blob: deacc52d7ff18d41fbac961c4a13c6bae701eaa4 [file] [log] [blame]
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090015 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090020 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
Linus Torvalds1da177e2005-04-16 15:20:36 -070022 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth address family and sockets. */
26
Linus Torvalds1da177e2005-04-16 15:20:36 -070027#include <linux/module.h>
Marcel Holtmannffcecac2013-10-17 17:24:18 -070028#include <linux/debugfs.h>
Marcel Holtmann9e8305b2016-08-30 05:00:35 +020029#include <linux/stringify.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010030#include <linux/sched/signal.h>
31
Marcel Holtmann3241ad82008-07-14 20:13:50 +020032#include <asm/ioctls.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070033
34#include <net/bluetooth/bluetooth.h>
Masatake YAMATO256a06c2012-07-26 01:26:32 +090035#include <linux/proc_fs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070036
Marcel Holtmanne64c97b2016-07-21 14:12:41 +020037#include "leds.h"
Marcel Holtmannee485292014-12-29 20:48:35 -080038#include "selftest.h"
39
Linus Torvalds1da177e2005-04-16 15:20:36 -070040/* Bluetooth sockets */
41#define BT_MAX_PROTO 8
Stephen Hemmingerec1b4cf2009-10-05 05:58:39 +000042static const struct net_proto_family *bt_proto[BT_MAX_PROTO];
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010043static DEFINE_RWLOCK(bt_proto_lock);
Dave Young68845cb2008-04-01 23:58:35 -070044
Dave Young68845cb2008-04-01 23:58:35 -070045static struct lock_class_key bt_lock_key[BT_MAX_PROTO];
Jan Engelhardt36cbd3d2009-08-05 10:42:58 -070046static const char *const bt_key_strings[BT_MAX_PROTO] = {
Dave Young68845cb2008-04-01 23:58:35 -070047 "sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP",
48 "sk_lock-AF_BLUETOOTH-BTPROTO_HCI",
49 "sk_lock-AF_BLUETOOTH-BTPROTO_SCO",
50 "sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM",
51 "sk_lock-AF_BLUETOOTH-BTPROTO_BNEP",
52 "sk_lock-AF_BLUETOOTH-BTPROTO_CMTP",
53 "sk_lock-AF_BLUETOOTH-BTPROTO_HIDP",
54 "sk_lock-AF_BLUETOOTH-BTPROTO_AVDTP",
55};
56
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010057static struct lock_class_key bt_slock_key[BT_MAX_PROTO];
Jan Engelhardt36cbd3d2009-08-05 10:42:58 -070058static const char *const bt_slock_key_strings[BT_MAX_PROTO] = {
Dave Young68845cb2008-04-01 23:58:35 -070059 "slock-AF_BLUETOOTH-BTPROTO_L2CAP",
60 "slock-AF_BLUETOOTH-BTPROTO_HCI",
61 "slock-AF_BLUETOOTH-BTPROTO_SCO",
62 "slock-AF_BLUETOOTH-BTPROTO_RFCOMM",
63 "slock-AF_BLUETOOTH-BTPROTO_BNEP",
64 "slock-AF_BLUETOOTH-BTPROTO_CMTP",
65 "slock-AF_BLUETOOTH-BTPROTO_HIDP",
66 "slock-AF_BLUETOOTH-BTPROTO_AVDTP",
67};
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010068
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020069void bt_sock_reclassify_lock(struct sock *sk, int proto)
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010070{
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020071 BUG_ON(!sk);
Hannes Frederic Sowafafc4e12016-04-08 15:11:27 +020072 BUG_ON(!sock_allow_reclassification(sk));
Marcel Holtmanndb7aa1c2008-11-30 12:17:19 +010073
74 sock_lock_init_class_and_name(sk,
75 bt_slock_key_strings[proto], &bt_slock_key[proto],
76 bt_key_strings[proto], &bt_lock_key[proto]);
77}
Octavian Purdilab5a30dd2012-01-22 00:28:34 +020078EXPORT_SYMBOL(bt_sock_reclassify_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070079
Stephen Hemmingerec1b4cf2009-10-05 05:58:39 +000080int bt_sock_register(int proto, const struct net_proto_family *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -070081{
Marcel Holtmann74da6262006-10-15 17:31:14 +020082 int err = 0;
83
Linus Torvalds1da177e2005-04-16 15:20:36 -070084 if (proto < 0 || proto >= BT_MAX_PROTO)
85 return -EINVAL;
86
Marcel Holtmann74da6262006-10-15 17:31:14 +020087 write_lock(&bt_proto_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -070088
