11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds HIDP implementation for Linux Bluetooth stack (BlueZ). 31da177e4SLinus Torvalds Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org> 41da177e4SLinus Torvalds 51da177e4SLinus Torvalds This program is free software; you can redistribute it and/or modify 61da177e4SLinus Torvalds it under the terms of the GNU General Public License version 2 as 71da177e4SLinus Torvalds published by the Free Software Foundation; 81da177e4SLinus Torvalds 91da177e4SLinus Torvalds THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS 101da177e4SLinus Torvalds OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 111da177e4SLinus Torvalds FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. 121da177e4SLinus Torvalds IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY 131da177e4SLinus Torvalds CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES 141da177e4SLinus Torvalds WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 151da177e4SLinus Torvalds ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 161da177e4SLinus Torvalds OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 171da177e4SLinus Torvalds 181da177e4SLinus Torvalds ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, 191da177e4SLinus Torvalds COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS 201da177e4SLinus Torvalds SOFTWARE IS DISCLAIMED. 211da177e4SLinus Torvalds */ 221da177e4SLinus Torvalds 238c520a59SGustavo Padovan #include <linux/export.h> 241da177e4SLinus Torvalds #include <linux/file.h> 251da177e4SLinus Torvalds 261da177e4SLinus Torvalds #include "hidp.h" 271da177e4SLinus Torvalds 28*5c6ad8eeSMasatake YAMATO static struct bt_sock_list hidp_sk_list = { 29*5c6ad8eeSMasatake YAMATO .lock = __RW_LOCK_UNLOCKED(hidp_sk_list.lock) 30*5c6ad8eeSMasatake YAMATO }; 31*5c6ad8eeSMasatake YAMATO 321da177e4SLinus Torvalds static int hidp_sock_release(struct socket *sock) 331da177e4SLinus Torvalds { 341da177e4SLinus Torvalds struct sock *sk = sock->sk; 351da177e4SLinus Torvalds 361da177e4SLinus Torvalds BT_DBG("sock %p sk %p", sock, sk); 371da177e4SLinus Torvalds 381da177e4SLinus Torvalds if (!sk) 391da177e4SLinus Torvalds return 0; 401da177e4SLinus Torvalds 41*5c6ad8eeSMasatake YAMATO bt_sock_unlink(&hidp_sk_list, sk); 42*5c6ad8eeSMasatake YAMATO 431da177e4SLinus Torvalds sock_orphan(sk); 441da177e4SLinus Torvalds sock_put(sk); 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds return 0; 471da177e4SLinus Torvalds } 481da177e4SLinus Torvalds 491da177e4SLinus Torvalds static int hidp_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) 501da177e4SLinus Torvalds { 511da177e4SLinus Torvalds void __user *argp = (void __user *) arg; 521da177e4SLinus Torvalds struct hidp_connadd_req ca; 531da177e4SLinus Torvalds struct hidp_conndel_req cd; 541da177e4SLinus Torvalds struct hidp_connlist_req cl; 551da177e4SLinus Torvalds struct hidp_conninfo ci; 561da177e4SLinus Torvalds struct socket *csock; 571da177e4SLinus Torvalds struct socket *isock; 581da177e4SLinus