l2cap_sock.c 27.2 KB
Newer Older
1 2 3 4 5
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2000-2001 Qualcomm Incorporated
   Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
   Copyright (C) 2010 Google Inc.
6
   Copyright (C) 2011 ProFUSION Embedded Systems
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

   Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth L2CAP sockets. */

30
#include <linux/export.h>
31

32
#include <net/bluetooth/bluetooth.h>
33
#include <net/bluetooth/hci_core.h>
34
#include <net/bluetooth/l2cap.h>
35 36

#include "smp.h"
37

38 39 40 41
static struct bt_sock_list l2cap_sk_list = {
	.lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
};

42
static const struct proto_ops l2cap_sock_ops;
43
static void l2cap_sock_init(struct sock *sk, struct sock *parent);
44 45
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio);
46

47 48 49 50 51 52
bool l2cap_is_socket(struct socket *sock)
{
	return sock && sock->ops == &l2cap_sock_ops;
}
EXPORT_SYMBOL(l2cap_is_socket);

53 54 55
static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
{
	struct sock *sk = sock->sk;
56
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
57 58 59 60 61 62 63 64 65 66 67 68
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

69
	if (la.l2_cid && la.l2_psm)
70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
		return -EINVAL;

	lock_sock(sk);

	if (sk->sk_state != BT_OPEN) {
		err = -EBADFD;
		goto done;
	}

	if (la.l2_psm) {
		__u16 psm = __le16_to_cpu(la.l2_psm);

		/* PSM must be odd and lsb of upper byte must be 0 */
		if ((psm & 0x0101) != 0x0001) {
			err = -EINVAL;
			goto done;
		}

		/* Restrict usage of well-known PSMs */
		if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE)) {
			err = -EACCES;
			goto done;
		}
	}

95
	if (la.l2_cid)
S
Santosh Nayak 已提交
96
		err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
97 98
	else
		err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
99

100 101
	if (err < 0)
		goto done;
102

103
	switch (chan->chan_type) {
104 105 106 107
	case L2CAP_CHAN_CONN_LESS:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_3DSP)
			chan->sec_level = BT_SECURITY_SDP;
		break;
108 109 110 111 112 113
	case L2CAP_CHAN_CONN_ORIENTED:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
		    __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
			chan->sec_level = BT_SECURITY_SDP;
		break;
	}
114

115
	bacpy(&chan->src, &la.l2_bdaddr);
116 117

	chan->state = BT_BOUND;
118
	sk->sk_state = BT_BOUND;
119 120 121 122 123 124

done:
	release_sock(sk);
	return err;
}

125 126
static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr,
			      int alen, int flags)
127 128
{
	struct sock *sk = sock->sk;
129
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
130 131 132 133 134 135 136 137 138 139 140 141 142
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || alen < sizeof(addr->sa_family) ||
	    addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

143
	if (la.l2_cid && la.l2_psm)
144 145
		return -EINVAL;

S
Santosh Nayak 已提交
146
	err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
147
				 &la.l2_bdaddr, la.l2_bdaddr_type);
148
	if (err)
149
		return err;
150

151 152
	lock_sock(sk);

153
	err = bt_sock_wait_state(sk, BT_CONNECTED,
154
				 sock_sndtimeo(sk, flags & O_NONBLOCK));
155 156 157

	release_sock(sk);

158 159 160
	return err;
}

161 162 163
static int l2cap_sock_listen(struct socket *sock, int backlog)
{
	struct sock *sk = sock->sk;
164
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
165 166 167 168 169 170
	int err = 0;

	BT_DBG("sk %p backlog %d", sk, backlog);

	lock_sock(sk);

171
	if (sk->sk_state != BT_BOUND) {
172 173 174 175
		err = -EBADFD;
		goto done;
	}

176 177 178 179 180
	if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
		err = -EINVAL;
		goto done;
	}

