xref: /linux/net/bluetooth/iso.c (revision 68993ced0f618e36cf33388f1e50223e5e6e78cc)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * BlueZ - Bluetooth protocol stack for Linux
4  *
5  * Copyright (C) 2022 Intel Corporation
6  * Copyright 2023-2024 NXP
7  */
8 
9 #include <linux/module.h>
10 #include <linux/debugfs.h>
11 #include <linux/seq_file.h>
12 #include <linux/sched/signal.h>
13 
14 #include <net/bluetooth/bluetooth.h>
15 #include <net/bluetooth/hci_core.h>
16 #include <net/bluetooth/iso.h>
17 #include "eir.h"
18 
19 static const struct proto_ops iso_sock_ops;
20 
21 static struct bt_sock_list iso_sk_list = {
22 	.lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock)
23 };
24 
25 /* ---- ISO connections ---- */
26 struct iso_conn {
27 	struct hci_conn	*hcon;
28 
29 	/* @lock: spinlock protecting changes to iso_conn fields */
30 	spinlock_t	lock;
31 	struct sock	*sk;
32 
33 	struct delayed_work	timeout_work;
34 
35 	struct sk_buff	*rx_skb;
36 	__u32		rx_len;
37 	__u16		tx_sn;
38 	struct kref	ref;
39 };
40 
41 #define iso_conn_lock(c)	spin_lock(&(c)->lock)
42 #define iso_conn_unlock(c)	spin_unlock(&(c)->lock)
43 
44 static void iso_sock_close(struct sock *sk);
45 static void iso_sock_kill(struct sock *sk);
46 
47 /* ----- ISO socket info ----- */
48 #define iso_pi(sk) ((struct iso_pinfo *)sk)
49 
50 #define EIR_SERVICE_DATA_LENGTH 4
51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH)
52 #define EIR_BAA_SERVICE_UUID	0x1851
53 
54 /* iso_pinfo flags values */
55 enum {
56 	BT_SK_BIG_SYNC,
57 	BT_SK_PA_SYNC,
58 };
59 
60 struct iso_pinfo {
61 	struct bt_sock		bt;
62 	bdaddr_t		src;
63 	__u8			src_type;
64 	bdaddr_t		dst;
65 	__u8			dst_type;
66 	__u8			bc_sid;
67 	__u8			bc_num_bis;
68 	__u8			bc_bis[ISO_MAX_NUM_BIS];
69 	__u16			sync_handle;
70 	unsigned long		flags;
71 	struct bt_iso_qos	qos;
72 	bool			qos_user_set;
73 	__u8			base_len;
74 	__u8			base[BASE_MAX_LENGTH];
75 	struct iso_conn		*conn;
76 };
77 
78 static struct bt_iso_qos default_qos;
79 
80 static bool check_ucast_qos(struct bt_iso_qos *qos);
81 static bool check_bcast_qos(struct bt_iso_qos *qos);
82 static bool iso_match_sid(struct sock *sk, void *data);
83 static bool iso_match_sid_past(struct sock *sk, void *data);
84 static bool iso_match_sync_handle(struct sock *sk, void *data);
85 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data);
86 static void iso_sock_disconn(struct sock *sk);
87 
88 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data);
89 
90 static struct sock *iso_get_sock(struct hci_dev *hdev, bdaddr_t *src,
91 				 bdaddr_t *dst, enum bt_sock_state state,
92 				 iso_sock_match_t match, void *data);
93 
94 /* ---- ISO timers ---- */
95 #define ISO_CONN_TIMEOUT	secs_to_jiffies(20)
96 #define ISO_DISCONN_TIMEOUT	secs_to_jiffies(2)
97 
iso_conn_free(struct kref * ref)98 static void iso_conn_free(struct kref *ref)
99 {
100 	struct iso_conn *conn = container_of(ref, struct iso_conn, ref);
101 
102 	BT_DBG("conn %p", conn);
103 
104 	if (conn->sk)
105 		iso_pi(conn->sk)->conn = NULL;
106 
107 	if (conn->hcon) {
108 		conn->hcon->iso_data = NULL;
109 		hci_conn_drop(conn->hcon);
110 	}
111 
112 	/* Ensure no more work items will run since hci_conn has been dropped */
113 	disable_delayed_work_sync(&conn->timeout_work);
114 
115 	kfree_skb(conn->rx_skb);
116 
117 	kfree(conn);
118 }
119 
iso_conn_put(struct iso_conn * conn)120 static void iso_conn_put(struct iso_conn *conn)
121 {
122 	if (!conn)
123 		return;
124 
125 	BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref));
126 
127 	kref_put(&conn->ref, iso_conn_free);
128 }
129 
iso_conn_hold_unless_zero(struct iso_conn * conn)130 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn)
131 {
132 	if (!conn)
133 		return NULL;
134 
135 	BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref));
136 
137 	if (!kref_get_unless_zero(&conn->ref))
138 		return NULL;
139 
140 	return conn;
141 }
142 
iso_sock_hold(struct iso_conn * conn)143 static struct sock *iso_sock_hold(struct iso_conn *conn)
144 {
145 	if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk))
146 		return NULL;
147 
148 	sock_hold(conn->sk);
149 
150 	return conn->sk;
151 }
152 
iso_sock_timeout(struct work_struct * work)153 static void iso_sock_timeout(struct work_struct *work)
154 {
155 	struct iso_conn *conn = container_of(work, struct iso_conn,
156 					     timeout_work.work);
157 	struct sock *sk;
158 
159 	conn = iso_conn_hold_unless_zero(conn);
160 	if (!conn)
161 		return;
162 
163 	iso_conn_lock(conn);
164 	sk = iso_sock_hold(conn);
165 	iso_conn_unlock(conn);
166 	iso_conn_put(conn);
167 
168 	if (!sk)
169 		return;
170 
171 	BT_DBG("sock %p state %d", sk, sk->sk_state);
172 
173 	lock_sock(sk);
174 	sk->sk_err = ETIMEDOUT;
175 	sk->sk_state_change(sk);
176 	release_sock(sk);
177 	sock_put(sk);
178 }
179 
iso_sock_set_timer(struct sock * sk,long timeout)180 static void iso_sock_set_timer(struct sock *sk, long timeout)
181 {
182 	if (!iso_pi(sk)->conn)
183 		return;
184 
185 	BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout);
186 	cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
187 	schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout);
188 }
189 
iso_sock_clear_timer(struct sock * sk)190 static void iso_sock_clear_timer(struct sock *sk)
191 {
192 	if (!iso_pi(sk)->conn)
193 		return;
194 
195 	BT_DBG("sock %p state %d", sk, sk->sk_state);
196 	cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
197 }
198 
199 /* ---- ISO connections ---- */
iso_conn_add(struct hci_conn * hcon)200 static struct iso_conn *iso_conn_add(struct hci_conn *hcon)
201 {
202 	struct iso_conn *conn = hcon->iso_data;
203 
204 	conn = iso_conn_hold_unless_zero(conn);
205 	if (conn) {
206 		if (!conn->hcon) {
207 			iso_conn_lock(conn);
208 			conn->hcon = hcon;
209 			iso_conn_unlock(conn);
210 		}
211 		iso_conn_put(conn);
212 		return conn;
213 	}
214 
215 	conn = kzalloc_obj(*conn);
216 	if (!conn)
217 		return NULL;
218 
219 	kref_init(&conn->ref);
220 	spin_lock_init(&conn->lock);
221 	INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout);
222 
223 	hcon->iso_data = conn;
224 	conn->hcon = hcon;
225 	conn->tx_sn = 0;
226 
227 	BT_DBG("hcon %p conn %p", hcon, conn);
228 
229 	return conn;
230 }
231 
232 /* Delete channel. Must be called on the locked socket. */
iso_chan_del(struct sock * sk,int err)233 static void iso_chan_del(struct sock *sk, int err)
234 {
235 	struct iso_conn *conn;
236 	struct sock *parent;
237 
238 	conn = iso_pi(sk)->conn;
239 	iso_pi(sk)->conn = NULL;
240 
241 	BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
242 
243 	if (conn) {
244 		iso_conn_lock(conn);
245 		conn->sk = NULL;
246 		iso_conn_unlock(conn);
247 		iso_conn_put(conn);
248 	}
249 
250 	sk->sk_state = BT_CLOSED;
251 	sk->sk_err   = err;
252 
253 	parent = bt_sk(sk)->parent;
254 	if (parent) {
255 		bt_accept_unlink(sk);
256 		parent->sk_data_ready(parent);
257 	} else {
258 		sk->sk_state_change(sk);
259 	}
260 
261 	sock_set_flag(sk, SOCK_ZAPPED);
262 }
263 
iso_conn_del(struct hci_conn * hcon,int err)264 static void iso_conn_del(struct hci_conn *hcon, int err)
265 {
266 	struct iso_conn *conn = hcon->iso_data;
267 	struct sock *sk;
268 
269 	conn = iso_conn_hold_unless_zero(conn);
270 	if (!conn)
271 		return;
272 
273 	BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
274 
275 	/* Kill socket */
276 	iso_conn_lock(conn);
277 	sk = iso_sock_hold(conn);
278 	iso_conn_unlock(conn);
279 	iso_conn_put(conn);
280 
281 	if (!sk) {
282 		iso_conn_put(conn);
283 		return;
284 	}
285 
286 	lock_sock(sk);
287 	iso_sock_clear_timer(sk);
288 	iso_chan_del(sk, err);
289 	release_sock(sk);
290 	sock_put(sk);
291 }
292 
__iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)293 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk,
294 			  struct sock *parent)
295 {
296 	BT_DBG("conn %p", conn);
297 
298 	if (iso_pi(sk)->conn == conn && conn->sk == sk)
299 		return 0;
300 
301 	if (conn->sk) {
302 		BT_ERR("conn->sk already set");
303 		return -EBUSY;
304 	}
305 
306 	iso_pi(sk)->conn = conn;
307 	conn->sk = sk;
308 
309 	if (parent)
310 		bt_accept_enqueue(parent, sk, true);
311 
312 	return 0;
313 }
314 
iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)315 static int iso_chan_add(struct iso_conn *conn, struct sock *sk,
316 			struct sock *parent)
317 {
318 	int err;
319 
320 	iso_conn_lock(conn);
321 	err = __iso_chan_add(conn, sk, parent);
322 	iso_conn_unlock(conn);
323 
324 	return err;
325 }
326 
le_addr_type(u8 bdaddr_type)327 static inline u8 le_addr_type(u8 bdaddr_type)
328 {
329 	if (bdaddr_type == BDADDR_LE_PUBLIC)
330 		return ADDR_LE_DEV_PUBLIC;
331 	else
332 		return ADDR_LE_DEV_RANDOM;
333 }
334 
iso_connect_bis(struct sock * sk)335 static int iso_connect_bis(struct sock *sk)
336 {
337 	struct iso_conn *conn;
338 	struct hci_conn *hcon;
