commands.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the
  16. * Free Software Foundation, Inc.,
  17. * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  18. */
  19. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  20. #include <linux/init.h>
  21. #include <linux/kernel.h>
  22. #include <linux/module.h>
  23. #include <linux/nfc.h>
  24. #include <net/nfc/nfc.h>
  25. #include "../nfc.h"
  26. #include "llcp.h"
  27. static u8 llcp_tlv_length[LLCP_TLV_MAX] = {
  28. 0,
  29. 1, /* VERSION */
  30. 2, /* MIUX */
  31. 2, /* WKS */
  32. 1, /* LTO */
  33. 1, /* RW */
  34. 0, /* SN */
  35. 1, /* OPT */
  36. 0, /* SDREQ */
  37. 2, /* SDRES */
  38. };
  39. static u8 llcp_tlv8(u8 *tlv, u8 type)
  40. {
  41. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  42. return 0;
  43. return tlv[2];
  44. }
  45. static u16 llcp_tlv16(u8 *tlv, u8 type)
  46. {
  47. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  48. return 0;
  49. return be16_to_cpu(*((__be16 *)(tlv + 2)));
  50. }
  51. static u8 llcp_tlv_version(u8 *tlv)
  52. {
  53. return llcp_tlv8(tlv, LLCP_TLV_VERSION);
  54. }
  55. static u16 llcp_tlv_miux(u8 *tlv)
  56. {
  57. return llcp_tlv16(tlv, LLCP_TLV_MIUX) & 0x7ff;
  58. }
  59. static u16 llcp_tlv_wks(u8 *tlv)
  60. {
  61. return llcp_tlv16(tlv, LLCP_TLV_WKS);
  62. }
  63. static u16 llcp_tlv_lto(u8 *tlv)
  64. {
  65. return llcp_tlv8(tlv, LLCP_TLV_LTO);
  66. }
  67. static u8 llcp_tlv_opt(u8 *tlv)
  68. {
  69. return llcp_tlv8(tlv, LLCP_TLV_OPT);
  70. }
  71. static u8 llcp_tlv_rw(u8 *tlv)
  72. {
  73. return llcp_tlv8(tlv, LLCP_TLV_RW) & 0xf;
  74. }
  75. u8 *nfc_llcp_build_tlv(u8 type, u8 *value, u8 value_length, u8 *tlv_length)
  76. {
  77. u8 *tlv, length;
  78. pr_debug("type %d\n", type);
  79. if (type >= LLCP_TLV_MAX)
  80. return NULL;
  81. length = llcp_tlv_length[type];
  82. if (length == 0 && value_length == 0)
  83. return NULL;
  84. else if (length == 0)
  85. length = value_length;
  86. *tlv_length = 2 + length;
  87. tlv = kzalloc(2 + length, GFP_KERNEL);
  88. if (tlv == NULL)
  89. return tlv;
  90. tlv[0] = type;
  91. tlv[1] = length;
  92. memcpy(tlv + 2, value, length);
  93. return tlv;
  94. }
  95. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdres_tlv(u8 tid, u8 sap)
  96. {
  97. struct nfc_llcp_sdp_tlv *sdres;
  98. u8 value[2];
  99. sdres = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  100. if (sdres == NULL)
  101. return NULL;
  102. value[0] = tid;
  103. value[1] = sap;
  104. sdres->tlv = nfc_llcp_build_tlv(LLCP_TLV_SDRES, value, 2,
  105. &sdres->tlv_len);
  106. if (sdres->tlv == NULL) {
  107. kfree(sdres);
  108. return NULL;
  109. }
  110. sdres->tid = tid;
  111. sdres->sap = sap;
  112. INIT_HLIST_NODE(&sdres->node);
  113. return sdres;
  114. }
  115. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdreq_tlv(u8 tid, char *uri,
  116. size_t uri_len)
  117. {
  118. struct nfc_llcp_sdp_tlv *sdreq;
  119. pr_debug("uri: %s, len: %zu\n", uri, uri_len);
  120. sdreq = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  121. if (sdreq == NULL)
  122. return NULL;
  123. sdreq->tlv_len = uri_len + 3;
  124. if (uri[uri_len - 1] == 0)
