2019-05-29 21:17:58 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2016-05-06 21:09:08 +07:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2015, Sony Mobile Communications Inc.
|
|
|
|
* Copyright (c) 2013, The Linux Foundation. All rights reserved.
|
|
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/netlink.h>
|
|
|
|
#include <linux/qrtr.h>
|
|
|
|
#include <linux/termios.h> /* For TIOCINQ/OUTQ */
|
2019-03-06 06:42:58 +07:00
|
|
|
#include <linux/numa.h>
|
2020-01-14 14:57:01 +07:00
|
|
|
#include <linux/spinlock.h>
|
2020-01-14 14:57:00 +07:00
|
|
|
#include <linux/wait.h>
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
#include <net/sock.h>
|
|
|
|
|
|
|
|
#include "qrtr.h"
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
#define QRTR_PROTO_VER_1 1
|
|
|
|
#define QRTR_PROTO_VER_2 3
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
/* auto-bind range */
|
|
|
|
#define QRTR_MIN_EPH_SOCKET 0x4000
|
|
|
|
#define QRTR_MAX_EPH_SOCKET 0x7fff
|
|
|
|
|
|
|
|
/**
|
2017-10-11 13:45:23 +07:00
|
|
|
* struct qrtr_hdr_v1 - (I|R)PCrouter packet header version 1
|
2016-05-06 21:09:08 +07:00
|
|
|
* @version: protocol version
|
|
|
|
* @type: packet type; one of QRTR_TYPE_*
|
|
|
|
* @src_node_id: source node
|
|
|
|
* @src_port_id: source port
|
|
|
|
* @confirm_rx: boolean; whether a resume-tx packet should be send in reply
|
|
|
|
* @size: length of packet, excluding this header
|
|
|
|
* @dst_node_id: destination node
|
|
|
|
* @dst_port_id: destination port
|
|
|
|
*/
|
2017-10-11 13:45:23 +07:00
|
|
|
struct qrtr_hdr_v1 {
|
2016-05-06 21:09:08 +07:00
|
|
|
__le32 version;
|
|
|
|
__le32 type;
|
|
|
|
__le32 src_node_id;
|
|
|
|
__le32 src_port_id;
|
|
|
|
__le32 confirm_rx;
|
|
|
|
__le32 size;
|
|
|
|
__le32 dst_node_id;
|
|
|
|
__le32 dst_port_id;
|
|
|
|
} __packed;
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
/**
|
|
|
|
* struct qrtr_hdr_v2 - (I|R)PCrouter packet header later versions
|
|
|
|
* @version: protocol version
|
|
|
|
* @type: packet type; one of QRTR_TYPE_*
|
|
|
|
* @flags: bitmask of QRTR_FLAGS_*
|
|
|
|
* @optlen: length of optional header data
|
|
|
|
* @size: length of packet, excluding this header and optlen
|
|
|
|
* @src_node_id: source node
|
|
|
|
* @src_port_id: source port
|
|
|
|
* @dst_node_id: destination node
|
|
|
|
* @dst_port_id: destination port
|
|
|
|
*/
|
|
|
|
struct qrtr_hdr_v2 {
|
|
|
|
u8 version;
|
|
|
|
u8 type;
|
|
|
|
u8 flags;
|
|
|
|
u8 optlen;
|
|
|
|
__le32 size;
|
|
|
|
__le16 src_node_id;
|
|
|
|
__le16 src_port_id;
|
|
|
|
__le16 dst_node_id;
|
|
|
|
__le16 dst_port_id;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define QRTR_FLAGS_CONFIRM_RX BIT(0)
|
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
struct qrtr_cb {
|
|
|
|
u32 src_node;
|
|
|
|
u32 src_port;
|
|
|
|
u32 dst_node;
|
|
|
|
u32 dst_port;
|
|
|
|
|
|
|
|
u8 type;
|
|
|
|
u8 confirm_rx;
|
|
|
|
};
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
#define QRTR_HDR_MAX_SIZE max_t(size_t, sizeof(struct qrtr_hdr_v1), \
|
|
|
|
sizeof(struct qrtr_hdr_v2))
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
struct qrtr_sock {
|
|
|
|
/* WARNING: sk must be the first member */
|
|
|
|
struct sock sk;
|
|
|
|
struct sockaddr_qrtr us;
|
|
|
|
struct sockaddr_qrtr peer;
|
|
|
|
};
|
|
|
|
|
|
|
|
static inline struct qrtr_sock *qrtr_sk(struct sock *sk)
|
|
|
|
{
|
|
|
|
BUILD_BUG_ON(offsetof(struct qrtr_sock, sk) != 0);
|
|
|
|
return container_of(sk, struct qrtr_sock, sk);
|
|
|
|
}
|
|
|
|
|
2019-03-06 06:42:58 +07:00
|
|
|
static unsigned int qrtr_local_nid = NUMA_NO_NODE;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
/* for node ids */
|
2020-01-14 14:57:01 +07:00
|
|
|
static RADIX_TREE(qrtr_nodes, GFP_ATOMIC);
|
|
|
|
static DEFINE_SPINLOCK(qrtr_nodes_lock);
|
2016-05-06 21:09:08 +07:00
|
|
|
/* broadcast list */
|
|
|
|
static LIST_HEAD(qrtr_all_nodes);
|
2020-01-14 14:57:01 +07:00
|
|
|
/* lock for qrtr_all_nodes and node reference */
|
2016-05-06 21:09:08 +07:00
|
|
|
static DEFINE_MUTEX(qrtr_node_lock);
|
|
|
|
|
|
|
|
/* local port allocation management */
|
|
|
|
static DEFINE_IDR(qrtr_ports);
|
|
|
|
static DEFINE_MUTEX(qrtr_port_lock);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct qrtr_node - endpoint node
|
|
|
|
* @ep_lock: lock for endpoint management and callbacks
|
|
|
|
* @ep: endpoint
|
|
|
|
* @ref: reference count for node
|
|
|
|
* @nid: node id
|
2020-01-14 14:57:00 +07:00
|
|
|
* @qrtr_tx_flow: tree of qrtr_tx_flow, keyed by node << 32 | port
|
|
|
|
* @qrtr_tx_lock: lock for qrtr_tx_flow inserts
|
2016-05-06 21:09:08 +07:00
|
|
|
* @rx_queue: receive queue
|
|
|
|
* @work: scheduled work struct for recv work
|
|
|
|
* @item: list item for broadcast list
|
|
|
|
*/
|
|
|
|
struct qrtr_node {
|
|
|
|
struct mutex ep_lock;
|
|
|
|
struct qrtr_endpoint *ep;
|
|
|
|
struct kref ref;
|
|
|
|
unsigned int nid;
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
struct radix_tree_root qrtr_tx_flow;
|
|
|
|
struct mutex qrtr_tx_lock; /* for qrtr_tx_flow */
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
struct sk_buff_head rx_queue;
|
|
|
|
struct work_struct work;
|
|
|
|
struct list_head item;
|
|
|
|
};
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
/**
|
|
|
|
* struct qrtr_tx_flow - tx flow control
|
|
|
|
* @resume_tx: waiters for a resume tx from the remote
|
|
|
|
* @pending: number of waiting senders
|
|
|
|
* @tx_failed: indicates that a message with confirm_rx flag was lost
|
|
|
|
*/
|
|
|
|
struct qrtr_tx_flow {
|
|
|
|
struct wait_queue_head resume_tx;
|
|
|
|
int pending;
|
|
|
|
int tx_failed;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define QRTR_TX_FLOW_HIGH 10
|
|
|
|
#define QRTR_TX_FLOW_LOW 5
|
|
|
|
|
2017-10-11 13:45:20 +07:00
|
|
|
static int qrtr_local_enqueue(struct qrtr_node *node, struct sk_buff *skb,
|
|
|
|
int type, struct sockaddr_qrtr *from,
|
|
|
|
struct sockaddr_qrtr *to);
|
|
|
|
static int qrtr_bcast_enqueue(struct qrtr_node *node, struct sk_buff *skb,
|
|
|
|
int type, struct sockaddr_qrtr *from,
|
|
|
|
struct sockaddr_qrtr *to);
|
2017-06-08 04:07:37 +07:00
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
/* Release node resources and free the node.
