1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * BlueZ - Bluetooth protocol stack for Linux
4 *
5 * Copyright (C) 2022 Intel Corporation
6 * Copyright 2023-2024 NXP
7 */
8
9 #include <linux/module.h>
10 #include <linux/debugfs.h>
11 #include <linux/seq_file.h>
12 #include <linux/sched/signal.h>
13
14 #include <net/bluetooth/bluetooth.h>
15 #include <net/bluetooth/hci_core.h>
16 #include <net/bluetooth/iso.h>
17 #include "eir.h"
18
19 static const struct proto_ops iso_sock_ops;
20
21 static struct bt_sock_list iso_sk_list = {
22 .lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock)
23 };
24
25 /* ---- ISO connections ---- */
26 struct iso_conn {
27 struct hci_conn *hcon;
28
29 /* @lock: spinlock protecting changes to iso_conn fields */
30 spinlock_t lock;
31 struct sock *sk;
32
33 struct delayed_work timeout_work;
34
35 struct sk_buff *rx_skb;
36 __u32 rx_len;
37 __u16 tx_sn;
38 struct kref ref;
39 };
40
41 #define iso_conn_lock(c) spin_lock(&(c)->lock)
42 #define iso_conn_unlock(c) spin_unlock(&(c)->lock)
43
44 static void iso_sock_close(struct sock *sk);
45 static void iso_sock_kill(struct sock *sk);
46
47 /* ----- ISO socket info ----- */
48 #define iso_pi(sk) ((struct iso_pinfo *)sk)
49
50 #define EIR_SERVICE_DATA_LENGTH 4
51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH)
52 #define EIR_BAA_SERVICE_UUID 0x1851
53
54 /* iso_pinfo flags values */
55 enum {
56 BT_SK_BIG_SYNC,
57 BT_SK_PA_SYNC,
58 };
59
60 struct iso_pinfo {
61 struct bt_sock bt;
62 bdaddr_t src;
63 __u8 src_type;
64 bdaddr_t dst;
65 __u8 dst_type;
66 __u8 bc_sid;
67 __u8 bc_num_bis;
68 __u8 bc_bis[ISO_MAX_NUM_BIS];
69 __u16 sync_handle;
70 unsigned long flags;
71 struct bt_iso_qos qos;
72 bool qos_user_set;
73 __u8 base_len;
74 __u8 base[BASE_MAX_LENGTH];
75 struct iso_conn *conn;
76 };
77
78 static struct bt_iso_qos default_qos;
79
80 static bool check_ucast_qos(struct bt_iso_qos *qos);
81 static bool check_bcast_qos(struct bt_iso_qos *qos);
82 static bool iso_match_sid(struct sock *sk, void *data);
83 static bool iso_match_sync_handle(struct sock *sk, void *data);
84 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data);
85 static void iso_sock_disconn(struct sock *sk);
86
87 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data);
88
89 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst,
90 enum bt_sock_state state,
91 iso_sock_match_t match, void *data);
92
93 /* ---- ISO timers ---- */
94 #define ISO_CONN_TIMEOUT (HZ * 40)
95 #define ISO_DISCONN_TIMEOUT (HZ * 2)
96
iso_conn_free(struct kref * ref)97 static void iso_conn_free(struct kref *ref)
98 {
99 struct iso_conn *conn = container_of(ref, struct iso_conn, ref);
100
101 BT_DBG("conn %p", conn);
102
103 if (conn->sk)
104 iso_pi(conn->sk)->conn = NULL;
105
106 if (conn->hcon) {
107 conn->hcon->iso_data = NULL;
108 hci_conn_drop(conn->hcon);
109 }
110
111 /* Ensure no more work items will run since hci_conn has been dropped */
112 disable_delayed_work_sync(&conn->timeout_work);
113
114 kfree(conn);
115 }
116
iso_conn_put(struct iso_conn * conn)117 static void iso_conn_put(struct iso_conn *conn)
118 {
119 if (!conn)
120 return;
121
122 BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref));
123
124 kref_put(&conn->ref, iso_conn_free);
125 }
126
iso_conn_hold_unless_zero(struct iso_conn * conn)127 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn)
128 {
129 if (!conn)
130 return NULL;
131
132 BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref));
133
134 if (!kref_get_unless_zero(&conn->ref))
135 return NULL;
136
137 return conn;
138 }
139
iso_sock_hold(struct iso_conn * conn)140 static struct sock *iso_sock_hold(struct iso_conn *conn)
141 {
142 if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk))
143 return NULL;
144
145 sock_hold(conn->sk);
146
147 return conn->sk;
148 }
149
iso_sock_timeout(struct work_struct * work)150 static void iso_sock_timeout(struct work_struct *work)
151 {
152 struct iso_conn *conn = container_of(work, struct iso_conn,
153 timeout_work.work);
154 struct sock *sk;
155
156 conn = iso_conn_hold_unless_zero(conn);
157 if (!conn)
158 return;
159
160 iso_conn_lock(conn);
161 sk = iso_sock_hold(conn);
162 iso_conn_unlock(conn);
163 iso_conn_put(conn);
164
165 if (!sk)
166 return;
167
168 BT_DBG("sock %p state %d", sk, sk->sk_state);
169
170 lock_sock(sk);
171 sk->sk_err = ETIMEDOUT;
172 sk->sk_state_change(sk);
173 release_sock(sk);
174 sock_put(sk);
175 }
176
iso_sock_set_timer(struct sock * sk,long timeout)177 static void iso_sock_set_timer(struct sock *sk, long timeout)
178 {
179 if (!iso_pi(sk)->conn)
180 return;
181
182 BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout);
183 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
184 schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout);
185 }
186
iso_sock_clear_timer(struct sock * sk)187 static void iso_sock_clear_timer(struct sock *sk)
188 {
189 if (!iso_pi(sk)->conn)
190 return;
191
192 BT_DBG("sock %p state %d", sk, sk->sk_state);
193 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work);
194 }
195
196 /* ---- ISO connections ---- */
iso_conn_add(struct hci_conn * hcon)197 static struct iso_conn *iso_conn_add(struct hci_conn *hcon)
198 {
199 struct iso_conn *conn = hcon->iso_data;
200
201 conn = iso_conn_hold_unless_zero(conn);
202 if (conn) {
203 if (!conn->hcon) {
204 iso_conn_lock(conn);
205 conn->hcon = hcon;
206 iso_conn_unlock(conn);
207 }
208 iso_conn_put(conn);
209 return conn;
210 }
211
212 conn = kzalloc(sizeof(*conn), GFP_KERNEL);
213 if (!conn)
214 return NULL;
215
216 kref_init(&conn->ref);
217 spin_lock_init(&conn->lock);
218 INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout);
219
220 hcon->iso_data = conn;
221 conn->hcon = hcon;
222 conn->tx_sn = 0;
223
224 BT_DBG("hcon %p conn %p", hcon, conn);
225
226 return conn;
227 }
228
229 /* Delete channel. Must be called on the locked socket. */
iso_chan_del(struct sock * sk,int err)230 static void iso_chan_del(struct sock *sk, int err)
231 {
232 struct iso_conn *conn;
233 struct sock *parent;
234
235 conn = iso_pi(sk)->conn;
236 iso_pi(sk)->conn = NULL;
237
238 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
239
240 if (conn) {
241 iso_conn_lock(conn);
242 conn->sk = NULL;
243 iso_conn_unlock(conn);
244 iso_conn_put(conn);
245 }
246
247 sk->sk_state = BT_CLOSED;
248 sk->sk_err = err;
249
250 parent = bt_sk(sk)->parent;
251 if (parent) {
252 bt_accept_unlink(sk);
253 parent->sk_data_ready(parent);
254 } else {
255 sk->sk_state_change(sk);
256 }
257
258 sock_set_flag(sk, SOCK_ZAPPED);
259 }
260
iso_conn_del(struct hci_conn * hcon,int err)261 static void iso_conn_del(struct hci_conn *hcon, int err)
262 {
263 struct iso_conn *conn = hcon->iso_data;
264 struct sock *sk;
265
266 conn = iso_conn_hold_unless_zero(conn);
267 if (!conn)
268 return;
269
270 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
271
272 /* Kill socket */
273 iso_conn_lock(conn);
274 sk = iso_sock_hold(conn);
275 iso_conn_unlock(conn);
276 iso_conn_put(conn);
277
278 if (!sk) {
279 iso_conn_put(conn);
280 return;
281 }
282
283 lock_sock(sk);
284 iso_sock_clear_timer(sk);
285 iso_chan_del(sk, err);
286 release_sock(sk);
287 sock_put(sk);
288 }
289
__iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)290 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk,
291 struct sock *parent)
292 {
293 BT_DBG("conn %p", conn);
294
295 if (iso_pi(sk)->conn == conn && conn->sk == sk)
296 return 0;
297
298 if (conn->sk) {
299 BT_ERR("conn->sk already set");
300 return -EBUSY;
301 }
302
303 iso_pi(sk)->conn = conn;
304 conn->sk = sk;
305
306 if (parent)
307 bt_accept_enqueue(parent, sk, true);
308
309 return 0;
310 }
311
