sock.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the
  16. * Free Software Foundation, Inc.,
  17. * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  18. */
  19. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  20. #include <linux/init.h>
  21. #include <linux/kernel.h>
  22. #include <linux/module.h>
  23. #include <linux/nfc.h>
  24. #include "../nfc.h"
  25. #include "llcp.h"
  26. static struct proto llcp_sock_proto = {
  27. .name = "NFC_LLCP",
  28. .owner = THIS_MODULE,
  29. .obj_size = sizeof(struct nfc_llcp_sock),
  30. };
  31. static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
  32. {
  33. struct sock *sk = sock->sk;
  34. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  35. struct nfc_llcp_local *local;
  36. struct nfc_dev *dev;
  37. struct sockaddr_nfc_llcp llcp_addr;
  38. int len, ret = 0;
  39. pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
  40. if (!addr || alen < offsetofend(struct sockaddr, sa_family) ||
  41. addr->sa_family != AF_NFC)
  42. return -EINVAL;
  43. memset(&llcp_addr, 0, sizeof(llcp_addr));
  44. len = min_t(unsigned int, sizeof(llcp_addr), alen);
  45. memcpy(&llcp_addr, addr, len);
  46. /* This is going to be a listening socket, dsap must be 0 */
  47. if (llcp_addr.dsap != 0)
  48. return -EINVAL;
  49. lock_sock(sk);
  50. if (sk->sk_state != LLCP_CLOSED) {
  51. ret = -EBADFD;
  52. goto error;
  53. }
  54. dev = nfc_get_device(llcp_addr.dev_idx);
  55. if (dev == NULL) {
  56. ret = -ENODEV;
  57. goto error;
  58. }
  59. local = nfc_llcp_find_local(dev);
  60. if (local == NULL) {
  61. ret = -ENODEV;
  62. goto put_dev;
  63. }
  64. llcp_sock->dev = dev;
  65. llcp_sock->local = local;
  66. llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
  67. llcp_sock->service_name_len = min_t(unsigned int,
  68. llcp_addr.service_name_len,
  69. NFC_LLCP_MAX_SERVICE_NAME);
  70. llcp_sock->service_name = kmemdup(llcp_addr.service_name,
  71. llcp_sock->service_name_len,
  72. GFP_KERNEL);
  73. llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
  74. if (llcp_sock->ssap == LLCP_MAX_SAP)
  75. goto put_dev;
  76. local->sockets[llcp_sock->ssap] = llcp_sock;
  77. pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
  78. sk->sk_state = LLCP_BOUND;
  79. put_dev:
  80. nfc_put_device(dev);
  81. error:
  82. release_sock(sk);
  83. return ret;
  84. }
  85. static int llcp_sock_listen(struct socket *sock, int backlog)
  86. {
  87. struct sock *sk = sock->sk;
  88. int ret = 0;
  89. pr_debug("sk %p backlog %d\n", sk, backlog);
  90. lock_sock(sk);
  91. if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM)
  92. || sk->sk_state != LLCP_BOUND) {
  93. ret = -EBADFD;
  94. goto error;
  95. }
  96. sk->sk_max_ack_backlog = backlog;
  97. sk->sk_ack_backlog = 0;
  98. pr_debug("Socket listening\n");
  99. sk->sk_state = LLCP_LISTEN;
  100. error:
  101. release_sock(sk);
  102. return ret;
  103. }
  104. void nfc_llcp_accept_unlink(struct sock *sk)
  105. {
  106. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  107. pr_debug("state %d\n", sk->sk_state);
  108. list_del_init(&llcp_sock->accept_queue);
  109. sk_acceptq_removed(llcp_sock->parent);
  110. llcp_sock->parent = NULL;
  111. sock_put(sk);
  112. }
  113. void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
  114. {
  115. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  116. struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
