blob: b08e99d2c7150e28213229ff3436442468d2a0e3 [file] [log] [blame]
Samuel Ortizd6469602011-12-14 16:43:12 +01001/*
2 * Copyright (C) 2011 Intel Corporation. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the
16 * Free Software Foundation, Inc.,
17 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
19
20#define pr_fmt(fmt) "llcp: %s: " fmt, __func__
21
22#include <linux/init.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/nfc.h>
26
27#include "../nfc.h"
28#include "llcp.h"
29
Samuel Ortizff353d82012-05-07 12:31:19 +020030static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
31{
32 DECLARE_WAITQUEUE(wait, current);
33 int err = 0;
34
35 pr_debug("sk %p", sk);
36
37 add_wait_queue(sk_sleep(sk), &wait);
38 set_current_state(TASK_INTERRUPTIBLE);
39
40 while (sk->sk_state != state) {
41 if (!timeo) {
42 err = -EINPROGRESS;
43 break;
44 }
45
46 if (signal_pending(current)) {
47 err = sock_intr_errno(timeo);
48 break;
49 }
50
51 release_sock(sk);
52 timeo = schedule_timeout(timeo);
53 lock_sock(sk);
54 set_current_state(TASK_INTERRUPTIBLE);
55
56 err = sock_error(sk);
57 if (err)
58 break;
59 }
60
61 __set_current_state(TASK_RUNNING);
62 remove_wait_queue(sk_sleep(sk), &wait);
63 return err;
64}
65
Samuel Ortizd6469602011-12-14 16:43:12 +010066static struct proto llcp_sock_proto = {
67 .name = "NFC_LLCP",
68 .owner = THIS_MODULE,
69 .obj_size = sizeof(struct nfc_llcp_sock),
70};
71
72static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
73{
74 struct sock *sk = sock->sk;
75 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
76 struct nfc_llcp_local *local;
77 struct nfc_dev *dev;
78 struct sockaddr_nfc_llcp llcp_addr;
79 int len, ret = 0;
80
81 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
82
83 if (!addr || addr->sa_family != AF_NFC)
84 return -EINVAL;
85
86 memset(&llcp_addr, 0, sizeof(llcp_addr));
87 len = min_t(unsigned int, sizeof(llcp_addr), alen);
88 memcpy(&llcp_addr, addr, len);
89
90 /* This is going to be a listening socket, dsap must be 0 */
91 if (llcp_addr.dsap != 0)
92 return -EINVAL;
93
94 lock_sock(sk);
95
96 if (sk->sk_state != LLCP_CLOSED) {
97 ret = -EBADFD;
98 goto error;
99 }
100
101 dev = nfc_get_device(llcp_addr.dev_idx);
102 if (dev == NULL) {
103 ret = -ENODEV;
104 goto error;
105 }
106
107 local = nfc_llcp_find_local(dev);
108 if (local == NULL) {
109 ret = -ENODEV;
110 goto put_dev;
111 }
112
113 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200114 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100115 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
116 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100117 llcp_addr.service_name_len,
118 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100119 llcp_sock->service_name = kmemdup(llcp_addr.service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100120 llcp_sock->service_name_len,
121 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100122
123 llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
124 if (llcp_sock->ssap == LLCP_MAX_SAP)
125 goto put_dev;
126
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200127 nfc_llcp_sock_link(&local->sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100128
129 pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
130
131 sk->sk_state = LLCP_BOUND;
132
133put_dev:
134 nfc_put_device(dev);
135
136error:
137 release_sock(sk);
138 return ret;
139}
140
141static int llcp_sock_listen(struct socket *sock, int backlog)
142{
143 struct sock *sk = sock->sk;
144 int ret = 0;
145
146 pr_debug("sk %p backlog %d\n", sk, backlog);
147
148 lock_sock(sk);
149
150 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM)
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100151 || sk->sk_state != LLCP_BOUND) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100152 ret = -EBADFD;
153 goto error;
154 }
155
156 sk->sk_max_ack_backlog = backlog;
157 sk->sk_ack_backlog = 0;
158
159 pr_debug("Socket listening\n");
160 sk->sk_state = LLCP_LISTEN;
161
162error:
163 release_sock(sk);
164
165 return ret;
166}
167
168void nfc_llcp_accept_unlink(struct sock *sk)
169{
170 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
171
172 pr_debug("state %d\n", sk->sk_state);
173
174 list_del_init(&llcp_sock->accept_queue);
175 sk_acceptq_removed(llcp_sock->parent);
176 llcp_sock->parent = NULL;
177
178 sock_put(sk);
179}
180
