Blame view

net/sctp/socket.c 194 KB
60c778b25   Vlad Yasevich   [SCTP]: Stop clai...
1
  /* SCTP kernel implementation
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2
3
4
5
6
7
8
   * (C) Copyright IBM Corp. 2001, 2004
   * Copyright (c) 1999-2000 Cisco, Inc.
   * Copyright (c) 1999-2001 Motorola, Inc.
   * Copyright (c) 2001-2003 Intel Corp.
   * Copyright (c) 2001-2002 Nokia, Inc.
   * Copyright (c) 2001 La Monte H.P. Yarroll
   *
60c778b25   Vlad Yasevich   [SCTP]: Stop clai...
9
   * This file is part of the SCTP kernel implementation
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
10
11
12
13
14
15
16
17
   *
   * These functions interface with the sockets layer to implement the
   * SCTP Extensions for the Sockets API.
   *
   * Note that the descriptions from the specification are USER level
   * functions--this file is the functions which populate the struct proto
   * for SCTP which is the BOTTOM of the sockets interface.
   *
60c778b25   Vlad Yasevich   [SCTP]: Stop clai...
18
   * This SCTP implementation is free software;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
19
20
21
22
23
   * you can redistribute it and/or modify it under the terms of
   * the GNU General Public License as published by
   * the Free Software Foundation; either version 2, or (at your option)
   * any later version.
   *
60c778b25   Vlad Yasevich   [SCTP]: Stop clai...
24
   * This SCTP implementation is distributed in the hope that it
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
   * will be useful, but WITHOUT ANY WARRANTY; without even the implied
   *                 ************************
   * warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
   * See the GNU General Public License for more details.
   *
   * You should have received a copy of the GNU General Public License
   * along with GNU CC; see the file COPYING.  If not, write to
   * the Free Software Foundation, 59 Temple Place - Suite 330,
   * Boston, MA 02111-1307, USA.
   *
   * Please send any bug reports or fixes you make to the
   * email address(es):
   *    lksctp developers <lksctp-developers@lists.sourceforge.net>
   *
   * Or submit a bug report through the following website:
   *    http://www.sf.net/projects/lksctp
   *
   * Written or modified by:
   *    La Monte H.P. Yarroll <piggy@acm.org>
   *    Narasimha Budihal     <narsi@refcode.org>
   *    Karl Knutson          <karl@athena.chicago.il.us>
   *    Jon Grimm             <jgrimm@us.ibm.com>
   *    Xingang Guo           <xingang.guo@intel.com>
   *    Daisy Chang           <daisyc@us.ibm.com>
   *    Sridhar Samudrala     <samudrala@us.ibm.com>
   *    Inaky Perez-Gonzalez  <inaky.gonzalez@intel.com>
   *    Ardelle Fan	    <ardelle.fan@intel.com>
   *    Ryan Layer	    <rmlayer@us.ibm.com>
   *    Anup Pemmaiah         <pemmaiah@cc.usu.edu>
   *    Kevin Gao             <kevin.gao@intel.com>
   *
   * Any bugs reported given to us we will try to fix... any fixes shared will
   * be incorporated into the next SCTP release.
   */
145ce502e   Joe Perches   net/sctp: Use pr_...
59
  #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
60
61
62
63
64
  #include <linux/types.h>
  #include <linux/kernel.h>
  #include <linux/wait.h>
  #include <linux/time.h>
  #include <linux/ip.h>
4fc268d24   Randy Dunlap   [PATCH] capable/c...
65
  #include <linux/capability.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
66
67
68
69
  #include <linux/fcntl.h>
  #include <linux/poll.h>
  #include <linux/init.h>
  #include <linux/crypto.h>
5a0e3ad6a   Tejun Heo   include cleanup: ...
70
  #include <linux/slab.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
71
72
73
74
75
76
77
78
  
  #include <net/ip.h>
  #include <net/icmp.h>
  #include <net/route.h>
  #include <net/ipv6.h>
  #include <net/inet_common.h>
  
  #include <linux/socket.h> /* for sa_family_t */
bc3b2d7fb   Paul Gortmaker   net: Add export.h...
79
  #include <linux/export.h>
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
  #include <net/sock.h>
  #include <net/sctp/sctp.h>
  #include <net/sctp/sm.h>
  
  /* WARNING:  Please do not remove the SCTP_STATIC attribute to
   * any of the functions below as they are used to export functions
   * used by a project regression testsuite.
   */
  
  /* Forward declarations for internal helper functions. */
  static int sctp_writeable(struct sock *sk);
  static void sctp_wfree(struct sk_buff *skb);
  static int sctp_wait_for_sndbuf(struct sctp_association *, long *timeo_p,
  				size_t msg_len);
  static int sctp_wait_for_packet(struct sock * sk, int *err, long *timeo_p);
  static int sctp_wait_for_connect(struct sctp_association *, long *timeo_p);
  static int sctp_wait_for_accept(struct sock *sk, long timeo);
  static void sctp_wait_for_close(struct sock *sk, long timeo);
  static struct sctp_af *sctp_sockaddr_af(struct sctp_sock *opt,
  					union sctp_addr *addr, int len);
  static int sctp_bindx_add(struct sock *, struct sockaddr *, int);
  static int sctp_bindx_rem(struct sock *, struct sockaddr *, int);
  static int sctp_send_asconf_add_ip(struct sock *, struct sockaddr *, int);
  static int sctp_send_asconf_del_ip(struct sock *, struct sockaddr *, int);
  static int sctp_send_asconf(struct sctp_association *asoc,
  			    struct sctp_chunk *chunk);
  static int sctp_do_bind(struct sock *, union sctp_addr *, int);
  static int sctp_autobind(struct sock *sk);
  static void sctp_sock_migrate(struct sock *, struct sock *,
  			      struct sctp_association *, sctp_socket_type_t);
  static char *sctp_hmac_alg = SCTP_COOKIE_HMAC_ALG;
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
111
  extern struct kmem_cache *sctp_bucket_cachep;
8d987e5c7   Eric Dumazet   net: avoid limits...
112
  extern long sysctl_sctp_mem[3];
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
113
114
  extern int sysctl_sctp_rmem[3];
  extern int sysctl_sctp_wmem[3];
b6fa1a4d7   Adrian Bunk   [SCTP] net/sctp/s...
115
  static int sctp_memory_pressure;
8d987e5c7   Eric Dumazet   net: avoid limits...
116
  static atomic_long_t sctp_memory_allocated;
1748376b6   Eric Dumazet   net: Use a percpu...
117
  struct percpu_counter sctp_sockets_allocated;
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
118

5c52ba170   Pavel Emelyanov   sock: add net to ...
119
  static void sctp_enter_memory_pressure(struct sock *sk)
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
120
121
122
  {
  	sctp_memory_pressure = 1;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
123
124
125
  /* Get the sndbuf space available at the time on the association.  */
  static inline int sctp_wspace(struct sctp_association *asoc)
  {
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
126
  	int amt;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
127

4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
128
129
130
  	if (asoc->ep->sndbuf_policy)
  		amt = asoc->sndbuf_used;
  	else
31e6d363a   Eric Dumazet   net: correct off-...
131
  		amt = sk_wmem_alloc_get(asoc->base.sk);
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
132
133
134
135
136
137
138
139
140
  
  	if (amt >= asoc->base.sk->sk_sndbuf) {
  		if (asoc->base.sk->sk_userlocks & SOCK_SNDBUF_LOCK)
  			amt = 0;
  		else {
  			amt = sk_stream_wspace(asoc->base.sk);
  			if (amt < 0)
  				amt = 0;
  		}
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
141
  	} else {
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
142
  		amt = asoc->base.sk->sk_sndbuf - amt;
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
143
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
  	return amt;
  }
  
  /* Increment the used sndbuf space count of the corresponding association by
   * the size of the outgoing data chunk.
   * Also, set the skb destructor for sndbuf accounting later.
   *
   * Since it is always 1-1 between chunk and skb, and also a new skb is always
   * allocated for chunk bundling in sctp_packet_transmit(), we can use the
   * destructor in the data chunk skb for the purpose of the sndbuf space
   * tracking.
   */
  static inline void sctp_set_owner_w(struct sctp_chunk *chunk)
  {
  	struct sctp_association *asoc = chunk->asoc;
  	struct sock *sk = asoc->base.sk;
  
  	/* The sndbuf space is tracked per association.  */
  	sctp_association_hold(asoc);
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
163
  	skb_set_owner_w(chunk->skb, sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
164
165
166
  	chunk->skb->destructor = sctp_wfree;
  	/* Save the chunk pointer in skb for sctp_wfree to use later.  */
  	*((struct sctp_chunk **)(chunk->skb->cb)) = chunk;
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
167
168
169
  	asoc->sndbuf_used += SCTP_DATA_SNDSIZE(chunk) +
  				sizeof(struct sk_buff) +
  				sizeof(struct sctp_chunk);
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
170
  	atomic_add(sizeof(struct sctp_chunk), &sk->sk_wmem_alloc);
3ab224be6   Hideo Aoki   [NET] CORE: Intro...
171
172
  	sk->sk_wmem_queued += chunk->skb->truesize;
  	sk_mem_charge(sk, chunk->skb->truesize);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
173
174
175
176
177
178
179
180
181
182
183
184
185
186
  }
  
  /* Verify that this is a valid address. */
  static inline int sctp_verify_addr(struct sock *sk, union sctp_addr *addr,
  				   int len)
  {
  	struct sctp_af *af;
  
  	/* Verify basic sockaddr. */
  	af = sctp_sockaddr_af(sctp_sk(sk), addr, len);
  	if (!af)
  		return -EINVAL;
  
  	/* Is this a valid SCTP address?  */
5636bef73   Vlad Yasevich   [SCTP]: Reject sc...
187
  	if (!af->addr_valid(addr, sctp_sk(sk), NULL))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
  		return -EINVAL;
  
  	if (!sctp_sk(sk)->pf->send_verify(sctp_sk(sk), (addr)))
  		return -EINVAL;
  
  	return 0;
  }
  
  /* Look up the association by its id.  If this is not a UDP-style
   * socket, the ID field is always ignored.
   */
  struct sctp_association *sctp_id2assoc(struct sock *sk, sctp_assoc_t id)
  {
  	struct sctp_association *asoc = NULL;
  
  	/* If this is not a UDP-style socket, assoc id should be ignored. */
  	if (!sctp_style(sk, UDP)) {
  		/* Return NULL if the socket state is not ESTABLISHED. It
  		 * could be a TCP-style listening socket or a socket which
  		 * hasn't yet called connect() to establish an association.
  		 */
  		if (!sctp_sstate(sk, ESTABLISHED))
  			return NULL;
  
  		/* Get the first and the only association from the list. */
  		if (!list_empty(&sctp_sk(sk)->ep->asocs))
  			asoc = list_entry(sctp_sk(sk)->ep->asocs.next,
  					  struct sctp_association, asocs);
  		return asoc;
  	}
  
  	/* Otherwise this is a UDP-style socket. */
  	if (!id || (id == (sctp_assoc_t)-1))
  		return NULL;
  
  	spin_lock_bh(&sctp_assocs_id_lock);
  	asoc = (struct sctp_association *)idr_find(&sctp_assocs_id, (int)id);
  	spin_unlock_bh(&sctp_assocs_id_lock);
  
  	if (!asoc || (asoc->base.sk != sk) || asoc->base.dead)
  		return NULL;
  
  	return asoc;
  }
  
  /* Look up the transport from an address and an assoc id. If both address and
   * id are specified, the associations matching the address and the id should be
   * the same.
   */
  static struct sctp_transport *sctp_addr_id2transport(struct sock *sk,
  					      struct sockaddr_storage *addr,
  					      sctp_assoc_t id)
  {
  	struct sctp_association *addr_asoc = NULL, *id_asoc = NULL;
  	struct sctp_transport *transport;
  	union sctp_addr *laddr = (union sctp_addr *)addr;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
244
  	addr_asoc = sctp_endpoint_lookup_assoc(sctp_sk(sk)->ep,
cd4ff034e   Al Viro   [SCTP]: sctp_endp...
245
  					       laddr,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
246
  					       &transport);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
  
  	if (!addr_asoc)
  		return NULL;
  
  	id_asoc = sctp_id2assoc(sk, id);
  	if (id_asoc && (id_asoc != addr_asoc))
  		return NULL;
  
  	sctp_get_pf_specific(sk->sk_family)->addr_v4map(sctp_sk(sk),
  						(union sctp_addr *)addr);
  
  	return transport;
  }
  
  /* API 3.1.2 bind() - UDP Style Syntax
   * The syntax of bind() is,
   *
   *   ret = bind(int sd, struct sockaddr *addr, int addrlen);
   *
   *   sd      - the socket descriptor returned by socket().
   *   addr    - the address structure (struct sockaddr_in or struct
   *             sockaddr_in6 [RFC 2553]),
   *   addr_len - the size of the address structure.
   */
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
271
  SCTP_STATIC int sctp_bind(struct sock *sk, struct sockaddr *addr, int addr_len)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
272
273
274
275
  {
  	int retval = 0;
  
  	sctp_lock_sock(sk);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
276
277
278
  	SCTP_DEBUG_PRINTK("sctp_bind(sk: %p, addr: %p, addr_len: %d)
  ",
  			  sk, addr, addr_len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
279
280
281
  
  	/* Disallow binding twice. */
  	if (!sctp_sk(sk)->ep->base.bind_addr.port)
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
282
  		retval = sctp_do_bind(sk, (union sctp_addr *)addr,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
  				      addr_len);
  	else
  		retval = -EINVAL;
  
  	sctp_release_sock(sk);
  
  	return retval;
  }
  
  static long sctp_get_port_local(struct sock *, union sctp_addr *);
  
  /* Verify this is a valid sockaddr. */
  static struct sctp_af *sctp_sockaddr_af(struct sctp_sock *opt,
  					union sctp_addr *addr, int len)
  {
  	struct sctp_af *af;
  
  	/* Check minimum size.  */
  	if (len < sizeof (struct sockaddr))
  		return NULL;
7dab83de5   Vlad Yasevich   sctp: Support ipv...
303
304
305
306
307
308
309
310
311
312
  	/* V4 mapped address are really of AF_INET family */
  	if (addr->sa.sa_family == AF_INET6 &&
  	    ipv6_addr_v4mapped(&addr->v6.sin6_addr)) {
  		if (!opt->pf->af_supported(AF_INET, opt))
  			return NULL;
  	} else {
  		/* Does this PF support this AF? */
  		if (!opt->pf->af_supported(addr->sa.sa_family, opt))
  			return NULL;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
  
  	/* If we get this far, af is valid. */
  	af = sctp_get_af_specific(addr->sa.sa_family);
  
  	if (len < af->sockaddr_len)
  		return NULL;
  
  	return af;
  }
  
  /* Bind a local address either to an endpoint or to an association.  */
  SCTP_STATIC int sctp_do_bind(struct sock *sk, union sctp_addr *addr, int len)
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sctp_endpoint *ep = sp->ep;
  	struct sctp_bind_addr *bp = &ep->base.bind_addr;
  	struct sctp_af *af;
  	unsigned short snum;
  	int ret = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
332
333
  	/* Common sockaddr verification. */
  	af = sctp_sockaddr_af(sp, addr, len);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
334
335
336
337
  	if (!af) {
  		SCTP_DEBUG_PRINTK("sctp_do_bind(sk: %p, newaddr: %p, len: %d) EINVAL
  ",
  				  sk, addr, len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
338
  		return -EINVAL;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
339
340
341
342
343
344
345
346
347
348
349
  	}
  
  	snum = ntohs(addr->v4.sin_port);
  
  	SCTP_DEBUG_PRINTK_IPADDR("sctp_do_bind(sk: %p, new addr: ",
  				 ", port: %d, new port: %d, len: %d)
  ",
  				 sk,
  				 addr,
  				 bp->port, snum,
  				 len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
350
351
352
353
  
  	/* PF specific bind() address verification. */
  	if (!sp->pf->bind_verify(sp, addr))
  		return -EADDRNOTAVAIL;
8b3580569   Vlad Yasevich   [SCTP]: Allow uns...
354
355
356
357
358
359
360
361
362
  	/* We must either be unbound, or bind to the same port.
  	 * It's OK to allow 0 ports if we are already bound.
  	 * We'll just inhert an already bound port in this case
  	 */
  	if (bp->port) {
  		if (!snum)
  			snum = bp->port;
  		else if (snum != bp->port) {
  			SCTP_DEBUG_PRINTK("sctp_do_bind:"
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
363
364
365
  				  " New port %d does not match existing port "
  				  "%d.
  ", snum, bp->port);
8b3580569   Vlad Yasevich   [SCTP]: Allow uns...
366
367
  			return -EINVAL;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
368
369
370
371
  	}
  
  	if (snum && snum < PROT_SOCK && !capable(CAP_NET_BIND_SERVICE))
  		return -EACCES;
4e54064e0   Vlad Yasevich   sctp: Allow only ...
372
373
374
375
376
  	/* See if the address matches any of the addresses we may have
  	 * already bound before checking against other endpoints.
  	 */
  	if (sctp_bind_addr_match(bp, addr, sp))
  		return -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
377
378
379
380
  	/* Make sure we are allowed to bind here.
  	 * The function sctp_get_port_local() does duplicate address
  	 * detection.
  	 */
2772b495e   Vlad Yasevich   SCTP: Pick the co...
381
  	addr->v4.sin_port = htons(snum);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
382
  	if ((ret = sctp_get_port_local(sk, addr))) {
4e54064e0   Vlad Yasevich   sctp: Allow only ...
383
  		return -EADDRINUSE;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
384
385
386
387
  	}
  
  	/* Refresh ephemeral port.  */
  	if (!bp->port)
c720c7e83   Eric Dumazet   inet: rename some...
388
  		bp->port = inet_sk(sk)->inet_num;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
389

559cf710b   Vlad Yasevich   [SCTP]: Convert b...
390
391
392
  	/* Add the address to the bind address list.
  	 * Use GFP_ATOMIC since BHs will be disabled.
  	 */
f57d96b2e   Vlad Yasevich   [SCTP]: Change us...
393
  	ret = sctp_add_bind_addr(bp, addr, SCTP_ADDR_SRC, GFP_ATOMIC);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
394
395
396
  
  	/* Copy back into socket for getsockname() use. */
  	if (!ret) {
c720c7e83   Eric Dumazet   inet: rename some...
397
  		inet_sk(sk)->inet_sport = htons(inet_sk(sk)->inet_num);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
398
399
400
401
402
403
404
405
  		af->to_sk_saddr(addr, sk);
  	}
  
  	return ret;
  }
  
   /* ADDIP Section 4.1.1 Congestion Control of ASCONF Chunks
   *
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
406
   * R1) One and only one ASCONF Chunk MAY be in transit and unacknowledged
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
407
   * at any one time.  If a sender, after sending an ASCONF chunk, decides
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
408
   * it needs to transfer another ASCONF Chunk, it MUST wait until the
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
409
   * ASCONF-ACK Chunk returns from the previous ASCONF Chunk before sending a
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
410
411
   * subsequent ASCONF. Note this restriction binds each side, so at any
   * time two ASCONF may be in-transit on any given association (one sent
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
412
413
414
415
416
417
418
419
420
   * from each endpoint).
   */
  static int sctp_send_asconf(struct sctp_association *asoc,
  			    struct sctp_chunk *chunk)
  {
  	int		retval = 0;
  
  	/* If there is an outstanding ASCONF chunk, queue it for later
  	 * transmission.
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
421
  	 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
422
  	if (asoc->addip_last_asconf) {
79af02c25   David S. Miller   [SCTP]: Use struc...
423
  		list_add_tail(&chunk->list, &asoc->addip_chunk_list);
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
424
  		goto out;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
  	}
  
  	/* Hold the chunk until an ASCONF_ACK is received. */
  	sctp_chunk_hold(chunk);
  	retval = sctp_primitive_ASCONF(asoc, chunk);
  	if (retval)
  		sctp_chunk_free(chunk);
  	else
  		asoc->addip_last_asconf = chunk;
  
  out:
  	return retval;
  }
  
  /* Add a list of addresses as bind addresses to local endpoint or
   * association.
   *
   * Basically run through each address specified in the addrs/addrcnt
   * array/length pair, determine if it is IPv6 or IPv4 and call
   * sctp_do_bind() on it.
   *
   * If any of them fails, then the operation will be reversed and the
   * ones that were added will be removed.
   *
   * Only sctp_setsockopt_bindx() is supposed to call this function.
   */
046752104   sebastian@breakpoint.cc   sctp: make locall...
451
  static int sctp_bindx_add(struct sock *sk, struct sockaddr *addrs, int addrcnt)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
  {
  	int cnt;
  	int retval = 0;
  	void *addr_buf;
  	struct sockaddr *sa_addr;
  	struct sctp_af *af;
  
  	SCTP_DEBUG_PRINTK("sctp_bindx_add (sk: %p, addrs: %p, addrcnt: %d)
  ",
  			  sk, addrs, addrcnt);
  
  	addr_buf = addrs;
  	for (cnt = 0; cnt < addrcnt; cnt++) {
  		/* The list may contain either IPv4 or IPv6 address;
  		 * determine the address length for walking thru the list.
  		 */
ea1107338   Joe Perches   net: Remove casts...
468
  		sa_addr = addr_buf;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
469
470
471
472
473
  		af = sctp_get_af_specific(sa_addr->sa_family);
  		if (!af) {
  			retval = -EINVAL;
  			goto err_bindx_add;
  		}
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
474
  		retval = sctp_do_bind(sk, (union sctp_addr *)sa_addr,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
  				      af->sockaddr_len);
  
  		addr_buf += af->sockaddr_len;
  
  err_bindx_add:
  		if (retval < 0) {
  			/* Failed. Cleanup the ones that have been added */
  			if (cnt > 0)
  				sctp_bindx_rem(sk, addrs, cnt);
  			return retval;
  		}
  	}
  
  	return retval;
  }
  
  /* Send an ASCONF chunk with Add IP address parameters to all the peers of the
   * associations that are part of the endpoint indicating that a list of local
   * addresses are added to the endpoint.
   *
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
495
   * If any of the addresses is already in the bind address list of the
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
496
497
498
499
500
   * association, we do not send the chunk for that association.  But it will not
   * affect other associations.
   *
   * Only sctp_setsockopt_bindx() is supposed to call this function.
   */
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
501
  static int sctp_send_asconf_add_ip(struct sock		*sk,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
502
503
504
505
506
507
508
509
510
511
  				   struct sockaddr	*addrs,
  				   int 			addrcnt)
  {
  	struct sctp_sock		*sp;
  	struct sctp_endpoint		*ep;
  	struct sctp_association		*asoc;
  	struct sctp_bind_addr		*bp;
  	struct sctp_chunk		*chunk;
  	struct sctp_sockaddr_entry	*laddr;
  	union sctp_addr			*addr;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
512
  	union sctp_addr			saveaddr;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
513
514
  	void				*addr_buf;
  	struct sctp_af			*af;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
515
516
517
518
519
520
521
522
523
524
525
526
  	struct list_head		*p;
  	int 				i;
  	int 				retval = 0;
  
  	if (!sctp_addip_enable)
  		return retval;
  
  	sp = sctp_sk(sk);
  	ep = sp->ep;
  
  	SCTP_DEBUG_PRINTK("%s: (sk: %p, addrs: %p, addrcnt: %d)
  ",
0dc47877a   Harvey Harrison   net: replace rema...
527
  			  __func__, sk, addrs, addrcnt);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
528

9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
529
  	list_for_each_entry(asoc, &ep->asocs, asocs) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
530
531
532
533
534
535
536
537
538
539
540
  
  		if (!asoc->peer.asconf_capable)
  			continue;
  
  		if (asoc->peer.addip_disabled_mask & SCTP_PARAM_ADD_IP)
  			continue;
  
  		if (!sctp_state(asoc, ESTABLISHED))
  			continue;
  
  		/* Check if any address in the packed array of addresses is
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
541
542
  		 * in the bind address list of the association. If so,
  		 * do not send the asconf chunk to its peer, but continue with
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
543
544
545
546
  		 * other associations.
  		 */
  		addr_buf = addrs;
  		for (i = 0; i < addrcnt; i++) {
ea1107338   Joe Perches   net: Remove casts...
547
  			addr = addr_buf;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
548
549
550
551
552
553
554
555
556
557
558
559
560
  			af = sctp_get_af_specific(addr->v4.sin_family);
  			if (!af) {
  				retval = -EINVAL;
  				goto out;
  			}
  
  			if (sctp_assoc_lookup_laddr(asoc, addr))
  				break;
  
  			addr_buf += af->sockaddr_len;
  		}
  		if (i < addrcnt)
  			continue;
559cf710b   Vlad Yasevich   [SCTP]: Convert b...
561
562
  		/* Use the first valid address in bind addr list of
  		 * association as Address Parameter of ASCONF CHUNK.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
563
  		 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
564
565
566
  		bp = &asoc->base.bind_addr;
  		p = bp->address_list.next;
  		laddr = list_entry(p, struct sctp_sockaddr_entry, list);
5ae955cff   Al Viro   [SCTP]: sctp_make...
567
  		chunk = sctp_make_asconf_update_ip(asoc, &laddr->a, addrs,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
568
569
570
571
572
  						   addrcnt, SCTP_PARAM_ADD_IP);
  		if (!chunk) {
  			retval = -ENOMEM;
  			goto out;
  		}
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
573
574
  		/* Add the new addresses to the bind address list with
  		 * use_as_src set to 0.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
575
  		 */
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
576
577
  		addr_buf = addrs;
  		for (i = 0; i < addrcnt; i++) {
ea1107338   Joe Perches   net: Remove casts...
578
  			addr = addr_buf;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
579
580
  			af = sctp_get_af_specific(addr->v4.sin_family);
  			memcpy(&saveaddr, addr, af->sockaddr_len);
f57d96b2e   Vlad Yasevich   [SCTP]: Change us...
581
582
  			retval = sctp_add_bind_addr(bp, &saveaddr,
  						    SCTP_ADDR_NEW, GFP_ATOMIC);
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
583
584
  			addr_buf += af->sockaddr_len;
  		}
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
  		if (asoc->src_out_of_asoc_ok) {
  			struct sctp_transport *trans;
  
  			list_for_each_entry(trans,
  			    &asoc->peer.transport_addr_list, transports) {
  				/* Clear the source and route cache */
  				dst_release(trans->dst);
  				trans->cwnd = min(4*asoc->pathmtu, max_t(__u32,
  				    2*asoc->pathmtu, 4380));
  				trans->ssthresh = asoc->peer.i.a_rwnd;
  				trans->rto = asoc->rto_initial;
  				trans->rtt = trans->srtt = trans->rttvar = 0;
  				sctp_transport_route(trans, NULL,
  				    sctp_sk(asoc->base.sk));
  			}
  		}
  		retval = sctp_send_asconf(asoc, chunk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
  	}
  
  out:
  	return retval;
  }
  
  /* Remove a list of addresses from bind addresses list.  Do not remove the
   * last address.
   *
   * Basically run through each address specified in the addrs/addrcnt
   * array/length pair, determine if it is IPv6 or IPv4 and call
   * sctp_del_bind() on it.
   *
   * If any of them fails, then the operation will be reversed and the
   * ones that were removed will be added back.
   *
   * At least one address has to be left; if only one address is
   * available, the operation will return -EBUSY.
   *
   * Only sctp_setsockopt_bindx() is supposed to call this function.
   */
046752104   sebastian@breakpoint.cc   sctp: make locall...
623
  static int sctp_bindx_rem(struct sock *sk, struct sockaddr *addrs, int addrcnt)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
624
625
626
627
628
629
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sctp_endpoint *ep = sp->ep;
  	int cnt;
  	struct sctp_bind_addr *bp = &ep->base.bind_addr;
  	int retval = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
630
  	void *addr_buf;
c9a08505e   Al Viro   [SCTP]: Switch sc...
631
  	union sctp_addr *sa_addr;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
  	struct sctp_af *af;
  
  	SCTP_DEBUG_PRINTK("sctp_bindx_rem (sk: %p, addrs: %p, addrcnt: %d)
  ",
  			  sk, addrs, addrcnt);
  
  	addr_buf = addrs;
  	for (cnt = 0; cnt < addrcnt; cnt++) {
  		/* If the bind address list is empty or if there is only one
  		 * bind address, there is nothing more to be removed (we need
  		 * at least one address here).
  		 */
  		if (list_empty(&bp->address_list) ||
  		    (sctp_list_single_entry(&bp->address_list))) {
  			retval = -EBUSY;
  			goto err_bindx_rem;
  		}
ea1107338   Joe Perches   net: Remove casts...
649
  		sa_addr = addr_buf;
c9a08505e   Al Viro   [SCTP]: Switch sc...
650
  		af = sctp_get_af_specific(sa_addr->sa.sa_family);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
651
652
653
654
  		if (!af) {
  			retval = -EINVAL;
  			goto err_bindx_rem;
  		}
0304ff8a2   Paolo Galtieri   [SCTP]: Unmap v4m...
655
656
657
658
659
  
  		if (!af->addr_valid(sa_addr, sp, NULL)) {
  			retval = -EADDRNOTAVAIL;
  			goto err_bindx_rem;
  		}
ee9cbaca7   Vlad Yasevich   sctp: Allow bindx...
660
661
  		if (sa_addr->v4.sin_port &&
  		    sa_addr->v4.sin_port != htons(bp->port)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
662
663
664
  			retval = -EINVAL;
  			goto err_bindx_rem;
  		}
ee9cbaca7   Vlad Yasevich   sctp: Allow bindx...
665
666
  		if (!sa_addr->v4.sin_port)
  			sa_addr->v4.sin_port = htons(bp->port);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
667
668
669
670
671
672
673
  		/* FIXME - There is probably a need to check if sk->sk_saddr and
  		 * sk->sk_rcv_addr are currently set to one of the addresses to
  		 * be removed. This is something which needs to be looked into
  		 * when we are fixing the outstanding issues with multi-homing
  		 * socket routing and failover schemes. Refer to comments in
  		 * sctp_do_bind(). -daisy
  		 */
0ed90fb0f   Vlad Yasevich   SCTP: Update RCU ...
674
  		retval = sctp_del_bind_addr(bp, sa_addr);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
  
  		addr_buf += af->sockaddr_len;
  err_bindx_rem:
  		if (retval < 0) {
  			/* Failed. Add the ones that has been removed back */
  			if (cnt > 0)
  				sctp_bindx_add(sk, addrs, cnt);
  			return retval;
  		}
  	}
  
  	return retval;
  }
  
  /* Send an ASCONF chunk with Delete IP address parameters to all the peers of
   * the associations that are part of the endpoint indicating that a list of
   * local addresses are removed from the endpoint.
   *
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
693
   * If any of the addresses is already in the bind address list of the
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
694
695
696
697
698
699
700
701
702
703
704
705
   * association, we do not send the chunk for that association.  But it will not
   * affect other associations.
   *
   * Only sctp_setsockopt_bindx() is supposed to call this function.
   */
  static int sctp_send_asconf_del_ip(struct sock		*sk,
  				   struct sockaddr	*addrs,
  				   int			addrcnt)
  {
  	struct sctp_sock	*sp;
  	struct sctp_endpoint	*ep;
  	struct sctp_association	*asoc;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
706
  	struct sctp_transport	*transport;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
707
708
709
710
711
  	struct sctp_bind_addr	*bp;
  	struct sctp_chunk	*chunk;
  	union sctp_addr		*laddr;
  	void			*addr_buf;
  	struct sctp_af		*af;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
712
  	struct sctp_sockaddr_entry *saddr;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
713
714
  	int 			i;
  	int 			retval = 0;
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
715
  	int			stored = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
716

8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
717
  	chunk = NULL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
718
719
720
721
722
723
724
725
  	if (!sctp_addip_enable)
  		return retval;
  
  	sp = sctp_sk(sk);
  	ep = sp->ep;
  
  	SCTP_DEBUG_PRINTK("%s: (sk: %p, addrs: %p, addrcnt: %d)
  ",
0dc47877a   Harvey Harrison   net: replace rema...
726
  			  __func__, sk, addrs, addrcnt);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
727

9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
728
  	list_for_each_entry(asoc, &ep->asocs, asocs) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
729
730
731
732
733
734
735
736
737
738
739
  
  		if (!asoc->peer.asconf_capable)
  			continue;
  
  		if (asoc->peer.addip_disabled_mask & SCTP_PARAM_DEL_IP)
  			continue;
  
  		if (!sctp_state(asoc, ESTABLISHED))
  			continue;
  
  		/* Check if any address in the packed array of addresses is
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
740
  		 * not present in the bind address list of the association.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
741
742
743
744
745
  		 * If so, do not send the asconf chunk to its peer, but
  		 * continue with other associations.
  		 */
  		addr_buf = addrs;
  		for (i = 0; i < addrcnt; i++) {
ea1107338   Joe Perches   net: Remove casts...
746
  			laddr = addr_buf;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
  			af = sctp_get_af_specific(laddr->v4.sin_family);
  			if (!af) {
  				retval = -EINVAL;
  				goto out;
  			}
  
  			if (!sctp_assoc_lookup_laddr(asoc, laddr))
  				break;
  
  			addr_buf += af->sockaddr_len;
  		}
  		if (i < addrcnt)
  			continue;
  
  		/* Find one address in the association's bind address list
  		 * that is not in the packed array of addresses. This is to
  		 * make sure that we do not delete all the addresses in the
  		 * association.
  		 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
766
767
768
  		bp = &asoc->base.bind_addr;
  		laddr = sctp_find_unmatch_addr(bp, (union sctp_addr *)addrs,
  					       addrcnt, sp);
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
769
770
771
772
773
  		if ((laddr == NULL) && (addrcnt == 1)) {
  			if (asoc->asconf_addr_del_pending)
  				continue;
  			asoc->asconf_addr_del_pending =
  			    kzalloc(sizeof(union sctp_addr), GFP_ATOMIC);
6d65e5eee   Michio Honda   sctp: kzalloc() e...
774
775
776
777
  			if (asoc->asconf_addr_del_pending == NULL) {
  				retval = -ENOMEM;
  				goto out;
  			}
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
778
779
780
781
782
783
784
785
786
787
788
789
790
  			asoc->asconf_addr_del_pending->sa.sa_family =
  				    addrs->sa_family;
  			asoc->asconf_addr_del_pending->v4.sin_port =
  				    htons(bp->port);
  			if (addrs->sa_family == AF_INET) {
  				struct sockaddr_in *sin;
  
  				sin = (struct sockaddr_in *)addrs;
  				asoc->asconf_addr_del_pending->v4.sin_addr.s_addr = sin->sin_addr.s_addr;
  			} else if (addrs->sa_family == AF_INET6) {
  				struct sockaddr_in6 *sin6;
  
  				sin6 = (struct sockaddr_in6 *)addrs;
4e3fd7a06   Alexey Dobriyan   net: remove ipv6_...
791
  				asoc->asconf_addr_del_pending->v6.sin6_addr = sin6->sin6_addr;
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
792
793
794
795
796
797
798
799
800
  			}
  			SCTP_DEBUG_PRINTK_IPADDR("send_asconf_del_ip: keep the last address asoc: %p ",
  			    " at %p
  ", asoc, asoc->asconf_addr_del_pending,
  			    asoc->asconf_addr_del_pending);
  			asoc->src_out_of_asoc_ok = 1;
  			stored = 1;
  			goto skip_mkasconf;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
801

559cf710b   Vlad Yasevich   [SCTP]: Convert b...
802
803
804
805
  		/* We do not need RCU protection throughout this loop
  		 * because this is done under a socket lock from the
  		 * setsockopt call.
  		 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
806
807
808
809
810
811
  		chunk = sctp_make_asconf_update_ip(asoc, laddr, addrs, addrcnt,
  						   SCTP_PARAM_DEL_IP);
  		if (!chunk) {
  			retval = -ENOMEM;
  			goto out;
  		}
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
812
  skip_mkasconf:
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
813
814
815
  		/* Reset use_as_src flag for the addresses in the bind address
  		 * list that are to be deleted.
  		 */
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
816
817
  		addr_buf = addrs;
  		for (i = 0; i < addrcnt; i++) {
ea1107338   Joe Perches   net: Remove casts...
818
  			laddr = addr_buf;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
819
  			af = sctp_get_af_specific(laddr->v4.sin_family);
559cf710b   Vlad Yasevich   [SCTP]: Convert b...
820
  			list_for_each_entry(saddr, &bp->address_list, list) {
5f242a13e   Al Viro   [SCTP]: Switch ->...
821
  				if (sctp_cmp_addr_exact(&saddr->a, laddr))
f57d96b2e   Vlad Yasevich   [SCTP]: Change us...
822
  					saddr->state = SCTP_ADDR_DEL;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
823
824
825
  			}
  			addr_buf += af->sockaddr_len;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
826

dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
827
828
829
  		/* Update the route and saddr entries for all the transports
  		 * as some of the addresses in the bind address list are
  		 * about to be deleted and cannot be used as source addresses.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
830
  		 */
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
831
832
  		list_for_each_entry(transport, &asoc->peer.transport_addr_list,
  					transports) {
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
833
834
835
836
  			dst_release(transport->dst);
  			sctp_transport_route(transport, NULL,
  					     sctp_sk(asoc->base.sk));
  		}
8a07eb0a5   Michio Honda   sctp: Add ASCONF ...
837
838
839
  		if (stored)
  			/* We don't need to transmit ASCONF */
  			continue;
dc022a987   Sridhar Samudrala   [SCTP]: ADDIP: Do...
840
  		retval = sctp_send_asconf(asoc, chunk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
841
842
843
844
  	}
  out:
  	return retval;
  }
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
  /* set addr events to assocs in the endpoint.  ep and addr_wq must be locked */
  int sctp_asconf_mgmt(struct sctp_sock *sp, struct sctp_sockaddr_entry *addrw)
  {
  	struct sock *sk = sctp_opt2sk(sp);
  	union sctp_addr *addr;
  	struct sctp_af *af;
  
