Bluetooth: Fix bug with ERTM minimum packet length
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / bluetooth / l2cap.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth L2CAP core and sockets. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
4fc268d2 30#include <linux/capability.h>
1da177e4
LT
31#include <linux/errno.h>
32#include <linux/kernel.h>
1da177e4
LT
33#include <linux/sched.h>
34#include <linux/slab.h>
35#include <linux/poll.h>
36#include <linux/fcntl.h>
37#include <linux/init.h>
38#include <linux/interrupt.h>
39#include <linux/socket.h>
40#include <linux/skbuff.h>
1da177e4 41#include <linux/list.h>
be9d1227 42#include <linux/device.h>
aef7d97c
MH
43#include <linux/debugfs.h>
44#include <linux/seq_file.h>
af05b30b 45#include <linux/uaccess.h>
fcc203c3 46#include <linux/crc16.h>
1da177e4
LT
47#include <net/sock.h>
48
49#include <asm/system.h>
1da177e4
LT
50#include <asm/unaligned.h>
51
52#include <net/bluetooth/bluetooth.h>
53#include <net/bluetooth/hci_core.h>
54#include <net/bluetooth/l2cap.h>
55
44dd46de
MH
56#define VERSION "2.14"
57
58static int enable_ertm = 0;
f0709e03 59
47ec1dcd 60static u32 l2cap_feat_mask = L2CAP_FEAT_FIXED_CHAN;
e1027a7c 61static u8 l2cap_fixed_chan[8] = { 0x02, };
1da177e4 62
90ddc4f0 63static const struct proto_ops l2cap_sock_ops;
1da177e4 64
1890d36b
GP
65static struct workqueue_struct *_busy_wq;
66
1da177e4 67static struct bt_sock_list l2cap_sk_list = {
d5fb2962 68 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
1da177e4
LT
69};
70
1890d36b
GP
71static void l2cap_busy_work(struct work_struct *work);
72
1da177e4
LT
73static void __l2cap_sock_close(struct sock *sk, int reason);
74static void l2cap_sock_close(struct sock *sk);
75static void l2cap_sock_kill(struct sock *sk);
76
77static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
78 u8 code, u8 ident, u16 dlen, void *data);
79
80/* ---- L2CAP timers ---- */
81static void l2cap_sock_timeout(unsigned long arg)
82{
83 struct sock *sk = (struct sock *) arg;
b1235d79 84 int reason;
1da177e4
LT
85
86 BT_DBG("sock %p state %d", sk, sk->sk_state);
87
88 bh_lock_sock(sk);
b1235d79 89
f62e4323
MH
90 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONFIG)
91 reason = ECONNREFUSED;
92 else if (sk->sk_state == BT_CONNECT &&
2af6b9d5 93 l2cap_pi(sk)->sec_level != BT_SECURITY_SDP)
b1235d79
MH
94 reason = ECONNREFUSED;
95 else
96 reason = ETIMEDOUT;
97
98 __l2cap_sock_close(sk, reason);
99
1da177e4
LT
100 bh_unlock_sock(sk);
101
102 l2cap_sock_kill(sk);
103 sock_put(sk);
104}
105
106static void l2cap_sock_set_timer(struct sock *sk, long timeout)
107{
108 BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
109 sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
110}
111
112static void l2cap_sock_clear_timer(struct sock *sk)
113{
114 BT_DBG("sock %p state %d", sk, sk->sk_state);
115 sk_stop_timer(sk, &sk->sk_timer);
116}
117
0139418c
MH
118/* ---- L2CAP channels ---- */
119static struct sock *__l2cap_get_chan_by_dcid(struct l2cap_chan_list *l, u16 cid)
120{
121 struct sock *s;
122 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
123 if (l2cap_pi(s)->dcid == cid)
124 break;
125 }
126 return s;
127}
128
129static struct sock *__l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
130{
131 struct sock *s;
132 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
133 if (l2cap_pi(s)->scid == cid)
134 break;
135 }
136 return s;
137}
138
139/* Find channel with given SCID.
140 * Returns locked socket */
141static inline struct sock *l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
142{
143 struct sock *s;
144 read_lock(&l->lock);
145 s = __l2cap_get_chan_by_scid(l, cid);
af05b30b
GP
146 if (s)
147 bh_lock_sock(s);
0139418c
MH
148 read_unlock(&l->lock);
149 return s;
150}
151
152static struct sock *__l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
153{
154 struct sock *s;
155 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
156 if (l2cap_pi(s)->ident == ident)
157 break;
158 }
159 return s;
160}
161
162static inline struct sock *l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
163{
164 struct sock *s;
165 read_lock(&l->lock);
166 s = __l2cap_get_chan_by_ident(l, ident);
af05b30b
GP
167 if (s)
168 bh_lock_sock(s);
0139418c
MH
169 read_unlock(&l->lock);
170 return s;
171}
172
173static u16 l2cap_alloc_cid(struct l2cap_chan_list *l)
174{
8db4dc46 175 u16 cid = L2CAP_CID_DYN_START;
0139418c 176
8db4dc46 177 for (; cid < L2CAP_CID_DYN_END; cid++) {
af05b30b 178 if (!__l2cap_get_chan_by_scid(l, cid))
0139418c
MH
179 return cid;
180 }
181
182 return 0;
183}
184
185static inline void __l2cap_chan_link(struct l2cap_chan_list *l, struct sock *sk)
186{
187 sock_hold(sk);
188
189 if (l->head)
190 l2cap_pi(l->head)->prev_c = sk;
191
192 l2cap_pi(sk)->next_c = l->head;
193 l2cap_pi(sk)->prev_c = NULL;
194 l->head = sk;
195}
196
197static inline void l2cap_chan_unlink(struct l2cap_chan_list *l, struct sock *sk)
198{
199 struct sock *next = l2cap_pi(sk)->next_c, *prev = l2cap_pi(sk)->prev_c;
200
fd1278d7 201 write_lock_bh(&l->lock);
0139418c
MH
202 if (sk == l->head)
203 l->head = next;
204
205 if (next)
206 l2cap_pi(next)->prev_c = prev;
207 if (prev)
208 l2cap_pi(prev)->next_c = next;
fd1278d7 209 write_unlock_bh(&l->lock);
0139418c
MH
210
211 __sock_put(sk);
212}
213
214static void __l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
215{
216 struct l2cap_chan_list *l = &conn->chan_list;
217
af05b30b
GP
218 BT_DBG("conn %p, psm 0x%2.2x, dcid 0x%4.4x", conn,
219 l2cap_pi(sk)->psm, l2cap_pi(sk)->dcid);
0139418c 220
2950f21a
MH
221 conn->disc_reason = 0x13;
222
0139418c
MH
223 l2cap_pi(sk)->conn = conn;
224
bd3c9e25 225 if (sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM) {
0139418c
MH
226 /* Alloc CID for connection-oriented socket */
227 l2cap_pi(sk)->scid = l2cap_alloc_cid(l);
228 } else if (sk->sk_type == SOCK_DGRAM) {
229 /* Connectionless socket */
8db4dc46
GP
230 l2cap_pi(sk)->scid = L2CAP_CID_CONN_LESS;
231 l2cap_pi(sk)->dcid = L2CAP_CID_CONN_LESS;
0139418c
MH
232 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
233 } else {
234 /* Raw socket can send/recv signalling messages only */
8db4dc46
GP
235 l2cap_pi(sk)->scid = L2CAP_CID_SIGNALING;
236 l2cap_pi(sk)->dcid = L2CAP_CID_SIGNALING;
0139418c
MH
237 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
238 }
239
240 __l2cap_chan_link(l, sk);
241
242 if (parent)
243 bt_accept_enqueue(parent, sk);
244}
245
8e87d142 246/* Delete channel.
0139418c
MH
247 * Must be called on the locked socket. */
248static void l2cap_chan_del(struct sock *sk, int err)
249{
250 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
251 struct sock *parent = bt_sk(sk)->parent;
252
253 l2cap_sock_clear_timer(sk);
254
255 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
256
8e87d142 257 if (conn) {
0139418c
MH
258 /* Unlink from channel list */
259 l2cap_chan_unlink(&conn->chan_list, sk);
260 l2cap_pi(sk)->conn = NULL;
261 hci_conn_put(conn->hcon);
262 }
263
b1235d79 264 sk->sk_state = BT_CLOSED;
0139418c
MH
265 sock_set_flag(sk, SOCK_ZAPPED);
266
267 if (err)
268 sk->sk_err = err;
269
270 if (parent) {
271 bt_accept_unlink(sk);
272 parent->sk_data_ready(parent, 0);
273 } else
274 sk->sk_state_change(sk);
275}
276
79d554a6 277/* Service level security */
2af6b9d5 278static inline int l2cap_check_security(struct sock *sk)
79d554a6
MH
279{
280 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
0684e5f9
MH
281 __u8 auth_type;
282
00ae4af9
MH
283 if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
284 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
285 auth_type = HCI_AT_NO_BONDING_MITM;
286 else
af05b30b 287 auth_type = HCI_AT_NO_BONDING;
00ae4af9
MH
288
289 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
290 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
291 } else {
292 switch (l2cap_pi(sk)->sec_level) {
293 case BT_SECURITY_HIGH:
294 auth_type = HCI_AT_GENERAL_BONDING_MITM;
295 break;
296 case BT_SECURITY_MEDIUM:
297 auth_type = HCI_AT_GENERAL_BONDING;
298 break;
299 default:
300 auth_type = HCI_AT_NO_BONDING;
301 break;
302 }
0684e5f9 303 }
79d554a6 304
0684e5f9
MH
305 return hci_conn_security(conn->hcon, l2cap_pi(sk)->sec_level,
306 auth_type);
79d554a6
MH
307}
308
4e8402a3
MH
309static inline u8 l2cap_get_ident(struct l2cap_conn *conn)
310{
311 u8 id;
312
313 /* Get next available identificator.
314 * 1 - 128 are used by kernel.
315 * 129 - 199 are reserved.
316 * 200 - 254 are used by utilities like l2ping, etc.
317 */
318
319 spin_lock_bh(&conn->lock);
320
321 if (++conn->tx_ident > 128)
322 conn->tx_ident = 1;
323
324 id = conn->tx_ident;
325
326 spin_unlock_bh(&conn->lock);
327
328 return id;
329}
330
9a9c6a34 331static inline void l2cap_send_cmd(struct l2cap_conn *conn, u8 ident, u8 code, u16 len, void *data)
4e8402a3
MH
332{
333 struct sk_buff *skb = l2cap_build_cmd(conn, code, ident, len, data);
334
335 BT_DBG("code 0x%2.2x", code);
336
337 if (!skb)
9a9c6a34 338 return;
4e8402a3 339
9a9c6a34 340 hci_send_acl(conn->hcon, skb, 0);
4e8402a3
MH
341}
342
9a9c6a34 343static inline void l2cap_send_sframe(struct l2cap_pinfo *pi, u16 control)
1c2acffb
GP
344{
345 struct sk_buff *skb;
346 struct l2cap_hdr *lh;
347 struct l2cap_conn *conn = pi->conn;
fcc203c3
GP
348 int count, hlen = L2CAP_HDR_SIZE + 2;
349
350 if (pi->fcs == L2CAP_FCS_CRC16)
351 hlen += 2;
1c2acffb
GP
352
353 BT_DBG("pi %p, control 0x%2.2x", pi, control);
354
fcc203c3 355 count = min_t(unsigned int, conn->mtu, hlen);
1c2acffb
GP
356 control |= L2CAP_CTRL_FRAME_TYPE;
357
9e917af1
GP
358 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
359 control |= L2CAP_CTRL_FINAL;
360 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
361 }
362
f0946ccf
GP
363 if (pi->conn_state & L2CAP_CONN_SEND_PBIT) {
364 control |= L2CAP_CTRL_POLL;
365 pi->conn_state &= ~L2CAP_CONN_SEND_PBIT;
366 }
367
1c2acffb
GP
368 skb = bt_skb_alloc(count, GFP_ATOMIC);
369 if (!skb)
9a9c6a34 370 return;
1c2acffb
GP
371
372 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
fcc203c3 373 lh->len = cpu_to_le16(hlen - L2CAP_HDR_SIZE);
1c2acffb
GP
374 lh->cid = cpu_to_le16(pi->dcid);
375 put_unaligned_le16(control, skb_put(skb, 2));
376
fcc203c3
GP
377 if (pi->fcs == L2CAP_FCS_CRC16) {
378 u16 fcs = crc16(0, (u8 *)lh, count - 2);
379 put_unaligned_le16(fcs, skb_put(skb, 2));
380 }
381
9a9c6a34 382 hci_send_acl(pi->conn->hcon, skb, 0);
1c2acffb
GP
383}
384
9a9c6a34 385static inline void l2cap_send_rr_or_rnr(struct l2cap_pinfo *pi, u16 control)
7e743090 386{
1890d36b 387 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
7e743090 388 control |= L2CAP_SUPER_RCV_NOT_READY;
1890d36b
GP
389 pi->conn_state |= L2CAP_CONN_RNR_SENT;
390 } else
7e743090
GP
391 control |= L2CAP_SUPER_RCV_READY;
392
2ab25cdd
GP
393 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
394
9a9c6a34 395 l2cap_send_sframe(pi, control);
7e743090
GP
396}
397
e501d055
AE
398static inline int __l2cap_no_conn_pending(struct sock *sk)
399{
400 return !(l2cap_pi(sk)->conf_state & L2CAP_CONF_CONNECT_PEND);
401}
402
79d554a6
MH
403static void l2cap_do_start(struct sock *sk)
404{
405 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
406
407 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) {
984947dc
MH
408 if (!(conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE))
409 return;
410
e501d055 411 if (l2cap_check_security(sk) && __l2cap_no_conn_pending(sk)) {
b1235d79
MH
412 struct l2cap_conn_req req;
413 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
414 req.psm = l2cap_pi(sk)->psm;
79d554a6 415
b1235d79 416 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
e501d055 417 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
79d554a6 418
b1235d79 419 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
79d554a6 420 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 421 }
79d554a6
MH
422 } else {
423 struct l2cap_info_req req;
424 req.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
425
426 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
427 conn->info_ident = l2cap_get_ident(conn);
428
429 mod_timer(&conn->info_timer, jiffies +
430 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
431
432 l2cap_send_cmd(conn, conn->info_ident,
433 L2CAP_INFO_REQ, sizeof(req), &req);
434 }
435}
436
22121fc9
GP
437static void l2cap_send_disconn_req(struct l2cap_conn *conn, struct sock *sk)
438{
439 struct l2cap_disconn_req req;
440
441 req.dcid = cpu_to_le16(l2cap_pi(sk)->dcid);
442 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
443 l2cap_send_cmd(conn, l2cap_get_ident(conn),
444 L2CAP_DISCONN_REQ, sizeof(req), &req);
445}
446
1da177e4 447/* ---- L2CAP connections ---- */
4e8402a3
MH
448static void l2cap_conn_start(struct l2cap_conn *conn)
449{
450 struct l2cap_chan_list *l = &conn->chan_list;
451 struct sock *sk;
452
453 BT_DBG("conn %p", conn);
454
455 read_lock(&l->lock);
456
457 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
458 bh_lock_sock(sk);
459
bd3c9e25
GP
460 if (sk->sk_type != SOCK_SEQPACKET &&
461 sk->sk_type != SOCK_STREAM) {
79d554a6
MH
462 bh_unlock_sock(sk);
463 continue;
464 }
465
466 if (sk->sk_state == BT_CONNECT) {
e501d055
AE
467 if (l2cap_check_security(sk) &&
468 __l2cap_no_conn_pending(sk)) {
b1235d79
MH
469 struct l2cap_conn_req req;
470 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
471 req.psm = l2cap_pi(sk)->psm;
79d554a6 472
b1235d79 473 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
e501d055 474 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
79d554a6 475
b1235d79 476 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4e8402a3 477 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 478 }
79d554a6
MH
479 } else if (sk->sk_state == BT_CONNECT2) {
480 struct l2cap_conn_rsp rsp;
481 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
482 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
483
2af6b9d5 484 if (l2cap_check_security(sk)) {
f66dc81f
MH
485 if (bt_sk(sk)->defer_setup) {
486 struct sock *parent = bt_sk(sk)->parent;
487 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
488 rsp.status = cpu_to_le16(L2CAP_CS_AUTHOR_PEND);
489 parent->sk_data_ready(parent, 0);
490
491 } else {
492 sk->sk_state = BT_CONFIG;
493 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
494 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
495 }
79d554a6
MH
496 } else {
497 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
498 rsp.status = cpu_to_le16(L2CAP_CS_AUTHEN_PEND);
499 }
500
501 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
502 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4e8402a3
MH
503 }
504
505 bh_unlock_sock(sk);
506 }
507
508 read_unlock(&l->lock);
509}
510
511static void l2cap_conn_ready(struct l2cap_conn *conn)
512{
79d554a6
MH
513 struct l2cap_chan_list *l = &conn->chan_list;
514 struct sock *sk;
4e8402a3 515
79d554a6 516 BT_DBG("conn %p", conn);
4e8402a3 517
79d554a6 518 read_lock(&l->lock);
4e8402a3 519
79d554a6
MH
520 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
521 bh_lock_sock(sk);
4e8402a3 522
bd3c9e25
GP
523 if (sk->sk_type != SOCK_SEQPACKET &&
524 sk->sk_type != SOCK_STREAM) {
79d554a6
MH
525 l2cap_sock_clear_timer(sk);
526 sk->sk_state = BT_CONNECTED;
527 sk->sk_state_change(sk);
528 } else if (sk->sk_state == BT_CONNECT)
529 l2cap_do_start(sk);
4e8402a3 530
79d554a6 531 bh_unlock_sock(sk);
4e8402a3 532 }
79d554a6
MH
533
534 read_unlock(&l->lock);
4e8402a3
MH
535}
536
537/* Notify sockets that we cannot guaranty reliability anymore */
538static void l2cap_conn_unreliable(struct l2cap_conn *conn, int err)
539{
540 struct l2cap_chan_list *l = &conn->chan_list;
541 struct sock *sk;
542
543 BT_DBG("conn %p", conn);
544
545 read_lock(&l->lock);
546
547 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2af6b9d5 548 if (l2cap_pi(sk)->force_reliable)
4e8402a3
MH
549 sk->sk_err = err;
550 }
551
552 read_unlock(&l->lock);
553}
554
555static void l2cap_info_timeout(unsigned long arg)
556{
557 struct l2cap_conn *conn = (void *) arg;
558
984947dc 559 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 560 conn->info_ident = 0;
984947dc 561
4e8402a3
MH
562 l2cap_conn_start(conn);
563}
564
1da177e4
LT
565static struct l2cap_conn *l2cap_conn_add(struct hci_conn *hcon, u8 status)
566{
0139418c 567 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 568
0139418c 569 if (conn || status)
1da177e4
LT
570 return conn;
571
0139418c
MH
572 conn = kzalloc(sizeof(struct l2cap_conn), GFP_ATOMIC);
573 if (!conn)
1da177e4 574 return NULL;
1da177e4
LT
575
576 hcon->l2cap_data = conn;
577 conn->hcon = hcon;
578
0139418c
MH
579 BT_DBG("hcon %p conn %p", hcon, conn);
580
1da177e4
LT
581 conn->mtu = hcon->hdev->acl_mtu;
582 conn->src = &hcon->hdev->bdaddr;
583 conn->dst = &hcon->dst;
584
4e8402a3
MH
585 conn->feat_mask = 0;
586
1da177e4
LT
587 spin_lock_init(&conn->lock);
588 rwlock_init(&conn->chan_list.lock);
589
45054dc1
DY
590 setup_timer(&conn->info_timer, l2cap_info_timeout,
591 (unsigned long) conn);
592
2950f21a
MH
593 conn->disc_reason = 0x13;
594
1da177e4
LT
595 return conn;
596}
597
0139418c 598static void l2cap_conn_del(struct hci_conn *hcon, int err)
1da177e4 599{
0139418c 600 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4
LT
601 struct sock *sk;
602
0139418c
MH
603 if (!conn)
604 return;
1da177e4
LT
605
606 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
607
7585b97a 608 kfree_skb(conn->rx_skb);
1da177e4
LT
609
610 /* Kill channels */
611 while ((sk = conn->chan_list.head)) {
612 bh_lock_sock(sk);
613 l2cap_chan_del(sk, err);
614 bh_unlock_sock(sk);
615 l2cap_sock_kill(sk);
616 }
617
8e8440f5
DY
618 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
619 del_timer_sync(&conn->info_timer);
3ab22731 620
1da177e4
LT
621 hcon->l2cap_data = NULL;
622 kfree(conn);
1da177e4
LT
623}
624
625static inline void l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
626{
627 struct l2cap_chan_list *l = &conn->chan_list;
fd1278d7 628 write_lock_bh(&l->lock);
1da177e4 629 __l2cap_chan_add(conn, sk, parent);
fd1278d7 630 write_unlock_bh(&l->lock);
1da177e4
LT
631}
632
1da177e4 633/* ---- Socket interface ---- */
8e036fc3 634static struct sock *__l2cap_get_sock_by_addr(__le16 psm, bdaddr_t *src)
1da177e4
LT
635{
636 struct sock *sk;
637 struct hlist_node *node;
638 sk_for_each(sk, node, &l2cap_sk_list.head)
639 if (l2cap_pi(sk)->sport == psm && !bacmp(&bt_sk(sk)->src, src))
640 goto found;
641 sk = NULL;
642found:
643 return sk;
644}
645
646/* Find socket with psm and source bdaddr.
647 * Returns closest match.