Torvalds int err; 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds BT_DBG("cmd %x arg %lx", cmd, arg); 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds switch (cmd) { 631da177e4SLinus Torvalds case HIDPCONNADD: 641da177e4SLinus Torvalds if (!capable(CAP_NET_ADMIN)) 651da177e4SLinus Torvalds return -EACCES; 661da177e4SLinus Torvalds 671da177e4SLinus Torvalds if (copy_from_user(&ca, argp, sizeof(ca))) 681da177e4SLinus Torvalds return -EFAULT; 691da177e4SLinus Torvalds 701da177e4SLinus Torvalds csock = sockfd_lookup(ca.ctrl_sock, &err); 711da177e4SLinus Torvalds if (!csock) 721da177e4SLinus Torvalds return err; 731da177e4SLinus Torvalds 741da177e4SLinus Torvalds isock = sockfd_lookup(ca.intr_sock, &err); 751da177e4SLinus Torvalds if (!isock) { 7667b23219SJulia Lawall sockfd_put(csock); 771da177e4SLinus Torvalds return err; 781da177e4SLinus Torvalds } 791da177e4SLinus Torvalds 8017f09a7eSSzymon Janc if (csock->sk->sk_state != BT_CONNECTED || 8117f09a7eSSzymon Janc isock->sk->sk_state != BT_CONNECTED) { 8267b23219SJulia Lawall sockfd_put(csock); 8367b23219SJulia Lawall sockfd_put(isock); 841da177e4SLinus Torvalds return -EBADFD; 851da177e4SLinus Torvalds } 861da177e4SLinus Torvalds 871da177e4SLinus Torvalds err = hidp_add_connection(&ca, csock, isock); 881da177e4SLinus Torvalds if (!err) { 891da177e4SLinus Torvalds if (copy_to_user(argp, &ca, sizeof(ca))) 901da177e4SLinus Torvalds err = -EFAULT; 911da177e4SLinus Torvalds } else { 9267b23219SJulia Lawall sockfd_put(csock); 9367b23219SJulia Lawall sockfd_put(isock); 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds 961da177e4SLinus Torvalds return err; 971da177e4SLinus Torvalds 981da177e4SLinus Torvalds case HIDPCONNDEL: 991da177e4SLinus Torvalds if (!capable(CAP_NET_ADMIN)) 1001da177e4SLinus Torvalds return -EACCES; 1011da177e4SLinus Torvalds 1021da177e4SLinus Torvalds if (copy_from_user(&cd, argp, sizeof(cd))) 1031da177e4SLinus Torvalds return -EFAULT; 1041da177e4SLinus Torvalds 1051da177e4SLinus Torvalds return hidp_del_connection(&cd); 1061da177e4SLinus Torvalds 1071da177e4SLinus Torvalds case HIDPGETCONNLIST: 1081da177e4SLinus Torvalds if (copy_from_user(&cl, argp, sizeof(cl))) 1091da177e4SLinus Torvalds return -EFAULT; 1101da177e4SLinus Torvalds 1111da177e4SLinus Torvalds if (cl.cnum <= 0) 1121da177e4SLinus Torvalds return -EINVAL; 1131da177e4SLinus Torvalds 1141da177e4SLinus Torvalds err = hidp_get_connlist(&cl); 1151da177e4SLinus Torvalds if (!err && copy_to_user(argp, &cl, sizeof(cl))) 1161da177e4SLinus Torvalds return -EFAULT; 1171da177e4SLinus Torvalds 1181da177e4SLinus Torvalds return err; 1191da177e4SLinus Torvalds 1201da177e4SLinus Torvalds case HIDPGETCONNINFO: 1211da177e4SLinus Torvalds if (copy_from_user(&ci, argp, sizeof(ci))) 1221da177e4SLinus Torvalds return -EFAULT; 1231da177e4SLinus Torvalds 1241da177e4SLinus Torvalds err = hidp_get_conninfo(&ci); 1251da177e4SLinus Torvalds if (!err && copy_to_user(argp, &ci, sizeof(ci))) 1261da177e4SLinus Torvalds return -EFAULT; 1271da177e4SLinus