stmmac: fix phy naming inconsistency
[deliverable/linux.git] / net / llc / af_llc.c
CommitLineData
1da177e4
LT
1/*
2 * af_llc.c - LLC User Interface SAPs
3 * Description:
4 * Functions in this module are implementation of socket based llc
5 * communications for the Linux operating system. Support of llc class
6 * one and class two is provided via SOCK_DGRAM and SOCK_STREAM
7 * respectively.
8 *
9 * An llc2 connection is (mac + sap), only one llc2 sap connection
10 * is allowed per mac. Though one sap may have multiple mac + sap
11 * connections.
12 *
13 * Copyright (c) 2001 by Jay Schulist <jschlst@samba.org>
14 * 2002-2003 by Arnaldo Carvalho de Melo <acme@conectiva.com.br>
15 *
16 * This program can be redistributed or modified under the terms of the
17 * GNU General Public License as published by the Free Software Foundation.
18 * This program is distributed without any warranty or implied warranty
19 * of merchantability or fitness for a particular purpose.
20 *
21 * See the GNU General Public License for more details.
22 */
6e2144b7 23#include <linux/compiler.h>
1da177e4
LT
24#include <linux/kernel.h>
25#include <linux/module.h>
1da177e4
LT
26#include <linux/rtnetlink.h>
27#include <linux/init.h>
5a0e3ad6 28#include <linux/slab.h>
1da177e4
LT
29#include <net/llc.h>
30#include <net/llc_sap.h>
31#include <net/llc_pdu.h>
32#include <net/llc_conn.h>
c752f073 33#include <net/tcp_states.h>
1da177e4
LT
34
35/* remember: uninitialized global data is zeroed because its in .bss */
36static u16 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
37static u16 llc_ui_sap_link_no_max[256];
38static struct sockaddr_llc llc_ui_addrnull;
90ddc4f0 39static const struct proto_ops llc_ui_ops;
1da177e4 40
54fb7f25
ACM
41static int llc_ui_wait_for_conn(struct sock *sk, long timeout);
42static int llc_ui_wait_for_disc(struct sock *sk, long timeout);
54fb7f25 43static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout);
1da177e4
LT
44
45#if 0
46#define dprintk(args...) printk(KERN_DEBUG args)
47#else
48#define dprintk(args...)
49#endif
50
e5cd6fe3
OP
51/* Maybe we'll add some more in the future. */
52#define LLC_CMSG_PKTINFO 1
53
54
1da177e4
LT
55/**
56 * llc_ui_next_link_no - return the next unused link number for a sap
57 * @sap: Address of sap to get link number from.
58 *
59 * Return the next unused link number for a given sap.
60 */
2342c990 61static inline u16 llc_ui_next_link_no(int sap)
1da177e4
LT
62{
63 return llc_ui_sap_link_no_max[sap]++;
64}
65
66/**
67 * llc_proto_type - return eth protocol for ARP header type
68 * @arphrd: ARP header type.
69 *
70 * Given an ARP header type return the corresponding ethernet protocol.
71 */
3fbd418a 72static inline __be16 llc_proto_type(u16 arphrd)
1da177e4
LT
73{
74 return arphrd == ARPHRD_IEEE802_TR ?
d57b1869 75 htons(ETH_P_TR_802_2) : htons(ETH_P_802_2);
1da177e4
LT
76}
77
78/**
79 * llc_ui_addr_null - determines if a address structure is null
80 * @addr: Address to test if null.
81 */
2342c990 82static inline u8 llc_ui_addr_null(struct sockaddr_llc *addr)
1da177e4
LT
83{
84 return !memcmp(addr, &llc_ui_addrnull, sizeof(*addr));
85}
86
87/**
88 * llc_ui_header_len - return length of llc header based on operation
89 * @sk: Socket which contains a valid llc socket type.
90 * @addr: Complete sockaddr_llc structure received from the user.
91 *
92 * Provide the length of the llc header depending on what kind of
93 * operation the user would like to perform and the type of socket.
94 * Returns the correct llc header length.
95 */
2342c990 96static inline u8 llc_ui_header_len(struct sock *sk, struct sockaddr_llc *addr)
1da177e4
LT
97{
98 u8 rc = LLC_PDU_LEN_U;
99
100 if (addr->sllc_test || addr->sllc_xid)
101 rc = LLC_PDU_LEN_U;
102 else if (sk->sk_type == SOCK_STREAM)
103 rc = LLC_PDU_LEN_I;
104 return rc;
105}
106
107/**
108 * llc_ui_send_data - send data via reliable llc2 connection
109 * @sk: Connection the socket is using.
110 * @skb: Data the user wishes to send.
1da177e4
LT
111 * @noblock: can we block waiting for data?
112 *
113 * Send data via reliable llc2 connection.
114 * Returns 0 upon success, non-zero if action did not succeed.
115 */
116static int llc_ui_send_data(struct sock* sk, struct sk_buff *skb, int noblock)
117{
118 struct llc_sock* llc = llc_sk(sk);
119 int rc = 0;
120
d57b1869 121 if (unlikely(llc_data_accept_state(llc->state) ||
451677c4
JF
122 llc->remote_busy_flag ||
123 llc->p_flag)) {
54fb7f25 124 long timeout = sock_sndtimeo(sk, noblock);
1da177e4
LT
125
126 rc = llc_ui_wait_for_busy_core(sk, timeout);
127 }
249ff1c6 128 if (unlikely(!rc))
1da177e4
LT
129 rc = llc_build_and_send_pkt(sk, skb);
130 return rc;
131}
132
133static void llc_ui_sk_init(struct socket *sock, struct sock *sk)
134{
ee5850de 135 sock_graft(sk, sock);
1da177e4 136 sk->sk_type = sock->type;
1da177e4
LT
137 sock->ops = &llc_ui_ops;
138}
139
140static struct proto llc_proto = {
9c005e01 141 .name = "LLC",
1da177e4
LT
142 .owner = THIS_MODULE,
143 .obj_size = sizeof(struct llc_sock),
b76f5a84 144 .slab_flags = SLAB_DESTROY_BY_RCU,
1da177e4
LT
145};
146
147/**
148 * llc_ui_create - alloc and init a new llc_ui socket
3f378b68 149 * @net: network namespace (must be default network)
1da177e4
LT
150 * @sock: Socket to initialize and attach allocated sk to.
151 * @protocol: Unused.
