4 * Phonet pipe protocol end point socket
6 * Copyright (C) 2008 Nokia Corporation.
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * version 2 as published by the Free Software Foundation.
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
25 #include <linux/kernel.h>
26 #include <linux/slab.h>
27 #include <linux/socket.h>
29 #include <net/tcp_states.h>
30 #include <asm/ioctls.h>
32 #include <linux/phonet.h>
33 #include <linux/module.h>
34 #include <net/phonet/phonet.h>
35 #include <net/phonet/pep.h>
36 #include <net/phonet/gprs.h>
39 * TCP_CLOSE sock not in use yet
40 * TCP_CLOSE_WAIT disconnected pipe
41 * TCP_LISTEN listening pipe endpoint
42 * TCP_SYN_RECV connected pipe in disabled state
43 * TCP_ESTABLISHED connected pipe in enabled state
46 * - sk_state, hlist: sock lock needed
47 * - listener: read only
48 * - pipe_handle: read only
51 #define CREDITS_MAX 10
54 #define pep_sb_size(s) (((s) + 5) & ~3) /* 2-bytes head, 32-bits aligned */
56 /* Get the next TLV sub-block. */
57 static unsigned char *pep_get_sb(struct sk_buff *skb, u8 *ptype, u8 *plen,
67 ph = skb_header_pointer(skb, 0, 2, &h);
68 if (ph == NULL || ph->sb_len < 2 || !pskb_may_pull(skb, ph->sb_len))
74 if (buflen > ph->sb_len)
76 data = skb_header_pointer(skb, 2, buflen, buf);
77 __skb_pull(skb, 2 + ph->sb_len);
81 static struct sk_buff *pep_alloc_skb(struct sock *sk, const void *payload,
82 int len, gfp_t priority)
84 struct sk_buff *skb = alloc_skb(MAX_PNPIPE_HEADER + len, priority);
87 skb_set_owner_w(skb, sk);
89 skb_reserve(skb, MAX_PNPIPE_HEADER);
91 skb_copy_to_linear_data(skb, payload, len);
92 __skb_push(skb, sizeof(struct pnpipehdr));
93 skb_reset_transport_header(skb);
97 static int pep_reply(struct sock *sk, struct sk_buff *oskb, u8 code,
98 const void *data, int len, gfp_t priority)
100 const struct pnpipehdr *oph = pnp_hdr(oskb);
101 struct pnpipehdr *ph;
103 struct sockaddr_pn peer;
105 skb = pep_alloc_skb(sk, data, len, priority);
110 ph->utid = oph->utid;
111 ph->message_id = oph->message_id + 1; /* REQ -> RESP */
112 ph->pipe_handle = oph->pipe_handle;
113 ph->error_code = code;
115 pn_skb_get_src_sockaddr(oskb, &peer);
116 return pn_skb_send(sk, skb, &peer);
119 static int pep_indicate(struct sock *sk, u8 id, u8 code,
120 const void *data, int len, gfp_t priority)
122 struct pep_sock *pn = pep_sk(sk);
123 struct pnpipehdr *ph;
126 skb = pep_alloc_skb(sk, data, len, priority);
133 ph->pipe_handle = pn->pipe_handle;
135 return pn_skb_send(sk, skb, NULL);
140 static int pipe_handler_request(struct sock *sk, u8 id, u8 code,
141 const void *data, int len)
143 struct pep_sock *pn = pep_sk(sk);
144 struct pnpipehdr *ph;
147 skb = pep_alloc_skb(sk, data, len, GFP_KERNEL);
152 ph->utid = id; /* whatever */
154 ph->pipe_handle = pn->pipe_handle;
156 return pn_skb_send(sk, skb, NULL);
159 static int pipe_handler_send_created_ind(struct sock *sk)
161 struct pep_sock *pn = pep_sk(sk);
163 PN_PIPE_SB_NEGOTIATED_FC, pep_sb_size(2),
164 pn->tx_fc, pn->rx_fc,
167 return pep_indicate(sk, PNS_PIPE_CREATED_IND, 1 /* sub-blocks */,
168 data, 4, GFP_ATOMIC);
171 static int pep_accept_conn(struct sock *sk, struct sk_buff *skb)
173 static const u8 data[20] = {
174 PAD, PAD, PAD, 2 /* sub-blocks */,
175 PN_PIPE_SB_REQUIRED_FC_TX, pep_sb_size(5), 3, PAD,
176 PN_MULTI_CREDIT_FLOW_CONTROL,
177 PN_ONE_CREDIT_FLOW_CONTROL,
178 PN_LEGACY_FLOW_CONTROL,
