GUI: Fix Tomato RAF theme for all builds. Compilation typo.
[tomato.git] / release / src-rt-6.x.4708 / linux / linux-2.6.36 / net / bluetooth / rfcomm / sock.c
blob194b3a04cfd38a3b4a13817d5aecace4f355ea49
1 /*
2 RFCOMM implementation for Linux Bluetooth stack (BlueZ).
3 Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>
4 Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License version 2 as
8 published by the Free Software Foundation;
10 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
11 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
12 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
13 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
14 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
15 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
20 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
21 SOFTWARE IS DISCLAIMED.
25 * RFCOMM sockets.
28 #include <linux/module.h>
30 #include <linux/types.h>
31 #include <linux/errno.h>
32 #include <linux/kernel.h>
33 #include <linux/sched.h>
34 #include <linux/slab.h>
35 #include <linux/poll.h>
36 #include <linux/fcntl.h>
37 #include <linux/init.h>
38 #include <linux/interrupt.h>
39 #include <linux/socket.h>
40 #include <linux/skbuff.h>
41 #include <linux/list.h>
42 #include <linux/device.h>
43 #include <linux/debugfs.h>
44 #include <linux/seq_file.h>
45 #include <net/sock.h>
47 #include <asm/system.h>
48 #include <asm/uaccess.h>
50 #include <net/bluetooth/bluetooth.h>
51 #include <net/bluetooth/hci_core.h>
52 #include <net/bluetooth/l2cap.h>
53 #include <net/bluetooth/rfcomm.h>
55 static const struct proto_ops rfcomm_sock_ops;
57 static struct bt_sock_list rfcomm_sk_list = {
58 .lock = __RW_LOCK_UNLOCKED(rfcomm_sk_list.lock)
61 static void rfcomm_sock_close(struct sock *sk);
62 static void rfcomm_sock_kill(struct sock *sk);
64 /* ---- DLC callbacks ----
66 * called under rfcomm_dlc_lock()
68 static void rfcomm_sk_data_ready(struct rfcomm_dlc *d, struct sk_buff *skb)
70 struct sock *sk = d->owner;
71 if (!sk)
72 return;
74 atomic_add(skb->len, &sk->sk_rmem_alloc);
75 skb_queue_tail(&sk->sk_receive_queue, skb);
76 sk->sk_data_ready(sk, skb->len);
78 if (atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf)
79 rfcomm_dlc_throttle(d);
82 static void rfcomm_sk_state_change(struct rfcomm_dlc *d, int err)
84 struct sock *sk = d->owner, *parent;
85 unsigned long flags;
87 if (!sk)
88 return;
90 BT_DBG("dlc %p state %ld err %d", d, d->state, err);
92 local_irq_save(flags);
93 bh_lock_sock(sk);
95 if (err)
96 sk->sk_err = err;
98 sk->sk_state = d->state;
100 parent = bt_sk(sk)->parent;
101 if (parent) {
102 if (d->state == BT_CLOSED) {
103 sock_set_flag(sk, SOCK_ZAPPED);
104 bt_accept_unlink(sk);
106 parent->sk_data_ready(parent, 0);
107 } else {
108 if (d->state == BT_CONNECTED)
109 rfcomm_session_getaddr(d->session, &bt_sk(sk)->src, NULL);
110 sk->sk_state_change(sk);
113 bh_unlock_sock(sk);
114 local_irq_restore(flags);
116 if (parent && sock_flag(sk, SOCK_ZAPPED)) {
117 /* We have to drop DLC lock here, otherwise
118 * rfcomm_sock_destruct() will dead lock. */
119 rfcomm_dlc_unlock(d);
120 rfcomm_sock_kill(sk);
121 rfcomm_dlc_lock(d);
125 /* ---- Socket functions ---- */
126 static struct sock *__rfcomm_get_sock_by_addr(u8 channel, bdaddr_t *src)
128 struct sock *sk = NULL;
129 struct hlist_node *node;
131 sk_for_each(sk, node, &rfcomm_sk_list.head) {
132 if (rfcomm_pi(sk)->channel == channel &&
133 !bacmp(&bt_sk(sk)->src, src))
134 break;
137 return node ? sk : NULL;
140 /* Find socket with channel and source bdaddr.
