1/*
2   RFCOMM implementation for Linux Bluetooth stack (BlueZ).
3   Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>
4   Copyright (C) 2002 Marcel Holtmann <marcel@holtmann.org>
5
6   This program is free software; you can redistribute it and/or modify
7   it under the terms of the GNU General Public License version 2 as
8   published by the Free Software Foundation;
9
10   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
11   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
12   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
13   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
14   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
15   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
16   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
17   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18
19   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
20   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
21   SOFTWARE IS DISCLAIMED.
22*/
23
24/*
25 * RFCOMM sockets.
26 */
27
28#include <linux/export.h>
29#include <linux/debugfs.h>
30
31#include <net/bluetooth/bluetooth.h>
32#include <net/bluetooth/hci_core.h>
33#include <net/bluetooth/l2cap.h>
34#include <net/bluetooth/rfcomm.h>
35
36static const struct proto_ops rfcomm_sock_ops;
37
38static struct bt_sock_list rfcomm_sk_list = {
39	.lock = __RW_LOCK_UNLOCKED(rfcomm_sk_list.lock)
40};
41
42static void rfcomm_sock_close(struct sock *sk);
43static void rfcomm_sock_kill(struct sock *sk);
44
45/* ---- DLC callbacks ----
46 *
47 * called under rfcomm_dlc_lock()
48 */
49static void rfcomm_sk_data_ready(struct rfcomm_dlc *d, struct sk_buff *skb)
50{
51	struct sock *sk = d->owner;
52	if (!sk)
53		return;
54
55	atomic_add(skb->len, &sk->sk_rmem_alloc);
56	skb_queue_tail(&sk->sk_receive_queue, skb);
57	sk->sk_data_ready(sk);
58
59	if (atomic_read(&sk->sk_rmem_alloc) >= sk->sk_rcvbuf)
60		rfcomm_dlc_throttle(d);
61}
62
63static void rfcomm_sk_state_change(struct rfcomm_dlc *d, int err)
64{
65	struct sock *sk = d->owner, *parent;
66	unsigned long flags;
67
68	if (!sk)
69		return;
70
71	BT_DBG("dlc %p state %ld err %d", d, d->state, err);
72
73	local_irq_save(flags);
74	bh_lock_sock(sk);
75
76	if (err)
77		sk->sk_err = err;
78
79	sk->sk_state = d->state;
80
81	parent = bt_sk(sk)->parent;
82	if (parent) {
83		if (d->state == BT_CLOSED) {
84			sock_set_flag(sk, SOCK_ZAPPED);
85			bt_accept_unlink(sk);
86		}
87		parent->sk_data_ready(parent);
88	} else {
89		if (d->state == BT_CONNECTED)
90			rfcomm_session_getaddr(d->session,
91					       &rfcomm_pi(sk)->src, NULL);
92		sk->sk_state_change(sk);
93	}
94
95	bh_unlock_sock(sk);
96	local_irq_restore(flags);
97
98	if (parent && sock_flag(sk, SOCK_ZAPPED)) {
99		/* We have to drop DLC lock here, otherwise
100		 * rfcomm_sock_destruct() will dead lock. */
101		rfcomm_dlc_unlock(d);
102		rfcomm_sock_kill(sk);
103		rfcomm_dlc_lock(d);
104	}
105}
106
107/* ---- Socket functions ---- */
108static struct sock *__rfcomm_get_listen_sock_by_addr(u8 channel, bdaddr_t *src)
109{
110	struct sock *sk = NULL;
111
112	sk_for_each(sk, &rfcomm_sk_list.head) {
113		if (rfcomm_pi(sk)->channel != channel)
114			continue;
115
116		if (bacmp(&rfcomm_pi(sk)->src, src))
117			continue;
118
119		if (sk->sk_state == BT_BOUND || sk->sk_state == BT_LISTEN)
120			break;
121	}
122
123	return sk ? sk : NULL;
124}
125
126/* Find socket with channel and source bdaddr.
127 * Returns closest match.
