blob: aa1a814ceddca77f790f0c570e9c89ef08ebe186 [file] [log] [blame]
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 RFCOMM implementation for Linux Bluetooth stack (BlueZ).
3 Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>
4 Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License version 2 as
8 published by the Free Software Foundation;
9
10 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
11 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
12 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
13 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090014 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
15 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
Linus Torvalds1da177e2005-04-16 15:20:36 -070017 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090019 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
20 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
Linus Torvalds1da177e2005-04-16 15:20:36 -070021 SOFTWARE IS DISCLAIMED.
22*/
23
24/*
25 * RFCOMM sockets.
Linus Torvalds1da177e2005-04-16 15:20:36 -070026 */
27
Gustavo Padovan8c520a52012-05-23 04:04:22 -030028#include <linux/export.h>
Marcel Holtmannaef7d972010-03-21 05:27:45 +010029#include <linux/debugfs.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010030#include <linux/sched/signal.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070031
32#include <net/bluetooth/bluetooth.h>
33#include <net/bluetooth/hci_core.h>
34#include <net/bluetooth/l2cap.h>
35#include <net/bluetooth/rfcomm.h>
36
Eric Dumazet90ddc4f2005-12-22 12:49:22 -080037static const struct proto_ops rfcomm_sock_ops;
Linus Torvalds1da177e2005-04-16 15:20:36 -070038
39static struct bt_sock_list rfcomm_sk_list = {
Robert P. J. Dayd5fb2962008-03-28 16:17:38 -070040 .lock = __RW_LOCK_UNLOCKED(rfcomm_sk_list.lock)
Linus Torvalds1da177e2005-04-16 15:20:36 -070041};
42
43static void rfcomm_sock_close(struct sock *sk);
44static void rfcomm_sock_kill(struct sock *sk);
45
46/* ---- DLC callbacks ----
47 *
48 * called under rfcomm_dlc_lock()
49 */
50static void rfcomm_sk_data_ready(struct rfcomm_dlc *d, struct sk_buff *skb)
51{
52 struct sock *sk = d->owner;
53 if (!sk)
54 return;
55
56 atomic_add(skb->len, &sk->sk_rmem_alloc);
57 skb_queue_tail(&sk->sk_receive_queue, skb);
David S. Miller676d2362014-04-11 16:15:36 -040058 sk->sk_data_ready(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -070059
60 if (atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf)
61 rfcomm_dlc_throttle(d);
62}
63
64static void rfcomm_sk_state_change(struct rfcomm_dlc *d, int err)
65{
66 struct sock *sk = d->owner, *parent;
Gustavo F. Padovanfad003b2010-08-14 00:48:07 -030067 unsigned long flags;
68
Linus Torvalds1da177e2005-04-16 15:20:36 -070069 if (!sk)
70 return;
71
72 BT_DBG("dlc %p state %ld err %d", d, d->state, err);
73
Gustavo F. Padovanfad003b2010-08-14 00:48:07 -030074 local_irq_save(flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -070075 bh_lock_sock(sk);
76
77 if (err)
78 sk->sk_err = err;
79
80 sk->sk_state = d->state;
81
82 parent = bt_sk(sk)->parent;
83 if (parent) {
84 if (d->state == BT_CLOSED) {
85 sock_set_flag(sk, SOCK_ZAPPED);
86 bt_accept_unlink(sk);
87 }
David S. Miller676d2362014-04-11 16:15:36 -040088 parent->sk_data_ready(parent);
Linus Torvalds1da177e2005-04-16 15:20:36 -070089 } else {
90 if (d->state == BT_CONNECTED)
Marcel Holtmann94a86df2013-10-13 10:34:02 -070091 rfcomm_session_getaddr(d->session,
92 &rfcomm_pi(sk)->src, NULL);
Linus Torvalds1da177e2005-04-16 15:20:36 -070093 sk->sk_state_change(sk);
94 }
95
96 bh_unlock_sock(sk);
Gustavo F. Padovanfad003b2010-08-14 00:48:07 -030097 local_irq_restore(flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -070098
99 if (parent && sock_flag(sk, SOCK_ZAPPED)) {
100 /* We have to drop DLC lock here, otherwise
101 * rfcomm_sock_destruct() will dead lock. */
102 rfcomm_dlc_unlock(d);
103 rfcomm_sock_kill(sk);
104 rfcomm_dlc_lock(d);
105 }
106}
107
108/* ---- Socket functions ---- */
Andrzej Kaczmarekb1765e72014-02-20 16:42:01 +0100109static struct sock *__rfcomm_get_listen_sock_by_addr(u8 channel, bdaddr_t *src)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110{
111 struct sock *sk = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112
Sasha Levinb67bfe02013-02-27 17:06:00 -0800113 sk_for_each(sk, &rfcomm_sk_list.head) {
Andrzej Kaczmarekb1765e72014-02-20 16:42:01 +0100114 if (rfcomm_pi(sk)->channel != channel)
115 continue;
116
117 if (bacmp(&rfcomm_pi(sk)->src, src))
118 continue;
119
120 if (sk->sk_state == BT_BOUND || sk->sk_state == BT_LISTEN)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121 break;
122 }
123
Sasha Levinb67bfe02013-02-27 17:06:00 -0800124 return sk ? sk : NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125}
126
127/* Find socket with channel and source bdaddr.
128 * Returns closest match.
