blob: ddeb9aa398f0ced280fed93b853319923cf43c69 [file] [log] [blame]
Samuel Ortizd6469602011-12-14 16:43:12 +01001/*
2 * Copyright (C) 2011 Intel Corporation. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the
16 * Free Software Foundation, Inc.,
17 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
19
20#define pr_fmt(fmt) "llcp: %s: " fmt, __func__
21
22#include <linux/init.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/nfc.h>
26
27#include "../nfc.h"
28#include "llcp.h"
29
Samuel Ortizff353d82012-05-07 12:31:19 +020030static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
31{
32 DECLARE_WAITQUEUE(wait, current);
33 int err = 0;
34
35 pr_debug("sk %p", sk);
36
37 add_wait_queue(sk_sleep(sk), &wait);
38 set_current_state(TASK_INTERRUPTIBLE);
39
40 while (sk->sk_state != state) {
41 if (!timeo) {
42 err = -EINPROGRESS;
43 break;
44 }
45
46 if (signal_pending(current)) {
47 err = sock_intr_errno(timeo);
48 break;
49 }
50
51 release_sock(sk);
52 timeo = schedule_timeout(timeo);
53 lock_sock(sk);
54 set_current_state(TASK_INTERRUPTIBLE);
55
56 err = sock_error(sk);
57 if (err)
58 break;
59 }
60
61 __set_current_state(TASK_RUNNING);
62 remove_wait_queue(sk_sleep(sk), &wait);
63 return err;
64}
65
Samuel Ortizd6469602011-12-14 16:43:12 +010066static struct proto llcp_sock_proto = {
67 .name = "NFC_LLCP",
68 .owner = THIS_MODULE,
69 .obj_size = sizeof(struct nfc_llcp_sock),
70};
71
72static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
73{
74 struct sock *sk = sock->sk;
75 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
76 struct nfc_llcp_local *local;
77 struct nfc_dev *dev;
78 struct sockaddr_nfc_llcp llcp_addr;
79 int len, ret = 0;
80
Samuel Ortizd6469602011-12-14 16:43:12 +010081 if (!addr || addr->sa_family != AF_NFC)
82 return -EINVAL;
83
Samuel Ortizc66433d2012-06-29 12:03:55 +020084 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
85
Samuel Ortizd6469602011-12-14 16:43:12 +010086 memset(&llcp_addr, 0, sizeof(llcp_addr));
87 len = min_t(unsigned int, sizeof(llcp_addr), alen);
88 memcpy(&llcp_addr, addr, len);
89
90 /* This is going to be a listening socket, dsap must be 0 */
91 if (llcp_addr.dsap != 0)
92 return -EINVAL;
93
94 lock_sock(sk);
95
96 if (sk->sk_state != LLCP_CLOSED) {
97 ret = -EBADFD;
98 goto error;
99 }
100
101 dev = nfc_get_device(llcp_addr.dev_idx);
102 if (dev == NULL) {
103 ret = -ENODEV;
104 goto error;
105 }
106
107 local = nfc_llcp_find_local(dev);
108 if (local == NULL) {
109 ret = -ENODEV;
110 goto put_dev;
111 }
112
113 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200114 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100115 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
116 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100117 llcp_addr.service_name_len,
118 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100119 llcp_sock->service_name = kmemdup(llcp_addr.service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100120 llcp_sock->service_name_len,
121 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100122
123 llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200124 if (llcp_sock->ssap == LLCP_SAP_MAX) {
125 ret = -EADDRINUSE;
Samuel Ortizd6469602011-12-14 16:43:12 +0100126 goto put_dev;
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200127 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100128
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200129 llcp_sock->reserved_ssap = llcp_sock->ssap;
130
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200131 nfc_llcp_sock_link(&local->sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100132
133 pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
134
135 sk->sk_state = LLCP_BOUND;
136
137put_dev:
138 nfc_put_device(dev);
139
140error:
141 release_sock(sk);
142 return ret;
