af_rxrpc.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885
  1. /* AF_RXRPC implementation
  2. *
  3. * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  4. * Written by David Howells (dhowells@redhat.com)
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU General Public License
  8. * as published by the Free Software Foundation; either version
  9. * 2 of the License, or (at your option) any later version.
  10. */
  11. #include <linux/module.h>
  12. #include <linux/net.h>
  13. #include <linux/skbuff.h>
  14. #include <linux/poll.h>
  15. #include <linux/proc_fs.h>
  16. #include <linux/key-type.h>
  17. #include <net/net_namespace.h>
  18. #include <net/sock.h>
  19. #include <net/af_rxrpc.h>
  20. #include "ar-internal.h"
  21. MODULE_DESCRIPTION("RxRPC network protocol");
  22. MODULE_AUTHOR("Red Hat, Inc.");
  23. MODULE_LICENSE("GPL");
  24. MODULE_ALIAS_NETPROTO(PF_RXRPC);
  25. unsigned rxrpc_debug; // = RXRPC_DEBUG_KPROTO;
  26. module_param_named(debug, rxrpc_debug, uint, S_IWUSR | S_IRUGO);
  27. MODULE_PARM_DESC(debug, "RxRPC debugging mask");
  28. static int sysctl_rxrpc_max_qlen __read_mostly = 10;
  29. static struct proto rxrpc_proto;
  30. static const struct proto_ops rxrpc_rpc_ops;
  31. /* local epoch for detecting local-end reset */
  32. __be32 rxrpc_epoch;
  33. /* current debugging ID */
  34. atomic_t rxrpc_debug_id;
  35. /* count of skbs currently in use */
  36. atomic_t rxrpc_n_skbs;
  37. struct workqueue_struct *rxrpc_workqueue;
  38. static void rxrpc_sock_destructor(struct sock *);
  39. /*
  40. * see if an RxRPC socket is currently writable
  41. */
  42. static inline int rxrpc_writable(struct sock *sk)
  43. {
  44. return atomic_read(&sk->sk_wmem_alloc) < (size_t) sk->sk_sndbuf;
  45. }
  46. /*
  47. * wait for write bufferage to become available
  48. */
  49. static void rxrpc_write_space(struct sock *sk)
  50. {
  51. _enter("%p", sk);
  52. read_lock(&sk->sk_callback_lock);
  53. if (rxrpc_writable(sk)) {
  54. if (sk->sk_sleep && waitqueue_active(sk->sk_sleep))
  55. wake_up_interruptible(sk->sk_sleep);
  56. sk_wake_async(sk, SOCK_WAKE_SPACE, POLL_OUT);
  57. }
  58. read_unlock(&sk->sk_callback_lock);
  59. }
  60. /*
  61. * validate an RxRPC address
  62. */
  63. static int rxrpc_validate_address(struct rxrpc_sock *rx,
  64. struct sockaddr_rxrpc *srx,
  65. int len)
  66. {
  67. if (len < sizeof(struct sockaddr_rxrpc))
  68. return -EINVAL;
  69. if (srx->srx_family != AF_RXRPC)
  70. return -EAFNOSUPPORT;
  71. if (srx->transport_type != SOCK_DGRAM)
  72. return -ESOCKTNOSUPPORT;
  73. len -= offsetof(struct sockaddr_rxrpc, transport);
  74. if (srx->transport_len < sizeof(sa_family_t) ||
  75. srx->transport_len > len)
  76. return -EINVAL;
  77. if (srx->transport.family != rx->proto)
  78. return -EAFNOSUPPORT;
  79. switch (srx->transport.family) {
  80. case AF_INET:
  81. _debug("INET: %x @ %pI4",
  82. ntohs(srx->transport.sin.sin_port),
  83. &srx->transport.sin.sin_addr);
  84. if (srx->transport_len > 8)
  85. memset((void *)&srx->transport + 8, 0,
  86. srx->transport_len - 8);
  87. break;
  88. case AF_INET6:
  89. default:
