blob: 6c94447ec414c87479581b45fbcced1071f782cb [file] [log] [blame]
Samuel Ortizd6469602011-12-14 16:43:12 +01001/*
2 * Copyright (C) 2011 Intel Corporation. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the
16 * Free Software Foundation, Inc.,
17 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
19
20#define pr_fmt(fmt) "llcp: %s: " fmt, __func__
21
22#include <linux/init.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/nfc.h>
26
27#include "../nfc.h"
28#include "llcp.h"
29
Samuel Ortizff353d82012-05-07 12:31:19 +020030static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
31{
32 DECLARE_WAITQUEUE(wait, current);
33 int err = 0;
34
35 pr_debug("sk %p", sk);
36
37 add_wait_queue(sk_sleep(sk), &wait);
38 set_current_state(TASK_INTERRUPTIBLE);
39
40 while (sk->sk_state != state) {
41 if (!timeo) {
42 err = -EINPROGRESS;
43 break;
44 }
45
46 if (signal_pending(current)) {
47 err = sock_intr_errno(timeo);
48 break;
49 }
50
51 release_sock(sk);
52 timeo = schedule_timeout(timeo);
53 lock_sock(sk);
54 set_current_state(TASK_INTERRUPTIBLE);
55
56 err = sock_error(sk);
57 if (err)
58 break;
59 }
60
61 __set_current_state(TASK_RUNNING);
62 remove_wait_queue(sk_sleep(sk), &wait);
63 return err;
64}
65
Samuel Ortizd6469602011-12-14 16:43:12 +010066static struct proto llcp_sock_proto = {
67 .name = "NFC_LLCP",
68 .owner = THIS_MODULE,
69 .obj_size = sizeof(struct nfc_llcp_sock),
70};
71
72static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
73{
74 struct sock *sk = sock->sk;
75 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
76 struct nfc_llcp_local *local;
77 struct nfc_dev *dev;
78 struct sockaddr_nfc_llcp llcp_addr;
79 int len, ret = 0;
80
Samuel Ortizd6469602011-12-14 16:43:12 +010081 if (!addr || addr->sa_family != AF_NFC)
82 return -EINVAL;
83
Samuel Ortizc66433d2012-06-29 12:03:55 +020084 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
85
Samuel Ortizd6469602011-12-14 16:43:12 +010086 memset(&llcp_addr, 0, sizeof(llcp_addr));
87 len = min_t(unsigned int, sizeof(llcp_addr), alen);
88 memcpy(&llcp_addr, addr, len);
89
90 /* This is going to be a listening socket, dsap must be 0 */
91 if (llcp_addr.dsap != 0)
92 return -EINVAL;
93
94 lock_sock(sk);
95
96 if (sk->sk_state != LLCP_CLOSED) {
97 ret = -EBADFD;
98 goto error;
99 }
100
101 dev = nfc_get_device(llcp_addr.dev_idx);
102 if (dev == NULL) {
103 ret = -ENODEV;
104 goto error;
105 }
106
107 local = nfc_llcp_find_local(dev);
108 if (local == NULL) {
109 ret = -ENODEV;
110 goto put_dev;
111 }
112
113 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200114 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100115 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
116 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100117 llcp_addr.service_name_len,
118 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100119 llcp_sock->service_name = kmemdup(llcp_addr.service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100120 llcp_sock->service_name_len,
121 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100122
123 llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200124 if (llcp_sock->ssap == LLCP_SAP_MAX) {
125 ret = -EADDRINUSE;
Samuel Ortizd6469602011-12-14 16:43:12 +0100126 goto put_dev;
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200127 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100128
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200129 llcp_sock->reserved_ssap = llcp_sock->ssap;
130
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200131 nfc_llcp_sock_link(&local->sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100132
133 pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
134
135 sk->sk_state = LLCP_BOUND;
136
137put_dev:
138 nfc_put_device(dev);
139
140error:
141 release_sock(sk);
142 return ret;
143}
144
