1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * BlueZ - Bluetooth protocol stack for Linux 4 * 5 * Copyright (C) 2022 Intel Corporation 6 * Copyright 2023-2024 NXP 7 */ 8 9 #include <linux/module.h> 10 #include <linux/debugfs.h> 11 #include <linux/seq_file.h> 12 #include <linux/sched/signal.h> 13 14 #include <net/bluetooth/bluetooth.h> 15 #include <net/bluetooth/hci_core.h> 16 #include <net/bluetooth/iso.h> 17 #include "eir.h" 18 19 static const struct proto_ops iso_sock_ops; 20 21 static struct bt_sock_list iso_sk_list = { 22 .lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock) 23 }; 24 25 /* ---- ISO connections ---- */ 26 struct iso_conn { 27 struct hci_conn *hcon; 28 29 /* @lock: spinlock protecting changes to iso_conn fields */ 30 spinlock_t lock; 31 struct sock *sk; 32 33 struct delayed_work timeout_work; 34 35 struct sk_buff *rx_skb; 36 __u32 rx_len; 37 __u16 tx_sn; 38 struct kref ref; 39 }; 40 41 #define iso_conn_lock(c) spin_lock(&(c)->lock) 42 #define iso_conn_unlock(c) spin_unlock(&(c)->lock) 43 44 static void iso_sock_close(struct sock *sk); 45 static void iso_sock_kill(struct sock *sk); 46 47 /* ----- ISO socket info ----- */ 48 #define iso_pi(sk) ((struct iso_pinfo *)sk) 49 50 #define EIR_SERVICE_DATA_LENGTH 4 51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH) 52 #define EIR_BAA_SERVICE_UUID 0x1851 53 54 /* iso_pinfo flags values */ 55 enum { 56 BT_SK_BIG_SYNC, 57 BT_SK_PA_SYNC, 58 }; 59 60 struct iso_pinfo { 61 struct bt_sock bt; 62 bdaddr_t src; 63 __u8 src_type; 64 bdaddr_t dst; 65 __u8 dst_type; 66 __u8 bc_sid; 67 __u8 bc_num_bis; 68 __u8 bc_bis[ISO_MAX_NUM_BIS]; 69 __u16 sync_handle; 70 unsigned long flags; 71 struct bt_iso_qos qos; 72 bool qos_user_set; 73 __u8 base_len; 74 __u8 base[BASE_MAX_LENGTH]; 75 struct iso_conn *conn; 76 }; 77 78 static struct bt_iso_qos default_qos; 79 80 static bool check_ucast_qos(struct bt_iso_qos *qos); 81 static bool check_bcast_qos(struct bt_iso_qos *qos); 82 static bool iso_match_sid(struct sock *sk, void *data); 83 static bool iso_match_sid_past(struct sock *sk, void *data); 84 static bool iso_match_sync_handle(struct sock *sk, void *data); 85 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data); 86 static void iso_sock_disconn(struct sock *sk); 87 88 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data); 89 90 static struct sock *iso_get_sock(struct hci_dev *hdev, bdaddr_t *src, 91 bdaddr_t *dst, enum bt_sock_state state, 92 iso_sock_match_t match, void *data); 93 94 /* ---- ISO timers ---- */ 95 #define ISO_CONN_TIMEOUT secs_to_jiffies(20) 96 #define ISO_DISCONN_TIMEOUT secs_to_jiffies(2) 97 98 static void iso_conn_free(struct kref *ref) 99 { 100 struct iso_conn *conn = container_of(ref, struct iso_conn, ref); 101 102 BT_DBG("conn %p", conn); 103 104 if (conn->sk) 105 iso_pi(conn->sk)->conn = NULL; 106 107 if (conn->hcon) { 108 conn->hcon->iso_data = NULL; 109 hci_conn_drop(conn->hcon); 110 } 111 112 /* Ensure no more work items will run since hci_conn has been dropped */ 113 disable_delayed_work_sync(&conn->timeout_work); 114 115 kfree_skb(conn->rx_skb); 116 117 kfree(conn); 118 } 119 120 static void iso_conn_put(struct iso_conn *conn) 121 { 122 if (!conn) 123 return; 124 125 BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref)); 126 127 kref_put(&conn->ref, iso_conn_free); 128 } 129 130 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn) 131 { 132 if (!conn) 133 return NULL; 134 135 BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref)); 136 137 if (!kref_get_unless_zero(&conn->ref)) 138 return NULL; 139 140 return conn; 141 } 142 143 static struct sock *iso_sock_hold(struct iso_conn *conn) 144 { 145 if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk)) 146 return NULL; 147 148 sock_hold(conn->sk); 149 150 return conn->sk; 151 } 152 153 static void iso_sock_timeout(struct work_struct *work) 154 { 155 struct iso_conn *conn = container_of(work, struct iso_conn, 156 timeout_work.work); 157 struct sock *sk; 158 159 conn = iso_conn_hold_unless_zero(conn); 160 if (!conn) 161 return; 162 163 iso_conn_lock(conn); 164 sk = iso_sock_hold(conn); 165 iso_conn_unlock(conn); 166 iso_conn_put(conn); 167 168 if (!sk) 169 return; 170 171 BT_DBG("sock %p state %d", sk, sk->sk_state); 172 173 lock_sock(sk); 174 sk->sk_err = ETIMEDOUT; 175 sk->sk_state_change(sk); 176 release_sock(sk); 177 sock_put(sk); 178 } 179 180 static void iso_sock_set_timer(struct sock *sk, long timeout) 181 { 182 if (!iso_pi(sk)->conn) 183 return; 184 185 BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout); 186 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 187 schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout); 188 } 189 190 static void iso_sock_clear_timer(struct sock *sk) 191 { 192 if (!iso_pi(sk)->conn) 193 return; 194 195 BT_DBG("sock %p state %d", sk, sk->sk_state); 196 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 197 } 198 199 /* ---- ISO connections ---- */ 200 static struct iso_conn *iso_conn_add(struct hci_conn *hcon) 201 { 202 struct iso_conn *conn = hcon->iso_data; 203 204 conn = iso_conn_hold_unless_zero(conn); 205 if (conn) { 206 if (!conn->hcon) { 207 iso_conn_lock(conn); 208 conn->hcon = hcon; 209 iso_conn_unlock(conn); 210 } 211 iso_conn_put(conn); 212 return conn; 213 } 214 215 conn = kzalloc_obj(*conn); 216 if (!conn) 217 return NULL; 218 219 kref_init(&conn->ref); 220 spin_lock_init(&conn->lock); 221 INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout); 222 223 hcon->iso_data = conn; 224 conn->hcon = hcon; 225 conn->tx_sn = 0; 226 227 BT_DBG("hcon %p conn %p", hcon, conn); 228 229 return conn; 230 } 231 232 /* Delete channel. Must be called on the locked socket. */ 233 static void iso_chan_del(struct sock *sk, int err) 234 { 235 struct iso_conn *conn; 236 struct sock *parent; 237 238 conn = iso_pi(sk)->conn; 239 iso_pi(sk)->conn = NULL; 240 241 BT_DBG("sk %p, conn %p, err %d", sk, conn, err); 242 243 if (conn) { 244 iso_conn_lock(conn); 245 conn->sk = NULL; 246 iso_conn_unlock(conn); 247 iso_conn_put(conn); 248 } 249 250 sk->sk_state = BT_CLOSED; 251 sk->sk_err = err; 252 253 parent = bt_sk(sk)->parent; 254 if (parent) { 255 bt_accept_unlink(sk); 256 parent->sk_data_ready(parent); 257 } else { 258 sk->sk_state_change(sk); 259 } 260 261 sock_set_flag(sk, SOCK_ZAPPED); 262 } 263 264 static void iso_conn_del(struct hci_conn *hcon, int err) 265 { 266 struct iso_conn *conn = hcon->iso_data; 267 struct sock *sk; 268 269 conn = iso_conn_hold_unless_zero(conn); 270 if (!conn) 271 return; 272 273 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err); 274 275 /* Kill socket */ 276 iso_conn_lock(conn); 277 sk = iso_sock_hold(conn); 278 iso_conn_unlock(conn); 279 iso_conn_put(conn); 280 281 if (!sk) { 282 iso_conn_put(conn); 283 return; 284 } 285 286 lock_sock(sk); 287 iso_sock_clear_timer(sk); 288 iso_chan_del(sk, err); 289 release_sock(sk); 290 sock_put(sk); 291 } 292 293 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk, 294 struct sock *parent) 295 { 296 BT_DBG("conn %p", conn); 297 298 if (iso_pi(sk)->conn == conn && conn->sk == sk) 299 return 0; 300 301 if (conn->sk) { 302 BT_ERR("conn->sk already set"); 303 return -EBUSY; 304 } 305 306 iso_pi(sk)->conn = conn; 307 conn->sk = sk; 308 309 if (parent) 310 bt_accept_enqueue(parent, sk, true); 311 312 return 0; 313 } 314 315 static int iso_chan_add(struct iso_conn *conn, struct sock *sk, 316 struct sock *parent) 317 { 318 int err; 319 320 iso_conn_lock(conn); 321 err = __iso_chan_add(conn, sk, parent); 322 iso_conn_unlock(conn); 323 324 return err; 325 } 326 327 static inline u8 le_addr_type(u8 bdaddr_type) 328 { 329 if (bdaddr_type == BDADDR_LE_PUBLIC) 330 return ADDR_LE_DEV_PUBLIC; 331 else 332 return ADDR_LE_DEV_RANDOM; 333 } 334 335 static int iso_connect_bis(struct sock *sk) 336 { 337 struct iso_conn *conn; 338 struct hci_conn *hcon; 339 struct hci_dev *hdev; 340 int err; 341 342 BT_DBG("%pMR (SID 0x%2.2x)", &iso_pi(sk)->src, iso_pi(sk)->bc_sid); 343 344 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 345 iso_pi(sk)->src_type); 346 if (!hdev) 347 return -EHOSTUNREACH; 348 349 hci_dev_lock(hdev); 350 lock_sock(sk); 351 352 if (!bis_capable(hdev)) { 353 err = -EOPNOTSUPP; 354 goto unlock; 355 } 356 357 /* Fail if user set invalid QoS */ 358 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 359 iso_pi(sk)->qos = default_qos; 360 err = -EINVAL; 361 goto unlock; 362 } 363 364 /* Fail if out PHYs are marked as disabled */ 365 if (!iso_pi(sk)->qos.bcast.out.phys) { 366 err = -EINVAL; 367 goto unlock; 368 } 369 370 /* Just bind if DEFER_SETUP has been set */ 371 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 372 hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst, iso_pi(sk)->bc_sid, 373 &iso_pi(sk)->qos, iso_pi(sk)->base_len, 374 iso_pi(sk)->base, 375 READ_ONCE(sk->sk_sndtimeo)); 376 if (IS_ERR(hcon)) { 377 err = PTR_ERR(hcon); 378 goto unlock; 379 } 380 } else { 381 hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst, 382 le_addr_type(iso_pi(sk)->dst_type), 383 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos, 384 iso_pi(sk)->base_len, iso_pi(sk)->base, 385 READ_ONCE(sk->sk_sndtimeo)); 386 if (IS_ERR(hcon)) { 387 err = PTR_ERR(hcon); 388 goto unlock; 389 } 390 391 /* Update SID if it was not set */ 392 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID) 393 iso_pi(sk)->bc_sid = hcon->sid; 394 } 395 396 conn = iso_conn_add(hcon); 397 if (!conn) { 398 hci_conn_drop(hcon); 399 err = -ENOMEM; 400 goto unlock; 401 } 402 403 err = iso_chan_add(conn, sk, NULL); 404 if (err) 405 goto unlock; 406 407 /* Update source addr of the socket */ 408 bacpy(&iso_pi(sk)->src, &hcon->src); 409 410 if (hcon->state == BT_CONNECTED) { 411 iso_sock_clear_timer(sk); 412 sk->sk_state = BT_CONNECTED; 413 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 414 iso_sock_clear_timer(sk); 415 sk->sk_state = BT_CONNECT; 416 } else { 417 sk->sk_state = BT_CONNECT; 418 iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo)); 419 } 420 421 unlock: 422 release_sock(sk); 423 hci_dev_unlock(hdev); 424 hci_dev_put(hdev); 425 return err; 426 } 427 428 static int iso_connect_cis(struct sock *sk) 429 { 430 struct iso_conn *conn; 431 struct hci_conn *hcon; 432 struct hci_dev *hdev; 433 int err; 434 435 BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst); 436 437 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 438 iso_pi(sk)->src_type); 439 if (!hdev) 440 return -EHOSTUNREACH; 441 442 hci_dev_lock(hdev); 443 lock_sock(sk); 444 445 if (!cis_central_capable(hdev)) { 446 err = -EOPNOTSUPP; 447 goto unlock; 448 } 449 450 /* Fail if user set invalid QoS */ 451 if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) { 452 iso_pi(sk)->qos = default_qos; 453 err = -EINVAL; 454 goto unlock; 455 } 456 457 /* Fail if either PHYs are marked as disabled */ 458 if (!iso_pi(sk)->qos.ucast.in.phys && !iso_pi(sk)->qos.ucast.out.phys) { 459 err = -EINVAL; 460 goto unlock; 461 } 462 463 /* Check if there are available buffers for output/TX. */ 464 if (iso_pi(sk)->qos.ucast.out.sdu && !hci_iso_count(hdev) && 465 (hdev->iso_pkts && !hdev->iso_cnt)) { 466 err = -ENOBUFS; 467 goto unlock; 468 } 469 470 /* Just bind if DEFER_SETUP has been set */ 471 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 472 hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst, 473 le_addr_type(iso_pi(sk)->dst_type), 474 &iso_pi(sk)->qos, 475 READ_ONCE(sk->sk_sndtimeo)); 476 if (IS_ERR(hcon)) { 477 err = PTR_ERR(hcon); 478 goto unlock; 479 } 480 } else { 481 hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst, 482 le_addr_type(iso_pi(sk)->dst_type), 483 &iso_pi(sk)->qos, 484 READ_ONCE(sk->sk_sndtimeo)); 485 if (IS_ERR(hcon)) { 486 err = PTR_ERR(hcon); 487 goto unlock; 488 } 489 } 490 491 conn = iso_conn_add(hcon); 492 if (!conn) { 493 hci_conn_drop(hcon); 494 err = -ENOMEM; 495 goto unlock; 496 } 497 498 err = iso_chan_add(conn, sk, NULL); 499 if (err) 500 goto unlock; 501 502 /* Update source addr of the socket */ 503 bacpy(&iso_pi(sk)->src, &hcon->src); 504 505 if (hcon->state == BT_CONNECTED) { 506 iso_sock_clear_timer(sk); 507 sk->sk_state = BT_CONNECTED; 508 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 509 iso_sock_clear_timer(sk); 510 sk->sk_state = BT_CONNECT; 511 } else { 512 sk->sk_state = BT_CONNECT; 513 iso_sock_set_timer(sk, READ_ONCE(sk->sk_sndtimeo)); 514 } 515 516 unlock: 517 release_sock(sk); 518 hci_dev_unlock(hdev); 519 hci_dev_put(hdev); 520 return err; 521 } 522 523 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk) 524 { 525 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2) 526 return &iso_pi(sk)->conn->hcon->iso_qos; 527 528 return &iso_pi(sk)->qos; 529 } 530 531 static int iso_send_frame(struct sock *sk, struct sk_buff *skb, 532 const struct sockcm_cookie *sockc) 533 { 534 struct iso_conn *conn = iso_pi(sk)->conn; 535 struct bt_iso_qos *qos = iso_sock_get_qos(sk); 536 struct hci_iso_data_hdr *hdr; 537 int len = 0; 538 539 BT_DBG("sk %p len %d", sk, skb->len); 540 541 if (skb->len > qos->ucast.out.sdu) 542 return -EMSGSIZE; 543 544 len = skb->len; 545 546 /* Push ISO data header */ 547 hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE); 548 hdr->sn = cpu_to_le16(conn->tx_sn++); 549 hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len, 550 HCI_ISO_STATUS_VALID)); 551 552 if (sk->sk_state == BT_CONNECTED) { 553 hci_setup_tx_timestamp(skb, 1, sockc); 554 hci_send_iso(conn->hcon, skb); 555 } else { 556 len = -ENOTCONN; 557 } 558 559 return len; 560 } 561 562 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb) 563 { 564 struct sock *sk; 565 566 iso_conn_lock(conn); 567 sk = conn->sk; 568 iso_conn_unlock(conn); 569 570 if (!sk) 571 goto drop; 572 573 BT_DBG("sk %p len %d", sk, skb->len); 574 575 if (sk->sk_state != BT_CONNECTED) 576 goto drop; 577 578 if (!sock_queue_rcv_skb(sk, skb)) 579 return; 580 581 drop: 582 kfree_skb(skb); 583 } 584 585 /* -------- Socket interface ---------- */ 586 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst) 587 { 588 struct sock *sk; 589 590 sk_for_each(sk, &iso_sk_list.head) { 591 if (sk->sk_state != BT_LISTEN) 592 continue; 593 594 if (bacmp(&iso_pi(sk)->dst, dst)) 595 continue; 596 597 if (!bacmp(&iso_pi(sk)->src, src)) 598 return sk; 599 } 600 601 return NULL; 602 } 603 604 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc, 605 __u8 sid) 606 { 607 struct sock *sk; 608 609 sk_for_each(sk, &iso_sk_list.head) { 610 if (sk->sk_state != BT_LISTEN) 611 continue; 612 613 if (bacmp(&iso_pi(sk)->src, ba)) 614 continue; 615 616 if (bacmp(&iso_pi(sk)->dst, bc)) 617 continue; 618 619 if (iso_pi(sk)->bc_sid == sid) 620 return sk; 621 } 622 623 return NULL; 624 } 625 626 /* Find socket in given state: 627 * source bdaddr (Unicast) 628 * destination bdaddr (Broadcast only) 629 * match func - pass NULL to ignore 630 * match func data - pass -1 to ignore 631 * Returns closest match. 632 */ 633 static struct sock *iso_get_sock(struct hci_dev *hdev, bdaddr_t *src, 634 bdaddr_t *dst, enum bt_sock_state state, 635 iso_sock_match_t match, void *data) 636 { 637 struct sock *sk = NULL, *sk1 = NULL; 638 639 read_lock(&iso_sk_list.lock); 640 641 sk_for_each(sk, &iso_sk_list.head) { 642 if (sk->sk_state != state) 643 continue; 644 645 /* Match Broadcast destination */ 646 if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst)) { 647 struct smp_irk *irk1, *irk2; 648 649 /* Check if destination is an RPA that we can resolve */ 650 irk1 = hci_find_irk_by_rpa(hdev, dst); 651 if (!irk1) 652 continue; 653 654 /* Match with identity address */ 655 if (bacmp(&iso_pi(sk)->dst, &irk1->bdaddr)) { 656 /* Check if socket destination address is also 657 * an RPA and if the IRK matches. 658 */ 659 irk2 = hci_find_irk_by_rpa(hdev, 660 &iso_pi(sk)->dst); 661 if (!irk2 || irk1 != irk2) 662 continue; 663 } 664 } 665 666 /* Use Match function if provided */ 667 if (match && !match(sk, data)) 668 continue; 669 670 /* Exact match. */ 671 if (!bacmp(&iso_pi(sk)->src, src)) { 672 sock_hold(sk); 673 break; 674 } 675 676 /* Closest match */ 677 if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) { 678 if (sk1) 679 sock_put(sk1); 680 681 sk1 = sk; 682 sock_hold(sk1); 683 } 684 } 685 686 if (sk && sk1) 687 sock_put(sk1); 688 689 read_unlock(&iso_sk_list.lock); 690 691 return sk ? sk : sk1; 692 } 693 694 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src, 695 bdaddr_t *dst, uint8_t big) 696 { 697 struct sock *sk = NULL; 698 699 read_lock(&iso_sk_list.lock); 700 701 sk_for_each(sk, &iso_sk_list.head) { 702 if (match_sk == sk) 703 continue; 704 705 /* Look for sockets that have already been 706 * connected to the BIG 707 */ 708 if (sk->sk_state != BT_CONNECTED && 709 sk->sk_state != BT_CONNECT) 710 continue; 711 712 /* Match Broadcast destination */ 713 if (bacmp(&iso_pi(sk)->dst, dst)) 714 continue; 715 716 /* Match BIG handle */ 717 if (iso_pi(sk)->qos.bcast.big != big) 718 continue; 719 720 /* Match source address */ 721 if (bacmp(&iso_pi(sk)->src, src)) 722 continue; 723 724 sock_hold(sk); 725 break; 726 } 727 728 read_unlock(&iso_sk_list.lock); 729 730 return sk; 731 } 732 733 static void iso_sock_destruct(struct sock *sk) 734 { 735 BT_DBG("sk %p", sk); 736 737 iso_conn_put(iso_pi(sk)->conn); 738 739 skb_queue_purge(&sk->sk_receive_queue); 740 skb_queue_purge(&sk->sk_write_queue); 741 skb_queue_purge(&sk->sk_error_queue); 742 } 743 744 static void iso_sock_cleanup_listen(struct sock *parent) 745 { 746 struct sock *sk; 747 748 BT_DBG("parent %p", parent); 749 750 /* Close not yet accepted channels */ 751 while ((sk = bt_accept_dequeue(parent, NULL))) { 752 iso_sock_close(sk); 753 iso_sock_kill(sk); 754 /* Drop the reference handed back by bt_accept_dequeue(). */ 755 sock_put(sk); 756 } 757 758 /* If listening socket has a hcon, properly disconnect it */ 759 if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) { 760 iso_sock_disconn(parent); 761 return; 762 } 763 764 parent->sk_state = BT_CLOSED; 765 sock_set_flag(parent, SOCK_ZAPPED); 766 } 767 768 /* Kill socket (only if zapped and orphan) 769 * Must be called on unlocked socket. 