Bluetooth: Use a l2cap_pinfo struct instead l2cap_pi() macro
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / bluetooth / l2cap.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth L2CAP core and sockets. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
4fc268d2 30#include <linux/capability.h>
1da177e4
LT
31#include <linux/errno.h>
32#include <linux/kernel.h>
1da177e4
LT
33#include <linux/sched.h>
34#include <linux/slab.h>
35#include <linux/poll.h>
36#include <linux/fcntl.h>
37#include <linux/init.h>
38#include <linux/interrupt.h>
39#include <linux/socket.h>
40#include <linux/skbuff.h>
1da177e4 41#include <linux/list.h>
be9d1227 42#include <linux/device.h>
aef7d97c
MH
43#include <linux/debugfs.h>
44#include <linux/seq_file.h>
af05b30b 45#include <linux/uaccess.h>
fcc203c3 46#include <linux/crc16.h>
1da177e4
LT
47#include <net/sock.h>
48
49#include <asm/system.h>
1da177e4
LT
50#include <asm/unaligned.h>
51
52#include <net/bluetooth/bluetooth.h>
53#include <net/bluetooth/hci_core.h>
54#include <net/bluetooth/l2cap.h>
55
44dd46de
MH
56#define VERSION "2.14"
57
58static int enable_ertm = 0;
5fbcd3d1 59static int max_transmit = L2CAP_DEFAULT_MAX_TX;
f0709e03 60
47ec1dcd 61static u32 l2cap_feat_mask = L2CAP_FEAT_FIXED_CHAN;
e1027a7c 62static u8 l2cap_fixed_chan[8] = { 0x02, };
1da177e4 63
90ddc4f0 64static const struct proto_ops l2cap_sock_ops;
1da177e4
LT
65
66static struct bt_sock_list l2cap_sk_list = {
d5fb2962 67 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
1da177e4
LT
68};
69
1da177e4
LT
70static void __l2cap_sock_close(struct sock *sk, int reason);
71static void l2cap_sock_close(struct sock *sk);
72static void l2cap_sock_kill(struct sock *sk);
73
74static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
75 u8 code, u8 ident, u16 dlen, void *data);
76
77/* ---- L2CAP timers ---- */
78static void l2cap_sock_timeout(unsigned long arg)
79{
80 struct sock *sk = (struct sock *) arg;
b1235d79 81 int reason;
1da177e4
LT
82
83 BT_DBG("sock %p state %d", sk, sk->sk_state);
84
85 bh_lock_sock(sk);
b1235d79 86
f62e4323
MH
87 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONFIG)
88 reason = ECONNREFUSED;
89 else if (sk->sk_state == BT_CONNECT &&
2af6b9d5 90 l2cap_pi(sk)->sec_level != BT_SECURITY_SDP)
b1235d79
MH
91 reason = ECONNREFUSED;
92 else
93 reason = ETIMEDOUT;
94
95 __l2cap_sock_close(sk, reason);
96
1da177e4
LT
97 bh_unlock_sock(sk);
98
99 l2cap_sock_kill(sk);
100 sock_put(sk);
101}
102
103static void l2cap_sock_set_timer(struct sock *sk, long timeout)
104{
105 BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
106 sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
107}
108
109static void l2cap_sock_clear_timer(struct sock *sk)
110{
111 BT_DBG("sock %p state %d", sk, sk->sk_state);
112 sk_stop_timer(sk, &sk->sk_timer);
113}
114
0139418c
MH
115/* ---- L2CAP channels ---- */
116static struct sock *__l2cap_get_chan_by_dcid(struct l2cap_chan_list *l, u16 cid)
117{
118 struct sock *s;
119 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
120 if (l2cap_pi(s)->dcid == cid)
121 break;
122 }
123 return s;
124}
125
126static struct sock *__l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
127{
128 struct sock *s;
129 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
130 if (l2cap_pi(s)->scid == cid)
131 break;
132 }
133 return s;
134}
135
136/* Find channel with given SCID.
137 * Returns locked socket */
138static inline struct sock *l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
139{
140 struct sock *s;
141 read_lock(&l->lock);
142 s = __l2cap_get_chan_by_scid(l, cid);
af05b30b
GP
143 if (s)
144 bh_lock_sock(s);
0139418c
MH
145 read_unlock(&l->lock);
146 return s;
147}
148
149static struct sock *__l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
150{
151 struct sock *s;
152 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
153 if (l2cap_pi(s)->ident == ident)
154 break;
155 }
156 return s;
157}
158
159static inline struct sock *l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
160{
161 struct sock *s;
162 read_lock(&l->lock);
163 s = __l2cap_get_chan_by_ident(l, ident);
af05b30b
GP
164 if (s)
165 bh_lock_sock(s);
0139418c
MH
166 read_unlock(&l->lock);
167 return s;
168}
169
170static u16 l2cap_alloc_cid(struct l2cap_chan_list *l)
171{
8db4dc46 172 u16 cid = L2CAP_CID_DYN_START;
0139418c 173
8db4dc46 174 for (; cid < L2CAP_CID_DYN_END; cid++) {
af05b30b 175 if (!__l2cap_get_chan_by_scid(l, cid))
0139418c
MH
176 return cid;
177 }
178
179 return 0;
180}
181
182static inline void __l2cap_chan_link(struct l2cap_chan_list *l, struct sock *sk)
183{
184 sock_hold(sk);
185
186 if (l->head)
187 l2cap_pi(l->head)->prev_c = sk;
188
189 l2cap_pi(sk)->next_c = l->head;
190 l2cap_pi(sk)->prev_c = NULL;
191 l->head = sk;
192}
193
194static inline void l2cap_chan_unlink(struct l2cap_chan_list *l, struct sock *sk)
195{
196 struct sock *next = l2cap_pi(sk)->next_c, *prev = l2cap_pi(sk)->prev_c;
197
fd1278d7 198 write_lock_bh(&l->lock);
0139418c
MH
199 if (sk == l->head)
200 l->head = next;
201
202 if (next)
203 l2cap_pi(next)->prev_c = prev;
204 if (prev)
205 l2cap_pi(prev)->next_c = next;
fd1278d7 206 write_unlock_bh(&l->lock);
0139418c
MH
207
208 __sock_put(sk);
209}
210
211static void __l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
212{
213 struct l2cap_chan_list *l = &conn->chan_list;
214
af05b30b
GP
215 BT_DBG("conn %p, psm 0x%2.2x, dcid 0x%4.4x", conn,
216 l2cap_pi(sk)->psm, l2cap_pi(sk)->dcid);
0139418c 217
2950f21a
MH
218 conn->disc_reason = 0x13;
219
0139418c
MH
220 l2cap_pi(sk)->conn = conn;
221
222 if (sk->sk_type == SOCK_SEQPACKET) {
223 /* Alloc CID for connection-oriented socket */
224 l2cap_pi(sk)->scid = l2cap_alloc_cid(l);
225 } else if (sk->sk_type == SOCK_DGRAM) {
226 /* Connectionless socket */
8db4dc46
GP
227 l2cap_pi(sk)->scid = L2CAP_CID_CONN_LESS;
228 l2cap_pi(sk)->dcid = L2CAP_CID_CONN_LESS;
0139418c
MH
229 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
230 } else {
231 /* Raw socket can send/recv signalling messages only */
8db4dc46
GP
232 l2cap_pi(sk)->scid = L2CAP_CID_SIGNALING;
233 l2cap_pi(sk)->dcid = L2CAP_CID_SIGNALING;
0139418c
MH
234 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
235 }
236
237 __l2cap_chan_link(l, sk);
238
239 if (parent)
240 bt_accept_enqueue(parent, sk);
241}
242
8e87d142 243/* Delete channel.
0139418c
MH
244 * Must be called on the locked socket. */
245static void l2cap_chan_del(struct sock *sk, int err)
246{
247 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
248 struct sock *parent = bt_sk(sk)->parent;
249
250 l2cap_sock_clear_timer(sk);
251
252 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
253
8e87d142 254 if (conn) {
0139418c
MH
255 /* Unlink from channel list */
256 l2cap_chan_unlink(&conn->chan_list, sk);
257 l2cap_pi(sk)->conn = NULL;
258 hci_conn_put(conn->hcon);
259 }
260
b1235d79 261 sk->sk_state = BT_CLOSED;
0139418c
MH
262 sock_set_flag(sk, SOCK_ZAPPED);
263
264 if (err)
265 sk->sk_err = err;
266
267 if (parent) {
268 bt_accept_unlink(sk);
269 parent->sk_data_ready(parent, 0);
270 } else
271 sk->sk_state_change(sk);
272}
273
79d554a6 274/* Service level security */
2af6b9d5 275static inline int l2cap_check_security(struct sock *sk)
79d554a6
MH
276{
277 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
0684e5f9
MH
278 __u8 auth_type;
279
00ae4af9
MH
280 if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
281 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
282 auth_type = HCI_AT_NO_BONDING_MITM;
283 else
af05b30b 284 auth_type = HCI_AT_NO_BONDING;
00ae4af9
MH
285
286 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
287 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
288 } else {
289 switch (l2cap_pi(sk)->sec_level) {
290 case BT_SECURITY_HIGH:
291 auth_type = HCI_AT_GENERAL_BONDING_MITM;
292 break;
293 case BT_SECURITY_MEDIUM:
294 auth_type = HCI_AT_GENERAL_BONDING;
295 break;
296 default:
297 auth_type = HCI_AT_NO_BONDING;
298 break;
299 }
0684e5f9 300 }
79d554a6 301
0684e5f9
MH
302 return hci_conn_security(conn->hcon, l2cap_pi(sk)->sec_level,
303 auth_type);
79d554a6
MH
304}
305
4e8402a3
MH
306static inline u8 l2cap_get_ident(struct l2cap_conn *conn)
307{
308 u8 id;
309
310 /* Get next available identificator.
311 * 1 - 128 are used by kernel.
312 * 129 - 199 are reserved.
313 * 200 - 254 are used by utilities like l2ping, etc.
314 */
315
316 spin_lock_bh(&conn->lock);
317
318 if (++conn->tx_ident > 128)
319 conn->tx_ident = 1;
320
321 id = conn->tx_ident;
322
323 spin_unlock_bh(&conn->lock);
324
325 return id;
326}
327
328static inline int l2cap_send_cmd(struct l2cap_conn *conn, u8 ident, u8 code, u16 len, void *data)
329{
330 struct sk_buff *skb = l2cap_build_cmd(conn, code, ident, len, data);
331
332 BT_DBG("code 0x%2.2x", code);
333
334 if (!skb)
335 return -ENOMEM;
336
337 return hci_send_acl(conn->hcon, skb, 0);
338}
339
1c2acffb
GP
340static inline int l2cap_send_sframe(struct l2cap_pinfo *pi, u16 control)
341{
342 struct sk_buff *skb;
343 struct l2cap_hdr *lh;
344 struct l2cap_conn *conn = pi->conn;
fcc203c3
GP
345 int count, hlen = L2CAP_HDR_SIZE + 2;
346
347 if (pi->fcs == L2CAP_FCS_CRC16)
348 hlen += 2;
1c2acffb
GP
349
350 BT_DBG("pi %p, control 0x%2.2x", pi, control);
351
fcc203c3 352 count = min_t(unsigned int, conn->mtu, hlen);
1c2acffb
GP
353 control |= L2CAP_CTRL_FRAME_TYPE;
354
355 skb = bt_skb_alloc(count, GFP_ATOMIC);
356 if (!skb)
357 return -ENOMEM;
358
359 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
fcc203c3 360 lh->len = cpu_to_le16(hlen - L2CAP_HDR_SIZE);
1c2acffb
GP
361 lh->cid = cpu_to_le16(pi->dcid);
362 put_unaligned_le16(control, skb_put(skb, 2));
363
fcc203c3
GP
364 if (pi->fcs == L2CAP_FCS_CRC16) {
365 u16 fcs = crc16(0, (u8 *)lh, count - 2);
366 put_unaligned_le16(fcs, skb_put(skb, 2));
367 }
368
1c2acffb
GP
369 return hci_send_acl(pi->conn->hcon, skb, 0);
370}
371
7e743090
GP
372static inline int l2cap_send_rr_or_rnr(struct l2cap_pinfo *pi, u16 control)
373{
374 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY)
375 control |= L2CAP_SUPER_RCV_NOT_READY;
376 else
377 control |= L2CAP_SUPER_RCV_READY;
378
2ab25cdd
GP
379 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
380
7e743090
GP
381 return l2cap_send_sframe(pi, control);
382}
383
79d554a6
MH
384static void l2cap_do_start(struct sock *sk)
385{
386 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
387
388 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) {
984947dc
MH
389 if (!(conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE))
390 return;
391
2af6b9d5 392 if (l2cap_check_security(sk)) {
b1235d79
MH
393 struct l2cap_conn_req req;
394 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
395 req.psm = l2cap_pi(sk)->psm;
79d554a6 396
b1235d79 397 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 398
b1235d79 399 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
79d554a6 400 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 401 }
79d554a6
MH
402 } else {
403 struct l2cap_info_req req;
404 req.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
405
406 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
407 conn->info_ident = l2cap_get_ident(conn);
408
409 mod_timer(&conn->info_timer, jiffies +
410 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
411
412 l2cap_send_cmd(conn, conn->info_ident,
413 L2CAP_INFO_REQ, sizeof(req), &req);
414 }
415}
416
22121fc9
GP
417static void l2cap_send_disconn_req(struct l2cap_conn *conn, struct sock *sk)
418{
419 struct l2cap_disconn_req req;
420
421 req.dcid = cpu_to_le16(l2cap_pi(sk)->dcid);
422 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
423 l2cap_send_cmd(conn, l2cap_get_ident(conn),
424 L2CAP_DISCONN_REQ, sizeof(req), &req);
425}
426
1da177e4 427/* ---- L2CAP connections ---- */
4e8402a3
MH
428static void l2cap_conn_start(struct l2cap_conn *conn)
429{
430 struct l2cap_chan_list *l = &conn->chan_list;
431 struct sock *sk;
432
433 BT_DBG("conn %p", conn);
434
435 read_lock(&l->lock);
436
437 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
438 bh_lock_sock(sk);
439
440 if (sk->sk_type != SOCK_SEQPACKET) {
79d554a6
MH
441 bh_unlock_sock(sk);
442 continue;
443 }
444
445 if (sk->sk_state == BT_CONNECT) {
2af6b9d5 446 if (l2cap_check_security(sk)) {
b1235d79
MH
447 struct l2cap_conn_req req;
448 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
449 req.psm = l2cap_pi(sk)->psm;
79d554a6 450
b1235d79 451 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 452
b1235d79 453 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4e8402a3 454 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 455 }
79d554a6
MH
456 } else if (sk->sk_state == BT_CONNECT2) {
457 struct l2cap_conn_rsp rsp;
458 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
459 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
460
2af6b9d5 461 if (l2cap_check_security(sk)) {
f66dc81f
MH
462 if (bt_sk(sk)->defer_setup) {
463 struct sock *parent = bt_sk(sk)->parent;
464 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
465 rsp.status = cpu_to_le16(L2CAP_CS_AUTHOR_PEND);
466 parent->sk_data_ready(parent, 0);
467
468 } else {
469 sk->sk_state = BT_CONFIG;
470 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
471 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
472 }
79d554a6
MH
473 } else {
474 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
475 rsp.status = cpu_to_le16(L2CAP_CS_AUTHEN_PEND);
476 }
477
478 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
479 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4e8402a3
MH
480 }
481
482 bh_unlock_sock(sk);
483 }
484
485 read_unlock(&l->lock);
486}
487
488static void l2cap_conn_ready(struct l2cap_conn *conn)
489{
79d554a6
MH
490 struct l2cap_chan_list *l = &conn->chan_list;
491 struct sock *sk;
4e8402a3 492
79d554a6 493 BT_DBG("conn %p", conn);
4e8402a3 494
79d554a6 495 read_lock(&l->lock);
4e8402a3 496
79d554a6
MH
497 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
498 bh_lock_sock(sk);
4e8402a3 499
79d554a6
MH
500 if (sk->sk_type != SOCK_SEQPACKET) {
501 l2cap_sock_clear_timer(sk);
502 sk->sk_state = BT_CONNECTED;
503 sk->sk_state_change(sk);
504 } else if (sk->sk_state == BT_CONNECT)
505 l2cap_do_start(sk);
4e8402a3 506
79d554a6 507 bh_unlock_sock(sk);
4e8402a3 508 }
79d554a6
MH
509
510 read_unlock(&l->lock);
4e8402a3
MH
511}
512
513/* Notify sockets that we cannot guaranty reliability anymore */
514static void l2cap_conn_unreliable(struct l2cap_conn *conn, int err)
515{
516 struct l2cap_chan_list *l = &conn->chan_list;
517 struct sock *sk;
518
519 BT_DBG("conn %p", conn);
520
521 read_lock(&l->lock);
522
523 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2af6b9d5 524 if (l2cap_pi(sk)->force_reliable)
4e8402a3
MH
525 sk->sk_err = err;
526 }
527
528 read_unlock(&l->lock);
529}
530
531static void l2cap_info_timeout(unsigned long arg)
532{
533 struct l2cap_conn *conn = (void *) arg;
534
984947dc 535 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 536 conn->info_ident = 0;
984947dc 537
4e8402a3
MH
538 l2cap_conn_start(conn);
539}
540
1da177e4
LT
541static struct l2cap_conn *l2cap_conn_add(struct hci_conn *hcon, u8 status)
542{
0139418c 543 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 544
0139418c 545 if (conn || status)
1da177e4
LT
546 return conn;
547
0139418c
MH
548 conn = kzalloc(sizeof(struct l2cap_conn), GFP_ATOMIC);
549 if (!conn)
1da177e4 550 return NULL;
1da177e4
LT
551
552 hcon->l2cap_data = conn;
553 conn->hcon = hcon;
554
0139418c
MH
555 BT_DBG("hcon %p conn %p", hcon, conn);
556
1da177e4
LT
557 conn->mtu = hcon->hdev->acl_mtu;
558 conn->src = &hcon->hdev->bdaddr;
559 conn->dst = &hcon->dst;
560
4e8402a3
MH
561 conn->feat_mask = 0;
562
1da177e4
LT
563 spin_lock_init(&conn->lock);
564 rwlock_init(&conn->chan_list.lock);
565
45054dc1
DY
566 setup_timer(&conn->info_timer, l2cap_info_timeout,
567 (unsigned long) conn);
568
2950f21a
MH
569 conn->disc_reason = 0x13;
570
1da177e4
LT
571 return conn;
572}
573
0139418c 574static void l2cap_conn_del(struct hci_conn *hcon, int err)
1da177e4 575{
0139418c 576 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4
LT
577 struct sock *sk;
578
0139418c
MH
579 if (!conn)
580 return;
1da177e4
LT
581
582 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
583
7585b97a 584 kfree_skb(conn->rx_skb);
1da177e4
LT
585
586 /* Kill channels */
587 while ((sk = conn->chan_list.head)) {
588 bh_lock_sock(sk);
589 l2cap_chan_del(sk, err);
590 bh_unlock_sock(sk);
591 l2cap_sock_kill(sk);
592 }
593
8e8440f5
DY
594 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
595 del_timer_sync(&conn->info_timer);
3ab22731 596
1da177e4
LT
597 hcon->l2cap_data = NULL;
598 kfree(conn);
1da177e4
LT
599}
600
601static inline void l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
602{
603 struct l2cap_chan_list *l = &conn->chan_list;
fd1278d7 604 write_lock_bh(&l->lock);
1da177e4 605 __l2cap_chan_add(conn, sk, parent);
fd1278d7 606 write_unlock_bh(&l->lock);
1da177e4
LT
607}
608
1da177e4 609/* ---- Socket interface ---- */
8e036fc3 610static struct sock *__l2cap_get_sock_by_addr(__le16 psm, bdaddr_t *src)
1da177e4
LT
611{
612 struct sock *sk;
613 struct hlist_node *node;
614 sk_for_each(sk, node, &l2cap_sk_list.head)
615 if (l2cap_pi(sk)->sport == psm && !bacmp(&bt_sk(sk)->src, src))
616 goto found;
617 sk = NULL;
618found:
619 return sk;
620}
621
622/* Find socket with psm and source bdaddr.
