blob: ed2dfc942c3cdeb544340b6d342e4e7497500fd4 [file] [log] [blame]
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001/*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4 Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
5 Copyright (C) 2010 Google Inc.
Gustavo F. Padovan590051d2011-12-18 13:39:33 -02006 Copyright (C) 2011 ProFUSION Embedded Systems
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02007
8 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License version 2 as
12 published by the Free Software Foundation;
13
14 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
17 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
18 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
19 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
20 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
21 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22
23 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
24 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
25 SOFTWARE IS DISCLAIMED.
26*/
27
28/* Bluetooth L2CAP sockets. */
29
Paul Gortmakerbc3b2d72011-07-15 11:47:34 -040030#include <linux/export.h>
Paul Moore6230c9b2011-10-07 09:40:59 +000031
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -020032#include <net/bluetooth/bluetooth.h>
Gustavo F. Padovan33575df2011-02-04 02:48:48 -020033#include <net/bluetooth/hci_core.h>
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -020034#include <net/bluetooth/l2cap.h>
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -030035#include <net/bluetooth/smp.h>
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -020036
Masatake YAMATO5b28d952012-07-26 01:29:25 +090037static struct bt_sock_list l2cap_sk_list = {
38 .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
39};
40
Gustavo F. Padovancf2f90f2011-04-27 18:40:39 -030041static const struct proto_ops l2cap_sock_ops;
Gustavo F. Padovan80808e42011-05-16 17:24:37 -030042static void l2cap_sock_init(struct sock *sk, struct sock *parent);
43static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio);
Gustavo F. Padovancf2f90f2011-04-27 18:40:39 -030044
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -020045static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
46{
47 struct sock *sk = sock->sk;
Gustavo F. Padovan43434782011-04-12 18:31:57 -030048 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -020049 struct sockaddr_l2 la;
50 int len, err = 0;
51
52 BT_DBG("sk %p", sk);
53
54 if (!addr || addr->sa_family != AF_BLUETOOTH)
55 return -EINVAL;
56
57 memset(&la, 0, sizeof(la));
58 len = min_t(unsigned int, sizeof(la), alen);
59 memcpy(&la, addr, len);
60
Ville Tervob62f3282011-02-10 22:38:50 -030061 if (la.l2_cid && la.l2_psm)
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -020062 return -EINVAL;
63
64 lock_sock(sk);
65
66 if (sk->sk_state != BT_OPEN) {
67 err = -EBADFD;
68 goto done;
69 }
70
71 if (la.l2_psm) {
72 __u16 psm = __le16_to_cpu(la.l2_psm);
73
74 /* PSM must be odd and lsb of upper byte must be 0 */
75 if ((psm & 0x0101) != 0x0001) {
76 err = -EINVAL;
77 goto done;
78 }
79
80 /* Restrict usage of well-known PSMs */
81 if (psm < 0x1001 && !capable(CAP_NET_BIND_SERVICE)) {
82 err = -EACCES;
83 goto done;
84 }
85 }
86
Ville Tervob62f3282011-02-10 22:38:50 -030087 if (la.l2_cid)
Santosh Nayak6e4aff12012-03-01 22:46:36 +053088 err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
Gustavo F. Padovan9e4425f2011-04-18 18:38:43 -030089 else
90 err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
Ville Tervob62f3282011-02-10 22:38:50 -030091
Gustavo F. Padovan9e4425f2011-04-18 18:38:43 -030092 if (err < 0)
93 goto done;
94
Andrei Emeltchenko2983fd62012-05-24 15:42:50 +030095 if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
96 __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
Gustavo F. Padovan9e4425f2011-04-18 18:38:43 -030097 chan->sec_level = BT_SECURITY_SDP;
98
99 bacpy(&bt_sk(sk)->src, &la.l2_bdaddr);
Gustavo F. Padovan89bc5002011-06-03 00:19:47 -0300100
101 chan->state = BT_BOUND;
Gustavo F. Padovan9e4425f2011-04-18 18:38:43 -0300102 sk->sk_state = BT_BOUND;
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200103
104done:
105 release_sock(sk);
106 return err;
107}
108
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200109static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr, int alen, int flags)
110{
111 struct sock *sk = sock->sk;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300112 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200113 struct sockaddr_l2 la;
114 int len, err = 0;
115
116 BT_DBG("sk %p", sk);
117
118 if (!addr || alen < sizeof(addr->sa_family) ||
119 addr->sa_family != AF_BLUETOOTH)
120 return -EINVAL;
121
122 memset(&la, 0, sizeof(la));
123 len = min_t(unsigned int, sizeof(la), alen);
124 memcpy(&la, addr, len);
125
Ville Tervoacd7d372011-02-10 22:38:49 -0300126 if (la.l2_cid && la.l2_psm)
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200127 return -EINVAL;
128
Santosh Nayak6e4aff12012-03-01 22:46:36 +0530129 err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
Andre Guedes8e9f9892012-04-24 21:02:55 -0300130 &la.l2_bdaddr, la.l2_bdaddr_type);
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200131 if (err)
Andrei Emeltchenkob3fb6112012-02-22 17:11:57 +0200132 return err;
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200133
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200134 lock_sock(sk);
135
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200136 err = bt_sock_wait_state(sk, BT_CONNECTED,
137 sock_sndtimeo(sk, flags & O_NONBLOCK));
Andrei Emeltchenkob3fb6112012-02-22 17:11:57 +0200138
139 release_sock(sk);
140
Gustavo F. Padovan4e34c502011-02-04 02:56:13 -0200141 return err;
142}
143
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200144static int l2cap_sock_listen(struct socket *sock, int backlog)
145{
