raw.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770
  1. /*
  2. * raw.c - Raw sockets for protocol family CAN
  3. *
  4. * Copyright (c) 2002-2007 Volkswagen Group Electronic Research
  5. * All rights reserved.
  6. *
  7. * Redistribution and use in source and binary forms, with or without
  8. * modification, are permitted provided that the following conditions
  9. * are met:
  10. * 1. Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in the
  14. * documentation and/or other materials provided with the distribution.
  15. * 3. Neither the name of Volkswagen nor the names of its contributors
  16. * may be used to endorse or promote products derived from this software
  17. * without specific prior written permission.
  18. *
  19. * Alternatively, provided that this notice is retained in full, this
  20. * software may be distributed under the terms of the GNU General
  21. * Public License ("GPL") version 2, in which case the provisions of the
  22. * GPL apply INSTEAD OF those given above.
  23. *
  24. * The provided data structures and external interfaces from this code
  25. * are not restricted to be used by modules with a GPL compatible license.
  26. *
  27. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  28. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  29. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
  30. * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
  31. * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  32. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
  33. * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
  34. * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
  35. * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
  36. * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  37. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
  38. * DAMAGE.
  39. *
  40. * Send feedback to <socketcan-users@lists.berlios.de>
  41. *
  42. */
  43. #include <linux/module.h>
  44. #include <linux/init.h>
  45. #include <linux/uio.h>
  46. #include <linux/net.h>
  47. #include <linux/netdevice.h>
  48. #include <linux/socket.h>
  49. #include <linux/if_arp.h>
  50. #include <linux/skbuff.h>
  51. #include <linux/can.h>
  52. #include <linux/can/core.h>
  53. #include <linux/can/raw.h>
  54. #include <net/sock.h>
  55. #include <net/net_namespace.h>
  56. #define CAN_RAW_VERSION CAN_VERSION
  57. static __initdata const char banner[] =
  58. KERN_INFO "can: raw protocol (rev " CAN_RAW_VERSION ")\n";
  59. MODULE_DESCRIPTION("PF_CAN raw protocol");
  60. MODULE_LICENSE("Dual BSD/GPL");
  61. MODULE_AUTHOR("Urs Thuermann <urs.thuermann@volkswagen.de>");
  62. MODULE_ALIAS("can-proto-1");
  63. #define MASK_ALL 0
  64. /*
  65. * A raw socket has a list of can_filters attached to it, each receiving
  66. * the CAN frames matching that filter. If the filter list is empty,
  67. * no CAN frames will be received by the socket. The default after
  68. * opening the socket, is to have one filter which receives all frames.
  69. * The filter list is allocated dynamically with the exception of the
  70. * list containing only one item. This common case is optimized by
  71. * storing the single filter in dfilter, to avoid using dynamic memory.
  72. */
  73. struct raw_sock {
  74. struct sock sk;
  75. int bound;
  76. int ifindex;
  77. struct notifier_block notifier;
  78. int loopback;
  79. int recv_own_msgs;
  80. int count; /* number of active filters */
  81. struct can_filter dfilter; /* default/single filter */
  82. struct can_filter *filter; /* pointer to filter(s) */
  83. can_err_mask_t err_mask;
  84. };
  85. static inline struct raw_sock *raw_sk(const struct sock *sk)
  86. {
  87. return (struct raw_sock *)sk;
  88. }
  89. static void raw_rcv(struct sk_buff *skb, void *data)
  90. {
  91. struct sock *sk = (struct sock *)data;
  92. struct raw_sock *ro = raw_sk(sk);
  93. struct sockaddr_can *addr;
  94. /* check the received tx sock reference */
  95. if (!ro->recv_own_msgs && skb->sk == sk)
  96. return;
  97. /* clone the given skb to be able to enqueue it into the rcv queue */
  98. skb = skb_clone(skb, GFP_ATOMIC);
  99. if (!skb)
  100. return;
  101. /*
  102. * Put the datagram to the queue so that raw_recvmsg() can
  103. * get it from there. We need to pass the interface index to
  104. * raw_recvmsg(). We pass a whole struct sockaddr_can in skb->cb
  105. * containing the interface index.
