| |
| /* |
| * DECnet An implementation of the DECnet protocol suite for the LINUX |
| * operating system. DECnet is implemented using the BSD Socket |
| * interface as the means of communication with the user level. |
| * |
| * DECnet Socket Layer Interface |
| * |
| * Authors: Eduardo Marcelo Serrat <emserrat@geocities.com> |
| * Patrick Caulfield <patrick@pandh.demon.co.uk> |
| * |
| * Changes: |
| * Steve Whitehouse: Copied from Eduardo Serrat and Patrick Caulfield's |
| * version of the code. Original copyright preserved |
| * below. |
| * Steve Whitehouse: Some bug fixes, cleaning up some code to make it |
| * compatible with my routing layer. |
| * Steve Whitehouse: Merging changes from Eduardo Serrat and Patrick |
| * Caulfield. |
| * Steve Whitehouse: Further bug fixes, checking module code still works |
| * with new routing layer. |
| * Steve Whitehouse: Additional set/get_sockopt() calls. |
| * Steve Whitehouse: Fixed TIOCINQ ioctl to be same as Eduardo's new |
| * code. |
| * Steve Whitehouse: recvmsg() changed to try and behave in a POSIX like |
| * way. Didn't manage it entirely, but its better. |
| * Steve Whitehouse: ditto for sendmsg(). |
| * Steve Whitehouse: A selection of bug fixes to various things. |
| * Steve Whitehouse: Added TIOCOUTQ ioctl. |
| * Steve Whitehouse: Fixes to username2sockaddr & sockaddr2username. |
| * Steve Whitehouse: Fixes to connect() error returns. |
| * Patrick Caulfield: Fixes to delayed acceptance logic. |
| * David S. Miller: New socket locking |
| * Steve Whitehouse: Socket list hashing/locking |
| * Arnaldo C. Melo: use capable, not suser |
| * Steve Whitehouse: Removed unused code. Fix to use sk->allocation |
| * when required. |
| * Patrick Caulfield: /proc/net/decnet now has object name/number |
| */ |
| |
| |
| /****************************************************************************** |
| (c) 1995-1998 E.M. Serrat emserrat@geocities.com |
| |
| This program is free software; you can redistribute it and/or modify |
| it under the terms of the GNU General Public License as published by |
| the Free Software Foundation; either version 2 of the License, or |
| any later version. |
| |
| This program is distributed in the hope that it will be useful, |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| GNU General Public License for more details. |
| |
| HISTORY: |
| |
| Version Kernel Date Author/Comments |
| ------- ------ ---- --------------- |
| Version 0.0.1 2.0.30 01-dic-97 Eduardo Marcelo Serrat |
| (emserrat@geocities.com) |
| |
| First Development of DECnet Socket La- |
| yer for Linux. Only supports outgoing |
| connections. |
| |
| Version 0.0.2 2.1.105 20-jun-98 Patrick J. Caulfield |
| (patrick@pandh.demon.co.uk) |
| |
| Port to new kernel development version. |
| |
| Version 0.0.3 2.1.106 25-jun-98 Eduardo Marcelo Serrat |
| (emserrat@geocities.com) |
| _ |
| Added support for incoming connections |
| so we can start developing server apps |
| on Linux. |
| - |
| Module Support |
| Version 0.0.4 2.1.109 21-jul-98 Eduardo Marcelo Serrat |
| (emserrat@geocities.com) |
| _ |
| Added support for X11R6.4. Now we can |
| use DECnet transport for X on Linux!!! |
| - |
| Version 0.0.5 2.1.110 01-aug-98 Eduardo Marcelo Serrat |
| (emserrat@geocities.com) |
| Removed bugs on flow control |
| Removed bugs on incoming accessdata |
| order |
| - |
| Version 0.0.6 2.1.110 07-aug-98 Eduardo Marcelo Serrat |
| dn_recvmsg fixes |
| |
| Patrick J. Caulfield |
| dn_bind fixes |
| *******************************************************************************/ |
| |
| #include <linux/config.h> |
| #include <linux/module.h> |
| #include <linux/errno.h> |
| #include <linux/types.h> |
| #include <linux/socket.h> |
| #include <linux/in.h> |
| #include <linux/kernel.h> |
| #include <linux/sched.h> |
| #include <linux/timer.h> |
| #include <linux/string.h> |
| #include <linux/sockios.h> |
| #include <linux/net.h> |
| #include <linux/netdevice.h> |
| #include <linux/inet.h> |
| #include <linux/route.h> |
| #include <linux/netfilter.h> |
| #include <net/sock.h> |
| #include <asm/segment.h> |
| #include <asm/system.h> |
| #include <linux/mm.h> |
| #include <linux/interrupt.h> |
| #include <linux/proc_fs.h> |
| #include <linux/stat.h> |
| #include <linux/init.h> |
| #include <linux/poll.h> |
| #include <net/neighbour.h> |
| #include <net/dst.h> |
| #include <net/dn.h> |
| #include <net/dn_nsp.h> |
| #include <net/dn_dev.h> |
| #include <net/dn_route.h> |
| #include <net/dn_fib.h> |
| #include <net/dn_neigh.h> |
| |
| static void dn_keepalive(struct sock *sk); |
| |
| /* |
| * decnet_address is kept in network order, decnet_ether_address is kept |
| * as a string of bytes. |
| */ |
| dn_address decnet_address = 0; |
| unsigned char decnet_ether_address[ETH_ALEN] = { 0xAA, 0x00, 0x04, 0x00, 0x00, 0x00 }; |
| |
| static struct proto_ops dn_proto_ops; |
| rwlock_t dn_hash_lock = RW_LOCK_UNLOCKED; |
| static struct sock *dn_sklist; |
| static struct sock *dn_wild_sk; |
| |
| static int __dn_setsockopt(struct socket *sock, int level, int optname, char *optval, int optlen, int flags); |
| static int __dn_getsockopt(struct socket *sock, int level, int optname, char *optval, int *optlen, int flags); |
| |
| static struct sock **dn_find_list(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| |
| if (scp->addr.sdn_flags & SDF_WILD) |
| return dn_wild_sk ? NULL : &dn_wild_sk; |
| |
| return &dn_sklist; |
| } |
| |
| static unsigned short port_alloc(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| static unsigned short port = 0x2000; |
| |
| if (port == 0) |
| port++; |
| |
| scp->addrloc = port++; |
| |
| return 1; |
| } |
| |
| /* |
| * Since this is only ever called from user |
| * level, we don't need a write_lock() version |
| * of this. |
| */ |
| static int dn_hash_sock(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| struct sock **skp; |
| int rv = -EUSERS; |
| |
| if (sk->next) |
| BUG(); |
| if (sk->pprev) |
| BUG(); |
| |
| write_lock_bh(&dn_hash_lock); |
| |
| if (!scp->addrloc && !port_alloc(sk)) |
| goto out; |
| |
| rv = -EADDRINUSE; |
| if ((skp = dn_find_list(sk)) == NULL) |
| goto out; |
| |
| sk->next = *skp; |
| sk->pprev = skp; |
| *skp = sk; |
| rv = 0; |
| out: |
| write_unlock_bh(&dn_hash_lock); |
| return rv; |
| } |
| |
| static void dn_unhash_sock(struct sock *sk) |
| { |
| struct sock **skp = sk->pprev; |
| |
| if (skp == NULL) |
| return; |
| |
| write_lock(&dn_hash_lock); |
| while(*skp != sk) |
