Bluetooth: L2CAP: Fix using default Flush Timeout for EFS
[deliverable/linux.git] / net / bluetooth / l2cap_sock.c
CommitLineData
bb58f747
GP
1/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4 Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
5 Copyright (C) 2010 Google Inc.
590051de 6 Copyright (C) 2011 ProFUSION Embedded Systems
bb58f747
GP
7
8 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License version 2 as
12 published by the Free Software Foundation;
13
14 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
17 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
18 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
19 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
20 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
21 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22
23 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
24 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
25 SOFTWARE IS DISCLAIMED.
26*/
27
28/* Bluetooth L2CAP sockets. */
29
bc3b2d7f 30#include <linux/export.h>
6230c9b4 31
bb58f747 32#include <net/bluetooth/bluetooth.h>
33575df7 33#include <net/bluetooth/hci_core.h>
bb58f747 34#include <net/bluetooth/l2cap.h>
f1cb9af5 35#include <net/bluetooth/smp.h>
bb58f747 36
5b28d95c
MY
37static struct bt_sock_list l2cap_sk_list = {
38 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
39};
40
cf2f90f5 41static const struct proto_ops l2cap_sock_ops;
80808e43
GP
42static void l2cap_sock_init(struct sock *sk, struct sock *parent);
43static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio);
cf2f90f5 44
af6bcd82
GP
45static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
46{
47 struct sock *sk = sock->sk;
4343478f 48 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
af6bcd82
GP
49 struct sockaddr_l2 la;
50 int len, err = 0;
51
52 BT_DBG("sk %p", sk);
53
54 if (!addr || addr->sa_family != AF_BLUETOOTH)
55 return -EINVAL;
56
57 memset(&la, 0, sizeof(la));
58 len = min_t(unsigned int, sizeof(la), alen);
59 memcpy(&la, addr, len);
60
b62f328b 61 if (la.l2_cid && la.l2_psm)
af6bcd82
GP
62 return -EINVAL;
63
64 lock_sock(sk);
65
66 if (sk->sk_state != BT_OPEN) {
67 err = -EBADFD;
68 goto done;
69 }
70
71 if (la.l2_psm) {
72 __u16 psm = __le16_to_cpu(la.l2_psm);
73
74 /* PSM must be odd and lsb of upper byte must be 0 */
75 if ((psm & 0x0101) != 0x0001) {
76 err = -EINVAL;
77 goto done;
78 }
79
80 /* Restrict usage of well-known PSMs */
81 if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE)) {
82 err = -EACCES;
83 goto done;
84 }
85 }
86
9e4425ff 87 if (la.l2_cid)
6e4aff10 88 err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
9e4425ff
GP
89 else
90 err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
af6bcd82 91
9e4425ff
GP
92 if (err < 0)
93 goto done;
af6bcd82 94
2983fd68
AE
95 if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
96 __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
9e4425ff 97 chan->sec_level = BT_SECURITY_SDP;
b62f328b 98
9e4425ff 99 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
89bc500e
GP
100
101 chan->state = BT_BOUND;
9e4425ff 102 sk->sk_state = BT_BOUND;
af6bcd82
GP
103
104done:
105 release_sock(sk);
106 return err;
107}
108
4e34c50b
GP
109static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
110{
111 struct sock *sk = sock->sk;
0c1bc5c6 112 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
4e34c50b
GP
113 struct sockaddr_l2 la;
114 int len, err = 0;
115
116 BT_DBG("sk %p", sk);
117
118 if (!addr || alen < sizeof(addr->sa_family) ||
119 addr->sa_family != AF_BLUETOOTH)
120 return -EINVAL;
121
122 memset(&la, 0, sizeof(la));
123 len = min_t(unsigned int, sizeof(la), alen);
124 memcpy(&la, addr, len);
125
acd7d370 126 if (la.l2_cid && la.l2_psm)
4e34c50b
GP
127 return -EINVAL;
128
6e4aff10 129 err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
8e9f9892 130 &la.l2_bdaddr, la.l2_bdaddr_type);
4e34c50b 131 if (err)
b3fb611e 132 return err;
4e34c50b 133
6be36555
AE
134 lock_sock(sk);
135
4e34c50b
GP
136 err = bt_sock_wait_state(sk, BT_CONNECTED,
137 sock_sndtimeo(sk, flags & O_NONBLOCK));
b3fb611e
AE
138
139 release_sock(sk);
140
4e34c50b
GP
141 return err;
142}
143
af6bcd82
GP