  125. sdreq->tlv_len--;
  126. sdreq->tlv = kzalloc(sdreq->tlv_len + 1, GFP_KERNEL);
  127. if (sdreq->tlv == NULL) {
  128. kfree(sdreq);
  129. return NULL;
  130. }
  131. sdreq->tlv[0] = LLCP_TLV_SDREQ;
  132. sdreq->tlv[1] = sdreq->tlv_len - 2;
  133. sdreq->tlv[2] = tid;
  134. sdreq->tid = tid;
  135. sdreq->uri = sdreq->tlv + 3;
  136. memcpy(sdreq->uri, uri, uri_len);
  137. sdreq->time = jiffies;
  138. INIT_HLIST_NODE(&sdreq->node);
  139. return sdreq;
  140. }
  141. void nfc_llcp_free_sdp_tlv(struct nfc_llcp_sdp_tlv *sdp)
  142. {
  143. kfree(sdp->tlv);
  144. kfree(sdp);
  145. }
  146. void nfc_llcp_free_sdp_tlv_list(struct hlist_head *head)
  147. {
  148. struct nfc_llcp_sdp_tlv *sdp;
  149. struct hlist_node *n;
  150. hlist_for_each_entry_safe(sdp, n, head, node) {
  151. hlist_del(&sdp->node);
  152. nfc_llcp_free_sdp_tlv(sdp);
  153. }
  154. }
  155. int nfc_llcp_parse_gb_tlv(struct nfc_llcp_local *local,
  156. u8 *tlv_array, u16 tlv_array_len)
  157. {
  158. u8 *tlv = tlv_array, type, length, offset = 0;
  159. pr_debug("TLV array length %d\n", tlv_array_len);
  160. if (local == NULL)
  161. return -ENODEV;
  162. while (offset < tlv_array_len) {
  163. type = tlv[0];
  164. length = tlv[1];
  165. pr_debug("type 0x%x length %d\n", type, length);
  166. switch (type) {
  167. case LLCP_TLV_VERSION:
  168. local->remote_version = llcp_tlv_version(tlv);
  169. break;
  170. case LLCP_TLV_MIUX:
  171. local->remote_miu = llcp_tlv_miux(tlv) + 128;
  172. break;
  173. case LLCP_TLV_WKS:
  174. local->remote_wks = llcp_tlv_wks(tlv);
  175. break;
  176. case LLCP_TLV_LTO:
  177. local->remote_lto = llcp_tlv_lto(tlv) * 10;
  178. break;
  179. case LLCP_TLV_OPT:
  180. local->remote_opt = llcp_tlv_opt(tlv);
  181. break;
  182. default:
  183. pr_err("Invalid gt tlv value 0x%x\n", type);
  184. break;
  185. }
  186. offset += length + 2;
  187. tlv += length + 2;
  188. }
  189. pr_debug("version 0x%x miu %d lto %d opt 0x%x wks 0x%x\n",
  190. local->remote_version, local->remote_miu,
  191. local->remote_lto, local->remote_opt,
  192. local->remote_wks);
  193. return 0;
  194. }
  195. int nfc_llcp_parse_connection_tlv(struct nfc_llcp_sock *sock,
  196. u8 *tlv_array, u16 tlv_array_len)
  197. {
  198. u8 *tlv = tlv_array, type, length, offset = 0;
  199. pr_debug("TLV array length %d\n", tlv_array_len);
  200. if (sock == NULL)
  201. return -ENOTCONN;
  202. while (offset < tlv_array_len) {
  203. type = tlv[0];
  204. length = tlv[1];
  205. pr_debug("type 0x%x length %d\n", type, length);
  206. switch (type) {
  207. case LLCP_TLV_MIUX:
  208. sock->remote_miu = llcp_tlv_miux(tlv) + 128;
  209. break;
  210. case LLCP_TLV_RW:
  211. sock->remote_rw = llcp_tlv_rw(tlv);
  212. break;
  213. case LLCP_TLV_SN:
  214. break;
  215. default:
  216. pr_err("Invalid gt tlv value 0x%x\n", type);
  217. break;
  218. }
  219. offset += length + 2;
  220. tlv += length + 2;
  221. }
  222. pr_debug("sock %p rw %d miu %d\n", sock,
  223. sock->remote_rw, sock->remote_miu);
  224. return 0;
  225. }
  226. static struct sk_buff *llcp_add_header(struct sk_buff *pdu,
  227. u8 dsap, u8 ssap, u8 ptype)
  228. {
