net: stmmac: xgmac: fix a typo of register name in DPP safety handling
[platform/kernel/linux-starfive.git] / net / bluetooth / l2cap_sock.c
1 /*
2    BlueZ - Bluetooth protocol stack for Linux
3    Copyright (C) 2000-2001 Qualcomm Incorporated
4    Copyright (C) 2009-2010 Gustavo F. Padovan <gustavo@padovan.org>
5    Copyright (C) 2010 Google Inc.
6    Copyright (C) 2011 ProFUSION Embedded Systems
7
8    Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
9
10    This program is free software; you can redistribute it and/or modify
11    it under the terms of the GNU General Public License version 2 as
12    published by the Free Software Foundation;
13
14    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
15    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
16    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
17    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
18    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
19    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
20    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
21    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
22
23    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
24    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
25    SOFTWARE IS DISCLAIMED.
26 */
27
28 /* Bluetooth L2CAP sockets. */
29
30 #include <linux/module.h>
31 #include <linux/export.h>
32 #include <linux/filter.h>
33 #include <linux/sched/signal.h>
34
35 #include <net/bluetooth/bluetooth.h>
36 #include <net/bluetooth/hci_core.h>
37 #include <net/bluetooth/l2cap.h>
38
39 #include "smp.h"
40
41 static struct bt_sock_list l2cap_sk_list = {
42         .lock = __RW_LOCK_UNLOCKED(l2cap_sk_list.lock)
43 };
44
45 static const struct proto_ops l2cap_sock_ops;
46 static void l2cap_sock_init(struct sock *sk, struct sock *parent);
47 static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
48                                      int proto, gfp_t prio, int kern);
49 static void l2cap_sock_cleanup_listen(struct sock *parent);
50
51 bool l2cap_is_socket(struct socket *sock)
52 {
53         return sock && sock->ops == &l2cap_sock_ops;
54 }
55 EXPORT_SYMBOL(l2cap_is_socket);
56
57 static int l2cap_validate_bredr_psm(u16 psm)
58 {
59         /* PSM must be odd and lsb of upper byte must be 0 */
60         if ((psm & 0x0101) != 0x0001)
61                 return -EINVAL;
62
63         /* Restrict usage of well-known PSMs */
64         if (psm < L2CAP_PSM_DYN_START && !capable(CAP_NET_BIND_SERVICE))
65                 return -EACCES;
66
67         return 0;
68 }
69
70 static int l2cap_validate_le_psm(u16 psm)
71 {
72         /* Valid LE_PSM ranges are defined only until 0x00ff */
73         if (psm > L2CAP_PSM_LE_DYN_END)
74                 return -EINVAL;
75
76         /* Restrict fixed, SIG assigned PSM values to CAP_NET_BIND_SERVICE */
77         if (psm < L2CAP_PSM_LE_DYN_START && !capable(CAP_NET_BIND_SERVICE))
78                 return -EACCES;
79
80         return 0;
81 }
82
83 static int l2cap_sock_bind(struct socket *sock, struct sockaddr *addr, int alen)
84 {
85         struct sock *sk = sock->sk;
86         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
87         struct sockaddr_l2 la;
88         int len, err = 0;
89
90         BT_DBG("sk %p", sk);
91
92         if (!addr || alen < offsetofend(struct sockaddr, sa_family) ||
93             addr->sa_family != AF_BLUETOOTH)
94                 return -EINVAL;
95
96         memset(&la, 0, sizeof(la));
97         len = min_t(unsigned int, sizeof(la), alen);
98         memcpy(&la, addr, len);
99
100         if (la.l2_cid && la.l2_psm)
101                 return -EINVAL;
102
103         if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
104                 return -EINVAL;
105
106         if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
107                 /* We only allow ATT user space socket */
108                 if (la.l2_cid &&
109                     la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
110                         return -EINVAL;
111         }
112
113         lock_sock(sk);
114
115         if (sk->sk_state != BT_OPEN) {
116                 err = -EBADFD;
117                 goto done;
118         }
119
120         if (la.l2_psm) {
121                 __u16 psm = __le16_to_cpu(la.l2_psm);
122
123                 if (la.l2_bdaddr_type == BDADDR_BREDR)
124                         err = l2cap_validate_bredr_psm(psm);
125                 else
126                         err = l2cap_validate_le_psm(psm);
127
128                 if (err)
129                         goto done;
130         }
131
132         bacpy(&chan->src, &la.l2_bdaddr);
133         chan->src_type = la.l2_bdaddr_type;
134
135         if (la.l2_cid)
136                 err = l2cap_add_scid(chan, __le16_to_cpu(la.l2_cid));
137         else
138                 err = l2cap_add_psm(chan, &la.l2_bdaddr, la.l2_psm);
139
140         if (err < 0)
141                 goto done;
142
143         switch (chan->chan_type) {
144         case L2CAP_CHAN_CONN_LESS:
145                 if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_3DSP)
146                         chan->sec_level = BT_SECURITY_SDP;
147                 break;
148         case L2CAP_CHAN_CONN_ORIENTED:
149                 if (__le16_to_cpu(la.l2_psm) == L2CAP_PSM_SDP ||
150                     __le16_to_cpu(la.l2_psm) == L2CAP_PSM_RFCOMM)
151                         chan->sec_level = BT_SECURITY_SDP;
152                 break;
153         case L2CAP_CHAN_RAW:
154                 chan->sec_level = BT_SECURITY_SDP;
155                 break;
156         case L2CAP_CHAN_FIXED:
157                 /* Fixed channels default to the L2CAP core not holding a
158                  * hci_conn reference for them. For fixed channels mapping to
159                  * L2CAP sockets we do want to hold a reference so set the
160                  * appropriate flag to request it.
161                  */
162                 set_bit(FLAG_HOLD_HCI_CONN, &chan->flags);
163                 break;
164         }
165
166         /* Use L2CAP_MODE_LE_FLOWCTL (CoC) in case of LE address and
167          * L2CAP_MODE_EXT_FLOWCTL (ECRED) has not been set.
168          */
169         if (chan->psm && bdaddr_type_is_le(chan->src_type) &&
170             chan->mode != L2CAP_MODE_EXT_FLOWCTL)
171                 chan->mode = L2CAP_MODE_LE_FLOWCTL;
172
173         chan->state = BT_BOUND;
174         sk->sk_state = BT_BOUND;
175
176 done:
177         release_sock(sk);
178         return err;
179 }
180
181 static int l2cap_sock_connect(struct socket *sock, struct sockaddr *addr,
182                               int alen, int flags)
183 {
184         struct sock *sk = sock->sk;
185         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
186         struct sockaddr_l2 la;
187         int len, err = 0;
188         bool zapped;
189
190         BT_DBG("sk %p", sk);
191
192         lock_sock(sk);
193         zapped = sock_flag(sk, SOCK_ZAPPED);
194         release_sock(sk);
195
196         if (zapped)
197                 return -EINVAL;
198
199         if (!addr || alen < offsetofend(struct sockaddr, sa_family) ||
200             addr->sa_family != AF_BLUETOOTH)
201                 return -EINVAL;
202
203         memset(&la, 0, sizeof(la));
204         len = min_t(unsigned int, sizeof(la), alen);
205         memcpy(&la, addr, len);
206
207         if (la.l2_cid && la.l2_psm)
208                 return -EINVAL;
209
210         if (!bdaddr_type_is_valid(la.l2_bdaddr_type))
211                 return -EINVAL;
212
213         /* Check that the socket wasn't bound to something that
214          * conflicts with the address given to connect(). If chan->src
215          * is BDADDR_ANY it means bind() was never used, in which case
216          * chan->src_type and la.l2_bdaddr_type do not need to match.
217          */
218         if (chan->src_type == BDADDR_BREDR && bacmp(&chan->src, BDADDR_ANY) &&
219             bdaddr_type_is_le(la.l2_bdaddr_type)) {
220                 /* Old user space versions will try to incorrectly bind
221                  * the ATT socket using BDADDR_BREDR. We need to accept
222                  * this and fix up the source address type only when
223                  * both the source CID and destination CID indicate
224                  * ATT. Anything else is an invalid combination.
225                  */
226                 if (chan->scid != L2CAP_CID_ATT ||
227                     la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
228                         return -EINVAL;
229
230                 /* We don't have the hdev available here to make a
231                  * better decision on random vs public, but since all
232                  * user space versions that exhibit this issue anyway do
233                  * not support random local addresses assuming public
234                  * here is good enough.
