1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * BlueZ - Bluetooth protocol stack for Linux
4 *
5 * Copyright (C) 2022 Intel Corporation
6 * Copyright 2023-2024 NXP
7 */
8
9 #include <linux/module.h>
10 #include <linux/debugfs.h>
11 #include <linux/seq_file.h>
12 #include <linux/sched/signal.h>
13
14 #include <net/bluetooth/bluetooth.h>
15 #include <net/bluetooth/hci_core.h>
16 #include <net/bluetooth/iso.h>
17 #include "eir.h"
18
19 static const struct proto_ops iso_sock_ops;
20
21 static struct bt_sock_list iso_sk_list = {
22 .lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock)
23 };
24
25 /* ---- ISO connections ---- */
26 struct iso_conn {
27 struct hci_conn *hcon;
28
29 /* @lock: spinlock protecting changes to iso_conn fields */
30 spinlock_t lock;
31 struct sock *sk;
32
33 struct delayed_work timeout_work;
34
35 struct sk_buff *rx_skb;
36 __u32 rx_len;
37 __u16 tx_sn;
38 struct kref ref;
39 };
40
41 #define iso_conn_lock(c) spin_lock(&(c)->lock)
42 #define iso_conn_unlock(c) spin_unlock(&(c)->lock)
43
44 static void iso_sock_close(struct sock *sk);
45 static void iso_sock_kill(struct sock *sk);
46
47 /* ----- ISO socket info ----- */
48 #define iso_pi(sk) ((struct iso_pinfo *)sk)
49
50 #define EIR_SERVICE_DATA_LENGTH 4
51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH)
52 #define EIR_BAA_SERVICE_UUID 0x1851
53
54 /* iso_pinfo flags values */
55 enum {
56 BT_SK_BIG_SYNC,
57 BT_SK_PA_SYNC,
58 };
59
60 struct iso_pinfo {
61 struct bt_sock bt;
62 bdaddr_t src;
63 __u8 src_type;
64 bdaddr_t dst;
65 __u8 dst_type;
66 __u8 bc_sid;
67 __u8 bc_num_bis;
68 __u8 bc_bis[ISO_MAX_NUM_BIS];
69 __u16 sync_handle;
70 unsigned long flags;
71 struct bt_iso_qos qos;
72 bool qos_user_set;
73 __u8 base_len;
74 __u8 base[BASE_MAX_LENGTH];
75 struct iso_conn *conn;
76 };
77
78 static struct bt_iso_qos default_qos;
79
80 static bool check_ucast_qos(struct bt_iso_qos *qos);
81 static bool check_bcast_qos(struct bt_iso_qos *qos);
82 static bool iso_match_sid(struct sock *sk, void *data);
83 static bool iso_match_sync_handle(struct sock *sk, void *data);
84 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data);
85 static void iso_sock_disconn(struct sock *sk);
86
87 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data);
88
89 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst,
90 enum bt_sock_state state,
91 iso_sock_match_t match, void *data);
92
93 /* ---- ISO timers ---- */
94 #define ISO_CONN_TIMEOUT (HZ * 40)
95 #define ISO_DISCONN_TIMEOUT (HZ * 2)
96
iso_conn_free(struct kref * ref)97 static void iso_conn_free(struct kref *ref)
98 {
99 struct iso_conn *conn = container_of(ref, struct iso_conn, ref);
100
101 BT_DBG("conn %p", conn);
102
103 if (conn->sk)
104 iso_pi(conn->sk)->conn = NULL;
105
106 if (conn->hcon) {
107 conn->hcon->iso_data = NULL;
108 hci_conn_drop(conn->hcon);
109 }
110
111 /* Ensure no more work items will run since hci_conn has been dropped */
112 disable_delayed_work_sync(&conn->timeout_work);
113
114 kfree(conn);
115 }
116
iso_conn_put(struct iso_conn * conn)117 static void iso_conn_put(struct iso_conn *conn)
118 {
119 if (!conn)
120 return;
121
122 BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref));
123
124 kref_put(&conn->ref, iso_conn_free);
125 }
126
iso_conn_hold_unless_zero(struct iso_conn * conn)127 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn)
128 {
129 if (!conn)
130 return NULL;
131
132 BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref));
133
134 if (!kref_get_unless_zero(&conn->ref))
135 return NULL;
136
137 return conn;
138 }
139
iso_sock_hold(struct iso_conn * conn)140 static struct sock *iso_sock_hold(struct iso_conn *conn)
141 {
142 if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk))
143 return NULL;
144
145 sock_hold(conn->sk);
146
147 return conn->sk;
148 }
149
iso_sock_timeout(struct work_struct * work)150 static void iso_sock_timeout(struct work_struct *work)
151 {
152 struct iso_conn *conn = container_of(work, struct iso_conn,
153 timeout_work.work);
154 struct sock *sk;
155
156 conn = iso_conn_hold_unless_zero(conn);
157 if (!conn)
158 return;
159
160 iso_conn_lock(conn);
161 sk = iso_sock_hold(conn);
162 iso_conn_unlock(conn);
163 iso_conn_put(conn);
164
165 if (!sk)
166 return;
167
168 BT_DBG("sock %p state %d", sk, sk->sk_state);
169
170 lock_sock(sk);
171 sk->sk_err = ETIMEDOUT;
172 sk->sk_state_change(sk);
173 release_sock(sk);
174 sock_put(sk);
175 }
176
iso_sock_set_timer(struct sock * sk,long timeout)177 static void iso_sock_set_timer(struct sock *sk, long timeout)
178 {
179 if (!iso_pi(sk)->conn)
180 return;
181
182 BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout);
183 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
184 schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout);
185 }
186
iso_sock_clear_timer(struct sock * sk)187 static void iso_sock_clear_timer(struct sock *sk)
188 {
189 if (!iso_pi(sk)->conn)
190 return;
191
192 BT_DBG("sock %p state %d", sk, sk->sk_state);
193 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
194 }
195
196 /* ---- ISO connections ---- */
iso_conn_add(struct hci_conn * hcon)197 static struct iso_conn *iso_conn_add(struct hci_conn *hcon)
198 {
199 struct iso_conn *conn = hcon->iso_data;
200
201 conn = iso_conn_hold_unless_zero(conn);
202 if (conn) {
203 if (!conn->hcon) {
204 iso_conn_lock(conn);
205 conn->hcon = hcon;
206 iso_conn_unlock(conn);
207 }
208 iso_conn_put(conn);
209 return conn;
210 }
211
212 conn = kzalloc(sizeof(*conn), GFP_KERNEL);
213 if (!conn)
214 return NULL;
215
216 kref_init(&conn->ref);
217 spin_lock_init(&conn->lock);
218 INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout);
219
220 hcon->iso_data = conn;
221 conn->hcon = hcon;
222 conn->tx_sn = 0;
223
224 BT_DBG("hcon %p conn %p", hcon, conn);
225
226 return conn;
227 }
228
229 /* Delete channel. Must be called on the locked socket. */
iso_chan_del(struct sock * sk,int err)230 static void iso_chan_del(struct sock *sk, int err)
231 {
232 struct iso_conn *conn;
233 struct sock *parent;
234
235 conn = iso_pi(sk)->conn;
236 iso_pi(sk)->conn = NULL;
237
238 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
239
240 if (conn) {
241 iso_conn_lock(conn);
242 conn->sk = NULL;
243 iso_conn_unlock(conn);
244 iso_conn_put(conn);
245 }
246
247 sk->sk_state = BT_CLOSED;
248 sk->sk_err = err;
249
250 parent = bt_sk(sk)->parent;
251 if (parent) {
252 bt_accept_unlink(sk);
253 parent->sk_data_ready(parent);
254 } else {
255 sk->sk_state_change(sk);
256 }
257
258 sock_set_flag(sk, SOCK_ZAPPED);
259 }
260
iso_conn_del(struct hci_conn * hcon,int err)261 static void iso_conn_del(struct hci_conn *hcon, int err)
262 {
263 struct iso_conn *conn = hcon->iso_data;
264 struct sock *sk;
265
266 conn = iso_conn_hold_unless_zero(conn);
267 if (!conn)
268 return;
269
270 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
271
272 /* Kill socket */
273 iso_conn_lock(conn);
274 sk = iso_sock_hold(conn);
275 iso_conn_unlock(conn);
276 iso_conn_put(conn);
277
278 if (!sk) {
279 iso_conn_put(conn);
280 return;
281 }
282
283 lock_sock(sk);
284 iso_sock_clear_timer(sk);
285 iso_chan_del(sk, err);
286 release_sock(sk);
287 sock_put(sk);
288 }
289
__iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)290 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk,
291 struct sock *parent)
292 {
293 BT_DBG("conn %p", conn);
294
295 if (iso_pi(sk)->conn == conn && conn->sk == sk)
296 return 0;
297
298 if (conn->sk) {
299 BT_ERR("conn->sk already set");
300 return -EBUSY;
