]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/bluetooth/l2cap.c
Bluetooth: Add Kconfig option for L2CAP Extended Features
[net-next-2.6.git] / net / bluetooth / l2cap.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth L2CAP core and sockets. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
4fc268d2 30#include <linux/capability.h>
1da177e4
LT
31#include <linux/errno.h>
32#include <linux/kernel.h>
1da177e4
LT
33#include <linux/sched.h>
34#include <linux/slab.h>
35#include <linux/poll.h>
36#include <linux/fcntl.h>
37#include <linux/init.h>
38#include <linux/interrupt.h>
39#include <linux/socket.h>
40#include <linux/skbuff.h>
1da177e4 41#include <linux/list.h>
be9d1227 42#include <linux/device.h>
aef7d97c
MH
43#include <linux/debugfs.h>
44#include <linux/seq_file.h>
af05b30b 45#include <linux/uaccess.h>
fcc203c3 46#include <linux/crc16.h>
1da177e4
LT
47#include <net/sock.h>
48
49#include <asm/system.h>
1da177e4
LT
50#include <asm/unaligned.h>
51
52#include <net/bluetooth/bluetooth.h>
53#include <net/bluetooth/hci_core.h>
54#include <net/bluetooth/l2cap.h>
55
44dd46de
MH
56#define VERSION "2.14"
57
84fb0a63
GP
58#ifdef CONFIG_BT_L2CAP_EXT_FEATURES
59static int enable_ertm = 1;
60#else
44dd46de 61static int enable_ertm = 0;
84fb0a63 62#endif
5fbcd3d1 63static int max_transmit = L2CAP_DEFAULT_MAX_TX;
369ba302 64static int tx_window = L2CAP_DEFAULT_TX_WINDOW;
f0709e03 65
47ec1dcd 66static u32 l2cap_feat_mask = L2CAP_FEAT_FIXED_CHAN;
e1027a7c 67static u8 l2cap_fixed_chan[8] = { 0x02, };
1da177e4 68
90ddc4f0 69static const struct proto_ops l2cap_sock_ops;
1da177e4
LT
70
71static struct bt_sock_list l2cap_sk_list = {
d5fb2962 72 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
1da177e4
LT
73};
74
1da177e4
LT
75static void __l2cap_sock_close(struct sock *sk, int reason);
76static void l2cap_sock_close(struct sock *sk);
77static void l2cap_sock_kill(struct sock *sk);
78
79static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
80 u8 code, u8 ident, u16 dlen, void *data);
81
82/* ---- L2CAP timers ---- */
83static void l2cap_sock_timeout(unsigned long arg)
84{
85 struct sock *sk = (struct sock *) arg;
b1235d79 86 int reason;
1da177e4
LT
87
88 BT_DBG("sock %p state %d", sk, sk->sk_state);
89
90 bh_lock_sock(sk);
b1235d79 91
f62e4323
MH
92 if (sk->sk_state == BT_CONNECTED || sk->sk_state == BT_CONFIG)
93 reason = ECONNREFUSED;
94 else if (sk->sk_state == BT_CONNECT &&
2af6b9d5 95 l2cap_pi(sk)->sec_level != BT_SECURITY_SDP)
b1235d79
MH
96 reason = ECONNREFUSED;
97 else
98 reason = ETIMEDOUT;
99
100 __l2cap_sock_close(sk, reason);
101
1da177e4
LT
102 bh_unlock_sock(sk);
103
104 l2cap_sock_kill(sk);
105 sock_put(sk);
106}
107
108static void l2cap_sock_set_timer(struct sock *sk, long timeout)
109{
110 BT_DBG("sk %p state %d timeout %ld", sk, sk->sk_state, timeout);
111 sk_reset_timer(sk, &sk->sk_timer, jiffies + timeout);
112}
113
114static void l2cap_sock_clear_timer(struct sock *sk)
115{
116 BT_DBG("sock %p state %d", sk, sk->sk_state);
117 sk_stop_timer(sk, &sk->sk_timer);
118}
119
0139418c
MH
120/* ---- L2CAP channels ---- */
121static struct sock *__l2cap_get_chan_by_dcid(struct l2cap_chan_list *l, u16 cid)
122{
123 struct sock *s;
124 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
125 if (l2cap_pi(s)->dcid == cid)
126 break;
127 }
128 return s;
129}
130
131static struct sock *__l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
132{
133 struct sock *s;
134 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
135 if (l2cap_pi(s)->scid == cid)
136 break;
137 }
138 return s;
139}
140
141/* Find channel with given SCID.
142 * Returns locked socket */
143static inline struct sock *l2cap_get_chan_by_scid(struct l2cap_chan_list *l, u16 cid)
144{
145 struct sock *s;
146 read_lock(&l->lock);
147 s = __l2cap_get_chan_by_scid(l, cid);
af05b30b
GP
148 if (s)
149 bh_lock_sock(s);
0139418c
MH
150 read_unlock(&l->lock);
151 return s;
152}
153
154static struct sock *__l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
155{
156 struct sock *s;
157 for (s = l->head; s; s = l2cap_pi(s)->next_c) {
158 if (l2cap_pi(s)->ident == ident)
159 break;
160 }
161 return s;
162}
163
164static inline struct sock *l2cap_get_chan_by_ident(struct l2cap_chan_list *l, u8 ident)
165{
166 struct sock *s;
167 read_lock(&l->lock);
168 s = __l2cap_get_chan_by_ident(l, ident);
af05b30b
GP
169 if (s)
170 bh_lock_sock(s);
0139418c
MH
171 read_unlock(&l->lock);
172 return s;
173}
174
175static u16 l2cap_alloc_cid(struct l2cap_chan_list *l)
176{
8db4dc46 177 u16 cid = L2CAP_CID_DYN_START;
0139418c 178
8db4dc46 179 for (; cid < L2CAP_CID_DYN_END; cid++) {
af05b30b 180 if (!__l2cap_get_chan_by_scid(l, cid))
0139418c
MH
181 return cid;
182 }
183
184 return 0;
185}
186
187static inline void __l2cap_chan_link(struct l2cap_chan_list *l, struct sock *sk)
188{
189 sock_hold(sk);
190
191 if (l->head)
192 l2cap_pi(l->head)->prev_c = sk;
193
194 l2cap_pi(sk)->next_c = l->head;
195 l2cap_pi(sk)->prev_c = NULL;
196 l->head = sk;
197}
198
199static inline void l2cap_chan_unlink(struct l2cap_chan_list *l, struct sock *sk)
200{
201 struct sock *next = l2cap_pi(sk)->next_c, *prev = l2cap_pi(sk)->prev_c;
202
fd1278d7 203 write_lock_bh(&l->lock);
0139418c
MH
204 if (sk == l->head)
205 l->head = next;
206
207 if (next)
208 l2cap_pi(next)->prev_c = prev;
209 if (prev)
210 l2cap_pi(prev)->next_c = next;
fd1278d7 211 write_unlock_bh(&l->lock);
0139418c
MH
212
213 __sock_put(sk);
214}
215
216static void __l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
217{
218 struct l2cap_chan_list *l = &conn->chan_list;
219
af05b30b
GP
220 BT_DBG("conn %p, psm 0x%2.2x, dcid 0x%4.4x", conn,
221 l2cap_pi(sk)->psm, l2cap_pi(sk)->dcid);
0139418c 222
2950f21a
MH
223 conn->disc_reason = 0x13;
224
0139418c
MH
225 l2cap_pi(sk)->conn = conn;
226
227 if (sk->sk_type == SOCK_SEQPACKET) {
228 /* Alloc CID for connection-oriented socket */
229 l2cap_pi(sk)->scid = l2cap_alloc_cid(l);
230 } else if (sk->sk_type == SOCK_DGRAM) {
231 /* Connectionless socket */
8db4dc46
GP
232 l2cap_pi(sk)->scid = L2CAP_CID_CONN_LESS;
233 l2cap_pi(sk)->dcid = L2CAP_CID_CONN_LESS;
0139418c
MH
234 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
235 } else {
236 /* Raw socket can send/recv signalling messages only */
8db4dc46
GP
237 l2cap_pi(sk)->scid = L2CAP_CID_SIGNALING;
238 l2cap_pi(sk)->dcid = L2CAP_CID_SIGNALING;
0139418c
MH
239 l2cap_pi(sk)->omtu = L2CAP_DEFAULT_MTU;
240 }
241
242 __l2cap_chan_link(l, sk);
243
244 if (parent)
245 bt_accept_enqueue(parent, sk);
246}
247
8e87d142 248/* Delete channel.
0139418c
MH
249 * Must be called on the locked socket. */
250static void l2cap_chan_del(struct sock *sk, int err)
251{
252 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
253 struct sock *parent = bt_sk(sk)->parent;
254
255 l2cap_sock_clear_timer(sk);
256
257 BT_DBG("sk %p, conn %p, err %d", sk, conn, err);
258
8e87d142 259 if (conn) {
0139418c
MH
260 /* Unlink from channel list */
261 l2cap_chan_unlink(&conn->chan_list, sk);
262 l2cap_pi(sk)->conn = NULL;
263 hci_conn_put(conn->hcon);
264 }
265
b1235d79 266 sk->sk_state = BT_CLOSED;
0139418c
MH
267 sock_set_flag(sk, SOCK_ZAPPED);
268
269 if (err)
270 sk->sk_err = err;
271
272 if (parent) {
273 bt_accept_unlink(sk);
274 parent->sk_data_ready(parent, 0);
275 } else
276 sk->sk_state_change(sk);
277}
278
79d554a6 279/* Service level security */
2af6b9d5 280static inline int l2cap_check_security(struct sock *sk)
79d554a6
MH
281{
282 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
0684e5f9
MH
283 __u8 auth_type;
284
00ae4af9
MH
285 if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
286 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
287 auth_type = HCI_AT_NO_BONDING_MITM;
288 else
af05b30b 289 auth_type = HCI_AT_NO_BONDING;
00ae4af9
MH
290
291 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
292 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
293 } else {
294 switch (l2cap_pi(sk)->sec_level) {
295 case BT_SECURITY_HIGH:
296 auth_type = HCI_AT_GENERAL_BONDING_MITM;
297 break;
298 case BT_SECURITY_MEDIUM:
299 auth_type = HCI_AT_GENERAL_BONDING;
300 break;
301 default:
302 auth_type = HCI_AT_NO_BONDING;
303 break;
304 }
0684e5f9 305 }
79d554a6 306
0684e5f9
MH
307 return hci_conn_security(conn->hcon, l2cap_pi(sk)->sec_level,
308 auth_type);
79d554a6
MH
309}
310
4e8402a3
MH
311static inline u8 l2cap_get_ident(struct l2cap_conn *conn)
312{
313 u8 id;
314
315 /* Get next available identificator.
316 * 1 - 128 are used by kernel.
317 * 129 - 199 are reserved.
318 * 200 - 254 are used by utilities like l2ping, etc.
319 */
320
321 spin_lock_bh(&conn->lock);
322
323 if (++conn->tx_ident > 128)
324 conn->tx_ident = 1;
325
326 id = conn->tx_ident;
327
328 spin_unlock_bh(&conn->lock);
329
330 return id;
331}
332
333static inline int l2cap_send_cmd(struct l2cap_conn *conn, u8 ident, u8 code, u16 len, void *data)
334{
335 struct sk_buff *skb = l2cap_build_cmd(conn, code, ident, len, data);
336
337 BT_DBG("code 0x%2.2x", code);
338
339 if (!skb)
340 return -ENOMEM;
341
342 return hci_send_acl(conn->hcon, skb, 0);
343}
344
1c2acffb
GP
345static inline int l2cap_send_sframe(struct l2cap_pinfo *pi, u16 control)
346{
347 struct sk_buff *skb;
348 struct l2cap_hdr *lh;
349 struct l2cap_conn *conn = pi->conn;
fcc203c3
GP
350 int count, hlen = L2CAP_HDR_SIZE + 2;
351
352 if (pi->fcs == L2CAP_FCS_CRC16)
353 hlen += 2;
1c2acffb
GP
354
355 BT_DBG("pi %p, control 0x%2.2x", pi, control);
356
fcc203c3 357 count = min_t(unsigned int, conn->mtu, hlen);
1c2acffb
GP
358 control |= L2CAP_CTRL_FRAME_TYPE;
359
9e917af1
GP
360 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
361 control |= L2CAP_CTRL_FINAL;
362 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
363 }
364
f0946ccf
GP
365 if (pi->conn_state & L2CAP_CONN_SEND_PBIT) {
366 control |= L2CAP_CTRL_POLL;
367 pi->conn_state &= ~L2CAP_CONN_SEND_PBIT;
368 }
369
1c2acffb
GP
370 skb = bt_skb_alloc(count, GFP_ATOMIC);
371 if (!skb)
372 return -ENOMEM;
373
374 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
fcc203c3 375 lh->len = cpu_to_le16(hlen - L2CAP_HDR_SIZE);
1c2acffb
GP
376 lh->cid = cpu_to_le16(pi->dcid);
377 put_unaligned_le16(control, skb_put(skb, 2));
378
fcc203c3
GP
379 if (pi->fcs == L2CAP_FCS_CRC16) {
380 u16 fcs = crc16(0, (u8 *)lh, count - 2);
381 put_unaligned_le16(fcs, skb_put(skb, 2));
382 }
383
1c2acffb
GP
384 return hci_send_acl(pi->conn->hcon, skb, 0);
385}
386
7e743090
GP
387static inline int l2cap_send_rr_or_rnr(struct l2cap_pinfo *pi, u16 control)
388{
389 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY)
390 control |= L2CAP_SUPER_RCV_NOT_READY;
391 else
392 control |= L2CAP_SUPER_RCV_READY;
393
2ab25cdd
GP
394 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
395
7e743090
GP
396 return l2cap_send_sframe(pi, control);
397}
398
79d554a6
MH
399static void l2cap_do_start(struct sock *sk)
400{
401 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
402
403 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) {
984947dc
MH
404 if (!(conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE))
405 return;
406
2af6b9d5 407 if (l2cap_check_security(sk)) {
b1235d79
MH
408 struct l2cap_conn_req req;
409 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
410 req.psm = l2cap_pi(sk)->psm;
79d554a6 411
b1235d79 412 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 413
b1235d79 414 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
79d554a6 415 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 416 }
79d554a6
MH
417 } else {
418 struct l2cap_info_req req;
419 req.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
420
421 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
422 conn->info_ident = l2cap_get_ident(conn);
423
424 mod_timer(&conn->info_timer, jiffies +
425 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
426
427 l2cap_send_cmd(conn, conn->info_ident,
428 L2CAP_INFO_REQ, sizeof(req), &req);
429 }
430}
431
22121fc9
GP
432static void l2cap_send_disconn_req(struct l2cap_conn *conn, struct sock *sk)
433{
434 struct l2cap_disconn_req req;
435
436 req.dcid = cpu_to_le16(l2cap_pi(sk)->dcid);
437 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
438 l2cap_send_cmd(conn, l2cap_get_ident(conn),
439 L2CAP_DISCONN_REQ, sizeof(req), &req);
440}
441
1da177e4 442/* ---- L2CAP connections ---- */
4e8402a3
MH
443static void l2cap_conn_start(struct l2cap_conn *conn)
444{
445 struct l2cap_chan_list *l = &conn->chan_list;
446 struct sock *sk;
447
448 BT_DBG("conn %p", conn);
449
450 read_lock(&l->lock);
451
452 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
453 bh_lock_sock(sk);
454
455 if (sk->sk_type != SOCK_SEQPACKET) {
79d554a6
MH
456 bh_unlock_sock(sk);
457 continue;
458 }
459
460 if (sk->sk_state == BT_CONNECT) {
2af6b9d5 461 if (l2cap_check_security(sk)) {
b1235d79
MH
462 struct l2cap_conn_req req;
463 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
464 req.psm = l2cap_pi(sk)->psm;
79d554a6 465
b1235d79 466 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
79d554a6 467
b1235d79 468 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4e8402a3 469 L2CAP_CONN_REQ, sizeof(req), &req);
b1235d79 470 }
79d554a6
MH
471 } else if (sk->sk_state == BT_CONNECT2) {
472 struct l2cap_conn_rsp rsp;
473 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
474 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
475
2af6b9d5 476 if (l2cap_check_security(sk)) {
f66dc81f
MH
477 if (bt_sk(sk)->defer_setup) {
478 struct sock *parent = bt_sk(sk)->parent;
479 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
480 rsp.status = cpu_to_le16(L2CAP_CS_AUTHOR_PEND);
481 parent->sk_data_ready(parent, 0);
482
483 } else {
484 sk->sk_state = BT_CONFIG;
485 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
486 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
487 }
79d554a6
MH
488 } else {
489 rsp.result = cpu_to_le16(L2CAP_CR_PEND);
490 rsp.status = cpu_to_le16(L2CAP_CS_AUTHEN_PEND);
491 }
492
493 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
494 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4e8402a3
MH
495 }
496
497 bh_unlock_sock(sk);
498 }
499
500 read_unlock(&l->lock);
501}
502
503static void l2cap_conn_ready(struct l2cap_conn *conn)
504{
79d554a6
MH
505 struct l2cap_chan_list *l = &conn->chan_list;
506 struct sock *sk;
4e8402a3 507
79d554a6 508 BT_DBG("conn %p", conn);
4e8402a3 509
79d554a6 510 read_lock(&l->lock);
4e8402a3 511
79d554a6
MH
512 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
513 bh_lock_sock(sk);
4e8402a3 514
79d554a6
MH
515 if (sk->sk_type != SOCK_SEQPACKET) {
516 l2cap_sock_clear_timer(sk);
517 sk->sk_state = BT_CONNECTED;
518 sk->sk_state_change(sk);
519 } else if (sk->sk_state == BT_CONNECT)
520 l2cap_do_start(sk);
4e8402a3 521
79d554a6 522 bh_unlock_sock(sk);
4e8402a3 523 }
79d554a6
MH
524
525 read_unlock(&l->lock);
4e8402a3
MH
526}
527
528/* Notify sockets that we cannot guaranty reliability anymore */
529static void l2cap_conn_unreliable(struct l2cap_conn *conn, int err)
530{
531 struct l2cap_chan_list *l = &conn->chan_list;
532 struct sock *sk;
533
534 BT_DBG("conn %p", conn);
535
536 read_lock(&l->lock);
537
538 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2af6b9d5 539 if (l2cap_pi(sk)->force_reliable)
4e8402a3
MH
540 sk->sk_err = err;
541 }
542
543 read_unlock(&l->lock);
544}
545
546static void l2cap_info_timeout(unsigned long arg)
547{
548 struct l2cap_conn *conn = (void *) arg;
549
984947dc 550 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 551 conn->info_ident = 0;
984947dc 552
4e8402a3
MH
553 l2cap_conn_start(conn);
554}
555
1da177e4
LT
556static struct l2cap_conn *l2cap_conn_add(struct hci_conn *hcon, u8 status)
557{
0139418c 558 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 559
0139418c 560 if (conn || status)
1da177e4
LT
561 return conn;
562
0139418c
MH
563 conn = kzalloc(sizeof(struct l2cap_conn), GFP_ATOMIC);
564 if (!conn)
1da177e4 565 return NULL;
1da177e4
LT
566
567 hcon->l2cap_data = conn;
568 conn->hcon = hcon;
569
0139418c
MH
570 BT_DBG("hcon %p conn %p", hcon, conn);
571
1da177e4
LT
572 conn->mtu = hcon->hdev->acl_mtu;
573 conn->src = &hcon->hdev->bdaddr;
574 conn->dst = &hcon->dst;
575
4e8402a3
MH
576 conn->feat_mask = 0;
577
1da177e4
LT
578 spin_lock_init(&conn->lock);
579 rwlock_init(&conn->chan_list.lock);
580
45054dc1
DY
581 setup_timer(&conn->info_timer, l2cap_info_timeout,
582 (unsigned long) conn);
583
2950f21a
MH
584 conn->disc_reason = 0x13;
585
1da177e4
LT
586 return conn;
587}
588
0139418c 589static void l2cap_conn_del(struct hci_conn *hcon, int err)
1da177e4 590{
0139418c 591 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4
LT
592 struct sock *sk;
593
0139418c
MH
594 if (!conn)
595 return;
1da177e4
LT
596
597 BT_DBG("hcon %p conn %p, err %d", hcon, conn, err);
598
7585b97a 599 kfree_skb(conn->rx_skb);
1da177e4
LT
600
601 /* Kill channels */
602 while ((sk = conn->chan_list.head)) {
603 bh_lock_sock(sk);
604 l2cap_chan_del(sk, err);
605 bh_unlock_sock(sk);
606 l2cap_sock_kill(sk);
607 }
608
8e8440f5
DY
609 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT)
610 del_timer_sync(&conn->info_timer);
3ab22731 611
1da177e4
LT
612 hcon->l2cap_data = NULL;
613 kfree(conn);
1da177e4
LT
614}
615
616static inline void l2cap_chan_add(struct l2cap_conn *conn, struct sock *sk, struct sock *parent)
617{
618 struct l2cap_chan_list *l = &conn->chan_list;
fd1278d7 619 write_lock_bh(&l->lock);
1da177e4 620 __l2cap_chan_add(conn, sk, parent);
fd1278d7 621 write_unlock_bh(&l->lock);
1da177e4
LT
622}
623
1da177e4 624/* ---- Socket interface ---- */
8e036fc3 625static struct sock *__l2cap_get_sock_by_addr(__le16 psm, bdaddr_t *src)
1da177e4
LT
626{
627 struct sock *sk;
628 struct hlist_node *node;
629 sk_for_each(sk, node, &l2cap_sk_list.head)
630 if (l2cap_pi(sk)->sport == psm && !bacmp(&bt_sk(sk)->src, src))
631 goto found;
632 sk = NULL;
633found:
634 return sk;
635}
636
637/* Find socket with psm and source bdaddr.
