virtio-net: fix refill races during restore
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / llc / af_llc.c
CommitLineData
1da177e4
LT
1/*
2 * af_llc.c - LLC User Interface SAPs
3 * Description:
4 * Functions in this module are implementation of socket based llc
5 * communications for the Linux operating system. Support of llc class
6 * one and class two is provided via SOCK_DGRAM and SOCK_STREAM
7 * respectively.
8 *
9 * An llc2 connection is (mac + sap), only one llc2 sap connection
10 * is allowed per mac. Though one sap may have multiple mac + sap
11 * connections.
12 *
13 * Copyright (c) 2001 by Jay Schulist <jschlst@samba.org>
14 * 2002-2003 by Arnaldo Carvalho de Melo <acme@conectiva.com.br>
15 *
16 * This program can be redistributed or modified under the terms of the
17 * GNU General Public License as published by the Free Software Foundation.
18 * This program is distributed without any warranty or implied warranty
19 * of merchantability or fitness for a particular purpose.
20 *
21 * See the GNU General Public License for more details.
22 */
6e2144b7 23#include <linux/compiler.h>
1da177e4
LT
24#include <linux/kernel.h>
25#include <linux/module.h>
1da177e4
LT
26#include <linux/rtnetlink.h>
27#include <linux/init.h>
5a0e3ad6 28#include <linux/slab.h>
1da177e4
LT
29#include <net/llc.h>
30#include <net/llc_sap.h>
31#include <net/llc_pdu.h>
32#include <net/llc_conn.h>
c752f073 33#include <net/tcp_states.h>
1da177e4
LT
34
35/* remember: uninitialized global data is zeroed because its in .bss */
36static u16 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
37static u16 llc_ui_sap_link_no_max[256];
38static struct sockaddr_llc llc_ui_addrnull;
90ddc4f0 39static const struct proto_ops llc_ui_ops;
1da177e4 40
54fb7f25
ACM
41static int llc_ui_wait_for_conn(struct sock *sk, long timeout);
42static int llc_ui_wait_for_disc(struct sock *sk, long timeout);
54fb7f25 43static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout);
1da177e4
LT
44
45#if 0
46#define dprintk(args...) printk(KERN_DEBUG args)
47#else
48#define dprintk(args...)
49#endif
50
e5cd6fe3
OP
51/* Maybe we'll add some more in the future. */
52#define LLC_CMSG_PKTINFO 1
53
54
1da177e4
LT
55/**
56 * llc_ui_next_link_no - return the next unused link number for a sap
57 * @sap: Address of sap to get link number from.
58 *
59 * Return the next unused link number for a given sap.
60 */
2342c990 61static inline u16 llc_ui_next_link_no(int sap)
1da177e4
LT
62{
63 return llc_ui_sap_link_no_max[sap]++;
64}
65
66/**
67 * llc_proto_type - return eth protocol for ARP header type
68 * @arphrd: ARP header type.
69 *
70 * Given an ARP header type return the corresponding ethernet protocol.
71 */
3fbd418a 72static inline __be16 llc_proto_type(u16 arphrd)
1da177e4 73{
211ed865 74 return htons(ETH_P_802_2);
1da177e4
LT
75}
76
77/**
78 * llc_ui_addr_null - determines if a address structure is null
79 * @addr: Address to test if null.
80 */
2342c990 81static inline u8 llc_ui_addr_null(struct sockaddr_llc *addr)
1da177e4
LT
82{
83 return !memcmp(addr, &llc_ui_addrnull, sizeof(*addr));
84}
85
86/**
87 * llc_ui_header_len - return length of llc header based on operation
88 * @sk: Socket which contains a valid llc socket type.
89 * @addr: Complete sockaddr_llc structure received from the user.
90 *
91 * Provide the length of the llc header depending on what kind of
92 * operation the user would like to perform and the type of socket.
93 * Returns the correct llc header length.
94 */
2342c990 95static inline u8 llc_ui_header_len(struct sock *sk, struct sockaddr_llc *addr)
1da177e4
LT
96{
97 u8 rc = LLC_PDU_LEN_U;
98
99 if (addr->sllc_test || addr->sllc_xid)
100 rc = LLC_PDU_LEN_U;
101 else if (sk->sk_type == SOCK_STREAM)
102 rc = LLC_PDU_LEN_I;
103 return rc;
104}
105
106/**
107 * llc_ui_send_data - send data via reliable llc2 connection
108 * @sk: Connection the socket is using.
109 * @skb: Data the user wishes to send.
1da177e4
LT
110 * @noblock: can we block waiting for data?
111 *
112 * Send data via reliable llc2 connection.
113 * Returns 0 upon success, non-zero if action did not succeed.
114 */
115static int llc_ui_send_data(struct sock* sk, struct sk_buff *skb, int noblock)
116{
117 struct llc_sock* llc = llc_sk(sk);
118 int rc = 0;
119
d57b1869 120 if (unlikely(llc_data_accept_state(llc->state) ||
451677c4
JF
121 llc->remote_busy_flag ||
122 llc->p_flag)) {
54fb7f25 123 long timeout = sock_sndtimeo(sk, noblock);
1da177e4
LT
124
125 rc = llc_ui_wait_for_busy_core(sk, timeout);
126 }
249ff1c6 127 if (unlikely(!rc))
1da177e4
LT
128 rc = llc_build_and_send_pkt(sk, skb);
129 return rc;
130}
131
132static void llc_ui_sk_init(struct socket *sock, struct sock *sk)
133{
ee5850de 134 sock_graft(sk, sock);
1da177e4 135 sk->sk_type = sock->type;
1da177e4
LT
136 sock->ops = &llc_ui_ops;
137}
138
139static struct proto llc_proto = {
9c005e01 140 .name = "LLC",
1da177e4
LT
141 .owner = THIS_MODULE,
142 .obj_size = sizeof(struct llc_sock),
b76f5a84 143 .slab_flags = SLAB_DESTROY_BY_RCU,
1da177e4
LT
144};
145
146/**
147 * llc_ui_create - alloc and init a new llc_ui socket
3f378b68 148 * @net: network namespace (must be default network)
1da177e4
LT
149 * @sock: Socket to initialize and attach allocated sk to.
150 * @protocol: Unused.
3f378b68 151 * @kern: on behalf of kernel or userspace
1da177e4
LT
152 *
153 * Allocate and initialize a new llc_ui socket, validate the user wants a
154 * socket type we have available.
