]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/caif/caif_socket.c
UBUNTU: Ubuntu-5.15.0-39.42
[mirror_ubuntu-jammy-kernel.git] / net / caif / caif_socket.c
CommitLineData
af873fce 1// SPDX-License-Identifier: GPL-2.0-only
e6f95ec8
SB
2/*
3 * Copyright (C) ST-Ericsson AB 2010
26ee65e6 4 * Author: Sjur Brendeland
e6f95ec8
SB
5 */
6
b31fa5ba
JP
7#define pr_fmt(fmt) KBUILD_MODNAME ":%s(): " fmt, __func__
8
e6f95ec8
SB
9#include <linux/fs.h>
10#include <linux/init.h>
11#include <linux/module.h>
3f07c014 12#include <linux/sched/signal.h>
e6f95ec8
SB
13#include <linux/spinlock.h>
14#include <linux/mutex.h>
15#include <linux/list.h>
16#include <linux/wait.h>
17#include <linux/poll.h>
18#include <linux/tcp.h>
19#include <linux/uaccess.h>
bece7b23 20#include <linux/debugfs.h>
e6f95ec8 21#include <linux/caif/caif_socket.h>
44764812 22#include <linux/pkt_sched.h>
bece7b23
SB
23#include <net/sock.h>
24#include <net/tcp_states.h>
e6f95ec8
SB
25#include <net/caif/caif_layer.h>
26#include <net/caif/caif_dev.h>
27#include <net/caif/cfpkt.h>
28
29MODULE_LICENSE("GPL");
bece7b23
SB
30MODULE_ALIAS_NETPROTO(AF_CAIF);
31
bece7b23
SB
32/*
33 * CAIF state is re-using the TCP socket states.
34 * caif_states stored in sk_state reflect the state as reported by
35 * the CAIF stack, while sk_socket->state is the state of the socket.
36 */
37enum caif_states {
38 CAIF_CONNECTED = TCP_ESTABLISHED,
39 CAIF_CONNECTING = TCP_SYN_SENT,
40 CAIF_DISCONNECTED = TCP_CLOSE
41};
42
43#define TX_FLOW_ON_BIT 1
44#define RX_FLOW_ON_BIT 2
e6f95ec8 45
e6f95ec8 46struct caifsock {
bece7b23 47 struct sock sk; /* must be first member */
e6f95ec8 48 struct cflayer layer;
e6f95ec8 49 u32 flow_state;
e6f95ec8 50 struct caif_connect_request conn_req;
bece7b23 51 struct mutex readlock;
e6f95ec8 52 struct dentry *debugfs_socket_dir;
2aa40aef 53 int headroom, tailroom, maxframe;
e6f95ec8
SB
54};
55
bece7b23
SB
56static int rx_flow_is_on(struct caifsock *cf_sk)
57{
58 return test_bit(RX_FLOW_ON_BIT,
59 (void *) &cf_sk->flow_state);
60}
61
62static int tx_flow_is_on(struct caifsock *cf_sk)
63{
64 return test_bit(TX_FLOW_ON_BIT,
65 (void *) &cf_sk->flow_state);
66}
e6f95ec8 67
bece7b23 68static void set_rx_flow_off(struct caifsock *cf_sk)
e6f95ec8 69{
bece7b23
SB
70 clear_bit(RX_FLOW_ON_BIT,
71 (void *) &cf_sk->flow_state);
72}
e6f95ec8 73
bece7b23
SB
74static void set_rx_flow_on(struct caifsock *cf_sk)
75{
76 set_bit(RX_FLOW_ON_BIT,
77 (void *) &cf_sk->flow_state);
78}
e6f95ec8 79
bece7b23
SB
80static void set_tx_flow_off(struct caifsock *cf_sk)
81{
82 clear_bit(TX_FLOW_ON_BIT,
83 (void *) &cf_sk->flow_state);
84}
e6f95ec8 85
bece7b23
SB
86static void set_tx_flow_on(struct caifsock *cf_sk)
87{
88 set_bit(TX_FLOW_ON_BIT,
89 (void *) &cf_sk->flow_state);
90}
e6f95ec8 91
bece7b23
SB
92static void caif_read_lock(struct sock *sk)
93{
94 struct caifsock *cf_sk;
95 cf_sk = container_of(sk, struct caifsock, sk);
96 mutex_lock(&cf_sk->readlock);
97}
e6f95ec8 98
bece7b23
SB
99static void caif_read_unlock(struct sock *sk)
100{
101 struct caifsock *cf_sk;
102 cf_sk = container_of(sk, struct caifsock, sk);
103 mutex_unlock(&cf_sk->readlock);
104}
e6f95ec8 105
a9a8f107 106static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
bece7b23
SB
107{
108 /* A quarter of full buffer is used a low water mark */
109 return cf_sk->sk.sk_rcvbuf / 4;
110}
e6f95ec8 111
a9a8f107 112static void caif_flow_ctrl(struct sock *sk, int mode)
bece7b23
SB
113{
114 struct caifsock *cf_sk;
115 cf_sk = container_of(sk, struct caifsock, sk);
ca6a09f2 116 if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
bece7b23
SB
117 cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
118}
e6f95ec8 119
bece7b23
SB
120/*
121 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
122 * not dropped, but CAIF is sending flow off instead.
