llcp_commands.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  18. #include <linux/init.h>
  19. #include <linux/kernel.h>
  20. #include <linux/module.h>
  21. #include <linux/nfc.h>
  22. #include <net/nfc/nfc.h>
  23. #include "nfc.h"
  24. #include "llcp.h"
  25. static u8 llcp_tlv_length[LLCP_TLV_MAX] = {
  26. 0,
  27. 1, /* VERSION */
  28. 2, /* MIUX */
  29. 2, /* WKS */
  30. 1, /* LTO */
  31. 1, /* RW */
  32. 0, /* SN */
  33. 1, /* OPT */
  34. 0, /* SDREQ */
  35. 2, /* SDRES */
  36. };
  37. static u8 llcp_tlv8(u8 *tlv, u8 type)
  38. {
  39. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  40. return 0;
  41. return tlv[2];
  42. }
  43. static u16 llcp_tlv16(u8 *tlv, u8 type)
  44. {
  45. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  46. return 0;
  47. return be16_to_cpu(*((__be16 *)(tlv + 2)));
  48. }
  49. static u8 llcp_tlv_version(u8 *tlv)
  50. {
  51. return llcp_tlv8(tlv, LLCP_TLV_VERSION);
  52. }
  53. static u16 llcp_tlv_miux(u8 *tlv)
  54. {
  55. return llcp_tlv16(tlv, LLCP_TLV_MIUX) & 0x7ff;
  56. }
  57. static u16 llcp_tlv_wks(u8 *tlv)
  58. {
  59. return llcp_tlv16(tlv, LLCP_TLV_WKS);
  60. }
  61. static u16 llcp_tlv_lto(u8 *tlv)
  62. {
  63. return llcp_tlv8(tlv, LLCP_TLV_LTO);
  64. }
  65. static u8 llcp_tlv_opt(u8 *tlv)
  66. {
  67. return llcp_tlv8(tlv, LLCP_TLV_OPT);
  68. }
  69. static u8 llcp_tlv_rw(u8 *tlv)
  70. {
  71. return llcp_tlv8(tlv, LLCP_TLV_RW) & 0xf;
  72. }
  73. u8 *nfc_llcp_build_tlv(u8 type, u8 *value, u8 value_length, u8 *tlv_length)
  74. {
  75. u8 *tlv, length;
  76. pr_debug("type %d\n", type);
  77. if (type >= LLCP_TLV_MAX)
  78. return NULL;
  79. length = llcp_tlv_length[type];
  80. if (length == 0 && value_length == 0)
  81. return NULL;
  82. else if (length == 0)
  83. length = value_length;
  84. *tlv_length = 2 + length;
  85. tlv = kzalloc(2 + length, GFP_KERNEL);
  86. if (tlv == NULL)
  87. return tlv;
  88. tlv[0] = type;
  89. tlv[1] = length;
  90. memcpy(tlv + 2, value, length);
  91. return tlv;
  92. }
  93. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdres_tlv(u8 tid, u8 sap)
  94. {
  95. struct nfc_llcp_sdp_tlv *sdres;
  96. u8 value[2];
  97. sdres = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  98. if (sdres == NULL)
  99. return NULL;
  100. value[0] = tid;
  101. value[1] = sap;
  102. sdres->tlv = nfc_llcp_build_tlv(LLCP_TLV_SDRES, value, 2,
  103. &sdres->tlv_len);
  104. if (sdres->tlv == NULL) {
  105. kfree(sdres);
  106. return NULL;
  107. }
  108. sdres->tid = tid;
  109. sdres->sap = sap;
  110. INIT_HLIST_NODE(&sdres->node);
  111. return sdres;
  112. }
  113. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdreq_tlv(u8 tid, char *uri,
  114. size_t uri_len)
  115. {
  116. struct nfc_llcp_sdp_tlv *sdreq;
  117. pr_debug("uri: %s, len: %zu\n", uri, uri_len);
  118. /* sdreq->tlv_len is u8, takes uri_len, + 3 for header, + 1 for NULL */
  119. if (WARN_ON_ONCE(uri_len > U8_MAX - 4))
  120. return NULL;
  121. sdreq = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  122. if (sdreq == NULL)
  123. return NULL;
  124. sdreq->tlv_len = uri_len + 3;
  125. if (uri[uri_len - 1] == 0)
  126. sdreq->tlv_len--;
  127. sdreq->tlv = kzalloc(sdreq->tlv_len + 1, GFP_KERNEL);