301 }
302
303 iso_pi(sk)->conn = conn;
304 conn->sk = sk;
305
306 if (parent)
307 bt_accept_enqueue(parent, sk, true);
308
309 return 0;
310 }
311
iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)312 static int iso_chan_add(struct iso_conn *conn, struct sock *sk,
313 struct sock *parent)
314 {
315 int err;
316
317 iso_conn_lock(conn);
318 err = __iso_chan_add(conn, sk, parent);
319 iso_conn_unlock(conn);
320
321 return err;
322 }
323
le_addr_type(u8 bdaddr_type)324 static inline u8 le_addr_type(u8 bdaddr_type)
325 {
326 if (bdaddr_type == BDADDR_LE_PUBLIC)
327 return ADDR_LE_DEV_PUBLIC;
328 else
329 return ADDR_LE_DEV_RANDOM;
330 }
331
iso_connect_bis(struct sock * sk)332 static int iso_connect_bis(struct sock *sk)
333 {
334 struct iso_conn *conn;
335 struct hci_conn *hcon;
336 struct hci_dev *hdev;
337 int err;
338
339 BT_DBG("%pMR", &iso_pi(sk)->src);
340
341 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
342 iso_pi(sk)->src_type);
343 if (!hdev)
344 return -EHOSTUNREACH;
345
346 hci_dev_lock(hdev);
347
348 if (!bis_capable(hdev)) {
349 err = -EOPNOTSUPP;
350 goto unlock;
351 }
352
353 /* Fail if user set invalid QoS */
354 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
355 iso_pi(sk)->qos = default_qos;
356 err = -EINVAL;
357 goto unlock;
358 }
359
360 /* Fail if out PHYs are marked as disabled */
361 if (!iso_pi(sk)->qos.bcast.out.phy) {
362 err = -EINVAL;
363 goto unlock;
364 }
365
366 /* Just bind if DEFER_SETUP has been set */
367 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
368 hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst,
369 &iso_pi(sk)->qos, iso_pi(sk)->base_len,
370 iso_pi(sk)->base);
371 if (IS_ERR(hcon)) {
372 err = PTR_ERR(hcon);
373 goto unlock;
374 }
375 } else {
376 hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst,
377 le_addr_type(iso_pi(sk)->dst_type),
378 &iso_pi(sk)->qos, iso_pi(sk)->base_len,
379 iso_pi(sk)->base);
380 if (IS_ERR(hcon)) {
381 err = PTR_ERR(hcon);
382 goto unlock;
383 }
384 }
385
386 conn = iso_conn_add(hcon);
387 if (!conn) {
388 hci_conn_drop(hcon);
389 err = -ENOMEM;
390 goto unlock;
391 }
392
393 lock_sock(sk);
394
395 err = iso_chan_add(conn, sk, NULL);
396 if (err) {
397 release_sock(sk);
398 goto unlock;
399 }
400
401 /* Update source addr of the socket */
402 bacpy(&iso_pi(sk)->src, &hcon->src);
403
404 if (hcon->state == BT_CONNECTED) {
405 iso_sock_clear_timer(sk);
406 sk->sk_state = BT_CONNECTED;
407 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
408 iso_sock_clear_timer(sk);
409 sk->sk_state = BT_CONNECT;
410 } else {
411 sk->sk_state = BT_CONNECT;
412 iso_sock_set_timer(sk, sk->sk_sndtimeo);
413 }
414
415 release_sock(sk);
416
417 unlock:
418 hci_dev_unlock(hdev);
419 hci_dev_put(hdev);
420 return err;
421 }
422
iso_connect_cis(struct sock * sk)423 static int iso_connect_cis(struct sock *sk)
424 {
425 struct iso_conn *conn;
426 struct hci_conn *hcon;
427 struct hci_dev *hdev;
428 int err;
429
430 BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst);
431
432 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
433 iso_pi(sk)->src_type);
434 if (!hdev)
435 return -EHOSTUNREACH;
436
437 hci_dev_lock(hdev);
438
439 if (!cis_central_capable(hdev)) {
440 err = -EOPNOTSUPP;
441 goto unlock;
442 }
443
444 /* Fail if user set invalid QoS */
445 if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) {
446 iso_pi(sk)->qos = default_qos;
447 err = -EINVAL;
448 goto unlock;
449 }
450
451 /* Fail if either PHYs are marked as disabled */
452 if (!iso_pi(sk)->qos.ucast.in.phy && !iso_pi(sk)->qos.ucast.out.phy) {
453 err = -EINVAL;
454 goto unlock;
455 }
456
457 /* Just bind if DEFER_SETUP has been set */
458 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
459 hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst,
460 le_addr_type(iso_pi(sk)->dst_type),
461 &iso_pi(sk)->qos);
462 if (IS_ERR(hcon)) {
463 err = PTR_ERR(hcon);
464 goto unlock;
465 }
466 } else {
467 hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst,
468 le_addr_type(iso_pi(sk)->dst_type),
469 &iso_pi(sk)->qos);
470 if (IS_ERR(hcon)) {
471 err = PTR_ERR(hcon);
472 goto unlock;
473 }
474 }
475
476 conn = iso_conn_add(hcon);
477 if (!conn) {
478 hci_conn_drop(hcon);
479 err = -ENOMEM;
480 goto unlock;
481 }
482
483 lock_sock(sk);
484
485 err = iso_chan_add(conn, sk, NULL);
486 if (err) {
487 release_sock(sk);
488 goto unlock;
489 }
490
491 /* Update source addr of the socket */
492 bacpy(&iso_pi(sk)->src, &hcon->src);
493
494 if (hcon->state == BT_CONNECTED) {
495 iso_sock_clear_timer(sk);
496 sk->sk_state = BT_CONNECTED;
497 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
498 iso_sock_clear_timer(sk);
499 sk->sk_state = BT_CONNECT;
500 } else {
501 sk->sk_state = BT_CONNECT;
502 iso_sock_set_timer(sk, sk->sk_sndtimeo);
503 }
504
505 release_sock(sk);
506
507 unlock:
508 hci_dev_unlock(hdev);
509 hci_dev_put(hdev);
510 return err;
511 }
512
iso_sock_get_qos(struct sock * sk)513 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk)
514 {
515 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2)
516 return &iso_pi(sk)->conn->hcon->iso_qos;
517
518 return &iso_pi(sk)->qos;
519 }
520
iso_send_frame(struct sock * sk,struct sk_buff * skb)521 static int iso_send_frame(struct sock *sk, struct sk_buff *skb)
522 {
523 struct iso_conn *conn = iso_pi(sk)->conn;
524 struct bt_iso_qos *qos = iso_sock_get_qos(sk);
525 struct hci_iso_data_hdr *hdr;
526 int len = 0;
527
528 BT_DBG("sk %p len %d", sk, skb->len);
529
530 if (skb->len > qos->ucast.out.sdu)
531 return -EMSGSIZE;
532
533 len = skb->len;
534
535 /* Push ISO data header */
536 hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE);
537 hdr->sn = cpu_to_le16(conn->tx_sn++);
538 hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len,
539 HCI_ISO_STATUS_VALID));
540
541 if (sk->sk_state == BT_CONNECTED)
542 hci_send_iso(conn->hcon, skb);
543 else
544 len = -ENOTCONN;
545
546 return len;
547 }
548
iso_recv_frame(struct iso_conn * conn,struct sk_buff * skb)549 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb)
550 {
551 struct sock *sk;
552
553 iso_conn_lock(conn);
554 sk = conn->sk;
555 iso_conn_unlock(conn);
556
557 if (!sk)
558 goto drop;
559
560 BT_DBG("sk %p len %d", sk, skb->len);
561
562 if (sk->sk_state != BT_CONNECTED)
563 goto drop;
564
565 if (!sock_queue_rcv_skb(sk, skb))
566 return;
567
568 drop:
569 kfree_skb(skb);
570 }
571
572 /* -------- Socket interface ---------- */
__iso_get_sock_listen_by_addr(bdaddr_t * src,bdaddr_t * dst)573 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst)
574 {
575 struct sock *sk;
576
577 sk_for_each(sk, &iso_sk_list.head) {
578 if (sk->sk_state != BT_LISTEN)
579 continue;
580
581 if (bacmp(&iso_pi(sk)->dst, dst))
582 continue;
583
584 if (!bacmp(&iso_pi(sk)->src, src))
585 return sk;
586 }
587
588 return NULL;
589 }
590
__iso_get_sock_listen_by_sid(bdaddr_t * ba,bdaddr_t * bc,__u8 sid)591 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc,
592 __u8 sid)
593 {
594 struct sock *sk;
595
596 sk_for_each(sk, &iso_sk_list.head) {
597 if (sk->sk_state != BT_LISTEN)
598 continue;
599
600 if (bacmp(&iso_pi(sk)->src, ba))
601 continue;
602
603 if (bacmp(&iso_pi(sk)->dst, bc))
604 continue;
605
606 if (iso_pi(sk)->bc_sid == sid)
607 return sk;
608 }
609
610 return NULL;
611 }
612
613 /* Find socket in given state:
614 * source bdaddr (Unicast)
615 * destination bdaddr (Broadcast only)
616 * match func - pass NULL to ignore
617 * match func data - pass -1 to ignore
618 * Returns closest match.
