af_rxrpc.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754
  1. /* AF_RXRPC implementation
  2. *
  3. * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  4. * Written by David Howells (dhowells@redhat.com)
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License
  8. * as published by the Free Software Foundation; either version
  9. * 2 of the License, or (at your option) any later version.
  10. */
  11. #include <linux/module.h>
  12. #include <linux/net.h>
  13. #include <linux/skbuff.h>
  14. #include <linux/poll.h>
  15. #include <linux/proc_fs.h>
  16. #include <net/sock.h>
  17. #include <net/af_rxrpc.h>
  18. #include "ar-internal.h"
  19. MODULE_DESCRIPTION("RxRPC network protocol");
  20. MODULE_AUTHOR("Red Hat, Inc.");
  21. MODULE_LICENSE("GPL");
  22. MODULE_ALIAS_NETPROTO(PF_RXRPC);
  23. unsigned rxrpc_debug; // = RXRPC_DEBUG_KPROTO;
  24. module_param_named(debug, rxrpc_debug, uint, S_IWUSR | S_IRUGO);
  25. MODULE_PARM_DESC(rxrpc_debug, "RxRPC debugging mask");
  26. static int sysctl_rxrpc_max_qlen __read_mostly = 10;
  27. static struct proto rxrpc_proto;
  28. static const struct proto_ops rxrpc_rpc_ops;
  29. /* local epoch for detecting local-end reset */
  30. __be32 rxrpc_epoch;
  31. /* current debugging ID */
  32. atomic_t rxrpc_debug_id;
  33. /* count of skbs currently in use */
  34. atomic_t rxrpc_n_skbs;
  35. static void rxrpc_sock_destructor(struct sock *);
  36. /*
  37. * see if an RxRPC socket is currently writable
  38. */
  39. static inline int rxrpc_writable(struct sock *sk)
  40. {
  41. return atomic_read(&sk->sk_wmem_alloc) < (size_t) sk->sk_sndbuf;
  42. }
  43. /*
  44. * wait for write bufferage to become available
  45. */
  46. static void rxrpc_write_space(struct sock *sk)
  47. {
  48. _enter("%p", sk);
  49. read_lock(&sk->sk_callback_lock);
  50. if (rxrpc_writable(sk)) {
  51. if (sk->sk_sleep && waitqueue_active(sk->sk_sleep))
  52. wake_up_interruptible(sk->sk_sleep);
  53. sk_wake_async(sk, 2, POLL_OUT);
  54. }
  55. read_unlock(&sk->sk_callback_lock);
  56. }
  57. /*
  58. * validate an RxRPC address
  59. */
  60. static int rxrpc_validate_address(struct rxrpc_sock *rx,
  61. struct sockaddr_rxrpc *srx,
  62. int len)
  63. {
  64. if (len < sizeof(struct sockaddr_rxrpc))
  65. return -EINVAL;
  66. if (srx->srx_family != AF_RXRPC)
  67. return -EAFNOSUPPORT;
  68. if (srx->transport_type != SOCK_DGRAM)
  69. return -ESOCKTNOSUPPORT;
  70. len -= offsetof(struct sockaddr_rxrpc, transport);
  71. if (srx->transport_len < sizeof(sa_family_t) ||
  72. srx->transport_len > len)
  73. return -EINVAL;
  74. if (srx->transport.family != rx->proto)
  75. return -EAFNOSUPPORT;
  76. switch (srx->transport.family) {
  77. case AF_INET:
  78. _debug("INET: %x @ %u.%u.%u.%u",
  79. ntohs(srx->transport.sin.sin_port),
  80. NIPQUAD(srx->transport.sin.sin_addr));
  81. if (srx->transport_len > 8)
  82. memset((void *)&srx->transport + 8, 0,
  83. srx->transport_len - 8);
  84. break;
  85. case AF_INET6:
  86. default:
  87. return -EAFNOSUPPORT;
  88. }
  89. return 0;
  90. }
  91. /*
  92. * bind a local address to an RxRPC socket
  93. */
  94. static int rxrpc_bind(struct socket *sock, struct sockaddr *saddr, int len)
  95. {
  96. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) saddr;
  97. struct sock *sk = sock->sk;
  98. struct rxrpc_local *local;
  99. struct rxrpc_sock *rx = rxrpc_sk(sk), *prx;
