llcp_commands.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  18. #include <linux/init.h>
  19. #include <linux/kernel.h>
  20. #include <linux/module.h>
  21. #include <linux/nfc.h>
  22. #include <net/nfc/nfc.h>
  23. #include "nfc.h"
  24. #include "llcp.h"
  25. static u8 llcp_tlv_length[LLCP_TLV_MAX] = {
  26. 0,
  27. 1, /* VERSION */
  28. 2, /* MIUX */
  29. 2, /* WKS */
  30. 1, /* LTO */
  31. 1, /* RW */
  32. 0, /* SN */
  33. 1, /* OPT */
  34. 0, /* SDREQ */
  35. 2, /* SDRES */
  36. };
  37. static u8 llcp_tlv8(u8 *tlv, u8 type)
  38. {
  39. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  40. return 0;
  41. return tlv[2];
  42. }
  43. static u16 llcp_tlv16(u8 *tlv, u8 type)
  44. {
  45. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  46. return 0;
  47. return be16_to_cpu(*((__be16 *)(tlv + 2)));
  48. }
  49. static u8 llcp_tlv_version(u8 *tlv)
  50. {
  51. return llcp_tlv8(tlv, LLCP_TLV_VERSION);
  52. }
  53. static u16 llcp_tlv_miux(u8 *tlv)
  54. {
  55. return llcp_tlv16(tlv, LLCP_TLV_MIUX) & 0x7ff;
  56. }
  57. static u16 llcp_tlv_wks(u8 *tlv)
  58. {
  59. return llcp_tlv16(tlv, LLCP_TLV_WKS);
  60. }
  61. static u16 llcp_tlv_lto(u8 *tlv)
  62. {
  63. return llcp_tlv8(tlv, LLCP_TLV_LTO);
  64. }
  65. static u8 llcp_tlv_opt(u8 *tlv)
  66. {
  67. return llcp_tlv8(tlv, LLCP_TLV_OPT);
  68. }
  69. static u8 llcp_tlv_rw(u8 *tlv)
  70. {
  71. return llcp_tlv8(tlv, LLCP_TLV_RW) & 0xf;
  72. }
  73. u8 *nfc_llcp_build_tlv(u8 type, u8 *value, u8 value_length, u8 *tlv_length)
  74. {
  75. u8 *tlv, length;
  76. pr_debug("type %d\n", type);
  77. if (type >= LLCP_TLV_MAX)
  78. return NULL;
  79. length = llcp_tlv_length[type];
  80. if (length == 0 && value_length == 0)
  81. return NULL;
  82. else if (length == 0)
  83. length = value_length;
  84. *tlv_length = 2 + length;
  85. tlv = kzalloc(2 + length, GFP_KERNEL);
  86. if (tlv == NULL)
  87. return tlv;
  88. tlv[0] = type;
  89. tlv[1] = length;
  90. memcpy(tlv + 2, value, length);
  91. return tlv;
  92. }
  93. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdres_tlv(u8 tid, u8 sap)
  94. {
  95. struct nfc_llcp_sdp_tlv *sdres;
  96. u8 value[2];
  97. sdres = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  98. if (sdres == NULL)
  99. return NULL;
  100. value[0] = tid;
  101. value[1] = sap;
  102. sdres->tlv = nfc_llcp_build_tlv(LLCP_TLV_SDRES, value, 2,
  103. &sdres->tlv_len);
  104. if (sdres->tlv == NULL) {
  105. kfree(sdres);
  106. return NULL;
  107. }
  108. sdres->tid = tid;
  109. sdres->sap = sap;
  110. INIT_HLIST_NODE(&sdres->node);
  111. return sdres;
  112. }
  113. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdreq_tlv(u8 tid, char *uri,
  114. size_t uri_len)
  115. {
  116. struct nfc_llcp_sdp_tlv *sdreq;
  117. pr_debug("uri: %s, len: %zu\n", uri, uri_len);
  118. sdreq = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  119. if (sdreq == NULL)
  120. return NULL;
  121. sdreq->tlv_len = uri_len + 3;
  122. if (uri[uri_len - 1] == 0)
  123. sdreq->tlv_len--;
  124. sdreq->tlv = kzalloc(sdreq->tlv_len + 1, GFP_KERNEL);
  125. if (sdreq->tlv == NULL) {