|
|
|
|
*
|
|
|
|
* Do not call directly, use qrtr_node_release. To be used with
|
|
|
|
* kref_put_mutex. As such, the node mutex is expected to be locked on call.
|
|
|
|
*/
|
|
|
|
static void __qrtr_node_release(struct kref *kref)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node = container_of(kref, struct qrtr_node, ref);
|
2020-01-14 14:57:00 +07:00
|
|
|
struct radix_tree_iter iter;
|
2020-01-14 14:57:01 +07:00
|
|
|
unsigned long flags;
|
2020-01-14 14:57:00 +07:00
|
|
|
void __rcu **slot;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_lock_irqsave(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (node->nid != QRTR_EP_NID_AUTO)
|
|
|
|
radix_tree_delete(&qrtr_nodes, node->nid);
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_unlock_irqrestore(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
list_del(&node->item);
|
|
|
|
mutex_unlock(&qrtr_node_lock);
|
|
|
|
|
2019-09-19 00:21:17 +07:00
|
|
|
cancel_work_sync(&node->work);
|
2016-05-06 21:09:08 +07:00
|
|
|
skb_queue_purge(&node->rx_queue);
|
2020-01-14 14:57:00 +07:00
|
|
|
|
|
|
|
/* Free tx flow counters */
|
|
|
|
radix_tree_for_each_slot(slot, &node->qrtr_tx_flow, &iter, 0) {
|
|
|
|
radix_tree_iter_delete(&node->qrtr_tx_flow, &iter, slot);
|
|
|
|
kfree(*slot);
|
|
|
|
}
|
2016-05-06 21:09:08 +07:00
|
|
|
kfree(node);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Increment reference to node. */
|
|
|
|
static struct qrtr_node *qrtr_node_acquire(struct qrtr_node *node)
|
|
|
|
{
|
|
|
|
if (node)
|
|
|
|
kref_get(&node->ref);
|
|
|
|
return node;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Decrement reference to node and release as necessary. */
|
|
|
|
static void qrtr_node_release(struct qrtr_node *node)
|
|
|
|
{
|
|
|
|
if (!node)
|
|
|
|
return;
|
|
|
|
kref_put_mutex(&node->ref, __qrtr_node_release, &qrtr_node_lock);
|
|
|
|
}
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
/**
|
|
|
|
* qrtr_tx_resume() - reset flow control counter
|
|
|
|
* @node: qrtr_node that the QRTR_TYPE_RESUME_TX packet arrived on
|
|
|
|
* @skb: resume_tx packet
|
|
|
|
*/
|
|
|
|
static void qrtr_tx_resume(struct qrtr_node *node, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct qrtr_ctrl_pkt *pkt = (struct qrtr_ctrl_pkt *)skb->data;
|
|
|
|
u64 remote_node = le32_to_cpu(pkt->client.node);
|
|
|
|
u32 remote_port = le32_to_cpu(pkt->client.port);
|
|
|
|
struct qrtr_tx_flow *flow;
|
|
|
|
unsigned long key;
|
|
|
|
|
|
|
|
key = remote_node << 32 | remote_port;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
flow = radix_tree_lookup(&node->qrtr_tx_flow, key);
|
|
|
|
rcu_read_unlock();
|
|
|
|
if (flow) {
|
|
|
|
spin_lock(&flow->resume_tx.lock);
|
|
|
|
flow->pending = 0;
|
|
|
|
spin_unlock(&flow->resume_tx.lock);
|
|
|
|
wake_up_interruptible_all(&flow->resume_tx);
|
|
|
|
}
|
|
|
|
|
|
|
|
consume_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* qrtr_tx_wait() - flow control for outgoing packets
|
|
|
|
* @node: qrtr_node that the packet is to be send to
|
|
|
|
* @dest_node: node id of the destination
|
|
|
|
* @dest_port: port number of the destination
|
|
|
|
* @type: type of message
|
|
|
|
*
|
|
|
|
* The flow control scheme is based around the low and high "watermarks". When
|
|
|
|
* the low watermark is passed the confirm_rx flag is set on the outgoing
|
|
|
|
* message, which will trigger the remote to send a control message of the type
|
|
|
|
* QRTR_TYPE_RESUME_TX to reset the counter. If the high watermark is hit
|
|
|
|
* further transmision should be paused.
|
|
|
|
*
|
|
|
|
* Return: 1 if confirm_rx should be set, 0 otherwise or errno failure
|
|
|
|
*/
|
|
|
|
static int qrtr_tx_wait(struct qrtr_node *node, int dest_node, int dest_port,
|
|
|
|
int type)
|
|
|
|
{
|
|
|
|
unsigned long key = (u64)dest_node << 32 | dest_port;
|
|
|
|
struct qrtr_tx_flow *flow;
|
|
|
|
int confirm_rx = 0;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Never set confirm_rx on non-data packets */
|
|
|
|
if (type != QRTR_TYPE_DATA)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
mutex_lock(&node->qrtr_tx_lock);
|
|
|
|
flow = radix_tree_lookup(&node->qrtr_tx_flow, key);
|
|
|
|
if (!flow) {
|
|
|
|
flow = kzalloc(sizeof(*flow), GFP_KERNEL);
|
|
|
|
if (flow) {
|
|
|
|
init_waitqueue_head(&flow->resume_tx);
|
|
|
|
radix_tree_insert(&node->qrtr_tx_flow, key, flow);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mutex_unlock(&node->qrtr_tx_lock);
|
|
|
|
|
|
|
|
/* Set confirm_rx if we where unable to find and allocate a flow */
|
|
|
|
if (!flow)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
spin_lock_irq(&flow->resume_tx.lock);
|
|
|
|
ret = wait_event_interruptible_locked_irq(flow->resume_tx,
|
|
|
|
flow->pending < QRTR_TX_FLOW_HIGH ||
|
|
|
|
flow->tx_failed ||
|
|
|
|
!node->ep);
|
|
|
|
if (ret < 0) {
|
|
|
|
confirm_rx = ret;
|
|
|
|
} else if (!node->ep) {
|
|
|
|
confirm_rx = -EPIPE;
|
|
|
|
} else if (flow->tx_failed) {
|
|
|
|
flow->tx_failed = 0;
|
|
|
|
confirm_rx = 1;
|
|
|
|
} else {
|
|
|
|
flow->pending++;
|
|
|
|
confirm_rx = flow->pending == QRTR_TX_FLOW_LOW;
|
|
|
|
}
|
|
|
|
spin_unlock_irq(&flow->resume_tx.lock);
|
|
|
|
|
|
|
|
return confirm_rx;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* qrtr_tx_flow_failed() - flag that tx of confirm_rx flagged messages failed
|
|
|
|
* @node: qrtr_node that the packet is to be send to
|
|
|
|
* @dest_node: node id of the destination
|
|
|
|
* @dest_port: port number of the destination
|
|
|
|
*
|
|
|
|
* Signal that the transmission of a message with confirm_rx flag failed. The
|
|
|
|
* flow's "pending" counter will keep incrementing towards QRTR_TX_FLOW_HIGH,
|
|
|
|
* at which point transmission would stall forever waiting for the resume TX
|
|
|
|
* message associated with the dropped confirm_rx message.
|
|
|
|
* Work around this by marking the flow as having a failed transmission and
|
|
|
|
* cause the next transmission attempt to be sent with the confirm_rx.