648 */
8e036fc3 649static struct sock *__l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
650{
651 struct sock *sk = NULL, *sk1 = NULL;
652 struct hlist_node *node;
653
654 sk_for_each(sk, node, &l2cap_sk_list.head) {
655 if (state && sk->sk_state != state)
656 continue;
657
658 if (l2cap_pi(sk)->psm == psm) {
659 /* Exact match. */
660 if (!bacmp(&bt_sk(sk)->src, src))
661 break;
662
663 /* Closest match */
664 if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY))
665 sk1 = sk;
666 }
667 }
668 return node ? sk : sk1;
669}
670
671/* Find socket with given address (psm, src).
672 * Returns locked socket */
8e036fc3 673static inline struct sock *l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
674{
675 struct sock *s;
676 read_lock(&l2cap_sk_list.lock);
677 s = __l2cap_get_sock_by_psm(state, psm, src);
af05b30b
GP
678 if (s)
679 bh_lock_sock(s);
1da177e4
LT
680 read_unlock(&l2cap_sk_list.lock);
681 return s;
682}
683
684static void l2cap_sock_destruct(struct sock *sk)
685{
686 BT_DBG("sk %p", sk);
687
688 skb_queue_purge(&sk->sk_receive_queue);
689 skb_queue_purge(&sk->sk_write_queue);
690}
691
692static void l2cap_sock_cleanup_listen(struct sock *parent)
693{
694 struct sock *sk;
695
696 BT_DBG("parent %p", parent);
697
698 /* Close not yet accepted channels */
699 while ((sk = bt_accept_dequeue(parent, NULL)))
700 l2cap_sock_close(sk);
701
b1235d79 702 parent->sk_state = BT_CLOSED;
1da177e4
LT
703 sock_set_flag(parent, SOCK_ZAPPED);
704}
705
706/* Kill socket (only if zapped and orphan)
707 * Must be called on unlocked socket.
708 */
709static void l2cap_sock_kill(struct sock *sk)
710{
711 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
712 return;
713
714 BT_DBG("sk %p state %d", sk, sk->sk_state);
715
716 /* Kill poor orphan */
717 bt_sock_unlink(&l2cap_sk_list, sk);
718 sock_set_flag(sk, SOCK_DEAD);
719 sock_put(sk);
720}
721
722static void __l2cap_sock_close(struct sock *sk, int reason)
723{
724 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
725
726 switch (sk->sk_state) {
727 case BT_LISTEN:
728 l2cap_sock_cleanup_listen(sk);
729 break;
730
731 case BT_CONNECTED:
732 case BT_CONFIG:
bd3c9e25
GP
733 if (sk->sk_type == SOCK_SEQPACKET ||
734 sk->sk_type == SOCK_STREAM) {
1da177e4 735 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1da177e4
LT
736
737 sk->sk_state = BT_DISCONN;
738 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
22121fc9 739 l2cap_send_disconn_req(conn, sk);
b1235d79 740 } else
1da177e4 741 l2cap_chan_del(sk, reason);
1da177e4
LT
742 break;
743
f66dc81f 744 case BT_CONNECT2:
bd3c9e25
GP
745 if (sk->sk_type == SOCK_SEQPACKET ||
746 sk->sk_type == SOCK_STREAM) {
f66dc81f
MH
747 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
748 struct l2cap_conn_rsp rsp;
749 __u16 result;
750
751 if (bt_sk(sk)->defer_setup)
752 result = L2CAP_CR_SEC_BLOCK;
753 else
754 result = L2CAP_CR_BAD_PSM;
755
756 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
757 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
758 rsp.result = cpu_to_le16(result);
759 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
760 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
761 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
762 } else
763 l2cap_chan_del(sk, reason);
764 break;
765
1da177e4
LT
766 case BT_CONNECT:
767 case BT_DISCONN:
768 l2cap_chan_del(sk, reason);
769 break;
770
771 default:
772 sock_set_flag(sk, SOCK_ZAPPED);
773 break;
774 }
775}
776
777/* Must be called on unlocked socket. */
778static void l2cap_sock_close(struct sock *sk)
779{
780 l2cap_sock_clear_timer(sk);
781 lock_sock(sk);
782 __l2cap_sock_close(sk, ECONNRESET);
783 release_sock(sk);
784 l2cap_sock_kill(sk);
785}
786
787static void l2cap_sock_init(struct sock *sk, struct sock *parent)
788{
789 struct l2cap_pinfo *pi = l2cap_pi(sk);
790
791 BT_DBG("sk %p", sk);
792
793 if (parent) {
794 sk->sk_type = parent->sk_type;
f66dc81f
MH
795 bt_sk(sk)->defer_setup = bt_sk(parent)->defer_setup;
796
1da177e4
LT
797 pi->imtu = l2cap_pi(parent)->imtu;
798 pi->omtu = l2cap_pi(parent)->omtu;
c6b03cf9
MH
799 pi->mode = l2cap_pi(parent)->mode;
800 pi->fcs = l2cap_pi(parent)->fcs;
68d7f0ce 801 pi->max_tx = l2cap_pi(parent)->max_tx;
14b5aa71 802 pi->tx_win = l2cap_pi(parent)->tx_win;
2af6b9d5
MH
803 pi->sec_level = l2cap_pi(parent)->sec_level;
804 pi->role_switch = l2cap_pi(parent)->role_switch;
805 pi->force_reliable = l2cap_pi(parent)->force_reliable;
1da177e4
LT
806 } else {
807 pi->imtu = L2CAP_DEFAULT_MTU;
808 pi->omtu = 0;
bd3c9e25
GP
809 if (enable_ertm && sk->sk_type == SOCK_STREAM)
810 pi->mode = L2CAP_MODE_ERTM;
811 else
812 pi->mode = L2CAP_MODE_BASIC;
fd059b9b 813 pi->max_tx = L2CAP_DEFAULT_MAX_TX;
c6b03cf9 814 pi->fcs = L2CAP_FCS_CRC16;
fd059b9b 815 pi->tx_win = L2CAP_DEFAULT_TX_WINDOW;
2af6b9d5
MH
816 pi->sec_level = BT_SECURITY_LOW;
817 pi->role_switch = 0;
818 pi->force_reliable = 0;
1da177e4
LT
819 }
820
821 /* Default config options */
5dee9e7c 822 pi->conf_len = 0;
1da177e4 823 pi->flush_to = L2CAP_DEFAULT_FLUSH_TO;
45054dc1
DY
824 skb_queue_head_init(TX_QUEUE(sk));
825 skb_queue_head_init(SREJ_QUEUE(sk));
1890d36b 826 skb_queue_head_init(BUSY_QUEUE(sk));
45054dc1 827 INIT_LIST_HEAD(SREJ_LIST(sk));
1da177e4
LT
828}
829
830static struct proto l2cap_proto = {
831 .name = "L2CAP",
832 .owner = THIS_MODULE,
833 .obj_size = sizeof(struct l2cap_pinfo)
834};
835
1b8d7ae4 836static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
1da177e4
LT
837{
838 struct sock *sk;
839
6257ff21 840 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1da177e4
LT
841 if (!sk)
842 return NULL;
843
844 sock_init_data(sock, sk);
845 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
846
847 sk->sk_destruct = l2cap_sock_destruct;
4e8402a3 848 sk->sk_sndtimeo = msecs_to_jiffies(L2CAP_CONN_TIMEOUT);
1da177e4
LT
849
850 sock_reset_flag(sk, SOCK_ZAPPED);
851
852 sk->sk_protocol = proto;
b1235d79 853 sk->sk_state = BT_OPEN;
1da177e4 854
b1235d79 855 setup_timer(&sk->sk_timer, l2cap_sock_timeout, (unsigned long) sk);
1da177e4
LT
856
857 bt_sock_link(&l2cap_sk_list, sk);
858 return sk;
859}
860
3f378b68
EP
861static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
862 int kern)
1da177e4
LT
863{
864 struct sock *sk;
865
866 BT_DBG("sock %p", sock);
867
868 sock->state = SS_UNCONNECTED;
869
bd3c9e25 870 if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1da177e4
LT
871 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
872 return -ESOCKTNOSUPPORT;
873
c84b3268 874 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1da177e4
LT
875 return -EPERM;
876
877 sock->ops = &l2cap_sock_ops;
878
1b8d7ae4 879 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1da177e4
LT
880 if (!sk)
881 return -ENOMEM;
882
883 l2cap_sock_init(sk, NULL);
884 return 0;
885}
886
f29972de 887static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
1da177e4 888{
1da177e4 889 struct sock *sk = sock->sk;
f29972de
MH
890 struct sockaddr_l2 la;
891 int len, err = 0;
1da177e4 892
f29972de 893 BT_DBG("sk %p", sk);
1da177e4
LT
894
895 if (!addr || addr->sa_family != AF_BLUETOOTH)
896 return -EINVAL;
897
f29972de
MH
898 memset(&la, 0, sizeof(la));
899 len = min_t(unsigned int, sizeof(la), alen);
900 memcpy(&la, addr, len);
901
2a517ca6
MH
902 if (la.l2_cid)
903 return -EINVAL;
904
1da177e4
LT
905 lock_sock(sk);
906
907 if (sk->sk_state != BT_OPEN) {
908 err = -EBADFD;
909 goto done;
910 }
911
b4324b5d 912 if (la.l2_psm && __le16_to_cpu(la.l2_psm) < 0x1001 &&
847641d7
MH
913 !capable(CAP_NET_BIND_SERVICE)) {
914 err = -EACCES;
915 goto done;
916 }
8e87d142 917
1da177e4
LT
918 write_lock_bh(&l2cap_sk_list.lock);
919
f29972de 920 if (la.l2_psm && __l2cap_get_sock_by_addr(la.l2_psm, &la.l2_bdaddr)) {
1da177e4
LT
921 err = -EADDRINUSE;
922 } else {
923 /* Save source address */
f29972de
MH
924 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
925 l2cap_pi(sk)->psm = la.l2_psm;
926 l2cap_pi(sk)->sport = la.l2_psm;
1da177e4 927 sk->sk_state = BT_BOUND;
2af6b9d5 928
b4324b5d
MH
929 if (__le16_to_cpu(la.l2_psm) == 0x0001 ||
930 __le16_to_cpu(la.l2_psm) == 0x0003)
2af6b9d5 931 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
1da177e4
LT
932 }
933
934 write_unlock_bh(&l2cap_sk_list.lock);
935
936done:
937 release_sock(sk);
938 return err;
939}
940
941static int l2cap_do_connect(struct sock *sk)
942{
943 bdaddr_t *src = &bt_sk(sk)->src;
944 bdaddr_t *dst = &bt_sk(sk)->dst;
945 struct l2cap_conn *conn;
946 struct hci_conn *hcon;
947 struct hci_dev *hdev;
09ab6f4c 948 __u8 auth_type;
44d0e48e 949 int err;
1da177e4 950
f29972de
MH
951 BT_DBG("%s -> %s psm 0x%2.2x", batostr(src), batostr(dst),
952 l2cap_pi(sk)->psm);
1da177e4 953
af05b30b
GP
954 hdev = hci_get_route(dst, src);
955 if (!hdev)
1da177e4
LT
956 return -EHOSTUNREACH;
957
958 hci_dev_lock_bh(hdev);
959
960 err = -ENOMEM;
961
8c1b2355 962 if (sk->sk_type == SOCK_RAW) {
2af6b9d5
MH
963 switch (l2cap_pi(sk)->sec_level) {
964 case BT_SECURITY_HIGH:
8c1b2355 965 auth_type = HCI_AT_DEDICATED_BONDING_MITM;
2af6b9d5
MH
966 break;
967 case BT_SECURITY_MEDIUM:
8c1b2355 968 auth_type = HCI_AT_DEDICATED_BONDING;
2af6b9d5
MH
969 break;
970 default:
09ab6f4c 971 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
972 break;
973 }
8c1b2355 974 } else if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
2af6b9d5 975 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
8c1b2355 976 auth_type = HCI_AT_NO_BONDING_MITM;
09ab6f4c 977 else
8c1b2355 978 auth_type = HCI_AT_NO_BONDING;
435fef20
MH
979
980 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
981 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
8c1b2355 982 } else {
2af6b9d5
MH
983 switch (l2cap_pi(sk)->sec_level) {
984 case BT_SECURITY_HIGH:
8c1b2355 985 auth_type = HCI_AT_GENERAL_BONDING_MITM;
2af6b9d5
MH
986 break;
987 case BT_SECURITY_MEDIUM:
09ab6f4c 988 auth_type = HCI_AT_GENERAL_BONDING;
2af6b9d5
MH
989 break;
990 default:
8c1b2355 991 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
992 break;
993 }
09ab6f4c
MH
994 }
995
2af6b9d5
MH
996 hcon = hci_connect(hdev, ACL_LINK, dst,
997 l2cap_pi(sk)->sec_level, auth_type);
1da177e4
LT
998 if (!hcon)
999 goto done;
1000
1001 conn = l2cap_conn_add(hcon, 0);
1002 if (!conn) {
1003 hci_conn_put(hcon);
1004 goto done;
1005 }
1006
1007 err = 0;
1008
1009 /* Update source addr of the socket */
1010 bacpy(src, conn->src);
1011
1012 l2cap_chan_add(conn, sk, NULL);
1013
1014 sk->sk_state = BT_CONNECT;
1015 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
1016
1017 if (hcon->state == BT_CONNECTED) {
bd3c9e25
GP
1018 if (sk->sk_type != SOCK_SEQPACKET &&
1019 sk->sk_type != SOCK_STREAM) {
1da177e4
LT
1020 l2cap_sock_clear_timer(sk);
1021 sk->sk_state = BT_CONNECTED;
79d554a6
MH
1022 } else
1023 l2cap_do_start(sk);
1da177e4
LT
1024 }
1025
1026done:
1027 hci_dev_unlock_bh(hdev);
1028 hci_dev_put(hdev);
1029 return err;
1030}
1031
1032static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
1033{
1da177e4 1034 struct sock *sk = sock->sk;
f29972de
MH
1035 struct sockaddr_l2 la;
1036 int len, err = 0;
1da177e4 1037
1da177e4
LT
1038 BT_DBG("sk %p", sk);
1039
6503d961
CG
1040 if (!addr || alen < sizeof(addr->sa_family) ||
1041 addr->sa_family != AF_BLUETOOTH)
2a517ca6 1042 return -EINVAL;
1da177e4 1043
f29972de
MH
1044 memset(&la, 0, sizeof(la));
1045 len = min_t(unsigned int, sizeof(la), alen);
1046 memcpy(&la, addr, len);
1047
2a517ca6
MH
1048 if (la.l2_cid)
1049 return -EINVAL;
1050
1051 lock_sock(sk);
1052
bd3c9e25
GP
1053 if ((sk->sk_type == SOCK_SEQPACKET || sk->sk_type == SOCK_STREAM)
1054 && !la.l2_psm) {
1da177e4
LT
1055 err = -EINVAL;
1056 goto done;
1057 }
1058
c6b03cf9
MH
1059 switch (l2cap_pi(sk)->mode) {
1060 case L2CAP_MODE_BASIC:
1061 break;
1062 case L2CAP_MODE_ERTM:
f2fcfcd6 1063 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1064 if (enable_ertm)
1065 break;
1066 /* fall through */
1067 default:
1068 err = -ENOTSUPP;
1069 goto done;
1070 }
1071
af05b30b 1072 switch (sk->sk_state) {
1da177e4
LT
1073 case BT_CONNECT:
1074 case BT_CONNECT2:
1075 case BT_CONFIG:
1076 /* Already connecting */
1077 goto wait;
1078
1079 case BT_CONNECTED:
1080 /* Already connected */
1081 goto done;
1082
1083 case BT_OPEN:
1084 case BT_BOUND:
1085 /* Can connect */
1086 break;
1087
1088 default:
1089 err = -EBADFD;
1090 goto done;
1091 }
1092
1093 /* Set destination address and psm */
f29972de
MH
1094 bacpy(&bt_sk(sk)->dst, &la.l2_bdaddr);
1095 l2cap_pi(sk)->psm = la.l2_psm;
1da177e4 1096
af05b30b
GP
1097 err = l2cap_do_connect(sk);
1098 if (err)
1da177e4
LT
1099 goto done;
1100
1101wait:
1102 err = bt_sock_wait_state(sk, BT_CONNECTED,
1103 sock_sndtimeo(sk, flags & O_NONBLOCK));
1104done:
1105 release_sock(sk);
1106 return err;
1107}
1108
1109static int l2cap_sock_listen(struct socket *sock, int backlog)
1110{
1111 struct sock *sk = sock->sk;
1112 int err = 0;
1113
1114 BT_DBG("sk %p backlog %d", sk, backlog);
1115
1116 lock_sock(sk);
1117
bd3c9e25
GP
1118 if ((sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM)
1119 || sk->sk_state != BT_BOUND) {
1da177e4
LT
1120 err = -EBADFD;
1121 goto done;
1122 }
1123
c6b03cf9
MH
1124 switch (l2cap_pi(sk)->mode) {
1125 case L2CAP_MODE_BASIC:
1126 break;
1127 case L2CAP_MODE_ERTM:
f2fcfcd6 1128 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1129 if (enable_ertm)
1130 break;
1131 /* fall through */
1132 default:
1133 err = -ENOTSUPP;
1134 goto done;
1135 }
1136
1da177e4
LT
1137 if (!l2cap_pi(sk)->psm) {
1138 bdaddr_t *src = &bt_sk(sk)->src;
1139 u16 psm;
1140
1141 err = -EINVAL;
1142
1143 write_lock_bh(&l2cap_sk_list.lock);
1144
1145 for (psm = 0x1001; psm < 0x1100; psm += 2)
b4324b5d
MH
1146 if (!__l2cap_get_sock_by_addr(cpu_to_le16(psm), src)) {
1147 l2cap_pi(sk)->psm = cpu_to_le16(psm);
1148 l2cap_pi(sk)->sport = cpu_to_le16(psm);
1da177e4
LT
1149 err = 0;
1150 break;
1151 }
1152
1153 write_unlock_bh(&l2cap_sk_list.lock);
1154
1155 if (err < 0)
1156 goto done;
1157 }
1158
1159 sk->sk_max_ack_backlog = backlog;
1160 sk->sk_ack_backlog = 0;
1161 sk->sk_state = BT_LISTEN;
1162
1163done:
1164 release_sock(sk);
1165 return err;
1166}
1167
1168static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
1169{
1170 DECLARE_WAITQUEUE(wait, current);
1171 struct sock *sk = sock->sk, *nsk;
1172 long timeo;
1173 int err = 0;
1174
fcc70d5f 1175 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1176
1177 if (sk->sk_state != BT_LISTEN) {
1178 err = -EBADFD;
1179 goto done;
1180 }
1181
1182 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
1183
1184 BT_DBG("sk %p timeo %ld", sk, timeo);
1185
1186 /* Wait for an incoming connection. (wake-one). */
aa395145 1187 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1da177e4
LT
1188 while (!(nsk = bt_accept_dequeue(sk, newsock))) {
1189 set_current_state(TASK_INTERRUPTIBLE);
1190 if (!timeo) {
1191 err = -EAGAIN;
1192 break;
1193 }
1194
1195 release_sock(sk);
1196 timeo = schedule_timeout(timeo);
fcc70d5f 1197 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1198
1199 if (sk->sk_state != BT_LISTEN) {
1200 err = -EBADFD;
1201 break;
1202 }
1203
1204 if (signal_pending(current)) {
1205 err = sock_intr_errno(timeo);
1206 break;
1207 }
1208 }
1209 set_current_state(TASK_RUNNING);
aa395145 1210 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
1211
1212 if (err)
1213 goto done;
1214
1215 newsock->state = SS_CONNECTED;
1216
1217 BT_DBG("new socket %p", nsk);
1218
1219done:
1220 release_sock(sk);
1221 return err;
1222}
1223
1224static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
1225{
1226 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
1227 struct sock *sk = sock->sk;
1228
1229 BT_DBG("sock %p, sk %p", sock, sk);
1230
1231 addr->sa_family = AF_BLUETOOTH;
1232 *len = sizeof(struct sockaddr_l2);
1233
f29972de
MH
1234 if (peer) {
1235 la->l2_psm = l2cap_pi(sk)->psm;
1da177e4 1236 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
b4324b5d 1237 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->dcid);
f29972de
MH
1238 } else {
1239 la->l2_psm = l2cap_pi(sk)->sport;
1da177e4 1240 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
b4324b5d 1241 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->scid);
f29972de 1242 }
1da177e4 1243
1da177e4
LT
1244 return 0;
1245}
1246
6161c038
GP
1247static int __l2cap_wait_ack(struct sock *sk)
1248{
1249 DECLARE_WAITQUEUE(wait, current);
1250 int err = 0;
1251 int timeo = HZ/5;
1252
2b0b05dd 1253 add_wait_queue(sk_sleep(sk), &wait);
6161c038
GP
1254 while ((l2cap_pi(sk)->unacked_frames > 0 && l2cap_pi(sk)->conn)) {
1255 set_current_state(TASK_INTERRUPTIBLE);
1256
1257 if (!timeo)
1258 timeo = HZ/5;
1259
1260 if (signal_pending(current)) {
1261 err = sock_intr_errno(timeo);
1262 break;
1263 }
1264
1265 release_sock(sk);
1266 timeo = schedule_timeout(timeo);
1267 lock_sock(sk);
1268
1269 err = sock_error(sk);
1270 if (err)
1271 break;
1272 }
1273 set_current_state(TASK_RUNNING);
2b0b05dd 1274 remove_wait_queue(sk_sleep(sk), &wait);
6161c038
GP
1275 return err;
1276}
1277
e90bac06
GP
1278static void l2cap_monitor_timeout(unsigned long arg)
1279{
1280 struct sock *sk = (void *) arg;
e90bac06 1281
e686219a 1282 bh_lock_sock(sk);
e90bac06
GP
1283 if (l2cap_pi(sk)->retry_count >= l2cap_pi(sk)->remote_max_tx) {
1284 l2cap_send_disconn_req(l2cap_pi(sk)->conn, sk);
b13f5860 1285 bh_unlock_sock(sk);
