4 * Phonet pipe protocol end point socket
6 * Copyright (C) 2008 Nokia Corporation.
8 * Author: RĂ©mi Denis-Courmont <remi.denis-courmont@nokia.com>
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * version 2 as published by the Free Software Foundation.
14 * This program is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
25 #include <linux/kernel.h>
26 #include <linux/socket.h>
28 #include <net/tcp_states.h>
29 #include <asm/ioctls.h>
31 #include <linux/phonet.h>
32 #include <net/phonet/phonet.h>
33 #include <net/phonet/pep.h>
36 * TCP_CLOSE sock not in use yet
37 * TCP_CLOSE_WAIT disconnected pipe
38 * TCP_LISTEN listening pipe endpoint
39 * TCP_SYN_RECV connected pipe in disabled state
40 * TCP_ESTABLISHED connected pipe in enabled state
43 * - sk_state, ackq, hlist: sock lock needed
44 * - listener: read only
45 * - pipe_handle: read only
48 #define CREDITS_MAX 10
51 static const struct sockaddr_pn pipe_srv = {
52 .spn_family = AF_PHONET,
53 .spn_resource = 0xD9, /* pipe service */
56 #define pep_sb_size(s) (((s) + 5) & ~3) /* 2-bytes head, 32-bits aligned */
58 /* Get the next TLV sub-block. */
59 static unsigned char *pep_get_sb(struct sk_buff *skb, u8 *ptype, u8 *plen,
69 ph = skb_header_pointer(skb, 0, 2, &h);
70 if (ph == NULL || ph->sb_len < 2 || !pskb_may_pull(skb, ph->sb_len))
76 if (buflen > ph->sb_len)
78 data = skb_header_pointer(skb, 2, buflen, buf);
79 __skb_pull(skb, 2 + ph->sb_len);
83 static int pep_reply(struct sock *sk, struct sk_buff *oskb,
84 u8 code, const void *data, int len, gfp_t priority)
86 const struct pnpipehdr *oph = pnp_hdr(oskb);
90 skb = alloc_skb(MAX_PNPIPE_HEADER + len, priority);
93 skb_set_owner_w(skb, sk);
95 skb_reserve(skb, MAX_PNPIPE_HEADER);
97 skb_copy_to_linear_data(skb, data, len);
98 __skb_push(skb, sizeof(*ph));
99 skb_reset_transport_header(skb);
101 ph->utid = oph->utid;
102 ph->message_id = oph->message_id + 1; /* REQ -> RESP */
103 ph->pipe_handle = oph->pipe_handle;
104 ph->error_code = code;
106 return pn_skb_send(sk, skb, &pipe_srv);
110 static int pep_accept_conn(struct sock *sk, struct sk_buff *skb)
112 static const u8 data[20] = {
113 PAD, PAD, PAD, 2 /* sub-blocks */,
114 PN_PIPE_SB_REQUIRED_FC_TX, pep_sb_size(5), 3, PAD,
115 PN_MULTI_CREDIT_FLOW_CONTROL,
116 PN_ONE_CREDIT_FLOW_CONTROL,
117 PN_LEGACY_FLOW_CONTROL,
119 PN_PIPE_SB_PREFERRED_FC_RX, pep_sb_size(5), 3, PAD,
120 PN_MULTI_CREDIT_FLOW_CONTROL,
121 PN_ONE_CREDIT_FLOW_CONTROL,
122 PN_LEGACY_FLOW_CONTROL,
127 return pep_reply(sk, skb, PN_PIPE_NO_ERROR, data, sizeof(data),
131 static int pep_reject_conn(struct sock *sk, struct sk_buff *skb, u8 code)
133 static const u8 data[4] = { PAD, PAD, PAD, 0 /* sub-blocks */ };
134 WARN_ON(code == PN_PIPE_NO_ERROR);
135 return pep_reply(sk, skb, code, data, sizeof(data), GFP_ATOMIC);
138 /* Control requests are not sent by the pipe service and have a specific
140 static int pep_ctrlreq_error(struct sock *sk, struct sk_buff *oskb, u8 code,
143 const struct pnpipehdr *oph = pnp_hdr(oskb);
145 struct pnpipehdr *ph;
146 struct sockaddr_pn dst;
