l2cap_sock.c 35.1 KB
Newer Older
1 2 3 4 5
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2000-2001 Qualcomm Incorporated
   Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
   Copyright (C) 2010 Google Inc.
6
   Copyright (C) 2011 ProFUSION Embedded Systems
7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

   Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth L2CAP sockets. */

30
#include <linux/module.h>
31
#include <linux/export.h>
32

33
#include <net/bluetooth/bluetooth.h>
34
#include <net/bluetooth/hci_core.h>
35
#include <net/bluetooth/l2cap.h>
36 37

#include "smp.h"
38

39 40 41 42
static struct bt_sock_list l2cap_sk_list = {
	.lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
};

43
static const struct proto_ops l2cap_sock_ops;
44
static void l2cap_sock_init(struct sock *sk, struct sock *parent);
45 46
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio);
47

48 49 50 51 52 53
bool l2cap_is_socket(struct socket *sock)
{
	return sock && sock->ops == &l2cap_sock_ops;
}
EXPORT_SYMBOL(l2cap_is_socket);

54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
static int l2cap_validate_bredr_psm(u16 psm)
{
	/* PSM must be odd and lsb of upper byte must be 0 */
	if ((psm & 0x0101) != 0x0001)
		return -EINVAL;

	/* Restrict usage of well-known PSMs */
	if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE))
		return -EACCES;

	return 0;
}

static int l2cap_validate_le_psm(u16 psm)
{
	/* Valid LE_PSM ranges are defined only until 0x00ff */
	if (psm > 0x00ff)
		return -EINVAL;

	/* Restrict fixed, SIG assigned PSM values to CAP_NET_BIND_SERVICE */
	if (psm <= 0x007f && !capable(CAP_NET_BIND_SERVICE))
		return -EACCES;

	return 0;
}

80 81 82
static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
{
	struct sock *sk = sock->sk;
83
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
84 85 86 87 88 89 90 91 92 93 94 95
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

96
	if (la.l2_cid && la.l2_psm)
97 98
		return -EINVAL;

99 100 101
	if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
		return -EINVAL;

102 103
	if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
		/* We only allow ATT user space socket */
104
		if (la.l2_cid &&
105
		    la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
106 107 108
			return -EINVAL;
	}

109 110 111 112 113 114 115 116 117 118
	lock_sock(sk);

	if (sk->sk_state != BT_OPEN) {
		err = -EBADFD;
		goto done;
	}

	if (la.l2_psm) {
		__u16 psm = __le16_to_cpu(la.l2_psm);

119 120 121 122
		if (la.l2_bdaddr_type == BDADDR_BREDR)
			err = l2cap_validate_bredr_psm(psm);
		else
			err = l2cap_validate_le_psm(psm);
123

124
		if (err)
125 126 127
			goto done;
	}

128
	if (la.l2_cid)
S
Santosh Nayak 已提交
129
		err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
130 131
	else
		err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
132

133 134
	if (err < 0)
		goto done;
135

136
	switch (chan->chan_type) {
137 138 139 140
	case L2CAP_CHAN_CONN_LESS:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_3DSP)
			chan->sec_level = BT_SECURITY_SDP;
		break;
141 142 143 144 145
	case L2CAP_CHAN_CONN_ORIENTED:
		if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
		    __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
			chan->sec_level = BT_SECURITY_SDP;
		break;
146 147 148
	case L2CAP_CHAN_RAW:
		chan->sec_level = BT_SECURITY_SDP;
		break;
149 150 151 152 153 154 155 156
	case L2CAP_CHAN_FIXED:
		/* Fixed channels default to the L2CAP core not holding a
		 * hci_conn reference for them. For fixed channels mapping to
		 * L2CAP sockets we do want to hold a reference so set the
		 * appropriate flag to request it.
		 */
		set_bit(FLAG_HOLD_HCI_CONN, &chan->flags);
		break;
157
	}
158

159
	bacpy(&chan->src, &la.l2_bdaddr);
160
	chan->src_type = la.l2_bdaddr_type;
161

162
	if (chan->psm && bdaddr_type_is_le(chan->src_type))
163
		chan->mode = L2CAP_MODE_LE_FLOWCTL;
164

165
	chan->state = BT_BOUND;
166
	sk->sk_state = BT_BOUND;
167 168 169 170 171 172

done:
	release_sock(sk);
	return err;
}

173 174
static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr,
			      int alen, int flags)
175 176
{
	struct sock *sk = sock->sk;
177
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
178 179 180 181 182 183 184 185 186 187 188 189 190
	struct sockaddr_l2 la;
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (!addr || alen < sizeof(addr->sa_family) ||
	    addr->sa_family != AF_BLUETOOTH)
		return -EINVAL;

	memset(&la, 0, sizeof(la));
	len = min_t(unsigned int, sizeof(la), alen);
	memcpy(&la, addr, len);

191
	if (la.l2_cid && la.l2_psm)
192 193
		return -EINVAL;

194 195 196
	if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
		return -EINVAL;

197 198 199 200 201 202 203 204 205 206 207 208 209 210
	/* Check that the socket wasn't bound to something that
	 * conflicts with the address given to connect(). If chan->src
	 * is BDADDR_ANY it means bind() was never used, in which case
	 * chan->src_type and la.l2_bdaddr_type do not need to match.
	 */
	if (chan->src_type == BDADDR_BREDR && bacmp(&chan->src, BDADDR_ANY) &&
	    bdaddr_type_is_le(la.l2_bdaddr_type)) {
		/* Old user space versions will try to incorrectly bind
		 * the ATT socket using BDADDR_BREDR. We need to accept
		 * this and fix up the source address type only when
		 * both the source CID and destination CID indicate
		 * ATT. Anything else is an invalid combination.
		 */
		if (chan->scid != L2CAP_CID_ATT ||
211
		    la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
212 213 214 215 216 217 218 219 220 221
			return -EINVAL;