155 * Returns 0 upon success, negative upon failure.
156 */
3f378b68
EP
157static int llc_ui_create(struct net *net, struct socket *sock, int protocol,
158 int kern)
1da177e4
LT
159{
160 struct sock *sk;
161 int rc = -ESOCKTNOSUPPORT;
162
df008c91 163 if (!ns_capable(net->user_ns, CAP_NET_RAW))
3480c63b
PM
164 return -EPERM;
165
09ad9bc7 166 if (!net_eq(net, &init_net))
1b8d7ae4
EB
167 return -EAFNOSUPPORT;
168
af426d32 169 if (likely(sock->type == SOCK_DGRAM || sock->type == SOCK_STREAM)) {
1da177e4 170 rc = -ENOMEM;
1b8d7ae4 171 sk = llc_sk_alloc(net, PF_LLC, GFP_KERNEL, &llc_proto);
1da177e4
LT
172 if (sk) {
173 rc = 0;
174 llc_ui_sk_init(sock, sk);
175 }
176 }
177 return rc;
178}
179
180/**
181 * llc_ui_release - shutdown socket
182 * @sock: Socket to release.
183 *
184 * Shutdown and deallocate an existing socket.
185 */
186static int llc_ui_release(struct socket *sock)
187{
188 struct sock *sk = sock->sk;
189 struct llc_sock *llc;
190
af426d32 191 if (unlikely(sk == NULL))
1da177e4
LT
192 goto out;
193 sock_hold(sk);
194 lock_sock(sk);
195 llc = llc_sk(sk);
0dc47877 196 dprintk("%s: closing local(%02X) remote(%02X)\n", __func__,
1da177e4
LT
197 llc->laddr.lsap, llc->daddr.lsap);
198 if (!llc_send_disc(sk))
199 llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
3100aa9d 200 if (!sock_flag(sk, SOCK_ZAPPED))
1da177e4
LT
201 llc_sap_remove_socket(llc->sap, sk);
202 release_sock(sk);
1da177e4
LT
203 if (llc->dev)
204 dev_put(llc->dev);
205 sock_put(sk);
206 llc_sk_free(sk);
207out:
208 return 0;
209}
210
211/**
212 * llc_ui_autoport - provide dynamically allocate SAP number
213 *
214 * Provide the caller with a dynamically allocated SAP number according
215 * to the rules that are set in this function. Returns: 0, upon failure,
216 * SAP number otherwise.
217 */
218static int llc_ui_autoport(void)
219{
220 struct llc_sap *sap;
221 int i, tries = 0;
222
223 while (tries < LLC_SAP_DYN_TRIES) {
224 for (i = llc_ui_sap_last_autoport;
225 i < LLC_SAP_DYN_STOP; i += 2) {
226 sap = llc_sap_find(i);
227 if (!sap) {
228 llc_ui_sap_last_autoport = i + 2;
229 goto out;
230 }
6e2144b7 231 llc_sap_put(sap);
1da177e4
LT
232 }
233 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
234 tries++;
235 }
236 i = 0;
237out:
238 return i;
239}
240
241/**
5a770c02
ACM
242 * llc_ui_autobind - automatically bind a socket to a sap
243 * @sock: socket to bind
244 * @addr: address to connect to
245 *
246 * Used by llc_ui_connect and llc_ui_sendmsg when the user hasn't
247 * specifically used llc_ui_bind to bind to an specific address/sap
1da177e4 248 *
1da177e4
LT
249 * Returns: 0 upon success, negative otherwise.
250 */
251static int llc_ui_autobind(struct socket *sock, struct sockaddr_llc *addr)
252{
253 struct sock *sk = sock->sk;
254 struct llc_sock *llc = llc_sk(sk);
255 struct llc_sap *sap;
256 int rc = -EINVAL;
257
258 if (!sock_flag(sk, SOCK_ZAPPED))
259 goto out;
260 rc = -ENODEV;
abf9d537
OP
261 if (sk->sk_bound_dev_if) {
262 llc->dev = dev_get_by_index(&init_net, sk->sk_bound_dev_if);
263 if (llc->dev && addr->sllc_arphrd != llc->dev->type) {
264 dev_put(llc->dev);
265 llc->dev = NULL;
266 }
267 } else
268 llc->dev = dev_getfirstbyhwtype(&init_net, addr->sllc_arphrd);
1da177e4
LT
269 if (!llc->dev)
270 goto out;
271 rc = -EUSERS;
272 llc->laddr.lsap = llc_ui_autoport();
273 if (!llc->laddr.lsap)
274 goto out;
275 rc = -EBUSY; /* some other network layer is using the sap */
276 sap = llc_sap_open(llc->laddr.lsap, NULL);
277 if (!sap)
278 goto out;
279 memcpy(llc->laddr.mac, llc->dev->dev_addr, IFHWADDRLEN);
280 memcpy(&llc->addr, addr, sizeof(llc->addr));
281 /* assign new connection to its SAP */
282 llc_sap_add_socket(sap, sk);
283 sock_reset_flag(sk, SOCK_ZAPPED);
284 rc = 0;
285out:
286 return rc;
287}
288
289/**
290 * llc_ui_bind - bind a socket to a specific address.
291 * @sock: Socket to bind an address to.
292 * @uaddr: Address the user wants the socket bound to.
293 * @addrlen: Length of the uaddr structure.
294 *
295 * Bind a socket to a specific address. For llc a user is able to bind to
5a770c02 296 * a specific sap only or mac + sap.
1da177e4
LT
297 * If the user desires to bind to a specific mac + sap, it is possible to
298 * have multiple sap connections via multiple macs.
299 * Bind and autobind for that matter must enforce the correct sap usage
300 * otherwise all hell will break loose.
301 * Returns: 0 upon success, negative otherwise.