  90. return -EAFNOSUPPORT;
  91. }
  92. return 0;
  93. }
  94. /*
  95. * bind a local address to an RxRPC socket
  96. */
  97. static int rxrpc_bind(struct socket *sock, struct sockaddr *saddr, int len)
  98. {
  99. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) saddr;
  100. struct sock *sk = sock->sk;
  101. struct rxrpc_local *local;
  102. struct rxrpc_sock *rx = rxrpc_sk(sk), *prx;
  103. __be16 service_id;
  104. int ret;
  105. _enter("%p,%p,%d", rx, saddr, len);
  106. ret = rxrpc_validate_address(rx, srx, len);
  107. if (ret < 0)
  108. goto error;
  109. lock_sock(&rx->sk);
  110. if (rx->sk.sk_state != RXRPC_UNCONNECTED) {
  111. ret = -EINVAL;
  112. goto error_unlock;
  113. }
  114. memcpy(&rx->srx, srx, sizeof(rx->srx));
  115. /* find a local transport endpoint if we don't have one already */
  116. local = rxrpc_lookup_local(&rx->srx);
  117. if (IS_ERR(local)) {
  118. ret = PTR_ERR(local);
  119. goto error_unlock;
  120. }
  121. rx->local = local;
  122. if (srx->srx_service) {
  123. service_id = htons(srx->srx_service);
  124. write_lock_bh(&local->services_lock);
  125. list_for_each_entry(prx, &local->services, listen_link) {
  126. if (prx->service_id == service_id)
  127. goto service_in_use;
  128. }
  129. rx->service_id = service_id;
  130. list_add_tail(&rx->listen_link, &local->services);
  131. write_unlock_bh(&local->services_lock);
  132. rx->sk.sk_state = RXRPC_SERVER_BOUND;
  133. } else {
  134. rx->sk.sk_state = RXRPC_CLIENT_BOUND;
  135. }
  136. release_sock(&rx->sk);
  137. _leave(" = 0");
  138. return 0;
  139. service_in_use:
  140. ret = -EADDRINUSE;
  141. write_unlock_bh(&local->services_lock);
  142. error_unlock:
  143. release_sock(&rx->sk);
  144. error:
  145. _leave(" = %d", ret);
  146. return ret;
  147. }
  148. /*
  149. * set the number of pending calls permitted on a listening socket
  150. */
  151. static int rxrpc_listen(struct socket *sock, int backlog)
  152. {
  153. struct sock *sk = sock->sk;
  154. struct rxrpc_sock *rx = rxrpc_sk(sk);
  155. int ret;
  156. _enter("%p,%d", rx, backlog);
  157. lock_sock(&rx->sk);
  158. switch (rx->sk.sk_state) {
  159. case RXRPC_UNCONNECTED:
  160. ret = -EADDRNOTAVAIL;
  161. break;
  162. case RXRPC_CLIENT_BOUND:
  163. case RXRPC_CLIENT_CONNECTED:
  164. default:
  165. ret = -EBUSY;
  166. break;
  167. case RXRPC_SERVER_BOUND:
  168. ASSERT(rx->local != NULL);
  169. sk->sk_max_ack_backlog = backlog;
  170. rx->sk.sk_state = RXRPC_SERVER_LISTENING;
  171. ret = 0;
  172. break;
  173. }
  174. release_sock(&rx->sk);
  175. _leave(" = %d", ret);
  176. return ret;
  177. }
  178. /*
  179. * find a transport by address
  180. */
  181. static struct rxrpc_transport *rxrpc_name_to_transport(struct socket *sock,
  182. struct sockaddr *addr,
  183. int addr_len, int flags,
  184. gfp_t gfp)
  185. {
  186. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) addr;
  187. struct rxrpc_transport *trans;
  188. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  189. struct rxrpc_peer *peer;
  190. _enter("%p,%p,%d,%d", rx, addr, addr_len, flags);
  191. ASSERT(rx->local != NULL);
