Merge tag 'urgent-slab-fix' of git://git.kernel.org/pub/scm/linux/kernel/git/device...
[deliverable/linux.git] / net / bluetooth / hci_sock.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI sockets. */
26
8c520a59 27#include <linux/export.h>
1da177e4
LT
28#include <asm/unaligned.h>
29
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
cd82e61c 32#include <net/bluetooth/hci_mon.h>
1da177e4 33
cd82e61c
MH
34static atomic_t monitor_promisc = ATOMIC_INIT(0);
35
1da177e4
LT
36/* ----- HCI socket interface ----- */
37
38static inline int hci_test_bit(int nr, void *addr)
39{
40 return *((__u32 *) addr + (nr >> 5)) & ((__u32) 1 << (nr & 31));
41}
42
43/* Security filter */
44static struct hci_sec_filter hci_sec_filter = {
45 /* Packet types */
46 0x10,
47 /* Events */
dd7f5527 48 { 0x1000d9fe, 0x0000b00c },
1da177e4
LT
49 /* Commands */
50 {
51 { 0x0 },
52 /* OGF_LINK_CTL */
7c631a67 53 { 0xbe000006, 0x00000001, 0x00000000, 0x00 },
1da177e4 54 /* OGF_LINK_POLICY */
7c631a67 55 { 0x00005200, 0x00000000, 0x00000000, 0x00 },
1da177e4 56 /* OGF_HOST_CTL */
7c631a67 57 { 0xaab00200, 0x2b402aaa, 0x05220154, 0x00 },
1da177e4 58 /* OGF_INFO_PARAM */
7c631a67 59 { 0x000002be, 0x00000000, 0x00000000, 0x00 },
1da177e4 60 /* OGF_STATUS_PARAM */
7c631a67 61 { 0x000000ea, 0x00000000, 0x00000000, 0x00 }
1da177e4
LT
62 }
63};
64
65static struct bt_sock_list hci_sk_list = {
d5fb2962 66 .lock = __RW_LOCK_UNLOCKED(hci_sk_list.lock)
1da177e4
LT
67};
68
f81fe64f
MH
69static bool is_filtered_packet(struct sock *sk, struct sk_buff *skb)
70{
71 struct hci_filter *flt;
72 int flt_type, flt_event;
73
74 /* Apply filter */
75 flt = &hci_pi(sk)->filter;
76
77 if (bt_cb(skb)->pkt_type == HCI_VENDOR_PKT)
78 flt_type = 0;
79 else
80 flt_type = bt_cb(skb)->pkt_type & HCI_FLT_TYPE_BITS;
81
82 if (!test_bit(flt_type, &flt->type_mask))
83 return true;
84
85 /* Extra filter for event packets only */
86 if (bt_cb(skb)->pkt_type != HCI_EVENT_PKT)
87 return false;
88
89 flt_event = (*(__u8 *)skb->data & HCI_FLT_EVENT_BITS);
90
91 if (!hci_test_bit(flt_event, &flt->event_mask))
92 return true;
93
94 /* Check filter only when opcode is set */
95 if (!flt->opcode)
96 return false;
97
98 if (flt_event == HCI_EV_CMD_COMPLETE &&
99 flt->opcode != get_unaligned((__le16 *)(skb->data + 3)))
100 return true;
101
102 if (flt_event == HCI_EV_CMD_STATUS &&
103 flt->opcode != get_unaligned((__le16 *)(skb->data + 4)))
104 return true;
105
106 return false;
107}
108
1da177e4 109/* Send frame to RAW socket */
470fe1b5 110void hci_send_to_sock(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4
LT
111{
112 struct sock *sk;
e0edf373 113 struct sk_buff *skb_copy = NULL;
1da177e4
LT
114
115 BT_DBG("hdev %p len %d", hdev, skb->len);
116
117 read_lock(&hci_sk_list.lock);
470fe1b5 118
b67bfe0d 119 sk_for_each(sk, &hci_sk_list.head) {
1da177e4
LT
120 struct sk_buff *nskb;
121
122 if (sk->sk_state != BT_BOUND || hci_pi(sk)->hdev != hdev)
123 continue;
124
125 /* Don't send frame to the socket it came from */
126 if (skb->sk == sk)
127 continue;
128
23500189
MH
129 if (hci_pi(sk)->channel == HCI_CHANNEL_RAW) {
130 if (is_filtered_packet(sk, skb))
131 continue;
132 } else if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
133 if (!bt_cb(skb)->incoming)
134 continue;
135 if (bt_cb(skb)->pkt_type != HCI_EVENT_PKT &&
136 bt_cb(skb)->pkt_type != HCI_ACLDATA_PKT &&
137 bt_cb(skb)->pkt_type != HCI_SCODATA_PKT)
138 continue;
139 } else {
140 /* Don't send frame to other channel types */
1da177e4 141 continue;
23500189 142 }
1da177e4 143
e0edf373
MH
144 if (!skb_copy) {
145 /* Create a private copy with headroom */
bad93e9d 146 skb_copy = __pskb_copy_fclone(skb, 1, GFP_ATOMIC, true);
e0edf373
MH
147 if (!skb_copy)
148 continue;
149
150 /* Put type byte before the data */
151 memcpy(skb_push(skb_copy, 1), &bt_cb(skb)->pkt_type, 1);
