Bluetooth: Introduce unconfigured controller state
[deliverable/linux.git] / net / bluetooth / hci_sock.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI sockets. */
26
8c520a59 27#include <linux/export.h>
1da177e4
LT
28#include <asm/unaligned.h>
29
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
cd82e61c 32#include <net/bluetooth/hci_mon.h>
1da177e4 33
cd82e61c
MH
34static atomic_t monitor_promisc = ATOMIC_INIT(0);
35
1da177e4
LT
36/* ----- HCI socket interface ----- */
37
38static inline int hci_test_bit(int nr, void *addr)
39{
40 return *((__u32 *) addr + (nr >> 5)) & ((__u32) 1 << (nr & 31));
41}
42
43/* Security filter */
44static struct hci_sec_filter hci_sec_filter = {
45 /* Packet types */
46 0x10,
47 /* Events */
dd7f5527 48 { 0x1000d9fe, 0x0000b00c },
1da177e4
LT
49 /* Commands */
50 {
51 { 0x0 },
52 /* OGF_LINK_CTL */
7c631a67 53 { 0xbe000006, 0x00000001, 0x00000000, 0x00 },
1da177e4 54 /* OGF_LINK_POLICY */
7c631a67 55 { 0x00005200, 0x00000000, 0x00000000, 0x00 },
1da177e4 56 /* OGF_HOST_CTL */
7c631a67 57 { 0xaab00200, 0x2b402aaa, 0x05220154, 0x00 },
1da177e4 58 /* OGF_INFO_PARAM */
7c631a67 59 { 0x000002be, 0x00000000, 0x00000000, 0x00 },
1da177e4 60 /* OGF_STATUS_PARAM */
7c631a67 61 { 0x000000ea, 0x00000000, 0x00000000, 0x00 }
1da177e4
LT
62 }
63};
64
65static struct bt_sock_list hci_sk_list = {
d5fb2962 66 .lock = __RW_LOCK_UNLOCKED(hci_sk_list.lock)
1da177e4
LT
67};
68
f81fe64f
MH
69static bool is_filtered_packet(struct sock *sk, struct sk_buff *skb)
70{
71 struct hci_filter *flt;
72 int flt_type, flt_event;
73
74 /* Apply filter */
75 flt = &hci_pi(sk)->filter;
76
77 if (bt_cb(skb)->pkt_type == HCI_VENDOR_PKT)
78 flt_type = 0;
79 else
80 flt_type = bt_cb(skb)->pkt_type & HCI_FLT_TYPE_BITS;
81
82 if (!test_bit(flt_type, &flt->type_mask))
83 return true;
84
85 /* Extra filter for event packets only */
86 if (bt_cb(skb)->pkt_type != HCI_EVENT_PKT)
87 return false;
88
89 flt_event = (*(__u8 *)skb->data & HCI_FLT_EVENT_BITS);
90
91 if (!hci_test_bit(flt_event, &flt->event_mask))
92 return true;
93
94 /* Check filter only when opcode is set */
95 if (!flt->opcode)
96 return false;
97
98 if (flt_event == HCI_EV_CMD_COMPLETE &&
99 flt->opcode != get_unaligned((__le16 *)(skb->data + 3)))
100 return true;
101
102 if (flt_event == HCI_EV_CMD_STATUS &&
103 flt->opcode != get_unaligned((__le16 *)(skb->data + 4)))
104 return true;
105
106 return false;
107}
108
1da177e4 109/* Send frame to RAW socket */
470fe1b5 110void hci_send_to_sock(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4
LT
111{
112 struct sock *sk;
e0edf373 113 struct sk_buff *skb_copy = NULL;
1da177e4
LT
114
115 BT_DBG("hdev %p len %d", hdev, skb->len);
116
117 read_lock(&hci_sk_list.lock);
470fe1b5 118
b67bfe0d 119 sk_for_each(sk, &hci_sk_list.head) {
1da177e4
LT
120 struct sk_buff *nskb;
121
122 if (sk->sk_state != BT_BOUND || hci_pi(sk)->hdev != hdev)
123 continue;
124
125 /* Don't send frame to the socket it came from */
126 if (skb->sk == sk)
127 continue;
128
23500189
MH
129 if (hci_pi(sk)->channel == HCI_CHANNEL_RAW) {
130 if (is_filtered_packet(sk, skb))
131 continue;
132 } else if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
133 if (!bt_cb(skb)->incoming)
134 continue;
135 if (bt_cb(skb)->pkt_type != HCI_EVENT_PKT &&
136 bt_cb(skb)->pkt_type != HCI_ACLDATA_PKT &&
137 bt_cb(skb)->pkt_type != HCI_SCODATA_PKT)
138 continue;
139 } else {
140 /* Don't send frame to other channel types */
1da177e4 141 continue;
23500189 142 }
1da177e4 143
e0edf373
MH
144 if (!skb_copy) {
145 /* Create a private copy with headroom */
bad93e9d 146 skb_copy = __pskb_copy_fclone(skb, 1, GFP_ATOMIC, true);
e0edf373
MH
147 if (!skb_copy)
148 continue;
149
150 /* Put type byte before the data */
151 memcpy(skb_push(skb_copy, 1), &bt_cb(skb)->pkt_type, 1);
152 }
153
154 nskb = skb_clone(skb_copy, GFP_ATOMIC);
70f23020 155 if (!nskb)
