1 /* 2 * af_llc.c - LLC User Interface SAPs 3 * Description: 4 * Functions in this module are implementation of socket based llc 5 * communications for the Linux operating system. Support of llc class 6 * one and class two is provided via SOCK_DGRAM and SOCK_STREAM 7 * respectively. 8 * 9 * An llc2 connection is (mac + sap), only one llc2 sap connection 10 * is allowed per mac. Though one sap may have multiple mac + sap 11 * connections. 12 * 13 * Copyright (c) 2001 by Jay Schulist <jschlst@samba.org> 14 * 2002-2003 by Arnaldo Carvalho de Melo <acme@conectiva.com.br> 15 * 16 * This program can be redistributed or modified under the terms of the 17 * GNU General Public License as published by the Free Software Foundation. 18 * This program is distributed without any warranty or implied warranty 19 * of merchantability or fitness for a particular purpose. 20 * 21 * See the GNU General Public License for more details. 22 */ 23 #include <linux/compiler.h> 24 #include <linux/kernel.h> 25 #include <linux/module.h> 26 #include <linux/rtnetlink.h> 27 #include <linux/init.h> 28 #include <linux/slab.h> 29 #include <linux/sched/signal.h> 30 31 #include <net/llc.h> 32 #include <net/llc_sap.h> 33 #include <net/llc_pdu.h> 34 #include <net/llc_conn.h> 35 #include <net/tcp_states.h> 36 37 /* remember: uninitialized global data is zeroed because its in .bss */ 38 static u16 llc_ui_sap_last_autoport = LLC_SAP_DYN_START; 39 static u16 llc_ui_sap_link_no_max[256]; 40 static struct sockaddr_llc llc_ui_addrnull; 41 static const struct proto_ops llc_ui_ops; 42 43 static bool llc_ui_wait_for_conn(struct sock *sk, long timeout); 44 static int llc_ui_wait_for_disc(struct sock *sk, long timeout); 45 static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout); 46 47 #if 0 48 #define dprintk(args...) printk(KERN_DEBUG args) 49 #else 50 #define dprintk(args...) do {} while (0) 51 #endif 52 53 /* Maybe we'll add some more in the future. */ 54 #define LLC_CMSG_PKTINFO 1 55 56 57 /** 58 * llc_ui_next_link_no - return the next unused link number for a sap 59 * @sap: Address of sap to get link number from. 60 * 61 * Return the next unused link number for a given sap. 62 */ 63 static inline u16 llc_ui_next_link_no(int sap) 64 { 65 return llc_ui_sap_link_no_max[sap]++; 66 } 67 68 /** 69 * llc_proto_type - return eth protocol for ARP header type 70 * @arphrd: ARP header type. 71 * 72 * Given an ARP header type return the corresponding ethernet protocol. 73 */ 74 static inline __be16 llc_proto_type(u16 arphrd) 75 { 76 return htons(ETH_P_802_2); 77 } 78 79 /** 80 * llc_ui_addr_null - determines if a address structure is null 81 * @addr: Address to test if null. 82 */ 83 static inline u8 llc_ui_addr_null(struct sockaddr_llc *addr) 84 { 85 return !memcmp(addr, &llc_ui_addrnull, sizeof(*addr)); 86 } 87 88 /** 89 * llc_ui_header_len - return length of llc header based on operation 90 * @sk: Socket which contains a valid llc socket type. 91 * @addr: Complete sockaddr_llc structure received from the user. 92 * 93 * Provide the length of the llc header depending on what kind of 94 * operation the user would like to perform and the type of socket. 95 * Returns the correct llc header length. 96 */ 97 static inline u8 llc_ui_header_len(struct sock *sk, struct sockaddr_llc *addr) 98 { 99 u8 rc = LLC_PDU_LEN_U; 100 101 if (addr->sllc_test) 102 rc = LLC_PDU_LEN_U; 103 else if (addr->sllc_xid) 104 /* We need to expand header to sizeof(struct llc_xid_info) 105 * since llc_pdu_init_as_xid_cmd() sets 4,5,6 bytes of LLC header 106 * as XID PDU. In llc_ui_sendmsg() we reserved header size and then 107 * filled all other space with user data. If we won't reserve this 108 * bytes, llc_pdu_init_as_xid_cmd() will overwrite user data 109 */ 110 rc = LLC_PDU_LEN_U_XID; 111 else if (sk->sk_type == SOCK_STREAM) 112 rc = LLC_PDU_LEN_I; 113 return rc; 114 } 115 116 /** 117 * llc_ui_send_data - send data via reliable llc2 connection 118 * @sk: Connection the socket is using. 119 * @skb: Data the user wishes to send. 120 * @noblock: can we block waiting for data? 121 * 122 * Send data via reliable llc2 connection. 123 * Returns 0 upon success, non-zero if action did not succeed. 