1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * BlueZ - Bluetooth protocol stack for Linux 4 * 5 * Copyright (C) 2022 Intel Corporation 6 * Copyright 2023-2024 NXP 7 */ 8 9 #include <linux/module.h> 10 #include <linux/debugfs.h> 11 #include <linux/seq_file.h> 12 #include <linux/sched/signal.h> 13 14 #include <net/bluetooth/bluetooth.h> 15 #include <net/bluetooth/hci_core.h> 16 #include <net/bluetooth/iso.h> 17 #include "eir.h" 18 19 static const struct proto_ops iso_sock_ops; 20 21 static struct bt_sock_list iso_sk_list = { 22 .lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock) 23 }; 24 25 /* ---- ISO connections ---- */ 26 struct iso_conn { 27 struct hci_conn *hcon; 28 29 /* @lock: spinlock protecting changes to iso_conn fields */ 30 spinlock_t lock; 31 struct sock *sk; 32 33 struct delayed_work timeout_work; 34 35 struct sk_buff *rx_skb; 36 __u32 rx_len; 37 __u16 tx_sn; 38 struct kref ref; 39 }; 40 41 #define iso_conn_lock(c) spin_lock(&(c)->lock) 42 #define iso_conn_unlock(c) spin_unlock(&(c)->lock) 43 44 static void iso_sock_close(struct sock *sk); 45 static void iso_sock_kill(struct sock *sk); 46 47 /* ----- ISO socket info ----- */ 48 #define iso_pi(sk) ((struct iso_pinfo *)sk) 49 50 #define EIR_SERVICE_DATA_LENGTH 4 51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH) 52 #define EIR_BAA_SERVICE_UUID 0x1851 53 54 /* iso_pinfo flags values */ 55 enum { 56 BT_SK_BIG_SYNC, 57 BT_SK_PA_SYNC, 58 }; 59 60 struct iso_pinfo { 61 struct bt_sock bt; 62 bdaddr_t src; 63 __u8 src_type; 64 bdaddr_t dst; 65 __u8 dst_type; 66 __u8 bc_sid; 67 __u8 bc_num_bis; 68 __u8 bc_bis[ISO_MAX_NUM_BIS]; 69 __u16 sync_handle; 70 unsigned long flags; 71 struct bt_iso_qos qos; 72 bool qos_user_set; 73 __u8 base_len; 74 __u8 base[BASE_MAX_LENGTH]; 75 struct iso_conn *conn; 76 }; 77 78 static struct bt_iso_qos default_qos; 79 80 static bool check_ucast_qos(struct bt_iso_qos *qos); 81 static bool check_bcast_qos(struct bt_iso_qos *qos); 82 static bool iso_match_sid(struct sock *sk, void *data); 83 static bool iso_match_sync_handle(struct sock *sk, void *data); 84 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data); 85 static void iso_sock_disconn(struct sock *sk); 86 87 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data); 88 89 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst, 90 enum bt_sock_state state, 91 iso_sock_match_t match, void *data); 92 93 /* ---- ISO timers ---- */ 94 #define ISO_CONN_TIMEOUT (HZ * 40) 95 #define ISO_DISCONN_TIMEOUT (HZ * 2) 96 97 static void iso_conn_free(struct kref *ref) 98 { 99 struct iso_conn *conn = container_of(ref, struct iso_conn, ref); 100 101 BT_DBG("conn %p", conn); 102 103 if (conn->sk) 104 iso_pi(conn->sk)->conn = NULL; 105 106 if (conn->hcon) { 107 conn->hcon->iso_data = NULL; 108 hci_conn_drop(conn->hcon); 109 } 110 111 /* Ensure no more work items will run since hci_conn has been dropped */ 112 disable_delayed_work_sync(&conn->timeout_work); 113 114 kfree(conn); 115 } 116 117 static void iso_conn_put(struct iso_conn *conn) 118 { 119 if (!conn) 120 return; 121 122 BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref)); 123 124 kref_put(&conn->ref, iso_conn_free); 125 } 126 127 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn) 128 { 129 if (!conn) 130 return NULL; 131 132 BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref)); 133 134 if (!kref_get_unless_zero(&conn->ref)) 135 return NULL; 136 137 return conn; 138 } 139 140 static struct sock *iso_sock_hold(struct iso_conn *conn) 141 { 142 if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk)) 143 return NULL; 144 145 sock_hold(conn->sk); 146 147 return conn->sk; 148 } 149 150 static void iso_sock_timeout(struct work_struct *work) 151 { 152 struct iso_conn *conn = container_of(work, struct iso_conn, 153 timeout_work.work); 154 struct sock *sk; 155 156 conn = iso_conn_hold_unless_zero(conn); 157 if (!conn) 158 return; 159 160 iso_conn_lock(conn); 161 sk = iso_sock_hold(conn); 162 iso_conn_unlock(conn); 163 iso_conn_put(conn); 164 165 if (!sk) 166 return; 167 168 BT_DBG("sock %p state %d", sk, sk->sk_state); 169 170 lock_sock(sk); 171 sk->sk_err = ETIMEDOUT; 172 sk->sk_state_change(sk); 173 release_sock(sk); 174 sock_put(sk); 175 } 176 177 static void iso_sock_set_timer(struct sock *sk, long timeout) 178 { 179 if (!iso_pi(sk)->conn) 180 return; 181 182 BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout); 183 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 184 schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout); 185 } 186 187 static void iso_sock_clear_timer(struct sock *sk) 188 { 189 if (!iso_pi(sk)->conn) 190 return; 191 192 BT_DBG("sock %p state %d", sk, sk->sk_state); 193 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 194 } 195 196 /* ---- ISO connections ---- */ 197 static struct iso_conn *iso_conn_add(struct hci_conn *hcon) 198 { 199 struct iso_conn *conn = hcon->iso_data; 200 201 conn = iso_conn_hold_unless_zero(conn); 202 if (conn) { 203 if (!conn->hcon) { 204 iso_conn_lock(conn); 205 conn->hcon = hcon; 206 iso_conn_unlock(conn); 207 } 208 iso_conn_put(conn); 209 return conn; 210 } 211 212 conn = kzalloc(sizeof(*conn), GFP_KERNEL); 213 if (!conn) 214 return NULL; 215 216 kref_init(&conn->ref); 217 spin_lock_init(&conn->lock); 218 INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout); 219 220 hcon->iso_data = conn; 221 conn->hcon = hcon; 222 conn->tx_sn = 0; 223 224 BT_DBG("hcon %p conn %p", hcon, conn); 225 226 return conn; 227 } 228 229 /* Delete channel. Must be called on the locked socket. */ 230 static void iso_chan_del(struct sock *sk, int err) 231 { 232 struct iso_conn *conn; 233 struct sock *parent; 234 235 conn = iso_pi(sk)->conn; 236 iso_pi(sk)->conn = NULL; 237 238 BT_DBG("sk %p, conn %p, err %d", sk, conn, err); 239 240 if (conn) { 241 iso_conn_lock(conn); 242 conn->sk = NULL; 243 iso_conn_unlock(conn); 244 iso_conn_put(conn); 245 } 246 247 sk->sk_state = BT_CLOSED; 248 sk->sk_err = err; 249 250 parent = bt_sk(sk)->parent; 251 if (parent) { 252 bt_accept_unlink(sk); 253 parent->sk_data_ready(parent); 254 } else { 255 sk->sk_state_change(sk); 256 } 257 258 sock_set_flag(sk, SOCK_ZAPPED); 259 } 260 261 static void iso_conn_del(struct hci_conn *hcon, int err) 262 { 263 struct iso_conn *conn = hcon->iso_data; 264 struct sock *sk; 265 266 conn = iso_conn_hold_unless_zero(conn); 267 if (!conn) 268 return; 269 270 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err); 271 272 /* Kill socket */ 273 iso_conn_lock(conn); 274 sk = iso_sock_hold(conn); 275 iso_conn_unlock(conn); 276 iso_conn_put(conn); 277 278 if (!sk) { 279 iso_conn_put(conn); 280 return; 281 } 282 283 lock_sock(sk); 284 iso_sock_clear_timer(sk); 285 iso_chan_del(sk, err); 286 release_sock(sk); 287 sock_put(sk); 288 } 289 290 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk, 291 struct sock *parent) 292 { 293 BT_DBG("conn %p", conn); 294 295 if (iso_pi(sk)->conn == conn && conn->sk == sk) 296 return 0; 297 298 if (conn->sk) { 299 BT_ERR("conn->sk already set"); 300 return -EBUSY; 301 } 302 303 iso_pi(sk)->conn = conn; 304 conn->sk = sk; 305 306 if (parent) 307 bt_accept_enqueue(parent, sk, true); 308 309 return 0; 310 } 311 312 static int iso_chan_add(struct iso_conn *conn, struct sock *sk, 313 struct sock *parent) 314 { 315 int err; 316 317 iso_conn_lock(conn); 318 err = __iso_chan_add(conn, sk, parent); 319 iso_conn_unlock(conn); 320 321 return err; 322 } 323 324 static inline u8 le_addr_type(u8 bdaddr_type) 325 { 326 if (bdaddr_type == BDADDR_LE_PUBLIC) 327 return ADDR_LE_DEV_PUBLIC; 328 else 329 return ADDR_LE_DEV_RANDOM; 330 } 331 332 static int iso_connect_bis(struct sock *sk) 333 { 334 struct iso_conn *conn; 335 struct hci_conn *hcon; 336 struct hci_dev *hdev; 337 int err; 338 339 BT_DBG("%pMR", &iso_pi(sk)->src); 340 341 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 342 iso_pi(sk)->src_type); 343 if (!hdev) 344 return -EHOSTUNREACH; 345 346 hci_dev_lock(hdev); 347 348 if (!bis_capable(hdev)) { 349 err = -EOPNOTSUPP; 350 goto unlock; 351 } 352 353 /* Fail if user set invalid QoS */ 354 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 355 iso_pi(sk)->qos = default_qos; 356 err = -EINVAL; 357 goto unlock; 358 } 359 360 /* Fail if out PHYs are marked as disabled */ 361 if (!iso_pi(sk)->qos.bcast.out.phy) { 362 err = -EINVAL; 363 goto unlock; 364 } 365 366 /* Just bind if DEFER_SETUP has been set */ 367 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 368 hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst, 369 &iso_pi(sk)->qos, iso_pi(sk)->base_len, 370 iso_pi(sk)->base); 371 if (IS_ERR(hcon)) { 372 err = PTR_ERR(hcon); 373 goto unlock; 374 } 375 } else { 376 hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst, 377 le_addr_type(iso_pi(sk)->dst_type), 378 &iso_pi(sk)->qos, iso_pi(sk)->base_len, 379 iso_pi(sk)->base); 380 if (IS_ERR(hcon)) { 381 err = PTR_ERR(hcon); 382 goto unlock; 383 } 384 } 385 386 conn = iso_conn_add(hcon); 387 if (!conn) { 388 hci_conn_drop(hcon); 389 err = -ENOMEM; 390 goto unlock; 391 } 392 393 lock_sock(sk); 394 395 err = iso_chan_add(conn, sk, NULL); 396 if (err) { 397 release_sock(sk); 398 goto unlock; 399 } 400 401 /* Update source addr of the socket */ 402 bacpy(&iso_pi(sk)->src, &hcon->src); 403 404 if (hcon->state == BT_CONNECTED) { 405 iso_sock_clear_timer(sk); 406 sk->sk_state = BT_CONNECTED; 407 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 408 iso_sock_clear_timer(sk); 409 sk->sk_state = BT_CONNECT; 410 } else { 411 sk->sk_state = BT_CONNECT; 412 iso_sock_set_timer(sk, sk->sk_sndtimeo); 413 } 414 415 release_sock(sk); 416 417 unlock: 418 hci_dev_unlock(hdev); 419 hci_dev_put(hdev); 420 return err; 421 } 422 423 static int iso_connect_cis(struct sock *sk) 424 { 425 struct iso_conn *conn; 426 struct hci_conn *hcon; 427 struct hci_dev *hdev; 428 int err; 429 430 BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst); 431 432 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 433 iso_pi(sk)->src_type); 434 if (!hdev) 435 return -EHOSTUNREACH; 436 437 hci_dev_lock(hdev); 438 439 if (!cis_central_capable(hdev)) { 440 err = -EOPNOTSUPP; 441 goto unlock; 442 } 443 444 /* Fail if user set invalid QoS */ 445 if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) { 446 iso_pi(sk)->qos = default_qos; 447 err = -EINVAL; 448 goto unlock; 449 } 450 451 /* Fail if either PHYs are marked as disabled */ 452 if (!iso_pi(sk)->qos.ucast.in.phy && !iso_pi(sk)->qos.ucast.out.phy) { 453 err = -EINVAL; 454 goto unlock; 455 } 456 457 /* Just bind if DEFER_SETUP has been set */ 458 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 459 hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst, 460 le_addr_type(iso_pi(sk)->dst_type), 461 &iso_pi(sk)->qos); 462 if (IS_ERR(hcon)) { 463 err = PTR_ERR(hcon); 464 goto unlock; 465 } 466 } else { 467 hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst, 468 le_addr_type(iso_pi(sk)->dst_type), 469 &iso_pi(sk)->qos); 470 if (IS_ERR(hcon)) { 471 err = PTR_ERR(hcon); 472 goto unlock; 473 } 474 } 475 476 conn = iso_conn_add(hcon); 477 if (!conn) { 478 hci_conn_drop(hcon); 479 err = -ENOMEM; 480 goto unlock; 481 } 482 483 lock_sock(sk); 484 485 err = iso_chan_add(conn, sk, NULL); 486 if (err) { 487 release_sock(sk); 488 goto unlock; 489 } 490 491 /* Update source addr of the socket */ 492 bacpy(&iso_pi(sk)->src, &hcon->src); 493 494 if (hcon->state == BT_CONNECTED) { 495 iso_sock_clear_timer(sk); 496 sk->sk_state = BT_CONNECTED; 497 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 498 iso_sock_clear_timer(sk); 499 sk->sk_state = BT_CONNECT; 500 } else { 501 sk->sk_state = BT_CONNECT; 502 iso_sock_set_timer(sk, sk->sk_sndtimeo); 503 } 504 505 release_sock(sk); 506 507 unlock: 508 hci_dev_unlock(hdev); 509 hci_dev_put(hdev); 510 return err; 511 } 512 513 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk) 514 { 515 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2) 516 return &iso_pi(sk)->conn->hcon->iso_qos; 517 518 return &iso_pi(sk)->qos; 519 } 520 521 static int iso_send_frame(struct sock *sk, struct sk_buff *skb, 522 const struct sockcm_cookie *sockc) 523 { 524 struct iso_conn *conn = iso_pi(sk)->conn; 525 struct bt_iso_qos *qos = iso_sock_get_qos(sk); 526 struct hci_iso_data_hdr *hdr; 527 int len = 0; 528 529 BT_DBG("sk %p len %d", sk, skb->len); 530 531 if (skb->len > qos->ucast.out.sdu) 532 return -EMSGSIZE; 533 534 len = skb->len; 535 536 /* Push ISO data header */ 537 hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE); 538 hdr->sn = cpu_to_le16(conn->tx_sn++); 539 hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len, 540 HCI_ISO_STATUS_VALID)); 541 542 if (sk->sk_state == BT_CONNECTED) { 543 hci_setup_tx_timestamp(skb, 1, sockc); 544 hci_send_iso(conn->hcon, skb); 545 } else { 546 len = -ENOTCONN; 547 } 548 549 return len; 550 } 551 552 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb) 553 { 554 struct sock *sk; 555 556 iso_conn_lock(conn); 557 sk = conn->sk; 558 iso_conn_unlock(conn); 559 560 if (!sk) 561 goto drop; 562 563 BT_DBG("sk %p len %d", sk, skb->len); 564 565 if (sk->sk_state != BT_CONNECTED) 566 goto drop; 567 568 if (!sock_queue_rcv_skb(sk, skb)) 569 return; 570 571 drop: 572 kfree_skb(skb); 573 } 574 575 /* -------- Socket interface ---------- */ 576 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst) 577 { 578 struct sock *sk; 579 580 sk_for_each(sk, &iso_sk_list.head) { 581 if (sk->sk_state != BT_LISTEN) 582 continue; 583 584 if (bacmp(&iso_pi(sk)->dst, dst)) 585 continue; 586 587 if (!bacmp(&iso_pi(sk)->src, src)) 588 return sk; 589 } 590 591 return NULL; 592 } 593 594 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc, 595 __u8 sid) 596 { 597 struct sock *sk; 598 599 sk_for_each(sk, &iso_sk_list.head) { 600 if (sk->sk_state != BT_LISTEN) 601 continue; 602 603 if (bacmp(&iso_pi(sk)->src, ba)) 604 continue; 605 606 if (bacmp(&iso_pi(sk)->dst, bc)) 607 continue; 608 609 if (iso_pi(sk)->bc_sid == sid) 610 return sk; 611 } 612 613 return NULL; 614 } 615 616 /* Find socket in given state: 617 * source bdaddr (Unicast) 618 * destination bdaddr (Broadcast only) 619 * match func - pass NULL to ignore 620 * match func data - pass -1 to ignore 621 * Returns closest match. 