blob: ec313c9dee6dd5b1792978bf2e1abb88fa075893 [file] [log] [blame]
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090015 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090020 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
Linus Torvalds1da177e2005-04-16 15:20:36 -070022 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth address family and sockets. */
26
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/module.h>
Marcel Holtmannffcecac2013-10-17 17:24:18 -070028#include <linux/debugfs.h>
Marcel Holtmann9e8305b2016-08-30 05:00:35 +020029#include <linux/stringify.h>
Marcel Holtmann3241ad82008-07-14 20:13:50 +020030#include <asm/ioctls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070031
32#include <net/bluetooth/bluetooth.h>
Masatake YAMATO256a06c2012-07-26 01:26:32 +090033#include <linux/proc_fs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070034
Marcel Holtmanne64c97b2016-07-21 14:12:41 +020035#include "leds.h"
Marcel Holtmannee485292014-12-29 20:48:35 -080036#include "selftest.h"
37
Linus Torvalds1da177e2005-04-16 15:20:36 -070038/* Bluetooth sockets */
39#define BT_MAX_PROTO 8
Stephen Hemmingerec1b4cf2009-10-05 05:58:39 +000040static const struct net_proto_family *bt_proto[BT_MAX_PROTO];
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010041static DEFINE_RWLOCK(bt_proto_lock);
Dave Young68845cb2008-04-01 23:58:35 -070042
Dave Young68845cb2008-04-01 23:58:35 -070043static struct lock_class_key bt_lock_key[BT_MAX_PROTO];
Jan Engelhardt36cbd3d2009-08-05 10:42:58 -070044static const char *const bt_key_strings[BT_MAX_PROTO] = {
Dave Young68845cb2008-04-01 23:58:35 -070045 "sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP",
46 "sk_lock-AF_BLUETOOTH-BTPROTO_HCI",
47 "sk_lock-AF_BLUETOOTH-BTPROTO_SCO",
48 "sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM",
49 "sk_lock-AF_BLUETOOTH-BTPROTO_BNEP",
50 "sk_lock-AF_BLUETOOTH-BTPROTO_CMTP",
51 "sk_lock-AF_BLUETOOTH-BTPROTO_HIDP",
52 "sk_lock-AF_BLUETOOTH-BTPROTO_AVDTP",
53};
54
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010055static struct lock_class_key bt_slock_key[BT_MAX_PROTO];
Jan Engelhardt36cbd3d2009-08-05 10:42:58 -070056static const char *const bt_slock_key_strings[BT_MAX_PROTO] = {
Dave Young68845cb2008-04-01 23:58:35 -070057 "slock-AF_BLUETOOTH-BTPROTO_L2CAP",
58 "slock-AF_BLUETOOTH-BTPROTO_HCI",
59 "slock-AF_BLUETOOTH-BTPROTO_SCO",
60 "slock-AF_BLUETOOTH-BTPROTO_RFCOMM",
61 "slock-AF_BLUETOOTH-BTPROTO_BNEP",
62 "slock-AF_BLUETOOTH-BTPROTO_CMTP",
63 "slock-AF_BLUETOOTH-BTPROTO_HIDP",
64 "slock-AF_BLUETOOTH-BTPROTO_AVDTP",
65};
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010066
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020067void bt_sock_reclassify_lock(struct sock *sk, int proto)
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010068{
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020069 BUG_ON(!sk);
Hannes Frederic Sowafafc4e12016-04-08 15:11:27 +020070 BUG_ON(!sock_allow_reclassification(sk));
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010071
72 sock_lock_init_class_and_name(sk,
73 bt_slock_key_strings[proto], &bt_slock_key[proto],
74 bt_key_strings[proto], &bt_lock_key[proto]);
75}
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020076EXPORT_SYMBOL(bt_sock_reclassify_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070077
Stephen Hemmingerec1b4cf2009-10-05 05:58:39 +000078int bt_sock_register(int proto, const struct net_proto_family *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -070079{
Marcel Holtmann74da6262006-10-15 17:31:14 +020080 int err = 0;
81
Linus Torvalds1da177e2005-04-16 15:20:36 -070082 if (proto < 0 || proto >= BT_MAX_PROTO)
83 return -EINVAL;
84
Marcel Holtmann74da6262006-10-15 17:31:14 +020085 write_lock(&bt_proto_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070086
Marcel Holtmann74da6262006-10-15 17:31:14 +020087 if (bt_proto[proto])
88 err = -EEXIST;
89 else
90 bt_proto[proto] = ops;
91
92 write_unlock(&bt_proto_lock);
93
94 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -070095}