339 	struct hci_dev  *hdev;
340 	int err;
341 
342 	BT_DBG("%pMR (SID 0x%2.2x)", &iso_pi(sk)->src, iso_pi(sk)->bc_sid);
343 
344 	hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
345 			     iso_pi(sk)->src_type);
346 	if (!hdev)
347 		return -EHOSTUNREACH;
348 
349 	hci_dev_lock(hdev);
350 	lock_sock(sk);
351 
352 	if (!bis_capable(hdev)) {
353 		err = -EOPNOTSUPP;
354 		goto unlock;
355 	}
356 
357 	/* Fail if user set invalid QoS */
358 	if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
359 		iso_pi(sk)->qos = default_qos;
360 		err = -EINVAL;
361 		goto unlock;
362 	}
363 
364 	/* Fail if out PHYs are marked as disabled */
365 	if (!iso_pi(sk)->qos.bcast.out.phys) {
366 		err = -EINVAL;
367 		goto unlock;
368 	}
369 
370 	/* Just bind if DEFER_SETUP has been set */
371 	if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
372 		hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst, iso_pi(sk)->bc_sid,
373 				    &iso_pi(sk)->qos, iso_pi(sk)->base_len,
374 				    iso_pi(sk)->base,
375 				    READ_ONCE(sk->sk_sndtimeo));
376 		if (IS_ERR(hcon)) {
377 			err = PTR_ERR(hcon);
378 			goto unlock;
379 		}
380 	} else {
381 		hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst,
382 				       le_addr_type(iso_pi(sk)->dst_type),
383 				       iso_pi(sk)->bc_sid, &iso_pi(sk)->qos,
384 				       iso_pi(sk)->base_len, iso_pi(sk)->base,
385 				       READ_ONCE(sk->sk_sndtimeo));
386 		if (IS_ERR(hcon)) {
387 			err = PTR_ERR(hcon);
388 			goto unlock;
389 		}
390 
391 		/* Update SID if it was not set */
392 		if (iso_pi(sk)->bc_sid == HCI_SID_INVALID)
393 			iso_pi(sk)->bc_sid = hcon->sid;
394 	}
395 
396 	conn = iso_conn_add(hcon);
397 	if (!conn) {
398 		hci_conn_drop(hcon);
399 		err = -ENOMEM;
400 		goto unlock;
401 	}
402 
403 	err = iso_chan_add(conn, sk, NULL);
404 	if (err)
405 		goto unlock;
406 
407 	/* Update source addr of the socket */
408 	bacpy(&iso_pi(sk)->src, &hcon->src);
409 
410 	if (hcon->state == BT_CONNECTED) {
411 		iso_sock_clear_timer(sk);
412 		sk->sk_state = BT_CONNECTED;
413 	} else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
414 		iso_sock_clear_timer(sk);
415 		sk->sk_state = BT_CONNECT;
416 	} else {
417 		sk->sk_state = BT_CONNECT;
418 		iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo));
419 	}
420 
421 unlock:
422 	release_sock(sk);
423 	hci_dev_unlock(hdev);
424 	hci_dev_put(hdev);
425 	return err;
426 }
427 
iso_connect_cis(struct sock * sk)428 static int iso_connect_cis(struct sock *sk)
429 {
430 	struct iso_conn *conn;
431 	struct hci_conn *hcon;
432 	struct hci_dev  *hdev;
433 	int err;
434 
435 	BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst);
436 
437 	hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
438 			     iso_pi(sk)->src_type);
439 	if (!hdev)
440 		return -EHOSTUNREACH;
441 
442 	hci_dev_lock(hdev);
443 	lock_sock(sk);
444 
445 	if (!cis_central_capable(hdev)) {
446 		err = -EOPNOTSUPP;
447 		goto unlock;
448 	}
449 
450 	/* Fail if user set invalid QoS */
451 	if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) {
452 		iso_pi(sk)->qos = default_qos;
453 		err = -EINVAL;
454 		goto unlock;
455 	}
456 
457 	/* Fail if either PHYs are marked as disabled */
458 	if (!iso_pi(sk)->qos.ucast.in.phys && !iso_pi(sk)->qos.ucast.out.phys) {
459 		err = -EINVAL;
460 		goto unlock;
461 	}
462 
463 	/* Check if there are available buffers for output/TX. */
464 	if (iso_pi(sk)->qos.ucast.out.sdu && !hci_iso_count(hdev) &&
465 	    (hdev->iso_pkts && !hdev->iso_cnt)) {
466 		err = -ENOBUFS;
467 		goto unlock;
468 	}
469 
470 	/* Just bind if DEFER_SETUP has been set */
471 	if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
472 		hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst,
473 				    le_addr_type(iso_pi(sk)->dst_type),
474 				    &iso_pi(sk)->qos,
475 				    READ_ONCE(sk->sk_sndtimeo));
476 		if (IS_ERR(hcon)) {
477 			err = PTR_ERR(hcon);
478 			goto unlock;
479 		}
480 	} else {
481 		hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst,
482 				       le_addr_type(iso_pi(sk)->dst_type),
483 				       &iso_pi(sk)->qos,
484 				       READ_ONCE(sk->sk_sndtimeo));
485 		if (IS_ERR(hcon)) {
486 			err = PTR_ERR(hcon);
487 			goto unlock;
488 		}
489 	}
490 
491 	conn = iso_conn_add(hcon);
492 	if (!conn) {
493 		hci_conn_drop(hcon);
494 		err = -ENOMEM;
495 		goto unlock;
496 	}
497 
498 	err = iso_chan_add(conn, sk, NULL);
499 	if (err)
500 		goto unlock;
501 
502 	/* Update source addr of the socket */
503 	bacpy(&iso_pi(sk)->src, &hcon->src);
504 
505 	if (hcon->state == BT_CONNECTED) {
506 		iso_sock_clear_timer(sk);
507 		sk->sk_state = BT_CONNECTED;
508 	} else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
509 		iso_sock_clear_timer(sk);
510 		sk->sk_state = BT_CONNECT;
511 	} else {
512 		sk->sk_state = BT_CONNECT;
513 		iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo));
514 	}
515 
516 unlock:
517 	release_sock(sk);
518 	hci_dev_unlock(hdev);
519 	hci_dev_put(hdev);
520 	return err;
521 }
522 
iso_sock_get_qos(struct sock * sk)523 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk)
524 {
525 	if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2)
526 		return &iso_pi(sk)->conn->hcon->iso_qos;
527 
528 	return &iso_pi(sk)->qos;
529 }
530 
iso_send_frame(struct sock * sk,struct sk_buff * skb,const struct sockcm_cookie * sockc)531 static int iso_send_frame(struct sock *sk, struct sk_buff *skb,
532 			  const struct sockcm_cookie *sockc)
533 {
534 	struct iso_conn *conn = iso_pi(sk)->conn;
535 	struct bt_iso_qos *qos = iso_sock_get_qos(sk);
536 	struct hci_iso_data_hdr *hdr;
537 	int len = 0;
538 
539 	BT_DBG("sk %p len %d", sk, skb->len);
540 
541 	if (skb->len > qos->ucast.out.sdu)
542 		return -EMSGSIZE;
543 
544 	len = skb->len;
545 
546 	/* Push ISO data header */
547 	hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE);
548 	hdr->sn = cpu_to_le16(conn->tx_sn++);
549 	hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len,
550 						      HCI_ISO_STATUS_VALID));
551 
552 	if (sk->sk_state == BT_CONNECTED) {
553 		hci_setup_tx_timestamp(skb, 1, sockc);
554 		hci_send_iso(conn->hcon, skb);
555 	} else {
556 		len = -ENOTCONN;
557 	}
558 
559 	return len;
560 }
561 
iso_recv_frame(struct iso_conn * conn,struct sk_buff * skb)562 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb)
563 {
564 	struct sock *sk;
565 
566 	iso_conn_lock(conn);
567 	sk = conn->sk;
568 	iso_conn_unlock(conn);
569 
570 	if (!sk)
571 		goto drop;
572 
573 	BT_DBG("sk %p len %d", sk, skb->len);
574 
575 	if (sk->sk_state != BT_CONNECTED)
576 		goto drop;
577 
578 	if (!sock_queue_rcv_skb(sk, skb))
579 		return;
580 
581 drop:
582 	kfree_skb(skb);
583 }
584 
585 /* -------- Socket interface ---------- */
__iso_get_sock_listen_by_addr(bdaddr_t * src,bdaddr_t * dst)586 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst)
587 {
588 	struct sock *sk;
589 
590 	sk_for_each(sk, &iso_sk_list.head) {
591 		if (sk->sk_state != BT_LISTEN)
592 			continue;
593 
594 		if (bacmp(&iso_pi(sk)->dst, dst))
595 			continue;
596 
597 		if (!bacmp(&iso_pi(sk)->src, src))
598 			return sk;
599 	}
600 
601 	return NULL;
602 }
603 
__iso_get_sock_listen_by_sid(bdaddr_t * ba,bdaddr_t * bc,__u8 sid)604 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc,
605 						 __u8 sid)
606 {
607 	struct sock *sk;
608 
609 	sk_for_each(sk, &iso_sk_list.head) {
610 		if (sk->sk_state != BT_LISTEN)
611 			continue;
612 
613 		if (bacmp(&iso_pi(sk)->src, ba))
614 			continue;
615 
616 		if (bacmp(&iso_pi(sk)->dst, bc))
617 			continue;
618 
619 		if (iso_pi(sk)->bc_sid == sid)
620 			return sk;
621 	}
622 
623 	return NULL;
624 }
625 
626 /* Find socket in given state:
627  * source bdaddr (Unicast)
628  * destination bdaddr (Broadcast only)
629  * match func - pass NULL to ignore
630  * match func data - pass -1 to ignore
631  * Returns closest match.
632  */
iso_get_sock(struct hci_dev * hdev,bdaddr_t * src,bdaddr_t * dst,enum bt_sock_state state,iso_sock_match_t match,void * data)633 static struct sock *iso_get_sock(struct hci_dev *hdev, bdaddr_t *src,
634 				 bdaddr_t *dst, enum bt_sock_state state,
635 				 iso_sock_match_t match, void *data)
636 {
637 	struct sock *sk = NULL, *sk1 = NULL;
638 
639 	read_lock(&iso_sk_list.lock);
640 
641 	sk_for_each(sk, &iso_sk_list.head) {
642 		if (sk->sk_state != state)
643 			continue;
644 
645 		/* Match Broadcast destination */
646 		if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst)) {
647 			struct smp_irk *irk1, *irk2;
648 
649 			/* Check if destination is an RPA that we can resolve */
650 			irk1 = hci_find_irk_by_rpa(hdev, dst);
651 			if (!irk1)
652 				continue;
653 
654 			/* Match with identity address */
655 			if (bacmp(&iso_pi(sk)->dst, &irk1->bdaddr)) {
656 				/* Check if socket destination address is also
657 				 * an RPA and if the IRK matches.