770 */ 771 static void iso_sock_kill(struct sock *sk) 772 { 773 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket || 774 sock_flag(sk, SOCK_DEAD)) 775 return; 776 777 BT_DBG("sk %p state %d", sk, sk->sk_state); 778 779 /* Sock is dead, so set conn->sk to NULL to avoid possible UAF */ 780 if (iso_pi(sk)->conn) { 781 iso_conn_lock(iso_pi(sk)->conn); 782 iso_pi(sk)->conn->sk = NULL; 783 iso_conn_unlock(iso_pi(sk)->conn); 784 } 785 786 /* Kill poor orphan */ 787 bt_sock_unlink(&iso_sk_list, sk); 788 sock_set_flag(sk, SOCK_DEAD); 789 sock_put(sk); 790 } 791 792 static void iso_sock_disconn(struct sock *sk) 793 { 794 struct sock *bis_sk; 795 struct hci_conn *hcon = iso_pi(sk)->conn->hcon; 796 797 if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) { 798 bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src, 799 &iso_pi(sk)->dst, 800 iso_pi(sk)->qos.bcast.big); 801 802 /* If there are any other connected sockets for the 803 * same BIG, just delete the sk and leave the bis 804 * hcon active, in case later rebinding is needed. 805 */ 806 if (bis_sk) { 807 hcon->state = BT_OPEN; 808 hcon->iso_data = NULL; 809 iso_pi(sk)->conn->hcon = NULL; 810 iso_sock_clear_timer(sk); 811 iso_chan_del(sk, bt_to_errno(hcon->abort_reason)); 812 sock_put(bis_sk); 813 return; 814 } 815 } 816 817 sk->sk_state = BT_DISCONN; 818 iso_conn_lock(iso_pi(sk)->conn); 819 hci_conn_drop(iso_pi(sk)->conn->hcon); 820 iso_pi(sk)->conn->hcon = NULL; 821 iso_conn_unlock(iso_pi(sk)->conn); 822 } 823 824 static void __iso_sock_close(struct sock *sk) 825 { 826 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket); 827 828 switch (sk->sk_state) { 829 case BT_LISTEN: 830 iso_sock_cleanup_listen(sk); 831 break; 832 833 case BT_CONNECT: 834 case BT_CONNECTED: 835 case BT_CONFIG: 836 if (iso_pi(sk)->conn->hcon) 837 iso_sock_disconn(sk); 838 else 839 iso_chan_del(sk, ECONNRESET); 840 break; 841 842 case BT_CONNECT2: 843 if (iso_pi(sk)->conn->hcon && 844 (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) || 845 test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags))) 846 iso_sock_disconn(sk); 847 else 848 iso_chan_del(sk, ECONNRESET); 849 break; 850 case BT_DISCONN: 851 iso_chan_del(sk, ECONNRESET); 852 break; 853 854 default: 855 sock_set_flag(sk, SOCK_ZAPPED); 856 break; 857 } 858 } 859 860 /* Must be called on unlocked socket. */ 861 static void iso_sock_close(struct sock *sk) 862 { 863 iso_sock_clear_timer(sk); 864 lock_sock(sk); 865 __iso_sock_close(sk); 866 release_sock(sk); 867 iso_sock_kill(sk); 868 } 869 870 static void iso_sock_init(struct sock *sk, struct sock *parent) 871 { 872 BT_DBG("sk %p", sk); 873 874 if (parent) { 875 sk->sk_type = parent->sk_type; 876 bt_sk(sk)->flags = bt_sk(parent)->flags; 877 security_sk_clone(parent, sk); 878 } 879 } 880 881 static struct proto iso_proto = { 882 .name = "ISO", 883 .owner = THIS_MODULE, 884 .obj_size = sizeof(struct iso_pinfo) 885 }; 886 887 #define DEFAULT_IO_QOS \ 888 { \ 889 .interval = 10000u, \ 890 .latency = 10u, \ 891 .sdu = 40u, \ 892 .phys = BT_ISO_PHY_2M, \ 893 .rtn = 2u, \ 894 } 895 896 static struct bt_iso_qos default_qos = { 897 .bcast = { 898 .big = BT_ISO_QOS_BIG_UNSET, 899 .bis = BT_ISO_QOS_BIS_UNSET, 900 .sync_factor = 0x01, 901 .packing = 0x00, 902 .framing = 0x00, 903 .in = DEFAULT_IO_QOS, 904 .out = DEFAULT_IO_QOS, 905 .encryption = 0x00, 906 .bcode = {0x00}, 907 .options = 0x00, 908 .skip = 0x0000, 909 .sync_timeout = BT_ISO_SYNC_TIMEOUT, 910 .sync_cte_type = 0x00, 911 .mse = 0x00, 912 .timeout = BT_ISO_SYNC_TIMEOUT, 913 }, 914 }; 915 916 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock, 917 int proto, gfp_t prio, int kern) 918 { 919 struct sock *sk; 920 921 sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern); 922 if (!sk) 923 return NULL; 924 925 sk->sk_destruct = iso_sock_destruct; 926 sk->sk_sndtimeo = ISO_CONN_TIMEOUT; 927 928 /* Set address type as public as default src address is BDADDR_ANY */ 929 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 930 931 iso_pi(sk)->qos = default_qos; 932 iso_pi(sk)->sync_handle = -1; 933 934 bt_sock_link(&iso_sk_list, sk); 935 return sk; 936 } 937 938 static int iso_sock_create(struct net *net, struct socket *sock, int protocol, 939 int kern) 940 { 941 struct sock *sk; 942 943 BT_DBG("sock %p", sock); 944 945 sock->state = SS_UNCONNECTED; 946 947 if (sock->type != SOCK_SEQPACKET) 948 return -ESOCKTNOSUPPORT; 949 950 sock->ops = &iso_sock_ops; 951 952 sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern); 953 if (!sk) 954 return -ENOMEM; 955 956 iso_sock_init(sk, NULL); 957 return 0; 958 } 959 960 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr_unsized *addr, 961 int addr_len) 962 { 963 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 964 struct sock *sk = sock->sk; 965 int i; 966 967 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid, 968 sa->iso_bc->bc_num_bis); 969 970 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) 971 return -EINVAL; 972 973 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr); 974 975 /* Check if the address type is of LE type */ 976 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type)) 977 return -EINVAL; 978 979 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type; 980 981 if (sa->iso_bc->bc_sid > 0x0f && sa->iso_bc->bc_sid != HCI_SID_INVALID) 982 return -EINVAL; 983 984 iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid; 985 986 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) 987 return -EINVAL; 988 989 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 990 991 for (i = 0; i < iso_pi(sk)->bc_num_bis; i++) 992 if (sa->iso_bc->bc_bis[i] < 0x01 || 993 sa->iso_bc->bc_bis[i] > 0x1f) 994 return -EINVAL; 995 996 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 997 iso_pi(sk)->bc_num_bis); 998 999 return 0; 1000 } 1001 1002 /* Must be called on the locked socket. */ 1003 static int iso_sock_rebind_bis(struct sock *sk, struct sockaddr_iso *sa, 1004 int addr_len) 1005 { 1006 int err = 0; 1007 1008 if (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) 1009 return -EBADFD; 1010 1011 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) { 1012 err = -EINVAL; 1013 goto done; 1014 } 1015 1016 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 1017 1018 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) 1019 if (sa->iso_bc->bc_bis[i] < 0x01 || 1020 sa->iso_bc->bc_bis[i] > 0x1f) { 1021 err = -EINVAL; 1022 goto done; 1023 } 1024 1025 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 1026 iso_pi(sk)->bc_num_bis); 1027 1028 done: 1029 return err; 1030 } 1031 1032 static struct hci_dev *iso_conn_get_hdev(struct iso_conn *conn) 1033 { 1034 struct hci_dev *hdev = NULL; 1035 1036 iso_conn_lock(conn); 1037 if (conn->hcon) 1038 hdev = hci_dev_hold(conn->hcon->hdev); 1039 iso_conn_unlock(conn); 1040 1041 return hdev; 1042 } 1043 1044 /* Must be called on the locked socket. */ 1045 static int iso_sock_rebind_bc(struct sock *sk, struct sockaddr_iso *sa, 1046 int addr_len) 1047 { 1048 struct hci_dev *hdev; 1049 struct hci_conn *bis; 1050 int err; 1051 1052 if (sk->sk_type != SOCK_SEQPACKET || !iso_pi(sk)->conn) 1053 return -EINVAL; 1054 1055 /* Check if it is really a Broadcast address being requested */ 1056 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) 1057 return -EINVAL; 1058 1059 /* Check if the address hasn't changed then perhaps only the number of 1060 * bis has changed. 