  100. __be16 service_id;
  101. int ret;
  102. _enter("%p,%p,%d", rx, saddr, len);
  103. ret = rxrpc_validate_address(rx, srx, len);
  104. if (ret < 0)
  105. goto error;
  106. lock_sock(&rx->sk);
  107. if (rx->sk.sk_state != RXRPC_UNCONNECTED) {
  108. ret = -EINVAL;
  109. goto error_unlock;
  110. }
  111. memcpy(&rx->srx, srx, sizeof(rx->srx));
  112. /* find a local transport endpoint if we don't have one already */
  113. local = rxrpc_lookup_local(&rx->srx);
  114. if (IS_ERR(local)) {
  115. ret = PTR_ERR(local);
  116. goto error_unlock;
  117. }
  118. rx->local = local;
  119. if (srx->srx_service) {
  120. service_id = htons(srx->srx_service);
  121. write_lock_bh(&local->services_lock);
  122. list_for_each_entry(prx, &local->services, listen_link) {
  123. if (prx->service_id == service_id)
  124. goto service_in_use;
  125. }
  126. rx->service_id = service_id;
  127. list_add_tail(&rx->listen_link, &local->services);
  128. write_unlock_bh(&local->services_lock);
  129. rx->sk.sk_state = RXRPC_SERVER_BOUND;
  130. } else {
  131. rx->sk.sk_state = RXRPC_CLIENT_BOUND;
  132. }
  133. release_sock(&rx->sk);
  134. _leave(" = 0");
  135. return 0;
  136. service_in_use:
  137. ret = -EADDRINUSE;
  138. write_unlock_bh(&local->services_lock);
  139. error_unlock:
  140. release_sock(&rx->sk);
  141. error:
  142. _leave(" = %d", ret);
  143. return ret;
  144. }
  145. /*
  146. * set the number of pending calls permitted on a listening socket
  147. */
  148. static int rxrpc_listen(struct socket *sock, int backlog)
  149. {
  150. struct sock *sk = sock->sk;
  151. struct rxrpc_sock *rx = rxrpc_sk(sk);
  152. int ret;
  153. _enter("%p,%d", rx, backlog);
  154. lock_sock(&rx->sk);
  155. switch (rx->sk.sk_state) {
  156. case RXRPC_UNCONNECTED:
  157. ret = -EADDRNOTAVAIL;
  158. break;
  159. case RXRPC_CLIENT_BOUND:
  160. case RXRPC_CLIENT_CONNECTED:
  161. default:
  162. ret = -EBUSY;
  163. break;
  164. case RXRPC_SERVER_BOUND:
  165. ASSERT(rx->local != NULL);
  166. sk->sk_max_ack_backlog = backlog;
  167. rx->sk.sk_state = RXRPC_SERVER_LISTENING;
  168. ret = 0;
  169. break;
  170. }
  171. release_sock(&rx->sk);
  172. _leave(" = %d", ret);
  173. return ret;
  174. }
  175. /*
  176. * find a transport by address
  177. */
  178. static struct rxrpc_transport *rxrpc_name_to_transport(struct socket *sock,
  179. struct sockaddr *addr,
  180. int addr_len, int flags)
  181. {
  182. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) addr;
  183. struct rxrpc_transport *trans;
  184. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  185. struct rxrpc_peer *peer;
  186. _enter("%p,%p,%d,%d", rx, addr, addr_len, flags);
  187. ASSERT(rx->local != NULL);
  188. ASSERT(rx->sk.sk_state > RXRPC_UNCONNECTED);
  189. if (rx->srx.transport_type != srx->transport_type)
  190. return ERR_PTR(-ESOCKTNOSUPPORT);
  191. if (rx->srx.transport.family != srx->transport.family)
  192. return ERR_PTR(-EAFNOSUPPORT);
  193. /* find a remote transport endpoint from the local one */
  194. peer = rxrpc_get_peer(srx, GFP_KERNEL);
  195. if (IS_ERR(peer))
  196. return ERR_PTR(PTR_ERR(peer));
  197. /* find a transport */
  198. trans = rxrpc_get_transport(rx->local, peer, GFP_KERNEL);
  199. rxrpc_put_peer(peer);
  200. _leave(" = %p", trans);
  201. return trans;
  202. }
  203. /*
  204. * connect an RxRPC socket
