llcp_commands.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800
  1. /*
  2. * Copyright (C) 2011 Intel Corporation. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License as published by
  6. * the Free Software Foundation; either version 2 of the License, or
  7. * (at your option) any later version.
  8. *
  9. * This program is distributed in the hope that it will be useful,
  10. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. * GNU General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #define pr_fmt(fmt) "llcp: %s: " fmt, __func__
  18. #include <linux/init.h>
  19. #include <linux/kernel.h>
  20. #include <linux/module.h>
  21. #include <linux/nfc.h>
  22. #include <net/nfc/nfc.h>
  23. #include "nfc.h"
  24. #include "llcp.h"
  25. static u8 llcp_tlv_length[LLCP_TLV_MAX] = {
  26. 0,
  27. 1, /* VERSION */
  28. 2, /* MIUX */
  29. 2, /* WKS */
  30. 1, /* LTO */
  31. 1, /* RW */
  32. 0, /* SN */
  33. 1, /* OPT */
  34. 0, /* SDREQ */
  35. 2, /* SDRES */
  36. };
  37. static u8 llcp_tlv8(u8 *tlv, u8 type)
  38. {
  39. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  40. return 0;
  41. return tlv[2];
  42. }
  43. static u16 llcp_tlv16(u8 *tlv, u8 type)
  44. {
  45. if (tlv[0] != type || tlv[1] != llcp_tlv_length[tlv[0]])
  46. return 0;
  47. return be16_to_cpu(*((__be16 *)(tlv + 2)));
  48. }
  49. static u8 llcp_tlv_version(u8 *tlv)
  50. {
  51. return llcp_tlv8(tlv, LLCP_TLV_VERSION);
  52. }
  53. static u16 llcp_tlv_miux(u8 *tlv)
  54. {
  55. return llcp_tlv16(tlv, LLCP_TLV_MIUX) & 0x7ff;
  56. }
  57. static u16 llcp_tlv_wks(u8 *tlv)
  58. {
  59. return llcp_tlv16(tlv, LLCP_TLV_WKS);
  60. }
  61. static u16 llcp_tlv_lto(u8 *tlv)
  62. {
  63. return llcp_tlv8(tlv, LLCP_TLV_LTO);
  64. }
  65. static u8 llcp_tlv_opt(u8 *tlv)
  66. {
  67. return llcp_tlv8(tlv, LLCP_TLV_OPT);
  68. }
  69. static u8 llcp_tlv_rw(u8 *tlv)
  70. {
  71. return llcp_tlv8(tlv, LLCP_TLV_RW) & 0xf;
  72. }
  73. u8 *nfc_llcp_build_tlv(u8 type, u8 *value, u8 value_length, u8 *tlv_length)
  74. {
  75. u8 *tlv, length;
  76. pr_debug("type %d\n", type);
  77. if (type >= LLCP_TLV_MAX)
  78. return NULL;
  79. length = llcp_tlv_length[type];
  80. if (length == 0 && value_length == 0)
  81. return NULL;
  82. else if (length == 0)
  83. length = value_length;
  84. *tlv_length = 2 + length;
  85. tlv = kzalloc(2 + length, GFP_KERNEL);
  86. if (tlv == NULL)
  87. return tlv;
  88. tlv[0] = type;
  89. tlv[1] = length;
  90. memcpy(tlv + 2, value, length);
  91. return tlv;
  92. }
  93. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdres_tlv(u8 tid, u8 sap)
  94. {
  95. struct nfc_llcp_sdp_tlv *sdres;
  96. u8 value[2];
  97. sdres = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  98. if (sdres == NULL)
  99. return NULL;
  100. value[0] = tid;
  101. value[1] = sap;
  102. sdres->tlv = nfc_llcp_build_tlv(LLCP_TLV_SDRES, value, 2,
  103. &sdres->tlv_len);
  104. if (sdres->tlv == NULL) {
  105. kfree(sdres);
  106. return NULL;
  107. }
  108. sdres->tid = tid;
  109. sdres->sap = sap;
  110. INIT_HLIST_NODE(&sdres->node);
  111. return sdres;
  112. }
  113. struct nfc_llcp_sdp_tlv *nfc_llcp_build_sdreq_tlv(u8 tid, char *uri,
  114. size_t uri_len)
  115. {