141 * Returns closest match.
143 static struct sock *__rfcomm_get_sock_by_channel(int state, u8 channel, bdaddr_t *src)
145 struct sock *sk = NULL, *sk1 = NULL;
146 struct hlist_node *node;
148 sk_for_each(sk, node, &rfcomm_sk_list.head) {
149 if (state && sk->sk_state != state)
150 continue;
152 if (rfcomm_pi(sk)->channel == channel) {
153 /* Exact match. */
154 if (!bacmp(&bt_sk(sk)->src, src))
155 break;
157 /* Closest match */
158 if (!bacmp(&bt_sk(sk)->src, BDADDR_ANY))
159 sk1 = sk;
162 return node ? sk : sk1;
165 /* Find socket with given address (channel, src).
166 * Returns locked socket */
167 static inline struct sock *rfcomm_get_sock_by_channel(int state, u8 channel, bdaddr_t *src)
169 struct sock *s;
170 read_lock(&rfcomm_sk_list.lock);
171 s = __rfcomm_get_sock_by_channel(state, channel, src);
172 if (s) bh_lock_sock(s);
173 read_unlock(&rfcomm_sk_list.lock);
174 return s;
177 static void rfcomm_sock_destruct(struct sock *sk)
179 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
181 BT_DBG("sk %p dlc %p", sk, d);
183 skb_queue_purge(&sk->sk_receive_queue);
184 skb_queue_purge(&sk->sk_write_queue);
186 rfcomm_dlc_lock(d);
187 rfcomm_pi(sk)->dlc = NULL;
189 /* Detach DLC if it's owned by this socket */
190 if (d->owner == sk)
191 d->owner = NULL;
192 rfcomm_dlc_unlock(d);
194 rfcomm_dlc_put(d);
197 static void rfcomm_sock_cleanup_listen(struct sock *parent)
199 struct sock *sk;
201 BT_DBG("parent %p", parent);
203 /* Close not yet accepted dlcs */
204 while ((sk = bt_accept_dequeue(parent, NULL))) {
205 rfcomm_sock_close(sk);
206 rfcomm_sock_kill(sk);
209 parent->sk_state = BT_CLOSED;
210 sock_set_flag(parent, SOCK_ZAPPED);
213 /* Kill socket (only if zapped and orphan)
214 * Must be called on unlocked socket.
216 static void rfcomm_sock_kill(struct sock *sk)
218 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
219 return;
221 BT_DBG("sk %p state %d refcnt %d", sk, sk->sk_state, atomic_read(&sk->sk_refcnt));
223 /* Kill poor orphan */
224 bt_sock_unlink(&rfcomm_sk_list, sk);
225 sock_set_flag(sk, SOCK_DEAD);
226 sock_put(sk);
229 static void __rfcomm_sock_close(struct sock *sk)
231 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
233 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
235 switch (sk->sk_state) {
236 case BT_LISTEN:
237 rfcomm_sock_cleanup_listen(sk);
238 break;
240 case BT_CONNECT:
241 case BT_CONNECT2:
242 case BT_CONFIG:
243 case BT_CONNECTED:
244 rfcomm_dlc_close(d, 0);
246 default:
247 sock_set_flag(sk, SOCK_ZAPPED);
248 break;
252 /* Close socket.
253 * Must be called on unlocked socket.
