blob: debc54aa8a41a54a91d8f02f1838c164d0bee5af [file] [log] [blame]
Samuel Ortizd6469602011-12-14 16:43:12 +01001/*
2 * Copyright (C) 2011 Intel Corporation. All rights reserved.
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the
16 * Free Software Foundation, Inc.,
17 * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
18 */
19
20#define pr_fmt(fmt) "llcp: %s: " fmt, __func__
21
22#include <linux/init.h>
23#include <linux/kernel.h>
24#include <linux/module.h>
25#include <linux/nfc.h>
26
27#include "../nfc.h"
28#include "llcp.h"
29
Samuel Ortizff353d82012-05-07 12:31:19 +020030static int sock_wait_state(struct sock *sk, int state, unsigned long timeo)
31{
32 DECLARE_WAITQUEUE(wait, current);
33 int err = 0;
34
35 pr_debug("sk %p", sk);
36
37 add_wait_queue(sk_sleep(sk), &wait);
38 set_current_state(TASK_INTERRUPTIBLE);
39
40 while (sk->sk_state != state) {
41 if (!timeo) {
42 err = -EINPROGRESS;
43 break;
44 }
45
46 if (signal_pending(current)) {
47 err = sock_intr_errno(timeo);
48 break;
49 }
50
51 release_sock(sk);
52 timeo = schedule_timeout(timeo);
53 lock_sock(sk);
54 set_current_state(TASK_INTERRUPTIBLE);
55
56 err = sock_error(sk);
57 if (err)
58 break;
59 }
60
61 __set_current_state(TASK_RUNNING);
62 remove_wait_queue(sk_sleep(sk), &wait);
63 return err;
64}
65
Samuel Ortizd6469602011-12-14 16:43:12 +010066static struct proto llcp_sock_proto = {
67 .name = "NFC_LLCP",
68 .owner = THIS_MODULE,
69 .obj_size = sizeof(struct nfc_llcp_sock),
70};
71
72static int llcp_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
73{
74 struct sock *sk = sock->sk;
75 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
76 struct nfc_llcp_local *local;
77 struct nfc_dev *dev;
78 struct sockaddr_nfc_llcp llcp_addr;
79 int len, ret = 0;
80
Samuel Ortizd6469602011-12-14 16:43:12 +010081 if (!addr || addr->sa_family != AF_NFC)
82 return -EINVAL;
83
Samuel Ortizc66433d2012-06-29 12:03:55 +020084 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
85
Samuel Ortizd6469602011-12-14 16:43:12 +010086 memset(&llcp_addr, 0, sizeof(llcp_addr));
87 len = min_t(unsigned int, sizeof(llcp_addr), alen);
88 memcpy(&llcp_addr, addr, len);
89
90 /* This is going to be a listening socket, dsap must be 0 */
91 if (llcp_addr.dsap != 0)
92 return -EINVAL;
93
94 lock_sock(sk);
95
96 if (sk->sk_state != LLCP_CLOSED) {
97 ret = -EBADFD;
98 goto error;
99 }
100
101 dev = nfc_get_device(llcp_addr.dev_idx);
102 if (dev == NULL) {
103 ret = -ENODEV;
104 goto error;
105 }
106
107 local = nfc_llcp_find_local(dev);
108 if (local == NULL) {
109 ret = -ENODEV;
110 goto put_dev;
111 }
112
113 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200114 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100115 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
116 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100117 llcp_addr.service_name_len,
118 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100119 llcp_sock->service_name = kmemdup(llcp_addr.service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100120 llcp_sock->service_name_len,
121 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100122
123 llcp_sock->ssap = nfc_llcp_get_sdp_ssap(local, llcp_sock);
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200124 if (llcp_sock->ssap == LLCP_SAP_MAX) {