Thierry Escande44635232012-09-26 18:16:44 +0200145static int llcp_raw_sock_bind(struct socket *sock, struct sockaddr *addr,
146 int alen)
147{
148 struct sock *sk = sock->sk;
149 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
150 struct nfc_llcp_local *local;
151 struct nfc_dev *dev;
152 struct sockaddr_nfc_llcp llcp_addr;
153 int len, ret = 0;
154
155 if (!addr || addr->sa_family != AF_NFC)
156 return -EINVAL;
157
158 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
159
160 memset(&llcp_addr, 0, sizeof(llcp_addr));
161 len = min_t(unsigned int, sizeof(llcp_addr), alen);
162 memcpy(&llcp_addr, addr, len);
163
164 lock_sock(sk);
165
166 if (sk->sk_state != LLCP_CLOSED) {
167 ret = -EBADFD;
168 goto error;
169 }
170
171 dev = nfc_get_device(llcp_addr.dev_idx);
172 if (dev == NULL) {
173 ret = -ENODEV;
174 goto error;
175 }
176
177 local = nfc_llcp_find_local(dev);
178 if (local == NULL) {
179 ret = -ENODEV;
180 goto put_dev;
181 }
182
183 llcp_sock->dev = dev;
184 llcp_sock->local = nfc_llcp_local_get(local);
185 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
186
187 nfc_llcp_sock_link(&local->raw_sockets, sk);
188
189 sk->sk_state = LLCP_BOUND;
190
191put_dev:
192 nfc_put_device(dev);
193
194error:
195 release_sock(sk);
196 return ret;
197}
198
Samuel Ortizd6469602011-12-14 16:43:12 +0100199static int llcp_sock_listen(struct socket *sock, int backlog)
200{
201 struct sock *sk = sock->sk;
202 int ret = 0;
203
204 pr_debug("sk %p backlog %d\n", sk, backlog);
205
206 lock_sock(sk);
207
Szymon Janc874934f2012-10-04 15:15:51 +0200208 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM) ||
209 sk->sk_state != LLCP_BOUND) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100210 ret = -EBADFD;
211 goto error;
212 }
213
214 sk->sk_max_ack_backlog = backlog;
215 sk->sk_ack_backlog = 0;
216
217 pr_debug("Socket listening\n");
218 sk->sk_state = LLCP_LISTEN;
219
220error:
221 release_sock(sk);
222
223 return ret;
224}
225
226void nfc_llcp_accept_unlink(struct sock *sk)
227{
228 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
229
230 pr_debug("state %d\n", sk->sk_state);
231
232 list_del_init(&llcp_sock->accept_queue);
233 sk_acceptq_removed(llcp_sock->parent);
234 llcp_sock->parent = NULL;
235
236 sock_put(sk);
237}
238
239void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
240{
241 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
242 struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
243
244 /* Lock will be free from unlink */
245 sock_hold(sk);
246
247 list_add_tail(&llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100248 &llcp_sock_parent->accept_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100249 llcp_sock->parent = parent;
250 sk_acceptq_added(parent);
251}
252
253struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100254 struct socket *newsock)
Samuel Ortizd6469602011-12-14 16:43:12 +0100255{
256 struct nfc_llcp_sock *lsk, *n, *llcp_parent;
257 struct sock *sk;
258
259 llcp_parent = nfc_llcp_sock(parent);
260
261 list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100262 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100263 sk = &lsk->sk;
264 lock_sock(sk);
265
266 if (sk->sk_state == LLCP_CLOSED) {
267 release_sock(sk);
268 nfc_llcp_accept_unlink(sk);
269 continue;
270 }
271
272 if (sk->sk_state == LLCP_CONNECTED || !newsock) {
Samuel Ortiz39a352a2013-03-26 14:35:57 +0100273 list_del_init(&lsk->accept_queue);
274 sock_put(sk);
275
Samuel Ortizd6469602011-12-14 16:43:12 +0100276 if (newsock)
277 sock_graft(sk, newsock);
278
279 release_sock(sk);
280
281 pr_debug("Returning sk state %d\n", sk->sk_state);
282
Samuel Ortizb141e812013-02-21 11:04:45 +0100283 sk_acceptq_removed(parent);
284
Samuel Ortizd6469602011-12-14 16:43:12 +0100285 return sk;
286 }
287
288 release_sock(sk);
289 }
290
291 return NULL;
292}
293
294static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100295 int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100296{