622 */ 623 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst, 624 enum bt_sock_state state, 625 iso_sock_match_t match, void *data) 626 { 627 struct sock *sk = NULL, *sk1 = NULL; 628 629 read_lock(&iso_sk_list.lock); 630 631 sk_for_each(sk, &iso_sk_list.head) { 632 if (sk->sk_state != state) 633 continue; 634 635 /* Match Broadcast destination */ 636 if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst)) 637 continue; 638 639 /* Use Match function if provided */ 640 if (match && !match(sk, data)) 641 continue; 642 643 /* Exact match. */ 644 if (!bacmp(&iso_pi(sk)->src, src)) { 645 sock_hold(sk); 646 break; 647 } 648 649 /* Closest match */ 650 if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) { 651 if (sk1) 652 sock_put(sk1); 653 654 sk1 = sk; 655 sock_hold(sk1); 656 } 657 } 658 659 if (sk && sk1) 660 sock_put(sk1); 661 662 read_unlock(&iso_sk_list.lock); 663 664 return sk ? sk : sk1; 665 } 666 667 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src, 668 bdaddr_t *dst, uint8_t big) 669 { 670 struct sock *sk = NULL; 671 672 read_lock(&iso_sk_list.lock); 673 674 sk_for_each(sk, &iso_sk_list.head) { 675 if (match_sk == sk) 676 continue; 677 678 /* Look for sockets that have already been 679 * connected to the BIG 680 */ 681 if (sk->sk_state != BT_CONNECTED && 682 sk->sk_state != BT_CONNECT) 683 continue; 684 685 /* Match Broadcast destination */ 686 if (bacmp(&iso_pi(sk)->dst, dst)) 687 continue; 688 689 /* Match BIG handle */ 690 if (iso_pi(sk)->qos.bcast.big != big) 691 continue; 692 693 /* Match source address */ 694 if (bacmp(&iso_pi(sk)->src, src)) 695 continue; 696 697 sock_hold(sk); 698 break; 699 } 700 701 read_unlock(&iso_sk_list.lock); 702 703 return sk; 704 } 705 706 static void iso_sock_destruct(struct sock *sk) 707 { 708 BT_DBG("sk %p", sk); 709 710 iso_conn_put(iso_pi(sk)->conn); 711 712 skb_queue_purge(&sk->sk_receive_queue); 713 skb_queue_purge(&sk->sk_write_queue); 714 } 715 716 static void iso_sock_cleanup_listen(struct sock *parent) 717 { 718 struct sock *sk; 719 720 BT_DBG("parent %p", parent); 721 722 /* Close not yet accepted channels */ 723 while ((sk = bt_accept_dequeue(parent, NULL))) { 724 iso_sock_close(sk); 725 iso_sock_kill(sk); 726 } 727 728 /* If listening socket has a hcon, properly disconnect it */ 729 if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) { 730 iso_sock_disconn(parent); 731 return; 732 } 733 734 parent->sk_state = BT_CLOSED; 735 sock_set_flag(parent, SOCK_ZAPPED); 736 } 737 738 /* Kill socket (only if zapped and orphan) 739 * Must be called on unlocked socket. 740 */ 741 static void iso_sock_kill(struct sock *sk) 742 { 743 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket || 744 sock_flag(sk, SOCK_DEAD)) 745 return; 746 747 BT_DBG("sk %p state %d", sk, sk->sk_state); 748 749 /* Kill poor orphan */ 750 bt_sock_unlink(&iso_sk_list, sk); 751 sock_set_flag(sk, SOCK_DEAD); 752 sock_put(sk); 753 } 754 755 static void iso_sock_disconn(struct sock *sk) 756 { 757 struct sock *bis_sk; 758 struct hci_conn *hcon = iso_pi(sk)->conn->hcon; 759 760 if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) { 761 bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src, 762 &iso_pi(sk)->dst, 763 iso_pi(sk)->qos.bcast.big); 764 765 /* If there are any other connected sockets for the 766 * same BIG, just delete the sk and leave the bis 767 * hcon active, in case later rebinding is needed. 768 */ 769 if (bis_sk) { 770 hcon->state = BT_OPEN; 771 hcon->iso_data = NULL; 772 iso_pi(sk)->conn->hcon = NULL; 773 iso_sock_clear_timer(sk); 774 iso_chan_del(sk, bt_to_errno(hcon->abort_reason)); 775 sock_put(bis_sk); 776 return; 777 } 778 } 779 780 sk->sk_state = BT_DISCONN; 781 iso_conn_lock(iso_pi(sk)->conn); 782 hci_conn_drop(iso_pi(sk)->conn->hcon); 783 iso_pi(sk)->conn->hcon = NULL; 784 iso_conn_unlock(iso_pi(sk)->conn); 785 } 786 787 static void __iso_sock_close(struct sock *sk) 788 { 789 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket); 790 791 switch (sk->sk_state) { 792 case BT_LISTEN: 793 iso_sock_cleanup_listen(sk); 794 break; 795 796 case BT_CONNECT: 797 case BT_CONNECTED: 798 case BT_CONFIG: 799 if (iso_pi(sk)->conn->hcon) 800 iso_sock_disconn(sk); 801 else 802 iso_chan_del(sk, ECONNRESET); 803 break; 804 805 case BT_CONNECT2: 806 if (iso_pi(sk)->conn->hcon && 807 (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) || 808 test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags))) 809 iso_sock_disconn(sk); 810 else 811 iso_chan_del(sk, ECONNRESET); 812 break; 813 case BT_DISCONN: 814 iso_chan_del(sk, ECONNRESET); 815 break; 816 817 default: 818 sock_set_flag(sk, SOCK_ZAPPED); 819 break; 820 } 821 } 822 823 /* Must be called on unlocked socket. */ 824 static void iso_sock_close(struct sock *sk) 825 { 826 iso_sock_clear_timer(sk); 827 lock_sock(sk); 828 __iso_sock_close(sk); 829 release_sock(sk); 830 iso_sock_kill(sk); 831 } 832 833 static void iso_sock_init(struct sock *sk, struct sock *parent) 834 { 835 BT_DBG("sk %p", sk); 836 837 if (parent) { 838 sk->sk_type = parent->sk_type; 839 bt_sk(sk)->flags = bt_sk(parent)->flags; 840 security_sk_clone(parent, sk); 841 } 842 } 843 844 static struct proto iso_proto = { 845 .name = "ISO", 846 .owner = THIS_MODULE, 847 .obj_size = sizeof(struct iso_pinfo) 848 }; 849 850 #define DEFAULT_IO_QOS \ 851 { \ 852 .interval = 10000u, \ 853 .latency = 10u, \ 854 .sdu = 40u, \ 855 .phy = BT_ISO_PHY_2M, \ 856 .rtn = 2u, \ 857 } 858 859 static struct bt_iso_qos default_qos = { 860 .bcast = { 861 .big = BT_ISO_QOS_BIG_UNSET, 862 .bis = BT_ISO_QOS_BIS_UNSET, 863 .sync_factor = 0x01, 864 .packing = 0x00, 865 .framing = 0x00, 866 .in = DEFAULT_IO_QOS, 867 .out = DEFAULT_IO_QOS, 868 .encryption = 0x00, 869 .bcode = {0x00}, 870 .options = 0x00, 871 .skip = 0x0000, 872 .sync_timeout = BT_ISO_SYNC_TIMEOUT, 873 .sync_cte_type = 0x00, 874 .mse = 0x00, 875 .timeout = BT_ISO_SYNC_TIMEOUT, 876 }, 877 }; 878 879 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock, 880 int proto, gfp_t prio, int kern) 881 { 882 struct sock *sk; 883 884 sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern); 885 if (!sk) 886 return NULL; 887 888 sk->sk_destruct = iso_sock_destruct; 889 sk->sk_sndtimeo = ISO_CONN_TIMEOUT; 890 891 /* Set address type as public as default src address is BDADDR_ANY */ 892 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 893 894 iso_pi(sk)->qos = default_qos; 895 iso_pi(sk)->sync_handle = -1; 896 897 bt_sock_link(&iso_sk_list, sk); 898 return sk; 899 } 900 901 static int iso_sock_create(struct net *net, struct socket *sock, int protocol, 902 int kern) 903 { 904 struct sock *sk; 905 906 BT_DBG("sock %p", sock); 907 908 sock->state = SS_UNCONNECTED; 909 910 if (sock->type != SOCK_SEQPACKET) 911 return -ESOCKTNOSUPPORT; 912 913 sock->ops = &iso_sock_ops; 914 915 sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern); 916 if (!sk) 917 return -ENOMEM; 918 919 iso_sock_init(sk, NULL); 920 return 0; 921 } 922 923 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr *addr, 924 int addr_len) 925 { 926 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 927 struct sock *sk = sock->sk; 928 int i; 929 930 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid, 931 sa->iso_bc->bc_num_bis); 932 933 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) 934 return -EINVAL; 935 936 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr); 937 938 /* Check if the address type is of LE type */ 939 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type)) 940 return -EINVAL; 941 942 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type; 943 944 if (sa->iso_bc->bc_sid > 0x0f && sa->iso_bc->bc_sid != HCI_SID_INVALID) 945 return -EINVAL; 946 947 iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid; 948 949 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) 950 return -EINVAL; 951 952 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 953 954 for (i = 0; i < iso_pi(sk)->bc_num_bis; i++) 955 if (sa->iso_bc->bc_bis[i] < 0x01 || 956 sa->iso_bc->bc_bis[i] > 0x1f) 957 return -EINVAL; 958 959 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 960 iso_pi(sk)->bc_num_bis); 961 962 return 0; 963 } 964 965 static int iso_sock_bind_pa_sk(struct sock *sk, struct sockaddr_iso *sa, 966 int addr_len) 967 { 968 int err = 0; 969 970 if (sk->sk_type != SOCK_SEQPACKET) { 971 err = -EINVAL; 972 goto done; 973 } 974 975 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) { 976 err = -EINVAL; 977 goto done; 978 } 979 980 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) { 981 err = -EINVAL; 982 goto done; 983 } 984 985 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 986 987 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) 988 if (sa->iso_bc->bc_bis[i] < 0x01 || 989 sa->iso_bc->bc_bis[i] > 0x1f) { 