  	/* It is safe to write port space in caller. */
  	addr = &addrw->a;
  	addr->v4.sin_port = htons(sp->ep->base.bind_addr.port);
  	af = sctp_get_af_specific(addr->sa.sa_family);
  	if (!af)
  		return -EINVAL;
  	if (sctp_verify_addr(sk, addr, af->sockaddr_len))
  		return -EINVAL;
  
  	if (addrw->state == SCTP_ADDR_NEW)
  		return sctp_send_asconf_add_ip(sk, (struct sockaddr *)addr, 1);
  	else
  		return sctp_send_asconf_del_ip(sk, (struct sockaddr *)addr, 1);
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
  /* Helper for tunneling sctp_bindx() requests through sctp_setsockopt()
   *
   * API 8.1
   * int sctp_bindx(int sd, struct sockaddr *addrs, int addrcnt,
   *                int flags);
   *
   * If sd is an IPv4 socket, the addresses passed must be IPv4 addresses.
   * If the sd is an IPv6 socket, the addresses passed can either be IPv4
   * or IPv6 addresses.
   *
   * A single address may be specified as INADDR_ANY or IN6ADDR_ANY, see
   * Section 3.1.2 for this usage.
   *
   * addrs is a pointer to an array of one or more socket addresses. Each
   * address is contained in its appropriate structure (i.e. struct
   * sockaddr_in or struct sockaddr_in6) the family of the address type
23c435f7f   Ville Nuorvala   [SCTP]: Fix minor...
882
   * must be used to distinguish the address length (note that this
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
   * representation is termed a "packed array" of addresses). The caller
   * specifies the number of addresses in the array with addrcnt.
   *
   * On success, sctp_bindx() returns 0. On failure, sctp_bindx() returns
   * -1, and sets errno to the appropriate error code.
   *
   * For SCTP, the port given in each socket address must be the same, or
   * sctp_bindx() will fail, setting errno to EINVAL.
   *
   * The flags parameter is formed from the bitwise OR of zero or more of
   * the following currently defined flags:
   *
   * SCTP_BINDX_ADD_ADDR
   *
   * SCTP_BINDX_REM_ADDR
   *
   * SCTP_BINDX_ADD_ADDR directs SCTP to add the given addresses to the
   * association, and SCTP_BINDX_REM_ADDR directs SCTP to remove the given
   * addresses from the association. The two flags are mutually exclusive;
   * if both are given, sctp_bindx() will fail with EINVAL. A caller may
   * not remove all addresses from an association; sctp_bindx() will
   * reject such an attempt with EINVAL.
   *
   * An application can use sctp_bindx(SCTP_BINDX_ADD_ADDR) to associate
   * additional addresses with an endpoint after calling bind().  Or use
   * sctp_bindx(SCTP_BINDX_REM_ADDR) to remove some addresses a listening
   * socket is associated with so that no new association accepted will be
   * associated with those addresses. If the endpoint supports dynamic
   * address a SCTP_BINDX_REM_ADDR or SCTP_BINDX_ADD_ADDR may cause a
   * endpoint to send the appropriate message to the peer to change the
   * peers address lists.
   *
   * Adding and removing addresses from a connected association is
   * optional functionality. Implementations that do not support this
   * functionality should return EOPNOTSUPP.
   *
   * Basically do nothing but copying the addresses from user to kernel
   * land and invoking either sctp_bindx_add() or sctp_bindx_rem() on the sk.
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
921
922
   * This is used for tunneling the sctp_bindx() request through sctp_setsockopt()
   * from userspace.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
   *
   * We don't use copy_from_user() for optimization: we first do the
   * sanity checks (buffer size -fast- and access check-healthy
   * pointer); if all of those succeed, then we can alloc the memory
   * (expensive operation) needed to copy the data to kernel. Then we do
   * the copying without checking the user space area
   * (__copy_from_user()).
   *
   * On exit there is no need to do sockfd_put(), sys_setsockopt() does
   * it.
   *
   * sk        The sk of the socket
   * addrs     The pointer to the addresses in user land
   * addrssize Size of the addrs buffer
   * op        Operation to perform (add or remove, see the flags of
   *           sctp_bindx)
   *
   * Returns 0 if ok, <0 errno code on error.
   */
  SCTP_STATIC int sctp_setsockopt_bindx(struct sock* sk,
  				      struct sockaddr __user *addrs,
  				      int addrs_size, int op)
  {
  	struct sockaddr *kaddrs;
  	int err;
  	int addrcnt = 0;
  	int walk_size = 0;
  	struct sockaddr *sa_addr;
  	void *addr_buf;
  	struct sctp_af *af;
  
  	SCTP_DEBUG_PRINTK("sctp_setsocktopt_bindx: sk %p addrs %p"
  			  " addrs_size %d opt %d
  ", sk, addrs, addrs_size, op);
  
  	if (unlikely(addrs_size <= 0))
  		return -EINVAL;
  
  	/* Check the user passed a healthy pointer.  */
  	if (unlikely(!access_ok(VERIFY_READ, addrs, addrs_size)))
  		return -EFAULT;
  
  	/* Alloc space for the address array in kernel memory.  */
8b3a70058   Kris Katterjohn   [NET]: Remove mor...
966
  	kaddrs = kmalloc(addrs_size, GFP_KERNEL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
967
968
969
970
971
972
973
  	if (unlikely(!kaddrs))
  		return -ENOMEM;
  
  	if (__copy_from_user(kaddrs, addrs, addrs_size)) {
  		kfree(kaddrs);
  		return -EFAULT;
  	}
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
974
  	/* Walk through the addrs buffer and count the number of addresses. */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
975
976
  	addr_buf = kaddrs;
  	while (walk_size < addrs_size) {
d7e0d19aa   Dan Rosenberg   sctp: prevent rea...
977
978
979
980
  		if (walk_size + sizeof(sa_family_t) > addrs_size) {
  			kfree(kaddrs);
  			return -EINVAL;
  		}
ea1107338   Joe Perches   net: Remove casts...
981
  		sa_addr = addr_buf;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
982
983
984
985
  		af = sctp_get_af_specific(sa_addr->sa_family);
  
  		/* If the address family is not supported or if this address
  		 * causes the address buffer to overflow return EINVAL.
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
986
  		 */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
  		if (!af || (walk_size + af->sockaddr_len) > addrs_size) {
  			kfree(kaddrs);
  			return -EINVAL;
  		}
  		addrcnt++;
  		addr_buf += af->sockaddr_len;
  		walk_size += af->sockaddr_len;
  	}
  
  	/* Do the work. */
  	switch (op) {
  	case SCTP_BINDX_ADD_ADDR:
  		err = sctp_bindx_add(sk, kaddrs, addrcnt);
  		if (err)
  			goto out;
  		err = sctp_send_asconf_add_ip(sk, kaddrs, addrcnt);
  		break;
  
  	case SCTP_BINDX_REM_ADDR:
  		err = sctp_bindx_rem(sk, kaddrs, addrcnt);
  		if (err)
  			goto out;
  		err = sctp_send_asconf_del_ip(sk, kaddrs, addrcnt);
  		break;
  
  	default:
  		err = -EINVAL;
  		break;
3ff50b799   Stephen Hemminger   [NET]: cleanup ex...
1015
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1016
1017
1018
1019
1020
1021
  
  out:
  	kfree(kaddrs);
  
  	return err;
  }
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1022
1023
1024
1025
1026
1027
1028
  /* __sctp_connect(struct sock* sk, struct sockaddr *kaddrs, int addrs_size)
   *
   * Common routine for handling connect() and sctp_connectx().
   * Connect will come in with just a single address.
   */
  static int __sctp_connect(struct sock* sk,
  			  struct sockaddr *kaddrs,
88a0a948e   Vlad Yasevich   sctp: Support the...
1029
1030
  			  int addrs_size,
  			  sctp_assoc_t *assoc_id)
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
  {
  	struct sctp_sock *sp;
  	struct sctp_endpoint *ep;
  	struct sctp_association *asoc = NULL;
  	struct sctp_association *asoc2;
  	struct sctp_transport *transport;
  	union sctp_addr to;
  	struct sctp_af *af;
  	sctp_scope_t scope;
  	long timeo;
  	int err = 0;
  	int addrcnt = 0;
  	int walk_size = 0;
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1044
  	union sctp_addr *sa_addr = NULL;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1045
  	void *addr_buf;
16d00fb77   Vlad Yasevich   [SCTP]: Verify al...
1046
  	unsigned short port;
f50f95cab   Vlad Yasevich   SCTP: Check to ma...
1047
  	unsigned int f_flags = 0;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
  
  	sp = sctp_sk(sk);
  	ep = sp->ep;
  
  	/* connect() cannot be done on a socket that is already in ESTABLISHED
  	 * state - UDP-style peeled off socket or a TCP-style socket that
  	 * is already connected.
  	 * It cannot be done even on a TCP-style listening socket.
  	 */
  	if (sctp_sstate(sk, ESTABLISHED) ||
  	    (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING))) {
  		err = -EISCONN;
  		goto out_free;
  	}
  
  	/* Walk through the addrs buffer and count the number of addresses. */
  	addr_buf = kaddrs;
  	while (walk_size < addrs_size) {
d7e0d19aa   Dan Rosenberg   sctp: prevent rea...
1066
1067
1068
1069
  		if (walk_size + sizeof(sa_family_t) > addrs_size) {
  			err = -EINVAL;
  			goto out_free;
  		}
ea1107338   Joe Perches   net: Remove casts...
1070
  		sa_addr = addr_buf;
4bdf4b5fe   Al Viro   [SCTP]: Switch sc...
1071
  		af = sctp_get_af_specific(sa_addr->sa.sa_family);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1072
1073
1074
1075
1076
1077
1078
1079
  
  		/* If the address family is not supported or if this address
  		 * causes the address buffer to overflow return EINVAL.
  		 */
  		if (!af || (walk_size + af->sockaddr_len) > addrs_size) {
  			err = -EINVAL;
  			goto out_free;
  		}
d7e0d19aa   Dan Rosenberg   sctp: prevent rea...
1080
  		port = ntohs(sa_addr->v4.sin_port);
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1081
1082
1083
1084
  		/* Save current address so we can work with it */
  		memcpy(&to, sa_addr, af->sockaddr_len);
  
  		err = sctp_verify_addr(sk, &to, af->sockaddr_len);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1085
1086
  		if (err)
  			goto out_free;
16d00fb77   Vlad Yasevich   [SCTP]: Verify al...
1087
1088
1089
1090
1091
  		/* Make sure the destination port is correctly set
  		 * in all addresses.
  		 */
  		if (asoc && asoc->peer.port && asoc->peer.port != port)
  			goto out_free;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1092
1093
1094
1095
  
  		/* Check if there already is a matching association on the
  		 * endpoint (other than the one created here).
  		 */
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1096
  		asoc2 = sctp_endpoint_lookup_assoc(ep, &to, &transport);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
  		if (asoc2 && asoc2 != asoc) {
  			if (asoc2->state >= SCTP_STATE_ESTABLISHED)
  				err = -EISCONN;
  			else
  				err = -EALREADY;
  			goto out_free;
  		}
  
  		/* If we could not find a matching association on the endpoint,
  		 * make sure that there is no peeled-off association matching
  		 * the peer address even on another socket.
  		 */
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1109
  		if (sctp_endpoint_is_peeled_off(ep, &to)) {
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
  			err = -EADDRNOTAVAIL;
  			goto out_free;
  		}
  
  		if (!asoc) {
  			/* If a bind() or sctp_bindx() is not called prior to
  			 * an sctp_connectx() call, the system picks an
  			 * ephemeral port and will choose an address set
  			 * equivalent to binding with a wildcard address.
  			 */
  			if (!ep->base.bind_addr.port) {
  				if (sctp_autobind(sk)) {
  					err = -EAGAIN;
  					goto out_free;
  				}
64a0c1c81   Ivan Skytte Jorgensen   [SCTP] Do not all...
1125
1126
  			} else {
  				/*
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
1127
1128
1129
1130
  				 * If an unprivileged user inherits a 1-many
  				 * style socket with open associations on a
  				 * privileged port, it MAY be permitted to
  				 * accept new associations, but it SHOULD NOT
64a0c1c81   Ivan Skytte Jorgensen   [SCTP] Do not all...
1131
1132
1133
1134
1135
1136
1137
  				 * be permitted to open new associations.
  				 */
  				if (ep->base.bind_addr.port < PROT_SOCK &&
  				    !capable(CAP_NET_BIND_SERVICE)) {
  					err = -EACCES;
  					goto out_free;
  				}
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1138
  			}
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1139
  			scope = sctp_scope(&to);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1140
1141
1142
1143
1144
  			asoc = sctp_association_new(ep, sk, scope, GFP_KERNEL);
  			if (!asoc) {
  				err = -ENOMEM;
  				goto out_free;
  			}
409b95aff   Vlad Yasevich   sctp: Set source ...
1145
1146
1147
1148
1149
1150
  
  			err = sctp_assoc_set_bind_addr_from_ep(asoc, scope,
  							      GFP_KERNEL);
  			if (err < 0) {
  				goto out_free;
  			}
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1151
1152
1153
  		}
  
  		/* Prime the peer's transport structures.  */
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1154
  		transport = sctp_assoc_add_peer(asoc, &to, GFP_KERNEL,
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
  						SCTP_UNKNOWN);
  		if (!transport) {
  			err = -ENOMEM;
  			goto out_free;
  		}
  
  		addrcnt++;
  		addr_buf += af->sockaddr_len;
  		walk_size += af->sockaddr_len;
  	}
c6ba68a26   Vlad Yasevich   sctp: support non...
1165
1166
1167
1168
1169
1170
1171
1172
  	/* In case the user of sctp_connectx() wants an association
  	 * id back, assign one now.
  	 */
  	if (assoc_id) {
  		err = sctp_assoc_set_id(asoc, GFP_KERNEL);
  		if (err < 0)
  			goto out_free;
  	}
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1173
1174
1175
1176
1177
1178
  	err = sctp_primitive_ASSOCIATE(asoc, NULL);
  	if (err < 0) {
  		goto out_free;
  	}
  
  	/* Initialize sk's dport and daddr for getpeername() */
c720c7e83   Eric Dumazet   inet: rename some...
1179
  	inet_sk(sk)->inet_dport = htons(asoc->peer.port);
e4d1feab5   Vlad Yasevich   SCTP: IPv4 mapped...
1180
1181
  	af = sctp_get_af_specific(sa_addr->sa.sa_family);
  	af->to_sk_daddr(sa_addr, sk);
8de8c8738   Sridhar Samudrala   [SCTP]: Set sk_er...
1182
  	sk->sk_err = 0;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1183

f50f95cab   Vlad Yasevich   SCTP: Check to ma...
1184
1185
1186
1187
1188
1189
1190
  	/* in-kernel sockets don't generally have a file allocated to them
  	 * if all they do is call sock_create_kern().
  	 */
  	if (sk->sk_socket->file)
  		f_flags = sk->sk_socket->file->f_flags;
  
  	timeo = sock_sndtimeo(sk, f_flags & O_NONBLOCK);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1191
  	err = sctp_wait_for_connect(asoc, &timeo);
c6ba68a26   Vlad Yasevich   sctp: support non...
1192
  	if ((err == 0 || err == -EINPROGRESS) && assoc_id)
88a0a948e   Vlad Yasevich   sctp: Support the...
1193
  		*assoc_id = asoc->assoc_id;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1194
1195
1196
1197
1198
1199
1200
  
  	/* Don't free association on exit. */
  	asoc = NULL;
  
  out_free:
  
  	SCTP_DEBUG_PRINTK("About to exit __sctp_connect() free asoc: %p"
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
1201
1202
1203
  			  " kaddrs: %p err: %d
  ",
  			  asoc, kaddrs, err);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1204
1205
1206
1207
1208
1209
1210
1211
  	if (asoc)
  		sctp_association_free(asoc);
  	return err;
  }
  
  /* Helper for tunneling sctp_connectx() requests through sctp_setsockopt()
   *
   * API 8.9
88a0a948e   Vlad Yasevich   sctp: Support the...
1212
1213
   * int sctp_connectx(int sd, struct sockaddr *addrs, int addrcnt,
   * 			sctp_assoc_t *asoc);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
   *
   * If sd is an IPv4 socket, the addresses passed must be IPv4 addresses.
   * If the sd is an IPv6 socket, the addresses passed can either be IPv4
   * or IPv6 addresses.
   *
   * A single address may be specified as INADDR_ANY or IN6ADDR_ANY, see
   * Section 3.1.2 for this usage.
   *
   * addrs is a pointer to an array of one or more socket addresses. Each
   * address is contained in its appropriate structure (i.e. struct
   * sockaddr_in or struct sockaddr_in6) the family of the address type
   * must be used to distengish the address length (note that this
   * representation is termed a "packed array" of addresses). The caller
   * specifies the number of addresses in the array with addrcnt.
   *
88a0a948e   Vlad Yasevich   sctp: Support the...
1229
1230
1231
1232
   * On success, sctp_connectx() returns 0. It also sets the assoc_id to
   * the association id of the new association.  On failure, sctp_connectx()
   * returns -1, and sets errno to the appropriate error code.  The assoc_id
   * is not touched by the kernel.
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1233
1234
1235
1236
1237
1238
1239
1240
   *
   * For SCTP, the port given in each socket address must be the same, or
   * sctp_connectx() will fail, setting errno to EINVAL.
   *
   * An application can use sctp_connectx to initiate an association with
   * an endpoint that is multi-homed.  Much like sctp_bindx() this call
   * allows a caller to specify multiple addresses at which a peer can be
   * reached.  The way the SCTP stack uses the list of addresses to set up
25985edce   Lucas De Marchi   Fix common misspe...
1241
   * the association is implementation dependent.  This function only
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
   * specifies that the stack will try to make use of all the addresses in
   * the list when needed.
   *
   * Note that the list of addresses passed in is only used for setting up
   * the association.  It does not necessarily equal the set of addresses
   * the peer uses for the resulting association.  If the caller wants to
   * find out the set of peer addresses, it must use sctp_getpaddrs() to
   * retrieve them after the association has been set up.
   *
   * Basically do nothing but copying the addresses from user to kernel
   * land and invoking either sctp_connectx(). This is used for tunneling
   * the sctp_connectx() request through sctp_setsockopt() from userspace.
   *
   * We don't use copy_from_user() for optimization: we first do the
   * sanity checks (buffer size -fast- and access check-healthy
   * pointer); if all of those succeed, then we can alloc the memory
   * (expensive operation) needed to copy the data to kernel. Then we do
   * the copying without checking the user space area
   * (__copy_from_user()).
   *
   * On exit there is no need to do sockfd_put(), sys_setsockopt() does
   * it.
   *
   * sk        The sk of the socket
   * addrs     The pointer to the addresses in user land
   * addrssize Size of the addrs buffer
   *
88a0a948e   Vlad Yasevich   sctp: Support the...
1269
   * Returns >=0 if ok, <0 errno code on error.
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1270
   */
88a0a948e   Vlad Yasevich   sctp: Support the...
1271
  SCTP_STATIC int __sctp_setsockopt_connectx(struct sock* sk,
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1272
  				      struct sockaddr __user *addrs,
88a0a948e   Vlad Yasevich   sctp: Support the...
1273
1274
  				      int addrs_size,
  				      sctp_assoc_t *assoc_id)
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1275
1276
1277
1278
1279
1280
  {
  	int err = 0;
  	struct sockaddr *kaddrs;
  
  	SCTP_DEBUG_PRINTK("%s - sk %p addrs %p addrs_size %d
  ",
0dc47877a   Harvey Harrison   net: replace rema...
1281
  			  __func__, sk, addrs, addrs_size);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1282
1283
1284
1285
1286
1287
1288
1289
1290
  
  	if (unlikely(addrs_size <= 0))
  		return -EINVAL;
  
  	/* Check the user passed a healthy pointer.  */
  	if (unlikely(!access_ok(VERIFY_READ, addrs, addrs_size)))
  		return -EFAULT;
  
  	/* Alloc space for the address array in kernel memory.  */
8b3a70058   Kris Katterjohn   [NET]: Remove mor...
1291
  	kaddrs = kmalloc(addrs_size, GFP_KERNEL);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1292
1293
1294
1295
1296
1297
  	if (unlikely(!kaddrs))
  		return -ENOMEM;
  
  	if (__copy_from_user(kaddrs, addrs, addrs_size)) {
  		err = -EFAULT;
  	} else {
88a0a948e   Vlad Yasevich   sctp: Support the...
1298
  		err = __sctp_connect(sk, kaddrs, addrs_size, assoc_id);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1299
1300
1301
  	}
  
  	kfree(kaddrs);
88a0a948e   Vlad Yasevich   sctp: Support the...
1302

3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1303
1304
  	return err;
  }
88a0a948e   Vlad Yasevich   sctp: Support the...
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
  /*
   * This is an older interface.  It's kept for backward compatibility
   * to the option that doesn't provide association id.
   */
  SCTP_STATIC int sctp_setsockopt_connectx_old(struct sock* sk,
  				      struct sockaddr __user *addrs,
  				      int addrs_size)
  {
  	return __sctp_setsockopt_connectx(sk, addrs, addrs_size, NULL);
  }
  
  /*
   * New interface for the API.  The since the API is done with a socket
   * option, to make it simple we feed back the association id is as a return
   * indication to the call.  Error is always negative and association id is
   * always positive.
   */
  SCTP_STATIC int sctp_setsockopt_connectx(struct sock* sk,
  				      struct sockaddr __user *addrs,
  				      int addrs_size)
  {
  	sctp_assoc_t assoc_id = 0;
  	int err = 0;
  
  	err = __sctp_setsockopt_connectx(sk, addrs, addrs_size, &assoc_id);
  
  	if (err)
  		return err;
  	else
  		return assoc_id;
  }
c6ba68a26   Vlad Yasevich   sctp: support non...
1336
  /*
f9c67811e   Vlad Yasevich   sctp: Fix regress...
1337
1338
1339
1340
1341
1342
   * New (hopefully final) interface for the API.
   * We use the sctp_getaddrs_old structure so that use-space library
   * can avoid any unnecessary allocations.   The only defferent part
   * is that we store the actual length of the address buffer into the
   * addrs_num structure member.  That way we can re-use the existing
   * code.
c6ba68a26   Vlad Yasevich   sctp: support non...
1343
1344
1345
1346
1347
   */
  SCTP_STATIC int sctp_getsockopt_connectx3(struct sock* sk, int len,
  					char __user *optval,
  					int __user *optlen)
  {
f9c67811e   Vlad Yasevich   sctp: Fix regress...
1348
  	struct sctp_getaddrs_old param;
c6ba68a26   Vlad Yasevich   sctp: support non...
1349
1350
  	sctp_assoc_t assoc_id = 0;
  	int err = 0;
f9c67811e   Vlad Yasevich   sctp: Fix regress...
1351
  	if (len < sizeof(param))
c6ba68a26   Vlad Yasevich   sctp: support non...
1352
  		return -EINVAL;
f9c67811e   Vlad Yasevich   sctp: Fix regress...
1353
1354
  	if (copy_from_user(&param, optval, sizeof(param)))
  		return -EFAULT;
c6ba68a26   Vlad Yasevich   sctp: support non...
1355
  	err = __sctp_setsockopt_connectx(sk,
f9c67811e   Vlad Yasevich   sctp: Fix regress...
1356
1357
  			(struct sockaddr __user *)param.addrs,
  			param.addr_num, &assoc_id);
c6ba68a26   Vlad Yasevich   sctp: support non...
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
  
  	if (err == 0 || err == -EINPROGRESS) {
  		if (copy_to_user(optval, &assoc_id, sizeof(assoc_id)))
  			return -EFAULT;
  		if (put_user(sizeof(assoc_id), optlen))
  			return -EFAULT;
  	}
  
  	return err;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
  /* API 3.1.4 close() - UDP Style Syntax
   * Applications use close() to perform graceful shutdown (as described in
   * Section 10.1 of [SCTP]) on ALL the associations currently represented
   * by a UDP-style socket.
   *
   * The syntax is
   *
   *   ret = close(int sd);
   *
   *   sd      - the socket descriptor of the associations to be closed.
   *
   * To gracefully shutdown a specific association represented by the
   * UDP-style socket, an application should use the sendmsg() call,
   * passing no user data, but including the appropriate flag in the
   * ancillary data (see Section xxxx).
   *
   * If sd in the close() call is a branched-off socket representing only
   * one association, the shutdown is performed on that association only.
   *
   * 4.1.6 close() - TCP Style Syntax
   *
   * Applications use close() to gracefully close down an association.
   *
   * The syntax is:
   *
   *    int close(int sd);
   *
   *      sd      - the socket descriptor of the association to be closed.
   *
   * After an application calls close() on a socket descriptor, no further
   * socket operations will succeed on that descriptor.
   *
   * API 7.1.4 SO_LINGER
   *
   * An application using the TCP-style socket can use this option to
   * perform the SCTP ABORT primitive.  The linger option structure is:
   *
   *  struct  linger {
   *     int     l_onoff;                // option on/off
   *     int     l_linger;               // linger time
   * };
   *
   * To enable the option, set l_onoff to 1.  If the l_linger value is set
   * to 0, calling close() is the same as the ABORT primitive.  If the
   * value is set to a negative value, the setsockopt() call will return
   * an error.  If the value is set to a positive value linger_time, the
   * close() can be blocked for at most linger_time ms.  If the graceful
   * shutdown phase does not finish during this period, close() will
   * return but the graceful shutdown phase continues in the system.
   */
  SCTP_STATIC void sctp_close(struct sock *sk, long timeout)
  {
  	struct sctp_endpoint *ep;
  	struct sctp_association *asoc;
  	struct list_head *pos, *temp;
cd4fcc704   Thomas Graf   sctp: ABORT if re...
1423
  	unsigned int data_was_unread;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1424
1425
1426
1427
1428
1429
  
  	SCTP_DEBUG_PRINTK("sctp_close(sk: 0x%p, timeout:%ld)
  ", sk, timeout);
  
  	sctp_lock_sock(sk);
  	sk->sk_shutdown = SHUTDOWN_MASK;
bec9640bb   Vlad Yasevich   sctp: Disallow ne...
1430
  	sk->sk_state = SCTP_SS_CLOSING;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1431
1432
  
  	ep = sctp_sk(sk)->ep;
cd4fcc704   Thomas Graf   sctp: ABORT if re...
1433
1434
1435
  	/* Clean up any skbs sitting on the receive queue.  */
  	data_was_unread = sctp_queue_purge_ulpevents(&sk->sk_receive_queue);
  	data_was_unread += sctp_queue_purge_ulpevents(&sctp_sk(sk)->pd_lobby);
61c9fed41   Vladislav Yasevich   [SCTP]: A better ...
1436
  	/* Walk all associations on an endpoint.  */
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
  	list_for_each_safe(pos, temp, &ep->asocs) {
  		asoc = list_entry(pos, struct sctp_association, asocs);
  
  		if (sctp_style(sk, TCP)) {
  			/* A closed association can still be in the list if
  			 * it belongs to a TCP-style listening socket that is
  			 * not yet accepted. If so, free it. If not, send an
  			 * ABORT or SHUTDOWN based on the linger options.
  			 */
  			if (sctp_state(asoc, CLOSED)) {
  				sctp_unhash_established(asoc);
  				sctp_association_free(asoc);
b89498a1c   Vladislav Yasevich   [SCTP]: Allow lin...
1449
1450
1451
  				continue;
  			}
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1452

cd4fcc704   Thomas Graf   sctp: ABORT if re...
1453
1454
1455
  		if (data_was_unread || !skb_queue_empty(&asoc->ulpq.lobby) ||
  		    !skb_queue_empty(&asoc->ulpq.reasm) ||
  		    (sock_flag(sk, SOCK_LINGER) && !sk->sk_lingertime)) {
b9ac86727   Sridhar Samudrala   [SCTP]: Fix sctp_...
1456
1457
1458
1459
1460
1461
  			struct sctp_chunk *chunk;
  
  			chunk = sctp_make_abort_user(asoc, NULL, 0);
  			if (chunk)
  				sctp_primitive_ABORT(asoc, chunk);
  		} else
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1462
1463
  			sctp_primitive_SHUTDOWN(asoc, NULL);
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
  	/* On a TCP-style socket, block for at most linger_time if set. */
  	if (sctp_style(sk, TCP) && timeout)
  		sctp_wait_for_close(sk, timeout);
  
  	/* This will run the backlog queue.  */
  	sctp_release_sock(sk);
  
  	/* Supposedly, no process has access to the socket, but
  	 * the net layers still may.
  	 */
  	sctp_local_bh_disable();
  	sctp_bh_lock_sock(sk);
  
  	/* Hold the sock, since sk_common_release() will put sock_put()
  	 * and we have just a little more cleanup.
  	 */
  	sock_hold(sk);
  	sk_common_release(sk);
  
  	sctp_bh_unlock_sock(sk);
  	sctp_local_bh_enable();
  
  	sock_put(sk);
  
  	SCTP_DBG_OBJCNT_DEC(sock);
  }
  
  /* Handle EPIPE error. */
  static int sctp_error(struct sock *sk, int flags, int err)
  {
  	if (err == -EPIPE)
  		err = sock_error(sk) ? : -EPIPE;
  	if (err == -EPIPE && !(flags & MSG_NOSIGNAL))
  		send_sig(SIGPIPE, current, 0);
  	return err;
  }
  
  /* API 3.1.3 sendmsg() - UDP Style Syntax
   *
   * An application uses sendmsg() and recvmsg() calls to transmit data to
   * and receive data from its peer.
   *
   *  ssize_t sendmsg(int socket, const struct msghdr *message,
   *                  int flags);
   *
   *  socket  - the socket descriptor of the endpoint.
   *  message - pointer to the msghdr structure which contains a single
   *            user message and possibly some ancillary data.
   *
   *            See Section 5 for complete description of the data
   *            structures.
   *
   *  flags   - flags sent or received with the user message, see Section
   *            5 for complete description of the flags.
   *
   * Note:  This function could use a rewrite especially when explicit
   * connect support comes in.
   */
  /* BUG:  We do not implement the equivalent of sk_stream_wait_memory(). */
  
  SCTP_STATIC int sctp_msghdr_parse(const struct msghdr *, sctp_cmsgs_t *);
  
  SCTP_STATIC int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
  			     struct msghdr *msg, size_t msg_len)
  {
  	struct sctp_sock *sp;
  	struct sctp_endpoint *ep;
  	struct sctp_association *new_asoc=NULL, *asoc=NULL;
  	struct sctp_transport *transport, *chunk_tp;
  	struct sctp_chunk *chunk;
dce116ae8   Al Viro   [SCTP]: Get rid o...
1534
  	union sctp_addr to;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1535
  	struct sockaddr *msg_name = NULL;
517aa0bcd   Joe Perches   sctp: sctp_sendms...
1536
  	struct sctp_sndrcvinfo default_sinfo;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1537
1538
1539
1540
1541
1542
1543
1544
1545
  	struct sctp_sndrcvinfo *sinfo;
  	struct sctp_initmsg *sinit;
  	sctp_assoc_t associd = 0;
  	sctp_cmsgs_t cmsgs = { NULL };
  	int err;
  	sctp_scope_t scope;
  	long timeo;
  	__u16 sinfo_flags = 0;
  	struct sctp_datamsg *datamsg;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1546
1547
1548
1549
1550
1551
1552
1553
1554
  	int msg_flags = msg->msg_flags;
  
  	SCTP_DEBUG_PRINTK("sctp_sendmsg(sk: %p, msg: %p, msg_len: %zu)
  ",
  			  sk, msg, msg_len);
  
  	err = 0;
  	sp = sctp_sk(sk);
  	ep = sp->ep;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
1555
1556
  	SCTP_DEBUG_PRINTK("Using endpoint: %p.
  ", ep);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
  
  	/* We cannot send a message over a TCP-style listening socket. */
  	if (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING)) {
  		err = -EPIPE;
  		goto out_nounlock;
  	}
  
  	/* Parse out the SCTP CMSGs.  */
  	err = sctp_msghdr_parse(msg, &cmsgs);
  
  	if (err) {
  		SCTP_DEBUG_PRINTK("msghdr parse err = %x
  ", err);
  		goto out_nounlock;
  	}
  
  	/* Fetch the destination address for this packet.  This
  	 * address only selects the association--it is not necessarily
  	 * the address we will send to.
  	 * For a peeled-off socket, msg_name is ignored.
  	 */
  	if (!sctp_style(sk, UDP_HIGH_BANDWIDTH) && msg->msg_name) {
  		int msg_namelen = msg->msg_namelen;
  
  		err = sctp_verify_addr(sk, (union sctp_addr *)msg->msg_name,
  				       msg_namelen);
  		if (err)
  			return err;
  
  		if (msg_namelen > sizeof(to))
  			msg_namelen = sizeof(to);
  		memcpy(&to, msg->msg_name, msg_namelen);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
  		msg_name = msg->msg_name;
  	}
  
  	sinfo = cmsgs.info;
  	sinit = cmsgs.init;
  
  	/* Did the user specify SNDRCVINFO?  */
  	if (sinfo) {
  		sinfo_flags = sinfo->sinfo_flags;
  		associd = sinfo->sinfo_assoc_id;
  	}
  
  	SCTP_DEBUG_PRINTK("msg_len: %zu, sinfo_flags: 0x%x
  ",
  			  msg_len, sinfo_flags);
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1604
1605
  	/* SCTP_EOF or SCTP_ABORT cannot be set on a TCP-style socket. */
  	if (sctp_style(sk, TCP) && (sinfo_flags & (SCTP_EOF | SCTP_ABORT))) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1606
1607
1608
  		err = -EINVAL;
  		goto out_nounlock;
  	}
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1609
1610
1611
  	/* If SCTP_EOF is set, no data can be sent. Disallow sending zero
  	 * length messages when SCTP_EOF|SCTP_ABORT is not set.
  	 * If SCTP_ABORT is set, the message length could be non zero with
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1612
  	 * the msg_iov set to the user abort reason.
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
1613
  	 */
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1614
1615
  	if (((sinfo_flags & SCTP_EOF) && (msg_len > 0)) ||
  	    (!(sinfo_flags & (SCTP_EOF|SCTP_ABORT)) && (msg_len == 0))) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1616
1617
1618
  		err = -EINVAL;
  		goto out_nounlock;
  	}
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1619
  	/* If SCTP_ADDR_OVER is set, there must be an address
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1620
1621
  	 * specified in msg_name.
  	 */
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1622
  	if ((sinfo_flags & SCTP_ADDR_OVER) && (!msg->msg_name)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
  		err = -EINVAL;
  		goto out_nounlock;
  	}
  
  	transport = NULL;
  
  	SCTP_DEBUG_PRINTK("About to look up association.
  ");
  
  	sctp_lock_sock(sk);
  
  	/* If a msg_name has been specified, assume this is to be used.  */
  	if (msg_name) {
  		/* Look for a matching association on the endpoint. */
dce116ae8   Al Viro   [SCTP]: Get rid o...
1637
  		asoc = sctp_endpoint_lookup_assoc(ep, &to, &transport);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1638
1639
1640
1641
1642
1643
1644
1645
  		if (!asoc) {
  			/* If we could not find a matching association on the
  			 * endpoint, make sure that it is not a TCP-style
  			 * socket that already has an association or there is
  			 * no peeled-off association on another socket.
  			 */
  			if ((sctp_style(sk, TCP) &&
  			     sctp_sstate(sk, ESTABLISHED)) ||
dce116ae8   Al Viro   [SCTP]: Get rid o...
1646
  			    sctp_endpoint_is_peeled_off(ep, &to)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
  				err = -EADDRNOTAVAIL;
  				goto out_unlock;
  			}
  		}
  	} else {
  		asoc = sctp_id2assoc(sk, associd);
  		if (!asoc) {
  			err = -EPIPE;
  			goto out_unlock;
  		}
  	}
  
  	if (asoc) {
  		SCTP_DEBUG_PRINTK("Just looked up association: %p.
  ", asoc);
  
  		/* We cannot send a message on a TCP-style SCTP_SS_ESTABLISHED
  		 * socket that has an association in CLOSED state. This can
  		 * happen when an accepted socket has an association that is
  		 * already CLOSED.
  		 */
  		if (sctp_state(asoc, CLOSED) && sctp_style(sk, TCP)) {
  			err = -EPIPE;
  			goto out_unlock;
  		}
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1672
  		if (sinfo_flags & SCTP_EOF) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1673
1674
1675
1676
1677
1678
1679
  			SCTP_DEBUG_PRINTK("Shutting down association: %p
  ",
  					  asoc);
  			sctp_primitive_SHUTDOWN(asoc, NULL);
  			err = 0;
  			goto out_unlock;
  		}
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1680
  		if (sinfo_flags & SCTP_ABORT) {
c164a9ba0   Sridhar Samudrala   Fix sctp privileg...
1681
1682
1683
1684
1685
1686
  
  			chunk = sctp_make_abort_user(asoc, msg, msg_len);
  			if (!chunk) {
  				err = -ENOMEM;
  				goto out_unlock;
  			}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1687
1688
  			SCTP_DEBUG_PRINTK("Aborting association: %p
  ", asoc);
c164a9ba0   Sridhar Samudrala   Fix sctp privileg...
1689
  			sctp_primitive_ABORT(asoc, chunk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1690
1691
1692
1693
1694
1695
1696
1697
1698
  			err = 0;
  			goto out_unlock;
  		}
  	}
  
  	/* Do we need to create the association?  */
  	if (!asoc) {
  		SCTP_DEBUG_PRINTK("There is no association yet.
  ");
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1699
  		if (sinfo_flags & (SCTP_EOF | SCTP_ABORT)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
  			err = -EINVAL;
  			goto out_unlock;
  		}
  
  		/* Check for invalid stream against the stream counts,
  		 * either the default or the user specified stream counts.
  		 */
  		if (sinfo) {
  			if (!sinit || (sinit && !sinit->sinit_num_ostreams)) {
  				/* Check against the defaults. */
  				if (sinfo->sinfo_stream >=
  				    sp->initmsg.sinit_num_ostreams) {
  					err = -EINVAL;
  					goto out_unlock;
  				}
  			} else {
  				/* Check against the requested.  */
  				if (sinfo->sinfo_stream >=
  				    sinit->sinit_num_ostreams) {
  					err = -EINVAL;
  					goto out_unlock;
  				}
  			}
  		}
  