125 ret = -EADDRINUSE;
Samuel Ortizd6469602011-12-14 16:43:12 +0100126 goto put_dev;
Samuel Ortiz8b7e8ed2012-06-22 15:32:20 +0200127 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100128
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200129 llcp_sock->reserved_ssap = llcp_sock->ssap;
130
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200131 nfc_llcp_sock_link(&local->sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100132
133 pr_debug("Socket bound to SAP %d\n", llcp_sock->ssap);
134
135 sk->sk_state = LLCP_BOUND;
136
137put_dev:
138 nfc_put_device(dev);
139
140error:
141 release_sock(sk);
142 return ret;
143}
144
Thierry Escande44635232012-09-26 18:16:44 +0200145static int llcp_raw_sock_bind(struct socket *sock, struct sockaddr *addr,
146 int alen)
147{
148 struct sock *sk = sock->sk;
149 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
150 struct nfc_llcp_local *local;
151 struct nfc_dev *dev;
152 struct sockaddr_nfc_llcp llcp_addr;
153 int len, ret = 0;
154
155 if (!addr || addr->sa_family != AF_NFC)
156 return -EINVAL;
157
158 pr_debug("sk %p addr %p family %d\n", sk, addr, addr->sa_family);
159
160 memset(&llcp_addr, 0, sizeof(llcp_addr));
161 len = min_t(unsigned int, sizeof(llcp_addr), alen);
162 memcpy(&llcp_addr, addr, len);
163
164 lock_sock(sk);
165
166 if (sk->sk_state != LLCP_CLOSED) {
167 ret = -EBADFD;
168 goto error;
169 }
170
171 dev = nfc_get_device(llcp_addr.dev_idx);
172 if (dev == NULL) {
173 ret = -ENODEV;
174 goto error;
175 }
176
177 local = nfc_llcp_find_local(dev);
178 if (local == NULL) {
179 ret = -ENODEV;
180 goto put_dev;
181 }
182
183 llcp_sock->dev = dev;
184 llcp_sock->local = nfc_llcp_local_get(local);
185 llcp_sock->nfc_protocol = llcp_addr.nfc_protocol;
186
187 nfc_llcp_sock_link(&local->raw_sockets, sk);
188
189 sk->sk_state = LLCP_BOUND;
190
191put_dev:
192 nfc_put_device(dev);
193
194error:
195 release_sock(sk);
196 return ret;
197}
198
Samuel Ortizd6469602011-12-14 16:43:12 +0100199static int llcp_sock_listen(struct socket *sock, int backlog)
200{
201 struct sock *sk = sock->sk;
202 int ret = 0;
203
204 pr_debug("sk %p backlog %d\n", sk, backlog);
205
206 lock_sock(sk);
207
Szymon Janc874934f2012-10-04 15:15:51 +0200208 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM) ||
209 sk->sk_state != LLCP_BOUND) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100210 ret = -EBADFD;
211 goto error;
212 }
213
214 sk->sk_max_ack_backlog = backlog;
215 sk->sk_ack_backlog = 0;
216
217 pr_debug("Socket listening\n");
218 sk->sk_state = LLCP_LISTEN;
219
220error:
221 release_sock(sk);
222
223 return ret;
224}
225
226void nfc_llcp_accept_unlink(struct sock *sk)
227{
228 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
229
230 pr_debug("state %d\n", sk->sk_state);
231
232 list_del_init(&llcp_sock->accept_queue);
233 sk_acceptq_removed(llcp_sock->parent);
234 llcp_sock->parent = NULL;
235
236 sock_put(sk);
237}
238
239void nfc_llcp_accept_enqueue(struct sock *parent, struct sock *sk)
240{
241 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
242 struct nfc_llcp_sock *llcp_sock_parent = nfc_llcp_sock(parent);
243
244 /* Lock will be free from unlink */
245 sock_hold(sk);
246
