]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/tipc/topsrv.c
Merge tag 'exfat-for-5.13-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/linki...
[mirror_ubuntu-jammy-kernel.git] / net / tipc / topsrv.c
CommitLineData
c5fa7b3c
YX
1/*
2 * net/tipc/server.c: TIPC server infrastructure
3 *
4 * Copyright (c) 2012-2013, Wind River Systems
026321c6 5 * Copyright (c) 2017-2018, Ericsson AB
c5fa7b3c
YX
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are met:
10 *
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
19 *
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
c901d26d 37#include "subscr.h"
026321c6 38#include "topsrv.h"
c5fa7b3c 39#include "core.h"
859fc7c0 40#include "socket.h"
14c04493
JM
41#include "addr.h"
42#include "msg.h"
6c9081a3 43#include "bearer.h"
c5fa7b3c 44#include <net/sock.h>
76100a8a 45#include <linux/module.h>
c5fa7b3c
YX
46
47/* Number of messages to send before rescheduling */
48#define MAX_SEND_MSG_COUNT 25
49#define MAX_RECV_MSG_COUNT 25
50#define CF_CONNECTED 1
51
5c45ab24
JM
52#define TIPC_SERVER_NAME_LEN 32
53
54/**
026321c6 55 * struct tipc_topsrv - TIPC server structure
5c45ab24
JM
56 * @conn_idr: identifier set of connection
57 * @idr_lock: protect the connection identifier set
58 * @idr_in_use: amount of allocated identifier entry
59 * @net: network namspace instance
05a6843c 60 * @awork: accept work item
5c45ab24
JM
61 * @rcv_wq: receive workqueue
62 * @send_wq: send workqueue
05a6843c 63 * @listener: topsrv listener socket
5c45ab24 64 * @name: server name
5c45ab24 65 */
026321c6 66struct tipc_topsrv {
5c45ab24
JM
67 struct idr conn_idr;
68 spinlock_t idr_lock; /* for idr list */
69 int idr_in_use;
70 struct net *net;
0ef897be 71 struct work_struct awork;
5c45ab24
JM
72 struct workqueue_struct *rcv_wq;
73 struct workqueue_struct *send_wq;
0ef897be 74 struct socket *listener;
5c45ab24
JM
75 char name[TIPC_SERVER_NAME_LEN];
76};
c5fa7b3c
YX
77
78/**
79 * struct tipc_conn - TIPC connection structure
80 * @kref: reference counter to connection object
81 * @conid: connection identifier
82 * @sock: socket handler associated with connection
83 * @flags: indicates connection state
84 * @server: pointer to connected server
df79d040
JM
85 * @sub_list: lsit to all pertaing subscriptions
86 * @sub_lock: lock protecting the subscription list
c5fa7b3c 87 * @rwork: receive work item
c5fa7b3c 88 * @outqueue: pointer to first outbound message in queue
963a1855 89 * @outqueue_lock: control access to the outqueue
c5fa7b3c
YX
90 * @swork: send work item
91 */
92struct tipc_conn {
93 struct kref kref;
94 int conid;
95 struct socket *sock;
96 unsigned long flags;
026321c6 97 struct tipc_topsrv *server;
df79d040
JM
98 struct list_head sub_list;
99 spinlock_t sub_lock; /* for subscription list */
c5fa7b3c 100 struct work_struct rwork;
c5fa7b3c 101 struct list_head outqueue;
026321c6 102 spinlock_t outqueue_lock; /* for outqueue */
c5fa7b3c
YX
103 struct work_struct swork;
104};
105
106/* An entry waiting to be sent */
107struct outqueue_entry {
414574a0
JM
108 bool inactive;
109 struct tipc_event evt;
c5fa7b3c 110 struct list_head list;
c5fa7b3c
YX
111};
112
026321c6
JM
113static void tipc_conn_recv_work(struct work_struct *work);
114static void tipc_conn_send_work(struct work_struct *work);