  229. u8 header[2];
  230. pr_debug("ptype 0x%x dsap 0x%x ssap 0x%x\n", ptype, dsap, ssap);
  231. header[0] = (u8)((dsap << 2) | (ptype >> 2));
  232. header[1] = (u8)((ptype << 6) | ssap);
  233. pr_debug("header 0x%x 0x%x\n", header[0], header[1]);
  234. memcpy(skb_put(pdu, LLCP_HEADER_SIZE), header, LLCP_HEADER_SIZE);
  235. return pdu;
  236. }
  237. static struct sk_buff *llcp_add_tlv(struct sk_buff *pdu, u8 *tlv,
  238. u8 tlv_length)
  239. {
  240. /* XXX Add an skb length check */
  241. if (tlv == NULL)
  242. return NULL;
  243. memcpy(skb_put(pdu, tlv_length), tlv, tlv_length);
  244. return pdu;
  245. }
  246. static struct sk_buff *llcp_allocate_pdu(struct nfc_llcp_sock *sock,
  247. u8 cmd, u16 size)
  248. {
  249. struct sk_buff *skb;
  250. int err;
  251. if (sock->ssap == 0)
  252. return NULL;
  253. skb = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  254. size + LLCP_HEADER_SIZE, &err);
  255. if (skb == NULL) {
  256. pr_err("Could not allocate PDU\n");
  257. return NULL;
  258. }
  259. skb = llcp_add_header(skb, sock->dsap, sock->ssap, cmd);
  260. return skb;
  261. }
  262. int nfc_llcp_disconnect(struct nfc_llcp_sock *sock)
  263. {
  264. struct sk_buff *skb;
  265. struct nfc_dev *dev;
  266. struct nfc_llcp_local *local;
  267. pr_debug("Sending DISC\n");
  268. local = sock->local;
  269. if (local == NULL)
  270. return -ENODEV;
  271. dev = sock->dev;
  272. if (dev == NULL)
  273. return -ENODEV;
  274. skb = llcp_allocate_pdu(sock, LLCP_PDU_DISC, 0);
  275. if (skb == NULL)
  276. return -ENOMEM;
  277. skb_queue_tail(&local->tx_queue, skb);
  278. return 0;
  279. }
  280. int nfc_llcp_send_symm(struct nfc_dev *dev)
  281. {
  282. struct sk_buff *skb;
  283. struct nfc_llcp_local *local;
  284. u16 size = 0;
  285. pr_debug("Sending SYMM\n");
  286. local = nfc_llcp_find_local(dev);
  287. if (local == NULL)
  288. return -ENODEV;
  289. size += LLCP_HEADER_SIZE;
  290. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  291. skb = alloc_skb(size, GFP_KERNEL);
  292. if (skb == NULL)
  293. return -ENOMEM;
  294. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  295. skb = llcp_add_header(skb, 0, 0, LLCP_PDU_SYMM);
  296. __net_timestamp(skb);
  297. nfc_llcp_send_to_raw_sock(local, skb, NFC_LLCP_DIRECTION_TX);
  298. return nfc_data_exchange(dev, local->target_idx, skb,
  299. nfc_llcp_recv, local);
  300. }
  301. int nfc_llcp_send_connect(struct nfc_llcp_sock *sock)
  302. {
  303. struct nfc_llcp_local *local;
  304. struct sk_buff *skb;
  305. u8 *service_name_tlv = NULL, service_name_tlv_length;
  306. u8 *miux_tlv = NULL, miux_tlv_length;
  307. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  308. int err;
  309. u16 size = 0, miux;
  310. pr_debug("Sending CONNECT\n");
  311. local = sock->local;
  312. if (local == NULL)
  313. return -ENODEV;
  314. if (sock->service_name != NULL) {
  315. service_name_tlv = nfc_llcp_build_tlv(LLCP_TLV_SN,
  316. sock->service_name,
  317. sock->service_name_len,
  318. &service_name_tlv_length);
  319. size += service_name_tlv_length;
  320. }
  321. /* If the socket parameters are not set, use the local ones */