181
	switch (chan->mode) {
182 183 184 185 186 187 188 189 190 191 192 193 194 195
	case L2CAP_MODE_BASIC:
		break;
	case L2CAP_MODE_ERTM:
	case L2CAP_MODE_STREAMING:
		if (!disable_ertm)
			break;
		/* fall through */
	default:
		err = -ENOTSUPP;
		goto done;
	}

	sk->sk_max_ack_backlog = backlog;
	sk->sk_ack_backlog = 0;
196 197

	chan->state = BT_LISTEN;
198 199 200 201 202 203 204
	sk->sk_state = BT_LISTEN;

done:
	release_sock(sk);
	return err;
}

205 206
static int l2cap_sock_accept(struct socket *sock, struct socket *newsock,
			     int flags)
207 208 209 210 211 212 213 214 215 216 217 218 219 220
{
	DECLARE_WAITQUEUE(wait, current);
	struct sock *sk = sock->sk, *nsk;
	long timeo;
	int err = 0;

	lock_sock_nested(sk, SINGLE_DEPTH_NESTING);

	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);

	BT_DBG("sk %p timeo %ld", sk, timeo);

	/* Wait for an incoming connection. (wake-one). */
	add_wait_queue_exclusive(sk_sleep(sk), &wait);
221
	while (1) {
222
		set_current_state(TASK_INTERRUPTIBLE);
223 224 225

		if (sk->sk_state != BT_LISTEN) {
			err = -EBADFD;
226 227 228
			break;
		}

229 230 231
		nsk = bt_accept_dequeue(sk, newsock);
		if (nsk)
			break;
232

233 234
		if (!timeo) {
			err = -EAGAIN;
235 236 237 238 239 240 241
			break;
		}

		if (signal_pending(current)) {
			err = sock_intr_errno(timeo);
			break;
		}
242 243 244 245

		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
246
	}
247
	__set_current_state(TASK_RUNNING);
248 249 250 251 252 253 254 255 256 257 258 259 260 261
	remove_wait_queue(sk_sleep(sk), &wait);

	if (err)
		goto done;

	newsock->state = SS_CONNECTED;

	BT_DBG("new socket %p", nsk);

done:
	release_sock(sk);
	return err;
}

262 263
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr,
			      int *len, int peer)
264 265 266
{
	struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
	struct sock *sk = sock->sk;
267
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
268 269 270

	BT_DBG("sock %p, sk %p", sock, sk);

271
	memset(la, 0, sizeof(struct sockaddr_l2));
272 273 274 275
	addr->sa_family = AF_BLUETOOTH;
	*len = sizeof(struct sockaddr_l2);

	if (peer) {
276
		la->l2_psm = chan->psm;
277
		bacpy(&la->l2_bdaddr, &chan->dst);
278
		la->l2_cid = cpu_to_le16(chan->dcid);
279
	} else {
280
		la->l2_psm = chan->sport;
281
		bacpy(&la->l2_bdaddr, &chan->src);
282
		la->l2_cid = cpu_to_le16(chan->scid);
283 284 285 286 287
	}

	return 0;
}

288 289
static int l2cap_sock_getsockopt_old(struct socket *sock, int optname,
				     char __user *optval, int __user *optlen)
290 291
{
	struct sock *sk = sock->sk;
292
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
293 294 295 296 297 298 299 300 301 302 303 304 305 306
	struct l2cap_options opts;
	struct l2cap_conninfo cinfo;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
307
		memset(&opts, 0, sizeof(opts));
308 309 310 311
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
312 313
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
314
		opts.txwin_size = chan->tx_win;
315 316 317 318 319 320 321 322

		len = min_t(unsigned int, len, sizeof(opts));
		if (copy_to_user(optval, (char *) &opts, len))
			err = -EFAULT;

		break;

	case L2CAP_LM:
323
		switch (chan->sec_level) {
324 325 326 327 328 329 330 331
		case BT_SECURITY_LOW:
			opt = L2CAP_LM_AUTH;
			break;
		case BT_SECURITY_MEDIUM:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
			break;
		case BT_SECURITY_HIGH:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
332
			      L2CAP_LM_SECURE;
333 334 335 336 337 338
			break;
		default:
			opt = 0;
			break;
		}

339
		if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
340 341
			opt |= L2CAP_LM_MASTER;

342
		if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
343 344 345 346 347 348 349 350
			opt |= L2CAP_LM_RELIABLE;

		if (put_user(opt, (u32 __user *) optval))
			err = -EFAULT;
		break;

	case L2CAP_CONNINFO:
		if (sk->sk_state != BT_CONNECTED &&
351 352
		    !(sk->sk_state == BT_CONNECT2 &&
		      test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
353 354 355 356
			err = -ENOTCONN;
			break;
		}