302 */
303static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen)
304{
305 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
306 struct sock *sk = sock->sk;
307 struct llc_sock *llc = llc_sk(sk);
308 struct llc_sap *sap;
309 int rc = -EINVAL;
310
0dc47877 311 dprintk("%s: binding %02X\n", __func__, addr->sllc_sap);
af426d32 312 if (unlikely(!sock_flag(sk, SOCK_ZAPPED) || addrlen != sizeof(*addr)))
1da177e4
LT
313 goto out;
314 rc = -EAFNOSUPPORT;
af426d32 315 if (unlikely(addr->sllc_family != AF_LLC))
1da177e4 316 goto out;
cf309e3f 317 rc = -ENODEV;
941666c2 318 rcu_read_lock();
abf9d537 319 if (sk->sk_bound_dev_if) {
941666c2 320 llc->dev = dev_get_by_index_rcu(&init_net, sk->sk_bound_dev_if);
abf9d537
OP
321 if (llc->dev) {
322 if (!addr->sllc_arphrd)
323 addr->sllc_arphrd = llc->dev->type;
324 if (llc_mac_null(addr->sllc_mac))
325 memcpy(addr->sllc_mac, llc->dev->dev_addr,
326 IFHWADDRLEN);
327 if (addr->sllc_arphrd != llc->dev->type ||
328 !llc_mac_match(addr->sllc_mac,
329 llc->dev->dev_addr)) {
330 rc = -EINVAL;
abf9d537
OP
331 llc->dev = NULL;
332 }
333 }
334 } else
941666c2 335 llc->dev = dev_getbyhwaddr_rcu(&init_net, addr->sllc_arphrd,
abf9d537 336 addr->sllc_mac);
941666c2
ED
337 if (llc->dev)
338 dev_hold(llc->dev);
339 rcu_read_unlock();
cf309e3f
JF
340 if (!llc->dev)
341 goto out;
1da177e4
LT
342 if (!addr->sllc_sap) {
343 rc = -EUSERS;
344 addr->sllc_sap = llc_ui_autoport();
345 if (!addr->sllc_sap)
346 goto out;
347 }
348 sap = llc_sap_find(addr->sllc_sap);
349 if (!sap) {
350 sap = llc_sap_open(addr->sllc_sap, NULL);
351 rc = -EBUSY; /* some other network layer is using the sap */
352 if (!sap)
353 goto out;
354 } else {
355 struct llc_addr laddr, daddr;
356 struct sock *ask;
357
358 memset(&laddr, 0, sizeof(laddr));
359 memset(&daddr, 0, sizeof(daddr));
360 /*
59c51591 361 * FIXME: check if the address is multicast,
1da177e4
LT
362 * only SOCK_DGRAM can do this.
363 */
364 memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN);
365 laddr.lsap = addr->sllc_sap;
366 rc = -EADDRINUSE; /* mac + sap clash. */
367 ask = llc_lookup_established(sap, &daddr, &laddr);
368 if (ask) {
369 sock_put(ask);
6e2144b7 370 goto out_put;
1da177e4
LT
371 }
372 }
373 llc->laddr.lsap = addr->sllc_sap;
374 memcpy(llc->laddr.mac, addr->sllc_mac, IFHWADDRLEN);
375 memcpy(&llc->addr, addr, sizeof(llc->addr));
376 /* assign new connection to its SAP */
377 llc_sap_add_socket(sap, sk);
378 sock_reset_flag(sk, SOCK_ZAPPED);
379 rc = 0;
6e2144b7
ACM
380out_put:
381 llc_sap_put(sap);
1da177e4
LT
382out:
383 return rc;
384}
385
386/**
387 * llc_ui_shutdown - shutdown a connect llc2 socket.
388 * @sock: Socket to shutdown.
389 * @how: What part of the socket to shutdown.
390 *
391 * Shutdown a connected llc2 socket. Currently this function only supports
392 * shutting down both sends and receives (2), we could probably make this
393 * function such that a user can shutdown only half the connection but not
394 * right now.
395 * Returns: 0 upon success, negative otherwise.
396 */
397static int llc_ui_shutdown(struct socket *sock, int how)
398{
399 struct sock *sk = sock->sk;
400 int rc = -ENOTCONN;
401
402 lock_sock(sk);
af426d32 403 if (unlikely(sk->sk_state != TCP_ESTABLISHED))
1da177e4
LT
404 goto out;
405 rc = -EINVAL;
406 if (how != 2)
407 goto out;
408 rc = llc_send_disc(sk);
409 if (!rc)
410 rc = llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
411 /* Wake up anyone sleeping in poll */
412 sk->sk_state_change(sk);
413out:
414 release_sock(sk);
415 return rc;
416}
417
418/**
419 * llc_ui_connect - Connect to a remote llc2 mac + sap.
420 * @sock: Socket which will be connected to the remote destination.
421 * @uaddr: Remote and possibly the local address of the new connection.
422 * @addrlen: Size of uaddr structure.
423 * @flags: Operational flags specified by the user.
424 *
425 * Connect to a remote llc2 mac + sap. The caller must specify the
426 * destination mac and address to connect to. If the user hasn't previously
427 * called bind(2) with a smac the address of the first interface of the
428 * specified arp type will be used.
429 * This function will autobind if user did not previously call bind.
430 * Returns: 0 upon success, negative otherwise.
431 */
432static int llc_ui_connect(struct socket *sock, struct sockaddr *uaddr,
433 int addrlen, int flags)
434{
435 struct sock *sk = sock->sk;
436 struct llc_sock *llc = llc_sk(sk);
437 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
1da177e4
LT
438 int rc = -EINVAL;
439
440 lock_sock(sk);
af426d32 441 if (unlikely(addrlen != sizeof(*addr)))
1da177e4
LT
442 goto out;
443 rc = -EAFNOSUPPORT;
af426d32
ACM
444 if (unlikely(addr->sllc_family != AF_LLC))
445 goto out;
446 if (unlikely(sk->sk_type != SOCK_STREAM))
447 goto out;
448 rc = -EALREADY;
449 if (unlikely(sock->state == SS_CONNECTING))
1da177e4
LT
450 goto out;
451 /* bind connection to sap if user hasn't done it. */
452 if (sock_flag(sk, SOCK_ZAPPED)) {
453 /* bind to sap with null dev, exclusive */
454 rc = llc_ui_autobind(sock, addr);
455 if (rc)
456 goto out;
1da177e4 457 }
5564af21
JF
458 llc->daddr.lsap = addr->sllc_sap;
459 memcpy(llc->daddr.mac, addr->sllc_mac, IFHWADDRLEN);
1da177e4
LT
460 sock->state = SS_CONNECTING;
461 sk->sk_state = TCP_SYN_SENT;
462 llc->link = llc_ui_next_link_no(llc->sap->laddr.lsap);
774ccb4f 463 rc = llc_establish_connection(sk, llc->dev->dev_addr,
1da177e4
LT
464 addr->sllc_mac, addr->sllc_sap);
465 if (rc) {
0dc47877 466 dprintk("%s: llc_ui_send_conn failed :-(\n", __func__);
1da177e4
LT
467 sock->state = SS_UNCONNECTED;
468 sk->sk_state = TCP_CLOSE;
469 goto out;
470 }
b35bd110
ACM
471
472 if (sk->sk_state == TCP_SYN_SENT) {
54fb7f25 473 const long timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
b35bd110
ACM
474
475 if (!timeo || !llc_ui_wait_for_conn(sk, timeo))
476 goto out;
477
478 rc = sock_intr_errno(timeo);
479 if (signal_pending(current))
480 goto out;
481 }
482
483 if (sk->sk_state == TCP_CLOSE)
484 goto sock_error;
485
486 sock->state = SS_CONNECTED;
487 rc = 0;
1da177e4
LT
488out:
489 release_sock(sk);
490 return rc;
b35bd110
ACM
491sock_error:
492 rc = sock_error(sk) ? : -ECONNABORTED;
493 sock->state = SS_UNCONNECTED;
494 goto out;
1da177e4
LT
495}
496
497/**
498 * llc_ui_listen - allow a normal socket to accept incoming connections
499 * @sock: Socket to allow incoming connections on.