e90bac06
GP
1286 return;
1287 }
1288
1289 l2cap_pi(sk)->retry_count++;
1290 __mod_monitor_timer();
1291
a2e12a2a 1292 l2cap_send_rr_or_rnr(l2cap_pi(sk), L2CAP_CTRL_POLL);
e686219a 1293 bh_unlock_sock(sk);
e90bac06
GP
1294}
1295
1296static void l2cap_retrans_timeout(unsigned long arg)
1297{
1298 struct sock *sk = (void *) arg;
e90bac06 1299
e686219a 1300 bh_lock_sock(sk);
e90bac06
GP
1301 l2cap_pi(sk)->retry_count = 1;
1302 __mod_monitor_timer();
1303
1304 l2cap_pi(sk)->conn_state |= L2CAP_CONN_WAIT_F;
1305
a2e12a2a 1306 l2cap_send_rr_or_rnr(l2cap_pi(sk), L2CAP_CTRL_POLL);
e686219a 1307 bh_unlock_sock(sk);
e90bac06
GP
1308}
1309
1c2acffb 1310static void l2cap_drop_acked_frames(struct sock *sk)
1da177e4 1311{
1c2acffb 1312 struct sk_buff *skb;
1da177e4 1313
812e737e
GP
1314 while ((skb = skb_peek(TX_QUEUE(sk))) &&
1315 l2cap_pi(sk)->unacked_frames) {
1c2acffb
GP
1316 if (bt_cb(skb)->tx_seq == l2cap_pi(sk)->expected_ack_seq)
1317 break;
1da177e4 1318
1c2acffb
GP
1319 skb = skb_dequeue(TX_QUEUE(sk));
1320 kfree_skb(skb);
1da177e4 1321
1c2acffb
GP
1322 l2cap_pi(sk)->unacked_frames--;
1323 }
1da177e4 1324
e90bac06
GP
1325 if (!l2cap_pi(sk)->unacked_frames)
1326 del_timer(&l2cap_pi(sk)->retrans_timer);
1c2acffb 1327}
1da177e4 1328
9a9c6a34 1329static inline void l2cap_do_send(struct sock *sk, struct sk_buff *skb)
1c2acffb
GP
1330{
1331 struct l2cap_pinfo *pi = l2cap_pi(sk);
1c2acffb
GP
1332
1333 BT_DBG("sk %p, skb %p len %d", sk, skb, skb->len);
1da177e4 1334
9a9c6a34 1335 hci_send_acl(pi->conn->hcon, skb, 0);
1c2acffb
GP
1336}
1337
6840ed07
GP
1338static int l2cap_streaming_send(struct sock *sk)
1339{
1340 struct sk_buff *skb, *tx_skb;
1341 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1342 u16 control, fcs;
6840ed07
GP
1343
1344 while ((skb = sk->sk_send_head)) {
1345 tx_skb = skb_clone(skb, GFP_ATOMIC);
1346
1347 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
1348 control |= pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT;
1349 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1350
e8235c6b 1351 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1352 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1353 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1354 }
1355
9a9c6a34 1356 l2cap_do_send(sk, tx_skb);
6840ed07
GP
1357
1358 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1359
1360 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1361 sk->sk_send_head = NULL;
1362 else
1363 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
1364
1365 skb = skb_dequeue(TX_QUEUE(sk));
1366 kfree_skb(skb);
1367 }
1368 return 0;
1369}
1370
dfc909be 1371static void l2cap_retransmit_one_frame(struct sock *sk, u8 tx_seq)
8f17154f
GP
1372{
1373 struct l2cap_pinfo *pi = l2cap_pi(sk);
1374 struct sk_buff *skb, *tx_skb;
1375 u16 control, fcs;
8f17154f
GP
1376
1377 skb = skb_peek(TX_QUEUE(sk));
f11d676d
GP
1378 if (!skb)
1379 return;
8f17154f 1380
f11d676d
GP
1381 do {
1382 if (bt_cb(skb)->tx_seq == tx_seq)
8f17154f 1383 break;
8f17154f 1384
f11d676d
GP
1385 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1386 return;
8f17154f 1387
f11d676d 1388 } while ((skb = skb_queue_next(TX_QUEUE(sk), skb)));
8f17154f 1389
f11d676d
GP
1390 if (pi->remote_max_tx &&
1391 bt_cb(skb)->retries == pi->remote_max_tx) {
1392 l2cap_send_disconn_req(pi->conn, sk);
1393 return;
1394 }
1395
1396 tx_skb = skb_clone(skb, GFP_ATOMIC);
1397 bt_cb(skb)->retries++;
1398 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
1399 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
1400 | (tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1401 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1402
1403 if (pi->fcs == L2CAP_FCS_CRC16) {
1404 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1405 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1406 }
1407
1408 l2cap_do_send(sk, tx_skb);
8f17154f
GP
1409}
1410
1c2acffb
GP
1411static int l2cap_ertm_send(struct sock *sk)
1412{
1413 struct sk_buff *skb, *tx_skb;
1414 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1415 u16 control, fcs;
9a9c6a34 1416 int nsent = 0;
1c2acffb 1417
e90bac06 1418
6e2b6722 1419 while ((skb = sk->sk_send_head) && (!l2cap_tx_window_full(sk))) {
1c2acffb 1420
e90bac06
GP
1421 if (pi->remote_max_tx &&
1422 bt_cb(skb)->retries == pi->remote_max_tx) {
1423 l2cap_send_disconn_req(pi->conn, sk);
1424 break;
1425 }
1426
e420aba3
AE
1427 tx_skb = skb_clone(skb, GFP_ATOMIC);
1428
e90bac06
GP
1429 bt_cb(skb)->retries++;
1430
1c2acffb 1431 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
d5392c8f
GP
1432 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
1433 control |= L2CAP_CTRL_FINAL;
1434 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
1435 }
9f121a5a 1436 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
1c2acffb
GP
1437 | (pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1438 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1439
e90bac06 1440
e8235c6b 1441 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1442 fcs = crc16(0, (u8 *)skb->data, tx_skb->len - 2);
1443 put_unaligned_le16(fcs, skb->data + tx_skb->len - 2);
1444 }
1445
9a9c6a34
GP
1446 l2cap_do_send(sk, tx_skb);
1447
e90bac06 1448 __mod_retrans_timer();
1c2acffb
GP
1449
1450 bt_cb(skb)->tx_seq = pi->next_tx_seq;
1451 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1452
1453 pi->unacked_frames++;
d5392c8f 1454 pi->frames_sent++;
1c2acffb
GP
1455
1456 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1457 sk->sk_send_head = NULL;
1458 else
1459 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
9e917af1
GP
1460
1461 nsent++;
1c2acffb
GP
1462 }
1463
9e917af1
GP
1464 return nsent;
1465}
1466
dfc909be
GP
1467static int l2cap_retransmit_frames(struct sock *sk)
1468{
1469 struct l2cap_pinfo *pi = l2cap_pi(sk);
1470 int ret;
1471
1472 spin_lock_bh(&pi->send_lock);
1473
1474 if (!skb_queue_empty(TX_QUEUE(sk)))
1475 sk->sk_send_head = TX_QUEUE(sk)->next;
1476
1477 pi->next_tx_seq = pi->expected_ack_seq;
1478 ret = l2cap_ertm_send(sk);
1479
1480 spin_unlock_bh(&pi->send_lock);
1481
1482 return ret;
1483}
1484
9a9c6a34 1485static void l2cap_send_ack(struct l2cap_pinfo *pi)
9e917af1
GP
1486{
1487 struct sock *sk = (struct sock *)pi;
1488 u16 control = 0;
dfc909be 1489 int nframes;
9e917af1
GP
1490
1491 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
1492
1493 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
1494 control |= L2CAP_SUPER_RCV_NOT_READY;
1890d36b 1495 pi->conn_state |= L2CAP_CONN_RNR_SENT;
9a9c6a34
GP
1496 l2cap_send_sframe(pi, control);
1497 return;
9e917af1 1498 }
dfc909be
GP
1499
1500 spin_lock_bh(&pi->send_lock);
1501 nframes = l2cap_ertm_send(sk);
1502 spin_unlock_bh(&pi->send_lock);
1503
1504 if (nframes > 0)
1505 return;
1506
1507 control |= L2CAP_SUPER_RCV_READY;
1508 l2cap_send_sframe(pi, control);
1c2acffb
GP
1509}
1510
9a9c6a34 1511static void l2cap_send_srejtail(struct sock *sk)
99b0d4b7
GP
1512{
1513 struct srej_list *tail;
1514 u16 control;
1515
1516 control = L2CAP_SUPER_SELECT_REJECT;
1517 control |= L2CAP_CTRL_FINAL;
1518
1519 tail = list_entry(SREJ_LIST(sk)->prev, struct srej_list, list);
1520 control |= tail->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
1521
1522 l2cap_send_sframe(l2cap_pi(sk), control);
99b0d4b7
GP
1523}
1524
1c2acffb
GP
1525static inline int l2cap_skbuff_fromiovec(struct sock *sk, struct msghdr *msg, int len, int count, struct sk_buff *skb)
1526{
1527 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1528 struct sk_buff **frag;
1529 int err, sent = 0;
1da177e4 1530
59203a21 1531 if (memcpy_fromiovec(skb_put(skb, count), msg->msg_iov, count))
1c2acffb 1532 return -EFAULT;
1da177e4
LT
1533
1534 sent += count;
1535 len -= count;
1536
1537 /* Continuation fragments (no L2CAP header) */
1538 frag = &skb_shinfo(skb)->frag_list;
1539 while (len) {
1540 count = min_t(unsigned int, conn->mtu, len);
1541
1542 *frag = bt_skb_send_alloc(sk, count, msg->msg_flags & MSG_DONTWAIT, &err);
1543 if (!*frag)
1c2acffb
GP
1544 return -EFAULT;
1545 if (memcpy_fromiovec(skb_put(*frag, count), msg->msg_iov, count))
1546 return -EFAULT;
1da177e4
LT
1547
1548 sent += count;
1549 len -= count;
1550
1551 frag = &(*frag)->next;
1552 }
1da177e4
LT
1553
1554 return sent;
1c2acffb 1555}
1da177e4 1556
1c2acffb
GP
1557static struct sk_buff *l2cap_create_connless_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1558{
1559 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1560 struct sk_buff *skb;
1561 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1562 struct l2cap_hdr *lh;
1563
1564 BT_DBG("sk %p len %d", sk, (int)len);
1565
1566 count = min_t(unsigned int, (conn->mtu - hlen), len);
1567 skb = bt_skb_send_alloc(sk, count + hlen,
1568 msg->msg_flags & MSG_DONTWAIT, &err);
1569 if (!skb)
1570 return ERR_PTR(-ENOMEM);
1571
1572 /* Create L2CAP header */
1573 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1574 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1575 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1576 put_unaligned_le16(l2cap_pi(sk)->psm, skb_put(skb, 2));
1577
1578 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1579 if (unlikely(err < 0)) {
1580 kfree_skb(skb);
1581 return ERR_PTR(err);
1582 }
1583 return skb;
1584}
1585
1586static struct sk_buff *l2cap_create_basic_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1587{
1588 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1589 struct sk_buff *skb;
1590 int err, count, hlen = L2CAP_HDR_SIZE;
1591 struct l2cap_hdr *lh;
1592
1593 BT_DBG("sk %p len %d", sk, (int)len);
1594
1595 count = min_t(unsigned int, (conn->mtu - hlen), len);
1596 skb = bt_skb_send_alloc(sk, count + hlen,
1597 msg->msg_flags & MSG_DONTWAIT, &err);
1598 if (!skb)
1599 return ERR_PTR(-ENOMEM);
1600
1601 /* Create L2CAP header */
1602 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1603 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1604 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1605
1606 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1607 if (unlikely(err < 0)) {
1608 kfree_skb(skb);
1609 return ERR_PTR(err);
1610 }
1611 return skb;
1612}
1613
6840ed07 1614static struct sk_buff *l2cap_create_iframe_pdu(struct sock *sk, struct msghdr *msg, size_t len, u16 control, u16 sdulen)
1c2acffb
GP
1615{
1616 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1617 struct sk_buff *skb;
1618 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1619 struct l2cap_hdr *lh;
1620
1621 BT_DBG("sk %p len %d", sk, (int)len);
1622
0ee0d208
GP
1623 if (!conn)
1624 return ERR_PTR(-ENOTCONN);
1625
c74e560c
GP
1626 if (sdulen)
1627 hlen += 2;
1628
fcc203c3
GP
1629 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1630 hlen += 2;
1631
1c2acffb
GP
1632 count = min_t(unsigned int, (conn->mtu - hlen), len);
1633 skb = bt_skb_send_alloc(sk, count + hlen,
1634 msg->msg_flags & MSG_DONTWAIT, &err);
1635 if (!skb)
1636 return ERR_PTR(-ENOMEM);
1637
1638 /* Create L2CAP header */
1639 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1640 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1641 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1642 put_unaligned_le16(control, skb_put(skb, 2));
c74e560c
GP
1643 if (sdulen)
1644 put_unaligned_le16(sdulen, skb_put(skb, 2));
1c2acffb
GP
1645
1646 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1647 if (unlikely(err < 0)) {
1648 kfree_skb(skb);
1649 return ERR_PTR(err);
1650 }
e90bac06 1651
fcc203c3
GP
1652 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1653 put_unaligned_le16(0, skb_put(skb, 2));
1654
e90bac06 1655 bt_cb(skb)->retries = 0;
1c2acffb 1656 return skb;
1da177e4
LT
1657}
1658
c74e560c
GP
1659static inline int l2cap_sar_segment_sdu(struct sock *sk, struct msghdr *msg, size_t len)
1660{
1661 struct l2cap_pinfo *pi = l2cap_pi(sk);
1662 struct sk_buff *skb;
1663 struct sk_buff_head sar_queue;
1664 u16 control;
1665 size_t size = 0;
1666
ff12fd64 1667 skb_queue_head_init(&sar_queue);
c74e560c 1668 control = L2CAP_SDU_START;
1c762159 1669 skb = l2cap_create_iframe_pdu(sk, msg, pi->remote_mps, control, len);
c74e560c
GP
1670 if (IS_ERR(skb))
1671 return PTR_ERR(skb);
1672
1673 __skb_queue_tail(&sar_queue, skb);
1c762159
GP
1674 len -= pi->remote_mps;
1675 size += pi->remote_mps;
c74e560c
GP
1676
1677 while (len > 0) {
1678 size_t buflen;
1679
1c762159 1680 if (len > pi->remote_mps) {
44651b85 1681 control = L2CAP_SDU_CONTINUE;
1c762159 1682 buflen = pi->remote_mps;
c74e560c 1683 } else {
44651b85 1684 control = L2CAP_SDU_END;
c74e560c
GP
1685 buflen = len;
1686 }
1687
6840ed07 1688 skb = l2cap_create_iframe_pdu(sk, msg, buflen, control, 0);
c74e560c
GP
1689 if (IS_ERR(skb)) {
1690 skb_queue_purge(&sar_queue);
1691 return PTR_ERR(skb);
1692 }
1693
1694 __skb_queue_tail(&sar_queue, skb);
1695 len -= buflen;
1696 size += buflen;
c74e560c
GP
1697 }
1698 skb_queue_splice_tail(&sar_queue, TX_QUEUE(sk));
dfc909be 1699 spin_lock_bh(&pi->send_lock);
c74e560c
GP
1700 if (sk->sk_send_head == NULL)
1701 sk->sk_send_head = sar_queue.next;
dfc909be 1702 spin_unlock_bh(&pi->send_lock);
c74e560c
GP
1703
1704 return size;
1705}
1706
1da177e4
LT
1707static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
1708{
1709 struct sock *sk = sock->sk;
1c2acffb
GP
1710 struct l2cap_pinfo *pi = l2cap_pi(sk);
1711 struct sk_buff *skb;
1712 u16 control;
1713 int err;
1da177e4
LT
1714
1715 BT_DBG("sock %p, sk %p", sock, sk);
1716
c1cbe4b7
BL
1717 err = sock_error(sk);
1718 if (err)
1719 return err;
1da177e4
LT
1720
1721 if (msg->msg_flags & MSG_OOB)
1722 return -EOPNOTSUPP;
1723
1da177e4
LT
1724 lock_sock(sk);
1725
1c2acffb 1726 if (sk->sk_state != BT_CONNECTED) {
1da177e4 1727 err = -ENOTCONN;
1c2acffb
GP
1728 goto done;
1729 }
1da177e4 1730
1c2acffb
GP
1731 /* Connectionless channel */
1732 if (sk->sk_type == SOCK_DGRAM) {
1733 skb = l2cap_create_connless_pdu(sk, msg, len);
9a9c6a34 1734 if (IS_ERR(skb)) {
477fffb0 1735 err = PTR_ERR(skb);
9a9c6a34
GP
1736 } else {
1737 l2cap_do_send(sk, skb);
1738 err = len;
1739 }
1c2acffb
GP
1740 goto done;
1741 }
1742
1743 switch (pi->mode) {
1744 case L2CAP_MODE_BASIC:
c69163e9
GP
1745 /* Check outgoing MTU */
1746 if (len > pi->omtu) {
1747 err = -EINVAL;
1748 goto done;
1749 }
1750
1c2acffb
GP
1751 /* Create a basic PDU */
1752 skb = l2cap_create_basic_pdu(sk, msg, len);
1753 if (IS_ERR(skb)) {
1754 err = PTR_ERR(skb);
1755 goto done;
1756 }
1757
9a9c6a34
GP
1758 l2cap_do_send(sk, skb);
1759 err = len;
1c2acffb
GP
1760 break;
1761
1762 case L2CAP_MODE_ERTM:
6840ed07 1763 case L2CAP_MODE_STREAMING:
1c2acffb 1764 /* Entire SDU fits into one PDU */
1c762159 1765 if (len <= pi->remote_mps) {
1c2acffb 1766 control = L2CAP_SDU_UNSEGMENTED;
6840ed07 1767 skb = l2cap_create_iframe_pdu(sk, msg, len, control, 0);
1c2acffb
GP
1768 if (IS_ERR(skb)) {
1769 err = PTR_ERR(skb);
1770 goto done;
1771 }
c74e560c 1772 __skb_queue_tail(TX_QUEUE(sk), skb);
dfc909be
GP
1773
1774 if (pi->mode == L2CAP_MODE_ERTM)
1775 spin_lock_bh(&pi->send_lock);
1776
c74e560c
GP
1777 if (sk->sk_send_head == NULL)
1778 sk->sk_send_head = skb;
dfc909be
GP
1779
1780 if (pi->mode == L2CAP_MODE_ERTM)
1781 spin_unlock_bh(&pi->send_lock);
1c2acffb 1782 } else {
c74e560c
GP
1783 /* Segment SDU into multiples PDUs */
1784 err = l2cap_sar_segment_sdu(sk, msg, len);
1785 if (err < 0)
1786 goto done;
1c2acffb 1787 }
1c2acffb 1788
dfc909be 1789 if (pi->mode == L2CAP_MODE_STREAMING) {
6840ed07 1790 err = l2cap_streaming_send(sk);
dfc909be 1791 } else {
6e2b6722
GP
1792 if (pi->conn_state & L2CAP_CONN_REMOTE_BUSY &&
1793 pi->conn_state && L2CAP_CONN_WAIT_F) {
1794 err = len;
1795 break;
1796 }
dfc909be 1797 spin_lock_bh(&pi->send_lock);
6840ed07 1798 err = l2cap_ertm_send(sk);
dfc909be
GP
1799 spin_unlock_bh(&pi->send_lock);
1800 }
6840ed07 1801
9e917af1 1802 if (err >= 0)
1c2acffb
GP
1803 err = len;
1804 break;
1805
1806 default:
1807 BT_DBG("bad state %1.1x", pi->mode);
1808 err = -EINVAL;
1809 }
1810
1811done:
1da177e4
LT
1812 release_sock(sk);
1813 return err;
1814}
1815
f66dc81f
MH
1816static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
1817{
1818 struct sock *sk = sock->sk;
1819
1820 lock_sock(sk);
1821
1822 if (sk->sk_state == BT_CONNECT2 && bt_sk(sk)->defer_setup) {
1823 struct l2cap_conn_rsp rsp;
1824
1825 sk->sk_state = BT_CONFIG;
1826
1827 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1828 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
1829 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
1830 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
1831 l2cap_send_cmd(l2cap_pi(sk)->conn, l2cap_pi(sk)->ident,
1832 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
1833
1834 release_sock(sk);
1835 return 0;
1836 }
1837
1838 release_sock(sk);
1839
1840 return bt_sock_recvmsg(iocb, sock, msg, len, flags);
1841}
1842
b7058842 1843static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
1da177e4
LT
1844{
1845 struct sock *sk = sock->sk;
1846 struct l2cap_options opts;
f29972de 1847 int len, err = 0;
1da177e4
LT
1848 u32 opt;
1849
1850 BT_DBG("sk %p", sk);
1851
1852 lock_sock(sk);
1853
1854 switch (optname) {
1855 case L2CAP_OPTIONS:
0878b666
MH
1856 opts.imtu = l2cap_pi(sk)->imtu;
1857 opts.omtu = l2cap_pi(sk)->omtu;
1858 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1859 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1860 opts.fcs = l2cap_pi(sk)->fcs;