  128. if (sdreq->tlv == NULL) {
  129. kfree(sdreq);
  130. return NULL;
  131. }
  132. sdreq->tlv[0] = LLCP_TLV_SDREQ;
  133. sdreq->tlv[1] = sdreq->tlv_len - 2;
  134. sdreq->tlv[2] = tid;
  135. sdreq->tid = tid;
  136. sdreq->uri = sdreq->tlv + 3;
  137. memcpy(sdreq->uri, uri, uri_len);
  138. sdreq->time = jiffies;
  139. INIT_HLIST_NODE(&sdreq->node);
  140. return sdreq;
  141. }
  142. void nfc_llcp_free_sdp_tlv(struct nfc_llcp_sdp_tlv *sdp)
  143. {
  144. kfree(sdp->tlv);
  145. kfree(sdp);
  146. }
  147. void nfc_llcp_free_sdp_tlv_list(struct hlist_head *head)
  148. {
  149. struct nfc_llcp_sdp_tlv *sdp;
  150. struct hlist_node *n;
  151. hlist_for_each_entry_safe(sdp, n, head, node) {
  152. hlist_del(&sdp->node);
  153. nfc_llcp_free_sdp_tlv(sdp);
  154. }
  155. }
  156. int nfc_llcp_parse_gb_tlv(struct nfc_llcp_local *local,
  157. u8 *tlv_array, u16 tlv_array_len)
  158. {
  159. u8 *tlv = tlv_array, type, length, offset = 0;
  160. pr_debug("TLV array length %d\n", tlv_array_len);
  161. if (local == NULL)
  162. return -ENODEV;
  163. while (offset < tlv_array_len) {
  164. type = tlv[0];
  165. length = tlv[1];
  166. pr_debug("type 0x%x length %d\n", type, length);
  167. switch (type) {
  168. case LLCP_TLV_VERSION:
  169. local->remote_version = llcp_tlv_version(tlv);
  170. break;
  171. case LLCP_TLV_MIUX:
  172. local->remote_miu = llcp_tlv_miux(tlv) + 128;
  173. break;
  174. case LLCP_TLV_WKS:
  175. local->remote_wks = llcp_tlv_wks(tlv);
  176. break;
  177. case LLCP_TLV_LTO:
  178. local->remote_lto = llcp_tlv_lto(tlv) * 10;
  179. break;
  180. case LLCP_TLV_OPT:
  181. local->remote_opt = llcp_tlv_opt(tlv);
  182. break;
  183. default:
  184. pr_err("Invalid gt tlv value 0x%x\n", type);
  185. break;
  186. }
  187. offset += length + 2;
  188. tlv += length + 2;
  189. }
  190. pr_debug("version 0x%x miu %d lto %d opt 0x%x wks 0x%x\n",
  191. local->remote_version, local->remote_miu,
  192. local->remote_lto, local->remote_opt,
  193. local->remote_wks);
  194. return 0;
  195. }
  196. int nfc_llcp_parse_connection_tlv(struct nfc_llcp_sock *sock,
  197. u8 *tlv_array, u16 tlv_array_len)
  198. {
  199. u8 *tlv = tlv_array, type, length, offset = 0;
  200. pr_debug("TLV array length %d\n", tlv_array_len);
  201. if (sock == NULL)
  202. return -ENOTCONN;
  203. while (offset < tlv_array_len) {
  204. type = tlv[0];
  205. length = tlv[1];
  206. pr_debug("type 0x%x length %d\n", type, length);
  207. switch (type) {
  208. case LLCP_TLV_MIUX:
  209. sock->remote_miu = llcp_tlv_miux(tlv) + 128;
  210. break;
  211. case LLCP_TLV_RW:
  212. sock->remote_rw = llcp_tlv_rw(tlv);
  213. break;
  214. case LLCP_TLV_SN:
  215. break;
  216. default:
  217. pr_err("Invalid gt tlv value 0x%x\n", type);
  218. break;
  219. }
  220. offset += length + 2;
  221. tlv += length + 2;
  222. }
  223. pr_debug("sock %p rw %d miu %d\n", sock,
  224. sock->remote_rw, sock->remote_miu);
  225. return 0;
  226. }
  227. static struct sk_buff *llcp_add_header(struct sk_buff *pdu,
  228. u8 dsap, u8 ssap, u8 ptype)
  229. {
  230. u8 header[2];
  231. pr_debug("ptype 0x%x dsap 0x%x ssap 0x%x\n", ptype, dsap, ssap);
  232. header[0] = (u8)((dsap << 2) | (ptype >> 2));
  233. header[1] = (u8)((ptype << 6) | ssap);