500 * @backlog: Number of connections to queue.
501 *
502 * Allow a normal socket to accept incoming connections.
503 * Returns 0 upon success, negative otherwise.
504 */
505static int llc_ui_listen(struct socket *sock, int backlog)
506{
507 struct sock *sk = sock->sk;
508 int rc = -EINVAL;
509
510 lock_sock(sk);
af426d32 511 if (unlikely(sock->state != SS_UNCONNECTED))
1da177e4
LT
512 goto out;
513 rc = -EOPNOTSUPP;
af426d32 514 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
515 goto out;
516 rc = -EAGAIN;
517 if (sock_flag(sk, SOCK_ZAPPED))
518 goto out;
519 rc = 0;
95c96174 520 if (!(unsigned int)backlog) /* BSDism */
1da177e4
LT
521 backlog = 1;
522 sk->sk_max_ack_backlog = backlog;
523 if (sk->sk_state != TCP_LISTEN) {
524 sk->sk_ack_backlog = 0;
525 sk->sk_state = TCP_LISTEN;
526 }
527 sk->sk_socket->flags |= __SO_ACCEPTCON;
528out:
529 release_sock(sk);
530 return rc;
531}
532
54fb7f25 533static int llc_ui_wait_for_disc(struct sock *sk, long timeout)
1da177e4 534{
b35bd110
ACM
535 DEFINE_WAIT(wait);
536 int rc = 0;
1da177e4 537
54fb7f25 538 while (1) {
aa395145 539 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
54fb7f25
ACM
540 if (sk_wait_event(sk, &timeout, sk->sk_state == TCP_CLOSE))
541 break;
1da177e4
LT
542 rc = -ERESTARTSYS;
543 if (signal_pending(current))
544 break;
545 rc = -EAGAIN;
546 if (!timeout)
547 break;
b35bd110 548 rc = 0;
1da177e4 549 }
aa395145 550 finish_wait(sk_sleep(sk), &wait);
1da177e4
LT
551 return rc;
552}
553
54fb7f25 554static int llc_ui_wait_for_conn(struct sock *sk, long timeout)
1da177e4 555{
b35bd110 556 DEFINE_WAIT(wait);
1da177e4 557
54fb7f25 558 while (1) {
aa395145 559 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
54fb7f25
ACM
560 if (sk_wait_event(sk, &timeout, sk->sk_state != TCP_SYN_SENT))
561 break;
b35bd110 562 if (signal_pending(current) || !timeout)
1da177e4
LT
563 break;
564 }
aa395145 565 finish_wait(sk_sleep(sk), &wait);
b35bd110 566 return timeout;
1da177e4
LT
567}
568
afdbe357 569static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout)
1da177e4 570{
b35bd110 571 DEFINE_WAIT(wait);
afdbe357
ACM
572 struct llc_sock *llc = llc_sk(sk);
573 int rc;
1da177e4 574
54fb7f25 575 while (1) {
aa395145 576 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
afdbe357 577 rc = 0;
54fb7f25
ACM
578 if (sk_wait_event(sk, &timeout,
579 (sk->sk_shutdown & RCV_SHUTDOWN) ||
afdbe357 580 (!llc_data_accept_state(llc->state) &&
451677c4 581 !llc->remote_busy_flag &&
afdbe357 582 !llc->p_flag)))
1da177e4 583 break;
1da177e4
LT
584 rc = -ERESTARTSYS;
585 if (signal_pending(current))
586 break;
587 rc = -EAGAIN;
588 if (!timeout)
589 break;
590 }
aa395145 591 finish_wait(sk_sleep(sk), &wait);
1da177e4
LT
592 return rc;
593}
594
2928c19e 595static int llc_wait_data(struct sock *sk, long timeo)
1da177e4 596{
1da177e4
LT
597 int rc;
598
54fb7f25 599 while (1) {
afdbe357
ACM
600 /*
601 * POSIX 1003.1g mandates this order.
602 */
c1cbe4b7
BL
603 rc = sock_error(sk);
604 if (rc)
afdbe357 605 break;
1da177e4 606 rc = 0;
afdbe357 607 if (sk->sk_shutdown & RCV_SHUTDOWN)
1da177e4 608 break;
afdbe357
ACM
609 rc = -EAGAIN;
610 if (!timeo)
611 break;
612 rc = sock_intr_errno(timeo);
1da177e4
LT
613 if (signal_pending(current))
614 break;
afdbe357
ACM
615 rc = 0;
616 if (sk_wait_data(sk, &timeo))
1da177e4
LT
617 break;
618 }
1da177e4
LT
619 return rc;
620}
621
e5cd6fe3
OP
622static void llc_cmsg_rcv(struct msghdr *msg, struct sk_buff *skb)
623{
624 struct llc_sock *llc = llc_sk(skb->sk);
625
626 if (llc->cmsg_flags & LLC_CMSG_PKTINFO) {
627 struct llc_pktinfo info;
628
629 info.lpi_ifindex = llc_sk(skb->sk)->dev->ifindex;
630 llc_pdu_decode_dsap(skb, &info.lpi_sap);
631 llc_pdu_decode_da(skb, info.lpi_mac);
632 put_cmsg(msg, SOL_LLC, LLC_OPT_PKTINFO, sizeof(info), &info);
633 }
634}
635
1da177e4
LT
636/**
637 * llc_ui_accept - accept a new incoming connection.