619 */
iso_get_sock(bdaddr_t * src,bdaddr_t * dst,enum bt_sock_state state,iso_sock_match_t match,void * data)620 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst,
621 enum bt_sock_state state,
622 iso_sock_match_t match, void *data)
623 {
624 struct sock *sk = NULL, *sk1 = NULL;
625
626 read_lock(&iso_sk_list.lock);
627
628 sk_for_each(sk, &iso_sk_list.head) {
629 if (sk->sk_state != state)
630 continue;
631
632 /* Match Broadcast destination */
633 if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst))
634 continue;
635
636 /* Use Match function if provided */
637 if (match && !match(sk, data))
638 continue;
639
640 /* Exact match. */
641 if (!bacmp(&iso_pi(sk)->src, src)) {
642 sock_hold(sk);
643 break;
644 }
645
646 /* Closest match */
647 if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) {
648 if (sk1)
649 sock_put(sk1);
650
651 sk1 = sk;
652 sock_hold(sk1);
653 }
654 }
655
656 if (sk && sk1)
657 sock_put(sk1);
658
659 read_unlock(&iso_sk_list.lock);
660
661 return sk ? sk : sk1;
662 }
663
iso_get_sock_big(struct sock * match_sk,bdaddr_t * src,bdaddr_t * dst,uint8_t big)664 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src,
665 bdaddr_t *dst, uint8_t big)
666 {
667 struct sock *sk = NULL;
668
669 read_lock(&iso_sk_list.lock);
670
671 sk_for_each(sk, &iso_sk_list.head) {
672 if (match_sk == sk)
673 continue;
674
675 /* Look for sockets that have already been
676 * connected to the BIG
677 */
678 if (sk->sk_state != BT_CONNECTED &&
679 sk->sk_state != BT_CONNECT)
680 continue;
681
682 /* Match Broadcast destination */
683 if (bacmp(&iso_pi(sk)->dst, dst))
684 continue;
685
686 /* Match BIG handle */
687 if (iso_pi(sk)->qos.bcast.big != big)
688 continue;
689
690 /* Match source address */
691 if (bacmp(&iso_pi(sk)->src, src))
692 continue;
693
694 sock_hold(sk);
695 break;
696 }
697
698 read_unlock(&iso_sk_list.lock);
699
700 return sk;
701 }
702
iso_sock_destruct(struct sock * sk)703 static void iso_sock_destruct(struct sock *sk)
704 {
705 BT_DBG("sk %p", sk);
706
707 iso_conn_put(iso_pi(sk)->conn);
708
709 skb_queue_purge(&sk->sk_receive_queue);
710 skb_queue_purge(&sk->sk_write_queue);
711 }
712
iso_sock_cleanup_listen(struct sock * parent)713 static void iso_sock_cleanup_listen(struct sock *parent)
714 {
715 struct sock *sk;
716
717 BT_DBG("parent %p", parent);
718
719 /* Close not yet accepted channels */
720 while ((sk = bt_accept_dequeue(parent, NULL))) {
721 iso_sock_close(sk);
722 iso_sock_kill(sk);
723 }
724
725 /* If listening socket has a hcon, properly disconnect it */
726 if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) {
727 iso_sock_disconn(parent);
728 return;
729 }
730
731 parent->sk_state = BT_CLOSED;
732 sock_set_flag(parent, SOCK_ZAPPED);
733 }
734
735 /* Kill socket (only if zapped and orphan)
736 * Must be called on unlocked socket.
737 */
iso_sock_kill(struct sock * sk)738 static void iso_sock_kill(struct sock *sk)
739 {
740 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket ||
741 sock_flag(sk, SOCK_DEAD))
742 return;
743
744 BT_DBG("sk %p state %d", sk, sk->sk_state);
745
746 /* Kill poor orphan */
747 bt_sock_unlink(&iso_sk_list, sk);
748 sock_set_flag(sk, SOCK_DEAD);
749 sock_put(sk);
750 }
751
iso_sock_disconn(struct sock * sk)752 static void iso_sock_disconn(struct sock *sk)
753 {
754 struct sock *bis_sk;
755 struct hci_conn *hcon = iso_pi(sk)->conn->hcon;
756
757 if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) {
758 bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src,
759 &iso_pi(sk)->dst,
760 iso_pi(sk)->qos.bcast.big);
761
762 /* If there are any other connected sockets for the
763 * same BIG, just delete the sk and leave the bis
764 * hcon active, in case later rebinding is needed.
765 */
766 if (bis_sk) {
767 hcon->state = BT_OPEN;
768 hcon->iso_data = NULL;
769 iso_pi(sk)->conn->hcon = NULL;
770 iso_sock_clear_timer(sk);
771 iso_chan_del(sk, bt_to_errno(hcon->abort_reason));
772 sock_put(bis_sk);
773 return;
774 }
775 }
776
777 sk->sk_state = BT_DISCONN;
778 iso_conn_lock(iso_pi(sk)->conn);
779 hci_conn_drop(iso_pi(sk)->conn->hcon);
780 iso_pi(sk)->conn->hcon = NULL;
781 iso_conn_unlock(iso_pi(sk)->conn);
782 }
783
__iso_sock_close(struct sock * sk)784 static void __iso_sock_close(struct sock *sk)
785 {
786 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
787
788 switch (sk->sk_state) {
789 case BT_LISTEN:
790 iso_sock_cleanup_listen(sk);
791 break;
792
793 case BT_CONNECT:
794 case BT_CONNECTED:
795 case BT_CONFIG:
796 if (iso_pi(sk)->conn->hcon)
797 iso_sock_disconn(sk);
798 else
799 iso_chan_del(sk, ECONNRESET);
800 break;
801
802 case BT_CONNECT2:
803 if (iso_pi(sk)->conn->hcon &&
804 (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) ||
805 test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags)))
806 iso_sock_disconn(sk);
807 else
808 iso_chan_del(sk, ECONNRESET);
809 break;
810 case BT_DISCONN:
811 iso_chan_del(sk, ECONNRESET);
812 break;
813
814 default:
815 sock_set_flag(sk, SOCK_ZAPPED);
816 break;
817 }
818 }
819
820 /* Must be called on unlocked socket. */
iso_sock_close(struct sock * sk)821 static void iso_sock_close(struct sock *sk)
822 {
823 iso_sock_clear_timer(sk);
824 lock_sock(sk);
825 __iso_sock_close(sk);
826 release_sock(sk);
827 iso_sock_kill(sk);
828 }
829
iso_sock_init(struct sock * sk,struct sock * parent)830 static void iso_sock_init(struct sock *sk, struct sock *parent)
831 {
832 BT_DBG("sk %p", sk);
833
834 if (parent) {
835 sk->sk_type = parent->sk_type;
836 bt_sk(sk)->flags = bt_sk(parent)->flags;
837 security_sk_clone(parent, sk);
838 }
839 }
840
841 static struct proto iso_proto = {
842 .name = "ISO",
843 .owner = THIS_MODULE,
844 .obj_size = sizeof(struct iso_pinfo)
845 };
846
847 #define DEFAULT_IO_QOS \
848 { \
849 .interval = 10000u, \
850 .latency = 10u, \
851 .sdu = 40u, \
852 .phy = BT_ISO_PHY_2M, \
853 .rtn = 2u, \
854 }
855
856 static struct bt_iso_qos default_qos = {
857 .bcast = {
858 .big = BT_ISO_QOS_BIG_UNSET,
859 .bis = BT_ISO_QOS_BIS_UNSET,
860 .sync_factor = 0x01,
861 .packing = 0x00,
862 .framing = 0x00,
863 .in = DEFAULT_IO_QOS,
864 .out = DEFAULT_IO_QOS,
865 .encryption = 0x00,
866 .bcode = {0x00},
867 .options = 0x00,
868 .skip = 0x0000,
869 .sync_timeout = BT_ISO_SYNC_TIMEOUT,
870 .sync_cte_type = 0x00,
871 .mse = 0x00,
872 .timeout = BT_ISO_SYNC_TIMEOUT,
873 },
874 };
875
iso_sock_alloc(struct net * net,struct socket * sock,int proto,gfp_t prio,int kern)876 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock,
877 int proto, gfp_t prio, int kern)
878 {
879 struct sock *sk;
880
881 sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern);
882 if (!sk)
883 return NULL;
884
885 sk->sk_destruct = iso_sock_destruct;
886 sk->sk_sndtimeo = ISO_CONN_TIMEOUT;
887
888 /* Set address type as public as default src address is BDADDR_ANY */
889 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
890
891 iso_pi(sk)->qos = default_qos;
892 iso_pi(sk)->sync_handle = -1;
893
894 bt_sock_link(&iso_sk_list, sk);
895 return sk;
896 }
897
iso_sock_create(struct net * net,struct socket * sock,int protocol,int kern)898 static int iso_sock_create(struct net *net, struct socket *sock, int protocol,
899 int kern)
900 {
901 struct sock *sk;
902
903 BT_DBG("sock %p", sock);
904
905 sock->state = SS_UNCONNECTED;
906
907 if (sock->type != SOCK_SEQPACKET)
908 return -ESOCKTNOSUPPORT;
909
910 sock->ops = &iso_sock_ops;
911
912 sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
913 if (!sk)
914 return -ENOMEM;
915
916 iso_sock_init(sk, NULL);
917 return 0;
918 }
919
iso_sock_bind_bc(struct socket * sock,struct sockaddr * addr,int addr_len)920 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr *addr,
921 int addr_len)
922 {
923 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
924 struct sock *sk = sock->sk;
925 int i;
926
927 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid,
928 sa->iso_bc->bc_num_bis);
929
930 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc))
931 return -EINVAL;
932
933 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr);
934
935 /* Check if the address type is of LE type */
936 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type))
937 return -EINVAL;
938
939 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type;
940
941 if (sa->iso_bc->bc_sid > 0x0f)
942 return -EINVAL;
943
944 iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid;
945
946 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS)
947 return -EINVAL;
948
949 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
950
951 for (i = 0; i < iso_pi(sk)->bc_num_bis; i++)
952 if (sa->iso_bc->bc_bis[i] < 0x01 ||
953 sa->iso_bc->bc_bis[i] > 0x1f)
954 return -EINVAL;
955
956 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
957 iso_pi(sk)->bc_num_bis);
958
959 return 0;
960 }
961
iso_sock_bind_pa_sk(struct sock * sk,struct sockaddr_iso * sa,int addr_len)962 static int iso_sock_bind_pa_sk(struct sock *sk, struct sockaddr_iso *sa,
963 int addr_len)
964 {
965 int err = 0;
966
967 if (sk->sk_type != SOCK_SEQPACKET) {
968 err = -EINVAL;
969 goto done;
970 }
971
972 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) {
973 err = -EINVAL;
974 goto done;
975 }
976
977 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) {
978 err = -EINVAL;
979 goto done;
980 }
981
982 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
983
984 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++)
985 if (sa->iso_bc->bc_bis[i] < 0x01 ||
986 sa->iso_bc->bc_bis[i] > 0x1f) {
987 err = -EINVAL;
988 goto done;
989 }
990
991 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
992 iso_pi(sk)->bc_num_bis);
993
994 done:
995 return err;
996 }
997
iso_sock_bind(struct socket * sock,struct sockaddr * addr,int addr_len)998 static int iso_sock_bind(struct socket *sock, struct sockaddr *addr,
999 int addr_len)
1000 {
1001 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1002 struct sock *sk = sock->sk;
1003 int err = 0;
1004
1005 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type);
1006
1007 if (!addr || addr_len < sizeof(struct sockaddr_iso) ||
1008 addr->sa_family != AF_BLUETOOTH)
1009 return -EINVAL;
1010
1011 lock_sock(sk);
1012
1013 /* Allow the user to bind a PA sync socket to a number
1014 * of BISes to sync to.