357
		memset(&cinfo, 0, sizeof(cinfo));
358 359
		cinfo.hci_handle = chan->conn->hcon->handle;
		memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375

		len = min_t(unsigned int, len, sizeof(cinfo));
		if (copy_to_user(optval, (char *) &cinfo, len))
			err = -EFAULT;

		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

376 377
static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, int __user *optlen)
378 379
{
	struct sock *sk = sock->sk;
380
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
381
	struct bt_security sec;
382
	struct bt_power pwr;
383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
400
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
401
		    chan->chan_type != L2CAP_CHAN_RAW) {
402 403 404 405
			err = -EINVAL;
			break;
		}

406
		memset(&sec, 0, sizeof(sec));
407
		if (chan->conn) {
408
			sec.level = chan->conn->hcon->sec_level;
409

410 411 412 413 414
			if (sk->sk_state == BT_CONNECTED)
				sec.key_size = chan->conn->hcon->enc_key_size;
		} else {
			sec.level = chan->sec_level;
		}
415

416 417 418 419 420 421 422 423 424 425 426 427
		len = min_t(unsigned int, len, sizeof(sec));
		if (copy_to_user(optval, (char *) &sec, len))
			err = -EFAULT;

		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

428 429
		if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
			     (u32 __user *) optval))
430 431 432 433 434
			err = -EFAULT;

		break;

	case BT_FLUSHABLE:
435
		if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
436
			     (u32 __user *) optval))
437 438 439 440
			err = -EFAULT;

		break;

441 442
	case BT_POWER:
		if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
443
		    && sk->sk_type != SOCK_RAW) {
444 445 446 447
			err = -EINVAL;
			break;
		}

448
		pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
449 450 451 452 453 454 455

		len = min_t(unsigned int, len, sizeof(pwr));
		if (copy_to_user(optval, (char *) &pwr, len))
			err = -EFAULT;

		break;

456 457 458 459 460
	case BT_CHANNEL_POLICY:
		if (put_user(chan->chan_policy, (u32 __user *) optval))
			err = -EFAULT;
		break;

461 462 463 464 465 466 467 468 469
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

470 471 472
static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
{
	switch (chan->scid) {
473
	case L2CAP_CID_ATT:
474
		if (mtu < L2CAP_LE_MIN_MTU)
475 476 477 478 479 480 481 482 483 484 485
			return false;
		break;

	default:
		if (mtu < L2CAP_DEFAULT_MIN_MTU)
			return false;
	}

	return true;
}

486 487
static int l2cap_sock_setsockopt_old(struct socket *sock, int optname,
				     char __user *optval, unsigned int optlen)
488 489
{
	struct sock *sk = sock->sk;
490
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
491 492 493 494 495 496 497 498 499 500 501 502 503 504 505
	struct l2cap_options opts;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
		if (sk->sk_state == BT_CONNECTED) {
			err = -EINVAL;
			break;
		}

506 507 508 509
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
510 511
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
512
		opts.txwin_size = chan->tx_win;
513 514 515 516 517 518 519

		len = min_t(unsigned int, sizeof(opts), optlen);
		if (copy_from_user((char *) &opts, optval, len)) {
			err = -EFAULT;
			break;
		}

520
		if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
521 522 523 524
			err = -EINVAL;
			break;
		}

525 526 527 528 529
		if (!l2cap_valid_mtu(chan, opts.imtu)) {
			err = -EINVAL;
			break;
		}

530 531
		chan->mode = opts.mode;
		switch (chan->mode) {
532
		case L2CAP_MODE_BASIC:
533
			clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
534 535 536 537 538 539 540 541 542 543 544
			break;
		case L2CAP_MODE_ERTM:
		case L2CAP_MODE_STREAMING:
			if (!disable_ertm)
				break;
			/* fall through */
		default:
			err = -EINVAL;
			break;
		}