  106. */
  107. BUILD_BUG_ON(sizeof(skb->cb) < sizeof(struct sockaddr_can));
  108. addr = (struct sockaddr_can *)skb->cb;
  109. memset(addr, 0, sizeof(*addr));
  110. addr->can_family = AF_CAN;
  111. addr->can_ifindex = skb->dev->ifindex;
  112. if (sock_queue_rcv_skb(sk, skb) < 0)
  113. kfree_skb(skb);
  114. }
  115. static int raw_enable_filters(struct net_device *dev, struct sock *sk,
  116. struct can_filter *filter, int count)
  117. {
  118. int err = 0;
  119. int i;
  120. for (i = 0; i < count; i++) {
  121. err = can_rx_register(dev, filter[i].can_id,
  122. filter[i].can_mask,
  123. raw_rcv, sk, "raw");
  124. if (err) {
  125. /* clean up successfully registered filters */
  126. while (--i >= 0)
  127. can_rx_unregister(dev, filter[i].can_id,
  128. filter[i].can_mask,
  129. raw_rcv, sk);
  130. break;
  131. }
  132. }
  133. return err;
  134. }
  135. static int raw_enable_errfilter(struct net_device *dev, struct sock *sk,
  136. can_err_mask_t err_mask)
  137. {
  138. int err = 0;
  139. if (err_mask)
  140. err = can_rx_register(dev, 0, err_mask | CAN_ERR_FLAG,
  141. raw_rcv, sk, "raw");
  142. return err;
  143. }
  144. static void raw_disable_filters(struct net_device *dev, struct sock *sk,
  145. struct can_filter *filter, int count)
  146. {
  147. int i;
  148. for (i = 0; i < count; i++)
  149. can_rx_unregister(dev, filter[i].can_id, filter[i].can_mask,
  150. raw_rcv, sk);
  151. }
  152. static inline void raw_disable_errfilter(struct net_device *dev,
  153. struct sock *sk,
  154. can_err_mask_t err_mask)
  155. {
  156. if (err_mask)
  157. can_rx_unregister(dev, 0, err_mask | CAN_ERR_FLAG,
  158. raw_rcv, sk);
  159. }
  160. static inline void raw_disable_allfilters(struct net_device *dev,
  161. struct sock *sk)
  162. {
  163. struct raw_sock *ro = raw_sk(sk);
  164. raw_disable_filters(dev, sk, ro->filter, ro->count);
  165. raw_disable_errfilter(dev, sk, ro->err_mask);
  166. }
  167. static int raw_enable_allfilters(struct net_device *dev, struct sock *sk)
  168. {
  169. struct raw_sock *ro = raw_sk(sk);
  170. int err;
  171. err = raw_enable_filters(dev, sk, ro->filter, ro->count);
  172. if (!err) {
  173. err = raw_enable_errfilter(dev, sk, ro->err_mask);
  174. if (err)
  175. raw_disable_filters(dev, sk, ro->filter, ro->count);
  176. }
  177. return err;
  178. }
  179. static int raw_notifier(struct notifier_block *nb,
  180. unsigned long msg, void *data)
  181. {
  182. struct net_device *dev = (struct net_device *)data;
  183. struct raw_sock *ro = container_of(nb, struct raw_sock, notifier);
  184. struct sock *sk = &ro->sk;
  185. if (!net_eq(dev_net(dev), &init_net))
  186. return NOTIFY_DONE;
  187. if (dev->type != ARPHRD_CAN)
  188. return NOTIFY_DONE;
  189. if (ro->ifindex != dev->ifindex)
  190. return NOTIFY_DONE;
  191. switch (msg) {
  192. case NETDEV_UNREGISTER:
  193. lock_sock(sk);
  194. /* remove current filters & unregister */
  195. if (ro->bound)
  196. raw_disable_allfilters(dev, sk);
  197. if (ro->count > 1)
  198. kfree(ro->filter);
  199. ro->ifindex = 0;