180 PN_PIPE_SB_PREFERRED_FC_RX, pep_sb_size(5), 3, PAD,
181 PN_MULTI_CREDIT_FLOW_CONTROL,
182 PN_ONE_CREDIT_FLOW_CONTROL,
183 PN_LEGACY_FLOW_CONTROL,
188 return pep_reply(sk, skb, PN_PIPE_NO_ERROR, data, sizeof(data),
192 static int pep_reject_conn(struct sock *sk, struct sk_buff *skb, u8 code,
195 static const u8 data[4] = { PAD, PAD, PAD, 0 /* sub-blocks */ };
196 WARN_ON(code == PN_PIPE_NO_ERROR);
197 return pep_reply(sk, skb, code, data, sizeof(data), priority);
200 /* Control requests are not sent by the pipe service and have a specific
202 static int pep_ctrlreq_error(struct sock *sk, struct sk_buff *oskb, u8 code,
205 const struct pnpipehdr *oph = pnp_hdr(oskb);
207 struct pnpipehdr *ph;
208 struct sockaddr_pn dst;
210 oph->data[0], /* PEP type */
211 code, /* error code, at an unusual offset */
215 skb = pep_alloc_skb(sk, data, 4, priority);
220 ph->utid = oph->utid;
221 ph->message_id = PNS_PEP_CTRL_RESP;
222 ph->pipe_handle = oph->pipe_handle;
223 ph->data[0] = oph->data[1]; /* CTRL id */
225 pn_skb_get_src_sockaddr(oskb, &dst);
226 return pn_skb_send(sk, skb, &dst);
229 static int pipe_snd_status(struct sock *sk, u8 type, u8 status, gfp_t priority)
231 u8 data[4] = { type, PAD, PAD, status };
233 return pep_indicate(sk, PNS_PEP_STATUS_IND, PN_PEP_TYPE_COMMON,
237 /* Send our RX flow control information to the sender.
238 * Socket must be locked. */
239 static void pipe_grant_credits(struct sock *sk, gfp_t priority)
241 struct pep_sock *pn = pep_sk(sk);
243 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
246 case PN_LEGACY_FLOW_CONTROL: /* TODO */
248 case PN_ONE_CREDIT_FLOW_CONTROL:
249 if (pipe_snd_status(sk, PN_PEP_IND_FLOW_CONTROL,
250 PEP_IND_READY, priority) == 0)
253 case PN_MULTI_CREDIT_FLOW_CONTROL:
254 if ((pn->rx_credits + CREDITS_THR) > CREDITS_MAX)
256 if (pipe_snd_status(sk, PN_PEP_IND_ID_MCFC_GRANT_CREDITS,
257 CREDITS_MAX - pn->rx_credits,
259 pn->rx_credits = CREDITS_MAX;
264 static int pipe_rcv_status(struct sock *sk, struct sk_buff *skb)
266 struct pep_sock *pn = pep_sk(sk);
267 struct pnpipehdr *hdr;
270 if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
274 if (hdr->data[0] != PN_PEP_TYPE_COMMON) {
275 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP type: %u\n",
276 (unsigned)hdr->data[0]);
280 switch (hdr->data[1]) {
281 case PN_PEP_IND_FLOW_CONTROL:
283 case PN_LEGACY_FLOW_CONTROL:
284 switch (hdr->data[4]) {
286 atomic_set(&pn->tx_credits, 0);
289 atomic_set(&pn->tx_credits, wake = 1);
293 case PN_ONE_CREDIT_FLOW_CONTROL:
294 if (hdr->data[4] == PEP_IND_READY)
295 atomic_set(&pn->tx_credits, wake = 1);
300 case PN_PEP_IND_ID_MCFC_GRANT_CREDITS:
301 if (pn->tx_fc != PN_MULTI_CREDIT_FLOW_CONTROL)
303 atomic_add(wake = hdr->data[4], &pn->tx_credits);
307 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP indication: %u\n",
308 (unsigned)hdr->data[1]);
312 sk->sk_write_space(sk);
316 static int pipe_rcv_created(struct sock *sk, struct sk_buff *skb)
318 struct pep_sock *pn = pep_sk(sk);
319 struct pnpipehdr *hdr = pnp_hdr(skb);
320 u8 n_sb = hdr->data[0];
322 pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
323 __skb_pull(skb, sizeof(*hdr));
325 u8 type, buf[2], len = sizeof(buf);
326 u8 *data = pep_get_sb(skb, &type, &len, buf);
331 case PN_PIPE_SB_NEGOTIATED_FC:
332 if (len < 2 || (data[0] | data[1]) > 3)
334 pn->tx_fc = data[0] & 3;
335 pn->rx_fc = data[1] & 3;
343 /* Queue an skb to a connected sock.