181void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
182{
183 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
184 struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
185
186 /* Lock will be free from unlink */
187 sock_hold(sk);
188
189 list_add_tail(&llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100190 &llcp_sock_parent->accept_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100191 llcp_sock->parent = parent;
192 sk_acceptq_added(parent);
193}
194
195struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100196 struct socket *newsock)
Samuel Ortizd6469602011-12-14 16:43:12 +0100197{
198 struct nfc_llcp_sock *lsk, *n, *llcp_parent;
199 struct sock *sk;
200
201 llcp_parent = nfc_llcp_sock(parent);
202
203 list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100204 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100205 sk = &lsk->sk;
206 lock_sock(sk);
207
208 if (sk->sk_state == LLCP_CLOSED) {
209 release_sock(sk);
210 nfc_llcp_accept_unlink(sk);
211 continue;
212 }
213
214 if (sk->sk_state == LLCP_CONNECTED || !newsock) {
215 nfc_llcp_accept_unlink(sk);
216 if (newsock)
217 sock_graft(sk, newsock);
218
219 release_sock(sk);
220
221 pr_debug("Returning sk state %d\n", sk->sk_state);
222
223 return sk;
224 }
225
226 release_sock(sk);
227 }
228
229 return NULL;
230}
231
232static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100233 int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100234{
235 DECLARE_WAITQUEUE(wait, current);
236 struct sock *sk = sock->sk, *new_sk;
237 long timeo;
238 int ret = 0;
239
240 pr_debug("parent %p\n", sk);
241
242 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
243
244 if (sk->sk_state != LLCP_LISTEN) {
245 ret = -EBADFD;
246 goto error;
247 }
248
249 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
250
251 /* Wait for an incoming connection. */
252 add_wait_queue_exclusive(sk_sleep(sk), &wait);
253 while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
254 set_current_state(TASK_INTERRUPTIBLE);
255
256 if (!timeo) {
257 ret = -EAGAIN;
258 break;
259 }
260
261 if (signal_pending(current)) {
262 ret = sock_intr_errno(timeo);
263 break;
264 }
265
266 release_sock(sk);
267 timeo = schedule_timeout(timeo);
268 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
269 }
270 __set_current_state(TASK_RUNNING);
271 remove_wait_queue(sk_sleep(sk), &wait);
272
273 if (ret)
274 goto error;
275
276 newsock->state = SS_CONNECTED;
277
278 pr_debug("new socket %p\n", new_sk);
279
280error:
281 release_sock(sk);
282
283 return ret;
284}
285
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200286static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
Samuel Ortizd6469602011-12-14 16:43:12 +0100287 int *len, int peer)
288{
Samuel Ortizd6469602011-12-14 16:43:12 +0100289 struct sock *sk = sock->sk;
290 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200291 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
Samuel Ortizd6469602011-12-14 16:43:12 +0100292
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200293 pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
294 llcp_sock->dsap, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100295
Sasha Levin147f20e2012-06-30 11:56:47 +0200296 if (llcp_sock == NULL || llcp_sock->dev == NULL)
Sasha Levin58d1eab2012-06-06 23:02:55 +0200297 return -EBADFD;
298
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200299 uaddr->sa_family = AF_NFC;
300
Samuel Ortizd6469602011-12-14 16:43:12 +0100301 *len = sizeof(struct sockaddr_nfc_llcp);
302
303 llcp_addr->dev_idx = llcp_sock->dev->idx;
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200304 llcp_addr->target_idx = llcp_sock->target_idx;
Samuel Ortizd6469602011-12-14 16:43:12 +0100305 llcp_addr->dsap = llcp_sock->dsap;
306 llcp_addr->ssap = llcp_sock->ssap;
307 llcp_addr->service_name_len = llcp_sock->service_name_len;
308 memcpy(llcp_addr->service_name, llcp_sock->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100309 llcp_addr->service_name_len);
Samuel Ortizd6469602011-12-14 16:43:12 +0100310
311 return 0;
312}
313
314static inline unsigned int llcp_accept_poll(struct sock *parent)
315{
316 struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
317 struct sock *sk;
318
319 parent_sock = nfc_llcp_sock(parent);
320
321 list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100322 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100323 sk = &llcp_sock->sk;
