adsprpc_socket.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2022-2023, Qualcomm Innovation Center, Inc. All rights reserved.
  4. */
  5. /* For debug only. Uncomment these blocks to log on every VERIFY statement */
  6. /*
  7. * #ifndef VERIFY_PRINT_ERROR
  8. * #define VERIFY_PRINT_ERROR
  9. * #endif
  10. */
  11. /*
  12. * #ifndef VERIFY_PRINT_INFO
  13. * #define VERIFY_PRINT_INFO
  14. * #endif
  15. * #define VERIFY_IPRINTF(format, ...) pr_info(format, ##__VA_ARGS__)
  16. */
  17. #include <linux/uaccess.h>
  18. #include <linux/qrtr.h>
  19. #include <linux/mutex.h>
  20. #include <net/sock.h>
  21. #include "fastrpc_trace.h"
  22. #include <linux/workqueue.h>
  23. #include "adsprpc_shared.h"
  24. // Registered QRTR service ID
  25. #define FASTRPC_REMOTE_SERVER_SERVICE_ID 5012
  26. /*
  27. * Fastrpc remote server instance ID bit-map:
  28. *
  29. * bits 0-1 : channel ID
  30. * bits 2-7 : reserved
  31. * bits 8-9 : remote domains (SECURE_PD, GUEST_OS)
  32. * bits 10-31 : reserved
  33. */
  34. #define REMOTE_DOMAIN_INSTANCE_INDEX (8)
  35. #define GET_SERVER_INSTANCE(remote_domain, cid) \
  36. ((remote_domain << REMOTE_DOMAIN_INSTANCE_INDEX) | cid)
  37. #define GET_CID_FROM_SERVER_INSTANCE(remote_server_instance) \
  38. (remote_server_instance & 0x3)
  39. // Maximun received fastprc packet size
  40. #define FASTRPC_SOCKET_RECV_SIZE sizeof(union rsp)
  41. union rsp {
  42. struct smq_invoke_rsp rsp;
  43. struct smq_invoke_rspv2 rsp2;
  44. struct smq_notif_rspv3 rsp3;
  45. };
  46. enum fastrpc_remote_domains_id {
  47. SECURE_PD = 0,
  48. GUEST_OS = 1,
  49. MAX_REMOTE_ID = SECURE_PD + 1,
  50. };
  51. struct fastrpc_socket {
  52. struct socket *sock; // Socket used to communicate with remote domain
  53. struct sockaddr_qrtr local_sock_addr; // Local socket address on kernel side
  54. struct sockaddr_qrtr remote_sock_addr; // Remote socket address on remote domain side
  55. struct mutex socket_mutex; // Mutex for socket synchronization
  56. void *recv_buf; // Received packet buffer
  57. };
  58. struct frpc_transport_session_control {
  59. struct fastrpc_socket frpc_socket; // Fastrpc socket data structure
  60. uint32_t remote_server_instance; // Unique remote server instance ID
  61. bool remote_server_online; // Flag to indicate remote server status
  62. struct work_struct work; // work for handling incoming messages
  63. struct workqueue_struct *wq; // workqueue to post @work on
  64. };
  65. struct remote_domain_configuration {
  66. int channel_id;
  67. int remote_domain;
  68. };
  69. /**
  70. * glist_session_ctrl
  71. * Static list containing socket session information for all remote domains.
  72. */
  73. static struct frpc_transport_session_control *glist_session_ctrl[MAX_DOMAIN_ID][MAX_REMOTE_ID];
  74. static const struct remote_domain_configuration configurations[] = {
  75. {
  76. .channel_id = CDSP_DOMAIN_ID,
  77. .remote_domain = SECURE_PD,
  78. },
  79. };
  80. int fastrpc_set_tvm_remote_domain(struct fastrpc_file *fl, struct fastrpc_ioctl_init *init)
  81. {
  82. int err = 0;
  83. char *proc_name = NULL;
  84. fl->tvm_remote_domain = GUEST_OS;
  85. if (init->file) {
  86. if (!init->filelen)
  87. goto bail;
  88. proc_name = kzalloc(init->filelen + 1, GFP_KERNEL);
  89. VERIFY(err, !IS_ERR_OR_NULL(proc_name));
  90. if (err) {
  91. err = -ENOMEM;
  92. goto bail;
  93. }
  94. err = copy_from_user((void *)proc_name,
  95. (void __user *)init->file, init->filelen);
  96. if (err) {
  97. err = -EFAULT;
  98. goto bail;
  99. }
  100. if (!strcmp(proc_name, "securepd"))
  101. fl->tvm_remote_domain = SECURE_PD;
  102. }
  103. bail:
  104. kfree(proc_name);
  105. return err;
  106. }
  107. /**
  108. * verify_transport_device()
  109. * @cid: Channel ID.