115static void tipc_topsrv_kern_evt(struct net *net, struct tipc_event *evt);
116static void tipc_conn_delete_sub(struct tipc_conn *con, struct tipc_subscr *s);
5c45ab24 117
df79d040
JM
118static bool connected(struct tipc_conn *con)
119{
120 return con && test_bit(CF_CONNECTED, &con->flags);
121}
122
c5fa7b3c
YX
123static void tipc_conn_kref_release(struct kref *kref)
124{
125 struct tipc_conn *con = container_of(kref, struct tipc_conn, kref);
026321c6 126 struct tipc_topsrv *s = con->server;
0ef897be 127 struct outqueue_entry *e, *safe;
76100a8a 128
14c04493
JM
129 spin_lock_bh(&s->idr_lock);
130 idr_remove(&s->conn_idr, con->conid);
131 s->idr_in_use--;
132 spin_unlock_bh(&s->idr_lock);
0ef897be
JM
133 if (con->sock)
134 sock_release(con->sock);
135
136 spin_lock_bh(&con->outqueue_lock);
137 list_for_each_entry_safe(e, safe, &con->outqueue, list) {
138 list_del(&e->list);
139 kfree(e);
140 }
141 spin_unlock_bh(&con->outqueue_lock);
c5fa7b3c
YX
142 kfree(con);
143}
144
145static void conn_put(struct tipc_conn *con)
146{
147 kref_put(&con->kref, tipc_conn_kref_release);
148}
149
150static void conn_get(struct tipc_conn *con)
151{
152 kref_get(&con->kref);
153}
154
026321c6 155static void tipc_conn_close(struct tipc_conn *con)
333f7962 156{
e88f2be8
JM
157 struct sock *sk = con->sock->sk;
158 bool disconnect = false;
333f7962 159
e88f2be8
JM
160 write_lock_bh(&sk->sk_callback_lock);
161 disconnect = test_and_clear_bit(CF_CONNECTED, &con->flags);
df79d040 162
e88f2be8
JM
163 if (disconnect) {
164 sk->sk_user_data = NULL;
026321c6 165 tipc_conn_delete_sub(con, NULL);
c5fa7b3c 166 }
e88f2be8
JM
167 write_unlock_bh(&sk->sk_callback_lock);
168
169 /* Handle concurrent calls from sending and receiving threads */
170 if (!disconnect)
171 return;
172
173 /* Don't flush pending works, -just let them expire */
174 kernel_sock_shutdown(con->sock, SHUT_RDWR);
0ef897be 175
e88f2be8 176 conn_put(con);
c5fa7b3c
YX
177}
178
026321c6 179static struct tipc_conn *tipc_conn_alloc(struct tipc_topsrv *s)
c5fa7b3c
YX
180{
181 struct tipc_conn *con;
182 int ret;
183
026321c6 184 con = kzalloc(sizeof(*con), GFP_ATOMIC);
c5fa7b3c
YX
185 if (!con)
186 return ERR_PTR(-ENOMEM);
187
188 kref_init(&con->kref);
189 INIT_LIST_HEAD(&con->outqueue);
df79d040 190 INIT_LIST_HEAD(&con->sub_list);
c5fa7b3c 191 spin_lock_init(&con->outqueue_lock);
df79d040 192 spin_lock_init(&con->sub_lock);
026321c6
JM
193 INIT_WORK(&con->swork, tipc_conn_send_work);
194 INIT_WORK(&con->rwork, tipc_conn_recv_work);
c5fa7b3c
YX
195
196 spin_lock_bh(&s->idr_lock);
197 ret = idr_alloc(&s->conn_idr, con, 0, 0, GFP_ATOMIC);
198 if (ret < 0) {
199 kfree(con);
200 spin_unlock_bh(&s->idr_lock);
201 return ERR_PTR(-ENOMEM);
202 }
203 con->conid = ret;
204 s->idr_in_use++;
205 spin_unlock_bh(&s->idr_lock);
206
207 set_bit(CF_CONNECTED, &con->flags);
208 con->server = s;
209
210 return con;
211}
212
026321c6 213static struct tipc_conn *tipc_conn_lookup(struct tipc_topsrv *s, int conid)
df79d040 214{
026321c6
JM
215 struct tipc_conn *con;
216
217 spin_lock_bh(&s->idr_lock);
218 con = idr_find(&s->conn_idr, conid);
219 if (!connected(con) || !kref_get_unless_zero(&con->kref))
220 con = NULL;
221 spin_unlock_bh(&s->idr_lock);
222 return con;
223}
224
225/* tipc_conn_delete_sub - delete a specific or all subscriptions