235                  */
236                 chan->src_type = BDADDR_LE_PUBLIC;
237         }
238
239         if (chan->src_type != BDADDR_BREDR && la.l2_bdaddr_type == BDADDR_BREDR)
240                 return -EINVAL;
241
242         if (bdaddr_type_is_le(la.l2_bdaddr_type)) {
243                 /* We only allow ATT user space socket */
244                 if (la.l2_cid &&
245                     la.l2_cid != cpu_to_le16(L2CAP_CID_ATT))
246                         return -EINVAL;
247         }
248
249         /* Use L2CAP_MODE_LE_FLOWCTL (CoC) in case of LE address and
250          * L2CAP_MODE_EXT_FLOWCTL (ECRED) has not been set.
251          */
252         if (chan->psm && bdaddr_type_is_le(chan->src_type) &&
253             chan->mode != L2CAP_MODE_EXT_FLOWCTL)
254                 chan->mode = L2CAP_MODE_LE_FLOWCTL;
255
256         err = l2cap_chan_connect(chan, la.l2_psm, __le16_to_cpu(la.l2_cid),
257                                  &la.l2_bdaddr, la.l2_bdaddr_type);
258         if (err)
259                 return err;
260
261         lock_sock(sk);
262
263         err = bt_sock_wait_state(sk, BT_CONNECTED,
264                                  sock_sndtimeo(sk, flags & O_NONBLOCK));
265
266         release_sock(sk);
267
268         return err;
269 }
270
271 static int l2cap_sock_listen(struct socket *sock, int backlog)
272 {
273         struct sock *sk = sock->sk;
274         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
275         int err = 0;
276
277         BT_DBG("sk %p backlog %d", sk, backlog);
278
279         lock_sock(sk);
280
281         if (sk->sk_state != BT_BOUND) {
282                 err = -EBADFD;
283                 goto done;
284         }
285
286         if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM) {
287                 err = -EINVAL;
288                 goto done;
289         }
290
291         switch (chan->mode) {
292         case L2CAP_MODE_BASIC:
293         case L2CAP_MODE_LE_FLOWCTL:
294                 break;
295         case L2CAP_MODE_EXT_FLOWCTL:
296                 if (!enable_ecred) {
297                         err = -EOPNOTSUPP;
298                         goto done;
299                 }
300                 break;
301         case L2CAP_MODE_ERTM:
302         case L2CAP_MODE_STREAMING:
303                 if (!disable_ertm)
304                         break;
305                 fallthrough;
306         default:
307                 err = -EOPNOTSUPP;
308                 goto done;
309         }
310
311         sk->sk_max_ack_backlog = backlog;
312         sk->sk_ack_backlog = 0;
313
314         /* Listening channels need to use nested locking in order not to
315          * cause lockdep warnings when the created child channels end up
316          * being locked in the same thread as the parent channel.
317          */
318         atomic_set(&chan->nesting, L2CAP_NESTING_PARENT);
319
320         chan->state = BT_LISTEN;
321         sk->sk_state = BT_LISTEN;
322
323 done:
324         release_sock(sk);
325         return err;
326 }
327
328 static int l2cap_sock_accept(struct socket *sock, struct socket *newsock,
329                              int flags, bool kern)
330 {
331         DEFINE_WAIT_FUNC(wait, woken_wake_function);
332         struct sock *sk = sock->sk, *nsk;
333         long timeo;
334         int err = 0;
335
336         lock_sock_nested(sk, L2CAP_NESTING_PARENT);
337
338         timeo = sock_rcvtimeo(sk, flags & O_NONBLOCK);
339
340         BT_DBG("sk %p timeo %ld", sk, timeo);
341
342         /* Wait for an incoming connection. (wake-one). */
343         add_wait_queue_exclusive(sk_sleep(sk), &wait);
344         while (1) {
345                 if (sk->sk_state != BT_LISTEN) {
346                         err = -EBADFD;
347                         break;
348                 }
349
350                 nsk = bt_accept_dequeue(sk, newsock);
351                 if (nsk)
352                         break;
353
354                 if (!timeo) {
355                         err = -EAGAIN;
356                         break;
357                 }
358
359                 if (signal_pending(current)) {
360                         err = sock_intr_errno(timeo);
361                         break;
362                 }
363
364                 release_sock(sk);
365
366                 timeo = wait_woken(&wait, TASK_INTERRUPTIBLE, timeo);
367
368                 lock_sock_nested(sk, L2CAP_NESTING_PARENT);
369         }
370         remove_wait_queue(sk_sleep(sk), &wait);
371
372         if (err)
373                 goto done;
374
375         newsock->state = SS_CONNECTED;
376
377         BT_DBG("new socket %p", nsk);
378
379 done:
380         release_sock(sk);
381         return err;
382 }
383
384 static int l2cap_sock_getname(struct socket *sock, struct sockaddr *addr,
385                               int peer)
386 {
387         struct sockaddr_l2 *la = (struct sockaddr_l2 *) addr;
388         struct sock *sk = sock->sk;
389         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
390
391         BT_DBG("sock %p, sk %p", sock, sk);
392
393         if (peer && sk->sk_state != BT_CONNECTED &&
394             sk->sk_state != BT_CONNECT && sk->sk_state != BT_CONNECT2 &&
395             sk->sk_state != BT_CONFIG)
396                 return -ENOTCONN;
397
398         memset(la, 0, sizeof(struct sockaddr_l2));
399         addr->sa_family = AF_BLUETOOTH;
400
401         la->l2_psm = chan->psm;
402
403         if (peer) {
404                 bacpy(&la->l2_bdaddr, &chan->dst);
405                 la->l2_cid = cpu_to_le16(chan->dcid);
406                 la->l2_bdaddr_type = chan->dst_type;
407         } else {
408                 bacpy(&la->l2_bdaddr, &chan->src);
409                 la->l2_cid = cpu_to_le16(chan->scid);
410                 la->l2_bdaddr_type = chan->src_type;
411         }
412
413         return sizeof(struct sockaddr_l2);
414 }
415
416 static int l2cap_get_mode(struct l2cap_chan *chan)
417 {
418         switch (chan->mode) {
419         case L2CAP_MODE_BASIC:
420                 return BT_MODE_BASIC;
421         case L2CAP_MODE_ERTM:
422                 return BT_MODE_ERTM;
423         case L2CAP_MODE_STREAMING:
424                 return BT_MODE_STREAMING;
425         case L2CAP_MODE_LE_FLOWCTL:
426                 return BT_MODE_LE_FLOWCTL;
427         case L2CAP_MODE_EXT_FLOWCTL:
428                 return BT_MODE_EXT_FLOWCTL;
429         }
430
431         return -EINVAL;
432 }
433
434 static int l2cap_sock_getsockopt_old(struct socket *sock, int optname,
435                                      char __user *optval, int __user *optlen)
436 {
437         struct sock *sk = sock->sk;
438         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
439         struct l2cap_options opts;
440         struct l2cap_conninfo cinfo;
441         int len, err = 0;
442         u32 opt;
443
444         BT_DBG("sk %p", sk);
445
446         if (get_user(len, optlen))
447                 return -EFAULT;
448
449         lock_sock(sk);
450
451         switch (optname) {
452         case L2CAP_OPTIONS:
453                 /* LE sockets should use BT_SNDMTU/BT_RCVMTU, but since
454                  * legacy ATT code depends on getsockopt for
455                  * L2CAP_OPTIONS we need to let this pass.
