caif: Bugfix - RFM must support segmentation.
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / caif / caif_socket.c
CommitLineData
e6f95ec8
SB
1/*
2 * Copyright (C) ST-Ericsson AB 2010
3 * Author: Sjur Brendeland sjur.brandeland@stericsson.com
e6f95ec8
SB
4 * License terms: GNU General Public License (GPL) version 2
5 */
6
7#include <linux/fs.h>
8#include <linux/init.h>
9#include <linux/module.h>
10#include <linux/sched.h>
11#include <linux/spinlock.h>
12#include <linux/mutex.h>
13#include <linux/list.h>
14#include <linux/wait.h>
15#include <linux/poll.h>
16#include <linux/tcp.h>
17#include <linux/uaccess.h>
bece7b23
SB
18#include <linux/mutex.h>
19#include <linux/debugfs.h>
e6f95ec8 20#include <linux/caif/caif_socket.h>
bece7b23
SB
21#include <asm/atomic.h>
22#include <net/sock.h>
23#include <net/tcp_states.h>
e6f95ec8
SB
24#include <net/caif/caif_layer.h>
25#include <net/caif/caif_dev.h>
26#include <net/caif/cfpkt.h>
27
28MODULE_LICENSE("GPL");
bece7b23
SB
29MODULE_ALIAS_NETPROTO(AF_CAIF);
30
31#define CAIF_DEF_SNDBUF (CAIF_MAX_PAYLOAD_SIZE*10)
32#define CAIF_DEF_RCVBUF (CAIF_MAX_PAYLOAD_SIZE*100)
33
34/*
35 * CAIF state is re-using the TCP socket states.
36 * caif_states stored in sk_state reflect the state as reported by
37 * the CAIF stack, while sk_socket->state is the state of the socket.
38 */
39enum caif_states {
40 CAIF_CONNECTED = TCP_ESTABLISHED,
41 CAIF_CONNECTING = TCP_SYN_SENT,
42 CAIF_DISCONNECTED = TCP_CLOSE
43};
44
45#define TX_FLOW_ON_BIT 1
46#define RX_FLOW_ON_BIT 2
e6f95ec8 47
e6f95ec8 48static struct dentry *debugfsdir;
e6f95ec8
SB
49
50#ifdef CONFIG_DEBUG_FS
51struct debug_fs_counter {
bece7b23
SB
52 atomic_t caif_nr_socks;
53 atomic_t num_connect_req;
54 atomic_t num_connect_resp;
55 atomic_t num_connect_fail_resp;
56 atomic_t num_disconnect;
e6f95ec8
SB
57 atomic_t num_remote_shutdown_ind;
58 atomic_t num_tx_flow_off_ind;
59 atomic_t num_tx_flow_on_ind;
60 atomic_t num_rx_flow_off;
61 atomic_t num_rx_flow_on;
e6f95ec8 62};
a9a8f107 63static struct debug_fs_counter cnt;
e6f95ec8
SB
64#define dbfs_atomic_inc(v) atomic_inc(v)
65#define dbfs_atomic_dec(v) atomic_dec(v)
66#else
67#define dbfs_atomic_inc(v)
68#define dbfs_atomic_dec(v)
69#endif
70
e6f95ec8 71struct caifsock {
bece7b23 72 struct sock sk; /* must be first member */
e6f95ec8 73 struct cflayer layer;
bece7b23 74 char name[CAIF_LAYER_NAME_SZ]; /* Used for debugging */
e6f95ec8 75 u32 flow_state;
e6f95ec8 76 struct caif_connect_request conn_req;
bece7b23 77 struct mutex readlock;
e6f95ec8
SB
78 struct dentry *debugfs_socket_dir;
79};
80
bece7b23
SB
81static int rx_flow_is_on(struct caifsock *cf_sk)
82{
83 return test_bit(RX_FLOW_ON_BIT,
84 (void *) &cf_sk->flow_state);
85}
86
87static int tx_flow_is_on(struct caifsock *cf_sk)
88{
89 return test_bit(TX_FLOW_ON_BIT,
90 (void *) &cf_sk->flow_state);
91}
e6f95ec8 92
bece7b23 93static void set_rx_flow_off(struct caifsock *cf_sk)
e6f95ec8 94{
bece7b23
SB
95 clear_bit(RX_FLOW_ON_BIT,
96 (void *) &cf_sk->flow_state);
97}
e6f95ec8 98
bece7b23
SB
99static void set_rx_flow_on(struct caifsock *cf_sk)
100{
101 set_bit(RX_FLOW_ON_BIT,
102 (void *) &cf_sk->flow_state);
103}
e6f95ec8 104
bece7b23
SB
105static void set_tx_flow_off(struct caifsock *cf_sk)
106{
107 clear_bit(TX_FLOW_ON_BIT,
108 (void *) &cf_sk->flow_state);
109}
e6f95ec8 110
bece7b23
SB
111static void set_tx_flow_on(struct caifsock *cf_sk)
112{
113 set_bit(TX_FLOW_ON_BIT,
114 (void *) &cf_sk->flow_state);
115}
e6f95ec8 116
bece7b23
SB
117static void caif_read_lock(struct sock *sk)
118{
119 struct caifsock *cf_sk;
120 cf_sk = container_of(sk, struct caifsock, sk);
121 mutex_lock(&cf_sk->readlock);
122}
e6f95ec8 123
bece7b23
SB
124static void caif_read_unlock(struct sock *sk)
125{
126 struct caifsock *cf_sk;
127 cf_sk = container_of(sk, struct caifsock, sk);
128 mutex_unlock(&cf_sk->readlock);
129}
e6f95ec8 130
a9a8f107 131static int sk_rcvbuf_lowwater(struct caifsock *cf_sk)
bece7b23
SB
132{
133 /* A quarter of full buffer is used a low water mark */
134 return cf_sk->sk.sk_rcvbuf / 4;
135}
e6f95ec8 136
a9a8f107 137static void caif_flow_ctrl(struct sock *sk, int mode)
bece7b23
SB
138{
139 struct caifsock *cf_sk;
140 cf_sk = container_of(sk, struct caifsock, sk);
ca6a09f2 141 if (cf_sk->layer.dn && cf_sk->layer.dn->modemcmd)
bece7b23
SB
142 cf_sk->layer.dn->modemcmd(cf_sk->layer.dn, mode);
143}
e6f95ec8 144
bece7b23
SB
145/*
146 * Copied from sock.c:sock_queue_rcv_skb(), but changed so packets are
147 * not dropped, but CAIF is sending flow off instead.