		/* We don't have the hdev available here to make a
		 * better decision on random vs public, but since all
		 * user space versions that exhibit this issue anyway do
		 * not support random local addresses assuming public
		 * here is good enough.
		 */
		chan->src_type = BDADDR_LE_PUBLIC;
	}
222 223 224 225

	if (chan->src_type != BDADDR_BREDR && la.l2_bdaddr_type == BDADDR_BREDR)
		return -EINVAL;

226 227
	if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
		/* We only allow ATT user space socket */
228
		if (la.l2_cid &&
229
		    la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
230 231 232
			return -EINVAL;
	}

233
	if (chan->psm && bdaddr_type_is_le(chan->src_type))
234
		chan->mode = L2CAP_MODE_LE_FLOWCTL;
235

S
Santosh Nayak 已提交
236
	err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
237
				 &la.l2_bdaddr, la.l2_bdaddr_type);
238
	if (err)
239
		return err;
240

241 242
	lock_sock(sk);

243
	err = bt_sock_wait_state(sk, BT_CONNECTED,
244
				 sock_sndtimeo(sk, flags & O_NONBLOCK));
245 246 247

	release_sock(sk);

248 249 250
	return err;
}

251 252 253
static int l2cap_sock_listen(struct socket *sock, int backlog)
{
	struct sock *sk = sock->sk;
254
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
255 256 257 258 259 260
	int err = 0;

	BT_DBG("sk %p backlog %d", sk, backlog);

	lock_sock(sk);

261
	if (sk->sk_state != BT_BOUND) {
262 263 264 265
		err = -EBADFD;
		goto done;
	}

266 267 268 269 270
	if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
		err = -EINVAL;
		goto done;
	}

271
	switch (chan->mode) {
272
	case L2CAP_MODE_BASIC:
273
	case L2CAP_MODE_LE_FLOWCTL:
274 275 276 277 278 279 280
		break;
	case L2CAP_MODE_ERTM:
	case L2CAP_MODE_STREAMING:
		if (!disable_ertm)
			break;
		/* fall through */
	default:
281
		err = -EOPNOTSUPP;
282 283 284 285 286
		goto done;
	}

	sk->sk_max_ack_backlog = backlog;
	sk->sk_ack_backlog = 0;
287

288 289 290 291 292 293
	/* Listening channels need to use nested locking in order not to
	 * cause lockdep warnings when the created child channels end up
	 * being locked in the same thread as the parent channel.
	 */
	atomic_set(&chan->nesting, L2CAP_NESTING_PARENT);

294
	chan->state = BT_LISTEN;
295 296 297 298 299 300 301
	sk->sk_state = BT_LISTEN;

done:
	release_sock(sk);
	return err;
}

302 303
static int l2cap_sock_accept(struct socket *sock, struct socket *newsock,
			     int flags)
304 305 306 307 308 309
{
	DECLARE_WAITQUEUE(wait, current);
	struct sock *sk = sock->sk, *nsk;
	long timeo;
	int err = 0;

310
	lock_sock_nested(sk, L2CAP_NESTING_PARENT);
311 312 313 314 315 316 317

	timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);

	BT_DBG("sk %p timeo %ld", sk, timeo);

	/* Wait for an incoming connection. (wake-one). */
	add_wait_queue_exclusive(sk_sleep(sk), &wait);
318
	while (1) {
319
		set_current_state(TASK_INTERRUPTIBLE);
320 321 322

		if (sk->sk_state != BT_LISTEN) {
			err = -EBADFD;
323 324 325
			break;
		}

326 327 328
		nsk = bt_accept_dequeue(sk, newsock);
		if (nsk)
			break;
329

330 331
		if (!timeo) {
			err = -EAGAIN;
332 333 334 335 336 337 338
			break;
		}

		if (signal_pending(current)) {
			err = sock_intr_errno(timeo);
			break;
		}
339 340 341

		release_sock(sk);
		timeo = schedule_timeout(timeo);
342
		lock_sock_nested(sk, L2CAP_NESTING_PARENT);
343
	}
344
	__set_current_state(TASK_RUNNING);
345 346 347 348 349 350 351 352 353 354 355 356 357 358
	remove_wait_queue(sk_sleep(sk), &wait);

	if (err)
		goto done;

	newsock->state = SS_CONNECTED;

	BT_DBG("new socket %p", nsk);

done:
	release_sock(sk);
	return err;
}

359 360
static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr,
			      int *len, int peer)
361 362 363
{
	struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
	struct sock *sk = sock->sk;
364
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
365 366 367

	BT_DBG("sock %p, sk %p", sock, sk);

368
	if (peer && sk->sk_state != BT_CONNECTED &&
369 370
	    sk->sk_state != BT_CONNECT && sk->sk_state != BT_CONNECT2 &&
	    sk->sk_state != BT_CONFIG)
371 372
		return -ENOTCONN;

373
	memset(la, 0, sizeof(struct sockaddr_l2));
374 375 376
	addr->sa_family = AF_BLUETOOTH;
	*len = sizeof(struct sockaddr_l2);

377 378
	la->l2_psm = chan->psm;

379
	if (peer) {
380
		bacpy(&la->l2_bdaddr, &chan->dst);
381
		la->l2_cid = cpu_to_le16(chan->dcid);
382
		la->l2_bdaddr_type = chan->dst_type;
383
	} else {
384
		bacpy(&la->l2_bdaddr, &chan->src);
385
		la->l2_cid = cpu_to_le16(chan->scid);
386
		la->l2_bdaddr_type = chan->src_type;
387 388 389 390 391
	}

	return 0;
}

392 393
static int l2cap_sock_getsockopt_old(struct socket *sock, int optname,
				     char __user *optval, int __user *optlen)
394 395
{
	struct sock *sk = sock->sk;
396
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
397 398 399 400 401 402 403 404 405 406 407 408 409 410
	struct l2cap_options opts;
	struct l2cap_conninfo cinfo;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
411 412 413 414 415 416 417 418 419 420
		/* LE sockets should use BT_SNDMTU/BT_RCVMTU, but since
		 * legacy ATT code depends on getsockopt for
		 * L2CAP_OPTIONS we need to let this pass.
		 */
		if (bdaddr_type_is_le(chan->src_type) &&
		    chan->scid != L2CAP_CID_ATT) {
			err = -EINVAL;
			break;
		}