456                  */
457                 if (bdaddr_type_is_le(chan->src_type) &&
458                     chan->scid != L2CAP_CID_ATT) {
459                         err = -EINVAL;
460                         break;
461                 }
462
463                 /* Only BR/EDR modes are supported here */
464                 switch (chan->mode) {
465                 case L2CAP_MODE_BASIC:
466                 case L2CAP_MODE_ERTM:
467                 case L2CAP_MODE_STREAMING:
468                         break;
469                 default:
470                         err = -EINVAL;
471                         break;
472                 }
473
474                 if (err < 0)
475                         break;
476
477                 memset(&opts, 0, sizeof(opts));
478                 opts.imtu     = chan->imtu;
479                 opts.omtu     = chan->omtu;
480                 opts.flush_to = chan->flush_to;
481                 opts.mode     = chan->mode;
482                 opts.fcs      = chan->fcs;
483                 opts.max_tx   = chan->max_tx;
484                 opts.txwin_size = chan->tx_win;
485
486                 BT_DBG("mode 0x%2.2x", chan->mode);
487
488                 len = min_t(unsigned int, len, sizeof(opts));
489                 if (copy_to_user(optval, (char *) &opts, len))
490                         err = -EFAULT;
491
492                 break;
493
494         case L2CAP_LM:
495                 switch (chan->sec_level) {
496                 case BT_SECURITY_LOW:
497                         opt = L2CAP_LM_AUTH;
498                         break;
499                 case BT_SECURITY_MEDIUM:
500                         opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT;
501                         break;
502                 case BT_SECURITY_HIGH:
503                         opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
504                               L2CAP_LM_SECURE;
505                         break;
506                 case BT_SECURITY_FIPS:
507                         opt = L2CAP_LM_AUTH | L2CAP_LM_ENCRYPT |
508                               L2CAP_LM_SECURE | L2CAP_LM_FIPS;
509                         break;
510                 default:
511                         opt = 0;
512                         break;
513                 }
514
515                 if (test_bit(FLAG_ROLE_SWITCH, &chan->flags))
516                         opt |= L2CAP_LM_MASTER;
517
518                 if (test_bit(FLAG_FORCE_RELIABLE, &chan->flags))
519                         opt |= L2CAP_LM_RELIABLE;
520
521                 if (put_user(opt, (u32 __user *) optval))
522                         err = -EFAULT;
523
524                 break;
525
526         case L2CAP_CONNINFO:
527                 if (sk->sk_state != BT_CONNECTED &&
528                     !(sk->sk_state == BT_CONNECT2 &&
529                       test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags))) {
530                         err = -ENOTCONN;
531                         break;
532                 }
533
534                 memset(&cinfo, 0, sizeof(cinfo));
535                 cinfo.hci_handle = chan->conn->hcon->handle;
536                 memcpy(cinfo.dev_class, chan->conn->hcon->dev_class, 3);
537
538                 len = min_t(unsigned int, len, sizeof(cinfo));
539                 if (copy_to_user(optval, (char *) &cinfo, len))
540                         err = -EFAULT;
541
542                 break;
543
544         default:
545                 err = -ENOPROTOOPT;
546                 break;
547         }
548
549         release_sock(sk);
550         return err;
551 }
552
553 static int l2cap_sock_getsockopt(struct socket *sock, int level, int optname,
554                                  char __user *optval, int __user *optlen)
555 {
556         struct sock *sk = sock->sk;
557         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
558         struct bt_security sec;
559         struct bt_power pwr;
560         u32 phys;
561         int len, mode, err = 0;
562
563         BT_DBG("sk %p", sk);
564
565         if (level == SOL_L2CAP)
566                 return l2cap_sock_getsockopt_old(sock, optname, optval, optlen);
567
568         if (level != SOL_BLUETOOTH)
569                 return -ENOPROTOOPT;
570
571         if (get_user(len, optlen))
572                 return -EFAULT;
573
574         lock_sock(sk);
575
576         switch (optname) {
577         case BT_SECURITY:
578                 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
579                     chan->chan_type != L2CAP_CHAN_FIXED &&
580                     chan->chan_type != L2CAP_CHAN_RAW) {
581                         err = -EINVAL;
582                         break;
583                 }
584
585                 memset(&sec, 0, sizeof(sec));
586                 if (chan->conn) {
587                         sec.level = chan->conn->hcon->sec_level;
588
589                         if (sk->sk_state == BT_CONNECTED)
590                                 sec.key_size = chan->conn->hcon->enc_key_size;
591                 } else {
592                         sec.level = chan->sec_level;
593                 }
594
595                 len = min_t(unsigned int, len, sizeof(sec));
596                 if (copy_to_user(optval, (char *) &sec, len))
597                         err = -EFAULT;
598
599                 break;
600
601         case BT_DEFER_SETUP:
602                 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
603                         err = -EINVAL;
604                         break;
605                 }
606
607                 if (put_user(test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags),
608                              (u32 __user *) optval))
609                         err = -EFAULT;
610
611                 break;
612
613         case BT_FLUSHABLE:
614                 if (put_user(test_bit(FLAG_FLUSHABLE, &chan->flags),
615                              (u32 __user *) optval))
616                         err = -EFAULT;
617
618                 break;
619
620         case BT_POWER:
621                 if (sk->sk_type != SOCK_SEQPACKET && sk->sk_type != SOCK_STREAM
622                     && sk->sk_type != SOCK_RAW) {
623                         err = -EINVAL;
624                         break;
625                 }
626
627                 pwr.force_active = test_bit(FLAG_FORCE_ACTIVE, &chan->flags);
628
629                 len = min_t(unsigned int, len, sizeof(pwr));
630                 if (copy_to_user(optval, (char *) &pwr, len))
631                         err = -EFAULT;
632
633                 break;
634
635         case BT_CHANNEL_POLICY:
636                 if (put_user(chan->chan_policy, (u32 __user *) optval))
637                         err = -EFAULT;
638                 break;
639
640         case BT_SNDMTU:
641                 if (!bdaddr_type_is_le(chan->src_type)) {
642                         err = -EINVAL;
643                         break;
644                 }
645
646                 if (sk->sk_state != BT_CONNECTED) {
647                         err = -ENOTCONN;
648                         break;
649                 }
650
651                 if (put_user(chan->omtu, (u16 __user *) optval))
652                         err = -EFAULT;
653                 break;
654
655         case BT_RCVMTU:
656                 if (!bdaddr_type_is_le(chan->src_type)) {
657                         err = -EINVAL;
658                         break;
659                 }
660
661                 if (put_user(chan->imtu, (u16 __user *) optval))
662                         err = -EFAULT;
663                 break;
664
665         case BT_PHY:
666                 if (sk->sk_state != BT_CONNECTED) {
667                         err = -ENOTCONN;
668                         break;
669                 }
670
671                 phys = hci_conn_get_phy(chan->conn->hcon);
672
673                 if (put_user(phys, (u32 __user *) optval))
674                         err = -EFAULT;
675                 break;
676
677         case BT_MODE:
678                 if (!enable_ecred) {
679                         err = -ENOPROTOOPT;
680                         break;
681                 }
682
683                 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED) {
684                         err = -EINVAL;
685                         break;
686                 }
687
688                 mode = l2cap_get_mode(chan);
689                 if (mode < 0) {
690                         err = mode;
691                         break;
692                 }
693
694                 if (put_user(mode, (u8 __user *) optval))
695                         err = -EFAULT;
696                 break;
697
698         default:
699                 err = -ENOPROTOOPT;
700                 break;
701         }
702
703         release_sock(sk);
704         return err;
705 }
706
707 static bool l2cap_valid_mtu(struct l2cap_chan *chan, u16 mtu)
708 {
709         switch (chan->scid) {
710         case L2CAP_CID_ATT:
711                 if (mtu < L2CAP_LE_MIN_MTU)
712                         return false;
713                 break;
714
715         default:
716                 if (mtu < L2CAP_DEFAULT_MIN_MTU)
717                         return false;
718         }
719
720         return true;
721 }
722
723 static int l2cap_sock_setsockopt_old(struct socket *sock, int optname,
724                                      sockptr_t optval, unsigned int optlen)
725 {
726         struct sock *sk = sock->sk;
727         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
728         struct l2cap_options opts;
729         int len, err = 0;
730         u32 opt;
731
732         BT_DBG("sk %p", sk);
733
734         lock_sock(sk);
735
736         switch (optname) {
737         case L2CAP_OPTIONS:
738                 if (bdaddr_type_is_le(chan->src_type)) {
739                         err = -EINVAL;
740                         break;
741                 }
742
743                 if (sk->sk_state == BT_CONNECTED) {
744                         err = -EINVAL;
745                         break;
746                 }
747
748                 opts.imtu     = chan->imtu;
749                 opts.omtu     = chan->omtu;
750                 opts.flush_to = chan->flush_to;
751                 opts.mode     = chan->mode;
752                 opts.fcs      = chan->fcs;
753                 opts.max_tx   = chan->max_tx;
754                 opts.txwin_size = chan->tx_win;
755
756                 len = min_t(unsigned int, sizeof(opts), optlen);
757                 if (copy_from_sockptr(&opts, optval, len)) {
758                         err = -EFAULT;
759                         break;
760                 }
761
762                 if (opts.txwin_size > L2CAP_DEFAULT_EXT_WINDOW) {
763                         err = -EINVAL;
764                         break;
765                 }
766