124 * 125 * This function always consumes a reference to the skb. 126 */ 127 static int llc_ui_send_data(struct sock* sk, struct sk_buff *skb, int noblock) 128 { 129 struct llc_sock* llc = llc_sk(sk); 130 131 if (unlikely(llc_data_accept_state(llc->state) || 132 llc->remote_busy_flag || 133 llc->p_flag)) { 134 long timeout = sock_sndtimeo(sk, noblock); 135 int rc; 136 137 rc = llc_ui_wait_for_busy_core(sk, timeout); 138 if (rc) { 139 kfree_skb(skb); 140 return rc; 141 } 142 } 143 return llc_build_and_send_pkt(sk, skb); 144 } 145 146 static void llc_ui_sk_init(struct socket *sock, struct sock *sk) 147 { 148 sock_graft(sk, sock); 149 sk->sk_type = sock->type; 150 sock->ops = &llc_ui_ops; 151 } 152 153 static struct proto llc_proto = { 154 .name = "LLC", 155 .owner = THIS_MODULE, 156 .obj_size = sizeof(struct llc_sock), 157 .slab_flags = SLAB_TYPESAFE_BY_RCU, 158 }; 159 160 /** 161 * llc_ui_create - alloc and init a new llc_ui socket 162 * @net: network namespace (must be default network) 163 * @sock: Socket to initialize and attach allocated sk to. 164 * @protocol: Unused. 165 * @kern: on behalf of kernel or userspace 166 * 167 * Allocate and initialize a new llc_ui socket, validate the user wants a 168 * socket type we have available. 169 * Returns 0 upon success, negative upon failure. 170 */ 171 static int llc_ui_create(struct net *net, struct socket *sock, int protocol, 172 int kern) 173 { 174 struct sock *sk; 175 int rc = -ESOCKTNOSUPPORT; 176 177 if (!ns_capable(net->user_ns, CAP_NET_RAW)) 178 return -EPERM; 179 180 if (!net_eq(net, &init_net)) 181 return -EAFNOSUPPORT; 182 183 if (likely(sock->type == SOCK_DGRAM || sock->type == SOCK_STREAM)) { 184 rc = -ENOMEM; 185 sk = llc_sk_alloc(net, PF_LLC, GFP_KERNEL, &llc_proto, kern); 186 if (sk) { 187 rc = 0; 188 llc_ui_sk_init(sock, sk); 189 } 190 } 191 return rc; 192 } 193 194 /** 195 * llc_ui_release - shutdown socket 196 * @sock: Socket to release. 197 * 198 * Shutdown and deallocate an existing socket. 199 */ 200 static int llc_ui_release(struct socket *sock) 201 { 202 struct sock *sk = sock->sk; 203 struct llc_sock *llc; 204 205 if (unlikely(sk == NULL)) 206 goto out; 207 sock_hold(sk); 208 lock_sock(sk); 209 llc = llc_sk(sk); 210 dprintk("%s: closing local(%02X) remote(%02X)\n", __func__, 211 llc->laddr.lsap, llc->daddr.lsap); 212 if (!llc_send_disc(sk)) 213 llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo); 214 if (!sock_flag(sk, SOCK_ZAPPED)) { 215 struct llc_sap *sap = llc->sap; 216 217 /* Hold this for release_sock(), so that llc_backlog_rcv() 218 * could still use it. 219 */ 220 llc_sap_hold(sap); 221 llc_sap_remove_socket(llc->sap, sk); 222 release_sock(sk); 223 llc_sap_put(sap); 224 } else { 225 release_sock(sk); 226 } 227 dev_put(llc->dev); 228 sock_put(sk); 229 llc_sk_free(sk); 230 out: 231 return 0; 232 } 233 234 /** 235 * llc_ui_autoport - provide dynamically allocate SAP number 236 * 237 * Provide the caller with a dynamically allocated SAP number according 238 * to the rules that are set in this function. Returns: 0, upon failure, 239 * SAP number otherwise. 240 */ 241 static int llc_ui_autoport(void) 242 { 243 struct llc_sap *sap; 244 int i, tries = 0; 245 246 while (tries < LLC_SAP_DYN_TRIES) { 247 for (i = llc_ui_sap_last_autoport; 248 i < LLC_SAP_DYN_STOP; i += 2) { 249 sap = llc_sap_find(i); 250 if (!sap) { 251 llc_ui_sap_last_autoport = i + 2; 252 goto out; 253 } 254 llc_sap_put(sap); 255 } 256 llc_ui_sap_last_autoport = LLC_SAP_DYN_START; 257 tries++; 258 } 259 i = 0; 260 out: 261 return i; 262 } 263 264 /** 265 * llc_ui_autobind - automatically bind a socket to a sap 266 * @sock: socket to bind 267 * @addr: address to connect to 268 * 269 * Used by llc_ui_connect and llc_ui_sendmsg when the user hasn't 270 * specifically used llc_ui_bind to bind to an specific address/sap 271 * 272 * Returns: 0 upon success, negative otherwise. 273 */ 274 static int llc_ui_autobind(struct socket *sock, struct sockaddr_llc *addr) 275 { 276 struct sock *sk = sock->sk; 277 struct llc_sock *llc = llc_sk(sk); 278 struct llc_sap *sap; 279 int rc = -EINVAL; 280 281 if (!sock_flag(sk, SOCK_ZAPPED)) 282 goto out; 283 if (!addr->sllc_arphrd) 284 addr->sllc_arphrd = ARPHRD_ETHER; 285 if (addr->sllc_arphrd != ARPHRD_ETHER) 286 goto out; 287 rc = -ENODEV; 288 if (sk->sk_bound_dev_if) { 289 llc->dev = dev_get_by_index(&init_net, sk->sk_bound_dev_if); 290 if (llc->dev && addr->sllc_arphrd != llc->dev->type) { 291 dev_put(llc->dev); 292 llc->dev = NULL; 293 } 294 } else 295 llc->dev = dev_getfirstbyhwtype(&init_net, addr->sllc_arphrd); 296 if (!llc->dev) 297 goto out; 298 rc = -EUSERS; 299 llc->laddr.lsap = llc_ui_autoport(); 300 if (!llc->laddr.lsap) 301 goto out; 302 rc = -EBUSY; /* some other network layer is using the sap */ 303 sap = llc_sap_open(llc->laddr.lsap, NULL); 304 if (!sap) 305 goto out; 306 memcpy(llc->laddr.mac, llc->dev->dev_addr, IFHWADDRLEN); 307 memcpy(&llc->addr, addr, sizeof(llc->addr)); 308 /* assign new connection to its SAP */ 309 llc_sap_add_socket(sap, sk); 310 sock_reset_flag(sk, SOCK_ZAPPED); 311 rc = 0; 312 out: 313 return rc; 314 } 315 316 /** 317 * llc_ui_bind - bind a socket to a specific address. 