148 */
a9a8f107 149static int caif_queue_rcv_skb(struct sock *sk, struct sk_buff *skb)
bece7b23
SB
150{
151 int err;
152 int skb_len;
153 unsigned long flags;
154 struct sk_buff_head *list = &sk->sk_receive_queue;
155 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 156
bece7b23
SB
157 if (atomic_read(&sk->sk_rmem_alloc) + skb->truesize >=
158 (unsigned)sk->sk_rcvbuf && rx_flow_is_on(cf_sk)) {
159 trace_printk("CAIF: %s():"
160 " sending flow OFF (queue len = %d %d)\n",
161 __func__,
162 atomic_read(&cf_sk->sk.sk_rmem_alloc),
163 sk_rcvbuf_lowwater(cf_sk));
164 set_rx_flow_off(cf_sk);
ca6a09f2
SB
165 dbfs_atomic_inc(&cnt.num_rx_flow_off);
166 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23 167 }
e6f95ec8 168
bece7b23
SB
169 err = sk_filter(sk, skb);
170 if (err)
171 return err;
172 if (!sk_rmem_schedule(sk, skb->truesize) && rx_flow_is_on(cf_sk)) {
173 set_rx_flow_off(cf_sk);
174 trace_printk("CAIF: %s():"
175 " sending flow OFF due to rmem_schedule\n",
176 __func__);
ca6a09f2
SB
177 dbfs_atomic_inc(&cnt.num_rx_flow_off);
178 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_OFF_REQ);
bece7b23
SB
179 }
180 skb->dev = NULL;
181 skb_set_owner_r(skb, sk);
182 /* Cache the SKB length before we tack it onto the receive
183 * queue. Once it is added it no longer belongs to us and
184 * may be freed by other threads of control pulling packets
185 * from the queue.
186 */
187 skb_len = skb->len;
188 spin_lock_irqsave(&list->lock, flags);
189 if (!sock_flag(sk, SOCK_DEAD))
190 __skb_queue_tail(list, skb);
191 spin_unlock_irqrestore(&list->lock, flags);
192
193 if (!sock_flag(sk, SOCK_DEAD))
194 sk->sk_data_ready(sk, skb_len);
195 else
196 kfree_skb(skb);
e6f95ec8
SB
197 return 0;
198}
199
bece7b23
SB
200/* Packet Receive Callback function called from CAIF Stack */
201static int caif_sktrecv_cb(struct cflayer *layr, struct cfpkt *pkt)
e6f95ec8
SB
202{
203 struct caifsock *cf_sk;
bece7b23 204 struct sk_buff *skb;
e6f95ec8
SB
205
206 cf_sk = container_of(layr, struct caifsock, layer);
bece7b23
SB
207 skb = cfpkt_tonative(pkt);
208
209 if (unlikely(cf_sk->sk.sk_state != CAIF_CONNECTED)) {
210 cfpkt_destroy(pkt);
211 return 0;
212 }
213 caif_queue_rcv_skb(&cf_sk->sk, skb);
214 return 0;
215}
e6f95ec8 216
bece7b23
SB
217/* Packet Control Callback function called from CAIF */
218static void caif_ctrl_cb(struct cflayer *layr,
219 enum caif_ctrlcmd flow,
220 int phyid)
221{
222 struct caifsock *cf_sk = container_of(layr, struct caifsock, layer);
e6f95ec8
SB
223 switch (flow) {
224 case CAIF_CTRLCMD_FLOW_ON_IND:
bece7b23 225 /* OK from modem to start sending again */
e6f95ec8 226 dbfs_atomic_inc(&cnt.num_tx_flow_on_ind);
bece7b23
SB
227 set_tx_flow_on(cf_sk);
228 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
229 break;
230
231 case CAIF_CTRLCMD_FLOW_OFF_IND:
bece7b23 232 /* Modem asks us to shut up */
e6f95ec8 233 dbfs_atomic_inc(&cnt.num_tx_flow_off_ind);
bece7b23
SB
234 set_tx_flow_off(cf_sk);
235 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
236 break;
237
238 case CAIF_CTRLCMD_INIT_RSP:
bece7b23
SB
239 /* We're now connected */
240 dbfs_atomic_inc(&cnt.num_connect_resp);
241 cf_sk->sk.sk_state = CAIF_CONNECTED;
242 set_tx_flow_on(cf_sk);
243 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
244 break;
245
246 case CAIF_CTRLCMD_DEINIT_RSP:
bece7b23
SB
247 /* We're now disconnected */
248 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
249 cf_sk->sk.sk_state_change(&cf_sk->sk);
250 cfcnfg_release_adap_layer(&cf_sk->layer);
e6f95ec8
SB
251 break;
252
253 case CAIF_CTRLCMD_INIT_FAIL_RSP:
bece7b23
SB
254 /* Connect request failed */
255 dbfs_atomic_inc(&cnt.num_connect_fail_resp);
256 cf_sk->sk.sk_err = ECONNREFUSED;
257 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
258 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
259 /*
260 * Socket "standards" seems to require POLLOUT to
261 * be set at connect failure.
262 */
263 set_tx_flow_on(cf_sk);
264 cf_sk->sk.sk_state_change(&cf_sk->sk);
e6f95ec8
SB
265 break;
266
267 case CAIF_CTRLCMD_REMOTE_SHUTDOWN_IND:
bece7b23 268 /* Modem has closed this connection, or device is down. */
e6f95ec8 269 dbfs_atomic_inc(&cnt.num_remote_shutdown_ind);
bece7b23
SB
270 cf_sk->sk.sk_shutdown = SHUTDOWN_MASK;
271 cf_sk->sk.sk_err = ECONNRESET;
272 set_rx_flow_on(cf_sk);
273 cf_sk->sk.sk_error_report(&cf_sk->sk);
e6f95ec8
SB
274 break;
275
276 default:
277 pr_debug("CAIF: %s(): Unexpected flow command %d\n",
bece7b23 278 __func__, flow);
e6f95ec8
SB
279 }
280}
281
bece7b23 282static void caif_check_flow_release(struct sock *sk)
e6f95ec8 283{
bece7b23 284 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 285
bece7b23
SB
286 if (rx_flow_is_on(cf_sk))
287 return;
e6f95ec8 288
bece7b23
SB
289 if (atomic_read(&sk->sk_rmem_alloc) <= sk_rcvbuf_lowwater(cf_sk)) {
290 dbfs_atomic_inc(&cnt.num_rx_flow_on);
291 set_rx_flow_on(cf_sk);
ca6a09f2 292 caif_flow_ctrl(sk, CAIF_MODEMCMD_FLOW_ON_REQ);
bece7b23
SB
293 }
294}
dcda138d 295
bece7b23 296/*
dcda138d
SB
297 * Copied from unix_dgram_recvmsg, but removed credit checks,
298 * changed locking, address handling and added MSG_TRUNC.