638 * @sock: Socket which connections arrive on.
639 * @newsock: Socket to move incoming connection to.
640 * @flags: User specified operational flags.
641 *
642 * Accept a new incoming connection.
643 * Returns 0 upon success, negative otherwise.
644 */
645static int llc_ui_accept(struct socket *sock, struct socket *newsock, int flags)
646{
647 struct sock *sk = sock->sk, *newsk;
648 struct llc_sock *llc, *newllc;
649 struct sk_buff *skb;
650 int rc = -EOPNOTSUPP;
651
0dc47877 652 dprintk("%s: accepting on %02X\n", __func__,
d57b1869 653 llc_sk(sk)->laddr.lsap);
1da177e4 654 lock_sock(sk);
af426d32 655 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
656 goto out;
657 rc = -EINVAL;
af426d32
ACM
658 if (unlikely(sock->state != SS_UNCONNECTED ||
659 sk->sk_state != TCP_LISTEN))
1da177e4
LT
660 goto out;
661 /* wait for a connection to arrive. */
b35bd110 662 if (skb_queue_empty(&sk->sk_receive_queue)) {
afdbe357 663 rc = llc_wait_data(sk, sk->sk_rcvtimeo);
b35bd110
ACM
664 if (rc)
665 goto out;
666 }
0dc47877 667 dprintk("%s: got a new connection on %02X\n", __func__,
d57b1869 668 llc_sk(sk)->laddr.lsap);
1da177e4
LT
669 skb = skb_dequeue(&sk->sk_receive_queue);
670 rc = -EINVAL;
671 if (!skb->sk)
672 goto frees;
673 rc = 0;
674 newsk = skb->sk;
675 /* attach connection to a new socket. */
676 llc_ui_sk_init(newsock, newsk);
677 sock_reset_flag(newsk, SOCK_ZAPPED);
678 newsk->sk_state = TCP_ESTABLISHED;
679 newsock->state = SS_CONNECTED;
680 llc = llc_sk(sk);
681 newllc = llc_sk(newsk);
682 memcpy(&newllc->addr, &llc->addr, sizeof(newllc->addr));
683 newllc->link = llc_ui_next_link_no(newllc->laddr.lsap);
684
685 /* put original socket back into a clean listen state. */
686 sk->sk_state = TCP_LISTEN;
687 sk->sk_ack_backlog--;
0dc47877 688 dprintk("%s: ok success on %02X, client on %02X\n", __func__,
1da177e4
LT
689 llc_sk(sk)->addr.sllc_sap, newllc->daddr.lsap);
690frees:
691 kfree_skb(skb);
692out:
693 release_sock(sk);
694 return rc;
695}
696
697/**
698 * llc_ui_recvmsg - copy received data to the socket user.
699 * @sock: Socket to copy data from.
700 * @msg: Various user space related information.
8420e1b5 701 * @len: Size of user buffer.
1da177e4
LT
702 * @flags: User specified flags.
703 *
704 * Copy received data to the socket user.
705 * Returns non-negative upon success, negative otherwise.
706 */
707static int llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock,
8420e1b5 708 struct msghdr *msg, size_t len, int flags)
1da177e4 709{
1da177e4 710 struct sockaddr_llc *uaddr = (struct sockaddr_llc *)msg->msg_name;
8420e1b5
ACM
711 const int nonblock = flags & MSG_DONTWAIT;
712 struct sk_buff *skb = NULL;
713 struct sock *sk = sock->sk;
714 struct llc_sock *llc = llc_sk(sk);
56ac11cf 715 unsigned long cpu_flags;
1da177e4 716 size_t copied = 0;
8420e1b5
ACM
717 u32 peek_seq = 0;
718 u32 *seq;
719 unsigned long used;
720 int target; /* Read at least this many bytes */
721 long timeo;
1da177e4 722
1da177e4 723 lock_sock(sk);
8420e1b5 724 copied = -ENOTCONN;
29efcd26 725 if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN))
1da177e4 726 goto out;
8420e1b5
ACM
727
728 timeo = sock_rcvtimeo(sk, nonblock);
729
730 seq = &llc->copied_seq;
731 if (flags & MSG_PEEK) {
732 peek_seq = llc->copied_seq;
733 seq = &peek_seq;
d57b1869 734 }
8420e1b5
ACM
735
736 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
737 copied = 0;
738
739 do {
740 u32 offset;
741
742 /*
743 * We need to check signals first, to get correct SIGURG
744 * handling. FIXME: Need to check this doesn't impact 1003.1g
745 * and move it down to the bottom of the loop
746 */
747 if (signal_pending(current)) {
748 if (copied)
749 break;
750 copied = timeo ? sock_intr_errno(timeo) : -EAGAIN;
751 break;
752 }
753
754 /* Next get a buffer. */
755
756 skb = skb_peek(&sk->sk_receive_queue);
757 if (skb) {
758 offset = *seq;
759 goto found_ok_skb;
760 }
761 /* Well, if we have backlog, try to process it now yet. */
762
763 if (copied >= target && !sk->sk_backlog.tail)
764 break;
765
766 if (copied) {
767 if (sk->sk_err ||
768 sk->sk_state == TCP_CLOSE ||
769 (sk->sk_shutdown & RCV_SHUTDOWN) ||
770 !timeo ||
771 (flags & MSG_PEEK))
772 break;
773 } else {
774 if (sock_flag(sk, SOCK_DONE))
775 break;
776
777 if (sk->sk_err) {
778 copied = sock_error(sk);
779 break;
780 }
781 if (sk->sk_shutdown & RCV_SHUTDOWN)
782 break;
783
29efcd26 784 if (sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_CLOSE) {
8420e1b5
ACM
785 if (!sock_flag(sk, SOCK_DONE)) {
786 /*
787 * This occurs when user tries to read
788 * from never connected socket.