iso_chan_add(struct iso_conn * conn,struct sock * sk,struct sock * parent)312 static int iso_chan_add(struct iso_conn *conn, struct sock *sk,
313 struct sock *parent)
314 {
315 int err;
316
317 iso_conn_lock(conn);
318 err = __iso_chan_add(conn, sk, parent);
319 iso_conn_unlock(conn);
320
321 return err;
322 }
323
le_addr_type(u8 bdaddr_type)324 static inline u8 le_addr_type(u8 bdaddr_type)
325 {
326 if (bdaddr_type == BDADDR_LE_PUBLIC)
327 return ADDR_LE_DEV_PUBLIC;
328 else
329 return ADDR_LE_DEV_RANDOM;
330 }
331
iso_connect_bis(struct sock * sk)332 static int iso_connect_bis(struct sock *sk)
333 {
334 struct iso_conn *conn;
335 struct hci_conn *hcon;
336 struct hci_dev *hdev;
337 int err;
338
339 BT_DBG("%pMR (SID 0x%2.2x)", &iso_pi(sk)->src, iso_pi(sk)->bc_sid);
340
341 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
342 iso_pi(sk)->src_type);
343 if (!hdev)
344 return -EHOSTUNREACH;
345
346 hci_dev_lock(hdev);
347
348 if (!bis_capable(hdev)) {
349 err = -EOPNOTSUPP;
350 goto unlock;
351 }
352
353 /* Fail if user set invalid QoS */
354 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
355 iso_pi(sk)->qos = default_qos;
356 err = -EINVAL;
357 goto unlock;
358 }
359
360 /* Fail if out PHYs are marked as disabled */
361 if (!iso_pi(sk)->qos.bcast.out.phy) {
362 err = -EINVAL;
363 goto unlock;
364 }
365
366 /* Just bind if DEFER_SETUP has been set */
367 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
368 hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst, iso_pi(sk)->bc_sid,
369 &iso_pi(sk)->qos, iso_pi(sk)->base_len,
370 iso_pi(sk)->base);
371 if (IS_ERR(hcon)) {
372 err = PTR_ERR(hcon);
373 goto unlock;
374 }
375 } else {
376 hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst,
377 le_addr_type(iso_pi(sk)->dst_type),
378 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos,
379 iso_pi(sk)->base_len, iso_pi(sk)->base);
380 if (IS_ERR(hcon)) {
381 err = PTR_ERR(hcon);
382 goto unlock;
383 }
384
385 /* Update SID if it was not set */
386 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID)
387 iso_pi(sk)->bc_sid = hcon->sid;
388 }
389
390 conn = iso_conn_add(hcon);
391 if (!conn) {
392 hci_conn_drop(hcon);
393 err = -ENOMEM;
394 goto unlock;
395 }
396
397 lock_sock(sk);
398
399 err = iso_chan_add(conn, sk, NULL);
400 if (err) {
401 release_sock(sk);
402 goto unlock;
403 }
404
405 /* Update source addr of the socket */
406 bacpy(&iso_pi(sk)->src, &hcon->src);
407
408 if (hcon->state == BT_CONNECTED) {
409 iso_sock_clear_timer(sk);
410 sk->sk_state = BT_CONNECTED;
411 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
412 iso_sock_clear_timer(sk);
413 sk->sk_state = BT_CONNECT;
414 } else {
415 sk->sk_state = BT_CONNECT;
416 iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo));
417 }
418
419 release_sock(sk);
420
421 unlock:
422 hci_dev_unlock(hdev);
423 hci_dev_put(hdev);
424 return err;
425 }
426
iso_connect_cis(struct sock * sk)427 static int iso_connect_cis(struct sock *sk)
428 {
429 struct iso_conn *conn;
430 struct hci_conn *hcon;
431 struct hci_dev *hdev;
432 int err;
433
434 BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst);
435
436 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
437 iso_pi(sk)->src_type);
438 if (!hdev)
439 return -EHOSTUNREACH;
440
441 hci_dev_lock(hdev);
442
443 if (!cis_central_capable(hdev)) {
444 err = -EOPNOTSUPP;
445 goto unlock;
446 }
447
448 /* Fail if user set invalid QoS */
449 if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) {
450 iso_pi(sk)->qos = default_qos;
451 err = -EINVAL;
452 goto unlock;
453 }
454
455 /* Fail if either PHYs are marked as disabled */
456 if (!iso_pi(sk)->qos.ucast.in.phy && !iso_pi(sk)->qos.ucast.out.phy) {
457 err = -EINVAL;
458 goto unlock;
459 }
460
461 /* Just bind if DEFER_SETUP has been set */
462 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
463 hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst,
464 le_addr_type(iso_pi(sk)->dst_type),
465 &iso_pi(sk)->qos);
466 if (IS_ERR(hcon)) {
467 err = PTR_ERR(hcon);
468 goto unlock;
469 }
470 } else {
471 hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst,
472 le_addr_type(iso_pi(sk)->dst_type),
473 &iso_pi(sk)->qos);
474 if (IS_ERR(hcon)) {
475 err = PTR_ERR(hcon);
476 goto unlock;
477 }
478 }
479
480 conn = iso_conn_add(hcon);
481 if (!conn) {
482 hci_conn_drop(hcon);
483 err = -ENOMEM;
484 goto unlock;
485 }
486
487 lock_sock(sk);
488
489 err = iso_chan_add(conn, sk, NULL);
490 if (err) {
491 release_sock(sk);
492 goto unlock;
493 }
494
495 /* Update source addr of the socket */
496 bacpy(&iso_pi(sk)->src, &hcon->src);
497
498 if (hcon->state == BT_CONNECTED) {
499 iso_sock_clear_timer(sk);
500 sk->sk_state = BT_CONNECTED;
501 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
502 iso_sock_clear_timer(sk);
503 sk->sk_state = BT_CONNECT;
504 } else {
505 sk->sk_state = BT_CONNECT;
506 iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo));
507 }
508
509 release_sock(sk);
510
511 unlock:
512 hci_dev_unlock(hdev);
513 hci_dev_put(hdev);
514 return err;
515 }
516
iso_sock_get_qos(struct sock * sk)517 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk)
518 {
519 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2)
520 return &iso_pi(sk)->conn->hcon->iso_qos;
521
522 return &iso_pi(sk)->qos;
523 }
524
iso_send_frame(struct sock * sk,struct sk_buff * skb,const struct sockcm_cookie * sockc)525 static int iso_send_frame(struct sock *sk, struct sk_buff *skb,
526 const struct sockcm_cookie *sockc)
527 {
528 struct iso_conn *conn = iso_pi(sk)->conn;
529 struct bt_iso_qos *qos = iso_sock_get_qos(sk);
530 struct hci_iso_data_hdr *hdr;
531 int len = 0;
532
533 BT_DBG("sk %p len %d", sk, skb->len);
534
535 if (skb->len > qos->ucast.out.sdu)
536 return -EMSGSIZE;
537
538 len = skb->len;
539
540 /* Push ISO data header */
541 hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE);
542 hdr->sn = cpu_to_le16(conn->tx_sn++);
543 hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len,
544 HCI_ISO_STATUS_VALID));
545
546 if (sk->sk_state == BT_CONNECTED) {
547 hci_setup_tx_timestamp(skb, 1, sockc);
548 hci_send_iso(conn->hcon, skb);
549 } else {
550 len = -ENOTCONN;
551 }
552
553 return len;
554 }
555
iso_recv_frame(struct iso_conn * conn,struct sk_buff * skb)556 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb)
557 {
558 struct sock *sk;
559
560 iso_conn_lock(conn);
561 sk = conn->sk;
562 iso_conn_unlock(conn);
563
564 if (!sk)
565 goto drop;
566
567 BT_DBG("sk %p len %d", sk, skb->len);
568
569 if (sk->sk_state != BT_CONNECTED)
570 goto drop;
571
572 if (!sock_queue_rcv_skb(sk, skb))
573 return;
574
575 drop:
576 kfree_skb(skb);
577 }
578
579 /* -------- Socket interface ---------- */
__iso_get_sock_listen_by_addr(bdaddr_t * src,bdaddr_t * dst)580 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst)
581 {
582 struct sock *sk;
583
584 sk_for_each(sk, &iso_sk_list.head) {
585 if (sk->sk_state != BT_LISTEN)
586 continue;
587
588 if (bacmp(&iso_pi(sk)->dst, dst))
589 continue;
590
591 if (!bacmp(&iso_pi(sk)->src, src))
592 return sk;
593 }
594
595 return NULL;
596 }
597
__iso_get_sock_listen_by_sid(bdaddr_t * ba,bdaddr_t * bc,__u8 sid)598 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc,
599 __u8 sid)
600 {
601 struct sock *sk;
602
603 sk_for_each(sk, &iso_sk_list.head) {
604 if (sk->sk_state != BT_LISTEN)
605 continue;
606
607 if (bacmp(&iso_pi(sk)->src, ba))
608 continue;
609
610 if (bacmp(&iso_pi(sk)->dst, bc))
611 continue;
612
613 if (iso_pi(sk)->bc_sid == sid)
614 return sk;
615 }
616
617 return NULL;
618 }
619
620 /* Find socket in given state:
621 * source bdaddr (Unicast)
622 * destination bdaddr (Broadcast only)
623 * match func - pass NULL to ignore
624 * match func data - pass -1 to ignore
625 * Returns closest match.