3f378b68 152 * @kern: on behalf of kernel or userspace
1da177e4
LT
153 *
154 * Allocate and initialize a new llc_ui socket, validate the user wants a
155 * socket type we have available.
156 * Returns 0 upon success, negative upon failure.
157 */
3f378b68
EP
158static int llc_ui_create(struct net *net, struct socket *sock, int protocol,
159 int kern)
1da177e4
LT
160{
161 struct sock *sk;
162 int rc = -ESOCKTNOSUPPORT;
163
3480c63b
PM
164 if (!capable(CAP_NET_RAW))
165 return -EPERM;
166
09ad9bc7 167 if (!net_eq(net, &init_net))
1b8d7ae4
EB
168 return -EAFNOSUPPORT;
169
af426d32 170 if (likely(sock->type == SOCK_DGRAM || sock->type == SOCK_STREAM)) {
1da177e4 171 rc = -ENOMEM;
1b8d7ae4 172 sk = llc_sk_alloc(net, PF_LLC, GFP_KERNEL, &llc_proto);
1da177e4
LT
173 if (sk) {
174 rc = 0;
175 llc_ui_sk_init(sock, sk);
176 }
177 }
178 return rc;
179}
180
181/**
182 * llc_ui_release - shutdown socket
183 * @sock: Socket to release.
184 *
185 * Shutdown and deallocate an existing socket.
186 */
187static int llc_ui_release(struct socket *sock)
188{
189 struct sock *sk = sock->sk;
190 struct llc_sock *llc;
191
af426d32 192 if (unlikely(sk == NULL))
1da177e4
LT
193 goto out;
194 sock_hold(sk);
195 lock_sock(sk);
196 llc = llc_sk(sk);
0dc47877 197 dprintk("%s: closing local(%02X) remote(%02X)\n", __func__,
1da177e4
LT
198 llc->laddr.lsap, llc->daddr.lsap);
199 if (!llc_send_disc(sk))
200 llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
3100aa9d 201 if (!sock_flag(sk, SOCK_ZAPPED))
1da177e4
LT
202 llc_sap_remove_socket(llc->sap, sk);
203 release_sock(sk);
1da177e4
LT
204 if (llc->dev)
205 dev_put(llc->dev);
206 sock_put(sk);
207 llc_sk_free(sk);
208out:
209 return 0;
210}
211
212/**
213 * llc_ui_autoport - provide dynamically allocate SAP number
214 *
215 * Provide the caller with a dynamically allocated SAP number according
216 * to the rules that are set in this function. Returns: 0, upon failure,
217 * SAP number otherwise.
218 */
219static int llc_ui_autoport(void)
220{
221 struct llc_sap *sap;
222 int i, tries = 0;
223
224 while (tries < LLC_SAP_DYN_TRIES) {
225 for (i = llc_ui_sap_last_autoport;
226 i < LLC_SAP_DYN_STOP; i += 2) {
227 sap = llc_sap_find(i);
228 if (!sap) {
229 llc_ui_sap_last_autoport = i + 2;
230 goto out;
231 }
6e2144b7 232 llc_sap_put(sap);
1da177e4
LT
233 }
234 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
235 tries++;
236 }
237 i = 0;
238out:
239 return i;
240}
241
242/**
5a770c02
ACM
243 * llc_ui_autobind - automatically bind a socket to a sap
244 * @sock: socket to bind
245 * @addr: address to connect to
246 *
247 * Used by llc_ui_connect and llc_ui_sendmsg when the user hasn't
248 * specifically used llc_ui_bind to bind to an specific address/sap
1da177e4 249 *
1da177e4
LT
250 * Returns: 0 upon success, negative otherwise.
251 */
252static int llc_ui_autobind(struct socket *sock, struct sockaddr_llc *addr)
253{
254 struct sock *sk = sock->sk;
255 struct llc_sock *llc = llc_sk(sk);
256 struct llc_sap *sap;
257 int rc = -EINVAL;
258
259 if (!sock_flag(sk, SOCK_ZAPPED))
260 goto out;
261 rc = -ENODEV;
abf9d537
OP
262 if (sk->sk_bound_dev_if) {
263 llc->dev = dev_get_by_index(&init_net, sk->sk_bound_dev_if);
264 if (llc->dev && addr->sllc_arphrd != llc->dev->type) {
265 dev_put(llc->dev);
266 llc->dev = NULL;
267 }
268 } else
269 llc->dev = dev_getfirstbyhwtype(&init_net, addr->sllc_arphrd);
1da177e4
LT
270 if (!llc->dev)
271 goto out;
272 rc = -EUSERS;
273 llc->laddr.lsap = llc_ui_autoport();
274 if (!llc->laddr.lsap)
275 goto out;
276 rc = -EBUSY; /* some other network layer is using the sap */
277 sap = llc_sap_open(llc->laddr.lsap, NULL);
278 if (!sap)
279 goto out;
280 memcpy(llc->laddr.mac, llc->dev->dev_addr, IFHWADDRLEN);
281 memcpy(&llc->addr, addr, sizeof(llc->addr));
282 /* assign new connection to its SAP */
283 llc_sap_add_socket(sap, sk);
284 sock_reset_flag(sk, SOCK_ZAPPED);
285 rc = 0;
286out:
287 return rc;
288}
289
290/**
291 * llc_ui_bind - bind a socket to a specific address.
292 * @sock: Socket to bind an address to.
293 * @uaddr: Address the user wants the socket bound to.
294 * @addrlen: Length of the uaddr structure.
295 *
296 * Bind a socket to a specific address. For llc a user is able to bind to
5a770c02 297 * a specific sap only or mac + sap.
1da177e4
LT
298 * If the user desires to bind to a specific mac + sap, it is possible to
299 * have multiple sap connections via multiple macs.
300 * Bind and autobind for that matter must enforce the correct sap usage
301 * otherwise all hell will break loose.
302 * Returns: 0 upon success, negative otherwise.