bece7b23 299 */
bece7b23 300static int caif_seqpkt_recvmsg(struct kiocb *iocb, struct socket *sock,
dcda138d 301 struct msghdr *m, size_t len, int flags)
e6f95ec8
SB
302
303{
304 struct sock *sk = sock->sk;
e6f95ec8 305 struct sk_buff *skb;
dcda138d
SB
306 int ret;
307 int copylen;
e6f95ec8 308
dcda138d
SB
309 ret = -EOPNOTSUPP;
310 if (m->msg_flags&MSG_OOB)
311 goto read_error;
e6f95ec8 312
bece7b23
SB
313 skb = skb_recv_datagram(sk, flags, 0 , &ret);
314 if (!skb)
e6f95ec8 315 goto read_error;
dcda138d
SB
316 copylen = skb->len;
317 if (len < copylen) {
318 m->msg_flags |= MSG_TRUNC;
319 copylen = len;
e6f95ec8
SB
320 }
321
dcda138d 322 ret = skb_copy_datagram_iovec(skb, 0, m->msg_iov, copylen);
bece7b23 323 if (ret)
dcda138d 324 goto out_free;
e6f95ec8 325
dcda138d
SB
326 ret = (flags & MSG_TRUNC) ? skb->len : copylen;
327out_free:
bece7b23 328 skb_free_datagram(sk, skb);
bece7b23 329 caif_check_flow_release(sk);
dcda138d 330 return ret;
e6f95ec8 331
bece7b23
SB
332read_error:
333 return ret;
334}
e6f95ec8 335
e6f95ec8 336
bece7b23
SB
337/* Copied from unix_stream_wait_data, identical except for lock call. */
338static long caif_stream_data_wait(struct sock *sk, long timeo)
339{
340 DEFINE_WAIT(wait);
341 lock_sock(sk);
342
343 for (;;) {
344 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
345
346 if (!skb_queue_empty(&sk->sk_receive_queue) ||
347 sk->sk_err ||
348 sk->sk_state != CAIF_CONNECTED ||
349 sock_flag(sk, SOCK_DEAD) ||
350 (sk->sk_shutdown & RCV_SHUTDOWN) ||
351 signal_pending(current) ||
352 !timeo)
353 break;
e6f95ec8 354
bece7b23
SB
355 set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
356 release_sock(sk);
357 timeo = schedule_timeout(timeo);
358 lock_sock(sk);
359 clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
e6f95ec8
SB
360 }
361
bece7b23
SB
362 finish_wait(sk_sleep(sk), &wait);
363 release_sock(sk);
364 return timeo;
365}
e6f95ec8
SB
366
367
bece7b23
SB
368/*
369 * Copied from unix_stream_recvmsg, but removed credit checks,
370 * changed locking calls, changed address handling.
371 */
372static int caif_stream_recvmsg(struct kiocb *iocb, struct socket *sock,
373 struct msghdr *msg, size_t size,
374 int flags)
375{
376 struct sock *sk = sock->sk;
377 int copied = 0;
378 int target;
379 int err = 0;
380 long timeo;
e6f95ec8 381
bece7b23
SB
382 err = -EOPNOTSUPP;
383 if (flags&MSG_OOB)
384 goto out;
e6f95ec8 385
bece7b23 386 msg->msg_namelen = 0;
e6f95ec8 387
bece7b23
SB
388 /*
389 * Lock the socket to prevent queue disordering
390 * while sleeps in memcpy_tomsg
391 */
392 err = -EAGAIN;
393 if (sk->sk_state == CAIF_CONNECTING)
394 goto out;
e6f95ec8 395
bece7b23
SB
396 caif_read_lock(sk);
397 target = sock_rcvlowat(sk, flags&MSG_WAITALL, size);
398 timeo = sock_rcvtimeo(sk, flags&MSG_DONTWAIT);
e6f95ec8 399
bece7b23
SB
400 do {
401 int chunk;
402 struct sk_buff *skb;
e6f95ec8 403
bece7b23
SB
404 lock_sock(sk);
405 skb = skb_dequeue(&sk->sk_receive_queue);
406 caif_check_flow_release(sk);
e6f95ec8 407
bece7b23
SB
408 if (skb == NULL) {
409 if (copied >= target)
410 goto unlock;
411 /*
412 * POSIX 1003.1g mandates this order.
413 */
414 err = sock_error(sk);
415 if (err)
416 goto unlock;
417 err = -ECONNRESET;
418 if (sk->sk_shutdown & RCV_SHUTDOWN)
419 goto unlock;
e6f95ec8 420
bece7b23
SB
421 err = -EPIPE;
422 if (sk->sk_state != CAIF_CONNECTED)
423 goto unlock;
424 if (sock_flag(sk, SOCK_DEAD))
425 goto unlock;
e6f95ec8 426
bece7b23 427 release_sock(sk);
e6f95ec8 428
bece7b23
SB
429 err = -EAGAIN;
430 if (!timeo)
431 break;
e6f95ec8 432
bece7b23 433 caif_read_unlock(sk);
e6f95ec8 434
bece7b23 435 timeo = caif_stream_data_wait(sk, timeo);
e6f95ec8 436
bece7b23
SB
437 if (signal_pending(current)) {
438 err = sock_intr_errno(timeo);
439 goto out;
440 }
441 caif_read_lock(sk);
442 continue;
443unlock:
444 release_sock(sk);
445 break;
e6f95ec8 446 }
bece7b23
SB
447 release_sock(sk);
448 chunk = min_t(unsigned int, skb->len, size);
449 if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) {
450 skb_queue_head(&sk->sk_receive_queue, skb);
451 if (copied == 0)
452 copied = -EFAULT;
453 break;
454 }
455 copied += chunk;
456 size -= chunk;
e6f95ec8 457
bece7b23
SB
458 /* Mark read part of skb as used */
459 if (!(flags & MSG_PEEK)) {
460 skb_pull(skb, chunk);
e6f95ec8 461
bece7b23
SB
462 /* put the skb back if we didn't use it up. */
463 if (skb->len) {
464 skb_queue_head(&sk->sk_receive_queue, skb);
465 break;
466 }
467 kfree_skb(skb);
e6f95ec8 468
e6f95ec8 469 } else {
bece7b23
SB
470 /*
471 * It is questionable, see note in unix_dgram_recvmsg.
472 */
473 /* put message back and return */
474 skb_queue_head(&sk->sk_receive_queue, skb);
475 break;
e6f95ec8 476 }
bece7b23
SB
477 } while (size);
478 caif_read_unlock(sk);
e6f95ec8 479
bece7b23
SB
480out:
481 return copied ? : err;
482}
e6f95ec8 483
bece7b23
SB
484/*
485 * Copied from sock.c:sock_wait_for_wmem, but change to wait for
486 * CAIF flow-on and sock_writable.