623 * Returns closest match.
624 */
8e036fc3 625static struct sock *__l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
626{
627 struct sock *sk = NULL, *sk1 = NULL;
628 struct hlist_node *node;
629
630 sk_for_each(sk, node, &l2cap_sk_list.head) {
631 if (state && sk->sk_state != state)
632 continue;
633
634 if (l2cap_pi(sk)->psm == psm) {
635 /* Exact match. */
636 if (!bacmp(&bt_sk(sk)->src, src))
637 break;
638
639 /* Closest match */
640 if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY))
641 sk1 = sk;
642 }
643 }
644 return node ? sk : sk1;
645}
646
647/* Find socket with given address (psm, src).
648 * Returns locked socket */
8e036fc3 649static inline struct sock *l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
650{
651 struct sock *s;
652 read_lock(&l2cap_sk_list.lock);
653 s = __l2cap_get_sock_by_psm(state, psm, src);
af05b30b
GP
654 if (s)
655 bh_lock_sock(s);
1da177e4
LT
656 read_unlock(&l2cap_sk_list.lock);
657 return s;
658}
659
660static void l2cap_sock_destruct(struct sock *sk)
661{
662 BT_DBG("sk %p", sk);
663
664 skb_queue_purge(&sk->sk_receive_queue);
665 skb_queue_purge(&sk->sk_write_queue);
666}
667
668static void l2cap_sock_cleanup_listen(struct sock *parent)
669{
670 struct sock *sk;
671
672 BT_DBG("parent %p", parent);
673
674 /* Close not yet accepted channels */
675 while ((sk = bt_accept_dequeue(parent, NULL)))
676 l2cap_sock_close(sk);
677
b1235d79 678 parent->sk_state = BT_CLOSED;
1da177e4
LT
679 sock_set_flag(parent, SOCK_ZAPPED);
680}
681
682/* Kill socket (only if zapped and orphan)
683 * Must be called on unlocked socket.
684 */
685static void l2cap_sock_kill(struct sock *sk)
686{
687 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
688 return;
689
690 BT_DBG("sk %p state %d", sk, sk->sk_state);
691
692 /* Kill poor orphan */
693 bt_sock_unlink(&l2cap_sk_list, sk);
694 sock_set_flag(sk, SOCK_DEAD);
695 sock_put(sk);
696}
697
698static void __l2cap_sock_close(struct sock *sk, int reason)
699{
700 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
701
702 switch (sk->sk_state) {
703 case BT_LISTEN:
704 l2cap_sock_cleanup_listen(sk);
705 break;
706
707 case BT_CONNECTED:
708 case BT_CONFIG:
1da177e4
LT
709 if (sk->sk_type == SOCK_SEQPACKET) {
710 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1da177e4
LT
711
712 sk->sk_state = BT_DISCONN;
713 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
22121fc9 714 l2cap_send_disconn_req(conn, sk);
b1235d79 715 } else
1da177e4 716 l2cap_chan_del(sk, reason);
1da177e4
LT
717 break;
718
f66dc81f
MH
719 case BT_CONNECT2:
720 if (sk->sk_type == SOCK_SEQPACKET) {
721 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
722 struct l2cap_conn_rsp rsp;
723 __u16 result;
724
725 if (bt_sk(sk)->defer_setup)
726 result = L2CAP_CR_SEC_BLOCK;
727 else
728 result = L2CAP_CR_BAD_PSM;
729
730 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
731 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
732 rsp.result = cpu_to_le16(result);
733 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
734 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
735 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
736 } else
737 l2cap_chan_del(sk, reason);
738 break;
739
1da177e4
LT
740 case BT_CONNECT:
741 case BT_DISCONN:
742 l2cap_chan_del(sk, reason);
743 break;
744
745 default:
746 sock_set_flag(sk, SOCK_ZAPPED);
747 break;
748 }
749}
750
751/* Must be called on unlocked socket. */
752static void l2cap_sock_close(struct sock *sk)
753{
754 l2cap_sock_clear_timer(sk);
755 lock_sock(sk);
756 __l2cap_sock_close(sk, ECONNRESET);
757 release_sock(sk);
758 l2cap_sock_kill(sk);
759}
760
761static void l2cap_sock_init(struct sock *sk, struct sock *parent)
762{
763 struct l2cap_pinfo *pi = l2cap_pi(sk);
764
765 BT_DBG("sk %p", sk);
766
767 if (parent) {
768 sk->sk_type = parent->sk_type;
f66dc81f
MH
769 bt_sk(sk)->defer_setup = bt_sk(parent)->defer_setup;
770
1da177e4
LT
771 pi->imtu = l2cap_pi(parent)->imtu;
772 pi->omtu = l2cap_pi(parent)->omtu;
c6b03cf9
MH
773 pi->mode = l2cap_pi(parent)->mode;
774 pi->fcs = l2cap_pi(parent)->fcs;
2af6b9d5
MH
775 pi->sec_level = l2cap_pi(parent)->sec_level;
776 pi->role_switch = l2cap_pi(parent)->role_switch;
777 pi->force_reliable = l2cap_pi(parent)->force_reliable;
1da177e4
LT
778 } else {
779 pi->imtu = L2CAP_DEFAULT_MTU;
780 pi->omtu = 0;
c6b03cf9
MH
781 pi->mode = L2CAP_MODE_BASIC;
782 pi->fcs = L2CAP_FCS_CRC16;
2af6b9d5
MH
783 pi->sec_level = BT_SECURITY_LOW;
784 pi->role_switch = 0;
785 pi->force_reliable = 0;
1da177e4
LT
786 }
787
788 /* Default config options */
5dee9e7c 789 pi->conf_len = 0;
1da177e4 790 pi->flush_to = L2CAP_DEFAULT_FLUSH_TO;
45054dc1
DY
791 skb_queue_head_init(TX_QUEUE(sk));
792 skb_queue_head_init(SREJ_QUEUE(sk));
793 INIT_LIST_HEAD(SREJ_LIST(sk));
1da177e4
LT
794}
795
796static struct proto l2cap_proto = {
797 .name = "L2CAP",
798 .owner = THIS_MODULE,
799 .obj_size = sizeof(struct l2cap_pinfo)
800};
801
1b8d7ae4 802static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
1da177e4
LT
803{
804 struct sock *sk;
805
6257ff21 806 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1da177e4
LT
807 if (!sk)
808 return NULL;
809
810 sock_init_data(sock, sk);
811 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
812
813 sk->sk_destruct = l2cap_sock_destruct;
4e8402a3 814 sk->sk_sndtimeo = msecs_to_jiffies(L2CAP_CONN_TIMEOUT);
1da177e4
LT
815
816 sock_reset_flag(sk, SOCK_ZAPPED);
817
818 sk->sk_protocol = proto;
b1235d79 819 sk->sk_state = BT_OPEN;
1da177e4 820
b1235d79 821 setup_timer(&sk->sk_timer, l2cap_sock_timeout, (unsigned long) sk);
1da177e4
LT
822
823 bt_sock_link(&l2cap_sk_list, sk);
824 return sk;
825}
826
3f378b68
EP
827static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
828 int kern)
1da177e4
LT
829{
830 struct sock *sk;
831
832 BT_DBG("sock %p", sock);
833
834 sock->state = SS_UNCONNECTED;
835
836 if (sock->type != SOCK_SEQPACKET &&
837 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
838 return -ESOCKTNOSUPPORT;
839
c84b3268 840 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1da177e4
LT
841 return -EPERM;
842
843 sock->ops = &l2cap_sock_ops;
844
1b8d7ae4 845 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1da177e4
LT
846 if (!sk)
847 return -ENOMEM;
848
849 l2cap_sock_init(sk, NULL);
850 return 0;
851}
852
f29972de 853static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
1da177e4 854{
1da177e4 855 struct sock *sk = sock->sk;
f29972de
MH
856 struct sockaddr_l2 la;
857 int len, err = 0;
1da177e4 858
f29972de 859 BT_DBG("sk %p", sk);
1da177e4
LT
860
861 if (!addr || addr->sa_family != AF_BLUETOOTH)
862 return -EINVAL;
863
f29972de
MH
864 memset(&la, 0, sizeof(la));
865 len = min_t(unsigned int, sizeof(la), alen);
866 memcpy(&la, addr, len);
867
2a517ca6
MH
868 if (la.l2_cid)
869 return -EINVAL;
870
1da177e4
LT
871 lock_sock(sk);
872
873 if (sk->sk_state != BT_OPEN) {
874 err = -EBADFD;
875 goto done;
876 }
877
b4324b5d 878 if (la.l2_psm && __le16_to_cpu(la.l2_psm) < 0x1001 &&
847641d7
MH
879 !capable(CAP_NET_BIND_SERVICE)) {
880 err = -EACCES;
881 goto done;
882 }
8e87d142 883
1da177e4
LT
884 write_lock_bh(&l2cap_sk_list.lock);
885
f29972de 886 if (la.l2_psm && __l2cap_get_sock_by_addr(la.l2_psm, &la.l2_bdaddr)) {
1da177e4
LT
887 err = -EADDRINUSE;
888 } else {
889 /* Save source address */
f29972de
MH
890 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
891 l2cap_pi(sk)->psm = la.l2_psm;
892 l2cap_pi(sk)->sport = la.l2_psm;
1da177e4 893 sk->sk_state = BT_BOUND;
2af6b9d5 894
b4324b5d
MH
895 if (__le16_to_cpu(la.l2_psm) == 0x0001 ||
896 __le16_to_cpu(la.l2_psm) == 0x0003)
2af6b9d5 897 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
1da177e4
LT
898 }
899
900 write_unlock_bh(&l2cap_sk_list.lock);
901
902done:
903 release_sock(sk);
904 return err;
905}
906
907static int l2cap_do_connect(struct sock *sk)
908{
909 bdaddr_t *src = &bt_sk(sk)->src;
910 bdaddr_t *dst = &bt_sk(sk)->dst;
911 struct l2cap_conn *conn;
912 struct hci_conn *hcon;
913 struct hci_dev *hdev;
09ab6f4c 914 __u8 auth_type;
44d0e48e 915 int err;
1da177e4 916
f29972de
MH
917 BT_DBG("%s -> %s psm 0x%2.2x", batostr(src), batostr(dst),
918 l2cap_pi(sk)->psm);
1da177e4 919
af05b30b
GP
920 hdev = hci_get_route(dst, src);
921 if (!hdev)
1da177e4
LT
922 return -EHOSTUNREACH;
923
924 hci_dev_lock_bh(hdev);
925
926 err = -ENOMEM;
927
8c1b2355 928 if (sk->sk_type == SOCK_RAW) {
2af6b9d5
MH
929 switch (l2cap_pi(sk)->sec_level) {
930 case BT_SECURITY_HIGH:
8c1b2355 931 auth_type = HCI_AT_DEDICATED_BONDING_MITM;
2af6b9d5
MH
932 break;
933 case BT_SECURITY_MEDIUM:
8c1b2355 934 auth_type = HCI_AT_DEDICATED_BONDING;
2af6b9d5
MH
935 break;
936 default:
09ab6f4c 937 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
938 break;
939 }
8c1b2355 940 } else if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
2af6b9d5 941 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
8c1b2355 942 auth_type = HCI_AT_NO_BONDING_MITM;
09ab6f4c 943 else
8c1b2355 944 auth_type = HCI_AT_NO_BONDING;
435fef20
MH
945
946 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
947 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
8c1b2355 948 } else {
2af6b9d5
MH
949 switch (l2cap_pi(sk)->sec_level) {
950 case BT_SECURITY_HIGH:
8c1b2355 951 auth_type = HCI_AT_GENERAL_BONDING_MITM;
2af6b9d5
MH
952 break;
953 case BT_SECURITY_MEDIUM:
09ab6f4c 954 auth_type = HCI_AT_GENERAL_BONDING;
2af6b9d5
MH
955 break;
956 default:
8c1b2355 957 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
958 break;
959 }
09ab6f4c
MH
960 }
961
2af6b9d5
MH
962 hcon = hci_connect(hdev, ACL_LINK, dst,
963 l2cap_pi(sk)->sec_level, auth_type);
1da177e4
LT
964 if (!hcon)
965 goto done;
966
967 conn = l2cap_conn_add(hcon, 0);
968 if (!conn) {
969 hci_conn_put(hcon);
970 goto done;
971 }
972
973 err = 0;
974
975 /* Update source addr of the socket */
976 bacpy(src, conn->src);
977
978 l2cap_chan_add(conn, sk, NULL);
979
980 sk->sk_state = BT_CONNECT;
981 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
982
983 if (hcon->state == BT_CONNECTED) {
79d554a6 984 if (sk->sk_type != SOCK_SEQPACKET) {
1da177e4
LT
985 l2cap_sock_clear_timer(sk);
986 sk->sk_state = BT_CONNECTED;
79d554a6
MH
987 } else
988 l2cap_do_start(sk);
1da177e4
LT
989 }
990
991done:
992 hci_dev_unlock_bh(hdev);
993 hci_dev_put(hdev);
994 return err;
995}
996
997static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
998{
1da177e4 999 struct sock *sk = sock->sk;
f29972de
MH
1000 struct sockaddr_l2 la;
1001 int len, err = 0;
1da177e4 1002
1da177e4
LT
1003 BT_DBG("sk %p", sk);
1004
6503d961
CG
1005 if (!addr || alen < sizeof(addr->sa_family) ||
1006 addr->sa_family != AF_BLUETOOTH)
2a517ca6 1007 return -EINVAL;
1da177e4 1008
f29972de
MH
1009 memset(&la, 0, sizeof(la));
1010 len = min_t(unsigned int, sizeof(la), alen);
1011 memcpy(&la, addr, len);
1012
2a517ca6
MH
1013 if (la.l2_cid)
1014 return -EINVAL;
1015
1016 lock_sock(sk);
1017
f29972de 1018 if (sk->sk_type == SOCK_SEQPACKET && !la.l2_psm) {
1da177e4
LT
1019 err = -EINVAL;
1020 goto done;
1021 }
1022
c6b03cf9
MH
1023 switch (l2cap_pi(sk)->mode) {
1024 case L2CAP_MODE_BASIC:
1025 break;
1026 case L2CAP_MODE_ERTM:
f2fcfcd6 1027 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1028 if (enable_ertm)
1029 break;
1030 /* fall through */
1031 default:
1032 err = -ENOTSUPP;
1033 goto done;
1034 }
1035
af05b30b 1036 switch (sk->sk_state) {
1da177e4
LT
1037 case BT_CONNECT:
1038 case BT_CONNECT2:
1039 case BT_CONFIG:
1040 /* Already connecting */
1041 goto wait;
1042
1043 case BT_CONNECTED:
1044 /* Already connected */
1045 goto done;
1046
1047 case BT_OPEN:
1048 case BT_BOUND:
1049 /* Can connect */
1050 break;
1051
1052 default:
1053 err = -EBADFD;
1054 goto done;
1055 }
1056
1057 /* Set destination address and psm */
f29972de
MH
1058 bacpy(&bt_sk(sk)->dst, &la.l2_bdaddr);
1059 l2cap_pi(sk)->psm = la.l2_psm;
1da177e4 1060
af05b30b
GP
1061 err = l2cap_do_connect(sk);
1062 if (err)
1da177e4
LT
1063 goto done;
1064
1065wait:
1066 err = bt_sock_wait_state(sk, BT_CONNECTED,
1067 sock_sndtimeo(sk, flags & O_NONBLOCK));
1068done:
1069 release_sock(sk);
1070 return err;
1071}
1072
1073static int l2cap_sock_listen(struct socket *sock, int backlog)
1074{
1075 struct sock *sk = sock->sk;
1076 int err = 0;
1077
1078 BT_DBG("sk %p backlog %d", sk, backlog);
1079
1080 lock_sock(sk);
1081
1082 if (sk->sk_state != BT_BOUND || sock->type != SOCK_SEQPACKET) {
1083 err = -EBADFD;
1084 goto done;
1085 }
1086
c6b03cf9
MH
1087 switch (l2cap_pi(sk)->mode) {
1088 case L2CAP_MODE_BASIC:
1089 break;
1090 case L2CAP_MODE_ERTM:
f2fcfcd6 1091 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1092 if (enable_ertm)
1093 break;
1094 /* fall through */
1095 default:
1096 err = -ENOTSUPP;
1097 goto done;
1098 }
1099
1da177e4
LT
1100 if (!l2cap_pi(sk)->psm) {
1101 bdaddr_t *src = &bt_sk(sk)->src;
1102 u16 psm;
1103
1104 err = -EINVAL;
1105
1106 write_lock_bh(&l2cap_sk_list.lock);
1107
1108 for (psm = 0x1001; psm < 0x1100; psm += 2)
b4324b5d
MH
1109 if (!__l2cap_get_sock_by_addr(cpu_to_le16(psm), src)) {
1110 l2cap_pi(sk)->psm = cpu_to_le16(psm);
1111 l2cap_pi(sk)->sport = cpu_to_le16(psm);
1da177e4
LT
1112 err = 0;
1113 break;
1114 }
1115
1116 write_unlock_bh(&l2cap_sk_list.lock);
1117
1118 if (err < 0)
1119 goto done;
1120 }
1121
1122 sk->sk_max_ack_backlog = backlog;
1123 sk->sk_ack_backlog = 0;
1124 sk->sk_state = BT_LISTEN;
1125
1126done:
1127 release_sock(sk);
1128 return err;
1129}
1130
1131static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
1132{
1133 DECLARE_WAITQUEUE(wait, current);
1134 struct sock *sk = sock->sk, *nsk;
1135 long timeo;
1136 int err = 0;
1137
fcc70d5f 1138 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1139
1140 if (sk->sk_state != BT_LISTEN) {
1141 err = -EBADFD;
1142 goto done;
1143 }
1144
1145 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
1146
1147 BT_DBG("sk %p timeo %ld", sk, timeo);
1148
1149 /* Wait for an incoming connection. (wake-one). */
aa395145 1150 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1da177e4
LT
1151 while (!(nsk = bt_accept_dequeue(sk, newsock))) {
1152 set_current_state(TASK_INTERRUPTIBLE);
1153 if (!timeo) {
1154 err = -EAGAIN;
1155 break;
1156 }
1157
1158 release_sock(sk);
1159 timeo = schedule_timeout(timeo);
fcc70d5f 1160 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1161
1162 if (sk->sk_state != BT_LISTEN) {
1163 err = -EBADFD;
1164 break;
1165 }
1166
1167 if (signal_pending(current)) {
1168 err = sock_intr_errno(timeo);
1169 break;
1170 }
1171 }
1172 set_current_state(TASK_RUNNING);
aa395145 1173 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
1174
1175 if (err)
1176 goto done;
1177
1178 newsock->state = SS_CONNECTED;
1179
1180 BT_DBG("new socket %p", nsk);
1181
1182done:
1183 release_sock(sk);
1184 return err;
1185}
1186
1187static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
1188{
1189 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
1190 struct sock *sk = sock->sk;
1191
1192 BT_DBG("sock %p, sk %p", sock, sk);
1193
1194 addr->sa_family = AF_BLUETOOTH;
1195 *len = sizeof(struct sockaddr_l2);
1196
f29972de
MH
1197 if (peer) {
1198 la->l2_psm = l2cap_pi(sk)->psm;
1da177e4 1199 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
b4324b5d 1200 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->dcid);
f29972de
MH
1201 } else {
1202 la->l2_psm = l2cap_pi(sk)->sport;
1da177e4 1203 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
b4324b5d 1204 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->scid);
f29972de 1205 }
1da177e4 1206
1da177e4
LT
1207 return 0;
1208}
1209
e90bac06
GP
1210static void l2cap_monitor_timeout(unsigned long arg)
1211{
1212 struct sock *sk = (void *) arg;
1213 u16 control;
1214
e686219a 1215 bh_lock_sock(sk);
e90bac06
GP
1216 if (l2cap_pi(sk)->retry_count >= l2cap_pi(sk)->remote_max_tx) {
1217 l2cap_send_disconn_req(l2cap_pi(sk)->conn, sk);
b13f5860 1218 bh_unlock_sock(sk);
e90bac06
GP
1219 return;
1220 }
1221
1222 l2cap_pi(sk)->retry_count++;
1223 __mod_monitor_timer();
1224
1225 control = L2CAP_CTRL_POLL;
7e743090 1226 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1227 bh_unlock_sock(sk);
e90bac06
GP
1228}
1229
1230static void l2cap_retrans_timeout(unsigned long arg)
1231{
1232 struct sock *sk = (void *) arg;
1233 u16 control;
1234
e686219a 1235 bh_lock_sock(sk);
e90bac06
GP
1236 l2cap_pi(sk)->retry_count = 1;
1237 __mod_monitor_timer();
1238
1239 l2cap_pi(sk)->conn_state |= L2CAP_CONN_WAIT_F;
1240
1241 control = L2CAP_CTRL_POLL;
7e743090 1242 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1243 bh_unlock_sock(sk);
e90bac06
GP
1244}
1245
1c2acffb 1246static void l2cap_drop_acked_frames(struct sock *sk)
1da177e4 1247{
1c2acffb 1248 struct sk_buff *skb;
1da177e4 1249
1c2acffb
GP
1250 while ((skb = skb_peek(TX_QUEUE(sk)))) {
1251 if (bt_cb(skb)->tx_seq == l2cap_pi(sk)->expected_ack_seq)
1252 break;
1da177e4 1253
1c2acffb
GP
1254 skb = skb_dequeue(TX_QUEUE(sk));
1255 kfree_skb(skb);
1da177e4 1256
1c2acffb
GP
1257 l2cap_pi(sk)->unacked_frames--;
1258 }
1da177e4 1259
e90bac06
GP
1260 if (!l2cap_pi(sk)->unacked_frames)
1261 del_timer(&l2cap_pi(sk)->retrans_timer);
1262
1c2acffb
GP
1263 return;
1264}
1da177e4 1265
1c2acffb
GP
1266static inline int l2cap_do_send(struct sock *sk, struct sk_buff *skb)
1267{
1268 struct l2cap_pinfo *pi = l2cap_pi(sk);
1269 int err;
1270
1271 BT_DBG("sk %p, skb %p len %d", sk, skb, skb->len);
1da177e4 1272
1c2acffb
GP
1273 err = hci_send_acl(pi->conn->hcon, skb, 0);
1274 if (err < 0)
1275 kfree_skb(skb);
1276
1277 return err;
1278}
1279
6840ed07
GP
1280static int l2cap_streaming_send(struct sock *sk)
1281{
1282 struct sk_buff *skb, *tx_skb;
1283 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1284 u16 control, fcs;
6840ed07
GP
1285 int err;
1286
1287 while ((skb = sk->sk_send_head)) {
1288 tx_skb = skb_clone(skb, GFP_ATOMIC);
1289
1290 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
1291 control |= pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT;
1292 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1293
e8235c6b 1294 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1295 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1296 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1297 }
1298
6840ed07
GP
1299 err = l2cap_do_send(sk, tx_skb);
1300 if (err < 0) {
1301 l2cap_send_disconn_req(pi->conn, sk);
1302 return err;
1303 }
1304
1305 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1306
1307 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1308 sk->sk_send_head = NULL;
1309 else
1310 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
1311
1312 skb = skb_dequeue(TX_QUEUE(sk));
1313 kfree_skb(skb);
1314 }
1315 return 0;
1316}
1317
8f17154f
GP
1318static int l2cap_retransmit_frame(struct sock *sk, u8 tx_seq)
1319{
1320 struct l2cap_pinfo *pi = l2cap_pi(sk);
1321 struct sk_buff *skb, *tx_skb;
1322 u16 control, fcs;
1323 int err;
1324
1325 skb = skb_peek(TX_QUEUE(sk));
1326 do {
1327 if (bt_cb(skb)->tx_seq != tx_seq) {
1328 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1329 break;
1330 skb = skb_queue_next(TX_QUEUE(sk), skb);
1331 continue;
1332 }
1333
1334 if (pi->remote_max_tx &&
1335 bt_cb(skb)->retries == pi->remote_max_tx) {
1336 l2cap_send_disconn_req(pi->conn, sk);
1337 break;
1338 }
1339
1340 tx_skb = skb_clone(skb, GFP_ATOMIC);
1341 bt_cb(skb)->retries++;
1342 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
9f121a5a 1343 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
8f17154f
GP
1344 | (tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1345 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1346
e8235c6b 1347 if (pi->fcs == L2CAP_FCS_CRC16) {
8f17154f
GP
1348 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1349 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1350 }
1351
1352 err = l2cap_do_send(sk, tx_skb);
1353 if (err < 0) {
1354 l2cap_send_disconn_req(pi->conn, sk);
1355 return err;
1356 }
1357 break;
1358 } while(1);
1359 return 0;
1360}
1361
1c2acffb
GP
1362static int l2cap_ertm_send(struct sock *sk)
1363{
1364 struct sk_buff *skb, *tx_skb;
1365 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1366 u16 control, fcs;
1c2acffb
GP
1367 int err;
1368
e90bac06
GP
1369 if (pi->conn_state & L2CAP_CONN_WAIT_F)
1370 return 0;
1371
f64f9e71
JP
1372 while ((skb = sk->sk_send_head) && (!l2cap_tx_window_full(sk)) &&
1373 !(pi->conn_state & L2CAP_CONN_REMOTE_BUSY)) {
1c2acffb 1374
e90bac06
GP
1375 if (pi->remote_max_tx &&
1376 bt_cb(skb)->retries == pi->remote_max_tx) {
1377 l2cap_send_disconn_req(pi->conn, sk);
1378 break;
1379 }
1380
e420aba3
AE
1381 tx_skb = skb_clone(skb, GFP_ATOMIC);
1382
e90bac06
GP
1383 bt_cb(skb)->retries++;
1384
1c2acffb 1385 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
9f121a5a 1386 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
1c2acffb
GP
1387 | (pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1388 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1389
e90bac06 1390
e8235c6b 1391 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1392 fcs = crc16(0, (u8 *)skb->data, tx_skb->len - 2);
1393 put_unaligned_le16(fcs, skb->data + tx_skb->len - 2);
1394 }
1395
1c2acffb
GP
1396 err = l2cap_do_send(sk, tx_skb);
1397 if (err < 0) {
1398 l2cap_send_disconn_req(pi->conn, sk);
1399 return err;
1400 }
e90bac06 1401 __mod_retrans_timer();
1c2acffb
GP
1402
1403 bt_cb(skb)->tx_seq = pi->next_tx_seq;
1404 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1405
1406 pi->unacked_frames++;
1407
1408 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1409 sk->sk_send_head = NULL;
1410 else
1411 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
1412 }
1413
1414 return 0;
1415}
1416
1417static inline int l2cap_skbuff_fromiovec(struct sock *sk, struct msghdr *msg, int len, int count, struct sk_buff *skb)
1418{
1419 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1420 struct sk_buff **frag;
1421 int err, sent = 0;
1da177e4
LT
1422
1423 if (memcpy_fromiovec(skb_put(skb, count), msg->msg_iov, count)) {
1c2acffb 1424 return -EFAULT;
1da177e4
LT
1425 }
1426
1427 sent += count;
1428 len -= count;
1429
1430 /* Continuation fragments (no L2CAP header) */
1431 frag = &skb_shinfo(skb)->frag_list;
1432 while (len) {
1433 count = min_t(unsigned int, conn->mtu, len);
1434
1435 *frag = bt_skb_send_alloc(sk, count, msg->msg_flags & MSG_DONTWAIT, &err);
1436 if (!*frag)
1c2acffb
GP
1437 return -EFAULT;
1438 if (memcpy_fromiovec(skb_put(*frag, count), msg->msg_iov, count))
1439 return -EFAULT;
1da177e4
LT
1440
1441 sent += count;
1442 len -= count;
1443
1444 frag = &(*frag)->next;
1445 }
1da177e4
LT
1446
1447 return sent;
1c2acffb 1448}
1da177e4 1449
1c2acffb
GP
1450static struct sk_buff *l2cap_create_connless_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1451{
1452 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1453 struct sk_buff *skb;
1454 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1455 struct l2cap_hdr *lh;
1456
1457 BT_DBG("sk %p len %d", sk, (int)len);
1458
1459 count = min_t(unsigned int, (conn->mtu - hlen), len);
1460 skb = bt_skb_send_alloc(sk, count + hlen,
1461 msg->msg_flags & MSG_DONTWAIT, &err);
1462 if (!skb)
1463 return ERR_PTR(-ENOMEM);
1464
1465 /* Create L2CAP header */
1466 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1467 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1468 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1469 put_unaligned_le16(l2cap_pi(sk)->psm, skb_put(skb, 2));
1470
1471 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1472 if (unlikely(err < 0)) {
1473 kfree_skb(skb);
1474 return ERR_PTR(err);
1475 }
1476 return skb;
1477}
1478
1479static struct sk_buff *l2cap_create_basic_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1480{
1481 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1482 struct sk_buff *skb;
1483 int err, count, hlen = L2CAP_HDR_SIZE;
1484 struct l2cap_hdr *lh;
1485
1486 BT_DBG("sk %p len %d", sk, (int)len);
1487
1488 count = min_t(unsigned int, (conn->mtu - hlen), len);
1489 skb = bt_skb_send_alloc(sk, count + hlen,
1490 msg->msg_flags & MSG_DONTWAIT, &err);
1491 if (!skb)
1492 return ERR_PTR(-ENOMEM);
1493
1494 /* Create L2CAP header */
1495 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1496 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1497 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1498
1499 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1500 if (unlikely(err < 0)) {
1501 kfree_skb(skb);
1502 return ERR_PTR(err);
1503 }
1504 return skb;
1505}
1506
6840ed07 1507static struct sk_buff *l2cap_create_iframe_pdu(struct sock *sk, struct msghdr *msg, size_t len, u16 control, u16 sdulen)
1c2acffb
GP
1508{
1509 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1510 struct sk_buff *skb;
1511 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1512 struct l2cap_hdr *lh;
1513
1514 BT_DBG("sk %p len %d", sk, (int)len);
1515
c74e560c
GP
1516 if (sdulen)
1517 hlen += 2;
1518
fcc203c3
GP
1519 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1520 hlen += 2;
1521
1c2acffb
GP
1522 count = min_t(unsigned int, (conn->mtu - hlen), len);
1523 skb = bt_skb_send_alloc(sk, count + hlen,
1524 msg->msg_flags & MSG_DONTWAIT, &err);
1525 if (!skb)
1526 return ERR_PTR(-ENOMEM);
1527
1528 /* Create L2CAP header */