421
		memset(&opts, 0, sizeof(opts));
422 423 424 425
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
426 427
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
428
		opts.txwin_size = chan->tx_win;
429 430 431 432 433 434 435 436

		len = min_t(unsigned int, len, sizeof(opts));
		if (copy_to_user(optval, (char *) &opts, len))
			err = -EFAULT;

		break;

	case L2CAP_LM:
437
		switch (chan->sec_level) {
438 439 440 441 442 443 444 445
		case BT_SECURITY_LOW:
			opt = L2CAP_LM_AUTH;
			break;
		case BT_SECURITY_MEDIUM:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
			break;
		case BT_SECURITY_HIGH:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
446
			      L2CAP_LM_SECURE;
447
			break;
448 449 450 451
		case BT_SECURITY_FIPS:
			opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
			      L2CAP_LM_SECURE | L2CAP_LM_FIPS;
			break;
452 453 454 455 456
		default:
			opt = 0;
			break;
		}

457
		if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
458 459
			opt |= L2CAP_LM_MASTER;

460
		if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
461 462 463 464
			opt |= L2CAP_LM_RELIABLE;

		if (put_user(opt, (u32 __user *) optval))
			err = -EFAULT;
465

466 467 468 469
		break;

	case L2CAP_CONNINFO:
		if (sk->sk_state != BT_CONNECTED &&
470 471
		    !(sk->sk_state == BT_CONNECT2 &&
		      test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
472 473 474 475
			err = -ENOTCONN;
			break;
		}

476
		memset(&cinfo, 0, sizeof(cinfo));
477 478
		cinfo.hci_handle = chan->conn->hcon->handle;
		memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494

		len = min_t(unsigned int, len, sizeof(cinfo));
		if (copy_to_user(optval, (char *) &cinfo, len))
			err = -EFAULT;

		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

495 496
static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, int __user *optlen)
497 498
{
	struct sock *sk = sock->sk;
499
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
500
	struct bt_security sec;
501
	struct bt_power pwr;
502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518
	int len, err = 0;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	if (get_user(len, optlen))
		return -EFAULT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
519
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
520
		    chan->chan_type != L2CAP_CHAN_FIXED &&
521
		    chan->chan_type != L2CAP_CHAN_RAW) {
522 523 524 525
			err = -EINVAL;
			break;
		}

526
		memset(&sec, 0, sizeof(sec));
527
		if (chan->conn) {
528
			sec.level = chan->conn->hcon->sec_level;
529

530 531 532 533 534
			if (sk->sk_state == BT_CONNECTED)
				sec.key_size = chan->conn->hcon->enc_key_size;
		} else {
			sec.level = chan->sec_level;
		}
535

536 537 538 539 540 541 542 543 544 545 546 547
		len = min_t(unsigned int, len, sizeof(sec));
		if (copy_to_user(optval, (char *) &sec, len))
			err = -EFAULT;

		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

548 549
		if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
			     (u32 __user *) optval))
550 551 552 553 554
			err = -EFAULT;

		break;

	case BT_FLUSHABLE:
555
		if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
556
			     (u32 __user *) optval))
557 558 559 560
			err = -EFAULT;

		break;

561 562
	case BT_POWER:
		if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
563
		    && sk->sk_type != SOCK_RAW) {
564 565 566 567
			err = -EINVAL;
			break;
		}

568
		pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
569 570 571 572 573 574 575

		len = min_t(unsigned int, len, sizeof(pwr));
		if (copy_to_user(optval, (char *) &pwr, len))
			err = -EFAULT;

		break;

576 577 578 579 580
	case BT_CHANNEL_POLICY:
		if (put_user(chan->chan_policy, (u32 __user *) optval))
			err = -EFAULT;
		break;

581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605
	case BT_SNDMTU:
		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (sk->sk_state != BT_CONNECTED) {
			err = -ENOTCONN;
			break;
		}

		if (put_user(chan->omtu, (u16 __user *) optval))
			err = -EFAULT;
		break;

	case BT_RCVMTU:
		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (put_user(chan->imtu, (u16 __user *) optval))
			err = -EFAULT;
		break;

606 607 608 609 610 611 612 613 614
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

615 616 617
static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
{
	switch (chan->scid) {
618
	case L2CAP_CID_ATT:
619
		if (mtu < L2CAP_LE_MIN_MTU)
620 621 622 623 624 625 626 627 628 629 630
			return false;
		break;

	default:
		if (mtu < L2CAP_DEFAULT_MIN_MTU)
			return false;
	}

	return true;
}

631 632
static int l2cap_sock_setsockopt_old(struct socket *sock, int optname,
				     char __user *optval, unsigned int optlen)
633 634
{
	struct sock *sk = sock->sk;
635
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
636 637 638 639 640 641 642 643 644 645
	struct l2cap_options opts;
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	lock_sock(sk);

	switch (optname) {
	case L2CAP_OPTIONS:
646 647 648 649 650
		if (bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

651 652 653 654 655
		if (sk->sk_state == BT_CONNECTED) {
			err = -EINVAL;
			break;
		}

