]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/llc/af_llc.c
xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi
[mirror_ubuntu-bionic-kernel.git] / net / llc / af_llc.c
CommitLineData
1da177e4
LT
1/*
2 * af_llc.c - LLC User Interface SAPs
3 * Description:
4 * Functions in this module are implementation of socket based llc
5 * communications for the Linux operating system. Support of llc class
6 * one and class two is provided via SOCK_DGRAM and SOCK_STREAM
7 * respectively.
8 *
9 * An llc2 connection is (mac + sap), only one llc2 sap connection
10 * is allowed per mac. Though one sap may have multiple mac + sap
11 * connections.
12 *
13 * Copyright (c) 2001 by Jay Schulist <jschlst@samba.org>
14 * 2002-2003 by Arnaldo Carvalho de Melo <acme@conectiva.com.br>
15 *
16 * This program can be redistributed or modified under the terms of the
17 * GNU General Public License as published by the Free Software Foundation.
18 * This program is distributed without any warranty or implied warranty
19 * of merchantability or fitness for a particular purpose.
20 *
21 * See the GNU General Public License for more details.
22 */
6e2144b7 23#include <linux/compiler.h>
1da177e4
LT
24#include <linux/kernel.h>
25#include <linux/module.h>
1da177e4
LT
26#include <linux/rtnetlink.h>
27#include <linux/init.h>
5a0e3ad6 28#include <linux/slab.h>
174cd4b1
IM
29#include <linux/sched/signal.h>
30
1da177e4
LT
31#include <net/llc.h>
32#include <net/llc_sap.h>
33#include <net/llc_pdu.h>
34#include <net/llc_conn.h>
c752f073 35#include <net/tcp_states.h>
1da177e4
LT
36
37/* remember: uninitialized global data is zeroed because its in .bss */
38static u16 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
39static u16 llc_ui_sap_link_no_max[256];
40static struct sockaddr_llc llc_ui_addrnull;
90ddc4f0 41static const struct proto_ops llc_ui_ops;
1da177e4 42
5ff904d5 43static bool llc_ui_wait_for_conn(struct sock *sk, long timeout);
54fb7f25 44static int llc_ui_wait_for_disc(struct sock *sk, long timeout);
54fb7f25 45static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout);
1da177e4
LT
46
47#if 0
48#define dprintk(args...) printk(KERN_DEBUG args)
49#else
50#define dprintk(args...)
51#endif
52
e5cd6fe3
OP
53/* Maybe we'll add some more in the future. */
54#define LLC_CMSG_PKTINFO 1
55
56
1da177e4
LT
57/**
58 * llc_ui_next_link_no - return the next unused link number for a sap
59 * @sap: Address of sap to get link number from.
60 *
61 * Return the next unused link number for a given sap.
62 */
2342c990 63static inline u16 llc_ui_next_link_no(int sap)
1da177e4
LT
64{
65 return llc_ui_sap_link_no_max[sap]++;
66}
67
68/**
69 * llc_proto_type - return eth protocol for ARP header type
70 * @arphrd: ARP header type.
71 *
72 * Given an ARP header type return the corresponding ethernet protocol.
73 */
3fbd418a 74static inline __be16 llc_proto_type(u16 arphrd)
1da177e4 75{
211ed865 76 return htons(ETH_P_802_2);
1da177e4
LT
77}
78
79/**
80 * llc_ui_addr_null - determines if a address structure is null
81 * @addr: Address to test if null.
82 */
2342c990 83static inline u8 llc_ui_addr_null(struct sockaddr_llc *addr)
1da177e4
LT
84{
85 return !memcmp(addr, &llc_ui_addrnull, sizeof(*addr));
86}
87
88/**
89 * llc_ui_header_len - return length of llc header based on operation
90 * @sk: Socket which contains a valid llc socket type.
91 * @addr: Complete sockaddr_llc structure received from the user.
92 *
93 * Provide the length of the llc header depending on what kind of
94 * operation the user would like to perform and the type of socket.
95 * Returns the correct llc header length.
96 */
2342c990 97static inline u8 llc_ui_header_len(struct sock *sk, struct sockaddr_llc *addr)
1da177e4
LT
98{
99 u8 rc = LLC_PDU_LEN_U;
100
101 if (addr->sllc_test || addr->sllc_xid)
102 rc = LLC_PDU_LEN_U;
103 else if (sk->sk_type == SOCK_STREAM)
104 rc = LLC_PDU_LEN_I;
105 return rc;
106}
107
108/**
109 * llc_ui_send_data - send data via reliable llc2 connection
110 * @sk: Connection the socket is using.
111 * @skb: Data the user wishes to send.
1da177e4
LT
112 * @noblock: can we block waiting for data?
113 *
114 * Send data via reliable llc2 connection.
115 * Returns 0 upon success, non-zero if action did not succeed.
116 */
117static int llc_ui_send_data(struct sock* sk, struct sk_buff *skb, int noblock)
118{
119 struct llc_sock* llc = llc_sk(sk);
120 int rc = 0;
121
d57b1869 122 if (unlikely(llc_data_accept_state(llc->state) ||
451677c4
JF
123 llc->remote_busy_flag ||
124 llc->p_flag)) {
54fb7f25 125 long timeout = sock_sndtimeo(sk, noblock);
1da177e4
LT
126
127 rc = llc_ui_wait_for_busy_core(sk, timeout);
128 }
249ff1c6 129 if (unlikely(!rc))
1da177e4
LT
130 rc = llc_build_and_send_pkt(sk, skb);
131 return rc;
132}
133
134static void llc_ui_sk_init(struct socket *sock, struct sock *sk)
135{
ee5850de 136 sock_graft(sk, sock);
1da177e4 137 sk->sk_type = sock->type;
1da177e4
LT
138 sock->ops = &llc_ui_ops;
139}
140
141static struct proto llc_proto = {
9c005e01 142 .name = "LLC",
1da177e4
LT
143 .owner = THIS_MODULE,
144 .obj_size = sizeof(struct llc_sock),
5f0d5a3a 145 .slab_flags = SLAB_TYPESAFE_BY_RCU,
1da177e4
LT
146};
147
148/**
149 * llc_ui_create - alloc and init a new llc_ui socket
3f378b68 150 * @net: network namespace (must be default network)
1da177e4
LT
151 * @sock: Socket to initialize and attach allocated sk to.
152 * @protocol: Unused.
3f378b68 153 * @kern: on behalf of kernel or userspace
1da177e4
LT
154 *
155 * Allocate and initialize a new llc_ui socket, validate the user wants a
156 * socket type we have available.