226 * for a given subscriber
227 */
228static void tipc_conn_delete_sub(struct tipc_conn *con, struct tipc_subscr *s)
229{
230 struct tipc_net *tn = tipc_net(con->server->net);
231 struct list_head *sub_list = &con->sub_list;
232 struct tipc_subscription *sub, *tmp;
df79d040 233
df79d040 234 spin_lock_bh(&con->sub_lock);
026321c6
JM
235 list_for_each_entry_safe(sub, tmp, sub_list, sub_list) {
236 if (!s || !memcmp(s, &sub->evt.s, sizeof(*s))) {
237 tipc_sub_unsubscribe(sub);
238 atomic_dec(&tn->subscription_count);
88690b10
TL
239 if (s)
240 break;
026321c6
JM
241 }
242 }
df79d040 243 spin_unlock_bh(&con->sub_lock);
df79d040
JM
244}
245
026321c6 246static void tipc_conn_send_to_sock(struct tipc_conn *con)
c5fa7b3c 247{
026321c6
JM
248 struct list_head *queue = &con->outqueue;
249 struct tipc_topsrv *srv = con->server;
250 struct outqueue_entry *e;
251 struct tipc_event *evt;
252 struct msghdr msg;
c5fa7b3c 253 struct kvec iov;
026321c6 254 int count = 0;
c5fa7b3c
YX
255 int ret;
256
026321c6
JM
257 spin_lock_bh(&con->outqueue_lock);
258
259 while (!list_empty(queue)) {
260 e = list_first_entry(queue, struct outqueue_entry, list);
261 evt = &e->evt;
262 spin_unlock_bh(&con->outqueue_lock);
263
264 if (e->inactive)
265 tipc_conn_delete_sub(con, &evt->s);
266
267 memset(&msg, 0, sizeof(msg));
268 msg.msg_flags = MSG_DONTWAIT;
269 iov.iov_base = evt;
270 iov.iov_len = sizeof(*evt);
271 msg.msg_name = NULL;
272
273 if (con->sock) {
274 ret = kernel_sendmsg(con->sock, &msg, &iov,
275 1, sizeof(*evt));
276 if (ret == -EWOULDBLOCK || ret == 0) {
277 cond_resched();
278 return;
279 } else if (ret < 0) {
280 return tipc_conn_close(con);
281 }
282 } else {
283 tipc_topsrv_kern_evt(srv->net, evt);
284 }
285
286 /* Don't starve users filling buffers */
287 if (++count >= MAX_SEND_MSG_COUNT) {
288 cond_resched();
289 count = 0;
290 }
291 spin_lock_bh(&con->outqueue_lock);
292 list_del(&e->list);
293 kfree(e);
c5fa7b3c 294 }
026321c6
JM
295 spin_unlock_bh(&con->outqueue_lock);
296}
c5fa7b3c 297
026321c6
JM
298static void tipc_conn_send_work(struct work_struct *work)
299{
300 struct tipc_conn *con = container_of(work, struct tipc_conn, swork);
301
302 if (connected(con))
303 tipc_conn_send_to_sock(con);
304
305 conn_put(con);
c5fa7b3c
YX
306}
307
a484ef34
ZG
308/* tipc_topsrv_queue_evt() - interrupt level call from a subscription instance
309 * The queued work is launched into tipc_conn_send_work()->tipc_conn_send_to_sock()
414574a0 310 */
026321c6
JM
311void tipc_topsrv_queue_evt(struct net *net, int conid,
312 u32 event, struct tipc_event *evt)
c5fa7b3c 313{
026321c6 314 struct tipc_topsrv *srv = tipc_topsrv(net);
c5fa7b3c
YX
315 struct outqueue_entry *e;
316 struct tipc_conn *con;
317
5c45ab24 318 con = tipc_conn_lookup(srv, conid);
c5fa7b3c 319 if (!con)
414574a0 320 return;
c5fa7b3c 321
414574a0
JM
322 if (!connected(con))
323 goto err;
4c887aa6 324
414574a0
JM
325 e = kmalloc(sizeof(*e), GFP_ATOMIC);
326 if (!e)
327 goto err;
328 e->inactive = (event == TIPC_SUBSCR_TIMEOUT);
329 memcpy(&e->evt, evt, sizeof(*evt));
c5fa7b3c
YX
330 spin_lock_bh(&con->outqueue_lock);
331 list_add_tail(&e->list, &con->outqueue);
332 spin_unlock_bh(&con->outqueue_lock);
333
5c45ab24 334 if (queue_work(srv->send_wq, &con->swork))
414574a0
JM
335 return;
336err:
337 conn_put(con);
c5fa7b3c
YX
338}
339
026321c6
JM
340/* tipc_conn_write_space - interrupt callback after a sendmsg EAGAIN
341 * Indicates that there now is more space in the send buffer
342 * The queued work is launched into tipc_send_work()->tipc_conn_send_to_sock()
343 */
344static void tipc_conn_write_space(struct sock *sk)
14c04493
JM
345{
346 struct tipc_conn *con;
347
026321c6
JM
348 read_lock_bh(&sk->sk_callback_lock);
349 con = sk->sk_user_data;
350 if (connected(con)) {
351 conn_get(con);
352 if (!queue_work(con->server->send_wq, &con->swork))
353 conn_put(con);
354 }
355 read_unlock_bh(&sk->sk_callback_lock);
14c04493
JM
356}
357
026321c6
JM
358static int tipc_conn_rcv_sub(struct tipc_topsrv *srv,
359 struct tipc_conn *con,
360 struct tipc_subscr *s)
14c04493 361{
026321c6
JM
362 struct tipc_net *tn = tipc_net(srv->net);
363 struct tipc_subscription *sub;
88690b10 364 u32 s_filter = tipc_sub_read(s, filter);
14c04493 365
88690b10
TL
366 if (s_filter & TIPC_SUB_CANCEL) {
367 tipc_sub_write(s, filter, s_filter & ~TIPC_SUB_CANCEL);
026321c6
JM
368 tipc_conn_delete_sub(con, s);
369 return 0;
370 }
371 if (atomic_read(&tn->subscription_count) >= TIPC_MAX_SUBSCR) {
372 pr_warn("Subscription rejected, max (%u)\n", TIPC_MAX_SUBSCR);
373 return -1;
374 }
375 sub = tipc_sub_subscribe(srv->net, s, con->conid);
376 if (!sub)
377 return -1;
378 atomic_inc(&tn->subscription_count);
379 spin_lock_bh(&con->sub_lock);
380 list_add(&sub->sub_list, &con->sub_list);
381 spin_unlock_bh(&con->sub_lock);
382 return 0;
14c04493
JM
383}
384
026321c6 385static int tipc_conn_rcv_from_sock(struct tipc_conn *con)
c5fa7b3c 386{
026321c6
JM
387 struct tipc_topsrv *srv = con->server;
388 struct sock *sk = con->sock->sk;
389 struct msghdr msg = {};
390 struct tipc_subscr s;
414574a0 391 struct kvec iov;
c5fa7b3c
YX
392 int ret;
393
026321c6
JM
394 iov.iov_base = &s;
395 iov.iov_len = sizeof(s);
396 msg.msg_name = NULL;
aa563d7b 397 iov_iter_kvec(&msg.msg_iter, READ, &iov, 1, iov.iov_len);
026321c6
JM
398 ret = sock_recvmsg(con->sock, &msg, MSG_DONTWAIT);
399 if (ret == -EWOULDBLOCK)
400 return -EWOULDBLOCK;
a88289f4 401 if (ret == sizeof(s)) {
026321c6 402 read_lock_bh(&sk->sk_callback_lock);
0771d7df
TL
403 /* RACE: the connection can be closed in the meantime */
404 if (likely(connected(con)))
405 ret = tipc_conn_rcv_sub(srv, con, &s);
026321c6 406 read_unlock_bh(&sk->sk_callback_lock);
980d6927
TL
407 if (!ret)
408 return 0;
c5fa7b3c 409 }
026321c6 410
980d6927 411 tipc_conn_close(con);
026321c6 412 return ret;
c5fa7b3c
YX
413}
414
026321c6 415static void tipc_conn_recv_work(struct work_struct *work)
c5fa7b3c
YX
416{
417 struct tipc_conn *con = container_of(work, struct tipc_conn, rwork);
418 int count = 0;
419
df79d040 420 while (connected(con)) {
026321c6 421 if (tipc_conn_rcv_from_sock(con))
c5fa7b3c
YX
422 break;
423
424 /* Don't flood Rx machine */
425 if (++count >= MAX_RECV_MSG_COUNT) {
426 cond_resched();
427 count = 0;
428 }
429 }
430 conn_put(con);
431}
432
026321c6
JM
433/* tipc_conn_data_ready - interrupt callback indicating the socket has data
434 * The queued work is launched into tipc_recv_work()->tipc_conn_rcv_from_sock()
435 */
436static void tipc_conn_data_ready(struct sock *sk)
c5fa7b3c 437{
026321c6 438 struct tipc_conn *con;