297 DECLARE_WAITQUEUE(wait, current);
298 struct sock *sk = sock->sk, *new_sk;
299 long timeo;
300 int ret = 0;
301
302 pr_debug("parent %p\n", sk);
303
304 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
305
306 if (sk->sk_state != LLCP_LISTEN) {
307 ret = -EBADFD;
308 goto error;
309 }
310
311 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
312
313 /* Wait for an incoming connection. */
314 add_wait_queue_exclusive(sk_sleep(sk), &wait);
315 while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
316 set_current_state(TASK_INTERRUPTIBLE);
317
318 if (!timeo) {
319 ret = -EAGAIN;
320 break;
321 }
322
323 if (signal_pending(current)) {
324 ret = sock_intr_errno(timeo);
325 break;
326 }
327
328 release_sock(sk);
329 timeo = schedule_timeout(timeo);
330 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
331 }
332 __set_current_state(TASK_RUNNING);
333 remove_wait_queue(sk_sleep(sk), &wait);
334
335 if (ret)
336 goto error;
337
338 newsock->state = SS_CONNECTED;
339
340 pr_debug("new socket %p\n", new_sk);
341
342error:
343 release_sock(sk);
344
345 return ret;
346}
347
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200348static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
Samuel Ortizd6469602011-12-14 16:43:12 +0100349 int *len, int peer)
350{
Samuel Ortizd6469602011-12-14 16:43:12 +0100351 struct sock *sk = sock->sk;
352 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200353 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
Samuel Ortizd6469602011-12-14 16:43:12 +0100354
Samuel Ortizfe3c0942012-07-05 17:43:08 +0200355 if (llcp_sock == NULL || llcp_sock->dev == NULL)
356 return -EBADFD;
357
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200358 pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
359 llcp_sock->dsap, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100360
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200361 uaddr->sa_family = AF_NFC;
362
Samuel Ortizd6469602011-12-14 16:43:12 +0100363 *len = sizeof(struct sockaddr_nfc_llcp);
364
365 llcp_addr->dev_idx = llcp_sock->dev->idx;
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200366 llcp_addr->target_idx = llcp_sock->target_idx;
Samuel Ortizd6469602011-12-14 16:43:12 +0100367 llcp_addr->dsap = llcp_sock->dsap;
368 llcp_addr->ssap = llcp_sock->ssap;
369 llcp_addr->service_name_len = llcp_sock->service_name_len;
370 memcpy(llcp_addr->service_name, llcp_sock->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100371 llcp_addr->service_name_len);
Samuel Ortizd6469602011-12-14 16:43:12 +0100372
373 return 0;
374}
375
376static inline unsigned int llcp_accept_poll(struct sock *parent)
377{
378 struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
379 struct sock *sk;
380
381 parent_sock = nfc_llcp_sock(parent);
382
383 list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100384 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100385 sk = &llcp_sock->sk;
386
387 if (sk->sk_state == LLCP_CONNECTED)
388 return POLLIN | POLLRDNORM;
389 }
390
391 return 0;
392}
393
394static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100395 poll_table *wait)
Samuel Ortizd6469602011-12-14 16:43:12 +0100396{
397 struct sock *sk = sock->sk;
398 unsigned int mask = 0;
399
400 pr_debug("%p\n", sk);
401
402 sock_poll_wait(file, sk_sleep(sk), wait);
403
404 if (sk->sk_state == LLCP_LISTEN)
405 return llcp_accept_poll(sk);
406
407 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
408 mask |= POLLERR;
409
410 if (!skb_queue_empty(&sk->sk_receive_queue))
Samuel Ortiz4260c132012-05-07 12:31:20 +0200411 mask |= POLLIN | POLLRDNORM;
Samuel Ortizd6469602011-12-14 16:43:12 +0100412
413 if (sk->sk_state == LLCP_CLOSED)
414 mask |= POLLHUP;
415
Samuel Ortiz4260c132012-05-07 12:31:20 +0200416 if (sk->sk_shutdown & RCV_SHUTDOWN)