|
|
|
|
*/
|
|
|
|
static void qrtr_tx_flow_failed(struct qrtr_node *node, int dest_node,
|
|
|
|
int dest_port)
|
|
|
|
{
|
|
|
|
unsigned long key = (u64)dest_node << 32 | dest_port;
|
|
|
|
struct qrtr_tx_flow *flow;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
flow = radix_tree_lookup(&node->qrtr_tx_flow, key);
|
|
|
|
rcu_read_unlock();
|
|
|
|
if (flow) {
|
|
|
|
spin_lock_irq(&flow->resume_tx.lock);
|
|
|
|
flow->tx_failed = 1;
|
|
|
|
spin_unlock_irq(&flow->resume_tx.lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
/* Pass an outgoing packet socket buffer to the endpoint driver. */
|
2017-10-11 13:45:20 +07:00
|
|
|
static int qrtr_node_enqueue(struct qrtr_node *node, struct sk_buff *skb,
|
|
|
|
int type, struct sockaddr_qrtr *from,
|
|
|
|
struct sockaddr_qrtr *to)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
2017-10-11 13:45:23 +07:00
|
|
|
struct qrtr_hdr_v1 *hdr;
|
2017-10-11 13:45:20 +07:00
|
|
|
size_t len = skb->len;
|
2016-05-06 21:09:08 +07:00
|
|
|
int rc = -ENODEV;
|
2020-01-14 14:57:00 +07:00
|
|
|
int confirm_rx;
|
|
|
|
|
|
|
|
confirm_rx = qrtr_tx_wait(node, to->sq_node, to->sq_port, type);
|
|
|
|
if (confirm_rx < 0) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
return confirm_rx;
|
|
|
|
}
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
hdr = skb_push(skb, sizeof(*hdr));
|
|
|
|
hdr->version = cpu_to_le32(QRTR_PROTO_VER_1);
|
2017-10-11 13:45:20 +07:00
|
|
|
hdr->type = cpu_to_le32(type);
|
|
|
|
hdr->src_node_id = cpu_to_le32(from->sq_node);
|
|
|
|
hdr->src_port_id = cpu_to_le32(from->sq_port);
|
2018-07-04 21:19:33 +07:00
|
|
|
if (to->sq_port == QRTR_PORT_CTRL) {
|
|
|
|
hdr->dst_node_id = cpu_to_le32(node->nid);
|
|
|
|
hdr->dst_port_id = cpu_to_le32(QRTR_NODE_BCAST);
|
|
|
|
} else {
|
|
|
|
hdr->dst_node_id = cpu_to_le32(to->sq_node);
|
|
|
|
hdr->dst_port_id = cpu_to_le32(to->sq_port);
|
|
|
|
}
|
2017-10-11 13:45:20 +07:00
|
|
|
|
|
|
|
hdr->size = cpu_to_le32(len);
|
2020-01-14 14:57:00 +07:00
|
|
|
hdr->confirm_rx = !!confirm_rx;
|
2017-10-11 13:45:20 +07:00
|
|
|
|
net: qrtr: fix len of skb_put_padto in qrtr_node_enqueue
The len used for skb_put_padto is wrong, it need to add len of hdr.
In qrtr_node_enqueue, local variable size_t len is assign with
skb->len, then skb_push(skb, sizeof(*hdr)) will add skb->len with
sizeof(*hdr), so local variable size_t len is not same with skb->len
after skb_push(skb, sizeof(*hdr)).
Then the purpose of skb_put_padto(skb, ALIGN(len, 4)) is to add add
pad to the end of the skb's data if skb->len is not aligned to 4, but
unfortunately it use len instead of skb->len, at this line, skb->len
is 32 bytes(sizeof(*hdr)) more than len, for example, len is 3 bytes,
then skb->len is 35 bytes(3 + 32), and ALIGN(len, 4) is 4 bytes, so
__skb_put_padto will do nothing after check size(35) < len(4), the
correct value should be 36(sizeof(*hdr) + ALIGN(len, 4) = 32 + 4),
then __skb_put_padto will pass check size(35) < len(36) and add 1 byte
to the end of skb's data, then logic is correct.
function of skb_push:
void *skb_push(struct sk_buff *skb, unsigned int len)
{
skb->data -= len;
skb->len += len;
if (unlikely(skb->data < skb->head))
skb_under_panic(skb, len, __builtin_return_address(0));
return skb->data;
}
function of skb_put_padto
static inline int skb_put_padto(struct sk_buff *skb, unsigned int len)
{
return __skb_put_padto(skb, len, true);
}
function of __skb_put_padto
static inline int __skb_put_padto(struct sk_buff *skb, unsigned int len,
bool free_on_error)
{
unsigned int size = skb->len;
if (unlikely(size < len)) {
len -= size;
if (__skb_pad(skb, len, free_on_error))
return -ENOMEM;
__skb_put(skb, len);
}
return 0;
}
Signed-off-by: Carl Huang <cjhuang@codeaurora.org>
Signed-off-by: Wen Gong <wgong@codeaurora.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-01-03 11:50:16 +07:00
|
|
|
skb_put_padto(skb, ALIGN(len, 4) + sizeof(*hdr));
|
2017-10-11 13:45:20 +07:00
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
mutex_lock(&node->ep_lock);
|
|
|
|
if (node->ep)
|
|
|
|
rc = node->ep->xmit(node->ep, skb);
|
|
|
|
else
|
|
|
|
kfree_skb(skb);
|
|
|
|
mutex_unlock(&node->ep_lock);
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
/* Need to ensure that a subsequent message carries the otherwise lost
|
|
|
|
* confirm_rx flag if we dropped this one */
|
|
|
|
if (rc && confirm_rx)
|
|
|
|
qrtr_tx_flow_failed(node, to->sq_node, to->sq_port);
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Lookup node by id.
|
|
|
|
*
|
|
|
|
* callers must release with qrtr_node_release()
|
|
|
|
*/
|
|
|
|
static struct qrtr_node *qrtr_node_lookup(unsigned int nid)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node;
|
2020-01-14 14:57:01 +07:00
|
|
|
unsigned long flags;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_lock_irqsave(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
node = radix_tree_lookup(&qrtr_nodes, nid);
|
|
|
|
node = qrtr_node_acquire(node);
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_unlock_irqrestore(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
return node;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Assign node id to node.
|
|
|
|
*
|
|
|
|
* This is mostly useful for automatic node id assignment, based on
|
|
|
|
* the source id in the incoming packet.
|
|
|
|
*/
|
|
|
|
static void qrtr_node_assign(struct qrtr_node *node, unsigned int nid)
|
|
|
|
{
|
2020-01-14 14:57:01 +07:00
|
|
|
unsigned long flags;
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
if (node->nid != QRTR_EP_NID_AUTO || nid == QRTR_EP_NID_AUTO)
|
|
|
|
return;
|
|
|
|
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_lock_irqsave(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
radix_tree_insert(&qrtr_nodes, nid, node);
|
|
|
|
node->nid = nid;
|
2020-01-14 14:57:01 +07:00
|
|
|
spin_unlock_irqrestore(&qrtr_nodes_lock, flags);
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* qrtr_endpoint_post() - post incoming data
|
|
|
|
* @ep: endpoint handle
|
|
|
|
* @data: data pointer
|
|
|
|
* @len: size of data in bytes
|
|
|
|
*
|
|
|
|
* Return: 0 on success; negative error code on failure
|
|
|
|
*/
|
|
|
|
int qrtr_endpoint_post(struct qrtr_endpoint *ep, const void *data, size_t len)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node = ep->node;
|
2017-10-11 13:45:23 +07:00
|
|
|
const struct qrtr_hdr_v1 *v1;
|
|
|
|
const struct qrtr_hdr_v2 *v2;
|
2016-05-06 21:09:08 +07:00
|
|
|
struct sk_buff *skb;
|
2017-10-11 13:45:22 +07:00
|
|
|
struct qrtr_cb *cb;
|
2016-05-06 21:09:08 +07:00
|
|
|
unsigned int size;
|
|
|
|
unsigned int ver;
|
2017-10-11 13:45:23 +07:00
|
|
|
size_t hdrlen;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
if (len & 3)
|
2016-05-06 21:09:08 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
skb = netdev_alloc_skb(NULL, len);
|
|
|
|
if (!skb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
cb = (struct qrtr_cb *)skb->cb;
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
/* Version field in v1 is little endian, so this works for both cases */
|
|
|
|
ver = *(u8*)data;
|
|
|
|
|
|
|
|
switch (ver) {
|
|
|
|
case QRTR_PROTO_VER_1:
|
|
|
|
v1 = data;
|
|
|
|
hdrlen = sizeof(*v1);
|
|
|
|
|
|
|
|
cb->type = le32_to_cpu(v1->type);
|
|
|
|
cb->src_node = le32_to_cpu(v1->src_node_id);
|
|
|
|
cb->src_port = le32_to_cpu(v1->src_port_id);