148 skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
151 skb_set_owner_w(skb, sk);
153 skb_reserve(skb, MAX_PHONET_HEADER);
154 ph = (struct pnpipehdr *)skb_put(skb, sizeof(*ph) + 4);
156 ph->utid = oph->utid;
157 ph->message_id = PNS_PEP_CTRL_RESP;
158 ph->pipe_handle = oph->pipe_handle;
159 ph->data[0] = oph->data[1]; /* CTRL id */
160 ph->data[1] = oph->data[0]; /* PEP type */
161 ph->data[2] = code; /* error code, at an usual offset */
165 pn_skb_get_src_sockaddr(oskb, &dst);
166 return pn_skb_send(sk, skb, &dst);
169 static int pipe_snd_status(struct sock *sk, u8 type, u8 status, gfp_t priority)
171 struct pep_sock *pn = pep_sk(sk);
172 struct pnpipehdr *ph;
175 skb = alloc_skb(MAX_PNPIPE_HEADER + 4, priority);
178 skb_set_owner_w(skb, sk);
180 skb_reserve(skb, MAX_PNPIPE_HEADER + 4);
181 __skb_push(skb, sizeof(*ph) + 4);
182 skb_reset_transport_header(skb);
185 ph->message_id = PNS_PEP_STATUS_IND;
186 ph->pipe_handle = pn->pipe_handle;
187 ph->pep_type = PN_PEP_TYPE_COMMON;
191 ph->data[4] = status;
193 return pn_skb_send(sk, skb, &pipe_srv);
196 /* Send our RX flow control information to the sender.
197 * Socket must be locked. */
198 static void pipe_grant_credits(struct sock *sk)
200 struct pep_sock *pn = pep_sk(sk);
202 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
205 case PN_LEGACY_FLOW_CONTROL: /* TODO */
207 case PN_ONE_CREDIT_FLOW_CONTROL:
208 pipe_snd_status(sk, PN_PEP_IND_FLOW_CONTROL,
209 PEP_IND_READY, GFP_ATOMIC);
212 case PN_MULTI_CREDIT_FLOW_CONTROL:
213 if ((pn->rx_credits + CREDITS_THR) > CREDITS_MAX)
215 if (pipe_snd_status(sk, PN_PEP_IND_ID_MCFC_GRANT_CREDITS,
216 CREDITS_MAX - pn->rx_credits,
218 pn->rx_credits = CREDITS_MAX;
223 static int pipe_rcv_status(struct sock *sk, struct sk_buff *skb)
225 struct pep_sock *pn = pep_sk(sk);
226 struct pnpipehdr *hdr = pnp_hdr(skb);
228 if (!pskb_may_pull(skb, sizeof(*hdr) + 4))
231 if (hdr->data[0] != PN_PEP_TYPE_COMMON) {
232 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP type: %u\n",
233 (unsigned)hdr->data[0]);
237 switch (hdr->data[1]) {
238 case PN_PEP_IND_FLOW_CONTROL:
240 case PN_LEGACY_FLOW_CONTROL:
241 switch (hdr->data[4]) {
250 case PN_ONE_CREDIT_FLOW_CONTROL:
251 if (hdr->data[4] == PEP_IND_READY)
257 case PN_PEP_IND_ID_MCFC_GRANT_CREDITS:
258 if (pn->tx_fc != PN_MULTI_CREDIT_FLOW_CONTROL)
260 if (pn->tx_credits + hdr->data[4] > 0xff)
261 pn->tx_credits = 0xff;
263 pn->tx_credits += hdr->data[4];
267 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP indication: %u\n",
268 (unsigned)hdr->data[1]);
272 sk->sk_write_space(sk);
276 static int pipe_rcv_created(struct sock *sk, struct sk_buff *skb)
278 struct pep_sock *pn = pep_sk(sk);
279 struct pnpipehdr *hdr = pnp_hdr(skb);
280 u8 n_sb = hdr->data[0];
282 pn->rx_fc = pn->tx_fc = PN_LEGACY_FLOW_CONTROL;
283 __skb_pull(skb, sizeof(*hdr));
285 u8 type, buf[2], len = sizeof(buf);
286 u8 *data = pep_get_sb(skb, &type, &len, buf);
291 case PN_PIPE_SB_NEGOTIATED_FC:
292 if (len < 2 || (data[0] | data[1]) > 3)
294 pn->tx_fc = data[0] & 3;
295 pn->rx_fc = data[1] & 3;
303 /* Queue an skb to a connected sock.
