Bluetooth: Factor out common L2CAP connection code
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / bluetooth / l2cap_sock.c
CommitLineData
bb58f747
GP
1/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4 Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
5 Copyright (C) 2010 Google Inc.
590051de 6 Copyright (C) 2011 ProFUSION Embedded Systems
bb58f747
GP
7
8 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License version 2 as
12 published by the Free Software Foundation;
13
14 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
17 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
18 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
19 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
20 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
21 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22
23 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
24 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
25 SOFTWARE IS DISCLAIMED.
26*/
27
28/* Bluetooth L2CAP sockets. */
29
bc3b2d7f 30#include <linux/export.h>
6230c9b4 31
bb58f747 32#include <net/bluetooth/bluetooth.h>
33575df7 33#include <net/bluetooth/hci_core.h>
bb58f747 34#include <net/bluetooth/l2cap.h>
f1cb9af5 35#include <net/bluetooth/smp.h>
bb58f747 36
5b28d95c
MY
37static struct bt_sock_list l2cap_sk_list = {
38 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
39};
40
cf2f90f5 41static const struct proto_ops l2cap_sock_ops;
80808e43
GP
42static void l2cap_sock_init(struct sock *sk, struct sock *parent);
43static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio);
cf2f90f5 44
af6bcd82
GP
45static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
46{
47 struct sock *sk = sock->sk;
4343478f 48 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
af6bcd82
GP
49 struct sockaddr_l2 la;
50 int len, err = 0;
51
52 BT_DBG("sk %p", sk);
53
54 if (!addr || addr->sa_family != AF_BLUETOOTH)
55 return -EINVAL;
56
57 memset(&la, 0, sizeof(la));
58 len = min_t(unsigned int, sizeof(la), alen);
59 memcpy(&la, addr, len);
60
b62f328b 61 if (la.l2_cid && la.l2_psm)
af6bcd82
GP
62 return -EINVAL;
63
64 lock_sock(sk);
65
66 if (sk->sk_state != BT_OPEN) {
67 err = -EBADFD;
68 goto done;
69 }
70
71 if (la.l2_psm) {
72 __u16 psm = __le16_to_cpu(la.l2_psm);
73
74 /* PSM must be odd and lsb of upper byte must be 0 */
75 if ((psm & 0x0101) != 0x0001) {
76 err = -EINVAL;
77 goto done;
78 }
79
80 /* Restrict usage of well-known PSMs */
81 if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE)) {
82 err = -EACCES;
83 goto done;
84 }
85 }
86
9e4425ff 87 if (la.l2_cid)
6e4aff10 88 err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
9e4425ff
GP
89 else
90 err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
af6bcd82 91
9e4425ff
GP
92 if (err < 0)
93 goto done;
af6bcd82 94
2983fd68
AE
95 if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
96 __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
9e4425ff 97 chan->sec_level = BT_SECURITY_SDP;
b62f328b 98
9e4425ff 99 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
89bc500e
GP
100
101 chan->state = BT_BOUND;
9e4425ff 102 sk->sk_state = BT_BOUND;
af6bcd82
GP
103
104done:
105 release_sock(sk);
106 return err;
107}
108
4e34c50b
GP
109static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
110{
111 struct sock *sk = sock->sk;
0c1bc5c6 112 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
4e34c50b
GP
113 struct sockaddr_l2 la;
114 int len, err = 0;
115
116 BT_DBG("sk %p", sk);
117
118 if (!addr || alen < sizeof(addr->sa_family) ||
119 addr->sa_family != AF_BLUETOOTH)
120 return -EINVAL;
121
122 memset(&la, 0, sizeof(la));
123 len = min_t(unsigned int, sizeof(la), alen);
124 memcpy(&la, addr, len);
125
acd7d370 126 if (la.l2_cid && la.l2_psm)
4e34c50b
GP
127 return -EINVAL;
128
6e4aff10 129 err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
8e9f9892 130 &la.l2_bdaddr, la.l2_bdaddr_type);
4e34c50b 131 if (err)
b3fb611e 132 return err;
4e34c50b 133
6be36555
AE
134 lock_sock(sk);
135
4e34c50b
GP
136 err = bt_sock_wait_state(sk, BT_CONNECTED,
137 sock_sndtimeo(sk, flags & O_NONBLOCK));
b3fb611e
AE
138
139 release_sock(sk);
140
4e34c50b
GP
141 return err;
142}
143
af6bcd82
GP