626 */
iso_get_sock(bdaddr_t * src,bdaddr_t * dst,enum bt_sock_state state,iso_sock_match_t match,void * data)627 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst,
628 enum bt_sock_state state,
629 iso_sock_match_t match, void *data)
630 {
631 struct sock *sk = NULL, *sk1 = NULL;
632
633 read_lock(&iso_sk_list.lock);
634
635 sk_for_each(sk, &iso_sk_list.head) {
636 if (sk->sk_state != state)
637 continue;
638
639 /* Match Broadcast destination */
640 if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst))
641 continue;
642
643 /* Use Match function if provided */
644 if (match && !match(sk, data))
645 continue;
646
647 /* Exact match. */
648 if (!bacmp(&iso_pi(sk)->src, src)) {
649 sock_hold(sk);
650 break;
651 }
652
653 /* Closest match */
654 if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) {
655 if (sk1)
656 sock_put(sk1);
657
658 sk1 = sk;
659 sock_hold(sk1);
660 }
661 }
662
663 if (sk && sk1)
664 sock_put(sk1);
665
666 read_unlock(&iso_sk_list.lock);
667
668 return sk ? sk : sk1;
669 }
670
iso_get_sock_big(struct sock * match_sk,bdaddr_t * src,bdaddr_t * dst,uint8_t big)671 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src,
672 bdaddr_t *dst, uint8_t big)
673 {
674 struct sock *sk = NULL;
675
676 read_lock(&iso_sk_list.lock);
677
678 sk_for_each(sk, &iso_sk_list.head) {
679 if (match_sk == sk)
680 continue;
681
682 /* Look for sockets that have already been
683 * connected to the BIG
684 */
685 if (sk->sk_state != BT_CONNECTED &&
686 sk->sk_state != BT_CONNECT)
687 continue;
688
689 /* Match Broadcast destination */
690 if (bacmp(&iso_pi(sk)->dst, dst))
691 continue;
692
693 /* Match BIG handle */
694 if (iso_pi(sk)->qos.bcast.big != big)
695 continue;
696
697 /* Match source address */
698 if (bacmp(&iso_pi(sk)->src, src))
699 continue;
700
701 sock_hold(sk);
702 break;
703 }
704
705 read_unlock(&iso_sk_list.lock);
706
707 return sk;
708 }
709
iso_sock_destruct(struct sock * sk)710 static void iso_sock_destruct(struct sock *sk)
711 {
712 BT_DBG("sk %p", sk);
713
714 iso_conn_put(iso_pi(sk)->conn);
715
716 skb_queue_purge(&sk->sk_receive_queue);
717 skb_queue_purge(&sk->sk_write_queue);
718 }
719
iso_sock_cleanup_listen(struct sock * parent)720 static void iso_sock_cleanup_listen(struct sock *parent)
721 {
722 struct sock *sk;
723
724 BT_DBG("parent %p", parent);
725
726 /* Close not yet accepted channels */
727 while ((sk = bt_accept_dequeue(parent, NULL))) {
728 iso_sock_close(sk);
729 iso_sock_kill(sk);
730 }
731
732 /* If listening socket has a hcon, properly disconnect it */
733 if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) {
734 iso_sock_disconn(parent);
735 return;
736 }
737
738 parent->sk_state = BT_CLOSED;
739 sock_set_flag(parent, SOCK_ZAPPED);
740 }
741
742 /* Kill socket (only if zapped and orphan)
743 * Must be called on unlocked socket.
744 */
iso_sock_kill(struct sock * sk)745 static void iso_sock_kill(struct sock *sk)
746 {
747 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket ||
748 sock_flag(sk, SOCK_DEAD))
749 return;
750
751 BT_DBG("sk %p state %d", sk, sk->sk_state);
752
753 /* Kill poor orphan */
754 bt_sock_unlink(&iso_sk_list, sk);
755 sock_set_flag(sk, SOCK_DEAD);
756 sock_put(sk);
757 }
758
iso_sock_disconn(struct sock * sk)759 static void iso_sock_disconn(struct sock *sk)
760 {
761 struct sock *bis_sk;
762 struct hci_conn *hcon = iso_pi(sk)->conn->hcon;
763
764 if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) {
765 bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src,
766 &iso_pi(sk)->dst,
767 iso_pi(sk)->qos.bcast.big);
768
769 /* If there are any other connected sockets for the
770 * same BIG, just delete the sk and leave the bis
771 * hcon active, in case later rebinding is needed.
772 */
773 if (bis_sk) {
774 hcon->state = BT_OPEN;
775 hcon->iso_data = NULL;
776 iso_pi(sk)->conn->hcon = NULL;
777 iso_sock_clear_timer(sk);
778 iso_chan_del(sk, bt_to_errno(hcon->abort_reason));
779 sock_put(bis_sk);
780 return;
781 }
782 }
783
784 sk->sk_state = BT_DISCONN;
785 iso_conn_lock(iso_pi(sk)->conn);
786 hci_conn_drop(iso_pi(sk)->conn->hcon);
787 iso_pi(sk)->conn->hcon = NULL;
788 iso_conn_unlock(iso_pi(sk)->conn);
789 }
790
__iso_sock_close(struct sock * sk)791 static void __iso_sock_close(struct sock *sk)
792 {
793 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
794
795 switch (sk->sk_state) {
796 case BT_LISTEN:
797 iso_sock_cleanup_listen(sk);
798 break;
799
800 case BT_CONNECT:
801 case BT_CONNECTED:
802 case BT_CONFIG:
803 if (iso_pi(sk)->conn->hcon)
804 iso_sock_disconn(sk);
805 else
806 iso_chan_del(sk, ECONNRESET);
807 break;
808
809 case BT_CONNECT2:
810 if (iso_pi(sk)->conn->hcon &&
811 (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) ||
812 test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags)))
813 iso_sock_disconn(sk);
814 else
815 iso_chan_del(sk, ECONNRESET);
816 break;
817 case BT_DISCONN:
818 iso_chan_del(sk, ECONNRESET);
819 break;
820
821 default:
822 sock_set_flag(sk, SOCK_ZAPPED);
823 break;
824 }
825 }
826
827 /* Must be called on unlocked socket. */
iso_sock_close(struct sock * sk)828 static void iso_sock_close(struct sock *sk)
829 {
830 iso_sock_clear_timer(sk);
831 lock_sock(sk);
832 __iso_sock_close(sk);
833 release_sock(sk);
834 iso_sock_kill(sk);
835 }
836
iso_sock_init(struct sock * sk,struct sock * parent)837 static void iso_sock_init(struct sock *sk, struct sock *parent)
838 {
839 BT_DBG("sk %p", sk);
840
841 if (parent) {
842 sk->sk_type = parent->sk_type;
843 bt_sk(sk)->flags = bt_sk(parent)->flags;
844 security_sk_clone(parent, sk);
845 }
846 }
847
848 static struct proto iso_proto = {
849 .name = "ISO",
850 .owner = THIS_MODULE,
851 .obj_size = sizeof(struct iso_pinfo)
852 };
853
854 #define DEFAULT_IO_QOS \
855 { \
856 .interval = 10000u, \
857 .latency = 10u, \
858 .sdu = 40u, \
859 .phy = BT_ISO_PHY_2M, \
860 .rtn = 2u, \
861 }
862
863 static struct bt_iso_qos default_qos = {
864 .bcast = {
865 .big = BT_ISO_QOS_BIG_UNSET,
866 .bis = BT_ISO_QOS_BIS_UNSET,
867 .sync_factor = 0x01,
868 .packing = 0x00,
869 .framing = 0x00,
870 .in = DEFAULT_IO_QOS,
871 .out = DEFAULT_IO_QOS,
872 .encryption = 0x00,
873 .bcode = {0x00},
874 .options = 0x00,
875 .skip = 0x0000,
876 .sync_timeout = BT_ISO_SYNC_TIMEOUT,
877 .sync_cte_type = 0x00,
878 .mse = 0x00,
879 .timeout = BT_ISO_SYNC_TIMEOUT,
880 },
881 };
882
iso_sock_alloc(struct net * net,struct socket * sock,int proto,gfp_t prio,int kern)883 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock,
884 int proto, gfp_t prio, int kern)
885 {
886 struct sock *sk;
887
888 sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern);
889 if (!sk)
890 return NULL;
891
892 sk->sk_destruct = iso_sock_destruct;
893 sk->sk_sndtimeo = ISO_CONN_TIMEOUT;
894
895 /* Set address type as public as default src address is BDADDR_ANY */
896 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
897
898 iso_pi(sk)->qos = default_qos;
899 iso_pi(sk)->sync_handle = -1;
900
901 bt_sock_link(&iso_sk_list, sk);
902 return sk;
903 }
904
iso_sock_create(struct net * net,struct socket * sock,int protocol,int kern)905 static int iso_sock_create(struct net *net, struct socket *sock, int protocol,
906 int kern)
907 {
908 struct sock *sk;
909
910 BT_DBG("sock %p", sock);
911
912 sock->state = SS_UNCONNECTED;
913
914 if (sock->type != SOCK_SEQPACKET)
915 return -ESOCKTNOSUPPORT;
916
917 sock->ops = &iso_sock_ops;
918
919 sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
920 if (!sk)
921 return -ENOMEM;
922
923 iso_sock_init(sk, NULL);
924 return 0;
925 }
926
iso_sock_bind_bc(struct socket * sock,struct sockaddr * addr,int addr_len)927 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr *addr,
928 int addr_len)
929 {
930 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
931 struct sock *sk = sock->sk;
932 int i;
933
934 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid,
935 sa->iso_bc->bc_num_bis);
936
937 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc))
938 return -EINVAL;
939
940 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr);
941
942 /* Check if the address type is of LE type */
943 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type))
944 return -EINVAL;
945
946 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type;
947
948 if (sa->iso_bc->bc_sid > 0x0f && sa->iso_bc->bc_sid != HCI_SID_INVALID)
949 return -EINVAL;
950
951 iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid;
952
953 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS)
954 return -EINVAL;
955
956 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
957
958 for (i = 0; i < iso_pi(sk)->bc_num_bis; i++)
959 if (sa->iso_bc->bc_bis[i] < 0x01 ||
960 sa->iso_bc->bc_bis[i] > 0x1f)
961 return -EINVAL;
962
963 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
964 iso_pi(sk)->bc_num_bis);
965
966 return 0;
967 }
968
iso_sock_bind_pa_sk(struct sock * sk,struct sockaddr_iso * sa,int addr_len)969 static int iso_sock_bind_pa_sk(struct sock *sk, struct sockaddr_iso *sa,
970 int addr_len)
971 {
972 int err = 0;
973
974 if (sk->sk_type != SOCK_SEQPACKET) {
975 err = -EINVAL;
976 goto done;
977 }
978
979 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) {
980 err = -EINVAL;
981 goto done;
982 }
983
984 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) {
985 err = -EINVAL;
986 goto done;
987 }
988
989 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis;
990
991 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++)
992 if (sa->iso_bc->bc_bis[i] < 0x01 ||
993 sa->iso_bc->bc_bis[i] > 0x1f) {
994 err = -EINVAL;
995 goto done;
996 }
997
998 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis,
999 iso_pi(sk)->bc_num_bis);
1000
1001 done:
1002 return err;
1003 }
1004
iso_sock_bind(struct socket * sock,struct sockaddr * addr,int addr_len)1005 static int iso_sock_bind(struct socket *sock, struct sockaddr *addr,
1006 int addr_len)
1007 {
1008 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1009 struct sock *sk = sock->sk;
1010 int err = 0;
1011
1012 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type);
1013
1014 if (!addr || addr_len < sizeof(struct sockaddr_iso) ||
1015 addr->sa_family != AF_BLUETOOTH)
1016 return -EINVAL;
1017
1018 lock_sock(sk);
1019
1020 /* Allow the user to bind a PA sync socket to a number
1021 * of BISes to sync to.