324
325 if (sk->sk_state == LLCP_CONNECTED)
326 return POLLIN | POLLRDNORM;
327 }
328
329 return 0;
330}
331
332static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100333 poll_table *wait)
Samuel Ortizd6469602011-12-14 16:43:12 +0100334{
335 struct sock *sk = sock->sk;
336 unsigned int mask = 0;
337
338 pr_debug("%p\n", sk);
339
340 sock_poll_wait(file, sk_sleep(sk), wait);
341
342 if (sk->sk_state == LLCP_LISTEN)
343 return llcp_accept_poll(sk);
344
345 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
346 mask |= POLLERR;
347
348 if (!skb_queue_empty(&sk->sk_receive_queue))
Samuel Ortiz4260c132012-05-07 12:31:20 +0200349 mask |= POLLIN | POLLRDNORM;
Samuel Ortizd6469602011-12-14 16:43:12 +0100350
351 if (sk->sk_state == LLCP_CLOSED)
352 mask |= POLLHUP;
353
Samuel Ortiz4260c132012-05-07 12:31:20 +0200354 if (sk->sk_shutdown & RCV_SHUTDOWN)
355 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
356
357 if (sk->sk_shutdown == SHUTDOWN_MASK)
358 mask |= POLLHUP;
359
360 if (sock_writeable(sk))
361 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
362 else
363 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
364
365 pr_debug("mask 0x%x\n", mask);
366
Samuel Ortizd6469602011-12-14 16:43:12 +0100367 return mask;
368}
369
370static int llcp_sock_release(struct socket *sock)
371{
372 struct sock *sk = sock->sk;
373 struct nfc_llcp_local *local;
374 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100375 int err = 0;
Samuel Ortizd6469602011-12-14 16:43:12 +0100376
377 if (!sk)
378 return 0;
379
380 pr_debug("%p\n", sk);
381
382 local = llcp_sock->local;
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100383 if (local == NULL) {
384 err = -ENODEV;
385 goto out;
386 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100387
Samuel Ortizd6469602011-12-14 16:43:12 +0100388 lock_sock(sk);
389
390 /* Send a DISC */
391 if (sk->sk_state == LLCP_CONNECTED)
392 nfc_llcp_disconnect(llcp_sock);
393
394 if (sk->sk_state == LLCP_LISTEN) {
395 struct nfc_llcp_sock *lsk, *n;
396 struct sock *accept_sk;
397
398 list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100399 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100400 accept_sk = &lsk->sk;
401 lock_sock(accept_sk);
402
403 nfc_llcp_disconnect(lsk);
404 nfc_llcp_accept_unlink(accept_sk);
405
406 release_sock(accept_sk);
407
Samuel Ortizd6469602011-12-14 16:43:12 +0100408 sock_orphan(accept_sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100409 }
410 }
411
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200412 nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100413
Samuel Ortizd6469602011-12-14 16:43:12 +0100414 release_sock(sk);
415
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200416 nfc_llcp_sock_unlink(&local->sockets, sk);
417
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100418out:
Samuel Ortizd6469602011-12-14 16:43:12 +0100419 sock_orphan(sk);
420 sock_put(sk);
421
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100422 return err;
Samuel Ortizd6469602011-12-14 16:43:12 +0100423}
424
425static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100426 int len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100427{
428 struct sock *sk = sock->sk;
429 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
430 struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
431 struct nfc_dev *dev;
432 struct nfc_llcp_local *local;
433 int ret = 0;
434
435 pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
436
437 if (!addr || len < sizeof(struct sockaddr_nfc) ||
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100438 addr->sa_family != AF_NFC) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100439 pr_err("Invalid socket\n");
440 return -EINVAL;
441 }
442
443 if (addr->service_name_len == 0 && addr->dsap == 0) {
444 pr_err("Missing service name or dsap\n");
445 return -EINVAL;
446 }
447
448 pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100449 addr->target_idx, addr->nfc_protocol);
Samuel Ortizd6469602011-12-14 16:43:12 +0100450
451 lock_sock(sk);
452
453 if (sk->sk_state == LLCP_CONNECTED) {
454 ret = -EISCONN;
455 goto error;
456 }
457
458 dev = nfc_get_device(addr->dev_idx);
459 if (dev == NULL) {
460 ret = -ENODEV;
461 goto error;
462 }
463
464 local = nfc_llcp_find_local(dev);
465 if (local == NULL) {
466 ret = -ENODEV;
467 goto put_dev;
468 }
469
