dgram.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552
  1. /*
  2. * IEEE 802.15.4 dgram socket interface
  3. *
  4. * Copyright 2007, 2008 Siemens AG
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License version 2
  8. * as published by the Free Software Foundation.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License along
  16. * with this program; if not, write to the Free Software Foundation, Inc.,
  17. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  18. *
  19. * Written by:
  20. * Sergey Lapin <slapin@ossfans.org>
  21. * Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
  22. */
  23. #include <linux/capability.h>
  24. #include <linux/net.h>
  25. #include <linux/module.h>
  26. #include <linux/if_arp.h>
  27. #include <linux/list.h>
  28. #include <linux/slab.h>
  29. #include <net/sock.h>
  30. #include <net/af_ieee802154.h>
  31. #include <net/ieee802154.h>
  32. #include <net/ieee802154_netdev.h>
  33. #include <asm/ioctls.h>
  34. #include "af802154.h"
  35. static HLIST_HEAD(dgram_head);
  36. static DEFINE_RWLOCK(dgram_lock);
  37. struct dgram_sock {
  38. struct sock sk;
  39. struct ieee802154_addr src_addr;
  40. struct ieee802154_addr dst_addr;
  41. unsigned int bound:1;
  42. unsigned int connected:1;
  43. unsigned int want_ack:1;
  44. unsigned int secen:1;
  45. unsigned int secen_override:1;
  46. unsigned int seclevel:3;
  47. unsigned int seclevel_override:1;
  48. };
  49. static inline struct dgram_sock *dgram_sk(const struct sock *sk)
  50. {
  51. return container_of(sk, struct dgram_sock, sk);
  52. }
  53. static void dgram_hash(struct sock *sk)
  54. {
  55. write_lock_bh(&dgram_lock);
  56. sk_add_node(sk, &dgram_head);
  57. sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
  58. write_unlock_bh(&dgram_lock);
  59. }
  60. static void dgram_unhash(struct sock *sk)
  61. {
  62. write_lock_bh(&dgram_lock);
  63. if (sk_del_node_init(sk))
  64. sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
  65. write_unlock_bh(&dgram_lock);
  66. }
  67. static int dgram_init(struct sock *sk)
  68. {
  69. struct dgram_sock *ro = dgram_sk(sk);
  70. ro->want_ack = 1;
  71. return 0;
  72. }
  73. static void dgram_close(struct sock *sk, long timeout)
  74. {
  75. sk_common_release(sk);
  76. }
  77. static int dgram_bind(struct sock *sk, struct sockaddr *uaddr, int len)
  78. {
  79. struct sockaddr_ieee802154 *addr = (struct sockaddr_ieee802154 *)uaddr;
  80. struct ieee802154_addr haddr;
  81. struct dgram_sock *ro = dgram_sk(sk);
  82. int err = -EINVAL;
  83. struct net_device *dev;
  84. lock_sock(sk);
  85. ro->bound = 0;
  86. if (len < sizeof(*addr))
  87. goto out;
  88. if (addr->family != AF_IEEE802154)
  89. goto out;
  90. ieee802154_addr_from_sa(&haddr, &addr->addr);
  91. dev = ieee802154_get_dev(sock_net(sk), &haddr);
  92. if (!dev) {
  93. err = -ENODEV;
  94. goto out;
  95. }
  96. if (dev->type != ARPHRD_IEEE802154) {
  97. err = -ENODEV;
  98. goto out_put;
  99. }
  100. ro->src_addr = haddr;
  101. ro->bound = 1;
  102. err = 0;
  103. out_put:
  104. dev_put(dev);
  105. out:
  106. release_sock(sk);
  107. return err;
  108. }
  109. static int dgram_ioctl(struct sock *sk, int cmd, unsigned long arg)
  110. {
  111. switch (cmd) {
  112. case SIOCOUTQ:
  113. {
  114. int amount = sk_wmem_alloc_get(sk);
  115. return put_user(amount, (int __user *)arg);
  116. }
  117. case SIOCINQ:
  118. {
  119. struct sk_buff *skb;
  120. unsigned long amount;
  121. amount = 0;
  122. spin_lock_bh(&sk->sk_receive_queue.lock);
  123. skb = skb_peek(&sk->sk_receive_queue);
  124. if (skb != NULL) {
  125. /*
  126. * We will only return the amount
  127. * of this packet since that is all
  128. * that will be read.