1da177e4
LT
156 continue;
157
470fe1b5
MH
158 if (sock_queue_rcv_skb(sk, nskb))
159 kfree_skb(nskb);
160 }
161
162 read_unlock(&hci_sk_list.lock);
e0edf373
MH
163
164 kfree_skb(skb_copy);
470fe1b5
MH
165}
166
167/* Send frame to control socket */
168void hci_send_to_control(struct sk_buff *skb, struct sock *skip_sk)
169{
170 struct sock *sk;
470fe1b5
MH
171
172 BT_DBG("len %d", skb->len);
173
174 read_lock(&hci_sk_list.lock);
175
b67bfe0d 176 sk_for_each(sk, &hci_sk_list.head) {
470fe1b5
MH
177 struct sk_buff *nskb;
178
179 /* Skip the original socket */
180 if (sk == skip_sk)
181 continue;
182
183 if (sk->sk_state != BT_BOUND)
184 continue;
185
186 if (hci_pi(sk)->channel != HCI_CHANNEL_CONTROL)
187 continue;
188
189 nskb = skb_clone(skb, GFP_ATOMIC);
190 if (!nskb)
191 continue;
1da177e4
LT
192
193 if (sock_queue_rcv_skb(sk, nskb))
194 kfree_skb(nskb);
195 }
470fe1b5 196
1da177e4
LT
197 read_unlock(&hci_sk_list.lock);
198}
199
cd82e61c
MH
200/* Send frame to monitor socket */
201void hci_send_to_monitor(struct hci_dev *hdev, struct sk_buff *skb)
202{
203 struct sock *sk;
cd82e61c
MH
204 struct sk_buff *skb_copy = NULL;
205 __le16 opcode;
206
207 if (!atomic_read(&monitor_promisc))
208 return;
209
210 BT_DBG("hdev %p len %d", hdev, skb->len);
211
212 switch (bt_cb(skb)->pkt_type) {
213 case HCI_COMMAND_PKT:
dcf4adbf 214 opcode = cpu_to_le16(HCI_MON_COMMAND_PKT);
cd82e61c
MH
215 break;
216 case HCI_EVENT_PKT:
dcf4adbf 217 opcode = cpu_to_le16(HCI_MON_EVENT_PKT);
cd82e61c
MH
218 break;
219 case HCI_ACLDATA_PKT:
220 if (bt_cb(skb)->incoming)
dcf4adbf 221 opcode = cpu_to_le16(HCI_MON_ACL_RX_PKT);
cd82e61c 222 else
dcf4adbf 223 opcode = cpu_to_le16(HCI_MON_ACL_TX_PKT);
cd82e61c
MH
224 break;
225 case HCI_SCODATA_PKT:
226 if (bt_cb(skb)->incoming)
dcf4adbf 227 opcode = cpu_to_le16(HCI_MON_SCO_RX_PKT);
cd82e61c 228 else
dcf4adbf 229 opcode = cpu_to_le16(HCI_MON_SCO_TX_PKT);
cd82e61c
MH
230 break;
231 default:
232 return;
233 }
234
235 read_lock(&hci_sk_list.lock);
236
b67bfe0d 237 sk_for_each(sk, &hci_sk_list.head) {
cd82e61c
MH
238 struct sk_buff *nskb;
239
240 if (sk->sk_state != BT_BOUND)
241 continue;
242
243 if (hci_pi(sk)->channel != HCI_CHANNEL_MONITOR)
244 continue;
245
246 if (!skb_copy) {
247 struct hci_mon_hdr *hdr;
248
249 /* Create a private copy with headroom */
bad93e9d
OP
250 skb_copy = __pskb_copy_fclone(skb, HCI_MON_HDR_SIZE,
251 GFP_ATOMIC, true);
cd82e61c
MH
252 if (!skb_copy)
253 continue;
254
255 /* Put header before the data */
256 hdr = (void *) skb_push(skb_copy, HCI_MON_HDR_SIZE);
257 hdr->opcode = opcode;
258 hdr->index = cpu_to_le16(hdev->id);
259 hdr->len = cpu_to_le16(skb->len);
260 }
261
262 nskb = skb_clone(skb_copy, GFP_ATOMIC);
263 if (!nskb)
264 continue;
265
266 if (sock_queue_rcv_skb(sk, nskb))
267 kfree_skb(nskb);
268 }
269
270 read_unlock(&hci_sk_list.lock);
271
272 kfree_skb(skb_copy);
273}
274
275static void send_monitor_event(struct sk_buff *skb)
276{
277 struct sock *sk;
cd82e61c
MH
278
279 BT_DBG("len %d", skb->len);
280
281 read_lock(&hci_sk_list.lock);
282
b67bfe0d 283 sk_for_each(sk, &hci_sk_list.head) {
cd82e61c
MH
284 struct sk_buff *nskb;
285
286 if (sk->sk_state != BT_BOUND)
287 continue;
288
289 if (hci_pi(sk)->channel != HCI_CHANNEL_MONITOR)
290 continue;
291
292 nskb = skb_clone(skb, GFP_ATOMIC);
293 if (!nskb)
294 continue;
295
296 if (sock_queue_rcv_skb(sk, nskb))
297 kfree_skb(nskb);
298 }
299
300 read_unlock(&hci_sk_list.lock);
301}
302
303static struct sk_buff *create_monitor_event(struct hci_dev *hdev, int event)
304{
305 struct hci_mon_hdr *hdr;
306 struct hci_mon_new_index *ni;
307 struct sk_buff *skb;
308 __le16 opcode;
309
310 switch (event) {
311 case HCI_DEV_REG:
312 skb = bt_skb_alloc(HCI_MON_NEW_INDEX_SIZE, GFP_ATOMIC);
313 if (!skb)
314 return NULL;
315
316 ni = (void *) skb_put(skb, HCI_MON_NEW_INDEX_SIZE);
317 ni->type = hdev->dev_type;