| skp = &((*skp)->next); |
| *skp = sk->next; |
| write_unlock(&dn_hash_lock); |
| |
| sk->next = NULL; |
| sk->pprev = NULL; |
| } |
| |
| static void dn_unhash_sock_bh(struct sock *sk) |
| { |
| struct sock **skp = sk->pprev; |
| |
| if (skp == NULL) |
| return; |
| |
| write_lock_bh(&dn_hash_lock); |
| while(*skp != sk) |
| skp = &((*skp)->next); |
| *skp = sk->next; |
| write_unlock_bh(&dn_hash_lock); |
| |
| sk->next = NULL; |
| sk->pprev = NULL; |
| } |
| |
| |
| int dn_sockaddr2username(struct sockaddr_dn *sdn, unsigned char *buf, unsigned char type) |
| { |
| int len = 2; |
| |
| *buf++ = type; |
| |
| switch(type) { |
| case 0: |
| *buf++ = sdn->sdn_objnum; |
| break; |
| case 1: |
| *buf++ = 0; |
| *buf++ = dn_ntohs(sdn->sdn_objnamel); |
| memcpy(buf, sdn->sdn_objname, dn_ntohs(sdn->sdn_objnamel)); |
| len = 3 + dn_ntohs(sdn->sdn_objnamel); |
| break; |
| case 2: |
| memset(buf, 0, 5); |
| buf += 5; |
| *buf++ = dn_ntohs(sdn->sdn_objnamel); |
| memcpy(buf, sdn->sdn_objname, dn_ntohs(sdn->sdn_objnamel)); |
| len = 7 + dn_ntohs(sdn->sdn_objnamel); |
| break; |
| } |
| |
| return len; |
| } |
| |
| /* |
| * On reception of usernames, we handle types 1 and 0 for destination |
| * addresses only. Types 2 and 4 are used for source addresses, but the |
| * UIC, GIC are ignored and they are both treated the same way. Type 3 |
| * is never used as I've no idea what its purpose might be or what its |
| * format is. |
| */ |
| int dn_username2sockaddr(unsigned char *data, int len, struct sockaddr_dn *sdn, unsigned char *fmt) |
| { |
| unsigned char type; |
| int size = len; |
| int namel = 12; |
| |
| sdn->sdn_objnum = 0; |
| sdn->sdn_objnamel = dn_htons(0); |
| memset(sdn->sdn_objname, 0, DN_MAXOBJL); |
| |
| if (len < 2) |
| return -1; |
| |
| len -= 2; |
| *fmt = *data++; |
| type = *data++; |
| |
| switch(*fmt) { |
| case 0: |
| sdn->sdn_objnum = type; |
| return 2; |
| case 1: |
| namel = 16; |
| break; |
| case 2: |
| len -= 4; |
| data += 4; |
| break; |
| case 4: |
| len -= 8; |
| data += 8; |
| break; |
| default: |
| return -1; |
| } |
| |
| len -= 1; |
| |
| if (len < 0) |
| return -1; |
| |
| sdn->sdn_objnamel = dn_htons(*data++); |
| len -= dn_ntohs(sdn->sdn_objnamel); |
| |
| if ((len < 0) || (dn_ntohs(sdn->sdn_objnamel) > namel)) |
| return -1; |
| |
| memcpy(sdn->sdn_objname, data, dn_ntohs(sdn->sdn_objnamel)); |
| |
| return size - len; |
| } |
| |
| struct sock *dn_sklist_find_listener(struct sockaddr_dn *addr) |
| { |
| struct sock *sk; |
| |
| read_lock(&dn_hash_lock); |
| for(sk = dn_sklist; sk != NULL; sk = sk->next) { |
| struct dn_scp *scp = DN_SK(sk); |
| if (sk->state != TCP_LISTEN) |
| continue; |
| if (scp->addr.sdn_objnum) { |
| if (scp->addr.sdn_objnum != addr->sdn_objnum) |
| continue; |
| } else { |
| if (addr->sdn_objnum) |
| continue; |
| if (scp->addr.sdn_objnamel != addr->sdn_objnamel) |
| continue; |
| if (memcmp(scp->addr.sdn_objname, addr->sdn_objname, dn_ntohs(addr->sdn_objnamel)) != 0) |
| continue; |
| } |
| sock_hold(sk); |
| read_unlock(&dn_hash_lock); |
| return sk; |
| } |
| |
| if (dn_wild_sk && (dn_wild_sk->state == TCP_LISTEN)) |
| sock_hold((sk = dn_wild_sk)); |
| |
| read_unlock(&dn_hash_lock); |
| return sk; |
| } |
| |
| struct sock *dn_find_by_skb(struct sk_buff *skb) |
| { |
| struct dn_skb_cb *cb = DN_SKB_CB(skb); |
| struct sock *sk; |
| struct dn_scp *scp; |
| |
| read_lock(&dn_hash_lock); |
| for(sk = dn_sklist; sk != NULL; sk = sk->next) { |
| scp = DN_SK(sk); |
| if (cb->src != dn_saddr2dn(&scp->peer)) |
| continue; |
| if (cb->dst_port != scp->addrloc) |
| continue; |
| if (scp->addrrem && (cb->src_port != scp->addrrem)) |
| continue; |
| break; |
| } |
| |
| if (sk) |
| sock_hold(sk); |
| |
| read_unlock(&dn_hash_lock); |
| |
| return sk; |
| } |
| |
| |
| |
| static void dn_destruct(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| |
| skb_queue_purge(&scp->data_xmit_queue); |
| skb_queue_purge(&scp->other_xmit_queue); |
| skb_queue_purge(&scp->other_receive_queue); |
| |
| dst_release(xchg(&sk->dst_cache, NULL)); |
| |
| MOD_DEC_USE_COUNT; |
| } |
| |
| struct sock *dn_alloc_sock(struct socket *sock, int gfp) |
| { |
| struct sock *sk; |
| struct dn_scp *scp; |
| |
| if ((sk = sk_alloc(PF_DECnet, gfp, 1)) == NULL) |
| goto no_sock; |
| |
| if (sock) { |
| sock->ops = &dn_proto_ops; |
| } |
| sock_init_data(sock,sk); |
| scp = DN_SK(sk); |
| |
| sk->backlog_rcv = dn_nsp_backlog_rcv; |
| sk->destruct = dn_destruct; |
| sk->no_check = 1; |
| sk->family = PF_DECnet; |
| sk->protocol = 0; |
| sk->allocation = gfp; |
| |
| /* Initialization of DECnet Session Control Port */ |
| scp->state = DN_O; /* Open */ |
| scp->numdat = 1; /* Next data seg to tx */ |
| scp->numoth = 1; /* Next oth data to tx */ |
| scp->ackxmt_dat = 0; /* Last data seg ack'ed */ |
| scp->ackxmt_oth = 0; /* Last oth data ack'ed */ |
| scp->ackrcv_dat = 0; /* Highest data ack recv*/ |
| scp->ackrcv_oth = 0; /* Last oth data ack rec*/ |
| scp->flowrem_sw = DN_SEND; |
| scp->flowloc_sw = DN_SEND; |
| scp->flowrem_dat = 0; |
| scp->flowrem_oth = 1; |
| scp->flowloc_dat = 0; |
| scp->flowloc_oth = 1; |
| scp->services_rem = 0; |
| scp->services_loc = 1 | NSP_FC_NONE; |
| scp->info_rem = 0; |
| scp->info_loc = 0x03; /* NSP version 4.1 */ |
| scp->segsize_rem = 230; /* Default: Updated by remote segsize */ |
| scp->segsize_loc = 1450; /* Best guess for ethernet */ |
| scp->nonagle = 0; |
| scp->multi_ireq = 1; |
| scp->accept_mode = ACC_IMMED; |
| scp->addr.sdn_family = AF_DECnet; |
| scp->peer.sdn_family = AF_DECnet; |
| scp->accessdata.acc_accl = 5; |
| memcpy(scp->accessdata.acc_acc, "LINUX", 5); |
| |
| scp->max_window = NSP_MAX_WINDOW; |
| scp->snd_window = NSP_MIN_WINDOW; |
| scp->nsp_srtt = NSP_INITIAL_SRTT; |
| scp->nsp_rttvar = NSP_INITIAL_RTTVAR; |
| scp->nsp_rxtshift = 0; |
| |
| skb_queue_head_init(&scp->data_xmit_queue); |
| skb_queue_head_init(&scp->other_xmit_queue); |
| skb_queue_head_init(&scp->other_receive_queue); |
| |
| scp->persist = 0; |
| scp->persist_fxn = NULL; |
| scp->keepalive = 10 * HZ; |
| scp->keepalive_fxn = dn_keepalive; |
| |
| init_timer(&scp->delack_timer); |
| scp->delack_pending = 0; |
| scp->delack_fxn = dn_nsp_delayed_ack; |
| |
| dn_start_slow_timer(sk); |
| |
| MOD_INC_USE_COUNT; |
| |
| return sk; |
| no_sock: |
| return NULL; |
| } |
| |
| /* |
| * Keepalive timer. |
| * FIXME: Should respond to SO_KEEPALIVE etc. |
| */ |
| static void dn_keepalive(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| |
| /* |