  192. ASSERT(rx->sk.sk_state > RXRPC_UNCONNECTED);
  193. if (rx->srx.transport_type != srx->transport_type)
  194. return ERR_PTR(-ESOCKTNOSUPPORT);
  195. if (rx->srx.transport.family != srx->transport.family)
  196. return ERR_PTR(-EAFNOSUPPORT);
  197. /* find a remote transport endpoint from the local one */
  198. peer = rxrpc_get_peer(srx, gfp);
  199. if (IS_ERR(peer))
  200. return ERR_CAST(peer);
  201. /* find a transport */
  202. trans = rxrpc_get_transport(rx->local, peer, gfp);
  203. rxrpc_put_peer(peer);
  204. _leave(" = %p", trans);
  205. return trans;
  206. }
  207. /**
  208. * rxrpc_kernel_begin_call - Allow a kernel service to begin a call
  209. * @sock: The socket on which to make the call
  210. * @srx: The address of the peer to contact (defaults to socket setting)
  211. * @key: The security context to use (defaults to socket setting)
  212. * @user_call_ID: The ID to use
  213. *
  214. * Allow a kernel service to begin a call on the nominated socket. This just
  215. * sets up all the internal tracking structures and allocates connection and
  216. * call IDs as appropriate. The call to be used is returned.
  217. *
  218. * The default socket destination address and security may be overridden by
  219. * supplying @srx and @key.
  220. */
  221. struct rxrpc_call *rxrpc_kernel_begin_call(struct socket *sock,
  222. struct sockaddr_rxrpc *srx,
  223. struct key *key,
  224. unsigned long user_call_ID,
  225. gfp_t gfp)
  226. {
  227. struct rxrpc_conn_bundle *bundle;
  228. struct rxrpc_transport *trans;
  229. struct rxrpc_call *call;
  230. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  231. __be16 service_id;
  232. _enter(",,%x,%lx", key_serial(key), user_call_ID);
  233. lock_sock(&rx->sk);
  234. if (srx) {
  235. trans = rxrpc_name_to_transport(sock, (struct sockaddr *) srx,
  236. sizeof(*srx), 0, gfp);
  237. if (IS_ERR(trans)) {
  238. call = ERR_CAST(trans);
  239. trans = NULL;
  240. goto out_notrans;
  241. }
  242. } else {
  243. trans = rx->trans;
  244. if (!trans) {
  245. call = ERR_PTR(-ENOTCONN);
  246. goto out_notrans;
  247. }
  248. atomic_inc(&trans->usage);
  249. }
  250. service_id = rx->service_id;
  251. if (srx)
  252. service_id = htons(srx->srx_service);
  253. if (!key)
  254. key = rx->key;
  255. if (key && !key->payload.data)
  256. key = NULL; /* a no-security key */
  257. bundle = rxrpc_get_bundle(rx, trans, key, service_id, gfp);
  258. if (IS_ERR(bundle)) {
  259. call = ERR_CAST(bundle);
  260. goto out;
  261. }
  262. call = rxrpc_get_client_call(rx, trans, bundle, user_call_ID, true,
  263. gfp);
  264. rxrpc_put_bundle(trans, bundle);
  265. out:
  266. rxrpc_put_transport(trans);
  267. out_notrans:
  268. release_sock(&rx->sk);
  269. _leave(" = %p", call);
  270. return call;
  271. }
  272. EXPORT_SYMBOL(rxrpc_kernel_begin_call);
  273. /**
  274. * rxrpc_kernel_end_call - Allow a kernel service to end a call it was using
  275. * @call: The call to end
  276. *
  277. * Allow a kernel service to end a call it was using. The call must be
  278. * complete before this is called (the call should be aborted if necessary).