638 * Returns closest match.
639 */
8e036fc3 640static struct sock *__l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
641{
642 struct sock *sk = NULL, *sk1 = NULL;
643 struct hlist_node *node;
644
645 sk_for_each(sk, node, &l2cap_sk_list.head) {
646 if (state && sk->sk_state != state)
647 continue;
648
649 if (l2cap_pi(sk)->psm == psm) {
650 /* Exact match. */
651 if (!bacmp(&bt_sk(sk)->src, src))
652 break;
653
654 /* Closest match */
655 if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY))
656 sk1 = sk;
657 }
658 }
659 return node ? sk : sk1;
660}
661
662/* Find socket with given address (psm, src).
663 * Returns locked socket */
8e036fc3 664static inline struct sock *l2cap_get_sock_by_psm(int state, __le16 psm, bdaddr_t *src)
1da177e4
LT
665{
666 struct sock *s;
667 read_lock(&l2cap_sk_list.lock);
668 s = __l2cap_get_sock_by_psm(state, psm, src);
af05b30b
GP
669 if (s)
670 bh_lock_sock(s);
1da177e4
LT
671 read_unlock(&l2cap_sk_list.lock);
672 return s;
673}
674
675static void l2cap_sock_destruct(struct sock *sk)
676{
677 BT_DBG("sk %p", sk);
678
679 skb_queue_purge(&sk->sk_receive_queue);
680 skb_queue_purge(&sk->sk_write_queue);
681}
682
683static void l2cap_sock_cleanup_listen(struct sock *parent)
684{
685 struct sock *sk;
686
687 BT_DBG("parent %p", parent);
688
689 /* Close not yet accepted channels */
690 while ((sk = bt_accept_dequeue(parent, NULL)))
691 l2cap_sock_close(sk);
692
b1235d79 693 parent->sk_state = BT_CLOSED;
1da177e4
LT
694 sock_set_flag(parent, SOCK_ZAPPED);
695}
696
697/* Kill socket (only if zapped and orphan)
698 * Must be called on unlocked socket.
699 */
700static void l2cap_sock_kill(struct sock *sk)
701{
702 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
703 return;
704
705 BT_DBG("sk %p state %d", sk, sk->sk_state);
706
707 /* Kill poor orphan */
708 bt_sock_unlink(&l2cap_sk_list, sk);
709 sock_set_flag(sk, SOCK_DEAD);
710 sock_put(sk);
711}
712
713static void __l2cap_sock_close(struct sock *sk, int reason)
714{
715 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
716
717 switch (sk->sk_state) {
718 case BT_LISTEN:
719 l2cap_sock_cleanup_listen(sk);
720 break;
721
722 case BT_CONNECTED:
723 case BT_CONFIG:
1da177e4
LT
724 if (sk->sk_type == SOCK_SEQPACKET) {
725 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1da177e4
LT
726
727 sk->sk_state = BT_DISCONN;
728 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
22121fc9 729 l2cap_send_disconn_req(conn, sk);
b1235d79 730 } else
1da177e4 731 l2cap_chan_del(sk, reason);
1da177e4
LT
732 break;
733
f66dc81f
MH
734 case BT_CONNECT2:
735 if (sk->sk_type == SOCK_SEQPACKET) {
736 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
737 struct l2cap_conn_rsp rsp;
738 __u16 result;
739
740 if (bt_sk(sk)->defer_setup)
741 result = L2CAP_CR_SEC_BLOCK;
742 else
743 result = L2CAP_CR_BAD_PSM;
744
745 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
746 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
747 rsp.result = cpu_to_le16(result);
748 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
749 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
750 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
751 } else
752 l2cap_chan_del(sk, reason);
753 break;
754
1da177e4
LT
755 case BT_CONNECT:
756 case BT_DISCONN:
757 l2cap_chan_del(sk, reason);
758 break;
759
760 default:
761 sock_set_flag(sk, SOCK_ZAPPED);
762 break;
763 }
764}
765
766/* Must be called on unlocked socket. */
767static void l2cap_sock_close(struct sock *sk)
768{
769 l2cap_sock_clear_timer(sk);
770 lock_sock(sk);
771 __l2cap_sock_close(sk, ECONNRESET);
772 release_sock(sk);
773 l2cap_sock_kill(sk);
774}
775
776static void l2cap_sock_init(struct sock *sk, struct sock *parent)
777{
778 struct l2cap_pinfo *pi = l2cap_pi(sk);
779
780 BT_DBG("sk %p", sk);
781
782 if (parent) {
783 sk->sk_type = parent->sk_type;
f66dc81f
MH
784 bt_sk(sk)->defer_setup = bt_sk(parent)->defer_setup;
785
1da177e4
LT
786 pi->imtu = l2cap_pi(parent)->imtu;
787 pi->omtu = l2cap_pi(parent)->omtu;
c6b03cf9
MH
788 pi->mode = l2cap_pi(parent)->mode;
789 pi->fcs = l2cap_pi(parent)->fcs;
68d7f0ce 790 pi->max_tx = l2cap_pi(parent)->max_tx;
14b5aa71 791 pi->tx_win = l2cap_pi(parent)->tx_win;
2af6b9d5
MH
792 pi->sec_level = l2cap_pi(parent)->sec_level;
793 pi->role_switch = l2cap_pi(parent)->role_switch;
794 pi->force_reliable = l2cap_pi(parent)->force_reliable;
1da177e4
LT
795 } else {
796 pi->imtu = L2CAP_DEFAULT_MTU;
797 pi->omtu = 0;
c6b03cf9 798 pi->mode = L2CAP_MODE_BASIC;
68d7f0ce 799 pi->max_tx = max_transmit;
c6b03cf9 800 pi->fcs = L2CAP_FCS_CRC16;
369ba302 801 pi->tx_win = tx_window;
2af6b9d5
MH
802 pi->sec_level = BT_SECURITY_LOW;
803 pi->role_switch = 0;
804 pi->force_reliable = 0;
1da177e4
LT
805 }
806
807 /* Default config options */
5dee9e7c 808 pi->conf_len = 0;
1da177e4 809 pi->flush_to = L2CAP_DEFAULT_FLUSH_TO;
45054dc1
DY
810 skb_queue_head_init(TX_QUEUE(sk));
811 skb_queue_head_init(SREJ_QUEUE(sk));
812 INIT_LIST_HEAD(SREJ_LIST(sk));
1da177e4
LT
813}
814
815static struct proto l2cap_proto = {
816 .name = "L2CAP",
817 .owner = THIS_MODULE,
818 .obj_size = sizeof(struct l2cap_pinfo)
819};
820
1b8d7ae4 821static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
1da177e4
LT
822{
823 struct sock *sk;
824
6257ff21 825 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1da177e4
LT
826 if (!sk)
827 return NULL;
828
829 sock_init_data(sock, sk);
830 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
831
832 sk->sk_destruct = l2cap_sock_destruct;
4e8402a3 833 sk->sk_sndtimeo = msecs_to_jiffies(L2CAP_CONN_TIMEOUT);
1da177e4
LT
834
835 sock_reset_flag(sk, SOCK_ZAPPED);
836
837 sk->sk_protocol = proto;
b1235d79 838 sk->sk_state = BT_OPEN;
1da177e4 839
b1235d79 840 setup_timer(&sk->sk_timer, l2cap_sock_timeout, (unsigned long) sk);
1da177e4
LT
841
842 bt_sock_link(&l2cap_sk_list, sk);
843 return sk;
844}
845
3f378b68
EP
846static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
847 int kern)
1da177e4
LT
848{
849 struct sock *sk;
850
851 BT_DBG("sock %p", sock);
852
853 sock->state = SS_UNCONNECTED;
854
855 if (sock->type != SOCK_SEQPACKET &&
856 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
857 return -ESOCKTNOSUPPORT;
858
c84b3268 859 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1da177e4
LT
860 return -EPERM;
861
862 sock->ops = &l2cap_sock_ops;
863
1b8d7ae4 864 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1da177e4
LT
865 if (!sk)
866 return -ENOMEM;
867
868 l2cap_sock_init(sk, NULL);
869 return 0;
870}
871
f29972de 872static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
1da177e4 873{
1da177e4 874 struct sock *sk = sock->sk;
f29972de
MH
875 struct sockaddr_l2 la;
876 int len, err = 0;
1da177e4 877
f29972de 878 BT_DBG("sk %p", sk);
1da177e4
LT
879
880 if (!addr || addr->sa_family != AF_BLUETOOTH)
881 return -EINVAL;
882
f29972de
MH
883 memset(&la, 0, sizeof(la));
884 len = min_t(unsigned int, sizeof(la), alen);
885 memcpy(&la, addr, len);
886
2a517ca6
MH
887 if (la.l2_cid)
888 return -EINVAL;
889
1da177e4
LT
890 lock_sock(sk);
891
892 if (sk->sk_state != BT_OPEN) {
893 err = -EBADFD;
894 goto done;
895 }
896
b4324b5d 897 if (la.l2_psm && __le16_to_cpu(la.l2_psm) < 0x1001 &&
847641d7
MH
898 !capable(CAP_NET_BIND_SERVICE)) {
899 err = -EACCES;
900 goto done;
901 }
8e87d142 902
1da177e4
LT
903 write_lock_bh(&l2cap_sk_list.lock);
904
f29972de 905 if (la.l2_psm && __l2cap_get_sock_by_addr(la.l2_psm, &la.l2_bdaddr)) {
1da177e4
LT
906 err = -EADDRINUSE;
907 } else {
908 /* Save source address */
f29972de
MH
909 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
910 l2cap_pi(sk)->psm = la.l2_psm;
911 l2cap_pi(sk)->sport = la.l2_psm;
1da177e4 912 sk->sk_state = BT_BOUND;
2af6b9d5 913
b4324b5d
MH
914 if (__le16_to_cpu(la.l2_psm) == 0x0001 ||
915 __le16_to_cpu(la.l2_psm) == 0x0003)
2af6b9d5 916 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
1da177e4
LT
917 }
918
919 write_unlock_bh(&l2cap_sk_list.lock);
920
921done:
922 release_sock(sk);
923 return err;
924}
925
926static int l2cap_do_connect(struct sock *sk)
927{
928 bdaddr_t *src = &bt_sk(sk)->src;
929 bdaddr_t *dst = &bt_sk(sk)->dst;
930 struct l2cap_conn *conn;
931 struct hci_conn *hcon;
932 struct hci_dev *hdev;
09ab6f4c 933 __u8 auth_type;
44d0e48e 934 int err;
1da177e4 935
f29972de
MH
936 BT_DBG("%s -> %s psm 0x%2.2x", batostr(src), batostr(dst),
937 l2cap_pi(sk)->psm);
1da177e4 938
af05b30b
GP
939 hdev = hci_get_route(dst, src);
940 if (!hdev)
1da177e4
LT
941 return -EHOSTUNREACH;
942
943 hci_dev_lock_bh(hdev);
944
945 err = -ENOMEM;
946
8c1b2355 947 if (sk->sk_type == SOCK_RAW) {
2af6b9d5
MH
948 switch (l2cap_pi(sk)->sec_level) {
949 case BT_SECURITY_HIGH:
8c1b2355 950 auth_type = HCI_AT_DEDICATED_BONDING_MITM;
2af6b9d5
MH
951 break;
952 case BT_SECURITY_MEDIUM:
8c1b2355 953 auth_type = HCI_AT_DEDICATED_BONDING;
2af6b9d5
MH
954 break;
955 default:
09ab6f4c 956 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
957 break;
958 }
8c1b2355 959 } else if (l2cap_pi(sk)->psm == cpu_to_le16(0x0001)) {
2af6b9d5 960 if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
8c1b2355 961 auth_type = HCI_AT_NO_BONDING_MITM;
09ab6f4c 962 else
8c1b2355 963 auth_type = HCI_AT_NO_BONDING;
435fef20
MH
964
965 if (l2cap_pi(sk)->sec_level == BT_SECURITY_LOW)
966 l2cap_pi(sk)->sec_level = BT_SECURITY_SDP;
8c1b2355 967 } else {
2af6b9d5
MH
968 switch (l2cap_pi(sk)->sec_level) {
969 case BT_SECURITY_HIGH:
8c1b2355 970 auth_type = HCI_AT_GENERAL_BONDING_MITM;
2af6b9d5
MH
971 break;
972 case BT_SECURITY_MEDIUM:
09ab6f4c 973 auth_type = HCI_AT_GENERAL_BONDING;
2af6b9d5
MH
974 break;
975 default:
8c1b2355 976 auth_type = HCI_AT_NO_BONDING;
2af6b9d5
MH
977 break;
978 }
09ab6f4c
MH
979 }
980
2af6b9d5
MH
981 hcon = hci_connect(hdev, ACL_LINK, dst,
982 l2cap_pi(sk)->sec_level, auth_type);
1da177e4
LT
983 if (!hcon)
984 goto done;
985
986 conn = l2cap_conn_add(hcon, 0);
987 if (!conn) {
988 hci_conn_put(hcon);
989 goto done;
990 }
991
992 err = 0;
993
994 /* Update source addr of the socket */
995 bacpy(src, conn->src);
996
997 l2cap_chan_add(conn, sk, NULL);
998
999 sk->sk_state = BT_CONNECT;
1000 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
1001
1002 if (hcon->state == BT_CONNECTED) {
79d554a6 1003 if (sk->sk_type != SOCK_SEQPACKET) {
1da177e4
LT
1004 l2cap_sock_clear_timer(sk);
1005 sk->sk_state = BT_CONNECTED;
79d554a6
MH
1006 } else
1007 l2cap_do_start(sk);
1da177e4
LT
1008 }
1009
1010done:
1011 hci_dev_unlock_bh(hdev);
1012 hci_dev_put(hdev);
1013 return err;
1014}
1015
1016static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
1017{
1da177e4 1018 struct sock *sk = sock->sk;
f29972de
MH
1019 struct sockaddr_l2 la;
1020 int len, err = 0;
1da177e4 1021
1da177e4
LT
1022 BT_DBG("sk %p", sk);
1023
6503d961
CG
1024 if (!addr || alen < sizeof(addr->sa_family) ||
1025 addr->sa_family != AF_BLUETOOTH)
2a517ca6 1026 return -EINVAL;
1da177e4 1027
f29972de
MH
1028 memset(&la, 0, sizeof(la));
1029 len = min_t(unsigned int, sizeof(la), alen);
1030 memcpy(&la, addr, len);
1031
2a517ca6
MH
1032 if (la.l2_cid)
1033 return -EINVAL;
1034
1035 lock_sock(sk);
1036
f29972de 1037 if (sk->sk_type == SOCK_SEQPACKET && !la.l2_psm) {
1da177e4
LT
1038 err = -EINVAL;
1039 goto done;
1040 }
1041
c6b03cf9
MH
1042 switch (l2cap_pi(sk)->mode) {
1043 case L2CAP_MODE_BASIC:
1044 break;
1045 case L2CAP_MODE_ERTM:
f2fcfcd6 1046 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1047 if (enable_ertm)
1048 break;
1049 /* fall through */
1050 default:
1051 err = -ENOTSUPP;
1052 goto done;
1053 }
1054
af05b30b 1055 switch (sk->sk_state) {
1da177e4
LT
1056 case BT_CONNECT:
1057 case BT_CONNECT2:
1058 case BT_CONFIG:
1059 /* Already connecting */
1060 goto wait;
1061
1062 case BT_CONNECTED:
1063 /* Already connected */
1064 goto done;
1065
1066 case BT_OPEN:
1067 case BT_BOUND:
1068 /* Can connect */
1069 break;
1070
1071 default:
1072 err = -EBADFD;
1073 goto done;
1074 }
1075
1076 /* Set destination address and psm */
f29972de
MH
1077 bacpy(&bt_sk(sk)->dst, &la.l2_bdaddr);
1078 l2cap_pi(sk)->psm = la.l2_psm;
1da177e4 1079
af05b30b
GP
1080 err = l2cap_do_connect(sk);
1081 if (err)
1da177e4
LT
1082 goto done;
1083
1084wait:
1085 err = bt_sock_wait_state(sk, BT_CONNECTED,
1086 sock_sndtimeo(sk, flags & O_NONBLOCK));
1087done:
1088 release_sock(sk);
1089 return err;
1090}
1091
1092static int l2cap_sock_listen(struct socket *sock, int backlog)
1093{
1094 struct sock *sk = sock->sk;
1095 int err = 0;
1096
1097 BT_DBG("sk %p backlog %d", sk, backlog);
1098
1099 lock_sock(sk);
1100
1101 if (sk->sk_state != BT_BOUND || sock->type != SOCK_SEQPACKET) {
1102 err = -EBADFD;
1103 goto done;
1104 }
1105
c6b03cf9
MH
1106 switch (l2cap_pi(sk)->mode) {
1107 case L2CAP_MODE_BASIC:
1108 break;
1109 case L2CAP_MODE_ERTM:
f2fcfcd6 1110 case L2CAP_MODE_STREAMING:
c6b03cf9
MH
1111 if (enable_ertm)
1112 break;
1113 /* fall through */
1114 default:
1115 err = -ENOTSUPP;
1116 goto done;
1117 }
1118
1da177e4
LT
1119 if (!l2cap_pi(sk)->psm) {
1120 bdaddr_t *src = &bt_sk(sk)->src;
1121 u16 psm;
1122
1123 err = -EINVAL;
1124
1125 write_lock_bh(&l2cap_sk_list.lock);
1126
1127 for (psm = 0x1001; psm < 0x1100; psm += 2)
b4324b5d
MH
1128 if (!__l2cap_get_sock_by_addr(cpu_to_le16(psm), src)) {
1129 l2cap_pi(sk)->psm = cpu_to_le16(psm);
1130 l2cap_pi(sk)->sport = cpu_to_le16(psm);
1da177e4
LT
1131 err = 0;
1132 break;
1133 }
1134
1135 write_unlock_bh(&l2cap_sk_list.lock);
1136
1137 if (err < 0)
1138 goto done;
1139 }
1140
1141 sk->sk_max_ack_backlog = backlog;
1142 sk->sk_ack_backlog = 0;
1143 sk->sk_state = BT_LISTEN;
1144
1145done:
1146 release_sock(sk);
1147 return err;
1148}
1149
1150static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
1151{
1152 DECLARE_WAITQUEUE(wait, current);
1153 struct sock *sk = sock->sk, *nsk;
1154 long timeo;
1155 int err = 0;
1156
fcc70d5f 1157 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1158
1159 if (sk->sk_state != BT_LISTEN) {
1160 err = -EBADFD;
1161 goto done;
1162 }
1163
1164 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
1165
1166 BT_DBG("sk %p timeo %ld", sk, timeo);
1167
1168 /* Wait for an incoming connection. (wake-one). */
aa395145 1169 add_wait_queue_exclusive(sk_sleep(sk), &wait);
1da177e4
LT
1170 while (!(nsk = bt_accept_dequeue(sk, newsock))) {
1171 set_current_state(TASK_INTERRUPTIBLE);
1172 if (!timeo) {
1173 err = -EAGAIN;
1174 break;
1175 }
1176
1177 release_sock(sk);
1178 timeo = schedule_timeout(timeo);
fcc70d5f 1179 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
1da177e4
LT
1180
1181 if (sk->sk_state != BT_LISTEN) {
1182 err = -EBADFD;
1183 break;
1184 }
1185
1186 if (signal_pending(current)) {
1187 err = sock_intr_errno(timeo);
1188 break;
1189 }
1190 }
1191 set_current_state(TASK_RUNNING);
aa395145 1192 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
1193
1194 if (err)
1195 goto done;
1196
1197 newsock->state = SS_CONNECTED;
1198
1199 BT_DBG("new socket %p", nsk);
1200
1201done:
1202 release_sock(sk);
1203 return err;
1204}
1205
1206static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
1207{
1208 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