545 546
		chan->imtu = opts.imtu;
		chan->omtu = opts.omtu;
547 548
		chan->fcs  = opts.fcs;
		chan->max_tx = opts.max_tx;
549
		chan->tx_win = opts.txwin_size;
550
		chan->flush_to = opts.flush_to;
551 552 553 554 555 556 557 558 559
		break;

	case L2CAP_LM:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt & L2CAP_LM_AUTH)
560
			chan->sec_level = BT_SECURITY_LOW;
561
		if (opt & L2CAP_LM_ENCRYPT)
562
			chan->sec_level = BT_SECURITY_MEDIUM;
563
		if (opt & L2CAP_LM_SECURE)
564
			chan->sec_level = BT_SECURITY_HIGH;
565

566 567 568 569
		if (opt & L2CAP_LM_MASTER)
			set_bit(FLAG_ROLE_SWITCH, &chan->flags);
		else
			clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
570 571 572 573 574

		if (opt & L2CAP_LM_RELIABLE)
			set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
575 576 577 578 579 580 581 582 583 584 585
		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

586 587
static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, unsigned int optlen)
588 589
{
	struct sock *sk = sock->sk;
590
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
591
	struct bt_security sec;
592
	struct bt_power pwr;
593
	struct l2cap_conn *conn;
594 595 596 597 598 599 600 601 602 603 604 605 606 607 608
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
609
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
610
		    chan->chan_type != L2CAP_CHAN_RAW) {
611 612 613 614 615 616 617 618 619 620 621 622 623
			err = -EINVAL;
			break;
		}

		sec.level = BT_SECURITY_LOW;

		len = min_t(unsigned int, sizeof(sec), optlen);
		if (copy_from_user((char *) &sec, optval, len)) {
			err = -EFAULT;
			break;
		}

		if (sec.level < BT_SECURITY_LOW ||
624
		    sec.level > BT_SECURITY_HIGH) {
625 626 627 628
			err = -EINVAL;
			break;
		}

629
		chan->sec_level = sec.level;
630

631 632 633
		if (!chan->conn)
			break;

634
		conn = chan->conn;
635 636

		/*change security for LE channels */
637
		if (chan->scid == L2CAP_CID_ATT) {
638 639 640 641 642
			if (!conn->hcon->out) {
				err = -EINVAL;
				break;
			}

643
			if (smp_conn_security(conn->hcon, sec.level))
644 645
				break;
			sk->sk_state = BT_CONFIG;
646
			chan->state = BT_CONFIG;
647

648 649
		/* or for ACL link */
		} else if ((sk->sk_state == BT_CONNECT2 &&
650
			    test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
651 652
			   sk->sk_state == BT_CONNECTED) {
			if (!l2cap_chan_check_security(chan))
653
				set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
654 655
			else
				sk->sk_state_change(sk);
656 657
		} else {
			err = -EINVAL;
658
		}
659 660 661 662 663 664 665 666 667 668 669 670 671
		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

672 673 674 675
		if (opt)
			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
		else
			clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
676 677 678 679 680 681 682 683 684 685 686 687 688 689
		break;

	case BT_FLUSHABLE:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_FLUSHABLE_ON) {
			err = -EINVAL;
			break;
		}

		if (opt == BT_FLUSHABLE_OFF) {
690
			conn = chan->conn;
L
Lucas De Marchi 已提交
691
			/* proceed further only when we have l2cap_conn and
692 693 694 695 696 697 698
			   No Flush support in the LM */
			if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
				err = -EINVAL;
				break;
			}
		}

699 700 701 702
		if (opt)
			set_bit(FLAG_FLUSHABLE, &chan->flags);
		else
			clear_bit(FLAG_FLUSHABLE, &chan->flags);
703 704
		break;

705 706
	case BT_POWER:
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
707
		    chan->chan_type != L2CAP_CHAN_RAW) {
708 709 710 711 712 713 714 715 716 717 718
			err = -EINVAL;
			break;
		}

		pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;

		len = min_t(unsigned int, sizeof(pwr), optlen);
		if (copy_from_user((char *) &pwr, optval, len)) {
			err = -EFAULT;
			break;
		}
719 720 721 722 723

		if (pwr.force_active)
			set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
724 725
		break;