  		/*
  		 * API 3.1.2 bind() - UDP Style Syntax
  		 * If a bind() or sctp_bindx() is not called prior to a
  		 * sendmsg() call that initiates a new association, the
  		 * system picks an ephemeral port and will choose an address
  		 * set equivalent to binding with a wildcard address.
  		 */
  		if (!ep->base.bind_addr.port) {
  			if (sctp_autobind(sk)) {
  				err = -EAGAIN;
  				goto out_unlock;
  			}
64a0c1c81   Ivan Skytte Jorgensen   [SCTP] Do not all...
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
  		} else {
  			/*
  			 * If an unprivileged user inherits a one-to-many
  			 * style socket with open associations on a privileged
  			 * port, it MAY be permitted to accept new associations,
  			 * but it SHOULD NOT be permitted to open new
  			 * associations.
  			 */
  			if (ep->base.bind_addr.port < PROT_SOCK &&
  			    !capable(CAP_NET_BIND_SERVICE)) {
  				err = -EACCES;
  				goto out_unlock;
  			}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1750
1751
1752
1753
1754
1755
1756
1757
1758
  		}
  
  		scope = sctp_scope(&to);
  		new_asoc = sctp_association_new(ep, sk, scope, GFP_KERNEL);
  		if (!new_asoc) {
  			err = -ENOMEM;
  			goto out_unlock;
  		}
  		asoc = new_asoc;
409b95aff   Vlad Yasevich   sctp: Set source ...
1759
1760
1761
1762
1763
  		err = sctp_assoc_set_bind_addr_from_ep(asoc, scope, GFP_KERNEL);
  		if (err < 0) {
  			err = -ENOMEM;
  			goto out_free;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
  
  		/* If the SCTP_INIT ancillary data is specified, set all
  		 * the association init values accordingly.
  		 */
  		if (sinit) {
  			if (sinit->sinit_num_ostreams) {
  				asoc->c.sinit_num_ostreams =
  					sinit->sinit_num_ostreams;
  			}
  			if (sinit->sinit_max_instreams) {
  				asoc->c.sinit_max_instreams =
  					sinit->sinit_max_instreams;
  			}
  			if (sinit->sinit_max_attempts) {
  				asoc->max_init_attempts
  					= sinit->sinit_max_attempts;
  			}
  			if (sinit->sinit_max_init_timeo) {
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
1782
  				asoc->max_init_timeo =
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1783
1784
1785
1786
1787
  				 msecs_to_jiffies(sinit->sinit_max_init_timeo);
  			}
  		}
  
  		/* Prime the peer's transport structures.  */
dce116ae8   Al Viro   [SCTP]: Get rid o...
1788
  		transport = sctp_assoc_add_peer(asoc, &to, GFP_KERNEL, SCTP_UNKNOWN);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1789
1790
1791
1792
  		if (!transport) {
  			err = -ENOMEM;
  			goto out_free;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
  	}
  
  	/* ASSERT: we have a valid association at this point.  */
  	SCTP_DEBUG_PRINTK("We have a valid association.
  ");
  
  	if (!sinfo) {
  		/* If the user didn't specify SNDRCVINFO, make up one with
  		 * some defaults.
  		 */
517aa0bcd   Joe Perches   sctp: sctp_sendms...
1803
  		memset(&default_sinfo, 0, sizeof(default_sinfo));
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
  		default_sinfo.sinfo_stream = asoc->default_stream;
  		default_sinfo.sinfo_flags = asoc->default_flags;
  		default_sinfo.sinfo_ppid = asoc->default_ppid;
  		default_sinfo.sinfo_context = asoc->default_context;
  		default_sinfo.sinfo_timetolive = asoc->default_timetolive;
  		default_sinfo.sinfo_assoc_id = sctp_assoc2id(asoc);
  		sinfo = &default_sinfo;
  	}
  
  	/* API 7.1.7, the sndbuf size per association bounds the
  	 * maximum size of data that can be sent in a single send call.
  	 */
  	if (msg_len > sk->sk_sndbuf) {
  		err = -EMSGSIZE;
  		goto out_free;
  	}
8a4794914   Vlad Yasevich   [SCTP] Flag a pmt...
1820
1821
  	if (asoc->pmtu_pending)
  		sctp_assoc_pending_pmtu(asoc);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1822
1823
1824
1825
1826
1827
1828
1829
1830
  	/* If fragmentation is disabled and the message length exceeds the
  	 * association fragmentation point, return EMSGSIZE.  The I-D
  	 * does not specify what this error is, but this looks like
  	 * a great fit.
  	 */
  	if (sctp_sk(sk)->disable_fragments && (msg_len > asoc->frag_point)) {
  		err = -EMSGSIZE;
  		goto out_free;
  	}
afd7614c0   Joe Perches   sctp: sctp_sendms...
1831
1832
1833
1834
  	/* Check for invalid stream. */
  	if (sinfo->sinfo_stream >= asoc->c.sinit_num_ostreams) {
  		err = -EINVAL;
  		goto out_free;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
  	}
  
  	timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
  	if (!sctp_wspace(asoc)) {
  		err = sctp_wait_for_sndbuf(asoc, &timeo, msg_len);
  		if (err)
  			goto out_free;
  	}
  
  	/* If an address is passed with the sendto/sendmsg call, it is used
  	 * to override the primary destination address in the TCP model, or
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1846
  	 * when SCTP_ADDR_OVER flag is set in the UDP model.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1847
1848
  	 */
  	if ((sctp_style(sk, TCP) && msg_name) ||
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
1849
  	    (sinfo_flags & SCTP_ADDR_OVER)) {
dce116ae8   Al Viro   [SCTP]: Get rid o...
1850
  		chunk_tp = sctp_assoc_lookup_paddr(asoc, &to);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
  		if (!chunk_tp) {
  			err = -EINVAL;
  			goto out_free;
  		}
  	} else
  		chunk_tp = NULL;
  
  	/* Auto-connect, if we aren't connected already. */
  	if (sctp_state(asoc, CLOSED)) {
  		err = sctp_primitive_ASSOCIATE(asoc, NULL);
  		if (err < 0)
  			goto out_free;
  		SCTP_DEBUG_PRINTK("We associated primitively.
  ");
  	}
  
  	/* Break the message into multiple chunks of maximum size. */
  	datamsg = sctp_datamsg_from_user(asoc, sinfo, msg, msg_len);
  	if (!datamsg) {
  		err = -ENOMEM;
  		goto out_free;
  	}
  
  	/* Now send the (possibly) fragmented message. */
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
1875
  	list_for_each_entry(chunk, &datamsg->chunks, frag_list) {
80445cfb2   Florian Westphal   [SCTP]: Remove re...
1876
  		sctp_chunk_hold(chunk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1877
1878
1879
1880
1881
  
  		/* Do accounting for the write space.  */
  		sctp_set_owner_w(chunk);
  
  		chunk->transport = chunk_tp;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1882
  	}
9c5c62be2   Vlad Yasevich   sctp: Send user m...
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
  	/* Send it to the lower layers.  Note:  all chunks
  	 * must either fail or succeed.   The lower layer
  	 * works that way today.  Keep it that way or this
  	 * breaks.
  	 */
  	err = sctp_primitive_SEND(asoc, datamsg);
  	/* Did the lower layer accept the chunk? */
  	if (err)
  		sctp_datamsg_free(datamsg);
  	else
  		sctp_datamsg_put(datamsg);
  
  	SCTP_DEBUG_PRINTK("We sent primitively.
  ");
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
  	if (err)
  		goto out_free;
  	else
  		err = msg_len;
  
  	/* If we are already past ASSOCIATE, the lower
  	 * layers are responsible for association cleanup.
  	 */
  	goto out_unlock;
  
  out_free:
  	if (new_asoc)
  		sctp_association_free(asoc);
  out_unlock:
  	sctp_release_sock(sk);
  
  out_nounlock:
  	return sctp_error(sk, msg_flags, err);
  
  #if 0
  do_sock_err:
  	if (msg_len)
  		err = msg_len;
  	else
  		err = sock_error(sk);
  	goto out;
  
  do_interrupted:
  	if (msg_len)
  		err = msg_len;
  	goto out;
  #endif /* 0 */
  }
  
  /* This is an extended version of skb_pull() that removes the data from the
   * start of a skb even when data is spread across the list of skb's in the
   * frag_list. len specifies the total amount of data that needs to be removed.
   * when 'len' bytes could be removed from the skb, it returns 0.
   * If 'len' exceeds the total skb length,  it returns the no. of bytes that
   * could not be removed.
   */
  static int sctp_skb_pull(struct sk_buff *skb, int len)
  {
  	struct sk_buff *list;
  	int skb_len = skb_headlen(skb);
  	int rlen;
  
  	if (len <= skb_len) {
  		__skb_pull(skb, len);
  		return 0;
  	}
  	len -= skb_len;
  	__skb_pull(skb, skb_len);
1b003be39   David S. Miller   sctp: Use frag li...
1950
  	skb_walk_frags(skb, list) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
  		rlen = sctp_skb_pull(list, len);
  		skb->len -= (len-rlen);
  		skb->data_len -= (len-rlen);
  
  		if (!rlen)
  			return 0;
  
  		len = rlen;
  	}
  
  	return len;
  }
  
  /* API 3.1.3  recvmsg() - UDP Style Syntax
   *
   *  ssize_t recvmsg(int socket, struct msghdr *message,
   *                    int flags);
   *
   *  socket  - the socket descriptor of the endpoint.
   *  message - pointer to the msghdr structure which contains a single
   *            user message and possibly some ancillary data.
   *
   *            See Section 5 for complete description of the data
   *            structures.
   *
   *  flags   - flags sent or received with the user message, see Section
   *            5 for complete description of the flags.
   */
  static struct sk_buff *sctp_skb_recv_datagram(struct sock *, int, int, int *);
  
  SCTP_STATIC int sctp_recvmsg(struct kiocb *iocb, struct sock *sk,
  			     struct msghdr *msg, size_t len, int noblock,
  			     int flags, int *addr_len)
  {
  	struct sctp_ulpevent *event = NULL;
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sk_buff *skb;
  	int copied;
  	int err = 0;
  	int skb_len;
  
  	SCTP_DEBUG_PRINTK("sctp_recvmsg(%s: %p, %s: %p, %s: %zd, %s: %d, %s: "
  			  "0x%x, %s: %p)
  ", "sk", sk, "msghdr", msg,
  			  "len", len, "knoblauch", noblock,
  			  "flags", flags, "addr_len", addr_len);
  
  	sctp_lock_sock(sk);
  
  	if (sctp_style(sk, TCP) && !sctp_sstate(sk, ESTABLISHED)) {
  		err = -ENOTCONN;
  		goto out;
  	}
  
  	skb = sctp_skb_recv_datagram(sk, flags, noblock, &err);
  	if (!skb)
  		goto out;
  
  	/* Get the total length of the skb including any skb's in the
  	 * frag_list.
  	 */
  	skb_len = skb->len;
  
  	copied = skb_len;
  	if (copied > len)
  		copied = len;
  
  	err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
  
  	event = sctp_skb2event(skb);
  
  	if (err)
  		goto out_free;
3b885787e   Neil Horman   net: Generalize s...
2024
  	sock_recv_ts_and_drops(msg, sk, skb);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
  	if (sctp_ulpevent_is_notification(event)) {
  		msg->msg_flags |= MSG_NOTIFICATION;
  		sp->pf->event_msgname(event, msg->msg_name, addr_len);
  	} else {
  		sp->pf->skb_msgname(skb, msg->msg_name, addr_len);
  	}
  
  	/* Check if we allow SCTP_SNDRCVINFO. */
  	if (sp->subscribe.sctp_data_io_event)
  		sctp_ulpevent_read_sndrcvinfo(event, msg);
  #if 0
  	/* FIXME: we should be calling IP/IPv6 layers.  */
  	if (sk->sk_protinfo.af_inet.cmsg_flags)
  		ip_cmsg_recv(msg, skb);
  #endif
  
  	err = copied;
  
  	/* If skb's length exceeds the user's buffer, update the skb and
  	 * push it back to the receive_queue so that the next call to
  	 * recvmsg() will return the remaining data. Don't set MSG_EOR.
  	 */
  	if (skb_len > copied) {
  		msg->msg_flags &= ~MSG_EOR;
  		if (flags & MSG_PEEK)
  			goto out_free;
  		sctp_skb_pull(skb, copied);
  		skb_queue_head(&sk->sk_receive_queue, skb);
  
  		/* When only partial message is copied to the user, increase
  		 * rwnd by that amount. If all the data in the skb is read,
  		 * rwnd is updated when the event is freed.
  		 */
0eca8fee0   Vlad Yasevich   [SCTP]: Do not in...
2058
2059
  		if (!sctp_ulpevent_is_notification(event))
  			sctp_assoc_rwnd_increase(event->asoc, copied);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
  		goto out;
  	} else if ((event->msg_flags & MSG_NOTIFICATION) ||
  		   (event->msg_flags & MSG_EOR))
  		msg->msg_flags |= MSG_EOR;
  	else
  		msg->msg_flags &= ~MSG_EOR;
  
  out_free:
  	if (flags & MSG_PEEK) {
  		/* Release the skb reference acquired after peeking the skb in
  		 * sctp_skb_recv_datagram().
  		 */
  		kfree_skb(skb);
  	} else {
  		/* Free the event which includes releasing the reference to
  		 * the owner of the skb, freeing the skb and updating the
  		 * rwnd.
  		 */
  		sctp_ulpevent_free(event);
  	}
  out:
  	sctp_release_sock(sk);
  	return err;
  }
  
  /* 7.1.12 Enable/Disable message fragmentation (SCTP_DISABLE_FRAGMENTS)
   *
   * This option is a on/off flag.  If enabled no SCTP message
   * fragmentation will be performed.  Instead if a message being sent
   * exceeds the current PMTU size, the message will NOT be sent and
   * instead a error will be indicated to the user.
   */
  static int sctp_setsockopt_disable_fragments(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
2093
2094
  					     char __user *optval,
  					     unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
  {
  	int val;
  
  	if (optlen < sizeof(int))
  		return -EINVAL;
  
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
  
  	sctp_sk(sk)->disable_fragments = (val == 0) ? 0 : 1;
  
  	return 0;
  }
  
  static int sctp_setsockopt_events(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
2110
  				  unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2111
  {
949123016   Wei Yongjun   sctp: fix missing...
2112
2113
  	struct sctp_association *asoc;
  	struct sctp_ulpevent *event;
7e8616d8e   Vlad Yasevich   [SCTP]: Update AU...
2114
  	if (optlen > sizeof(struct sctp_event_subscribe))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2115
2116
2117
  		return -EINVAL;
  	if (copy_from_user(&sctp_sk(sk)->subscribe, optval, optlen))
  		return -EFAULT;
949123016   Wei Yongjun   sctp: fix missing...
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
  
  	/*
  	 * At the time when a user app subscribes to SCTP_SENDER_DRY_EVENT,
  	 * if there is no data to be sent or retransmit, the stack will
  	 * immediately send up this notification.
  	 */
  	if (sctp_ulpevent_type_enabled(SCTP_SENDER_DRY_EVENT,
  				       &sctp_sk(sk)->subscribe)) {
  		asoc = sctp_id2assoc(sk, 0);
  
  		if (asoc && sctp_outq_is_empty(&asoc->outqueue)) {
  			event = sctp_ulpevent_make_sender_dry_event(asoc,
  					GFP_ATOMIC);
  			if (!event)
  				return -ENOMEM;
  
  			sctp_ulpq_tail_event(&asoc->ulpq, event);
  		}
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
  	return 0;
  }
  
  /* 7.1.8 Automatic Close of associations (SCTP_AUTOCLOSE)
   *
   * This socket option is applicable to the UDP-style socket only.  When
   * set it will cause associations that are idle for more than the
   * specified number of seconds to automatically close.  An association
   * being idle is defined an association that has NOT sent or received
   * user data.  The special value of '0' indicates that no automatic
   * close of any associations should be performed.  The option expects an
   * integer defining the number of seconds of idle time before an
   * association is closed.
   */
  static int sctp_setsockopt_autoclose(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
2152
  				     unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	/* Applicable to UDP-style socket only */
  	if (sctp_style(sk, TCP))
  		return -EOPNOTSUPP;
  	if (optlen != sizeof(int))
  		return -EINVAL;
  	if (copy_from_user(&sp->autoclose, optval, optlen))
  		return -EFAULT;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
  	return 0;
  }
  
  /* 7.1.13 Peer Address Parameters (SCTP_PEER_ADDR_PARAMS)
   *
   * Applications can enable or disable heartbeats for any peer address of
   * an association, modify an address's heartbeat interval, force a
   * heartbeat to be sent immediately, and adjust the address's maximum
   * number of retransmissions sent before an address is considered
   * unreachable.  The following structure is used to access and modify an
   * address's parameters:
   *
   *  struct sctp_paddrparams {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
   *     sctp_assoc_t            spp_assoc_id;
   *     struct sockaddr_storage spp_address;
   *     uint32_t                spp_hbinterval;
   *     uint16_t                spp_pathmaxrxt;
   *     uint32_t                spp_pathmtu;
   *     uint32_t                spp_sackdelay;
   *     uint32_t                spp_flags;
   * };
   *
   *   spp_assoc_id    - (one-to-many style socket) This is filled in the
   *                     application, and identifies the association for
   *                     this query.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2188
2189
   *   spp_address     - This specifies which address is of interest.
   *   spp_hbinterval  - This contains the value of the heartbeat interval,
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2190
2191
2192
   *                     in milliseconds.  If a  value of zero
   *                     is present in this field then no changes are to
   *                     be made to this parameter.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2193
2194
   *   spp_pathmaxrxt  - This contains the maximum number of
   *                     retransmissions before this address shall be
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
   *                     considered unreachable. If a  value of zero
   *                     is present in this field then no changes are to
   *                     be made to this parameter.
   *   spp_pathmtu     - When Path MTU discovery is disabled the value
   *                     specified here will be the "fixed" path mtu.
   *                     Note that if the spp_address field is empty
   *                     then all associations on this address will
   *                     have this fixed path mtu set upon them.
   *
   *   spp_sackdelay   - When delayed sack is enabled, this value specifies
   *                     the number of milliseconds that sacks will be delayed
   *                     for. This value will apply to all addresses of an
   *                     association if the spp_address field is empty. Note
   *                     also, that if delayed sack is enabled and this
   *                     value is set to 0, no change is made to the last
   *                     recorded delayed sack timer value.
   *
   *   spp_flags       - These flags are used to control various features
   *                     on an association. The flag field may contain
   *                     zero or more of the following options.
   *
   *                     SPP_HB_ENABLE  - Enable heartbeats on the
   *                     specified address. Note that if the address
   *                     field is empty all addresses for the association
   *                     have heartbeats enabled upon them.
   *
   *                     SPP_HB_DISABLE - Disable heartbeats on the
   *                     speicifed address. Note that if the address
   *                     field is empty all addresses for the association
   *                     will have their heartbeats disabled. Note also
   *                     that SPP_HB_ENABLE and SPP_HB_DISABLE are
   *                     mutually exclusive, only one of these two should
   *                     be specified. Enabling both fields will have
   *                     undetermined results.
   *
   *                     SPP_HB_DEMAND - Request a user initiated heartbeat
   *                     to be made immediately.
   *
bdf3092af   Vlad Yasevich   [SCTP]: Honor fla...
2233
2234
2235
2236
   *                     SPP_HB_TIME_IS_ZERO - Specify's that the time for
   *                     heartbeat delayis to be set to the value of 0
   *                     milliseconds.
   *
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
   *                     SPP_PMTUD_ENABLE - This field will enable PMTU
   *                     discovery upon the specified address. Note that
   *                     if the address feild is empty then all addresses
   *                     on the association are effected.
   *
   *                     SPP_PMTUD_DISABLE - This field will disable PMTU
   *                     discovery upon the specified address. Note that
   *                     if the address feild is empty then all addresses
   *                     on the association are effected. Not also that
   *                     SPP_PMTUD_ENABLE and SPP_PMTUD_DISABLE are mutually
   *                     exclusive. Enabling both will have undetermined
   *                     results.
   *
   *                     SPP_SACKDELAY_ENABLE - Setting this flag turns
   *                     on delayed sack. The time specified in spp_sackdelay
   *                     is used to specify the sack delay for this address. Note
   *                     that if spp_address is empty then all addresses will
   *                     enable delayed sack and take on the sack delay
   *                     value specified in spp_sackdelay.
   *                     SPP_SACKDELAY_DISABLE - Setting this flag turns
   *                     off delayed sack. If the spp_address field is blank then
   *                     delayed sack is disabled for the entire association. Note
   *                     also that this field is mutually exclusive to
   *                     SPP_SACKDELAY_ENABLE, setting both will have undefined
   *                     results.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2262
   */
161643660   Adrian Bunk   [SCTP]: Cleanups
2263
2264
2265
2266
2267
2268
2269
  static int sctp_apply_peer_addr_params(struct sctp_paddrparams *params,
  				       struct sctp_transport   *trans,
  				       struct sctp_association *asoc,
  				       struct sctp_sock        *sp,
  				       int                      hb_change,
  				       int                      pmtud_change,
  				       int                      sackdelay_change)
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2270
2271
2272
2273
2274
2275
2276
2277
  {
  	int error;
  
  	if (params->spp_flags & SPP_HB_DEMAND && trans) {
  		error = sctp_primitive_REQUESTHEARTBEAT (trans->asoc, trans);
  		if (error)
  			return error;
  	}
bdf3092af   Vlad Yasevich   [SCTP]: Honor fla...
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
  	/* Note that unless the spp_flag is set to SPP_HB_ENABLE the value of
  	 * this field is ignored.  Note also that a value of zero indicates
  	 * the current setting should be left unchanged.
  	 */
  	if (params->spp_flags & SPP_HB_ENABLE) {
  
  		/* Re-zero the interval if the SPP_HB_TIME_IS_ZERO is
  		 * set.  This lets us use 0 value when this flag
  		 * is set.
  		 */
  		if (params->spp_flags & SPP_HB_TIME_IS_ZERO)
  			params->spp_hbinterval = 0;
  
  		if (params->spp_hbinterval ||
  		    (params->spp_flags & SPP_HB_TIME_IS_ZERO)) {
  			if (trans) {
  				trans->hbinterval =
  				    msecs_to_jiffies(params->spp_hbinterval);
  			} else if (asoc) {
  				asoc->hbinterval =
  				    msecs_to_jiffies(params->spp_hbinterval);
  			} else {
  				sp->hbinterval = params->spp_hbinterval;
  			}
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
  		}
  	}
  
  	if (hb_change) {
  		if (trans) {
  			trans->param_flags =
  				(trans->param_flags & ~SPP_HB) | hb_change;
  		} else if (asoc) {
  			asoc->param_flags =
  				(asoc->param_flags & ~SPP_HB) | hb_change;
  		} else {
  			sp->param_flags =
  				(sp->param_flags & ~SPP_HB) | hb_change;
  		}
  	}
bdf3092af   Vlad Yasevich   [SCTP]: Honor fla...
2317
2318
2319
2320
2321
2322
  	/* When Path MTU discovery is disabled the value specified here will
  	 * be the "fixed" path mtu (i.e. the value of the spp_flags field must
  	 * include the flag SPP_PMTUD_DISABLE for this field to have any
  	 * effect).
  	 */
  	if ((params->spp_flags & SPP_PMTUD_DISABLE) && params->spp_pathmtu) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2323
2324
2325
2326
2327
  		if (trans) {
  			trans->pathmtu = params->spp_pathmtu;
  			sctp_assoc_sync_pmtu(asoc);
  		} else if (asoc) {
  			asoc->pathmtu = params->spp_pathmtu;
f68b2e05f   Vlad Yasevich   sctp: Fix SCTP_MA...
2328
  			sctp_frag_point(asoc, params->spp_pathmtu);
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
  		} else {
  			sp->pathmtu = params->spp_pathmtu;
  		}
  	}
  
  	if (pmtud_change) {
  		if (trans) {
  			int update = (trans->param_flags & SPP_PMTUD_DISABLE) &&
  				(params->spp_flags & SPP_PMTUD_ENABLE);
  			trans->param_flags =
  				(trans->param_flags & ~SPP_PMTUD) | pmtud_change;
  			if (update) {
9914ae3ca   Vlad Yasevich   sctp: cache the i...
2341
  				sctp_transport_pmtu(trans, sctp_opt2sk(sp));
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
  				sctp_assoc_sync_pmtu(asoc);
  			}
  		} else if (asoc) {
  			asoc->param_flags =
  				(asoc->param_flags & ~SPP_PMTUD) | pmtud_change;
  		} else {
  			sp->param_flags =
  				(sp->param_flags & ~SPP_PMTUD) | pmtud_change;
  		}
  	}
bdf3092af   Vlad Yasevich   [SCTP]: Honor fla...
2352
2353
2354
2355
2356
  	/* Note that unless the spp_flag is set to SPP_SACKDELAY_ENABLE the
  	 * value of this field is ignored.  Note also that a value of zero
  	 * indicates the current setting should be left unchanged.
  	 */
  	if ((params->spp_flags & SPP_SACKDELAY_ENABLE) && params->spp_sackdelay) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
  		if (trans) {
  			trans->sackdelay =
  				msecs_to_jiffies(params->spp_sackdelay);
  		} else if (asoc) {
  			asoc->sackdelay =
  				msecs_to_jiffies(params->spp_sackdelay);
  		} else {
  			sp->sackdelay = params->spp_sackdelay;
  		}
  	}
  
  	if (sackdelay_change) {
  		if (trans) {
  			trans->param_flags =
  				(trans->param_flags & ~SPP_SACKDELAY) |
  				sackdelay_change;
  		} else if (asoc) {
  			asoc->param_flags =
  				(asoc->param_flags & ~SPP_SACKDELAY) |
  				sackdelay_change;
  		} else {
  			sp->param_flags =
  				(sp->param_flags & ~SPP_SACKDELAY) |
  				sackdelay_change;
  		}
  	}
37051f738   Andrei Pelinescu-Onciul   sctp: allow setti...
2383
2384
  	/* Note that a value of zero indicates the current setting should be
  	   left unchanged.
bdf3092af   Vlad Yasevich   [SCTP]: Honor fla...
2385
  	 */
37051f738   Andrei Pelinescu-Onciul   sctp: allow setti...
2386
  	if (params->spp_pathmaxrxt) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
  		if (trans) {
  			trans->pathmaxrxt = params->spp_pathmaxrxt;
  		} else if (asoc) {
  			asoc->pathmaxrxt = params->spp_pathmaxrxt;
  		} else {
  			sp->pathmaxrxt = params->spp_pathmaxrxt;
  		}
  	}
  
  	return 0;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2398
  static int sctp_setsockopt_peer_addr_params(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
2399
2400
  					    char __user *optval,
  					    unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2401
  {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2402
2403
2404
2405
  	struct sctp_paddrparams  params;
  	struct sctp_transport   *trans = NULL;
  	struct sctp_association *asoc = NULL;
  	struct sctp_sock        *sp = sctp_sk(sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2406
  	int error;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2407
  	int hb_change, pmtud_change, sackdelay_change;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2408
2409
  
  	if (optlen != sizeof(struct sctp_paddrparams))
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2410
  		return - EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2411
2412
  	if (copy_from_user(&params, optval, optlen))
  		return -EFAULT;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2413
2414
2415
2416
2417
2418
2419
2420
2421
  	/* Validate flags and value parameters. */
  	hb_change        = params.spp_flags & SPP_HB;
  	pmtud_change     = params.spp_flags & SPP_PMTUD;
  	sackdelay_change = params.spp_flags & SPP_SACKDELAY;
  
  	if (hb_change        == SPP_HB ||
  	    pmtud_change     == SPP_PMTUD ||
  	    sackdelay_change == SPP_SACKDELAY ||
  	    params.spp_sackdelay > 500 ||
f64f9e719   Joe Perches   net: Move && and ...
2422
2423
  	    (params.spp_pathmtu &&
  	     params.spp_pathmtu < SCTP_DEFAULT_MINSEGMENT))
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2424
  		return -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2425

52ccb8e90   Frank Filz   [SCTP]: Update SC...
2426
2427
2428
  	/* If an address other than INADDR_ANY is specified, and
  	 * no transport is found, then the request is invalid.
  	 */
52cae8f06   Vlad Yasevich   sctp: try harder ...
2429
  	if (!sctp_is_any(sk, ( union sctp_addr *)&params.spp_address)) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2430
2431
2432
  		trans = sctp_addr_id2transport(sk, &params.spp_address,
  					       params.spp_assoc_id);
  		if (!trans)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2433
  			return -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2434
  	}
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2435
2436
2437
2438
2439
2440
  	/* Get association, if assoc_id != 0 and the socket is a one
  	 * to many style socket, and an association was not found, then
  	 * the id was invalid.
  	 */
  	asoc = sctp_id2assoc(sk, params.spp_assoc_id);
  	if (!asoc && params.spp_assoc_id && sctp_style(sk, UDP))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2441
  		return -EINVAL;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2442
2443
  	/* Heartbeat demand can only be sent on a transport or
  	 * association, but not a socket.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2444
  	 */
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2445
2446
2447
2448
2449
2450
2451
  	if (params.spp_flags & SPP_HB_DEMAND && !trans && !asoc)
  		return -EINVAL;
  
  	/* Process parameters. */
  	error = sctp_apply_peer_addr_params(&params, trans, asoc, sp,
  					    hb_change, pmtud_change,
  					    sackdelay_change);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2452

52ccb8e90   Frank Filz   [SCTP]: Update SC...
2453
2454
2455
2456
2457
  	if (error)
  		return error;
  
  	/* If changes are for association, also apply parameters to each
  	 * transport.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2458
  	 */
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2459
  	if (!trans && asoc) {
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
2460
2461
  		list_for_each_entry(trans, &asoc->peer.transport_addr_list,
  				transports) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
2462
2463
2464
2465
2466
  			sctp_apply_peer_addr_params(&params, trans, asoc, sp,
  						    hb_change, pmtud_change,
  						    sackdelay_change);
  		}
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2467
2468
2469
  
  	return 0;
  }
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
  /*
   * 7.1.23.  Get or set delayed ack timer (SCTP_DELAYED_SACK)
   *
   * This option will effect the way delayed acks are performed.  This
   * option allows you to get or set the delayed ack time, in
   * milliseconds.  It also allows changing the delayed ack frequency.
   * Changing the frequency to 1 disables the delayed sack algorithm.  If
   * the assoc_id is 0, then this sets or gets the endpoints default
   * values.  If the assoc_id field is non-zero, then the set or get
   * effects the specified association for the one to many model (the
   * assoc_id field is ignored by the one to one model).  Note that if
   * sack_delay or sack_freq are 0 when setting this option, then the
   * current values will remain unchanged.
   *
   * struct sctp_sack_info {
   *     sctp_assoc_t            sack_assoc_id;
   *     uint32_t                sack_delay;
   *     uint32_t                sack_freq;
   * };
   *
   * sack_assoc_id -  This parameter, indicates which association the user
   *    is performing an action upon.  Note that if this field's value is
   *    zero then the endpoints default value is changed (effecting future
   *    associations only).
   *
   * sack_delay -  This parameter contains the number of milliseconds that
   *    the user is requesting the delayed ACK timer be set to.  Note that
   *    this value is defined in the standard to be between 200 and 500
   *    milliseconds.
   *
   * sack_freq -  This parameter contains the number of packets that must
   *    be received before a sack is sent without waiting for the delay
   *    timer to expire.  The default value for this is 2, setting this
   *    value to 1 will disable the delayed sack algorithm.
7708610b1   Frank Filz   [SCTP]: Add suppo...
2504
   */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2505
  static int sctp_setsockopt_delayed_ack(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
2506
  				       char __user *optval, unsigned int optlen)
7708610b1   Frank Filz   [SCTP]: Add suppo...
2507
  {
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2508
  	struct sctp_sack_info    params;
7708610b1   Frank Filz   [SCTP]: Add suppo...
2509
2510
2511
  	struct sctp_transport   *trans = NULL;
  	struct sctp_association *asoc = NULL;
  	struct sctp_sock        *sp = sctp_sk(sk);
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2512
2513
2514
  	if (optlen == sizeof(struct sctp_sack_info)) {
  		if (copy_from_user(&params, optval, optlen))
  			return -EFAULT;
7708610b1   Frank Filz   [SCTP]: Add suppo...
2515

d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2516
2517
2518
  		if (params.sack_delay == 0 && params.sack_freq == 0)
  			return 0;
  	} else if (optlen == sizeof(struct sctp_assoc_value)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
2519
2520
2521
2522
  		pr_warn("Use of struct sctp_assoc_value in delayed_ack socket option deprecated
  ");
  		pr_warn("Use struct sctp_sack_info instead
  ");
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2523
2524
2525
2526
2527
2528
2529
2530
2531
  		if (copy_from_user(&params, optval, optlen))
  			return -EFAULT;
  
  		if (params.sack_delay == 0)
  			params.sack_freq = 1;
  		else
  			params.sack_freq = 0;
  	} else
  		return - EINVAL;
7708610b1   Frank Filz   [SCTP]: Add suppo...
2532
2533
  
  	/* Validate value parameter. */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2534
  	if (params.sack_delay > 500)
7708610b1   Frank Filz   [SCTP]: Add suppo...
2535
  		return -EINVAL;
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2536
  	/* Get association, if sack_assoc_id != 0 and the socket is a one
7708610b1   Frank Filz   [SCTP]: Add suppo...
2537
2538
  	 * to many style socket, and an association was not found, then
  	 * the id was invalid.
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2539
  	 */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2540
2541
  	asoc = sctp_id2assoc(sk, params.sack_assoc_id);
  	if (!asoc && params.sack_assoc_id && sctp_style(sk, UDP))
7708610b1   Frank Filz   [SCTP]: Add suppo...
2542
  		return -EINVAL;
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2543
  	if (params.sack_delay) {
7708610b1   Frank Filz   [SCTP]: Add suppo...
2544
2545
  		if (asoc) {
  			asoc->sackdelay =
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2546
  				msecs_to_jiffies(params.sack_delay);
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2547
  			asoc->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2548
2549
2550
  				(asoc->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_ENABLE;
  		} else {
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2551
  			sp->sackdelay = params.sack_delay;
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2552
  			sp->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2553
2554
2555
  				(sp->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_ENABLE;
  		}
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2556
2557
2558
  	}
  
  	if (params.sack_freq == 1) {
7708610b1   Frank Filz   [SCTP]: Add suppo...
2559
  		if (asoc) {
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2560
  			asoc->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2561
2562
2563
  				(asoc->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_DISABLE;
  		} else {
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2564
  			sp->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2565
2566
2567
  				(sp->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_DISABLE;
  		}
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
  	} else if (params.sack_freq > 1) {
  		if (asoc) {
  			asoc->sackfreq = params.sack_freq;
  			asoc->param_flags =
  				(asoc->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_ENABLE;
  		} else {
  			sp->sackfreq = params.sack_freq;
  			sp->param_flags =
  				(sp->param_flags & ~SPP_SACKDELAY) |
  				SPP_SACKDELAY_ENABLE;
  		}
7708610b1   Frank Filz   [SCTP]: Add suppo...
2580
2581
2582
2583
  	}
  
  	/* If change is for association, also apply to each transport. */
  	if (asoc) {
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
2584
2585
  		list_for_each_entry(trans, &asoc->peer.transport_addr_list,
  				transports) {
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2586
  			if (params.sack_delay) {
7708610b1   Frank Filz   [SCTP]: Add suppo...
2587
  				trans->sackdelay =
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2588
  					msecs_to_jiffies(params.sack_delay);
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2589
  				trans->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2590
2591
  					(trans->param_flags & ~SPP_SACKDELAY) |
  					SPP_SACKDELAY_ENABLE;
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2592
  			}
7bfe8bdb8   Vlad Yasevich   sctp: Fix problem...
2593
  			if (params.sack_freq == 1) {
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2594
  				trans->param_flags =
7708610b1   Frank Filz   [SCTP]: Add suppo...
2595
2596
  					(trans->param_flags & ~SPP_SACKDELAY) |
  					SPP_SACKDELAY_DISABLE;
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
2597
2598
2599
2600
2601
  			} else if (params.sack_freq > 1) {
  				trans->sackfreq = params.sack_freq;
  				trans->param_flags =
  					(trans->param_flags & ~SPP_SACKDELAY) |
  					SPP_SACKDELAY_ENABLE;
7708610b1   Frank Filz   [SCTP]: Add suppo...
2602
2603
2604
  			}
  		}
  	}
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2605