1529 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1530 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1531 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1532 put_unaligned_le16(control, skb_put(skb, 2));
c74e560c
GP
1533 if (sdulen)
1534 put_unaligned_le16(sdulen, skb_put(skb, 2));
1c2acffb
GP
1535
1536 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1537 if (unlikely(err < 0)) {
1538 kfree_skb(skb);
1539 return ERR_PTR(err);
1540 }
e90bac06 1541
fcc203c3
GP
1542 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1543 put_unaligned_le16(0, skb_put(skb, 2));
1544
e90bac06 1545 bt_cb(skb)->retries = 0;
1c2acffb 1546 return skb;
1da177e4
LT
1547}
1548
c74e560c
GP
1549static inline int l2cap_sar_segment_sdu(struct sock *sk, struct msghdr *msg, size_t len)
1550{
1551 struct l2cap_pinfo *pi = l2cap_pi(sk);
1552 struct sk_buff *skb;
1553 struct sk_buff_head sar_queue;
1554 u16 control;
1555 size_t size = 0;
1556
1557 __skb_queue_head_init(&sar_queue);
1558 control = L2CAP_SDU_START;
6840ed07 1559 skb = l2cap_create_iframe_pdu(sk, msg, pi->max_pdu_size, control, len);
c74e560c
GP
1560 if (IS_ERR(skb))
1561 return PTR_ERR(skb);
1562
1563 __skb_queue_tail(&sar_queue, skb);
1564 len -= pi->max_pdu_size;
1565 size +=pi->max_pdu_size;
1566 control = 0;
1567
1568 while (len > 0) {
1569 size_t buflen;
1570
1571 if (len > pi->max_pdu_size) {
1572 control |= L2CAP_SDU_CONTINUE;
1573 buflen = pi->max_pdu_size;
1574 } else {
1575 control |= L2CAP_SDU_END;
1576 buflen = len;
1577 }
1578
6840ed07 1579 skb = l2cap_create_iframe_pdu(sk, msg, buflen, control, 0);
c74e560c
GP
1580 if (IS_ERR(skb)) {
1581 skb_queue_purge(&sar_queue);
1582 return PTR_ERR(skb);
1583 }
1584
1585 __skb_queue_tail(&sar_queue, skb);
1586 len -= buflen;
1587 size += buflen;
1588 control = 0;
1589 }
1590 skb_queue_splice_tail(&sar_queue, TX_QUEUE(sk));
1591 if (sk->sk_send_head == NULL)
1592 sk->sk_send_head = sar_queue.next;
1593
1594 return size;
1595}
1596
1da177e4
LT
1597static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
1598{
1599 struct sock *sk = sock->sk;
1c2acffb
GP
1600 struct l2cap_pinfo *pi = l2cap_pi(sk);
1601 struct sk_buff *skb;
1602 u16 control;
1603 int err;
1da177e4
LT
1604
1605 BT_DBG("sock %p, sk %p", sock, sk);
1606
c1cbe4b7
BL
1607 err = sock_error(sk);
1608 if (err)
1609 return err;
1da177e4
LT
1610
1611 if (msg->msg_flags & MSG_OOB)
1612 return -EOPNOTSUPP;
1613
1da177e4
LT
1614 lock_sock(sk);
1615
1c2acffb 1616 if (sk->sk_state != BT_CONNECTED) {
1da177e4 1617 err = -ENOTCONN;
1c2acffb
GP
1618 goto done;
1619 }
1da177e4 1620
1c2acffb
GP
1621 /* Connectionless channel */
1622 if (sk->sk_type == SOCK_DGRAM) {
1623 skb = l2cap_create_connless_pdu(sk, msg, len);
477fffb0
DC
1624 if (IS_ERR(skb))
1625 err = PTR_ERR(skb);
1626 else
1627 err = l2cap_do_send(sk, skb);
1c2acffb
GP
1628 goto done;
1629 }
1630
1631 switch (pi->mode) {
1632 case L2CAP_MODE_BASIC:
c69163e9
GP
1633 /* Check outgoing MTU */
1634 if (len > pi->omtu) {
1635 err = -EINVAL;
1636 goto done;
1637 }
1638
1c2acffb
GP
1639 /* Create a basic PDU */
1640 skb = l2cap_create_basic_pdu(sk, msg, len);
1641 if (IS_ERR(skb)) {
1642 err = PTR_ERR(skb);
1643 goto done;
1644 }
1645
1646 err = l2cap_do_send(sk, skb);
1647 if (!err)
1648 err = len;
1649 break;
1650
1651 case L2CAP_MODE_ERTM:
6840ed07 1652 case L2CAP_MODE_STREAMING:
1c2acffb 1653 /* Entire SDU fits into one PDU */
c74e560c 1654 if (len <= pi->max_pdu_size) {
1c2acffb 1655 control = L2CAP_SDU_UNSEGMENTED;
6840ed07 1656 skb = l2cap_create_iframe_pdu(sk, msg, len, control, 0);
1c2acffb
GP
1657 if (IS_ERR(skb)) {
1658 err = PTR_ERR(skb);
1659 goto done;
1660 }
c74e560c
GP
1661 __skb_queue_tail(TX_QUEUE(sk), skb);
1662 if (sk->sk_send_head == NULL)
1663 sk->sk_send_head = skb;
1c2acffb 1664 } else {
c74e560c
GP
1665 /* Segment SDU into multiples PDUs */
1666 err = l2cap_sar_segment_sdu(sk, msg, len);
1667 if (err < 0)
1668 goto done;
1c2acffb 1669 }
1c2acffb 1670
6840ed07
GP
1671 if (pi->mode == L2CAP_MODE_STREAMING)
1672 err = l2cap_streaming_send(sk);
1673 else
1674 err = l2cap_ertm_send(sk);
1675
1c2acffb
GP
1676 if (!err)
1677 err = len;
1678 break;
1679
1680 default:
1681 BT_DBG("bad state %1.1x", pi->mode);
1682 err = -EINVAL;
1683 }
1684
1685done:
1da177e4
LT
1686 release_sock(sk);
1687 return err;
1688}
1689
f66dc81f
MH
1690static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
1691{
1692 struct sock *sk = sock->sk;
1693
1694 lock_sock(sk);
1695
1696 if (sk->sk_state == BT_CONNECT2 && bt_sk(sk)->defer_setup) {
1697 struct l2cap_conn_rsp rsp;
1698
1699 sk->sk_state = BT_CONFIG;
1700
1701 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1702 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
1703 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
1704 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
1705 l2cap_send_cmd(l2cap_pi(sk)->conn, l2cap_pi(sk)->ident,
1706 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
1707
1708 release_sock(sk);
1709 return 0;
1710 }
1711
1712 release_sock(sk);
1713
1714 return bt_sock_recvmsg(iocb, sock, msg, len, flags);
1715}
1716
b7058842 1717static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
1da177e4
LT
1718{
1719 struct sock *sk = sock->sk;
1720 struct l2cap_options opts;
f29972de 1721 int len, err = 0;
1da177e4
LT
1722 u32 opt;
1723
1724 BT_DBG("sk %p", sk);
1725
1726 lock_sock(sk);
1727
1728 switch (optname) {
1729 case L2CAP_OPTIONS:
0878b666
MH
1730 opts.imtu = l2cap_pi(sk)->imtu;
1731 opts.omtu = l2cap_pi(sk)->omtu;
1732 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1733 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1734 opts.fcs = l2cap_pi(sk)->fcs;
0878b666 1735
1da177e4
LT
1736 len = min_t(unsigned int, sizeof(opts), optlen);
1737 if (copy_from_user((char *) &opts, optval, len)) {
1738 err = -EFAULT;
1739 break;
1740 }
0878b666 1741
c6b03cf9
MH
1742 l2cap_pi(sk)->imtu = opts.imtu;
1743 l2cap_pi(sk)->omtu = opts.omtu;
1744 l2cap_pi(sk)->mode = opts.mode;
fcc203c3 1745 l2cap_pi(sk)->fcs = opts.fcs;
1da177e4
LT
1746 break;
1747
1748 case L2CAP_LM:
1749 if (get_user(opt, (u32 __user *) optval)) {
1750 err = -EFAULT;
1751 break;
1752 }
1753
2af6b9d5
MH
1754 if (opt & L2CAP_LM_AUTH)
1755 l2cap_pi(sk)->sec_level = BT_SECURITY_LOW;
1756 if (opt & L2CAP_LM_ENCRYPT)
1757 l2cap_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
1758 if (opt & L2CAP_LM_SECURE)
1759 l2cap_pi(sk)->sec_level = BT_SECURITY_HIGH;
1760
1761 l2cap_pi(sk)->role_switch = (opt & L2CAP_LM_MASTER);
1762 l2cap_pi(sk)->force_reliable = (opt & L2CAP_LM_RELIABLE);
1da177e4
LT
1763 break;
1764
1765 default:
1766 err = -ENOPROTOOPT;
1767 break;
1768 }
1769
1770 release_sock(sk);
1771 return err;
1772}
1773
b7058842 1774static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
d58daf42
MH
1775{
1776 struct sock *sk = sock->sk;
2af6b9d5
MH
1777 struct bt_security sec;
1778 int len, err = 0;
f66dc81f 1779 u32 opt;
d58daf42
MH
1780
1781 BT_DBG("sk %p", sk);
1782
1783 if (level == SOL_L2CAP)
1784 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
1785
0588d94f
MH
1786 if (level != SOL_BLUETOOTH)
1787 return -ENOPROTOOPT;
1788
d58daf42
MH
1789 lock_sock(sk);
1790
1791 switch (optname) {
2af6b9d5 1792 case BT_SECURITY:
2526d3d8 1793 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1794 err = -EINVAL;
1795 break;
1796 }
1797
2af6b9d5
MH
1798 sec.level = BT_SECURITY_LOW;
1799
1800 len = min_t(unsigned int, sizeof(sec), optlen);
1801 if (copy_from_user((char *) &sec, optval, len)) {
1802 err = -EFAULT;
1803 break;
1804 }
1805
1806 if (sec.level < BT_SECURITY_LOW ||
1807 sec.level > BT_SECURITY_HIGH) {
1808 err = -EINVAL;
1809 break;
1810 }
1811
1812 l2cap_pi(sk)->sec_level = sec.level;
1813 break;
1814
f66dc81f
MH
1815 case BT_DEFER_SETUP:
1816 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1817 err = -EINVAL;
1818 break;
1819 }
1820
1821 if (get_user(opt, (u32 __user *) optval)) {
1822 err = -EFAULT;
1823 break;
1824 }
1825
1826 bt_sk(sk)->defer_setup = opt;
1827 break;
1828
d58daf42
MH
1829 default:
1830 err = -ENOPROTOOPT;
1831 break;
1832 }
1833
1834 release_sock(sk);
1835 return err;
1836}
1837
1838static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
1da177e4
LT
1839{
1840 struct sock *sk = sock->sk;
1841 struct l2cap_options opts;
1842 struct l2cap_conninfo cinfo;
1843 int len, err = 0;
2af6b9d5 1844 u32 opt;
1da177e4
LT
1845
1846 BT_DBG("sk %p", sk);
1847
1848 if (get_user(len, optlen))
1849 return -EFAULT;
1850
1851 lock_sock(sk);
1852
1853 switch (optname) {
1854 case L2CAP_OPTIONS:
1855 opts.imtu = l2cap_pi(sk)->imtu;
1856 opts.omtu = l2cap_pi(sk)->omtu;
1857 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1858 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1859 opts.fcs = l2cap_pi(sk)->fcs;
1da177e4
LT
1860
1861 len = min_t(unsigned int, len, sizeof(opts));
1862 if (copy_to_user(optval, (char *) &opts, len))
1863 err = -EFAULT;
1864
1865 break;
1866
1867 case L2CAP_LM:
2af6b9d5
MH
1868 switch (l2cap_pi(sk)->sec_level) {
1869 case BT_SECURITY_LOW:
1870 opt = L2CAP_LM_AUTH;
1871 break;
1872 case BT_SECURITY_MEDIUM:
1873 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
1874 break;
1875 case BT_SECURITY_HIGH:
1876 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
1877 L2CAP_LM_SECURE;
1878 break;
1879 default:
1880 opt = 0;
1881 break;
1882 }
1883
1884 if (l2cap_pi(sk)->role_switch)
1885 opt |= L2CAP_LM_MASTER;
1886
1887 if (l2cap_pi(sk)->force_reliable)
1888 opt |= L2CAP_LM_RELIABLE;
1889
1890 if (put_user(opt, (u32 __user *) optval))
1da177e4
LT
1891 err = -EFAULT;
1892 break;
1893
1894 case L2CAP_CONNINFO:
f66dc81f
MH
1895 if (sk->sk_state != BT_CONNECTED &&
1896 !(sk->sk_state == BT_CONNECT2 &&
1897 bt_sk(sk)->defer_setup)) {
1da177e4
LT
1898 err = -ENOTCONN;
1899 break;
1900 }
1901
1902 cinfo.hci_handle = l2cap_pi(sk)->conn->hcon->handle;
1903 memcpy(cinfo.dev_class, l2cap_pi(sk)->conn->hcon->dev_class, 3);
1904
1905 len = min_t(unsigned int, len, sizeof(cinfo));
1906 if (copy_to_user(optval, (char *) &cinfo, len))
1907 err = -EFAULT;
1908
1909 break;
1910
1911 default:
1912 err = -ENOPROTOOPT;
1913 break;
1914 }
1915
1916 release_sock(sk);
1917 return err;
1918}
1919
d58daf42
MH
1920static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
1921{
1922 struct sock *sk = sock->sk;
2af6b9d5 1923 struct bt_security sec;
d58daf42
MH
1924 int len, err = 0;
1925
1926 BT_DBG("sk %p", sk);
1927
1928 if (level == SOL_L2CAP)
1929 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
1930
0588d94f
MH
1931 if (level != SOL_BLUETOOTH)
1932 return -ENOPROTOOPT;
1933
d58daf42
MH
1934 if (get_user(len, optlen))
1935 return -EFAULT;
1936
1937 lock_sock(sk);
1938
1939 switch (optname) {
2af6b9d5 1940 case BT_SECURITY:
2526d3d8 1941 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1942 err = -EINVAL;
1943 break;
1944 }
1945
2af6b9d5
MH
1946 sec.level = l2cap_pi(sk)->sec_level;
1947
1948 len = min_t(unsigned int, len, sizeof(sec));
1949 if (copy_to_user(optval, (char *) &sec, len))
1950 err = -EFAULT;
1951
1952 break;
1953
f66dc81f
MH
1954 case BT_DEFER_SETUP:
1955 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1956 err = -EINVAL;
1957 break;
1958 }
1959
1960 if (put_user(bt_sk(sk)->defer_setup, (u32 __user *) optval))
1961 err = -EFAULT;
1962
1963 break;
1964
d58daf42
MH
1965 default:
1966 err = -ENOPROTOOPT;
1967 break;
1968 }
1969
1970 release_sock(sk);
1971 return err;
1972}
1973
1da177e4
LT
1974static int l2cap_sock_shutdown(struct socket *sock, int how)
1975{
1976 struct sock *sk = sock->sk;
1977 int err = 0;
1978
1979 BT_DBG("sock %p, sk %p", sock, sk);
1980
1981 if (!sk)
1982 return 0;
1983
1984 lock_sock(sk);
1985 if (!sk->sk_shutdown) {
1986 sk->sk_shutdown = SHUTDOWN_MASK;
1987 l2cap_sock_clear_timer(sk);
1988 __l2cap_sock_close(sk, 0);
1989
1990 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
b1235d79
MH
1991 err = bt_sock_wait_state(sk, BT_CLOSED,
1992 sk->sk_lingertime);
1da177e4
LT
1993 }
1994 release_sock(sk);
1995 return err;
1996}
1997
1998static int l2cap_sock_release(struct socket *sock)
1999{
2000 struct sock *sk = sock->sk;
2001 int err;
2002
2003 BT_DBG("sock %p, sk %p", sock, sk);
2004
2005 if (!sk)
2006 return 0;
2007
2008 err = l2cap_sock_shutdown(sock, 2);
2009
2010 sock_orphan(sk);
2011 l2cap_sock_kill(sk);
2012 return err;
2013}
2014
1da177e4
LT
2015static void l2cap_chan_ready(struct sock *sk)
2016{
2017 struct sock *parent = bt_sk(sk)->parent;
2018
2019 BT_DBG("sk %p, parent %p", sk, parent);
2020
2021 l2cap_pi(sk)->conf_state = 0;
2022 l2cap_sock_clear_timer(sk);
2023
2024 if (!parent) {
2025 /* Outgoing channel.
2026 * Wake up socket sleeping on connect.
2027 */
2028 sk->sk_state = BT_CONNECTED;
2029 sk->sk_state_change(sk);
2030 } else {
2031 /* Incoming channel.
2032 * Wake up socket sleeping on accept.