318 * @sock: Socket to bind an address to. 319 * @uaddr: Address the user wants the socket bound to. 320 * @addrlen: Length of the uaddr structure. 321 * 322 * Bind a socket to a specific address. For llc a user is able to bind to 323 * a specific sap only or mac + sap. 324 * If the user desires to bind to a specific mac + sap, it is possible to 325 * have multiple sap connections via multiple macs. 326 * Bind and autobind for that matter must enforce the correct sap usage 327 * otherwise all hell will break loose. 328 * Returns: 0 upon success, negative otherwise. 329 */ 330 static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen) 331 { 332 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr; 333 struct sock *sk = sock->sk; 334 struct llc_sock *llc = llc_sk(sk); 335 struct llc_sap *sap; 336 int rc = -EINVAL; 337 338 lock_sock(sk); 339 if (unlikely(!sock_flag(sk, SOCK_ZAPPED) || addrlen != sizeof(*addr))) 340 goto out; 341 rc = -EAFNOSUPPORT; 342 if (!addr->sllc_arphrd) 343 addr->sllc_arphrd = ARPHRD_ETHER; 344 if (unlikely(addr->sllc_family != AF_LLC || addr->sllc_arphrd != ARPHRD_ETHER)) 345 goto out; 346 dprintk("%s: binding %02X\n", __func__, addr->sllc_sap); 347 rc = -ENODEV; 348 rcu_read_lock(); 349 if (sk->sk_bound_dev_if) { 350 llc->dev = dev_get_by_index_rcu(&init_net, sk->sk_bound_dev_if); 351 if (llc->dev) { 352 if (is_zero_ether_addr(addr->sllc_mac)) 353 memcpy(addr->sllc_mac, llc->dev->dev_addr, 354 IFHWADDRLEN); 355 if (addr->sllc_arphrd != llc->dev->type || 356 !ether_addr_equal(addr->sllc_mac, 357 llc->dev->dev_addr)) { 358 rc = -EINVAL; 359 llc->dev = NULL; 360 } 361 } 362 } else 363 llc->dev = dev_getbyhwaddr_rcu(&init_net, addr->sllc_arphrd, 364 addr->sllc_mac); 365 dev_hold(llc->dev); 366 rcu_read_unlock(); 367 if (!llc->dev) 368 goto out; 369 if (!addr->sllc_sap) { 370 rc = -EUSERS; 371 addr->sllc_sap = llc_ui_autoport(); 372 if (!addr->sllc_sap) 373 goto out; 374 } 375 sap = llc_sap_find(addr->sllc_sap); 376 if (!sap) { 377 sap = llc_sap_open(addr->sllc_sap, NULL); 378 rc = -EBUSY; /* some other network layer is using the sap */ 379 if (!sap) 380 goto out; 381 } else { 382 struct llc_addr laddr, daddr; 383 struct sock *ask; 384 385 memset(&laddr, 0, sizeof(laddr)); 386 memset(&daddr, 0, sizeof(daddr)); 387 /* 388 * FIXME: check if the address is multicast, 389 * only SOCK_DGRAM can do this. 390 */ 391 memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN); 392 laddr.lsap = addr->sllc_sap; 393 rc = -EADDRINUSE; /* mac + sap clash. */ 394 ask = llc_lookup_established(sap, &daddr, &laddr); 395 if (ask) { 396 sock_put(ask); 397 goto out_put; 398 } 399 } 400 llc->laddr.lsap = addr->sllc_sap; 401 memcpy(llc->laddr.mac, addr->sllc_mac, IFHWADDRLEN); 402 memcpy(&llc->addr, addr, sizeof(llc->addr)); 403 /* assign new connection to its SAP */ 404 llc_sap_add_socket(sap, sk); 405 sock_reset_flag(sk, SOCK_ZAPPED); 406 rc = 0; 407 out_put: 408 llc_sap_put(sap); 409 out: 410 release_sock(sk); 411 return rc; 412 } 413 414 /** 415 * llc_ui_shutdown - shutdown a connect llc2 socket. 416 * @sock: Socket to shutdown. 417 * @how: What part of the socket to shutdown. 418 * 419 * Shutdown a connected llc2 socket. Currently this function only supports 420 * shutting down both sends and receives (2), we could probably make this 421 * function such that a user can shutdown only half the connection but not 422 * right now. 423 * Returns: 0 upon success, negative otherwise. 424 */ 425 static int llc_ui_shutdown(struct socket *sock, int how) 426 { 427 struct sock *sk = sock->sk; 428 int rc = -ENOTCONN; 429 430 lock_sock(sk); 431 if (unlikely(sk->sk_state != TCP_ESTABLISHED)) 432 goto out; 433 rc = -EINVAL; 434 if (how != 2) 435 goto out; 436 rc = llc_send_disc(sk); 437 if (!rc) 438 rc = llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo); 439 /* Wake up anyone sleeping in poll */ 440 sk->sk_state_change(sk); 441 out: 442 release_sock(sk); 443 return rc; 444 } 445 446 /** 447 * llc_ui_connect - Connect to a remote llc2 mac + sap. 448 * @sock: Socket which will be connected to the remote destination. 