157 * Returns 0 upon success, negative upon failure.
158 */
3f378b68
EP
159static int llc_ui_create(struct net *net, struct socket *sock, int protocol,
160 int kern)
1da177e4
LT
161{
162 struct sock *sk;
163 int rc = -ESOCKTNOSUPPORT;
164
df008c91 165 if (!ns_capable(net->user_ns, CAP_NET_RAW))
3480c63b
PM
166 return -EPERM;
167
09ad9bc7 168 if (!net_eq(net, &init_net))
1b8d7ae4
EB
169 return -EAFNOSUPPORT;
170
af426d32 171 if (likely(sock->type == SOCK_DGRAM || sock->type == SOCK_STREAM)) {
1da177e4 172 rc = -ENOMEM;
11aa9c28 173 sk = llc_sk_alloc(net, PF_LLC, GFP_KERNEL, &llc_proto, kern);
1da177e4
LT
174 if (sk) {
175 rc = 0;
176 llc_ui_sk_init(sock, sk);
177 }
178 }
179 return rc;
180}
181
182/**
183 * llc_ui_release - shutdown socket
184 * @sock: Socket to release.
185 *
186 * Shutdown and deallocate an existing socket.
187 */
188static int llc_ui_release(struct socket *sock)
189{
190 struct sock *sk = sock->sk;
191 struct llc_sock *llc;
192
af426d32 193 if (unlikely(sk == NULL))
1da177e4
LT
194 goto out;
195 sock_hold(sk);
196 lock_sock(sk);
197 llc = llc_sk(sk);
0dc47877 198 dprintk("%s: closing local(%02X) remote(%02X)\n", __func__,
1da177e4
LT
199 llc->laddr.lsap, llc->daddr.lsap);
200 if (!llc_send_disc(sk))
201 llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
d30adf01
CW
202 if (!sock_flag(sk, SOCK_ZAPPED)) {
203 struct llc_sap *sap = llc->sap;
204
205 /* Hold this for release_sock(), so that llc_backlog_rcv()
206 * could still use it.
207 */
208 llc_sap_hold(sap);
1da177e4 209 llc_sap_remove_socket(llc->sap, sk);
d30adf01
CW
210 release_sock(sk);
211 llc_sap_put(sap);
212 } else {
213 release_sock(sk);
214 }
1da177e4
LT
215 if (llc->dev)
216 dev_put(llc->dev);
217 sock_put(sk);
218 llc_sk_free(sk);
219out:
220 return 0;
221}
222
223/**
224 * llc_ui_autoport - provide dynamically allocate SAP number
225 *
226 * Provide the caller with a dynamically allocated SAP number according
227 * to the rules that are set in this function. Returns: 0, upon failure,
228 * SAP number otherwise.
229 */
230static int llc_ui_autoport(void)
231{
232 struct llc_sap *sap;
233 int i, tries = 0;
234
235 while (tries < LLC_SAP_DYN_TRIES) {
236 for (i = llc_ui_sap_last_autoport;
237 i < LLC_SAP_DYN_STOP; i += 2) {
238 sap = llc_sap_find(i);
239 if (!sap) {
240 llc_ui_sap_last_autoport = i + 2;
241 goto out;
242 }
6e2144b7 243 llc_sap_put(sap);
1da177e4
LT
244 }
245 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
246 tries++;
247 }
248 i = 0;
249out:
250 return i;
251}
252
253/**
5a770c02
ACM
254 * llc_ui_autobind - automatically bind a socket to a sap
255 * @sock: socket to bind
256 * @addr: address to connect to
257 *
258 * Used by llc_ui_connect and llc_ui_sendmsg when the user hasn't
259 * specifically used llc_ui_bind to bind to an specific address/sap
1da177e4 260 *
1da177e4
LT
261 * Returns: 0 upon success, negative otherwise.
262 */
263static int llc_ui_autobind(struct socket *sock, struct sockaddr_llc *addr)
264{
265 struct sock *sk = sock->sk;
266 struct llc_sock *llc = llc_sk(sk);
267 struct llc_sap *sap;
268 int rc = -EINVAL;
269
270 if (!sock_flag(sk, SOCK_ZAPPED))
271 goto out;
272 rc = -ENODEV;
abf9d537
OP
273 if (sk->sk_bound_dev_if) {
274 llc->dev = dev_get_by_index(&init_net, sk->sk_bound_dev_if);
275 if (llc->dev && addr->sllc_arphrd != llc->dev->type) {
276 dev_put(llc->dev);
277 llc->dev = NULL;
278 }
279 } else
280 llc->dev = dev_getfirstbyhwtype(&init_net, addr->sllc_arphrd);
1da177e4
LT
281 if (!llc->dev)
282 goto out;
283 rc = -EUSERS;
284 llc->laddr.lsap = llc_ui_autoport();
285 if (!llc->laddr.lsap)
286 goto out;
287 rc = -EBUSY; /* some other network layer is using the sap */
288 sap = llc_sap_open(llc->laddr.lsap, NULL);
289 if (!sap)
290 goto out;
291 memcpy(llc->laddr.mac, llc->dev->dev_addr, IFHWADDRLEN);
292 memcpy(&llc->addr, addr, sizeof(llc->addr));
293 /* assign new connection to its SAP */
294 llc_sap_add_socket(sap, sk);
295 sock_reset_flag(sk, SOCK_ZAPPED);
296 rc = 0;
297out:
298 return rc;
299}
300
301/**
302 * llc_ui_bind - bind a socket to a specific address.
303 * @sock: Socket to bind an address to.
304 * @uaddr: Address the user wants the socket bound to.
305 * @addrlen: Length of the uaddr structure.
306 *
307 * Bind a socket to a specific address. For llc a user is able to bind to
5a770c02 308 * a specific sap only or mac + sap.
1da177e4
LT
309 * If the user desires to bind to a specific mac + sap, it is possible to
310 * have multiple sap connections via multiple macs.
311 * Bind and autobind for that matter must enforce the correct sap usage
312 * otherwise all hell will break loose.
313 * Returns: 0 upon success, negative otherwise.