  205. * - this just targets it at a specific destination; no actual connection
  206. * negotiation takes place
  207. */
  208. static int rxrpc_connect(struct socket *sock, struct sockaddr *addr,
  209. int addr_len, int flags)
  210. {
  211. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) addr;
  212. struct sock *sk = sock->sk;
  213. struct rxrpc_transport *trans;
  214. struct rxrpc_local *local;
  215. struct rxrpc_sock *rx = rxrpc_sk(sk);
  216. int ret;
  217. _enter("%p,%p,%d,%d", rx, addr, addr_len, flags);
  218. ret = rxrpc_validate_address(rx, srx, addr_len);
  219. if (ret < 0) {
  220. _leave(" = %d [bad addr]", ret);
  221. return ret;
  222. }
  223. lock_sock(&rx->sk);
  224. switch (rx->sk.sk_state) {
  225. case RXRPC_UNCONNECTED:
  226. /* find a local transport endpoint if we don't have one already */
  227. ASSERTCMP(rx->local, ==, NULL);
  228. rx->srx.srx_family = AF_RXRPC;
  229. rx->srx.srx_service = 0;
  230. rx->srx.transport_type = srx->transport_type;
  231. rx->srx.transport_len = sizeof(sa_family_t);
  232. rx->srx.transport.family = srx->transport.family;
  233. local = rxrpc_lookup_local(&rx->srx);
  234. if (IS_ERR(local)) {
  235. release_sock(&rx->sk);
  236. return PTR_ERR(local);
  237. }
  238. rx->local = local;
  239. rx->sk.sk_state = RXRPC_CLIENT_BOUND;
  240. case RXRPC_CLIENT_BOUND:
  241. break;
  242. case RXRPC_CLIENT_CONNECTED:
  243. release_sock(&rx->sk);
  244. return -EISCONN;
  245. default:
  246. release_sock(&rx->sk);
  247. return -EBUSY; /* server sockets can't connect as well */
  248. }
  249. trans = rxrpc_name_to_transport(sock, addr, addr_len, flags);
  250. if (IS_ERR(trans)) {
  251. release_sock(&rx->sk);
  252. _leave(" = %ld", PTR_ERR(trans));
  253. return PTR_ERR(trans);
  254. }
  255. rx->trans = trans;
  256. rx->service_id = htons(srx->srx_service);
  257. rx->sk.sk_state = RXRPC_CLIENT_CONNECTED;
  258. release_sock(&rx->sk);
  259. return 0;
  260. }
  261. /*
  262. * send a message through an RxRPC socket
  263. * - in a client this does a number of things:
  264. * - finds/sets up a connection for the security specified (if any)
  265. * - initiates a call (ID in control data)
  266. * - ends the request phase of a call (if MSG_MORE is not set)
  267. * - sends a call data packet
  268. * - may send an abort (abort code in control data)
  269. */
  270. static int rxrpc_sendmsg(struct kiocb *iocb, struct socket *sock,
  271. struct msghdr *m, size_t len)
  272. {
  273. struct rxrpc_transport *trans;
  274. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  275. int ret;
  276. _enter(",{%d},,%zu", rx->sk.sk_state, len);
  277. if (m->msg_flags & MSG_OOB)
  278. return -EOPNOTSUPP;
  279. if (m->msg_name) {
  280. ret = rxrpc_validate_address(rx, m->msg_name, m->msg_namelen);
  281. if (ret < 0) {
  282. _leave(" = %d [bad addr]", ret);
  283. return ret;
  284. }
  285. }
  286. trans = NULL;
  287. lock_sock(&rx->sk);
  288. if (m->msg_name) {
  289. ret = -EISCONN;
  290. trans = rxrpc_name_to_transport(sock, m->msg_name,
  291. m->msg_namelen, 0);
  292. if (IS_ERR(trans)) {
  293. ret = PTR_ERR(trans);
  294. trans = NULL;
  295. goto out;
  296. }
  297. } else {
  298. trans = rx->trans;
  299. if (trans)
  300. atomic_inc(&trans->usage);
  301. }
  302. switch (rx->sk.sk_state) {
  303. case RXRPC_SERVER_LISTENING:
  304. if (!m->msg_name) {
  305. ret = rxrpc_server_sendmsg(iocb, rx, m, len);