  117. /* Lock will be free from unlink */
  118. sock_hold(sk);
  119. list_add_tail(&llcp_sock->accept_queue,
  120. &llcp_sock_parent->accept_queue);
  121. llcp_sock->parent = parent;
  122. sk_acceptq_added(parent);
  123. }
  124. struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
  125. struct socket *newsock)
  126. {
  127. struct nfc_llcp_sock *lsk, *n, *llcp_parent;
  128. struct sock *sk;
  129. llcp_parent = nfc_llcp_sock(parent);
  130. list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
  131. accept_queue) {
  132. sk = &lsk->sk;
  133. lock_sock(sk);
  134. if (sk->sk_state == LLCP_CLOSED) {
  135. release_sock(sk);
  136. nfc_llcp_accept_unlink(sk);
  137. continue;
  138. }
  139. if (sk->sk_state == LLCP_CONNECTED || !newsock) {
  140. nfc_llcp_accept_unlink(sk);
  141. if (newsock)
  142. sock_graft(sk, newsock);
  143. release_sock(sk);
  144. pr_debug("Returning sk state %d\n", sk->sk_state);
  145. return sk;
  146. }
  147. release_sock(sk);
  148. }
  149. return NULL;
  150. }
  151. static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
  152. int flags)
  153. {
  154. DECLARE_WAITQUEUE(wait, current);
  155. struct sock *sk = sock->sk, *new_sk;
  156. long timeo;
  157. int ret = 0;
  158. pr_debug("parent %p\n", sk);
  159. lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
  160. if (sk->sk_state != LLCP_LISTEN) {
  161. ret = -EBADFD;
  162. goto error;
  163. }
  164. timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
  165. /* Wait for an incoming connection. */
  166. add_wait_queue_exclusive(sk_sleep(sk), &wait);
  167. while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
  168. set_current_state(TASK_INTERRUPTIBLE);
  169. if (!timeo) {
  170. ret = -EAGAIN;
  171. break;
  172. }
  173. if (signal_pending(current)) {
  174. ret = sock_intr_errno(timeo);
  175. break;
  176. }
  177. release_sock(sk);
  178. timeo = schedule_timeout(timeo);
  179. lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
  180. }
  181. __set_current_state(TASK_RUNNING);
  182. remove_wait_queue(sk_sleep(sk), &wait);
  183. if (ret)
  184. goto error;
  185. newsock->state = SS_CONNECTED;
  186. pr_debug("new socket %p\n", new_sk);
  187. error:
  188. release_sock(sk);
  189. return ret;
  190. }
  191. static int llcp_sock_getname(struct socket *sock, struct sockaddr *addr,
  192. int *len, int peer)
  193. {
  194. struct sockaddr_nfc_llcp *llcp_addr = (struct sockaddr_nfc_llcp *)addr;
  195. struct sock *sk = sock->sk;
  196. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  197. pr_debug("%p\n", sk);
  198. addr->sa_family = AF_NFC;
  199. *len = sizeof(struct sockaddr_nfc_llcp);
  200. llcp_addr->dev_idx = llcp_sock->dev->idx;
  201. llcp_addr->dsap = llcp_sock->dsap;
  202. llcp_addr->ssap = llcp_sock->ssap;
  203. llcp_addr->service_name_len = llcp_sock->service_name_len;
  204. memcpy(llcp_addr->service_name, llcp_sock->service_name,
  205. llcp_addr->service_name_len);
  206. return 0;
  207. }
  208. static inline unsigned int llcp_accept_poll(struct sock *parent)
  209. {
  210. struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
  211. struct sock *sk;
  212. parent_sock = nfc_llcp_sock(parent);
  213. list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
  214. accept_queue) {
  215. sk = &llcp_sock->sk;
  216. if (sk->sk_state == LLCP_CONNECTED)
  217. return POLLIN | POLLRDNORM;
  218. }
  219. return 0;
  220. }