318 ni->bus = hdev->bus;
319 bacpy(&ni->bdaddr, &hdev->bdaddr);
320 memcpy(ni->name, hdev->name, 8);
321
dcf4adbf 322 opcode = cpu_to_le16(HCI_MON_NEW_INDEX);
cd82e61c
MH
323 break;
324
325 case HCI_DEV_UNREG:
326 skb = bt_skb_alloc(0, GFP_ATOMIC);
327 if (!skb)
328 return NULL;
329
dcf4adbf 330 opcode = cpu_to_le16(HCI_MON_DEL_INDEX);
cd82e61c
MH
331 break;
332
333 default:
334 return NULL;
335 }
336
337 __net_timestamp(skb);
338
339 hdr = (void *) skb_push(skb, HCI_MON_HDR_SIZE);
340 hdr->opcode = opcode;
341 hdr->index = cpu_to_le16(hdev->id);
342 hdr->len = cpu_to_le16(skb->len - HCI_MON_HDR_SIZE);
343
344 return skb;
345}
346
347static void send_monitor_replay(struct sock *sk)
348{
349 struct hci_dev *hdev;
350
351 read_lock(&hci_dev_list_lock);
352
353 list_for_each_entry(hdev, &hci_dev_list, list) {
354 struct sk_buff *skb;
355
356 skb = create_monitor_event(hdev, HCI_DEV_REG);
357 if (!skb)
358 continue;
359
360 if (sock_queue_rcv_skb(sk, skb))
361 kfree_skb(skb);
362 }
363
364 read_unlock(&hci_dev_list_lock);
365}
366
040030ef
MH
367/* Generate internal stack event */
368static void hci_si_event(struct hci_dev *hdev, int type, int dlen, void *data)
369{
370 struct hci_event_hdr *hdr;
371 struct hci_ev_stack_internal *ev;
372 struct sk_buff *skb;
373
374 skb = bt_skb_alloc(HCI_EVENT_HDR_SIZE + sizeof(*ev) + dlen, GFP_ATOMIC);
375 if (!skb)
376 return;
377
378 hdr = (void *) skb_put(skb, HCI_EVENT_HDR_SIZE);
379 hdr->evt = HCI_EV_STACK_INTERNAL;
380 hdr->plen = sizeof(*ev) + dlen;
381
382 ev = (void *) skb_put(skb, sizeof(*ev) + dlen);
383 ev->type = type;
384 memcpy(ev->data, data, dlen);
385
386 bt_cb(skb)->incoming = 1;
387 __net_timestamp(skb);
388
389 bt_cb(skb)->pkt_type = HCI_EVENT_PKT;
040030ef
MH
390 hci_send_to_sock(hdev, skb);
391 kfree_skb(skb);
392}
393
394void hci_sock_dev_event(struct hci_dev *hdev, int event)
395{
396 struct hci_ev_si_device ev;
397
398 BT_DBG("hdev %s event %d", hdev->name, event);
399
cd82e61c
MH
400 /* Send event to monitor */
401 if (atomic_read(&monitor_promisc)) {
402 struct sk_buff *skb;
403
404 skb = create_monitor_event(hdev, event);
405 if (skb) {
406 send_monitor_event(skb);
407 kfree_skb(skb);
408 }
409 }
410
040030ef
MH
411 /* Send event to sockets */
412 ev.event = event;
413 ev.dev_id = hdev->id;
414 hci_si_event(NULL, HCI_EV_SI_DEVICE, sizeof(ev), &ev);
415
416 if (event == HCI_DEV_UNREG) {
417 struct sock *sk;
040030ef
MH
418
419 /* Detach sockets from device */
420 read_lock(&hci_sk_list.lock);
b67bfe0d 421 sk_for_each(sk, &hci_sk_list.head) {
040030ef
MH
422 bh_lock_sock_nested(sk);
423 if (hci_pi(sk)->hdev == hdev) {
424 hci_pi(sk)->hdev = NULL;
425 sk->sk_err = EPIPE;
426 sk->sk_state = BT_OPEN;
427 sk->sk_state_change(sk);
428
429 hci_dev_put(hdev);
430 }
431 bh_unlock_sock(sk);
432 }
433 read_unlock(&hci_sk_list.lock);
434 }
435}
436
1da177e4
LT
437static int hci_sock_release(struct socket *sock)
438{
439 struct sock *sk = sock->sk;
7b005bd3 440 struct hci_dev *hdev;
1da177e4
LT
441
442 BT_DBG("sock %p sk %p", sock, sk);
443
444 if (!sk)
445 return 0;
446
7b005bd3
MH
447 hdev = hci_pi(sk)->hdev;
448
cd82e61c
MH
449 if (hci_pi(sk)->channel == HCI_CHANNEL_MONITOR)
450 atomic_dec(&monitor_promisc);
451
1da177e4
LT
452 bt_sock_unlink(&hci_sk_list, sk);
453
454 if (hdev) {
23500189 455 if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
4a964404 456 if (!test_bit(HCI_UNCONFIGURED, &hdev->dev_flags))
fee746b0 457 mgmt_index_added(hdev);
23500189
MH
458 clear_bit(HCI_USER_CHANNEL, &hdev->dev_flags);
459 hci_dev_close(hdev->id);
460 }
461
1da177e4
LT
462 atomic_dec(&hdev->promisc);
463 hci_dev_put(hdev);
464 }
465
466 sock_orphan(sk);
467
468 skb_queue_purge(&sk->sk_receive_queue);
469 skb_queue_purge(&sk->sk_write_queue);
470
471 sock_put(sk);
472 return 0;
473}
474
b2a66aad 475static int hci_sock_blacklist_add(struct hci_dev *hdev, void __user *arg)