990 err = -EINVAL; 991 goto done; 992 } 993 994 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 995 iso_pi(sk)->bc_num_bis); 996 997 done: 998 return err; 999 } 1000 1001 static int iso_sock_bind(struct socket *sock, struct sockaddr *addr, 1002 int addr_len) 1003 { 1004 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1005 struct sock *sk = sock->sk; 1006 int err = 0; 1007 1008 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type); 1009 1010 if (!addr || addr_len < sizeof(struct sockaddr_iso) || 1011 addr->sa_family != AF_BLUETOOTH) 1012 return -EINVAL; 1013 1014 lock_sock(sk); 1015 1016 /* Allow the user to bind a PA sync socket to a number 1017 * of BISes to sync to. 1018 */ 1019 if ((sk->sk_state == BT_CONNECT2 || 1020 sk->sk_state == BT_CONNECTED) && 1021 test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1022 err = iso_sock_bind_pa_sk(sk, sa, addr_len); 1023 goto done; 1024 } 1025 1026 if (sk->sk_state != BT_OPEN) { 1027 err = -EBADFD; 1028 goto done; 1029 } 1030 1031 if (sk->sk_type != SOCK_SEQPACKET) { 1032 err = -EINVAL; 1033 goto done; 1034 } 1035 1036 /* Check if the address type is of LE type */ 1037 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) { 1038 err = -EINVAL; 1039 goto done; 1040 } 1041 1042 bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr); 1043 iso_pi(sk)->src_type = sa->iso_bdaddr_type; 1044 1045 /* Check for Broadcast address */ 1046 if (addr_len > sizeof(*sa)) { 1047 err = iso_sock_bind_bc(sock, addr, addr_len); 1048 if (err) 1049 goto done; 1050 } 1051 1052 sk->sk_state = BT_BOUND; 1053 1054 done: 1055 release_sock(sk); 1056 return err; 1057 } 1058 1059 static int iso_sock_connect(struct socket *sock, struct sockaddr *addr, 1060 int alen, int flags) 1061 { 1062 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1063 struct sock *sk = sock->sk; 1064 int err; 1065 1066 BT_DBG("sk %p", sk); 1067 1068 if (alen < sizeof(struct sockaddr_iso) || 1069 addr->sa_family != AF_BLUETOOTH) 1070 return -EINVAL; 1071 1072 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) 1073 return -EBADFD; 1074 1075 if (sk->sk_type != SOCK_SEQPACKET) 1076 return -EINVAL; 1077 1078 /* Check if the address type is of LE type */ 1079 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) 1080 return -EINVAL; 1081 1082 lock_sock(sk); 1083 1084 bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr); 1085 iso_pi(sk)->dst_type = sa->iso_bdaddr_type; 1086 1087 release_sock(sk); 1088 1089 if (bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) 1090 err = iso_connect_cis(sk); 1091 else 1092 err = iso_connect_bis(sk); 1093 1094 if (err) 1095 return err; 1096 1097 lock_sock(sk); 1098 1099 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1100 err = bt_sock_wait_state(sk, BT_CONNECTED, 1101 sock_sndtimeo(sk, flags & O_NONBLOCK)); 1102 } 1103 1104 release_sock(sk); 1105 return err; 1106 } 1107 1108 static int iso_listen_bis(struct sock *sk) 1109 { 1110 struct hci_dev *hdev; 1111 int err = 0; 1112 struct iso_conn *conn; 1113 struct hci_conn *hcon; 1114 1115 BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src, 1116 &iso_pi(sk)->dst, iso_pi(sk)->bc_sid); 1117 1118 write_lock(&iso_sk_list.lock); 1119 1120 if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst, 1121 iso_pi(sk)->bc_sid)) 1122 err = -EADDRINUSE; 1123 1124 write_unlock(&iso_sk_list.lock); 1125 1126 if (err) 1127 return err; 1128 1129 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1130 iso_pi(sk)->src_type); 1131 if (!hdev) 1132 return -EHOSTUNREACH; 1133 1134 hci_dev_lock(hdev); 1135 lock_sock(sk); 1136 1137 /* Fail if user set invalid QoS */ 1138 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 1139 iso_pi(sk)->qos = default_qos; 1140 err = -EINVAL; 1141 goto unlock; 1142 } 1143 1144 hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst, 1145 le_addr_type(iso_pi(sk)->dst_type), 1146 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos); 1147 if (IS_ERR(hcon)) { 1148 err = PTR_ERR(hcon); 1149 goto unlock; 1150 } 1151 1152 conn = iso_conn_add(hcon); 1153 if (!conn) { 1154 hci_conn_drop(hcon); 1155 err = -ENOMEM; 1156 goto unlock; 1157 } 1158 1159 err = iso_chan_add(conn, sk, NULL); 1160 if (err) { 1161 hci_conn_drop(hcon); 1162 goto unlock; 1163 } 1164 1165 unlock: 1166 release_sock(sk); 1167 hci_dev_unlock(hdev); 1168 hci_dev_put(hdev); 1169 return err; 1170 } 1171 1172 static int iso_listen_cis(struct sock *sk) 1173 { 1174 int err = 0; 1175 1176 BT_DBG("%pMR", &iso_pi(sk)->src); 1177 1178 write_lock(&iso_sk_list.lock); 1179 1180 if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst)) 1181 err = -EADDRINUSE; 1182 1183 write_unlock(&iso_sk_list.lock); 1184 1185 return err; 1186 } 1187 1188 static int iso_sock_listen(struct socket *sock, int backlog) 1189 { 1190 struct sock *sk = sock->sk; 1191 int err = 0; 1192 1193 BT_DBG("sk %p backlog %d", sk, backlog); 1194 1195 sock_hold(sk); 1196 lock_sock(sk); 1197 1198 if (sk->sk_state != BT_BOUND) { 1199 err = -EBADFD; 1200 goto done; 1201 } 1202 1203 if (sk->sk_type != SOCK_SEQPACKET) { 1204 err = -EINVAL; 1205 goto done; 1206 } 1207 1208 if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1209 err = iso_listen_cis(sk); 1210 } else { 1211 /* Drop sock lock to avoid potential 1212 * deadlock with the hdev lock. 1213 */ 1214 release_sock(sk); 1215 err = iso_listen_bis(sk); 1216 lock_sock(sk); 1217 } 1218 1219 if (err) 1220 goto done; 1221 1222 sk->sk_max_ack_backlog = backlog; 1223 sk->sk_ack_backlog = 0; 1224 1225 sk->sk_state = BT_LISTEN; 1226 1227 done: 1228 release_sock(sk); 1229 sock_put(sk); 1230 return err; 1231 } 1232 1233 static int iso_sock_accept(struct socket *sock, struct socket *newsock, 1234 struct proto_accept_arg *arg) 1235 { 1236 DEFINE_WAIT_FUNC(wait, woken_wake_function); 1237 struct sock *sk = sock->sk, *ch; 1238 long timeo; 1239 int err = 0; 1240 1241 /* Use explicit nested locking to avoid lockdep warnings generated 1242 * because the parent socket and the child socket are locked on the 1243 * same thread. 1244 */ 1245 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1246 1247 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK); 1248 1249 BT_DBG("sk %p timeo %ld", sk, timeo); 1250 1251 /* Wait for an incoming connection. (wake-one). */ 1252 add_wait_queue_exclusive(sk_sleep(sk), &wait); 1253 while (1) { 1254 if (sk->sk_state != BT_LISTEN) { 1255 err = -EBADFD; 1256 break; 1257 } 1258 1259 ch = bt_accept_dequeue(sk, newsock); 1260 if (ch) 1261 break; 1262 1263 if (!timeo) { 1264 err = -EAGAIN; 1265 break; 1266 } 1267 1268 if (signal_pending(current)) { 1269 err = sock_intr_errno(timeo); 1270 break; 1271 } 1272 1273 release_sock(sk); 1274 1275 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo); 1276 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1277 } 1278 remove_wait_queue(sk_sleep(sk), &wait); 1279 1280 if (err) 1281 goto done; 1282 1283 newsock->state = SS_CONNECTED; 1284 1285 BT_DBG("new socket %p", ch); 1286 1287 /* A Broadcast Sink might require BIG sync to be terminated 1288 * and re-established multiple times, while keeping the same 1289 * PA sync handle active. To allow this, once all BIS 1290 * connections have been accepted on a PA sync parent socket, 1291 * "reset" socket state, to allow future BIG re-sync procedures. 1292 */ 1293 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1294 /* Iterate through the list of bound BIS indices 1295 * and clear each BIS as they are accepted by the 1296 * user space, one by one. 1297 */ 1298 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) { 1299 if (iso_pi(sk)->bc_bis[i] > 0) { 1300 iso_pi(sk)->bc_bis[i] = 0; 1301 iso_pi(sk)->bc_num_bis--; 1302 break; 1303 } 1304 } 1305 1306 if (iso_pi(sk)->bc_num_bis == 0) { 1307 /* Once the last BIS was accepted, reset parent 1308 * socket parameters to mark that the listening 1309 * process for BIS connections has been completed: 1310 * 1311 * 1. Reset the DEFER setup flag on the parent sk. 1312 * 2. Clear the flag marking that the BIG create 1313 * sync command is pending. 