656 657 658 659
		opts.imtu     = chan->imtu;
		opts.omtu     = chan->omtu;
		opts.flush_to = chan->flush_to;
		opts.mode     = chan->mode;
660 661
		opts.fcs      = chan->fcs;
		opts.max_tx   = chan->max_tx;
662
		opts.txwin_size = chan->tx_win;
663 664 665 666 667 668 669

		len = min_t(unsigned int, sizeof(opts), optlen);
		if (copy_from_user((char *) &opts, optval, len)) {
			err = -EFAULT;
			break;
		}

670
		if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
671 672 673 674
			err = -EINVAL;
			break;
		}

675 676 677 678 679
		if (!l2cap_valid_mtu(chan, opts.imtu)) {
			err = -EINVAL;
			break;
		}

680 681
		chan->mode = opts.mode;
		switch (chan->mode) {
682 683
		case L2CAP_MODE_LE_FLOWCTL:
			break;
684
		case L2CAP_MODE_BASIC:
685
			clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
686 687 688 689 690 691 692 693 694 695 696
			break;
		case L2CAP_MODE_ERTM:
		case L2CAP_MODE_STREAMING:
			if (!disable_ertm)
				break;
			/* fall through */
		default:
			err = -EINVAL;
			break;
		}

697 698
		chan->imtu = opts.imtu;
		chan->omtu = opts.omtu;
699 700
		chan->fcs  = opts.fcs;
		chan->max_tx = opts.max_tx;
701
		chan->tx_win = opts.txwin_size;
702
		chan->flush_to = opts.flush_to;
703 704 705 706 707 708 709 710
		break;

	case L2CAP_LM:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

711 712 713 714 715
		if (opt & L2CAP_LM_FIPS) {
			err = -EINVAL;
			break;
		}

716
		if (opt & L2CAP_LM_AUTH)
717
			chan->sec_level = BT_SECURITY_LOW;
718
		if (opt & L2CAP_LM_ENCRYPT)
719
			chan->sec_level = BT_SECURITY_MEDIUM;
720
		if (opt & L2CAP_LM_SECURE)
721
			chan->sec_level = BT_SECURITY_HIGH;
722

723 724 725 726
		if (opt & L2CAP_LM_MASTER)
			set_bit(FLAG_ROLE_SWITCH, &chan->flags);
		else
			clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
727 728 729 730 731

		if (opt & L2CAP_LM_RELIABLE)
			set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
732 733 734 735 736 737 738 739 740 741 742
		break;

	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}

743 744
static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname,
				 char __user *optval, unsigned int optlen)
745 746
{
	struct sock *sk = sock->sk;
747
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
748
	struct bt_security sec;
749
	struct bt_power pwr;
750
	struct l2cap_conn *conn;
751 752 753 754 755 756 757 758 759 760 761 762 763 764 765
	int len, err = 0;
	u32 opt;

	BT_DBG("sk %p", sk);

	if (level == SOL_L2CAP)
		return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);

	if (level != SOL_BLUETOOTH)
		return -ENOPROTOOPT;

	lock_sock(sk);

	switch (optname) {
	case BT_SECURITY:
766
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
767
		    chan->chan_type != L2CAP_CHAN_FIXED &&
768
		    chan->chan_type != L2CAP_CHAN_RAW) {
769 770 771 772 773 774 775 776 777 778 779 780 781
			err = -EINVAL;
			break;
		}

		sec.level = BT_SECURITY_LOW;

		len = min_t(unsigned int, sizeof(sec), optlen);
		if (copy_from_user((char *) &sec, optval, len)) {
			err = -EFAULT;
			break;
		}

		if (sec.level < BT_SECURITY_LOW ||
782
		    sec.level > BT_SECURITY_HIGH) {
783 784 785 786
			err = -EINVAL;
			break;
		}

787
		chan->sec_level = sec.level;
788

789 790 791
		if (!chan->conn)
			break;

792
		conn = chan->conn;
793 794

		/*change security for LE channels */
795
		if (chan->scid == L2CAP_CID_ATT) {
796
			if (smp_conn_security(conn->hcon, sec.level))
797
				break;
798
			set_bit(FLAG_PENDING_SECURITY, &chan->flags);
799
			sk->sk_state = BT_CONFIG;
800
			chan->state = BT_CONFIG;
801

802 803
		/* or for ACL link */
		} else if ((sk->sk_state == BT_CONNECT2 &&
804
			    test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
805
			   sk->sk_state == BT_CONNECTED) {
806
			if (!l2cap_chan_check_security(chan, true))
807
				set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
808 809
			else
				sk->sk_state_change(sk);
810 811
		} else {
			err = -EINVAL;
812
		}
813 814 815 816 817 818 819 820 821 822 823 824 825
		break;

	case BT_DEFER_SETUP:
		if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
			err = -EINVAL;
			break;
		}

		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

826
		if (opt) {
827
			set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
828 829
			set_bit(FLAG_DEFER_SETUP, &chan->flags);
		} else {
830
			clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
831 832
			clear_bit(FLAG_DEFER_SETUP, &chan->flags);
		}
833 834 835 836 837 838 839 840 841 842 843 844 845 846
		break;

	case BT_FLUSHABLE:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_FLUSHABLE_ON) {
			err = -EINVAL;
			break;
		}

		if (opt == BT_FLUSHABLE_OFF) {
847
			conn = chan->conn;
L
Lucas De Marchi 已提交
848
			/* proceed further only when we have l2cap_conn and
849 850 851 852 853 854 855
			   No Flush support in the LM */
			if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
				err = -EINVAL;
				break;
			}
		}

856 857 858 859
		if (opt)
			set_bit(FLAG_FLUSHABLE, &chan->flags);
		else
			clear_bit(FLAG_FLUSHABLE, &chan->flags);
860 861
		break;

862 863
	case BT_POWER:
		if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
864
		    chan->chan_type != L2CAP_CHAN_RAW) {
865 866 867 868 869 870 871 872 873 874 875
			err = -EINVAL;
			break;
		}

		pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;

		len = min_t(unsigned int, sizeof(pwr), optlen);
		if (copy_from_user((char *) &pwr, optval, len)) {
			err = -EFAULT;
			break;
		}
876 877 878 879 880

		if (pwr.force_active)
			set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
		else
			clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
881 882
		break;