789 */
790 copied = -ENOTCONN;
791 break;
792 }
793 break;
794 }
795 if (!timeo) {
796 copied = -EAGAIN;
797 break;
798 }
799 }
800
801 if (copied >= target) { /* Do not sleep, just process backlog. */
802 release_sock(sk);
803 lock_sock(sk);
804 } else
805 sk_wait_data(sk, &timeo);
806
807 if ((flags & MSG_PEEK) && peek_seq != llc->copied_seq) {
e87cc472
JP
808 net_dbg_ratelimited("LLC(%s:%d): Application bug, race in MSG_PEEK\n",
809 current->comm,
810 task_pid_nr(current));
8420e1b5
ACM
811 peek_seq = llc->copied_seq;
812 }
813 continue;
814 found_ok_skb:
815 /* Ok so how much can we use? */
816 used = skb->len - offset;
817 if (len < used)
818 used = len;
819
820 if (!(flags & MSG_TRUNC)) {
821 int rc = skb_copy_datagram_iovec(skb, offset,
822 msg->msg_iov, used);
823 if (rc) {
824 /* Exception. Bailout! */
825 if (!copied)
826 copied = -EFAULT;
827 break;
828 }
829 }
830
831 *seq += used;
832 copied += used;
833 len -= used;
834
9cef310f
AJ
835 /* For non stream protcols we get one packet per recvmsg call */
836 if (sk->sk_type != SOCK_STREAM)
837 goto copy_uaddr;
838
8420e1b5 839 if (!(flags & MSG_PEEK)) {
56ac11cf 840 spin_lock_irqsave(&sk->sk_receive_queue.lock, cpu_flags);
dc6b9b78 841 sk_eat_skb(sk, skb, false);
56ac11cf 842 spin_unlock_irqrestore(&sk->sk_receive_queue.lock, cpu_flags);
8420e1b5
ACM
843 *seq = 0;
844 }
30a584d9 845
30a584d9
SH
846 /* Partial read */
847 if (used + offset < skb->len)
848 continue;
8420e1b5
ACM
849 } while (len > 0);
850
1da177e4
LT
851out:
852 release_sock(sk);
8420e1b5
ACM
853 return copied;
854copy_uaddr:
855 if (uaddr != NULL && skb != NULL) {
856 memcpy(uaddr, llc_ui_skb_cb(skb), sizeof(*uaddr));
857 msg->msg_namelen = sizeof(*uaddr);
858 }
e5cd6fe3
OP
859 if (llc_sk(sk)->cmsg_flags)
860 llc_cmsg_rcv(msg, skb);
9cef310f
AJ
861
862 if (!(flags & MSG_PEEK)) {
56ac11cf 863 spin_lock_irqsave(&sk->sk_receive_queue.lock, cpu_flags);
dc6b9b78 864 sk_eat_skb(sk, skb, false);
56ac11cf 865 spin_unlock_irqrestore(&sk->sk_receive_queue.lock, cpu_flags);
9cef310f
AJ
866 *seq = 0;
867 }
868
8420e1b5 869 goto out;
1da177e4
LT
870}
871
872/**
873 * llc_ui_sendmsg - Transmit data provided by the socket user.
874 * @sock: Socket to transmit data from.
875 * @msg: Various user related information.
876 * @len: Length of data to transmit.
877 *
878 * Transmit data provided by the socket user.
879 * Returns non-negative upon success, negative otherwise.
880 */
881static int llc_ui_sendmsg(struct kiocb *iocb, struct socket *sock,
882 struct msghdr *msg, size_t len)
883{
884 struct sock *sk = sock->sk;
885 struct llc_sock *llc = llc_sk(sk);
886 struct sockaddr_llc *addr = (struct sockaddr_llc *)msg->msg_name;
887 int flags = msg->msg_flags;
888 int noblock = flags & MSG_DONTWAIT;
1da177e4
LT
889 struct sk_buff *skb;
890 size_t size = 0;
891 int rc = -EINVAL, copied = 0, hdrlen;
892
0dc47877 893 dprintk("%s: sending from %02X to %02X\n", __func__,
1da177e4
LT
894 llc->laddr.lsap, llc->daddr.lsap);
895 lock_sock(sk);
896 if (addr) {
897 if (msg->msg_namelen < sizeof(*addr))
898 goto release;
899 } else {
900 if (llc_ui_addr_null(&llc->addr))
901 goto release;
902 addr = &llc->addr;
903 }
904 /* must bind connection to sap if user hasn't done it. */
905 if (sock_flag(sk, SOCK_ZAPPED)) {
906 /* bind to sap with null dev, exclusive. */
907 rc = llc_ui_autobind(sock, addr);
908 if (rc)
909 goto release;
910 }
774ccb4f 911 hdrlen = llc->dev->hard_header_len + llc_ui_header_len(sk, addr);
1da177e4 912 size = hdrlen + len;
774ccb4f
ACM
913 if (size > llc->dev->mtu)
914 size = llc->dev->mtu;
1da177e4
LT
915 copied = size - hdrlen;
916 release_sock(sk);
917 skb = sock_alloc_send_skb(sk, size, noblock, &rc);
918 lock_sock(sk);
919 if (!skb)
920 goto release;
774ccb4f 921 skb->dev = llc->dev;
1da177e4 922 skb->protocol = llc_proto_type(addr->sllc_arphrd);
d57b1869 923 skb_reserve(skb, hdrlen);
1da177e4
LT
924 rc = memcpy_fromiovec(skb_put(skb, copied), msg->msg_iov, copied);
925 if (rc)
926 goto out;
927 if (sk->sk_type == SOCK_DGRAM || addr->sllc_ua) {
928 llc_build_and_send_ui_pkt(llc->sap, skb, addr->sllc_mac,
929 addr->sllc_sap);
930 goto out;
931 }
932 if (addr->sllc_test) {
933 llc_build_and_send_test_pkt(llc->sap, skb, addr->sllc_mac,
934 addr->sllc_sap);
935 goto out;
936 }
937 if (addr->sllc_xid) {
938 llc_build_and_send_xid_pkt(llc->sap, skb, addr->sllc_mac,
939 addr->sllc_sap);
940 goto out;
941 }
942 rc = -ENOPROTOOPT;
943 if (!(sk->sk_type == SOCK_STREAM && !addr->sllc_ua))
944 goto out;
945 rc = llc_ui_send_data(sk, skb, noblock);
1da177e4 946out:
249ff1c6 947 if (rc) {
1da177e4
LT
948 kfree_skb(skb);
949release:
1da177e4 950 dprintk("%s: failed sending from %02X to %02X: %d\n",
0dc47877 951 __func__, llc->laddr.lsap, llc->daddr.lsap, rc);
249ff1c6 952 }
1da177e4
LT
953 release_sock(sk);
954 return rc ? : copied;
955}
956
957/**
958 * llc_ui_getname - return the address info of a socket
959 * @sock: Socket to get address of.