247 list_add_tail(&llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100248 &llcp_sock_parent->accept_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100249 llcp_sock->parent = parent;
250 sk_acceptq_added(parent);
251}
252
253struct sock *nfc_llcp_accept_dequeue(struct sock *parent,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100254 struct socket *newsock)
Samuel Ortizd6469602011-12-14 16:43:12 +0100255{
256 struct nfc_llcp_sock *lsk, *n, *llcp_parent;
257 struct sock *sk;
258
259 llcp_parent = nfc_llcp_sock(parent);
260
261 list_for_each_entry_safe(lsk, n, &llcp_parent->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100262 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100263 sk = &lsk->sk;
264 lock_sock(sk);
265
266 if (sk->sk_state == LLCP_CLOSED) {
267 release_sock(sk);
268 nfc_llcp_accept_unlink(sk);
269 continue;
270 }
271
272 if (sk->sk_state == LLCP_CONNECTED || !newsock) {
273 nfc_llcp_accept_unlink(sk);
274 if (newsock)
275 sock_graft(sk, newsock);
276
277 release_sock(sk);
278
279 pr_debug("Returning sk state %d\n", sk->sk_state);
280
281 return sk;
282 }
283
284 release_sock(sk);
285 }
286
287 return NULL;
288}
289
290static int llcp_sock_accept(struct socket *sock, struct socket *newsock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100291 int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100292{
293 DECLARE_WAITQUEUE(wait, current);
294 struct sock *sk = sock->sk, *new_sk;
295 long timeo;
296 int ret = 0;
297
298 pr_debug("parent %p\n", sk);
299
300 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
301
302 if (sk->sk_state != LLCP_LISTEN) {
303 ret = -EBADFD;
304 goto error;
305 }
306
307 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
308
309 /* Wait for an incoming connection. */
310 add_wait_queue_exclusive(sk_sleep(sk), &wait);
311 while (!(new_sk = nfc_llcp_accept_dequeue(sk, newsock))) {
312 set_current_state(TASK_INTERRUPTIBLE);
313
314 if (!timeo) {
315 ret = -EAGAIN;
316 break;
317 }
318
319 if (signal_pending(current)) {
320 ret = sock_intr_errno(timeo);
321 break;
322 }
323
324 release_sock(sk);
325 timeo = schedule_timeout(timeo);
326 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
327 }
328 __set_current_state(TASK_RUNNING);
329 remove_wait_queue(sk_sleep(sk), &wait);
330
331 if (ret)
332 goto error;
333
334 newsock->state = SS_CONNECTED;
335
336 pr_debug("new socket %p\n", new_sk);
337
338error:
339 release_sock(sk);
340
341 return ret;
342}
343
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200344static int llcp_sock_getname(struct socket *sock, struct sockaddr *uaddr,
Samuel Ortizd6469602011-12-14 16:43:12 +0100345 int *len, int peer)
346{
Samuel Ortizd6469602011-12-14 16:43:12 +0100347 struct sock *sk = sock->sk;
348 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200349 DECLARE_SOCKADDR(struct sockaddr_nfc_llcp *, llcp_addr, uaddr);
Samuel Ortizd6469602011-12-14 16:43:12 +0100350
Samuel Ortizfe3c0942012-07-05 17:43:08 +0200351 if (llcp_sock == NULL || llcp_sock->dev == NULL)
352 return -EBADFD;
353
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200354 pr_debug("%p %d %d %d\n", sk, llcp_sock->target_idx,
355 llcp_sock->dsap, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100356