123 */
b8a23e8d 124static void caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
bece7b23
SB
125{
126 int err;
bece7b23
SB
127 unsigned long flags;
128 struct sk_buff_head *list = &sk->sk_receive_queue;
129 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
b8a23e8d 130 bool queued = false;
e6f95ec8 131
bece7b23 132 if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
95c96174 133 (unsigned int)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
e87cc472
JP
134 net_dbg_ratelimited("sending flow OFF (queue len = %d %d)\n",
135 atomic_read(&cf_sk->sk.sk_rmem_alloc),
136 sk_rcvbuf_lowwater(cf_sk));
bece7b23 137 set_rx_flow_off(cf_sk);
ca6a09f2 138 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23 139 }
e6f95ec8 140
bece7b23
SB
141 err = sk_filter(sk, skb);
142 if (err)
b8a23e8d
ED
143 goto out;
144
c76562b6 145 if (!sk_rmem_schedule(sk, skb, skb->truesize) && rx_flow_is_on(cf_sk)) {
bece7b23 146 set_rx_flow_off(cf_sk);
e87cc472 147 net_dbg_ratelimited("sending flow OFF due to rmem_schedule\n");
ca6a09f2 148 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23
SB
149 }
150 skb->dev = NULL;
151 skb_set_owner_r(skb, sk);
bece7b23 152 spin_lock_irqsave(&list->lock, flags);
b8a23e8d
ED
153 queued = !sock_flag(sk, SOCK_DEAD);
154 if (queued)
bece7b23
SB
155 __skb_queue_tail(list, skb);
156 spin_unlock_irqrestore(&list->lock, flags);
b8a23e8d
ED
157out:
158 if (queued)
676d2369 159 sk->sk_data_ready(sk);
bece7b23
SB
160 else
161 kfree_skb(skb);
e6f95ec8
SB
162}
163
bece7b23
SB
164/* Packet Receive Callback function called from CAIF Stack */
165static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
e6f95ec8
SB
166{
167 struct caifsock *cf_sk;
bece7b23 168 struct sk_buff *skb;
e6f95ec8
SB
169
170 cf_sk = container_of(layr, struct caifsock, layer);
bece7b23
SB
171 skb = cfpkt_tonative(pkt);
172
173 if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
3f874adc 174 kfree_skb(skb);
bece7b23
SB
175 return 0;
176 }
177 caif_queue_rcv_skb(&cf_sk->sk, skb);
178 return 0;
179}
e6f95ec8 180
b3ccfbe4 181static void cfsk_hold(struct cflayer *layr)
182{
183 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
184 sock_hold(&cf_sk->sk);
185}
186
187static void cfsk_put(struct cflayer *layr)
188{
189 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
190 sock_put(&cf_sk->sk);
191}
192
bece7b23
SB
193/* Packet Control Callback function called from CAIF */
194static void caif_ctrl_cb(struct cflayer *layr,
3bffc475
SMP
195 enum caif_ctrlcmd flow,
196 int phyid)
bece7b23
SB
197{
198 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
e6f95ec8
SB
199 switch (flow) {
200 case CAIF_CTRLCMD_FLOW_ON_IND:
bece7b23 201 /* OK from modem to start sending again */
bece7b23
SB
202 set_tx_flow_on(cf_sk);
203 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
204 break;
205
206 case CAIF_CTRLCMD_FLOW_OFF_IND:
bece7b23 207 /* Modem asks us to shut up */
bece7b23
SB
208 set_tx_flow_off(cf_sk);
209 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
210 break;
211
212 case CAIF_CTRLCMD_INIT_RSP:
bece7b23 213 /* We're now connected */
b3ccfbe4 214 caif_client_register_refcnt(&cf_sk->layer,
215 cfsk_hold, cfsk_put);
bece7b23
SB
216 cf_sk->sk.sk_state = CAIF_CONNECTED;
217 set_tx_flow_on(cf_sk);
eaa8c5f3 218 cf_sk->sk.sk_shutdown = 0;
bece7b23 219 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
220 break;
221
222 case CAIF_CTRLCMD_DEINIT_RSP:
bece7b23
SB
223 /* We're now disconnected */
224 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
225 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
226 break;
227
228 case CAIF_CTRLCMD_INIT_FAIL_RSP:
bece7b23 229 /* Connect request failed */
bece7b23
SB
230 cf_sk->sk.sk_err = ECONNREFUSED;
231 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
232 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
233 /*
234 * Socket "standards" seems to require POLLOUT to
235 * be set at connect failure.
236 */
237 set_tx_flow_on(cf_sk);
238 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
239 break;
240
241 case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
bece7b23 242 /* Modem has closed this connection, or device is down. */
bece7b23
SB
243 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
244 cf_sk->sk.sk_err = ECONNRESET;
245 set_rx_flow_on(cf_sk);
e3ae2365 246 sk_error_report(&cf_sk->sk);
e6f95ec8
SB
247 break;
248
249 default:
b31fa5ba 250 pr_debug("Unexpected flow command %d\n", flow);
e6f95ec8
SB
251 }
252}
253
bece7b23 254static void caif_check_flow_release(struct sock *sk)
e6f95ec8 255{
bece7b23 256 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 257
bece7b23
SB
258 if (rx_flow_is_on(cf_sk))
259 return;
e6f95ec8 260
bece7b23 261 if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
bece7b23 262 set_rx_flow_on(cf_sk);
ca6a09f2 263 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
bece7b23
SB
264 }
265}
dcda138d 266
bece7b23 267/*
dcda138d
SB
268 * Copied from unix_dgram_recvmsg, but removed credit checks,
269 * changed locking, address handling and added MSG_TRUNC.