129 */
Gustavo F. Padovaneeb36652010-11-01 18:43:53 +0000130static struct sock *rfcomm_get_sock_by_channel(int state, u8 channel, bdaddr_t *src)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131{
132 struct sock *sk = NULL, *sk1 = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133
Gustavo F. Padovaneeb36652010-11-01 18:43:53 +0000134 read_lock(&rfcomm_sk_list.lock);
135
Sasha Levinb67bfe02013-02-27 17:06:00 -0800136 sk_for_each(sk, &rfcomm_sk_list.head) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700137 if (state && sk->sk_state != state)
138 continue;
139
140 if (rfcomm_pi(sk)->channel == channel) {
141 /* Exact match. */
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700142 if (!bacmp(&rfcomm_pi(sk)->src, src))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700143 break;
144
145 /* Closest match */
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700146 if (!bacmp(&rfcomm_pi(sk)->src, BDADDR_ANY))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700147 sk1 = sk;
148 }
149 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151 read_unlock(&rfcomm_sk_list.lock);
Gustavo F. Padovaneeb36652010-11-01 18:43:53 +0000152
Sasha Levinb67bfe02013-02-27 17:06:00 -0800153 return sk ? sk : sk1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154}
155
156static void rfcomm_sock_destruct(struct sock *sk)
157{
158 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
159
160 BT_DBG("sk %p dlc %p", sk, d);
161
162 skb_queue_purge(&sk->sk_receive_queue);
163 skb_queue_purge(&sk->sk_write_queue);
164
165 rfcomm_dlc_lock(d);
166 rfcomm_pi(sk)->dlc = NULL;
167
168 /* Detach DLC if it's owned by this socket */
169 if (d->owner == sk)
170 d->owner = NULL;
171 rfcomm_dlc_unlock(d);
172
173 rfcomm_dlc_put(d);
174}
175
176static void rfcomm_sock_cleanup_listen(struct sock *parent)
177{
178 struct sock *sk;
179
180 BT_DBG("parent %p", parent);
181
182 /* Close not yet accepted dlcs */
183 while ((sk = bt_accept_dequeue(parent, NULL))) {
184 rfcomm_sock_close(sk);
185 rfcomm_sock_kill(sk);
186 }
187
188 parent->sk_state = BT_CLOSED;
189 sock_set_flag(parent, SOCK_ZAPPED);
190}
191
192/* Kill socket (only if zapped and orphan)
193 * Must be called on unlocked socket.
194 */
195static void rfcomm_sock_kill(struct sock *sk)
196{
197 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
198 return;
199
200 BT_DBG("sk %p state %d refcnt %d", sk, sk->sk_state, atomic_read(&sk->sk_refcnt));
201
202 /* Kill poor orphan */
203 bt_sock_unlink(&rfcomm_sk_list, sk);
204 sock_set_flag(sk, SOCK_DEAD);
205 sock_put(sk);
206}
207
208static void __rfcomm_sock_close(struct sock *sk)
209{
210 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
211
212 BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
213
214 switch (sk->sk_state) {
215 case BT_LISTEN:
216 rfcomm_sock_cleanup_listen(sk);
217 break;
218
219 case BT_CONNECT:
220 case BT_CONNECT2:
221 case BT_CONFIG:
222 case BT_CONNECTED:
223 rfcomm_dlc_close(d, 0);
224
225 default:
226 sock_set_flag(sk, SOCK_ZAPPED);
227 break;
228 }
229}
230
231/* Close socket.
232 * Must be called on unlocked socket.
233 */
234static void rfcomm_sock_close(struct sock *sk)
235{
236 lock_sock(sk);
237 __rfcomm_sock_close(sk);
238 release_sock(sk);
239}
240
241static void rfcomm_sock_init(struct sock *sk, struct sock *parent)
242{
243 struct rfcomm_pinfo *pi = rfcomm_pi(sk);
244
245 BT_DBG("sk %p", sk);
246
247 if (parent) {
248 sk->sk_type = parent->sk_type;
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300249 pi->dlc->defer_setup = test_bit(BT_SK_DEFER_SETUP,
250 &bt_sk(parent)->flags);
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100251
252 pi->sec_level = rfcomm_pi(parent)->sec_level;
253 pi->role_switch = rfcomm_pi(parent)->role_switch;
Paul Moore6230c9b2011-10-07 09:40:59 +0000254
255 security_sk_clone(parent, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 } else {
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100257 pi->dlc->defer_setup = 0;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100258
259 pi->sec_level = BT_SECURITY_LOW;
260 pi->role_switch = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 }
262
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100263 pi->dlc->sec_level = pi->sec_level;
264 pi->dlc->role_switch = pi->role_switch;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265}
266
267static struct proto rfcomm_proto = {
268 .name = "RFCOMM",
269 .owner = THIS_MODULE,
270 .obj_size = sizeof(struct rfcomm_pinfo)
271};
272
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500273static struct sock *rfcomm_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio, int kern)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700274{
275 struct rfcomm_dlc *d;
276 struct sock *sk;
277
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500278 sk = sk_alloc(net, PF_BLUETOOTH, prio, &rfcomm_proto, kern);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279 if (!sk)
280 return NULL;
281
282 sock_init_data(sock, sk);
283 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