|
|
|
|
cb->confirm_rx = !!v1->confirm_rx;
|
|
|
|
cb->dst_node = le32_to_cpu(v1->dst_node_id);
|
|
|
|
cb->dst_port = le32_to_cpu(v1->dst_port_id);
|
|
|
|
|
|
|
|
size = le32_to_cpu(v1->size);
|
|
|
|
break;
|
|
|
|
case QRTR_PROTO_VER_2:
|
|
|
|
v2 = data;
|
|
|
|
hdrlen = sizeof(*v2) + v2->optlen;
|
|
|
|
|
|
|
|
cb->type = v2->type;
|
|
|
|
cb->confirm_rx = !!(v2->flags & QRTR_FLAGS_CONFIRM_RX);
|
|
|
|
cb->src_node = le16_to_cpu(v2->src_node_id);
|
|
|
|
cb->src_port = le16_to_cpu(v2->src_port_id);
|
|
|
|
cb->dst_node = le16_to_cpu(v2->dst_node_id);
|
|
|
|
cb->dst_port = le16_to_cpu(v2->dst_port_id);
|
|
|
|
|
|
|
|
if (cb->src_port == (u16)QRTR_PORT_CTRL)
|
|
|
|
cb->src_port = QRTR_PORT_CTRL;
|
|
|
|
if (cb->dst_port == (u16)QRTR_PORT_CTRL)
|
|
|
|
cb->dst_port = QRTR_PORT_CTRL;
|
|
|
|
|
|
|
|
size = le32_to_cpu(v2->size);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
pr_err("qrtr: Invalid version %d\n", ver);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len != ALIGN(size, 4) + hdrlen)
|
|
|
|
goto err;
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
if (cb->dst_port != QRTR_PORT_CTRL && cb->type != QRTR_TYPE_DATA &&
|
|
|
|
cb->type != QRTR_TYPE_RESUME_TX)
|
2017-10-11 13:45:23 +07:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
skb_put_data(skb, data + hdrlen, size);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
skb_queue_tail(&node->rx_queue, skb);
|
|
|
|
schedule_work(&node->work);
|
|
|
|
|
|
|
|
return 0;
|
2017-10-11 13:45:23 +07:00
|
|
|
|
|
|
|
err:
|
|
|
|
kfree_skb(skb);
|
|
|
|
return -EINVAL;
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(qrtr_endpoint_post);
|
|
|
|
|
2017-10-11 13:45:21 +07:00
|
|
|
/**
|
|
|
|
* qrtr_alloc_ctrl_packet() - allocate control packet skb
|
|
|
|
* @pkt: reference to qrtr_ctrl_pkt pointer
|
|
|
|
*
|
|
|
|
* Returns newly allocated sk_buff, or NULL on failure
|
|
|
|
*
|
|
|
|
* This function allocates a sk_buff large enough to carry a qrtr_ctrl_pkt and
|
|
|
|
* on success returns a reference to the control packet in @pkt.
|
|
|
|
*/
|
|
|
|
static struct sk_buff *qrtr_alloc_ctrl_packet(struct qrtr_ctrl_pkt **pkt)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
2017-10-11 13:45:21 +07:00
|
|
|
const int pkt_len = sizeof(struct qrtr_ctrl_pkt);
|
2016-05-06 21:09:08 +07:00
|
|
|
struct sk_buff *skb;
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
skb = alloc_skb(QRTR_HDR_MAX_SIZE + pkt_len, GFP_KERNEL);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (!skb)
|
|
|
|
return NULL;
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
skb_reserve(skb, QRTR_HDR_MAX_SIZE);
|
2017-10-11 13:45:21 +07:00
|
|
|
*pkt = skb_put_zero(skb, pkt_len);
|
2017-06-08 04:07:38 +07:00
|
|
|
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
static struct qrtr_sock *qrtr_port_lookup(int port);
|
|
|
|
static void qrtr_port_put(struct qrtr_sock *ipc);
|
|
|
|
|
|
|
|
/* Handle and route a received packet.
|
|
|
|
*
|
|
|
|
* This will auto-reply with resume-tx packet as necessary.
|
|
|
|
*/
|
|
|
|
static void qrtr_node_rx_work(struct work_struct *work)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node = container_of(work, struct qrtr_node, work);
|
|
|
|
struct sk_buff *skb;
|
|
|
|
|
|
|
|
while ((skb = skb_dequeue(&node->rx_queue)) != NULL) {
|
|
|
|
struct qrtr_sock *ipc;
|
2020-01-14 14:56:59 +07:00
|
|
|
struct qrtr_cb *cb = (struct qrtr_cb *)skb->cb;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
qrtr_node_assign(node, cb->src_node);
|
2017-10-11 13:45:20 +07:00
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
if (cb->type == QRTR_TYPE_RESUME_TX) {
|
|
|
|
qrtr_tx_resume(node, skb);
|
2016-05-06 21:09:08 +07:00
|
|
|
} else {
|
2020-01-14 14:57:00 +07:00
|
|
|
ipc = qrtr_port_lookup(cb->dst_port);
|
|
|
|
if (!ipc) {
|
2016-05-06 21:09:08 +07:00
|
|
|
kfree_skb(skb);
|
2020-01-14 14:57:00 +07:00
|
|
|
} else {
|
|
|
|
if (sock_queue_rcv_skb(&ipc->sk, skb))
|
|
|
|
kfree_skb(skb);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
qrtr_port_put(ipc);
|
|
|
|
}
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* qrtr_endpoint_register() - register a new endpoint
|
|
|
|
* @ep: endpoint to register
|
|
|
|
* @nid: desired node id; may be QRTR_EP_NID_AUTO for auto-assignment
|
|
|
|
* Return: 0 on success; negative error code on failure
|
|
|
|
*
|
|
|
|
* The specified endpoint must have the xmit function pointer set on call.
|
|
|
|
*/
|
|
|
|
int qrtr_endpoint_register(struct qrtr_endpoint *ep, unsigned int nid)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node;
|
|
|
|
|
|
|
|
if (!ep || !ep->xmit)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
node = kzalloc(sizeof(*node), GFP_KERNEL);
|
|
|
|
if (!node)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
INIT_WORK(&node->work, qrtr_node_rx_work);
|
|
|
|
kref_init(&node->ref);
|
|
|
|
mutex_init(&node->ep_lock);
|
|
|
|
skb_queue_head_init(&node->rx_queue);
|
|
|
|
node->nid = QRTR_EP_NID_AUTO;
|
|
|
|
node->ep = ep;
|
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
INIT_RADIX_TREE(&node->qrtr_tx_flow, GFP_KERNEL);
|
|
|
|
mutex_init(&node->qrtr_tx_lock);
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
qrtr_node_assign(node, nid);
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_node_lock);
|
|
|
|
list_add(&node->item, &qrtr_all_nodes);
|
|
|
|
mutex_unlock(&qrtr_node_lock);
|
|
|
|
ep->node = node;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(qrtr_endpoint_register);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* qrtr_endpoint_unregister - unregister endpoint
|
|
|
|
* @ep: endpoint to unregister
|
|
|
|
*/
|
|
|
|
void qrtr_endpoint_unregister(struct qrtr_endpoint *ep)
|
|
|
|
{
|
|
|
|
struct qrtr_node *node = ep->node;
|
2017-10-11 13:45:20 +07:00
|
|
|
struct sockaddr_qrtr src = {AF_QIPCRTR, node->nid, QRTR_PORT_CTRL};
|
|
|
|
struct sockaddr_qrtr dst = {AF_QIPCRTR, qrtr_local_nid, QRTR_PORT_CTRL};
|
2020-01-14 14:57:00 +07:00
|
|
|
struct radix_tree_iter iter;
|
2017-10-11 13:45:21 +07:00
|
|
|
struct qrtr_ctrl_pkt *pkt;
|
2020-01-14 14:57:00 +07:00
|
|
|
struct qrtr_tx_flow *flow;
|
2017-06-08 04:07:37 +07:00
|
|
|
struct sk_buff *skb;
|
2020-01-14 14:57:00 +07:00
|
|
|
void __rcu **slot;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
mutex_lock(&node->ep_lock);
|
|
|
|
node->ep = NULL;
|
|
|
|
mutex_unlock(&node->ep_lock);
|
|
|
|
|
2017-06-08 04:07:37 +07:00
|
|
|
/* Notify the local controller about the event */
|
2017-10-11 13:45:21 +07:00
|
|
|
skb = qrtr_alloc_ctrl_packet(&pkt);
|
|
|
|
if (skb) {
|
|
|
|
pkt->cmd = cpu_to_le32(QRTR_TYPE_BYE);
|
2017-10-11 13:45:20 +07:00
|
|
|
qrtr_local_enqueue(NULL, skb, QRTR_TYPE_BYE, &src, &dst);
|
2017-10-11 13:45:21 +07:00
|
|
|
}
|
2017-06-08 04:07:37 +07:00
|
|
|
|
2020-01-14 14:57:00 +07:00
|
|
|
/* Wake up any transmitters waiting for resume-tx from the node */
|
|
|
|
mutex_lock(&node->qrtr_tx_lock);
|
|
|
|
radix_tree_for_each_slot(slot, &node->qrtr_tx_flow, &iter, 0) {
|
|
|
|
flow = *slot;
|
|
|
|
wake_up_interruptible_all(&flow->resume_tx);
|
|
|
|
}
|
|
|
|
mutex_unlock(&node->qrtr_tx_lock);
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
qrtr_node_release(node);
|
|
|
|
ep->node = NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(qrtr_endpoint_unregister);
|
|
|
|
|
|
|
|
/* Lookup socket by port.