96EXPORT_SYMBOL(bt_sock_register);
97
David Herrmannbe9f97f2013-02-24 19:36:52 +010098void bt_sock_unregister(int proto)
Linus Torvalds1da177e2005-04-16 15:20:36 -070099{
100 if (proto < 0 || proto >= BT_MAX_PROTO)
David Herrmannbe9f97f2013-02-24 19:36:52 +0100101 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102
Marcel Holtmann74da6262006-10-15 17:31:14 +0200103 write_lock(&bt_proto_lock);
David Herrmannbe9f97f2013-02-24 19:36:52 +0100104 bt_proto[proto] = NULL;
Marcel Holtmann74da6262006-10-15 17:31:14 +0200105 write_unlock(&bt_proto_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106}
107EXPORT_SYMBOL(bt_sock_unregister);
108
Robert Loveec2622b2008-10-15 15:35:44 -0400109#ifdef CONFIG_PARANOID_NETWORK
110static inline int current_has_bt_admin(void)
111{
112 return !current_euid();
113}
114
115static inline int current_has_bt(void)
116{
117 return current_has_bt_admin();
118}
119# else
120static inline int current_has_bt_admin(void)
121{
122 return 1;
123}
124
125static inline int current_has_bt(void)
126{
127 return 1;
128}
129#endif
130
Eric Paris3f378b62009-11-05 22:18:14 -0800131static int bt_sock_create(struct net *net, struct socket *sock, int proto,
132 int kern)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133{
Marcel Holtmann74da6262006-10-15 17:31:14 +0200134 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135
Robert Loveec2622b2008-10-15 15:35:44 -0400136 if (proto == BTPROTO_RFCOMM || proto == BTPROTO_SCO ||
137 proto == BTPROTO_L2CAP) {
138 if (!current_has_bt())
139 return -EPERM;
140 } else if (!current_has_bt_admin())
141 return -EPERM;
142
Eric W. Biederman1b8d7ae2007-10-08 23:24:22 -0700143 if (net != &init_net)
144 return -EAFNOSUPPORT;
145
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146 if (proto < 0 || proto >= BT_MAX_PROTO)
147 return -EINVAL;
148
Johannes Berg95a5afc2008-10-16 15:24:51 -0700149 if (!bt_proto[proto])
Linus Torvalds1da177e2005-04-16 15:20:36 -0700150 request_module("bt-proto-%d", proto);
Marcel Holtmann74da6262006-10-15 17:31:14 +0200151
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152 err = -EPROTONOSUPPORT;
Marcel Holtmann74da6262006-10-15 17:31:14 +0200153
154 read_lock(&bt_proto_lock);
155
Linus Torvalds1da177e2005-04-16 15:20:36 -0700156 if (bt_proto[proto] && try_module_get(bt_proto[proto]->owner)) {
Eric Paris3f378b62009-11-05 22:18:14 -0800157 err = bt_proto[proto]->create(net, sock, proto, kern);
Octavian Purdilab5a30dd2012-01-22 00:28:34 +0200158 if (!err)
159 bt_sock_reclassify_lock(sock->sk, proto);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700160 module_put(bt_proto[proto]->owner);
161 }
Marcel Holtmann74da6262006-10-15 17:31:14 +0200162
163 read_unlock(&bt_proto_lock);
164
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900165 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700166}
167
168void bt_sock_link(struct bt_sock_list *l, struct sock *sk)
169{
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200170 write_lock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171 sk_add_node(sk, &l->head);
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200172 write_unlock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173}
174EXPORT_SYMBOL(bt_sock_link);
175
176void bt_sock_unlink(struct bt_sock_list *l, struct sock *sk)
177{
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200178 write_lock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700179 sk_del_node_init(sk);
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200180 write_unlock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700181}
182EXPORT_SYMBOL(bt_sock_unlink);
183
184void bt_accept_enqueue(struct sock *parent, struct sock *sk)
185{
186 BT_DBG("parent %p, sk %p", parent, sk);
187
188 sock_hold(sk);
189 list_add_tail(&bt_sk(sk)->accept_q, &bt_sk(parent)->accept_q);
190 bt_sk(sk)->parent = parent;
191 parent->sk_ack_backlog++;
192}
193EXPORT_SYMBOL(bt_accept_enqueue);
194
Dean Jenkinsf3fa28a2017-03-10 11:34:46 +0000195/* Calling function must hold the sk lock.
