Bluetooth: Fix __hci_request synchronization for hci_open_dev
[deliverable/linux.git] / net / bluetooth / hci_sock.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI sockets. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
4fc268d2 30#include <linux/capability.h>
1da177e4
LT
31#include <linux/errno.h>
32#include <linux/kernel.h>
1da177e4
LT
33#include <linux/slab.h>
34#include <linux/poll.h>
35#include <linux/fcntl.h>
36#include <linux/init.h>
37#include <linux/skbuff.h>
38#include <linux/workqueue.h>
39#include <linux/interrupt.h>
767c5eb5 40#include <linux/compat.h>
1da177e4
LT
41#include <linux/socket.h>
42#include <linux/ioctl.h>
43#include <net/sock.h>
44
45#include <asm/system.h>
70f23020 46#include <linux/uaccess.h>
1da177e4
LT
47#include <asm/unaligned.h>
48
49#include <net/bluetooth/bluetooth.h>
50#include <net/bluetooth/hci_core.h>
51
0381101f
JH
52static int enable_mgmt;
53
1da177e4
LT
54/* ----- HCI socket interface ----- */
55
56static inline int hci_test_bit(int nr, void *addr)
57{
58 return *((__u32 *) addr + (nr >> 5)) & ((__u32) 1 << (nr & 31));
59}
60
61/* Security filter */
62static struct hci_sec_filter hci_sec_filter = {
63 /* Packet types */
64 0x10,
65 /* Events */
dd7f5527 66 { 0x1000d9fe, 0x0000b00c },
1da177e4
LT
67 /* Commands */
68 {
69 { 0x0 },
70 /* OGF_LINK_CTL */
7c631a67 71 { 0xbe000006, 0x00000001, 0x00000000, 0x00 },
1da177e4 72 /* OGF_LINK_POLICY */
7c631a67 73 { 0x00005200, 0x00000000, 0x00000000, 0x00 },
1da177e4 74 /* OGF_HOST_CTL */
7c631a67 75 { 0xaab00200, 0x2b402aaa, 0x05220154, 0x00 },
1da177e4 76 /* OGF_INFO_PARAM */
7c631a67 77 { 0x000002be, 0x00000000, 0x00000000, 0x00 },
1da177e4 78 /* OGF_STATUS_PARAM */
7c631a67 79 { 0x000000ea, 0x00000000, 0x00000000, 0x00 }
1da177e4
LT
80 }
81};
82
83static struct bt_sock_list hci_sk_list = {
d5fb2962 84 .lock = __RW_LOCK_UNLOCKED(hci_sk_list.lock)
1da177e4
LT
85};
86
87/* Send frame to RAW socket */
88void hci_send_to_sock(struct hci_dev *hdev, struct sk_buff *skb)
89{
90 struct sock *sk;
91 struct hlist_node *node;
92
93 BT_DBG("hdev %p len %d", hdev, skb->len);
94
95 read_lock(&hci_sk_list.lock);
96 sk_for_each(sk, node, &hci_sk_list.head) {
97 struct hci_filter *flt;
98 struct sk_buff *nskb;
99
100 if (sk->sk_state != BT_BOUND || hci_pi(sk)->hdev != hdev)
101 continue;
102
103 /* Don't send frame to the socket it came from */
104 if (skb->sk == sk)
105 continue;
106
a40c406c
JH
107 if (bt_cb(skb)->channel != hci_pi(sk)->channel)
108 continue;
109
110 if (bt_cb(skb)->channel == HCI_CHANNEL_CONTROL)
111 goto clone;
112
1da177e4
LT
113 /* Apply filter */
114 flt = &hci_pi(sk)->filter;
115
0d48d939
MH
116 if (!test_bit((bt_cb(skb)->pkt_type == HCI_VENDOR_PKT) ?