470 device_lock(&dev->dev);
471 if (dev->dep_link_up == false) {
472 ret = -ENOLINK;
473 device_unlock(&dev->dev);
474 goto put_dev;
475 }
476 device_unlock(&dev->dev);
477
478 if (local->rf_mode == NFC_RF_INITIATOR &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100479 addr->target_idx != local->target_idx) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100480 ret = -ENOLINK;
481 goto put_dev;
482 }
483
484 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200485 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200486 llcp_sock->miu = llcp_sock->local->remote_miu;
Samuel Ortizd6469602011-12-14 16:43:12 +0100487 llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
488 if (llcp_sock->ssap == LLCP_SAP_MAX) {
489 ret = -ENOMEM;
490 goto put_dev;
491 }
492 if (addr->service_name_len == 0)
493 llcp_sock->dsap = addr->dsap;
494 else
495 llcp_sock->dsap = LLCP_SAP_SDP;
496 llcp_sock->nfc_protocol = addr->nfc_protocol;
497 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100498 addr->service_name_len,
499 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100500 llcp_sock->service_name = kmemdup(addr->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100501 llcp_sock->service_name_len,
502 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100503
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200504 nfc_llcp_sock_link(&local->connecting_sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100505
506 ret = nfc_llcp_send_connect(llcp_sock);
507 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200508 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100509
Samuel Ortizff353d82012-05-07 12:31:19 +0200510 ret = sock_wait_state(sk, LLCP_CONNECTED,
511 sock_sndtimeo(sk, flags & O_NONBLOCK));
512 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200513 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100514
515 release_sock(sk);
Samuel Ortizff353d82012-05-07 12:31:19 +0200516
Samuel Ortizd6469602011-12-14 16:43:12 +0100517 return 0;
518
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200519sock_unlink:
520 nfc_llcp_put_ssap(local, llcp_sock->ssap);
521
522 nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
523
Samuel Ortizd6469602011-12-14 16:43:12 +0100524put_dev:
525 nfc_put_device(dev);
526
527error:
528 release_sock(sk);
529 return ret;
530}
531
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100532static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100533 struct msghdr *msg, size_t len)
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100534{
535 struct sock *sk = sock->sk;
536 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
537 int ret;
538
539 pr_debug("sock %p sk %p", sock, sk);
540
541 ret = sock_error(sk);
542 if (ret)
543 return ret;
544
545 if (msg->msg_flags & MSG_OOB)
546 return -EOPNOTSUPP;
547
548 lock_sock(sk);
549
550 if (sk->sk_state != LLCP_CONNECTED) {
551 release_sock(sk);
552 return -ENOTCONN;
553 }
554
555 release_sock(sk);
556
557 return nfc_llcp_send_i_frame(llcp_sock, msg, len);
558}
559
Samuel Ortizd6469602011-12-14 16:43:12 +0100560static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
561 struct msghdr *msg, size_t len, int flags)
562{
563 int noblock = flags & MSG_DONTWAIT;
564 struct sock *sk = sock->sk;
565 unsigned int copied, rlen;
566 struct sk_buff *skb, *cskb;
567 int err = 0;
568
569 pr_debug("%p %zu\n", sk, len);
570
571 lock_sock(sk);
572
573 if (sk->sk_state == LLCP_CLOSED &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100574 skb_queue_empty(&sk->sk_receive_queue)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100575 release_sock(sk);
576 return 0;
577 }
578
579 release_sock(sk);
580
581 if (flags & (MSG_OOB))
582 return -EOPNOTSUPP;
583
584 skb = skb_recv_datagram(sk, flags, noblock, &err);
585 if (!skb) {
586 pr_err("Recv datagram failed state %d %d %d",
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100587 sk->sk_state, err, sock_error(sk));
Samuel Ortizd6469602011-12-14 16:43:12 +0100588
589 if (sk->sk_shutdown & RCV_SHUTDOWN)
590 return 0;
591
592 return err;
593 }
594
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100595 rlen = skb->len; /* real length of skb */
Samuel Ortizd6469602011-12-14 16:43:12 +0100596 copied = min_t(unsigned int, rlen, len);
597
598 cskb = skb;
599 if (memcpy_toiovec(msg->msg_iov, cskb->data, copied)) {
600 if (!(flags & MSG_PEEK))