487 */
488static long caif_wait_for_flow_on(struct caifsock *cf_sk,
489 int wait_writeable, long timeo, int *err)
490{
491 struct sock *sk = &cf_sk->sk;
492 DEFINE_WAIT(wait);
493 for (;;) {
494 *err = 0;
495 if (tx_flow_is_on(cf_sk) &&
496 (!wait_writeable || sock_writeable(&cf_sk->sk)))
497 break;
498 *err = -ETIMEDOUT;
499 if (!timeo)
500 break;
501 *err = -ERESTARTSYS;
502 if (signal_pending(current))
503 break;
504 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
505 *err = -ECONNRESET;
506 if (sk->sk_shutdown & SHUTDOWN_MASK)
507 break;
508 *err = -sk->sk_err;
509 if (sk->sk_err)
510 break;
511 *err = -EPIPE;
512 if (cf_sk->sk.sk_state != CAIF_CONNECTED)
513 break;
514 timeo = schedule_timeout(timeo);
e6f95ec8 515 }
bece7b23
SB
516 finish_wait(sk_sleep(sk), &wait);
517 return timeo;
518}
e6f95ec8 519
bece7b23
SB
520/*
521 * Transmit a SKB. The device may temporarily request re-transmission
522 * by returning EAGAIN.
523 */
524static int transmit_skb(struct sk_buff *skb, struct caifsock *cf_sk,
525 int noblock, long timeo)
526{
527 struct cfpkt *pkt;
528 int ret, loopcnt = 0;
e6f95ec8 529
bece7b23
SB
530 pkt = cfpkt_fromnative(CAIF_DIR_OUT, skb);
531 memset(cfpkt_info(pkt), 0, sizeof(struct caif_payload_info));
532 do {
e6f95ec8 533
bece7b23 534 ret = -ETIMEDOUT;
e6f95ec8 535
bece7b23
SB
536 /* Slight paranoia, probably not needed. */
537 if (unlikely(loopcnt++ > 1000)) {
538 pr_warning("CAIF: %s(): transmit retries failed,"
539 " error = %d\n", __func__, ret);
540 break;
e6f95ec8
SB
541 }
542
bece7b23
SB
543 if (cf_sk->layer.dn != NULL)
544 ret = cf_sk->layer.dn->transmit(cf_sk->layer.dn, pkt);
545 if (likely(ret >= 0))
546 break;
547 /* if transmit return -EAGAIN, then retry */
548 if (noblock && ret == -EAGAIN)
549 break;
550 timeo = caif_wait_for_flow_on(cf_sk, 0, timeo, &ret);
551 if (signal_pending(current)) {
552 ret = sock_intr_errno(timeo);
553 break;
e6f95ec8 554 }
bece7b23
SB
555 if (ret)
556 break;
557 if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
558 sock_flag(&cf_sk->sk, SOCK_DEAD) ||
559 (cf_sk->sk.sk_shutdown & RCV_SHUTDOWN)) {
560 ret = -EPIPE;
561 cf_sk->sk.sk_err = EPIPE;
562 break;
e6f95ec8 563 }
bece7b23
SB
564 } while (ret == -EAGAIN);
565 return ret;
566}
e6f95ec8 567
bece7b23
SB
568/* Copied from af_unix:unix_dgram_sendmsg, and adapted to CAIF */
569static int caif_seqpkt_sendmsg(struct kiocb *kiocb, struct socket *sock,
570 struct msghdr *msg, size_t len)
571{
572 struct sock *sk = sock->sk;
573 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
574 int buffer_size;
575 int ret = 0;
576 struct sk_buff *skb = NULL;
577 int noblock;
578 long timeo;
579 caif_assert(cf_sk);
580 ret = sock_error(sk);
581 if (ret)
582 goto err;
583
584 ret = -EOPNOTSUPP;
585 if (msg->msg_flags&MSG_OOB)
586 goto err;
587
588 ret = -EOPNOTSUPP;
589 if (msg->msg_namelen)
590 goto err;
591
592 ret = -EINVAL;
593 if (unlikely(msg->msg_iov->iov_base == NULL))
594 goto err;
595 noblock = msg->msg_flags & MSG_DONTWAIT;
596
597 buffer_size = len + CAIF_NEEDED_HEADROOM + CAIF_NEEDED_TAILROOM;
598
bece7b23
SB
599 timeo = sock_sndtimeo(sk, noblock);
600 timeo = caif_wait_for_flow_on(container_of(sk, struct caifsock, sk),
601 1, timeo, &ret);
602
603 ret = -EPIPE;
604 if (cf_sk->sk.sk_state != CAIF_CONNECTED ||
605 sock_flag(sk, SOCK_DEAD) ||
606 (sk->sk_shutdown & RCV_SHUTDOWN))
607 goto err;
608
609 ret = -ENOMEM;
610 skb = sock_alloc_send_skb(sk, buffer_size, noblock, &ret);
611 if (!skb)
612 goto err;
613 skb_reserve(skb, CAIF_NEEDED_HEADROOM);
614
615 ret = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
616
617 if (ret)
618 goto err;
619 ret = transmit_skb(skb, cf_sk, noblock, timeo);
620 if (ret < 0)
621 goto err;
622 return len;
623err:
624 kfree_skb(skb);
625 return ret;
626}
e6f95ec8 627
bece7b23
SB
628/*
629 * Copied from unix_stream_sendmsg and adapted to CAIF:
630 * Changed removed permission handling and added waiting for flow on
631 * and other minor adaptations.