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200357 uaddr->sa_family = AF_NFC;
358
Samuel Ortizd6469602011-12-14 16:43:12 +0100359 *len = sizeof(struct sockaddr_nfc_llcp);
360
361 llcp_addr->dev_idx = llcp_sock->dev->idx;
Samuel Ortiz12e5bdf2012-06-21 17:41:42 +0200362 llcp_addr->target_idx = llcp_sock->target_idx;
Samuel Ortizd6469602011-12-14 16:43:12 +0100363 llcp_addr->dsap = llcp_sock->dsap;
364 llcp_addr->ssap = llcp_sock->ssap;
365 llcp_addr->service_name_len = llcp_sock->service_name_len;
366 memcpy(llcp_addr->service_name, llcp_sock->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100367 llcp_addr->service_name_len);
Samuel Ortizd6469602011-12-14 16:43:12 +0100368
369 return 0;
370}
371
372static inline unsigned int llcp_accept_poll(struct sock *parent)
373{
374 struct nfc_llcp_sock *llcp_sock, *n, *parent_sock;
375 struct sock *sk;
376
377 parent_sock = nfc_llcp_sock(parent);
378
379 list_for_each_entry_safe(llcp_sock, n, &parent_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100380 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100381 sk = &llcp_sock->sk;
382
383 if (sk->sk_state == LLCP_CONNECTED)
384 return POLLIN | POLLRDNORM;
385 }
386
387 return 0;
388}
389
390static unsigned int llcp_sock_poll(struct file *file, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100391 poll_table *wait)
Samuel Ortizd6469602011-12-14 16:43:12 +0100392{
393 struct sock *sk = sock->sk;
394 unsigned int mask = 0;
395
396 pr_debug("%p\n", sk);
397
398 sock_poll_wait(file, sk_sleep(sk), wait);
399
400 if (sk->sk_state == LLCP_LISTEN)
401 return llcp_accept_poll(sk);
402
403 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
404 mask |= POLLERR;
405
406 if (!skb_queue_empty(&sk->sk_receive_queue))
Samuel Ortiz4260c132012-05-07 12:31:20 +0200407 mask |= POLLIN | POLLRDNORM;
Samuel Ortizd6469602011-12-14 16:43:12 +0100408
409 if (sk->sk_state == LLCP_CLOSED)
410 mask |= POLLHUP;
411
Samuel Ortiz4260c132012-05-07 12:31:20 +0200412 if (sk->sk_shutdown & RCV_SHUTDOWN)
413 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
414
415 if (sk->sk_shutdown == SHUTDOWN_MASK)
416 mask |= POLLHUP;
417
418 if (sock_writeable(sk))
419 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
420 else
421 set_bit(SOCK_ASYNC_NOSPACE, &sk->sk_socket->flags);
422
423 pr_debug("mask 0x%x\n", mask);
424
Samuel Ortizd6469602011-12-14 16:43:12 +0100425 return mask;
426}
427
428static int llcp_sock_release(struct socket *sock)
429{
430 struct sock *sk = sock->sk;
431 struct nfc_llcp_local *local;
432 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100433 int err = 0;
Samuel Ortizd6469602011-12-14 16:43:12 +0100434
435 if (!sk)
436 return 0;
437
438 pr_debug("%p\n", sk);
439
440 local = llcp_sock->local;
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100441 if (local == NULL) {
442 err = -ENODEV;
443 goto out;
444 }
Samuel Ortizd6469602011-12-14 16:43:12 +0100445
Samuel Ortizd6469602011-12-14 16:43:12 +0100446 lock_sock(sk);
447
448 /* Send a DISC */
449 if (sk->sk_state == LLCP_CONNECTED)
450 nfc_llcp_disconnect(llcp_sock);
451
452 if (sk->sk_state == LLCP_LISTEN) {
453 struct nfc_llcp_sock *lsk, *n;
454 struct sock *accept_sk;
455