| * By checking the other_data transmit queue is empty |
| * we are double checking that we are not sending too |
| * many of these keepalive frames. |
| */ |
| if (skb_queue_len(&scp->other_xmit_queue) == 0) |
| dn_nsp_send_link(sk, DN_NOCHANGE, 0); |
| } |
| |
| |
| /* |
| * Timer for shutdown/destroyed sockets. |
| * When socket is dead & no packets have been sent for a |
| * certain amount of time, they are removed by this |
| * routine. Also takes care of sending out DI & DC |
| * frames at correct times. |
| */ |
| int dn_destroy_timer(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| |
| scp->persist = dn_nsp_persist(sk); |
| |
| switch(scp->state) { |
| case DN_DI: |
| dn_nsp_send_disc(sk, NSP_DISCINIT, 0, GFP_ATOMIC); |
| if (scp->nsp_rxtshift >= decnet_di_count) |
| scp->state = DN_CN; |
| return 0; |
| |
| case DN_DR: |
| dn_nsp_send_disc(sk, NSP_DISCINIT, 0, GFP_ATOMIC); |
| if (scp->nsp_rxtshift >= decnet_dr_count) |
| scp->state = DN_DRC; |
| return 0; |
| |
| case DN_DN: |
| if (scp->nsp_rxtshift < decnet_dn_count) { |
| /* printk(KERN_DEBUG "dn_destroy_timer: DN\n"); */ |
| dn_nsp_send_disc(sk, NSP_DISCCONF, NSP_REASON_DC, GFP_ATOMIC); |
| return 0; |
| } |
| } |
| |
| scp->persist = (HZ * decnet_time_wait); |
| |
| if (sk->socket) |
| return 0; |
| |
| dn_stop_fast_timer(sk); /* unlikely, but possible that this is runninng */ |
| if ((jiffies - scp->stamp) >= (HZ * decnet_time_wait)) { |
| dn_unhash_sock(sk); |
| sock_put(sk); |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| static void dn_destroy_sock(struct sock *sk) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| |
| scp->nsp_rxtshift = 0; /* reset back off */ |
| |
| if (sk->socket) { |
| if (sk->socket->state != SS_UNCONNECTED) |
| sk->socket->state = SS_DISCONNECTING; |
| } |
| |
| sk->state = TCP_CLOSE; |
| |
| switch(scp->state) { |
| case DN_DN: |
| dn_nsp_send_disc(sk, NSP_DISCCONF, NSP_REASON_DC, sk->allocation); |
| scp->persist_fxn = dn_destroy_timer; |
| scp->persist = dn_nsp_persist(sk); |
| break; |
| case DN_CR: |
| scp->state = DN_DR; |
| goto disc_reject; |
| case DN_RUN: |
| scp->state = DN_DI; |
| case DN_DI: |
| case DN_DR: |
| disc_reject: |
| dn_nsp_send_disc(sk, NSP_DISCINIT, 0, sk->allocation); |
| case DN_NC: |
| case DN_NR: |
| case DN_RJ: |
| case DN_DIC: |
| case DN_CN: |
| case DN_DRC: |
| case DN_CI: |
| case DN_CD: |
| scp->persist_fxn = dn_destroy_timer; |
| scp->persist = dn_nsp_persist(sk); |
| break; |
| default: |
| printk(KERN_DEBUG "DECnet: dn_destroy_sock passed socket in invalid state\n"); |
| case DN_O: |
| dn_stop_fast_timer(sk); |
| dn_stop_slow_timer(sk); |
| |
| dn_unhash_sock_bh(sk); |
| sock_put(sk); |
| |
| break; |
| } |
| } |
| |
| char *dn_addr2asc(dn_address addr, char *buf) |
| { |
| unsigned short node, area; |
| |
| node = addr & 0x03ff; |
| area = addr >> 10; |
| sprintf(buf, "%hd.%hd", area, node); |
| |
| return buf; |
| } |
| |
| |
| static char *dn_state2asc(unsigned char state) |
| { |
| switch(state) { |
| case DN_O: |
| return "OPEN"; |
| case DN_CR: |
| return " CR"; |
| case DN_DR: |
| return " DR"; |
| case DN_DRC: |
| return " DRC"; |
| case DN_CC: |
| return " CC"; |
| case DN_CI: |
| return " CI"; |
| case DN_NR: |
| return " NR"; |
| case DN_NC: |
| return " NC"; |
| case DN_CD: |
| return " CD"; |
| case DN_RJ: |
| return " RJ"; |
| case DN_RUN: |
| return " RUN"; |
| case DN_DI: |
| return " DI"; |
| case DN_DIC: |
| return " DIC"; |
| case DN_DN: |
| return " DN"; |
| case DN_CL: |
| return " CL"; |
| case DN_CN: |
| return " CN"; |
| } |
| |
| return "????"; |
| } |
| |
| static int dn_create(struct socket *sock, int protocol) |
| { |
| struct sock *sk; |
| |
| switch(sock->type) { |
| case SOCK_SEQPACKET: |
| if (protocol != DNPROTO_NSP) |
| return -EPROTONOSUPPORT; |
| break; |
| case SOCK_STREAM: |
| break; |
| default: |
| return -ESOCKTNOSUPPORT; |
| } |
| |
| |
| if ((sk = dn_alloc_sock(sock, GFP_KERNEL)) == NULL) |
| return -ENOBUFS; |
| |
| sk->protocol = protocol; |
| |
| return 0; |
| } |
| |
| |
| static int |
| dn_release(struct socket *sock) |
| { |
| struct sock *sk = sock->sk; |
| |
| if (sk) { |
| sock_orphan(sk); |
| sock_hold(sk); |
| lock_sock(sk); |
| dn_destroy_sock(sk); |
| release_sock(sk); |
| sock_put(sk); |
| } |
| |
| return 0; |
| } |
| |
| static int dn_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| struct sockaddr_dn *saddr = (struct sockaddr_dn *)uaddr; |
| struct net_device *dev; |
| int rv; |
| |
| if (sk->zapped == 0) |
| return -EINVAL; |
| |
| if (addr_len != sizeof(struct sockaddr_dn)) |
| return -EINVAL; |
| |
| if (saddr->sdn_family != AF_DECnet) |
| return -EINVAL; |
| |
| if (dn_ntohs(saddr->sdn_nodeaddrl) && (dn_ntohs(saddr->sdn_nodeaddrl) != 2)) |
| return -EINVAL; |
| |
| if (saddr->sdn_objnum && !capable(CAP_NET_BIND_SERVICE)) |
| return -EPERM; |
| |
| if (dn_ntohs(saddr->sdn_objnamel) > DN_MAXOBJL) |
| return -EINVAL; |
| |
| if (saddr->sdn_flags & ~SDF_WILD) |
| return -EINVAL; |
| |
| if (saddr->sdn_flags & SDF_WILD) { |
| if (!capable(CAP_NET_BIND_SERVICE)) |
| return -EPERM; |
| } else { |
| if (dn_ntohs(saddr->sdn_nodeaddrl)) { |
| read_lock(&dev_base_lock); |
| for(dev = dev_base; dev; dev = dev->next) { |
| if (!dev->dn_ptr) |
| continue; |
| if (dn_dev_islocal(dev, dn_saddr2dn(saddr))) |
| break; |
| } |
| read_unlock(&dev_base_lock); |
| if (dev == NULL) |
| return -EADDRNOTAVAIL; |
| } |
| } |
| |
| |
| memcpy(&scp->addr, saddr, addr_len); |
| sk->zapped = 0; |
| |
| if ((rv = dn_hash_sock(sk)) != 0) |
| sk->zapped = 1; |
| |
| return rv; |
| } |
| |
| |
| static int dn_auto_bind(struct socket *sock) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| |
| sk->zapped = 0; |
| |
| scp->addr.sdn_flags = 0; |
| scp->addr.sdn_objnum = 0; |
| |
| /* |
| * This stuff is to keep compatibility with Eduardo's |
| * patch. I hope I can dispense with it shortly... |
| */ |
| if ((scp->accessdata.acc_accl != 0) && |
| (scp->accessdata.acc_accl <= 12)) { |
| |
| scp->addr.sdn_objnamel = dn_htons(scp->accessdata.acc_accl); |
| memcpy(scp->addr.sdn_objname, scp->accessdata.acc_acc, dn_ntohs(scp->addr.sdn_objnamel)); |
| |
| scp->accessdata.acc_accl = 0; |
| memset(scp->accessdata.acc_acc, 0, 40); |
| } |
| |
| scp->addr.sdn_add.a_len = dn_htons(2); |
| *(dn_address *)scp->addr.sdn_add.a_addr = decnet_address; |
| |
| dn_hash_sock(sk); |
| |
| return 0; |
| } |
| |
| |
| static int dn_connect(struct socket *sock, struct sockaddr *uaddr, int addr_len, int flags) |
| { |