658 				 */
659 				irk2 = hci_find_irk_by_rpa(hdev,
660 							   &iso_pi(sk)->dst);
661 				if (!irk2 || irk1 != irk2)
662 					continue;
663 			}
664 		}
665 
666 		/* Use Match function if provided */
667 		if (match && !match(sk, data))
668 			continue;
669 
670 		/* Exact match. */
671 		if (!bacmp(&iso_pi(sk)->src, src)) {
672 			sock_hold(sk);
673 			break;
674 		}
675 
676 		/* Closest match */
677 		if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) {
678 			if (sk1)
679 				sock_put(sk1);
680 
681 			sk1 = sk;
682 			sock_hold(sk1);
683 		}
684 	}
685 
686 	if (sk && sk1)
687 		sock_put(sk1);
688 
689 	read_unlock(&iso_sk_list.lock);
690 
691 	return sk ? sk : sk1;
692 }
693 
iso_get_sock_big(struct sock * match_sk,bdaddr_t * src,bdaddr_t * dst,uint8_t big)694 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src,
695 				     bdaddr_t *dst, uint8_t big)
696 {
697 	struct sock *sk = NULL;
698 
699 	read_lock(&iso_sk_list.lock);
700 
701 	sk_for_each(sk, &iso_sk_list.head) {
702 		if (match_sk == sk)
703 			continue;
704 
705 		/* Look for sockets that have already been
706 		 * connected to the BIG
707 		 */
708 		if (sk->sk_state != BT_CONNECTED &&
709 		    sk->sk_state != BT_CONNECT)
710 			continue;
711 
712 		/* Match Broadcast destination */
713 		if (bacmp(&iso_pi(sk)->dst, dst))
714 			continue;
715 
716 		/* Match BIG handle */
717 		if (iso_pi(sk)->qos.bcast.big != big)
718 			continue;
719 
720 		/* Match source address */
721 		if (bacmp(&iso_pi(sk)->src, src))
722 			continue;
723 
724 		sock_hold(sk);
725 		break;
726 	}
727 
728 	read_unlock(&iso_sk_list.lock);
729 
730 	return sk;
731 }
732 
iso_sock_destruct(struct sock * sk)733 static void iso_sock_destruct(struct sock *sk)
734 {
735 	BT_DBG("sk %p", sk);
736 
737 	iso_conn_put(iso_pi(sk)->conn);
738 
739 	skb_queue_purge(&sk->sk_receive_queue);
740 	skb_queue_purge(&sk->sk_write_queue);
741 	skb_queue_purge(&sk->sk_error_queue);
742 }
743 
iso_sock_cleanup_listen(struct sock * parent)744 static void iso_sock_cleanup_listen(struct sock *parent)
745 {
746 	struct sock *sk;
747 
748 	BT_DBG("parent %p", parent);
749 
750 	/* Close not yet accepted channels */
751 	while ((sk = bt_accept_dequeue(parent, NULL))) {
752 		iso_sock_close(sk);
753 		iso_sock_kill(sk);
754 		/* Drop the reference handed back by bt_accept_dequeue(). */
755 		sock_put(sk);
756 	}
757 
758 	/* If listening socket has a hcon, properly disconnect it */
759 	if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) {
760 		iso_sock_disconn(parent);
761 		return;
762 	}
763 
764 	parent->sk_state  = BT_CLOSED;
765 	sock_set_flag(parent, SOCK_ZAPPED);
766 }
767 
768 /* Kill socket (only if zapped and orphan)
769  * Must be called on unlocked socket.
770  */
iso_sock_kill(struct sock * sk)771 static void iso_sock_kill(struct sock *sk)
772 {
773 	if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket ||
774 	    sock_flag(sk, SOCK_DEAD))
775 		return;
776 
777 	BT_DBG("sk %p state %d", sk, sk->sk_state);
778 
779 	/* Sock is dead, so set conn->sk to NULL to avoid possible UAF */
780 	if (iso_pi(sk)->conn) {
781 		iso_conn_lock(iso_pi(sk)->conn);
782 		iso_pi(sk)->conn->sk = NULL;
783 		iso_conn_unlock(iso_pi(sk)->conn);
784 	}
785 
786 	/* Kill poor orphan */
787 	bt_sock_unlink(&iso_sk_list, sk);
788 	sock_set_flag(sk, SOCK_DEAD);
789 	sock_put(sk);
790 }
791 
iso_sock_disconn(struct sock * sk)792 static void iso_sock_disconn(struct sock *sk)
793 {
794 	struct sock *bis_sk;
795 	struct hci_conn *hcon = iso_pi(sk)->conn->hcon;
796 
797 	if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) {
798 		bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src,
799 					  &iso_pi(sk)->dst,
800 					  iso_pi(sk)->qos.bcast.big);
801 
802 		/* If there are any other connected sockets for the
803 		 * same BIG, just delete the sk and leave the bis
804 		 * hcon active, in case later rebinding is needed.
805 		 */
806 		if (bis_sk) {
807 			hcon->state = BT_OPEN;
808 			hcon->iso_data = NULL;
809 			iso_pi(sk)->conn->hcon = NULL;
810 			iso_sock_clear_timer(sk);
811 			iso_chan_del(sk, bt_to_errno(hcon->abort_reason));
812 			sock_put(bis_sk);
813 			return;
814 		}
815 	}
816 
817 	sk->sk_state = BT_DISCONN;
818 	iso_conn_lock(iso_pi(sk)->conn);
819 	hci_conn_drop(iso_pi(sk)->conn->hcon);
820 	iso_pi(sk)->conn->hcon = NULL;
821 	iso_conn_unlock(iso_pi(sk)->conn);
822 }
823 
__iso_sock_close(struct sock * sk)824 static void __iso_sock_close(struct sock *sk)
825 {
826 	BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
827 
828 	switch (sk->sk_state) {
829 	case BT_LISTEN:
830 		iso_sock_cleanup_listen(sk);
831 		break;
832 
833 	case BT_CONNECT:
834 	case BT_CONNECTED:
835 	case BT_CONFIG:
836 		if (iso_pi(sk)->conn->hcon)
837 			iso_sock_disconn(sk);
838 		else
839 			iso_chan_del(sk, ECONNRESET);
840 		break;
841 
842 	case BT_CONNECT2:
843 		if (iso_pi(sk)->conn->hcon &&
844 		    (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) ||
845 		    test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags)))
846 			iso_sock_disconn(sk);
847 		else
848 			iso_chan_del(sk, ECONNRESET);
849 		break;
850 	case BT_DISCONN:
851 		iso_chan_del(sk, ECONNRESET);
852 		break;
853 
854 	default:
855 		sock_set_flag(sk, SOCK_ZAPPED);
856 		break;
857 	}
858 }
859 
860 /* Must be called on unlocked socket. */
iso_sock_close(struct sock * sk)861 static void iso_sock_close(struct sock *sk)
862 {
863 	iso_sock_clear_timer(sk);
864 	lock_sock(sk);
865 	__iso_sock_close(sk);
866 	release_sock(sk);
867 	iso_sock_kill(sk);
868 }
869 
iso_sock_init(struct sock * sk,struct sock * parent)870 static void iso_sock_init(struct sock *sk, struct sock *parent)
871 {
872 	BT_DBG("sk %p", sk);
873 
874 	if (parent) {
875 		sk->sk_type = parent->sk_type;
876 		bt_sk(sk)->flags = bt_sk(parent)->flags;
877 		security_sk_clone(parent, sk);
878 	}
879 }
880 
881 static struct proto iso_proto = {
882 	.name		= "ISO",
883 	.owner		= THIS_MODULE,
884 	.obj_size	= sizeof(struct iso_pinfo)
885 };
886 
887 #define DEFAULT_IO_QOS \
888 { \
889 	.interval	= 10000u, \
890 	.latency	= 10u, \
891 	.sdu		= 40u, \
892 	.phys		= BT_ISO_PHY_2M, \
893 	.rtn		= 2u, \
894 }
895 
896 static struct bt_iso_qos default_qos = {
897 	.bcast = {
898 		.big			= BT_ISO_QOS_BIG_UNSET,
899 		.bis			= BT_ISO_QOS_BIS_UNSET,
900 		.sync_factor		= 0x01,
901 		.packing		= 0x00,
902 		.framing		= 0x00,
903 		.in			= DEFAULT_IO_QOS,
904 		.out			= DEFAULT_IO_QOS,
905 		.encryption		= 0x00,
906 		.bcode			= {0x00},
907 		.options		= 0x00,
908 		.skip			= 0x0000,
909 		.sync_timeout		= BT_ISO_SYNC_TIMEOUT,
910 		.sync_cte_type		= 0x00,
911 		.mse			= 0x00,
912 		.timeout		= BT_ISO_SYNC_TIMEOUT,
913 	},
914 };
915 
iso_sock_alloc(struct net * net,struct socket * sock,int proto,gfp_t prio,int kern)916 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock,
917 				   int proto, gfp_t prio, int kern)
918 {
919 	struct sock *sk;
920 
921 	sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern);
922 	if (!sk)
923 		return NULL;
924 
925 	sk->sk_destruct = iso_sock_destruct;
926 	sk->sk_sndtimeo = ISO_CONN_TIMEOUT;
927 
928 	/* Set address type as public as default src address is BDADDR_ANY */
929 	iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
930 
931 	iso_pi(sk)->qos = default_qos;
932 	iso_pi(sk)->sync_handle = -1;
933 
934 	bt_sock_link(&iso_sk_list, sk);
935 	return sk;
936 }
937 
iso_sock_create(struct net * net,struct socket * sock,int protocol,int kern)938 static int iso_sock_create(struct net *net, struct socket *sock, int protocol,
939 			   int kern)
940 {
941 	struct sock *sk;
942 
943 	BT_DBG("sock %p", sock);
944 
945 	sock->state = SS_UNCONNECTED;
946 
947 	if (sock->type != SOCK_SEQPACKET)
948 		return -ESOCKTNOSUPPORT;
949 
950 	sock->ops = &iso_sock_ops;
951 
952 	sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
953 	if (!sk)
954 		return -ENOMEM;
955 
956 	iso_sock_init(sk, NULL);
957 	return 0;
958 }
959 
iso_sock_bind_bc(struct socket * sock,struct sockaddr_unsized * addr,int addr_len)960 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr_unsized *addr,
961 			    int addr_len)
962 {
963 	struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
964 	struct sock *sk = sock->sk;
965 	int i;
966 
967 	BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid,
968 	       sa->iso_bc->bc_num_bis);
969 
970 	if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc))
971 		return -EINVAL;
972 
973 	bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr);
974 
975 	/* Check if the address type is of LE type */
976 	if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type))
977 		return -EINVAL;
978 
979 	iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type;
980 
981 	if (sa->iso_bc->bc_sid > 0x0f && sa->iso_bc->bc_sid != HCI_SID_INVALID)
982 		return -EINVAL;
983 
984 	iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid;
985 
986 	if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS)
987 		return -EINVAL;
988 
989 	iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
990 
991 	for (i = 0; i < iso_pi(sk)->bc_num_bis; i++)
992 		if (sa->iso_bc->bc_bis[i] < 0x01 ||
993 		    sa->iso_bc->bc_bis[i] > 0x1f)
994 			return -EINVAL;
995 
996 	memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
997 	       iso_pi(sk)->bc_num_bis);
998 
999 	return 0;
1000 }
1001 
1002 /* Must be called on the locked socket. */
iso_sock_rebind_bis(struct sock * sk,struct sockaddr_iso * sa,int addr_len)1003 static int iso_sock_rebind_bis(struct sock *sk, struct sockaddr_iso *sa,
1004 			       int addr_len)
1005 {
1006 	int err = 0;
1007 
1008 	if (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags))
1009 		return -EBADFD;
1010 
1011 	if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) {
1012 		err = -EINVAL;
1013 		goto done;
1014 	}
1015 
1016 	iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
1017 
1018 	for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++)
1019 		if (sa->iso_bc->bc_bis[i] < 0x01 ||
1020 		    sa->iso_bc->bc_bis[i] > 0x1f) {
1021 			err = -EINVAL;
1022 			goto done;
1023 		}
1024 
1025 	memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
1026 	       iso_pi(sk)->bc_num_bis);
1027 
1028 done:
1029 	return err;
1030 }
1031 
iso_conn_get_hdev(struct iso_conn * conn)1032 static struct hci_dev *iso_conn_get_hdev(struct iso_conn *conn)
1033 {
1034 	struct hci_dev *hdev = NULL;
1035 
1036 	iso_conn_lock(conn);
1037 	if (conn->hcon)
1038 		hdev = hci_dev_hold(conn->hcon->hdev);
1039 	iso_conn_unlock(conn);
1040 
1041 	return hdev;
1042 }
1043 
1044 /* Must be called on the locked socket. */
iso_sock_rebind_bc(struct sock * sk,struct sockaddr_iso * sa,int addr_len)1045 static int iso_sock_rebind_bc(struct sock *sk, struct sockaddr_iso *sa,
1046 			      int addr_len)
1047 {
1048 	struct hci_dev *hdev;
1049 	struct hci_conn *bis;
1050 	int err;
1051 
1052 	if (sk->sk_type != SOCK_SEQPACKET || !iso_pi(sk)->conn)
1053 		return -EINVAL;
1054 
1055 	/* Check if it is really a Broadcast address being requested */
1056 	if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc))
1057 		return -EINVAL;
1058 
1059 	/* Check if the address hasn't changed then perhaps only the number of
1060 	 * bis has changed.