  126. kfree(sdreq);
  127. return NULL;
  128. }
  129. sdreq->tlv[0] = LLCP_TLV_SDREQ;
  130. sdreq->tlv[1] = sdreq->tlv_len - 2;
  131. sdreq->tlv[2] = tid;
  132. sdreq->tid = tid;
  133. sdreq->uri = sdreq->tlv + 3;
  134. memcpy(sdreq->uri, uri, uri_len);
  135. sdreq->time = jiffies;
  136. INIT_HLIST_NODE(&sdreq->node);
  137. return sdreq;
  138. }
  139. void nfc_llcp_free_sdp_tlv(struct nfc_llcp_sdp_tlv *sdp)
  140. {
  141. kfree(sdp->tlv);
  142. kfree(sdp);
  143. }
  144. void nfc_llcp_free_sdp_tlv_list(struct hlist_head *head)
  145. {
  146. struct nfc_llcp_sdp_tlv *sdp;
  147. struct hlist_node *n;
  148. hlist_for_each_entry_safe(sdp, n, head, node) {
  149. hlist_del(&sdp->node);
  150. nfc_llcp_free_sdp_tlv(sdp);
  151. }
  152. }
  153. int nfc_llcp_parse_gb_tlv(struct nfc_llcp_local *local,
  154. u8 *tlv_array, u16 tlv_array_len)
  155. {
  156. u8 *tlv = tlv_array, type, length, offset = 0;
  157. pr_debug("TLV array length %d\n", tlv_array_len);
  158. if (local == NULL)
  159. return -ENODEV;
  160. while (offset < tlv_array_len) {
  161. type = tlv[0];
  162. length = tlv[1];
  163. pr_debug("type 0x%x length %d\n", type, length);
  164. switch (type) {
  165. case LLCP_TLV_VERSION:
  166. local->remote_version = llcp_tlv_version(tlv);
  167. break;
  168. case LLCP_TLV_MIUX:
  169. local->remote_miu = llcp_tlv_miux(tlv) + 128;
  170. break;
  171. case LLCP_TLV_WKS:
  172. local->remote_wks = llcp_tlv_wks(tlv);
  173. break;
  174. case LLCP_TLV_LTO:
  175. local->remote_lto = llcp_tlv_lto(tlv) * 10;
  176. break;
  177. case LLCP_TLV_OPT:
  178. local->remote_opt = llcp_tlv_opt(tlv);
  179. break;
  180. default:
  181. pr_err("Invalid gt tlv value 0x%x\n", type);
  182. break;
  183. }
  184. offset += length + 2;
  185. tlv += length + 2;
  186. }
  187. pr_debug("version 0x%x miu %d lto %d opt 0x%x wks 0x%x\n",
  188. local->remote_version, local->remote_miu,
  189. local->remote_lto, local->remote_opt,
  190. local->remote_wks);
  191. return 0;
  192. }
  193. int nfc_llcp_parse_connection_tlv(struct nfc_llcp_sock *sock,
  194. u8 *tlv_array, u16 tlv_array_len)
  195. {
  196. u8 *tlv = tlv_array, type, length, offset = 0;
  197. pr_debug("TLV array length %d\n", tlv_array_len);
  198. if (sock == NULL)
  199. return -ENOTCONN;
  200. while (offset < tlv_array_len) {
  201. type = tlv[0];
  202. length = tlv[1];
  203. pr_debug("type 0x%x length %d\n", type, length);
  204. switch (type) {
  205. case LLCP_TLV_MIUX:
  206. sock->remote_miu = llcp_tlv_miux(tlv) + 128;
  207. break;
  208. case LLCP_TLV_RW:
  209. sock->remote_rw = llcp_tlv_rw(tlv);
  210. break;
  211. case LLCP_TLV_SN:
  212. break;
  213. default:
  214. pr_err("Invalid gt tlv value 0x%x\n", type);
  215. break;
  216. }
  217. offset += length + 2;
  218. tlv += length + 2;
  219. }
  220. pr_debug("sock %p rw %d miu %d\n", sock,
  221. sock->remote_rw, sock->remote_miu);
  222. return 0;
  223. }
  224. static struct sk_buff *llcp_add_header(struct sk_buff *pdu,
  225. u8 dsap, u8 ssap, u8 ptype)
  226. {
  227. u8 header[2];
  228. pr_debug("ptype 0x%x dsap 0x%x ssap 0x%x\n", ptype, dsap, ssap);