Marcel Holtmann74da6262006-10-15 17:31:14 +020089 if (bt_proto[proto])
90 err = -EEXIST;
91 else
92 bt_proto[proto] = ops;
93
94 write_unlock(&bt_proto_lock);
95
96 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -070097}
98EXPORT_SYMBOL(bt_sock_register);
99
David Herrmannbe9f97f2013-02-24 19:36:52 +0100100void bt_sock_unregister(int proto)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700101{
102 if (proto < 0 || proto >= BT_MAX_PROTO)
David Herrmannbe9f97f2013-02-24 19:36:52 +0100103 return;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104
Marcel Holtmann74da6262006-10-15 17:31:14 +0200105 write_lock(&bt_proto_lock);
David Herrmannbe9f97f2013-02-24 19:36:52 +0100106 bt_proto[proto] = NULL;
Marcel Holtmann74da6262006-10-15 17:31:14 +0200107 write_unlock(&bt_proto_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108}
109EXPORT_SYMBOL(bt_sock_unregister);
110
Eric Paris3f378b62009-11-05 22:18:14 -0800111static int bt_sock_create(struct net *net, struct socket *sock, int proto,
112 int kern)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113{
Marcel Holtmann74da6262006-10-15 17:31:14 +0200114 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115
Eric W. Biederman1b8d7ae2007-10-08 23:24:22 -0700116 if (net != &init_net)
117 return -EAFNOSUPPORT;
118
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119 if (proto < 0 || proto >= BT_MAX_PROTO)
120 return -EINVAL;
121
Johannes Berg95a5afc2008-10-16 15:24:51 -0700122 if (!bt_proto[proto])
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123 request_module("bt-proto-%d", proto);
Marcel Holtmann74da6262006-10-15 17:31:14 +0200124
Linus Torvalds1da177e2005-04-16 15:20:36 -0700125 err = -EPROTONOSUPPORT;
Marcel Holtmann74da6262006-10-15 17:31:14 +0200126
127 read_lock(&bt_proto_lock);
128
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129 if (bt_proto[proto] && try_module_get(bt_proto[proto]->owner)) {
Eric Paris3f378b62009-11-05 22:18:14 -0800130 err = bt_proto[proto]->create(net, sock, proto, kern);
Octavian Purdilab5a30dd2012-01-22 00:28:34 +0200131 if (!err)
132 bt_sock_reclassify_lock(sock->sk, proto);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 module_put(bt_proto[proto]->owner);
134 }
Marcel Holtmann74da6262006-10-15 17:31:14 +0200135
136 read_unlock(&bt_proto_lock);
137
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900138 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139}
140
141void bt_sock_link(struct bt_sock_list *l, struct sock *sk)
142{
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200143 write_lock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 sk_add_node(sk, &l->head);
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200145 write_unlock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146}
147EXPORT_SYMBOL(bt_sock_link);
148
149void bt_sock_unlink(struct bt_sock_list *l, struct sock *sk)
150{
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200151 write_lock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152 sk_del_node_init(sk);
Gustavo F. Padovan94f5bfb2011-12-27 15:28:48 -0200153 write_unlock(&l->lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154}
155EXPORT_SYMBOL(bt_sock_unlink);
156
157void bt_accept_enqueue(struct sock *parent, struct sock *sk)
158{
159 BT_DBG("parent %p, sk %p", parent, sk);
160
161 sock_hold(sk);
Philipp Puschmannb71c69c2018-07-17 13:41:12 +0200162 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700163 list_add_tail(&bt_sk(sk)->accept_q, &bt_sk(parent)->accept_q);
164 bt_sk(sk)->parent = parent;
Dean Jenkinse1633762017-03-10 11:34:45 +0000165 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700166 parent->sk_ack_backlog++;
167}
168EXPORT_SYMBOL(bt_accept_enqueue);
169
Dean Jenkins27bfbc22017-03-10 11:34:46 +0000170/* Calling function must hold the sk lock.
171 * bt_sk(sk)->parent must be non-NULL meaning sk is in the parent list.