  322. miux = sock->miux > LLCP_MAX_MIUX ? local->miux : sock->miux;
  323. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  324. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  325. &miux_tlv_length);
  326. size += miux_tlv_length;
  327. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  328. size += rw_tlv_length;
  329. pr_debug("SKB size %d SN length %zu\n", size, sock->service_name_len);
  330. skb = llcp_allocate_pdu(sock, LLCP_PDU_CONNECT, size);
  331. if (skb == NULL) {
  332. err = -ENOMEM;
  333. goto error_tlv;
  334. }
  335. if (service_name_tlv != NULL)
  336. skb = llcp_add_tlv(skb, service_name_tlv,
  337. service_name_tlv_length);
  338. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  339. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  340. skb_queue_tail(&local->tx_queue, skb);
  341. return 0;
  342. error_tlv:
  343. pr_err("error %d\n", err);
  344. kfree(service_name_tlv);
  345. kfree(miux_tlv);
  346. kfree(rw_tlv);
  347. return err;
  348. }
  349. int nfc_llcp_send_cc(struct nfc_llcp_sock *sock)
  350. {
  351. struct nfc_llcp_local *local;
  352. struct sk_buff *skb;
  353. u8 *miux_tlv = NULL, miux_tlv_length;
  354. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  355. int err;
  356. u16 size = 0, miux;
  357. pr_debug("Sending CC\n");
  358. local = sock->local;
  359. if (local == NULL)
  360. return -ENODEV;
  361. /* If the socket parameters are not set, use the local ones */
  362. miux = sock->miux > LLCP_MAX_MIUX ? local->miux : sock->miux;
  363. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  364. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  365. &miux_tlv_length);
  366. size += miux_tlv_length;
  367. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  368. size += rw_tlv_length;
  369. skb = llcp_allocate_pdu(sock, LLCP_PDU_CC, size);
  370. if (skb == NULL) {
  371. err = -ENOMEM;
  372. goto error_tlv;
  373. }
  374. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  375. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  376. skb_queue_tail(&local->tx_queue, skb);
  377. return 0;
  378. error_tlv:
  379. pr_err("error %d\n", err);
  380. kfree(miux_tlv);
  381. kfree(rw_tlv);
  382. return err;
  383. }
  384. static struct sk_buff *nfc_llcp_allocate_snl(struct nfc_llcp_local *local,
  385. size_t tlv_length)
  386. {
  387. struct sk_buff *skb;
  388. struct nfc_dev *dev;
  389. u16 size = 0;
  390. if (local == NULL)
  391. return ERR_PTR(-ENODEV);
  392. dev = local->dev;
  393. if (dev == NULL)
  394. return ERR_PTR(-ENODEV);
  395. size += LLCP_HEADER_SIZE;
  396. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  397. size += tlv_length;
  398. skb = alloc_skb(size, GFP_KERNEL);
  399. if (skb == NULL)
  400. return ERR_PTR(-ENOMEM);
  401. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  402. skb = llcp_add_header(skb, LLCP_SAP_SDP, LLCP_SAP_SDP, LLCP_PDU_SNL);
  403. return skb;
  404. }
  405. int nfc_llcp_send_snl_sdres(struct nfc_llcp_local *local,
  406. struct hlist_head *tlv_list, size_t tlvs_len)
  407. {
  408. struct nfc_llcp_sdp_tlv *sdp;
  409. struct hlist_node *n;
  410. struct sk_buff *skb;
  411. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  412. if (IS_ERR(skb))
