1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * BlueZ - Bluetooth protocol stack for Linux 4 * 5 * Copyright (C) 2022 Intel Corporation 6 * Copyright 2023-2024 NXP 7 */ 8 9 #include <linux/module.h> 10 #include <linux/debugfs.h> 11 #include <linux/seq_file.h> 12 #include <linux/sched/signal.h> 13 14 #include <net/bluetooth/bluetooth.h> 15 #include <net/bluetooth/hci_core.h> 16 #include <net/bluetooth/iso.h> 17 #include "eir.h" 18 19 static const struct proto_ops iso_sock_ops; 20 21 static struct bt_sock_list iso_sk_list = { 22 .lock = __RW_LOCK_UNLOCKED(iso_sk_list.lock) 23 }; 24 25 /* ---- ISO connections ---- */ 26 struct iso_conn { 27 struct hci_conn *hcon; 28 29 /* @lock: spinlock protecting changes to iso_conn fields */ 30 spinlock_t lock; 31 struct sock *sk; 32 33 struct delayed_work timeout_work; 34 35 struct sk_buff *rx_skb; 36 __u32 rx_len; 37 __u16 tx_sn; 38 struct kref ref; 39 }; 40 41 #define iso_conn_lock(c) spin_lock(&(c)->lock) 42 #define iso_conn_unlock(c) spin_unlock(&(c)->lock) 43 44 static void iso_sock_close(struct sock *sk); 45 static void iso_sock_kill(struct sock *sk); 46 47 /* ----- ISO socket info ----- */ 48 #define iso_pi(sk) ((struct iso_pinfo *)sk) 49 50 #define EIR_SERVICE_DATA_LENGTH 4 51 #define BASE_MAX_LENGTH (HCI_MAX_PER_AD_LENGTH - EIR_SERVICE_DATA_LENGTH) 52 #define EIR_BAA_SERVICE_UUID 0x1851 53 54 /* iso_pinfo flags values */ 55 enum { 56 BT_SK_BIG_SYNC, 57 BT_SK_PA_SYNC, 58 }; 59 60 struct iso_pinfo { 61 struct bt_sock bt; 62 bdaddr_t src; 63 __u8 src_type; 64 bdaddr_t dst; 65 __u8 dst_type; 66 __u8 bc_sid; 67 __u8 bc_num_bis; 68 __u8 bc_bis[ISO_MAX_NUM_BIS]; 69 __u16 sync_handle; 70 unsigned long flags; 71 struct bt_iso_qos qos; 72 bool qos_user_set; 73 __u8 base_len; 74 __u8 base[BASE_MAX_LENGTH]; 75 struct iso_conn *conn; 76 }; 77 78 static struct bt_iso_qos default_qos; 79 80 static bool check_ucast_qos(struct bt_iso_qos *qos); 81 static bool check_bcast_qos(struct bt_iso_qos *qos); 82 static bool iso_match_sid(struct sock *sk, void *data); 83 static bool iso_match_sync_handle(struct sock *sk, void *data); 84 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data); 85 static void iso_sock_disconn(struct sock *sk); 86 87 typedef bool (*iso_sock_match_t)(struct sock *sk, void *data); 88 89 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst, 90 enum bt_sock_state state, 91 iso_sock_match_t match, void *data); 92 93 /* ---- ISO timers ---- */ 94 #define ISO_CONN_TIMEOUT (HZ * 40) 95 #define ISO_DISCONN_TIMEOUT (HZ * 2) 96 97 static void iso_conn_free(struct kref *ref) 98 { 99 struct iso_conn *conn = container_of(ref, struct iso_conn, ref); 100 101 BT_DBG("conn %p", conn); 102 103 if (conn->sk) 104 iso_pi(conn->sk)->conn = NULL; 105 106 if (conn->hcon) { 107 conn->hcon->iso_data = NULL; 108 hci_conn_drop(conn->hcon); 109 } 110 111 /* Ensure no more work items will run since hci_conn has been dropped */ 112 disable_delayed_work_sync(&conn->timeout_work); 113 114 kfree(conn); 115 } 116 117 static void iso_conn_put(struct iso_conn *conn) 118 { 119 if (!conn) 120 return; 121 122 BT_DBG("conn %p refcnt %d", conn, kref_read(&conn->ref)); 123 124 kref_put(&conn->ref, iso_conn_free); 125 } 126 127 static struct iso_conn *iso_conn_hold_unless_zero(struct iso_conn *conn) 128 { 129 if (!conn) 130 return NULL; 131 132 BT_DBG("conn %p refcnt %u", conn, kref_read(&conn->ref)); 133 134 if (!kref_get_unless_zero(&conn->ref)) 135 return NULL; 136 137 return conn; 138 } 139 140 static struct sock *iso_sock_hold(struct iso_conn *conn) 141 { 142 if (!conn || !bt_sock_linked(&iso_sk_list, conn->sk)) 143 return NULL; 144 145 sock_hold(conn->sk); 146 147 return conn->sk; 148 } 149 150 static void iso_sock_timeout(struct work_struct *work) 151 { 152 struct iso_conn *conn = container_of(work, struct iso_conn, 153 timeout_work.work); 154 struct sock *sk; 155 156 conn = iso_conn_hold_unless_zero(conn); 157 if (!conn) 158 return; 159 160 iso_conn_lock(conn); 161 sk = iso_sock_hold(conn); 162 iso_conn_unlock(conn); 163 iso_conn_put(conn); 164 165 if (!sk) 166 return; 167 168 BT_DBG("sock %p state %d", sk, sk->sk_state); 169 170 lock_sock(sk); 171 sk->sk_err = ETIMEDOUT; 172 sk->sk_state_change(sk); 173 release_sock(sk); 174 sock_put(sk); 175 } 176 177 static void iso_sock_set_timer(struct sock *sk, long timeout) 178 { 179 if (!iso_pi(sk)->conn) 180 return; 181 182 BT_DBG("sock %p state %d timeout %ld", sk, sk->sk_state, timeout); 183 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 184 schedule_delayed_work(&iso_pi(sk)->conn->timeout_work, timeout); 185 } 186 187 static void iso_sock_clear_timer(struct sock *sk) 188 { 189 if (!iso_pi(sk)->conn) 190 return; 191 192 BT_DBG("sock %p state %d", sk, sk->sk_state); 193 cancel_delayed_work(&iso_pi(sk)->conn->timeout_work); 194 } 195 196 /* ---- ISO connections ---- */ 197 static struct iso_conn *iso_conn_add(struct hci_conn *hcon) 198 { 199 struct iso_conn *conn = hcon->iso_data; 200 201 conn = iso_conn_hold_unless_zero(conn); 202 if (conn) { 203 if (!conn->hcon) { 204 iso_conn_lock(conn); 205 conn->hcon = hcon; 206 iso_conn_unlock(conn); 207 } 208 iso_conn_put(conn); 209 return conn; 210 } 211 212 conn = kzalloc(sizeof(*conn), GFP_KERNEL); 213 if (!conn) 214 return NULL; 215 216 kref_init(&conn->ref); 217 spin_lock_init(&conn->lock); 218 INIT_DELAYED_WORK(&conn->timeout_work, iso_sock_timeout); 219 220 hcon->iso_data = conn; 221 conn->hcon = hcon; 222 conn->tx_sn = 0; 223 224 BT_DBG("hcon %p conn %p", hcon, conn); 225 226 return conn; 227 } 228 229 /* Delete channel. Must be called on the locked socket. */ 230 static void iso_chan_del(struct sock *sk, int err) 231 { 232 struct iso_conn *conn; 233 struct sock *parent; 234 235 conn = iso_pi(sk)->conn; 236 iso_pi(sk)->conn = NULL; 237 238 BT_DBG("sk %p, conn %p, err %d", sk, conn, err); 239 240 if (conn) { 241 iso_conn_lock(conn); 242 conn->sk = NULL; 243 iso_conn_unlock(conn); 244 iso_conn_put(conn); 245 } 246 247 sk->sk_state = BT_CLOSED; 248 sk->sk_err = err; 249 250 parent = bt_sk(sk)->parent; 251 if (parent) { 252 bt_accept_unlink(sk); 253 parent->sk_data_ready(parent); 254 } else { 255 sk->sk_state_change(sk); 256 } 257 258 sock_set_flag(sk, SOCK_ZAPPED); 259 } 260 261 static void iso_conn_del(struct hci_conn *hcon, int err) 262 { 263 struct iso_conn *conn = hcon->iso_data; 264 struct sock *sk; 265 266 conn = iso_conn_hold_unless_zero(conn); 267 if (!conn) 268 return; 269 270 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err); 271 272 /* Kill socket */ 273 iso_conn_lock(conn); 274 sk = iso_sock_hold(conn); 275 iso_conn_unlock(conn); 276 iso_conn_put(conn); 277 278 if (!sk) { 279 iso_conn_put(conn); 280 return; 281 } 282 283 lock_sock(sk); 284 iso_sock_clear_timer(sk); 285 iso_chan_del(sk, err); 286 release_sock(sk); 287 sock_put(sk); 288 } 289 290 static int __iso_chan_add(struct iso_conn *conn, struct sock *sk, 291 struct sock *parent) 292 { 293 BT_DBG("conn %p", conn); 294 295 if (iso_pi(sk)->conn == conn && conn->sk == sk) 296 return 0; 297 298 if (conn->sk) { 299 BT_ERR("conn->sk already set"); 300 return -EBUSY; 301 } 302 303 iso_pi(sk)->conn = conn; 304 conn->sk = sk; 305 306 if (parent) 307 bt_accept_enqueue(parent, sk, true); 308 309 return 0; 310 } 311 312 static int iso_chan_add(struct iso_conn *conn, struct sock *sk, 313 struct sock *parent) 314 { 315 int err; 316 317 iso_conn_lock(conn); 318 err = __iso_chan_add(conn, sk, parent); 319 iso_conn_unlock(conn); 320 321 return err; 322 } 323 324 static inline u8 le_addr_type(u8 bdaddr_type) 325 { 326 if (bdaddr_type == BDADDR_LE_PUBLIC) 327 return