314 */
315static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen)
316{
317 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
318 struct sock *sk = sock->sk;
319 struct llc_sock *llc = llc_sk(sk);
320 struct llc_sap *sap;
321 int rc = -EINVAL;
322
0dc47877 323 dprintk("%s: binding %02X\n", __func__, addr->sllc_sap);
0908cf4d 324
325 lock_sock(sk);
af426d32 326 if (unlikely(!sock_flag(sk, SOCK_ZAPPED) || addrlen != sizeof(*addr)))
1da177e4
LT
327 goto out;
328 rc = -EAFNOSUPPORT;
af426d32 329 if (unlikely(addr->sllc_family != AF_LLC))
1da177e4 330 goto out;
cf309e3f 331 rc = -ENODEV;
941666c2 332 rcu_read_lock();
abf9d537 333 if (sk->sk_bound_dev_if) {
941666c2 334 llc->dev = dev_get_by_index_rcu(&init_net, sk->sk_bound_dev_if);
abf9d537
OP
335 if (llc->dev) {
336 if (!addr->sllc_arphrd)
337 addr->sllc_arphrd = llc->dev->type;
951fd874 338 if (is_zero_ether_addr(addr->sllc_mac))
abf9d537
OP
339 memcpy(addr->sllc_mac, llc->dev->dev_addr,
340 IFHWADDRLEN);
341 if (addr->sllc_arphrd != llc->dev->type ||
951fd874
JP
342 !ether_addr_equal(addr->sllc_mac,
343 llc->dev->dev_addr)) {
abf9d537 344 rc = -EINVAL;
abf9d537
OP
345 llc->dev = NULL;
346 }
347 }
348 } else
941666c2 349 llc->dev = dev_getbyhwaddr_rcu(&init_net, addr->sllc_arphrd,
abf9d537 350 addr->sllc_mac);
941666c2
ED
351 if (llc->dev)
352 dev_hold(llc->dev);
353 rcu_read_unlock();
cf309e3f
JF
354 if (!llc->dev)
355 goto out;
1da177e4
LT
356 if (!addr->sllc_sap) {
357 rc = -EUSERS;
358 addr->sllc_sap = llc_ui_autoport();
359 if (!addr->sllc_sap)
360 goto out;
361 }
362 sap = llc_sap_find(addr->sllc_sap);
363 if (!sap) {
364 sap = llc_sap_open(addr->sllc_sap, NULL);
365 rc = -EBUSY; /* some other network layer is using the sap */
366 if (!sap)
367 goto out;
368 } else {
369 struct llc_addr laddr, daddr;
370 struct sock *ask;
371
372 memset(&laddr, 0, sizeof(laddr));
373 memset(&daddr, 0, sizeof(daddr));
374 /*
59c51591 375 * FIXME: check if the address is multicast,
1da177e4
LT
376 * only SOCK_DGRAM can do this.
377 */
378 memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN);
379 laddr.lsap = addr->sllc_sap;
380 rc = -EADDRINUSE; /* mac + sap clash. */
381 ask = llc_lookup_established(sap, &daddr, &laddr);
382 if (ask) {
383 sock_put(ask);
6e2144b7 384 goto out_put;
1da177e4
LT
385 }
386 }
387 llc->laddr.lsap = addr->sllc_sap;
388 memcpy(llc->laddr.mac, addr->sllc_mac, IFHWADDRLEN);
389 memcpy(&llc->addr, addr, sizeof(llc->addr));
390 /* assign new connection to its SAP */
391 llc_sap_add_socket(sap, sk);
392 sock_reset_flag(sk, SOCK_ZAPPED);
393 rc = 0;
6e2144b7
ACM
394out_put:
395 llc_sap_put(sap);
1da177e4 396out:
0908cf4d 397 release_sock(sk);
1da177e4
LT
398 return rc;
399}
400
401/**
402 * llc_ui_shutdown - shutdown a connect llc2 socket.
403 * @sock: Socket to shutdown.
404 * @how: What part of the socket to shutdown.
405 *
406 * Shutdown a connected llc2 socket. Currently this function only supports
407 * shutting down both sends and receives (2), we could probably make this
408 * function such that a user can shutdown only half the connection but not
409 * right now.
410 * Returns: 0 upon success, negative otherwise.
411 */
412static int llc_ui_shutdown(struct socket *sock, int how)
413{
414 struct sock *sk = sock->sk;
415 int rc = -ENOTCONN;
416
417 lock_sock(sk);
af426d32 418 if (unlikely(sk->sk_state != TCP_ESTABLISHED))
1da177e4
LT
419 goto out;
420 rc = -EINVAL;
421 if (how != 2)
422 goto out;
423 rc = llc_send_disc(sk);
424 if (!rc)
425 rc = llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
426 /* Wake up anyone sleeping in poll */
427 sk->sk_state_change(sk);
428out:
429 release_sock(sk);
430 return rc;
431}
432
433/**
434 * llc_ui_connect - Connect to a remote llc2 mac + sap.
435 * @sock: Socket which will be connected to the remote destination.
436 * @uaddr: Remote and possibly the local address of the new connection.
437 * @addrlen: Size of uaddr structure.
438 * @flags: Operational flags specified by the user.
439 *
440 * Connect to a remote llc2 mac + sap. The caller must specify the
441 * destination mac and address to connect to. If the user hasn't previously
442 * called bind(2) with a smac the address of the first interface of the
443 * specified arp type will be used.
444 * This function will autobind if user did not previously call bind.
445 * Returns: 0 upon success, negative otherwise.