1015 */
1016 if ((sk->sk_state == BT_CONNECT2 ||
1017 sk->sk_state == BT_CONNECTED) &&
1018 test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1019 err = iso_sock_bind_pa_sk(sk, sa, addr_len);
1020 goto done;
1021 }
1022
1023 if (sk->sk_state != BT_OPEN) {
1024 err = -EBADFD;
1025 goto done;
1026 }
1027
1028 if (sk->sk_type != SOCK_SEQPACKET) {
1029 err = -EINVAL;
1030 goto done;
1031 }
1032
1033 /* Check if the address type is of LE type */
1034 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) {
1035 err = -EINVAL;
1036 goto done;
1037 }
1038
1039 bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr);
1040 iso_pi(sk)->src_type = sa->iso_bdaddr_type;
1041
1042 /* Check for Broadcast address */
1043 if (addr_len > sizeof(*sa)) {
1044 err = iso_sock_bind_bc(sock, addr, addr_len);
1045 if (err)
1046 goto done;
1047 }
1048
1049 sk->sk_state = BT_BOUND;
1050
1051 done:
1052 release_sock(sk);
1053 return err;
1054 }
1055
iso_sock_connect(struct socket * sock,struct sockaddr * addr,int alen,int flags)1056 static int iso_sock_connect(struct socket *sock, struct sockaddr *addr,
1057 int alen, int flags)
1058 {
1059 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1060 struct sock *sk = sock->sk;
1061 int err;
1062
1063 BT_DBG("sk %p", sk);
1064
1065 if (alen < sizeof(struct sockaddr_iso) ||
1066 addr->sa_family != AF_BLUETOOTH)
1067 return -EINVAL;
1068
1069 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND)
1070 return -EBADFD;
1071
1072 if (sk->sk_type != SOCK_SEQPACKET)
1073 return -EINVAL;
1074
1075 /* Check if the address type is of LE type */
1076 if (!bdaddr_type_is_le(sa->iso_bdaddr_type))
1077 return -EINVAL;
1078
1079 lock_sock(sk);
1080
1081 bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr);
1082 iso_pi(sk)->dst_type = sa->iso_bdaddr_type;
1083
1084 release_sock(sk);
1085
1086 if (bacmp(&iso_pi(sk)->dst, BDADDR_ANY))
1087 err = iso_connect_cis(sk);
1088 else
1089 err = iso_connect_bis(sk);
1090
1091 if (err)
1092 return err;
1093
1094 lock_sock(sk);
1095
1096 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1097 err = bt_sock_wait_state(sk, BT_CONNECTED,
1098 sock_sndtimeo(sk, flags & O_NONBLOCK));
1099 }
1100
1101 release_sock(sk);
1102 return err;
1103 }
1104
iso_listen_bis(struct sock * sk)1105 static int iso_listen_bis(struct sock *sk)
1106 {
1107 struct hci_dev *hdev;
1108 int err = 0;
1109 struct iso_conn *conn;
1110 struct hci_conn *hcon;
1111
1112 BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src,
1113 &iso_pi(sk)->dst, iso_pi(sk)->bc_sid);
1114
1115 write_lock(&iso_sk_list.lock);
1116
1117 if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst,
1118 iso_pi(sk)->bc_sid))
1119 err = -EADDRINUSE;
1120
1121 write_unlock(&iso_sk_list.lock);
1122
1123 if (err)
1124 return err;
1125
1126 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1127 iso_pi(sk)->src_type);
1128 if (!hdev)
1129 return -EHOSTUNREACH;
1130
1131 hci_dev_lock(hdev);
1132 lock_sock(sk);
1133
1134 /* Fail if user set invalid QoS */
1135 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
1136 iso_pi(sk)->qos = default_qos;
1137 err = -EINVAL;
1138 goto unlock;
1139 }
1140
1141 hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst,
1142 le_addr_type(iso_pi(sk)->dst_type),
1143 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos);
1144 if (IS_ERR(hcon)) {
1145 err = PTR_ERR(hcon);
1146 goto unlock;
1147 }
1148
1149 conn = iso_conn_add(hcon);
1150 if (!conn) {
1151 hci_conn_drop(hcon);
1152 err = -ENOMEM;
1153 goto unlock;
1154 }
1155
1156 err = iso_chan_add(conn, sk, NULL);
1157 if (err) {
1158 hci_conn_drop(hcon);
1159 goto unlock;
1160 }
1161
1162 unlock:
1163 release_sock(sk);
1164 hci_dev_unlock(hdev);
1165 hci_dev_put(hdev);
1166 return err;
1167 }
1168
iso_listen_cis(struct sock * sk)1169 static int iso_listen_cis(struct sock *sk)
1170 {
1171 int err = 0;
1172
1173 BT_DBG("%pMR", &iso_pi(sk)->src);
1174
1175 write_lock(&iso_sk_list.lock);
1176
1177 if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst))
1178 err = -EADDRINUSE;
1179
1180 write_unlock(&iso_sk_list.lock);
1181
1182 return err;
1183 }
1184
iso_sock_listen(struct socket * sock,int backlog)1185 static int iso_sock_listen(struct socket *sock, int backlog)
1186 {
1187 struct sock *sk = sock->sk;
1188 int err = 0;
1189
1190 BT_DBG("sk %p backlog %d", sk, backlog);
1191
1192 sock_hold(sk);
1193 lock_sock(sk);
1194
1195 if (sk->sk_state != BT_BOUND) {
1196 err = -EBADFD;
1197 goto done;
1198 }
1199
1200 if (sk->sk_type != SOCK_SEQPACKET) {
1201 err = -EINVAL;
1202 goto done;
1203 }
1204
1205 if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1206 err = iso_listen_cis(sk);
1207 } else {
1208 /* Drop sock lock to avoid potential
1209 * deadlock with the hdev lock.
1210 */
1211 release_sock(sk);
1212 err = iso_listen_bis(sk);
1213 lock_sock(sk);
1214 }
1215
1216 if (err)
1217 goto done;
1218
1219 sk->sk_max_ack_backlog = backlog;
1220 sk->sk_ack_backlog = 0;
1221
1222 sk->sk_state = BT_LISTEN;
1223
1224 done:
1225 release_sock(sk);
1226 sock_put(sk);
1227 return err;
1228 }
1229
iso_sock_accept(struct socket * sock,struct socket * newsock,struct proto_accept_arg * arg)1230 static int iso_sock_accept(struct socket *sock, struct socket *newsock,
1231 struct proto_accept_arg *arg)
1232 {
1233 DEFINE_WAIT_FUNC(wait, woken_wake_function);
1234 struct sock *sk = sock->sk, *ch;
1235 long timeo;
1236 int err = 0;
1237
1238 /* Use explicit nested locking to avoid lockdep warnings generated
1239 * because the parent socket and the child socket are locked on the
1240 * same thread.
1241 */
1242 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1243
1244 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK);
1245
1246 BT_DBG("sk %p timeo %ld", sk, timeo);
1247
1248 /* Wait for an incoming connection. (wake-one). */
1249 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1250 while (1) {
1251 if (sk->sk_state != BT_LISTEN) {
1252 err = -EBADFD;
1253 break;
1254 }
1255
1256 ch = bt_accept_dequeue(sk, newsock);
1257 if (ch)
1258 break;
1259
1260 if (!timeo) {
1261 err = -EAGAIN;
1262 break;
1263 }
1264
1265 if (signal_pending(current)) {
1266 err = sock_intr_errno(timeo);
1267 break;
1268 }
1269
1270 release_sock(sk);
1271
1272 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
1273 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1274 }
1275 remove_wait_queue(sk_sleep(sk), &wait);
1276
1277 if (err)
1278 goto done;
1279
1280 newsock->state = SS_CONNECTED;
1281
1282 BT_DBG("new socket %p", ch);
1283
1284 /* A Broadcast Sink might require BIG sync to be terminated
1285 * and re-established multiple times, while keeping the same
1286 * PA sync handle active. To allow this, once all BIS
1287 * connections have been accepted on a PA sync parent socket,
1288 * "reset" socket state, to allow future BIG re-sync procedures.