| struct sockaddr_dn *addr = (struct sockaddr_dn *)uaddr; |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| int err = -EISCONN; |
| |
| lock_sock(sk); |
| |
| if (sock->state == SS_CONNECTED) |
| goto out; |
| |
| if (sock->state == SS_CONNECTING) { |
| err = 0; |
| if (sk->state == TCP_ESTABLISHED) |
| goto out; |
| |
| err = -ECONNREFUSED; |
| if (sk->state == TCP_CLOSE) |
| goto out; |
| } |
| |
| err = -EINVAL; |
| if (DN_SK(sk)->state != DN_O) |
| goto out; |
| |
| if (addr_len != sizeof(struct sockaddr_dn)) |
| goto out; |
| |
| if (addr->sdn_family != AF_DECnet) |
| goto out; |
| |
| if (addr->sdn_flags & SDF_WILD) |
| goto out; |
| |
| err = -EADDRNOTAVAIL; |
| if (sk->zapped && (err = dn_auto_bind(sock))) |
| goto out; |
| |
| memcpy(&scp->peer, addr, addr_len); |
| |
| err = -EHOSTUNREACH; |
| if (dn_route_output(&sk->dst_cache, dn_saddr2dn(&scp->peer), dn_saddr2dn(&scp->addr), 0) < 0) |
| goto out; |
| |
| sk->state = TCP_SYN_SENT; |
| sock->state = SS_CONNECTING; |
| DN_SK(sk)->state = DN_CI; |
| |
| dn_nsp_send_conninit(sk, NSP_CI); |
| |
| err = -EINPROGRESS; |
| if ((sk->state == TCP_SYN_SENT) && (flags & O_NONBLOCK)) |
| goto out; |
| |
| while(sk->state == TCP_SYN_SENT) { |
| |
| err = -ERESTARTSYS; |
| if (signal_pending(current)) |
| goto out; |
| |
| if ((err = sock_error(sk)) != 0) { |
| sock->state = SS_UNCONNECTED; |
| goto out; |
| } |
| |
| SOCK_SLEEP_PRE(sk); |
| |
| if (sk->state == TCP_SYN_SENT) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk); |
| } |
| |
| if (sk->state != TCP_ESTABLISHED) { |
| sock->state = SS_UNCONNECTED; |
| err = sock_error(sk); |
| goto out; |
| } |
| |
| err = 0; |
| sock->state = SS_CONNECTED; |
| out: |
| release_sock(sk); |
| |
| return err; |
| } |
| |
| static void dn_access_copy(struct sk_buff *skb, struct accessdata_dn *acc) |
| { |
| unsigned char *ptr = skb->data; |
| |
| acc->acc_userl = *ptr++; |
| memcpy(&acc->acc_user, ptr, acc->acc_userl); |
| ptr += acc->acc_userl; |
| |
| acc->acc_passl = *ptr++; |
| memcpy(&acc->acc_pass, ptr, acc->acc_passl); |
| ptr += acc->acc_passl; |
| |
| acc->acc_accl = *ptr++; |
| memcpy(&acc->acc_acc, ptr, acc->acc_accl); |
| |
| skb_pull(skb, acc->acc_accl + acc->acc_passl + acc->acc_userl + 3); |
| |
| } |
| |
| static void dn_user_copy(struct sk_buff *skb, struct optdata_dn *opt) |
| { |
| unsigned char *ptr = skb->data; |
| |
| opt->opt_optl = *ptr++; |
| opt->opt_status = 0; |
| memcpy(opt->opt_data, ptr, opt->opt_optl); |
| skb_pull(skb, opt->opt_optl + 1); |
| |
| } |
| |
| |
| /* |
| * This is here for use in the sockopt() call as well as |
| * in accept(). Must be called with a locked socket. |
| */ |
| static int dn_wait_accept(struct socket *sock, int flags) |
| { |
| struct sock *sk = sock->sk; |
| |
| while(sk->state == TCP_LISTEN) { |
| if (flags & O_NONBLOCK) { |
| return -EAGAIN; |
| } |
| |
| SOCK_SLEEP_PRE(sk) |
| |
| if (sk->state == TCP_LISTEN) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk) |
| |
| if (signal_pending(current)) |
| return -ERESTARTSYS; /* But of course you don't! */ |
| } |
| |
| if ((DN_SK(sk)->state != DN_RUN) && (DN_SK(sk)->state != DN_DRC)) { |
| sock->state = SS_UNCONNECTED; |
| return sock_error(sk); |
| } |
| |
| sock->state = SS_CONNECTED; |
| |
| return 0; |
| } |
| |
| |
| static int dn_accept(struct socket *sock, struct socket *newsock, int flags) |
| { |
| struct sock *sk = sock->sk, *newsk; |
| struct sk_buff *skb = NULL; |
| struct dn_skb_cb *cb; |
| unsigned char menuver; |
| int err = 0; |
| unsigned char type; |
| |
| lock_sock(sk); |
| |
| if (sk->state != TCP_LISTEN) { |
| release_sock(sk); |
| return -EINVAL; |
| } |
| |
| if (DN_SK(sk)->state != DN_O) { |
| release_sock(sk); |
| return -EINVAL; |
| } |
| |
| do |
| { |
| if ((skb = skb_dequeue(&sk->receive_queue)) == NULL) |
| { |
| if (flags & O_NONBLOCK) |
| { |
| release_sock(sk); |
| return -EAGAIN; |
| } |
| |
| SOCK_SLEEP_PRE(sk); |
| |
| if (!skb_peek(&sk->receive_queue)) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk); |
| |
| if (signal_pending(current)) |
| { |
| release_sock(sk); |
| return -ERESTARTSYS; |
| } |
| } |
| } while (skb == NULL); |
| |
| cb = DN_SKB_CB(skb); |
| |
| if ((newsk = dn_alloc_sock(newsock, sk->allocation)) == NULL) { |
| release_sock(sk); |
| kfree_skb(skb); |
| return -ENOBUFS; |
| } |
| sk->ack_backlog--; |
| release_sock(sk); |
| |
| dst_release(xchg(&newsk->dst_cache, skb->dst)); |
| skb->dst = NULL; |
| |
| DN_SK(newsk)->state = DN_CR; |
| DN_SK(newsk)->addrrem = cb->src_port; |
| DN_SK(newsk)->services_rem = cb->services; |
| DN_SK(newsk)->info_rem = cb->info; |
| DN_SK(newsk)->segsize_rem = cb->segsize; |
| DN_SK(newsk)->accept_mode = DN_SK(sk)->accept_mode; |
| |
| if (DN_SK(newsk)->segsize_rem < 230) |
| DN_SK(newsk)->segsize_rem = 230; |
| |
| newsk->state = TCP_LISTEN; |
| newsk->zapped = 0; |
| |
| memcpy(&(DN_SK(newsk)->addr), &(DN_SK(sk)->addr), sizeof(struct sockaddr_dn)); |
| |
| /* |
| * If we are listening on a wild socket, we don't want |
| * the newly created socket on the wrong hash queue. |
| */ |
| DN_SK(newsk)->addr.sdn_flags &= ~SDF_WILD; |
| |
| skb_pull(skb, dn_username2sockaddr(skb->data, skb->len, &(DN_SK(newsk)->addr), &type)); |
| skb_pull(skb, dn_username2sockaddr(skb->data, skb->len, &(DN_SK(newsk)->peer), &type)); |
| *(dn_address *)(DN_SK(newsk)->peer.sdn_add.a_addr) = cb->src; |
| *(dn_address *)(DN_SK(newsk)->addr.sdn_add.a_addr) = cb->dst; |
| |
| menuver = *skb->data; |
| skb_pull(skb, 1); |
| |
| if (menuver & DN_MENUVER_ACC) |
| dn_access_copy(skb, &(DN_SK(newsk)->accessdata)); |
| |
| if (menuver & DN_MENUVER_USR) |
| dn_user_copy(skb, &(DN_SK(newsk)->conndata_in)); |
| |
| if (menuver & DN_MENUVER_PRX) |
| DN_SK(newsk)->peer.sdn_flags |= SDF_PROXY; |
| |
| if (menuver & DN_MENUVER_UIC) |
| DN_SK(newsk)->peer.sdn_flags |= SDF_UICPROXY; |
| |
| kfree_skb(skb); |
| |
| memcpy(&(DN_SK(newsk)->conndata_out), &(DN_SK(sk)->conndata_out), |
| sizeof(struct optdata_dn)); |
| memcpy(&(DN_SK(newsk)->discdata_out), &(DN_SK(sk)->discdata_out), |
| sizeof(struct optdata_dn)); |
| |
| lock_sock(newsk); |
| dn_hash_sock(newsk); |
| |
| dn_send_conn_ack(newsk); |
| |
| /* |
| * Here we use sk->allocation since although the conn conf is |
| * for the newsk, the context is the old socket. |
| */ |
| if (DN_SK(newsk)->accept_mode == ACC_IMMED) { |
| DN_SK(newsk)->state = DN_CC; |
| dn_send_conn_conf(newsk, sk->allocation); |
| err = dn_wait_accept(newsock, flags); |
| } |
| |
| release_sock(newsk); |