303 */
304static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen)
305{
306 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
307 struct sock *sk = sock->sk;
308 struct llc_sock *llc = llc_sk(sk);
309 struct llc_sap *sap;
310 int rc = -EINVAL;
311
0dc47877 312 dprintk("%s: binding %02X\n", __func__, addr->sllc_sap);
af426d32 313 if (unlikely(!sock_flag(sk, SOCK_ZAPPED) || addrlen != sizeof(*addr)))
1da177e4
LT
314 goto out;
315 rc = -EAFNOSUPPORT;
af426d32 316 if (unlikely(addr->sllc_family != AF_LLC))
1da177e4 317 goto out;
cf309e3f 318 rc = -ENODEV;
941666c2 319 rcu_read_lock();
abf9d537 320 if (sk->sk_bound_dev_if) {
941666c2 321 llc->dev = dev_get_by_index_rcu(&init_net, sk->sk_bound_dev_if);
abf9d537
OP
322 if (llc->dev) {
323 if (!addr->sllc_arphrd)
324 addr->sllc_arphrd = llc->dev->type;
325 if (llc_mac_null(addr->sllc_mac))
326 memcpy(addr->sllc_mac, llc->dev->dev_addr,
327 IFHWADDRLEN);
328 if (addr->sllc_arphrd != llc->dev->type ||
329 !llc_mac_match(addr->sllc_mac,
330 llc->dev->dev_addr)) {
331 rc = -EINVAL;
abf9d537
OP
332 llc->dev = NULL;
333 }
334 }
335 } else
941666c2 336 llc->dev = dev_getbyhwaddr_rcu(&init_net, addr->sllc_arphrd,
abf9d537 337 addr->sllc_mac);
941666c2
ED
338 if (llc->dev)
339 dev_hold(llc->dev);
340 rcu_read_unlock();
cf309e3f
JF
341 if (!llc->dev)
342 goto out;
1da177e4
LT
343 if (!addr->sllc_sap) {
344 rc = -EUSERS;
345 addr->sllc_sap = llc_ui_autoport();
346 if (!addr->sllc_sap)
347 goto out;
348 }
349 sap = llc_sap_find(addr->sllc_sap);
350 if (!sap) {
351 sap = llc_sap_open(addr->sllc_sap, NULL);
352 rc = -EBUSY; /* some other network layer is using the sap */
353 if (!sap)
354 goto out;
355 } else {
356 struct llc_addr laddr, daddr;
357 struct sock *ask;
358
359 memset(&laddr, 0, sizeof(laddr));
360 memset(&daddr, 0, sizeof(daddr));
361 /*
59c51591 362 * FIXME: check if the address is multicast,
1da177e4
LT
363 * only SOCK_DGRAM can do this.
364 */
365 memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN);
366 laddr.lsap = addr->sllc_sap;
367 rc = -EADDRINUSE; /* mac + sap clash. */
368 ask = llc_lookup_established(sap, &daddr, &laddr);
369 if (ask) {
370 sock_put(ask);
6e2144b7 371 goto out_put;
1da177e4
LT
372 }
373 }
374 llc->laddr.lsap = addr->sllc_sap;
375 memcpy(llc->laddr.mac, addr->sllc_mac, IFHWADDRLEN);
376 memcpy(&llc->addr, addr, sizeof(llc->addr));
377 /* assign new connection to its SAP */
378 llc_sap_add_socket(sap, sk);
379 sock_reset_flag(sk, SOCK_ZAPPED);
380 rc = 0;
6e2144b7
ACM
381out_put:
382 llc_sap_put(sap);
1da177e4
LT
383out:
384 return rc;
385}
386
387/**
388 * llc_ui_shutdown - shutdown a connect llc2 socket.
389 * @sock: Socket to shutdown.
390 * @how: What part of the socket to shutdown.
391 *
392 * Shutdown a connected llc2 socket. Currently this function only supports
393 * shutting down both sends and receives (2), we could probably make this
394 * function such that a user can shutdown only half the connection but not
395 * right now.
396 * Returns: 0 upon success, negative otherwise.
397 */
398static int llc_ui_shutdown(struct socket *sock, int how)
399{
400 struct sock *sk = sock->sk;
401 int rc = -ENOTCONN;
402
403 lock_sock(sk);
af426d32 404 if (unlikely(sk->sk_state != TCP_ESTABLISHED))
1da177e4
LT
405 goto out;
406 rc = -EINVAL;
407 if (how != 2)
408 goto out;
409 rc = llc_send_disc(sk);
410 if (!rc)
411 rc = llc_ui_wait_for_disc(sk, sk->sk_rcvtimeo);
412 /* Wake up anyone sleeping in poll */
413 sk->sk_state_change(sk);
414out:
415 release_sock(sk);
416 return rc;
417}
418
419/**
420 * llc_ui_connect - Connect to a remote llc2 mac + sap.
421 * @sock: Socket which will be connected to the remote destination.
422 * @uaddr: Remote and possibly the local address of the new connection.
423 * @addrlen: Size of uaddr structure.
424 * @flags: Operational flags specified by the user.
425 *
426 * Connect to a remote llc2 mac + sap. The caller must specify the
427 * destination mac and address to connect to. If the user hasn't previously
428 * called bind(2) with a smac the address of the first interface of the
429 * specified arp type will be used.
430 * This function will autobind if user did not previously call bind.
431 * Returns: 0 upon success, negative otherwise.