  221. static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
  222. poll_table *wait)
  223. {
  224. struct sock *sk = sock->sk;
  225. unsigned int mask = 0;
  226. pr_debug("%p\n", sk);
  227. sock_poll_wait(file, sk_sleep(sk), wait);
  228. if (sk->sk_state == LLCP_LISTEN)
  229. return llcp_accept_poll(sk);
  230. if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
  231. mask |= POLLERR;
  232. if (!skb_queue_empty(&sk->sk_receive_queue))
  233. mask |= POLLIN;
  234. if (sk->sk_state == LLCP_CLOSED)
  235. mask |= POLLHUP;
  236. return mask;
  237. }
  238. static int llcp_sock_release(struct socket *sock)
  239. {
  240. struct sock *sk = sock->sk;
  241. struct nfc_llcp_local *local;
  242. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  243. int err = 0;
  244. if (!sk)
  245. return 0;
  246. pr_debug("%p\n", sk);
  247. local = llcp_sock->local;
  248. if (local == NULL) {
  249. err = -ENODEV;
  250. goto out;
  251. }
  252. mutex_lock(&local->socket_lock);
  253. if (llcp_sock == local->sockets[llcp_sock->ssap])
  254. local->sockets[llcp_sock->ssap] = NULL;
  255. else
  256. list_del_init(&llcp_sock->list);
  257. mutex_unlock(&local->socket_lock);
  258. lock_sock(sk);
  259. /* Send a DISC */
  260. if (sk->sk_state == LLCP_CONNECTED)
  261. nfc_llcp_disconnect(llcp_sock);
  262. if (sk->sk_state == LLCP_LISTEN) {
  263. struct nfc_llcp_sock *lsk, *n;
  264. struct sock *accept_sk;
  265. list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
  266. accept_queue) {
  267. accept_sk = &lsk->sk;
  268. lock_sock(accept_sk);
  269. nfc_llcp_disconnect(lsk);
  270. nfc_llcp_accept_unlink(accept_sk);
  271. release_sock(accept_sk);
  272. sock_orphan(accept_sk);
  273. }
  274. }
  275. /* Freeing the SAP */
  276. if ((sk->sk_state == LLCP_CONNECTED
  277. && llcp_sock->ssap > LLCP_LOCAL_SAP_OFFSET) ||
  278. sk->sk_state == LLCP_BOUND || sk->sk_state == LLCP_LISTEN)
  279. nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
  280. release_sock(sk);
  281. out:
  282. sock_orphan(sk);
  283. sock_put(sk);
  284. return err;
  285. }
  286. static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
  287. int len, int flags)
  288. {
  289. struct sock *sk = sock->sk;
  290. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  291. struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
  292. struct nfc_dev *dev;
  293. struct nfc_llcp_local *local;
  294. int ret = 0;
  295. pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
  296. if (!addr || len < sizeof(*addr) || addr->sa_family != AF_NFC) {
  297. pr_err("Invalid socket\n");
  298. return -EINVAL;
  299. }
  300. if (addr->service_name_len == 0 && addr->dsap == 0) {
  301. pr_err("Missing service name or dsap\n");
  302. return -EINVAL;
  303. }
  304. pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
  305. addr->target_idx, addr->nfc_protocol);
  306. lock_sock(sk);
  307. if (sk->sk_state == LLCP_CONNECTED) {
  308. ret = -EISCONN;
  309. goto error;
  310. }
  311. dev = nfc_get_device(addr->dev_idx);
  312. if (dev == NULL) {
  313. ret = -ENODEV;
  314. goto error;
  315. }
  316. local = nfc_llcp_find_local(dev);
  317. if (local == NULL) {
  318. ret = -ENODEV;
  319. goto put_dev;
  320. }
  321. device_lock(&dev->dev);
  322. if (dev->dep_link_up == false) {
  323. ret = -ENOLINK;
  324. device_unlock(&dev->dev);
  325. goto put_dev;
  326. }
  327. device_unlock(&dev->dev);
  328. if (local->rf_mode == NFC_RF_INITIATOR &&
