blob: e31dea17473d923795ed6eab82917a926cdb12cd [file] [log] [blame]
Samuel Ortizd6469602011-12-14 16:43:12 +01001/*
2 * Copyright (C) 2011 Intel Corporation. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
Jeff Kirsher98b32de2013-12-06 08:56:16 -080015 * along with this program; if not, see <http://www.gnu.org/licenses/>.
Samuel Ortizd6469602011-12-14 16:43:12 +010016 */
17
18#define pr_fmt(fmt) "llcp: %s: " fmt, __func__
19
20#include <linux/init.h>
21#include <linux/kernel.h>
22#include <linux/module.h>
23#include <linux/nfc.h>
24
Samuel Ortiz30cc4582013-04-26 11:49:40 +020025#include "nfc.h"
Samuel Ortizd6469602011-12-14 16:43:12 +010026#include "llcp.h"
27
Samuel Ortizff353d82012-05-07 12:31:19 +020028static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
29{
30 DECLARE_WAITQUEUE(wait, current);
31 int err = 0;
32
33 pr_debug("sk %p", sk);
34
35 add_wait_queue(sk_sleep(sk), &wait);
36 set_current_state(TASK_INTERRUPTIBLE);
37
38 while (sk->sk_state != state) {
39 if (!timeo) {
40 err = -EINPROGRESS;
41 break;
42 }
43
44 if (signal_pending(current)) {
45 err = sock_intr_errno(timeo);
46 break;
47 }
48
49 release_sock(sk);
50 timeo = schedule_timeout(timeo);
51 lock_sock(sk);
52 set_current_state(TASK_INTERRUPTIBLE);
53
54 err = sock_error(sk);
55 if (err)
56 break;
57 }
58
59 __set_current_state(TASK_RUNNING);
60 remove_wait_queue(sk_sleep(sk), &wait);
61 return err;
62}
63
Samuel Ortizd6469602011-12-14 16:43:12 +010064static struct proto llcp_sock_proto = {
65 .name = "NFC_LLCP",
66 .owner = THIS_MODULE,
67 .obj_size = sizeof(struct nfc_llcp_sock),
68};
69
70static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
71{
72 struct sock *sk = sock->sk;
73 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
74 struct nfc_llcp_local *local;
75 struct nfc_dev *dev;
76 struct sockaddr_nfc_llcp llcp_addr;
77 int len, ret = 0;
78
Mateusz Jurczyk244a7db2017-06-13 18:44:28 +020079 if (!addr || alen < offsetofend(struct sockaddr, sa_family) ||
80 addr->sa_family != AF_NFC)
Samuel Ortizd6469602011-12-14 16:43:12 +010081 return -EINVAL;
82
Samuel Ortizc66433d2012-06-29 12:03:55 +020083 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
84
Samuel Ortizd6469602011-12-14 16:43:12 +010085 memset(&llcp_addr, 0, sizeof(llcp_addr));
86 len = min_t(unsigned int, sizeof(llcp_addr), alen);
87 memcpy(&llcp_addr, addr, len);
88
89 /* This is going to be a listening socket, dsap must be 0 */
90 if (llcp_addr.dsap != 0)
91 return -EINVAL;
92
93 lock_sock(sk);
94
95 if (sk->sk_state != LLCP_CLOSED) {
96 ret = -EBADFD;
97 goto error;
98 }
99
100 dev = nfc_get_device(llcp_addr.dev_idx);
101 if (dev == NULL) {
102 ret = -ENODEV;
103 goto error;
104 }
105
106 local = nfc_llcp_find_local(dev);
107 if (local == NULL) {
108 ret = -ENODEV;
109 goto put_dev;
110 }
111
112 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200113 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100114 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
115 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100116 llcp_addr.service_name_len,
117 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100118 llcp_sock->service_name = kmemdup(llcp_addr.service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100119 llcp_sock->service_name_len,
120 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100121
122 llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200123 if (llcp_sock->ssap == LLCP_SAP_MAX) {
124 ret = -EADDRINUSE;
Samuel Ortizd6469602011-12-14 16:43:12 +0100125 goto put_dev;
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200126 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100127
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200128 llcp_sock->reserved_ssap = llcp_sock->ssap;
129
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200130 nfc_llcp_sock_link(&local->sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100131
132 pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
133
134 sk->sk_state = LLCP_BOUND;
135
136put_dev:
137 nfc_put_device(dev);
138
139error:
140 release_sock(sk);
141 return ret;
142}
143
Thierry Escande4463523b2012-09-26 18:16:44 +0200144static int llcp_raw_sock_bind(struct socket *sock, struct sockaddr *addr,
145 int alen)
146{
147 struct sock *sk = sock->sk;
148 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
149 struct nfc_llcp_local *local;
150 struct nfc_dev *dev;
151 struct sockaddr_nfc_llcp llcp_addr;
152 int len, ret = 0;
153
Mateusz Jurczyk244a7db2017-06-13 18:44:28 +0200154 if (!addr || alen < offsetofend(struct sockaddr, sa_family) ||
155 addr->sa_family != AF_NFC)