196 * bt_sk(sk)->parent must be non-NULL meaning sk is in the parent list.
197 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198void bt_accept_unlink(struct sock *sk)
199{
200 BT_DBG("sk %p state %d", sk, sk->sk_state);
201
202 list_del_init(&bt_sk(sk)->accept_q);
203 bt_sk(sk)->parent->sk_ack_backlog--;
204 bt_sk(sk)->parent = NULL;
205 sock_put(sk);
206}
207EXPORT_SYMBOL(bt_accept_unlink);
208
209struct sock *bt_accept_dequeue(struct sock *parent, struct socket *newsock)
210{
Geliang Tang7eb74042015-12-18 23:33:25 +0800211 struct bt_sock *s, *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212 struct sock *sk;
213
214 BT_DBG("parent %p", parent);
215
Dean Jenkinsf3fa28a2017-03-10 11:34:46 +0000216restart:
Geliang Tang7eb74042015-12-18 23:33:25 +0800217 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
218 sk = (struct sock *)s;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219
Dean Jenkinsf3fa28a2017-03-10 11:34:46 +0000220 /* Prevent early freeing of sk due to unlink and sock_kill */
221 sock_hold(sk);
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200222 lock_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223
Dean Jenkinsf3fa28a2017-03-10 11:34:46 +0000224 /* Check sk has not already been unlinked via
225 * bt_accept_unlink() due to serialisation caused by sk locking
226 */
227 if (!bt_sk(sk)->parent) {
228 BT_DBG("sk %p, already unlinked", sk);
229 release_sock(sk);
230 sock_put(sk);
231
232 /* Restart the loop as sk is no longer in the list
233 * and also avoid a potential infinite loop because
234 * list_for_each_entry_safe() is not thread safe.
235 */
236 goto restart;
237 }
238
239 /* sk is safely in the parent list so reduce reference count */
240 sock_put(sk);
241
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242 /* FIXME: Is this check still needed */
243 if (sk->sk_state == BT_CLOSED) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700244 bt_accept_unlink(sk);
Yichen Zhao1a11ec82015-12-01 11:11:01 -0800245 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700246 continue;
247 }
248
Marcel Holtmannc4f912e2009-01-15 21:52:16 +0100249 if (sk->sk_state == BT_CONNECTED || !newsock ||
Vinicius Costa Gomesd0609912012-05-31 22:53:39 -0300250 test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251 bt_accept_unlink(sk);
252 if (newsock)
253 sock_graft(sk, newsock);
Andrei Emeltchenkod37f50e2011-01-24 10:53:24 +0200254
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200255 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700256 return sk;
257 }
258
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200259 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260 }
Andrei Emeltchenkod37f50e2011-01-24 10:53:24 +0200261
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262 return NULL;
263}
264EXPORT_SYMBOL(bt_accept_dequeue);
265
Ying Xue1b784142015-03-02 15:37:48 +0800266int bt_sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
267 int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700268{
269 int noblock = flags & MSG_DONTWAIT;
270 struct sock *sk = sock->sk;
271 struct sk_buff *skb;
272 size_t copied;
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500273 size_t skblen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700274 int err;
275
Marcel Holtmanna418b892008-11-30 12:17:28 +0100276 BT_DBG("sock %p sk %p len %zu", sock, sk, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700277
Marcel Holtmannd94a6102015-10-25 22:45:18 +0100278 if (flags & MSG_OOB)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279 return -EOPNOTSUPP;
280
Andrei Emeltchenko5a08ecc2011-01-11 17:20:20 +0200281 skb = skb_recv_datagram(sk, flags, noblock, &err);
282 if (!skb) {
Hannes Frederic Sowaf3d33422013-11-21 03:14:22 +0100283 if (sk->sk_shutdown & RCV_SHUTDOWN)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 return 0;
Hannes Frederic Sowaf3d33422013-11-21 03:14:22 +0100285
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286 return err;