f0358568
JH
476{
477 bdaddr_t bdaddr;
5e762444 478 int err;
f0358568
JH
479
480 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
481 return -EFAULT;
482
09fd0de5 483 hci_dev_lock(hdev);
5e762444 484
e71f41bc 485 err = hci_blacklist_add(hdev, &bdaddr, BDADDR_BREDR);
5e762444 486
09fd0de5 487 hci_dev_unlock(hdev);
5e762444
AJ
488
489 return err;
f0358568
JH
490}
491
b2a66aad 492static int hci_sock_blacklist_del(struct hci_dev *hdev, void __user *arg)
f0358568
JH
493{
494 bdaddr_t bdaddr;
5e762444 495 int err;
f0358568
JH
496
497 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
498 return -EFAULT;
499
09fd0de5 500 hci_dev_lock(hdev);
5e762444 501
e71f41bc 502 err = hci_blacklist_del(hdev, &bdaddr, BDADDR_BREDR);
5e762444 503
09fd0de5 504 hci_dev_unlock(hdev);
5e762444
AJ
505
506 return err;
f0358568
JH
507}
508
8e87d142 509/* Ioctls that require bound socket */
6039aa73
GP
510static int hci_sock_bound_ioctl(struct sock *sk, unsigned int cmd,
511 unsigned long arg)
1da177e4
LT
512{
513 struct hci_dev *hdev = hci_pi(sk)->hdev;
514
515 if (!hdev)
516 return -EBADFD;
517
0736cfa8
MH
518 if (test_bit(HCI_USER_CHANNEL, &hdev->dev_flags))
519 return -EBUSY;
520
4a964404 521 if (test_bit(HCI_UNCONFIGURED, &hdev->dev_flags))
fee746b0
MH
522 return -EOPNOTSUPP;
523
5b69bef5
MH
524 if (hdev->dev_type != HCI_BREDR)
525 return -EOPNOTSUPP;
526
1da177e4
LT
527 switch (cmd) {
528 case HCISETRAW:
529 if (!capable(CAP_NET_ADMIN))
bf5b30b8 530 return -EPERM;
db596681 531 return -EOPNOTSUPP;
1da177e4 532
1da177e4 533 case HCIGETCONNINFO:
40be492f
MH
534 return hci_get_conn_info(hdev, (void __user *) arg);
535
536 case HCIGETAUTHINFO:
537 return hci_get_auth_info(hdev, (void __user *) arg);
1da177e4 538
f0358568
JH
539 case HCIBLOCKADDR:
540 if (!capable(CAP_NET_ADMIN))
bf5b30b8 541 return -EPERM;
b2a66aad 542 return hci_sock_blacklist_add(hdev, (void __user *) arg);
f0358568
JH
543
544 case HCIUNBLOCKADDR:
545 if (!capable(CAP_NET_ADMIN))
bf5b30b8 546 return -EPERM;
b2a66aad 547 return hci_sock_blacklist_del(hdev, (void __user *) arg);
1da177e4 548 }
0736cfa8 549
324d36ed 550 return -ENOIOCTLCMD;
1da177e4
LT
551}
552
8fc9ced3
GP
553static int hci_sock_ioctl(struct socket *sock, unsigned int cmd,
554 unsigned long arg)
1da177e4 555{
40be492f 556 void __user *argp = (void __user *) arg;
0736cfa8 557 struct sock *sk = sock->sk;
1da177e4
LT
558 int err;
559
560 BT_DBG("cmd %x arg %lx", cmd, arg);
561
c1c4f956
MH
562 lock_sock(sk);
563
564 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
565 err = -EBADFD;
566 goto done;
567 }
568
569 release_sock(sk);
570
1da177e4
LT
571 switch (cmd) {
572 case HCIGETDEVLIST:
573 return hci_get_dev_list(argp);
574
575 case HCIGETDEVINFO:
576 return hci_get_dev_info(argp);
577
578 case HCIGETCONNLIST:
579 return hci_get_conn_list(argp);
580
581 case HCIDEVUP:
582 if (!capable(CAP_NET_ADMIN))
bf5b30b8 583 return -EPERM;
1da177e4
LT
584 return hci_dev_open(arg);
585
586 case HCIDEVDOWN:
587 if (!capable(CAP_NET_ADMIN))
bf5b30b8 588 return -EPERM;
1da177e4
LT
589 return hci_dev_close(arg);
590
591 case HCIDEVRESET:
592 if (!capable(CAP_NET_ADMIN))
bf5b30b8 593 return -EPERM;
1da177e4
LT
594 return hci_dev_reset(arg);
595
596 case HCIDEVRESTAT:
597 if (!capable(CAP_NET_ADMIN))
bf5b30b8 598 return -EPERM;
1da177e4
LT
599 return hci_dev_reset_stat(arg);
600
601 case HCISETSCAN:
602 case HCISETAUTH:
603 case HCISETENCRYPT:
604 case HCISETPTYPE:
605 case HCISETLINKPOL:
606 case HCISETLINKMODE:
607 case HCISETACLMTU:
608 case HCISETSCOMTU:
609 if (!capable(CAP_NET_ADMIN))
bf5b30b8 610 return -EPERM;
1da177e4
LT
611 return hci_dev_cmd(cmd, argp);
612
613 case HCIINQUIRY:
614 return hci_inquiry(argp);
1da177e4 615 }
c1c4f956
MH
616
617 lock_sock(sk);
618
619 err = hci_sock_bound_ioctl(sk, cmd, arg);
620
621done:
622 release_sock(sk);
623 return err;
1da177e4
LT
624}