  200. ro->bound = 0;
  201. ro->count = 0;
  202. release_sock(sk);
  203. sk->sk_err = ENODEV;
  204. if (!sock_flag(sk, SOCK_DEAD))
  205. sk->sk_error_report(sk);
  206. break;
  207. case NETDEV_DOWN:
  208. sk->sk_err = ENETDOWN;
  209. if (!sock_flag(sk, SOCK_DEAD))
  210. sk->sk_error_report(sk);
  211. break;
  212. }
  213. return NOTIFY_DONE;
  214. }
  215. static int raw_init(struct sock *sk)
  216. {
  217. struct raw_sock *ro = raw_sk(sk);
  218. ro->bound = 0;
  219. ro->ifindex = 0;
  220. /* set default filter to single entry dfilter */
  221. ro->dfilter.can_id = 0;
  222. ro->dfilter.can_mask = MASK_ALL;
  223. ro->filter = &ro->dfilter;
  224. ro->count = 1;
  225. /* set default loopback behaviour */
  226. ro->loopback = 1;
  227. ro->recv_own_msgs = 0;
  228. /* set notifier */
  229. ro->notifier.notifier_call = raw_notifier;
  230. register_netdevice_notifier(&ro->notifier);
  231. return 0;
  232. }
  233. static int raw_release(struct socket *sock)
  234. {
  235. struct sock *sk = sock->sk;
  236. struct raw_sock *ro = raw_sk(sk);
  237. unregister_netdevice_notifier(&ro->notifier);
  238. lock_sock(sk);
  239. /* remove current filters & unregister */
  240. if (ro->bound) {
  241. if (ro->ifindex) {
  242. struct net_device *dev;
  243. dev = dev_get_by_index(&init_net, ro->ifindex);
  244. if (dev) {
  245. raw_disable_allfilters(dev, sk);
  246. dev_put(dev);
  247. }
  248. } else
  249. raw_disable_allfilters(NULL, sk);
  250. }
  251. if (ro->count > 1)
  252. kfree(ro->filter);
  253. ro->ifindex = 0;
  254. ro->bound = 0;
  255. ro->count = 0;
  256. sock_orphan(sk);
  257. sock->sk = NULL;
  258. release_sock(sk);
  259. sock_put(sk);
  260. return 0;
  261. }
  262. static int raw_bind(struct socket *sock, struct sockaddr *uaddr, int len)
  263. {
  264. struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
  265. struct sock *sk = sock->sk;
  266. struct raw_sock *ro = raw_sk(sk);
  267. int ifindex;
  268. int err = 0;
  269. int notify_enetdown = 0;
  270. if (len < sizeof(*addr))
  271. return -EINVAL;
  272. lock_sock(sk);
  273. if (ro->bound && addr->can_ifindex == ro->ifindex)
  274. goto out;
  275. if (addr->can_ifindex) {
  276. struct net_device *dev;
  277. dev = dev_get_by_index(&init_net, addr->can_ifindex);
  278. if (!dev) {
  279. err = -ENODEV;
  280. goto out;
  281. }
  282. if (dev->type != ARPHRD_CAN) {
  283. dev_put(dev);
  284. err = -ENODEV;
  285. goto out;
  286. }
  287. if (!(dev->flags & IFF_UP))
  288. notify_enetdown = 1;
  289. ifindex = dev->ifindex;
  290. /* filters set by default/setsockopt */
  291. err = raw_enable_allfilters(dev, sk);
  292. dev_put(dev);
  293. } else {
  294. ifindex = 0;
  295. /* filters set by default/setsockopt */
  296. err = raw_enable_allfilters(NULL, sk);
  297. }
  298. if (!err) {
  299. if (ro->bound) {
  300. /* unregister old filters */
  301. if (ro->ifindex) {
  302. struct net_device *dev;
  303. dev = dev_get_by_index(&init_net, ro->ifindex);
  304. if (dev) {
  305. raw_disable_allfilters(dev, sk);
  306. dev_put(dev);