1289 */
1290 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1291 /* Iterate through the list of bound BIS indices
1292 * and clear each BIS as they are accepted by the
1293 * user space, one by one.
1294 */
1295 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) {
1296 if (iso_pi(sk)->bc_bis[i] > 0) {
1297 iso_pi(sk)->bc_bis[i] = 0;
1298 iso_pi(sk)->bc_num_bis--;
1299 break;
1300 }
1301 }
1302
1303 if (iso_pi(sk)->bc_num_bis == 0) {
1304 /* Once the last BIS was accepted, reset parent
1305 * socket parameters to mark that the listening
1306 * process for BIS connections has been completed:
1307 *
1308 * 1. Reset the DEFER setup flag on the parent sk.
1309 * 2. Clear the flag marking that the BIG create
1310 * sync command is pending.
1311 * 3. Transition socket state from BT_LISTEN to
1312 * BT_CONNECTED.
1313 */
1314 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1315 clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags);
1316 sk->sk_state = BT_CONNECTED;
1317 }
1318 }
1319
1320 done:
1321 release_sock(sk);
1322 return err;
1323 }
1324
iso_sock_getname(struct socket * sock,struct sockaddr * addr,int peer)1325 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr,
1326 int peer)
1327 {
1328 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1329 struct sock *sk = sock->sk;
1330
1331 BT_DBG("sock %p, sk %p", sock, sk);
1332
1333 addr->sa_family = AF_BLUETOOTH;
1334
1335 if (peer) {
1336 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst);
1337 sa->iso_bdaddr_type = iso_pi(sk)->dst_type;
1338 } else {
1339 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src);
1340 sa->iso_bdaddr_type = iso_pi(sk)->src_type;
1341 }
1342
1343 return sizeof(struct sockaddr_iso);
1344 }
1345
iso_sock_sendmsg(struct socket * sock,struct msghdr * msg,size_t len)1346 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg,
1347 size_t len)
1348 {
1349 struct sock *sk = sock->sk;
1350 struct sk_buff *skb, **frag;
1351 size_t mtu;
1352 int err;
1353
1354 BT_DBG("sock %p, sk %p", sock, sk);
1355
1356 err = sock_error(sk);
1357 if (err)
1358 return err;
1359
1360 if (msg->msg_flags & MSG_OOB)
1361 return -EOPNOTSUPP;
1362
1363 lock_sock(sk);
1364
1365 if (sk->sk_state != BT_CONNECTED) {
1366 release_sock(sk);
1367 return -ENOTCONN;
1368 }
1369
1370 mtu = iso_pi(sk)->conn->hcon->mtu;
1371
1372 release_sock(sk);
1373
1374 skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0);
1375 if (IS_ERR(skb))
1376 return PTR_ERR(skb);
1377
1378 len -= skb->len;
1379
1380 BT_DBG("skb %p len %d", sk, skb->len);
1381
1382 /* Continuation fragments */
1383 frag = &skb_shinfo(skb)->frag_list;
1384 while (len) {
1385 struct sk_buff *tmp;
1386
1387 tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0);
1388 if (IS_ERR(tmp)) {
1389 kfree_skb(skb);
1390 return PTR_ERR(tmp);
1391 }
1392
1393 *frag = tmp;
1394
1395 len -= tmp->len;
1396
1397 skb->len += tmp->len;
1398 skb->data_len += tmp->len;
1399
1400 BT_DBG("frag %p len %d", *frag, tmp->len);
1401
1402 frag = &(*frag)->next;
1403 }
1404
1405 lock_sock(sk);
1406
1407 if (sk->sk_state == BT_CONNECTED)
1408 err = iso_send_frame(sk, skb);
1409 else
1410 err = -ENOTCONN;
1411
1412 release_sock(sk);
1413
1414 if (err < 0)
1415 kfree_skb(skb);
1416 return err;
1417 }
1418
iso_conn_defer_accept(struct hci_conn * conn)1419 static void iso_conn_defer_accept(struct hci_conn *conn)
1420 {
1421 struct hci_cp_le_accept_cis cp;
1422 struct hci_dev *hdev = conn->hdev;
1423
1424 BT_DBG("conn %p", conn);
1425
1426 conn->state = BT_CONFIG;
1427
1428 cp.handle = cpu_to_le16(conn->handle);
1429
1430 hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp);
1431 }
1432
iso_conn_big_sync(struct sock * sk)1433 static void iso_conn_big_sync(struct sock *sk)
1434 {
1435 int err;
1436 struct hci_dev *hdev;
1437
1438 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1439 iso_pi(sk)->src_type);
1440
1441 if (!hdev)
1442 return;
1443
1444 /* hci_le_big_create_sync requires hdev lock to be held, since
1445 * it enqueues the HCI LE BIG Create Sync command via
1446 * hci_cmd_sync_queue_once, which checks hdev flags that might
1447 * change.
1448 */
1449 hci_dev_lock(hdev);
1450 lock_sock(sk);
1451
1452 if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) {
1453 err = hci_le_big_create_sync(hdev, iso_pi(sk)->conn->hcon,
1454 &iso_pi(sk)->qos,
1455 iso_pi(sk)->sync_handle,
1456 iso_pi(sk)->bc_num_bis,
1457 iso_pi(sk)->bc_bis);
1458 if (err)
1459 bt_dev_err(hdev, "hci_le_big_create_sync: %d",
1460 err);
1461 }
1462
1463 release_sock(sk);
1464 hci_dev_unlock(hdev);
1465 }
1466
iso_sock_recvmsg(struct socket * sock,struct msghdr * msg,size_t len,int flags)1467 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,
1468 size_t len, int flags)
1469 {
1470 struct sock *sk = sock->sk;
1471 struct iso_pinfo *pi = iso_pi(sk);
1472 bool early_ret = false;
1473 int err = 0;
1474
1475 BT_DBG("sk %p", sk);
1476
1477 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1478 sock_hold(sk);
1479 lock_sock(sk);
1480
1481 switch (sk->sk_state) {
1482 case BT_CONNECT2:
1483 if (test_bit(BT_SK_PA_SYNC, &pi->flags)) {
1484 release_sock(sk);
1485 iso_conn_big_sync(sk);
1486 lock_sock(sk);
1487
1488 sk->sk_state = BT_LISTEN;
1489 } else {
1490 iso_conn_defer_accept(pi->conn->hcon);
1491 sk->sk_state = BT_CONFIG;
1492 }
1493
1494 early_ret = true;
1495 break;
1496 case BT_CONNECTED:
1497 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1498 release_sock(sk);
1499 iso_conn_big_sync(sk);
1500 lock_sock(sk);
1501
1502 sk->sk_state = BT_LISTEN;
1503 early_ret = true;
1504 }
1505
1506 break;
1507 case BT_CONNECT:
1508 release_sock(sk);
1509 err = iso_connect_cis(sk);
1510 lock_sock(sk);
1511
1512 early_ret = true;
1513 break;
1514 default:
1515 break;
1516 }
1517
1518 release_sock(sk);
1519 sock_put(sk);
1520
1521 if (early_ret)
1522 return err;
1523 }
1524
1525 return bt_sock_recvmsg(sock, msg, len, flags);
1526 }
1527
check_io_qos(struct bt_iso_io_qos * qos)1528 static bool check_io_qos(struct bt_iso_io_qos *qos)
1529 {
1530 /* If no PHY is enable SDU must be 0 */
1531 if (!qos->phy && qos->sdu)
1532 return false;
1533
1534 if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff))
1535 return false;
1536
1537 if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0))
1538 return false;
1539
1540 if (qos->phy > BT_ISO_PHY_ANY)
1541 return false;
1542
1543 return true;
1544 }
1545
check_ucast_qos(struct bt_iso_qos * qos)1546 static bool check_ucast_qos(struct bt_iso_qos *qos)
1547 {
1548 if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET)
1549 return false;
1550
1551 if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET)
1552 return false;
1553
1554 if (qos->ucast.sca > 0x07)
1555 return false;
1556
1557 if (qos->ucast.packing > 0x01)
1558 return false;
1559
1560 if (qos->ucast.framing > 0x01)
1561 return false;
1562
1563 if (!check_io_qos(&qos->ucast.in))
1564 return false;
1565
1566 if (!check_io_qos(&qos->ucast.out))
1567 return false;
1568
1569 return true;
1570 }
1571
check_bcast_qos(struct bt_iso_qos * qos)1572 static bool check_bcast_qos(struct bt_iso_qos *qos)
1573 {
1574 if (!qos->bcast.sync_factor)
1575 qos->bcast.sync_factor = 0x01;
1576
1577 if (qos->bcast.packing > 0x01)
1578 return false;
1579
1580 if (qos->bcast.framing > 0x01)
1581 return false;
1582
1583 if (!check_io_qos(&qos->bcast.in))
1584 return false;
1585
1586 if (!check_io_qos(&qos->bcast.out))
1587 return false;
1588
1589 if (qos->bcast.encryption > 0x01)
1590 return false;
1591
1592 if (qos->bcast.options > 0x07)
1593 return false;
1594
1595 if (qos->bcast.skip > 0x01f3)
1596 return false;
1597
1598 if (!qos->bcast.sync_timeout)