146 struct sock *sk = sock->sk;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300147 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200148 int err = 0;
149
150 BT_DBG("sk %p backlog %d", sk, backlog);
151
152 lock_sock(sk);
153
Marcel Holtmann6b3af732012-04-19 13:43:51 +0200154 if (sk->sk_state != BT_BOUND) {
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200155 err = -EBADFD;
156 goto done;
157 }
158
Marcel Holtmann6b3af732012-04-19 13:43:51 +0200159 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
160 err = -EINVAL;
161 goto done;
162 }
163
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300164 switch (chan->mode) {
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200165 case L2CAP_MODE_BASIC:
166 break;
167 case L2CAP_MODE_ERTM:
168 case L2CAP_MODE_STREAMING:
169 if (!disable_ertm)
170 break;
171 /* fall through */
172 default:
173 err = -ENOTSUPP;
174 goto done;
175 }
176
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200177 sk->sk_max_ack_backlog = backlog;
178 sk->sk_ack_backlog = 0;
Gustavo F. Padovan89bc5002011-06-03 00:19:47 -0300179
180 chan->state = BT_LISTEN;
Gustavo F. Padovanaf6bcd82011-02-04 02:40:28 -0200181 sk->sk_state = BT_LISTEN;
182
183done:
184 release_sock(sk);
185 return err;
186}
187
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200188static int l2cap_sock_accept(struct socket *sock, struct socket *newsock, int flags)
189{
190 DECLARE_WAITQUEUE(wait, current);
191 struct sock *sk = sock->sk, *nsk;
192 long timeo;
193 int err = 0;
194
195 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
196
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200197 timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
198
199 BT_DBG("sk %p timeo %ld", sk, timeo);
200
201 /* Wait for an incoming connection. (wake-one). */
202 add_wait_queue_exclusive(sk_sleep(sk), &wait);
Peter Hurleyf9a3c202011-07-24 00:10:52 -0400203 while (1) {
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200204 set_current_state(TASK_INTERRUPTIBLE);
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200205
206 if (sk->sk_state != BT_LISTEN) {
207 err = -EBADFD;
208 break;
209 }
210
Peter Hurleyf9a3c202011-07-24 00:10:52 -0400211 nsk = bt_accept_dequeue(sk, newsock);
212 if (nsk)
213 break;
214
215 if (!timeo) {
216 err = -EAGAIN;
217 break;
218 }
219
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200220 if (signal_pending(current)) {
221 err = sock_intr_errno(timeo);
222 break;
223 }
Peter Hurleyf9a3c202011-07-24 00:10:52 -0400224
225 release_sock(sk);
226 timeo = schedule_timeout(timeo);
227 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200228 }
Peter Hurleyf9a3c202011-07-24 00:10:52 -0400229 __set_current_state(TASK_RUNNING);
Gustavo F. Padovanc47b7c72011-02-04 02:42:23 -0200230 remove_wait_queue(sk_sleep(sk), &wait);
231
232 if (err)
233 goto done;
234
235 newsock->state = SS_CONNECTED;
236
237 BT_DBG("new socket %p", nsk);
238
239done:
240 release_sock(sk);
241 return err;
242}
243
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200244static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr, int *len, int peer)
245{
246 struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
247 struct sock *sk = sock->sk;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300248 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200249
250 BT_DBG("sock %p, sk %p", sock, sk);
251
252 addr->sa_family = AF_BLUETOOTH;
253 *len = sizeof(struct sockaddr_l2);
254
255 if (peer) {
Gustavo F. Padovanfe4128e2011-04-13 19:50:45 -0300256 la->l2_psm = chan->psm;
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200257 bacpy(&la->l2_bdaddr, &bt_sk(sk)->dst);
Gustavo F. Padovanfe4128e2011-04-13 19:50:45 -0300258 la->l2_cid = cpu_to_le16(chan->dcid);
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200259 } else {
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300260 la->l2_psm = chan->sport;
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200261 bacpy(&la->l2_bdaddr, &bt_sk(sk)->src);
Gustavo F. Padovanfe4128e2011-04-13 19:50:45 -0300262 la->l2_cid = cpu_to_le16(chan->scid);
Gustavo F. Padovand7175d52011-02-04 02:43:46 -0200263 }
264
265 return 0;
266}
267
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200268static int l2cap_sock_getsockopt_old(struct socket *sock, int optname, char __user *optval, int __user *optlen)
269{
270 struct sock *sk = sock->sk;
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300271 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200272 struct l2cap_options opts;
273 struct l2cap_conninfo cinfo;
274 int len, err = 0;
275 u32 opt;
276
277 BT_DBG("sk %p", sk);
278
279 if (get_user(len, optlen))
280 return -EFAULT;
281
282 lock_sock(sk);
283
284 switch (optname) {
285 case L2CAP_OPTIONS:
Vasiliy Kulikove3fb5922011-02-10 20:59:42 +0300286 memset(&opts, 0, sizeof(opts));
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300287 opts.imtu = chan->imtu;
288 opts.omtu = chan->omtu;
289 opts.flush_to = chan->flush_to;
290 opts.mode = chan->mode;
Gustavo F. Padovan47d1ec62011-04-13 15:57:03 -0300291 opts.fcs = chan->fcs;
292 opts.max_tx = chan->max_tx;
Andrei Emeltchenko6327eb92011-10-11 13:37:42 +0300293 opts.txwin_size = chan->tx_win;
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200294
295 len = min_t(unsigned int, len, sizeof(opts));
296 if (copy_to_user(optval, (char *) &opts, len))
297 err = -EFAULT;
298
299 break;
300
301 case L2CAP_LM:
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300302 switch (chan->sec_level) {
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200303 case BT_SECURITY_LOW:
304 opt = L2CAP_LM_AUTH;
305 break;
306 case BT_SECURITY_MEDIUM:
307 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
308 break;
309 case BT_SECURITY_HIGH:
310 opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
311 L2CAP_LM_SECURE;
312 break;
313 default:
314 opt = 0;
315 break;
316 }
317
Andrei Emeltchenko43bd0f32011-10-11 14:04:34 +0300318 if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200319 opt |= L2CAP_LM_MASTER;