|
|
|
|
*
|
|
|
|
* Callers must release with qrtr_port_put()
|
|
|
|
*/
|
|
|
|
static struct qrtr_sock *qrtr_port_lookup(int port)
|
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc;
|
|
|
|
|
|
|
|
if (port == QRTR_PORT_CTRL)
|
|
|
|
port = 0;
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_port_lock);
|
|
|
|
ipc = idr_find(&qrtr_ports, port);
|
|
|
|
if (ipc)
|
|
|
|
sock_hold(&ipc->sk);
|
|
|
|
mutex_unlock(&qrtr_port_lock);
|
|
|
|
|
|
|
|
return ipc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Release acquired socket. */
|
|
|
|
static void qrtr_port_put(struct qrtr_sock *ipc)
|
|
|
|
{
|
|
|
|
sock_put(&ipc->sk);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove port assignment. */
|
|
|
|
static void qrtr_port_remove(struct qrtr_sock *ipc)
|
|
|
|
{
|
2017-10-11 13:45:21 +07:00
|
|
|
struct qrtr_ctrl_pkt *pkt;
|
2017-06-08 04:07:38 +07:00
|
|
|
struct sk_buff *skb;
|
2016-05-06 21:09:08 +07:00
|
|
|
int port = ipc->us.sq_port;
|
2017-10-11 13:45:20 +07:00
|
|
|
struct sockaddr_qrtr to;
|
|
|
|
|
|
|
|
to.sq_family = AF_QIPCRTR;
|
|
|
|
to.sq_node = QRTR_NODE_BCAST;
|
|
|
|
to.sq_port = QRTR_PORT_CTRL;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:21 +07:00
|
|
|
skb = qrtr_alloc_ctrl_packet(&pkt);
|
2017-06-08 04:07:38 +07:00
|
|
|
if (skb) {
|
2017-10-11 13:45:21 +07:00
|
|
|
pkt->cmd = cpu_to_le32(QRTR_TYPE_DEL_CLIENT);
|
|
|
|
pkt->client.node = cpu_to_le32(ipc->us.sq_node);
|
|
|
|
pkt->client.port = cpu_to_le32(ipc->us.sq_port);
|
|
|
|
|
2017-06-08 04:07:38 +07:00
|
|
|
skb_set_owner_w(skb, &ipc->sk);
|
2017-10-11 13:45:20 +07:00
|
|
|
qrtr_bcast_enqueue(NULL, skb, QRTR_TYPE_DEL_CLIENT, &ipc->us,
|
|
|
|
&to);
|
2017-06-08 04:07:38 +07:00
|
|
|
}
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
if (port == QRTR_PORT_CTRL)
|
|
|
|
port = 0;
|
|
|
|
|
|
|
|
__sock_put(&ipc->sk);
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_port_lock);
|
|
|
|
idr_remove(&qrtr_ports, port);
|
|
|
|
mutex_unlock(&qrtr_port_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Assign port number to socket.
|
|
|
|
*
|
|
|
|
* Specify port in the integer pointed to by port, and it will be adjusted
|
|
|
|
* on return as necesssary.
|
|
|
|
*
|
|
|
|
* Port may be:
|
|
|
|
* 0: Assign ephemeral port in [QRTR_MIN_EPH_SOCKET, QRTR_MAX_EPH_SOCKET]
|
|
|
|
* <QRTR_MIN_EPH_SOCKET: Specified; requires CAP_NET_ADMIN
|
|
|
|
* >QRTR_MIN_EPH_SOCKET: Specified; available to all
|
|
|
|
*/
|
|
|
|
static int qrtr_port_assign(struct qrtr_sock *ipc, int *port)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_port_lock);
|
|
|
|
if (!*port) {
|
|
|
|
rc = idr_alloc(&qrtr_ports, ipc,
|
|
|
|
QRTR_MIN_EPH_SOCKET, QRTR_MAX_EPH_SOCKET + 1,
|
|
|
|
GFP_ATOMIC);
|
|
|
|
if (rc >= 0)
|
|
|
|
*port = rc;
|
|
|
|
} else if (*port < QRTR_MIN_EPH_SOCKET && !capable(CAP_NET_ADMIN)) {
|
|
|
|
rc = -EACCES;
|
|
|
|
} else if (*port == QRTR_PORT_CTRL) {
|
|
|
|
rc = idr_alloc(&qrtr_ports, ipc, 0, 1, GFP_ATOMIC);
|
|
|
|
} else {
|
|
|
|
rc = idr_alloc(&qrtr_ports, ipc, *port, *port + 1, GFP_ATOMIC);
|
|
|
|
if (rc >= 0)
|
|
|
|
*port = rc;
|
|
|
|
}
|
|
|
|
mutex_unlock(&qrtr_port_lock);
|
|
|
|
|
|
|
|
if (rc == -ENOSPC)
|
|
|
|
return -EADDRINUSE;
|
|
|
|
else if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
sock_hold(&ipc->sk);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-06-08 04:07:39 +07:00
|
|
|
/* Reset all non-control ports */
|
|
|
|
static void qrtr_reset_ports(void)
|
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc;
|
|
|
|
int id;
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_port_lock);
|
|
|
|
idr_for_each_entry(&qrtr_ports, ipc, id) {
|
|
|
|
/* Don't reset control port */
|
|
|
|
if (id == 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
sock_hold(&ipc->sk);
|
|
|
|
ipc->sk.sk_err = ENETRESET;
|
2017-10-11 13:45:17 +07:00
|
|
|
ipc->sk.sk_error_report(&ipc->sk);
|
2017-06-08 04:07:39 +07:00
|
|
|
sock_put(&ipc->sk);
|
|
|
|
}
|
|
|
|
mutex_unlock(&qrtr_port_lock);
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
/* Bind socket to address.
|
|
|
|
*
|
|
|
|
* Socket should be locked upon call.