68d7f0ce 1861 opts.max_tx = l2cap_pi(sk)->max_tx;
14b5aa71 1862 opts.txwin_size = (__u16)l2cap_pi(sk)->tx_win;
0878b666 1863
1da177e4
LT
1864 len = min_t(unsigned int, sizeof(opts), optlen);
1865 if (copy_from_user((char *) &opts, optval, len)) {
1866 err = -EFAULT;
1867 break;
1868 }
0878b666 1869
0041ecfa
JPRV
1870 l2cap_pi(sk)->mode = opts.mode;
1871 switch (l2cap_pi(sk)->mode) {
1872 case L2CAP_MODE_BASIC:
1873 break;
1874 case L2CAP_MODE_ERTM:
1875 case L2CAP_MODE_STREAMING:
1876 if (enable_ertm)
1877 break;
1878 /* fall through */
1879 default:
1880 err = -EINVAL;
1881 break;
1882 }
1883
c6b03cf9
MH
1884 l2cap_pi(sk)->imtu = opts.imtu;
1885 l2cap_pi(sk)->omtu = opts.omtu;
fcc203c3 1886 l2cap_pi(sk)->fcs = opts.fcs;
68d7f0ce 1887 l2cap_pi(sk)->max_tx = opts.max_tx;
14b5aa71 1888 l2cap_pi(sk)->tx_win = (__u8)opts.txwin_size;
1da177e4
LT
1889 break;
1890
1891 case L2CAP_LM:
1892 if (get_user(opt, (u32 __user *) optval)) {
1893 err = -EFAULT;
1894 break;
1895 }
1896
2af6b9d5
MH
1897 if (opt & L2CAP_LM_AUTH)
1898 l2cap_pi(sk)->sec_level = BT_SECURITY_LOW;
1899 if (opt & L2CAP_LM_ENCRYPT)
1900 l2cap_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
1901 if (opt & L2CAP_LM_SECURE)
1902 l2cap_pi(sk)->sec_level = BT_SECURITY_HIGH;
1903
1904 l2cap_pi(sk)->role_switch = (opt & L2CAP_LM_MASTER);
1905 l2cap_pi(sk)->force_reliable = (opt & L2CAP_LM_RELIABLE);
1da177e4
LT
1906 break;
1907
1908 default:
1909 err = -ENOPROTOOPT;
1910 break;
1911 }
1912
1913 release_sock(sk);
1914 return err;
1915}
1916
b7058842 1917static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
d58daf42
MH
1918{
1919 struct sock *sk = sock->sk;
2af6b9d5
MH
1920 struct bt_security sec;
1921 int len, err = 0;
f66dc81f 1922 u32 opt;
d58daf42
MH
1923
1924 BT_DBG("sk %p", sk);
1925
1926 if (level == SOL_L2CAP)
1927 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
1928
0588d94f
MH
1929 if (level != SOL_BLUETOOTH)
1930 return -ENOPROTOOPT;
1931
d58daf42
MH
1932 lock_sock(sk);
1933
1934 switch (optname) {
2af6b9d5 1935 case BT_SECURITY:
bd3c9e25
GP
1936 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
1937 && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1938 err = -EINVAL;
1939 break;
1940 }
1941
2af6b9d5
MH
1942 sec.level = BT_SECURITY_LOW;
1943
1944 len = min_t(unsigned int, sizeof(sec), optlen);
1945 if (copy_from_user((char *) &sec, optval, len)) {
1946 err = -EFAULT;
1947 break;
1948 }
1949
1950 if (sec.level < BT_SECURITY_LOW ||
1951 sec.level > BT_SECURITY_HIGH) {
1952 err = -EINVAL;
1953 break;
1954 }
1955
1956 l2cap_pi(sk)->sec_level = sec.level;
1957 break;
1958
f66dc81f
MH
1959 case BT_DEFER_SETUP:
1960 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1961 err = -EINVAL;
1962 break;
1963 }
1964
1965 if (get_user(opt, (u32 __user *) optval)) {
1966 err = -EFAULT;
1967 break;
1968 }
1969
1970 bt_sk(sk)->defer_setup = opt;
1971 break;
1972
d58daf42
MH
1973 default:
1974 err = -ENOPROTOOPT;
1975 break;
1976 }
1977
1978 release_sock(sk);
1979 return err;
1980}
1981
1982static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
1da177e4
LT
1983{
1984 struct sock *sk = sock->sk;
1985 struct l2cap_options opts;
1986 struct l2cap_conninfo cinfo;
1987 int len, err = 0;
2af6b9d5 1988 u32 opt;
1da177e4
LT
1989
1990 BT_DBG("sk %p", sk);
1991
1992 if (get_user(len, optlen))
1993 return -EFAULT;
1994
1995 lock_sock(sk);
1996
1997 switch (optname) {
1998 case L2CAP_OPTIONS:
1999 opts.imtu = l2cap_pi(sk)->imtu;
2000 opts.omtu = l2cap_pi(sk)->omtu;
2001 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 2002 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 2003 opts.fcs = l2cap_pi(sk)->fcs;
68d7f0ce 2004 opts.max_tx = l2cap_pi(sk)->max_tx;
14b5aa71 2005 opts.txwin_size = (__u16)l2cap_pi(sk)->tx_win;
1da177e4
LT
2006
2007 len = min_t(unsigned int, len, sizeof(opts));
2008 if (copy_to_user(optval, (char *) &opts, len))
2009 err = -EFAULT;
2010
2011 break;
2012
2013 case L2CAP_LM:
2af6b9d5
MH
2014 switch (l2cap_pi(sk)->sec_level) {
2015 case BT_SECURITY_LOW:
2016 opt = L2CAP_LM_AUTH;
2017 break;
2018 case BT_SECURITY_MEDIUM:
2019 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
2020 break;
2021 case BT_SECURITY_HIGH:
2022 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
2023 L2CAP_LM_SECURE;
2024 break;
2025 default:
2026 opt = 0;
2027 break;
2028 }
2029
2030 if (l2cap_pi(sk)->role_switch)
2031 opt |= L2CAP_LM_MASTER;
2032
2033 if (l2cap_pi(sk)->force_reliable)
2034 opt |= L2CAP_LM_RELIABLE;
2035
2036 if (put_user(opt, (u32 __user *) optval))
1da177e4
LT
2037 err = -EFAULT;
2038 break;
2039
2040 case L2CAP_CONNINFO:
f66dc81f
MH
2041 if (sk->sk_state != BT_CONNECTED &&
2042 !(sk->sk_state == BT_CONNECT2 &&
2043 bt_sk(sk)->defer_setup)) {
1da177e4
LT
2044 err = -ENOTCONN;
2045 break;
2046 }
2047
2048 cinfo.hci_handle = l2cap_pi(sk)->conn->hcon->handle;
2049 memcpy(cinfo.dev_class, l2cap_pi(sk)->conn->hcon->dev_class, 3);
2050
2051 len = min_t(unsigned int, len, sizeof(cinfo));
2052 if (copy_to_user(optval, (char *) &cinfo, len))
2053 err = -EFAULT;
2054
2055 break;
2056
2057 default:
2058 err = -ENOPROTOOPT;
2059 break;
2060 }
2061
2062 release_sock(sk);
2063 return err;
2064}
2065
d58daf42
MH
2066static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
2067{
2068 struct sock *sk = sock->sk;
2af6b9d5 2069 struct bt_security sec;
d58daf42
MH
2070 int len, err = 0;
2071
2072 BT_DBG("sk %p", sk);
2073
2074 if (level == SOL_L2CAP)
2075 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
2076
0588d94f
MH
2077 if (level != SOL_BLUETOOTH)
2078 return -ENOPROTOOPT;
2079
d58daf42
MH
2080 if (get_user(len, optlen))
2081 return -EFAULT;
2082
2083 lock_sock(sk);
2084
2085 switch (optname) {
2af6b9d5 2086 case BT_SECURITY:
bd3c9e25
GP
2087 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
2088 && sk->sk_type != SOCK_RAW) {
0588d94f
MH
2089 err = -EINVAL;
2090 break;
2091 }
2092
2af6b9d5
MH
2093 sec.level = l2cap_pi(sk)->sec_level;
2094
2095 len = min_t(unsigned int, len, sizeof(sec));
2096 if (copy_to_user(optval, (char *) &sec, len))
2097 err = -EFAULT;
2098
2099 break;
2100
f66dc81f
MH
2101 case BT_DEFER_SETUP:
2102 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
2103 err = -EINVAL;
2104 break;
2105 }
2106
2107 if (put_user(bt_sk(sk)->defer_setup, (u32 __user *) optval))
2108 err = -EFAULT;
2109
2110 break;
2111
d58daf42
MH
2112 default:
2113 err = -ENOPROTOOPT;
2114 break;
2115 }
2116
2117 release_sock(sk);
2118 return err;
2119}
2120
1da177e4
LT
2121static int l2cap_sock_shutdown(struct socket *sock, int how)
2122{
2123 struct sock *sk = sock->sk;
2124 int err = 0;
2125
2126 BT_DBG("sock %p, sk %p", sock, sk);
2127
2128 if (!sk)
2129 return 0;
2130
2131 lock_sock(sk);
2132 if (!sk->sk_shutdown) {
6161c038
GP
2133 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2134 err = __l2cap_wait_ack(sk);
2135
1da177e4
LT
2136 sk->sk_shutdown = SHUTDOWN_MASK;
2137 l2cap_sock_clear_timer(sk);
2138 __l2cap_sock_close(sk, 0);
2139
2140 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
b1235d79
MH
2141 err = bt_sock_wait_state(sk, BT_CLOSED,
2142 sk->sk_lingertime);
1da177e4
LT
2143 }
2144 release_sock(sk);
2145 return err;
2146}
2147
2148static int l2cap_sock_release(struct socket *sock)
2149{
2150 struct sock *sk = sock->sk;
2151 int err;
2152
2153 BT_DBG("sock %p, sk %p", sock, sk);
2154
2155 if (!sk)
2156 return 0;
2157
2158 err = l2cap_sock_shutdown(sock, 2);
2159
2160 sock_orphan(sk);
2161 l2cap_sock_kill(sk);
2162 return err;
2163}
2164
1da177e4
LT
2165static void l2cap_chan_ready(struct sock *sk)
2166{
2167 struct sock *parent = bt_sk(sk)->parent;
2168
2169 BT_DBG("sk %p, parent %p", sk, parent);
2170
2171 l2cap_pi(sk)->conf_state = 0;
2172 l2cap_sock_clear_timer(sk);
2173
2174 if (!parent) {
2175 /* Outgoing channel.
2176 * Wake up socket sleeping on connect.
2177 */
2178 sk->sk_state = BT_CONNECTED;
2179 sk->sk_state_change(sk);
2180 } else {
2181 /* Incoming channel.
2182 * Wake up socket sleeping on accept.
2183 */
2184 parent->sk_data_ready(parent, 0);
2185 }
2186}
2187
2188/* Copy frame to all raw sockets on that connection */
2189static void l2cap_raw_recv(struct l2cap_conn *conn, struct sk_buff *skb)
2190{
2191 struct l2cap_chan_list *l = &conn->chan_list;
2192 struct sk_buff *nskb;
af05b30b 2193 struct sock *sk;
1da177e4
LT
2194
2195 BT_DBG("conn %p", conn);
2196
2197 read_lock(&l->lock);
2198 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2199 if (sk->sk_type != SOCK_RAW)
2200 continue;
2201
2202 /* Don't send frame to the socket it came from */
2203 if (skb->sk == sk)
2204 continue;
af05b30b
GP
2205 nskb = skb_clone(skb, GFP_ATOMIC);
2206 if (!nskb)
1da177e4
LT
2207 continue;
2208
2209 if (sock_queue_rcv_skb(sk, nskb))
2210 kfree_skb(nskb);
2211 }
2212 read_unlock(&l->lock);
2213}
2214
2215/* ---- L2CAP signalling commands ---- */
2216static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
2217 u8 code, u8 ident, u16 dlen, void *data)
2218{
2219 struct sk_buff *skb, **frag;
2220 struct l2cap_cmd_hdr *cmd;
2221 struct l2cap_hdr *lh;
2222 int len, count;
2223
af05b30b
GP
2224 BT_DBG("conn %p, code 0x%2.2x, ident 0x%2.2x, len %d",
2225 conn, code, ident, dlen);
1da177e4
LT
2226
2227 len = L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE + dlen;
2228 count = min_t(unsigned int, conn->mtu, len);
2229
2230 skb = bt_skb_alloc(count, GFP_ATOMIC);
2231 if (!skb)
2232 return NULL;
2233
2234 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
aca3192c 2235 lh->len = cpu_to_le16(L2CAP_CMD_HDR_SIZE + dlen);
8db4dc46 2236 lh->cid = cpu_to_le16(L2CAP_CID_SIGNALING);
1da177e4
LT
2237
2238 cmd = (struct l2cap_cmd_hdr *) skb_put(skb, L2CAP_CMD_HDR_SIZE);
2239 cmd->code = code;
2240 cmd->ident = ident;
aca3192c 2241 cmd->len = cpu_to_le16(dlen);
1da177e4
LT
2242
2243 if (dlen) {
2244 count -= L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE;
2245 memcpy(skb_put(skb, count), data, count);
2246 data += count;
2247 }
2248
2249 len -= skb->len;
2250
2251 /* Continuation fragments (no L2CAP header) */
2252 frag = &skb_shinfo(skb)->frag_list;
2253 while (len) {
2254 count = min_t(unsigned int, conn->mtu, len);
2255
2256 *frag = bt_skb_alloc(count, GFP_ATOMIC);
2257 if (!*frag)
2258 goto fail;
2259
2260 memcpy(skb_put(*frag, count), data, count);
2261
2262 len -= count;
2263 data += count;
2264
2265 frag = &(*frag)->next;
2266 }
2267
2268 return skb;
2269
2270fail:
2271 kfree_skb(skb);
2272 return NULL;
2273}
2274
2275static inline int l2cap_get_conf_opt(void **ptr, int *type, int *olen, unsigned long *val)
2276{
2277 struct l2cap_conf_opt *opt = *ptr;
2278 int len;
2279
2280 len = L2CAP_CONF_OPT_SIZE + opt->len;
2281 *ptr += len;
2282
2283 *type = opt->type;
2284 *olen = opt->len;
2285
2286 switch (opt->len) {
2287 case 1:
2288 *val = *((u8 *) opt->val);
2289 break;
2290
2291 case 2:
861d6882 2292 *val = __le16_to_cpu(*((__le16 *) opt->val));
1da177e4
LT
2293 break;
2294
2295 case 4:
861d6882 2296 *val = __le32_to_cpu(*((__le32 *) opt->val));
1da177e4
LT
2297 break;
2298
2299 default:
2300 *val = (unsigned long) opt->val;
2301 break;
2302 }
2303
2304 BT_DBG("type 0x%2.2x len %d val 0x%lx", *type, opt->len, *val);
2305 return len;
2306}
2307
1da177e4
LT
2308static void l2cap_add_conf_opt(void **ptr, u8 type, u8 len, unsigned long val)
2309{
2310 struct l2cap_conf_opt *opt = *ptr;
2311
2312 BT_DBG("type 0x%2.2x len %d val 0x%lx", type, len, val);
2313
2314 opt->type = type;
2315 opt->len = len;
2316
2317 switch (len) {
2318 case 1:
2319 *((u8 *) opt->val) = val;
2320 break;
2321
2322 case 2:
8e036fc3 2323 *((__le16 *) opt->val) = cpu_to_le16(val);
1da177e4
LT
2324 break;
2325
2326 case 4:
8e036fc3 2327 *((__le32 *) opt->val) = cpu_to_le32(val);
1da177e4
LT
2328 break;
2329
2330 default:
2331 memcpy(opt->val, (void *) val, len);
2332 break;
2333 }
2334
2335 *ptr += L2CAP_CONF_OPT_SIZE + len;
2336}
2337
c1b4f43b
GP
2338static void l2cap_ack_timeout(unsigned long arg)
2339{
2340 struct sock *sk = (void *) arg;
2341
2342 bh_lock_sock(sk);
2343 l2cap_send_ack(l2cap_pi(sk));
2344 bh_unlock_sock(sk);
2345}
2346
0565c1c2
GP
2347static inline void l2cap_ertm_init(struct sock *sk)
2348{
2349 l2cap_pi(sk)->expected_ack_seq = 0;
2350 l2cap_pi(sk)->unacked_frames = 0;
2351 l2cap_pi(sk)->buffer_seq = 0;
803020c6 2352 l2cap_pi(sk)->num_acked = 0;
d5392c8f 2353 l2cap_pi(sk)->frames_sent = 0;
0565c1c2
GP
2354
2355 setup_timer(&l2cap_pi(sk)->retrans_timer,
2356 l2cap_retrans_timeout, (unsigned long) sk);
2357 setup_timer(&l2cap_pi(sk)->monitor_timer,
2358 l2cap_monitor_timeout, (unsigned long) sk);
c1b4f43b
GP
2359 setup_timer(&l2cap_pi(sk)->ack_timer,
2360 l2cap_ack_timeout, (unsigned long) sk);
0565c1c2
GP
2361
2362 __skb_queue_head_init(SREJ_QUEUE(sk));
1890d36b 2363 __skb_queue_head_init(BUSY_QUEUE(sk));
dfc909be 2364 spin_lock_init(&l2cap_pi(sk)->send_lock);
1890d36b
GP
2365
2366 INIT_WORK(&l2cap_pi(sk)->busy_work, l2cap_busy_work);
0565c1c2
GP
2367}
2368
f2fcfcd6
GP
2369static int l2cap_mode_supported(__u8 mode, __u32 feat_mask)
2370{
2371 u32 local_feat_mask = l2cap_feat_mask;
2372 if (enable_ertm)
6840ed07 2373 local_feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING;
f2fcfcd6
GP
2374
2375 switch (mode) {
2376 case L2CAP_MODE_ERTM:
2377 return L2CAP_FEAT_ERTM & feat_mask & local_feat_mask;
2378 case L2CAP_MODE_STREAMING:
2379 return L2CAP_FEAT_STREAMING & feat_mask & local_feat_mask;
2380 default:
2381 return 0x00;
2382 }
2383}
2384
2385static inline __u8 l2cap_select_mode(__u8 mode, __u16 remote_feat_mask)
2386{
2387 switch (mode) {
2388 case L2CAP_MODE_STREAMING:
2389 case L2CAP_MODE_ERTM:
2390 if (l2cap_mode_supported(mode, remote_feat_mask))
2391 return mode;
2392 /* fall through */
2393 default:
2394 return L2CAP_MODE_BASIC;
2395 }
2396}
2397
1da177e4
LT
2398static int l2cap_build_conf_req(struct sock *sk, void *data)
2399{
2400 struct l2cap_pinfo *pi = l2cap_pi(sk);
2401 struct l2cap_conf_req *req = data;
bd3c9e25 2402 struct l2cap_conf_rfc rfc = { .mode = pi->mode };
1da177e4
LT
2403 void *ptr = req->data;
2404
2405 BT_DBG("sk %p", sk);
2406
f2fcfcd6
GP
2407 if (pi->num_conf_req || pi->num_conf_rsp)
2408 goto done;
2409
2410 switch (pi->mode) {
2411 case L2CAP_MODE_STREAMING:
2412 case L2CAP_MODE_ERTM:
2413 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
22121fc9
GP
2414 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2415 l2cap_send_disconn_req(pi->conn, sk);
f2fcfcd6
GP
2416 break;
2417 default:
2418 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2419 break;
2420 }
2421
2422done:
65c7c491
MH
2423 switch (pi->mode) {
2424 case L2CAP_MODE_BASIC:
2425 if (pi->imtu != L2CAP_DEFAULT_MTU)
2426 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->imtu);
2427 break;
2428
2429 case L2CAP_MODE_ERTM:
2430 rfc.mode = L2CAP_MODE_ERTM;
14b5aa71 2431 rfc.txwin_size = pi->tx_win;
68d7f0ce 2432 rfc.max_transmit = pi->max_tx;
f2fcfcd6
GP
2433 rfc.retrans_timeout = 0;
2434 rfc.monitor_timeout = 0;
c74e560c 2435 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091 2436 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
1c762159 2437 rfc.max_pdu_size = cpu_to_le16(pi->conn->mtu - 10);
f2fcfcd6
GP
2438
2439 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2440 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2441
2442 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2443 break;
2444
2445 if (pi->fcs == L2CAP_FCS_NONE ||
2446 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2447 pi->fcs = L2CAP_FCS_NONE;
2448 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2449 }
f2fcfcd6
GP
2450 break;
2451
2452 case L2CAP_MODE_STREAMING:
2453 rfc.mode = L2CAP_MODE_STREAMING;
2454 rfc.txwin_size = 0;
2455 rfc.max_transmit = 0;
2456 rfc.retrans_timeout = 0;
2457 rfc.monitor_timeout = 0;
c74e560c 2458 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091 2459 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
1c762159 2460 rfc.max_pdu_size = cpu_to_le16(pi->conn->mtu - 10);
65c7c491
MH
2461
2462 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2463 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2464
2465 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2466 break;
2467
2468 if (pi->fcs == L2CAP_FCS_NONE ||
2469 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2470 pi->fcs = L2CAP_FCS_NONE;
2471 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2472 }
65c7c491
MH
2473 break;
2474 }
1da177e4
LT
2475
2476 /* FIXME: Need actual value of the flush timeout */
2477 //if (flush_to != L2CAP_DEFAULT_FLUSH_TO)
2478 // l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO, 2, pi->flush_to);
2479
aca3192c
YH
2480 req->dcid = cpu_to_le16(pi->dcid);
2481 req->flags = cpu_to_le16(0);
1da177e4
LT
2482
2483 return ptr - data;
2484}
2485
5dee9e7c 2486static int l2cap_parse_conf_req(struct sock *sk, void *data)
1da177e4
LT
2487{
2488 struct l2cap_pinfo *pi = l2cap_pi(sk);
5dee9e7c
MH
2489 struct l2cap_conf_rsp *rsp = data;
2490 void *ptr = rsp->data;
2491 void *req = pi->conf_req;
2492 int len = pi->conf_len;
2493 int type, hint, olen;
2494 unsigned long val;
6464f35f 2495 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
861d6882 2496 u16 mtu = L2CAP_DEFAULT_MTU;
5dee9e7c 2497 u16 result = L2CAP_CONF_SUCCESS;
1da177e4 2498
5dee9e7c 2499 BT_DBG("sk %p", sk);
