blob: 2cec5c52929e92fc7c009608918338abd4438f5b [file] [log] [blame]
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -07001/* Copyright (c) 2011-2013, The Linux Foundation. All rights reserved.
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -07002 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License version 2 and
5 * only version 2 as published by the Free Software Foundation.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 */
12
13#include <linux/module.h>
14#include <linux/types.h>
15#include <linux/net.h>
16#include <linux/socket.h>
17#include <linux/errno.h>
18#include <linux/mm.h>
19#include <linux/poll.h>
20#include <linux/fcntl.h>
21#include <linux/gfp.h>
22#include <linux/msm_ipc.h>
23
24#include <asm/string.h>
25#include <asm/atomic.h>
26
27#include <net/sock.h>
28
Karthikeyan Ramasubramanianefc493b2012-07-12 10:25:49 -060029#include <mach/msm_ipc_router.h>
30
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -070031#include "ipc_router.h"
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -060032#include "msm_ipc_router_security.h"
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -070033
34#define msm_ipc_sk(sk) ((struct msm_ipc_sock *)(sk))
35#define msm_ipc_sk_port(sk) ((struct msm_ipc_port *)(msm_ipc_sk(sk)->port))
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -070036
37static int sockets_enabled;
38static struct proto msm_ipc_proto;
39static const struct proto_ops msm_ipc_proto_ops;
40
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -070041static struct sk_buff_head *msm_ipc_router_build_msg(unsigned int num_sect,
42 struct iovec const *msg_sect,
43 size_t total_len)
44{
45 struct sk_buff_head *msg_head;
46 struct sk_buff *msg;
47 int i, copied, first = 1;
48 int data_size = 0, request_size, offset;
49 void *data;
50
51 for (i = 0; i < num_sect; i++)
52 data_size += msg_sect[i].iov_len;
53
54 if (!data_size)
55 return NULL;
56
57 msg_head = kmalloc(sizeof(struct sk_buff_head), GFP_KERNEL);
58 if (!msg_head) {
59 pr_err("%s: cannot allocate skb_head\n", __func__);
60 return NULL;
61 }
62 skb_queue_head_init(msg_head);
63
64 for (copied = 1, i = 0; copied && (i < num_sect); i++) {
65 data_size = msg_sect[i].iov_len;
66 offset = 0;
67 while (offset != msg_sect[i].iov_len) {
68 request_size = data_size;
69 if (first)
70 request_size += IPC_ROUTER_HDR_SIZE;
71
72 msg = alloc_skb(request_size, GFP_KERNEL);
73 if (!msg) {
74 if (request_size <= (PAGE_SIZE/2)) {
75 pr_err("%s: cannot allocated skb\n",
76 __func__);
77 goto msg_build_failure;
78 }
79 data_size = data_size / 2;
80 continue;
81 }
82
83 if (first) {
84 skb_reserve(msg, IPC_ROUTER_HDR_SIZE);
85 first = 0;
86 }
87
88 data = skb_put(msg, data_size);
89 copied = !copy_from_user(msg->data,
90 msg_sect[i].iov_base + offset,
91 data_size);
92 if (!copied) {
93 pr_err("%s: copy_from_user failed\n",
94 __func__);
95 kfree_skb(msg);
96 goto msg_build_failure;
97 }
98 skb_queue_tail(msg_head, msg);
99 offset += data_size;
100 data_size = msg_sect[i].iov_len - offset;
101 }
102 }
103 return msg_head;
104
105msg_build_failure:
106 while (!skb_queue_empty(msg_head)) {
107 msg = skb_dequeue(msg_head);
108 kfree_skb(msg);
109 }
110 kfree(msg_head);
111 return NULL;
112}
113