1022 */
1023 if ((sk->sk_state == BT_CONNECT2 ||
1024 sk->sk_state == BT_CONNECTED) &&
1025 test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1026 err = iso_sock_bind_pa_sk(sk, sa, addr_len);
1027 goto done;
1028 }
1029
1030 if (sk->sk_state != BT_OPEN) {
1031 err = -EBADFD;
1032 goto done;
1033 }
1034
1035 if (sk->sk_type != SOCK_SEQPACKET) {
1036 err = -EINVAL;
1037 goto done;
1038 }
1039
1040 /* Check if the address type is of LE type */
1041 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) {
1042 err = -EINVAL;
1043 goto done;
1044 }
1045
1046 bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr);
1047 iso_pi(sk)->src_type = sa->iso_bdaddr_type;
1048
1049 /* Check for Broadcast address */
1050 if (addr_len > sizeof(*sa)) {
1051 err = iso_sock_bind_bc(sock, addr, addr_len);
1052 if (err)
1053 goto done;
1054 }
1055
1056 sk->sk_state = BT_BOUND;
1057
1058 done:
1059 release_sock(sk);
1060 return err;
1061 }
1062
iso_sock_connect(struct socket * sock,struct sockaddr * addr,int alen,int flags)1063 static int iso_sock_connect(struct socket *sock, struct sockaddr *addr,
1064 int alen, int flags)
1065 {
1066 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1067 struct sock *sk = sock->sk;
1068 int err;
1069
1070 BT_DBG("sk %p", sk);
1071
1072 if (alen < sizeof(struct sockaddr_iso) ||
1073 addr->sa_family != AF_BLUETOOTH)
1074 return -EINVAL;
1075
1076 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND)
1077 return -EBADFD;
1078
1079 if (sk->sk_type != SOCK_SEQPACKET)
1080 return -EINVAL;
1081
1082 /* Check if the address type is of LE type */
1083 if (!bdaddr_type_is_le(sa->iso_bdaddr_type))
1084 return -EINVAL;
1085
1086 lock_sock(sk);
1087
1088 bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr);
1089 iso_pi(sk)->dst_type = sa->iso_bdaddr_type;
1090
1091 release_sock(sk);
1092
1093 if (bacmp(&iso_pi(sk)->dst, BDADDR_ANY))
1094 err = iso_connect_cis(sk);
1095 else
1096 err = iso_connect_bis(sk);
1097
1098 if (err)
1099 return err;
1100
1101 lock_sock(sk);
1102
1103 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1104 err = bt_sock_wait_state(sk, BT_CONNECTED,
1105 sock_sndtimeo(sk, flags & O_NONBLOCK));
1106 }
1107
1108 release_sock(sk);
1109 return err;
1110 }
1111
iso_listen_bis(struct sock * sk)1112 static int iso_listen_bis(struct sock *sk)
1113 {
1114 struct hci_dev *hdev;
1115 int err = 0;
1116 struct iso_conn *conn;
1117 struct hci_conn *hcon;
1118
1119 BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src,
1120 &iso_pi(sk)->dst, iso_pi(sk)->bc_sid);
1121
1122 write_lock(&iso_sk_list.lock);
1123
1124 if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst,
1125 iso_pi(sk)->bc_sid))
1126 err = -EADDRINUSE;
1127
1128 write_unlock(&iso_sk_list.lock);
1129
1130 if (err)
1131 return err;
1132
1133 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1134 iso_pi(sk)->src_type);
1135 if (!hdev)
1136 return -EHOSTUNREACH;
1137
1138 hci_dev_lock(hdev);
1139 lock_sock(sk);
1140
1141 /* Fail if user set invalid QoS */
1142 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) {
1143 iso_pi(sk)->qos = default_qos;
1144 err = -EINVAL;
1145 goto unlock;
1146 }
1147
1148 hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst,
1149 le_addr_type(iso_pi(sk)->dst_type),
1150 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos);
1151 if (IS_ERR(hcon)) {
1152 err = PTR_ERR(hcon);
1153 goto unlock;
1154 }
1155
1156 conn = iso_conn_add(hcon);
1157 if (!conn) {
1158 hci_conn_drop(hcon);
1159 err = -ENOMEM;
1160 goto unlock;
1161 }
1162
1163 err = iso_chan_add(conn, sk, NULL);
1164 if (err) {
1165 hci_conn_drop(hcon);
1166 goto unlock;
1167 }
1168
1169 unlock:
1170 release_sock(sk);
1171 hci_dev_unlock(hdev);
1172 hci_dev_put(hdev);
1173 return err;
1174 }
1175
iso_listen_cis(struct sock * sk)1176 static int iso_listen_cis(struct sock *sk)
1177 {
1178 int err = 0;
1179
1180 BT_DBG("%pMR", &iso_pi(sk)->src);
1181
1182 write_lock(&iso_sk_list.lock);
1183
1184 if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst))
1185 err = -EADDRINUSE;
1186
1187 write_unlock(&iso_sk_list.lock);
1188
1189 return err;
1190 }
1191
iso_sock_listen(struct socket * sock,int backlog)1192 static int iso_sock_listen(struct socket *sock, int backlog)
1193 {
1194 struct sock *sk = sock->sk;
1195 int err = 0;
1196
1197 BT_DBG("sk %p backlog %d", sk, backlog);
1198
1199 sock_hold(sk);
1200 lock_sock(sk);
1201
1202 if (sk->sk_state != BT_BOUND) {
1203 err = -EBADFD;
1204 goto done;
1205 }
1206
1207 if (sk->sk_type != SOCK_SEQPACKET) {
1208 err = -EINVAL;
1209 goto done;
1210 }
1211
1212 if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1213 err = iso_listen_cis(sk);
1214 } else {
1215 /* Drop sock lock to avoid potential
1216 * deadlock with the hdev lock.
1217 */
1218 release_sock(sk);
1219 err = iso_listen_bis(sk);
1220 lock_sock(sk);
1221 }
1222
1223 if (err)
1224 goto done;
1225
1226 sk->sk_max_ack_backlog = backlog;
1227 sk->sk_ack_backlog = 0;
1228
1229 sk->sk_state = BT_LISTEN;
1230
1231 done:
1232 release_sock(sk);
1233 sock_put(sk);
1234 return err;
1235 }
1236
iso_sock_accept(struct socket * sock,struct socket * newsock,struct proto_accept_arg * arg)1237 static int iso_sock_accept(struct socket *sock, struct socket *newsock,
1238 struct proto_accept_arg *arg)
1239 {
1240 DEFINE_WAIT_FUNC(wait, woken_wake_function);
1241 struct sock *sk = sock->sk, *ch;
1242 long timeo;
1243 int err = 0;
1244
1245 /* Use explicit nested locking to avoid lockdep warnings generated
1246 * because the parent socket and the child socket are locked on the
1247 * same thread.
1248 */
1249 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1250
1251 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK);
1252
1253 BT_DBG("sk %p timeo %ld", sk, timeo);
1254
1255 /* Wait for an incoming connection. (wake-one). */
1256 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1257 while (1) {
1258 if (sk->sk_state != BT_LISTEN) {
1259 err = -EBADFD;
1260 break;
1261 }
1262
1263 ch = bt_accept_dequeue(sk, newsock);
1264 if (ch)
1265 break;
1266
1267 if (!timeo) {
1268 err = -EAGAIN;
1269 break;
1270 }
1271
1272 if (signal_pending(current)) {
1273 err = sock_intr_errno(timeo);
1274 break;
1275 }
1276
1277 release_sock(sk);
1278
1279 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
1280 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1281 }
1282 remove_wait_queue(sk_sleep(sk), &wait);
1283
1284 if (err)
1285 goto done;
1286
1287 newsock->state = SS_CONNECTED;
1288
1289 BT_DBG("new socket %p", ch);
1290
1291 /* A Broadcast Sink might require BIG sync to be terminated
1292 * and re-established multiple times, while keeping the same
1293 * PA sync handle active. To allow this, once all BIS
1294 * connections have been accepted on a PA sync parent socket,
1295 * "reset" socket state, to allow future BIG re-sync procedures.
1296 */
1297 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1298 /* Iterate through the list of bound BIS indices
1299 * and clear each BIS as they are accepted by the
1300 * user space, one by one.
1301 */
1302 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) {
1303 if (iso_pi(sk)->bc_bis[i] > 0) {
1304 iso_pi(sk)->bc_bis[i] = 0;
1305 iso_pi(sk)->bc_num_bis--;
1306 break;
1307 }
1308 }
1309
1310 if (iso_pi(sk)->bc_num_bis == 0) {
1311 /* Once the last BIS was accepted, reset parent
1312 * socket parameters to mark that the listening
1313 * process for BIS connections has been completed:
1314 *
1315 * 1. Reset the DEFER setup flag on the parent sk.
