]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/bluetooth/l2cap.c
Bluetooth: Add Recv RR (P=0)(F=0) for SREJ_SENT state on ERTM
[mirror_ubuntu-zesty-kernel.git] / net / bluetooth / l2cap.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth L2CAP core and sockets. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
4fc268d2 30#include <linux/capability.h>
1da177e4
LT
31#include <linux/errno.h>
32#include <linux/kernel.h>
1da177e4
LT
33#include <linux/sched.h>
34#include <linux/slab.h>
35#include <linux/poll.h>
36#include <linux/fcntl.h>
37#include <linux/init.h>
38#include <linux/interrupt.h>
39#include <linux/socket.h>
40#include <linux/skbuff.h>
1da177e4 41#include <linux/list.h>
be9d1227 42#include <linux/device.h>
aef7d97c
MH
43#include <linux/debugfs.h>
44#include <linux/seq_file.h>
af05b30b 45#include <linux/uaccess.h>
fcc203c3 46#include <linux/crc16.h>
1da177e4
LT
47#include <net/sock.h>
48
49#include <asm/system.h>
1da177e4
LT
50#include <asm/unaligned.h>
51
52#include <net/bluetooth/bluetooth.h>
53#include <net/bluetooth/hci_core.h>
54#include <net/bluetooth/l2cap.h>
55
44dd46de
MH
56#define VERSION "2.14"
57
58static int enable_ertm = 0;
5fbcd3d1 59static int max_transmit = L2CAP_DEFAULT_MAX_TX;
f0709e03 60
47ec1dcd 61static u32 l2cap_feat_mask = L2CAP_FEAT_FIXED_CHAN;
e1027a7c 62static u8 l2cap_fixed_chan[8] = { 0x02, };
1da177e4 63
90ddc4f0 64static const struct proto_ops l2cap_sock_ops;
1da177e4
LT
65
66static struct bt_sock_list l2cap_sk_list = {
d5fb2962 67 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
1da177e4
LT
68};
69
1da177e4
LT
70static void __l2cap_sock_close(struct sock *sk, int reason);
71static void l2cap_sock_close(struct sock *sk);
72static void l2cap_sock_kill(struct sock *sk);
73
74static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
75 u8 code, u8 ident, u16 dlen, void *data);
76
77/* ---- L2CAP timers ---- */
78static void l2cap_sock_timeout(unsigned long arg)
79{
80 struct sock *sk = (struct sock *) arg;
b1235d79 81 int reason;
1da177e4
LT
82
83 BT_DBG("sock %p state %d", sk, sk->sk_state);
84
85 bh_lock_sock(sk);
b1235d79 86
f62e4323
MH
87 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONFIG)
88 reason = ECONNREFUSED;
89 else if (sk->sk_state == BT_CONNECT &&
2af6b9d5 90 l2cap_pi(sk)->sec_level != BT_SECURITY_SDP)
b1235d79
MH
91 reason = ECONNREFUSED;
92 else
93 reason = ETIMEDOUT;
94
95 __l2cap_sock_close(sk, reason);
96
1da177e4
LT
97 bh_unlock_sock(sk);
98
99 l2cap_sock_kill(sk);
100 sock_put(sk);
101}
102
103static void l2cap_sock_set_timer(struct sock *sk, long timeout)
104{
105 BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
106 sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
107}
108
109static void l2cap_sock_clear_timer(struct sock *sk)
110{
111 BT_DBG("sock %p state %d", sk, sk->sk_state);
112 sk_stop_timer(sk, &sk->sk_timer);
113}
114
0139418c
MH
115/* ---- L2CAP channels ---- */
116static struct sock *__l2cap_get_chan_by_dcid(struct l2cap_chan_list *l, u16 cid)
117{
118 struct sock *s;
119 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
120 if (l2cap_pi(s)->dcid == cid)
121 break;
122 }
123 return s;
124}
125
126static struct sock *__l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
127{
128 struct sock *s;
129 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
130 if (l2cap_pi(s)->scid == cid)
131 break;
132 }
133 return s;
134}
135
136/* Find channel with given SCID.
137 * Returns locked socket */
138static inline struct sock *l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
139{
140 struct sock *s;
141 read_lock(&l->lock);
142 s = __l2cap_get_chan_by_scid(l, cid);
af05b30b
GP
143 if (s)
144 bh_lock_sock(s);
0139418c
MH
145 read_unlock(&l->lock);
146 return s;
147}
148
149static struct sock *__l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
150{
151 struct sock *s;
152 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
153 if (l2cap_pi(s)->ident == ident)
154 break;
155 }
156 return s;
157}
158
159static inline struct sock *l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
160{
161 struct sock *s;
162 read_lock(&l->lock);
163 s = __l2cap_get_chan_by_ident(l, ident);
af05b30b
GP
164 if (s)
165 bh_lock_sock(s);
0139418c
MH
166 read_unlock(&l->lock);
167 return s;
168}
169
170static u16 l2cap_alloc_cid(struct l2cap_chan_list *l)
171{
8db4dc46 172 u16 cid = L2CAP_CID_DYN_START;
0139418c 173
8db4dc46 174 for (; cid < L2CAP_CID_DYN_END; cid++) {
af05b30b 175 if (!__l2cap_get_chan_by_scid(l, cid))
0139418c
MH
176 return cid;
177 }
178
179 return 0;
180}
181
182static inline void __l2cap_chan_link(struct l2cap_chan_list *l, struct sock *sk)
183{
184 sock_hold(sk);
185
186 if (l->head)
187 l2cap_pi(l->head)->prev_c = sk;
188
189 l2cap_pi(sk)->next_c = l->head;
190 l2cap_pi(sk)->prev_c = NULL;
191 l->head = sk;
192}
193
194static inline void l2cap_chan_unlink(struct l2cap_chan_list *l, struct sock *sk)
195{
196 struct sock *next = l2cap_pi(sk)->next_c, *prev = l2cap_pi(sk)->prev_c;
197
fd1278d7 198 write_lock_bh(&l->lock);
0139418c
MH
199 if (sk == l->head)
200 l->head = next;
201
202 if (next)
203 l2cap_pi(next)->prev_c = prev;
204 if (prev)
205 l2cap_pi(prev)->next_c = next;
fd1278d7 206 write_unlock_bh(&l->lock);
0139418c
MH
207
208 __sock_put(sk);
209}
210
211static void __l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
212{
213 struct l2cap_chan_list *l = &conn->chan_list;
214
af05b30b
GP
215 BT_DBG("conn %p, psm 0x%2.2x, dcid 0x%4.4x", conn,
216 l2cap_pi(sk)->psm, l2cap_pi(sk)->dcid);
0139418c 217
2950f21a
MH
218 conn->disc_reason = 0x13;
219
0139418c
MH
220 l2cap_pi(sk)->conn = conn;
221
222 if (sk->sk_type == SOCK_SEQPACKET) {
223 /* Alloc CID for connection-oriented socket */
224 l2cap_pi(sk)->scid = l2cap_alloc_cid(l);
225 } else if (sk->sk_type == SOCK_DGRAM) {
226 /* Connectionless socket */
8db4dc46
GP
227 l2cap_pi(sk)->scid = L2CAP_CID_CONN_LESS;
228 l2cap_pi(sk)->dcid = L2CAP_CID_CONN_LESS;
0139418c
MH
229 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
230 } else {
231 /* Raw socket can send/recv signalling messages only */
8db4dc46
GP
232 l2cap_pi(sk)->scid = L2CAP_CID_SIGNALING;
233 l2cap_pi(sk)->dcid = L2CAP_CID_SIGNALING;
0139418c
MH
234 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
235 }
236
237 __l2cap_chan_link(l, sk);
238
239 if (parent)
240 bt_accept_enqueue(parent, sk);
241}
242
8e87d142 243/* Delete channel.
0139418c
MH
244 * Must be called on the locked socket. */
245static void l2cap_chan_del(struct sock *sk, int err)
246{
247 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
248 struct sock *parent = bt_sk(sk)->parent;
249
250 l2cap_sock_clear_timer(sk);
251
252 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
253
8e87d142 254 if (conn) {
0139418c
MH
255 /* Unlink from channel list */
256 l2cap_chan_unlink(&conn->chan_list, sk);
257 l2cap_pi(sk)->conn = NULL;
258 hci_conn_put(conn->hcon);
259 }
260
b1235d79 261 sk->sk_state = BT_CLOSED;
0139418c
MH
262 sock_set_flag(sk, SOCK_ZAPPED);
263
264 if (err)
265 sk->sk_err = err;
266
267 if (parent) {
268 bt_accept_unlink(sk);
269 parent->sk_data_ready(parent, 0);
270 } else
271 sk->sk_state_change(sk);
272}
273
79d554a6 274/* Service level security */
2af6b9d5 275static inline int l2cap_check_security(struct sock *sk)
79d554a6
MH
276{
277 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
0684e5f9
MH
278 __u8 auth_type;
279
00ae4af9
MH
280 if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
281 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
282 auth_type = HCI_AT_NO_BONDING_MITM;
283 else
af05b30b 284 auth_type = HCI_AT_NO_BONDING;
00ae4af9
MH
285
286 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
287 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
288 } else {
289 switch (l2cap_pi(sk)->sec_level) {
290 case BT_SECURITY_HIGH:
291 auth_type = HCI_AT_GENERAL_BONDING_MITM;
292 break;
293 case BT_SECURITY_MEDIUM:
294 auth_type = HCI_AT_GENERAL_BONDING;
295 break;
296 default:
297 auth_type = HCI_AT_NO_BONDING;
298 break;
299 }
0684e5f9 300 }
79d554a6 301
0684e5f9
MH
302 return hci_conn_security(conn->hcon, l2cap_pi(sk)->sec_level,
303 auth_type);
79d554a6
MH
304}
305
4e8402a3
MH
306static inline u8 l2cap_get_ident(struct l2cap_conn *conn)
307{
308 u8 id;
309
310 /* Get next available identificator.
311 * 1 - 128 are used by kernel.
312 * 129 - 199 are reserved.
313 * 200 - 254 are used by utilities like l2ping, etc.
314 */
315
316 spin_lock_bh(&conn->lock);
317
318 if (++conn->tx_ident > 128)
319 conn->tx_ident = 1;
320
321 id = conn->tx_ident;
322
323 spin_unlock_bh(&conn->lock);
324
325 return id;
326}
327
328static inline int l2cap_send_cmd(struct l2cap_conn *conn, u8 ident, u8 code, u16 len, void *data)
329{
330 struct sk_buff *skb = l2cap_build_cmd(conn, code, ident, len, data);
331
332 BT_DBG("code 0x%2.2x", code);
333
334 if (!skb)
335 return -ENOMEM;
336
337 return hci_send_acl(conn->hcon, skb, 0);
338}
339
1c2acffb
GP
340static inline int l2cap_send_sframe(struct l2cap_pinfo *pi, u16 control)
341{
342 struct sk_buff *skb;
343 struct l2cap_hdr *lh;
344 struct l2cap_conn *conn = pi->conn;
fcc203c3
GP
345 int count, hlen = L2CAP_HDR_SIZE + 2;
346
347 if (pi->fcs == L2CAP_FCS_CRC16)
348 hlen += 2;
1c2acffb
GP
349
350 BT_DBG("pi %p, control 0x%2.2x", pi, control);
351
fcc203c3 352 count = min_t(unsigned int, conn->mtu, hlen);
1c2acffb
GP
353 control |= L2CAP_CTRL_FRAME_TYPE;
354
9e917af1
GP
355 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
356 control |= L2CAP_CTRL_FINAL;
357 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
358 }
359
f0946ccf
GP
360 if (pi->conn_state & L2CAP_CONN_SEND_PBIT) {
361 control |= L2CAP_CTRL_POLL;
362 pi->conn_state &= ~L2CAP_CONN_SEND_PBIT;
363 }
364
1c2acffb
GP
365 skb = bt_skb_alloc(count, GFP_ATOMIC);
366 if (!skb)
367 return -ENOMEM;
368
369 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
fcc203c3 370 lh->len = cpu_to_le16(hlen - L2CAP_HDR_SIZE);
1c2acffb
GP
371 lh->cid = cpu_to_le16(pi->dcid);
372 put_unaligned_le16(control, skb_put(skb, 2));
373
fcc203c3
GP
374 if (pi->fcs == L2CAP_FCS_CRC16) {
375 u16 fcs = crc16(0, (u8 *)lh, count - 2);
376 put_unaligned_le16(fcs, skb_put(skb, 2));
377 }
378
1c2acffb
GP
379 return hci_send_acl(pi->conn->hcon, skb, 0);
380}
381
7e743090
GP
382static inline int l2cap_send_rr_or_rnr(struct l2cap_pinfo *pi, u16 control)
383{
384 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY)
385 control |= L2CAP_SUPER_RCV_NOT_READY;
386 else
387 control |= L2CAP_SUPER_RCV_READY;
388
2ab25cdd
GP
389 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
390
7e743090
GP
391 return l2cap_send_sframe(pi, control);
392}
393
79d554a6
MH
394static void l2cap_do_start(struct sock *sk)
395{
396 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
397
398 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) {
984947dc
MH
399 if (!(conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE))
400 return;
401
2af6b9d5 402 if (l2cap_check_security(sk)) {
b1235d79
MH
403 struct l2cap_conn_req req;
404 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
405 req.psm = l2cap_pi(sk)->psm;
79d554a6 406
b1235d79 407 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 408
b1235d79 409 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
79d554a6 410 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 411 }
79d554a6
MH
412 } else {
413 struct l2cap_info_req req;
414 req.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
415
416 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
417 conn->info_ident = l2cap_get_ident(conn);
418
419 mod_timer(&conn->info_timer, jiffies +
420 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
421
422 l2cap_send_cmd(conn, conn->info_ident,
423 L2CAP_INFO_REQ, sizeof(req), &req);
424 }
425}
426
22121fc9
GP
427static void l2cap_send_disconn_req(struct l2cap_conn *conn, struct sock *sk)
428{
429 struct l2cap_disconn_req req;
430
431 req.dcid = cpu_to_le16(l2cap_pi(sk)->dcid);
432 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
433 l2cap_send_cmd(conn, l2cap_get_ident(conn),
434 L2CAP_DISCONN_REQ, sizeof(req), &req);
435}
436
1da177e4 437/* ---- L2CAP connections ---- */
4e8402a3
MH
438static void l2cap_conn_start(struct l2cap_conn *conn)
439{
440 struct l2cap_chan_list *l = &conn->chan_list;
441 struct sock *sk;
442
443 BT_DBG("conn %p", conn);
444
445 read_lock(&l->lock);
446
447 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
448 bh_lock_sock(sk);
449
450 if (sk->sk_type != SOCK_SEQPACKET) {
79d554a6
MH
451 bh_unlock_sock(sk);
452 continue;
453 }
454
455 if (sk->sk_state == BT_CONNECT) {
2af6b9d5 456 if (l2cap_check_security(sk)) {
b1235d79
MH
457 struct l2cap_conn_req req;
458 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
459 req.psm = l2cap_pi(sk)->psm;
79d554a6 460
b1235d79 461 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 462
b1235d79 463 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4e8402a3 464 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 465 }
79d554a6
MH
466 } else if (sk->sk_state == BT_CONNECT2) {
467 struct l2cap_conn_rsp rsp;
468 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
469 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
470
2af6b9d5 471 if (l2cap_check_security(sk)) {
f66dc81f
MH
472 if (bt_sk(sk)->defer_setup) {
473 struct sock *parent = bt_sk(sk)->parent;
474 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
475 rsp.status = cpu_to_le16(L2CAP_CS_AUTHOR_PEND);
476 parent->sk_data_ready(parent, 0);
477
478 } else {
479 sk->sk_state = BT_CONFIG;
480 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
481 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
482 }
79d554a6
MH
483 } else {
484 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
485 rsp.status = cpu_to_le16(L2CAP_CS_AUTHEN_PEND);
486 }
487
488 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
489 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4e8402a3
MH
490 }
491
492 bh_unlock_sock(sk);
493 }
494
495 read_unlock(&l->lock);
496}
497
498static void l2cap_conn_ready(struct l2cap_conn *conn)
499{
79d554a6
MH
500 struct l2cap_chan_list *l = &conn->chan_list;
501 struct sock *sk;
4e8402a3 502
79d554a6 503 BT_DBG("conn %p", conn);
4e8402a3 504
79d554a6 505 read_lock(&l->lock);
4e8402a3 506
79d554a6
MH
507 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
508 bh_lock_sock(sk);
4e8402a3 509
79d554a6
MH
510 if (sk->sk_type != SOCK_SEQPACKET) {
511 l2cap_sock_clear_timer(sk);
512 sk->sk_state = BT_CONNECTED;
513 sk->sk_state_change(sk);
514 } else if (sk->sk_state == BT_CONNECT)
515 l2cap_do_start(sk);
4e8402a3 516
79d554a6 517 bh_unlock_sock(sk);
4e8402a3 518 }
79d554a6
MH
519
520 read_unlock(&l->lock);
4e8402a3
MH
521}
522
523/* Notify sockets that we cannot guaranty reliability anymore */
524static void l2cap_conn_unreliable(struct l2cap_conn *conn, int err)
525{
526 struct l2cap_chan_list *l = &conn->chan_list;
527 struct sock *sk;
528
529 BT_DBG("conn %p", conn);
530
531 read_lock(&l->lock);
532
533 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2af6b9d5 534 if (l2cap_pi(sk)->force_reliable)
4e8402a3
MH
535 sk->sk_err = err;
536 }
537
538 read_unlock(&l->lock);
539}
540
541static void l2cap_info_timeout(unsigned long arg)
542{
543 struct l2cap_conn *conn = (void *) arg;
544
984947dc 545 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 546 conn->info_ident = 0;
984947dc 547
4e8402a3
MH
548 l2cap_conn_start(conn);
549}
550
1da177e4
LT
551static struct l2cap_conn *l2cap_conn_add(struct hci_conn *hcon, u8 status)
552{
0139418c 553 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 554
0139418c 555 if (conn || status)
1da177e4
LT
556 return conn;
557
0139418c
MH
558 conn = kzalloc(sizeof(struct l2cap_conn), GFP_ATOMIC);
559 if (!conn)
1da177e4 560 return NULL;
1da177e4
LT
561
562 hcon->l2cap_data = conn;
563 conn->hcon = hcon;
564
0139418c
MH
565 BT_DBG("hcon %p conn %p", hcon, conn);
566
1da177e4
LT
567 conn->mtu = hcon->hdev->acl_mtu;
568 conn->src = &hcon->hdev->bdaddr;
569 conn->dst = &hcon->dst;
570
4e8402a3
MH
571 conn->feat_mask = 0;
572
1da177e4
LT
573 spin_lock_init(&conn->lock);
574 rwlock_init(&conn->chan_list.lock);
575
45054dc1
DY
576 setup_timer(&conn->info_timer, l2cap_info_timeout,
577 (unsigned long) conn);
578
2950f21a
MH
579 conn->disc_reason = 0x13;
580
1da177e4
LT
581 return conn;
582}
583
0139418c 584static void l2cap_conn_del(struct hci_conn *hcon, int err)
1da177e4 585{
0139418c 586 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4
LT
587 struct sock *sk;
588
0139418c
MH
589 if (!conn)
590 return;
1da177e4
LT
591
592 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
593
7585b97a 594 kfree_skb(conn->rx_skb);
1da177e4
LT
595
596 /* Kill channels */
597 while ((sk = conn->chan_list.head)) {
598 bh_lock_sock(sk);
599 l2cap_chan_del(sk, err);
600 bh_unlock_sock(sk);
601 l2cap_sock_kill(sk);
602 }
603
8e8440f5
DY
604 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
605 del_timer_sync(&conn->info_timer);
3ab22731 606
1da177e4
LT
607 hcon->l2cap_data = NULL;
608 kfree(conn);
1da177e4
LT
609}
610
611static inline void l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
612{
613 struct l2cap_chan_list *l = &conn->chan_list;
fd1278d7 614 write_lock_bh(&l->lock);
1da177e4 615 __l2cap_chan_add(conn, sk, parent);
fd1278d7 616 write_unlock_bh(&l->lock);
1da177e4
LT
617}
618
1da177e4 619/* ---- Socket interface ---- */
8e036fc3 620static struct sock *__l2cap_get_sock_by_addr(__le16 psm, bdaddr_t *src)
1da177e4
LT
621{
622 struct sock *sk;
623 struct hlist_node *node;
624 sk_for_each(sk, node, &l2cap_sk_list.head)
625 if (l2cap_pi(sk)->sport == psm && !bacmp(&bt_sk(sk)->src, src))
626 goto found;
627 sk = NULL;
628found:
629 return sk;
630}
631
632/* Find socket with psm and source bdaddr.
