conn_service.c (2c55d703391acf7e9101da596d0c15ee03b318a3) conn_service.c (9d35d880e0e4a3ab32d8c12f9e4d76198aadd42d)
1// SPDX-License-Identifier: GPL-2.0-or-later
2/* Service connection management
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8#include <linux/slab.h>
9#include "ar-internal.h"
10
11static struct rxrpc_bundle rxrpc_service_dummy_bundle = {
12 .ref = REFCOUNT_INIT(1),
13 .debug_id = UINT_MAX,
1// SPDX-License-Identifier: GPL-2.0-or-later
2/* Service connection management
3 *
4 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
5 * Written by David Howells (dhowells@redhat.com)
6 */
7
8#include <linux/slab.h>
9#include "ar-internal.h"
10
11static struct rxrpc_bundle rxrpc_service_dummy_bundle = {
12 .ref = REFCOUNT_INIT(1),
13 .debug_id = UINT_MAX,
14 .channel_lock = __SPIN_LOCK_UNLOCKED(&rxrpc_service_dummy_bundle.channel_lock),
15};
16
17/*
18 * Find a service connection under RCU conditions.
19 *
20 * We could use a hash table, but that is subject to bucket stuffing by an
21 * attacker as the client gets to pick the epoch and cid values and would know
22 * the hash function. So, instead, we use a hash table for the peer and from

--- 180 unchanged lines hidden ---
14};
15
16/*
17 * Find a service connection under RCU conditions.
18 *
19 * We could use a hash table, but that is subject to bucket stuffing by an
20 * attacker as the client gets to pick the epoch and cid values and would know
21 * the hash function. So, instead, we use a hash table for the peer and from

--- 180 unchanged lines hidden ---