128 */
129static struct sock *rfcomm_get_sock_by_channel(int state, u8 channel, bdaddr_t *src)
130{
131	struct sock *sk = NULL, *sk1 = NULL;
132
133	read_lock(&rfcomm_sk_list.lock);
134
135	sk_for_each(sk, &rfcomm_sk_list.head) {
136		if (state && sk->sk_state != state)
137			continue;
138
139		if (rfcomm_pi(sk)->channel == channel) {
140			/* Exact match. */
141			if (!bacmp(&rfcomm_pi(sk)->src, src))
142				break;
143
144			/* Closest match */
145			if (!bacmp(&rfcomm_pi(sk)->src, BDADDR_ANY))
146				sk1 = sk;
147		}
148	}
149
150	read_unlock(&rfcomm_sk_list.lock);
151
152	return sk ? sk : sk1;
153}
154
155static void rfcomm_sock_destruct(struct sock *sk)
156{
157	struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
158
159	BT_DBG("sk %p dlc %p", sk, d);
160
161	skb_queue_purge(&sk->sk_receive_queue);
162	skb_queue_purge(&sk->sk_write_queue);
163
164	rfcomm_dlc_lock(d);
165	rfcomm_pi(sk)->dlc = NULL;
166
167	/* Detach DLC if it's owned by this socket */
168	if (d->owner == sk)
169		d->owner = NULL;
170	rfcomm_dlc_unlock(d);
171
172	rfcomm_dlc_put(d);
173}
174
175static void rfcomm_sock_cleanup_listen(struct sock *parent)
176{
177	struct sock *sk;
178
179	BT_DBG("parent %p", parent);
180
181	/* Close not yet accepted dlcs */
182	while ((sk = bt_accept_dequeue(parent, NULL))) {
183		rfcomm_sock_close(sk);
184		rfcomm_sock_kill(sk);
185	}
186
187	parent->sk_state  = BT_CLOSED;
188	sock_set_flag(parent, SOCK_ZAPPED);
189}
190
191/* Kill socket (only if zapped and orphan)
192 * Must be called on unlocked socket.
193 */
194static void rfcomm_sock_kill(struct sock *sk)
195{
196	if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
197		return;
198
199	BT_DBG("sk %p state %d refcnt %d", sk, sk->sk_state, atomic_read(&sk->sk_refcnt));
200
201	/* Kill poor orphan */
202	bt_sock_unlink(&rfcomm_sk_list, sk);
203	sock_set_flag(sk, SOCK_DEAD);
204	sock_put(sk);
205}
206
207static void __rfcomm_sock_close(struct sock *sk)
208{
209	struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
210
211	BT_DBG("sk %p state %d socket %p", sk, sk->sk_state, sk->sk_socket);
212
213	switch (sk->sk_state) {
214	case BT_LISTEN:
215		rfcomm_sock_cleanup_listen(sk);
216		break;
217
218	case BT_CONNECT:
219	case BT_CONNECT2:
220	case BT_CONFIG:
221	case BT_CONNECTED:
222		rfcomm_dlc_close(d, 0);
223
224	default:
225		sock_set_flag(sk, SOCK_ZAPPED);
226		break;
227	}
228}
229
230/* Close socket.
231 * Must be called on unlocked socket.