304 * Socket lock must be held. */
305 static int pipe_do_rcv(struct sock *sk, struct sk_buff *skb)
307 struct pep_sock *pn = pep_sk(sk);
308 struct pnpipehdr *hdr = pnp_hdr(skb);
309 struct sk_buff_head *queue;
312 BUG_ON(sk->sk_state == TCP_CLOSE_WAIT);
314 switch (hdr->message_id) {
315 case PNS_PEP_CONNECT_REQ:
316 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
319 case PNS_PEP_DISCONNECT_REQ:
320 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
321 sk->sk_state = TCP_CLOSE_WAIT;
322 if (!sock_flag(sk, SOCK_DEAD))
323 sk->sk_state_change(sk);
326 case PNS_PEP_ENABLE_REQ:
327 /* Wait for PNS_PIPE_(ENABLED|REDIRECTED)_IND */
328 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
331 case PNS_PEP_RESET_REQ:
332 switch (hdr->state_after_reset) {
333 case PN_PIPE_DISABLE:
339 default: /* not allowed to send an error here!? */
344 case PNS_PEP_DISABLE_REQ:
346 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
349 case PNS_PEP_CTRL_REQ:
350 if (skb_queue_len(&pn->ctrlreq_queue) >= PNPIPE_CTRLREQ_MAX)
353 queue = &pn->ctrlreq_queue;
357 __skb_pull(skb, 3); /* Pipe data header */
358 if (!pn_flow_safe(pn->rx_fc)) {
359 err = sock_queue_rcv_skb(sk, skb);
365 if (pn->rx_credits == 0) {
370 queue = &sk->sk_receive_queue;
373 case PNS_PEP_STATUS_IND:
374 pipe_rcv_status(sk, skb);
377 case PNS_PIPE_REDIRECTED_IND:
378 err = pipe_rcv_created(sk, skb);
381 case PNS_PIPE_CREATED_IND:
382 err = pipe_rcv_created(sk, skb);
386 case PNS_PIPE_RESET_IND:
387 if (!pn->init_enable)
390 case PNS_PIPE_ENABLED_IND:
391 if (!pn_flow_safe(pn->tx_fc)) {
393 sk->sk_write_space(sk);
395 if (sk->sk_state == TCP_ESTABLISHED)
396 break; /* Nothing to do */
397 sk->sk_state = TCP_ESTABLISHED;
398 pipe_grant_credits(sk);
401 case PNS_PIPE_DISABLED_IND:
402 sk->sk_state = TCP_SYN_RECV;
407 LIMIT_NETDEBUG(KERN_DEBUG"Phonet unknown PEP message: %u\n",
417 skb_set_owner_r(skb, sk);
419 skb_queue_tail(queue, skb);
420 if (!sock_flag(sk, SOCK_DEAD))
421 sk->sk_data_ready(sk, err);
425 /* Destroy connected sock. */
426 static void pipe_destruct(struct sock *sk)
428 struct pep_sock *pn = pep_sk(sk);
430 skb_queue_purge(&sk->sk_receive_queue);
431 skb_queue_purge(&pn->ctrlreq_queue);
434 static int pep_connreq_rcv(struct sock *sk, struct sk_buff *skb)
437 struct pep_sock *newpn, *pn = pep_sk(sk);
438 struct pnpipehdr *hdr;
439 struct sockaddr_pn dst;
441 u8 pipe_handle, enabled, n_sb;
443 if (!pskb_pull(skb, sizeof(*hdr) + 4))
447 pipe_handle = hdr->pipe_handle;
448 switch (hdr->state_after_connect) {
449 case PN_PIPE_DISABLE:
456 pep_reject_conn(sk, skb, PN_PIPE_ERR_INVALID_PARAM);
459 peer_type = hdr->other_pep_type << 8;
461 if (unlikely(sk->sk_state != TCP_LISTEN) || sk_acceptq_is_full(sk)) {
462 pep_reject_conn(sk, skb, PN_PIPE_ERR_PEP_IN_USE);
466 /* Parse sub-blocks (options) */
469 u8 type, buf[1], len = sizeof(buf);
470 const u8 *data = pep_get_sb(skb, &type, &len, buf);