456 list_for_each_entry_safe(lsk, n, &llcp_sock->accept_queue,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100457 accept_queue) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100458 accept_sk = &lsk->sk;
459 lock_sock(accept_sk);
460
461 nfc_llcp_disconnect(lsk);
462 nfc_llcp_accept_unlink(accept_sk);
463
464 release_sock(accept_sk);
465
Samuel Ortizd6469602011-12-14 16:43:12 +0100466 sock_orphan(accept_sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100467 }
468 }
469
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200470 if (llcp_sock->reserved_ssap < LLCP_SAP_MAX)
471 nfc_llcp_put_ssap(llcp_sock->local, llcp_sock->ssap);
Samuel Ortizd6469602011-12-14 16:43:12 +0100472
Samuel Ortizd6469602011-12-14 16:43:12 +0100473 release_sock(sk);
474
Thierry Escande44635232012-09-26 18:16:44 +0200475 if (sock->type == SOCK_RAW)
476 nfc_llcp_sock_unlink(&local->raw_sockets, sk);
477 else
478 nfc_llcp_sock_unlink(&local->sockets, sk);
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200479
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100480out:
Samuel Ortizd6469602011-12-14 16:43:12 +0100481 sock_orphan(sk);
482 sock_put(sk);
483
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100484 return err;
Samuel Ortizd6469602011-12-14 16:43:12 +0100485}
486
487static int llcp_sock_connect(struct socket *sock, struct sockaddr *_addr,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100488 int len, int flags)
Samuel Ortizd6469602011-12-14 16:43:12 +0100489{
490 struct sock *sk = sock->sk;
491 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
492 struct sockaddr_nfc_llcp *addr = (struct sockaddr_nfc_llcp *)_addr;
493 struct nfc_dev *dev;
494 struct nfc_llcp_local *local;
495 int ret = 0;
496
497 pr_debug("sock %p sk %p flags 0x%x\n", sock, sk, flags);
498
499 if (!addr || len < sizeof(struct sockaddr_nfc) ||
Dave Jones32418cf2012-10-04 09:51:11 +0000500 addr->sa_family != AF_NFC)
Samuel Ortizd6469602011-12-14 16:43:12 +0100501 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100502
Dave Jones32418cf2012-10-04 09:51:11 +0000503 if (addr->service_name_len == 0 && addr->dsap == 0)
Samuel Ortizd6469602011-12-14 16:43:12 +0100504 return -EINVAL;
Samuel Ortizd6469602011-12-14 16:43:12 +0100505
506 pr_debug("addr dev_idx=%u target_idx=%u protocol=%u\n", addr->dev_idx,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100507 addr->target_idx, addr->nfc_protocol);
Samuel Ortizd6469602011-12-14 16:43:12 +0100508
509 lock_sock(sk);
510
511 if (sk->sk_state == LLCP_CONNECTED) {
512 ret = -EISCONN;
513 goto error;
514 }
515
516 dev = nfc_get_device(addr->dev_idx);
517 if (dev == NULL) {
518 ret = -ENODEV;
519 goto error;
520 }
521
522 local = nfc_llcp_find_local(dev);
523 if (local == NULL) {
524 ret = -ENODEV;
525 goto put_dev;
526 }
527
528 device_lock(&dev->dev);
529 if (dev->dep_link_up == false) {
530 ret = -ENOLINK;
531 device_unlock(&dev->dev);
532 goto put_dev;
533 }
534 device_unlock(&dev->dev);
535
536 if (local->rf_mode == NFC_RF_INITIATOR &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100537 addr->target_idx != local->target_idx) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100538 ret = -ENOLINK;
539 goto put_dev;
540 }
541
542 llcp_sock->dev = dev;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200543 llcp_sock->local = nfc_llcp_local_get(local);