284
285 d = rfcomm_dlc_alloc(prio);
286 if (!d) {
287 sk_free(sk);
288 return NULL;
289 }
290
291 d->data_ready = rfcomm_sk_data_ready;
292 d->state_change = rfcomm_sk_state_change;
293
294 rfcomm_pi(sk)->dlc = d;
295 d->owner = sk;
296
297 sk->sk_destruct = rfcomm_sock_destruct;
298 sk->sk_sndtimeo = RFCOMM_CONN_TIMEOUT;
299
Marcel Holtmann77db1982008-07-14 20:13:45 +0200300 sk->sk_sndbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
301 sk->sk_rcvbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700302
303 sock_reset_flag(sk, SOCK_ZAPPED);
304
305 sk->sk_protocol = proto;
Marcel Holtmann77db1982008-07-14 20:13:45 +0200306 sk->sk_state = BT_OPEN;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700307
308 bt_sock_link(&rfcomm_sk_list, sk);
309
310 BT_DBG("sk %p", sk);
311 return sk;
312}
313
Eric Paris3f378b62009-11-05 22:18:14 -0800314static int rfcomm_sock_create(struct net *net, struct socket *sock,
315 int protocol, int kern)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700316{
317 struct sock *sk;
318
319 BT_DBG("sock %p", sock);
320
321 sock->state = SS_UNCONNECTED;
322
323 if (sock->type != SOCK_STREAM && sock->type != SOCK_RAW)
324 return -ESOCKTNOSUPPORT;
325
326 sock->ops = &rfcomm_sock_ops;
327
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500328 sk = rfcomm_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
Marcel Holtmann74da6262006-10-15 17:31:14 +0200329 if (!sk)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700330 return -ENOMEM;
331
332 rfcomm_sock_init(sk, NULL);
333 return 0;
334}
335
336static int rfcomm_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
337{
Jaganath Kanakkassery951b6a02015-05-14 12:58:08 +0530338 struct sockaddr_rc sa;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700339 struct sock *sk = sock->sk;
Jaganath Kanakkassery951b6a02015-05-14 12:58:08 +0530340 int len, err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700341
342 if (!addr || addr->sa_family != AF_BLUETOOTH)
343 return -EINVAL;
344
Jaganath Kanakkassery951b6a02015-05-14 12:58:08 +0530345 memset(&sa, 0, sizeof(sa));
346 len = min_t(unsigned int, sizeof(sa), addr_len);
347 memcpy(&sa, addr, len);
348
349 BT_DBG("sk %p %pMR", sk, &sa.rc_bdaddr);
350
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351 lock_sock(sk);
352
353 if (sk->sk_state != BT_OPEN) {
354 err = -EBADFD;
355 goto done;
356 }
357
Marcel Holtmann354d28d2005-09-13 01:32:31 +0200358 if (sk->sk_type != SOCK_STREAM) {
359 err = -EINVAL;
360 goto done;
361 }
362
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -0200363 write_lock(&rfcomm_sk_list.lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700364
Jaganath Kanakkassery951b6a02015-05-14 12:58:08 +0530365 if (sa.rc_channel &&
366 __rfcomm_get_listen_sock_by_addr(sa.rc_channel, &sa.rc_bdaddr)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700367 err = -EADDRINUSE;
368 } else {
369 /* Save source address */
Jaganath Kanakkassery951b6a02015-05-14 12:58:08 +0530370 bacpy(&rfcomm_pi(sk)->src, &sa.rc_bdaddr);
371 rfcomm_pi(sk)->channel = sa.rc_channel;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372 sk->sk_state = BT_BOUND;
373 }
374
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -0200375 write_unlock(&rfcomm_sk_list.lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700376
377done:
378 release_sock(sk);
379 return err;
380}
381
382static int rfcomm_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
383{
384 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
385 struct sock *sk = sock->sk;
386 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
387 int err = 0;
388
389 BT_DBG("sk %p", sk);
390
Changli Gao6503d962010-03-31 22:58:26 +0000391 if (alen < sizeof(struct sockaddr_rc) ||
392 addr->sa_family != AF_BLUETOOTH)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700393 return -EINVAL;
394
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395 lock_sock(sk);
396
Marcel Holtmann354d28d2005-09-13 01:32:31 +0200397 if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) {
398 err = -EBADFD;
399 goto done;
400 }
401
402 if (sk->sk_type != SOCK_STREAM) {
403 err = -EINVAL;
404 goto done;
405 }
406
Linus Torvalds1da177e2005-04-16 15:20:36 -0700407 sk->sk_state = BT_CONNECT;
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700408 bacpy(&rfcomm_pi(sk)->dst, &sa->rc_bdaddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409 rfcomm_pi(sk)->channel = sa->rc_channel;
410
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100411 d->sec_level = rfcomm_pi(sk)->sec_level;
412 d->role_switch = rfcomm_pi(sk)->role_switch;
Marcel Holtmann77db1982008-07-14 20:13:45 +0200413
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700414 err = rfcomm_dlc_open(d, &rfcomm_pi(sk)->src, &sa->rc_bdaddr,
415 sa->rc_channel);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700416 if (!err)
417 err = bt_sock_wait_state(sk, BT_CONNECTED,
418 sock_sndtimeo(sk, flags & O_NONBLOCK));
419
Marcel Holtmann354d28d2005-09-13 01:32:31 +0200420done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421 release_sock(sk);