1061 */ 1062 if (!bacmp(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr) || 1063 !bacmp(&sa->iso_bc->bc_bdaddr, BDADDR_ANY)) 1064 return iso_sock_rebind_bis(sk, sa, addr_len); 1065 1066 /* Check if the address type is of LE type */ 1067 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type)) 1068 return -EINVAL; 1069 1070 hdev = iso_conn_get_hdev(iso_pi(sk)->conn); 1071 if (!hdev) 1072 return -EINVAL; 1073 1074 bis = iso_pi(sk)->conn->hcon; 1075 1076 /* Release the socket before lookups since that requires hci_dev_lock 1077 * which shall not be acquired while holding sock_lock for proper 1078 * ordering. 1079 */ 1080 release_sock(sk); 1081 hci_dev_lock(bis->hdev); 1082 lock_sock(sk); 1083 1084 if (!iso_pi(sk)->conn || iso_pi(sk)->conn->hcon != bis) { 1085 /* raced with iso_conn_del() or iso_disconn_sock() */ 1086 err = -ENOTCONN; 1087 goto unlock; 1088 } 1089 1090 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bc->bc_bdaddr, 1091 sa->iso_bc->bc_bdaddr_type); 1092 1093 err = hci_past_bis(bis, &sa->iso_bc->bc_bdaddr, 1094 le_addr_type(sa->iso_bc->bc_bdaddr_type)); 1095 1096 unlock: 1097 hci_dev_unlock(hdev); 1098 hci_dev_put(hdev); 1099 1100 return err; 1101 } 1102 1103 static int iso_sock_bind(struct socket *sock, struct sockaddr_unsized *addr, 1104 int addr_len) 1105 { 1106 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1107 struct sock *sk = sock->sk; 1108 int err = 0; 1109 1110 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type); 1111 1112 if (!addr || addr_len < sizeof(struct sockaddr_iso) || 1113 addr->sa_family != AF_BLUETOOTH) 1114 return -EINVAL; 1115 1116 lock_sock(sk); 1117 1118 if ((sk->sk_state == BT_CONNECT2 || sk->sk_state == BT_CONNECTED) && 1119 addr_len > sizeof(*sa)) { 1120 /* Allow the user to rebind to a different address using 1121 * PAST procedures. 1122 */ 1123 err = iso_sock_rebind_bc(sk, sa, addr_len); 1124 goto done; 1125 } 1126 1127 if (sk->sk_state != BT_OPEN) { 1128 err = -EBADFD; 1129 goto done; 1130 } 1131 1132 if (sk->sk_type != SOCK_SEQPACKET) { 1133 err = -EINVAL; 1134 goto done; 1135 } 1136 1137 /* Check if the address type is of LE type */ 1138 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) { 1139 err = -EINVAL; 1140 goto done; 1141 } 1142 1143 bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr); 1144 iso_pi(sk)->src_type = sa->iso_bdaddr_type; 1145 1146 /* Check for Broadcast address */ 1147 if (addr_len > sizeof(*sa)) { 1148 err = iso_sock_bind_bc(sock, addr, addr_len); 1149 if (err) 1150 goto done; 1151 } 1152 1153 sk->sk_state = BT_BOUND; 1154 1155 done: 1156 release_sock(sk); 1157 return err; 1158 } 1159 1160 static int iso_sock_connect(struct socket *sock, struct sockaddr_unsized *addr, 1161 int alen, int flags) 1162 { 1163 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1164 struct sock *sk = sock->sk; 1165 int err; 1166 1167 BT_DBG("sk %p", sk); 1168 1169 if (alen < sizeof(struct sockaddr_iso) || 1170 addr->sa_family != AF_BLUETOOTH) 1171 return -EINVAL; 1172 1173 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) 1174 return -EBADFD; 1175 1176 if (sk->sk_type != SOCK_SEQPACKET) 1177 return -EINVAL; 1178 1179 /* Check if the address type is of LE type */ 1180 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) 1181 return -EINVAL; 1182 1183 lock_sock(sk); 1184 1185 bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr); 1186 iso_pi(sk)->dst_type = sa->iso_bdaddr_type; 1187 1188 release_sock(sk); 1189 1190 if (bacmp(&sa->iso_bdaddr, BDADDR_ANY)) 1191 err = iso_connect_cis(sk); 1192 else 1193 err = iso_connect_bis(sk); 1194 1195 if (err) 1196 return err; 1197 1198 lock_sock(sk); 1199 1200 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1201 err = bt_sock_wait_state(sk, BT_CONNECTED, 1202 sock_sndtimeo(sk, flags & O_NONBLOCK)); 1203 } 1204 1205 release_sock(sk); 1206 return err; 1207 } 1208 1209 static int iso_listen_bis(struct sock *sk) 1210 { 1211 struct hci_dev *hdev; 1212 int err = 0; 1213 struct iso_conn *conn; 1214 struct hci_conn *hcon; 1215 1216 BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src, 1217 &iso_pi(sk)->dst, iso_pi(sk)->bc_sid); 1218 1219 write_lock(&iso_sk_list.lock); 1220 1221 if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst, 1222 iso_pi(sk)->bc_sid)) 1223 err = -EADDRINUSE; 1224 1225 write_unlock(&iso_sk_list.lock); 1226 1227 if (err) 1228 return err; 1229 1230 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1231 iso_pi(sk)->src_type); 1232 if (!hdev) 1233 return -EHOSTUNREACH; 1234 1235 hci_dev_lock(hdev); 1236 lock_sock(sk); 1237 1238 /* Fail if user set invalid QoS */ 1239 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 1240 iso_pi(sk)->qos = default_qos; 1241 err = -EINVAL; 1242 goto unlock; 1243 } 1244 1245 hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst, 1246 le_addr_type(iso_pi(sk)->dst_type), 1247 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos); 1248 if (IS_ERR(hcon)) { 1249 err = PTR_ERR(hcon); 1250 goto unlock; 1251 } 1252 1253 conn = iso_conn_add(hcon); 1254 if (!conn) { 1255 hci_conn_drop(hcon); 1256 err = -ENOMEM; 1257 goto unlock; 1258 } 1259 1260 err = iso_chan_add(conn, sk, NULL); 1261 if (err) { 1262 hci_conn_drop(hcon); 1263 goto unlock; 1264 } 1265 1266 unlock: 1267 release_sock(sk); 1268 hci_dev_unlock(hdev); 1269 hci_dev_put(hdev); 1270 return err; 1271 } 1272 1273 static int iso_listen_cis(struct sock *sk) 1274 { 1275 int err = 0; 1276 1277 BT_DBG("%pMR", &iso_pi(sk)->src); 1278 1279 write_lock(&iso_sk_list.lock); 1280 1281 if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst)) 1282 err = -EADDRINUSE; 1283 1284 write_unlock(&iso_sk_list.lock); 1285 1286 return err; 1287 } 1288 1289 static int iso_sock_listen(struct socket *sock, int backlog) 1290 { 1291 struct sock *sk = sock->sk; 1292 int err = 0; 1293 1294 BT_DBG("sk %p backlog %d", sk, backlog); 1295 1296 sock_hold(sk); 1297 lock_sock(sk); 1298 1299 if (sk->sk_state != BT_BOUND) { 1300 err = -EBADFD; 1301 goto done; 1302 } 1303 1304 if (sk->sk_type != SOCK_SEQPACKET) { 1305 err = -EINVAL; 1306 goto done; 1307 } 1308 1309 if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1310 err = iso_listen_cis(sk); 1311 } else { 1312 /* Drop sock lock to avoid potential 1313 * deadlock with the hdev lock. 1314 */ 1315 release_sock(sk); 1316 err = iso_listen_bis(sk); 1317 lock_sock(sk); 1318 } 1319 1320 if (err) 1321 goto done; 1322 1323 sk->sk_max_ack_backlog = backlog; 1324 sk->sk_ack_backlog = 0; 1325 1326 sk->sk_state = BT_LISTEN; 1327 1328 done: 1329 release_sock(sk); 1330 sock_put(sk); 1331 return err; 1332 } 1333 1334 static int iso_sock_accept(struct socket *sock, struct socket *newsock, 1335 struct proto_accept_arg *arg) 1336 { 1337 DEFINE_WAIT_FUNC(wait, woken_wake_function); 1338 struct sock *sk = sock->sk, *ch; 1339 long timeo; 1340 int err = 0; 1341 1342 /* Use explicit nested locking to avoid lockdep warnings generated 1343 * because the parent socket and the child socket are locked on the 1344 * same thread. 1345 */ 1346 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1347 1348 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK); 1349 1350 BT_DBG("sk %p timeo %ld", sk, timeo); 1351 1352 /* Wait for an incoming connection. (wake-one). */ 1353 add_wait_queue_exclusive(sk_sleep(sk), &wait); 1354 while (1) { 1355 if (sk->sk_state != BT_LISTEN) { 1356 err = -EBADFD; 1357 break; 1358 } 1359 1360 ch = bt_accept_dequeue(sk, newsock); 1361 if (ch) { 1362 /* Drop the bridging ref from bt_accept_dequeue(); 1363 * the grafted socket keeps ch alive from here. 1364 */ 1365 sock_put(ch); 1366 break; 1367 } 1368 1369 if (!timeo) { 1370 err = -EAGAIN; 1371 break; 1372 } 1373 1374 if (signal_pending(current)) { 1375 err = sock_intr_errno(timeo); 1376 break; 1377 } 1378 1379 release_sock(sk); 1380 1381 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo); 1382 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1383 } 1384 remove_wait_queue(sk_sleep(sk), &wait); 1385 1386 if (err) 1387 goto done; 1388 1389 newsock->state = SS_CONNECTED; 1390 1391 BT_DBG("new socket %p", ch); 1392 1393 /* A Broadcast Sink might require BIG sync to be terminated 1394 * and re-established multiple times, while keeping the same 1395 * PA sync handle active. To allow this, once all BIS 1396 * connections have been accepted on a PA sync parent socket, 1397 * "reset" socket state, to allow future BIG re-sync procedures. 