143}
144
145static int llcp_sock_listen(struct socket *sock, int backlog)
146{
147 struct sock *sk = sock->sk;
148 int ret = 0;
149
150 pr_debug("sk %p backlog %d\n", sk, backlog);
151
152 lock_sock(sk);
153
154 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM)
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100155 || sk->sk_state != LLCP_BOUND) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100156 ret = -EBADFD;
157 goto error;
158 }
159
160 sk->sk_max_ack_backlog = backlog;
161 sk->sk_ack_backlog = 0;
162
163 pr_debug("Socket listening\n");
164 sk->sk_state = LLCP_LISTEN;
165
166error:
167 release_sock(sk);
168
169 return ret;
170}
171
172void nfc_llcp_accept_unlink(struct sock *sk)
173{
174 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
175
176 pr_debug("state %d\n", sk->sk_state);
177
178 list_del_init(&llcp_sock->accept_queue);
179 sk_acceptq_removed(llcp_sock->parent);
180 llcp_sock->parent = NULL;
181
182 sock_put(sk);
183}
184
185void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
186{
187 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
188 struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
189
190 /* Lock will be free from unlink */
191 sock_hold(sk);
192
193 list_add_tail(&llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100194 &llcp_sock_parent->accept_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100195 llcp_sock->parent = parent;
196 sk_acceptq_added(parent);
197}
198
199struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100200 struct socket *newsock)
Samuel Ortizd6469602011-12-14 16:43:12 +0100201{
202 struct nfc_llcp_sock *lsk, *n, *llcp_parent;
203 struct sock *sk;
204
205 llcp_parent = nfc_llcp_sock(parent);
206
207 list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100208 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100209 sk = &lsk->sk;
210 lock_sock(sk);
211
212 if (sk->sk_state == LLCP_CLOSED) {
213 release_sock(sk);
214 nfc_llcp_accept_unlink(sk);
215 continue;
216 }
217
218 if (sk->sk_state == LLCP_CONNECTED || !newsock) {
219 nfc_llcp_accept_unlink(sk);
220 if (newsock)
221 sock_graft(sk, newsock);
222
223 release_sock(sk);
224
225 pr_debug("Returning sk state %d\n", sk->sk_state);
226
227 return sk;
228 }
229
230 release_sock(sk);
231 }
232
233 return NULL;
234}
235
236static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100237 int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100238{
239 DECLARE_WAITQUEUE(wait, current);
240 struct sock *sk = sock->sk, *new_sk;
241 long timeo;
242 int ret = 0;
243
244 pr_debug("parent %p\n", sk);
245
246 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
247
248 if (sk->sk_state != LLCP_LISTEN) {
249 ret = -EBADFD;
250 goto error;
251 }
252
253 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
254
255 /* Wait for an incoming connection. */
256 add_wait_queue_exclusive(sk_sleep(sk), &wait);
257 while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
258 set_current_state(TASK_INTERRUPTIBLE);
259
260 if (!timeo) {
261 ret = -EAGAIN;
262 break;
263 }
264
265 if (signal_pending(current)) {
266 ret = sock_intr_errno(timeo);
267 break;
268 }
269
270 release_sock(sk);
271 timeo = schedule_timeout(timeo);
272 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
273 }
274 __set_current_state(TASK_RUNNING);
275 remove_wait_queue(sk_sleep(sk), &wait);
276
277 if (ret)
278 goto error;
279
280 newsock->state = SS_CONNECTED;
281
282 pr_debug("new socket %p\n", new_sk);
283
284error:
285 release_sock(sk);
286
287 return ret;
288}
289
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200290static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
Samuel Ortizd6469602011-12-14 16:43:12 +0100291 int *len, int peer)
292{
Samuel Ortizd6469602011-12-14 16:43:12 +0100293 struct sock *sk = sock->sk;