bece7b23 270 */
1b784140
YX
271static int caif_seqpkt_recvmsg(struct socket *sock, struct msghdr *m,
272 size_t len, int flags)
e6f95ec8
SB
273
274{
275 struct sock *sk = sock->sk;
e6f95ec8 276 struct sk_buff *skb;
dcda138d
SB
277 int ret;
278 int copylen;
e6f95ec8 279
dcda138d 280 ret = -EOPNOTSUPP;
3eeff778 281 if (flags & MSG_OOB)
dcda138d 282 goto read_error;
e6f95ec8 283
bece7b23
SB
284 skb = skb_recv_datagram(sk, flags, 0 , &ret);
285 if (!skb)
e6f95ec8 286 goto read_error;
dcda138d
SB
287 copylen = skb->len;
288 if (len < copylen) {
289 m->msg_flags |= MSG_TRUNC;
290 copylen = len;
e6f95ec8
SB
291 }
292
51f3d02b 293 ret = skb_copy_datagram_msg(skb, 0, m, copylen);
bece7b23 294 if (ret)
dcda138d 295 goto out_free;
e6f95ec8 296
dcda138d
SB
297 ret = (flags & MSG_TRUNC) ? skb->len : copylen;
298out_free:
bece7b23 299 skb_free_datagram(sk, skb);
bece7b23 300 caif_check_flow_release(sk);
dcda138d 301 return ret;
e6f95ec8 302
bece7b23
SB
303read_error:
304 return ret;
305}
e6f95ec8 306
e6f95ec8 307
bece7b23
SB
308/* Copied from unix_stream_wait_data, identical except for lock call. */
309static long caif_stream_data_wait(struct sock *sk, long timeo)
310{
311 DEFINE_WAIT(wait);
312 lock_sock(sk);
313
314 for (;;) {
315 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
316
317 if (!skb_queue_empty(&sk->sk_receive_queue) ||
318 sk->sk_err ||
319 sk->sk_state != CAIF_CONNECTED ||
320 sock_flag(sk, SOCK_DEAD) ||
321 (sk->sk_shutdown & RCV_SHUTDOWN) ||
322 signal_pending(current) ||
323 !timeo)
324 break;
e6f95ec8 325
9cd3e072 326 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
bece7b23
SB
327 release_sock(sk);
328 timeo = schedule_timeout(timeo);
329 lock_sock(sk);
b48732e4
MS
330
331 if (sock_flag(sk, SOCK_DEAD))
332 break;
333
9cd3e072 334 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
e6f95ec8
SB
335 }
336
bece7b23
SB
337 finish_wait(sk_sleep(sk), &wait);
338 release_sock(sk);
339 return timeo;
340}
e6f95ec8
SB
341
342
bece7b23
SB
343/*
344 * Copied from unix_stream_recvmsg, but removed credit checks,
345 * changed locking calls, changed address handling.
346 */
1b784140
YX
347static int caif_stream_recvmsg(struct socket *sock, struct msghdr *msg,
348 size_t size, int flags)
bece7b23
SB
349{
350 struct sock *sk = sock->sk;
351 int copied = 0;
352 int target;
353 int err = 0;
354 long timeo;
e6f95ec8 355
bece7b23
SB
356 err = -EOPNOTSUPP;
357 if (flags&MSG_OOB)
358 goto out;
e6f95ec8 359
bece7b23
SB
360 /*
361 * Lock the socket to prevent queue disordering
362 * while sleeps in memcpy_tomsg
363 */
364 err = -EAGAIN;
365 if (sk->sk_state == CAIF_CONNECTING)
366 goto out;
e6f95ec8 367
bece7b23
SB
368 caif_read_lock(sk);
369 target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
370 timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
e6f95ec8 371
bece7b23
SB
372 do {
373 int chunk;
374 struct sk_buff *skb;
e6f95ec8 375
bece7b23 376 lock_sock(sk);
b48732e4
MS
377 if (sock_flag(sk, SOCK_DEAD)) {
378 err = -ECONNRESET;
379 goto unlock;
380 }
bece7b23
SB
381 skb = skb_dequeue(&sk->sk_receive_queue);
382 caif_check_flow_release(sk);
e6f95ec8 383
bece7b23
SB
384 if (skb == NULL) {
385 if (copied >= target)
386 goto unlock;
387 /*
388 * POSIX 1003.1g mandates this order.
389 */
390 err = sock_error(sk);
391 if (err)
392 goto unlock;
393 err = -ECONNRESET;
394 if (sk->sk_shutdown & RCV_SHUTDOWN)
395 goto unlock;
e6f95ec8 396
bece7b23
SB
397 err = -EPIPE;
398 if (sk->sk_state != CAIF_CONNECTED)
399 goto unlock;
400 if (sock_flag(sk, SOCK_DEAD))
401 goto unlock;
e6f95ec8 402
bece7b23 403 release_sock(sk);
e6f95ec8 404
bece7b23
SB
405 err = -EAGAIN;
406 if (!timeo)
407 break;
e6f95ec8 408
bece7b23 409 caif_read_unlock(sk);
e6f95ec8 410
bece7b23 411 timeo = caif_stream_data_wait(sk, timeo);
e6f95ec8 412
bece7b23
SB
413 if (signal_pending(current)) {
414 err = sock_intr_errno(timeo);
415 goto out;
416 }
417 caif_read_lock(sk);
418 continue;
419unlock:
420 release_sock(sk);
421 break;
e6f95ec8 422 }
bece7b23
SB
423 release_sock(sk);
424 chunk = min_t(unsigned int, skb->len, size);
7eab8d9e 425 if (memcpy_to_msg(msg, skb->data, chunk)) {
bece7b23
SB
426 skb_queue_head(&sk->sk_receive_queue, skb);
427 if (copied == 0)
428 copied = -EFAULT;
429 break;
430 }
431 copied += chunk;
432 size -= chunk;
e6f95ec8 433
bece7b23
SB
434 /* Mark read part of skb as used */
435 if (!(flags & MSG_PEEK)) {
436 skb_pull(skb, chunk);
e6f95ec8 437
bece7b23
SB
438 /* put the skb back if we didn't use it up. */
439 if (skb->len) {
440 skb_queue_head(&sk->sk_receive_queue, skb);
441 break;
442 }
443 kfree_skb(skb);
e6f95ec8 444
e6f95ec8 445 } else {
bece7b23
SB
446 /*
447 * It is questionable, see note in unix_dgram_recvmsg.