320
Andrei Emeltchenkoecf61bd2011-10-11 14:04:32 +0300321 if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200322 opt |= L2CAP_LM_RELIABLE;
323
324 if (put_user(opt, (u32 __user *) optval))
325 err = -EFAULT;
326 break;
327
328 case L2CAP_CONNINFO:
329 if (sk->sk_state != BT_CONNECTED &&
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300330 !(sk->sk_state == BT_CONNECT2 &&
331 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200332 err = -ENOTCONN;
333 break;
334 }
335
Filip Palian8d03e972011-05-12 19:32:46 +0200336 memset(&cinfo, 0, sizeof(cinfo));
Gustavo F. Padovan8c1d7872011-04-13 20:23:55 -0300337 cinfo.hci_handle = chan->conn->hcon->handle;
338 memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200339
340 len = min_t(unsigned int, len, sizeof(cinfo));
341 if (copy_to_user(optval, (char *) &cinfo, len))
342 err = -EFAULT;
343
344 break;
345
346 default:
347 err = -ENOPROTOOPT;
348 break;
349 }
350
351 release_sock(sk);
352 return err;
353}
354
355static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
356{
357 struct sock *sk = sock->sk;
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300358 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200359 struct bt_security sec;
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700360 struct bt_power pwr;
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200361 int len, err = 0;
362
363 BT_DBG("sk %p", sk);
364
365 if (level == SOL_L2CAP)
366 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
367
368 if (level != SOL_BLUETOOTH)
369 return -ENOPROTOOPT;
370
371 if (get_user(len, optlen))
372 return -EFAULT;
373
374 lock_sock(sk);
375
376 switch (optname) {
377 case BT_SECURITY:
Gustavo F. Padovan715ec002011-05-02 17:13:55 -0300378 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
379 chan->chan_type != L2CAP_CHAN_RAW) {
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200380 err = -EINVAL;
381 break;
382 }
383
Vinicius Costa Gomes8f360112011-07-08 18:31:46 -0300384 memset(&sec, 0, sizeof(sec));
Andrei Emeltchenko85e34362012-10-05 16:56:54 +0300385 if (chan->conn) {
Gustavo Padovanc6585a42012-05-07 03:07:26 -0300386 sec.level = chan->conn->hcon->sec_level;
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200387
Andrei Emeltchenko85e34362012-10-05 16:56:54 +0300388 if (sk->sk_state == BT_CONNECTED)
389 sec.key_size = chan->conn->hcon->enc_key_size;
390 } else {
391 sec.level = chan->sec_level;
392 }
Vinicius Costa Gomes8f360112011-07-08 18:31:46 -0300393
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200394 len = min_t(unsigned int, len, sizeof(sec));
395 if (copy_to_user(optval, (char *) &sec, len))
396 err = -EFAULT;
397
398 break;
399
400 case BT_DEFER_SETUP:
401 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
402 err = -EINVAL;
403 break;
404 }
405
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300406 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
407 (u32 __user *) optval))
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200408 err = -EFAULT;
409
410 break;
411
412 case BT_FLUSHABLE:
Andrei Emeltchenkod57b0e82011-10-11 14:04:31 +0300413 if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
414 (u32 __user *) optval))
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200415 err = -EFAULT;
416
417 break;
418
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700419 case BT_POWER:
420 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
421 && sk->sk_type != SOCK_RAW) {
422 err = -EINVAL;
423 break;
424 }
425
Andrei Emeltchenko15770b12011-10-11 14:04:33 +0300426 pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700427
428 len = min_t(unsigned int, len, sizeof(pwr));
429 if (copy_to_user(optval, (char *) &pwr, len))
430 err = -EFAULT;
431
432 break;
433
Mat Martineau2ea66482011-11-02 16:18:30 -0700434 case BT_CHANNEL_POLICY:
435 if (!enable_hs) {
436 err = -ENOPROTOOPT;
437 break;
438 }
439
440 if (put_user(chan->chan_policy, (u32 __user *) optval))
441 err = -EFAULT;
442 break;
443
Gustavo F. Padovan99f48082011-02-04 02:52:55 -0200444 default:
445 err = -ENOPROTOOPT;
446 break;
447 }
448
449 release_sock(sk);
450 return err;
451}
452
Andre Guedes682877c2012-05-31 17:01:34 -0300453static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
454{
455 switch (chan->scid) {
456 case L2CAP_CID_LE_DATA:
Andre Guedes8c3a4f02012-05-31 17:01:35 -0300457 if (mtu < L2CAP_LE_MIN_MTU)
Andre Guedes682877c2012-05-31 17:01:34 -0300458 return false;
459 break;
460
461 default:
462 if (mtu < L2CAP_DEFAULT_MIN_MTU)
463 return false;
464 }
465
466 return true;
467}
468
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200469static int l2cap_sock_setsockopt_old(struct socket *sock, int optname, char __user *optval, unsigned int optlen)
470{
471 struct sock *sk = sock->sk;
Gustavo F. Padovanb4450032011-04-12 18:15:09 -0300472 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200473 struct l2cap_options opts;
474 int len, err = 0;
475 u32 opt;
476
477 BT_DBG("sk %p", sk);
478
479 lock_sock(sk);
480
481 switch (optname) {
482 case L2CAP_OPTIONS:
483 if (sk->sk_state == BT_CONNECTED) {
484 err = -EINVAL;
485 break;
486 }
487
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300488 opts.imtu = chan->imtu;
489 opts.omtu = chan->omtu;
490 opts.flush_to = chan->flush_to;
491 opts.mode = chan->mode;
Gustavo F. Padovan47d1ec62011-04-13 15:57:03 -0300492 opts.fcs = chan->fcs;
493 opts.max_tx = chan->max_tx;
Andrei Emeltchenko6327eb92011-10-11 13:37:42 +0300494 opts.txwin_size = chan->tx_win;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200495
496 len = min_t(unsigned int, sizeof(opts), optlen);
497 if (copy_from_user((char *) &opts, optval, len)) {
498 err = -EFAULT;
499 break;
500 }
501
Andrei Emeltchenko6327eb92011-10-11 13:37:42 +0300502 if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200503 err = -EINVAL;
504 break;
505 }
506