1398 */ 1399 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1400 /* Iterate through the list of bound BIS indices 1401 * and clear each BIS as they are accepted by the 1402 * user space, one by one. 1403 */ 1404 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) { 1405 if (iso_pi(sk)->bc_bis[i] > 0) { 1406 iso_pi(sk)->bc_bis[i] = 0; 1407 iso_pi(sk)->bc_num_bis--; 1408 break; 1409 } 1410 } 1411 1412 if (iso_pi(sk)->bc_num_bis == 0) { 1413 /* Once the last BIS was accepted, reset parent 1414 * socket parameters to mark that the listening 1415 * process for BIS connections has been completed: 1416 * 1417 * 1. Reset the DEFER setup flag on the parent sk. 1418 * 2. Clear the flag marking that the BIG create 1419 * sync command is pending. 1420 * 3. Transition socket state from BT_LISTEN to 1421 * BT_CONNECTED. 1422 */ 1423 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1424 clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags); 1425 sk->sk_state = BT_CONNECTED; 1426 } 1427 } 1428 1429 done: 1430 release_sock(sk); 1431 return err; 1432 } 1433 1434 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr, 1435 int peer) 1436 { 1437 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1438 struct sock *sk = sock->sk; 1439 int len = sizeof(struct sockaddr_iso); 1440 1441 BT_DBG("sock %p, sk %p", sock, sk); 1442 1443 addr->sa_family = AF_BLUETOOTH; 1444 1445 if (peer) { 1446 struct hci_conn *hcon = iso_pi(sk)->conn ? 1447 iso_pi(sk)->conn->hcon : NULL; 1448 1449 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst); 1450 sa->iso_bdaddr_type = iso_pi(sk)->dst_type; 1451 1452 if (hcon && (hcon->type == BIS_LINK || hcon->type == PA_LINK)) { 1453 sa->iso_bc->bc_sid = iso_pi(sk)->bc_sid; 1454 sa->iso_bc->bc_num_bis = iso_pi(sk)->bc_num_bis; 1455 memcpy(sa->iso_bc->bc_bis, iso_pi(sk)->bc_bis, 1456 ISO_MAX_NUM_BIS); 1457 len += sizeof(struct sockaddr_iso_bc); 1458 } 1459 } else { 1460 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src); 1461 sa->iso_bdaddr_type = iso_pi(sk)->src_type; 1462 } 1463 1464 return len; 1465 } 1466 1467 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg, 1468 size_t len) 1469 { 1470 struct sock *sk = sock->sk; 1471 struct sk_buff *skb, **frag; 1472 struct sockcm_cookie sockc; 1473 size_t mtu; 1474 int err; 1475 1476 BT_DBG("sock %p, sk %p", sock, sk); 1477 1478 err = sock_error(sk); 1479 if (err) 1480 return err; 1481 1482 if (msg->msg_flags & MSG_OOB) 1483 return -EOPNOTSUPP; 1484 1485 hci_sockcm_init(&sockc, sk); 1486 1487 if (msg->msg_controllen) { 1488 err = sock_cmsg_send(sk, msg, &sockc); 1489 if (err) 1490 return err; 1491 } 1492 1493 lock_sock(sk); 1494 1495 if (sk->sk_state != BT_CONNECTED) { 1496 release_sock(sk); 1497 return -ENOTCONN; 1498 } 1499 1500 mtu = iso_pi(sk)->conn->hcon->mtu; 1501 1502 release_sock(sk); 1503 1504 skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0); 1505 if (IS_ERR(skb)) 1506 return PTR_ERR(skb); 1507 1508 len -= skb->len; 1509 1510 BT_DBG("skb %p len %d", sk, skb->len); 1511 1512 /* Continuation fragments */ 1513 frag = &skb_shinfo(skb)->frag_list; 1514 while (len) { 1515 struct sk_buff *tmp; 1516 1517 tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0); 1518 if (IS_ERR(tmp)) { 1519 kfree_skb(skb); 1520 return PTR_ERR(tmp); 1521 } 1522 1523 *frag = tmp; 1524 1525 len -= tmp->len; 1526 1527 skb->len += tmp->len; 1528 skb->data_len += tmp->len; 1529 1530 BT_DBG("frag %p len %d", *frag, tmp->len); 1531 1532 frag = &(*frag)->next; 1533 } 1534 1535 lock_sock(sk); 1536 1537 if (sk->sk_state == BT_CONNECTED) 1538 err = iso_send_frame(sk, skb, &sockc); 1539 else 1540 err = -ENOTCONN; 1541 1542 release_sock(sk); 1543 1544 if (err < 0) 1545 kfree_skb(skb); 1546 return err; 1547 } 1548 1549 static void iso_conn_defer_accept(struct hci_conn *conn) 1550 { 1551 struct hci_cp_le_accept_cis cp; 1552 struct hci_dev *hdev = conn->hdev; 1553 1554 BT_DBG("conn %p", conn); 1555 1556 conn->state = BT_CONFIG; 1557 1558 cp.handle = cpu_to_le16(conn->handle); 1559 1560 hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp); 1561 } 1562 1563 static void iso_conn_big_sync(struct sock *sk) 1564 { 1565 int err; 1566 struct hci_dev *hdev; 1567 1568 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1569 iso_pi(sk)->src_type); 1570 1571 if (!hdev) 1572 return; 1573 1574 /* hci_le_big_create_sync requires hdev lock to be held, since 1575 * it enqueues the HCI LE BIG Create Sync command via 1576 * hci_cmd_sync_queue_once, which checks hdev flags that might 1577 * change. 1578 */ 1579 hci_dev_lock(hdev); 1580 lock_sock(sk); 1581 1582 if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) { 1583 err = hci_conn_big_create_sync(hdev, iso_pi(sk)->conn->hcon, 1584 &iso_pi(sk)->qos, 1585 iso_pi(sk)->sync_handle, 1586 iso_pi(sk)->bc_num_bis, 1587 iso_pi(sk)->bc_bis); 1588 if (err) 1589 bt_dev_err(hdev, "hci_big_create_sync: %d", err); 1590 } 1591 1592 release_sock(sk); 1593 hci_dev_unlock(hdev); 1594 } 1595 1596 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1597 size_t len, int flags) 1598 { 1599 struct sock *sk = sock->sk; 1600 struct iso_pinfo *pi = iso_pi(sk); 1601 bool early_ret = false; 1602 int err = 0; 1603 1604 BT_DBG("sk %p", sk); 1605 1606 if (unlikely(flags & MSG_ERRQUEUE)) 1607 return sock_recv_errqueue(sk, msg, len, SOL_BLUETOOTH, 1608 BT_SCM_ERROR); 1609 1610 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1611 sock_hold(sk); 1612 lock_sock(sk); 1613 1614 switch (sk->sk_state) { 1615 case BT_CONNECT2: 1616 if (test_bit(BT_SK_PA_SYNC, &pi->flags)) { 1617 release_sock(sk); 1618 iso_conn_big_sync(sk); 1619 lock_sock(sk); 1620 1621 sk->sk_state = BT_LISTEN; 1622 } else { 1623 iso_conn_defer_accept(pi->conn->hcon); 1624 sk->sk_state = BT_CONFIG; 1625 } 1626 1627 early_ret = true; 1628 break; 1629 case BT_CONNECTED: 1630 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1631 release_sock(sk); 1632 iso_conn_big_sync(sk); 1633 lock_sock(sk); 1634 1635 sk->sk_state = BT_LISTEN; 1636 early_ret = true; 1637 } 1638 1639 break; 1640 case BT_CONNECT: 1641 release_sock(sk); 1642 err = iso_connect_cis(sk); 1643 lock_sock(sk); 1644 1645 early_ret = true; 1646 break; 1647 default: 1648 break; 1649 } 1650 1651 release_sock(sk); 1652 sock_put(sk); 1653 1654 if (early_ret) 1655 return err; 1656 } 1657 1658 return bt_sock_recvmsg(sock, msg, len, flags); 1659 } 1660 1661 static bool check_io_qos(struct bt_iso_io_qos *qos) 1662 { 1663 /* If no PHY is enable SDU must be 0 */ 1664 if (!qos->phys && qos->sdu) 1665 return false; 1666 1667 if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff)) 1668 return false; 1669 1670 if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0)) 1671 return false; 1672 1673 if (qos->phys > BT_ISO_PHY_ANY) 1674 return false; 1675 1676 return true; 1677 } 1678 1679 static bool check_ucast_qos(struct bt_iso_qos *qos) 1680 { 1681 if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET) 1682 return false; 1683 1684 if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET) 1685 return false; 1686 1687 if (qos->ucast.sca > 0x07) 1688 return false; 1689 1690 if (qos->ucast.packing > 0x01) 1691 return false; 1692 1693 if (qos->ucast.framing > 0x01) 1694 return false; 1695 1696 if (!check_io_qos(&qos->ucast.in)) 1697 return false; 1698 1699 if (!check_io_qos(&qos->ucast.out)) 1700 return false; 1701 1702 return true; 1703 } 1704 1705 static bool check_bcast_qos(struct bt_iso_qos *qos) 1706 { 1707 if (!qos->bcast.sync_factor) 1708 qos->bcast.sync_factor = 0x01; 1709 1710 if (qos->bcast.packing > 0x01) 1711 return false; 1712 1713 if (qos->bcast.framing > 0x01) 1714 return false; 1715 1716 if (!check_io_qos(&qos->bcast.in)) 1717 return false; 1718 1719 if (!check_io_qos(&qos->bcast.out)) 1720 return false; 1721 1722 if (qos->bcast.encryption > 0x01) 1723 return false; 1724 1725 if (qos->bcast.options > 0x07) 1726 return false; 1727 1728 if (qos->bcast.skip > 0x01f3) 1729 return false; 1730 1731 if (!qos->bcast.sync_timeout) 1732 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1733 1734 if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000) 1735 return false; 1736 1737 if (qos->bcast.sync_cte_type > 0x1f) 1738 return false; 1739 1740 if (qos->bcast.mse > 0x1f) 1741 return false; 1742 1743 if (!qos->bcast.timeout) 1744 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1745 1746 if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000) 1747 return false; 1748 1749 return true; 1750 } 1751 1752 static int iso_sock_setsockopt(struct socket *sock, int level, int optname, 1753 sockptr_t optval, unsigned int optlen) 1754 { 1755 struct sock *sk = sock->sk; 1756 int err = 0; 1757 struct bt_iso_qos qos = default_qos; 1758 u32 opt; 1759 1760 BT_DBG("sk %p", sk); 1761 1762 lock_sock(sk); 1763 1764 switch (optname) { 1765 case BT_DEFER_SETUP: 1766 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) { 1767 err = -EINVAL; 1768 