255 static void rfcomm_sock_close(struct sock *sk)
257 lock_sock(sk);
258 __rfcomm_sock_close(sk);
259 release_sock(sk);
262 static void rfcomm_sock_init(struct sock *sk, struct sock *parent)
264 struct rfcomm_pinfo *pi = rfcomm_pi(sk);
266 BT_DBG("sk %p", sk);
268 if (parent) {
269 sk->sk_type = parent->sk_type;
270 pi->dlc->defer_setup = bt_sk(parent)->defer_setup;
272 pi->sec_level = rfcomm_pi(parent)->sec_level;
273 pi->role_switch = rfcomm_pi(parent)->role_switch;
274 } else {
275 pi->dlc->defer_setup = 0;
277 pi->sec_level = BT_SECURITY_LOW;
278 pi->role_switch = 0;
281 pi->dlc->sec_level = pi->sec_level;
282 pi->dlc->role_switch = pi->role_switch;
285 static struct proto rfcomm_proto = {
286 .name = "RFCOMM",
287 .owner = THIS_MODULE,
288 .obj_size = sizeof(struct rfcomm_pinfo)
291 static struct sock *rfcomm_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
293 struct rfcomm_dlc *d;
294 struct sock *sk;
296 sk = sk_alloc(net, PF_BLUETOOTH, prio, &rfcomm_proto);
297 if (!sk)
298 return NULL;
300 sock_init_data(sock, sk);
301 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
303 d = rfcomm_dlc_alloc(prio);
304 if (!d) {
305 sk_free(sk);
306 return NULL;
309 d->data_ready = rfcomm_sk_data_ready;
310 d->state_change = rfcomm_sk_state_change;
312 rfcomm_pi(sk)->dlc = d;
313 d->owner = sk;
315 sk->sk_destruct = rfcomm_sock_destruct;
316 sk->sk_sndtimeo = RFCOMM_CONN_TIMEOUT;
318 sk->sk_sndbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
319 sk->sk_rcvbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
321 sock_reset_flag(sk, SOCK_ZAPPED);
323 sk->sk_protocol = proto;
324 sk->sk_state = BT_OPEN;
326 bt_sock_link(&rfcomm_sk_list, sk);
328 BT_DBG("sk %p", sk);
329 return sk;
332 static int rfcomm_sock_create(struct net *net, struct socket *sock,
333 int protocol, int kern)
335 struct sock *sk;
337 BT_DBG("sock %p", sock);
339 sock->state = SS_UNCONNECTED;
341 if (sock->type != SOCK_STREAM && sock->type != SOCK_RAW)
342 return -ESOCKTNOSUPPORT;
344 sock->ops = &rfcomm_sock_ops;
346 sk = rfcomm_sock_alloc(net, sock, protocol, GFP_ATOMIC);
347 if (!sk)
348 return -ENOMEM;
350 rfcomm_sock_init(sk, NULL);
351 return 0;
354 static int rfcomm_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
356 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
357 struct sock *sk = sock->sk;
358 int err = 0;
360 BT_DBG("sk %p %s", sk, batostr(&sa->rc_bdaddr));
362 if (!addr || addr->sa_family != AF_BLUETOOTH)
363 return -EINVAL;
365 lock_sock(sk);
367 if (sk->sk_state != BT_OPEN) {
368 err = -EBADFD;
369 goto done;
372 if (sk->sk_type != SOCK_STREAM) {
373 err = -EINVAL;
374 goto done;
377 write_lock_bh(&rfcomm_sk_list.lock);
379 if (sa->rc_channel && __rfcomm_get_sock_by_addr(sa->rc_channel, &sa->rc_bdaddr)) {
380 err = -EADDRINUSE;
381 } else {
382 /* Save source address */
383 bacpy(&bt_sk(sk)->src, &sa->rc_bdaddr);
384 rfcomm_pi(sk)->channel = sa->rc_channel;
385 sk->sk_state = BT_BOUND;
388 write_unlock_bh(&rfcomm_sk_list.lock);
390 done:
391 release_sock(sk);
392 return err;
395 static int rfcomm_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
397 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
398 struct sock *sk = sock->sk;