726 727 728 729 730 731 732 733 734 735 736 737
	case BT_CHANNEL_POLICY:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
			err = -EINVAL;
			break;
		}

		if (chan->mode != L2CAP_MODE_ERTM &&
738
		    chan->mode != L2CAP_MODE_STREAMING) {
739 740 741 742 743
			err = -EOPNOTSUPP;
			break;
		}

		chan->chan_policy = (u8) opt;
744 745 746 747 748

		if (sk->sk_state == BT_CONNECTED &&
		    chan->move_role == L2CAP_MOVE_ROLE_NONE)
			l2cap_move_start(chan);

749 750
		break;

751 752 753 754 755 756 757 758
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}
759

760 761
static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len)
762 763
{
	struct sock *sk = sock->sk;
764
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
765 766 767 768 769 770 771 772 773 774 775
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	err = sock_error(sk);
	if (err)
		return err;

	if (msg->msg_flags & MSG_OOB)
		return -EOPNOTSUPP;

776
	if (sk->sk_state != BT_CONNECTED)
777
		return -ENOTCONN;
778

779 780 781 782 783 784
	lock_sock(sk);
	err = bt_sock_wait_ready(sk, msg->msg_flags);
	release_sock(sk);
	if (err)
		return err;

785
	l2cap_chan_lock(chan);
786
	err = l2cap_chan_send(chan, msg, len, sk->sk_priority);
787
	l2cap_chan_unlock(chan);
788 789 790

	return err;
}
791

792 793
static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len, int flags)
794 795
{
	struct sock *sk = sock->sk;
796 797
	struct l2cap_pinfo *pi = l2cap_pi(sk);
	int err;
798 799 800

	lock_sock(sk);

801 802
	if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
						    &bt_sk(sk)->flags)) {
803
		sk->sk_state = BT_CONFIG;
804
		pi->chan->state = BT_CONFIG;
805

806
		__l2cap_connect_rsp_defer(pi->chan);
807 808
		err = 0;
		goto done;
809 810 811 812 813
	}

	release_sock(sk);

	if (sock->type == SOCK_STREAM)
814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840
		err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
	else
		err = bt_sock_recvmsg(iocb, sock, msg, len, flags);

	if (pi->chan->mode != L2CAP_MODE_ERTM)
		return err;

	/* Attempt to put pending rx data in the socket buffer */

	lock_sock(sk);

	if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
		goto done;

	if (pi->rx_busy_skb) {
		if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
			pi->rx_busy_skb = NULL;
		else
			goto done;
	}

	/* Restore data flow when half of the receive buffer is
	 * available.  This avoids resending large numbers of
	 * frames.
	 */
	if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
		l2cap_chan_busy(pi->chan, 0);
841

842 843 844
done:
	release_sock(sk);
	return err;
845 846
}

847 848 849
/* Kill socket (only if zapped and orphan)
 * Must be called on unlocked socket.
 */
850
static void l2cap_sock_kill(struct sock *sk)
851 852 853 854
{
	if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
		return;

855
	BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
856 857

	/* Kill poor orphan */
858

859
	l2cap_chan_put(l2cap_pi(sk)->chan);
860 861 862 863
	sock_set_flag(sk, SOCK_DEAD);
	sock_put(sk);
}

864 865 866
static int l2cap_sock_shutdown(struct socket *sock, int how)
{
	struct sock *sk = sock->sk;
867
	struct l2cap_chan *chan;
868
	struct l2cap_conn *conn;
869 870 871 872 873 874 875
	int err = 0;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

876
	chan = l2cap_pi(sk)->chan;
877 878 879 880
	conn = chan->conn;

	if (conn)
		mutex_lock(&conn->chan_lock);
881

882
	l2cap_chan_lock(chan);
883
	lock_sock(sk);
884

885
	if (!sk->sk_shutdown) {
886
		if (chan->mode == L2CAP_MODE_ERTM)
887 888 889
			err = __l2cap_wait_ack(sk);

		sk->sk_shutdown = SHUTDOWN_MASK;
890

891
		release_sock(sk);
892
		l2cap_chan_close(chan, 0);
893
		lock_sock(sk);
894 895 896

		if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
			err = bt_sock_wait_state(sk, BT_CLOSED,
897
						 sk->sk_lingertime);
898 899 900 901 902 903
	}

	if (!err && sk->sk_err)
		err = -sk->sk_err;

	release_sock(sk);
904
	l2cap_chan_unlock(chan);
905 906 907 908

	if (conn)
		mutex_unlock(&conn->chan_lock);