  129. */
  130. amount = skb->len - ieee802154_hdr_length(skb);
  131. }
  132. spin_unlock_bh(&sk->sk_receive_queue.lock);
  133. return put_user(amount, (int __user *)arg);
  134. }
  135. }
  136. return -ENOIOCTLCMD;
  137. }
  138. /* FIXME: autobind */
  139. static int dgram_connect(struct sock *sk, struct sockaddr *uaddr,
  140. int len)
  141. {
  142. struct sockaddr_ieee802154 *addr = (struct sockaddr_ieee802154 *)uaddr;
  143. struct dgram_sock *ro = dgram_sk(sk);
  144. int err = 0;
  145. if (len < sizeof(*addr))
  146. return -EINVAL;
  147. if (addr->family != AF_IEEE802154)
  148. return -EINVAL;
  149. lock_sock(sk);
  150. if (!ro->bound) {
  151. err = -ENETUNREACH;
  152. goto out;
  153. }
  154. ieee802154_addr_from_sa(&ro->dst_addr, &addr->addr);
  155. ro->connected = 1;
  156. out:
  157. release_sock(sk);
  158. return err;
  159. }
  160. static int dgram_disconnect(struct sock *sk, int flags)
  161. {
  162. struct dgram_sock *ro = dgram_sk(sk);
  163. lock_sock(sk);
  164. ro->connected = 0;
  165. release_sock(sk);
  166. return 0;
  167. }
  168. static int dgram_sendmsg(struct kiocb *iocb, struct sock *sk,
  169. struct msghdr *msg, size_t size)
  170. {
  171. struct net_device *dev;
  172. unsigned int mtu;
  173. struct sk_buff *skb;
  174. struct ieee802154_mac_cb *cb;
  175. struct dgram_sock *ro = dgram_sk(sk);
  176. struct ieee802154_addr dst_addr;
  177. int hlen, tlen;
  178. int err;
  179. if (msg->msg_flags & MSG_OOB) {
  180. pr_debug("msg->msg_flags = 0x%x\n", msg->msg_flags);
  181. return -EOPNOTSUPP;
  182. }
  183. if (!ro->connected && !msg->msg_name)
  184. return -EDESTADDRREQ;
  185. else if (ro->connected && msg->msg_name)
  186. return -EISCONN;
  187. if (!ro->bound)
  188. dev = dev_getfirstbyhwtype(sock_net(sk), ARPHRD_IEEE802154);
  189. else
  190. dev = ieee802154_get_dev(sock_net(sk), &ro->src_addr);
  191. if (!dev) {
  192. pr_debug("no dev\n");
  193. err = -ENXIO;
  194. goto out;
  195. }
  196. mtu = dev->mtu;
  197. pr_debug("name = %s, mtu = %u\n", dev->name, mtu);
  198. if (size > mtu) {
  199. pr_debug("size = %Zu, mtu = %u\n", size, mtu);
  200. err = -EMSGSIZE;
  201. goto out_dev;
  202. }
  203. hlen = LL_RESERVED_SPACE(dev);
  204. tlen = dev->needed_tailroom;
  205. skb = sock_alloc_send_skb(sk, hlen + tlen + size,
  206. msg->msg_flags & MSG_DONTWAIT,
  207. &err);
  208. if (!skb)
  209. goto out_dev;
  210. skb_reserve(skb, hlen);
  211. skb_reset_network_header(skb);
  212. cb = mac_cb_init(skb);
  213. cb->type = IEEE802154_FC_TYPE_DATA;
  214. cb->ackreq = ro->want_ack;
  215. if (msg->msg_name) {
  216. DECLARE_SOCKADDR(struct sockaddr_ieee802154*, daddr, msg->msg_name);
  217. ieee802154_addr_from_sa(&dst_addr, &daddr->addr);
  218. } else {
  219. dst_addr = ro->dst_addr;
  220. }
  221. cb->secen = ro->secen;
  222. cb->secen_override = ro->secen_override;
  223. cb->seclevel = ro->seclevel;
  224. cb->seclevel_override = ro->seclevel_override;
  225. err = dev_hard_header(skb, dev, ETH_P_IEEE802154, &dst_addr,
  226. ro->bound ? &ro->src_addr : NULL, size);
  227. if (err < 0)
  228. goto out_skb;
  229. err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
  230. if (err < 0)
  231. goto out_skb;