446 */
447static int llc_ui_connect(struct socket *sock, struct sockaddr *uaddr,
448 int addrlen, int flags)
449{
450 struct sock *sk = sock->sk;
451 struct llc_sock *llc = llc_sk(sk);
452 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
1da177e4
LT
453 int rc = -EINVAL;
454
455 lock_sock(sk);
af426d32 456 if (unlikely(addrlen != sizeof(*addr)))
1da177e4
LT
457 goto out;
458 rc = -EAFNOSUPPORT;
af426d32
ACM
459 if (unlikely(addr->sllc_family != AF_LLC))
460 goto out;
461 if (unlikely(sk->sk_type != SOCK_STREAM))
462 goto out;
463 rc = -EALREADY;
464 if (unlikely(sock->state == SS_CONNECTING))
1da177e4
LT
465 goto out;
466 /* bind connection to sap if user hasn't done it. */
467 if (sock_flag(sk, SOCK_ZAPPED)) {
468 /* bind to sap with null dev, exclusive */
469 rc = llc_ui_autobind(sock, addr);
470 if (rc)
471 goto out;
1da177e4 472 }
5564af21
JF
473 llc->daddr.lsap = addr->sllc_sap;
474 memcpy(llc->daddr.mac, addr->sllc_mac, IFHWADDRLEN);
1da177e4
LT
475 sock->state = SS_CONNECTING;
476 sk->sk_state = TCP_SYN_SENT;
477 llc->link = llc_ui_next_link_no(llc->sap->laddr.lsap);
774ccb4f 478 rc = llc_establish_connection(sk, llc->dev->dev_addr,
1da177e4
LT
479 addr->sllc_mac, addr->sllc_sap);
480 if (rc) {
0dc47877 481 dprintk("%s: llc_ui_send_conn failed :-(\n", __func__);
1da177e4
LT
482 sock->state = SS_UNCONNECTED;
483 sk->sk_state = TCP_CLOSE;
484 goto out;
485 }
b35bd110
ACM
486
487 if (sk->sk_state == TCP_SYN_SENT) {
54fb7f25 488 const long timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
b35bd110
ACM
489
490 if (!timeo || !llc_ui_wait_for_conn(sk, timeo))
491 goto out;
492
493 rc = sock_intr_errno(timeo);
494 if (signal_pending(current))
495 goto out;
496 }
497
498 if (sk->sk_state == TCP_CLOSE)
499 goto sock_error;
500
501 sock->state = SS_CONNECTED;
502 rc = 0;
1da177e4
LT
503out:
504 release_sock(sk);
505 return rc;
b35bd110
ACM
506sock_error:
507 rc = sock_error(sk) ? : -ECONNABORTED;
508 sock->state = SS_UNCONNECTED;
509 goto out;
1da177e4
LT
510}
511
512/**
513 * llc_ui_listen - allow a normal socket to accept incoming connections
514 * @sock: Socket to allow incoming connections on.
515 * @backlog: Number of connections to queue.
516 *
517 * Allow a normal socket to accept incoming connections.
518 * Returns 0 upon success, negative otherwise.
519 */
520static int llc_ui_listen(struct socket *sock, int backlog)
521{
522 struct sock *sk = sock->sk;
523 int rc = -EINVAL;
524
525 lock_sock(sk);
af426d32 526 if (unlikely(sock->state != SS_UNCONNECTED))
1da177e4
LT
527 goto out;
528 rc = -EOPNOTSUPP;
af426d32 529 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
530 goto out;
531 rc = -EAGAIN;
532 if (sock_flag(sk, SOCK_ZAPPED))
533 goto out;
534 rc = 0;
95c96174 535 if (!(unsigned int)backlog) /* BSDism */
1da177e4
LT
536 backlog = 1;
537 sk->sk_max_ack_backlog = backlog;
538 if (sk->sk_state != TCP_LISTEN) {
539 sk->sk_ack_backlog = 0;
540 sk->sk_state = TCP_LISTEN;
541 }
542 sk->sk_socket->flags |= __SO_ACCEPTCON;
543out:
544 release_sock(sk);
545 return rc;
546}
547
54fb7f25 548static int llc_ui_wait_for_disc(struct sock *sk, long timeout)
1da177e4 549{
d9dc8b0f 550 DEFINE_WAIT_FUNC(wait, woken_wake_function);
b35bd110 551 int rc = 0;
1da177e4 552
d9dc8b0f 553 add_wait_queue(sk_sleep(sk), &wait);
54fb7f25 554 while (1) {
d9dc8b0f 555 if (sk_wait_event(sk, &timeout, sk->sk_state == TCP_CLOSE, &wait))
54fb7f25 556 break;
1da177e4
LT
557 rc = -ERESTARTSYS;
558 if (signal_pending(current))
559 break;
560 rc = -EAGAIN;
561 if (!timeout)
562 break;
b35bd110 563 rc = 0;
1da177e4 564 }
d9dc8b0f 565 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
566 return rc;
567}
568
5ff904d5 569static bool llc_ui_wait_for_conn(struct sock *sk, long timeout)
1da177e4 570{
d9dc8b0f 571 DEFINE_WAIT_FUNC(wait, woken_wake_function);
1da177e4 572
d9dc8b0f 573 add_wait_queue(sk_sleep(sk), &wait);
54fb7f25 574 while (1) {
d9dc8b0f 575 if (sk_wait_event(sk, &timeout, sk->sk_state != TCP_SYN_SENT, &wait))
54fb7f25 576 break;
b35bd110 577 if (signal_pending(current) || !timeout)
1da177e4
LT
578 break;
579 }
d9dc8b0f 580 remove_wait_queue(sk_sleep(sk), &wait);
b35bd110 581 return timeout;
1da177e4
LT
582}
583
afdbe357 584static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout)
1da177e4 585{
d9dc8b0f 586 DEFINE_WAIT_FUNC(wait, woken_wake_function);
afdbe357
ACM
587 struct llc_sock *llc = llc_sk(sk);
588 int rc;
1da177e4 589
d9dc8b0f 590 add_wait_queue(sk_sleep(sk), &wait);
54fb7f25 591 while (1) {
afdbe357 592 rc = 0;
54fb7f25
ACM
593 if (sk_wait_event(sk, &timeout,
594 (sk->sk_shutdown & RCV_SHUTDOWN) ||
afdbe357 595 (!llc_data_accept_state(llc->state) &&
451677c4 596 !llc->remote_busy_flag &&
d9dc8b0f 597 !llc->p_flag), &wait))
1da177e4 598 break;
1da177e4
LT
599 rc = -ERESTARTSYS;
600 if (signal_pending(current))
601 break;
602 rc = -EAGAIN;
603 if (!timeout)
604 break;
605 }
d9dc8b0f 606 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
607 return rc;
608}
609
2928c19e 610static int llc_wait_data(struct sock *sk, long timeo)
1da177e4 611{
1da177e4
LT
612 int rc;
613
54fb7f25 614 while (1) {
afdbe357
ACM
615 /*
616 * POSIX 1003.1g mandates this order.