475 case PN_PIPE_SB_CONNECT_REQ_PEP_SUB_TYPE:
478 peer_type = (peer_type & 0xff00) | data[0];
484 skb = skb_clone(skb, GFP_ATOMIC);
488 /* Create a new to-be-accepted sock */
489 newsk = sk_alloc(sock_net(sk), PF_PHONET, GFP_ATOMIC, sk->sk_prot);
494 sock_init_data(NULL, newsk);
495 newsk->sk_state = TCP_SYN_RECV;
496 newsk->sk_backlog_rcv = pipe_do_rcv;
497 newsk->sk_protocol = sk->sk_protocol;
498 newsk->sk_destruct = pipe_destruct;
500 newpn = pep_sk(newsk);
501 pn_skb_get_dst_sockaddr(skb, &dst);
502 newpn->pn_sk.sobject = pn_sockaddr_get_object(&dst);
503 newpn->pn_sk.resource = pn->pn_sk.resource;
504 skb_queue_head_init(&newpn->ctrlreq_queue);
505 newpn->pipe_handle = pipe_handle;
506 newpn->peer_type = peer_type;
507 newpn->rx_credits = newpn->tx_credits = 0;
508 newpn->rx_fc = newpn->tx_fc = PN_LEGACY_FLOW_CONTROL;
509 newpn->init_enable = enabled;
511 BUG_ON(!skb_queue_empty(&newsk->sk_receive_queue));
512 skb_queue_head(&newsk->sk_receive_queue, skb);
513 if (!sock_flag(sk, SOCK_DEAD))
514 sk->sk_data_ready(sk, 0);
516 sk_acceptq_added(sk);
517 sk_add_node(newsk, &pn->ackq);
521 /* Listening sock must be locked */
522 static struct sock *pep_find_pipe(const struct hlist_head *hlist,
523 const struct sockaddr_pn *dst,
526 struct hlist_node *node;
528 u16 dobj = pn_sockaddr_get_object(dst);
530 sk_for_each(sknode, node, hlist) {
531 struct pep_sock *pnnode = pep_sk(sknode);
533 /* Ports match, but addresses might not: */
534 if (pnnode->pn_sk.sobject != dobj)
536 if (pnnode->pipe_handle != pipe_handle)
538 if (sknode->sk_state == TCP_CLOSE_WAIT)
548 * Deliver an skb to a listening sock.
549 * Socket lock must be held.
550 * We then queue the skb to the right connected sock (if any).
552 static int pep_do_rcv(struct sock *sk, struct sk_buff *skb)
554 struct pep_sock *pn = pep_sk(sk);
556 struct pnpipehdr *hdr = pnp_hdr(skb);
557 struct sockaddr_pn dst;
558 int err = NET_RX_SUCCESS;
561 if (!pskb_may_pull(skb, sizeof(*hdr)))
565 pipe_handle = hdr->pipe_handle;
566 if (pipe_handle == PN_PIPE_INVALID_HANDLE)
569 pn_skb_get_dst_sockaddr(skb, &dst);
571 /* Look for an existing pipe handle */
572 sknode = pep_find_pipe(&pn->hlist, &dst, pipe_handle);
574 return sk_receive_skb(sknode, skb, 1);
576 /* Look for a pipe handle pending accept */
577 sknode = pep_find_pipe(&pn->ackq, &dst, pipe_handle);
581 printk(KERN_WARNING"Phonet unconnected PEP ignored");
586 switch (hdr->message_id) {
587 case PNS_PEP_CONNECT_REQ:
588 err = pep_connreq_rcv(sk, skb);
591 case PNS_PEP_DISCONNECT_REQ:
592 pep_reply(sk, skb, PN_PIPE_NO_ERROR, NULL, 0, GFP_ATOMIC);
595 case PNS_PEP_CTRL_REQ:
596 pep_ctrlreq_error(sk, skb, PN_PIPE_INVALID_HANDLE, GFP_ATOMIC);
599 case PNS_PEP_RESET_REQ:
600 case PNS_PEP_ENABLE_REQ:
601 case PNS_PEP_DISABLE_REQ:
602 /* invalid handle is not even allowed here! */
611 /* associated socket ceases to exist */