820ae1b8 2500
5dee9e7c
MH
2501 while (len >= L2CAP_CONF_OPT_SIZE) {
2502 len -= l2cap_get_conf_opt(&req, &type, &olen, &val);
1da177e4 2503
589d2746 2504 hint = type & L2CAP_CONF_HINT;
47ec1dcd 2505 type &= L2CAP_CONF_MASK;
5dee9e7c
MH
2506
2507 switch (type) {
2508 case L2CAP_CONF_MTU:
861d6882 2509 mtu = val;
5dee9e7c
MH
2510 break;
2511
2512 case L2CAP_CONF_FLUSH_TO:
2513 pi->flush_to = val;
2514 break;
2515
2516 case L2CAP_CONF_QOS:
2517 break;
2518
6464f35f
MH
2519 case L2CAP_CONF_RFC:
2520 if (olen == sizeof(rfc))
2521 memcpy(&rfc, (void *) val, olen);
2522 break;
2523
fcc203c3
GP
2524 case L2CAP_CONF_FCS:
2525 if (val == L2CAP_FCS_NONE)
2526 pi->conf_state |= L2CAP_CONF_NO_FCS_RECV;
2527
2528 break;
2529
5dee9e7c
MH
2530 default:
2531 if (hint)
2532 break;
2533
2534 result = L2CAP_CONF_UNKNOWN;
2535 *((u8 *) ptr++) = type;
2536 break;
2537 }
2538 }
2539
f2fcfcd6
GP
2540 if (pi->num_conf_rsp || pi->num_conf_req)
2541 goto done;
2542
2543 switch (pi->mode) {
2544 case L2CAP_MODE_STREAMING:
2545 case L2CAP_MODE_ERTM:
2546 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
2547 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2548 return -ECONNREFUSED;
2549 break;
2550 default:
2551 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2552 break;
2553 }
2554
2555done:
2556 if (pi->mode != rfc.mode) {
2557 result = L2CAP_CONF_UNACCEPT;
2558 rfc.mode = pi->mode;
2559
2560 if (pi->num_conf_rsp == 1)
2561 return -ECONNREFUSED;
2562
2563 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2564 sizeof(rfc), (unsigned long) &rfc);
2565 }
2566
2567
5dee9e7c
MH
2568 if (result == L2CAP_CONF_SUCCESS) {
2569 /* Configure output options and let the other side know
2570 * which ones we don't like. */
2571
f2fcfcd6
GP
2572 if (mtu < L2CAP_DEFAULT_MIN_MTU)
2573 result = L2CAP_CONF_UNACCEPT;
2574 else {
2575 pi->omtu = mtu;
2576 pi->conf_state |= L2CAP_CONF_MTU_DONE;
2577 }
2578 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
6464f35f 2579
f2fcfcd6
GP
2580 switch (rfc.mode) {
2581 case L2CAP_MODE_BASIC:
2582 pi->fcs = L2CAP_FCS_NONE;
2583 pi->conf_state |= L2CAP_CONF_MODE_DONE;
2584 break;
2585
2586 case L2CAP_MODE_ERTM:
2587 pi->remote_tx_win = rfc.txwin_size;
2588 pi->remote_max_tx = rfc.max_transmit;
1c762159
GP
2589 if (rfc.max_pdu_size > pi->conn->mtu - 10)
2590 rfc.max_pdu_size = le16_to_cpu(pi->conn->mtu - 10);
2591
2592 pi->remote_mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6 2593
10467e9e
GP
2594 rfc.retrans_timeout =
2595 le16_to_cpu(L2CAP_DEFAULT_RETRANS_TO);
2596 rfc.monitor_timeout =
2597 le16_to_cpu(L2CAP_DEFAULT_MONITOR_TO);
f2fcfcd6
GP
2598
2599 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2600
2601 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2602 sizeof(rfc), (unsigned long) &rfc);
2603
f2fcfcd6
GP
2604 break;
2605
2606 case L2CAP_MODE_STREAMING:
1c762159
GP
2607 if (rfc.max_pdu_size > pi->conn->mtu - 10)
2608 rfc.max_pdu_size = le16_to_cpu(pi->conn->mtu - 10);
2609
2610 pi->remote_mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2611
2612 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2613
2614 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2615 sizeof(rfc), (unsigned long) &rfc);
2616
f2fcfcd6
GP
2617 break;
2618
2619 default:
5dee9e7c 2620 result = L2CAP_CONF_UNACCEPT;
5dee9e7c 2621
6464f35f 2622 memset(&rfc, 0, sizeof(rfc));
f2fcfcd6
GP
2623 rfc.mode = pi->mode;
2624 }
6464f35f 2625
f2fcfcd6
GP
2626 if (result == L2CAP_CONF_SUCCESS)
2627 pi->conf_state |= L2CAP_CONF_OUTPUT_DONE;
2628 }
5dee9e7c
MH
2629 rsp->scid = cpu_to_le16(pi->dcid);
2630 rsp->result = cpu_to_le16(result);
2631 rsp->flags = cpu_to_le16(0x0000);
2632
2633 return ptr - data;
1da177e4
LT
2634}
2635
f2fcfcd6
GP
2636static int l2cap_parse_conf_rsp(struct sock *sk, void *rsp, int len, void *data, u16 *result)
2637{
2638 struct l2cap_pinfo *pi = l2cap_pi(sk);
2639 struct l2cap_conf_req *req = data;
2640 void *ptr = req->data;
2641 int type, olen;
2642 unsigned long val;
2643 struct l2cap_conf_rfc rfc;
2644
2645 BT_DBG("sk %p, rsp %p, len %d, req %p", sk, rsp, len, data);
2646
2647 while (len >= L2CAP_CONF_OPT_SIZE) {
2648 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2649
2650 switch (type) {
2651 case L2CAP_CONF_MTU:
2652 if (val < L2CAP_DEFAULT_MIN_MTU) {
2653 *result = L2CAP_CONF_UNACCEPT;
2654 pi->omtu = L2CAP_DEFAULT_MIN_MTU;
2655 } else
2656 pi->omtu = val;
2657 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
2658 break;
2659
2660 case L2CAP_CONF_FLUSH_TO:
2661 pi->flush_to = val;
2662 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO,
2663 2, pi->flush_to);
2664 break;
2665
2666 case L2CAP_CONF_RFC:
2667 if (olen == sizeof(rfc))
2668 memcpy(&rfc, (void *)val, olen);
2669
2670 if ((pi->conf_state & L2CAP_CONF_STATE2_DEVICE) &&
2671 rfc.mode != pi->mode)
2672 return -ECONNREFUSED;
2673
2674 pi->mode = rfc.mode;
2675 pi->fcs = 0;
2676
2677 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2678 sizeof(rfc), (unsigned long) &rfc);
2679 break;
2680 }
2681 }
2682
2683 if (*result == L2CAP_CONF_SUCCESS) {
2684 switch (rfc.mode) {
2685 case L2CAP_MODE_ERTM:
2686 pi->remote_tx_win = rfc.txwin_size;
10467e9e
GP
2687 pi->retrans_timeout = le16_to_cpu(rfc.retrans_timeout);
2688 pi->monitor_timeout = le16_to_cpu(rfc.monitor_timeout);
1c762159 2689 pi->mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2690 break;
2691 case L2CAP_MODE_STREAMING:
1c762159 2692 pi->mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2693 }
2694 }
2695
2696 req->dcid = cpu_to_le16(pi->dcid);
2697 req->flags = cpu_to_le16(0x0000);
2698
2699 return ptr - data;
2700}
2701
5dee9e7c 2702static int l2cap_build_conf_rsp(struct sock *sk, void *data, u16 result, u16 flags)
1da177e4
LT
2703{
2704 struct l2cap_conf_rsp *rsp = data;
2705 void *ptr = rsp->data;
1da177e4 2706
5dee9e7c 2707 BT_DBG("sk %p", sk);
1da177e4 2708
aca3192c 2709 rsp->scid = cpu_to_le16(l2cap_pi(sk)->dcid);
5dee9e7c 2710 rsp->result = cpu_to_le16(result);
aca3192c 2711 rsp->flags = cpu_to_le16(flags);
1da177e4
LT
2712
2713 return ptr - data;
2714}
2715
7b1c0049
GP
2716static void l2cap_conf_rfc_get(struct sock *sk, void *rsp, int len)
2717{
2718 struct l2cap_pinfo *pi = l2cap_pi(sk);
2719 int type, olen;
2720 unsigned long val;
2721 struct l2cap_conf_rfc rfc;
2722
2723 BT_DBG("sk %p, rsp %p, len %d", sk, rsp, len);
2724
2725 if ((pi->mode != L2CAP_MODE_ERTM) && (pi->mode != L2CAP_MODE_STREAMING))
2726 return;
2727
2728 while (len >= L2CAP_CONF_OPT_SIZE) {
2729 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2730
2731 switch (type) {
2732 case L2CAP_CONF_RFC:
2733 if (olen == sizeof(rfc))
2734 memcpy(&rfc, (void *)val, olen);
2735 goto done;
2736 }
2737 }
2738
2739done:
2740 switch (rfc.mode) {
2741 case L2CAP_MODE_ERTM:
2742 pi->remote_tx_win = rfc.txwin_size;
10467e9e
GP
2743 pi->retrans_timeout = le16_to_cpu(rfc.retrans_timeout);
2744 pi->monitor_timeout = le16_to_cpu(rfc.monitor_timeout);
7b1c0049
GP
2745 pi->mps = le16_to_cpu(rfc.max_pdu_size);
2746 break;
2747 case L2CAP_MODE_STREAMING:
2748 pi->mps = le16_to_cpu(rfc.max_pdu_size);
2749 }
2750}
2751
4e8402a3
MH
2752static inline int l2cap_command_rej(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2753{
2754 struct l2cap_cmd_rej *rej = (struct l2cap_cmd_rej *) data;
2755
2756 if (rej->reason != 0x0000)
2757 return 0;
2758
2759 if ((conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) &&
2760 cmd->ident == conn->info_ident) {
4e8402a3 2761 del_timer(&conn->info_timer);
984947dc
MH
2762
2763 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 2764 conn->info_ident = 0;
984947dc 2765
4e8402a3
MH
2766 l2cap_conn_start(conn);
2767 }
2768
2769 return 0;
2770}
2771
1da177e4
LT
2772static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2773{
2774 struct l2cap_chan_list *list = &conn->chan_list;
2775 struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
2776 struct l2cap_conn_rsp rsp;
2777 struct sock *sk, *parent;
e7c29cb1 2778 int result, status = L2CAP_CS_NO_INFO;
1da177e4
LT
2779
2780 u16 dcid = 0, scid = __le16_to_cpu(req->scid);
e7c29cb1 2781 __le16 psm = req->psm;
1da177e4
LT
2782
2783 BT_DBG("psm 0x%2.2x scid 0x%4.4x", psm, scid);
2784
2785 /* Check if we have socket listening on psm */
2786 parent = l2cap_get_sock_by_psm(BT_LISTEN, psm, conn->src);
2787 if (!parent) {
2788 result = L2CAP_CR_BAD_PSM;
2789 goto sendresp;
2790 }
2791
e7c29cb1
MH
2792 /* Check if the ACL is secure enough (if not SDP) */
2793 if (psm != cpu_to_le16(0x0001) &&
2794 !hci_conn_check_link_mode(conn->hcon)) {
2950f21a 2795 conn->disc_reason = 0x05;
e7c29cb1
MH
2796 result = L2CAP_CR_SEC_BLOCK;
2797 goto response;
2798 }
2799
1da177e4
LT
2800 result = L2CAP_CR_NO_MEM;
2801
2802 /* Check for backlog size */
2803 if (sk_acceptq_is_full(parent)) {
8e87d142 2804 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1da177e4
LT
2805 goto response;
2806 }
2807
3b1e0a65 2808 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP, GFP_ATOMIC);
1da177e4
LT
2809 if (!sk)
2810 goto response;
2811
fd1278d7 2812 write_lock_bh(&list->lock);
1da177e4
LT
2813
2814 /* Check if we already have channel with that dcid */
2815 if (__l2cap_get_chan_by_dcid(list, scid)) {
fd1278d7 2816 write_unlock_bh(&list->lock);
1da177e4
LT
2817 sock_set_flag(sk, SOCK_ZAPPED);
2818 l2cap_sock_kill(sk);
2819 goto response;
2820 }
2821
2822 hci_conn_hold(conn->hcon);
2823
2824 l2cap_sock_init(sk, parent);
2825 bacpy(&bt_sk(sk)->src, conn->src);
2826 bacpy(&bt_sk(sk)->dst, conn->dst);
2827 l2cap_pi(sk)->psm = psm;
2828 l2cap_pi(sk)->dcid = scid;
2829
2830 __l2cap_chan_add(conn, sk, parent);
2831 dcid = l2cap_pi(sk)->scid;
2832
2833 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
2834
1da177e4
LT
2835 l2cap_pi(sk)->ident = cmd->ident;
2836
984947dc 2837 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE) {
2af6b9d5 2838 if (l2cap_check_security(sk)) {
f66dc81f
MH
2839 if (bt_sk(sk)->defer_setup) {
2840 sk->sk_state = BT_CONNECT2;
2841 result = L2CAP_CR_PEND;
2842 status = L2CAP_CS_AUTHOR_PEND;
2843 parent->sk_data_ready(parent, 0);
2844 } else {
2845 sk->sk_state = BT_CONFIG;
2846 result = L2CAP_CR_SUCCESS;
2847 status = L2CAP_CS_NO_INFO;
2848 }
79d554a6
MH
2849 } else {
2850 sk->sk_state = BT_CONNECT2;
2851 result = L2CAP_CR_PEND;
2852 status = L2CAP_CS_AUTHEN_PEND;
2853 }
2854 } else {
2855 sk->sk_state = BT_CONNECT2;
2856 result = L2CAP_CR_PEND;
2857 status = L2CAP_CS_NO_INFO;
1da177e4
LT
2858 }
2859
fd1278d7 2860 write_unlock_bh(&list->lock);
1da177e4
LT
2861
2862response:
2863 bh_unlock_sock(parent);
2864
2865sendresp:
aca3192c
YH
2866 rsp.scid = cpu_to_le16(scid);
2867 rsp.dcid = cpu_to_le16(dcid);
2868 rsp.result = cpu_to_le16(result);
2869 rsp.status = cpu_to_le16(status);
1da177e4 2870 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONN_RSP, sizeof(rsp), &rsp);
79d554a6
MH
2871
2872 if (result == L2CAP_CR_PEND && status == L2CAP_CS_NO_INFO) {
2873 struct l2cap_info_req info;
2874 info.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
2875
2876 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
2877 conn->info_ident = l2cap_get_ident(conn);
2878
2879 mod_timer(&conn->info_timer, jiffies +
2880 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
2881
2882 l2cap_send_cmd(conn, conn->info_ident,
2883 L2CAP_INFO_REQ, sizeof(info), &info);
2884 }
2885
1da177e4
LT
2886 return 0;
2887}
2888
2889static inline int l2cap_connect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2890{
2891 struct l2cap_conn_rsp *rsp = (struct l2cap_conn_rsp *) data;
2892 u16 scid, dcid, result, status;
2893 struct sock *sk;
2894 u8 req[128];
2895
2896 scid = __le16_to_cpu(rsp->scid);
2897 dcid = __le16_to_cpu(rsp->dcid);
2898 result = __le16_to_cpu(rsp->result);
2899 status = __le16_to_cpu(rsp->status);
2900
2901 BT_DBG("dcid 0x%4.4x scid 0x%4.4x result 0x%2.2x status 0x%2.2x", dcid, scid, result, status);
2902
2903 if (scid) {
af05b30b
GP
2904 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2905 if (!sk)
1da177e4
LT
2906 return 0;
2907 } else {
af05b30b
GP
2908 sk = l2cap_get_chan_by_ident(&conn->chan_list, cmd->ident);
2909 if (!sk)
1da177e4
LT
2910 return 0;
2911 }
2912
2913 switch (result) {
2914 case L2CAP_CR_SUCCESS:
2915 sk->sk_state = BT_CONFIG;
2916 l2cap_pi(sk)->ident = 0;
2917 l2cap_pi(sk)->dcid = dcid;
2918 l2cap_pi(sk)->conf_state |= L2CAP_CONF_REQ_SENT;
6a8d3010
MH
2919 l2cap_pi(sk)->conf_state &= ~L2CAP_CONF_CONNECT_PEND;
2920
1da177e4
LT
2921 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
2922 l2cap_build_conf_req(sk, req), req);
f2fcfcd6 2923 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2924 break;
2925
2926 case L2CAP_CR_PEND:
6a8d3010 2927 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
1da177e4
LT
2928 break;
2929
2930 default:
2931 l2cap_chan_del(sk, ECONNREFUSED);
2932 break;
2933 }
2934
2935 bh_unlock_sock(sk);
2936 return 0;
2937}
2938
88219a0f 2939static inline int l2cap_config_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u16 cmd_len, u8 *data)
1da177e4
LT
2940{
2941 struct l2cap_conf_req *req = (struct l2cap_conf_req *) data;
2942 u16 dcid, flags;
2943 u8 rsp[64];
2944 struct sock *sk;
5dee9e7c 2945 int len;
1da177e4
LT
2946
2947 dcid = __le16_to_cpu(req->dcid);
2948 flags = __le16_to_cpu(req->flags);
2949
2950 BT_DBG("dcid 0x%4.4x flags 0x%2.2x", dcid, flags);
2951
af05b30b
GP
2952 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2953 if (!sk)
1da177e4
LT
2954 return -ENOENT;
2955
354f60a9
MH
2956 if (sk->sk_state == BT_DISCONN)
2957 goto unlock;
2958
5dee9e7c 2959 /* Reject if config buffer is too small. */
88219a0f 2960 len = cmd_len - sizeof(*req);
5dee9e7c
MH
2961 if (l2cap_pi(sk)->conf_len + len > sizeof(l2cap_pi(sk)->conf_req)) {
2962 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
2963 l2cap_build_conf_rsp(sk, rsp,
2964 L2CAP_CONF_REJECT, flags), rsp);
2965 goto unlock;
2966 }
2967
2968 /* Store config. */
2969 memcpy(l2cap_pi(sk)->conf_req + l2cap_pi(sk)->conf_len, req->data, len);
2970 l2cap_pi(sk)->conf_len += len;
1da177e4
LT
2971
2972 if (flags & 0x0001) {
2973 /* Incomplete config. Send empty response. */
2974 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
5dee9e7c
MH
2975 l2cap_build_conf_rsp(sk, rsp,
2976 L2CAP_CONF_SUCCESS, 0x0001), rsp);
1da177e4
LT
2977 goto unlock;
2978 }
2979
2980 /* Complete config. */
5dee9e7c 2981 len = l2cap_parse_conf_req(sk, rsp);
f2fcfcd6 2982 if (len < 0) {
22121fc9 2983 l2cap_send_disconn_req(conn, sk);
1da177e4 2984 goto unlock;
f2fcfcd6 2985 }
1da177e4 2986
5dee9e7c 2987 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP, len, rsp);
f2fcfcd6 2988 l2cap_pi(sk)->num_conf_rsp++;
5dee9e7c 2989
5dee9e7c
MH
2990 /* Reset config buffer. */
2991 l2cap_pi(sk)->conf_len = 0;
2992
876d9484
MH
2993 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE))
2994 goto unlock;
2995
1da177e4 2996 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_INPUT_DONE) {
f64f9e71
JP
2997 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2998 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2999 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
3000
1da177e4 3001 sk->sk_state = BT_CONNECTED;
e90bac06 3002
0565c1c2
GP
3003 l2cap_pi(sk)->next_tx_seq = 0;
3004 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 3005 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
3006 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
3007 l2cap_ertm_init(sk);
3008
1da177e4 3009 l2cap_chan_ready(sk);
876d9484
MH
3010 goto unlock;
3011 }
3012
3013 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_REQ_SENT)) {
79d554a6 3014 u8 buf[64];
1da177e4 3015 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
79d554a6 3016 l2cap_build_conf_req(sk, buf), buf);
f2fcfcd6 3017 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
3018 }
3019
3020unlock:
3021 bh_unlock_sock(sk);
3022 return 0;
3023}
3024
3025static inline int l2cap_config_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3026{
3027 struct l2cap_conf_rsp *rsp = (struct l2cap_conf_rsp *)data;
3028 u16 scid, flags, result;
3029 struct sock *sk;
7b1c0049 3030 int len = cmd->len - sizeof(*rsp);
1da177e4
LT
3031
3032 scid = __le16_to_cpu(rsp->scid);
3033 flags = __le16_to_cpu(rsp->flags);
3034 result = __le16_to_cpu(rsp->result);
3035
af05b30b
GP
3036 BT_DBG("scid 0x%4.4x flags 0x%2.2x result 0x%2.2x",
3037 scid, flags, result);
1da177e4 3038
af05b30b
GP
3039 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
3040 if (!sk)
1da177e4
LT
3041 return 0;
3042
3043 switch (result) {
3044 case L2CAP_CONF_SUCCESS:
7b1c0049 3045 l2cap_conf_rfc_get(sk, rsp->data, len);
1da177e4
LT
3046 break;
3047
3048 case L2CAP_CONF_UNACCEPT:
f2fcfcd6 3049 if (l2cap_pi(sk)->num_conf_rsp <= L2CAP_CONF_MAX_CONF_RSP) {
f2fcfcd6
GP
3050 char req[64];
3051
c2c77ec8
AE
3052 if (len > sizeof(req) - sizeof(struct l2cap_conf_req)) {
3053 l2cap_send_disconn_req(conn, sk);
3054 goto done;
3055 }
3056
f2fcfcd6
GP
3057 /* throw out any old stored conf requests */
3058 result = L2CAP_CONF_SUCCESS;
3059 len = l2cap_parse_conf_rsp(sk, rsp->data,
3060 len, req, &result);
3061 if (len < 0) {
22121fc9 3062 l2cap_send_disconn_req(conn, sk);
f2fcfcd6
GP
3063 goto done;
3064 }
3065
3066 l2cap_send_cmd(conn, l2cap_get_ident(conn),
3067 L2CAP_CONF_REQ, len, req);
3068 l2cap_pi(sk)->num_conf_req++;
3069 if (result != L2CAP_CONF_SUCCESS)