617 */
c1cbe4b7
BL
618 rc = sock_error(sk);
619 if (rc)
afdbe357 620 break;
1da177e4 621 rc = 0;
afdbe357 622 if (sk->sk_shutdown & RCV_SHUTDOWN)
1da177e4 623 break;
afdbe357
ACM
624 rc = -EAGAIN;
625 if (!timeo)
626 break;
627 rc = sock_intr_errno(timeo);
1da177e4
LT
628 if (signal_pending(current))
629 break;
afdbe357 630 rc = 0;
dfbafc99 631 if (sk_wait_data(sk, &timeo, NULL))
1da177e4
LT
632 break;
633 }
1da177e4
LT
634 return rc;
635}
636
e5cd6fe3
OP
637static void llc_cmsg_rcv(struct msghdr *msg, struct sk_buff *skb)
638{
639 struct llc_sock *llc = llc_sk(skb->sk);
640
641 if (llc->cmsg_flags & LLC_CMSG_PKTINFO) {
642 struct llc_pktinfo info;
643
b8670c09 644 memset(&info, 0, sizeof(info));
e5cd6fe3
OP
645 info.lpi_ifindex = llc_sk(skb->sk)->dev->ifindex;
646 llc_pdu_decode_dsap(skb, &info.lpi_sap);
647 llc_pdu_decode_da(skb, info.lpi_mac);
648 put_cmsg(msg, SOL_LLC, LLC_OPT_PKTINFO, sizeof(info), &info);
649 }
650}
651
1da177e4
LT
652/**
653 * llc_ui_accept - accept a new incoming connection.
654 * @sock: Socket which connections arrive on.
655 * @newsock: Socket to move incoming connection to.
656 * @flags: User specified operational flags.
cdfbabfb 657 * @kern: If the socket is kernel internal
1da177e4
LT
658 *
659 * Accept a new incoming connection.
660 * Returns 0 upon success, negative otherwise.
661 */
cdfbabfb
DH
662static int llc_ui_accept(struct socket *sock, struct socket *newsock, int flags,
663 bool kern)
1da177e4
LT
664{
665 struct sock *sk = sock->sk, *newsk;
666 struct llc_sock *llc, *newllc;
667 struct sk_buff *skb;
668 int rc = -EOPNOTSUPP;
669
0dc47877 670 dprintk("%s: accepting on %02X\n", __func__,
d57b1869 671 llc_sk(sk)->laddr.lsap);
1da177e4 672 lock_sock(sk);
af426d32 673 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
674 goto out;
675 rc = -EINVAL;
af426d32
ACM
676 if (unlikely(sock->state != SS_UNCONNECTED ||
677 sk->sk_state != TCP_LISTEN))
1da177e4
LT
678 goto out;
679 /* wait for a connection to arrive. */
b35bd110 680 if (skb_queue_empty(&sk->sk_receive_queue)) {
afdbe357 681 rc = llc_wait_data(sk, sk->sk_rcvtimeo);
b35bd110
ACM
682 if (rc)
683 goto out;
684 }
0dc47877 685 dprintk("%s: got a new connection on %02X\n", __func__,
d57b1869 686 llc_sk(sk)->laddr.lsap);
1da177e4
LT
687 skb = skb_dequeue(&sk->sk_receive_queue);
688 rc = -EINVAL;
689 if (!skb->sk)
690 goto frees;
691 rc = 0;
692 newsk = skb->sk;
693 /* attach connection to a new socket. */
694 llc_ui_sk_init(newsock, newsk);
695 sock_reset_flag(newsk, SOCK_ZAPPED);
696 newsk->sk_state = TCP_ESTABLISHED;
697 newsock->state = SS_CONNECTED;
698 llc = llc_sk(sk);
699 newllc = llc_sk(newsk);
700 memcpy(&newllc->addr, &llc->addr, sizeof(newllc->addr));
701 newllc->link = llc_ui_next_link_no(newllc->laddr.lsap);
702
703 /* put original socket back into a clean listen state. */
704 sk->sk_state = TCP_LISTEN;
705 sk->sk_ack_backlog--;
0dc47877 706 dprintk("%s: ok success on %02X, client on %02X\n", __func__,
1da177e4
LT
707 llc_sk(sk)->addr.sllc_sap, newllc->daddr.lsap);
708frees:
709 kfree_skb(skb);
710out:
711 release_sock(sk);
712 return rc;
713}
714
715/**
716 * llc_ui_recvmsg - copy received data to the socket user.
717 * @sock: Socket to copy data from.
718 * @msg: Various user space related information.
8420e1b5 719 * @len: Size of user buffer.
1da177e4
LT
720 * @flags: User specified flags.
721 *
722 * Copy received data to the socket user.
723 * Returns non-negative upon success, negative otherwise.
724 */
1b784140
YX
725static int llc_ui_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
726 int flags)
1da177e4 727{
342dfc30 728 DECLARE_SOCKADDR(struct sockaddr_llc *, uaddr, msg->msg_name);
8420e1b5
ACM
729 const int nonblock = flags & MSG_DONTWAIT;
730 struct sk_buff *skb = NULL;
731 struct sock *sk = sock->sk;
732 struct llc_sock *llc = llc_sk(sk);
1da177e4 733 size_t copied = 0;
8420e1b5 734 u32 peek_seq = 0;
4d231b76 735 u32 *seq, skb_len;
8420e1b5
ACM
736 unsigned long used;
737 int target; /* Read at least this many bytes */
738 long timeo;
1da177e4 739
1da177e4 740 lock_sock(sk);
8420e1b5 741 copied = -ENOTCONN;
29efcd26 742 if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN))
1da177e4 743 goto out;
8420e1b5
ACM
744
745 timeo = sock_rcvtimeo(sk, nonblock);
746
747 seq = &llc->copied_seq;
748 if (flags & MSG_PEEK) {
749 peek_seq = llc->copied_seq;
750 seq = &peek_seq;
d57b1869 751 }
8420e1b5
ACM
752
753 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
754 copied = 0;
755
756 do {
757 u32 offset;
758
759 /*
760 * We need to check signals first, to get correct SIGURG
761 * handling. FIXME: Need to check this doesn't impact 1003.1g
762 * and move it down to the bottom of the loop
763 */
764 if (signal_pending(current)) {
765 if (copied)
766 break;
767 copied = timeo ? sock_intr_errno(timeo) : -EAGAIN;
768 break;
769 }
770
771 /* Next get a buffer. */
772
773 skb = skb_peek(&sk->sk_receive_queue);
774 if (skb) {
775 offset = *seq;
776 goto found_ok_skb;
777 }
778 /* Well, if we have backlog, try to process it now yet. */
779
780 if (copied >= target && !sk->sk_backlog.tail)
781 break;
782
783 if (copied) {
784 if (sk->sk_err ||
785 sk->sk_state == TCP_CLOSE ||
786 (sk->sk_shutdown & RCV_SHUTDOWN) ||
787 !timeo ||
788 (flags & MSG_PEEK))
789 break;
790 } else {
791 if (sock_flag(sk, SOCK_DONE))
792 break;
793
794 if (sk->sk_err) {
795 copied = sock_error(sk);
796 break;
797 }
798 if (sk->sk_shutdown & RCV_SHUTDOWN)
799 break;
800
29efcd26 801 if (sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_CLOSE) {
8420e1b5
ACM
802 if (!sock_flag(sk, SOCK_DONE)) {
803 /*
804 * This occurs when user tries to read
805 * from never connected socket.