  234. pr_debug("header 0x%x 0x%x\n", header[0], header[1]);
  235. memcpy(skb_put(pdu, LLCP_HEADER_SIZE), header, LLCP_HEADER_SIZE);
  236. return pdu;
  237. }
  238. static struct sk_buff *llcp_add_tlv(struct sk_buff *pdu, u8 *tlv,
  239. u8 tlv_length)
  240. {
  241. /* XXX Add an skb length check */
  242. if (tlv == NULL)
  243. return NULL;
  244. memcpy(skb_put(pdu, tlv_length), tlv, tlv_length);
  245. return pdu;
  246. }
  247. static struct sk_buff *llcp_allocate_pdu(struct nfc_llcp_sock *sock,
  248. u8 cmd, u16 size)
  249. {
  250. struct sk_buff *skb;
  251. int err;
  252. if (sock->ssap == 0)
  253. return NULL;
  254. skb = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  255. size + LLCP_HEADER_SIZE, &err);
  256. if (skb == NULL) {
  257. pr_err("Could not allocate PDU\n");
  258. return NULL;
  259. }
  260. skb = llcp_add_header(skb, sock->dsap, sock->ssap, cmd);
  261. return skb;
  262. }
  263. int nfc_llcp_send_disconnect(struct nfc_llcp_sock *sock)
  264. {
  265. struct sk_buff *skb;
  266. struct nfc_dev *dev;
  267. struct nfc_llcp_local *local;
  268. pr_debug("Sending DISC\n");
  269. local = sock->local;
  270. if (local == NULL)
  271. return -ENODEV;
  272. dev = sock->dev;
  273. if (dev == NULL)
  274. return -ENODEV;
  275. skb = llcp_allocate_pdu(sock, LLCP_PDU_DISC, 0);
  276. if (skb == NULL)
  277. return -ENOMEM;
  278. skb_queue_tail(&local->tx_queue, skb);
  279. return 0;
  280. }
  281. int nfc_llcp_send_symm(struct nfc_dev *dev)
  282. {
  283. struct sk_buff *skb;
  284. struct nfc_llcp_local *local;
  285. u16 size = 0;
  286. pr_debug("Sending SYMM\n");
  287. local = nfc_llcp_find_local(dev);
  288. if (local == NULL)
  289. return -ENODEV;
  290. size += LLCP_HEADER_SIZE;
  291. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  292. skb = alloc_skb(size, GFP_KERNEL);
  293. if (skb == NULL)
  294. return -ENOMEM;
  295. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  296. skb = llcp_add_header(skb, 0, 0, LLCP_PDU_SYMM);
  297. __net_timestamp(skb);
  298. nfc_llcp_send_to_raw_sock(local, skb, NFC_DIRECTION_TX);
  299. return nfc_data_exchange(dev, local->target_idx, skb,
  300. nfc_llcp_recv, local);
  301. }
  302. int nfc_llcp_send_connect(struct nfc_llcp_sock *sock)
  303. {
  304. struct nfc_llcp_local *local;
  305. struct sk_buff *skb;
  306. u8 *service_name_tlv = NULL, service_name_tlv_length;
  307. u8 *miux_tlv = NULL, miux_tlv_length;
  308. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  309. int err;
  310. u16 size = 0;
  311. __be16 miux;
  312. pr_debug("Sending CONNECT\n");
  313. local = sock->local;
  314. if (local == NULL)
  315. return -ENODEV;
  316. if (sock->service_name != NULL) {
  317. service_name_tlv = nfc_llcp_build_tlv(LLCP_TLV_SN,
  318. sock->service_name,
  319. sock->service_name_len,
  320. &service_name_tlv_length);
  321. if (!service_name_tlv) {
  322. err = -ENOMEM;
  323. goto error_tlv;
  324. }
  325. size += service_name_tlv_length;
  326. }
  327. /* If the socket parameters are not set, use the local ones */
  328. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  329. local->miux : sock->miux;
  330. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  331. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  332. &miux_tlv_length);