| return err; |
| } |
| |
| |
| static int dn_getname(struct socket *sock, struct sockaddr *uaddr,int *uaddr_len,int peer) |
| { |
| struct sockaddr_dn *sa = (struct sockaddr_dn *)uaddr; |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| |
| *uaddr_len = sizeof(struct sockaddr_dn); |
| |
| lock_sock(sk); |
| |
| if (peer) { |
| if (sock->state != SS_CONNECTED && scp->accept_mode == ACC_IMMED) |
| return -ENOTCONN; |
| |
| memcpy(sa, &scp->peer, sizeof(struct sockaddr_dn)); |
| } else { |
| memcpy(sa, &scp->addr, sizeof(struct sockaddr_dn)); |
| } |
| |
| release_sock(sk); |
| |
| return 0; |
| } |
| |
| |
| static unsigned int dn_poll(struct file *file, struct socket *sock, poll_table *wait) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| int mask = datagram_poll(file, sock, wait); |
| |
| if (skb_queue_len(&scp->other_receive_queue)) |
| mask |= POLLRDBAND; |
| |
| return mask; |
| } |
| |
| static int dn_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| int err = -EOPNOTSUPP; |
| unsigned long amount = 0; |
| struct sk_buff *skb; |
| int val; |
| |
| switch(cmd) |
| { |
| case SIOCGIFADDR: |
| case SIOCSIFADDR: |
| return dn_dev_ioctl(cmd, (void *)arg); |
| |
| case SIOCATMARK: |
| lock_sock(sk); |
| val = (skb_queue_len(&scp->other_receive_queue) != 0); |
| if (scp->state != DN_RUN) |
| val = -ENOTCONN; |
| release_sock(sk); |
| return val; |
| |
| #ifdef CONFIG_DECNET_ROUTER |
| case SIOCADDRT: |
| case SIOCDELRT: |
| return dn_fib_ioctl(sock, cmd, arg); |
| #endif /* CONFIG_DECNET_ROUTER */ |
| |
| case OSIOCSNETADDR: |
| if (!capable(CAP_NET_ADMIN)) { |
| err = -EPERM; |
| break; |
| } |
| |
| dn_dev_devices_off(); |
| |
| decnet_address = (unsigned short)arg; |
| dn_dn2eth(decnet_ether_address, dn_ntohs(decnet_address)); |
| |
| dn_dev_devices_on(); |
| err = 0; |
| break; |
| |
| case OSIOCGNETADDR: |
| err = put_user(decnet_address, (unsigned short *)arg); |
| break; |
| case SIOCGIFCONF: |
| case SIOCGIFFLAGS: |
| case SIOCGIFBRDADDR: |
| return dev_ioctl(cmd,(void *)arg); |
| |
| case TIOCOUTQ: |
| amount = sk->sndbuf - atomic_read(&sk->wmem_alloc); |
| if (amount < 0) |
| amount = 0; |
| err = put_user(amount, (int *)arg); |
| break; |
| |
| case TIOCINQ: |
| lock_sock(sk); |
| if ((skb = skb_peek(&scp->other_receive_queue)) != NULL) { |
| amount = skb->len; |
| } else { |
| struct sk_buff *skb = sk->receive_queue.next; |
| for(;;) { |
| if (skb == (struct sk_buff *)&sk->receive_queue) |
| break; |
| amount += skb->len; |
| skb = skb->next; |
| } |
| } |
| release_sock(sk); |
| err = put_user(amount, (int *)arg); |
| break; |
| } |
| |
| return err; |
| } |
| |
| static int dn_listen(struct socket *sock, int backlog) |
| { |
| struct sock *sk = sock->sk; |
| int err = -EINVAL; |
| |
| lock_sock(sk); |
| |
| if (sk->zapped) |
| goto out; |
| |
| if ((DN_SK(sk)->state != DN_O) || (sk->state == TCP_LISTEN)) |
| goto out; |
| |
| sk->max_ack_backlog = backlog; |
| sk->ack_backlog = 0; |
| sk->state = TCP_LISTEN; |
| err = 0; |
| |
| out: |
| release_sock(sk); |
| |
| return err; |
| } |
| |
| |
| static int dn_shutdown(struct socket *sock, int how) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| int err = -ENOTCONN; |
| |
| lock_sock(sk); |
| |
| if (sock->state == SS_UNCONNECTED) |
| goto out; |
| |
| err = 0; |
| if (sock->state == SS_DISCONNECTING) |
| goto out; |
| |
| err = -EINVAL; |
| if (scp->state == DN_O) |
| goto out; |
| |
| if (how != SHUTDOWN_MASK) |
| goto out; |
| |
| |
| sk->shutdown = how; |
| dn_destroy_sock(sk); |
| err = 0; |
| |
| out: |
| release_sock(sk); |
| |
| return err; |
| } |
| |
| static int dn_setsockopt(struct socket *sock, int level, int optname, char *optval, int optlen) |
| { |
| struct sock *sk = sock->sk; |
| int err; |
| |
| lock_sock(sk); |
| err = __dn_setsockopt(sock, level, optname, optval, optlen, 0); |
| release_sock(sk); |
| |
| return err; |
| } |
| |
| static int __dn_setsockopt(struct socket *sock, int level,int optname, char *optval, int optlen, int flags) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| union { |
| struct optdata_dn opt; |
| struct accessdata_dn acc; |
| int mode; |
| unsigned long win; |
| int val; |
| unsigned char services; |
| unsigned char info; |
| } u; |
| int err; |
| |
| if (optlen && !optval) |
| return -EINVAL; |
| |
| if (optlen > sizeof(u)) |
| return -EINVAL; |
| |
| if (copy_from_user(&u, optval, optlen)) |
| return -EFAULT; |
| |
| switch(optname) { |
| case DSO_CONDATA: |
| if (sock->state == SS_CONNECTED) |
| return -EISCONN; |
| if ((scp->state != DN_O) && (scp->state != DN_CR)) |
| return -EINVAL; |
| |
| if (optlen != sizeof(struct optdata_dn)) |
| return -EINVAL; |
| |
| if (u.opt.opt_optl > 16) |
| return -EINVAL; |
| |
| memcpy(&scp->conndata_out, &u.opt, optlen); |
| break; |
| |
| case DSO_DISDATA: |
| if (sock->state != SS_CONNECTED && scp->accept_mode == ACC_IMMED) |
| return -ENOTCONN; |
| |
| if (optlen != sizeof(struct optdata_dn)) |
| return -EINVAL; |
| |
| if (u.opt.opt_optl > 16) |
| return -EINVAL; |
| |
| memcpy(&scp->discdata_out, &u.opt, optlen); |
| break; |
| |
| case DSO_CONACCESS: |
| if (sock->state == SS_CONNECTED) |
| return -EISCONN; |
| if (scp->state != DN_O) |
| return -EINVAL; |
| |
| if (optlen != sizeof(struct accessdata_dn)) |
| return -EINVAL; |
| |
| if ((u.acc.acc_accl > DN_MAXACCL) || |
| (u.acc.acc_passl > DN_MAXACCL) || |
| (u.acc.acc_userl > DN_MAXACCL)) |
| return -EINVAL; |
| |
| memcpy(&scp->accessdata, &u.acc, optlen); |
| break; |
| |
| case DSO_ACCEPTMODE: |
| if (sock->state == SS_CONNECTED) |
| return -EISCONN; |
| if (scp->state != DN_O) |
| return -EINVAL; |
| |
| if (optlen != sizeof(int)) |
| return -EINVAL; |
| |
| if ((u.mode != ACC_IMMED) && (u.mode != ACC_DEFER)) |
| return -EINVAL; |
| |
| scp->accept_mode = (unsigned char)u.mode; |
| break; |
| |
| case DSO_CONACCEPT: |
| |
| if (scp->state != DN_CR) |
| return -EINVAL; |
| |
| scp->state = DN_CC; |
| dn_send_conn_conf(sk, sk->allocation); |
| err = dn_wait_accept(sock, sock->file->f_flags); |
| return err; |
| |
| case DSO_CONREJECT: |
| |
| if (scp->state != DN_CR) |
| return -EINVAL; |
| |
| scp->state = DN_DR; |
| sk->shutdown = SHUTDOWN_MASK; |
| dn_nsp_send_disc(sk, 0x38, 0, sk->allocation); |
| break; |
| |
| default: |
| #ifdef CONFIG_NETFILTER |
| return nf_setsockopt(sk, PF_DECnet, optname, optval, optlen); |
| #endif |
| case DSO_LINKINFO: |
| case DSO_STREAM: |
| case DSO_SEQPACKET: |
| return -ENOPROTOOPT; |
| |
| case DSO_MAXWINDOW: |