448 */
449 /* put message back and return */
450 skb_queue_head(&sk->sk_receive_queue, skb);
451 break;
e6f95ec8 452 }
bece7b23
SB
453 } while (size);
454 caif_read_unlock(sk);
e6f95ec8 455
bece7b23
SB
456out:
457 return copied ? : err;
458}
e6f95ec8 459
bece7b23
SB
460/*
461 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
462 * CAIF flow-on and sock_writable.
463 */
464static long caif_wait_for_flow_on(struct caifsock *cf_sk,
3bffc475 465 int wait_writeable, long timeo, int *err)
bece7b23
SB
466{
467 struct sock *sk = &cf_sk->sk;
468 DEFINE_WAIT(wait);
469 for (;;) {
470 *err = 0;
471 if (tx_flow_is_on(cf_sk) &&
472 (!wait_writeable || sock_writeable(&cf_sk->sk)))
473 break;
474 *err = -ETIMEDOUT;
475 if (!timeo)
476 break;
477 *err = -ERESTARTSYS;
478 if (signal_pending(current))
479 break;
480 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
481 *err = -ECONNRESET;
482 if (sk->sk_shutdown & SHUTDOWN_MASK)
483 break;
484 *err = -sk->sk_err;
485 if (sk->sk_err)
486 break;
487 *err = -EPIPE;
488 if (cf_sk->sk.sk_state != CAIF_CONNECTED)
489 break;
490 timeo = schedule_timeout(timeo);
e6f95ec8 491 }
bece7b23
SB
492 finish_wait(sk_sleep(sk), &wait);
493 return timeo;
494}
e6f95ec8 495
bece7b23
SB
496/*
497 * Transmit a SKB. The device may temporarily request re-transmission
498 * by returning EAGAIN.
499 */
500static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
501 int noblock, long timeo)
502{
503 struct cfpkt *pkt;
e6f95ec8 504
bece7b23 505 pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
3f874adc 506 memset(skb->cb, 0, sizeof(struct caif_payload_info));
44764812 507 cfpkt_set_prio(pkt, cf_sk->sk.sk_priority);
e6f95ec8 508
ba760574
DT
509 if (cf_sk->layer.dn == NULL) {
510 kfree_skb(skb);
4dd820c0 511 return -EINVAL;
ba760574 512 }
e6f95ec8 513
4dd820c0 514 return cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
bece7b23 515}
e6f95ec8 516
bece7b23 517/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
1b784140
YX
518static int caif_seqpkt_sendmsg(struct socket *sock, struct msghdr *msg,
519 size_t len)
bece7b23
SB
520{
521 struct sock *sk = sock->sk;
522 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
523 int buffer_size;
524 int ret = 0;
525 struct sk_buff *skb = NULL;
526 int noblock;
527 long timeo;
528 caif_assert(cf_sk);
529 ret = sock_error(sk);
530 if (ret)
531 goto err;
532
533 ret = -EOPNOTSUPP;
534 if (msg->msg_flags&MSG_OOB)
535 goto err;
536
537 ret = -EOPNOTSUPP;
538 if (msg->msg_namelen)
539 goto err;
540
541 ret = -EINVAL;
991e6343
ZX
542 if (unlikely(msg->msg_iter.nr_segs == 0) ||
543 unlikely(msg->msg_iter.iov->iov_base == NULL))
bece7b23
SB
544 goto err;
545 noblock = msg->msg_flags & MSG_DONTWAIT;
546
bece7b23
SB
547 timeo = sock_sndtimeo(sk, noblock);
548 timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
549 1, timeo, &ret);
550
2aa40aef
SB
551 if (ret)
552 goto err;
bece7b23
SB
553 ret = -EPIPE;
554 if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
555 sock_flag(sk, SOCK_DEAD) ||
556 (sk->sk_shutdown & RCV_SHUTDOWN))
557 goto err;
558
2aa40aef
SB
559 /* Error if trying to write more than maximum frame size. */
560 ret = -EMSGSIZE;
561 if (len > cf_sk->maxframe && cf_sk->sk.sk_protocol != CAIFPROTO_RFM)
562 goto err;
563
564 buffer_size = len + cf_sk->headroom + cf_sk->tailroom;
565
bece7b23
SB
566 ret = -ENOMEM;
567 skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
2aa40aef
SB
568
569 if (!skb || skb_tailroom(skb) < buffer_size)
bece7b23 570 goto err;
2aa40aef
SB
571
572 skb_reserve(skb, cf_sk->headroom);
bece7b23 573
6ce8e9ce 574 ret = memcpy_from_msg(skb_put(skb, len), msg, len);
bece7b23
SB
575
576 if (ret)
577 goto err;
578 ret = transmit_skb(skb, cf_sk, noblock, timeo);
579 if (ret < 0)
c85c2951 580 /* skb is already freed */
581 return ret;
582
bece7b23
SB
583 return len;
584err:
585 kfree_skb(skb);
586 return ret;
587}
e6f95ec8 588
bece7b23
SB
589/*
590 * Copied from unix_stream_sendmsg and adapted to CAIF:
591 * Changed removed permission handling and added waiting for flow on
592 * and other minor adaptations.