144static int l2cap_sock_listen(struct socket *sock, int backlog)
145{
146 struct sock *sk = sock->sk;
0c1bc5c6 147 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
af6bcd82
GP
148 int err = 0;
149
150 BT_DBG("sk %p backlog %d", sk, backlog);
151
152 lock_sock(sk);
153
6b3af733 154 if (sk->sk_state != BT_BOUND) {
af6bcd82
GP
155 err = -EBADFD;
156 goto done;
157 }
158
6b3af733
MH
159 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
160 err = -EINVAL;
161 goto done;
162 }
163
0c1bc5c6 164 switch (chan->mode) {
af6bcd82
GP
165 case L2CAP_MODE_BASIC:
166 break;
167 case L2CAP_MODE_ERTM:
168 case L2CAP_MODE_STREAMING:
169 if (!disable_ertm)
170 break;
171 /* fall through */
172 default:
173 err = -ENOTSUPP;
174 goto done;
175 }
176
af6bcd82
GP
177 sk->sk_max_ack_backlog = backlog;
178 sk->sk_ack_backlog = 0;
89bc500e
GP
179
180 chan->state = BT_LISTEN;
af6bcd82
GP
181 sk->sk_state = BT_LISTEN;
182
183done:
184 release_sock(sk);
185 return err;
186}
187
c47b7c72
GP
188static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
189{
190 DECLARE_WAITQUEUE(wait, current);
191 struct sock *sk = sock->sk, *nsk;
192 long timeo;
193 int err = 0;
194
195 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
196
c47b7c72
GP
197 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
198
199 BT_DBG("sk %p timeo %ld", sk, timeo);
200
201 /* Wait for an incoming connection. (wake-one). */
202 add_wait_queue_exclusive(sk_sleep(sk), &wait);
f9a3c20a 203 while (1) {
c47b7c72 204 set_current_state(TASK_INTERRUPTIBLE);
f9a3c20a
PH
205
206 if (sk->sk_state != BT_LISTEN) {
207 err = -EBADFD;
c47b7c72
GP
208 break;
209 }
210
f9a3c20a
PH
211 nsk = bt_accept_dequeue(sk, newsock);
212 if (nsk)
213 break;
c47b7c72 214
f9a3c20a
PH
215 if (!timeo) {
216 err = -EAGAIN;
c47b7c72
GP
217 break;
218 }
219
220 if (signal_pending(current)) {
221 err = sock_intr_errno(timeo);
222 break;
223 }
f9a3c20a
PH
224
225 release_sock(sk);
226 timeo = schedule_timeout(timeo);
227 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
c47b7c72 228 }
f9a3c20a 229 __set_current_state(TASK_RUNNING);
c47b7c72
GP
230 remove_wait_queue(sk_sleep(sk), &wait);
231
232 if (err)
233 goto done;
234
235 newsock->state = SS_CONNECTED;
236
237 BT_DBG("new socket %p", nsk);
238
239done:
240 release_sock(sk);
241 return err;
242}
243
d7175d55
GP
244static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
245{
246 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
247 struct sock *sk = sock->sk;
0c1bc5c6 248 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
d7175d55
GP
249
250 BT_DBG("sock %p, sk %p", sock, sk);
251
252 addr->sa_family = AF_BLUETOOTH;
253 *len = sizeof(struct sockaddr_l2);
254
255 if (peer) {
fe4128e0 256 la->l2_psm = chan->psm;
d7175d55 257 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
fe4128e0 258 la->l2_cid = cpu_to_le16(chan->dcid);
d7175d55 259 } else {
0c1bc5c6 260 la->l2_psm = chan->sport;
d7175d55 261 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
fe4128e0 262 la->l2_cid = cpu_to_le16(chan->scid);
d7175d55
GP
263 }
264
265 return 0;
266}
267
99f4808d
GP
268static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
269{
270 struct sock *sk = sock->sk;
4343478f 271 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
99f4808d
GP
272 struct l2cap_options opts;
273 struct l2cap_conninfo cinfo;
274 int len, err = 0;
275 u32 opt;
276
277 BT_DBG("sk %p", sk);
278
279 if (get_user(len, optlen))
280 return -EFAULT;
281
282 lock_sock(sk);
283
284 switch (optname) {
285 case L2CAP_OPTIONS:
e3fb592b 286 memset(&opts, 0, sizeof(opts));
0c1bc5c6
GP
287 opts.imtu = chan->imtu;
288 opts.omtu = chan->omtu;
289 opts.flush_to = chan->flush_to;
290 opts.mode = chan->mode;
47d1ec61
GP
291 opts.fcs = chan->fcs;
292 opts.max_tx = chan->max_tx;
6327eb98 293 opts.txwin_size = chan->tx_win;
99f4808d
GP
294
295 len = min_t(unsigned int, len, sizeof(opts));
296 if (copy_to_user(optval, (char *) &opts, len))
297 err = -EFAULT;
298
299 break;
300
301 case L2CAP_LM:
4343478f 302 switch (chan->sec_level) {
99f4808d
GP
303 case BT_SECURITY_LOW:
304 opt = L2CAP_LM_AUTH;
305 break;
306 case BT_SECURITY_MEDIUM:
307 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
308 break;
309 case BT_SECURITY_HIGH:
310 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
311 L2CAP_LM_SECURE;
312 break;
313 default:
314 opt = 0;
315 break;
316 }
317
43bd0f32 318 if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
99f4808d
GP
319 opt |= L2CAP_LM_MASTER;
320
ecf61bdb 321 if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
99f4808d
GP
322 opt |= L2CAP_LM_RELIABLE;
323
324 if (put_user(opt, (u32 __user *) optval))
325 err = -EFAULT;
326 break;
327
328 case L2CAP_CONNINFO:
329 if (sk->sk_state != BT_CONNECTED &&
c5daa683
GP
330 !(sk->sk_state == BT_CONNECT2 &&
331 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
99f4808d
GP
332 err = -ENOTCONN;
333 break;
334 }
335
8d03e971 336 memset(&cinfo, 0, sizeof(cinfo));
8c1d787b
GP
337 cinfo.hci_handle = chan->conn->hcon->handle;
338 memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
99f4808d
GP
339
340 len = min_t(unsigned int, len, sizeof(cinfo));
341 if (copy_to_user(optval, (char *) &cinfo, len))
342 err = -EFAULT;
343
344 break;
345
346 default:
347 err = -ENOPROTOOPT;
348 break;
349 }
350
351 release_sock(sk);
352 return err;
353}
354
355static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
356{
357 struct sock *sk = sock->sk;
4343478f 358 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
99f4808d 359 struct bt_security sec;
14b12d0b 360 struct bt_power pwr;
99f4808d
GP
361 int len, err = 0;
362
363 BT_DBG("sk %p", sk);
364
365 if (level == SOL_L2CAP)
366 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
367
368 if (level != SOL_BLUETOOTH)
369 return -ENOPROTOOPT;
370
371 if (get_user(len, optlen))
372 return -EFAULT;
373
374 lock_sock(sk);
375
376 switch (optname) {
377 case BT_SECURITY:
715ec005
GP
378 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
379 chan->chan_type != L2CAP_CHAN_RAW) {
99f4808d
GP
380 err = -EINVAL;
381 break;
382 }
383
8f360119 384 memset(&sec, 0, sizeof(sec));
85e34368 385 if (chan->conn) {
c6585a4d 386 sec.level = chan->conn->hcon->sec_level;
99f4808d 387
85e34368
AE
388 if (sk->sk_state == BT_CONNECTED)
389 sec.key_size = chan->conn->hcon->enc_key_size;
390 } else {
391 sec.level = chan->sec_level;
392 }
8f360119 393
99f4808d
GP
394 len = min_t(unsigned int, len, sizeof(sec));
395 if (copy_to_user(optval, (char *) &sec, len))
396 err = -EFAULT;
397
398 break;
399
400 case BT_DEFER_SETUP:
401 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
402 err = -EINVAL;
403 break;
404 }
405
c5daa683
GP
406 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
407 (u32 __user *) optval))
99f4808d
GP
408 err = -EFAULT;
409
410 break;
411
412 case BT_FLUSHABLE:
d57b0e8b
AE
413 if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
414 (u32 __user *) optval))
99f4808d
GP
415 err = -EFAULT;
416
417 break;
418
14b12d0b
JG
419 case BT_POWER:
420 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
421 && sk->sk_type != SOCK_RAW) {
422 err = -EINVAL;
423 break;
424 }
425
15770b1a 426 pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
14b12d0b
JG
427
428 len = min_t(unsigned int, len, sizeof(pwr));
429 if (copy_to_user(optval, (char *) &pwr, len))
430 err = -EFAULT;
431
432 break;
433
2ea66482
MM
434 case BT_CHANNEL_POLICY:
435 if (!enable_hs) {
436 err = -ENOPROTOOPT;
437 break;
438 }
439
440 if (put_user(chan->chan_policy, (u32 __user *) optval))
441 err = -EFAULT;
442 break;
443
99f4808d
GP
444 default:
445 err = -ENOPROTOOPT;
446 break;
447 }
448
449 release_sock(sk);
450 return err;
451}
452
682877c3
AG
453static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
454{
455 switch (chan->scid) {
456 case L2CAP_CID_LE_DATA:
8c3a4f00 457 if (mtu < L2CAP_LE_MIN_MTU)
682877c3
AG
458 return false;
459 break;
460
461 default:
462 if (mtu < L2CAP_DEFAULT_MIN_MTU)
463 return false;
464 }
465
466 return true;
467}
468
33575df7
GP
469static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
470{
471 struct sock *sk = sock->sk;
b4450035 472 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
33575df7
GP
473 struct l2cap_options opts;
474 int len, err = 0;
475 u32 opt;
476
477 BT_DBG("sk %p", sk);
478
479 lock_sock(sk);
480
481 switch (optname) {
482 case L2CAP_OPTIONS:
483 if (sk->sk_state == BT_CONNECTED) {
484 err = -EINVAL;
485 break;
486 }
487
0c1bc5c6