  413. return PTR_ERR(skb);
  414. hlist_for_each_entry_safe(sdp, n, tlv_list, node) {
  415. memcpy(skb_put(skb, sdp->tlv_len), sdp->tlv, sdp->tlv_len);
  416. hlist_del(&sdp->node);
  417. nfc_llcp_free_sdp_tlv(sdp);
  418. }
  419. skb_queue_tail(&local->tx_queue, skb);
  420. return 0;
  421. }
  422. int nfc_llcp_send_snl_sdreq(struct nfc_llcp_local *local,
  423. struct hlist_head *tlv_list, size_t tlvs_len)
  424. {
  425. struct nfc_llcp_sdp_tlv *sdreq;
  426. struct hlist_node *n;
  427. struct sk_buff *skb;
  428. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  429. if (IS_ERR(skb))
  430. return PTR_ERR(skb);
  431. mutex_lock(&local->sdreq_lock);
  432. if (hlist_empty(&local->pending_sdreqs))
  433. mod_timer(&local->sdreq_timer,
  434. jiffies + msecs_to_jiffies(3 * local->remote_lto));
  435. hlist_for_each_entry_safe(sdreq, n, tlv_list, node) {
  436. pr_debug("tid %d for %s\n", sdreq->tid, sdreq->uri);
  437. memcpy(skb_put(skb, sdreq->tlv_len), sdreq->tlv,
  438. sdreq->tlv_len);
  439. hlist_del(&sdreq->node);
  440. hlist_add_head(&sdreq->node, &local->pending_sdreqs);
  441. }
  442. mutex_unlock(&local->sdreq_lock);
  443. skb_queue_tail(&local->tx_queue, skb);
  444. return 0;
  445. }
  446. int nfc_llcp_send_dm(struct nfc_llcp_local *local, u8 ssap, u8 dsap, u8 reason)
  447. {
  448. struct sk_buff *skb;
  449. struct nfc_dev *dev;
  450. u16 size = 1; /* Reason code */
  451. pr_debug("Sending DM reason 0x%x\n", reason);
  452. if (local == NULL)
  453. return -ENODEV;
  454. dev = local->dev;
  455. if (dev == NULL)
  456. return -ENODEV;
  457. size += LLCP_HEADER_SIZE;
  458. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  459. skb = alloc_skb(size, GFP_KERNEL);
  460. if (skb == NULL)
  461. return -ENOMEM;
  462. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  463. skb = llcp_add_header(skb, dsap, ssap, LLCP_PDU_DM);
  464. memcpy(skb_put(skb, 1), &reason, 1);
  465. skb_queue_head(&local->tx_queue, skb);
  466. return 0;
  467. }
  468. int nfc_llcp_send_disconnect(struct nfc_llcp_sock *sock)
  469. {
  470. struct sk_buff *skb;
  471. struct nfc_llcp_local *local;
  472. pr_debug("Send DISC\n");
  473. local = sock->local;
  474. if (local == NULL)
  475. return -ENODEV;
  476. skb = llcp_allocate_pdu(sock, LLCP_PDU_DISC, 0);
  477. if (skb == NULL)
  478. return -ENOMEM;
  479. skb_queue_head(&local->tx_queue, skb);
  480. return 0;
  481. }
  482. int nfc_llcp_send_i_frame(struct nfc_llcp_sock *sock,
  483. struct msghdr *msg, size_t len)
  484. {
  485. struct sk_buff *pdu;
  486. struct sock *sk = &sock->sk;
  487. struct nfc_llcp_local *local;
  488. size_t frag_len = 0, remaining_len;
  489. u8 *msg_data, *msg_ptr;
  490. pr_debug("Send I frame len %zd\n", len);
  491. local = sock->local;
  492. if (local == NULL)
  493. return -ENODEV;
  494. /* Remote is ready but has not acknowledged our frames */
  495. if((sock->remote_ready &&
  496. skb_queue_len(&sock->tx_pending_queue) >= sock->remote_rw &&
  497. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  498. pr_err("Pending queue is full %d frames\n",
  499. skb_queue_len(&sock->tx_pending_queue));