ADDR_LE_DEV_PUBLIC; 328 else 329 return ADDR_LE_DEV_RANDOM; 330 } 331 332 static int iso_connect_bis(struct sock *sk) 333 { 334 struct iso_conn *conn; 335 struct hci_conn *hcon; 336 struct hci_dev *hdev; 337 int err; 338 339 BT_DBG("%pMR", &iso_pi(sk)->src); 340 341 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 342 iso_pi(sk)->src_type); 343 if (!hdev) 344 return -EHOSTUNREACH; 345 346 hci_dev_lock(hdev); 347 348 if (!bis_capable(hdev)) { 349 err = -EOPNOTSUPP; 350 goto unlock; 351 } 352 353 /* Fail if user set invalid QoS */ 354 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 355 iso_pi(sk)->qos = default_qos; 356 err = -EINVAL; 357 goto unlock; 358 } 359 360 /* Fail if out PHYs are marked as disabled */ 361 if (!iso_pi(sk)->qos.bcast.out.phy) { 362 err = -EINVAL; 363 goto unlock; 364 } 365 366 /* Just bind if DEFER_SETUP has been set */ 367 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 368 hcon = hci_bind_bis(hdev, &iso_pi(sk)->dst, 369 &iso_pi(sk)->qos, iso_pi(sk)->base_len, 370 iso_pi(sk)->base); 371 if (IS_ERR(hcon)) { 372 err = PTR_ERR(hcon); 373 goto unlock; 374 } 375 } else { 376 hcon = hci_connect_bis(hdev, &iso_pi(sk)->dst, 377 le_addr_type(iso_pi(sk)->dst_type), 378 &iso_pi(sk)->qos, iso_pi(sk)->base_len, 379 iso_pi(sk)->base); 380 if (IS_ERR(hcon)) { 381 err = PTR_ERR(hcon); 382 goto unlock; 383 } 384 } 385 386 conn = iso_conn_add(hcon); 387 if (!conn) { 388 hci_conn_drop(hcon); 389 err = -ENOMEM; 390 goto unlock; 391 } 392 393 lock_sock(sk); 394 395 err = iso_chan_add(conn, sk, NULL); 396 if (err) { 397 release_sock(sk); 398 goto unlock; 399 } 400 401 /* Update source addr of the socket */ 402 bacpy(&iso_pi(sk)->src, &hcon->src); 403 404 if (hcon->state == BT_CONNECTED) { 405 iso_sock_clear_timer(sk); 406 sk->sk_state = BT_CONNECTED; 407 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 408 iso_sock_clear_timer(sk); 409 sk->sk_state = BT_CONNECT; 410 } else { 411 sk->sk_state = BT_CONNECT; 412 iso_sock_set_timer(sk, sk->sk_sndtimeo); 413 } 414 415 release_sock(sk); 416 417 unlock: 418 hci_dev_unlock(hdev); 419 hci_dev_put(hdev); 420 return err; 421 } 422 423 static int iso_connect_cis(struct sock *sk) 424 { 425 struct iso_conn *conn; 426 struct hci_conn *hcon; 427 struct hci_dev *hdev; 428 int err; 429 430 BT_DBG("%pMR -> %pMR", &iso_pi(sk)->src, &iso_pi(sk)->dst); 431 432 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 433 iso_pi(sk)->src_type); 434 if (!hdev) 435 return -EHOSTUNREACH; 436 437 hci_dev_lock(hdev); 438 439 if (!cis_central_capable(hdev)) { 440 err = -EOPNOTSUPP; 441 goto unlock; 442 } 443 444 /* Fail if user set invalid QoS */ 445 if (iso_pi(sk)->qos_user_set && !check_ucast_qos(&iso_pi(sk)->qos)) { 446 iso_pi(sk)->qos = default_qos; 447 err = -EINVAL; 448 goto unlock; 449 } 450 451 /* Fail if either PHYs are marked as disabled */ 452 if (!iso_pi(sk)->qos.ucast.in.phy && !iso_pi(sk)->qos.ucast.out.phy) { 453 err = -EINVAL; 454 goto unlock; 455 } 456 457 /* Just bind if DEFER_SETUP has been set */ 458 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 459 hcon = hci_bind_cis(hdev, &iso_pi(sk)->dst, 460 le_addr_type(iso_pi(sk)->dst_type), 461 &iso_pi(sk)->qos); 462 if (IS_ERR(hcon)) { 463 err = PTR_ERR(hcon); 464 goto unlock; 465 } 466 } else { 467 hcon = hci_connect_cis(hdev, &iso_pi(sk)->dst, 468 le_addr_type(iso_pi(sk)->dst_type), 469 &iso_pi(sk)->qos); 470 if (IS_ERR(hcon)) { 471 err = PTR_ERR(hcon); 472 goto unlock; 473 } 474 } 475 476 conn = iso_conn_add(hcon); 477 if (!conn) { 478 hci_conn_drop(hcon); 479 err = -ENOMEM; 480 goto unlock; 481 } 482 483 lock_sock(sk); 484 485 err = iso_chan_add(conn, sk, NULL); 486 if (err) { 487 release_sock(sk); 488 goto unlock; 489 } 490 491 /* Update source addr of the socket */ 492 bacpy(&iso_pi(sk)->src, &hcon->src); 493 494 if (hcon->state == BT_CONNECTED) { 495 iso_sock_clear_timer(sk); 496 sk->sk_state = BT_CONNECTED; 497 } else if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 498 iso_sock_clear_timer(sk); 499 sk->sk_state = BT_CONNECT; 500 } else { 501 sk->sk_state = BT_CONNECT; 502 iso_sock_set_timer(sk, sk->sk_sndtimeo); 503 } 504 505 release_sock(sk); 506 507 unlock: 508 hci_dev_unlock(hdev); 509 hci_dev_put(hdev); 510 return err; 511 } 512 513 static struct bt_iso_qos *iso_sock_get_qos(struct sock *sk) 514 { 515 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONNECT2) 516 return &iso_pi(sk)->conn->hcon->iso_qos; 517 518 return &iso_pi(sk)->qos; 519 } 520 521 static int iso_send_frame(struct sock *sk, struct sk_buff *skb) 522 { 523 struct iso_conn *conn = iso_pi(sk)->conn; 524 struct bt_iso_qos *qos = iso_sock_get_qos(sk); 525 struct hci_iso_data_hdr *hdr; 526 int len = 0; 527 528 BT_DBG("sk %p len %d", sk, skb->len); 529 530 if (skb->len > qos->ucast.out.sdu) 531 return -EMSGSIZE; 532 533 len = skb->len; 534 535 /* Push ISO data header */ 536 hdr = skb_push(skb, HCI_ISO_DATA_HDR_SIZE); 537 hdr->sn = cpu_to_le16(conn->tx_sn++); 538 hdr->slen = cpu_to_le16(hci_iso_data_len_pack(len, 539 HCI_ISO_STATUS_VALID)); 540 541 if (sk->sk_state == BT_CONNECTED) 542 hci_send_iso(conn->hcon, skb); 543 else 544 len = -ENOTCONN; 545 546 return len; 547 } 548 549 static void iso_recv_frame(struct iso_conn *conn, struct sk_buff *skb) 550 { 551 struct sock *sk; 552 553 iso_conn_lock(conn); 554 sk = conn->sk; 555 iso_conn_unlock(conn); 556 557 if (!sk) 558 goto drop; 559 560 BT_DBG("sk %p len %d", sk, skb->len); 561 562 if (sk->sk_state != BT_CONNECTED) 563 goto drop; 564 565 if (!sock_queue_rcv_skb(sk, skb)) 566 return; 567 568 drop: 569 kfree_skb(skb); 570 } 571 572 /* -------- Socket interface ---------- */ 573 static struct sock *__iso_get_sock_listen_by_addr(bdaddr_t *src, bdaddr_t *dst) 574 { 575 struct sock *sk; 576 577 sk_for_each(sk, &iso_sk_list.head) { 578 if (sk->sk_state != BT_LISTEN) 579 continue; 580 581 if (bacmp(&iso_pi(sk)->dst, dst)) 582 continue; 583 584 if (!bacmp(&iso_pi(sk)->src, src)) 585 return sk; 586 } 587 588 return NULL; 589 } 590 591 static struct sock *__iso_get_sock_listen_by_sid(bdaddr_t *ba, bdaddr_t *bc, 592 __u8 sid) 593 { 594 struct sock *sk; 595 596 sk_for_each(sk, &iso_sk_list.head) { 597 if (sk->sk_state != BT_LISTEN) 598 continue; 599 600 if (bacmp(&iso_pi(sk)->src, ba)) 601 continue; 602 603 if (bacmp(&iso_pi(sk)->dst, bc)) 604 continue; 605 606 if (iso_pi(sk)->bc_sid == sid) 607 return sk; 608 } 609 610 return NULL; 611 } 612 613 /* Find socket in given state: 614 * source bdaddr (Unicast) 615 * destination bdaddr (Broadcast only) 616 * match func - pass NULL to ignore 617 * match func data - pass -1 to ignore 618 * Returns closest match. 