883 884 885 886 887 888 889 890 891 892 893 894
	case BT_CHANNEL_POLICY:
		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
			err = -EINVAL;
			break;
		}

		if (chan->mode != L2CAP_MODE_ERTM &&
895
		    chan->mode != L2CAP_MODE_STREAMING) {
896 897 898 899 900
			err = -EOPNOTSUPP;
			break;
		}

		chan->chan_policy = (u8) opt;
901 902 903 904 905

		if (sk->sk_state == BT_CONNECTED &&
		    chan->move_role == L2CAP_MOVE_ROLE_NONE)
			l2cap_move_start(chan);

906 907
		break;

908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938
	case BT_SNDMTU:
		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		/* Setting is not supported as it's the remote side that
		 * decides this.
		 */
		err = -EPERM;
		break;

	case BT_RCVMTU:
		if (!bdaddr_type_is_le(chan->src_type)) {
			err = -EINVAL;
			break;
		}

		if (sk->sk_state == BT_CONNECTED) {
			err = -EISCONN;
			break;
		}

		if (get_user(opt, (u32 __user *) optval)) {
			err = -EFAULT;
			break;
		}

		chan->imtu = opt;
		break;

939 940 941 942 943 944 945 946
	default:
		err = -ENOPROTOOPT;
		break;
	}

	release_sock(sk);
	return err;
}
947

948 949
static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len)
950 951
{
	struct sock *sk = sock->sk;
952
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
953 954 955 956 957 958 959 960 961 962 963
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	err = sock_error(sk);
	if (err)
		return err;

	if (msg->msg_flags & MSG_OOB)
		return -EOPNOTSUPP;

964
	if (sk->sk_state != BT_CONNECTED)
965
		return -ENOTCONN;
966

967 968 969 970 971 972
	lock_sock(sk);
	err = bt_sock_wait_ready(sk, msg->msg_flags);
	release_sock(sk);
	if (err)
		return err;

973
	l2cap_chan_lock(chan);
974
	err = l2cap_chan_send(chan, msg, len);
975
	l2cap_chan_unlock(chan);
976 977 978

	return err;
}
979

980 981
static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
			      struct msghdr *msg, size_t len, int flags)
982 983
{
	struct sock *sk = sock->sk;
984 985
	struct l2cap_pinfo *pi = l2cap_pi(sk);
	int err;
986 987 988

	lock_sock(sk);

989 990
	if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
						    &bt_sk(sk)->flags)) {
991 992 993 994 995 996 997 998 999
		if (bdaddr_type_is_le(pi->chan->src_type)) {
			sk->sk_state = BT_CONNECTED;
			pi->chan->state = BT_CONNECTED;
			__l2cap_le_connect_rsp_defer(pi->chan);
		} else {
			sk->sk_state = BT_CONFIG;
			pi->chan->state = BT_CONFIG;
			__l2cap_connect_rsp_defer(pi->chan);
		}
1000

1001 1002
		err = 0;
		goto done;
1003 1004 1005 1006 1007
	}

	release_sock(sk);

	if (sock->type == SOCK_STREAM)
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034
		err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
	else
		err = bt_sock_recvmsg(iocb, sock, msg, len, flags);

	if (pi->chan->mode != L2CAP_MODE_ERTM)
		return err;

	/* Attempt to put pending rx data in the socket buffer */

	lock_sock(sk);

	if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
		goto done;

	if (pi->rx_busy_skb) {
		if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
			pi->rx_busy_skb = NULL;
		else
			goto done;
	}

	/* Restore data flow when half of the receive buffer is
	 * available.  This avoids resending large numbers of
	 * frames.
	 */
	if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
		l2cap_chan_busy(pi->chan, 0);
1035

1036 1037 1038
done:
	release_sock(sk);
	return err;
1039 1040
}

1041 1042 1043
/* Kill socket (only if zapped and orphan)
 * Must be called on unlocked socket.
 */
1044
static void l2cap_sock_kill(struct sock *sk)
1045 1046 1047 1048
{
	if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
		return;

1049
	BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
1050 1051

	/* Kill poor orphan */
1052

1053
	l2cap_chan_put(l2cap_pi(sk)->chan);
1054 1055 1056 1057
	sock_set_flag(sk, SOCK_DEAD);
	sock_put(sk);
}

1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089
static int __l2cap_wait_ack(struct sock *sk)
{
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
	DECLARE_WAITQUEUE(wait, current);
	int err = 0;
	int timeo = HZ/5;

	add_wait_queue(sk_sleep(sk), &wait);
	set_current_state(TASK_INTERRUPTIBLE);
	while (chan->unacked_frames > 0 && chan->conn) {
		if (!timeo)
			timeo = HZ/5;

		if (signal_pending(current)) {
			err = sock_intr_errno(timeo);
			break;
		}

		release_sock(sk);
		timeo = schedule_timeout(timeo);
		lock_sock(sk);
		set_current_state(TASK_INTERRUPTIBLE);

		err = sock_error(sk);
		if (err)
			break;
	}
	set_current_state(TASK_RUNNING);
	remove_wait_queue(sk_sleep(sk), &wait);
	return err;
}

1090 1091 1092
static int l2cap_sock_shutdown(struct socket *sock, int how)
{
	struct sock *sk = sock->sk;
1093
	struct l2cap_chan *chan;
1094
	struct l2cap_conn *conn;
1095 1096 1097 1098 1099 1100 1101
	int err = 0;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