  279. */
  280. void rxrpc_kernel_end_call(struct rxrpc_call *call)
  281. {
  282. _enter("%d{%d}", call->debug_id, atomic_read(&call->usage));
  283. rxrpc_remove_user_ID(call->socket, call);
  284. rxrpc_put_call(call);
  285. }
  286. EXPORT_SYMBOL(rxrpc_kernel_end_call);
  287. /**
  288. * rxrpc_kernel_intercept_rx_messages - Intercept received RxRPC messages
  289. * @sock: The socket to intercept received messages on
  290. * @interceptor: The function to pass the messages to
  291. *
  292. * Allow a kernel service to intercept messages heading for the Rx queue on an
  293. * RxRPC socket. They get passed to the specified function instead.
  294. * @interceptor should free the socket buffers it is given. @interceptor is
  295. * called with the socket receive queue spinlock held and softirqs disabled -
  296. * this ensures that the messages will be delivered in the right order.
  297. */
  298. void rxrpc_kernel_intercept_rx_messages(struct socket *sock,
  299. rxrpc_interceptor_t interceptor)
  300. {
  301. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  302. _enter("");
  303. rx->interceptor = interceptor;
  304. }
  305. EXPORT_SYMBOL(rxrpc_kernel_intercept_rx_messages);
  306. /*
  307. * connect an RxRPC socket
  308. * - this just targets it at a specific destination; no actual connection
  309. * negotiation takes place
  310. */
  311. static int rxrpc_connect(struct socket *sock, struct sockaddr *addr,
  312. int addr_len, int flags)
  313. {
  314. struct sockaddr_rxrpc *srx = (struct sockaddr_rxrpc *) addr;
  315. struct sock *sk = sock->sk;
  316. struct rxrpc_transport *trans;
  317. struct rxrpc_local *local;
  318. struct rxrpc_sock *rx = rxrpc_sk(sk);
  319. int ret;
  320. _enter("%p,%p,%d,%d", rx, addr, addr_len, flags);
  321. ret = rxrpc_validate_address(rx, srx, addr_len);
  322. if (ret < 0) {
  323. _leave(" = %d [bad addr]", ret);
  324. return ret;
  325. }
  326. lock_sock(&rx->sk);
  327. switch (rx->sk.sk_state) {
  328. case RXRPC_UNCONNECTED:
  329. /* find a local transport endpoint if we don't have one already */
  330. ASSERTCMP(rx->local, ==, NULL);
  331. rx->srx.srx_family = AF_RXRPC;
  332. rx->srx.srx_service = 0;
  333. rx->srx.transport_type = srx->transport_type;
  334. rx->srx.transport_len = sizeof(sa_family_t);
  335. rx->srx.transport.family = srx->transport.family;
  336. local = rxrpc_lookup_local(&rx->srx);
  337. if (IS_ERR(local)) {
  338. release_sock(&rx->sk);
  339. return PTR_ERR(local);
  340. }
  341. rx->local = local;
  342. rx->sk.sk_state = RXRPC_CLIENT_BOUND;
  343. case RXRPC_CLIENT_BOUND:
  344. break;
  345. case RXRPC_CLIENT_CONNECTED:
  346. release_sock(&rx->sk);
  347. return -EISCONN;
  348. default:
  349. release_sock(&rx->sk);
  350. return -EBUSY; /* server sockets can't connect as well */
  351. }
  352. trans = rxrpc_name_to_transport(sock, addr, addr_len, flags,
  353. GFP_KERNEL);
  354. if (IS_ERR(trans)) {
  355. release_sock(&rx->sk);
  356. _leave(" = %ld", PTR_ERR(trans));
  357. return PTR_ERR(trans);
  358. }
  359. rx->trans = trans;