1314 * 3. Transition socket state from BT_LISTEN to 1315 * BT_CONNECTED. 1316 */ 1317 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1318 clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags); 1319 sk->sk_state = BT_CONNECTED; 1320 } 1321 } 1322 1323 done: 1324 release_sock(sk); 1325 return err; 1326 } 1327 1328 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr, 1329 int peer) 1330 { 1331 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1332 struct sock *sk = sock->sk; 1333 int len = sizeof(struct sockaddr_iso); 1334 1335 BT_DBG("sock %p, sk %p", sock, sk); 1336 1337 addr->sa_family = AF_BLUETOOTH; 1338 1339 if (peer) { 1340 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst); 1341 sa->iso_bdaddr_type = iso_pi(sk)->dst_type; 1342 1343 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1344 sa->iso_bc->bc_sid = iso_pi(sk)->bc_sid; 1345 sa->iso_bc->bc_num_bis = iso_pi(sk)->bc_num_bis; 1346 memcpy(sa->iso_bc->bc_bis, iso_pi(sk)->bc_bis, 1347 ISO_MAX_NUM_BIS); 1348 len += sizeof(struct sockaddr_iso_bc); 1349 } 1350 } else { 1351 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src); 1352 sa->iso_bdaddr_type = iso_pi(sk)->src_type; 1353 } 1354 1355 return len; 1356 } 1357 1358 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg, 1359 size_t len) 1360 { 1361 struct sock *sk = sock->sk; 1362 struct sk_buff *skb, **frag; 1363 struct sockcm_cookie sockc; 1364 size_t mtu; 1365 int err; 1366 1367 BT_DBG("sock %p, sk %p", sock, sk); 1368 1369 err = sock_error(sk); 1370 if (err) 1371 return err; 1372 1373 if (msg->msg_flags & MSG_OOB) 1374 return -EOPNOTSUPP; 1375 1376 hci_sockcm_init(&sockc, sk); 1377 1378 if (msg->msg_controllen) { 1379 err = sock_cmsg_send(sk, msg, &sockc); 1380 if (err) 1381 return err; 1382 } 1383 1384 lock_sock(sk); 1385 1386 if (sk->sk_state != BT_CONNECTED) { 1387 release_sock(sk); 1388 return -ENOTCONN; 1389 } 1390 1391 mtu = iso_pi(sk)->conn->hcon->mtu; 1392 1393 release_sock(sk); 1394 1395 skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0); 1396 if (IS_ERR(skb)) 1397 return PTR_ERR(skb); 1398 1399 len -= skb->len; 1400 1401 BT_DBG("skb %p len %d", sk, skb->len); 1402 1403 /* Continuation fragments */ 1404 frag = &skb_shinfo(skb)->frag_list; 1405 while (len) { 1406 struct sk_buff *tmp; 1407 1408 tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0); 1409 if (IS_ERR(tmp)) { 1410 kfree_skb(skb); 1411 return PTR_ERR(tmp); 1412 } 1413 1414 *frag = tmp; 1415 1416 len -= tmp->len; 1417 1418 skb->len += tmp->len; 1419 skb->data_len += tmp->len; 1420 1421 BT_DBG("frag %p len %d", *frag, tmp->len); 1422 1423 frag = &(*frag)->next; 1424 } 1425 1426 lock_sock(sk); 1427 1428 if (sk->sk_state == BT_CONNECTED) 1429 err = iso_send_frame(sk, skb, &sockc); 1430 else 1431 err = -ENOTCONN; 1432 1433 release_sock(sk); 1434 1435 if (err < 0) 1436 kfree_skb(skb); 1437 return err; 1438 } 1439 1440 static void iso_conn_defer_accept(struct hci_conn *conn) 1441 { 1442 struct hci_cp_le_accept_cis cp; 1443 struct hci_dev *hdev = conn->hdev; 1444 1445 BT_DBG("conn %p", conn); 1446 1447 conn->state = BT_CONFIG; 1448 1449 cp.handle = cpu_to_le16(conn->handle); 1450 1451 hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp); 1452 } 1453 1454 static void iso_conn_big_sync(struct sock *sk) 1455 { 1456 int err; 1457 struct hci_dev *hdev; 1458 1459 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1460 iso_pi(sk)->src_type); 1461 1462 if (!hdev) 1463 return; 1464 1465 /* hci_le_big_create_sync requires hdev lock to be held, since 1466 * it enqueues the HCI LE BIG Create Sync command via 1467 * hci_cmd_sync_queue_once, which checks hdev flags that might 1468 * change. 1469 */ 1470 hci_dev_lock(hdev); 1471 lock_sock(sk); 1472 1473 if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) { 1474 err = hci_conn_big_create_sync(hdev, iso_pi(sk)->conn->hcon, 1475 &iso_pi(sk)->qos, 1476 iso_pi(sk)->sync_handle, 1477 iso_pi(sk)->bc_num_bis, 1478 iso_pi(sk)->bc_bis); 1479 if (err) 1480 bt_dev_err(hdev, "hci_big_create_sync: %d", err); 1481 } 1482 1483 release_sock(sk); 1484 hci_dev_unlock(hdev); 1485 } 1486 1487 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1488 size_t len, int flags) 1489 { 1490 struct sock *sk = sock->sk; 1491 struct iso_pinfo *pi = iso_pi(sk); 1492 bool early_ret = false; 1493 int err = 0; 1494 1495 BT_DBG("sk %p", sk); 1496 1497 if (unlikely(flags & MSG_ERRQUEUE)) 1498 return sock_recv_errqueue(sk, msg, len, SOL_BLUETOOTH, 1499 BT_SCM_ERROR); 1500 1501 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1502 sock_hold(sk); 1503 lock_sock(sk); 1504 1505 switch (sk->sk_state) { 1506 case BT_CONNECT2: 1507 if (test_bit(BT_SK_PA_SYNC, &pi->flags)) { 1508 release_sock(sk); 1509 iso_conn_big_sync(sk); 1510 lock_sock(sk); 1511 1512 sk->sk_state = BT_LISTEN; 1513 } else { 1514 iso_conn_defer_accept(pi->conn->hcon); 1515 sk->sk_state = BT_CONFIG; 1516 } 1517 1518 early_ret = true; 1519 break; 1520 case BT_CONNECTED: 1521 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1522 release_sock(sk); 1523 iso_conn_big_sync(sk); 1524 lock_sock(sk); 1525 1526 sk->sk_state = BT_LISTEN; 1527 early_ret = true; 1528 } 1529 1530 break; 1531 case BT_CONNECT: 1532 release_sock(sk); 1533 err = iso_connect_cis(sk); 1534 lock_sock(sk); 1535 1536 early_ret = true; 1537 break; 1538 default: 1539 break; 1540 } 1541 1542 release_sock(sk); 1543 sock_put(sk); 1544 1545 if (early_ret) 1546 return err; 1547 } 1548 1549 return bt_sock_recvmsg(sock, msg, len, flags); 1550 } 1551 1552 static bool check_io_qos(struct bt_iso_io_qos *qos) 1553 { 1554 /* If no PHY is enable SDU must be 0 */ 1555 if (!qos->phy && qos->sdu) 1556 return false; 1557 1558 if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff)) 1559 return false; 1560 1561 if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0)) 1562 return false; 1563 1564 if (qos->phy > BT_ISO_PHY_ANY) 1565 return false; 1566 1567 return true; 1568 } 1569 1570 static bool check_ucast_qos(struct bt_iso_qos *qos) 1571 { 1572 if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET) 1573 return false; 1574 1575 if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET) 1576 return false; 1577 1578 if (qos->ucast.sca > 0x07) 1579 return false; 1580 1581 if (qos->ucast.packing > 0x01) 1582 return false; 1583 1584 if (qos->ucast.framing > 0x01) 1585 return false; 1586 1587 if (!check_io_qos(&qos->ucast.in)) 1588 return false; 1589 1590 if (!check_io_qos(&qos->ucast.out)) 1591 return false; 1592 1593 return true; 1594 } 1595 1596 static bool check_bcast_qos(struct bt_iso_qos *qos) 1597 { 1598 if (!qos->bcast.sync_factor) 1599 qos->bcast.sync_factor = 0x01; 1600 1601 if (qos->bcast.packing > 0x01) 1602 return false; 1603 1604 if (qos->bcast.framing > 0x01) 1605 return false; 1606 1607 if (!check_io_qos(&qos->bcast.in)) 1608 return false; 1609 1610 if (!check_io_qos(&qos->bcast.out)) 1611 return false; 1612 1613 if (qos->bcast.encryption > 0x01) 1614 return false; 1615 1616 if (qos->bcast.options > 0x07) 1617 return false; 1618 1619 if (qos->bcast.skip > 0x01f3) 1620 return false; 1621 1622 if (!qos->bcast.sync_timeout) 1623 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1624 1625 if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000) 1626 return false; 1627 1628 if (qos->bcast.sync_cte_type > 0x1f) 1629 return false; 