117 0 : (bt_cb(skb)->pkt_type & HCI_FLT_TYPE_BITS), &flt->type_mask))
1da177e4
LT
118 continue;
119
0d48d939 120 if (bt_cb(skb)->pkt_type == HCI_EVENT_PKT) {
1da177e4
LT
121 register int evt = (*(__u8 *)skb->data & HCI_FLT_EVENT_BITS);
122
123 if (!hci_test_bit(evt, &flt->event_mask))
124 continue;
125
4498c80d
DM
126 if (flt->opcode &&
127 ((evt == HCI_EV_CMD_COMPLETE &&
128 flt->opcode !=
905f3ed6 129 get_unaligned((__le16 *)(skb->data + 3))) ||
4498c80d
DM
130 (evt == HCI_EV_CMD_STATUS &&
131 flt->opcode !=
905f3ed6 132 get_unaligned((__le16 *)(skb->data + 4)))))
1da177e4
LT
133 continue;
134 }
135
a40c406c 136clone:
70f23020
AE
137 nskb = skb_clone(skb, GFP_ATOMIC);
138 if (!nskb)
1da177e4
LT
139 continue;
140
141 /* Put type byte before the data */
a40c406c
JH
142 if (bt_cb(skb)->channel == HCI_CHANNEL_RAW)
143 memcpy(skb_push(nskb, 1), &bt_cb(nskb)->pkt_type, 1);
1da177e4
LT
144
145 if (sock_queue_rcv_skb(sk, nskb))
146 kfree_skb(nskb);
147 }
148 read_unlock(&hci_sk_list.lock);
149}
150
151static int hci_sock_release(struct socket *sock)
152{
153 struct sock *sk = sock->sk;
7b005bd3 154 struct hci_dev *hdev;
1da177e4
LT
155
156 BT_DBG("sock %p sk %p", sock, sk);
157
158 if (!sk)
159 return 0;
160
7b005bd3
MH
161 hdev = hci_pi(sk)->hdev;
162
1da177e4
LT
163 bt_sock_unlink(&hci_sk_list, sk);
164
165 if (hdev) {
166 atomic_dec(&hdev->promisc);
167 hci_dev_put(hdev);
168 }
169
170 sock_orphan(sk);
171
172 skb_queue_purge(&sk->sk_receive_queue);
173 skb_queue_purge(&sk->sk_write_queue);
174
175 sock_put(sk);
176 return 0;
177}
178
f0358568
JH
179struct bdaddr_list *hci_blacklist_lookup(struct hci_dev *hdev, bdaddr_t *bdaddr)
180{
181 struct list_head *p;
f0358568 182
ea4bd8ba 183 list_for_each(p, &hdev->blacklist) {
f0358568
JH
184 struct bdaddr_list *b;
185
186 b = list_entry(p, struct bdaddr_list, list);
187
188 if (bacmp(bdaddr, &b->bdaddr) == 0)
189 return b;
190 }
191
192 return NULL;
193}
194
195static int hci_blacklist_add(struct hci_dev *hdev, void __user *arg)
196{
197 bdaddr_t bdaddr;
198 struct bdaddr_list *entry;
199
200 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
201 return -EFAULT;
202
203 if (bacmp(&bdaddr, BDADDR_ANY) == 0)
204 return -EBADF;
205
206 if (hci_blacklist_lookup(hdev, &bdaddr))
207 return -EEXIST;
208
209 entry = kzalloc(sizeof(struct bdaddr_list), GFP_KERNEL);
210 if (!entry)
211 return -ENOMEM;
212
213 bacpy(&entry->bdaddr, &bdaddr);
214
ea4bd8ba 215 list_add(&entry->list, &hdev->blacklist);
f0358568
JH
216
217 return 0;
218}
219
220int hci_blacklist_clear(struct hci_dev *hdev)
221{
222 struct list_head *p, *n;
f0358568 223
ea4bd8ba 224 list_for_each_safe(p, n, &hdev->blacklist) {
f0358568
JH
225 struct bdaddr_list *b;
226
227 b = list_entry(p, struct bdaddr_list, list);
228
229 list_del(p);
230 kfree(b);
231 }
232
233 return 0;
234}
235
236static int hci_blacklist_del(struct hci_dev *hdev, void __user *arg)
237{
238 bdaddr_t bdaddr;
239 struct bdaddr_list *entry;
240
241 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
242 return -EFAULT;
243