232 */
233static void rfcomm_sock_close(struct sock *sk)
234{
235	lock_sock(sk);
236	__rfcomm_sock_close(sk);
237	release_sock(sk);
238}
239
240static void rfcomm_sock_init(struct sock *sk, struct sock *parent)
241{
242	struct rfcomm_pinfo *pi = rfcomm_pi(sk);
243
244	BT_DBG("sk %p", sk);
245
246	if (parent) {
247		sk->sk_type = parent->sk_type;
248		pi->dlc->defer_setup = test_bit(BT_SK_DEFER_SETUP,
249						&bt_sk(parent)->flags);
250
251		pi->sec_level = rfcomm_pi(parent)->sec_level;
252		pi->role_switch = rfcomm_pi(parent)->role_switch;
253
254		security_sk_clone(parent, sk);
255	} else {
256		pi->dlc->defer_setup = 0;
257
258		pi->sec_level = BT_SECURITY_LOW;
259		pi->role_switch = 0;
260	}
261
262	pi->dlc->sec_level = pi->sec_level;
263	pi->dlc->role_switch = pi->role_switch;
264}
265
266static struct proto rfcomm_proto = {
267	.name		= "RFCOMM",
268	.owner		= THIS_MODULE,
269	.obj_size	= sizeof(struct rfcomm_pinfo)
270};
271
272static struct sock *rfcomm_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio, int kern)
273{
274	struct rfcomm_dlc *d;
275	struct sock *sk;
276
277	sk = sk_alloc(net, PF_BLUETOOTH, prio, &rfcomm_proto, kern);
278	if (!sk)
279		return NULL;
280
281	sock_init_data(sock, sk);
282	INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
283
284	d = rfcomm_dlc_alloc(prio);
285	if (!d) {
286		sk_free(sk);
287		return NULL;
288	}
289
290	d->data_ready   = rfcomm_sk_data_ready;
291	d->state_change = rfcomm_sk_state_change;
292
293	rfcomm_pi(sk)->dlc = d;
294	d->owner = sk;
295
296	sk->sk_destruct = rfcomm_sock_destruct;
297	sk->sk_sndtimeo = RFCOMM_CONN_TIMEOUT;
298
299	sk->sk_sndbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
300	sk->sk_rcvbuf = RFCOMM_MAX_CREDITS * RFCOMM_DEFAULT_MTU * 10;
301
302	sock_reset_flag(sk, SOCK_ZAPPED);
303
304	sk->sk_protocol = proto;
305	sk->sk_state    = BT_OPEN;
306
307	bt_sock_link(&rfcomm_sk_list, sk);
308
309	BT_DBG("sk %p", sk);
310	return sk;
311}
312
313static int rfcomm_sock_create(struct net *net, struct socket *sock,
314			      int protocol, int kern)
315{
316	struct sock *sk;
317
318	BT_DBG("sock %p", sock);
319
320	sock->state = SS_UNCONNECTED;
321
322	if (sock->type != SOCK_STREAM && sock->type != SOCK_RAW)
323		return -ESOCKTNOSUPPORT;
324
325	sock->ops = &rfcomm_sock_ops;
326
327	sk = rfcomm_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
328	if (!sk)
329		return -ENOMEM;
330
331	rfcomm_sock_init(sk, NULL);
332	return 0;
333}
334
335static int rfcomm_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
336{
337	struct sockaddr_rc sa;
338	struct sock *sk = sock->sk;
339	int len, err = 0;
340
341	if (!addr || addr->sa_family != AF_BLUETOOTH)
342		return -EINVAL;
343
344	memset(&sa, 0, sizeof(sa));
345	len = min_t(unsigned int, sizeof(sa), addr_len);
346	memcpy(&sa, addr, len);
347
348	BT_DBG("sk %p %pMR", sk, &sa.rc_bdaddr);
349
350	lock_sock(sk);
351
352	if (sk->sk_state != BT_OPEN) {
353		err = -EBADFD;
354		goto done;
355	}
356
357	if (sk->sk_type != SOCK_STREAM) {
358		err = -EINVAL;
359		goto done;
360	}
361
362	write_lock(&rfcomm_sk_list.lock);
363
364	if (sa.rc_channel &&
365	    __rfcomm_get_listen_sock_by_addr(sa.rc_channel, &sa.rc_bdaddr)) {
366		err = -EADDRINUSE;
367	} else {
368		/* Save source address */
369		bacpy(&rfcomm_pi(sk)->src, &sa.rc_bdaddr);
370		rfcomm_pi(sk)->channel = sa.rc_channel;
371		sk->sk_state = BT_BOUND;