767                 if (!l2cap_valid_mtu(chan, opts.imtu)) {
768                         err = -EINVAL;
769                         break;
770                 }
771
772                 /* Only BR/EDR modes are supported here */
773                 switch (opts.mode) {
774                 case L2CAP_MODE_BASIC:
775                         clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
776                         break;
777                 case L2CAP_MODE_ERTM:
778                 case L2CAP_MODE_STREAMING:
779                         if (!disable_ertm)
780                                 break;
781                         fallthrough;
782                 default:
783                         err = -EINVAL;
784                         break;
785                 }
786
787                 if (err < 0)
788                         break;
789
790                 chan->mode = opts.mode;
791
792                 BT_DBG("mode 0x%2.2x", chan->mode);
793
794                 chan->imtu = opts.imtu;
795                 chan->omtu = opts.omtu;
796                 chan->fcs  = opts.fcs;
797                 chan->max_tx = opts.max_tx;
798                 chan->tx_win = opts.txwin_size;
799                 chan->flush_to = opts.flush_to;
800                 break;
801
802         case L2CAP_LM:
803                 if (copy_from_sockptr(&opt, optval, sizeof(u32))) {
804                         err = -EFAULT;
805                         break;
806                 }
807
808                 if (opt & L2CAP_LM_FIPS) {
809                         err = -EINVAL;
810                         break;
811                 }
812
813                 if (opt & L2CAP_LM_AUTH)
814                         chan->sec_level = BT_SECURITY_LOW;
815                 if (opt & L2CAP_LM_ENCRYPT)
816                         chan->sec_level = BT_SECURITY_MEDIUM;
817                 if (opt & L2CAP_LM_SECURE)
818                         chan->sec_level = BT_SECURITY_HIGH;
819
820                 if (opt & L2CAP_LM_MASTER)
821                         set_bit(FLAG_ROLE_SWITCH, &chan->flags);
822                 else
823                         clear_bit(FLAG_ROLE_SWITCH, &chan->flags);
824
825                 if (opt & L2CAP_LM_RELIABLE)
826                         set_bit(FLAG_FORCE_RELIABLE, &chan->flags);
827                 else
828                         clear_bit(FLAG_FORCE_RELIABLE, &chan->flags);
829                 break;
830
831         default:
832                 err = -ENOPROTOOPT;
833                 break;
834         }
835
836         release_sock(sk);
837         return err;
838 }
839
840 static int l2cap_set_mode(struct l2cap_chan *chan, u8 mode)
841 {
842         switch (mode) {
843         case BT_MODE_BASIC:
844                 if (bdaddr_type_is_le(chan->src_type))
845                         return -EINVAL;
846                 mode = L2CAP_MODE_BASIC;
847                 clear_bit(CONF_STATE2_DEVICE, &chan->conf_state);
848                 break;
849         case BT_MODE_ERTM:
850                 if (!disable_ertm || bdaddr_type_is_le(chan->src_type))
851                         return -EINVAL;
852                 mode = L2CAP_MODE_ERTM;
853                 break;
854         case BT_MODE_STREAMING:
855                 if (!disable_ertm || bdaddr_type_is_le(chan->src_type))
856                         return -EINVAL;
857                 mode = L2CAP_MODE_STREAMING;
858                 break;
859         case BT_MODE_LE_FLOWCTL:
860                 if (!bdaddr_type_is_le(chan->src_type))
861                         return -EINVAL;
862                 mode = L2CAP_MODE_LE_FLOWCTL;
863                 break;
864         case BT_MODE_EXT_FLOWCTL:
865                 /* TODO: Add support for ECRED PDUs to BR/EDR */
866                 if (!bdaddr_type_is_le(chan->src_type))
867                         return -EINVAL;
868                 mode = L2CAP_MODE_EXT_FLOWCTL;
869                 break;
870         default:
871                 return -EINVAL;
872         }
873
874         chan->mode = mode;
875
876         return 0;
877 }
878
879 static int l2cap_sock_setsockopt(struct socket *sock, int level, int optname,
880                                  sockptr_t optval, unsigned int optlen)
881 {
882         struct sock *sk = sock->sk;
883         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
884         struct bt_security sec;
885         struct bt_power pwr;
886         struct l2cap_conn *conn;
887         int len, err = 0;
888         u32 opt;
889         u16 mtu;
890         u8 mode;
891
892         BT_DBG("sk %p", sk);
893
894         if (level == SOL_L2CAP)
895                 return l2cap_sock_setsockopt_old(sock, optname, optval, optlen);
896
897         if (level != SOL_BLUETOOTH)
898                 return -ENOPROTOOPT;
899
900         lock_sock(sk);
901
902         switch (optname) {
903         case BT_SECURITY:
904                 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
905                     chan->chan_type != L2CAP_CHAN_FIXED &&
906                     chan->chan_type != L2CAP_CHAN_RAW) {
907                         err = -EINVAL;
908                         break;
909                 }
910
911                 sec.level = BT_SECURITY_LOW;
912
913                 len = min_t(unsigned int, sizeof(sec), optlen);
914                 if (copy_from_sockptr(&sec, optval, len)) {
915                         err = -EFAULT;
916                         break;
917                 }
918
919                 if (sec.level < BT_SECURITY_LOW ||
920                     sec.level > BT_SECURITY_FIPS) {
921                         err = -EINVAL;
922                         break;
923                 }
924
925                 chan->sec_level = sec.level;
926
927                 if (!chan->conn)
928                         break;
929
930                 conn = chan->conn;
931
932                 /* change security for LE channels */
933                 if (chan->scid == L2CAP_CID_ATT) {
934                         if (smp_conn_security(conn->hcon, sec.level)) {
935                                 err = -EINVAL;
936                                 break;
937                         }
938
939                         set_bit(FLAG_PENDING_SECURITY, &chan->flags);
940                         sk->sk_state = BT_CONFIG;
941                         chan->state = BT_CONFIG;
942
943                 /* or for ACL link */
944                 } else if ((sk->sk_state == BT_CONNECT2 &&
945                             test_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags)) ||
946                            sk->sk_state == BT_CONNECTED) {
947                         if (!l2cap_chan_check_security(chan, true))
948                                 set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
949                         else
950                                 sk->sk_state_change(sk);
951                 } else {
952                         err = -EINVAL;
953                 }
954                 break;
955
956         case BT_DEFER_SETUP:
957                 if (sk->sk_state != BT_BOUND && sk->sk_state != BT_LISTEN) {
958                         err = -EINVAL;
959                         break;
960                 }
961
962                 if (copy_from_sockptr(&opt, optval, sizeof(u32))) {
963                         err = -EFAULT;
964                         break;
965                 }
966
967                 if (opt) {
968                         set_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
969                         set_bit(FLAG_DEFER_SETUP, &chan->flags);
970                 } else {
971                         clear_bit(BT_SK_DEFER_SETUP, &bt_sk(sk)->flags);
972                         clear_bit(FLAG_DEFER_SETUP, &chan->flags);
973                 }
974                 break;
975
976         case BT_FLUSHABLE:
977                 if (copy_from_sockptr(&opt, optval, sizeof(u32))) {
978                         err = -EFAULT;
979                         break;
980                 }
981
982                 if (opt > BT_FLUSHABLE_ON) {
983                         err = -EINVAL;
984                         break;
985                 }
986
987                 if (opt == BT_FLUSHABLE_OFF) {
988                         conn = chan->conn;
989                         /* proceed further only when we have l2cap_conn and
990                            No Flush support in the LM */
991                         if (!conn || !lmp_no_flush_capable(conn->hcon->hdev)) {
992                                 err = -EINVAL;
993                                 break;
994                         }
995                 }
996
997                 if (opt)
998                         set_bit(FLAG_FLUSHABLE, &chan->flags);
999                 else
1000                         clear_bit(FLAG_FLUSHABLE, &chan->flags);
1001                 break;
1002
1003         case BT_POWER:
1004                 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED &&
1005                     chan->chan_type != L2CAP_CHAN_RAW) {
1006                         err = -EINVAL;
1007                         break;
1008                 }
1009
1010                 pwr.force_active = BT_POWER_FORCE_ACTIVE_ON;
1011
1012                 len = min_t(unsigned int, sizeof(pwr), optlen);
1013                 if (copy_from_sockptr(&pwr, optval, len)) {
1014                         err = -EFAULT;
1015                         break;
1016                 }
1017
1018                 if (pwr.force_active)
1019                         set_bit(FLAG_FORCE_ACTIVE, &chan->flags);
1020                 else
1021                         clear_bit(FLAG_FORCE_ACTIVE, &chan->flags);
1022                 break;
1023
1024         case BT_CHANNEL_POLICY:
1025                 if (copy_from_sockptr(&opt, optval, sizeof(u32))) {
1026                         err = -EFAULT;
1027                         break;
1028                 }
1029
1030                 if (opt > BT_CHANNEL_POLICY_AMP_PREFERRED) {
1031                         err = -EINVAL;
1032                         break;
1033                 }
1034
1035                 if (chan->mode != L2CAP_MODE_ERTM &&
1036                     chan->mode != L2CAP_MODE_STREAMING) {
1037                         err = -EOPNOTSUPP;
1038                         break;
1039                 }
1040
1041                 chan->chan_policy = (u8) opt;
1042
1043                 if (sk->sk_state == BT_CONNECTED &&
1044                     chan->move_role == L2CAP_MOVE_ROLE_NONE)
1045                         l2cap_move_start(chan);
1046
1047                 break;
1048
1049         case BT_SNDMTU:
1050                 if (!bdaddr_type_is_le(chan->src_type)) {
1051                         err = -EINVAL;
1052                         break;
1053                 }
1054
1055                 /* Setting is not supported as it's the remote side that
1056                  * decides this.