Andre Guedes682877c2012-05-31 17:01:34 -0300507 if (!l2cap_valid_mtu(chan, opts.imtu)) {
508 err = -EINVAL;
509 break;
510 }
511
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300512 chan->mode = opts.mode;
513 switch (chan->mode) {
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200514 case L2CAP_MODE_BASIC:
Gustavo F. Padovanc1360a12011-06-10 17:02:12 -0300515 clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200516 break;
517 case L2CAP_MODE_ERTM:
518 case L2CAP_MODE_STREAMING:
519 if (!disable_ertm)
520 break;
521 /* fall through */
522 default:
523 err = -EINVAL;
524 break;
525 }
526
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300527 chan->imtu = opts.imtu;
528 chan->omtu = opts.omtu;
Gustavo F. Padovan47d1ec62011-04-13 15:57:03 -0300529 chan->fcs = opts.fcs;
530 chan->max_tx = opts.max_tx;
Andrei Emeltchenko6327eb92011-10-11 13:37:42 +0300531 chan->tx_win = opts.txwin_size;
Andrei Emeltchenko12d59782012-10-10 17:38:26 +0300532 chan->flush_to = opts.flush_to;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200533 break;
534
535 case L2CAP_LM:
536 if (get_user(opt, (u32 __user *) optval)) {
537 err = -EFAULT;
538 break;
539 }
540
541 if (opt & L2CAP_LM_AUTH)
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300542 chan->sec_level = BT_SECURITY_LOW;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200543 if (opt & L2CAP_LM_ENCRYPT)
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300544 chan->sec_level = BT_SECURITY_MEDIUM;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200545 if (opt & L2CAP_LM_SECURE)
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300546 chan->sec_level = BT_SECURITY_HIGH;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200547
Andrei Emeltchenko43bd0f32011-10-11 14:04:34 +0300548 if (opt & L2CAP_LM_MASTER)
549 set_bit(FLAG_ROLE_SWITCH, &chan->flags);
550 else
551 clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
Andrei Emeltchenkoecf61bd2011-10-11 14:04:32 +0300552
553 if (opt & L2CAP_LM_RELIABLE)
554 set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
555 else
556 clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200557 break;
558
559 default:
560 err = -ENOPROTOOPT;
561 break;
562 }
563
564 release_sock(sk);
565 return err;
566}
567
568static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int optlen)
569{
570 struct sock *sk = sock->sk;
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300571 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200572 struct bt_security sec;
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700573 struct bt_power pwr;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300574 struct l2cap_conn *conn;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200575 int len, err = 0;
576 u32 opt;
577
578 BT_DBG("sk %p", sk);
579
580 if (level == SOL_L2CAP)
581 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
582
583 if (level != SOL_BLUETOOTH)
584 return -ENOPROTOOPT;
585
586 lock_sock(sk);
587
588 switch (optname) {
589 case BT_SECURITY:
Gustavo F. Padovan715ec002011-05-02 17:13:55 -0300590 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
591 chan->chan_type != L2CAP_CHAN_RAW) {
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200592 err = -EINVAL;
593 break;
594 }
595
596 sec.level = BT_SECURITY_LOW;
597
598 len = min_t(unsigned int, sizeof(sec), optlen);
599 if (copy_from_user((char *) &sec, optval, len)) {
600 err = -EFAULT;
601 break;
602 }
603
604 if (sec.level < BT_SECURITY_LOW ||
605 sec.level > BT_SECURITY_HIGH) {
606 err = -EINVAL;
607 break;
608 }
609
Gustavo F. Padovan43434782011-04-12 18:31:57 -0300610 chan->sec_level = sec.level;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300611
Gustavo F. Padovan0bee1d62011-11-05 19:58:31 -0200612 if (!chan->conn)
613 break;
614
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300615 conn = chan->conn;
Gustavo F. Padovan0bee1d62011-11-05 19:58:31 -0200616
617 /*change security for LE channels */
618 if (chan->scid == L2CAP_CID_LE_DATA) {
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300619 if (!conn->hcon->out) {
620 err = -EINVAL;
621 break;
622 }
623
Vinicius Costa Gomescc110922012-08-23 21:32:43 -0300624 if (smp_conn_security(conn->hcon, sec.level))
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300625 break;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300626 sk->sk_state = BT_CONFIG;
Gustavo F. Padovan3542b8542011-12-28 13:54:17 -0200627 chan->state = BT_CONFIG;
Gustavo F. Padovan0bee1d62011-11-05 19:58:31 -0200628
Gustavo Padovana7d77232012-05-13 03:20:07 -0300629 /* or for ACL link */
630 } else if ((sk->sk_state == BT_CONNECT2 &&
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300631 test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
Gustavo Padovana7d77232012-05-13 03:20:07 -0300632 sk->sk_state == BT_CONNECTED) {
633 if (!l2cap_chan_check_security(chan))
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300634 set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
Gustavo Padovana7d77232012-05-13 03:20:07 -0300635 else
636 sk->sk_state_change(sk);
Gustavo F. Padovan0bee1d62011-11-05 19:58:31 -0200637 } else {
638 err = -EINVAL;
Vinicius Costa Gomesf1cb9af2011-01-26 21:42:57 -0300639 }
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200640 break;
641
642 case BT_DEFER_SETUP:
643 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
644 err = -EINVAL;
645 break;
646 }
647
648 if (get_user(opt, (u32 __user *) optval)) {
649 err = -EFAULT;
650 break;
651 }
652
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300653 if (opt)
654 set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
655 else
656 clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200657 break;
658
659 case BT_FLUSHABLE:
660 if (get_user(opt, (u32 __user *) optval)) {
661 err = -EFAULT;
662 break;
663 }
664
665 if (opt > BT_FLUSHABLE_ON) {
666 err = -EINVAL;
667 break;
668 }
669
670 if (opt == BT_FLUSHABLE_OFF) {