806 */
807 copied = -ENOTCONN;
808 break;
809 }
810 break;
811 }
812 if (!timeo) {
813 copied = -EAGAIN;
814 break;
815 }
816 }
817
818 if (copied >= target) { /* Do not sleep, just process backlog. */
819 release_sock(sk);
820 lock_sock(sk);
821 } else
dfbafc99 822 sk_wait_data(sk, &timeo, NULL);
8420e1b5
ACM
823
824 if ((flags & MSG_PEEK) && peek_seq != llc->copied_seq) {
e87cc472
JP
825 net_dbg_ratelimited("LLC(%s:%d): Application bug, race in MSG_PEEK\n",
826 current->comm,
827 task_pid_nr(current));
8420e1b5
ACM
828 peek_seq = llc->copied_seq;
829 }
830 continue;
831 found_ok_skb:
4d231b76 832 skb_len = skb->len;
8420e1b5
ACM
833 /* Ok so how much can we use? */
834 used = skb->len - offset;
835 if (len < used)
836 used = len;
837
838 if (!(flags & MSG_TRUNC)) {
51f3d02b 839 int rc = skb_copy_datagram_msg(skb, offset, msg, used);
8420e1b5
ACM
840 if (rc) {
841 /* Exception. Bailout! */
842 if (!copied)
843 copied = -EFAULT;
844 break;
845 }
846 }
847
848 *seq += used;
849 copied += used;
850 len -= used;
851
9cef310f
AJ
852 /* For non stream protcols we get one packet per recvmsg call */
853 if (sk->sk_type != SOCK_STREAM)
854 goto copy_uaddr;
855
8420e1b5 856 if (!(flags & MSG_PEEK)) {
ab46a4a1
ED
857 skb_unlink(skb, &sk->sk_receive_queue);
858 kfree_skb(skb);
8420e1b5
ACM
859 *seq = 0;
860 }
30a584d9 861
30a584d9 862 /* Partial read */
4d231b76 863 if (used + offset < skb_len)
30a584d9 864 continue;
8420e1b5
ACM
865 } while (len > 0);
866
1da177e4
LT
867out:
868 release_sock(sk);
8420e1b5
ACM
869 return copied;
870copy_uaddr:
871 if (uaddr != NULL && skb != NULL) {
872 memcpy(uaddr, llc_ui_skb_cb(skb), sizeof(*uaddr));
873 msg->msg_namelen = sizeof(*uaddr);
874 }
e5cd6fe3
OP
875 if (llc_sk(sk)->cmsg_flags)
876 llc_cmsg_rcv(msg, skb);
9cef310f
AJ
877
878 if (!(flags & MSG_PEEK)) {
ab46a4a1
ED
879 skb_unlink(skb, &sk->sk_receive_queue);
880 kfree_skb(skb);
7bced397 881 *seq = 0;
9cef310f
AJ
882 }
883
8420e1b5 884 goto out;
1da177e4
LT
885}
886
887/**
888 * llc_ui_sendmsg - Transmit data provided by the socket user.
889 * @sock: Socket to transmit data from.
890 * @msg: Various user related information.
891 * @len: Length of data to transmit.
892 *
893 * Transmit data provided by the socket user.
894 * Returns non-negative upon success, negative otherwise.
895 */
1b784140 896static int llc_ui_sendmsg(struct socket *sock, struct msghdr *msg, size_t len)
1da177e4
LT
897{
898 struct sock *sk = sock->sk;
899 struct llc_sock *llc = llc_sk(sk);
342dfc30 900 DECLARE_SOCKADDR(struct sockaddr_llc *, addr, msg->msg_name);
1da177e4
LT
901 int flags = msg->msg_flags;
902 int noblock = flags & MSG_DONTWAIT;
1da177e4
LT
903 struct sk_buff *skb;
904 size_t size = 0;
905 int rc = -EINVAL, copied = 0, hdrlen;
906
0dc47877 907 dprintk("%s: sending from %02X to %02X\n", __func__,
1da177e4
LT
908 llc->laddr.lsap, llc->daddr.lsap);
909 lock_sock(sk);
910 if (addr) {
911 if (msg->msg_namelen < sizeof(*addr))
912 goto release;
913 } else {
914 if (llc_ui_addr_null(&llc->addr))
915 goto release;
916 addr = &llc->addr;
917 }
918 /* must bind connection to sap if user hasn't done it. */
919 if (sock_flag(sk, SOCK_ZAPPED)) {
920 /* bind to sap with null dev, exclusive. */
921 rc = llc_ui_autobind(sock, addr);
922 if (rc)
923 goto release;
924 }
774ccb4f 925 hdrlen = llc->dev->hard_header_len + llc_ui_header_len(sk, addr);
1da177e4 926 size = hdrlen + len;
774ccb4f
ACM
927 if (size > llc->dev->mtu)
928 size = llc->dev->mtu;
1da177e4 929 copied = size - hdrlen;
e3cfb675
ED
930 rc = -EINVAL;
931 if (copied < 0)
932 goto release;
1da177e4
LT
933 release_sock(sk);
934 skb = sock_alloc_send_skb(sk, size, noblock, &rc);
935 lock_sock(sk);
936 if (!skb)
937 goto release;
774ccb4f 938 skb->dev = llc->dev;
1da177e4 939 skb->protocol = llc_proto_type(addr->sllc_arphrd);
d57b1869 940 skb_reserve(skb, hdrlen);
6ce8e9ce 941 rc = memcpy_from_msg(skb_put(skb, copied), msg, copied);
1da177e4
LT
942 if (rc)
943 goto out;
944 if (sk->sk_type == SOCK_DGRAM || addr->sllc_ua) {
945 llc_build_and_send_ui_pkt(llc->sap, skb, addr->sllc_mac,
946 addr->sllc_sap);
947 goto out;
948 }
949 if (addr->sllc_test) {
950 llc_build_and_send_test_pkt(llc->sap, skb, addr->sllc_mac,
951 addr->sllc_sap);
952 goto out;
953 }
954 if (addr->sllc_xid) {
955 llc_build_and_send_xid_pkt(llc->sap, skb, addr->sllc_mac,
956 addr->sllc_sap);
957 goto out;
958 }
959 rc = -ENOPROTOOPT;
960 if (!(sk->sk_type == SOCK_STREAM && !addr->sllc_ua))
961 goto out;
962 rc = llc_ui_send_data(sk, skb, noblock);
1da177e4 963out:
249ff1c6 964 if (rc) {
1da177e4
LT
965 kfree_skb(skb);
966release:
1da177e4 967 dprintk("%s: failed sending from %02X to %02X: %d\n",
0dc47877 968 __func__, llc->laddr.lsap, llc->daddr.lsap, rc);
249ff1c6 969 }
1da177e4
LT
970 release_sock(sk);
971 return rc ? : copied;
972}
973
974/**
975 * llc_ui_getname - return the address info of a socket
976 * @sock: Socket to get address of.