1209 struct sock *sk = sock->sk;
1210
1211 BT_DBG("sock %p, sk %p", sock, sk);
1212
1213 addr->sa_family = AF_BLUETOOTH;
1214 *len = sizeof(struct sockaddr_l2);
1215
f29972de
MH
1216 if (peer) {
1217 la->l2_psm = l2cap_pi(sk)->psm;
1da177e4 1218 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
b4324b5d 1219 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->dcid);
f29972de
MH
1220 } else {
1221 la->l2_psm = l2cap_pi(sk)->sport;
1da177e4 1222 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
b4324b5d 1223 la->l2_cid = cpu_to_le16(l2cap_pi(sk)->scid);
f29972de 1224 }
1da177e4 1225
1da177e4
LT
1226 return 0;
1227}
1228
e90bac06
GP
1229static void l2cap_monitor_timeout(unsigned long arg)
1230{
1231 struct sock *sk = (void *) arg;
1232 u16 control;
1233
e686219a 1234 bh_lock_sock(sk);
e90bac06
GP
1235 if (l2cap_pi(sk)->retry_count >= l2cap_pi(sk)->remote_max_tx) {
1236 l2cap_send_disconn_req(l2cap_pi(sk)->conn, sk);
b13f5860 1237 bh_unlock_sock(sk);
e90bac06
GP
1238 return;
1239 }
1240
1241 l2cap_pi(sk)->retry_count++;
1242 __mod_monitor_timer();
1243
1244 control = L2CAP_CTRL_POLL;
7e743090 1245 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1246 bh_unlock_sock(sk);
e90bac06
GP
1247}
1248
1249static void l2cap_retrans_timeout(unsigned long arg)
1250{
1251 struct sock *sk = (void *) arg;
1252 u16 control;
1253
e686219a 1254 bh_lock_sock(sk);
e90bac06
GP
1255 l2cap_pi(sk)->retry_count = 1;
1256 __mod_monitor_timer();
1257
1258 l2cap_pi(sk)->conn_state |= L2CAP_CONN_WAIT_F;
1259
1260 control = L2CAP_CTRL_POLL;
7e743090 1261 l2cap_send_rr_or_rnr(l2cap_pi(sk), control);
e686219a 1262 bh_unlock_sock(sk);
e90bac06
GP
1263}
1264
1c2acffb 1265static void l2cap_drop_acked_frames(struct sock *sk)
1da177e4 1266{
1c2acffb 1267 struct sk_buff *skb;
1da177e4 1268
812e737e
GP
1269 while ((skb = skb_peek(TX_QUEUE(sk))) &&
1270 l2cap_pi(sk)->unacked_frames) {
1c2acffb
GP
1271 if (bt_cb(skb)->tx_seq == l2cap_pi(sk)->expected_ack_seq)
1272 break;
1da177e4 1273
1c2acffb
GP
1274 skb = skb_dequeue(TX_QUEUE(sk));
1275 kfree_skb(skb);
1da177e4 1276
1c2acffb
GP
1277 l2cap_pi(sk)->unacked_frames--;
1278 }
1da177e4 1279
e90bac06
GP
1280 if (!l2cap_pi(sk)->unacked_frames)
1281 del_timer(&l2cap_pi(sk)->retrans_timer);
1282
1c2acffb
GP
1283 return;
1284}
1da177e4 1285
1c2acffb
GP
1286static inline int l2cap_do_send(struct sock *sk, struct sk_buff *skb)
1287{
1288 struct l2cap_pinfo *pi = l2cap_pi(sk);
1289 int err;
1290
1291 BT_DBG("sk %p, skb %p len %d", sk, skb, skb->len);
1da177e4 1292
1c2acffb
GP
1293 err = hci_send_acl(pi->conn->hcon, skb, 0);
1294 if (err < 0)
1295 kfree_skb(skb);
1296
1297 return err;
1298}
1299
6840ed07
GP
1300static int l2cap_streaming_send(struct sock *sk)
1301{
1302 struct sk_buff *skb, *tx_skb;
1303 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1304 u16 control, fcs;
6840ed07
GP
1305 int err;
1306
1307 while ((skb = sk->sk_send_head)) {
1308 tx_skb = skb_clone(skb, GFP_ATOMIC);
1309
1310 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
1311 control |= pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT;
1312 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1313
e8235c6b 1314 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1315 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1316 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1317 }
1318
6840ed07
GP
1319 err = l2cap_do_send(sk, tx_skb);
1320 if (err < 0) {
1321 l2cap_send_disconn_req(pi->conn, sk);
1322 return err;
1323 }
1324
1325 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1326
1327 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1328 sk->sk_send_head = NULL;
1329 else
1330 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
1331
1332 skb = skb_dequeue(TX_QUEUE(sk));
1333 kfree_skb(skb);
1334 }
1335 return 0;
1336}
1337
8f17154f
GP
1338static int l2cap_retransmit_frame(struct sock *sk, u8 tx_seq)
1339{
1340 struct l2cap_pinfo *pi = l2cap_pi(sk);
1341 struct sk_buff *skb, *tx_skb;
1342 u16 control, fcs;
1343 int err;
1344
1345 skb = skb_peek(TX_QUEUE(sk));
1346 do {
1347 if (bt_cb(skb)->tx_seq != tx_seq) {
1348 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1349 break;
1350 skb = skb_queue_next(TX_QUEUE(sk), skb);
1351 continue;
1352 }
1353
1354 if (pi->remote_max_tx &&
1355 bt_cb(skb)->retries == pi->remote_max_tx) {
1356 l2cap_send_disconn_req(pi->conn, sk);
1357 break;
1358 }
1359
1360 tx_skb = skb_clone(skb, GFP_ATOMIC);
1361 bt_cb(skb)->retries++;
1362 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
9f121a5a 1363 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
8f17154f
GP
1364 | (tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1365 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1366
e8235c6b 1367 if (pi->fcs == L2CAP_FCS_CRC16) {
8f17154f
GP
1368 fcs = crc16(0, (u8 *)tx_skb->data, tx_skb->len - 2);
1369 put_unaligned_le16(fcs, tx_skb->data + tx_skb->len - 2);
1370 }
1371
1372 err = l2cap_do_send(sk, tx_skb);
1373 if (err < 0) {
1374 l2cap_send_disconn_req(pi->conn, sk);
1375 return err;
1376 }
1377 break;
1378 } while(1);
1379 return 0;
1380}
1381
1c2acffb
GP
1382static int l2cap_ertm_send(struct sock *sk)
1383{
1384 struct sk_buff *skb, *tx_skb;
1385 struct l2cap_pinfo *pi = l2cap_pi(sk);
fcc203c3 1386 u16 control, fcs;
9e917af1 1387 int err, nsent = 0;
1c2acffb 1388
e90bac06
GP
1389 if (pi->conn_state & L2CAP_CONN_WAIT_F)
1390 return 0;
1391
f64f9e71
JP
1392 while ((skb = sk->sk_send_head) && (!l2cap_tx_window_full(sk)) &&
1393 !(pi->conn_state & L2CAP_CONN_REMOTE_BUSY)) {
1c2acffb 1394
e90bac06
GP
1395 if (pi->remote_max_tx &&
1396 bt_cb(skb)->retries == pi->remote_max_tx) {
1397 l2cap_send_disconn_req(pi->conn, sk);
1398 break;
1399 }
1400
e420aba3
AE
1401 tx_skb = skb_clone(skb, GFP_ATOMIC);
1402
e90bac06
GP
1403 bt_cb(skb)->retries++;
1404
1c2acffb 1405 control = get_unaligned_le16(tx_skb->data + L2CAP_HDR_SIZE);
d5392c8f
GP
1406 if (pi->conn_state & L2CAP_CONN_SEND_FBIT) {
1407 control |= L2CAP_CTRL_FINAL;
1408 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
1409 }
9f121a5a 1410 control |= (pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT)
1c2acffb
GP
1411 | (pi->next_tx_seq << L2CAP_CTRL_TXSEQ_SHIFT);
1412 put_unaligned_le16(control, tx_skb->data + L2CAP_HDR_SIZE);
1413
e90bac06 1414
e8235c6b 1415 if (pi->fcs == L2CAP_FCS_CRC16) {
fcc203c3
GP
1416 fcs = crc16(0, (u8 *)skb->data, tx_skb->len - 2);
1417 put_unaligned_le16(fcs, skb->data + tx_skb->len - 2);
1418 }
1419
1c2acffb
GP
1420 err = l2cap_do_send(sk, tx_skb);
1421 if (err < 0) {
1422 l2cap_send_disconn_req(pi->conn, sk);
1423 return err;
1424 }
e90bac06 1425 __mod_retrans_timer();
1c2acffb
GP
1426
1427 bt_cb(skb)->tx_seq = pi->next_tx_seq;
1428 pi->next_tx_seq = (pi->next_tx_seq + 1) % 64;
1429
1430 pi->unacked_frames++;
d5392c8f 1431 pi->frames_sent++;
1c2acffb
GP
1432
1433 if (skb_queue_is_last(TX_QUEUE(sk), skb))
1434 sk->sk_send_head = NULL;
1435 else
1436 sk->sk_send_head = skb_queue_next(TX_QUEUE(sk), skb);
9e917af1
GP
1437
1438 nsent++;
1c2acffb
GP
1439 }
1440
9e917af1
GP
1441 return nsent;
1442}
1443
1444static int l2cap_send_ack(struct l2cap_pinfo *pi)
1445{
1446 struct sock *sk = (struct sock *)pi;
1447 u16 control = 0;
1448
1449 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
1450
1451 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
1452 control |= L2CAP_SUPER_RCV_NOT_READY;
1453 return l2cap_send_sframe(pi, control);
1454 } else if (l2cap_ertm_send(sk) == 0) {
1455 control |= L2CAP_SUPER_RCV_READY;
1456 return l2cap_send_sframe(pi, control);
1457 }
1c2acffb
GP
1458 return 0;
1459}
1460
99b0d4b7
GP
1461static int l2cap_send_srejtail(struct sock *sk)
1462{
1463 struct srej_list *tail;
1464 u16 control;
1465
1466 control = L2CAP_SUPER_SELECT_REJECT;
1467 control |= L2CAP_CTRL_FINAL;
1468
1469 tail = list_entry(SREJ_LIST(sk)->prev, struct srej_list, list);
1470 control |= tail->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
1471
1472 l2cap_send_sframe(l2cap_pi(sk), control);
1473
1474 return 0;
1475}
1476
1c2acffb
GP
1477static inline int l2cap_skbuff_fromiovec(struct sock *sk, struct msghdr *msg, int len, int count, struct sk_buff *skb)
1478{
1479 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1480 struct sk_buff **frag;
1481 int err, sent = 0;
1da177e4
LT
1482
1483 if (memcpy_fromiovec(skb_put(skb, count), msg->msg_iov, count)) {
1c2acffb 1484 return -EFAULT;
1da177e4
LT
1485 }
1486
1487 sent += count;
1488 len -= count;
1489
1490 /* Continuation fragments (no L2CAP header) */
1491 frag = &skb_shinfo(skb)->frag_list;
1492 while (len) {
1493 count = min_t(unsigned int, conn->mtu, len);
1494
1495 *frag = bt_skb_send_alloc(sk, count, msg->msg_flags & MSG_DONTWAIT, &err);
1496 if (!*frag)
1c2acffb
GP
1497 return -EFAULT;
1498 if (memcpy_fromiovec(skb_put(*frag, count), msg->msg_iov, count))
1499 return -EFAULT;
1da177e4
LT
1500
1501 sent += count;
1502 len -= count;
1503
1504 frag = &(*frag)->next;
1505 }
1da177e4
LT
1506
1507 return sent;
1c2acffb 1508}
1da177e4 1509
1c2acffb
GP
1510static struct sk_buff *l2cap_create_connless_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1511{
1512 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1513 struct sk_buff *skb;
1514 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1515 struct l2cap_hdr *lh;
1516
1517 BT_DBG("sk %p len %d", sk, (int)len);
1518
1519 count = min_t(unsigned int, (conn->mtu - hlen), len);
1520 skb = bt_skb_send_alloc(sk, count + hlen,
1521 msg->msg_flags & MSG_DONTWAIT, &err);
1522 if (!skb)
1523 return ERR_PTR(-ENOMEM);
1524
1525 /* Create L2CAP header */
1526 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1527 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1528 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1529 put_unaligned_le16(l2cap_pi(sk)->psm, skb_put(skb, 2));
1530
1531 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1532 if (unlikely(err < 0)) {
1533 kfree_skb(skb);
1534 return ERR_PTR(err);
1535 }
1536 return skb;
1537}
1538
1539static struct sk_buff *l2cap_create_basic_pdu(struct sock *sk, struct msghdr *msg, size_t len)
1540{
1541 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1542 struct sk_buff *skb;
1543 int err, count, hlen = L2CAP_HDR_SIZE;
1544 struct l2cap_hdr *lh;
1545
1546 BT_DBG("sk %p len %d", sk, (int)len);
1547
1548 count = min_t(unsigned int, (conn->mtu - hlen), len);
1549 skb = bt_skb_send_alloc(sk, count + hlen,
1550 msg->msg_flags & MSG_DONTWAIT, &err);
1551 if (!skb)
1552 return ERR_PTR(-ENOMEM);
1553
1554 /* Create L2CAP header */
1555 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1556 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1557 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1558
1559 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1560 if (unlikely(err < 0)) {
1561 kfree_skb(skb);
1562 return ERR_PTR(err);
1563 }
1564 return skb;
1565}
1566
6840ed07 1567static struct sk_buff *l2cap_create_iframe_pdu(struct sock *sk, struct msghdr *msg, size_t len, u16 control, u16 sdulen)
1c2acffb
GP
1568{
1569 struct l2cap_conn *conn = l2cap_pi(sk)->conn;
1570 struct sk_buff *skb;
1571 int err, count, hlen = L2CAP_HDR_SIZE + 2;
1572 struct l2cap_hdr *lh;
1573
1574 BT_DBG("sk %p len %d", sk, (int)len);
1575
0ee0d208
GP
1576 if (!conn)
1577 return ERR_PTR(-ENOTCONN);
1578
c74e560c
GP
1579 if (sdulen)
1580 hlen += 2;
1581
fcc203c3
GP
1582 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1583 hlen += 2;
1584
1c2acffb
GP
1585 count = min_t(unsigned int, (conn->mtu - hlen), len);
1586 skb = bt_skb_send_alloc(sk, count + hlen,
1587 msg->msg_flags & MSG_DONTWAIT, &err);
1588 if (!skb)
1589 return ERR_PTR(-ENOMEM);
1590
1591 /* Create L2CAP header */
1592 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
1593 lh->cid = cpu_to_le16(l2cap_pi(sk)->dcid);
1594 lh->len = cpu_to_le16(len + (hlen - L2CAP_HDR_SIZE));
1595 put_unaligned_le16(control, skb_put(skb, 2));
c74e560c
GP
1596 if (sdulen)
1597 put_unaligned_le16(sdulen, skb_put(skb, 2));
1c2acffb
GP
1598
1599 err = l2cap_skbuff_fromiovec(sk, msg, len, count, skb);
1600 if (unlikely(err < 0)) {
1601 kfree_skb(skb);
1602 return ERR_PTR(err);
1603 }
e90bac06 1604
fcc203c3
GP
1605 if (l2cap_pi(sk)->fcs == L2CAP_FCS_CRC16)
1606 put_unaligned_le16(0, skb_put(skb, 2));
1607
e90bac06 1608 bt_cb(skb)->retries = 0;
1c2acffb 1609 return skb;
1da177e4
LT
1610}
1611
c74e560c
GP
1612static inline int l2cap_sar_segment_sdu(struct sock *sk, struct msghdr *msg, size_t len)
1613{
1614 struct l2cap_pinfo *pi = l2cap_pi(sk);
1615 struct sk_buff *skb;
1616 struct sk_buff_head sar_queue;
1617 u16 control;
1618 size_t size = 0;
1619
1620 __skb_queue_head_init(&sar_queue);
1621 control = L2CAP_SDU_START;
1c762159 1622 skb = l2cap_create_iframe_pdu(sk, msg, pi->remote_mps, control, len);
c74e560c
GP
1623 if (IS_ERR(skb))
1624 return PTR_ERR(skb);
1625
1626 __skb_queue_tail(&sar_queue, skb);
1c762159
GP
1627 len -= pi->remote_mps;
1628 size += pi->remote_mps;
c74e560c
GP
1629 control = 0;
1630
1631 while (len > 0) {
1632 size_t buflen;
1633
1c762159 1634 if (len > pi->remote_mps) {
c74e560c 1635 control |= L2CAP_SDU_CONTINUE;
1c762159 1636 buflen = pi->remote_mps;
c74e560c
GP
1637 } else {
1638 control |= L2CAP_SDU_END;
1639 buflen = len;
1640 }
1641
6840ed07 1642 skb = l2cap_create_iframe_pdu(sk, msg, buflen, control, 0);
c74e560c
GP
1643 if (IS_ERR(skb)) {
1644 skb_queue_purge(&sar_queue);
1645 return PTR_ERR(skb);
1646 }
1647
1648 __skb_queue_tail(&sar_queue, skb);
1649 len -= buflen;
1650 size += buflen;
1651 control = 0;
1652 }
1653 skb_queue_splice_tail(&sar_queue, TX_QUEUE(sk));
1654 if (sk->sk_send_head == NULL)
1655 sk->sk_send_head = sar_queue.next;
1656
1657 return size;
1658}
1659
1da177e4
LT
1660static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
1661{
1662 struct sock *sk = sock->sk;
1c2acffb
GP
1663 struct l2cap_pinfo *pi = l2cap_pi(sk);
1664 struct sk_buff *skb;
1665 u16 control;
1666 int err;
1da177e4
LT
1667
1668 BT_DBG("sock %p, sk %p", sock, sk);
1669
c1cbe4b7
BL
1670 err = sock_error(sk);
1671 if (err)
1672 return err;
1da177e4
LT
1673
1674 if (msg->msg_flags & MSG_OOB)
1675 return -EOPNOTSUPP;
1676
1da177e4
LT
1677 lock_sock(sk);
1678
1c2acffb 1679 if (sk->sk_state != BT_CONNECTED) {
1da177e4 1680 err = -ENOTCONN;
1c2acffb
GP
1681 goto done;
1682 }
1da177e4 1683
1c2acffb
GP
1684 /* Connectionless channel */
1685 if (sk->sk_type == SOCK_DGRAM) {
1686 skb = l2cap_create_connless_pdu(sk, msg, len);
477fffb0
DC
1687 if (IS_ERR(skb))
1688 err = PTR_ERR(skb);
1689 else
1690 err = l2cap_do_send(sk, skb);
1c2acffb
GP
1691 goto done;
1692 }
1693
1694 switch (pi->mode) {
1695 case L2CAP_MODE_BASIC:
c69163e9
GP
1696 /* Check outgoing MTU */
1697 if (len > pi->omtu) {
1698 err = -EINVAL;
1699 goto done;
1700 }
1701
1c2acffb
GP
1702 /* Create a basic PDU */
1703 skb = l2cap_create_basic_pdu(sk, msg, len);
1704 if (IS_ERR(skb)) {
1705 err = PTR_ERR(skb);
1706 goto done;
1707 }
1708
1709 err = l2cap_do_send(sk, skb);
1710 if (!err)
1711 err = len;
1712 break;
1713
1714 case L2CAP_MODE_ERTM:
6840ed07 1715 case L2CAP_MODE_STREAMING:
1c2acffb 1716 /* Entire SDU fits into one PDU */
1c762159 1717 if (len <= pi->remote_mps) {
1c2acffb 1718 control = L2CAP_SDU_UNSEGMENTED;
6840ed07 1719 skb = l2cap_create_iframe_pdu(sk, msg, len, control, 0);
1c2acffb
GP
1720 if (IS_ERR(skb)) {
1721 err = PTR_ERR(skb);
1722 goto done;
1723 }
c74e560c
GP
1724 __skb_queue_tail(TX_QUEUE(sk), skb);
1725 if (sk->sk_send_head == NULL)
1726 sk->sk_send_head = skb;
1c2acffb 1727 } else {
c74e560c
GP
1728 /* Segment SDU into multiples PDUs */
1729 err = l2cap_sar_segment_sdu(sk, msg, len);
1730 if (err < 0)
1731 goto done;
1c2acffb 1732 }
1c2acffb 1733
6840ed07
GP
1734 if (pi->mode == L2CAP_MODE_STREAMING)
1735 err = l2cap_streaming_send(sk);
1736 else
1737 err = l2cap_ertm_send(sk);
1738
9e917af1 1739 if (err >= 0)
1c2acffb
GP
1740 err = len;
1741 break;
1742
1743 default:
1744 BT_DBG("bad state %1.1x", pi->mode);
1745 err = -EINVAL;
1746 }
1747
1748done:
1da177e4
LT
1749 release_sock(sk);
1750 return err;
1751}
1752
f66dc81f
MH
1753static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
1754{
1755 struct sock *sk = sock->sk;
1756
1757 lock_sock(sk);
1758
1759 if (sk->sk_state == BT_CONNECT2 && bt_sk(sk)->defer_setup) {
1760 struct l2cap_conn_rsp rsp;
1761
1762 sk->sk_state = BT_CONFIG;
1763
1764 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1765 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
1766 rsp.result = cpu_to_le16(L2CAP_CR_SUCCESS);
1767 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
1768 l2cap_send_cmd(l2cap_pi(sk)->conn, l2cap_pi(sk)->ident,
1769 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
1770
1771 release_sock(sk);
1772 return 0;
1773 }
1774
1775 release_sock(sk);
1776
1777 return bt_sock_recvmsg(iocb, sock, msg, len, flags);
1778}
1779
b7058842 1780static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
1da177e4
LT
1781{
1782 struct sock *sk = sock->sk;
1783 struct l2cap_options opts;
f29972de 1784 int len, err = 0;
1da177e4
LT
1785 u32 opt;
1786
1787 BT_DBG("sk %p", sk);
1788
1789 lock_sock(sk);
1790
1791 switch (optname) {
1792 case L2CAP_OPTIONS:
0878b666
MH
1793 opts.imtu = l2cap_pi(sk)->imtu;
1794 opts.omtu = l2cap_pi(sk)->omtu;
1795 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1796 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1797 opts.fcs = l2cap_pi(sk)->fcs;
68d7f0ce 1798 opts.max_tx = l2cap_pi(sk)->max_tx;
14b5aa71 1799 opts.txwin_size = (__u16)l2cap_pi(sk)->tx_win;
0878b666 1800
1da177e4
LT
1801 len = min_t(unsigned int, sizeof(opts), optlen);
1802 if (copy_from_user((char *) &opts, optval, len)) {
1803 err = -EFAULT;
1804 break;
1805 }
0878b666 1806
c6b03cf9
MH
1807 l2cap_pi(sk)->imtu = opts.imtu;
1808 l2cap_pi(sk)->omtu = opts.omtu;
1809 l2cap_pi(sk)->mode = opts.mode;
fcc203c3 1810 l2cap_pi(sk)->fcs = opts.fcs;
68d7f0ce 1811 l2cap_pi(sk)->max_tx = opts.max_tx;
14b5aa71 1812 l2cap_pi(sk)->tx_win = (__u8)opts.txwin_size;
1da177e4
LT
1813 break;
1814
1815 case L2CAP_LM:
1816 if (get_user(opt, (u32 __user *) optval)) {
1817 err = -EFAULT;
1818 break;
1819 }
1820
2af6b9d5
MH
1821 if (opt & L2CAP_LM_AUTH)
1822 l2cap_pi(sk)->sec_level = BT_SECURITY_LOW;
1823 if (opt & L2CAP_LM_ENCRYPT)
1824 l2cap_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
1825 if (opt & L2CAP_LM_SECURE)
1826 l2cap_pi(sk)->sec_level = BT_SECURITY_HIGH;
1827
1828 l2cap_pi(sk)->role_switch = (opt & L2CAP_LM_MASTER);
1829 l2cap_pi(sk)->force_reliable = (opt & L2CAP_LM_RELIABLE);
1da177e4
LT
1830 break;
1831
1832 default:
1833 err = -ENOPROTOOPT;
1834 break;
1835 }
1836
1837 release_sock(sk);
1838 return err;
1839}
1840
b7058842 1841static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
d58daf42
MH
1842{
1843 struct sock *sk = sock->sk;
2af6b9d5
MH
1844 struct bt_security sec;
1845 int len, err = 0;
f66dc81f 1846 u32 opt;
d58daf42
MH
1847
1848 BT_DBG("sk %p", sk);
1849
1850 if (level == SOL_L2CAP)
1851 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
1852
0588d94f
MH
1853 if (level != SOL_BLUETOOTH)
1854 return -ENOPROTOOPT;
1855
d58daf42
MH
1856 lock_sock(sk);
1857
1858 switch (optname) {
2af6b9d5 1859 case BT_SECURITY:
2526d3d8 1860 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
1861 err = -EINVAL;
1862 break;
1863 }
1864
2af6b9d5
MH
1865 sec.level = BT_SECURITY_LOW;
1866
1867 len = min_t(unsigned int, sizeof(sec), optlen);
1868 if (copy_from_user((char *) &sec, optval, len)) {
1869 err = -EFAULT;
1870 break;
1871 }
1872
1873 if (sec.level < BT_SECURITY_LOW ||
1874 sec.level > BT_SECURITY_HIGH) {
1875 err = -EINVAL;
1876 break;
1877 }
1878
1879 l2cap_pi(sk)->sec_level = sec.level;
1880 break;
1881
f66dc81f
MH
1882 case BT_DEFER_SETUP:
1883 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
1884 err = -EINVAL;
1885 break;
1886 }
1887
1888 if (get_user(opt, (u32 __user *) optval)) {
1889 err = -EFAULT;
1890 break;
1891 }
1892
1893 bt_sk(sk)->defer_setup = opt;
1894 break;
1895
d58daf42
MH
1896 default:
1897 err = -ENOPROTOOPT;
1898 break;
1899 }
1900
1901 release_sock(sk);
1902 return err;
1903}
1904
1905static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
1da177e4
LT
1906{
1907 struct sock *sk = sock->sk;
1908 struct l2cap_options opts;
1909 struct l2cap_conninfo cinfo;
1910 int len, err = 0;
2af6b9d5 1911 u32 opt;
1da177e4
LT
1912
1913 BT_DBG("sk %p", sk);
1914
1915 if (get_user(len, optlen))
1916 return -EFAULT;
1917
1918 lock_sock(sk);
1919
1920 switch (optname) {
1921 case L2CAP_OPTIONS:
1922 opts.imtu = l2cap_pi(sk)->imtu;
1923 opts.omtu = l2cap_pi(sk)->omtu;
1924 opts.flush_to = l2cap_pi(sk)->flush_to;
c6b03cf9 1925 opts.mode = l2cap_pi(sk)->mode;
fcc203c3 1926 opts.fcs = l2cap_pi(sk)->fcs;
68d7f0ce 1927 opts.max_tx = l2cap_pi(sk)->max_tx;
14b5aa71 1928 opts.txwin_size = (__u16)l2cap_pi(sk)->tx_win;
1da177e4
LT
1929
1930 len = min_t(unsigned int, len, sizeof(opts));
1931 if (copy_to_user(optval, (char *) &opts, len))
1932 err = -EFAULT;
1933
1934 break;
1935
1936 case L2CAP_LM:
2af6b9d5
MH
1937 switch (l2cap_pi(sk)->sec_level) {
1938 case BT_SECURITY_LOW:
1939 opt = L2CAP_LM_AUTH;
1940 break;
1941 case BT_SECURITY_MEDIUM:
1942 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
1943 break;
1944 case BT_SECURITY_HIGH:
1945 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
1946 L2CAP_LM_SECURE;
1947 break;
1948 default:
1949 opt = 0;
1950 break;
1951 }
1952
1953 if (l2cap_pi(sk)->role_switch)
1954 opt |= L2CAP_LM_MASTER;
1955
1956 if (l2cap_pi(sk)->force_reliable)
1957 opt |= L2CAP_LM_RELIABLE;
1958
1959 if (put_user(opt, (u32 __user *) optval))
1da177e4
LT
1960 err = -EFAULT;
1961 break;
1962
1963 case L2CAP_CONNINFO:
f66dc81f
MH
1964 if (sk->sk_state != BT_CONNECTED &&
1965 !(sk->sk_state == BT_CONNECT2 &&
1966 bt_sk(sk)->defer_setup)) {
1da177e4
LT
1967 err = -ENOTCONN;
1968 break;
1969 }
1970
1971 cinfo.hci_handle = l2cap_pi(sk)->conn->hcon->handle;
1972 memcpy(cinfo.dev_class, l2cap_pi(sk)->conn->hcon->dev_class, 3);
1973
1974 len = min_t(unsigned int, len, sizeof(cinfo));
1975 if (copy_to_user(optval, (char *) &cinfo, len))
1976 err = -EFAULT;
1977
1978 break;
1979
1980 default:
1981 err = -ENOPROTOOPT;
1982 break;
1983 }
1984
1985 release_sock(sk);
1986 return err;
1987}
1988
d58daf42
MH
1989static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
1990{
1991 struct sock *sk = sock->sk;
2af6b9d5 1992 struct bt_security sec;
d58daf42
MH
1993 int len, err = 0;
1994
1995 BT_DBG("sk %p", sk);
1996
1997 if (level == SOL_L2CAP)
1998 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
1999
0588d94f
MH
2000 if (level != SOL_BLUETOOTH)
2001 return -ENOPROTOOPT;
2002
d58daf42
MH
2003 if (get_user(len, optlen))
2004 return -EFAULT;
2005
2006 lock_sock(sk);
2007
2008 switch (optname) {
2af6b9d5 2009 case BT_SECURITY:
2526d3d8 2010 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_RAW) {
0588d94f
MH
2011 err = -EINVAL;
2012 break;
2013 }
2014
2af6b9d5
MH
2015 sec.level = l2cap_pi(sk)->sec_level;
2016
2017 len = min_t(unsigned int, len, sizeof(sec));
2018 if (copy_to_user(optval, (char *) &sec, len))
2019 err = -EFAULT;
2020
2021 break;
2022
f66dc81f
MH
2023 case BT_DEFER_SETUP:
2024 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
2025 err = -EINVAL;
2026 break;
2027 }
2028
2029 if (put_user(bt_sk(sk)->defer_setup, (u32 __user *) optval))
2030 err = -EFAULT;
2031
2032 break;
2033
d58daf42
MH
2034 default:
2035 err = -ENOPROTOOPT;
2036 break;
2037 }
2038
2039 release_sock(sk);
2040 return err;
2041}
2042
1da177e4
LT
2043static int l2cap_sock_shutdown(struct socket *sock, int how)
2044{
2045 struct sock *sk = sock->sk;
2046 int err = 0;
2047
2048 BT_DBG("sock %p, sk %p", sock, sk);
2049
2050 if (!sk)
2051 return 0;
2052
2053 lock_sock(sk);
2054 if (!sk->sk_shutdown) {
2055 sk->sk_shutdown = SHUTDOWN_MASK;
2056 l2cap_sock_clear_timer(sk);
2057 __l2cap_sock_close(sk, 0);
2058
2059 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
b1235d79
MH
2060 err = bt_sock_wait_state(sk, BT_CLOSED,
2061 sk->sk_lingertime);
1da177e4
LT
2062 }
2063 release_sock(sk);
2064 return err;
2065}
2066
2067static int l2cap_sock_release(struct socket *sock)
2068{
2069 struct sock *sk = sock->sk;
2070 int err;
2071
2072 BT_DBG("sock %p, sk %p", sock, sk);
2073
2074 if (!sk)
2075 return 0;
2076
2077 err = l2cap_sock_shutdown(sock, 2);
2078
2079 sock_orphan(sk);
2080 l2cap_sock_kill(sk);
2081 return err;
2082}
2083
1da177e4
LT
2084static void l2cap_chan_ready(struct sock *sk)
2085{
2086 struct sock *parent = bt_sk(sk)->parent;
2087
2088 BT_DBG("sk %p, parent %p", sk, parent);
2089
2090 l2cap_pi(sk)->conf_state = 0;
2091 l2cap_sock_clear_timer(sk);
2092
2093 if (!parent) {
2094 /* Outgoing channel.
2095 * Wake up socket sleeping on connect.
2096 */
2097 sk->sk_state = BT_CONNECTED;
2098 sk->sk_state_change(sk);
2099 } else {
2100 /* Incoming channel.
2101 * Wake up socket sleeping on accept.
2102 */
2103 parent->sk_data_ready(parent, 0);
2104 }
2105}
2106
2107/* Copy frame to all raw sockets on that connection */
2108static void l2cap_raw_recv(struct l2cap_conn *conn, struct sk_buff *skb)
2109{
2110 struct l2cap_chan_list *l = &conn->chan_list;
2111 struct sk_buff *nskb;
af05b30b 2112 struct sock *sk;
1da177e4
LT
2113
2114 BT_DBG("conn %p", conn);
2115
2116 read_lock(&l->lock);
2117 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
2118 if (sk->sk_type != SOCK_RAW)
2119 continue;
2120
2121 /* Don't send frame to the socket it came from */
2122 if (skb->sk == sk)
2123 continue;
af05b30b
GP
2124 nskb = skb_clone(skb, GFP_ATOMIC);
2125 if (!nskb)
1da177e4
LT
2126 continue;
2127
2128 if (sock_queue_rcv_skb(sk, nskb))
2129 kfree_skb(nskb);
2130 }
2131 read_unlock(&l->lock);
2132}
2133
2134/* ---- L2CAP signalling commands ---- */
2135static struct sk_buff *l2cap_build_cmd(struct l2cap_conn *conn,
2136 u8 code, u8 ident, u16 dlen, void *data)
2137{
2138 struct sk_buff *skb, **frag;
2139 struct l2cap_cmd_hdr *cmd;
2140 struct l2cap_hdr *lh;
2141 int len, count;
2142
af05b30b
GP
2143 BT_DBG("conn %p, code 0x%2.2x, ident 0x%2.2x, len %d",
2144 conn, code, ident, dlen);
1da177e4
LT
2145
2146 len = L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE + dlen;
2147 count = min_t(unsigned int, conn->mtu, len);
2148
2149 skb = bt_skb_alloc(count, GFP_ATOMIC);
2150 if (!skb)
2151 return NULL;
2152
2153 lh = (struct l2cap_hdr *) skb_put(skb, L2CAP_HDR_SIZE);
aca3192c 2154 lh->len = cpu_to_le16(L2CAP_CMD_HDR_SIZE + dlen);
8db4dc46 2155 lh->cid = cpu_to_le16(L2CAP_CID_SIGNALING);
1da177e4
LT
2156
2157 cmd = (struct l2cap_cmd_hdr *) skb_put(skb, L2CAP_CMD_HDR_SIZE);
2158 cmd->code = code;
2159 cmd->ident = ident;
aca3192c 2160 cmd->len = cpu_to_le16(dlen);
1da177e4
LT
2161
2162 if (dlen) {
2163 count -= L2CAP_HDR_SIZE + L2CAP_CMD_HDR_SIZE;
2164 memcpy(skb_put(skb, count), data, count);
2165 data += count;
2166 }
2167
2168 len -= skb->len;
2169
2170 /* Continuation fragments (no L2CAP header) */
2171 frag = &skb_shinfo(skb)->frag_list;
2172 while (len) {
2173 count = min_t(unsigned int, conn->mtu, len);
2174
2175 *frag = bt_skb_alloc(count, GFP_ATOMIC);
2176 if (!*frag)
2177 goto fail;
2178
2179 memcpy(skb_put(*frag, count), data, count);
2180
2181 len -= count;
2182 data += count;
2183
2184 frag = &(*frag)->next;
2185 }
2186
2187 return skb;
2188
2189fail:
2190 kfree_skb(skb);
2191 return NULL;
2192}
2193
2194static inline int l2cap_get_conf_opt(void **ptr, int *type, int *olen, unsigned long *val)
2195{
2196 struct l2cap_conf_opt *opt = *ptr;
2197 int len;
2198
2199 len = L2CAP_CONF_OPT_SIZE + opt->len;
2200 *ptr += len;
2201
2202 *type = opt->type;
2203 *olen = opt->len;
2204
2205 switch (opt->len) {
2206 case 1:
2207 *val = *((u8 *) opt->val);
2208 break;
2209
2210 case 2:
861d6882 2211 *val = __le16_to_cpu(*((__le16 *) opt->val));
1da177e4
LT
2212 break;
2213
2214 case 4:
861d6882 2215 *val = __le32_to_cpu(*((__le32 *) opt->val));
1da177e4
LT
2216 break;
2217
2218 default:
2219 *val = (unsigned long) opt->val;
2220 break;
2221 }
2222
2223 BT_DBG("type 0x%2.2x len %d val 0x%lx", *type, opt->len, *val);
2224 return len;
2225}
2226
1da177e4
LT
2227static void l2cap_add_conf_opt(void **ptr, u8 type, u8 len, unsigned long val)
2228{
2229 struct l2cap_conf_opt *opt = *ptr;
2230
2231 BT_DBG("type 0x%2.2x len %d val 0x%lx", type, len, val);
2232
2233 opt->type = type;
2234 opt->len = len;
2235
2236 switch (len) {
2237 case 1:
2238 *((u8 *) opt->val) = val;
2239 break;
2240
2241 case 2:
8e036fc3 2242 *((__le16 *) opt->val) = cpu_to_le16(val);
1da177e4
LT
2243 break;
2244
2245 case 4:
8e036fc3 2246 *((__le32 *) opt->val) = cpu_to_le32(val);
1da177e4
LT
2247 break;
2248
2249 default:
2250 memcpy(opt->val, (void *) val, len);
2251 break;
2252 }
2253
2254 *ptr += L2CAP_CONF_OPT_SIZE + len;
2255}
2256
c1b4f43b
GP
2257static void l2cap_ack_timeout(unsigned long arg)
2258{
2259 struct sock *sk = (void *) arg;
2260
2261 bh_lock_sock(sk);
2262 l2cap_send_ack(l2cap_pi(sk));
2263 bh_unlock_sock(sk);
2264}
2265
0565c1c2
GP
2266static inline void l2cap_ertm_init(struct sock *sk)
2267{
2268 l2cap_pi(sk)->expected_ack_seq = 0;
2269 l2cap_pi(sk)->unacked_frames = 0;
2270 l2cap_pi(sk)->buffer_seq = 0;
803020c6 2271 l2cap_pi(sk)->num_acked = 0;
d5392c8f 2272 l2cap_pi(sk)->frames_sent = 0;
0565c1c2
GP
2273
2274 setup_timer(&l2cap_pi(sk)->retrans_timer,
2275 l2cap_retrans_timeout, (unsigned long) sk);
2276 setup_timer(&l2cap_pi(sk)->monitor_timer,
2277 l2cap_monitor_timeout, (unsigned long) sk);
c1b4f43b
GP
2278 setup_timer(&l2cap_pi(sk)->ack_timer,
2279 l2cap_ack_timeout, (unsigned long) sk);
0565c1c2
GP
2280
2281 __skb_queue_head_init(SREJ_QUEUE(sk));
2282}
2283
f2fcfcd6
GP
2284static int l2cap_mode_supported(__u8 mode, __u32 feat_mask)
2285{
2286 u32 local_feat_mask = l2cap_feat_mask;
2287 if (enable_ertm)
6840ed07 2288 local_feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING;
f2fcfcd6
GP
2289
2290 switch (mode) {
2291 case L2CAP_MODE_ERTM:
2292 return L2CAP_FEAT_ERTM & feat_mask & local_feat_mask;
2293 case L2CAP_MODE_STREAMING:
2294 return L2CAP_FEAT_STREAMING & feat_mask & local_feat_mask;
2295 default:
2296 return 0x00;
2297 }
2298}
2299
2300static inline __u8 l2cap_select_mode(__u8 mode, __u16 remote_feat_mask)