432 */
433static int llc_ui_connect(struct socket *sock, struct sockaddr *uaddr,
434 int addrlen, int flags)
435{
436 struct sock *sk = sock->sk;
437 struct llc_sock *llc = llc_sk(sk);
438 struct sockaddr_llc *addr = (struct sockaddr_llc *)uaddr;
1da177e4
LT
439 int rc = -EINVAL;
440
441 lock_sock(sk);
af426d32 442 if (unlikely(addrlen != sizeof(*addr)))
1da177e4
LT
443 goto out;
444 rc = -EAFNOSUPPORT;
af426d32
ACM
445 if (unlikely(addr->sllc_family != AF_LLC))
446 goto out;
447 if (unlikely(sk->sk_type != SOCK_STREAM))
448 goto out;
449 rc = -EALREADY;
450 if (unlikely(sock->state == SS_CONNECTING))
1da177e4
LT
451 goto out;
452 /* bind connection to sap if user hasn't done it. */
453 if (sock_flag(sk, SOCK_ZAPPED)) {
454 /* bind to sap with null dev, exclusive */
455 rc = llc_ui_autobind(sock, addr);
456 if (rc)
457 goto out;
1da177e4 458 }
5564af21
JF
459 llc->daddr.lsap = addr->sllc_sap;
460 memcpy(llc->daddr.mac, addr->sllc_mac, IFHWADDRLEN);
1da177e4
LT
461 sock->state = SS_CONNECTING;
462 sk->sk_state = TCP_SYN_SENT;
463 llc->link = llc_ui_next_link_no(llc->sap->laddr.lsap);
774ccb4f 464 rc = llc_establish_connection(sk, llc->dev->dev_addr,
1da177e4
LT
465 addr->sllc_mac, addr->sllc_sap);
466 if (rc) {
0dc47877 467 dprintk("%s: llc_ui_send_conn failed :-(\n", __func__);
1da177e4
LT
468 sock->state = SS_UNCONNECTED;
469 sk->sk_state = TCP_CLOSE;
470 goto out;
471 }
b35bd110
ACM
472
473 if (sk->sk_state == TCP_SYN_SENT) {
54fb7f25 474 const long timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
b35bd110
ACM
475
476 if (!timeo || !llc_ui_wait_for_conn(sk, timeo))
477 goto out;
478
479 rc = sock_intr_errno(timeo);
480 if (signal_pending(current))
481 goto out;
482 }
483
484 if (sk->sk_state == TCP_CLOSE)
485 goto sock_error;
486
487 sock->state = SS_CONNECTED;
488 rc = 0;
1da177e4
LT
489out:
490 release_sock(sk);
491 return rc;
b35bd110
ACM
492sock_error:
493 rc = sock_error(sk) ? : -ECONNABORTED;
494 sock->state = SS_UNCONNECTED;
495 goto out;
1da177e4
LT
496}
497
498/**
499 * llc_ui_listen - allow a normal socket to accept incoming connections
500 * @sock: Socket to allow incoming connections on.
501 * @backlog: Number of connections to queue.
502 *
503 * Allow a normal socket to accept incoming connections.
504 * Returns 0 upon success, negative otherwise.
505 */
506static int llc_ui_listen(struct socket *sock, int backlog)
507{
508 struct sock *sk = sock->sk;
509 int rc = -EINVAL;
510
511 lock_sock(sk);
af426d32 512 if (unlikely(sock->state != SS_UNCONNECTED))
1da177e4
LT
513 goto out;
514 rc = -EOPNOTSUPP;
af426d32 515 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
516 goto out;
517 rc = -EAGAIN;
518 if (sock_flag(sk, SOCK_ZAPPED))
519 goto out;
520 rc = 0;
521 if (!(unsigned)backlog) /* BSDism */
522 backlog = 1;
523 sk->sk_max_ack_backlog = backlog;
524 if (sk->sk_state != TCP_LISTEN) {
525 sk->sk_ack_backlog = 0;
526 sk->sk_state = TCP_LISTEN;
527 }
528 sk->sk_socket->flags |= __SO_ACCEPTCON;
529out:
530 release_sock(sk);
531 return rc;
532}
533
54fb7f25 534static int llc_ui_wait_for_disc(struct sock *sk, long timeout)
1da177e4 535{
b35bd110
ACM
536 DEFINE_WAIT(wait);
537 int rc = 0;
1da177e4 538
54fb7f25 539 while (1) {
aa395145 540 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
54fb7f25
ACM
541 if (sk_wait_event(sk, &timeout, sk->sk_state == TCP_CLOSE))
542 break;
1da177e4
LT
543 rc = -ERESTARTSYS;
544 if (signal_pending(current))
545 break;
546 rc = -EAGAIN;
547 if (!timeout)
548 break;
b35bd110 549 rc = 0;
1da177e4 550 }
aa395145 551 finish_wait(sk_sleep(sk), &wait);
1da177e4
LT
552 return rc;
553}
554
54fb7f25 555static int llc_ui_wait_for_conn(struct sock *sk, long timeout)
1da177e4 556{
b35bd110 557 DEFINE_WAIT(wait);
1da177e4 558
54fb7f25 559 while (1) {
aa395145 560 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
54fb7f25
ACM
561 if (sk_wait_event(sk, &timeout, sk->sk_state != TCP_SYN_SENT))
562 break;
b35bd110 563 if (signal_pending(current) || !timeout)
1da177e4
LT
564 break;
565 }
aa395145 566 finish_wait(sk_sleep(sk), &wait);
b35bd110 567 return timeout;
1da177e4
LT
568}
569
afdbe357 570static int llc_ui_wait_for_busy_core(struct sock *sk, long timeout)
1da177e4 571{
b35bd110 572 DEFINE_WAIT(wait);
afdbe357
ACM
573 struct llc_sock *llc = llc_sk(sk);
574 int rc;
1da177e4 575
54fb7f25 576 while (1) {
aa395145 577 prepare_to_wait(sk_sleep(sk), &wait, TASK_INTERRUPTIBLE);
afdbe357 578 rc = 0;
54fb7f25
ACM
579 if (sk_wait_event(sk, &timeout,
580 (sk->sk_shutdown & RCV_SHUTDOWN) ||
afdbe357 581 (!llc_data_accept_state(llc->state) &&
451677c4 582 !llc->remote_busy_flag &&
afdbe357 583 !llc->p_flag)))
1da177e4 584 break;
1da177e4
LT
585 rc = -ERESTARTSYS;
586 if (signal_pending(current))
587 break;
588 rc = -EAGAIN;
589 if (!timeout)
590 break;
591 }
aa395145 592 finish_wait(sk_sleep(sk), &wait);
1da177e4
LT
593 return rc;
594}
595
2928c19e 596static int llc_wait_data(struct sock *sk, long timeo)
1da177e4 597{
1da177e4
LT
598 int rc;
599
54fb7f25 600 while (1) {
afdbe357
ACM
601 /*
602 * POSIX 1003.1g mandates this order.
603 */
c1cbe4b7
BL
604 rc = sock_error(sk);
605 if (rc)
afdbe357 606 break;
1da177e4 607 rc = 0;
afdbe357 608 if (sk->sk_shutdown & RCV_SHUTDOWN)
1da177e4 609 break;
afdbe357
ACM
610 rc = -EAGAIN;
611 if (!timeo)
612 break;
613 rc = sock_intr_errno(timeo);
1da177e4
LT
614 if (signal_pending(current))
615 break;
afdbe357
ACM
616 rc = 0;
617 if (sk_wait_data(sk, &timeo))
1da177e4
LT
618 break;
619 }
1da177e4
LT
620 return rc;
621}
622
e5cd6fe3
OP
623static void llc_cmsg_rcv(struct msghdr *msg, struct sk_buff *skb)
624{
625 struct llc_sock *llc = llc_sk(skb->sk);
626
627 if (llc->cmsg_flags & LLC_CMSG_PKTINFO) {
628 struct llc_pktinfo info;
629
630 info.lpi_ifindex = llc_sk(skb->sk)->dev->ifindex;
631 llc_pdu_decode_dsap(skb, &info.lpi_sap);
632 llc_pdu_decode_da(skb, info.lpi_mac);
633 put_cmsg(msg, SOL_LLC, LLC_OPT_PKTINFO, sizeof(info), &info);
634 }
635}
636
1da177e4
LT
637/**
638 * llc_ui_accept - accept a new incoming connection.