422 return err;
423}
424
425static int rfcomm_sock_listen(struct socket *sock, int backlog)
426{
427 struct sock *sk = sock->sk;
428 int err = 0;
429
430 BT_DBG("sk %p backlog %d", sk, backlog);
431
432 lock_sock(sk);
433
434 if (sk->sk_state != BT_BOUND) {
435 err = -EBADFD;
436 goto done;
437 }
438
Marcel Holtmann354d28d2005-09-13 01:32:31 +0200439 if (sk->sk_type != SOCK_STREAM) {
440 err = -EINVAL;
441 goto done;
442 }
443
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 if (!rfcomm_pi(sk)->channel) {
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700445 bdaddr_t *src = &rfcomm_pi(sk)->src;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700446 u8 channel;
447
448 err = -EINVAL;
449
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -0200450 write_lock(&rfcomm_sk_list.lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700451
452 for (channel = 1; channel < 31; channel++)
Andrzej Kaczmarekb1765e72014-02-20 16:42:01 +0100453 if (!__rfcomm_get_listen_sock_by_addr(channel, src)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454 rfcomm_pi(sk)->channel = channel;
455 err = 0;
456 break;
457 }
458
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -0200459 write_unlock(&rfcomm_sk_list.lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460
461 if (err < 0)
462 goto done;
463 }
464
465 sk->sk_max_ack_backlog = backlog;
466 sk->sk_ack_backlog = 0;
467 sk->sk_state = BT_LISTEN;
468
469done:
470 release_sock(sk);
471 return err;
472}
473
474static int rfcomm_sock_accept(struct socket *sock, struct socket *newsock, int flags)
475{
Peter Hurleydfb2fae2015-01-23 12:16:53 -0500476 DEFINE_WAIT_FUNC(wait, woken_wake_function);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700477 struct sock *sk = sock->sk, *nsk;
478 long timeo;
479 int err = 0;
480
Gustavo Padovandc2a0e22012-11-20 23:25:54 -0200481 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482
Marcel Holtmann354d28d2005-09-13 01:32:31 +0200483 if (sk->sk_type != SOCK_STREAM) {
484 err = -EINVAL;
485 goto done;
486 }
487
Linus Torvalds1da177e2005-04-16 15:20:36 -0700488 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
489
490 BT_DBG("sk %p timeo %ld", sk, timeo);
491
492 /* Wait for an incoming connection. (wake-one). */
Eric Dumazetaa395142010-04-20 13:03:51 +0000493 add_wait_queue_exclusive(sk_sleep(sk), &wait);
Peter Hurley950e2d52011-07-24 00:10:41 -0400494 while (1) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495 if (sk->sk_state != BT_LISTEN) {
496 err = -EBADFD;
497 break;
498 }
499
Peter Hurley950e2d52011-07-24 00:10:41 -0400500 nsk = bt_accept_dequeue(sk, newsock);
501 if (nsk)
502 break;
503
504 if (!timeo) {
505 err = -EAGAIN;
506 break;
507 }
508
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509 if (signal_pending(current)) {
510 err = sock_intr_errno(timeo);
511 break;
512 }
Peter Hurley950e2d52011-07-24 00:10:41 -0400513
514 release_sock(sk);
Peter Hurleydfb2fae2015-01-23 12:16:53 -0500515
516 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
517
Gustavo Padovandc2a0e22012-11-20 23:25:54 -0200518 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519 }
Eric Dumazetaa395142010-04-20 13:03:51 +0000520 remove_wait_queue(sk_sleep(sk), &wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700521
522 if (err)
523 goto done;
524
525 newsock->state = SS_CONNECTED;
526
527 BT_DBG("new socket %p", nsk);
528
529done:
530 release_sock(sk);
531 return err;
532}
533
534static int rfcomm_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
535{
536 struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
537 struct sock *sk = sock->sk;
538
539 BT_DBG("sock %p, sk %p", sock, sk);
540
Johan Hedberge8b1ab92014-03-26 15:49:18 +0200541 if (peer && sk->sk_state != BT_CONNECTED &&
542 sk->sk_state != BT_CONNECT && sk->sk_state != BT_CONNECT2)
Johan Hedberg35364c92014-01-28 15:16:50 -0800543 return -ENOTCONN;
544
Mathias Krause9344a972012-08-15 11:31:50 +0000545 memset(sa, 0, sizeof(*sa));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700546 sa->rc_family = AF_BLUETOOTH;
547 sa->rc_channel = rfcomm_pi(sk)->channel;
548 if (peer)
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700549 bacpy(&sa->rc_bdaddr, &rfcomm_pi(sk)->dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700550 else
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700551 bacpy(&sa->rc_bdaddr, &rfcomm_pi(sk)->src);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700552
553 *len = sizeof(struct sockaddr_rc);
554 return 0;
555}
556
Ying Xue1b784142015-03-02 15:37:48 +0800557static int rfcomm_sock_sendmsg(struct socket *sock, struct msghdr *msg,
558 size_t len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700559{
560 struct sock *sk = sock->sk;
561 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
562 struct sk_buff *skb;
Johan Hedberge793dcf2013-09-16 13:05:19 +0300563 int sent;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700564
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100565 if (test_bit(RFCOMM_DEFER_SETUP, &d->flags))