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200544 llcp_sock->miu = llcp_sock->local->remote_miu;
Samuel Ortizd6469602011-12-14 16:43:12 +0100545 llcp_sock->ssap = nfc_llcp_get_local_ssap(local);
546 if (llcp_sock->ssap == LLCP_SAP_MAX) {
547 ret = -ENOMEM;
548 goto put_dev;
549 }
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200550
551 llcp_sock->reserved_ssap = llcp_sock->ssap;
552
Samuel Ortizd6469602011-12-14 16:43:12 +0100553 if (addr->service_name_len == 0)
554 llcp_sock->dsap = addr->dsap;
555 else
556 llcp_sock->dsap = LLCP_SAP_SDP;
557 llcp_sock->nfc_protocol = addr->nfc_protocol;
558 llcp_sock->service_name_len = min_t(unsigned int,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100559 addr->service_name_len,
560 NFC_LLCP_MAX_SERVICE_NAME);
Samuel Ortizd6469602011-12-14 16:43:12 +0100561 llcp_sock->service_name = kmemdup(addr->service_name,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100562 llcp_sock->service_name_len,
563 GFP_KERNEL);
Samuel Ortizd6469602011-12-14 16:43:12 +0100564
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200565 nfc_llcp_sock_link(&local->connecting_sockets, sk);
Samuel Ortizd6469602011-12-14 16:43:12 +0100566
567 ret = nfc_llcp_send_connect(llcp_sock);
568 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200569 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100570
Samuel Ortizff353d82012-05-07 12:31:19 +0200571 ret = sock_wait_state(sk, LLCP_CONNECTED,
572 sock_sndtimeo(sk, flags & O_NONBLOCK));
573 if (ret)
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200574 goto sock_unlink;
Samuel Ortizd6469602011-12-14 16:43:12 +0100575
576 release_sock(sk);
Samuel Ortizff353d82012-05-07 12:31:19 +0200577
Samuel Ortizd6469602011-12-14 16:43:12 +0100578 return 0;
579
Samuel Ortiza69f32a2012-05-04 17:04:19 +0200580sock_unlink:
581 nfc_llcp_put_ssap(local, llcp_sock->ssap);
582
583 nfc_llcp_sock_unlink(&local->connecting_sockets, sk);
584
Samuel Ortizd6469602011-12-14 16:43:12 +0100585put_dev:
586 nfc_put_device(dev);
587
588error:
589 release_sock(sk);
590 return ret;
591}
592
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100593static int llcp_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100594 struct msghdr *msg, size_t len)
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100595{
596 struct sock *sk = sock->sk;
597 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
598 int ret;
599
600 pr_debug("sock %p sk %p", sock, sk);
601
602 ret = sock_error(sk);
603 if (ret)
604 return ret;
605
606 if (msg->msg_flags & MSG_OOB)
607 return -EOPNOTSUPP;
608
609 lock_sock(sk);
610
611 if (sk->sk_state != LLCP_CONNECTED) {
612 release_sock(sk);
613 return -ENOTCONN;
614 }
615
616 release_sock(sk);
617
618 return nfc_llcp_send_i_frame(llcp_sock, msg, len);
619}
620
Samuel Ortizd6469602011-12-14 16:43:12 +0100621static int llcp_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
622 struct msghdr *msg, size_t len, int flags)
623{
624 int noblock = flags & MSG_DONTWAIT;
625 struct sock *sk = sock->sk;
626 unsigned int copied, rlen;
627 struct sk_buff *skb, *cskb;
628 int err = 0;
629
630 pr_debug("%p %zu\n", sk, len);
631
632 lock_sock(sk);
633
634 if (sk->sk_state == LLCP_CLOSED &&