172 */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173void bt_accept_unlink(struct sock *sk)
174{
175 BT_DBG("sk %p state %d", sk, sk->sk_state);
176
177 list_del_init(&bt_sk(sk)->accept_q);
178 bt_sk(sk)->parent->sk_ack_backlog--;
179 bt_sk(sk)->parent = NULL;
180 sock_put(sk);
181}
182EXPORT_SYMBOL(bt_accept_unlink);
183
184struct sock *bt_accept_dequeue(struct sock *parent, struct socket *newsock)
185{
Geliang Tang7eb74042015-12-18 23:33:25 +0800186 struct bt_sock *s, *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187 struct sock *sk;
188
189 BT_DBG("parent %p", parent);
190
Dean Jenkins27bfbc22017-03-10 11:34:46 +0000191restart:
Geliang Tang7eb74042015-12-18 23:33:25 +0800192 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
193 sk = (struct sock *)s;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194
Dean Jenkins27bfbc22017-03-10 11:34:46 +0000195 /* Prevent early freeing of sk due to unlink and sock_kill */
196 sock_hold(sk);
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200197 lock_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198
Dean Jenkins27bfbc22017-03-10 11:34:46 +0000199 /* Check sk has not already been unlinked via
200 * bt_accept_unlink() due to serialisation caused by sk locking
201 */
202 if (!bt_sk(sk)->parent) {
203 BT_DBG("sk %p, already unlinked", sk);
204 release_sock(sk);
205 sock_put(sk);
206
207 /* Restart the loop as sk is no longer in the list
208 * and also avoid a potential infinite loop because
209 * list_for_each_entry_safe() is not thread safe.
210 */
211 goto restart;
212 }
213
214 /* sk is safely in the parent list so reduce reference count */
215 sock_put(sk);
216
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 /* FIXME: Is this check still needed */
218 if (sk->sk_state == BT_CLOSED) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219 bt_accept_unlink(sk);
Yichen Zhao1a11ec892015-12-01 11:11:01 -0800220 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700221 continue;
222 }
223
Marcel Holtmannc4f912e2009-01-15 21:52:16 +0100224 if (sk->sk_state == BT_CONNECTED || !newsock ||
Vinicius Costa Gomesd0609912012-05-31 22:53:39 -0300225 test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226 bt_accept_unlink(sk);
227 if (newsock)
228 sock_graft(sk, newsock);
Andrei Emeltchenkod37f50e2011-01-24 10:53:24 +0200229
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200230 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700231 return sk;
232 }
233
Gustavo F. Padovan8a154a82011-12-20 17:15:56 -0200234 release_sock(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235 }
Andrei Emeltchenkod37f50e2011-01-24 10:53:24 +0200236
Linus Torvalds1da177e2005-04-16 15:20:36 -0700237 return NULL;
238}
239EXPORT_SYMBOL(bt_accept_dequeue);
240
Ying Xue1b784142015-03-02 15:37:48 +0800241int bt_sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
242 int flags)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700243{
244 int noblock = flags & MSG_DONTWAIT;
245 struct sock *sk = sock->sk;
246 struct sk_buff *skb;
247 size_t copied;
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500248 size_t skblen;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249 int err;
250
Marcel Holtmanna418b892008-11-30 12:17:28 +0100251 BT_DBG("sock %p sk %p len %zu", sock, sk, len);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700252
Marcel Holtmannd94a6102015-10-25 22:45:18 +0100253 if (flags & MSG_OOB)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254 return -EOPNOTSUPP;
255
Andrei Emeltchenko5a08ecc2011-01-11 17:20:20 +0200256 skb = skb_recv_datagram(sk, flags, noblock, &err);
257 if (!skb) {
Hannes Frederic Sowaf3d33422013-11-21 03:14:22 +0100258 if (sk->sk_shutdown & RCV_SHUTDOWN)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259 return 0;
Hannes Frederic Sowaf3d33422013-11-21 03:14:22 +0100260
Linus Torvalds1da177e2005-04-16 15:20:36 -0700261 return err;
262 }
263
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500264 skblen = skb->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265 copied = skb->len;
