]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/um/drivers/daemon_user.c
uml: fix build when SLOB is enabled
[mirror_ubuntu-bionic-kernel.git] / arch / um / drivers / daemon_user.c
CommitLineData
1da177e4 1/*
cd1ae0e4
JD
2 * Copyright (C) 2001 - 2007 Jeff Dike (jdike@{addtoit,linux.intel}.com)
3 * Copyright (C) 2001 Lennert Buytenhek (buytenh@gnu.org) and
1da177e4
LT
4 * James Leu (jleu@mindspring.net).
5 * Copyright (C) 2001 by various other people who didn't put their name here.
6 * Licensed under the GPL.
7 */
8
1da177e4 9#include <stdint.h>
cd1ae0e4
JD
10#include <unistd.h>
11#include <errno.h>
12#include <sys/types.h>
1da177e4 13#include <sys/socket.h>
1da177e4 14#include <sys/time.h>
cd1ae0e4 15#include <sys/un.h>
1da177e4 16#include "daemon.h"
cd1ae0e4 17#include "net_user.h"
1da177e4 18#include "os.h"
c13e5690 19#include "um_malloc.h"
cd1ae0e4 20#include "user.h"
1da177e4 21
1da177e4
LT
22enum request_type { REQ_NEW_CONTROL };
23
24#define SWITCH_MAGIC 0xfeedface
25
26struct request_v3 {
27 uint32_t magic;
28 uint32_t version;
29 enum request_type type;
30 struct sockaddr_un sock;
31};
32
33static struct sockaddr_un *new_addr(void *name, int len)
34{
35 struct sockaddr_un *sun;
36
43f5b308 37 sun = uml_kmalloc(sizeof(struct sockaddr_un), UM_GFP_KERNEL);
cd1ae0e4
JD
38 if (sun == NULL) {
39 printk(UM_KERN_ERR "new_addr: allocation of sockaddr_un "
40 "failed\n");
56bd194b 41 return NULL;
1da177e4
LT
42 }
43 sun->sun_family = AF_UNIX;
44 memcpy(sun->sun_path, name, len);
56bd194b 45 return sun;
1da177e4
LT
46}
47
48static int connect_to_switch(struct daemon_data *pri)
49{
50 struct sockaddr_un *ctl_addr = pri->ctl_addr;
51 struct sockaddr_un *local_addr = pri->local_addr;
52 struct sockaddr_un *sun;
53 struct request_v3 req;
54 int fd, n, err;
55
56 pri->control = socket(AF_UNIX, SOCK_STREAM, 0);
cd1ae0e4 57 if (pri->control < 0) {
de7b37cd 58 err = -errno;
cd1ae0e4
JD
59 printk(UM_KERN_ERR "daemon_open : control socket failed, "
60 "errno = %d\n", -err);
de7b37cd 61 return err;
1da177e4
LT
62 }
63
cd1ae0e4
JD
64 if (connect(pri->control, (struct sockaddr *) ctl_addr,
65 sizeof(*ctl_addr)) < 0) {
1da177e4 66 err = -errno;
cd1ae0e4
JD
67 printk(UM_KERN_ERR "daemon_open : control connect failed, "
68 "errno = %d\n", -err);
1da177e4
LT
69 goto out;
70 }
71
72 fd = socket(AF_UNIX, SOCK_DGRAM, 0);
cd1ae0e4 73 if (fd < 0) {
1da177e4 74 err = -errno;
cd1ae0e4
JD
75 printk(UM_KERN_ERR "daemon_open : data socket failed, "
76 "errno = %d\n", -err);
1da177e4
LT
77 goto out;
78 }
cd1ae0e4 79 if (bind(fd, (struct sockaddr *) local_addr, sizeof(*local_addr)) < 0) {
1da177e4 80 err = -errno;
cd1ae0e4
JD
81 printk(UM_KERN_ERR "daemon_open : data bind failed, "
82 "errno = %d\n", -err);
1da177e4
LT
83 goto out_close;
84 }
85
43f5b308 86 sun = uml_kmalloc(sizeof(struct sockaddr_un), UM_GFP_KERNEL);
cd1ae0e4
JD
87 if (sun == NULL) {
88 printk(UM_KERN_ERR "new_addr: allocation of sockaddr_un "