344 * Socket lock must be held. */
345 static int pipe_do_rcv(struct sock *sk, struct sk_buff *skb)
347 struct pep_sock *pn = pep_sk(sk);
348 struct pnpipehdr *hdr = pnp_hdr(skb);
349 struct sk_buff_head *queue;
352 BUG_ON(sk->sk_state == TCP_CLOSE_WAIT);
354 switch (hdr->message_id) {
355 case PNS_PEP_CONNECT_REQ:
356 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE, GFP_ATOMIC);
359 case PNS_PEP_DISCONNECT_REQ:
360 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
361 sk->sk_state = TCP_CLOSE_WAIT;
362 if (!sock_flag(sk, SOCK_DEAD))
363 sk->sk_state_change(sk);
366 case PNS_PEP_ENABLE_REQ:
367 /* Wait for PNS_PIPE_(ENABLED|REDIRECTED)_IND */
368 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
371 case PNS_PEP_RESET_REQ:
372 switch (hdr->state_after_reset) {
373 case PN_PIPE_DISABLE:
379 default: /* not allowed to send an error here!? */
384 case PNS_PEP_DISABLE_REQ:
385 atomic_set(&pn->tx_credits, 0);
386 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
389 case PNS_PEP_CTRL_REQ:
390 if (skb_queue_len(&pn->ctrlreq_queue) >= PNPIPE_CTRLREQ_MAX) {
391 atomic_inc(&sk->sk_drops);
395 queue = &pn->ctrlreq_queue;
398 case PNS_PIPE_ALIGNED_DATA:
402 __skb_pull(skb, 3); /* Pipe data header */
403 if (!pn_flow_safe(pn->rx_fc)) {
404 err = sock_queue_rcv_skb(sk, skb);
406 return NET_RX_SUCCESS;
411 if (pn->rx_credits == 0) {
412 atomic_inc(&sk->sk_drops);
417 queue = &sk->sk_receive_queue;
420 case PNS_PEP_STATUS_IND:
421 pipe_rcv_status(sk, skb);
424 case PNS_PIPE_REDIRECTED_IND:
425 err = pipe_rcv_created(sk, skb);
428 case PNS_PIPE_CREATED_IND:
429 err = pipe_rcv_created(sk, skb);
433 case PNS_PIPE_RESET_IND:
434 if (!pn->init_enable)
437 case PNS_PIPE_ENABLED_IND:
438 if (!pn_flow_safe(pn->tx_fc)) {
439 atomic_set(&pn->tx_credits, 1);
440 sk->sk_write_space(sk);
442 if (sk->sk_state == TCP_ESTABLISHED)
443 break; /* Nothing to do */
444 sk->sk_state = TCP_ESTABLISHED;
445 pipe_grant_credits(sk, GFP_ATOMIC);
448 case PNS_PIPE_DISABLED_IND:
449 sk->sk_state = TCP_SYN_RECV;
454 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP message: %u\n",
460 return (err == -ENOBUFS) ? NET_RX_DROP : NET_RX_SUCCESS;
464 skb_set_owner_r(skb, sk);
466 skb_queue_tail(queue, skb);
467 if (!sock_flag(sk, SOCK_DEAD))
468 sk->sk_data_ready(sk, err);
469 return NET_RX_SUCCESS;
472 /* Destroy connected sock. */
473 static void pipe_destruct(struct sock *sk)
475 struct pep_sock *pn = pep_sk(sk);
477 skb_queue_purge(&sk->sk_receive_queue);
478 skb_queue_purge(&pn->ctrlreq_queue);
481 static u8 pipe_negotiate_fc(const u8 *fcs, unsigned n)