372	}
373
374	write_unlock(&rfcomm_sk_list.lock);
375
376done:
377	release_sock(sk);
378	return err;
379}
380
381static int rfcomm_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
382{
383	struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
384	struct sock *sk = sock->sk;
385	struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
386	int err = 0;
387
388	BT_DBG("sk %p", sk);
389
390	if (alen < sizeof(struct sockaddr_rc) ||
391	    addr->sa_family != AF_BLUETOOTH)
392		return -EINVAL;
393
394	lock_sock(sk);
395
396	if (sk->sk_state != BT_OPEN && sk->sk_state != BT_BOUND) {
397		err = -EBADFD;
398		goto done;
399	}
400
401	if (sk->sk_type != SOCK_STREAM) {
402		err = -EINVAL;
403		goto done;
404	}
405
406	sk->sk_state = BT_CONNECT;
407	bacpy(&rfcomm_pi(sk)->dst, &sa->rc_bdaddr);
408	rfcomm_pi(sk)->channel = sa->rc_channel;
409
410	d->sec_level = rfcomm_pi(sk)->sec_level;
411	d->role_switch = rfcomm_pi(sk)->role_switch;
412
413	err = rfcomm_dlc_open(d, &rfcomm_pi(sk)->src, &sa->rc_bdaddr,
414			      sa->rc_channel);
415	if (!err)
416		err = bt_sock_wait_state(sk, BT_CONNECTED,
417				sock_sndtimeo(sk, flags & O_NONBLOCK));
418
419done:
420	release_sock(sk);
421	return err;
422}
423
424static int rfcomm_sock_listen(struct socket *sock, int backlog)
425{
426	struct sock *sk = sock->sk;
427	int err = 0;
428
429	BT_DBG("sk %p backlog %d", sk, backlog);
430
431	lock_sock(sk);
432
433	if (sk->sk_state != BT_BOUND) {
434		err = -EBADFD;
435		goto done;
436	}
437
438	if (sk->sk_type != SOCK_STREAM) {
439		err = -EINVAL;
440		goto done;
441	}
442
443	if (!rfcomm_pi(sk)->channel) {
444		bdaddr_t *src = &rfcomm_pi(sk)->src;
445		u8 channel;
446
447		err = -EINVAL;
448
449		write_lock(&rfcomm_sk_list.lock);
450
451		for (channel = 1; channel < 31; channel++)
452			if (!__rfcomm_get_listen_sock_by_addr(channel, src)) {
453				rfcomm_pi(sk)->channel = channel;
454				err = 0;
455				break;
456			}
457
458		write_unlock(&rfcomm_sk_list.lock);
459
460		if (err < 0)
461			goto done;
462	}
463
464	sk->sk_max_ack_backlog = backlog;
465	sk->sk_ack_backlog = 0;
466	sk->sk_state = BT_LISTEN;
467
468done:
469	release_sock(sk);
470	return err;
471}
472
473static int rfcomm_sock_accept(struct socket *sock, struct socket *newsock, int flags)
474{
475	DEFINE_WAIT_FUNC(wait, woken_wake_function);
476	struct sock *sk = sock->sk, *nsk;
477	long timeo;
478	int err = 0;
479
480	lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
481
482	if (sk->sk_type != SOCK_STREAM) {
483		err = -EINVAL;
484		goto done;
485	}
486
487	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
488
489	BT_DBG("sk %p timeo %ld", sk, timeo);
490
491	/* Wait for an incoming connection. (wake-one). */
492	add_wait_queue_exclusive(sk_sleep(sk), &wait);
493	while (1) {
494		if (sk->sk_state != BT_LISTEN) {
495			err = -EBADFD;
496			break;
497		}
498
499		nsk = bt_accept_dequeue(sk, newsock);
500		if (nsk)
501			break;
502
503		if (!timeo) {
504			err = -EAGAIN;
505			break;
506		}
507
508		if (signal_pending(current)) {
509			err = sock_intr_errno(timeo);
510			break;
511		}
512
513		release_sock(sk);
514
515		timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
516
517		lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
518	}
519	remove_wait_queue(sk_sleep(sk), &wait);
520
521	if (err)
522		goto done;
523
524	newsock->state = SS_CONNECTED;
525