Gustavo F. Padovan8c1d7872011-04-13 20:23:55 -0300671 struct l2cap_conn *conn = chan->conn;
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300672 /* proceed further only when we have l2cap_conn and
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200673 No Flush support in the LM */
674 if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
675 err = -EINVAL;
676 break;
677 }
678 }
679
Andrei Emeltchenkod57b0e82011-10-11 14:04:31 +0300680 if (opt)
681 set_bit(FLAG_FLUSHABLE, &chan->flags);
682 else
683 clear_bit(FLAG_FLUSHABLE, &chan->flags);
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200684 break;
685
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700686 case BT_POWER:
687 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
688 chan->chan_type != L2CAP_CHAN_RAW) {
689 err = -EINVAL;
690 break;
691 }
692
693 pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;
694
695 len = min_t(unsigned int, sizeof(pwr), optlen);
696 if (copy_from_user((char *) &pwr, optval, len)) {
697 err = -EFAULT;
698 break;
699 }
Andrei Emeltchenko15770b12011-10-11 14:04:33 +0300700
701 if (pwr.force_active)
702 set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
703 else
704 clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -0700705 break;
706
Mat Martineau2ea66482011-11-02 16:18:30 -0700707 case BT_CHANNEL_POLICY:
708 if (!enable_hs) {
709 err = -ENOPROTOOPT;
710 break;
711 }
712
713 if (get_user(opt, (u32 __user *) optval)) {
714 err = -EFAULT;
715 break;
716 }
717
718 if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
719 err = -EINVAL;
720 break;
721 }
722
723 if (chan->mode != L2CAP_MODE_ERTM &&
724 chan->mode != L2CAP_MODE_STREAMING) {
725 err = -EOPNOTSUPP;
726 break;
727 }
728
729 chan->chan_policy = (u8) opt;
Gustavo F. Padovan33575df2011-02-04 02:48:48 -0200730 break;
731
732 default:
733 err = -ENOPROTOOPT;
734 break;
735 }
736
737 release_sock(sk);
738 return err;
739}
740
Gustavo F. Padovanfd83ccd2011-02-04 03:20:52 -0200741static int l2cap_sock_sendmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len)
742{
743 struct sock *sk = sock->sk;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300744 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
Gustavo F. Padovanfd83ccd2011-02-04 03:20:52 -0200745 int err;
746
747 BT_DBG("sock %p, sk %p", sock, sk);
748
749 err = sock_error(sk);
750 if (err)
751 return err;
752
753 if (msg->msg_flags & MSG_OOB)
754 return -EOPNOTSUPP;
755
Mat Martineaua6a55682012-05-04 14:20:31 -0700756 if (sk->sk_state != BT_CONNECTED)
Gustavo F. Padovan9a91a042011-04-28 18:50:17 -0300757 return -ENOTCONN;
Gustavo F. Padovanfd83ccd2011-02-04 03:20:52 -0200758
Mat Martineaua6a55682012-05-04 14:20:31 -0700759 l2cap_chan_lock(chan);
Luiz Augusto von Dentz5e59b792011-11-01 10:58:57 +0200760 err = l2cap_chan_send(chan, msg, len, sk->sk_priority);
Mat Martineaua6a55682012-05-04 14:20:31 -0700761 l2cap_chan_unlock(chan);
Gustavo F. Padovanfd83ccd2011-02-04 03:20:52 -0200762
Gustavo F. Padovanfd83ccd2011-02-04 03:20:52 -0200763 return err;
764}
765
Gustavo F. Padovan68983252011-02-04 03:02:31 -0200766static int l2cap_sock_recvmsg(struct kiocb *iocb, struct socket *sock, struct msghdr *msg, size_t len, int flags)
767{
768 struct sock *sk = sock->sk;
Mat Martineaue3281402011-07-07 09:39:02 -0700769 struct l2cap_pinfo *pi = l2cap_pi(sk);
770 int err;
Gustavo F. Padovan68983252011-02-04 03:02:31 -0200771
772 lock_sock(sk);
773
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300774 if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
775 &bt_sk(sk)->flags)) {
Gustavo F. Padovan8c1d7872011-04-13 20:23:55 -0300776 sk->sk_state = BT_CONFIG;
Gustavo F. Padovan3542b8542011-12-28 13:54:17 -0200777 pi->chan->state = BT_CONFIG;
Gustavo F. Padovan8c1d7872011-04-13 20:23:55 -0300778
Mat Martineaue3281402011-07-07 09:39:02 -0700779 __l2cap_connect_rsp_defer(pi->chan);
Gustavo F. Padovan68983252011-02-04 03:02:31 -0200780 release_sock(sk);
781 return 0;
782 }
783
784 release_sock(sk);
785
786 if (sock->type == SOCK_STREAM)
Mat Martineaue3281402011-07-07 09:39:02 -0700787 err = bt_sock_stream_recvmsg(iocb, sock, msg, len, flags);
788 else
789 err = bt_sock_recvmsg(iocb, sock, msg, len, flags);
Gustavo F. Padovan68983252011-02-04 03:02:31 -0200790
Mat Martineaue3281402011-07-07 09:39:02 -0700791 if (pi->chan->mode != L2CAP_MODE_ERTM)
792 return err;
793
794 /* Attempt to put pending rx data in the socket buffer */
795
796 lock_sock(sk);
797
798 if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
799 goto done;
800
801 if (pi->rx_busy_skb) {
802 if (!sock_queue_rcv_skb(sk, pi->rx_busy_skb))
803 pi->rx_busy_skb = NULL;
804 else
805 goto done;
806 }
807
808 /* Restore data flow when half of the receive buffer is
809 * available. This avoids resending large numbers of
810 * frames.
811 */
812 if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
813 l2cap_chan_busy(pi->chan, 0);
814
815done:
816 release_sock(sk);
817 return err;
Gustavo F. Padovan68983252011-02-04 03:02:31 -0200818}
819
Gustavo F. Padovan05fc1572011-02-04 03:26:01 -0200820/* Kill socket (only if zapped and orphan)
821 * Must be called on unlocked socket.
822 */
Gustavo F. Padovanba3bd0e2011-05-16 18:23:24 -0300823static void l2cap_sock_kill(struct sock *sk)
Gustavo F. Padovan05fc1572011-02-04 03:26:01 -0200824{
825 if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
826 return;
827
Andrei Emeltchenkoe05dcc32012-02-17 11:40:56 +0200828 BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
Gustavo F. Padovan05fc1572011-02-04 03:26:01 -0200829
830 /* Kill poor orphan */
Gustavo F. Padovan6ff5abb2011-04-25 15:10:41 -0300831
Jaganath Kanakkassery4af66c62012-07-13 18:17:55 +0530832 l2cap_chan_put(l2cap_pi(sk)->chan);
Gustavo F. Padovan05fc1572011-02-04 03:26:01 -0200833 sock_set_flag(sk, SOCK_DEAD);
834 sock_put(sk);
835}
836
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200837static int l2cap_sock_shutdown(struct socket *sock, int how)
838{