399 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
400 int err = 0;
402 BT_DBG("sk %p", sk);
404 if (alen < sizeof(struct sockaddr_rc) ||
405 addr->sa_family != AF_BLUETOOTH)
406 return -EINVAL;
408 lock_sock(sk);
410 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) {
411 err = -EBADFD;
412 goto done;
415 if (sk->sk_type != SOCK_STREAM) {
416 err = -EINVAL;
417 goto done;
420 sk->sk_state = BT_CONNECT;
421 bacpy(&bt_sk(sk)->dst, &sa->rc_bdaddr);
422 rfcomm_pi(sk)->channel = sa->rc_channel;
424 d->sec_level = rfcomm_pi(sk)->sec_level;
425 d->role_switch = rfcomm_pi(sk)->role_switch;
427 err = rfcomm_dlc_open(d, &bt_sk(sk)->src, &sa->rc_bdaddr, sa->rc_channel);
428 if (!err)
429 err = bt_sock_wait_state(sk, BT_CONNECTED,
430 sock_sndtimeo(sk, flags & O_NONBLOCK));
432 done:
433 release_sock(sk);
434 return err;
437 static int rfcomm_sock_listen(struct socket *sock, int backlog)
439 struct sock *sk = sock->sk;
440 int err = 0;
442 BT_DBG("sk %p backlog %d", sk, backlog);
444 lock_sock(sk);
446 if (sk->sk_state != BT_BOUND) {
447 err = -EBADFD;
448 goto done;
451 if (sk->sk_type != SOCK_STREAM) {
452 err = -EINVAL;
453 goto done;
456 if (!rfcomm_pi(sk)->channel) {
457 bdaddr_t *src = &bt_sk(sk)->src;
458 u8 channel;
460 err = -EINVAL;
462 write_lock_bh(&rfcomm_sk_list.lock);
464 for (channel = 1; channel < 31; channel++)
465 if (!__rfcomm_get_sock_by_addr(channel, src)) {
466 rfcomm_pi(sk)->channel = channel;
467 err = 0;
468 break;
471 write_unlock_bh(&rfcomm_sk_list.lock);
473 if (err < 0)
474 goto done;
477 sk->sk_max_ack_backlog = backlog;
478 sk->sk_ack_backlog = 0;
479 sk->sk_state = BT_LISTEN;
481 done:
482 release_sock(sk);
483 return err;
486 static int rfcomm_sock_accept(struct socket *sock, struct socket *newsock, int flags)
488 DECLARE_WAITQUEUE(wait, current);
489 struct sock *sk = sock->sk, *nsk;
490 long timeo;
491 int err = 0;
493 lock_sock(sk);
495 if (sk->sk_state != BT_LISTEN) {
496 err = -EBADFD;
497 goto done;
500 if (sk->sk_type != SOCK_STREAM) {
501 err = -EINVAL;
502 goto done;
505 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
507 BT_DBG("sk %p timeo %ld", sk, timeo);
509 /* Wait for an incoming connection. (wake-one). */
510 add_wait_queue_exclusive(sk_sleep(sk), &wait);
511 while (!(nsk = bt_accept_dequeue(sk, newsock))) {
512 set_current_state(TASK_INTERRUPTIBLE);
513 if (!timeo) {
514 err = -EAGAIN;
515 break;
518 release_sock(sk);
519 timeo = schedule_timeout(timeo);
520 lock_sock(sk);
522 if (sk->sk_state != BT_LISTEN) {
523 err = -EBADFD;
524 break;
527 if (signal_pending(current)) {
528 err = sock_intr_errno(timeo);
529 break;
532 set_current_state(TASK_RUNNING);
533 remove_wait_queue(sk_sleep(sk), &wait);
535 if (err)
536 goto done;
538 newsock->state = SS_CONNECTED;
540 BT_DBG("new socket %p", nsk);
542 done:
543 release_sock(sk);
544 return err;
547 static int rfcomm_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
549 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
550 struct sock *sk = sock->sk;
552 BT_DBG("sock %p, sk %p", sock, sk);
554 sa->rc_family = AF_BLUETOOTH;
555 sa->rc_channel = rfcomm_pi(sk)->channel;
556 if (peer)
557 bacpy(&sa->rc_bdaddr, &bt_sk(sk)->dst);
558 else