7708610b1   Frank Filz   [SCTP]: Add suppo...
2606
2607
  	return 0;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
  /* 7.1.3 Initialization Parameters (SCTP_INITMSG)
   *
   * Applications can specify protocol parameters for the default association
   * initialization.  The option name argument to setsockopt() and getsockopt()
   * is SCTP_INITMSG.
   *
   * Setting initialization parameters is effective only on an unconnected
   * socket (for UDP-style sockets only future associations are effected
   * by the change).  With TCP-style sockets, this option is inherited by
   * sockets derived from a listener socket.
   */
b7058842c   David S. Miller   net: Make setsock...
2619
  static int sctp_setsockopt_initmsg(struct sock *sk, char __user *optval, unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
  {
  	struct sctp_initmsg sinit;
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	if (optlen != sizeof(struct sctp_initmsg))
  		return -EINVAL;
  	if (copy_from_user(&sinit, optval, optlen))
  		return -EFAULT;
  
  	if (sinit.sinit_num_ostreams)
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2630
  		sp->initmsg.sinit_num_ostreams = sinit.sinit_num_ostreams;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2631
  	if (sinit.sinit_max_instreams)
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2632
  		sp->initmsg.sinit_max_instreams = sinit.sinit_max_instreams;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2633
  	if (sinit.sinit_max_attempts)
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2634
  		sp->initmsg.sinit_max_attempts = sinit.sinit_max_attempts;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2635
  	if (sinit.sinit_max_init_timeo)
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2636
  		sp->initmsg.sinit_max_init_timeo = sinit.sinit_max_init_timeo;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
  
  	return 0;
  }
  
  /*
   * 7.1.14 Set default send parameters (SCTP_DEFAULT_SEND_PARAM)
   *
   *   Applications that wish to use the sendto() system call may wish to
   *   specify a default set of parameters that would normally be supplied
   *   through the inclusion of ancillary data.  This socket option allows
   *   such an application to set the default sctp_sndrcvinfo structure.
   *   The application that wishes to use this socket option simply passes
   *   in to this call the sctp_sndrcvinfo structure defined in Section
   *   5.2.2) The input parameters accepted by this call include
   *   sinfo_stream, sinfo_flags, sinfo_ppid, sinfo_context,
   *   sinfo_timetolive.  The user must provide the sinfo_assoc_id field in
   *   to this call if the caller is using the UDP model.
   */
  static int sctp_setsockopt_default_send_param(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
2656
2657
  					      char __user *optval,
  					      unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
  {
  	struct sctp_sndrcvinfo info;
  	struct sctp_association *asoc;
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	if (optlen != sizeof(struct sctp_sndrcvinfo))
  		return -EINVAL;
  	if (copy_from_user(&info, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, info.sinfo_assoc_id);
  	if (!asoc && info.sinfo_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc) {
  		asoc->default_stream = info.sinfo_stream;
  		asoc->default_flags = info.sinfo_flags;
  		asoc->default_ppid = info.sinfo_ppid;
  		asoc->default_context = info.sinfo_context;
  		asoc->default_timetolive = info.sinfo_timetolive;
  	} else {
  		sp->default_stream = info.sinfo_stream;
  		sp->default_flags = info.sinfo_flags;
  		sp->default_ppid = info.sinfo_ppid;
  		sp->default_context = info.sinfo_context;
  		sp->default_timetolive = info.sinfo_timetolive;
  	}
  
  	return 0;
  }
  
  /* 7.1.10 Set Primary Address (SCTP_PRIMARY_ADDR)
   *
   * Requests that the local SCTP stack use the enclosed peer address as
   * the association primary.  The enclosed address must be one of the
   * association peer's addresses.
   */
  static int sctp_setsockopt_primary_addr(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
2696
  					unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
  {
  	struct sctp_prim prim;
  	struct sctp_transport *trans;
  
  	if (optlen != sizeof(struct sctp_prim))
  		return -EINVAL;
  
  	if (copy_from_user(&prim, optval, sizeof(struct sctp_prim)))
  		return -EFAULT;
  
  	trans = sctp_addr_id2transport(sk, &prim.ssp_addr, prim.ssp_assoc_id);
  	if (!trans)
  		return -EINVAL;
  
  	sctp_assoc_set_primary(trans->asoc, trans);
  
  	return 0;
  }
  
  /*
   * 7.1.5 SCTP_NODELAY
   *
   * Turn on/off any Nagle-like algorithm.  This means that packets are
   * generally sent as soon as possible and no unnecessary delays are
   * introduced, at the cost of more packets in the network.  Expects an
   *  integer boolean flag.
   */
  static int sctp_setsockopt_nodelay(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
2725
  				   unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
  {
  	int val;
  
  	if (optlen < sizeof(int))
  		return -EINVAL;
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
  
  	sctp_sk(sk)->nodelay = (val == 0) ? 0 : 1;
  	return 0;
  }
  
  /*
   *
   * 7.1.1 SCTP_RTOINFO
   *
   * The protocol parameters used to initialize and bound retransmission
   * timeout (RTO) are tunable. sctp_rtoinfo structure is used to access
   * and modify these parameters.
   * All parameters are time values, in milliseconds.  A value of 0, when
   * modifying the parameters, indicates that the current value should not
   * be changed.
   *
   */
b7058842c   David S. Miller   net: Make setsock...
2750
2751
  static int sctp_setsockopt_rtoinfo(struct sock *sk, char __user *optval, unsigned int optlen)
  {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
  	struct sctp_rtoinfo rtoinfo;
  	struct sctp_association *asoc;
  
  	if (optlen != sizeof (struct sctp_rtoinfo))
  		return -EINVAL;
  
  	if (copy_from_user(&rtoinfo, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, rtoinfo.srto_assoc_id);
  
  	/* Set the values to the specific association */
  	if (!asoc && rtoinfo.srto_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc) {
  		if (rtoinfo.srto_initial != 0)
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2769
  			asoc->rto_initial =
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
  				msecs_to_jiffies(rtoinfo.srto_initial);
  		if (rtoinfo.srto_max != 0)
  			asoc->rto_max = msecs_to_jiffies(rtoinfo.srto_max);
  		if (rtoinfo.srto_min != 0)
  			asoc->rto_min = msecs_to_jiffies(rtoinfo.srto_min);
  	} else {
  		/* If there is no association or the association-id = 0
  		 * set the values to the endpoint.
  		 */
  		struct sctp_sock *sp = sctp_sk(sk);
  
  		if (rtoinfo.srto_initial != 0)
  			sp->rtoinfo.srto_initial = rtoinfo.srto_initial;
  		if (rtoinfo.srto_max != 0)
  			sp->rtoinfo.srto_max = rtoinfo.srto_max;
  		if (rtoinfo.srto_min != 0)
  			sp->rtoinfo.srto_min = rtoinfo.srto_min;
  	}
  
  	return 0;
  }
  
  /*
   *
   * 7.1.2 SCTP_ASSOCINFO
   *
59c51591a   Michael Opdenacker   Fix occurrences o...
2796
   * This option is used to tune the maximum retransmission attempts
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2797
2798
2799
2800
2801
2802
   * of the association.
   * Returns an error if the new association retransmission value is
   * greater than the sum of the retransmission value  of the peer.
   * See [SCTP] for more information.
   *
   */
b7058842c   David S. Miller   net: Make setsock...
2803
  static int sctp_setsockopt_associnfo(struct sock *sk, char __user *optval, unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
  {
  
  	struct sctp_assocparams assocparams;
  	struct sctp_association *asoc;
  
  	if (optlen != sizeof(struct sctp_assocparams))
  		return -EINVAL;
  	if (copy_from_user(&assocparams, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, assocparams.sasoc_assoc_id);
  
  	if (!asoc && assocparams.sasoc_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	/* Set the values to the specific association */
  	if (asoc) {
402d68c43   Vlad Yasevich   [SCTP]: Limit ass...
2821
2822
2823
  		if (assocparams.sasoc_asocmaxrxt != 0) {
  			__u32 path_sum = 0;
  			int   paths = 0;
402d68c43   Vlad Yasevich   [SCTP]: Limit ass...
2824
  			struct sctp_transport *peer_addr;
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
2825
2826
  			list_for_each_entry(peer_addr, &asoc->peer.transport_addr_list,
  					transports) {
402d68c43   Vlad Yasevich   [SCTP]: Limit ass...
2827
2828
2829
  				path_sum += peer_addr->pathmaxrxt;
  				paths++;
  			}
025dfdafe   Frederik Schwarzer   trivial: fix then...
2830
  			/* Only validate asocmaxrxt if we have more than
402d68c43   Vlad Yasevich   [SCTP]: Limit ass...
2831
2832
2833
2834
2835
2836
2837
  			 * one path/transport.  We do this because path
  			 * retransmissions are only counted when we have more
  			 * then one path.
  			 */
  			if (paths > 1 &&
  			    assocparams.sasoc_asocmaxrxt > path_sum)
  				return -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2838
  			asoc->max_retrans = assocparams.sasoc_asocmaxrxt;
402d68c43   Vlad Yasevich   [SCTP]: Limit ass...
2839
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
  		if (assocparams.sasoc_cookie_life != 0) {
  			asoc->cookie_life.tv_sec =
  					assocparams.sasoc_cookie_life / 1000;
  			asoc->cookie_life.tv_usec =
  					(assocparams.sasoc_cookie_life % 1000)
  					* 1000;
  		}
  	} else {
  		/* Set the values to the endpoint */
  		struct sctp_sock *sp = sctp_sk(sk);
  
  		if (assocparams.sasoc_asocmaxrxt != 0)
  			sp->assocparams.sasoc_asocmaxrxt =
  						assocparams.sasoc_asocmaxrxt;
  		if (assocparams.sasoc_cookie_life != 0)
  			sp->assocparams.sasoc_cookie_life =
  						assocparams.sasoc_cookie_life;
  	}
  	return 0;
  }
  
  /*
   * 7.1.16 Set/clear IPv4 mapped addresses (SCTP_I_WANT_MAPPED_V4_ADDR)
   *
   * This socket option is a boolean flag which turns on or off mapped V4
   * addresses.  If this option is turned on and the socket is type
   * PF_INET6, then IPv4 addresses will be mapped to V6 representation.
   * If this option is turned off, then no mapping will be done of V4
   * addresses and a user will receive both PF_INET6 and PF_INET type
   * addresses on the socket.
   */
b7058842c   David S. Miller   net: Make setsock...
2871
  static int sctp_setsockopt_mappedv4(struct sock *sk, char __user *optval, unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
  {
  	int val;
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	if (optlen < sizeof(int))
  		return -EINVAL;
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
  	if (val)
  		sp->v4mapped = 1;
  	else
  		sp->v4mapped = 0;
  
  	return 0;
  }
  
  /*
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2889
2890
2891
   * 8.1.16.  Get or Set the Maximum Fragmentation Size (SCTP_MAXSEG)
   * This option will get or set the maximum size to put in any outgoing
   * SCTP DATA chunk.  If a message is larger than this size it will be
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2892
2893
2894
   * fragmented by SCTP into the specified size.  Note that the underlying
   * SCTP implementation may fragment into smaller sized chunks when the
   * PMTU of the underlying association is smaller than the value set by
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
   * the user.  The default value for this option is '0' which indicates
   * the user is NOT limiting fragmentation and only the PMTU will effect
   * SCTP's choice of DATA chunk size.  Note also that values set larger
   * than the maximum size of an IP datagram will effectively let SCTP
   * control fragmentation (i.e. the same as setting this option to 0).
   *
   * The following structure is used to access and modify this parameter:
   *
   * struct sctp_assoc_value {
   *   sctp_assoc_t assoc_id;
   *   uint32_t assoc_value;
   * };
   *
   * assoc_id:  This parameter is ignored for one-to-one style sockets.
   *    For one-to-many style sockets this parameter indicates which
   *    association the user is performing an action upon.  Note that if
   *    this field's value is zero then the endpoints default value is
   *    changed (effecting future associations only).
   * assoc_value:  This parameter specifies the maximum size in bytes.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2914
   */
b7058842c   David S. Miller   net: Make setsock...
2915
  static int sctp_setsockopt_maxseg(struct sock *sk, char __user *optval, unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2916
  {
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2917
  	struct sctp_assoc_value params;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2918
  	struct sctp_association *asoc;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2919
2920
  	struct sctp_sock *sp = sctp_sk(sk);
  	int val;
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2921
  	if (optlen == sizeof(int)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
2922
2923
2924
2925
  		pr_warn("Use of int in maxseg socket option deprecated
  ");
  		pr_warn("Use struct sctp_assoc_value instead
  ");
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2926
2927
2928
2929
2930
2931
2932
2933
  		if (copy_from_user(&val, optval, optlen))
  			return -EFAULT;
  		params.assoc_id = 0;
  	} else if (optlen == sizeof(struct sctp_assoc_value)) {
  		if (copy_from_user(&params, optval, optlen))
  			return -EFAULT;
  		val = params.assoc_value;
  	} else
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2934
  		return -EINVAL;
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2935

96a339985   Ivan Skytte Jorgensen   [SCTP] Allow SCTP...
2936
  	if ((val != 0) && ((val < 8) || (val > SCTP_MAX_CHUNK_LEN)))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2937
  		return -EINVAL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2938

e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
  	asoc = sctp_id2assoc(sk, params.assoc_id);
  	if (!asoc && params.assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc) {
  		if (val == 0) {
  			val = asoc->pathmtu;
  			val -= sp->pf->af->net_header_len;
  			val -= sizeof(struct sctphdr) +
  					sizeof(struct sctp_data_chunk);
  		}
f68b2e05f   Vlad Yasevich   sctp: Fix SCTP_MA...
2950
2951
  		asoc->user_frag = val;
  		asoc->frag_point = sctp_frag_point(asoc, asoc->pathmtu);
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
2952
2953
  	} else {
  		sp->user_frag = val;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
  	}
  
  	return 0;
  }
  
  
  /*
   *  7.1.9 Set Peer Primary Address (SCTP_SET_PEER_PRIMARY_ADDR)
   *
   *   Requests that the peer mark the enclosed address as the association
   *   primary. The enclosed address must be one of the association's
   *   locally bound addresses. The following structure is used to make a
   *   set primary request:
   */
  static int sctp_setsockopt_peer_primary_addr(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
2969
  					     unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2970
2971
  {
  	struct sctp_sock	*sp;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2972
2973
2974
  	struct sctp_association	*asoc = NULL;
  	struct sctp_setpeerprim	prim;
  	struct sctp_chunk	*chunk;
40a010395   Wei Yongjun   SCTP: Fix SCTP_SE...
2975
  	struct sctp_af		*af;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2976
2977
2978
  	int 			err;
  
  	sp = sctp_sk(sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
  
  	if (!sctp_addip_enable)
  		return -EPERM;
  
  	if (optlen != sizeof(struct sctp_setpeerprim))
  		return -EINVAL;
  
  	if (copy_from_user(&prim, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, prim.sspp_assoc_id);
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
2990
  	if (!asoc)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
  		return -EINVAL;
  
  	if (!asoc->peer.asconf_capable)
  		return -EPERM;
  
  	if (asoc->peer.addip_disabled_mask & SCTP_PARAM_SET_PRIMARY)
  		return -EPERM;
  
  	if (!sctp_state(asoc, ESTABLISHED))
  		return -ENOTCONN;
40a010395   Wei Yongjun   SCTP: Fix SCTP_SE...
3001
3002
3003
3004
3005
3006
  	af = sctp_get_af_specific(prim.sspp_addr.ss_family);
  	if (!af)
  		return -EINVAL;
  
  	if (!af->addr_valid((union sctp_addr *)&prim.sspp_addr, sp, NULL))
  		return -EADDRNOTAVAIL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
  	if (!sctp_assoc_lookup_laddr(asoc, (union sctp_addr *)&prim.sspp_addr))
  		return -EADDRNOTAVAIL;
  
  	/* Create an ASCONF chunk with SET_PRIMARY parameter	*/
  	chunk = sctp_make_asconf_set_prim(asoc,
  					  (union sctp_addr *)&prim.sspp_addr);
  	if (!chunk)
  		return -ENOMEM;
  
  	err = sctp_send_asconf(asoc, chunk);
  
  	SCTP_DEBUG_PRINTK("We set peer primary addr primitively.
  ");
  
  	return err;
  }
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3023
  static int sctp_setsockopt_adaptation_layer(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3024
  					    unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3025
  {
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3026
  	struct sctp_setadaptation adaptation;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3027

0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3028
  	if (optlen != sizeof(struct sctp_setadaptation))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3029
  		return -EINVAL;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3030
  	if (copy_from_user(&adaptation, optval, optlen))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3031
  		return -EFAULT;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3032
  	sctp_sk(sk)->adaptation_ind = adaptation.ssb_adaptation_ind;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3033
3034
3035
  
  	return 0;
  }
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
  /*
   * 7.1.29.  Set or Get the default context (SCTP_CONTEXT)
   *
   * The context field in the sctp_sndrcvinfo structure is normally only
   * used when a failed message is retrieved holding the value that was
   * sent down on the actual send call.  This option allows the setting of
   * a default context on an association basis that will be received on
   * reading messages from the peer.  This is especially helpful in the
   * one-2-many model for an application to keep some reference to an
   * internal state machine that is processing messages on the
   * association.  Note that the setting of this value only effects
   * received messages from the peer and does not effect the value that is
   * saved with outbound messages.
   */
  static int sctp_setsockopt_context(struct sock *sk, char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3051
  				   unsigned int optlen)
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
  {
  	struct sctp_assoc_value params;
  	struct sctp_sock *sp;
  	struct sctp_association *asoc;
  
  	if (optlen != sizeof(struct sctp_assoc_value))
  		return -EINVAL;
  	if (copy_from_user(&params, optval, optlen))
  		return -EFAULT;
  
  	sp = sctp_sk(sk);
  
  	if (params.assoc_id != 0) {
  		asoc = sctp_id2assoc(sk, params.assoc_id);
  		if (!asoc)
  			return -EINVAL;
  		asoc->default_rcv_context = params.assoc_value;
  	} else {
  		sp->default_rcv_context = params.assoc_value;
  	}
  
  	return 0;
  }
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
  /*
   * 7.1.24.  Get or set fragmented interleave (SCTP_FRAGMENT_INTERLEAVE)
   *
   * This options will at a minimum specify if the implementation is doing
   * fragmented interleave.  Fragmented interleave, for a one to many
   * socket, is when subsequent calls to receive a message may return
   * parts of messages from different associations.  Some implementations
   * may allow you to turn this value on or off.  If so, when turned off,
   * no fragment interleave will occur (which will cause a head of line
   * blocking amongst multiple associations sharing the same one to many
   * socket).  When this option is turned on, then each receive call may
   * come from a different association (thus the user must receive data
   * with the extended calls (e.g. sctp_recvmsg) to keep track of which
   * association each receive belongs to.
   *
   * This option takes a boolean value.  A non-zero value indicates that
   * fragmented interleave is on.  A value of zero indicates that
   * fragmented interleave is off.
   *
   * Note that it is important that an implementation that allows this
   * option to be turned on, have it off by default.  Otherwise an unaware
   * application using the one to many model may become confused and act
   * incorrectly.
   */
  static int sctp_setsockopt_fragment_interleave(struct sock *sk,
  					       char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3101
  					       unsigned int optlen)
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
  {
  	int val;
  
  	if (optlen != sizeof(int))
  		return -EINVAL;
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
  
  	sctp_sk(sk)->frag_interleave = (val == 0) ? 0 : 1;
  
  	return 0;
  }
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3114
  /*
8510b937a   Wei Yongjun   sctp: Add validit...
3115
   * 8.1.21.  Set or Get the SCTP Partial Delivery Point
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3116
   *       (SCTP_PARTIAL_DELIVERY_POINT)
8510b937a   Wei Yongjun   sctp: Add validit...
3117
   *
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3118
3119
3120
   * This option will set or get the SCTP partial delivery point.  This
   * point is the size of a message where the partial delivery API will be
   * invoked to help free up rwnd space for the peer.  Setting this to a
8510b937a   Wei Yongjun   sctp: Add validit...
3121
   * lower value will cause partial deliveries to happen more often.  The
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3122
   * calls argument is an integer that sets or gets the partial delivery
8510b937a   Wei Yongjun   sctp: Add validit...
3123
3124
3125
3126
3127
3128
3129
   * point.  Note also that the call will fail if the user attempts to set
   * this value larger than the socket receive buffer size.
   *
   * Note that any single message having a length smaller than or equal to
   * the SCTP partial delivery point will be delivered in one single read
   * call as long as the user provided buffer is large enough to hold the
   * message.
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3130
3131
3132
   */
  static int sctp_setsockopt_partial_delivery_point(struct sock *sk,
  						  char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3133
  						  unsigned int optlen)
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3134
3135
3136
3137
3138
3139
3140
  {
  	u32 val;
  
  	if (optlen != sizeof(u32))
  		return -EINVAL;
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
8510b937a   Wei Yongjun   sctp: Add validit...
3141
3142
3143
3144
3145
  	/* Note: We double the receive buffer from what the user sets
  	 * it to be, also initial rwnd is based on rcvbuf/2.
  	 */
  	if (val > (sk->sk_rcvbuf >> 1))
  		return -EINVAL;
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3146
3147
3148
3149
  	sctp_sk(sk)->pd_point = val;
  
  	return 0; /* is this the right error code? */
  }
703315712   Vlad Yasevich   [SCTP]: Implement...
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
  /*
   * 7.1.28.  Set or Get the maximum burst (SCTP_MAX_BURST)
   *
   * This option will allow a user to change the maximum burst of packets
   * that can be emitted by this association.  Note that the default value
   * is 4, and some implementations may restrict this setting so that it
   * can only be lowered.
   *
   * NOTE: This text doesn't seem right.  Do this on a socket basis with
   * future associations inheriting the socket value.
   */
  static int sctp_setsockopt_maxburst(struct sock *sk,
  				    char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3163
  				    unsigned int optlen)
703315712   Vlad Yasevich   [SCTP]: Implement...
3164
  {
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
3165
3166
3167
  	struct sctp_assoc_value params;
  	struct sctp_sock *sp;
  	struct sctp_association *asoc;
703315712   Vlad Yasevich   [SCTP]: Implement...
3168
  	int val;
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
3169
  	int assoc_id = 0;
703315712   Vlad Yasevich   [SCTP]: Implement...
3170

219b99a9e   Neil Horman   [SCTP]: Bring MAX...
3171
  	if (optlen == sizeof(int)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
3172
3173
3174
3175
  		pr_warn("Use of int in max_burst socket option deprecated
  ");
  		pr_warn("Use struct sctp_assoc_value instead
  ");
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
3176
3177
3178
3179
3180
3181
3182
3183
  		if (copy_from_user(&val, optval, optlen))
  			return -EFAULT;
  	} else if (optlen == sizeof(struct sctp_assoc_value)) {
  		if (copy_from_user(&params, optval, optlen))
  			return -EFAULT;
  		val = params.assoc_value;
  		assoc_id = params.assoc_id;
  	} else
703315712   Vlad Yasevich   [SCTP]: Implement...
3184
  		return -EINVAL;
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
3185
3186
3187
3188
3189
3190
3191
3192
3193
  	sp = sctp_sk(sk);
  
  	if (assoc_id != 0) {
  		asoc = sctp_id2assoc(sk, assoc_id);
  		if (!asoc)
  			return -EINVAL;
  		asoc->max_burst = val;
  	} else
  		sp->max_burst = val;
703315712   Vlad Yasevich   [SCTP]: Implement...
3194
3195
3196
  
  	return 0;
  }
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3197
3198
3199
3200
3201
3202
3203
3204
  /*
   * 7.1.18.  Add a chunk that must be authenticated (SCTP_AUTH_CHUNK)
   *
   * This set option adds a chunk type that the user is requesting to be
   * received only in an authenticated way.  Changes to the list of chunks
   * will only effect future associations on the socket.
   */
  static int sctp_setsockopt_auth_chunk(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
3205
3206
  				      char __user *optval,
  				      unsigned int optlen)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3207
3208
  {
  	struct sctp_authchunk val;
5e739d175   Vlad Yasevich   sctp: fix potenti...
3209
3210
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3211
3212
3213
3214
3215
3216
  	if (optlen != sizeof(struct sctp_authchunk))
  		return -EINVAL;
  	if (copy_from_user(&val, optval, optlen))
  		return -EFAULT;
  
  	switch (val.sauth_chunk) {
7fd71b1e0   Joe Perches   sctp: Reduce swit...
3217
3218
3219
3220
3221
  	case SCTP_CID_INIT:
  	case SCTP_CID_INIT_ACK:
  	case SCTP_CID_SHUTDOWN_COMPLETE:
  	case SCTP_CID_AUTH:
  		return -EINVAL;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
  	}
  
  	/* add this chunk id to the endpoint */
  	return sctp_auth_ep_add_chunkid(sctp_sk(sk)->ep, val.sauth_chunk);
  }
  
  /*
   * 7.1.19.  Get or set the list of supported HMAC Identifiers (SCTP_HMAC_IDENT)
   *
   * This option gets or sets the list of HMAC algorithms that the local
   * endpoint requires the peer to use.
   */
  static int sctp_setsockopt_hmac_ident(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
3235
3236
  				      char __user *optval,
  				      unsigned int optlen)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3237
3238
  {
  	struct sctp_hmacalgo *hmacs;
d97240552   Vlad Yasevich   sctp: fix random ...
3239
  	u32 idents;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3240
  	int err;
5e739d175   Vlad Yasevich   sctp: fix potenti...
3241
3242
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3243
3244
  	if (optlen < sizeof(struct sctp_hmacalgo))
  		return -EINVAL;
934253a7b   Shan Wei   sctp: use memdup_...
3245
3246
3247
  	hmacs= memdup_user(optval, optlen);
  	if (IS_ERR(hmacs))
  		return PTR_ERR(hmacs);
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3248

d97240552   Vlad Yasevich   sctp: fix random ...
3249
3250
3251
  	idents = hmacs->shmac_num_idents;
  	if (idents == 0 || idents > SCTP_AUTH_NUM_HMACS ||
  	    (idents * sizeof(u16)) > (optlen - sizeof(struct sctp_hmacalgo))) {
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
  		err = -EINVAL;
  		goto out;
  	}
  
  	err = sctp_auth_ep_set_hmacs(sctp_sk(sk)->ep, hmacs);
  out:
  	kfree(hmacs);
  	return err;
  }
  
  /*
   * 7.1.20.  Set a shared key (SCTP_AUTH_KEY)
   *
   * This option will set a shared secret key which is used to build an
   * association shared key.
   */
  static int sctp_setsockopt_auth_key(struct sock *sk,
  				    char __user *optval,
b7058842c   David S. Miller   net: Make setsock...
3270
  				    unsigned int optlen)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3271
3272
3273
3274
  {
  	struct sctp_authkey *authkey;
  	struct sctp_association *asoc;
  	int ret;
5e739d175   Vlad Yasevich   sctp: fix potenti...
3275
3276
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3277
3278
  	if (optlen <= sizeof(struct sctp_authkey))
  		return -EINVAL;
934253a7b   Shan Wei   sctp: use memdup_...
3279
3280
3281
  	authkey= memdup_user(optval, optlen);
  	if (IS_ERR(authkey))
  		return PTR_ERR(authkey);
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3282

328fc47ea   Vlad Yasevich   sctp: correct bou...
3283
  	if (authkey->sca_keylength > optlen - sizeof(struct sctp_authkey)) {
30c2235cb   Vlad Yasevich   sctp: add verific...
3284
3285
3286
  		ret = -EINVAL;
  		goto out;
  	}
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
  	asoc = sctp_id2assoc(sk, authkey->sca_assoc_id);
  	if (!asoc && authkey->sca_assoc_id && sctp_style(sk, UDP)) {
  		ret = -EINVAL;
  		goto out;
  	}
  
  	ret = sctp_auth_set_key(sctp_sk(sk)->ep, asoc, authkey);
  out:
  	kfree(authkey);
  	return ret;
  }
  
  /*
   * 7.1.21.  Get or set the active shared key (SCTP_AUTH_ACTIVE_KEY)
   *
   * This option will get or set the active shared key to be used to build
   * the association shared key.
   */
  static int sctp_setsockopt_active_key(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
3306
3307
  				      char __user *optval,
  				      unsigned int optlen)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3308
3309
3310
  {
  	struct sctp_authkeyid val;
  	struct sctp_association *asoc;
5e739d175   Vlad Yasevich   sctp: fix potenti...
3311
3312
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
  	if (optlen != sizeof(struct sctp_authkeyid))
  		return -EINVAL;
  	if (copy_from_user(&val, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, val.scact_assoc_id);
  	if (!asoc && val.scact_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	return sctp_auth_set_active_key(sctp_sk(sk)->ep, asoc,
  					val.scact_keynumber);
  }
  
  /*
   * 7.1.22.  Delete a shared key (SCTP_AUTH_DELETE_KEY)
   *
   * This set option will delete a shared secret key from use.
   */
  static int sctp_setsockopt_del_key(struct sock *sk,
b7058842c   David S. Miller   net: Make setsock...
3332
3333
  				   char __user *optval,
  				   unsigned int optlen)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3334
3335
3336
  {
  	struct sctp_authkeyid val;
  	struct sctp_association *asoc;
5e739d175   Vlad Yasevich   sctp: fix potenti...
3337
3338
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3339
3340
3341
3342
3343
3344
3345
3346
3347
3348
3349
3350
3351
  	if (optlen != sizeof(struct sctp_authkeyid))
  		return -EINVAL;
  	if (copy_from_user(&val, optval, optlen))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, val.scact_assoc_id);
  	if (!asoc && val.scact_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	return sctp_auth_del_key_id(sctp_sk(sk)->ep, asoc,
  				    val.scact_keynumber);
  
  }
7dc04d712   Michio Honda   sctp: Add socket ...
3352
3353
3354
3355
3356
3357
3358
3359
3360
3361
3362
3363
3364
3365
3366
3367
3368
3369
3370
3371
3372
3373
3374
3375
3376
3377
3378
3379
3380
3381
3382
3383
3384
3385
3386
3387
3388
3389
3390
  /*
   * 8.1.23 SCTP_AUTO_ASCONF
   *
   * This option will enable or disable the use of the automatic generation of
   * ASCONF chunks to add and delete addresses to an existing association.  Note
   * that this option has two caveats namely: a) it only affects sockets that
   * are bound to all addresses available to the SCTP stack, and b) the system
   * administrator may have an overriding control that turns the ASCONF feature
   * off no matter what setting the socket option may have.
   * This option expects an integer boolean flag, where a non-zero value turns on
   * the option, and a zero value turns off the option.
   * Note. In this implementation, socket operation overrides default parameter
   * being set by sysctl as well as FreeBSD implementation
   */
  static int sctp_setsockopt_auto_asconf(struct sock *sk, char __user *optval,
  					unsigned int optlen)
  {
  	int val;
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	if (optlen < sizeof(int))
  		return -EINVAL;
  	if (get_user(val, (int __user *)optval))
  		return -EFAULT;
  	if (!sctp_is_ep_boundall(sk) && val)
  		return -EINVAL;
  	if ((val && sp->do_auto_asconf) || (!val && !sp->do_auto_asconf))
  		return 0;
  
  	if (val == 0 && sp->do_auto_asconf) {
  		list_del(&sp->auto_asconf_list);
  		sp->do_auto_asconf = 0;
  	} else if (val && !sp->do_auto_asconf) {
  		list_add_tail(&sp->auto_asconf_list,
  		    &sctp_auto_asconf_splist);
  		sp->do_auto_asconf = 1;
  	}
  	return 0;
  }
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3391

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3392
3393
3394
3395
3396
3397
3398
3399
3400
3401
3402
3403
3404
3405
3406
3407
3408
3409
3410
3411
  /* API 6.2 setsockopt(), getsockopt()
   *
   * Applications use setsockopt() and getsockopt() to set or retrieve
   * socket options.  Socket options are used to change the default
   * behavior of sockets calls.  They are described in Section 7.
   *
   * The syntax is:
   *
   *   ret = getsockopt(int sd, int level, int optname, void __user *optval,
   *                    int __user *optlen);
   *   ret = setsockopt(int sd, int level, int optname, const void __user *optval,
   *                    int optlen);
   *
   *   sd      - the socket descript.
   *   level   - set to IPPROTO_SCTP for all SCTP options.
   *   optname - the option name.
   *   optval  - the buffer to store the value of the option.
   *   optlen  - the size of the buffer.
   */
  SCTP_STATIC int sctp_setsockopt(struct sock *sk, int level, int optname,
b7058842c   David S. Miller   net: Make setsock...
3412
  				char __user *optval, unsigned int optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3413
3414
3415
3416
3417
3418
3419
3420
3421
3422
3423
3424
3425
3426
3427
3428
3429
3430
3431
3432
3433
3434
3435
3436
3437
3438
3439
3440
3441
3442
3443
3444
3445
  {
  	int retval = 0;
  
  	SCTP_DEBUG_PRINTK("sctp_setsockopt(sk: %p... optname: %d)
  ",
  			  sk, optname);
  
  	/* I can hardly begin to describe how wrong this is.  This is
  	 * so broken as to be worse than useless.  The API draft
  	 * REALLY is NOT helpful here...  I am not convinced that the
  	 * semantics of setsockopt() with a level OTHER THAN SOL_SCTP
  	 * are at all well-founded.
  	 */
  	if (level != SOL_SCTP) {
  		struct sctp_af *af = sctp_sk(sk)->pf->af;
  		retval = af->setsockopt(sk, level, optname, optval, optlen);
  		goto out_nounlock;
  	}
  
  	sctp_lock_sock(sk);
  
  	switch (optname) {
  	case SCTP_SOCKOPT_BINDX_ADD:
  		/* 'optlen' is the size of the addresses buffer. */
  		retval = sctp_setsockopt_bindx(sk, (struct sockaddr __user *)optval,
  					       optlen, SCTP_BINDX_ADD_ADDR);
  		break;
  
  	case SCTP_SOCKOPT_BINDX_REM:
  		/* 'optlen' is the size of the addresses buffer. */
  		retval = sctp_setsockopt_bindx(sk, (struct sockaddr __user *)optval,
  					       optlen, SCTP_BINDX_REM_ADDR);
  		break;
88a0a948e   Vlad Yasevich   sctp: Support the...
3446
3447
3448
3449
3450
3451
  	case SCTP_SOCKOPT_CONNECTX_OLD:
  		/* 'optlen' is the size of the addresses buffer. */
  		retval = sctp_setsockopt_connectx_old(sk,
  					    (struct sockaddr __user *)optval,
  					    optlen);
  		break;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3452
3453
  	case SCTP_SOCKOPT_CONNECTX:
  		/* 'optlen' is the size of the addresses buffer. */
88a0a948e   Vlad Yasevich   sctp: Support the...
3454
3455
3456
  		retval = sctp_setsockopt_connectx(sk,
  					    (struct sockaddr __user *)optval,
  					    optlen);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3457
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3458
3459
3460
3461
3462
3463
3464
3465
3466
3467
3468
3469
3470
3471
3472
  	case SCTP_DISABLE_FRAGMENTS:
  		retval = sctp_setsockopt_disable_fragments(sk, optval, optlen);
  		break;
  
  	case SCTP_EVENTS:
  		retval = sctp_setsockopt_events(sk, optval, optlen);
  		break;
  
  	case SCTP_AUTOCLOSE:
  		retval = sctp_setsockopt_autoclose(sk, optval, optlen);
  		break;
  
  	case SCTP_PEER_ADDR_PARAMS:
  		retval = sctp_setsockopt_peer_addr_params(sk, optval, optlen);
  		break;
4580ccc04   Shan Wei   sctp: user perfec...
3473
  	case SCTP_DELAYED_SACK:
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
3474
  		retval = sctp_setsockopt_delayed_ack(sk, optval, optlen);
7708610b1   Frank Filz   [SCTP]: Add suppo...
3475
  		break;
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
3476
3477
3478
  	case SCTP_PARTIAL_DELIVERY_POINT:
  		retval = sctp_setsockopt_partial_delivery_point(sk, optval, optlen);
  		break;
7708610b1   Frank Filz   [SCTP]: Add suppo...
3479

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3480
3481
3482
3483
3484
3485
3486
3487
3488
3489
3490
3491
3492
3493
3494
3495
3496
3497
3498
3499
3500
3501
3502
3503
3504
3505
3506
3507
  	case SCTP_INITMSG:
  		retval = sctp_setsockopt_initmsg(sk, optval, optlen);
  		break;
  	case SCTP_DEFAULT_SEND_PARAM:
  		retval = sctp_setsockopt_default_send_param(sk, optval,
  							    optlen);
  		break;
  	case SCTP_PRIMARY_ADDR:
  		retval = sctp_setsockopt_primary_addr(sk, optval, optlen);
  		break;
  	case SCTP_SET_PEER_PRIMARY_ADDR:
  		retval = sctp_setsockopt_peer_primary_addr(sk, optval, optlen);
  		break;
  	case SCTP_NODELAY:
  		retval = sctp_setsockopt_nodelay(sk, optval, optlen);
  		break;
  	case SCTP_RTOINFO:
  		retval = sctp_setsockopt_rtoinfo(sk, optval, optlen);
  		break;
  	case SCTP_ASSOCINFO:
  		retval = sctp_setsockopt_associnfo(sk, optval, optlen);
  		break;
  	case SCTP_I_WANT_MAPPED_V4_ADDR:
  		retval = sctp_setsockopt_mappedv4(sk, optval, optlen);
  		break;
  	case SCTP_MAXSEG:
  		retval = sctp_setsockopt_maxseg(sk, optval, optlen);
  		break;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3508
3509
  	case SCTP_ADAPTATION_LAYER:
  		retval = sctp_setsockopt_adaptation_layer(sk, optval, optlen);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3510
  		break;
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
3511
3512
3513
  	case SCTP_CONTEXT:
  		retval = sctp_setsockopt_context(sk, optval, optlen);
  		break;
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
3514
3515
3516
  	case SCTP_FRAGMENT_INTERLEAVE:
  		retval = sctp_setsockopt_fragment_interleave(sk, optval, optlen);
  		break;
703315712   Vlad Yasevich   [SCTP]: Implement...
3517
3518
3519
  	case SCTP_MAX_BURST:
  		retval = sctp_setsockopt_maxburst(sk, optval, optlen);
  		break;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
3520
3521
3522
3523
3524
3525
3526
3527
3528
3529
3530
3531
3532
3533
3534
  	case SCTP_AUTH_CHUNK:
  		retval = sctp_setsockopt_auth_chunk(sk, optval, optlen);
  		break;
  	case SCTP_HMAC_IDENT:
  		retval = sctp_setsockopt_hmac_ident(sk, optval, optlen);
  		break;
  	case SCTP_AUTH_KEY:
  		retval = sctp_setsockopt_auth_key(sk, optval, optlen);
  		break;
  	case SCTP_AUTH_ACTIVE_KEY:
  		retval = sctp_setsockopt_active_key(sk, optval, optlen);
  		break;
  	case SCTP_AUTH_DELETE_KEY:
  		retval = sctp_setsockopt_del_key(sk, optval, optlen);
  		break;
7dc04d712   Michio Honda   sctp: Add socket ...
3535
3536
3537
  	case SCTP_AUTO_ASCONF:
  		retval = sctp_setsockopt_auto_asconf(sk, optval, optlen);
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3538
3539
3540
  	default:
  		retval = -ENOPROTOOPT;
  		break;
3ff50b799   Stephen Hemminger   [NET]: cleanup ex...
3541
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3542
3543
3544
3545
3546
3547
3548
3549
3550
3551
3552
3553
3554
3555
3556
3557
3558
3559
3560
3561
3562
3563
3564
  
  	sctp_release_sock(sk);
  
  out_nounlock:
  	return retval;
  }
  
  /* API 3.1.6 connect() - UDP Style Syntax
   *
   * An application may use the connect() call in the UDP model to initiate an
   * association without sending data.
   *
   * The syntax is:
   *
   * ret = connect(int sd, const struct sockaddr *nam, socklen_t len);
   *
   * sd: the socket descriptor to have a new association added to.
   *
   * nam: the address structure (either struct sockaddr_in or struct
   *    sockaddr_in6 defined in RFC2553 [7]).
   *
   * len: the size of the address.
   */
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3565
  SCTP_STATIC int sctp_connect(struct sock *sk, struct sockaddr *addr,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3566
3567
  			     int addr_len)
  {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3568
  	int err = 0;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3569
  	struct sctp_af *af;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3570
3571
  
  	sctp_lock_sock(sk);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3572
3573
  	SCTP_DEBUG_PRINTK("%s - sk: %p, sockaddr: %p, addr_len: %d
  ",
0dc47877a   Harvey Harrison   net: replace rema...
3574
  			  __func__, sk, addr, addr_len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3575