  229. header[0] = (u8)((dsap << 2) | (ptype >> 2));
  230. header[1] = (u8)((ptype << 6) | ssap);
  231. pr_debug("header 0x%x 0x%x\n", header[0], header[1]);
  232. memcpy(skb_put(pdu, LLCP_HEADER_SIZE), header, LLCP_HEADER_SIZE);
  233. return pdu;
  234. }
  235. static struct sk_buff *llcp_add_tlv(struct sk_buff *pdu, u8 *tlv,
  236. u8 tlv_length)
  237. {
  238. /* XXX Add an skb length check */
  239. if (tlv == NULL)
  240. return NULL;
  241. memcpy(skb_put(pdu, tlv_length), tlv, tlv_length);
  242. return pdu;
  243. }
  244. static struct sk_buff *llcp_allocate_pdu(struct nfc_llcp_sock *sock,
  245. u8 cmd, u16 size)
  246. {
  247. struct sk_buff *skb;
  248. int err;
  249. if (sock->ssap == 0)
  250. return NULL;
  251. skb = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  252. size + LLCP_HEADER_SIZE, &err);
  253. if (skb == NULL) {
  254. pr_err("Could not allocate PDU\n");
  255. return NULL;
  256. }
  257. skb = llcp_add_header(skb, sock->dsap, sock->ssap, cmd);
  258. return skb;
  259. }
  260. int nfc_llcp_send_disconnect(struct nfc_llcp_sock *sock)
  261. {
  262. struct sk_buff *skb;
  263. struct nfc_dev *dev;
  264. struct nfc_llcp_local *local;
  265. pr_debug("Sending DISC\n");
  266. local = sock->local;
  267. if (local == NULL)
  268. return -ENODEV;
  269. dev = sock->dev;
  270. if (dev == NULL)
  271. return -ENODEV;
  272. skb = llcp_allocate_pdu(sock, LLCP_PDU_DISC, 0);
  273. if (skb == NULL)
  274. return -ENOMEM;
  275. skb_queue_tail(&local->tx_queue, skb);
  276. return 0;
  277. }
  278. int nfc_llcp_send_symm(struct nfc_dev *dev)
  279. {
  280. struct sk_buff *skb;
  281. struct nfc_llcp_local *local;
  282. u16 size = 0;
  283. pr_debug("Sending SYMM\n");
  284. local = nfc_llcp_find_local(dev);
  285. if (local == NULL)
  286. return -ENODEV;
  287. size += LLCP_HEADER_SIZE;
  288. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  289. skb = alloc_skb(size, GFP_KERNEL);
  290. if (skb == NULL)
  291. return -ENOMEM;
  292. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  293. skb = llcp_add_header(skb, 0, 0, LLCP_PDU_SYMM);
  294. __net_timestamp(skb);
  295. nfc_llcp_send_to_raw_sock(local, skb, NFC_DIRECTION_TX);
  296. return nfc_data_exchange(dev, local->target_idx, skb,
  297. nfc_llcp_recv, local);
  298. }
  299. int nfc_llcp_send_connect(struct nfc_llcp_sock *sock)
  300. {
  301. struct nfc_llcp_local *local;
  302. struct sk_buff *skb;
  303. u8 *service_name_tlv = NULL, service_name_tlv_length;
  304. u8 *miux_tlv = NULL, miux_tlv_length;
  305. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  306. int err;
  307. u16 size = 0, miux;
  308. pr_debug("Sending CONNECT\n");
  309. local = sock->local;
  310. if (local == NULL)
  311. return -ENODEV;
  312. if (sock->service_name != NULL) {
  313. service_name_tlv = nfc_llcp_build_tlv(LLCP_TLV_SN,
  314. sock->service_name,
  315. sock->service_name_len,
  316. &service_name_tlv_length);
  317. size += service_name_tlv_length;
  318. }
  319. /* If the socket parameters are not set, use the local ones */
  320. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  321. local->miux : sock->miux;