  306. break;
  307. }
  308. case RXRPC_SERVER_BOUND:
  309. case RXRPC_CLIENT_BOUND:
  310. if (!m->msg_name) {
  311. ret = -ENOTCONN;
  312. break;
  313. }
  314. case RXRPC_CLIENT_CONNECTED:
  315. ret = rxrpc_client_sendmsg(iocb, rx, trans, m, len);
  316. break;
  317. default:
  318. ret = -ENOTCONN;
  319. break;
  320. }
  321. out:
  322. release_sock(&rx->sk);
  323. if (trans)
  324. rxrpc_put_transport(trans);
  325. _leave(" = %d", ret);
  326. return ret;
  327. }
  328. /*
  329. * set RxRPC socket options
  330. */
  331. static int rxrpc_setsockopt(struct socket *sock, int level, int optname,
  332. char __user *optval, int optlen)
  333. {
  334. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  335. unsigned min_sec_level;
  336. int ret;
  337. _enter(",%d,%d,,%d", level, optname, optlen);
  338. lock_sock(&rx->sk);
  339. ret = -EOPNOTSUPP;
  340. if (level == SOL_RXRPC) {
  341. switch (optname) {
  342. case RXRPC_EXCLUSIVE_CONNECTION:
  343. ret = -EINVAL;
  344. if (optlen != 0)
  345. goto error;
  346. ret = -EISCONN;
  347. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  348. goto error;
  349. set_bit(RXRPC_SOCK_EXCLUSIVE_CONN, &rx->flags);
  350. goto success;
  351. case RXRPC_SECURITY_KEY:
  352. ret = -EINVAL;
  353. if (rx->key)
  354. goto error;
  355. ret = -EISCONN;
  356. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  357. goto error;
  358. ret = rxrpc_request_key(rx, optval, optlen);
  359. goto error;
  360. case RXRPC_SECURITY_KEYRING:
  361. ret = -EINVAL;
  362. if (rx->key)
  363. goto error;
  364. ret = -EISCONN;
  365. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  366. goto error;
  367. ret = rxrpc_server_keyring(rx, optval, optlen);
  368. goto error;
  369. case RXRPC_MIN_SECURITY_LEVEL:
  370. ret = -EINVAL;
  371. if (optlen != sizeof(unsigned))
  372. goto error;
  373. ret = -EISCONN;
  374. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  375. goto error;
  376. ret = get_user(min_sec_level,
  377. (unsigned __user *) optval);
  378. if (ret < 0)
  379. goto error;
  380. ret = -EINVAL;
  381. if (min_sec_level > RXRPC_SECURITY_MAX)
  382. goto error;
  383. rx->min_sec_level = min_sec_level;
  384. goto success;
  385. default:
  386. break;
  387. }
  388. }
  389. success:
  390. ret = 0;
  391. error:
  392. release_sock(&rx->sk);
  393. return ret;
  394. }
  395. /*
  396. * permit an RxRPC socket to be polled
  397. */
  398. static unsigned int rxrpc_poll(struct file *file, struct socket *sock,
  399. poll_table *wait)
  400. {
  401. unsigned int mask;
  402. struct sock *sk = sock->sk;
  403. poll_wait(file, sk->sk_sleep, wait);
  404. mask = 0;
  405. /* the socket is readable if there are any messages waiting on the Rx
  406. * queue */
  407. if (!skb_queue_empty(&sk->sk_receive_queue))
  408. mask |= POLLIN | POLLRDNORM;
  409. /* the socket is writable if there is space to add new data to the
  410. * socket; there is no guarantee that any particular call in progress
  411. * on the socket may have space in the Tx ACK window */
  412. if (rxrpc_writable(sk))
  413. mask |= POLLOUT | POLLWRNORM;
  414. return mask;
  415. }
  416. /*
  417. * create an RxRPC socket
  418. */
  419. static int rxrpc_create(struct socket *sock, int protocol)
  420. {
  421. struct rxrpc_sock *rx;
  422. struct sock *sk;
  423. _enter("%p,%d", sock, protocol);