449 * @uaddr: Remote and possibly the local address of the new connection. 450 * @addrlen: Size of uaddr structure. 451 * @flags: Operational flags specified by the user. 452 * 453 * Connect to a remote llc2 mac + sap. The caller must specify the 454 * destination mac and address to connect to. If the user hasn't previously 455 * called bind(2) with a smac the address of the first interface of the 456 * specified arp type will be used. 457 * This function will autobind if user did not previously call bind. 458 * Returns: 0 upon success, negative otherwise. 459 */ 460 static int llc_ui_connect(struct socket *sock, struct sockaddr *uaddr, 461 int addrlen, int flags) 462 { 463 struct sock *sk = sock->sk; 464 struct llc_sock *llc = llc_sk(sk); 465 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr; 466 int rc = -EINVAL; 467 468 lock_sock(sk); 469 if (unlikely(addrlen != sizeof(*addr))) 470 goto out; 471 rc = -EAFNOSUPPORT; 472 if (unlikely(addr->sllc_family != AF_LLC)) 473 goto out; 474 if (unlikely(sk->sk_type != SOCK_STREAM)) 475 goto out; 476 rc = -EALREADY; 477 if (unlikely(sock->state == SS_CONNECTING)) 478 goto out; 479 /* bind connection to sap if user hasn't done it. */ 480 if (sock_flag(sk, SOCK_ZAPPED)) { 481 /* bind to sap with null dev, exclusive */ 482 rc = llc_ui_autobind(sock, addr); 483 if (rc) 484 goto out; 485 } 486 llc->daddr.lsap = addr->sllc_sap; 487 memcpy(llc->daddr.mac, addr->sllc_mac, IFHWADDRLEN); 488 sock->state = SS_CONNECTING; 489 sk->sk_state = TCP_SYN_SENT; 490 llc->link = llc_ui_next_link_no(llc->sap->laddr.lsap); 491 rc = llc_establish_connection(sk, llc->dev->dev_addr, 492 addr->sllc_mac, addr->sllc_sap); 493 if (rc) { 494 dprintk("%s: llc_ui_send_conn failed :-(\n", __func__); 495 sock->state = SS_UNCONNECTED; 496 sk->sk_state = TCP_CLOSE; 497 goto out; 498 } 499 500 if (sk->sk_state == TCP_SYN_SENT) { 501 const long timeo = sock_sndtimeo(sk, flags & O_NONBLOCK); 502 503 if (!timeo || !llc_ui_wait_for_conn(sk, timeo)) 504 goto out; 505 506 rc = sock_intr_errno(timeo); 507 if (signal_pending(current)) 508 goto out; 509 } 510 511 if (sk->sk_state == TCP_CLOSE) 512 goto sock_error; 513 514 sock->state = SS_CONNECTED; 515 rc = 0; 516 out: 517 release_sock(sk); 518 return rc; 519 sock_error: 520 rc = sock_error(sk) ? : -ECONNABORTED; 521 sock->state = SS_UNCONNECTED; 522 goto out; 523 } 524 525 /** 526 * llc_ui_listen - allow a normal socket to accept incoming connections 527 * @sock: Socket to allow incoming connections on. 528 * @backlog: Number of connections to queue. 529 * 530 * Allow a normal socket to accept incoming connections. 531 * Returns 0 upon success, negative otherwise. 532 */ 533 static int llc_ui_listen(struct socket *sock, int backlog) 534 { 535 struct sock *sk = sock->sk; 536 int rc = -EINVAL; 537 538 lock_sock(sk); 539 if (unlikely(sock->state != SS_UNCONNECTED)) 540 goto out; 541 rc = -EOPNOTSUPP; 542 if (unlikely(sk->sk_type != SOCK_STREAM)) 543 goto out; 544 rc = -EAGAIN; 545 if (sock_flag(sk, SOCK_ZAPPED)) 546 goto out; 547 rc = 0; 548 if (!(unsigned int)backlog) /* BSDism */ 549 backlog = 1; 550 sk->sk_max_ack_backlog = backlog; 551 if (sk->sk_state != TCP_LISTEN) { 552 sk->sk_ack_backlog = 0; 553 sk->sk_state = TCP_LISTEN; 554 } 555 sk->sk_socket->flags |= __SO_ACCEPTCON; 556 out: 557 release_sock(sk); 558 return rc; 559 } 560 561 static int llc_ui_wait_for_disc(struct sock *sk, long timeout) 562 { 563 DEFINE_WAIT_FUNC(wait, woken_wake_function); 564 int rc = 0; 565 566 add_wait_queue(sk_sleep(sk), &wait); 567 while (1) { 568 if (sk_wait_event(sk, &timeout, sk->sk_state == TCP_CLOSE, &wait)) 569 break; 570 rc = -ERESTARTSYS; 571 if (signal_pending(current)) 572 break; 573 rc = -EAGAIN; 574 if (!timeout) 575 break; 576 rc = 0; 577 } 578 remove_wait_queue(sk_sleep(sk), &wait); 579 return rc; 580 } 581 582 static bool llc_ui_wait_for_conn(struct sock *sk, long timeout) 583 { 584 DEFINE_WAIT_FUNC(wait, woken_wake_function); 585 586 add_wait_queue(sk_sleep(sk), &wait); 587 while (1) { 588 if (sk_wait_event(sk, &timeout, sk->sk_state != TCP_SYN_SENT, &wait)) 589 break; 590 if (signal_pending(current) || !timeout) 591 break; 592 } 593 remove_wait_queue(sk_sleep(sk), &wait); 594 return timeout; 595 } 596 597 static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout) 598 { 599 DEFINE_WAIT_FUNC(wait, woken_wake_function); 600 struct llc_sock *llc = llc_sk(sk); 601 int rc; 602 603 add_wait_queue(sk_sleep(sk), &wait); 604 while (1) { 605 rc = 0; 606 if (sk_wait_event(sk, &timeout, 607 (sk->sk_shutdown & RCV_SHUTDOWN) || 608 (!llc_data_accept_state(llc->state) && 609 !llc->remote_busy_flag && 610 !llc->p_flag), &wait)) 611 break; 612 rc = -ERESTARTSYS; 613 if (signal_pending(current)) 614 break; 615 rc = -EAGAIN; 616 if (!timeout) 617 break; 618 } 619 remove_wait_queue(sk_sleep(sk), &wait); 620 return rc; 621 } 622 623 static int llc_wait_data(struct sock *sk, long timeo) 624 { 625 int rc; 626 627 while (1) { 628 /* 629 * POSIX 1003.1g mandates this order. 