2301{
2302 switch (mode) {
2303 case L2CAP_MODE_STREAMING:
2304 case L2CAP_MODE_ERTM:
2305 if (l2cap_mode_supported(mode, remote_feat_mask))
2306 return mode;
2307 /* fall through */
2308 default:
2309 return L2CAP_MODE_BASIC;
2310 }
2311}
2312
1da177e4
LT
2313static int l2cap_build_conf_req(struct sock *sk, void *data)
2314{
2315 struct l2cap_pinfo *pi = l2cap_pi(sk);
2316 struct l2cap_conf_req *req = data;
a0e55a32 2317 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
1da177e4
LT
2318 void *ptr = req->data;
2319
2320 BT_DBG("sk %p", sk);
2321
f2fcfcd6
GP
2322 if (pi->num_conf_req || pi->num_conf_rsp)
2323 goto done;
2324
2325 switch (pi->mode) {
2326 case L2CAP_MODE_STREAMING:
2327 case L2CAP_MODE_ERTM:
2328 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
22121fc9
GP
2329 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2330 l2cap_send_disconn_req(pi->conn, sk);
f2fcfcd6
GP
2331 break;
2332 default:
2333 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2334 break;
2335 }
2336
2337done:
65c7c491
MH
2338 switch (pi->mode) {
2339 case L2CAP_MODE_BASIC:
2340 if (pi->imtu != L2CAP_DEFAULT_MTU)
2341 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->imtu);
2342 break;
2343
2344 case L2CAP_MODE_ERTM:
2345 rfc.mode = L2CAP_MODE_ERTM;
14b5aa71 2346 rfc.txwin_size = pi->tx_win;
68d7f0ce 2347 rfc.max_transmit = pi->max_tx;
f2fcfcd6
GP
2348 rfc.retrans_timeout = 0;
2349 rfc.monitor_timeout = 0;
c74e560c 2350 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091 2351 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
1c762159 2352 rfc.max_pdu_size = cpu_to_le16(pi->conn->mtu - 10);
f2fcfcd6
GP
2353
2354 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2355 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2356
2357 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2358 break;
2359
2360 if (pi->fcs == L2CAP_FCS_NONE ||
2361 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2362 pi->fcs = L2CAP_FCS_NONE;
2363 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2364 }
f2fcfcd6
GP
2365 break;
2366
2367 case L2CAP_MODE_STREAMING:
2368 rfc.mode = L2CAP_MODE_STREAMING;
2369 rfc.txwin_size = 0;
2370 rfc.max_transmit = 0;
2371 rfc.retrans_timeout = 0;
2372 rfc.monitor_timeout = 0;
c74e560c 2373 rfc.max_pdu_size = cpu_to_le16(L2CAP_DEFAULT_MAX_PDU_SIZE);
d1daa091 2374 if (L2CAP_DEFAULT_MAX_PDU_SIZE > pi->conn->mtu - 10)
1c762159 2375 rfc.max_pdu_size = cpu_to_le16(pi->conn->mtu - 10);
65c7c491
MH
2376
2377 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2378 sizeof(rfc), (unsigned long) &rfc);
fcc203c3
GP
2379
2380 if (!(pi->conn->feat_mask & L2CAP_FEAT_FCS))
2381 break;
2382
2383 if (pi->fcs == L2CAP_FCS_NONE ||
2384 pi->conf_state & L2CAP_CONF_NO_FCS_RECV) {
2385 pi->fcs = L2CAP_FCS_NONE;
2386 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FCS, 1, pi->fcs);
2387 }
65c7c491
MH
2388 break;
2389 }
1da177e4
LT
2390
2391 /* FIXME: Need actual value of the flush timeout */
2392 //if (flush_to != L2CAP_DEFAULT_FLUSH_TO)
2393 // l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO, 2, pi->flush_to);
2394
aca3192c
YH
2395 req->dcid = cpu_to_le16(pi->dcid);
2396 req->flags = cpu_to_le16(0);
1da177e4
LT
2397
2398 return ptr - data;
2399}
2400
5dee9e7c 2401static int l2cap_parse_conf_req(struct sock *sk, void *data)
1da177e4
LT
2402{
2403 struct l2cap_pinfo *pi = l2cap_pi(sk);
5dee9e7c
MH
2404 struct l2cap_conf_rsp *rsp = data;
2405 void *ptr = rsp->data;
2406 void *req = pi->conf_req;
2407 int len = pi->conf_len;
2408 int type, hint, olen;
2409 unsigned long val;
6464f35f 2410 struct l2cap_conf_rfc rfc = { .mode = L2CAP_MODE_BASIC };
861d6882 2411 u16 mtu = L2CAP_DEFAULT_MTU;
5dee9e7c 2412 u16 result = L2CAP_CONF_SUCCESS;
1da177e4 2413
5dee9e7c 2414 BT_DBG("sk %p", sk);
820ae1b8 2415
5dee9e7c
MH
2416 while (len >= L2CAP_CONF_OPT_SIZE) {
2417 len -= l2cap_get_conf_opt(&req, &type, &olen, &val);
1da177e4 2418
589d2746 2419 hint = type & L2CAP_CONF_HINT;
47ec1dcd 2420 type &= L2CAP_CONF_MASK;
5dee9e7c
MH
2421
2422 switch (type) {
2423 case L2CAP_CONF_MTU:
861d6882 2424 mtu = val;
5dee9e7c
MH
2425 break;
2426
2427 case L2CAP_CONF_FLUSH_TO:
2428 pi->flush_to = val;
2429 break;
2430
2431 case L2CAP_CONF_QOS:
2432 break;
2433
6464f35f
MH
2434 case L2CAP_CONF_RFC:
2435 if (olen == sizeof(rfc))
2436 memcpy(&rfc, (void *) val, olen);
2437 break;
2438
fcc203c3
GP
2439 case L2CAP_CONF_FCS:
2440 if (val == L2CAP_FCS_NONE)
2441 pi->conf_state |= L2CAP_CONF_NO_FCS_RECV;
2442
2443 break;
2444
5dee9e7c
MH
2445 default:
2446 if (hint)
2447 break;
2448
2449 result = L2CAP_CONF_UNKNOWN;
2450 *((u8 *) ptr++) = type;
2451 break;
2452 }
2453 }
2454
f2fcfcd6
GP
2455 if (pi->num_conf_rsp || pi->num_conf_req)
2456 goto done;
2457
2458 switch (pi->mode) {
2459 case L2CAP_MODE_STREAMING:
2460 case L2CAP_MODE_ERTM:
2461 pi->conf_state |= L2CAP_CONF_STATE2_DEVICE;
2462 if (!l2cap_mode_supported(pi->mode, pi->conn->feat_mask))
2463 return -ECONNREFUSED;
2464 break;
2465 default:
2466 pi->mode = l2cap_select_mode(rfc.mode, pi->conn->feat_mask);
2467 break;
2468 }
2469
2470done:
2471 if (pi->mode != rfc.mode) {
2472 result = L2CAP_CONF_UNACCEPT;
2473 rfc.mode = pi->mode;
2474
2475 if (pi->num_conf_rsp == 1)
2476 return -ECONNREFUSED;
2477
2478 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2479 sizeof(rfc), (unsigned long) &rfc);
2480 }
2481
2482
5dee9e7c
MH
2483 if (result == L2CAP_CONF_SUCCESS) {
2484 /* Configure output options and let the other side know
2485 * which ones we don't like. */
2486
f2fcfcd6
GP
2487 if (mtu < L2CAP_DEFAULT_MIN_MTU)
2488 result = L2CAP_CONF_UNACCEPT;
2489 else {
2490 pi->omtu = mtu;
2491 pi->conf_state |= L2CAP_CONF_MTU_DONE;
2492 }
2493 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
6464f35f 2494
f2fcfcd6
GP
2495 switch (rfc.mode) {
2496 case L2CAP_MODE_BASIC:
2497 pi->fcs = L2CAP_FCS_NONE;
2498 pi->conf_state |= L2CAP_CONF_MODE_DONE;
2499 break;
2500
2501 case L2CAP_MODE_ERTM:
2502 pi->remote_tx_win = rfc.txwin_size;
2503 pi->remote_max_tx = rfc.max_transmit;
1c762159
GP
2504 if (rfc.max_pdu_size > pi->conn->mtu - 10)
2505 rfc.max_pdu_size = le16_to_cpu(pi->conn->mtu - 10);
2506
2507 pi->remote_mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6 2508
10467e9e
GP
2509 rfc.retrans_timeout =
2510 le16_to_cpu(L2CAP_DEFAULT_RETRANS_TO);
2511 rfc.monitor_timeout =
2512 le16_to_cpu(L2CAP_DEFAULT_MONITOR_TO);
f2fcfcd6
GP
2513
2514 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2515
2516 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2517 sizeof(rfc), (unsigned long) &rfc);
2518
f2fcfcd6
GP
2519 break;
2520
2521 case L2CAP_MODE_STREAMING:
1c762159
GP
2522 if (rfc.max_pdu_size > pi->conn->mtu - 10)
2523 rfc.max_pdu_size = le16_to_cpu(pi->conn->mtu - 10);
2524
2525 pi->remote_mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2526
2527 pi->conf_state |= L2CAP_CONF_MODE_DONE;
68ae6639
GP
2528
2529 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2530 sizeof(rfc), (unsigned long) &rfc);
2531
f2fcfcd6
GP
2532 break;
2533
2534 default:
5dee9e7c 2535 result = L2CAP_CONF_UNACCEPT;
5dee9e7c 2536
6464f35f 2537 memset(&rfc, 0, sizeof(rfc));
f2fcfcd6
GP
2538 rfc.mode = pi->mode;
2539 }
6464f35f 2540
f2fcfcd6
GP
2541 if (result == L2CAP_CONF_SUCCESS)
2542 pi->conf_state |= L2CAP_CONF_OUTPUT_DONE;
2543 }
5dee9e7c
MH
2544 rsp->scid = cpu_to_le16(pi->dcid);
2545 rsp->result = cpu_to_le16(result);
2546 rsp->flags = cpu_to_le16(0x0000);
2547
2548 return ptr - data;
1da177e4
LT
2549}
2550
f2fcfcd6
GP
2551static int l2cap_parse_conf_rsp(struct sock *sk, void *rsp, int len, void *data, u16 *result)
2552{
2553 struct l2cap_pinfo *pi = l2cap_pi(sk);
2554 struct l2cap_conf_req *req = data;
2555 void *ptr = req->data;
2556 int type, olen;
2557 unsigned long val;
2558 struct l2cap_conf_rfc rfc;
2559
2560 BT_DBG("sk %p, rsp %p, len %d, req %p", sk, rsp, len, data);
2561
2562 while (len >= L2CAP_CONF_OPT_SIZE) {
2563 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2564
2565 switch (type) {
2566 case L2CAP_CONF_MTU:
2567 if (val < L2CAP_DEFAULT_MIN_MTU) {
2568 *result = L2CAP_CONF_UNACCEPT;
2569 pi->omtu = L2CAP_DEFAULT_MIN_MTU;
2570 } else
2571 pi->omtu = val;
2572 l2cap_add_conf_opt(&ptr, L2CAP_CONF_MTU, 2, pi->omtu);
2573 break;
2574
2575 case L2CAP_CONF_FLUSH_TO:
2576 pi->flush_to = val;
2577 l2cap_add_conf_opt(&ptr, L2CAP_CONF_FLUSH_TO,
2578 2, pi->flush_to);
2579 break;
2580
2581 case L2CAP_CONF_RFC:
2582 if (olen == sizeof(rfc))
2583 memcpy(&rfc, (void *)val, olen);
2584
2585 if ((pi->conf_state & L2CAP_CONF_STATE2_DEVICE) &&
2586 rfc.mode != pi->mode)
2587 return -ECONNREFUSED;
2588
2589 pi->mode = rfc.mode;
2590 pi->fcs = 0;
2591
2592 l2cap_add_conf_opt(&ptr, L2CAP_CONF_RFC,
2593 sizeof(rfc), (unsigned long) &rfc);
2594 break;
2595 }
2596 }
2597
2598 if (*result == L2CAP_CONF_SUCCESS) {
2599 switch (rfc.mode) {
2600 case L2CAP_MODE_ERTM:
2601 pi->remote_tx_win = rfc.txwin_size;
10467e9e
GP
2602 pi->retrans_timeout = le16_to_cpu(rfc.retrans_timeout);
2603 pi->monitor_timeout = le16_to_cpu(rfc.monitor_timeout);
1c762159 2604 pi->mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2605 break;
2606 case L2CAP_MODE_STREAMING:
1c762159 2607 pi->mps = le16_to_cpu(rfc.max_pdu_size);
f2fcfcd6
GP
2608 }
2609 }
2610
2611 req->dcid = cpu_to_le16(pi->dcid);
2612 req->flags = cpu_to_le16(0x0000);
2613
2614 return ptr - data;
2615}
2616
5dee9e7c 2617static int l2cap_build_conf_rsp(struct sock *sk, void *data, u16 result, u16 flags)
1da177e4
LT
2618{
2619 struct l2cap_conf_rsp *rsp = data;
2620 void *ptr = rsp->data;
1da177e4 2621
5dee9e7c 2622 BT_DBG("sk %p", sk);
1da177e4 2623
aca3192c 2624 rsp->scid = cpu_to_le16(l2cap_pi(sk)->dcid);
5dee9e7c 2625 rsp->result = cpu_to_le16(result);
aca3192c 2626 rsp->flags = cpu_to_le16(flags);
1da177e4
LT
2627
2628 return ptr - data;
2629}
2630
7b1c0049
GP
2631static void l2cap_conf_rfc_get(struct sock *sk, void *rsp, int len)
2632{
2633 struct l2cap_pinfo *pi = l2cap_pi(sk);
2634 int type, olen;
2635 unsigned long val;
2636 struct l2cap_conf_rfc rfc;
2637
2638 BT_DBG("sk %p, rsp %p, len %d", sk, rsp, len);
2639
2640 if ((pi->mode != L2CAP_MODE_ERTM) && (pi->mode != L2CAP_MODE_STREAMING))
2641 return;
2642
2643 while (len >= L2CAP_CONF_OPT_SIZE) {
2644 len -= l2cap_get_conf_opt(&rsp, &type, &olen, &val);
2645
2646 switch (type) {
2647 case L2CAP_CONF_RFC:
2648 if (olen == sizeof(rfc))
2649 memcpy(&rfc, (void *)val, olen);
2650 goto done;
2651 }
2652 }
2653
2654done:
2655 switch (rfc.mode) {
2656 case L2CAP_MODE_ERTM:
2657 pi->remote_tx_win = rfc.txwin_size;
10467e9e
GP
2658 pi->retrans_timeout = le16_to_cpu(rfc.retrans_timeout);
2659 pi->monitor_timeout = le16_to_cpu(rfc.monitor_timeout);
7b1c0049
GP
2660 pi->mps = le16_to_cpu(rfc.max_pdu_size);
2661 break;
2662 case L2CAP_MODE_STREAMING:
2663 pi->mps = le16_to_cpu(rfc.max_pdu_size);
2664 }
2665}
2666
4e8402a3
MH
2667static inline int l2cap_command_rej(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2668{
2669 struct l2cap_cmd_rej *rej = (struct l2cap_cmd_rej *) data;
2670
2671 if (rej->reason != 0x0000)
2672 return 0;
2673
2674 if ((conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_SENT) &&
2675 cmd->ident == conn->info_ident) {
4e8402a3 2676 del_timer(&conn->info_timer);
984947dc
MH
2677
2678 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 2679 conn->info_ident = 0;
984947dc 2680
4e8402a3
MH
2681 l2cap_conn_start(conn);
2682 }
2683
2684 return 0;
2685}
2686
1da177e4
LT
2687static inline int l2cap_connect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2688{
2689 struct l2cap_chan_list *list = &conn->chan_list;
2690 struct l2cap_conn_req *req = (struct l2cap_conn_req *) data;
2691 struct l2cap_conn_rsp rsp;
2692 struct sock *sk, *parent;
e7c29cb1 2693 int result, status = L2CAP_CS_NO_INFO;
1da177e4
LT
2694
2695 u16 dcid = 0, scid = __le16_to_cpu(req->scid);
e7c29cb1 2696 __le16 psm = req->psm;
1da177e4
LT
2697
2698 BT_DBG("psm 0x%2.2x scid 0x%4.4x", psm, scid);
2699
2700 /* Check if we have socket listening on psm */
2701 parent = l2cap_get_sock_by_psm(BT_LISTEN, psm, conn->src);
2702 if (!parent) {
2703 result = L2CAP_CR_BAD_PSM;
2704 goto sendresp;
2705 }
2706
e7c29cb1
MH
2707 /* Check if the ACL is secure enough (if not SDP) */
2708 if (psm != cpu_to_le16(0x0001) &&
2709 !hci_conn_check_link_mode(conn->hcon)) {
2950f21a 2710 conn->disc_reason = 0x05;
e7c29cb1
MH
2711 result = L2CAP_CR_SEC_BLOCK;
2712 goto response;
2713 }
2714
1da177e4
LT
2715 result = L2CAP_CR_NO_MEM;
2716
2717 /* Check for backlog size */
2718 if (sk_acceptq_is_full(parent)) {
8e87d142 2719 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1da177e4
LT
2720 goto response;
2721 }
2722
3b1e0a65 2723 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP, GFP_ATOMIC);
1da177e4
LT
2724 if (!sk)
2725 goto response;
2726
fd1278d7 2727 write_lock_bh(&list->lock);
1da177e4
LT
2728
2729 /* Check if we already have channel with that dcid */
2730 if (__l2cap_get_chan_by_dcid(list, scid)) {
fd1278d7 2731 write_unlock_bh(&list->lock);
1da177e4
LT
2732 sock_set_flag(sk, SOCK_ZAPPED);
2733 l2cap_sock_kill(sk);
2734 goto response;
2735 }
2736
2737 hci_conn_hold(conn->hcon);
2738
2739 l2cap_sock_init(sk, parent);
2740 bacpy(&bt_sk(sk)->src, conn->src);
2741 bacpy(&bt_sk(sk)->dst, conn->dst);
2742 l2cap_pi(sk)->psm = psm;
2743 l2cap_pi(sk)->dcid = scid;
2744
2745 __l2cap_chan_add(conn, sk, parent);
2746 dcid = l2cap_pi(sk)->scid;
2747
2748 l2cap_sock_set_timer(sk, sk->sk_sndtimeo);
2749
1da177e4
LT
2750 l2cap_pi(sk)->ident = cmd->ident;
2751
984947dc 2752 if (conn->info_state & L2CAP_INFO_FEAT_MASK_REQ_DONE) {
2af6b9d5 2753 if (l2cap_check_security(sk)) {
f66dc81f
MH
2754 if (bt_sk(sk)->defer_setup) {
2755 sk->sk_state = BT_CONNECT2;
2756 result = L2CAP_CR_PEND;
2757 status = L2CAP_CS_AUTHOR_PEND;
2758 parent->sk_data_ready(parent, 0);
2759 } else {
2760 sk->sk_state = BT_CONFIG;
2761 result = L2CAP_CR_SUCCESS;
2762 status = L2CAP_CS_NO_INFO;
2763 }
79d554a6
MH
2764 } else {
2765 sk->sk_state = BT_CONNECT2;
2766 result = L2CAP_CR_PEND;
2767 status = L2CAP_CS_AUTHEN_PEND;
2768 }
2769 } else {
2770 sk->sk_state = BT_CONNECT2;
2771 result = L2CAP_CR_PEND;
2772 status = L2CAP_CS_NO_INFO;
1da177e4
LT
2773 }
2774
fd1278d7 2775 write_unlock_bh(&list->lock);
1da177e4
LT
2776
2777response:
2778 bh_unlock_sock(parent);
2779
2780sendresp:
aca3192c
YH
2781 rsp.scid = cpu_to_le16(scid);
2782 rsp.dcid = cpu_to_le16(dcid);
2783 rsp.result = cpu_to_le16(result);
2784 rsp.status = cpu_to_le16(status);
1da177e4 2785 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONN_RSP, sizeof(rsp), &rsp);
79d554a6
MH
2786
2787 if (result == L2CAP_CR_PEND && status == L2CAP_CS_NO_INFO) {
2788 struct l2cap_info_req info;
2789 info.type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
2790
2791 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_SENT;
2792 conn->info_ident = l2cap_get_ident(conn);
2793
2794 mod_timer(&conn->info_timer, jiffies +
2795 msecs_to_jiffies(L2CAP_INFO_TIMEOUT));
2796
2797 l2cap_send_cmd(conn, conn->info_ident,
2798 L2CAP_INFO_REQ, sizeof(info), &info);
2799 }
2800
1da177e4
LT