144static int l2cap_sock_listen(struct socket *sock, int backlog)
145{
146 struct sock *sk = sock->sk;
0c1bc5c6 147 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
af6bcd82
GP
148 int err = 0;
149
150 BT_DBG("sk %p backlog %d", sk, backlog);
151
152 lock_sock(sk);
153
6b3af733 154 if (sk->sk_state != BT_BOUND) {
af6bcd82
GP
155 err = -EBADFD;
156 goto done;
157 }
158
6b3af733
MH
159 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
160 err = -EINVAL;
161 goto done;
162 }
163
0c1bc5c6 164 switch (chan->mode) {
af6bcd82
GP
165 case L2CAP_MODE_BASIC:
166 break;
167 case L2CAP_MODE_ERTM:
168 case L2CAP_MODE_STREAMING:
169 if (!disable_ertm)
170 break;
171 /* fall through */
172 default:
173 err = -ENOTSUPP;
174 goto done;
175 }
176
af6bcd82
GP
177 sk->sk_max_ack_backlog = backlog;
178 sk->sk_ack_backlog = 0;
89bc500e
GP
179
180 chan->state = BT_LISTEN;
af6bcd82
GP
181 sk->sk_state = BT_LISTEN;
182
183done:
184 release_sock(sk);
185 return err;
186}
187
c47b7c72
GP
188static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
189{
190 DECLARE_WAITQUEUE(wait, current);
191 struct sock *sk = sock->sk, *nsk;
192 long timeo;
193 int err = 0;
194
195 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
196
c47b7c72
GP
197 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
198
199 BT_DBG("sk %p timeo %ld", sk, timeo);
200
201 /* Wait for an incoming connection. (wake-one). */
202 add_wait_queue_exclusive(sk_sleep(sk), &wait);
f9a3c20a 203 while (1) {
c47b7c72 204 set_current_state(TASK_INTERRUPTIBLE);
f9a3c20a
PH
205
206 if (sk->sk_state != BT_LISTEN) {
207 err = -EBADFD;
c47b7c72
GP
208 break;
209 }
210
f9a3c20a
PH
211 nsk = bt_accept_dequeue(sk, newsock);
212 if (nsk)
213 break;
c47b7c72 214
f9a3c20a
PH
215 if (!timeo) {
216 err = -EAGAIN;
c47b7c72
GP
217 break;
218 }
219
220 if (signal_pending(current)) {
221 err = sock_intr_errno(timeo);
222 break;
223 }
f9a3c20a
PH
224
225 release_sock(sk);
226 timeo = schedule_timeout(timeo);
227 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
c47b7c72 228 }
f9a3c20a 229 __set_current_state(TASK_RUNNING);
c47b7c72
GP
230 remove_wait_queue(sk_sleep(sk), &wait);
231
232 if (err)
233 goto done;
234
235 newsock->state = SS_CONNECTED;
236
237 BT_DBG("new socket %p", nsk);
238
239done:
240 release_sock(sk);
241 return err;
242}
243
d7175d55
GP
244static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
245{
246 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
247 struct sock *sk = sock->sk;
0c1bc5c6 248 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
d7175d55
GP
249
250 BT_DBG("sock %p, sk %p", sock, sk);
251
252 addr->sa_family = AF_BLUETOOTH;
253 *len = sizeof(struct sockaddr_l2);
254
255 if (peer) {
fe4128e0 256 la->l2_psm = chan->psm;
d7175d55 257 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
fe4128e0 258 la->l2_cid = cpu_to_le16(chan->dcid);
d7175d55 259 } else {
0c1bc5c6 260 la->l2_psm = chan->sport;
d7175d55 261 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
fe4128e0 262 la->l2_cid = cpu_to_le16(chan->scid);
d7175d55
GP
263 }
264
265 return 0;
266}
267
99f4808d
GP
268static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
269{
270 struct sock *sk = sock->sk;
4343478f 271 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
99f4808d
GP
272 struct l2cap_options opts;
273 struct l2cap_conninfo cinfo;
274 int len, err = 0;
275 u32 opt;
276
277 BT_DBG("sk %p", sk);
278
279 if (get_user(len, optlen))
280 return -EFAULT;
281
282 lock_sock(sk);
283
284 switch (optname) {
285 case L2CAP_OPTIONS:
e3fb592b 286 memset(&opts, 0, sizeof(opts));
0c1bc5c6
GP
287 opts.imtu = chan->imtu;
288 opts.omtu = chan->omtu;
289 opts.flush_to = chan->flush_to;
290 opts.mode = chan->mode;
47d1ec61
GP
291 opts.fcs = chan->fcs;
292 opts.max_tx = chan->max_tx;
6327eb98 293 opts.txwin_size = chan->tx_win;
99f4808d
GP
294
295 len = min_t(unsigned int, len, sizeof(opts));
296 if (copy_to_user(optval, (char *) &opts, len))
297 err = -EFAULT;
298
299 break;
300
301 case L2CAP_LM:
4343478f 302 switch (chan->sec_level) {
99f4808d
GP
303 case BT_SECURITY_LOW:
304 opt = L2CAP_LM_AUTH;
305 break;
306 case BT_SECURITY_MEDIUM:
307 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
308 break;
309 case BT_SECURITY_HIGH:
310 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
311 L2CAP_LM_SECURE;
312 break;
313 default:
314 opt = 0;
315 break;
316 }
317
43bd0f32 318 if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
99f4808d
GP
319 opt |= L2CAP_LM_MASTER;
320
ecf61bdb 321 if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
99f4808d
GP
322 opt |= L2CAP_LM_RELIABLE;
323
324 if (put_user(opt, (u32 __user *) optval))
325 err = -EFAULT;
326 break;
327
328 case L2CAP_CONNINFO:
329 if (sk->sk_state != BT_CONNECTED &&
c5daa683
GP
330 !(sk->sk_state == BT_CONNECT2 &&
331 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
99f4808d
GP
332 err = -ENOTCONN;
333 break;
334 }
335
8d03e971 336 memset(&cinfo, 0, sizeof(cinfo));
8c1d787b
GP
337 cinfo.hci_handle = chan->conn->hcon->handle;
338 memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
99f4808d
GP
339
340 len = min_t(unsigned int, len, sizeof(cinfo));
341 if (copy_to_user(optval, (char *) &cinfo, len))
342 err = -EFAULT;
343
344 break;
345
346 default:
347 err = -ENOPROTOOPT;
348 break;
349 }
350
351 release_sock(sk);
352 return err;
353}
354
355static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
356{
357 struct sock *sk = sock->sk;
4343478f 358 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
99f4808d 359 struct bt_security sec;
14b12d0b 360 struct bt_power pwr;
99f4808d
GP
361 int len, err = 0;
362
363 BT_DBG("sk %p", sk);
364
365 if (level == SOL_L2CAP)
366 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
367
368 if (level != SOL_BLUETOOTH)
369 return -ENOPROTOOPT;
370
371 if (get_user(len, optlen))
372 return -EFAULT;
373
374 lock_sock(sk);
375
376 switch (optname) {
377 case BT_SECURITY:
715ec005
GP
378 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
379 chan->chan_type != L2CAP_CHAN_RAW) {
99f4808d
GP
380 err = -EINVAL;
381 break;
382 }
383
8f360119 384 memset(&sec, 0, sizeof(sec));
85e34368 385 if (chan->conn) {
c6585a4d 386 sec.level = chan->conn->hcon->sec_level;
99f4808d 387
85e34368
AE
388 if (sk->sk_state == BT_CONNECTED)
389 sec.key_size = chan->conn->hcon->enc_key_size;
390 } else {
391 sec.level = chan->sec_level;
392 }
8f360119 393
99f4808d
GP
394 len = min_t(unsigned int, len, sizeof(sec));
395 if (copy_to_user(optval, (char *) &sec, len))
396 err = -EFAULT;
397
398 break;
399
400 case BT_DEFER_SETUP:
401 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
402 err = -EINVAL;
403 break;
404 }
405
c5daa683
GP
406 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
407 (u32 __user *) optval))
99f4808d
GP
408 err = -EFAULT;
409
410 break;
411
412 case BT_FLUSHABLE:
d57b0e8b
AE
413 if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
414 (u32 __user *) optval))
99f4808d
GP
415 err = -EFAULT;
416
417 break;
418
14b12d0b
JG
419 case BT_POWER:
420 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
421 && sk->sk_type != SOCK_RAW) {
422 err = -EINVAL;
423 break;
424 }
425
15770b1a 426 pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
14b12d0b
JG
427
428 len = min_t(unsigned int, len, sizeof(pwr));
429 if (copy_to_user(optval, (char *) &pwr, len))
430 err = -EFAULT;
431
432 break;
433
2ea66482
MM
434 case BT_CHANNEL_POLICY:
435 if (!enable_hs) {
436 err = -ENOPROTOOPT;
437 break;
438 }
439
440 if (put_user(chan->chan_policy, (u32 __user *) optval))
441 err = -EFAULT;
442 break;
443
99f4808d
GP
444 default:
445 err = -ENOPROTOOPT;
446 break;
447 }
448
449 release_sock(sk);
450 return err;
451}
452
682877c3
AG
453static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
454{
455 switch (chan->scid) {
456 case L2CAP_CID_LE_DATA:
8c3a4f00 457 if (mtu < L2CAP_LE_MIN_MTU)
682877c3
AG
458 return false;
459 break;
460
461 default:
462 if (mtu < L2CAP_DEFAULT_MIN_MTU)
463 return false;
464 }
465
466 return true;
467}
468
33575df7
GP
469static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
470{
471 struct sock *sk = sock->sk;
b4450035 472 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
33575df7
GP
473 struct l2cap_options opts;
474 int len, err = 0;
475 u32 opt;
476
477 BT_DBG("sk %p", sk);
478
479 lock_sock(sk);
480
481 switch (optname) {
482 case L2CAP_OPTIONS:
483 if (sk->sk_state == BT_CONNECTED) {
484 err = -EINVAL;
485 break;