630 */ 631 rc = sock_error(sk); 632 if (rc) 633 break; 634 rc = 0; 635 if (sk->sk_shutdown & RCV_SHUTDOWN) 636 break; 637 rc = -EAGAIN; 638 if (!timeo) 639 break; 640 rc = sock_intr_errno(timeo); 641 if (signal_pending(current)) 642 break; 643 rc = 0; 644 if (sk_wait_data(sk, &timeo, NULL)) 645 break; 646 } 647 return rc; 648 } 649 650 static void llc_cmsg_rcv(struct msghdr *msg, struct sk_buff *skb) 651 { 652 struct llc_sock *llc = llc_sk(skb->sk); 653 654 if (llc->cmsg_flags & LLC_CMSG_PKTINFO) { 655 struct llc_pktinfo info; 656 657 memset(&info, 0, sizeof(info)); 658 info.lpi_ifindex = llc_sk(skb->sk)->dev->ifindex; 659 llc_pdu_decode_dsap(skb, &info.lpi_sap); 660 llc_pdu_decode_da(skb, info.lpi_mac); 661 put_cmsg(msg, SOL_LLC, LLC_OPT_PKTINFO, sizeof(info), &info); 662 } 663 } 664 665 /** 666 * llc_ui_accept - accept a new incoming connection. 667 * @sock: Socket which connections arrive on. 668 * @newsock: Socket to move incoming connection to. 669 * @flags: User specified operational flags. 670 * @kern: If the socket is kernel internal 671 * 672 * Accept a new incoming connection. 673 * Returns 0 upon success, negative otherwise. 674 */ 675 static int llc_ui_accept(struct socket *sock, struct socket *newsock, int flags, 676 bool kern) 677 { 678 struct sock *sk = sock->sk, *newsk; 679 struct llc_sock *llc, *newllc; 680 struct sk_buff *skb; 681 int rc = -EOPNOTSUPP; 682 683 dprintk("%s: accepting on %02X\n", __func__, 684 llc_sk(sk)->laddr.lsap); 685 lock_sock(sk); 686 if (unlikely(sk->sk_type != SOCK_STREAM)) 687 goto out; 688 rc = -EINVAL; 689 if (unlikely(sock->state != SS_UNCONNECTED || 690 sk->sk_state != TCP_LISTEN)) 691 goto out; 692 /* wait for a connection to arrive. */ 693 if (skb_queue_empty(&sk->sk_receive_queue)) { 694 rc = llc_wait_data(sk, sk->sk_rcvtimeo); 695 if (rc) 696 goto out; 697 } 698 dprintk("%s: got a new connection on %02X\n", __func__, 699 llc_sk(sk)->laddr.lsap); 700 skb = skb_dequeue(&sk->sk_receive_queue); 701 rc = -EINVAL; 702 if (!skb->sk) 703 goto frees; 704 rc = 0; 705 newsk = skb->sk; 706 /* attach connection to a new socket. */ 707 llc_ui_sk_init(newsock, newsk); 708 sock_reset_flag(newsk, SOCK_ZAPPED); 709 newsk->sk_state = TCP_ESTABLISHED; 710 newsock->state = SS_CONNECTED; 711 llc = llc_sk(sk); 712 newllc = llc_sk(newsk); 713 memcpy(&newllc->addr, &llc->addr, sizeof(newllc->addr)); 714 newllc->link = llc_ui_next_link_no(newllc->laddr.lsap); 715 716 /* put original socket back into a clean listen state. */ 717 sk->sk_state = TCP_LISTEN; 718 sk_acceptq_removed(sk); 719 dprintk("%s: ok success on %02X, client on %02X\n", __func__, 720 llc_sk(sk)->addr.sllc_sap, newllc->daddr.lsap); 721 frees: 722 kfree_skb(skb); 723 out: 724 release_sock(sk); 725 return rc; 726 } 727 728 /** 729 * llc_ui_recvmsg - copy received data to the socket user. 730 * @sock: Socket to copy data from. 731 * @msg: Various user space related information. 732 * @len: Size of user buffer. 733 * @flags: User specified flags. 734 * 735 * Copy received data to the socket user. 736 * Returns non-negative upon success, negative otherwise. 737 */ 738 static int llc_ui_recvmsg(struct socket *sock, struct msghdr *msg, size_t len, 739 int flags) 740 { 741 DECLARE_SOCKADDR(struct sockaddr_llc *, uaddr, msg->msg_name); 742 const int nonblock = flags & MSG_DONTWAIT; 743 struct sk_buff *skb = NULL; 744 struct sock *sk = sock->sk; 745 struct llc_sock *llc = llc_sk(sk); 746 size_t copied = 0; 747 u32 peek_seq = 0; 748 u32 *seq, skb_len; 749 unsigned long used; 750 int target; /* Read at least this many bytes */ 751 long timeo; 752 753 lock_sock(sk); 754 copied = -ENOTCONN; 755 if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN)) 756 goto out; 757 758 timeo = sock_rcvtimeo(sk, nonblock); 759 760 seq = &llc->copied_seq; 761 if (flags & MSG_PEEK) { 762 peek_seq = llc->copied_seq; 763 seq = &peek_seq; 764 } 765 766 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len); 767 copied = 0; 