633 * Returns closest match.
634 */
8e036fc3 635static struct sock *__l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
636{
637 struct sock *sk = NULL, *sk1 = NULL;
638 struct hlist_node *node;
639
640 sk_for_each(sk, node, &l2cap_sk_list.head) {
641 if (state && sk->sk_state != state)
642 continue;
643
644 if (l2cap_pi(sk)->psm == psm) {
645 /* Exact match. */
646 if (!bacmp(&bt_sk(sk)->src, src))
647 break;
648
649 /* Closest match */
650 if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY))
651 sk1 = sk;
652 }
653 }
654 return node ? sk : sk1;
655}
656
657/* Find socket with given address (psm, src).
658 * Returns locked socket */
8e036fc3 659static inline struct sock *l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
660{
661 struct sock *s;
662 read_lock(&l2cap_sk_list.lock);
663 s = __l2cap_get_sock_by_psm(state, psm, src);
af05b30b
GP
664 if (s)
665 bh_lock_sock(s);
1da177e4
LT
666 read_unlock(&l2cap_sk_list.lock);
667 return s;
668}
669
670static void l2cap_sock_destruct(struct sock *sk)
671{
672 BT_DBG("sk %p", sk);
673
674 skb_queue_purge(&sk->sk_receive_queue);
675 skb_queue_purge(&sk->sk_write_queue);
676}
677
678static void l2cap_sock_cleanup_listen(struct sock *parent)
679{
680 struct sock *sk;
681
682 BT_DBG("parent %p", parent);
683
684 /* Close not yet accepted channels */
685 while ((sk = bt_accept_dequeue(parent, NULL)))
686 l2cap_sock_close(sk);
687
b1235d79 688 parent->sk_state = BT_CLOSED;
1da177e4
LT
689 sock_set_flag(parent, SOCK_ZAPPED);
690}
691
692/* Kill socket (only if zapped and orphan)
693 * Must be called on unlocked socket.
694 */
695static void l2cap_sock_kill(struct sock *sk)
696{
697 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
698 return;
699
700 BT_DBG("sk %p state %d", sk, sk->sk_state);
701
702 /* Kill poor orphan */
703 bt_sock_unlink(&l2cap_sk_list, sk);
704 sock_set_flag(sk, SOCK_DEAD);
705 sock_put(sk);
706}
707
708static void __l2cap_sock_close(struct sock *sk, int reason)
709{
710 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
711
712 switch (sk->sk_state) {
713 case BT_LISTEN:
714 l2cap_sock_cleanup_listen(sk);
715 break;
716
717 case BT_CONNECTED:
718 case BT_CONFIG:
1da177e4
LT
719 if (sk->sk_type == SOCK_SEQPACKET) {
720 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1da177e4
LT
721
722 sk->sk_state = BT_DISCONN;
723 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
22121fc9 724 l2cap_send_disconn_req(conn, sk);
b1235d79 725 } else
1da177e4 726 l2cap_chan_del(sk, reason);
1da177e4
LT
727 break;
728
f66dc81f
MH
729 case BT_CONNECT2:
730 if (sk->sk_type == SOCK_SEQPACKET) {
731 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
732 struct l2cap_conn_rsp rsp;
733 __u16 result;
734
735 if (bt_sk(sk)->defer_setup)
736 result = L2CAP_CR_SEC_BLOCK;
737 else
738 result = L2CAP_CR_BAD_PSM;
739
740 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
741 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
742 rsp.result = cpu_to_le16(result);
743 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
744 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
745 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
746 } else
747 l2cap_chan_del(sk, reason);
748 break;
749
1da177e4
LT
750 case BT_CONNECT:
751 case BT_DISCONN:
752 l2cap_chan_del(sk, reason);
753 break;
754
755 default:
756 sock_set_flag(sk, SOCK_ZAPPED);
757 break;
758 }
759}
760
761/* Must be called on unlocked socket. */
762static void l2cap_sock_close(struct sock *sk)
763{
764 l2cap_sock_clear_timer(sk);
765 lock_sock(sk);
766 __l2cap_sock_close(sk, ECONNRESET);
767 release_sock(sk);
768 l2cap_sock_kill(sk);
769}
770
771static void l2cap_sock_init(struct sock *sk, struct sock *parent)
772{
773 struct l2cap_pinfo *pi = l2cap_pi(sk);
774
775 BT_DBG("sk %p", sk);
776
777 if (parent) {
778 sk->sk_type = parent->sk_type;
f66dc81f
MH
779 bt_sk(sk)->defer_setup = bt_sk(parent)->defer_setup;
780
1da177e4
LT
781 pi->imtu = l2cap_pi(parent)->imtu;
782 pi->omtu = l2cap_pi(parent)->omtu;
c6b03cf9
MH
783 pi->mode = l2cap_pi(parent)->mode;
784 pi->fcs = l2cap_pi(parent)->fcs;
2af6b9d5
MH
785 pi->sec_level = l2cap_pi(parent)->sec_level;
786 pi->role_switch = l2cap_pi(parent)->role_switch;
787 pi->force_reliable = l2cap_pi(parent)->force_reliable;
1da177e4
LT
788 } else {
789 pi->imtu = L2CAP_DEFAULT_MTU;
790 pi->omtu = 0;
c6b03cf9
MH
791 pi->mode = L2CAP_MODE_BASIC;
792 pi->fcs = L2CAP_FCS_CRC16;
2af6b9d5
MH
793 pi->sec_level = BT_SECURITY_LOW;
794 pi->role_switch = 0;
795 pi->force_reliable = 0;
1da177e4
LT
796 }
797
798 /* Default config options */
5dee9e7c 799 pi->conf_len = 0;
1da177e4 800 pi->flush_to = L2CAP_DEFAULT_FLUSH_TO;
45054dc1
DY
801 skb_queue_head_init(TX_QUEUE(sk));
802 skb_queue_head_init(SREJ_QUEUE(sk));
803 INIT_LIST_HEAD(SREJ_LIST(sk));
1da177e4
LT
804}
805
806static struct proto l2cap_proto = {
807 .name = "L2CAP",
808 .owner = THIS_MODULE,
809 .obj_size = sizeof(struct l2cap_pinfo)
810};
811
1b8d7ae4 812static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
1da177e4
LT
813{
814 struct sock *sk;
815
6257ff21 816 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1da177e4
LT
817 if (!sk)
818 return NULL;
819
820 sock_init_data(sock, sk);
821 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
822
823 sk->sk_destruct = l2cap_sock_destruct;
4e8402a3 824 sk->sk_sndtimeo = msecs_to_jiffies(L2CAP_CONN_TIMEOUT);
1da177e4
LT
825
826 sock_reset_flag(sk, SOCK_ZAPPED);
827
828 sk->sk_protocol = proto;
b1235d79 829 sk->sk_state = BT_OPEN;
1da177e4 830
b1235d79 831 setup_timer(&sk->sk_timer, l2cap_sock_timeout, (unsigned long) sk);
1da177e4
LT
832
833 bt_sock_link(&l2cap_sk_list, sk);
834 return sk;
835}
836
3f378b68
EP
837static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
838 int kern)
1da177e4
LT
839{
840 struct sock *sk;
841
842 BT_DBG("sock %p", sock);
843
844 sock->state = SS_UNCONNECTED;
845
846 if (sock->type != SOCK_SEQPACKET &&
847 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
848 return -ESOCKTNOSUPPORT;
849
c84b3268 850 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1da177e4
LT
851 return -EPERM;
852
853 sock->ops = &l2cap_sock_ops;
854
1b8d7ae4 855 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1da177e4
LT
856 if (!sk)
857 return -ENOMEM;
858
859 l2cap_sock_init(sk, NULL);
860 return 0;
861}
862
f29972de 863static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
1da177e4 864{
1da177e4 865 struct sock *sk = sock->sk;
f29972de
MH
866 struct sockaddr_l2 la;
867 int len, err = 0;
1da177e4 868
f29972de 869 BT_DBG("sk %p", sk);
1da177e4
LT
870
871 if (!addr || addr->sa_family != AF_BLUETOOTH)
872 return -EINVAL;
873
f29972de
MH
874 memset(&la, 0, sizeof(la));
875 len = min_t(unsigned int, sizeof(la), alen);
876 memcpy(&la, addr, len);
877
2a517ca6
MH
878 if (la.l2_cid)
879 return -EINVAL;
880
1da177e4
LT
881 lock_sock(sk);
882
883 if (sk->sk_state != BT_OPEN) {
884 err = -EBADFD;
885 goto done;
886 }
887
b4324b5d 888 if (la.l2_psm && __le16_to_cpu(la.l2_psm) < 0x1001 &&
847641d7
MH
889 !capable(CAP_NET_BIND_SERVICE)) {
890 err = -EACCES;
891 goto done;
892 }
8e87d142 893
1da177e4
LT
894 write_lock_bh(&l2cap_sk_list.lock);
895
f29972de 896 if (la.l2_psm && __l2cap_get_sock_by_addr(la.l2_psm, &la.l2_bdaddr)) {
1da177e4
LT
897 err = -EADDRINUSE;
898 } else {
899 /* Save source address */
f29972de
MH
900 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
901 l2cap_pi(sk)->psm = la.l2_psm;
902 l2cap_pi(sk)->sport = la.l2_psm;
1da177e4 903 sk->sk_state = BT_BOUND;
2af6b9d5 904
b4324b5d
MH
905 if (__le16_to_cpu(la.l2_psm) == 0x0001 ||
906 __le16_to_cpu(la.l2_psm) == 0x0003)
2af6b9d5 907 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
1da177e4
LT
908 }
909
910 write_unlock_bh(&l2cap_sk_list.lock);
911
912done:
913 release_sock(sk);
914 return err;
915}
916
917static int l2cap_do_connect(struct sock *sk)
918{
919 bdaddr_t *src = &bt_sk(sk)->src;
920 bdaddr_t *dst = &bt_sk(sk)->dst;
921 struct l2cap_conn *conn;
922 struct hci_conn *hcon;
923 struct hci_dev *hdev;
09ab6f4c 924 __u8 auth_type;
44d0e48e 925 int err;
1da177e4 926
f29972de
MH
927 BT_DBG("%s -> %s psm 0x%2.2x", batostr(src), batostr(dst),
928 l2cap_pi(sk)->psm);
1da177e4 929
af05b30b
GP
930 hdev = hci_get_route(dst, src);
931 if (!hdev)
1da177e4
LT
932 return -EHOSTUNREACH;
933
934 hci_dev_lock_bh(hdev);
935
936 err = -ENOMEM;
937
8c1b2355 938 if (sk->sk_type == SOCK_RAW) {
2af6b9d5
MH
939 switch (l2cap_pi(sk)->sec_level) {
940 case BT_SECURITY_HIGH:
8c1b2355 941 auth_type = HCI_AT_DEDICATED_BONDING_MITM;
2af6b9d5
MH
942 break;
943 case BT_SECURITY_MEDIUM:
8c1b2355 944 auth_type = HCI_AT_DEDICATED_BONDING;
2af6b9d5
MH
945 break;
946 default:
09ab6f4c 947 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
948 break;
949 }
8c1b2355 950 } else if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
2af6b9d5 951 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
8c1b2355 952 auth_type = HCI_AT_NO_BONDING_MITM;
09ab6f4c 953 else
8c1b2355 954 auth_type = HCI_AT_NO_BONDING;
435fef20
MH
955
956 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
957 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
8c1b2355 958 } else {
2af6b9d5
MH
959 switch (l2cap_pi(sk)->sec_level) {
960 case BT_SECURITY_HIGH:
8c1b2355 961 auth_type = HCI_AT_GENERAL_BONDING_MITM;
2af6b9d5
MH
962 break;
963 case BT_SECURITY_MEDIUM:
09ab6f4c 964 auth_type = HCI_AT_GENERAL_BONDING;
2af6b9d5
MH
965 break;
966 default:
8c1b2355 967 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
968 break;
969 }
09ab6f4c
MH
970 }
971
2af6b9d5
MH
972 hcon = hci_connect(hdev, ACL_LINK, dst,
973 l2cap_pi(sk)->sec_level, auth_type);
1da177e4
LT
974 if (!hcon)
975 goto done;
976
977 conn = l2cap_conn_add(hcon, 0);
978 if (!conn) {
979 hci_conn_put(hcon);
980 goto done;
981 }
982
983 err = 0;
984
985 /* Update source addr of the socket */
986 bacpy(src, conn->src);
987
988 l2cap_chan_add(conn, sk, NULL);
989
990 sk->sk_state = BT_CONNECT;
991 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
992
993 if (hcon->state == BT_CONNECTED) {
79d554a6 994 if (sk->sk_type != SOCK_SEQPACKET) {
1da177e4
LT
995 l2cap_sock_clear_timer(sk);
996 sk->sk_state = BT_CONNECTED;
79d554a6
MH
997 } else
998 l2cap_do_start(sk);
1da177e4
LT
999 }
1000
1001done:
1002 hci_dev_unlock_bh(hdev);
1003 hci_dev_put(hdev);
1004 return err;
1005}
1006
1007static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
1008{
1da177e4 1009 struct sock *sk = sock->sk;
f29972de
MH
1010 struct sockaddr_l2 la;
1011 int len, err = 0;
1da177e4 1012
1da177e4
LT
1013 BT_DBG("sk %p", sk);
1014
6503d961
CG
1015 if (!addr || alen < sizeof(addr->sa_family) ||
1016 addr->sa_family != AF_BLUETOOTH)
2a517ca6 1017 return -EINVAL;
1da177e4 1018
f29972de
MH
1019 memset(&la, 0, sizeof(la));
1020 len = min_t(unsigned int, sizeof(la), alen);
1021 memcpy(&la, addr, len);
1022
2a517ca6
MH
1023 if (la.l2_cid)
1024 return -EINVAL;
1025
1026 lock_sock(sk);
1027
f29972de 1028 if (sk->sk_type == SOCK_SEQPACKET && !la.l2_psm) {
1da177e4
LT
1029 err = -EINVAL;
1030 goto done;
1031 }
1032
c6b03cf9
MH
1033 switch (l2cap_pi(sk)->mode) {
1034 case L2CAP_MODE_BASIC:
1035 break;
1036 case L2CAP_MODE_ERTM:
f2fcfcd6 1037 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1038 if (enable_ertm)
1039 break;
1040 /* fall through */
1041 default:
1042 err = -ENOTSUPP;
1043 goto done;
1044 }
1045
af05b30b 1046 switch (sk->sk_state) {
1da177e4
LT
1047 case BT_CONNECT:
1048 case BT_CONNECT2:
1049 case BT_CONFIG:
1050 /* Already connecting */
1051 goto wait;
1052
1053 case BT_CONNECTED:
1054 /* Already connected */
1055 goto done;
1056
1057 case BT_OPEN:
1058 case BT_BOUND:
1059 /* Can connect */
1060 break;
1061
1062 default:
1063 err = -EBADFD;
1064 goto done;
1065 }
1066
1067 /* Set destination address and psm */
f29972de
MH
1068 bacpy(&bt_sk(sk)->dst, &la.l2_bdaddr);
1069 l2cap_pi(sk)->psm = la.l2_psm;
1da177e4 1070
af05b30b
GP
1071 err = l2cap_do_connect(sk);
1072 if (err)
1da177e4
LT
1073 goto done;
1074
1075wait:
1076 err = bt_sock_wait_state(sk, BT_CONNECTED,
1077 sock_sndtimeo(sk, flags & O_NONBLOCK));
1078done:
1079 release_sock(sk);
1080 return err;
1081}
1082
1083static int l2cap_sock_listen(struct socket *sock, int backlog)
1084{
1085 struct sock *sk = sock->sk;
1086 int err = 0;
1087
1088 BT_DBG("sk %p backlog %d", sk, backlog);
1089
1090 lock_sock(sk);
1091
1092 if (sk->sk_state != BT_BOUND || sock->type != SOCK_SEQPACKET) {
1093 err = -EBADFD;
1094 goto done;
1095 }
1096
c6b03cf9
MH
1097 switch (l2cap_pi(sk)->mode) {
1098 case L2CAP_MODE_BASIC:
1099 break;
1100 case L2CAP_MODE_ERTM:
f2fcfcd6 1101 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1102 if (enable_ertm)
1103 break;
1104 /* fall through */
1105 default:
1106 err = -ENOTSUPP;
1107 goto done;
1108 }
1109
1da177e4
LT
1110 if (!l2cap_pi(sk)->psm) {
1111 bdaddr_t *src = &bt_sk(sk)->src;
1112 u16 psm;
1113
1114 err = -EINVAL;
1115
1116 write_lock_bh(&l2cap_sk_list.lock);
1117
1118 for (psm = 0x1001; psm < 0x1100; psm += 2)