GP
488 opts.imtu = chan->imtu;
489 opts.omtu = chan->omtu;
490 opts.flush_to = chan->flush_to;
491 opts.mode = chan->mode;
47d1ec61
GP
492 opts.fcs = chan->fcs;
493 opts.max_tx = chan->max_tx;
6327eb98 494 opts.txwin_size = chan->tx_win;
33575df7
GP
495
496 len = min_t(unsigned int, sizeof(opts), optlen);
497 if (copy_from_user((char *) &opts, optval, len)) {
498 err = -EFAULT;
499 break;
500 }
501
6327eb98 502 if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
33575df7
GP
503 err = -EINVAL;
504 break;
505 }
506
682877c3
AG
507 if (!l2cap_valid_mtu(chan, opts.imtu)) {
508 err = -EINVAL;
509 break;
510 }
511
0c1bc5c6
GP
512 chan->mode = opts.mode;
513 switch (chan->mode) {
33575df7 514 case L2CAP_MODE_BASIC:
c1360a1c 515 clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
33575df7
GP
516 break;
517 case L2CAP_MODE_ERTM:
518 case L2CAP_MODE_STREAMING:
519 if (!disable_ertm)
520 break;
521 /* fall through */
522 default:
523 err = -EINVAL;
524 break;
525 }
526
0c1bc5c6
GP
527 chan->imtu = opts.imtu;
528 chan->omtu = opts.omtu;
47d1ec61
GP
529 chan->fcs = opts.fcs;
530 chan->max_tx = opts.max_tx;
6327eb98 531 chan->tx_win = opts.txwin_size;
12d59781 532 chan->flush_to = opts.flush_to;
33575df7
GP
533 break;
534
535 case L2CAP_LM:
536 if (get_user(opt, (u32 __user *) optval)) {
537 err = -EFAULT;
538 break;
539 }
540
541 if (opt & L2CAP_LM_AUTH)
4343478f 542 chan->sec_level = BT_SECURITY_LOW;
33575df7 543 if (opt & L2CAP_LM_ENCRYPT)
4343478f 544 chan->sec_level = BT_SECURITY_MEDIUM;
33575df7 545 if (opt & L2CAP_LM_SECURE)
4343478f 546 chan->sec_level = BT_SECURITY_HIGH;
33575df7 547
43bd0f32
AE
548 if (opt & L2CAP_LM_MASTER)
549 set_bit(FLAG_ROLE_SWITCH, &chan->flags);
550 else
551 clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
ecf61bdb
AE
552
553 if (opt & L2CAP_LM_RELIABLE)
554 set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
555 else
556 clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
33575df7
GP
557 break;
558
559 default:
560 err = -ENOPROTOOPT;
561 break;
562 }
563
564 release_sock(sk);
565 return err;
566}
567
568static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
569{
570 struct sock *sk = sock->sk;
4343478f 571 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
33575df7 572 struct bt_security sec;
14b12d0b 573 struct bt_power pwr;
f1cb9af5 574 struct l2cap_conn *conn;
33575df7
GP
575 int len, err = 0;
576 u32 opt;
577
578 BT_DBG("sk %p", sk);
579
580 if (level == SOL_L2CAP)
581 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
582
583 if (level != SOL_BLUETOOTH)
584 return -ENOPROTOOPT;
585
586 lock_sock(sk);
587
588 switch (optname) {
589 case BT_SECURITY:
715ec005
GP
590 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
591 chan->chan_type != L2CAP_CHAN_RAW) {
33575df7
GP
592 err = -EINVAL;
593 break;
594 }
595
596 sec.level = BT_SECURITY_LOW;
597
598 len = min_t(unsigned int, sizeof(sec), optlen);
599 if (copy_from_user((char *) &sec, optval, len)) {
600 err = -EFAULT;
601 break;
602 }
603
604 if (sec.level < BT_SECURITY_LOW ||
605 sec.level > BT_SECURITY_HIGH) {
606 err = -EINVAL;
607 break;
608 }
609
4343478f 610 chan->sec_level = sec.level;
f1cb9af5 611
0bee1d60
GP
612 if (!chan->conn)
613 break;
614
f1cb9af5 615 conn = chan->conn;
0bee1d60
GP
616
617 /*change security for LE channels */
618 if (chan->scid == L2CAP_CID_LE_DATA) {
f1cb9af5
VCG
619 if (!conn->hcon->out) {
620 err = -EINVAL;
621 break;
622 }
623
cc110922 624 if (smp_conn_security(conn->hcon, sec.level))
f1cb9af5 625 break;
f1cb9af5 626 sk->sk_state = BT_CONFIG;
3542b854 627 chan->state = BT_CONFIG;
0bee1d60 628
a7d7723a
GP
629 /* or for ACL link */
630 } else if ((sk->sk_state == BT_CONNECT2 &&
c5daa683 631 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
a7d7723a
GP
632 sk->sk_state == BT_CONNECTED) {
633 if (!l2cap_chan_check_security(chan))
c5daa683 634 set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
a7d7723a
GP
635 else
636 sk->sk_state_change(sk);
0bee1d60
GP
637 } else {
638 err = -EINVAL;
f1cb9af5 639 }
33575df7
GP
640 break;
641
642 case BT_DEFER_SETUP:
643 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
644 err = -EINVAL;
645 break;
646 }
647
648 if (get_user(opt, (u32 __user *) optval)) {