977 * @uaddr: Address structure to return information.
978 * @uaddrlen: Length of address structure.
979 * @peer: Does user want local or remote address information.
980 *
981 * Return the address information of a socket.
982 */
983static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
984 int *uaddrlen, int peer)
985{
986 struct sockaddr_llc sllc;
987 struct sock *sk = sock->sk;
988 struct llc_sock *llc = llc_sk(sk);
3592aaeb 989 int rc = -EBADF;
1da177e4 990
28e9fc59 991 memset(&sllc, 0, sizeof(sllc));
1da177e4
LT
992 lock_sock(sk);
993 if (sock_flag(sk, SOCK_ZAPPED))
994 goto out;
995 *uaddrlen = sizeof(sllc);
1da177e4
LT
996 if (peer) {
997 rc = -ENOTCONN;
998 if (sk->sk_state != TCP_ESTABLISHED)
999 goto out;
1000 if(llc->dev)
1001 sllc.sllc_arphrd = llc->dev->type;
1002 sllc.sllc_sap = llc->daddr.lsap;
1003 memcpy(&sllc.sllc_mac, &llc->daddr.mac, IFHWADDRLEN);
1004 } else {
1005 rc = -EINVAL;
1006 if (!llc->sap)
1007 goto out;
1008 sllc.sllc_sap = llc->sap->laddr.lsap;
1009
1010 if (llc->dev) {
1011 sllc.sllc_arphrd = llc->dev->type;
a186d2ae 1012 memcpy(&sllc.sllc_mac, llc->dev->dev_addr,
1da177e4
LT
1013 IFHWADDRLEN);
1014 }
1015 }
1016 rc = 0;
1017 sllc.sllc_family = AF_LLC;
1018 memcpy(uaddr, &sllc, sizeof(sllc));
1019out:
1020 release_sock(sk);
1021 return rc;
1022}
1023
1024/**
1025 * llc_ui_ioctl - io controls for PF_LLC
1026 * @sock: Socket to get/set info
1027 * @cmd: command
1028 * @arg: optional argument for cmd
1029 *
1030 * get/set info on llc sockets
1031 */
1032static int llc_ui_ioctl(struct socket *sock, unsigned int cmd,
1033 unsigned long arg)
1034{
b5e5fa5e 1035 return -ENOIOCTLCMD;
1da177e4
LT
1036}
1037
1038/**
1039 * llc_ui_setsockopt - set various connection specific parameters.
1040 * @sock: Socket to set options on.
1041 * @level: Socket level user is requesting operations on.
1042 * @optname: Operation name.
2c53040f 1043 * @optval: User provided operation data.
1da177e4
LT
1044 * @optlen: Length of optval.
1045 *
1046 * Set various connection specific parameters.
1047 */
1048static int llc_ui_setsockopt(struct socket *sock, int level, int optname,
b7058842 1049 char __user *optval, unsigned int optlen)
1da177e4
LT
1050{
1051 struct sock *sk = sock->sk;
1052 struct llc_sock *llc = llc_sk(sk);
339db11b
DC
1053 unsigned int opt;
1054 int rc = -EINVAL;
1da177e4
LT
1055
1056 lock_sock(sk);
af426d32 1057 if (unlikely(level != SOL_LLC || optlen != sizeof(int)))
1da177e4
LT
1058 goto out;
1059 rc = get_user(opt, (int __user *)optval);
1060 if (rc)
1061 goto out;
1062 rc = -EINVAL;
1063 switch (optname) {
1064 case LLC_OPT_RETRY:
1065 if (opt > LLC_OPT_MAX_RETRY)
1066 goto out;
1067 llc->n2 = opt;
1068 break;
1069 case LLC_OPT_SIZE:
1070 if (opt > LLC_OPT_MAX_SIZE)
1071 goto out;
1072 llc->n1 = opt;
1073 break;
1074 case LLC_OPT_ACK_TMR_EXP:
1075 if (opt > LLC_OPT_MAX_ACK_TMR_EXP)
1076 goto out;
590232a7 1077 llc->ack_timer.expire = opt * HZ;
1da177e4
LT
1078 break;
1079 case LLC_OPT_P_TMR_EXP:
1080 if (opt > LLC_OPT_MAX_P_TMR_EXP)
1081 goto out;
590232a7 1082 llc->pf_cycle_timer.expire = opt * HZ;
1da177e4
LT
1083 break;
1084 case LLC_OPT_REJ_TMR_EXP:
1085 if (opt > LLC_OPT_MAX_REJ_TMR_EXP)
1086 goto out;
590232a7 1087 llc->rej_sent_timer.expire = opt * HZ;
1da177e4
LT
1088 break;
1089 case LLC_OPT_BUSY_TMR_EXP:
1090 if (opt > LLC_OPT_MAX_BUSY_TMR_EXP)
1091 goto out;
590232a7 1092 llc->busy_state_timer.expire = opt * HZ;
1da177e4
LT
1093 break;
1094 case LLC_OPT_TX_WIN:
1095 if (opt > LLC_OPT_MAX_WIN)
1096 goto out;
1097 llc->k = opt;
1098 break;
1099 case LLC_OPT_RX_WIN:
1100 if (opt > LLC_OPT_MAX_WIN)
1101 goto out;
1102 llc->rw = opt;
1103 break;
e5cd6fe3
OP
1104 case LLC_OPT_PKTINFO:
1105 if (opt)
1106 llc->cmsg_flags |= LLC_CMSG_PKTINFO;
1107 else
1108 llc->cmsg_flags &= ~LLC_CMSG_PKTINFO;
1109 break;
1da177e4
LT
1110 default:
1111 rc = -ENOPROTOOPT;
1112 goto out;
1113 }
1114 rc = 0;
1115out:
1116 release_sock(sk);
1117 return rc;
1118}
1119
1120/**
1121 * llc_ui_getsockopt - get connection specific socket info
1122 * @sock: Socket to get information from.