3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3576
3577
3578
3579
3580
3581
3582
3583
  	/* Validate addr_len before calling common connect/connectx routine. */
  	af = sctp_get_af_specific(addr->sa_family);
  	if (!af || addr_len < af->sockaddr_len) {
  		err = -EINVAL;
  	} else {
  		/* Pass correct addr len to common routine (so it knows there
  		 * is only one address being passed.
  		 */
88a0a948e   Vlad Yasevich   sctp: Support the...
3584
  		err = __sctp_connect(sk, addr, af->sockaddr_len, NULL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3585
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3586
  	sctp_release_sock(sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3587
3588
3589
3590
3591
3592
3593
3594
3595
3596
3597
3598
3599
3600
3601
3602
3603
3604
3605
3606
3607
3608
3609
3610
3611
3612
3613
3614
3615
3616
3617
3618
3619
3620
3621
3622
3623
3624
3625
  	return err;
  }
  
  /* FIXME: Write comments. */
  SCTP_STATIC int sctp_disconnect(struct sock *sk, int flags)
  {
  	return -EOPNOTSUPP; /* STUB */
  }
  
  /* 4.1.4 accept() - TCP Style Syntax
   *
   * Applications use accept() call to remove an established SCTP
   * association from the accept queue of the endpoint.  A new socket
   * descriptor will be returned from accept() to represent the newly
   * formed association.
   */
  SCTP_STATIC struct sock *sctp_accept(struct sock *sk, int flags, int *err)
  {
  	struct sctp_sock *sp;
  	struct sctp_endpoint *ep;
  	struct sock *newsk = NULL;
  	struct sctp_association *asoc;
  	long timeo;
  	int error = 0;
  
  	sctp_lock_sock(sk);
  
  	sp = sctp_sk(sk);
  	ep = sp->ep;
  
  	if (!sctp_style(sk, TCP)) {
  		error = -EOPNOTSUPP;
  		goto out;
  	}
  
  	if (!sctp_sstate(sk, LISTENING)) {
  		error = -EINVAL;
  		goto out;
  	}
8abfedd88   Sridhar Samudrala   [SCTP]: Use the f...
3626
  	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3627
3628
3629
3630
3631
3632
3633
3634
3635
3636
3637
3638
3639
3640
3641
3642
3643
3644
3645
3646
3647
3648
3649
  
  	error = sctp_wait_for_accept(sk, timeo);
  	if (error)
  		goto out;
  
  	/* We treat the list of associations on the endpoint as the accept
  	 * queue and pick the first association on the list.
  	 */
  	asoc = list_entry(ep->asocs.next, struct sctp_association, asocs);
  
  	newsk = sp->pf->create_accept_sk(sk, asoc);
  	if (!newsk) {
  		error = -ENOMEM;
  		goto out;
  	}
  
  	/* Populate the fields of the newsk from the oldsk and migrate the
  	 * asoc to the newsk.
  	 */
  	sctp_sock_migrate(sk, newsk, asoc, SCTP_SOCKET_TCP);
  
  out:
  	sctp_release_sock(sk);
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
3650
  	*err = error;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3651
3652
3653
3654
3655
3656
  	return newsk;
  }
  
  /* The SCTP ioctl handler. */
  SCTP_STATIC int sctp_ioctl(struct sock *sk, int cmd, unsigned long arg)
  {
65040c33e   Diego Elio 'Flameeyes' Pettenò   sctp: implement S...
3657
3658
3659
3660
3661
3662
3663
3664
3665
3666
3667
3668
3669
3670
3671
3672
3673
3674
3675
3676
3677
3678
3679
3680
3681
  	int rc = -ENOTCONN;
  
  	sctp_lock_sock(sk);
  
  	/*
  	 * SEQPACKET-style sockets in LISTENING state are valid, for
  	 * SCTP, so only discard TCP-style sockets in LISTENING state.
  	 */
  	if (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING))
  		goto out;
  
  	switch (cmd) {
  	case SIOCINQ: {
  		struct sk_buff *skb;
  		unsigned int amount = 0;
  
  		skb = skb_peek(&sk->sk_receive_queue);
  		if (skb != NULL) {
  			/*
  			 * We will only return the amount of this packet since
  			 * that is all that will be read.
  			 */
  			amount = skb->len;
  		}
  		rc = put_user(amount, (int __user *)arg);
65040c33e   Diego Elio 'Flameeyes' Pettenò   sctp: implement S...
3682
  		break;
9a7241c21   David S. Miller   sctp: Fix break i...
3683
  	}
65040c33e   Diego Elio 'Flameeyes' Pettenò   sctp: implement S...
3684
3685
3686
3687
3688
3689
3690
  	default:
  		rc = -ENOIOCTLCMD;
  		break;
  	}
  out:
  	sctp_release_sock(sk);
  	return rc;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3691
3692
3693
3694
3695
3696
3697
3698
3699
3700
3701
3702
3703
3704
3705
3706
3707
3708
3709
3710
3711
3712
3713
3714
3715
3716
3717
3718
3719
3720
3721
3722
3723
3724
3725
3726
  }
  
  /* This is the function which gets called during socket creation to
   * initialized the SCTP-specific portion of the sock.
   * The sock structure should already be zero-filled memory.
   */
  SCTP_STATIC int sctp_init_sock(struct sock *sk)
  {
  	struct sctp_endpoint *ep;
  	struct sctp_sock *sp;
  
  	SCTP_DEBUG_PRINTK("sctp_init_sock(sk: %p)
  ", sk);
  
  	sp = sctp_sk(sk);
  
  	/* Initialize the SCTP per socket area.  */
  	switch (sk->sk_type) {
  	case SOCK_SEQPACKET:
  		sp->type = SCTP_SOCKET_UDP;
  		break;
  	case SOCK_STREAM:
  		sp->type = SCTP_SOCKET_TCP;
  		break;
  	default:
  		return -ESOCKTNOSUPPORT;
  	}
  
  	/* Initialize default send parameters. These parameters can be
  	 * modified with the SCTP_DEFAULT_SEND_PARAM socket option.
  	 */
  	sp->default_stream = 0;
  	sp->default_ppid = 0;
  	sp->default_flags = 0;
  	sp->default_context = 0;
  	sp->default_timetolive = 0;
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
3727
  	sp->default_rcv_context = 0;
703315712   Vlad Yasevich   [SCTP]: Implement...
3728
  	sp->max_burst = sctp_max_burst;
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
3729

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3730
3731
3732
3733
3734
3735
3736
  	/* Initialize default setup parameters. These parameters
  	 * can be modified with the SCTP_INITMSG socket option or
  	 * overridden by the SCTP_INIT CMSG.
  	 */
  	sp->initmsg.sinit_num_ostreams   = sctp_max_outstreams;
  	sp->initmsg.sinit_max_instreams  = sctp_max_instreams;
  	sp->initmsg.sinit_max_attempts   = sctp_max_retrans_init;
3fd091e73   Vladislav Yasevich   [SCTP]: Remove mu...
3737
  	sp->initmsg.sinit_max_init_timeo = sctp_rto_max;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3738
3739
3740
3741
  
  	/* Initialize default RTO related parameters.  These parameters can
  	 * be modified for with the SCTP_RTOINFO socket option.
  	 */
3fd091e73   Vladislav Yasevich   [SCTP]: Remove mu...
3742
3743
3744
  	sp->rtoinfo.srto_initial = sctp_rto_initial;
  	sp->rtoinfo.srto_max     = sctp_rto_max;
  	sp->rtoinfo.srto_min     = sctp_rto_min;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3745
3746
3747
3748
3749
3750
3751
3752
  
  	/* Initialize default association related parameters. These parameters
  	 * can be modified with the SCTP_ASSOCINFO socket option.
  	 */
  	sp->assocparams.sasoc_asocmaxrxt = sctp_max_retrans_association;
  	sp->assocparams.sasoc_number_peer_destinations = 0;
  	sp->assocparams.sasoc_peer_rwnd = 0;
  	sp->assocparams.sasoc_local_rwnd = 0;
3fd091e73   Vladislav Yasevich   [SCTP]: Remove mu...
3753
  	sp->assocparams.sasoc_cookie_life = sctp_valid_cookie_life;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3754
3755
  
  	/* Initialize default event subscriptions. By default, all the
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
3756
  	 * options are off.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3757
3758
3759
3760
3761
3762
  	 */
  	memset(&sp->subscribe, 0, sizeof(struct sctp_event_subscribe));
  
  	/* Default Peer Address Parameters.  These defaults can
  	 * be modified via SCTP_PEER_ADDR_PARAMS
  	 */
3fd091e73   Vladislav Yasevich   [SCTP]: Remove mu...
3763
  	sp->hbinterval  = sctp_hb_interval;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
3764
3765
  	sp->pathmaxrxt  = sctp_max_retrans_path;
  	sp->pathmtu     = 0; // allow default discovery
3fd091e73   Vladislav Yasevich   [SCTP]: Remove mu...
3766
  	sp->sackdelay   = sctp_sack_timeout;
7bfe8bdb8   Vlad Yasevich   sctp: Fix problem...
3767
  	sp->sackfreq	= 2;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
3768
  	sp->param_flags = SPP_HB_ENABLE |
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
3769
3770
  			  SPP_PMTUD_ENABLE |
  			  SPP_SACKDELAY_ENABLE;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3771
3772
3773
3774
3775
  
  	/* If enabled no SCTP message fragmentation will be performed.
  	 * Configure through SCTP_DISABLE_FRAGMENTS socket option.
  	 */
  	sp->disable_fragments = 0;
208edef6a   Sridhar Samudrala   [SCTP]: Enable Na...
3776
3777
  	/* Enable Nagle algorithm by default.  */
  	sp->nodelay           = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3778
3779
3780
3781
3782
3783
3784
3785
3786
3787
3788
3789
3790
  
  	/* Enable by default. */
  	sp->v4mapped          = 1;
  
  	/* Auto-close idle associations after the configured
  	 * number of seconds.  A value of 0 disables this
  	 * feature.  Configure through the SCTP_AUTOCLOSE socket option,
  	 * for UDP-style sockets only.
  	 */
  	sp->autoclose         = 0;
  
  	/* User specified fragmentation limit. */
  	sp->user_frag         = 0;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
3791
  	sp->adaptation_ind = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3792
3793
3794
3795
  
  	sp->pf = sctp_get_pf_specific(sk->sk_family);
  
  	/* Control variables for partial data delivery. */
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
3796
  	atomic_set(&sp->pd_mode, 0);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3797
  	skb_queue_head_init(&sp->pd_lobby);
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
3798
  	sp->frag_interleave = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3799
3800
3801
3802
3803
3804
3805
3806
3807
3808
3809
3810
3811
  
  	/* Create a per socket endpoint structure.  Even if we
  	 * change the data structure relationships, this may still
  	 * be useful for storing pre-connect address information.
  	 */
  	ep = sctp_endpoint_new(sk, GFP_KERNEL);
  	if (!ep)
  		return -ENOMEM;
  
  	sp->ep = ep;
  	sp->hmac = NULL;
  
  	SCTP_DBG_OBJCNT_INC(sock);
6f756a8c3   David S. Miller   net: Make sure BH...
3812
3813
  
  	local_bh_disable();
81419d862   Vlad Yasevich   sctp: per_cpu var...
3814
  	percpu_counter_inc(&sctp_sockets_allocated);
9a57f7fab   Eric Dumazet   net: sctp should ...
3815
  	sock_prot_inuse_add(sock_net(sk), sk->sk_prot, 1);
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
3816
3817
3818
3819
3820
3821
  	if (sctp_default_auto_asconf) {
  		list_add_tail(&sp->auto_asconf_list,
  		    &sctp_auto_asconf_splist);
  		sp->do_auto_asconf = 1;
  	} else
  		sp->do_auto_asconf = 0;
6f756a8c3   David S. Miller   net: Make sure BH...
3822
  	local_bh_enable();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3823
3824
3825
3826
  	return 0;
  }
  
  /* Cleanup any SCTP per socket resources.  */
7d06b2e05   Brian Haley   net: change proto...
3827
  SCTP_STATIC void sctp_destroy_sock(struct sock *sk)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3828
  {
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
3829
  	struct sctp_sock *sp;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3830
3831
3832
3833
3834
  
  	SCTP_DEBUG_PRINTK("sctp_destroy_sock(sk: %p)
  ", sk);
  
  	/* Release our hold on the endpoint. */
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
3835
3836
3837
3838
3839
3840
  	sp = sctp_sk(sk);
  	if (sp->do_auto_asconf) {
  		sp->do_auto_asconf = 0;
  		list_del(&sp->auto_asconf_list);
  	}
  	sctp_endpoint_free(sp->ep);
5bc0b3bfa   Eric Dumazet   net: Make sure BH...
3841
  	local_bh_disable();
81419d862   Vlad Yasevich   sctp: per_cpu var...
3842
  	percpu_counter_dec(&sctp_sockets_allocated);
9a57f7fab   Eric Dumazet   net: sctp should ...
3843
  	sock_prot_inuse_add(sock_net(sk), sk->sk_prot, -1);
5bc0b3bfa   Eric Dumazet   net: Make sure BH...
3844
  	local_bh_enable();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3845
3846
3847
3848
3849
3850
3851
3852
3853
3854
3855
3856
3857
3858
3859
3860
3861
3862
3863
3864
3865
3866
3867
3868
3869
3870
3871
3872
3873
3874
3875
3876
3877
3878
3879
3880
3881
3882
3883
3884
3885
3886
3887
3888
3889
3890
3891
3892
3893
3894
3895
3896
  }
  
  /* API 4.1.7 shutdown() - TCP Style Syntax
   *     int shutdown(int socket, int how);
   *
   *     sd      - the socket descriptor of the association to be closed.
   *     how     - Specifies the type of shutdown.  The  values  are
   *               as follows:
   *               SHUT_RD
   *                     Disables further receive operations. No SCTP
   *                     protocol action is taken.
   *               SHUT_WR
   *                     Disables further send operations, and initiates
   *                     the SCTP shutdown sequence.
   *               SHUT_RDWR
   *                     Disables further send  and  receive  operations
   *                     and initiates the SCTP shutdown sequence.
   */
  SCTP_STATIC void sctp_shutdown(struct sock *sk, int how)
  {
  	struct sctp_endpoint *ep;
  	struct sctp_association *asoc;
  
  	if (!sctp_style(sk, TCP))
  		return;
  
  	if (how & SEND_SHUTDOWN) {
  		ep = sctp_sk(sk)->ep;
  		if (!list_empty(&ep->asocs)) {
  			asoc = list_entry(ep->asocs.next,
  					  struct sctp_association, asocs);
  			sctp_primitive_SHUTDOWN(asoc, NULL);
  		}
  	}
  }
  
  /* 7.2.1 Association Status (SCTP_STATUS)
  
   * Applications can retrieve current status information about an
   * association, including association state, peer receiver window size,
   * number of unacked data chunks, and number of data chunks pending
   * receipt.  This information is read-only.
   */
  static int sctp_getsockopt_sctp_status(struct sock *sk, int len,
  				       char __user *optval,
  				       int __user *optlen)
  {
  	struct sctp_status status;
  	struct sctp_association *asoc = NULL;
  	struct sctp_transport *transport;
  	sctp_assoc_t associd;
  	int retval = 0;
408f22e81   Neil Horman   SCTP: update sctp...
3897
  	if (len < sizeof(status)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3898
3899
3900
  		retval = -EINVAL;
  		goto out;
  	}
408f22e81   Neil Horman   SCTP: update sctp...
3901
3902
  	len = sizeof(status);
  	if (copy_from_user(&status, optval, len)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3903
3904
3905
3906
3907
3908
3909
3910
3911
3912
3913
3914
3915
3916
3917
3918
3919
3920
3921
3922
3923
3924
3925
  		retval = -EFAULT;
  		goto out;
  	}
  
  	associd = status.sstat_assoc_id;
  	asoc = sctp_id2assoc(sk, associd);
  	if (!asoc) {
  		retval = -EINVAL;
  		goto out;
  	}
  
  	transport = asoc->peer.primary_path;
  
  	status.sstat_assoc_id = sctp_assoc2id(asoc);
  	status.sstat_state = asoc->state;
  	status.sstat_rwnd =  asoc->peer.rwnd;
  	status.sstat_unackdata = asoc->unack_data;
  
  	status.sstat_penddata = sctp_tsnmap_pending(&asoc->peer.tsn_map);
  	status.sstat_instrms = asoc->c.sinit_max_instreams;
  	status.sstat_outstrms = asoc->c.sinit_num_ostreams;
  	status.sstat_fragmentation_point = asoc->frag_point;
  	status.sstat_primary.spinfo_assoc_id = sctp_assoc2id(transport->asoc);
8cec6b806   Al Viro   [SCTP]: We need t...
3926
3927
  	memcpy(&status.sstat_primary.spinfo_address, &transport->ipaddr,
  			transport->af_specific->sockaddr_len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3928
3929
3930
  	/* Map ipv4 address into v4-mapped-on-v6 address.  */
  	sctp_get_pf_specific(sk->sk_family)->addr_v4map(sctp_sk(sk),
  		(union sctp_addr *)&status.sstat_primary.spinfo_address);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3931
  	status.sstat_primary.spinfo_state = transport->state;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3932
3933
3934
  	status.sstat_primary.spinfo_cwnd = transport->cwnd;
  	status.sstat_primary.spinfo_srtt = transport->srtt;
  	status.sstat_primary.spinfo_rto = jiffies_to_msecs(transport->rto);
52ccb8e90   Frank Filz   [SCTP]: Update SC...
3935
  	status.sstat_primary.spinfo_mtu = transport->pathmtu;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3936

3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3937
3938
  	if (status.sstat_primary.spinfo_state == SCTP_UNKNOWN)
  		status.sstat_primary.spinfo_state = SCTP_ACTIVE;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3939
3940
3941
3942
3943
3944
3945
3946
3947
3948
3949
3950
3951
3952
3953
3954
  	if (put_user(len, optlen)) {
  		retval = -EFAULT;
  		goto out;
  	}
  
  	SCTP_DEBUG_PRINTK("sctp_getsockopt_sctp_status(%d): %d %d %d
  ",
  			  len, status.sstat_state, status.sstat_rwnd,
  			  status.sstat_assoc_id);
  
  	if (copy_to_user(optval, &status, len)) {
  		retval = -EFAULT;
  		goto out;
  	}
  
  out:
a02cec215   Eric Dumazet   net: return opera...
3955
  	return retval;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3956
3957
3958
3959
3960
3961
3962
3963
3964
3965
3966
3967
3968
3969
3970
3971
3972
  }
  
  
  /* 7.2.2 Peer Address Information (SCTP_GET_PEER_ADDR_INFO)
   *
   * Applications can retrieve information about a specific peer address
   * of an association, including its reachability state, congestion
   * window, and retransmission timer values.  This information is
   * read-only.
   */
  static int sctp_getsockopt_peer_addr_info(struct sock *sk, int len,
  					  char __user *optval,
  					  int __user *optlen)
  {
  	struct sctp_paddrinfo pinfo;
  	struct sctp_transport *transport;
  	int retval = 0;
408f22e81   Neil Horman   SCTP: update sctp...
3973
  	if (len < sizeof(pinfo)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3974
3975
3976
  		retval = -EINVAL;
  		goto out;
  	}
408f22e81   Neil Horman   SCTP: update sctp...
3977
3978
  	len = sizeof(pinfo);
  	if (copy_from_user(&pinfo, optval, len)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3979
3980
3981
3982
3983
3984
3985
3986
3987
3988
  		retval = -EFAULT;
  		goto out;
  	}
  
  	transport = sctp_addr_id2transport(sk, &pinfo.spinfo_address,
  					   pinfo.spinfo_assoc_id);
  	if (!transport)
  		return -EINVAL;
  
  	pinfo.spinfo_assoc_id = sctp_assoc2id(transport->asoc);
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3989
  	pinfo.spinfo_state = transport->state;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3990
3991
3992
  	pinfo.spinfo_cwnd = transport->cwnd;
  	pinfo.spinfo_srtt = transport->srtt;
  	pinfo.spinfo_rto = jiffies_to_msecs(transport->rto);
52ccb8e90   Frank Filz   [SCTP]: Update SC...
3993
  	pinfo.spinfo_mtu = transport->pathmtu;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3994

3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
3995
3996
  	if (pinfo.spinfo_state == SCTP_UNKNOWN)
  		pinfo.spinfo_state = SCTP_ACTIVE;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
3997
3998
3999
4000
4001
4002
4003
4004
4005
4006
4007
  	if (put_user(len, optlen)) {
  		retval = -EFAULT;
  		goto out;
  	}
  
  	if (copy_to_user(optval, &pinfo, len)) {
  		retval = -EFAULT;
  		goto out;
  	}
  
  out:
a02cec215   Eric Dumazet   net: return opera...
4008
  	return retval;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4009
4010
4011
4012
4013
4014
4015
4016
4017
4018
4019
4020
4021
4022
4023
4024
4025
4026
4027
4028
4029
4030
4031
4032
4033
4034
4035
4036
4037
4038
4039
4040
4041
4042
  }
  
  /* 7.1.12 Enable/Disable message fragmentation (SCTP_DISABLE_FRAGMENTS)
   *
   * This option is a on/off flag.  If enabled no SCTP message
   * fragmentation will be performed.  Instead if a message being sent
   * exceeds the current PMTU size, the message will NOT be sent and
   * instead a error will be indicated to the user.
   */
  static int sctp_getsockopt_disable_fragments(struct sock *sk, int len,
  					char __user *optval, int __user *optlen)
  {
  	int val;
  
  	if (len < sizeof(int))
  		return -EINVAL;
  
  	len = sizeof(int);
  	val = (sctp_sk(sk)->disable_fragments == 1);
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  	return 0;
  }
  
  /* 7.1.15 Set notification and ancillary events (SCTP_EVENTS)
   *
   * This socket option is used to specify various notifications and
   * ancillary data the user wishes to receive.
   */
  static int sctp_getsockopt_events(struct sock *sk, int len, char __user *optval,
  				  int __user *optlen)
  {
408f22e81   Neil Horman   SCTP: update sctp...
4043
  	if (len < sizeof(struct sctp_event_subscribe))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4044
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4045
4046
4047
  	len = sizeof(struct sctp_event_subscribe);
  	if (put_user(len, optlen))
  		return -EFAULT;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4048
4049
4050
4051
4052
4053
4054
4055
4056
4057
4058
4059
4060
4061
4062
4063
4064
4065
4066
4067
4068
  	if (copy_to_user(optval, &sctp_sk(sk)->subscribe, len))
  		return -EFAULT;
  	return 0;
  }
  
  /* 7.1.8 Automatic Close of associations (SCTP_AUTOCLOSE)
   *
   * This socket option is applicable to the UDP-style socket only.  When
   * set it will cause associations that are idle for more than the
   * specified number of seconds to automatically close.  An association
   * being idle is defined an association that has NOT sent or received
   * user data.  The special value of '0' indicates that no automatic
   * close of any associations should be performed.  The option expects an
   * integer defining the number of seconds of idle time before an
   * association is closed.
   */
  static int sctp_getsockopt_autoclose(struct sock *sk, int len, char __user *optval, int __user *optlen)
  {
  	/* Applicable to UDP-style socket only */
  	if (sctp_style(sk, TCP))
  		return -EOPNOTSUPP;
408f22e81   Neil Horman   SCTP: update sctp...
4069
  	if (len < sizeof(int))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4070
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4071
4072
4073
4074
  	len = sizeof(int);
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &sctp_sk(sk)->autoclose, sizeof(int)))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4075
4076
4077
4078
4079
4080
4081
4082
4083
4084
  		return -EFAULT;
  	return 0;
  }
  
  /* Helper routine to branch off an association to a new socket.  */
  SCTP_STATIC int sctp_do_peeloff(struct sctp_association *asoc,
  				struct socket **sockp)
  {
  	struct sock *sk = asoc->base.sk;
  	struct socket *sock;
d570ee490   Vlad Yasevich   [SCTP]: Correctly...
4085
  	struct sctp_af *af;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4086
4087
4088
4089
4090
4091
4092
4093
4094
4095
4096
4097
  	int err = 0;
  
  	/* An association cannot be branched off from an already peeled-off
  	 * socket, nor is this supported for tcp style sockets.
  	 */
  	if (!sctp_style(sk, UDP))
  		return -EINVAL;
  
  	/* Create a new socket.  */
  	err = sock_create(sk->sk_family, SOCK_SEQPACKET, IPPROTO_SCTP, &sock);
  	if (err < 0)
  		return err;
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
4098
  	sctp_copy_sock(sock->sk, sk, asoc);
4f4443088   Vlad Yasevich   [SCTP]: Correctly...
4099
4100
4101
4102
  
  	/* Make peeled-off sockets more like 1-1 accepted sockets.
  	 * Set the daddr and initialize id to something more random
  	 */
d570ee490   Vlad Yasevich   [SCTP]: Correctly...
4103
4104
  	af = sctp_get_af_specific(asoc->peer.primary_addr.sa.sa_family);
  	af->to_sk_daddr(&asoc->peer.primary_addr, sk);
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
4105
4106
4107
4108
4109
  
  	/* Populate the fields of the newsk from the oldsk and migrate the
  	 * asoc to the newsk.
  	 */
  	sctp_sock_migrate(sk, sock->sk, asoc, SCTP_SOCKET_UDP_HIGH_BANDWIDTH);
4f4443088   Vlad Yasevich   [SCTP]: Correctly...
4110

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4111
4112
4113
4114
4115
4116
4117
4118
4119
4120
4121
  	*sockp = sock;
  
  	return err;
  }
  
  static int sctp_getsockopt_peeloff(struct sock *sk, int len, char __user *optval, int __user *optlen)
  {
  	sctp_peeloff_arg_t peeloff;
  	struct socket *newsock;
  	int retval = 0;
  	struct sctp_association *asoc;
408f22e81   Neil Horman   SCTP: update sctp...
4122
  	if (len < sizeof(sctp_peeloff_arg_t))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4123
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4124
  	len = sizeof(sctp_peeloff_arg_t);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4125
4126
4127
4128
4129
4130
4131
4132
  	if (copy_from_user(&peeloff, optval, len))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, peeloff.associd);
  	if (!asoc) {
  		retval = -EINVAL;
  		goto out;
  	}
0dc47877a   Harvey Harrison   net: replace rema...
4133
4134
  	SCTP_DEBUG_PRINTK("%s: sk: %p asoc: %p
  ", __func__, sk, asoc);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4135
4136
4137
4138
4139
4140
  
  	retval = sctp_do_peeloff(asoc, &newsock);
  	if (retval < 0)
  		goto out;
  
  	/* Map the socket to an unused fd that can be returned to the user.  */
a677a039b   Ulrich Drepper   flag parameters: ...
4141
  	retval = sock_map_fd(newsock, 0);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4142
4143
4144
4145
4146
4147
4148
  	if (retval < 0) {
  		sock_release(newsock);
  		goto out;
  	}
  
  	SCTP_DEBUG_PRINTK("%s: sk: %p asoc: %p newsk: %p sd: %d
  ",
0dc47877a   Harvey Harrison   net: replace rema...
4149
  			  __func__, sk, asoc, newsock->sk, retval);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4150
4151
4152
  
  	/* Return the fd mapped to the new socket.  */
  	peeloff.sd = retval;
408f22e81   Neil Horman   SCTP: update sctp...
4153
4154
  	if (put_user(len, optlen))
  		return -EFAULT;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4155
4156
4157
4158
4159
4160
4161
4162
4163
4164
4165
4166
4167
4168
4169
4170
4171
  	if (copy_to_user(optval, &peeloff, len))
  		retval = -EFAULT;
  
  out:
  	return retval;
  }
  
  /* 7.1.13 Peer Address Parameters (SCTP_PEER_ADDR_PARAMS)
   *
   * Applications can enable or disable heartbeats for any peer address of
   * an association, modify an address's heartbeat interval, force a
   * heartbeat to be sent immediately, and adjust the address's maximum
   * number of retransmissions sent before an address is considered
   * unreachable.  The following structure is used to access and modify an
   * address's parameters:
   *
   *  struct sctp_paddrparams {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4172
4173
4174
4175
4176
4177
4178
4179
4180
4181
4182
4183
   *     sctp_assoc_t            spp_assoc_id;
   *     struct sockaddr_storage spp_address;
   *     uint32_t                spp_hbinterval;
   *     uint16_t                spp_pathmaxrxt;
   *     uint32_t                spp_pathmtu;
   *     uint32_t                spp_sackdelay;
   *     uint32_t                spp_flags;
   * };
   *
   *   spp_assoc_id    - (one-to-many style socket) This is filled in the
   *                     application, and identifies the association for
   *                     this query.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4184
4185
   *   spp_address     - This specifies which address is of interest.
   *   spp_hbinterval  - This contains the value of the heartbeat interval,
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4186
4187
4188
   *                     in milliseconds.  If a  value of zero
   *                     is present in this field then no changes are to
   *                     be made to this parameter.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4189
4190
   *   spp_pathmaxrxt  - This contains the maximum number of
   *                     retransmissions before this address shall be
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4191
4192
4193
4194
4195
4196
4197
4198
4199
4200
4201
4202
4203
4204
4205
4206
4207
4208
4209
4210
4211
4212
4213
4214
4215
4216
4217
4218
4219
4220
4221
4222
4223
4224
4225
4226
4227
4228
4229
4230
4231
4232
4233
4234
4235
4236
4237
4238
4239
4240
4241
4242
4243
4244
4245
4246
4247
4248
4249
4250
4251
4252
4253
   *                     considered unreachable. If a  value of zero
   *                     is present in this field then no changes are to
   *                     be made to this parameter.
   *   spp_pathmtu     - When Path MTU discovery is disabled the value
   *                     specified here will be the "fixed" path mtu.
   *                     Note that if the spp_address field is empty
   *                     then all associations on this address will
   *                     have this fixed path mtu set upon them.
   *
   *   spp_sackdelay   - When delayed sack is enabled, this value specifies
   *                     the number of milliseconds that sacks will be delayed
   *                     for. This value will apply to all addresses of an
   *                     association if the spp_address field is empty. Note
   *                     also, that if delayed sack is enabled and this
   *                     value is set to 0, no change is made to the last
   *                     recorded delayed sack timer value.
   *
   *   spp_flags       - These flags are used to control various features
   *                     on an association. The flag field may contain
   *                     zero or more of the following options.
   *
   *                     SPP_HB_ENABLE  - Enable heartbeats on the
   *                     specified address. Note that if the address
   *                     field is empty all addresses for the association
   *                     have heartbeats enabled upon them.
   *
   *                     SPP_HB_DISABLE - Disable heartbeats on the
   *                     speicifed address. Note that if the address
   *                     field is empty all addresses for the association
   *                     will have their heartbeats disabled. Note also
   *                     that SPP_HB_ENABLE and SPP_HB_DISABLE are
   *                     mutually exclusive, only one of these two should
   *                     be specified. Enabling both fields will have
   *                     undetermined results.
   *
   *                     SPP_HB_DEMAND - Request a user initiated heartbeat
   *                     to be made immediately.
   *
   *                     SPP_PMTUD_ENABLE - This field will enable PMTU
   *                     discovery upon the specified address. Note that
   *                     if the address feild is empty then all addresses
   *                     on the association are effected.
   *
   *                     SPP_PMTUD_DISABLE - This field will disable PMTU
   *                     discovery upon the specified address. Note that
   *                     if the address feild is empty then all addresses
   *                     on the association are effected. Not also that
   *                     SPP_PMTUD_ENABLE and SPP_PMTUD_DISABLE are mutually
   *                     exclusive. Enabling both will have undetermined
   *                     results.
   *
   *                     SPP_SACKDELAY_ENABLE - Setting this flag turns
   *                     on delayed sack. The time specified in spp_sackdelay
   *                     is used to specify the sack delay for this address. Note
   *                     that if spp_address is empty then all addresses will
   *                     enable delayed sack and take on the sack delay
   *                     value specified in spp_sackdelay.
   *                     SPP_SACKDELAY_DISABLE - Setting this flag turns
   *                     off delayed sack. If the spp_address field is blank then
   *                     delayed sack is disabled for the entire association. Note
   *                     also that this field is mutually exclusive to
   *                     SPP_SACKDELAY_ENABLE, setting both will have undefined
   *                     results.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4254
4255
   */
  static int sctp_getsockopt_peer_addr_params(struct sock *sk, int len,
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4256
  					    char __user *optval, int __user *optlen)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4257
  {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4258
4259
4260
4261
  	struct sctp_paddrparams  params;
  	struct sctp_transport   *trans = NULL;
  	struct sctp_association *asoc = NULL;
  	struct sctp_sock        *sp = sctp_sk(sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4262

408f22e81   Neil Horman   SCTP: update sctp...
4263
  	if (len < sizeof(struct sctp_paddrparams))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4264
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4265
  	len = sizeof(struct sctp_paddrparams);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4266
4267
  	if (copy_from_user(&params, optval, len))
  		return -EFAULT;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4268
4269
  	/* If an address other than INADDR_ANY is specified, and
  	 * no transport is found, then the request is invalid.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4270
  	 */
52cae8f06   Vlad Yasevich   sctp: try harder ...
4271
  	if (!sctp_is_any(sk, ( union sctp_addr *)&params.spp_address)) {
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4272
4273
4274
4275
4276
4277
4278
  		trans = sctp_addr_id2transport(sk, &params.spp_address,
  					       params.spp_assoc_id);
  		if (!trans) {
  			SCTP_DEBUG_PRINTK("Failed no transport
  ");
  			return -EINVAL;
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4279
  	}
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4280
4281
4282
4283
4284
4285
4286
4287
  	/* Get association, if assoc_id != 0 and the socket is a one
  	 * to many style socket, and an association was not found, then
  	 * the id was invalid.
  	 */
  	asoc = sctp_id2assoc(sk, params.spp_assoc_id);
  	if (!asoc && params.spp_assoc_id && sctp_style(sk, UDP)) {
  		SCTP_DEBUG_PRINTK("Failed no association
  ");
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4288
  		return -EINVAL;
52ccb8e90   Frank Filz   [SCTP]: Update SC...
4289
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4290

52ccb8e90   Frank Filz   [SCTP]: Update SC...
4291
4292
4293
4294
4295
4296
4297
4298
4299
4300
4301
4302
4303
4304
4305
4306
4307
4308
4309
4310
4311
4312
4313
4314
  	if (trans) {
  		/* Fetch transport values. */
  		params.spp_hbinterval = jiffies_to_msecs(trans->hbinterval);
  		params.spp_pathmtu    = trans->pathmtu;
  		params.spp_pathmaxrxt = trans->pathmaxrxt;
  		params.spp_sackdelay  = jiffies_to_msecs(trans->sackdelay);
  
  		/*draft-11 doesn't say what to return in spp_flags*/
  		params.spp_flags      = trans->param_flags;
  	} else if (asoc) {
  		/* Fetch association values. */
  		params.spp_hbinterval = jiffies_to_msecs(asoc->hbinterval);
  		params.spp_pathmtu    = asoc->pathmtu;
  		params.spp_pathmaxrxt = asoc->pathmaxrxt;
  		params.spp_sackdelay  = jiffies_to_msecs(asoc->sackdelay);
  
  		/*draft-11 doesn't say what to return in spp_flags*/
  		params.spp_flags      = asoc->param_flags;
  	} else {
  		/* Fetch socket values. */
  		params.spp_hbinterval = sp->hbinterval;
  		params.spp_pathmtu    = sp->pathmtu;
  		params.spp_sackdelay  = sp->sackdelay;
  		params.spp_pathmaxrxt = sp->pathmaxrxt;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4315

52ccb8e90   Frank Filz   [SCTP]: Update SC...
4316
4317
4318
  		/*draft-11 doesn't say what to return in spp_flags*/
  		params.spp_flags      = sp->param_flags;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4319