152 }
153
154 nskb = skb_clone(skb_copy, GFP_ATOMIC);
70f23020 155 if (!nskb)
1da177e4
LT
156 continue;
157
470fe1b5
MH
158 if (sock_queue_rcv_skb(sk, nskb))
159 kfree_skb(nskb);
160 }
161
162 read_unlock(&hci_sk_list.lock);
e0edf373
MH
163
164 kfree_skb(skb_copy);
470fe1b5
MH
165}
166
167/* Send frame to control socket */
168void hci_send_to_control(struct sk_buff *skb, struct sock *skip_sk)
169{
170 struct sock *sk;
470fe1b5
MH
171
172 BT_DBG("len %d", skb->len);
173
174 read_lock(&hci_sk_list.lock);
175
b67bfe0d 176 sk_for_each(sk, &hci_sk_list.head) {
470fe1b5
MH
177 struct sk_buff *nskb;
178
179 /* Skip the original socket */
180 if (sk == skip_sk)
181 continue;
182
183 if (sk->sk_state != BT_BOUND)
184 continue;
185
186 if (hci_pi(sk)->channel != HCI_CHANNEL_CONTROL)
187 continue;
188
189 nskb = skb_clone(skb, GFP_ATOMIC);
190 if (!nskb)
191 continue;
1da177e4
LT
192
193 if (sock_queue_rcv_skb(sk, nskb))
194 kfree_skb(nskb);
195 }
470fe1b5 196
1da177e4
LT
197 read_unlock(&hci_sk_list.lock);
198}
199
cd82e61c
MH
200/* Send frame to monitor socket */
201void hci_send_to_monitor(struct hci_dev *hdev, struct sk_buff *skb)
202{
203 struct sock *sk;
cd82e61c
MH
204 struct sk_buff *skb_copy = NULL;
205 __le16 opcode;
206
207 if (!atomic_read(&monitor_promisc))
208 return;
209
210 BT_DBG("hdev %p len %d", hdev, skb->len);
211
212 switch (bt_cb(skb)->pkt_type) {
213 case HCI_COMMAND_PKT:
dcf4adbf 214 opcode = cpu_to_le16(HCI_MON_COMMAND_PKT);
cd82e61c
MH
215 break;
216 case HCI_EVENT_PKT:
dcf4adbf 217 opcode = cpu_to_le16(HCI_MON_EVENT_PKT);
cd82e61c
MH
218 break;
219 case HCI_ACLDATA_PKT:
220 if (bt_cb(skb)->incoming)
dcf4adbf 221 opcode = cpu_to_le16(HCI_MON_ACL_RX_PKT);
cd82e61c 222 else
dcf4adbf 223 opcode = cpu_to_le16(HCI_MON_ACL_TX_PKT);
cd82e61c
MH
224 break;
225 case HCI_SCODATA_PKT:
226 if (bt_cb(skb)->incoming)
dcf4adbf 227 opcode = cpu_to_le16(HCI_MON_SCO_RX_PKT);
cd82e61c 228 else
dcf4adbf 229 opcode = cpu_to_le16(HCI_MON_SCO_TX_PKT);
cd82e61c
MH
230 break;
231 default:
232 return;
233 }
234
235 read_lock(&hci_sk_list.lock);
236
b67bfe0d 237 sk_for_each(sk, &hci_sk_list.head) {
cd82e61c
MH
238 struct sk_buff *nskb;
239
240 if (sk->sk_state != BT_BOUND)
241 continue;
242
243 if (hci_pi(sk)->channel != HCI_CHANNEL_MONITOR)
244 continue;
245
246 if (!skb_copy) {
247 struct hci_mon_hdr *hdr;
248
249 /* Create a private copy with headroom */
bad93e9d
OP
250 skb_copy = __pskb_copy_fclone(skb, HCI_MON_HDR_SIZE,
251 GFP_ATOMIC, true);
cd82e61c
MH
252 if (!skb_copy)
253 continue;
254
255 /* Put header before the data */
256 hdr = (void *) skb_push(skb_copy, HCI_MON_HDR_SIZE);
257 hdr->opcode = opcode;
258 hdr->index = cpu_to_le16(hdev->id);
259 hdr->len = cpu_to_le16(skb->len);
260 }
261
262 nskb = skb_clone(skb_copy, GFP_ATOMIC);
263 if (!nskb)
264 continue;
265
266 if (sock_queue_rcv_skb(sk, nskb))
267 kfree_skb(nskb);
268 }
269
270 read_unlock(&hci_sk_list.lock);
271
272 kfree_skb(skb_copy);
273}
274
275static void send_monitor_event(struct sk_buff *skb)
276{
277 struct sock *sk;
cd82e61c
MH
278
279 BT_DBG("len %d", skb->len);
280
281 read_lock(&hci_sk_list.lock);
282
b67bfe0d 283 sk_for_each(sk, &hci_sk_list.head) {
cd82e61c
MH
284 struct sk_buff *nskb;
285
286 if (sk->sk_state != BT_BOUND)
287 continue;
288
289 if (hci_pi(sk)->channel != HCI_CHANNEL_MONITOR)
290 continue;
291
292 nskb = skb_clone(skb, GFP_ATOMIC);
293 if (!nskb)
294 continue;
295
296 if (sock_queue_rcv_skb(sk, nskb))
297 kfree_skb(nskb);
298 }
299
300 read_unlock(&hci_sk_list.lock);
301}
302
303static struct sk_buff *create_monitor_event(struct hci_dev *hdev, int event)
304{
305 struct hci_mon_hdr *hdr;
306 struct hci_mon_new_index *ni;
307 struct sk_buff *skb;
308 __le16 opcode;
309
310 switch (event) {
311 case HCI_DEV_REG:
312 skb = bt_skb_alloc(HCI_MON_NEW_INDEX_SIZE, GFP_ATOMIC);