  424. /* we support transport protocol UDP only */
  425. if (protocol != PF_INET)
  426. return -EPROTONOSUPPORT;
  427. if (sock->type != SOCK_DGRAM)
  428. return -ESOCKTNOSUPPORT;
  429. sock->ops = &rxrpc_rpc_ops;
  430. sock->state = SS_UNCONNECTED;
  431. sk = sk_alloc(PF_RXRPC, GFP_KERNEL, &rxrpc_proto, 1);
  432. if (!sk)
  433. return -ENOMEM;
  434. sock_init_data(sock, sk);
  435. sk->sk_state = RXRPC_UNCONNECTED;
  436. sk->sk_write_space = rxrpc_write_space;
  437. sk->sk_max_ack_backlog = sysctl_rxrpc_max_qlen;
  438. sk->sk_destruct = rxrpc_sock_destructor;
  439. rx = rxrpc_sk(sk);
  440. rx->proto = protocol;
  441. rx->calls = RB_ROOT;
  442. INIT_LIST_HEAD(&rx->listen_link);
  443. INIT_LIST_HEAD(&rx->secureq);
  444. INIT_LIST_HEAD(&rx->acceptq);
  445. rwlock_init(&rx->call_lock);
  446. memset(&rx->srx, 0, sizeof(rx->srx));
  447. _leave(" = 0 [%p]", rx);
  448. return 0;
  449. }
  450. /*
  451. * RxRPC socket destructor
  452. */
  453. static void rxrpc_sock_destructor(struct sock *sk)
  454. {
  455. _enter("%p", sk);
  456. rxrpc_purge_queue(&sk->sk_receive_queue);
  457. BUG_TRAP(!atomic_read(&sk->sk_wmem_alloc));
  458. BUG_TRAP(sk_unhashed(sk));
  459. BUG_TRAP(!sk->sk_socket);
  460. if (!sock_flag(sk, SOCK_DEAD)) {
  461. printk("Attempt to release alive rxrpc socket: %p\n", sk);
  462. return;
  463. }
  464. }
  465. /*
  466. * release an RxRPC socket
  467. */
  468. static int rxrpc_release_sock(struct sock *sk)
  469. {
  470. struct rxrpc_sock *rx = rxrpc_sk(sk);
  471. _enter("%p{%d,%d}", sk, sk->sk_state, atomic_read(&sk->sk_refcnt));
  472. /* declare the socket closed for business */
  473. sock_orphan(sk);
  474. sk->sk_shutdown = SHUTDOWN_MASK;
  475. spin_lock_bh(&sk->sk_receive_queue.lock);
  476. sk->sk_state = RXRPC_CLOSE;
  477. spin_unlock_bh(&sk->sk_receive_queue.lock);
  478. ASSERTCMP(rx->listen_link.next, !=, LIST_POISON1);
  479. if (!list_empty(&rx->listen_link)) {
  480. write_lock_bh(&rx->local->services_lock);
  481. list_del(&rx->listen_link);
  482. write_unlock_bh(&rx->local->services_lock);
  483. }
  484. /* try to flush out this socket */
  485. rxrpc_release_calls_on_socket(rx);
  486. flush_scheduled_work();
  487. rxrpc_purge_queue(&sk->sk_receive_queue);
  488. if (rx->conn) {
  489. rxrpc_put_connection(rx->conn);
  490. rx->conn = NULL;
  491. }
  492. if (rx->bundle) {
  493. rxrpc_put_bundle(rx->trans, rx->bundle);
  494. rx->bundle = NULL;
  495. }
  496. if (rx->trans) {
  497. rxrpc_put_transport(rx->trans);
  498. rx->trans = NULL;
  499. }
  500. if (rx->local) {
  501. rxrpc_put_local(rx->local);
  502. rx->local = NULL;
  503. }
  504. key_put(rx->key);
  505. rx->key = NULL;
  506. key_put(rx->securities);
  507. rx->securities = NULL;
  508. sock_put(sk);
  509. _leave(" = 0");
  510. return 0;
  511. }
  512. /*
  513. * release an RxRPC BSD socket on close() or equivalent
  514. */
  515. static int rxrpc_release(struct socket *sock)
  516. {
  517. struct sock *sk = sock->sk;
  518. _enter("%p{%p}", sock, sk);
  519. if (!sk)
  520. return 0;
  521. sock->sk = NULL;
  522. return rxrpc_release_sock(sk);
  523. }
  524. /*
  525. * RxRPC network protocol
  526. */
  527. static const struct proto_ops rxrpc_rpc_ops = {
  528. .family = PF_UNIX,
  529. .owner = THIS_MODULE,
  530. .release = rxrpc_release,
  531. .bind = rxrpc_bind,
  532. .connect = rxrpc_connect,