3070 goto done;
3071 break;
1da177e4
LT
3072 }
3073
8e87d142 3074 default:
1da177e4 3075 sk->sk_state = BT_DISCONN;
b1235d79 3076 sk->sk_err = ECONNRESET;
1da177e4 3077 l2cap_sock_set_timer(sk, HZ * 5);
22121fc9 3078 l2cap_send_disconn_req(conn, sk);
1da177e4
LT
3079 goto done;
3080 }
3081
3082 if (flags & 0x01)
3083 goto done;
3084
1da177e4
LT
3085 l2cap_pi(sk)->conf_state |= L2CAP_CONF_INPUT_DONE;
3086
3087 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE) {
f64f9e71
JP
3088 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
3089 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
3090 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
3091
1da177e4 3092 sk->sk_state = BT_CONNECTED;
0565c1c2 3093 l2cap_pi(sk)->next_tx_seq = 0;
1c2acffb 3094 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 3095 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
3096 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
3097 l2cap_ertm_init(sk);
3098
1da177e4
LT
3099 l2cap_chan_ready(sk);
3100 }
3101
3102done:
3103 bh_unlock_sock(sk);
3104 return 0;
3105}
3106
3107static inline int l2cap_disconnect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3108{
3109 struct l2cap_disconn_req *req = (struct l2cap_disconn_req *) data;
3110 struct l2cap_disconn_rsp rsp;
3111 u16 dcid, scid;
3112 struct sock *sk;
3113
3114 scid = __le16_to_cpu(req->scid);
3115 dcid = __le16_to_cpu(req->dcid);
3116
3117 BT_DBG("scid 0x%4.4x dcid 0x%4.4x", scid, dcid);
3118
af05b30b
GP
3119 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
3120 if (!sk)
1da177e4
LT
3121 return 0;
3122
aca3192c
YH
3123 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
3124 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1da177e4
LT
3125 l2cap_send_cmd(conn, cmd->ident, L2CAP_DISCONN_RSP, sizeof(rsp), &rsp);
3126
3127 sk->sk_shutdown = SHUTDOWN_MASK;
3128
1c2acffb 3129 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
3130
3131 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
3132 skb_queue_purge(SREJ_QUEUE(sk));
1890d36b 3133 skb_queue_purge(BUSY_QUEUE(sk));
0565c1c2
GP
3134 del_timer(&l2cap_pi(sk)->retrans_timer);
3135 del_timer(&l2cap_pi(sk)->monitor_timer);
c1b4f43b 3136 del_timer(&l2cap_pi(sk)->ack_timer);
0565c1c2 3137 }
1c2acffb 3138
1da177e4
LT
3139 l2cap_chan_del(sk, ECONNRESET);
3140 bh_unlock_sock(sk);
3141
3142 l2cap_sock_kill(sk);
3143 return 0;
3144}
3145
3146static inline int l2cap_disconnect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3147{
3148 struct l2cap_disconn_rsp *rsp = (struct l2cap_disconn_rsp *) data;
3149 u16 dcid, scid;
3150 struct sock *sk;
3151
3152 scid = __le16_to_cpu(rsp->scid);
3153 dcid = __le16_to_cpu(rsp->dcid);
3154
3155 BT_DBG("dcid 0x%4.4x scid 0x%4.4x", dcid, scid);
3156
af05b30b
GP
3157 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
3158 if (!sk)
1da177e4
LT
3159 return 0;
3160
1c2acffb 3161 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
3162
3163 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
3164 skb_queue_purge(SREJ_QUEUE(sk));
1890d36b 3165 skb_queue_purge(BUSY_QUEUE(sk));
0565c1c2
GP
3166 del_timer(&l2cap_pi(sk)->retrans_timer);
3167 del_timer(&l2cap_pi(sk)->monitor_timer);
c1b4f43b 3168 del_timer(&l2cap_pi(sk)->ack_timer);
0565c1c2 3169 }
1c2acffb 3170
1da177e4
LT
3171 l2cap_chan_del(sk, 0);
3172 bh_unlock_sock(sk);
3173
3174 l2cap_sock_kill(sk);
3175 return 0;
3176}
3177
3178static inline int l2cap_information_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3179{
3180 struct l2cap_info_req *req = (struct l2cap_info_req *) data;
1da177e4
LT
3181 u16 type;
3182
3183 type = __le16_to_cpu(req->type);
3184
3185 BT_DBG("type 0x%4.4x", type);
3186
f0709e03
MH
3187 if (type == L2CAP_IT_FEAT_MASK) {
3188 u8 buf[8];
44dd46de 3189 u32 feat_mask = l2cap_feat_mask;
f0709e03
MH
3190 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3191 rsp->type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
3192 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
44dd46de 3193 if (enable_ertm)
fcc203c3
GP
3194 feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING
3195 | L2CAP_FEAT_FCS;
1b7bf4ed 3196 put_unaligned_le32(feat_mask, rsp->data);
f0709e03
MH
3197 l2cap_send_cmd(conn, cmd->ident,
3198 L2CAP_INFO_RSP, sizeof(buf), buf);
e1027a7c
MH
3199 } else if (type == L2CAP_IT_FIXED_CHAN) {
3200 u8 buf[12];
3201 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3202 rsp->type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3203 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
3204 memcpy(buf + 4, l2cap_fixed_chan, 8);
3205 l2cap_send_cmd(conn, cmd->ident,
3206 L2CAP_INFO_RSP, sizeof(buf), buf);
f0709e03
MH
3207 } else {
3208 struct l2cap_info_rsp rsp;
3209 rsp.type = cpu_to_le16(type);
3210 rsp.result = cpu_to_le16(L2CAP_IR_NOTSUPP);
3211 l2cap_send_cmd(conn, cmd->ident,
3212 L2CAP_INFO_RSP, sizeof(rsp), &rsp);
3213 }
1da177e4
LT
3214
3215 return 0;
3216}
3217
3218static inline int l2cap_information_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3219{
3220 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) data;
3221 u16 type, result;
3222
3223 type = __le16_to_cpu(rsp->type);
3224 result = __le16_to_cpu(rsp->result);
3225
3226 BT_DBG("type 0x%4.4x result 0x%2.2x", type, result);
3227
4e8402a3
MH
3228 del_timer(&conn->info_timer);
3229
984947dc 3230 if (type == L2CAP_IT_FEAT_MASK) {
83985319 3231 conn->feat_mask = get_unaligned_le32(rsp->data);
4e8402a3 3232
47ec1dcd 3233 if (conn->feat_mask & L2CAP_FEAT_FIXED_CHAN) {
e1027a7c
MH
3234 struct l2cap_info_req req;
3235 req.type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3236
3237 conn->info_ident = l2cap_get_ident(conn);
3238
3239 l2cap_send_cmd(conn, conn->info_ident,
3240 L2CAP_INFO_REQ, sizeof(req), &req);
3241 } else {
3242 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
3243 conn->info_ident = 0;
3244
3245 l2cap_conn_start(conn);
3246 }
3247 } else if (type == L2CAP_IT_FIXED_CHAN) {
984947dc 3248 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 3249 conn->info_ident = 0;
984947dc
MH
3250
3251 l2cap_conn_start(conn);
3252 }
4e8402a3 3253
1da177e4
LT
3254 return 0;
3255}
3256
3257static inline void l2cap_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
3258{
3259 u8 *data = skb->data;
3260 int len = skb->len;
3261 struct l2cap_cmd_hdr cmd;
3262 int err = 0;
3263
3264 l2cap_raw_recv(conn, skb);
3265
3266 while (len >= L2CAP_CMD_HDR_SIZE) {
88219a0f 3267 u16 cmd_len;
1da177e4
LT
3268 memcpy(&cmd, data, L2CAP_CMD_HDR_SIZE);
3269 data += L2CAP_CMD_HDR_SIZE;
3270 len -= L2CAP_CMD_HDR_SIZE;
3271
88219a0f 3272 cmd_len = le16_to_cpu(cmd.len);
1da177e4 3273
88219a0f 3274 BT_DBG("code 0x%2.2x len %d id 0x%2.2x", cmd.code, cmd_len, cmd.ident);
1da177e4 3275
88219a0f 3276 if (cmd_len > len || !cmd.ident) {
1da177e4
LT
3277 BT_DBG("corrupted command");
3278 break;
3279 }
3280
3281 switch (cmd.code) {
3282 case L2CAP_COMMAND_REJ:
4e8402a3 3283 l2cap_command_rej(conn, &cmd, data);
1da177e4
LT
3284 break;
3285
3286 case L2CAP_CONN_REQ:
3287 err = l2cap_connect_req(conn, &cmd, data);
3288 break;
3289
3290 case L2CAP_CONN_RSP:
3291 err = l2cap_connect_rsp(conn, &cmd, data);
3292 break;
3293
3294 case L2CAP_CONF_REQ:
88219a0f 3295 err = l2cap_config_req(conn, &cmd, cmd_len, data);
1da177e4
LT
3296 break;
3297
3298 case L2CAP_CONF_RSP:
3299 err = l2cap_config_rsp(conn, &cmd, data);
3300 break;
3301
3302 case L2CAP_DISCONN_REQ:
3303 err = l2cap_disconnect_req(conn, &cmd, data);
3304 break;
3305
3306 case L2CAP_DISCONN_RSP:
3307 err = l2cap_disconnect_rsp(conn, &cmd, data);
3308 break;
3309
3310 case L2CAP_ECHO_REQ:
88219a0f 3311 l2cap_send_cmd(conn, cmd.ident, L2CAP_ECHO_RSP, cmd_len, data);
1da177e4
LT
3312 break;
3313
3314 case L2CAP_ECHO_RSP:
3315 break;
3316
3317 case L2CAP_INFO_REQ:
3318 err = l2cap_information_req(conn, &cmd, data);
3319 break;
3320
3321 case L2CAP_INFO_RSP:
3322 err = l2cap_information_rsp(conn, &cmd, data);
3323 break;
3324
3325 default:
3326 BT_ERR("Unknown signaling command 0x%2.2x", cmd.code);
3327 err = -EINVAL;
3328 break;
3329 }
3330
3331 if (err) {
3332 struct l2cap_cmd_rej rej;
3333 BT_DBG("error %d", err);
3334
3335 /* FIXME: Map err to a valid reason */
aca3192c 3336 rej.reason = cpu_to_le16(0);
1da177e4
LT
3337 l2cap_send_cmd(conn, cmd.ident, L2CAP_COMMAND_REJ, sizeof(rej), &rej);
3338 }
3339
88219a0f
AV
3340 data += cmd_len;
3341 len -= cmd_len;
1da177e4
LT
3342 }
3343
3344 kfree_skb(skb);
3345}
3346
fcc203c3
GP
3347static int l2cap_check_fcs(struct l2cap_pinfo *pi, struct sk_buff *skb)
3348{
3349 u16 our_fcs, rcv_fcs;
3350 int hdr_size = L2CAP_HDR_SIZE + 2;
3351
3352 if (pi->fcs == L2CAP_FCS_CRC16) {
3353 skb_trim(skb, skb->len - 2);
3354 rcv_fcs = get_unaligned_le16(skb->data + skb->len);
3355 our_fcs = crc16(0, skb->data - hdr_size, skb->len + hdr_size);
3356
3357 if (our_fcs != rcv_fcs)
3358 return -EINVAL;
3359 }
3360 return 0;
3361}
3362
d5392c8f
GP
3363static inline void l2cap_send_i_or_rr_or_rnr(struct sock *sk)
3364{
3365 struct l2cap_pinfo *pi = l2cap_pi(sk);
3366 u16 control = 0;
3367
3368 pi->frames_sent = 0;
3369 pi->conn_state |= L2CAP_CONN_SEND_FBIT;
3370
3371 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3372
3373 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
3374 control |= L2CAP_SUPER_RCV_NOT_READY | L2CAP_CTRL_FINAL;
3375 l2cap_send_sframe(pi, control);
1890d36b 3376 pi->conn_state |= L2CAP_CONN_RNR_SENT;
d5392c8f
GP
3377 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
3378 }
3379
3380 if (pi->conn_state & L2CAP_CONN_REMOTE_BUSY && pi->unacked_frames > 0)
3381 __mod_retrans_timer();
3382
dfc909be 3383 spin_lock_bh(&pi->send_lock);
d5392c8f 3384 l2cap_ertm_send(sk);
dfc909be 3385 spin_unlock_bh(&pi->send_lock);
d5392c8f
GP
3386
3387 if (!(pi->conn_state & L2CAP_CONN_LOCAL_BUSY) &&
3388 pi->frames_sent == 0) {
3389 control |= L2CAP_SUPER_RCV_READY;
d5392c8f
GP
3390 l2cap_send_sframe(pi, control);
3391 }
3392}
3393
9b53350d 3394static int l2cap_add_to_srej_queue(struct sock *sk, struct sk_buff *skb, u8 tx_seq, u8 sar)
8f17154f
GP
3395{
3396 struct sk_buff *next_skb;
bfbacc11
JPRV
3397 struct l2cap_pinfo *pi = l2cap_pi(sk);
3398 int tx_seq_offset, next_tx_seq_offset;
8f17154f
GP
3399
3400 bt_cb(skb)->tx_seq = tx_seq;
3401 bt_cb(skb)->sar = sar;
3402
3403 next_skb = skb_peek(SREJ_QUEUE(sk));
3404 if (!next_skb) {
3405 __skb_queue_tail(SREJ_QUEUE(sk), skb);
9b53350d 3406 return 0;
8f17154f
GP
3407 }
3408
bfbacc11
JPRV
3409 tx_seq_offset = (tx_seq - pi->buffer_seq) % 64;
3410 if (tx_seq_offset < 0)
3411 tx_seq_offset += 64;
3412
8f17154f 3413 do {
9b53350d
JPRV
3414 if (bt_cb(next_skb)->tx_seq == tx_seq)
3415 return -EINVAL;
3416
bfbacc11
JPRV
3417 next_tx_seq_offset = (bt_cb(next_skb)->tx_seq -
3418 pi->buffer_seq) % 64;
3419 if (next_tx_seq_offset < 0)
3420 next_tx_seq_offset += 64;
3421
3422 if (next_tx_seq_offset > tx_seq_offset) {
8f17154f 3423 __skb_queue_before(SREJ_QUEUE(sk), next_skb, skb);
9b53350d 3424 return 0;
8f17154f
GP
3425 }
3426
3427 if (skb_queue_is_last(SREJ_QUEUE(sk), next_skb))
3428 break;
3429
59203a21 3430 } while ((next_skb = skb_queue_next(SREJ_QUEUE(sk), next_skb)));
8f17154f
GP
3431
3432 __skb_queue_tail(SREJ_QUEUE(sk), skb);
9b53350d
JPRV
3433
3434 return 0;
8f17154f
GP
3435}
3436
18778a63
GP
3437static int l2cap_ertm_reassembly_sdu(struct sock *sk, struct sk_buff *skb, u16 control)
3438{
3439 struct l2cap_pinfo *pi = l2cap_pi(sk);
3440 struct sk_buff *_skb;
1890d36b 3441 int err;
18778a63
GP
3442
3443 switch (control & L2CAP_CTRL_SAR) {
3444 case L2CAP_SDU_UNSEGMENTED:
3445 if (pi->conn_state & L2CAP_CONN_SAR_SDU)
3446 goto drop;
3447
3448 err = sock_queue_rcv_skb(sk, skb);
3449 if (!err)
3450 return err;
3451
3452 break;
3453
3454 case L2CAP_SDU_START:
3455 if (pi->conn_state & L2CAP_CONN_SAR_SDU)
3456 goto drop;
3457
3458 pi->sdu_len = get_unaligned_le16(skb->data);
18778a63
GP
3459
3460 if (pi->sdu_len > pi->imtu)
3461 goto disconnect;
3462
3463 pi->sdu = bt_skb_alloc(pi->sdu_len, GFP_ATOMIC);
1890d36b
GP
3464 if (!pi->sdu)
3465 return -ENOMEM;
3466
3467 /* pull sdu_len bytes only after alloc, because of Local Busy
3468 * condition we have to be sure that this will be executed
3469 * only once, i.e., when alloc does not fail */
3470 skb_pull(skb, 2);
18778a63
GP
3471
3472 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3473
3474 pi->conn_state |= L2CAP_CONN_SAR_SDU;
3475 pi->partial_sdu_len = skb->len;
3476 break;
3477
3478 case L2CAP_SDU_CONTINUE:
3479 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3480 goto disconnect;
3481
3482 if (!pi->sdu)
3483 goto disconnect;
3484
18778a63
GP
3485 pi->partial_sdu_len += skb->len;
3486 if (pi->partial_sdu_len > pi->sdu_len)
3487 goto drop;
3488
4178ba46
GP
3489 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3490
18778a63
GP
3491 break;
3492
3493 case L2CAP_SDU_END:
3494 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3495 goto disconnect;
3496
3497 if (!pi->sdu)
3498 goto disconnect;
3499
1890d36b 3500 if (!(pi->conn_state & L2CAP_CONN_SAR_RETRY)) {
1890d36b 3501 pi->partial_sdu_len += skb->len;
18778a63 3502
1890d36b
GP
3503 if (pi->partial_sdu_len > pi->imtu)
3504 goto drop;
18778a63 3505
1890d36b
GP
3506 if (pi->partial_sdu_len != pi->sdu_len)
3507 goto drop;
4178ba46
GP
3508
3509 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
1890d36b 3510 }
18778a63
GP
3511
3512 _skb = skb_clone(pi->sdu, GFP_ATOMIC);
1890d36b
GP
3513 if (!_skb) {
3514 pi->conn_state |= L2CAP_CONN_SAR_RETRY;
3515 return -ENOMEM;
3516 }
3517
18778a63 3518 err = sock_queue_rcv_skb(sk, _skb);
1890d36b 3519 if (err < 0) {
18778a63 3520 kfree_skb(_skb);
1890d36b
GP
3521 pi->conn_state |= L2CAP_CONN_SAR_RETRY;
3522 return err;
3523 }
3524
3525 pi->conn_state &= ~L2CAP_CONN_SAR_RETRY;
3526 pi->conn_state &= ~L2CAP_CONN_SAR_SDU;
18778a63
GP
3527
3528 kfree_skb(pi->sdu);
3529 break;
3530 }
3531
3532 kfree_skb(skb);
1890d36b 3533 return 0;
18778a63
GP
3534
3535drop:
3536 kfree_skb(pi->sdu);
3537 pi->sdu = NULL;
3538
3539disconnect:
3540 l2cap_send_disconn_req(pi->conn, sk);
3541 kfree_skb(skb);
3542 return 0;
3543}
3544
1890d36b
GP
3545static void l2cap_busy_work(struct work_struct *work)
3546{
3547 DECLARE_WAITQUEUE(wait, current);
3548 struct l2cap_pinfo *pi =
3549 container_of(work, struct l2cap_pinfo, busy_work);
3550 struct sock *sk = (struct sock *)pi;
3551 int n_tries = 0, timeo = HZ/5, err;
3552 struct sk_buff *skb;
3553 u16 control;
3554
3555 lock_sock(sk);
3556
2b0b05dd 3557 add_wait_queue(sk_sleep(sk), &wait);
1890d36b
GP
3558 while ((skb = skb_peek(BUSY_QUEUE(sk)))) {
3559 set_current_state(TASK_INTERRUPTIBLE);
3560
3561 if (n_tries++ > L2CAP_LOCAL_BUSY_TRIES) {
3562 err = -EBUSY;
3563 l2cap_send_disconn_req(pi->conn, sk);
3564 goto done;
3565 }
3566
3567 if (!timeo)
3568 timeo = HZ/5;
3569
3570 if (signal_pending(current)) {
3571 err = sock_intr_errno(timeo);
3572 goto done;
3573 }
3574
3575 release_sock(sk);
3576 timeo = schedule_timeout(timeo);
3577 lock_sock(sk);
3578
3579 err = sock_error(sk);
3580 if (err)
3581 goto done;
3582
3583 while ((skb = skb_dequeue(BUSY_QUEUE(sk)))) {
3584 control = bt_cb(skb)->sar << L2CAP_CTRL_SAR_SHIFT;
3585 err = l2cap_ertm_reassembly_sdu(sk, skb, control);
3586 if (err < 0) {
3587 skb_queue_head(BUSY_QUEUE(sk), skb);
3588 break;
3589 }
3590
3591 pi->buffer_seq = (pi->buffer_seq + 1) % 64;
3592 }
3593
3594 if (!skb)
3595 break;
3596 }
3597
3598 if (!(pi->conn_state & L2CAP_CONN_RNR_SENT))
3599 goto done;
3600
3601 control = pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3602 control |= L2CAP_SUPER_RCV_READY | L2CAP_CTRL_POLL;
3603 l2cap_send_sframe(pi, control);
3604 l2cap_pi(sk)->retry_count = 1;
3605
3606 del_timer(&pi->retrans_timer);
3607 __mod_monitor_timer();
3608
3609 l2cap_pi(sk)->conn_state |= L2CAP_CONN_WAIT_F;
3610
3611done:
3612 pi->conn_state &= ~L2CAP_CONN_LOCAL_BUSY;
3613 pi->conn_state &= ~L2CAP_CONN_RNR_SENT;
3614
3615 set_current_state(TASK_RUNNING);
2b0b05dd 3616 remove_wait_queue(sk_sleep(sk), &wait);
1890d36b
GP
3617
3618 release_sock(sk);
3619}
3620
3621static int l2cap_push_rx_skb(struct sock *sk, struct sk_buff *skb, u16 control)
3622{
3623 struct l2cap_pinfo *pi = l2cap_pi(sk);
3624 int sctrl, err;
3625
3626 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
3627 bt_cb(skb)->sar = control >> L2CAP_CTRL_SAR_SHIFT;
3628 __skb_queue_tail(BUSY_QUEUE(sk), skb);
3629 return -EBUSY;
3630 }
3631
3632 err = l2cap_ertm_reassembly_sdu(sk, skb, control);
3633 if (err >= 0) {
3634 pi->buffer_seq = (pi->buffer_seq + 1) % 64;
3635 return err;
3636 }
3637
3638 /* Busy Condition */
3639 pi->conn_state |= L2CAP_CONN_LOCAL_BUSY;
3640 bt_cb(skb)->sar = control >> L2CAP_CTRL_SAR_SHIFT;
3641 __skb_queue_tail(BUSY_QUEUE(sk), skb);
3642
3643 sctrl = pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3644 sctrl |= L2CAP_SUPER_RCV_NOT_READY;
3645 l2cap_send_sframe(pi, sctrl);
3646
3647 pi->conn_state |= L2CAP_CONN_RNR_SENT;
3648
3649 queue_work(_busy_wq, &pi->busy_work);
3650
3651 return err;
3652}
3653
18778a63 3654static int l2cap_streaming_reassembly_sdu(struct sock *sk, struct sk_buff *skb, u16 control)
c74e560c
GP
3655{
3656 struct l2cap_pinfo *pi = l2cap_pi(sk);
3657 struct sk_buff *_skb;
3658 int err = -EINVAL;
3659
18778a63
GP
3660 /*
3661 * TODO: We have to notify the userland if some data is lost with the
3662 * Streaming Mode.