417 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
418
419 if (sk->sk_shutdown == SHUTDOWN_MASK)
420 mask |= POLLHUP;
421
422 if (sock_writeable(sk))
423 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
424 else
425 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
426
427 pr_debug("mask 0x%x\n", mask);
428
Samuel Ortizd6469602011-12-14 16:43:12 +0100429 return mask;
430}
431
432static int llcp_sock_release(struct socket *sock)
433{
434 struct sock *sk = sock->sk;
435 struct nfc_llcp_local *local;
436 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100437 int err = 0;
Samuel Ortizd6469602011-12-14 16:43:12 +0100438
439 if (!sk)
440 return 0;
441
442 pr_debug("%p\n", sk);
443
444 local = llcp_sock->local;
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100445 if (local == NULL) {
446 err = -ENODEV;
447 goto out;
448 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100449
Samuel Ortizd6469602011-12-14 16:43:12 +0100450 lock_sock(sk);
451
452 /* Send a DISC */
453 if (sk->sk_state == LLCP_CONNECTED)
454 nfc_llcp_disconnect(llcp_sock);
455
456 if (sk->sk_state == LLCP_LISTEN) {
457 struct nfc_llcp_sock *lsk, *n;
458 struct sock *accept_sk;
459
460 list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100461 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100462 accept_sk = &lsk->sk;
463 lock_sock(accept_sk);
464
465 nfc_llcp_disconnect(lsk);
466 nfc_llcp_accept_unlink(accept_sk);
467
468 release_sock(accept_sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100469 }
470 }
471
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200472 if (llcp_sock->reserved_ssap < LLCP_SAP_MAX)
473 nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100474
Samuel Ortizd6469602011-12-14 16:43:12 +0100475 release_sock(sk);
476
Thierry Escande44635232012-09-26 18:16:44 +0200477 if (sock->type == SOCK_RAW)
478 nfc_llcp_sock_unlink(&local->raw_sockets, sk);
479 else
480 nfc_llcp_sock_unlink(&local->sockets, sk);
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200481
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100482out:
Samuel Ortizd6469602011-12-14 16:43:12 +0100483 sock_orphan(sk);
484 sock_put(sk);
485
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100486 return err;
Samuel Ortizd6469602011-12-14 16:43:12 +0100487}
488
489static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100490 int len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100491{
492 struct sock *sk = sock->sk;
493 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
494 struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
495 struct nfc_dev *dev;
496 struct nfc_llcp_local *local;
497 int ret = 0;
498
499 pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
500
501 if (!addr || len < sizeof(struct sockaddr_nfc) ||
Dave Jones32418cf2012-10-04 09:51:11 +0000502 addr->sa_family != AF_NFC)
Samuel Ortizd6469602011-12-14 16:43:12 +0100503 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100504
Dave Jones32418cf2012-10-04 09:51:11 +0000505 if (addr->service_name_len == 0 && addr->dsap == 0)
Samuel Ortizd6469602011-12-14 16:43:12 +0100506 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100507
508 pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100509 addr->target_idx, addr->nfc_protocol);
Samuel Ortizd6469602011-12-14 16:43:12 +0100510
511 lock_sock(sk);
512
513 if (sk->sk_state == LLCP_CONNECTED) {
514 ret = -EISCONN;
515 goto error;
516 }
517
518 dev = nfc_get_device(addr->dev_idx);
519 if (dev == NULL) {
520 ret = -ENODEV;
521 goto error;
522 }
523
524 local = nfc_llcp_find_local(dev);
525 if (local == NULL) {
526 ret = -ENODEV;
527 goto put_dev;
528 }
529
530 device_lock(&dev->dev);
531 if (dev->dep_link_up == false) {
532 ret = -ENOLINK;
533 device_unlock(&dev->dev);
534 goto put_dev;
535 }
536 device_unlock(&dev->dev);
537