960 * @uaddr: Address structure to return information.
961 * @uaddrlen: Length of address structure.
962 * @peer: Does user want local or remote address information.
963 *
964 * Return the address information of a socket.
965 */
966static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
967 int *uaddrlen, int peer)
968{
969 struct sockaddr_llc sllc;
970 struct sock *sk = sock->sk;
971 struct llc_sock *llc = llc_sk(sk);
3592aaeb 972 int rc = -EBADF;
1da177e4 973
28e9fc59 974 memset(&sllc, 0, sizeof(sllc));
1da177e4
LT
975 lock_sock(sk);
976 if (sock_flag(sk, SOCK_ZAPPED))
977 goto out;
978 *uaddrlen = sizeof(sllc);
1da177e4
LT
979 if (peer) {
980 rc = -ENOTCONN;
981 if (sk->sk_state != TCP_ESTABLISHED)
982 goto out;
983 if(llc->dev)
984 sllc.sllc_arphrd = llc->dev->type;
985 sllc.sllc_sap = llc->daddr.lsap;
986 memcpy(&sllc.sllc_mac, &llc->daddr.mac, IFHWADDRLEN);
987 } else {
988 rc = -EINVAL;
989 if (!llc->sap)
990 goto out;
991 sllc.sllc_sap = llc->sap->laddr.lsap;
992
993 if (llc->dev) {
994 sllc.sllc_arphrd = llc->dev->type;
a186d2ae 995 memcpy(&sllc.sllc_mac, llc->dev->dev_addr,
1da177e4
LT
996 IFHWADDRLEN);
997 }
998 }
999 rc = 0;
1000 sllc.sllc_family = AF_LLC;
1001 memcpy(uaddr, &sllc, sizeof(sllc));
1002out:
1003 release_sock(sk);
1004 return rc;
1005}
1006
1007/**
1008 * llc_ui_ioctl - io controls for PF_LLC
1009 * @sock: Socket to get/set info
1010 * @cmd: command
1011 * @arg: optional argument for cmd
1012 *
1013 * get/set info on llc sockets
1014 */
1015static int llc_ui_ioctl(struct socket *sock, unsigned int cmd,
1016 unsigned long arg)
1017{
b5e5fa5e 1018 return -ENOIOCTLCMD;
1da177e4
LT
1019}
1020
1021/**
1022 * llc_ui_setsockopt - set various connection specific parameters.
1023 * @sock: Socket to set options on.
1024 * @level: Socket level user is requesting operations on.
1025 * @optname: Operation name.
2c53040f 1026 * @optval: User provided operation data.
1da177e4
LT
1027 * @optlen: Length of optval.
1028 *
1029 * Set various connection specific parameters.
1030 */
1031static int llc_ui_setsockopt(struct socket *sock, int level, int optname,
b7058842 1032 char __user *optval, unsigned int optlen)
1da177e4
LT
1033{
1034 struct sock *sk = sock->sk;
1035 struct llc_sock *llc = llc_sk(sk);
339db11b
DC
1036 unsigned int opt;
1037 int rc = -EINVAL;
1da177e4
LT
1038
1039 lock_sock(sk);
af426d32 1040 if (unlikely(level != SOL_LLC || optlen != sizeof(int)))
1da177e4
LT
1041 goto out;
1042 rc = get_user(opt, (int __user *)optval);
1043 if (rc)
1044 goto out;
1045 rc = -EINVAL;
1046 switch (optname) {
1047 case LLC_OPT_RETRY:
1048 if (opt > LLC_OPT_MAX_RETRY)
1049 goto out;
1050 llc->n2 = opt;
1051 break;
1052 case LLC_OPT_SIZE:
1053 if (opt > LLC_OPT_MAX_SIZE)
1054 goto out;
1055 llc->n1 = opt;
1056 break;
1057 case LLC_OPT_ACK_TMR_EXP:
1058 if (opt > LLC_OPT_MAX_ACK_TMR_EXP)
1059 goto out;
590232a7 1060 llc->ack_timer.expire = opt * HZ;
1da177e4
LT
1061 break;
1062 case LLC_OPT_P_TMR_EXP:
1063 if (opt > LLC_OPT_MAX_P_TMR_EXP)
1064 goto out;
590232a7 1065 llc->pf_cycle_timer.expire = opt * HZ;
1da177e4
LT
1066 break;
1067 case LLC_OPT_REJ_TMR_EXP:
1068 if (opt > LLC_OPT_MAX_REJ_TMR_EXP)
1069 goto out;
590232a7 1070 llc->rej_sent_timer.expire = opt * HZ;
1da177e4
LT
1071 break;
1072 case LLC_OPT_BUSY_TMR_EXP:
1073 if (opt > LLC_OPT_MAX_BUSY_TMR_EXP)
1074 goto out;
590232a7 1075 llc->busy_state_timer.expire = opt * HZ;
1da177e4
LT
1076 break;
1077 case LLC_OPT_TX_WIN:
1078 if (opt > LLC_OPT_MAX_WIN)
1079 goto out;
1080 llc->k = opt;
1081 break;
1082 case LLC_OPT_RX_WIN:
1083 if (opt > LLC_OPT_MAX_WIN)
1084 goto out;
1085 llc->rw = opt;
1086 break;
e5cd6fe3
OP
1087 case LLC_OPT_PKTINFO:
1088 if (opt)
1089 llc->cmsg_flags |= LLC_CMSG_PKTINFO;
1090 else
1091 llc->cmsg_flags &= ~LLC_CMSG_PKTINFO;
1092 break;
1da177e4
LT
1093 default:
1094 rc = -ENOPROTOOPT;
1095 goto out;
1096 }
1097 rc = 0;
1098out:
1099 release_sock(sk);
1100 return rc;
1101}
1102
1103/**
1104 * llc_ui_getsockopt - get connection specific socket info
1105 * @sock: Socket to get information from.