559 bacpy(&sa->rc_bdaddr, &bt_sk(sk)->src);
561 *len = sizeof(struct sockaddr_rc);
562 return 0;
565 static int rfcomm_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
566 struct msghdr *msg, size_t len)
568 struct sock *sk = sock->sk;
569 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
570 struct sk_buff *skb;
571 int sent = 0;
573 if (test_bit(RFCOMM_DEFER_SETUP, &d->flags))
574 return -ENOTCONN;
576 if (msg->msg_flags & MSG_OOB)
577 return -EOPNOTSUPP;
579 if (sk->sk_shutdown & SEND_SHUTDOWN)
580 return -EPIPE;
582 BT_DBG("sock %p, sk %p", sock, sk);
584 lock_sock(sk);
586 while (len) {
587 size_t size = min_t(size_t, len, d->mtu);
588 int err;
590 skb = sock_alloc_send_skb(sk, size + RFCOMM_SKB_RESERVE,
591 msg->msg_flags & MSG_DONTWAIT, &err);
592 if (!skb) {
593 if (sent == 0)
594 sent = err;
595 break;
597 skb_reserve(skb, RFCOMM_SKB_HEAD_RESERVE);
599 err = memcpy_fromiovec(skb_put(skb, size), msg->msg_iov, size);
600 if (err) {
601 kfree_skb(skb);
602 if (sent == 0)
603 sent = err;
604 break;
607 err = rfcomm_dlc_send(d, skb);
608 if (err < 0) {
609 kfree_skb(skb);
610 if (sent == 0)
611 sent = err;
612 break;
615 sent += size;
616 len -= size;
619 release_sock(sk);
621 return sent;
624 static long rfcomm_sock_data_wait(struct sock *sk, long timeo)
626 DECLARE_WAITQUEUE(wait, current);
628 add_wait_queue(sk_sleep(sk), &wait);
629 for (;;) {
630 set_current_state(TASK_INTERRUPTIBLE);
632 if (!skb_queue_empty(&sk->sk_receive_queue) ||
633 sk->sk_err ||
634 (sk->sk_shutdown & RCV_SHUTDOWN) ||
635 signal_pending(current) ||
636 !timeo)
637 break;
639 set_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
640 release_sock(sk);
641 timeo = schedule_timeout(timeo);
642 lock_sock(sk);
643 clear_bit(SOCK_ASYNC_WAITDATA, &sk->sk_socket->flags);
646 __set_current_state(TASK_RUNNING);
647 remove_wait_queue(sk_sleep(sk), &wait);
648 return timeo;
651 static int rfcomm_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
652 struct msghdr *msg, size_t size, int flags)
654 struct sock *sk = sock->sk;
655 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
656 int err = 0;
657 size_t target, copied = 0;
658 long timeo;
660 if (test_and_clear_bit(RFCOMM_DEFER_SETUP, &d->flags)) {
661 rfcomm_dlc_accept(d);
662 return 0;
665 if (flags & MSG_OOB)
666 return -EOPNOTSUPP;
668 msg->msg_namelen = 0;
670 BT_DBG("sk %p size %zu", sk, size);
672 lock_sock(sk);
674 target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
675 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
677 do {
678 struct sk_buff *skb;
679 int chunk;
681 skb = skb_dequeue(&sk->sk_receive_queue);
682 if (!skb) {
683 if (copied >= target)
684 break;
686 if ((err = sock_error(sk)) != 0)
687 break;
688 if (sk->sk_shutdown & RCV_SHUTDOWN)
689 break;
691 err = -EAGAIN;
692 if (!timeo)
693 break;
695 timeo = rfcomm_sock_data_wait(sk, timeo);
697 if (signal_pending(current)) {
698 err = sock_intr_errno(timeo);
699 goto out;
701 continue;
704 chunk = min_t(unsigned int, skb->len, size);
705 if (memcpy_toiovec(msg->msg_iov, skb->data, chunk)) {
706 skb_queue_head(&sk->sk_receive_queue, skb);
707 if (!copied)
708 copied = -EFAULT;
709 break;
711 copied += chunk;
712 size -= chunk;