break; 1769 } 1770 1771 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1772 if (err) 1773 break; 1774 1775 if (opt) 1776 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1777 else 1778 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1779 break; 1780 1781 case BT_PKT_STATUS: 1782 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1783 if (err) 1784 break; 1785 1786 if (opt) 1787 set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1788 else 1789 clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1790 break; 1791 1792 case BT_PKT_SEQNUM: 1793 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1794 if (err) 1795 break; 1796 1797 if (opt) 1798 set_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags); 1799 else 1800 clear_bit(BT_SK_PKT_SEQNUM, &bt_sk(sk)->flags); 1801 break; 1802 1803 case BT_ISO_QOS: 1804 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1805 sk->sk_state != BT_CONNECT2 && 1806 (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) || 1807 sk->sk_state != BT_CONNECTED)) { 1808 err = -EINVAL; 1809 break; 1810 } 1811 1812 err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen); 1813 if (err) 1814 break; 1815 1816 iso_pi(sk)->qos = qos; 1817 iso_pi(sk)->qos_user_set = true; 1818 1819 break; 1820 1821 case BT_ISO_BASE: 1822 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1823 sk->sk_state != BT_CONNECT2) { 1824 err = -EINVAL; 1825 break; 1826 } 1827 1828 if (optlen > sizeof(iso_pi(sk)->base)) { 1829 err = -EINVAL; 1830 break; 1831 } 1832 1833 err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval, 1834 optlen); 1835 if (err) 1836 break; 1837 1838 iso_pi(sk)->base_len = optlen; 1839 1840 break; 1841 1842 default: 1843 err = -ENOPROTOOPT; 1844 break; 1845 } 1846 1847 release_sock(sk); 1848 return err; 1849 } 1850 1851 static int iso_sock_getsockopt(struct socket *sock, int level, int optname, 1852 char __user *optval, int __user *optlen) 1853 { 1854 struct sock *sk = sock->sk; 1855 int len, err = 0; 1856 struct bt_iso_qos *qos; 1857 u8 base_len; 1858 u8 *base; 1859 1860 BT_DBG("sk %p", sk); 1861 1862 if (get_user(len, optlen)) 1863 return -EFAULT; 1864 1865 lock_sock(sk); 1866 1867 switch (optname) { 1868 case BT_DEFER_SETUP: 1869 if (sk->sk_state == BT_CONNECTED) { 1870 err = -EINVAL; 1871 break; 1872 } 1873 1874 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags), 1875 (u32 __user *)optval)) 1876 err = -EFAULT; 1877 1878 break; 1879 1880 case BT_PKT_STATUS: 1881 if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags), 1882 (int __user *)optval)) 1883 err = -EFAULT; 1884 break; 1885 1886 case BT_ISO_QOS: 1887 qos = iso_sock_get_qos(sk); 1888 1889 len = min_t(unsigned int, len, sizeof(*qos)); 1890 if (copy_to_user(optval, qos, len)) 1891 err = -EFAULT; 1892 1893 break; 1894 1895 case BT_ISO_BASE: 1896 if (sk->sk_state == BT_CONNECTED && 1897 !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1898 base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len; 1899 base = iso_pi(sk)->conn->hcon->le_per_adv_data; 1900 } else { 1901 base_len = iso_pi(sk)->base_len; 1902 base = iso_pi(sk)->base; 1903 } 1904 1905 len = min_t(unsigned int, len, base_len); 1906 if (copy_to_user(optval, base, len)) 1907 err = -EFAULT; 1908 if (put_user(len, optlen)) 1909 err = -EFAULT; 1910 1911 break; 1912 1913 default: 1914 err = -ENOPROTOOPT; 1915 break; 1916 } 1917 1918 release_sock(sk); 1919 return err; 1920 } 1921 1922 static int iso_sock_shutdown(struct socket *sock, int how) 1923 { 1924 struct sock *sk = sock->sk; 1925 int err = 0; 1926 1927 BT_DBG("sock %p, sk %p, how %d", sock, sk, how); 1928 1929 if (!sk) 1930 return 0; 1931 1932 sock_hold(sk); 1933 lock_sock(sk); 1934 1935 switch (how) { 1936 case SHUT_RD: 1937 if (sk->sk_shutdown & RCV_SHUTDOWN) 1938 goto unlock; 1939 sk->sk_shutdown |= RCV_SHUTDOWN; 1940 break; 1941 case SHUT_WR: 1942 if (sk->sk_shutdown & SEND_SHUTDOWN) 1943 goto unlock; 1944 sk->sk_shutdown |= SEND_SHUTDOWN; 1945 break; 1946 case SHUT_RDWR: 1947 if (sk->sk_shutdown & SHUTDOWN_MASK) 1948 goto unlock; 1949 sk->sk_shutdown |= SHUTDOWN_MASK; 1950 break; 1951 } 1952 1953 iso_sock_clear_timer(sk); 1954 __iso_sock_close(sk); 1955 1956 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime && 1957 !(current->flags & PF_EXITING)) 1958 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1959 1960 unlock: 1961 release_sock(sk); 1962 sock_put(sk); 1963 1964 return err; 1965 } 1966 1967 static int iso_sock_release(struct socket *sock) 1968 { 1969 struct sock *sk = sock->sk; 1970 int err = 0; 1971 1972 BT_DBG("sock %p, sk %p", sock, sk); 1973 1974 if (!sk) 1975 return 0; 1976 1977 iso_sock_close(sk); 1978 1979 if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) && 1980 !(current->flags & PF_EXITING)) { 1981 lock_sock(sk); 1982 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1983 release_sock(sk); 1984 } 1985 1986 sock_orphan(sk); 1987 iso_sock_kill(sk); 1988 return err; 1989 } 1990 1991 static void iso_sock_ready(struct sock *sk) 1992 { 1993 BT_DBG("sk %p", sk); 1994 1995 if (!sk) 1996 return; 1997 1998 lock_sock(sk); 1999 iso_sock_clear_timer(sk); 2000 sk->sk_state = BT_CONNECTED; 2001 sk->sk_state_change(sk); 2002 release_sock(sk); 2003 } 2004 2005 static bool iso_match_big(struct sock *sk, void *data) 2006 { 2007 struct hci_evt_le_big_sync_established *ev = data; 2008 2009 return ev->handle == iso_pi(sk)->qos.bcast.big; 2010 } 2011 2012 static bool iso_match_big_hcon(struct sock *sk, void *data) 2013 { 2014 struct hci_conn *hcon = data; 2015 2016 return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big; 2017 } 2018 2019 static bool iso_match_pa_sync_flag(struct sock *sk, void *data) 2020 { 2021 return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 2022 } 2023 2024 static bool iso_match_dst(struct sock *sk, void *data) 2025 { 2026 return !bacmp(&iso_pi(sk)->dst, (bdaddr_t *)data); 2027 } 2028 2029 static void iso_conn_ready(struct iso_conn *conn) 2030 { 2031 struct sock *parent = NULL; 2032 struct sock *sk = conn->sk; 2033 struct hci_ev_le_big_sync_established *ev = NULL; 2034 struct hci_ev_le_pa_sync_established *ev2 = NULL; 2035 struct hci_ev_le_per_adv_report *ev3 = NULL; 2036 struct hci_conn *hcon; 2037 struct hci_dev *hdev; 2038 2039 BT_DBG("conn %p", conn); 2040 2041 if (sk) { 2042 /* Attempt to update source address in case of BIS Sender if 2043 * the advertisement is using a random address. 2044 */ 2045 if (conn->hcon->type == BIS_LINK && 2046 conn->hcon->role == HCI_ROLE_MASTER && 2047 !bacmp(&conn->hcon->dst, BDADDR_ANY)) { 2048 struct hci_conn *bis = conn->hcon; 2049 struct adv_info *adv; 2050 2051 adv = hci_find_adv_instance(bis->hdev, 2052 bis->iso_qos.bcast.bis); 2053 if (adv && bacmp(&adv->random_addr, BDADDR_ANY)) { 2054 lock_sock(sk); 2055 iso_pi(sk)->src_type = BDADDR_LE_RANDOM; 2056 bacpy(&iso_pi(sk)->src, &adv->random_addr); 2057 release_sock(sk); 2058 } 2059 } 2060 2061 iso_sock_ready(conn->sk); 2062 } else { 2063 hcon = conn->hcon; 2064 if (!hcon) 2065 return; 2066 2067 hdev = hcon->hdev; 2068 2069 if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) { 2070 /* A BIS slave hcon is notified to the ISO layer 2071 * after the Command Complete for the LE Setup 2072 * ISO Data Path command is received. Get the 2073 * parent socket that matches the hcon BIG handle. 2074 */ 2075 parent = iso_get_sock(hdev, &hcon->src, &hcon->dst, 2076 BT_LISTEN, iso_match_big_hcon, 2077 hcon); 2078 } else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) { 2079 ev = hci_recv_event_data(hcon->hdev, 2080 HCI_EVT_LE_BIG_SYNC_ESTABLISHED); 2081 2082 /* Get reference to PA sync parent socket, if it exists */ 2083 parent = iso_get_sock(hdev, &hcon->src, &hcon->dst, 2084 BT_LISTEN, 2085 iso_match_pa_sync_flag, 2086 NULL); 2087 if (!parent && ev) 2088 parent = iso_get_sock(hdev, &hcon->src, 2089 &hcon->dst, 2090 BT_LISTEN, 2091 iso_match_big, ev); 2092 } else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 2093 ev2 = hci_recv_event_data(hcon->hdev, 2094 HCI_EV_LE_PA_SYNC_ESTABLISHED); 2095 if (ev2) 2096 parent = iso_get_sock(hdev, &hcon->src, 2097 &hcon->dst, 2098 BT_LISTEN, 2099 iso_match_sid, ev2); 2100 } else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) { 2101 ev3 = hci_recv_event_data(hcon->hdev, 2102 HCI_EV_LE_PER_ADV_REPORT); 2103 if (ev3) 2104 parent = iso_get_sock(hdev, &hcon->src, 2105 &hcon->dst, 2106 BT_LISTEN, 2107 iso_match_sync_handle_pa_report, 2108 ev3); 2109 } 2110 2111 if (!parent) 2112 parent = iso_get_sock(hdev, &hcon->src, BDADDR_ANY, 2113 BT_LISTEN, iso_match_dst, BDADDR_ANY); 2114 2115 if (!parent) 2116 return; 2117 2118 lock_sock(parent); 2119 2120 sk = iso_sock_alloc(sock_net(parent), NULL, 2121 BTPROTO_ISO, GFP_ATOMIC, 0); 2122 if (!sk) { 2123 release_sock(parent); 2124 return; 2125 } 2126 2127 iso_sock_init(sk, parent); 2128 2129 bacpy(&iso_pi(sk)->src, &hcon->src); 2130 2131 /* Convert from HCI to three-value type */ 2132 if (hcon->src_type == ADDR_LE_DEV_PUBLIC) 2133 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 2134 else 2135 iso_pi(sk)->src_type = BDADDR_LE_RANDOM; 2136 2137 /* If hcon has no destination address (BDADDR_ANY) it means it 2138 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or 2139 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using 2140 * the parent socket destination address. 