sock.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the
  16. * Free Software Foundation, Inc.,
  17. * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  18. */
  19. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  20. #include <linux/init.h>
  21. #include <linux/kernel.h>
  22. #include <linux/module.h>
  23. #include <linux/nfc.h>
  24. #include "../nfc.h"
  25. #include "llcp.h"
  26. static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
  27. {
  28. DECLARE_WAITQUEUE(wait, current);
  29. int err = 0;
  30. pr_debug("sk %p", sk);
  31. add_wait_queue(sk_sleep(sk), &wait);
  32. set_current_state(TASK_INTERRUPTIBLE);
  33. while (sk->sk_state != state) {
  34. if (!timeo) {
  35. err = -EINPROGRESS;
  36. break;
  37. }
  38. if (signal_pending(current)) {
  39. err = sock_intr_errno(timeo);
  40. break;
  41. }
  42. release_sock(sk);
  43. timeo = schedule_timeout(timeo);
  44. lock_sock(sk);
  45. set_current_state(TASK_INTERRUPTIBLE);
  46. err = sock_error(sk);
  47. if (err)
  48. break;
  49. }
  50. __set_current_state(TASK_RUNNING);
  51. remove_wait_queue(sk_sleep(sk), &wait);
  52. return err;
  53. }
  54. static struct proto llcp_sock_proto = {
  55. .name = "NFC_LLCP",
  56. .owner = THIS_MODULE,
  57. .obj_size = sizeof(struct nfc_llcp_sock),
  58. };
  59. static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
  60. {
  61. struct sock *sk = sock->sk;
  62. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  63. struct nfc_llcp_local *local;
  64. struct nfc_dev *dev;
  65. struct sockaddr_nfc_llcp llcp_addr;
  66. int len, ret = 0;
  67. if (!addr || addr->sa_family != AF_NFC)
  68. return -EINVAL;
  69. pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
  70. memset(&llcp_addr, 0, sizeof(llcp_addr));
  71. len = min_t(unsigned int, sizeof(llcp_addr), alen);
  72. memcpy(&llcp_addr, addr, len);
  73. /* This is going to be a listening socket, dsap must be 0 */
  74. if (llcp_addr.dsap != 0)
  75. return -EINVAL;
  76. lock_sock(sk);
  77. if (sk->sk_state != LLCP_CLOSED) {
  78. ret = -EBADFD;
  79. goto error;
  80. }
  81. dev = nfc_get_device(llcp_addr.dev_idx);
  82. if (dev == NULL) {
  83. ret = -ENODEV;
  84. goto error;
  85. }
  86. local = nfc_llcp_find_local(dev);
  87. if (local == NULL) {
  88. ret = -ENODEV;
  89. goto put_dev;
  90. }
  91. llcp_sock->dev = dev;
  92. llcp_sock->local = nfc_llcp_local_get(local);
  93. llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
  94. llcp_sock->service_name_len = min_t(unsigned int,
  95. llcp_addr.service_name_len,
  96. NFC_LLCP_MAX_SERVICE_NAME);
  97. llcp_sock->service_name = kmemdup(llcp_addr.service_name,
  98. llcp_sock->service_name_len,
  99. GFP_KERNEL);
  100. llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
  101. if (llcp_sock->ssap == LLCP_SAP_MAX) {
  102. ret = -EADDRINUSE;
  103. goto put_dev;
  104. }
  105. llcp_sock->reserved_ssap = llcp_sock->ssap;
  106. nfc_llcp_sock_link(&local->sockets, sk);
  107. pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
  108. sk->sk_state = LLCP_BOUND;
  109. put_dev:
  110. nfc_put_device(dev);
  111. error:
  112. release_sock(sk);
  113. return ret;
  114. }
  115. static int llcp_sock_listen(struct socket *sock, int backlog)
  116. {
  117. struct sock *sk = sock->sk;
  118. int ret = 0;
  119. pr_debug("sk %p backlog %d\n", sk, backlog);
  120. lock_sock(sk);
  121. if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM)
  122. || sk->sk_state != LLCP_BOUND) {
  123. ret = -EBADFD;
  124. goto error;
  125. }
  126. sk->sk_max_ack_backlog = backlog;
  127. sk->sk_ack_backlog = 0;
  128. pr_debug("Socket listening\n");
  129. sk->sk_state = LLCP_LISTEN;
  130. error:
  131. release_sock(sk);
  132. return ret;