2033 */
2034 parent->sk_data_ready(parent, 0);
2035 }
2036}
2037
2038/* Copy frame to all raw sockets on that connection */
2039static void l2cap_raw_recv(struct l2cap_conn *conn, struct sk_buff *skb)
2040{
2041 struct l2cap_chan_list *l = &conn->chan_list;
2042 struct sk_buff *nskb;
af05b30b 2043 struct sock *sk;
1da177e4
LT
2044
2045 BT_DBG("conn %p", conn);
2046
2047 read_lock(&l->lock);
2048 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2049 if (sk->sk_type != SOCK_RAW)
2050 continue;
2051
2052 /* Don't send frame to the socket it came from */
2053 if (skb->sk == sk)
2054 continue;
af05b30b
GP
2055 nskb = skb_clone(skb, GFP_ATOMIC);
2056 if (!nskb)
1da177e4
LT
2057 continue;
2058
2059 if (sock_queue_rcv_skb(sk, nskb))
2060 kfree_skb(nskb);
2061 }
2062 read_unlock(&l->lock);
2063}
2064
2065/* ---- L2CAP signalling commands ---- */
2066static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
2067 u8 code, u8 ident, u16 dlen, void *data)
2068{
2069 struct sk_buff *skb, **frag;
2070 struct l2cap_cmd_hdr *cmd;
2071 struct l2cap_hdr *lh;
2072 int len, count;
2073
af05b30b
GP
2074 BT_DBG("conn %p, code 0x%2.2x, ident 0x%2.2x, len %d",
2075 conn, code, ident, dlen);
1da177e4
LT
2076
2077 len = L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE + dlen;
2078 count = min_t(unsigned int, conn->mtu, len);
2079
2080 skb = bt_skb_alloc(count, GFP_ATOMIC);
2081 if (!skb)
2082 return NULL;
2083
2084 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
aca3192c 2085 lh->len = cpu_to_le16(L2CAP_CMD_HDR_SIZE + dlen);
8db4dc46 2086 lh->cid = cpu_to_le16(L2CAP_CID_SIGNALING);
1da177e4
LT
2087
2088 cmd = (struct l2cap_cmd_hdr *) skb_put(skb, L2CAP_CMD_HDR_SIZE);
2089 cmd->code = code;
2090 cmd->ident = ident;
aca3192c 2091 cmd->len = cpu_to_le16(dlen);
1da177e4
LT
2092
2093 if (dlen) {
2094 count -= L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE;
2095 memcpy(skb_put(skb, count), data, count);
2096 data += count;
2097 }
2098
2099 len -= skb->len;
2100
2101 /* Continuation fragments (no L2CAP header) */
2102 frag = &skb_shinfo(skb)->frag_list;
2103 while (len) {
2104 count = min_t(unsigned int, conn->mtu, len);
2105
2106 *frag = bt_skb_alloc(count, GFP_ATOMIC);
2107 if (!*frag)
2108 goto fail;
2109
2110 memcpy(skb_put(*frag, count), data, count);
2111
2112 len -= count;
2113 data += count;
2114
2115 frag = &(*frag)->next;
2116 }
2117
2118 return skb;
2119
2120fail:
2121 kfree_skb(skb);
2122 return NULL;
2123}
2124
2125static inline int l2cap_get_conf_opt(void **ptr, int *type, int *olen, unsigned long *val)
2126{
2127 struct l2cap_conf_opt *opt = *ptr;
2128 int len;
2129
2130 len = L2CAP_CONF_OPT_SIZE + opt->len;
2131 *ptr += len;
2132
2133 *type = opt->type;
2134 *olen = opt->len;
2135
2136 switch (opt->len) {
2137 case 1:
2138 *val = *((u8 *) opt->val);
2139 break;
2140
2141 case 2:
861d6882 2142 *val = __le16_to_cpu(*((__le16 *) opt->val));
1da177e4
LT
2143 break;
2144
2145 case 4:
861d6882 2146 *val = __le32_to_cpu(*((__le32 *) opt->val));
1da177e4
LT
2147 break;
2148
2149 default:
2150 *val = (unsigned long) opt->val;
2151 break;
2152 }
2153
2154 BT_DBG("type 0x%2.2x len %d val 0x%lx", *type, opt->len, *val);
2155 return len;
2156}
2157
1da177e4
LT
2158static void l2cap_add_conf_opt(void **ptr, u8 type, u8 len, unsigned long val)
2159{
2160 struct l2cap_conf_opt *opt = *ptr;
2161
2162 BT_DBG("type 0x%2.2x len %d val 0x%lx", type, len, val);
2163
2164 opt->type = type;
2165 opt->len = len;
2166
2167 switch (len) {
2168 case 1:
2169 *((u8 *) opt->val) = val;
2170 break;
2171
2172 case 2:
8e036fc3 2173 *((__le16 *) opt->val) = cpu_to_le16(val);
1da177e4
LT
2174 break;
2175
2176 case 4:
8e036fc3 2177 *((__le32 *) opt->val) = cpu_to_le32(val);
1da177e4
LT
2178 break;
2179
2180 default:
2181 memcpy(opt->val, (void *) val, len);
2182 break;
2183 }
2184
2185 *ptr += L2CAP_CONF_OPT_SIZE + len;
2186}
2187
0565c1c2
GP
2188static inline void l2cap_ertm_init(struct sock *sk)
2189{
2190 l2cap_pi(sk)->expected_ack_seq = 0;
2191 l2cap_pi(sk)->unacked_frames = 0;
2192 l2cap_pi(sk)->buffer_seq = 0;
2193 l2cap_pi(sk)->num_to_ack = 0;
2194
2195 setup_timer(&l2cap_pi(sk)->retrans_timer,
2196 l2cap_retrans_timeout, (unsigned long) sk);
2197 setup_timer(&l2cap_pi(sk)->monitor_timer,
2198 l2cap_monitor_timeout, (unsigned long) sk);
2199
2200 __skb_queue_head_init(SREJ_QUEUE(sk));
2201}
2202
f2fcfcd6
GP
2203static int l2cap_mode_supported(__u8 mode, __u32 feat_mask)
2204{
2205 u32 local_feat_mask = l2cap_feat_mask;
2206 if (enable_ertm)
6840ed07 2207 local_feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING;
f2fcfcd6
GP
2208
2209 switch (mode) {
2210 case L2CAP_MODE_ERTM:
2211 return L2CAP_FEAT_ERTM & feat_mask & local_feat_mask;
2212 case L2CAP_MODE_STREAMING:
2213 return L2CAP_FEAT_STREAMING & feat_mask & local_feat_mask;
2214 default:
2215 return 0x00;
2216 }
2217}
2218
2219static inline __u8 l2cap_select_mode(__u8 mode, __u16 remote_feat_mask)
2220{
2221 switch (mode) {
2222 case L2CAP_MODE_STREAMING:
2223 case L2CAP_MODE_ERTM:
2224 if (l2cap_mode_supported(mode, remote_feat_mask))
2225 return mode;
2226 /* fall through */
2227 default:
2228 return L2CAP_MODE_BASIC;
2229 }
2230}
2231
1da177e4
LT
2232static int l2cap_build_conf_req(struct sock *sk, void *data)
2233{
2234 struct l2cap_pinfo *pi = l2cap_pi(sk);
2235 struct l2cap_conf_req *req = data;
a0e55a32 2236 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
1da177e4
LT
2237 void *ptr = req->data;
2238
2239 BT_DBG("sk %p", sk);
2240
f2fcfcd6
GP
2241 if (pi->num_conf_req || pi->num_conf_rsp)
2242 goto done;
2243
2244 switch (pi->mode) {
2245 case L2CAP_MODE_STREAMING:
2246 case L2CAP_MODE_ERTM:
2247 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
22121fc9
GP
2248 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2249 l2cap_send_disconn_req(pi->conn, sk);
f2fcfcd6
GP
2250 break;
2251 default:
2252 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2253 break;
2254 }
2255
2256done:
65c7c491
MH
2257 switch (pi->mode) {
2258 case L2CAP_MODE_BASIC:
2259 if (pi->imtu != L2CAP_DEFAULT_MTU)
2260 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->imtu);
2261 break;
2262
2263 case L2CAP_MODE_ERTM:
2264 rfc.mode = L2CAP_MODE_ERTM;
f2fcfcd6 2265 rfc.txwin_size = L2CAP_DEFAULT_TX_WINDOW;
5fbcd3d1 2266 rfc.max_transmit = max_transmit;
f2fcfcd6
GP
2267 rfc.retrans_timeout = 0;
2268 rfc.monitor_timeout = 0;
c74e560c 2269 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091
GP
2270 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
2271 rfc.max_pdu_size = pi->conn->mtu - 10;
f2fcfcd6
GP
2272
2273 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2274 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2275
2276 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2277 break;
2278
2279 if (pi->fcs == L2CAP_FCS_NONE ||
2280 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2281 pi->fcs = L2CAP_FCS_NONE;
2282 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2283 }
f2fcfcd6
GP
2284 break;
2285
2286 case L2CAP_MODE_STREAMING:
2287 rfc.mode = L2CAP_MODE_STREAMING;
2288 rfc.txwin_size = 0;
2289 rfc.max_transmit = 0;
2290 rfc.retrans_timeout = 0;
2291 rfc.monitor_timeout = 0;
c74e560c 2292 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091
GP
2293 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
2294 rfc.max_pdu_size = pi->conn->mtu - 10;
65c7c491
MH
2295
2296 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2297 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2298
2299 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2300 break;
2301
2302 if (pi->fcs == L2CAP_FCS_NONE ||
2303 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2304 pi->fcs = L2CAP_FCS_NONE;
2305 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2306 }
65c7c491
MH
2307 break;
2308 }
1da177e4
LT
2309
2310 /* FIXME: Need actual value of the flush timeout */
2311 //if (flush_to != L2CAP_DEFAULT_FLUSH_TO)
2312 // l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO, 2, pi->flush_to);
2313
aca3192c
YH
2314 req->dcid = cpu_to_le16(pi->dcid);
2315 req->flags = cpu_to_le16(0);
1da177e4
LT
2316
2317 return ptr - data;
2318}
2319
5dee9e7c 2320static int l2cap_parse_conf_req(struct sock *sk, void *data)
1da177e4
LT
2321{
2322 struct l2cap_pinfo *pi = l2cap_pi(sk);
5dee9e7c
MH
2323 struct l2cap_conf_rsp *rsp = data;
2324 void *ptr = rsp->data;
2325 void *req = pi->conf_req;
2326 int len = pi->conf_len;
2327 int type, hint, olen;
2328 unsigned long val;
6464f35f 2329 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
861d6882 2330 u16 mtu = L2CAP_DEFAULT_MTU;
5dee9e7c 2331 u16 result = L2CAP_CONF_SUCCESS;
1da177e4 2332
5dee9e7c 2333 BT_DBG("sk %p", sk);
820ae1b8 2334
5dee9e7c
MH
2335 while (len >= L2CAP_CONF_OPT_SIZE) {
2336 len -= l2cap_get_conf_opt(&req, &type, &olen, &val);
1da177e4 2337
589d2746 2338 hint = type & L2CAP_CONF_HINT;
47ec1dcd 2339 type &= L2CAP_CONF_MASK;
5dee9e7c
MH
2340
2341 switch (type) {
2342 case L2CAP_CONF_MTU:
861d6882 2343 mtu = val;
5dee9e7c
MH
2344 break;
2345
2346 case L2CAP_CONF_FLUSH_TO:
2347 pi->flush_to = val;
2348 break;
2349
2350 case L2CAP_CONF_QOS:
2351 break;
2352
6464f35f
MH
2353 case L2CAP_CONF_RFC:
2354 if (olen == sizeof(rfc))
2355 memcpy(&rfc, (void *) val, olen);
2356 break;
2357
fcc203c3
GP
2358 case L2CAP_CONF_FCS:
2359 if (val == L2CAP_FCS_NONE)
2360 pi->conf_state |= L2CAP_CONF_NO_FCS_RECV;
2361
2362 break;
2363
5dee9e7c
MH
2364 default:
2365 if (hint)
2366 break;
2367
2368 result = L2CAP_CONF_UNKNOWN;
2369 *((u8 *) ptr++) = type;
2370 break;
2371 }
2372 }
2373
f2fcfcd6
GP
2374 if (pi->num_conf_rsp || pi->num_conf_req)
2375 goto done;
2376
2377 switch (pi->mode) {
2378 case L2CAP_MODE_STREAMING:
2379 case L2CAP_MODE_ERTM:
2380 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
2381 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2382 return -ECONNREFUSED;
2383 break;
2384 default:
2385 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2386 break;
2387 }
2388
2389done:
2390 if (pi->mode != rfc.mode) {
2391 result = L2CAP_CONF_UNACCEPT;
2392 rfc.mode = pi->mode;
2393
2394 if (pi->num_conf_rsp == 1)
2395 return -ECONNREFUSED;
2396
2397 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2398 sizeof(rfc), (unsigned long) &rfc);
2399 }
2400
2401
5dee9e7c
MH
2402 if (result == L2CAP_CONF_SUCCESS) {
2403 /* Configure output options and let the other side know
2404 * which ones we don't like. */
2405
f2fcfcd6
GP
2406 if (mtu < L2CAP_DEFAULT_MIN_MTU)
2407 result = L2CAP_CONF_UNACCEPT;
2408 else {
2409 pi->omtu = mtu;
2410 pi->conf_state |= L2CAP_CONF_MTU_DONE;
2411 }
2412 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
6464f35f 2413
f2fcfcd6
GP
2414 switch (rfc.mode) {
2415 case L2CAP_MODE_BASIC:
2416 pi->fcs = L2CAP_FCS_NONE;
2417 pi->conf_state |= L2CAP_CONF_MODE_DONE;
2418 break;
2419
2420 case L2CAP_MODE_ERTM:
2421 pi->remote_tx_win = rfc.txwin_size;
2422 pi->remote_max_tx = rfc.max_transmit;
2423 pi->max_pdu_size = rfc.max_pdu_size;
2424
2425 rfc.retrans_timeout = L2CAP_DEFAULT_RETRANS_TO;
2426 rfc.monitor_timeout = L2CAP_DEFAULT_MONITOR_TO;
2427
2428 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2429
2430 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2431 sizeof(rfc), (unsigned long) &rfc);
2432
f2fcfcd6
GP
2433 break;
2434
2435 case L2CAP_MODE_STREAMING:
2436 pi->remote_tx_win = rfc.txwin_size;
2437 pi->max_pdu_size = rfc.max_pdu_size;
2438
2439 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2440
2441 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2442 sizeof(rfc), (unsigned long) &rfc);
2443
f2fcfcd6
GP
2444 break;
2445
2446 default:
5dee9e7c 2447 result = L2CAP_CONF_UNACCEPT;
5dee9e7c 2448
6464f35f 2449 memset(&rfc, 0, sizeof(rfc));
f2fcfcd6
GP
2450 rfc.mode = pi->mode;
2451 }
6464f35f 2452
f2fcfcd6
GP
2453 if (result == L2CAP_CONF_SUCCESS)
2454 pi->conf_state |= L2CAP_CONF_OUTPUT_DONE;
2455 }
5dee9e7c
MH
2456 rsp->scid = cpu_to_le16(pi->dcid);
2457 rsp->result = cpu_to_le16(result);
2458 rsp->flags = cpu_to_le16(0x0000);
2459
2460 return ptr - data;
1da177e4
LT
2461}
2462
f2fcfcd6
GP
2463static int l2cap_parse_conf_rsp(struct sock *sk, void *rsp, int len, void *data, u16 *result)
2464{
2465 struct l2cap_pinfo *pi = l2cap_pi(sk);
2466 struct l2cap_conf_req *req = data;
2467 void *ptr = req->data;
2468 int type, olen;
2469 unsigned long val;
2470 struct l2cap_conf_rfc rfc;
2471
2472 BT_DBG("sk %p, rsp %p, len %d, req %p", sk, rsp, len, data);
2473
2474 while (len >= L2CAP_CONF_OPT_SIZE) {
2475 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2476
2477 switch (type) {
2478 case L2CAP_CONF_MTU:
2479 if (val < L2CAP_DEFAULT_MIN_MTU) {
2480 *result = L2CAP_CONF_UNACCEPT;
2481 pi->omtu = L2CAP_DEFAULT_MIN_MTU;
2482 } else
2483 pi->omtu = val;
2484 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
2485 break;
2486
2487 case L2CAP_CONF_FLUSH_TO:
2488 pi->flush_to = val;
2489 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO,
2490 2, pi->flush_to);
2491 break;
2492
2493 case L2CAP_CONF_RFC:
2494 if (olen == sizeof(rfc))
2495 memcpy(&rfc, (void *)val, olen);
2496
2497 if ((pi->conf_state & L2CAP_CONF_STATE2_DEVICE) &&
2498 rfc.mode != pi->mode)
2499 return -ECONNREFUSED;
2500
2501 pi->mode = rfc.mode;
2502 pi->fcs = 0;
2503
2504 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2505 sizeof(rfc), (unsigned long) &rfc);
2506 break;
2507 }
2508 }
2509
2510 if (*result == L2CAP_CONF_SUCCESS) {
2511 switch (rfc.mode) {
2512 case L2CAP_MODE_ERTM:
2513 pi->remote_tx_win = rfc.txwin_size;
2514 pi->retrans_timeout = rfc.retrans_timeout;
2515 pi->monitor_timeout = rfc.monitor_timeout;
2516 pi->max_pdu_size = le16_to_cpu(rfc.max_pdu_size);
2517 break;
2518 case L2CAP_MODE_STREAMING:
2519 pi->max_pdu_size = le16_to_cpu(rfc.max_pdu_size);
2520 break;
2521 }
2522 }
2523
2524 req->dcid = cpu_to_le16(pi->dcid);
2525 req->flags = cpu_to_le16(0x0000);
2526
2527 return ptr - data;
2528}
2529
5dee9e7c 2530static int l2cap_build_conf_rsp(struct sock *sk, void *data, u16 result, u16 flags)
1da177e4
LT
2531{
2532 struct l2cap_conf_rsp *rsp = data;
2533 void *ptr = rsp->data;
1da177e4 2534
5dee9e7c 2535 BT_DBG("sk %p", sk);
1da177e4 2536
aca3192c 2537 rsp->scid = cpu_to_le16(l2cap_pi(sk)->dcid);
5dee9e7c 2538 rsp->result = cpu_to_le16(result);
aca3192c 2539 rsp->flags = cpu_to_le16(flags);
1da177e4
LT
2540
2541 return ptr - data;
2542}
2543
4e8402a3
MH
2544static inline int l2cap_command_rej(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2545{
2546 struct l2cap_cmd_rej *rej = (struct l2cap_cmd_rej *) data;
2547
2548 if (rej->reason != 0x0000)
2549 return 0;
2550
2551 if ((conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) &&
2552 cmd->ident == conn->info_ident) {
4e8402a3 2553 del_timer(&conn->info_timer);
984947dc
MH
2554
2555 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 2556 conn->info_ident = 0;
984947dc 2557
4e8402a3
MH
2558 l2cap_conn_start(conn);
2559 }
2560
2561 return 0;
2562}
2563
1da177e4
LT
2564static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2565{
2566 struct l2cap_chan_list *list = &conn->chan_list;
2567 struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
2568 struct l2cap_conn_rsp rsp;
2569 struct sock *sk, *parent;
e7c29cb1 2570 int result, status = L2CAP_CS_NO_INFO;
1da177e4
LT
2571
2572 u16 dcid = 0, scid = __le16_to_cpu(req->scid);
e7c29cb1 2573 __le16 psm = req->psm;