649 err = -EFAULT;
650 break;
651 }
652
c5daa683
GP
653 if (opt)
654 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
655 else
656 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
33575df7
GP
657 break;
658
659 case BT_FLUSHABLE:
660 if (get_user(opt, (u32 __user *) optval)) {
661 err = -EFAULT;
662 break;
663 }
664
665 if (opt > BT_FLUSHABLE_ON) {
666 err = -EINVAL;
667 break;
668 }
669
670 if (opt == BT_FLUSHABLE_OFF) {
8c1d787b 671 struct l2cap_conn *conn = chan->conn;
25985edc 672 /* proceed further only when we have l2cap_conn and
33575df7
GP
673 No Flush support in the LM */
674 if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
675 err = -EINVAL;
676 break;
677 }
678 }
679
d57b0e8b
AE
680 if (opt)
681 set_bit(FLAG_FLUSHABLE, &chan->flags);
682 else
683 clear_bit(FLAG_FLUSHABLE, &chan->flags);
33575df7
GP
684 break;
685
14b12d0b
JG
686 case BT_POWER:
687 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
688 chan->chan_type != L2CAP_CHAN_RAW) {
689 err = -EINVAL;
690 break;
691 }
692
693 pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;
694
695 len = min_t(unsigned int, sizeof(pwr), optlen);
696 if (copy_from_user((char *) &pwr, optval, len)) {
697 err = -EFAULT;
698 break;
699 }
15770b1a
AE
700
701 if (pwr.force_active)
702 set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
703 else
704 clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
14b12d0b
JG
705 break;
706
2ea66482
MM
707 case BT_CHANNEL_POLICY:
708 if (!enable_hs) {
709 err = -ENOPROTOOPT;
710 break;
711 }
712
713 if (get_user(opt, (u32 __user *) optval)) {
714 err = -EFAULT;
715 break;
716 }
717
718 if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
719 err = -EINVAL;
720 break;
721 }
722
723 if (chan->mode != L2CAP_MODE_ERTM &&
724 chan->mode != L2CAP_MODE_STREAMING) {
725 err = -EOPNOTSUPP;
726 break;
727 }
728
729 chan->chan_policy = (u8) opt;
14b12d0b
JG
730 break;
731
33575df7
GP
732 default:
733 err = -ENOPROTOOPT;
734 break;
735 }
736
737 release_sock(sk);
738 return err;
739}
fd83ccdb
GP
740
741static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
742{
743 struct sock *sk = sock->sk;
0c1bc5c6 744 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
fd83ccdb
GP
745 int err;
746
747 BT_DBG("sock %p, sk %p", sock, sk);
748
749 err = sock_error(sk);
750 if (err)
751 return err;
752
753 if (msg->msg_flags & MSG_OOB)
754 return -EOPNOTSUPP;
755
a6a5568c 756 if (sk->sk_state != BT_CONNECTED)
9a91a04a 757 return -ENOTCONN;
fd83ccdb 758
a6a5568c 759 l2cap_chan_lock(chan);
5e59b791 760 err = l2cap_chan_send(chan, msg, len, sk->sk_priority);
a6a5568c 761 l2cap_chan_unlock(chan);
fd83ccdb 762
fd83ccdb
GP
763 return err;
764}
33575df7 765
68983259
GP
766static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
767{
768 struct sock *sk = sock->sk;
e328140f
MM
769 struct l2cap_pinfo *pi = l2cap_pi(sk);
770 int err;
68983259
GP
771
772 lock_sock(sk);
773
c5daa683
GP
774 if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
775 &bt_sk(sk)->flags)) {
8c1d787b 776 sk->sk_state = BT_CONFIG;
3542b854 777 pi->chan->state = BT_CONFIG;
8c1d787b 778
e328140f 779 __l2cap_connect_rsp_defer(pi->chan);
68983259
GP
780 release_sock(sk);
781 return 0;
782 }
783
784 release_sock(sk);
785
786 if (sock->type == SOCK_STREAM)
e328140f
MM
787 err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
788 else
789 err = bt_sock_recvmsg(iocb, sock, msg, len, flags);
790
791 if (pi->chan->mode != L2CAP_MODE_ERTM)
792 return err;
793
794 /* Attempt to put pending rx data in the socket buffer */
795
796 lock_sock(sk);
797
798 if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
799 goto done;
800
801 if (pi->rx_busy_skb) {
802 if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
803 pi->rx_busy_skb = NULL;
804 else
805 goto done;
806 }
807
808 /* Restore data flow when half of the receive buffer is
809 * available. This avoids resending large numbers of
810 * frames.
811 */
812 if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
813 l2cap_chan_busy(pi->chan, 0);
68983259 814
e328140f
MM
815done:
816 release_sock(sk);
817 return err;
68983259
GP
818}
819
05fc1576
GP
820/* Kill socket (only if zapped and orphan)
821 * Must be called on unlocked socket.