593 */
1b784140
YX
594static int caif_stream_sendmsg(struct socket *sock, struct msghdr *msg,
595 size_t len)
bece7b23
SB
596{
597 struct sock *sk = sock->sk;
598 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
599 int err, size;
600 struct sk_buff *skb;
601 int sent = 0;
602 long timeo;
e6f95ec8 603
bece7b23 604 err = -EOPNOTSUPP;
bece7b23
SB
605 if (unlikely(msg->msg_flags&MSG_OOB))
606 goto out_err;
e6f95ec8 607
bece7b23
SB
608 if (unlikely(msg->msg_namelen))
609 goto out_err;
e6f95ec8 610
bece7b23
SB
611 timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
612 timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
e6f95ec8 613
bece7b23
SB
614 if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
615 goto pipe_err;
e6f95ec8 616
bece7b23 617 while (sent < len) {
e6f95ec8 618
bece7b23 619 size = len-sent;
e6f95ec8 620
2aa40aef
SB
621 if (size > cf_sk->maxframe)
622 size = cf_sk->maxframe;
e6f95ec8 623
bece7b23
SB
624 /* If size is more than half of sndbuf, chop up message */
625 if (size > ((sk->sk_sndbuf >> 1) - 64))
626 size = (sk->sk_sndbuf >> 1) - 64;
e6f95ec8 627
bece7b23
SB
628 if (size > SKB_MAX_ALLOC)
629 size = SKB_MAX_ALLOC;
e6f95ec8 630
bece7b23 631 skb = sock_alloc_send_skb(sk,
2aa40aef
SB
632 size + cf_sk->headroom +
633 cf_sk->tailroom,
bece7b23
SB
634 msg->msg_flags&MSG_DONTWAIT,
635 &err);
636 if (skb == NULL)
637 goto out_err;
e6f95ec8 638
2aa40aef 639 skb_reserve(skb, cf_sk->headroom);
bece7b23
SB
640 /*
641 * If you pass two values to the sock_alloc_send_skb
642 * it tries to grab the large buffer with GFP_NOFS
643 * (which can fail easily), and if it fails grab the
644 * fallback size buffer which is under a page and will
645 * succeed. [Alan]
646 */
647 size = min_t(int, size, skb_tailroom(skb));
e6f95ec8 648
6ce8e9ce 649 err = memcpy_from_msg(skb_put(skb, size), msg, size);
bece7b23
SB
650 if (err) {
651 kfree_skb(skb);
652 goto out_err;
653 }
654 err = transmit_skb(skb, cf_sk,
655 msg->msg_flags&MSG_DONTWAIT, timeo);
ba760574
DT
656 if (err < 0)
657 /* skb is already freed */
bece7b23 658 goto pipe_err;
ba760574 659
bece7b23 660 sent += size;
e6f95ec8 661 }
e6f95ec8 662
bece7b23 663 return sent;
e6f95ec8 664
bece7b23
SB
665pipe_err:
666 if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
667 send_sig(SIGPIPE, current, 0);
668 err = -EPIPE;
669out_err:
670 return sent ? : err;
e6f95ec8
SB
671}
672
a7b75c5a
CH
673static int setsockopt(struct socket *sock, int lvl, int opt, sockptr_t ov,
674 unsigned int ol)
e6f95ec8
SB
675{
676 struct sock *sk = sock->sk;
677 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
f2527ec4 678 int linksel;
e6f95ec8 679
bece7b23 680 if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
e6f95ec8 681 return -ENOPROTOOPT;
bece7b23 682
e6f95ec8
SB
683 switch (opt) {
684 case CAIFSO_LINK_SELECT:
bece7b23 685 if (ol < sizeof(int))
e6f95ec8 686 return -EINVAL;
e6f95ec8
SB
687 if (lvl != SOL_CAIF)
688 goto bad_sol;
a7b75c5a 689 if (copy_from_sockptr(&linksel, ov, sizeof(int)))
e6f95ec8
SB
690 return -EINVAL;
691 lock_sock(&(cf_sk->sk));
692 cf_sk->conn_req.link_selector = linksel;
693 release_sock(&cf_sk->sk);
694 return 0;
695
e6f95ec8
SB
696 case CAIFSO_REQ_PARAM:
697 if (lvl != SOL_CAIF)
698 goto bad_sol;
699 if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
700 return -ENOPROTOOPT;
e6f95ec8 701 lock_sock(&(cf_sk->sk));
bece7b23 702 if (ol > sizeof(cf_sk->conn_req.param.data) ||
a7b75c5a 703 copy_from_sockptr(&cf_sk->conn_req.param.data, ov, ol)) {
e6f95ec8 704 release_sock(&cf_sk->sk);
e6f95ec8
SB
705 return -EINVAL;
706 }
91b5c98c 707 cf_sk->conn_req.param.size = ol;
e6f95ec8
SB
708 release_sock(&cf_sk->sk);
709 return 0;
710
711 default:
bece7b23 712 return -ENOPROTOOPT;
e6f95ec8
SB
713 }
714
715 return 0;
716bad_sol:
e6f95ec8
SB
717 return -ENOPROTOOPT;
718
719}
720
bece7b23
SB
721/*
722 * caif_connect() - Connect a CAIF Socket
723 * Copied and modified af_irda.c:irda_connect().
724 *
725 * Note : by consulting "errno", the user space caller may learn the cause
726 * of the failure. Most of them are visible in the function, others may come
727 * from subroutines called and are listed here :
728 * o -EAFNOSUPPORT: bad socket family or type.
729 * o -ESOCKTNOSUPPORT: bad socket type or protocol
730 * o -EINVAL: bad socket address, or CAIF link type
731 * o -ECONNREFUSED: remote end refused the connection.
732 * o -EINPROGRESS: connect request sent but timed out (or non-blocking)
733 * o -EISCONN: already connected.