Thierry Escande4463523b2012-09-26 18:16:44 +0200156 return -EINVAL;
157
158 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
159
160 memset(&llcp_addr, 0, sizeof(llcp_addr));
161 len = min_t(unsigned int, sizeof(llcp_addr), alen);
162 memcpy(&llcp_addr, addr, len);
163
164 lock_sock(sk);
165
166 if (sk->sk_state != LLCP_CLOSED) {
167 ret = -EBADFD;
168 goto error;
169 }
170
171 dev = nfc_get_device(llcp_addr.dev_idx);
172 if (dev == NULL) {
173 ret = -ENODEV;
174 goto error;
175 }
176
177 local = nfc_llcp_find_local(dev);
178 if (local == NULL) {
179 ret = -ENODEV;
180 goto put_dev;
181 }
182
183 llcp_sock->dev = dev;
184 llcp_sock->local = nfc_llcp_local_get(local);
185 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
186
187 nfc_llcp_sock_link(&local->raw_sockets, sk);
188
189 sk->sk_state = LLCP_BOUND;
190
191put_dev:
192 nfc_put_device(dev);
193
194error:
195 release_sock(sk);
196 return ret;
197}
198
Samuel Ortizd6469602011-12-14 16:43:12 +0100199static int llcp_sock_listen(struct socket *sock, int backlog)
200{
201 struct sock *sk = sock->sk;
202 int ret = 0;
203
204 pr_debug("sk %p backlog %d\n", sk, backlog);
205
206 lock_sock(sk);
207
Szymon Janc874934f2012-10-04 15:15:51 +0200208 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM) ||
209 sk->sk_state != LLCP_BOUND) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100210 ret = -EBADFD;
211 goto error;
212 }
213
214 sk->sk_max_ack_backlog = backlog;
215 sk->sk_ack_backlog = 0;
216
217 pr_debug("Socket listening\n");
218 sk->sk_state = LLCP_LISTEN;
219
220error:
221 release_sock(sk);
222
223 return ret;
224}
225
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100226static int nfc_llcp_setsockopt(struct socket *sock, int level, int optname,
227 char __user *optval, unsigned int optlen)
228{
229 struct sock *sk = sock->sk;
230 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
231 u32 opt;
232 int err = 0;
233
234 pr_debug("%p optname %d\n", sk, optname);
235
236 if (level != SOL_NFC)
237 return -ENOPROTOOPT;
238
239 lock_sock(sk);
240
241 switch (optname) {
242 case NFC_LLCP_RW:
243 if (sk->sk_state == LLCP_CONNECTED ||
244 sk->sk_state == LLCP_BOUND ||
245 sk->sk_state == LLCP_LISTEN) {
246 err = -EINVAL;
247 break;
248 }
249
250 if (get_user(opt, (u32 __user *) optval)) {
251 err = -EFAULT;
252 break;
253 }
254
255 if (opt > LLCP_MAX_RW) {
256 err = -EINVAL;
257 break;
258 }
259
260 llcp_sock->rw = (u8) opt;
261
262 break;
263
264 case NFC_LLCP_MIUX:
265 if (sk->sk_state == LLCP_CONNECTED ||
266 sk->sk_state == LLCP_BOUND ||
267 sk->sk_state == LLCP_LISTEN) {
268 err = -EINVAL;
269 break;
270 }
271
272 if (get_user(opt, (u32 __user *) optval)) {
273 err = -EFAULT;
274 break;
275 }
276
277 if (opt > LLCP_MAX_MIUX) {
278 err = -EINVAL;
279 break;
280 }
281
Samuel Ortiz5eef6662013-03-20 16:06:12 +0100282 llcp_sock->miux = cpu_to_be16((u16) opt);
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100283
284 break;
285
286 default:
287 err = -ENOPROTOOPT;
288 break;
289 }
290
291 release_sock(sk);
292
Samuel Ortiz06d44f82013-02-22 11:38:05 +0100293 pr_debug("%p rw %d miux %d\n", llcp_sock,
294 llcp_sock->rw, llcp_sock->miux);
295
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100296 return err;
297}
298
299static int nfc_llcp_getsockopt(struct socket *sock, int level, int optname,
300 char __user *optval, int __user *optlen)
301{
Samuel Ortiz00e856d2013-03-20 16:36:13 +0100302 struct nfc_llcp_local *local;
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100303 struct sock *sk = sock->sk;
304 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
305 int len, err = 0;
Thierry Escande064f3702013-04-02 10:25:16 +0200306 u16 miux, remote_miu;
Samuel Ortiz00e856d2013-03-20 16:36:13 +0100307 u8 rw;
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100308
309 pr_debug("%p optname %d\n", sk, optname);
310
311 if (level != SOL_NFC)
312 return -ENOPROTOOPT;
313
314 if (get_user(len, optlen))
315 return -EFAULT;
316
Samuel Ortiz00e856d2013-03-20 16:36:13 +0100317 local = llcp_sock->local;
318 if (!local)
319 return -ENODEV;
320
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100321 len = min_t(u32, len, sizeof(u32));
322
323 lock_sock(sk);
324
325 switch (optname) {
326 case NFC_LLCP_RW:
Samuel Ortiz00e856d2013-03-20 16:36:13 +0100327 rw = llcp_sock->rw > LLCP_MAX_RW ? local->rw : llcp_sock->rw;
328 if (put_user(rw, (u32 __user *) optval))
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100329 err = -EFAULT;
330
331 break;
332
333 case NFC_LLCP_MIUX:
Samuel Ortiz00e856d2013-03-20 16:36:13 +0100334 miux = be16_to_cpu(llcp_sock->miux) > LLCP_MAX_MIUX ?