  133. }
  134. void nfc_llcp_accept_unlink(struct sock *sk)
  135. {
  136. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  137. pr_debug("state %d\n", sk->sk_state);
  138. list_del_init(&llcp_sock->accept_queue);
  139. sk_acceptq_removed(llcp_sock->parent);
  140. llcp_sock->parent = NULL;
  141. sock_put(sk);
  142. }
  143. void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
  144. {
  145. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  146. struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
  147. /* Lock will be free from unlink */
  148. sock_hold(sk);
  149. list_add_tail(&llcp_sock->accept_queue,
  150. &llcp_sock_parent->accept_queue);
  151. llcp_sock->parent = parent;
  152. sk_acceptq_added(parent);
  153. }
  154. struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
  155. struct socket *newsock)
  156. {
  157. struct nfc_llcp_sock *lsk, *n, *llcp_parent;
  158. struct sock *sk;
  159. llcp_parent = nfc_llcp_sock(parent);
  160. list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
  161. accept_queue) {
  162. sk = &lsk->sk;
  163. lock_sock(sk);
  164. if (sk->sk_state == LLCP_CLOSED) {
  165. release_sock(sk);
  166. nfc_llcp_accept_unlink(sk);
  167. continue;
  168. }
  169. if (sk->sk_state == LLCP_CONNECTED || !newsock) {
  170. nfc_llcp_accept_unlink(sk);
  171. if (newsock)
  172. sock_graft(sk, newsock);
  173. release_sock(sk);
  174. pr_debug("Returning sk state %d\n", sk->sk_state);
  175. return sk;
  176. }
  177. release_sock(sk);
  178. }
  179. return NULL;
  180. }
  181. static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
  182. int flags)
  183. {
  184. DECLARE_WAITQUEUE(wait, current);
  185. struct sock *sk = sock->sk, *new_sk;
  186. long timeo;
  187. int ret = 0;
  188. pr_debug("parent %p\n", sk);
  189. lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
  190. if (sk->sk_state != LLCP_LISTEN) {
  191. ret = -EBADFD;
  192. goto error;
  193. }
  194. timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
  195. /* Wait for an incoming connection. */
  196. add_wait_queue_exclusive(sk_sleep(sk), &wait);
  197. while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
  198. set_current_state(TASK_INTERRUPTIBLE);
  199. if (!timeo) {
  200. ret = -EAGAIN;
  201. break;
  202. }
  203. if (signal_pending(current)) {
  204. ret = sock_intr_errno(timeo);
  205. break;
  206. }
  207. release_sock(sk);
  208. timeo = schedule_timeout(timeo);
  209. lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
  210. }
  211. __set_current_state(TASK_RUNNING);
  212. remove_wait_queue(sk_sleep(sk), &wait);
  213. if (ret)
  214. goto error;
  215. newsock->state = SS_CONNECTED;
  216. pr_debug("new socket %p\n", new_sk);
  217. error:
  218. release_sock(sk);
  219. return ret;
  220. }
  221. static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
  222. int *len, int peer)
  223. {
  224. struct sock *sk = sock->sk;
  225. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  226. DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
  227. if (llcp_sock == NULL || llcp_sock->dev == NULL)
  228. return -EBADFD;
  229. pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
  230. llcp_sock->dsap, llcp_sock->ssap);
  231. if (llcp_sock == NULL || llcp_sock->dev == NULL)
  232. return -EBADFD;
  233. uaddr->sa_family = AF_NFC;
  234. *len = sizeof(struct sockaddr_nfc_llcp);
  235. llcp_addr->dev_idx = llcp_sock->dev->idx;
  236. llcp_addr->target_idx = llcp_sock->target_idx;
  237. llcp_addr->dsap = llcp_sock->dsap;
  238. llcp_addr->ssap = llcp_sock->ssap;
  239. llcp_addr->service_name_len = llcp_sock->service_name_len;
  240. memcpy(llcp_addr->service_name, llcp_sock->service_name,
  241. llcp_addr->service_name_len);