601 skb_queue_head(&sk->sk_receive_queue, skb);
602 return -EFAULT;
603 }
604
605 /* Mark read part of skb as used */
606 if (!(flags & MSG_PEEK)) {
607
608 /* SOCK_STREAM: re-queue skb if it contains unreceived data */
609 if (sk->sk_type == SOCK_STREAM) {
610 skb_pull(skb, copied);
611 if (skb->len) {
612 skb_queue_head(&sk->sk_receive_queue, skb);
613 goto done;
614 }
615 }
616
617 kfree_skb(skb);
618 }
619
620 /* XXX Queue backlogged skbs */
621
622done:
623 /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
624 if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
625 copied = rlen;
626
627 return copied;
628}
629
630static const struct proto_ops llcp_sock_ops = {
631 .family = PF_NFC,
632 .owner = THIS_MODULE,
633 .bind = llcp_sock_bind,
634 .connect = llcp_sock_connect,
635 .release = llcp_sock_release,
636 .socketpair = sock_no_socketpair,
637 .accept = llcp_sock_accept,
638 .getname = llcp_sock_getname,
639 .poll = llcp_sock_poll,
640 .ioctl = sock_no_ioctl,
641 .listen = llcp_sock_listen,
642 .shutdown = sock_no_shutdown,
643 .setsockopt = sock_no_setsockopt,
644 .getsockopt = sock_no_getsockopt,
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100645 .sendmsg = llcp_sock_sendmsg,
Samuel Ortizd6469602011-12-14 16:43:12 +0100646 .recvmsg = llcp_sock_recvmsg,
647 .mmap = sock_no_mmap,
648};
649
650static void llcp_sock_destruct(struct sock *sk)
651{
652 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
653
654 pr_debug("%p\n", sk);
655
656 if (sk->sk_state == LLCP_CONNECTED)
657 nfc_put_device(llcp_sock->dev);
658
659 skb_queue_purge(&sk->sk_receive_queue);
660
661 nfc_llcp_sock_free(llcp_sock);
662
663 if (!sock_flag(sk, SOCK_DEAD)) {
664 pr_err("Freeing alive NFC LLCP socket %p\n", sk);
665 return;
666 }
667}
668
669struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
670{
671 struct sock *sk;
672 struct nfc_llcp_sock *llcp_sock;
673
674 sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
675 if (!sk)
676 return NULL;
677
678 llcp_sock = nfc_llcp_sock(sk);
679
680 sock_init_data(sock, sk);
681 sk->sk_state = LLCP_CLOSED;
682 sk->sk_protocol = NFC_SOCKPROTO_LLCP;
683 sk->sk_type = type;
684 sk->sk_destruct = llcp_sock_destruct;
685
686 llcp_sock->ssap = 0;
687 llcp_sock->dsap = LLCP_SAP_SDP;
Samuel Ortiz7a06e582012-05-07 22:03:34 +0200688 llcp_sock->rw = LLCP_DEFAULT_RW;
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200689 llcp_sock->miu = LLCP_DEFAULT_MIU;
Samuel Ortizd6469602011-12-14 16:43:12 +0100690 llcp_sock->send_n = llcp_sock->send_ack_n = 0;
691 llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
692 llcp_sock->remote_ready = 1;
693 skb_queue_head_init(&llcp_sock->tx_queue);
694 skb_queue_head_init(&llcp_sock->tx_pending_queue);
695 skb_queue_head_init(&llcp_sock->tx_backlog_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100696 INIT_LIST_HEAD(&llcp_sock->accept_queue);
697
698 if (sock != NULL)
699 sock->state = SS_UNCONNECTED;
700
701 return sk;
702}
703
704void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
705{
706 kfree(sock->service_name);
707
708 skb_queue_purge(&sock->tx_queue);
709 skb_queue_purge(&sock->tx_pending_queue);
710 skb_queue_purge(&sock->tx_backlog_queue);
711
712 list_del_init(&sock->accept_queue);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100713
Samuel Ortizd6469602011-12-14 16:43:12 +0100714 sock->parent = NULL;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200715
716 nfc_llcp_local_put(sock->local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100717}
718
719static int llcp_sock_create(struct net *net, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100720 const struct nfc_protocol *nfc_proto)
Samuel Ortizd6469602011-12-14 16:43:12 +0100721{
722 struct sock *sk;
723
724 pr_debug("%p\n", sock);
725
726 if (sock->type != SOCK_STREAM && sock->type != SOCK_DGRAM)
727 return -ESOCKTNOSUPPORT;
728
729 sock->ops = &llcp_sock_ops;
730
731 sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
732 if (sk == NULL)
733 return -ENOMEM;
734
735 return 0;
736}
737
738static const struct nfc_protocol llcp_nfc_proto = {
739 .id = NFC_SOCKPROTO_LLCP,
740 .proto = &llcp_sock_proto,
741 .owner = THIS_MODULE,
742 .create = llcp_sock_create
743};
744
745int __init nfc_llcp_sock_init(void)
746{
747 return nfc_proto_register(&llcp_nfc_proto);
748}
749
750void nfc_llcp_sock_exit(void)
751{
752 nfc_proto_unregister(&llcp_nfc_proto);
753}