b4324b5d
MH
1119 if (!__l2cap_get_sock_by_addr(cpu_to_le16(psm), src)) {
1120 l2cap_pi(sk)->psm = cpu_to_le16(psm);
1121 l2cap_pi(sk)->sport = cpu_to_le16(psm);
1da177e4
LT
1122 err = 0;
1123 break;
1124 }
1125
1126 write_unlock_bh(&l2cap_sk_list.lock);
1127
1128 if (err < 0)
1129 goto done;
1130 }
1131
1132 sk->sk_max_ack_backlog = backlog;
1133 sk->sk_ack_backlog = 0;
1134 sk->sk_state = BT_LISTEN;
1135
1136done:
1137 release_sock(sk);
1138 return err;
1139}
1140
1141static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
1142{
1143 DECLARE_WAITQUEUE(wait, current);
1144 struct sock *sk = sock->sk, *nsk;
1145 long timeo;
1146 int err = 0;
1147
fcc70d5f 1148 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1149
1150 if (sk->sk_state != BT_LISTEN) {
1151 err = -EBADFD;
1152 goto done;
1153 }
1154
1155 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
1156
1157 BT_DBG("sk %p timeo %ld", sk, timeo);
1158
1159 /* Wait for an incoming connection. (wake-one). */
aa395145 1160 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1da177e4
LT
1161 while (!(nsk = bt_accept_dequeue(sk, newsock))) {
1162 set_current_state(TASK_INTERRUPTIBLE);
1163 if (!timeo) {
1164 err = -EAGAIN;
1165 break;
1166 }
1167
1168 release_sock(sk);
1169 timeo = schedule_timeout(timeo);
fcc70d5f 1170 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1171
1172 if (sk->sk_state != BT_LISTEN) {
1173 err = -EBADFD;
1174 break;
1175 }
1176
1177 if (signal_pending(current)) {
1178 err = sock_intr_errno(timeo);
1179 break;
1180 }
1181 }
1182 set_current_state(TASK_RUNNING);
aa395145 1183 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
1184
1185 if (err)
1186 goto done;
1187
1188 newsock->state = SS_CONNECTED;
1189
1190 BT_DBG("new socket %p", nsk);
1191
1192done:
1193 release_sock(sk);
1194 return err;
1195}
1196
1197static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
1198{
1199 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
1200 struct sock *sk = sock->sk;
1201
1202 BT_DBG("sock %p, sk %p", sock, sk);
1203
1204 addr->sa_family = AF_BLUETOOTH;
1205 *len = sizeof(struct sockaddr_l2);
1206
f29972de
MH
1207 if (peer) {
1208 la->l2_psm = l2cap_pi(sk)->psm;
1da177e4 1209 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
b4324b5d 1210 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->dcid);
f29972de
MH
1211 } else {
1212 la->l2_psm = l2cap_pi(sk)->sport;
1da177e4 1213 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
b4324b5d 1214 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->scid);
f29972de 1215 }
1da177e4 1216
1da177e4
LT
1217 return 0;
1218}
1219
e90bac06
GP
1220static void l2cap_monitor_timeout(unsigned long arg)
1221{
1222 struct sock *sk = (void *) arg;
1223 u16 control;
1224
e686219a 1225 bh_lock_sock(sk);
e90bac06
GP
1226 if (l2cap_pi(sk)->retry_count >= l2cap_pi(sk)->remote_max_tx) {
1227 l2cap_send_disconn_req(l2cap_pi(sk)->conn, sk);
b13f5860 1228 bh_unlock_sock(sk);
e90bac06
GP
1229 return;
1230 }
1231
1232 l2cap_pi(sk)->retry_count++;
1233 __mod_monitor_timer();
1234
1235 control = L2CAP_CTRL_POLL;
7e743090 1236 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1237 bh_unlock_sock(sk);
e90bac06
GP
1238}
1239
1240static void l2cap_retrans_timeout(unsigned long arg)
1241{
1242 struct sock *sk = (void *) arg;
1243 u16 control;
1244
e686219a 1245 bh_lock_sock(sk);
e90bac06
GP
1246 l2cap_pi(sk)->retry_count = 1;
1247 __mod_monitor_timer();
1248
1249 l2cap_pi(sk)->conn_state |= L2CAP_CONN_WAIT_F;
1250
1251 control = L2CAP_CTRL_POLL;
7e743090 1252 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1253 bh_unlock_sock(sk);
e90bac06
GP
1254}
1255
1c2acffb 1256static void l2cap_drop_acked_frames(struct sock *sk)
1da177e4 1257{
1c2acffb 1258 struct sk_buff *skb;
1da177e4 1259
1c2acffb
GP
1260 while ((skb = skb_peek(TX_QUEUE(sk)))) {
1261 if (bt_cb(skb)->tx_seq == l2cap_pi(sk)->expected_ack_seq)
1262 break;
1da177e4 1263
1c2acffb
GP
1264 skb = skb_dequeue(TX_QUEUE(sk));
1265 kfree_skb(skb);
1da177e4 1266
1c2acffb
GP
1267 l2cap_pi(sk)->unacked_frames--;
1268 }
1da177e4 1269
e90bac06
GP
1270 if (!l2cap_pi(sk)->unacked_frames)
1271 del_timer(&l2cap_pi(sk)->retrans_timer);
1272
1c2acffb
GP
1273 return;
1274}
1da177e4 1275
1c2acffb
GP
1276static inline int l2cap_do_send(struct sock *sk, struct sk_buff *skb)
1277{
1278 struct l2cap_pinfo *pi = l2cap_pi(sk);
1279 int err;
1280
1281 BT_DBG("sk %p, skb %p len %d", sk, skb, skb->len);
1da177e4 1282
1c2acffb
GP
1283 err = hci_send_acl(pi->conn->hcon, skb, 0);
1284 if (err < 0)
1285 kfree_skb(skb);
1286
1287 return err;
1288}
1289
6840ed07
GP
1290static int l2cap_streaming_send(struct sock *sk)
1291{
1292 struct sk_buff *skb, *tx_skb;
1293 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1294 u16 control, fcs;
6840ed07
GP
1295 int err;
1296
1297 while ((skb = sk->sk_send_head)) {
1298 tx_skb = skb_clone(skb, GFP_ATOMIC);
1299
1300 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
1301 control |= pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT;
1302 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1303
e8235c6b 1304 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1305 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1306 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1307 }
1308
6840ed07
GP
1309 err = l2cap_do_send(sk, tx_skb);
1310 if (err < 0) {
1311 l2cap_send_disconn_req(pi->conn, sk);
1312 return err;
1313 }
1314
1315 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1316
1317 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1318 sk->sk_send_head = NULL;
1319 else
1320 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
1321
1322 skb = skb_dequeue(TX_QUEUE(sk));
1323 kfree_skb(skb);
1324 }
1325 return 0;
1326}
1327
8f17154f
GP
1328static int l2cap_retransmit_frame(struct sock *sk, u8 tx_seq)
1329{
1330 struct l2cap_pinfo *pi = l2cap_pi(sk);
1331 struct sk_buff *skb, *tx_skb;
1332 u16 control, fcs;
1333 int err;
1334
1335 skb = skb_peek(TX_QUEUE(sk));
1336 do {
1337 if (bt_cb(skb)->tx_seq != tx_seq) {
1338 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1339 break;
1340 skb = skb_queue_next(TX_QUEUE(sk), skb);
1341 continue;
1342 }
1343
1344 if (pi->remote_max_tx &&
1345 bt_cb(skb)->retries == pi->remote_max_tx) {
1346 l2cap_send_disconn_req(pi->conn, sk);
1347 break;
1348 }
1349
1350 tx_skb = skb_clone(skb, GFP_ATOMIC);
1351 bt_cb(skb)->retries++;
1352 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
9f121a5a 1353 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
8f17154f
GP
1354 | (tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1355 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1356
e8235c6b 1357 if (pi->fcs == L2CAP_FCS_CRC16) {
8f17154f
GP
1358 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1359 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1360 }
1361
1362 err = l2cap_do_send(sk, tx_skb);
1363 if (err < 0) {
1364 l2cap_send_disconn_req(pi->conn, sk);
1365 return err;
1366 }
1367 break;
1368 } while(1);
1369 return 0;
1370}
1371
1c2acffb
GP
1372static int l2cap_ertm_send(struct sock *sk)
1373{
1374 struct sk_buff *skb, *tx_skb;
1375 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1376 u16 control, fcs;
9e917af1 1377 int err, nsent = 0;
1c2acffb 1378
e90bac06
GP
1379 if (pi->conn_state & L2CAP_CONN_WAIT_F)
1380 return 0;
1381
f64f9e71
JP
1382 while ((skb = sk->sk_send_head) && (!l2cap_tx_window_full(sk)) &&
1383 !(pi->conn_state & L2CAP_CONN_REMOTE_BUSY)) {
1c2acffb 1384
e90bac06
GP
1385 if (pi->remote_max_tx &&
1386 bt_cb(skb)->retries == pi->remote_max_tx) {
1387 l2cap_send_disconn_req(pi->conn, sk);
1388 break;
1389 }
1390
e420aba3
AE
1391 tx_skb = skb_clone(skb, GFP_ATOMIC);
1392
e90bac06
GP
1393 bt_cb(skb)->retries++;
1394
1c2acffb 1395 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
d5392c8f
GP
1396 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
1397 control |= L2CAP_CTRL_FINAL;
1398 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
1399 }
9f121a5a 1400 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
1c2acffb
GP
1401 | (pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1402 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1403
e90bac06 1404
e8235c6b 1405 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1406 fcs = crc16(0, (u8 *)skb->data, tx_skb->len - 2);
1407 put_unaligned_le16(fcs, skb->data + tx_skb->len - 2);
1408 }
1409
1c2acffb
GP
1410 err = l2cap_do_send(sk, tx_skb);
1411 if (err < 0) {
1412 l2cap_send_disconn_req(pi->conn, sk);
1413 return err;
1414 }
e90bac06 1415 __mod_retrans_timer();
1c2acffb
GP
1416
1417 bt_cb(skb)->tx_seq = pi->next_tx_seq;
1418 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1419
1420 pi->unacked_frames++;
d5392c8f 1421 pi->frames_sent++;
1c2acffb
GP
1422
1423 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1424 sk->sk_send_head = NULL;
1425 else
1426 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
9e917af1
GP
1427
1428 nsent++;
1c2acffb
GP
1429 }
1430
9e917af1
GP
1431 return nsent;
1432}
1433
1434static int l2cap_send_ack(struct l2cap_pinfo *pi)
1435{
1436 struct sock *sk = (struct sock *)pi;
1437 u16 control = 0;
1438
1439 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
1440
1441 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
1442 control |= L2CAP_SUPER_RCV_NOT_READY;
1443 return l2cap_send_sframe(pi, control);
1444 } else if (l2cap_ertm_send(sk) == 0) {
1445 control |= L2CAP_SUPER_RCV_READY;
1446 return l2cap_send_sframe(pi, control);
1447 }
1c2acffb
GP
1448 return 0;
1449}
1450
1451static inline int l2cap_skbuff_fromiovec(struct sock *sk, struct msghdr *msg, int len, int count, struct sk_buff *skb)
1452{
1453 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1454 struct sk_buff **frag;
1455 int err, sent = 0;
1da177e4
LT
1456
1457 if (memcpy_fromiovec(skb_put(skb, count), msg->msg_iov, count)) {
1c2acffb 1458 return -EFAULT;
1da177e4
LT
1459 }
1460
1461 sent += count;
1462 len -= count;
1463
1464 /* Continuation fragments (no L2CAP header) */
1465 frag = &skb_shinfo(skb)->frag_list;
1466 while (len) {
1467 count = min_t(unsigned int, conn->mtu, len);
1468
1469 *frag = bt_skb_send_alloc(sk, count, msg->msg_flags & MSG_DONTWAIT, &err);
1470 if (!*frag)
1c2acffb
GP
1471 return -EFAULT;
1472 if (memcpy_fromiovec(skb_put(*frag, count), msg->msg_iov, count))
1473 return -EFAULT;
1da177e4
LT
1474
1475 sent += count;
1476 len -= count;
1477
1478 frag = &(*frag)->next;
1479 }
1da177e4
LT
1480
1481 return sent;
1c2acffb 1482}
1da177e4 1483
1c2acffb
GP
1484static struct sk_buff *l2cap_create_connless_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1485{
1486 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1487 struct sk_buff *skb;
1488 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1489 struct l2cap_hdr *lh;
1490
1491 BT_DBG("sk %p len %d", sk, (int)len);
1492
1493 count = min_t(unsigned int, (conn->mtu - hlen), len);
1494 skb = bt_skb_send_alloc(sk, count + hlen,
1495 msg->msg_flags & MSG_DONTWAIT, &err);
1496 if (!skb)
1497 return ERR_PTR(-ENOMEM);
1498
1499 /* Create L2CAP header */
1500 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1501 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1502 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1503 put_unaligned_le16(l2cap_pi(sk)->psm, skb_put(skb, 2));
1504
1505 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1506 if (unlikely(err < 0)) {
1507 kfree_skb(skb);
1508 return ERR_PTR(err);
1509 }
1510 return skb;
1511}
1512
1513static struct sk_buff *l2cap_create_basic_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1514{
1515 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1516 struct sk_buff *skb;
1517 int err, count, hlen = L2CAP_HDR_SIZE;
1518 struct l2cap_hdr *lh;
1519
1520 BT_DBG("sk %p len %d", sk, (int)len);
1521
1522 count = min_t(unsigned int, (conn->mtu - hlen), len);
1523 skb = bt_skb_send_alloc(sk, count + hlen,
1524 msg->msg_flags & MSG_DONTWAIT, &err);
1525 if (!skb)
1526 return ERR_PTR(-ENOMEM);
1527
1528 /* Create L2CAP header */
1529 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1530 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1531 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1532
1533 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1534 if (unlikely(err < 0)) {
1535 kfree_skb(skb);
1536 return ERR_PTR(err);
1537 }
1538 return skb;
1539}
1540
6840ed07 1541static struct sk_buff *l2cap_create_iframe_pdu(struct sock *sk, struct msghdr *msg, size_t len, u16 control, u16 sdulen)
1c2acffb
GP
1542{
1543 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1544 struct sk_buff *skb;
1545 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1546 struct l2cap_hdr *lh;
1547
1548 BT_DBG("sk %p len %d", sk, (int)len);
1549
c74e560c
GP
1550 if (sdulen)
1551 hlen += 2;
1552
fcc203c3
GP
1553 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1554 hlen += 2;
1555
1c2acffb
GP
1556 count = min_t(unsigned int, (conn->mtu - hlen), len);