486 }
487
0c1bc5c6
GP
488 opts.imtu = chan->imtu;
489 opts.omtu = chan->omtu;
490 opts.flush_to = chan->flush_to;
491 opts.mode = chan->mode;
47d1ec61
GP
492 opts.fcs = chan->fcs;
493 opts.max_tx = chan->max_tx;
6327eb98 494 opts.txwin_size = chan->tx_win;
33575df7
GP
495
496 len = min_t(unsigned int, sizeof(opts), optlen);
497 if (copy_from_user((char *) &opts, optval, len)) {
498 err = -EFAULT;
499 break;
500 }
501
6327eb98 502 if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
33575df7
GP
503 err = -EINVAL;
504 break;
505 }
506
682877c3
AG
507 if (!l2cap_valid_mtu(chan, opts.imtu)) {
508 err = -EINVAL;
509 break;
510 }
511
0c1bc5c6
GP
512 chan->mode = opts.mode;
513 switch (chan->mode) {
33575df7 514 case L2CAP_MODE_BASIC:
c1360a1c 515 clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
33575df7
GP
516 break;
517 case L2CAP_MODE_ERTM:
518 case L2CAP_MODE_STREAMING:
519 if (!disable_ertm)
520 break;
521 /* fall through */
522 default:
523 err = -EINVAL;
524 break;
525 }
526
0c1bc5c6
GP
527 chan->imtu = opts.imtu;
528 chan->omtu = opts.omtu;
47d1ec61
GP
529 chan->fcs = opts.fcs;
530 chan->max_tx = opts.max_tx;
6327eb98 531 chan->tx_win = opts.txwin_size;
33575df7
GP
532 break;
533
534 case L2CAP_LM:
535 if (get_user(opt, (u32 __user *) optval)) {
536 err = -EFAULT;
537 break;
538 }
539
540 if (opt & L2CAP_LM_AUTH)
4343478f 541 chan->sec_level = BT_SECURITY_LOW;
33575df7 542 if (opt & L2CAP_LM_ENCRYPT)
4343478f 543 chan->sec_level = BT_SECURITY_MEDIUM;
33575df7 544 if (opt & L2CAP_LM_SECURE)
4343478f 545 chan->sec_level = BT_SECURITY_HIGH;
33575df7 546
43bd0f32
AE
547 if (opt & L2CAP_LM_MASTER)
548 set_bit(FLAG_ROLE_SWITCH, &chan->flags);
549 else
550 clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
ecf61bdb
AE
551
552 if (opt & L2CAP_LM_RELIABLE)
553 set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
554 else
555 clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
33575df7
GP
556 break;
557
558 default:
559 err = -ENOPROTOOPT;
560 break;
561 }
562
563 release_sock(sk);
564 return err;
565}
566
567static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
568{
569 struct sock *sk = sock->sk;
4343478f 570 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
33575df7 571 struct bt_security sec;
14b12d0b 572 struct bt_power pwr;
f1cb9af5 573 struct l2cap_conn *conn;
33575df7
GP
574 int len, err = 0;
575 u32 opt;
576
577 BT_DBG("sk %p", sk);
578
579 if (level == SOL_L2CAP)
580 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
581
582 if (level != SOL_BLUETOOTH)
583 return -ENOPROTOOPT;
584
585 lock_sock(sk);
586
587 switch (optname) {
588 case BT_SECURITY:
715ec005
GP
589 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
590 chan->chan_type != L2CAP_CHAN_RAW) {
33575df7
GP
591 err = -EINVAL;
592 break;
593 }
594
595 sec.level = BT_SECURITY_LOW;
596
597 len = min_t(unsigned int, sizeof(sec), optlen);
598 if (copy_from_user((char *) &sec, optval, len)) {
599 err = -EFAULT;
600 break;
601 }
602
603 if (sec.level < BT_SECURITY_LOW ||
604 sec.level > BT_SECURITY_HIGH) {
605 err = -EINVAL;
606 break;
607 }
608
4343478f 609 chan->sec_level = sec.level;
f1cb9af5 610
0bee1d60
GP
611 if (!chan->conn)
612 break;
613
f1cb9af5 614 conn = chan->conn;
0bee1d60
GP
615
616 /*change security for LE channels */
617 if (chan->scid == L2CAP_CID_LE_DATA) {
f1cb9af5
VCG
618 if (!conn->hcon->out) {
619 err = -EINVAL;
620 break;
621 }
622
cc110922 623 if (smp_conn_security(conn->hcon, sec.level))
f1cb9af5 624 break;
f1cb9af5 625 sk->sk_state = BT_CONFIG;
3542b854 626 chan->state = BT_CONFIG;
0bee1d60 627
a7d7723a
GP
628 /* or for ACL link */
629 } else if ((sk->sk_state == BT_CONNECT2 &&
c5daa683 630 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
a7d7723a
GP
631 sk->sk_state == BT_CONNECTED) {
632 if (!l2cap_chan_check_security(chan))
c5daa683 633 set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
a7d7723a
GP
634 else
635 sk->sk_state_change(sk);
0bee1d60
GP
636 } else {
637 err = -EINVAL;
f1cb9af5 638 }
33575df7
GP
639 break;
640
641 case BT_DEFER_SETUP:
642 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
643 err = -EINVAL;
644 break;
645 }
646
647 if (get_user(opt, (u32 __user *) optval)) {
648 err = -EFAULT;