  333. if (!miux_tlv) {
  334. err = -ENOMEM;
  335. goto error_tlv;
  336. }
  337. size += miux_tlv_length;
  338. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  339. if (!rw_tlv) {
  340. err = -ENOMEM;
  341. goto error_tlv;
  342. }
  343. size += rw_tlv_length;
  344. pr_debug("SKB size %d SN length %zu\n", size, sock->service_name_len);
  345. skb = llcp_allocate_pdu(sock, LLCP_PDU_CONNECT, size);
  346. if (skb == NULL) {
  347. err = -ENOMEM;
  348. goto error_tlv;
  349. }
  350. if (service_name_tlv != NULL)
  351. skb = llcp_add_tlv(skb, service_name_tlv,
  352. service_name_tlv_length);
  353. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  354. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  355. skb_queue_tail(&local->tx_queue, skb);
  356. return 0;
  357. error_tlv:
  358. pr_err("error %d\n", err);
  359. kfree(service_name_tlv);
  360. kfree(miux_tlv);
  361. kfree(rw_tlv);
  362. return err;
  363. }
  364. int nfc_llcp_send_cc(struct nfc_llcp_sock *sock)
  365. {
  366. struct nfc_llcp_local *local;
  367. struct sk_buff *skb;
  368. u8 *miux_tlv = NULL, miux_tlv_length;
  369. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  370. int err;
  371. u16 size = 0;
  372. __be16 miux;
  373. pr_debug("Sending CC\n");
  374. local = sock->local;
  375. if (local == NULL)
  376. return -ENODEV;
  377. /* If the socket parameters are not set, use the local ones */
  378. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  379. local->miux : sock->miux;
  380. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  381. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  382. &miux_tlv_length);
  383. if (!miux_tlv) {
  384. err = -ENOMEM;
  385. goto error_tlv;
  386. }
  387. size += miux_tlv_length;
  388. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  389. if (!rw_tlv) {
  390. err = -ENOMEM;
  391. goto error_tlv;
  392. }
  393. size += rw_tlv_length;
  394. skb = llcp_allocate_pdu(sock, LLCP_PDU_CC, size);
  395. if (skb == NULL) {
  396. err = -ENOMEM;
  397. goto error_tlv;
  398. }
  399. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  400. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  401. skb_queue_tail(&local->tx_queue, skb);
  402. return 0;
  403. error_tlv:
  404. pr_err("error %d\n", err);
  405. kfree(miux_tlv);
  406. kfree(rw_tlv);
  407. return err;
  408. }
  409. static struct sk_buff *nfc_llcp_allocate_snl(struct nfc_llcp_local *local,
  410. size_t tlv_length)
  411. {
  412. struct sk_buff *skb;
  413. struct nfc_dev *dev;
  414. u16 size = 0;
  415. if (local == NULL)
  416. return ERR_PTR(-ENODEV);
  417. dev = local->dev;
  418. if (dev == NULL)
  419. return ERR_PTR(-ENODEV);
  420. size += LLCP_HEADER_SIZE;
  421. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  422. size += tlv_length;
  423. skb = alloc_skb(size, GFP_KERNEL);
  424. if (skb == NULL)
  425. return ERR_PTR(-ENOMEM);
  426. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  427. skb = llcp_add_header(skb, LLCP_SAP_SDP, LLCP_SAP_SDP, LLCP_PDU_SNL);
  428. return skb;
  429. }
  430. int nfc_llcp_send_snl_sdres(struct nfc_llcp_local *local,
  431. struct hlist_head *tlv_list, size_t tlvs_len)