  307. }
  308. } else
  309. raw_disable_allfilters(NULL, sk);
  310. }
  311. ro->ifindex = ifindex;
  312. ro->bound = 1;
  313. }
  314. out:
  315. release_sock(sk);
  316. if (notify_enetdown) {
  317. sk->sk_err = ENETDOWN;
  318. if (!sock_flag(sk, SOCK_DEAD))
  319. sk->sk_error_report(sk);
  320. }
  321. return err;
  322. }
  323. static int raw_getname(struct socket *sock, struct sockaddr *uaddr,
  324. int *len, int peer)
  325. {
  326. struct sockaddr_can *addr = (struct sockaddr_can *)uaddr;
  327. struct sock *sk = sock->sk;
  328. struct raw_sock *ro = raw_sk(sk);
  329. if (peer)
  330. return -EOPNOTSUPP;
  331. addr->can_family = AF_CAN;
  332. addr->can_ifindex = ro->ifindex;
  333. *len = sizeof(*addr);
  334. return 0;
  335. }
  336. static int raw_setsockopt(struct socket *sock, int level, int optname,
  337. char __user *optval, int optlen)
  338. {
  339. struct sock *sk = sock->sk;
  340. struct raw_sock *ro = raw_sk(sk);
  341. struct can_filter *filter = NULL; /* dyn. alloc'ed filters */
  342. struct can_filter sfilter; /* single filter */
  343. struct net_device *dev = NULL;
  344. can_err_mask_t err_mask = 0;
  345. int count = 0;
  346. int err = 0;
  347. if (level != SOL_CAN_RAW)
  348. return -EINVAL;
  349. if (optlen < 0)
  350. return -EINVAL;
  351. switch (optname) {
  352. case CAN_RAW_FILTER:
  353. if (optlen % sizeof(struct can_filter) != 0)
  354. return -EINVAL;
  355. count = optlen / sizeof(struct can_filter);
  356. if (count > 1) {
  357. /* filter does not fit into dfilter => alloc space */
  358. filter = kmalloc(optlen, GFP_KERNEL);
  359. if (!filter)
  360. return -ENOMEM;
  361. if (copy_from_user(filter, optval, optlen)) {
  362. kfree(filter);
  363. return -EFAULT;
  364. }
  365. } else if (count == 1) {
  366. if (copy_from_user(&sfilter, optval, optlen))
  367. return -EFAULT;
  368. }
  369. lock_sock(sk);
  370. if (ro->bound && ro->ifindex)
  371. dev = dev_get_by_index(&init_net, ro->ifindex);
  372. if (ro->bound) {
  373. /* (try to) register the new filters */
  374. if (count == 1)
  375. err = raw_enable_filters(dev, sk, &sfilter, 1);
  376. else
  377. err = raw_enable_filters(dev, sk, filter,
  378. count);
  379. if (err) {
  380. if (count > 1)
  381. kfree(filter);
  382. goto out_fil;
  383. }
  384. /* remove old filter registrations */
  385. raw_disable_filters(dev, sk, ro->filter, ro->count);
  386. }
  387. /* remove old filter space */
  388. if (ro->count > 1)
  389. kfree(ro->filter);
  390. /* link new filters to the socket */
  391. if (count == 1) {
  392. /* copy filter data for single filter */
  393. ro->dfilter = sfilter;
  394. filter = &ro->dfilter;
  395. }
  396. ro->filter = filter;
  397. ro->count = count;
  398. out_fil:
  399. if (dev)
  400. dev_put(dev);
  401. release_sock(sk);
  402. break;
  403. case CAN_RAW_ERR_FILTER:
  404. if (optlen != sizeof(err_mask))
  405. return -EINVAL;
  406. if (copy_from_user(&err_mask, optval, optlen))
  407. return -EFAULT;
  408. err_mask &= CAN_ERR_MASK;
  409. lock_sock(sk);