  360. rx->service_id = htons(srx->srx_service);
  361. rx->sk.sk_state = RXRPC_CLIENT_CONNECTED;
  362. release_sock(&rx->sk);
  363. return 0;
  364. }
  365. /*
  366. * send a message through an RxRPC socket
  367. * - in a client this does a number of things:
  368. * - finds/sets up a connection for the security specified (if any)
  369. * - initiates a call (ID in control data)
  370. * - ends the request phase of a call (if MSG_MORE is not set)
  371. * - sends a call data packet
  372. * - may send an abort (abort code in control data)
  373. */
  374. static int rxrpc_sendmsg(struct kiocb *iocb, struct socket *sock,
  375. struct msghdr *m, size_t len)
  376. {
  377. struct rxrpc_transport *trans;
  378. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  379. int ret;
  380. _enter(",{%d},,%zu", rx->sk.sk_state, len);
  381. if (m->msg_flags & MSG_OOB)
  382. return -EOPNOTSUPP;
  383. if (m->msg_name) {
  384. ret = rxrpc_validate_address(rx, m->msg_name, m->msg_namelen);
  385. if (ret < 0) {
  386. _leave(" = %d [bad addr]", ret);
  387. return ret;
  388. }
  389. }
  390. trans = NULL;
  391. lock_sock(&rx->sk);
  392. if (m->msg_name) {
  393. ret = -EISCONN;
  394. trans = rxrpc_name_to_transport(sock, m->msg_name,
  395. m->msg_namelen, 0, GFP_KERNEL);
  396. if (IS_ERR(trans)) {
  397. ret = PTR_ERR(trans);
  398. trans = NULL;
  399. goto out;
  400. }
  401. } else {
  402. trans = rx->trans;
  403. if (trans)
  404. atomic_inc(&trans->usage);
  405. }
  406. switch (rx->sk.sk_state) {
  407. case RXRPC_SERVER_LISTENING:
  408. if (!m->msg_name) {
  409. ret = rxrpc_server_sendmsg(iocb, rx, m, len);
  410. break;
  411. }
  412. case RXRPC_SERVER_BOUND:
  413. case RXRPC_CLIENT_BOUND:
  414. if (!m->msg_name) {
  415. ret = -ENOTCONN;
  416. break;
  417. }
  418. case RXRPC_CLIENT_CONNECTED:
  419. ret = rxrpc_client_sendmsg(iocb, rx, trans, m, len);
  420. break;
  421. default:
  422. ret = -ENOTCONN;
  423. break;
  424. }
  425. out:
  426. release_sock(&rx->sk);
  427. if (trans)
  428. rxrpc_put_transport(trans);
  429. _leave(" = %d", ret);
  430. return ret;
  431. }
  432. /*
  433. * set RxRPC socket options
  434. */
  435. static int rxrpc_setsockopt(struct socket *sock, int level, int optname,
  436. char __user *optval, int optlen)
  437. {
  438. struct rxrpc_sock *rx = rxrpc_sk(sock->sk);
  439. unsigned min_sec_level;
  440. int ret;
  441. _enter(",%d,%d,,%d", level, optname, optlen);
  442. lock_sock(&rx->sk);
  443. ret = -EOPNOTSUPP;
  444. if (level == SOL_RXRPC) {
  445. switch (optname) {
  446. case RXRPC_EXCLUSIVE_CONNECTION:
  447. ret = -EINVAL;
  448. if (optlen != 0)
  449. goto error;
  450. ret = -EISCONN;
  451. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  452. goto error;
  453. set_bit(RXRPC_SOCK_EXCLUSIVE_CONN, &rx->flags);
  454. goto success;
  455. case RXRPC_SECURITY_KEY:
  456. ret = -EINVAL;
  457. if (rx->key)
  458. goto error;
  459. ret = -EISCONN;
  460. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  461. goto error;