484 u8 final_fc = PN_NO_FLOW_CONTROL;
486 for (i = 0; i < n; i++) {
489 if (fc > final_fc && fc < PN_MAX_FLOW_CONTROL)
495 static int pep_connresp_rcv(struct sock *sk, struct sk_buff *skb)
497 struct pep_sock *pn = pep_sk(sk);
498 struct pnpipehdr *hdr;
501 if (!pskb_pull(skb, sizeof(*hdr) + 4))
505 if (hdr->error_code != PN_PIPE_NO_ERROR)
506 return -ECONNREFUSED;
508 /* Parse sub-blocks */
511 u8 type, buf[6], len = sizeof(buf);
512 const u8 *data = pep_get_sb(skb, &type, &len, buf);
518 case PN_PIPE_SB_REQUIRED_FC_TX:
519 if (len < 2 || len < data[0])
521 pn->tx_fc = pipe_negotiate_fc(data + 2, len - 2);
524 case PN_PIPE_SB_PREFERRED_FC_RX:
525 if (len < 2 || len < data[0])
527 pn->rx_fc = pipe_negotiate_fc(data + 2, len - 2);
534 return pipe_handler_send_created_ind(sk);
537 /* Queue an skb to an actively connected sock.
538 * Socket lock must be held. */
539 static int pipe_handler_do_rcv(struct sock *sk, struct sk_buff *skb)
541 struct pep_sock *pn = pep_sk(sk);
542 struct pnpipehdr *hdr = pnp_hdr(skb);
543 int err = NET_RX_SUCCESS;
545 switch (hdr->message_id) {
546 case PNS_PIPE_ALIGNED_DATA:
550 __skb_pull(skb, 3); /* Pipe data header */
551 if (!pn_flow_safe(pn->rx_fc)) {
552 err = sock_queue_rcv_skb(sk, skb);
554 return NET_RX_SUCCESS;
559 if (pn->rx_credits == 0) {
560 atomic_inc(&sk->sk_drops);
566 skb_set_owner_r(skb, sk);
568 skb_queue_tail(&sk->sk_receive_queue, skb);
569 if (!sock_flag(sk, SOCK_DEAD))
570 sk->sk_data_ready(sk, err);
571 return NET_RX_SUCCESS;
573 case PNS_PEP_CONNECT_RESP:
574 if (sk->sk_state != TCP_SYN_SENT)
576 if (!sock_flag(sk, SOCK_DEAD))
577 sk->sk_state_change(sk);
578 if (pep_connresp_rcv(sk, skb)) {
579 sk->sk_state = TCP_CLOSE_WAIT;
583 sk->sk_state = TCP_ESTABLISHED;
584 if (!pn_flow_safe(pn->tx_fc)) {
585 atomic_set(&pn->tx_credits, 1);
586 sk->sk_write_space(sk);
588 pipe_grant_credits(sk, GFP_ATOMIC);
591 case PNS_PEP_DISCONNECT_RESP:
592 /* sock should already be dead, nothing to do */
595 case PNS_PEP_STATUS_IND:
596 pipe_rcv_status(sk, skb);
603 /* Listening sock must be locked */
604 static struct sock *pep_find_pipe(const struct hlist_head *hlist,
605 const struct sockaddr_pn *dst,
608 struct hlist_node *node;
610 u16 dobj = pn_sockaddr_get_object(dst);
612 sk_for_each(sknode, node, hlist) {
613 struct pep_sock *pnnode = pep_sk(sknode);
615 /* Ports match, but addresses might not: */
616 if (pnnode->pn_sk.sobject != dobj)
618 if (pnnode->pipe_handle != pipe_handle)
620 if (sknode->sk_state == TCP_CLOSE_WAIT)
630 * Deliver an skb to a listening sock.