266 if (len < copied) {
267 msg->msg_flags |= MSG_TRUNC;
268 copied = len;
269 }
270
Arnaldo Carvalho de Melobadff6d2007-03-13 13:06:52 -0300271 skb_reset_transport_header(skb);
David S. Miller51f3d022014-11-05 16:46:40 -0500272 err = skb_copy_datagram_msg(skb, 0, msg, copied);
Marcel Holtmannd9763692013-10-13 12:55:28 -0700273 if (err == 0) {
Neil Horman3b885782009-10-12 13:26:31 -0700274 sock_recv_ts_and_drops(msg, sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275
Ezequiel Garcia9dcbc312016-12-29 09:51:19 -0300276 if (msg->msg_name && bt_sk(sk)->skb_msg_name)
Marcel Holtmannd9763692013-10-13 12:55:28 -0700277 bt_sk(sk)->skb_msg_name(skb, msg->msg_name,
278 &msg->msg_namelen);
Marcel Holtmannd9763692013-10-13 12:55:28 -0700279 }
280
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281 skb_free_datagram(sk, skb);
282
Luiz Augusto von Dentz90a56f72016-08-12 15:11:28 +0300283 if (flags & MSG_TRUNC)
Denis Kenziorb5f34f92016-06-27 11:01:12 -0500284 copied = skblen;
285
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286 return err ? : copied;
287}
288EXPORT_SYMBOL(bt_sock_recvmsg);
289
Mat Martineau796c86e2010-09-08 10:05:27 -0700290static long bt_sock_data_wait(struct sock *sk, long timeo)
291{
292 DECLARE_WAITQUEUE(wait, current);
293
294 add_wait_queue(sk_sleep(sk), &wait);
295 for (;;) {
296 set_current_state(TASK_INTERRUPTIBLE);
297
298 if (!skb_queue_empty(&sk->sk_receive_queue))
299 break;
300
301 if (sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN))
302 break;
303
304 if (signal_pending(current) || !timeo)
305 break;
306
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800307 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
Mat Martineau796c86e2010-09-08 10:05:27 -0700308 release_sock(sk);
309 timeo = schedule_timeout(timeo);
310 lock_sock(sk);
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800311 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
Mat Martineau796c86e2010-09-08 10:05:27 -0700312 }
313
314 __set_current_state(TASK_RUNNING);
315 remove_wait_queue(sk_sleep(sk), &wait);
316 return timeo;
317}
318
Ying Xue1b784142015-03-02 15:37:48 +0800319int bt_sock_stream_recvmsg(struct socket *sock, struct msghdr *msg,
320 size_t size, int flags)
Mat Martineau796c86e2010-09-08 10:05:27 -0700321{
322 struct sock *sk = sock->sk;
323 int err = 0;
324 size_t target, copied = 0;
325 long timeo;
326
327 if (flags & MSG_OOB)
328 return -EOPNOTSUPP;
329
Mat Martineau796c86e2010-09-08 10:05:27 -0700330 BT_DBG("sk %p size %zu", sk, size);
331
332 lock_sock(sk);
333
334 target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
335 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
336
337 do {
338 struct sk_buff *skb;
339 int chunk;
340
341 skb = skb_dequeue(&sk->sk_receive_queue);
342 if (!skb) {
343 if (copied >= target)
344 break;
345
Andrei Emeltchenko5a08ecc2011-01-11 17:20:20 +0200346 err = sock_error(sk);
347 if (err)
Mat Martineau796c86e2010-09-08 10:05:27 -0700348 break;
349 if (sk->sk_shutdown & RCV_SHUTDOWN)
350 break;
351
352 err = -EAGAIN;
353 if (!timeo)
354 break;
355
356 timeo = bt_sock_data_wait(sk, timeo);
357
358 if (signal_pending(current)) {
359 err = sock_intr_errno(timeo);
360 goto out;
361 }
362 continue;
363 }
364
365 chunk = min_t(unsigned int, skb->len, size);
David S. Miller51f3d022014-11-05 16:46:40 -0500366 if (skb_copy_datagram_msg(skb, 0, msg, chunk)) {
Mat Martineau796c86e2010-09-08 10:05:27 -0700367 skb_queue_head(&sk->sk_receive_queue, skb);
368 if (!copied)
369 copied = -EFAULT;
370 break;
371 }
372 copied += chunk;
373 size -= chunk;
374
375 sock_recv_ts_and_drops(msg, sk, skb);
376
377 if (!(flags & MSG_PEEK)) {
Mat Martineau5b668eb2011-07-22 14:53:59 -0700378 int skb_len = skb_headlen(skb);
379
380 if (chunk <= skb_len) {
381 __skb_pull(skb, chunk);
382 } else {
383 struct sk_buff *frag;
384
385 __skb_pull(skb, skb_len);
386 chunk -= skb_len;
387
388 skb_walk_frags(skb, frag) {
389 if (chunk <= frag->len) {
390 /* Pulling partial data */
391 skb->len -= chunk;
392 skb->data_len -= chunk;