822 */
ba3bd0ee 823static void l2cap_sock_kill(struct sock *sk)
05fc1576
GP
824{
825 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
826 return;
827
e05dcc32 828 BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
05fc1576
GP
829
830 /* Kill poor orphan */
6ff5abbf 831
4af66c69 832 l2cap_chan_put(l2cap_pi(sk)->chan);
05fc1576
GP
833 sock_set_flag(sk, SOCK_DEAD);
834 sock_put(sk);
835}
836
dcba0dba
GP
837static int l2cap_sock_shutdown(struct socket *sock, int how)
838{
839 struct sock *sk = sock->sk;
7ddb6e0f 840 struct l2cap_chan *chan;
3df91ea2 841 struct l2cap_conn *conn;
dcba0dba
GP
842 int err = 0;
843
844 BT_DBG("sock %p, sk %p", sock, sk);
845
846 if (!sk)
847 return 0;
848
7ddb6e0f 849 chan = l2cap_pi(sk)->chan;
3df91ea2
AE
850 conn = chan->conn;
851
852 if (conn)
853 mutex_lock(&conn->chan_lock);
7ddb6e0f 854
6be36555 855 l2cap_chan_lock(chan);
dcba0dba 856 lock_sock(sk);
6be36555 857
dcba0dba 858 if (!sk->sk_shutdown) {
0c1bc5c6 859 if (chan->mode == L2CAP_MODE_ERTM)
dcba0dba
GP
860 err = __l2cap_wait_ack(sk);
861
862 sk->sk_shutdown = SHUTDOWN_MASK;
3df91ea2 863
6be36555 864 release_sock(sk);
0f852724 865 l2cap_chan_close(chan, 0);
6be36555 866 lock_sock(sk);
dcba0dba
GP
867
868 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
869 err = bt_sock_wait_state(sk, BT_CLOSED,
870 sk->sk_lingertime);
871 }
872
873 if (!err && sk->sk_err)
874 err = -sk->sk_err;
875
876 release_sock(sk);
6be36555 877 l2cap_chan_unlock(chan);
3df91ea2
AE
878
879 if (conn)
880 mutex_unlock(&conn->chan_lock);
881
dcba0dba
GP
882 return err;
883}
884
554f05bb
GP
885static int l2cap_sock_release(struct socket *sock)
886{
887 struct sock *sk = sock->sk;
888 int err;
889
890 BT_DBG("sock %p, sk %p", sock, sk);
891
892 if (!sk)
893 return 0;
894
5b28d95c
MY
895 bt_sock_unlink(&l2cap_sk_list, sk);
896
554f05bb
GP
897 err = l2cap_sock_shutdown(sock, 2);
898
899 sock_orphan(sk);
900 l2cap_sock_kill(sk);
901 return err;
902}
903
c0df7f6e
AE
904static void l2cap_sock_cleanup_listen(struct sock *parent)
905{
906 struct sock *sk;
907
908 BT_DBG("parent %p", parent);
909
910 /* Close not yet accepted channels */
911 while ((sk = bt_accept_dequeue(parent, NULL))) {
912 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
913
914 l2cap_chan_lock(chan);
915 __clear_chan_timer(chan);
916 l2cap_chan_close(chan, ECONNRESET);
917 l2cap_chan_unlock(chan);
918
919 l2cap_sock_kill(sk);
920 }
921}
922
80b98027 923static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
80808e43 924{
80b98027 925 struct sock *sk, *parent = chan->data;
80808e43 926
53826692
GP
927 /* Check for backlog size */
928 if (sk_acceptq_is_full(parent)) {
929 BT_DBG("backlog full %d", parent->sk_ack_backlog);
930 return NULL;
931 }
932
80808e43
GP
933 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
934 GFP_ATOMIC);
935 if (!sk)
936 return NULL;
937
d22015aa
OP
938 bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);
939
80808e43
GP
940 l2cap_sock_init(sk, parent);
941
942 return l2cap_pi(sk)->chan;
943}
944
80b98027 945static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
23070494 946{
e328140f 947 int err;
80b98027 948 struct sock *sk = chan->data;
e328140f
MM
949 struct l2cap_pinfo *pi = l2cap_pi(sk);
950
6be36555
AE
951 lock_sock(sk);
952
953 if (pi->rx_busy_skb) {
954 err = -ENOMEM;
955 goto done;
956 }
e328140f
MM
957
958 err = sock_queue_rcv_skb(sk, skb);
959
960 /* For ERTM, handle one skb that doesn't fit into the recv
961 * buffer. This is important to do because the data frames
962 * have already been acked, so the skb cannot be discarded.
963 *
964 * Notify the l2cap core that the buffer is full, so the
965 * LOCAL_BUSY state is entered and no more frames are
966 * acked and reassembled until there is buffer space
967 * available.