114static int msm_ipc_router_extract_msg(struct msghdr *m,
115 struct sk_buff_head *msg_head)
116{
117 struct sockaddr_msm_ipc *addr = (struct sockaddr_msm_ipc *)m->msg_name;
118 struct rr_header *hdr;
119 struct sk_buff *temp;
120 int offset = 0, data_len = 0, copy_len;
121
122 if (!m || !msg_head) {
123 pr_err("%s: Invalid pointers passed\n", __func__);
124 return -EINVAL;
125 }
126
127 temp = skb_peek(msg_head);
128 hdr = (struct rr_header *)(temp->data);
129 if (addr || (hdr->src_port_id != IPC_ROUTER_ADDRESS)) {
130 addr->family = AF_MSM_IPC;
131 addr->address.addrtype = MSM_IPC_ADDR_ID;
132 addr->address.addr.port_addr.node_id = hdr->src_node_id;
133 addr->address.addr.port_addr.port_id = hdr->src_port_id;
134 m->msg_namelen = sizeof(struct sockaddr_msm_ipc);
135 }
136
137 data_len = hdr->size;
138 skb_pull(temp, IPC_ROUTER_HDR_SIZE);
139 skb_queue_walk(msg_head, temp) {
140 copy_len = data_len < temp->len ? data_len : temp->len;
141 if (copy_to_user(m->msg_iov->iov_base + offset, temp->data,
142 copy_len)) {
143 pr_err("%s: Copy to user failed\n", __func__);
144 return -EFAULT;
145 }
146 offset += copy_len;
147 data_len -= copy_len;
148 }
149 return offset;
150}
151
152static void msm_ipc_router_release_msg(struct sk_buff_head *msg_head)
153{
154 struct sk_buff *temp;
155
156 if (!msg_head) {
157 pr_err("%s: Invalid msg pointer\n", __func__);
158 return;
159 }
160
161 while (!skb_queue_empty(msg_head)) {
162 temp = skb_dequeue(msg_head);
163 kfree_skb(temp);
164 }
165 kfree(msg_head);
166}
167
168static int msm_ipc_router_create(struct net *net,
169 struct socket *sock,
170 int protocol,
171 int kern)
172{
173 struct sock *sk;
174 struct msm_ipc_port *port_ptr;
175 void *pil;
176
177 if (unlikely(protocol != 0)) {
178 pr_err("%s: Protocol not supported\n", __func__);
179 return -EPROTONOSUPPORT;
180 }
181
182 switch (sock->type) {
183 case SOCK_DGRAM:
184 break;
185 default:
186 pr_err("%s: Protocol type not supported\n", __func__);
187 return -EPROTOTYPE;
188 }
189
190 sk = sk_alloc(net, AF_MSM_IPC, GFP_KERNEL, &msm_ipc_proto);
191 if (!sk) {
192 pr_err("%s: sk_alloc failed\n", __func__);
193 return -ENOMEM;
194 }
195
196 port_ptr = msm_ipc_router_create_raw_port(sk, NULL, NULL);
197 if (!port_ptr) {
198 pr_err("%s: port_ptr alloc failed\n", __func__);
199 sk_free(sk);
200 return -ENOMEM;
201 }
202
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600203 port_ptr->check_send_permissions = msm_ipc_check_send_permissions;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700204 sock->ops = &msm_ipc_proto_ops;
205 sock_init_data(sock, sk);
206 sk->sk_rcvtimeo = DEFAULT_RCV_TIMEO;
207
Karthikeyan Ramasubramanian6b963bd2012-05-01 11:27:54 -0600208 pil = msm_ipc_load_default_node();
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700209 msm_ipc_sk(sk)->port = port_ptr;
Karthikeyan Ramasubramanian6b963bd2012-05-01 11:27:54 -0600210 msm_ipc_sk(sk)->default_pil = pil;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700211
212 return 0;
213}
214
215int msm_ipc_router_bind(struct socket *sock, struct sockaddr *uaddr,
216 int uaddr_len)
217{
218 struct sockaddr_msm_ipc *addr = (struct sockaddr_msm_ipc *)uaddr;
219 struct sock *sk = sock->sk;
220 struct msm_ipc_port *port_ptr;
221 int ret;
222
223 if (!sk)