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4320
4321
4322
4323
4324
4325
4326
4327
  	if (copy_to_user(optval, &params, len))
  		return -EFAULT;
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  
  	return 0;
  }
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4328
4329
4330
4331
4332
4333
4334
4335
4336
4337
4338
4339
4340
4341
4342
4343
4344
4345
4346
  /*
   * 7.1.23.  Get or set delayed ack timer (SCTP_DELAYED_SACK)
   *
   * This option will effect the way delayed acks are performed.  This
   * option allows you to get or set the delayed ack time, in
   * milliseconds.  It also allows changing the delayed ack frequency.
   * Changing the frequency to 1 disables the delayed sack algorithm.  If
   * the assoc_id is 0, then this sets or gets the endpoints default
   * values.  If the assoc_id field is non-zero, then the set or get
   * effects the specified association for the one to many model (the
   * assoc_id field is ignored by the one to one model).  Note that if
   * sack_delay or sack_freq are 0 when setting this option, then the
   * current values will remain unchanged.
   *
   * struct sctp_sack_info {
   *     sctp_assoc_t            sack_assoc_id;
   *     uint32_t                sack_delay;
   *     uint32_t                sack_freq;
   * };
7708610b1   Frank Filz   [SCTP]: Add suppo...
4347
   *
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4348
4349
4350
4351
   * sack_assoc_id -  This parameter, indicates which association the user
   *    is performing an action upon.  Note that if this field's value is
   *    zero then the endpoints default value is changed (effecting future
   *    associations only).
7708610b1   Frank Filz   [SCTP]: Add suppo...
4352
   *
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4353
4354
4355
4356
   * sack_delay -  This parameter contains the number of milliseconds that
   *    the user is requesting the delayed ACK timer be set to.  Note that
   *    this value is defined in the standard to be between 200 and 500
   *    milliseconds.
7708610b1   Frank Filz   [SCTP]: Add suppo...
4357
   *
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4358
4359
4360
4361
   * sack_freq -  This parameter contains the number of packets that must
   *    be received before a sack is sent without waiting for the delay
   *    timer to expire.  The default value for this is 2, setting this
   *    value to 1 will disable the delayed sack algorithm.
7708610b1   Frank Filz   [SCTP]: Add suppo...
4362
   */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4363
  static int sctp_getsockopt_delayed_ack(struct sock *sk, int len,
7708610b1   Frank Filz   [SCTP]: Add suppo...
4364
4365
4366
  					    char __user *optval,
  					    int __user *optlen)
  {
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4367
  	struct sctp_sack_info    params;
7708610b1   Frank Filz   [SCTP]: Add suppo...
4368
4369
  	struct sctp_association *asoc = NULL;
  	struct sctp_sock        *sp = sctp_sk(sk);
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4370
4371
  	if (len >= sizeof(struct sctp_sack_info)) {
  		len = sizeof(struct sctp_sack_info);
7708610b1   Frank Filz   [SCTP]: Add suppo...
4372

d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4373
4374
4375
  		if (copy_from_user(&params, optval, len))
  			return -EFAULT;
  	} else if (len == sizeof(struct sctp_assoc_value)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
4376
4377
4378
4379
  		pr_warn("Use of struct sctp_assoc_value in delayed_ack socket option deprecated
  ");
  		pr_warn("Use struct sctp_sack_info instead
  ");
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4380
4381
4382
4383
  		if (copy_from_user(&params, optval, len))
  			return -EFAULT;
  	} else
  		return - EINVAL;
7708610b1   Frank Filz   [SCTP]: Add suppo...
4384

d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4385
  	/* Get association, if sack_assoc_id != 0 and the socket is a one
7708610b1   Frank Filz   [SCTP]: Add suppo...
4386
4387
  	 * to many style socket, and an association was not found, then
  	 * the id was invalid.
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
4388
  	 */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4389
4390
  	asoc = sctp_id2assoc(sk, params.sack_assoc_id);
  	if (!asoc && params.sack_assoc_id && sctp_style(sk, UDP))
7708610b1   Frank Filz   [SCTP]: Add suppo...
4391
4392
4393
4394
  		return -EINVAL;
  
  	if (asoc) {
  		/* Fetch association values. */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4395
4396
  		if (asoc->param_flags & SPP_SACKDELAY_ENABLE) {
  			params.sack_delay = jiffies_to_msecs(
7708610b1   Frank Filz   [SCTP]: Add suppo...
4397
  				asoc->sackdelay);
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4398
4399
4400
4401
4402
4403
  			params.sack_freq = asoc->sackfreq;
  
  		} else {
  			params.sack_delay = 0;
  			params.sack_freq = 1;
  		}
7708610b1   Frank Filz   [SCTP]: Add suppo...
4404
4405
  	} else {
  		/* Fetch socket values. */
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
4406
4407
4408
4409
4410
4411
4412
  		if (sp->param_flags & SPP_SACKDELAY_ENABLE) {
  			params.sack_delay  = sp->sackdelay;
  			params.sack_freq = sp->sackfreq;
  		} else {
  			params.sack_delay  = 0;
  			params.sack_freq = 1;
  		}
7708610b1   Frank Filz   [SCTP]: Add suppo...
4413
4414
4415
4416
4417
4418
4419
4420
4421
4422
  	}
  
  	if (copy_to_user(optval, &params, len))
  		return -EFAULT;
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  
  	return 0;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4423
4424
4425
4426
4427
4428
4429
4430
4431
4432
4433
4434
4435
  /* 7.1.3 Initialization Parameters (SCTP_INITMSG)
   *
   * Applications can specify protocol parameters for the default association
   * initialization.  The option name argument to setsockopt() and getsockopt()
   * is SCTP_INITMSG.
   *
   * Setting initialization parameters is effective only on an unconnected
   * socket (for UDP-style sockets only future associations are effected
   * by the change).  With TCP-style sockets, this option is inherited by
   * sockets derived from a listener socket.
   */
  static int sctp_getsockopt_initmsg(struct sock *sk, int len, char __user *optval, int __user *optlen)
  {
408f22e81   Neil Horman   SCTP: update sctp...
4436
  	if (len < sizeof(struct sctp_initmsg))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4437
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4438
4439
4440
  	len = sizeof(struct sctp_initmsg);
  	if (put_user(len, optlen))
  		return -EFAULT;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4441
4442
4443
4444
  	if (copy_to_user(optval, &sctp_sk(sk)->initmsg, len))
  		return -EFAULT;
  	return 0;
  }
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4445
4446
4447
4448
4449
  
  static int sctp_getsockopt_peer_addrs(struct sock *sk, int len,
  				      char __user *optval, int __user *optlen)
  {
  	struct sctp_association *asoc;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4450
4451
4452
4453
4454
4455
4456
4457
4458
4459
4460
4461
4462
4463
4464
4465
4466
4467
4468
4469
4470
4471
  	int cnt = 0;
  	struct sctp_getaddrs getaddrs;
  	struct sctp_transport *from;
  	void __user *to;
  	union sctp_addr temp;
  	struct sctp_sock *sp = sctp_sk(sk);
  	int addrlen;
  	size_t space_left;
  	int bytes_copied;
  
  	if (len < sizeof(struct sctp_getaddrs))
  		return -EINVAL;
  
  	if (copy_from_user(&getaddrs, optval, sizeof(struct sctp_getaddrs)))
  		return -EFAULT;
  
  	/* For UDP-style sockets, id specifies the association to query.  */
  	asoc = sctp_id2assoc(sk, getaddrs.assoc_id);
  	if (!asoc)
  		return -EINVAL;
  
  	to = optval + offsetof(struct sctp_getaddrs,addrs);
186e23435   Neil Horman   SCTP: Fix sctp_ge...
4472
  	space_left = len - offsetof(struct sctp_getaddrs,addrs);
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4473

9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
4474
4475
  	list_for_each_entry(from, &asoc->peer.transport_addr_list,
  				transports) {
b3f5b3b66   Al Viro   [SCTP]: Trivial -...
4476
  		memcpy(&temp, &from->ipaddr, sizeof(temp));
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4477
  		sctp_get_pf_specific(sk->sk_family)->addr_v4map(sp, &temp);
a5f4cea74   Vlad Yasevich   sctp: Use correct...
4478
  		addrlen = sctp_get_af_specific(temp.sa.sa_family)->sockaddr_len;
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4479
  		if (space_left < addrlen)
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4480
  			return -ENOMEM;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4481
4482
4483
4484
4485
4486
4487
4488
4489
4490
4491
  		if (copy_to_user(to, &temp, addrlen))
  			return -EFAULT;
  		to += addrlen;
  		cnt++;
  		space_left -= addrlen;
  	}
  
  	if (put_user(cnt, &((struct sctp_getaddrs __user *)optval)->addr_num))
  		return -EFAULT;
  	bytes_copied = ((char __user *)to) - optval;
  	if (put_user(bytes_copied, optlen))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4492
4493
4494
4495
  		return -EFAULT;
  
  	return 0;
  }
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4496
4497
  static int sctp_copy_laddrs(struct sock *sk, __u16 port, void *to,
  			    size_t space_left, int *bytes_copied)
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4498
  {
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4499
  	struct sctp_sockaddr_entry *addr;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4500
4501
4502
  	union sctp_addr temp;
  	int cnt = 0;
  	int addrlen;
293035479   Vlad Yasevich   [SCTP]: Add RCU s...
4503
4504
4505
4506
  	rcu_read_lock();
  	list_for_each_entry_rcu(addr, &sctp_local_addr_list, list) {
  		if (!addr->valid)
  			continue;
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
4507
  		if ((PF_INET == sk->sk_family) &&
6244be4e0   Al Viro   [SCTP]: Trivial p...
4508
  		    (AF_INET6 == addr->a.sa.sa_family))
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4509
  			continue;
7dab83de5   Vlad Yasevich   sctp: Support ipv...
4510
4511
4512
4513
  		if ((PF_INET6 == sk->sk_family) &&
  		    inet_v6_ipv6only(sk) &&
  		    (AF_INET == addr->a.sa.sa_family))
  			continue;
6244be4e0   Al Viro   [SCTP]: Trivial p...
4514
  		memcpy(&temp, &addr->a, sizeof(temp));
b46ae36de   Vlad Yasevich   [SCTP]: Set ports...
4515
4516
  		if (!temp.v4.sin_port)
  			temp.v4.sin_port = htons(port);
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4517
4518
4519
  		sctp_get_pf_specific(sk->sk_family)->addr_v4map(sctp_sk(sk),
  								&temp);
  		addrlen = sctp_get_af_specific(temp.sa.sa_family)->sockaddr_len;
293035479   Vlad Yasevich   [SCTP]: Add RCU s...
4520
4521
4522
4523
  		if (space_left < addrlen) {
  			cnt =  -ENOMEM;
  			break;
  		}
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4524
  		memcpy(to, &temp, addrlen);
29c7cf961   Sridhar Samudrala   [SCTP]: Handle ad...
4525

aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4526
  		to += addrlen;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4527
4528
  		cnt ++;
  		space_left -= addrlen;
3663c3066   Vlad Yasevich   SCTP: Fix thinko ...
4529
  		*bytes_copied += addrlen;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4530
  	}
293035479   Vlad Yasevich   [SCTP]: Add RCU s...
4531
  	rcu_read_unlock();
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4532
4533
4534
  
  	return cnt;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4535

5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4536
4537
4538
4539
4540
  static int sctp_getsockopt_local_addrs(struct sock *sk, int len,
  				       char __user *optval, int __user *optlen)
  {
  	struct sctp_bind_addr *bp;
  	struct sctp_association *asoc;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4541
4542
4543
4544
4545
4546
4547
  	int cnt = 0;
  	struct sctp_getaddrs getaddrs;
  	struct sctp_sockaddr_entry *addr;
  	void __user *to;
  	union sctp_addr temp;
  	struct sctp_sock *sp = sctp_sk(sk);
  	int addrlen;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4548
4549
  	int err = 0;
  	size_t space_left;
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4550
4551
  	int bytes_copied = 0;
  	void *addrs;
70b57b814   Vlad Yasevich   [SCTP]: Correctly...
4552
  	void *buf;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4553

408f22e81   Neil Horman   SCTP: update sctp...
4554
  	if (len < sizeof(struct sctp_getaddrs))
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4555
4556
4557
4558
4559
4560
4561
4562
4563
4564
4565
4566
4567
  		return -EINVAL;
  
  	if (copy_from_user(&getaddrs, optval, sizeof(struct sctp_getaddrs)))
  		return -EFAULT;
  
  	/*
  	 *  For UDP-style sockets, id specifies the association to query.
  	 *  If the id field is set to the value '0' then the locally bound
  	 *  addresses are returned without regard to any particular
  	 *  association.
  	 */
  	if (0 == getaddrs.assoc_id) {
  		bp = &sctp_sk(sk)->ep->base.bind_addr;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4568
4569
4570
4571
4572
  	} else {
  		asoc = sctp_id2assoc(sk, getaddrs.assoc_id);
  		if (!asoc)
  			return -EINVAL;
  		bp = &asoc->base.bind_addr;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4573
4574
4575
  	}
  
  	to = optval + offsetof(struct sctp_getaddrs,addrs);
186e23435   Neil Horman   SCTP: Fix sctp_ge...
4576
  	space_left = len - offsetof(struct sctp_getaddrs,addrs);
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4577
4578
4579
  	addrs = kmalloc(space_left, GFP_KERNEL);
  	if (!addrs)
  		return -ENOMEM;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4580

5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4581
4582
4583
4584
4585
4586
  	/* If the endpoint is bound to 0.0.0.0 or ::0, get the valid
  	 * addresses from the global local address list.
  	 */
  	if (sctp_list_single_entry(&bp->address_list)) {
  		addr = list_entry(bp->address_list.next,
  				  struct sctp_sockaddr_entry, list);
52cae8f06   Vlad Yasevich   sctp: try harder ...
4587
  		if (sctp_is_any(sk, &addr->a)) {
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4588
4589
  			cnt = sctp_copy_laddrs(sk, bp->port, addrs,
  						space_left, &bytes_copied);
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4590
4591
  			if (cnt < 0) {
  				err = cnt;
559cf710b   Vlad Yasevich   [SCTP]: Convert b...
4592
  				goto out;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4593
  			}
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
4594
  			goto copy_getaddrs;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4595
4596
  		}
  	}
70b57b814   Vlad Yasevich   [SCTP]: Correctly...
4597
  	buf = addrs;
559cf710b   Vlad Yasevich   [SCTP]: Convert b...
4598
4599
4600
4601
4602
  	/* Protection on the bound address list is not needed since
  	 * in the socket option context we hold a socket lock and
  	 * thus the bound address list can't change.
  	 */
  	list_for_each_entry(addr, &bp->address_list, list) {
6244be4e0   Al Viro   [SCTP]: Trivial p...
4603
  		memcpy(&temp, &addr->a, sizeof(temp));
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4604
4605
  		sctp_get_pf_specific(sk->sk_family)->addr_v4map(sp, &temp);
  		addrlen = sctp_get_af_specific(temp.sa.sa_family)->sockaddr_len;
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4606
4607
  		if (space_left < addrlen) {
  			err =  -ENOMEM; /*fixme: right error?*/
559cf710b   Vlad Yasevich   [SCTP]: Convert b...
4608
  			goto out;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4609
  		}
70b57b814   Vlad Yasevich   [SCTP]: Correctly...
4610
4611
  		memcpy(buf, &temp, addrlen);
  		buf += addrlen;
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4612
  		bytes_copied += addrlen;
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4613
4614
4615
4616
4617
  		cnt ++;
  		space_left -= addrlen;
  	}
  
  copy_getaddrs:
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4618
4619
  	if (copy_to_user(to, addrs, bytes_copied)) {
  		err = -EFAULT;
d6f9fdaf6   Sebastian Siewior   sctp: try to fix ...
4620
  		goto out;
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4621
  	}
fe979ac16   Vlad Yasevich   [SCTP] Fix leak i...
4622
4623
  	if (put_user(cnt, &((struct sctp_getaddrs __user *)optval)->addr_num)) {
  		err = -EFAULT;
d6f9fdaf6   Sebastian Siewior   sctp: try to fix ...
4624
  		goto out;
fe979ac16   Vlad Yasevich   [SCTP] Fix leak i...
4625
  	}
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4626
  	if (put_user(bytes_copied, optlen))
fe979ac16   Vlad Yasevich   [SCTP] Fix leak i...
4627
  		err = -EFAULT;
d6f9fdaf6   Sebastian Siewior   sctp: try to fix ...
4628
  out:
aad97f38b   Vlad Yasevich   [SCTP]: Fix sctp_...
4629
  	kfree(addrs);
5fe467ee9   Ivan Skytte Jørgensen   [SCTP] Fix sctp_g...
4630
4631
  	return err;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4632
4633
4634
4635
4636
4637
4638
4639
4640
4641
4642
4643
  /* 7.1.10 Set Primary Address (SCTP_PRIMARY_ADDR)
   *
   * Requests that the local SCTP stack use the enclosed peer address as
   * the association primary.  The enclosed address must be one of the
   * association peer's addresses.
   */
  static int sctp_getsockopt_primary_addr(struct sock *sk, int len,
  					char __user *optval, int __user *optlen)
  {
  	struct sctp_prim prim;
  	struct sctp_association *asoc;
  	struct sctp_sock *sp = sctp_sk(sk);
408f22e81   Neil Horman   SCTP: update sctp...
4644
  	if (len < sizeof(struct sctp_prim))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4645
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4646
4647
4648
  	len = sizeof(struct sctp_prim);
  
  	if (copy_from_user(&prim, optval, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4649
4650
4651
4652
4653
4654
4655
4656
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, prim.ssp_assoc_id);
  	if (!asoc)
  		return -EINVAL;
  
  	if (!asoc->peer.primary_path)
  		return -ENOTCONN;
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
4657

8cec6b806   Al Viro   [SCTP]: We need t...
4658
4659
  	memcpy(&prim.ssp_addr, &asoc->peer.primary_path->ipaddr,
  		asoc->peer.primary_path->af_specific->sockaddr_len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4660
4661
4662
  
  	sctp_get_pf_specific(sk->sk_family)->addr_v4map(sp,
  			(union sctp_addr *)&prim.ssp_addr);
408f22e81   Neil Horman   SCTP: update sctp...
4663
4664
4665
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &prim, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4666
4667
4668
4669
4670
4671
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4672
   * 7.1.11  Set Adaptation Layer Indicator (SCTP_ADAPTATION_LAYER)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4673
   *
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4674
   * Requests that the local endpoint set the specified Adaptation Layer
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4675
4676
   * Indication parameter for all future INIT and INIT-ACK exchanges.
   */
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4677
  static int sctp_getsockopt_adaptation_layer(struct sock *sk, int len,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4678
4679
  				  char __user *optval, int __user *optlen)
  {
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4680
  	struct sctp_setadaptation adaptation;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4681

408f22e81   Neil Horman   SCTP: update sctp...
4682
  	if (len < sizeof(struct sctp_setadaptation))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4683
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4684
  	len = sizeof(struct sctp_setadaptation);
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4685
  	adaptation.ssb_adaptation_ind = sctp_sk(sk)->adaptation_ind;
408f22e81   Neil Horman   SCTP: update sctp...
4686
4687
4688
  
  	if (put_user(len, optlen))
  		return -EFAULT;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
4689
  	if (copy_to_user(optval, &adaptation, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4690
  		return -EFAULT;
a1ab35826   Ivan Skytte Jorgensen   [SCTP] Fix SCTP_S...
4691

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4692
4693
4694
4695
4696
4697
4698
4699
4700
4701
4702
4703
4704
4705
4706
4707
4708
4709
4710
4711
4712
4713
4714
4715
4716
4717
4718
4719
4720
  	return 0;
  }
  
  /*
   *
   * 7.1.14 Set default send parameters (SCTP_DEFAULT_SEND_PARAM)
   *
   *   Applications that wish to use the sendto() system call may wish to
   *   specify a default set of parameters that would normally be supplied
   *   through the inclusion of ancillary data.  This socket option allows
   *   such an application to set the default sctp_sndrcvinfo structure.
  
  
   *   The application that wishes to use this socket option simply passes
   *   in to this call the sctp_sndrcvinfo structure defined in Section
   *   5.2.2) The input parameters accepted by this call include
   *   sinfo_stream, sinfo_flags, sinfo_ppid, sinfo_context,
   *   sinfo_timetolive.  The user must provide the sinfo_assoc_id field in
   *   to this call if the caller is using the UDP model.
   *
   *   For getsockopt, it get the default sctp_sndrcvinfo structure.
   */
  static int sctp_getsockopt_default_send_param(struct sock *sk,
  					int len, char __user *optval,
  					int __user *optlen)
  {
  	struct sctp_sndrcvinfo info;
  	struct sctp_association *asoc;
  	struct sctp_sock *sp = sctp_sk(sk);
408f22e81   Neil Horman   SCTP: update sctp...
4721
  	if (len < sizeof(struct sctp_sndrcvinfo))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4722
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4723
4724
4725
4726
  
  	len = sizeof(struct sctp_sndrcvinfo);
  
  	if (copy_from_user(&info, optval, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4727
4728
4729
4730
4731
4732
4733
4734
4735
4736
4737
4738
4739
4740
4741
4742
4743
4744
4745
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, info.sinfo_assoc_id);
  	if (!asoc && info.sinfo_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc) {
  		info.sinfo_stream = asoc->default_stream;
  		info.sinfo_flags = asoc->default_flags;
  		info.sinfo_ppid = asoc->default_ppid;
  		info.sinfo_context = asoc->default_context;
  		info.sinfo_timetolive = asoc->default_timetolive;
  	} else {
  		info.sinfo_stream = sp->default_stream;
  		info.sinfo_flags = sp->default_flags;
  		info.sinfo_ppid = sp->default_ppid;
  		info.sinfo_context = sp->default_context;
  		info.sinfo_timetolive = sp->default_timetolive;
  	}
408f22e81   Neil Horman   SCTP: update sctp...
4746
4747
4748
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &info, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4749
4750
4751
4752
4753
4754
4755
4756
4757
4758
4759
4760
4761
4762
4763
4764
4765
4766
4767
4768
4769
4770
4771
4772
4773
4774
4775
4776
4777
4778
4779
4780
4781
4782
4783
4784
4785
4786
4787
4788
4789
4790
4791
4792
4793
4794
4795
4796
4797
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
   *
   * 7.1.5 SCTP_NODELAY
   *
   * Turn on/off any Nagle-like algorithm.  This means that packets are
   * generally sent as soon as possible and no unnecessary delays are
   * introduced, at the cost of more packets in the network.  Expects an
   * integer boolean flag.
   */
  
  static int sctp_getsockopt_nodelay(struct sock *sk, int len,
  				   char __user *optval, int __user *optlen)
  {
  	int val;
  
  	if (len < sizeof(int))
  		return -EINVAL;
  
  	len = sizeof(int);
  	val = (sctp_sk(sk)->nodelay == 1);
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  	return 0;
  }
  
  /*
   *
   * 7.1.1 SCTP_RTOINFO
   *
   * The protocol parameters used to initialize and bound retransmission
   * timeout (RTO) are tunable. sctp_rtoinfo structure is used to access
   * and modify these parameters.
   * All parameters are time values, in milliseconds.  A value of 0, when
   * modifying the parameters, indicates that the current value should not
   * be changed.
   *
   */
  static int sctp_getsockopt_rtoinfo(struct sock *sk, int len,
  				char __user *optval,
  				int __user *optlen) {
  	struct sctp_rtoinfo rtoinfo;
  	struct sctp_association *asoc;
408f22e81   Neil Horman   SCTP: update sctp...
4798
  	if (len < sizeof (struct sctp_rtoinfo))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4799
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4800
4801
4802
  	len = sizeof(struct sctp_rtoinfo);
  
  	if (copy_from_user(&rtoinfo, optval, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4803
4804
4805
4806
4807
4808
4809
4810
4811
4812
4813
4814
4815
4816
4817
4818
4819
4820
4821
4822
4823
4824
4825
4826
4827
4828
4829
4830
4831
4832
4833
4834
4835
4836
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, rtoinfo.srto_assoc_id);
  
  	if (!asoc && rtoinfo.srto_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	/* Values corresponding to the specific association. */
  	if (asoc) {
  		rtoinfo.srto_initial = jiffies_to_msecs(asoc->rto_initial);
  		rtoinfo.srto_max = jiffies_to_msecs(asoc->rto_max);
  		rtoinfo.srto_min = jiffies_to_msecs(asoc->rto_min);
  	} else {
  		/* Values corresponding to the endpoint. */
  		struct sctp_sock *sp = sctp_sk(sk);
  
  		rtoinfo.srto_initial = sp->rtoinfo.srto_initial;
  		rtoinfo.srto_max = sp->rtoinfo.srto_max;
  		rtoinfo.srto_min = sp->rtoinfo.srto_min;
  	}
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  
  	if (copy_to_user(optval, &rtoinfo, len))
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
   *
   * 7.1.2 SCTP_ASSOCINFO
   *
59c51591a   Michael Opdenacker   Fix occurrences o...
4837
   * This option is used to tune the maximum retransmission attempts
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4838
4839
4840
4841
4842
4843
4844
4845
4846
4847
4848
4849
4850
4851
4852
   * of the association.
   * Returns an error if the new association retransmission value is
   * greater than the sum of the retransmission value  of the peer.
   * See [SCTP] for more information.
   *
   */
  static int sctp_getsockopt_associnfo(struct sock *sk, int len,
  				     char __user *optval,
  				     int __user *optlen)
  {
  
  	struct sctp_assocparams assocparams;
  	struct sctp_association *asoc;
  	struct list_head *pos;
  	int cnt = 0;
408f22e81   Neil Horman   SCTP: update sctp...
4853
  	if (len < sizeof (struct sctp_assocparams))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4854
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4855
4856
4857
  	len = sizeof(struct sctp_assocparams);
  
  	if (copy_from_user(&assocparams, optval, len))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4858
4859
4860
4861
4862
4863
4864
4865
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, assocparams.sasoc_assoc_id);
  
  	if (!asoc && assocparams.sasoc_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	/* Values correspoinding to the specific association */
173372162   Vladislav Yasevich   [SCTP] Fix SCTP_A...
4866
  	if (asoc) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4867
4868
4869
4870
4871
4872
4873
4874
4875
4876
4877
4878
4879
4880
4881
4882
4883
4884
4885
4886
4887
4888
4889
4890
4891
4892
4893
4894
4895
4896
4897
4898
4899
4900
4901
4902
4903
4904
4905
4906
4907
4908
4909
4910
4911
4912
4913
4914
4915
4916
4917
4918
4919
4920
4921
4922
4923
4924
4925
4926
4927
4928
4929
4930
4931
4932
  		assocparams.sasoc_asocmaxrxt = asoc->max_retrans;
  		assocparams.sasoc_peer_rwnd = asoc->peer.rwnd;
  		assocparams.sasoc_local_rwnd = asoc->a_rwnd;
  		assocparams.sasoc_cookie_life = (asoc->cookie_life.tv_sec
  						* 1000) +
  						(asoc->cookie_life.tv_usec
  						/ 1000);
  
  		list_for_each(pos, &asoc->peer.transport_addr_list) {
  			cnt ++;
  		}
  
  		assocparams.sasoc_number_peer_destinations = cnt;
  	} else {
  		/* Values corresponding to the endpoint */
  		struct sctp_sock *sp = sctp_sk(sk);
  
  		assocparams.sasoc_asocmaxrxt = sp->assocparams.sasoc_asocmaxrxt;
  		assocparams.sasoc_peer_rwnd = sp->assocparams.sasoc_peer_rwnd;
  		assocparams.sasoc_local_rwnd = sp->assocparams.sasoc_local_rwnd;
  		assocparams.sasoc_cookie_life =
  					sp->assocparams.sasoc_cookie_life;
  		assocparams.sasoc_number_peer_destinations =
  					sp->assocparams.
  					sasoc_number_peer_destinations;
  	}
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  
  	if (copy_to_user(optval, &assocparams, len))
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
   * 7.1.16 Set/clear IPv4 mapped addresses (SCTP_I_WANT_MAPPED_V4_ADDR)
   *
   * This socket option is a boolean flag which turns on or off mapped V4
   * addresses.  If this option is turned on and the socket is type
   * PF_INET6, then IPv4 addresses will be mapped to V6 representation.
   * If this option is turned off, then no mapping will be done of V4
   * addresses and a user will receive both PF_INET6 and PF_INET type
   * addresses on the socket.
   */
  static int sctp_getsockopt_mappedv4(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
  	int val;
  	struct sctp_sock *sp = sctp_sk(sk);
  
  	if (len < sizeof(int))
  		return -EINVAL;
  
  	len = sizeof(int);
  	val = sp->v4mapped;
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
4933
4934
4935
4936
4937
4938
4939
4940
4941
   * 7.1.29.  Set or Get the default context (SCTP_CONTEXT)
   * (chapter and verse is quoted at sctp_setsockopt_context())
   */
  static int sctp_getsockopt_context(struct sock *sk, int len,
  				   char __user *optval, int __user *optlen)
  {
  	struct sctp_assoc_value params;
  	struct sctp_sock *sp;
  	struct sctp_association *asoc;
408f22e81   Neil Horman   SCTP: update sctp...
4942
  	if (len < sizeof(struct sctp_assoc_value))
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
4943
  		return -EINVAL;
408f22e81   Neil Horman   SCTP: update sctp...
4944
  	len = sizeof(struct sctp_assoc_value);
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
4945
4946
4947
4948
4949
4950
4951
4952
4953
4954
4955
4956
4957
4958
4959
4960
4961
4962
4963
4964
4965
4966
4967
  	if (copy_from_user(&params, optval, len))
  		return -EFAULT;
  
  	sp = sctp_sk(sk);
  
  	if (params.assoc_id != 0) {
  		asoc = sctp_id2assoc(sk, params.assoc_id);
  		if (!asoc)
  			return -EINVAL;
  		params.assoc_value = asoc->default_rcv_context;
  	} else {
  		params.assoc_value = sp->default_rcv_context;
  	}
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &params, len))
  		return -EFAULT;
  
  	return 0;
  }
  
  /*
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
4968
4969
4970
   * 8.1.16.  Get or Set the Maximum Fragmentation Size (SCTP_MAXSEG)
   * This option will get or set the maximum size to put in any outgoing
   * SCTP DATA chunk.  If a message is larger than this size it will be
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4971
4972
4973
   * fragmented by SCTP into the specified size.  Note that the underlying
   * SCTP implementation may fragment into smaller sized chunks when the
   * PMTU of the underlying association is smaller than the value set by
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
4974
4975
4976
4977
4978
4979
4980
4981
4982
4983
4984
4985
4986
4987
4988
4989
4990
4991
4992
   * the user.  The default value for this option is '0' which indicates
   * the user is NOT limiting fragmentation and only the PMTU will effect
   * SCTP's choice of DATA chunk size.  Note also that values set larger
   * than the maximum size of an IP datagram will effectively let SCTP
   * control fragmentation (i.e. the same as setting this option to 0).
   *
   * The following structure is used to access and modify this parameter:
   *
   * struct sctp_assoc_value {
   *   sctp_assoc_t assoc_id;
   *   uint32_t assoc_value;
   * };
   *
   * assoc_id:  This parameter is ignored for one-to-one style sockets.
   *    For one-to-many style sockets this parameter indicates which
   *    association the user is performing an action upon.  Note that if
   *    this field's value is zero then the endpoints default value is
   *    changed (effecting future associations only).
   * assoc_value:  This parameter specifies the maximum size in bytes.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4993
4994
4995
4996
   */
  static int sctp_getsockopt_maxseg(struct sock *sk, int len,
  				  char __user *optval, int __user *optlen)
  {
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
4997
4998
  	struct sctp_assoc_value params;
  	struct sctp_association *asoc;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
4999

e89c20958   Wei Yongjun   sctp: Bring SCTP_...
5000
  	if (len == sizeof(int)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
5001
5002
5003
5004
  		pr_warn("Use of int in maxseg socket option deprecated
  ");
  		pr_warn("Use struct sctp_assoc_value instead
  ");
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
5005
5006
5007
5008
5009
5010
  		params.assoc_id = 0;
  	} else if (len >= sizeof(struct sctp_assoc_value)) {
  		len = sizeof(struct sctp_assoc_value);
  		if (copy_from_user(&params, optval, sizeof(params)))
  			return -EFAULT;
  	} else
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5011
  		return -EINVAL;
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
5012
5013
5014
5015
5016
5017
5018
5019
  	asoc = sctp_id2assoc(sk, params.assoc_id);
  	if (!asoc && params.assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc)
  		params.assoc_value = asoc->frag_point;
  	else
  		params.assoc_value = sctp_sk(sk)->user_frag;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5020

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5021
5022
  	if (put_user(len, optlen))
  		return -EFAULT;
e89c20958   Wei Yongjun   sctp: Bring SCTP_...
5023
5024
5025
5026
5027
5028
5029
  	if (len == sizeof(int)) {
  		if (copy_to_user(optval, &params.assoc_value, len))
  			return -EFAULT;
  	} else {
  		if (copy_to_user(optval, &params, len))
  			return -EFAULT;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5030
5031
5032
  
  	return 0;
  }
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
5033
5034
5035
5036
5037
5038
5039
5040
5041
5042
5043
5044
5045
5046
5047
5048
5049
5050
5051
5052
5053
5054
  /*
   * 7.1.24.  Get or set fragmented interleave (SCTP_FRAGMENT_INTERLEAVE)
   * (chapter and verse is quoted at sctp_setsockopt_fragment_interleave())
   */
  static int sctp_getsockopt_fragment_interleave(struct sock *sk, int len,
  					       char __user *optval, int __user *optlen)
  {
  	int val;
  
  	if (len < sizeof(int))
  		return -EINVAL;
  
  	len = sizeof(int);
  
  	val = sctp_sk(sk)->frag_interleave;
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  
  	return 0;
  }
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
5055
5056
5057
5058
5059
5060
5061
5062
  /*
   * 7.1.25.  Set or Get the sctp partial delivery point
   * (chapter and verse is quoted at sctp_setsockopt_partial_delivery_point())
   */
  static int sctp_getsockopt_partial_delivery_point(struct sock *sk, int len,
  						  char __user *optval,
  						  int __user *optlen)
  {
9cbcbf4e0   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
5063
  	u32 val;
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
5064
5065
5066
5067
5068
5069
5070
5071
5072
5073
5074
  
  	if (len < sizeof(u32))
  		return -EINVAL;
  
  	len = sizeof(u32);
  
  	val = sctp_sk(sk)->pd_point;
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
7d743b7e9   Wei Yongjun   sctp: fix the ret...
5075
  	return 0;
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
5076
  }
703315712   Vlad Yasevich   [SCTP]: Implement...
5077
5078
5079
5080
5081
5082
5083
5084
  /*
   * 7.1.28.  Set or Get the maximum burst (SCTP_MAX_BURST)
   * (chapter and verse is quoted at sctp_setsockopt_maxburst())
   */
  static int sctp_getsockopt_maxburst(struct sock *sk, int len,
  				    char __user *optval,
  				    int __user *optlen)
  {
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
5085
5086
5087
  	struct sctp_assoc_value params;
  	struct sctp_sock *sp;
  	struct sctp_association *asoc;
703315712   Vlad Yasevich   [SCTP]: Implement...
5088

219b99a9e   Neil Horman   [SCTP]: Bring MAX...
5089
  	if (len == sizeof(int)) {
145ce502e   Joe Perches   net/sctp: Use pr_...
5090
5091
5092
5093
  		pr_warn("Use of int in max_burst socket option deprecated
  ");
  		pr_warn("Use struct sctp_assoc_value instead
  ");
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
5094
  		params.assoc_id = 0;
c6db93a58   Wei Yongjun   sctp: fix the len...
5095
5096
  	} else if (len >= sizeof(struct sctp_assoc_value)) {
  		len = sizeof(struct sctp_assoc_value);
219b99a9e   Neil Horman   [SCTP]: Bring MAX...
5097
5098
5099
5100
  		if (copy_from_user(&params, optval, len))
  			return -EFAULT;
  	} else
  		return -EINVAL;
703315712   Vlad Yasevich   [SCTP]: Implement...
5101

219b99a9e   Neil Horman   [SCTP]: Bring MAX...
5102
5103
5104
5105
5106
5107
5108
5109
5110
5111
5112
5113
5114
5115
5116
5117
5118
5119
5120
  	sp = sctp_sk(sk);
  
  	if (params.assoc_id != 0) {
  		asoc = sctp_id2assoc(sk, params.assoc_id);
  		if (!asoc)
  			return -EINVAL;
  		params.assoc_value = asoc->max_burst;
  	} else
  		params.assoc_value = sp->max_burst;
  
  	if (len == sizeof(int)) {
  		if (copy_to_user(optval, &params.assoc_value, len))
  			return -EFAULT;
  	} else {
  		if (copy_to_user(optval, &params, len))
  			return -EFAULT;
  	}
  
  	return 0;
703315712   Vlad Yasevich   [SCTP]: Implement...
5121

703315712   Vlad Yasevich   [SCTP]: Implement...
5122
  }
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5123
5124
5125
  static int sctp_getsockopt_hmac_ident(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
5e739d175   Vlad Yasevich   sctp: fix potenti...
5126
  	struct sctp_hmacalgo  __user *p = (void __user *)optval;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5127
  	struct sctp_hmac_algo_param *hmacs;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5128
5129
5130
5131
5132
  	__u16 data_len = 0;
  	u32 num_idents;
  
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5133
5134
  
  	hmacs = sctp_sk(sk)->ep->auth_hmacs_list;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5135
  	data_len = ntohs(hmacs->param_hdr.length) - sizeof(sctp_paramhdr_t);
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5136

5e739d175   Vlad Yasevich   sctp: fix potenti...
5137
  	if (len < sizeof(struct sctp_hmacalgo) + data_len)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5138
  		return -EINVAL;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5139
5140
5141
  
  	len = sizeof(struct sctp_hmacalgo) + data_len;
  	num_idents = data_len / sizeof(u16);
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5142
5143
  	if (put_user(len, optlen))
  		return -EFAULT;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5144
5145
5146
  	if (put_user(num_idents, &p->shmac_num_idents))
  		return -EFAULT;
  	if (copy_to_user(p->shmac_idents, hmacs->hmac_ids, data_len))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5147
  		return -EFAULT;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5148
5149
5150
5151
5152
5153
5154
5155
  	return 0;
  }
  
  static int sctp_getsockopt_active_key(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
  	struct sctp_authkeyid val;
  	struct sctp_association *asoc;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5156
5157
  	if (!sctp_auth_enable)
  		return -EACCES;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5158
5159
5160
5161
5162
5163
5164
5165
5166
5167
5168
5169
5170
  	if (len < sizeof(struct sctp_authkeyid))
  		return -EINVAL;
  	if (copy_from_user(&val, optval, sizeof(struct sctp_authkeyid)))
  		return -EFAULT;
  
  	asoc = sctp_id2assoc(sk, val.scact_assoc_id);
  	if (!asoc && val.scact_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc)
  		val.scact_keynumber = asoc->active_key_id;
  	else
  		val.scact_keynumber = sctp_sk(sk)->ep->active_key_id;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5171
5172
5173
5174
5175
  	len = sizeof(struct sctp_authkeyid);
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5176
5177
5178
5179
5180
5181
  	return 0;
  }
  
  static int sctp_getsockopt_peer_auth_chunks(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
411223c01   Al Viro   fix breakage in s...
5182
  	struct sctp_authchunks __user *p = (void __user *)optval;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5183
5184
5185
  	struct sctp_authchunks val;
  	struct sctp_association *asoc;
  	struct sctp_chunks_param *ch;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5186
  	u32    num_chunks = 0;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5187
  	char __user *to;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5188
5189
5190
5191
  	if (!sctp_auth_enable)
  		return -EACCES;
  
  	if (len < sizeof(struct sctp_authchunks))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5192
  		return -EINVAL;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5193
  	if (copy_from_user(&val, optval, sizeof(struct sctp_authchunks)))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5194
  		return -EFAULT;
411223c01   Al Viro   fix breakage in s...
5195
  	to = p->gauth_chunks;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5196
5197
5198
5199
5200
  	asoc = sctp_id2assoc(sk, val.gauth_assoc_id);
  	if (!asoc)
  		return -EINVAL;
  
  	ch = asoc->peer.peer_chunks;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5201
5202
  	if (!ch)
  		goto num;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5203
5204
  