  116. struct nfc_llcp_sdp_tlv *sdreq;
  117. pr_debug("uri: %s, len: %zu\n", uri, uri_len);
  118. sdreq = kzalloc(sizeof(struct nfc_llcp_sdp_tlv), GFP_KERNEL);
  119. if (sdreq == NULL)
  120. return NULL;
  121. sdreq->tlv_len = uri_len + 3;
  122. if (uri[uri_len - 1] == 0)
  123. sdreq->tlv_len--;
  124. sdreq->tlv = kzalloc(sdreq->tlv_len + 1, GFP_KERNEL);
  125. if (sdreq->tlv == NULL) {
  126. kfree(sdreq);
  127. return NULL;
  128. }
  129. sdreq->tlv[0] = LLCP_TLV_SDREQ;
  130. sdreq->tlv[1] = sdreq->tlv_len - 2;
  131. sdreq->tlv[2] = tid;
  132. sdreq->tid = tid;
  133. sdreq->uri = sdreq->tlv + 3;
  134. memcpy(sdreq->uri, uri, uri_len);
  135. sdreq->time = jiffies;
  136. INIT_HLIST_NODE(&sdreq->node);
  137. return sdreq;
  138. }
  139. void nfc_llcp_free_sdp_tlv(struct nfc_llcp_sdp_tlv *sdp)
  140. {
  141. kfree(sdp->tlv);
  142. kfree(sdp);
  143. }
  144. void nfc_llcp_free_sdp_tlv_list(struct hlist_head *head)
  145. {
  146. struct nfc_llcp_sdp_tlv *sdp;
  147. struct hlist_node *n;
  148. hlist_for_each_entry_safe(sdp, n, head, node) {
  149. hlist_del(&sdp->node);
  150. nfc_llcp_free_sdp_tlv(sdp);
  151. }
  152. }
  153. int nfc_llcp_parse_gb_tlv(struct nfc_llcp_local *local,
  154. u8 *tlv_array, u16 tlv_array_len)
  155. {
  156. u8 *tlv = tlv_array, type, length, offset = 0;
  157. pr_debug("TLV array length %d\n", tlv_array_len);
  158. if (local == NULL)
  159. return -ENODEV;
  160. while (offset < tlv_array_len) {
  161. type = tlv[0];
  162. length = tlv[1];
  163. pr_debug("type 0x%x length %d\n", type, length);
  164. switch (type) {
  165. case LLCP_TLV_VERSION:
  166. local->remote_version = llcp_tlv_version(tlv);
  167. break;
  168. case LLCP_TLV_MIUX:
  169. local->remote_miu = llcp_tlv_miux(tlv) + 128;
  170. break;
  171. case LLCP_TLV_WKS:
  172. local->remote_wks = llcp_tlv_wks(tlv);
  173. break;
  174. case LLCP_TLV_LTO:
  175. local->remote_lto = llcp_tlv_lto(tlv) * 10;
  176. break;
  177. case LLCP_TLV_OPT:
  178. local->remote_opt = llcp_tlv_opt(tlv);
  179. break;
  180. default:
  181. pr_err("Invalid gt tlv value 0x%x\n", type);
  182. break;
  183. }
  184. offset += length + 2;
  185. tlv += length + 2;
  186. }
  187. pr_debug("version 0x%x miu %d lto %d opt 0x%x wks 0x%x\n",
  188. local->remote_version, local->remote_miu,
  189. local->remote_lto, local->remote_opt,
  190. local->remote_wks);
  191. return 0;
  192. }
  193. int nfc_llcp_parse_connection_tlv(struct nfc_llcp_sock *sock,
  194. u8 *tlv_array, u16 tlv_array_len)
  195. {
  196. u8 *tlv = tlv_array, type, length, offset = 0;
  197. pr_debug("TLV array length %d\n", tlv_array_len);
  198. if (sock == NULL)
  199. return -ENOTCONN;
  200. while (offset < tlv_array_len) {
  201. type = tlv[0];
  202. length = tlv[1];
  203. pr_debug("type 0x%x length %d\n", type, length);
  204. switch (type) {
  205. case LLCP_TLV_MIUX:
  206. sock->remote_miu = llcp_tlv_miux(tlv) + 128;
  207. break;
  208. case LLCP_TLV_RW:
  209. sock->remote_rw = llcp_tlv_rw(tlv);
  210. break;
  211. case LLCP_TLV_SN:
  212. break;
  213. default:
  214. pr_err("Invalid gt tlv value 0x%x\n", type);
  215. break;
  216. }
  217. offset += length + 2;
  218. tlv += length + 2;
  219. }