1102
	chan = l2cap_pi(sk)->chan;
1103 1104 1105 1106
	conn = chan->conn;

	if (conn)
		mutex_lock(&conn->chan_lock);
1107

1108
	l2cap_chan_lock(chan);
1109
	lock_sock(sk);
1110

1111
	if (!sk->sk_shutdown) {
1112
		if (chan->mode == L2CAP_MODE_ERTM)
1113 1114 1115
			err = __l2cap_wait_ack(sk);

		sk->sk_shutdown = SHUTDOWN_MASK;
1116

1117
		release_sock(sk);
1118
		l2cap_chan_close(chan, 0);
1119
		lock_sock(sk);
1120

1121 1122
		if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
		    !(current->flags & PF_EXITING))
1123
			err = bt_sock_wait_state(sk, BT_CLOSED,
1124
						 sk->sk_lingertime);
1125 1126 1127 1128 1129 1130
	}

	if (!err && sk->sk_err)
		err = -sk->sk_err;

	release_sock(sk);
1131
	l2cap_chan_unlock(chan);
1132 1133 1134 1135

	if (conn)
		mutex_unlock(&conn->chan_lock);

1136 1137 1138
	return err;
}

1139 1140 1141 1142 1143 1144 1145 1146 1147 1148
static int l2cap_sock_release(struct socket *sock)
{
	struct sock *sk = sock->sk;
	int err;

	BT_DBG("sock %p, sk %p", sock, sk);

	if (!sk)
		return 0;

1149 1150
	bt_sock_unlink(&l2cap_sk_list, sk);

1151 1152 1153 1154 1155 1156 1157
	err = l2cap_sock_shutdown(sock, 2);

	sock_orphan(sk);
	l2cap_sock_kill(sk);
	return err;
}

1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176
static void l2cap_sock_cleanup_listen(struct sock *parent)
{
	struct sock *sk;

	BT_DBG("parent %p", parent);

	/* Close not yet accepted channels */
	while ((sk = bt_accept_dequeue(parent, NULL))) {
		struct l2cap_chan *chan = l2cap_pi(sk)->chan;

		l2cap_chan_lock(chan);
		__clear_chan_timer(chan);
		l2cap_chan_close(chan, ECONNRESET);
		l2cap_chan_unlock(chan);

		l2cap_sock_kill(sk);
	}
}

1177
static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
1178
{
1179
	struct sock *sk, *parent = chan->data;
1180

1181 1182
	lock_sock(parent);

1183 1184 1185
	/* Check for backlog size */
	if (sk_acceptq_is_full(parent)) {
		BT_DBG("backlog full %d", parent->sk_ack_backlog);
J
Jukka Taimisto 已提交
1186
		release_sock(parent);
1187 1188 1189
		return NULL;
	}

1190
	sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
1191
			      GFP_ATOMIC);
J
Jukka Taimisto 已提交
1192 1193
	if (!sk) {
		release_sock(parent);
1194
		return NULL;
J
Jukka Taimisto 已提交
1195
        }
1196

1197 1198
	bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);

1199 1200
	l2cap_sock_init(sk, parent);

1201 1202
	bt_accept_enqueue(parent, sk);

1203 1204
	release_sock(parent);

1205 1206 1207
	return l2cap_pi(sk)->chan;
}

1208
static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
1209
{
1210
	struct sock *sk = chan->data;
1211
	int err;
1212

1213 1214
	lock_sock(sk);

1215
	if (l2cap_pi(sk)->rx_busy_skb) {
1216 1217 1218
		err = -ENOMEM;
		goto done;
	}
1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230

	err = sock_queue_rcv_skb(sk, skb);

	/* For ERTM, handle one skb that doesn't fit into the recv
	 * buffer.  This is important to do because the data frames
	 * have already been acked, so the skb cannot be discarded.
	 *
	 * Notify the l2cap core that the buffer is full, so the
	 * LOCAL_BUSY state is entered and no more frames are
	 * acked and reassembled until there is buffer space
	 * available.
	 */
1231 1232 1233
	if (err < 0 && chan->mode == L2CAP_MODE_ERTM) {
		l2cap_pi(sk)->rx_busy_skb = skb;
		l2cap_chan_busy(chan, 1);
1234 1235
		err = 0;
	}
1236

1237 1238 1239
done:
	release_sock(sk);

1240
	return err;
1241 1242
}

1243
static void l2cap_sock_close_cb(struct l2cap_chan *chan)
1244
{
1245
	struct sock *sk = chan->data;
1246 1247 1248 1249

	l2cap_sock_kill(sk);
}

1250 1251 1252 1253 1254
static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
{
	struct sock *sk = chan->data;
	struct sock *parent;

1255 1256 1257 1258 1259 1260 1261 1262
	/* This callback can be called both for server (BT_LISTEN)
	 * sockets as well as "normal" ones. To avoid lockdep warnings
	 * with child socket locking (through l2cap_sock_cleanup_listen)
	 * we need separation into separate nesting levels. The simplest
	 * way to accomplish this is to inherit the nesting level used
	 * for the channel.
	 */
	lock_sock_nested(sk, atomic_read(&chan->nesting));
1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286

	parent = bt_sk(sk)->parent;

	sock_set_flag(sk, SOCK_ZAPPED);

	switch (chan->state) {
	case BT_OPEN:
	case BT_BOUND:
	case BT_CLOSED:
		break;
	case BT_LISTEN:
		l2cap_sock_cleanup_listen(sk);
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		break;
	default:
		sk->sk_state = BT_CLOSED;
		chan->state = BT_CLOSED;

		sk->sk_err = err;

		if (parent) {
			bt_accept_unlink(sk);
1287
			parent->sk_data_ready(parent);
1288 1289 1290 1291 1292 1293 1294 1295 1296 1297
		} else {
			sk->sk_state_change(sk);
		}

		break;
	}

	release_sock(sk);
}

1298 1299
static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state,
				       int err)
1300
{
1301
	struct sock *sk = chan->data;
1302 1303

	sk->sk_state = state;
1304 1305 1306

	if (err)
		sk->sk_err = err;
1307 1308
}

1309
static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
1310
					       unsigned long hdr_len,
1311
					       unsigned long len, int nb)
1312
{
1313
	struct sock *sk = chan->data;
1314 1315 1316
	struct sk_buff *skb;
	int err;