393 __skb_pull(frag, chunk);
394 break;
395 } else if (frag->len) {
396 /* Pulling all frag data */
397 chunk -= frag->len;
398 skb->len -= frag->len;
399 skb->data_len -= frag->len;
400 __skb_pull(frag, frag->len);
401 }
402 }
403 }
404
Mat Martineau796c86e2010-09-08 10:05:27 -0700405 if (skb->len) {
406 skb_queue_head(&sk->sk_receive_queue, skb);
407 break;
408 }
409 kfree_skb(skb);
410
411 } else {
412 /* put message back and return */
413 skb_queue_head(&sk->sk_receive_queue, skb);
414 break;
415 }
416 } while (size);
417
418out:
419 release_sock(sk);
420 return copied ? : err;
421}
422EXPORT_SYMBOL(bt_sock_stream_recvmsg);
423
Al Viroade994f2017-07-03 00:01:49 -0400424static inline __poll_t bt_accept_poll(struct sock *parent)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700425{
Geliang Tang7eb74042015-12-18 23:33:25 +0800426 struct bt_sock *s, *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700427 struct sock *sk;
428
Geliang Tang7eb74042015-12-18 23:33:25 +0800429 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
430 sk = (struct sock *)s;
Marcel Holtmannd5f2d2b2009-02-16 02:57:30 +0100431 if (sk->sk_state == BT_CONNECTED ||
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300432 (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags) &&
433 sk->sk_state == BT_CONNECT2))
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800434 return EPOLLIN | EPOLLRDNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700435 }
436
437 return 0;
438}
439
Linus Torvaldsa11e1d42018-06-28 09:43:44 -0700440__poll_t bt_sock_poll(struct file *file, struct socket *sock,
441 poll_table *wait)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700442{
443 struct sock *sk = sock->sk;
Al Viroade994f2017-07-03 00:01:49 -0400444 __poll_t mask = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700445
446 BT_DBG("sock %p, sk %p", sock, sk);
447
Linus Torvaldsa11e1d42018-06-28 09:43:44 -0700448 poll_wait(file, sk_sleep(sk), wait);
449
Linus Torvalds1da177e2005-04-16 15:20:36 -0700450 if (sk->sk_state == BT_LISTEN)
451 return bt_accept_poll(sk);
452
453 if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800454 mask |= EPOLLERR |
455 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? EPOLLPRI : 0);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700456
Davide Libenzif348d702006-03-25 03:07:39 -0800457 if (sk->sk_shutdown & RCV_SHUTDOWN)
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800458 mask |= EPOLLRDHUP | EPOLLIN | EPOLLRDNORM;
Davide Libenzif348d702006-03-25 03:07:39 -0800459
Linus Torvalds1da177e2005-04-16 15:20:36 -0700460 if (sk->sk_shutdown == SHUTDOWN_MASK)
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800461 mask |= EPOLLHUP;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700462
Eric Dumazetdb409802010-09-06 11:13:50 +0000463 if (!skb_queue_empty(&sk->sk_receive_queue))
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800464 mask |= EPOLLIN | EPOLLRDNORM;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465
466 if (sk->sk_state == BT_CLOSED)
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800467 mask |= EPOLLHUP;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700468
469 if (sk->sk_state == BT_CONNECT ||
470 sk->sk_state == BT_CONNECT2 ||
471 sk->sk_state == BT_CONFIG)
472 return mask;
473
Gustavo Padovanc5daa682012-05-16 12:17:10 -0300474 if (!test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags) && sock_writeable(sk))
Linus Torvaldsa9a08842018-02-11 14:34:03 -0800475 mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700476 else
Eric Dumazet9cd3e072015-11-29 20:03:10 -0800477 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700478
479 return mask;
480}
Linus Torvaldsa11e1d42018-06-28 09:43:44 -0700481EXPORT_SYMBOL(bt_sock_poll);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200483int bt_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
484{
485 struct sock *sk = sock->sk;
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200486 struct sk_buff *skb;
487 long amount;