  232. skb->dev = dev;
  233. skb->sk = sk;
  234. skb->protocol = htons(ETH_P_IEEE802154);
  235. dev_put(dev);
  236. err = dev_queue_xmit(skb);
  237. if (err > 0)
  238. err = net_xmit_errno(err);
  239. return err ?: size;
  240. out_skb:
  241. kfree_skb(skb);
  242. out_dev:
  243. dev_put(dev);
  244. out:
  245. return err;
  246. }
  247. static int dgram_recvmsg(struct kiocb *iocb, struct sock *sk,
  248. struct msghdr *msg, size_t len, int noblock, int flags,
  249. int *addr_len)
  250. {
  251. size_t copied = 0;
  252. int err = -EOPNOTSUPP;
  253. struct sk_buff *skb;
  254. DECLARE_SOCKADDR(struct sockaddr_ieee802154 *, saddr, msg->msg_name);
  255. skb = skb_recv_datagram(sk, flags, noblock, &err);
  256. if (!skb)
  257. goto out;
  258. copied = skb->len;
  259. if (len < copied) {
  260. msg->msg_flags |= MSG_TRUNC;
  261. copied = len;
  262. }
  263. /* FIXME: skip headers if necessary ?! */
  264. err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
  265. if (err)
  266. goto done;
  267. sock_recv_ts_and_drops(msg, sk, skb);
  268. if (saddr) {
  269. saddr->family = AF_IEEE802154;
  270. ieee802154_addr_to_sa(&saddr->addr, &mac_cb(skb)->source);
  271. *addr_len = sizeof(*saddr);
  272. }
  273. if (flags & MSG_TRUNC)
  274. copied = skb->len;
  275. done:
  276. skb_free_datagram(sk, skb);
  277. out:
  278. if (err)
  279. return err;
  280. return copied;
  281. }
  282. static int dgram_rcv_skb(struct sock *sk, struct sk_buff *skb)
  283. {
  284. skb = skb_share_check(skb, GFP_ATOMIC);
  285. if (!skb)
  286. return NET_RX_DROP;
  287. if (sock_queue_rcv_skb(sk, skb) < 0) {
  288. kfree_skb(skb);
  289. return NET_RX_DROP;
  290. }
  291. return NET_RX_SUCCESS;
  292. }
  293. static inline bool
  294. ieee802154_match_sock(__le64 hw_addr, __le16 pan_id, __le16 short_addr,
  295. struct dgram_sock *ro)
  296. {
  297. if (!ro->bound)
  298. return true;
  299. if (ro->src_addr.mode == IEEE802154_ADDR_LONG &&
  300. hw_addr == ro->src_addr.extended_addr)
  301. return true;
  302. if (ro->src_addr.mode == IEEE802154_ADDR_SHORT &&
  303. pan_id == ro->src_addr.pan_id &&
  304. short_addr == ro->src_addr.short_addr)
  305. return true;
  306. return false;
  307. }
  308. int ieee802154_dgram_deliver(struct net_device *dev, struct sk_buff *skb)
  309. {
  310. struct sock *sk, *prev = NULL;
  311. int ret = NET_RX_SUCCESS;
  312. __le16 pan_id, short_addr;
  313. __le64 hw_addr;
  314. /* Data frame processing */
  315. BUG_ON(dev->type != ARPHRD_IEEE802154);
  316. pan_id = ieee802154_mlme_ops(dev)->get_pan_id(dev);
  317. short_addr = ieee802154_mlme_ops(dev)->get_short_addr(dev);
  318. hw_addr = ieee802154_devaddr_from_raw(dev->dev_addr);
  319. read_lock(&dgram_lock);
  320. sk_for_each(sk, &dgram_head) {
  321. if (ieee802154_match_sock(hw_addr, pan_id, short_addr,
  322. dgram_sk(sk))) {
  323. if (prev) {
  324. struct sk_buff *clone;
  325. clone = skb_clone(skb, GFP_ATOMIC);
  326. if (clone)
  327. dgram_rcv_skb(prev, clone);
  328. }
  329. prev = sk;
  330. }
  331. }
  332. if (prev)
  333. dgram_rcv_skb(prev, skb);
  334. else {
  335. kfree_skb(skb);
  336. ret = NET_RX_DROP;
  337. }
  338. read_unlock(&dgram_lock);
  339. return ret;
  340. }