| if (optlen != sizeof(unsigned long)) |
| return -EINVAL; |
| if (u.win > NSP_MAX_WINDOW) |
| u.win = NSP_MAX_WINDOW; |
| if (u.win == 0) |
| return -EINVAL; |
| scp->max_window = u.win; |
| if (scp->snd_window > u.win) |
| scp->snd_window = u.win; |
| break; |
| |
| case DSO_NODELAY: |
| if (optlen != sizeof(int)) |
| return -EINVAL; |
| if (scp->nonagle == 2) |
| return -EINVAL; |
| scp->nonagle = (u.val == 0) ? 0 : 1; |
| /* if (scp->nonagle == 1) { Push pending frames } */ |
| break; |
| |
| case DSO_CORK: |
| if (optlen != sizeof(int)) |
| return -EINVAL; |
| if (scp->nonagle == 1) |
| return -EINVAL; |
| scp->nonagle = (u.val == 0) ? 0 : 2; |
| /* if (scp->nonagle == 0) { Push pending frames } */ |
| break; |
| |
| case DSO_SERVICES: |
| if (optlen != sizeof(unsigned char)) |
| return -EINVAL; |
| if ((u.services & ~NSP_FC_MASK) != 0x01) |
| return -EINVAL; |
| if ((u.services & NSP_FC_MASK) == NSP_FC_MASK) |
| return -EINVAL; |
| scp->services_loc = u.services; |
| break; |
| |
| case DSO_INFO: |
| if (optlen != sizeof(unsigned char)) |
| return -EINVAL; |
| if (u.info & 0xfc) |
| return -EINVAL; |
| scp->info_loc = u.info; |
| break; |
| } |
| |
| return 0; |
| } |
| |
| static int dn_getsockopt(struct socket *sock, int level, int optname, char *optval, int *optlen) |
| { |
| struct sock *sk = sock->sk; |
| int err; |
| |
| lock_sock(sk); |
| err = __dn_getsockopt(sock, level, optname, optval, optlen, 0); |
| release_sock(sk); |
| |
| return err; |
| } |
| |
| static int __dn_getsockopt(struct socket *sock, int level,int optname, char *optval,int *optlen, int flags) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| struct linkinfo_dn link; |
| int r_len = *optlen; |
| void *r_data = NULL; |
| int val; |
| |
| switch(optname) { |
| case DSO_CONDATA: |
| if (r_len > sizeof(struct optdata_dn)) |
| r_len = sizeof(struct optdata_dn); |
| r_data = &scp->conndata_in; |
| break; |
| |
| case DSO_DISDATA: |
| if (r_len > sizeof(struct optdata_dn)) |
| r_len = sizeof(struct optdata_dn); |
| r_data = &scp->discdata_in; |
| break; |
| |
| case DSO_CONACCESS: |
| if (r_len > sizeof(struct accessdata_dn)) |
| r_len = sizeof(struct accessdata_dn); |
| r_data = &scp->accessdata; |
| break; |
| |
| case DSO_ACCEPTMODE: |
| if (r_len > sizeof(unsigned char)) |
| r_len = sizeof(unsigned char); |
| r_data = &scp->accept_mode; |
| break; |
| |
| case DSO_LINKINFO: |
| if (r_len > sizeof(struct linkinfo_dn)) |
| r_len = sizeof(struct linkinfo_dn); |
| |
| switch(sock->state) { |
| case SS_CONNECTING: |
| link.idn_linkstate = LL_CONNECTING; |
| break; |
| case SS_DISCONNECTING: |
| link.idn_linkstate = LL_DISCONNECTING; |
| break; |
| case SS_CONNECTED: |
| link.idn_linkstate = LL_RUNNING; |
| break; |
| default: |
| link.idn_linkstate = LL_INACTIVE; |
| } |
| |
| link.idn_segsize = scp->segsize_rem; |
| r_data = &link; |
| break; |
| |
| default: |
| #ifdef CONFIG_NETFILTER |
| { |
| int val, len = *optlen; |
| val = nf_getsockopt(sk, PF_DECnet, optname, |
| optval, &len); |
| if (val >= 0) |
| val = put_user(len, optlen); |
| return val; |
| } |
| #endif |
| case DSO_STREAM: |
| case DSO_SEQPACKET: |
| case DSO_CONACCEPT: |
| case DSO_CONREJECT: |
| return -ENOPROTOOPT; |
| |
| case DSO_MAXWINDOW: |
| if (r_len > sizeof(unsigned long)) |
| r_len = sizeof(unsigned long); |
| r_data = &scp->max_window; |
| break; |
| |
| case DSO_NODELAY: |
| if (r_len > sizeof(int)) |
| r_len = sizeof(int); |
| val = (scp->nonagle == 1); |
| r_data = &val; |
| break; |
| |
| case DSO_CORK: |
| if (r_len > sizeof(int)) |
| r_len = sizeof(int); |
| val = (scp->nonagle == 2); |
| r_data = &val; |
| break; |
| |
| case DSO_SERVICES: |
| if (r_len > sizeof(unsigned char)) |
| r_len = sizeof(unsigned char); |
| r_data = &scp->services_rem; |
| break; |
| |
| case DSO_INFO: |
| if (r_len > sizeof(unsigned char)) |
| r_len = sizeof(unsigned char); |
| r_data = &scp->info_rem; |
| break; |
| } |
| |
| if (r_data) { |
| if (copy_to_user(optval, r_data, r_len)) |
| return -EFAULT; |
| if (put_user(r_len, optlen)) |
| return -EFAULT; |
| } |
| |
| return 0; |
| } |
| |
| |
| /* |
| * Used by send/recvmsg to wait until the socket is connected |
| * before passing data. |
| */ |
| static int dn_wait_run(struct sock *sk, int flags) |
| { |
| struct dn_scp *scp = DN_SK(sk); |
| int err = 0; |
| |
| switch(scp->state) { |
| case DN_RUN: |
| return 0; |
| |
| case DN_CR: |
| scp->state = DN_CC; |
| dn_send_conn_conf(sk, sk->allocation); |
| return dn_wait_accept(sk->socket, (flags & MSG_DONTWAIT) ? O_NONBLOCK : 0); |
| case DN_CI: |
| case DN_CC: |
| break; |
| default: |
| return -ENOTCONN; |
| } |
| |
| if (flags & MSG_DONTWAIT) |
| return -EWOULDBLOCK; |
| |
| do { |
| if ((err = sock_error(sk)) != 0) |
| break; |
| |
| if (signal_pending(current)) { |
| err = -ERESTARTSYS; |
| break; |
| } |
| |
| SOCK_SLEEP_PRE(sk) |
| |
| if (scp->state != DN_RUN) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk) |
| |
| } while(scp->state != DN_RUN); |
| |
| return 0; |
| } |
| |
| |
| static int dn_data_ready(struct sock *sk, struct sk_buff_head *q, int flags, int target) |
| { |
| struct sk_buff *skb = q->next; |
| int len = 0; |
| |
| if (flags & MSG_OOB) |
| return skb_queue_len(q) ? 1 : 0; |
| |
| while(skb != (struct sk_buff *)q) { |
| struct dn_skb_cb *cb = DN_SKB_CB(skb); |
| len += skb->len; |
| |
| if (cb->nsp_flags & 0x40) { |
| /* SOCK_SEQPACKET reads to EOM */ |
| if (sk->type == SOCK_SEQPACKET) |
| return 1; |
| /* so does SOCK_STREAM unless WAITALL is specified */ |
| if (!(flags & MSG_WAITALL)) |
| return 1; |
| } |
| |
| /* minimum data length for read exceeded */ |
| if (len >= target) |
| return 1; |
| |
| skb = skb->next; |
| } |
| |
| return 0; |
| } |
| |
| |
| static int dn_recvmsg(struct socket *sock, struct msghdr *msg, int size, |
| int flags, struct scm_cookie *scm) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| struct sk_buff_head *queue = &sk->receive_queue; |
| int target = size > 1 ? 1 : 0; |
| int copied = 0; |
| int rv = 0; |
| struct sk_buff *skb, *nskb; |
| struct dn_skb_cb *cb = NULL; |
| unsigned char eor = 0; |
| |
| lock_sock(sk); |
| |
| if (sk->zapped) { |
| rv = -EADDRNOTAVAIL; |
| goto out; |
| } |
| |
| if ((rv = dn_wait_run(sk, flags)) != 0) |
| goto out; |
| |
| if (sk->shutdown & RCV_SHUTDOWN) { |
| send_sig(SIGPIPE, current, 0); |
| rv = -EPIPE; |
| goto out; |
| } |
| |
| if (flags & ~(MSG_PEEK|MSG_OOB|MSG_WAITALL|MSG_DONTWAIT)) { |
| rv = -EOPNOTSUPP; |
| goto out; |