  242. return 0;
  243. }
  244. static inline unsigned int llcp_accept_poll(struct sock *parent)
  245. {
  246. struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
  247. struct sock *sk;
  248. parent_sock = nfc_llcp_sock(parent);
  249. list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
  250. accept_queue) {
  251. sk = &llcp_sock->sk;
  252. if (sk->sk_state == LLCP_CONNECTED)
  253. return POLLIN | POLLRDNORM;
  254. }
  255. return 0;
  256. }
  257. static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
  258. poll_table *wait)
  259. {
  260. struct sock *sk = sock->sk;
  261. unsigned int mask = 0;
  262. pr_debug("%p\n", sk);
  263. sock_poll_wait(file, sk_sleep(sk), wait);
  264. if (sk->sk_state == LLCP_LISTEN)
  265. return llcp_accept_poll(sk);
  266. if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
  267. mask |= POLLERR;
  268. if (!skb_queue_empty(&sk->sk_receive_queue))
  269. mask |= POLLIN | POLLRDNORM;
  270. if (sk->sk_state == LLCP_CLOSED)
  271. mask |= POLLHUP;
  272. if (sk->sk_shutdown & RCV_SHUTDOWN)
  273. mask |= POLLRDHUP | POLLIN | POLLRDNORM;
  274. if (sk->sk_shutdown == SHUTDOWN_MASK)
  275. mask |= POLLHUP;
  276. if (sock_writeable(sk))
  277. mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
  278. else
  279. set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
  280. pr_debug("mask 0x%x\n", mask);
  281. return mask;
  282. }
  283. static int llcp_sock_release(struct socket *sock)
  284. {
  285. struct sock *sk = sock->sk;
  286. struct nfc_llcp_local *local;
  287. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  288. int err = 0;
  289. if (!sk)
  290. return 0;
  291. pr_debug("%p\n", sk);
  292. local = llcp_sock->local;
  293. if (local == NULL) {
  294. err = -ENODEV;
  295. goto out;
  296. }
  297. lock_sock(sk);
  298. /* Send a DISC */
  299. if (sk->sk_state == LLCP_CONNECTED)
  300. nfc_llcp_disconnect(llcp_sock);
  301. if (sk->sk_state == LLCP_LISTEN) {
  302. struct nfc_llcp_sock *lsk, *n;
  303. struct sock *accept_sk;
  304. list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
  305. accept_queue) {
  306. accept_sk = &lsk->sk;
  307. lock_sock(accept_sk);
  308. nfc_llcp_disconnect(lsk);
  309. nfc_llcp_accept_unlink(accept_sk);
  310. release_sock(accept_sk);
  311. sock_orphan(accept_sk);
  312. }
  313. }
  314. if (llcp_sock->reserved_ssap < LLCP_SAP_MAX)
  315. nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
  316. release_sock(sk);
  317. nfc_llcp_sock_unlink(&local->sockets, sk);
  318. out:
  319. sock_orphan(sk);
  320. sock_put(sk);
  321. return err;
  322. }
  323. static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
  324. int len, int flags)
  325. {
  326. struct sock *sk = sock->sk;
  327. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  328. struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
  329. struct nfc_dev *dev;
  330. struct nfc_llcp_local *local;
  331. int ret = 0;
  332. pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
  333. if (!addr || len < sizeof(struct sockaddr_nfc) ||
  334. addr->sa_family != AF_NFC) {
  335. pr_err("Invalid socket\n");
  336. return -EINVAL;
  337. }
  338. if (addr->service_name_len == 0 && addr->dsap == 0) {
  339. pr_err("Missing service name or dsap\n");
  340. return -EINVAL;
  341. }
  342. pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
  343. addr->target_idx, addr->nfc_protocol);
  344. lock_sock(sk);
  345. if (sk->sk_state == LLCP_CONNECTED) {
  346. ret = -EISCONN;
  347. goto error;
  348. }
  349. dev = nfc_get_device(addr->dev_idx);
  350. if (dev == NULL) {
  351. ret = -ENODEV;
  352. goto error;
  353. }
  354. local = nfc_llcp_find_local(dev);
  355. if (local == NULL) {