1057                  */
1058                 err = -EPERM;
1059                 break;
1060
1061         case BT_RCVMTU:
1062                 if (!bdaddr_type_is_le(chan->src_type)) {
1063                         err = -EINVAL;
1064                         break;
1065                 }
1066
1067                 if (chan->mode == L2CAP_MODE_LE_FLOWCTL &&
1068                     sk->sk_state == BT_CONNECTED) {
1069                         err = -EISCONN;
1070                         break;
1071                 }
1072
1073                 if (copy_from_sockptr(&mtu, optval, sizeof(u16))) {
1074                         err = -EFAULT;
1075                         break;
1076                 }
1077
1078                 if (chan->mode == L2CAP_MODE_EXT_FLOWCTL &&
1079                     sk->sk_state == BT_CONNECTED)
1080                         err = l2cap_chan_reconfigure(chan, mtu);
1081                 else
1082                         chan->imtu = mtu;
1083
1084                 break;
1085
1086         case BT_MODE:
1087                 if (!enable_ecred) {
1088                         err = -ENOPROTOOPT;
1089                         break;
1090                 }
1091
1092                 BT_DBG("sk->sk_state %u", sk->sk_state);
1093
1094                 if (sk->sk_state != BT_BOUND) {
1095                         err = -EINVAL;
1096                         break;
1097                 }
1098
1099                 if (chan->chan_type != L2CAP_CHAN_CONN_ORIENTED) {
1100                         err = -EINVAL;
1101                         break;
1102                 }
1103
1104                 if (copy_from_sockptr(&mode, optval, sizeof(u8))) {
1105                         err = -EFAULT;
1106                         break;
1107                 }
1108
1109                 BT_DBG("mode %u", mode);
1110
1111                 err = l2cap_set_mode(chan, mode);
1112                 if (err)
1113                         break;
1114
1115                 BT_DBG("mode 0x%2.2x", chan->mode);
1116
1117                 break;
1118
1119         default:
1120                 err = -ENOPROTOOPT;
1121                 break;
1122         }
1123
1124         release_sock(sk);
1125         return err;
1126 }
1127
1128 static int l2cap_sock_sendmsg(struct socket *sock, struct msghdr *msg,
1129                               size_t len)
1130 {
1131         struct sock *sk = sock->sk;
1132         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
1133         int err;
1134
1135         BT_DBG("sock %p, sk %p", sock, sk);
1136
1137         err = sock_error(sk);
1138         if (err)
1139                 return err;
1140
1141         if (msg->msg_flags & MSG_OOB)
1142                 return -EOPNOTSUPP;
1143
1144         if (sk->sk_state != BT_CONNECTED)
1145                 return -ENOTCONN;
1146
1147         lock_sock(sk);
1148         err = bt_sock_wait_ready(sk, msg->msg_flags);
1149         release_sock(sk);
1150         if (err)
1151                 return err;
1152
1153         l2cap_chan_lock(chan);
1154         err = l2cap_chan_send(chan, msg, len);
1155         l2cap_chan_unlock(chan);
1156
1157         return err;
1158 }
1159
1160 static int l2cap_sock_recvmsg(struct socket *sock, struct msghdr *msg,
1161                               size_t len, int flags)
1162 {
1163         struct sock *sk = sock->sk;
1164         struct l2cap_pinfo *pi = l2cap_pi(sk);
1165         int err;
1166
1167         lock_sock(sk);
1168
1169         if (sk->sk_state == BT_CONNECT2 && test_bit(BT_SK_DEFER_SETUP,
1170                                                     &bt_sk(sk)->flags)) {
1171                 if (pi->chan->mode == L2CAP_MODE_EXT_FLOWCTL) {
1172                         sk->sk_state = BT_CONNECTED;
1173                         pi->chan->state = BT_CONNECTED;
1174                         __l2cap_ecred_conn_rsp_defer(pi->chan);
1175                 } else if (bdaddr_type_is_le(pi->chan->src_type)) {
1176                         sk->sk_state = BT_CONNECTED;
1177                         pi->chan->state = BT_CONNECTED;
1178                         __l2cap_le_connect_rsp_defer(pi->chan);
1179                 } else {
1180                         sk->sk_state = BT_CONFIG;
1181                         pi->chan->state = BT_CONFIG;
1182                         __l2cap_connect_rsp_defer(pi->chan);
1183                 }
1184
1185                 err = 0;
1186                 goto done;
1187         }
1188
1189         release_sock(sk);
1190
1191         if (sock->type == SOCK_STREAM)
1192                 err = bt_sock_stream_recvmsg(sock, msg, len, flags);
1193         else
1194                 err = bt_sock_recvmsg(sock, msg, len, flags);
1195
1196         if (pi->chan->mode != L2CAP_MODE_ERTM)
1197                 return err;
1198
1199         /* Attempt to put pending rx data in the socket buffer */
1200
1201         lock_sock(sk);
1202
1203         if (!test_bit(CONN_LOCAL_BUSY, &pi->chan->conn_state))
1204                 goto done;
1205
1206         if (pi->rx_busy_skb) {
1207                 if (!__sock_queue_rcv_skb(sk, pi->rx_busy_skb))
1208                         pi->rx_busy_skb = NULL;
1209                 else
1210                         goto done;
1211         }
1212
1213         /* Restore data flow when half of the receive buffer is
1214          * available.  This avoids resending large numbers of
1215          * frames.
1216          */
1217         if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf >> 1)
1218                 l2cap_chan_busy(pi->chan, 0);
1219
1220 done:
1221         release_sock(sk);
1222         return err;
1223 }
1224
1225 /* Kill socket (only if zapped and orphan)
1226  * Must be called on unlocked socket, with l2cap channel lock.