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200488 int err;
489
490 BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
491
492 switch (cmd) {
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200493 case TIOCOUTQ:
494 if (sk->sk_state == BT_LISTEN)
495 return -EINVAL;
496
Eric Dumazet31e6d362009-06-17 19:05:41 -0700497 amount = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
Marcel Holtmann43cbeee2008-07-14 20:13:51 +0200498 if (amount < 0)
499 amount = 0;
500 err = put_user(amount, (int __user *) arg);
501 break;
502
503 case TIOCINQ:
504 if (sk->sk_state == BT_LISTEN)
505 return -EINVAL;
506
507 lock_sock(sk);
508 skb = skb_peek(&sk->sk_receive_queue);
509 amount = skb ? skb->len : 0;
510 release_sock(sk);
511 err = put_user(amount, (int __user *) arg);
512 break;
513
Marcel Holtmann3241ad82008-07-14 20:13:50 +0200514 case SIOCGSTAMP:
515 err = sock_get_timestamp(sk, (struct timeval __user *) arg);
516 break;
517
518 case SIOCGSTAMPNS:
519 err = sock_get_timestampns(sk, (struct timespec __user *) arg);
520 break;
521
522 default:
523 err = -ENOIOCTLCMD;
524 break;
525 }
526
527 return err;
528}
529EXPORT_SYMBOL(bt_sock_ioctl);
530
Johan Hedberg0fba96f2013-09-25 13:26:04 +0300531/* This function expects the sk lock to be held when called */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700532int bt_sock_wait_state(struct sock *sk, int state, unsigned long timeo)
533{
534 DECLARE_WAITQUEUE(wait, current);
535 int err = 0;
536
537 BT_DBG("sk %p", sk);
538
Eric Dumazetaa395142010-04-20 13:03:51 +0000539 add_wait_queue(sk_sleep(sk), &wait);
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400540 set_current_state(TASK_INTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541 while (sk->sk_state != state) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700542 if (!timeo) {
Marcel Holtmannb4c612a2006-09-23 09:54:38 +0200543 err = -EINPROGRESS;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700544 break;
545 }
546
547 if (signal_pending(current)) {
548 err = sock_intr_errno(timeo);
549 break;
550 }
551
552 release_sock(sk);
553 timeo = schedule_timeout(timeo);
554 lock_sock(sk);
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400555 set_current_state(TASK_INTERRUPTIBLE);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700556
Benjamin LaHaisec1cbe4b2005-12-13 23:22:19 -0800557 err = sock_error(sk);
558 if (err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700559 break;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700560 }
Peter Hurley9be4e3f2011-07-24 00:10:46 -0400561 __set_current_state(TASK_RUNNING);
Eric Dumazetaa395142010-04-20 13:03:51 +0000562 remove_wait_queue(sk_sleep(sk), &wait);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563 return err;
564}
565EXPORT_SYMBOL(bt_sock_wait_state);
566
Johan Hedberge793dcf2013-09-16 13:05:19 +0300567/* This function expects the sk lock to be held when called */
568int bt_sock_wait_ready(struct sock *sk, unsigned long flags)
569{
570 DECLARE_WAITQUEUE(wait, current);
571 unsigned long timeo;
572 int err = 0;
573
574 BT_DBG("sk %p", sk);
575
576 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
577
578 add_wait_queue(sk_sleep(sk), &wait);
579 set_current_state(TASK_INTERRUPTIBLE);
580 while (test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags)) {
581 if (!timeo) {
582 err = -EAGAIN;
583 break;
584 }
585
586 if (signal_pending(current)) {
587 err = sock_intr_errno(timeo);
588 break;
589 }
590
591 release_sock(sk);
592 timeo = schedule_timeout(timeo);
593 lock_sock(sk);
594 set_current_state(TASK_INTERRUPTIBLE);
595
596 err = sock_error(sk);
597 if (err)
598 break;
599 }
600 __set_current_state(TASK_RUNNING);
601 remove_wait_queue(sk_sleep(sk), &wait);
602
603 return err;
604}
605EXPORT_SYMBOL(bt_sock_wait_ready);
606
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900607#ifdef CONFIG_PROC_FS
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900608static void *bt_seq_start(struct seq_file *seq, loff_t *pos)
609 __acquires(seq->private->l->lock)
610{