313 if (!skb)
314 return NULL;
315
316 ni = (void *) skb_put(skb, HCI_MON_NEW_INDEX_SIZE);
317 ni->type = hdev->dev_type;
318 ni->bus = hdev->bus;
319 bacpy(&ni->bdaddr, &hdev->bdaddr);
320 memcpy(ni->name, hdev->name, 8);
321
dcf4adbf 322 opcode = cpu_to_le16(HCI_MON_NEW_INDEX);
cd82e61c
MH
323 break;
324
325 case HCI_DEV_UNREG:
326 skb = bt_skb_alloc(0, GFP_ATOMIC);
327 if (!skb)
328 return NULL;
329
dcf4adbf 330 opcode = cpu_to_le16(HCI_MON_DEL_INDEX);
cd82e61c
MH
331 break;
332
333 default:
334 return NULL;
335 }
336
337 __net_timestamp(skb);
338
339 hdr = (void *) skb_push(skb, HCI_MON_HDR_SIZE);
340 hdr->opcode = opcode;
341 hdr->index = cpu_to_le16(hdev->id);
342 hdr->len = cpu_to_le16(skb->len - HCI_MON_HDR_SIZE);
343
344 return skb;
345}
346
347static void send_monitor_replay(struct sock *sk)
348{
349 struct hci_dev *hdev;
350
351 read_lock(&hci_dev_list_lock);
352
353 list_for_each_entry(hdev, &hci_dev_list, list) {
354 struct sk_buff *skb;
355
356 skb = create_monitor_event(hdev, HCI_DEV_REG);
357 if (!skb)
358 continue;
359
360 if (sock_queue_rcv_skb(sk, skb))
361 kfree_skb(skb);
362 }
363
364 read_unlock(&hci_dev_list_lock);
365}
366
040030ef
MH
367/* Generate internal stack event */
368static void hci_si_event(struct hci_dev *hdev, int type, int dlen, void *data)
369{
370 struct hci_event_hdr *hdr;
371 struct hci_ev_stack_internal *ev;
372 struct sk_buff *skb;
373
374 skb = bt_skb_alloc(HCI_EVENT_HDR_SIZE + sizeof(*ev) + dlen, GFP_ATOMIC);
375 if (!skb)
376 return;
377
378 hdr = (void *) skb_put(skb, HCI_EVENT_HDR_SIZE);
379 hdr->evt = HCI_EV_STACK_INTERNAL;
380 hdr->plen = sizeof(*ev) + dlen;
381
382 ev = (void *) skb_put(skb, sizeof(*ev) + dlen);
383 ev->type = type;
384 memcpy(ev->data, data, dlen);
385
386 bt_cb(skb)->incoming = 1;
387 __net_timestamp(skb);
388
389 bt_cb(skb)->pkt_type = HCI_EVENT_PKT;
040030ef
MH
390 hci_send_to_sock(hdev, skb);
391 kfree_skb(skb);
392}
393
394void hci_sock_dev_event(struct hci_dev *hdev, int event)
395{
396 struct hci_ev_si_device ev;
397
398 BT_DBG("hdev %s event %d", hdev->name, event);
399
cd82e61c
MH
400 /* Send event to monitor */
401 if (atomic_read(&monitor_promisc)) {
402 struct sk_buff *skb;
403
404 skb = create_monitor_event(hdev, event);
405 if (skb) {
406 send_monitor_event(skb);
407 kfree_skb(skb);
408 }
409 }
410
040030ef
MH
411 /* Send event to sockets */
412 ev.event = event;
413 ev.dev_id = hdev->id;
414 hci_si_event(NULL, HCI_EV_SI_DEVICE, sizeof(ev), &ev);
415
416 if (event == HCI_DEV_UNREG) {
417 struct sock *sk;
040030ef
MH
418
419 /* Detach sockets from device */
420 read_lock(&hci_sk_list.lock);
b67bfe0d 421 sk_for_each(sk, &hci_sk_list.head) {
040030ef
MH
422 bh_lock_sock_nested(sk);
423 if (hci_pi(sk)->hdev == hdev) {
424 hci_pi(sk)->hdev = NULL;
425 sk->sk_err = EPIPE;
426 sk->sk_state = BT_OPEN;
427 sk->sk_state_change(sk);
428
429 hci_dev_put(hdev);
430 }
431 bh_unlock_sock(sk);
432 }
433 read_unlock(&hci_sk_list.lock);
434 }
435}
436
1da177e4
LT
437static int hci_sock_release(struct socket *sock)
438{
439 struct sock *sk = sock->sk;
7b005bd3 440 struct hci_dev *hdev;
1da177e4
LT
441
442 BT_DBG("sock %p sk %p", sock, sk);
443
444 if (!sk)
445 return 0;
446
7b005bd3
MH
447 hdev = hci_pi(sk)->hdev;
448
cd82e61c
MH
449 if (hci_pi(sk)->channel == HCI_CHANNEL_MONITOR)
450 atomic_dec(&monitor_promisc);
451
1da177e4
LT
452 bt_sock_unlink(&hci_sk_list, sk);
453
454 if (hdev) {
23500189
MH
455 if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
456 mgmt_index_added(hdev);
457 clear_bit(HCI_USER_CHANNEL, &hdev->dev_flags);
458 hci_dev_close(hdev->id);
459 }
460
1da177e4
LT
461 atomic_dec(&hdev->promisc);
462 hci_dev_put(hdev);
463 }
464
465 sock_orphan(sk);
466
467 skb_queue_purge(&sk->sk_receive_queue);
468 skb_queue_purge(&sk->sk_write_queue);