1061 	 */
1062 	if (!bacmp(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr) ||
1063 	    !bacmp(&sa->iso_bc->bc_bdaddr, BDADDR_ANY))
1064 		return iso_sock_rebind_bis(sk, sa, addr_len);
1065 
1066 	/* Check if the address type is of LE type */
1067 	if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type))
1068 		return -EINVAL;
1069 
1070 	hdev = iso_conn_get_hdev(iso_pi(sk)->conn);
1071 	if (!hdev)
1072 		return -EINVAL;
1073 
1074 	bis = iso_pi(sk)->conn->hcon;
1075 
1076 	/* Release the socket before lookups since that requires hci_dev_lock
1077 	 * which shall not be acquired while holding sock_lock for proper
1078 	 * ordering.
1079 	 */
1080 	release_sock(sk);
1081 	hci_dev_lock(bis->hdev);
1082 	lock_sock(sk);
1083 
1084 	if (!iso_pi(sk)->conn || iso_pi(sk)->conn->hcon != bis) {
1085 		/* raced with iso_conn_del() or iso_disconn_sock() */
1086 		err = -ENOTCONN;
1087 		goto unlock;
1088 	}
1089 
1090 	BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bc->bc_bdaddr,
1091 	       sa->iso_bc->bc_bdaddr_type);
1092 
1093 	err = hci_past_bis(bis, &sa->iso_bc->bc_bdaddr,
1094 			   le_addr_type(sa->iso_bc->bc_bdaddr_type));
1095 
1096 unlock:
1097 	hci_dev_unlock(hdev);
1098 	hci_dev_put(hdev);
1099 
1100 	return err;
1101 }
1102 
iso_sock_bind(struct socket * sock,struct sockaddr_unsized * addr,int addr_len)1103 static int iso_sock_bind(struct socket *sock, struct sockaddr_unsized *addr,
1104 			 int addr_len)
1105 {
1106 	struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1107 	struct sock *sk = sock->sk;
1108 	int err = 0;
1109 
1110 	BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type);
1111 
1112 	if (!addr || addr_len < sizeof(struct sockaddr_iso) ||
1113 	    addr->sa_family != AF_BLUETOOTH)
1114 		return -EINVAL;
1115 
1116 	lock_sock(sk);
1117 
1118 	if ((sk->sk_state == BT_CONNECT2 || sk->sk_state == BT_CONNECTED) &&
1119 	    addr_len > sizeof(*sa)) {
1120 		/* Allow the user to rebind to a different address using
1121 		 * PAST procedures.
1122 		 */
1123 		err = iso_sock_rebind_bc(sk, sa, addr_len);
1124 		goto done;
1125 	}
1126 
1127 	if (sk->sk_state != BT_OPEN) {
1128 		err = -EBADFD;
1129 		goto done;
1130 	}
1131 
1132 	if (sk->sk_type != SOCK_SEQPACKET) {
1133 		err = -EINVAL;
1134 		goto done;
1135 	}
1136 
1137 	/* Check if the address type is of LE type */
1138 	if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) {
1139 		err = -EINVAL;
1140 		goto done;
1141 	}
1142 
1143 	bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr);
1144 	iso_pi(sk)->src_type = sa->iso_bdaddr_type;
1145 
1146 	/* Check for Broadcast address */
1147 	if (addr_len > sizeof(*sa)) {
1148 		err = iso_sock_bind_bc(sock, addr, addr_len);
1149 		if (err)
1150 			goto done;
1151 	}
1152 
1153 	sk->sk_state = BT_BOUND;
1154 
1155 done:
1156 	release_sock(sk);
1157 	return err;
1158 }
1159 
iso_sock_connect(struct socket * sock,struct sockaddr_unsized * addr,int alen,int flags)1160 static int iso_sock_connect(struct socket *sock, struct sockaddr_unsized *addr,
1161 			    int alen, int flags)
1162 {
1163 	struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1164 	struct sock *sk = sock->sk;
1165 	int err;
1166 
1167 	BT_DBG("sk %p", sk);
1168 
1169 	if (alen < sizeof(struct sockaddr_iso) ||
1170 	    addr->sa_family != AF_BLUETOOTH)
1171 		return -EINVAL;
1172 
1173 	if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND)
1174 		return -EBADFD;
1175 
1176 	if (sk->sk_type != SOCK_SEQPACKET)
1177 		return -EINVAL;
1178 
1179 	/* Check if the address type is of LE type */
1180 	if (!bdaddr_type_is_le(sa->iso_bdaddr_type))
1181 		return -EINVAL;
1182 
1183 	lock_sock(sk);
1184 
1185 	bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr);
1186 	iso_pi(sk)->dst_type = sa->iso_bdaddr_type;
1187 
1188 	release_sock(sk);
1189 
1190 	if (bacmp(&sa->iso_bdaddr, BDADDR_ANY))
1191 		err = iso_connect_cis(sk);
1192 	else
1193 		err = iso_connect_bis(sk);
1194 
1195 	if (err)
1196 		return err;
1197 
1198 	lock_sock(sk);
1199 
1200 	if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1201 		err = bt_sock_wait_state(sk, BT_CONNECTED,
1202 					 sock_sndtimeo(sk, flags & O_NONBLOCK));
1203 	}
1204 
1205 	release_sock(sk);
1206 	return err;
1207 }
1208 
iso_listen_bis(struct sock * sk)1209 static int iso_listen_bis(struct sock *sk)
1210 {
1211 	struct hci_dev *hdev;
1212 	int err = 0;
1213 	struct iso_conn *conn;
1214 	struct hci_conn *hcon;
1215 
1216 	BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src,
1217 	       &iso_pi(sk)->dst, iso_pi(sk)->bc_sid);
1218 
1219 	write_lock(&iso_sk_list.lock);
1220 
1221 	if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst,
1222 					 iso_pi(sk)->bc_sid))
1223 		err = -EADDRINUSE;
1224 
1225 	write_unlock(&iso_sk_list.lock);
1226 
1227 	if (err)
1228 		return err;
1229 
1230 	hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1231 			     iso_pi(sk)->src_type);
1232 	if (!hdev)
1233 		return -EHOSTUNREACH;
1234 
1235 	hci_dev_lock(hdev);
1236 	lock_sock(sk);
1237 
1238 	/* Fail if user set invalid QoS */
1239 	if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
1240 		iso_pi(sk)->qos = default_qos;
1241 		err = -EINVAL;
1242 		goto unlock;
1243 	}
1244 
1245 	hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst,
1246 				  le_addr_type(iso_pi(sk)->dst_type),
1247 				  iso_pi(sk)->bc_sid, &iso_pi(sk)->qos);
1248 	if (IS_ERR(hcon)) {
1249 		err = PTR_ERR(hcon);
1250 		goto unlock;
1251 	}
1252 
1253 	conn = iso_conn_add(hcon);
1254 	if (!conn) {
1255 		hci_conn_drop(hcon);
1256 		err = -ENOMEM;
1257 		goto unlock;
1258 	}
1259 
1260 	err = iso_chan_add(conn, sk, NULL);
1261 	if (err) {
1262 		hci_conn_drop(hcon);
1263 		goto unlock;
1264 	}
1265 
1266 unlock:
1267 	release_sock(sk);
1268 	hci_dev_unlock(hdev);
1269 	hci_dev_put(hdev);
1270 	return err;
1271 }
1272 
iso_listen_cis(struct sock * sk)1273 static int iso_listen_cis(struct sock *sk)
1274 {
1275 	int err = 0;
1276 
1277 	BT_DBG("%pMR", &iso_pi(sk)->src);
1278 
1279 	write_lock(&iso_sk_list.lock);
1280 
1281 	if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst))
1282 		err = -EADDRINUSE;
1283 
1284 	write_unlock(&iso_sk_list.lock);
1285 
1286 	return err;
1287 }
1288 
iso_sock_listen(struct socket * sock,int backlog)1289 static int iso_sock_listen(struct socket *sock, int backlog)
1290 {
1291 	struct sock *sk = sock->sk;
1292 	int err = 0;
1293 
1294 	BT_DBG("sk %p backlog %d", sk, backlog);
1295 
1296 	sock_hold(sk);
1297 	lock_sock(sk);
1298 
1299 	if (sk->sk_state != BT_BOUND) {
1300 		err = -EBADFD;
1301 		goto done;
1302 	}
1303 
1304 	if (sk->sk_type != SOCK_SEQPACKET) {
1305 		err = -EINVAL;
1306 		goto done;
1307 	}
1308 
1309 	if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1310 		err = iso_listen_cis(sk);
1311 	} else {
1312 		/* Drop sock lock to avoid potential
1313 		 * deadlock with the hdev lock.
1314 		 */
1315 		release_sock(sk);
1316 		err = iso_listen_bis(sk);
1317 		lock_sock(sk);
1318 	}
1319 
1320 	if (err)
1321 		goto done;
1322 
1323 	sk->sk_max_ack_backlog = backlog;
1324 	sk->sk_ack_backlog = 0;
1325 
1326 	sk->sk_state = BT_LISTEN;
1327 
1328 done:
1329 	release_sock(sk);
1330 	sock_put(sk);
1331 	return err;
1332 }
1333 
iso_sock_accept(struct socket * sock,struct socket * newsock,struct proto_accept_arg * arg)1334 static int iso_sock_accept(struct socket *sock, struct socket *newsock,
1335 			   struct proto_accept_arg *arg)
1336 {
1337 	DEFINE_WAIT_FUNC(wait, woken_wake_function);
1338 	struct sock *sk = sock->sk, *ch;
1339 	long timeo;
1340 	int err = 0;
1341 
1342 	/* Use explicit nested locking to avoid lockdep warnings generated
1343 	 * because the parent socket and the child socket are locked on the
1344 	 * same thread.
1345 	 */
1346 	lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1347 
1348 	timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK);
1349 
1350 	BT_DBG("sk %p timeo %ld", sk, timeo);
1351 
1352 	/* Wait for an incoming connection. (wake-one). */
1353 	add_wait_queue_exclusive(sk_sleep(sk), &wait);
1354 	while (1) {
1355 		if (sk->sk_state != BT_LISTEN) {
1356 			err = -EBADFD;
1357 			break;
1358 		}
1359 
1360 		ch = bt_accept_dequeue(sk, newsock);
1361 		if (ch) {
1362 			/* Drop the bridging ref from bt_accept_dequeue();
1363 			 * the grafted socket keeps ch alive from here.
1364 			 */
1365 			sock_put(ch);
1366 			break;
1367 		}
1368 
1369 		if (!timeo) {
1370 			err = -EAGAIN;
1371 			break;
1372 		}
1373 
1374 		if (signal_pending(current)) {
1375 			err = sock_intr_errno(timeo);
1376 			break;
1377 		}
1378 
1379 		release_sock(sk);
1380 
1381 		timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
1382 		lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1383 	}
1384 	remove_wait_queue(sk_sleep(sk), &wait);
1385 
1386 	if (err)
1387 		goto done;
1388 
1389 	newsock->state = SS_CONNECTED;
1390 
1391 	BT_DBG("new socket %p", ch);
1392 
1393 	/* A Broadcast Sink might require BIG sync to be terminated
1394 	 * and re-established multiple times, while keeping the same
1395 	 * PA sync handle active. To allow this, once all BIS
1396 	 * connections have been accepted on a PA sync parent socket,
1397 	 * "reset" socket state, to allow future BIG re-sync procedures.