619 */ 620 static struct sock *iso_get_sock(bdaddr_t *src, bdaddr_t *dst, 621 enum bt_sock_state state, 622 iso_sock_match_t match, void *data) 623 { 624 struct sock *sk = NULL, *sk1 = NULL; 625 626 read_lock(&iso_sk_list.lock); 627 628 sk_for_each(sk, &iso_sk_list.head) { 629 if (sk->sk_state != state) 630 continue; 631 632 /* Match Broadcast destination */ 633 if (bacmp(dst, BDADDR_ANY) && bacmp(&iso_pi(sk)->dst, dst)) 634 continue; 635 636 /* Use Match function if provided */ 637 if (match && !match(sk, data)) 638 continue; 639 640 /* Exact match. */ 641 if (!bacmp(&iso_pi(sk)->src, src)) { 642 sock_hold(sk); 643 break; 644 } 645 646 /* Closest match */ 647 if (!bacmp(&iso_pi(sk)->src, BDADDR_ANY)) { 648 if (sk1) 649 sock_put(sk1); 650 651 sk1 = sk; 652 sock_hold(sk1); 653 } 654 } 655 656 if (sk && sk1) 657 sock_put(sk1); 658 659 read_unlock(&iso_sk_list.lock); 660 661 return sk ? sk : sk1; 662 } 663 664 static struct sock *iso_get_sock_big(struct sock *match_sk, bdaddr_t *src, 665 bdaddr_t *dst, uint8_t big) 666 { 667 struct sock *sk = NULL; 668 669 read_lock(&iso_sk_list.lock); 670 671 sk_for_each(sk, &iso_sk_list.head) { 672 if (match_sk == sk) 673 continue; 674 675 /* Look for sockets that have already been 676 * connected to the BIG 677 */ 678 if (sk->sk_state != BT_CONNECTED && 679 sk->sk_state != BT_CONNECT) 680 continue; 681 682 /* Match Broadcast destination */ 683 if (bacmp(&iso_pi(sk)->dst, dst)) 684 continue; 685 686 /* Match BIG handle */ 687 if (iso_pi(sk)->qos.bcast.big != big) 688 continue; 689 690 /* Match source address */ 691 if (bacmp(&iso_pi(sk)->src, src)) 692 continue; 693 694 sock_hold(sk); 695 break; 696 } 697 698 read_unlock(&iso_sk_list.lock); 699 700 return sk; 701 } 702 703 static void iso_sock_destruct(struct sock *sk) 704 { 705 BT_DBG("sk %p", sk); 706 707 iso_conn_put(iso_pi(sk)->conn); 708 709 skb_queue_purge(&sk->sk_receive_queue); 710 skb_queue_purge(&sk->sk_write_queue); 711 } 712 713 static void iso_sock_cleanup_listen(struct sock *parent) 714 { 715 struct sock *sk; 716 717 BT_DBG("parent %p", parent); 718 719 /* Close not yet accepted channels */ 720 while ((sk = bt_accept_dequeue(parent, NULL))) { 721 iso_sock_close(sk); 722 iso_sock_kill(sk); 723 } 724 725 /* If listening socket has a hcon, properly disconnect it */ 726 if (iso_pi(parent)->conn && iso_pi(parent)->conn->hcon) { 727 iso_sock_disconn(parent); 728 return; 729 } 730 731 parent->sk_state = BT_CLOSED; 732 sock_set_flag(parent, SOCK_ZAPPED); 733 } 734 735 /* Kill socket (only if zapped and orphan) 736 * Must be called on unlocked socket. 737 */ 738 static void iso_sock_kill(struct sock *sk) 739 { 740 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket || 741 sock_flag(sk, SOCK_DEAD)) 742 return; 743 744 BT_DBG("sk %p state %d", sk, sk->sk_state); 745 746 /* Kill poor orphan */ 747 bt_sock_unlink(&iso_sk_list, sk); 748 sock_set_flag(sk, SOCK_DEAD); 749 sock_put(sk); 750 } 751 752 static void iso_sock_disconn(struct sock *sk) 753 { 754 struct sock *bis_sk; 755 struct hci_conn *hcon = iso_pi(sk)->conn->hcon; 756 757 if (test_bit(HCI_CONN_BIG_CREATED, &hcon->flags)) { 758 bis_sk = iso_get_sock_big(sk, &iso_pi(sk)->src, 759 &iso_pi(sk)->dst, 760 iso_pi(sk)->qos.bcast.big); 761 762 /* If there are any other connected sockets for the 763 * same BIG, just delete the sk and leave the bis 764 * hcon active, in case later rebinding is needed. 765 */ 766 if (bis_sk) { 767 hcon->state = BT_OPEN; 768 hcon->iso_data = NULL; 769 iso_pi(sk)->conn->hcon = NULL; 770 iso_sock_clear_timer(sk); 771 iso_chan_del(sk, bt_to_errno(hcon->abort_reason)); 772 sock_put(bis_sk); 773 return; 774 } 775 } 776 777 sk->sk_state = BT_DISCONN; 778 iso_conn_lock(iso_pi(sk)->conn); 779 hci_conn_drop(iso_pi(sk)->conn->hcon); 780 iso_pi(sk)->conn->hcon = NULL; 781 iso_conn_unlock(iso_pi(sk)->conn); 782 } 783 784 static void __iso_sock_close(struct sock *sk) 785 { 786 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket); 787 788 switch (sk->sk_state) { 789 case BT_LISTEN: 790 iso_sock_cleanup_listen(sk); 791 break; 792 793 case BT_CONNECT: 794 case BT_CONNECTED: 795 case BT_CONFIG: 796 if (iso_pi(sk)->conn->hcon) 797 iso_sock_disconn(sk); 798 else 799 iso_chan_del(sk, ECONNRESET); 800 break; 801 802 case BT_CONNECT2: 803 if (iso_pi(sk)->conn->hcon && 804 (test_bit(HCI_CONN_PA_SYNC, &iso_pi(sk)->conn->hcon->flags) || 805 test_bit(HCI_CONN_PA_SYNC_FAILED, &iso_pi(sk)->conn->hcon->flags))) 806 iso_sock_disconn(sk); 807 else 808 iso_chan_del(sk, ECONNRESET); 809 break; 810 case BT_DISCONN: 811 iso_chan_del(sk, ECONNRESET); 812 break; 813 814 default: 815 sock_set_flag(sk, SOCK_ZAPPED); 816 break; 817 } 818 } 819 820 /* Must be called on unlocked socket. */ 821 static void iso_sock_close(struct sock *sk) 822 { 823 iso_sock_clear_timer(sk); 824 lock_sock(sk); 825 __iso_sock_close(sk); 826 release_sock(sk); 827 iso_sock_kill(sk); 828 } 829 830 static void iso_sock_init(struct sock *sk, struct sock *parent) 831 { 832 BT_DBG("sk %p", sk); 833 834 if (parent) { 835 sk->sk_type = parent->sk_type; 836 bt_sk(sk)->flags = bt_sk(parent)->flags; 837 security_sk_clone(parent, sk); 838 } 839 } 840 841 static struct proto iso_proto = { 842 .name = "ISO", 843 .owner = THIS_MODULE, 844 .obj_size = sizeof(struct iso_pinfo) 845 }; 846 847 #define DEFAULT_IO_QOS \ 848 { \ 849 .interval = 10000u, \ 850 .latency = 10u, \ 851 .sdu = 40u, \ 852 .phy = BT_ISO_PHY_2M, \ 853 .rtn = 2u, \ 854 } 855 856 static struct bt_iso_qos default_qos = { 857 .bcast = { 858 .big = BT_ISO_QOS_BIG_UNSET, 859 .bis = BT_ISO_QOS_BIS_UNSET, 860 .sync_factor = 0x01, 861 .packing = 0x00, 862 .framing = 0x00, 863 .in = DEFAULT_IO_QOS, 864 .out = DEFAULT_IO_QOS, 865 .encryption = 0x00, 866 .bcode = {0x00}, 867 .options = 0x00, 868 .skip = 0x0000, 869 .sync_timeout = BT_ISO_SYNC_TIMEOUT, 870 .sync_cte_type = 0x00, 871 .mse = 0x00, 872 .timeout = BT_ISO_SYNC_TIMEOUT, 873 }, 874 }; 875 876 static struct sock *iso_sock_alloc(struct net *net, struct socket *sock, 877 int proto, gfp_t prio, int kern) 878 { 879 struct sock *sk; 880 881 sk = bt_sock_alloc(net, sock, &iso_proto, proto, prio, kern); 882 if (!sk) 883 return NULL; 884 885 sk->sk_destruct = iso_sock_destruct; 886 sk->sk_sndtimeo = ISO_CONN_TIMEOUT; 887 888 /* Set address type as public as default src address is BDADDR_ANY */ 889 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 890 891 iso_pi(sk)->qos = default_qos; 892 iso_pi(sk)->sync_handle = -1; 893 894 bt_sock_link(&iso_sk_list, sk); 895 return sk; 896 } 897 898 static int iso_sock_create(struct net *net, struct socket *sock, int protocol, 899 int kern) 900 { 901 struct sock *sk; 902 903 BT_DBG("sock %p", sock); 904 905 sock->state = SS_UNCONNECTED; 906 907 if (sock->type != SOCK_SEQPACKET) 908 return -ESOCKTNOSUPPORT; 909 910 sock->ops = &iso_sock_ops; 911 912 sk = iso_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern); 913 if (!sk) 914 return -ENOMEM; 915 916 iso_sock_init(sk, NULL); 917 return 0; 918 } 919 920 static int iso_sock_bind_bc(struct socket *sock, struct sockaddr *addr, 921 int addr_len) 922 { 923 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 924 struct sock *sk = sock->sk; 925 int i; 926 927 BT_DBG("sk %p bc_sid %u bc_num_bis %u", sk, sa->iso_bc->bc_sid, 928 sa->iso_bc->bc_num_bis); 929 930 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) 931 return -EINVAL; 932 933 bacpy(&iso_pi(sk)->dst, &sa->iso_bc->bc_bdaddr); 934 935 /* Check if the address type is of LE type */ 936 if (!bdaddr_type_is_le(sa->iso_bc->bc_bdaddr_type)) 937 return -EINVAL; 938 939 iso_pi(sk)->dst_type = sa->iso_bc->bc_bdaddr_type; 940 941 if (sa->iso_bc->bc_sid > 0x0f) 942 return -EINVAL; 943 944 iso_pi(sk)->bc_sid = sa->iso_bc->bc_sid; 945 946 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) 947 return -EINVAL; 948 949 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 950 951 for (i = 0; i < iso_pi(sk)->bc_num_bis; i++) 952 if (sa->iso_bc->bc_bis[i] < 0x01 || 953 sa->iso_bc->bc_bis[i] > 0x1f) 954 return -EINVAL; 955 956 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 957 iso_pi(sk)->bc_num_bis); 958 959 return 0; 960 } 961 962 static int iso_sock_bind_pa_sk(struct sock *sk, struct sockaddr_iso *sa, 963 int addr_len) 964 { 965 int err = 0; 966 967 if (sk->sk_type != SOCK_SEQPACKET) { 968 err = -EINVAL; 969 goto done; 970 } 971 972 if (addr_len != sizeof(*sa) + sizeof(*sa->iso_bc)) { 973 err = -EINVAL; 974 goto done; 975 } 976 977 if (sa->iso_bc->bc_num_bis > ISO_MAX_NUM_BIS) { 978 err = -EINVAL; 979 goto done; 980 } 981 982 iso_pi(sk)->bc_num_bis = sa->iso_bc->bc_num_bis; 