  462. ret = rxrpc_request_key(rx, optval, optlen);
  463. goto error;
  464. case RXRPC_SECURITY_KEYRING:
  465. ret = -EINVAL;
  466. if (rx->key)
  467. goto error;
  468. ret = -EISCONN;
  469. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  470. goto error;
  471. ret = rxrpc_server_keyring(rx, optval, optlen);
  472. goto error;
  473. case RXRPC_MIN_SECURITY_LEVEL:
  474. ret = -EINVAL;
  475. if (optlen != sizeof(unsigned))
  476. goto error;
  477. ret = -EISCONN;
  478. if (rx->sk.sk_state != RXRPC_UNCONNECTED)
  479. goto error;
  480. ret = get_user(min_sec_level,
  481. (unsigned __user *) optval);
  482. if (ret < 0)
  483. goto error;
  484. ret = -EINVAL;
  485. if (min_sec_level > RXRPC_SECURITY_MAX)
  486. goto error;
  487. rx->min_sec_level = min_sec_level;
  488. goto success;
  489. default:
  490. break;
  491. }
  492. }
  493. success:
  494. ret = 0;
  495. error:
  496. release_sock(&rx->sk);
  497. return ret;
  498. }
  499. /*
  500. * permit an RxRPC socket to be polled
  501. */
  502. static unsigned int rxrpc_poll(struct file *file, struct socket *sock,
  503. poll_table *wait)
  504. {
  505. unsigned int mask;
  506. struct sock *sk = sock->sk;
  507. poll_wait(file, sk->sk_sleep, wait);
  508. mask = 0;
  509. /* the socket is readable if there are any messages waiting on the Rx
  510. * queue */
  511. if (!skb_queue_empty(&sk->sk_receive_queue))
  512. mask |= POLLIN | POLLRDNORM;
  513. /* the socket is writable if there is space to add new data to the
  514. * socket; there is no guarantee that any particular call in progress
  515. * on the socket may have space in the Tx ACK window */
  516. if (rxrpc_writable(sk))
  517. mask |= POLLOUT | POLLWRNORM;
  518. return mask;
  519. }
  520. /*
  521. * create an RxRPC socket
  522. */
  523. static int rxrpc_create(struct net *net, struct socket *sock, int protocol)
  524. {
  525. struct rxrpc_sock *rx;
  526. struct sock *sk;
  527. _enter("%p,%d", sock, protocol);
  528. if (net != &init_net)
  529. return -EAFNOSUPPORT;
  530. /* we support transport protocol UDP only */
  531. if (protocol != PF_INET)
  532. return -EPROTONOSUPPORT;
  533. if (sock->type != SOCK_DGRAM)
  534. return -ESOCKTNOSUPPORT;
  535. sock->ops = &rxrpc_rpc_ops;
  536. sock->state = SS_UNCONNECTED;
  537. sk = sk_alloc(net, PF_RXRPC, GFP_KERNEL, &rxrpc_proto);
  538. if (!sk)
  539. return -ENOMEM;
  540. sock_init_data(sock, sk);
  541. sk->sk_state = RXRPC_UNCONNECTED;
  542. sk->sk_write_space = rxrpc_write_space;
  543. sk->sk_max_ack_backlog = sysctl_rxrpc_max_qlen;
  544. sk->sk_destruct = rxrpc_sock_destructor;
  545. rx = rxrpc_sk(sk);
  546. rx->proto = protocol;
  547. rx->calls = RB_ROOT;
  548. INIT_LIST_HEAD(&rx->listen_link);
  549. INIT_LIST_HEAD(&rx->secureq);
  550. INIT_LIST_HEAD(&rx->acceptq);
  551. rwlock_init(&rx->call_lock);
  552. memset(&rx->srx, 0, sizeof(rx->srx));
  553. _leave(" = 0 [%p]", rx);
  554. return 0;
  555. }
  556. /*
  557. * RxRPC socket destructor
  558. */
  559. static void rxrpc_sock_destructor(struct sock *sk)