Torvalds 1281da177e4SLinus Torvalds return err; 1291da177e4SLinus Torvalds } 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds return -EINVAL; 1321da177e4SLinus Torvalds } 1331da177e4SLinus Torvalds 134e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT 135e9c5702eSMarcel Holtmann struct compat_hidp_connadd_req { 13617f09a7eSSzymon Janc int ctrl_sock; /* Connected control socket */ 13717f09a7eSSzymon Janc int intr_sock; /* Connected interrupt socket */ 138e9c5702eSMarcel Holtmann __u16 parser; 139e9c5702eSMarcel Holtmann __u16 rd_size; 140e9c5702eSMarcel Holtmann compat_uptr_t rd_data; 141e9c5702eSMarcel Holtmann __u8 country; 142e9c5702eSMarcel Holtmann __u8 subclass; 143e9c5702eSMarcel Holtmann __u16 vendor; 144e9c5702eSMarcel Holtmann __u16 product; 145e9c5702eSMarcel Holtmann __u16 version; 146e9c5702eSMarcel Holtmann __u32 flags; 147e9c5702eSMarcel Holtmann __u32 idle_to; 148e9c5702eSMarcel Holtmann char name[128]; 149e9c5702eSMarcel Holtmann }; 150e9c5702eSMarcel Holtmann 151e9c5702eSMarcel Holtmann static int hidp_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) 152e9c5702eSMarcel Holtmann { 153e9c5702eSMarcel Holtmann if (cmd == HIDPGETCONNLIST) { 154e9c5702eSMarcel Holtmann struct hidp_connlist_req cl; 155816a11d5SJohan Hedberg u32 uci; 156e9c5702eSMarcel Holtmann int err; 157e9c5702eSMarcel Holtmann 158816a11d5SJohan Hedberg if (get_user(cl.cnum, (u32 __user *) arg) || 159e9c5702eSMarcel Holtmann get_user(uci, (u32 __user *) (arg + 4))) 160e9c5702eSMarcel Holtmann return -EFAULT; 161e9c5702eSMarcel Holtmann 162e9c5702eSMarcel Holtmann cl.ci = compat_ptr(uci); 163e9c5702eSMarcel Holtmann 164e9c5702eSMarcel Holtmann if (cl.cnum <= 0) 165e9c5702eSMarcel Holtmann return -EINVAL; 166e9c5702eSMarcel Holtmann 167e9c5702eSMarcel Holtmann err = hidp_get_connlist(&cl); 168e9c5702eSMarcel Holtmann 169816a11d5SJohan Hedberg if (!err && put_user(cl.cnum, (u32 __user *) arg)) 170e9c5702eSMarcel Holtmann err = -EFAULT; 171e9c5702eSMarcel Holtmann 172e9c5702eSMarcel Holtmann return err; 173e9c5702eSMarcel Holtmann } else if (cmd == HIDPCONNADD) { 174e9c5702eSMarcel Holtmann struct compat_hidp_connadd_req ca; 175e9c5702eSMarcel Holtmann struct hidp_connadd_req __user *uca; 176e9c5702eSMarcel Holtmann 177e9c5702eSMarcel Holtmann uca = compat_alloc_user_space(sizeof(*uca)); 178e9c5702eSMarcel Holtmann 17955e74744SAl Viro if (copy_from_user(&ca, (void __user *) arg, sizeof(ca))) 180e9c5702eSMarcel Holtmann return -EFAULT; 181e9c5702eSMarcel Holtmann 182e9c5702eSMarcel Holtmann if (put_user(ca.ctrl_sock, &uca->ctrl_sock) || 183e9c5702eSMarcel Holtmann put_user(ca.intr_sock, &uca->intr_sock) || 184e9c5702eSMarcel Holtmann put_user(ca.parser, &uca->parser) || 185a83d6c0dSMarcel Holtmann put_user(ca.rd_size, &uca->rd_size) || 186e9c5702eSMarcel Holtmann put_user(compat_ptr(ca.rd_data), &uca->rd_data) || 187e9c5702eSMarcel Holtmann put_user(ca.country, &uca->country) || 188e9c5702eSMarcel Holtmann put_user(ca.subclass, &uca->subclass) || 189e9c5702eSMarcel Holtmann