625
8fc9ced3
GP
626static int hci_sock_bind(struct socket *sock, struct sockaddr *addr,
627 int addr_len)
1da177e4 628{
0381101f 629 struct sockaddr_hci haddr;
1da177e4
LT
630 struct sock *sk = sock->sk;
631 struct hci_dev *hdev = NULL;
0381101f 632 int len, err = 0;
1da177e4
LT
633
634 BT_DBG("sock %p sk %p", sock, sk);
635
0381101f
JH
636 if (!addr)
637 return -EINVAL;
638
639 memset(&haddr, 0, sizeof(haddr));
640 len = min_t(unsigned int, sizeof(haddr), addr_len);
641 memcpy(&haddr, addr, len);
642
643 if (haddr.hci_family != AF_BLUETOOTH)
644 return -EINVAL;
645
1da177e4
LT
646 lock_sock(sk);
647
7cc2ade2 648 if (sk->sk_state == BT_BOUND) {
1da177e4
LT
649 err = -EALREADY;
650 goto done;
651 }
652
7cc2ade2
MH
653 switch (haddr.hci_channel) {
654 case HCI_CHANNEL_RAW:
655 if (hci_pi(sk)->hdev) {
656 err = -EALREADY;
1da177e4
LT
657 goto done;
658 }
659
7cc2ade2
MH
660 if (haddr.hci_dev != HCI_DEV_NONE) {
661 hdev = hci_dev_get(haddr.hci_dev);
662 if (!hdev) {
663 err = -ENODEV;
664 goto done;
665 }
666
667 atomic_inc(&hdev->promisc);
668 }
669
670 hci_pi(sk)->hdev = hdev;
671 break;
672
23500189
MH
673 case HCI_CHANNEL_USER:
674 if (hci_pi(sk)->hdev) {
675 err = -EALREADY;
676 goto done;
677 }
678
679 if (haddr.hci_dev == HCI_DEV_NONE) {
680 err = -EINVAL;
681 goto done;
682 }
683
10a8b86f 684 if (!capable(CAP_NET_ADMIN)) {
23500189
MH
685 err = -EPERM;
686 goto done;
687 }
688
689 hdev = hci_dev_get(haddr.hci_dev);
690 if (!hdev) {
691 err = -ENODEV;
692 goto done;
693 }
694
695 if (test_bit(HCI_UP, &hdev->flags) ||
696 test_bit(HCI_INIT, &hdev->flags) ||
697 test_bit(HCI_SETUP, &hdev->dev_flags)) {
698 err = -EBUSY;
699 hci_dev_put(hdev);
700 goto done;
701 }
702
703 if (test_and_set_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
704 err = -EUSERS;
705 hci_dev_put(hdev);
706 goto done;
707 }
708
4a964404 709 if (!test_bit(HCI_UNCONFIGURED, &hdev->dev_flags))
fee746b0 710 mgmt_index_removed(hdev);
23500189
MH
711
712 err = hci_dev_open(hdev->id);
713 if (err) {
714 clear_bit(HCI_USER_CHANNEL, &hdev->dev_flags);
4a964404 715 if (!test_bit(HCI_UNCONFIGURED, &hdev->dev_flags))
fee746b0 716 mgmt_index_added(hdev);
23500189
MH
717 hci_dev_put(hdev);
718 goto done;
719 }
720
721 atomic_inc(&hdev->promisc);
722
723 hci_pi(sk)->hdev = hdev;
724 break;
725
7cc2ade2 726 case HCI_CHANNEL_CONTROL:
4b95a24c 727 if (haddr.hci_dev != HCI_DEV_NONE) {
7cc2ade2
MH
728 err = -EINVAL;
729 goto done;
730 }
731
801f13bd
MH
732 if (!capable(CAP_NET_ADMIN)) {
733 err = -EPERM;
734 goto done;
735 }
736
7cc2ade2
MH
737 break;
738
cd82e61c
MH
739 case HCI_CHANNEL_MONITOR:
740 if (haddr.hci_dev != HCI_DEV_NONE) {
741 err = -EINVAL;
742 goto done;
743 }
744
745 if (!capable(CAP_NET_RAW)) {
746 err = -EPERM;
747 goto done;
748 }
749
750 send_monitor_replay(sk);
751
752 atomic_inc(&monitor_promisc);
753 break;
754
7cc2ade2
MH
755 default:
756 err = -EINVAL;
757 goto done;
1da177e4
LT
758 }
759
7cc2ade2 760
0381101f 761 hci_pi(sk)->channel = haddr.hci_channel;
1da177e4
LT
762 sk->sk_state = BT_BOUND;
763
764done:
765 release_sock(sk);
766 return err;
767}
768
8fc9ced3
GP
769static int hci_sock_getname(struct socket *sock, struct sockaddr *addr,
770 int *addr_len, int peer)
1da177e4
LT
771{
772 struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
773 struct sock *sk = sock->sk;
9d4b68b2
MH
774 struct hci_dev *hdev;
775 int err = 0;
1da177e4
LT
776
777 BT_DBG("sock %p sk %p", sock, sk);
778
06f43cbc
MH
779 if (peer)
780 return -EOPNOTSUPP;
781
1da177e4
LT
782 lock_sock(sk);
783
9d4b68b2
MH
784 hdev = hci_pi(sk)->hdev;
785 if (!hdev) {
786 err = -EBADFD;
787 goto done;
788 }
789
1da177e4
LT
790 *addr_len = sizeof(*haddr);
791 haddr->hci_family = AF_BLUETOOTH;
7b005bd3 792 haddr->hci_dev = hdev->id;
9d4b68b2 793 haddr->hci_channel= hci_pi(sk)->channel;
1da177e4 794
9d4b68b2 795done:
1da177e4 796 release_sock(sk);