1557 skb = bt_skb_send_alloc(sk, count + hlen,
1558 msg->msg_flags & MSG_DONTWAIT, &err);
1559 if (!skb)
1560 return ERR_PTR(-ENOMEM);
1561
1562 /* Create L2CAP header */
1563 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1564 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1565 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1566 put_unaligned_le16(control, skb_put(skb, 2));
c74e560c
GP
1567 if (sdulen)
1568 put_unaligned_le16(sdulen, skb_put(skb, 2));
1c2acffb
GP
1569
1570 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1571 if (unlikely(err < 0)) {
1572 kfree_skb(skb);
1573 return ERR_PTR(err);
1574 }
e90bac06 1575
fcc203c3
GP
1576 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1577 put_unaligned_le16(0, skb_put(skb, 2));
1578
e90bac06 1579 bt_cb(skb)->retries = 0;
1c2acffb 1580 return skb;
1da177e4
LT
1581}
1582
c74e560c
GP
1583static inline int l2cap_sar_segment_sdu(struct sock *sk, struct msghdr *msg, size_t len)
1584{
1585 struct l2cap_pinfo *pi = l2cap_pi(sk);
1586 struct sk_buff *skb;
1587 struct sk_buff_head sar_queue;
1588 u16 control;
1589 size_t size = 0;
1590
1591 __skb_queue_head_init(&sar_queue);
1592 control = L2CAP_SDU_START;
6840ed07 1593 skb = l2cap_create_iframe_pdu(sk, msg, pi->max_pdu_size, control, len);
c74e560c
GP
1594 if (IS_ERR(skb))
1595 return PTR_ERR(skb);
1596
1597 __skb_queue_tail(&sar_queue, skb);
1598 len -= pi->max_pdu_size;
1599 size +=pi->max_pdu_size;
1600 control = 0;
1601
1602 while (len > 0) {
1603 size_t buflen;
1604
1605 if (len > pi->max_pdu_size) {
1606 control |= L2CAP_SDU_CONTINUE;
1607 buflen = pi->max_pdu_size;
1608 } else {
1609 control |= L2CAP_SDU_END;
1610 buflen = len;
1611 }
1612
6840ed07 1613 skb = l2cap_create_iframe_pdu(sk, msg, buflen, control, 0);
c74e560c
GP
1614 if (IS_ERR(skb)) {
1615 skb_queue_purge(&sar_queue);
1616 return PTR_ERR(skb);
1617 }
1618
1619 __skb_queue_tail(&sar_queue, skb);
1620 len -= buflen;
1621 size += buflen;
1622 control = 0;
1623 }
1624 skb_queue_splice_tail(&sar_queue, TX_QUEUE(sk));
1625 if (sk->sk_send_head == NULL)
1626 sk->sk_send_head = sar_queue.next;
1627
1628 return size;
1629}
1630
1da177e4
LT
1631static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
1632{
1633 struct sock *sk = sock->sk;
1c2acffb
GP
1634 struct l2cap_pinfo *pi = l2cap_pi(sk);
1635 struct sk_buff *skb;
1636 u16 control;
1637 int err;
1da177e4
LT
1638
1639 BT_DBG("sock %p, sk %p", sock, sk);
1640
c1cbe4b7
BL
1641 err = sock_error(sk);
1642 if (err)
1643 return err;
1da177e4
LT
1644
1645 if (msg->msg_flags & MSG_OOB)
1646 return -EOPNOTSUPP;
1647
1da177e4
LT
1648 lock_sock(sk);
1649
1c2acffb 1650 if (sk->sk_state != BT_CONNECTED) {
1da177e4 1651 err = -ENOTCONN;
1c2acffb
GP
1652 goto done;
1653 }
1da177e4 1654
1c2acffb
GP
1655 /* Connectionless channel */
1656 if (sk->sk_type == SOCK_DGRAM) {
1657 skb = l2cap_create_connless_pdu(sk, msg, len);
477fffb0
DC
1658 if (IS_ERR(skb))
1659 err = PTR_ERR(skb);
1660 else
1661 err = l2cap_do_send(sk, skb);
1c2acffb
GP
1662 goto done;
1663 }
1664
1665 switch (pi->mode) {
1666 case L2CAP_MODE_BASIC:
c69163e9
GP
1667 /* Check outgoing MTU */
1668 if (len > pi->omtu) {
1669 err = -EINVAL;
1670 goto done;
1671 }
1672
1c2acffb
GP
1673 /* Create a basic PDU */
1674 skb = l2cap_create_basic_pdu(sk, msg, len);
1675 if (IS_ERR(skb)) {
1676 err = PTR_ERR(skb);
1677 goto done;
1678 }
1679
1680 err = l2cap_do_send(sk, skb);
1681 if (!err)
1682 err = len;
1683 break;
1684
1685 case L2CAP_MODE_ERTM:
6840ed07 1686 case L2CAP_MODE_STREAMING:
1c2acffb 1687 /* Entire SDU fits into one PDU */
c74e560c 1688 if (len <= pi->max_pdu_size) {
1c2acffb 1689 control = L2CAP_SDU_UNSEGMENTED;
6840ed07 1690 skb = l2cap_create_iframe_pdu(sk, msg, len, control, 0);
1c2acffb
GP
1691 if (IS_ERR(skb)) {
1692 err = PTR_ERR(skb);
1693 goto done;
1694 }
c74e560c
GP
1695 __skb_queue_tail(TX_QUEUE(sk), skb);
1696 if (sk->sk_send_head == NULL)
1697 sk->sk_send_head = skb;
1c2acffb 1698 } else {
c74e560c
GP
1699 /* Segment SDU into multiples PDUs */
1700 err = l2cap_sar_segment_sdu(sk, msg, len);
1701 if (err < 0)
1702 goto done;
1c2acffb 1703 }
1c2acffb 1704
6840ed07
GP
1705 if (pi->mode == L2CAP_MODE_STREAMING)
1706 err = l2cap_streaming_send(sk);
1707 else
1708 err = l2cap_ertm_send(sk);
1709
9e917af1 1710 if (err >= 0)
1c2acffb
GP
1711 err = len;
1712 break;
1713
1714 default:
1715 BT_DBG("bad state %1.1x", pi->mode);
1716 err = -EINVAL;
1717 }
1718
1719done:
1da177e4
LT
1720 release_sock(sk);
1721 return err;
1722}
1723
f66dc81f
MH
1724static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
1725{
1726 struct sock *sk = sock->sk;
1727
1728 lock_sock(sk);
1729
1730 if (sk->sk_state == BT_CONNECT2 && bt_sk(sk)->defer_setup) {
1731 struct l2cap_conn_rsp rsp;
1732
1733 sk->sk_state = BT_CONFIG;
1734
1735 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1736 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
1737 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
1738 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
1739 l2cap_send_cmd(l2cap_pi(sk)->conn, l2cap_pi(sk)->ident,
1740 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
1741
1742 release_sock(sk);
1743 return 0;
1744 }
1745
1746 release_sock(sk);
1747
1748 return bt_sock_recvmsg(iocb, sock, msg, len, flags);
1749}
1750
b7058842 1751static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
1da177e4
LT
1752{
1753 struct sock *sk = sock->sk;
1754 struct l2cap_options opts;
f29972de 1755 int len, err = 0;
1da177e4
LT
1756 u32 opt;
1757
1758 BT_DBG("sk %p", sk);
1759
1760 lock_sock(sk);
1761
1762 switch (optname) {
1763 case L2CAP_OPTIONS:
0878b666
MH
1764 opts.imtu = l2cap_pi(sk)->imtu;
1765 opts.omtu = l2cap_pi(sk)->omtu;
1766 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1767 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1768 opts.fcs = l2cap_pi(sk)->fcs;
0878b666 1769
1da177e4
LT
1770 len = min_t(unsigned int, sizeof(opts), optlen);
1771 if (copy_from_user((char *) &opts, optval, len)) {
1772 err = -EFAULT;
1773 break;
1774 }
0878b666 1775
c6b03cf9
MH
1776 l2cap_pi(sk)->imtu = opts.imtu;
1777 l2cap_pi(sk)->omtu = opts.omtu;
1778 l2cap_pi(sk)->mode = opts.mode;
fcc203c3 1779 l2cap_pi(sk)->fcs = opts.fcs;
1da177e4
LT
1780 break;
1781
1782 case L2CAP_LM:
1783 if (get_user(opt, (u32 __user *) optval)) {
1784 err = -EFAULT;
1785 break;
1786 }
1787
2af6b9d5
MH
1788 if (opt & L2CAP_LM_AUTH)
1789 l2cap_pi(sk)->sec_level = BT_SECURITY_LOW;
1790 if (opt & L2CAP_LM_ENCRYPT)
1791 l2cap_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
1792 if (opt & L2CAP_LM_SECURE)
1793 l2cap_pi(sk)->sec_level = BT_SECURITY_HIGH;
1794
1795 l2cap_pi(sk)->role_switch = (opt & L2CAP_LM_MASTER);
1796 l2cap_pi(sk)->force_reliable = (opt & L2CAP_LM_RELIABLE);
1da177e4
LT
1797 break;
1798
1799 default:
1800 err = -ENOPROTOOPT;
1801 break;
1802 }
1803
1804 release_sock(sk);
1805 return err;
1806}
1807
b7058842 1808static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
d58daf42
MH
1809{
1810 struct sock *sk = sock->sk;
2af6b9d5
MH
1811 struct bt_security sec;
1812 int len, err = 0;
f66dc81f 1813 u32 opt;
d58daf42
MH
1814
1815 BT_DBG("sk %p", sk);
1816
1817 if (level == SOL_L2CAP)
1818 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
1819
0588d94f
MH
1820 if (level != SOL_BLUETOOTH)
1821 return -ENOPROTOOPT;
1822
d58daf42
MH
1823 lock_sock(sk);
1824
1825 switch (optname) {
2af6b9d5 1826 case BT_SECURITY:
2526d3d8 1827 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1828 err = -EINVAL;
1829 break;
1830 }
1831
2af6b9d5
MH
1832 sec.level = BT_SECURITY_LOW;
1833
1834 len = min_t(unsigned int, sizeof(sec), optlen);
1835 if (copy_from_user((char *) &sec, optval, len)) {
1836 err = -EFAULT;
1837 break;
1838 }
1839
1840 if (sec.level < BT_SECURITY_LOW ||
1841 sec.level > BT_SECURITY_HIGH) {
1842 err = -EINVAL;
1843 break;
1844 }
1845
1846 l2cap_pi(sk)->sec_level = sec.level;
1847 break;
1848
f66dc81f
MH
1849 case BT_DEFER_SETUP:
1850 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1851 err = -EINVAL;
1852 break;
1853 }
1854
1855 if (get_user(opt, (u32 __user *) optval)) {
1856 err = -EFAULT;
1857 break;
1858 }
1859
1860 bt_sk(sk)->defer_setup = opt;
1861 break;
1862
d58daf42
MH
1863 default:
1864 err = -ENOPROTOOPT;
1865 break;
1866 }
1867
1868 release_sock(sk);
1869 return err;
1870}
1871
1872static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
1da177e4
LT
1873{
1874 struct sock *sk = sock->sk;
1875 struct l2cap_options opts;
1876 struct l2cap_conninfo cinfo;
1877 int len, err = 0;
2af6b9d5 1878 u32 opt;
1da177e4
LT
1879
1880 BT_DBG("sk %p", sk);
1881
1882 if (get_user(len, optlen))
1883 return -EFAULT;
1884
1885 lock_sock(sk);
1886
1887 switch (optname) {
1888 case L2CAP_OPTIONS:
1889 opts.imtu = l2cap_pi(sk)->imtu;
1890 opts.omtu = l2cap_pi(sk)->omtu;
1891 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1892 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1893 opts.fcs = l2cap_pi(sk)->fcs;
1da177e4
LT
1894
1895 len = min_t(unsigned int, len, sizeof(opts));
1896 if (copy_to_user(optval, (char *) &opts, len))
1897 err = -EFAULT;
1898
1899 break;
1900
1901 case L2CAP_LM:
2af6b9d5
MH
1902 switch (l2cap_pi(sk)->sec_level) {
1903 case BT_SECURITY_LOW:
1904 opt = L2CAP_LM_AUTH;
1905 break;
1906 case BT_SECURITY_MEDIUM:
1907 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
1908 break;
1909 case BT_SECURITY_HIGH:
1910 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
1911 L2CAP_LM_SECURE;
1912 break;
1913 default:
1914 opt = 0;
1915 break;
1916 }
1917
1918 if (l2cap_pi(sk)->role_switch)
1919 opt |= L2CAP_LM_MASTER;
1920
1921 if (l2cap_pi(sk)->force_reliable)
1922 opt |= L2CAP_LM_RELIABLE;
1923
1924 if (put_user(opt, (u32 __user *) optval))
1da177e4
LT
1925 err = -EFAULT;
1926 break;
1927
1928 case L2CAP_CONNINFO:
f66dc81f
MH
1929 if (sk->sk_state != BT_CONNECTED &&
1930 !(sk->sk_state == BT_CONNECT2 &&
1931 bt_sk(sk)->defer_setup)) {
1da177e4
LT
1932 err = -ENOTCONN;
1933 break;
1934 }
1935
1936 cinfo.hci_handle = l2cap_pi(sk)->conn->hcon->handle;
1937 memcpy(cinfo.dev_class, l2cap_pi(sk)->conn->hcon->dev_class, 3);
1938
1939 len = min_t(unsigned int, len, sizeof(cinfo));
1940 if (copy_to_user(optval, (char *) &cinfo, len))
1941 err = -EFAULT;
1942
1943 break;
1944
1945 default:
1946 err = -ENOPROTOOPT;
1947 break;
1948 }
1949
1950 release_sock(sk);
1951 return err;
1952}
1953
d58daf42
MH
1954static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
1955{
1956 struct sock *sk = sock->sk;
2af6b9d5 1957 struct bt_security sec;
d58daf42
MH
1958 int len, err = 0;
1959
1960 BT_DBG("sk %p", sk);
1961
1962 if (level == SOL_L2CAP)
1963 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
1964
0588d94f
MH
1965 if (level != SOL_BLUETOOTH)
1966 return -ENOPROTOOPT;
1967
d58daf42
MH
1968 if (get_user(len, optlen))
1969 return -EFAULT;
1970
1971 lock_sock(sk);
1972
1973 switch (optname) {
2af6b9d5 1974 case BT_SECURITY:
2526d3d8 1975 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1976 err = -EINVAL;
1977 break;
1978 }
1979
2af6b9d5
MH
1980 sec.level = l2cap_pi(sk)->sec_level;
1981
1982 len = min_t(unsigned int, len, sizeof(sec));
1983 if (copy_to_user(optval, (char *) &sec, len))
1984 err = -EFAULT;
1985
1986 break;
1987
f66dc81f
MH
1988 case BT_DEFER_SETUP:
1989 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1990 err = -EINVAL;
1991 break;
1992 }
1993
1994 if (put_user(bt_sk(sk)->defer_setup, (u32 __user *) optval))
1995 err = -EFAULT;
1996
1997 break;
1998
d58daf42
MH
1999 default:
2000 err = -ENOPROTOOPT;
2001 break;
2002 }
2003
2004 release_sock(sk);
2005 return err;
2006}
2007
1da177e4
LT
2008static int l2cap_sock_shutdown(struct socket *sock, int how)
2009{
2010 struct sock *sk = sock->sk;
2011 int err = 0;
2012
2013 BT_DBG("sock %p, sk %p", sock, sk);
2014
2015 if (!sk)
2016 return 0;
2017
2018 lock_sock(sk);
2019 if (!sk->sk_shutdown) {
2020 sk->sk_shutdown = SHUTDOWN_MASK;
2021 l2cap_sock_clear_timer(sk);
2022 __l2cap_sock_close(sk, 0);
2023
2024 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
b1235d79
MH
2025 err = bt_sock_wait_state(sk, BT_CLOSED,
2026 sk->sk_lingertime);
1da177e4
LT
2027 }
2028 release_sock(sk);
2029 return err;
2030}
2031
2032static int l2cap_sock_release(struct socket *sock)
2033{
2034 struct sock *sk = sock->sk;
2035 int err;
2036
2037 BT_DBG("sock %p, sk %p", sock, sk);
2038
2039 if (!sk)
2040 return 0;
2041
2042 err = l2cap_sock_shutdown(sock, 2);
2043
2044 sock_orphan(sk);
2045 l2cap_sock_kill(sk);
2046 return err;
2047}
2048
1da177e4
LT
2049static void l2cap_chan_ready(struct sock *sk)
2050{
2051 struct sock *parent = bt_sk(sk)->parent;
2052
2053 BT_DBG("sk %p, parent %p", sk, parent);
2054
2055 l2cap_pi(sk)->conf_state = 0;
2056 l2cap_sock_clear_timer(sk);
2057
2058 if (!parent) {
2059 /* Outgoing channel.
2060 * Wake up socket sleeping on connect.
2061 */
2062 sk->sk_state = BT_CONNECTED;
2063 sk->sk_state_change(sk);
2064 } else {
2065 /* Incoming channel.
2066 * Wake up socket sleeping on accept.