649 break;
650 }
651
c5daa683
GP
652 if (opt)
653 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
654 else
655 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
33575df7
GP
656 break;
657
658 case BT_FLUSHABLE:
659 if (get_user(opt, (u32 __user *) optval)) {
660 err = -EFAULT;
661 break;
662 }
663
664 if (opt > BT_FLUSHABLE_ON) {
665 err = -EINVAL;
666 break;
667 }
668
669 if (opt == BT_FLUSHABLE_OFF) {
8c1d787b 670 struct l2cap_conn *conn = chan->conn;
25985edc 671 /* proceed further only when we have l2cap_conn and
33575df7
GP
672 No Flush support in the LM */
673 if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
674 err = -EINVAL;
675 break;
676 }
677 }
678
d57b0e8b
AE
679 if (opt)
680 set_bit(FLAG_FLUSHABLE, &chan->flags);
681 else
682 clear_bit(FLAG_FLUSHABLE, &chan->flags);
33575df7
GP
683 break;
684
14b12d0b
JG
685 case BT_POWER:
686 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
687 chan->chan_type != L2CAP_CHAN_RAW) {
688 err = -EINVAL;
689 break;
690 }
691
692 pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;
693
694 len = min_t(unsigned int, sizeof(pwr), optlen);
695 if (copy_from_user((char *) &pwr, optval, len)) {
696 err = -EFAULT;
697 break;
698 }
15770b1a
AE
699
700 if (pwr.force_active)
701 set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
702 else
703 clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
14b12d0b
JG
704 break;
705
2ea66482
MM
706 case BT_CHANNEL_POLICY:
707 if (!enable_hs) {
708 err = -ENOPROTOOPT;
709 break;
710 }
711
712 if (get_user(opt, (u32 __user *) optval)) {
713 err = -EFAULT;
714 break;
715 }
716
717 if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
718 err = -EINVAL;
719 break;
720 }
721
722 if (chan->mode != L2CAP_MODE_ERTM &&
723 chan->mode != L2CAP_MODE_STREAMING) {
724 err = -EOPNOTSUPP;
725 break;
726 }
727
728 chan->chan_policy = (u8) opt;
14b12d0b
JG
729 break;
730
33575df7
GP
731 default:
732 err = -ENOPROTOOPT;
733 break;
734 }
735
736 release_sock(sk);
737 return err;
738}
fd83ccdb
GP
739
740static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
741{
742 struct sock *sk = sock->sk;
0c1bc5c6 743 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
fd83ccdb
GP
744 int err;
745
746 BT_DBG("sock %p, sk %p", sock, sk);
747
748 err = sock_error(sk);
749 if (err)
750 return err;
751
752 if (msg->msg_flags & MSG_OOB)
753 return -EOPNOTSUPP;
754
a6a5568c 755 if (sk->sk_state != BT_CONNECTED)
9a91a04a 756 return -ENOTCONN;
fd83ccdb 757
a6a5568c 758 l2cap_chan_lock(chan);
5e59b791 759 err = l2cap_chan_send(chan, msg, len, sk->sk_priority);
a6a5568c 760 l2cap_chan_unlock(chan);
fd83ccdb 761
fd83ccdb
GP
762 return err;
763}
33575df7 764
68983259
GP
765static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
766{
767 struct sock *sk = sock->sk;
e328140f
MM
768 struct l2cap_pinfo *pi = l2cap_pi(sk);
769 int err;
68983259
GP
770
771 lock_sock(sk);
772
c5daa683
GP
773 if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
774 &bt_sk(sk)->flags)) {
8c1d787b 775 sk->sk_state = BT_CONFIG;
3542b854 776 pi->chan->state = BT_CONFIG;
8c1d787b 777
e328140f 778 __l2cap_connect_rsp_defer(pi->chan);
68983259
GP
779 release_sock(sk);
780 return 0;
781 }
782
783 release_sock(sk);
784
785 if (sock->type == SOCK_STREAM)
e328140f
MM
786 err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
787 else
788 err = bt_sock_recvmsg(iocb, sock, msg, len, flags);
789
790 if (pi->chan->mode != L2CAP_MODE_ERTM)
791 return err;
792
793 /* Attempt to put pending rx data in the socket buffer */
794
795 lock_sock(sk);
796
797 if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
798 goto done;
799
800 if (pi->rx_busy_skb) {
801 if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
802 pi->rx_busy_skb = NULL;
803 else
804 goto done;
805 }
806
807 /* Restore data flow when half of the receive buffer is
808 * available. This avoids resending large numbers of
809 * frames.
810 */
811 if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
812 l2cap_chan_busy(pi->chan, 0);
68983259 813
e328140f
MM
814done:
815 release_sock(sk);
816 return err;
68983259
GP
817}
818
05fc1576
GP
819/* Kill socket (only if zapped and orphan)
820 * Must be called on unlocked socket.