  432. {
  433. struct nfc_llcp_sdp_tlv *sdp;
  434. struct hlist_node *n;
  435. struct sk_buff *skb;
  436. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  437. if (IS_ERR(skb))
  438. return PTR_ERR(skb);
  439. hlist_for_each_entry_safe(sdp, n, tlv_list, node) {
  440. memcpy(skb_put(skb, sdp->tlv_len), sdp->tlv, sdp->tlv_len);
  441. hlist_del(&sdp->node);
  442. nfc_llcp_free_sdp_tlv(sdp);
  443. }
  444. skb_queue_tail(&local->tx_queue, skb);
  445. return 0;
  446. }
  447. int nfc_llcp_send_snl_sdreq(struct nfc_llcp_local *local,
  448. struct hlist_head *tlv_list, size_t tlvs_len)
  449. {
  450. struct nfc_llcp_sdp_tlv *sdreq;
  451. struct hlist_node *n;
  452. struct sk_buff *skb;
  453. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  454. if (IS_ERR(skb))
  455. return PTR_ERR(skb);
  456. mutex_lock(&local->sdreq_lock);
  457. if (hlist_empty(&local->pending_sdreqs))
  458. mod_timer(&local->sdreq_timer,
  459. jiffies + msecs_to_jiffies(3 * local->remote_lto));
  460. hlist_for_each_entry_safe(sdreq, n, tlv_list, node) {
  461. pr_debug("tid %d for %s\n", sdreq->tid, sdreq->uri);
  462. memcpy(skb_put(skb, sdreq->tlv_len), sdreq->tlv,
  463. sdreq->tlv_len);
  464. hlist_del(&sdreq->node);
  465. hlist_add_head(&sdreq->node, &local->pending_sdreqs);
  466. }
  467. mutex_unlock(&local->sdreq_lock);
  468. skb_queue_tail(&local->tx_queue, skb);
  469. return 0;
  470. }
  471. int nfc_llcp_send_dm(struct nfc_llcp_local *local, u8 ssap, u8 dsap, u8 reason)
  472. {
  473. struct sk_buff *skb;
  474. struct nfc_dev *dev;
  475. u16 size = 1; /* Reason code */
  476. pr_debug("Sending DM reason 0x%x\n", reason);
  477. if (local == NULL)
  478. return -ENODEV;
  479. dev = local->dev;
  480. if (dev == NULL)
  481. return -ENODEV;
  482. size += LLCP_HEADER_SIZE;
  483. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  484. skb = alloc_skb(size, GFP_KERNEL);
  485. if (skb == NULL)
  486. return -ENOMEM;
  487. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  488. skb = llcp_add_header(skb, dsap, ssap, LLCP_PDU_DM);
  489. memcpy(skb_put(skb, 1), &reason, 1);
  490. skb_queue_head(&local->tx_queue, skb);
  491. return 0;
  492. }
  493. int nfc_llcp_send_i_frame(struct nfc_llcp_sock *sock,
  494. struct msghdr *msg, size_t len)
  495. {
  496. struct sk_buff *pdu;
  497. struct sock *sk = &sock->sk;
  498. struct nfc_llcp_local *local;
  499. size_t frag_len = 0, remaining_len;
  500. u8 *msg_data, *msg_ptr;
  501. u16 remote_miu;
  502. pr_debug("Send I frame len %zd\n", len);
  503. local = sock->local;
  504. if (local == NULL)
  505. return -ENODEV;
  506. /* Remote is ready but has not acknowledged our frames */
  507. if((sock->remote_ready &&
  508. skb_queue_len(&sock->tx_pending_queue) >= sock->remote_rw &&
  509. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  510. pr_err("Pending queue is full %d frames\n",
  511. skb_queue_len(&sock->tx_pending_queue));
  512. return -ENOBUFS;
  513. }
  514. /* Remote is not ready and we've been queueing enough frames */
  515. if ((!sock->remote_ready &&
  516. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  517. pr_err("Tx queue is full %d frames\n",
  518. skb_queue_len(&sock->tx_queue));
  519. return -ENOBUFS;