  110. * @tvm_remote_domain: Remote domain on TVM.
  111. *
  112. * Obtain remote session information given channel ID and tvm_remote_domain
  113. * and verify that socket has been created and remote server is up.
  114. *
  115. * Return: 0 on success or negative errno value on failure.
  116. */
  117. inline int verify_transport_device(int cid, int tvm_remote_domain)
  118. {
  119. int remote_domain, err = 0;
  120. struct frpc_transport_session_control *session_control = NULL;
  121. remote_domain = tvm_remote_domain;
  122. VERIFY(err, remote_domain < MAX_REMOTE_ID);
  123. if (err) {
  124. err = -ECHRNG;
  125. goto bail;
  126. }
  127. session_control = glist_session_ctrl[cid][remote_domain];
  128. VERIFY(err, session_control);
  129. if (err) {
  130. err = -ECHRNG;
  131. goto bail;
  132. }
  133. mutex_lock(&session_control->frpc_socket.socket_mutex);
  134. VERIFY(err, session_control->frpc_socket.sock);
  135. VERIFY(err, session_control->remote_server_online);
  136. if (err) {
  137. err = -EPIPE;
  138. mutex_unlock(&session_control->frpc_socket.socket_mutex);
  139. goto bail;
  140. }
  141. mutex_unlock(&session_control->frpc_socket.socket_mutex);
  142. bail:
  143. return err;
  144. }
  145. static void fastrpc_recv_new_server(struct frpc_transport_session_control *session_control,
  146. unsigned int service, unsigned int instance,
  147. unsigned int node, unsigned int port)
  148. {
  149. uint32_t remote_server_instance = session_control->remote_server_instance;
  150. int32_t err = 0;
  151. /* Ignore EOF marker */
  152. if (!node && !port) {
  153. err = -EINVAL;
  154. goto bail;
  155. }
  156. if (service != FASTRPC_REMOTE_SERVER_SERVICE_ID ||
  157. instance != remote_server_instance) {
  158. err = -ENOMSG;
  159. goto bail;
  160. }
  161. mutex_lock(&session_control->frpc_socket.socket_mutex);
  162. session_control->frpc_socket.remote_sock_addr.sq_family = AF_QIPCRTR;
  163. session_control->frpc_socket.remote_sock_addr.sq_node = node;
  164. session_control->frpc_socket.remote_sock_addr.sq_port = port;
  165. session_control->remote_server_online = true;
  166. mutex_unlock(&session_control->frpc_socket.socket_mutex);
  167. ADSPRPC_INFO("Remote server is up: remote ID (0x%x), node %u, port %u",
  168. remote_server_instance, node, port);
  169. bail:
  170. if (err != -EINVAL && err) {
  171. ADSPRPC_WARN("Ignoring ctrl packet: service id %u, instance id %u, err %d",
  172. service, instance, err);
  173. }
  174. }
  175. static void fastrpc_recv_del_server(struct frpc_transport_session_control *session_control,
  176. unsigned int node, unsigned int port)
  177. {
  178. uint32_t remote_server_instance = session_control->remote_server_instance;
  179. int32_t err = 0;
  180. /* Ignore EOF marker */
  181. if (!node && !port) {
  182. err = -EINVAL;
  183. goto bail;
  184. }
  185. if (node != session_control->frpc_socket.remote_sock_addr.sq_node ||
  186. port != session_control->frpc_socket.remote_sock_addr.sq_port) {
  187. err = -ENOMSG;
  188. goto bail;
  189. }
  190. mutex_lock(&session_control->frpc_socket.socket_mutex);
  191. session_control->frpc_socket.remote_sock_addr.sq_node = 0;
  192. session_control->frpc_socket.remote_sock_addr.sq_port = 0;
  193. session_control->remote_server_online = false;
  194. mutex_unlock(&session_control->frpc_socket.socket_mutex);
  195. ADSPRPC_INFO("Remote server is down: remote ID (0x%x)", remote_server_instance);
  196. bail:
  197. if (err != -EINVAL && err)
  198. ADSPRPC_WARN("Ignoring ctrl packet: node %u, port %u, err %d", node, port, err);
  199. }
  200. /**
  201. * fastrpc_recv_ctrl_pkt()
  202. * @session_control: Data structure that contains information related to socket and
  203. * remote server availability.