469
470 sock_put(sk);
471 return 0;
472}
473
b2a66aad 474static int hci_sock_blacklist_add(struct hci_dev *hdev, void __user *arg)
f0358568
JH
475{
476 bdaddr_t bdaddr;
5e762444 477 int err;
f0358568
JH
478
479 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
480 return -EFAULT;
481
09fd0de5 482 hci_dev_lock(hdev);
5e762444 483
e71f41bc 484 err = hci_blacklist_add(hdev, &bdaddr, BDADDR_BREDR);
5e762444 485
09fd0de5 486 hci_dev_unlock(hdev);
5e762444
AJ
487
488 return err;
f0358568
JH
489}
490
b2a66aad 491static int hci_sock_blacklist_del(struct hci_dev *hdev, void __user *arg)
f0358568
JH
492{
493 bdaddr_t bdaddr;
5e762444 494 int err;
f0358568
JH
495
496 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
497 return -EFAULT;
498
09fd0de5 499 hci_dev_lock(hdev);
5e762444 500
e71f41bc 501 err = hci_blacklist_del(hdev, &bdaddr, BDADDR_BREDR);
5e762444 502
09fd0de5 503 hci_dev_unlock(hdev);
5e762444
AJ
504
505 return err;
f0358568
JH
506}
507
8e87d142 508/* Ioctls that require bound socket */
6039aa73
GP
509static int hci_sock_bound_ioctl(struct sock *sk, unsigned int cmd,
510 unsigned long arg)
1da177e4
LT
511{
512 struct hci_dev *hdev = hci_pi(sk)->hdev;
513
514 if (!hdev)
515 return -EBADFD;
516
0736cfa8
MH
517 if (test_bit(HCI_USER_CHANNEL, &hdev->dev_flags))
518 return -EBUSY;
519
5b69bef5
MH
520 if (hdev->dev_type != HCI_BREDR)
521 return -EOPNOTSUPP;
522
1da177e4
LT
523 switch (cmd) {
524 case HCISETRAW:
525 if (!capable(CAP_NET_ADMIN))
bf5b30b8 526 return -EPERM;
db596681 527 return -EOPNOTSUPP;
1da177e4 528
1da177e4 529 case HCIGETCONNINFO:
40be492f
MH
530 return hci_get_conn_info(hdev, (void __user *) arg);
531
532 case HCIGETAUTHINFO:
533 return hci_get_auth_info(hdev, (void __user *) arg);
1da177e4 534
f0358568
JH
535 case HCIBLOCKADDR:
536 if (!capable(CAP_NET_ADMIN))
bf5b30b8 537 return -EPERM;
b2a66aad 538 return hci_sock_blacklist_add(hdev, (void __user *) arg);
f0358568
JH
539
540 case HCIUNBLOCKADDR:
541 if (!capable(CAP_NET_ADMIN))
bf5b30b8 542 return -EPERM;
b2a66aad 543 return hci_sock_blacklist_del(hdev, (void __user *) arg);
1da177e4 544 }
0736cfa8 545
324d36ed 546 return -ENOIOCTLCMD;
1da177e4
LT
547}
548
8fc9ced3
GP
549static int hci_sock_ioctl(struct socket *sock, unsigned int cmd,
550 unsigned long arg)
1da177e4 551{
40be492f 552 void __user *argp = (void __user *) arg;
0736cfa8 553 struct sock *sk = sock->sk;
1da177e4
LT
554 int err;
555
556 BT_DBG("cmd %x arg %lx", cmd, arg);
557
c1c4f956
MH
558 lock_sock(sk);
559
560 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
561 err = -EBADFD;
562 goto done;
563 }
564
565 release_sock(sk);
566
1da177e4
LT
567 switch (cmd) {
568 case HCIGETDEVLIST:
569 return hci_get_dev_list(argp);
570
571 case HCIGETDEVINFO:
572 return hci_get_dev_info(argp);
573
574 case HCIGETCONNLIST:
575 return hci_get_conn_list(argp);
576
577 case HCIDEVUP:
578 if (!capable(CAP_NET_ADMIN))
bf5b30b8 579 return -EPERM;
1da177e4
LT
580 return hci_dev_open(arg);
581
582 case HCIDEVDOWN:
583 if (!capable(CAP_NET_ADMIN))
bf5b30b8 584 return -EPERM;
1da177e4
LT
585 return hci_dev_close(arg);
586
587 case HCIDEVRESET:
588 if (!capable(CAP_NET_ADMIN))
bf5b30b8 589 return -EPERM;
1da177e4
LT
590 return hci_dev_reset(arg);
591
592 case HCIDEVRESTAT:
593 if (!capable(CAP_NET_ADMIN))
bf5b30b8 594 return -EPERM;
1da177e4
LT
595 return hci_dev_reset_stat(arg);
596
597 case HCISETSCAN:
598 case HCISETAUTH:
599 case HCISETENCRYPT:
600 case HCISETPTYPE:
601 case HCISETLINKPOL:
602 case HCISETLINKMODE:
603 case HCISETACLMTU:
604 case HCISETSCOMTU:
605 if (!capable(CAP_NET_ADMIN))
bf5b30b8 606 return -EPERM;
1da177e4
LT
607 return hci_dev_cmd(cmd, argp);
608
609 case HCIINQUIRY:
610 return hci_inquiry(argp);
1da177e4 611 }
c1c4f956
MH
612
613 lock_sock(sk);
614
615 err = hci_sock_bound_ioctl(sk, cmd, arg);
616