1630 1631 if (qos->bcast.mse > 0x1f) 1632 return false; 1633 1634 if (!qos->bcast.timeout) 1635 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1636 1637 if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000) 1638 return false; 1639 1640 return true; 1641 } 1642 1643 static int iso_sock_setsockopt(struct socket *sock, int level, int optname, 1644 sockptr_t optval, unsigned int optlen) 1645 { 1646 struct sock *sk = sock->sk; 1647 int err = 0; 1648 struct bt_iso_qos qos = default_qos; 1649 u32 opt; 1650 1651 BT_DBG("sk %p", sk); 1652 1653 lock_sock(sk); 1654 1655 switch (optname) { 1656 case BT_DEFER_SETUP: 1657 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) { 1658 err = -EINVAL; 1659 break; 1660 } 1661 1662 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1663 if (err) 1664 break; 1665 1666 if (opt) 1667 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1668 else 1669 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1670 break; 1671 1672 case BT_PKT_STATUS: 1673 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1674 if (err) 1675 break; 1676 1677 if (opt) 1678 set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1679 else 1680 clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1681 break; 1682 1683 case BT_ISO_QOS: 1684 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1685 sk->sk_state != BT_CONNECT2 && 1686 (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) || 1687 sk->sk_state != BT_CONNECTED)) { 1688 err = -EINVAL; 1689 break; 1690 } 1691 1692 err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen); 1693 if (err) 1694 break; 1695 1696 iso_pi(sk)->qos = qos; 1697 iso_pi(sk)->qos_user_set = true; 1698 1699 break; 1700 1701 case BT_ISO_BASE: 1702 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1703 sk->sk_state != BT_CONNECT2) { 1704 err = -EINVAL; 1705 break; 1706 } 1707 1708 if (optlen > sizeof(iso_pi(sk)->base)) { 1709 err = -EINVAL; 1710 break; 1711 } 1712 1713 err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval, 1714 optlen); 1715 if (err) 1716 break; 1717 1718 iso_pi(sk)->base_len = optlen; 1719 1720 break; 1721 1722 default: 1723 err = -ENOPROTOOPT; 1724 break; 1725 } 1726 1727 release_sock(sk); 1728 return err; 1729 } 1730 1731 static int iso_sock_getsockopt(struct socket *sock, int level, int optname, 1732 char __user *optval, int __user *optlen) 1733 { 1734 struct sock *sk = sock->sk; 1735 int len, err = 0; 1736 struct bt_iso_qos *qos; 1737 u8 base_len; 1738 u8 *base; 1739 1740 BT_DBG("sk %p", sk); 1741 1742 if (get_user(len, optlen)) 1743 return -EFAULT; 1744 1745 lock_sock(sk); 1746 1747 switch (optname) { 1748 case BT_DEFER_SETUP: 1749 if (sk->sk_state == BT_CONNECTED) { 1750 err = -EINVAL; 1751 break; 1752 } 1753 1754 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags), 1755 (u32 __user *)optval)) 1756 err = -EFAULT; 1757 1758 break; 1759 1760 case BT_PKT_STATUS: 1761 if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags), 1762 (int __user *)optval)) 1763 err = -EFAULT; 1764 break; 1765 1766 case BT_ISO_QOS: 1767 qos = iso_sock_get_qos(sk); 1768 1769 len = min_t(unsigned int, len, sizeof(*qos)); 1770 if (copy_to_user(optval, qos, len)) 1771 err = -EFAULT; 1772 1773 break; 1774 1775 case BT_ISO_BASE: 1776 if (sk->sk_state == BT_CONNECTED && 1777 !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1778 base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len; 1779 base = iso_pi(sk)->conn->hcon->le_per_adv_data; 1780 } else { 1781 base_len = iso_pi(sk)->base_len; 1782 base = iso_pi(sk)->base; 1783 } 1784 1785 len = min_t(unsigned int, len, base_len); 1786 if (copy_to_user(optval, base, len)) 1787 err = -EFAULT; 1788 if (put_user(len, optlen)) 1789 err = -EFAULT; 1790 1791 break; 1792 1793 default: 1794 err = -ENOPROTOOPT; 1795 break; 1796 } 1797 1798 release_sock(sk); 1799 return err; 1800 } 1801 1802 static int iso_sock_shutdown(struct socket *sock, int how) 1803 { 1804 struct sock *sk = sock->sk; 1805 int err = 0; 1806 1807 BT_DBG("sock %p, sk %p, how %d", sock, sk, how); 1808 1809 if (!sk) 1810 return 0; 1811 1812 sock_hold(sk); 1813 lock_sock(sk); 1814 1815 switch (how) { 1816 case SHUT_RD: 1817 if (sk->sk_shutdown & RCV_SHUTDOWN) 1818 goto unlock; 1819 sk->sk_shutdown |= RCV_SHUTDOWN; 1820 break; 1821 case SHUT_WR: 1822 if (sk->sk_shutdown & SEND_SHUTDOWN) 1823 goto unlock; 1824 sk->sk_shutdown |= SEND_SHUTDOWN; 1825 break; 1826 case SHUT_RDWR: 1827 if (sk->sk_shutdown & SHUTDOWN_MASK) 1828 goto unlock; 1829 sk->sk_shutdown |= SHUTDOWN_MASK; 1830 break; 1831 } 1832 1833 iso_sock_clear_timer(sk); 1834 __iso_sock_close(sk); 1835 1836 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime && 1837 !(current->flags & PF_EXITING)) 1838 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1839 1840 unlock: 1841 release_sock(sk); 1842 sock_put(sk); 1843 1844 return err; 1845 } 1846 1847 static int iso_sock_release(struct socket *sock) 1848 { 1849 struct sock *sk = sock->sk; 1850 int err = 0; 1851 1852 BT_DBG("sock %p, sk %p", sock, sk); 1853 1854 if (!sk) 1855 return 0; 1856 1857 iso_sock_close(sk); 1858 1859 if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) && 1860 !(current->flags & PF_EXITING)) { 1861 lock_sock(sk); 1862 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1863 release_sock(sk); 1864 } 1865 1866 sock_orphan(sk); 1867 iso_sock_kill(sk); 1868 return err; 1869 } 1870 1871 static void iso_sock_ready(struct sock *sk) 1872 { 1873 BT_DBG("sk %p", sk); 1874 1875 if (!sk) 1876 return; 1877 1878 lock_sock(sk); 1879 iso_sock_clear_timer(sk); 1880 sk->sk_state = BT_CONNECTED; 1881 sk->sk_state_change(sk); 1882 release_sock(sk); 1883 } 1884 1885 static bool iso_match_big(struct sock *sk, void *data) 1886 { 1887 struct hci_evt_le_big_sync_estabilished *ev = data; 1888 1889 return ev->handle == iso_pi(sk)->qos.bcast.big; 1890 } 1891 1892 static bool iso_match_big_hcon(struct sock *sk, void *data) 1893 { 1894 struct hci_conn *hcon = data; 1895 1896 return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big; 1897 } 1898 1899 static bool iso_match_pa_sync_flag(struct sock *sk, void *data) 1900 { 1901 return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 1902 } 1903 1904 static void iso_conn_ready(struct iso_conn *conn) 1905 { 1906 struct sock *parent = NULL; 1907 struct sock *sk = conn->sk; 1908 struct hci_ev_le_big_sync_estabilished *ev = NULL; 1909 struct hci_ev_le_pa_sync_established *ev2 = NULL; 1910 struct hci_ev_le_per_adv_report *ev3 = NULL; 1911 struct hci_conn *hcon; 1912 1913 BT_DBG("conn %p", conn); 1914 1915 if (sk) { 1916 iso_sock_ready(conn->sk); 1917 } else { 1918 hcon = conn->hcon; 1919 if (!hcon) 1920 return; 1921 1922 if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) { 1923 /* A BIS slave hcon is notified to the ISO layer 1924 * after the Command Complete for the LE Setup 1925 * ISO Data Path command is received. Get the 1926 * parent socket that matches the hcon BIG handle. 