2141 */ 2142 if (!bacmp(&hcon->dst, BDADDR_ANY)) { 2143 bacpy(&hcon->dst, &iso_pi(parent)->dst); 2144 hcon->dst_type = le_addr_type(iso_pi(parent)->dst_type); 2145 } 2146 2147 if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) { 2148 iso_pi(sk)->qos = iso_pi(parent)->qos; 2149 hcon->iso_qos = iso_pi(sk)->qos; 2150 iso_pi(sk)->bc_sid = iso_pi(parent)->bc_sid; 2151 iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis; 2152 memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis, 2153 ISO_MAX_NUM_BIS); 2154 set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 2155 } 2156 2157 bacpy(&iso_pi(sk)->dst, &hcon->dst); 2158 2159 /* Convert from HCI to three-value type */ 2160 if (hcon->dst_type == ADDR_LE_DEV_PUBLIC) 2161 iso_pi(sk)->dst_type = BDADDR_LE_PUBLIC; 2162 else 2163 iso_pi(sk)->dst_type = BDADDR_LE_RANDOM; 2164 2165 iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle; 2166 memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len); 2167 iso_pi(sk)->base_len = iso_pi(parent)->base_len; 2168 2169 hci_conn_hold(hcon); 2170 iso_chan_add(conn, sk, parent); 2171 2172 if ((ev && ((struct hci_evt_le_big_sync_established *)ev)->status) || 2173 (ev2 && ev2->status)) { 2174 /* Trigger error signal on child socket */ 2175 sk->sk_err = ECONNREFUSED; 2176 sk->sk_error_report(sk); 2177 } 2178 2179 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) 2180 sk->sk_state = BT_CONNECT2; 2181 else 2182 sk->sk_state = BT_CONNECTED; 2183 2184 /* Wake up parent */ 2185 parent->sk_data_ready(parent); 2186 2187 release_sock(parent); 2188 sock_put(parent); 2189 } 2190 } 2191 2192 static bool iso_match_sid(struct sock *sk, void *data) 2193 { 2194 struct hci_ev_le_pa_sync_established *ev = data; 2195 2196 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID) 2197 return true; 2198 2199 return ev->sid == iso_pi(sk)->bc_sid; 2200 } 2201 2202 static bool iso_match_sid_past(struct sock *sk, void *data) 2203 { 2204 struct hci_ev_le_past_received *ev = data; 2205 2206 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID) 2207 return true; 2208 2209 return ev->sid == iso_pi(sk)->bc_sid; 2210 } 2211 2212 static bool iso_match_sync_handle(struct sock *sk, void *data) 2213 { 2214 struct hci_evt_le_big_info_adv_report *ev = data; 2215 2216 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2217 } 2218 2219 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data) 2220 { 2221 struct hci_ev_le_per_adv_report *ev = data; 2222 2223 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2224 } 2225 2226 /* ----- ISO interface with lower layer (HCI) ----- */ 2227 2228 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags) 2229 { 2230 struct hci_ev_le_pa_sync_established *ev1; 2231 struct hci_ev_le_past_received *ev1a; 2232 struct hci_evt_le_big_info_adv_report *ev2; 2233 struct hci_ev_le_per_adv_report *ev3; 2234 struct sock *sk; 2235 2236 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 2237 2238 /* Broadcast receiver requires handling of some events before it can 2239 * proceed to establishing a BIG sync: 2240 * 2241 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific 2242 * SID to listen to and once sync is established its handle needs to 2243 * be stored in iso_pi(sk)->sync_handle so it can be matched once 2244 * receiving the BIG Info. 2245 * 1a. HCI_EV_LE_PAST_RECEIVED: alternative to 1. 2246 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a 2247 * a BIG Info it attempts to check if there any listening socket with 2248 * the same sync_handle and if it does then attempt to create a sync. 2249 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored 2250 * in iso_pi(sk)->base so it can be passed up to user, in the case of a 2251 * broadcast sink. 2252 */ 2253 ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED); 2254 if (ev1) { 2255 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN, 2256 iso_match_sid, ev1); 2257 if (sk && !ev1->status) { 2258 lock_sock(sk); 2259 iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle); 2260 iso_pi(sk)->bc_sid = ev1->sid; 2261 release_sock(sk); 2262 } 2263 2264 goto done; 2265 } 2266 2267 ev1a = hci_recv_event_data(hdev, HCI_EV_LE_PAST_RECEIVED); 2268 if (ev1a) { 2269 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN, 2270 iso_match_sid_past, ev1a); 2271 if (sk && !ev1a->status) { 2272 lock_sock(sk); 2273 iso_pi(sk)->sync_handle = le16_to_cpu(ev1a->sync_handle); 2274 iso_pi(sk)->bc_sid = ev1a->sid; 2275 release_sock(sk); 2276 } 2277 2278 goto done; 2279 } 2280 2281 ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT); 2282 if (ev2) { 2283 /* Check if BIGInfo report has already been handled */ 2284 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_CONNECTED, 2285 iso_match_sync_handle, ev2); 2286 if (sk) { 2287 sock_put(sk); 2288 sk = NULL; 2289 goto done; 2290 } 2291 2292 /* Try to get PA sync socket, if it exists */ 2293 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_CONNECT2, 2294 iso_match_sync_handle, ev2); 2295 if (!sk) 2296 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, 2297 BT_LISTEN, 2298 iso_match_sync_handle, 2299 ev2); 2300 2301 if (sk) { 2302 int err = 0; 2303 bool big_sync; 2304 struct hci_conn *hcon; 2305 2306 lock_sock(sk); 2307 2308 hcon = iso_pi(sk)->conn->hcon; 2309 iso_pi(sk)->qos.bcast.encryption = ev2->encryption; 2310 2311 if (ev2->num_bis < iso_pi(sk)->bc_num_bis) 2312 iso_pi(sk)->bc_num_bis = ev2->num_bis; 2313 2314 big_sync = !test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) && 2315 !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags); 2316 2317 if (big_sync) 2318 err = hci_conn_big_create_sync(hdev, hcon, 2319 &iso_pi(sk)->qos, 2320 iso_pi(sk)->sync_handle, 2321 iso_pi(sk)->bc_num_bis, 2322 iso_pi(sk)->bc_bis); 2323 2324 release_sock(sk); 2325 2326 if (big_sync && err) { 2327 bt_dev_err(hdev, "hci_le_big_create_sync: %d", 2328 err); 2329 sock_put(sk); 2330 sk = NULL; 2331 } 2332 } 2333 2334 goto done; 2335 } 2336 2337 ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT); 2338 if (ev3) { 2339 size_t base_len = 0; 2340 u8 *base; 2341 struct hci_conn *hcon; 2342 2343 sk = iso_get_sock(hdev, &hdev->bdaddr, bdaddr, BT_LISTEN, 2344 iso_match_sync_handle_pa_report, ev3); 2345 if (!sk) 2346 goto done; 2347 2348 hcon = iso_pi(sk)->conn->hcon; 2349 if (!hcon) 2350 goto done; 2351 2352 if (ev3->data_status == LE_PA_DATA_TRUNCATED) { 2353 /* The controller was unable to retrieve PA data. */ 2354 memset(hcon->le_per_adv_data, 0, 2355 HCI_MAX_PER_AD_TOT_LEN); 2356 hcon->le_per_adv_data_len = 0; 2357 hcon->le_per_adv_data_offset = 0; 2358 goto done; 2359 } 2360 2361 if (hcon->le_per_adv_data_offset + ev3->length > 2362 HCI_MAX_PER_AD_TOT_LEN) 2363 goto done; 2364 2365 memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset, 2366 ev3->data, ev3->length); 2367 hcon->le_per_adv_data_offset += ev3->length; 2368 2369 if (ev3->data_status == LE_PA_DATA_COMPLETE) { 2370 /* All PA data has been received. */ 2371 hcon->le_per_adv_data_len = 2372 hcon->le_per_adv_data_offset; 2373 hcon->le_per_adv_data_offset = 0; 2374 2375 /* Extract BASE */ 2376 base = eir_get_service_data(hcon->le_per_adv_data, 2377 hcon->le_per_adv_data_len, 2378 EIR_BAA_SERVICE_UUID, 2379 &base_len); 2380 2381 if (!base || base_len > BASE_MAX_LENGTH) 2382 goto done; 2383 2384 lock_sock(sk); 2385 memcpy(iso_pi(sk)->base, base, base_len); 2386 iso_pi(sk)->base_len = base_len; 2387 release_sock(sk); 2388 } else { 2389 /* This is a PA data fragment. Keep pa_data_len set to 0 2390 * until all data has been reassembled. 