612 static void pep_sock_close(struct sock *sk, long timeout)
614 struct pep_sock *pn = pep_sk(sk);
616 sk_common_release(sk);
619 if (sk->sk_state == TCP_LISTEN) {
620 /* Destroy the listen queue */
622 struct hlist_node *p, *n;
624 sk_for_each_safe(sknode, p, n, &pn->ackq)
625 sk_del_node_init(sknode);
626 sk->sk_state = TCP_CLOSE;
631 static int pep_wait_connreq(struct sock *sk, int noblock)
633 struct task_struct *tsk = current;
634 struct pep_sock *pn = pep_sk(sk);
635 long timeo = sock_rcvtimeo(sk, noblock);
640 if (sk->sk_state != TCP_LISTEN)
642 if (!hlist_empty(&pn->ackq))
646 if (signal_pending(tsk))
647 return sock_intr_errno(timeo);
649 prepare_to_wait_exclusive(&sk->sk_socket->wait, &wait,
652 timeo = schedule_timeout(timeo);
654 finish_wait(&sk->sk_socket->wait, &wait);
660 static struct sock *pep_sock_accept(struct sock *sk, int flags, int *errp)
662 struct pep_sock *pn = pep_sk(sk);
663 struct sock *newsk = NULL;
664 struct sk_buff *oskb;
668 err = pep_wait_connreq(sk, flags & O_NONBLOCK);
672 newsk = __sk_head(&pn->ackq);
674 oskb = skb_dequeue(&newsk->sk_receive_queue);
675 err = pep_accept_conn(newsk, oskb);
677 skb_queue_head(&newsk->sk_receive_queue, oskb);
683 pep_sk(newsk)->listener = sk;
686 sk_del_node_init(newsk);
687 sk_acceptq_removed(sk);
688 sk_add_node(newsk, &pn->hlist);
697 static int pep_ioctl(struct sock *sk, int cmd, unsigned long arg)
699 struct pep_sock *pn = pep_sk(sk);
704 if (sk->sk_state == TCP_LISTEN)
708 if (sock_flag(sk, SOCK_URGINLINE)
709 && !skb_queue_empty(&pn->ctrlreq_queue))
710 answ = skb_peek(&pn->ctrlreq_queue)->len;
711 else if (!skb_queue_empty(&sk->sk_receive_queue))
712 answ = skb_peek(&sk->sk_receive_queue)->len;
716 return put_user(answ, (int __user *)arg);
722 static int pep_init(struct sock *sk)
724 struct pep_sock *pn = pep_sk(sk);
726 INIT_HLIST_HEAD(&pn->ackq);
727 INIT_HLIST_HEAD(&pn->hlist);
728 skb_queue_head_init(&pn->ctrlreq_queue);
729 pn->pipe_handle = PN_PIPE_INVALID_HANDLE;
733 static int pep_sendmsg(struct kiocb *iocb, struct sock *sk,
734 struct msghdr *msg, size_t len)
736 struct pep_sock *pn = pep_sk(sk);
737 struct sk_buff *skb = NULL;
738 struct pnpipehdr *ph;
740 int flags = msg->msg_flags;
743 if (msg->msg_flags & MSG_OOB || !(msg->msg_flags & MSG_EOR))
747 timeo = sock_sndtimeo(sk, flags & MSG_DONTWAIT);
748 if ((1 << sk->sk_state) & (TCPF_LISTEN|TCPF_CLOSE)) {
752 if (sk->sk_state != TCP_ESTABLISHED) {
753 /* Wait until the pipe gets to enabled state */
755 err = sk_stream_wait_connect(sk, &timeo);
759 if (sk->sk_state == TCP_CLOSE_WAIT) {
764 BUG_ON(sk->sk_state != TCP_ESTABLISHED);
766 /* Wait until flow control allows TX */
767 done = pn->tx_credits > 0;
775 if (signal_pending(current)) {
776 err = sock_intr_errno(timeo);
780 prepare_to_wait(&sk->sk_socket->wait, &wait,
782 done = sk_wait_event(sk, &timeo, pn->tx_credits > 0);