224 return -EINVAL;
225
Karthikeyan Ramasubramanian13ef0552013-01-24 11:45:41 -0700226 if (!check_permissions()) {
227 pr_err("%s: %s Do not have permissions\n",
228 __func__, current->comm);
229 return -EPERM;
230 }
231
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700232 if (!uaddr_len) {
233 pr_err("%s: Invalid address length\n", __func__);
234 return -EINVAL;
235 }
236
237 if (addr->family != AF_MSM_IPC) {
238 pr_err("%s: Address family is incorrect\n", __func__);
239 return -EAFNOSUPPORT;
240 }
241
242 if (addr->address.addrtype != MSM_IPC_ADDR_NAME) {
243 pr_err("%s: Address type is incorrect\n", __func__);
244 return -EINVAL;
245 }
246
247 port_ptr = msm_ipc_sk_port(sk);
248 if (!port_ptr)
249 return -ENODEV;
250
251 lock_sock(sk);
252
253 ret = msm_ipc_router_register_server(port_ptr, &addr->address);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700254
255 release_sock(sk);
256 return ret;
257}
258
259static int msm_ipc_router_sendmsg(struct kiocb *iocb, struct socket *sock,
260 struct msghdr *m, size_t total_len)
261{
262 struct sock *sk = sock->sk;
263 struct msm_ipc_port *port_ptr = msm_ipc_sk_port(sk);
264 struct sockaddr_msm_ipc *dest = (struct sockaddr_msm_ipc *)m->msg_name;
265 struct sk_buff_head *msg;
266 int ret;
267
268 if (!dest)
269 return -EDESTADDRREQ;
270
271 if (m->msg_namelen < sizeof(*dest) || dest->family != AF_MSM_IPC)
272 return -EINVAL;
273
274 if (total_len > MAX_IPC_PKT_SIZE)
275 return -EINVAL;
276
277 lock_sock(sk);
278 msg = msm_ipc_router_build_msg(m->msg_iovlen, m->msg_iov, total_len);
279 if (!msg) {
280 pr_err("%s: Msg build failure\n", __func__);
281 ret = -ENOMEM;
282 goto out_sendmsg;
283 }
284
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -0700285 if (port_ptr->type == CLIENT_PORT)
286 wait_for_irsc_completion();
287
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700288 ret = msm_ipc_router_send_to(port_ptr, msg, &dest->address);
289 if (ret == (IPC_ROUTER_HDR_SIZE + total_len))
290 ret = total_len;
291
292out_sendmsg:
293 release_sock(sk);
294 return ret;
295}
296
297static int msm_ipc_router_recvmsg(struct kiocb *iocb, struct socket *sock,
298 struct msghdr *m, size_t buf_len, int flags)
299{
300 struct sock *sk = sock->sk;
301 struct msm_ipc_port *port_ptr = msm_ipc_sk_port(sk);
302 struct sk_buff_head *msg;
303 long timeout;
304 int ret;
305
306 if (m->msg_iovlen != 1)
307 return -EOPNOTSUPP;
308
309 if (!buf_len)
310 return -EINVAL;
311
312 lock_sock(sk);
313 timeout = sk->sk_rcvtimeo;
314 mutex_lock(&port_ptr->port_rx_q_lock);
315 while (list_empty(&port_ptr->port_rx_q)) {
316 mutex_unlock(&port_ptr->port_rx_q_lock);
317 release_sock(sk);
318 if (timeout < 0) {
319 ret = wait_event_interruptible(
320 port_ptr->port_rx_wait_q,
321 !list_empty(&port_ptr->port_rx_q));
322 if (ret)
323 return ret;
324 } else if (timeout > 0) {
325 timeout = wait_event_interruptible_timeout(
326 port_ptr->port_rx_wait_q,
327 !list_empty(&port_ptr->port_rx_q),
328 timeout);
329 if (timeout < 0)
330 return -EFAULT;
331 }
332
333 if (timeout == 0)
334 return -ETIMEDOUT;
335 lock_sock(sk);
336 mutex_lock(&port_ptr->port_rx_q_lock);
337 }
338 mutex_unlock(&port_ptr->port_rx_q_lock);
339
340 ret = msm_ipc_router_read(port_ptr, &msg, buf_len);