821 */
ba3bd0ee 822static void l2cap_sock_kill(struct sock *sk)
05fc1576
GP
823{
824 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
825 return;
826
e05dcc32 827 BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
05fc1576
GP
828
829 /* Kill poor orphan */
6ff5abbf 830
4af66c69 831 l2cap_chan_put(l2cap_pi(sk)->chan);
05fc1576
GP
832 sock_set_flag(sk, SOCK_DEAD);
833 sock_put(sk);
834}
835
dcba0dba
GP
836static int l2cap_sock_shutdown(struct socket *sock, int how)
837{
838 struct sock *sk = sock->sk;
7ddb6e0f 839 struct l2cap_chan *chan;
3df91ea2 840 struct l2cap_conn *conn;
dcba0dba
GP
841 int err = 0;
842
843 BT_DBG("sock %p, sk %p", sock, sk);
844
845 if (!sk)
846 return 0;
847
7ddb6e0f 848 chan = l2cap_pi(sk)->chan;
3df91ea2
AE
849 conn = chan->conn;
850
851 if (conn)
852 mutex_lock(&conn->chan_lock);
7ddb6e0f 853
6be36555 854 l2cap_chan_lock(chan);
dcba0dba 855 lock_sock(sk);
6be36555 856
dcba0dba 857 if (!sk->sk_shutdown) {
0c1bc5c6 858 if (chan->mode == L2CAP_MODE_ERTM)
dcba0dba
GP
859 err = __l2cap_wait_ack(sk);
860
861 sk->sk_shutdown = SHUTDOWN_MASK;
3df91ea2 862
6be36555 863 release_sock(sk);
0f852724 864 l2cap_chan_close(chan, 0);
6be36555 865 lock_sock(sk);
dcba0dba
GP
866
867 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
868 err = bt_sock_wait_state(sk, BT_CLOSED,
869 sk->sk_lingertime);
870 }
871
872 if (!err && sk->sk_err)
873 err = -sk->sk_err;
874
875 release_sock(sk);
6be36555 876 l2cap_chan_unlock(chan);
3df91ea2
AE
877
878 if (conn)
879 mutex_unlock(&conn->chan_lock);
880
dcba0dba
GP
881 return err;
882}
883
554f05bb
GP
884static int l2cap_sock_release(struct socket *sock)
885{
886 struct sock *sk = sock->sk;
887 int err;
888
889 BT_DBG("sock %p, sk %p", sock, sk);
890
891 if (!sk)
892 return 0;
893
5b28d95c
MY
894 bt_sock_unlink(&l2cap_sk_list, sk);
895
554f05bb
GP
896 err = l2cap_sock_shutdown(sock, 2);
897
898 sock_orphan(sk);
899 l2cap_sock_kill(sk);
900 return err;
901}
902
c0df7f6e
AE
903static void l2cap_sock_cleanup_listen(struct sock *parent)
904{
905 struct sock *sk;
906
907 BT_DBG("parent %p", parent);
908
909 /* Close not yet accepted channels */
910 while ((sk = bt_accept_dequeue(parent, NULL))) {
911 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
912
913 l2cap_chan_lock(chan);
914 __clear_chan_timer(chan);
915 l2cap_chan_close(chan, ECONNRESET);
916 l2cap_chan_unlock(chan);
917
918 l2cap_sock_kill(sk);
919 }
920}
921
80b98027 922static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
80808e43 923{
80b98027 924 struct sock *sk, *parent = chan->data;
80808e43 925
53826692
GP
926 /* Check for backlog size */
927 if (sk_acceptq_is_full(parent)) {
928 BT_DBG("backlog full %d", parent->sk_ack_backlog);
929 return NULL;
930 }
931
80808e43
GP
932 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
933 GFP_ATOMIC);
934 if (!sk)
935 return NULL;
936
d22015aa
OP
937 bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);
938
80808e43
GP
939 l2cap_sock_init(sk, parent);
940
941 return l2cap_pi(sk)->chan;
942}
943
80b98027 944static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
23070494 945{
e328140f 946 int err;
80b98027 947 struct sock *sk = chan->data;
e328140f
MM
948 struct l2cap_pinfo *pi = l2cap_pi(sk);
949
6be36555
AE
950 lock_sock(sk);
951
952 if (pi->rx_busy_skb) {
953 err = -ENOMEM;
954 goto done;
955 }
e328140f
MM
956
957 err = sock_queue_rcv_skb(sk, skb);
958
959 /* For ERTM, handle one skb that doesn't fit into the recv
960 * buffer. This is important to do because the data frames
961 * have already been acked, so the skb cannot be discarded.
962 *
963 * Notify the l2cap core that the buffer is full, so the
964 * LOCAL_BUSY state is entered and no more frames are
965 * acked and reassembled until there is buffer space
966 * available.