734 * o -ETIMEDOUT: Connection timed out (send timeout)
735 * o -ENODEV: No link layer to send request
736 * o -ECONNRESET: Received Shutdown indication or lost link layer
737 * o -ENOMEM: Out of memory
738 *
739 * State Strategy:
740 * o sk_state: holds the CAIF_* protocol state, it's updated by
741 * caif_ctrl_cb.
742 * o sock->state: holds the SS_* socket state and is updated by connect and
743 * disconnect.
744 */
745static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
746 int addr_len, int flags)
e6f95ec8 747{
e6f95ec8 748 struct sock *sk = sock->sk;
bece7b23
SB
749 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
750 long timeo;
751 int err;
2aa40aef 752 int ifindex, headroom, tailroom;
79315068 753 unsigned int mtu;
2aa40aef
SB
754 struct net_device *dev;
755
bece7b23 756 lock_sock(sk);
e6f95ec8 757
20a3d5bf
MJ
758 err = -EINVAL;
759 if (addr_len < offsetofend(struct sockaddr, sa_family))
760 goto out;
761
bece7b23
SB
762 err = -EAFNOSUPPORT;
763 if (uaddr->sa_family != AF_CAIF)
e6f95ec8
SB
764 goto out;
765
bece7b23
SB
766 switch (sock->state) {
767 case SS_UNCONNECTED:
768 /* Normal case, a fresh connect */
769 caif_assert(sk->sk_state == CAIF_DISCONNECTED);
770 break;
771 case SS_CONNECTING:
772 switch (sk->sk_state) {
773 case CAIF_CONNECTED:
774 sock->state = SS_CONNECTED;
775 err = -EISCONN;
776 goto out;
777 case CAIF_DISCONNECTED:
778 /* Reconnect allowed */
779 break;
780 case CAIF_CONNECTING:
781 err = -EALREADY;
782 if (flags & O_NONBLOCK)
783 goto out;
784 goto wait_connect;
785 }
786 break;
787 case SS_CONNECTED:
788 caif_assert(sk->sk_state == CAIF_CONNECTED ||
789 sk->sk_state == CAIF_DISCONNECTED);
790 if (sk->sk_shutdown & SHUTDOWN_MASK) {
791 /* Allow re-connect after SHUTDOWN_IND */
bee925db 792 caif_disconnect_client(sock_net(sk), &cf_sk->layer);
54e90fb5 793 caif_free_client(&cf_sk->layer);
bece7b23
SB
794 break;
795 }
796 /* No reconnect on a seqpacket socket */
797 err = -EISCONN;
798 goto out;
799 case SS_DISCONNECTING:
800 case SS_FREE:
801 caif_assert(1); /*Should never happen */
802 break;
e6f95ec8 803 }
bece7b23
SB
804 sk->sk_state = CAIF_DISCONNECTED;
805 sock->state = SS_UNCONNECTED;
806 sk_stream_kill_queues(&cf_sk->sk);
e6f95ec8 807
bece7b23 808 err = -EINVAL;
f5d72af9 809 if (addr_len != sizeof(struct sockaddr_caif))
bece7b23 810 goto out;
e6f95ec8 811
bece7b23 812 memcpy(&cf_sk->conn_req.sockaddr, uaddr,
e6f95ec8
SB
813 sizeof(struct sockaddr_caif));
814
bece7b23
SB
815 /* Move to connecting socket, start sending Connect Requests */
816 sock->state = SS_CONNECTING;
817 sk->sk_state = CAIF_CONNECTING;
818
33b2f559 819 /* Check priority value comming from socket */
f2527ec4
ACM
820 /* if priority value is out of range it will be ajusted */
821 if (cf_sk->sk.sk_priority > CAIF_PRIO_MAX)
822 cf_sk->conn_req.priority = CAIF_PRIO_MAX;
823 else if (cf_sk->sk.sk_priority < CAIF_PRIO_MIN)
824 cf_sk->conn_req.priority = CAIF_PRIO_MIN;
825 else
826 cf_sk->conn_req.priority = cf_sk->sk.sk_priority;
827
828 /*ifindex = id of the interface.*/
829 cf_sk->conn_req.ifindex = cf_sk->sk.sk_bound_dev_if;
830
bece7b23 831 cf_sk->layer.receive = caif_sktrecv_cb;
b3ccfbe4 832
bee925db 833 err = caif_connect_client(sock_net(sk), &cf_sk->conn_req,
2aa40aef 834 &cf_sk->layer, &ifindex, &headroom, &tailroom);
b3ccfbe4 835
bece7b23
SB
836 if (err < 0) {
837 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
838 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
839 goto out;
e6f95ec8 840 }
79315068
ED
841
842 err = -ENODEV;
843 rcu_read_lock();
844 dev = dev_get_by_index_rcu(sock_net(sk), ifindex);
845 if (!dev) {
846 rcu_read_unlock();
847 goto out;
848 }
2aa40aef 849 cf_sk->headroom = LL_RESERVED_SPACE_EXTRA(dev, headroom);
79315068
ED
850 mtu = dev->mtu;
851 rcu_read_unlock();
852
2aa40aef 853 cf_sk->tailroom = tailroom;
79315068 854 cf_sk->maxframe = mtu - (headroom + tailroom);
2aa40aef 855 if (cf_sk->maxframe < 1) {
b31fa5ba 856 pr_warn("CAIF Interface MTU too small (%d)\n", dev->mtu);
f2527ec4 857 err = -ENODEV;
2aa40aef
SB
858 goto out;
859 }
e6f95ec8 860
bece7b23
SB
861 err = -EINPROGRESS;
862wait_connect:
e6f95ec8 863
bece7b23
SB
864 if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
865 goto out;
e6f95ec8 866
bece7b23
SB
867 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
868
869 release_sock(sk);
9e4b816b
SB
870 err = -ERESTARTSYS;
871 timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
bece7b23
SB
872 sk->sk_state != CAIF_CONNECTING,
873 timeo);
874 lock_sock(sk);
9e4b816b 875 if (timeo < 0)
bece7b23 876 goto out; /* -ERESTARTSYS */
e6f95ec8 877
9e4b816b
SB
878 err = -ETIMEDOUT;
879 if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
880 goto out;
bece7b23
SB
881 if (sk->sk_state != CAIF_CONNECTED) {
882 sock->state = SS_UNCONNECTED;
883 err = sock_error(sk);
884 if (!err)
885 err = -ECONNREFUSED;
886 goto out;
887 }
888 sock->state = SS_CONNECTED;
889 err = 0;
e6f95ec8 890out:
bece7b23
SB
891 release_sock(sk);
892 return err;
e6f95ec8
SB
893}
894
bece7b23
SB
895/*
896 * caif_release() - Disconnect a CAIF Socket
897 * Copied and modified af_irda.c:irda_release().
