307285 | 1513 | if ((res = get_user(value, (u32 __user *)ov))) |
b97bf3fd PL |
1514 | return res; |
1515 | ||
26bad2c0 | 1516 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd | 1517 | return -ERESTARTSYS; |
c4307285 | 1518 | |
b97bf3fd PL |
1519 | switch (opt) { |
1520 | case TIPC_IMPORTANCE: | |
1521 | res = tipc_set_portimportance(tsock->p->ref, value); | |
1522 | break; | |
1523 | case TIPC_SRC_DROPPABLE: | |
1524 | if (sock->type != SOCK_STREAM) | |
1525 | res = tipc_set_portunreliable(tsock->p->ref, value); | |
c4307285 | 1526 | else |
b97bf3fd PL |
1527 | res = -ENOPROTOOPT; |
1528 | break; | |
1529 | case TIPC_DEST_DROPPABLE: | |
1530 | res = tipc_set_portunreturnable(tsock->p->ref, value); | |
1531 | break; | |
1532 | case TIPC_CONN_TIMEOUT: | |
3654ea02 | 1533 | sock->sk->sk_rcvtimeo = msecs_to_jiffies(value); |
b97bf3fd PL |
1534 | break; |
1535 | default: | |
1536 | res = -EINVAL; | |
1537 | } | |
1538 | ||
26bad2c0 | 1539 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
1540 | return res; |
1541 | } | |
1542 | ||
1543 | /** | |
1544 | * getsockopt - get socket option | |
1545 | * @sock: socket structure | |
1546 | * @lvl: option level | |
1547 | * @opt: option identifier | |
1548 | * @ov: receptacle for option value | |
1549 | * @ol: receptacle for length of option value | |
c4307285 YH |
1550 | * |
1551 | * For stream sockets only, returns 0 length result for all IPPROTO_TCP options | |
b97bf3fd | 1552 | * (to ease compatibility). |
c4307285 | 1553 | * |
b97bf3fd PL |
1554 | * Returns 0 on success, errno otherwise |
1555 | */ | |
1556 | ||
c4307285 | 1557 | static int getsockopt(struct socket *sock, |
28c4dadd | 1558 | int lvl, int opt, char __user *ov, int __user *ol) |
b97bf3fd PL |
1559 | { |
1560 | struct tipc_sock *tsock = tipc_sk(sock->sk); | |
c4307285 | 1561 | int len; |
b97bf3fd | 1562 | u32 value; |
c4307285 | 1563 | int res; |
b97bf3fd | 1564 | |
c4307285 YH |
1565 | if ((lvl == IPPROTO_TCP) && (sock->type == SOCK_STREAM)) |
1566 | return put_user(0, ol); | |
b97bf3fd PL |
1567 | if (lvl != SOL_TIPC) |
1568 | return -ENOPROTOOPT; | |
c4307285 YH |
1569 | if ((res = get_user(len, ol))) |
1570 | return res; | |
b97bf3fd | 1571 | |
26bad2c0 | 1572 | if (mutex_lock_interruptible(&tsock->lock)) |
b97bf3fd PL |
1573 | return -ERESTARTSYS; |
1574 | ||
1575 | switch (opt) { | |
1576 | case TIPC_IMPORTANCE: | |
1577 | res = tipc_portimportance(tsock->p->ref, &value); | |
1578 | break; | |
1579 | case TIPC_SRC_DROPPABLE: | |
1580 | res = tipc_portunreliable(tsock->p->ref, &value); | |
1581 | break; | |
1582 | case TIPC_DEST_DROPPABLE: | |
1583 | res = tipc_portunreturnable(tsock->p->ref, &value); | |
1584 | break; | |
1585 | case TIPC_CONN_TIMEOUT: | |
3654ea02 | 1586 | value = jiffies_to_msecs(sock->sk->sk_rcvtimeo); |
b97bf3fd PL |
1587 | break; |
1588 | default: | |
1589 | res = -EINVAL; | |
1590 | } | |
1591 | ||
1592 | if (res) { | |
1593 | /* "get" failed */ | |
1594 | } | |
1595 | else if (len < sizeof(value)) { | |
1596 | res = -EINVAL; | |
1597 | } | |
1598 | else if ((res = copy_to_user(ov, &value, sizeof(value)))) { | |
1599 | /* couldn't return value */ | |
1600 | } | |
1601 | else { | |
1602 | res = put_user(sizeof(value), ol); | |
1603 | } | |
1604 | ||
26bad2c0 | 1605 | mutex_unlock(&tsock->lock); |
b97bf3fd PL |
1606 | return res; |
1607 | } | |
1608 | ||
b97bf3fd PL |
1609 | /** |
1610 | * Protocol switches for the various types of TIPC sockets | |
1611 | */ | |
1612 | ||
bca65eae | 1613 | static const struct proto_ops msg_ops = { |
b97bf3fd PL |
1614 | .owner = THIS_MODULE, |
1615 | .family = AF_TIPC, | |
1616 | .release = release, | |
1617 | .bind = bind, | |