631 * Socket lock must be held.
632 * We then queue the skb to the right connected sock (if any).
634 static int pep_do_rcv(struct sock *sk, struct sk_buff *skb)
636 struct pep_sock *pn = pep_sk(sk);
638 struct pnpipehdr *hdr;
639 struct sockaddr_pn dst;
642 if (!pskb_may_pull(skb, sizeof(*hdr)))
646 pipe_handle = hdr->pipe_handle;
647 if (pipe_handle == PN_PIPE_INVALID_HANDLE)
650 pn_skb_get_dst_sockaddr(skb, &dst);
652 /* Look for an existing pipe handle */
653 sknode = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
655 return sk_receive_skb(sknode, skb, 1);
657 switch (hdr->message_id) {
658 case PNS_PEP_CONNECT_REQ:
659 if (sk->sk_state != TCP_LISTEN || sk_acceptq_is_full(sk)) {
660 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE,
664 skb_queue_head(&sk->sk_receive_queue, skb);
665 sk_acceptq_added(sk);
666 if (!sock_flag(sk, SOCK_DEAD))
667 sk->sk_data_ready(sk, 0);
668 return NET_RX_SUCCESS;
670 case PNS_PEP_DISCONNECT_REQ:
671 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
674 case PNS_PEP_CTRL_REQ:
675 pep_ctrlreq_error(sk, skb, PN_PIPE_INVALID_HANDLE, GFP_ATOMIC);
678 case PNS_PEP_RESET_REQ:
679 case PNS_PEP_ENABLE_REQ:
680 case PNS_PEP_DISABLE_REQ:
681 /* invalid handle is not even allowed here! */
685 if ((1 << sk->sk_state)
686 & ~(TCPF_CLOSE|TCPF_LISTEN|TCPF_CLOSE_WAIT))
687 /* actively connected socket */
688 return pipe_handler_do_rcv(sk, skb);
692 return NET_RX_SUCCESS;
695 static int pipe_do_remove(struct sock *sk)
697 struct pep_sock *pn = pep_sk(sk);
698 struct pnpipehdr *ph;
701 skb = pep_alloc_skb(sk, NULL, 0, GFP_KERNEL);
707 ph->message_id = PNS_PIPE_REMOVE_REQ;
708 ph->pipe_handle = pn->pipe_handle;
710 return pn_skb_send(sk, skb, NULL);
713 /* associated socket ceases to exist */
714 static void pep_sock_close(struct sock *sk, long timeout)
716 struct pep_sock *pn = pep_sk(sk);
719 sock_hold(sk); /* keep a reference after sk_common_release() */
720 sk_common_release(sk);
723 if ((1 << sk->sk_state) & (TCPF_SYN_RECV|TCPF_ESTABLISHED)) {
724 if (sk->sk_backlog_rcv == pipe_do_rcv)
725 /* Forcefully remove dangling Phonet pipe */
728 pipe_handler_request(sk, PNS_PEP_DISCONNECT_REQ, PAD,
731 sk->sk_state = TCP_CLOSE;
733 ifindex = pn->ifindex;
742 static struct sock *pep_sock_accept(struct sock *sk, int flags, int *errp)
744 struct pep_sock *pn = pep_sk(sk), *newpn;
745 struct sock *newsk = NULL;
747 struct pnpipehdr *hdr;
748 struct sockaddr_pn dst, src;
751 u8 pipe_handle, enabled, n_sb;
754 skb = skb_recv_datagram(sk, 0, flags & O_NONBLOCK, errp);
759 if (sk->sk_state != TCP_LISTEN) {
763 sk_acceptq_removed(sk);
766 if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
770 pipe_handle = hdr->pipe_handle;
771 switch (hdr->state_after_connect) {
772 case PN_PIPE_DISABLE:
779 pep_reject_conn(sk, skb, PN_PIPE_ERR_INVALID_PARAM,
783 peer_type = hdr->other_pep_type << 8;
785 /* Parse sub-blocks (options) */
788 u8 type, buf[1], len = sizeof(buf);
789 const u8 *data = pep_get_sb(skb, &type, &len, buf);