898 */
899static int caif_release(struct socket *sock)
e6f95ec8 900{
e6f95ec8 901 struct sock *sk = sock->sk;
bece7b23 902 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 903
bece7b23
SB
904 if (!sk)
905 return 0;
e6f95ec8 906
bece7b23 907 set_tx_flow_off(cf_sk);
e6f95ec8
SB
908
909 /*
bece7b23
SB
910 * Ensure that packets are not queued after this point in time.
911 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
912 * this ensures no packets when sock is dead.
e6f95ec8 913 */
c85c2951 914 spin_lock_bh(&sk->sk_receive_queue.lock);
bece7b23 915 sock_set_flag(sk, SOCK_DEAD);
c85c2951 916 spin_unlock_bh(&sk->sk_receive_queue.lock);
bece7b23 917 sock->sk = NULL;
e6f95ec8 918
33b2f559 919 WARN_ON(IS_ERR(cf_sk->debugfs_socket_dir));
fb0d164c 920 debugfs_remove_recursive(cf_sk->debugfs_socket_dir);
e6f95ec8 921
e6f95ec8 922 lock_sock(&(cf_sk->sk));
bece7b23
SB
923 sk->sk_state = CAIF_DISCONNECTED;
924 sk->sk_shutdown = SHUTDOWN_MASK;
e6f95ec8 925
54e90fb5 926 caif_disconnect_client(sock_net(sk), &cf_sk->layer);
bece7b23 927 cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
a9a08845 928 wake_up_interruptible_poll(sk_sleep(sk), EPOLLERR|EPOLLHUP);
e6f95ec8 929
bece7b23 930 sock_orphan(sk);
bece7b23
SB
931 sk_stream_kill_queues(&cf_sk->sk);
932 release_sock(sk);
933 sock_put(sk);
54e90fb5 934 return 0;
bece7b23 935}
e6f95ec8 936
bece7b23 937/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
a11e1d43
LT
938static __poll_t caif_poll(struct file *file,
939 struct socket *sock, poll_table *wait)
bece7b23
SB
940{
941 struct sock *sk = sock->sk;
a11e1d43 942 __poll_t mask;
bece7b23 943 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
a11e1d43 944
89ab066d 945 sock_poll_wait(file, sock, wait);
a11e1d43 946 mask = 0;
e6f95ec8 947
bece7b23
SB
948 /* exceptional events? */
949 if (sk->sk_err)
a9a08845 950 mask |= EPOLLERR;
bece7b23 951 if (sk->sk_shutdown == SHUTDOWN_MASK)
a9a08845 952 mask |= EPOLLHUP;
bece7b23 953 if (sk->sk_shutdown & RCV_SHUTDOWN)
a9a08845 954 mask |= EPOLLRDHUP;
e6f95ec8 955
bece7b23 956 /* readable? */
3ef7cf57 957 if (!skb_queue_empty_lockless(&sk->sk_receive_queue) ||
bece7b23 958 (sk->sk_shutdown & RCV_SHUTDOWN))
a9a08845 959 mask |= EPOLLIN | EPOLLRDNORM;
e6f95ec8 960
e6f95ec8 961 /*
bece7b23
SB
962 * we set writable also when the other side has shut down the
963 * connection. This prevents stuck sockets.