|
|
|
|
*/
|
|
|
|
static int __qrtr_bind(struct socket *sock,
|
|
|
|
const struct sockaddr_qrtr *addr, int zapped)
|
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
int port;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
/* rebinding ok */
|
|
|
|
if (!zapped && addr->sq_port == ipc->us.sq_port)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
port = addr->sq_port;
|
|
|
|
rc = qrtr_port_assign(ipc, &port);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
/* unbind previous, if any */
|
|
|
|
if (!zapped)
|
|
|
|
qrtr_port_remove(ipc);
|
|
|
|
ipc->us.sq_port = port;
|
|
|
|
|
|
|
|
sock_reset_flag(sk, SOCK_ZAPPED);
|
|
|
|
|
2017-06-08 04:07:39 +07:00
|
|
|
/* Notify all open ports about the new controller */
|
|
|
|
if (port == QRTR_PORT_CTRL)
|
|
|
|
qrtr_reset_ports();
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Auto bind to an ephemeral port. */
|
|
|
|
static int qrtr_autobind(struct socket *sock)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sockaddr_qrtr addr;
|
|
|
|
|
|
|
|
if (!sock_flag(sk, SOCK_ZAPPED))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
addr.sq_family = AF_QIPCRTR;
|
|
|
|
addr.sq_node = qrtr_local_nid;
|
|
|
|
addr.sq_port = 0;
|
|
|
|
|
|
|
|
return __qrtr_bind(sock, &addr, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Bind socket to specified sockaddr. */
|
|
|
|
static int qrtr_bind(struct socket *sock, struct sockaddr *saddr, int len)
|
|
|
|
{
|
|
|
|
DECLARE_SOCKADDR(struct sockaddr_qrtr *, addr, saddr);
|
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (len < sizeof(*addr) || addr->sq_family != AF_QIPCRTR)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (addr->sq_node != ipc->us.sq_node)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
rc = __qrtr_bind(sock, addr, sock_flag(sk, SOCK_ZAPPED));
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Queue packet to local peer socket. */
|
2017-10-11 13:45:20 +07:00
|
|
|
static int qrtr_local_enqueue(struct qrtr_node *node, struct sk_buff *skb,
|
|
|
|
int type, struct sockaddr_qrtr *from,
|
|
|
|
struct sockaddr_qrtr *to)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc;
|
2017-10-11 13:45:22 +07:00
|
|
|
struct qrtr_cb *cb;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:20 +07:00
|
|
|
ipc = qrtr_port_lookup(to->sq_port);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (!ipc || &ipc->sk == skb->sk) { /* do not send to self */
|
|
|
|
kfree_skb(skb);
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
cb = (struct qrtr_cb *)skb->cb;
|
|
|
|
cb->src_node = from->sq_node;
|
|
|
|
cb->src_port = from->sq_port;
|
2017-10-11 13:45:20 +07:00
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
if (sock_queue_rcv_skb(&ipc->sk, skb)) {
|
|
|
|
qrtr_port_put(ipc);
|
|
|
|
kfree_skb(skb);
|
|
|
|
return -ENOSPC;
|
|
|
|
}
|
|
|
|
|
|
|
|
qrtr_port_put(ipc);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Queue packet for broadcast. */
|
2017-10-11 13:45:20 +07:00
|
|
|
static int qrtr_bcast_enqueue(struct qrtr_node *node, struct sk_buff *skb,
|
|
|
|
int type, struct sockaddr_qrtr *from,
|
|
|
|
struct sockaddr_qrtr *to)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
|
|
|
struct sk_buff *skbn;
|
|
|
|
|
|
|
|
mutex_lock(&qrtr_node_lock);
|
|
|
|
list_for_each_entry(node, &qrtr_all_nodes, item) {
|
|
|
|
skbn = skb_clone(skb, GFP_KERNEL);
|
|
|
|
if (!skbn)
|
|
|
|
break;
|
|
|
|
skb_set_owner_w(skbn, skb->sk);
|
2017-10-11 13:45:20 +07:00
|
|
|
qrtr_node_enqueue(node, skbn, type, from, to);
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
mutex_unlock(&qrtr_node_lock);
|
|
|
|
|
2017-10-11 13:45:20 +07:00
|
|
|
qrtr_local_enqueue(node, skb, type, from, to);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int qrtr_sendmsg(struct socket *sock, struct msghdr *msg, size_t len)
|
|
|
|
{
|
|
|
|
DECLARE_SOCKADDR(struct sockaddr_qrtr *, addr, msg->msg_name);
|
2017-10-11 13:45:20 +07:00
|
|
|
int (*enqueue_fn)(struct qrtr_node *, struct sk_buff *, int,
|
|
|
|
struct sockaddr_qrtr *, struct sockaddr_qrtr *);
|
2019-05-11 07:56:33 +07:00
|
|
|
__le32 qrtr_type = cpu_to_le32(QRTR_TYPE_DATA);
|
2016-05-06 21:09:08 +07:00
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct qrtr_node *node;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
size_t plen;
|
2019-05-21 06:51:56 +07:00
|
|
|
u32 type;
|
2016-05-06 21:09:08 +07:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (msg->msg_flags & ~(MSG_DONTWAIT))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (len > 65535)
|
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
if (addr) {
|
|
|
|
if (msg->msg_namelen < sizeof(*addr)) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (addr->sq_family != AF_QIPCRTR) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = qrtr_autobind(sock);
|
|
|
|
if (rc) {
|
|
|
|
release_sock(sk);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
} else if (sk->sk_state == TCP_ESTABLISHED) {
|
|
|
|
addr = &ipc->peer;
|
|
|
|
} else {
|
|
|
|
release_sock(sk);
|
|
|
|
return -ENOTCONN;
|
|
|
|
}
|
|
|
|
|
|
|
|
node = NULL;
|
|
|
|
if (addr->sq_node == QRTR_NODE_BCAST) {
|
|
|
|
enqueue_fn = qrtr_bcast_enqueue;
|
2018-07-04 21:19:32 +07:00
|
|
|
if (addr->sq_port != QRTR_PORT_CTRL) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -ENOTCONN;
|
|
|
|
}
|
2016-05-06 21:09:08 +07:00
|
|
|
} else if (addr->sq_node == ipc->us.sq_node) {
|
|
|
|
enqueue_fn = qrtr_local_enqueue;
|
|
|
|
} else {
|
|
|
|
enqueue_fn = qrtr_node_enqueue;
|
|
|
|
node = qrtr_node_lookup(addr->sq_node);
|
|
|
|
if (!node) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -ECONNRESET;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
plen = (len + 3) & ~3;
|
2017-10-11 13:45:23 +07:00
|
|
|
skb = sock_alloc_send_skb(sk, plen + QRTR_HDR_MAX_SIZE,
|
2016-05-06 21:09:08 +07:00
|
|
|
msg->msg_flags & MSG_DONTWAIT, &rc);
|
|
|
|
if (!skb)
|
|
|
|
goto out_node;
|
|
|
|
|
2017-10-11 13:45:23 +07:00
|
|
|
skb_reserve(skb, QRTR_HDR_MAX_SIZE);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:20 +07:00
|
|
|
rc = memcpy_from_msg(skb_put(skb, len), msg, len);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (rc) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto out_node;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ipc->us.sq_port == QRTR_PORT_CTRL) {
|
|
|
|
if (len < 4) {
|
|
|
|
rc = -EINVAL;
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto out_node;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* control messages already require the type as 'command' */
|
2019-05-11 07:56:33 +07:00
|
|
|
skb_copy_bits(skb, 0, &qrtr_type, 4);
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
|
2019-05-21 06:51:56 +07:00
|
|
|
type = le32_to_cpu(qrtr_type);
|
2017-10-11 13:45:20 +07:00
|
|
|