632 */
633static int caif_stream_sendmsg(struct kiocb *kiocb, struct socket *sock,
634 struct msghdr *msg, size_t len)
635{
636 struct sock *sk = sock->sk;
637 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
638 int err, size;
639 struct sk_buff *skb;
640 int sent = 0;
641 long timeo;
e6f95ec8 642
bece7b23 643 err = -EOPNOTSUPP;
e6f95ec8 644
bece7b23
SB
645 if (unlikely(msg->msg_flags&MSG_OOB))
646 goto out_err;
e6f95ec8 647
bece7b23
SB
648 if (unlikely(msg->msg_namelen))
649 goto out_err;
e6f95ec8 650
bece7b23
SB
651 timeo = sock_sndtimeo(sk, msg->msg_flags & MSG_DONTWAIT);
652 timeo = caif_wait_for_flow_on(cf_sk, 1, timeo, &err);
e6f95ec8 653
bece7b23
SB
654 if (unlikely(sk->sk_shutdown & SEND_SHUTDOWN))
655 goto pipe_err;
e6f95ec8 656
bece7b23 657 while (sent < len) {
e6f95ec8 658
bece7b23 659 size = len-sent;
e6f95ec8 660
bece7b23
SB
661 if (size > CAIF_MAX_PAYLOAD_SIZE)
662 size = CAIF_MAX_PAYLOAD_SIZE;
e6f95ec8 663
bece7b23
SB
664 /* If size is more than half of sndbuf, chop up message */
665 if (size > ((sk->sk_sndbuf >> 1) - 64))
666 size = (sk->sk_sndbuf >> 1) - 64;
e6f95ec8 667
bece7b23
SB
668 if (size > SKB_MAX_ALLOC)
669 size = SKB_MAX_ALLOC;
e6f95ec8 670
bece7b23
SB
671 skb = sock_alloc_send_skb(sk,
672 size + CAIF_NEEDED_HEADROOM
673 + CAIF_NEEDED_TAILROOM,
674 msg->msg_flags&MSG_DONTWAIT,
675 &err);
676 if (skb == NULL)
677 goto out_err;
e6f95ec8 678
bece7b23
SB
679 skb_reserve(skb, CAIF_NEEDED_HEADROOM);
680 /*
681 * If you pass two values to the sock_alloc_send_skb
682 * it tries to grab the large buffer with GFP_NOFS
683 * (which can fail easily), and if it fails grab the
684 * fallback size buffer which is under a page and will
685 * succeed. [Alan]
686 */
687 size = min_t(int, size, skb_tailroom(skb));
e6f95ec8 688
bece7b23
SB
689 err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
690 if (err) {
691 kfree_skb(skb);
692 goto out_err;
693 }
694 err = transmit_skb(skb, cf_sk,
695 msg->msg_flags&MSG_DONTWAIT, timeo);
696 if (err < 0) {
697 kfree_skb(skb);
698 goto pipe_err;
699 }
700 sent += size;
e6f95ec8 701 }
e6f95ec8 702
bece7b23 703 return sent;
e6f95ec8 704
bece7b23
SB
705pipe_err:
706 if (sent == 0 && !(msg->msg_flags&MSG_NOSIGNAL))
707 send_sig(SIGPIPE, current, 0);
708 err = -EPIPE;
709out_err:
710 return sent ? : err;
e6f95ec8
SB
711}
712
713static int setsockopt(struct socket *sock,
714 int lvl, int opt, char __user *ov, unsigned int ol)
715{
716 struct sock *sk = sock->sk;
717 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
718 int prio, linksel;
719 struct ifreq ifreq;
720
bece7b23 721 if (cf_sk->sk.sk_socket->state != SS_UNCONNECTED)
e6f95ec8 722 return -ENOPROTOOPT;
bece7b23 723
e6f95ec8
SB
724 switch (opt) {
725 case CAIFSO_LINK_SELECT:
bece7b23 726 if (ol < sizeof(int))
e6f95ec8 727 return -EINVAL;
e6f95ec8
SB
728 if (lvl != SOL_CAIF)
729 goto bad_sol;
730 if (copy_from_user(&linksel, ov, sizeof(int)))
731 return -EINVAL;
732 lock_sock(&(cf_sk->sk));
733 cf_sk->conn_req.link_selector = linksel;
734 release_sock(&cf_sk->sk);
735 return 0;
736
737 case SO_PRIORITY:
738 if (lvl != SOL_SOCKET)
739 goto bad_sol;
bece7b23 740 if (ol < sizeof(int))
e6f95ec8 741 return -EINVAL;
e6f95ec8
SB
742 if (copy_from_user(&prio, ov, sizeof(int)))
743 return -EINVAL;
744 lock_sock(&(cf_sk->sk));
745 cf_sk->conn_req.priority = prio;
e6f95ec8
SB
746 release_sock(&cf_sk->sk);
747 return 0;
748
749 case SO_BINDTODEVICE:
750 if (lvl != SOL_SOCKET)
751 goto bad_sol;
bece7b23 752 if (ol < sizeof(struct ifreq))
e6f95ec8 753 return -EINVAL;
e6f95ec8
SB
754 if (copy_from_user(&ifreq, ov, sizeof(ifreq)))
755 return -EFAULT;
756 lock_sock(&(cf_sk->sk));
757 strncpy(cf_sk->conn_req.link_name, ifreq.ifr_name,
758 sizeof(cf_sk->conn_req.link_name));
759 cf_sk->conn_req.link_name
760 [sizeof(cf_sk->conn_req.link_name)-1] = 0;
761 release_sock(&cf_sk->sk);
762 return 0;
763
764 case CAIFSO_REQ_PARAM:
765 if (lvl != SOL_CAIF)
766 goto bad_sol;
767 if (cf_sk->sk.sk_protocol != CAIFPROTO_UTIL)
768 return -ENOPROTOOPT;
e6f95ec8
SB
769 lock_sock(&(cf_sk->sk));
770 cf_sk->conn_req.param.size = ol;
bece7b23
SB
771 if (ol > sizeof(cf_sk->conn_req.param.data) ||
772 copy_from_user(&cf_sk->conn_req.param.data, ov, ol)) {
e6f95ec8 773 release_sock(&cf_sk->sk);
e6f95ec8
SB
774 return -EINVAL;
775 }
e6f95ec8
SB
776 release_sock(&cf_sk->sk);
777 return 0;
778
779 default:
bece7b23 780 return -ENOPROTOOPT;
e6f95ec8
SB
781 }
782
783 return 0;
784bad_sol:
e6f95ec8
SB
785 return -ENOPROTOOPT;
786
787}
788
bece7b23
SB
789/*
790 * caif_connect() - Connect a CAIF Socket
791 * Copied and modified af_irda.c:irda_connect().
792 *
793 * Note : by consulting "errno", the user space caller may learn the cause
794 * of the failure. Most of them are visible in the function, others may come
795 * from subroutines called and are listed here :
796 * o -EAFNOSUPPORT: bad socket family or type.
797 * o -ESOCKTNOSUPPORT: bad socket type or protocol
798 * o -EINVAL: bad socket address, or CAIF link type
799 * o -ECONNREFUSED: remote end refused the connection.
800 * o -EINPROGRESS: connect request sent but timed out (or non-blocking)
801 * o -EISCONN: already connected.
802 * o -ETIMEDOUT: Connection timed out (send timeout)
803 * o -ENODEV: No link layer to send request
804 * o -ECONNRESET: Received Shutdown indication or lost link layer
805 * o -ENOMEM: Out of memory
806 *
807 * State Strategy:
808 * o sk_state: holds the CAIF_* protocol state, it's updated by
809 * caif_ctrl_cb.
810 * o sock->state: holds the SS_* socket state and is updated by connect and
811 * disconnect.