335 be16_to_cpu(local->miux) : be16_to_cpu(llcp_sock->miux);
336
337 if (put_user(miux, (u32 __user *) optval))
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100338 err = -EFAULT;
339
340 break;
341
Thierry Escande064f3702013-04-02 10:25:16 +0200342 case NFC_LLCP_REMOTE_MIU:
343 remote_miu = llcp_sock->remote_miu > LLCP_MAX_MIU ?
344 local->remote_miu : llcp_sock->remote_miu;
345
346 if (put_user(remote_miu, (u32 __user *) optval))
347 err = -EFAULT;
348
349 break;
350
351 case NFC_LLCP_REMOTE_LTO:
352 if (put_user(local->remote_lto / 10, (u32 __user *) optval))
353 err = -EFAULT;
354
355 break;
356
357 case NFC_LLCP_REMOTE_RW:
358 if (put_user(llcp_sock->remote_rw, (u32 __user *) optval))
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100359 err = -EFAULT;
360
361 break;
362
363 default:
364 err = -ENOPROTOOPT;
365 break;
366 }
367
368 release_sock(sk);
369
370 if (put_user(len, optlen))
371 return -EFAULT;
372
373 return err;
374}
375
Samuel Ortizd6469602011-12-14 16:43:12 +0100376void nfc_llcp_accept_unlink(struct sock *sk)
377{
378 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
379
380 pr_debug("state %d\n", sk->sk_state);
381
382 list_del_init(&llcp_sock->accept_queue);
383 sk_acceptq_removed(llcp_sock->parent);
384 llcp_sock->parent = NULL;
385
386 sock_put(sk);
387}
388
389void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
390{
391 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
392 struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
393
394 /* Lock will be free from unlink */
395 sock_hold(sk);
396
397 list_add_tail(&llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100398 &llcp_sock_parent->accept_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100399 llcp_sock->parent = parent;
400 sk_acceptq_added(parent);
401}
402
403struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100404 struct socket *newsock)
Samuel Ortizd6469602011-12-14 16:43:12 +0100405{
406 struct nfc_llcp_sock *lsk, *n, *llcp_parent;
407 struct sock *sk;
408
409 llcp_parent = nfc_llcp_sock(parent);
410
411 list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100412 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100413 sk = &lsk->sk;
414 lock_sock(sk);
415
416 if (sk->sk_state == LLCP_CLOSED) {
417 release_sock(sk);
418 nfc_llcp_accept_unlink(sk);
419 continue;
420 }
421
422 if (sk->sk_state == LLCP_CONNECTED || !newsock) {
Samuel Ortiz39a352a2013-03-26 14:35:57 +0100423 list_del_init(&lsk->accept_queue);
424 sock_put(sk);
425
Samuel Ortizd6469602011-12-14 16:43:12 +0100426 if (newsock)
427 sock_graft(sk, newsock);
428
429 release_sock(sk);
430
431 pr_debug("Returning sk state %d\n", sk->sk_state);
432
Samuel Ortizb141e812013-02-21 11:04:45 +0100433 sk_acceptq_removed(parent);
434
Samuel Ortizd6469602011-12-14 16:43:12 +0100435 return sk;
436 }
437
438 release_sock(sk);
439 }
440
441 return NULL;
442}
443
444static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100445 int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100446{
447 DECLARE_WAITQUEUE(wait, current);
448 struct sock *sk = sock->sk, *new_sk;
449 long timeo;
450 int ret = 0;
451
452 pr_debug("parent %p\n", sk);
453
454 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
455
456 if (sk->sk_state != LLCP_LISTEN) {
457 ret = -EBADFD;
458 goto error;
459 }
460
461 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
462
463 /* Wait for an incoming connection. */
464 add_wait_queue_exclusive(sk_sleep(sk), &wait);
465 while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
466 set_current_state(TASK_INTERRUPTIBLE);
467
468 if (!timeo) {
469 ret = -EAGAIN;
470 break;
471 }
472
473 if (signal_pending(current)) {
474 ret = sock_intr_errno(timeo);
475 break;
476 }
477
478 release_sock(sk);
479 timeo = schedule_timeout(timeo);
480 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
481 }
482 __set_current_state(TASK_RUNNING);
483 remove_wait_queue(sk_sleep(sk), &wait);
484
485 if (ret)
486 goto error;
487
488 newsock->state = SS_CONNECTED;
489
490 pr_debug("new socket %p\n", new_sk);
491
492error:
493 release_sock(sk);
494
495 return ret;
496}
497
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200498static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
Samuel Ortizd6469602011-12-14 16:43:12 +0100499 int *len, int peer)
500{
Samuel Ortizd6469602011-12-14 16:43:12 +0100501 struct sock *sk = sock->sk;
502 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200503 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
Samuel Ortizd6469602011-12-14 16:43:12 +0100504
Samuel Ortizfe3c0942012-07-05 17:43:08 +0200505 if (llcp_sock == NULL || llcp_sock->dev == NULL)
506 return -EBADFD;
507
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200508 pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
509 llcp_sock->dsap, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100510
Dan Carpenter5ffedc62013-04-22 20:24:52 +0000511 memset(llcp_addr, 0, sizeof(*llcp_addr));
Samuel Ortizd6469602011-12-14 16:43:12 +0100512 *len = sizeof(struct sockaddr_nfc_llcp);
513
Cong Wang03c05352016-01-29 11:37:40 -0800514 lock_sock(sk);
515 if (!llcp_sock->dev) {
516 release_sock(sk);
517 return -EBADFD;
518 }
Dan Carpenter5ffedc62013-04-22 20:24:52 +0000519 llcp_addr->sa_family = AF_NFC;
Samuel Ortizd6469602011-12-14 16:43:12 +0100520 llcp_addr->dev_idx = llcp_sock->dev->idx;
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200521 llcp_addr->target_idx = llcp_sock->target_idx;
Dan Carpenter5ffedc62013-04-22 20:24:52 +0000522 llcp_addr->nfc_protocol = llcp_sock->nfc_protocol;
Samuel Ortizd6469602011-12-14 16:43:12 +0100523 llcp_addr->dsap = llcp_sock->dsap;
524 llcp_addr->ssap = llcp_sock->ssap;
525 llcp_addr->service_name_len = llcp_sock->service_name_len;
526 memcpy(llcp_addr->service_name, llcp_sock->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100527 llcp_addr->service_name_len);
Cong Wang03c05352016-01-29 11:37:40 -0800528 release_sock(sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100529
530 return 0;
531}
532
533static inline unsigned int llcp_accept_poll(struct sock *parent)
534{
Axel Lin413df102014-11-06 18:20:41 +0800535 struct nfc_llcp_sock *llcp_sock, *parent_sock;
Samuel Ortizd6469602011-12-14 16:43:12 +0100536 struct sock *sk;
537
538 parent_sock = nfc_llcp_sock(parent);
539
Axel Lin413df102014-11-06 18:20:41 +0800540 list_for_each_entry(llcp_sock, &parent_sock->accept_queue,
541 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100542 sk = &llcp_sock->sk;
543
544 if (sk->sk_state == LLCP_CONNECTED)
545 return POLLIN | POLLRDNORM;
546 }
547
548 return 0;
549}
550
551static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100552 poll_table *wait)
Samuel Ortizd6469602011-12-14 16:43:12 +0100553{
554 struct sock *sk = sock->sk;
555 unsigned int mask = 0;
556
557 pr_debug("%p\n", sk);
558
559 sock_poll_wait(file, sk_sleep(sk), wait);
560
561 if (sk->sk_state == LLCP_LISTEN)
562 return llcp_accept_poll(sk);
563
564 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
Keller, Jacob E7d4c04f2013-03-28 11:19:25 +0000565 mask |= POLLERR |
Jacob Keller8facd5f2013-04-02 13:55:40 -0700566 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? POLLPRI : 0);
Samuel Ortizd6469602011-12-14 16:43:12 +0100567
568 if (!skb_queue_empty(&sk->sk_receive_queue))
Samuel Ortiz4260c132012-05-07 12:31:20 +0200569 mask |= POLLIN | POLLRDNORM;
Samuel Ortizd6469602011-12-14 16:43:12 +0100570
571 if (sk->sk_state == LLCP_CLOSED)
572 mask |= POLLHUP;
573
Samuel Ortiz4260c132012-05-07 12:31:20 +0200574 if (sk->sk_shutdown & RCV_SHUTDOWN)
575 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
576
577 if (sk->sk_shutdown == SHUTDOWN_MASK)
578 mask |= POLLHUP;
579
Samuel Ortizb4011232013-05-03 18:29:30 +0200580 if (sock_writeable(sk) && sk->sk_state == LLCP_CONNECTED)
Samuel Ortiz4260c132012-05-07 12:31:20 +0200581 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
582 else
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800583 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Samuel Ortiz4260c132012-05-07 12:31:20 +0200584
585 pr_debug("mask 0x%x\n", mask);
586
Samuel Ortizd6469602011-12-14 16:43:12 +0100587 return mask;