1106 * @level: Socket level user is requesting operations on.
1107 * @optname: Operation name.
1108 * @optval: Variable to return operation data in.
1109 * @optlen: Length of optval.
1110 *
1111 * Get connection specific socket information.
1112 */
1113static int llc_ui_getsockopt(struct socket *sock, int level, int optname,
1114 char __user *optval, int __user *optlen)
1115{
1116 struct sock *sk = sock->sk;
1117 struct llc_sock *llc = llc_sk(sk);
1118 int val = 0, len = 0, rc = -EINVAL;
1119
1120 lock_sock(sk);
af426d32 1121 if (unlikely(level != SOL_LLC))
1da177e4
LT
1122 goto out;
1123 rc = get_user(len, optlen);
1124 if (rc)
1125 goto out;
1126 rc = -EINVAL;
1127 if (len != sizeof(int))
1128 goto out;
1129 switch (optname) {
1130 case LLC_OPT_RETRY:
590232a7 1131 val = llc->n2; break;
1da177e4 1132 case LLC_OPT_SIZE:
590232a7 1133 val = llc->n1; break;
1da177e4 1134 case LLC_OPT_ACK_TMR_EXP:
590232a7 1135 val = llc->ack_timer.expire / HZ; break;
1da177e4 1136 case LLC_OPT_P_TMR_EXP:
590232a7 1137 val = llc->pf_cycle_timer.expire / HZ; break;
1da177e4 1138 case LLC_OPT_REJ_TMR_EXP:
590232a7 1139 val = llc->rej_sent_timer.expire / HZ; break;
1da177e4 1140 case LLC_OPT_BUSY_TMR_EXP:
590232a7 1141 val = llc->busy_state_timer.expire / HZ; break;
1da177e4
LT
1142 case LLC_OPT_TX_WIN:
1143 val = llc->k; break;
1144 case LLC_OPT_RX_WIN:
1145 val = llc->rw; break;
e5cd6fe3
OP
1146 case LLC_OPT_PKTINFO:
1147 val = (llc->cmsg_flags & LLC_CMSG_PKTINFO) != 0;
1148 break;
1da177e4
LT
1149 default:
1150 rc = -ENOPROTOOPT;
1151 goto out;
1152 }
1153 rc = 0;
1154 if (put_user(len, optlen) || copy_to_user(optval, &val, len))
1155 rc = -EFAULT;
1156out:
1157 release_sock(sk);
1158 return rc;
1159}
1160
ec1b4cf7 1161static const struct net_proto_family llc_ui_family_ops = {
1da177e4
LT
1162 .family = PF_LLC,
1163 .create = llc_ui_create,
1164 .owner = THIS_MODULE,
1165};
1166
90ddc4f0 1167static const struct proto_ops llc_ui_ops = {
1da177e4
LT
1168 .family = PF_LLC,
1169 .owner = THIS_MODULE,
1170 .release = llc_ui_release,
1171 .bind = llc_ui_bind,
1172 .connect = llc_ui_connect,
1173 .socketpair = sock_no_socketpair,
1174 .accept = llc_ui_accept,
1175 .getname = llc_ui_getname,
1176 .poll = datagram_poll,
1177 .ioctl = llc_ui_ioctl,
1178 .listen = llc_ui_listen,
1179 .shutdown = llc_ui_shutdown,
1180 .setsockopt = llc_ui_setsockopt,
1181 .getsockopt = llc_ui_getsockopt,
1182 .sendmsg = llc_ui_sendmsg,
1183 .recvmsg = llc_ui_recvmsg,
1184 .mmap = sock_no_mmap,
1185 .sendpage = sock_no_sendpage,
1186};
1187
01af4a0e 1188static const char llc_proc_err_msg[] __initconst =
d57b1869 1189 KERN_CRIT "LLC: Unable to register the proc_fs entries\n";
01af4a0e 1190static const char llc_sysctl_err_msg[] __initconst =
d57b1869 1191 KERN_CRIT "LLC: Unable to register the sysctl entries\n";
01af4a0e 1192static const char llc_sock_err_msg[] __initconst =
d57b1869 1193 KERN_CRIT "LLC: Unable to register the network family\n";
590232a7 1194
1da177e4
LT
1195static int __init llc2_init(void)
1196{
1197 int rc = proto_register(&llc_proto, 0);
1198
1199 if (rc != 0)
1200 goto out;
1201
1202 llc_build_offset_table();
1203 llc_station_init();
1204 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
1205 rc = llc_proc_init();
590232a7
ACM
1206 if (rc != 0) {
1207 printk(llc_proc_err_msg);
f4f8720f 1208 goto out_station;
590232a7
ACM
1209 }
1210 rc = llc_sysctl_init();
1211 if (rc) {
1212 printk(llc_sysctl_err_msg);
1213 goto out_proc;
1214 }
1215 rc = sock_register(&llc_ui_family_ops);
1216 if (rc) {
1217 printk(llc_sock_err_msg);
1218 goto out_sysctl;
1219 }
1da177e4
LT
1220 llc_add_pack(LLC_DEST_SAP, llc_sap_handler);
1221 llc_add_pack(LLC_DEST_CONN, llc_conn_handler);
1222out:
1223 return rc;
590232a7
ACM
1224out_sysctl:
1225 llc_sysctl_exit();
1226out_proc:
1227 llc_proc_exit();
f4f8720f
BH
1228out_station:
1229 llc_station_exit();
1da177e4
LT
1230 proto_unregister(&llc_proto);
1231 goto out;
1232}
1233
1234static void __exit llc2_exit(void)
1235{
1236 llc_station_exit();
1237 llc_remove_pack(LLC_DEST_SAP);
1238 llc_remove_pack(LLC_DEST_CONN);
1239 sock_unregister(PF_LLC);
1240 llc_proc_exit();
590232a7 1241 llc_sysctl_exit();
1da177e4
LT
1242 proto_unregister(&llc_proto);
1243}
1244
1245module_init(llc2_init);
1246module_exit(llc2_exit);
1247
1248MODULE_LICENSE("GPL");
1249MODULE_AUTHOR("Procom 1997, Jay Schullist 2001, Arnaldo C. Melo 2001-2003");
1250MODULE_DESCRIPTION("IEEE 802.2 PF_LLC support");
1251MODULE_ALIAS_NETPROTO(PF_LLC);