639 * @sock: Socket which connections arrive on.
640 * @newsock: Socket to move incoming connection to.
641 * @flags: User specified operational flags.
642 *
643 * Accept a new incoming connection.
644 * Returns 0 upon success, negative otherwise.
645 */
646static int llc_ui_accept(struct socket *sock, struct socket *newsock, int flags)
647{
648 struct sock *sk = sock->sk, *newsk;
649 struct llc_sock *llc, *newllc;
650 struct sk_buff *skb;
651 int rc = -EOPNOTSUPP;
652
0dc47877 653 dprintk("%s: accepting on %02X\n", __func__,
d57b1869 654 llc_sk(sk)->laddr.lsap);
1da177e4 655 lock_sock(sk);
af426d32 656 if (unlikely(sk->sk_type != SOCK_STREAM))
1da177e4
LT
657 goto out;
658 rc = -EINVAL;
af426d32
ACM
659 if (unlikely(sock->state != SS_UNCONNECTED ||
660 sk->sk_state != TCP_LISTEN))
1da177e4
LT
661 goto out;
662 /* wait for a connection to arrive. */
b35bd110 663 if (skb_queue_empty(&sk->sk_receive_queue)) {
afdbe357 664 rc = llc_wait_data(sk, sk->sk_rcvtimeo);
b35bd110
ACM
665 if (rc)
666 goto out;
667 }
0dc47877 668 dprintk("%s: got a new connection on %02X\n", __func__,
d57b1869 669 llc_sk(sk)->laddr.lsap);
1da177e4
LT
670 skb = skb_dequeue(&sk->sk_receive_queue);
671 rc = -EINVAL;
672 if (!skb->sk)
673 goto frees;
674 rc = 0;
675 newsk = skb->sk;
676 /* attach connection to a new socket. */
677 llc_ui_sk_init(newsock, newsk);
678 sock_reset_flag(newsk, SOCK_ZAPPED);
679 newsk->sk_state = TCP_ESTABLISHED;
680 newsock->state = SS_CONNECTED;
681 llc = llc_sk(sk);
682 newllc = llc_sk(newsk);
683 memcpy(&newllc->addr, &llc->addr, sizeof(newllc->addr));
684 newllc->link = llc_ui_next_link_no(newllc->laddr.lsap);
685
686 /* put original socket back into a clean listen state. */
687 sk->sk_state = TCP_LISTEN;
688 sk->sk_ack_backlog--;
0dc47877 689 dprintk("%s: ok success on %02X, client on %02X\n", __func__,
1da177e4
LT
690 llc_sk(sk)->addr.sllc_sap, newllc->daddr.lsap);
691frees:
692 kfree_skb(skb);
693out:
694 release_sock(sk);
695 return rc;
696}
697
698/**
699 * llc_ui_recvmsg - copy received data to the socket user.
700 * @sock: Socket to copy data from.
701 * @msg: Various user space related information.
8420e1b5 702 * @len: Size of user buffer.
1da177e4
LT
703 * @flags: User specified flags.
704 *
705 * Copy received data to the socket user.
706 * Returns non-negative upon success, negative otherwise.
707 */
708static int llc_ui_recvmsg(struct kiocb *iocb, struct socket *sock,
8420e1b5 709 struct msghdr *msg, size_t len, int flags)
1da177e4 710{
1da177e4 711 struct sockaddr_llc *uaddr = (struct sockaddr_llc *)msg->msg_name;
8420e1b5
ACM
712 const int nonblock = flags & MSG_DONTWAIT;
713 struct sk_buff *skb = NULL;
714 struct sock *sk = sock->sk;
715 struct llc_sock *llc = llc_sk(sk);
1da177e4 716 size_t copied = 0;
8420e1b5
ACM
717 u32 peek_seq = 0;
718 u32 *seq;
719 unsigned long used;
720 int target; /* Read at least this many bytes */
721 long timeo;
1da177e4 722
1da177e4 723 lock_sock(sk);
8420e1b5 724 copied = -ENOTCONN;
29efcd26 725 if (unlikely(sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN))
1da177e4 726 goto out;
8420e1b5
ACM
727
728 timeo = sock_rcvtimeo(sk, nonblock);
729
730 seq = &llc->copied_seq;
731 if (flags & MSG_PEEK) {
732 peek_seq = llc->copied_seq;
733 seq = &peek_seq;
d57b1869 734 }
8420e1b5
ACM
735
736 target = sock_rcvlowat(sk, flags & MSG_WAITALL, len);
737 copied = 0;
738
739 do {
740 u32 offset;
741
742 /*
743 * We need to check signals first, to get correct SIGURG
744 * handling. FIXME: Need to check this doesn't impact 1003.1g
745 * and move it down to the bottom of the loop
746 */
747 if (signal_pending(current)) {
748 if (copied)
749 break;
750 copied = timeo ? sock_intr_errno(timeo) : -EAGAIN;
751 break;
752 }
753
754 /* Next get a buffer. */
755
756 skb = skb_peek(&sk->sk_receive_queue);
757 if (skb) {
758 offset = *seq;
759 goto found_ok_skb;
760 }
761 /* Well, if we have backlog, try to process it now yet. */
762
763 if (copied >= target && !sk->sk_backlog.tail)
764 break;
765
766 if (copied) {
767 if (sk->sk_err ||
768 sk->sk_state == TCP_CLOSE ||
769 (sk->sk_shutdown & RCV_SHUTDOWN) ||
770 !timeo ||
771 (flags & MSG_PEEK))
772 break;
773 } else {
774 if (sock_flag(sk, SOCK_DONE))
775 break;
776
777 if (sk->sk_err) {
778 copied = sock_error(sk);
779 break;
780 }
781 if (sk->sk_shutdown & RCV_SHUTDOWN)
782 break;
783
29efcd26 784 if (sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_CLOSE) {
8420e1b5
ACM
785 if (!sock_flag(sk, SOCK_DONE)) {
786 /*
787 * This occurs when user tries to read
788 * from never connected socket.