  520. }
  521. msg_data = kzalloc(len, GFP_KERNEL);
  522. if (msg_data == NULL)
  523. return -ENOMEM;
  524. if (memcpy_from_msg(msg_data, msg, len)) {
  525. kfree(msg_data);
  526. return -EFAULT;
  527. }
  528. remaining_len = len;
  529. msg_ptr = msg_data;
  530. do {
  531. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  532. LLCP_DEFAULT_MIU : sock->remote_miu;
  533. frag_len = min_t(size_t, remote_miu, remaining_len);
  534. pr_debug("Fragment %zd bytes remaining %zd",
  535. frag_len, remaining_len);
  536. pdu = llcp_allocate_pdu(sock, LLCP_PDU_I,
  537. frag_len + LLCP_SEQUENCE_SIZE);
  538. if (pdu == NULL) {
  539. kfree(msg_data);
  540. return -ENOMEM;
  541. }
  542. skb_put(pdu, LLCP_SEQUENCE_SIZE);
  543. if (likely(frag_len > 0))
  544. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  545. skb_queue_tail(&sock->tx_queue, pdu);
  546. lock_sock(sk);
  547. nfc_llcp_queue_i_frames(sock);
  548. release_sock(sk);
  549. remaining_len -= frag_len;
  550. msg_ptr += frag_len;
  551. } while (remaining_len > 0);
  552. kfree(msg_data);
  553. return len;
  554. }
  555. int nfc_llcp_send_ui_frame(struct nfc_llcp_sock *sock, u8 ssap, u8 dsap,
  556. struct msghdr *msg, size_t len)
  557. {
  558. struct sk_buff *pdu;
  559. struct nfc_llcp_local *local;
  560. size_t frag_len = 0, remaining_len;
  561. u8 *msg_ptr, *msg_data;
  562. u16 remote_miu;
  563. int err;
  564. pr_debug("Send UI frame len %zd\n", len);
  565. local = sock->local;
  566. if (local == NULL)
  567. return -ENODEV;
  568. msg_data = kzalloc(len, GFP_KERNEL);
  569. if (msg_data == NULL)
  570. return -ENOMEM;
  571. if (memcpy_from_msg(msg_data, msg, len)) {
  572. kfree(msg_data);
  573. return -EFAULT;
  574. }
  575. remaining_len = len;
  576. msg_ptr = msg_data;
  577. do {
  578. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  579. local->remote_miu : sock->remote_miu;
  580. frag_len = min_t(size_t, remote_miu, remaining_len);
  581. pr_debug("Fragment %zd bytes remaining %zd",
  582. frag_len, remaining_len);
  583. pdu = nfc_alloc_send_skb(sock->dev, &sock->sk, 0,
  584. frag_len + LLCP_HEADER_SIZE, &err);
  585. if (pdu == NULL) {
  586. pr_err("Could not allocate PDU (error=%d)\n", err);
  587. len -= remaining_len;
  588. if (len == 0)
  589. len = err;
  590. break;
  591. }
  592. pdu = llcp_add_header(pdu, dsap, ssap, LLCP_PDU_UI);
  593. if (likely(frag_len > 0))
  594. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  595. /* No need to check for the peer RW for UI frames */
  596. skb_queue_tail(&local->tx_queue, pdu);
  597. remaining_len -= frag_len;
  598. msg_ptr += frag_len;
  599. } while (remaining_len > 0);
  600. kfree(msg_data);
  601. return len;
  602. }
  603. int nfc_llcp_send_rr(struct nfc_llcp_sock *sock)
  604. {
  605. struct sk_buff *skb;
  606. struct nfc_llcp_local *local;
  607. pr_debug("Send rr nr %d\n", sock->recv_n);
  608. local = sock->local;
  609. if (local == NULL)
  610. return -ENODEV;
  611. skb = llcp_allocate_pdu(sock, LLCP_PDU_RR, LLCP_SEQUENCE_SIZE);
  612. if (skb == NULL)
  613. return -ENOMEM;
  614. skb_put(skb, LLCP_SEQUENCE_SIZE);
  615. skb->data[2] = sock->recv_n;
  616. skb_queue_head(&local->tx_queue, skb);
  617. return 0;
  618. }