  220. pr_debug("sock %p rw %d miu %d\n", sock,
  221. sock->remote_rw, sock->remote_miu);
  222. return 0;
  223. }
  224. static struct sk_buff *llcp_add_header(struct sk_buff *pdu,
  225. u8 dsap, u8 ssap, u8 ptype)
  226. {
  227. u8 header[2];
  228. pr_debug("ptype 0x%x dsap 0x%x ssap 0x%x\n", ptype, dsap, ssap);
  229. header[0] = (u8)((dsap << 2) | (ptype >> 2));
  230. header[1] = (u8)((ptype << 6) | ssap);
  231. pr_debug("header 0x%x 0x%x\n", header[0], header[1]);
  232. memcpy(skb_put(pdu, LLCP_HEADER_SIZE), header, LLCP_HEADER_SIZE);
  233. return pdu;
  234. }
  235. static struct sk_buff *llcp_add_tlv(struct sk_buff *pdu, u8 *tlv,
  236. u8 tlv_length)
  237. {
  238. /* XXX Add an skb length check */
  239. if (tlv == NULL)
  240. return NULL;
  241. memcpy(skb_put(pdu, tlv_length), tlv, tlv_length);
  242. return pdu;
  243. }
  244. static struct sk_buff *llcp_allocate_pdu(struct nfc_llcp_sock *sock,
  245. u8 cmd, u16 size)
  246. {
  247. struct sk_buff *skb;
  248. int err;
  249. if (sock->ssap == 0)
  250. return NULL;
  251. skb = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  252. size + LLCP_HEADER_SIZE, &err);
  253. if (skb == NULL) {
  254. pr_err("Could not allocate PDU\n");
  255. return NULL;
  256. }
  257. skb = llcp_add_header(skb, sock->dsap, sock->ssap, cmd);
  258. return skb;
  259. }
  260. int nfc_llcp_send_disconnect(struct nfc_llcp_sock *sock)
  261. {
  262. struct sk_buff *skb;
  263. struct nfc_dev *dev;
  264. struct nfc_llcp_local *local;
  265. pr_debug("Sending DISC\n");
  266. local = sock->local;
  267. if (local == NULL)
  268. return -ENODEV;
  269. dev = sock->dev;
  270. if (dev == NULL)
  271. return -ENODEV;
  272. skb = llcp_allocate_pdu(sock, LLCP_PDU_DISC, 0);
  273. if (skb == NULL)
  274. return -ENOMEM;
  275. skb_queue_tail(&local->tx_queue, skb);
  276. return 0;
  277. }
  278. int nfc_llcp_send_symm(struct nfc_dev *dev)
  279. {
  280. struct sk_buff *skb;
  281. struct nfc_llcp_local *local;
  282. u16 size = 0;
  283. pr_debug("Sending SYMM\n");
  284. local = nfc_llcp_find_local(dev);
  285. if (local == NULL)
  286. return -ENODEV;
  287. size += LLCP_HEADER_SIZE;
  288. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  289. skb = alloc_skb(size, GFP_KERNEL);
  290. if (skb == NULL)
  291. return -ENOMEM;
  292. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  293. skb = llcp_add_header(skb, 0, 0, LLCP_PDU_SYMM);
  294. __net_timestamp(skb);
  295. nfc_llcp_send_to_raw_sock(local, skb, NFC_DIRECTION_TX);
  296. return nfc_data_exchange(dev, local->target_idx, skb,
  297. nfc_llcp_recv, local);
  298. }
  299. int nfc_llcp_send_connect(struct nfc_llcp_sock *sock)
  300. {
  301. struct nfc_llcp_local *local;
  302. struct sk_buff *skb;
  303. u8 *service_name_tlv = NULL, service_name_tlv_length;
  304. u8 *miux_tlv = NULL, miux_tlv_length;
  305. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  306. int err;
  307. u16 size = 0;
  308. __be16 miux;
  309. pr_debug("Sending CONNECT\n");
  310. local = sock->local;
  311. if (local == NULL)
  312. return -ENODEV;
  313. if (sock->service_name != NULL) {
  314. service_name_tlv = nfc_llcp_build_tlv(LLCP_TLV_SN,
  315. sock->service_name,
  316. sock->service_name_len,