1398 	 */
1399 	if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1400 		/* Iterate through the list of bound BIS indices
1401 		 * and clear each BIS as they are accepted by the
1402 		 * user space, one by one.
1403 		 */
1404 		for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) {
1405 			if (iso_pi(sk)->bc_bis[i] > 0) {
1406 				iso_pi(sk)->bc_bis[i] = 0;
1407 				iso_pi(sk)->bc_num_bis--;
1408 				break;
1409 			}
1410 		}
1411 
1412 		if (iso_pi(sk)->bc_num_bis == 0) {
1413 			/* Once the last BIS was accepted, reset parent
1414 			 * socket parameters to mark that the listening
1415 			 * process for BIS connections has been completed:
1416 			 *
1417 			 * 1. Reset the DEFER setup flag on the parent sk.
1418 			 * 2. Clear the flag marking that the BIG create
1419 			 *    sync command is pending.
1420 			 * 3. Transition socket state from BT_LISTEN to
1421 			 *    BT_CONNECTED.
1422 			 */
1423 			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1424 			clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags);
1425 			sk->sk_state = BT_CONNECTED;
1426 		}
1427 	}
1428 
1429 done:
1430 	release_sock(sk);
1431 	return err;
1432 }
1433 
iso_sock_getname(struct socket * sock,struct sockaddr * addr,int peer)1434 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr,
1435 			    int peer)
1436 {
1437 	struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1438 	struct sock *sk = sock->sk;
1439 	int len = sizeof(struct sockaddr_iso);
1440 
1441 	BT_DBG("sock %p, sk %p", sock, sk);
1442 
1443 	addr->sa_family = AF_BLUETOOTH;
1444 
1445 	if (peer) {
1446 		struct hci_conn *hcon = iso_pi(sk)->conn ?
1447 					iso_pi(sk)->conn->hcon : NULL;
1448 
1449 		bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst);
1450 		sa->iso_bdaddr_type = iso_pi(sk)->dst_type;
1451 
1452 		if (hcon && (hcon->type == BIS_LINK || hcon->type == PA_LINK)) {
1453 			sa->iso_bc->bc_sid = iso_pi(sk)->bc_sid;
1454 			sa->iso_bc->bc_num_bis = iso_pi(sk)->bc_num_bis;
1455 			memcpy(sa->iso_bc->bc_bis, iso_pi(sk)->bc_bis,
1456 			       ISO_MAX_NUM_BIS);
1457 			len += sizeof(struct sockaddr_iso_bc);
1458 		}
1459 	} else {
1460 		bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src);
1461 		sa->iso_bdaddr_type = iso_pi(sk)->src_type;
1462 	}
1463 
1464 	return len;
1465 }
1466 
iso_sock_sendmsg(struct socket * sock,struct msghdr * msg,size_t len)1467 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg,
1468 			    size_t len)
1469 {
1470 	struct sock *sk = sock->sk;
1471 	struct sk_buff *skb, **frag;
1472 	struct sockcm_cookie sockc;
1473 	size_t mtu;
1474 	int err;
1475 
1476 	BT_DBG("sock %p, sk %p", sock, sk);
1477 
1478 	err = sock_error(sk);
1479 	if (err)
1480 		return err;
1481 
1482 	if (msg->msg_flags & MSG_OOB)
1483 		return -EOPNOTSUPP;
1484 
1485 	hci_sockcm_init(&sockc, sk);
1486 
1487 	if (msg->msg_controllen) {
1488 		err = sock_cmsg_send(sk, msg, &sockc);
1489 		if (err)
1490 			return err;
1491 	}
1492 
1493 	lock_sock(sk);
1494 
1495 	if (sk->sk_state != BT_CONNECTED) {
1496 		release_sock(sk);
1497 		return -ENOTCONN;
1498 	}
1499 
1500 	mtu = iso_pi(sk)->conn->hcon->mtu;
1501 
1502 	release_sock(sk);
1503 
1504 	skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0);
1505 	if (IS_ERR(skb))
1506 		return PTR_ERR(skb);
1507 
1508 	len -= skb->len;
1509 
1510 	BT_DBG("skb %p len %d", sk, skb->len);
1511 
1512 	/* Continuation fragments */
1513 	frag = &skb_shinfo(skb)->frag_list;
1514 	while (len) {
1515 		struct sk_buff *tmp;
1516 
1517 		tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0);
1518 		if (IS_ERR(tmp)) {
1519 			kfree_skb(skb);
1520 			return PTR_ERR(tmp);
1521 		}
1522 
1523 		*frag = tmp;
1524 
1525 		len  -= tmp->len;
1526 
1527 		skb->len += tmp->len;
1528 		skb->data_len += tmp->len;
1529 
1530 		BT_DBG("frag %p len %d", *frag, tmp->len);
1531 
1532 		frag = &(*frag)->next;
1533 	}
1534 
1535 	lock_sock(sk);
1536 
1537 	if (sk->sk_state == BT_CONNECTED)
1538 		err = iso_send_frame(sk, skb, &sockc);
1539 	else
1540 		err = -ENOTCONN;
1541 
1542 	release_sock(sk);
1543 
1544 	if (err < 0)
1545 		kfree_skb(skb);
1546 	return err;
1547 }
1548 
iso_conn_defer_accept(struct hci_conn * conn)1549 static void iso_conn_defer_accept(struct hci_conn *conn)
1550 {
1551 	struct hci_cp_le_accept_cis cp;
1552 	struct hci_dev *hdev = conn->hdev;
1553 
1554 	BT_DBG("conn %p", conn);
1555 
1556 	conn->state = BT_CONFIG;
1557 
1558 	cp.handle = cpu_to_le16(conn->handle);
1559 
1560 	hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp);
1561 }
1562 
iso_conn_big_sync(struct sock * sk)1563 static void iso_conn_big_sync(struct sock *sk)
1564 {
1565 	int err;
1566 	struct hci_dev *hdev;
1567 
1568 	hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1569 			     iso_pi(sk)->src_type);
1570 
1571 	if (!hdev)
1572 		return;
1573 
1574 	/* hci_le_big_create_sync requires hdev lock to be held, since
1575 	 * it enqueues the HCI LE BIG Create Sync command via
1576 	 * hci_cmd_sync_queue_once, which checks hdev flags that might
1577 	 * change.
1578 	 */
1579 	hci_dev_lock(hdev);
1580 	lock_sock(sk);
1581 
1582 	if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) {
1583 		err = hci_conn_big_create_sync(hdev, iso_pi(sk)->conn->hcon,
1584 					       &iso_pi(sk)->qos,
1585 					       iso_pi(sk)->sync_handle,
1586 					       iso_pi(sk)->bc_num_bis,
1587 					       iso_pi(sk)->bc_bis);
1588 		if (err)
1589 			bt_dev_err(hdev, "hci_big_create_sync: %d", err);
1590 	}
1591 
1592 	release_sock(sk);
1593 	hci_dev_unlock(hdev);
1594 }
1595 
iso_sock_recvmsg(struct socket * sock,struct msghdr * msg,size_t len,int flags)1596 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,
1597 			    size_t len, int flags)
1598 {
1599 	struct sock *sk = sock->sk;
1600 	struct iso_pinfo *pi = iso_pi(sk);
1601 	bool early_ret = false;
1602 	int err = 0;
1603 
1604 	BT_DBG("sk %p", sk);
1605 
1606 	if (unlikely(flags & MSG_ERRQUEUE))
1607 		return sock_recv_errqueue(sk, msg, len, SOL_BLUETOOTH,
1608 					  BT_SCM_ERROR);
1609 
1610 	if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1611 		sock_hold(sk);
1612 		lock_sock(sk);
1613 
1614 		switch (sk->sk_state) {
1615 		case BT_CONNECT2:
1616 			if (test_bit(BT_SK_PA_SYNC, &pi->flags)) {
1617 				release_sock(sk);
1618 				iso_conn_big_sync(sk);
1619 				lock_sock(sk);
1620 
1621 				sk->sk_state = BT_LISTEN;
1622 			} else {
1623 				iso_conn_defer_accept(pi->conn->hcon);
1624 				sk->sk_state = BT_CONFIG;
1625 			}
1626 
1627 			early_ret = true;
1628 			break;
1629 		case BT_CONNECTED:
1630 			if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1631 				release_sock(sk);
1632 				iso_conn_big_sync(sk);
1633 				lock_sock(sk);
1634 
1635 				sk->sk_state = BT_LISTEN;
1636 				early_ret = true;
1637 			}
1638 
1639 			break;
1640 		case BT_CONNECT:
1641 			release_sock(sk);
1642 			err = iso_connect_cis(sk);
1643 			lock_sock(sk);
1644 
1645 			early_ret = true;
1646 			break;
1647 		default:
1648 			break;
1649 		}
1650 
1651 		release_sock(sk);
1652 		sock_put(sk);
1653 
1654 		if (early_ret)
1655 			return err;
1656 	}
1657 
1658 	return bt_sock_recvmsg(sock, msg, len, flags);
1659 }
1660 
check_io_qos(struct bt_iso_io_qos * qos)1661 static bool check_io_qos(struct bt_iso_io_qos *qos)
1662 {
1663 	/* If no PHY is enable SDU must be 0 */
1664 	if (!qos->phys && qos->sdu)
1665 		return false;
1666 
1667 	if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff))
1668 		return false;
1669 
1670 	if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0))
1671 		return false;
1672 
1673 	if (qos->phys > BT_ISO_PHY_ANY)
1674 		return false;
1675 
1676 	return true;
1677 }
1678 
check_ucast_qos(struct bt_iso_qos * qos)1679 static bool check_ucast_qos(struct bt_iso_qos *qos)
1680 {
1681 	if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET)
1682 		return false;
1683 
1684 	if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET)
1685 		return false;
1686 
1687 	if (qos->ucast.sca > 0x07)
1688 		return false;
1689 
1690 	if (qos->ucast.packing > 0x01)
1691 		return false;
1692 
1693 	if (qos->ucast.framing > 0x01)
1694 		return false;
1695 
1696 	if (!check_io_qos(&qos->ucast.in))
1697 		return false;
1698 
1699 	if (!check_io_qos(&qos->ucast.out))
1700 		return false;
1701 
1702 	return true;
1703 }
1704 
check_bcast_qos(struct bt_iso_qos * qos)1705 static bool check_bcast_qos(struct bt_iso_qos *qos)
1706 {
1707 	if (!qos->bcast.sync_factor)
1708 		qos->bcast.sync_factor = 0x01;
1709 
1710 	if (qos->bcast.packing > 0x01)
1711 		return false;
1712 
1713 	if (qos->bcast.framing > 0x01)
1714 		return false;
1715 
1716 	if (!check_io_qos(&qos->bcast.in))
1717 		return false;
1718 
1719 	if (!check_io_qos(&qos->bcast.out))
1720 		return false;
1721 
1722 	if (qos->bcast.encryption > 0x01)
1723 		return false;
1724 
1725 	if (qos->bcast.options > 0x07)
1726 		return false;
1727 
1728 	if (qos->bcast.skip > 0x01f3)
1729 		return false;
1730 
1731 	if (!qos->bcast.sync_timeout)
1732 		qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1733 
1734 	if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000)
1735 		return false;
1736 
1737 	if (qos->bcast.sync_cte_type > 0x1f)