  204. * @buf: Control packet.
  205. * @len: Control packet length.
  206. *
  207. * Handle control packet status notifications from remote domain.
  208. */
  209. static void fastrpc_recv_ctrl_pkt(struct frpc_transport_session_control *session_control,
  210. const void *buf, size_t len)
  211. {
  212. const struct qrtr_ctrl_pkt *pkt = buf;
  213. if (len < sizeof(struct qrtr_ctrl_pkt)) {
  214. ADSPRPC_WARN("Ignoring short control packet (%d bytes)", len);
  215. return;
  216. }
  217. switch (le32_to_cpu(pkt->cmd)) {
  218. case QRTR_TYPE_NEW_SERVER:
  219. fastrpc_recv_new_server(session_control,
  220. le32_to_cpu(pkt->server.service),
  221. le32_to_cpu(pkt->server.instance),
  222. le32_to_cpu(pkt->server.node),
  223. le32_to_cpu(pkt->server.port));
  224. break;
  225. case QRTR_TYPE_DEL_SERVER:
  226. fastrpc_recv_del_server(session_control,
  227. le32_to_cpu(pkt->server.node),
  228. le32_to_cpu(pkt->server.port));
  229. break;
  230. default:
  231. ADSPRPC_WARN("Ignoring unknown ctrl packet with size %zu", len);
  232. }
  233. }
  234. /**
  235. * fastrpc_socket_callback_wq()
  236. * @work: workqueue structure for incoming socket packets
  237. *
  238. * Callback function to receive responses that were posted on workqueue.
  239. * We expect to receive control packets with remote domain status notifications or
  240. * RPC data packets from remote domain.
  241. */
  242. static void fastrpc_socket_callback_wq(struct work_struct *work)
  243. {
  244. int32_t err = 0, cid = -1, bytes_rx = 0;
  245. uint32_t remote_server_instance = (uint32_t)-1;
  246. bool ignore_err = false;
  247. struct kvec msg = {0};
  248. struct sockaddr_qrtr remote_sock_addr = {0};
  249. struct msghdr remote_server = {0};
  250. struct frpc_transport_session_control *session_control = NULL;
  251. __u32 sq_node = 0, sq_port = 0;
  252. session_control = container_of(work, struct frpc_transport_session_control, work);
  253. VERIFY(err, session_control);
  254. if (err) {
  255. err = -EFAULT;
  256. goto bail;
  257. }
  258. remote_server.msg_name = &remote_sock_addr;
  259. remote_server.msg_namelen = sizeof(remote_sock_addr);
  260. msg.iov_base = session_control->frpc_socket.recv_buf;
  261. msg.iov_len = FASTRPC_SOCKET_RECV_SIZE;
  262. remote_server_instance = session_control->remote_server_instance;
  263. for (;;) {
  264. trace_fastrpc_msg("socket_callback_ready: begin");
  265. err = kernel_recvmsg(session_control->frpc_socket.sock, &remote_server, &msg, 1,
  266. msg.iov_len, MSG_DONTWAIT);
  267. if (err == -EAGAIN) {
  268. ignore_err = true;
  269. goto bail;
  270. }
  271. if (err < 0)
  272. goto bail;
  273. bytes_rx = err;
  274. err = 0;
  275. sq_node = remote_sock_addr.sq_node;
  276. sq_port = remote_sock_addr.sq_port;
  277. if (sq_node == session_control->frpc_socket.local_sock_addr.sq_node &&
  278. sq_port == QRTR_PORT_CTRL) {
  279. fastrpc_recv_ctrl_pkt(session_control,
  280. session_control->frpc_socket.recv_buf,
  281. bytes_rx);
  282. } else {
  283. cid = GET_CID_FROM_SERVER_INSTANCE(remote_server_instance);
  284. VERIFY(err, VALID_FASTRPC_CID(cid));
  285. if (err) {
  286. err = -ECHRNG;
  287. goto bail;
  288. }
  289. fastrpc_handle_rpc_response(msg.iov_base, msg.iov_len, cid);
  290. }
  291. trace_fastrpc_msg("socket_callback_ready: end");
  292. }
  293. bail:
  294. if (!ignore_err && err < 0) {
  295. ADSPRPC_ERR(
  296. "invalid response data %pK (rx %d bytes), buffer len %d from remote ID (0x%x) err %d\n",
  297. msg.iov_base, bytes_rx, msg.iov_len, remote_server_instance, err);
  298. }
  299. }
  300. /**
  301. * fastrpc_socket_callback()
  302. * @sk: Sock data structure with information related to the callback response.