768 769 do { 770 u32 offset; 771 772 /* 773 * We need to check signals first, to get correct SIGURG 774 * handling. FIXME: Need to check this doesn't impact 1003.1g 775 * and move it down to the bottom of the loop 776 */ 777 if (signal_pending(current)) { 778 if (copied) 779 break; 780 copied = timeo ? sock_intr_errno(timeo) : -EAGAIN; 781 break; 782 } 783 784 /* Next get a buffer. */ 785 786 skb = skb_peek(&sk->sk_receive_queue); 787 if (skb) { 788 offset = *seq; 789 goto found_ok_skb; 790 } 791 /* Well, if we have backlog, try to process it now yet. */ 792 793 if (copied >= target && !READ_ONCE(sk->sk_backlog.tail)) 794 break; 795 796 if (copied) { 797 if (sk->sk_err || 798 sk->sk_state == TCP_CLOSE || 799 (sk->sk_shutdown & RCV_SHUTDOWN) || 800 !timeo || 801 (flags & MSG_PEEK)) 802 break; 803 } else { 804 if (sock_flag(sk, SOCK_DONE)) 805 break; 806 807 if (sk->sk_err) { 808 copied = sock_error(sk); 809 break; 810 } 811 if (sk->sk_shutdown & RCV_SHUTDOWN) 812 break; 813 814 if (sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_CLOSE) { 815 if (!sock_flag(sk, SOCK_DONE)) { 816 /* 817 * This occurs when user tries to read 818 * from never connected socket. 819 */ 820 copied = -ENOTCONN; 821 break; 822 } 823 break; 824 } 825 if (!timeo) { 826 copied = -EAGAIN; 827 break; 828 } 829 } 830 831 if (copied >= target) { /* Do not sleep, just process backlog. */ 832 release_sock(sk); 833 lock_sock(sk); 834 } else 835 sk_wait_data(sk, &timeo, NULL); 836 837 if ((flags & MSG_PEEK) && peek_seq != llc->copied_seq) { 838 net_dbg_ratelimited("LLC(%s:%d): Application bug, race in MSG_PEEK\n", 839 current->comm, 840 task_pid_nr(current)); 841 peek_seq = llc->copied_seq; 842 } 843 continue; 844 found_ok_skb: 845 skb_len = skb->len; 846 /* Ok so how much can we use? */ 847 used = skb->len - offset; 848 if (len < used) 849 used = len; 850 851 if (!(flags & MSG_TRUNC)) { 852 int rc = skb_copy_datagram_msg(skb, offset, msg, used); 853 if (rc) { 854 /* Exception. Bailout! */ 855 if (!copied) 856 copied = -EFAULT; 857 break; 858 } 859 } 860 861 *seq += used; 862 copied += used; 863 len -= used; 864 865 /* For non stream protcols we get one packet per recvmsg call */ 866 if (sk->sk_type != SOCK_STREAM) 867 goto copy_uaddr; 868 869 if (!(flags & MSG_PEEK)) { 870 skb_unlink(skb, &sk->sk_receive_queue); 871 kfree_skb(skb); 872 *seq = 0; 873 } 874 875 /* Partial read */ 876 if (used + offset < skb_len) 877 continue; 878 } while (len > 0); 879 880 out: 881 release_sock(sk); 882 return copied; 883 copy_uaddr: 884 if (uaddr != NULL && skb != NULL) { 885 memcpy(uaddr, llc_ui_skb_cb(skb), sizeof(*uaddr)); 886 msg->msg_namelen = sizeof(*uaddr); 887 } 888 if (llc_sk(sk)->cmsg_flags) 889 llc_cmsg_rcv(msg, skb); 890 891 if (!(flags & MSG_PEEK)) { 892 skb_unlink(skb, &sk->sk_receive_queue); 893 kfree_skb(skb); 894 *seq = 0; 895 } 896 897 goto out; 898 } 899 900 /** 901 * llc_ui_sendmsg - Transmit data provided by the socket user. 902 * @sock: Socket to transmit data from. 903 * @msg: Various user related information. 904 * @len: Length of data to transmit. 905 * 906 * Transmit data provided by the socket user. 907 * Returns non-negative upon success, negative otherwise. 908 */ 909 static int llc_ui_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) 910 { 911 struct sock *sk = sock->sk; 912 struct llc_sock *llc = llc_sk(sk); 913 DECLARE_SOCKADDR(struct sockaddr_llc *, addr, msg->msg_name); 914 int flags = msg->msg_flags; 915 int noblock = flags & MSG_DONTWAIT; 916 struct sk_buff *skb = NULL; 917 size_t size = 0; 918 int rc = -EINVAL, copied = 0, hdrlen; 919 920 dprintk("%s: sending from %02X to %02X\n", __func__, 921 llc->laddr.lsap, llc->daddr.lsap); 922 lock_sock(sk); 923 if (addr) { 924 if (msg->msg_namelen < sizeof(*addr)) 925 goto out; 926 } else { 927 if (llc_ui_addr_null(&llc->addr)) 928 goto out; 929 addr = &llc->addr; 930 } 931 /* must bind connection to sap if user hasn't done it. */ 932 if (sock_flag(sk, SOCK_ZAPPED)) { 933 /* bind to sap with null dev, exclusive. */ 934 rc = llc_ui_autobind(sock, addr); 935 if (rc) 936 goto out; 937 } 938 hdrlen = llc->dev->hard_header_len + llc_ui_header_len(sk, addr); 939 size = hdrlen + len; 940 if (size > llc->dev->mtu) 941 size = llc->dev->mtu; 942 copied = size - hdrlen; 943 rc = -EINVAL; 944 if (copied < 0) 945 goto out; 946 release_sock(sk); 947 skb = sock_alloc_send_skb(sk, size, noblock, &rc); 948 lock_sock(sk); 949 if (!skb) 950 goto out; 951 skb->dev = llc->dev; 952 skb->protocol = llc_proto_type(addr->sllc_arphrd); 953 skb_reserve(skb, hdrlen); 954 rc = memcpy_from_msg(skb_put(skb, copied), msg, copied); 955 if (rc) 956 goto out; 957 if (sk->sk_type == SOCK_DGRAM || addr->sllc_ua) { 958 llc_build_and_send_ui_pkt(llc->sap, skb, addr->sllc_mac, 959 addr->sllc_sap); 960 skb = NULL; 961 goto out; 962 } 963 if (addr->sllc_test) { 964 llc_build_and_send_test_pkt(llc->sap, skb, addr->sllc_mac, 965 addr->sllc_sap); 966 skb = NULL; 967 goto out; 968 } 969 if (addr->sllc_xid) { 970 llc_build_and_send_xid_pkt(llc->sap, skb, addr->sllc_mac, 971 addr->sllc_sap); 972 skb = NULL; 973 goto out; 974 } 975 rc = -ENOPROTOOPT; 976 if (!