294 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200295 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
Samuel Ortizd6469602011-12-14 16:43:12 +0100296
Samuel Ortizfe3c0942012-07-05 17:43:08 +0200297 if (llcp_sock == NULL || llcp_sock->dev == NULL)
298 return -EBADFD;
299
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200300 pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
301 llcp_sock->dsap, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100302
Sasha Levin147f20e2012-06-30 11:56:47 +0200303 if (llcp_sock == NULL || llcp_sock->dev == NULL)
Sasha Levin58d1eab2012-06-06 23:02:55 +0200304 return -EBADFD;
305
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200306 uaddr->sa_family = AF_NFC;
307
Samuel Ortizd6469602011-12-14 16:43:12 +0100308 *len = sizeof(struct sockaddr_nfc_llcp);
309
310 llcp_addr->dev_idx = llcp_sock->dev->idx;
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200311 llcp_addr->target_idx = llcp_sock->target_idx;
Samuel Ortizd6469602011-12-14 16:43:12 +0100312 llcp_addr->dsap = llcp_sock->dsap;
313 llcp_addr->ssap = llcp_sock->ssap;
314 llcp_addr->service_name_len = llcp_sock->service_name_len;
315 memcpy(llcp_addr->service_name, llcp_sock->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100316 llcp_addr->service_name_len);
Samuel Ortizd6469602011-12-14 16:43:12 +0100317
318 return 0;
319}
320
321static inline unsigned int llcp_accept_poll(struct sock *parent)
322{
323 struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
324 struct sock *sk;
325
326 parent_sock = nfc_llcp_sock(parent);
327
328 list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100329 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100330 sk = &llcp_sock->sk;
331
332 if (sk->sk_state == LLCP_CONNECTED)
333 return POLLIN | POLLRDNORM;
334 }
335
336 return 0;
337}
338
339static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100340 poll_table *wait)
Samuel Ortizd6469602011-12-14 16:43:12 +0100341{
342 struct sock *sk = sock->sk;
343 unsigned int mask = 0;
344
345 pr_debug("%p\n", sk);
346
347 sock_poll_wait(file, sk_sleep(sk), wait);
348
349 if (sk->sk_state == LLCP_LISTEN)
350 return llcp_accept_poll(sk);
351
352 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
353 mask |= POLLERR;
354
355 if (!skb_queue_empty(&sk->sk_receive_queue))
Samuel Ortiz4260c132012-05-07 12:31:20 +0200356 mask |= POLLIN | POLLRDNORM;
Samuel Ortizd6469602011-12-14 16:43:12 +0100357
358 if (sk->sk_state == LLCP_CLOSED)
359 mask |= POLLHUP;
360
Samuel Ortiz4260c132012-05-07 12:31:20 +0200361 if (sk->sk_shutdown & RCV_SHUTDOWN)
362 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
363
364 if (sk->sk_shutdown == SHUTDOWN_MASK)
365 mask |= POLLHUP;
366
367 if (sock_writeable(sk))
368 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
369 else
370 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
371
372 pr_debug("mask 0x%x\n", mask);
373
Samuel Ortizd6469602011-12-14 16:43:12 +0100374 return mask;
375}
376
377static int llcp_sock_release(struct socket *sock)
378{
379 struct sock *sk = sock->sk;
380 struct nfc_llcp_local *local;
381 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100382 int err = 0;
Samuel Ortizd6469602011-12-14 16:43:12 +0100383
384 if (!sk)
385 return 0;
386
387 pr_debug("%p\n", sk);
388
389 local = llcp_sock->local;
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100390 if (local == NULL) {
391 err = -ENODEV;
392 goto out;
393 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100394
Samuel Ortizd6469602011-12-14 16:43:12 +0100395 lock_sock(sk);
396
397 /* Send a DISC */
398 if (sk->sk_state == LLCP_CONNECTED)
399 nfc_llcp_disconnect(llcp_sock);
400
401 if (sk->sk_state == LLCP_LISTEN) {
402 struct nfc_llcp_sock *lsk, *n;
403 struct sock *accept_sk;
404