909 910 911
	return err;
}

912 913 914 915 916 917 918 919 920 921
static int l2cap_sock_release(struct socket *sock)
{
	struct sock *sk = sock->sk;
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

922 923
	bt_sock_unlink(&l2cap_sk_list, sk);

924 925 926 927 928 929 930
	err = l2cap_sock_shutdown(sock, 2);

	sock_orphan(sk);
	l2cap_sock_kill(sk);
	return err;
}

931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
static void l2cap_sock_cleanup_listen(struct sock *parent)
{
	struct sock *sk;

	BT_DBG("parent %p", parent);

	/* Close not yet accepted channels */
	while ((sk = bt_accept_dequeue(parent, NULL))) {
		struct l2cap_chan *chan = l2cap_pi(sk)->chan;

		l2cap_chan_lock(chan);
		__clear_chan_timer(chan);
		l2cap_chan_close(chan, ECONNRESET);
		l2cap_chan_unlock(chan);

		l2cap_sock_kill(sk);
	}
}

950
static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
951
{
952
	struct sock *sk, *parent = chan->data;
953

954 955 956 957 958 959
	/* Check for backlog size */
	if (sk_acceptq_is_full(parent)) {
		BT_DBG("backlog full %d", parent->sk_ack_backlog);
		return NULL;
	}

960
	sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
961
			      GFP_ATOMIC);
962 963 964
	if (!sk)
		return NULL;

965 966
	bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);

967 968
	l2cap_sock_init(sk, parent);

969 970
	bt_accept_enqueue(parent, sk);

971 972 973
	return l2cap_pi(sk)->chan;
}

974
static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
975
{
976
	int err;
977
	struct sock *sk = chan->data;
978 979
	struct l2cap_pinfo *pi = l2cap_pi(sk);

980 981 982 983 984 985
	lock_sock(sk);

	if (pi->rx_busy_skb) {
		err = -ENOMEM;
		goto done;
	}
986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002

	err = sock_queue_rcv_skb(sk, skb);

	/* For ERTM, handle one skb that doesn't fit into the recv
	 * buffer.  This is important to do because the data frames
	 * have already been acked, so the skb cannot be discarded.
	 *
	 * Notify the l2cap core that the buffer is full, so the
	 * LOCAL_BUSY state is entered and no more frames are
	 * acked and reassembled until there is buffer space
	 * available.
	 */
	if (err < 0 && pi->chan->mode == L2CAP_MODE_ERTM) {
		pi->rx_busy_skb = skb;
		l2cap_chan_busy(pi->chan, 1);
		err = 0;
	}
1003

1004 1005 1006
done:
	release_sock(sk);

1007
	return err;
1008 1009
}

1010
static void l2cap_sock_close_cb(struct l2cap_chan *chan)
1011
{
1012
	struct sock *sk = chan->data;
1013 1014 1015 1016

	l2cap_sock_kill(sk);
}

1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057
static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
{
	struct sock *sk = chan->data;
	struct sock *parent;

	lock_sock(sk);

	parent = bt_sk(sk)->parent;

	sock_set_flag(sk, SOCK_ZAPPED);

	switch (chan->state) {
	case BT_OPEN:
	case BT_BOUND:
	case BT_CLOSED:
		break;
	case BT_LISTEN:
		l2cap_sock_cleanup_listen(sk);
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		break;
	default:
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		sk->sk_err = err;

		if (parent) {
			bt_accept_unlink(sk);
			parent->sk_data_ready(parent, 0);
		} else {
			sk->sk_state_change(sk);
		}

		break;
	}

	release_sock(sk);
}

1058
static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state)
1059
{
1060
	struct sock *sk = chan->data;
1061 1062 1063 1064

	sk->sk_state = state;
}

1065
static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
1066
					       unsigned long len, int nb)
1067
{
1068 1069 1070
	struct sk_buff *skb;
	int err;