2067 */
2068 parent->sk_data_ready(parent, 0);
2069 }
2070}
2071
2072/* Copy frame to all raw sockets on that connection */
2073static void l2cap_raw_recv(struct l2cap_conn *conn, struct sk_buff *skb)
2074{
2075 struct l2cap_chan_list *l = &conn->chan_list;
2076 struct sk_buff *nskb;
af05b30b 2077 struct sock *sk;
1da177e4
LT
2078
2079 BT_DBG("conn %p", conn);
2080
2081 read_lock(&l->lock);
2082 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2083 if (sk->sk_type != SOCK_RAW)
2084 continue;
2085
2086 /* Don't send frame to the socket it came from */
2087 if (skb->sk == sk)
2088 continue;
af05b30b
GP
2089 nskb = skb_clone(skb, GFP_ATOMIC);
2090 if (!nskb)
1da177e4
LT
2091 continue;
2092
2093 if (sock_queue_rcv_skb(sk, nskb))
2094 kfree_skb(nskb);
2095 }
2096 read_unlock(&l->lock);
2097}
2098
2099/* ---- L2CAP signalling commands ---- */
2100static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
2101 u8 code, u8 ident, u16 dlen, void *data)
2102{
2103 struct sk_buff *skb, **frag;
2104 struct l2cap_cmd_hdr *cmd;
2105 struct l2cap_hdr *lh;
2106 int len, count;
2107
af05b30b
GP
2108 BT_DBG("conn %p, code 0x%2.2x, ident 0x%2.2x, len %d",
2109 conn, code, ident, dlen);
1da177e4
LT
2110
2111 len = L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE + dlen;
2112 count = min_t(unsigned int, conn->mtu, len);
2113
2114 skb = bt_skb_alloc(count, GFP_ATOMIC);
2115 if (!skb)
2116 return NULL;
2117
2118 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
aca3192c 2119 lh->len = cpu_to_le16(L2CAP_CMD_HDR_SIZE + dlen);
8db4dc46 2120 lh->cid = cpu_to_le16(L2CAP_CID_SIGNALING);
1da177e4
LT
2121
2122 cmd = (struct l2cap_cmd_hdr *) skb_put(skb, L2CAP_CMD_HDR_SIZE);
2123 cmd->code = code;
2124 cmd->ident = ident;
aca3192c 2125 cmd->len = cpu_to_le16(dlen);
1da177e4
LT
2126
2127 if (dlen) {
2128 count -= L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE;
2129 memcpy(skb_put(skb, count), data, count);
2130 data += count;
2131 }
2132
2133 len -= skb->len;
2134
2135 /* Continuation fragments (no L2CAP header) */
2136 frag = &skb_shinfo(skb)->frag_list;
2137 while (len) {
2138 count = min_t(unsigned int, conn->mtu, len);
2139
2140 *frag = bt_skb_alloc(count, GFP_ATOMIC);
2141 if (!*frag)
2142 goto fail;
2143
2144 memcpy(skb_put(*frag, count), data, count);
2145
2146 len -= count;
2147 data += count;
2148
2149 frag = &(*frag)->next;
2150 }
2151
2152 return skb;
2153
2154fail:
2155 kfree_skb(skb);
2156 return NULL;
2157}
2158
2159static inline int l2cap_get_conf_opt(void **ptr, int *type, int *olen, unsigned long *val)
2160{
2161 struct l2cap_conf_opt *opt = *ptr;
2162 int len;
2163
2164 len = L2CAP_CONF_OPT_SIZE + opt->len;
2165 *ptr += len;
2166
2167 *type = opt->type;
2168 *olen = opt->len;
2169
2170 switch (opt->len) {
2171 case 1:
2172 *val = *((u8 *) opt->val);
2173 break;
2174
2175 case 2:
861d6882 2176 *val = __le16_to_cpu(*((__le16 *) opt->val));
1da177e4
LT
2177 break;
2178
2179 case 4:
861d6882 2180 *val = __le32_to_cpu(*((__le32 *) opt->val));
1da177e4
LT
2181 break;
2182
2183 default:
2184 *val = (unsigned long) opt->val;
2185 break;
2186 }
2187
2188 BT_DBG("type 0x%2.2x len %d val 0x%lx", *type, opt->len, *val);
2189 return len;
2190}
2191
1da177e4
LT
2192static void l2cap_add_conf_opt(void **ptr, u8 type, u8 len, unsigned long val)
2193{
2194 struct l2cap_conf_opt *opt = *ptr;
2195
2196 BT_DBG("type 0x%2.2x len %d val 0x%lx", type, len, val);
2197
2198 opt->type = type;
2199 opt->len = len;
2200
2201 switch (len) {
2202 case 1:
2203 *((u8 *) opt->val) = val;
2204 break;
2205
2206 case 2:
8e036fc3 2207 *((__le16 *) opt->val) = cpu_to_le16(val);
1da177e4
LT
2208 break;
2209
2210 case 4:
8e036fc3 2211 *((__le32 *) opt->val) = cpu_to_le32(val);
1da177e4
LT
2212 break;
2213
2214 default:
2215 memcpy(opt->val, (void *) val, len);
2216 break;
2217 }
2218
2219 *ptr += L2CAP_CONF_OPT_SIZE + len;
2220}
2221
0565c1c2
GP
2222static inline void l2cap_ertm_init(struct sock *sk)
2223{
2224 l2cap_pi(sk)->expected_ack_seq = 0;
2225 l2cap_pi(sk)->unacked_frames = 0;
2226 l2cap_pi(sk)->buffer_seq = 0;
2227 l2cap_pi(sk)->num_to_ack = 0;
d5392c8f 2228 l2cap_pi(sk)->frames_sent = 0;
0565c1c2
GP
2229
2230 setup_timer(&l2cap_pi(sk)->retrans_timer,
2231 l2cap_retrans_timeout, (unsigned long) sk);
2232 setup_timer(&l2cap_pi(sk)->monitor_timer,
2233 l2cap_monitor_timeout, (unsigned long) sk);
2234
2235 __skb_queue_head_init(SREJ_QUEUE(sk));
2236}
2237
f2fcfcd6
GP
2238static int l2cap_mode_supported(__u8 mode, __u32 feat_mask)
2239{
2240 u32 local_feat_mask = l2cap_feat_mask;
2241 if (enable_ertm)
6840ed07 2242 local_feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING;
f2fcfcd6
GP
2243
2244 switch (mode) {
2245 case L2CAP_MODE_ERTM:
2246 return L2CAP_FEAT_ERTM & feat_mask & local_feat_mask;
2247 case L2CAP_MODE_STREAMING:
2248 return L2CAP_FEAT_STREAMING & feat_mask & local_feat_mask;
2249 default:
2250 return 0x00;
2251 }
2252}
2253
2254static inline __u8 l2cap_select_mode(__u8 mode, __u16 remote_feat_mask)
2255{
2256 switch (mode) {
2257 case L2CAP_MODE_STREAMING:
2258 case L2CAP_MODE_ERTM:
2259 if (l2cap_mode_supported(mode, remote_feat_mask))
2260 return mode;
2261 /* fall through */
2262 default:
2263 return L2CAP_MODE_BASIC;
2264 }
2265}
2266
1da177e4
LT
2267static int l2cap_build_conf_req(struct sock *sk, void *data)
2268{
2269 struct l2cap_pinfo *pi = l2cap_pi(sk);
2270 struct l2cap_conf_req *req = data;
a0e55a32 2271 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
1da177e4
LT
2272 void *ptr = req->data;
2273
2274 BT_DBG("sk %p", sk);
2275
f2fcfcd6
GP
2276 if (pi->num_conf_req || pi->num_conf_rsp)
2277 goto done;
2278
2279 switch (pi->mode) {
2280 case L2CAP_MODE_STREAMING:
2281 case L2CAP_MODE_ERTM:
2282 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
22121fc9
GP
2283 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2284 l2cap_send_disconn_req(pi->conn, sk);
f2fcfcd6
GP
2285 break;
2286 default:
2287 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2288 break;
2289 }
2290
2291done:
65c7c491
MH
2292 switch (pi->mode) {
2293 case L2CAP_MODE_BASIC:
2294 if (pi->imtu != L2CAP_DEFAULT_MTU)
2295 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->imtu);
2296 break;
2297
2298 case L2CAP_MODE_ERTM:
2299 rfc.mode = L2CAP_MODE_ERTM;
f2fcfcd6 2300 rfc.txwin_size = L2CAP_DEFAULT_TX_WINDOW;
5fbcd3d1 2301 rfc.max_transmit = max_transmit;
f2fcfcd6
GP
2302 rfc.retrans_timeout = 0;
2303 rfc.monitor_timeout = 0;
c74e560c 2304 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091
GP
2305 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
2306 rfc.max_pdu_size = pi->conn->mtu - 10;
f2fcfcd6
GP
2307
2308 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2309 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2310
2311 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2312 break;
2313
2314 if (pi->fcs == L2CAP_FCS_NONE ||
2315 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2316 pi->fcs = L2CAP_FCS_NONE;
2317 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2318 }
f2fcfcd6
GP
2319 break;
2320
2321 case L2CAP_MODE_STREAMING:
2322 rfc.mode = L2CAP_MODE_STREAMING;
2323 rfc.txwin_size = 0;
2324 rfc.max_transmit = 0;
2325 rfc.retrans_timeout = 0;
2326 rfc.monitor_timeout = 0;
c74e560c 2327 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091
GP
2328 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
2329 rfc.max_pdu_size = pi->conn->mtu - 10;
65c7c491
MH
2330
2331 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2332 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2333
2334 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2335 break;
2336
2337 if (pi->fcs == L2CAP_FCS_NONE ||
2338 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2339 pi->fcs = L2CAP_FCS_NONE;
2340 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2341 }
65c7c491
MH
2342 break;
2343 }
1da177e4
LT
2344
2345 /* FIXME: Need actual value of the flush timeout */
2346 //if (flush_to != L2CAP_DEFAULT_FLUSH_TO)
2347 // l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO, 2, pi->flush_to);
2348
aca3192c
YH
2349 req->dcid = cpu_to_le16(pi->dcid);
2350 req->flags = cpu_to_le16(0);
1da177e4
LT
2351
2352 return ptr - data;
2353}
2354
5dee9e7c 2355static int l2cap_parse_conf_req(struct sock *sk, void *data)
1da177e4
LT
2356{
2357 struct l2cap_pinfo *pi = l2cap_pi(sk);
5dee9e7c
MH
2358 struct l2cap_conf_rsp *rsp = data;
2359 void *ptr = rsp->data;
2360 void *req = pi->conf_req;
2361 int len = pi->conf_len;
2362 int type, hint, olen;
2363 unsigned long val;
6464f35f 2364 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
861d6882 2365 u16 mtu = L2CAP_DEFAULT_MTU;
5dee9e7c 2366 u16 result = L2CAP_CONF_SUCCESS;
1da177e4 2367
5dee9e7c 2368 BT_DBG("sk %p", sk);
820ae1b8 2369
5dee9e7c
MH
2370 while (len >= L2CAP_CONF_OPT_SIZE) {
2371 len -= l2cap_get_conf_opt(&req, &type, &olen, &val);
1da177e4 2372
589d2746 2373 hint = type & L2CAP_CONF_HINT;
47ec1dcd 2374 type &= L2CAP_CONF_MASK;
5dee9e7c
MH
2375
2376 switch (type) {
2377 case L2CAP_CONF_MTU:
861d6882 2378 mtu = val;
5dee9e7c
MH
2379 break;
2380
2381 case L2CAP_CONF_FLUSH_TO:
2382 pi->flush_to = val;
2383 break;
2384
2385 case L2CAP_CONF_QOS:
2386 break;
2387
6464f35f
MH
2388 case L2CAP_CONF_RFC:
2389 if (olen == sizeof(rfc))
2390 memcpy(&rfc, (void *) val, olen);
2391 break;
2392
fcc203c3
GP
2393 case L2CAP_CONF_FCS:
2394 if (val == L2CAP_FCS_NONE)
2395 pi->conf_state |= L2CAP_CONF_NO_FCS_RECV;
2396
2397 break;
2398
5dee9e7c
MH
2399 default:
2400 if (hint)
2401 break;
2402
2403 result = L2CAP_CONF_UNKNOWN;
2404 *((u8 *) ptr++) = type;
2405 break;
2406 }
2407 }
2408
f2fcfcd6
GP
2409 if (pi->num_conf_rsp || pi->num_conf_req)
2410 goto done;
2411
2412 switch (pi->mode) {
2413 case L2CAP_MODE_STREAMING:
2414 case L2CAP_MODE_ERTM:
2415 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
2416 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2417 return -ECONNREFUSED;
2418 break;
2419 default:
2420 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2421 break;
2422 }
2423
2424done:
2425 if (pi->mode != rfc.mode) {
2426 result = L2CAP_CONF_UNACCEPT;
2427 rfc.mode = pi->mode;
2428
2429 if (pi->num_conf_rsp == 1)
2430 return -ECONNREFUSED;
2431
2432 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2433 sizeof(rfc), (unsigned long) &rfc);
2434 }
2435
2436
5dee9e7c
MH
2437 if (result == L2CAP_CONF_SUCCESS) {
2438 /* Configure output options and let the other side know
2439 * which ones we don't like. */
2440
f2fcfcd6
GP
2441 if (mtu < L2CAP_DEFAULT_MIN_MTU)
2442 result = L2CAP_CONF_UNACCEPT;
2443 else {
2444 pi->omtu = mtu;
2445 pi->conf_state |= L2CAP_CONF_MTU_DONE;
2446 }
2447 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
6464f35f 2448
f2fcfcd6
GP
2449 switch (rfc.mode) {
2450 case L2CAP_MODE_BASIC:
2451 pi->fcs = L2CAP_FCS_NONE;
2452 pi->conf_state |= L2CAP_CONF_MODE_DONE;
2453 break;
2454
2455 case L2CAP_MODE_ERTM:
2456 pi->remote_tx_win = rfc.txwin_size;
2457 pi->remote_max_tx = rfc.max_transmit;
2458 pi->max_pdu_size = rfc.max_pdu_size;
2459
2460 rfc.retrans_timeout = L2CAP_DEFAULT_RETRANS_TO;
2461 rfc.monitor_timeout = L2CAP_DEFAULT_MONITOR_TO;
2462
2463 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2464
2465 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2466 sizeof(rfc), (unsigned long) &rfc);
2467
f2fcfcd6
GP
2468 break;
2469
2470 case L2CAP_MODE_STREAMING:
2471 pi->remote_tx_win = rfc.txwin_size;
2472 pi->max_pdu_size = rfc.max_pdu_size;
2473
2474 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2475
2476 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2477 sizeof(rfc), (unsigned long) &rfc);
2478
f2fcfcd6
GP
2479 break;
2480
2481 default:
5dee9e7c 2482 result = L2CAP_CONF_UNACCEPT;
5dee9e7c 2483
6464f35f 2484 memset(&rfc, 0, sizeof(rfc));
f2fcfcd6
GP
2485 rfc.mode = pi->mode;
2486 }
6464f35f 2487
f2fcfcd6
GP
2488 if (result == L2CAP_CONF_SUCCESS)
2489 pi->conf_state |= L2CAP_CONF_OUTPUT_DONE;
2490 }
5dee9e7c
MH
2491 rsp->scid = cpu_to_le16(pi->dcid);
2492 rsp->result = cpu_to_le16(result);
2493 rsp->flags = cpu_to_le16(0x0000);
2494
2495 return ptr - data;
1da177e4
LT
2496}
2497
f2fcfcd6
GP
2498static int l2cap_parse_conf_rsp(struct sock *sk, void *rsp, int len, void *data, u16 *result)
2499{
2500 struct l2cap_pinfo *pi = l2cap_pi(sk);
2501 struct l2cap_conf_req *req = data;
2502 void *ptr = req->data;
2503 int type, olen;
2504 unsigned long val;
2505 struct l2cap_conf_rfc rfc;
2506
2507 BT_DBG("sk %p, rsp %p, len %d, req %p", sk, rsp, len, data);
2508
2509 while (len >= L2CAP_CONF_OPT_SIZE) {
2510 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2511
2512 switch (type) {
2513 case L2CAP_CONF_MTU:
2514 if (val < L2CAP_DEFAULT_MIN_MTU) {
2515 *result = L2CAP_CONF_UNACCEPT;
2516 pi->omtu = L2CAP_DEFAULT_MIN_MTU;
2517 } else
2518 pi->omtu = val;
2519 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
2520 break;
2521
2522 case L2CAP_CONF_FLUSH_TO:
2523 pi->flush_to = val;
2524 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO,
2525 2, pi->flush_to);
2526 break;
2527
2528 case L2CAP_CONF_RFC:
2529 if (olen == sizeof(rfc))
2530 memcpy(&rfc, (void *)val, olen);
2531
2532 if ((pi->conf_state & L2CAP_CONF_STATE2_DEVICE) &&
2533 rfc.mode != pi->mode)
2534 return -ECONNREFUSED;
2535
2536 pi->mode = rfc.mode;
2537 pi->fcs = 0;
2538
2539 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2540 sizeof(rfc), (unsigned long) &rfc);
2541 break;
2542 }
2543 }
2544
2545 if (*result == L2CAP_CONF_SUCCESS) {
2546 switch (rfc.mode) {
2547 case L2CAP_MODE_ERTM:
2548 pi->remote_tx_win = rfc.txwin_size;
2549 pi->retrans_timeout = rfc.retrans_timeout;
2550 pi->monitor_timeout = rfc.monitor_timeout;
2551 pi->max_pdu_size = le16_to_cpu(rfc.max_pdu_size);
2552 break;
2553 case L2CAP_MODE_STREAMING:
2554 pi->max_pdu_size = le16_to_cpu(rfc.max_pdu_size);
2555 break;
2556 }
2557 }
2558
2559 req->dcid = cpu_to_le16(pi->dcid);
2560 req->flags = cpu_to_le16(0x0000);
2561
2562 return ptr - data;
2563}
2564
5dee9e7c 2565static int l2cap_build_conf_rsp(struct sock *sk, void *data, u16 result, u16 flags)
1da177e4
LT
2566{
2567 struct l2cap_conf_rsp *rsp = data;
2568 void *ptr = rsp->data;
1da177e4 2569
5dee9e7c 2570 BT_DBG("sk %p", sk);
1da177e4 2571
aca3192c 2572 rsp->scid = cpu_to_le16(l2cap_pi(sk)->dcid);
5dee9e7c 2573 rsp->result = cpu_to_le16(result);
aca3192c 2574 rsp->flags = cpu_to_le16(flags);
1da177e4
LT
2575
2576 return ptr - data;
2577}
2578
4e8402a3
MH
2579static inline int l2cap_command_rej(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2580{
2581 struct l2cap_cmd_rej *rej = (struct l2cap_cmd_rej *) data;
2582
2583 if (rej->reason != 0x0000)
2584 return 0;
2585
2586 if ((conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) &&
2587 cmd->ident == conn->info_ident) {
4e8402a3 2588 del_timer(&conn->info_timer);
984947dc
MH
2589
2590 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 2591 conn->info_ident = 0;
984947dc 2592
4e8402a3
MH
2593 l2cap_conn_start(conn);
2594 }
2595
2596 return 0;
2597}
2598
1da177e4
LT
2599static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2600{
2601 struct l2cap_chan_list *list = &conn->chan_list;
2602 struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
2603 struct l2cap_conn_rsp rsp;
2604 struct sock *sk, *parent;
e7c29cb1 2605 int result, status = L2CAP_CS_NO_INFO;
1da177e4
LT
2606
2607 u16 dcid = 0, scid = __le16_to_cpu(req->scid);
e7c29cb1 2608 __le16 psm = req->psm;
1da177e4
LT
2609
2610 BT_DBG("psm 0x%2.2x scid 0x%4.4x", psm, scid);
2611
2612 /* Check if we have socket listening on psm */
2613 parent = l2cap_get_sock_by_psm(BT_LISTEN, psm, conn->src);
2614 if (!parent) {
2615 result = L2CAP_CR_BAD_PSM;