c5fa7b3c 439
026321c6
JM
440 read_lock_bh(&sk->sk_callback_lock);
441 con = sk->sk_user_data;
442 if (connected(con)) {
443 conn_get(con);
444 if (!queue_work(con->server->rcv_wq, &con->rwork))
445 conn_put(con);
446 }
447 read_unlock_bh(&sk->sk_callback_lock);
c5fa7b3c
YX
448}
449
026321c6 450static void tipc_topsrv_accept(struct work_struct *work)
c5fa7b3c 451{
026321c6 452 struct tipc_topsrv *srv = container_of(work, struct tipc_topsrv, awork);
0ef897be
JM
453 struct socket *lsock = srv->listener;
454 struct socket *newsock;
455 struct tipc_conn *con;
456 struct sock *newsk;
457 int ret;
458
459 while (1) {
460 ret = kernel_accept(lsock, &newsock, O_NONBLOCK);
461 if (ret < 0)
462 return;
026321c6 463 con = tipc_conn_alloc(srv);
0ef897be
JM
464 if (IS_ERR(con)) {
465 ret = PTR_ERR(con);
466 sock_release(newsock);
467 return;
468 }
469 /* Register callbacks */
470 newsk = newsock->sk;
471 write_lock_bh(&newsk->sk_callback_lock);
026321c6
JM
472 newsk->sk_data_ready = tipc_conn_data_ready;
473 newsk->sk_write_space = tipc_conn_write_space;
0ef897be
JM
474 newsk->sk_user_data = con;
475 con->sock = newsock;
476 write_unlock_bh(&newsk->sk_callback_lock);
477
478 /* Wake up receive process in case of 'SYN+' message */
479 newsk->sk_data_ready(newsk);
480 }
481}
482
bad7f869 483/* tipc_topsrv_listener_data_ready - interrupt callback with connection request
026321c6 484 * The queued job is launched into tipc_topsrv_accept()
0ef897be 485 */
026321c6 486static void tipc_topsrv_listener_data_ready(struct sock *sk)
0ef897be 487{
026321c6 488 struct tipc_topsrv *srv;
0ef897be
JM
489
490 read_lock_bh(&sk->sk_callback_lock);
491 srv = sk->sk_user_data;
492 if (srv->listener)
493 queue_work(srv->rcv_wq, &srv->awork);
494 read_unlock_bh(&sk->sk_callback_lock);
495}
496
026321c6 497static int tipc_topsrv_create_listener(struct tipc_topsrv *srv)
0ef897be 498{
0ef897be
JM
499 struct socket *lsock = NULL;
500 struct sockaddr_tipc saddr;
501 struct sock *sk;
502 int rc;
503
504 rc = sock_create_kern(srv->net, AF_TIPC, SOCK_SEQPACKET, 0, &lsock);
505 if (rc < 0)
506 return rc;
507
508 srv->listener = lsock;
509 sk = lsock->sk;
510 write_lock_bh(&sk->sk_callback_lock);
026321c6 511 sk->sk_data_ready = tipc_topsrv_listener_data_ready;
0ef897be
JM
512 sk->sk_user_data = srv;
513 write_unlock_bh(&sk->sk_callback_lock);
514
095ae612
CH
515 lock_sock(sk);
516 rc = tsk_set_importance(sk, TIPC_CRITICAL_IMPORTANCE);
517 release_sock(sk);
0ef897be
JM
518 if (rc < 0)
519 goto err;
520
521 saddr.family = AF_TIPC;
b6f88d9c
JM
522 saddr.addrtype = TIPC_SERVICE_RANGE;
523 saddr.addr.nameseq.type = TIPC_TOP_SRV;
0ef897be
JM
524 saddr.addr.nameseq.lower = TIPC_TOP_SRV;
525 saddr.addr.nameseq.upper = TIPC_TOP_SRV;
526 saddr.scope = TIPC_NODE_SCOPE;
527
72671b35 528 rc = tipc_sk_bind(lsock, (struct sockaddr *)&saddr, sizeof(saddr));
0ef897be
JM
529 if (rc < 0)
530 goto err;
531 rc = kernel_listen(lsock, 0);
532 if (rc < 0)
533 goto err;
534
535 /* As server's listening socket owner and creator is the same module,
536 * we have to decrease TIPC module reference count to guarantee that
537 * it remains zero after the server socket is created, otherwise,
538 * executing "rmmod" command is unable to make TIPC module deleted
539 * after TIPC module is inserted successfully.