rc = enqueue_fn(node, skb, type, &ipc->us, addr);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (rc >= 0)
|
|
|
|
rc = len;
|
|
|
|
|
|
|
|
out_node:
|
|
|
|
qrtr_node_release(node);
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2020-01-14 14:56:59 +07:00
|
|
|
static int qrtr_send_resume_tx(struct qrtr_cb *cb)
|
|
|
|
{
|
|
|
|
struct sockaddr_qrtr remote = { AF_QIPCRTR, cb->src_node, cb->src_port };
|
|
|
|
struct sockaddr_qrtr local = { AF_QIPCRTR, cb->dst_node, cb->dst_port };
|
|
|
|
struct qrtr_ctrl_pkt *pkt;
|
|
|
|
struct qrtr_node *node;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
node = qrtr_node_lookup(remote.sq_node);
|
|
|
|
if (!node)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
skb = qrtr_alloc_ctrl_packet(&pkt);
|
|
|
|
if (!skb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pkt->cmd = cpu_to_le32(QRTR_TYPE_RESUME_TX);
|
|
|
|
pkt->client.node = cpu_to_le32(cb->dst_node);
|
|
|
|
pkt->client.port = cpu_to_le32(cb->dst_port);
|
|
|
|
|
|
|
|
ret = qrtr_node_enqueue(node, skb, QRTR_TYPE_RESUME_TX, &local, &remote);
|
|
|
|
|
|
|
|
qrtr_node_release(node);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
static int qrtr_recvmsg(struct socket *sock, struct msghdr *msg,
|
|
|
|
size_t size, int flags)
|
|
|
|
{
|
|
|
|
DECLARE_SOCKADDR(struct sockaddr_qrtr *, addr, msg->msg_name);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sk_buff *skb;
|
2017-10-11 13:45:22 +07:00
|
|
|
struct qrtr_cb *cb;
|
2016-05-06 21:09:08 +07:00
|
|
|
int copied, rc;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
if (sock_flag(sk, SOCK_ZAPPED)) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -EADDRNOTAVAIL;
|
|
|
|
}
|
|
|
|
|
|
|
|
skb = skb_recv_datagram(sk, flags & ~MSG_DONTWAIT,
|
|
|
|
flags & MSG_DONTWAIT, &rc);
|
|
|
|
if (!skb) {
|
|
|
|
release_sock(sk);
|
|
|
|
return rc;
|
|
|
|
}
|
2020-01-14 14:56:59 +07:00
|
|
|
cb = (struct qrtr_cb *)skb->cb;
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
copied = skb->len;
|
2016-05-06 21:09:08 +07:00
|
|
|
if (copied > size) {
|
|
|
|
copied = size;
|
|
|
|
msg->msg_flags |= MSG_TRUNC;
|
|
|
|
}
|
|
|
|
|
2017-10-11 13:45:22 +07:00
|
|
|
rc = skb_copy_datagram_msg(skb, 0, msg, copied);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (rc < 0)
|
|
|
|
goto out;
|
|
|
|
rc = copied;
|
|
|
|
|
|
|
|
if (addr) {
|
|
|
|
addr->sq_family = AF_QIPCRTR;
|
2017-10-11 13:45:22 +07:00
|
|
|
addr->sq_node = cb->src_node;
|
|
|
|
addr->sq_port = cb->src_port;
|
2016-05-06 21:09:08 +07:00
|
|
|
msg->msg_namelen = sizeof(*addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2020-01-14 14:56:59 +07:00
|
|
|
if (cb->confirm_rx)
|
|
|
|
qrtr_send_resume_tx(cb);
|
|
|
|
|
2016-05-06 21:09:08 +07:00
|
|
|
skb_free_datagram(sk, skb);
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int qrtr_connect(struct socket *sock, struct sockaddr *saddr,
|
|
|
|
int len, int flags)
|
|
|
|
{
|
|
|
|
DECLARE_SOCKADDR(struct sockaddr_qrtr *, addr, saddr);
|
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (len < sizeof(*addr) || addr->sq_family != AF_QIPCRTR)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
sk->sk_state = TCP_CLOSE;
|
|
|
|
sock->state = SS_UNCONNECTED;
|
|
|
|
|
|
|
|
rc = qrtr_autobind(sock);
|
|
|
|
if (rc) {
|
|
|
|
release_sock(sk);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
ipc->peer = *addr;
|
|
|
|
sock->state = SS_CONNECTED;
|
|
|
|
sk->sk_state = TCP_ESTABLISHED;
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int qrtr_getname(struct socket *sock, struct sockaddr *saddr,
|
2018-02-13 02:00:20 +07:00
|
|
|
int peer)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sockaddr_qrtr qaddr;
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
if (peer) {
|
|
|
|
if (sk->sk_state != TCP_ESTABLISHED) {
|
|
|
|
release_sock(sk);
|
|
|
|
return -ENOTCONN;
|
|
|
|
}
|
|
|
|
|
|
|
|
qaddr = ipc->peer;
|
|
|
|
} else {
|
|
|
|
qaddr = ipc->us;
|
|
|
|
}
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
qaddr.sq_family = AF_QIPCRTR;
|
|
|
|
|
|
|
|
memcpy(saddr, &qaddr, sizeof(qaddr));
|
|
|
|
|
2018-02-13 02:00:20 +07:00
|
|
|
return sizeof(qaddr);
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int qrtr_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
|
|
|
|
{
|
|
|
|
void __user *argp = (void __user *)arg;
|
|
|
|
struct qrtr_sock *ipc = qrtr_sk(sock->sk);
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct sockaddr_qrtr *sq;
|
|
|
|
struct sk_buff *skb;
|
|
|
|
struct ifreq ifr;
|
|
|
|
long len = 0;
|
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
case TIOCOUTQ:
|
|
|
|
len = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
|
|
|
|
if (len < 0)
|
|
|
|
len = 0;
|
|
|
|
rc = put_user(len, (int __user *)argp);
|
|
|
|
break;
|
|
|
|
case TIOCINQ:
|
|
|
|
skb = skb_peek(&sk->sk_receive_queue);
|
|
|
|
if (skb)
|
2017-10-11 13:45:22 +07:00
|
|
|
len = skb->len;
|
2016-05-06 21:09:08 +07:00
|
|
|
rc = put_user(len, (int __user *)argp);
|
|
|
|
break;
|
|
|
|
case SIOCGIFADDR:
|
|
|
|
if (copy_from_user(&ifr, argp, sizeof(ifr))) {
|
|
|
|
rc = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
sq = (struct sockaddr_qrtr *)&ifr.ifr_addr;
|
|
|
|
*sq = ipc->us;
|
|
|
|
if (copy_to_user(argp, &ifr, sizeof(ifr))) {
|
|
|
|
rc = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SIOCADDRT:
|
|
|
|
case SIOCDELRT:
|
|
|
|
case SIOCSIFADDR:
|
|
|
|
case SIOCGIFDSTADDR:
|
|
|
|
case SIOCSIFDSTADDR:
|
|
|
|
case SIOCGIFBRDADDR:
|
|
|
|
case SIOCSIFBRDADDR:
|
|
|
|
case SIOCGIFNETMASK:
|
|
|
|
case SIOCSIFNETMASK:
|
|
|
|
rc = -EINVAL;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
rc = -ENOIOCTLCMD;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int qrtr_release(struct socket *sock)
|
|
|
|
{
|
|
|
|
struct sock *sk = sock->sk;
|
|
|
|
struct qrtr_sock *ipc;
|
|
|
|
|
|
|
|
if (!sk)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
lock_sock(sk);
|
|
|
|
|
|
|
|
ipc = qrtr_sk(sk);
|
|
|
|
sk->sk_shutdown = SHUTDOWN_MASK;
|
|
|
|
if (!sock_flag(sk, SOCK_DEAD))
|
|
|
|
sk->sk_state_change(sk);
|
|
|
|
|
|
|
|
sock_set_flag(sk, SOCK_DEAD);
|
|
|
|
sock->sk = NULL;
|
|
|
|
|
|
|
|
if (!sock_flag(sk, SOCK_ZAPPED))
|
|
|
|
qrtr_port_remove(ipc);
|
|
|
|
|
|
|
|
skb_queue_purge(&sk->sk_receive_queue);
|
|
|
|
|
|
|
|
release_sock(sk);
|
|
|
|
sock_put(sk);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct proto_ops qrtr_proto_ops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.family = AF_QIPCRTR,
|
|
|
|
.bind = qrtr_bind,
|
|
|
|
.connect = qrtr_connect,
|
|
|
|
.socketpair = sock_no_socketpair,
|
|
|
|
.accept = sock_no_accept,
|
|
|
|
.listen = sock_no_listen,
|
|
|
|
.sendmsg = qrtr_sendmsg,
|
|
|
|
.recvmsg = qrtr_recvmsg,
|
|
|
|
.getname = qrtr_getname,
|
|
|
|
.ioctl = qrtr_ioctl,