Christoph Hellwiga9170e02018-04-15 10:27:22 +0200611 struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900612
613 read_lock(&l->lock);
614 return seq_hlist_start_head(&l->head, *pos);
615}
616
617static void *bt_seq_next(struct seq_file *seq, void *v, loff_t *pos)
618{
Christoph Hellwiga9170e02018-04-15 10:27:22 +0200619 struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900620
621 return seq_hlist_next(v, &l->head, pos);
622}
623
624static void bt_seq_stop(struct seq_file *seq, void *v)
625 __releases(seq->private->l->lock)
626{
Christoph Hellwiga9170e02018-04-15 10:27:22 +0200627 struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900628
629 read_unlock(&l->lock);
630}
631
632static int bt_seq_show(struct seq_file *seq, void *v)
633{
Christoph Hellwiga9170e02018-04-15 10:27:22 +0200634 struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900635
636 if (v == SEQ_START_TOKEN) {
Marcel Holtmannc5605752013-10-14 02:05:25 -0700637 seq_puts(seq ,"sk RefCnt Rmem Wmem User Inode Parent");
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900638
639 if (l->custom_seq_show) {
640 seq_putc(seq, ' ');
641 l->custom_seq_show(seq, v);
642 }
643
644 seq_putc(seq, '\n');
645 } else {
Andrei Emeltchenko09d5d4a2012-08-07 18:05:04 +0300646 struct sock *sk = sk_entry(v);
647 struct bt_sock *bt = bt_sk(sk);
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900648
Andrei Emeltchenko7028a882012-09-25 12:49:45 +0300649 seq_printf(seq,
Marcel Holtmann5f6cd792013-10-13 10:34:03 -0700650 "%pK %-6d %-6u %-6u %-6u %-6lu %-6lu",
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900651 sk,
Reshetova, Elena41c6d652017-06-30 13:08:01 +0300652 refcount_read(&sk->sk_refcnt),
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900653 sk_rmem_alloc_get(sk),
654 sk_wmem_alloc_get(sk),
Eric W. Biederman1bbb3092012-10-03 20:32:17 -0700655 from_kuid(seq_user_ns(seq), sock_i_uid(sk)),
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900656 sock_i_ino(sk),
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900657 bt->parent? sock_i_ino(bt->parent): 0LU);
658
659 if (l->custom_seq_show) {
660 seq_putc(seq, ' ');
661 l->custom_seq_show(seq, v);
662 }
663
664 seq_putc(seq, '\n');
665 }
666 return 0;
667}
668
Fabian Frederick26b0f4e2014-06-30 19:26:23 +0200669static const struct seq_operations bt_seq_ops = {
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900670 .start = bt_seq_start,
671 .next = bt_seq_next,
672 .stop = bt_seq_stop,
673 .show = bt_seq_show,
674};
675
Al Virob0316612013-04-04 19:14:33 -0400676int bt_procfs_init(struct net *net, const char *name,
Prasanna Karthikf37590b2015-11-17 11:06:53 +0000677 struct bt_sock_list *sk_list,
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900678 int (* seq_show)(struct seq_file *, void *))
679{
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900680 sk_list->custom_seq_show = seq_show;
681
Christoph Hellwiga9170e02018-04-15 10:27:22 +0200682 if (!proc_create_seq_data(name, 0, net->proc_net, &bt_seq_ops, sk_list))
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900683 return -ENOMEM;
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900684 return 0;
685}
686
687void bt_procfs_cleanup(struct net *net, const char *name)
688{
Gao fengece31ff2013-02-18 01:34:56 +0000689 remove_proc_entry(name, net->proc_net);
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900690}
691#else
Al Virob0316612013-04-04 19:14:33 -0400692int bt_procfs_init(struct net *net, const char *name,
Prasanna Karthikf37590b2015-11-17 11:06:53 +0000693 struct bt_sock_list *sk_list,
Masatake YAMATO256a06c2012-07-26 01:26:32 +0900694 int (* seq_show)(struct seq_file *, void *))
695{
696 return 0;
697}
698
699void bt_procfs_cleanup(struct net *net, const char *name)
700{
701}
702#endif
703EXPORT_SYMBOL(bt_procfs_init);
704EXPORT_SYMBOL(bt_procfs_cleanup);
705
linzhang173e7832017-05-15 10:26:47 +0800706static const struct net_proto_family bt_sock_family_ops = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700707 .owner = THIS_MODULE,
708 .family = PF_BLUETOOTH,
709 .create = bt_sock_create,