1071
	l2cap_chan_unlock(chan);
1072
	skb = bt_skb_send_alloc(chan->sk, len, nb, &err);
1073 1074
	l2cap_chan_lock(chan);

1075 1076
	if (!skb)
		return ERR_PTR(err);
1077

1078
	return skb;
1079 1080
}

1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100
static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;
	struct sock *parent;

	lock_sock(sk);

	parent = bt_sk(sk)->parent;

	BT_DBG("sk %p, parent %p", sk, parent);

	sk->sk_state = BT_CONNECTED;
	sk->sk_state_change(sk);

	if (parent)
		parent->sk_data_ready(parent, 0);

	release_sock(sk);
}

1101 1102 1103 1104 1105 1106 1107 1108 1109
static void l2cap_sock_defer_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;
	struct sock *parent = bt_sk(sk)->parent;

	if (parent)
		parent->sk_data_ready(parent, 0);
}

1110 1111 1112
static struct l2cap_ops l2cap_chan_ops = {
	.name		= "L2CAP Socket Interface",
	.new_connection	= l2cap_sock_new_connection_cb,
1113
	.recv		= l2cap_sock_recv_cb,
1114
	.close		= l2cap_sock_close_cb,
1115
	.teardown	= l2cap_sock_teardown_cb,
1116
	.state_change	= l2cap_sock_state_change_cb,
1117
	.ready		= l2cap_sock_ready_cb,
1118
	.defer		= l2cap_sock_defer_cb,
1119
	.alloc_skb	= l2cap_sock_alloc_skb_cb,
1120 1121
};

1122 1123 1124 1125
static void l2cap_sock_destruct(struct sock *sk)
{
	BT_DBG("sk %p", sk);

1126 1127
	if (l2cap_pi(sk)->chan)
		l2cap_chan_put(l2cap_pi(sk)->chan);
1128 1129 1130 1131 1132
	if (l2cap_pi(sk)->rx_busy_skb) {
		kfree_skb(l2cap_pi(sk)->rx_busy_skb);
		l2cap_pi(sk)->rx_busy_skb = NULL;
	}

1133 1134 1135 1136
	skb_queue_purge(&sk->sk_receive_queue);
	skb_queue_purge(&sk->sk_write_queue);
}

1137
static void l2cap_sock_init(struct sock *sk, struct sock *parent)
1138 1139
{
	struct l2cap_pinfo *pi = l2cap_pi(sk);
1140
	struct l2cap_chan *chan = pi->chan;
1141 1142 1143 1144

	BT_DBG("sk %p", sk);

	if (parent) {
1145 1146
		struct l2cap_chan *pchan = l2cap_pi(parent)->chan;

1147
		sk->sk_type = parent->sk_type;
1148
		bt_sk(sk)->flags = bt_sk(parent)->flags;
1149

1150
		chan->chan_type = pchan->chan_type;
1151 1152
		chan->imtu = pchan->imtu;
		chan->omtu = pchan->omtu;
1153
		chan->conf_state = pchan->conf_state;
1154
		chan->mode = pchan->mode;
1155 1156 1157
		chan->fcs  = pchan->fcs;
		chan->max_tx = pchan->max_tx;
		chan->tx_win = pchan->tx_win;
1158
		chan->tx_win_max = pchan->tx_win_max;
1159
		chan->sec_level = pchan->sec_level;
1160
		chan->flags = pchan->flags;
1161 1162

		security_sk_clone(parent, sk);
1163
	} else {
1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177

		switch (sk->sk_type) {
		case SOCK_RAW:
			chan->chan_type = L2CAP_CHAN_RAW;
			break;
		case SOCK_DGRAM:
			chan->chan_type = L2CAP_CHAN_CONN_LESS;
			break;
		case SOCK_SEQPACKET:
		case SOCK_STREAM:
			chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
			break;
		}

1178 1179
		chan->imtu = L2CAP_DEFAULT_MTU;
		chan->omtu = 0;
1180
		if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
1181
			chan->mode = L2CAP_MODE_ERTM;
1182
			set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
1183
		} else {
1184
			chan->mode = L2CAP_MODE_BASIC;
1185
		}
1186 1187

		l2cap_chan_set_defaults(chan);
1188 1189 1190
	}

	/* Default config options */
1191
	chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
1192 1193 1194

	chan->data = sk;
	chan->ops = &l2cap_chan_ops;
1195 1196 1197 1198 1199 1200 1201 1202
}

static struct proto l2cap_proto = {
	.name		= "L2CAP",
	.owner		= THIS_MODULE,
	.obj_size	= sizeof(struct l2cap_pinfo)
};