  410. if (ro->bound && ro->ifindex)
  411. dev = dev_get_by_index(&init_net, ro->ifindex);
  412. /* remove current error mask */
  413. if (ro->bound) {
  414. /* (try to) register the new err_mask */
  415. err = raw_enable_errfilter(dev, sk, err_mask);
  416. if (err)
  417. goto out_err;
  418. /* remove old err_mask registration */
  419. raw_disable_errfilter(dev, sk, ro->err_mask);
  420. }
  421. /* link new err_mask to the socket */
  422. ro->err_mask = err_mask;
  423. out_err:
  424. if (dev)
  425. dev_put(dev);
  426. release_sock(sk);
  427. break;
  428. case CAN_RAW_LOOPBACK:
  429. if (optlen != sizeof(ro->loopback))
  430. return -EINVAL;
  431. if (copy_from_user(&ro->loopback, optval, optlen))
  432. return -EFAULT;
  433. break;
  434. case CAN_RAW_RECV_OWN_MSGS:
  435. if (optlen != sizeof(ro->recv_own_msgs))
  436. return -EINVAL;
  437. if (copy_from_user(&ro->recv_own_msgs, optval, optlen))
  438. return -EFAULT;
  439. break;
  440. default:
  441. return -ENOPROTOOPT;
  442. }
  443. return err;
  444. }
  445. static int raw_getsockopt(struct socket *sock, int level, int optname,
  446. char __user *optval, int __user *optlen)
  447. {
  448. struct sock *sk = sock->sk;
  449. struct raw_sock *ro = raw_sk(sk);
  450. int len;
  451. void *val;
  452. int err = 0;
  453. if (level != SOL_CAN_RAW)
  454. return -EINVAL;
  455. if (get_user(len, optlen))
  456. return -EFAULT;
  457. if (len < 0)
  458. return -EINVAL;
  459. switch (optname) {
  460. case CAN_RAW_FILTER:
  461. lock_sock(sk);
  462. if (ro->count > 0) {
  463. int fsize = ro->count * sizeof(struct can_filter);
  464. if (len > fsize)
  465. len = fsize;
  466. if (copy_to_user(optval, ro->filter, len))
  467. err = -EFAULT;
  468. } else
  469. len = 0;
  470. release_sock(sk);
  471. if (!err)
  472. err = put_user(len, optlen);
  473. return err;
  474. case CAN_RAW_ERR_FILTER:
  475. if (len > sizeof(can_err_mask_t))
  476. len = sizeof(can_err_mask_t);
  477. val = &ro->err_mask;
  478. break;
  479. case CAN_RAW_LOOPBACK:
  480. if (len > sizeof(int))
  481. len = sizeof(int);
  482. val = &ro->loopback;
  483. break;
  484. case CAN_RAW_RECV_OWN_MSGS:
  485. if (len > sizeof(int))
  486. len = sizeof(int);
  487. val = &ro->recv_own_msgs;
  488. break;
  489. default:
  490. return -ENOPROTOOPT;
  491. }
  492. if (put_user(len, optlen))
  493. return -EFAULT;
  494. if (copy_to_user(optval, val, len))
  495. return -EFAULT;
  496. return 0;
  497. }
  498. static int raw_sendmsg(struct kiocb *iocb, struct socket *sock,
  499. struct msghdr *msg, size_t size)
  500. {
  501. struct sock *sk = sock->sk;
  502. struct raw_sock *ro = raw_sk(sk);
  503. struct sk_buff *skb;
  504. struct net_device *dev;
  505. int ifindex;
  506. int err;
  507. if (msg->msg_name) {
  508. struct sockaddr_can *addr =
  509. (struct sockaddr_can *)msg->msg_name;
  510. if (addr->can_family != AF_CAN)
  511. return -EINVAL;
  512. ifindex = addr->can_ifindex;
  513. } else
  514. ifindex = ro->ifindex;
  515. if (size != sizeof(struct can_frame))
  516. return -EINVAL;