617done:
618 release_sock(sk);
619 return err;
1da177e4
LT
620}
621
8fc9ced3
GP
622static int hci_sock_bind(struct socket *sock, struct sockaddr *addr,
623 int addr_len)
1da177e4 624{
0381101f 625 struct sockaddr_hci haddr;
1da177e4
LT
626 struct sock *sk = sock->sk;
627 struct hci_dev *hdev = NULL;
0381101f 628 int len, err = 0;
1da177e4
LT
629
630 BT_DBG("sock %p sk %p", sock, sk);
631
0381101f
JH
632 if (!addr)
633 return -EINVAL;
634
635 memset(&haddr, 0, sizeof(haddr));
636 len = min_t(unsigned int, sizeof(haddr), addr_len);
637 memcpy(&haddr, addr, len);
638
639 if (haddr.hci_family != AF_BLUETOOTH)
640 return -EINVAL;
641
1da177e4
LT
642 lock_sock(sk);
643
7cc2ade2 644 if (sk->sk_state == BT_BOUND) {
1da177e4
LT
645 err = -EALREADY;
646 goto done;
647 }
648
7cc2ade2
MH
649 switch (haddr.hci_channel) {
650 case HCI_CHANNEL_RAW:
651 if (hci_pi(sk)->hdev) {
652 err = -EALREADY;
1da177e4
LT
653 goto done;
654 }
655
7cc2ade2
MH
656 if (haddr.hci_dev != HCI_DEV_NONE) {
657 hdev = hci_dev_get(haddr.hci_dev);
658 if (!hdev) {
659 err = -ENODEV;
660 goto done;
661 }
662
663 atomic_inc(&hdev->promisc);
664 }
665
666 hci_pi(sk)->hdev = hdev;
667 break;
668
23500189
MH
669 case HCI_CHANNEL_USER:
670 if (hci_pi(sk)->hdev) {
671 err = -EALREADY;
672 goto done;
673 }
674
675 if (haddr.hci_dev == HCI_DEV_NONE) {
676 err = -EINVAL;
677 goto done;
678 }
679
10a8b86f 680 if (!capable(CAP_NET_ADMIN)) {
23500189
MH
681 err = -EPERM;
682 goto done;
683 }
684
685 hdev = hci_dev_get(haddr.hci_dev);
686 if (!hdev) {
687 err = -ENODEV;
688 goto done;
689 }
690
691 if (test_bit(HCI_UP, &hdev->flags) ||
692 test_bit(HCI_INIT, &hdev->flags) ||
693 test_bit(HCI_SETUP, &hdev->dev_flags)) {
694 err = -EBUSY;
695 hci_dev_put(hdev);
696 goto done;
697 }
698
699 if (test_and_set_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
700 err = -EUSERS;
701 hci_dev_put(hdev);
702 goto done;
703 }
704
705 mgmt_index_removed(hdev);
706
707 err = hci_dev_open(hdev->id);
708 if (err) {
709 clear_bit(HCI_USER_CHANNEL, &hdev->dev_flags);
c6521401 710 mgmt_index_added(hdev);
23500189
MH
711 hci_dev_put(hdev);
712 goto done;
713 }
714
715 atomic_inc(&hdev->promisc);
716
717 hci_pi(sk)->hdev = hdev;
718 break;
719
7cc2ade2 720 case HCI_CHANNEL_CONTROL:
4b95a24c 721 if (haddr.hci_dev != HCI_DEV_NONE) {
7cc2ade2
MH
722 err = -EINVAL;
723 goto done;
724 }
725
801f13bd
MH
726 if (!capable(CAP_NET_ADMIN)) {
727 err = -EPERM;
728 goto done;
729 }
730
7cc2ade2
MH
731 break;
732
cd82e61c
MH
733 case HCI_CHANNEL_MONITOR:
734 if (haddr.hci_dev != HCI_DEV_NONE) {
735 err = -EINVAL;
736 goto done;
737 }
738
739 if (!capable(CAP_NET_RAW)) {
740 err = -EPERM;
741 goto done;
742 }
743
744 send_monitor_replay(sk);
745
746 atomic_inc(&monitor_promisc);
747 break;
748
7cc2ade2
MH
749 default:
750 err = -EINVAL;
751 goto done;
1da177e4
LT
752 }
753
7cc2ade2 754
0381101f 755 hci_pi(sk)->channel = haddr.hci_channel;
1da177e4
LT
756 sk->sk_state = BT_BOUND;
757
758done:
759 release_sock(sk);
760 return err;
761}
762
8fc9ced3
GP
763static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
764 int *addr_len, int peer)
1da177e4
LT
765{
766 struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
767 struct sock *sk = sock->sk;
9d4b68b2
MH
768 struct hci_dev *hdev;
769 int err = 0;
1da177e4
LT
770
771 BT_DBG("sock %p sk %p", sock, sk);
772
06f43cbc
MH
773 if (peer)
774 return -EOPNOTSUPP;
775
1da177e4
LT
776 lock_sock(sk);
777
9d4b68b2
MH
778 hdev = hci_pi(sk)->hdev;
779 if (!hdev) {
780 err = -EBADFD;
781 goto done;
782 }
783
1da177e4
LT
784 *addr_len = sizeof(*haddr);
785 haddr->hci_family = AF_BLUETOOTH;
7b005bd3 786 haddr->hci_dev = hdev->id;
9d4b68b2 787 haddr->hci_channel= hci_pi(sk)->channel;
1da177e4 788
9d4b68b2 789done:
1da177e4 790 release_sock(sk);
9d4b68b2 791 return err;
1da177e4
LT
792}
793
6039aa73