1203 1204
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio)
1205 1206
{
	struct sock *sk;
1207
	struct l2cap_chan *chan;
1208 1209 1210 1211 1212 1213 1214 1215 1216

	sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
	if (!sk)
		return NULL;

	sock_init_data(sock, sk);
	INIT_LIST_HEAD(&bt_sk(sk)->accept_q);

	sk->sk_destruct = l2cap_sock_destruct;
1217
	sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
1218 1219 1220 1221 1222 1223

	sock_reset_flag(sk, SOCK_ZAPPED);

	sk->sk_protocol = proto;
	sk->sk_state = BT_OPEN;

1224
	chan = l2cap_chan_create();
1225
	if (!chan) {
1226
		sk_free(sk);
1227 1228 1229
		return NULL;
	}

1230 1231
	l2cap_chan_hold(chan);

1232 1233
	chan->sk = sk;

1234 1235
	l2cap_pi(sk)->chan = chan;

1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248
	return sk;
}

static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
			     int kern)
{
	struct sock *sk;

	BT_DBG("sock %p", sock);

	sock->state = SS_UNCONNECTED;

	if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1249
	    sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261
		return -ESOCKTNOSUPPORT;

	if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
		return -EPERM;

	sock->ops = &l2cap_sock_ops;

	sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
	if (!sk)
		return -ENOMEM;

	l2cap_sock_init(sk, NULL);
1262
	bt_sock_link(&l2cap_sk_list, sk);
1263 1264 1265
	return 0;
}

1266
static const struct proto_ops l2cap_sock_ops = {
1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285
	.family		= PF_BLUETOOTH,
	.owner		= THIS_MODULE,
	.release	= l2cap_sock_release,
	.bind		= l2cap_sock_bind,
	.connect	= l2cap_sock_connect,
	.listen		= l2cap_sock_listen,
	.accept		= l2cap_sock_accept,
	.getname	= l2cap_sock_getname,
	.sendmsg	= l2cap_sock_sendmsg,
	.recvmsg	= l2cap_sock_recvmsg,
	.poll		= bt_sock_poll,
	.ioctl		= bt_sock_ioctl,
	.mmap		= sock_no_mmap,
	.socketpair	= sock_no_socketpair,
	.shutdown	= l2cap_sock_shutdown,
	.setsockopt	= l2cap_sock_setsockopt,
	.getsockopt	= l2cap_sock_getsockopt
};

1286 1287 1288 1289 1290 1291 1292 1293
static const struct net_proto_family l2cap_sock_family_ops = {
	.family	= PF_BLUETOOTH,
	.owner	= THIS_MODULE,
	.create	= l2cap_sock_create,
};

int __init l2cap_init_sockets(void)
{
1294
	int err;
1295

1296 1297 1298
	err = proto_register(&l2cap_proto, 0);
	if (err < 0)
		return err;
1299

1300
	err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
1301 1302
	if (err < 0) {
		BT_ERR("L2CAP socket registration failed");
1303
		goto error;
1304 1305
	}

1306
	err = bt_procfs_init(&init_net, "l2cap", &l2cap_sk_list,
1307
			     NULL);
1308 1309 1310 1311 1312
	if (err < 0) {
		BT_ERR("Failed to create L2CAP proc file");
		bt_sock_unregister(BTPROTO_L2CAP);
		goto error;
	}
1313

1314
	BT_INFO("L2CAP socket layer initialized");
1315

1316
	return 0;
1317 1318

error:
1319 1320
	proto_unregister(&l2cap_proto);
	return err;
1321 1322 1323 1324
}

void l2cap_cleanup_sockets(void)
{
1325
	bt_procfs_cleanup(&init_net, "l2cap");
1326
	bt_sock_unregister(BTPROTO_L2CAP);
1327
	proto_unregister(&l2cap_proto);
1328
}