244 if (bacmp(&bdaddr, BDADDR_ANY) == 0)
245 return hci_blacklist_clear(hdev);
246
247 entry = hci_blacklist_lookup(hdev, &bdaddr);
248 if (!entry)
249 return -ENOENT;
250
251 list_del(&entry->list);
252 kfree(entry);
253
254 return 0;
255}
256
8e87d142 257/* Ioctls that require bound socket */
1da177e4
LT
258static inline int hci_sock_bound_ioctl(struct sock *sk, unsigned int cmd, unsigned long arg)
259{
260 struct hci_dev *hdev = hci_pi(sk)->hdev;
261
262 if (!hdev)
263 return -EBADFD;
264
265 switch (cmd) {
266 case HCISETRAW:
267 if (!capable(CAP_NET_ADMIN))
268 return -EACCES;
269
270 if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
271 return -EPERM;
272
273 if (arg)
274 set_bit(HCI_RAW, &hdev->flags);
275 else
276 clear_bit(HCI_RAW, &hdev->flags);
277
278 return 0;
279
1da177e4 280 case HCIGETCONNINFO:
40be492f
MH
281 return hci_get_conn_info(hdev, (void __user *) arg);
282
283 case HCIGETAUTHINFO:
284 return hci_get_auth_info(hdev, (void __user *) arg);
1da177e4 285
f0358568
JH
286 case HCIBLOCKADDR:
287 if (!capable(CAP_NET_ADMIN))
288 return -EACCES;
289 return hci_blacklist_add(hdev, (void __user *) arg);
290
291 case HCIUNBLOCKADDR:
292 if (!capable(CAP_NET_ADMIN))
293 return -EACCES;
294 return hci_blacklist_del(hdev, (void __user *) arg);
295
1da177e4
LT
296 default:
297 if (hdev->ioctl)
298 return hdev->ioctl(hdev, cmd, arg);
299 return -EINVAL;
300 }
301}
302
303static int hci_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
304{
305 struct sock *sk = sock->sk;
40be492f 306 void __user *argp = (void __user *) arg;
1da177e4
LT
307 int err;
308
309 BT_DBG("cmd %x arg %lx", cmd, arg);
310
311 switch (cmd) {
312 case HCIGETDEVLIST:
313 return hci_get_dev_list(argp);
314
315 case HCIGETDEVINFO:
316 return hci_get_dev_info(argp);
317
318 case HCIGETCONNLIST:
319 return hci_get_conn_list(argp);
320
321 case HCIDEVUP:
322 if (!capable(CAP_NET_ADMIN))
323 return -EACCES;
324 return hci_dev_open(arg);
325
326 case HCIDEVDOWN:
327 if (!capable(CAP_NET_ADMIN))
328 return -EACCES;
329 return hci_dev_close(arg);
330
331 case HCIDEVRESET:
332 if (!capable(CAP_NET_ADMIN))
333 return -EACCES;
334 return hci_dev_reset(arg);
335
336 case HCIDEVRESTAT:
337 if (!capable(CAP_NET_ADMIN))
338 return -EACCES;
339 return hci_dev_reset_stat(arg);
340
341 case HCISETSCAN:
342 case HCISETAUTH:
343 case HCISETENCRYPT:
344 case HCISETPTYPE:
345 case HCISETLINKPOL:
346 case HCISETLINKMODE:
347 case HCISETACLMTU:
348 case HCISETSCOMTU:
349 if (!capable(CAP_NET_ADMIN))
350 return -EACCES;
351 return hci_dev_cmd(cmd, argp);
352
353 case HCIINQUIRY:
354 return hci_inquiry(argp);
355
356 default:
357 lock_sock(sk);
358 err = hci_sock_bound_ioctl(sk, cmd, arg);
359 release_sock(sk);
360 return err;
361 }
362}
363
364static int hci_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
365{
0381101f 366 struct sockaddr_hci haddr;
1da177e4
LT
367 struct sock *sk = sock->sk;
368 struct hci_dev *hdev = NULL;
0381101f 369 int len, err = 0;
1da177e4
LT
370
371 BT_DBG("sock %p sk %p", sock, sk);
372
0381101f
JH
373 if (!addr)