2801 return 0;
2802}
2803
2804static inline int l2cap_connect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2805{
2806 struct l2cap_conn_rsp *rsp = (struct l2cap_conn_rsp *) data;
2807 u16 scid, dcid, result, status;
2808 struct sock *sk;
2809 u8 req[128];
2810
2811 scid = __le16_to_cpu(rsp->scid);
2812 dcid = __le16_to_cpu(rsp->dcid);
2813 result = __le16_to_cpu(rsp->result);
2814 status = __le16_to_cpu(rsp->status);
2815
2816 BT_DBG("dcid 0x%4.4x scid 0x%4.4x result 0x%2.2x status 0x%2.2x", dcid, scid, result, status);
2817
2818 if (scid) {
af05b30b
GP
2819 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2820 if (!sk)
1da177e4
LT
2821 return 0;
2822 } else {
af05b30b
GP
2823 sk = l2cap_get_chan_by_ident(&conn->chan_list, cmd->ident);
2824 if (!sk)
1da177e4
LT
2825 return 0;
2826 }
2827
2828 switch (result) {
2829 case L2CAP_CR_SUCCESS:
2830 sk->sk_state = BT_CONFIG;
2831 l2cap_pi(sk)->ident = 0;
2832 l2cap_pi(sk)->dcid = dcid;
2833 l2cap_pi(sk)->conf_state |= L2CAP_CONF_REQ_SENT;
2834
6a8d3010
MH
2835 l2cap_pi(sk)->conf_state &= ~L2CAP_CONF_CONNECT_PEND;
2836
1da177e4
LT
2837 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
2838 l2cap_build_conf_req(sk, req), req);
f2fcfcd6 2839 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2840 break;
2841
2842 case L2CAP_CR_PEND:
6a8d3010 2843 l2cap_pi(sk)->conf_state |= L2CAP_CONF_CONNECT_PEND;
1da177e4
LT
2844 break;
2845
2846 default:
2847 l2cap_chan_del(sk, ECONNREFUSED);
2848 break;
2849 }
2850
2851 bh_unlock_sock(sk);
2852 return 0;
2853}
2854
88219a0f 2855static inline int l2cap_config_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u16 cmd_len, u8 *data)
1da177e4
LT
2856{
2857 struct l2cap_conf_req *req = (struct l2cap_conf_req *) data;
2858 u16 dcid, flags;
2859 u8 rsp[64];
2860 struct sock *sk;
5dee9e7c 2861 int len;
1da177e4
LT
2862
2863 dcid = __le16_to_cpu(req->dcid);
2864 flags = __le16_to_cpu(req->flags);
2865
2866 BT_DBG("dcid 0x%4.4x flags 0x%2.2x", dcid, flags);
2867
af05b30b
GP
2868 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
2869 if (!sk)
1da177e4
LT
2870 return -ENOENT;
2871
354f60a9
MH
2872 if (sk->sk_state == BT_DISCONN)
2873 goto unlock;
2874
5dee9e7c 2875 /* Reject if config buffer is too small. */
88219a0f 2876 len = cmd_len - sizeof(*req);
5dee9e7c
MH
2877 if (l2cap_pi(sk)->conf_len + len > sizeof(l2cap_pi(sk)->conf_req)) {
2878 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
2879 l2cap_build_conf_rsp(sk, rsp,
2880 L2CAP_CONF_REJECT, flags), rsp);
2881 goto unlock;
2882 }
2883
2884 /* Store config. */
2885 memcpy(l2cap_pi(sk)->conf_req + l2cap_pi(sk)->conf_len, req->data, len);
2886 l2cap_pi(sk)->conf_len += len;
1da177e4
LT
2887
2888 if (flags & 0x0001) {
2889 /* Incomplete config. Send empty response. */
2890 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP,
5dee9e7c
MH
2891 l2cap_build_conf_rsp(sk, rsp,
2892 L2CAP_CONF_SUCCESS, 0x0001), rsp);
1da177e4
LT
2893 goto unlock;
2894 }
2895
2896 /* Complete config. */
5dee9e7c 2897 len = l2cap_parse_conf_req(sk, rsp);
f2fcfcd6 2898 if (len < 0) {
22121fc9 2899 l2cap_send_disconn_req(conn, sk);
1da177e4 2900 goto unlock;
f2fcfcd6 2901 }
1da177e4 2902
5dee9e7c 2903 l2cap_send_cmd(conn, cmd->ident, L2CAP_CONF_RSP, len, rsp);
f2fcfcd6 2904 l2cap_pi(sk)->num_conf_rsp++;
5dee9e7c 2905
5dee9e7c
MH
2906 /* Reset config buffer. */
2907 l2cap_pi(sk)->conf_len = 0;
2908
876d9484
MH
2909 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE))
2910 goto unlock;
2911
1da177e4 2912 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_INPUT_DONE) {
f64f9e71
JP
2913 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
2914 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
2915 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
2916
1da177e4 2917 sk->sk_state = BT_CONNECTED;
e90bac06 2918
0565c1c2
GP
2919 l2cap_pi(sk)->next_tx_seq = 0;
2920 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 2921 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
2922 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
2923 l2cap_ertm_init(sk);
2924
1da177e4 2925 l2cap_chan_ready(sk);
876d9484
MH
2926 goto unlock;
2927 }
2928
2929 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_REQ_SENT)) {
79d554a6 2930 u8 buf[64];
1da177e4 2931 l2cap_send_cmd(conn, l2cap_get_ident(conn), L2CAP_CONF_REQ,
79d554a6 2932 l2cap_build_conf_req(sk, buf), buf);
f2fcfcd6 2933 l2cap_pi(sk)->num_conf_req++;
1da177e4
LT
2934 }
2935
2936unlock:
2937 bh_unlock_sock(sk);
2938 return 0;
2939}
2940
2941static inline int l2cap_config_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
2942{
2943 struct l2cap_conf_rsp *rsp = (struct l2cap_conf_rsp *)data;
2944 u16 scid, flags, result;
2945 struct sock *sk;
7b1c0049 2946 int len = cmd->len - sizeof(*rsp);
1da177e4
LT
2947
2948 scid = __le16_to_cpu(rsp->scid);
2949 flags = __le16_to_cpu(rsp->flags);
2950 result = __le16_to_cpu(rsp->result);
2951
af05b30b
GP
2952 BT_DBG("scid 0x%4.4x flags 0x%2.2x result 0x%2.2x",
2953 scid, flags, result);
1da177e4 2954
af05b30b
GP
2955 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
2956 if (!sk)
1da177e4
LT
2957 return 0;
2958
2959 switch (result) {
2960 case L2CAP_CONF_SUCCESS:
7b1c0049 2961 l2cap_conf_rfc_get(sk, rsp->data, len);
1da177e4
LT
2962 break;
2963
2964 case L2CAP_CONF_UNACCEPT:
f2fcfcd6 2965 if (l2cap_pi(sk)->num_conf_rsp <= L2CAP_CONF_MAX_CONF_RSP) {
f2fcfcd6
GP
2966 char req[64];
2967
c2c77ec8
AE
2968 if (len > sizeof(req) - sizeof(struct l2cap_conf_req)) {
2969 l2cap_send_disconn_req(conn, sk);
2970 goto done;
2971 }
2972
f2fcfcd6
GP
2973 /* throw out any old stored conf requests */
2974 result = L2CAP_CONF_SUCCESS;
2975 len = l2cap_parse_conf_rsp(sk, rsp->data,
2976 len, req, &result);
2977 if (len < 0) {
22121fc9 2978 l2cap_send_disconn_req(conn, sk);
f2fcfcd6
GP
2979 goto done;
2980 }
2981
2982 l2cap_send_cmd(conn, l2cap_get_ident(conn),
2983 L2CAP_CONF_REQ, len, req);
2984 l2cap_pi(sk)->num_conf_req++;
2985 if (result != L2CAP_CONF_SUCCESS)
2986 goto done;
2987 break;
1da177e4
LT
2988 }
2989
8e87d142 2990 default:
1da177e4 2991 sk->sk_state = BT_DISCONN;
b1235d79 2992 sk->sk_err = ECONNRESET;
1da177e4 2993 l2cap_sock_set_timer(sk, HZ * 5);
22121fc9 2994 l2cap_send_disconn_req(conn, sk);
1da177e4
LT
2995 goto done;
2996 }
2997
2998 if (flags & 0x01)
2999 goto done;
3000
1da177e4
LT
3001 l2cap_pi(sk)->conf_state |= L2CAP_CONF_INPUT_DONE;
3002
3003 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_OUTPUT_DONE) {
f64f9e71
JP
3004 if (!(l2cap_pi(sk)->conf_state & L2CAP_CONF_NO_FCS_RECV) ||
3005 l2cap_pi(sk)->fcs != L2CAP_FCS_NONE)
fcc203c3
GP
3006 l2cap_pi(sk)->fcs = L2CAP_FCS_CRC16;
3007
1da177e4 3008 sk->sk_state = BT_CONNECTED;
0565c1c2 3009 l2cap_pi(sk)->next_tx_seq = 0;
1c2acffb 3010 l2cap_pi(sk)->expected_tx_seq = 0;
1c2acffb 3011 __skb_queue_head_init(TX_QUEUE(sk));
0565c1c2
GP
3012 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM)
3013 l2cap_ertm_init(sk);
3014
1da177e4
LT
3015 l2cap_chan_ready(sk);
3016 }
3017
3018done:
3019 bh_unlock_sock(sk);
3020 return 0;
3021}
3022
3023static inline int l2cap_disconnect_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3024{
3025 struct l2cap_disconn_req *req = (struct l2cap_disconn_req *) data;
3026 struct l2cap_disconn_rsp rsp;
3027 u16 dcid, scid;
3028 struct sock *sk;
3029
3030 scid = __le16_to_cpu(req->scid);
3031 dcid = __le16_to_cpu(req->dcid);
3032
3033 BT_DBG("scid 0x%4.4x dcid 0x%4.4x", scid, dcid);
3034
af05b30b
GP
3035 sk = l2cap_get_chan_by_scid(&conn->chan_list, dcid);
3036 if (!sk)
1da177e4
LT
3037 return 0;
3038
aca3192c
YH
3039 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
3040 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
1da177e4
LT
3041 l2cap_send_cmd(conn, cmd->ident, L2CAP_DISCONN_RSP, sizeof(rsp), &rsp);
3042
3043 sk->sk_shutdown = SHUTDOWN_MASK;
3044
1c2acffb 3045 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
3046
3047 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
3048 skb_queue_purge(SREJ_QUEUE(sk));
3049 del_timer(&l2cap_pi(sk)->retrans_timer);
3050 del_timer(&l2cap_pi(sk)->monitor_timer);
c1b4f43b 3051 del_timer(&l2cap_pi(sk)->ack_timer);
0565c1c2 3052 }
1c2acffb 3053
1da177e4
LT
3054 l2cap_chan_del(sk, ECONNRESET);
3055 bh_unlock_sock(sk);
3056
3057 l2cap_sock_kill(sk);
3058 return 0;
3059}
3060
3061static inline int l2cap_disconnect_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3062{
3063 struct l2cap_disconn_rsp *rsp = (struct l2cap_disconn_rsp *) data;
3064 u16 dcid, scid;
3065 struct sock *sk;
3066
3067 scid = __le16_to_cpu(rsp->scid);
3068 dcid = __le16_to_cpu(rsp->dcid);
3069
3070 BT_DBG("dcid 0x%4.4x scid 0x%4.4x", dcid, scid);
3071
af05b30b
GP
3072 sk = l2cap_get_chan_by_scid(&conn->chan_list, scid);
3073 if (!sk)
1da177e4
LT
3074 return 0;
3075
1c2acffb 3076 skb_queue_purge(TX_QUEUE(sk));
0565c1c2
GP
3077
3078 if (l2cap_pi(sk)->mode == L2CAP_MODE_ERTM) {
3079 skb_queue_purge(SREJ_QUEUE(sk));
3080 del_timer(&l2cap_pi(sk)->retrans_timer);
3081 del_timer(&l2cap_pi(sk)->monitor_timer);
c1b4f43b 3082 del_timer(&l2cap_pi(sk)->ack_timer);
0565c1c2 3083 }
1c2acffb 3084
1da177e4
LT
3085 l2cap_chan_del(sk, 0);
3086 bh_unlock_sock(sk);
3087
3088 l2cap_sock_kill(sk);
3089 return 0;
3090}
3091
3092static inline int l2cap_information_req(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3093{
3094 struct l2cap_info_req *req = (struct l2cap_info_req *) data;
1da177e4
LT
3095 u16 type;
3096
3097 type = __le16_to_cpu(req->type);
3098
3099 BT_DBG("type 0x%4.4x", type);
3100
f0709e03
MH
3101 if (type == L2CAP_IT_FEAT_MASK) {
3102 u8 buf[8];
44dd46de 3103 u32 feat_mask = l2cap_feat_mask;
f0709e03
MH
3104 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3105 rsp->type = cpu_to_le16(L2CAP_IT_FEAT_MASK);
3106 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
44dd46de 3107 if (enable_ertm)
fcc203c3
GP
3108 feat_mask |= L2CAP_FEAT_ERTM | L2CAP_FEAT_STREAMING
3109 | L2CAP_FEAT_FCS;
1b7bf4ed 3110 put_unaligned_le32(feat_mask, rsp->data);
f0709e03
MH
3111 l2cap_send_cmd(conn, cmd->ident,
3112 L2CAP_INFO_RSP, sizeof(buf), buf);
e1027a7c
MH
3113 } else if (type == L2CAP_IT_FIXED_CHAN) {
3114 u8 buf[12];
3115 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) buf;
3116 rsp->type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3117 rsp->result = cpu_to_le16(L2CAP_IR_SUCCESS);
3118 memcpy(buf + 4, l2cap_fixed_chan, 8);
3119 l2cap_send_cmd(conn, cmd->ident,
3120 L2CAP_INFO_RSP, sizeof(buf), buf);
f0709e03
MH
3121 } else {
3122 struct l2cap_info_rsp rsp;
3123 rsp.type = cpu_to_le16(type);
3124 rsp.result = cpu_to_le16(L2CAP_IR_NOTSUPP);
3125 l2cap_send_cmd(conn, cmd->ident,
3126 L2CAP_INFO_RSP, sizeof(rsp), &rsp);
3127 }
1da177e4
LT
3128
3129 return 0;
3130}
3131
3132static inline int l2cap_information_rsp(struct l2cap_conn *conn, struct l2cap_cmd_hdr *cmd, u8 *data)
3133{
3134 struct l2cap_info_rsp *rsp = (struct l2cap_info_rsp *) data;
3135 u16 type, result;
3136
3137 type = __le16_to_cpu(rsp->type);
3138 result = __le16_to_cpu(rsp->result);
3139
3140 BT_DBG("type 0x%4.4x result 0x%2.2x", type, result);
3141
4e8402a3
MH
3142 del_timer(&conn->info_timer);
3143
984947dc 3144 if (type == L2CAP_IT_FEAT_MASK) {
83985319 3145 conn->feat_mask = get_unaligned_le32(rsp->data);
4e8402a3 3146
47ec1dcd 3147 if (conn->feat_mask & L2CAP_FEAT_FIXED_CHAN) {
e1027a7c
MH
3148 struct l2cap_info_req req;
3149 req.type = cpu_to_le16(L2CAP_IT_FIXED_CHAN);
3150
3151 conn->info_ident = l2cap_get_ident(conn);
3152
3153 l2cap_send_cmd(conn, conn->info_ident,
3154 L2CAP_INFO_REQ, sizeof(req), &req);
3155 } else {
3156 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
3157 conn->info_ident = 0;
3158
3159 l2cap_conn_start(conn);
3160 }
3161 } else if (type == L2CAP_IT_FIXED_CHAN) {
984947dc 3162 conn->info_state |= L2CAP_INFO_FEAT_MASK_REQ_DONE;
e1027a7c 3163 conn->info_ident = 0;
984947dc
MH
3164
3165 l2cap_conn_start(conn);
3166 }
4e8402a3 3167
1da177e4
LT
3168 return 0;
3169}
3170
3171static inline void l2cap_sig_channel(struct l2cap_conn *conn, struct sk_buff *skb)
3172{
3173 u8 *data = skb->data;
3174 int len = skb->len;
3175 struct l2cap_cmd_hdr cmd;
3176 int err = 0;
3177
3178 l2cap_raw_recv(conn, skb);
3179
3180 while (len >= L2CAP_CMD_HDR_SIZE) {
88219a0f 3181 u16 cmd_len;
1da177e4
LT
3182 memcpy(&cmd, data, L2CAP_CMD_HDR_SIZE);
3183 data += L2CAP_CMD_HDR_SIZE;
3184 len -= L2CAP_CMD_HDR_SIZE;
3185
88219a0f 3186 cmd_len = le16_to_cpu(cmd.len);
1da177e4 3187
88219a0f 3188 BT_DBG("code 0x%2.2x len %d id 0x%2.2x", cmd.code, cmd_len, cmd.ident);
1da177e4 3189
88219a0f 3190 if (cmd_len > len || !cmd.ident) {
1da177e4
LT
3191 BT_DBG("corrupted command");
3192 break;
3193 }
3194
3195 switch (cmd.code) {
3196 case L2CAP_COMMAND_REJ:
4e8402a3 3197 l2cap_command_rej(conn, &cmd, data);
1da177e4
LT
3198 break;
3199
3200 case L2CAP_CONN_REQ:
3201 err = l2cap_connect_req(conn, &cmd, data);
3202 break;
3203
3204 case L2CAP_CONN_RSP:
3205 err = l2cap_connect_rsp(conn, &cmd, data);
3206 break;
3207
3208 case L2CAP_CONF_REQ:
88219a0f 3209 err = l2cap_config_req(conn, &cmd, cmd_len, data);
1da177e4
LT
3210 break;
3211
3212 case L2CAP_CONF_RSP:
3213 err = l2cap_config_rsp(conn, &cmd, data);
3214 break;
3215
3216 case L2CAP_DISCONN_REQ:
3217 err = l2cap_disconnect_req(conn, &cmd, data);
3218 break;
3219
3220 case L2CAP_DISCONN_RSP:
3221 err = l2cap_disconnect_rsp(conn, &cmd, data);
3222 break;
3223
3224 case L2CAP_ECHO_REQ:
88219a0f 3225 l2cap_send_cmd(conn, cmd.ident, L2CAP_ECHO_RSP, cmd_len, data);
1da177e4
LT
3226 break;
3227
3228 case L2CAP_ECHO_RSP:
3229 break;
3230
3231 case L2CAP_INFO_REQ:
3232 err = l2cap_information_req(conn, &cmd, data);
3233 break;
3234
3235 case L2CAP_INFO_RSP:
3236 err = l2cap_information_rsp(conn, &cmd, data);
3237 break;
3238
3239 default:
3240 BT_ERR("Unknown signaling command 0x%2.2x", cmd.code);
3241 err = -EINVAL;
3242 break;
3243 }
3244
3245 if (err) {
3246 struct l2cap_cmd_rej rej;
3247 BT_DBG("error %d", err);
3248
3249 /* FIXME: Map err to a valid reason */
aca3192c 3250 rej.reason = cpu_to_le16(0);
1da177e4
LT
3251 l2cap_send_cmd(conn, cmd.ident, L2CAP_COMMAND_REJ, sizeof(rej), &rej);
3252 }
3253
88219a0f
AV
3254 data += cmd_len;
3255 len -= cmd_len;
1da177e4
LT
3256 }
3257
3258 kfree_skb(skb);
3259}
3260
fcc203c3
GP
3261static int l2cap_check_fcs(struct l2cap_pinfo *pi, struct sk_buff *skb)
3262{
3263 u16 our_fcs, rcv_fcs;
3264 int hdr_size = L2CAP_HDR_SIZE + 2;
3265
3266 if (pi->fcs == L2CAP_FCS_CRC16) {
3267 skb_trim(skb, skb->len - 2);
3268 rcv_fcs = get_unaligned_le16(skb->data + skb->len);
3269 our_fcs = crc16(0, skb->data - hdr_size, skb->len + hdr_size);
3270
3271 if (our_fcs != rcv_fcs)
3272 return -EINVAL;
3273 }
3274 return 0;
3275}
3276
d5392c8f
GP
3277static inline void l2cap_send_i_or_rr_or_rnr(struct sock *sk)
3278{
3279 struct l2cap_pinfo *pi = l2cap_pi(sk);
3280 u16 control = 0;
3281
3282 pi->frames_sent = 0;
3283 pi->conn_state |= L2CAP_CONN_SEND_FBIT;
3284
3285 control |= pi->buffer_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3286
3287 if (pi->conn_state & L2CAP_CONN_LOCAL_BUSY) {
3288 control |= L2CAP_SUPER_RCV_NOT_READY | L2CAP_CTRL_FINAL;