  303. *
  304. * Callback function to receive responses from socket layer.
  305. * Responses are posted on workqueue to be process.
  306. */
  307. static void fastrpc_socket_callback(struct sock *sk)
  308. {
  309. int32_t err = 0;
  310. struct frpc_transport_session_control *session_control = NULL;
  311. trace_fastrpc_msg("socket_callback: begin");
  312. VERIFY(err, sk);
  313. if (err) {
  314. err = -EFAULT;
  315. goto bail;
  316. }
  317. rcu_read_lock();
  318. session_control = rcu_dereference_sk_user_data(sk);
  319. if (session_control)
  320. queue_work(session_control->wq, &session_control->work);
  321. rcu_read_unlock();
  322. bail:
  323. if (err < 0)
  324. ADSPRPC_ERR("invalid sock received, err %d", err);
  325. trace_fastrpc_msg("socket_callback: end");
  326. }
  327. /**
  328. * fastrpc_transport_send()
  329. * @cid: Channel ID.
  330. * @rpc_msg: RPC message to send to remote domain.
  331. * @rpc_msg_size: RPC message size.
  332. * @tvm_remote_domain: Remote domain on TVM.
  333. *
  334. * Send RPC message to remote domain. Depending on tvm_remote_domain flag message will be
  335. * sent to one of the remote domains on remote subsystem.
  336. * Depending on the channel ID and remote domain, a corresponding socket is retrieved
  337. * from glist_session_ctrl and is use to send RPC message.
  338. *
  339. * Return: 0 on success or negative errno value on failure.
  340. */
  341. int fastrpc_transport_send(int cid, void *rpc_msg, uint32_t rpc_msg_size, int tvm_remote_domain)
  342. {
  343. int err = 0, remote_domain;
  344. struct fastrpc_socket *frpc_socket = NULL;
  345. struct frpc_transport_session_control *session_control = NULL;
  346. struct msghdr remote_server = {0};
  347. struct kvec msg = {0};
  348. remote_domain = tvm_remote_domain;
  349. VERIFY(err, remote_domain < MAX_REMOTE_ID);
  350. if (err) {
  351. err = -ECHRNG;
  352. goto bail;
  353. }
  354. session_control = glist_session_ctrl[cid][remote_domain];
  355. VERIFY(err, session_control);
  356. if (err) {
  357. err = -ECHRNG;
  358. goto bail;
  359. }
  360. frpc_socket = &session_control->frpc_socket;
  361. remote_server.msg_name = &frpc_socket->remote_sock_addr;
  362. remote_server.msg_namelen = sizeof(frpc_socket->remote_sock_addr);
  363. msg.iov_base = rpc_msg;
  364. msg.iov_len = rpc_msg_size;
  365. mutex_lock(&frpc_socket->socket_mutex);
  366. VERIFY(err, frpc_socket->sock);
  367. VERIFY(err, session_control->remote_server_online);
  368. if (err) {
  369. err = -EPIPE;
  370. mutex_unlock(&frpc_socket->socket_mutex);
  371. goto bail;
  372. }
  373. err = kernel_sendmsg(frpc_socket->sock, &remote_server, &msg, 1, msg.iov_len);
  374. if (err > 0)
  375. err = 0;
  376. mutex_unlock(&frpc_socket->socket_mutex);
  377. bail:
  378. return err;
  379. }
  380. /**
  381. * create_socket()
  382. * @session_control: Data structure that contains information related to socket and
  383. * remote server availability.