540 *
541 * However, the reference count is ever increased twice in
542 * sock_create_kern(): one is to increase the reference count of owner
543 * of TIPC socket's proto_ops struct; another is to increment the
544 * reference count of owner of TIPC proto struct. Therefore, we must
545 * decrement the module reference count twice to ensure that it keeps
546 * zero after server's listening socket is created. Of course, we
547 * must bump the module reference count twice as well before the socket
548 * is closed.
549 */
550 module_put(lsock->ops->owner);
551 module_put(sk->sk_prot_creator->owner);
552
553 return 0;
554err:
555 sock_release(lsock);
556 return -EINVAL;
c5fa7b3c
YX
557}
558
026321c6
JM
559bool tipc_topsrv_kern_subscr(struct net *net, u32 port, u32 type, u32 lower,
560 u32 upper, u32 filter, int *conid)
561{
562 struct tipc_subscr sub;
563 struct tipc_conn *con;
564 int rc;
565
566 sub.seq.type = type;
567 sub.seq.lower = lower;
568 sub.seq.upper = upper;
569 sub.timeout = TIPC_WAIT_FOREVER;
570 sub.filter = filter;
571 *(u32 *)&sub.usr_handle = port;
572
573 con = tipc_conn_alloc(tipc_topsrv(net));
574 if (IS_ERR(con))
575 return false;
576
577 *conid = con->conid;
578 con->sock = NULL;
579 rc = tipc_conn_rcv_sub(tipc_topsrv(net), con, &sub);
96c252bf
JM
580 if (rc >= 0)
581 return true;
582 conn_put(con);
583 return false;
026321c6
JM
584}
585
586void tipc_topsrv_kern_unsubscr(struct net *net, int conid)
587{
588 struct tipc_conn *con;
589
590 con = tipc_conn_lookup(tipc_topsrv(net), conid);
591 if (!con)
592 return;
593
594 test_and_clear_bit(CF_CONNECTED, &con->flags);
595 tipc_conn_delete_sub(con, NULL);
596 conn_put(con);
597 conn_put(con);
598}
599
600static void tipc_topsrv_kern_evt(struct net *net, struct tipc_event *evt)
601{
602 u32 port = *(u32 *)&evt->s.usr_handle;
603 u32 self = tipc_own_addr(net);
604 struct sk_buff_head evtq;
605 struct sk_buff *skb;
606
607 skb = tipc_msg_create(TOP_SRV, 0, INT_H_SIZE, sizeof(*evt),
608 self, self, port, port, 0);
609 if (!skb)
610 return;
611 msg_set_dest_droppable(buf_msg(skb), true);
612 memcpy(msg_data(buf_msg(skb)), evt, sizeof(*evt));
613 skb_queue_head_init(&evtq);
614 __skb_queue_tail(&evtq, skb);
6c9081a3 615 tipc_loopback_trace(net, &evtq);
026321c6
JM
616 tipc_sk_rcv(net, &evtq);
617}
618
619static int tipc_topsrv_work_start(struct tipc_topsrv *s)
c5fa7b3c 620{
06c8581f 621 s->rcv_wq = alloc_ordered_workqueue("tipc_rcv", 0);
c5fa7b3c
YX
622 if (!s->rcv_wq) {
623 pr_err("can't start tipc receive workqueue\n");
624 return -ENOMEM;
625 }
626