GP
794static void hci_sock_cmsg(struct sock *sk, struct msghdr *msg,
795 struct sk_buff *skb)
1da177e4
LT
796{
797 __u32 mask = hci_pi(sk)->cmsg_mask;
798
0d48d939
MH
799 if (mask & HCI_CMSG_DIR) {
800 int incoming = bt_cb(skb)->incoming;
8fc9ced3
GP
801 put_cmsg(msg, SOL_HCI, HCI_CMSG_DIR, sizeof(incoming),
802 &incoming);
0d48d939 803 }
1da177e4 804
a61bbcf2 805 if (mask & HCI_CMSG_TSTAMP) {
f6e623a6
JFS
806#ifdef CONFIG_COMPAT
807 struct compat_timeval ctv;
808#endif
a61bbcf2 809 struct timeval tv;
767c5eb5
MH
810 void *data;
811 int len;
a61bbcf2
PM
812
813 skb_get_timestamp(skb, &tv);
767c5eb5 814
1da97f83
DM
815 data = &tv;
816 len = sizeof(tv);
817#ifdef CONFIG_COMPAT
da88cea1
L
818 if (!COMPAT_USE_64BIT_TIME &&
819 (msg->msg_flags & MSG_CMSG_COMPAT)) {
767c5eb5
MH
820 ctv.tv_sec = tv.tv_sec;
821 ctv.tv_usec = tv.tv_usec;
822 data = &ctv;
823 len = sizeof(ctv);
767c5eb5 824 }
1da97f83 825#endif
767c5eb5
MH
826
827 put_cmsg(msg, SOL_HCI, HCI_CMSG_TSTAMP, len, data);
a61bbcf2 828 }
1da177e4 829}
8e87d142
YH
830
831static int hci_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
3bb3c755 832 struct msghdr *msg, size_t len, int flags)
1da177e4
LT
833{
834 int noblock = flags & MSG_DONTWAIT;
835 struct sock *sk = sock->sk;
836 struct sk_buff *skb;
837 int copied, err;
838
839 BT_DBG("sock %p, sk %p", sock, sk);
840
841 if (flags & (MSG_OOB))
842 return -EOPNOTSUPP;
843
844 if (sk->sk_state == BT_CLOSED)
845 return 0;
846
70f23020
AE
847 skb = skb_recv_datagram(sk, flags, noblock, &err);
848 if (!skb)
1da177e4
LT
849 return err;
850
1da177e4
LT
851 copied = skb->len;
852 if (len < copied) {
853 msg->msg_flags |= MSG_TRUNC;
854 copied = len;
855 }
856
badff6d0 857 skb_reset_transport_header(skb);
1da177e4
LT
858 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
859
3a208627
MH
860 switch (hci_pi(sk)->channel) {
861 case HCI_CHANNEL_RAW:
862 hci_sock_cmsg(sk, msg, skb);
863 break;
23500189 864 case HCI_CHANNEL_USER:
97e0bdeb 865 case HCI_CHANNEL_CONTROL:
cd82e61c
MH
866 case HCI_CHANNEL_MONITOR:
867 sock_recv_timestamp(msg, sk, skb);
868 break;
3a208627 869 }
1da177e4
LT
870
871 skb_free_datagram(sk, skb);
872
873 return err ? : copied;
874}
875
8e87d142 876static int hci_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
877 struct msghdr *msg, size_t len)
878{
879 struct sock *sk = sock->sk;
880 struct hci_dev *hdev;
881 struct sk_buff *skb;
882 int err;
883
884 BT_DBG("sock %p sk %p", sock, sk);
885
886 if (msg->msg_flags & MSG_OOB)
887 return -EOPNOTSUPP;
888
889 if (msg->msg_flags & ~(MSG_DONTWAIT|MSG_NOSIGNAL|MSG_ERRQUEUE))
890 return -EINVAL;
891
892 if (len < 4 || len > HCI_MAX_FRAME_SIZE)
893 return -EINVAL;
894
895 lock_sock(sk);
896
0381101f
JH
897 switch (hci_pi(sk)->channel) {
898 case HCI_CHANNEL_RAW:
23500189 899 case HCI_CHANNEL_USER:
0381101f
JH
900 break;
901 case HCI_CHANNEL_CONTROL:
902 err = mgmt_control(sk, msg, len);
903 goto done;
cd82e61c
MH
904 case HCI_CHANNEL_MONITOR:
905 err = -EOPNOTSUPP;
906 goto done;
0381101f
JH
907 default:
908 err = -EINVAL;
909 goto done;
910 }
911
70f23020
AE
912 hdev = hci_pi(sk)->hdev;
913 if (!hdev) {
1da177e4
LT
914 err = -EBADFD;
915 goto done;
916 }
917
7e21addc
MH
918 if (!test_bit(HCI_UP, &hdev->flags)) {
919 err = -ENETDOWN;
920 goto done;
921 }
922
70f23020
AE
923 skb = bt_skb_send_alloc(sk, len, msg->msg_flags & MSG_DONTWAIT, &err);
924 if (!skb)
1da177e4
LT
925 goto done;
926
927 if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) {
928 err = -EFAULT;
929 goto drop;
930 }
931
0d48d939 932 bt_cb(skb)->pkt_type = *((unsigned char *) skb->data);
1da177e4 933 skb_pull(skb, 1);
1da177e4 934
1bc5ad16
MH
935 if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
936 /* No permission check is needed for user channel
937 * since that gets enforced when binding the socket.