1927 */ 1928 parent = iso_get_sock(&hcon->src, &hcon->dst, 1929 BT_LISTEN, iso_match_big_hcon, 1930 hcon); 1931 } else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) { 1932 ev = hci_recv_event_data(hcon->hdev, 1933 HCI_EVT_LE_BIG_SYNC_ESTABLISHED); 1934 1935 /* Get reference to PA sync parent socket, if it exists */ 1936 parent = iso_get_sock(&hcon->src, &hcon->dst, 1937 BT_LISTEN, 1938 iso_match_pa_sync_flag, 1939 NULL); 1940 if (!parent && ev) 1941 parent = iso_get_sock(&hcon->src, 1942 &hcon->dst, 1943 BT_LISTEN, 1944 iso_match_big, ev); 1945 } else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 1946 ev2 = hci_recv_event_data(hcon->hdev, 1947 HCI_EV_LE_PA_SYNC_ESTABLISHED); 1948 if (ev2) 1949 parent = iso_get_sock(&hcon->src, 1950 &hcon->dst, 1951 BT_LISTEN, 1952 iso_match_sid, ev2); 1953 } else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) { 1954 ev3 = hci_recv_event_data(hcon->hdev, 1955 HCI_EV_LE_PER_ADV_REPORT); 1956 if (ev3) 1957 parent = iso_get_sock(&hcon->src, 1958 &hcon->dst, 1959 BT_LISTEN, 1960 iso_match_sync_handle_pa_report, 1961 ev3); 1962 } 1963 1964 if (!parent) 1965 parent = iso_get_sock(&hcon->src, BDADDR_ANY, 1966 BT_LISTEN, NULL, NULL); 1967 1968 if (!parent) 1969 return; 1970 1971 lock_sock(parent); 1972 1973 sk = iso_sock_alloc(sock_net(parent), NULL, 1974 BTPROTO_ISO, GFP_ATOMIC, 0); 1975 if (!sk) { 1976 release_sock(parent); 1977 return; 1978 } 1979 1980 iso_sock_init(sk, parent); 1981 1982 bacpy(&iso_pi(sk)->src, &hcon->src); 1983 1984 /* Convert from HCI to three-value type */ 1985 if (hcon->src_type == ADDR_LE_DEV_PUBLIC) 1986 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 1987 else 1988 iso_pi(sk)->src_type = BDADDR_LE_RANDOM; 1989 1990 /* If hcon has no destination address (BDADDR_ANY) it means it 1991 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or 1992 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using 1993 * the parent socket destination address. 1994 */ 1995 if (!bacmp(&hcon->dst, BDADDR_ANY)) { 1996 bacpy(&hcon->dst, &iso_pi(parent)->dst); 1997 hcon->dst_type = iso_pi(parent)->dst_type; 1998 } 1999 2000 if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) { 2001 iso_pi(sk)->qos = iso_pi(parent)->qos; 2002 hcon->iso_qos = iso_pi(sk)->qos; 2003 iso_pi(sk)->bc_sid = iso_pi(parent)->bc_sid; 2004 iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis; 2005 memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis, 2006 ISO_MAX_NUM_BIS); 2007 set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 2008 } 2009 2010 bacpy(&iso_pi(sk)->dst, &hcon->dst); 2011 iso_pi(sk)->dst_type = hcon->dst_type; 2012 iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle; 2013 memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len); 2014 iso_pi(sk)->base_len = iso_pi(parent)->base_len; 2015 2016 hci_conn_hold(hcon); 2017 iso_chan_add(conn, sk, parent); 2018 2019 if ((ev && ((struct hci_evt_le_big_sync_estabilished *)ev)->status) || 2020 (ev2 && ev2->status)) { 2021 /* Trigger error signal on child socket */ 2022 sk->sk_err = ECONNREFUSED; 2023 sk->sk_error_report(sk); 2024 } 2025 2026 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) 2027 sk->sk_state = BT_CONNECT2; 2028 else 2029 sk->sk_state = BT_CONNECTED; 2030 2031 /* Wake up parent */ 2032 parent->sk_data_ready(parent); 2033 2034 release_sock(parent); 2035 sock_put(parent); 2036 } 2037 } 2038 2039 static bool iso_match_sid(struct sock *sk, void *data) 2040 { 2041 struct hci_ev_le_pa_sync_established *ev = data; 2042 2043 if (iso_pi(sk)->bc_sid == HCI_SID_INVALID) 2044 return true; 2045 2046 return ev->sid == iso_pi(sk)->bc_sid; 2047 } 2048 2049 static bool iso_match_sync_handle(struct sock *sk, void *data) 2050 { 2051 struct hci_evt_le_big_info_adv_report *ev = data; 2052 2053 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2054 } 2055 2056 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data) 2057 { 2058 struct hci_ev_le_per_adv_report *ev = data; 2059 2060 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2061 } 2062 2063 /* ----- ISO interface with lower layer (HCI) ----- */ 2064 2065 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags) 2066 { 2067 struct hci_ev_le_pa_sync_established *ev1; 2068 struct hci_evt_le_big_info_adv_report *ev2; 2069 struct hci_ev_le_per_adv_report *ev3; 2070 struct sock *sk; 2071 2072 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 2073 2074 /* Broadcast receiver requires handling of some events before it can 2075 * proceed to establishing a BIG sync: 2076 * 2077 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific 2078 * SID to listen to and once sync is estabilished its handle needs to 2079 * be stored in iso_pi(sk)->sync_handle so it can be matched once 2080 * receiving the BIG Info. 2081 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a 2082 * a BIG Info it attempts to check if there any listening socket with 2083 * the same sync_handle and if it does then attempt to create a sync. 2084 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored 2085 * in iso_pi(sk)->base so it can be passed up to user, in the case of a 2086 * broadcast sink. 2087 */ 2088 ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED); 2089 if (ev1) { 2090 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN, 2091 iso_match_sid, ev1); 2092 if (sk && !ev1->status) { 2093 iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle); 2094 iso_pi(sk)->bc_sid = ev1->sid; 2095 } 2096 2097 goto done; 2098 } 2099 2100 ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT); 2101 if (ev2) { 2102 /* Check if BIGInfo report has already been handled */ 2103 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECTED, 2104 iso_match_sync_handle, ev2); 2105 if (sk) { 2106 sock_put(sk); 2107 sk = NULL; 2108 goto done; 2109 } 2110 2111 /* Try to get PA sync socket, if it exists */ 2112 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECT2, 2113 iso_match_sync_handle, ev2); 2114 if (!sk) 2115 sk = iso_get_sock(&hdev->bdaddr, bdaddr, 2116 BT_LISTEN, 2117 iso_match_sync_handle, 2118 ev2); 2119 2120 if (sk) { 2121 int err; 2122 struct hci_conn *hcon = iso_pi(sk)->conn->hcon; 2123 2124 iso_pi(sk)->qos.bcast.encryption = ev2->encryption; 2125 2126 if (ev2->num_bis < iso_pi(sk)->bc_num_bis) 2127 iso_pi(sk)->bc_num_bis = ev2->num_bis; 2128 2129 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) && 2130 !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) { 2131 err = hci_conn_big_create_sync(hdev, hcon, 2132 &iso_pi(sk)->qos, 2133 iso_pi(sk)->sync_handle, 2134 iso_pi(sk)->bc_num_bis, 2135 iso_pi(sk)->bc_bis); 2136 if (err) { 2137 bt_dev_err(hdev, "hci_le_big_create_sync: %d", 2138 err); 2139 sock_put(sk); 2140 sk = NULL; 2141 } 2142 } 2143 } 2144 2145 goto done; 2146 } 2147 2148 ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT); 2149 if (ev3) { 2150 size_t base_len = 0; 2151 u8 *base; 2152 struct hci_conn *hcon; 2153 2154 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN, 2155 iso_match_sync_handle_pa_report, ev3); 2156 if (!sk) 2157 goto done; 2158 2159 hcon = iso_pi(sk)->conn->hcon; 2160 if (!hcon) 2161 goto done; 2162 2163 if (ev3->data_status == LE_PA_DATA_TRUNCATED) { 2164 /* The controller was unable to retrieve PA data. */ 2165 memset(hcon->le_per_adv_data, 0, 2166 HCI_MAX_PER_AD_TOT_LEN); 2167 hcon->le_per_adv_data_len = 0; 2168 hcon->le_per_adv_data_offset = 0; 2169 goto done; 2170 } 2171 2172 if (hcon->le_per_adv_data_offset + ev3->length > 2173 HCI_MAX_PER_AD_TOT_LEN) 2174 goto done; 2175 2176 memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset, 2177 ev3->data, ev3->length); 2178 hcon->le_per_adv_data_offset += ev3->length; 2179 2180 if (ev3->data_status == LE_PA_DATA_COMPLETE) { 2181 /* All PA data has been received. */ 2182 hcon->le_per_adv_data_len = 2183 hcon->le_per_adv_data_offset; 2184 hcon->le_per_adv_data_offset = 0; 2185 2186 /* Extract BASE */ 2187 base = eir_get_service_data(hcon->le_per_adv_data, 2188 hcon->le_per_adv_data_len, 2189 EIR_BAA_SERVICE_UUID, 2190 &base_len); 2191 2192 if (!base || base_len > BASE_MAX_LENGTH) 2193 goto done; 2194 2195 memcpy(iso_pi(sk)->base, base, base_len); 2196 iso_pi(sk)->base_len = base_len; 2197 } else { 2198 /* This is a PA data fragment. Keep pa_data_len set to 0 2199 * until all data has been reassembled. 