1599 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1600
1601 if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000)
1602 return false;
1603
1604 if (qos->bcast.sync_cte_type > 0x1f)
1605 return false;
1606
1607 if (qos->bcast.mse > 0x1f)
1608 return false;
1609
1610 if (!qos->bcast.timeout)
1611 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1612
1613 if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000)
1614 return false;
1615
1616 return true;
1617 }
1618
iso_sock_setsockopt(struct socket * sock,int level,int optname,sockptr_t optval,unsigned int optlen)1619 static int iso_sock_setsockopt(struct socket *sock, int level, int optname,
1620 sockptr_t optval, unsigned int optlen)
1621 {
1622 struct sock *sk = sock->sk;
1623 int err = 0;
1624 struct bt_iso_qos qos = default_qos;
1625 u32 opt;
1626
1627 BT_DBG("sk %p", sk);
1628
1629 lock_sock(sk);
1630
1631 switch (optname) {
1632 case BT_DEFER_SETUP:
1633 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1634 err = -EINVAL;
1635 break;
1636 }
1637
1638 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1639 if (err)
1640 break;
1641
1642 if (opt)
1643 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1644 else
1645 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1646 break;
1647
1648 case BT_PKT_STATUS:
1649 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1650 if (err)
1651 break;
1652
1653 if (opt)
1654 set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1655 else
1656 clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1657 break;
1658
1659 case BT_ISO_QOS:
1660 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1661 sk->sk_state != BT_CONNECT2 &&
1662 (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) ||
1663 sk->sk_state != BT_CONNECTED)) {
1664 err = -EINVAL;
1665 break;
1666 }
1667
1668 err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen);
1669 if (err)
1670 break;
1671
1672 iso_pi(sk)->qos = qos;
1673 iso_pi(sk)->qos_user_set = true;
1674
1675 break;
1676
1677 case BT_ISO_BASE:
1678 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1679 sk->sk_state != BT_CONNECT2) {
1680 err = -EINVAL;
1681 break;
1682 }
1683
1684 if (optlen > sizeof(iso_pi(sk)->base)) {
1685 err = -EINVAL;
1686 break;
1687 }
1688
1689 err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval,
1690 optlen);
1691 if (err)
1692 break;
1693
1694 iso_pi(sk)->base_len = optlen;
1695
1696 break;
1697
1698 default:
1699 err = -ENOPROTOOPT;
1700 break;
1701 }
1702
1703 release_sock(sk);
1704 return err;
1705 }
1706
iso_sock_getsockopt(struct socket * sock,int level,int optname,char __user * optval,int __user * optlen)1707 static int iso_sock_getsockopt(struct socket *sock, int level, int optname,
1708 char __user *optval, int __user *optlen)
1709 {
1710 struct sock *sk = sock->sk;
1711 int len, err = 0;
1712 struct bt_iso_qos *qos;
1713 u8 base_len;
1714 u8 *base;
1715
1716 BT_DBG("sk %p", sk);
1717
1718 if (get_user(len, optlen))
1719 return -EFAULT;
1720
1721 lock_sock(sk);
1722
1723 switch (optname) {
1724 case BT_DEFER_SETUP:
1725 if (sk->sk_state == BT_CONNECTED) {
1726 err = -EINVAL;
1727 break;
1728 }
1729
1730 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
1731 (u32 __user *)optval))
1732 err = -EFAULT;
1733
1734 break;
1735
1736 case BT_PKT_STATUS:
1737 if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags),
1738 (int __user *)optval))
1739 err = -EFAULT;
1740 break;
1741
1742 case BT_ISO_QOS:
1743 qos = iso_sock_get_qos(sk);
1744
1745 len = min_t(unsigned int, len, sizeof(*qos));
1746 if (copy_to_user(optval, qos, len))
1747 err = -EFAULT;
1748
1749 break;
1750
1751 case BT_ISO_BASE:
1752 if (sk->sk_state == BT_CONNECTED &&
1753 !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1754 base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len;
1755 base = iso_pi(sk)->conn->hcon->le_per_adv_data;
1756 } else {
1757 base_len = iso_pi(sk)->base_len;
1758 base = iso_pi(sk)->base;
1759 }
1760
1761 len = min_t(unsigned int, len, base_len);
1762 if (copy_to_user(optval, base, len))
1763 err = -EFAULT;
1764 if (put_user(len, optlen))
1765 err = -EFAULT;
1766
1767 break;
1768
1769 default:
1770 err = -ENOPROTOOPT;
1771 break;
1772 }
1773
1774 release_sock(sk);
1775 return err;
1776 }
1777
iso_sock_shutdown(struct socket * sock,int how)1778 static int iso_sock_shutdown(struct socket *sock, int how)
1779 {
1780 struct sock *sk = sock->sk;
1781 int err = 0;
1782
1783 BT_DBG("sock %p, sk %p, how %d", sock, sk, how);
1784
1785 if (!sk)
1786 return 0;
1787
1788 sock_hold(sk);
1789 lock_sock(sk);
1790
1791 switch (how) {
1792 case SHUT_RD:
1793 if (sk->sk_shutdown & RCV_SHUTDOWN)
1794 goto unlock;
1795 sk->sk_shutdown |= RCV_SHUTDOWN;
1796 break;
1797 case SHUT_WR:
1798 if (sk->sk_shutdown & SEND_SHUTDOWN)
1799 goto unlock;
1800 sk->sk_shutdown |= SEND_SHUTDOWN;
1801 break;
1802 case SHUT_RDWR:
1803 if (sk->sk_shutdown & SHUTDOWN_MASK)
1804 goto unlock;
1805 sk->sk_shutdown |= SHUTDOWN_MASK;
1806 break;
1807 }
1808
1809 iso_sock_clear_timer(sk);
1810 __iso_sock_close(sk);
1811
1812 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
1813 !(current->flags & PF_EXITING))
1814 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1815
1816 unlock:
1817 release_sock(sk);
1818 sock_put(sk);
1819
1820 return err;
1821 }
1822
iso_sock_release(struct socket * sock)1823 static int iso_sock_release(struct socket *sock)
1824 {
1825 struct sock *sk = sock->sk;
1826 int err = 0;
1827
1828 BT_DBG("sock %p, sk %p", sock, sk);
1829
1830 if (!sk)
1831 return 0;
1832
1833 iso_sock_close(sk);
1834
1835 if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) &&
1836 !(current->flags & PF_EXITING)) {
1837 lock_sock(sk);
1838 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1839 release_sock(sk);
1840 }
1841
1842 sock_orphan(sk);
1843 iso_sock_kill(sk);
1844 return err;
1845 }
1846
iso_sock_ready(struct sock * sk)1847 static void iso_sock_ready(struct sock *sk)
1848 {
1849 BT_DBG("sk %p", sk);
1850
1851 if (!sk)
1852 return;
1853
1854 lock_sock(sk);
1855 iso_sock_clear_timer(sk);
1856 sk->sk_state = BT_CONNECTED;
1857 sk->sk_state_change(sk);
1858 release_sock(sk);
1859 }
1860
iso_match_big(struct sock * sk,void * data)1861 static bool iso_match_big(struct sock *sk, void *data)
1862 {
1863 struct hci_evt_le_big_sync_estabilished *ev = data;
1864
1865 return ev->handle == iso_pi(sk)->qos.bcast.big;
1866 }
1867
iso_match_big_hcon(struct sock * sk,void * data)1868 static bool iso_match_big_hcon(struct sock *sk, void *data)
1869 {
1870 struct hci_conn *hcon = data;
1871
1872 return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big;
1873 }
1874
iso_match_pa_sync_flag(struct sock * sk,void * data)1875 static bool iso_match_pa_sync_flag(struct sock *sk, void *data)
1876 {
1877 return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
1878 }
1879
iso_conn_ready(struct iso_conn * conn)1880 static void iso_conn_ready(struct iso_conn *conn)
1881 {
1882 struct sock *parent = NULL;
1883 struct sock *sk = conn->sk;
1884 struct hci_ev_le_big_sync_estabilished *ev = NULL;
1885 struct hci_ev_le_pa_sync_established *ev2 = NULL;
1886 struct hci_ev_le_per_adv_report *ev3 = NULL;
1887 struct hci_conn *hcon;
1888
1889 BT_DBG("conn %p", conn);
1890
1891 if (sk) {
1892 iso_sock_ready(conn->sk);
1893 } else {
1894 hcon = conn->hcon;
1895 if (!hcon)
1896 return;
1897
1898 if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) {
1899 /* A BIS slave hcon is notified to the ISO layer
1900 * after the Command Complete for the LE Setup
1901 * ISO Data Path command is received. Get the
1902 * parent socket that matches the hcon BIG handle.