812 */
813static int caif_connect(struct socket *sock, struct sockaddr *uaddr,
814 int addr_len, int flags)
e6f95ec8 815{
e6f95ec8 816 struct sock *sk = sock->sk;
bece7b23
SB
817 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
818 long timeo;
819 int err;
820 lock_sock(sk);
e6f95ec8 821
bece7b23
SB
822 err = -EAFNOSUPPORT;
823 if (uaddr->sa_family != AF_CAIF)
e6f95ec8
SB
824 goto out;
825
bece7b23
SB
826 err = -ESOCKTNOSUPPORT;
827 if (unlikely(!(sk->sk_type == SOCK_STREAM &&
828 cf_sk->sk.sk_protocol == CAIFPROTO_AT) &&
829 sk->sk_type != SOCK_SEQPACKET))
830 goto out;
831 switch (sock->state) {
832 case SS_UNCONNECTED:
833 /* Normal case, a fresh connect */
834 caif_assert(sk->sk_state == CAIF_DISCONNECTED);
835 break;
836 case SS_CONNECTING:
837 switch (sk->sk_state) {
838 case CAIF_CONNECTED:
839 sock->state = SS_CONNECTED;
840 err = -EISCONN;
841 goto out;
842 case CAIF_DISCONNECTED:
843 /* Reconnect allowed */
844 break;
845 case CAIF_CONNECTING:
846 err = -EALREADY;
847 if (flags & O_NONBLOCK)
848 goto out;
849 goto wait_connect;
850 }
851 break;
852 case SS_CONNECTED:
853 caif_assert(sk->sk_state == CAIF_CONNECTED ||
854 sk->sk_state == CAIF_DISCONNECTED);
855 if (sk->sk_shutdown & SHUTDOWN_MASK) {
856 /* Allow re-connect after SHUTDOWN_IND */
857 caif_disconnect_client(&cf_sk->layer);
858 break;
859 }
860 /* No reconnect on a seqpacket socket */
861 err = -EISCONN;
862 goto out;
863 case SS_DISCONNECTING:
864 case SS_FREE:
865 caif_assert(1); /*Should never happen */
866 break;
e6f95ec8 867 }
bece7b23
SB
868 sk->sk_state = CAIF_DISCONNECTED;
869 sock->state = SS_UNCONNECTED;
870 sk_stream_kill_queues(&cf_sk->sk);
e6f95ec8 871
bece7b23 872 err = -EINVAL;
f5d72af9 873 if (addr_len != sizeof(struct sockaddr_caif))
bece7b23 874 goto out;
e6f95ec8 875
bece7b23 876 memcpy(&cf_sk->conn_req.sockaddr, uaddr,
e6f95ec8
SB
877 sizeof(struct sockaddr_caif));
878
bece7b23
SB
879 /* Move to connecting socket, start sending Connect Requests */
880 sock->state = SS_CONNECTING;
881 sk->sk_state = CAIF_CONNECTING;
882
883 dbfs_atomic_inc(&cnt.num_connect_req);
884 cf_sk->layer.receive = caif_sktrecv_cb;
885 err = caif_connect_client(&cf_sk->conn_req,
886 &cf_sk->layer);
887 if (err < 0) {
888 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
889 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
890 goto out;
e6f95ec8
SB
891 }
892
bece7b23
SB
893 err = -EINPROGRESS;
894wait_connect:
e6f95ec8 895
bece7b23
SB
896 if (sk->sk_state != CAIF_CONNECTED && (flags & O_NONBLOCK))
897 goto out;
e6f95ec8 898
bece7b23
SB
899 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
900
901 release_sock(sk);
9e4b816b
SB
902 err = -ERESTARTSYS;
903 timeo = wait_event_interruptible_timeout(*sk_sleep(sk),
bece7b23
SB
904 sk->sk_state != CAIF_CONNECTING,
905 timeo);
906 lock_sock(sk);
9e4b816b 907 if (timeo < 0)
bece7b23 908 goto out; /* -ERESTARTSYS */
e6f95ec8 909
9e4b816b
SB
910 err = -ETIMEDOUT;
911 if (timeo == 0 && sk->sk_state != CAIF_CONNECTED)
912 goto out;
bece7b23
SB
913 if (sk->sk_state != CAIF_CONNECTED) {
914 sock->state = SS_UNCONNECTED;
915 err = sock_error(sk);
916 if (!err)
917 err = -ECONNREFUSED;
918 goto out;
919 }
920 sock->state = SS_CONNECTED;
921 err = 0;
e6f95ec8 922out:
bece7b23
SB
923 release_sock(sk);
924 return err;
e6f95ec8
SB
925}
926
bece7b23
SB
927/*
928 * caif_release() - Disconnect a CAIF Socket
929 * Copied and modified af_irda.c:irda_release().
930 */
931static int caif_release(struct socket *sock)
e6f95ec8 932{
e6f95ec8 933 struct sock *sk = sock->sk;
bece7b23
SB
934 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
935 int res = 0;
e6f95ec8 936
bece7b23
SB
937 if (!sk)
938 return 0;
e6f95ec8 939
bece7b23 940 set_tx_flow_off(cf_sk);
e6f95ec8
SB
941
942 /*
bece7b23
SB
943 * Ensure that packets are not queued after this point in time.
944 * caif_queue_rcv_skb checks SOCK_DEAD holding the queue lock,
945 * this ensures no packets when sock is dead.