983 984 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) 985 if (sa->iso_bc->bc_bis[i] < 0x01 || 986 sa->iso_bc->bc_bis[i] > 0x1f) { 987 err = -EINVAL; 988 goto done; 989 } 990 991 memcpy(iso_pi(sk)->bc_bis, sa->iso_bc->bc_bis, 992 iso_pi(sk)->bc_num_bis); 993 994 done: 995 return err; 996 } 997 998 static int iso_sock_bind(struct socket *sock, struct sockaddr *addr, 999 int addr_len) 1000 { 1001 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1002 struct sock *sk = sock->sk; 1003 int err = 0; 1004 1005 BT_DBG("sk %p %pMR type %u", sk, &sa->iso_bdaddr, sa->iso_bdaddr_type); 1006 1007 if (!addr || addr_len < sizeof(struct sockaddr_iso) || 1008 addr->sa_family != AF_BLUETOOTH) 1009 return -EINVAL; 1010 1011 lock_sock(sk); 1012 1013 /* Allow the user to bind a PA sync socket to a number 1014 * of BISes to sync to. 1015 */ 1016 if ((sk->sk_state == BT_CONNECT2 || 1017 sk->sk_state == BT_CONNECTED) && 1018 test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1019 err = iso_sock_bind_pa_sk(sk, sa, addr_len); 1020 goto done; 1021 } 1022 1023 if (sk->sk_state != BT_OPEN) { 1024 err = -EBADFD; 1025 goto done; 1026 } 1027 1028 if (sk->sk_type != SOCK_SEQPACKET) { 1029 err = -EINVAL; 1030 goto done; 1031 } 1032 1033 /* Check if the address type is of LE type */ 1034 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) { 1035 err = -EINVAL; 1036 goto done; 1037 } 1038 1039 bacpy(&iso_pi(sk)->src, &sa->iso_bdaddr); 1040 iso_pi(sk)->src_type = sa->iso_bdaddr_type; 1041 1042 /* Check for Broadcast address */ 1043 if (addr_len > sizeof(*sa)) { 1044 err = iso_sock_bind_bc(sock, addr, addr_len); 1045 if (err) 1046 goto done; 1047 } 1048 1049 sk->sk_state = BT_BOUND; 1050 1051 done: 1052 release_sock(sk); 1053 return err; 1054 } 1055 1056 static int iso_sock_connect(struct socket *sock, struct sockaddr *addr, 1057 int alen, int flags) 1058 { 1059 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1060 struct sock *sk = sock->sk; 1061 int err; 1062 1063 BT_DBG("sk %p", sk); 1064 1065 if (alen < sizeof(struct sockaddr_iso) || 1066 addr->sa_family != AF_BLUETOOTH) 1067 return -EINVAL; 1068 1069 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) 1070 return -EBADFD; 1071 1072 if (sk->sk_type != SOCK_SEQPACKET) 1073 return -EINVAL; 1074 1075 /* Check if the address type is of LE type */ 1076 if (!bdaddr_type_is_le(sa->iso_bdaddr_type)) 1077 return -EINVAL; 1078 1079 lock_sock(sk); 1080 1081 bacpy(&iso_pi(sk)->dst, &sa->iso_bdaddr); 1082 iso_pi(sk)->dst_type = sa->iso_bdaddr_type; 1083 1084 release_sock(sk); 1085 1086 if (bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) 1087 err = iso_connect_cis(sk); 1088 else 1089 err = iso_connect_bis(sk); 1090 1091 if (err) 1092 return err; 1093 1094 lock_sock(sk); 1095 1096 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1097 err = bt_sock_wait_state(sk, BT_CONNECTED, 1098 sock_sndtimeo(sk, flags & O_NONBLOCK)); 1099 } 1100 1101 release_sock(sk); 1102 return err; 1103 } 1104 1105 static int iso_listen_bis(struct sock *sk) 1106 { 1107 struct hci_dev *hdev; 1108 int err = 0; 1109 struct iso_conn *conn; 1110 struct hci_conn *hcon; 1111 1112 BT_DBG("%pMR -> %pMR (SID 0x%2.2x)", &iso_pi(sk)->src, 1113 &iso_pi(sk)->dst, iso_pi(sk)->bc_sid); 1114 1115 write_lock(&iso_sk_list.lock); 1116 1117 if (__iso_get_sock_listen_by_sid(&iso_pi(sk)->src, &iso_pi(sk)->dst, 1118 iso_pi(sk)->bc_sid)) 1119 err = -EADDRINUSE; 1120 1121 write_unlock(&iso_sk_list.lock); 1122 1123 if (err) 1124 return err; 1125 1126 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1127 iso_pi(sk)->src_type); 1128 if (!hdev) 1129 return -EHOSTUNREACH; 1130 1131 hci_dev_lock(hdev); 1132 lock_sock(sk); 1133 1134 /* Fail if user set invalid QoS */ 1135 if (iso_pi(sk)->qos_user_set && !check_bcast_qos(&iso_pi(sk)->qos)) { 1136 iso_pi(sk)->qos = default_qos; 1137 err = -EINVAL; 1138 goto unlock; 1139 } 1140 1141 hcon = hci_pa_create_sync(hdev, &iso_pi(sk)->dst, 1142 le_addr_type(iso_pi(sk)->dst_type), 1143 iso_pi(sk)->bc_sid, &iso_pi(sk)->qos); 1144 if (IS_ERR(hcon)) { 1145 err = PTR_ERR(hcon); 1146 goto unlock; 1147 } 1148 1149 conn = iso_conn_add(hcon); 1150 if (!conn) { 1151 hci_conn_drop(hcon); 1152 err = -ENOMEM; 1153 goto unlock; 1154 } 1155 1156 err = iso_chan_add(conn, sk, NULL); 1157 if (err) { 1158 hci_conn_drop(hcon); 1159 goto unlock; 1160 } 1161 1162 unlock: 1163 release_sock(sk); 1164 hci_dev_unlock(hdev); 1165 hci_dev_put(hdev); 1166 return err; 1167 } 1168 1169 static int iso_listen_cis(struct sock *sk) 1170 { 1171 int err = 0; 1172 1173 BT_DBG("%pMR", &iso_pi(sk)->src); 1174 1175 write_lock(&iso_sk_list.lock); 1176 1177 if (__iso_get_sock_listen_by_addr(&iso_pi(sk)->src, &iso_pi(sk)->dst)) 1178 err = -EADDRINUSE; 1179 1180 write_unlock(&iso_sk_list.lock); 1181 1182 return err; 1183 } 1184 1185 static int iso_sock_listen(struct socket *sock, int backlog) 1186 { 1187 struct sock *sk = sock->sk; 1188 int err = 0; 1189 1190 BT_DBG("sk %p backlog %d", sk, backlog); 1191 1192 sock_hold(sk); 1193 lock_sock(sk); 1194 1195 if (sk->sk_state != BT_BOUND) { 1196 err = -EBADFD; 1197 goto done; 1198 } 1199 1200 if (sk->sk_type != SOCK_SEQPACKET) { 1201 err = -EINVAL; 1202 goto done; 1203 } 1204 1205 if (!bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1206 err = iso_listen_cis(sk); 1207 } else { 1208 /* Drop sock lock to avoid potential 1209 * deadlock with the hdev lock. 1210 */ 1211 release_sock(sk); 1212 err = iso_listen_bis(sk); 1213 lock_sock(sk); 1214 } 1215 1216 if (err) 1217 goto done; 1218 1219 sk->sk_max_ack_backlog = backlog; 1220 sk->sk_ack_backlog = 0; 1221 1222 sk->sk_state = BT_LISTEN; 1223 1224 done: 1225 release_sock(sk); 1226 sock_put(sk); 1227 return err; 1228 } 1229 1230 static int iso_sock_accept(struct socket *sock, struct socket *newsock, 1231 struct proto_accept_arg *arg) 1232 { 1233 DEFINE_WAIT_FUNC(wait, woken_wake_function); 1234 struct sock *sk = sock->sk, *ch; 1235 long timeo; 1236 int err = 0; 1237 1238 /* Use explicit nested locking to avoid lockdep warnings generated 1239 * because the parent socket and the child socket are locked on the 1240 * same thread. 1241 */ 1242 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1243 1244 timeo = sock_rcvtimeo(sk, arg->flags & O_NONBLOCK); 1245 1246 BT_DBG("sk %p timeo %ld", sk, timeo); 1247 1248 /* Wait for an incoming connection. (wake-one). */ 1249 add_wait_queue_exclusive(sk_sleep(sk), &wait); 1250 while (1) { 1251 if (sk->sk_state != BT_LISTEN) { 1252 err = -EBADFD; 1253 break; 1254 } 1255 1256 ch = bt_accept_dequeue(sk, newsock); 1257 if (ch) 1258 break; 1259 1260 if (!timeo) { 1261 err = -EAGAIN; 1262 break; 1263 } 1264 1265 if (signal_pending(current)) { 1266 err = sock_intr_errno(timeo); 1267 break; 1268 } 1269 1270 release_sock(sk); 1271 1272 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo); 1273 lock_sock_nested(sk, SINGLE_DEPTH_NESTING); 1274 } 1275 remove_wait_queue(sk_sleep(sk), &wait); 1276 1277 if (err) 1278 goto done; 1279 1280 newsock->state = SS_CONNECTED; 1281 1282 BT_DBG("new socket %p", ch); 1283 1284 /* A Broadcast Sink might require BIG sync to be terminated 1285 * and re-established multiple times, while keeping the same 1286 * PA sync handle active. To allow this, once all BIS 1287 * connections have been accepted on a PA sync parent socket, 1288 * "reset" socket state, to allow future BIG re-sync procedures. 