  322. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  323. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  324. &miux_tlv_length);
  325. size += miux_tlv_length;
  326. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  327. size += rw_tlv_length;
  328. pr_debug("SKB size %d SN length %zu\n", size, sock->service_name_len);
  329. skb = llcp_allocate_pdu(sock, LLCP_PDU_CONNECT, size);
  330. if (skb == NULL) {
  331. err = -ENOMEM;
  332. goto error_tlv;
  333. }
  334. if (service_name_tlv != NULL)
  335. skb = llcp_add_tlv(skb, service_name_tlv,
  336. service_name_tlv_length);
  337. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  338. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  339. skb_queue_tail(&local->tx_queue, skb);
  340. return 0;
  341. error_tlv:
  342. pr_err("error %d\n", err);
  343. kfree(service_name_tlv);
  344. kfree(miux_tlv);
  345. kfree(rw_tlv);
  346. return err;
  347. }
  348. int nfc_llcp_send_cc(struct nfc_llcp_sock *sock)
  349. {
  350. struct nfc_llcp_local *local;
  351. struct sk_buff *skb;
  352. u8 *miux_tlv = NULL, miux_tlv_length;
  353. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  354. int err;
  355. u16 size = 0, miux;
  356. pr_debug("Sending CC\n");
  357. local = sock->local;
  358. if (local == NULL)
  359. return -ENODEV;
  360. /* If the socket parameters are not set, use the local ones */
  361. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  362. local->miux : sock->miux;
  363. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  364. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  365. &miux_tlv_length);
  366. size += miux_tlv_length;
  367. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  368. size += rw_tlv_length;
  369. skb = llcp_allocate_pdu(sock, LLCP_PDU_CC, size);
  370. if (skb == NULL) {
  371. err = -ENOMEM;
  372. goto error_tlv;
  373. }
  374. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  375. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  376. skb_queue_tail(&local->tx_queue, skb);
  377. return 0;
  378. error_tlv:
  379. pr_err("error %d\n", err);
  380. kfree(miux_tlv);
  381. kfree(rw_tlv);
  382. return err;
  383. }
  384. static struct sk_buff *nfc_llcp_allocate_snl(struct nfc_llcp_local *local,
  385. size_t tlv_length)
  386. {
  387. struct sk_buff *skb;
  388. struct nfc_dev *dev;
  389. u16 size = 0;
  390. if (local == NULL)
  391. return ERR_PTR(-ENODEV);
  392. dev = local->dev;
  393. if (dev == NULL)
  394. return ERR_PTR(-ENODEV);
  395. size += LLCP_HEADER_SIZE;
  396. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  397. size += tlv_length;
  398. skb = alloc_skb(size, GFP_KERNEL);
  399. if (skb == NULL)
  400. return ERR_PTR(-ENOMEM);
  401. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  402. skb = llcp_add_header(skb, LLCP_SAP_SDP, LLCP_SAP_SDP, LLCP_PDU_SNL);
  403. return skb;
  404. }
  405. int nfc_llcp_send_snl_sdres(struct nfc_llcp_local *local,
  406. struct hlist_head *tlv_list, size_t tlvs_len)
  407. {
  408. struct nfc_llcp_sdp_tlv *sdp;
  409. struct hlist_node *n;
  410. struct sk_buff *skb;