566 return -ENOTCONN;
567
Linus Torvalds1da177e2005-04-16 15:20:36 -0700568 if (msg->msg_flags & MSG_OOB)
569 return -EOPNOTSUPP;
570
571 if (sk->sk_shutdown & SEND_SHUTDOWN)
572 return -EPIPE;
573
574 BT_DBG("sock %p, sk %p", sock, sk);
575
576 lock_sock(sk);
577
Johan Hedberge793dcf2013-09-16 13:05:19 +0300578 sent = bt_sock_wait_ready(sk, msg->msg_flags);
579 if (sent)
580 goto done;
581
Linus Torvalds1da177e2005-04-16 15:20:36 -0700582 while (len) {
583 size_t size = min_t(size_t, len, d->mtu);
Marcel Holtmann4d6a2182007-01-08 02:16:31 +0100584 int err;
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900585
Linus Torvalds1da177e2005-04-16 15:20:36 -0700586 skb = sock_alloc_send_skb(sk, size + RFCOMM_SKB_RESERVE,
587 msg->msg_flags & MSG_DONTWAIT, &err);
Victor Shcherbatyuk91aa35a2009-01-15 21:52:12 +0100588 if (!skb) {
589 if (sent == 0)
590 sent = err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700591 break;
Victor Shcherbatyuk91aa35a2009-01-15 21:52:12 +0100592 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700593 skb_reserve(skb, RFCOMM_SKB_HEAD_RESERVE);
594
Al Viro6ce8e9c2014-04-06 21:25:44 -0400595 err = memcpy_from_msg(skb_put(skb, size), msg, size);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700596 if (err) {
597 kfree_skb(skb);
Marcel Holtmann4d6a2182007-01-08 02:16:31 +0100598 if (sent == 0)
599 sent = err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 break;
601 }
602
Luiz Augusto von Dentz262038f2011-11-01 10:58:58 +0200603 skb->priority = sk->sk_priority;
604
Linus Torvalds1da177e2005-04-16 15:20:36 -0700605 err = rfcomm_dlc_send(d, skb);
606 if (err < 0) {
607 kfree_skb(skb);
Marcel Holtmann4d6a2182007-01-08 02:16:31 +0100608 if (sent == 0)
609 sent = err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700610 break;
611 }
612
613 sent += size;
614 len -= size;
615 }
616
Johan Hedberge793dcf2013-09-16 13:05:19 +0300617done:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700618 release_sock(sk);
619
Marcel Holtmann4d6a2182007-01-08 02:16:31 +0100620 return sent;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700621}
622
Ying Xue1b784142015-03-02 15:37:48 +0800623static int rfcomm_sock_recvmsg(struct socket *sock, struct msghdr *msg,
624 size_t size, int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700625{
626 struct sock *sk = sock->sk;
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100627 struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
Mat Martineau3d7d01d2010-09-08 10:05:28 -0700628 int len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700629
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100630 if (test_and_clear_bit(RFCOMM_DEFER_SETUP, &d->flags)) {
631 rfcomm_dlc_accept(d);
632 return 0;
633 }
634
Ying Xue1b784142015-03-02 15:37:48 +0800635 len = bt_sock_stream_recvmsg(sock, msg, size, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700636
637 lock_sock(sk);
Mat Martineau3d7d01d2010-09-08 10:05:28 -0700638 if (!(flags & MSG_PEEK) && len > 0)
639 atomic_sub(len, &sk->sk_rmem_alloc);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700640
Linus Torvalds1da177e2005-04-16 15:20:36 -0700641 if (atomic_read(&sk->sk_rmem_alloc) <= (sk->sk_rcvbuf >> 2))
642 rfcomm_dlc_unthrottle(rfcomm_pi(sk)->dlc);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700643 release_sock(sk);
Mat Martineau3d7d01d2010-09-08 10:05:28 -0700644
645 return len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700646}
647
David S. Millerb7058842009-09-30 16:12:20 -0700648static int rfcomm_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700649{
650 struct sock *sk = sock->sk;
651 int err = 0;
652 u32 opt;
653
654 BT_DBG("sk %p", sk);
655
656 lock_sock(sk);
657
658 switch (optname) {
659 case RFCOMM_LM:
660 if (get_user(opt, (u32 __user *) optval)) {
661 err = -EFAULT;
662 break;
663 }
664
Marcel Holtmann2c068e02014-01-15 22:37:41 -0800665 if (opt & RFCOMM_LM_FIPS) {
666 err = -EINVAL;
667 break;
668 }
669
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100670 if (opt & RFCOMM_LM_AUTH)
671 rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW;
672 if (opt & RFCOMM_LM_ENCRYPT)
673 rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
674 if (opt & RFCOMM_LM_SECURE)
675 rfcomm_pi(sk)->sec_level = BT_SECURITY_HIGH;
676
677 rfcomm_pi(sk)->role_switch = (opt & RFCOMM_LM_MASTER);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700678 break;
679
680 default:
681 err = -ENOPROTOOPT;
682 break;
683 }
684
685 release_sock(sk);
686 return err;
687}
688
David S. Millerb7058842009-09-30 16:12:20 -0700689static int rfcomm_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100690{
691 struct sock *sk = sock->sk;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100692 struct bt_security sec;
Stephen Boydd0fad892011-05-12 16:50:09 -0700693 int err = 0;
694 size_t len;
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100695 u32 opt;
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100696
697 BT_DBG("sk %p", sk);
698
699 if (level == SOL_RFCOMM)