1289 */ 1290 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1291 /* Iterate through the list of bound BIS indices 1292 * and clear each BIS as they are accepted by the 1293 * user space, one by one. 1294 */ 1295 for (int i = 0; i < iso_pi(sk)->bc_num_bis; i++) { 1296 if (iso_pi(sk)->bc_bis[i] > 0) { 1297 iso_pi(sk)->bc_bis[i] = 0; 1298 iso_pi(sk)->bc_num_bis--; 1299 break; 1300 } 1301 } 1302 1303 if (iso_pi(sk)->bc_num_bis == 0) { 1304 /* Once the last BIS was accepted, reset parent 1305 * socket parameters to mark that the listening 1306 * process for BIS connections has been completed: 1307 * 1308 * 1. Reset the DEFER setup flag on the parent sk. 1309 * 2. Clear the flag marking that the BIG create 1310 * sync command is pending. 1311 * 3. Transition socket state from BT_LISTEN to 1312 * BT_CONNECTED. 1313 */ 1314 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1315 clear_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags); 1316 sk->sk_state = BT_CONNECTED; 1317 } 1318 } 1319 1320 done: 1321 release_sock(sk); 1322 return err; 1323 } 1324 1325 static int iso_sock_getname(struct socket *sock, struct sockaddr *addr, 1326 int peer) 1327 { 1328 struct sockaddr_iso *sa = (struct sockaddr_iso *)addr; 1329 struct sock *sk = sock->sk; 1330 1331 BT_DBG("sock %p, sk %p", sock, sk); 1332 1333 addr->sa_family = AF_BLUETOOTH; 1334 1335 if (peer) { 1336 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->dst); 1337 sa->iso_bdaddr_type = iso_pi(sk)->dst_type; 1338 } else { 1339 bacpy(&sa->iso_bdaddr, &iso_pi(sk)->src); 1340 sa->iso_bdaddr_type = iso_pi(sk)->src_type; 1341 } 1342 1343 return sizeof(struct sockaddr_iso); 1344 } 1345 1346 static int iso_sock_sendmsg(struct socket *sock, struct msghdr *msg, 1347 size_t len) 1348 { 1349 struct sock *sk = sock->sk; 1350 struct sk_buff *skb, **frag; 1351 size_t mtu; 1352 int err; 1353 1354 BT_DBG("sock %p, sk %p", sock, sk); 1355 1356 err = sock_error(sk); 1357 if (err) 1358 return err; 1359 1360 if (msg->msg_flags & MSG_OOB) 1361 return -EOPNOTSUPP; 1362 1363 lock_sock(sk); 1364 1365 if (sk->sk_state != BT_CONNECTED) { 1366 release_sock(sk); 1367 return -ENOTCONN; 1368 } 1369 1370 mtu = iso_pi(sk)->conn->hcon->mtu; 1371 1372 release_sock(sk); 1373 1374 skb = bt_skb_sendmsg(sk, msg, len, mtu, HCI_ISO_DATA_HDR_SIZE, 0); 1375 if (IS_ERR(skb)) 1376 return PTR_ERR(skb); 1377 1378 len -= skb->len; 1379 1380 BT_DBG("skb %p len %d", sk, skb->len); 1381 1382 /* Continuation fragments */ 1383 frag = &skb_shinfo(skb)->frag_list; 1384 while (len) { 1385 struct sk_buff *tmp; 1386 1387 tmp = bt_skb_sendmsg(sk, msg, len, mtu, 0, 0); 1388 if (IS_ERR(tmp)) { 1389 kfree_skb(skb); 1390 return PTR_ERR(tmp); 1391 } 1392 1393 *frag = tmp; 1394 1395 len -= tmp->len; 1396 1397 skb->len += tmp->len; 1398 skb->data_len += tmp->len; 1399 1400 BT_DBG("frag %p len %d", *frag, tmp->len); 1401 1402 frag = &(*frag)->next; 1403 } 1404 1405 lock_sock(sk); 1406 1407 if (sk->sk_state == BT_CONNECTED) 1408 err = iso_send_frame(sk, skb); 1409 else 1410 err = -ENOTCONN; 1411 1412 release_sock(sk); 1413 1414 if (err < 0) 1415 kfree_skb(skb); 1416 return err; 1417 } 1418 1419 static void iso_conn_defer_accept(struct hci_conn *conn) 1420 { 1421 struct hci_cp_le_accept_cis cp; 1422 struct hci_dev *hdev = conn->hdev; 1423 1424 BT_DBG("conn %p", conn); 1425 1426 conn->state = BT_CONFIG; 1427 1428 cp.handle = cpu_to_le16(conn->handle); 1429 1430 hci_send_cmd(hdev, HCI_OP_LE_ACCEPT_CIS, sizeof(cp), &cp); 1431 } 1432 1433 static void iso_conn_big_sync(struct sock *sk) 1434 { 1435 int err; 1436 struct hci_dev *hdev; 1437 1438 hdev = hci_get_route(&iso_pi(sk)->dst, &iso_pi(sk)->src, 1439 iso_pi(sk)->src_type); 1440 1441 if (!hdev) 1442 return; 1443 1444 /* hci_le_big_create_sync requires hdev lock to be held, since 1445 * it enqueues the HCI LE BIG Create Sync command via 1446 * hci_cmd_sync_queue_once, which checks hdev flags that might 1447 * change. 1448 */ 1449 hci_dev_lock(hdev); 1450 lock_sock(sk); 1451 1452 if (!test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) { 1453 err = hci_le_big_create_sync(hdev, iso_pi(sk)->conn->hcon, 1454 &iso_pi(sk)->qos, 1455 iso_pi(sk)->sync_handle, 1456 iso_pi(sk)->bc_num_bis, 1457 iso_pi(sk)->bc_bis); 1458 if (err) 1459 bt_dev_err(hdev, "hci_le_big_create_sync: %d", 1460 err); 1461 } 1462 1463 release_sock(sk); 1464 hci_dev_unlock(hdev); 1465 } 1466 1467 static int iso_sock_recvmsg(struct socket *sock, struct msghdr *msg, 1468 size_t len, int flags) 1469 { 1470 struct sock *sk = sock->sk; 1471 struct iso_pinfo *pi = iso_pi(sk); 1472 bool early_ret = false; 1473 int err = 0; 1474 1475 BT_DBG("sk %p", sk); 1476 1477 if (test_and_clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) { 1478 sock_hold(sk); 1479 lock_sock(sk); 1480 1481 switch (sk->sk_state) { 1482 case BT_CONNECT2: 1483 if (test_bit(BT_SK_PA_SYNC, &pi->flags)) { 1484 release_sock(sk); 1485 iso_conn_big_sync(sk); 1486 lock_sock(sk); 1487 1488 sk->sk_state = BT_LISTEN; 1489 } else { 1490 iso_conn_defer_accept(pi->conn->hcon); 1491 sk->sk_state = BT_CONFIG; 1492 } 1493 1494 early_ret = true; 1495 break; 1496 case BT_CONNECTED: 1497 if (test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags)) { 1498 release_sock(sk); 1499 iso_conn_big_sync(sk); 1500 lock_sock(sk); 1501 1502 sk->sk_state = BT_LISTEN; 1503 early_ret = true; 1504 } 1505 1506 break; 1507 case BT_CONNECT: 1508 release_sock(sk); 1509 err = iso_connect_cis(sk); 1510 lock_sock(sk); 1511 1512 early_ret = true; 1513 break; 1514 default: 1515 break; 1516 } 1517 1518 release_sock(sk); 1519 sock_put(sk); 1520 1521 if (early_ret) 1522 return err; 1523 } 1524 1525 return bt_sock_recvmsg(sock, msg, len, flags); 1526 } 1527 1528 static bool check_io_qos(struct bt_iso_io_qos *qos) 1529 { 1530 /* If no PHY is enable SDU must be 0 */ 1531 if (!qos->phy && qos->sdu) 1532 return false; 1533 1534 if (qos->interval && (qos->interval < 0xff || qos->interval > 0xfffff)) 1535 return false; 1536 1537 if (qos->latency && (qos->latency < 0x05 || qos->latency > 0xfa0)) 1538 return false; 1539 1540 if (qos->phy > BT_ISO_PHY_ANY) 1541 return false; 1542 1543 return true; 1544 } 1545 1546 static bool check_ucast_qos(struct bt_iso_qos *qos) 1547 { 1548 if (qos->ucast.cig > 0xef && qos->ucast.cig != BT_ISO_QOS_CIG_UNSET) 1549 return false; 1550 1551 if (qos->ucast.cis > 0xef && qos->ucast.cis != BT_ISO_QOS_CIS_UNSET) 1552 return false; 1553 1554 if (qos->ucast.sca > 0x07) 1555 return false; 1556 1557 if (qos->ucast.packing > 0x01) 1558 return false; 1559 1560 if (qos->ucast.framing > 0x01) 1561 return false; 1562 1563 if (!check_io_qos(&qos->ucast.in)) 1564 return false; 1565 1566 if (!check_io_qos(&qos->ucast.out)) 1567 return false; 1568 1569 return true; 1570 } 1571 1572 static bool check_bcast_qos(struct bt_iso_qos *qos) 1573 { 1574 if (!qos->bcast.sync_factor) 1575 qos->bcast.sync_factor = 0x01; 1576 1577 if (qos->bcast.packing > 0x01) 1578 return false; 1579 1580 if (qos->bcast.framing > 0x01) 1581 return false; 1582 1583 if (!check_io_qos(&qos->bcast.in)) 1584 return false; 1585 1586 if (!check_io_qos(&qos->bcast.out)) 1587 return false; 1588 1589 if (qos->bcast.encryption > 0x01) 1590 return false; 1591 1592 if (qos->bcast.options > 0x07) 1593 return false; 1594 1595 if (qos->bcast.skip > 0x01f3) 1596 return false; 1597 1598 if (!qos->bcast.sync_timeout) 1599 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1600 1601 if (qos->bcast.sync_timeout < 0x000a || qos->bcast.sync_timeout > 0x4000) 1602 return false; 1603 1604 if (qos->bcast.sync_cte_type > 0x1f) 1605 return false; 1606 1607 if (qos->bcast.mse > 0x1f) 1608 return false; 1609 1610 if (!qos->bcast.timeout) 1611 qos->bcast.sync_timeout = BT_ISO_SYNC_TIMEOUT; 1612 1613 if (qos->bcast.timeout < 0x000a || qos->bcast.timeout > 0x4000) 1614 return false; 1615 