588}
589
590static int llcp_sock_release(struct socket *sock)
591{
592 struct sock *sk = sock->sk;
593 struct nfc_llcp_local *local;
594 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100595 int err = 0;
Samuel Ortizd6469602011-12-14 16:43:12 +0100596
597 if (!sk)
598 return 0;
599
600 pr_debug("%p\n", sk);
601
602 local = llcp_sock->local;
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100603 if (local == NULL) {
604 err = -ENODEV;
605 goto out;
606 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100607
Samuel Ortizd6469602011-12-14 16:43:12 +0100608 lock_sock(sk);
609
610 /* Send a DISC */
611 if (sk->sk_state == LLCP_CONNECTED)
Thierry Escande58e3dd12013-06-04 11:34:50 +0200612 nfc_llcp_send_disconnect(llcp_sock);
Samuel Ortizd6469602011-12-14 16:43:12 +0100613
614 if (sk->sk_state == LLCP_LISTEN) {
615 struct nfc_llcp_sock *lsk, *n;
616 struct sock *accept_sk;
617
618 list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100619 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100620 accept_sk = &lsk->sk;
621 lock_sock(accept_sk);
622
Thierry Escande58e3dd12013-06-04 11:34:50 +0200623 nfc_llcp_send_disconnect(lsk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100624 nfc_llcp_accept_unlink(accept_sk);
625
626 release_sock(accept_sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100627 }
628 }
629
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200630 if (llcp_sock->reserved_ssap < LLCP_SAP_MAX)
631 nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100632
Samuel Ortizd6469602011-12-14 16:43:12 +0100633 release_sock(sk);
634
Thierry Escande17f7ae162013-06-04 11:34:51 +0200635 /* Keep this sock alive and therefore do not remove it from the sockets
636 * list until the DISC PDU has been actually sent. Otherwise we would
637 * reply with DM PDUs before sending the DISC one.
638 */
639 if (sk->sk_state == LLCP_DISCONNECTING)
640 return err;
641
Thierry Escande4463523b2012-09-26 18:16:44 +0200642 if (sock->type == SOCK_RAW)
643 nfc_llcp_sock_unlink(&local->raw_sockets, sk);
644 else
645 nfc_llcp_sock_unlink(&local->sockets, sk);
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200646
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100647out:
Samuel Ortizd6469602011-12-14 16:43:12 +0100648 sock_orphan(sk);
649 sock_put(sk);
650
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100651 return err;
Samuel Ortizd6469602011-12-14 16:43:12 +0100652}
653
654static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100655 int len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100656{
657 struct sock *sk = sock->sk;
658 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
659 struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
660 struct nfc_dev *dev;
661 struct nfc_llcp_local *local;
662 int ret = 0;
663
664 pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
665
Mateusz Jurczyk4a142252017-05-24 12:26:20 +0200666 if (!addr || len < sizeof(*addr) || addr->sa_family != AF_NFC)
Samuel Ortizd6469602011-12-14 16:43:12 +0100667 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100668
Dave Jones32418cf2012-10-04 09:51:11 +0000669 if (addr->service_name_len == 0 && addr->dsap == 0)
Samuel Ortizd6469602011-12-14 16:43:12 +0100670 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100671
672 pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100673 addr->target_idx, addr->nfc_protocol);
Samuel Ortizd6469602011-12-14 16:43:12 +0100674
675 lock_sock(sk);
676
677 if (sk->sk_state == LLCP_CONNECTED) {
678 ret = -EISCONN;
679 goto error;
680 }
681
682 dev = nfc_get_device(addr->dev_idx);
683 if (dev == NULL) {
684 ret = -ENODEV;
685 goto error;
686 }
687
688 local = nfc_llcp_find_local(dev);
689 if (local == NULL) {
690 ret = -ENODEV;
691 goto put_dev;
692 }
693
694 device_lock(&dev->dev);
695 if (dev->dep_link_up == false) {
696 ret = -ENOLINK;
697 device_unlock(&dev->dev);
698 goto put_dev;
699 }
700 device_unlock(&dev->dev);
701