  356. ret = -ENODEV;
  357. goto put_dev;
  358. }
  359. device_lock(&dev->dev);
  360. if (dev->dep_link_up == false) {
  361. ret = -ENOLINK;
  362. device_unlock(&dev->dev);
  363. goto put_dev;
  364. }
  365. device_unlock(&dev->dev);
  366. if (local->rf_mode == NFC_RF_INITIATOR &&
  367. addr->target_idx != local->target_idx) {
  368. ret = -ENOLINK;
  369. goto put_dev;
  370. }
  371. llcp_sock->dev = dev;
  372. llcp_sock->local = nfc_llcp_local_get(local);
  373. llcp_sock->miu = llcp_sock->local->remote_miu;
  374. llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
  375. if (llcp_sock->ssap == LLCP_SAP_MAX) {
  376. ret = -ENOMEM;
  377. goto put_dev;
  378. }
  379. llcp_sock->reserved_ssap = llcp_sock->ssap;
  380. if (addr->service_name_len == 0)
  381. llcp_sock->dsap = addr->dsap;
  382. else
  383. llcp_sock->dsap = LLCP_SAP_SDP;
  384. llcp_sock->nfc_protocol = addr->nfc_protocol;
  385. llcp_sock->service_name_len = min_t(unsigned int,
  386. addr->service_name_len,
  387. NFC_LLCP_MAX_SERVICE_NAME);
  388. llcp_sock->service_name = kmemdup(addr->service_name,
  389. llcp_sock->service_name_len,
  390. GFP_KERNEL);
  391. nfc_llcp_sock_link(&local->connecting_sockets, sk);
  392. ret = nfc_llcp_send_connect(llcp_sock);
  393. if (ret)
  394. goto sock_unlink;
  395. ret = sock_wait_state(sk, LLCP_CONNECTED,
  396. sock_sndtimeo(sk, flags & O_NONBLOCK));
  397. if (ret)
  398. goto sock_unlink;
  399. release_sock(sk);
  400. return 0;
  401. sock_unlink:
  402. nfc_llcp_put_ssap(local, llcp_sock->ssap);
  403. nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
  404. put_dev:
  405. nfc_put_device(dev);
  406. error:
  407. release_sock(sk);
  408. return ret;
  409. }
  410. static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
  411. struct msghdr *msg, size_t len)
  412. {
  413. struct sock *sk = sock->sk;
  414. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  415. int ret;
  416. pr_debug("sock %p sk %p", sock, sk);
  417. ret = sock_error(sk);
  418. if (ret)
  419. return ret;
  420. if (msg->msg_flags & MSG_OOB)
  421. return -EOPNOTSUPP;
  422. lock_sock(sk);
  423. if (sk->sk_state != LLCP_CONNECTED) {
  424. release_sock(sk);
  425. return -ENOTCONN;
  426. }
  427. release_sock(sk);
  428. return nfc_llcp_send_i_frame(llcp_sock, msg, len);
  429. }
  430. static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
  431. struct msghdr *msg, size_t len, int flags)
  432. {
  433. int noblock = flags & MSG_DONTWAIT;
  434. struct sock *sk = sock->sk;
  435. unsigned int copied, rlen;
  436. struct sk_buff *skb, *cskb;
  437. int err = 0;
  438. pr_debug("%p %zu\n", sk, len);
  439. lock_sock(sk);
  440. if (sk->sk_state == LLCP_CLOSED &&
  441. skb_queue_empty(&sk->sk_receive_queue)) {
  442. release_sock(sk);
  443. return 0;
  444. }
  445. release_sock(sk);
  446. if (flags & (MSG_OOB))
  447. return -EOPNOTSUPP;
  448. skb = skb_recv_datagram(sk, flags, noblock, &err);
  449. if (!skb) {
  450. pr_err("Recv datagram failed state %d %d %d",
  451. sk->sk_state, err, sock_error(sk));
  452. if (sk->sk_shutdown & RCV_SHUTDOWN)
  453. return 0;
  454. return err;
  455. }
  456. rlen = skb->len; /* real length of skb */
  457. copied = min_t(unsigned int, rlen, len);
  458. cskb = skb;
  459. if (memcpy_toiovec(msg->msg_iov, cskb->data, copied)) {
  460. if (!(flags & MSG_PEEK))
  461. skb_queue_head(&sk->sk_receive_queue, skb);
  462. return -EFAULT;
  463. }
  464. /* Mark read part of skb as used */
  465. if (!(flags & MSG_PEEK)) {
  466. /* SOCK_STREAM: re-queue skb if it contains unreceived data */
  467. if (sk->sk_type == SOCK_STREAM) {
  468. skb_pull(skb, copied);
  469. if (skb->len) {
  470. skb_queue_head(&sk->sk_receive_queue, skb);