967 */
968 if (err < 0 && pi->chan->mode == L2CAP_MODE_ERTM) {
969 pi->rx_busy_skb = skb;
970 l2cap_chan_busy(pi->chan, 1);
971 err = 0;
972 }
23070494 973
6be36555
AE
974done:
975 release_sock(sk);
976
e328140f 977 return err;
23070494
GP
978}
979
80b98027 980static void l2cap_sock_close_cb(struct l2cap_chan *chan)
ba3bd0ee 981{
80b98027 982 struct sock *sk = chan->data;
ba3bd0ee
GP
983
984 l2cap_sock_kill(sk);
985}
986
c0df7f6e
AE
987static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
988{
989 struct sock *sk = chan->data;
990 struct sock *parent;
991
992 lock_sock(sk);
993
994 parent = bt_sk(sk)->parent;
995
996 sock_set_flag(sk, SOCK_ZAPPED);
997
998 switch (chan->state) {
999 case BT_OPEN:
1000 case BT_BOUND:
1001 case BT_CLOSED:
1002 break;
1003 case BT_LISTEN:
1004 l2cap_sock_cleanup_listen(sk);
1005 sk->sk_state = BT_CLOSED;
1006 chan->state = BT_CLOSED;
1007
1008 break;
1009 default:
1010 sk->sk_state = BT_CLOSED;
1011 chan->state = BT_CLOSED;
1012
1013 sk->sk_err = err;
1014
1015 if (parent) {
1016 bt_accept_unlink(sk);
1017 parent->sk_data_ready(parent, 0);
1018 } else {
1019 sk->sk_state_change(sk);
1020 }
1021
1022 break;
1023 }
1024
1025 release_sock(sk);
1026}
1027
80b98027 1028static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state)
89bc500e 1029{
80b98027 1030 struct sock *sk = chan->data;
89bc500e
GP
1031
1032 sk->sk_state = state;
1033}
1034
2f7719ce 1035static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
90338947 1036 unsigned long len, int nb)
2f7719ce 1037{
90338947
GP
1038 struct sk_buff *skb;
1039 int err;
1040
a6a5568c 1041 l2cap_chan_unlock(chan);
90338947 1042 skb = bt_skb_send_alloc(chan->sk, len, nb, &err);
a6a5568c
MM
1043 l2cap_chan_lock(chan);
1044
90338947
GP
1045 if (!skb)
1046 return ERR_PTR(err);
2f7719ce 1047
90338947 1048 return skb;
2f7719ce
AE
1049}
1050
54a59aa2
AE
1051static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
1052{
1053 struct sock *sk = chan->data;
1054 struct sock *parent;
1055
1056 lock_sock(sk);
1057
1058 parent = bt_sk(sk)->parent;
1059
1060 BT_DBG("sk %p, parent %p", sk, parent);
1061
1062 sk->sk_state = BT_CONNECTED;
1063 sk->sk_state_change(sk);
1064
1065 if (parent)
1066 parent->sk_data_ready(parent, 0);
1067
1068 release_sock(sk);
1069}
1070
80808e43
GP
1071static struct l2cap_ops l2cap_chan_ops = {
1072 .name = "L2CAP Socket Interface",
1073 .new_connection = l2cap_sock_new_connection_cb,
23070494 1074 .recv = l2cap_sock_recv_cb,
ba3bd0ee 1075 .close = l2cap_sock_close_cb,
c0df7f6e 1076 .teardown = l2cap_sock_teardown_cb,
89bc500e 1077 .state_change = l2cap_sock_state_change_cb,
54a59aa2 1078 .ready = l2cap_sock_ready_cb,
2f7719ce 1079 .alloc_skb = l2cap_sock_alloc_skb_cb,
80808e43
GP
1080};
1081
bb58f747
GP
1082static void l2cap_sock_destruct(struct sock *sk)
1083{
1084 BT_DBG("sk %p", sk);
1085
61d6ef3e 1086 l2cap_chan_put(l2cap_pi(sk)->chan);
e328140f
MM
1087 if (l2cap_pi(sk)->rx_busy_skb) {
1088 kfree_skb(l2cap_pi(sk)->rx_busy_skb);
1089 l2cap_pi(sk)->rx_busy_skb = NULL;
1090 }
1091
bb58f747
GP
1092 skb_queue_purge(&sk->sk_receive_queue);
1093 skb_queue_purge(&sk->sk_write_queue);
1094}
1095
80808e43 1096static void l2cap_sock_init(struct sock *sk, struct sock *parent)
bb58f747
GP
1097{
1098 struct l2cap_pinfo *pi = l2cap_pi(sk);
b4450035 1099 struct l2cap_chan *chan = pi->chan;
bb58f747
GP
1100
1101 BT_DBG("sk %p", sk);
1102
1103 if (parent) {
b4450035
GP
1104 struct l2cap_chan *pchan = l2cap_pi(parent)->chan;
1105
bb58f747 1106 sk->sk_type = parent->sk_type;
c5daa683 1107 bt_sk(sk)->flags = bt_sk(parent)->flags;
bb58f747 1108
715ec005 1109 chan->chan_type = pchan->chan_type;
0c1bc5c6
GP
1110 chan->imtu = pchan->imtu;
1111 chan->omtu = pchan->omtu;
b4450035 1112 chan->conf_state = pchan->conf_state;
0c1bc5c6 1113 chan->mode = pchan->mode;
47d1ec61
GP
1114 chan->fcs = pchan->fcs;
1115 chan->max_tx = pchan->max_tx;
1116 chan->tx_win = pchan->tx_win;
6b3c7104 1117 chan->tx_win_max = pchan->tx_win_max;
4343478f 1118 chan->sec_level = pchan->sec_level;
d57b0e8b 1119 chan->flags = pchan->flags;
6230c9b4
PM
1120
1121 security_sk_clone(parent, sk);
bb58f747 1122 } else {
715ec005
GP
1123
1124 switch (sk->sk_type) {
1125 case SOCK_RAW:
1126 chan->chan_type = L2CAP_CHAN_RAW;
1127 break;
1128 case SOCK_DGRAM:
1129 chan->chan_type = L2CAP_CHAN_CONN_LESS;
1130 break;
1131 case SOCK_SEQPACKET:
1132 case SOCK_STREAM:
1133 chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