(sk->sk_type == SOCK_STREAM && !addr->sllc_ua)) 977 goto out; 978 rc = llc_ui_send_data(sk, skb, noblock); 979 skb = NULL; 980 out: 981 kfree_skb(skb); 982 if (rc) 983 dprintk("%s: failed sending from %02X to %02X: %d\n", 984 __func__, llc->laddr.lsap, llc->daddr.lsap, rc); 985 release_sock(sk); 986 return rc ? : copied; 987 } 988 989 /** 990 * llc_ui_getname - return the address info of a socket 991 * @sock: Socket to get address of. 992 * @uaddr: Address structure to return information. 993 * @peer: Does user want local or remote address information. 994 * 995 * Return the address information of a socket. 996 */ 997 static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr, 998 int peer) 999 { 1000 struct sockaddr_llc sllc; 1001 struct sock *sk = sock->sk; 1002 struct llc_sock *llc = llc_sk(sk); 1003 int rc = -EBADF; 1004 1005 memset(&sllc, 0, sizeof(sllc)); 1006 lock_sock(sk); 1007 if (sock_flag(sk, SOCK_ZAPPED)) 1008 goto out; 1009 if (peer) { 1010 rc = -ENOTCONN; 1011 if (sk->sk_state != TCP_ESTABLISHED) 1012 goto out; 1013 if(llc->dev) 1014 sllc.sllc_arphrd = llc->dev->type; 1015 sllc.sllc_sap = llc->daddr.lsap; 1016 memcpy(&sllc.sllc_mac, &llc->daddr.mac, IFHWADDRLEN); 1017 } else { 1018 rc = -EINVAL; 1019 if (!llc->sap) 1020 goto out; 1021 sllc.sllc_sap = llc->sap->laddr.lsap; 1022 1023 if (llc->dev) { 1024 sllc.sllc_arphrd = llc->dev->type; 1025 memcpy(&sllc.sllc_mac, llc->dev->dev_addr, 1026 IFHWADDRLEN); 1027 } 1028 } 1029 sllc.sllc_family = AF_LLC; 1030 memcpy(uaddr, &sllc, sizeof(sllc)); 1031 rc = sizeof(sllc); 1032 out: 1033 release_sock(sk); 1034 return rc; 1035 } 1036 1037 /** 1038 * llc_ui_ioctl - io controls for PF_LLC 1039 * @sock: Socket to get/set info 1040 * @cmd: command 1041 * @arg: optional argument for cmd 1042 * 1043 * get/set info on llc sockets 1044 */ 1045 static int llc_ui_ioctl(struct socket *sock, unsigned int cmd, 1046 unsigned long arg) 1047 { 1048 return -ENOIOCTLCMD; 1049 } 1050 1051 /** 1052 * llc_ui_setsockopt - set various connection specific parameters. 1053 * @sock: Socket to set options on. 1054 * @level: Socket level user is requesting operations on. 1055 * @optname: Operation name. 1056 * @optval: User provided operation data. 1057 * @optlen: Length of optval. 1058 * 1059 * Set various connection specific parameters. 1060 */ 1061 static int llc_ui_setsockopt(struct socket *sock, int level, int optname, 1062 sockptr_t optval, unsigned int optlen) 1063 { 1064 struct sock *sk = sock->sk; 1065 struct llc_sock *llc = llc_sk(sk); 1066 unsigned int opt; 1067 int rc = -EINVAL; 1068 1069 lock_sock(sk); 1070 if (unlikely(level != SOL_LLC || optlen != sizeof(int))) 1071 goto out; 1072 rc = copy_from_sockptr(&opt, optval, sizeof(opt)); 1073 if (rc) 1074 goto out; 1075 rc = -EINVAL; 1076 switch (optname) { 1077 case LLC_OPT_RETRY: 1078 if (opt > LLC_OPT_MAX_RETRY) 1079 goto out; 1080 llc->n2 = opt; 1081 break; 1082 case LLC_OPT_SIZE: 1083 if (opt > LLC_OPT_MAX_SIZE) 1084 goto out; 1085 llc->n1 = opt; 1086 break; 1087 case LLC_OPT_ACK_TMR_EXP: 1088 if (opt > LLC_OPT_MAX_ACK_TMR_EXP) 1089 goto out; 1090 llc->ack_timer.expire = opt * HZ; 1091 break; 1092 case LLC_OPT_P_TMR_EXP: 1093 if (opt > LLC_OPT_MAX_P_TMR_EXP) 1094 goto out; 1095 llc->pf_cycle_timer.expire = opt * HZ; 1096 break; 1097 case LLC_OPT_REJ_TMR_EXP: 1098 if (opt > LLC_OPT_MAX_REJ_TMR_EXP) 1099 goto out; 1100 llc->rej_sent_timer.expire = opt * HZ; 1101 break; 1102 case LLC_OPT_BUSY_TMR_EXP: 1103 if (opt > LLC_OPT_MAX_BUSY_TMR_EXP) 1104 goto out; 1105 llc->busy_state_timer.expire = opt * HZ; 1106 break; 1107 case LLC_OPT_TX_WIN: 1108 if (opt > LLC_OPT_MAX_WIN) 1109 goto out; 1110 llc->k = opt; 1111 break; 1112 case LLC_OPT_RX_WIN: 1113 if (opt > LLC_OPT_MAX_WIN) 1114 goto out; 1115 llc->rw = opt; 1116 break; 1117 case LLC_OPT_PKTINFO: 1118 if (opt) 1119 llc->cmsg_flags |= LLC_CMSG_PKTINFO; 1120 else 1121 llc->cmsg_flags &= ~LLC_CMSG_PKTINFO; 1122 break; 1123 default: 1124 rc = -ENOPROTOOPT; 1125 goto out; 1126 } 1127 rc = 0; 1128 out: 1129 release_sock(sk); 1130 return rc; 1131 } 1132 1133 /** 1134 * llc_ui_getsockopt - get connection specific socket info 1135 * @sock: Socket to get information from. 1136 * @level: Socket level user is requesting operations on. 1137 * @optname: Operation name. 1138 * @optval: Variable to return operation data in. 1139 * @optlen: Length of optval. 