1616 return true; 1617 } 1618 1619 static int iso_sock_setsockopt(struct socket *sock, int level, int optname, 1620 sockptr_t optval, unsigned int optlen) 1621 { 1622 struct sock *sk = sock->sk; 1623 int err = 0; 1624 struct bt_iso_qos qos = default_qos; 1625 u32 opt; 1626 1627 BT_DBG("sk %p", sk); 1628 1629 lock_sock(sk); 1630 1631 switch (optname) { 1632 case BT_DEFER_SETUP: 1633 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) { 1634 err = -EINVAL; 1635 break; 1636 } 1637 1638 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1639 if (err) 1640 break; 1641 1642 if (opt) 1643 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1644 else 1645 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags); 1646 break; 1647 1648 case BT_PKT_STATUS: 1649 err = copy_safe_from_sockptr(&opt, sizeof(opt), optval, optlen); 1650 if (err) 1651 break; 1652 1653 if (opt) 1654 set_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1655 else 1656 clear_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags); 1657 break; 1658 1659 case BT_ISO_QOS: 1660 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1661 sk->sk_state != BT_CONNECT2 && 1662 (!test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags) || 1663 sk->sk_state != BT_CONNECTED)) { 1664 err = -EINVAL; 1665 break; 1666 } 1667 1668 err = copy_safe_from_sockptr(&qos, sizeof(qos), optval, optlen); 1669 if (err) 1670 break; 1671 1672 iso_pi(sk)->qos = qos; 1673 iso_pi(sk)->qos_user_set = true; 1674 1675 break; 1676 1677 case BT_ISO_BASE: 1678 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND && 1679 sk->sk_state != BT_CONNECT2) { 1680 err = -EINVAL; 1681 break; 1682 } 1683 1684 if (optlen > sizeof(iso_pi(sk)->base)) { 1685 err = -EINVAL; 1686 break; 1687 } 1688 1689 err = copy_safe_from_sockptr(iso_pi(sk)->base, optlen, optval, 1690 optlen); 1691 if (err) 1692 break; 1693 1694 iso_pi(sk)->base_len = optlen; 1695 1696 break; 1697 1698 default: 1699 err = -ENOPROTOOPT; 1700 break; 1701 } 1702 1703 release_sock(sk); 1704 return err; 1705 } 1706 1707 static int iso_sock_getsockopt(struct socket *sock, int level, int optname, 1708 char __user *optval, int __user *optlen) 1709 { 1710 struct sock *sk = sock->sk; 1711 int len, err = 0; 1712 struct bt_iso_qos *qos; 1713 u8 base_len; 1714 u8 *base; 1715 1716 BT_DBG("sk %p", sk); 1717 1718 if (get_user(len, optlen)) 1719 return -EFAULT; 1720 1721 lock_sock(sk); 1722 1723 switch (optname) { 1724 case BT_DEFER_SETUP: 1725 if (sk->sk_state == BT_CONNECTED) { 1726 err = -EINVAL; 1727 break; 1728 } 1729 1730 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags), 1731 (u32 __user *)optval)) 1732 err = -EFAULT; 1733 1734 break; 1735 1736 case BT_PKT_STATUS: 1737 if (put_user(test_bit(BT_SK_PKT_STATUS, &bt_sk(sk)->flags), 1738 (int __user *)optval)) 1739 err = -EFAULT; 1740 break; 1741 1742 case BT_ISO_QOS: 1743 qos = iso_sock_get_qos(sk); 1744 1745 len = min_t(unsigned int, len, sizeof(*qos)); 1746 if (copy_to_user(optval, qos, len)) 1747 err = -EFAULT; 1748 1749 break; 1750 1751 case BT_ISO_BASE: 1752 if (sk->sk_state == BT_CONNECTED && 1753 !bacmp(&iso_pi(sk)->dst, BDADDR_ANY)) { 1754 base_len = iso_pi(sk)->conn->hcon->le_per_adv_data_len; 1755 base = iso_pi(sk)->conn->hcon->le_per_adv_data; 1756 } else { 1757 base_len = iso_pi(sk)->base_len; 1758 base = iso_pi(sk)->base; 1759 } 1760 1761 len = min_t(unsigned int, len, base_len); 1762 if (copy_to_user(optval, base, len)) 1763 err = -EFAULT; 1764 if (put_user(len, optlen)) 1765 err = -EFAULT; 1766 1767 break; 1768 1769 default: 1770 err = -ENOPROTOOPT; 1771 break; 1772 } 1773 1774 release_sock(sk); 1775 return err; 1776 } 1777 1778 static int iso_sock_shutdown(struct socket *sock, int how) 1779 { 1780 struct sock *sk = sock->sk; 1781 int err = 0; 1782 1783 BT_DBG("sock %p, sk %p, how %d", sock, sk, how); 1784 1785 if (!sk) 1786 return 0; 1787 1788 sock_hold(sk); 1789 lock_sock(sk); 1790 1791 switch (how) { 1792 case SHUT_RD: 1793 if (sk->sk_shutdown & RCV_SHUTDOWN) 1794 goto unlock; 1795 sk->sk_shutdown |= RCV_SHUTDOWN; 1796 break; 1797 case SHUT_WR: 1798 if (sk->sk_shutdown & SEND_SHUTDOWN) 1799 goto unlock; 1800 sk->sk_shutdown |= SEND_SHUTDOWN; 1801 break; 1802 case SHUT_RDWR: 1803 if (sk->sk_shutdown & SHUTDOWN_MASK) 1804 goto unlock; 1805 sk->sk_shutdown |= SHUTDOWN_MASK; 1806 break; 1807 } 1808 1809 iso_sock_clear_timer(sk); 1810 __iso_sock_close(sk); 1811 1812 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime && 1813 !(current->flags & PF_EXITING)) 1814 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1815 1816 unlock: 1817 release_sock(sk); 1818 sock_put(sk); 1819 1820 return err; 1821 } 1822 1823 static int iso_sock_release(struct socket *sock) 1824 { 1825 struct sock *sk = sock->sk; 1826 int err = 0; 1827 1828 BT_DBG("sock %p, sk %p", sock, sk); 1829 1830 if (!sk) 1831 return 0; 1832 1833 iso_sock_close(sk); 1834 1835 if (sock_flag(sk, SOCK_LINGER) && READ_ONCE(sk->sk_lingertime) && 1836 !(current->flags & PF_EXITING)) { 1837 lock_sock(sk); 1838 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime); 1839 release_sock(sk); 1840 } 1841 1842 sock_orphan(sk); 1843 iso_sock_kill(sk); 1844 return err; 1845 } 1846 1847 static void iso_sock_ready(struct sock *sk) 1848 { 1849 BT_DBG("sk %p", sk); 1850 1851 if (!sk) 1852 return; 1853 1854 lock_sock(sk); 1855 iso_sock_clear_timer(sk); 1856 sk->sk_state = BT_CONNECTED; 1857 sk->sk_state_change(sk); 1858 release_sock(sk); 1859 } 1860 1861 static bool iso_match_big(struct sock *sk, void *data) 1862 { 1863 struct hci_evt_le_big_sync_estabilished *ev = data; 1864 1865 return ev->handle == iso_pi(sk)->qos.bcast.big; 1866 } 1867 1868 static bool iso_match_big_hcon(struct sock *sk, void *data) 1869 { 1870 struct hci_conn *hcon = data; 1871 1872 return hcon->iso_qos.bcast.big == iso_pi(sk)->qos.bcast.big; 1873 } 1874 1875 static bool iso_match_pa_sync_flag(struct sock *sk, void *data) 1876 { 1877 return test_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 1878 } 1879 1880 static void iso_conn_ready(struct iso_conn *conn) 1881 { 1882 struct sock *parent = NULL; 1883 struct sock *sk = conn->sk; 1884 struct hci_ev_le_big_sync_estabilished *ev = NULL; 1885 struct hci_ev_le_pa_sync_established *ev2 = NULL; 1886 struct hci_ev_le_per_adv_report *ev3 = NULL; 1887 struct hci_conn *hcon; 1888 1889 BT_DBG("conn %p", conn); 1890 1891 if (sk) { 1892 iso_sock_ready(conn->sk); 1893 } else { 1894 hcon = conn->hcon; 1895 if (!hcon) 1896 return; 1897 1898 if (test_bit(HCI_CONN_BIG_SYNC, &hcon->flags)) { 1899 /* A BIS slave hcon is notified to the ISO layer 1900 * after the Command Complete for the LE Setup 1901 * ISO Data Path command is received. Get the 1902 * parent socket that matches the hcon BIG handle. 