| } |
| |
| if (flags & MSG_OOB) |
| queue = &scp->other_receive_queue; |
| |
| if (flags & MSG_WAITALL) |
| target = size; |
| |
| |
| /* |
| * See if there is data ready to read, sleep if there isn't |
| */ |
| for(;;) { |
| if (sk->err) |
| goto out; |
| |
| if (skb_queue_len(&scp->other_receive_queue)) { |
| if (!(flags & MSG_OOB)) { |
| msg->msg_flags |= MSG_OOB; |
| if (!scp->other_report) { |
| scp->other_report = 1; |
| goto out; |
| } |
| } |
| } |
| |
| if (scp->state != DN_RUN) |
| goto out; |
| |
| if (signal_pending(current)) { |
| rv = -ERESTARTSYS; |
| goto out; |
| } |
| |
| if (dn_data_ready(sk, queue, flags, target)) |
| break; |
| |
| if (flags & MSG_DONTWAIT) { |
| rv = -EWOULDBLOCK; |
| goto out; |
| } |
| |
| set_bit(SOCK_ASYNC_WAITDATA, &sock->flags); |
| SOCK_SLEEP_PRE(sk) |
| |
| if (!dn_data_ready(sk, queue, flags, target)) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk) |
| clear_bit(SOCK_ASYNC_WAITDATA, &sock->flags); |
| } |
| |
| for(skb = queue->next; skb != (struct sk_buff *)queue; skb = nskb) { |
| int chunk = skb->len; |
| cb = DN_SKB_CB(skb); |
| |
| if ((chunk + copied) > size) |
| chunk = size - copied; |
| |
| if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) { |
| rv = -EFAULT; |
| break; |
| } |
| copied += chunk; |
| |
| if (!(flags & MSG_PEEK)) |
| skb_pull(skb, chunk); |
| |
| eor = cb->nsp_flags & 0x40; |
| nskb = skb->next; |
| |
| if (skb->len == 0) { |
| skb_unlink(skb); |
| kfree_skb(skb); |
| /* |
| * N.B. Don't refer to skb or cb after this point |
| * in loop. |
| */ |
| if ((scp->flowloc_sw == DN_DONTSEND) && !dn_congested(sk)) { |
| scp->flowloc_sw = DN_SEND; |
| dn_nsp_send_link(sk, DN_SEND, 0); |
| } |
| } |
| |
| if (eor) { |
| if (sk->type == SOCK_SEQPACKET) |
| break; |
| if (!(flags & MSG_WAITALL)) |
| break; |
| } |
| |
| if (flags & MSG_OOB) |
| break; |
| |
| if (copied >= target) |
| break; |
| } |
| |
| rv = copied; |
| |
| |
| if (eor && (sk->type == SOCK_SEQPACKET)) |
| msg->msg_flags |= MSG_EOR; |
| |
| out: |
| if (rv == 0) |
| rv = (flags & MSG_PEEK) ? -sk->err : sock_error(sk); |
| |
| if ((rv >= 0) && msg->msg_name) { |
| memcpy(msg->msg_name, &scp->peer, sizeof(struct sockaddr_dn)); |
| msg->msg_namelen = sizeof(struct sockaddr_dn); |
| } |
| |
| release_sock(sk); |
| |
| return rv; |
| } |
| |
| |
| static inline int dn_queue_too_long(struct dn_scp *scp, struct sk_buff_head *queue, int flags) |
| { |
| unsigned char fctype = scp->services_rem & NSP_FC_MASK; |
| if (skb_queue_len(queue) >= scp->snd_window) |
| return 1; |
| if (fctype != NSP_FC_NONE) { |
| if (flags & MSG_OOB) { |
| if (scp->flowrem_oth == 0) |
| return 1; |
| } else { |
| if (scp->flowrem_dat == 0) |
| return 1; |
| } |
| } |
| return 0; |
| } |
| |
| static int dn_sendmsg(struct socket *sock, struct msghdr *msg, int size, |
| struct scm_cookie *scm) |
| { |
| struct sock *sk = sock->sk; |
| struct dn_scp *scp = DN_SK(sk); |
| int mss; |
| struct sk_buff_head *queue = &scp->data_xmit_queue; |
| int flags = msg->msg_flags; |
| int err = 0; |
| int sent = 0; |
| int addr_len = msg->msg_namelen; |
| struct sockaddr_dn *addr = (struct sockaddr_dn *)msg->msg_name; |
| struct sk_buff *skb = NULL; |
| struct dn_skb_cb *cb; |
| unsigned char msgflg; |
| unsigned char *ptr; |
| unsigned short ack; |
| int len; |
| unsigned char fctype; |
| |
| if (flags & ~(MSG_TRYHARD|MSG_OOB|MSG_DONTWAIT|MSG_EOR)) |
| return -EOPNOTSUPP; |
| |
| if (addr_len && (addr_len != sizeof(struct sockaddr_dn))) |
| return -EINVAL; |
| |
| if (sk->zapped && dn_auto_bind(sock)) { |
| err = -EADDRNOTAVAIL; |
| goto out; |
| } |
| |
| if (scp->state == DN_O) { |
| if (!addr_len || !addr) { |
| err = -ENOTCONN; |
| goto out; |
| } |
| |
| if ((err = dn_connect(sock, (struct sockaddr *)addr, addr_len, (flags & MSG_DONTWAIT) ? O_NONBLOCK : 0)) < 0) |
| goto out; |
| } |
| |
| lock_sock(sk); |
| |
| if ((err = dn_wait_run(sk, flags)) < 0) |
| goto out; |
| |
| if (sk->shutdown & SEND_SHUTDOWN) { |
| send_sig(SIGPIPE, current, 0); |
| err = -EPIPE; |
| goto out; |
| } |
| |
| if ((flags & MSG_TRYHARD) && sk->dst_cache) |
| dst_negative_advice(&sk->dst_cache); |
| |
| mss = scp->segsize_rem; |
| fctype = scp->services_rem & NSP_FC_MASK; |
| |
| if (sk->dst_cache && sk->dst_cache->neighbour) { |
| struct dn_neigh *dn = (struct dn_neigh *)sk->dst_cache->neighbour; |
| if (dn->blksize < (mss + 11)) |
| mss = dn->blksize - 11; |
| } |
| |
| /* |
| * The only difference between SEQPACKET & STREAM sockets under DECnet |
| * is that SEQPACKET sockets set the MSG_EOR flag for the last |
| * session control message segment. |
| */ |
| |
| if (flags & MSG_OOB) { |
| mss = 16; |
| queue = &scp->other_xmit_queue; |
| if (size > mss) { |
| err = -EMSGSIZE; |
| goto out; |
| } |
| } |
| |
| scp->persist_fxn = dn_nsp_xmit_timeout; |
| |
| while(sent < size) { |
| err = sock_error(sk); |
| if (err) |
| goto out; |
| |
| if (signal_pending(current)) { |
| err = -ERESTARTSYS; |
| goto out; |
| } |
| |
| /* |
| * Calculate size that we wish to send. |
| */ |
| len = size - sent; |
| |
| if (len > mss) |
| len = mss; |
| |
| /* |
| * Wait for queue size to go down below the window |
| * size. |
| */ |
| if (dn_queue_too_long(scp, queue, flags)) { |
| if (flags & MSG_DONTWAIT) { |
| err = -EWOULDBLOCK; |
| goto out; |
| } |
| |
| SOCK_SLEEP_PRE(sk) |
| |
| if (dn_queue_too_long(scp, queue, flags)) |
| schedule(); |
| |
| SOCK_SLEEP_POST(sk) |
| |
| continue; |
| } |
| |
| /* |
| * Get a suitably sized skb. |
| */ |
| skb = dn_alloc_send_skb(sk, &len, flags & MSG_DONTWAIT, &err); |
| |
| if (err) |
| break; |
| |
| if (!skb) |
| continue; |
| |
| cb = DN_SKB_CB(skb); |
| |
| ptr = skb_put(skb, 9); |
| |
| if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) { |
| err = -EFAULT; |
| goto out; |
| } |
| |
| if (flags & MSG_OOB) { |
| cb->segnum = scp->numoth; |
| seq_add(&scp->numoth, 1); |
| msgflg = 0x30; |
| ack = (scp->numoth_rcv & 0x0FFF) | 0x8000; |
| scp->ackxmt_oth = scp->numoth_rcv; |
| if (fctype != NSP_FC_NONE) |
| scp->flowrem_oth--; |
| } else { |
| cb->segnum = scp->numdat; |
| seq_add(&scp->numdat, 1); |
| msgflg = 0x00; |
| if (sock->type == SOCK_STREAM) |
| msgflg = 0x60; |
| if (scp->seg_total == 0) |
| msgflg |= 0x20; |
| |
| scp->seg_total += len; |
| |
| if (((sent + len) == size) && (flags & MSG_EOR)) { |
| msgflg |= 0x40; |
| scp->seg_total = 0; |
| if (fctype == NSP_FC_SCMC) |
| scp->flowrem_dat--; |
| } |
| ack = (scp->numdat_rcv & 0x0FFF) | 0x8000; |