938 *
939 * However check that the packet type is valid.
940 */
941 if (bt_cb(skb)->pkt_type != HCI_COMMAND_PKT &&
942 bt_cb(skb)->pkt_type != HCI_ACLDATA_PKT &&
943 bt_cb(skb)->pkt_type != HCI_SCODATA_PKT) {
944 err = -EINVAL;
945 goto drop;
946 }
947
948 skb_queue_tail(&hdev->raw_q, skb);
949 queue_work(hdev->workqueue, &hdev->tx_work);
950 } else if (bt_cb(skb)->pkt_type == HCI_COMMAND_PKT) {
83985319 951 u16 opcode = get_unaligned_le16(skb->data);
1da177e4
LT
952 u16 ogf = hci_opcode_ogf(opcode);
953 u16 ocf = hci_opcode_ocf(opcode);
954
955 if (((ogf > HCI_SFLT_MAX_OGF) ||
3bb3c755
GP
956 !hci_test_bit(ocf & HCI_FLT_OCF_BITS,
957 &hci_sec_filter.ocf_mask[ogf])) &&
958 !capable(CAP_NET_RAW)) {
1da177e4
LT
959 err = -EPERM;
960 goto drop;
961 }
962
a9de9248 963 if (test_bit(HCI_RAW, &hdev->flags) || (ogf == 0x3f)) {
1da177e4 964 skb_queue_tail(&hdev->raw_q, skb);
3eff45ea 965 queue_work(hdev->workqueue, &hdev->tx_work);
1da177e4 966 } else {
11714b3d
JH
967 /* Stand-alone HCI commands must be flaged as
968 * single-command requests.
969 */
970 bt_cb(skb)->req.start = true;
971
1da177e4 972 skb_queue_tail(&hdev->cmd_q, skb);
c347b765 973 queue_work(hdev->workqueue, &hdev->cmd_work);
1da177e4
LT
974 }
975 } else {
976 if (!capable(CAP_NET_RAW)) {
977 err = -EPERM;
978 goto drop;
979 }
980
981 skb_queue_tail(&hdev->raw_q, skb);
3eff45ea 982 queue_work(hdev->workqueue, &hdev->tx_work);
1da177e4
LT
983 }
984
985 err = len;
986
987done:
988 release_sock(sk);
989 return err;
990
991drop:
992 kfree_skb(skb);
993 goto done;
994}
995
8fc9ced3
GP
996static int hci_sock_setsockopt(struct socket *sock, int level, int optname,
997 char __user *optval, unsigned int len)
1da177e4
LT
998{
999 struct hci_ufilter uf = { .opcode = 0 };
1000 struct sock *sk = sock->sk;
1001 int err = 0, opt = 0;
1002
1003 BT_DBG("sk %p, opt %d", sk, optname);
1004
1005 lock_sock(sk);
1006
2f39cdb7 1007 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
c2371e80 1008 err = -EBADFD;
2f39cdb7
MH
1009 goto done;
1010 }
1011
1da177e4
LT
1012 switch (optname) {
1013 case HCI_DATA_DIR:
1014 if (get_user(opt, (int __user *)optval)) {
1015 err = -EFAULT;
1016 break;
1017 }
1018
1019 if (opt)
1020 hci_pi(sk)->cmsg_mask |= HCI_CMSG_DIR;
1021 else
1022 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_DIR;
1023 break;
1024
1025 case HCI_TIME_STAMP:
1026 if (get_user(opt, (int __user *)optval)) {
1027 err = -EFAULT;
1028 break;
1029 }
1030
1031 if (opt)
1032 hci_pi(sk)->cmsg_mask |= HCI_CMSG_TSTAMP;
1033 else
1034 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_TSTAMP;
1035 break;
1036
1037 case HCI_FILTER:
0878b666
MH
1038 {
1039 struct hci_filter *f = &hci_pi(sk)->filter;
1040
1041 uf.type_mask = f->type_mask;
1042 uf.opcode = f->opcode;
1043 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
1044 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
1045 }
1046
1da177e4
LT
1047 len = min_t(unsigned int, len, sizeof(uf));
1048 if (copy_from_user(&uf, optval, len)) {
1049 err = -EFAULT;
1050 break;
1051 }
1052
1053 if (!capable(CAP_NET_RAW)) {
1054 uf.type_mask &= hci_sec_filter.type_mask;
1055 uf.event_mask[0] &= *((u32 *) hci_sec_filter.event_mask + 0);
1056 uf.event_mask[1] &= *((u32 *) hci_sec_filter.event_mask + 1);
1057 }
1058
1059 {
1060 struct hci_filter *f = &hci_pi(sk)->filter;
1061
1062 f->type_mask = uf.type_mask;
1063 f->opcode = uf.opcode;
1064 *((u32 *) f->event_mask + 0) = uf.event_mask[0];
1065 *((u32 *) f->event_mask + 1) = uf.event_mask[1];
1066 }
8e87d142 1067 break;
1da177e4
LT
1068
1069 default:
1070 err = -ENOPROTOOPT;
1071 break;
1072 }
1073
2f39cdb7 1074done:
1da177e4
LT
1075 release_sock(sk);
1076 return err;
1077}
1078
8fc9ced3
GP
1079static int hci_sock_getsockopt(struct socket *sock, int level, int optname,
1080 char __user *optval, int __user *optlen)
1da177e4
LT
1081{
1082 struct hci_ufilter uf;
1083 struct sock *sk = sock->sk;
cedc5469
MH
1084 int len, opt, err = 0;
1085
1086 BT_DBG("sk %p, opt %d", sk, optname);
1da177e4
LT
1087
1088 if (get_user(len, optlen))