9d4b68b2 797 return err;
1da177e4
LT
798}
799
6039aa73
GP
800static void hci_sock_cmsg(struct sock *sk, struct msghdr *msg,
801 struct sk_buff *skb)
1da177e4
LT
802{
803 __u32 mask = hci_pi(sk)->cmsg_mask;
804
0d48d939
MH
805 if (mask & HCI_CMSG_DIR) {
806 int incoming = bt_cb(skb)->incoming;
8fc9ced3
GP
807 put_cmsg(msg, SOL_HCI, HCI_CMSG_DIR, sizeof(incoming),
808 &incoming);
0d48d939 809 }
1da177e4 810
a61bbcf2 811 if (mask & HCI_CMSG_TSTAMP) {
f6e623a6
JFS
812#ifdef CONFIG_COMPAT
813 struct compat_timeval ctv;
814#endif
a61bbcf2 815 struct timeval tv;
767c5eb5
MH
816 void *data;
817 int len;
a61bbcf2
PM
818
819 skb_get_timestamp(skb, &tv);
767c5eb5 820
1da97f83
DM
821 data = &tv;
822 len = sizeof(tv);
823#ifdef CONFIG_COMPAT
da88cea1
L
824 if (!COMPAT_USE_64BIT_TIME &&
825 (msg->msg_flags & MSG_CMSG_COMPAT)) {
767c5eb5
MH
826 ctv.tv_sec = tv.tv_sec;
827 ctv.tv_usec = tv.tv_usec;
828 data = &ctv;
829 len = sizeof(ctv);
767c5eb5 830 }
1da97f83 831#endif
767c5eb5
MH
832
833 put_cmsg(msg, SOL_HCI, HCI_CMSG_TSTAMP, len, data);
a61bbcf2 834 }
1da177e4 835}
8e87d142
YH
836
837static int hci_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
3bb3c755 838 struct msghdr *msg, size_t len, int flags)
1da177e4
LT
839{
840 int noblock = flags & MSG_DONTWAIT;
841 struct sock *sk = sock->sk;
842 struct sk_buff *skb;
843 int copied, err;
844
845 BT_DBG("sock %p, sk %p", sock, sk);
846
847 if (flags & (MSG_OOB))
848 return -EOPNOTSUPP;
849
850 if (sk->sk_state == BT_CLOSED)
851 return 0;
852
70f23020
AE
853 skb = skb_recv_datagram(sk, flags, noblock, &err);
854 if (!skb)
1da177e4
LT
855 return err;
856
1da177e4
LT
857 copied = skb->len;
858 if (len < copied) {
859 msg->msg_flags |= MSG_TRUNC;
860 copied = len;
861 }
862
badff6d0 863 skb_reset_transport_header(skb);
1da177e4
LT
864 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
865
3a208627
MH
866 switch (hci_pi(sk)->channel) {
867 case HCI_CHANNEL_RAW:
868 hci_sock_cmsg(sk, msg, skb);
869 break;
23500189 870 case HCI_CHANNEL_USER:
97e0bdeb 871 case HCI_CHANNEL_CONTROL:
cd82e61c
MH
872 case HCI_CHANNEL_MONITOR:
873 sock_recv_timestamp(msg, sk, skb);
874 break;
3a208627 875 }
1da177e4
LT
876
877 skb_free_datagram(sk, skb);
878
879 return err ? : copied;
880}
881
8e87d142 882static int hci_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
1da177e4
LT
883 struct msghdr *msg, size_t len)
884{
885 struct sock *sk = sock->sk;
886 struct hci_dev *hdev;
887 struct sk_buff *skb;
888 int err;
889
890 BT_DBG("sock %p sk %p", sock, sk);
891
892 if (msg->msg_flags & MSG_OOB)
893 return -EOPNOTSUPP;
894
895 if (msg->msg_flags & ~(MSG_DONTWAIT|MSG_NOSIGNAL|MSG_ERRQUEUE))
896 return -EINVAL;
897
898 if (len < 4 || len > HCI_MAX_FRAME_SIZE)
899 return -EINVAL;
900
901 lock_sock(sk);
902
0381101f
JH
903 switch (hci_pi(sk)->channel) {
904 case HCI_CHANNEL_RAW:
23500189 905 case HCI_CHANNEL_USER:
0381101f
JH
906 break;
907 case HCI_CHANNEL_CONTROL:
908 err = mgmt_control(sk, msg, len);
909 goto done;
cd82e61c
MH
910 case HCI_CHANNEL_MONITOR:
911 err = -EOPNOTSUPP;
912 goto done;
0381101f
JH
913 default:
914 err = -EINVAL;
915 goto done;
916 }
917
70f23020
AE
918 hdev = hci_pi(sk)->hdev;
919 if (!hdev) {
1da177e4
LT
920 err = -EBADFD;
921 goto done;
922 }
923
7e21addc
MH
924 if (!test_bit(HCI_UP, &hdev->flags)) {
925 err = -ENETDOWN;
926 goto done;
927 }
928
70f23020
AE
929 skb = bt_skb_send_alloc(sk, len, msg->msg_flags & MSG_DONTWAIT, &err);
930 if (!skb)
1da177e4
LT
931 goto done;
932
933 if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) {
934 err = -EFAULT;
935 goto drop;
936 }
937
0d48d939 938 bt_cb(skb)->pkt_type = *((unsigned char *) skb->data);
1da177e4 939 skb_pull(skb, 1);
1da177e4 940
1bc5ad16
MH
941 if (hci_pi(sk)->channel == HCI_CHANNEL_USER) {
942 /* No permission check is needed for user channel
943 * since that gets enforced when binding the socket.