702 if (local->rf_mode == NFC_RF_INITIATOR &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100703 addr->target_idx != local->target_idx) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100704 ret = -ENOLINK;
705 goto put_dev;
706 }
707
708 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200709 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100710 llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
711 if (llcp_sock->ssap == LLCP_SAP_MAX) {
712 ret = -ENOMEM;
713 goto put_dev;
714 }
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200715
716 llcp_sock->reserved_ssap = llcp_sock->ssap;
717
Samuel Ortizd6469602011-12-14 16:43:12 +0100718 if (addr->service_name_len == 0)
719 llcp_sock->dsap = addr->dsap;
720 else
721 llcp_sock->dsap = LLCP_SAP_SDP;
722 llcp_sock->nfc_protocol = addr->nfc_protocol;
723 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100724 addr->service_name_len,
725 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100726 llcp_sock->service_name = kmemdup(addr->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100727 llcp_sock->service_name_len,
728 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100729
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200730 nfc_llcp_sock_link(&local->connecting_sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100731
732 ret = nfc_llcp_send_connect(llcp_sock);
733 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200734 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100735
Samuel Ortizb4011232013-05-03 18:29:30 +0200736 sk->sk_state = LLCP_CONNECTING;
737
Samuel Ortizff353d82012-05-07 12:31:19 +0200738 ret = sock_wait_state(sk, LLCP_CONNECTED,
739 sock_sndtimeo(sk, flags & O_NONBLOCK));
Samuel Ortizb4011232013-05-03 18:29:30 +0200740 if (ret && ret != -EINPROGRESS)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200741 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100742
743 release_sock(sk);
Samuel Ortizff353d82012-05-07 12:31:19 +0200744
Samuel Ortizb4011232013-05-03 18:29:30 +0200745 return ret;
Samuel Ortizd6469602011-12-14 16:43:12 +0100746
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200747sock_unlink:
748 nfc_llcp_put_ssap(local, llcp_sock->ssap);
749
750 nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
751
Samuel Ortizd6469602011-12-14 16:43:12 +0100752put_dev:
753 nfc_put_device(dev);
754
755error:
756 release_sock(sk);
757 return ret;
758}
759
Ying Xue1b784142015-03-02 15:37:48 +0800760static int llcp_sock_sendmsg(struct socket *sock, struct msghdr *msg,
761 size_t len)
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100762{
763 struct sock *sk = sock->sk;
764 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
765 int ret;
766
767 pr_debug("sock %p sk %p", sock, sk);
768
769 ret = sock_error(sk);
770 if (ret)
771 return ret;
772
773 if (msg->msg_flags & MSG_OOB)
774 return -EOPNOTSUPP;
775
776 lock_sock(sk);
777
Samuel Ortizb874dec2012-10-16 15:04:10 +0200778 if (sk->sk_type == SOCK_DGRAM) {
Steffen Hurrle342dfc32014-01-17 22:53:15 +0100779 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, addr,
780 msg->msg_name);
Samuel Ortizb874dec2012-10-16 15:04:10 +0200781
782 if (msg->msg_namelen < sizeof(*addr)) {
783 release_sock(sk);
Samuel Ortizb874dec2012-10-16 15:04:10 +0200784 return -EINVAL;
785 }
786
787 release_sock(sk);
788
789 return nfc_llcp_send_ui_frame(llcp_sock, addr->dsap, addr->ssap,
790 msg, len);
791 }
792
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100793 if (sk->sk_state != LLCP_CONNECTED) {
794 release_sock(sk);
795 return -ENOTCONN;
796 }
797
798 release_sock(sk);
799
800 return nfc_llcp_send_i_frame(llcp_sock, msg, len);
801}
802
Ying Xue1b784142015-03-02 15:37:48 +0800803static int llcp_sock_recvmsg(struct socket *sock, struct msghdr *msg,
804 size_t len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100805{
806 int noblock = flags & MSG_DONTWAIT;
807 struct sock *sk = sock->sk;
808 unsigned int copied, rlen;
809 struct sk_buff *skb, *cskb;
810 int err = 0;
811
812 pr_debug("%p %zu\n", sk, len);
813
814 lock_sock(sk);
815