06c8581f 627 s->send_wq = alloc_ordered_workqueue("tipc_send", 0);
c5fa7b3c
YX
628 if (!s->send_wq) {
629 pr_err("can't start tipc send workqueue\n");
630 destroy_workqueue(s->rcv_wq);
631 return -ENOMEM;
632 }
633
634 return 0;
635}
636
026321c6 637static void tipc_topsrv_work_stop(struct tipc_topsrv *s)
0ef897be
JM
638{
639 destroy_workqueue(s->rcv_wq);
640 destroy_workqueue(s->send_wq);
641}
642
526f5b85 643static int tipc_topsrv_start(struct net *net)
c5fa7b3c 644{
5c45ab24
JM
645 struct tipc_net *tn = tipc_net(net);
646 const char name[] = "topology_server";
026321c6 647 struct tipc_topsrv *srv;
c5fa7b3c
YX
648 int ret;
649
5c45ab24 650 srv = kzalloc(sizeof(*srv), GFP_ATOMIC);
0ef897be 651 if (!srv)
5c45ab24 652 return -ENOMEM;
0ef897be
JM
653
654 srv->net = net;
026321c6 655 INIT_WORK(&srv->awork, tipc_topsrv_accept);
5c45ab24 656
29e270fc 657 strscpy(srv->name, name, sizeof(srv->name));
5c45ab24
JM
658 tn->topsrv = srv;
659 atomic_set(&tn->subscription_count, 0);
660
661 spin_lock_init(&srv->idr_lock);
662 idr_init(&srv->conn_idr);
663 srv->idr_in_use = 0;
c5fa7b3c 664
026321c6 665 ret = tipc_topsrv_work_start(srv);
414574a0 666 if (ret < 0)
fa6882c6 667 goto err_start;
414574a0 668
026321c6 669 ret = tipc_topsrv_create_listener(srv);
414574a0 670 if (ret < 0)
fa6882c6 671 goto err_create;
414574a0 672
fa6882c6
WH
673 return 0;
674
675err_create:
676 tipc_topsrv_work_stop(srv);
677err_start:
678 kfree(srv);
c756891a 679 return ret;
c5fa7b3c
YX
680}
681
526f5b85 682static void tipc_topsrv_stop(struct net *net)
c5fa7b3c 683{
026321c6 684 struct tipc_topsrv *srv = tipc_topsrv(net);
0ef897be 685 struct socket *lsock = srv->listener;
c5fa7b3c 686 struct tipc_conn *con;
c5fa7b3c
YX
687 int id;
688
5c45ab24
JM
689 spin_lock_bh(&srv->idr_lock);
690 for (id = 0; srv->idr_in_use; id++) {
691 con = idr_find(&srv->conn_idr, id);
c5fa7b3c 692 if (con) {
5c45ab24 693 spin_unlock_bh(&srv->idr_lock);
026321c6 694 tipc_conn_close(con);
5c45ab24 695 spin_lock_bh(&srv->idr_lock);
c5fa7b3c
YX
696 }
697 }
0ef897be
JM
698 __module_get(lsock->ops->owner);
699 __module_get(lsock->sk->sk_prot_creator->owner);
0ef897be 700 srv->listener = NULL;
5c45ab24 701 spin_unlock_bh(&srv->idr_lock);
26736a08 702 sock_release(lsock);
026321c6 703 tipc_topsrv_work_stop(srv);
5c45ab24 704 idr_destroy(&srv->conn_idr);
5c45ab24 705 kfree(srv);
c5fa7b3c 706}
526f5b85
JH
707
708int __net_init tipc_topsrv_init_net(struct net *net)
709{
710 return tipc_topsrv_start(net);
711}
712
713void __net_exit tipc_topsrv_exit_net(struct net *net)
714{
715 tipc_topsrv_stop(net);
716}