287 }
288
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500289 skblen = skb->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700290 copied = skb->len;
291 if (len < copied) {
292 msg->msg_flags |= MSG_TRUNC;
293 copied = len;
294 }
295
Arnaldo Carvalho de Melobadff6d2007-03-13 13:06:52 -0300296 skb_reset_transport_header(skb);
David S. Miller51f3d022014-11-05 16:46:40 -0500297 err = skb_copy_datagram_msg(skb, 0, msg, copied);
Marcel Holtmannd9763692013-10-13 12:55:28 -0700298 if (err == 0) {
Neil Horman3b885782009-10-12 13:26:31 -0700299 sock_recv_ts_and_drops(msg, sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700300
Marcel Holtmannd9763692013-10-13 12:55:28 -0700301 if (bt_sk(sk)->skb_msg_name)
302 bt_sk(sk)->skb_msg_name(skb, msg->msg_name,
303 &msg->msg_namelen);
Marcel Holtmannd9763692013-10-13 12:55:28 -0700304 }
305
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306 skb_free_datagram(sk, skb);
307
Luiz Augusto von Dentz90a56f72016-08-12 15:11:28 +0300308 if (flags & MSG_TRUNC)
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500309 copied = skblen;
310
Linus Torvalds1da177e2005-04-16 15:20:36 -0700311 return err ? : copied;
312}
313EXPORT_SYMBOL(bt_sock_recvmsg);
314
Mat Martineau796c86e2010-09-08 10:05:27 -0700315static long bt_sock_data_wait(struct sock *sk, long timeo)
316{
317 DECLARE_WAITQUEUE(wait, current);
318
319 add_wait_queue(sk_sleep(sk), &wait);
320 for (;;) {
321 set_current_state(TASK_INTERRUPTIBLE);
322
323 if (!skb_queue_empty(&sk->sk_receive_queue))
324 break;
325
326 if (sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN))
327 break;
328
329 if (signal_pending(current) || !timeo)
330 break;
331
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800332 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
Mat Martineau796c86e2010-09-08 10:05:27 -0700333 release_sock(sk);
334 timeo = schedule_timeout(timeo);
335 lock_sock(sk);
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800336 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
Mat Martineau796c86e2010-09-08 10:05:27 -0700337 }
338
339 __set_current_state(TASK_RUNNING);
340 remove_wait_queue(sk_sleep(sk), &wait);
341 return timeo;
342}
343
Ying Xue1b784142015-03-02 15:37:48 +0800344int bt_sock_stream_recvmsg(struct socket *sock, struct msghdr *msg,
345 size_t size, int flags)
Mat Martineau796c86e2010-09-08 10:05:27 -0700346{
347 struct sock *sk = sock->sk;
348 int err = 0;
349 size_t target, copied = 0;
350 long timeo;
351
352 if (flags & MSG_OOB)
353 return -EOPNOTSUPP;
354
Mat Martineau796c86e2010-09-08 10:05:27 -0700355 BT_DBG("sk %p size %zu", sk, size);
356
357 lock_sock(sk);
358
359 target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
360 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
361
362 do {
363 struct sk_buff *skb;
364 int chunk;
365
366 skb = skb_dequeue(&sk->sk_receive_queue);
367 if (!skb) {
368 if (copied >= target)
369 break;
370
Andrei Emeltchenko5a08ecc2011-01-11 17:20:20 +0200371 err = sock_error(sk);
372 if (err)
Mat Martineau796c86e2010-09-08 10:05:27 -0700373 break;
374 if (sk->sk_shutdown & RCV_SHUTDOWN)
375 break;
376
377 err = -EAGAIN;
378 if (!timeo)
379 break;
380
381 timeo = bt_sock_data_wait(sk, timeo);
382
383 if (signal_pending(current)) {
384 err = sock_intr_errno(timeo);
385 goto out;
386 }
387 continue;
388 }
389
390 chunk = min_t(unsigned int, skb->len, size);
David S. Miller51f3d022014-11-05 16:46:40 -0500391 if (skb_copy_datagram_msg(skb, 0, msg, chunk)) {
Mat Martineau796c86e2010-09-08 10:05:27 -0700392 skb_queue_head(&sk->sk_receive_queue, skb);
393 if (!copied)
394 copied = -EFAULT;
395 break;
396 }
397 copied += chunk;
398 size -= chunk;
399
400 sock_recv_ts_and_drops(msg, sk, skb);
401
402 if (!(flags & MSG_PEEK)) {
Mat Martineau5b668eb2011-07-22 14:53:59 -0700403 int skb_len = skb_headlen(skb);
404
405 if (chunk <= skb_len) {
406 __skb_pull(skb, chunk);
407 } else {
408 struct sk_buff *frag;
409