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100635 skb_queue_empty(&sk->sk_receive_queue)) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100636 release_sock(sk);
637 return 0;
638 }
639
640 release_sock(sk);
641
642 if (flags & (MSG_OOB))
643 return -EOPNOTSUPP;
644
645 skb = skb_recv_datagram(sk, flags, noblock, &err);
646 if (!skb) {
647 pr_err("Recv datagram failed state %d %d %d",
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100648 sk->sk_state, err, sock_error(sk));
Samuel Ortizd6469602011-12-14 16:43:12 +0100649
650 if (sk->sk_shutdown & RCV_SHUTDOWN)
651 return 0;
652
653 return err;
654 }
655
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100656 rlen = skb->len; /* real length of skb */
Samuel Ortizd6469602011-12-14 16:43:12 +0100657 copied = min_t(unsigned int, rlen, len);
658
659 cskb = skb;
660 if (memcpy_toiovec(msg->msg_iov, cskb->data, copied)) {
661 if (!(flags & MSG_PEEK))
662 skb_queue_head(&sk->sk_receive_queue, skb);
663 return -EFAULT;
664 }
665
666 /* Mark read part of skb as used */
667 if (!(flags & MSG_PEEK)) {
668
669 /* SOCK_STREAM: re-queue skb if it contains unreceived data */
Thierry Escande44635232012-09-26 18:16:44 +0200670 if (sk->sk_type == SOCK_STREAM || sk->sk_type == SOCK_RAW) {
Samuel Ortizd6469602011-12-14 16:43:12 +0100671 skb_pull(skb, copied);
672 if (skb->len) {
673 skb_queue_head(&sk->sk_receive_queue, skb);
674 goto done;
675 }
676 }
677
678 kfree_skb(skb);
679 }
680
681 /* XXX Queue backlogged skbs */
682
683done:
684 /* SOCK_SEQPACKET: return real length if MSG_TRUNC is set */
685 if (sk->sk_type == SOCK_SEQPACKET && (flags & MSG_TRUNC))
686 copied = rlen;
687
688 return copied;
689}
690
691static const struct proto_ops llcp_sock_ops = {
692 .family = PF_NFC,
693 .owner = THIS_MODULE,
694 .bind = llcp_sock_bind,
695 .connect = llcp_sock_connect,
696 .release = llcp_sock_release,
697 .socketpair = sock_no_socketpair,
698 .accept = llcp_sock_accept,
699 .getname = llcp_sock_getname,
700 .poll = llcp_sock_poll,
701 .ioctl = sock_no_ioctl,
702 .listen = llcp_sock_listen,
703 .shutdown = sock_no_shutdown,
704 .setsockopt = sock_no_setsockopt,
705 .getsockopt = sock_no_getsockopt,
Samuel Ortiz53a0ac22012-03-05 01:03:37 +0100706 .sendmsg = llcp_sock_sendmsg,
Samuel Ortizd6469602011-12-14 16:43:12 +0100707 .recvmsg = llcp_sock_recvmsg,
708 .mmap = sock_no_mmap,
709};
710
Thierry Escande44635232012-09-26 18:16:44 +0200711static const struct proto_ops llcp_rawsock_ops = {
712 .family = PF_NFC,
713 .owner = THIS_MODULE,
714 .bind = llcp_raw_sock_bind,
715 .connect = sock_no_connect,
716 .release = llcp_sock_release,
717 .socketpair = sock_no_socketpair,
718 .accept = sock_no_accept,
719 .getname = llcp_sock_getname,
720 .poll = llcp_sock_poll,
721 .ioctl = sock_no_ioctl,
722 .listen = sock_no_listen,
723 .shutdown = sock_no_shutdown,
724 .setsockopt = sock_no_setsockopt,
725 .getsockopt = sock_no_getsockopt,
726 .sendmsg = sock_no_sendmsg,
727 .recvmsg = llcp_sock_recvmsg,
728 .mmap = sock_no_mmap,
729};
730
Samuel Ortizd6469602011-12-14 16:43:12 +0100731static void llcp_sock_destruct(struct sock *sk)
732{
733 struct nfc_llcp_sock *llcp_sock = nfc_llcp_sock(sk);
734
735 pr_debug("%p\n", sk);
736
737 if (sk->sk_state == LLCP_CONNECTED)
738 nfc_put_device(llcp_sock->dev);