2616 goto sendresp;
2617 }
2618
e7c29cb1
MH
2619 /* Check if the ACL is secure enough (if not SDP) */
2620 if (psm != cpu_to_le16(0x0001) &&
2621 !hci_conn_check_link_mode(conn->hcon)) {
2950f21a 2622 conn->disc_reason = 0x05;
e7c29cb1
MH
2623 result = L2CAP_CR_SEC_BLOCK;
2624 goto response;
2625 }
2626
1da177e4
LT
2627 result = L2CAP_CR_NO_MEM;
2628
2629 /* Check for backlog size */
2630 if (sk_acceptq_is_full(parent)) {
8e87d142 2631 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1da177e4
LT
2632 goto response;
2633 }
2634
3b1e0a65 2635 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP, GFP_ATOMIC);
1da177e4
LT
2636 if (!sk)
2637 goto response;
2638
fd1278d7 2639 write_lock_bh(&list->lock);
1da177e4
LT
2640
2641 /* Check if we already have channel with that dcid */
2642 if (__l2cap_get_chan_by_dcid(list, scid)) {
fd1278d7 2643 write_unlock_bh(&list->lock);
1da177e4
LT
2644 sock_set_flag(sk, SOCK_ZAPPED);
2645 l2cap_sock_kill(sk);
2646 goto response;
2647 }
2648
2649 hci_conn_hold(conn->hcon);
2650
2651 l2cap_sock_init(sk, parent);
2652 bacpy(&bt_sk(sk)->src, conn->src);
2653 bacpy(&bt_sk(sk)->dst, conn->dst);
2654 l2cap_pi(sk)->psm = psm;
2655 l2cap_pi(sk)->dcid = scid;
2656
2657 __l2cap_chan_add(conn, sk, parent);
2658 dcid = l2cap_pi(sk)->scid;
2659
2660 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
2661
1da177e4
LT
2662 l2cap_pi(sk)->ident = cmd->ident;
2663
984947dc 2664 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE) {
2af6b9d5 2665 if (l2cap_check_security(sk)) {
f66dc81f
MH
2666 if (bt_sk(sk)->defer_setup) {
2667 sk->sk_state = BT_CONNECT2;
2668 result = L2CAP_CR_PEND;
2669 status = L2CAP_CS_AUTHOR_PEND;
2670 parent->sk_data_ready(parent, 0);
2671 } else {
2672 sk->sk_state = BT_CONFIG;
2673 result = L2CAP_CR_SUCCESS;
2674 status = L2CAP_CS_NO_INFO;
2675 }
79d554a6
MH
2676 } else {
2677 sk->sk_state = BT_CONNECT2;
2678 result = L2CAP_CR_PEND;
2679 status = L2CAP_CS_AUTHEN_PEND;
2680 }
2681 } else {
2682 sk->sk_state = BT_CONNECT2;
2683 result = L2CAP_CR_PEND;
2684 status = L2CAP_CS_NO_INFO;
1da177e4
LT
2685 }
2686
fd1278d7 2687 write_unlock_bh(&list->lock);
1da177e4
LT
2688
2689response:
2690 bh_unlock_sock(parent);
2691
2692sendresp:
aca3192c
YH
2693 rsp.scid = cpu_to_le16(scid);
2694 rsp.dcid = cpu_to_le16(dcid);
2695 rsp.result = cpu_to_le16(result);
2696 rsp.status = cpu_to_le16(status);
1da177e4 2697 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONN_RSP, sizeof(rsp), &rsp);
79d554a6
MH
2698
2699 if (result == L2CAP_CR_PEND && status == L2CAP_CS_NO_INFO) {
2700 struct l2cap_info_req info;
2701 info.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
2702
2703 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
2704 conn->info_ident = l2cap_get_ident(conn);
2705
2706 mod_timer(&conn->info_timer, jiffies +
2707 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
2708
2709 l2cap_send_cmd(conn, conn->info_ident,
2710 L2CAP_INFO_REQ, sizeof(info), &info);
2711 }
2712
1da177e4
LT
2713 return 0;
2714}
2715
2716static inline int l2cap_connect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2717{
2718 struct l2cap_conn_rsp *rsp = (struct l2cap_conn_rsp *) data;
2719 u16 scid, dcid, result, status;
2720 struct sock *sk;
2721 u8 req[128];
2722
2723 scid = __le16_to_cpu(rsp->scid);
2724 dcid = __le16_to_cpu(rsp->dcid);
2725 result = __le16_to_cpu(rsp->result);
2726 status = __le16_to_cpu(rsp->status);
2727
2728 BT_DBG("dcid 0x%4.4x scid 0x%4.4x result 0x%2.2x status 0x%2.2x", dcid, scid, result, status);
2729
2730 if (scid) {
af05b30b
GP
2731 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2732 if (!sk)
1da177e4
LT
2733 return 0;
2734 } else {
af05b30b
GP
2735 sk = l2cap_get_chan_by_ident(&conn->chan_list, cmd->ident);
2736 if (!sk)
1da177e4
LT
2737 return 0;
2738 }
2739
2740 switch (result) {
2741 case L2CAP_CR_SUCCESS:
2742 sk->sk_state = BT_CONFIG;
2743 l2cap_pi(sk)->ident = 0;
2744 l2cap_pi(sk)->dcid = dcid;
2745 l2cap_pi(sk)->conf_state |= L2CAP_CONF_REQ_SENT;
2746
6a8d3010
MH
2747 l2cap_pi(sk)->conf_state &= ~L2CAP_CONF_CONNECT_PEND;
2748
1da177e4
LT
2749 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
2750 l2cap_build_conf_req(sk, req), req);
f2fcfcd6 2751 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2752 break;
2753
2754 case L2CAP_CR_PEND:
6a8d3010 2755 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
1da177e4
LT
2756 break;
2757
2758 default:
2759 l2cap_chan_del(sk, ECONNREFUSED);
2760 break;
2761 }
2762
2763 bh_unlock_sock(sk);
2764 return 0;
2765}
2766
88219a0f 2767static inline int l2cap_config_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u16 cmd_len, u8 *data)
1da177e4
LT
2768{
2769 struct l2cap_conf_req *req = (struct l2cap_conf_req *) data;
2770 u16 dcid, flags;
2771 u8 rsp[64];
2772 struct sock *sk;
5dee9e7c 2773 int len;
1da177e4
LT
2774
2775 dcid = __le16_to_cpu(req->dcid);
2776 flags = __le16_to_cpu(req->flags);
2777
2778 BT_DBG("dcid 0x%4.4x flags 0x%2.2x", dcid, flags);
2779
af05b30b
GP
2780 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2781 if (!sk)
1da177e4
LT
2782 return -ENOENT;
2783
354f60a9
MH
2784 if (sk->sk_state == BT_DISCONN)
2785 goto unlock;
2786
5dee9e7c 2787 /* Reject if config buffer is too small. */
88219a0f 2788 len = cmd_len - sizeof(*req);
5dee9e7c
MH
2789 if (l2cap_pi(sk)->conf_len + len > sizeof(l2cap_pi(sk)->conf_req)) {
2790 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
2791 l2cap_build_conf_rsp(sk, rsp,
2792 L2CAP_CONF_REJECT, flags), rsp);
2793 goto unlock;
2794 }
2795
2796 /* Store config. */
2797 memcpy(l2cap_pi(sk)->conf_req + l2cap_pi(sk)->conf_len, req->data, len);
2798 l2cap_pi(sk)->conf_len += len;
1da177e4
LT
2799
2800 if (flags & 0x0001) {
2801 /* Incomplete config. Send empty response. */
2802 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
5dee9e7c
MH
2803 l2cap_build_conf_rsp(sk, rsp,
2804 L2CAP_CONF_SUCCESS, 0x0001), rsp);
1da177e4
LT
2805 goto unlock;
2806 }
2807
2808 /* Complete config. */
5dee9e7c 2809 len = l2cap_parse_conf_req(sk, rsp);
f2fcfcd6 2810 if (len < 0) {
22121fc9 2811 l2cap_send_disconn_req(conn, sk);
1da177e4 2812 goto unlock;
f2fcfcd6 2813 }
1da177e4 2814
5dee9e7c 2815 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP, len, rsp);
f2fcfcd6 2816 l2cap_pi(sk)->num_conf_rsp++;
5dee9e7c 2817
5dee9e7c
MH
2818 /* Reset config buffer. */
2819 l2cap_pi(sk)->conf_len = 0;
2820
876d9484
MH
2821 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE))
2822 goto unlock;
2823
1da177e4 2824 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_INPUT_DONE) {
f64f9e71
JP
2825 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2826 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2827 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
2828
1da177e4 2829 sk->sk_state = BT_CONNECTED;
e90bac06 2830
0565c1c2
GP
2831 l2cap_pi(sk)->next_tx_seq = 0;
2832 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 2833 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
2834 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2835 l2cap_ertm_init(sk);
2836
1da177e4 2837 l2cap_chan_ready(sk);
876d9484
MH
2838 goto unlock;
2839 }
2840
2841 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_REQ_SENT)) {
79d554a6 2842 u8 buf[64];
1da177e4 2843 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
79d554a6 2844 l2cap_build_conf_req(sk, buf), buf);
f2fcfcd6 2845 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2846 }
2847
2848unlock:
2849 bh_unlock_sock(sk);
2850 return 0;
2851}
2852
2853static inline int l2cap_config_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2854{
2855 struct l2cap_conf_rsp *rsp = (struct l2cap_conf_rsp *)data;
2856 u16 scid, flags, result;
2857 struct sock *sk;
2858
2859 scid = __le16_to_cpu(rsp->scid);
2860 flags = __le16_to_cpu(rsp->flags);
2861 result = __le16_to_cpu(rsp->result);
2862
af05b30b
GP
2863 BT_DBG("scid 0x%4.4x flags 0x%2.2x result 0x%2.2x",
2864 scid, flags, result);
1da177e4 2865
af05b30b
GP
2866 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2867 if (!sk)
1da177e4
LT
2868 return 0;
2869
2870 switch (result) {
2871 case L2CAP_CONF_SUCCESS:
2872 break;
2873
2874 case L2CAP_CONF_UNACCEPT:
f2fcfcd6
GP
2875 if (l2cap_pi(sk)->num_conf_rsp <= L2CAP_CONF_MAX_CONF_RSP) {
2876 int len = cmd->len - sizeof(*rsp);
2877 char req[64];
2878
c2c77ec8
AE
2879 if (len > sizeof(req) - sizeof(struct l2cap_conf_req)) {
2880 l2cap_send_disconn_req(conn, sk);
2881 goto done;
2882 }
2883
f2fcfcd6
GP
2884 /* throw out any old stored conf requests */
2885 result = L2CAP_CONF_SUCCESS;
2886 len = l2cap_parse_conf_rsp(sk, rsp->data,
2887 len, req, &result);
2888 if (len < 0) {
22121fc9 2889 l2cap_send_disconn_req(conn, sk);
f2fcfcd6
GP
2890 goto done;
2891 }
2892
2893 l2cap_send_cmd(conn, l2cap_get_ident(conn),
2894 L2CAP_CONF_REQ, len, req);
2895 l2cap_pi(sk)->num_conf_req++;
2896 if (result != L2CAP_CONF_SUCCESS)
2897 goto done;
2898 break;
1da177e4
LT
2899 }
2900
8e87d142 2901 default:
1da177e4 2902 sk->sk_state = BT_DISCONN;
b1235d79 2903 sk->sk_err = ECONNRESET;
1da177e4 2904 l2cap_sock_set_timer(sk, HZ * 5);
22121fc9 2905 l2cap_send_disconn_req(conn, sk);
1da177e4
LT
2906 goto done;
2907 }
2908
2909 if (flags & 0x01)
2910 goto done;
2911
1da177e4
LT
2912 l2cap_pi(sk)->conf_state |= L2CAP_CONF_INPUT_DONE;
2913
2914 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE) {
f64f9e71
JP
2915 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2916 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2917 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
2918
1da177e4 2919 sk->sk_state = BT_CONNECTED;
0565c1c2 2920 l2cap_pi(sk)->next_tx_seq = 0;
1c2acffb 2921 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 2922 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
2923 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2924 l2cap_ertm_init(sk);
2925
1da177e4
LT
2926 l2cap_chan_ready(sk);
2927 }
2928
2929done:
2930 bh_unlock_sock(sk);
2931 return 0;
2932}
2933
2934static inline int l2cap_disconnect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2935{
2936 struct l2cap_disconn_req *req = (struct l2cap_disconn_req *) data;
2937 struct l2cap_disconn_rsp rsp;
2938 u16 dcid, scid;
2939 struct sock *sk;
2940
2941 scid = __le16_to_cpu(req->scid);
2942 dcid = __le16_to_cpu(req->dcid);
2943
2944 BT_DBG("scid 0x%4.4x dcid 0x%4.4x", scid, dcid);
2945
af05b30b
GP
2946 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2947 if (!sk)
1da177e4
LT
2948 return 0;
2949
aca3192c
YH
2950 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
2951 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1da177e4
LT
2952 l2cap_send_cmd(conn, cmd->ident, L2CAP_DISCONN_RSP, sizeof(rsp), &rsp);
2953
2954 sk->sk_shutdown = SHUTDOWN_MASK;
2955
1c2acffb 2956 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
2957
2958 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
2959 skb_queue_purge(SREJ_QUEUE(sk));
2960 del_timer(&l2cap_pi(sk)->retrans_timer);
2961 del_timer(&l2cap_pi(sk)->monitor_timer);
2962 }
1c2acffb 2963
1da177e4
LT
2964 l2cap_chan_del(sk, ECONNRESET);
2965 bh_unlock_sock(sk);
2966
2967 l2cap_sock_kill(sk);
2968 return 0;
2969}
2970
2971static inline int l2cap_disconnect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2972{
2973 struct l2cap_disconn_rsp *rsp = (struct l2cap_disconn_rsp *) data;
2974 u16 dcid, scid;
2975 struct sock *sk;
2976
2977 scid = __le16_to_cpu(rsp->scid);
2978 dcid = __le16_to_cpu(rsp->dcid);
2979
2980 BT_DBG("dcid 0x%4.4x scid 0x%4.4x", dcid, scid);
2981
af05b30b
GP
2982 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2983 if (!sk)
1da177e4
LT
2984 return 0;
2985
1c2acffb 2986 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
2987
2988 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
2989 skb_queue_purge(SREJ_QUEUE(sk));
2990 del_timer(&l2cap_pi(sk)->retrans_timer);
2991 del_timer(&l2cap_pi(sk)->monitor_timer);
2992 }
1c2acffb 2993
1da177e4
LT
2994 l2cap_chan_del(sk, 0);
2995 bh_unlock_sock(sk);
2996
2997 l2cap_sock_kill(sk);
2998 return 0;
2999}
3000
3001static inline int l2cap_information_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3002{
3003 struct l2cap_info_req *req = (struct l2cap_info_req *) data;
1da177e4
LT
3004 u16 type;
3005
3006 type = __le16_to_cpu(req->type);
3007
3008 BT_DBG("type 0x%4.4x", type);
3009
f0709e03
MH
3010 if (type == L2CAP_IT_FEAT_MASK) {
3011 u8 buf[8];
44dd46de 3012 u32 feat_mask = l2cap_feat_mask;
f0709e03
MH
3013 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3014 rsp->type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
3015 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
44dd46de 3016 if (enable_ertm)
fcc203c3
GP
3017 feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING
3018 | L2CAP_FEAT_FCS;
1b7bf4ed 3019 put_unaligned_le32(feat_mask, rsp->data);
f0709e03
MH
3020 l2cap_send_cmd(conn, cmd->ident,
3021 L2CAP_INFO_RSP, sizeof(buf), buf);
e1027a7c
MH
3022 } else if (type == L2CAP_IT_FIXED_CHAN) {
3023 u8 buf[12];
3024 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3025 rsp->type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3026 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
3027 memcpy(buf + 4, l2cap_fixed_chan, 8);
3028 l2cap_send_cmd(conn, cmd->ident,
3029 L2CAP_INFO_RSP, sizeof(buf), buf);
f0709e03
MH
3030 } else {
3031 struct l2cap_info_rsp rsp;
3032 rsp.type = cpu_to_le16(type);
3033 rsp.result = cpu_to_le16(L2CAP_IR_NOTSUPP);
3034 l2cap_send_cmd(conn, cmd->ident,
3035 L2CAP_INFO_RSP, sizeof(rsp), &rsp);
3036 }
1da177e4
LT
3037
3038 return 0;
3039}
3040
3041static inline int l2cap_information_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3042{
3043 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) data;
3044 u16 type, result;
3045
3046 type = __le16_to_cpu(rsp->type);
3047 result = __le16_to_cpu(rsp->result);
3048
3049 BT_DBG("type 0x%4.4x result 0x%2.2x", type, result);
3050
4e8402a3
MH
3051 del_timer(&conn->info_timer);
3052
984947dc 3053 if (type == L2CAP_IT_FEAT_MASK) {
83985319 3054 conn->feat_mask = get_unaligned_le32(rsp->data);
4e8402a3 3055
47ec1dcd 3056 if (conn->feat_mask & L2CAP_FEAT_FIXED_CHAN) {
e1027a7c
MH
3057 struct l2cap_info_req req;
3058 req.type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3059
3060 conn->info_ident = l2cap_get_ident(conn);
3061
3062 l2cap_send_cmd(conn, conn->info_ident,
3063 L2CAP_INFO_REQ, sizeof(req), &req);
3064 } else {
3065 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
3066 conn->info_ident = 0;
3067
3068 l2cap_conn_start(conn);
3069 }
3070 } else if (type == L2CAP_IT_FIXED_CHAN) {
984947dc 3071 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 3072 conn->info_ident = 0;
984947dc
MH
3073
3074 l2cap_conn_start(conn);
3075 }
4e8402a3 3076
1da177e4
LT
3077 return 0;
3078}
3079
3080static inline void l2cap_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
3081{
3082 u8 *data = skb->data;
3083 int len = skb->len;
3084 struct l2cap_cmd_hdr cmd;
3085 int err = 0;
3086
3087 l2cap_raw_recv(conn, skb);
3088
3089 while (len >= L2CAP_CMD_HDR_SIZE) {
88219a0f 3090 u16 cmd_len;
1da177e4
LT
3091 memcpy(&cmd, data, L2CAP_CMD_HDR_SIZE);
3092 data += L2CAP_CMD_HDR_SIZE;
3093 len -= L2CAP_CMD_HDR_SIZE;
3094
88219a0f 3095 cmd_len = le16_to_cpu(cmd.len);
1da177e4 3096
88219a0f 3097 BT_DBG("code 0x%2.2x len %d id 0x%2.2x", cmd.code, cmd_len, cmd.ident);
1da177e4 3098
88219a0f 3099 if (cmd_len > len || !cmd.ident) {
1da177e4
LT
3100 BT_DBG("corrupted command");
3101 break;
3102 }
3103
3104 switch (cmd.code) {
3105 case L2CAP_COMMAND_REJ:
4e8402a3 3106 l2cap_command_rej(conn, &cmd, data);
1da177e4
LT
3107 break;
3108
3109 case L2CAP_CONN_REQ:
3110 err = l2cap_connect_req(conn, &cmd, data);
3111 break;
3112
3113 case L2CAP_CONN_RSP:
3114 err = l2cap_connect_rsp(conn, &cmd, data);
3115 break;
3116
3117 case L2CAP_CONF_REQ:
88219a0f 3118 err = l2cap_config_req(conn, &cmd, cmd_len, data);
1da177e4
LT
3119 break;
3120
3121 case L2CAP_CONF_RSP:
3122 err = l2cap_config_rsp(conn, &cmd, data);
3123 break;
3124
3125 case L2CAP_DISCONN_REQ:
3126 err = l2cap_disconnect_req(conn, &cmd, data);
3127 break;
3128
3129 case L2CAP_DISCONN_RSP:
3130 err = l2cap_disconnect_rsp(conn, &cmd, data);
3131 break;
3132
3133 case L2CAP_ECHO_REQ:
88219a0f 3134 l2cap_send_cmd(conn, cmd.ident, L2CAP_ECHO_RSP, cmd_len, data);
1da177e4
LT
3135 break;
3136
3137 case L2CAP_ECHO_RSP:
3138 break;
3139
3140 case L2CAP_INFO_REQ:
3141 err = l2cap_information_req(conn, &cmd, data);
3142 break;
3143
3144 case L2CAP_INFO_RSP:
3145 err = l2cap_information_rsp(conn, &cmd, data);
3146 break;
3147
3148 default:
3149 BT_ERR("Unknown signaling command 0x%2.2x", cmd.code);
3150 err = -EINVAL;
3151 break;
3152 }
3153
3154 if (err) {
3155 struct l2cap_cmd_rej rej;
3156 BT_DBG("error %d", err);
3157
3158 /* FIXME: Map err to a valid reason */
aca3192c 3159 rej.reason = cpu_to_le16(0);
1da177e4
LT
3160 l2cap_send_cmd(conn, cmd.ident, L2CAP_COMMAND_REJ, sizeof(rej), &rej);
3161 }
3162
88219a0f
AV
3163 data += cmd_len;
3164 len -= cmd_len;
1da177e4
LT
3165 }
3166
3167 kfree_skb(skb);
3168}
3169
fcc203c3
GP
3170static int l2cap_check_fcs(struct l2cap_pinfo *pi, struct sk_buff *skb)
3171{
3172 u16 our_fcs, rcv_fcs;
3173 int hdr_size = L2CAP_HDR_SIZE + 2;
3174
3175 if (pi->fcs == L2CAP_FCS_CRC16) {
3176 skb_trim(skb, skb->len - 2);
3177 rcv_fcs = get_unaligned_le16(skb->data + skb->len);
3178 our_fcs = crc16(0, skb->data - hdr_size, skb->len + hdr_size);
3179
3180 if (our_fcs != rcv_fcs)
3181 return -EINVAL;
3182 }
3183 return 0;
3184}
3185
d5392c8f
GP
3186static inline void l2cap_send_i_or_rr_or_rnr(struct sock *sk)
3187{
3188 struct l2cap_pinfo *pi = l2cap_pi(sk);
3189 u16 control = 0;
3190
3191 pi->frames_sent = 0;
3192 pi->conn_state |= L2CAP_CONN_SEND_FBIT;
3193
3194 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3195
3196 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
3197 control |= L2CAP_SUPER_RCV_NOT_READY | L2CAP_CTRL_FINAL;
3198 l2cap_send_sframe(pi, control);
3199 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
3200 }
3201
3202 if (pi->conn_state & L2CAP_CONN_REMOTE_BUSY && pi->unacked_frames > 0)
3203 __mod_retrans_timer();
3204
3205 l2cap_ertm_send(sk);
3206
3207 if (!(pi->conn_state & L2CAP_CONN_LOCAL_BUSY) &&
3208 pi->frames_sent == 0) {
3209 control |= L2CAP_SUPER_RCV_READY;
d5392c8f
GP
3210 l2cap_send_sframe(pi, control);
3211 }
3212}
3213
8f17154f
GP
3214static void l2cap_add_to_srej_queue(struct sock *sk, struct sk_buff *skb, u8 tx_seq, u8 sar)
3215{
3216 struct sk_buff *next_skb;
3217
3218 bt_cb(skb)->tx_seq = tx_seq;
3219 bt_cb(skb)->sar = sar;
3220
3221 next_skb = skb_peek(SREJ_QUEUE(sk));
3222 if (!next_skb) {
3223 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3224 return;
3225 }
3226
3227 do {
3228 if (bt_cb(next_skb)->tx_seq > tx_seq) {
3229 __skb_queue_before(SREJ_QUEUE(sk), next_skb, skb);
3230 return;
3231 }
3232
3233 if (skb_queue_is_last(SREJ_QUEUE(sk), next_skb))
3234 break;
3235
3236 } while((next_skb = skb_queue_next(SREJ_QUEUE(sk), next_skb)));
3237
3238 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3239}
3240
c74e560c
GP
3241static int l2cap_sar_reassembly_sdu(struct sock *sk, struct sk_buff *skb, u16 control)
3242{
3243 struct l2cap_pinfo *pi = l2cap_pi(sk);
3244 struct sk_buff *_skb;
3245 int err = -EINVAL;
3246
3247 switch (control & L2CAP_CTRL_SAR) {
3248 case L2CAP_SDU_UNSEGMENTED:
3249 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3250 kfree_skb(pi->sdu);
3251 break;
3252 }
3253
3254 err = sock_queue_rcv_skb(sk, skb);
3255 if (!err)
3256 return 0;
3257
3258 break;
3259
3260 case L2CAP_SDU_START:
3261 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3262 kfree_skb(pi->sdu);
3263 break;
3264 }
3265
3266 pi->sdu_len = get_unaligned_le16(skb->data);
3267 skb_pull(skb, 2);
3268
3269 pi->sdu = bt_skb_alloc(pi->sdu_len, GFP_ATOMIC);
3270 if (!pi->sdu) {
3271 err = -ENOMEM;
3272 break;
3273 }
3274
3275 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3276
3277 pi->conn_state |= L2CAP_CONN_SAR_SDU;
3278 pi->partial_sdu_len = skb->len;
3279 err = 0;
3280 break;
3281
3282 case L2CAP_SDU_CONTINUE:
3283 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3284 break;
3285
3286 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3287
3288 pi->partial_sdu_len += skb->len;
3289 if (pi->partial_sdu_len > pi->sdu_len)
3290 kfree_skb(pi->sdu);
3291 else
3292 err = 0;
3293
3294 break;
3295
3296 case L2CAP_SDU_END:
3297 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3298 break;
3299
3300 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3301
3302 pi->conn_state &= ~L2CAP_CONN_SAR_SDU;
3303 pi->partial_sdu_len += skb->len;
3304
36f2fd58
GP
3305 if (pi->partial_sdu_len > pi->imtu)
3306 goto drop;
3307
c74e560c
GP
3308 if (pi->partial_sdu_len == pi->sdu_len) {
3309 _skb = skb_clone(pi->sdu, GFP_ATOMIC);
3310 err = sock_queue_rcv_skb(sk, _skb);
3311 if (err < 0)
3312 kfree_skb(_skb);
3313 }
c74e560c
GP
3314 err = 0;
3315
36f2fd58
GP
3316drop:
3317 kfree_skb(pi->sdu);
c74e560c
GP
3318 break;
3319 }
3320
3321 kfree_skb(skb);
3322 return err;
3323}
3324
8f17154f
GP
3325static void l2cap_check_srej_gap(struct sock *sk, u8 tx_seq)
3326{
3327 struct sk_buff *skb;
3328 u16 control = 0;
3329
3330 while((skb = skb_peek(SREJ_QUEUE(sk)))) {
3331 if (bt_cb(skb)->tx_seq != tx_seq)
3332 break;
3333
3334 skb = skb_dequeue(SREJ_QUEUE(sk));
3335 control |= bt_cb(skb)->sar << L2CAP_CTRL_SAR_SHIFT;
3336 l2cap_sar_reassembly_sdu(sk, skb, control);
3337 l2cap_pi(sk)->buffer_seq_srej =
3338 (l2cap_pi(sk)->buffer_seq_srej + 1) % 64;
3339 tx_seq++;
3340 }
3341}
3342
3343static void l2cap_resend_srejframe(struct sock *sk, u8 tx_seq)
3344{
3345 struct l2cap_pinfo *pi = l2cap_pi(sk);
3346 struct srej_list *l, *tmp;
3347 u16 control;
3348
3349 list_for_each_entry_safe(l,tmp, SREJ_LIST(sk), list) {
3350 if (l->tx_seq == tx_seq) {
3351 list_del(&l->list);
3352 kfree(l);
3353 return;
3354 }
3355 control = L2CAP_SUPER_SELECT_REJECT;
3356 control |= l->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3357 l2cap_send_sframe(pi, control);
3358 list_del(&l->list);
3359 list_add_tail(&l->list, SREJ_LIST(sk));
3360 }
3361}
3362
3363static void l2cap_send_srejframe(struct sock *sk, u8 tx_seq)
3364{
3365 struct l2cap_pinfo *pi = l2cap_pi(sk);
3366 struct srej_list *new;
3367 u16 control;
3368
3369 while (tx_seq != pi->expected_tx_seq) {
3370 control = L2CAP_SUPER_SELECT_REJECT;
3371 control |= pi->expected_tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3372 l2cap_send_sframe(pi, control);
3373
3374 new = kzalloc(sizeof(struct srej_list), GFP_ATOMIC);
3375 new->tx_seq = pi->expected_tx_seq++;
3376 list_add_tail(&new->list, SREJ_LIST(sk));
3377 }
3378 pi->expected_tx_seq++;
3379}
3380
1c2acffb
GP
3381static inline int l2cap_data_channel_iframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3382{
3383 struct l2cap_pinfo *pi = l2cap_pi(sk);
3384 u8 tx_seq = __get_txseq(rx_control);
9f121a5a 3385 u8 req_seq = __get_reqseq(rx_control);
8f17154f 3386 u8 sar = rx_control >> L2CAP_CTRL_SAR_SHIFT;
1c2acffb
GP
3387 int err = 0;
3388
3389 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3390
1d8f5d16
GP
3391 if (L2CAP_CTRL_FINAL & rx_control) {
3392 del_timer(&pi->monitor_timer);
3393 if (pi->unacked_frames > 0)
3394 __mod_retrans_timer();
3395 pi->conn_state &= ~L2CAP_CONN_WAIT_F;
3396 }
3397
9f121a5a
GP
3398 pi->expected_ack_seq = req_seq;
3399 l2cap_drop_acked_frames(sk);
3400
8f17154f
GP
3401 if (tx_seq == pi->expected_tx_seq)
3402 goto expected;
1c2acffb 3403
8f17154f
GP
3404 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3405 struct srej_list *first;
30afb5b2 3406
8f17154f
GP
3407 first = list_first_entry(SREJ_LIST(sk),
3408 struct srej_list, list);
3409 if (tx_seq == first->tx_seq) {
3410 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3411 l2cap_check_srej_gap(sk, tx_seq);
3412
3413 list_del(&first->list);
3414 kfree(first);
3415
3416 if (list_empty(SREJ_LIST(sk))) {
3417 pi->buffer_seq = pi->buffer_seq_srej;
3418 pi->conn_state &= ~L2CAP_CONN_SREJ_SENT;
3419 }
3420 } else {
3421 struct srej_list *l;
3422 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3423
3424 list_for_each_entry(l, SREJ_LIST(sk), list) {
3425 if (l->tx_seq == tx_seq) {
3426 l2cap_resend_srejframe(sk, tx_seq);
3427 return 0;
3428 }
3429 }
3430 l2cap_send_srejframe(sk, tx_seq);
30afb5b2
GP
3431 }
3432 } else {
8f17154f 3433 pi->conn_state |= L2CAP_CONN_SREJ_SENT;
1c2acffb 3434
8f17154f
GP
3435 INIT_LIST_HEAD(SREJ_LIST(sk));
3436 pi->buffer_seq_srej = pi->buffer_seq;
3437
3438 __skb_queue_head_init(SREJ_QUEUE(sk));
3439 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3440
ef54fd93
GP
3441 pi->conn_state |= L2CAP_CONN_SEND_PBIT;
3442
8f17154f 3443 l2cap_send_srejframe(sk, tx_seq);
1c2acffb 3444 }
30afb5b2
GP
3445 return 0;
3446
8f17154f
GP
3447expected:
3448 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3449
3450 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3451 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3452 return 0;
3453 }
3454
4ec10d97
GP
3455 if (rx_control & L2CAP_CTRL_FINAL) {
3456 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3457 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3458 else {
3459 sk->sk_send_head = TX_QUEUE(sk)->next;
3460 pi->next_tx_seq = pi->expected_ack_seq;
3461 l2cap_ertm_send(sk);
3462 }
3463 }
3464
8f17154f
GP
3465 pi->buffer_seq = (pi->buffer_seq + 1) % 64;
3466
3467 err = l2cap_sar_reassembly_sdu(sk, skb, rx_control);
3468 if (err < 0)
3469 return err;
3470
3471 pi->num_to_ack = (pi->num_to_ack + 1) % L2CAP_DEFAULT_NUM_TO_ACK;
9e917af1
GP
3472 if (pi->num_to_ack == L2CAP_DEFAULT_NUM_TO_ACK - 1)
3473 l2cap_send_ack(pi);
3474
8f17154f 3475 return 0;
1c2acffb
GP
3476}
3477
3478static inline int l2cap_data_channel_sframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3479{
3480 struct l2cap_pinfo *pi = l2cap_pi(sk);
8f17154f 3481 u8 tx_seq = __get_reqseq(rx_control);
1c2acffb
GP
3482
3483 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3484
1d8f5d16
GP
3485 if (L2CAP_CTRL_FINAL & rx_control) {
3486 del_timer(&pi->monitor_timer);
3487 if (pi->unacked_frames > 0)
3488 __mod_retrans_timer();
3489 pi->conn_state &= ~L2CAP_CONN_WAIT_F;
3490 }
3491
1c2acffb
GP
3492 switch (rx_control & L2CAP_CTRL_SUPERVISE) {
3493 case L2CAP_SUPER_RCV_READY:
e90bac06 3494 if (rx_control & L2CAP_CTRL_POLL) {
d5392c8f 3495 l2cap_send_i_or_rr_or_rnr(sk);
2246b2f1
GP
3496 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3497
e90bac06 3498 } else if (rx_control & L2CAP_CTRL_FINAL) {
2246b2f1 3499 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
ca42a613
GP
3500 pi->expected_ack_seq = tx_seq;
3501 l2cap_drop_acked_frames(sk);
3502
4ec10d97
GP
3503 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3504 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3505 else {
3506 sk->sk_send_head = TX_QUEUE(sk)->next;
3507 pi->next_tx_seq = pi->expected_ack_seq;
3508 l2cap_ertm_send(sk);
3509 }
3510
e90bac06 3511 } else {
8f17154f 3512 pi->expected_ack_seq = tx_seq;
e90bac06 3513 l2cap_drop_acked_frames(sk);
2246b2f1 3514
f64f9e71
JP
3515 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3516 (pi->unacked_frames > 0))
e90bac06 3517 __mod_retrans_timer();
2246b2f1 3518
2246b2f1 3519 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
73edaa99
GP
3520 if (pi->conn_state & L2CAP_CONN_SREJ_SENT)
3521 l2cap_send_ack(pi);
3522 else
3523 l2cap_ertm_send(sk);
e90bac06 3524 }
1c2acffb
GP
3525 break;
3526
1c2acffb 3527 case L2CAP_SUPER_REJECT:
2246b2f1
GP
3528 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3529
30afb5b2
GP
3530 pi->expected_ack_seq = __get_reqseq(rx_control);
3531 l2cap_drop_acked_frames(sk);
3532
4ec10d97
GP
3533 if (rx_control & L2CAP_CTRL_FINAL) {
3534 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3535 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3536 else {
3537 sk->sk_send_head = TX_QUEUE(sk)->next;
3538 pi->next_tx_seq = pi->expected_ack_seq;
3539 l2cap_ertm_send(sk);
3540 }
3541 } else {
3542 sk->sk_send_head = TX_QUEUE(sk)->next;
3543 pi->next_tx_seq = pi->expected_ack_seq;
3544 l2cap_ertm_send(sk);
30afb5b2 3545
4ec10d97
GP
3546 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3547 pi->srej_save_reqseq = tx_seq;
3548 pi->conn_state |= L2CAP_CONN_REJ_ACT;
3549 }
3550 }
30afb5b2
GP
3551
3552 break;
3553
1c2acffb 3554 case L2CAP_SUPER_SELECT_REJECT:
2246b2f1
GP
3555 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3556
ef54fd93 3557 if (rx_control & L2CAP_CTRL_POLL) {
ef54fd93
GP
3558 pi->expected_ack_seq = tx_seq;
3559 l2cap_drop_acked_frames(sk);
186ee8cf 3560 l2cap_retransmit_frame(sk, tx_seq);
ef54fd93
GP
3561 l2cap_ertm_send(sk);
3562 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3563 pi->srej_save_reqseq = tx_seq;
3564 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
3565 }
3566 } else if (rx_control & L2CAP_CTRL_FINAL) {
3567 if ((pi->conn_state & L2CAP_CONN_SREJ_ACT) &&
3568 pi->srej_save_reqseq == tx_seq)
889a3ca4 3569 pi->conn_state &= ~L2CAP_CONN_SREJ_ACT;
ef54fd93
GP
3570 else
3571 l2cap_retransmit_frame(sk, tx_seq);
3572 }
3573 else {
3574 l2cap_retransmit_frame(sk, tx_seq);
3575 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3576 pi->srej_save_reqseq = tx_seq;
3577 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
3578 }
3579 }
8f17154f
GP
3580 break;
3581
3582 case L2CAP_SUPER_RCV_NOT_READY:
2246b2f1
GP
3583 pi->conn_state |= L2CAP_CONN_REMOTE_BUSY;
3584 pi->expected_ack_seq = tx_seq;
3585 l2cap_drop_acked_frames(sk);
3586
e8235c6b 3587 del_timer(&pi->retrans_timer);
2246b2f1 3588 if (rx_control & L2CAP_CTRL_POLL) {
7e743090 3589 u16 control = L2CAP_CTRL_FINAL;
e8235c6b 3590 l2cap_send_rr_or_rnr(pi, control);
2246b2f1 3591 }
1c2acffb
GP
3592 break;
3593 }
3594
faaebd19 3595 kfree_skb(skb);
1c2acffb
GP
3596 return 0;
3597}
3598
1da177e4
LT
3599static inline int l2cap_data_channel(struct l2cap_conn *conn, u16 cid, struct sk_buff *skb)
3600{
3601 struct sock *sk;
6840ed07 3602 struct l2cap_pinfo *pi;
c74e560c 3603 u16 control, len;
6840ed07 3604 u8 tx_seq;
1da177e4
LT
3605
3606 sk = l2cap_get_chan_by_scid(&conn->chan_list, cid);
3607 if (!sk) {
3608 BT_DBG("unknown cid 0x%4.4x", cid);
3609 goto drop;
3610 }
3611
6840ed07
GP
3612 pi = l2cap_pi(sk);
3613
1da177e4
LT
3614 BT_DBG("sk %p, len %d", sk, skb->len);
3615
3616 if (sk->sk_state != BT_CONNECTED)
3617 goto drop;
3618
6840ed07 3619 switch (pi->mode) {
1c2acffb
GP
3620 case L2CAP_MODE_BASIC:
3621 /* If socket recv buffers overflows we drop data here
3622 * which is *bad* because L2CAP has to be reliable.
3623 * But we don't have any other choice. L2CAP doesn't
3624 * provide flow control mechanism. */
1da177e4 3625
6840ed07 3626 if (pi->imtu < skb->len)
1c2acffb 3627 goto drop;
1da177e4 3628
1c2acffb
GP
3629 if (!sock_queue_rcv_skb(sk, skb))
3630 goto done;
3631 break;
3632
3633 case L2CAP_MODE_ERTM:
3634 control = get_unaligned_le16(skb->data);
3635 skb_pull(skb, 2);
c74e560c 3636 len = skb->len;
1c2acffb 3637
c74e560c
GP
3638 if (__is_sar_start(control))
3639 len -= 2;
3640
fcc203c3
GP
3641 if (pi->fcs == L2CAP_FCS_CRC16)
3642 len -= 2;
3643
30afb5b2
GP
3644 /*
3645 * We can just drop the corrupted I-frame here.
3646 * Receiver will miss it and start proper recovery
3647 * procedures and ask retransmission.