| scp->ackxmt_dat = scp->numdat_rcv; |
| if (fctype == NSP_FC_SRC) |
| scp->flowrem_dat--; |
| } |
| |
| *ptr++ = msgflg; |
| *(__u16 *)ptr = scp->addrrem; |
| ptr += 2; |
| *(__u16 *)ptr = scp->addrloc; |
| ptr += 2; |
| *(__u16 *)ptr = dn_htons(ack); |
| ptr += 2; |
| *(__u16 *)ptr = dn_htons(cb->segnum); |
| |
| sent += len; |
| dn_nsp_queue_xmit(sk, skb, sk->allocation, flags & MSG_OOB); |
| skb = NULL; |
| |
| scp->persist = dn_nsp_persist(sk); |
| |
| } |
| out: |
| |
| if (skb) |
| kfree_skb(skb); |
| |
| release_sock(sk); |
| |
| return sent ? sent : err; |
| } |
| |
| static int dn_device_event(struct notifier_block *this, unsigned long event, |
| void *ptr) |
| { |
| struct net_device *dev = (struct net_device *)ptr; |
| |
| switch(event) { |
| case NETDEV_UP: |
| dn_dev_up(dev); |
| break; |
| case NETDEV_DOWN: |
| dn_dev_down(dev); |
| break; |
| default: |
| break; |
| } |
| |
| return NOTIFY_DONE; |
| } |
| |
| static struct notifier_block dn_dev_notifier = { |
| notifier_call: dn_device_event, |
| }; |
| |
| extern int dn_route_rcv(struct sk_buff *, struct net_device *, struct packet_type *); |
| |
| static struct packet_type dn_dix_packet_type = { |
| type: __constant_htons(ETH_P_DNA_RT), |
| dev: NULL, /* All devices */ |
| func: dn_route_rcv, |
| data: (void*)1, |
| }; |
| |
| #define IS_NOT_PRINTABLE(x) ((x) < 32 || (x) > 126) |
| |
| static void dn_printable_object(struct sockaddr_dn *dn, unsigned char *buf) |
| { |
| int i; |
| |
| switch (dn_ntohs(dn->sdn_objnamel)) { |
| case 0: |
| sprintf(buf, "%d", dn->sdn_objnum); |
| break; |
| default: |
| for (i = 0; i < dn_ntohs(dn->sdn_objnamel); i++) { |
| buf[i] = dn->sdn_objname[i]; |
| if (IS_NOT_PRINTABLE(buf[i])) |
| buf[i] = '.'; |
| } |
| buf[i] = 0; |
| } |
| } |
| |
| static int dn_get_info(char *buffer, char **start, off_t offset, int length) |
| { |
| struct sock *sk; |
| struct dn_scp *scp; |
| int len = 0; |
| off_t pos = 0; |
| off_t begin = 0; |
| char buf1[DN_ASCBUF_LEN]; |
| char buf2[DN_ASCBUF_LEN]; |
| char local_object[DN_MAXOBJL+3]; |
| char remote_object[DN_MAXOBJL+3]; |
| |
| len += sprintf(buffer + len, "Local Remote\n"); |
| |
| read_lock(&dn_hash_lock); |
| for(sk = dn_sklist; sk != NULL; sk = sk->next) { |
| scp = DN_SK(sk); |
| |
| dn_printable_object(&scp->addr, local_object); |
| dn_printable_object(&scp->peer, remote_object); |
| |
| len += sprintf(buffer + len, |
| "%6s/%04X %04d:%04d %04d:%04d %01d %-16s %6s/%04X %04d:%04d %04d:%04d %01d %-16s %4s %s\n", |
| dn_addr2asc(dn_ntohs(dn_saddr2dn(&scp->addr)), buf1), |
| scp->addrloc, |
| scp->numdat, |
| scp->numoth, |
| scp->ackxmt_dat, |
| scp->ackxmt_oth, |
| scp->flowloc_sw, |
| local_object, |
| dn_addr2asc(dn_ntohs(dn_saddr2dn(&scp->peer)), buf2), |
| scp->addrrem, |
| scp->numdat_rcv, |
| scp->numoth_rcv, |
| scp->ackrcv_dat, |
| scp->ackrcv_oth, |
| scp->flowrem_sw, |
| remote_object, |
| dn_state2asc(scp->state), |
| ((scp->accept_mode == ACC_IMMED) ? "IMMED" : "DEFER")); |
| |
| pos = begin + len; |
| if (pos < offset) { |
| len = 0; |
| begin = pos; |
| } |
| if (pos > (offset + length)) |
| break; |
| } |
| read_unlock(&dn_hash_lock); |
| |
| *start = buffer + (offset - begin); |
| len -= (offset - begin); |
| |
| if (len > length) |
| len = length; |
| |
| return len; |
| } |
| |
| |
| static struct net_proto_family dn_family_ops = { |
| family: AF_DECnet, |
| create: dn_create, |
| }; |
| |
| static struct proto_ops dn_proto_ops = { |
| family: AF_DECnet, |
| |
| release: dn_release, |
| bind: dn_bind, |
| connect: dn_connect, |
| socketpair: sock_no_socketpair, |
| accept: dn_accept, |
| getname: dn_getname, |
| poll: dn_poll, |
| ioctl: dn_ioctl, |
| listen: dn_listen, |
| shutdown: dn_shutdown, |
| setsockopt: dn_setsockopt, |
| getsockopt: dn_getsockopt, |
| sendmsg: dn_sendmsg, |
| recvmsg: dn_recvmsg, |
| mmap: sock_no_mmap, |
| }; |
| |
| #ifdef CONFIG_SYSCTL |
| void dn_register_sysctl(void); |
| void dn_unregister_sysctl(void); |
| #endif |
| |
| |
| #ifdef MODULE |
| EXPORT_NO_SYMBOLS; |
| MODULE_DESCRIPTION("The Linux DECnet Network Protocol"); |
| MODULE_AUTHOR("Linux DECnet Project Team"); |
| |
| static int addr[2] = {0, 0}; |
| |
| MODULE_PARM(addr, "2i"); |
| MODULE_PARM_DESC(addr, "The DECnet address of this machine: area,node"); |
| #endif |
| |
| static char banner[] __initdata = KERN_INFO "NET4: DECnet for Linux: V.2.4.0-test12s (C) 1995-2000 Linux DECnet Project Team\n"; |
| |
| static int __init decnet_init(void) |
| { |
| #ifdef MODULE |
| if (addr[0] > 63 || addr[0] < 0) { |
| printk(KERN_ERR "DECnet: Area must be between 0 and 63"); |
| return 1; |
| } |
| |
| if (addr[1] > 1023 || addr[1] < 0) { |
| printk(KERN_ERR "DECnet: Node must be between 0 and 1023"); |
| return 1; |
| } |
| |
| decnet_address = dn_htons((addr[0] << 10) | addr[1]); |
| dn_dn2eth(decnet_ether_address, dn_ntohs(decnet_address)); |
| #endif |
| |
| printk(banner); |
| |
| sock_register(&dn_family_ops); |
| dev_add_pack(&dn_dix_packet_type); |
| register_netdevice_notifier(&dn_dev_notifier); |
| |
| proc_net_create("decnet", 0, dn_get_info); |
| |
| dn_neigh_init(); |
| dn_dev_init(); |
| dn_route_init(); |
| |
| #ifdef CONFIG_DECNET_ROUTER |
| dn_fib_init(); |
| #endif /* CONFIG_DECNET_ROUTER */ |
| |
| #ifdef CONFIG_SYSCTL |
| dn_register_sysctl(); |
| #endif /* CONFIG_SYSCTL */ |
| |
| /* |
| * Prevent DECnet module unloading until its fixed properly. |
| * Requires an audit of the code to check for memory leaks and |
| * initialisation problems etc. |
| */ |
| MOD_INC_USE_COUNT; |
| |
| return 0; |
| |
| } |
| |
| #ifndef MODULE |
| static int __init decnet_setup(char *str) |
| { |
| unsigned short area = simple_strtoul(str, &str, 0); |
| unsigned short node = simple_strtoul(*str > 0 ? ++str : str, &str, 0); |
| |
| decnet_address = dn_htons(area << 10 | node); |
| dn_dn2eth(decnet_ether_address, dn_ntohs(decnet_address)); |
| |
| return 1; |
| } |
| |
| __setup("decnet=", decnet_setup); |
| #endif |
| |
| static void __exit decnet_exit(void) |
| { |
| sock_unregister(AF_DECnet); |
| dev_remove_pack(&dn_dix_packet_type); |
| |
| #ifdef CONFIG_SYSCTL |
| dn_unregister_sysctl(); |
| #endif /* CONFIG_SYSCTL */ |
| |
| unregister_netdevice_notifier(&dn_dev_notifier); |
| |
| dn_route_cleanup(); |
| dn_dev_cleanup(); |
| dn_neigh_cleanup(); |
| |
| #ifdef CONFIG_DECNET_ROUTER |
| dn_fib_cleanup(); |
| #endif /* CONFIG_DECNET_ROUTER */ |
| |
| proc_net_remove("decnet"); |
| } |
| |
| module_init(decnet_init); |
| module_exit(decnet_exit); |