410 __skb_pull(skb, skb_len);
411 chunk -= skb_len;
412
413 skb_walk_frags(skb, frag) {
414 if (chunk <= frag->len) {
415 /* Pulling partial data */
416 skb->len -= chunk;
417 skb->data_len -= chunk;
418 __skb_pull(frag, chunk);
419 break;
420 } else if (frag->len) {
421 /* Pulling all frag data */
422 chunk -= frag->len;
423 skb->len -= frag->len;
424 skb->data_len -= frag->len;
425 __skb_pull(frag, frag->len);
426 }
427 }
428 }
429
Mat Martineau796c86e2010-09-08 10:05:27 -0700430 if (skb->len) {
431 skb_queue_head(&sk->sk_receive_queue, skb);
432 break;
433 }
434 kfree_skb(skb);
435
436 } else {
437 /* put message back and return */
438 skb_queue_head(&sk->sk_receive_queue, skb);
439 break;
440 }
441 } while (size);
442
443out:
444 release_sock(sk);
445 return copied ? : err;
446}
447EXPORT_SYMBOL(bt_sock_stream_recvmsg);
448
Linus Torvalds1da177e2005-04-16 15:20:36 -0700449static inline unsigned int bt_accept_poll(struct sock *parent)
450{
Geliang Tang7eb74042015-12-18 23:33:25 +0800451 struct bt_sock *s, *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 struct sock *sk;
453
Geliang Tang7eb74042015-12-18 23:33:25 +0800454 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
455 sk = (struct sock *)s;
Marcel Holtmannd5f2d2b2009-02-16 02:57:30 +0100456 if (sk->sk_state == BT_CONNECTED ||
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300457 (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags) &&
458 sk->sk_state == BT_CONNECT2))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459 return POLLIN | POLLRDNORM;
460 }
461
462 return 0;
463}
464
Gustavo Padovan8fc9ced2012-05-23 04:04:21 -0300465unsigned int bt_sock_poll(struct file *file, struct socket *sock,
466 poll_table *wait)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700467{
468 struct sock *sk = sock->sk;
469 unsigned int mask = 0;
470
471 BT_DBG("sock %p, sk %p", sock, sk);
472
Eric Dumazetaa395142010-04-20 13:03:51 +0000473 poll_wait(file, sk_sleep(sk), wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700474
475 if (sk->sk_state == BT_LISTEN)
476 return bt_accept_poll(sk);
477
478 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
Keller, Jacob E7d4c04f2013-03-28 11:19:25 +0000479 mask |= POLLERR |
Jacob Keller8facd5f2013-04-02 13:55:40 -0700480 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? POLLPRI : 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700481
Davide Libenzif348d702006-03-25 03:07:39 -0800482 if (sk->sk_shutdown & RCV_SHUTDOWN)
Eric Dumazetdb409802010-09-06 11:13:50 +0000483 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
Davide Libenzif348d702006-03-25 03:07:39 -0800484
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485 if (sk->sk_shutdown == SHUTDOWN_MASK)
486 mask |= POLLHUP;
487
Eric Dumazetdb409802010-09-06 11:13:50 +0000488 if (!skb_queue_empty(&sk->sk_receive_queue))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 mask |= POLLIN | POLLRDNORM;
490
491 if (sk->sk_state == BT_CLOSED)
492 mask |= POLLHUP;
493
494 if (sk->sk_state == BT_CONNECT ||
495 sk->sk_state == BT_CONNECT2 ||
496 sk->sk_state == BT_CONFIG)
497 return mask;
498
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300499 if (!test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags) && sock_writeable(sk))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700500 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
501 else
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800502 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700503
504 return mask;
505}
506EXPORT_SYMBOL(bt_sock_poll);
507
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200508int bt_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
509{
510 struct sock *sk = sock->sk;
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200511 struct sk_buff *skb;
512 long amount;
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200513 int err;
514
515 BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
516
517 switch (cmd) {