341 if (ret <= 0 || !msg) {
342 release_sock(sk);
343 return ret;
344 }
345
346 ret = msm_ipc_router_extract_msg(m, msg);
347 msm_ipc_router_release_msg(msg);
348 msg = NULL;
349 release_sock(sk);
350 return ret;
351}
352
353static int msm_ipc_router_ioctl(struct socket *sock,
354 unsigned int cmd, unsigned long arg)
355{
356 struct sock *sk = sock->sk;
357 struct msm_ipc_port *port_ptr;
358 struct server_lookup_args server_arg;
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600359 struct msm_ipc_server_info *srv_info = NULL;
360 unsigned int n, srv_info_sz = 0;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700361 int ret;
362
363 if (!sk)
364 return -EINVAL;
365
366 lock_sock(sk);
367 port_ptr = msm_ipc_sk_port(sock->sk);
368 if (!port_ptr) {
369 release_sock(sk);
370 return -EINVAL;
371 }
372
373 switch (cmd) {
374 case IPC_ROUTER_IOCTL_GET_VERSION:
375 n = IPC_ROUTER_VERSION;
376 ret = put_user(n, (unsigned int *)arg);
377 break;
378
379 case IPC_ROUTER_IOCTL_GET_MTU:
380 n = (MAX_IPC_PKT_SIZE - IPC_ROUTER_HDR_SIZE);
381 ret = put_user(n, (unsigned int *)arg);
382 break;
383
384 case IPC_ROUTER_IOCTL_GET_CURR_PKT_SIZE:
385 ret = msm_ipc_router_get_curr_pkt_size(port_ptr);
386 break;
387
388 case IPC_ROUTER_IOCTL_LOOKUP_SERVER:
389 ret = copy_from_user(&server_arg, (void *)arg,
390 sizeof(server_arg));
391 if (ret) {
392 ret = -EFAULT;
393 break;
394 }
395
396 if (server_arg.num_entries_in_array < 0) {
397 ret = -EINVAL;
398 break;
399 }
400 if (server_arg.num_entries_in_array) {
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600401 srv_info_sz = server_arg.num_entries_in_array *
402 sizeof(*srv_info);
Karthikeyan Ramasubramanianb34b6672013-02-26 16:37:50 -0700403 if ((srv_info_sz / sizeof(*srv_info)) !=
404 server_arg.num_entries_in_array) {
405 pr_err("%s: Integer Overflow %d * %d\n",
406 __func__, sizeof(*srv_info),
407 server_arg.num_entries_in_array);
408 ret = -EINVAL;
409 break;
410 }
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600411 srv_info = kmalloc(srv_info_sz, GFP_KERNEL);
412 if (!srv_info) {
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700413 ret = -ENOMEM;
414 break;
415 }
416 }
417 ret = msm_ipc_router_lookup_server_name(&server_arg.port_name,
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600418 srv_info, server_arg.num_entries_in_array,
Karthikeyan Ramasubramaniancc450c92011-07-27 14:38:15 -0600419 server_arg.lookup_mask);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700420 if (ret < 0) {
421 pr_err("%s: Server not found\n", __func__);
422 ret = -ENODEV;
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600423 kfree(srv_info);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700424 break;
425 }
426 server_arg.num_entries_found = ret;
427
428 ret = copy_to_user((void *)arg, &server_arg,
429 sizeof(server_arg));
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600430 if (srv_info_sz) {
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700431 ret = copy_to_user((void *)(arg + sizeof(server_arg)),
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600432 srv_info, srv_info_sz);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700433 if (ret)
434 ret = -EFAULT;