1227  */
1228 static void l2cap_sock_kill(struct sock *sk)
1229 {
1230         if (!sock_flag(sk, SOCK_ZAPPED) || sk->sk_socket)
1231                 return;
1232
1233         BT_DBG("sk %p state %s", sk, state_to_string(sk->sk_state));
1234
1235         /* Kill poor orphan */
1236
1237         l2cap_chan_put(l2cap_pi(sk)->chan);
1238         sock_set_flag(sk, SOCK_DEAD);
1239         sock_put(sk);
1240 }
1241
1242 static int __l2cap_wait_ack(struct sock *sk, struct l2cap_chan *chan)
1243 {
1244         DECLARE_WAITQUEUE(wait, current);
1245         int err = 0;
1246         int timeo = L2CAP_WAIT_ACK_POLL_PERIOD;
1247         /* Timeout to prevent infinite loop */
1248         unsigned long timeout = jiffies + L2CAP_WAIT_ACK_TIMEOUT;
1249
1250         add_wait_queue(sk_sleep(sk), &wait);
1251         set_current_state(TASK_INTERRUPTIBLE);
1252         do {
1253                 BT_DBG("Waiting for %d ACKs, timeout %04d ms",
1254                        chan->unacked_frames, time_after(jiffies, timeout) ? 0 :
1255                        jiffies_to_msecs(timeout - jiffies));
1256
1257                 if (!timeo)
1258                         timeo = L2CAP_WAIT_ACK_POLL_PERIOD;
1259
1260                 if (signal_pending(current)) {
1261                         err = sock_intr_errno(timeo);
1262                         break;
1263                 }
1264
1265                 release_sock(sk);
1266                 timeo = schedule_timeout(timeo);
1267                 lock_sock(sk);
1268                 set_current_state(TASK_INTERRUPTIBLE);
1269
1270                 err = sock_error(sk);
1271                 if (err)
1272                         break;
1273
1274                 if (time_after(jiffies, timeout)) {
1275                         err = -ENOLINK;
1276                         break;
1277                 }
1278
1279         } while (chan->unacked_frames > 0 &&
1280                  chan->state == BT_CONNECTED);
1281
1282         set_current_state(TASK_RUNNING);
1283         remove_wait_queue(sk_sleep(sk), &wait);
1284         return err;
1285 }
1286
1287 static int l2cap_sock_shutdown(struct socket *sock, int how)
1288 {
1289         struct sock *sk = sock->sk;
1290         struct l2cap_chan *chan;
1291         struct l2cap_conn *conn;
1292         int err = 0;
1293
1294         BT_DBG("sock %p, sk %p, how %d", sock, sk, how);
1295
1296         /* 'how' parameter is mapped to sk_shutdown as follows:
1297          * SHUT_RD   (0) --> RCV_SHUTDOWN  (1)
1298          * SHUT_WR   (1) --> SEND_SHUTDOWN (2)
1299          * SHUT_RDWR (2) --> SHUTDOWN_MASK (3)
1300          */
1301         how++;
1302
1303         if (!sk)
1304                 return 0;
1305
1306         lock_sock(sk);
1307
1308         if ((sk->sk_shutdown & how) == how)
1309                 goto shutdown_already;
1310
1311         BT_DBG("Handling sock shutdown");
1312
1313         /* prevent sk structure from being freed whilst unlocked */
1314         sock_hold(sk);
1315
1316         chan = l2cap_pi(sk)->chan;
1317         /* prevent chan structure from being freed whilst unlocked */
1318         l2cap_chan_hold(chan);
1319
1320         BT_DBG("chan %p state %s", chan, state_to_string(chan->state));
1321
1322         if (chan->mode == L2CAP_MODE_ERTM &&
1323             chan->unacked_frames > 0 &&
1324             chan->state == BT_CONNECTED) {
1325                 err = __l2cap_wait_ack(sk, chan);
1326
1327                 /* After waiting for ACKs, check whether shutdown
1328                  * has already been actioned to close the L2CAP
1329                  * link such as by l2cap_disconnection_req().
1330                  */
1331                 if ((sk->sk_shutdown & how) == how)
1332                         goto shutdown_matched;
1333         }
1334
1335         /* Try setting the RCV_SHUTDOWN bit, return early if SEND_SHUTDOWN
1336          * is already set
1337          */
1338         if ((how & RCV_SHUTDOWN) && !(sk->sk_shutdown & RCV_SHUTDOWN)) {
1339                 sk->sk_shutdown |= RCV_SHUTDOWN;
1340                 if ((sk->sk_shutdown & how) == how)
1341                         goto shutdown_matched;
1342         }
1343
1344         sk->sk_shutdown |= SEND_SHUTDOWN;
1345         release_sock(sk);
1346
1347         l2cap_chan_lock(chan);
1348         conn = chan->conn;
1349         if (conn)
1350                 /* prevent conn structure from being freed */
1351                 l2cap_conn_get(conn);
1352         l2cap_chan_unlock(chan);
1353
1354         if (conn)
1355                 /* mutex lock must be taken before l2cap_chan_lock() */
1356                 mutex_lock(&conn->chan_lock);
1357
1358         l2cap_chan_lock(chan);
1359         l2cap_chan_close(chan, 0);
1360         l2cap_chan_unlock(chan);
1361
1362         if (conn) {
1363                 mutex_unlock(&conn->chan_lock);
1364                 l2cap_conn_put(conn);
1365         }
1366
1367         lock_sock(sk);
1368
1369         if (sock_flag(sk, SOCK_LINGER) && sk->sk_lingertime &&
1370             !(current->flags & PF_EXITING))
1371                 err = bt_sock_wait_state(sk, BT_CLOSED,
1372                                          sk->sk_lingertime);
1373
1374 shutdown_matched:
1375         l2cap_chan_put(chan);
1376         sock_put(sk);
1377
1378 shutdown_already:
1379         if (!err && sk->sk_err)
1380                 err = -sk->sk_err;
1381
1382         release_sock(sk);
1383
1384         BT_DBG("Sock shutdown complete err: %d", err);
1385
1386         return err;
1387 }
1388
1389 static int l2cap_sock_release(struct socket *sock)
1390 {
1391         struct sock *sk = sock->sk;
1392         int err;
1393         struct l2cap_chan *chan;
1394
1395         BT_DBG("sock %p, sk %p", sock, sk);
1396
1397         if (!sk)
1398                 return 0;
1399
1400         l2cap_sock_cleanup_listen(sk);
1401         bt_sock_unlink(&l2cap_sk_list, sk);
1402
1403         err = l2cap_sock_shutdown(sock, SHUT_RDWR);
1404         chan = l2cap_pi(sk)->chan;
1405
1406         l2cap_chan_hold(chan);
1407         l2cap_chan_lock(chan);
1408
1409         sock_orphan(sk);
1410         l2cap_sock_kill(sk);
1411
1412         l2cap_chan_unlock(chan);
1413         l2cap_chan_put(chan);
1414
1415         return err;
1416 }
1417
1418 static void l2cap_sock_cleanup_listen(struct sock *parent)
1419 {
1420         struct sock *sk;
1421
1422         BT_DBG("parent %p state %s", parent,
1423                state_to_string(parent->sk_state));
1424
1425         /* Close not yet accepted channels */
1426         while ((sk = bt_accept_dequeue(parent, NULL))) {
1427                 struct l2cap_chan *chan = l2cap_pi(sk)->chan;
1428
1429                 BT_DBG("child chan %p state %s", chan,
1430                        state_to_string(chan->state));
1431
1432                 l2cap_chan_hold(chan);
1433                 l2cap_chan_lock(chan);
1434
1435                 __clear_chan_timer(chan);
1436                 l2cap_chan_close(chan, ECONNRESET);
1437                 l2cap_sock_kill(sk);
1438
1439                 l2cap_chan_unlock(chan);
1440                 l2cap_chan_put(chan);
1441         }
1442 }
1443
1444 static struct l2cap_chan *l2cap_sock_new_connection_cb(struct l2cap_chan *chan)
1445 {
1446         struct sock *sk, *parent = chan->data;
1447
1448         lock_sock(parent);
1449
1450         /* Check for backlog size */
1451         if (sk_acceptq_is_full(parent)) {
1452                 BT_DBG("backlog full %d", parent->sk_ack_backlog);
1453                 release_sock(parent);
1454                 return NULL;
1455         }
1456
1457         sk = l2cap_sock_alloc(sock_net(parent), NULL, BTPROTO_L2CAP,
1458                               GFP_ATOMIC, 0);
1459         if (!sk) {
1460                 release_sock(parent);
1461                 return NULL;
1462         }
1463
1464         bt_sock_reclassify_lock(sk, BTPROTO_L2CAP);
1465
1466         l2cap_sock_init(sk, parent);
1467
1468         bt_accept_enqueue(parent, sk, false);
1469
1470         release_sock(parent);
1471
1472         return l2cap_pi(sk)->chan;
1473 }
1474
1475 static int l2cap_sock_recv_cb(struct l2cap_chan *chan, struct sk_buff *skb)
1476 {
1477         struct sock *sk = chan->data;
1478         int err;
1479
1480         lock_sock(sk);
1481
1482         if (l2cap_pi(sk)->rx_busy_skb) {
1483                 err = -ENOMEM;
1484                 goto done;
1485         }
1486
1487         if (chan->mode != L2CAP_MODE_ERTM &&
1488             chan->mode != L2CAP_MODE_STREAMING) {
1489                 /* Even if no filter is attached, we could potentially
1490                  * get errors from security modules, etc.