1140 * 1141 * Get connection specific socket information. 1142 */ 1143 static int llc_ui_getsockopt(struct socket *sock, int level, int optname, 1144 char __user *optval, int __user *optlen) 1145 { 1146 struct sock *sk = sock->sk; 1147 struct llc_sock *llc = llc_sk(sk); 1148 int val = 0, len = 0, rc = -EINVAL; 1149 1150 lock_sock(sk); 1151 if (unlikely(level != SOL_LLC)) 1152 goto out; 1153 rc = get_user(len, optlen); 1154 if (rc) 1155 goto out; 1156 rc = -EINVAL; 1157 if (len != sizeof(int)) 1158 goto out; 1159 switch (optname) { 1160 case LLC_OPT_RETRY: 1161 val = llc->n2; break; 1162 case LLC_OPT_SIZE: 1163 val = llc->n1; break; 1164 case LLC_OPT_ACK_TMR_EXP: 1165 val = llc->ack_timer.expire / HZ; break; 1166 case LLC_OPT_P_TMR_EXP: 1167 val = llc->pf_cycle_timer.expire / HZ; break; 1168 case LLC_OPT_REJ_TMR_EXP: 1169 val = llc->rej_sent_timer.expire / HZ; break; 1170 case LLC_OPT_BUSY_TMR_EXP: 1171 val = llc->busy_state_timer.expire / HZ; break; 1172 case LLC_OPT_TX_WIN: 1173 val = llc->k; break; 1174 case LLC_OPT_RX_WIN: 1175 val = llc->rw; break; 1176 case LLC_OPT_PKTINFO: 1177 val = (llc->cmsg_flags & LLC_CMSG_PKTINFO) != 0; 1178 break; 1179 default: 1180 rc = -ENOPROTOOPT; 1181 goto out; 1182 } 1183 rc = 0; 1184 if (put_user(len, optlen) || copy_to_user(optval, &val, len)) 1185 rc = -EFAULT; 1186 out: 1187 release_sock(sk); 1188 return rc; 1189 } 1190 1191 static const struct net_proto_family llc_ui_family_ops = { 1192 .family = PF_LLC, 1193 .create = llc_ui_create, 1194 .owner = THIS_MODULE, 1195 }; 1196 1197 static const struct proto_ops llc_ui_ops = { 1198 .family = PF_LLC, 1199 .owner = THIS_MODULE, 1200 .release = llc_ui_release, 1201 .bind = llc_ui_bind, 1202 .connect = llc_ui_connect, 1203 .socketpair = sock_no_socketpair, 1204 .accept = llc_ui_accept, 1205 .getname = llc_ui_getname, 1206 .poll = datagram_poll, 1207 .ioctl = llc_ui_ioctl, 1208 .listen = llc_ui_listen, 1209 .shutdown = llc_ui_shutdown, 1210 .setsockopt = llc_ui_setsockopt, 1211 .getsockopt = llc_ui_getsockopt, 1212 .sendmsg = llc_ui_sendmsg, 1213 .recvmsg = llc_ui_recvmsg, 1214 .mmap = sock_no_mmap, 1215 .sendpage = sock_no_sendpage, 1216 }; 1217 1218 static const char llc_proc_err_msg[] __initconst = 1219 KERN_CRIT "LLC: Unable to register the proc_fs entries\n"; 1220 static const char llc_sysctl_err_msg[] __initconst = 1221 KERN_CRIT "LLC: Unable to register the sysctl entries\n"; 1222 static const char llc_sock_err_msg[] __initconst = 1223 KERN_CRIT "LLC: Unable to register the network family\n"; 1224 1225 static int __init llc2_init(void) 1226 { 1227 int rc = proto_register(&llc_proto, 0); 1228 1229 if (rc != 0) 1230 goto out; 1231 1232 llc_build_offset_table(); 1233 llc_station_init(); 1234 llc_ui_sap_last_autoport = LLC_SAP_DYN_START; 1235 rc = llc_proc_init(); 1236 if (rc != 0) { 1237 printk(llc_proc_err_msg); 1238 goto out_station; 1239 } 1240 rc = llc_sysctl_init(); 1241 if (rc) { 1242 printk(llc_sysctl_err_msg); 1243 goto out_proc; 1244 } 1245 rc = sock_register(&llc_ui_family_ops); 1246 if (rc) { 1247 printk(llc_sock_err_msg); 1248 goto out_sysctl; 1249 } 1250 llc_add_pack(LLC_DEST_SAP, llc_sap_handler); 1251 llc_add_pack(LLC_DEST_CONN, llc_conn_handler); 1252 out: 1253 return rc; 1254 out_sysctl: 1255 llc_sysctl_exit(); 1256 out_proc: 1257 llc_proc_exit(); 1258 out_station: 1259 llc_station_exit(); 1260 proto_unregister(&llc_proto); 1261 goto out; 1262 } 1263 1264 static void __exit llc2_exit(void) 1265 { 1266 llc_station_exit(); 1267 llc_remove_pack(LLC_DEST_SAP); 1268 llc_remove_pack(LLC_DEST_CONN); 1269 sock_unregister(PF_LLC); 1270 llc_proc_exit(); 1271 llc_sysctl_exit(); 1272 proto_unregister(&llc_proto); 1273 } 1274 1275 module_init(llc2_init); 1276 module_exit(llc2_exit); 1277 1278 MODULE_LICENSE("GPL"); 1279 MODULE_AUTHOR("Procom 1997, Jay Schullist 2001, Arnaldo C. Melo 2001-2003"); 1280 MODULE_DESCRIPTION("IEEE 802.2 PF_LLC support"); 1281 MODULE_ALIAS_NETPROTO(PF_LLC); 1282