1903 */
1904 parent = iso_get_sock(&hcon->src, &hcon->dst,
1905 BT_LISTEN, iso_match_big_hcon,
1906 hcon);
1907 } else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) {
1908 ev = hci_recv_event_data(hcon->hdev,
1909 HCI_EVT_LE_BIG_SYNC_ESTABILISHED);
1910
1911 /* Get reference to PA sync parent socket, if it exists */
1912 parent = iso_get_sock(&hcon->src, &hcon->dst,
1913 BT_LISTEN,
1914 iso_match_pa_sync_flag,
1915 NULL);
1916 if (!parent && ev)
1917 parent = iso_get_sock(&hcon->src,
1918 &hcon->dst,
1919 BT_LISTEN,
1920 iso_match_big, ev);
1921 } else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
1922 ev2 = hci_recv_event_data(hcon->hdev,
1923 HCI_EV_LE_PA_SYNC_ESTABLISHED);
1924 if (ev2)
1925 parent = iso_get_sock(&hcon->src,
1926 &hcon->dst,
1927 BT_LISTEN,
1928 iso_match_sid, ev2);
1929 } else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) {
1930 ev3 = hci_recv_event_data(hcon->hdev,
1931 HCI_EV_LE_PER_ADV_REPORT);
1932 if (ev3)
1933 parent = iso_get_sock(&hcon->src,
1934 &hcon->dst,
1935 BT_LISTEN,
1936 iso_match_sync_handle_pa_report,
1937 ev3);
1938 }
1939
1940 if (!parent)
1941 parent = iso_get_sock(&hcon->src, BDADDR_ANY,
1942 BT_LISTEN, NULL, NULL);
1943
1944 if (!parent)
1945 return;
1946
1947 lock_sock(parent);
1948
1949 sk = iso_sock_alloc(sock_net(parent), NULL,
1950 BTPROTO_ISO, GFP_ATOMIC, 0);
1951 if (!sk) {
1952 release_sock(parent);
1953 return;
1954 }
1955
1956 iso_sock_init(sk, parent);
1957
1958 bacpy(&iso_pi(sk)->src, &hcon->src);
1959
1960 /* Convert from HCI to three-value type */
1961 if (hcon->src_type == ADDR_LE_DEV_PUBLIC)
1962 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
1963 else
1964 iso_pi(sk)->src_type = BDADDR_LE_RANDOM;
1965
1966 /* If hcon has no destination address (BDADDR_ANY) it means it
1967 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or
1968 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using
1969 * the parent socket destination address.
1970 */
1971 if (!bacmp(&hcon->dst, BDADDR_ANY)) {
1972 bacpy(&hcon->dst, &iso_pi(parent)->dst);
1973 hcon->dst_type = iso_pi(parent)->dst_type;
1974 }
1975
1976 if (ev3) {
1977 iso_pi(sk)->qos = iso_pi(parent)->qos;
1978 hcon->iso_qos = iso_pi(sk)->qos;
1979 iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis;
1980 memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis, ISO_MAX_NUM_BIS);
1981 set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
1982 }
1983
1984 bacpy(&iso_pi(sk)->dst, &hcon->dst);
1985 iso_pi(sk)->dst_type = hcon->dst_type;
1986 iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle;
1987 memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len);
1988 iso_pi(sk)->base_len = iso_pi(parent)->base_len;
1989
1990 hci_conn_hold(hcon);
1991 iso_chan_add(conn, sk, parent);
1992
1993 if ((ev && ((struct hci_evt_le_big_sync_estabilished *)ev)->status) ||
1994 (ev2 && ev2->status)) {
1995 /* Trigger error signal on child socket */
1996 sk->sk_err = ECONNREFUSED;
1997 sk->sk_error_report(sk);
1998 }
1999
2000 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags))
2001 sk->sk_state = BT_CONNECT2;
2002 else
2003 sk->sk_state = BT_CONNECTED;
2004
2005 /* Wake up parent */
2006 parent->sk_data_ready(parent);
2007
2008 release_sock(parent);
2009 sock_put(parent);
2010 }
2011 }
2012
iso_match_sid(struct sock * sk,void * data)2013 static bool iso_match_sid(struct sock *sk, void *data)
2014 {
2015 struct hci_ev_le_pa_sync_established *ev = data;
2016
2017 return ev->sid == iso_pi(sk)->bc_sid;
2018 }
2019
iso_match_sync_handle(struct sock * sk,void * data)2020 static bool iso_match_sync_handle(struct sock *sk, void *data)
2021 {
2022 struct hci_evt_le_big_info_adv_report *ev = data;
2023
2024 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2025 }
2026
iso_match_sync_handle_pa_report(struct sock * sk,void * data)2027 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data)
2028 {
2029 struct hci_ev_le_per_adv_report *ev = data;
2030
2031 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2032 }
2033
2034 /* ----- ISO interface with lower layer (HCI) ----- */
2035
iso_connect_ind(struct hci_dev * hdev,bdaddr_t * bdaddr,__u8 * flags)2036 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags)
2037 {
2038 struct hci_ev_le_pa_sync_established *ev1;
2039 struct hci_evt_le_big_info_adv_report *ev2;
2040 struct hci_ev_le_per_adv_report *ev3;
2041 struct sock *sk;
2042
2043 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr);
2044
2045 /* Broadcast receiver requires handling of some events before it can
2046 * proceed to establishing a BIG sync:
2047 *
2048 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific
2049 * SID to listen to and once sync is estabilished its handle needs to
2050 * be stored in iso_pi(sk)->sync_handle so it can be matched once
2051 * receiving the BIG Info.
2052 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a
2053 * a BIG Info it attempts to check if there any listening socket with
2054 * the same sync_handle and if it does then attempt to create a sync.
2055 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored
2056 * in iso_pi(sk)->base so it can be passed up to user, in the case of a
2057 * broadcast sink.
2058 */
2059 ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED);
2060 if (ev1) {
2061 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN,
2062 iso_match_sid, ev1);
2063 if (sk && !ev1->status)
2064 iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle);
2065
2066 goto done;
2067 }
2068
2069 ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT);
2070 if (ev2) {
2071 /* Check if BIGInfo report has already been handled */
2072 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECTED,
2073 iso_match_sync_handle, ev2);
2074 if (sk) {
2075 sock_put(sk);
2076 sk = NULL;
2077 goto done;
2078 }
2079
2080 /* Try to get PA sync socket, if it exists */
2081 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECT2,
2082 iso_match_sync_handle, ev2);
2083 if (!sk)
2084 sk = iso_get_sock(&hdev->bdaddr, bdaddr,
2085 BT_LISTEN,
2086 iso_match_sync_handle,
2087 ev2);
2088
2089 if (sk) {
2090 int err;
2091 struct hci_conn *hcon = iso_pi(sk)->conn->hcon;
2092
2093 iso_pi(sk)->qos.bcast.encryption = ev2->encryption;
2094
2095 if (ev2->num_bis < iso_pi(sk)->bc_num_bis)
2096 iso_pi(sk)->bc_num_bis = ev2->num_bis;
2097
2098 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) &&
2099 !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) {
2100 err = hci_le_big_create_sync(hdev,
2101 hcon,
2102 &iso_pi(sk)->qos,
2103 iso_pi(sk)->sync_handle,
2104 iso_pi(sk)->bc_num_bis,
2105 iso_pi(sk)->bc_bis);
2106 if (err) {
2107 bt_dev_err(hdev, "hci_le_big_create_sync: %d",
2108 err);
2109 sock_put(sk);
2110 sk = NULL;
2111 }
2112 }
2113 }
2114
2115 goto done;
2116 }
2117
2118 ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT);
2119 if (ev3) {
2120 size_t base_len = 0;
2121 u8 *base;
2122 struct hci_conn *hcon;
2123
2124 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN,
2125 iso_match_sync_handle_pa_report, ev3);
2126 if (!sk)
2127 goto done;
2128
2129 hcon = iso_pi(sk)->conn->hcon;
2130 if (!hcon)
2131 goto done;
2132
2133 if (ev3->data_status == LE_PA_DATA_TRUNCATED) {
2134 /* The controller was unable to retrieve PA data. */
2135 memset(hcon->le_per_adv_data, 0,
2136 HCI_MAX_PER_AD_TOT_LEN);
2137 hcon->le_per_adv_data_len = 0;
2138 hcon->le_per_adv_data_offset = 0;
2139 goto done;
2140 }
2141
2142 if (hcon->le_per_adv_data_offset + ev3->length >
2143 HCI_MAX_PER_AD_TOT_LEN)
2144 goto done;
2145
2146 memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset,
2147 ev3->data, ev3->length);
2148 hcon->le_per_adv_data_offset += ev3->length;
2149
2150 if (ev3->data_status == LE_PA_DATA_COMPLETE) {
2151 /* All PA data has been received. */
2152 hcon->le_per_adv_data_len =
2153 hcon->le_per_adv_data_offset;
2154 hcon->le_per_adv_data_offset = 0;
2155
2156 /* Extract BASE */
2157 base = eir_get_service_data(hcon->le_per_adv_data,
2158 hcon->le_per_adv_data_len,
2159 EIR_BAA_SERVICE_UUID,
2160 &base_len);
2161
2162 if (!base || base_len > BASE_MAX_LENGTH)
2163 goto done;
2164
2165 memcpy(iso_pi(sk)->base, base, base_len);
2166 iso_pi(sk)->base_len = base_len;
2167 } else {
2168 /* This is a PA data fragment. Keep pa_data_len set to 0
2169 * until all data has been reassembled.