789 */
790 copied = -ENOTCONN;
791 break;
792 }
793 break;
794 }
795 if (!timeo) {
796 copied = -EAGAIN;
797 break;
798 }
799 }
800
801 if (copied >= target) { /* Do not sleep, just process backlog. */
802 release_sock(sk);
803 lock_sock(sk);
804 } else
805 sk_wait_data(sk, &timeo);
806
807 if ((flags & MSG_PEEK) && peek_seq != llc->copied_seq) {
808 if (net_ratelimit())
809 printk(KERN_DEBUG "LLC(%s:%d): Application "
810 "bug, race in MSG_PEEK.\n",
ba25f9dc 811 current->comm, task_pid_nr(current));
8420e1b5
ACM
812 peek_seq = llc->copied_seq;
813 }
814 continue;
815 found_ok_skb:
816 /* Ok so how much can we use? */
817 used = skb->len - offset;
818 if (len < used)
819 used = len;
820
821 if (!(flags & MSG_TRUNC)) {
822 int rc = skb_copy_datagram_iovec(skb, offset,
823 msg->msg_iov, used);
824 if (rc) {
825 /* Exception. Bailout! */
826 if (!copied)
827 copied = -EFAULT;
828 break;
829 }
830 }
831
832 *seq += used;
833 copied += used;
834 len -= used;
835
9cef310f
AJ
836 /* For non stream protcols we get one packet per recvmsg call */
837 if (sk->sk_type != SOCK_STREAM)
838 goto copy_uaddr;
839
8420e1b5 840 if (!(flags & MSG_PEEK)) {
624d1164 841 sk_eat_skb(sk, skb, 0);
8420e1b5
ACM
842 *seq = 0;
843 }
30a584d9 844
30a584d9
SH
845 /* Partial read */
846 if (used + offset < skb->len)
847 continue;
8420e1b5
ACM
848 } while (len > 0);
849
1da177e4
LT
850out:
851 release_sock(sk);
8420e1b5
ACM
852 return copied;
853copy_uaddr:
854 if (uaddr != NULL && skb != NULL) {
855 memcpy(uaddr, llc_ui_skb_cb(skb), sizeof(*uaddr));
856 msg->msg_namelen = sizeof(*uaddr);
857 }
e5cd6fe3
OP
858 if (llc_sk(sk)->cmsg_flags)
859 llc_cmsg_rcv(msg, skb);
9cef310f
AJ
860
861 if (!(flags & MSG_PEEK)) {
862 sk_eat_skb(sk, skb, 0);
863 *seq = 0;
864 }
865
8420e1b5 866 goto out;
1da177e4
LT
867}
868
869/**
870 * llc_ui_sendmsg - Transmit data provided by the socket user.
871 * @sock: Socket to transmit data from.
872 * @msg: Various user related information.
873 * @len: Length of data to transmit.
874 *
875 * Transmit data provided by the socket user.
876 * Returns non-negative upon success, negative otherwise.
877 */
878static int llc_ui_sendmsg(struct kiocb *iocb, struct socket *sock,
879 struct msghdr *msg, size_t len)
880{
881 struct sock *sk = sock->sk;
882 struct llc_sock *llc = llc_sk(sk);
883 struct sockaddr_llc *addr = (struct sockaddr_llc *)msg->msg_name;
884 int flags = msg->msg_flags;
885 int noblock = flags & MSG_DONTWAIT;
1da177e4
LT
886 struct sk_buff *skb;
887 size_t size = 0;
888 int rc = -EINVAL, copied = 0, hdrlen;
889
0dc47877 890 dprintk("%s: sending from %02X to %02X\n", __func__,
1da177e4
LT
891 llc->laddr.lsap, llc->daddr.lsap);
892 lock_sock(sk);
893 if (addr) {
894 if (msg->msg_namelen < sizeof(*addr))
895 goto release;
896 } else {
897 if (llc_ui_addr_null(&llc->addr))
898 goto release;
899 addr = &llc->addr;
900 }
901 /* must bind connection to sap if user hasn't done it. */
902 if (sock_flag(sk, SOCK_ZAPPED)) {
903 /* bind to sap with null dev, exclusive. */
904 rc = llc_ui_autobind(sock, addr);
905 if (rc)
906 goto release;
907 }
774ccb4f 908 hdrlen = llc->dev->hard_header_len + llc_ui_header_len(sk, addr);
1da177e4 909 size = hdrlen + len;
774ccb4f
ACM
910 if (size > llc->dev->mtu)
911 size = llc->dev->mtu;
1da177e4
LT
912 copied = size - hdrlen;
913 release_sock(sk);
914 skb = sock_alloc_send_skb(sk, size, noblock, &rc);
915 lock_sock(sk);
916 if (!skb)
917 goto release;
774ccb4f 918 skb->dev = llc->dev;
1da177e4 919 skb->protocol = llc_proto_type(addr->sllc_arphrd);
d57b1869 920 skb_reserve(skb, hdrlen);
1da177e4
LT
921 rc = memcpy_fromiovec(skb_put(skb, copied), msg->msg_iov, copied);
922 if (rc)
923 goto out;
924 if (sk->sk_type == SOCK_DGRAM || addr->sllc_ua) {
925 llc_build_and_send_ui_pkt(llc->sap, skb, addr->sllc_mac,
926 addr->sllc_sap);
927 goto out;
928 }
929 if (addr->sllc_test) {
930 llc_build_and_send_test_pkt(llc->sap, skb, addr->sllc_mac,
931 addr->sllc_sap);
932 goto out;
933 }
934 if (addr->sllc_xid) {
935 llc_build_and_send_xid_pkt(llc->sap, skb, addr->sllc_mac,
936 addr->sllc_sap);
937 goto out;
938 }
939 rc = -ENOPROTOOPT;
940 if (!(sk->sk_type == SOCK_STREAM && !addr->sllc_ua))
941 goto out;
942 rc = llc_ui_send_data(sk, skb, noblock);
1da177e4 943out:
249ff1c6 944 if (rc) {
1da177e4
LT
945 kfree_skb(skb);
946release:
1da177e4 947 dprintk("%s: failed sending from %02X to %02X: %d\n",
0dc47877 948 __func__, llc->laddr.lsap, llc->daddr.lsap, rc);
249ff1c6 949 }
1da177e4
LT
950 release_sock(sk);
951 return rc ? : copied;
952}
953
954/**
955 * llc_ui_getname - return the address info of a socket
956 * @sock: Socket to get address of.