  	/* See if the user provided enough room for all the data */
b40db6846   Vlad Yasevich   [SCTP]: Incorrect...
5205
5206
  	num_chunks = ntohs(ch->param_hdr.length) - sizeof(sctp_paramhdr_t);
  	if (len < num_chunks)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5207
  		return -EINVAL;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5208
  	if (copy_to_user(to, ch->chunks, num_chunks))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5209
  		return -EFAULT;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5210
5211
5212
  num:
  	len = sizeof(struct sctp_authchunks) + num_chunks;
  	if (put_user(len, optlen)) return -EFAULT;
7e8616d8e   Vlad Yasevich   [SCTP]: Update AU...
5213
5214
  	if (put_user(num_chunks, &p->gauth_number_of_chunks))
  		return -EFAULT;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5215
5216
5217
5218
5219
5220
  	return 0;
  }
  
  static int sctp_getsockopt_local_auth_chunks(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
411223c01   Al Viro   fix breakage in s...
5221
  	struct sctp_authchunks __user *p = (void __user *)optval;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5222
5223
5224
  	struct sctp_authchunks val;
  	struct sctp_association *asoc;
  	struct sctp_chunks_param *ch;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5225
  	u32    num_chunks = 0;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5226
  	char __user *to;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5227
5228
5229
5230
  	if (!sctp_auth_enable)
  		return -EACCES;
  
  	if (len < sizeof(struct sctp_authchunks))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5231
  		return -EINVAL;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5232
  	if (copy_from_user(&val, optval, sizeof(struct sctp_authchunks)))
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5233
  		return -EFAULT;
411223c01   Al Viro   fix breakage in s...
5234
  	to = p->gauth_chunks;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5235
5236
5237
5238
5239
5240
5241
5242
  	asoc = sctp_id2assoc(sk, val.gauth_assoc_id);
  	if (!asoc && val.gauth_assoc_id && sctp_style(sk, UDP))
  		return -EINVAL;
  
  	if (asoc)
  		ch = (struct sctp_chunks_param*)asoc->c.auth_chunks;
  	else
  		ch = sctp_sk(sk)->ep->auth_chunk_list;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5243
5244
  	if (!ch)
  		goto num;
b40db6846   Vlad Yasevich   [SCTP]: Incorrect...
5245
  	num_chunks = ntohs(ch->param_hdr.length) - sizeof(sctp_paramhdr_t);
5e739d175   Vlad Yasevich   sctp: fix potenti...
5246
  	if (len < sizeof(struct sctp_authchunks) + num_chunks)
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5247
  		return -EINVAL;
5e739d175   Vlad Yasevich   sctp: fix potenti...
5248
5249
5250
5251
  	if (copy_to_user(to, ch->chunks, num_chunks))
  		return -EFAULT;
  num:
  	len = sizeof(struct sctp_authchunks) + num_chunks;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5252
5253
  	if (put_user(len, optlen))
  		return -EFAULT;
7e8616d8e   Vlad Yasevich   [SCTP]: Update AU...
5254
5255
  	if (put_user(num_chunks, &p->gauth_number_of_chunks))
  		return -EFAULT;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5256
5257
5258
  
  	return 0;
  }
aea3c5c05   Wei Yongjun   sctp: Implement s...
5259
5260
5261
5262
5263
5264
5265
5266
5267
5268
5269
5270
5271
5272
5273
5274
5275
5276
5277
5278
5279
5280
5281
5282
5283
5284
5285
5286
5287
5288
5289
  /*
   * 8.2.5.  Get the Current Number of Associations (SCTP_GET_ASSOC_NUMBER)
   * This option gets the current number of associations that are attached
   * to a one-to-many style socket.  The option value is an uint32_t.
   */
  static int sctp_getsockopt_assoc_number(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sctp_association *asoc;
  	u32 val = 0;
  
  	if (sctp_style(sk, TCP))
  		return -EOPNOTSUPP;
  
  	if (len < sizeof(u32))
  		return -EINVAL;
  
  	len = sizeof(u32);
  
  	list_for_each_entry(asoc, &(sp->ep->asocs), asocs) {
  		val++;
  	}
  
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  
  	return 0;
  }
209ba424c   Wei Yongjun   sctp: implement s...
5290
  /*
7dc04d712   Michio Honda   sctp: Add socket ...
5291
5292
5293
5294
5295
5296
5297
5298
5299
5300
5301
5302
5303
5304
5305
5306
5307
5308
5309
5310
5311
5312
   * 8.1.23 SCTP_AUTO_ASCONF
   * See the corresponding setsockopt entry as description
   */
  static int sctp_getsockopt_auto_asconf(struct sock *sk, int len,
  				   char __user *optval, int __user *optlen)
  {
  	int val = 0;
  
  	if (len < sizeof(int))
  		return -EINVAL;
  
  	len = sizeof(int);
  	if (sctp_sk(sk)->do_auto_asconf && sctp_is_ep_boundall(sk))
  		val = 1;
  	if (put_user(len, optlen))
  		return -EFAULT;
  	if (copy_to_user(optval, &val, len))
  		return -EFAULT;
  	return 0;
  }
  
  /*
209ba424c   Wei Yongjun   sctp: implement s...
5313
5314
5315
5316
5317
5318
5319
5320
5321
5322
5323
5324
5325
5326
5327
5328
5329
5330
5331
5332
5333
5334
5335
5336
5337
5338
5339
5340
5341
5342
5343
5344
5345
5346
5347
5348
5349
5350
5351
5352
5353
5354
5355
5356
5357
5358
5359
   * 8.2.6. Get the Current Identifiers of Associations
   *        (SCTP_GET_ASSOC_ID_LIST)
   *
   * This option gets the current list of SCTP association identifiers of
   * the SCTP associations handled by a one-to-many style socket.
   */
  static int sctp_getsockopt_assoc_ids(struct sock *sk, int len,
  				    char __user *optval, int __user *optlen)
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sctp_association *asoc;
  	struct sctp_assoc_ids *ids;
  	u32 num = 0;
  
  	if (sctp_style(sk, TCP))
  		return -EOPNOTSUPP;
  
  	if (len < sizeof(struct sctp_assoc_ids))
  		return -EINVAL;
  
  	list_for_each_entry(asoc, &(sp->ep->asocs), asocs) {
  		num++;
  	}
  
  	if (len < sizeof(struct sctp_assoc_ids) + sizeof(sctp_assoc_t) * num)
  		return -EINVAL;
  
  	len = sizeof(struct sctp_assoc_ids) + sizeof(sctp_assoc_t) * num;
  
  	ids = kmalloc(len, GFP_KERNEL);
  	if (unlikely(!ids))
  		return -ENOMEM;
  
  	ids->gaids_number_of_ids = num;
  	num = 0;
  	list_for_each_entry(asoc, &(sp->ep->asocs), asocs) {
  		ids->gaids_assoc_id[num++] = asoc->assoc_id;
  	}
  
  	if (put_user(len, optlen) || copy_to_user(optval, ids, len)) {
  		kfree(ids);
  		return -EFAULT;
  	}
  
  	kfree(ids);
  	return 0;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5360
5361
5362
5363
5364
  SCTP_STATIC int sctp_getsockopt(struct sock *sk, int level, int optname,
  				char __user *optval, int __user *optlen)
  {
  	int retval = 0;
  	int len;
3f7a87d2f   Frank Filz   [SCTP] sctp_conne...
5365
5366
5367
  	SCTP_DEBUG_PRINTK("sctp_getsockopt(sk: %p... optname: %d)
  ",
  			  sk, optname);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5368
5369
5370
5371
5372
5373
5374
5375
5376
5377
5378
5379
5380
5381
5382
5383
5384
5385
5386
5387
5388
5389
5390
5391
5392
5393
5394
5395
5396
5397
5398
5399
5400
5401
5402
5403
5404
5405
5406
5407
  
  	/* I can hardly begin to describe how wrong this is.  This is
  	 * so broken as to be worse than useless.  The API draft
  	 * REALLY is NOT helpful here...  I am not convinced that the
  	 * semantics of getsockopt() with a level OTHER THAN SOL_SCTP
  	 * are at all well-founded.
  	 */
  	if (level != SOL_SCTP) {
  		struct sctp_af *af = sctp_sk(sk)->pf->af;
  
  		retval = af->getsockopt(sk, level, optname, optval, optlen);
  		return retval;
  	}
  
  	if (get_user(len, optlen))
  		return -EFAULT;
  
  	sctp_lock_sock(sk);
  
  	switch (optname) {
  	case SCTP_STATUS:
  		retval = sctp_getsockopt_sctp_status(sk, len, optval, optlen);
  		break;
  	case SCTP_DISABLE_FRAGMENTS:
  		retval = sctp_getsockopt_disable_fragments(sk, len, optval,
  							   optlen);
  		break;
  	case SCTP_EVENTS:
  		retval = sctp_getsockopt_events(sk, len, optval, optlen);
  		break;
  	case SCTP_AUTOCLOSE:
  		retval = sctp_getsockopt_autoclose(sk, len, optval, optlen);
  		break;
  	case SCTP_SOCKOPT_PEELOFF:
  		retval = sctp_getsockopt_peeloff(sk, len, optval, optlen);
  		break;
  	case SCTP_PEER_ADDR_PARAMS:
  		retval = sctp_getsockopt_peer_addr_params(sk, len, optval,
  							  optlen);
  		break;
4580ccc04   Shan Wei   sctp: user perfec...
5408
  	case SCTP_DELAYED_SACK:
d364d9276   Wei Yongjun   sctp: Bring SCTP_...
5409
  		retval = sctp_getsockopt_delayed_ack(sk, len, optval,
7708610b1   Frank Filz   [SCTP]: Add suppo...
5410
5411
  							  optlen);
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5412
5413
5414
  	case SCTP_INITMSG:
  		retval = sctp_getsockopt_initmsg(sk, len, optval, optlen);
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5415
5416
5417
5418
5419
5420
5421
5422
  	case SCTP_GET_PEER_ADDRS:
  		retval = sctp_getsockopt_peer_addrs(sk, len, optval,
  						    optlen);
  		break;
  	case SCTP_GET_LOCAL_ADDRS:
  		retval = sctp_getsockopt_local_addrs(sk, len, optval,
  						     optlen);
  		break;
c6ba68a26   Vlad Yasevich   sctp: support non...
5423
5424
5425
  	case SCTP_SOCKOPT_CONNECTX3:
  		retval = sctp_getsockopt_connectx3(sk, len, optval, optlen);
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5426
5427
5428
5429
5430
5431
5432
5433
5434
5435
5436
5437
5438
5439
5440
5441
5442
5443
5444
5445
5446
5447
5448
5449
5450
5451
  	case SCTP_DEFAULT_SEND_PARAM:
  		retval = sctp_getsockopt_default_send_param(sk, len,
  							    optval, optlen);
  		break;
  	case SCTP_PRIMARY_ADDR:
  		retval = sctp_getsockopt_primary_addr(sk, len, optval, optlen);
  		break;
  	case SCTP_NODELAY:
  		retval = sctp_getsockopt_nodelay(sk, len, optval, optlen);
  		break;
  	case SCTP_RTOINFO:
  		retval = sctp_getsockopt_rtoinfo(sk, len, optval, optlen);
  		break;
  	case SCTP_ASSOCINFO:
  		retval = sctp_getsockopt_associnfo(sk, len, optval, optlen);
  		break;
  	case SCTP_I_WANT_MAPPED_V4_ADDR:
  		retval = sctp_getsockopt_mappedv4(sk, len, optval, optlen);
  		break;
  	case SCTP_MAXSEG:
  		retval = sctp_getsockopt_maxseg(sk, len, optval, optlen);
  		break;
  	case SCTP_GET_PEER_ADDR_INFO:
  		retval = sctp_getsockopt_peer_addr_info(sk, len, optval,
  							optlen);
  		break;
0f3fffd8a   Ivan Skytte Jorgensen   [SCTP]: Fix typo ...
5452
5453
  	case SCTP_ADAPTATION_LAYER:
  		retval = sctp_getsockopt_adaptation_layer(sk, len, optval,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5454
5455
  							optlen);
  		break;
6ab792f57   Ivan Skytte Jorgensen   [SCTP]: Add suppo...
5456
5457
5458
  	case SCTP_CONTEXT:
  		retval = sctp_getsockopt_context(sk, len, optval, optlen);
  		break;
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
5459
5460
5461
5462
  	case SCTP_FRAGMENT_INTERLEAVE:
  		retval = sctp_getsockopt_fragment_interleave(sk, len, optval,
  							     optlen);
  		break;
d49d91d79   Vlad Yasevich   [SCTP]: Implement...
5463
5464
5465
5466
  	case SCTP_PARTIAL_DELIVERY_POINT:
  		retval = sctp_getsockopt_partial_delivery_point(sk, len, optval,
  								optlen);
  		break;
703315712   Vlad Yasevich   [SCTP]: Implement...
5467
5468
5469
  	case SCTP_MAX_BURST:
  		retval = sctp_getsockopt_maxburst(sk, len, optval, optlen);
  		break;
65b07e5d0   Vlad Yasevich   [SCTP]: API updat...
5470
5471
5472
5473
5474
5475
5476
5477
5478
5479
5480
5481
5482
5483
5484
5485
5486
5487
5488
  	case SCTP_AUTH_KEY:
  	case SCTP_AUTH_CHUNK:
  	case SCTP_AUTH_DELETE_KEY:
  		retval = -EOPNOTSUPP;
  		break;
  	case SCTP_HMAC_IDENT:
  		retval = sctp_getsockopt_hmac_ident(sk, len, optval, optlen);
  		break;
  	case SCTP_AUTH_ACTIVE_KEY:
  		retval = sctp_getsockopt_active_key(sk, len, optval, optlen);
  		break;
  	case SCTP_PEER_AUTH_CHUNKS:
  		retval = sctp_getsockopt_peer_auth_chunks(sk, len, optval,
  							optlen);
  		break;
  	case SCTP_LOCAL_AUTH_CHUNKS:
  		retval = sctp_getsockopt_local_auth_chunks(sk, len, optval,
  							optlen);
  		break;
aea3c5c05   Wei Yongjun   sctp: Implement s...
5489
5490
5491
  	case SCTP_GET_ASSOC_NUMBER:
  		retval = sctp_getsockopt_assoc_number(sk, len, optval, optlen);
  		break;
209ba424c   Wei Yongjun   sctp: implement s...
5492
5493
5494
  	case SCTP_GET_ASSOC_ID_LIST:
  		retval = sctp_getsockopt_assoc_ids(sk, len, optval, optlen);
  		break;
7dc04d712   Michio Honda   sctp: Add socket ...
5495
5496
5497
  	case SCTP_AUTO_ASCONF:
  		retval = sctp_getsockopt_auto_asconf(sk, len, optval, optlen);
  		break;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5498
5499
5500
  	default:
  		retval = -ENOPROTOOPT;
  		break;
3ff50b799   Stephen Hemminger   [NET]: cleanup ex...
5501
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5502
5503
5504
5505
5506
5507
5508
5509
5510
5511
5512
5513
5514
5515
5516
5517
5518
5519
5520
5521
5522
5523
5524
5525
5526
5527
5528
5529
5530
5531
5532
5533
5534
5535
  
  	sctp_release_sock(sk);
  	return retval;
  }
  
  static void sctp_hash(struct sock *sk)
  {
  	/* STUB */
  }
  
  static void sctp_unhash(struct sock *sk)
  {
  	/* STUB */
  }
  
  /* Check if port is acceptable.  Possibly find first available port.
   *
   * The port hash table (contained in the 'global' SCTP protocol storage
   * returned by struct sctp_protocol *sctp_get_protocol()). The hash
   * table is an array of 4096 lists (sctp_bind_hashbucket). Each
   * list (the list number is the port number hashed out, so as you
   * would expect from a hash function, all the ports in a given list have
   * such a number that hashes out to the same list number; you were
   * expecting that, right?); so each list has a set of ports, with a
   * link to the socket (struct sock) that uses it, the port number and
   * a fastreuse flag (FIXME: NPI ipg).
   */
  static struct sctp_bind_bucket *sctp_bucket_create(
  	struct sctp_bind_hashbucket *head, unsigned short snum);
  
  static long sctp_get_port_local(struct sock *sk, union sctp_addr *addr)
  {
  	struct sctp_bind_hashbucket *head; /* hash list */
  	struct sctp_bind_bucket *pp; /* hash list port iterator */
d970dbf84   Vlad Yasevich   SCTP: Convert cus...
5536
  	struct hlist_node *node;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5537
5538
  	unsigned short snum;
  	int ret;
04afd8b28   Al Viro   [SCTP]: Beginning...
5539
  	snum = ntohs(addr->v4.sin_port);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5540
5541
5542
5543
5544
5545
  
  	SCTP_DEBUG_PRINTK("sctp_get_port() begins, snum=%d
  ", snum);
  	sctp_local_bh_disable();
  
  	if (snum == 0) {
063930090   Stephen Hemminger   [SCTP]: port rand...
5546
  		/* Search for an available port. */
227b60f51   Stephen Hemminger   [INET]: local por...
5547
5548
5549
5550
5551
5552
  		int low, high, remaining, index;
  		unsigned int rover;
  
  		inet_get_local_port_range(&low, &high);
  		remaining = (high - low) + 1;
  		rover = net_random() % remaining + low;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5553

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5554
5555
5556
5557
  		do {
  			rover++;
  			if ((rover < low) || (rover > high))
  				rover = low;
e3826f1e9   Amerigo Wang   net: reserve port...
5558
5559
  			if (inet_is_reserved_local_port(rover))
  				continue;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5560
5561
5562
  			index = sctp_phashfn(rover);
  			head = &sctp_port_hashtable[index];
  			sctp_spin_lock(&head->lock);
d970dbf84   Vlad Yasevich   SCTP: Convert cus...
5563
  			sctp_for_each_hentry(pp, node, &head->chain)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5564
5565
5566
5567
5568
5569
  				if (pp->port == rover)
  					goto next;
  			break;
  		next:
  			sctp_spin_unlock(&head->lock);
  		} while (--remaining > 0);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5570
5571
5572
5573
5574
5575
5576
5577
5578
5579
5580
5581
5582
5583
5584
5585
5586
5587
5588
5589
  
  		/* Exhausted local port range during search? */
  		ret = 1;
  		if (remaining <= 0)
  			goto fail;
  
  		/* OK, here is the one we will use.  HEAD (the port
  		 * hash table list entry) is non-NULL and we hold it's
  		 * mutex.
  		 */
  		snum = rover;
  	} else {
  		/* We are given an specific port number; we verify
  		 * that it is not being used. If it is used, we will
  		 * exahust the search in the hash list corresponding
  		 * to the port number (snum) - we detect that with the
  		 * port iterator, pp being NULL.
  		 */
  		head = &sctp_port_hashtable[sctp_phashfn(snum)];
  		sctp_spin_lock(&head->lock);
d970dbf84   Vlad Yasevich   SCTP: Convert cus...
5590
  		sctp_for_each_hentry(pp, node, &head->chain) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5591
5592
5593
5594
5595
5596
5597
5598
5599
5600
5601
5602
5603
5604
5605
  			if (pp->port == snum)
  				goto pp_found;
  		}
  	}
  	pp = NULL;
  	goto pp_not_found;
  pp_found:
  	if (!hlist_empty(&pp->owner)) {
  		/* We had a port hash table hit - there is an
  		 * available port (pp != NULL) and it is being
  		 * used by other socket (pp->owner not empty); that other
  		 * socket is going to be sk2.
  		 */
  		int reuse = sk->sk_reuse;
  		struct sock *sk2;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5606
5607
5608
  
  		SCTP_DEBUG_PRINTK("sctp_get_port() found a possible match
  ");
ce5325c13   Vlad Yasevich   [SCTP]: Fix the S...
5609
5610
  		if (pp->fastreuse && sk->sk_reuse &&
  			sk->sk_state != SCTP_SS_LISTENING)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5611
5612
5613
5614
5615
5616
5617
5618
5619
5620
5621
5622
5623
5624
5625
  			goto success;
  
  		/* Run through the list of sockets bound to the port
  		 * (pp->port) [via the pointers bind_next and
  		 * bind_pprev in the struct sock *sk2 (pp->sk)]. On each one,
  		 * we get the endpoint they describe and run through
  		 * the endpoint's list of IP (v4 or v6) addresses,
  		 * comparing each of the addresses with the address of
  		 * the socket sk. If we find a match, then that means
  		 * that this port/socket (sk) combination are already
  		 * in an endpoint.
  		 */
  		sk_for_each_bound(sk2, node, &pp->owner) {
  			struct sctp_endpoint *ep2;
  			ep2 = sctp_sk(sk2)->ep;
4e54064e0   Vlad Yasevich   sctp: Allow only ...
5626
5627
5628
  			if (sk == sk2 ||
  			    (reuse && sk2->sk_reuse &&
  			     sk2->sk_state != SCTP_SS_LISTENING))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5629
  				continue;
7dab83de5   Vlad Yasevich   sctp: Support ipv...
5630
5631
  			if (sctp_bind_addr_conflict(&ep2->base.bind_addr, addr,
  						 sctp_sk(sk2), sctp_sk(sk))) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5632
5633
5634
5635
5636
5637
5638
5639
5640
5641
5642
5643
5644
5645
5646
5647
5648
  				ret = (long)sk2;
  				goto fail_unlock;
  			}
  		}
  		SCTP_DEBUG_PRINTK("sctp_get_port(): Found a match
  ");
  	}
  pp_not_found:
  	/* If there was a hash table miss, create a new port.  */
  	ret = 1;
  	if (!pp && !(pp = sctp_bucket_create(head, snum)))
  		goto fail_unlock;
  
  	/* In either case (hit or miss), make sure fastreuse is 1 only
  	 * if sk->sk_reuse is too (that is, if the caller requested
  	 * SO_REUSEADDR on this socket -sk-).
  	 */
ce5325c13   Vlad Yasevich   [SCTP]: Fix the S...
5649
5650
5651
5652
5653
5654
5655
  	if (hlist_empty(&pp->owner)) {
  		if (sk->sk_reuse && sk->sk_state != SCTP_SS_LISTENING)
  			pp->fastreuse = 1;
  		else
  			pp->fastreuse = 0;
  	} else if (pp->fastreuse &&
  		(!sk->sk_reuse || sk->sk_state == SCTP_SS_LISTENING))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5656
5657
5658
5659
5660
5661
5662
  		pp->fastreuse = 0;
  
  	/* We are set, so fill up all the data in the hash table
  	 * entry, tie the socket list information with the rest of the
  	 * sockets FIXME: Blurry, NPI (ipg).
  	 */
  success:
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5663
  	if (!sctp_sk(sk)->bind_hash) {
c720c7e83   Eric Dumazet   inet: rename some...
5664
  		inet_sk(sk)->inet_num = snum;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5665
5666
5667
5668
5669
5670
5671
5672
5673
5674
  		sk_add_bind_node(sk, &pp->owner);
  		sctp_sk(sk)->bind_hash = pp;
  	}
  	ret = 0;
  
  fail_unlock:
  	sctp_spin_unlock(&head->lock);
  
  fail:
  	sctp_local_bh_enable();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5675
5676
5677
5678
5679
5680
5681
5682
5683
5684
5685
5686
5687
5688
5689
5690
5691
5692
  	return ret;
  }
  
  /* Assign a 'snum' port to the socket.  If snum == 0, an ephemeral
   * port is requested.
   */
  static int sctp_get_port(struct sock *sk, unsigned short snum)
  {
  	long ret;
  	union sctp_addr addr;
  	struct sctp_af *af = sctp_sk(sk)->pf->af;
  
  	/* Set up a dummy address struct from the sk. */
  	af->from_sk(&addr, sk);
  	addr.v4.sin_port = htons(snum);
  
  	/* Note: sk->sk_num gets filled in if ephemeral port request. */
  	ret = sctp_get_port_local(sk, &addr);
a02cec215   Eric Dumazet   net: return opera...
5693
  	return ret ? 1 : 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5694
5695
5696
  }
  
  /*
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5697
   *  Move a socket to LISTENING state.
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5698
   */
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5699
  SCTP_STATIC int sctp_listen_start(struct sock *sk, int backlog)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5700
5701
5702
  {
  	struct sctp_sock *sp = sctp_sk(sk);
  	struct sctp_endpoint *ep = sp->ep;
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5703
  	struct crypto_hash *tfm = NULL;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5704

5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5705
5706
5707
5708
5709
  	/* Allocate HMAC for generating cookie. */
  	if (!sctp_sk(sk)->hmac && sctp_hmac_alg) {
  		tfm = crypto_alloc_hash(sctp_hmac_alg, 0, CRYPTO_ALG_ASYNC);
  		if (IS_ERR(tfm)) {
  			if (net_ratelimit()) {
145ce502e   Joe Perches   net/sctp: Use pr_...
5710
5711
  				pr_info("failed to load transform for %s: %ld
  ",
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5712
5713
5714
5715
5716
  					sctp_hmac_alg, PTR_ERR(tfm));
  			}
  			return -ENOSYS;
  		}
  		sctp_sk(sk)->hmac = tfm;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5717
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5718
5719
5720
5721
5722
5723
5724
5725
5726
  	/*
  	 * If a bind() or sctp_bindx() is not called prior to a listen()
  	 * call that allows new associations to be accepted, the system
  	 * picks an ephemeral port and will choose an address set equivalent
  	 * to binding with a wildcard address.
  	 *
  	 * This is not currently spelled out in the SCTP sockets
  	 * extensions draft, but follows the practice as seen in TCP
  	 * sockets.
ce5325c13   Vlad Yasevich   [SCTP]: Fix the S...
5727
  	 *
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5728
  	 */
ce5325c13   Vlad Yasevich   [SCTP]: Fix the S...
5729
  	sk->sk_state = SCTP_SS_LISTENING;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5730
5731
5732
  	if (!ep->base.bind_addr.port) {
  		if (sctp_autobind(sk))
  			return -EAGAIN;
4e54064e0   Vlad Yasevich   sctp: Allow only ...
5733
  	} else {
c720c7e83   Eric Dumazet   inet: rename some...
5734
  		if (sctp_get_port(sk, inet_sk(sk)->inet_num)) {
4e54064e0   Vlad Yasevich   sctp: Allow only ...
5735
5736
5737
  			sk->sk_state = SCTP_SS_CLOSED;
  			return -EADDRINUSE;
  		}
4e54064e0   Vlad Yasevich   sctp: Allow only ...
5738
  	}
ce5325c13   Vlad Yasevich   [SCTP]: Fix the S...
5739

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5740
5741
5742
5743
5744
5745
  	sk->sk_max_ack_backlog = backlog;
  	sctp_hash_endpoint(ep);
  	return 0;
  }
  
  /*
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5746
5747
5748
5749
5750
5751
5752
5753
5754
5755
5756
   * 4.1.3 / 5.1.3 listen()
   *
   *   By default, new associations are not accepted for UDP style sockets.
   *   An application uses listen() to mark a socket as being able to
   *   accept new associations.
   *
   *   On TCP style sockets, applications use listen() to ready the SCTP
   *   endpoint for accepting inbound associations.
   *
   *   On both types of endpoints a backlog of '0' disables listening.
   *
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5757
5758
5759
5760
5761
   *  Move a socket to LISTENING state.
   */
  int sctp_inet_listen(struct socket *sock, int backlog)
  {
  	struct sock *sk = sock->sk;
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5762
  	struct sctp_endpoint *ep = sctp_sk(sk)->ep;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5763
5764
5765
  	int err = -EINVAL;
  
  	if (unlikely(backlog < 0))
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5766
  		return err;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5767
5768
  
  	sctp_lock_sock(sk);
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5769
5770
5771
  	/* Peeled-off sockets are not allowed to listen().  */
  	if (sctp_style(sk, UDP_HIGH_BANDWIDTH))
  		goto out;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5772
5773
  	if (sock->state != SS_UNCONNECTED)
  		goto out;
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5774
5775
5776
  	/* If backlog is zero, disable listening. */
  	if (!backlog) {
  		if (sctp_sstate(sk, CLOSED))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5777
  			goto out;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5778

5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5779
5780
5781
5782
5783
5784
  		err = 0;
  		sctp_unhash_endpoint(ep);
  		sk->sk_state = SCTP_SS_CLOSED;
  		if (sk->sk_reuse)
  			sctp_sk(sk)->bind_hash->fastreuse = 1;
  		goto out;
3ff50b799   Stephen Hemminger   [NET]: cleanup ex...
5785
  	}
5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5786
5787
5788
5789
5790
5791
5792
5793
  	/* If we are already listening, just update the backlog */
  	if (sctp_sstate(sk, LISTENING))
  		sk->sk_max_ack_backlog = backlog;
  	else {
  		err = sctp_listen_start(sk, backlog);
  		if (err)
  			goto out;
  	}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5794

5e8f3f703   Vlad Yasevich   sctp: simplify sc...
5795
  	err = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5796
5797
5798
  out:
  	sctp_release_sock(sk);
  	return err;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5799
5800
5801
5802
5803
5804
5805
  }
  
  /*
   * This function is done by modeling the current datagram_poll() and the
   * tcp_poll().  Note that, based on these implementations, we don't
   * lock the socket in this function, even though it seems that,
   * ideally, locking or some other mechanisms can be used to ensure
9bffc4ace   Neil Horman   [SCTP]: Fix sctp ...
5806
   * the integrity of the counters (sndbuf and wmem_alloc) used
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5807
5808
5809
5810
5811
5812
5813
5814
5815
5816
5817
5818
   * in this place.  We assume that we don't need locks either until proven
   * otherwise.
   *
   * Another thing to note is that we include the Async I/O support
   * here, again, by modeling the current TCP/UDP code.  We don't have
   * a good way to test with it yet.
   */
  unsigned int sctp_poll(struct file *file, struct socket *sock, poll_table *wait)
  {
  	struct sock *sk = sock->sk;
  	struct sctp_sock *sp = sctp_sk(sk);
  	unsigned int mask;
aa3951451   Eric Dumazet   net: sk_sleep() h...
5819
  	poll_wait(file, sk_sleep(sk), wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5820
5821
5822
5823
5824
5825
  
  	/* A TCP-style listening socket becomes readable when the accept queue
  	 * is not empty.
  	 */
  	if (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING))
  		return (!list_empty(&sp->ep->asocs)) ?
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
5826
  			(POLLIN | POLLRDNORM) : 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5827
5828
5829
5830
5831
5832
  
  	mask = 0;
  
  	/* Is there any exceptional events?  */
  	if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
  		mask |= POLLERR;
f348d70a3   Davide Libenzi   [PATCH] POLLRDHUP...
5833
  	if (sk->sk_shutdown & RCV_SHUTDOWN)
db40980fc   Eric Dumazet   net: poll() optim...
5834
  		mask |= POLLRDHUP | POLLIN | POLLRDNORM;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5835
5836
5837
5838
  	if (sk->sk_shutdown == SHUTDOWN_MASK)
  		mask |= POLLHUP;
  
  	/* Is it readable?  Reconsider this code with TCP-style support.  */
db40980fc   Eric Dumazet   net: poll() optim...
5839
  	if (!skb_queue_empty(&sk->sk_receive_queue))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5840
5841
5842
5843
5844
5845
5846
5847
5848
5849
5850
5851
5852
5853
5854
5855
5856
5857
5858
5859
5860
5861
5862
5863
5864
5865
5866
5867
5868
5869
5870
5871
5872
  		mask |= POLLIN | POLLRDNORM;
  
  	/* The association is either gone or not ready.  */
  	if (!sctp_style(sk, UDP) && sctp_sstate(sk, CLOSED))
  		return mask;
  
  	/* Is it writable?  */
  	if (sctp_writeable(sk)) {
  		mask |= POLLOUT | POLLWRNORM;
  	} else {
  		set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
  		/*
  		 * Since the socket is not locked, the buffer
  		 * might be made available after the writeable check and
  		 * before the bit is set.  This could cause a lost I/O
  		 * signal.  tcp_poll() has a race breaker for this race
  		 * condition.  Based on their implementation, we put
  		 * in the following code to cover it as well.
  		 */
  		if (sctp_writeable(sk))
  			mask |= POLLOUT | POLLWRNORM;
  	}
  	return mask;
  }
  
  /********************************************************************
   * 2nd Level Abstractions
   ********************************************************************/
  
  static struct sctp_bind_bucket *sctp_bucket_create(
  	struct sctp_bind_hashbucket *head, unsigned short snum)
  {
  	struct sctp_bind_bucket *pp;
54e6ecb23   Christoph Lameter   [PATCH] slab: rem...
5873
  	pp = kmem_cache_alloc(sctp_bucket_cachep, GFP_ATOMIC);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5874
  	if (pp) {
935a7f6e4   Li Zefan   SCTP: fix wrong d...
5875
  		SCTP_DBG_OBJCNT_INC(bind_bucket);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5876
5877
5878
  		pp->port = snum;
  		pp->fastreuse = 0;
  		INIT_HLIST_HEAD(&pp->owner);
d970dbf84   Vlad Yasevich   SCTP: Convert cus...
5879
  		hlist_add_head(&pp->node, &head->chain);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5880
5881
5882
5883
5884
5885
5886
  	}
  	return pp;
  }
  
  /* Caller must hold hashbucket lock for this tb with local BH disabled */
  static void sctp_bucket_destroy(struct sctp_bind_bucket *pp)
  {
37fa6878b   Sridhar Samudrala   [SCTP]: Check for...
5887
  	if (pp && hlist_empty(&pp->owner)) {
d970dbf84   Vlad Yasevich   SCTP: Convert cus...
5888
  		__hlist_del(&pp->node);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5889
5890
5891
5892
5893
5894
5895
5896
5897
  		kmem_cache_free(sctp_bucket_cachep, pp);
  		SCTP_DBG_OBJCNT_DEC(bind_bucket);
  	}
  }
  
  /* Release this socket's reference to a local port.  */
  static inline void __sctp_put_port(struct sock *sk)
  {
  	struct sctp_bind_hashbucket *head =
c720c7e83   Eric Dumazet   inet: rename some...
5898
  		&sctp_port_hashtable[sctp_phashfn(inet_sk(sk)->inet_num)];
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5899
5900
5901
5902
5903
5904
  	struct sctp_bind_bucket *pp;
  
  	sctp_spin_lock(&head->lock);
  	pp = sctp_sk(sk)->bind_hash;
  	__sk_del_bind_node(sk);
  	sctp_sk(sk)->bind_hash = NULL;
c720c7e83   Eric Dumazet   inet: rename some...
5905
  	inet_sk(sk)->inet_num = 0;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5906
5907
5908
5909
5910
5911
5912
5913
5914
5915
5916
5917
5918
5919
5920
5921
5922
5923
5924
5925
5926
  	sctp_bucket_destroy(pp);
  	sctp_spin_unlock(&head->lock);
  }
  
  void sctp_put_port(struct sock *sk)
  {
  	sctp_local_bh_disable();
  	__sctp_put_port(sk);
  	sctp_local_bh_enable();
  }
  
  /*
   * The system picks an ephemeral port and choose an address set equivalent
   * to binding with a wildcard address.
   * One of those addresses will be the primary address for the association.
   * This automatically enables the multihoming capability of SCTP.
   */
  static int sctp_autobind(struct sock *sk)
  {
  	union sctp_addr autoaddr;
  	struct sctp_af *af;
6fbfa9f95   Al Viro   [SCTP]: Annotate ...
5927
  	__be16 port;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5928
5929
5930
  