538 if (local->rf_mode == NFC_RF_INITIATOR &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100539 addr->target_idx != local->target_idx) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100540 ret = -ENOLINK;
541 goto put_dev;
542 }
543
544 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200545 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200546 llcp_sock->miu = llcp_sock->local->remote_miu;
Samuel Ortizd6469602011-12-14 16:43:12 +0100547 llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
548 if (llcp_sock->ssap == LLCP_SAP_MAX) {
549 ret = -ENOMEM;
550 goto put_dev;
551 }
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200552
553 llcp_sock->reserved_ssap = llcp_sock->ssap;
554
Samuel Ortizd6469602011-12-14 16:43:12 +0100555 if (addr->service_name_len == 0)
556 llcp_sock->dsap = addr->dsap;
557 else
558 llcp_sock->dsap = LLCP_SAP_SDP;
559 llcp_sock->nfc_protocol = addr->nfc_protocol;
560 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100561 addr->service_name_len,
562 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100563 llcp_sock->service_name = kmemdup(addr->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100564 llcp_sock->service_name_len,
565 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100566
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200567 nfc_llcp_sock_link(&local->connecting_sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100568
569 ret = nfc_llcp_send_connect(llcp_sock);
570 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200571 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100572
Samuel Ortizff353d82012-05-07 12:31:19 +0200573 ret = sock_wait_state(sk, LLCP_CONNECTED,
574 sock_sndtimeo(sk, flags & O_NONBLOCK));
575 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200576 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100577
578 release_sock(sk);
Samuel Ortizff353d82012-05-07 12:31:19 +0200579
Samuel Ortizd6469602011-12-14 16:43:12 +0100580 return 0;
581
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200582sock_unlink:
583 nfc_llcp_put_ssap(local, llcp_sock->ssap);
584
585 nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
586
Samuel Ortizd6469602011-12-14 16:43:12 +0100587put_dev:
588 nfc_put_device(dev);
589
590error:
591 release_sock(sk);
592 return ret;
593}
594
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100595static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100596 struct msghdr *msg, size_t len)
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100597{
598 struct sock *sk = sock->sk;
599 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
600 int ret;
601
602 pr_debug("sock %p sk %p", sock, sk);
603
604 ret = sock_error(sk);
605 if (ret)
606 return ret;
607
608 if (msg->msg_flags & MSG_OOB)
609 return -EOPNOTSUPP;
610
611 lock_sock(sk);
612
Samuel Ortizb874dec2012-10-16 15:04:10 +0200613 if (sk->sk_type == SOCK_DGRAM) {
614 struct sockaddr_nfc_llcp *addr =
615 (struct sockaddr_nfc_llcp *)msg->msg_name;
616
617 if (msg->msg_namelen < sizeof(*addr)) {
618 release_sock(sk);
Samuel Ortizb874dec2012-10-16 15:04:10 +0200619 return -EINVAL;
620 }
621
622 release_sock(sk);
623
624 return nfc_llcp_send_ui_frame(llcp_sock, addr->dsap, addr->ssap,
625 msg, len);
626 }
627
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100628 if (sk->sk_state != LLCP_CONNECTED) {
629 release_sock(sk);
630 return -ENOTCONN;
631 }
632
633 release_sock(sk);
634
635 return nfc_llcp_send_i_frame(llcp_sock, msg, len);
636}
637
Samuel Ortizd6469602011-12-14 16:43:12 +0100638static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
639 struct msghdr *msg, size_t len, int flags)
640{
641 int noblock = flags & MSG_DONTWAIT;
642 struct sock *sk = sock->sk;
643 unsigned int copied, rlen;
644 struct sk_buff *skb, *cskb;
645 int err = 0;
646
647 pr_debug("%p %zu\n", sk, len);
648
Mathias Kraused26d65042013-04-07 01:51:58 +0000649 msg->msg_namelen = 0;
650