1738 		return false;
1739 
1740 	if (qos->bcast.mse > 0x1f)
1741 		return false;
1742 
1743 	if (!qos->bcast.timeout)
1744 		qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1745 
1746 	if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000)
1747 		return false;
1748 
1749 	return true;
1750 }
1751 
iso_sock_setsockopt(struct socket * sock,int level,int optname,sockptr_t optval,unsigned int optlen)1752 static int iso_sock_setsockopt(struct socket *sock, int level, int optname,
1753 			       sockptr_t optval, unsigned int optlen)
1754 {
1755 	struct sock *sk = sock->sk;
1756 	int err = 0;
1757 	struct bt_iso_qos qos = default_qos;
1758 	u32 opt;
1759 
1760 	BT_DBG("sk %p", sk);
1761 
1762 	lock_sock(sk);
1763 
1764 	switch (optname) {
1765 	case BT_DEFER_SETUP:
1766 		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1767 			err = -EINVAL;
1768 			break;
1769 		}
1770 
1771 		err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1772 		if (err)
1773 			break;
1774 
1775 		if (opt)
1776 			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1777 		else
1778 			clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1779 		break;
1780 
1781 	case BT_PKT_STATUS:
1782 		err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1783 		if (err)
1784 			break;
1785 
1786 		if (opt)
1787 			set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1788 		else
1789 			clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1790 		break;
1791 
1792 	case BT_PKT_SEQNUM:
1793 		err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1794 		if (err)
1795 			break;
1796 
1797 		if (opt)
1798 			set_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags);
1799 		else
1800 			clear_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags);
1801 		break;
1802 
1803 	case BT_ISO_QOS:
1804 		if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1805 		    sk->sk_state != BT_CONNECT2 &&
1806 		    (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) ||
1807 		    sk->sk_state != BT_CONNECTED)) {
1808 			err = -EINVAL;
1809 			break;
1810 		}
1811 
1812 		err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen);
1813 		if (err)
1814 			break;
1815 
1816 		iso_pi(sk)->qos = qos;
1817 		iso_pi(sk)->qos_user_set = true;
1818 
1819 		break;
1820 
1821 	case BT_ISO_BASE:
1822 		if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1823 		    sk->sk_state != BT_CONNECT2) {
1824 			err = -EINVAL;
1825 			break;
1826 		}
1827 
1828 		if (optlen > sizeof(iso_pi(sk)->base)) {
1829 			err = -EINVAL;
1830 			break;
1831 		}
1832 
1833 		err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval,
1834 					     optlen);
1835 		if (err)
1836 			break;
1837 
1838 		iso_pi(sk)->base_len = optlen;
1839 
1840 		break;
1841 
1842 	default:
1843 		err = -ENOPROTOOPT;
1844 		break;
1845 	}
1846 
1847 	release_sock(sk);
1848 	return err;
1849 }
1850 
iso_sock_getsockopt(struct socket * sock,int level,int optname,char __user * optval,int __user * optlen)1851 static int iso_sock_getsockopt(struct socket *sock, int level, int optname,
1852 			       char __user *optval, int __user *optlen)
1853 {
1854 	struct sock *sk = sock->sk;
1855 	int len, err = 0;
1856 	struct bt_iso_qos *qos;
1857 	u8 base_len;
1858 	u8 *base;
1859 
1860 	BT_DBG("sk %p", sk);
1861 
1862 	if (get_user(len, optlen))
1863 		return -EFAULT;
1864 
1865 	lock_sock(sk);
1866 
1867 	switch (optname) {
1868 	case BT_DEFER_SETUP:
1869 		if (sk->sk_state == BT_CONNECTED) {
1870 			err = -EINVAL;
1871 			break;
1872 		}
1873 
1874 		if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
1875 			     (u32 __user *)optval))
1876 			err = -EFAULT;
1877 
1878 		break;
1879 
1880 	case BT_PKT_STATUS:
1881 		if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags),
1882 			     (int __user *)optval))
1883 			err = -EFAULT;
1884 		break;
1885 
1886 	case BT_ISO_QOS:
1887 		qos = iso_sock_get_qos(sk);
1888 
1889 		len = min_t(unsigned int, len, sizeof(*qos));
1890 		if (copy_to_user(optval, qos, len))
1891 			err = -EFAULT;
1892 
1893 		break;
1894 
1895 	case BT_ISO_BASE:
1896 		if (sk->sk_state == BT_CONNECTED &&
1897 		    !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1898 			base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len;
1899 			base = iso_pi(sk)->conn->hcon->le_per_adv_data;
1900 		} else {
1901 			base_len = iso_pi(sk)->base_len;
1902 			base = iso_pi(sk)->base;
1903 		}
1904 
1905 		len = min_t(unsigned int, len, base_len);
1906 		if (copy_to_user(optval, base, len))
1907 			err = -EFAULT;
1908 		if (put_user(len, optlen))
1909 			err = -EFAULT;
1910 
1911 		break;
1912 
1913 	default:
1914 		err = -ENOPROTOOPT;
1915 		break;
1916 	}
1917 
1918 	release_sock(sk);
1919 	return err;
1920 }
1921 
iso_sock_shutdown(struct socket * sock,int how)1922 static int iso_sock_shutdown(struct socket *sock, int how)
1923 {
1924 	struct sock *sk = sock->sk;
1925 	int err = 0;
1926 
1927 	BT_DBG("sock %p, sk %p, how %d", sock, sk, how);
1928 
1929 	if (!sk)
1930 		return 0;
1931 
1932 	sock_hold(sk);
1933 	lock_sock(sk);
1934 
1935 	switch (how) {
1936 	case SHUT_RD:
1937 		if (sk->sk_shutdown & RCV_SHUTDOWN)
1938 			goto unlock;
1939 		sk->sk_shutdown |= RCV_SHUTDOWN;
1940 		break;
1941 	case SHUT_WR:
1942 		if (sk->sk_shutdown & SEND_SHUTDOWN)
1943 			goto unlock;
1944 		sk->sk_shutdown |= SEND_SHUTDOWN;
1945 		break;
1946 	case SHUT_RDWR:
1947 		if (sk->sk_shutdown & SHUTDOWN_MASK)
1948 			goto unlock;
1949 		sk->sk_shutdown |= SHUTDOWN_MASK;
1950 		break;
1951 	}
1952 
1953 	iso_sock_clear_timer(sk);
1954 	__iso_sock_close(sk);
1955 
1956 	if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
1957 	    !(current->flags & PF_EXITING))
1958 		err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1959 
1960 unlock:
1961 	release_sock(sk);
1962 	sock_put(sk);
1963 
1964 	return err;
1965 }
1966 
iso_sock_release(struct socket * sock)1967 static int iso_sock_release(struct socket *sock)
1968 {
1969 	struct sock *sk = sock->sk;
1970 	int err = 0;
1971 
1972 	BT_DBG("sock %p, sk %p", sock, sk);
1973 
1974 	if (!sk)
1975 		return 0;
1976 
1977 	iso_sock_close(sk);
1978 
1979 	if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) &&
1980 	    !(current->flags & PF_EXITING)) {
1981 		lock_sock(sk);
1982 		err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1983 		release_sock(sk);
1984 	}
1985 
1986 	sock_orphan(sk);
1987 	iso_sock_kill(sk);
1988 	return err;
1989 }
1990 
iso_sock_ready(struct sock * sk)1991 static void iso_sock_ready(struct sock *sk)
1992 {
1993 	BT_DBG("sk %p", sk);
1994 
1995 	if (!sk)
1996 		return;
1997 
1998 	lock_sock(sk);
1999 	iso_sock_clear_timer(sk);
2000 	sk->sk_state = BT_CONNECTED;
2001 	sk->sk_state_change(sk);
2002 	release_sock(sk);
2003 }
2004 
iso_match_big(struct sock * sk,void * data)2005 static bool iso_match_big(struct sock *sk, void *data)
2006 {
2007 	struct hci_evt_le_big_sync_established *ev = data;
2008 
2009 	return ev->handle == iso_pi(sk)->qos.bcast.big;
2010 }
2011 
iso_match_big_hcon(struct sock * sk,void * data)2012 static bool iso_match_big_hcon(struct sock *sk, void *data)
2013 {
2014 	struct hci_conn *hcon = data;
2015 
2016 	return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big;
2017 }
2018 
iso_match_pa_sync_flag(struct sock * sk,void * data)2019 static bool iso_match_pa_sync_flag(struct sock *sk, void *data)
2020 {
2021 	return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
2022 }
2023 
iso_match_dst(struct sock * sk,void * data)2024 static bool iso_match_dst(struct sock *sk, void *data)
2025 {
2026 	return !bacmp(&iso_pi(sk)->dst, (bdaddr_t *)data);
2027 }
2028 
iso_conn_ready(struct iso_conn * conn)2029 static void iso_conn_ready(struct iso_conn *conn)
2030 {
2031 	struct sock *parent = NULL;
2032 	struct sock *sk = conn->sk;
2033 	struct hci_ev_le_big_sync_established *ev = NULL;
2034 	struct hci_ev_le_pa_sync_established *ev2 = NULL;
2035 	struct hci_ev_le_per_adv_report *ev3 = NULL;
2036 	struct hci_conn *hcon;
2037 	struct hci_dev *hdev;
2038 
2039 	BT_DBG("conn %p", conn);
2040 
2041 	if (sk) {
2042 		/* Attempt to update source address in case of BIS Sender if
2043 		 * the advertisement is using a random address.
2044 		 */
2045 		if (conn->hcon->type == BIS_LINK &&
2046 		    conn->hcon->role == HCI_ROLE_MASTER &&
2047 		    !bacmp(&conn->hcon->dst, BDADDR_ANY)) {
2048 			struct hci_conn *bis = conn->hcon;
2049 			struct adv_info *adv;
2050 
2051 			adv = hci_find_adv_instance(bis->hdev,
2052 						    bis->iso_qos.bcast.bis);
2053 			if (adv && bacmp(&adv->random_addr, BDADDR_ANY)) {
2054 				lock_sock(sk);
2055 				iso_pi(sk)->src_type = BDADDR_LE_RANDOM;
2056 				bacpy(&iso_pi(sk)->src, &adv->random_addr);
2057 				release_sock(sk);
2058 			}
2059 		}
2060 
2061 		iso_sock_ready(conn->sk);
2062 	} else {
2063 		hcon = conn->hcon;
2064 		if (!hcon)
2065 			return;
2066 
2067 		hdev = hcon->hdev;
2068 
2069 		if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) {
2070 			/* A BIS slave hcon is notified to the ISO layer
2071 			 * after the Command Complete for the LE Setup
2072 			 * ISO Data Path command is received. Get the
2073 			 * parent socket that matches the hcon BIG handle.