  329. addr->target_idx != local->target_idx) {
  330. ret = -ENOLINK;
  331. goto put_dev;
  332. }
  333. llcp_sock->dev = dev;
  334. llcp_sock->local = local;
  335. llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
  336. if (llcp_sock->ssap == LLCP_SAP_MAX) {
  337. ret = -ENOMEM;
  338. goto put_dev;
  339. }
  340. if (addr->service_name_len == 0)
  341. llcp_sock->dsap = addr->dsap;
  342. else
  343. llcp_sock->dsap = LLCP_SAP_SDP;
  344. llcp_sock->nfc_protocol = addr->nfc_protocol;
  345. llcp_sock->service_name_len = min_t(unsigned int,
  346. addr->service_name_len,
  347. NFC_LLCP_MAX_SERVICE_NAME);
  348. llcp_sock->service_name = kmemdup(addr->service_name,
  349. llcp_sock->service_name_len,
  350. GFP_KERNEL);
  351. local->sockets[llcp_sock->ssap] = llcp_sock;
  352. ret = nfc_llcp_send_connect(llcp_sock);
  353. if (ret)
  354. goto put_dev;
  355. sk->sk_state = LLCP_CONNECTED;
  356. release_sock(sk);
  357. return 0;
  358. put_dev:
  359. nfc_put_device(dev);
  360. error:
  361. release_sock(sk);
  362. return ret;
  363. }
  364. static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
  365. struct msghdr *msg, size_t len)
  366. {
  367. struct sock *sk = sock->sk;
  368. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  369. int ret;
  370. pr_debug("sock %p sk %p", sock, sk);
  371. ret = sock_error(sk);
  372. if (ret)
  373. return ret;
  374. if (msg->msg_flags & MSG_OOB)
  375. return -EOPNOTSUPP;
  376. lock_sock(sk);
  377. if (sk->sk_state != LLCP_CONNECTED) {
  378. release_sock(sk);
  379. return -ENOTCONN;
  380. }
  381. release_sock(sk);
  382. return nfc_llcp_send_i_frame(llcp_sock, msg, len);
  383. }
  384. static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
  385. struct msghdr *msg, size_t len, int flags)
  386. {
  387. int noblock = flags & MSG_DONTWAIT;
  388. struct sock *sk = sock->sk;
  389. unsigned int copied, rlen;
  390. struct sk_buff *skb, *cskb;
  391. int err = 0;
  392. pr_debug("%p %zu\n", sk, len);
  393. msg->msg_namelen = 0;
  394. lock_sock(sk);
  395. if (sk->sk_state == LLCP_CLOSED &&
  396. skb_queue_empty(&sk->sk_receive_queue)) {
  397. release_sock(sk);
  398. return 0;
  399. }
  400. release_sock(sk);
  401. if (flags & (MSG_OOB))
  402. return -EOPNOTSUPP;
  403. skb = skb_recv_datagram(sk, flags, noblock, &err);
  404. if (!skb) {
  405. pr_err("Recv datagram failed state %d %d %d",
  406. sk->sk_state, err, sock_error(sk));
  407. if (sk->sk_shutdown & RCV_SHUTDOWN)
  408. return 0;
  409. return err;
  410. }
  411. rlen = skb->len; /* real length of skb */
  412. copied = min_t(unsigned int, rlen, len);
  413. cskb = skb;
  414. if (memcpy_toiovec(msg->msg_iov, cskb->data, copied)) {
  415. if (!(flags & MSG_PEEK))
  416. skb_queue_head(&sk->sk_receive_queue, skb);
  417. return -EFAULT;
  418. }
  419. /* Mark read part of skb as used */
  420. if (!(flags & MSG_PEEK)) {
  421. /* SOCK_STREAM: re-queue skb if it contains unreceived data */
  422. if (sk->sk_type == SOCK_STREAM) {
  423. skb_pull(skb, copied);
  424. if (skb->len) {
  425. skb_queue_head(&sk->sk_receive_queue, skb);
  426. goto done;
  427. }
  428. }
  429. kfree_skb(skb);
  430. }
  431. /* XXX Queue backlogged skbs */
  432. done:
  433. /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
  434. if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
  435. copied = rlen;
  436. return copied;
  437. }
  438. static const struct proto_ops llcp_sock_ops = {