526	BT_DBG("new socket %p", nsk);
527
528done:
529	release_sock(sk);
530	return err;
531}
532
533static int rfcomm_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
534{
535	struct sockaddr_rc *sa = (struct sockaddr_rc *) addr;
536	struct sock *sk = sock->sk;
537
538	BT_DBG("sock %p, sk %p", sock, sk);
539
540	if (peer && sk->sk_state != BT_CONNECTED &&
541	    sk->sk_state != BT_CONNECT && sk->sk_state != BT_CONNECT2)
542		return -ENOTCONN;
543
544	memset(sa, 0, sizeof(*sa));
545	sa->rc_family  = AF_BLUETOOTH;
546	sa->rc_channel = rfcomm_pi(sk)->channel;
547	if (peer)
548		bacpy(&sa->rc_bdaddr, &rfcomm_pi(sk)->dst);
549	else
550		bacpy(&sa->rc_bdaddr, &rfcomm_pi(sk)->src);
551
552	*len = sizeof(struct sockaddr_rc);
553	return 0;
554}
555
556static int rfcomm_sock_sendmsg(struct socket *sock, struct msghdr *msg,
557			       size_t len)
558{
559	struct sock *sk = sock->sk;
560	struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
561	struct sk_buff *skb;
562	int sent;
563
564	if (test_bit(RFCOMM_DEFER_SETUP, &d->flags))
565		return -ENOTCONN;
566
567	if (msg->msg_flags & MSG_OOB)
568		return -EOPNOTSUPP;
569
570	if (sk->sk_shutdown & SEND_SHUTDOWN)
571		return -EPIPE;
572
573	BT_DBG("sock %p, sk %p", sock, sk);
574
575	lock_sock(sk);
576
577	sent = bt_sock_wait_ready(sk, msg->msg_flags);
578	if (sent)
579		goto done;
580
581	while (len) {
582		size_t size = min_t(size_t, len, d->mtu);
583		int err;
584
585		skb = sock_alloc_send_skb(sk, size + RFCOMM_SKB_RESERVE,
586				msg->msg_flags & MSG_DONTWAIT, &err);
587		if (!skb) {
588			if (sent == 0)
589				sent = err;
590			break;
591		}
592		skb_reserve(skb, RFCOMM_SKB_HEAD_RESERVE);
593
594		err = memcpy_from_msg(skb_put(skb, size), msg, size);
595		if (err) {
596			kfree_skb(skb);
597			if (sent == 0)
598				sent = err;
599			break;
600		}
601
602		skb->priority = sk->sk_priority;
603
604		err = rfcomm_dlc_send(d, skb);
605		if (err < 0) {
606			kfree_skb(skb);
607			if (sent == 0)
608				sent = err;
609			break;
610		}
611
612		sent += size;
613		len  -= size;
614	}
615
616done:
617	release_sock(sk);
618
619	return sent;
620}
621
622static int rfcomm_sock_recvmsg(struct socket *sock, struct msghdr *msg,
623			       size_t size, int flags)
624{
625	struct sock *sk = sock->sk;
626	struct rfcomm_dlc *d = rfcomm_pi(sk)->dlc;
627	int len;
628
629	if (test_and_clear_bit(RFCOMM_DEFER_SETUP, &d->flags)) {
630		rfcomm_dlc_accept(d);
631		return 0;
632	}
633
634	len = bt_sock_stream_recvmsg(sock, msg, size, flags);
635
636	lock_sock(sk);
637	if (!(flags & MSG_PEEK) && len > 0)
638		atomic_sub(len, &sk->sk_rmem_alloc);
639
640	if (atomic_read(&sk->sk_rmem_alloc) <= (sk->sk_rcvbuf >> 2))
641		rfcomm_dlc_unthrottle(rfcomm_pi(sk)->dlc);
642	release_sock(sk);
643
644	return len;
645}
646
647static int rfcomm_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
648{
649	struct sock *sk = sock->sk;
650	int err = 0;
651	u32 opt;
652
653	BT_DBG("sk %p", sk);
654
655	lock_sock(sk);
656
657	switch (optname) {
658	case RFCOMM_LM:
659		if (get_user(opt, (u32 __user *) optval)) {
660			err = -EFAULT;
661			break;
662		}
663
664		if (opt & RFCOMM_LM_FIPS) {
665			err = -EINVAL;
666			break;
667		}
668
669		if (opt & RFCOMM_LM_AUTH)
670			rfcomm_pi(sk)->sec_level = BT_SECURITY_LOW;
671		if (opt & RFCOMM_LM_ENCRYPT)
672			rfcomm_pi(sk)->sec_level = BT_SECURITY_MEDIUM;