3663 */
3664
c74e560c
GP
3665 switch (control & L2CAP_CTRL_SAR) {
3666 case L2CAP_SDU_UNSEGMENTED:
3667 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3668 kfree_skb(pi->sdu);
3669 break;
3670 }
3671
3672 err = sock_queue_rcv_skb(sk, skb);
3673 if (!err)
3674 return 0;
3675
3676 break;
3677
3678 case L2CAP_SDU_START:
3679 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3680 kfree_skb(pi->sdu);
3681 break;
3682 }
3683
3684 pi->sdu_len = get_unaligned_le16(skb->data);
3685 skb_pull(skb, 2);
3686
052897ca
GP
3687 if (pi->sdu_len > pi->imtu) {
3688 err = -EMSGSIZE;
3689 break;
3690 }
3691
c74e560c
GP
3692 pi->sdu = bt_skb_alloc(pi->sdu_len, GFP_ATOMIC);
3693 if (!pi->sdu) {
3694 err = -ENOMEM;
3695 break;
3696 }
3697
3698 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3699
3700 pi->conn_state |= L2CAP_CONN_SAR_SDU;
3701 pi->partial_sdu_len = skb->len;
3702 err = 0;
3703 break;
3704
3705 case L2CAP_SDU_CONTINUE:
3706 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3707 break;
3708
3709 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3710
3711 pi->partial_sdu_len += skb->len;
3712 if (pi->partial_sdu_len > pi->sdu_len)
3713 kfree_skb(pi->sdu);
3714 else
3715 err = 0;
3716
3717 break;
3718
3719 case L2CAP_SDU_END:
3720 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3721 break;
3722
3723 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3724
3725 pi->conn_state &= ~L2CAP_CONN_SAR_SDU;
3726 pi->partial_sdu_len += skb->len;
3727
36f2fd58
GP
3728 if (pi->partial_sdu_len > pi->imtu)
3729 goto drop;
3730
c74e560c
GP
3731 if (pi->partial_sdu_len == pi->sdu_len) {
3732 _skb = skb_clone(pi->sdu, GFP_ATOMIC);
3733 err = sock_queue_rcv_skb(sk, _skb);
3734 if (err < 0)
3735 kfree_skb(_skb);
3736 }
c74e560c
GP
3737 err = 0;
3738
36f2fd58
GP
3739drop:
3740 kfree_skb(pi->sdu);
c74e560c
GP
3741 break;
3742 }
3743
3744 kfree_skb(skb);
3745 return err;
3746}
3747
8f17154f
GP
3748static void l2cap_check_srej_gap(struct sock *sk, u8 tx_seq)
3749{
3750 struct sk_buff *skb;
afefdbc4 3751 u16 control;
8f17154f 3752
59203a21 3753 while ((skb = skb_peek(SREJ_QUEUE(sk)))) {
8f17154f
GP
3754 if (bt_cb(skb)->tx_seq != tx_seq)
3755 break;
3756
3757 skb = skb_dequeue(SREJ_QUEUE(sk));
afefdbc4 3758 control = bt_cb(skb)->sar << L2CAP_CTRL_SAR_SHIFT;
18778a63 3759 l2cap_ertm_reassembly_sdu(sk, skb, control);
8f17154f
GP
3760 l2cap_pi(sk)->buffer_seq_srej =
3761 (l2cap_pi(sk)->buffer_seq_srej + 1) % 64;
8ff50ec0 3762 tx_seq = (tx_seq + 1) % 64;
8f17154f
GP
3763 }
3764}
3765
3766static void l2cap_resend_srejframe(struct sock *sk, u8 tx_seq)
3767{
3768 struct l2cap_pinfo *pi = l2cap_pi(sk);
3769 struct srej_list *l, *tmp;
3770 u16 control;
3771
59203a21 3772 list_for_each_entry_safe(l, tmp, SREJ_LIST(sk), list) {
8f17154f
GP
3773 if (l->tx_seq == tx_seq) {
3774 list_del(&l->list);
3775 kfree(l);
3776 return;
3777 }
3778 control = L2CAP_SUPER_SELECT_REJECT;
3779 control |= l->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3780 l2cap_send_sframe(pi, control);
3781 list_del(&l->list);
3782 list_add_tail(&l->list, SREJ_LIST(sk));
3783 }
3784}
3785
3786static void l2cap_send_srejframe(struct sock *sk, u8 tx_seq)
3787{
3788 struct l2cap_pinfo *pi = l2cap_pi(sk);
3789 struct srej_list *new;
3790 u16 control;
3791
3792 while (tx_seq != pi->expected_tx_seq) {
3793 control = L2CAP_SUPER_SELECT_REJECT;
3794 control |= pi->expected_tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3795 l2cap_send_sframe(pi, control);
3796
3797 new = kzalloc(sizeof(struct srej_list), GFP_ATOMIC);
8ff50ec0
GP
3798 new->tx_seq = pi->expected_tx_seq;
3799 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
8f17154f
GP
3800 list_add_tail(&new->list, SREJ_LIST(sk));
3801 }
8ff50ec0 3802 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
8f17154f
GP
3803}
3804
1c2acffb
GP
3805static inline int l2cap_data_channel_iframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3806{
3807 struct l2cap_pinfo *pi = l2cap_pi(sk);
3808 u8 tx_seq = __get_txseq(rx_control);
9f121a5a 3809 u8 req_seq = __get_reqseq(rx_control);
8f17154f 3810 u8 sar = rx_control >> L2CAP_CTRL_SAR_SHIFT;
f6337c77 3811 int tx_seq_offset, expected_tx_seq_offset;
803020c6 3812 int num_to_ack = (pi->tx_win/6) + 1;
1c2acffb
GP
3813 int err = 0;
3814
3815 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3816
9b16dc65
GP
3817 if (L2CAP_CTRL_FINAL & rx_control &&
3818 l2cap_pi(sk)->conn_state & L2CAP_CONN_WAIT_F) {
1d8f5d16
GP
3819 del_timer(&pi->monitor_timer);
3820 if (pi->unacked_frames > 0)
3821 __mod_retrans_timer();
3822 pi->conn_state &= ~L2CAP_CONN_WAIT_F;
3823 }
3824
9f121a5a
GP
3825 pi->expected_ack_seq = req_seq;
3826 l2cap_drop_acked_frames(sk);
3827
8f17154f
GP
3828 if (tx_seq == pi->expected_tx_seq)
3829 goto expected;
1c2acffb 3830
9b53350d
JPRV
3831 tx_seq_offset = (tx_seq - pi->buffer_seq) % 64;
3832 if (tx_seq_offset < 0)
3833 tx_seq_offset += 64;
3834
3835 /* invalid tx_seq */
3836 if (tx_seq_offset >= pi->tx_win) {
3837 l2cap_send_disconn_req(pi->conn, sk);
3838 goto drop;
3839 }
3840
1890d36b
GP
3841 if (pi->conn_state == L2CAP_CONN_LOCAL_BUSY)
3842 goto drop;
3843
8f17154f
GP
3844 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3845 struct srej_list *first;
30afb5b2 3846
8f17154f
GP
3847 first = list_first_entry(SREJ_LIST(sk),
3848 struct srej_list, list);
3849 if (tx_seq == first->tx_seq) {
3850 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3851 l2cap_check_srej_gap(sk, tx_seq);
3852
3853 list_del(&first->list);
3854 kfree(first);
3855
3856 if (list_empty(SREJ_LIST(sk))) {
3857 pi->buffer_seq = pi->buffer_seq_srej;
3858 pi->conn_state &= ~L2CAP_CONN_SREJ_SENT;
855666cc 3859 l2cap_send_ack(pi);
8f17154f
GP
3860 }
3861 } else {
3862 struct srej_list *l;
9b53350d
JPRV
3863
3864 /* duplicated tx_seq */
3865 if (l2cap_add_to_srej_queue(sk, skb, tx_seq, sar) < 0)
3866 goto drop;
8f17154f
GP
3867
3868 list_for_each_entry(l, SREJ_LIST(sk), list) {
3869 if (l->tx_seq == tx_seq) {
3870 l2cap_resend_srejframe(sk, tx_seq);
3871 return 0;
3872 }
3873 }
3874 l2cap_send_srejframe(sk, tx_seq);
30afb5b2
GP
3875 }
3876 } else {
9b53350d
JPRV
3877 expected_tx_seq_offset =
3878 (pi->expected_tx_seq - pi->buffer_seq) % 64;
3879 if (expected_tx_seq_offset < 0)
3880 expected_tx_seq_offset += 64;
3881
3882 /* duplicated tx_seq */
3883 if (tx_seq_offset < expected_tx_seq_offset)
3884 goto drop;
3885
8f17154f 3886 pi->conn_state |= L2CAP_CONN_SREJ_SENT;
1c2acffb 3887
8f17154f
GP
3888 INIT_LIST_HEAD(SREJ_LIST(sk));
3889 pi->buffer_seq_srej = pi->buffer_seq;
3890
3891 __skb_queue_head_init(SREJ_QUEUE(sk));
1890d36b 3892 __skb_queue_head_init(BUSY_QUEUE(sk));
8f17154f
GP
3893 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3894
ef54fd93
GP
3895 pi->conn_state |= L2CAP_CONN_SEND_PBIT;
3896
8f17154f 3897 l2cap_send_srejframe(sk, tx_seq);
1c2acffb 3898 }
30afb5b2
GP
3899 return 0;
3900
8f17154f
GP
3901expected:
3902 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3903
3904 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3b1a9f3f
GP
3905 bt_cb(skb)->tx_seq = tx_seq;
3906 bt_cb(skb)->sar = sar;
3907 __skb_queue_tail(SREJ_QUEUE(sk), skb);
8f17154f
GP
3908 return 0;
3909 }
3910
4ec10d97
GP
3911 if (rx_control & L2CAP_CTRL_FINAL) {
3912 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3913 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
dfc909be
GP
3914 else
3915 l2cap_retransmit_frames(sk);
4ec10d97
GP
3916 }
3917
1890d36b 3918 err = l2cap_push_rx_skb(sk, skb, rx_control);
8f17154f 3919 if (err < 0)
1890d36b 3920 return 0;
8f17154f 3921
c1b4f43b
GP
3922 __mod_ack_timer();
3923
803020c6
GP
3924 pi->num_acked = (pi->num_acked + 1) % num_to_ack;
3925 if (pi->num_acked == num_to_ack - 1)
9e917af1
GP
3926 l2cap_send_ack(pi);
3927
8f17154f 3928 return 0;
9b53350d
JPRV
3929
3930drop:
3931 kfree_skb(skb);
3932 return 0;
1c2acffb
GP
3933}
3934
e072745f 3935static inline void l2cap_data_channel_rrframe(struct sock *sk, u16 rx_control)
1c2acffb
GP
3936{
3937 struct l2cap_pinfo *pi = l2cap_pi(sk);
6e3a5981
GP
3938
3939 pi->expected_ack_seq = __get_reqseq(rx_control);
3940 l2cap_drop_acked_frames(sk);
1c2acffb 3941
e072745f 3942 if (rx_control & L2CAP_CTRL_POLL) {
05fbd89d
GP
3943 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3944 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3945 (pi->unacked_frames > 0))
3946 __mod_retrans_timer();
3947
3948 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3949 l2cap_send_srejtail(sk);
3950 } else {
3951 l2cap_send_i_or_rr_or_rnr(sk);
05fbd89d 3952 }
1d8f5d16 3953
e072745f
GP
3954 } else if (rx_control & L2CAP_CTRL_FINAL) {
3955 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
4ec10d97 3956
e072745f
GP
3957 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3958 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
dfc909be
GP
3959 else
3960 l2cap_retransmit_frames(sk);
2246b2f1 3961
e072745f 3962 } else {
e072745f
GP
3963 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3964 (pi->unacked_frames > 0))
3965 __mod_retrans_timer();
1c2acffb 3966
2246b2f1 3967 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
dfc909be 3968 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
e072745f 3969 l2cap_send_ack(pi);
dfc909be
GP
3970 } else {
3971 spin_lock_bh(&pi->send_lock);
e072745f 3972 l2cap_ertm_send(sk);
dfc909be
GP
3973 spin_unlock_bh(&pi->send_lock);
3974 }
e072745f
GP
3975 }
3976}
2246b2f1 3977
e072745f
GP
3978static inline void l2cap_data_channel_rejframe(struct sock *sk, u16 rx_control)
3979{
3980 struct l2cap_pinfo *pi = l2cap_pi(sk);
3981 u8 tx_seq = __get_reqseq(rx_control);
30afb5b2 3982
e072745f
GP
3983 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3984
8abb52ee 3985 pi->expected_ack_seq = tx_seq;
e072745f
GP
3986 l2cap_drop_acked_frames(sk);
3987
3988 if (rx_control & L2CAP_CTRL_FINAL) {
3989 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3990 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
dfc909be
GP
3991 else
3992 l2cap_retransmit_frames(sk);
e072745f 3993 } else {
dfc909be 3994 l2cap_retransmit_frames(sk);
30afb5b2 3995
0301ef04 3996 if (pi->conn_state & L2CAP_CONN_WAIT_F)
e072745f 3997 pi->conn_state |= L2CAP_CONN_REJ_ACT;
e072745f
GP
3998 }
3999}
4000static inline void l2cap_data_channel_srejframe(struct sock *sk, u16 rx_control)
4001{
4002 struct l2cap_pinfo *pi = l2cap_pi(sk);
4003 u8 tx_seq = __get_reqseq(rx_control);
30afb5b2 4004
e072745f 4005 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
2246b2f1 4006
e072745f
GP
4007 if (rx_control & L2CAP_CTRL_POLL) {
4008 pi->expected_ack_seq = tx_seq;
4009 l2cap_drop_acked_frames(sk);
dfc909be
GP
4010 l2cap_retransmit_one_frame(sk, tx_seq);
4011
4012 spin_lock_bh(&pi->send_lock);
e072745f 4013 l2cap_ertm_send(sk);
dfc909be
GP
4014 spin_unlock_bh(&pi->send_lock);
4015
e072745f
GP
4016 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
4017 pi->srej_save_reqseq = tx_seq;
4018 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
ef54fd93 4019 }
e072745f
GP
4020 } else if (rx_control & L2CAP_CTRL_FINAL) {
4021 if ((pi->conn_state & L2CAP_CONN_SREJ_ACT) &&
4022 pi->srej_save_reqseq == tx_seq)
4023 pi->conn_state &= ~L2CAP_CONN_SREJ_ACT;
4024 else
dfc909be 4025 l2cap_retransmit_one_frame(sk, tx_seq);
e072745f 4026 } else {
dfc909be 4027 l2cap_retransmit_one_frame(sk, tx_seq);
e072745f
GP
4028 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
4029 pi->srej_save_reqseq = tx_seq;
4030 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
ef54fd93 4031 }
e072745f
GP
4032 }
4033}
4034
4035static inline void l2cap_data_channel_rnrframe(struct sock *sk, u16 rx_control)
4036{
4037 struct l2cap_pinfo *pi = l2cap_pi(sk);
4038 u8 tx_seq = __get_reqseq(rx_control);
4039
4040 pi->conn_state |= L2CAP_CONN_REMOTE_BUSY;
4041 pi->expected_ack_seq = tx_seq;
4042 l2cap_drop_acked_frames(sk);
4043
99b0d4b7
GP
4044 if (!(pi->conn_state & L2CAP_CONN_SREJ_SENT)) {
4045 del_timer(&pi->retrans_timer);
a2e12a2a
GP
4046 if (rx_control & L2CAP_CTRL_POLL)
4047 l2cap_send_rr_or_rnr(pi, L2CAP_CTRL_FINAL);
99b0d4b7 4048 return;
e072745f 4049 }
99b0d4b7
GP
4050
4051 if (rx_control & L2CAP_CTRL_POLL)
4052 l2cap_send_srejtail(sk);
4053 else
4054 l2cap_send_sframe(pi, L2CAP_SUPER_RCV_READY);
e072745f
GP
4055}
4056
4057static inline int l2cap_data_channel_sframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
4058{
4059 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
4060
9b16dc65
GP
4061 if (L2CAP_CTRL_FINAL & rx_control &&
4062 l2cap_pi(sk)->conn_state & L2CAP_CONN_WAIT_F) {
e072745f
GP
4063 del_timer(&l2cap_pi(sk)->monitor_timer);
4064 if (l2cap_pi(sk)->unacked_frames > 0)
4065 __mod_retrans_timer();
4066 l2cap_pi(sk)->conn_state &= ~L2CAP_CONN_WAIT_F;
4067 }
4068
4069 switch (rx_control & L2CAP_CTRL_SUPERVISE) {
4070 case L2CAP_SUPER_RCV_READY:
4071 l2cap_data_channel_rrframe(sk, rx_control);
8f17154f
GP
4072 break;
4073
e072745f
GP
4074 case L2CAP_SUPER_REJECT:
4075 l2cap_data_channel_rejframe(sk, rx_control);
4076 break;
2246b2f1 4077
e072745f
GP
4078 case L2CAP_SUPER_SELECT_REJECT:
4079 l2cap_data_channel_srejframe(sk, rx_control);
4080 break;
4081
4082 case L2CAP_SUPER_RCV_NOT_READY:
4083 l2cap_data_channel_rnrframe(sk, rx_control);
1c2acffb
GP
4084 break;
4085 }
4086
faaebd19 4087 kfree_skb(skb);
1c2acffb
GP
4088 return 0;
4089}
4090
1da177e4
LT
4091static inline int l2cap_data_channel(struct l2cap_conn *conn, u16 cid, struct sk_buff *skb)
4092{
4093 struct sock *sk;
6840ed07 4094 struct l2cap_pinfo *pi;
51893f88 4095 u16 control;
f6337c77 4096 u8 tx_seq, req_seq;
51893f88 4097 int len, next_tx_seq_offset, req_seq_offset;
1da177e4
LT
4098
4099 sk = l2cap_get_chan_by_scid(&conn->chan_list, cid);
4100 if (!sk) {
4101 BT_DBG("unknown cid 0x%4.4x", cid);
4102 goto drop;
4103 }
4104
6840ed07
GP
4105 pi = l2cap_pi(sk);
4106
1da177e4
LT
4107 BT_DBG("sk %p, len %d", sk, skb->len);
4108
4109 if (sk->sk_state != BT_CONNECTED)
4110 goto drop;
4111
6840ed07 4112 switch (pi->mode) {
1c2acffb
GP
4113 case L2CAP_MODE_BASIC:
4114 /* If socket recv buffers overflows we drop data here
4115 * which is *bad* because L2CAP has to be reliable.