839 struct sock *sk = sock->sk;
Andrei Emeltchenko7ddb6e02012-02-14 15:12:57 +0200840 struct l2cap_chan *chan;
Andrei Emeltchenko3df91ea2012-02-21 12:54:55 +0200841 struct l2cap_conn *conn;
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200842 int err = 0;
843
844 BT_DBG("sock %p, sk %p", sock, sk);
845
846 if (!sk)
847 return 0;
848
Andrei Emeltchenko7ddb6e02012-02-14 15:12:57 +0200849 chan = l2cap_pi(sk)->chan;
Andrei Emeltchenko3df91ea2012-02-21 12:54:55 +0200850 conn = chan->conn;
851
852 if (conn)
853 mutex_lock(&conn->chan_lock);
Andrei Emeltchenko7ddb6e02012-02-14 15:12:57 +0200854
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200855 l2cap_chan_lock(chan);
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200856 lock_sock(sk);
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200857
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200858 if (!sk->sk_shutdown) {
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -0300859 if (chan->mode == L2CAP_MODE_ERTM)
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200860 err = __l2cap_wait_ack(sk);
861
862 sk->sk_shutdown = SHUTDOWN_MASK;
Andrei Emeltchenko3df91ea2012-02-21 12:54:55 +0200863
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200864 release_sock(sk);
Gustavo F. Padovan0f852722011-05-04 19:42:50 -0300865 l2cap_chan_close(chan, 0);
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200866 lock_sock(sk);
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200867
868 if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime)
869 err = bt_sock_wait_state(sk, BT_CLOSED,
870 sk->sk_lingertime);
871 }
872
873 if (!err && sk->sk_err)
874 err = -sk->sk_err;
875
876 release_sock(sk);
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200877 l2cap_chan_unlock(chan);
Andrei Emeltchenko3df91ea2012-02-21 12:54:55 +0200878
879 if (conn)
880 mutex_unlock(&conn->chan_lock);
881
Gustavo F. Padovandcba0db2011-02-04 03:08:36 -0200882 return err;
883}
884
Gustavo F. Padovan554f05b2011-02-04 02:36:42 -0200885static int l2cap_sock_release(struct socket *sock)
886{
887 struct sock *sk = sock->sk;
888 int err;
889
890 BT_DBG("sock %p, sk %p", sock, sk);
891
892 if (!sk)
893 return 0;
894
Masatake YAMATO5b28d952012-07-26 01:29:25 +0900895 bt_sock_unlink(&l2cap_sk_list, sk);
896
Gustavo F. Padovan554f05b2011-02-04 02:36:42 -0200897 err = l2cap_sock_shutdown(sock, 2);
898
899 sock_orphan(sk);
900 l2cap_sock_kill(sk);
901 return err;
902}
903
Andrei Emeltchenkoc0df7f62012-05-27 22:27:52 -0300904static void l2cap_sock_cleanup_listen(struct sock *parent)
905{
906 struct sock *sk;
907
908 BT_DBG("parent %p", parent);
909
910 /* Close not yet accepted channels */
911 while ((sk = bt_accept_dequeue(parent, NULL))) {
912 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
913
914 l2cap_chan_lock(chan);
915 __clear_chan_timer(chan);
916 l2cap_chan_close(chan, ECONNRESET);
917 l2cap_chan_unlock(chan);
918
919 l2cap_sock_kill(sk);
920 }
921}
922
Gustavo Padovan80b98022012-05-27 22:27:51 -0300923static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
Gustavo F. Padovan80808e42011-05-16 17:24:37 -0300924{
Gustavo Padovan80b98022012-05-27 22:27:51 -0300925 struct sock *sk, *parent = chan->data;
Gustavo F. Padovan80808e42011-05-16 17:24:37 -0300926
Gustavo Padovan53826692012-05-27 22:27:55 -0300927 /* Check for backlog size */
928 if (sk_acceptq_is_full(parent)) {
929 BT_DBG("backlog full %d", parent->sk_ack_backlog);
930 return NULL;
931 }
932
Gustavo F. Padovan80808e42011-05-16 17:24:37 -0300933 sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
934 GFP_ATOMIC);
935 if (!sk)
936 return NULL;
937
Octavian Purdilad22015a2012-01-22 00:28:34 +0200938 bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);
939
Gustavo F. Padovan80808e42011-05-16 17:24:37 -0300940 l2cap_sock_init(sk, parent);
941
942 return l2cap_pi(sk)->chan;
943}
944
Gustavo Padovan80b98022012-05-27 22:27:51 -0300945static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
Gustavo F. Padovan23070492011-05-16 17:57:22 -0300946{
Mat Martineaue3281402011-07-07 09:39:02 -0700947 int err;
Gustavo Padovan80b98022012-05-27 22:27:51 -0300948 struct sock *sk = chan->data;
Mat Martineaue3281402011-07-07 09:39:02 -0700949 struct l2cap_pinfo *pi = l2cap_pi(sk);
Gustavo F. Padovan23070492011-05-16 17:57:22 -0300950
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200951 lock_sock(sk);
952
953 if (pi->rx_busy_skb) {
954 err = -ENOMEM;
955 goto done;
956 }
Mat Martineaue3281402011-07-07 09:39:02 -0700957
958 err = sock_queue_rcv_skb(sk, skb);
959
960 /* For ERTM, handle one skb that doesn't fit into the recv
961 * buffer. This is important to do because the data frames
962 * have already been acked, so the skb cannot be discarded.
963 *
964 * Notify the l2cap core that the buffer is full, so the
965 * LOCAL_BUSY state is entered and no more frames are
966 * acked and reassembled until there is buffer space
967 * available.
968 */
969 if (err < 0 && pi->chan->mode == L2CAP_MODE_ERTM) {
970 pi->rx_busy_skb = skb;
971 l2cap_chan_busy(pi->chan, 1);
972 err = 0;
973 }
974
Andrei Emeltchenko6be36552012-02-22 17:11:56 +0200975done:
976 release_sock(sk);
977
Mat Martineaue3281402011-07-07 09:39:02 -0700978 return err;
Gustavo F. Padovan23070492011-05-16 17:57:22 -0300979}
980
Gustavo Padovan80b98022012-05-27 22:27:51 -0300981static void l2cap_sock_close_cb(struct l2cap_chan *chan)
Gustavo F. Padovanba3bd0e2011-05-16 18:23:24 -0300982{
Gustavo Padovan80b98022012-05-27 22:27:51 -0300983 struct sock *sk = chan->data;
Gustavo F. Padovanba3bd0e2011-05-16 18:23:24 -0300984
985 l2cap_sock_kill(sk);
986}
987
Andrei Emeltchenkoc0df7f62012-05-27 22:27:52 -0300988static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
989{
990 struct sock *sk = chan->data;
991 struct sock *parent;
992
993 lock_sock(sk);
994
995 parent = bt_sk(sk)->parent;
996
997 sock_set_flag(sk, SOCK_ZAPPED);
998
999 switch (chan->state) {
1000 case BT_OPEN:
1001 case BT_BOUND:
1002 case BT_CLOSED:
1003 break;
1004 case BT_LISTEN:
1005 l2cap_sock_cleanup_listen(sk);
1006 sk->sk_state = BT_CLOSED;
1007 chan->state = BT_CLOSED;
1008
1009 break;
1010 default:
1011 sk->sk_state = BT_CLOSED;
1012 chan->state = BT_CLOSED;
1013
1014 sk->sk_err = err;
1015
1016 if (parent) {
1017 bt_accept_unlink(sk);
1018 parent->sk_data_ready(parent, 0);
1019 } else {
1020 sk->sk_state_change(sk);
1021 }
1022
1023 break;
1024 }
1025
1026 release_sock(sk);
1027}
1028
Gustavo Padovan80b98022012-05-27 22:27:51 -03001029static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state)
Gustavo F. Padovan89bc5002011-06-03 00:19:47 -03001030{
Gustavo Padovan80b98022012-05-27 22:27:51 -03001031 struct sock *sk = chan->data;
Gustavo F. Padovan89bc5002011-06-03 00:19:47 -03001032
1033 sk->sk_state = state;
1034}
1035
Andrei Emeltchenko2f7719c2012-01-20 14:08:03 +02001036static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
Gustavo Padovan90338942012-04-06 20:15:47 -03001037 unsigned long len, int nb)
Andrei Emeltchenko2f7719c2012-01-20 14:08:03 +02001038{
Gustavo Padovan90338942012-04-06 20:15:47 -03001039 struct sk_buff *skb;
1040 int err;
Andrei Emeltchenko2f7719c2012-01-20 14:08:03 +02001041
Mat Martineaua6a55682012-05-04 14:20:31 -07001042 l2cap_chan_unlock(chan);
Gustavo Padovan90338942012-04-06 20:15:47 -03001043 skb = bt_skb_send_alloc(chan->sk, len, nb, &err);
Mat Martineaua6a55682012-05-04 14:20:31 -07001044 l2cap_chan_lock(chan);
1045
Gustavo Padovan90338942012-04-06 20:15:47 -03001046 if (!skb)
1047 return ERR_PTR(err);
1048
1049 return skb;
Andrei Emeltchenko2f7719c2012-01-20 14:08:03 +02001050}
1051
Andrei Emeltchenko54a59aa2012-05-27 22:27:53 -03001052static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
1053{
1054 struct sock *sk = chan->data;
1055 struct sock *parent;
1056
1057 lock_sock(sk);
1058
1059 parent = bt_sk(sk)->parent;
1060
1061 BT_DBG("sk %p, parent %p", sk, parent);
1062
1063 sk->sk_state = BT_CONNECTED;
1064 sk->sk_state_change(sk);
1065
1066 if (parent)
1067 parent->sk_data_ready(parent, 0);
1068
1069 release_sock(sk);
1070}
1071
Gustavo F. Padovan80808e42011-05-16 17:24:37 -03001072static struct l2cap_ops l2cap_chan_ops = {
1073 .name = "L2CAP Socket Interface",
1074 .new_connection = l2cap_sock_new_connection_cb,
Gustavo F. Padovan23070492011-05-16 17:57:22 -03001075 .recv = l2cap_sock_recv_cb,
Gustavo F. Padovanba3bd0e2011-05-16 18:23:24 -03001076 .close = l2cap_sock_close_cb,
Andrei Emeltchenkoc0df7f62012-05-27 22:27:52 -03001077 .teardown = l2cap_sock_teardown_cb,
Gustavo F. Padovan89bc5002011-06-03 00:19:47 -03001078 .state_change = l2cap_sock_state_change_cb,
Andrei Emeltchenko54a59aa2012-05-27 22:27:53 -03001079 .ready = l2cap_sock_ready_cb,
Andrei Emeltchenko2f7719c2012-01-20 14:08:03 +02001080 .alloc_skb = l2cap_sock_alloc_skb_cb,
Gustavo F. Padovan80808e42011-05-16 17:24:37 -03001081};
1082
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001083static void l2cap_sock_destruct(struct sock *sk)
1084{
1085 BT_DBG("sk %p", sk);
1086
Sasha Levin23d3a862012-10-08 16:48:32 -04001087 if (l2cap_pi(sk)->chan)
1088 l2cap_chan_put(l2cap_pi(sk)->chan);
Mat Martineaue3281402011-07-07 09:39:02 -07001089 if (l2cap_pi(sk)->rx_busy_skb) {
1090 kfree_skb(l2cap_pi(sk)->rx_busy_skb);
1091 l2cap_pi(sk)->rx_busy_skb = NULL;
1092 }
1093
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001094 skb_queue_purge(&sk->sk_receive_queue);
1095 skb_queue_purge(&sk->sk_write_queue);
1096}
1097
Gustavo F. Padovan80808e42011-05-16 17:24:37 -03001098static void l2cap_sock_init(struct sock *sk, struct sock *parent)
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001099{
1100 struct l2cap_pinfo *pi = l2cap_pi(sk);
Gustavo F. Padovanb4450032011-04-12 18:15:09 -03001101 struct l2cap_chan *chan = pi->chan;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001102
1103 BT_DBG("sk %p", sk);
1104
1105 if (parent) {
Gustavo F. Padovanb4450032011-04-12 18:15:09 -03001106 struct l2cap_chan *pchan = l2cap_pi(parent)->chan;
1107
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001108 sk->sk_type = parent->sk_type;
Gustavo Padovanc5daa682012-05-16 12:17:10 -03001109 bt_sk(sk)->flags = bt_sk(parent)->flags;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001110
Gustavo F. Padovan715ec002011-05-02 17:13:55 -03001111 chan->chan_type = pchan->chan_type;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001112 chan->imtu = pchan->imtu;
1113 chan->omtu = pchan->omtu;
Gustavo F. Padovanb4450032011-04-12 18:15:09 -03001114 chan->conf_state = pchan->conf_state;
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001115 chan->mode = pchan->mode;
Gustavo F. Padovan47d1ec62011-04-13 15:57:03 -03001116 chan->fcs = pchan->fcs;
1117 chan->max_tx = pchan->max_tx;
1118 chan->tx_win = pchan->tx_win;
Andrei Emeltchenko6b3c7102011-11-02 09:57:10 +02001119 chan->tx_win_max = pchan->tx_win_max;
Gustavo F. Padovan43434782011-04-12 18:31:57 -03001120 chan->sec_level = pchan->sec_level;
Andrei Emeltchenkod57b0e82011-10-11 14:04:31 +03001121 chan->flags = pchan->flags;
Paul Moore6230c9b2011-10-07 09:40:59 +00001122
1123 security_sk_clone(parent, sk);
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001124 } else {
Gustavo F. Padovan715ec002011-05-02 17:13:55 -03001125
1126 switch (sk->sk_type) {
1127 case SOCK_RAW:
1128 chan->chan_type = L2CAP_CHAN_RAW;
1129 break;
1130 case SOCK_DGRAM:
1131 chan->chan_type = L2CAP_CHAN_CONN_LESS;
1132 break;
1133 case SOCK_SEQPACKET:
1134 case SOCK_STREAM:
1135 chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
1136 break;
1137 }
1138
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001139 chan->imtu = L2CAP_DEFAULT_MTU;
1140 chan->omtu = 0;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001141 if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001142 chan->mode = L2CAP_MODE_ERTM;
Gustavo F. Padovanc1360a12011-06-10 17:02:12 -03001143 set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001144 } else {