673		if (opt & RFCOMM_LM_SECURE)
674			rfcomm_pi(sk)->sec_level = BT_SECURITY_HIGH;
675
676		rfcomm_pi(sk)->role_switch = (opt & RFCOMM_LM_MASTER);
677		break;
678
679	default:
680		err = -ENOPROTOOPT;
681		break;
682	}
683
684	release_sock(sk);
685	return err;
686}
687
688static int rfcomm_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
689{
690	struct sock *sk = sock->sk;
691	struct bt_security sec;
692	int err = 0;
693	size_t len;
694	u32 opt;
695
696	BT_DBG("sk %p", sk);
697
698	if (level == SOL_RFCOMM)
699		return rfcomm_sock_setsockopt_old(sock, optname, optval, optlen);
700
701	if (level != SOL_BLUETOOTH)
702		return -ENOPROTOOPT;
703
704	lock_sock(sk);
705
706	switch (optname) {
707	case BT_SECURITY:
708		if (sk->sk_type != SOCK_STREAM) {
709			err = -EINVAL;
710			break;
711		}
712
713		sec.level = BT_SECURITY_LOW;
714
715		len = min_t(unsigned int, sizeof(sec), optlen);
716		if (copy_from_user((char *) &sec, optval, len)) {
717			err = -EFAULT;
718			break;
719		}
720
721		if (sec.level > BT_SECURITY_HIGH) {
722			err = -EINVAL;
723			break;
724		}
725
726		rfcomm_pi(sk)->sec_level = sec.level;
727		break;
728
729	case BT_DEFER_SETUP:
730		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
731			err = -EINVAL;
732			break;
733		}
734
735		if (get_user(opt, (u32 __user *) optval)) {
736			err = -EFAULT;
737			break;
738		}
739
740		if (opt)
741			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
742		else
743			clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
744
745		break;
746
747	default:
748		err = -ENOPROTOOPT;
749		break;
750	}
751
752	release_sock(sk);
753	return err;
754}
755
756static int rfcomm_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
757{
758	struct sock *sk = sock->sk;
759	struct sock *l2cap_sk;
760	struct l2cap_conn *conn;
761	struct rfcomm_conninfo cinfo;
762	int len, err = 0;
763	u32 opt;
764
765	BT_DBG("sk %p", sk);
766
767	if (get_user(len, optlen))
768		return -EFAULT;
769
770	lock_sock(sk);
771
772	switch (optname) {
773	case RFCOMM_LM:
774		switch (rfcomm_pi(sk)->sec_level) {
775		case BT_SECURITY_LOW:
776			opt = RFCOMM_LM_AUTH;
777			break;
778		case BT_SECURITY_MEDIUM:
779			opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT;
780			break;
781		case BT_SECURITY_HIGH:
782			opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT |
783			      RFCOMM_LM_SECURE;
784			break;
785		case BT_SECURITY_FIPS:
786			opt = RFCOMM_LM_AUTH | RFCOMM_LM_ENCRYPT |
787			      RFCOMM_LM_SECURE | RFCOMM_LM_FIPS;
788			break;
789		default:
790			opt = 0;
791			break;
792		}
793
794		if (rfcomm_pi(sk)->role_switch)
795			opt |= RFCOMM_LM_MASTER;
796
797		if (put_user(opt, (u32 __user *) optval))
798			err = -EFAULT;
799
800		break;
801
802	case RFCOMM_CONNINFO:
803		if (sk->sk_state != BT_CONNECTED &&
804					!rfcomm_pi(sk)->dlc->defer_setup) {
805			err = -ENOTCONN;
806			break;
807		}
808
809		l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk;
810		conn = l2cap_pi(l2cap_sk)->chan->conn;
811
812		memset(&cinfo, 0, sizeof(cinfo));
813		cinfo.hci_handle = conn->hcon->handle;
814		memcpy(cinfo.dev_class, conn->hcon->dev_class, 3);
815
816		len = min_t(unsigned int, len, sizeof(cinfo));
817		if (copy_to_user(optval, (char *) &cinfo, len))
818			err = -EFAULT;
819
820		break;
821
822	default:
823		err = -ENOPROTOOPT;
824		break;
825	}
826
827	release_sock(sk);
828	return err;
829}