957 * @uaddr: Address structure to return information.
958 * @uaddrlen: Length of address structure.
959 * @peer: Does user want local or remote address information.
960 *
961 * Return the address information of a socket.
962 */
963static int llc_ui_getname(struct socket *sock, struct sockaddr *uaddr,
964 int *uaddrlen, int peer)
965{
966 struct sockaddr_llc sllc;
967 struct sock *sk = sock->sk;
968 struct llc_sock *llc = llc_sk(sk);
969 int rc = 0;
970
28e9fc59 971 memset(&sllc, 0, sizeof(sllc));
1da177e4
LT
972 lock_sock(sk);
973 if (sock_flag(sk, SOCK_ZAPPED))
974 goto out;
975 *uaddrlen = sizeof(sllc);
976 memset(uaddr, 0, *uaddrlen);
977 if (peer) {
978 rc = -ENOTCONN;
979 if (sk->sk_state != TCP_ESTABLISHED)
980 goto out;
981 if(llc->dev)
982 sllc.sllc_arphrd = llc->dev->type;
983 sllc.sllc_sap = llc->daddr.lsap;
984 memcpy(&sllc.sllc_mac, &llc->daddr.mac, IFHWADDRLEN);
985 } else {
986 rc = -EINVAL;
987 if (!llc->sap)
988 goto out;
989 sllc.sllc_sap = llc->sap->laddr.lsap;
990
991 if (llc->dev) {
992 sllc.sllc_arphrd = llc->dev->type;
a186d2ae 993 memcpy(&sllc.sllc_mac, llc->dev->dev_addr,
1da177e4
LT
994 IFHWADDRLEN);
995 }
996 }
997 rc = 0;
998 sllc.sllc_family = AF_LLC;
999 memcpy(uaddr, &sllc, sizeof(sllc));
1000out:
1001 release_sock(sk);
1002 return rc;
1003}
1004
1005/**
1006 * llc_ui_ioctl - io controls for PF_LLC
1007 * @sock: Socket to get/set info
1008 * @cmd: command
1009 * @arg: optional argument for cmd
1010 *
1011 * get/set info on llc sockets
1012 */
1013static int llc_ui_ioctl(struct socket *sock, unsigned int cmd,
1014 unsigned long arg)
1015{
b5e5fa5e 1016 return -ENOIOCTLCMD;
1da177e4
LT
1017}
1018
1019/**
1020 * llc_ui_setsockopt - set various connection specific parameters.
1021 * @sock: Socket to set options on.
1022 * @level: Socket level user is requesting operations on.
1023 * @optname: Operation name.
1024 * @optval User provided operation data.
1025 * @optlen: Length of optval.
1026 *
1027 * Set various connection specific parameters.
1028 */
1029static int llc_ui_setsockopt(struct socket *sock, int level, int optname,
b7058842 1030 char __user *optval, unsigned int optlen)
1da177e4
LT
1031{
1032 struct sock *sk = sock->sk;
1033 struct llc_sock *llc = llc_sk(sk);
339db11b
DC
1034 unsigned int opt;
1035 int rc = -EINVAL;
1da177e4
LT
1036
1037 lock_sock(sk);
af426d32 1038 if (unlikely(level != SOL_LLC || optlen != sizeof(int)))
1da177e4
LT
1039 goto out;
1040 rc = get_user(opt, (int __user *)optval);
1041 if (rc)
1042 goto out;
1043 rc = -EINVAL;
1044 switch (optname) {
1045 case LLC_OPT_RETRY:
1046 if (opt > LLC_OPT_MAX_RETRY)
1047 goto out;
1048 llc->n2 = opt;
1049 break;
1050 case LLC_OPT_SIZE:
1051 if (opt > LLC_OPT_MAX_SIZE)
1052 goto out;
1053 llc->n1 = opt;
1054 break;
1055 case LLC_OPT_ACK_TMR_EXP:
1056 if (opt > LLC_OPT_MAX_ACK_TMR_EXP)
1057 goto out;
590232a7 1058 llc->ack_timer.expire = opt * HZ;
1da177e4
LT
1059 break;
1060 case LLC_OPT_P_TMR_EXP:
1061 if (opt > LLC_OPT_MAX_P_TMR_EXP)
1062 goto out;
590232a7 1063 llc->pf_cycle_timer.expire = opt * HZ;
1da177e4
LT
1064 break;
1065 case LLC_OPT_REJ_TMR_EXP:
1066 if (opt > LLC_OPT_MAX_REJ_TMR_EXP)
1067 goto out;
590232a7 1068 llc->rej_sent_timer.expire = opt * HZ;
1da177e4
LT
1069 break;
1070 case LLC_OPT_BUSY_TMR_EXP:
1071 if (opt > LLC_OPT_MAX_BUSY_TMR_EXP)
1072 goto out;
590232a7 1073 llc->busy_state_timer.expire = opt * HZ;
1da177e4
LT
1074 break;
1075 case LLC_OPT_TX_WIN:
1076 if (opt > LLC_OPT_MAX_WIN)
1077 goto out;
1078 llc->k = opt;
1079 break;
1080 case LLC_OPT_RX_WIN:
1081 if (opt > LLC_OPT_MAX_WIN)
1082 goto out;
1083 llc->rw = opt;
1084 break;
e5cd6fe3
OP
1085 case LLC_OPT_PKTINFO:
1086 if (opt)
1087 llc->cmsg_flags |= LLC_CMSG_PKTINFO;
1088 else
1089 llc->cmsg_flags &= ~LLC_CMSG_PKTINFO;
1090 break;
1da177e4
LT
1091 default:
1092 rc = -ENOPROTOOPT;
1093 goto out;
1094 }
1095 rc = 0;
1096out:
1097 release_sock(sk);
1098 return rc;
1099}
1100
1101/**
1102 * llc_ui_getsockopt - get connection specific socket info
1103 * @sock: Socket to get information from.
1104 * @level: Socket level user is requesting operations on.