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001145 chan->mode = L2CAP_MODE_BASIC;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001146 }
Andrei Emeltchenkobd4b1652012-03-28 16:31:25 +03001147
1148 l2cap_chan_set_defaults(chan);
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001149 }
1150
1151 /* Default config options */
Gustavo F. Padovan0c1bc5c2011-04-13 17:20:49 -03001152 chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
Gustavo F. Padovan80808e42011-05-16 17:24:37 -03001153
1154 chan->data = sk;
1155 chan->ops = &l2cap_chan_ops;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001156}
1157
1158static struct proto l2cap_proto = {
1159 .name = "L2CAP",
1160 .owner = THIS_MODULE,
1161 .obj_size = sizeof(struct l2cap_pinfo)
1162};
1163
Gustavo F. Padovan80808e42011-05-16 17:24:37 -03001164static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock, int proto, gfp_t prio)
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001165{
1166 struct sock *sk;
Gustavo F. Padovandc50a062011-05-16 16:42:01 -03001167 struct l2cap_chan *chan;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001168
1169 sk = sk_alloc(net, PF_BLUETOOTH, prio, &l2cap_proto);
1170 if (!sk)
1171 return NULL;
1172
1173 sock_init_data(sock, sk);
1174 INIT_LIST_HEAD(&bt_sk(sk)->accept_q);
1175
1176 sk->sk_destruct = l2cap_sock_destruct;
Marcel Holtmannba13ccd2012-03-01 14:25:33 -08001177 sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001178
1179 sock_reset_flag(sk, SOCK_ZAPPED);
1180
1181 sk->sk_protocol = proto;
1182 sk->sk_state = BT_OPEN;
1183
Gustavo Padovaneef1d9b2012-03-25 13:59:16 -03001184 chan = l2cap_chan_create();
Gustavo F. Padovandc50a062011-05-16 16:42:01 -03001185 if (!chan) {
Jaganath Kanakkassery49dfbb92012-07-19 12:54:04 +05301186 sk_free(sk);
Gustavo F. Padovandc50a062011-05-16 16:42:01 -03001187 return NULL;
1188 }
1189
Mat Martineau61d6ef32012-04-27 16:50:50 -07001190 l2cap_chan_hold(chan);
1191
Gustavo Padovaneef1d9b2012-03-25 13:59:16 -03001192 chan->sk = sk;
1193
Gustavo F. Padovandc50a062011-05-16 16:42:01 -03001194 l2cap_pi(sk)->chan = chan;
1195
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001196 return sk;
1197}
1198
1199static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
1200 int kern)
1201{
1202 struct sock *sk;
1203
1204 BT_DBG("sock %p", sock);
1205
1206 sock->state = SS_UNCONNECTED;
1207
1208 if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1209 sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1210 return -ESOCKTNOSUPPORT;
1211
1212 if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1213 return -EPERM;
1214
1215 sock->ops = &l2cap_sock_ops;
1216
1217 sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC);
1218 if (!sk)
1219 return -ENOMEM;
1220
1221 l2cap_sock_init(sk, NULL);
Masatake YAMATO5b28d952012-07-26 01:29:25 +09001222 bt_sock_link(&l2cap_sk_list, sk);
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001223 return 0;
1224}
1225
Gustavo F. Padovancf2f90f2011-04-27 18:40:39 -03001226static const struct proto_ops l2cap_sock_ops = {
Gustavo F. Padovan65390582011-02-04 02:33:56 -02001227 .family = PF_BLUETOOTH,
1228 .owner = THIS_MODULE,
1229 .release = l2cap_sock_release,
1230 .bind = l2cap_sock_bind,
1231 .connect = l2cap_sock_connect,
1232 .listen = l2cap_sock_listen,
1233 .accept = l2cap_sock_accept,
1234 .getname = l2cap_sock_getname,
1235 .sendmsg = l2cap_sock_sendmsg,
1236 .recvmsg = l2cap_sock_recvmsg,
1237 .poll = bt_sock_poll,
1238 .ioctl = bt_sock_ioctl,
1239 .mmap = sock_no_mmap,
1240 .socketpair = sock_no_socketpair,
1241 .shutdown = l2cap_sock_shutdown,
1242 .setsockopt = l2cap_sock_setsockopt,
1243 .getsockopt = l2cap_sock_getsockopt
1244};
1245
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001246static const struct net_proto_family l2cap_sock_family_ops = {
1247 .family = PF_BLUETOOTH,
1248 .owner = THIS_MODULE,
1249 .create = l2cap_sock_create,
1250};
1251
1252int __init l2cap_init_sockets(void)
1253{
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001254 int err;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001255
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001256 err = proto_register(&l2cap_proto, 0);
1257 if (err < 0)
1258 return err;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001259
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001260 err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
Masatake YAMATO5b28d952012-07-26 01:29:25 +09001261 if (err < 0) {
1262 BT_ERR("L2CAP socket registration failed");
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001263 goto error;
Masatake YAMATO5b28d952012-07-26 01:29:25 +09001264 }
1265
1266 err = bt_procfs_init(THIS_MODULE, &init_net, "l2cap", &l2cap_sk_list, NULL);
1267 if (err < 0) {
1268 BT_ERR("Failed to create L2CAP proc file");
1269 bt_sock_unregister(BTPROTO_L2CAP);
1270 goto error;
1271 }
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001272
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001273 BT_INFO("L2CAP socket layer initialized");
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001274
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001275 return 0;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001276
1277error:
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001278 proto_unregister(&l2cap_proto);
1279 return err;
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001280}
1281
1282void l2cap_cleanup_sockets(void)
1283{
Masatake YAMATO5b28d952012-07-26 01:29:25 +09001284 bt_procfs_cleanup(&init_net, "l2cap");
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001285 if (bt_sock_unregister(BTPROTO_L2CAP) < 0)
1286 BT_ERR("L2CAP socket unregistration failed");
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001287
Gustavo F. Padovane2174ca2011-02-17 19:16:55 -03001288 proto_unregister(&l2cap_proto);
Gustavo F. Padovanbb58f742011-02-03 20:50:35 -02001289}