  384. *
  385. * Initializes and creates a kernel socket.
  386. *
  387. * Return: pointer to a socket on success or negative errno value on failure.
  388. */
  389. static struct socket *create_socket(struct frpc_transport_session_control *session_control)
  390. {
  391. int err = 0;
  392. struct socket *sock = NULL;
  393. struct fastrpc_socket *frpc_socket = NULL;
  394. err = sock_create_kern(&init_net, AF_QIPCRTR, SOCK_DGRAM,
  395. PF_QIPCRTR, &sock);
  396. if (err < 0) {
  397. ADSPRPC_ERR("sock_create_kern failed with err %d\n", err);
  398. goto bail;
  399. }
  400. frpc_socket = &session_control->frpc_socket;
  401. err = kernel_getsockname(sock, (struct sockaddr *)&frpc_socket->local_sock_addr);
  402. if (err < 0) {
  403. sock_release(sock);
  404. ADSPRPC_ERR("kernel_getsockname failed with err %d\n", err);
  405. goto bail;
  406. }
  407. rcu_assign_sk_user_data(sock->sk, session_control);
  408. sock->sk->sk_data_ready = fastrpc_socket_callback;
  409. sock->sk->sk_error_report = fastrpc_socket_callback;
  410. bail:
  411. if (err < 0)
  412. return ERR_PTR(err);
  413. else
  414. return sock;
  415. }
  416. /**
  417. * register_remote_server_notifications()
  418. * @frpc_socket: Socket to send message to register for remote service notifications.
  419. * @remote_server_instance: ID to uniquely identify remote server
  420. *
  421. * Register socket to receive status notifications from remote service
  422. * using remote service ID FASTRPC_REMOTE_SERVER_SERVICE_ID and instance ID.
  423. *
  424. * Return: 0 on success or negative errno value on failure.
  425. */
  426. static int register_remote_server_notifications(struct fastrpc_socket *frpc_socket,
  427. uint32_t remote_server_instance)
  428. {
  429. struct qrtr_ctrl_pkt pkt = {0};
  430. struct sockaddr_qrtr sq = {0};
  431. struct msghdr remote_server = {0};
  432. struct kvec msg = { &pkt, sizeof(pkt) };
  433. int err = 0;
  434. memset(&pkt, 0, sizeof(pkt));
  435. pkt.cmd = cpu_to_le32(QRTR_TYPE_NEW_LOOKUP);
  436. pkt.server.service = cpu_to_le32(FASTRPC_REMOTE_SERVER_SERVICE_ID);
  437. pkt.server.instance = cpu_to_le32(remote_server_instance);
  438. sq.sq_family = frpc_socket->local_sock_addr.sq_family;
  439. sq.sq_node = frpc_socket->local_sock_addr.sq_node;
  440. sq.sq_port = QRTR_PORT_CTRL;
  441. remote_server.msg_name = &sq;
  442. remote_server.msg_namelen = sizeof(sq);
  443. err = kernel_sendmsg(frpc_socket->sock, &remote_server, &msg, 1, sizeof(pkt));
  444. if (err < 0)
  445. goto bail;
  446. bail:
  447. if (err < 0)
  448. ADSPRPC_ERR("failed to send lookup registration: %d\n", err);
  449. return err;
  450. }
  451. inline void fastrpc_transport_session_init(int cid, char *subsys)
  452. {
  453. }
  454. inline void fastrpc_transport_session_deinit(int cid)
  455. {
  456. }
  457. int fastrpc_wait_for_transport_interrupt(int cid, unsigned int flags)
  458. {
  459. return 0;
  460. }
  461. void fastrpc_rproc_trace_events(const char *name, const char *event,
  462. const char *subevent)
  463. {
  464. }
  465. /**
  466. * fastrpc_transport_init() - Initialize sockets for fastrpc driver.
  467. *
  468. * Initialize and create all sockets that are enabled from all channels
  469. * and remote domains.