e6f95ec8 964 */
bece7b23 965 if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
a9a08845 966 mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
bece7b23
SB
967
968 return mask;
e6f95ec8
SB
969}
970
bece7b23
SB
971static const struct proto_ops caif_seqpacket_ops = {
972 .family = PF_CAIF,
973 .owner = THIS_MODULE,
974 .release = caif_release,
975 .bind = sock_no_bind,
976 .connect = caif_connect,
977 .socketpair = sock_no_socketpair,
978 .accept = sock_no_accept,
979 .getname = sock_no_getname,
a11e1d43 980 .poll = caif_poll,
bece7b23
SB
981 .ioctl = sock_no_ioctl,
982 .listen = sock_no_listen,
983 .shutdown = sock_no_shutdown,
984 .setsockopt = setsockopt,
bece7b23
SB
985 .sendmsg = caif_seqpkt_sendmsg,
986 .recvmsg = caif_seqpkt_recvmsg,
987 .mmap = sock_no_mmap,
988 .sendpage = sock_no_sendpage,
989};
990
991static const struct proto_ops caif_stream_ops = {
e6f95ec8
SB
992 .family = PF_CAIF,
993 .owner = THIS_MODULE,
994 .release = caif_release,
995 .bind = sock_no_bind,
996 .connect = caif_connect,
997 .socketpair = sock_no_socketpair,
998 .accept = sock_no_accept,
999 .getname = sock_no_getname,
a11e1d43 1000 .poll = caif_poll,
e6f95ec8
SB
1001 .ioctl = sock_no_ioctl,
1002 .listen = sock_no_listen,
bece7b23 1003 .shutdown = sock_no_shutdown,
e6f95ec8 1004 .setsockopt = setsockopt,
bece7b23
SB
1005 .sendmsg = caif_stream_sendmsg,
1006 .recvmsg = caif_stream_recvmsg,
e6f95ec8 1007 .mmap = sock_no_mmap,
bece7b23 1008 .sendpage = sock_no_sendpage,
e6f95ec8
SB
1009};
1010
1011/* This function is called when a socket is finally destroyed. */
1012static void caif_sock_destructor(struct sock *sk)
1013{
bece7b23 1014 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
14afee4b 1015 caif_assert(!refcount_read(&sk->sk_wmem_alloc));
e6f95ec8
SB
1016 caif_assert(sk_unhashed(sk));
1017 caif_assert(!sk->sk_socket);
1018 if (!sock_flag(sk, SOCK_DEAD)) {
33b2f559 1019 pr_debug("Attempt to release alive CAIF socket: %p\n", sk);
e6f95ec8
SB
1020 return;
1021 }
bece7b23 1022 sk_stream_kill_queues(&cf_sk->sk);
b3ccfbe4 1023 caif_free_client(&cf_sk->layer);
e6f95ec8
SB
1024}
1025
1026static int caif_create(struct net *net, struct socket *sock, int protocol,
3bffc475 1027 int kern)
e6f95ec8
SB
1028{
1029 struct sock *sk = NULL;
1030 struct caifsock *cf_sk = NULL;
e6f95ec8
SB
1031 static struct proto prot = {.name = "PF_CAIF",
1032 .owner = THIS_MODULE,
1033 .obj_size = sizeof(struct caifsock),
93070d33
DW
1034 .useroffset = offsetof(struct caifsock, conn_req.param),
1035 .usersize = sizeof_field(struct caifsock, conn_req.param)
e6f95ec8
SB
1036 };
1037
bece7b23
SB
1038 if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
1039 return -EPERM;
e6f95ec8
SB
1040 /*
1041 * The sock->type specifies the socket type to use.
bece7b23
SB
1042 * The CAIF socket is a packet stream in the sense
1043 * that it is packet based. CAIF trusts the reliability
1044 * of the link, no resending is implemented.
e6f95ec8 1045 */
bece7b23
SB
1046 if (sock->type == SOCK_SEQPACKET)
1047 sock->ops = &caif_seqpacket_ops;
1048 else if (sock->type == SOCK_STREAM)
1049 sock->ops = &caif_stream_ops;
1050 else
e6f95ec8
SB
1051 return -ESOCKTNOSUPPORT;
1052
e6f95ec8
SB
1053 if (protocol < 0 || protocol >= CAIFPROTO_MAX)
1054 return -EPROTONOSUPPORT;
1055 /*
bece7b23
SB
1056 * Set the socket state to unconnected. The socket state
1057 * is really not used at all in the net/core or socket.c but the
e6f95ec8
SB
1058 * initialization makes sure that sock->state is not uninitialized.
1059 */
11aa9c28 1060 sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot, kern);
e6f95ec8
SB
1061 if (!sk)
1062 return -ENOMEM;
1063
1064 cf_sk = container_of(sk, struct caifsock, sk);
1065
1066 /* Store the protocol */
1067 sk->sk_protocol = (unsigned char) protocol;
1068
44764812
DT
1069 /* Initialize default priority for well-known cases */
1070 switch (protocol) {
1071 case CAIFPROTO_AT:
1072 sk->sk_priority = TC_PRIO_CONTROL;
1073 break;
1074 case CAIFPROTO_RFM:
1075 sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
1076 break;
1077 default:
1078 sk->sk_priority = TC_PRIO_BESTEFFORT;
1079 }
1080
e6f95ec8
SB
1081 /*
1082 * Lock in order to try to stop someone from opening the socket
1083 * too early.
1084 */
1085 lock_sock(&(cf_sk->sk));
1086
1087 /* Initialize the nozero default sock structure data. */
1088 sock_init_data(sock, sk);
e6f95ec8 1089 sk->sk_destruct = caif_sock_destructor;
e6f95ec8 1090
bece7b23
SB
1091 mutex_init(&cf_sk->readlock); /* single task reading lock */
1092 cf_sk->layer.ctrlcmd = caif_ctrl_cb;
1093 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
1094 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
e6f95ec8 1095
bece7b23
SB
1096 set_tx_flow_off(cf_sk);
1097 set_rx_flow_on(cf_sk);
e6f95ec8
SB
1098
1099 /* Set default options on configuration */
bece7b23 1100 cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
e6f95ec8 1101 cf_sk->conn_req.protocol = protocol;
e6f95ec8
SB
1102 release_sock(&cf_sk->sk);
1103 return 0;
e6f95ec8
SB
1104}
1105
bece7b23 1106
173e7837 1107static const struct net_proto_family caif_family_ops = {
e6f95ec8
SB
1108 .family = PF_CAIF,
1109 .create = caif_create,
1110 .owner = THIS_MODULE,
1111};
1112
4a695823 1113static int __init caif_sktinit_module(void)
e6f95ec8 1114{
c79e167c 1115 return sock_register(&caif_family_ops);
e6f95ec8
SB
1116}
1117
e6f95ec8
SB
1118static void __exit caif_sktexit_module(void)
1119{
1120 sock_unregister(PF_CAIF);
e6f95ec8 1121}
e6f95ec8
SB
1122module_init(caif_sktinit_module);
1123module_exit(caif_sktexit_module);