1105 * @optname: Operation name.
1106 * @optval: Variable to return operation data in.
1107 * @optlen: Length of optval.
1108 *
1109 * Get connection specific socket information.
1110 */
1111static int llc_ui_getsockopt(struct socket *sock, int level, int optname,
1112 char __user *optval, int __user *optlen)
1113{
1114 struct sock *sk = sock->sk;
1115 struct llc_sock *llc = llc_sk(sk);
1116 int val = 0, len = 0, rc = -EINVAL;
1117
1118 lock_sock(sk);
af426d32 1119 if (unlikely(level != SOL_LLC))
1da177e4
LT
1120 goto out;
1121 rc = get_user(len, optlen);
1122 if (rc)
1123 goto out;
1124 rc = -EINVAL;
1125 if (len != sizeof(int))
1126 goto out;
1127 switch (optname) {
1128 case LLC_OPT_RETRY:
590232a7 1129 val = llc->n2; break;
1da177e4 1130 case LLC_OPT_SIZE:
590232a7 1131 val = llc->n1; break;
1da177e4 1132 case LLC_OPT_ACK_TMR_EXP:
590232a7 1133 val = llc->ack_timer.expire / HZ; break;
1da177e4 1134 case LLC_OPT_P_TMR_EXP:
590232a7 1135 val = llc->pf_cycle_timer.expire / HZ; break;
1da177e4 1136 case LLC_OPT_REJ_TMR_EXP:
590232a7 1137 val = llc->rej_sent_timer.expire / HZ; break;
1da177e4 1138 case LLC_OPT_BUSY_TMR_EXP:
590232a7 1139 val = llc->busy_state_timer.expire / HZ; break;
1da177e4
LT
1140 case LLC_OPT_TX_WIN:
1141 val = llc->k; break;
1142 case LLC_OPT_RX_WIN:
1143 val = llc->rw; break;
e5cd6fe3
OP
1144 case LLC_OPT_PKTINFO:
1145 val = (llc->cmsg_flags & LLC_CMSG_PKTINFO) != 0;
1146 break;
1da177e4
LT
1147 default:
1148 rc = -ENOPROTOOPT;
1149 goto out;
1150 }
1151 rc = 0;
1152 if (put_user(len, optlen) || copy_to_user(optval, &val, len))
1153 rc = -EFAULT;
1154out:
1155 release_sock(sk);
1156 return rc;
1157}
1158
ec1b4cf7 1159static const struct net_proto_family llc_ui_family_ops = {
1da177e4
LT
1160 .family = PF_LLC,
1161 .create = llc_ui_create,
1162 .owner = THIS_MODULE,
1163};
1164
90ddc4f0 1165static const struct proto_ops llc_ui_ops = {
1da177e4
LT
1166 .family = PF_LLC,
1167 .owner = THIS_MODULE,
1168 .release = llc_ui_release,
1169 .bind = llc_ui_bind,
1170 .connect = llc_ui_connect,
1171 .socketpair = sock_no_socketpair,
1172 .accept = llc_ui_accept,
1173 .getname = llc_ui_getname,
1174 .poll = datagram_poll,
1175 .ioctl = llc_ui_ioctl,
1176 .listen = llc_ui_listen,
1177 .shutdown = llc_ui_shutdown,
1178 .setsockopt = llc_ui_setsockopt,
1179 .getsockopt = llc_ui_getsockopt,
1180 .sendmsg = llc_ui_sendmsg,
1181 .recvmsg = llc_ui_recvmsg,
1182 .mmap = sock_no_mmap,
1183 .sendpage = sock_no_sendpage,
1184};
1185
01af4a0e 1186static const char llc_proc_err_msg[] __initconst =
d57b1869 1187 KERN_CRIT "LLC: Unable to register the proc_fs entries\n";
01af4a0e 1188static const char llc_sysctl_err_msg[] __initconst =
d57b1869 1189 KERN_CRIT "LLC: Unable to register the sysctl entries\n";
01af4a0e 1190static const char llc_sock_err_msg[] __initconst =
d57b1869 1191 KERN_CRIT "LLC: Unable to register the network family\n";
590232a7 1192
1da177e4
LT
1193static int __init llc2_init(void)
1194{
1195 int rc = proto_register(&llc_proto, 0);
1196
1197 if (rc != 0)
1198 goto out;
1199
1200 llc_build_offset_table();
1201 llc_station_init();
1202 llc_ui_sap_last_autoport = LLC_SAP_DYN_START;
1203 rc = llc_proc_init();
590232a7
ACM
1204 if (rc != 0) {
1205 printk(llc_proc_err_msg);
1da177e4 1206 goto out_unregister_llc_proto;
590232a7
ACM
1207 }
1208 rc = llc_sysctl_init();
1209 if (rc) {
1210 printk(llc_sysctl_err_msg);
1211 goto out_proc;
1212 }
1213 rc = sock_register(&llc_ui_family_ops);
1214 if (rc) {
1215 printk(llc_sock_err_msg);
1216 goto out_sysctl;
1217 }
1da177e4
LT
1218 llc_add_pack(LLC_DEST_SAP, llc_sap_handler);
1219 llc_add_pack(LLC_DEST_CONN, llc_conn_handler);
1220out:
1221 return rc;
590232a7
ACM
1222out_sysctl:
1223 llc_sysctl_exit();
1224out_proc:
1225 llc_proc_exit();
1da177e4
LT
1226out_unregister_llc_proto:
1227 proto_unregister(&llc_proto);
1228 goto out;
1229}
1230
1231static void __exit llc2_exit(void)
1232{
1233 llc_station_exit();
1234 llc_remove_pack(LLC_DEST_SAP);
1235 llc_remove_pack(LLC_DEST_CONN);
1236 sock_unregister(PF_LLC);
1237 llc_proc_exit();
590232a7 1238 llc_sysctl_exit();
1da177e4
LT
1239 proto_unregister(&llc_proto);
1240}
1241
1242module_init(llc2_init);
1243module_exit(llc2_exit);
1244
1245MODULE_LICENSE("GPL");
1246MODULE_AUTHOR("Procom 1997, Jay Schullist 2001, Arnaldo C. Melo 2001-2003");
1247MODULE_DESCRIPTION("IEEE 802.2 PF_LLC support");
1248MODULE_ALIAS_NETPROTO(PF_LLC);
This page took 0.629069 seconds and 5 git commands to generate.