  471. goto done;
  472. }
  473. }
  474. kfree_skb(skb);
  475. }
  476. /* XXX Queue backlogged skbs */
  477. done:
  478. /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
  479. if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
  480. copied = rlen;
  481. return copied;
  482. }
  483. static const struct proto_ops llcp_sock_ops = {
  484. .family = PF_NFC,
  485. .owner = THIS_MODULE,
  486. .bind = llcp_sock_bind,
  487. .connect = llcp_sock_connect,
  488. .release = llcp_sock_release,
  489. .socketpair = sock_no_socketpair,
  490. .accept = llcp_sock_accept,
  491. .getname = llcp_sock_getname,
  492. .poll = llcp_sock_poll,
  493. .ioctl = sock_no_ioctl,
  494. .listen = llcp_sock_listen,
  495. .shutdown = sock_no_shutdown,
  496. .setsockopt = sock_no_setsockopt,
  497. .getsockopt = sock_no_getsockopt,
  498. .sendmsg = llcp_sock_sendmsg,
  499. .recvmsg = llcp_sock_recvmsg,
  500. .mmap = sock_no_mmap,
  501. };
  502. static void llcp_sock_destruct(struct sock *sk)
  503. {
  504. struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
  505. pr_debug("%p\n", sk);
  506. if (sk->sk_state == LLCP_CONNECTED)
  507. nfc_put_device(llcp_sock->dev);
  508. skb_queue_purge(&sk->sk_receive_queue);
  509. nfc_llcp_sock_free(llcp_sock);
  510. if (!sock_flag(sk, SOCK_DEAD)) {
  511. pr_err("Freeing alive NFC LLCP socket %p\n", sk);
  512. return;
  513. }
  514. }
  515. struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
  516. {
  517. struct sock *sk;
  518. struct nfc_llcp_sock *llcp_sock;
  519. sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
  520. if (!sk)
  521. return NULL;
  522. llcp_sock = nfc_llcp_sock(sk);
  523. sock_init_data(sock, sk);
  524. sk->sk_state = LLCP_CLOSED;
  525. sk->sk_protocol = NFC_SOCKPROTO_LLCP;
  526. sk->sk_type = type;
  527. sk->sk_destruct = llcp_sock_destruct;
  528. llcp_sock->ssap = 0;
  529. llcp_sock->dsap = LLCP_SAP_SDP;
  530. llcp_sock->rw = LLCP_DEFAULT_RW;
  531. llcp_sock->miu = LLCP_DEFAULT_MIU;
  532. llcp_sock->send_n = llcp_sock->send_ack_n = 0;
  533. llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
  534. llcp_sock->remote_ready = 1;
  535. llcp_sock->reserved_ssap = LLCP_SAP_MAX;
  536. skb_queue_head_init(&llcp_sock->tx_queue);
  537. skb_queue_head_init(&llcp_sock->tx_pending_queue);
  538. skb_queue_head_init(&llcp_sock->tx_backlog_queue);
  539. INIT_LIST_HEAD(&llcp_sock->accept_queue);
  540. if (sock != NULL)
  541. sock->state = SS_UNCONNECTED;
  542. return sk;
  543. }
  544. void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
  545. {
  546. kfree(sock->service_name);
  547. skb_queue_purge(&sock->tx_queue);
  548. skb_queue_purge(&sock->tx_pending_queue);
  549. skb_queue_purge(&sock->tx_backlog_queue);
  550. list_del_init(&sock->accept_queue);
  551. sock->parent = NULL;
  552. nfc_llcp_local_put(sock->local);
  553. }
  554. static int llcp_sock_create(struct net *net, struct socket *sock,
  555. const struct nfc_protocol *nfc_proto)
  556. {
  557. struct sock *sk;
  558. pr_debug("%p\n", sock);
  559. if (sock->type != SOCK_STREAM && sock->type != SOCK_DGRAM)
  560. return -ESOCKTNOSUPPORT;
  561. sock->ops = &llcp_sock_ops;
  562. sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
  563. if (sk == NULL)
  564. return -ENOMEM;
  565. return 0;
  566. }
  567. static const struct nfc_protocol llcp_nfc_proto = {
  568. .id = NFC_SOCKPROTO_LLCP,
  569. .proto = &llcp_sock_proto,
  570. .owner = THIS_MODULE,
  571. .create = llcp_sock_create
  572. };
  573. int __init nfc_llcp_sock_init(void)
  574. {
  575. return nfc_proto_register(&llcp_nfc_proto);
  576. }
  577. void nfc_llcp_sock_exit(void)
  578. {
  579. nfc_proto_unregister(&llcp_nfc_proto);
  580. }