1316 * 2. Clear the flag marking that the BIG create
1317 * sync command is pending.
1318 * 3. Transition socket state from BT_LISTEN to
1319 * BT_CONNECTED.
1320 */
1321 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1322 clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags);
1323 sk->sk_state = BT_CONNECTED;
1324 }
1325 }
1326
1327 done:
1328 release_sock(sk);
1329 return err;
1330 }
1331
iso_sock_getname(struct socket * sock,struct sockaddr * addr,int peer)1332 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr,
1333 int peer)
1334 {
1335 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr;
1336 struct sock *sk = sock->sk;
1337 int len = sizeof(struct sockaddr_iso);
1338
1339 BT_DBG("sock %p, sk %p", sock, sk);
1340
1341 addr->sa_family = AF_BLUETOOTH;
1342
1343 if (peer) {
1344 struct hci_conn *hcon = iso_pi(sk)->conn ?
1345 iso_pi(sk)->conn->hcon : NULL;
1346
1347 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst);
1348 sa->iso_bdaddr_type = iso_pi(sk)->dst_type;
1349
1350 if (hcon && hcon->type == BIS_LINK) {
1351 sa->iso_bc->bc_sid = iso_pi(sk)->bc_sid;
1352 sa->iso_bc->bc_num_bis = iso_pi(sk)->bc_num_bis;
1353 memcpy(sa->iso_bc->bc_bis, iso_pi(sk)->bc_bis,
1354 ISO_MAX_NUM_BIS);
1355 len += sizeof(struct sockaddr_iso_bc);
1356 }
1357 } else {
1358 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src);
1359 sa->iso_bdaddr_type = iso_pi(sk)->src_type;
1360 }
1361
1362 return len;
1363 }
1364
iso_sock_sendmsg(struct socket * sock,struct msghdr * msg,size_t len)1365 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg,
1366 size_t len)
1367 {
1368 struct sock *sk = sock->sk;
1369 struct sk_buff *skb, **frag;
1370 struct sockcm_cookie sockc;
1371 size_t mtu;
1372 int err;
1373
1374 BT_DBG("sock %p, sk %p", sock, sk);
1375
1376 err = sock_error(sk);
1377 if (err)
1378 return err;
1379
1380 if (msg->msg_flags & MSG_OOB)
1381 return -EOPNOTSUPP;
1382
1383 hci_sockcm_init(&sockc, sk);
1384
1385 if (msg->msg_controllen) {
1386 err = sock_cmsg_send(sk, msg, &sockc);
1387 if (err)
1388 return err;
1389 }
1390
1391 lock_sock(sk);
1392
1393 if (sk->sk_state != BT_CONNECTED) {
1394 release_sock(sk);
1395 return -ENOTCONN;
1396 }
1397
1398 mtu = iso_pi(sk)->conn->hcon->mtu;
1399
1400 release_sock(sk);
1401
1402 skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0);
1403 if (IS_ERR(skb))
1404 return PTR_ERR(skb);
1405
1406 len -= skb->len;
1407
1408 BT_DBG("skb %p len %d", sk, skb->len);
1409
1410 /* Continuation fragments */
1411 frag = &skb_shinfo(skb)->frag_list;
1412 while (len) {
1413 struct sk_buff *tmp;
1414
1415 tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0);
1416 if (IS_ERR(tmp)) {
1417 kfree_skb(skb);
1418 return PTR_ERR(tmp);
1419 }
1420
1421 *frag = tmp;
1422
1423 len -= tmp->len;
1424
1425 skb->len += tmp->len;
1426 skb->data_len += tmp->len;
1427
1428 BT_DBG("frag %p len %d", *frag, tmp->len);
1429
1430 frag = &(*frag)->next;
1431 }
1432
1433 lock_sock(sk);
1434
1435 if (sk->sk_state == BT_CONNECTED)
1436 err = iso_send_frame(sk, skb, &sockc);
1437 else
1438 err = -ENOTCONN;
1439
1440 release_sock(sk);
1441
1442 if (err < 0)
1443 kfree_skb(skb);
1444 return err;
1445 }
1446
iso_conn_defer_accept(struct hci_conn * conn)1447 static void iso_conn_defer_accept(struct hci_conn *conn)
1448 {
1449 struct hci_cp_le_accept_cis cp;
1450 struct hci_dev *hdev = conn->hdev;
1451
1452 BT_DBG("conn %p", conn);
1453
1454 conn->state = BT_CONFIG;
1455
1456 cp.handle = cpu_to_le16(conn->handle);
1457
1458 hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp);
1459 }
1460
iso_conn_big_sync(struct sock * sk)1461 static void iso_conn_big_sync(struct sock *sk)
1462 {
1463 int err;
1464 struct hci_dev *hdev;
1465
1466 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src,
1467 iso_pi(sk)->src_type);
1468
1469 if (!hdev)
1470 return;
1471
1472 /* hci_le_big_create_sync requires hdev lock to be held, since
1473 * it enqueues the HCI LE BIG Create Sync command via
1474 * hci_cmd_sync_queue_once, which checks hdev flags that might
1475 * change.
1476 */
1477 hci_dev_lock(hdev);
1478 lock_sock(sk);
1479
1480 if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) {
1481 err = hci_conn_big_create_sync(hdev, iso_pi(sk)->conn->hcon,
1482 &iso_pi(sk)->qos,
1483 iso_pi(sk)->sync_handle,
1484 iso_pi(sk)->bc_num_bis,
1485 iso_pi(sk)->bc_bis);
1486 if (err)
1487 bt_dev_err(hdev, "hci_big_create_sync: %d", err);
1488 }
1489
1490 release_sock(sk);
1491 hci_dev_unlock(hdev);
1492 }
1493
iso_sock_recvmsg(struct socket * sock,struct msghdr * msg,size_t len,int flags)1494 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg,
1495 size_t len, int flags)
1496 {
1497 struct sock *sk = sock->sk;
1498 struct iso_pinfo *pi = iso_pi(sk);
1499 bool early_ret = false;
1500 int err = 0;
1501
1502 BT_DBG("sk %p", sk);
1503
1504 if (unlikely(flags & MSG_ERRQUEUE))
1505 return sock_recv_errqueue(sk, msg, len, SOL_BLUETOOTH,
1506 BT_SCM_ERROR);
1507
1508 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) {
1509 sock_hold(sk);
1510 lock_sock(sk);
1511
1512 switch (sk->sk_state) {
1513 case BT_CONNECT2:
1514 if (test_bit(BT_SK_PA_SYNC, &pi->flags)) {
1515 release_sock(sk);
1516 iso_conn_big_sync(sk);
1517 lock_sock(sk);
1518
1519 sk->sk_state = BT_LISTEN;
1520 } else {
1521 iso_conn_defer_accept(pi->conn->hcon);
1522 sk->sk_state = BT_CONFIG;
1523 }
1524
1525 early_ret = true;
1526 break;
1527 case BT_CONNECTED:
1528 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) {
1529 release_sock(sk);
1530 iso_conn_big_sync(sk);
1531 lock_sock(sk);
1532
1533 sk->sk_state = BT_LISTEN;
1534 early_ret = true;
1535 }
1536
1537 break;
1538 case BT_CONNECT:
1539 release_sock(sk);
1540 err = iso_connect_cis(sk);
1541 lock_sock(sk);
1542
1543 early_ret = true;
1544 break;
1545 default:
1546 break;
1547 }
1548
1549 release_sock(sk);
1550 sock_put(sk);
1551
1552 if (early_ret)
1553 return err;
1554 }
1555
1556 return bt_sock_recvmsg(sock, msg, len, flags);
1557 }
1558
check_io_qos(struct bt_iso_io_qos * qos)1559 static bool check_io_qos(struct bt_iso_io_qos *qos)
1560 {
1561 /* If no PHY is enable SDU must be 0 */
1562 if (!qos->phy && qos->sdu)
1563 return false;
1564
1565 if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff))
1566 return false;
1567
1568 if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0))
1569 return false;
1570
1571 if (qos->phy > BT_ISO_PHY_ANY)
1572 return false;
1573
1574 return true;
1575 }
1576
check_ucast_qos(struct bt_iso_qos * qos)1577 static bool check_ucast_qos(struct bt_iso_qos *qos)
1578 {
1579 if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET)
1580 return false;
1581
1582 if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET)
1583 return false;
1584
1585 if (qos->ucast.sca > 0x07)
1586 return false;
1587
1588 if (qos->ucast.packing > 0x01)
1589 return false;
1590
1591 if (qos->ucast.framing > 0x01)
1592 return false;
1593
1594 if (!check_io_qos(&qos->ucast.in))
1595 return false;
1596
1597 if (!check_io_qos(&qos->ucast.out))
1598 return false;
1599
1600 return true;
1601 }
1602
check_bcast_qos(struct bt_iso_qos * qos)1603 static bool check_bcast_qos(struct bt_iso_qos *qos)
1604 {
1605 if (!qos->bcast.sync_factor)
1606 qos->bcast.sync_factor = 0x01;
1607
1608 if (qos->bcast.packing > 0x01)
1609 return false;
1610
1611 if (qos->bcast.framing > 0x01)
1612 return false;
1613
1614 if (!check_io_qos(&qos->bcast.in))
1615 return false;
1616
1617 if (!check_io_qos(&qos->bcast.out))
1618 return false;
1619
1620 if (qos->bcast.encryption > 0x01)
1621 return false;
1622
1623 if (qos->bcast.options > 0x07)
1624 return false;
1625
1626 if (qos->bcast.skip > 0x01f3)
1627 return false;
1628
1629 if (!qos->bcast.sync_timeout)
1630 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1631
1632 if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000)