1317
	l2cap_chan_unlock(chan);
1318
	skb = bt_skb_send_alloc(sk, hdr_len + len, nb, &err);
1319 1320
	l2cap_chan_lock(chan);

1321 1322
	if (!skb)
		return ERR_PTR(err);
1323

1324 1325
	skb->priority = sk->sk_priority;

1326 1327
	bt_cb(skb)->chan = chan;

1328
	return skb;
1329 1330
}

1331 1332 1333 1334 1335 1336 1337
static int l2cap_sock_memcpy_fromiovec_cb(struct l2cap_chan *chan,
					  unsigned char *kdata,
					  struct iovec *iov, int len)
{
	return memcpy_fromiovec(kdata, iov, len);
}

1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352
static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;
	struct sock *parent;

	lock_sock(sk);

	parent = bt_sk(sk)->parent;

	BT_DBG("sk %p, parent %p", sk, parent);

	sk->sk_state = BT_CONNECTED;
	sk->sk_state_change(sk);

	if (parent)
1353
		parent->sk_data_ready(parent);
1354 1355 1356 1357

	release_sock(sk);
}

1358 1359
static void l2cap_sock_defer_cb(struct l2cap_chan *chan)
{
1360 1361 1362
	struct sock *parent, *sk = chan->data;

	lock_sock(sk);
1363

1364
	parent = bt_sk(sk)->parent;
1365
	if (parent)
1366
		parent->sk_data_ready(parent);
1367 1368

	release_sock(sk);
1369 1370
}

1371 1372 1373 1374
static void l2cap_sock_resume_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

1375 1376 1377 1378 1379
	if (test_and_clear_bit(FLAG_PENDING_SECURITY, &chan->flags)) {
		sk->sk_state = BT_CONNECTED;
		chan->state = BT_CONNECTED;
	}

1380 1381 1382 1383
	clear_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
	sk->sk_state_change(sk);
}

1384 1385 1386 1387 1388 1389 1390 1391 1392
static void l2cap_sock_set_shutdown_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	lock_sock(sk);
	sk->sk_shutdown = SHUTDOWN_MASK;
	release_sock(sk);
}

1393 1394 1395 1396 1397 1398 1399
static long l2cap_sock_get_sndtimeo_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	return sk->sk_sndtimeo;
}

1400 1401 1402 1403 1404 1405 1406 1407
static void l2cap_sock_suspend_cb(struct l2cap_chan *chan)
{
	struct sock *sk = chan->data;

	set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
	sk->sk_state_change(sk);
}

1408
static const struct l2cap_ops l2cap_chan_ops = {
1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422
	.name			= "L2CAP Socket Interface",
	.new_connection		= l2cap_sock_new_connection_cb,
	.recv			= l2cap_sock_recv_cb,
	.close			= l2cap_sock_close_cb,
	.teardown		= l2cap_sock_teardown_cb,
	.state_change		= l2cap_sock_state_change_cb,
	.ready			= l2cap_sock_ready_cb,
	.defer			= l2cap_sock_defer_cb,
	.resume			= l2cap_sock_resume_cb,
	.suspend		= l2cap_sock_suspend_cb,
	.set_shutdown		= l2cap_sock_set_shutdown_cb,
	.get_sndtimeo		= l2cap_sock_get_sndtimeo_cb,
	.alloc_skb		= l2cap_sock_alloc_skb_cb,
	.memcpy_fromiovec	= l2cap_sock_memcpy_fromiovec_cb,
1423 1424
};

1425 1426 1427 1428
static void l2cap_sock_destruct(struct sock *sk)
{
	BT_DBG("sk %p", sk);

1429 1430
	if (l2cap_pi(sk)->chan)
		l2cap_chan_put(l2cap_pi(sk)->chan);
1431

1432 1433 1434 1435 1436
	if (l2cap_pi(sk)->rx_busy_skb) {
		kfree_skb(l2cap_pi(sk)->rx_busy_skb);
		l2cap_pi(sk)->rx_busy_skb = NULL;
	}

1437 1438 1439 1440
	skb_queue_purge(&sk->sk_receive_queue);
	skb_queue_purge(&sk->sk_write_queue);
}

1441 1442 1443
static void l2cap_skb_msg_name(struct sk_buff *skb, void *msg_name,
			       int *msg_namelen)
{
1444
	DECLARE_SOCKADDR(struct sockaddr_l2 *, la, msg_name);
1445 1446 1447 1448 1449 1450 1451 1452 1453

	memset(la, 0, sizeof(struct sockaddr_l2));
	la->l2_family = AF_BLUETOOTH;
	la->l2_psm = bt_cb(skb)->psm;
	bacpy(&la->l2_bdaddr, &bt_cb(skb)->bdaddr);

	*msg_namelen = sizeof(struct sockaddr_l2);
}

1454
static void l2cap_sock_init(struct sock *sk, struct sock *parent)
1455
{
1456
	struct l2cap_chan *chan = l2cap_pi(sk)->chan;
1457 1458 1459 1460

	BT_DBG("sk %p", sk);

	if (parent) {
1461 1462
		struct l2cap_chan *pchan = l2cap_pi(parent)->chan;

1463
		sk->sk_type = parent->sk_type;
1464
		bt_sk(sk)->flags = bt_sk(parent)->flags;
1465