2200 */ 2201 hcon->le_per_adv_data_len = 0; 2202 } 2203 } else { 2204 sk = iso_get_sock(&hdev->bdaddr, BDADDR_ANY, 2205 BT_LISTEN, NULL, NULL); 2206 } 2207 2208 done: 2209 if (!sk) 2210 return 0; 2211 2212 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) 2213 *flags |= HCI_PROTO_DEFER; 2214 2215 sock_put(sk); 2216 2217 return HCI_LM_ACCEPT; 2218 } 2219 2220 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status) 2221 { 2222 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK) { 2223 if (hcon->type != LE_LINK) 2224 return; 2225 2226 /* Check if LE link has failed */ 2227 if (status) { 2228 struct hci_link *link, *t; 2229 2230 list_for_each_entry_safe(link, t, &hcon->link_list, 2231 list) 2232 iso_conn_del(link->conn, bt_to_errno(status)); 2233 2234 return; 2235 } 2236 2237 /* Create CIS if pending */ 2238 hci_le_create_cis_pending(hcon->hdev); 2239 return; 2240 } 2241 2242 BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status); 2243 2244 /* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or 2245 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection 2246 * into the accept queue of the listening socket and wake up 2247 * userspace, to inform the user about the event. 2248 */ 2249 if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) || 2250 test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 2251 struct iso_conn *conn; 2252 2253 conn = iso_conn_add(hcon); 2254 if (conn) 2255 iso_conn_ready(conn); 2256 } else { 2257 iso_conn_del(hcon, bt_to_errno(status)); 2258 } 2259 } 2260 2261 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason) 2262 { 2263 if (hcon->type != CIS_LINK && hcon->type != BIS_LINK) 2264 return; 2265 2266 BT_DBG("hcon %p reason %d", hcon, reason); 2267 2268 iso_conn_del(hcon, bt_to_errno(reason)); 2269 } 2270 2271 void iso_recv(struct hci_conn *hcon, struct sk_buff *skb, u16 flags) 2272 { 2273 struct iso_conn *conn = hcon->iso_data; 2274 __u16 pb, ts, len; 2275 2276 if (!conn) 2277 goto drop; 2278 2279 pb = hci_iso_flags_pb(flags); 2280 ts = hci_iso_flags_ts(flags); 2281 2282 BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts); 2283 2284 switch (pb) { 2285 case ISO_START: 2286 case ISO_SINGLE: 2287 if (conn->rx_len) { 2288 BT_ERR("Unexpected start frame (len %d)", skb->len); 2289 kfree_skb(conn->rx_skb); 2290 conn->rx_skb = NULL; 2291 conn->rx_len = 0; 2292 } 2293 2294 if (ts) { 2295 struct hci_iso_ts_data_hdr *hdr; 2296 2297 /* TODO: add timestamp to the packet? */ 2298 hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE); 2299 if (!hdr) { 2300 BT_ERR("Frame is too short (len %d)", skb->len); 2301 goto drop; 2302 } 2303 2304 len = __le16_to_cpu(hdr->slen); 2305 } else { 2306 struct hci_iso_data_hdr *hdr; 2307 2308 hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE); 2309 if (!hdr) { 2310 BT_ERR("Frame is too short (len %d)", skb->len); 2311 goto drop; 2312 } 2313 2314 len = __le16_to_cpu(hdr->slen); 2315 } 2316 2317 flags = hci_iso_data_flags(len); 2318 len = hci_iso_data_len(len); 2319 2320 BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x", len, 2321 skb->len, flags); 2322 2323 if (len == skb->len) { 2324 /* Complete frame received */ 2325 hci_skb_pkt_status(skb) = flags & 0x03; 2326 iso_recv_frame(conn, skb); 2327 return; 2328 } 2329 2330 if (pb == ISO_SINGLE) { 2331 BT_ERR("Frame malformed (len %d, expected len %d)", 2332 skb->len, len); 2333 goto drop; 2334 } 2335 2336 if (skb->len > len) { 2337 BT_ERR("Frame is too long (len %d, expected len %d)", 2338 skb->len, len); 2339 goto drop; 2340 } 2341 2342 /* Allocate skb for the complete frame (with header) */ 2343 conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL); 2344 if (!conn->rx_skb) 2345 goto drop; 2346 2347 hci_skb_pkt_status(conn->rx_skb) = flags & 0x03; 2348 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2349 skb->len); 2350 conn->rx_len = len - skb->len; 2351 break; 2352 2353 case ISO_CONT: 2354 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, 2355 conn->rx_len); 2356 2357 if (!conn->rx_len) { 2358 BT_ERR("Unexpected continuation frame (len %d)", 2359 skb->len); 2360 goto drop; 2361 } 2362 2363 if (skb->len > conn->rx_len) { 2364 BT_ERR("Fragment is too long (len %d, expected %d)", 2365 skb->len, conn->rx_len); 2366 kfree_skb(conn->rx_skb); 2367 conn->rx_skb = NULL; 2368 conn->rx_len = 0; 2369 goto drop; 2370 } 2371 2372 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2373 skb->len); 2374 conn->rx_len -= skb->len; 2375 return; 2376 2377 case ISO_END: 2378 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2379 skb->len); 2380 conn->rx_len -= skb->len; 2381 2382 if (!conn->rx_len) { 2383 struct sk_buff *rx_skb = conn->rx_skb; 2384 2385 /* Complete frame received. iso_recv_frame 2386 * takes ownership of the skb so set the global 2387 * rx_skb pointer to NULL first. 2388 */ 2389 conn->rx_skb = NULL; 2390 iso_recv_frame(conn, rx_skb); 2391 } 2392 break; 2393 } 2394 2395 drop: 2396 kfree_skb(skb); 2397 } 2398 2399 static struct hci_cb iso_cb = { 2400 .name = "ISO", 2401 .connect_cfm = iso_connect_cfm, 2402 .disconn_cfm = iso_disconn_cfm, 2403 }; 2404 2405 static int iso_debugfs_show(struct seq_file *f, void *p) 2406 { 2407 struct sock *sk; 2408 2409 read_lock(&iso_sk_list.lock); 2410 2411 sk_for_each(sk, &iso_sk_list.head) { 2412 seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src, 2413 &iso_pi(sk)->dst, sk->sk_state); 2414 } 2415 2416 read_unlock(&iso_sk_list.lock); 2417 2418 return 0; 2419 } 2420 2421 DEFINE_SHOW_ATTRIBUTE(iso_debugfs); 2422 2423 static struct dentry *iso_debugfs; 2424 2425 static const struct proto_ops iso_sock_ops = { 2426 .family = PF_BLUETOOTH, 2427 .owner = THIS_MODULE, 2428 .release = iso_sock_release, 2429 .bind = iso_sock_bind, 2430 .connect = iso_sock_connect, 2431 .listen = iso_sock_listen, 2432 .accept = iso_sock_accept, 2433 .getname = iso_sock_getname, 2434 .sendmsg = iso_sock_sendmsg, 2435 .recvmsg = iso_sock_recvmsg, 2436 .poll = bt_sock_poll, 2437 .ioctl = bt_sock_ioctl, 2438 .mmap = sock_no_mmap, 2439 .socketpair = sock_no_socketpair, 2440 .shutdown = iso_sock_shutdown, 2441 .setsockopt = iso_sock_setsockopt, 2442 .getsockopt = iso_sock_getsockopt 2443 }; 2444 2445 static const struct net_proto_family iso_sock_family_ops = { 2446 .family = PF_BLUETOOTH, 2447 .owner = THIS_MODULE, 2448 .create = iso_sock_create, 2449 }; 2450 2451 static bool iso_inited; 2452 2453 bool iso_enabled(void) 2454 { 2455 return iso_inited; 2456 } 2457 2458 int iso_init(void) 2459 { 2460 int err; 2461 2462 BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr)); 2463 2464 if (iso_inited) 2465 return -EALREADY; 2466 2467 err = proto_register(&iso_proto, 0); 2468 if (err < 0) 2469 return err; 2470 2471 err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops); 2472 if (err < 0) { 2473 BT_ERR("ISO socket registration failed"); 2474 goto error; 2475 } 2476 2477 err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL); 2478 if (err < 0) { 2479 BT_ERR("Failed to create ISO proc file"); 2480 bt_sock_unregister(BTPROTO_ISO); 2481 goto error; 2482 } 2483 2484 BT_INFO("ISO socket layer initialized"); 2485 2486 hci_register_cb(&iso_cb); 2487 2488 if (!IS_ERR_OR_NULL(bt_debugfs)) 2489 iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs, 2490 NULL, &iso_debugfs_fops); 2491 2492 iso_inited = true; 2493 2494 return 0; 2495 2496 error: 2497 proto_unregister(&iso_proto); 2498 return err; 2499 } 2500 2501 int iso_exit(void) 2502 { 2503 if (!iso_inited) 2504 return -EALREADY; 2505 2506 bt_procfs_cleanup(&init_net, "iso"); 2507 2508 debugfs_remove(iso_debugfs); 2509 iso_debugfs = NULL; 2510 2511 hci_unregister_cb(&iso_cb); 2512 2513 bt_sock_unregister(BTPROTO_ISO); 2514 2515 proto_unregister(&iso_proto); 2516 2517 iso_inited = false; 2518 2519 return 0; 2520 } 2521