405 list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100406 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100407 accept_sk = &lsk->sk;
408 lock_sock(accept_sk);
409
410 nfc_llcp_disconnect(lsk);
411 nfc_llcp_accept_unlink(accept_sk);
412
413 release_sock(accept_sk);
414
Samuel Ortizd6469602011-12-14 16:43:12 +0100415 sock_orphan(accept_sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100416 }
417 }
418
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200419 if (llcp_sock->reserved_ssap < LLCP_SAP_MAX)
420 nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100421
Samuel Ortizd6469602011-12-14 16:43:12 +0100422 release_sock(sk);
423
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200424 nfc_llcp_sock_unlink(&local->sockets, sk);
425
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100426out:
Samuel Ortizd6469602011-12-14 16:43:12 +0100427 sock_orphan(sk);
428 sock_put(sk);
429
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100430 return err;
Samuel Ortizd6469602011-12-14 16:43:12 +0100431}
432
433static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100434 int len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100435{
436 struct sock *sk = sock->sk;
437 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
438 struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
439 struct nfc_dev *dev;
440 struct nfc_llcp_local *local;
441 int ret = 0;
442
443 pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
444
445 if (!addr || len < sizeof(struct sockaddr_nfc) ||
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100446 addr->sa_family != AF_NFC) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100447 pr_err("Invalid socket\n");
448 return -EINVAL;
449 }
450
451 if (addr->service_name_len == 0 && addr->dsap == 0) {
452 pr_err("Missing service name or dsap\n");
453 return -EINVAL;
454 }
455
456 pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100457 addr->target_idx, addr->nfc_protocol);
Samuel Ortizd6469602011-12-14 16:43:12 +0100458
459 lock_sock(sk);
460
461 if (sk->sk_state == LLCP_CONNECTED) {
462 ret = -EISCONN;
463 goto error;
464 }
465
466 dev = nfc_get_device(addr->dev_idx);
467 if (dev == NULL) {
468 ret = -ENODEV;
469 goto error;
470 }
471
472 local = nfc_llcp_find_local(dev);
473 if (local == NULL) {
474 ret = -ENODEV;
475 goto put_dev;
476 }
477
478 device_lock(&dev->dev);
479 if (dev->dep_link_up == false) {
480 ret = -ENOLINK;
481 device_unlock(&dev->dev);
482 goto put_dev;
483 }
484 device_unlock(&dev->dev);
485
486 if (local->rf_mode == NFC_RF_INITIATOR &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100487 addr->target_idx != local->target_idx) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100488 ret = -ENOLINK;
489 goto put_dev;
490 }
491
492 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200493 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200494 llcp_sock->miu = llcp_sock->local->remote_miu;
Samuel Ortizd6469602011-12-14 16:43:12 +0100495 llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
496 if (llcp_sock->ssap == LLCP_SAP_MAX) {
497 ret = -ENOMEM;
498 goto put_dev;
499 }
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200500
501 llcp_sock->reserved_ssap = llcp_sock->ssap;
502
Samuel Ortizd6469602011-12-14 16:43:12 +0100503 if (addr->service_name_len == 0)
504 llcp_sock->dsap = addr->dsap;
505 else
506 llcp_sock->dsap = LLCP_SAP_SDP;
507 llcp_sock->nfc_protocol = addr->nfc_protocol;
508 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100509 addr->service_name_len,
510 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100511 llcp_sock->service_name = kmemdup(addr->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100512 llcp_sock->service_name_len,
513 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100514