  470. * Traverse array configurations and initialize session on glist_session_ctrl if remote
  471. * domain is enabled.
  472. *
  473. * Return: 0 on success or negative errno value on failure.
  474. */
  475. int fastrpc_transport_init(void)
  476. {
  477. int err = 0, cid = -1, ii = 0, remote_domain = -1;
  478. struct socket *sock = NULL;
  479. struct fastrpc_socket *frpc_socket = NULL;
  480. struct frpc_transport_session_control *session_control = NULL;
  481. struct workqueue_struct *wq = NULL;
  482. for (ii = 0; ii < ARRAY_SIZE(configurations); ii++) {
  483. session_control = kzalloc(sizeof(*session_control), GFP_KERNEL);
  484. VERIFY(err, NULL != session_control);
  485. if (err) {
  486. err = -ENOMEM;
  487. goto bail;
  488. }
  489. cid = configurations[ii].channel_id;
  490. remote_domain = configurations[ii].remote_domain;
  491. session_control->remote_server_online = false;
  492. frpc_socket = &session_control->frpc_socket;
  493. mutex_init(&frpc_socket->socket_mutex);
  494. sock = create_socket(session_control);
  495. if (IS_ERR_OR_NULL(sock)) {
  496. err = PTR_ERR(sock);
  497. goto bail;
  498. }
  499. frpc_socket->sock = sock;
  500. frpc_socket->recv_buf = kzalloc(FASTRPC_SOCKET_RECV_SIZE, GFP_KERNEL);
  501. if (!frpc_socket->recv_buf) {
  502. err = -ENOMEM;
  503. goto bail;
  504. }
  505. INIT_WORK(&session_control->work, fastrpc_socket_callback_wq);
  506. wq = alloc_workqueue("fastrpc_msg_handler", WQ_UNBOUND|WQ_HIGHPRI, 0);
  507. if (!wq) {
  508. err = -ENOMEM;
  509. goto bail;
  510. }
  511. session_control->wq = wq;
  512. session_control->remote_server_instance = GET_SERVER_INSTANCE(remote_domain, cid);
  513. err = register_remote_server_notifications(frpc_socket,
  514. session_control->remote_server_instance);
  515. if (err < 0)
  516. goto bail;
  517. glist_session_ctrl[cid][remote_domain] = session_control;
  518. ADSPRPC_INFO("Created and registered socket for remote server (service ID %u, instance ID 0x%x)\n",
  519. FASTRPC_REMOTE_SERVER_SERVICE_ID, session_control->remote_server_instance);
  520. }
  521. err = 0;
  522. bail:
  523. if (err)
  524. ADSPRPC_ERR("fastrpc_socket_init failed with err %d\n", err);
  525. return err;
  526. }
  527. /**
  528. * fastrpc_transport_deinit() - Deinitialize sockets for fastrpc driver.
  529. *
  530. * Deinitialize and release all sockets that are enabled from all channels
  531. * and remote domains.
  532. * Traverse array configurations and deinitialize corresponding session from
  533. * glist_session_ctrl.
  534. */
  535. void fastrpc_transport_deinit(void)
  536. {
  537. int ii = 0, cid = -1, remote_domain = -1;
  538. struct fastrpc_socket *frpc_socket = NULL;
  539. struct frpc_transport_session_control *session_control = NULL;
  540. for (ii = 0; ii < ARRAY_SIZE(configurations); ii++) {
  541. cid = configurations[ii].channel_id;
  542. remote_domain = configurations[ii].remote_domain;
  543. session_control = glist_session_ctrl[cid][remote_domain];
  544. if (!session_control)
  545. continue;
  546. frpc_socket = &session_control->frpc_socket;
  547. if (frpc_socket->sock)
  548. sock_release(frpc_socket->sock);
  549. if (session_control->wq)
  550. destroy_workqueue(session_control->wq);
  551. kfree(frpc_socket->recv_buf);
  552. frpc_socket->recv_buf = NULL;
  553. frpc_socket->sock = NULL;
  554. mutex_destroy(&frpc_socket->socket_mutex);
  555. kfree(session_control);
  556. glist_session_ctrl[cid][remote_domain] = NULL;
  557. }
  558. }