  	/* Initialize a local sockaddr structure to INADDR_ANY. */
  	af = sctp_sk(sk)->pf->af;
c720c7e83   Eric Dumazet   inet: rename some...
5931
  	port = htons(inet_sk(sk)->inet_num);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5932
5933
5934
5935
5936
5937
5938
5939
5940
5941
5942
5943
5944
5945
5946
5947
5948
5949
5950
5951
5952
5953
5954
5955
5956
5957
5958
5959
5960
5961
5962
5963
5964
5965
5966
5967
5968
5969
5970
5971
5972
5973
5974
5975
5976
5977
5978
5979
  	af->inaddr_any(&autoaddr, port);
  
  	return sctp_do_bind(sk, &autoaddr, af->sockaddr_len);
  }
  
  /* Parse out IPPROTO_SCTP CMSG headers.  Perform only minimal validation.
   *
   * From RFC 2292
   * 4.2 The cmsghdr Structure *
   *
   * When ancillary data is sent or received, any number of ancillary data
   * objects can be specified by the msg_control and msg_controllen members of
   * the msghdr structure, because each object is preceded by
   * a cmsghdr structure defining the object's length (the cmsg_len member).
   * Historically Berkeley-derived implementations have passed only one object
   * at a time, but this API allows multiple objects to be
   * passed in a single call to sendmsg() or recvmsg(). The following example
   * shows two ancillary data objects in a control buffer.
   *
   *   |<--------------------------- msg_controllen -------------------------->|
   *   |                                                                       |
   *
   *   |<----- ancillary data object ----->|<----- ancillary data object ----->|
   *
   *   |<---------- CMSG_SPACE() --------->|<---------- CMSG_SPACE() --------->|
   *   |                                   |                                   |
   *
   *   |<---------- cmsg_len ---------->|  |<--------- cmsg_len ----------->|  |
   *
   *   |<--------- CMSG_LEN() --------->|  |<-------- CMSG_LEN() ---------->|  |
   *   |                                |  |                                |  |
   *
   *   +-----+-----+-----+--+-----------+--+-----+-----+-----+--+-----------+--+
   *   |cmsg_|cmsg_|cmsg_|XX|           |XX|cmsg_|cmsg_|cmsg_|XX|           |XX|
   *
   *   |len  |level|type |XX|cmsg_data[]|XX|len  |level|type |XX|cmsg_data[]|XX|
   *
   *   +-----+-----+-----+--+-----------+--+-----+-----+-----+--+-----------+--+
   *    ^
   *    |
   *
   * msg_control
   * points here
   */
  SCTP_STATIC int sctp_msghdr_parse(const struct msghdr *msg,
  				  sctp_cmsgs_t *cmsgs)
  {
  	struct cmsghdr *cmsg;
ab38fb04c   Vlad Yasevich   [SCTP]: Fix compi...
5980
  	struct msghdr *my_msg = (struct msghdr *)msg;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5981
5982
5983
  
  	for (cmsg = CMSG_FIRSTHDR(msg);
  	     cmsg != NULL;
ab38fb04c   Vlad Yasevich   [SCTP]: Fix compi...
5984
5985
  	     cmsg = CMSG_NXTHDR(my_msg, cmsg)) {
  		if (!CMSG_OK(my_msg, cmsg))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
5986
5987
5988
5989
5990
5991
5992
5993
5994
5995
5996
5997
5998
5999
6000
6001
6002
6003
6004
6005
6006
6007
6008
6009
6010
6011
6012
6013
6014
6015
6016
6017
6018
6019
6020
6021
6022
6023
6024
6025
6026
6027
6028
6029
6030
6031
6032
6033
6034
  			return -EINVAL;
  
  		/* Should we parse this header or ignore?  */
  		if (cmsg->cmsg_level != IPPROTO_SCTP)
  			continue;
  
  		/* Strictly check lengths following example in SCM code.  */
  		switch (cmsg->cmsg_type) {
  		case SCTP_INIT:
  			/* SCTP Socket API Extension
  			 * 5.2.1 SCTP Initiation Structure (SCTP_INIT)
  			 *
  			 * This cmsghdr structure provides information for
  			 * initializing new SCTP associations with sendmsg().
  			 * The SCTP_INITMSG socket option uses this same data
  			 * structure.  This structure is not used for
  			 * recvmsg().
  			 *
  			 * cmsg_level    cmsg_type      cmsg_data[]
  			 * ------------  ------------   ----------------------
  			 * IPPROTO_SCTP  SCTP_INIT      struct sctp_initmsg
  			 */
  			if (cmsg->cmsg_len !=
  			    CMSG_LEN(sizeof(struct sctp_initmsg)))
  				return -EINVAL;
  			cmsgs->init = (struct sctp_initmsg *)CMSG_DATA(cmsg);
  			break;
  
  		case SCTP_SNDRCV:
  			/* SCTP Socket API Extension
  			 * 5.2.2 SCTP Header Information Structure(SCTP_SNDRCV)
  			 *
  			 * This cmsghdr structure specifies SCTP options for
  			 * sendmsg() and describes SCTP header information
  			 * about a received message through recvmsg().
  			 *
  			 * cmsg_level    cmsg_type      cmsg_data[]
  			 * ------------  ------------   ----------------------
  			 * IPPROTO_SCTP  SCTP_SNDRCV    struct sctp_sndrcvinfo
  			 */
  			if (cmsg->cmsg_len !=
  			    CMSG_LEN(sizeof(struct sctp_sndrcvinfo)))
  				return -EINVAL;
  
  			cmsgs->info =
  				(struct sctp_sndrcvinfo *)CMSG_DATA(cmsg);
  
  			/* Minimally, validate the sinfo_flags. */
  			if (cmsgs->info->sinfo_flags &
eaa5c54db   Ivan Skytte Jorgensen   [SCTP] Rename SCT...
6035
6036
  			    ~(SCTP_UNORDERED | SCTP_ADDR_OVER |
  			      SCTP_ABORT | SCTP_EOF))
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6037
6038
6039
6040
6041
  				return -EINVAL;
  			break;
  
  		default:
  			return -EINVAL;
3ff50b799   Stephen Hemminger   [NET]: cleanup ex...
6042
  		}
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6043
6044
6045
6046
6047
6048
6049
6050
6051
6052
6053
6054
6055
  	}
  	return 0;
  }
  
  /*
   * Wait for a packet..
   * Note: This function is the same function as in core/datagram.c
   * with a few modifications to make lksctp work.
   */
  static int sctp_wait_for_packet(struct sock * sk, int *err, long *timeo_p)
  {
  	int error;
  	DEFINE_WAIT(wait);
aa3951451   Eric Dumazet   net: sk_sleep() h...
6056
  	prepare_to_wait_exclusive(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6057
6058
6059
6060
6061
6062
6063
6064
6065
6066
6067
6068
6069
6070
6071
6072
6073
6074
6075
6076
6077
6078
6079
6080
6081
6082
6083
6084
6085
6086
6087
6088
6089
6090
6091
6092
  
  	/* Socket errors? */
  	error = sock_error(sk);
  	if (error)
  		goto out;
  
  	if (!skb_queue_empty(&sk->sk_receive_queue))
  		goto ready;
  
  	/* Socket shut down?  */
  	if (sk->sk_shutdown & RCV_SHUTDOWN)
  		goto out;
  
  	/* Sequenced packets can come disconnected.  If so we report the
  	 * problem.
  	 */
  	error = -ENOTCONN;
  
  	/* Is there a good reason to think that we may receive some data?  */
  	if (list_empty(&sctp_sk(sk)->ep->asocs) && !sctp_sstate(sk, LISTENING))
  		goto out;
  
  	/* Handle signals.  */
  	if (signal_pending(current))
  		goto interrupted;
  
  	/* Let another process have a go.  Since we are going to sleep
  	 * anyway.  Note: This may cause odd behaviors if the message
  	 * does not fit in the user's buffer, but this seems to be the
  	 * only way to honor MSG_DONTWAIT realistically.
  	 */
  	sctp_release_sock(sk);
  	*timeo_p = schedule_timeout(*timeo_p);
  	sctp_lock_sock(sk);
  
  ready:
aa3951451   Eric Dumazet   net: sk_sleep() h...
6093
  	finish_wait(sk_sleep(sk), &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6094
6095
6096
6097
6098
6099
  	return 0;
  
  interrupted:
  	error = sock_intr_errno(*timeo_p);
  
  out:
aa3951451   Eric Dumazet   net: sk_sleep() h...
6100
  	finish_wait(sk_sleep(sk), &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6101
6102
6103
6104
6105
6106
6107
6108
6109
6110
6111
6112
6113
6114
  	*err = error;
  	return error;
  }
  
  /* Receive a datagram.
   * Note: This is pretty much the same routine as in core/datagram.c
   * with a few changes to make lksctp work.
   */
  static struct sk_buff *sctp_skb_recv_datagram(struct sock *sk, int flags,
  					      int noblock, int *err)
  {
  	int error;
  	struct sk_buff *skb;
  	long timeo;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6115
6116
6117
6118
6119
6120
6121
6122
6123
6124
6125
6126
  	timeo = sock_rcvtimeo(sk, noblock);
  
  	SCTP_DEBUG_PRINTK("Timeout: timeo: %ld, MAX: %ld.
  ",
  			  timeo, MAX_SCHEDULE_TIMEOUT);
  
  	do {
  		/* Again only user level code calls this function,
  		 * so nothing interrupt level
  		 * will suddenly eat the receive_queue.
  		 *
  		 *  Look at current nfs client by the way...
8917a3c0b   David Shwatrz   Fix a typo in dat...
6127
  		 *  However, this function was correct in any case. 8)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6128
6129
  		 */
  		if (flags & MSG_PEEK) {
1e061ab2e   Herbert Xu   [SCTP]: Replace s...
6130
  			spin_lock_bh(&sk->sk_receive_queue.lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6131
6132
6133
  			skb = skb_peek(&sk->sk_receive_queue);
  			if (skb)
  				atomic_inc(&skb->users);
1e061ab2e   Herbert Xu   [SCTP]: Replace s...
6134
  			spin_unlock_bh(&sk->sk_receive_queue.lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6135
6136
6137
6138
6139
6140
  		} else {
  			skb = skb_dequeue(&sk->sk_receive_queue);
  		}
  
  		if (skb)
  			return skb;
6736dc35e   Neil Horman   [SCTP]: Return so...
6141
6142
6143
6144
  		/* Caller is allowed not to check sk->sk_err before calling. */
  		error = sock_error(sk);
  		if (error)
  			goto no_packet;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6145
6146
6147
6148
6149
6150
6151
6152
6153
6154
6155
6156
6157
6158
6159
6160
6161
6162
6163
6164
6165
6166
6167
6168
6169
6170
6171
  		if (sk->sk_shutdown & RCV_SHUTDOWN)
  			break;
  
  		/* User doesn't want to wait.  */
  		error = -EAGAIN;
  		if (!timeo)
  			goto no_packet;
  	} while (sctp_wait_for_packet(sk, err, &timeo) == 0);
  
  	return NULL;
  
  no_packet:
  	*err = error;
  	return NULL;
  }
  
  /* If sndbuf has changed, wake up per association sndbuf waiters.  */
  static void __sctp_write_space(struct sctp_association *asoc)
  {
  	struct sock *sk = asoc->base.sk;
  	struct socket *sock = sk->sk_socket;
  
  	if ((sctp_wspace(asoc) > 0) && sock) {
  		if (waitqueue_active(&asoc->wait))
  			wake_up_interruptible(&asoc->wait);
  
  		if (sctp_writeable(sk)) {
eaefd1105   Eric Dumazet   net: add __rcu an...
6172
6173
6174
6175
  			wait_queue_head_t *wq = sk_sleep(sk);
  
  			if (wq && waitqueue_active(wq))
  				wake_up_interruptible(wq);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6176
6177
6178
6179
6180
  
  			/* Note that we try to include the Async I/O support
  			 * here by modeling from the current TCP/UDP code.
  			 * We have not tested with it yet.
  			 */
eaefd1105   Eric Dumazet   net: add __rcu an...
6181
  			if (!(sk->sk_shutdown & SEND_SHUTDOWN))
8d8ad9d7c   Pavel Emelyanov   [NET]: Name magic...
6182
6183
  				sock_wake_async(sock,
  						SOCK_WAKE_SPACE, POLL_OUT);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6184
6185
6186
6187
6188
6189
6190
6191
6192
6193
6194
6195
6196
6197
6198
6199
6200
6201
  		}
  	}
  }
  
  /* Do accounting for the sndbuf space.
   * Decrement the used sndbuf space of the corresponding association by the
   * data size which was just transmitted(freed).
   */
  static void sctp_wfree(struct sk_buff *skb)
  {
  	struct sctp_association *asoc;
  	struct sctp_chunk *chunk;
  	struct sock *sk;
  
  	/* Get the saved chunk pointer.  */
  	chunk = *((struct sctp_chunk **)(skb->cb));
  	asoc = chunk->asoc;
  	sk = asoc->base.sk;
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
6202
6203
6204
  	asoc->sndbuf_used -= SCTP_DATA_SNDSIZE(chunk) +
  				sizeof(struct sk_buff) +
  				sizeof(struct sctp_chunk);
4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
6205
  	atomic_sub(sizeof(struct sctp_chunk), &sk->sk_wmem_alloc);
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6206
  	/*
3ab224be6   Hideo Aoki   [NET] CORE: Intro...
6207
  	 * This undoes what is done via sctp_set_owner_w and sk_mem_charge
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6208
6209
  	 */
  	sk->sk_wmem_queued   -= skb->truesize;
3ab224be6   Hideo Aoki   [NET] CORE: Intro...
6210
  	sk_mem_uncharge(sk, skb->truesize);
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6211

4eb701dfc   Neil Horman   [SCTP] Fix SCTP s...
6212
  	sock_wfree(skb);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6213
6214
6215
6216
  	__sctp_write_space(asoc);
  
  	sctp_association_put(asoc);
  }
331c4ee7f   Vlad Yasevich   [SCTP]: Fix recei...
6217
6218
6219
6220
6221
6222
6223
6224
6225
6226
6227
  /* Do accounting for the receive space on the socket.
   * Accounting for the association is done in ulpevent.c
   * We set this as a destructor for the cloned data skbs so that
   * accounting is done at the correct time.
   */
  void sctp_sock_rfree(struct sk_buff *skb)
  {
  	struct sock *sk = skb->sk;
  	struct sctp_ulpevent *event = sctp_skb2event(skb);
  
  	atomic_sub(event->rmem_len, &sk->sk_rmem_alloc);
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6228
6229
  
  	/*
3ab224be6   Hideo Aoki   [NET] CORE: Intro...
6230
  	 * Mimic the behavior of sock_rfree
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6231
  	 */
3ab224be6   Hideo Aoki   [NET] CORE: Intro...
6232
  	sk_mem_uncharge(sk, event->rmem_len);
331c4ee7f   Vlad Yasevich   [SCTP]: Fix recei...
6233
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6234
6235
6236
6237
6238
6239
6240
6241
6242
6243
6244
  /* Helper function to wait for space in the sndbuf.  */
  static int sctp_wait_for_sndbuf(struct sctp_association *asoc, long *timeo_p,
  				size_t msg_len)
  {
  	struct sock *sk = asoc->base.sk;
  	int err = 0;
  	long current_timeo = *timeo_p;
  	DEFINE_WAIT(wait);
  
  	SCTP_DEBUG_PRINTK("wait_for_sndbuf: asoc=%p, timeo=%ld, msg_len=%zu
  ",
d808ad9ab   YOSHIFUJI Hideaki   [NET] SCTP: Fix w...
6245
  			  asoc, (long)(*timeo_p), msg_len);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6246
6247
6248
6249
6250
6251
6252
6253
6254
6255
6256
6257
6258
6259
6260
6261
6262
6263
6264
6265
6266
6267
6268
  
  	/* Increment the association's refcnt.  */
  	sctp_association_hold(asoc);
  
  	/* Wait on the association specific sndbuf space. */
  	for (;;) {
  		prepare_to_wait_exclusive(&asoc->wait, &wait,
  					  TASK_INTERRUPTIBLE);
  		if (!*timeo_p)
  			goto do_nonblock;
  		if (sk->sk_err || asoc->state >= SCTP_STATE_SHUTDOWN_PENDING ||
  		    asoc->base.dead)
  			goto do_error;
  		if (signal_pending(current))
  			goto do_interrupted;
  		if (msg_len <= sctp_wspace(asoc))
  			break;
  
  		/* Let another process have a go.  Since we are going
  		 * to sleep anyway.
  		 */
  		sctp_release_sock(sk);
  		current_timeo = schedule_timeout(current_timeo);
61c9fed41   Vladislav Yasevich   [SCTP]: A better ...
6269
  		BUG_ON(sk != asoc->base.sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6270
6271
6272
6273
6274
6275
6276
6277
6278
6279
6280
6281
6282
6283
6284
6285
6286
6287
6288
6289
6290
6291
6292
6293
6294
  		sctp_lock_sock(sk);
  
  		*timeo_p = current_timeo;
  	}
  
  out:
  	finish_wait(&asoc->wait, &wait);
  
  	/* Release the association's refcnt.  */
  	sctp_association_put(asoc);
  
  	return err;
  
  do_error:
  	err = -EPIPE;
  	goto out;
  
  do_interrupted:
  	err = sock_intr_errno(*timeo_p);
  	goto out;
  
  do_nonblock:
  	err = -EAGAIN;
  	goto out;
  }
561b1733a   Wei Yongjun   sctp: avoid irq l...
6295
6296
  void sctp_data_ready(struct sock *sk, int len)
  {
7ef527377   David S. Miller   Merge branch 'mas...
6297
6298
6299
6300
6301
6302
  	struct socket_wq *wq;
  
  	rcu_read_lock();
  	wq = rcu_dereference(sk->sk_wq);
  	if (wq_has_sleeper(wq))
  		wake_up_interruptible_sync_poll(&wq->wait, POLLIN |
561b1733a   Wei Yongjun   sctp: avoid irq l...
6303
6304
  						POLLRDNORM | POLLRDBAND);
  	sk_wake_async(sk, SOCK_WAKE_WAITD, POLL_IN);
7ef527377   David S. Miller   Merge branch 'mas...
6305
  	rcu_read_unlock();
561b1733a   Wei Yongjun   sctp: avoid irq l...
6306
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6307
6308
6309
6310
  /* If socket sndbuf has changed, wake up all per association waiters.  */
  void sctp_write_space(struct sock *sk)
  {
  	struct sctp_association *asoc;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6311
6312
  
  	/* Wake up the tasks in each wait queue.  */
9dbc15f05   Robert P. J. Day   [SCTP]: "list_for...
6313
  	list_for_each_entry(asoc, &((sctp_sk(sk))->ep->asocs), asocs) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6314
6315
6316
6317
6318
6319
  		__sctp_write_space(asoc);
  	}
  }
  
  /* Is there any sndbuf space available on the socket?
   *
9bffc4ace   Neil Horman   [SCTP]: Fix sctp ...
6320
   * Note that sk_wmem_alloc is the sum of the send buffers on all of the
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6321
6322
6323
6324
6325
6326
6327
6328
6329
6330
6331
   * associations on the same socket.  For a UDP-style socket with
   * multiple associations, it is possible for it to be "unwriteable"
   * prematurely.  I assume that this is acceptable because
   * a premature "unwriteable" is better than an accidental "writeable" which
   * would cause an unwanted block under certain circumstances.  For the 1-1
   * UDP-style sockets or TCP-style sockets, this code should work.
   *  - Daisy
   */
  static int sctp_writeable(struct sock *sk)
  {
  	int amt = 0;
31e6d363a   Eric Dumazet   net: correct off-...
6332
  	amt = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6333
6334
6335
6336
6337
6338
6339
6340
6341
6342
6343
6344
6345
6346
  	if (amt < 0)
  		amt = 0;
  	return amt;
  }
  
  /* Wait for an association to go into ESTABLISHED state. If timeout is 0,
   * returns immediately with EINPROGRESS.
   */
  static int sctp_wait_for_connect(struct sctp_association *asoc, long *timeo_p)
  {
  	struct sock *sk = asoc->base.sk;
  	int err = 0;
  	long current_timeo = *timeo_p;
  	DEFINE_WAIT(wait);
0dc47877a   Harvey Harrison   net: replace rema...
6347
6348
  	SCTP_DEBUG_PRINTK("%s: asoc=%p, timeo=%ld
  ", __func__, asoc,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6349
6350
6351
6352
6353
6354
6355
6356
6357
6358
6359
6360
6361
6362
6363
6364
6365
6366
6367
6368
6369
6370
6371
6372
6373
6374
6375
6376
6377
6378
6379
6380
6381
6382
6383
6384
6385
6386
6387
6388
  			  (long)(*timeo_p));
  
  	/* Increment the association's refcnt.  */
  	sctp_association_hold(asoc);
  
  	for (;;) {
  		prepare_to_wait_exclusive(&asoc->wait, &wait,
  					  TASK_INTERRUPTIBLE);
  		if (!*timeo_p)
  			goto do_nonblock;
  		if (sk->sk_shutdown & RCV_SHUTDOWN)
  			break;
  		if (sk->sk_err || asoc->state >= SCTP_STATE_SHUTDOWN_PENDING ||
  		    asoc->base.dead)
  			goto do_error;
  		if (signal_pending(current))
  			goto do_interrupted;
  
  		if (sctp_state(asoc, ESTABLISHED))
  			break;
  
  		/* Let another process have a go.  Since we are going
  		 * to sleep anyway.
  		 */
  		sctp_release_sock(sk);
  		current_timeo = schedule_timeout(current_timeo);
  		sctp_lock_sock(sk);
  
  		*timeo_p = current_timeo;
  	}
  
  out:
  	finish_wait(&asoc->wait, &wait);
  
  	/* Release the association's refcnt.  */
  	sctp_association_put(asoc);
  
  	return err;
  
  do_error:
81845c21d   Vlad Yasevich   [SCTP]: correct t...
6389
  	if (asoc->init_err_counter + 1 > asoc->max_init_attempts)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6390
6391
6392
6393
6394
6395
6396
6397
6398
6399
6400
6401
6402
6403
6404
6405
6406
6407
6408
6409
6410
6411
6412
6413
  		err = -ETIMEDOUT;
  	else
  		err = -ECONNREFUSED;
  	goto out;
  
  do_interrupted:
  	err = sock_intr_errno(*timeo_p);
  	goto out;
  
  do_nonblock:
  	err = -EINPROGRESS;
  	goto out;
  }
  
  static int sctp_wait_for_accept(struct sock *sk, long timeo)
  {
  	struct sctp_endpoint *ep;
  	int err = 0;
  	DEFINE_WAIT(wait);
  
  	ep = sctp_sk(sk)->ep;
  
  
  	for (;;) {
aa3951451   Eric Dumazet   net: sk_sleep() h...
6414
  		prepare_to_wait_exclusive(sk_sleep(sk), &wait,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6415
6416
6417
6418
6419
6420
6421
6422
6423
6424
6425
6426
6427
6428
6429
6430
6431
6432
6433
6434
6435
6436
6437
6438
  					  TASK_INTERRUPTIBLE);
  
  		if (list_empty(&ep->asocs)) {
  			sctp_release_sock(sk);
  			timeo = schedule_timeout(timeo);
  			sctp_lock_sock(sk);
  		}
  
  		err = -EINVAL;
  		if (!sctp_sstate(sk, LISTENING))
  			break;
  
  		err = 0;
  		if (!list_empty(&ep->asocs))
  			break;
  
  		err = sock_intr_errno(timeo);
  		if (signal_pending(current))
  			break;
  
  		err = -EAGAIN;
  		if (!timeo)
  			break;
  	}
aa3951451   Eric Dumazet   net: sk_sleep() h...
6439
  	finish_wait(sk_sleep(sk), &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6440
6441
6442
  
  	return err;
  }
046752104   sebastian@breakpoint.cc   sctp: make locall...
6443
  static void sctp_wait_for_close(struct sock *sk, long timeout)
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6444
6445
6446
6447
  {
  	DEFINE_WAIT(wait);
  
  	do {
aa3951451   Eric Dumazet   net: sk_sleep() h...
6448
  		prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6449
6450
6451
6452
6453
6454
  		if (list_empty(&sctp_sk(sk)->ep->asocs))
  			break;
  		sctp_release_sock(sk);
  		timeout = schedule_timeout(timeout);
  		sctp_lock_sock(sk);
  	} while (!signal_pending(current) && timeout);
aa3951451   Eric Dumazet   net: sk_sleep() h...
6455
  	finish_wait(sk_sleep(sk), &wait);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6456
  }
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6457
6458
6459
6460
6461
6462
6463
6464
  static void sctp_skb_set_owner_r_frag(struct sk_buff *skb, struct sock *sk)
  {
  	struct sk_buff *frag;
  
  	if (!skb->data_len)
  		goto done;
  
  	/* Don't forget the fragments. */
1b003be39   David S. Miller   sctp: Use frag li...
6465
  	skb_walk_frags(skb, frag)
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6466
6467
6468
6469
6470
  		sctp_skb_set_owner_r_frag(frag, sk);
  
  done:
  	sctp_skb_set_owner_r(skb, sk);
  }
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
6471
6472
6473
6474
  void sctp_copy_sock(struct sock *newsk, struct sock *sk,
  		    struct sctp_association *asoc)
  {
  	struct inet_sock *inet = inet_sk(sk);
09cb47a2c   Julia Lawall   net/sctp: Elimina...
6475
  	struct inet_sock *newinet;
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
6476
6477
6478
6479
6480
6481
6482
6483
6484
6485
6486
6487
6488
6489
6490
6491
6492
6493
6494
6495
6496
6497
6498
  
  	newsk->sk_type = sk->sk_type;
  	newsk->sk_bound_dev_if = sk->sk_bound_dev_if;
  	newsk->sk_flags = sk->sk_flags;
  	newsk->sk_no_check = sk->sk_no_check;
  	newsk->sk_reuse = sk->sk_reuse;
  
  	newsk->sk_shutdown = sk->sk_shutdown;
  	newsk->sk_destruct = inet_sock_destruct;
  	newsk->sk_family = sk->sk_family;
  	newsk->sk_protocol = IPPROTO_SCTP;
  	newsk->sk_backlog_rcv = sk->sk_prot->backlog_rcv;
  	newsk->sk_sndbuf = sk->sk_sndbuf;
  	newsk->sk_rcvbuf = sk->sk_rcvbuf;
  	newsk->sk_lingertime = sk->sk_lingertime;
  	newsk->sk_rcvtimeo = sk->sk_rcvtimeo;
  	newsk->sk_sndtimeo = sk->sk_sndtimeo;
  
  	newinet = inet_sk(newsk);
  
  	/* Initialize sk's sport, dport, rcv_saddr and daddr for
  	 * getsockname() and getpeername()
  	 */
c720c7e83   Eric Dumazet   inet: rename some...
6499
6500
6501
6502
  	newinet->inet_sport = inet->inet_sport;
  	newinet->inet_saddr = inet->inet_saddr;
  	newinet->inet_rcv_saddr = inet->inet_rcv_saddr;
  	newinet->inet_dport = htons(asoc->peer.port);
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
6503
  	newinet->pmtudisc = inet->pmtudisc;
c720c7e83   Eric Dumazet   inet: rename some...
6504
  	newinet->inet_id = asoc->next_tsn ^ jiffies;
914e1c8b6   Vlad Yasevich   sctp: Inherit all...
6505
6506
6507
6508
6509
6510
6511
  
  	newinet->uc_ttl = inet->uc_ttl;
  	newinet->mc_loop = 1;
  	newinet->mc_ttl = 1;
  	newinet->mc_index = 0;
  	newinet->mc_list = NULL;
  }
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6512
6513
6514
6515
6516
6517
6518
6519
6520
6521
6522
6523
6524
  /* Populate the fields of the newsk from the oldsk and migrate the assoc
   * and its messages to the newsk.
   */
  static void sctp_sock_migrate(struct sock *oldsk, struct sock *newsk,
  			      struct sctp_association *assoc,
  			      sctp_socket_type_t type)
  {
  	struct sctp_sock *oldsp = sctp_sk(oldsk);
  	struct sctp_sock *newsp = sctp_sk(newsk);
  	struct sctp_bind_bucket *pp; /* hash list port iterator */
  	struct sctp_endpoint *newep = newsp->ep;
  	struct sk_buff *skb, *tmp;
  	struct sctp_ulpevent *event;
f26f7c480   Vlad Yasevich   [SCTP]: Add bind ...
6525
  	struct sctp_bind_hashbucket *head;
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
6526
  	struct list_head tmplist;
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6527
6528
6529
6530
6531
6532
6533
  
  	/* Migrate socket buffer sizes and all the socket level options to the
  	 * new socket.
  	 */
  	newsk->sk_sndbuf = oldsk->sk_sndbuf;
  	newsk->sk_rcvbuf = oldsk->sk_rcvbuf;
  	/* Brute force copy old sctp opt. */
9f7d653b6   Michio Honda   sctp: Add Auto-AS...
6534
6535
6536
6537
6538
6539
  	if (oldsp->do_auto_asconf) {
  		memcpy(&tmplist, &newsp->auto_asconf_list, sizeof(tmplist));
  		inet_sk_copy_descendant(newsk, oldsk);
  		memcpy(&newsp->auto_asconf_list, &tmplist, sizeof(tmplist));
  	} else
  		inet_sk_copy_descendant(newsk, oldsk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6540
6541
6542
6543
6544
6545
6546
6547
  
  	/* Restore the ep value that was overwritten with the above structure
  	 * copy.
  	 */
  	newsp->ep = newep;
  	newsp->hmac = NULL;
  
  	/* Hook this new socket in to the bind_hash list. */
c720c7e83   Eric Dumazet   inet: rename some...
6548
  	head = &sctp_port_hashtable[sctp_phashfn(inet_sk(oldsk)->inet_num)];
f26f7c480   Vlad Yasevich   [SCTP]: Add bind ...
6549
6550
  	sctp_local_bh_disable();
  	sctp_spin_lock(&head->lock);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6551
6552
6553
  	pp = sctp_sk(oldsk)->bind_hash;
  	sk_add_bind_node(newsk, &pp->owner);
  	sctp_sk(newsk)->bind_hash = pp;
c720c7e83   Eric Dumazet   inet: rename some...
6554
  	inet_sk(newsk)->inet_num = inet_sk(oldsk)->inet_num;
f26f7c480   Vlad Yasevich   [SCTP]: Add bind ...
6555
6556
  	sctp_spin_unlock(&head->lock);
  	sctp_local_bh_enable();
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6557

4243cac1e   Vladislav Yasevich   [SCTP]: Fix bug i...
6558
6559
6560
  	/* Copy the bind_addr list from the original endpoint to the new
  	 * endpoint so that we can handle restarts properly
  	 */
8e71a11c9   Vlad Yasevich   [SCTP]: Fix the b...
6561
6562
  	sctp_bind_addr_dup(&newsp->ep->base.bind_addr,
  				&oldsp->ep->base.bind_addr, GFP_KERNEL);
4243cac1e   Vladislav Yasevich   [SCTP]: Fix bug i...
6563

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6564
6565
6566
6567
6568
6569
  	/* Move any messages in the old socket's receive queue that are for the
  	 * peeled off association to the new socket's receive queue.
  	 */
  	sctp_skb_for_each(skb, &oldsk->sk_receive_queue, tmp) {
  		event = sctp_skb2event(skb);
  		if (event->asoc == assoc) {
8728b834b   David S. Miller   [NET]: Kill skb->...
6570
  			__skb_unlink(skb, &oldsk->sk_receive_queue);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6571
  			__skb_queue_tail(&newsk->sk_receive_queue, skb);
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6572
  			sctp_skb_set_owner_r_frag(skb, newsk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6573
6574
6575
6576
6577
6578
6579
6580
6581
6582
  		}
  	}
  
  	/* Clean up any messages pending delivery due to partial
  	 * delivery.   Three cases:
  	 * 1) No partial deliver;  no work.
  	 * 2) Peeling off partial delivery; keep pd_lobby in new pd_lobby.
  	 * 3) Peeling off non-partial delivery; move pd_lobby to receive_queue.
  	 */
  	skb_queue_head_init(&newsp->pd_lobby);
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
6583
  	atomic_set(&sctp_sk(newsk)->pd_mode, assoc->ulpq.pd_mode);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6584

b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
6585
  	if (atomic_read(&sctp_sk(oldsk)->pd_mode)) {
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6586
6587
6588
6589
6590
6591
6592
6593
6594
6595
6596
6597
6598
6599
  		struct sk_buff_head *queue;
  
  		/* Decide which queue to move pd_lobby skbs to. */
  		if (assoc->ulpq.pd_mode) {
  			queue = &newsp->pd_lobby;
  		} else
  			queue = &newsk->sk_receive_queue;
  
  		/* Walk through the pd_lobby, looking for skbs that
  		 * need moved to the new socket.
  		 */
  		sctp_skb_for_each(skb, &oldsp->pd_lobby, tmp) {
  			event = sctp_skb2event(skb);
  			if (event->asoc == assoc) {
8728b834b   David S. Miller   [NET]: Kill skb->...
6600
  				__skb_unlink(skb, &oldsp->pd_lobby);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6601
  				__skb_queue_tail(queue, skb);
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6602
  				sctp_skb_set_owner_r_frag(skb, newsk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6603
6604
6605
6606
6607
6608
6609
  			}
  		}
  
  		/* Clear up any skbs waiting for the partial
  		 * delivery to finish.
  		 */
  		if (assoc->ulpq.pd_mode)
b6e1331f3   Vlad Yasevich   [SCTP]: Implement...
6610
  			sctp_clear_pd(oldsk, NULL);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6611
6612
  
  	}
1bc4ee408   Wei Yongjun   sctp: fix warning...
6613
  	sctp_skb_for_each(skb, &assoc->ulpq.reasm, tmp)
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6614
  		sctp_skb_set_owner_r_frag(skb, newsk);
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6615

1bc4ee408   Wei Yongjun   sctp: fix warning...
6616
  	sctp_skb_for_each(skb, &assoc->ulpq.lobby, tmp)
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6617
  		sctp_skb_set_owner_r_frag(skb, newsk);
ea2bc483f   Tsutomu Fujii   [SCTP]: Fix asser...
6618

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6619
6620
6621
6622
6623
  	/* Set the type of socket to indicate that it is peeled off from the
  	 * original UDP-style socket or created with the accept() call on a
  	 * TCP-style socket..
  	 */
  	newsp->type = type;
61c9fed41   Vladislav Yasevich   [SCTP]: A better ...
6624
6625
6626
6627
6628
  	/* Mark the new socket "in-use" by the user so that any packets
  	 * that may arrive on the association after we've moved it are
  	 * queued to the backlog.  This prevents a potential race between
  	 * backlog processing on the old socket and new-packet processing
  	 * on the new socket.
5131a184a   Zach Brown   SCTP: lock_sock_n...
6629
6630
6631
  	 *
  	 * The caller has just allocated newsk so we can guarantee that other
  	 * paths won't try to lock it and then oldsk.
61c9fed41   Vladislav Yasevich   [SCTP]: A better ...
6632
  	 */
5131a184a   Zach Brown   SCTP: lock_sock_n...
6633
  	lock_sock_nested(newsk, SINGLE_DEPTH_NESTING);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6634
6635
6636
6637
6638
6639
6640
6641
6642
  	sctp_assoc_migrate(assoc, newsk);
  
  	/* If the association on the newsk is already closed before accept()
  	 * is called, set RCV_SHUTDOWN flag.
  	 */
  	if (sctp_state(assoc, CLOSED) && sctp_style(newsk, TCP))
  		newsk->sk_shutdown |= RCV_SHUTDOWN;
  
  	newsk->sk_state = SCTP_SS_ESTABLISHED;
61c9fed41   Vladislav Yasevich   [SCTP]: A better ...
6643
  	sctp_release_sock(newsk);
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6644
  }
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6645

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6646
6647
6648
6649
6650
6651
6652
6653
6654
6655
6656
6657
6658
6659
6660
6661
6662
6663
6664
6665
6666
6667
  /* This proto struct describes the ULP interface for SCTP.  */
  struct proto sctp_prot = {
  	.name        =	"SCTP",
  	.owner       =	THIS_MODULE,
  	.close       =	sctp_close,
  	.connect     =	sctp_connect,
  	.disconnect  =	sctp_disconnect,
  	.accept      =	sctp_accept,
  	.ioctl       =	sctp_ioctl,
  	.init        =	sctp_init_sock,
  	.destroy     =	sctp_destroy_sock,
  	.shutdown    =	sctp_shutdown,
  	.setsockopt  =	sctp_setsockopt,
  	.getsockopt  =	sctp_getsockopt,
  	.sendmsg     =	sctp_sendmsg,
  	.recvmsg     =	sctp_recvmsg,
  	.bind        =	sctp_bind,
  	.backlog_rcv =	sctp_backlog_rcv,
  	.hash        =	sctp_hash,
  	.unhash      =	sctp_unhash,
  	.get_port    =	sctp_get_port,
  	.obj_size    =  sizeof(struct sctp_sock),
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6668
6669
6670
6671
6672
6673
  	.sysctl_mem  =  sysctl_sctp_mem,
  	.sysctl_rmem =  sysctl_sctp_rmem,
  	.sysctl_wmem =  sysctl_sctp_wmem,
  	.memory_pressure = &sctp_memory_pressure,
  	.enter_memory_pressure = sctp_enter_memory_pressure,
  	.memory_allocated = &sctp_memory_allocated,
5f31886ff   Pavel Emelyanov   [SCTP]: Pick up a...
6674
  	.sockets_allocated = &sctp_sockets_allocated,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6675
  };
dfd56b8b3   Eric Dumazet   net: use IS_ENABL...
6676
  #if IS_ENABLED(CONFIG_IPV6)
8295b6d9e   Eric Dumazet   [SCTP]: Use the {...
6677

1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6678
6679
6680
6681
6682
6683
6684
6685
6686
6687
6688
6689
6690
6691
6692
6693
6694
6695
6696
6697
6698
  struct proto sctpv6_prot = {
  	.name		= "SCTPv6",
  	.owner		= THIS_MODULE,
  	.close		= sctp_close,
  	.connect	= sctp_connect,
  	.disconnect	= sctp_disconnect,
  	.accept		= sctp_accept,
  	.ioctl		= sctp_ioctl,
  	.init		= sctp_init_sock,
  	.destroy	= sctp_destroy_sock,
  	.shutdown	= sctp_shutdown,
  	.setsockopt	= sctp_setsockopt,
  	.getsockopt	= sctp_getsockopt,
  	.sendmsg	= sctp_sendmsg,
  	.recvmsg	= sctp_recvmsg,
  	.bind		= sctp_bind,
  	.backlog_rcv	= sctp_backlog_rcv,
  	.hash		= sctp_hash,
  	.unhash		= sctp_unhash,
  	.get_port	= sctp_get_port,
  	.obj_size	= sizeof(struct sctp6_sock),
4d93df0ab   Neil Horman   [SCTP]: Rewrite o...
6699
6700
6701
6702
6703
6704
  	.sysctl_mem	= sysctl_sctp_mem,
  	.sysctl_rmem	= sysctl_sctp_rmem,
  	.sysctl_wmem	= sysctl_sctp_wmem,
  	.memory_pressure = &sctp_memory_pressure,
  	.enter_memory_pressure = sctp_enter_memory_pressure,
  	.memory_allocated = &sctp_memory_allocated,
5f31886ff   Pavel Emelyanov   [SCTP]: Pick up a...
6705
  	.sockets_allocated = &sctp_sockets_allocated,
1da177e4c   Linus Torvalds   Linux-2.6.12-rc2
6706
  };
dfd56b8b3   Eric Dumazet   net: use IS_ENABL...
6707
  #endif /* IS_ENABLED(CONFIG_IPV6) */