944 *
945 * However check that the packet type is valid.
946 */
947 if (bt_cb(skb)->pkt_type != HCI_COMMAND_PKT &&
948 bt_cb(skb)->pkt_type != HCI_ACLDATA_PKT &&
949 bt_cb(skb)->pkt_type != HCI_SCODATA_PKT) {
950 err = -EINVAL;
951 goto drop;
952 }
953
954 skb_queue_tail(&hdev->raw_q, skb);
955 queue_work(hdev->workqueue, &hdev->tx_work);
956 } else if (bt_cb(skb)->pkt_type == HCI_COMMAND_PKT) {
83985319 957 u16 opcode = get_unaligned_le16(skb->data);
1da177e4
LT
958 u16 ogf = hci_opcode_ogf(opcode);
959 u16 ocf = hci_opcode_ocf(opcode);
960
961 if (((ogf > HCI_SFLT_MAX_OGF) ||
3bb3c755
GP
962 !hci_test_bit(ocf & HCI_FLT_OCF_BITS,
963 &hci_sec_filter.ocf_mask[ogf])) &&
964 !capable(CAP_NET_RAW)) {
1da177e4
LT
965 err = -EPERM;
966 goto drop;
967 }
968
fee746b0 969 if (ogf == 0x3f) {
1da177e4 970 skb_queue_tail(&hdev->raw_q, skb);
3eff45ea 971 queue_work(hdev->workqueue, &hdev->tx_work);
1da177e4 972 } else {
11714b3d
JH
973 /* Stand-alone HCI commands must be flaged as
974 * single-command requests.
975 */
976 bt_cb(skb)->req.start = true;
977
1da177e4 978 skb_queue_tail(&hdev->cmd_q, skb);
c347b765 979 queue_work(hdev->workqueue, &hdev->cmd_work);
1da177e4
LT
980 }
981 } else {
982 if (!capable(CAP_NET_RAW)) {
983 err = -EPERM;
984 goto drop;
985 }
986
987 skb_queue_tail(&hdev->raw_q, skb);
3eff45ea 988 queue_work(hdev->workqueue, &hdev->tx_work);
1da177e4
LT
989 }
990
991 err = len;
992
993done:
994 release_sock(sk);
995 return err;
996
997drop:
998 kfree_skb(skb);
999 goto done;
1000}
1001
8fc9ced3
GP
1002static int hci_sock_setsockopt(struct socket *sock, int level, int optname,
1003 char __user *optval, unsigned int len)
1da177e4
LT
1004{
1005 struct hci_ufilter uf = { .opcode = 0 };
1006 struct sock *sk = sock->sk;
1007 int err = 0, opt = 0;
1008
1009 BT_DBG("sk %p, opt %d", sk, optname);
1010
1011 lock_sock(sk);
1012
2f39cdb7 1013 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
c2371e80 1014 err = -EBADFD;
2f39cdb7
MH
1015 goto done;
1016 }
1017
1da177e4
LT
1018 switch (optname) {
1019 case HCI_DATA_DIR:
1020 if (get_user(opt, (int __user *)optval)) {
1021 err = -EFAULT;
1022 break;
1023 }
1024
1025 if (opt)
1026 hci_pi(sk)->cmsg_mask |= HCI_CMSG_DIR;
1027 else
1028 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_DIR;
1029 break;
1030
1031 case HCI_TIME_STAMP:
1032 if (get_user(opt, (int __user *)optval)) {
1033 err = -EFAULT;
1034 break;
1035 }
1036
1037 if (opt)
1038 hci_pi(sk)->cmsg_mask |= HCI_CMSG_TSTAMP;
1039 else
1040 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_TSTAMP;
1041 break;
1042
1043 case HCI_FILTER:
0878b666
MH
1044 {
1045 struct hci_filter *f = &hci_pi(sk)->filter;
1046
1047 uf.type_mask = f->type_mask;
1048 uf.opcode = f->opcode;
1049 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
1050 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
1051 }
1052
1da177e4
LT
1053 len = min_t(unsigned int, len, sizeof(uf));
1054 if (copy_from_user(&uf, optval, len)) {
1055 err = -EFAULT;
1056 break;
1057 }
1058
1059 if (!capable(CAP_NET_RAW)) {
1060 uf.type_mask &= hci_sec_filter.type_mask;
1061 uf.event_mask[0] &= *((u32 *) hci_sec_filter.event_mask + 0);
1062 uf.event_mask[1] &= *((u32 *) hci_sec_filter.event_mask + 1);
1063 }
1064
1065 {
1066 struct hci_filter *f = &hci_pi(sk)->filter;
1067
1068 f->type_mask = uf.type_mask;
1069 f->opcode = uf.opcode;
1070 *((u32 *) f->event_mask + 0) = uf.event_mask[0];
1071 *((u32 *) f->event_mask + 1) = uf.event_mask[1];
1072 }
8e87d142 1073 break;
1da177e4
LT
1074
1075 default:
1076 err = -ENOPROTOOPT;
1077 break;
1078 }
1079
2f39cdb7 1080done:
1da177e4
LT
1081 release_sock(sk);
1082 return err;
1083}
1084
8fc9ced3
GP
1085static int hci_sock_getsockopt(struct socket *sock, int level, int optname,
1086 char __user *optval, int __user *optlen)
1da177e4
LT
1087{
1088 struct hci_ufilter uf;
1089 struct sock *sk = sock->sk;
cedc5469
MH
1090 int len, opt, err = 0;
1091
1092 BT_DBG("sk %p, opt %d", sk, optname);
1da177e4
LT
1093
1094 if (get_user(len, optlen))
1095 return -EFAULT;