714 sock_recv_ts_and_drops(msg, sk, skb);
716 if (!(flags & MSG_PEEK)) {
717 atomic_sub(chunk, &sk->sk_rmem_alloc);
719 skb_pull(skb, chunk);
720 if (skb->len) {
721 skb_queue_head(&sk->sk_receive_queue, skb);
722 break;
724 kfree_skb(skb);
726 } else {
727 /* put message back and return */
728 skb_queue_head(&sk->sk_receive_queue, skb);
729 break;
731 } while (size);
733 out:
734 if (atomic_read(&sk->sk_rmem_alloc) <= (sk->sk_rcvbuf >> 2))
735 rfcomm_dlc_unthrottle(rfcomm_pi(sk)->dlc);
737 release_sock(sk);
738 return copied ? : err;
741 static int rfcomm_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
743 struct sock *sk = sock->sk;
744 int err = 0;
745 u32 opt;
747 BT_DBG("sk %p", sk);
749 lock_sock(sk);
751 switch (optname) {
752 case RFCOMM_LM:
753 if (get_user(opt, (u32 __user *) optval)) {
754 err = -EFAULT;
755 break;
758 if (opt & RFCOMM_LM_AUTH)
759 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW;
760 if (opt & RFCOMM_LM_ENCRYPT)
761 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
762 if (opt & RFCOMM_LM_SECURE)
763 rfcomm_pi(sk)->sec_level = BT_SECURITY_HIGH;
765 rfcomm_pi(sk)->role_switch = (opt & RFCOMM_LM_MASTER);
766 break;
768 default:
769 err = -ENOPROTOOPT;
770 break;
773 release_sock(sk);
774 return err;
777 static int rfcomm_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
779 struct sock *sk = sock->sk;
780 struct bt_security sec;
781 int len, err = 0;
782 u32 opt;
784 BT_DBG("sk %p", sk);
786 if (level == SOL_RFCOMM)
787 return rfcomm_sock_setsockopt_old(sock, optname, optval, optlen);
789 if (level != SOL_BLUETOOTH)
790 return -ENOPROTOOPT;
792 lock_sock(sk);
794 switch (optname) {
795 case BT_SECURITY:
796 if (sk->sk_type != SOCK_STREAM) {
797 err = -EINVAL;
798 break;
801 sec.level = BT_SECURITY_LOW;
803 len = min_t(unsigned int, sizeof(sec), optlen);
804 if (copy_from_user((char *) &sec, optval, len)) {
805 err = -EFAULT;
806 break;
809 if (sec.level > BT_SECURITY_HIGH) {
810 err = -EINVAL;
811 break;
814 rfcomm_pi(sk)->sec_level = sec.level;
815 break;
817 case BT_DEFER_SETUP:
818 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
819 err = -EINVAL;
820 break;
823 if (get_user(opt, (u32 __user *) optval)) {
824 err = -EFAULT;
825 break;
828 bt_sk(sk)->defer_setup = opt;
829 break;
831 default:
832 err = -ENOPROTOOPT;
833 break;
836 release_sock(sk);
837 return err;
840 static int rfcomm_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
842 struct sock *sk = sock->sk;
843 struct sock *l2cap_sk;
844 struct rfcomm_conninfo cinfo;
845 int len, err = 0;
846 u32 opt;
848 BT_DBG("sk %p", sk);
850 if (get_user(len, optlen))
851 return -EFAULT;
853 lock_sock(sk);
855 switch (optname) {
856 case RFCOMM_LM:
857 switch (rfcomm_pi(sk)->sec_level) {
858 case BT_SECURITY_LOW:
859 opt = RFCOMM_LM_AUTH;
860 break;
861 case BT_SECURITY_MEDIUM:
862 opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT;
863 break;
864 case BT_SECURITY_HIGH:
865 opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT |
866 RFCOMM_LM_SECURE;
867 break;
868 default:
869 opt = 0;
870 break;
873 if (rfcomm_pi(sk)->role_switch)
874 opt |= RFCOMM_LM_MASTER;
876 if (put_user(opt, (u32 __user *) optval))
877 err = -EFAULT;
878 break;