3289 l2cap_send_sframe(pi, control);
3290 pi->conn_state &= ~L2CAP_CONN_SEND_FBIT;
3291 }
3292
3293 if (pi->conn_state & L2CAP_CONN_REMOTE_BUSY && pi->unacked_frames > 0)
3294 __mod_retrans_timer();
3295
3296 l2cap_ertm_send(sk);
3297
3298 if (!(pi->conn_state & L2CAP_CONN_LOCAL_BUSY) &&
3299 pi->frames_sent == 0) {
3300 control |= L2CAP_SUPER_RCV_READY;
d5392c8f
GP
3301 l2cap_send_sframe(pi, control);
3302 }
3303}
3304
8f17154f
GP
3305static void l2cap_add_to_srej_queue(struct sock *sk, struct sk_buff *skb, u8 tx_seq, u8 sar)
3306{
3307 struct sk_buff *next_skb;
3308
3309 bt_cb(skb)->tx_seq = tx_seq;
3310 bt_cb(skb)->sar = sar;
3311
3312 next_skb = skb_peek(SREJ_QUEUE(sk));
3313 if (!next_skb) {
3314 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3315 return;
3316 }
3317
3318 do {
3319 if (bt_cb(next_skb)->tx_seq > tx_seq) {
3320 __skb_queue_before(SREJ_QUEUE(sk), next_skb, skb);
3321 return;
3322 }
3323
3324 if (skb_queue_is_last(SREJ_QUEUE(sk), next_skb))
3325 break;
3326
3327 } while((next_skb = skb_queue_next(SREJ_QUEUE(sk), next_skb)));
3328
3329 __skb_queue_tail(SREJ_QUEUE(sk), skb);
3330}
3331
c74e560c
GP
3332static int l2cap_sar_reassembly_sdu(struct sock *sk, struct sk_buff *skb, u16 control)
3333{
3334 struct l2cap_pinfo *pi = l2cap_pi(sk);
3335 struct sk_buff *_skb;
3336 int err = -EINVAL;
3337
3338 switch (control & L2CAP_CTRL_SAR) {
3339 case L2CAP_SDU_UNSEGMENTED:
3340 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3341 kfree_skb(pi->sdu);
3342 break;
3343 }
3344
3345 err = sock_queue_rcv_skb(sk, skb);
3346 if (!err)
3347 return 0;
3348
3349 break;
3350
3351 case L2CAP_SDU_START:
3352 if (pi->conn_state & L2CAP_CONN_SAR_SDU) {
3353 kfree_skb(pi->sdu);
3354 break;
3355 }
3356
3357 pi->sdu_len = get_unaligned_le16(skb->data);
3358 skb_pull(skb, 2);
3359
052897ca
GP
3360 if (pi->sdu_len > pi->imtu) {
3361 err = -EMSGSIZE;
3362 break;
3363 }
3364
c74e560c
GP
3365 pi->sdu = bt_skb_alloc(pi->sdu_len, GFP_ATOMIC);
3366 if (!pi->sdu) {
3367 err = -ENOMEM;
3368 break;
3369 }
3370
3371 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3372
3373 pi->conn_state |= L2CAP_CONN_SAR_SDU;
3374 pi->partial_sdu_len = skb->len;
3375 err = 0;
3376 break;
3377
3378 case L2CAP_SDU_CONTINUE:
3379 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3380 break;
3381
3382 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3383
3384 pi->partial_sdu_len += skb->len;
3385 if (pi->partial_sdu_len > pi->sdu_len)
3386 kfree_skb(pi->sdu);
3387 else
3388 err = 0;
3389
3390 break;
3391
3392 case L2CAP_SDU_END:
3393 if (!(pi->conn_state & L2CAP_CONN_SAR_SDU))
3394 break;
3395
3396 memcpy(skb_put(pi->sdu, skb->len), skb->data, skb->len);
3397
3398 pi->conn_state &= ~L2CAP_CONN_SAR_SDU;
3399 pi->partial_sdu_len += skb->len;
3400
36f2fd58
GP
3401 if (pi->partial_sdu_len > pi->imtu)
3402 goto drop;
3403
c74e560c
GP
3404 if (pi->partial_sdu_len == pi->sdu_len) {
3405 _skb = skb_clone(pi->sdu, GFP_ATOMIC);
3406 err = sock_queue_rcv_skb(sk, _skb);
3407 if (err < 0)
3408 kfree_skb(_skb);
3409 }
c74e560c
GP
3410 err = 0;
3411
36f2fd58
GP
3412drop:
3413 kfree_skb(pi->sdu);
c74e560c
GP
3414 break;
3415 }
3416
3417 kfree_skb(skb);
3418 return err;
3419}
3420
8f17154f
GP
3421static void l2cap_check_srej_gap(struct sock *sk, u8 tx_seq)
3422{
3423 struct sk_buff *skb;
3424 u16 control = 0;
3425
3426 while((skb = skb_peek(SREJ_QUEUE(sk)))) {
3427 if (bt_cb(skb)->tx_seq != tx_seq)
3428 break;
3429
3430 skb = skb_dequeue(SREJ_QUEUE(sk));
3431 control |= bt_cb(skb)->sar << L2CAP_CTRL_SAR_SHIFT;
3432 l2cap_sar_reassembly_sdu(sk, skb, control);
3433 l2cap_pi(sk)->buffer_seq_srej =
3434 (l2cap_pi(sk)->buffer_seq_srej + 1) % 64;
3435 tx_seq++;
3436 }
3437}
3438
3439static void l2cap_resend_srejframe(struct sock *sk, u8 tx_seq)
3440{
3441 struct l2cap_pinfo *pi = l2cap_pi(sk);
3442 struct srej_list *l, *tmp;
3443 u16 control;
3444
3445 list_for_each_entry_safe(l,tmp, SREJ_LIST(sk), list) {
3446 if (l->tx_seq == tx_seq) {
3447 list_del(&l->list);
3448 kfree(l);
3449 return;
3450 }
3451 control = L2CAP_SUPER_SELECT_REJECT;
3452 control |= l->tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3453 l2cap_send_sframe(pi, control);
3454 list_del(&l->list);
3455 list_add_tail(&l->list, SREJ_LIST(sk));
3456 }
3457}
3458
3459static void l2cap_send_srejframe(struct sock *sk, u8 tx_seq)
3460{
3461 struct l2cap_pinfo *pi = l2cap_pi(sk);
3462 struct srej_list *new;
3463 u16 control;
3464
3465 while (tx_seq != pi->expected_tx_seq) {
3466 control = L2CAP_SUPER_SELECT_REJECT;
3467 control |= pi->expected_tx_seq << L2CAP_CTRL_REQSEQ_SHIFT;
3468 l2cap_send_sframe(pi, control);
3469
3470 new = kzalloc(sizeof(struct srej_list), GFP_ATOMIC);
3471 new->tx_seq = pi->expected_tx_seq++;
3472 list_add_tail(&new->list, SREJ_LIST(sk));
3473 }
3474 pi->expected_tx_seq++;
3475}
3476
1c2acffb
GP
3477static inline int l2cap_data_channel_iframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3478{
3479 struct l2cap_pinfo *pi = l2cap_pi(sk);
3480 u8 tx_seq = __get_txseq(rx_control);
9f121a5a 3481 u8 req_seq = __get_reqseq(rx_control);
8f17154f 3482 u8 sar = rx_control >> L2CAP_CTRL_SAR_SHIFT;
803020c6 3483 int num_to_ack = (pi->tx_win/6) + 1;
1c2acffb
GP
3484 int err = 0;
3485
3486 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3487
1d8f5d16
GP
3488 if (L2CAP_CTRL_FINAL & rx_control) {
3489 del_timer(&pi->monitor_timer);
3490 if (pi->unacked_frames > 0)
3491 __mod_retrans_timer();
3492 pi->conn_state &= ~L2CAP_CONN_WAIT_F;
3493 }
3494
9f121a5a
GP
3495 pi->expected_ack_seq = req_seq;
3496 l2cap_drop_acked_frames(sk);
3497
8f17154f
GP
3498 if (tx_seq == pi->expected_tx_seq)
3499 goto expected;
1c2acffb 3500
8f17154f
GP
3501 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3502 struct srej_list *first;
30afb5b2 3503
8f17154f
GP
3504 first = list_first_entry(SREJ_LIST(sk),
3505 struct srej_list, list);
3506 if (tx_seq == first->tx_seq) {
3507 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3508 l2cap_check_srej_gap(sk, tx_seq);
3509
3510 list_del(&first->list);
3511 kfree(first);
3512
3513 if (list_empty(SREJ_LIST(sk))) {
3514 pi->buffer_seq = pi->buffer_seq_srej;
3515 pi->conn_state &= ~L2CAP_CONN_SREJ_SENT;
855666cc 3516 l2cap_send_ack(pi);
8f17154f
GP
3517 }
3518 } else {
3519 struct srej_list *l;
3520 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3521
3522 list_for_each_entry(l, SREJ_LIST(sk), list) {
3523 if (l->tx_seq == tx_seq) {
3524 l2cap_resend_srejframe(sk, tx_seq);
3525 return 0;
3526 }
3527 }
3528 l2cap_send_srejframe(sk, tx_seq);
30afb5b2
GP
3529 }
3530 } else {
8f17154f 3531 pi->conn_state |= L2CAP_CONN_SREJ_SENT;
1c2acffb 3532
8f17154f
GP
3533 INIT_LIST_HEAD(SREJ_LIST(sk));
3534 pi->buffer_seq_srej = pi->buffer_seq;
3535
3536 __skb_queue_head_init(SREJ_QUEUE(sk));
3537 l2cap_add_to_srej_queue(sk, skb, tx_seq, sar);
3538
ef54fd93
GP
3539 pi->conn_state |= L2CAP_CONN_SEND_PBIT;
3540
8f17154f 3541 l2cap_send_srejframe(sk, tx_seq);
1c2acffb 3542 }
30afb5b2
GP
3543 return 0;
3544
8f17154f
GP
3545expected:
3546 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3547
3548 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3b1a9f3f
GP
3549 bt_cb(skb)->tx_seq = tx_seq;
3550 bt_cb(skb)->sar = sar;
3551 __skb_queue_tail(SREJ_QUEUE(sk), skb);
8f17154f
GP
3552 return 0;
3553 }
3554
4ec10d97
GP
3555 if (rx_control & L2CAP_CTRL_FINAL) {
3556 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3557 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3558 else {
f6e6b168
GP
3559 if (!skb_queue_empty(TX_QUEUE(sk)))
3560 sk->sk_send_head = TX_QUEUE(sk)->next;
4ec10d97
GP
3561 pi->next_tx_seq = pi->expected_ack_seq;
3562 l2cap_ertm_send(sk);
3563 }
3564 }
3565
8f17154f
GP
3566 pi->buffer_seq = (pi->buffer_seq + 1) % 64;
3567
3568 err = l2cap_sar_reassembly_sdu(sk, skb, rx_control);
3569 if (err < 0)
3570 return err;
3571
c1b4f43b
GP
3572 __mod_ack_timer();
3573
803020c6
GP
3574 pi->num_acked = (pi->num_acked + 1) % num_to_ack;
3575 if (pi->num_acked == num_to_ack - 1)
9e917af1
GP
3576 l2cap_send_ack(pi);
3577
8f17154f 3578 return 0;
1c2acffb
GP
3579}
3580
e072745f 3581static inline void l2cap_data_channel_rrframe(struct sock *sk, u16 rx_control)
1c2acffb
GP
3582{
3583 struct l2cap_pinfo *pi = l2cap_pi(sk);
6e3a5981
GP
3584
3585 pi->expected_ack_seq = __get_reqseq(rx_control);
3586 l2cap_drop_acked_frames(sk);
1c2acffb 3587
e072745f 3588 if (rx_control & L2CAP_CTRL_POLL) {
05fbd89d
GP
3589 if (pi->conn_state & L2CAP_CONN_SREJ_SENT) {
3590 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3591 (pi->unacked_frames > 0))
3592 __mod_retrans_timer();
3593
3594 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3595 l2cap_send_srejtail(sk);
3596 } else {
3597 l2cap_send_i_or_rr_or_rnr(sk);
3598 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3599 }
1d8f5d16 3600
e072745f
GP
3601 } else if (rx_control & L2CAP_CTRL_FINAL) {
3602 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
4ec10d97 3603
e072745f
GP
3604 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3605 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3606 else {
f6e6b168
GP
3607 if (!skb_queue_empty(TX_QUEUE(sk)))
3608 sk->sk_send_head = TX_QUEUE(sk)->next;
e072745f
GP
3609 pi->next_tx_seq = pi->expected_ack_seq;
3610 l2cap_ertm_send(sk);
3611 }
2246b2f1 3612
e072745f 3613 } else {
e072745f
GP
3614 if ((pi->conn_state & L2CAP_CONN_REMOTE_BUSY) &&
3615 (pi->unacked_frames > 0))
3616 __mod_retrans_timer();
1c2acffb 3617
2246b2f1 3618 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
e072745f
GP
3619 if (pi->conn_state & L2CAP_CONN_SREJ_SENT)
3620 l2cap_send_ack(pi);
3621 else
3622 l2cap_ertm_send(sk);
3623 }
3624}
2246b2f1 3625
e072745f
GP
3626static inline void l2cap_data_channel_rejframe(struct sock *sk, u16 rx_control)
3627{
3628 struct l2cap_pinfo *pi = l2cap_pi(sk);
3629 u8 tx_seq = __get_reqseq(rx_control);
30afb5b2 3630
e072745f
GP
3631 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
3632
8abb52ee 3633 pi->expected_ack_seq = tx_seq;
e072745f
GP
3634 l2cap_drop_acked_frames(sk);
3635
3636 if (rx_control & L2CAP_CTRL_FINAL) {
3637 if (pi->conn_state & L2CAP_CONN_REJ_ACT)
3638 pi->conn_state &= ~L2CAP_CONN_REJ_ACT;
3639 else {
f6e6b168
GP
3640 if (!skb_queue_empty(TX_QUEUE(sk)))
3641 sk->sk_send_head = TX_QUEUE(sk)->next;
4ec10d97
GP
3642 pi->next_tx_seq = pi->expected_ack_seq;
3643 l2cap_ertm_send(sk);
4ec10d97 3644 }
e072745f 3645 } else {
f6e6b168
GP
3646 if (!skb_queue_empty(TX_QUEUE(sk)))
3647 sk->sk_send_head = TX_QUEUE(sk)->next;
e072745f
GP
3648 pi->next_tx_seq = pi->expected_ack_seq;
3649 l2cap_ertm_send(sk);
30afb5b2 3650
e072745f
GP
3651 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3652 pi->srej_save_reqseq = tx_seq;
3653 pi->conn_state |= L2CAP_CONN_REJ_ACT;
3654 }
3655 }
3656}
3657static inline void l2cap_data_channel_srejframe(struct sock *sk, u16 rx_control)
3658{
3659 struct l2cap_pinfo *pi = l2cap_pi(sk);
3660 u8 tx_seq = __get_reqseq(rx_control);
30afb5b2 3661
e072745f 3662 pi->conn_state &= ~L2CAP_CONN_REMOTE_BUSY;
2246b2f1 3663
e072745f
GP
3664 if (rx_control & L2CAP_CTRL_POLL) {
3665 pi->expected_ack_seq = tx_seq;
3666 l2cap_drop_acked_frames(sk);
3667 l2cap_retransmit_frame(sk, tx_seq);
3668 l2cap_ertm_send(sk);
3669 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3670 pi->srej_save_reqseq = tx_seq;
3671 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
ef54fd93 3672 }
e072745f
GP
3673 } else if (rx_control & L2CAP_CTRL_FINAL) {
3674 if ((pi->conn_state & L2CAP_CONN_SREJ_ACT) &&
3675 pi->srej_save_reqseq == tx_seq)
3676 pi->conn_state &= ~L2CAP_CONN_SREJ_ACT;
3677 else
ef54fd93 3678 l2cap_retransmit_frame(sk, tx_seq);
e072745f
GP
3679 } else {
3680 l2cap_retransmit_frame(sk, tx_seq);
3681 if (pi->conn_state & L2CAP_CONN_WAIT_F) {
3682 pi->srej_save_reqseq = tx_seq;
3683 pi->conn_state |= L2CAP_CONN_SREJ_ACT;
ef54fd93 3684 }
e072745f
GP
3685 }
3686}
3687
3688static inline void l2cap_data_channel_rnrframe(struct sock *sk, u16 rx_control)
3689{
3690 struct l2cap_pinfo *pi = l2cap_pi(sk);
3691 u8 tx_seq = __get_reqseq(rx_control);
3692
3693 pi->conn_state |= L2CAP_CONN_REMOTE_BUSY;
3694 pi->expected_ack_seq = tx_seq;
3695 l2cap_drop_acked_frames(sk);
3696
99b0d4b7
GP
3697 if (!(pi->conn_state & L2CAP_CONN_SREJ_SENT)) {
3698 del_timer(&pi->retrans_timer);
3699 if (rx_control & L2CAP_CTRL_POLL) {
3700 u16 control = L2CAP_CTRL_FINAL;
3701 l2cap_send_rr_or_rnr(pi, control);
3702 }
3703 return;
e072745f 3704 }
99b0d4b7
GP
3705
3706 if (rx_control & L2CAP_CTRL_POLL)
3707 l2cap_send_srejtail(sk);
3708 else
3709 l2cap_send_sframe(pi, L2CAP_SUPER_RCV_READY);
e072745f
GP
3710}
3711
3712static inline int l2cap_data_channel_sframe(struct sock *sk, u16 rx_control, struct sk_buff *skb)
3713{
3714 BT_DBG("sk %p rx_control 0x%4.4x len %d", sk, rx_control, skb->len);
3715
3716 if (L2CAP_CTRL_FINAL & rx_control) {
3717 del_timer(&l2cap_pi(sk)->monitor_timer);
3718 if (l2cap_pi(sk)->unacked_frames > 0)
3719 __mod_retrans_timer();
3720 l2cap_pi(sk)->conn_state &= ~L2CAP_CONN_WAIT_F;
3721 }
3722
3723 switch (rx_control & L2CAP_CTRL_SUPERVISE) {
3724 case L2CAP_SUPER_RCV_READY:
3725 l2cap_data_channel_rrframe(sk, rx_control);
8f17154f
GP
3726 break;
3727
e072745f
GP
3728 case L2CAP_SUPER_REJECT:
3729 l2cap_data_channel_rejframe(sk, rx_control);
3730 break;
2246b2f1 3731
e072745f
GP
3732 case L2CAP_SUPER_SELECT_REJECT:
3733 l2cap_data_channel_srejframe(sk, rx_control);
3734 break;
3735
3736 case L2CAP_SUPER_RCV_NOT_READY:
3737 l2cap_data_channel_rnrframe(sk, rx_control);
1c2acffb
GP
3738 break;
3739 }
3740
faaebd19 3741 kfree_skb(skb);
1c2acffb
GP
3742 return 0;
3743}
3744
1da177e4
LT
3745static inline int l2cap_data_channel(struct l2cap_conn *conn, u16 cid, struct sk_buff *skb)
3746{
3747 struct sock *sk;
6840ed07 3748 struct l2cap_pinfo *pi;
c74e560c 3749 u16 control, len;
6840ed07 3750 u8 tx_seq;
1da177e4
LT
3751
3752 sk = l2cap_get_chan_by_scid(&conn->chan_list, cid);
3753 if (!sk) {
3754 BT_DBG("unknown cid 0x%4.4x", cid);
3755 goto drop;
3756 }
3757
6840ed07
GP
3758 pi = l2cap_pi(sk);
3759
1da177e4
LT
3760 BT_DBG("sk %p, len %d", sk, skb->len);
3761
3762 if (sk->sk_state != BT_CONNECTED)
3763 goto drop;
3764
6840ed07 3765 switch (pi->mode) {
1c2acffb
GP
3766 case L2CAP_MODE_BASIC:
3767 /* If socket recv buffers overflows we drop data here
3768 * which is *bad* because L2CAP has to be reliable.
3769 * But we don't have any other choice. L2CAP doesn't
3770 * provide flow control mechanism. */
1da177e4 3771
6840ed07 3772 if (pi->imtu < skb->len)
1c2acffb 3773 goto drop;
1da177e4 3774
1c2acffb
GP
3775 if (!sock_queue_rcv_skb(sk, skb))
3776 goto done;
3777 break;
3778
3779 case L2CAP_MODE_ERTM:
3780 control = get_unaligned_le16(skb->data);
3781 skb_pull(skb, 2);
c74e560c 3782 len = skb->len;
1c2acffb 3783
c74e560c
GP
3784 if (__is_sar_start(control))
3785 len -= 2;
3786
fcc203c3
GP
3787 if (pi->fcs == L2CAP_FCS_CRC16)
3788 len -= 2;
3789
30afb5b2
GP
3790 /*
3791 * We can just drop the corrupted I-frame here.
3792 * Receiver will miss it and start proper recovery
3793 * procedures and ask retransmission.