Samuel Ortizd6469602011-12-14 16:43:12 +0100651 lock_sock(sk);
652
653 if (sk->sk_state == LLCP_CLOSED &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100654 skb_queue_empty(&sk->sk_receive_queue)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100655 release_sock(sk);
656 return 0;
657 }
658
659 release_sock(sk);
660
661 if (flags & (MSG_OOB))
662 return -EOPNOTSUPP;
663
664 skb = skb_recv_datagram(sk, flags, noblock, &err);
665 if (!skb) {
666 pr_err("Recv datagram failed state %d %d %d",
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100667 sk->sk_state, err, sock_error(sk));
Samuel Ortizd6469602011-12-14 16:43:12 +0100668
669 if (sk->sk_shutdown & RCV_SHUTDOWN)
670 return 0;
671
672 return err;
673 }
674
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100675 rlen = skb->len; /* real length of skb */
Samuel Ortizd6469602011-12-14 16:43:12 +0100676 copied = min_t(unsigned int, rlen, len);
677
678 cskb = skb;
Samuel Ortizfb97c3e2013-01-11 14:54:22 +0100679 if (skb_copy_datagram_iovec(cskb, 0, msg->msg_iov, copied)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100680 if (!(flags & MSG_PEEK))
681 skb_queue_head(&sk->sk_receive_queue, skb);
682 return -EFAULT;
683 }
684
Thierry Escande2c2d45b2012-11-27 15:44:24 +0100685 sock_recv_timestamp(msg, sk, skb);
686
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200687 if (sk->sk_type == SOCK_DGRAM && msg->msg_name) {
688 struct nfc_llcp_ui_cb *ui_cb = nfc_llcp_ui_skb_cb(skb);
Samuel Ortizfad2e372013-01-11 14:48:48 +0100689 struct sockaddr_nfc_llcp *sockaddr =
690 (struct sockaddr_nfc_llcp *) msg->msg_name;
691
692 msg->msg_namelen = sizeof(struct sockaddr_nfc_llcp);
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200693
694 pr_debug("Datagram socket %d %d\n", ui_cb->dsap, ui_cb->ssap);
695
Mathias Kraused26d65042013-04-07 01:51:58 +0000696 memset(sockaddr, 0, sizeof(*sockaddr));
Samuel Ortizfad2e372013-01-11 14:48:48 +0100697 sockaddr->sa_family = AF_NFC;
698 sockaddr->nfc_protocol = NFC_PROTO_NFC_DEP;
699 sockaddr->dsap = ui_cb->dsap;
700 sockaddr->ssap = ui_cb->ssap;
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200701 }
702
Samuel Ortizd6469602011-12-14 16:43:12 +0100703 /* Mark read part of skb as used */
704 if (!(flags & MSG_PEEK)) {
705
706 /* SOCK_STREAM: re-queue skb if it contains unreceived data */
Samuel Ortiz31ca61a2012-10-15 17:44:44 +0200707 if (sk->sk_type == SOCK_STREAM ||
708 sk->sk_type == SOCK_DGRAM ||
709 sk->sk_type == SOCK_RAW) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100710 skb_pull(skb, copied);
711 if (skb->len) {
712 skb_queue_head(&sk->sk_receive_queue, skb);
713 goto done;
714 }
715 }
716
717 kfree_skb(skb);
718 }
719
720 /* XXX Queue backlogged skbs */
721
722done:
723 /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
724 if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
725 copied = rlen;
726
727 return copied;
728}
729
730static const struct proto_ops llcp_sock_ops = {
731 .family = PF_NFC,
732 .owner = THIS_MODULE,
733 .bind = llcp_sock_bind,
734 .connect = llcp_sock_connect,
735 .release = llcp_sock_release,
736 .socketpair = sock_no_socketpair,
737 .accept = llcp_sock_accept,
738 .getname = llcp_sock_getname,
739 .poll = llcp_sock_poll,
740 .ioctl = sock_no_ioctl,
741 .listen = llcp_sock_listen,
742 .shutdown = sock_no_shutdown,
743 .setsockopt = sock_no_setsockopt,
744 .getsockopt = sock_no_getsockopt,
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100745 .sendmsg = llcp_sock_sendmsg,
Samuel Ortizd6469602011-12-14 16:43:12 +0100746 .recvmsg = llcp_sock_recvmsg,
747 .mmap = sock_no_mmap,
748};
749
Thierry Escande44635232012-09-26 18:16:44 +0200750static const struct proto_ops llcp_rawsock_ops = {
751 .family = PF_NFC,
752 .owner = THIS_MODULE,
753 .bind = llcp_raw_sock_bind,
754 .connect = sock_no_connect,
755 .release = llcp_sock_release,
756 .socketpair = sock_no_socketpair,