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200518 case TIOCOUTQ:
519 if (sk->sk_state == BT_LISTEN)
520 return -EINVAL;
521
Eric Dumazet31e6d362009-06-17 19:05:41 -0700522 amount = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200523 if (amount < 0)
524 amount = 0;
525 err = put_user(amount, (int __user *) arg);
526 break;
527
528 case TIOCINQ:
529 if (sk->sk_state == BT_LISTEN)
530 return -EINVAL;
531
532 lock_sock(sk);
533 skb = skb_peek(&sk->sk_receive_queue);
534 amount = skb ? skb->len : 0;
535 release_sock(sk);
536 err = put_user(amount, (int __user *) arg);
537 break;
538
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200539 case SIOCGSTAMP:
540 err = sock_get_timestamp(sk, (struct timeval __user *) arg);
541 break;
542
543 case SIOCGSTAMPNS:
544 err = sock_get_timestampns(sk, (struct timespec __user *) arg);
545 break;
546
547 default:
548 err = -ENOIOCTLCMD;
549 break;
550 }
551
552 return err;
553}
554EXPORT_SYMBOL(bt_sock_ioctl);
555
Johan Hedberg0fba96f2013-09-25 13:26:04 +0300556/* This function expects the sk lock to be held when called */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700557int bt_sock_wait_state(struct sock *sk, int state, unsigned long timeo)
558{
559 DECLARE_WAITQUEUE(wait, current);
560 int err = 0;
561
562 BT_DBG("sk %p", sk);
563
Eric Dumazetaa395142010-04-20 13:03:51 +0000564 add_wait_queue(sk_sleep(sk), &wait);
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400565 set_current_state(TASK_INTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700566 while (sk->sk_state != state) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700567 if (!timeo) {
Marcel Holtmannb4c612a2006-09-23 09:54:38 +0200568 err = -EINPROGRESS;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 break;
570 }
571
572 if (signal_pending(current)) {
573 err = sock_intr_errno(timeo);
574 break;
575 }
576
577 release_sock(sk);
578 timeo = schedule_timeout(timeo);
579 lock_sock(sk);
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400580 set_current_state(TASK_INTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700581
Benjamin LaHaisec1cbe4b2005-12-13 23:22:19 -0800582 err = sock_error(sk);
583 if (err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700584 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585 }
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400586 __set_current_state(TASK_RUNNING);
Eric Dumazetaa395142010-04-20 13:03:51 +0000587 remove_wait_queue(sk_sleep(sk), &wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700588 return err;
589}
590EXPORT_SYMBOL(bt_sock_wait_state);
591
Johan Hedberge793dcf2013-09-16 13:05:19 +0300592/* This function expects the sk lock to be held when called */
593int bt_sock_wait_ready(struct sock *sk, unsigned long flags)
594{
595 DECLARE_WAITQUEUE(wait, current);
596 unsigned long timeo;
597 int err = 0;
598
599 BT_DBG("sk %p", sk);
600
601 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
602
603 add_wait_queue(sk_sleep(sk), &wait);
604 set_current_state(TASK_INTERRUPTIBLE);
605 while (test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags)) {
606 if (!timeo) {
607 err = -EAGAIN;
608 break;
609 }
610
611 if (signal_pending(current)) {
612 err = sock_intr_errno(timeo);
613 break;
614 }
615
616 release_sock(sk);
617 timeo = schedule_timeout(timeo);
618 lock_sock(sk);
619 set_current_state(TASK_INTERRUPTIBLE);
620
621 err = sock_error(sk);
622 if (err)
623 break;
624 }
625 __set_current_state(TASK_RUNNING);
626 remove_wait_queue(sk_sleep(sk), &wait);
627
628 return err;
629}
630EXPORT_SYMBOL(bt_sock_wait_ready);
631
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900632#ifdef CONFIG_PROC_FS
633struct bt_seq_state {
634 struct bt_sock_list *l;
635};
636
637static void *bt_seq_start(struct seq_file *seq, loff_t *pos)
638 __acquires(seq->private->l->lock)
639{
640 struct bt_seq_state *s = seq->private;
641 struct bt_sock_list *l = s->l;
642
643 read_lock(&l->lock);