4116 * But we don't have any other choice. L2CAP doesn't
4117 * provide flow control mechanism. */
1da177e4 4118
6840ed07 4119 if (pi->imtu < skb->len)
1c2acffb 4120 goto drop;
1da177e4 4121
1c2acffb
GP
4122 if (!sock_queue_rcv_skb(sk, skb))
4123 goto done;
4124 break;
4125
4126 case L2CAP_MODE_ERTM:
4127 control = get_unaligned_le16(skb->data);
4128 skb_pull(skb, 2);
c74e560c 4129 len = skb->len;
1c2acffb 4130
bc1b1f8b 4131 if (__is_sar_start(control) && __is_iframe(control))
c74e560c
GP
4132 len -= 2;
4133
fcc203c3
GP
4134 if (pi->fcs == L2CAP_FCS_CRC16)
4135 len -= 2;
4136
30afb5b2
GP
4137 /*
4138 * We can just drop the corrupted I-frame here.
4139 * Receiver will miss it and start proper recovery
4140 * procedures and ask retransmission.
4141 */
18778a63
GP
4142 if (len > pi->mps) {
4143 l2cap_send_disconn_req(pi->conn, sk);
1c2acffb 4144 goto drop;
18778a63 4145 }
1c2acffb 4146
fcc203c3
GP
4147 if (l2cap_check_fcs(pi, skb))
4148 goto drop;
4149
01760bdd
JPRV
4150 req_seq = __get_reqseq(control);
4151 req_seq_offset = (req_seq - pi->expected_ack_seq) % 64;
4152 if (req_seq_offset < 0)
4153 req_seq_offset += 64;
4154
4155 next_tx_seq_offset =
4156 (pi->next_tx_seq - pi->expected_ack_seq) % 64;
4157 if (next_tx_seq_offset < 0)
4158 next_tx_seq_offset += 64;
4159
4160 /* check for invalid req-seq */
4161 if (req_seq_offset > next_tx_seq_offset) {
4162 l2cap_send_disconn_req(pi->conn, sk);
4163 goto drop;
4164 }
4165
277ffbe3 4166 if (__is_iframe(control)) {
51893f88 4167 if (len < 0) {
18778a63 4168 l2cap_send_disconn_req(pi->conn, sk);
277ffbe3 4169 goto drop;
18778a63 4170 }
277ffbe3 4171
fcafde2e 4172 l2cap_data_channel_iframe(sk, control, skb);
277ffbe3 4173 } else {
18778a63
GP
4174 if (len != 0) {
4175 l2cap_send_disconn_req(pi->conn, sk);
277ffbe3 4176 goto drop;
18778a63 4177 }
277ffbe3 4178
fcafde2e 4179 l2cap_data_channel_sframe(sk, control, skb);
277ffbe3 4180 }
1c2acffb 4181
fcafde2e 4182 goto done;
1c2acffb 4183
6840ed07
GP
4184 case L2CAP_MODE_STREAMING:
4185 control = get_unaligned_le16(skb->data);
4186 skb_pull(skb, 2);
4187 len = skb->len;
4188
4189 if (__is_sar_start(control))
4190 len -= 2;
4191
fcc203c3
GP
4192 if (pi->fcs == L2CAP_FCS_CRC16)
4193 len -= 2;
4194
51893f88 4195 if (len > pi->mps || len < 0 || __is_sframe(control))
6840ed07
GP
4196 goto drop;
4197
fcc203c3
GP
4198 if (l2cap_check_fcs(pi, skb))
4199 goto drop;
4200
6840ed07
GP
4201 tx_seq = __get_txseq(control);
4202
4203 if (pi->expected_tx_seq == tx_seq)
4204 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
4205 else
7dffe421 4206 pi->expected_tx_seq = (tx_seq + 1) % 64;
6840ed07 4207
18778a63 4208 l2cap_streaming_reassembly_sdu(sk, skb, control);
6840ed07
GP
4209
4210 goto done;
4211
1c2acffb 4212 default:
e8235c6b 4213 BT_DBG("sk %p: bad mode 0x%2.2x", sk, pi->mode);
1c2acffb
GP
4214 break;
4215 }
1da177e4
LT
4216
4217drop:
4218 kfree_skb(skb);
4219
4220done:
0139418c
MH
4221 if (sk)
4222 bh_unlock_sock(sk);
4223
1da177e4
LT
4224 return 0;
4225}
4226
8e036fc3 4227static inline int l2cap_conless_channel(struct l2cap_conn *conn, __le16 psm, struct sk_buff *skb)
1da177e4
LT
4228{
4229 struct sock *sk;
4230
4231 sk = l2cap_get_sock_by_psm(0, psm, conn->src);
4232 if (!sk)
4233 goto drop;
4234
4235 BT_DBG("sk %p, len %d", sk, skb->len);
4236
4237 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_CONNECTED)
4238 goto drop;
4239
4240 if (l2cap_pi(sk)->imtu < skb->len)
4241 goto drop;
4242
4243 if (!sock_queue_rcv_skb(sk, skb))
4244 goto done;
4245
4246drop:
4247 kfree_skb(skb);
4248
4249done:
af05b30b
GP
4250 if (sk)
4251 bh_unlock_sock(sk);
1da177e4
LT
4252 return 0;
4253}
4254
4255static void l2cap_recv_frame(struct l2cap_conn *conn, struct sk_buff *skb)
4256{
4257 struct l2cap_hdr *lh = (void *) skb->data;
8e036fc3
AV
4258 u16 cid, len;
4259 __le16 psm;
1da177e4
LT
4260
4261 skb_pull(skb, L2CAP_HDR_SIZE);
4262 cid = __le16_to_cpu(lh->cid);
4263 len = __le16_to_cpu(lh->len);
4264
1c2acffb
GP
4265 if (len != skb->len) {
4266 kfree_skb(skb);
4267 return;
4268 }
4269
1da177e4
LT
4270 BT_DBG("len %d, cid 0x%4.4x", len, cid);
4271
4272 switch (cid) {
8db4dc46 4273 case L2CAP_CID_SIGNALING:
1da177e4
LT
4274 l2cap_sig_channel(conn, skb);
4275 break;
4276
8db4dc46 4277 case L2CAP_CID_CONN_LESS:
1b7bf4ed 4278 psm = get_unaligned_le16(skb->data);
1da177e4
LT
4279 skb_pull(skb, 2);
4280 l2cap_conless_channel(conn, psm, skb);
4281 break;
4282
4283 default:
4284 l2cap_data_channel(conn, cid, skb);
4285 break;
4286 }
4287}
4288
4289/* ---- L2CAP interface with lower layer (HCI) ---- */
4290
4291static int l2cap_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4292{
4293 int exact = 0, lm1 = 0, lm2 = 0;
4294 register struct sock *sk;
4295 struct hlist_node *node;
4296
4297 if (type != ACL_LINK)
4298 return 0;
4299
4300 BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr));
4301
4302 /* Find listening sockets and check their link_mode */
4303 read_lock(&l2cap_sk_list.lock);
4304 sk_for_each(sk, node, &l2cap_sk_list.head) {
4305 if (sk->sk_state != BT_LISTEN)
4306 continue;
4307
4308 if (!bacmp(&bt_sk(sk)->src, &hdev->bdaddr)) {
2af6b9d5
MH
4309 lm1 |= HCI_LM_ACCEPT;
4310 if (l2cap_pi(sk)->role_switch)
4311 lm1 |= HCI_LM_MASTER;
1da177e4 4312 exact++;
2af6b9d5
MH
4313 } else if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY)) {
4314 lm2 |= HCI_LM_ACCEPT;
4315 if (l2cap_pi(sk)->role_switch)
4316 lm2 |= HCI_LM_MASTER;
4317 }
1da177e4
LT
4318 }
4319 read_unlock(&l2cap_sk_list.lock);
4320
4321 return exact ? lm1 : lm2;
4322}
4323
4324static int l2cap_connect_cfm(struct hci_conn *hcon, u8 status)
4325{
0139418c
MH
4326 struct l2cap_conn *conn;
4327
1da177e4
LT
4328 BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status);
4329
4330 if (hcon->type != ACL_LINK)
4331 return 0;
4332
4333 if (!status) {
1da177e4
LT
4334 conn = l2cap_conn_add(hcon, status);
4335 if (conn)
4336 l2cap_conn_ready(conn);
0139418c 4337 } else
1da177e4
LT
4338 l2cap_conn_del(hcon, bt_err(status));
4339
4340 return 0;
4341}
4342
2950f21a
MH
4343static int l2cap_disconn_ind(struct hci_conn *hcon)
4344{
4345 struct l2cap_conn *conn = hcon->l2cap_data;
4346
4347 BT_DBG("hcon %p", hcon);
4348
4349 if (hcon->type != ACL_LINK || !conn)
4350 return 0x13;
4351
4352 return conn->disc_reason;
4353}
4354
4355static int l2cap_disconn_cfm(struct hci_conn *hcon, u8 reason)
1da177e4
LT
4356{
4357 BT_DBG("hcon %p reason %d", hcon, reason);
4358
4359 if (hcon->type != ACL_LINK)
4360 return 0;
4361
4362 l2cap_conn_del(hcon, bt_err(reason));
0139418c 4363
1da177e4
LT
4364 return 0;
4365}
4366
f62e4323
MH
4367static inline void l2cap_check_encryption(struct sock *sk, u8 encrypt)
4368{
bd3c9e25 4369 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM)
255c7601
MH
4370 return;
4371
f62e4323
MH
4372 if (encrypt == 0x00) {
4373 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM) {
4374 l2cap_sock_clear_timer(sk);
4375 l2cap_sock_set_timer(sk, HZ * 5);
4376 } else if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
4377 __l2cap_sock_close(sk, ECONNREFUSED);
4378 } else {
4379 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM)
4380 l2cap_sock_clear_timer(sk);
4381 }
4382}
4383
8c1b2355 4384static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
1da177e4
LT
4385{
4386 struct l2cap_chan_list *l;
0139418c 4387 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 4388 struct sock *sk;
1da177e4 4389
0139418c 4390 if (!conn)
1da177e4 4391 return 0;
0139418c 4392
1da177e4
LT
4393 l = &conn->chan_list;
4394
4395 BT_DBG("conn %p", conn);
4396
4397 read_lock(&l->lock);
4398
4399 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
4400 bh_lock_sock(sk);
4401
6a8d3010
MH
4402 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_CONNECT_PEND) {
4403 bh_unlock_sock(sk);
4404 continue;
4405 }
4406
f62e4323 4407 if (!status && (sk->sk_state == BT_CONNECTED ||
8c1b2355 4408 sk->sk_state == BT_CONFIG)) {
f62e4323 4409 l2cap_check_encryption(sk, encrypt);
9719f8af
MH
4410 bh_unlock_sock(sk);
4411 continue;
4412 }
4413
b1235d79
MH
4414 if (sk->sk_state == BT_CONNECT) {
4415 if (!status) {
4416 struct l2cap_conn_req req;
4417 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
4418 req.psm = l2cap_pi(sk)->psm;
1da177e4 4419
b1235d79 4420 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
e501d055 4421 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
1da177e4 4422
b1235d79
MH
4423 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4424 L2CAP_CONN_REQ, sizeof(req), &req);
4425 } else {
4426 l2cap_sock_clear_timer(sk);
4427 l2cap_sock_set_timer(sk, HZ / 10);
4428 }
4429 } else if (sk->sk_state == BT_CONNECT2) {
4430 struct l2cap_conn_rsp rsp;
4431 __u16 result;
1da177e4 4432
b1235d79
MH
4433 if (!status) {
4434 sk->sk_state = BT_CONFIG;
4435 result = L2CAP_CR_SUCCESS;
4436 } else {
4437 sk->sk_state = BT_DISCONN;
4438 l2cap_sock_set_timer(sk, HZ / 10);
4439 result = L2CAP_CR_SEC_BLOCK;
4440 }
4441
4442 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
4443 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
4444 rsp.result = cpu_to_le16(result);
e7c29cb1 4445 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
b1235d79
MH
4446 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4447 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4448 }
1da177e4
LT
4449
4450 bh_unlock_sock(sk);
4451 }
4452
4453 read_unlock(&l->lock);
b1235d79 4454
1da177e4
LT
4455 return 0;
4456}
4457
4458static int l2cap_recv_acldata(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
4459{
4460 struct l2cap_conn *conn = hcon->l2cap_data;
4461
4462 if (!conn && !(conn = l2cap_conn_add(hcon, 0)))
4463 goto drop;
4464
4465 BT_DBG("conn %p len %d flags 0x%x", conn, skb->len, flags);
4466
4467 if (flags & ACL_START) {
4468 struct l2cap_hdr *hdr;
4469 int len;
4470
4471 if (conn->rx_len) {
4472 BT_ERR("Unexpected start frame (len %d)", skb->len);
4473 kfree_skb(conn->rx_skb);
4474 conn->rx_skb = NULL;
4475 conn->rx_len = 0;
4476 l2cap_conn_unreliable(conn, ECOMM);
4477 }
4478
4479 if (skb->len < 2) {
4480 BT_ERR("Frame is too short (len %d)", skb->len);
4481 l2cap_conn_unreliable(conn, ECOMM);
4482 goto drop;
4483 }
4484
4485 hdr = (struct l2cap_hdr *) skb->data;
4486 len = __le16_to_cpu(hdr->len) + L2CAP_HDR_SIZE;
4487
4488 if (len == skb->len) {
4489 /* Complete frame received */
4490 l2cap_recv_frame(conn, skb);
4491 return 0;
4492 }
4493
4494 BT_DBG("Start: total len %d, frag len %d", len, skb->len);
4495
4496 if (skb->len > len) {
4497 BT_ERR("Frame is too long (len %d, expected len %d)",
4498 skb->len, len);
4499 l2cap_conn_unreliable(conn, ECOMM);
4500 goto drop;
4501 }
4502
4503 /* Allocate skb for the complete frame (with header) */
af05b30b
GP
4504 conn->rx_skb = bt_skb_alloc(len, GFP_ATOMIC);
4505 if (!conn->rx_skb)
1da177e4
LT
4506 goto drop;
4507
d626f62b 4508 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 4509 skb->len);
1da177e4
LT
4510 conn->rx_len = len - skb->len;
4511 } else {
4512 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, conn->rx_len);
4513
4514 if (!conn->rx_len) {
4515 BT_ERR("Unexpected continuation frame (len %d)", skb->len);
4516 l2cap_conn_unreliable(conn, ECOMM);
4517 goto drop;
4518 }
4519
4520 if (skb->len > conn->rx_len) {
4521 BT_ERR("Fragment is too long (len %d, expected %d)",
4522 skb->len, conn->rx_len);
4523 kfree_skb(conn->rx_skb);
4524 conn->rx_skb = NULL;
4525 conn->rx_len = 0;
4526 l2cap_conn_unreliable(conn, ECOMM);
4527 goto drop;
4528 }
4529
d626f62b 4530 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 4531 skb->len);
1da177e4
LT
4532 conn->rx_len -= skb->len;
4533
4534 if (!conn->rx_len) {
4535 /* Complete frame received */
4536 l2cap_recv_frame(conn, conn->rx_skb);
4537 conn->rx_skb = NULL;
4538 }
4539 }
4540
4541drop:
4542 kfree_skb(skb);
4543 return 0;
4544}
4545
aef7d97c 4546static int l2cap_debugfs_show(struct seq_file *f, void *p)
1da177e4
LT
4547{
4548 struct sock *sk;
4549 struct hlist_node *node;
1da177e4
LT
4550
4551 read_lock_bh(&l2cap_sk_list.lock);
4552
be9d1227
MH
4553 sk_for_each(sk, node, &l2cap_sk_list.head) {
4554 struct l2cap_pinfo *pi = l2cap_pi(sk);
101545f6 4555
aef7d97c
MH
4556 seq_printf(f, "%s %s %d %d 0x%4.4x 0x%4.4x %d %d %d\n",
4557 batostr(&bt_sk(sk)->src),
4558 batostr(&bt_sk(sk)->dst),
4559 sk->sk_state, __le16_to_cpu(pi->psm),
4560 pi->scid, pi->dcid,
4561 pi->imtu, pi->omtu, pi->sec_level);
be9d1227 4562 }
1da177e4 4563
1da177e4 4564 read_unlock_bh(&l2cap_sk_list.lock);
1da177e4 4565
aef7d97c 4566 return 0;
1da177e4
LT
4567}
4568
aef7d97c
MH
4569static int l2cap_debugfs_open(struct inode *inode, struct file *file)
4570{
4571 return single_open(file, l2cap_debugfs_show, inode->i_private);
4572}
4573
4574static const struct file_operations l2cap_debugfs_fops = {
4575 .open = l2cap_debugfs_open,
4576 .read = seq_read,
4577 .llseek = seq_lseek,
4578 .release = single_release,
4579};
4580
4581static struct dentry *l2cap_debugfs;
1da177e4 4582
90ddc4f0 4583static const struct proto_ops l2cap_sock_ops = {
1da177e4
LT
4584 .family = PF_BLUETOOTH,
4585 .owner = THIS_MODULE,
4586 .release = l2cap_sock_release,
4587 .bind = l2cap_sock_bind,
4588 .connect = l2cap_sock_connect,
4589 .listen = l2cap_sock_listen,
4590 .accept = l2cap_sock_accept,
4591 .getname = l2cap_sock_getname,
4592 .sendmsg = l2cap_sock_sendmsg,
f66dc81f 4593 .recvmsg = l2cap_sock_recvmsg,
1da177e4 4594 .poll = bt_sock_poll,
3241ad82 4595 .ioctl = bt_sock_ioctl,
1da177e4
LT
4596 .mmap = sock_no_mmap,
4597 .socketpair = sock_no_socketpair,
1da177e4
LT
4598 .shutdown = l2cap_sock_shutdown,
4599 .setsockopt = l2cap_sock_setsockopt,
4600 .getsockopt = l2cap_sock_getsockopt
4601};
4602
ec1b4cf7 4603static const struct net_proto_family l2cap_sock_family_ops = {
1da177e4
LT
4604 .family = PF_BLUETOOTH,
4605 .owner = THIS_MODULE,
4606 .create = l2cap_sock_create,
4607};
4608
4609static struct hci_proto l2cap_hci_proto = {
4610 .name = "L2CAP",
4611 .id = HCI_PROTO_L2CAP,
4612 .connect_ind = l2cap_connect_ind,
4613 .connect_cfm = l2cap_connect_cfm,
4614 .disconn_ind = l2cap_disconn_ind,
2950f21a 4615 .disconn_cfm = l2cap_disconn_cfm,
8c1b2355 4616 .security_cfm = l2cap_security_cfm,
1da177e4
LT
4617 .recv_acldata = l2cap_recv_acldata
4618};
4619
4620static int __init l2cap_init(void)
4621{
4622 int err;
be9d1227 4623
1da177e4
LT
4624 err = proto_register(&l2cap_proto, 0);
4625 if (err < 0)
4626 return err;
4627
1890d36b
GP
4628 _busy_wq = create_singlethread_workqueue("l2cap");
4629 if (!_busy_wq)
4630 goto error;
4631
1da177e4
LT
4632 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
4633 if (err < 0) {
4634 BT_ERR("L2CAP socket registration failed");
4635 goto error;
4636 }
4637
4638 err = hci_register_proto(&l2cap_hci_proto);
4639 if (err < 0) {
4640 BT_ERR("L2CAP protocol registration failed");
4641 bt_sock_unregister(BTPROTO_L2CAP);
4642 goto error;
4643 }
4644
aef7d97c
MH
4645 if (bt_debugfs) {
4646 l2cap_debugfs = debugfs_create_file("l2cap", 0444,
4647 bt_debugfs, NULL, &l2cap_debugfs_fops);
4648 if (!l2cap_debugfs)
4649 BT_ERR("Failed to create L2CAP debug file");
4650 }
1da177e4
LT
4651
4652 BT_INFO("L2CAP ver %s", VERSION);
4653 BT_INFO("L2CAP socket layer initialized");
4654
4655 return 0;
4656
4657error:
4658 proto_unregister(&l2cap_proto);
4659 return err;
4660}
4661
4662static void __exit l2cap_exit(void)
4663{
aef7d97c 4664 debugfs_remove(l2cap_debugfs);
1da177e4 4665
1890d36b
GP
4666 flush_workqueue(_busy_wq);
4667 destroy_workqueue(_busy_wq);
4668
1da177e4
LT
4669 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
4670 BT_ERR("L2CAP socket unregistration failed");
4671
4672 if (hci_unregister_proto(&l2cap_hci_proto) < 0)
4673 BT_ERR("L2CAP protocol unregistration failed");
4674
4675 proto_unregister(&l2cap_proto);
4676}
4677
4678void l2cap_load(void)
4679{
4680 /* Dummy function to trigger automatic L2CAP module loading by
4681 * other modules that use L2CAP sockets but don't use any other
4682 * symbols from it. */
1da177e4
LT
4683}
4684EXPORT_SYMBOL(l2cap_load);
4685
4686module_init(l2cap_init);
4687module_exit(l2cap_exit);
4688
44dd46de
MH
4689module_param(enable_ertm, bool, 0644);
4690MODULE_PARM_DESC(enable_ertm, "Enable enhanced retransmission mode");
4691
63fbd24e 4692MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
1da177e4
LT
4693MODULE_DESCRIPTION("Bluetooth L2CAP ver " VERSION);
4694MODULE_VERSION(VERSION);
4695MODULE_LICENSE("GPL");
4696MODULE_ALIAS("bt-proto-0");