2074 			 */
2075 			parent = iso_get_sock(hdev, &hcon->src, &hcon->dst,
2076 					      BT_LISTEN, iso_match_big_hcon,
2077 					      hcon);
2078 		} else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) {
2079 			ev = hci_recv_event_data(hcon->hdev,
2080 						 HCI_EVT_LE_BIG_SYNC_ESTABLISHED);
2081 
2082 			/* Get reference to PA sync parent socket, if it exists */
2083 			parent = iso_get_sock(hdev, &hcon->src, &hcon->dst,
2084 					      BT_LISTEN,
2085 					      iso_match_pa_sync_flag,
2086 					      NULL);
2087 			if (!parent && ev)
2088 				parent = iso_get_sock(hdev, &hcon->src,
2089 						      &hcon->dst,
2090 						      BT_LISTEN,
2091 						      iso_match_big, ev);
2092 		} else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
2093 			ev2 = hci_recv_event_data(hcon->hdev,
2094 						  HCI_EV_LE_PA_SYNC_ESTABLISHED);
2095 			if (ev2)
2096 				parent = iso_get_sock(hdev, &hcon->src,
2097 						      &hcon->dst,
2098 						      BT_LISTEN,
2099 						      iso_match_sid, ev2);
2100 		} else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) {
2101 			ev3 = hci_recv_event_data(hcon->hdev,
2102 						  HCI_EV_LE_PER_ADV_REPORT);
2103 			if (ev3)
2104 				parent = iso_get_sock(hdev, &hcon->src,
2105 						      &hcon->dst,
2106 						      BT_LISTEN,
2107 						      iso_match_sync_handle_pa_report,
2108 						      ev3);
2109 		}
2110 
2111 		if (!parent)
2112 			parent = iso_get_sock(hdev, &hcon->src, BDADDR_ANY,
2113 					      BT_LISTEN, iso_match_dst, BDADDR_ANY);
2114 
2115 		if (!parent)
2116 			return;
2117 
2118 		lock_sock(parent);
2119 
2120 		sk = iso_sock_alloc(sock_net(parent), NULL,
2121 				    BTPROTO_ISO, GFP_ATOMIC, 0);
2122 		if (!sk) {
2123 			release_sock(parent);
2124 			return;
2125 		}
2126 
2127 		iso_sock_init(sk, parent);
2128 
2129 		bacpy(&iso_pi(sk)->src, &hcon->src);
2130 
2131 		/* Convert from HCI to three-value type */
2132 		if (hcon->src_type == ADDR_LE_DEV_PUBLIC)
2133 			iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
2134 		else
2135 			iso_pi(sk)->src_type = BDADDR_LE_RANDOM;
2136 
2137 		/* If hcon has no destination address (BDADDR_ANY) it means it
2138 		 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or
2139 		 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using
2140 		 * the parent socket destination address.
2141 		 */
2142 		if (!bacmp(&hcon->dst, BDADDR_ANY)) {
2143 			bacpy(&hcon->dst, &iso_pi(parent)->dst);
2144 			hcon->dst_type = le_addr_type(iso_pi(parent)->dst_type);
2145 		}
2146 
2147 		if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) {
2148 			iso_pi(sk)->qos = iso_pi(parent)->qos;
2149 			hcon->iso_qos = iso_pi(sk)->qos;
2150 			iso_pi(sk)->bc_sid = iso_pi(parent)->bc_sid;
2151 			iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis;
2152 			memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis,
2153 			       ISO_MAX_NUM_BIS);
2154 			set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
2155 		}
2156 
2157 		bacpy(&iso_pi(sk)->dst, &hcon->dst);
2158 
2159 		/* Convert from HCI to three-value type */
2160 		if (hcon->dst_type == ADDR_LE_DEV_PUBLIC)
2161 			iso_pi(sk)->dst_type = BDADDR_LE_PUBLIC;
2162 		else
2163 			iso_pi(sk)->dst_type = BDADDR_LE_RANDOM;
2164 
2165 		iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle;
2166 		memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len);
2167 		iso_pi(sk)->base_len = iso_pi(parent)->base_len;
2168 
2169 		hci_conn_hold(hcon);
2170 		iso_chan_add(conn, sk, parent);
2171 
2172 		if ((ev && ((struct hci_evt_le_big_sync_established *)ev)->status) ||
2173 		    (ev2 && ev2->status)) {
2174 			/* Trigger error signal on child socket */
2175 			sk->sk_err = ECONNREFUSED;
2176 			sk->sk_error_report(sk);
2177 		}
2178 
2179 		if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags))
2180 			sk->sk_state = BT_CONNECT2;
2181 		else
2182 			sk->sk_state = BT_CONNECTED;
2183 
2184 		/* Wake up parent */
2185 		parent->sk_data_ready(parent);
2186 
2187 		release_sock(parent);
2188 		sock_put(parent);
2189 	}
2190 }
2191 
iso_match_sid(struct sock * sk,void * data)2192 static bool iso_match_sid(struct sock *sk, void *data)
2193 {
2194 	struct hci_ev_le_pa_sync_established *ev = data;
2195 
2196 	if (iso_pi(sk)->bc_sid == HCI_SID_INVALID)
2197 		return true;
2198 
2199 	return ev->sid == iso_pi(sk)->bc_sid;
2200 }
2201 
iso_match_sid_past(struct sock * sk,void * data)2202 static bool iso_match_sid_past(struct sock *sk, void *data)
2203 {
2204 	struct hci_ev_le_past_received *ev = data;
2205 
2206 	if (iso_pi(sk)->bc_sid == HCI_SID_INVALID)
2207 		return true;
2208 
2209 	return ev->sid == iso_pi(sk)->bc_sid;
2210 }
2211 
iso_match_sync_handle(struct sock * sk,void * data)2212 static bool iso_match_sync_handle(struct sock *sk, void *data)
2213 {
2214 	struct hci_evt_le_big_info_adv_report *ev = data;
2215 
2216 	return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2217 }
2218 
iso_match_sync_handle_pa_report(struct sock * sk,void * data)2219 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data)
2220 {
2221 	struct hci_ev_le_per_adv_report *ev = data;
2222 
2223 	return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2224 }
2225 
2226 /* ----- ISO interface with lower layer (HCI) ----- */
2227 
iso_connect_ind(struct hci_dev * hdev,bdaddr_t * bdaddr,__u8 * flags)2228 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags)
2229 {
2230 	struct hci_ev_le_pa_sync_established *ev1;
2231 	struct hci_ev_le_past_received *ev1a;
2232 	struct hci_evt_le_big_info_adv_report *ev2;
2233 	struct hci_ev_le_per_adv_report *ev3;
2234 	struct sock *sk;
2235 
2236 	bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr);
2237 
2238 	/* Broadcast receiver requires handling of some events before it can
2239 	 * proceed to establishing a BIG sync:
2240 	 *
2241 	 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific
2242 	 * SID to listen to and once sync is established its handle needs to
2243 	 * be stored in iso_pi(sk)->sync_handle so it can be matched once
2244 	 * receiving the BIG Info.
2245 	 * 1a. HCI_EV_LE_PAST_RECEIVED: alternative to 1.
2246 	 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a
2247 	 * a BIG Info it attempts to check if there any listening socket with
2248 	 * the same sync_handle and if it does then attempt to create a sync.
2249 	 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored
2250 	 * in iso_pi(sk)->base so it can be passed up to user, in the case of a
2251 	 * broadcast sink.
2252 	 */
2253 	ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED);
2254 	if (ev1) {
2255 		sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN,
2256 				  iso_match_sid, ev1);
2257 		if (sk && !ev1->status) {
2258 			lock_sock(sk);
2259 			iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle);
2260 			iso_pi(sk)->bc_sid = ev1->sid;
2261 			release_sock(sk);
2262 		}
2263 
2264 		goto done;
2265 	}
2266 
2267 	ev1a = hci_recv_event_data(hdev, HCI_EV_LE_PAST_RECEIVED);
2268 	if (ev1a) {
2269 		sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN,
2270 				  iso_match_sid_past, ev1a);
2271 		if (sk && !ev1a->status) {
2272 			lock_sock(sk);
2273 			iso_pi(sk)->sync_handle = le16_to_cpu(ev1a->sync_handle);
2274 			iso_pi(sk)->bc_sid = ev1a->sid;
2275 			release_sock(sk);
2276 		}
2277 
2278 		goto done;
2279 	}
2280 
2281 	ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT);
2282 	if (ev2) {
2283 		/* Check if BIGInfo report has already been handled */
2284 		sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_CONNECTED,
2285 				  iso_match_sync_handle, ev2);
2286 		if (sk) {
2287 			sock_put(sk);
2288 			sk = NULL;
2289 			goto done;
2290 		}
2291 
2292 		/* Try to get PA sync socket, if it exists */
2293 		sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_CONNECT2,
2294 				  iso_match_sync_handle, ev2);
2295 		if (!sk)
2296 			sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr,
2297 					  BT_LISTEN,
2298 					  iso_match_sync_handle,
2299 					  ev2);
2300 
2301 		if (sk) {
2302 			int err = 0;
2303 			bool big_sync;
2304 			struct hci_conn *hcon;
2305 
2306 			lock_sock(sk);
2307 
2308 			hcon = iso_pi(sk)->conn->hcon;
2309 			iso_pi(sk)->qos.bcast.encryption = ev2->encryption;
2310 
2311 			if (ev2->num_bis < iso_pi(sk)->bc_num_bis)
2312 				iso_pi(sk)->bc_num_bis = ev2->num_bis;
2313 
2314 			big_sync = !test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) &&
2315 				   !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags);
2316 
2317 			if (big_sync)
2318 				err = hci_conn_big_create_sync(hdev, hcon,
2319 							       &iso_pi(sk)->qos,
2320 							       iso_pi(sk)->sync_handle,
2321 							       iso_pi(sk)->bc_num_bis,
2322 							       iso_pi(sk)->bc_bis);
2323 
2324 			release_sock(sk);
2325 
2326 			if (big_sync && err) {
2327 				bt_dev_err(hdev, "hci_le_big_create_sync: %d",
2328 					   err);
2329 				sock_put(sk);
2330 				sk = NULL;
2331 			}
2332 		}
2333 
2334 		goto done;
2335 	}
2336 
2337 	ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT);
2338 	if (ev3) {
2339 		size_t base_len = 0;
2340 		u8 *base;
2341 		struct hci_conn *hcon;
2342 
2343 		sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN,
2344 				  iso_match_sync_handle_pa_report, ev3);
2345 		if (!sk)
2346 			goto done;
2347 
2348 		hcon = iso_pi(sk)->conn->hcon;
2349 		if (!hcon)
2350 			goto done;
2351 
2352 		if (ev3->data_status == LE_PA_DATA_TRUNCATED) {
2353 			/* The controller was unable to retrieve PA data. */
2354 			memset(hcon->le_per_adv_data, 0,
2355 			       HCI_MAX_PER_AD_TOT_LEN);
2356 			hcon->le_per_adv_data_len = 0;
2357 			hcon->le_per_adv_data_offset = 0;
2358 			goto done;
2359 		}
2360 
2361 		if (hcon->le_per_adv_data_offset + ev3->length >
2362 		    HCI_MAX_PER_AD_TOT_LEN)
2363 			goto done;
2364 
2365 		memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset,
2366 		       ev3->data, ev3->length);
2367 		hcon->le_per_adv_data_offset += ev3->length;
2368 
2369 		if (ev3->data_status == LE_PA_DATA_COMPLETE) {
2370 			/* All PA data has been received. */
2371 			hcon->le_per_adv_data_len =
2372 				hcon->le_per_adv_data_offset;
2373 			hcon->le_per_adv_data_offset = 0;
2374 
2375 			/* Extract BASE */
2376 			base = eir_get_service_data(hcon->le_per_adv_data,
2377 						    hcon->le_per_adv_data_len,
2378 						    EIR_BAA_SERVICE_UUID,
2379 						    &base_len);
2380 
2381 			if (!base || base_len > BASE_MAX_LENGTH)
2382 				goto done;
2383 
2384 			lock_sock(sk);
2385 			memcpy(iso_pi(sk)->base, base, base_len);
2386 			iso_pi(sk)->base_len = base_len;
2387 			release_sock(sk);
2388 		} else {
2389 			/* This is a PA data fragment. Keep pa_data_len set to 0
2390 			 * until all data has been reassembled.