e6f95ec8 946 */
bece7b23
SB
947 spin_lock(&sk->sk_receive_queue.lock);
948 sock_set_flag(sk, SOCK_DEAD);
949 spin_unlock(&sk->sk_receive_queue.lock);
950 sock->sk = NULL;
e6f95ec8 951
bece7b23 952 dbfs_atomic_inc(&cnt.num_disconnect);
e6f95ec8
SB
953
954 if (cf_sk->debugfs_socket_dir != NULL)
955 debugfs_remove_recursive(cf_sk->debugfs_socket_dir);
956
e6f95ec8 957 lock_sock(&(cf_sk->sk));
bece7b23
SB
958 sk->sk_state = CAIF_DISCONNECTED;
959 sk->sk_shutdown = SHUTDOWN_MASK;
e6f95ec8 960
bece7b23
SB
961 if (cf_sk->sk.sk_socket->state == SS_CONNECTED ||
962 cf_sk->sk.sk_socket->state == SS_CONNECTING)
963 res = caif_disconnect_client(&cf_sk->layer);
e6f95ec8 964
bece7b23
SB
965 cf_sk->sk.sk_socket->state = SS_DISCONNECTING;
966 wake_up_interruptible_poll(sk_sleep(sk), POLLERR|POLLHUP);
e6f95ec8 967
bece7b23
SB
968 sock_orphan(sk);
969 cf_sk->layer.dn = NULL;
970 sk_stream_kill_queues(&cf_sk->sk);
971 release_sock(sk);
972 sock_put(sk);
973 return res;
974}
e6f95ec8 975
bece7b23
SB
976/* Copied from af_unix.c:unix_poll(), added CAIF tx_flow handling */
977static unsigned int caif_poll(struct file *file,
978 struct socket *sock, poll_table *wait)
979{
980 struct sock *sk = sock->sk;
981 unsigned int mask;
982 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8 983
bece7b23
SB
984 sock_poll_wait(file, sk_sleep(sk), wait);
985 mask = 0;
e6f95ec8 986
bece7b23
SB
987 /* exceptional events? */
988 if (sk->sk_err)
989 mask |= POLLERR;
990 if (sk->sk_shutdown == SHUTDOWN_MASK)
991 mask |= POLLHUP;
992 if (sk->sk_shutdown & RCV_SHUTDOWN)
993 mask |= POLLRDHUP;
e6f95ec8 994
bece7b23
SB
995 /* readable? */
996 if (!skb_queue_empty(&sk->sk_receive_queue) ||
997 (sk->sk_shutdown & RCV_SHUTDOWN))
998 mask |= POLLIN | POLLRDNORM;
e6f95ec8 999
e6f95ec8 1000 /*
bece7b23
SB
1001 * we set writable also when the other side has shut down the
1002 * connection. This prevents stuck sockets.
e6f95ec8 1003 */
bece7b23
SB
1004 if (sock_writeable(sk) && tx_flow_is_on(cf_sk))
1005 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
1006
1007 return mask;
e6f95ec8
SB
1008}
1009
bece7b23
SB
1010static const struct proto_ops caif_seqpacket_ops = {
1011 .family = PF_CAIF,
1012 .owner = THIS_MODULE,
1013 .release = caif_release,
1014 .bind = sock_no_bind,
1015 .connect = caif_connect,
1016 .socketpair = sock_no_socketpair,
1017 .accept = sock_no_accept,
1018 .getname = sock_no_getname,
1019 .poll = caif_poll,
1020 .ioctl = sock_no_ioctl,
1021 .listen = sock_no_listen,
1022 .shutdown = sock_no_shutdown,
1023 .setsockopt = setsockopt,
1024 .getsockopt = sock_no_getsockopt,
1025 .sendmsg = caif_seqpkt_sendmsg,
1026 .recvmsg = caif_seqpkt_recvmsg,
1027 .mmap = sock_no_mmap,
1028 .sendpage = sock_no_sendpage,
1029};
1030
1031static const struct proto_ops caif_stream_ops = {
e6f95ec8
SB
1032 .family = PF_CAIF,
1033 .owner = THIS_MODULE,
1034 .release = caif_release,
1035 .bind = sock_no_bind,
1036 .connect = caif_connect,
1037 .socketpair = sock_no_socketpair,
1038 .accept = sock_no_accept,
1039 .getname = sock_no_getname,
1040 .poll = caif_poll,
1041 .ioctl = sock_no_ioctl,
1042 .listen = sock_no_listen,
bece7b23 1043 .shutdown = sock_no_shutdown,
e6f95ec8
SB
1044 .setsockopt = setsockopt,
1045 .getsockopt = sock_no_getsockopt,
bece7b23
SB
1046 .sendmsg = caif_stream_sendmsg,
1047 .recvmsg = caif_stream_recvmsg,
e6f95ec8 1048 .mmap = sock_no_mmap,
bece7b23 1049 .sendpage = sock_no_sendpage,
e6f95ec8
SB
1050};
1051
1052/* This function is called when a socket is finally destroyed. */
1053static void caif_sock_destructor(struct sock *sk)
1054{
bece7b23 1055 struct caifsock *cf_sk = container_of(sk, struct caifsock, sk);
e6f95ec8
SB
1056 caif_assert(!atomic_read(&sk->sk_wmem_alloc));
1057 caif_assert(sk_unhashed(sk));
1058 caif_assert(!sk->sk_socket);
1059 if (!sock_flag(sk, SOCK_DEAD)) {
bece7b23 1060 pr_info("Attempt to release alive CAIF socket: %p\n", sk);
e6f95ec8
SB
1061 return;
1062 }
bece7b23
SB
1063 sk_stream_kill_queues(&cf_sk->sk);
1064 dbfs_atomic_dec(&cnt.caif_nr_socks);
e6f95ec8
SB
1065}
1066
1067static int caif_create(struct net *net, struct socket *sock, int protocol,
bece7b23 1068 int kern)
e6f95ec8
SB
1069{
1070 struct sock *sk = NULL;
1071 struct caifsock *cf_sk = NULL;
e6f95ec8
SB
1072 static struct proto prot = {.name = "PF_CAIF",
1073 .owner = THIS_MODULE,
1074 .obj_size = sizeof(struct caifsock),
1075 };
1076
bece7b23
SB
1077 if (!capable(CAP_SYS_ADMIN) && !capable(CAP_NET_ADMIN))
1078 return -EPERM;
e6f95ec8
SB
1079 /*
1080 * The sock->type specifies the socket type to use.
bece7b23
SB
1081 * The CAIF socket is a packet stream in the sense
1082 * that it is packet based. CAIF trusts the reliability
1083 * of the link, no resending is implemented.
e6f95ec8 1084 */
bece7b23
SB
1085 if (sock->type == SOCK_SEQPACKET)
1086 sock->ops = &caif_seqpacket_ops;
1087 else if (sock->type == SOCK_STREAM)
1088 sock->ops = &caif_stream_ops;
1089 else
e6f95ec8
SB
1090 return -ESOCKTNOSUPPORT;
1091
e6f95ec8
SB
1092 if (protocol < 0 || protocol >= CAIFPROTO_MAX)
1093 return -EPROTONOSUPPORT;
1094 /*
bece7b23
SB
1095 * Set the socket state to unconnected. The socket state
1096 * is really not used at all in the net/core or socket.c but the
e6f95ec8
SB
1097 * initialization makes sure that sock->state is not uninitialized.
1098 */
e6f95ec8
SB
1099 sk = sk_alloc(net, PF_CAIF, GFP_KERNEL, &prot);
1100 if (!sk)
1101 return -ENOMEM;
1102
1103 cf_sk = container_of(sk, struct caifsock, sk);
1104
1105 /* Store the protocol */
1106 sk->sk_protocol = (unsigned char) protocol;
1107
bece7b23
SB
1108 /* Sendbuf dictates the amount of outbound packets not yet sent */
1109 sk->sk_sndbuf = CAIF_DEF_SNDBUF;
1110 sk->sk_rcvbuf = CAIF_DEF_RCVBUF;
e6f95ec8
SB
1111
1112 /*
1113 * Lock in order to try to stop someone from opening the socket
1114 * too early.