374 return -EINVAL;
375
376 memset(&haddr, 0, sizeof(haddr));
377 len = min_t(unsigned int, sizeof(haddr), addr_len);
378 memcpy(&haddr, addr, len);
379
380 if (haddr.hci_family != AF_BLUETOOTH)
381 return -EINVAL;
382
383 if (haddr.hci_channel != HCI_CHANNEL_RAW && !enable_mgmt)
1da177e4
LT
384 return -EINVAL;
385
386 lock_sock(sk);
387
0381101f 388 if (sk->sk_state == BT_BOUND || hci_pi(sk)->hdev) {
1da177e4
LT
389 err = -EALREADY;
390 goto done;
391 }
392
0381101f
JH
393 if (haddr.hci_dev != HCI_DEV_NONE) {
394 hdev = hci_dev_get(haddr.hci_dev);
70f23020 395 if (!hdev) {
1da177e4
LT
396 err = -ENODEV;
397 goto done;
398 }
399
400 atomic_inc(&hdev->promisc);
401 }
402
0381101f 403 hci_pi(sk)->channel = haddr.hci_channel;
1da177e4
LT
404 hci_pi(sk)->hdev = hdev;
405 sk->sk_state = BT_BOUND;
406
407done:
408 release_sock(sk);
409 return err;
410}
411
412static int hci_sock_getname(struct socket *sock, struct sockaddr *addr, int *addr_len, int peer)
413{
414 struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
415 struct sock *sk = sock->sk;
7b005bd3 416 struct hci_dev *hdev = hci_pi(sk)->hdev;
1da177e4
LT
417
418 BT_DBG("sock %p sk %p", sock, sk);
419
7b005bd3
MH
420 if (!hdev)
421 return -EBADFD;
422
1da177e4
LT
423 lock_sock(sk);
424
425 *addr_len = sizeof(*haddr);
426 haddr->hci_family = AF_BLUETOOTH;
7b005bd3 427 haddr->hci_dev = hdev->id;
1da177e4
LT
428
429 release_sock(sk);
430 return 0;
431}
432
433static inline void hci_sock_cmsg(struct sock *sk, struct msghdr *msg, struct sk_buff *skb)
434{
435 __u32 mask = hci_pi(sk)->cmsg_mask;
436
0d48d939
MH
437 if (mask & HCI_CMSG_DIR) {
438 int incoming = bt_cb(skb)->incoming;
439 put_cmsg(msg, SOL_HCI, HCI_CMSG_DIR, sizeof(incoming), &incoming);
440 }
1da177e4 441
a61bbcf2 442 if (mask & HCI_CMSG_TSTAMP) {
f6e623a6
JFS
443#ifdef CONFIG_COMPAT
444 struct compat_timeval ctv;
445#endif
a61bbcf2 446 struct timeval tv;
767c5eb5
MH
447 void *data;
448 int len;
a61bbcf2
PM
449
450 skb_get_timestamp(skb, &tv);
767c5eb5 451
1da97f83
DM
452 data = &tv;
453 len = sizeof(tv);
454#ifdef CONFIG_COMPAT
767c5eb5 455 if (msg->msg_flags & MSG_CMSG_COMPAT) {
767c5eb5
MH
456 ctv.tv_sec = tv.tv_sec;
457 ctv.tv_usec = tv.tv_usec;
458 data = &ctv;
459 len = sizeof(ctv);
767c5eb5 460 }
1da97f83 461#endif
767c5eb5
MH
462
463 put_cmsg(msg, SOL_HCI, HCI_CMSG_TSTAMP, len, data);
a61bbcf2 464 }
1da177e4 465}
8e87d142
YH
466
467static int hci_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
468 struct msghdr *msg, size_t len, int flags)
469{
470 int noblock = flags & MSG_DONTWAIT;
471 struct sock *sk = sock->sk;
472 struct sk_buff *skb;
473 int copied, err;
474
475 BT_DBG("sock %p, sk %p", sock, sk);
476
477 if (flags & (MSG_OOB))
478 return -EOPNOTSUPP;
479
480 if (sk->sk_state == BT_CLOSED)
481 return 0;
482
70f23020
AE
483 skb = skb_recv_datagram(sk, flags, noblock, &err);
484 if (!skb)
1da177e4
LT
485 return err;
486
487 msg->msg_namelen = 0;
488
489 copied = skb->len;
490 if (len < copied) {
491 msg->msg_flags |= MSG_TRUNC;
492 copied = len;
493 }
494