1633 return false;
1634
1635 if (qos->bcast.sync_cte_type > 0x1f)
1636 return false;
1637
1638 if (qos->bcast.mse > 0x1f)
1639 return false;
1640
1641 if (!qos->bcast.timeout)
1642 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT;
1643
1644 if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000)
1645 return false;
1646
1647 return true;
1648 }
1649
iso_sock_setsockopt(struct socket * sock,int level,int optname,sockptr_t optval,unsigned int optlen)1650 static int iso_sock_setsockopt(struct socket *sock, int level, int optname,
1651 sockptr_t optval, unsigned int optlen)
1652 {
1653 struct sock *sk = sock->sk;
1654 int err = 0;
1655 struct bt_iso_qos qos = default_qos;
1656 u32 opt;
1657
1658 BT_DBG("sk %p", sk);
1659
1660 lock_sock(sk);
1661
1662 switch (optname) {
1663 case BT_DEFER_SETUP:
1664 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1665 err = -EINVAL;
1666 break;
1667 }
1668
1669 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1670 if (err)
1671 break;
1672
1673 if (opt)
1674 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1675 else
1676 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
1677 break;
1678
1679 case BT_PKT_STATUS:
1680 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1681 if (err)
1682 break;
1683
1684 if (opt)
1685 set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1686 else
1687 clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags);
1688 break;
1689
1690 case BT_PKT_SEQNUM:
1691 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen);
1692 if (err)
1693 break;
1694
1695 if (opt)
1696 set_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags);
1697 else
1698 clear_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags);
1699 break;
1700
1701 case BT_ISO_QOS:
1702 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1703 sk->sk_state != BT_CONNECT2 &&
1704 (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) ||
1705 sk->sk_state != BT_CONNECTED)) {
1706 err = -EINVAL;
1707 break;
1708 }
1709
1710 err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen);
1711 if (err)
1712 break;
1713
1714 iso_pi(sk)->qos = qos;
1715 iso_pi(sk)->qos_user_set = true;
1716
1717 break;
1718
1719 case BT_ISO_BASE:
1720 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND &&
1721 sk->sk_state != BT_CONNECT2) {
1722 err = -EINVAL;
1723 break;
1724 }
1725
1726 if (optlen > sizeof(iso_pi(sk)->base)) {
1727 err = -EINVAL;
1728 break;
1729 }
1730
1731 err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval,
1732 optlen);
1733 if (err)
1734 break;
1735
1736 iso_pi(sk)->base_len = optlen;
1737
1738 break;
1739
1740 default:
1741 err = -ENOPROTOOPT;
1742 break;
1743 }
1744
1745 release_sock(sk);
1746 return err;
1747 }
1748
iso_sock_getsockopt(struct socket * sock,int level,int optname,char __user * optval,int __user * optlen)1749 static int iso_sock_getsockopt(struct socket *sock, int level, int optname,
1750 char __user *optval, int __user *optlen)
1751 {
1752 struct sock *sk = sock->sk;
1753 int len, err = 0;
1754 struct bt_iso_qos *qos;
1755 u8 base_len;
1756 u8 *base;
1757
1758 BT_DBG("sk %p", sk);
1759
1760 if (get_user(len, optlen))
1761 return -EFAULT;
1762
1763 lock_sock(sk);
1764
1765 switch (optname) {
1766 case BT_DEFER_SETUP:
1767 if (sk->sk_state == BT_CONNECTED) {
1768 err = -EINVAL;
1769 break;
1770 }
1771
1772 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
1773 (u32 __user *)optval))
1774 err = -EFAULT;
1775
1776 break;
1777
1778 case BT_PKT_STATUS:
1779 if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags),
1780 (int __user *)optval))
1781 err = -EFAULT;
1782 break;
1783
1784 case BT_ISO_QOS:
1785 qos = iso_sock_get_qos(sk);
1786
1787 len = min_t(unsigned int, len, sizeof(*qos));
1788 if (copy_to_user(optval, qos, len))
1789 err = -EFAULT;
1790
1791 break;
1792
1793 case BT_ISO_BASE:
1794 if (sk->sk_state == BT_CONNECTED &&
1795 !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) {
1796 base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len;
1797 base = iso_pi(sk)->conn->hcon->le_per_adv_data;
1798 } else {
1799 base_len = iso_pi(sk)->base_len;
1800 base = iso_pi(sk)->base;
1801 }
1802
1803 len = min_t(unsigned int, len, base_len);
1804 if (copy_to_user(optval, base, len))
1805 err = -EFAULT;
1806 if (put_user(len, optlen))
1807 err = -EFAULT;
1808
1809 break;
1810
1811 default:
1812 err = -ENOPROTOOPT;
1813 break;
1814 }
1815
1816 release_sock(sk);
1817 return err;
1818 }
1819
iso_sock_shutdown(struct socket * sock,int how)1820 static int iso_sock_shutdown(struct socket *sock, int how)
1821 {
1822 struct sock *sk = sock->sk;
1823 int err = 0;
1824
1825 BT_DBG("sock %p, sk %p, how %d", sock, sk, how);
1826
1827 if (!sk)
1828 return 0;
1829
1830 sock_hold(sk);
1831 lock_sock(sk);
1832
1833 switch (how) {
1834 case SHUT_RD:
1835 if (sk->sk_shutdown & RCV_SHUTDOWN)
1836 goto unlock;
1837 sk->sk_shutdown |= RCV_SHUTDOWN;
1838 break;
1839 case SHUT_WR:
1840 if (sk->sk_shutdown & SEND_SHUTDOWN)
1841 goto unlock;
1842 sk->sk_shutdown |= SEND_SHUTDOWN;
1843 break;
1844 case SHUT_RDWR:
1845 if (sk->sk_shutdown & SHUTDOWN_MASK)
1846 goto unlock;
1847 sk->sk_shutdown |= SHUTDOWN_MASK;
1848 break;
1849 }
1850
1851 iso_sock_clear_timer(sk);
1852 __iso_sock_close(sk);
1853
1854 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
1855 !(current->flags & PF_EXITING))
1856 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1857
1858 unlock:
1859 release_sock(sk);
1860 sock_put(sk);
1861
1862 return err;
1863 }
1864
iso_sock_release(struct socket * sock)1865 static int iso_sock_release(struct socket *sock)
1866 {
1867 struct sock *sk = sock->sk;
1868 int err = 0;
1869
1870 BT_DBG("sock %p, sk %p", sock, sk);
1871
1872 if (!sk)
1873 return 0;
1874
1875 iso_sock_close(sk);
1876
1877 if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) &&
1878 !(current->flags & PF_EXITING)) {
1879 lock_sock(sk);
1880 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1881 release_sock(sk);
1882 }
1883
1884 sock_orphan(sk);
1885 iso_sock_kill(sk);
1886 return err;
1887 }
1888
iso_sock_ready(struct sock * sk)1889 static void iso_sock_ready(struct sock *sk)
1890 {
1891 BT_DBG("sk %p", sk);
1892
1893 if (!sk)
1894 return;
1895
1896 lock_sock(sk);
1897 iso_sock_clear_timer(sk);
1898 sk->sk_state = BT_CONNECTED;
1899 sk->sk_state_change(sk);
1900 release_sock(sk);
1901 }
1902
iso_match_big(struct sock * sk,void * data)1903 static bool iso_match_big(struct sock *sk, void *data)
1904 {
1905 struct hci_evt_le_big_sync_established *ev = data;
1906
1907 return ev->handle == iso_pi(sk)->qos.bcast.big;
1908 }
1909
iso_match_big_hcon(struct sock * sk,void * data)1910 static bool iso_match_big_hcon(struct sock *sk, void *data)
1911 {
1912 struct hci_conn *hcon = data;
1913
1914 return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big;
1915 }
1916
iso_match_pa_sync_flag(struct sock * sk,void * data)1917 static bool iso_match_pa_sync_flag(struct sock *sk, void *data)
1918 {
1919 return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
1920 }
1921
iso_conn_ready(struct iso_conn * conn)1922 static void iso_conn_ready(struct iso_conn *conn)
1923 {
1924 struct sock *parent = NULL;
1925 struct sock *sk = conn->sk;
1926 struct hci_ev_le_big_sync_established *ev = NULL;
1927 struct hci_ev_le_pa_sync_established *ev2 = NULL;
1928 struct hci_ev_le_per_adv_report *ev3 = NULL;
1929 struct hci_conn *hcon;
1930
1931 BT_DBG("conn %p", conn);
1932
1933 if (sk) {
1934 iso_sock_ready(conn->sk);
1935 } else {
1936 hcon = conn->hcon;
1937 if (!hcon)
1938 return;
1939
1940 if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) {
1941 /* A BIS slave hcon is notified to the ISO layer
1942 * after the Command Complete for the LE Setup
1943 * ISO Data Path command is received. Get the
1944 * parent socket that matches the hcon BIG handle.