968 */
969 if (err < 0 && pi->chan->mode == L2CAP_MODE_ERTM) {
970 pi->rx_busy_skb = skb;
971 l2cap_chan_busy(pi->chan, 1);
972 err = 0;
973 }
23070494 974
6be36555
AE
975done:
976 release_sock(sk);
977
e328140f 978 return err;
23070494
GP
979}
980
80b98027 981static void l2cap_sock_close_cb(struct l2cap_chan *chan)
ba3bd0ee 982{
80b98027 983 struct sock *sk = chan->data;
ba3bd0ee
GP
984
985 l2cap_sock_kill(sk);
986}
987
c0df7f6e
AE
988static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
989{
990 struct sock *sk = chan->data;
991 struct sock *parent;
992
993 lock_sock(sk);
994
995 parent = bt_sk(sk)->parent;
996
997 sock_set_flag(sk, SOCK_ZAPPED);
998
999 switch (chan->state) {
1000 case BT_OPEN:
1001 case BT_BOUND:
1002 case BT_CLOSED:
1003 break;
1004 case BT_LISTEN:
1005 l2cap_sock_cleanup_listen(sk);
1006 sk->sk_state = BT_CLOSED;
1007 chan->state = BT_CLOSED;
1008
1009 break;
1010 default:
1011 sk->sk_state = BT_CLOSED;
1012 chan->state = BT_CLOSED;
1013
1014 sk->sk_err = err;
1015
1016 if (parent) {
1017 bt_accept_unlink(sk);
1018 parent->sk_data_ready(parent, 0);
1019 } else {
1020 sk->sk_state_change(sk);
1021 }
1022
1023 break;
1024 }
1025
1026 release_sock(sk);
1027}
1028
80b98027 1029static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state)
89bc500e 1030{
80b98027 1031 struct sock *sk = chan->data;
89bc500e
GP
1032
1033 sk->sk_state = state;
1034}
1035
2f7719ce 1036static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
90338947 1037 unsigned long len, int nb)
2f7719ce 1038{
90338947
GP
1039 struct sk_buff *skb;
1040 int err;
1041
a6a5568c 1042 l2cap_chan_unlock(chan);
90338947 1043 skb = bt_skb_send_alloc(chan->sk, len, nb, &err);
a6a5568c
MM
1044 l2cap_chan_lock(chan);
1045
90338947
GP
1046 if (!skb)
1047 return ERR_PTR(err);
2f7719ce 1048
90338947 1049 return skb;
2f7719ce
AE
1050}
1051
54a59aa2
AE
1052static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
1053{
1054 struct sock *sk = chan->data;
1055 struct sock *parent;
1056
1057 lock_sock(sk);
1058
1059 parent = bt_sk(sk)->parent;
1060
1061 BT_DBG("sk %p, parent %p", sk, parent);
1062
1063 sk->sk_state = BT_CONNECTED;
1064 sk->sk_state_change(sk);
1065
1066 if (parent)
1067 parent->sk_data_ready(parent, 0);
1068
1069 release_sock(sk);
1070}
1071
80808e43
GP
1072static struct l2cap_ops l2cap_chan_ops = {
1073 .name = "L2CAP Socket Interface",
1074 .new_connection = l2cap_sock_new_connection_cb,
23070494 1075 .recv = l2cap_sock_recv_cb,
ba3bd0ee 1076 .close = l2cap_sock_close_cb,
c0df7f6e 1077 .teardown = l2cap_sock_teardown_cb,
89bc500e 1078 .state_change = l2cap_sock_state_change_cb,
54a59aa2 1079 .ready = l2cap_sock_ready_cb,
2f7719ce 1080 .alloc_skb = l2cap_sock_alloc_skb_cb,
80808e43
GP
1081};
1082
bb58f747
GP
1083static void l2cap_sock_destruct(struct sock *sk)
1084{
1085 BT_DBG("sk %p", sk);
1086
23d3a869
SL
1087 if (l2cap_pi(sk)->chan)
1088 l2cap_chan_put(l2cap_pi(sk)->chan);
e328140f
MM
1089 if (l2cap_pi(sk)->rx_busy_skb) {
1090 kfree_skb(l2cap_pi(sk)->rx_busy_skb);
1091 l2cap_pi(sk)->rx_busy_skb = NULL;
1092 }
1093
bb58f747
GP
1094 skb_queue_purge(&sk->sk_receive_queue);
1095 skb_queue_purge(&sk->sk_write_queue);
1096}
1097
80808e43 1098static void l2cap_sock_init(struct sock *sk, struct sock *parent)
bb58f747
GP
1099{
1100 struct l2cap_pinfo *pi = l2cap_pi(sk);
b4450035 1101 struct l2cap_chan *chan = pi->chan;
bb58f747
GP
1102
1103 BT_DBG("sk %p", sk);
1104
1105 if (parent) {
b4450035
GP
1106 struct l2cap_chan *pchan = l2cap_pi(parent)->chan;
1107
bb58f747 1108 sk->sk_type = parent->sk_type;
c5daa683 1109 bt_sk(sk)->flags = bt_sk(parent)->flags;
bb58f747 1110
715ec005 1111 chan->chan_type = pchan->chan_type;
0c1bc5c6
GP
1112 chan->imtu = pchan->imtu;
1113 chan->omtu = pchan->omtu;
b4450035 1114 chan->conf_state = pchan->conf_state;
0c1bc5c6 1115 chan->mode = pchan->mode;
47d1ec61
GP
1116 chan->fcs = pchan->fcs;
1117 chan->max_tx = pchan->max_tx;
1118 chan->tx_win = pchan->tx_win;
6b3c7104 1119 chan->tx_win_max = pchan->tx_win_max;
4343478f 1120 chan->sec_level = pchan->sec_level;
d57b0e8b 1121 chan->flags = pchan->flags;
6230c9b4
PM
1122
1123 security_sk_clone(parent, sk);
bb58f747 1124 } else {
715ec005
GP
1125
1126 switch (sk->sk_type) {
1127 case SOCK_RAW:
1128 chan->chan_type = L2CAP_CHAN_RAW;
1129 break;
1130 case SOCK_DGRAM:
1131 chan->chan_type = L2CAP_CHAN_CONN_LESS;
1132 break;
1133 case SOCK_SEQPACKET:
1134 case SOCK_STREAM:
1135 chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
1136 break;
1137 }
1138
0c1bc5c6
GP
1139 chan->imtu = L2CAP_DEFAULT_MTU;
1140 chan->omtu = 0;
bb58f747 1141 if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
0c1bc5c6 1142 chan->mode = L2CAP_MODE_ERTM;
c1360a1c 1143 set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
bb58f747 1144 } else {
0c1bc5c6 1145 chan->mode = L2CAP_MODE_BASIC;
bb58f747 1146 }
bd4b1653
AE
1147
1148 l2cap_chan_set_defaults(chan);
bb58f747
GP
1149 }
1150
1151 /* Default config options */
0c1bc5c6 1152 chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
80808e43
GP
1153
1154 chan->data = sk;
1155 chan->ops = &l2cap_chan_ops;
bb58f747
GP
1156}
1157
1158static struct proto l2cap_proto = {
1159 .name = "L2CAP",
1160 .owner = THIS_MODULE,
1161 .obj_size = sizeof(struct l2cap_pinfo)
1162};
1163
80808e43 1164static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
bb58f747
GP
1165{
1166 struct sock *sk;
dc50a06d 1167 struct l2cap_chan *chan;
bb58f747
GP
1168
1169 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1170 if (!sk)
1171 return NULL;
1172
1173 sock_init_data(sock, sk);
1174 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
1175
1176 sk->sk_destruct = l2cap_sock_destruct;
ba13ccd9 1177 sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
bb58f747
GP
1178
1179 sock_reset_flag(sk, SOCK_ZAPPED);
1180
1181 sk->sk_protocol = proto;
1182 sk->sk_state = BT_OPEN;
1183
eef1d9b6 1184 chan = l2cap_chan_create();
dc50a06d 1185 if (!chan) {
49dfbb91 1186 sk_free(sk);
dc50a06d
GP
1187 return NULL;
1188 }
1189
61d6ef3e
MM
1190 l2cap_chan_hold(chan);
1191
eef1d9b6
GP
1192 chan->sk = sk;
1193
dc50a06d
GP
1194 l2cap_pi(sk)->chan = chan;
1195
bb58f747
GP
1196 return sk;
1197}
1198
1199static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
1200 int kern)
1201{
1202 struct sock *sk;
1203
1204 BT_DBG("sock %p", sock);
1205
1206 sock->state = SS_UNCONNECTED;
1207
1208 if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1209 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1210 return -ESOCKTNOSUPPORT;
1211
1212 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1213 return -EPERM;
1214
1215 sock->ops = &l2cap_sock_ops;
1216
1217 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1218 if (!sk)
1219 return -ENOMEM;
1220
1221 l2cap_sock_init(sk, NULL);
5b28d95c 1222 bt_sock_link(&l2cap_sk_list, sk);
bb58f747
GP
1223 return 0;
1224}
1225
cf2f90f5 1226static const struct proto_ops l2cap_sock_ops = {
65390587
GP
1227 .family = PF_BLUETOOTH,
1228 .owner = THIS_MODULE,
1229 .release = l2cap_sock_release,
1230 .bind = l2cap_sock_bind,
1231 .connect = l2cap_sock_connect,
1232 .listen = l2cap_sock_listen,
1233 .accept = l2cap_sock_accept,
1234 .getname = l2cap_sock_getname,
1235 .sendmsg = l2cap_sock_sendmsg,
1236 .recvmsg = l2cap_sock_recvmsg,
1237 .poll = bt_sock_poll,
1238 .ioctl = bt_sock_ioctl,
1239 .mmap = sock_no_mmap,
1240 .socketpair = sock_no_socketpair,
1241 .shutdown = l2cap_sock_shutdown,
1242 .setsockopt = l2cap_sock_setsockopt,
1243 .getsockopt = l2cap_sock_getsockopt
1244};
1245
bb58f747
GP
1246static const struct net_proto_family l2cap_sock_family_ops = {
1247 .family = PF_BLUETOOTH,
1248 .owner = THIS_MODULE,
1249 .create = l2cap_sock_create,
1250};
1251
1252int __init l2cap_init_sockets(void)
1253{
e2174ca4 1254 int err;
bb58f747 1255
e2174ca4
GP
1256 err = proto_register(&l2cap_proto, 0);
1257 if (err < 0)
1258 return err;
bb58f747 1259
e2174ca4 1260 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
5b28d95c
MY
1261 if (err < 0) {
1262 BT_ERR("L2CAP socket registration failed");
e2174ca4 1263 goto error;
5b28d95c
MY
1264 }
1265
1266 err = bt_procfs_init(THIS_MODULE, &init_net, "l2cap", &l2cap_sk_list, NULL);
1267 if (err < 0) {
1268 BT_ERR("Failed to create L2CAP proc file");
1269 bt_sock_unregister(BTPROTO_L2CAP);
1270 goto error;
1271 }
bb58f747 1272
e2174ca4 1273 BT_INFO("L2CAP socket layer initialized");
bb58f747 1274
e2174ca4 1275 return 0;
bb58f747
GP
1276
1277error:
e2174ca4
GP
1278 proto_unregister(&l2cap_proto);
1279 return err;
bb58f747
GP
1280}
1281
1282void l2cap_cleanup_sockets(void)
1283{
5b28d95c 1284 bt_procfs_cleanup(&init_net, "l2cap");
e2174ca4
GP
1285 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
1286 BT_ERR("L2CAP socket unregistration failed");
bb58f747 1287
e2174ca4 1288 proto_unregister(&l2cap_proto);
bb58f747 1289}