  317. &service_name_tlv_length);
  318. size += service_name_tlv_length;
  319. }
  320. /* If the socket parameters are not set, use the local ones */
  321. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  322. local->miux : sock->miux;
  323. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  324. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  325. &miux_tlv_length);
  326. size += miux_tlv_length;
  327. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  328. size += rw_tlv_length;
  329. pr_debug("SKB size %d SN length %zu\n", size, sock->service_name_len);
  330. skb = llcp_allocate_pdu(sock, LLCP_PDU_CONNECT, size);
  331. if (skb == NULL) {
  332. err = -ENOMEM;
  333. goto error_tlv;
  334. }
  335. if (service_name_tlv != NULL)
  336. skb = llcp_add_tlv(skb, service_name_tlv,
  337. service_name_tlv_length);
  338. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  339. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  340. skb_queue_tail(&local->tx_queue, skb);
  341. return 0;
  342. error_tlv:
  343. pr_err("error %d\n", err);
  344. kfree(service_name_tlv);
  345. kfree(miux_tlv);
  346. kfree(rw_tlv);
  347. return err;
  348. }
  349. int nfc_llcp_send_cc(struct nfc_llcp_sock *sock)
  350. {
  351. struct nfc_llcp_local *local;
  352. struct sk_buff *skb;
  353. u8 *miux_tlv = NULL, miux_tlv_length;
  354. u8 *rw_tlv = NULL, rw_tlv_length, rw;
  355. int err;
  356. u16 size = 0;
  357. __be16 miux;
  358. pr_debug("Sending CC\n");
  359. local = sock->local;
  360. if (local == NULL)
  361. return -ENODEV;
  362. /* If the socket parameters are not set, use the local ones */
  363. miux = be16_to_cpu(sock->miux) > LLCP_MAX_MIUX ?
  364. local->miux : sock->miux;
  365. rw = sock->rw > LLCP_MAX_RW ? local->rw : sock->rw;
  366. miux_tlv = nfc_llcp_build_tlv(LLCP_TLV_MIUX, (u8 *)&miux, 0,
  367. &miux_tlv_length);
  368. size += miux_tlv_length;
  369. rw_tlv = nfc_llcp_build_tlv(LLCP_TLV_RW, &rw, 0, &rw_tlv_length);
  370. size += rw_tlv_length;
  371. skb = llcp_allocate_pdu(sock, LLCP_PDU_CC, size);
  372. if (skb == NULL) {
  373. err = -ENOMEM;
  374. goto error_tlv;
  375. }
  376. skb = llcp_add_tlv(skb, miux_tlv, miux_tlv_length);
  377. skb = llcp_add_tlv(skb, rw_tlv, rw_tlv_length);
  378. skb_queue_tail(&local->tx_queue, skb);
  379. return 0;
  380. error_tlv:
  381. pr_err("error %d\n", err);
  382. kfree(miux_tlv);
  383. kfree(rw_tlv);
  384. return err;
  385. }
  386. static struct sk_buff *nfc_llcp_allocate_snl(struct nfc_llcp_local *local,
  387. size_t tlv_length)
  388. {
  389. struct sk_buff *skb;
  390. struct nfc_dev *dev;
  391. u16 size = 0;
  392. if (local == NULL)
  393. return ERR_PTR(-ENODEV);
  394. dev = local->dev;
  395. if (dev == NULL)
  396. return ERR_PTR(-ENODEV);
  397. size += LLCP_HEADER_SIZE;
  398. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  399. size += tlv_length;
  400. skb = alloc_skb(size, GFP_KERNEL);
  401. if (skb == NULL)
  402. return ERR_PTR(-ENOMEM);
  403. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  404. skb = llcp_add_header(skb, LLCP_SAP_SDP, LLCP_SAP_SDP, LLCP_PDU_SNL);
  405. return skb;
  406. }
  407. int nfc_llcp_send_snl_sdres(struct nfc_llcp_local *local,