1618 | .connect = connect, | |
5eee6a6d | 1619 | .socketpair = sock_no_socketpair, |
b97bf3fd PL |
1620 | .accept = accept, |
1621 | .getname = get_name, | |
1622 | .poll = poll, | |
5eee6a6d | 1623 | .ioctl = sock_no_ioctl, |
b97bf3fd PL |
1624 | .listen = listen, |
1625 | .shutdown = shutdown, | |
1626 | .setsockopt = setsockopt, | |
1627 | .getsockopt = getsockopt, | |
1628 | .sendmsg = send_msg, | |
1629 | .recvmsg = recv_msg, | |
8238745a YH |
1630 | .mmap = sock_no_mmap, |
1631 | .sendpage = sock_no_sendpage | |
b97bf3fd PL |
1632 | }; |
1633 | ||
bca65eae | 1634 | static const struct proto_ops packet_ops = { |
b97bf3fd PL |
1635 | .owner = THIS_MODULE, |
1636 | .family = AF_TIPC, | |
1637 | .release = release, | |
1638 | .bind = bind, | |
1639 | .connect = connect, | |
5eee6a6d | 1640 | .socketpair = sock_no_socketpair, |
b97bf3fd PL |
1641 | .accept = accept, |
1642 | .getname = get_name, | |
1643 | .poll = poll, | |
5eee6a6d | 1644 | .ioctl = sock_no_ioctl, |
b97bf3fd PL |
1645 | .listen = listen, |
1646 | .shutdown = shutdown, | |
1647 | .setsockopt = setsockopt, | |
1648 | .getsockopt = getsockopt, | |
1649 | .sendmsg = send_packet, | |
1650 | .recvmsg = recv_msg, | |
8238745a YH |
1651 | .mmap = sock_no_mmap, |
1652 | .sendpage = sock_no_sendpage | |
b97bf3fd PL |
1653 | }; |
1654 | ||
bca65eae | 1655 | static const struct proto_ops stream_ops = { |
b97bf3fd PL |
1656 | .owner = THIS_MODULE, |
1657 | .family = AF_TIPC, | |
1658 | .release = release, | |
1659 | .bind = bind, | |
1660 | .connect = connect, | |
5eee6a6d | 1661 | .socketpair = sock_no_socketpair, |
b97bf3fd PL |
1662 | .accept = accept, |
1663 | .getname = get_name, | |
1664 | .poll = poll, | |
5eee6a6d | 1665 | .ioctl = sock_no_ioctl, |
b97bf3fd PL |
1666 | .listen = listen, |
1667 | .shutdown = shutdown, | |
1668 | .setsockopt = setsockopt, | |
1669 | .getsockopt = getsockopt, | |
1670 | .sendmsg = send_stream, | |
1671 | .recvmsg = recv_stream, | |
8238745a YH |
1672 | .mmap = sock_no_mmap, |
1673 | .sendpage = sock_no_sendpage | |
b97bf3fd PL |
1674 | }; |
1675 | ||
bca65eae | 1676 | static const struct net_proto_family tipc_family_ops = { |
b97bf3fd PL |
1677 | .owner = THIS_MODULE, |
1678 | .family = AF_TIPC, | |
1679 | .create = tipc_create | |
1680 | }; | |
1681 | ||
1682 | static struct proto tipc_proto = { | |
1683 | .name = "TIPC", | |
1684 | .owner = THIS_MODULE, | |
1685 | .obj_size = sizeof(struct tipc_sock) | |
1686 | }; | |
1687 | ||
1688 | /** | |
4323add6 | 1689 | * tipc_socket_init - initialize TIPC socket interface |
c4307285 | 1690 | * |
b97bf3fd PL |
1691 | * Returns 0 on success, errno otherwise |
1692 | */ | |
4323add6 | 1693 | int tipc_socket_init(void) |
b97bf3fd PL |
1694 | { |
1695 | int res; | |
1696 | ||
c4307285 | 1697 | res = proto_register(&tipc_proto, 1); |
b97bf3fd | 1698 | if (res) { |
d0a14a9d | 1699 | err("Failed to register TIPC protocol type\n"); |
b97bf3fd PL |
1700 | goto out; |
1701 | } | |
1702 | ||
1703 | res = sock_register(&tipc_family_ops); | |
1704 | if (res) { | |
d0a14a9d | 1705 | err("Failed to register TIPC socket type\n"); |
b97bf3fd PL |
1706 | proto_unregister(&tipc_proto); |
1707 | goto out; | |
1708 | } | |
1709 | ||
1710 | sockets_enabled = 1; | |
1711 | out: | |
1712 | return res; | |
1713 | } | |
1714 | ||
1715 | /** | |
4323add6 | 1716 | * tipc_socket_stop - stop TIPC socket interface |
b97bf3fd | 1717 | */ |
4323add6 | 1718 | void tipc_socket_stop(void) |
b97bf3fd PL |
1719 | { |
1720 | if (!sockets_enabled) | |
1721 | return; | |
1722 | ||
1723 | sockets_enabled = 0; | |
1724 | sock_unregister(tipc_family_ops.family); | |
1725 | proto_unregister(&tipc_proto); | |
1726 | } | |
1727 |