1491                  */
1492                 err = sk_filter(sk, skb);
1493                 if (err)
1494                         goto done;
1495         }
1496
1497         err = __sock_queue_rcv_skb(sk, skb);
1498
1499         /* For ERTM, handle one skb that doesn't fit into the recv
1500          * buffer.  This is important to do because the data frames
1501          * have already been acked, so the skb cannot be discarded.
1502          *
1503          * Notify the l2cap core that the buffer is full, so the
1504          * LOCAL_BUSY state is entered and no more frames are
1505          * acked and reassembled until there is buffer space
1506          * available.
1507          */
1508         if (err < 0 && chan->mode == L2CAP_MODE_ERTM) {
1509                 l2cap_pi(sk)->rx_busy_skb = skb;
1510                 l2cap_chan_busy(chan, 1);
1511                 err = 0;
1512         }
1513
1514 done:
1515         release_sock(sk);
1516
1517         return err;
1518 }
1519
1520 static void l2cap_sock_close_cb(struct l2cap_chan *chan)
1521 {
1522         struct sock *sk = chan->data;
1523
1524         if (!sk)
1525                 return;
1526
1527         l2cap_sock_kill(sk);
1528 }
1529
1530 static void l2cap_sock_teardown_cb(struct l2cap_chan *chan, int err)
1531 {
1532         struct sock *sk = chan->data;
1533         struct sock *parent;
1534
1535         if (!sk)
1536                 return;
1537
1538         BT_DBG("chan %p state %s", chan, state_to_string(chan->state));
1539
1540         /* This callback can be called both for server (BT_LISTEN)
1541          * sockets as well as "normal" ones. To avoid lockdep warnings
1542          * with child socket locking (through l2cap_sock_cleanup_listen)
1543          * we need separation into separate nesting levels. The simplest
1544          * way to accomplish this is to inherit the nesting level used
1545          * for the channel.
1546          */
1547         lock_sock_nested(sk, atomic_read(&chan->nesting));
1548
1549         parent = bt_sk(sk)->parent;
1550
1551         switch (chan->state) {
1552         case BT_OPEN:
1553         case BT_BOUND:
1554         case BT_CLOSED:
1555                 break;
1556         case BT_LISTEN:
1557                 l2cap_sock_cleanup_listen(sk);
1558                 sk->sk_state = BT_CLOSED;
1559                 chan->state = BT_CLOSED;
1560
1561                 break;
1562         default:
1563                 sk->sk_state = BT_CLOSED;
1564                 chan->state = BT_CLOSED;
1565
1566                 sk->sk_err = err;
1567
1568                 if (parent) {
1569                         bt_accept_unlink(sk);
1570                         parent->sk_data_ready(parent);
1571                 } else {
1572                         sk->sk_state_change(sk);
1573                 }
1574
1575                 break;
1576         }
1577         release_sock(sk);
1578
1579         /* Only zap after cleanup to avoid use after free race */
1580         sock_set_flag(sk, SOCK_ZAPPED);
1581
1582 }
1583
1584 static void l2cap_sock_state_change_cb(struct l2cap_chan *chan, int state,
1585                                        int err)
1586 {
1587         struct sock *sk = chan->data;
1588
1589         sk->sk_state = state;
1590
1591         if (err)
1592                 sk->sk_err = err;
1593 }
1594
1595 static struct sk_buff *l2cap_sock_alloc_skb_cb(struct l2cap_chan *chan,
1596                                                unsigned long hdr_len,
1597                                                unsigned long len, int nb)
1598 {
1599         struct sock *sk = chan->data;
1600         struct sk_buff *skb;
1601         int err;
1602
1603         l2cap_chan_unlock(chan);
1604         skb = bt_skb_send_alloc(sk, hdr_len + len, nb, &err);
1605         l2cap_chan_lock(chan);
1606
1607         if (!skb)
1608                 return ERR_PTR(err);
1609
1610         /* Channel lock is released before requesting new skb and then
1611          * reacquired thus we need to recheck channel state.
1612          */
1613         if (chan->state != BT_CONNECTED) {
1614                 kfree_skb(skb);
1615                 return ERR_PTR(-ENOTCONN);
1616         }
1617
1618         skb->priority = sk->sk_priority;
1619
1620         bt_cb(skb)->l2cap.chan = chan;
1621
1622         return skb;
1623 }
1624
1625 static void l2cap_sock_ready_cb(struct l2cap_chan *chan)
1626 {
1627         struct sock *sk = chan->data;
1628         struct sock *parent;
1629
1630         lock_sock(sk);
1631
1632         parent = bt_sk(sk)->parent;
1633
1634         BT_DBG("sk %p, parent %p", sk, parent);
1635
1636         sk->sk_state = BT_CONNECTED;
1637         sk->sk_state_change(sk);
1638
1639         if (parent)
1640                 parent->sk_data_ready(parent);
1641
1642         release_sock(sk);
1643 }
1644
1645 static void l2cap_sock_defer_cb(struct l2cap_chan *chan)
1646 {
1647         struct sock *parent, *sk = chan->data;
1648
1649         lock_sock(sk);
1650
1651         parent = bt_sk(sk)->parent;
1652         if (parent)
1653                 parent->sk_data_ready(parent);
1654
1655         release_sock(sk);
1656 }
1657
1658 static void l2cap_sock_resume_cb(struct l2cap_chan *chan)
1659 {
1660         struct sock *sk = chan->data;
1661
1662         if (test_and_clear_bit(FLAG_PENDING_SECURITY, &chan->flags)) {
1663                 sk->sk_state = BT_CONNECTED;
1664                 chan->state = BT_CONNECTED;
1665         }
1666
1667         clear_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
1668         sk->sk_state_change(sk);
1669 }
1670
1671 static void l2cap_sock_set_shutdown_cb(struct l2cap_chan *chan)
1672 {
1673         struct sock *sk = chan->data;
1674
1675         lock_sock(sk);
1676         sk->sk_shutdown = SHUTDOWN_MASK;
1677         release_sock(sk);
1678 }
1679
1680 static long l2cap_sock_get_sndtimeo_cb(struct l2cap_chan *chan)
1681 {
1682         struct sock *sk = chan->data;
1683
1684         return sk->sk_sndtimeo;
1685 }
1686
1687 static struct pid *l2cap_sock_get_peer_pid_cb(struct l2cap_chan *chan)
1688 {
1689         struct sock *sk = chan->data;
1690
1691         return sk->sk_peer_pid;
1692 }
1693
1694 static void l2cap_sock_suspend_cb(struct l2cap_chan *chan)
1695 {
1696         struct sock *sk = chan->data;
1697
1698         set_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags);
1699         sk->sk_state_change(sk);
1700 }
1701
1702 static int l2cap_sock_filter(struct l2cap_chan *chan, struct sk_buff *skb)
1703 {
1704         struct sock *sk = chan->data;
1705
1706         switch (chan->mode) {
1707         case L2CAP_MODE_ERTM:
1708         case L2CAP_MODE_STREAMING:
1709                 return sk_filter(sk, skb);
1710         }
1711
1712         return 0;
1713 }
1714
1715 static const struct l2cap_ops l2cap_chan_ops = {
1716         .name                   = "L2CAP Socket Interface",
1717         .new_connection         = l2cap_sock_new_connection_cb,
1718         .recv                   = l2cap_sock_recv_cb,
1719         .close                  = l2cap_sock_close_cb,
1720         .teardown               = l2cap_sock_teardown_cb,
1721         .state_change           = l2cap_sock_state_change_cb,
1722         .ready                  = l2cap_sock_ready_cb,
1723         .defer                  = l2cap_sock_defer_cb,
1724         .resume                 = l2cap_sock_resume_cb,
1725         .suspend                = l2cap_sock_suspend_cb,
1726         .set_shutdown           = l2cap_sock_set_shutdown_cb,
1727         .get_sndtimeo           = l2cap_sock_get_sndtimeo_cb,
1728         .get_peer_pid           = l2cap_sock_get_peer_pid_cb,
1729         .alloc_skb              = l2cap_sock_alloc_skb_cb,
1730         .filter                 = l2cap_sock_filter,
1731 };
1732
1733 static void l2cap_sock_destruct(struct sock *sk)