  408. struct hlist_head *tlv_list, size_t tlvs_len)
  409. {
  410. struct nfc_llcp_sdp_tlv *sdp;
  411. struct hlist_node *n;
  412. struct sk_buff *skb;
  413. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  414. if (IS_ERR(skb))
  415. return PTR_ERR(skb);
  416. hlist_for_each_entry_safe(sdp, n, tlv_list, node) {
  417. memcpy(skb_put(skb, sdp->tlv_len), sdp->tlv, sdp->tlv_len);
  418. hlist_del(&sdp->node);
  419. nfc_llcp_free_sdp_tlv(sdp);
  420. }
  421. skb_queue_tail(&local->tx_queue, skb);
  422. return 0;
  423. }
  424. int nfc_llcp_send_snl_sdreq(struct nfc_llcp_local *local,
  425. struct hlist_head *tlv_list, size_t tlvs_len)
  426. {
  427. struct nfc_llcp_sdp_tlv *sdreq;
  428. struct hlist_node *n;
  429. struct sk_buff *skb;
  430. skb = nfc_llcp_allocate_snl(local, tlvs_len);
  431. if (IS_ERR(skb))
  432. return PTR_ERR(skb);
  433. mutex_lock(&local->sdreq_lock);
  434. if (hlist_empty(&local->pending_sdreqs))
  435. mod_timer(&local->sdreq_timer,
  436. jiffies + msecs_to_jiffies(3 * local->remote_lto));
  437. hlist_for_each_entry_safe(sdreq, n, tlv_list, node) {
  438. pr_debug("tid %d for %s\n", sdreq->tid, sdreq->uri);
  439. memcpy(skb_put(skb, sdreq->tlv_len), sdreq->tlv,
  440. sdreq->tlv_len);
  441. hlist_del(&sdreq->node);
  442. hlist_add_head(&sdreq->node, &local->pending_sdreqs);
  443. }
  444. mutex_unlock(&local->sdreq_lock);
  445. skb_queue_tail(&local->tx_queue, skb);
  446. return 0;
  447. }
  448. int nfc_llcp_send_dm(struct nfc_llcp_local *local, u8 ssap, u8 dsap, u8 reason)
  449. {
  450. struct sk_buff *skb;
  451. struct nfc_dev *dev;
  452. u16 size = 1; /* Reason code */
  453. pr_debug("Sending DM reason 0x%x\n", reason);
  454. if (local == NULL)
  455. return -ENODEV;
  456. dev = local->dev;
  457. if (dev == NULL)
  458. return -ENODEV;
  459. size += LLCP_HEADER_SIZE;
  460. size += dev->tx_headroom + dev->tx_tailroom + NFC_HEADER_SIZE;
  461. skb = alloc_skb(size, GFP_KERNEL);
  462. if (skb == NULL)
  463. return -ENOMEM;
  464. skb_reserve(skb, dev->tx_headroom + NFC_HEADER_SIZE);
  465. skb = llcp_add_header(skb, dsap, ssap, LLCP_PDU_DM);
  466. memcpy(skb_put(skb, 1), &reason, 1);
  467. skb_queue_head(&local->tx_queue, skb);
  468. return 0;
  469. }
  470. int nfc_llcp_send_i_frame(struct nfc_llcp_sock *sock,
  471. struct msghdr *msg, size_t len)
  472. {
  473. struct sk_buff *pdu;
  474. struct sock *sk = &sock->sk;
  475. struct nfc_llcp_local *local;
  476. size_t frag_len = 0, remaining_len;
  477. u8 *msg_data, *msg_ptr;
  478. u16 remote_miu;
  479. pr_debug("Send I frame len %zd\n", len);
  480. local = sock->local;
  481. if (local == NULL)
  482. return -ENODEV;
  483. /* Remote is ready but has not acknowledged our frames */
  484. if((sock->remote_ready &&
  485. skb_queue_len(&sock->tx_pending_queue) >= sock->remote_rw &&
  486. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  487. pr_err("Pending queue is full %d frames\n",
  488. skb_queue_len(&sock->tx_pending_queue));
  489. return -ENOBUFS;
  490. }
  491. /* Remote is not ready and we've been queueing enough frames */
  492. if ((!sock->remote_ready &&
  493. skb_queue_len(&sock->tx_queue) >= 2 * sock->remote_rw)) {
  494. pr_err("Tx queue is full %d frames\n",