700 return rfcomm_sock_setsockopt_old(sock, optname, optval, optlen);
701
Marcel Holtmann0588d942009-01-16 10:06:13 +0100702 if (level != SOL_BLUETOOTH)
703 return -ENOPROTOOPT;
704
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100705 lock_sock(sk);
706
707 switch (optname) {
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100708 case BT_SECURITY:
Marcel Holtmann0588d942009-01-16 10:06:13 +0100709 if (sk->sk_type != SOCK_STREAM) {
710 err = -EINVAL;
711 break;
712 }
713
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100714 sec.level = BT_SECURITY_LOW;
715
716 len = min_t(unsigned int, sizeof(sec), optlen);
717 if (copy_from_user((char *) &sec, optval, len)) {
718 err = -EFAULT;
719 break;
720 }
721
722 if (sec.level > BT_SECURITY_HIGH) {
723 err = -EINVAL;
724 break;
725 }
726
727 rfcomm_pi(sk)->sec_level = sec.level;
728 break;
729
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100730 case BT_DEFER_SETUP:
731 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
732 err = -EINVAL;
733 break;
734 }
735
736 if (get_user(opt, (u32 __user *) optval)) {
737 err = -EFAULT;
738 break;
739 }
740
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300741 if (opt)
742 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
743 else
744 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
745
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100746 break;
747
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100748 default:
749 err = -ENOPROTOOPT;
750 break;
751 }
752
753 release_sock(sk);
754 return err;
755}
756
757static int rfcomm_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700758{
759 struct sock *sk = sock->sk;
Marcel Holtmann60c7a3c92013-11-02 02:36:31 -0700760 struct sock *l2cap_sk;
761 struct l2cap_conn *conn;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700762 struct rfcomm_conninfo cinfo;
763 int len, err = 0;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100764 u32 opt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700765
766 BT_DBG("sk %p", sk);
767
768 if (get_user(len, optlen))
769 return -EFAULT;
770
771 lock_sock(sk);
772
773 switch (optname) {
774 case RFCOMM_LM:
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100775 switch (rfcomm_pi(sk)->sec_level) {
776 case BT_SECURITY_LOW:
777 opt = RFCOMM_LM_AUTH;
778 break;
779 case BT_SECURITY_MEDIUM:
780 opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT;
781 break;
782 case BT_SECURITY_HIGH:
783 opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT |
Marcel Holtmann2c068e02014-01-15 22:37:41 -0800784 RFCOMM_LM_SECURE;
785 break;
786 case BT_SECURITY_FIPS:
787 opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT |
788 RFCOMM_LM_SECURE | RFCOMM_LM_FIPS;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100789 break;
790 default:
791 opt = 0;
792 break;
793 }
794
795 if (rfcomm_pi(sk)->role_switch)
796 opt |= RFCOMM_LM_MASTER;
797
798 if (put_user(opt, (u32 __user *) optval))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700799 err = -EFAULT;
Marcel Holtmann2c068e02014-01-15 22:37:41 -0800800
Linus Torvalds1da177e2005-04-16 15:20:36 -0700801 break;
802
803 case RFCOMM_CONNINFO:
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100804 if (sk->sk_state != BT_CONNECTED &&
805 !rfcomm_pi(sk)->dlc->defer_setup) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700806 err = -ENOTCONN;
807 break;
808 }
809
Marcel Holtmann60c7a3c92013-11-02 02:36:31 -0700810 l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk;
811 conn = l2cap_pi(l2cap_sk)->chan->conn;
812
Filip Palian8d03e972011-05-12 19:32:46 +0200813 memset(&cinfo, 0, sizeof(cinfo));
Gustavo F. Padovan8c1d7872011-04-13 20:23:55 -0300814 cinfo.hci_handle = conn->hcon->handle;
815 memcpy(cinfo.dev_class, conn->hcon->dev_class, 3);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700816
817 len = min_t(unsigned int, len, sizeof(cinfo));
818 if (copy_to_user(optval, (char *) &cinfo, len))
819 err = -EFAULT;
820
821 break;
822
823 default:
824 err = -ENOPROTOOPT;
825 break;
826 }
827
828 release_sock(sk);
829 return err;
830}
831
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100832static int rfcomm_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
833{
834 struct sock *sk = sock->sk;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100835 struct bt_security sec;
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100836 int len, err = 0;
837
838 BT_DBG("sk %p", sk);
839
840 if (level == SOL_RFCOMM)
841 return rfcomm_sock_getsockopt_old(sock, optname, optval, optlen);
842
Marcel Holtmann0588d942009-01-16 10:06:13 +0100843 if (level != SOL_BLUETOOTH)
844 return -ENOPROTOOPT;
845
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100846 if (get_user(len, optlen))
847 return -EFAULT;
848
849 lock_sock(sk);
850
851 switch (optname) {
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100852 case BT_SECURITY:
Marcel Holtmann0588d942009-01-16 10:06:13 +0100853 if (sk->sk_type != SOCK_STREAM) {
854 err = -EINVAL;
855 break;
856 }
857
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100858 sec.level = rfcomm_pi(sk)->sec_level;