757 .accept = sock_no_accept,
758 .getname = llcp_sock_getname,
759 .poll = llcp_sock_poll,
760 .ioctl = sock_no_ioctl,
761 .listen = sock_no_listen,
762 .shutdown = sock_no_shutdown,
763 .setsockopt = sock_no_setsockopt,
764 .getsockopt = sock_no_getsockopt,
765 .sendmsg = sock_no_sendmsg,
766 .recvmsg = llcp_sock_recvmsg,
767 .mmap = sock_no_mmap,
768};
769
Samuel Ortizd6469602011-12-14 16:43:12 +0100770static void llcp_sock_destruct(struct sock *sk)
771{
772 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
773
774 pr_debug("%p\n", sk);
775
776 if (sk->sk_state == LLCP_CONNECTED)
777 nfc_put_device(llcp_sock->dev);
778
779 skb_queue_purge(&sk->sk_receive_queue);
780
781 nfc_llcp_sock_free(llcp_sock);
782
783 if (!sock_flag(sk, SOCK_DEAD)) {
784 pr_err("Freeing alive NFC LLCP socket %p\n", sk);
785 return;
786 }
787}
788
789struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
790{
791 struct sock *sk;
792 struct nfc_llcp_sock *llcp_sock;
793
794 sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
795 if (!sk)
796 return NULL;
797
798 llcp_sock = nfc_llcp_sock(sk);
799
800 sock_init_data(sock, sk);
801 sk->sk_state = LLCP_CLOSED;
802 sk->sk_protocol = NFC_SOCKPROTO_LLCP;
803 sk->sk_type = type;
804 sk->sk_destruct = llcp_sock_destruct;
805
806 llcp_sock->ssap = 0;
807 llcp_sock->dsap = LLCP_SAP_SDP;
Samuel Ortiz7a06e582012-05-07 22:03:34 +0200808 llcp_sock->rw = LLCP_DEFAULT_RW;
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200809 llcp_sock->miu = LLCP_DEFAULT_MIU;
Samuel Ortizd6469602011-12-14 16:43:12 +0100810 llcp_sock->send_n = llcp_sock->send_ack_n = 0;
811 llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
812 llcp_sock->remote_ready = 1;
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200813 llcp_sock->reserved_ssap = LLCP_SAP_MAX;
Samuel Ortizd6469602011-12-14 16:43:12 +0100814 skb_queue_head_init(&llcp_sock->tx_queue);
815 skb_queue_head_init(&llcp_sock->tx_pending_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100816 INIT_LIST_HEAD(&llcp_sock->accept_queue);
817
818 if (sock != NULL)
819 sock->state = SS_UNCONNECTED;
820
821 return sk;
822}
823
824void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
825{
826 kfree(sock->service_name);
827
828 skb_queue_purge(&sock->tx_queue);
829 skb_queue_purge(&sock->tx_pending_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100830
831 list_del_init(&sock->accept_queue);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100832
Samuel Ortizd6469602011-12-14 16:43:12 +0100833 sock->parent = NULL;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200834
835 nfc_llcp_local_put(sock->local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100836}
837
838static int llcp_sock_create(struct net *net, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100839 const struct nfc_protocol *nfc_proto)
Samuel Ortizd6469602011-12-14 16:43:12 +0100840{
841 struct sock *sk;
842
843 pr_debug("%p\n", sock);
844
Thierry Escande44635232012-09-26 18:16:44 +0200845 if (sock->type != SOCK_STREAM &&
846 sock->type != SOCK_DGRAM &&
847 sock->type != SOCK_RAW)
Samuel Ortizd6469602011-12-14 16:43:12 +0100848 return -ESOCKTNOSUPPORT;
849
Thierry Escande44635232012-09-26 18:16:44 +0200850 if (sock->type == SOCK_RAW)
851 sock->ops = &llcp_rawsock_ops;
852 else
853 sock->ops = &llcp_sock_ops;
Samuel Ortizd6469602011-12-14 16:43:12 +0100854
855 sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
856 if (sk == NULL)
857 return -ENOMEM;
858
859 return 0;
860}
861
862static const struct nfc_protocol llcp_nfc_proto = {
863 .id = NFC_SOCKPROTO_LLCP,
864 .proto = &llcp_sock_proto,
865 .owner = THIS_MODULE,
866 .create = llcp_sock_create
867};
868
869int __init nfc_llcp_sock_init(void)
870{
871 return nfc_proto_register(&llcp_nfc_proto);
872}
873
874void nfc_llcp_sock_exit(void)
875{
876 nfc_proto_unregister(&llcp_nfc_proto);
877}