880 case RFCOMM_CONNINFO:
881 if (sk->sk_state != BT_CONNECTED &&
882 !rfcomm_pi(sk)->dlc->defer_setup) {
883 err = -ENOTCONN;
884 break;
887 l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk;
889 cinfo.hci_handle = l2cap_pi(l2cap_sk)->conn->hcon->handle;
890 memcpy(cinfo.dev_class, l2cap_pi(l2cap_sk)->conn->hcon->dev_class, 3);
892 len = min_t(unsigned int, len, sizeof(cinfo));
893 if (copy_to_user(optval, (char *) &cinfo, len))
894 err = -EFAULT;
896 break;
898 default:
899 err = -ENOPROTOOPT;
900 break;
903 release_sock(sk);
904 return err;
907 static int rfcomm_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
909 struct sock *sk = sock->sk;
910 struct bt_security sec;
911 int len, err = 0;
913 BT_DBG("sk %p", sk);
915 if (level == SOL_RFCOMM)
916 return rfcomm_sock_getsockopt_old(sock, optname, optval, optlen);
918 if (level != SOL_BLUETOOTH)
919 return -ENOPROTOOPT;
921 if (get_user(len, optlen))
922 return -EFAULT;
924 lock_sock(sk);
926 switch (optname) {
927 case BT_SECURITY:
928 if (sk->sk_type != SOCK_STREAM) {
929 err = -EINVAL;
930 break;
933 sec.level = rfcomm_pi(sk)->sec_level;
935 len = min_t(unsigned int, len, sizeof(sec));
936 if (copy_to_user(optval, (char *) &sec, len))
937 err = -EFAULT;
939 break;
941 case BT_DEFER_SETUP:
942 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
943 err = -EINVAL;
944 break;
947 if (put_user(bt_sk(sk)->defer_setup, (u32 __user *) optval))
948 err = -EFAULT;
950 break;
952 default:
953 err = -ENOPROTOOPT;
954 break;
957 release_sock(sk);
958 return err;
961 static int rfcomm_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
963 struct sock *sk __maybe_unused = sock->sk;
964 int err;
966 BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
968 err = bt_sock_ioctl(sock, cmd, arg);
970 if (err == -ENOIOCTLCMD) {
971 #ifdef CONFIG_BT_RFCOMM_TTY
972 lock_sock(sk);
973 err = rfcomm_dev_ioctl(sk, cmd, (void __user *) arg);
974 release_sock(sk);
975 #else
976 err = -EOPNOTSUPP;
977 #endif
980 return err;
983 static int rfcomm_sock_shutdown(struct socket *sock, int how)
985 struct sock *sk = sock->sk;
986 int err = 0;
988 BT_DBG("sock %p, sk %p", sock, sk);
990 if (!sk) return 0;
992 lock_sock(sk);
993 if (!sk->sk_shutdown) {
994 sk->sk_shutdown = SHUTDOWN_MASK;
995 __rfcomm_sock_close(sk);
997 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
998 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
1000 release_sock(sk);
1001 return err;
1004 static int rfcomm_sock_release(struct socket *sock)
1006 struct sock *sk = sock->sk;
1007 int err;
1009 BT_DBG("sock %p, sk %p", sock, sk);
1011 if (!sk)
1012 return 0;
1014 err = rfcomm_sock_shutdown(sock, 2);
1016 sock_orphan(sk);
1017 rfcomm_sock_kill(sk);
1018 return err;
1021 /* ---- RFCOMM core layer callbacks ----
1023 * called under rfcomm_lock()
1025 int rfcomm_connect_ind(struct rfcomm_session *s, u8 channel, struct rfcomm_dlc **d)
1027 struct sock *sk, *parent;
1028 bdaddr_t src, dst;
1029 int result = 0;
1031 BT_DBG("session %p channel %d", s, channel);
1033 rfcomm_session_getaddr(s, &src, &dst);
1035 /* Check if we have socket listening on channel */
1036 parent = rfcomm_get_sock_by_channel(BT_LISTEN, channel, &src);
1037 if (!parent)