  439. .family = PF_NFC,
  440. .owner = THIS_MODULE,
  441. .bind = llcp_sock_bind,
  442. .connect = llcp_sock_connect,
  443. .release = llcp_sock_release,
  444. .socketpair = sock_no_socketpair,
  445. .accept = llcp_sock_accept,
  446. .getname = llcp_sock_getname,
  447. .poll = llcp_sock_poll,
  448. .ioctl = sock_no_ioctl,
  449. .listen = llcp_sock_listen,
  450. .shutdown = sock_no_shutdown,
  451. .setsockopt = sock_no_setsockopt,
  452. .getsockopt = sock_no_getsockopt,
  453. .sendmsg = llcp_sock_sendmsg,
  454. .recvmsg = llcp_sock_recvmsg,
  455. .mmap = sock_no_mmap,
  456. };
  457. static void llcp_sock_destruct(struct sock *sk)
  458. {
  459. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  460. pr_debug("%p\n", sk);
  461. if (sk->sk_state == LLCP_CONNECTED)
  462. nfc_put_device(llcp_sock->dev);
  463. skb_queue_purge(&sk->sk_receive_queue);
  464. nfc_llcp_sock_free(llcp_sock);
  465. if (!sock_flag(sk, SOCK_DEAD)) {
  466. pr_err("Freeing alive NFC LLCP socket %p\n", sk);
  467. return;
  468. }
  469. }
  470. struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
  471. {
  472. struct sock *sk;
  473. struct nfc_llcp_sock *llcp_sock;
  474. sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
  475. if (!sk)
  476. return NULL;
  477. llcp_sock = nfc_llcp_sock(sk);
  478. sock_init_data(sock, sk);
  479. sk->sk_state = LLCP_CLOSED;
  480. sk->sk_protocol = NFC_SOCKPROTO_LLCP;
  481. sk->sk_type = type;
  482. sk->sk_destruct = llcp_sock_destruct;
  483. llcp_sock->ssap = 0;
  484. llcp_sock->dsap = LLCP_SAP_SDP;
  485. llcp_sock->send_n = llcp_sock->send_ack_n = 0;
  486. llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
  487. llcp_sock->remote_ready = 1;
  488. skb_queue_head_init(&llcp_sock->tx_queue);
  489. skb_queue_head_init(&llcp_sock->tx_pending_queue);
  490. skb_queue_head_init(&llcp_sock->tx_backlog_queue);
  491. INIT_LIST_HEAD(&llcp_sock->list);
  492. INIT_LIST_HEAD(&llcp_sock->accept_queue);
  493. if (sock != NULL)
  494. sock->state = SS_UNCONNECTED;
  495. return sk;
  496. }
  497. void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
  498. {
  499. struct nfc_llcp_local *local = sock->local;
  500. kfree(sock->service_name);
  501. skb_queue_purge(&sock->tx_queue);
  502. skb_queue_purge(&sock->tx_pending_queue);
  503. skb_queue_purge(&sock->tx_backlog_queue);
  504. list_del_init(&sock->accept_queue);
  505. if (local != NULL && sock == local->sockets[sock->ssap])
  506. local->sockets[sock->ssap] = NULL;
  507. else
  508. list_del_init(&sock->list);
  509. sock->parent = NULL;
  510. }
  511. static int llcp_sock_create(struct net *net, struct socket *sock,
  512. const struct nfc_protocol *nfc_proto)
  513. {
  514. struct sock *sk;
  515. pr_debug("%p\n", sock);
  516. if (sock->type != SOCK_STREAM && sock->type != SOCK_DGRAM)
  517. return -ESOCKTNOSUPPORT;
  518. sock->ops = &llcp_sock_ops;
  519. sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
  520. if (sk == NULL)
  521. return -ENOMEM;
  522. return 0;
  523. }
  524. static const struct nfc_protocol llcp_nfc_proto = {
  525. .id = NFC_SOCKPROTO_LLCP,
  526. .proto = &llcp_sock_proto,
  527. .owner = THIS_MODULE,
  528. .create = llcp_sock_create
  529. };
  530. int __init nfc_llcp_sock_init(void)
  531. {
  532. return nfc_proto_register(&llcp_nfc_proto);
  533. }
  534. void nfc_llcp_sock_exit(void)
  535. {
  536. nfc_proto_unregister(&llcp_nfc_proto);
  537. }