1903 */ 1904 parent = iso_get_sock(&hcon->src, &hcon->dst, 1905 BT_LISTEN, iso_match_big_hcon, 1906 hcon); 1907 } else if (test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags)) { 1908 ev = hci_recv_event_data(hcon->hdev, 1909 HCI_EVT_LE_BIG_SYNC_ESTABILISHED); 1910 1911 /* Get reference to PA sync parent socket, if it exists */ 1912 parent = iso_get_sock(&hcon->src, &hcon->dst, 1913 BT_LISTEN, 1914 iso_match_pa_sync_flag, 1915 NULL); 1916 if (!parent && ev) 1917 parent = iso_get_sock(&hcon->src, 1918 &hcon->dst, 1919 BT_LISTEN, 1920 iso_match_big, ev); 1921 } else if (test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 1922 ev2 = hci_recv_event_data(hcon->hdev, 1923 HCI_EV_LE_PA_SYNC_ESTABLISHED); 1924 if (ev2) 1925 parent = iso_get_sock(&hcon->src, 1926 &hcon->dst, 1927 BT_LISTEN, 1928 iso_match_sid, ev2); 1929 } else if (test_bit(HCI_CONN_PA_SYNC, &hcon->flags)) { 1930 ev3 = hci_recv_event_data(hcon->hdev, 1931 HCI_EV_LE_PER_ADV_REPORT); 1932 if (ev3) 1933 parent = iso_get_sock(&hcon->src, 1934 &hcon->dst, 1935 BT_LISTEN, 1936 iso_match_sync_handle_pa_report, 1937 ev3); 1938 } 1939 1940 if (!parent) 1941 parent = iso_get_sock(&hcon->src, BDADDR_ANY, 1942 BT_LISTEN, NULL, NULL); 1943 1944 if (!parent) 1945 return; 1946 1947 lock_sock(parent); 1948 1949 sk = iso_sock_alloc(sock_net(parent), NULL, 1950 BTPROTO_ISO, GFP_ATOMIC, 0); 1951 if (!sk) { 1952 release_sock(parent); 1953 return; 1954 } 1955 1956 iso_sock_init(sk, parent); 1957 1958 bacpy(&iso_pi(sk)->src, &hcon->src); 1959 1960 /* Convert from HCI to three-value type */ 1961 if (hcon->src_type == ADDR_LE_DEV_PUBLIC) 1962 iso_pi(sk)->src_type = BDADDR_LE_PUBLIC; 1963 else 1964 iso_pi(sk)->src_type = BDADDR_LE_RANDOM; 1965 1966 /* If hcon has no destination address (BDADDR_ANY) it means it 1967 * was created by HCI_EV_LE_BIG_SYNC_ESTABILISHED or 1968 * HCI_EV_LE_PA_SYNC_ESTABLISHED so we need to initialize using 1969 * the parent socket destination address. 1970 */ 1971 if (!bacmp(&hcon->dst, BDADDR_ANY)) { 1972 bacpy(&hcon->dst, &iso_pi(parent)->dst); 1973 hcon->dst_type = iso_pi(parent)->dst_type; 1974 } 1975 1976 if (ev3) { 1977 iso_pi(sk)->qos = iso_pi(parent)->qos; 1978 hcon->iso_qos = iso_pi(sk)->qos; 1979 iso_pi(sk)->bc_num_bis = iso_pi(parent)->bc_num_bis; 1980 memcpy(iso_pi(sk)->bc_bis, iso_pi(parent)->bc_bis, ISO_MAX_NUM_BIS); 1981 set_bit(BT_SK_PA_SYNC, &iso_pi(sk)->flags); 1982 } 1983 1984 bacpy(&iso_pi(sk)->dst, &hcon->dst); 1985 iso_pi(sk)->dst_type = hcon->dst_type; 1986 iso_pi(sk)->sync_handle = iso_pi(parent)->sync_handle; 1987 memcpy(iso_pi(sk)->base, iso_pi(parent)->base, iso_pi(parent)->base_len); 1988 iso_pi(sk)->base_len = iso_pi(parent)->base_len; 1989 1990 hci_conn_hold(hcon); 1991 iso_chan_add(conn, sk, parent); 1992 1993 if ((ev && ((struct hci_evt_le_big_sync_estabilished *)ev)->status) || 1994 (ev2 && ev2->status)) { 1995 /* Trigger error signal on child socket */ 1996 sk->sk_err = ECONNREFUSED; 1997 sk->sk_error_report(sk); 1998 } 1999 2000 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) 2001 sk->sk_state = BT_CONNECT2; 2002 else 2003 sk->sk_state = BT_CONNECTED; 2004 2005 /* Wake up parent */ 2006 parent->sk_data_ready(parent); 2007 2008 release_sock(parent); 2009 sock_put(parent); 2010 } 2011 } 2012 2013 static bool iso_match_sid(struct sock *sk, void *data) 2014 { 2015 struct hci_ev_le_pa_sync_established *ev = data; 2016 2017 return ev->sid == iso_pi(sk)->bc_sid; 2018 } 2019 2020 static bool iso_match_sync_handle(struct sock *sk, void *data) 2021 { 2022 struct hci_evt_le_big_info_adv_report *ev = data; 2023 2024 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2025 } 2026 2027 static bool iso_match_sync_handle_pa_report(struct sock *sk, void *data) 2028 { 2029 struct hci_ev_le_per_adv_report *ev = data; 2030 2031 return le16_to_cpu(ev->sync_handle) == iso_pi(sk)->sync_handle; 2032 } 2033 2034 /* ----- ISO interface with lower layer (HCI) ----- */ 2035 2036 int iso_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, __u8 *flags) 2037 { 2038 struct hci_ev_le_pa_sync_established *ev1; 2039 struct hci_evt_le_big_info_adv_report *ev2; 2040 struct hci_ev_le_per_adv_report *ev3; 2041 struct sock *sk; 2042 2043 bt_dev_dbg(hdev, "bdaddr %pMR", bdaddr); 2044 2045 /* Broadcast receiver requires handling of some events before it can 2046 * proceed to establishing a BIG sync: 2047 * 2048 * 1. HCI_EV_LE_PA_SYNC_ESTABLISHED: The socket may specify a specific 2049 * SID to listen to and once sync is estabilished its handle needs to 2050 * be stored in iso_pi(sk)->sync_handle so it can be matched once 2051 * receiving the BIG Info. 2052 * 2. HCI_EVT_LE_BIG_INFO_ADV_REPORT: When connect_ind is triggered by a 2053 * a BIG Info it attempts to check if there any listening socket with 2054 * the same sync_handle and if it does then attempt to create a sync. 2055 * 3. HCI_EV_LE_PER_ADV_REPORT: When a PA report is received, it is stored 2056 * in iso_pi(sk)->base so it can be passed up to user, in the case of a 2057 * broadcast sink. 2058 */ 2059 ev1 = hci_recv_event_data(hdev, HCI_EV_LE_PA_SYNC_ESTABLISHED); 2060 if (ev1) { 2061 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN, 2062 iso_match_sid, ev1); 2063 if (sk && !ev1->status) 2064 iso_pi(sk)->sync_handle = le16_to_cpu(ev1->handle); 2065 2066 goto done; 2067 } 2068 2069 ev2 = hci_recv_event_data(hdev, HCI_EVT_LE_BIG_INFO_ADV_REPORT); 2070 if (ev2) { 2071 /* Check if BIGInfo report has already been handled */ 2072 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECTED, 2073 iso_match_sync_handle, ev2); 2074 if (sk) { 2075 sock_put(sk); 2076 sk = NULL; 2077 goto done; 2078 } 2079 2080 /* Try to get PA sync socket, if it exists */ 2081 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_CONNECT2, 2082 iso_match_sync_handle, ev2); 2083 if (!sk) 2084 sk = iso_get_sock(&hdev->bdaddr, bdaddr, 2085 BT_LISTEN, 2086 iso_match_sync_handle, 2087 ev2); 2088 2089 if (sk) { 2090 int err; 2091 struct hci_conn *hcon = iso_pi(sk)->conn->hcon; 2092 2093 iso_pi(sk)->qos.bcast.encryption = ev2->encryption; 2094 2095 if (ev2->num_bis < iso_pi(sk)->bc_num_bis) 2096 iso_pi(sk)->bc_num_bis = ev2->num_bis; 2097 2098 if (!test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags) && 2099 !test_and_set_bit(BT_SK_BIG_SYNC, &iso_pi(sk)->flags)) { 2100 err = hci_le_big_create_sync(hdev, 2101 hcon, 2102 &iso_pi(sk)->qos, 2103 iso_pi(sk)->sync_handle, 2104 iso_pi(sk)->bc_num_bis, 2105 iso_pi(sk)->bc_bis); 2106 if (err) { 2107 bt_dev_err(hdev, "hci_le_big_create_sync: %d", 2108 err); 2109 sock_put(sk); 2110 sk = NULL; 2111 } 2112 } 2113 } 2114 2115 goto done; 2116 } 2117 2118 ev3 = hci_recv_event_data(hdev, HCI_EV_LE_PER_ADV_REPORT); 2119 if (ev3) { 2120 size_t base_len = 0; 2121 u8 *base; 2122 struct hci_conn *hcon; 2123 2124 sk = iso_get_sock(&hdev->bdaddr, bdaddr, BT_LISTEN, 2125 iso_match_sync_handle_pa_report, ev3); 2126 if (!sk) 2127 goto done; 2128 2129 hcon = iso_pi(sk)->conn->hcon; 2130 if (!hcon) 2131 goto done; 2132 2133 if (ev3->data_status == LE_PA_DATA_TRUNCATED) { 2134 /* The controller was unable to retrieve PA data. */ 2135 memset(hcon->le_per_adv_data, 0, 2136 HCI_MAX_PER_AD_TOT_LEN); 2137 hcon->le_per_adv_data_len = 0; 2138 hcon->le_per_adv_data_offset = 0; 2139 goto done; 2140 } 2141 2142 if (hcon->le_per_adv_data_offset + ev3->length > 2143 HCI_MAX_PER_AD_TOT_LEN) 2144 goto done; 2145 2146 memcpy(hcon->le_per_adv_data + hcon->le_per_adv_data_offset, 2147 ev3->data, ev3->length); 2148 hcon->le_per_adv_data_offset += ev3->length; 2149 2150 if (ev3->data_status == LE_PA_DATA_COMPLETE) { 2151 /* All PA data has been received. */ 2152 hcon->le_per_adv_data_len = 2153 hcon->le_per_adv_data_offset; 2154 hcon->le_per_adv_data_offset = 0; 2155 2156 /* Extract BASE */ 2157 base = eir_get_service_data(hcon->le_per_adv_data, 2158 hcon->le_per_adv_data_len, 2159 EIR_BAA_SERVICE_UUID, 2160 &base_len); 2161 2162 if (!base || base_len > BASE_MAX_LENGTH) 2163 goto done; 2164 2165 memcpy(iso_pi(sk)->base, base, base_len); 2166 iso_pi(sk)->base_len = base_len; 2167 } else { 2168 /* This is a PA data fragment. Keep pa_data_len set to 0 2169 * until all data has been reassembled. 