1466
		chan->chan_type = pchan->chan_type;
1467 1468
		chan->imtu = pchan->imtu;
		chan->omtu = pchan->omtu;
1469
		chan->conf_state = pchan->conf_state;
1470
		chan->mode = pchan->mode;
1471 1472 1473
		chan->fcs  = pchan->fcs;
		chan->max_tx = pchan->max_tx;
		chan->tx_win = pchan->tx_win;
1474
		chan->tx_win_max = pchan->tx_win_max;
1475
		chan->sec_level = pchan->sec_level;
1476
		chan->flags = pchan->flags;
1477 1478
		chan->tx_credits = pchan->tx_credits;
		chan->rx_credits = pchan->rx_credits;
1479

1480 1481 1482 1483 1484
		if (chan->chan_type == L2CAP_CHAN_FIXED) {
			chan->scid = pchan->scid;
			chan->dcid = pchan->scid;
		}

1485
		security_sk_clone(parent, sk);
1486
	} else {
1487 1488 1489 1490 1491 1492
		switch (sk->sk_type) {
		case SOCK_RAW:
			chan->chan_type = L2CAP_CHAN_RAW;
			break;
		case SOCK_DGRAM:
			chan->chan_type = L2CAP_CHAN_CONN_LESS;
1493
			bt_sk(sk)->skb_msg_name = l2cap_skb_msg_name;
1494 1495 1496 1497 1498 1499 1500
			break;
		case SOCK_SEQPACKET:
		case SOCK_STREAM:
			chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
			break;
		}

1501 1502
		chan->imtu = L2CAP_DEFAULT_MTU;
		chan->omtu = 0;
1503
		if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
1504
			chan->mode = L2CAP_MODE_ERTM;
1505
			set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
1506
		} else {
1507
			chan->mode = L2CAP_MODE_BASIC;
1508
		}
1509 1510

		l2cap_chan_set_defaults(chan);
1511 1512 1513
	}

	/* Default config options */
1514
	chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
1515 1516 1517

	chan->data = sk;
	chan->ops = &l2cap_chan_ops;
1518 1519 1520 1521 1522 1523 1524 1525
}

static struct proto l2cap_proto = {
	.name		= "L2CAP",
	.owner		= THIS_MODULE,
	.obj_size	= sizeof(struct l2cap_pinfo)
};

1526 1527
static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
				     int proto, gfp_t prio)
1528 1529
{
	struct sock *sk;
1530
	struct l2cap_chan *chan;
1531 1532 1533 1534 1535 1536 1537 1538 1539

	sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
	if (!sk)
		return NULL;

	sock_init_data(sock, sk);
	INIT_LIST_HEAD(&bt_sk(sk)->accept_q);

	sk->sk_destruct = l2cap_sock_destruct;
1540
	sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
1541 1542 1543 1544 1545 1546

	sock_reset_flag(sk, SOCK_ZAPPED);

	sk->sk_protocol = proto;
	sk->sk_state = BT_OPEN;

1547
	chan = l2cap_chan_create();
1548
	if (!chan) {
1549
		sk_free(sk);
1550 1551 1552
		return NULL;
	}

1553 1554
	l2cap_chan_hold(chan);

1555 1556
	l2cap_pi(sk)->chan = chan;

1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569
	return sk;
}

static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
			     int kern)
{
	struct sock *sk;

	BT_DBG("sock %p", sock);

	sock->state = SS_UNCONNECTED;

	if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1570
	    sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582
		return -ESOCKTNOSUPPORT;

	if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
		return -EPERM;

	sock->ops = &l2cap_sock_ops;

	sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
	if (!sk)
		return -ENOMEM;

	l2cap_sock_init(sk, NULL);
1583
	bt_sock_link(&l2cap_sk_list, sk);
1584 1585 1586
	return 0;
}

1587
static const struct proto_ops l2cap_sock_ops = {
1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606
	.family		= PF_BLUETOOTH,
	.owner		= THIS_MODULE,
	.release	= l2cap_sock_release,
	.bind		= l2cap_sock_bind,
	.connect	= l2cap_sock_connect,
	.listen		= l2cap_sock_listen,
	.accept		= l2cap_sock_accept,
	.getname	= l2cap_sock_getname,
	.sendmsg	= l2cap_sock_sendmsg,
	.recvmsg	= l2cap_sock_recvmsg,
	.poll		= bt_sock_poll,
	.ioctl		= bt_sock_ioctl,
	.mmap		= sock_no_mmap,
	.socketpair	= sock_no_socketpair,
	.shutdown	= l2cap_sock_shutdown,
	.setsockopt	= l2cap_sock_setsockopt,
	.getsockopt	= l2cap_sock_getsockopt
};

1607 1608 1609 1610 1611 1612 1613 1614
static const struct net_proto_family l2cap_sock_family_ops = {
	.family	= PF_BLUETOOTH,
	.owner	= THIS_MODULE,
	.create	= l2cap_sock_create,
};

int __init l2cap_init_sockets(void)
{
1615
	int err;
1616

1617 1618 1619
	err = proto_register(&l2cap_proto, 0);
	if (err < 0)
		return err;
1620

1621
	err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
1622 1623
	if (err < 0) {
		BT_ERR("L2CAP socket registration failed");
1624
		goto error;
1625 1626
	}

1627
	err = bt_procfs_init(&init_net, "l2cap", &l2cap_sk_list,
1628
			     NULL);
1629 1630 1631 1632 1633
	if (err < 0) {
		BT_ERR("Failed to create L2CAP proc file");
		bt_sock_unregister(BTPROTO_L2CAP);
		goto error;
	}
1634

1635
	BT_INFO("L2CAP socket layer initialized");
1636

1637
	return 0;
1638 1639

error:
1640 1641
	proto_unregister(&l2cap_proto);
	return err;
1642 1643 1644 1645
}

void l2cap_cleanup_sockets(void)
{
1646
	bt_procfs_cleanup(&init_net, "l2cap");
1647
	bt_sock_unregister(BTPROTO_L2CAP);
1648
	proto_unregister(&l2cap_proto);
1649
}