  341. static int dgram_getsockopt(struct sock *sk, int level, int optname,
  342. char __user *optval, int __user *optlen)
  343. {
  344. struct dgram_sock *ro = dgram_sk(sk);
  345. int val, len;
  346. if (level != SOL_IEEE802154)
  347. return -EOPNOTSUPP;
  348. if (get_user(len, optlen))
  349. return -EFAULT;
  350. len = min_t(unsigned int, len, sizeof(int));
  351. switch (optname) {
  352. case WPAN_WANTACK:
  353. val = ro->want_ack;
  354. break;
  355. case WPAN_SECURITY:
  356. if (!ro->secen_override)
  357. val = WPAN_SECURITY_DEFAULT;
  358. else if (ro->secen)
  359. val = WPAN_SECURITY_ON;
  360. else
  361. val = WPAN_SECURITY_OFF;
  362. break;
  363. case WPAN_SECURITY_LEVEL:
  364. if (!ro->seclevel_override)
  365. val = WPAN_SECURITY_LEVEL_DEFAULT;
  366. else
  367. val = ro->seclevel;
  368. break;
  369. default:
  370. return -ENOPROTOOPT;
  371. }
  372. if (put_user(len, optlen))
  373. return -EFAULT;
  374. if (copy_to_user(optval, &val, len))
  375. return -EFAULT;
  376. return 0;
  377. }
  378. static int dgram_setsockopt(struct sock *sk, int level, int optname,
  379. char __user *optval, unsigned int optlen)
  380. {
  381. struct dgram_sock *ro = dgram_sk(sk);
  382. struct net *net = sock_net(sk);
  383. int val;
  384. int err = 0;
  385. if (optlen < sizeof(int))
  386. return -EINVAL;
  387. if (get_user(val, (int __user *)optval))
  388. return -EFAULT;
  389. lock_sock(sk);
  390. switch (optname) {
  391. case WPAN_WANTACK:
  392. ro->want_ack = !!val;
  393. break;
  394. case WPAN_SECURITY:
  395. if (!ns_capable(net->user_ns, CAP_NET_ADMIN) &&
  396. !ns_capable(net->user_ns, CAP_NET_RAW)) {
  397. err = -EPERM;
  398. break;
  399. }
  400. switch (val) {
  401. case WPAN_SECURITY_DEFAULT:
  402. ro->secen_override = 0;
  403. break;
  404. case WPAN_SECURITY_ON:
  405. ro->secen_override = 1;
  406. ro->secen = 1;
  407. break;
  408. case WPAN_SECURITY_OFF:
  409. ro->secen_override = 1;
  410. ro->secen = 0;
  411. break;
  412. default:
  413. err = -EINVAL;
  414. break;
  415. }
  416. break;
  417. case WPAN_SECURITY_LEVEL:
  418. if (!ns_capable(net->user_ns, CAP_NET_ADMIN) &&
  419. !ns_capable(net->user_ns, CAP_NET_RAW)) {
  420. err = -EPERM;
  421. break;
  422. }
  423. if (val < WPAN_SECURITY_LEVEL_DEFAULT ||
  424. val > IEEE802154_SCF_SECLEVEL_ENC_MIC128) {
  425. err = -EINVAL;
  426. } else if (val == WPAN_SECURITY_LEVEL_DEFAULT) {
  427. ro->seclevel_override = 0;
  428. } else {
  429. ro->seclevel_override = 1;
  430. ro->seclevel = val;
  431. }
  432. break;
  433. default:
  434. err = -ENOPROTOOPT;
  435. break;
  436. }
  437. release_sock(sk);
  438. return err;
  439. }
  440. struct proto ieee802154_dgram_prot = {
  441. .name = "IEEE-802.15.4-MAC",
  442. .owner = THIS_MODULE,
  443. .obj_size = sizeof(struct dgram_sock),
  444. .init = dgram_init,
  445. .close = dgram_close,
  446. .bind = dgram_bind,
  447. .sendmsg = dgram_sendmsg,
  448. .recvmsg = dgram_recvmsg,
  449. .hash = dgram_hash,
  450. .unhash = dgram_unhash,
  451. .connect = dgram_connect,
  452. .disconnect = dgram_disconnect,
  453. .ioctl = dgram_ioctl,
  454. .getsockopt = dgram_getsockopt,
  455. .setsockopt = dgram_setsockopt,
  456. };