794 case PN_PIPE_SB_CONNECT_REQ_PEP_SUB_TYPE:
797 peer_type = (peer_type & 0xff00) | data[0];
799 case PN_PIPE_SB_ALIGNED_DATA:
800 aligned = data[0] != 0;
806 /* Check for duplicate pipe handle */
807 newsk = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
808 if (unlikely(newsk)) {
811 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE, GFP_KERNEL);
815 /* Create a new to-be-accepted sock */
816 newsk = sk_alloc(sock_net(sk), PF_PHONET, GFP_KERNEL, sk->sk_prot);
818 pep_reject_conn(sk, skb, PN_PIPE_ERR_OVERLOAD, GFP_KERNEL);
823 sock_init_data(NULL, newsk);
824 newsk->sk_state = TCP_SYN_RECV;
825 newsk->sk_backlog_rcv = pipe_do_rcv;
826 newsk->sk_protocol = sk->sk_protocol;
827 newsk->sk_destruct = pipe_destruct;
829 newpn = pep_sk(newsk);
830 pn_skb_get_dst_sockaddr(skb, &dst);
831 pn_skb_get_src_sockaddr(skb, &src);
832 newpn->pn_sk.sobject = pn_sockaddr_get_object(&dst);
833 newpn->pn_sk.dobject = pn_sockaddr_get_object(&src);
834 newpn->pn_sk.resource = pn_sockaddr_get_resource(&dst);
836 newpn->listener = sk;
837 skb_queue_head_init(&newpn->ctrlreq_queue);
838 newpn->pipe_handle = pipe_handle;
839 atomic_set(&newpn->tx_credits, 0);
841 newpn->peer_type = peer_type;
842 newpn->rx_credits = 0;
843 newpn->rx_fc = newpn->tx_fc = PN_LEGACY_FLOW_CONTROL;
844 newpn->init_enable = enabled;
845 newpn->aligned = aligned;
847 err = pep_accept_conn(newsk, skb);
853 sk_add_node(newsk, &pn->hlist);
861 static int pep_sock_connect(struct sock *sk, struct sockaddr *addr, int len)
863 struct pep_sock *pn = pep_sk(sk);
865 u8 data[4] = { 0 /* sub-blocks */, PAD, PAD, PAD };
867 pn->pipe_handle = 1; /* anything but INVALID_HANDLE */
868 err = pipe_handler_request(sk, PNS_PEP_CONNECT_REQ,
869 PN_PIPE_ENABLE, data, 4);
871 pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
874 sk->sk_state = TCP_SYN_SENT;
878 static int pep_ioctl(struct sock *sk, int cmd, unsigned long arg)
880 struct pep_sock *pn = pep_sk(sk);
885 if (sk->sk_state == TCP_LISTEN)
889 if (sock_flag(sk, SOCK_URGINLINE) &&
890 !skb_queue_empty(&pn->ctrlreq_queue))
891 answ = skb_peek(&pn->ctrlreq_queue)->len;
892 else if (!skb_queue_empty(&sk->sk_receive_queue))
893 answ = skb_peek(&sk->sk_receive_queue)->len;
897 return put_user(answ, (int __user *)arg);
903 static int pep_init(struct sock *sk)
905 struct pep_sock *pn = pep_sk(sk);
907 sk->sk_destruct = pipe_destruct;
908 INIT_HLIST_HEAD(&pn->hlist);
910 skb_queue_head_init(&pn->ctrlreq_queue);
911 atomic_set(&pn->tx_credits, 0);
914 pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
916 pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
922 static int pep_setsockopt(struct sock *sk, int level, int optname,
923 char __user *optval, unsigned int optlen)
925 struct pep_sock *pn = pep_sk(sk);
926 int val = 0, err = 0;
928 if (level != SOL_PNPIPE)
930 if (optlen >= sizeof(int)) {
931 if (get_user(val, (int __user *) optval))
938 if (val && val != PNPIPE_ENCAP_IP) {
942 if (!pn->ifindex == !val)
943 break; /* Nothing to do! */