1134 break;
1135 }
1136
0c1bc5c6
GP
1137 chan->imtu = L2CAP_DEFAULT_MTU;
1138 chan->omtu = 0;
bb58f747 1139 if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
0c1bc5c6 1140 chan->mode = L2CAP_MODE_ERTM;
c1360a1c 1141 set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
bb58f747 1142 } else {
0c1bc5c6 1143 chan->mode = L2CAP_MODE_BASIC;
bb58f747 1144 }
bd4b1653
AE
1145
1146 l2cap_chan_set_defaults(chan);
bb58f747
GP
1147 }
1148
1149 /* Default config options */
0c1bc5c6 1150 chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
80808e43
GP
1151
1152 chan->data = sk;
1153 chan->ops = &l2cap_chan_ops;
bb58f747
GP
1154}
1155
1156static struct proto l2cap_proto = {
1157 .name = "L2CAP",
1158 .owner = THIS_MODULE,
1159 .obj_size = sizeof(struct l2cap_pinfo)
1160};
1161
80808e43 1162static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
bb58f747
GP
1163{
1164 struct sock *sk;
dc50a06d 1165 struct l2cap_chan *chan;
bb58f747
GP
1166
1167 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1168 if (!sk)
1169 return NULL;
1170
1171 sock_init_data(sock, sk);
1172 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
1173
1174 sk->sk_destruct = l2cap_sock_destruct;
ba13ccd9 1175 sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
bb58f747
GP
1176
1177 sock_reset_flag(sk, SOCK_ZAPPED);
1178
1179 sk->sk_protocol = proto;
1180 sk->sk_state = BT_OPEN;
1181
eef1d9b6 1182 chan = l2cap_chan_create();
dc50a06d 1183 if (!chan) {
49dfbb91 1184 sk_free(sk);
dc50a06d
GP
1185 return NULL;
1186 }
1187
61d6ef3e
MM
1188 l2cap_chan_hold(chan);
1189
eef1d9b6
GP
1190 chan->sk = sk;
1191
dc50a06d
GP
1192 l2cap_pi(sk)->chan = chan;
1193
bb58f747
GP
1194 return sk;
1195}
1196
1197static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
1198 int kern)
1199{
1200 struct sock *sk;
1201
1202 BT_DBG("sock %p", sock);
1203
1204 sock->state = SS_UNCONNECTED;
1205
1206 if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1207 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1208 return -ESOCKTNOSUPPORT;
1209
1210 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1211 return -EPERM;
1212
1213 sock->ops = &l2cap_sock_ops;
1214
1215 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1216 if (!sk)
1217 return -ENOMEM;
1218
1219 l2cap_sock_init(sk, NULL);
5b28d95c 1220 bt_sock_link(&l2cap_sk_list, sk);
bb58f747
GP
1221 return 0;
1222}
1223
cf2f90f5 1224static const struct proto_ops l2cap_sock_ops = {
65390587
GP
1225 .family = PF_BLUETOOTH,
1226 .owner = THIS_MODULE,
1227 .release = l2cap_sock_release,
1228 .bind = l2cap_sock_bind,
1229 .connect = l2cap_sock_connect,
1230 .listen = l2cap_sock_listen,
1231 .accept = l2cap_sock_accept,
1232 .getname = l2cap_sock_getname,
1233 .sendmsg = l2cap_sock_sendmsg,
1234 .recvmsg = l2cap_sock_recvmsg,
1235 .poll = bt_sock_poll,
1236 .ioctl = bt_sock_ioctl,
1237 .mmap = sock_no_mmap,
1238 .socketpair = sock_no_socketpair,
1239 .shutdown = l2cap_sock_shutdown,
1240 .setsockopt = l2cap_sock_setsockopt,
1241 .getsockopt = l2cap_sock_getsockopt
1242};
1243
bb58f747
GP
1244static const struct net_proto_family l2cap_sock_family_ops = {
1245 .family = PF_BLUETOOTH,
1246 .owner = THIS_MODULE,
1247 .create = l2cap_sock_create,
1248};
1249
1250int __init l2cap_init_sockets(void)
1251{
e2174ca4 1252 int err;
bb58f747 1253
e2174ca4
GP
1254 err = proto_register(&l2cap_proto, 0);
1255 if (err < 0)
1256 return err;
bb58f747 1257
e2174ca4 1258 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
5b28d95c
MY
1259 if (err < 0) {
1260 BT_ERR("L2CAP socket registration failed");
e2174ca4 1261 goto error;
5b28d95c
MY
1262 }
1263
1264 err = bt_procfs_init(THIS_MODULE, &init_net, "l2cap", &l2cap_sk_list, NULL);
1265 if (err < 0) {
1266 BT_ERR("Failed to create L2CAP proc file");
1267 bt_sock_unregister(BTPROTO_L2CAP);
1268 goto error;
1269 }
bb58f747 1270
e2174ca4 1271 BT_INFO("L2CAP socket layer initialized");
bb58f747 1272
e2174ca4 1273 return 0;
bb58f747
GP
1274
1275error:
e2174ca4
GP
1276 proto_unregister(&l2cap_proto);
1277 return err;
bb58f747
GP
1278}
1279
1280void l2cap_cleanup_sockets(void)
1281{
5b28d95c 1282 bt_procfs_cleanup(&init_net, "l2cap");
e2174ca4
GP
1283 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
1284 BT_ERR("L2CAP socket unregistration failed");
bb58f747 1285
e2174ca4 1286 proto_unregister(&l2cap_proto);
bb58f747 1287}
This page took 0.276393 seconds and 5 git commands to generate.