Mathias Krause9ad2de42012-08-15 11:31:48 +0000859 sec.key_size = 0;
Marcel Holtmann9f2c8a02009-01-15 21:58:40 +0100860
861 len = min_t(unsigned int, len, sizeof(sec));
862 if (copy_to_user(optval, (char *) &sec, len))
863 err = -EFAULT;
864
865 break;
866
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100867 case BT_DEFER_SETUP:
868 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
869 err = -EINVAL;
870 break;
871 }
872
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300873 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
874 (u32 __user *) optval))
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100875 err = -EFAULT;
876
877 break;
878
Marcel Holtmannd58daf42009-01-15 21:52:14 +0100879 default:
880 err = -ENOPROTOOPT;
881 break;
882 }
883
884 release_sock(sk);
885 return err;
886}
887
Linus Torvalds1da177e2005-04-16 15:20:36 -0700888static int rfcomm_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
889{
David S. Millere19caae2008-12-09 01:04:27 -0800890 struct sock *sk __maybe_unused = sock->sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700891 int err;
892
David S. Millere19caae2008-12-09 01:04:27 -0800893 BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700894
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200895 err = bt_sock_ioctl(sock, cmd, arg);
896
897 if (err == -ENOIOCTLCMD) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700898#ifdef CONFIG_BT_RFCOMM_TTY
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200899 lock_sock(sk);
900 err = rfcomm_dev_ioctl(sk, cmd, (void __user *) arg);
901 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700902#else
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200903 err = -EOPNOTSUPP;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700904#endif
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200905 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700906
Linus Torvalds1da177e2005-04-16 15:20:36 -0700907 return err;
908}
909
910static int rfcomm_sock_shutdown(struct socket *sock, int how)
911{
912 struct sock *sk = sock->sk;
913 int err = 0;
914
915 BT_DBG("sock %p, sk %p", sock, sk);
916
Andrei Emeltchenko285b4e92010-12-01 16:58:23 +0200917 if (!sk)
918 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700919
920 lock_sock(sk);
921 if (!sk->sk_shutdown) {
922 sk->sk_shutdown = SHUTDOWN_MASK;
923 __rfcomm_sock_close(sk);
924
Vladimir Davydov093facf2014-07-15 12:25:28 +0400925 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
926 !(current->flags & PF_EXITING))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700927 err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
928 }
929 release_sock(sk);
930 return err;
931}
932
933static int rfcomm_sock_release(struct socket *sock)
934{
935 struct sock *sk = sock->sk;
936 int err;
937
938 BT_DBG("sock %p, sk %p", sock, sk);
939
940 if (!sk)
941 return 0;
942
943 err = rfcomm_sock_shutdown(sock, 2);
944
945 sock_orphan(sk);
946 rfcomm_sock_kill(sk);
947 return err;
948}
949
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900950/* ---- RFCOMM core layer callbacks ----
Linus Torvalds1da177e2005-04-16 15:20:36 -0700951 *
952 * called under rfcomm_lock()
953 */
954int rfcomm_connect_ind(struct rfcomm_session *s, u8 channel, struct rfcomm_dlc **d)
955{
956 struct sock *sk, *parent;
957 bdaddr_t src, dst;
958 int result = 0;
959
960 BT_DBG("session %p channel %d", s, channel);
961
962 rfcomm_session_getaddr(s, &src, &dst);
963
964 /* Check if we have socket listening on channel */
965 parent = rfcomm_get_sock_by_channel(BT_LISTEN, channel, &src);
966 if (!parent)
967 return 0;
968
Gustavo F. Padovaneeb36652010-11-01 18:43:53 +0000969 bh_lock_sock(parent);
970
Linus Torvalds1da177e2005-04-16 15:20:36 -0700971 /* Check for backlog size */
972 if (sk_acceptq_is_full(parent)) {
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900973 BT_DBG("backlog full %d", parent->sk_ack_backlog);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700974 goto done;
975 }
976
Eric W. Biederman11aa9c22015-05-08 21:09:13 -0500977 sk = rfcomm_sock_alloc(sock_net(parent), NULL, BTPROTO_RFCOMM, GFP_ATOMIC, 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700978 if (!sk)
979 goto done;
980
Octavian Purdilab5a30dd2012-01-22 00:28:34 +0200981 bt_sock_reclassify_lock(sk, BTPROTO_RFCOMM);
982
Linus Torvalds1da177e2005-04-16 15:20:36 -0700983 rfcomm_sock_init(sk, parent);
Marcel Holtmann94a86df2013-10-13 10:34:02 -0700984 bacpy(&rfcomm_pi(sk)->src, &src);
985 bacpy(&rfcomm_pi(sk)->dst, &dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700986 rfcomm_pi(sk)->channel = channel;
987
988 sk->sk_state = BT_CONFIG;
989 bt_accept_enqueue(parent, sk);
990
991 /* Accept connection and return socket DLC */
992 *d = rfcomm_pi(sk)->dlc;
993 result = 1;
994
995done:
996 bh_unlock_sock(parent);
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100997
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300998 if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags))