816 if (sk->sk_state == LLCP_CLOSED &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100817 skb_queue_empty(&sk->sk_receive_queue)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100818 release_sock(sk);
819 return 0;
820 }
821
822 release_sock(sk);
823
824 if (flags & (MSG_OOB))
825 return -EOPNOTSUPP;
826
827 skb = skb_recv_datagram(sk, flags, noblock, &err);
828 if (!skb) {
829 pr_err("Recv datagram failed state %d %d %d",
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100830 sk->sk_state, err, sock_error(sk));
Samuel Ortizd6469602011-12-14 16:43:12 +0100831
832 if (sk->sk_shutdown & RCV_SHUTDOWN)
833 return 0;
834
835 return err;
836 }
837
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100838 rlen = skb->len; /* real length of skb */
Samuel Ortizd6469602011-12-14 16:43:12 +0100839 copied = min_t(unsigned int, rlen, len);
840
841 cskb = skb;
David S. Miller51f3d022014-11-05 16:46:40 -0500842 if (skb_copy_datagram_msg(cskb, 0, msg, copied)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100843 if (!(flags & MSG_PEEK))
844 skb_queue_head(&sk->sk_receive_queue, skb);
845 return -EFAULT;
846 }
847
Thierry Escande2c2d45b2012-11-27 15:44:24 +0100848 sock_recv_timestamp(msg, sk, skb);
849
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200850 if (sk->sk_type == SOCK_DGRAM && msg->msg_name) {
851 struct nfc_llcp_ui_cb *ui_cb = nfc_llcp_ui_skb_cb(skb);
Steffen Hurrle342dfc32014-01-17 22:53:15 +0100852 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, sockaddr,
853 msg->msg_name);
Samuel Ortizfad2e372013-01-11 14:48:48 +0100854
855 msg->msg_namelen = sizeof(struct sockaddr_nfc_llcp);
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200856
857 pr_debug("Datagram socket %d %d\n", ui_cb->dsap, ui_cb->ssap);
858
Mathias Kraused26d6502013-04-07 01:51:58 +0000859 memset(sockaddr, 0, sizeof(*sockaddr));
Samuel Ortizfad2e372013-01-11 14:48:48 +0100860 sockaddr->sa_family = AF_NFC;
861 sockaddr->nfc_protocol = NFC_PROTO_NFC_DEP;
862 sockaddr->dsap = ui_cb->dsap;
863 sockaddr->ssap = ui_cb->ssap;
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200864 }
865
Samuel Ortizd6469602011-12-14 16:43:12 +0100866 /* Mark read part of skb as used */
867 if (!(flags & MSG_PEEK)) {
868
869 /* SOCK_STREAM: re-queue skb if it contains unreceived data */
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200870 if (sk->sk_type == SOCK_STREAM ||
871 sk->sk_type == SOCK_DGRAM ||
872 sk->sk_type == SOCK_RAW) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100873 skb_pull(skb, copied);
874 if (skb->len) {
875 skb_queue_head(&sk->sk_receive_queue, skb);
876 goto done;
877 }
878 }
879
880 kfree_skb(skb);
881 }
882
883 /* XXX Queue backlogged skbs */
884
885done:
886 /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
887 if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
888 copied = rlen;
889
890 return copied;
891}
892
893static const struct proto_ops llcp_sock_ops = {
894 .family = PF_NFC,
895 .owner = THIS_MODULE,
896 .bind = llcp_sock_bind,
897 .connect = llcp_sock_connect,
898 .release = llcp_sock_release,
899 .socketpair = sock_no_socketpair,
900 .accept = llcp_sock_accept,
901 .getname = llcp_sock_getname,
902 .poll = llcp_sock_poll,
903 .ioctl = sock_no_ioctl,
904 .listen = llcp_sock_listen,
905 .shutdown = sock_no_shutdown,
Samuel Ortiz26fd76c2013-02-22 10:53:25 +0100906 .setsockopt = nfc_llcp_setsockopt,
907 .getsockopt = nfc_llcp_getsockopt,
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100908 .sendmsg = llcp_sock_sendmsg,
Samuel Ortizd6469602011-12-14 16:43:12 +0100909 .recvmsg = llcp_sock_recvmsg,
910 .mmap = sock_no_mmap,
911};
912
Thierry Escande4463523b2012-09-26 18:16:44 +0200913static const struct proto_ops llcp_rawsock_ops = {
914 .family = PF_NFC,
915 .owner = THIS_MODULE,
916 .bind = llcp_raw_sock_bind,
917 .connect = sock_no_connect,
918 .release = llcp_sock_release,
919 .socketpair = sock_no_socketpair,
920 .accept = sock_no_accept,
921 .getname = llcp_sock_getname,
922 .poll = llcp_sock_poll,
923 .ioctl = sock_no_ioctl,
924 .listen = sock_no_listen,
925 .shutdown = sock_no_shutdown,
926 .setsockopt = sock_no_setsockopt,
927 .getsockopt = sock_no_getsockopt,