644 return seq_hlist_start_head(&l->head, *pos);
645}
646
647static void *bt_seq_next(struct seq_file *seq, void *v, loff_t *pos)
648{
649 struct bt_seq_state *s = seq->private;
650 struct bt_sock_list *l = s->l;
651
652 return seq_hlist_next(v, &l->head, pos);
653}
654
655static void bt_seq_stop(struct seq_file *seq, void *v)
656 __releases(seq->private->l->lock)
657{
658 struct bt_seq_state *s = seq->private;
659 struct bt_sock_list *l = s->l;
660
661 read_unlock(&l->lock);
662}
663
664static int bt_seq_show(struct seq_file *seq, void *v)
665{
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900666 struct bt_seq_state *s = seq->private;
667 struct bt_sock_list *l = s->l;
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900668
669 if (v == SEQ_START_TOKEN) {
Marcel Holtmannc5605752013-10-14 02:05:25 -0700670 seq_puts(seq ,"sk RefCnt Rmem Wmem User Inode Parent");
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900671
672 if (l->custom_seq_show) {
673 seq_putc(seq, ' ');
674 l->custom_seq_show(seq, v);
675 }
676
677 seq_putc(seq, '\n');
678 } else {
Andrei Emeltchenko09d5d4a2012-08-07 18:05:04 +0300679 struct sock *sk = sk_entry(v);
680 struct bt_sock *bt = bt_sk(sk);
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900681
Andrei Emeltchenko7028a882012-09-25 12:49:45 +0300682 seq_printf(seq,
Marcel Holtmann5f6cd792013-10-13 10:34:03 -0700683 "%pK %-6d %-6u %-6u %-6u %-6lu %-6lu",
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900684 sk,
685 atomic_read(&sk->sk_refcnt),
686 sk_rmem_alloc_get(sk),
687 sk_wmem_alloc_get(sk),
Eric W. Biederman1bbb3092012-10-03 20:32:17 -0700688 from_kuid(seq_user_ns(seq), sock_i_uid(sk)),
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900689 sock_i_ino(sk),
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900690 bt->parent? sock_i_ino(bt->parent): 0LU);
691
692 if (l->custom_seq_show) {
693 seq_putc(seq, ' ');
694 l->custom_seq_show(seq, v);
695 }
696
697 seq_putc(seq, '\n');
698 }
699 return 0;
700}
701
Fabian Frederick26b0f4e2014-06-30 19:26:23 +0200702static const struct seq_operations bt_seq_ops = {
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900703 .start = bt_seq_start,
704 .next = bt_seq_next,
705 .stop = bt_seq_stop,
706 .show = bt_seq_show,
707};
708
709static int bt_seq_open(struct inode *inode, struct file *file)
710{
711 struct bt_sock_list *sk_list;
712 struct bt_seq_state *s;
713
Al Virod9dda782013-03-31 18:16:14 -0400714 sk_list = PDE_DATA(inode);
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900715 s = __seq_open_private(file, &bt_seq_ops,
716 sizeof(struct bt_seq_state));
Andrei Emeltchenko31f47072012-08-07 18:05:06 +0300717 if (!s)
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900718 return -ENOMEM;
719
720 s->l = sk_list;
721 return 0;
722}
723
Al Viro14805352013-04-04 19:12:06 -0400724static const struct file_operations bt_fops = {
725 .open = bt_seq_open,
726 .read = seq_read,
727 .llseek = seq_lseek,
728 .release = seq_release_private
729};
730
Al Virob0316612013-04-04 19:14:33 -0400731int bt_procfs_init(struct net *net, const char *name,
Prasanna Karthikf37590b2015-11-17 11:06:53 +0000732 struct bt_sock_list *sk_list,
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900733 int (* seq_show)(struct seq_file *, void *))
734{
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900735 sk_list->custom_seq_show = seq_show;
736
Al Viro4d006262013-04-04 19:16:06 -0400737 if (!proc_create_data(name, 0, net->proc_net, &bt_fops, sk_list))
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900738 return -ENOMEM;
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900739 return 0;
740}
741
742void bt_procfs_cleanup(struct net *net, const char *name)
743{
Gao fengece31ff2013-02-18 01:34:56 +0000744 remove_proc_entry(name, net->proc_net);
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900745}
746#else
Al Virob0316612013-04-04 19:14:33 -0400747int bt_procfs_init(struct net *net, const char *name,