1734 {
1735         BT_DBG("sk %p", sk);
1736
1737         if (l2cap_pi(sk)->chan) {
1738                 l2cap_pi(sk)->chan->data = NULL;
1739                 l2cap_chan_put(l2cap_pi(sk)->chan);
1740         }
1741
1742         if (l2cap_pi(sk)->rx_busy_skb) {
1743                 kfree_skb(l2cap_pi(sk)->rx_busy_skb);
1744                 l2cap_pi(sk)->rx_busy_skb = NULL;
1745         }
1746
1747         skb_queue_purge(&sk->sk_receive_queue);
1748         skb_queue_purge(&sk->sk_write_queue);
1749 }
1750
1751 static void l2cap_skb_msg_name(struct sk_buff *skb, void *msg_name,
1752                                int *msg_namelen)
1753 {
1754         DECLARE_SOCKADDR(struct sockaddr_l2 *, la, msg_name);
1755
1756         memset(la, 0, sizeof(struct sockaddr_l2));
1757         la->l2_family = AF_BLUETOOTH;
1758         la->l2_psm = bt_cb(skb)->l2cap.psm;
1759         bacpy(&la->l2_bdaddr, &bt_cb(skb)->l2cap.bdaddr);
1760
1761         *msg_namelen = sizeof(struct sockaddr_l2);
1762 }
1763
1764 static void l2cap_sock_init(struct sock *sk, struct sock *parent)
1765 {
1766         struct l2cap_chan *chan = l2cap_pi(sk)->chan;
1767
1768         BT_DBG("sk %p", sk);
1769
1770         if (parent) {
1771                 struct l2cap_chan *pchan = l2cap_pi(parent)->chan;
1772
1773                 sk->sk_type = parent->sk_type;
1774                 bt_sk(sk)->flags = bt_sk(parent)->flags;
1775
1776                 chan->chan_type = pchan->chan_type;
1777                 chan->imtu = pchan->imtu;
1778                 chan->omtu = pchan->omtu;
1779                 chan->conf_state = pchan->conf_state;
1780                 chan->mode = pchan->mode;
1781                 chan->fcs  = pchan->fcs;
1782                 chan->max_tx = pchan->max_tx;
1783                 chan->tx_win = pchan->tx_win;
1784                 chan->tx_win_max = pchan->tx_win_max;
1785                 chan->sec_level = pchan->sec_level;
1786                 chan->flags = pchan->flags;
1787                 chan->tx_credits = pchan->tx_credits;
1788                 chan->rx_credits = pchan->rx_credits;
1789
1790                 if (chan->chan_type == L2CAP_CHAN_FIXED) {
1791                         chan->scid = pchan->scid;
1792                         chan->dcid = pchan->scid;
1793                 }
1794
1795                 security_sk_clone(parent, sk);
1796         } else {
1797                 switch (sk->sk_type) {
1798                 case SOCK_RAW:
1799                         chan->chan_type = L2CAP_CHAN_RAW;
1800                         break;
1801                 case SOCK_DGRAM:
1802                         chan->chan_type = L2CAP_CHAN_CONN_LESS;
1803                         bt_sk(sk)->skb_msg_name = l2cap_skb_msg_name;
1804                         break;
1805                 case SOCK_SEQPACKET:
1806                 case SOCK_STREAM:
1807                         chan->chan_type = L2CAP_CHAN_CONN_ORIENTED;
1808                         break;
1809                 }
1810
1811                 chan->imtu = L2CAP_DEFAULT_MTU;
1812                 chan->omtu = 0;
1813                 if (!disable_ertm && sk->sk_type == SOCK_STREAM) {
1814                         chan->mode = L2CAP_MODE_ERTM;
1815                         set_bit(CONF_STATE2_DEVICE, &chan->conf_state);
1816                 } else {
1817                         chan->mode = L2CAP_MODE_BASIC;
1818                 }
1819
1820                 l2cap_chan_set_defaults(chan);
1821         }
1822
1823         /* Default config options */
1824         chan->flush_to = L2CAP_DEFAULT_FLUSH_TO;
1825
1826         chan->data = sk;
1827         chan->ops = &l2cap_chan_ops;
1828 }
1829
1830 static struct proto l2cap_proto = {
1831         .name           = "L2CAP",
1832         .owner          = THIS_MODULE,
1833         .obj_size       = sizeof(struct l2cap_pinfo)
1834 };
1835
1836 static struct sock *l2cap_sock_alloc(struct net *net, struct socket *sock,
1837                                      int proto, gfp_t prio, int kern)
1838 {
1839         struct sock *sk;
1840         struct l2cap_chan *chan;
1841
1842         sk = bt_sock_alloc(net, sock, &l2cap_proto, proto, prio, kern);
1843         if (!sk)
1844                 return NULL;
1845
1846         sk->sk_destruct = l2cap_sock_destruct;
1847         sk->sk_sndtimeo = L2CAP_CONN_TIMEOUT;
1848
1849         chan = l2cap_chan_create();
1850         if (!chan) {
1851                 sk_free(sk);
1852                 return NULL;
1853         }
1854
1855         l2cap_chan_hold(chan);
1856
1857         l2cap_pi(sk)->chan = chan;
1858
1859         return sk;
1860 }
1861
1862 static int l2cap_sock_create(struct net *net, struct socket *sock, int protocol,
1863                              int kern)
1864 {
1865         struct sock *sk;
1866
1867         BT_DBG("sock %p", sock);
1868
1869         sock->state = SS_UNCONNECTED;
1870
1871         if (sock->type != SOCK_SEQPACKET && sock->type != SOCK_STREAM &&
1872             sock->type != SOCK_DGRAM && sock->type != SOCK_RAW)
1873                 return -ESOCKTNOSUPPORT;
1874
1875         if (sock->type == SOCK_RAW && !kern && !capable(CAP_NET_RAW))
1876                 return -EPERM;
1877
1878         sock->ops = &l2cap_sock_ops;
1879
1880         sk = l2cap_sock_alloc(net, sock, protocol, GFP_ATOMIC, kern);
1881         if (!sk)
1882                 return -ENOMEM;
1883
1884         l2cap_sock_init(sk, NULL);
1885         bt_sock_link(&l2cap_sk_list, sk);
1886         return 0;
1887 }
1888
1889 static const struct proto_ops l2cap_sock_ops = {
1890         .family         = PF_BLUETOOTH,
1891         .owner          = THIS_MODULE,
1892         .release        = l2cap_sock_release,
1893         .bind           = l2cap_sock_bind,
1894         .connect        = l2cap_sock_connect,
1895         .listen         = l2cap_sock_listen,
1896         .accept         = l2cap_sock_accept,
1897         .getname        = l2cap_sock_getname,
1898         .sendmsg        = l2cap_sock_sendmsg,
1899         .recvmsg        = l2cap_sock_recvmsg,
1900         .poll           = bt_sock_poll,
1901         .ioctl          = bt_sock_ioctl,
1902         .gettstamp      = sock_gettstamp,
1903         .mmap           = sock_no_mmap,
1904         .socketpair     = sock_no_socketpair,
1905         .shutdown       = l2cap_sock_shutdown,
1906         .setsockopt     = l2cap_sock_setsockopt,
1907         .getsockopt     = l2cap_sock_getsockopt
1908 };
1909
1910 static const struct net_proto_family l2cap_sock_family_ops = {
1911         .family = PF_BLUETOOTH,
1912         .owner  = THIS_MODULE,
1913         .create = l2cap_sock_create,
1914 };
1915
1916 int __init l2cap_init_sockets(void)
1917 {
1918         int err;
1919
1920         BUILD_BUG_ON(sizeof(struct sockaddr_l2) > sizeof(struct sockaddr));
1921
1922         err = proto_register(&l2cap_proto, 0);
1923         if (err < 0)
1924                 return err;
1925
1926         err = bt_sock_register(BTPROTO_L2CAP, &l2cap_sock_family_ops);
1927         if (err < 0) {
1928                 BT_ERR("L2CAP socket registration failed");
1929                 goto error;
1930         }
1931
1932         err = bt_procfs_init(&init_net, "l2cap", &l2cap_sk_list,
1933                              NULL);
1934         if (err < 0) {
1935                 BT_ERR("Failed to create L2CAP proc file");
1936                 bt_sock_unregister(BTPROTO_L2CAP);
1937                 goto error;
1938         }
1939
1940         BT_INFO("L2CAP socket layer initialized");
1941
1942         return 0;
1943
1944 error:
1945         proto_unregister(&l2cap_proto);
1946         return err;
1947 }
1948
1949 void l2cap_cleanup_sockets(void)
1950 {
1951         bt_procfs_cleanup(&init_net, "l2cap");
1952         bt_sock_unregister(BTPROTO_L2CAP);
1953         proto_unregister(&l2cap_proto);
1954 }