1038 return 0;
1040 /* Check for backlog size */
1041 if (sk_acceptq_is_full(parent)) {
1042 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1043 goto done;
1046 sk = rfcomm_sock_alloc(sock_net(parent), NULL, BTPROTO_RFCOMM, GFP_ATOMIC);
1047 if (!sk)
1048 goto done;
1050 rfcomm_sock_init(sk, parent);
1051 bacpy(&bt_sk(sk)->src, &src);
1052 bacpy(&bt_sk(sk)->dst, &dst);
1053 rfcomm_pi(sk)->channel = channel;
1055 sk->sk_state = BT_CONFIG;
1056 bt_accept_enqueue(parent, sk);
1058 /* Accept connection and return socket DLC */
1059 *d = rfcomm_pi(sk)->dlc;
1060 result = 1;
1062 done:
1063 bh_unlock_sock(parent);
1065 if (bt_sk(parent)->defer_setup)
1066 parent->sk_state_change(parent);
1068 return result;
1071 static int rfcomm_sock_debugfs_show(struct seq_file *f, void *p)
1073 struct sock *sk;
1074 struct hlist_node *node;
1076 read_lock_bh(&rfcomm_sk_list.lock);
1078 sk_for_each(sk, node, &rfcomm_sk_list.head) {
1079 seq_printf(f, "%s %s %d %d\n",
1080 batostr(&bt_sk(sk)->src),
1081 batostr(&bt_sk(sk)->dst),
1082 sk->sk_state, rfcomm_pi(sk)->channel);
1085 read_unlock_bh(&rfcomm_sk_list.lock);
1087 return 0;
1090 static int rfcomm_sock_debugfs_open(struct inode *inode, struct file *file)
1092 return single_open(file, rfcomm_sock_debugfs_show, inode->i_private);
1095 static const struct file_operations rfcomm_sock_debugfs_fops = {
1096 .open = rfcomm_sock_debugfs_open,
1097 .read = seq_read,
1098 .llseek = seq_lseek,
1099 .release = single_release,
1102 static struct dentry *rfcomm_sock_debugfs;
1104 static const struct proto_ops rfcomm_sock_ops = {
1105 .family = PF_BLUETOOTH,
1106 .owner = THIS_MODULE,
1107 .release = rfcomm_sock_release,
1108 .bind = rfcomm_sock_bind,
1109 .connect = rfcomm_sock_connect,
1110 .listen = rfcomm_sock_listen,
1111 .accept = rfcomm_sock_accept,
1112 .getname = rfcomm_sock_getname,
1113 .sendmsg = rfcomm_sock_sendmsg,
1114 .recvmsg = rfcomm_sock_recvmsg,
1115 .shutdown = rfcomm_sock_shutdown,
1116 .setsockopt = rfcomm_sock_setsockopt,
1117 .getsockopt = rfcomm_sock_getsockopt,
1118 .ioctl = rfcomm_sock_ioctl,
1119 .poll = bt_sock_poll,
1120 .socketpair = sock_no_socketpair,
1121 .mmap = sock_no_mmap
1124 static const struct net_proto_family rfcomm_sock_family_ops = {
1125 .family = PF_BLUETOOTH,
1126 .owner = THIS_MODULE,
1127 .create = rfcomm_sock_create
1130 int __init rfcomm_init_sockets(void)
1132 int err;
1134 err = proto_register(&rfcomm_proto, 0);
1135 if (err < 0)
1136 return err;
1138 err = bt_sock_register(BTPROTO_RFCOMM, &rfcomm_sock_family_ops);
1139 if (err < 0)
1140 goto error;
1142 if (bt_debugfs) {
1143 rfcomm_sock_debugfs = debugfs_create_file("rfcomm", 0444,
1144 bt_debugfs, NULL, &rfcomm_sock_debugfs_fops);
1145 if (!rfcomm_sock_debugfs)
1146 BT_ERR("Failed to create RFCOMM debug file");
1149 BT_INFO("RFCOMM socket layer initialized");
1151 return 0;
1153 error:
1154 BT_ERR("RFCOMM socket layer registration failed");
1155 proto_unregister(&rfcomm_proto);
1156 return err;
1159 void __exit rfcomm_cleanup_sockets(void)
1161 debugfs_remove(rfcomm_sock_debugfs);
1163 if (bt_sock_unregister(BTPROTO_RFCOMM) < 0)
1164 BT_ERR("RFCOMM socket layer unregistration failed");
1166 proto_unregister(&rfcomm_proto);