badff6d0 495 skb_reset_transport_header(skb);
1da177e4
LT
496 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
497
498 hci_sock_cmsg(sk, msg, skb);
499
500 skb_free_datagram(sk, skb);
501
502 return err ? : copied;
503}
504
8e87d142 505static int hci_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
506 struct msghdr *msg, size_t len)
507{
508 struct sock *sk = sock->sk;
509 struct hci_dev *hdev;
510 struct sk_buff *skb;
511 int err;
512
513 BT_DBG("sock %p sk %p", sock, sk);
514
515 if (msg->msg_flags & MSG_OOB)
516 return -EOPNOTSUPP;
517
518 if (msg->msg_flags & ~(MSG_DONTWAIT|MSG_NOSIGNAL|MSG_ERRQUEUE))
519 return -EINVAL;
520
521 if (len < 4 || len > HCI_MAX_FRAME_SIZE)
522 return -EINVAL;
523
524 lock_sock(sk);
525
0381101f
JH
526 switch (hci_pi(sk)->channel) {
527 case HCI_CHANNEL_RAW:
528 break;
529 case HCI_CHANNEL_CONTROL:
530 err = mgmt_control(sk, msg, len);
531 goto done;
532 default:
533 err = -EINVAL;
534 goto done;
535 }
536
70f23020
AE
537 hdev = hci_pi(sk)->hdev;
538 if (!hdev) {
1da177e4
LT
539 err = -EBADFD;
540 goto done;
541 }
542
7e21addc
MH
543 if (!test_bit(HCI_UP, &hdev->flags)) {
544 err = -ENETDOWN;
545 goto done;
546 }
547
70f23020
AE
548 skb = bt_skb_send_alloc(sk, len, msg->msg_flags & MSG_DONTWAIT, &err);
549 if (!skb)
1da177e4
LT
550 goto done;
551
552 if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) {
553 err = -EFAULT;
554 goto drop;
555 }
556
0d48d939 557 bt_cb(skb)->pkt_type = *((unsigned char *) skb->data);
1da177e4
LT
558 skb_pull(skb, 1);
559 skb->dev = (void *) hdev;
560
0d48d939 561 if (bt_cb(skb)->pkt_type == HCI_COMMAND_PKT) {
83985319 562 u16 opcode = get_unaligned_le16(skb->data);
1da177e4
LT
563 u16 ogf = hci_opcode_ogf(opcode);
564 u16 ocf = hci_opcode_ocf(opcode);
565
566 if (((ogf > HCI_SFLT_MAX_OGF) ||
567 !hci_test_bit(ocf & HCI_FLT_OCF_BITS, &hci_sec_filter.ocf_mask[ogf])) &&
568 !capable(CAP_NET_RAW)) {
569 err = -EPERM;
570 goto drop;
571 }
572
a9de9248 573 if (test_bit(HCI_RAW, &hdev->flags) || (ogf == 0x3f)) {
1da177e4 574 skb_queue_tail(&hdev->raw_q, skb);
c78ae283 575 tasklet_schedule(&hdev->tx_task);
1da177e4
LT
576 } else {
577 skb_queue_tail(&hdev->cmd_q, skb);
c78ae283 578 tasklet_schedule(&hdev->cmd_task);
1da177e4
LT
579 }
580 } else {
581 if (!capable(CAP_NET_RAW)) {
582 err = -EPERM;
583 goto drop;
584 }
585
586 skb_queue_tail(&hdev->raw_q, skb);
c78ae283 587 tasklet_schedule(&hdev->tx_task);
1da177e4
LT
588 }
589
590 err = len;
591
592done:
593 release_sock(sk);
594 return err;
595
596drop:
597 kfree_skb(skb);
598 goto done;
599}
600
b7058842 601static int hci_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int len)
1da177e4
LT
602{
603 struct hci_ufilter uf = { .opcode = 0 };
604 struct sock *sk = sock->sk;
605 int err = 0, opt = 0;
606
607 BT_DBG("sk %p, opt %d", sk, optname);
608
609 lock_sock(sk);
610
611 switch (optname) {
612 case HCI_DATA_DIR:
613 if (get_user(opt, (int __user *)optval)) {
614 err = -EFAULT;
615 break;
616 }
617
618 if (opt)
619 hci_pi(sk)->cmsg_mask |= HCI_CMSG_DIR;
620 else