3794 */
1c762159 3795 if (len > pi->mps)
1c2acffb
GP
3796 goto drop;
3797
fcc203c3
GP
3798 if (l2cap_check_fcs(pi, skb))
3799 goto drop;
3800
277ffbe3
GP
3801 if (__is_iframe(control)) {
3802 if (len < 4)
3803 goto drop;
3804
fcafde2e 3805 l2cap_data_channel_iframe(sk, control, skb);
277ffbe3
GP
3806 } else {
3807 if (len != 0)
3808 goto drop;
3809
fcafde2e 3810 l2cap_data_channel_sframe(sk, control, skb);
277ffbe3 3811 }
1c2acffb 3812
fcafde2e 3813 goto done;
1c2acffb 3814
6840ed07
GP
3815 case L2CAP_MODE_STREAMING:
3816 control = get_unaligned_le16(skb->data);
3817 skb_pull(skb, 2);
3818 len = skb->len;
3819
3820 if (__is_sar_start(control))
3821 len -= 2;
3822
fcc203c3
GP
3823 if (pi->fcs == L2CAP_FCS_CRC16)
3824 len -= 2;
3825
1c762159 3826 if (len > pi->mps || len < 4 || __is_sframe(control))
6840ed07
GP
3827 goto drop;
3828
fcc203c3
GP
3829 if (l2cap_check_fcs(pi, skb))
3830 goto drop;
3831
6840ed07
GP
3832 tx_seq = __get_txseq(control);
3833
3834 if (pi->expected_tx_seq == tx_seq)
3835 pi->expected_tx_seq = (pi->expected_tx_seq + 1) % 64;
3836 else
7dffe421 3837 pi->expected_tx_seq = (tx_seq + 1) % 64;
6840ed07 3838
fcafde2e 3839 l2cap_sar_reassembly_sdu(sk, skb, control);
6840ed07
GP
3840
3841 goto done;
3842
1c2acffb 3843 default:
e8235c6b 3844 BT_DBG("sk %p: bad mode 0x%2.2x", sk, pi->mode);
1c2acffb
GP
3845 break;
3846 }
1da177e4
LT
3847
3848drop:
3849 kfree_skb(skb);
3850
3851done:
0139418c
MH
3852 if (sk)
3853 bh_unlock_sock(sk);
3854
1da177e4
LT
3855 return 0;
3856}
3857
8e036fc3 3858static inline int l2cap_conless_channel(struct l2cap_conn *conn, __le16 psm, struct sk_buff *skb)
1da177e4
LT
3859{
3860 struct sock *sk;
3861
3862 sk = l2cap_get_sock_by_psm(0, psm, conn->src);
3863 if (!sk)
3864 goto drop;
3865
3866 BT_DBG("sk %p, len %d", sk, skb->len);
3867
3868 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_CONNECTED)
3869 goto drop;
3870
3871 if (l2cap_pi(sk)->imtu < skb->len)
3872 goto drop;
3873
3874 if (!sock_queue_rcv_skb(sk, skb))
3875 goto done;
3876
3877drop:
3878 kfree_skb(skb);
3879
3880done:
af05b30b
GP
3881 if (sk)
3882 bh_unlock_sock(sk);
1da177e4
LT
3883 return 0;
3884}
3885
3886static void l2cap_recv_frame(struct l2cap_conn *conn, struct sk_buff *skb)
3887{
3888 struct l2cap_hdr *lh = (void *) skb->data;
8e036fc3
AV
3889 u16 cid, len;
3890 __le16 psm;
1da177e4
LT
3891
3892 skb_pull(skb, L2CAP_HDR_SIZE);
3893 cid = __le16_to_cpu(lh->cid);
3894 len = __le16_to_cpu(lh->len);
3895
1c2acffb
GP
3896 if (len != skb->len) {
3897 kfree_skb(skb);
3898 return;
3899 }
3900
1da177e4
LT
3901 BT_DBG("len %d, cid 0x%4.4x", len, cid);
3902
3903 switch (cid) {
8db4dc46 3904 case L2CAP_CID_SIGNALING:
1da177e4
LT
3905 l2cap_sig_channel(conn, skb);
3906 break;
3907
8db4dc46 3908 case L2CAP_CID_CONN_LESS:
1b7bf4ed 3909 psm = get_unaligned_le16(skb->data);
1da177e4
LT
3910 skb_pull(skb, 2);
3911 l2cap_conless_channel(conn, psm, skb);
3912 break;
3913
3914 default:
3915 l2cap_data_channel(conn, cid, skb);
3916 break;
3917 }
3918}
3919
3920/* ---- L2CAP interface with lower layer (HCI) ---- */
3921
3922static int l2cap_connect_ind(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3923{
3924 int exact = 0, lm1 = 0, lm2 = 0;
3925 register struct sock *sk;
3926 struct hlist_node *node;
3927
3928 if (type != ACL_LINK)
3929 return 0;
3930
3931 BT_DBG("hdev %s, bdaddr %s", hdev->name, batostr(bdaddr));
3932
3933 /* Find listening sockets and check their link_mode */
3934 read_lock(&l2cap_sk_list.lock);
3935 sk_for_each(sk, node, &l2cap_sk_list.head) {
3936 if (sk->sk_state != BT_LISTEN)
3937 continue;
3938
3939 if (!bacmp(&bt_sk(sk)->src, &hdev->bdaddr)) {
2af6b9d5
MH
3940 lm1 |= HCI_LM_ACCEPT;
3941 if (l2cap_pi(sk)->role_switch)
3942 lm1 |= HCI_LM_MASTER;
1da177e4 3943 exact++;
2af6b9d5
MH
3944 } else if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY)) {
3945 lm2 |= HCI_LM_ACCEPT;
3946 if (l2cap_pi(sk)->role_switch)
3947 lm2 |= HCI_LM_MASTER;
3948 }
1da177e4
LT
3949 }
3950 read_unlock(&l2cap_sk_list.lock);
3951
3952 return exact ? lm1 : lm2;
3953}
3954
3955static int l2cap_connect_cfm(struct hci_conn *hcon, u8 status)
3956{
0139418c
MH
3957 struct l2cap_conn *conn;
3958
1da177e4
LT
3959 BT_DBG("hcon %p bdaddr %s status %d", hcon, batostr(&hcon->dst), status);
3960
3961 if (hcon->type != ACL_LINK)
3962 return 0;
3963
3964 if (!status) {
1da177e4
LT
3965 conn = l2cap_conn_add(hcon, status);
3966 if (conn)
3967 l2cap_conn_ready(conn);
0139418c 3968 } else
1da177e4
LT
3969 l2cap_conn_del(hcon, bt_err(status));
3970
3971 return 0;
3972}
3973
2950f21a
MH
3974static int l2cap_disconn_ind(struct hci_conn *hcon)
3975{
3976 struct l2cap_conn *conn = hcon->l2cap_data;
3977
3978 BT_DBG("hcon %p", hcon);
3979
3980 if (hcon->type != ACL_LINK || !conn)
3981 return 0x13;
3982
3983 return conn->disc_reason;
3984}
3985
3986static int l2cap_disconn_cfm(struct hci_conn *hcon, u8 reason)
1da177e4
LT
3987{
3988 BT_DBG("hcon %p reason %d", hcon, reason);
3989
3990 if (hcon->type != ACL_LINK)
3991 return 0;
3992
3993 l2cap_conn_del(hcon, bt_err(reason));
0139418c 3994
1da177e4
LT
3995 return 0;
3996}
3997
f62e4323
MH
3998static inline void l2cap_check_encryption(struct sock *sk, u8 encrypt)
3999{
255c7601
MH
4000 if (sk->sk_type != SOCK_SEQPACKET)
4001 return;
4002
f62e4323
MH
4003 if (encrypt == 0x00) {
4004 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM) {
4005 l2cap_sock_clear_timer(sk);
4006 l2cap_sock_set_timer(sk, HZ * 5);
4007 } else if (l2cap_pi(sk)->sec_level == BT_SECURITY_HIGH)
4008 __l2cap_sock_close(sk, ECONNREFUSED);
4009 } else {
4010 if (l2cap_pi(sk)->sec_level == BT_SECURITY_MEDIUM)
4011 l2cap_sock_clear_timer(sk);
4012 }
4013}
4014
8c1b2355 4015static int l2cap_security_cfm(struct hci_conn *hcon, u8 status, u8 encrypt)
1da177e4
LT
4016{
4017 struct l2cap_chan_list *l;
0139418c 4018 struct l2cap_conn *conn = hcon->l2cap_data;
1da177e4 4019 struct sock *sk;
1da177e4 4020
0139418c 4021 if (!conn)
1da177e4 4022 return 0;
0139418c 4023
1da177e4
LT
4024 l = &conn->chan_list;
4025
4026 BT_DBG("conn %p", conn);
4027
4028 read_lock(&l->lock);
4029
4030 for (sk = l->head; sk; sk = l2cap_pi(sk)->next_c) {
4031 bh_lock_sock(sk);
4032
6a8d3010
MH
4033 if (l2cap_pi(sk)->conf_state & L2CAP_CONF_CONNECT_PEND) {
4034 bh_unlock_sock(sk);
4035 continue;
4036 }
4037
f62e4323 4038 if (!status && (sk->sk_state == BT_CONNECTED ||
8c1b2355 4039 sk->sk_state == BT_CONFIG)) {
f62e4323 4040 l2cap_check_encryption(sk, encrypt);
9719f8af
MH
4041 bh_unlock_sock(sk);
4042 continue;
4043 }
4044
b1235d79
MH
4045 if (sk->sk_state == BT_CONNECT) {
4046 if (!status) {
4047 struct l2cap_conn_req req;
4048 req.scid = cpu_to_le16(l2cap_pi(sk)->scid);
4049 req.psm = l2cap_pi(sk)->psm;
1da177e4 4050
b1235d79 4051 l2cap_pi(sk)->ident = l2cap_get_ident(conn);
1da177e4 4052
b1235d79
MH
4053 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4054 L2CAP_CONN_REQ, sizeof(req), &req);
4055 } else {
4056 l2cap_sock_clear_timer(sk);
4057 l2cap_sock_set_timer(sk, HZ / 10);
4058 }
4059 } else if (sk->sk_state == BT_CONNECT2) {
4060 struct l2cap_conn_rsp rsp;
4061 __u16 result;
1da177e4 4062
b1235d79
MH
4063 if (!status) {
4064 sk->sk_state = BT_CONFIG;
4065 result = L2CAP_CR_SUCCESS;
4066 } else {
4067 sk->sk_state = BT_DISCONN;
4068 l2cap_sock_set_timer(sk, HZ / 10);
4069 result = L2CAP_CR_SEC_BLOCK;
4070 }
4071
4072 rsp.scid = cpu_to_le16(l2cap_pi(sk)->dcid);
4073 rsp.dcid = cpu_to_le16(l2cap_pi(sk)->scid);
4074 rsp.result = cpu_to_le16(result);
e7c29cb1 4075 rsp.status = cpu_to_le16(L2CAP_CS_NO_INFO);
b1235d79
MH
4076 l2cap_send_cmd(conn, l2cap_pi(sk)->ident,
4077 L2CAP_CONN_RSP, sizeof(rsp), &rsp);
4078 }
1da177e4
LT
4079
4080 bh_unlock_sock(sk);
4081 }
4082
4083 read_unlock(&l->lock);
b1235d79 4084
1da177e4
LT
4085 return 0;
4086}
4087
4088static int l2cap_recv_acldata(struct hci_conn *hcon, struct sk_buff *skb, u16 flags)
4089{
4090 struct l2cap_conn *conn = hcon->l2cap_data;
4091
4092 if (!conn && !(conn = l2cap_conn_add(hcon, 0)))
4093 goto drop;
4094
4095 BT_DBG("conn %p len %d flags 0x%x", conn, skb->len, flags);
4096
4097 if (flags & ACL_START) {
4098 struct l2cap_hdr *hdr;
4099 int len;
4100
4101 if (conn->rx_len) {
4102 BT_ERR("Unexpected start frame (len %d)", skb->len);
4103 kfree_skb(conn->rx_skb);
4104 conn->rx_skb = NULL;
4105 conn->rx_len = 0;
4106 l2cap_conn_unreliable(conn, ECOMM);
4107 }
4108
4109 if (skb->len < 2) {
4110 BT_ERR("Frame is too short (len %d)", skb->len);
4111 l2cap_conn_unreliable(conn, ECOMM);
4112 goto drop;
4113 }
4114
4115 hdr = (struct l2cap_hdr *) skb->data;
4116 len = __le16_to_cpu(hdr->len) + L2CAP_HDR_SIZE;
4117
4118 if (len == skb->len) {
4119 /* Complete frame received */
4120 l2cap_recv_frame(conn, skb);
4121 return 0;
4122 }
4123
4124 BT_DBG("Start: total len %d, frag len %d", len, skb->len);
4125
4126 if (skb->len > len) {
4127 BT_ERR("Frame is too long (len %d, expected len %d)",
4128 skb->len, len);
4129 l2cap_conn_unreliable(conn, ECOMM);
4130 goto drop;
4131 }
4132
4133 /* Allocate skb for the complete frame (with header) */
af05b30b
GP
4134 conn->rx_skb = bt_skb_alloc(len, GFP_ATOMIC);
4135 if (!conn->rx_skb)
1da177e4
LT
4136 goto drop;
4137
d626f62b 4138 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 4139 skb->len);
1da177e4
LT
4140 conn->rx_len = len - skb->len;
4141 } else {
4142 BT_DBG("Cont: frag len %d (expecting %d)", skb->len, conn->rx_len);
4143
4144 if (!conn->rx_len) {
4145 BT_ERR("Unexpected continuation frame (len %d)", skb->len);
4146 l2cap_conn_unreliable(conn, ECOMM);
4147 goto drop;
4148 }
4149
4150 if (skb->len > conn->rx_len) {
4151 BT_ERR("Fragment is too long (len %d, expected %d)",
4152 skb->len, conn->rx_len);
4153 kfree_skb(conn->rx_skb);
4154 conn->rx_skb = NULL;
4155 conn->rx_len = 0;
4156 l2cap_conn_unreliable(conn, ECOMM);
4157 goto drop;
4158 }
4159
d626f62b 4160 skb_copy_from_linear_data(skb, skb_put(conn->rx_skb, skb->len),
e1027a7c 4161 skb->len);
1da177e4
LT
4162 conn->rx_len -= skb->len;
4163
4164 if (!conn->rx_len) {
4165 /* Complete frame received */
4166 l2cap_recv_frame(conn, conn->rx_skb);
4167 conn->rx_skb = NULL;
4168 }
4169 }
4170
4171drop:
4172 kfree_skb(skb);
4173 return 0;
4174}
4175
aef7d97c 4176static int l2cap_debugfs_show(struct seq_file *f, void *p)
1da177e4
LT
4177{
4178 struct sock *sk;
4179 struct hlist_node *node;
1da177e4
LT
4180
4181 read_lock_bh(&l2cap_sk_list.lock);
4182
be9d1227
MH
4183 sk_for_each(sk, node, &l2cap_sk_list.head) {
4184 struct l2cap_pinfo *pi = l2cap_pi(sk);
101545f6 4185
aef7d97c
MH
4186 seq_printf(f, "%s %s %d %d 0x%4.4x 0x%4.4x %d %d %d\n",
4187 batostr(&bt_sk(sk)->src),
4188 batostr(&bt_sk(sk)->dst),
4189 sk->sk_state, __le16_to_cpu(pi->psm),
4190 pi->scid, pi->dcid,
4191 pi->imtu, pi->omtu, pi->sec_level);
be9d1227 4192 }
1da177e4 4193
1da177e4 4194 read_unlock_bh(&l2cap_sk_list.lock);
1da177e4 4195
aef7d97c 4196 return 0;
1da177e4
LT
4197}
4198
aef7d97c
MH
4199static int l2cap_debugfs_open(struct inode *inode, struct file *file)
4200{
4201 return single_open(file, l2cap_debugfs_show, inode->i_private);
4202}
4203
4204static const struct file_operations l2cap_debugfs_fops = {
4205 .open = l2cap_debugfs_open,
4206 .read = seq_read,
4207 .llseek = seq_lseek,
4208 .release = single_release,
4209};
4210
4211static struct dentry *l2cap_debugfs;
1da177e4 4212
90ddc4f0 4213static const struct proto_ops l2cap_sock_ops = {
1da177e4
LT
4214 .family = PF_BLUETOOTH,
4215 .owner = THIS_MODULE,
4216 .release = l2cap_sock_release,
4217 .bind = l2cap_sock_bind,
4218 .connect = l2cap_sock_connect,
4219 .listen = l2cap_sock_listen,
4220 .accept = l2cap_sock_accept,
4221 .getname = l2cap_sock_getname,
4222 .sendmsg = l2cap_sock_sendmsg,
f66dc81f 4223 .recvmsg = l2cap_sock_recvmsg,
1da177e4 4224 .poll = bt_sock_poll,
3241ad82 4225 .ioctl = bt_sock_ioctl,
1da177e4
LT
4226 .mmap = sock_no_mmap,
4227 .socketpair = sock_no_socketpair,
1da177e4
LT
4228 .shutdown = l2cap_sock_shutdown,
4229 .setsockopt = l2cap_sock_setsockopt,
4230 .getsockopt = l2cap_sock_getsockopt
4231};
4232
ec1b4cf7 4233static const struct net_proto_family l2cap_sock_family_ops = {
1da177e4
LT
4234 .family = PF_BLUETOOTH,
4235 .owner = THIS_MODULE,
4236 .create = l2cap_sock_create,
4237};
4238
4239static struct hci_proto l2cap_hci_proto = {
4240 .name = "L2CAP",
4241 .id = HCI_PROTO_L2CAP,
4242 .connect_ind = l2cap_connect_ind,
4243 .connect_cfm = l2cap_connect_cfm,
4244 .disconn_ind = l2cap_disconn_ind,
2950f21a 4245 .disconn_cfm = l2cap_disconn_cfm,
8c1b2355 4246 .security_cfm = l2cap_security_cfm,
1da177e4
LT
4247 .recv_acldata = l2cap_recv_acldata
4248};
4249
4250static int __init l2cap_init(void)
4251{
4252 int err;
be9d1227 4253
1da177e4
LT
4254 err = proto_register(&l2cap_proto, 0);
4255 if (err < 0)
4256 return err;
4257
4258 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
4259 if (err < 0) {
4260 BT_ERR("L2CAP socket registration failed");
4261 goto error;
4262 }
4263
4264 err = hci_register_proto(&l2cap_hci_proto);
4265 if (err < 0) {
4266 BT_ERR("L2CAP protocol registration failed");
4267 bt_sock_unregister(BTPROTO_L2CAP);
4268 goto error;
4269 }
4270
aef7d97c
MH
4271 if (bt_debugfs) {
4272 l2cap_debugfs = debugfs_create_file("l2cap", 0444,
4273 bt_debugfs, NULL, &l2cap_debugfs_fops);
4274 if (!l2cap_debugfs)
4275 BT_ERR("Failed to create L2CAP debug file");
4276 }
1da177e4
LT
4277
4278 BT_INFO("L2CAP ver %s", VERSION);
4279 BT_INFO("L2CAP socket layer initialized");
4280
4281 return 0;
4282
4283error:
4284 proto_unregister(&l2cap_proto);
4285 return err;
4286}
4287
4288static void __exit l2cap_exit(void)
4289{
aef7d97c 4290 debugfs_remove(l2cap_debugfs);
1da177e4
LT
4291
4292 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
4293 BT_ERR("L2CAP socket unregistration failed");
4294
4295 if (hci_unregister_proto(&l2cap_hci_proto) < 0)
4296 BT_ERR("L2CAP protocol unregistration failed");
4297
4298 proto_unregister(&l2cap_proto);
4299}
4300
4301void l2cap_load(void)
4302{
4303 /* Dummy function to trigger automatic L2CAP module loading by
4304 * other modules that use L2CAP sockets but don't use any other
4305 * symbols from it. */
4306 return;
4307}
4308EXPORT_SYMBOL(l2cap_load);
4309
4310module_init(l2cap_init);
4311module_exit(l2cap_exit);
4312
44dd46de
MH
4313module_param(enable_ertm, bool, 0644);
4314MODULE_PARM_DESC(enable_ertm, "Enable enhanced retransmission mode");
4315
5fbcd3d1
MH
4316module_param(max_transmit, uint, 0644);
4317MODULE_PARM_DESC(max_transmit, "Max transmit value (default = 3)");
4318
369ba302
GP
4319module_param(tx_window, uint, 0644);
4320MODULE_PARM_DESC(tx_window, "Transmission window size value (default = 63)");
4321
63fbd24e 4322MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
1da177e4
LT
4323MODULE_DESCRIPTION("Bluetooth L2CAP ver " VERSION);
4324MODULE_VERSION(VERSION);
4325MODULE_LICENSE("GPL");
4326MODULE_ALIAS("bt-proto-0");