  533. .socketpair = sock_no_socketpair,
  534. .accept = sock_no_accept,
  535. .getname = sock_no_getname,
  536. .poll = rxrpc_poll,
  537. .ioctl = sock_no_ioctl,
  538. .listen = rxrpc_listen,
  539. .shutdown = sock_no_shutdown,
  540. .setsockopt = rxrpc_setsockopt,
  541. .getsockopt = sock_no_getsockopt,
  542. .sendmsg = rxrpc_sendmsg,
  543. .recvmsg = rxrpc_recvmsg,
  544. .mmap = sock_no_mmap,
  545. .sendpage = sock_no_sendpage,
  546. };
  547. static struct proto rxrpc_proto = {
  548. .name = "RXRPC",
  549. .owner = THIS_MODULE,
  550. .obj_size = sizeof(struct rxrpc_sock),
  551. .max_header = sizeof(struct rxrpc_header),
  552. };
  553. static struct net_proto_family rxrpc_family_ops = {
  554. .family = PF_RXRPC,
  555. .create = rxrpc_create,
  556. .owner = THIS_MODULE,
  557. };
  558. /*
  559. * initialise and register the RxRPC protocol
  560. */
  561. static int __init af_rxrpc_init(void)
  562. {
  563. struct sk_buff *dummy_skb;
  564. int ret = -1;
  565. BUILD_BUG_ON(sizeof(struct rxrpc_skb_priv) > sizeof(dummy_skb->cb));
  566. rxrpc_epoch = htonl(xtime.tv_sec);
  567. rxrpc_call_jar = kmem_cache_create(
  568. "rxrpc_call_jar", sizeof(struct rxrpc_call), 0,
  569. SLAB_HWCACHE_ALIGN, NULL, NULL);
  570. if (!rxrpc_call_jar) {
  571. printk(KERN_NOTICE "RxRPC: Failed to allocate call jar\n");
  572. ret = -ENOMEM;
  573. goto error_call_jar;
  574. }
  575. ret = proto_register(&rxrpc_proto, 1);
  576. if (ret < 0) {
  577. printk(KERN_CRIT "RxRPC: Cannot register protocol\n");
  578. goto error_proto;
  579. }
  580. ret = sock_register(&rxrpc_family_ops);
  581. if (ret < 0) {
  582. printk(KERN_CRIT "RxRPC: Cannot register socket family\n");
  583. goto error_sock;
  584. }
  585. ret = register_key_type(&key_type_rxrpc);
  586. if (ret < 0) {
  587. printk(KERN_CRIT "RxRPC: Cannot register client key type\n");
  588. goto error_key_type;
  589. }
  590. ret = register_key_type(&key_type_rxrpc_s);
  591. if (ret < 0) {
  592. printk(KERN_CRIT "RxRPC: Cannot register server key type\n");
  593. goto error_key_type_s;
  594. }
  595. #ifdef CONFIG_PROC_FS
  596. proc_net_fops_create("rxrpc_calls", 0, &rxrpc_call_seq_fops);
  597. proc_net_fops_create("rxrpc_conns", 0, &rxrpc_connection_seq_fops);
  598. #endif
  599. return 0;
  600. error_key_type_s:
  601. unregister_key_type(&key_type_rxrpc);
  602. error_key_type:
  603. sock_unregister(PF_RXRPC);
  604. error_sock:
  605. proto_unregister(&rxrpc_proto);
  606. error_proto:
  607. kmem_cache_destroy(rxrpc_call_jar);
  608. error_call_jar:
  609. return ret;
  610. }
  611. /*
  612. * unregister the RxRPC protocol
  613. */
  614. static void __exit af_rxrpc_exit(void)
  615. {
  616. _enter("");
  617. unregister_key_type(&key_type_rxrpc_s);
  618. unregister_key_type(&key_type_rxrpc);
  619. sock_unregister(PF_RXRPC);
  620. proto_unregister(&rxrpc_proto);
  621. rxrpc_destroy_all_calls();
  622. rxrpc_destroy_all_connections();
  623. rxrpc_destroy_all_transports();
  624. rxrpc_destroy_all_peers();
  625. rxrpc_destroy_all_locals();
  626. ASSERTCMP(atomic_read(&rxrpc_n_skbs), ==, 0);
  627. _debug("flush scheduled work");
  628. flush_scheduled_work();
  629. proc_net_remove("rxrpc_conns");
  630. proc_net_remove("rxrpc_calls");
  631. kmem_cache_destroy(rxrpc_call_jar);
  632. _leave("");
  633. }
  634. module_init(af_rxrpc_init);
  635. module_exit(af_rxrpc_exit);