Karthikeyan Ramasubramaniandfde01b2012-06-12 14:25:13 -0600435 kfree(srv_info);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700436 }
437 break;
438
439 case IPC_ROUTER_IOCTL_BIND_CONTROL_PORT:
440 ret = msm_ipc_router_bind_control_port(port_ptr);
441 break;
442
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600443 case IPC_ROUTER_IOCTL_CONFIG_SEC_RULES:
444 ret = msm_ipc_config_sec_rules((void *)arg);
Karthikeyan Ramasubramanianf7a4b6e2013-01-16 09:00:28 -0700445 if (ret != -EPERM)
446 port_ptr->type = IRSC_PORT;
Karthikeyan Ramasubramanian5b502d3642012-09-23 22:23:36 -0600447 break;
448
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700449 default:
450 ret = -EINVAL;
451 }
452 release_sock(sk);
453 return ret;
454}
455
456static unsigned int msm_ipc_router_poll(struct file *file,
457 struct socket *sock, poll_table *wait)
458{
459 struct sock *sk = sock->sk;
460 struct msm_ipc_port *port_ptr;
461 uint32_t mask = 0;
462
463 if (!sk)
464 return -EINVAL;
465
466 port_ptr = msm_ipc_sk_port(sk);
467 if (!port_ptr)
468 return -EINVAL;
469
470 poll_wait(file, &port_ptr->port_rx_wait_q, wait);
471
472 if (!list_empty(&port_ptr->port_rx_q))
473 mask |= (POLLRDNORM | POLLIN);
474
475 return mask;
476}
477
478static int msm_ipc_router_close(struct socket *sock)
479{
480 struct sock *sk = sock->sk;
481 struct msm_ipc_port *port_ptr = msm_ipc_sk_port(sk);
Karthikeyan Ramasubramanian6b963bd2012-05-01 11:27:54 -0600482 void *pil = msm_ipc_sk(sk)->default_pil;
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700483 int ret;
484
485 lock_sock(sk);
486 ret = msm_ipc_router_close_port(port_ptr);
Karthikeyan Ramasubramanian6b963bd2012-05-01 11:27:54 -0600487 msm_ipc_unload_default_node(pil);
Bryan Huntsman3f2bc4d2011-08-16 17:27:22 -0700488 release_sock(sk);
489 sock_put(sk);
490 sock->sk = NULL;
491
492 return ret;
493}
494
495static const struct net_proto_family msm_ipc_family_ops = {
496 .owner = THIS_MODULE,
497 .family = AF_MSM_IPC,
498 .create = msm_ipc_router_create
499};
500
501static const struct proto_ops msm_ipc_proto_ops = {
502 .owner = THIS_MODULE,
503 .family = AF_MSM_IPC,
504 .bind = msm_ipc_router_bind,
505 .connect = sock_no_connect,
506 .sendmsg = msm_ipc_router_sendmsg,
507 .recvmsg = msm_ipc_router_recvmsg,
508 .ioctl = msm_ipc_router_ioctl,
509 .poll = msm_ipc_router_poll,
510 .setsockopt = sock_no_setsockopt,
511 .getsockopt = sock_no_getsockopt,
512 .release = msm_ipc_router_close,
513};
514
515static struct proto msm_ipc_proto = {
516 .name = "MSM_IPC",
517 .owner = THIS_MODULE,
518 .obj_size = sizeof(struct msm_ipc_sock),
519};
520
521int msm_ipc_router_init_sockets(void)
522{
523 int ret;
524
525 ret = proto_register(&msm_ipc_proto, 1);
526 if (ret) {
527 pr_err("Failed to register MSM_IPC protocol type\n");
528 goto out_init_sockets;
529 }
530
531 ret = sock_register(&msm_ipc_family_ops);
532 if (ret) {
533 pr_err("Failed to register MSM_IPC socket type\n");
534 proto_unregister(&msm_ipc_proto);
535 goto out_init_sockets;
536 }
537
538 sockets_enabled = 1;
539out_init_sockets:
540 return ret;
541}
542
543void msm_ipc_router_exit_sockets(void)
544{
545 if (!sockets_enabled)
546 return;
547
548 sockets_enabled = 0;
549 sock_unregister(msm_ipc_family_ops.family);
550 proto_unregister(&msm_ipc_proto);
551}