  517. dev = dev_get_by_index(&init_net, ifindex);
  518. if (!dev)
  519. return -ENXIO;
  520. skb = sock_alloc_send_skb(sk, size, msg->msg_flags & MSG_DONTWAIT,
  521. &err);
  522. if (!skb)
  523. goto put_dev;
  524. err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
  525. if (err < 0)
  526. goto free_skb;
  527. err = sock_tx_timestamp(msg, sk, skb_tx(skb));
  528. if (err < 0)
  529. goto free_skb;
  530. skb->dev = dev;
  531. skb->sk = sk;
  532. err = can_send(skb, ro->loopback);
  533. dev_put(dev);
  534. if (err)
  535. goto send_failed;
  536. return size;
  537. free_skb:
  538. kfree_skb(skb);
  539. put_dev:
  540. dev_put(dev);
  541. send_failed:
  542. return err;
  543. }
  544. static int raw_recvmsg(struct kiocb *iocb, struct socket *sock,
  545. struct msghdr *msg, size_t size, int flags)
  546. {
  547. struct sock *sk = sock->sk;
  548. struct sk_buff *skb;
  549. int err = 0;
  550. int noblock;
  551. noblock = flags & MSG_DONTWAIT;
  552. flags &= ~MSG_DONTWAIT;
  553. skb = skb_recv_datagram(sk, flags, noblock, &err);
  554. if (!skb)
  555. return err;
  556. if (size < skb->len)
  557. msg->msg_flags |= MSG_TRUNC;
  558. else
  559. size = skb->len;
  560. err = memcpy_toiovec(msg->msg_iov, skb->data, size);
  561. if (err < 0) {
  562. skb_free_datagram(sk, skb);
  563. return err;
  564. }
  565. sock_recv_timestamp(msg, sk, skb);
  566. if (msg->msg_name) {
  567. msg->msg_namelen = sizeof(struct sockaddr_can);
  568. memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
  569. }
  570. skb_free_datagram(sk, skb);
  571. return size;
  572. }
  573. static struct proto_ops raw_ops __read_mostly = {
  574. .family = PF_CAN,
  575. .release = raw_release,
  576. .bind = raw_bind,
  577. .connect = sock_no_connect,
  578. .socketpair = sock_no_socketpair,
  579. .accept = sock_no_accept,
  580. .getname = raw_getname,
  581. .poll = datagram_poll,
  582. .ioctl = NULL, /* use can_ioctl() from af_can.c */
  583. .listen = sock_no_listen,
  584. .shutdown = sock_no_shutdown,
  585. .setsockopt = raw_setsockopt,
  586. .getsockopt = raw_getsockopt,
  587. .sendmsg = raw_sendmsg,
  588. .recvmsg = raw_recvmsg,
  589. .mmap = sock_no_mmap,
  590. .sendpage = sock_no_sendpage,
  591. };
  592. static struct proto raw_proto __read_mostly = {
  593. .name = "CAN_RAW",
  594. .owner = THIS_MODULE,
  595. .obj_size = sizeof(struct raw_sock),
  596. .init = raw_init,
  597. };
  598. static struct can_proto raw_can_proto __read_mostly = {
  599. .type = SOCK_RAW,
  600. .protocol = CAN_RAW,
  601. .capability = -1,
  602. .ops = &raw_ops,
  603. .prot = &raw_proto,
  604. };
  605. static __init int raw_module_init(void)
  606. {
  607. int err;
  608. printk(banner);
  609. err = can_proto_register(&raw_can_proto);
  610. if (err < 0)
  611. printk(KERN_ERR "can: registration of raw protocol failed\n");
  612. return err;
  613. }
  614. static __exit void raw_module_exit(void)
  615. {
  616. can_proto_unregister(&raw_can_proto);
  617. }
  618. module_init(raw_module_init);
  619. module_exit(raw_module_exit);