830
831static int rfcomm_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
832{
833	struct sock *sk = sock->sk;
834	struct bt_security sec;
835	int len, err = 0;
836
837	BT_DBG("sk %p", sk);
838
839	if (level == SOL_RFCOMM)
840		return rfcomm_sock_getsockopt_old(sock, optname, optval, optlen);
841
842	if (level != SOL_BLUETOOTH)
843		return -ENOPROTOOPT;
844
845	if (get_user(len, optlen))
846		return -EFAULT;
847
848	lock_sock(sk);
849
850	switch (optname) {
851	case BT_SECURITY:
852		if (sk->sk_type != SOCK_STREAM) {
853			err = -EINVAL;
854			break;
855		}
856
857		sec.level = rfcomm_pi(sk)->sec_level;
858		sec.key_size = 0;
859
860		len = min_t(unsigned int, len, sizeof(sec));
861		if (copy_to_user(optval, (char *) &sec, len))
862			err = -EFAULT;
863
864		break;
865
866	case BT_DEFER_SETUP:
867		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
868			err = -EINVAL;
869			break;
870		}
871
872		if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
873			     (u32 __user *) optval))
874			err = -EFAULT;
875
876		break;
877
878	default:
879		err = -ENOPROTOOPT;
880		break;
881	}
882
883	release_sock(sk);
884	return err;
885}
886
887static int rfcomm_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
888{
889	struct sock *sk __maybe_unused = sock->sk;
890	int err;
891
892	BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
893
894	err = bt_sock_ioctl(sock, cmd, arg);
895
896	if (err == -ENOIOCTLCMD) {
897#ifdef CONFIG_BT_RFCOMM_TTY
898		lock_sock(sk);
899		err = rfcomm_dev_ioctl(sk, cmd, (void __user *) arg);
900		release_sock(sk);
901#else
902		err = -EOPNOTSUPP;
903#endif
904	}
905
906	return err;
907}
908
909static int rfcomm_sock_shutdown(struct socket *sock, int how)
910{
911	struct sock *sk = sock->sk;
912	int err = 0;
913
914	BT_DBG("sock %p, sk %p", sock, sk);
915
916	if (!sk)
917		return 0;
918
919	lock_sock(sk);
920	if (!sk->sk_shutdown) {
921		sk->sk_shutdown = SHUTDOWN_MASK;
922		__rfcomm_sock_close(sk);
923
924		if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
925		    !(current->flags & PF_EXITING))
926			err = bt_sock_wait_state(sk, BT_CLOSED, sk->sk_lingertime);
927	}
928	release_sock(sk);
929	return err;
930}
931
932static int rfcomm_sock_release(struct socket *sock)
933{
934	struct sock *sk = sock->sk;
935	int err;
936
937	BT_DBG("sock %p, sk %p", sock, sk);
938
939	if (!sk)
940		return 0;
941
942	err = rfcomm_sock_shutdown(sock, 2);
943
944	sock_orphan(sk);
945	rfcomm_sock_kill(sk);
946	return err;
947}
948
949/* ---- RFCOMM core layer callbacks ----
950 *
951 * called under rfcomm_lock()
952 */
953int rfcomm_connect_ind(struct rfcomm_session *s, u8 channel, struct rfcomm_dlc **d)
954{
955	struct sock *sk, *parent;
956	bdaddr_t src, dst;
957	int result = 0;
958
959	BT_DBG("session %p channel %d", s, channel);
960
961	rfcomm_session_getaddr(s, &src, &dst);
962
963	/* Check if we have socket listening on channel */
964	parent = rfcomm_get_sock_by_channel(BT_LISTEN, channel, &src);
965	if (!parent)
966		return 0;
967
968	bh_lock_sock(parent);
969
970	/* Check for backlog size */
971	if (sk_acceptq_is_full(parent)) {
972		BT_DBG("backlog full %d", parent->sk_ack_backlog);
973		goto done;
974	}
975
976	sk = rfcomm_sock_alloc(sock_net(parent), NULL, BTPROTO_RFCOMM, GFP_ATOMIC, 0);
977	if (!sk)
978		goto done;
979
980	bt_sock_reclassify_lock(sk, BTPROTO_RFCOMM);
981