  411. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  412. if (IS_ERR(skb))
  413. return PTR_ERR(skb);
  414. hlist_for_each_entry_safe(sdp, n, tlv_list, node) {
  415. memcpy(skb_put(skb, sdp->tlv_len), sdp->tlv, sdp->tlv_len);
  416. hlist_del(&sdp->node);
  417. nfc_llcp_free_sdp_tlv(sdp);
  418. }
  419. skb_queue_tail(&local->tx_queue, skb);
  420. return 0;
  421. }
  422. int nfc_llcp_send_snl_sdreq(struct nfc_llcp_local *local,
  423. struct hlist_head *tlv_list, size_t tlvs_len)
  424. {
  425. struct nfc_llcp_sdp_tlv *sdreq;
  426. struct hlist_node *n;
  427. struct sk_buff *skb;
  428. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  429. if (IS_ERR(skb))
  430. return PTR_ERR(skb);
  431. mutex_lock(&local->sdreq_lock);
  432. if (hlist_empty(&local->pending_sdreqs))
  433. mod_timer(&local->sdreq_timer,
  434. jiffies + msecs_to_jiffies(3 * local->remote_lto));
  435. hlist_for_each_entry_safe(sdreq, n, tlv_list, node) {
  436. pr_debug("tid %d for %s\n", sdreq->tid, sdreq->uri);
  437. memcpy(skb_put(skb, sdreq->tlv_len), sdreq->tlv,
  438. sdreq->tlv_len);
  439. hlist_del(&sdreq->node);
  440. hlist_add_head(&sdreq->node, &local->pending_sdreqs);
  441. }
  442. mutex_unlock(&local->sdreq_lock);
  443. skb_queue_tail(&local->tx_queue, skb);
  444. return 0;
  445. }
  446. int nfc_llcp_send_dm(struct nfc_llcp_local *local, u8 ssap, u8 dsap, u8 reason)
  447. {
  448. struct sk_buff *skb;
  449. struct nfc_dev *dev;
  450. u16 size = 1; /* Reason code */
  451. pr_debug("Sending DM reason 0x%x\n", reason);
  452. if (local == NULL)
  453. return -ENODEV;
  454. dev = local->dev;
  455. if (dev == NULL)
  456. return -ENODEV;
  457. size += LLCP_HEADER_SIZE;
  458. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  459. skb = alloc_skb(size, GFP_KERNEL);
  460. if (skb == NULL)
  461. return -ENOMEM;
  462. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  463. skb = llcp_add_header(skb, dsap, ssap, LLCP_PDU_DM);
  464. memcpy(skb_put(skb, 1), &reason, 1);
  465. skb_queue_head(&local->tx_queue, skb);
  466. return 0;
  467. }
  468. int nfc_llcp_send_i_frame(struct nfc_llcp_sock *sock,
  469. struct msghdr *msg, size_t len)
  470. {
  471. struct sk_buff *pdu;
  472. struct sock *sk = &sock->sk;
  473. struct nfc_llcp_local *local;
  474. size_t frag_len = 0, remaining_len;
  475. u8 *msg_data, *msg_ptr;
  476. u16 remote_miu;
  477. pr_debug("Send I frame len %zd\n", len);
  478. local = sock->local;
  479. if (local == NULL)
  480. return -ENODEV;
  481. /* Remote is ready but has not acknowledged our frames */
  482. if((sock->remote_ready &&
  483. skb_queue_len(&sock->tx_pending_queue) >= sock->remote_rw &&
  484. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  485. pr_err("Pending queue is full %d frames\n",
  486. skb_queue_len(&sock->tx_pending_queue));
  487. return -ENOBUFS;
  488. }
  489. /* Remote is not ready and we've been queueing enough frames */
  490. if ((!sock->remote_ready &&
  491. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  492. pr_err("Tx queue is full %d frames\n",
  493. skb_queue_len(&sock->tx_queue));
  494. return -ENOBUFS;
  495. }
  496. msg_data = kzalloc(len, GFP_KERNEL);