944 if (!capable(CAP_NET_ADMIN)) {
950 err = gprs_attach(sk);
972 static int pep_getsockopt(struct sock *sk, int level, int optname,
973 char __user *optval, int __user *optlen)
975 struct pep_sock *pn = pep_sk(sk);
978 if (level != SOL_PNPIPE)
980 if (get_user(len, optlen))
985 val = pn->ifindex ? PNPIPE_ENCAP_IP : PNPIPE_ENCAP_NONE;
993 val = pn->pipe_handle;
994 if (val == PN_PIPE_INVALID_HANDLE)
1002 len = min_t(unsigned int, sizeof(int), len);
1003 if (put_user(len, optlen))
1005 if (put_user(val, (int __user *) optval))
1010 static int pipe_skb_send(struct sock *sk, struct sk_buff *skb)
1012 struct pep_sock *pn = pep_sk(sk);
1013 struct pnpipehdr *ph;
1016 if (pn_flow_safe(pn->tx_fc) &&
1017 !atomic_add_unless(&pn->tx_credits, -1, 0)) {
1022 skb_push(skb, 3 + pn->aligned);
1023 skb_reset_transport_header(skb);
1027 ph->message_id = PNS_PIPE_ALIGNED_DATA;
1028 ph->data[0] = 0; /* padding */
1030 ph->message_id = PNS_PIPE_DATA;
1031 ph->pipe_handle = pn->pipe_handle;
1032 err = pn_skb_send(sk, skb, NULL);
1034 if (err && pn_flow_safe(pn->tx_fc))
1035 atomic_inc(&pn->tx_credits);
1040 static int pep_sendmsg(struct kiocb *iocb, struct sock *sk,
1041 struct msghdr *msg, size_t len)
1043 struct pep_sock *pn = pep_sk(sk);
1044 struct sk_buff *skb;
1046 int flags = msg->msg_flags;
1049 if ((msg->msg_flags & ~(MSG_DONTWAIT|MSG_EOR|MSG_NOSIGNAL|
1050 MSG_CMSG_COMPAT)) ||
1051 !(msg->msg_flags & MSG_EOR))
1054 skb = sock_alloc_send_skb(sk, MAX_PNPIPE_HEADER + len,
1055 flags & MSG_DONTWAIT, &err);
1059 skb_reserve(skb, MAX_PHONET_HEADER + 3 + pn->aligned);
1060 err = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
1065 timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
1066 if ((1 << sk->sk_state) & (TCPF_LISTEN|TCPF_CLOSE)) {
1070 if (sk->sk_state != TCP_ESTABLISHED) {
1071 /* Wait until the pipe gets to enabled state */
1073 err = sk_stream_wait_connect(sk, &timeo);
1077 if (sk->sk_state == TCP_CLOSE_WAIT) {
1082 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
1084 /* Wait until flow control allows TX */
1085 done = atomic_read(&pn->tx_credits);
1093 if (signal_pending(current)) {
1094 err = sock_intr_errno(timeo);
1098 prepare_to_wait(sk_sleep(sk), &wait,
1099 TASK_INTERRUPTIBLE);
1100 done = sk_wait_event(sk, &timeo, atomic_read(&pn->tx_credits));
1101 finish_wait(sk_sleep(sk), &wait);
1103 if (sk->sk_state != TCP_ESTABLISHED)
1107 err = pipe_skb_send(sk, skb);
1109 err = len; /* success! */
1118 int pep_writeable(struct sock *sk)
1120 struct pep_sock *pn = pep_sk(sk);
1122 return atomic_read(&pn->tx_credits);
1125 int pep_write(struct sock *sk, struct sk_buff *skb)
1127 struct sk_buff *rskb, *fs;
1130 if (pep_sk(sk)->aligned)
1131 return pipe_skb_send(sk, skb);
1133 rskb = alloc_skb(MAX_PNPIPE_HEADER, GFP_ATOMIC);
1138 skb_shinfo(rskb)->frag_list = skb;
1139 rskb->len += skb->len;
1140 rskb->data_len += rskb->len;
1141 rskb->truesize += rskb->len;
1143 /* Avoid nested fragments */
1144 skb_walk_frags(skb, fs)