89 "failed\n");
1da177e4
LT
90 err = -ENOMEM;
91 goto out_close;
92 }
93
94 req.magic = SWITCH_MAGIC;
95 req.version = SWITCH_VERSION;
96 req.type = REQ_NEW_CONTROL;
97 req.sock = *local_addr;
cd1ae0e4
JD
98 n = write(pri->control, &req, sizeof(req));
99 if (n != sizeof(req)) {
100 printk(UM_KERN_ERR "daemon_open : control setup request "
101 "failed, err = %d\n", -errno);
1da177e4 102 err = -ENOTCONN;
ba260e23 103 goto out_free;
1da177e4
LT
104 }
105
cd1ae0e4
JD
106 n = read(pri->control, sun, sizeof(*sun));
107 if (n != sizeof(*sun)) {
108 printk(UM_KERN_ERR "daemon_open : read of data socket failed, "
109 "err = %d\n", -errno);
1da177e4 110 err = -ENOTCONN;
ba260e23 111 goto out_free;
1da177e4
LT
112 }
113
114 pri->data_addr = sun;
56bd194b 115 return fd;
1da177e4 116
ba260e23
PBG
117 out_free:
118 kfree(sun);
1da177e4 119 out_close:
cd1ae0e4 120 close(fd);
1da177e4 121 out:
cd1ae0e4 122 close(pri->control);
56bd194b 123 return err;
1da177e4
LT
124}
125
f34d9d2d 126static int daemon_user_init(void *data, void *dev)
1da177e4
LT
127{
128 struct daemon_data *pri = data;
129 struct timeval tv;
130 struct {
131 char zero;
132 int pid;
133 int usecs;
134 } name;
135
cd1ae0e4
JD
136 if (!strcmp(pri->sock_type, "unix"))
137 pri->ctl_addr = new_addr(pri->ctl_sock,
1da177e4
LT
138 strlen(pri->ctl_sock) + 1);
139 name.zero = 0;
140 name.pid = os_getpid();
141 gettimeofday(&tv, NULL);
142 name.usecs = tv.tv_usec;
143 pri->local_addr = new_addr(&name, sizeof(name));
144 pri->dev = dev;
145 pri->fd = connect_to_switch(pri);
cd1ae0e4 146 if (pri->fd < 0) {
1da177e4
LT
147 kfree(pri->local_addr);
148 pri->local_addr = NULL;
f34d9d2d 149 return pri->fd;
1da177e4 150 }
f34d9d2d
JD
151
152 return 0;
1da177e4
LT
153}
154
155static int daemon_open(void *data)
156{
157 struct daemon_data *pri = data;
56bd194b 158 return pri->fd;
1da177e4
LT
159}
160
161static void daemon_remove(void *data)
162{
163 struct daemon_data *pri = data;
164
cd1ae0e4 165 close(pri->fd);
c42791b6 166 pri->fd = -1;
cd1ae0e4 167 close(pri->control);
c42791b6
PBG
168 pri->control = -1;
169
41f2148a 170 kfree(pri->data_addr);
c42791b6 171 pri->data_addr = NULL;
41f2148a 172 kfree(pri->ctl_addr);
c42791b6 173 pri->ctl_addr = NULL;
41f2148a 174 kfree(pri->local_addr);
c42791b6 175 pri->local_addr = NULL;
1da177e4
LT
176}
177
178int daemon_user_write(int fd, void *buf, int len, struct daemon_data *pri)
179{
180 struct sockaddr_un *data_addr = pri->data_addr;
181
56bd194b 182 return net_sendto(fd, buf, len, data_addr, sizeof(*data_addr));
1da177e4
LT
183}
184
5e7672ec 185const struct net_user_info daemon_user_info = {
1da177e4
LT
186 .init = daemon_user_init,
187 .open = daemon_open,
188 .close = NULL,
189 .remove = daemon_remove,
1da177e4
LT
190 .add_address = NULL,
191 .delete_address = NULL,
b53f35a8
JD
192 .mtu = ETH_MAX_PACKET,
193 .max_packet = ETH_MAX_PACKET + ETH_HEADER_OTHER,
1da177e4 194};