1da177e4
LT
2574
2575 BT_DBG("psm 0x%2.2x scid 0x%4.4x", psm, scid);
2576
2577 /* Check if we have socket listening on psm */
2578 parent = l2cap_get_sock_by_psm(BT_LISTEN, psm, conn->src);
2579 if (!parent) {
2580 result = L2CAP_CR_BAD_PSM;
2581 goto sendresp;
2582 }
2583
e7c29cb1
MH
2584 /* Check if the ACL is secure enough (if not SDP) */
2585 if (psm != cpu_to_le16(0x0001) &&
2586 !hci_conn_check_link_mode(conn->hcon)) {
2950f21a 2587 conn->disc_reason = 0x05;
e7c29cb1
MH
2588 result = L2CAP_CR_SEC_BLOCK;
2589 goto response;
2590 }
2591
1da177e4
LT
2592 result = L2CAP_CR_NO_MEM;
2593
2594 /* Check for backlog size */
2595 if (sk_acceptq_is_full(parent)) {
8e87d142 2596 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1da177e4
LT
2597 goto response;
2598 }
2599
3b1e0a65 2600 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP, GFP_ATOMIC);
1da177e4
LT
2601 if (!sk)
2602 goto response;
2603
fd1278d7 2604 write_lock_bh(&list->lock);
1da177e4
LT
2605
2606 /* Check if we already have channel with that dcid */
2607 if (__l2cap_get_chan_by_dcid(list, scid)) {
fd1278d7 2608 write_unlock_bh(&list->lock);
1da177e4
LT
2609 sock_set_flag(sk, SOCK_ZAPPED);
2610 l2cap_sock_kill(sk);
2611 goto response;
2612 }
2613
2614 hci_conn_hold(conn->hcon);
2615
2616 l2cap_sock_init(sk, parent);
2617 bacpy(&bt_sk(sk)->src, conn->src);
2618 bacpy(&bt_sk(sk)->dst, conn->dst);
2619 l2cap_pi(sk)->psm = psm;
2620 l2cap_pi(sk)->dcid = scid;
2621
2622 __l2cap_chan_add(conn, sk, parent);
2623 dcid = l2cap_pi(sk)->scid;
2624
2625 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
2626
1da177e4
LT
2627 l2cap_pi(sk)->ident = cmd->ident;
2628
984947dc 2629 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE) {
2af6b9d5 2630 if (l2cap_check_security(sk)) {
f66dc81f
MH
2631 if (bt_sk(sk)->defer_setup) {
2632 sk->sk_state = BT_CONNECT2;
2633 result = L2CAP_CR_PEND;
2634 status = L2CAP_CS_AUTHOR_PEND;
2635 parent->sk_data_ready(parent, 0);
2636 } else {
2637 sk->sk_state = BT_CONFIG;
2638 result = L2CAP_CR_SUCCESS;
2639 status = L2CAP_CS_NO_INFO;
2640 }
79d554a6
MH
2641 } else {
2642 sk->sk_state = BT_CONNECT2;
2643 result = L2CAP_CR_PEND;
2644 status = L2CAP_CS_AUTHEN_PEND;
2645 }
2646 } else {
2647 sk->sk_state = BT_CONNECT2;
2648 result = L2CAP_CR_PEND;
2649 status = L2CAP_CS_NO_INFO;
1da177e4
LT
2650 }
2651
fd1278d7 2652 write_unlock_bh(&list->lock);
1da177e4
LT
2653
2654response:
2655 bh_unlock_sock(parent);
2656
2657sendresp:
aca3192c
YH
2658 rsp.scid = cpu_to_le16(scid);
2659 rsp.dcid = cpu_to_le16(dcid);
2660 rsp.result = cpu_to_le16(result);
2661 rsp.status = cpu_to_le16(status);
1da177e4 2662 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONN_RSP, sizeof(rsp), &rsp);
79d554a6
MH
2663
2664 if (result == L2CAP_CR_PEND && status == L2CAP_CS_NO_INFO) {
2665 struct l2cap_info_req info;
2666 info.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
2667
2668 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
2669 conn->info_ident = l2cap_get_ident(conn);
2670
2671 mod_timer(&conn->info_timer, jiffies +
2672 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
2673
2674 l2cap_send_cmd(conn, conn->info_ident,
2675 L2CAP_INFO_REQ, sizeof(info), &info);
2676 }
2677
1da177e4
LT
2678 return 0;
2679}
2680
2681static inline int l2cap_connect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2682{
2683 struct l2cap_conn_rsp *rsp = (struct l2cap_conn_rsp *) data;
2684 u16 scid, dcid, result, status;
2685 struct sock *sk;
2686 u8 req[128];
2687
2688 scid = __le16_to_cpu(rsp->scid);
2689 dcid = __le16_to_cpu(rsp->dcid);
2690 result = __le16_to_cpu(rsp->result);
2691 status = __le16_to_cpu(rsp->status);
2692
2693 BT_DBG("dcid 0x%4.4x scid 0x%4.4x result 0x%2.2x status 0x%2.2x", dcid, scid, result, status);
2694
2695 if (scid) {
af05b30b
GP
2696 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2697 if (!sk)
1da177e4
LT
2698 return 0;
2699 } else {
af05b30b
GP
2700 sk = l2cap_get_chan_by_ident(&conn->chan_list, cmd->ident);
2701 if (!sk)
1da177e4
LT
2702 return 0;
2703 }
2704
2705 switch (result) {
2706 case L2CAP_CR_SUCCESS:
2707 sk->sk_state = BT_CONFIG;
2708 l2cap_pi(sk)->ident = 0;
2709 l2cap_pi(sk)->dcid = dcid;
2710 l2cap_pi(sk)->conf_state |= L2CAP_CONF_REQ_SENT;
2711
6a8d3010
MH
2712 l2cap_pi(sk)->conf_state &= ~L2CAP_CONF_CONNECT_PEND;
2713
1da177e4
LT
2714 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
2715 l2cap_build_conf_req(sk, req), req);
f2fcfcd6 2716 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2717 break;
2718
2719 case L2CAP_CR_PEND:
6a8d3010 2720 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
1da177e4
LT
2721 break;
2722
2723 default:
2724 l2cap_chan_del(sk, ECONNREFUSED);
2725 break;
2726 }
2727
2728 bh_unlock_sock(sk);
2729 return 0;
2730}
2731
88219a0f 2732static inline int l2cap_config_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u16 cmd_len, u8 *data)
1da177e4
LT
2733{
2734 struct l2cap_conf_req *req = (struct l2cap_conf_req *) data;
2735 u16 dcid, flags;
2736 u8 rsp[64];
2737 struct sock *sk;
5dee9e7c 2738 int len;
1da177e4
LT
2739
2740 dcid = __le16_to_cpu(req->dcid);
2741 flags = __le16_to_cpu(req->flags);
2742
2743 BT_DBG("dcid 0x%4.4x flags 0x%2.2x", dcid, flags);
2744
af05b30b
GP
2745 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2746 if (!sk)
1da177e4
LT
2747 return -ENOENT;
2748
354f60a9
MH
2749 if (sk->sk_state == BT_DISCONN)
2750 goto unlock;
2751
5dee9e7c 2752 /* Reject if config buffer is too small. */
88219a0f 2753 len = cmd_len - sizeof(*req);
5dee9e7c
MH
2754 if (l2cap_pi(sk)->conf_len + len > sizeof(l2cap_pi(sk)->conf_req)) {
2755 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
2756 l2cap_build_conf_rsp(sk, rsp,
2757 L2CAP_CONF_REJECT, flags), rsp);
2758 goto unlock;
2759 }
2760
2761 /* Store config. */
2762 memcpy(l2cap_pi(sk)->conf_req + l2cap_pi(sk)->conf_len, req->data, len);
2763 l2cap_pi(sk)->conf_len += len;
1da177e4
LT
2764
2765 if (flags & 0x0001) {
2766 /* Incomplete config. Send empty response. */
2767 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
5dee9e7c
MH
2768 l2cap_build_conf_rsp(sk, rsp,
2769 L2CAP_CONF_SUCCESS, 0x0001), rsp);
1da177e4
LT
2770 goto unlock;
2771 }
2772
2773 /* Complete config. */
5dee9e7c 2774 len = l2cap_parse_conf_req(sk, rsp);
f2fcfcd6 2775 if (len < 0) {
22121fc9 2776 l2cap_send_disconn_req(conn, sk);
1da177e4 2777 goto unlock;
f2fcfcd6 2778 }
1da177e4 2779
5dee9e7c 2780 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP, len, rsp);
f2fcfcd6 2781 l2cap_pi(sk)->num_conf_rsp++;
5dee9e7c 2782
5dee9e7c
MH
2783 /* Reset config buffer. */
2784 l2cap_pi(sk)->conf_len = 0;
2785
876d9484
MH
2786 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE))
2787 goto unlock;
2788
1da177e4 2789 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_INPUT_DONE) {
f64f9e71
JP
2790 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2791 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2792 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
2793
1da177e4 2794 sk->sk_state = BT_CONNECTED;
e90bac06 2795
0565c1c2
GP
2796 l2cap_pi(sk)->next_tx_seq = 0;
2797 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 2798 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
2799 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2800 l2cap_ertm_init(sk);
2801
1da177e4 2802 l2cap_chan_ready(sk);
876d9484
MH
2803 goto unlock;
2804 }
2805
2806 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_REQ_SENT)) {
79d554a6 2807 u8 buf[64];
1da177e4 2808 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
79d554a6 2809 l2cap_build_conf_req(sk, buf), buf);
f2fcfcd6 2810 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2811 }
2812
2813unlock:
2814 bh_unlock_sock(sk);
2815 return 0;
2816}
2817
2818static inline int l2cap_config_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2819{
2820 struct l2cap_conf_rsp *rsp = (struct l2cap_conf_rsp *)data;
2821 u16 scid, flags, result;
2822 struct sock *sk;
2823
2824 scid = __le16_to_cpu(rsp->scid);
2825 flags = __le16_to_cpu(rsp->flags);
2826 result = __le16_to_cpu(rsp->result);
2827
af05b30b
GP
2828 BT_DBG("scid 0x%4.4x flags 0x%2.2x result 0x%2.2x",
2829 scid, flags, result);
1da177e4 2830
af05b30b
GP
2831 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2832 if (!sk)
1da177e4
LT
2833 return 0;
2834
2835 switch (result) {
2836 case L2CAP_CONF_SUCCESS:
2837 break;
2838
2839 case L2CAP_CONF_UNACCEPT:
f2fcfcd6
GP
2840 if (l2cap_pi(sk)->num_conf_rsp <= L2CAP_CONF_MAX_CONF_RSP) {
2841 int len = cmd->len - sizeof(*rsp);
2842 char req[64];
2843
c2c77ec8
AE
2844 if (len > sizeof(req) - sizeof(struct l2cap_conf_req)) {
2845 l2cap_send_disconn_req(conn, sk);
2846 goto done;
2847 }
2848
f2fcfcd6
GP
2849 /* throw out any old stored conf requests */
2850 result = L2CAP_CONF_SUCCESS;
2851 len = l2cap_parse_conf_rsp(sk, rsp->data,
2852 len, req, &result);
2853 if (len < 0) {
22121fc9 2854 l2cap_send_disconn_req(conn, sk);
f2fcfcd6
GP
2855 goto done;
2856 }
2857
2858 l2cap_send_cmd(conn, l2cap_get_ident(conn),
2859 L2CAP_CONF_REQ, len, req);
2860 l2cap_pi(sk)->num_conf_req++;
2861 if (result != L2CAP_CONF_SUCCESS)
2862 goto done;
2863 break;
1da177e4
LT
2864 }
2865
8e87d142 2866 default:
1da177e4 2867 sk->sk_state = BT_DISCONN;
b1235d79 2868 sk->sk_err = ECONNRESET;
1da177e4 2869 l2cap_sock_set_timer(sk, HZ * 5);
22121fc9 2870 l2cap_send_disconn_req(conn, sk);
1da177e4
LT
2871 goto done;
2872 }
2873
2874 if (flags & 0x01)
2875 goto done;
2876
1da177e4
LT
2877 l2cap_pi(sk)->conf_state |= L2CAP_CONF_INPUT_DONE;
2878
2879 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE) {
f64f9e71
JP
2880 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2881 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2882 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
2883
1da177e4 2884 sk->sk_state = BT_CONNECTED;
0565c1c2 2885 l2cap_pi(sk)->next_tx_seq = 0;
1c2acffb 2886 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 2887 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
2888 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2889 l2cap_ertm_init(sk);
2890
1da177e4
LT
2891 l2cap_chan_ready(sk);
2892 }
2893
2894done:
2895 bh_unlock_sock(sk);
2896 return 0;
2897}
2898
2899static inline int l2cap_disconnect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2900{
2901 struct l2cap_disconn_req *req = (struct l2cap_disconn_req *) data;
2902 struct l2cap_disconn_rsp rsp;
2903 u16 dcid, scid;
2904 struct sock *sk;
2905
2906 scid = __le16_to_cpu(req->scid);
2907 dcid = __le16_to_cpu(req->dcid);
2908
2909 BT_DBG("scid 0x%4.4x dcid 0x%4.4x", scid, dcid);
2910
af05b30b
GP
2911 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2912 if (!sk)
1da177e4
LT
2913 return 0;
2914
aca3192c
YH
2915 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
2916 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1da177e4
LT
2917 l2cap_send_cmd(conn, cmd->ident, L2CAP_DISCONN_RSP, sizeof(rsp), &rsp);
2918
2919 sk->sk_shutdown = SHUTDOWN_MASK;
2920
1c2acffb 2921 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
2922
2923 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
2924 skb_queue_purge(SREJ_QUEUE(sk));
2925 del_timer(&l2cap_pi(sk)->retrans_timer);
2926 del_timer(&l2cap_pi(sk)->monitor_timer);
2927 }
1c2acffb 2928
1da177e4
LT
2929 l2cap_chan_del(sk, ECONNRESET);
2930 bh_unlock_sock(sk);
2931
2932 l2cap_sock_kill(sk);
2933 return 0;
2934}
2935
2936static inline int l2cap_disconnect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2937{
2938 struct l2cap_disconn_rsp *rsp = (struct l2cap_disconn_rsp *) data;
2939 u16 dcid, scid;
2940 struct sock *sk;
2941
2942 scid = __le16_to_cpu(rsp->scid);
2943 dcid = __le16_to_cpu(rsp->dcid);
2944
2945 BT_DBG("dcid 0x%4.4x scid 0x%4.4x", dcid, scid);
2946
af05b30b
GP
2947 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2948 if (!sk)
1da177e4
LT
2949 return 0;
2950
1c2acffb 2951 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
2952
2953 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
2954 skb_queue_purge(SREJ_QUEUE(sk));
2955 del_timer(&l2cap_pi(sk)->retrans_timer);
2956 del_timer(&l2cap_pi(sk)->monitor_timer);
2957 }
1c2acffb 2958
1da177e4
LT
2959 l2cap_chan_del(sk, 0);
2960 bh_unlock_sock(sk);
2961
2962 l2cap_sock_kill(sk);
2963 return 0;
2964}
2965
2966static inline int l2cap_information_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2967{
2968 struct l2cap_info_req *req = (struct l2cap_info_req *) data;
1da177e4
LT
2969 u16 type;
2970
2971 type = __le16_to_cpu(req->type);
2972
2973 BT_DBG("type 0x%4.4x", type);
2974
f0709e03
MH
2975 if (type == L2CAP_IT_FEAT_MASK) {
2976 u8 buf[8];
44dd46de 2977 u32 feat_mask = l2cap_feat_mask;
f0709e03
MH
2978 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
2979 rsp->type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
2980 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
44dd46de 2981 if (enable_ertm)
fcc203c3
GP
2982 feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING
2983 | L2CAP_FEAT_FCS;
1b7bf4ed 2984 put_unaligned_le32(feat_mask, rsp->data);
f0709e03
MH
2985 l2cap_send_cmd(conn, cmd->ident,
2986 L2CAP_INFO_RSP, sizeof(buf), buf);
e1027a7c
MH
2987 } else if (type == L2CAP_IT_FIXED_CHAN) {
2988 u8 buf[12];
2989 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
2990 rsp->type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
2991 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
2992 memcpy(buf + 4, l2cap_fixed_chan, 8);
2993 l2cap_send_cmd(conn, cmd->ident,
2994 L2CAP_INFO_RSP, sizeof(buf), buf);
f0709e03
MH
2995 } else {
2996 struct l2cap_info_rsp rsp;
2997 rsp.type = cpu_to_le16(type);
2998 rsp.result = cpu_to_le16(L2CAP_IR_NOTSUPP);
2999 l2cap_send_cmd(conn, cmd->ident,
3000 L2CAP_INFO_RSP, sizeof(rsp), &rsp);
3001 }
1da177e4
LT
3002
3003 return 0;
3004}
3005
3006static inline int l2cap_information_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3007{
3008 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) data;
3009 u16 type, result;
3010
3011 type = __le16_to_cpu(rsp->type);
3012 result = __le16_to_cpu(rsp->result);
3013
3014 BT_DBG("type 0x%4.4x result 0x%2.2x", type, result);
3015
4e8402a3
MH
3016 del_timer(&conn->info_timer);
3017
984947dc 3018 if (type == L2CAP_IT_FEAT_MASK) {
83985319 3019 conn->feat_mask = get_unaligned_le32(rsp->data);
4e8402a3 3020
47ec1dcd 3021 if (conn->feat_mask & L2CAP_FEAT_FIXED_CHAN) {
e1027a7c
MH
3022 struct l2cap_info_req req;
3023 req.type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3024
3025 conn->info_ident = l2cap_get_ident(conn);
3026
3027 l2cap_send_cmd(conn, conn->info_ident,
3028 L2CAP_INFO_REQ, sizeof(req), &req);
3029 } else {
3030 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
3031 conn->info_ident = 0;
3032
3033 l2cap_conn_start(conn);
3034 }
3035 } else if (type == L2CAP_IT_FIXED_CHAN) {
984947dc 3036 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 3037 conn->info_ident = 0;
984947dc
MH
3038
3039 l2cap_conn_start(conn);
3040 }
4e8402a3 3041
1da177e4
LT
3042 return 0;
3043}
3044
3045static inline void l2cap_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
3046{
3047 u8 *data = skb->data;
3048 int len = skb->len;
3049 struct l2cap_cmd_hdr cmd;
3050 int err = 0;
3051
3052 l2cap_raw_recv(conn, skb);
3053
3054 while (len >= L2CAP_CMD_HDR_SIZE) {
88219a0f 3055 u16 cmd_len;
1da177e4
LT
3056 memcpy(&cmd, data, L2CAP_CMD_HDR_SIZE);