621 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_DIR;
622 break;
623
624 case HCI_TIME_STAMP:
625 if (get_user(opt, (int __user *)optval)) {
626 err = -EFAULT;
627 break;
628 }
629
630 if (opt)
631 hci_pi(sk)->cmsg_mask |= HCI_CMSG_TSTAMP;
632 else
633 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_TSTAMP;
634 break;
635
636 case HCI_FILTER:
0878b666
MH
637 {
638 struct hci_filter *f = &hci_pi(sk)->filter;
639
640 uf.type_mask = f->type_mask;
641 uf.opcode = f->opcode;
642 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
643 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
644 }
645
1da177e4
LT
646 len = min_t(unsigned int, len, sizeof(uf));
647 if (copy_from_user(&uf, optval, len)) {
648 err = -EFAULT;
649 break;
650 }
651
652 if (!capable(CAP_NET_RAW)) {
653 uf.type_mask &= hci_sec_filter.type_mask;
654 uf.event_mask[0] &= *((u32 *) hci_sec_filter.event_mask + 0);
655 uf.event_mask[1] &= *((u32 *) hci_sec_filter.event_mask + 1);
656 }
657
658 {
659 struct hci_filter *f = &hci_pi(sk)->filter;
660
661 f->type_mask = uf.type_mask;
662 f->opcode = uf.opcode;
663 *((u32 *) f->event_mask + 0) = uf.event_mask[0];
664 *((u32 *) f->event_mask + 1) = uf.event_mask[1];
665 }
8e87d142 666 break;
1da177e4
LT
667
668 default:
669 err = -ENOPROTOOPT;
670 break;
671 }
672
673 release_sock(sk);
674 return err;
675}
676
677static int hci_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
678{
679 struct hci_ufilter uf;
680 struct sock *sk = sock->sk;
8e87d142 681 int len, opt;
1da177e4
LT
682
683 if (get_user(len, optlen))
684 return -EFAULT;
685
686 switch (optname) {
687 case HCI_DATA_DIR:
688 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_DIR)
689 opt = 1;
8e87d142 690 else
1da177e4
LT
691 opt = 0;
692
693 if (put_user(opt, optval))
694 return -EFAULT;
695 break;
696
697 case HCI_TIME_STAMP:
698 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_TSTAMP)
699 opt = 1;
8e87d142 700 else
1da177e4
LT
701 opt = 0;
702
703 if (put_user(opt, optval))
704 return -EFAULT;
705 break;
706
707 case HCI_FILTER:
708 {
709 struct hci_filter *f = &hci_pi(sk)->filter;
710
711 uf.type_mask = f->type_mask;
712 uf.opcode = f->opcode;
713 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
714 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
715 }
716
717 len = min_t(unsigned int, len, sizeof(uf));
718 if (copy_to_user(optval, &uf, len))
719 return -EFAULT;
720 break;
721
722 default:
723 return -ENOPROTOOPT;
724 break;
725 }
726
727 return 0;
728}
729
90ddc4f0 730static const struct proto_ops hci_sock_ops = {
1da177e4
LT
731 .family = PF_BLUETOOTH,
732 .owner = THIS_MODULE,
733 .release = hci_sock_release,
734 .bind = hci_sock_bind,
735 .getname = hci_sock_getname,
736 .sendmsg = hci_sock_sendmsg,
737 .recvmsg = hci_sock_recvmsg,
738 .ioctl = hci_sock_ioctl,
739 .poll = datagram_poll,
740 .listen = sock_no_listen,
741 .shutdown = sock_no_shutdown,
742 .setsockopt = hci_sock_setsockopt,
743 .getsockopt = hci_sock_getsockopt,
744 .connect = sock_no_connect,
745 .socketpair = sock_no_socketpair,