710};
711
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700712struct dentry *bt_debugfs;
713EXPORT_SYMBOL_GPL(bt_debugfs);
714
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200715#define VERSION __stringify(BT_SUBSYS_VERSION) "." \
716 __stringify(BT_SUBSYS_REVISION)
717
Linus Torvalds1da177e2005-04-16 15:20:36 -0700718static int __init bt_init(void)
719{
Marcel Holtmann27d35282006-07-03 10:02:37 +0200720 int err;
721
Eyal Birgerb4772ef2015-03-01 14:58:29 +0200722 sock_skb_cb_check_size(sizeof(struct bt_skb_cb));
Marcel Holtmann7cb9d202014-09-14 22:50:46 +0200723
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200724 BT_INFO("Core ver %s", VERSION);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700725
Marcel Holtmannee485292014-12-29 20:48:35 -0800726 err = bt_selftest();
727 if (err < 0)
728 return err;
729
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700730 bt_debugfs = debugfs_create_dir("bluetooth", NULL);
731
Marcel Holtmanne64c97b2016-07-21 14:12:41 +0200732 bt_leds_init();
733
Marcel Holtmann27d35282006-07-03 10:02:37 +0200734 err = bt_sysfs_init();
735 if (err < 0)
736 return err;
737
738 err = sock_register(&bt_sock_family_ops);
Markus Elfring1b259902017-11-08 08:03:04 +0100739 if (err)
740 goto cleanup_sysfs;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700741
742 BT_INFO("HCI device and connection manager initialized");
743
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200744 err = hci_sock_init();
Markus Elfring1b259902017-11-08 08:03:04 +0100745 if (err)
746 goto unregister_socket;
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200747
748 err = l2cap_init();
Markus Elfring1b259902017-11-08 08:03:04 +0100749 if (err)
750 goto cleanup_socket;
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200751
752 err = sco_init();
Markus Elfring1b259902017-11-08 08:03:04 +0100753 if (err)
754 goto cleanup_cap;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700755
Johan Hedberg6d785aa32015-03-06 21:08:51 +0200756 err = mgmt_init();
Markus Elfring1b259902017-11-08 08:03:04 +0100757 if (err)
758 goto cleanup_sco;
Johan Hedberg6d785aa32015-03-06 21:08:51 +0200759
Linus Torvalds1da177e2005-04-16 15:20:36 -0700760 return 0;
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200761
Markus Elfring1b259902017-11-08 08:03:04 +0100762cleanup_sco:
763 sco_exit();
764cleanup_cap:
765 l2cap_exit();
766cleanup_socket:
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200767 hci_sock_cleanup();
Markus Elfring1b259902017-11-08 08:03:04 +0100768unregister_socket:
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200769 sock_unregister(PF_BLUETOOTH);
Markus Elfring1b259902017-11-08 08:03:04 +0100770cleanup_sysfs:
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200771 bt_sysfs_cleanup();
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200772 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700773}
774
775static void __exit bt_exit(void)
776{
Johan Hedberg6d785aa32015-03-06 21:08:51 +0200777 mgmt_exit();
778
Gustavo F. Padovan64274512011-02-07 20:08:52 -0200779 sco_exit();
780
781 l2cap_exit();
782
Linus Torvalds1da177e2005-04-16 15:20:36 -0700783 hci_sock_cleanup();
784
Linus Torvalds1da177e2005-04-16 15:20:36 -0700785 sock_unregister(PF_BLUETOOTH);
Marcel Holtmann27d35282006-07-03 10:02:37 +0200786
787 bt_sysfs_cleanup();
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700788
Marcel Holtmanne64c97b2016-07-21 14:12:41 +0200789 bt_leds_cleanup();
790
Marcel Holtmannffcecac2013-10-17 17:24:18 -0700791 debugfs_remove_recursive(bt_debugfs);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792}
793
794subsys_initcall(bt_init);
795module_exit(bt_exit);
796
Marcel Holtmann63fbd242008-08-18 13:23:53 +0200797MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
Marcel Holtmann9e8305b2016-08-30 05:00:35 +0200798MODULE_DESCRIPTION("Bluetooth Core ver " VERSION);
799MODULE_VERSION(VERSION);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700800MODULE_LICENSE("GPL");
801MODULE_ALIAS_NETPROTO(PF_BLUETOOTH);