1115 */
1116 lock_sock(&(cf_sk->sk));
1117
1118 /* Initialize the nozero default sock structure data. */
1119 sock_init_data(sock, sk);
e6f95ec8 1120 sk->sk_destruct = caif_sock_destructor;
e6f95ec8 1121
bece7b23
SB
1122 mutex_init(&cf_sk->readlock); /* single task reading lock */
1123 cf_sk->layer.ctrlcmd = caif_ctrl_cb;
1124 cf_sk->sk.sk_socket->state = SS_UNCONNECTED;
1125 cf_sk->sk.sk_state = CAIF_DISCONNECTED;
e6f95ec8 1126
bece7b23
SB
1127 set_tx_flow_off(cf_sk);
1128 set_rx_flow_on(cf_sk);
e6f95ec8
SB
1129
1130 /* Set default options on configuration */
1131 cf_sk->conn_req.priority = CAIF_PRIO_NORMAL;
bece7b23 1132 cf_sk->conn_req.link_selector = CAIF_LINK_LOW_LATENCY;
e6f95ec8
SB
1133 cf_sk->conn_req.protocol = protocol;
1134 /* Increase the number of sockets created. */
bece7b23
SB
1135 dbfs_atomic_inc(&cnt.caif_nr_socks);
1136#ifdef CONFIG_DEBUG_FS
e6f95ec8 1137 if (!IS_ERR(debugfsdir)) {
bece7b23
SB
1138 /* Fill in some information concerning the misc socket. */
1139 snprintf(cf_sk->name, sizeof(cf_sk->name), "cfsk%d",
1140 atomic_read(&cnt.caif_nr_socks));
1141
e6f95ec8
SB
1142 cf_sk->debugfs_socket_dir =
1143 debugfs_create_dir(cf_sk->name, debugfsdir);
bece7b23
SB
1144 debugfs_create_u32("sk_state", S_IRUSR | S_IWUSR,
1145 cf_sk->debugfs_socket_dir,
1146 (u32 *) &cf_sk->sk.sk_state);
e6f95ec8
SB
1147 debugfs_create_u32("flow_state", S_IRUSR | S_IWUSR,
1148 cf_sk->debugfs_socket_dir, &cf_sk->flow_state);
bece7b23
SB
1149 debugfs_create_u32("sk_rmem_alloc", S_IRUSR | S_IWUSR,
1150 cf_sk->debugfs_socket_dir,
1151 (u32 *) &cf_sk->sk.sk_rmem_alloc);
1152 debugfs_create_u32("sk_wmem_alloc", S_IRUSR | S_IWUSR,
e6f95ec8 1153 cf_sk->debugfs_socket_dir,
bece7b23 1154 (u32 *) &cf_sk->sk.sk_wmem_alloc);
e6f95ec8
SB
1155 debugfs_create_u32("identity", S_IRUSR | S_IWUSR,
1156 cf_sk->debugfs_socket_dir,
1157 (u32 *) &cf_sk->layer.id);
1158 }
bece7b23 1159#endif
e6f95ec8
SB
1160 release_sock(&cf_sk->sk);
1161 return 0;
e6f95ec8
SB
1162}
1163
bece7b23 1164
e6f95ec8
SB
1165static struct net_proto_family caif_family_ops = {
1166 .family = PF_CAIF,
1167 .create = caif_create,
1168 .owner = THIS_MODULE,
1169};
1170
a9a8f107 1171static int af_caif_init(void)
e6f95ec8 1172{
bece7b23 1173 int err = sock_register(&caif_family_ops);
e6f95ec8
SB
1174 if (!err)
1175 return err;
e6f95ec8
SB
1176 return 0;
1177}
1178
1179static int __init caif_sktinit_module(void)
1180{
e6f95ec8 1181#ifdef CONFIG_DEBUG_FS
bece7b23 1182 debugfsdir = debugfs_create_dir("caif_sk", NULL);
e6f95ec8 1183 if (!IS_ERR(debugfsdir)) {
e6f95ec8
SB
1184 debugfs_create_u32("num_sockets", S_IRUSR | S_IWUSR,
1185 debugfsdir,
bece7b23
SB
1186 (u32 *) &cnt.caif_nr_socks);
1187 debugfs_create_u32("num_connect_req", S_IRUSR | S_IWUSR,
e6f95ec8 1188 debugfsdir,
bece7b23
SB
1189 (u32 *) &cnt.num_connect_req);
1190 debugfs_create_u32("num_connect_resp", S_IRUSR | S_IWUSR,
e6f95ec8 1191 debugfsdir,
bece7b23
SB
1192 (u32 *) &cnt.num_connect_resp);
1193 debugfs_create_u32("num_connect_fail_resp", S_IRUSR | S_IWUSR,
e6f95ec8 1194 debugfsdir,
bece7b23
SB
1195 (u32 *) &cnt.num_connect_fail_resp);
1196 debugfs_create_u32("num_disconnect", S_IRUSR | S_IWUSR,
e6f95ec8 1197 debugfsdir,
bece7b23 1198 (u32 *) &cnt.num_disconnect);
e6f95ec8
SB
1199 debugfs_create_u32("num_remote_shutdown_ind",
1200 S_IRUSR | S_IWUSR, debugfsdir,
1201 (u32 *) &cnt.num_remote_shutdown_ind);
1202 debugfs_create_u32("num_tx_flow_off_ind", S_IRUSR | S_IWUSR,
1203 debugfsdir,
1204 (u32 *) &cnt.num_tx_flow_off_ind);
1205 debugfs_create_u32("num_tx_flow_on_ind", S_IRUSR | S_IWUSR,
1206 debugfsdir,
1207 (u32 *) &cnt.num_tx_flow_on_ind);
1208 debugfs_create_u32("num_rx_flow_off", S_IRUSR | S_IWUSR,
1209 debugfsdir,
1210 (u32 *) &cnt.num_rx_flow_off);
1211 debugfs_create_u32("num_rx_flow_on", S_IRUSR | S_IWUSR,
1212 debugfsdir,
1213 (u32 *) &cnt.num_rx_flow_on);
1214 }
1215#endif
bece7b23 1216 return af_caif_init();
e6f95ec8
SB
1217}
1218
1219static void __exit caif_sktexit_module(void)
1220{
1221 sock_unregister(PF_CAIF);
1222 if (debugfsdir != NULL)
1223 debugfs_remove_recursive(debugfsdir);
1224}
e6f95ec8
SB
1225module_init(caif_sktinit_module);
1226module_exit(caif_sktexit_module);