2170 */
2171 hcon->le_per_adv_data_len = 0;
2172 }
2173 } else {
2174 sk = iso_get_sock(&hdev->bdaddr, BDADDR_ANY,
2175 BT_LISTEN, NULL, NULL);
2176 }
2177
2178 done:
2179 if (!sk)
2180 return 0;
2181
2182 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))
2183 *flags |= HCI_PROTO_DEFER;
2184
2185 sock_put(sk);
2186
2187 return HCI_LM_ACCEPT;
2188 }
2189
iso_connect_cfm(struct hci_conn * hcon,__u8 status)2190 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status)
2191 {
2192 if (hcon->type != ISO_LINK) {
2193 if (hcon->type != LE_LINK)
2194 return;
2195
2196 /* Check if LE link has failed */
2197 if (status) {
2198 struct hci_link *link, *t;
2199
2200 list_for_each_entry_safe(link, t, &hcon->link_list,
2201 list)
2202 iso_conn_del(link->conn, bt_to_errno(status));
2203
2204 return;
2205 }
2206
2207 /* Create CIS if pending */
2208 hci_le_create_cis_pending(hcon->hdev);
2209 return;
2210 }
2211
2212 BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status);
2213
2214 /* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or
2215 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection
2216 * into the accept queue of the listening socket and wake up
2217 * userspace, to inform the user about the event.
2218 */
2219 if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) ||
2220 test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
2221 struct iso_conn *conn;
2222
2223 conn = iso_conn_add(hcon);
2224 if (conn)
2225 iso_conn_ready(conn);
2226 } else {
2227 iso_conn_del(hcon, bt_to_errno(status));
2228 }
2229 }
2230
iso_disconn_cfm(struct hci_conn * hcon,__u8 reason)2231 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason)
2232 {
2233 if (hcon->type != ISO_LINK)
2234 return;
2235
2236 BT_DBG("hcon %p reason %d", hcon, reason);
2237
2238 iso_conn_del(hcon, bt_to_errno(reason));
2239 }
2240
iso_recv(struct hci_conn * hcon,struct sk_buff * skb,u16 flags)2241 void iso_recv(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
2242 {
2243 struct iso_conn *conn = hcon->iso_data;
2244 __u16 pb, ts, len;
2245
2246 if (!conn)
2247 goto drop;
2248
2249 pb = hci_iso_flags_pb(flags);
2250 ts = hci_iso_flags_ts(flags);
2251
2252 BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts);
2253
2254 switch (pb) {
2255 case ISO_START:
2256 case ISO_SINGLE:
2257 if (conn->rx_len) {
2258 BT_ERR("Unexpected start frame (len %d)", skb->len);
2259 kfree_skb(conn->rx_skb);
2260 conn->rx_skb = NULL;
2261 conn->rx_len = 0;
2262 }
2263
2264 if (ts) {
2265 struct hci_iso_ts_data_hdr *hdr;
2266
2267 /* TODO: add timestamp to the packet? */
2268 hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE);
2269 if (!hdr) {
2270 BT_ERR("Frame is too short (len %d)", skb->len);
2271 goto drop;
2272 }
2273
2274 len = __le16_to_cpu(hdr->slen);
2275 } else {
2276 struct hci_iso_data_hdr *hdr;
2277
2278 hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE);
2279 if (!hdr) {
2280 BT_ERR("Frame is too short (len %d)", skb->len);
2281 goto drop;
2282 }
2283
2284 len = __le16_to_cpu(hdr->slen);
2285 }
2286
2287 flags = hci_iso_data_flags(len);
2288 len = hci_iso_data_len(len);
2289
2290 BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x", len,
2291 skb->len, flags);
2292
2293 if (len == skb->len) {
2294 /* Complete frame received */
2295 hci_skb_pkt_status(skb) = flags & 0x03;
2296 iso_recv_frame(conn, skb);
2297 return;
2298 }
2299
2300 if (pb == ISO_SINGLE) {
2301 BT_ERR("Frame malformed (len %d, expected len %d)",
2302 skb->len, len);
2303 goto drop;
2304 }
2305
2306 if (skb->len > len) {
2307 BT_ERR("Frame is too long (len %d, expected len %d)",
2308 skb->len, len);
2309 goto drop;
2310 }
2311
2312 /* Allocate skb for the complete frame (with header) */
2313 conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL);
2314 if (!conn->rx_skb)
2315 goto drop;
2316
2317 hci_skb_pkt_status(conn->rx_skb) = flags & 0x03;
2318 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2319 skb->len);
2320 conn->rx_len = len - skb->len;
2321 break;
2322
2323 case ISO_CONT:
2324 BT_DBG("Cont: frag len %d (expecting %d)", skb->len,
2325 conn->rx_len);
2326
2327 if (!conn->rx_len) {
2328 BT_ERR("Unexpected continuation frame (len %d)",
2329 skb->len);
2330 goto drop;
2331 }
2332
2333 if (skb->len > conn->rx_len) {
2334 BT_ERR("Fragment is too long (len %d, expected %d)",
2335 skb->len, conn->rx_len);
2336 kfree_skb(conn->rx_skb);
2337 conn->rx_skb = NULL;
2338 conn->rx_len = 0;
2339 goto drop;
2340 }
2341
2342 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2343 skb->len);
2344 conn->rx_len -= skb->len;
2345 return;
2346
2347 case ISO_END:
2348 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2349 skb->len);
2350 conn->rx_len -= skb->len;
2351
2352 if (!conn->rx_len) {
2353 struct sk_buff *rx_skb = conn->rx_skb;
2354
2355 /* Complete frame received. iso_recv_frame
2356 * takes ownership of the skb so set the global
2357 * rx_skb pointer to NULL first.
2358 */
2359 conn->rx_skb = NULL;
2360 iso_recv_frame(conn, rx_skb);
2361 }
2362 break;
2363 }
2364
2365 drop:
2366 kfree_skb(skb);
2367 }
2368
2369 static struct hci_cb iso_cb = {
2370 .name = "ISO",
2371 .connect_cfm = iso_connect_cfm,
2372 .disconn_cfm = iso_disconn_cfm,
2373 };
2374
iso_debugfs_show(struct seq_file * f,void * p)2375 static int iso_debugfs_show(struct seq_file *f, void *p)
2376 {
2377 struct sock *sk;
2378
2379 read_lock(&iso_sk_list.lock);
2380
2381 sk_for_each(sk, &iso_sk_list.head) {
2382 seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src,
2383 &iso_pi(sk)->dst, sk->sk_state);
2384 }
2385
2386 read_unlock(&iso_sk_list.lock);
2387
2388 return 0;
2389 }
2390
2391 DEFINE_SHOW_ATTRIBUTE(iso_debugfs);
2392
2393 static struct dentry *iso_debugfs;
2394
2395 static const struct proto_ops iso_sock_ops = {
2396 .family = PF_BLUETOOTH,
2397 .owner = THIS_MODULE,
2398 .release = iso_sock_release,
2399 .bind = iso_sock_bind,
2400 .connect = iso_sock_connect,
2401 .listen = iso_sock_listen,
2402 .accept = iso_sock_accept,
2403 .getname = iso_sock_getname,
2404 .sendmsg = iso_sock_sendmsg,
2405 .recvmsg = iso_sock_recvmsg,
2406 .poll = bt_sock_poll,
2407 .ioctl = bt_sock_ioctl,
2408 .mmap = sock_no_mmap,
2409 .socketpair = sock_no_socketpair,
2410 .shutdown = iso_sock_shutdown,
2411 .setsockopt = iso_sock_setsockopt,
2412 .getsockopt = iso_sock_getsockopt
2413 };
2414
2415 static const struct net_proto_family iso_sock_family_ops = {
2416 .family = PF_BLUETOOTH,
2417 .owner = THIS_MODULE,
2418 .create = iso_sock_create,
2419 };
2420
2421 static bool iso_inited;
2422
iso_enabled(void)2423 bool iso_enabled(void)
2424 {
2425 return iso_inited;
2426 }
2427
iso_init(void)2428 int iso_init(void)
2429 {
2430 int err;
2431
2432 BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr));
2433
2434 if (iso_inited)
2435 return -EALREADY;
2436
2437 err = proto_register(&iso_proto, 0);
2438 if (err < 0)
2439 return err;
2440
2441 err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops);
2442 if (err < 0) {
2443 BT_ERR("ISO socket registration failed");
2444 goto error;
2445 }
2446
2447 err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL);
2448 if (err < 0) {
2449 BT_ERR("Failed to create ISO proc file");
2450 bt_sock_unregister(BTPROTO_ISO);
2451 goto error;
2452 }
2453
2454 BT_INFO("ISO socket layer initialized");
2455
2456 hci_register_cb(&iso_cb);
2457
2458 if (!IS_ERR_OR_NULL(bt_debugfs))
2459 iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs,
2460 NULL, &iso_debugfs_fops);
2461
2462 iso_inited = true;
2463
2464 return 0;
2465
2466 error:
2467 proto_unregister(&iso_proto);
2468 return err;
2469 }
2470
iso_exit(void)2471 int iso_exit(void)
2472 {
2473 if (!iso_inited)
2474 return -EALREADY;
2475
2476 bt_procfs_cleanup(&init_net, "iso");
2477
2478 debugfs_remove(iso_debugfs);
2479 iso_debugfs = NULL;
2480
2481 hci_unregister_cb(&iso_cb);
2482
2483 bt_sock_unregister(BTPROTO_ISO);
2484
2485 proto_unregister(&iso_proto);
2486
2487 iso_inited = false;
2488
2489 return 0;
2490 }
2491