  497. if (msg_data == NULL)
  498. return -ENOMEM;
  499. if (memcpy_fromiovec(msg_data, msg->msg_iov, len)) {
  500. kfree(msg_data);
  501. return -EFAULT;
  502. }
  503. remaining_len = len;
  504. msg_ptr = msg_data;
  505. do {
  506. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  507. LLCP_DEFAULT_MIU : sock->remote_miu;
  508. frag_len = min_t(size_t, remote_miu, remaining_len);
  509. pr_debug("Fragment %zd bytes remaining %zd",
  510. frag_len, remaining_len);
  511. pdu = llcp_allocate_pdu(sock, LLCP_PDU_I,
  512. frag_len + LLCP_SEQUENCE_SIZE);
  513. if (pdu == NULL) {
  514. kfree(msg_data);
  515. return -ENOMEM;
  516. }
  517. skb_put(pdu, LLCP_SEQUENCE_SIZE);
  518. if (likely(frag_len > 0))
  519. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  520. skb_queue_tail(&sock->tx_queue, pdu);
  521. lock_sock(sk);
  522. nfc_llcp_queue_i_frames(sock);
  523. release_sock(sk);
  524. remaining_len -= frag_len;
  525. msg_ptr += frag_len;
  526. } while (remaining_len > 0);
  527. kfree(msg_data);
  528. return len;
  529. }
  530. int nfc_llcp_send_ui_frame(struct nfc_llcp_sock *sock, u8 ssap, u8 dsap,
  531. struct msghdr *msg, size_t len)
  532. {
  533. struct sk_buff *pdu;
  534. struct nfc_llcp_local *local;
  535. size_t frag_len = 0, remaining_len;
  536. u8 *msg_ptr, *msg_data;
  537. u16 remote_miu;
  538. int err;
  539. pr_debug("Send UI frame len %zd\n", len);
  540. local = sock->local;
  541. if (local == NULL)
  542. return -ENODEV;
  543. msg_data = kzalloc(len, GFP_KERNEL);
  544. if (msg_data == NULL)
  545. return -ENOMEM;
  546. if (memcpy_fromiovec(msg_data, msg->msg_iov, len)) {
  547. kfree(msg_data);
  548. return -EFAULT;
  549. }
  550. remaining_len = len;
  551. msg_ptr = msg_data;
  552. do {
  553. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  554. local->remote_miu : sock->remote_miu;
  555. frag_len = min_t(size_t, remote_miu, remaining_len);
  556. pr_debug("Fragment %zd bytes remaining %zd",
  557. frag_len, remaining_len);
  558. pdu = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  559. frag_len + LLCP_HEADER_SIZE, &err);
  560. if (pdu == NULL) {
  561. pr_err("Could not allocate PDU\n");
  562. continue;
  563. }
  564. pdu = llcp_add_header(pdu, dsap, ssap, LLCP_PDU_UI);
  565. if (likely(frag_len > 0))
  566. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  567. /* No need to check for the peer RW for UI frames */
  568. skb_queue_tail(&local->tx_queue, pdu);
  569. remaining_len -= frag_len;
  570. msg_ptr += frag_len;
  571. } while (remaining_len > 0);
  572. kfree(msg_data);
  573. return len;
  574. }
  575. int nfc_llcp_send_rr(struct nfc_llcp_sock *sock)
  576. {
  577. struct sk_buff *skb;
  578. struct nfc_llcp_local *local;
  579. pr_debug("Send rr nr %d\n", sock->recv_n);
  580. local = sock->local;
  581. if (local == NULL)
  582. return -ENODEV;
  583. skb = llcp_allocate_pdu(sock, LLCP_PDU_RR, LLCP_SEQUENCE_SIZE);
  584. if (skb == NULL)
  585. return -ENOMEM;
  586. skb_put(skb, LLCP_SEQUENCE_SIZE);
  587. skb->data[2] = sock->recv_n;
  588. skb_queue_head(&local->tx_queue, skb);
  589. return 0;
  590. }