2170 */ 2171 hcon->le_per_adv_data_len = 0; 2172 } 2173 } else { 2174 sk = iso_get_sock(&hdev->bdaddr, BDADDR_ANY, 2175 BT_LISTEN, NULL, NULL); 2176 } 2177 2178 done: 2179 if (!sk) 2180 return 0; 2181 2182 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) 2183 *flags |= HCI_PROTO_DEFER; 2184 2185 sock_put(sk); 2186 2187 return HCI_LM_ACCEPT; 2188 } 2189 2190 static bool iso_match(struct hci_conn *hcon) 2191 { 2192 return hcon->type == ISO_LINK || hcon->type == LE_LINK; 2193 } 2194 2195 static void iso_connect_cfm(struct hci_conn *hcon, __u8 status) 2196 { 2197 if (hcon->type != ISO_LINK) { 2198 if (hcon->type != LE_LINK) 2199 return; 2200 2201 /* Check if LE link has failed */ 2202 if (status) { 2203 struct hci_link *link, *t; 2204 2205 list_for_each_entry_safe(link, t, &hcon->link_list, 2206 list) 2207 iso_conn_del(link->conn, bt_to_errno(status)); 2208 2209 return; 2210 } 2211 2212 /* Create CIS if pending */ 2213 hci_le_create_cis_pending(hcon->hdev); 2214 return; 2215 } 2216 2217 BT_DBG("hcon %p bdaddr %pMR status %d", hcon, &hcon->dst, status); 2218 2219 /* Similar to the success case, if HCI_CONN_BIG_SYNC_FAILED or 2220 * HCI_CONN_PA_SYNC_FAILED is set, queue the failed connection 2221 * into the accept queue of the listening socket and wake up 2222 * userspace, to inform the user about the event. 2223 */ 2224 if (!status || test_bit(HCI_CONN_BIG_SYNC_FAILED, &hcon->flags) || 2225 test_bit(HCI_CONN_PA_SYNC_FAILED, &hcon->flags)) { 2226 struct iso_conn *conn; 2227 2228 conn = iso_conn_add(hcon); 2229 if (conn) 2230 iso_conn_ready(conn); 2231 } else { 2232 iso_conn_del(hcon, bt_to_errno(status)); 2233 } 2234 } 2235 2236 static void iso_disconn_cfm(struct hci_conn *hcon, __u8 reason) 2237 { 2238 if (hcon->type != ISO_LINK) 2239 return; 2240 2241 BT_DBG("hcon %p reason %d", hcon, reason); 2242 2243 iso_conn_del(hcon, bt_to_errno(reason)); 2244 } 2245 2246 void iso_recv(struct hci_conn *hcon, struct sk_buff *skb, u16 flags) 2247 { 2248 struct iso_conn *conn = hcon->iso_data; 2249 __u16 pb, ts, len; 2250 2251 if (!conn) 2252 goto drop; 2253 2254 pb = hci_iso_flags_pb(flags); 2255 ts = hci_iso_flags_ts(flags); 2256 2257 BT_DBG("conn %p len %d pb 0x%x ts 0x%x", conn, skb->len, pb, ts); 2258 2259 switch (pb) { 2260 case ISO_START: 2261 case ISO_SINGLE: 2262 if (conn->rx_len) { 2263 BT_ERR("Unexpected start frame (len %d)", skb->len); 2264 kfree_skb(conn->rx_skb); 2265 conn->rx_skb = NULL; 2266 conn->rx_len = 0; 2267 } 2268 2269 if (ts) { 2270 struct hci_iso_ts_data_hdr *hdr; 2271 2272 /* TODO: add timestamp to the packet? */ 2273 hdr = skb_pull_data(skb, HCI_ISO_TS_DATA_HDR_SIZE); 2274 if (!hdr) { 2275 BT_ERR("Frame is too short (len %d)", skb->len); 2276 goto drop; 2277 } 2278 2279 len = __le16_to_cpu(hdr->slen); 2280 } else { 2281 struct hci_iso_data_hdr *hdr; 2282 2283 hdr = skb_pull_data(skb, HCI_ISO_DATA_HDR_SIZE); 2284 if (!hdr) { 2285 BT_ERR("Frame is too short (len %d)", skb->len); 2286 goto drop; 2287 } 2288 2289 len = __le16_to_cpu(hdr->slen); 2290 } 2291 2292 flags = hci_iso_data_flags(len); 2293 len = hci_iso_data_len(len); 2294 2295 BT_DBG("Start: total len %d, frag len %d flags 0x%4.4x", len, 2296 skb->len, flags); 2297 2298 if (len == skb->len) { 2299 /* Complete frame received */ 2300 hci_skb_pkt_status(skb) = flags & 0x03; 2301 iso_recv_frame(conn, skb); 2302 return; 2303 } 2304 2305 if (pb == ISO_SINGLE) { 2306 BT_ERR("Frame malformed (len %d, expected len %d)", 2307 skb->len, len); 2308 goto drop; 2309 } 2310 2311 if (skb->len > len) { 2312 BT_ERR("Frame is too long (len %d, expected len %d)", 2313 skb->len, len); 2314 goto drop; 2315 } 2316 2317 /* Allocate skb for the complete frame (with header) */ 2318 conn->rx_skb = bt_skb_alloc(len, GFP_KERNEL); 2319 if (!conn->rx_skb) 2320 goto drop; 2321 2322 hci_skb_pkt_status(conn->rx_skb) = flags & 0x03; 2323 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2324 skb->len); 2325 conn->rx_len = len - skb->len; 2326 break; 2327 2328 case ISO_CONT: 2329 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, 2330 conn->rx_len); 2331 2332 if (!conn->rx_len) { 2333 BT_ERR("Unexpected continuation frame (len %d)", 2334 skb->len); 2335 goto drop; 2336 } 2337 2338 if (skb->len > conn->rx_len) { 2339 BT_ERR("Fragment is too long (len %d, expected %d)", 2340 skb->len, conn->rx_len); 2341 kfree_skb(conn->rx_skb); 2342 conn->rx_skb = NULL; 2343 conn->rx_len = 0; 2344 goto drop; 2345 } 2346 2347 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2348 skb->len); 2349 conn->rx_len -= skb->len; 2350 return; 2351 2352 case ISO_END: 2353 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len), 2354 skb->len); 2355 conn->rx_len -= skb->len; 2356 2357 if (!conn->rx_len) { 2358 struct sk_buff *rx_skb = conn->rx_skb; 2359 2360 /* Complete frame received. iso_recv_frame 2361 * takes ownership of the skb so set the global 2362 * rx_skb pointer to NULL first. 2363 */ 2364 conn->rx_skb = NULL; 2365 iso_recv_frame(conn, rx_skb); 2366 } 2367 break; 2368 } 2369 2370 drop: 2371 kfree_skb(skb); 2372 } 2373 2374 static struct hci_cb iso_cb = { 2375 .name = "ISO", 2376 .match = iso_match, 2377 .connect_cfm = iso_connect_cfm, 2378 .disconn_cfm = iso_disconn_cfm, 2379 }; 2380 2381 static int iso_debugfs_show(struct seq_file *f, void *p) 2382 { 2383 struct sock *sk; 2384 2385 read_lock(&iso_sk_list.lock); 2386 2387 sk_for_each(sk, &iso_sk_list.head) { 2388 seq_printf(f, "%pMR %pMR %d\n", &iso_pi(sk)->src, 2389 &iso_pi(sk)->dst, sk->sk_state); 2390 } 2391 2392 read_unlock(&iso_sk_list.lock); 2393 2394 return 0; 2395 } 2396 2397 DEFINE_SHOW_ATTRIBUTE(iso_debugfs); 2398 2399 static struct dentry *iso_debugfs; 2400 2401 static const struct proto_ops iso_sock_ops = { 2402 .family = PF_BLUETOOTH, 2403 .owner = THIS_MODULE, 2404 .release = iso_sock_release, 2405 .bind = iso_sock_bind, 2406 .connect = iso_sock_connect, 2407 .listen = iso_sock_listen, 2408 .accept = iso_sock_accept, 2409 .getname = iso_sock_getname, 2410 .sendmsg = iso_sock_sendmsg, 2411 .recvmsg = iso_sock_recvmsg, 2412 .poll = bt_sock_poll, 2413 .ioctl = bt_sock_ioctl, 2414 .mmap = sock_no_mmap, 2415 .socketpair = sock_no_socketpair, 2416 .shutdown = iso_sock_shutdown, 2417 .setsockopt = iso_sock_setsockopt, 2418 .getsockopt = iso_sock_getsockopt 2419 }; 2420 2421 static const struct net_proto_family iso_sock_family_ops = { 2422 .family = PF_BLUETOOTH, 2423 .owner = THIS_MODULE, 2424 .create = iso_sock_create, 2425 }; 2426 2427 static bool iso_inited; 2428 2429 bool iso_enabled(void) 2430 { 2431 return iso_inited; 2432 } 2433 2434 int iso_init(void) 2435 { 2436 int err; 2437 2438 BUILD_BUG_ON(sizeof(struct sockaddr_iso) > sizeof(struct sockaddr)); 2439 2440 if (iso_inited) 2441 return -EALREADY; 2442 2443 err = proto_register(&iso_proto, 0); 2444 if (err < 0) 2445 return err; 2446 2447 err = bt_sock_register(BTPROTO_ISO, &iso_sock_family_ops); 2448 if (err < 0) { 2449 BT_ERR("ISO socket registration failed"); 2450 goto error; 2451 } 2452 2453 err = bt_procfs_init(&init_net, "iso", &iso_sk_list, NULL); 2454 if (err < 0) { 2455 BT_ERR("Failed to create ISO proc file"); 2456 bt_sock_unregister(BTPROTO_ISO); 2457 goto error; 2458 } 2459 2460 BT_INFO("ISO socket layer initialized"); 2461 2462 hci_register_cb(&iso_cb); 2463 2464 if (!IS_ERR_OR_NULL(bt_debugfs)) 2465 iso_debugfs = debugfs_create_file("iso", 0444, bt_debugfs, 2466 NULL, &iso_debugfs_fops); 2467 2468 iso_inited = true; 2469 2470 return 0; 2471 2472 error: 2473 proto_unregister(&iso_proto); 2474 return err; 2475 } 2476 2477 int iso_exit(void) 2478 { 2479 if (!iso_inited) 2480 return -EALREADY; 2481 2482 bt_procfs_cleanup(&init_net, "iso"); 2483 2484 debugfs_remove(iso_debugfs); 2485 iso_debugfs = NULL; 2486 2487 hci_unregister_cb(&iso_cb); 2488 2489 bt_sock_unregister(BTPROTO_ISO); 2490 2491 proto_unregister(&iso_proto); 2492 2493 iso_inited = false; 2494 2495 return 0; 2496 } 2497