|
2019-04-18 03:51:48 +07:00
|
|
|
.gettstamp = sock_gettstamp,
|
2018-06-28 23:43:44 +07:00
|
|
|
.poll = datagram_poll,
|
2016-05-06 21:09:08 +07:00
|
|
|
.shutdown = sock_no_shutdown,
|
|
|
|
.setsockopt = sock_no_setsockopt,
|
|
|
|
.getsockopt = sock_no_getsockopt,
|
|
|
|
.release = qrtr_release,
|
|
|
|
.mmap = sock_no_mmap,
|
|
|
|
.sendpage = sock_no_sendpage,
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct proto qrtr_proto = {
|
|
|
|
.name = "QIPCRTR",
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.obj_size = sizeof(struct qrtr_sock),
|
|
|
|
};
|
|
|
|
|
|
|
|
static int qrtr_create(struct net *net, struct socket *sock,
|
|
|
|
int protocol, int kern)
|
|
|
|
{
|
|
|
|
struct qrtr_sock *ipc;
|
|
|
|
struct sock *sk;
|
|
|
|
|
|
|
|
if (sock->type != SOCK_DGRAM)
|
|
|
|
return -EPROTOTYPE;
|
|
|
|
|
|
|
|
sk = sk_alloc(net, AF_QIPCRTR, GFP_KERNEL, &qrtr_proto, kern);
|
|
|
|
if (!sk)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
sock_set_flag(sk, SOCK_ZAPPED);
|
|
|
|
|
|
|
|
sock_init_data(sock, sk);
|
|
|
|
sock->ops = &qrtr_proto_ops;
|
|
|
|
|
|
|
|
ipc = qrtr_sk(sk);
|
|
|
|
ipc->us.sq_family = AF_QIPCRTR;
|
|
|
|
ipc->us.sq_node = qrtr_local_nid;
|
|
|
|
ipc->us.sq_port = 0;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct nla_policy qrtr_policy[IFA_MAX + 1] = {
|
|
|
|
[IFA_LOCAL] = { .type = NLA_U32 },
|
|
|
|
};
|
|
|
|
|
2017-04-16 23:48:24 +07:00
|
|
|
static int qrtr_addr_doit(struct sk_buff *skb, struct nlmsghdr *nlh,
|
|
|
|
struct netlink_ext_ack *extack)
|
2016-05-06 21:09:08 +07:00
|
|
|
{
|
|
|
|
struct nlattr *tb[IFA_MAX + 1];
|
|
|
|
struct ifaddrmsg *ifm;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (!netlink_capable(skb, CAP_NET_ADMIN))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
if (!netlink_capable(skb, CAP_SYS_ADMIN))
|
|
|
|
return -EPERM;
|
|
|
|
|
|
|
|
ASSERT_RTNL();
|
|
|
|
|
netlink: make validation more configurable for future strictness
We currently have two levels of strict validation:
1) liberal (default)
- undefined (type >= max) & NLA_UNSPEC attributes accepted
- attribute length >= expected accepted
- garbage at end of message accepted
2) strict (opt-in)
- NLA_UNSPEC attributes accepted
- attribute length >= expected accepted
Split out parsing strictness into four different options:
* TRAILING - check that there's no trailing data after parsing
attributes (in message or nested)
* MAXTYPE - reject attrs > max known type
* UNSPEC - reject attributes with NLA_UNSPEC policy entries
* STRICT_ATTRS - strictly validate attribute size
The default for future things should be *everything*.
The current *_strict() is a combination of TRAILING and MAXTYPE,
and is renamed to _deprecated_strict().
The current regular parsing has none of this, and is renamed to
*_parse_deprecated().
Additionally it allows us to selectively set one of the new flags
even on old policies. Notably, the UNSPEC flag could be useful in
this case, since it can be arranged (by filling in the policy) to
not be an incompatible userspace ABI change, but would then going
forward prevent forgetting attribute entries. Similar can apply
to the POLICY flag.
We end up with the following renames:
* nla_parse -> nla_parse_deprecated
* nla_parse_strict -> nla_parse_deprecated_strict
* nlmsg_parse -> nlmsg_parse_deprecated
* nlmsg_parse_strict -> nlmsg_parse_deprecated_strict
* nla_parse_nested -> nla_parse_nested_deprecated
* nla_validate_nested -> nla_validate_nested_deprecated
Using spatch, of course:
@@
expression TB, MAX, HEAD, LEN, POL, EXT;
@@
-nla_parse(TB, MAX, HEAD, LEN, POL, EXT)
+nla_parse_deprecated(TB, MAX, HEAD, LEN, POL, EXT)
@@
expression NLH, HDRLEN, TB, MAX, POL, EXT;
@@
-nlmsg_parse(NLH, HDRLEN, TB, MAX, POL, EXT)
+nlmsg_parse_deprecated(NLH, HDRLEN, TB, MAX, POL, EXT)
@@
expression NLH, HDRLEN, TB, MAX, POL, EXT;
@@
-nlmsg_parse_strict(NLH, HDRLEN, TB, MAX, POL, EXT)
+nlmsg_parse_deprecated_strict(NLH, HDRLEN, TB, MAX, POL, EXT)
@@
expression TB, MAX, NLA, POL, EXT;
@@
-nla_parse_nested(TB, MAX, NLA, POL, EXT)
+nla_parse_nested_deprecated(TB, MAX, NLA, POL, EXT)
@@
expression START, MAX, POL, EXT;
@@
-nla_validate_nested(START, MAX, POL, EXT)
+nla_validate_nested_deprecated(START, MAX, POL, EXT)
@@
expression NLH, HDRLEN, MAX, POL, EXT;
@@
-nlmsg_validate(NLH, HDRLEN, MAX, POL, EXT)
+nlmsg_validate_deprecated(NLH, HDRLEN, MAX, POL, EXT)
For this patch, don't actually add the strict, non-renamed versions
yet so that it breaks compile if I get it wrong.
Also, while at it, make nla_validate and nla_parse go down to a
common __nla_validate_parse() function to avoid code duplication.
Ultimately, this allows us to have very strict validation for every
new caller of nla_parse()/nlmsg_parse() etc as re-introduced in the
next patch, while existing things will continue to work as is.
In effect then, this adds fully strict validation for any new command.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2019-04-26 19:07:28 +07:00
|
|
|
rc = nlmsg_parse_deprecated(nlh, sizeof(*ifm), tb, IFA_MAX,
|
|
|
|
qrtr_policy, extack);
|
2016-05-06 21:09:08 +07:00
|
|
|
if (rc < 0)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
ifm = nlmsg_data(nlh);
|
|
|
|
if (!tb[IFA_LOCAL])
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
qrtr_local_nid = nla_get_u32(tb[IFA_LOCAL]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct net_proto_family qrtr_family = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.family = AF_QIPCRTR,
|
|
|
|
.create = qrtr_create,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init qrtr_proto_init(void)
|
|
|
|
{
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = proto_register(&qrtr_proto, 1);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
|
|
|
rc = sock_register(&qrtr_family);
|
|
|
|
if (rc) {
|
|
|
|
proto_unregister(&qrtr_proto);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2017-12-03 03:44:07 +07:00
|
|
|
rc = rtnl_register_module(THIS_MODULE, PF_QIPCRTR, RTM_NEWADDR, qrtr_addr_doit, NULL, 0);
|
|
|
|
if (rc) {
|
|
|
|
sock_unregister(qrtr_family.family);
|
|
|
|
proto_unregister(&qrtr_proto);
|
|
|
|
}
|
2016-05-06 21:09:08 +07:00
|
|
|
|
2017-12-03 03:44:07 +07:00
|
|
|
return rc;
|
2016-05-06 21:09:08 +07:00
|
|
|
}
|
2017-11-07 11:50:35 +07:00
|
|
|
postcore_initcall(qrtr_proto_init);
|
2016-05-06 21:09:08 +07:00
|
|
|
|
|
|
|
static void __exit qrtr_proto_fini(void)
|
|
|
|
{
|
|
|
|
rtnl_unregister(PF_QIPCRTR, RTM_NEWADDR);
|
|
|
|
sock_unregister(qrtr_family.family);
|
|
|
|
proto_unregister(&qrtr_proto);
|
|
|
|
}
|
|
|
|
module_exit(qrtr_proto_fini);
|
|
|
|
|
|
|
|
MODULE_DESCRIPTION("Qualcomm IPC-router driver");
|
|
|
|
MODULE_LICENSE("GPL v2");
|
2018-04-17 19:03:26 +07:00
|
|
|
MODULE_ALIAS_NETPROTO(PF_QIPCRTR);
|