  500. return -ENOBUFS;
  501. }
  502. /* Remote is not ready and we've been queueing enough frames */
  503. if ((!sock->remote_ready &&
  504. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  505. pr_err("Tx queue is full %d frames\n",
  506. skb_queue_len(&sock->tx_queue));
  507. return -ENOBUFS;
  508. }
  509. msg_data = kzalloc(len, GFP_KERNEL);
  510. if (msg_data == NULL)
  511. return -ENOMEM;
  512. if (memcpy_fromiovec(msg_data, msg->msg_iov, len)) {
  513. kfree(msg_data);
  514. return -EFAULT;
  515. }
  516. remaining_len = len;
  517. msg_ptr = msg_data;
  518. while (remaining_len > 0) {
  519. frag_len = min_t(size_t, sock->remote_miu, remaining_len);
  520. pr_debug("Fragment %zd bytes remaining %zd",
  521. frag_len, remaining_len);
  522. pdu = llcp_allocate_pdu(sock, LLCP_PDU_I,
  523. frag_len + LLCP_SEQUENCE_SIZE);
  524. if (pdu == NULL)
  525. return -ENOMEM;
  526. skb_put(pdu, LLCP_SEQUENCE_SIZE);
  527. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  528. skb_queue_tail(&sock->tx_queue, pdu);
  529. lock_sock(sk);
  530. nfc_llcp_queue_i_frames(sock);
  531. release_sock(sk);
  532. remaining_len -= frag_len;
  533. msg_ptr += frag_len;
  534. }
  535. kfree(msg_data);
  536. return len;
  537. }
  538. int nfc_llcp_send_ui_frame(struct nfc_llcp_sock *sock, u8 ssap, u8 dsap,
  539. struct msghdr *msg, size_t len)
  540. {
  541. struct sk_buff *pdu;
  542. struct nfc_llcp_local *local;
  543. size_t frag_len = 0, remaining_len;
  544. u8 *msg_ptr, *msg_data;
  545. int err;
  546. pr_debug("Send UI frame len %zd\n", len);
  547. local = sock->local;
  548. if (local == NULL)
  549. return -ENODEV;
  550. msg_data = kzalloc(len, GFP_KERNEL);
  551. if (msg_data == NULL)
  552. return -ENOMEM;
  553. if (memcpy_fromiovec(msg_data, msg->msg_iov, len)) {
  554. kfree(msg_data);
  555. return -EFAULT;
  556. }
  557. remaining_len = len;
  558. msg_ptr = msg_data;
  559. while (remaining_len > 0) {
  560. frag_len = min_t(size_t, sock->remote_miu, remaining_len);
  561. pr_debug("Fragment %zd bytes remaining %zd",
  562. frag_len, remaining_len);
  563. pdu = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  564. frag_len + LLCP_HEADER_SIZE, &err);
  565. if (pdu == NULL) {
  566. pr_err("Could not allocate PDU\n");
  567. continue;
  568. }
  569. pdu = llcp_add_header(pdu, dsap, ssap, LLCP_PDU_UI);
  570. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  571. /* No need to check for the peer RW for UI frames */
  572. skb_queue_tail(&local->tx_queue, pdu);
  573. remaining_len -= frag_len;
  574. msg_ptr += frag_len;
  575. }
  576. kfree(msg_data);
  577. return len;
  578. }
  579. int nfc_llcp_send_rr(struct nfc_llcp_sock *sock)
  580. {
  581. struct sk_buff *skb;
  582. struct nfc_llcp_local *local;
  583. pr_debug("Send rr nr %d\n", sock->recv_n);
  584. local = sock->local;
  585. if (local == NULL)
  586. return -ENODEV;
  587. skb = llcp_allocate_pdu(sock, LLCP_PDU_RR, LLCP_SEQUENCE_SIZE);
  588. if (skb == NULL)
  589. return -ENOMEM;
  590. skb_put(skb, LLCP_SEQUENCE_SIZE);
  591. skb->data[2] = sock->recv_n;
  592. skb_queue_head(&local->tx_queue, skb);
  593. return 0;
  594. }