  560. {
  561. _enter("%p", sk);
  562. rxrpc_purge_queue(&sk->sk_receive_queue);
  563. WARN_ON(atomic_read(&sk->sk_wmem_alloc));
  564. WARN_ON(!sk_unhashed(sk));
  565. WARN_ON(sk->sk_socket);
  566. if (!sock_flag(sk, SOCK_DEAD)) {
  567. printk("Attempt to release alive rxrpc socket: %p\n", sk);
  568. return;
  569. }
  570. }
  571. /*
  572. * release an RxRPC socket
  573. */
  574. static int rxrpc_release_sock(struct sock *sk)
  575. {
  576. struct rxrpc_sock *rx = rxrpc_sk(sk);
  577. _enter("%p{%d,%d}", sk, sk->sk_state, atomic_read(&sk->sk_refcnt));
  578. /* declare the socket closed for business */
  579. sock_orphan(sk);
  580. sk->sk_shutdown = SHUTDOWN_MASK;
  581. spin_lock_bh(&sk->sk_receive_queue.lock);
  582. sk->sk_state = RXRPC_CLOSE;
  583. spin_unlock_bh(&sk->sk_receive_queue.lock);
  584. ASSERTCMP(rx->listen_link.next, !=, LIST_POISON1);
  585. if (!list_empty(&rx->listen_link)) {
  586. write_lock_bh(&rx->local->services_lock);
  587. list_del(&rx->listen_link);
  588. write_unlock_bh(&rx->local->services_lock);
  589. }
  590. /* try to flush out this socket */
  591. rxrpc_release_calls_on_socket(rx);
  592. flush_workqueue(rxrpc_workqueue);
  593. rxrpc_purge_queue(&sk->sk_receive_queue);
  594. if (rx->conn) {
  595. rxrpc_put_connection(rx->conn);
  596. rx->conn = NULL;
  597. }
  598. if (rx->bundle) {
  599. rxrpc_put_bundle(rx->trans, rx->bundle);
  600. rx->bundle = NULL;
  601. }
  602. if (rx->trans) {
  603. rxrpc_put_transport(rx->trans);
  604. rx->trans = NULL;
  605. }
  606. if (rx->local) {
  607. rxrpc_put_local(rx->local);
  608. rx->local = NULL;
  609. }
  610. key_put(rx->key);
  611. rx->key = NULL;
  612. key_put(rx->securities);
  613. rx->securities = NULL;
  614. sock_put(sk);
  615. _leave(" = 0");
  616. return 0;
  617. }
  618. /*
  619. * release an RxRPC BSD socket on close() or equivalent
  620. */
  621. static int rxrpc_release(struct socket *sock)
  622. {
  623. struct sock *sk = sock->sk;
  624. _enter("%p{%p}", sock, sk);
  625. if (!sk)
  626. return 0;
  627. sock->sk = NULL;
  628. return rxrpc_release_sock(sk);
  629. }
  630. /*
  631. * RxRPC network protocol
  632. */
  633. static const struct proto_ops rxrpc_rpc_ops = {
  634. .family = PF_UNIX,
  635. .owner = THIS_MODULE,
  636. .release = rxrpc_release,
  637. .bind = rxrpc_bind,
  638. .connect = rxrpc_connect,
  639. .socketpair = sock_no_socketpair,
  640. .accept = sock_no_accept,
  641. .getname = sock_no_getname,
  642. .poll = rxrpc_poll,
  643. .ioctl = sock_no_ioctl,
  644. .listen = rxrpc_listen,
  645. .shutdown = sock_no_shutdown,
  646. .setsockopt = rxrpc_setsockopt,
  647. .getsockopt = sock_no_getsockopt,
  648. .sendmsg = rxrpc_sendmsg,
  649. .recvmsg = rxrpc_recvmsg,
  650. .mmap = sock_no_mmap,
  651. .sendpage = sock_no_sendpage,
  652. };
  653. static struct proto rxrpc_proto = {
  654. .name = "RXRPC",
  655. .owner = THIS_MODULE,
  656. .obj_size = sizeof(struct rxrpc_sock),
  657. .max_header = sizeof(struct rxrpc_header),
  658. };
  659. static struct net_proto_family rxrpc_family_ops = {