739
740 skb_queue_purge(&sk->sk_receive_queue);
741
742 nfc_llcp_sock_free(llcp_sock);
743
744 if (!sock_flag(sk, SOCK_DEAD)) {
745 pr_err("Freeing alive NFC LLCP socket %p\n", sk);
746 return;
747 }
748}
749
750struct sock *nfc_llcp_sock_alloc(struct socket *sock, int type, gfp_t gfp)
751{
752 struct sock *sk;
753 struct nfc_llcp_sock *llcp_sock;
754
755 sk = sk_alloc(&init_net, PF_NFC, gfp, &llcp_sock_proto);
756 if (!sk)
757 return NULL;
758
759 llcp_sock = nfc_llcp_sock(sk);
760
761 sock_init_data(sock, sk);
762 sk->sk_state = LLCP_CLOSED;
763 sk->sk_protocol = NFC_SOCKPROTO_LLCP;
764 sk->sk_type = type;
765 sk->sk_destruct = llcp_sock_destruct;
766
767 llcp_sock->ssap = 0;
768 llcp_sock->dsap = LLCP_SAP_SDP;
Samuel Ortiz7a06e582012-05-07 22:03:34 +0200769 llcp_sock->rw = LLCP_DEFAULT_RW;
Samuel Ortiz93d7e492012-05-14 17:37:32 +0200770 llcp_sock->miu = LLCP_DEFAULT_MIU;
Samuel Ortizd6469602011-12-14 16:43:12 +0100771 llcp_sock->send_n = llcp_sock->send_ack_n = 0;
772 llcp_sock->recv_n = llcp_sock->recv_ack_n = 0;
773 llcp_sock->remote_ready = 1;
Samuel Ortizcbbf4722012-06-22 14:48:11 +0200774 llcp_sock->reserved_ssap = LLCP_SAP_MAX;
Samuel Ortizd6469602011-12-14 16:43:12 +0100775 skb_queue_head_init(&llcp_sock->tx_queue);
776 skb_queue_head_init(&llcp_sock->tx_pending_queue);
777 skb_queue_head_init(&llcp_sock->tx_backlog_queue);
Samuel Ortizd6469602011-12-14 16:43:12 +0100778 INIT_LIST_HEAD(&llcp_sock->accept_queue);
779
780 if (sock != NULL)
781 sock->state = SS_UNCONNECTED;
782
783 return sk;
784}
785
786void nfc_llcp_sock_free(struct nfc_llcp_sock *sock)
787{
788 kfree(sock->service_name);
789
790 skb_queue_purge(&sock->tx_queue);
791 skb_queue_purge(&sock->tx_pending_queue);
792 skb_queue_purge(&sock->tx_backlog_queue);
793
794 list_del_init(&sock->accept_queue);
Samuel Ortiz40c75f82012-03-05 01:03:51 +0100795
Samuel Ortizd6469602011-12-14 16:43:12 +0100796 sock->parent = NULL;
Samuel Ortizc7aa1222012-05-04 11:24:16 +0200797
798 nfc_llcp_local_put(sock->local);
Samuel Ortizd6469602011-12-14 16:43:12 +0100799}
800
801static int llcp_sock_create(struct net *net, struct socket *sock,
Samuel Ortiz427a2eb2012-03-05 01:03:52 +0100802 const struct nfc_protocol *nfc_proto)
Samuel Ortizd6469602011-12-14 16:43:12 +0100803{
804 struct sock *sk;
805
806 pr_debug("%p\n", sock);
807
Thierry Escande44635232012-09-26 18:16:44 +0200808 if (sock->type != SOCK_STREAM &&
809 sock->type != SOCK_DGRAM &&
810 sock->type != SOCK_RAW)
Samuel Ortizd6469602011-12-14 16:43:12 +0100811 return -ESOCKTNOSUPPORT;
812
Thierry Escande44635232012-09-26 18:16:44 +0200813 if (sock->type == SOCK_RAW)
814 sock->ops = &llcp_rawsock_ops;
815 else
816 sock->ops = &llcp_sock_ops;
Samuel Ortizd6469602011-12-14 16:43:12 +0100817
818 sk = nfc_llcp_sock_alloc(sock, sock->type, GFP_ATOMIC);
819 if (sk == NULL)
820 return -ENOMEM;
821
822 return 0;
823}
824
825static const struct nfc_protocol llcp_nfc_proto = {
826 .id = NFC_SOCKPROTO_LLCP,
827 .proto = &llcp_sock_proto,
828 .owner = THIS_MODULE,
829 .create = llcp_sock_create
830};
831
832int __init nfc_llcp_sock_init(void)
833{
834 return nfc_proto_register(&llcp_nfc_proto);
835}
836
837void nfc_llcp_sock_exit(void)
838{
839 nfc_proto_unregister(&llcp_nfc_proto);
840}