1945 */
1946 parent = iso_get_sock(&hcon->src, &hcon->dst,
1947 BT_LISTEN, iso_match_big_hcon,
1948 hcon);
1949 } else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) {
1950 ev = hci_recv_event_data(hcon->hdev,
1951 HCI_EVT_LE_BIG_SYNC_ESTABLISHED);
1952
1953 /* Get reference to PA sync parent socket, if it exists */
1954 parent = iso_get_sock(&hcon->src, &hcon->dst,
1955 BT_LISTEN,
1956 iso_match_pa_sync_flag,
1957 NULL);
1958 if (!parent && ev)
1959 parent = iso_get_sock(&hcon->src,
1960 &hcon->dst,
1961 BT_LISTEN,
1962 iso_match_big, ev);
1963 } else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
1964 ev2 = hci_recv_event_data(hcon->hdev,
1965 HCI_EV_LE_PA_SYNC_ESTABLISHED);
1966 if (ev2)
1967 parent = iso_get_sock(&hcon->src,
1968 &hcon->dst,
1969 BT_LISTEN,
1970 iso_match_sid, ev2);
1971 } else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) {
1972 ev3 = hci_recv_event_data(hcon->hdev,
1973 HCI_EV_LE_PER_ADV_REPORT);
1974 if (ev3)
1975 parent = iso_get_sock(&hcon->src,
1976 &hcon->dst,
1977 BT_LISTEN,
1978 iso_match_sync_handle_pa_report,
1979 ev3);
1980 }
1981
1982 if (!parent)
1983 parent = iso_get_sock(&hcon->src, BDADDR_ANY,
1984 BT_LISTEN, NULL, NULL);
1985
1986 if (!parent)
1987 return;
1988
1989 lock_sock(parent);
1990
1991 sk = iso_sock_alloc(sock_net(parent), NULL,
1992 BTPROTO_ISO, GFP_ATOMIC, 0);
1993 if (!sk) {
1994 release_sock(parent);
1995 return;
1996 }
1997
1998 iso_sock_init(sk, parent);
1999
2000 bacpy(&iso_pi(sk)->src, &hcon->src);
2001
2002 /* Convert from HCI to three-value type */
2003 if (hcon->src_type == ADDR_LE_DEV_PUBLIC)
2004 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC;
2005 else
2006 iso_pi(sk)->src_type = BDADDR_LE_RANDOM;
2007
2008 /* If hcon has no destination address (BDADDR_ANY) it means it
2009 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or
2010 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using
2011 * the parent socket destination address.
2012 */
2013 if (!bacmp(&hcon->dst, BDADDR_ANY)) {
2014 bacpy(&hcon->dst, &iso_pi(parent)->dst);
2015 hcon->dst_type = iso_pi(parent)->dst_type;
2016 }
2017
2018 if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) {
2019 iso_pi(sk)->qos = iso_pi(parent)->qos;
2020 hcon->iso_qos = iso_pi(sk)->qos;
2021 iso_pi(sk)->bc_sid = iso_pi(parent)->bc_sid;
2022 iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis;
2023 memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis,
2024 ISO_MAX_NUM_BIS);
2025 set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags);
2026 }
2027
2028 bacpy(&iso_pi(sk)->dst, &hcon->dst);
2029 iso_pi(sk)->dst_type = hcon->dst_type;
2030 iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle;
2031 memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len);
2032 iso_pi(sk)->base_len = iso_pi(parent)->base_len;
2033
2034 hci_conn_hold(hcon);
2035 iso_chan_add(conn, sk, parent);
2036
2037 if ((ev && ((struct hci_evt_le_big_sync_established *)ev)->status) ||
2038 (ev2 && ev2->status)) {
2039 /* Trigger error signal on child socket */
2040 sk->sk_err = ECONNREFUSED;
2041 sk->sk_error_report(sk);
2042 }
2043
2044 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags))
2045 sk->sk_state = BT_CONNECT2;
2046 else
2047 sk->sk_state = BT_CONNECTED;
2048
2049 /* Wake up parent */
2050 parent->sk_data_ready(parent);
2051
2052 release_sock(parent);
2053 sock_put(parent);
2054 }
2055 }
2056
iso_match_sid(struct sock * sk,void * data)2057 static bool iso_match_sid(struct sock *sk, void *data)
2058 {
2059 struct hci_ev_le_pa_sync_established *ev = data;
2060
2061 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID)
2062 return true;
2063
2064 return ev->sid == iso_pi(sk)->bc_sid;
2065 }
2066
iso_match_sync_handle(struct sock * sk,void * data)2067 static bool iso_match_sync_handle(struct sock *sk, void *data)
2068 {
2069 struct hci_evt_le_big_info_adv_report *ev = data;
2070
2071 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2072 }
2073
iso_match_sync_handle_pa_report(struct sock * sk,void * data)2074 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data)
2075 {
2076 struct hci_ev_le_per_adv_report *ev = data;
2077
2078 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle;
2079 }
2080
2081 /* ----- ISO interface with lower layer (HCI) ----- */
2082
iso_connect_ind(struct hci_dev * hdev,bdaddr_t * bdaddr,__u8 * flags)2083 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags)
2084 {
2085 struct hci_ev_le_pa_sync_established *ev1;
2086 struct hci_evt_le_big_info_adv_report *ev2;
2087 struct hci_ev_le_per_adv_report *ev3;
2088 struct sock *sk;
2089
2090 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr);
2091
2092 /* Broadcast receiver requires handling of some events before it can
2093 * proceed to establishing a BIG sync:
2094 *
2095 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific
2096 * SID to listen to and once sync is established its handle needs to
2097 * be stored in iso_pi(sk)->sync_handle so it can be matched once
2098 * receiving the BIG Info.
2099 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a
2100 * a BIG Info it attempts to check if there any listening socket with
2101 * the same sync_handle and if it does then attempt to create a sync.
2102 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored
2103 * in iso_pi(sk)->base so it can be passed up to user, in the case of a
2104 * broadcast sink.
2105 */
2106 ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED);
2107 if (ev1) {
2108 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN,
2109 iso_match_sid, ev1);
2110 if (sk && !ev1->status) {
2111 iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle);
2112 iso_pi(sk)->bc_sid = ev1->sid;
2113 }
2114
2115 goto done;
2116 }
2117
2118 ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT);
2119 if (ev2) {
2120 /* Check if BIGInfo report has already been handled */
2121 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECTED,
2122 iso_match_sync_handle, ev2);
2123 if (sk) {
2124 sock_put(sk);
2125 sk = NULL;
2126 goto done;
2127 }
2128
2129 /* Try to get PA sync socket, if it exists */
2130 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECT2,
2131 iso_match_sync_handle, ev2);
2132 if (!sk)
2133 sk = iso_get_sock(&hdev->bdaddr, bdaddr,
2134 BT_LISTEN,
2135 iso_match_sync_handle,
2136 ev2);
2137
2138 if (sk) {
2139 int err;
2140 struct hci_conn *hcon = iso_pi(sk)->conn->hcon;
2141
2142 iso_pi(sk)->qos.bcast.encryption = ev2->encryption;
2143
2144 if (ev2->num_bis < iso_pi(sk)->bc_num_bis)
2145 iso_pi(sk)->bc_num_bis = ev2->num_bis;
2146
2147 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) &&
2148 !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) {
2149 err = hci_conn_big_create_sync(hdev, hcon,
2150 &iso_pi(sk)->qos,
2151 iso_pi(sk)->sync_handle,
2152 iso_pi(sk)->bc_num_bis,
2153 iso_pi(sk)->bc_bis);
2154 if (err) {
2155 bt_dev_err(hdev, "hci_le_big_create_sync: %d",
2156 err);
2157 sock_put(sk);
2158 sk = NULL;
2159 }
2160 }
2161 }
2162
2163 goto done;
2164 }
2165
2166 ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT);
2167 if (ev3) {
2168 size_t base_len = 0;
2169 u8 *base;
2170 struct hci_conn *hcon;
2171
2172 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN,
2173 iso_match_sync_handle_pa_report, ev3);
2174 if (!sk)
2175 goto done;
2176
2177 hcon = iso_pi(sk)->conn->hcon;
2178 if (!hcon)
2179 goto done;
2180
2181 if (ev3->data_status == LE_PA_DATA_TRUNCATED) {
2182 /* The controller was unable to retrieve PA data. */
2183 memset(hcon->le_per_adv_data, 0,
2184 HCI_MAX_PER_AD_TOT_LEN);
2185 hcon->le_per_adv_data_len = 0;
2186 hcon->le_per_adv_data_offset = 0;
2187 goto done;
2188 }
2189
2190 if (hcon->le_per_adv_data_offset + ev3->length >
2191 HCI_MAX_PER_AD_TOT_LEN)
2192 goto done;
2193
2194 memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset,
2195 ev3->data, ev3->length);
2196 hcon->le_per_adv_data_offset += ev3->length;
2197
2198 if (ev3->data_status == LE_PA_DATA_COMPLETE) {
2199 /* All PA data has been received. */
2200 hcon->le_per_adv_data_len =
2201 hcon->le_per_adv_data_offset;
2202 hcon->le_per_adv_data_offset = 0;
2203
2204 /* Extract BASE */
2205 base = eir_get_service_data(hcon->le_per_adv_data,
2206 hcon->le_per_adv_data_len,
2207 EIR_BAA_SERVICE_UUID,
2208 &base_len);
2209
2210 if (!base || base_len > BASE_MAX_LENGTH)
2211 goto done;
2212
2213 memcpy(iso_pi(sk)->base, base, base_len);
2214 iso_pi(sk)->base_len = base_len;
2215 } else {
2216 /* This is a PA data fragment. Keep pa_data_len set to 0
2217 * until all data has been reassembled.