  660. .family = PF_RXRPC,
  661. .create = rxrpc_create,
  662. .owner = THIS_MODULE,
  663. };
  664. /*
  665. * initialise and register the RxRPC protocol
  666. */
  667. static int __init af_rxrpc_init(void)
  668. {
  669. struct sk_buff *dummy_skb;
  670. int ret = -1;
  671. BUILD_BUG_ON(sizeof(struct rxrpc_skb_priv) > sizeof(dummy_skb->cb));
  672. rxrpc_epoch = htonl(get_seconds());
  673. ret = -ENOMEM;
  674. rxrpc_call_jar = kmem_cache_create(
  675. "rxrpc_call_jar", sizeof(struct rxrpc_call), 0,
  676. SLAB_HWCACHE_ALIGN, NULL);
  677. if (!rxrpc_call_jar) {
  678. printk(KERN_NOTICE "RxRPC: Failed to allocate call jar\n");
  679. goto error_call_jar;
  680. }
  681. rxrpc_workqueue = create_workqueue("krxrpcd");
  682. if (!rxrpc_workqueue) {
  683. printk(KERN_NOTICE "RxRPC: Failed to allocate work queue\n");
  684. goto error_work_queue;
  685. }
  686. ret = proto_register(&rxrpc_proto, 1);
  687. if (ret < 0) {
  688. printk(KERN_CRIT "RxRPC: Cannot register protocol\n");
  689. goto error_proto;
  690. }
  691. ret = sock_register(&rxrpc_family_ops);
  692. if (ret < 0) {
  693. printk(KERN_CRIT "RxRPC: Cannot register socket family\n");
  694. goto error_sock;
  695. }
  696. ret = register_key_type(&key_type_rxrpc);
  697. if (ret < 0) {
  698. printk(KERN_CRIT "RxRPC: Cannot register client key type\n");
  699. goto error_key_type;
  700. }
  701. ret = register_key_type(&key_type_rxrpc_s);
  702. if (ret < 0) {
  703. printk(KERN_CRIT "RxRPC: Cannot register server key type\n");
  704. goto error_key_type_s;
  705. }
  706. #ifdef CONFIG_PROC_FS
  707. proc_net_fops_create(&init_net, "rxrpc_calls", 0, &rxrpc_call_seq_fops);
  708. proc_net_fops_create(&init_net, "rxrpc_conns", 0, &rxrpc_connection_seq_fops);
  709. #endif
  710. return 0;
  711. error_key_type_s:
  712. unregister_key_type(&key_type_rxrpc);
  713. error_key_type:
  714. sock_unregister(PF_RXRPC);
  715. error_sock:
  716. proto_unregister(&rxrpc_proto);
  717. error_proto:
  718. destroy_workqueue(rxrpc_workqueue);
  719. error_work_queue:
  720. kmem_cache_destroy(rxrpc_call_jar);
  721. error_call_jar:
  722. return ret;
  723. }
  724. /*
  725. * unregister the RxRPC protocol
  726. */
  727. static void __exit af_rxrpc_exit(void)
  728. {
  729. _enter("");
  730. unregister_key_type(&key_type_rxrpc_s);
  731. unregister_key_type(&key_type_rxrpc);
  732. sock_unregister(PF_RXRPC);
  733. proto_unregister(&rxrpc_proto);
  734. rxrpc_destroy_all_calls();
  735. rxrpc_destroy_all_connections();
  736. rxrpc_destroy_all_transports();
  737. rxrpc_destroy_all_peers();
  738. rxrpc_destroy_all_locals();
  739. ASSERTCMP(atomic_read(&rxrpc_n_skbs), ==, 0);
  740. _debug("flush scheduled work");
  741. flush_workqueue(rxrpc_workqueue);
  742. proc_net_remove(&init_net, "rxrpc_conns");
  743. proc_net_remove(&init_net, "rxrpc_calls");
  744. destroy_workqueue(rxrpc_workqueue);
  745. kmem_cache_destroy(rxrpc_call_jar);
  746. _leave("");
  747. }
  748. module_init(af_rxrpc_init);
  749. module_exit(af_rxrpc_exit);