2391 */ 2392 hcon->le_per_adv_data_len = 0; 2393 } 2394 } else { 2395 sk = iso_get_sock(hdev, &hdev->bdaddr, BDADDR_ANY, 2396 BT_LISTEN, iso_match_dst, BDADDR_ANY); 2397 } 2398 2399 done: 2400 if (!sk) 2401 return 0; 2402 2403 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) 2404 *flags |= HCI_PROTO_DEFER; 2405 2406 sock_put(sk); 2407 2408 return HCI_LM_ACCEPT; 2409 } 2410 2411 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status) 2412 { 2413 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK && 2414 hcon->type != PA_LINK) { 2415 if (hcon->type != LE_LINK) 2416 return; 2417 2418 /* Check if LE link has failed */ 2419 if (status) { 2420 struct hci_link *link, *t; 2421 2422 list_for_each_entry_safe(link, t, &hcon->link_list, 2423 list) 2424 iso_conn_del(link->conn, bt_to_errno(status)); 2425 2426 return; 2427 } 2428 2429 /* Create CIS if pending */ 2430 hci_le_create_cis_pending(hcon->hdev); 2431 return; 2432 } 2433 2434 BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status); 2435 2436 /* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or 2437 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection 2438 * into the accept queue of the listening socket and wake up 2439 * userspace, to inform the user about the event. 2440 */ 2441 if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) || 2442 test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 2443 struct iso_conn *conn; 2444 2445 conn = iso_conn_add(hcon); 2446 if (conn) 2447 iso_conn_ready(conn); 2448 } else { 2449 iso_conn_del(hcon, bt_to_errno(status)); 2450 } 2451 } 2452 2453 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason) 2454 { 2455 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK && 2456 hcon->type != PA_LINK) 2457 return; 2458 2459 BT_DBG("hcon %p reason %d", hcon, reason); 2460 2461 iso_conn_del(hcon, bt_to_errno(reason)); 2462 } 2463 2464 int iso_recv(struct hci_dev *hdev, u16 handle, struct sk_buff *skb, u16 flags) 2465 { 2466 struct hci_conn *hcon; 2467 struct iso_conn *conn; 2468 struct skb_shared_hwtstamps *hwts; 2469 __u16 pb, ts, len, sn; 2470 2471 hci_dev_lock(hdev); 2472 2473 hcon = hci_conn_hash_lookup_handle(hdev, handle); 2474 if (!hcon) { 2475 hci_dev_unlock(hdev); 2476 kfree_skb(skb); 2477 return -ENOENT; 2478 } 2479 2480 conn = iso_conn_hold_unless_zero(hcon->iso_data); 2481 hcon = NULL; 2482 2483 hci_dev_unlock(hdev); 2484 2485 if (!conn) { 2486 kfree_skb(skb); 2487 return -EINVAL; 2488 } 2489 2490 pb = hci_iso_flags_pb(flags); 2491 ts = hci_iso_flags_ts(flags); 2492 2493 BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts); 2494 2495 switch (pb) { 2496 case ISO_START: 2497 case ISO_SINGLE: 2498 if (conn->rx_len) { 2499 BT_ERR("Unexpected start frame (len %d)", skb->len); 2500 kfree_skb(conn->rx_skb); 2501 conn->rx_skb = NULL; 2502 conn->rx_len = 0; 2503 } 2504 2505 if (ts) { 2506 struct hci_iso_ts_data_hdr *hdr; 2507 2508 hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE); 2509 if (!hdr) { 2510 BT_ERR("Frame is too short (len %d)", skb->len); 2511 goto drop; 2512 } 2513 2514 /* Record the timestamp to skb */ 2515 hwts = skb_hwtstamps(skb); 2516 hwts->hwtstamp = us_to_ktime(le32_to_cpu(hdr->ts)); 2517 2518 sn = __le16_to_cpu(hdr->sn); 2519 len = __le16_to_cpu(hdr->slen); 2520 } else { 2521 struct hci_iso_data_hdr *hdr; 2522 2523 hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE); 2524 if (!hdr) { 2525 BT_ERR("Frame is too short (len %d)", skb->len); 2526 goto drop; 2527 } 2528 2529 sn = __le16_to_cpu(hdr->sn); 2530 len = __le16_to_cpu(hdr->slen); 2531 } 2532 2533 flags = hci_iso_data_flags(len); 2534 len = hci_iso_data_len(len); 2535 2536 BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x sn %d", 2537 len, skb->len, flags, sn); 2538 2539 if (len == skb->len) { 2540 /* Complete frame received */ 2541 hci_skb_pkt_status(skb) = flags & 0x03; 2542 hci_skb_pkt_seqnum(skb) = sn; 2543 iso_recv_frame(conn, skb); 2544 goto done; 2545 } 2546 2547 if (pb == ISO_SINGLE) { 2548 BT_ERR("Frame malformed (len %d, expected len %d)", 2549 skb->len, len); 2550 goto drop; 2551 } 2552 2553 if (skb->len > len) { 2554 BT_ERR("Frame is too long (len %d, expected len %d)", 2555 skb->len, len); 2556 goto drop; 2557 } 2558 2559 /* Allocate skb for the complete frame (with header) */ 2560 conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL); 2561 if (!conn->rx_skb) 2562 goto drop; 2563 2564 hci_skb_pkt_status(conn->rx_skb) = flags & 0x03; 2565 hci_skb_pkt_seqnum(conn->rx_skb) = sn; 2566 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2567 skb->len); 2568 conn->rx_len = len - skb->len; 2569 2570 /* Copy hw timestamp from skb to rx_skb if present */ 2571 if (ts) { 2572 hwts = skb_hwtstamps(conn->rx_skb); 2573 hwts->hwtstamp = skb_hwtstamps(skb)->hwtstamp; 2574 } 2575 2576 break; 2577 2578 case ISO_CONT: 2579 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, 2580 conn->rx_len); 2581 2582 if (!conn->rx_len) { 2583 BT_ERR("Unexpected continuation frame (len %d)", 2584 skb->len); 2585 goto drop; 2586 } 2587 2588 if (skb->len > conn->rx_len) { 2589 BT_ERR("Fragment is too long (len %d, expected %d)", 2590 skb->len, conn->rx_len); 2591 kfree_skb(conn->rx_skb); 2592 conn->rx_skb = NULL; 2593 conn->rx_len = 0; 2594 goto drop; 2595 } 2596 2597 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2598 skb->len); 2599 conn->rx_len -= skb->len; 2600 break; 2601 2602 case ISO_END: 2603 if (!conn->rx_len) { 2604 BT_ERR("Unexpected end frame (len %d)", skb->len); 2605 goto drop; 2606 } 2607 2608 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2609 skb->len); 2610 conn->rx_len -= skb->len; 2611 2612 if (!conn->rx_len) { 2613 struct sk_buff *rx_skb = conn->rx_skb; 2614 2615 /* Complete frame received. iso_recv_frame 2616 * takes ownership of the skb so set the global 2617 * rx_skb pointer to NULL first. 2618 */ 2619 conn->rx_skb = NULL; 2620 iso_recv_frame(conn, rx_skb); 2621 } 2622 break; 2623 } 2624 2625 drop: 2626 kfree_skb(skb); 2627 done: 2628 iso_conn_put(conn); 2629 return 0; 2630 } 2631 2632 static struct hci_cb iso_cb = { 2633 .name = "ISO", 2634 .connect_cfm = iso_connect_cfm, 2635 .disconn_cfm = iso_disconn_cfm, 2636 }; 2637 2638 static int iso_debugfs_show(struct seq_file *f, void *p) 2639 { 2640 struct sock *sk; 2641 2642 read_lock(&iso_sk_list.lock); 2643 2644 sk_for_each(sk, &iso_sk_list.head) { 2645 seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src, 2646 &iso_pi(sk)->dst, sk->sk_state); 2647 } 2648 2649 read_unlock(&iso_sk_list.lock); 2650 2651 return 0; 2652 } 2653 2654 DEFINE_SHOW_ATTRIBUTE(iso_debugfs); 2655 2656 static struct dentry *iso_debugfs; 2657 2658 static const struct proto_ops iso_sock_ops = { 2659 .family = PF_BLUETOOTH, 2660 .owner = THIS_MODULE, 2661 .release = iso_sock_release, 2662 .bind = iso_sock_bind, 2663 .connect = iso_sock_connect, 2664 .listen = iso_sock_listen, 2665 .accept = iso_sock_accept, 2666 .getname = iso_sock_getname, 2667 .sendmsg = iso_sock_sendmsg, 2668 .recvmsg = iso_sock_recvmsg, 2669 .poll = bt_sock_poll, 2670 .ioctl = bt_sock_ioctl, 2671 .mmap = sock_no_mmap, 2672 .socketpair = sock_no_socketpair, 2673 .shutdown = iso_sock_shutdown, 2674 .setsockopt = iso_sock_setsockopt, 2675 .getsockopt = iso_sock_getsockopt 2676 }; 2677 2678 static const struct net_proto_family iso_sock_family_ops = { 2679 .family = PF_BLUETOOTH, 2680 .owner = THIS_MODULE, 2681 .create = iso_sock_create, 2682 }; 2683 2684 static bool inited; 2685 2686 bool iso_inited(void) 2687 { 2688 return inited; 2689 } 2690 2691 int iso_init(void) 2692 { 2693 int err; 2694 2695 BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr)); 2696 2697 if (inited) 2698 return -EALREADY; 2699 2700 err = proto_register(&iso_proto, 0); 2701 if (err < 0) 2702 return err; 2703 2704 err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops); 2705 if (err < 0) { 2706 BT_ERR("ISO socket registration failed"); 2707 goto error; 2708 } 2709 2710 err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL); 2711 if (err < 0) { 2712 BT_ERR("Failed to create ISO proc file"); 2713 bt_sock_unregister(BTPROTO_ISO); 2714 goto error; 2715 } 2716 2717 BT_INFO("ISO socket layer initialized"); 2718 2719 hci_register_cb(&iso_cb); 2720 2721 if (!IS_ERR_OR_NULL(bt_debugfs)) 2722 iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs, 2723 NULL, &iso_debugfs_fops); 2724 2725 inited = true; 2726 2727 return 0; 2728 2729 error: 2730 proto_unregister(&iso_proto); 2731 return err; 2732 } 2733 2734 int iso_exit(void) 2735 { 2736 if (!inited) 2737 return -EALREADY; 2738 2739 bt_procfs_cleanup(&init_net, "iso"); 2740 2741 debugfs_remove(iso_debugfs); 2742 iso_debugfs = NULL; 2743 2744 hci_unregister_cb(&iso_cb); 2745 2746 bt_sock_unregister(BTPROTO_ISO); 2747 2748 proto_unregister(&iso_proto); 2749 2750 inited = false; 2751 2752 return 0; 2753 } 2754