2218 */
2219 hcon->le_per_adv_data_len = 0;
2220 }
2221 } else {
2222 sk = iso_get_sock(&hdev->bdaddr, BDADDR_ANY,
2223 BT_LISTEN, NULL, NULL);
2224 }
2225
2226 done:
2227 if (!sk)
2228 return 0;
2229
2230 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))
2231 *flags |= HCI_PROTO_DEFER;
2232
2233 sock_put(sk);
2234
2235 return HCI_LM_ACCEPT;
2236 }
2237
iso_connect_cfm(struct hci_conn * hcon,__u8 status)2238 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status)
2239 {
2240 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK &&
2241 hcon->type != PA_LINK) {
2242 if (hcon->type != LE_LINK)
2243 return;
2244
2245 /* Check if LE link has failed */
2246 if (status) {
2247 struct hci_link *link, *t;
2248
2249 list_for_each_entry_safe(link, t, &hcon->link_list,
2250 list)
2251 iso_conn_del(link->conn, bt_to_errno(status));
2252
2253 return;
2254 }
2255
2256 /* Create CIS if pending */
2257 hci_le_create_cis_pending(hcon->hdev);
2258 return;
2259 }
2260
2261 BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status);
2262
2263 /* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or
2264 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection
2265 * into the accept queue of the listening socket and wake up
2266 * userspace, to inform the user about the event.
2267 */
2268 if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) ||
2269 test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) {
2270 struct iso_conn *conn;
2271
2272 conn = iso_conn_add(hcon);
2273 if (conn)
2274 iso_conn_ready(conn);
2275 } else {
2276 iso_conn_del(hcon, bt_to_errno(status));
2277 }
2278 }
2279
iso_disconn_cfm(struct hci_conn * hcon,__u8 reason)2280 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason)
2281 {
2282 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK &&
2283 hcon->type != PA_LINK)
2284 return;
2285
2286 BT_DBG("hcon %p reason %d", hcon, reason);
2287
2288 iso_conn_del(hcon, bt_to_errno(reason));
2289 }
2290
iso_recv(struct hci_conn * hcon,struct sk_buff * skb,u16 flags)2291 void iso_recv(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
2292 {
2293 struct iso_conn *conn = hcon->iso_data;
2294 struct skb_shared_hwtstamps *hwts;
2295 __u16 pb, ts, len, sn;
2296
2297 if (!conn)
2298 goto drop;
2299
2300 pb = hci_iso_flags_pb(flags);
2301 ts = hci_iso_flags_ts(flags);
2302
2303 BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts);
2304
2305 switch (pb) {
2306 case ISO_START:
2307 case ISO_SINGLE:
2308 if (conn->rx_len) {
2309 BT_ERR("Unexpected start frame (len %d)", skb->len);
2310 kfree_skb(conn->rx_skb);
2311 conn->rx_skb = NULL;
2312 conn->rx_len = 0;
2313 }
2314
2315 if (ts) {
2316 struct hci_iso_ts_data_hdr *hdr;
2317
2318 hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE);
2319 if (!hdr) {
2320 BT_ERR("Frame is too short (len %d)", skb->len);
2321 goto drop;
2322 }
2323
2324 /* Record the timestamp to skb */
2325 hwts = skb_hwtstamps(skb);
2326 hwts->hwtstamp = us_to_ktime(le32_to_cpu(hdr->ts));
2327
2328 sn = __le16_to_cpu(hdr->sn);
2329 len = __le16_to_cpu(hdr->slen);
2330 } else {
2331 struct hci_iso_data_hdr *hdr;
2332
2333 hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE);
2334 if (!hdr) {
2335 BT_ERR("Frame is too short (len %d)", skb->len);
2336 goto drop;
2337 }
2338
2339 sn = __le16_to_cpu(hdr->sn);
2340 len = __le16_to_cpu(hdr->slen);
2341 }
2342
2343 flags = hci_iso_data_flags(len);
2344 len = hci_iso_data_len(len);
2345
2346 BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x sn %d",
2347 len, skb->len, flags, sn);
2348
2349 if (len == skb->len) {
2350 /* Complete frame received */
2351 hci_skb_pkt_status(skb) = flags & 0x03;
2352 hci_skb_pkt_seqnum(skb) = sn;
2353 iso_recv_frame(conn, skb);
2354 return;
2355 }
2356
2357 if (pb == ISO_SINGLE) {
2358 BT_ERR("Frame malformed (len %d, expected len %d)",
2359 skb->len, len);
2360 goto drop;
2361 }
2362
2363 if (skb->len > len) {
2364 BT_ERR("Frame is too long (len %d, expected len %d)",
2365 skb->len, len);
2366 goto drop;
2367 }
2368
2369 /* Allocate skb for the complete frame (with header) */
2370 conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL);
2371 if (!conn->rx_skb)
2372 goto drop;
2373
2374 hci_skb_pkt_status(conn->rx_skb) = flags & 0x03;
2375 hci_skb_pkt_seqnum(conn->rx_skb) = sn;
2376 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2377 skb->len);
2378 conn->rx_len = len - skb->len;
2379
2380 /* Copy hw timestamp from skb to rx_skb if present */
2381 if (ts) {
2382 hwts = skb_hwtstamps(conn->rx_skb);
2383 hwts->hwtstamp = skb_hwtstamps(skb)->hwtstamp;
2384 }
2385
2386 break;
2387
2388 case ISO_CONT:
2389 BT_DBG("Cont: frag len %d (expecting %d)", skb->len,
2390 conn->rx_len);
2391
2392 if (!conn->rx_len) {
2393 BT_ERR("Unexpected continuation frame (len %d)",
2394 skb->len);
2395 goto drop;
2396 }
2397
2398 if (skb->len > conn->rx_len) {
2399 BT_ERR("Fragment is too long (len %d, expected %d)",
2400 skb->len, conn->rx_len);
2401 kfree_skb(conn->rx_skb);
2402 conn->rx_skb = NULL;
2403 conn->rx_len = 0;
2404 goto drop;
2405 }
2406
2407 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2408 skb->len);
2409 conn->rx_len -= skb->len;
2410 return;
2411
2412 case ISO_END:
2413 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
2414 skb->len);
2415 conn->rx_len -= skb->len;
2416
2417 if (!conn->rx_len) {
2418 struct sk_buff *rx_skb = conn->rx_skb;
2419
2420 /* Complete frame received. iso_recv_frame
2421 * takes ownership of the skb so set the global
2422 * rx_skb pointer to NULL first.
2423 */
2424 conn->rx_skb = NULL;
2425 iso_recv_frame(conn, rx_skb);
2426 }
2427 break;
2428 }
2429
2430 drop:
2431 kfree_skb(skb);
2432 }
2433
2434 static struct hci_cb iso_cb = {
2435 .name = "ISO",
2436 .connect_cfm = iso_connect_cfm,
2437 .disconn_cfm = iso_disconn_cfm,
2438 };
2439
iso_debugfs_show(struct seq_file * f,void * p)2440 static int iso_debugfs_show(struct seq_file *f, void *p)
2441 {
2442 struct sock *sk;
2443
2444 read_lock(&iso_sk_list.lock);
2445
2446 sk_for_each(sk, &iso_sk_list.head) {
2447 seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src,
2448 &iso_pi(sk)->dst, sk->sk_state);
2449 }
2450
2451 read_unlock(&iso_sk_list.lock);
2452
2453 return 0;
2454 }
2455
2456 DEFINE_SHOW_ATTRIBUTE(iso_debugfs);
2457
2458 static struct dentry *iso_debugfs;
2459
2460 static const struct proto_ops iso_sock_ops = {
2461 .family = PF_BLUETOOTH,
2462 .owner = THIS_MODULE,
2463 .release = iso_sock_release,
2464 .bind = iso_sock_bind,
2465 .connect = iso_sock_connect,
2466 .listen = iso_sock_listen,
2467 .accept = iso_sock_accept,
2468 .getname = iso_sock_getname,
2469 .sendmsg = iso_sock_sendmsg,
2470 .recvmsg = iso_sock_recvmsg,
2471 .poll = bt_sock_poll,
2472 .ioctl = bt_sock_ioctl,
2473 .mmap = sock_no_mmap,
2474 .socketpair = sock_no_socketpair,
2475 .shutdown = iso_sock_shutdown,
2476 .setsockopt = iso_sock_setsockopt,
2477 .getsockopt = iso_sock_getsockopt
2478 };
2479
2480 static const struct net_proto_family iso_sock_family_ops = {
2481 .family = PF_BLUETOOTH,
2482 .owner = THIS_MODULE,
2483 .create = iso_sock_create,
2484 };
2485
2486 static bool iso_inited;
2487
iso_enabled(void)2488 bool iso_enabled(void)
2489 {
2490 return iso_inited;
2491 }
2492
iso_init(void)2493 int iso_init(void)
2494 {
2495 int err;
2496
2497 BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr));
2498
2499 if (iso_inited)
2500 return -EALREADY;
2501
2502 err = proto_register(&iso_proto, 0);
2503 if (err < 0)
2504 return err;
2505
2506 err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops);
2507 if (err < 0) {
2508 BT_ERR("ISO socket registration failed");
2509 goto error;
2510 }
2511
2512 err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL);
2513 if (err < 0) {
2514 BT_ERR("Failed to create ISO proc file");
2515 bt_sock_unregister(BTPROTO_ISO);
2516 goto error;
2517 }
2518
2519 BT_INFO("ISO socket layer initialized");
2520
2521 hci_register_cb(&iso_cb);
2522
2523 if (!IS_ERR_OR_NULL(bt_debugfs))
2524 iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs,
2525 NULL, &iso_debugfs_fops);
2526
2527 iso_inited = true;
2528
2529 return 0;
2530
2531 error:
2532 proto_unregister(&iso_proto);
2533 return err;
2534 }
2535
iso_exit(void)2536 int iso_exit(void)
2537 {
2538 if (!iso_inited)
2539 return -EALREADY;
2540
2541 bt_procfs_cleanup(&init_net, "iso");
2542
2543 debugfs_remove(iso_debugfs);
2544 iso_debugfs = NULL;
2545
2546 hci_unregister_cb(&iso_cb);
2547
2548 bt_sock_unregister(BTPROTO_ISO);
2549
2550 proto_unregister(&iso_proto);
2551
2552 iso_inited = false;
2553
2554 return 0;
2555 }
2556