783 finish_wait(&sk->sk_socket->wait, &wait);
785 if (sk->sk_state != TCP_ESTABLISHED)
790 skb = sock_alloc_send_skb(sk, MAX_PNPIPE_HEADER + len,
791 flags & MSG_DONTWAIT, &err);
794 skb_reserve(skb, MAX_PHONET_HEADER + 3);
796 if (sk->sk_state != TCP_ESTABLISHED || !pn->tx_credits)
797 goto disabled; /* sock_alloc_send_skb might sleep */
800 err = memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len);
805 skb_reset_transport_header(skb);
808 ph->message_id = PNS_PIPE_DATA;
809 ph->pipe_handle = pn->pipe_handle;
810 if (pn_flow_safe(pn->tx_fc)) /* credit-based flow control */
813 err = pn_skb_send(sk, skb, &pipe_srv);
815 err = len; /* success! */
823 static int pep_recvmsg(struct kiocb *iocb, struct sock *sk,
824 struct msghdr *msg, size_t len, int noblock,
825 int flags, int *addr_len)
830 if (unlikely(1 << sk->sk_state & (TCPF_LISTEN | TCPF_CLOSE)))
833 if ((flags & MSG_OOB) || sock_flag(sk, SOCK_URGINLINE)) {
834 /* Dequeue and acknowledge control request */
835 struct pep_sock *pn = pep_sk(sk);
837 skb = skb_dequeue(&pn->ctrlreq_queue);
839 pep_ctrlreq_error(sk, skb, PN_PIPE_NO_ERROR,
841 msg->msg_flags |= MSG_OOB;
848 skb = skb_recv_datagram(sk, flags, noblock, &err);
851 if (err == -ENOTCONN && sk->sk_state == TCP_CLOSE_WAIT)
857 if (sk->sk_state == TCP_ESTABLISHED)
858 pipe_grant_credits(sk);
861 msg->msg_flags |= MSG_EOR;
863 msg->msg_flags |= MSG_TRUNC;
867 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, len);
869 err = (flags & MSG_TRUNC) ? skb->len : len;
871 skb_free_datagram(sk, skb);
875 static void pep_sock_unhash(struct sock *sk)
877 struct pep_sock *pn = pep_sk(sk);
878 struct sock *skparent = NULL;
881 if ((1 << sk->sk_state) & ~(TCPF_CLOSE|TCPF_LISTEN)) {
882 skparent = pn->listener;
883 sk_del_node_init(sk);
887 pn = pep_sk(skparent);
890 /* Unhash a listening sock only when it is closed
891 * and all of its active connected pipes are closed. */
892 if (hlist_empty(&pn->hlist))
893 pn_sock_unhash(&pn->pn_sk.sk);
900 static struct proto pep_proto = {
901 .close = pep_sock_close,
902 .accept = pep_sock_accept,
905 .sendmsg = pep_sendmsg,
906 .recvmsg = pep_recvmsg,
907 .backlog_rcv = pep_do_rcv,
908 .hash = pn_sock_hash,
909 .unhash = pep_sock_unhash,
910 .get_port = pn_sock_get_port,
911 .obj_size = sizeof(struct pep_sock),
912 .owner = THIS_MODULE,
916 static struct phonet_protocol pep_pn_proto = {
917 .ops = &phonet_stream_ops,
919 .sock_type = SOCK_SEQPACKET,
922 static int __init pep_register(void)
924 return phonet_proto_register(PN_PROTO_PIPE, &pep_pn_proto);
927 static void __exit pep_unregister(void)
929 phonet_proto_unregister(PN_PROTO_PIPE, &pep_pn_proto);
932 module_init(pep_register);
933 module_exit(pep_unregister);
934 MODULE_AUTHOR("Remi Denis-Courmont, Nokia");
935 MODULE_DESCRIPTION("Phonet pipe protocol");
936 MODULE_LICENSE("GPL");
937 MODULE_ALIAS_NET_PF_PROTO(PF_PHONET, PN_PROTO_PIPE);