746 .accept = sock_no_accept,
747 .mmap = sock_no_mmap
748};
749
750static struct proto hci_sk_proto = {
751 .name = "HCI",
752 .owner = THIS_MODULE,
753 .obj_size = sizeof(struct hci_pinfo)
754};
755
3f378b68
EP
756static int hci_sock_create(struct net *net, struct socket *sock, int protocol,
757 int kern)
1da177e4
LT
758{
759 struct sock *sk;
760
761 BT_DBG("sock %p", sock);
762
763 if (sock->type != SOCK_RAW)
764 return -ESOCKTNOSUPPORT;
765
766 sock->ops = &hci_sock_ops;
767
6257ff21 768 sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hci_sk_proto);
1da177e4
LT
769 if (!sk)
770 return -ENOMEM;
771
772 sock_init_data(sock, sk);
773
774 sock_reset_flag(sk, SOCK_ZAPPED);
775
776 sk->sk_protocol = protocol;
777
778 sock->state = SS_UNCONNECTED;
779 sk->sk_state = BT_OPEN;
780
781 bt_sock_link(&hci_sk_list, sk);
782 return 0;
783}
784
785static int hci_sock_dev_event(struct notifier_block *this, unsigned long event, void *ptr)
786{
787 struct hci_dev *hdev = (struct hci_dev *) ptr;
788 struct hci_ev_si_device ev;
789
790 BT_DBG("hdev %s event %ld", hdev->name, event);
791
792 /* Send event to sockets */
793 ev.event = event;
794 ev.dev_id = hdev->id;
795 hci_si_event(NULL, HCI_EV_SI_DEVICE, sizeof(ev), &ev);
796
797 if (event == HCI_DEV_UNREG) {
798 struct sock *sk;
799 struct hlist_node *node;
800
801 /* Detach sockets from device */
802 read_lock(&hci_sk_list.lock);
803 sk_for_each(sk, node, &hci_sk_list.head) {
4ce61d1c
SS
804 local_bh_disable();
805 bh_lock_sock_nested(sk);
1da177e4
LT
806 if (hci_pi(sk)->hdev == hdev) {
807 hci_pi(sk)->hdev = NULL;
808 sk->sk_err = EPIPE;
809 sk->sk_state = BT_OPEN;
810 sk->sk_state_change(sk);
811
812 hci_dev_put(hdev);
813 }
4ce61d1c
SS
814 bh_unlock_sock(sk);
815 local_bh_enable();
1da177e4
LT
816 }
817 read_unlock(&hci_sk_list.lock);
818 }
819
820 return NOTIFY_DONE;
821}
822
ec1b4cf7 823static const struct net_proto_family hci_sock_family_ops = {
1da177e4
LT
824 .family = PF_BLUETOOTH,
825 .owner = THIS_MODULE,
826 .create = hci_sock_create,
827};
828
829static struct notifier_block hci_sock_nblock = {
830 .notifier_call = hci_sock_dev_event
831};
832
833int __init hci_sock_init(void)
834{
835 int err;
836
837 err = proto_register(&hci_sk_proto, 0);
838 if (err < 0)
839 return err;
840
841 err = bt_sock_register(BTPROTO_HCI, &hci_sock_family_ops);
842 if (err < 0)
843 goto error;
844
845 hci_register_notifier(&hci_sock_nblock);
846
847 BT_INFO("HCI socket layer initialized");
848
849 return 0;
850
851error:
852 BT_ERR("HCI socket registration failed");
853 proto_unregister(&hci_sk_proto);
854 return err;
855}
856
04005dd9 857void __exit hci_sock_cleanup(void)
1da177e4
LT
858{
859 if (bt_sock_unregister(BTPROTO_HCI) < 0)
860 BT_ERR("HCI socket unregistration failed");
861
862 hci_unregister_notifier(&hci_sock_nblock);
863
864 proto_unregister(&hci_sk_proto);
1da177e4 865}
0381101f
JH
866
867module_param(enable_mgmt, bool, 0644);
868MODULE_PARM_DESC(enable_mgmt, "Enable Management interface");
This page took 0.565478 seconds and 5 git commands to generate.