1089 return -EFAULT;
1090
cedc5469
MH
1091 lock_sock(sk);
1092
1093 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
c2371e80 1094 err = -EBADFD;
cedc5469
MH
1095 goto done;
1096 }
1097
1da177e4
LT
1098 switch (optname) {
1099 case HCI_DATA_DIR:
1100 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_DIR)
1101 opt = 1;
8e87d142 1102 else
1da177e4
LT
1103 opt = 0;
1104
1105 if (put_user(opt, optval))
cedc5469 1106 err = -EFAULT;
1da177e4
LT
1107 break;
1108
1109 case HCI_TIME_STAMP:
1110 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_TSTAMP)
1111 opt = 1;
8e87d142 1112 else
1da177e4
LT
1113 opt = 0;
1114
1115 if (put_user(opt, optval))
cedc5469 1116 err = -EFAULT;
1da177e4
LT
1117 break;
1118
1119 case HCI_FILTER:
1120 {
1121 struct hci_filter *f = &hci_pi(sk)->filter;
1122
e15ca9a0 1123 memset(&uf, 0, sizeof(uf));
1da177e4
LT
1124 uf.type_mask = f->type_mask;
1125 uf.opcode = f->opcode;
1126 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
1127 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
1128 }
1129
1130 len = min_t(unsigned int, len, sizeof(uf));
1131 if (copy_to_user(optval, &uf, len))
cedc5469 1132 err = -EFAULT;
1da177e4
LT
1133 break;
1134
1135 default:
cedc5469 1136 err = -ENOPROTOOPT;
1da177e4
LT
1137 break;
1138 }
1139
cedc5469
MH
1140done:
1141 release_sock(sk);
1142 return err;
1da177e4
LT
1143}
1144
90ddc4f0 1145static const struct proto_ops hci_sock_ops = {
1da177e4
LT
1146 .family = PF_BLUETOOTH,
1147 .owner = THIS_MODULE,
1148 .release = hci_sock_release,
1149 .bind = hci_sock_bind,
1150 .getname = hci_sock_getname,
1151 .sendmsg = hci_sock_sendmsg,
1152 .recvmsg = hci_sock_recvmsg,
1153 .ioctl = hci_sock_ioctl,
1154 .poll = datagram_poll,
1155 .listen = sock_no_listen,
1156 .shutdown = sock_no_shutdown,
1157 .setsockopt = hci_sock_setsockopt,
1158 .getsockopt = hci_sock_getsockopt,
1159 .connect = sock_no_connect,
1160 .socketpair = sock_no_socketpair,
1161 .accept = sock_no_accept,
1162 .mmap = sock_no_mmap
1163};
1164
1165static struct proto hci_sk_proto = {
1166 .name = "HCI",
1167 .owner = THIS_MODULE,
1168 .obj_size = sizeof(struct hci_pinfo)
1169};
1170
3f378b68
EP
1171static int hci_sock_create(struct net *net, struct socket *sock, int protocol,
1172 int kern)
1da177e4
LT
1173{
1174 struct sock *sk;
1175
1176 BT_DBG("sock %p", sock);
1177
1178 if (sock->type != SOCK_RAW)
1179 return -ESOCKTNOSUPPORT;
1180
1181 sock->ops = &hci_sock_ops;
1182
6257ff21 1183 sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hci_sk_proto);
1da177e4
LT
1184 if (!sk)
1185 return -ENOMEM;
1186
1187 sock_init_data(sock, sk);
1188
1189 sock_reset_flag(sk, SOCK_ZAPPED);
1190
1191 sk->sk_protocol = protocol;
1192
1193 sock->state = SS_UNCONNECTED;
1194 sk->sk_state = BT_OPEN;
1195
1196 bt_sock_link(&hci_sk_list, sk);
1197 return 0;
1198}
1199
ec1b4cf7 1200static const struct net_proto_family hci_sock_family_ops = {
1da177e4
LT
1201 .family = PF_BLUETOOTH,
1202 .owner = THIS_MODULE,
1203 .create = hci_sock_create,
1204};
1205
1da177e4
LT
1206int __init hci_sock_init(void)
1207{
1208 int err;
1209
1210 err = proto_register(&hci_sk_proto, 0);
1211 if (err < 0)
1212 return err;
1213
1214 err = bt_sock_register(BTPROTO_HCI, &hci_sock_family_ops);
f7c86637
MY
1215 if (err < 0) {
1216 BT_ERR("HCI socket registration failed");
1da177e4 1217 goto error;
f7c86637
MY
1218 }
1219
b0316615 1220 err = bt_procfs_init(&init_net, "hci", &hci_sk_list, NULL);
f7c86637
MY
1221 if (err < 0) {
1222 BT_ERR("Failed to create HCI proc file");
1223 bt_sock_unregister(BTPROTO_HCI);
1224 goto error;
1225 }
1da177e4 1226
1da177e4
LT
1227 BT_INFO("HCI socket layer initialized");
1228
1229 return 0;
1230
1231error:
1da177e4
LT
1232 proto_unregister(&hci_sk_proto);
1233 return err;
1234}
1235
b7440a14 1236void hci_sock_cleanup(void)
1da177e4 1237{
f7c86637 1238 bt_procfs_cleanup(&init_net, "hci");
5e9d7f86 1239 bt_sock_unregister(BTPROTO_HCI);
1da177e4 1240 proto_unregister(&hci_sk_proto);
1da177e4 1241}
This page took 0.768842 seconds and 5 git commands to generate.