Prasanna Karthikf37590b2015-11-17 11:06:53 +0000748 struct bt_sock_list *sk_list,
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900749 int (* seq_show)(struct seq_file *, void *))
750{
751 return 0;
752}
753
754void bt_procfs_cleanup(struct net *net, const char *name)
755{
756}
757#endif
758EXPORT_SYMBOL(bt_procfs_init);
759EXPORT_SYMBOL(bt_procfs_cleanup);
760
Linus Torvalds1da177e2005-04-16 15:20:36 -0700761static struct net_proto_family bt_sock_family_ops = {
762 .owner = THIS_MODULE,
763 .family = PF_BLUETOOTH,
764 .create = bt_sock_create,
765};
766
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700767struct dentry *bt_debugfs;
768EXPORT_SYMBOL_GPL(bt_debugfs);
769
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200770#define VERSION __stringify(BT_SUBSYS_VERSION) "." \
771 __stringify(BT_SUBSYS_REVISION)
772
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773static int __init bt_init(void)
774{
Marcel Holtmann27d35282006-07-03 10:02:37 +0200775 int err;
776
Eyal Birgerb4772ef2015-03-01 14:58:29 +0200777 sock_skb_cb_check_size(sizeof(struct bt_skb_cb));
Marcel Holtmann7cb9d202014-09-14 22:50:46 +0200778
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200779 BT_INFO("Core ver %s", VERSION);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700780
Marcel Holtmannee485292014-12-29 20:48:35 -0800781 err = bt_selftest();
782 if (err < 0)
783 return err;
784
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700785 bt_debugfs = debugfs_create_dir("bluetooth", NULL);
786
Marcel Holtmanne64c97b2016-07-21 14:12:41 +0200787 bt_leds_init();
788
Marcel Holtmann27d35282006-07-03 10:02:37 +0200789 err = bt_sysfs_init();
790 if (err < 0)
791 return err;
792
793 err = sock_register(&bt_sock_family_ops);
794 if (err < 0) {
795 bt_sysfs_cleanup();
796 return err;
797 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700798
799 BT_INFO("HCI device and connection manager initialized");
800
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200801 err = hci_sock_init();
802 if (err < 0)
803 goto error;
804
805 err = l2cap_init();
Anand Gadiyar0ed54da2011-02-22 12:43:26 +0530806 if (err < 0)
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200807 goto sock_err;
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200808
809 err = sco_init();
810 if (err < 0) {
811 l2cap_exit();
812 goto sock_err;
813 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700814
Johan Hedberg6d785aa32015-03-06 21:08:51 +0200815 err = mgmt_init();
816 if (err < 0) {
817 sco_exit();
818 l2cap_exit();
819 goto sock_err;
820 }
821
Linus Torvalds1da177e2005-04-16 15:20:36 -0700822 return 0;
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200823
824sock_err:
825 hci_sock_cleanup();
826
827error:
828 sock_unregister(PF_BLUETOOTH);
829 bt_sysfs_cleanup();
830
831 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700832}
833
834static void __exit bt_exit(void)
835{
Johan Hedberg6d785aa32015-03-06 21:08:51 +0200836 mgmt_exit();
837
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200838 sco_exit();
839
840 l2cap_exit();
841
Linus Torvalds1da177e2005-04-16 15:20:36 -0700842 hci_sock_cleanup();
843
Linus Torvalds1da177e2005-04-16 15:20:36 -0700844 sock_unregister(PF_BLUETOOTH);
Marcel Holtmann27d35282006-07-03 10:02:37 +0200845
846 bt_sysfs_cleanup();
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700847
Marcel Holtmanne64c97b2016-07-21 14:12:41 +0200848 bt_leds_cleanup();
849
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700850 debugfs_remove_recursive(bt_debugfs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700851}
852
853subsys_initcall(bt_init);
854module_exit(bt_exit);
855
Marcel Holtmann63fbd242008-08-18 13:23:53 +0200856MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200857MODULE_DESCRIPTION("Bluetooth Core ver " VERSION);
858MODULE_VERSION(VERSION);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700859MODULE_LICENSE("GPL");
860MODULE_ALIAS_NETPROTO(PF_BLUETOOTH);