1096
cedc5469
MH
1097 lock_sock(sk);
1098
1099 if (hci_pi(sk)->channel != HCI_CHANNEL_RAW) {
c2371e80 1100 err = -EBADFD;
cedc5469
MH
1101 goto done;
1102 }
1103
1da177e4
LT
1104 switch (optname) {
1105 case HCI_DATA_DIR:
1106 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_DIR)
1107 opt = 1;
8e87d142 1108 else
1da177e4
LT
1109 opt = 0;
1110
1111 if (put_user(opt, optval))
cedc5469 1112 err = -EFAULT;
1da177e4
LT
1113 break;
1114
1115 case HCI_TIME_STAMP:
1116 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_TSTAMP)
1117 opt = 1;
8e87d142 1118 else
1da177e4
LT
1119 opt = 0;
1120
1121 if (put_user(opt, optval))
cedc5469 1122 err = -EFAULT;
1da177e4
LT
1123 break;
1124
1125 case HCI_FILTER:
1126 {
1127 struct hci_filter *f = &hci_pi(sk)->filter;
1128
e15ca9a0 1129 memset(&uf, 0, sizeof(uf));
1da177e4
LT
1130 uf.type_mask = f->type_mask;
1131 uf.opcode = f->opcode;
1132 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
1133 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
1134 }
1135
1136 len = min_t(unsigned int, len, sizeof(uf));
1137 if (copy_to_user(optval, &uf, len))
cedc5469 1138 err = -EFAULT;
1da177e4
LT
1139 break;
1140
1141 default:
cedc5469 1142 err = -ENOPROTOOPT;
1da177e4
LT
1143 break;
1144 }
1145
cedc5469
MH
1146done:
1147 release_sock(sk);
1148 return err;
1da177e4
LT
1149}
1150
90ddc4f0 1151static const struct proto_ops hci_sock_ops = {
1da177e4
LT
1152 .family = PF_BLUETOOTH,
1153 .owner = THIS_MODULE,
1154 .release = hci_sock_release,
1155 .bind = hci_sock_bind,
1156 .getname = hci_sock_getname,
1157 .sendmsg = hci_sock_sendmsg,
1158 .recvmsg = hci_sock_recvmsg,
1159 .ioctl = hci_sock_ioctl,
1160 .poll = datagram_poll,
1161 .listen = sock_no_listen,
1162 .shutdown = sock_no_shutdown,
1163 .setsockopt = hci_sock_setsockopt,
1164 .getsockopt = hci_sock_getsockopt,
1165 .connect = sock_no_connect,
1166 .socketpair = sock_no_socketpair,
1167 .accept = sock_no_accept,
1168 .mmap = sock_no_mmap
1169};
1170
1171static struct proto hci_sk_proto = {
1172 .name = "HCI",
1173 .owner = THIS_MODULE,
1174 .obj_size = sizeof(struct hci_pinfo)
1175};
1176
3f378b68
EP
1177static int hci_sock_create(struct net *net, struct socket *sock, int protocol,
1178 int kern)
1da177e4
LT
1179{
1180 struct sock *sk;
1181
1182 BT_DBG("sock %p", sock);
1183
1184 if (sock->type != SOCK_RAW)
1185 return -ESOCKTNOSUPPORT;
1186
1187 sock->ops = &hci_sock_ops;
1188
6257ff21 1189 sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hci_sk_proto);
1da177e4
LT
1190 if (!sk)
1191 return -ENOMEM;
1192
1193 sock_init_data(sock, sk);
1194
1195 sock_reset_flag(sk, SOCK_ZAPPED);
1196
1197 sk->sk_protocol = protocol;
1198
1199 sock->state = SS_UNCONNECTED;
1200 sk->sk_state = BT_OPEN;
1201
1202 bt_sock_link(&hci_sk_list, sk);
1203 return 0;
1204}
1205
ec1b4cf7 1206static const struct net_proto_family hci_sock_family_ops = {
1da177e4
LT
1207 .family = PF_BLUETOOTH,
1208 .owner = THIS_MODULE,
1209 .create = hci_sock_create,
1210};
1211
1da177e4
LT
1212int __init hci_sock_init(void)
1213{
1214 int err;
1215
1216 err = proto_register(&hci_sk_proto, 0);
1217 if (err < 0)
1218 return err;
1219
1220 err = bt_sock_register(BTPROTO_HCI, &hci_sock_family_ops);
f7c86637
MY
1221 if (err < 0) {
1222 BT_ERR("HCI socket registration failed");
1da177e4 1223 goto error;
f7c86637
MY
1224 }
1225
b0316615 1226 err = bt_procfs_init(&init_net, "hci", &hci_sk_list, NULL);
f7c86637
MY
1227 if (err < 0) {
1228 BT_ERR("Failed to create HCI proc file");
1229 bt_sock_unregister(BTPROTO_HCI);
1230 goto error;
1231 }
1da177e4 1232
1da177e4
LT
1233 BT_INFO("HCI socket layer initialized");
1234
1235 return 0;
1236
1237error:
1da177e4
LT
1238 proto_unregister(&hci_sk_proto);
1239 return err;
1240}
1241
b7440a14 1242void hci_sock_cleanup(void)
1da177e4 1243{
f7c86637 1244 bt_procfs_cleanup(&init_net, "hci");
5e9d7f86 1245 bt_sock_unregister(BTPROTO_HCI);
1da177e4 1246 proto_unregister(&hci_sk_proto);
1da177e4 1247}
This page took 0.749829 seconds and 5 git commands to generate.