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200515 nfc_llcp_sock_link(&local->connecting_sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100516
517 ret = nfc_llcp_send_connect(llcp_sock);
518 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200519 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100520
Samuel Ortizff353d82012-05-07 12:31:19 +0200521 ret = sock_wait_state(sk, LLCP_CONNECTED,
522 sock_sndtimeo(sk, flags & O_NONBLOCK));
523 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200524 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100525
526 release_sock(sk);
Samuel Ortizff353d82012-05-07 12:31:19 +0200527
Samuel Ortizd6469602011-12-14 16:43:12 +0100528 return 0;
529
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200530sock_unlink:
531 nfc_llcp_put_ssap(local, llcp_sock->ssap);
532
533 nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
534
Samuel Ortizd6469602011-12-14 16:43:12 +0100535put_dev:
536 nfc_put_device(dev);
537
538error:
539 release_sock(sk);
540 return ret;
541}
542
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100543static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100544 struct msghdr *msg, size_t len)
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100545{
546 struct sock *sk = sock->sk;
547 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
548 int ret;
549
550 pr_debug("sock %p sk %p", sock, sk);
551
552 ret = sock_error(sk);
553 if (ret)
554 return ret;
555
556 if (msg->msg_flags & MSG_OOB)
557 return -EOPNOTSUPP;
558
559 lock_sock(sk);
560
561 if (sk->sk_state != LLCP_CONNECTED) {
562 release_sock(sk);
563 return -ENOTCONN;
564 }
565
566 release_sock(sk);
567
568 return nfc_llcp_send_i_frame(llcp_sock, msg, len);
569}
570
Samuel Ortizd6469602011-12-14 16:43:12 +0100571static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
572 struct msghdr *msg, size_t len, int flags)
573{
574 int noblock = flags & MSG_DONTWAIT;
575 struct sock *sk = sock->sk;
576 unsigned int copied, rlen;
577 struct sk_buff *skb, *cskb;
578 int err = 0;
579
580 pr_debug("%p %zu\n", sk, len);
581
582 lock_sock(sk);
583
584 if (sk->sk_state == LLCP_CLOSED &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100585 skb_queue_empty(&sk->sk_receive_queue)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100586 release_sock(sk);
587 return 0;
588 }
589
590 release_sock(sk);
591
592 if (flags & (MSG_OOB))
593 return -EOPNOTSUPP;
594
595 skb = skb_recv_datagram(sk, flags, noblock, &err);
596 if (!skb) {
597 pr_err("Recv datagram failed state %d %d %d",
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100598 sk->sk_state, err, sock_error(sk));
Samuel Ortizd6469602011-12-14 16:43:12 +0100599
600 if (sk->sk_shutdown & RCV_SHUTDOWN)
601 return 0;
602
603 return err;
604 }
605
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100606 rlen = skb->len; /* real length of skb */
Samuel Ortizd6469602011-12-14 16:43:12 +0100607 copied = min_t(unsigned int, rlen, len);
608
609 cskb = skb;
610 if (memcpy_toiovec(msg->msg_iov, cskb->data, copied)) {
611 if (!(flags & MSG_PEEK))
612 skb_queue_head(&sk->sk_receive_queue, skb);
613 return -EFAULT;
614 }
615
616 /* Mark read part of skb as used */
617 if (!(flags & MSG_PEEK)) {
618
619 /* SOCK_STREAM: re-queue skb if it contains unreceived data */
620 if (sk->sk_type == SOCK_STREAM) {
621 skb_pull(skb, copied);
622 if (skb->len) {
623 skb_queue_head(&sk->sk_receive_queue, skb);
624 goto done;
625 }
626 }
627
628 kfree_skb(skb);
629 }
630
631 /* XXX Queue backlogged skbs */
632
633done:
634 /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
635 if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
636 copied = rlen;
637
638 return copied;
639}
640
641static const struct proto_ops llcp_sock_ops = {
642 .family = PF_NFC,
643 .owner = THIS_MODULE,