Marcel Holtmannbb23c0a2009-01-15 21:56:48 +0100999 parent->sk_state_change(parent);
1000
Linus Torvalds1da177e2005-04-16 15:20:36 -07001001 return result;
1002}
1003
Marcel Holtmannaef7d972010-03-21 05:27:45 +01001004static int rfcomm_sock_debugfs_show(struct seq_file *f, void *p)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001005{
1006 struct sock *sk;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001007
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -02001008 read_lock(&rfcomm_sk_list.lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001009
Sasha Levinb67bfe02013-02-27 17:06:00 -08001010 sk_for_each(sk, &rfcomm_sk_list.head) {
Andrei Emeltchenkofcb73332012-09-25 12:49:44 +03001011 seq_printf(f, "%pMR %pMR %d %d\n",
Marcel Holtmann94a86df2013-10-13 10:34:02 -07001012 &rfcomm_pi(sk)->src, &rfcomm_pi(sk)->dst,
Andrei Emeltchenkofcb73332012-09-25 12:49:44 +03001013 sk->sk_state, rfcomm_pi(sk)->channel);
Marcel Holtmannbe9d1222005-11-08 09:57:38 -08001014 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001015
Gustavo F. Padovan95ca83f2011-12-27 15:28:44 -02001016 read_unlock(&rfcomm_sk_list.lock);
Marcel Holtmannbe9d1222005-11-08 09:57:38 -08001017
Marcel Holtmannaef7d972010-03-21 05:27:45 +01001018 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001019}
1020
Marcel Holtmannaef7d972010-03-21 05:27:45 +01001021static int rfcomm_sock_debugfs_open(struct inode *inode, struct file *file)
1022{
1023 return single_open(file, rfcomm_sock_debugfs_show, inode->i_private);
1024}
1025
1026static const struct file_operations rfcomm_sock_debugfs_fops = {
1027 .open = rfcomm_sock_debugfs_open,
1028 .read = seq_read,
1029 .llseek = seq_lseek,
1030 .release = single_release,
1031};
1032
1033static struct dentry *rfcomm_sock_debugfs;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001034
Eric Dumazet90ddc4f2005-12-22 12:49:22 -08001035static const struct proto_ops rfcomm_sock_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001036 .family = PF_BLUETOOTH,
1037 .owner = THIS_MODULE,
1038 .release = rfcomm_sock_release,
1039 .bind = rfcomm_sock_bind,
1040 .connect = rfcomm_sock_connect,
1041 .listen = rfcomm_sock_listen,
1042 .accept = rfcomm_sock_accept,
1043 .getname = rfcomm_sock_getname,
1044 .sendmsg = rfcomm_sock_sendmsg,
1045 .recvmsg = rfcomm_sock_recvmsg,
1046 .shutdown = rfcomm_sock_shutdown,
1047 .setsockopt = rfcomm_sock_setsockopt,
1048 .getsockopt = rfcomm_sock_getsockopt,
1049 .ioctl = rfcomm_sock_ioctl,
1050 .poll = bt_sock_poll,
1051 .socketpair = sock_no_socketpair,
1052 .mmap = sock_no_mmap
1053};
1054
Stephen Hemmingerec1b4cf2009-10-05 05:58:39 +00001055static const struct net_proto_family rfcomm_sock_family_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001056 .family = PF_BLUETOOTH,
1057 .owner = THIS_MODULE,
1058 .create = rfcomm_sock_create
1059};
1060
Marcel Holtmannbe9d1222005-11-08 09:57:38 -08001061int __init rfcomm_init_sockets(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001062{
1063 int err;
1064
Marcel Holtmann74b3fb82015-01-11 15:18:20 -08001065 BUILD_BUG_ON(sizeof(struct sockaddr_rc) > sizeof(struct sockaddr));
1066
Linus Torvalds1da177e2005-04-16 15:20:36 -07001067 err = proto_register(&rfcomm_proto, 0);
1068 if (err < 0)
1069 return err;
1070
1071 err = bt_sock_register(BTPROTO_RFCOMM, &rfcomm_sock_family_ops);
Masatake YAMATOc6f5df162012-07-26 01:29:49 +09001072 if (err < 0) {
1073 BT_ERR("RFCOMM socket layer registration failed");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001074 goto error;
Masatake YAMATOc6f5df162012-07-26 01:29:49 +09001075 }
1076
Al Virob0316612013-04-04 19:14:33 -04001077 err = bt_procfs_init(&init_net, "rfcomm", &rfcomm_sk_list, NULL);
Masatake YAMATOc6f5df162012-07-26 01:29:49 +09001078 if (err < 0) {
1079 BT_ERR("Failed to create RFCOMM proc file");
1080 bt_sock_unregister(BTPROTO_RFCOMM);
1081 goto error;
1082 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001083
Linus Torvalds1da177e2005-04-16 15:20:36 -07001084 BT_INFO("RFCOMM socket layer initialized");
1085
Marcel Holtmann1120e4b2013-10-17 17:24:16 -07001086 if (IS_ERR_OR_NULL(bt_debugfs))
1087 return 0;
1088
1089 rfcomm_sock_debugfs = debugfs_create_file("rfcomm", 0444,
1090 bt_debugfs, NULL,
1091 &rfcomm_sock_debugfs_fops);
1092
Linus Torvalds1da177e2005-04-16 15:20:36 -07001093 return 0;
1094
1095error:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001096 proto_unregister(&rfcomm_proto);
1097 return err;
1098}
1099
Gustavo F. Padovan2f8362a2010-07-24 02:04:45 -03001100void __exit rfcomm_cleanup_sockets(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001101{
Masatake YAMATOc6f5df162012-07-26 01:29:49 +09001102 bt_procfs_cleanup(&init_net, "rfcomm");
1103
Marcel Holtmannaef7d972010-03-21 05:27:45 +01001104 debugfs_remove(rfcomm_sock_debugfs);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001105
David Herrmann5e9d7f82013-02-24 19:36:51 +01001106 bt_sock_unregister(BTPROTO_RFCOMM);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001107
1108 proto_unregister(&rfcomm_proto);
1109}