928 .sendmsg = sock_no_sendmsg,
929 .recvmsg = llcp_sock_recvmsg,
930 .mmap = sock_no_mmap,
931};
932
Samuel Ortizd6469602011-12-14 16:43:12 +0100933static void llcp_sock_destruct(struct sock *sk)
934{
935 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
936
937 pr_debug("%p\n", sk);
938
939 if (sk->sk_state == LLCP_CONNECTED)
940 nfc_put_device(llcp_sock->dev);
941
942 skb_queue_purge(&sk->sk_receive_queue);
943
944 nfc_llcp_sock_free(llcp_sock);
945
946 if (!sock_flag(sk, SOCK_DEAD)) {
947 pr_err("Freeing alive NFC LLCP socket %p\n", sk);
948 return;
949 }
950}
951
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500952struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp, int kern)
Samuel Ortizd6469602011-12-14 16:43:12 +0100953{
954 struct sock *sk;
955 struct nfc_llcp_sock *llcp_sock;
956
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500957 sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto, kern);
Samuel Ortizd6469602011-12-14 16:43:12 +0100958 if (!sk)
959 return NULL;
960
961 llcp_sock = nfc_llcp_sock(sk);
962
963 sock_init_data(sock, sk);
964 sk->sk_state = LLCP_CLOSED;
965 sk->sk_protocol = NFC_SOCKPROTO_LLCP;
966 sk->sk_type = type;
967 sk->sk_destruct = llcp_sock_destruct;
968
969 llcp_sock->ssap = 0;
970 llcp_sock->dsap = LLCP_SAP_SDP;
Samuel Ortiz06d44f82013-02-22 11:38:05 +0100971 llcp_sock->rw = LLCP_MAX_RW + 1;
Samuel Ortiz5eef6662013-03-20 16:06:12 +0100972 llcp_sock->miux = cpu_to_be16(LLCP_MAX_MIUX + 1);
Samuel Ortizd6469602011-12-14 16:43:12 +0100973 llcp_sock->send_n = llcp_sock->send_ack_n = 0;
974 llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
975 llcp_sock->remote_ready = 1;
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200976 llcp_sock->reserved_ssap = LLCP_SAP_MAX;
Thierry Escandeabd18d42013-04-02 10:25:15 +0200977 nfc_llcp_socket_remote_param_init(llcp_sock);
Samuel Ortizd6469602011-12-14 16:43:12 +0100978 skb_queue_head_init(&llcp_sock->tx_queue);
979 skb_queue_head_init(&llcp_sock->tx_pending_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100980 INIT_LIST_HEAD(&llcp_sock->accept_queue);
981
982 if (sock != NULL)
983 sock->state = SS_UNCONNECTED;
984
985 return sk;
986}
987
988void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
989{
990 kfree(sock->service_name);
991
992 skb_queue_purge(&sock->tx_queue);
993 skb_queue_purge(&sock->tx_pending_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100994
995 list_del_init(&sock->accept_queue);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100996
Samuel Ortizd6469602011-12-14 16:43:12 +0100997 sock->parent = NULL;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200998
999 nfc_llcp_local_put(sock->local);
Samuel Ortizd6469602011-12-14 16:43:12 +01001000}
1001
1002static int llcp_sock_create(struct net *net, struct socket *sock,
Eric W. Biederman11aa9c22015-05-08 21:09:13 -05001003 const struct nfc_protocol *nfc_proto, int kern)
Samuel Ortizd6469602011-12-14 16:43:12 +01001004{
1005 struct sock *sk;
1006
1007 pr_debug("%p\n", sock);
1008
Thierry Escande4463523b2012-09-26 18:16:44 +02001009 if (sock->type != SOCK_STREAM &&
1010 sock->type != SOCK_DGRAM &&
1011 sock->type != SOCK_RAW)
Samuel Ortizd6469602011-12-14 16:43:12 +01001012 return -ESOCKTNOSUPPORT;
1013
Thierry Escande4463523b2012-09-26 18:16:44 +02001014 if (sock->type == SOCK_RAW)
1015 sock->ops = &llcp_rawsock_ops;
1016 else
1017 sock->ops = &llcp_sock_ops;
Samuel Ortizd6469602011-12-14 16:43:12 +01001018
Eric W. Biederman11aa9c22015-05-08 21:09:13 -05001019 sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC, kern);
Samuel Ortizd6469602011-12-14 16:43:12 +01001020 if (sk == NULL)
1021 return -ENOMEM;
1022
1023 return 0;
1024}
1025
1026static const struct nfc_protocol llcp_nfc_proto = {
1027 .id = NFC_SOCKPROTO_LLCP,
1028 .proto = &llcp_sock_proto,
1029 .owner = THIS_MODULE,
1030 .create = llcp_sock_create
1031};
1032
1033int __init nfc_llcp_sock_init(void)
1034{
1035 return nfc_proto_register(&llcp_nfc_proto);
1036}
1037
1038void nfc_llcp_sock_exit(void)
1039{
1040 nfc_proto_unregister(&llcp_nfc_proto);
1041}