982	rfcomm_sock_init(sk, parent);
983	bacpy(&rfcomm_pi(sk)->src, &src);
984	bacpy(&rfcomm_pi(sk)->dst, &dst);
985	rfcomm_pi(sk)->channel = channel;
986
987	sk->sk_state = BT_CONFIG;
988	bt_accept_enqueue(parent, sk);
989
990	/* Accept connection and return socket DLC */
991	*d = rfcomm_pi(sk)->dlc;
992	result = 1;
993
994done:
995	bh_unlock_sock(parent);
996
997	if (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags))
998		parent->sk_state_change(parent);
999
1000	return result;
1001}
1002
1003static int rfcomm_sock_debugfs_show(struct seq_file *f, void *p)
1004{
1005	struct sock *sk;
1006
1007	read_lock(&rfcomm_sk_list.lock);
1008
1009	sk_for_each(sk, &rfcomm_sk_list.head) {
1010		seq_printf(f, "%pMR %pMR %d %d\n",
1011			   &rfcomm_pi(sk)->src, &rfcomm_pi(sk)->dst,
1012			   sk->sk_state, rfcomm_pi(sk)->channel);
1013	}
1014
1015	read_unlock(&rfcomm_sk_list.lock);
1016
1017	return 0;
1018}
1019
1020static int rfcomm_sock_debugfs_open(struct inode *inode, struct file *file)
1021{
1022	return single_open(file, rfcomm_sock_debugfs_show, inode->i_private);
1023}
1024
1025static const struct file_operations rfcomm_sock_debugfs_fops = {
1026	.open		= rfcomm_sock_debugfs_open,
1027	.read		= seq_read,
1028	.llseek		= seq_lseek,
1029	.release	= single_release,
1030};
1031
1032static struct dentry *rfcomm_sock_debugfs;
1033
1034static const struct proto_ops rfcomm_sock_ops = {
1035	.family		= PF_BLUETOOTH,
1036	.owner		= THIS_MODULE,
1037	.release	= rfcomm_sock_release,
1038	.bind		= rfcomm_sock_bind,
1039	.connect	= rfcomm_sock_connect,
1040	.listen		= rfcomm_sock_listen,
1041	.accept		= rfcomm_sock_accept,
1042	.getname	= rfcomm_sock_getname,
1043	.sendmsg	= rfcomm_sock_sendmsg,
1044	.recvmsg	= rfcomm_sock_recvmsg,
1045	.shutdown	= rfcomm_sock_shutdown,
1046	.setsockopt	= rfcomm_sock_setsockopt,
1047	.getsockopt	= rfcomm_sock_getsockopt,
1048	.ioctl		= rfcomm_sock_ioctl,
1049	.poll		= bt_sock_poll,
1050	.socketpair	= sock_no_socketpair,
1051	.mmap		= sock_no_mmap
1052};
1053
1054static const struct net_proto_family rfcomm_sock_family_ops = {
1055	.family		= PF_BLUETOOTH,
1056	.owner		= THIS_MODULE,
1057	.create		= rfcomm_sock_create
1058};
1059
1060int __init rfcomm_init_sockets(void)
1061{
1062	int err;
1063
1064	BUILD_BUG_ON(sizeof(struct sockaddr_rc) > sizeof(struct sockaddr));
1065
1066	err = proto_register(&rfcomm_proto, 0);
1067	if (err < 0)
1068		return err;
1069
1070	err = bt_sock_register(BTPROTO_RFCOMM, &rfcomm_sock_family_ops);
1071	if (err < 0) {
1072		BT_ERR("RFCOMM socket layer registration failed");
1073		goto error;
1074	}
1075
1076	err = bt_procfs_init(&init_net, "rfcomm", &rfcomm_sk_list, NULL);
1077	if (err < 0) {
1078		BT_ERR("Failed to create RFCOMM proc file");
1079		bt_sock_unregister(BTPROTO_RFCOMM);
1080		goto error;
1081	}
1082
1083	BT_INFO("RFCOMM socket layer initialized");
1084
1085	if (IS_ERR_OR_NULL(bt_debugfs))
1086		return 0;
1087
1088	rfcomm_sock_debugfs = debugfs_create_file("rfcomm", 0444,
1089						  bt_debugfs, NULL,
1090						  &rfcomm_sock_debugfs_fops);
1091
1092	return 0;
1093
1094error:
1095	proto_unregister(&rfcomm_proto);
1096	return err;
1097}
1098
1099void __exit rfcomm_cleanup_sockets(void)
1100{
1101	bt_procfs_cleanup(&init_net, "rfcomm");
1102
1103	debugfs_remove(rfcomm_sock_debugfs);
1104
1105	bt_sock_unregister(BTPROTO_RFCOMM);
1106
1107	proto_unregister(&rfcomm_proto);
1108}
1109