3057 data += L2CAP_CMD_HDR_SIZE;
3058 len -= L2CAP_CMD_HDR_SIZE;
3059
88219a0f 3060 cmd_len = le16_to_cpu(cmd.len);
1da177e4 3061
88219a0f 3062 BT_DBG("code 0x%2.2x len %d id 0x%2.2x", cmd.code, cmd_len, cmd.ident);
1da177e4 3063
88219a0f 3064 if (cmd_len > len || !cmd.ident) {
1da177e4
LT
3065 BT_DBG("corrupted command");
3066 break;
3067 }
3068
3069 switch (cmd.code) {
3070 case L2CAP_COMMAND_REJ:
4e8402a3 3071 l2cap_command_rej(conn, &cmd, data);
1da177e4
LT
3072 break;
3073
3074 case L2CAP_CONN_REQ:
3075 err = l2cap_connect_req(conn, &cmd, data);
3076 break;
3077
3078 case L2CAP_CONN_RSP:
3079 err = l2cap_connect_rsp(conn, &cmd, data);
3080 break;
3081
3082 case L2CAP_CONF_REQ:
88219a0f 3083 err = l2cap_config_req(conn, &cmd, cmd_len, data);
1da177e4
LT
3084 break;
3085
3086 case L2CAP_CONF_RSP:
3087 err = l2cap_config_rsp(conn, &cmd, data);
3088 break;
3089
3090 case L2CAP_DISCONN_REQ:
3091 err = l2cap_disconnect_req(conn, &cmd, data);
3092 break;
3093
3094 case L2CAP_DISCONN_RSP:
3095 err = l2cap_disconnect_rsp(conn, &cmd, data);
3096 break;
3097
3098 case L2CAP_ECHO_REQ:
88219a0f 3099 l2cap_send_cmd(conn, cmd.ident, L2CAP_ECHO_RSP, cmd_len, data);
1da177e4
LT
3100 break;
3101
3102 case L2CAP_ECHO_RSP:
3103 break;
3104
3105 case L2CAP_INFO_REQ:
3106 err = l2cap_information_req(conn, &cmd, data);
3107 break;
3108
3109 case L2CAP_INFO_RSP:
3110 err = l2cap_information_rsp(conn, &cmd, data);
3111 break;
3112
3113 default:
3114 BT_ERR("Unknown signaling command 0x%2.2x", cmd.code);
3115 err = -EINVAL;
3116 break;
3117 }
3118
3119 if (err) {
3120 struct l2cap_cmd_rej rej;
3121 BT_DBG("error %d", err);
3122
3123 /* FIXME: Map err to a valid reason */
aca3192c 3124 rej.reason = cpu_to_le16(0);
1da177e4
LT
3125 l2cap_send_cmd(conn, cmd.ident, L2CAP_COMMAND_REJ, sizeof(rej), &rej);
3126 }
3127
88219a0f
AV
3128 data += cmd_len;
3129 len -= cmd_len;
1da177e4
LT
3130 }
3131
3132 kfree_skb(skb);
3133}
3134
fcc203c3
GP
3135static int l2cap_check_fcs(struct l2cap_pinfo *pi, struct sk_buff *skb)
3136{
3137 u16 our_fcs, rcv_fcs;
3138 int hdr_size = L2CAP_HDR_SIZE + 2;
3139
3140 if (pi->fcs == L2CAP_FCS_CRC16) {
3141 skb_trim(skb, skb->len - 2);
3142 rcv_fcs = get_unaligned_le16(skb->data + skb->len);
3143 our_fcs = crc16(0, skb->data - hdr_size, skb->len + hdr_size);
3144
3145 if (our_fcs != rcv_fcs)
3146 return -EINVAL;
3147 }
3148 return 0;
3149}
3150
8f17154f
GP
3151static void l2cap_add_to_srej_queue(struct sock *sk, struct sk_buff *skb, u8 tx_seq, u8 sar)
3152{
3153 struct sk_buff *next_skb;
3154
3155 bt_cb(skb)->tx_seq = tx_seq;
3156 bt_cb(skb)->sar = sar;
3157
3158 next_skb = skb_peek(SREJ_QUEUE(sk));
3159 if (!next_skb) {
3160 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3161 return;
3162 }
3163
3164 do {
3165 if (bt_cb(next_skb)->tx_seq > tx_seq) {
3166 __skb_queue_before(SREJ_QUEUE(sk), next_skb, skb);
3167 return;
3168 }
3169
3170 if (skb_queue_is_last(SREJ_QUEUE(sk), next_skb))
3171 break;
3172
3173 } while((next_skb = skb_queue_next(SREJ_QUEUE(sk), next_skb)));
3174
3175 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3176}
3177
c74e560c
GP
3178static int l2cap_sar_reassembly_sdu(struct sock *sk, struct sk_buff *skb, u16 control)
3179{
3180 struct l2cap_pinfo *pi = l2cap_pi(sk);
3181 struct sk_buff *_skb;
3182 int err = -EINVAL;
3183
3184 switch (control & L2CAP_CTRL_SAR) {
3185 case L2CAP_SDU_UNSEGMENTED:
3186 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3187 kfree_skb(pi->sdu);
3188 break;
3189 }
3190
3191 err = sock_queue_rcv_skb(sk, skb);
3192 if (!err)
3193 return 0;
3194
3195 break;
3196
3197 case L2CAP_SDU_START:
3198 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3199 kfree_skb(pi->sdu);
3200 break;
3201 }
3202
3203 pi->sdu_len = get_unaligned_le16(skb->data);
3204 skb_pull(skb, 2);
3205
3206 pi->sdu = bt_skb_alloc(pi->sdu_len, GFP_ATOMIC);
3207 if (!pi->sdu) {
3208 err = -ENOMEM;
3209 break;
3210 }
3211
3212 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3213
3214 pi->conn_state |= L2CAP_CONN_SAR_SDU;
3215 pi->partial_sdu_len = skb->len;
3216 err = 0;
3217 break;
3218
3219 case L2CAP_SDU_CONTINUE:
3220 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3221 break;
3222
3223 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3224
3225 pi->partial_sdu_len += skb->len;
3226 if (pi->partial_sdu_len > pi->sdu_len)
3227 kfree_skb(pi->sdu);
3228 else
3229 err = 0;
3230
3231 break;
3232
3233 case L2CAP_SDU_END:
3234 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3235 break;
3236
3237 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3238
3239 pi->conn_state &= ~L2CAP_CONN_SAR_SDU;
3240 pi->partial_sdu_len += skb->len;
3241
3242 if (pi->partial_sdu_len == pi->sdu_len) {
3243 _skb = skb_clone(pi->sdu, GFP_ATOMIC);
3244 err = sock_queue_rcv_skb(sk, _skb);
3245 if (err < 0)
3246 kfree_skb(_skb);
3247 }
3248 kfree_skb(pi->sdu);
3249 err = 0;
3250
3251 break;
3252 }
3253
3254 kfree_skb(skb);
3255 return err;
3256}
3257
8f17154f
GP
3258static void l2cap_check_srej_gap(struct sock *sk, u8 tx_seq)
3259{
3260 struct sk_buff *skb;
3261 u16 control = 0;
3262
3263 while((skb = skb_peek(SREJ_QUEUE(sk)))) {
3264 if (bt_cb(skb)->tx_seq != tx_seq)
3265 break;
3266
3267 skb = skb_dequeue(SREJ_QUEUE(sk));
3268 control |= bt_cb(skb)->sar << L2CAP_CTRL_SAR_SHIFT;
3269 l2cap_sar_reassembly_sdu(sk, skb, control);
3270 l2cap_pi(sk)->buffer_seq_srej =
3271 (l2cap_pi(sk)->buffer_seq_srej + 1) % 64;
3272 tx_seq++;
3273 }
3274}
3275
3276static void l2cap_resend_srejframe(struct sock *sk, u8 tx_seq)
3277{
3278 struct l2cap_pinfo *pi = l2cap_pi(sk);
3279 struct srej_list *l, *tmp;
3280 u16 control;
3281
3282 list_for_each_entry_safe(l,tmp, SREJ_LIST(sk), list) {
3283 if (l->tx_seq == tx_seq) {
3284 list_del(&l->list);
3285 kfree(l);
3286 return;
3287 }
3288 control = L2CAP_SUPER_SELECT_REJECT;
3289 control |= l->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3290 l2cap_send_sframe(pi, control);
3291 list_del(&l->list);
3292 list_add_tail(&l->list, SREJ_LIST(sk));
3293 }
3294}
3295
3296static void l2cap_send_srejframe(struct sock *sk, u8 tx_seq)
3297{
3298 struct l2cap_pinfo *pi = l2cap_pi(sk);
3299 struct srej_list *new;
3300 u16 control;
3301
3302 while (tx_seq != pi->expected_tx_seq) {
3303 control = L2CAP_SUPER_SELECT_REJECT;
3304 control |= pi->expected_tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
ef54fd93
GP
3305 if (pi->conn_state & L2CAP_CONN_SEND_PBIT) {
3306 control |= L2CAP_CTRL_POLL;
3307 pi->conn_state &= ~L2CAP_CONN_SEND_PBIT;
3308 }
8f17154f
GP
3309 l2cap_send_sframe(pi, control);
3310
3311 new = kzalloc(sizeof(struct srej_list), GFP_ATOMIC);
3312 new->tx_seq = pi->expected_tx_seq++;
3313 list_add_tail(&new->list, SREJ_LIST(sk));
3314 }
3315 pi->expected_tx_seq++;
3316}
3317
1c2acffb
GP
3318static inline int l2cap_data_channel_iframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3319{
3320 struct l2cap_pinfo *pi = l2cap_pi(sk);
3321 u8 tx_seq = __get_txseq(rx_control);
9f121a5a 3322 u8 req_seq = __get_reqseq(rx_control);
1c2acffb 3323 u16 tx_control = 0;
8f17154f 3324 u8 sar = rx_control >> L2CAP_CTRL_SAR_SHIFT;
1c2acffb
GP
3325 int err = 0;
3326
3327 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3328
9f121a5a
GP
3329 pi->expected_ack_seq = req_seq;
3330 l2cap_drop_acked_frames(sk);
3331
8f17154f
GP
3332 if (tx_seq == pi->expected_tx_seq)
3333 goto expected;
1c2acffb 3334
8f17154f
GP
3335 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3336 struct srej_list *first;
30afb5b2 3337
8f17154f
GP
3338 first = list_first_entry(SREJ_LIST(sk),
3339 struct srej_list, list);
3340 if (tx_seq == first->tx_seq) {
3341 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3342 l2cap_check_srej_gap(sk, tx_seq);
3343
3344 list_del(&first->list);
3345 kfree(first);
3346
3347 if (list_empty(SREJ_LIST(sk))) {
3348 pi->buffer_seq = pi->buffer_seq_srej;
3349 pi->conn_state &= ~L2CAP_CONN_SREJ_SENT;
3350 }
3351 } else {
3352 struct srej_list *l;
3353 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3354
3355 list_for_each_entry(l, SREJ_LIST(sk), list) {
3356 if (l->tx_seq == tx_seq) {
3357 l2cap_resend_srejframe(sk, tx_seq);
3358 return 0;
3359 }
3360 }
3361 l2cap_send_srejframe(sk, tx_seq);
30afb5b2
GP
3362 }
3363 } else {
8f17154f 3364 pi->conn_state |= L2CAP_CONN_SREJ_SENT;
1c2acffb 3365
8f17154f
GP
3366 INIT_LIST_HEAD(SREJ_LIST(sk));
3367 pi->buffer_seq_srej = pi->buffer_seq;
3368
3369 __skb_queue_head_init(SREJ_QUEUE(sk));
3370 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3371
ef54fd93
GP
3372 pi->conn_state |= L2CAP_CONN_SEND_PBIT;
3373
8f17154f 3374 l2cap_send_srejframe(sk, tx_seq);
1c2acffb 3375 }
30afb5b2
GP
3376 return 0;
3377
8f17154f
GP
3378expected:
3379 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3380
3381 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3382 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3383 return 0;
3384 }
3385
4ec10d97
GP
3386 if (rx_control & L2CAP_CTRL_FINAL) {
3387 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3388 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3389 else {
3390 sk->sk_send_head = TX_QUEUE(sk)->next;
3391 pi->next_tx_seq = pi->expected_ack_seq;
3392 l2cap_ertm_send(sk);
3393 }
3394 }
3395
8f17154f
GP
3396 pi->buffer_seq = (pi->buffer_seq + 1) % 64;
3397
3398 err = l2cap_sar_reassembly_sdu(sk, skb, rx_control);
3399 if (err < 0)
3400 return err;
3401
3402 pi->num_to_ack = (pi->num_to_ack + 1) % L2CAP_DEFAULT_NUM_TO_ACK;
3403 if (pi->num_to_ack == L2CAP_DEFAULT_NUM_TO_ACK - 1) {
3404 tx_control |= L2CAP_SUPER_RCV_READY;
3405 tx_control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3406 l2cap_send_sframe(pi, tx_control);
3407 }
3408 return 0;
1c2acffb
GP
3409}
3410
3411static inline int l2cap_data_channel_sframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3412{
3413 struct l2cap_pinfo *pi = l2cap_pi(sk);
8f17154f 3414 u8 tx_seq = __get_reqseq(rx_control);
1c2acffb
GP
3415
3416 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3417
3418 switch (rx_control & L2CAP_CTRL_SUPERVISE) {
3419 case L2CAP_SUPER_RCV_READY:
e90bac06
GP
3420 if (rx_control & L2CAP_CTRL_POLL) {
3421 u16 control = L2CAP_CTRL_FINAL;
ca42a613
GP
3422 control |= L2CAP_SUPER_RCV_READY |
3423 (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT);
e90bac06 3424 l2cap_send_sframe(l2cap_pi(sk), control);
2246b2f1
GP
3425 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3426
e90bac06 3427 } else if (rx_control & L2CAP_CTRL_FINAL) {
2246b2f1 3428 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
ca42a613
GP
3429 pi->expected_ack_seq = tx_seq;
3430 l2cap_drop_acked_frames(sk);
3431
4ec10d97
GP
3432 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3433 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3434 else {
3435 sk->sk_send_head = TX_QUEUE(sk)->next;
3436 pi->next_tx_seq = pi->expected_ack_seq;
3437 l2cap_ertm_send(sk);
3438 }
3439
e90bac06
GP
3440 if (!(pi->conn_state & L2CAP_CONN_WAIT_F))
3441 break;
3442
3443 pi->conn_state &= ~L2CAP_CONN_WAIT_F;
3444 del_timer(&pi->monitor_timer);
3445
3446 if (pi->unacked_frames > 0)
3447 __mod_retrans_timer();
3448 } else {
8f17154f 3449 pi->expected_ack_seq = tx_seq;
e90bac06 3450 l2cap_drop_acked_frames(sk);
2246b2f1 3451
f64f9e71
JP
3452 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3453 (pi->unacked_frames > 0))
e90bac06 3454 __mod_retrans_timer();
2246b2f1 3455
2246b2f1 3456 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
186de9a3 3457 l2cap_ertm_send(sk);
e90bac06 3458 }
1c2acffb
GP
3459 break;
3460
1c2acffb 3461 case L2CAP_SUPER_REJECT:
2246b2f1
GP
3462 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3463
30afb5b2
GP
3464 pi->expected_ack_seq = __get_reqseq(rx_control);
3465 l2cap_drop_acked_frames(sk);
3466
4ec10d97
GP
3467 if (rx_control & L2CAP_CTRL_FINAL) {
3468 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3469 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3470 else {
3471 sk->sk_send_head = TX_QUEUE(sk)->next;
3472 pi->next_tx_seq = pi->expected_ack_seq;
3473 l2cap_ertm_send(sk);
3474 }
3475 } else {
3476 sk->sk_send_head = TX_QUEUE(sk)->next;
3477 pi->next_tx_seq = pi->expected_ack_seq;
3478 l2cap_ertm_send(sk);
30afb5b2 3479
4ec10d97
GP
3480 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3481 pi->srej_save_reqseq = tx_seq;
3482 pi->conn_state |= L2CAP_CONN_REJ_ACT;
3483 }
3484 }
30afb5b2
GP
3485
3486 break;
3487
1c2acffb 3488 case L2CAP_SUPER_SELECT_REJECT:
2246b2f1
GP
3489 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3490
ef54fd93 3491 if (rx_control & L2CAP_CTRL_POLL) {
ef54fd93
GP
3492 pi->expected_ack_seq = tx_seq;
3493 l2cap_drop_acked_frames(sk);
186ee8cf 3494 l2cap_retransmit_frame(sk, tx_seq);
ef54fd93
GP
3495 l2cap_ertm_send(sk);
3496 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3497 pi->srej_save_reqseq = tx_seq;
3498 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
3499 }
3500 } else if (rx_control & L2CAP_CTRL_FINAL) {
3501 if ((pi->conn_state & L2CAP_CONN_SREJ_ACT) &&
3502 pi->srej_save_reqseq == tx_seq)
889a3ca4 3503 pi->conn_state &= ~L2CAP_CONN_SREJ_ACT;
ef54fd93
GP
3504 else
3505 l2cap_retransmit_frame(sk, tx_seq);
3506 }
3507 else {
3508 l2cap_retransmit_frame(sk, tx_seq);
3509 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3510 pi->srej_save_reqseq = tx_seq;
3511 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
3512 }
3513 }
8f17154f
GP
3514 break;
3515
3516 case L2CAP_SUPER_RCV_NOT_READY:
2246b2f1
GP
3517 pi->conn_state |= L2CAP_CONN_REMOTE_BUSY;
3518 pi->expected_ack_seq = tx_seq;
3519 l2cap_drop_acked_frames(sk);
3520
e8235c6b 3521 del_timer(&pi->retrans_timer);
2246b2f1 3522 if (rx_control & L2CAP_CTRL_POLL) {
7e743090 3523 u16 control = L2CAP_CTRL_FINAL;
e8235c6b 3524 l2cap_send_rr_or_rnr(pi, control);
2246b2f1 3525 }
1c2acffb
GP
3526 break;
3527 }
3528
faaebd19 3529 kfree_skb(skb);
1c2acffb
GP
3530 return 0;
3531}
3532
1da177e4
LT
3533static inline int l2cap_data_channel(struct l2cap_conn *conn, u16 cid, struct sk_buff *skb)
3534{
3535 struct sock *sk;
6840ed07 3536 struct l2cap_pinfo *pi;
c74e560c 3537 u16 control, len;
6840ed07 3538 u8 tx_seq;
1da177e4
LT
3539
3540 sk = l2cap_get_chan_by_scid(&conn->chan_list, cid);
3541 if (!sk) {
3542 BT_DBG("unknown cid 0x%4.4x", cid);
3543 goto drop;
3544 }
3545
6840ed07
GP
3546 pi = l2cap_pi(sk);
3547
1da177e4
LT
3548 BT_DBG("sk %p, len %d", sk, skb->len);
3549
3550 if (sk->sk_state != BT_CONNECTED)
3551 goto drop;
3552
6840ed07 3553 switch (pi->mode) {
1c2acffb
GP
3554 case L2CAP_MODE_BASIC:
3555 /* If socket recv buffers overflows we drop data here
3556 * which is *bad* because L2CAP has to be reliable.
3557 * But we don't have any other choice. L2CAP doesn't
3558 * provide flow control mechanism. */
1da177e4 3559
6840ed07 3560 if (pi->imtu < skb->len)
1c2acffb 3561 goto drop;
1da177e4 3562
1c2acffb
GP
3563 if (!sock_queue_rcv_skb(sk, skb))
3564 goto done;
3565 break;
3566
3567 case L2CAP_MODE_ERTM:
3568 control = get_unaligned_le16(skb->data);
3569 skb_pull(skb, 2);
c74e560c 3570 len = skb->len;
1c2acffb 3571
c74e560c
GP
3572 if (__is_sar_start(control))
3573 len -= 2;
3574
fcc203c3
GP
3575 if (pi->fcs == L2CAP_FCS_CRC16)
3576 len -= 2;
3577
30afb5b2
GP
3578 /*
3579 * We can just drop the corrupted I-frame here.
3580 * Receiver will miss it and start proper recovery
3581 * procedures and ask retransmission.