3648 */
c74e560c 3649 if (len > L2CAP_DEFAULT_MAX_PDU_SIZE)
1c2acffb
GP
3650 goto drop;
3651
fcc203c3
GP
3652 if (l2cap_check_fcs(pi, skb))
3653 goto drop;
3654
277ffbe3
GP
3655 if (__is_iframe(control)) {
3656 if (len < 4)
3657 goto drop;
3658
fcafde2e 3659 l2cap_data_channel_iframe(sk, control, skb);
277ffbe3
GP
3660 } else {
3661 if (len != 0)
3662 goto drop;
3663
fcafde2e 3664 l2cap_data_channel_sframe(sk, control, skb);
277ffbe3 3665 }
1c2acffb 3666
fcafde2e 3667 goto done;
1c2acffb 3668
6840ed07
GP
3669 case L2CAP_MODE_STREAMING:
3670 control = get_unaligned_le16(skb->data);
3671 skb_pull(skb, 2);
3672 len = skb->len;
3673
3674 if (__is_sar_start(control))
3675 len -= 2;
3676
fcc203c3
GP
3677 if (pi->fcs == L2CAP_FCS_CRC16)
3678 len -= 2;
3679
277ffbe3
GP
3680 if (len > L2CAP_DEFAULT_MAX_PDU_SIZE || len < 4
3681 || __is_sframe(control))
6840ed07
GP
3682 goto drop;
3683
fcc203c3
GP
3684 if (l2cap_check_fcs(pi, skb))
3685 goto drop;
3686
6840ed07
GP
3687 tx_seq = __get_txseq(control);
3688
3689 if (pi->expected_tx_seq == tx_seq)
3690 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3691 else
7dffe421 3692 pi->expected_tx_seq = (tx_seq + 1) % 64;
6840ed07 3693
fcafde2e 3694 l2cap_sar_reassembly_sdu(sk, skb, control);
6840ed07
GP
3695
3696 goto done;
3697
1c2acffb 3698 default:
e8235c6b 3699 BT_DBG("sk %p: bad mode 0x%2.2x", sk, pi->mode);
1c2acffb
GP
3700 break;
3701 }
1da177e4
LT
3702
3703drop:
3704 kfree_skb(skb);
3705
3706done:
0139418c
MH
3707 if (sk)
3708 bh_unlock_sock(sk);
3709
1da177e4
LT
3710 return 0;
3711}
3712
8e036fc3 3713static inline int l2cap_conless_channel(struct l2cap_conn *conn, __le16 psm, struct sk_buff *skb)
1da177e4
LT
3714{
3715 struct sock *sk;
3716
3717 sk = l2cap_get_sock_by_psm(0, psm, conn->src);
3718 if (!sk)
3719 goto drop;
3720
3721 BT_DBG("sk %p, len %d", sk, skb->len);
3722
3723 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_CONNECTED)
3724 goto drop;
3725
3726 if (l2cap_pi(sk)->imtu < skb->len)
3727 goto drop;
3728
3729 if (!sock_queue_rcv_skb(sk, skb))
3730 goto done;
3731
3732drop:
3733 kfree_skb(skb);
3734
3735done:
af05b30b
GP
3736 if (sk)
3737 bh_unlock_sock(sk);
1da177e4
LT
3738 return 0;
3739}
3740
3741static void l2cap_recv_frame(struct l2cap_conn *conn, struct sk_buff *skb)
3742{
3743 struct l2cap_hdr *lh = (void *) skb->data;
8e036fc3
AV
3744 u16 cid, len;
3745 __le16 psm;
1da177e4
LT
3746
3747 skb_pull(skb, L2CAP_HDR_SIZE);
3748 cid = __le16_to_cpu(lh->cid);
3749 len = __le16_to_cpu(lh->len);
3750
1c2acffb
GP
3751 if (len != skb->len) {
3752 kfree_skb(skb);
3753 return;
3754 }
3755
1da177e4
LT
3756 BT_DBG("len %d, cid 0x%4.4x", len, cid);
3757
3758 switch (cid) {
8db4dc46 3759 case L2CAP_CID_SIGNALING:
1da177e4
LT
3760 l2cap_sig_channel(conn, skb);
3761 break;
3762
8db4dc46 3763 case L2CAP_CID_CONN_LESS:
1b7bf4ed 3764 psm = get_unaligned_le16(skb->data);
1da177e4
LT
3765 skb_pull(skb, 2);
3766 l2cap_conless_channel(conn, psm, skb);
3767 break;
3768
3769 default:
3770 l2cap_data_channel(conn, cid, skb);
3771 break;
3772 }
3773}
3774
3775/* ---- L2CAP interface with lower layer (HCI) ---- */
3776
3777static int l2cap_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3778{
3779 int exact = 0, lm1 = 0, lm2 = 0;
3780 register struct sock *sk;
3781 struct hlist_node *node;
3782
3783 if (type != ACL_LINK)
3784 return 0;
3785
3786 BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr));
3787
3788 /* Find listening sockets and check their link_mode */
3789 read_lock(&l2cap_sk_list.lock);
3790 sk_for_each(sk, node, &l2cap_sk_list.head) {
3791 if (sk->sk_state != BT_LISTEN)
3792 continue;
3793
3794 if (!bacmp(&bt_sk(sk)->src, &hdev->bdaddr)) {
2af6b9d5
MH
3795 lm1 |= HCI_LM_ACCEPT;
3796 if (l2cap_pi(sk)->role_switch)
3797 lm1 |= HCI_LM_MASTER;
1da177e4 3798 exact++;
2af6b9d5
MH
3799 } else if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY)) {
3800 lm2 |= HCI_LM_ACCEPT;
3801 if (l2cap_pi(sk)->role_switch)
3802 lm2 |= HCI_LM_MASTER;
3803 }
1da177e4
LT
3804 }
3805 read_unlock(&l2cap_sk_list.lock);
3806
3807 return exact ? lm1 : lm2;
3808}
3809
3810static int l2cap_connect_cfm(struct hci_conn *hcon, u8 status)
3811{
0139418c
MH
3812 struct l2cap_conn *conn;
3813
1da177e4
LT
3814 BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status);
3815
3816 if (hcon->type != ACL_LINK)
3817 return 0;
3818
3819 if (!status) {
1da177e4
LT
3820 conn = l2cap_conn_add(hcon, status);
3821 if (conn)
3822 l2cap_conn_ready(conn);
0139418c 3823 } else
1da177e4
LT
3824 l2cap_conn_del(hcon, bt_err(status));
3825
3826 return 0;
3827}
3828
2950f21a
MH
3829static int l2cap_disconn_ind(struct hci_conn *hcon)
3830{
3831 struct l2cap_conn *conn = hcon->l2cap_data;
3832
3833 BT_DBG("hcon %p", hcon);
3834
3835 if (hcon->type != ACL_LINK || !conn)
3836 return 0x13;
3837
3838 return conn->disc_reason;
3839}
3840
3841static int l2cap_disconn_cfm(struct hci_conn *hcon, u8 reason)
1da177e4
LT
3842{
3843 BT_DBG("hcon %p reason %d", hcon, reason);
3844
3845 if (hcon->type != ACL_LINK)
3846 return 0;
3847
3848 l2cap_conn_del(hcon, bt_err(reason));
0139418c 3849
1da177e4
LT
3850 return 0;
3851}
3852
f62e4323
MH
3853static inline void l2cap_check_encryption(struct sock *sk, u8 encrypt)
3854{
255c7601
MH
3855 if (sk->sk_type != SOCK_SEQPACKET)
3856 return;
3857
f62e4323
MH
3858 if (encrypt == 0x00) {
3859 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM) {
3860 l2cap_sock_clear_timer(sk);
3861 l2cap_sock_set_timer(sk, HZ * 5);
3862 } else if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
3863 __l2cap_sock_close(sk, ECONNREFUSED);
3864 } else {
3865 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM)
3866 l2cap_sock_clear_timer(sk);
3867 }
3868}
3869
8c1b2355 3870static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
1da177e4
LT
3871{
3872 struct l2cap_chan_list *l;
0139418c 3873 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 3874 struct sock *sk;
1da177e4 3875
0139418c 3876 if (!conn)
1da177e4 3877 return 0;
0139418c 3878
1da177e4
LT
3879 l = &conn->chan_list;
3880
3881 BT_DBG("conn %p", conn);
3882
3883 read_lock(&l->lock);
3884
3885 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
3886 bh_lock_sock(sk);
3887
6a8d3010
MH
3888 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_CONNECT_PEND) {
3889 bh_unlock_sock(sk);
3890 continue;
3891 }
3892
f62e4323 3893 if (!status && (sk->sk_state == BT_CONNECTED ||
8c1b2355 3894 sk->sk_state == BT_CONFIG)) {
f62e4323 3895 l2cap_check_encryption(sk, encrypt);
9719f8af
MH
3896 bh_unlock_sock(sk);
3897 continue;
3898 }
3899
b1235d79
MH
3900 if (sk->sk_state == BT_CONNECT) {
3901 if (!status) {
3902 struct l2cap_conn_req req;
3903 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
3904 req.psm = l2cap_pi(sk)->psm;
1da177e4 3905
b1235d79 3906 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
1da177e4 3907
b1235d79
MH
3908 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
3909 L2CAP_CONN_REQ, sizeof(req), &req);
3910 } else {
3911 l2cap_sock_clear_timer(sk);
3912 l2cap_sock_set_timer(sk, HZ / 10);
3913 }
3914 } else if (sk->sk_state == BT_CONNECT2) {
3915 struct l2cap_conn_rsp rsp;
3916 __u16 result;
1da177e4 3917
b1235d79
MH
3918 if (!status) {
3919 sk->sk_state = BT_CONFIG;
3920 result = L2CAP_CR_SUCCESS;
3921 } else {
3922 sk->sk_state = BT_DISCONN;
3923 l2cap_sock_set_timer(sk, HZ / 10);
3924 result = L2CAP_CR_SEC_BLOCK;
3925 }
3926
3927 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
3928 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
3929 rsp.result = cpu_to_le16(result);
e7c29cb1 3930 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
b1235d79
MH
3931 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
3932 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
3933 }
1da177e4
LT
3934
3935 bh_unlock_sock(sk);
3936 }
3937
3938 read_unlock(&l->lock);
b1235d79 3939
1da177e4
LT
3940 return 0;
3941}
3942
3943static int l2cap_recv_acldata(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
3944{
3945 struct l2cap_conn *conn = hcon->l2cap_data;
3946
3947 if (!conn && !(conn = l2cap_conn_add(hcon, 0)))
3948 goto drop;
3949
3950 BT_DBG("conn %p len %d flags 0x%x", conn, skb->len, flags);
3951
3952 if (flags & ACL_START) {
3953 struct l2cap_hdr *hdr;
3954 int len;
3955
3956 if (conn->rx_len) {
3957 BT_ERR("Unexpected start frame (len %d)", skb->len);
3958 kfree_skb(conn->rx_skb);
3959 conn->rx_skb = NULL;
3960 conn->rx_len = 0;
3961 l2cap_conn_unreliable(conn, ECOMM);
3962 }
3963
3964 if (skb->len < 2) {
3965 BT_ERR("Frame is too short (len %d)", skb->len);
3966 l2cap_conn_unreliable(conn, ECOMM);
3967 goto drop;
3968 }
3969
3970 hdr = (struct l2cap_hdr *) skb->data;
3971 len = __le16_to_cpu(hdr->len) + L2CAP_HDR_SIZE;
3972
3973 if (len == skb->len) {
3974 /* Complete frame received */
3975 l2cap_recv_frame(conn, skb);
3976 return 0;
3977 }
3978
3979 BT_DBG("Start: total len %d, frag len %d", len, skb->len);
3980
3981 if (skb->len > len) {
3982 BT_ERR("Frame is too long (len %d, expected len %d)",
3983 skb->len, len);
3984 l2cap_conn_unreliable(conn, ECOMM);
3985 goto drop;
3986 }
3987
3988 /* Allocate skb for the complete frame (with header) */
af05b30b
GP
3989 conn->rx_skb = bt_skb_alloc(len, GFP_ATOMIC);
3990 if (!conn->rx_skb)
1da177e4
LT
3991 goto drop;
3992
d626f62b 3993 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 3994 skb->len);
1da177e4
LT
3995 conn->rx_len = len - skb->len;
3996 } else {
3997 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, conn->rx_len);
3998
3999 if (!conn->rx_len) {
4000 BT_ERR("Unexpected continuation frame (len %d)", skb->len);
4001 l2cap_conn_unreliable(conn, ECOMM);
4002 goto drop;
4003 }
4004
4005 if (skb->len > conn->rx_len) {
4006 BT_ERR("Fragment is too long (len %d, expected %d)",
4007 skb->len, conn->rx_len);
4008 kfree_skb(conn->rx_skb);
4009 conn->rx_skb = NULL;
4010 conn->rx_len = 0;
4011 l2cap_conn_unreliable(conn, ECOMM);
4012 goto drop;
4013 }
4014
d626f62b 4015 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 4016 skb->len);
1da177e4
LT
4017 conn->rx_len -= skb->len;
4018
4019 if (!conn->rx_len) {
4020 /* Complete frame received */
4021 l2cap_recv_frame(conn, conn->rx_skb);
4022 conn->rx_skb = NULL;
4023 }
4024 }
4025
4026drop:
4027 kfree_skb(skb);
4028 return 0;
4029}
4030
aef7d97c 4031static int l2cap_debugfs_show(struct seq_file *f, void *p)
1da177e4
LT
4032{
4033 struct sock *sk;
4034 struct hlist_node *node;
1da177e4
LT
4035
4036 read_lock_bh(&l2cap_sk_list.lock);
4037
be9d1227
MH
4038 sk_for_each(sk, node, &l2cap_sk_list.head) {
4039 struct l2cap_pinfo *pi = l2cap_pi(sk);
101545f6 4040
aef7d97c
MH
4041 seq_printf(f, "%s %s %d %d 0x%4.4x 0x%4.4x %d %d %d\n",
4042 batostr(&bt_sk(sk)->src),
4043 batostr(&bt_sk(sk)->dst),
4044 sk->sk_state, __le16_to_cpu(pi->psm),
4045 pi->scid, pi->dcid,
4046 pi->imtu, pi->omtu, pi->sec_level);
be9d1227 4047 }
1da177e4 4048
1da177e4 4049 read_unlock_bh(&l2cap_sk_list.lock);
1da177e4 4050
aef7d97c 4051 return 0;
1da177e4
LT
4052}
4053
aef7d97c
MH
4054static int l2cap_debugfs_open(struct inode *inode, struct file *file)
4055{
4056 return single_open(file, l2cap_debugfs_show, inode->i_private);
4057}
4058
4059static const struct file_operations l2cap_debugfs_fops = {
4060 .open = l2cap_debugfs_open,
4061 .read = seq_read,
4062 .llseek = seq_lseek,
4063 .release = single_release,
4064};
4065
4066static struct dentry *l2cap_debugfs;
1da177e4 4067
90ddc4f0 4068static const struct proto_ops l2cap_sock_ops = {
1da177e4
LT
4069 .family = PF_BLUETOOTH,
4070 .owner = THIS_MODULE,
4071 .release = l2cap_sock_release,
4072 .bind = l2cap_sock_bind,
4073 .connect = l2cap_sock_connect,
4074 .listen = l2cap_sock_listen,
4075 .accept = l2cap_sock_accept,
4076 .getname = l2cap_sock_getname,
4077 .sendmsg = l2cap_sock_sendmsg,
f66dc81f 4078 .recvmsg = l2cap_sock_recvmsg,
1da177e4 4079 .poll = bt_sock_poll,
3241ad82 4080 .ioctl = bt_sock_ioctl,
1da177e4
LT
4081 .mmap = sock_no_mmap,
4082 .socketpair = sock_no_socketpair,
1da177e4
LT
4083 .shutdown = l2cap_sock_shutdown,
4084 .setsockopt = l2cap_sock_setsockopt,
4085 .getsockopt = l2cap_sock_getsockopt
4086};
4087
ec1b4cf7 4088static const struct net_proto_family l2cap_sock_family_ops = {
1da177e4
LT
4089 .family = PF_BLUETOOTH,
4090 .owner = THIS_MODULE,
4091 .create = l2cap_sock_create,
4092};
4093
4094static struct hci_proto l2cap_hci_proto = {
4095 .name = "L2CAP",
4096 .id = HCI_PROTO_L2CAP,
4097 .connect_ind = l2cap_connect_ind,
4098 .connect_cfm = l2cap_connect_cfm,
4099 .disconn_ind = l2cap_disconn_ind,
2950f21a 4100 .disconn_cfm = l2cap_disconn_cfm,
8c1b2355 4101 .security_cfm = l2cap_security_cfm,
1da177e4
LT
4102 .recv_acldata = l2cap_recv_acldata
4103};
4104
4105static int __init l2cap_init(void)
4106{
4107 int err;
be9d1227 4108
1da177e4
LT
4109 err = proto_register(&l2cap_proto, 0);
4110 if (err < 0)
4111 return err;
4112
4113 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
4114 if (err < 0) {
4115 BT_ERR("L2CAP socket registration failed");
4116 goto error;
4117 }
4118
4119 err = hci_register_proto(&l2cap_hci_proto);
4120 if (err < 0) {
4121 BT_ERR("L2CAP protocol registration failed");
4122 bt_sock_unregister(BTPROTO_L2CAP);
4123 goto error;
4124 }
4125
aef7d97c
MH
4126 if (bt_debugfs) {
4127 l2cap_debugfs = debugfs_create_file("l2cap", 0444,
4128 bt_debugfs, NULL, &l2cap_debugfs_fops);
4129 if (!l2cap_debugfs)
4130 BT_ERR("Failed to create L2CAP debug file");
4131 }
1da177e4
LT
4132
4133 BT_INFO("L2CAP ver %s", VERSION);
4134 BT_INFO("L2CAP socket layer initialized");
4135
4136 return 0;
4137
4138error:
4139 proto_unregister(&l2cap_proto);
4140 return err;
4141}
4142
4143static void __exit l2cap_exit(void)
4144{
aef7d97c 4145 debugfs_remove(l2cap_debugfs);
1da177e4
LT
4146
4147 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
4148 BT_ERR("L2CAP socket unregistration failed");
4149
4150 if (hci_unregister_proto(&l2cap_hci_proto) < 0)
4151 BT_ERR("L2CAP protocol unregistration failed");
4152
4153 proto_unregister(&l2cap_proto);
4154}
4155
4156void l2cap_load(void)
4157{
4158 /* Dummy function to trigger automatic L2CAP module loading by
4159 * other modules that use L2CAP sockets but don't use any other
4160 * symbols from it. */
4161 return;
4162}
4163EXPORT_SYMBOL(l2cap_load);
4164
4165module_init(l2cap_init);
4166module_exit(l2cap_exit);
4167
44dd46de
MH
4168module_param(enable_ertm, bool, 0644);
4169MODULE_PARM_DESC(enable_ertm, "Enable enhanced retransmission mode");
4170
5fbcd3d1
MH
4171module_param(max_transmit, uint, 0644);
4172MODULE_PARM_DESC(max_transmit, "Max transmit value (default = 3)");
4173
63fbd24e 4174MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
1da177e4
LT
4175MODULE_DESCRIPTION("Bluetooth L2CAP ver " VERSION);
4176MODULE_VERSION(VERSION);
4177MODULE_LICENSE("GPL");
4178MODULE_ALIAS("bt-proto-0");