1146 skb->next = skb_shinfo(skb)->frag_list;
1147 skb_frag_list_init(skb);
1149 skb->data_len -= flen;
1150 skb->truesize -= flen;
1152 skb_reserve(rskb, MAX_PHONET_HEADER + 3);
1153 return pipe_skb_send(sk, rskb);
1156 struct sk_buff *pep_read(struct sock *sk)
1158 struct sk_buff *skb = skb_dequeue(&sk->sk_receive_queue);
1160 if (sk->sk_state == TCP_ESTABLISHED)
1161 pipe_grant_credits(sk, GFP_ATOMIC);
1165 static int pep_recvmsg(struct kiocb *iocb, struct sock *sk,
1166 struct msghdr *msg, size_t len, int noblock,
1167 int flags, int *addr_len)
1169 struct sk_buff *skb;
1172 if (flags & ~(MSG_OOB|MSG_PEEK|MSG_TRUNC|MSG_DONTWAIT|MSG_WAITALL|
1173 MSG_NOSIGNAL|MSG_CMSG_COMPAT))
1176 if (unlikely(1 << sk->sk_state & (TCPF_LISTEN | TCPF_CLOSE)))
1179 if ((flags & MSG_OOB) || sock_flag(sk, SOCK_URGINLINE)) {
1180 /* Dequeue and acknowledge control request */
1181 struct pep_sock *pn = pep_sk(sk);
1183 if (flags & MSG_PEEK)
1185 skb = skb_dequeue(&pn->ctrlreq_queue);
1187 pep_ctrlreq_error(sk, skb, PN_PIPE_NO_ERROR,
1189 msg->msg_flags |= MSG_OOB;
1192 if (flags & MSG_OOB)
1196 skb = skb_recv_datagram(sk, flags, noblock, &err);
1199 if (err == -ENOTCONN && sk->sk_state == TCP_CLOSE_WAIT)
1205 if (sk->sk_state == TCP_ESTABLISHED)
1206 pipe_grant_credits(sk, GFP_KERNEL);
1209 msg->msg_flags |= MSG_EOR;
1211 msg->msg_flags |= MSG_TRUNC;
1215 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, len);
1217 err = (flags & MSG_TRUNC) ? skb->len : len;
1219 skb_free_datagram(sk, skb);
1223 static void pep_sock_unhash(struct sock *sk)
1225 struct pep_sock *pn = pep_sk(sk);
1226 struct sock *skparent = NULL;
1230 if (pn->listener != NULL) {
1231 skparent = pn->listener;
1232 pn->listener = NULL;
1235 pn = pep_sk(skparent);
1236 lock_sock(skparent);
1237 sk_del_node_init(sk);
1241 /* Unhash a listening sock only when it is closed
1242 * and all of its active connected pipes are closed. */
1243 if (hlist_empty(&pn->hlist))
1244 pn_sock_unhash(&pn->pn_sk.sk);
1251 static struct proto pep_proto = {
1252 .close = pep_sock_close,
1253 .accept = pep_sock_accept,
1254 .connect = pep_sock_connect,
1257 .setsockopt = pep_setsockopt,
1258 .getsockopt = pep_getsockopt,
1259 .sendmsg = pep_sendmsg,
1260 .recvmsg = pep_recvmsg,
1261 .backlog_rcv = pep_do_rcv,
1262 .hash = pn_sock_hash,
1263 .unhash = pep_sock_unhash,
1264 .get_port = pn_sock_get_port,
1265 .obj_size = sizeof(struct pep_sock),
1266 .owner = THIS_MODULE,
1270 static struct phonet_protocol pep_pn_proto = {
1271 .ops = &phonet_stream_ops,
1273 .sock_type = SOCK_SEQPACKET,
1276 static int __init pep_register(void)
1278 return phonet_proto_register(PN_PROTO_PIPE, &pep_pn_proto);
1281 static void __exit pep_unregister(void)
1283 phonet_proto_unregister(PN_PROTO_PIPE, &pep_pn_proto);
1286 module_init(pep_register);
1287 module_exit(pep_unregister);
1288 MODULE_AUTHOR("Remi Denis-Courmont, Nokia");
1289 MODULE_DESCRIPTION("Phonet pipe protocol");
1290 MODULE_LICENSE("GPL");
1291 MODULE_ALIAS_NET_PF_PROTO(PF_PHONET, PN_PROTO_PIPE);