3582 */
c74e560c 3583 if (len > L2CAP_DEFAULT_MAX_PDU_SIZE)
1c2acffb
GP
3584 goto drop;
3585
fcc203c3
GP
3586 if (l2cap_check_fcs(pi, skb))
3587 goto drop;
3588
1c2acffb 3589 if (__is_iframe(control))
fcafde2e 3590 l2cap_data_channel_iframe(sk, control, skb);
1c2acffb 3591 else
fcafde2e 3592 l2cap_data_channel_sframe(sk, control, skb);
1c2acffb 3593
fcafde2e 3594 goto done;
1c2acffb 3595
6840ed07
GP
3596 case L2CAP_MODE_STREAMING:
3597 control = get_unaligned_le16(skb->data);
3598 skb_pull(skb, 2);
3599 len = skb->len;
3600
3601 if (__is_sar_start(control))
3602 len -= 2;
3603
fcc203c3
GP
3604 if (pi->fcs == L2CAP_FCS_CRC16)
3605 len -= 2;
3606
6840ed07
GP
3607 if (len > L2CAP_DEFAULT_MAX_PDU_SIZE || __is_sframe(control))
3608 goto drop;
3609
fcc203c3
GP
3610 if (l2cap_check_fcs(pi, skb))
3611 goto drop;
3612
6840ed07
GP
3613 tx_seq = __get_txseq(control);
3614
3615 if (pi->expected_tx_seq == tx_seq)
3616 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3617 else
7dffe421 3618 pi->expected_tx_seq = (tx_seq + 1) % 64;
6840ed07 3619
fcafde2e 3620 l2cap_sar_reassembly_sdu(sk, skb, control);
6840ed07
GP
3621
3622 goto done;
3623
1c2acffb 3624 default:
e8235c6b 3625 BT_DBG("sk %p: bad mode 0x%2.2x", sk, pi->mode);
1c2acffb
GP
3626 break;
3627 }
1da177e4
LT
3628
3629drop:
3630 kfree_skb(skb);
3631
3632done:
0139418c
MH
3633 if (sk)
3634 bh_unlock_sock(sk);
3635
1da177e4
LT
3636 return 0;
3637}
3638
8e036fc3 3639static inline int l2cap_conless_channel(struct l2cap_conn *conn, __le16 psm, struct sk_buff *skb)
1da177e4
LT
3640{
3641 struct sock *sk;
3642
3643 sk = l2cap_get_sock_by_psm(0, psm, conn->src);
3644 if (!sk)
3645 goto drop;
3646
3647 BT_DBG("sk %p, len %d", sk, skb->len);
3648
3649 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_CONNECTED)
3650 goto drop;
3651
3652 if (l2cap_pi(sk)->imtu < skb->len)
3653 goto drop;
3654
3655 if (!sock_queue_rcv_skb(sk, skb))
3656 goto done;
3657
3658drop:
3659 kfree_skb(skb);
3660
3661done:
af05b30b
GP
3662 if (sk)
3663 bh_unlock_sock(sk);
1da177e4
LT
3664 return 0;
3665}
3666
3667static void l2cap_recv_frame(struct l2cap_conn *conn, struct sk_buff *skb)
3668{
3669 struct l2cap_hdr *lh = (void *) skb->data;
8e036fc3
AV
3670 u16 cid, len;
3671 __le16 psm;
1da177e4
LT
3672
3673 skb_pull(skb, L2CAP_HDR_SIZE);
3674 cid = __le16_to_cpu(lh->cid);
3675 len = __le16_to_cpu(lh->len);
3676
1c2acffb
GP
3677 if (len != skb->len) {
3678 kfree_skb(skb);
3679 return;
3680 }
3681
1da177e4
LT
3682 BT_DBG("len %d, cid 0x%4.4x", len, cid);
3683
3684 switch (cid) {
8db4dc46 3685 case L2CAP_CID_SIGNALING:
1da177e4
LT
3686 l2cap_sig_channel(conn, skb);
3687 break;
3688
8db4dc46 3689 case L2CAP_CID_CONN_LESS:
1b7bf4ed 3690 psm = get_unaligned_le16(skb->data);
1da177e4
LT
3691 skb_pull(skb, 2);
3692 l2cap_conless_channel(conn, psm, skb);
3693 break;
3694
3695 default:
3696 l2cap_data_channel(conn, cid, skb);
3697 break;
3698 }
3699}
3700
3701/* ---- L2CAP interface with lower layer (HCI) ---- */
3702
3703static int l2cap_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3704{
3705 int exact = 0, lm1 = 0, lm2 = 0;
3706 register struct sock *sk;
3707 struct hlist_node *node;
3708
3709 if (type != ACL_LINK)
3710 return 0;
3711
3712 BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr));
3713
3714 /* Find listening sockets and check their link_mode */
3715 read_lock(&l2cap_sk_list.lock);
3716 sk_for_each(sk, node, &l2cap_sk_list.head) {
3717 if (sk->sk_state != BT_LISTEN)
3718 continue;
3719
3720 if (!bacmp(&bt_sk(sk)->src, &hdev->bdaddr)) {
2af6b9d5
MH
3721 lm1 |= HCI_LM_ACCEPT;
3722 if (l2cap_pi(sk)->role_switch)
3723 lm1 |= HCI_LM_MASTER;
1da177e4 3724 exact++;
2af6b9d5
MH
3725 } else if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY)) {
3726 lm2 |= HCI_LM_ACCEPT;
3727 if (l2cap_pi(sk)->role_switch)
3728 lm2 |= HCI_LM_MASTER;
3729 }
1da177e4
LT
3730 }
3731 read_unlock(&l2cap_sk_list.lock);
3732
3733 return exact ? lm1 : lm2;
3734}
3735
3736static int l2cap_connect_cfm(struct hci_conn *hcon, u8 status)
3737{
0139418c
MH
3738 struct l2cap_conn *conn;
3739
1da177e4
LT
3740 BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status);
3741
3742 if (hcon->type != ACL_LINK)
3743 return 0;
3744
3745 if (!status) {
1da177e4
LT
3746 conn = l2cap_conn_add(hcon, status);
3747 if (conn)
3748 l2cap_conn_ready(conn);
0139418c 3749 } else
1da177e4
LT
3750 l2cap_conn_del(hcon, bt_err(status));
3751
3752 return 0;
3753}
3754
2950f21a
MH
3755static int l2cap_disconn_ind(struct hci_conn *hcon)
3756{
3757 struct l2cap_conn *conn = hcon->l2cap_data;
3758
3759 BT_DBG("hcon %p", hcon);
3760
3761 if (hcon->type != ACL_LINK || !conn)
3762 return 0x13;
3763
3764 return conn->disc_reason;
3765}
3766
3767static int l2cap_disconn_cfm(struct hci_conn *hcon, u8 reason)
1da177e4
LT
3768{
3769 BT_DBG("hcon %p reason %d", hcon, reason);
3770
3771 if (hcon->type != ACL_LINK)
3772 return 0;
3773
3774 l2cap_conn_del(hcon, bt_err(reason));
0139418c 3775
1da177e4
LT
3776 return 0;
3777}
3778
f62e4323
MH
3779static inline void l2cap_check_encryption(struct sock *sk, u8 encrypt)
3780{
255c7601
MH
3781 if (sk->sk_type != SOCK_SEQPACKET)
3782 return;
3783
f62e4323
MH
3784 if (encrypt == 0x00) {
3785 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM) {
3786 l2cap_sock_clear_timer(sk);
3787 l2cap_sock_set_timer(sk, HZ * 5);
3788 } else if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
3789 __l2cap_sock_close(sk, ECONNREFUSED);
3790 } else {
3791 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM)
3792 l2cap_sock_clear_timer(sk);
3793 }
3794}
3795
8c1b2355 3796static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
1da177e4
LT
3797{
3798 struct l2cap_chan_list *l;
0139418c 3799 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 3800 struct sock *sk;
1da177e4 3801
0139418c 3802 if (!conn)
1da177e4 3803 return 0;
0139418c 3804
1da177e4
LT
3805 l = &conn->chan_list;
3806
3807 BT_DBG("conn %p", conn);
3808
3809 read_lock(&l->lock);
3810
3811 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
3812 bh_lock_sock(sk);
3813
6a8d3010
MH
3814 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_CONNECT_PEND) {
3815 bh_unlock_sock(sk);
3816 continue;
3817 }
3818
f62e4323 3819 if (!status && (sk->sk_state == BT_CONNECTED ||
8c1b2355 3820 sk->sk_state == BT_CONFIG)) {
f62e4323 3821 l2cap_check_encryption(sk, encrypt);
9719f8af
MH
3822 bh_unlock_sock(sk);
3823 continue;
3824 }
3825
b1235d79
MH
3826 if (sk->sk_state == BT_CONNECT) {
3827 if (!status) {
3828 struct l2cap_conn_req req;
3829 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
3830 req.psm = l2cap_pi(sk)->psm;
1da177e4 3831
b1235d79 3832 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
1da177e4 3833
b1235d79
MH
3834 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
3835 L2CAP_CONN_REQ, sizeof(req), &req);
3836 } else {
3837 l2cap_sock_clear_timer(sk);
3838 l2cap_sock_set_timer(sk, HZ / 10);
3839 }
3840 } else if (sk->sk_state == BT_CONNECT2) {
3841 struct l2cap_conn_rsp rsp;
3842 __u16 result;
1da177e4 3843
b1235d79
MH
3844 if (!status) {
3845 sk->sk_state = BT_CONFIG;
3846 result = L2CAP_CR_SUCCESS;
3847 } else {
3848 sk->sk_state = BT_DISCONN;
3849 l2cap_sock_set_timer(sk, HZ / 10);
3850 result = L2CAP_CR_SEC_BLOCK;
3851 }
3852
3853 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
3854 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
3855 rsp.result = cpu_to_le16(result);
e7c29cb1 3856 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
b1235d79
MH
3857 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
3858 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
3859 }
1da177e4
LT
3860
3861 bh_unlock_sock(sk);
3862 }
3863
3864 read_unlock(&l->lock);
b1235d79 3865
1da177e4
LT
3866 return 0;
3867}
3868
3869static int l2cap_recv_acldata(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
3870{
3871 struct l2cap_conn *conn = hcon->l2cap_data;
3872
3873 if (!conn && !(conn = l2cap_conn_add(hcon, 0)))
3874 goto drop;
3875
3876 BT_DBG("conn %p len %d flags 0x%x", conn, skb->len, flags);
3877
3878 if (flags & ACL_START) {
3879 struct l2cap_hdr *hdr;
3880 int len;
3881
3882 if (conn->rx_len) {
3883 BT_ERR("Unexpected start frame (len %d)", skb->len);
3884 kfree_skb(conn->rx_skb);
3885 conn->rx_skb = NULL;
3886 conn->rx_len = 0;
3887 l2cap_conn_unreliable(conn, ECOMM);
3888 }
3889
3890 if (skb->len < 2) {
3891 BT_ERR("Frame is too short (len %d)", skb->len);
3892 l2cap_conn_unreliable(conn, ECOMM);
3893 goto drop;
3894 }
3895
3896 hdr = (struct l2cap_hdr *) skb->data;
3897 len = __le16_to_cpu(hdr->len) + L2CAP_HDR_SIZE;
3898
3899 if (len == skb->len) {
3900 /* Complete frame received */
3901 l2cap_recv_frame(conn, skb);
3902 return 0;
3903 }
3904
3905 BT_DBG("Start: total len %d, frag len %d", len, skb->len);
3906
3907 if (skb->len > len) {
3908 BT_ERR("Frame is too long (len %d, expected len %d)",
3909 skb->len, len);
3910 l2cap_conn_unreliable(conn, ECOMM);
3911 goto drop;
3912 }
3913
3914 /* Allocate skb for the complete frame (with header) */
af05b30b
GP
3915 conn->rx_skb = bt_skb_alloc(len, GFP_ATOMIC);
3916 if (!conn->rx_skb)
1da177e4
LT
3917 goto drop;
3918
d626f62b 3919 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 3920 skb->len);
1da177e4
LT
3921 conn->rx_len = len - skb->len;
3922 } else {
3923 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, conn->rx_len);
3924
3925 if (!conn->rx_len) {
3926 BT_ERR("Unexpected continuation frame (len %d)", skb->len);
3927 l2cap_conn_unreliable(conn, ECOMM);
3928 goto drop;
3929 }
3930
3931 if (skb->len > conn->rx_len) {
3932 BT_ERR("Fragment is too long (len %d, expected %d)",
3933 skb->len, conn->rx_len);
3934 kfree_skb(conn->rx_skb);
3935 conn->rx_skb = NULL;
3936 conn->rx_len = 0;
3937 l2cap_conn_unreliable(conn, ECOMM);
3938 goto drop;
3939 }
3940
d626f62b 3941 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 3942 skb->len);
1da177e4
LT
3943 conn->rx_len -= skb->len;
3944
3945 if (!conn->rx_len) {
3946 /* Complete frame received */
3947 l2cap_recv_frame(conn, conn->rx_skb);
3948 conn->rx_skb = NULL;
3949 }
3950 }
3951
3952drop:
3953 kfree_skb(skb);
3954 return 0;
3955}
3956
aef7d97c 3957static int l2cap_debugfs_show(struct seq_file *f, void *p)
1da177e4
LT
3958{
3959 struct sock *sk;
3960 struct hlist_node *node;
1da177e4
LT
3961
3962 read_lock_bh(&l2cap_sk_list.lock);
3963
be9d1227
MH
3964 sk_for_each(sk, node, &l2cap_sk_list.head) {
3965 struct l2cap_pinfo *pi = l2cap_pi(sk);
101545f6 3966
aef7d97c
MH
3967 seq_printf(f, "%s %s %d %d 0x%4.4x 0x%4.4x %d %d %d\n",
3968 batostr(&bt_sk(sk)->src),
3969 batostr(&bt_sk(sk)->dst),
3970 sk->sk_state, __le16_to_cpu(pi->psm),
3971 pi->scid, pi->dcid,
3972 pi->imtu, pi->omtu, pi->sec_level);
be9d1227 3973 }
1da177e4 3974
1da177e4 3975 read_unlock_bh(&l2cap_sk_list.lock);
1da177e4 3976
aef7d97c 3977 return 0;
1da177e4
LT
3978}
3979
aef7d97c
MH
3980static int l2cap_debugfs_open(struct inode *inode, struct file *file)
3981{
3982 return single_open(file, l2cap_debugfs_show, inode->i_private);
3983}
3984
3985static const struct file_operations l2cap_debugfs_fops = {
3986 .open = l2cap_debugfs_open,
3987 .read = seq_read,
3988 .llseek = seq_lseek,
3989 .release = single_release,
3990};
3991
3992static struct dentry *l2cap_debugfs;
1da177e4 3993
90ddc4f0 3994static const struct proto_ops l2cap_sock_ops = {
1da177e4
LT
3995 .family = PF_BLUETOOTH,
3996 .owner = THIS_MODULE,
3997 .release = l2cap_sock_release,
3998 .bind = l2cap_sock_bind,
3999 .connect = l2cap_sock_connect,
4000 .listen = l2cap_sock_listen,
4001 .accept = l2cap_sock_accept,
4002 .getname = l2cap_sock_getname,
4003 .sendmsg = l2cap_sock_sendmsg,
f66dc81f 4004 .recvmsg = l2cap_sock_recvmsg,
1da177e4 4005 .poll = bt_sock_poll,
3241ad82 4006 .ioctl = bt_sock_ioctl,
1da177e4
LT
4007 .mmap = sock_no_mmap,
4008 .socketpair = sock_no_socketpair,
1da177e4
LT
4009 .shutdown = l2cap_sock_shutdown,
4010 .setsockopt = l2cap_sock_setsockopt,
4011 .getsockopt = l2cap_sock_getsockopt
4012};
4013
ec1b4cf7 4014static const struct net_proto_family l2cap_sock_family_ops = {
1da177e4
LT
4015 .family = PF_BLUETOOTH,
4016 .owner = THIS_MODULE,
4017 .create = l2cap_sock_create,
4018};
4019
4020static struct hci_proto l2cap_hci_proto = {
4021 .name = "L2CAP",
4022 .id = HCI_PROTO_L2CAP,
4023 .connect_ind = l2cap_connect_ind,
4024 .connect_cfm = l2cap_connect_cfm,
4025 .disconn_ind = l2cap_disconn_ind,
2950f21a 4026 .disconn_cfm = l2cap_disconn_cfm,
8c1b2355 4027 .security_cfm = l2cap_security_cfm,
1da177e4
LT
4028 .recv_acldata = l2cap_recv_acldata
4029};
4030
4031static int __init l2cap_init(void)
4032{
4033 int err;
be9d1227 4034
1da177e4
LT
4035 err = proto_register(&l2cap_proto, 0);
4036 if (err < 0)
4037 return err;
4038
4039 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
4040 if (err < 0) {
4041 BT_ERR("L2CAP socket registration failed");
4042 goto error;
4043 }
4044
4045 err = hci_register_proto(&l2cap_hci_proto);
4046 if (err < 0) {
4047 BT_ERR("L2CAP protocol registration failed");
4048 bt_sock_unregister(BTPROTO_L2CAP);
4049 goto error;
4050 }
4051
aef7d97c
MH
4052 if (bt_debugfs) {
4053 l2cap_debugfs = debugfs_create_file("l2cap", 0444,
4054 bt_debugfs, NULL, &l2cap_debugfs_fops);
4055 if (!l2cap_debugfs)
4056 BT_ERR("Failed to create L2CAP debug file");
4057 }
1da177e4
LT
4058
4059 BT_INFO("L2CAP ver %s", VERSION);
4060 BT_INFO("L2CAP socket layer initialized");
4061
4062 return 0;
4063
4064error:
4065 proto_unregister(&l2cap_proto);
4066 return err;
4067}
4068
4069static void __exit l2cap_exit(void)
4070{
aef7d97c 4071 debugfs_remove(l2cap_debugfs);
1da177e4
LT
4072
4073 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
4074 BT_ERR("L2CAP socket unregistration failed");
4075
4076 if (hci_unregister_proto(&l2cap_hci_proto) < 0)
4077 BT_ERR("L2CAP protocol unregistration failed");
4078
4079 proto_unregister(&l2cap_proto);
4080}
4081
4082void l2cap_load(void)
4083{
4084 /* Dummy function to trigger automatic L2CAP module loading by
4085 * other modules that use L2CAP sockets but don't use any other
4086 * symbols from it. */
4087 return;
4088}
4089EXPORT_SYMBOL(l2cap_load);
4090
4091module_init(l2cap_init);
4092module_exit(l2cap_exit);
4093
44dd46de
MH
4094module_param(enable_ertm, bool, 0644);
4095MODULE_PARM_DESC(enable_ertm, "Enable enhanced retransmission mode");
4096
5fbcd3d1
MH
4097module_param(max_transmit, uint, 0644);
4098MODULE_PARM_DESC(max_transmit, "Max transmit value (default = 3)");
4099
63fbd24e 4100MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
1da177e4
LT
4101MODULE_DESCRIPTION("Bluetooth L2CAP ver " VERSION);
4102MODULE_VERSION(VERSION);
4103MODULE_LICENSE("GPL");
4104MODULE_ALIAS("bt-proto-0");