1123 * @level: Socket level user is requesting operations on.
1124 * @optname: Operation name.
1125 * @optval: Variable to return operation data in.
1126 * @optlen: Length of optval.
1127 *
1128 * Get connection specific socket information.
1129 */
1130static int llc_ui_getsockopt(struct socket *sock, int level, int optname,
1131 char __user *optval, int __user *optlen)
1132{
1133 struct sock *sk = sock->sk;
1134 struct llc_sock *llc = llc_sk(sk);
1135 int val = 0, len = 0, rc = -EINVAL;
1136
1137 lock_sock(sk);
af426d32 1138 if (unlikely(level != SOL_LLC))
1da177e4
LT
1139 goto out;
1140 rc = get_user(len, optlen);
1141 if (rc)
1142 goto out;
1143 rc = -EINVAL;
1144 if (len != sizeof(int))
1145 goto out;
1146 switch (optname) {
1147 case LLC_OPT_RETRY:
590232a7 1148 val = llc->n2; break;
1da177e4 1149 case LLC_OPT_SIZE:
590232a7 1150 val = llc->n1; break;
1da177e4 1151 case LLC_OPT_ACK_TMR_EXP:
590232a7 1152 val = llc->ack_timer.expire / HZ; break;
1da177e4 1153 case LLC_OPT_P_TMR_EXP:
590232a7 1154 val = llc->pf_cycle_timer.expire / HZ; break;
1da177e4 1155 case LLC_OPT_REJ_TMR_EXP:
590232a7 1156 val = llc->rej_sent_timer.expire / HZ; break;
1da177e4 1157 case LLC_OPT_BUSY_TMR_EXP:
590232a7 1158 val = llc->busy_state_timer.expire / HZ; break;
1da177e4
LT
1159 case LLC_OPT_TX_WIN:
1160 val = llc->k; break;
1161 case LLC_OPT_RX_WIN:
1162 val = llc->rw; break;
e5cd6fe3
OP
1163 case LLC_OPT_PKTINFO:
1164 val = (llc->cmsg_flags & LLC_CMSG_PKTINFO) != 0;
1165 break;
1da177e4
LT
1166 default:
1167 rc = -ENOPROTOOPT;
1168 goto out;
1169 }
1170 rc = 0;
1171 if (put_user(len, optlen) || copy_to_user(optval, &val, len))
1172 rc = -EFAULT;
1173out:
1174 release_sock(sk);
1175 return rc;
1176}
1177
ec1b4cf7 1178static const struct net_proto_family llc_ui_family_ops = {
1da177e4
LT
1179 .family = PF_LLC,
1180 .create = llc_ui_create,
1181 .owner = THIS_MODULE,
1182};
1183
90ddc4f0 1184static const struct proto_ops llc_ui_ops = {
1da177e4
LT
1185 .family = PF_LLC,
1186 .owner = THIS_MODULE,
1187 .release = llc_ui_release,
1188 .bind = llc_ui_bind,
1189 .connect = llc_ui_connect,
1190 .socketpair = sock_no_socketpair,
1191 .accept = llc_ui_accept,
1192 .getname = llc_ui_getname,
1193 .poll = datagram_poll,
1194 .ioctl = llc_ui_ioctl,
1195 .listen = llc_ui_listen,
1196 .shutdown = llc_ui_shutdown,
1197 .setsockopt = llc_ui_setsockopt,
1198 .getsockopt = llc_ui_getsockopt,
1199 .sendmsg = llc_ui_sendmsg,
1200 .recvmsg = llc_ui_recvmsg,
1201 .mmap = sock_no_mmap,
1202 .sendpage = sock_no_sendpage,
1203};
1204
01af4a0e 1205static const char llc_proc_err_msg[] __initconst =
d57b1869 1206 KERN_CRIT "LLC: Unable to register the proc_fs entries\n";
01af4a0e 1207static const char llc_sysctl_err_msg[] __initconst =
d57b1869 1208 KERN_CRIT "LLC: Unable to register the sysctl entries\n";
01af4a0e 1209static const char llc_sock_err_msg[] __initconst =
d57b1869 1210 KERN_CRIT "LLC: Unable to register the network family\n";
590232a7 1211
1da177e4
LT
1212static int __init llc2_init(void)
1213{
1214 int rc = proto_register(&llc_proto, 0);
1215
1216 if (rc != 0)
1217 goto out;
1218
1219 llc_build_offset_table();
1220 llc_station_init();
1221 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
1222 rc = llc_proc_init();
590232a7
ACM
1223 if (rc != 0) {
1224 printk(llc_proc_err_msg);
f4f8720f 1225 goto out_station;
590232a7
ACM
1226 }
1227 rc = llc_sysctl_init();
1228 if (rc) {
1229 printk(llc_sysctl_err_msg);
1230 goto out_proc;
1231 }
1232 rc = sock_register(&llc_ui_family_ops);
1233 if (rc) {
1234 printk(llc_sock_err_msg);
1235 goto out_sysctl;
1236 }
1da177e4
LT
1237 llc_add_pack(LLC_DEST_SAP, llc_sap_handler);
1238 llc_add_pack(LLC_DEST_CONN, llc_conn_handler);
1239out:
1240 return rc;
590232a7
ACM
1241out_sysctl:
1242 llc_sysctl_exit();
1243out_proc:
1244 llc_proc_exit();
f4f8720f
BH
1245out_station:
1246 llc_station_exit();
1da177e4
LT
1247 proto_unregister(&llc_proto);
1248 goto out;
1249}
1250
1251static void __exit llc2_exit(void)
1252{
1253 llc_station_exit();
1254 llc_remove_pack(LLC_DEST_SAP);
1255 llc_remove_pack(LLC_DEST_CONN);
1256 sock_unregister(PF_LLC);
1257 llc_proc_exit();
590232a7 1258 llc_sysctl_exit();
1da177e4
LT
1259 proto_unregister(&llc_proto);
1260}
1261
1262module_init(llc2_init);
1263module_exit(llc2_exit);
1264
1265MODULE_LICENSE("GPL");
1266MODULE_AUTHOR("Procom 1997, Jay Schullist 2001, Arnaldo C. Melo 2001-2003");
1267MODULE_DESCRIPTION("IEEE 802.2 PF_LLC support");
1268MODULE_ALIAS_NETPROTO(PF_LLC);