644 .bind = llcp_sock_bind,
645 .connect = llcp_sock_connect,
646 .release = llcp_sock_release,
647 .socketpair = sock_no_socketpair,
648 .accept = llcp_sock_accept,
649 .getname = llcp_sock_getname,
650 .poll = llcp_sock_poll,
651 .ioctl = sock_no_ioctl,
652 .listen = llcp_sock_listen,
653 .shutdown = sock_no_shutdown,
654 .setsockopt = sock_no_setsockopt,
655 .getsockopt = sock_no_getsockopt,
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100656 .sendmsg = llcp_sock_sendmsg,
Samuel Ortizd6469602011-12-14 16:43:12 +0100657 .recvmsg = llcp_sock_recvmsg,
658 .mmap = sock_no_mmap,
659};
660
661static void llcp_sock_destruct(struct sock *sk)
662{
663 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
664
665 pr_debug("%p\n", sk);
666
667 if (sk->sk_state == LLCP_CONNECTED)
668 nfc_put_device(llcp_sock->dev);
669
670 skb_queue_purge(&sk->sk_receive_queue);
671
672 nfc_llcp_sock_free(llcp_sock);
673
674 if (!sock_flag(sk, SOCK_DEAD)) {
675 pr_err("Freeing alive NFC LLCP socket %p\n", sk);
676 return;
677 }
678}
679
680struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
681{
682 struct sock *sk;
683 struct nfc_llcp_sock *llcp_sock;
684
685 sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
686 if (!sk)
687 return NULL;
688
689 llcp_sock = nfc_llcp_sock(sk);
690
691 sock_init_data(sock, sk);
692 sk->sk_state = LLCP_CLOSED;
693 sk->sk_protocol = NFC_SOCKPROTO_LLCP;
694 sk->sk_type = type;
695 sk->sk_destruct = llcp_sock_destruct;
696
697 llcp_sock->ssap = 0;
698 llcp_sock->dsap = LLCP_SAP_SDP;
Samuel Ortiz7a06e582012-05-07 22:03:34 +0200699 llcp_sock->rw = LLCP_DEFAULT_RW;
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200700 llcp_sock->miu = LLCP_DEFAULT_MIU;
Samuel Ortizd6469602011-12-14 16:43:12 +0100701 llcp_sock->send_n = llcp_sock->send_ack_n = 0;
702 llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
703 llcp_sock->remote_ready = 1;
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200704 llcp_sock->reserved_ssap = LLCP_SAP_MAX;
Samuel Ortizd6469602011-12-14 16:43:12 +0100705 skb_queue_head_init(&llcp_sock->tx_queue);
706 skb_queue_head_init(&llcp_sock->tx_pending_queue);
707 skb_queue_head_init(&llcp_sock->tx_backlog_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100708 INIT_LIST_HEAD(&llcp_sock->accept_queue);
709
710 if (sock != NULL)
711 sock->state = SS_UNCONNECTED;
712
713 return sk;
714}
715
716void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
717{
718 kfree(sock->service_name);
719
720 skb_queue_purge(&sock->tx_queue);
721 skb_queue_purge(&sock->tx_pending_queue);
722 skb_queue_purge(&sock->tx_backlog_queue);
723
724 list_del_init(&sock->accept_queue);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100725
Samuel Ortizd6469602011-12-14 16:43:12 +0100726 sock->parent = NULL;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200727
728 nfc_llcp_local_put(sock->local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100729}
730
731static int llcp_sock_create(struct net *net, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100732 const struct nfc_protocol *nfc_proto)
Samuel Ortizd6469602011-12-14 16:43:12 +0100733{
734 struct sock *sk;
735
736 pr_debug("%p\n", sock);
737
738 if (sock->type != SOCK_STREAM && sock->type != SOCK_DGRAM)
739 return -ESOCKTNOSUPPORT;
740
741 sock->ops = &llcp_sock_ops;
742
743 sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
744 if (sk == NULL)
745 return -ENOMEM;
746
747 return 0;
748}
749
750static const struct nfc_protocol llcp_nfc_proto = {
751 .id = NFC_SOCKPROTO_LLCP,
752 .proto = &llcp_sock_proto,
753 .owner = THIS_MODULE,
754 .create = llcp_sock_create
755};
756
757int __init nfc_llcp_sock_init(void)
758{
759 return nfc_proto_register(&llcp_nfc_proto);
760}
761
762void nfc_llcp_sock_exit(void)
763{
764 nfc_proto_unregister(&llcp_nfc_proto);
765}