2391 			 */
2392 			hcon->le_per_adv_data_len = 0;
2393 		}
2394 	} else {
2395 		sk = iso_get_sock(hdev, &hdev->bdaddr, BDADDR_ANY,
2396 				  BT_LISTEN, iso_match_dst, BDADDR_ANY);
2397 	}
2398 
2399 done:
2400 	if (!sk)
2401 		return 0;
2402 
2403 	if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))
2404 		*flags |= HCI_PROTO_DEFER;
2405 
2406 	sock_put(sk);
2407 
2408 	return HCI_LM_ACCEPT;
2409 }
2410 
iso_connect_cfm(struct hci_conn * hcon,__u8 status)2411 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status)
2412 {
2413 	if (hcon->type != CIS_LINK && hcon->type != BIS_LINK &&
2414 	    hcon->type != PA_LINK) {
2415 		if (hcon->type != LE_LINK)
2416 			return;
2417 
2418 		/* Check if LE link has failed */
2419 		if (status) {
2420 			struct hci_link *link, *t;
2421 
2422 			list_for_each_entry_safe(link, t, &hcon->link_list,
2423 						 list)
2424 				iso_conn_del(link->conn, bt_to_errno(status));
2425 
2426 			return;
2427 		}
2428 
2429 		/* Create CIS if pending */
2430 		hci_le_create_cis_pending(hcon->hdev);
2431 		return;
2432 	}
2433 
2434 	BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status);
2435 
2436 	/* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or
2437 	 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection
2438 	 * into the accept queue of the listening socket and wake up
2439 	 * userspace, to inform the user about the event.
2440 	 */
2441 	if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) ||
2442 	    test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
2443 		struct iso_conn *conn;
2444 
2445 		conn = iso_conn_add(hcon);
2446 		if (conn)
2447 			iso_conn_ready(conn);
2448 	} else {
2449 		iso_conn_del(hcon, bt_to_errno(status));
2450 	}
2451 }
2452 
iso_disconn_cfm(struct hci_conn * hcon,__u8 reason)2453 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason)
2454 {
2455 	if (hcon->type != CIS_LINK && hcon->type !=  BIS_LINK &&
2456 	    hcon->type != PA_LINK)
2457 		return;
2458 
2459 	BT_DBG("hcon %p reason %d", hcon, reason);
2460 
2461 	iso_conn_del(hcon, bt_to_errno(reason));
2462 }
2463 
iso_recv(struct hci_dev * hdev,u16 handle,struct sk_buff * skb,u16 flags)2464 int iso_recv(struct hci_dev *hdev, u16 handle, struct sk_buff *skb, u16 flags)
2465 {
2466 	struct hci_conn *hcon;
2467 	struct iso_conn *conn;
2468 	struct skb_shared_hwtstamps *hwts;
2469 	__u16 pb, ts, len, sn;
2470 
2471 	hci_dev_lock(hdev);
2472 
2473 	hcon = hci_conn_hash_lookup_handle(hdev, handle);
2474 	if (!hcon) {
2475 		hci_dev_unlock(hdev);
2476 		kfree_skb(skb);
2477 		return -ENOENT;
2478 	}
2479 
2480 	conn = iso_conn_hold_unless_zero(hcon->iso_data);
2481 	hcon = NULL;
2482 
2483 	hci_dev_unlock(hdev);
2484 
2485 	if (!conn) {
2486 		kfree_skb(skb);
2487 		return -EINVAL;
2488 	}
2489 
2490 	pb     = hci_iso_flags_pb(flags);
2491 	ts     = hci_iso_flags_ts(flags);
2492 
2493 	BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts);
2494 
2495 	switch (pb) {
2496 	case ISO_START:
2497 	case ISO_SINGLE:
2498 		if (conn->rx_len) {
2499 			BT_ERR("Unexpected start frame (len %d)", skb->len);
2500 			kfree_skb(conn->rx_skb);
2501 			conn->rx_skb = NULL;
2502 			conn->rx_len = 0;
2503 		}
2504 
2505 		if (ts) {
2506 			struct hci_iso_ts_data_hdr *hdr;
2507 
2508 			hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE);
2509 			if (!hdr) {
2510 				BT_ERR("Frame is too short (len %d)", skb->len);
2511 				goto drop;
2512 			}
2513 
2514 			/*  Record the timestamp to skb */
2515 			hwts = skb_hwtstamps(skb);
2516 			hwts->hwtstamp = us_to_ktime(le32_to_cpu(hdr->ts));
2517 
2518 			sn = __le16_to_cpu(hdr->sn);
2519 			len = __le16_to_cpu(hdr->slen);
2520 		} else {
2521 			struct hci_iso_data_hdr *hdr;
2522 
2523 			hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE);
2524 			if (!hdr) {
2525 				BT_ERR("Frame is too short (len %d)", skb->len);
2526 				goto drop;
2527 			}
2528 
2529 			sn = __le16_to_cpu(hdr->sn);
2530 			len = __le16_to_cpu(hdr->slen);
2531 		}
2532 
2533 		flags  = hci_iso_data_flags(len);
2534 		len    = hci_iso_data_len(len);
2535 
2536 		BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x sn %d",
2537 		       len, skb->len, flags, sn);
2538 
2539 		if (len == skb->len) {
2540 			/* Complete frame received */
2541 			hci_skb_pkt_status(skb) = flags & 0x03;
2542 			hci_skb_pkt_seqnum(skb) = sn;
2543 			iso_recv_frame(conn, skb);
2544 			goto done;
2545 		}
2546 
2547 		if (pb == ISO_SINGLE) {
2548 			BT_ERR("Frame malformed (len %d, expected len %d)",
2549 			       skb->len, len);
2550 			goto drop;
2551 		}
2552 
2553 		if (skb->len > len) {
2554 			BT_ERR("Frame is too long (len %d, expected len %d)",
2555 			       skb->len, len);
2556 			goto drop;
2557 		}
2558 
2559 		/* Allocate skb for the complete frame (with header) */
2560 		conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL);
2561 		if (!conn->rx_skb)
2562 			goto drop;
2563 
2564 		hci_skb_pkt_status(conn->rx_skb) = flags & 0x03;
2565 		hci_skb_pkt_seqnum(conn->rx_skb) = sn;
2566 		skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2567 					  skb->len);
2568 		conn->rx_len = len - skb->len;
2569 
2570 		/* Copy hw timestamp from skb to rx_skb if present */
2571 		if (ts) {
2572 			hwts = skb_hwtstamps(conn->rx_skb);
2573 			hwts->hwtstamp = skb_hwtstamps(skb)->hwtstamp;
2574 		}
2575 
2576 		break;
2577 
2578 	case ISO_CONT:
2579 		BT_DBG("Cont: frag len %d (expecting %d)", skb->len,
2580 		       conn->rx_len);
2581 
2582 		if (!conn->rx_len) {
2583 			BT_ERR("Unexpected continuation frame (len %d)",
2584 			       skb->len);
2585 			goto drop;
2586 		}
2587 
2588 		if (skb->len > conn->rx_len) {
2589 			BT_ERR("Fragment is too long (len %d, expected %d)",
2590 			       skb->len, conn->rx_len);
2591 			kfree_skb(conn->rx_skb);
2592 			conn->rx_skb = NULL;
2593 			conn->rx_len = 0;
2594 			goto drop;
2595 		}
2596 
2597 		skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2598 					  skb->len);
2599 		conn->rx_len -= skb->len;
2600 		break;
2601 
2602 	case ISO_END:
2603 		if (!conn->rx_len) {
2604 			BT_ERR("Unexpected end frame (len %d)", skb->len);
2605 			goto drop;
2606 		}
2607 
2608 		skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2609 					  skb->len);
2610 		conn->rx_len -= skb->len;
2611 
2612 		if (!conn->rx_len) {
2613 			struct sk_buff *rx_skb = conn->rx_skb;
2614 
2615 			/* Complete frame received. iso_recv_frame
2616 			 * takes ownership of the skb so set the global
2617 			 * rx_skb pointer to NULL first.
2618 			 */
2619 			conn->rx_skb = NULL;
2620 			iso_recv_frame(conn, rx_skb);
2621 		}
2622 		break;
2623 	}
2624 
2625 drop:
2626 	kfree_skb(skb);
2627 done:
2628 	iso_conn_put(conn);
2629 	return 0;
2630 }
2631 
2632 static struct hci_cb iso_cb = {
2633 	.name		= "ISO",
2634 	.connect_cfm	= iso_connect_cfm,
2635 	.disconn_cfm	= iso_disconn_cfm,
2636 };
2637 
iso_debugfs_show(struct seq_file * f,void * p)2638 static int iso_debugfs_show(struct seq_file *f, void *p)
2639 {
2640 	struct sock *sk;
2641 
2642 	read_lock(&iso_sk_list.lock);
2643 
2644 	sk_for_each(sk, &iso_sk_list.head) {
2645 		seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src,
2646 			   &iso_pi(sk)->dst, sk->sk_state);
2647 	}
2648 
2649 	read_unlock(&iso_sk_list.lock);
2650 
2651 	return 0;
2652 }
2653 
2654 DEFINE_SHOW_ATTRIBUTE(iso_debugfs);
2655 
2656 static struct dentry *iso_debugfs;
2657 
2658 static const struct proto_ops iso_sock_ops = {
2659 	.family		= PF_BLUETOOTH,
2660 	.owner		= THIS_MODULE,
2661 	.release	= iso_sock_release,
2662 	.bind		= iso_sock_bind,
2663 	.connect	= iso_sock_connect,
2664 	.listen		= iso_sock_listen,
2665 	.accept		= iso_sock_accept,
2666 	.getname	= iso_sock_getname,
2667 	.sendmsg	= iso_sock_sendmsg,
2668 	.recvmsg	= iso_sock_recvmsg,
2669 	.poll		= bt_sock_poll,
2670 	.ioctl		= bt_sock_ioctl,
2671 	.mmap		= sock_no_mmap,
2672 	.socketpair	= sock_no_socketpair,
2673 	.shutdown	= iso_sock_shutdown,
2674 	.setsockopt	= iso_sock_setsockopt,
2675 	.getsockopt	= iso_sock_getsockopt
2676 };
2677 
2678 static const struct net_proto_family iso_sock_family_ops = {
2679 	.family	= PF_BLUETOOTH,
2680 	.owner	= THIS_MODULE,
2681 	.create	= iso_sock_create,
2682 };
2683 
2684 static bool inited;
2685 
iso_inited(void)2686 bool iso_inited(void)
2687 {
2688 	return inited;
2689 }
2690 
iso_init(void)2691 int iso_init(void)
2692 {
2693 	int err;
2694 
2695 	BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr));
2696 
2697 	if (inited)
2698 		return -EALREADY;
2699 
2700 	err = proto_register(&iso_proto, 0);
2701 	if (err < 0)
2702 		return err;
2703 
2704 	err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops);
2705 	if (err < 0) {
2706 		BT_ERR("ISO socket registration failed");
2707 		goto error;
2708 	}
2709 
2710 	err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL);
2711 	if (err < 0) {
2712 		BT_ERR("Failed to create ISO proc file");
2713 		bt_sock_unregister(BTPROTO_ISO);
2714 		goto error;
2715 	}
2716 
2717 	BT_INFO("ISO socket layer initialized");
2718 
2719 	hci_register_cb(&iso_cb);
2720 
2721 	if (!IS_ERR_OR_NULL(bt_debugfs))
2722 		iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs,
2723 						  NULL, &iso_debugfs_fops);
2724 
2725 	inited = true;
2726 
2727 	return 0;
2728 
2729 error:
2730 	proto_unregister(&iso_proto);
2731 	return err;
2732 }
2733 
iso_exit(void)2734 int iso_exit(void)
2735 {
2736 	if (!inited)
2737 		return -EALREADY;
2738 
2739 	bt_procfs_cleanup(&init_net, "iso");
2740 
2741 	debugfs_remove(iso_debugfs);
2742 	iso_debugfs = NULL;
2743 
2744 	hci_unregister_cb(&iso_cb);
2745 
2746 	bt_sock_unregister(BTPROTO_ISO);
2747 
2748 	proto_unregister(&iso_proto);
2749 
2750 	inited = false;
2751 
2752 	return 0;
2753 }
2754