  495. skb_queue_len(&sock->tx_queue));
  496. return -ENOBUFS;
  497. }
  498. msg_data = kzalloc(len, GFP_KERNEL);
  499. if (msg_data == NULL)
  500. return -ENOMEM;
  501. if (memcpy_from_msg(msg_data, msg, len)) {
  502. kfree(msg_data);
  503. return -EFAULT;
  504. }
  505. remaining_len = len;
  506. msg_ptr = msg_data;
  507. do {
  508. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  509. LLCP_DEFAULT_MIU : sock->remote_miu;
  510. frag_len = min_t(size_t, remote_miu, remaining_len);
  511. pr_debug("Fragment %zd bytes remaining %zd",
  512. frag_len, remaining_len);
  513. pdu = llcp_allocate_pdu(sock, LLCP_PDU_I,
  514. frag_len + LLCP_SEQUENCE_SIZE);
  515. if (pdu == NULL) {
  516. kfree(msg_data);
  517. return -ENOMEM;
  518. }
  519. skb_put(pdu, LLCP_SEQUENCE_SIZE);
  520. if (likely(frag_len > 0))
  521. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  522. skb_queue_tail(&sock->tx_queue, pdu);
  523. lock_sock(sk);
  524. nfc_llcp_queue_i_frames(sock);
  525. release_sock(sk);
  526. remaining_len -= frag_len;
  527. msg_ptr += frag_len;
  528. } while (remaining_len > 0);
  529. kfree(msg_data);
  530. return len;
  531. }
  532. int nfc_llcp_send_ui_frame(struct nfc_llcp_sock *sock, u8 ssap, u8 dsap,
  533. struct msghdr *msg, size_t len)
  534. {
  535. struct sk_buff *pdu;
  536. struct nfc_llcp_local *local;
  537. size_t frag_len = 0, remaining_len;
  538. u8 *msg_ptr, *msg_data;
  539. u16 remote_miu;
  540. int err;
  541. pr_debug("Send UI frame len %zd\n", len);
  542. local = sock->local;
  543. if (local == NULL)
  544. return -ENODEV;
  545. msg_data = kzalloc(len, GFP_KERNEL);
  546. if (msg_data == NULL)
  547. return -ENOMEM;
  548. if (memcpy_from_msg(msg_data, msg, len)) {
  549. kfree(msg_data);
  550. return -EFAULT;
  551. }
  552. remaining_len = len;
  553. msg_ptr = msg_data;
  554. do {
  555. remote_miu = sock->remote_miu > LLCP_MAX_MIU ?
  556. local->remote_miu : sock->remote_miu;
  557. frag_len = min_t(size_t, remote_miu, remaining_len);
  558. pr_debug("Fragment %zd bytes remaining %zd",
  559. frag_len, remaining_len);
  560. pdu = nfc_alloc_send_skb(sock->dev, &sock->sk, MSG_DONTWAIT,
  561. frag_len + LLCP_HEADER_SIZE, &err);
  562. if (pdu == NULL) {
  563. pr_err("Could not allocate PDU\n");
  564. continue;
  565. }
  566. pdu = llcp_add_header(pdu, dsap, ssap, LLCP_PDU_UI);
  567. if (likely(frag_len > 0))
  568. memcpy(skb_put(pdu, frag_len), msg_ptr, frag_len);
  569. /* No need to check for the peer RW for UI frames */
  570. skb_queue_tail(&local->tx_queue, pdu);
  571. remaining_len -= frag_len;
  572. msg_ptr += frag_len;
  573. } while (remaining_len > 0);
  574. kfree(msg_data);
  575. return len;
  576. }
  577. int nfc_llcp_send_rr(struct nfc_llcp_sock *sock)
  578. {
  579. struct sk_buff *skb;
  580. struct nfc_llcp_local *local;
  581. pr_debug("Send rr nr %d\n", sock->recv_n);
  582. local = sock->local;
  583. if (local == NULL)
  584. return -ENODEV;
  585. skb = llcp_allocate_pdu(sock, LLCP_PDU_RR, LLCP_SEQUENCE_SIZE);
  586. if (skb == NULL)
  587. return -ENOMEM;
  588. skb_put(skb, LLCP_SEQUENCE_SIZE);
  589. skb->data[2] = sock->recv_n;
  590. skb_queue_head(&local->tx_queue, skb);
  591. return 0;
  592. }