put_user(ca.vendor, &uca->vendor) || 190e9c5702eSMarcel Holtmann put_user(ca.product, &uca->product) || 191e9c5702eSMarcel Holtmann put_user(ca.version, &uca->version) || 192e9c5702eSMarcel Holtmann put_user(ca.flags, &uca->flags) || 193e9c5702eSMarcel Holtmann put_user(ca.idle_to, &uca->idle_to) || 194e9c5702eSMarcel Holtmann copy_to_user(&uca->name[0], &ca.name[0], 128)) 195e9c5702eSMarcel Holtmann return -EFAULT; 196e9c5702eSMarcel Holtmann 197e9c5702eSMarcel Holtmann arg = (unsigned long) uca; 198e9c5702eSMarcel Holtmann 199e9c5702eSMarcel Holtmann /* Fall through. We don't actually write back any _changes_ 200e9c5702eSMarcel Holtmann to the structure anyway, so there's no need to copy back 201e9c5702eSMarcel Holtmann into the original compat version */ 202e9c5702eSMarcel Holtmann } 203e9c5702eSMarcel Holtmann 204e9c5702eSMarcel Holtmann return hidp_sock_ioctl(sock, cmd, arg); 205e9c5702eSMarcel Holtmann } 206e9c5702eSMarcel Holtmann #endif 207e9c5702eSMarcel Holtmann 20890ddc4f0SEric Dumazet static const struct proto_ops hidp_sock_ops = { 2091da177e4SLinus Torvalds .family = PF_BLUETOOTH, 2101da177e4SLinus Torvalds .owner = THIS_MODULE, 2111da177e4SLinus Torvalds .release = hidp_sock_release, 2121da177e4SLinus Torvalds .ioctl = hidp_sock_ioctl, 213e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT 214e9c5702eSMarcel Holtmann .compat_ioctl = hidp_sock_compat_ioctl, 215e9c5702eSMarcel Holtmann #endif 2161da177e4SLinus Torvalds .bind = sock_no_bind, 2171da177e4SLinus Torvalds .getname = sock_no_getname, 2181da177e4SLinus Torvalds .sendmsg = sock_no_sendmsg, 2191da177e4SLinus Torvalds .recvmsg = sock_no_recvmsg, 2201da177e4SLinus Torvalds .poll = sock_no_poll, 2211da177e4SLinus Torvalds .listen = sock_no_listen, 2221da177e4SLinus Torvalds .shutdown = sock_no_shutdown, 2231da177e4SLinus Torvalds .setsockopt = sock_no_setsockopt, 2241da177e4SLinus Torvalds .getsockopt = sock_no_getsockopt, 2251da177e4SLinus Torvalds .connect = sock_no_connect, 2261da177e4SLinus Torvalds .socketpair = sock_no_socketpair, 2271da177e4SLinus Torvalds .accept = sock_no_accept, 2281da177e4SLinus Torvalds .mmap = sock_no_mmap 2291da177e4SLinus Torvalds }; 2301da177e4SLinus Torvalds 2311da177e4SLinus Torvalds static struct proto hidp_proto = { 2321da177e4SLinus Torvalds .name = "HIDP", 2331da177e4SLinus Torvalds .owner = THIS_MODULE, 2341da177e4SLinus Torvalds .obj_size = sizeof(struct bt_sock) 2351da177e4SLinus Torvalds }; 2361da177e4SLinus Torvalds 2373f378b68SEric Paris static int hidp_sock_create(struct net *net, struct socket *sock, int protocol, 2383f378b68SEric Paris int kern) 2391da177e4SLinus Torvalds { 2401da177e4SLinus Torvalds struct sock *sk; 2411da177e4SLinus Torvalds 2421da177e4SLinus Torvalds BT_DBG("sock %p", sock); 2431da177e4SLinus Torvalds 2441da177e4SLinus Torvalds if (sock->type != SOCK_RAW) 2451da177e4SLinus Torvalds return -ESOCKTNOSUPPORT; 2461da177e4SLinus Torvalds 2476257ff21SPavel Emelyanov sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hidp_proto); 2481da177e4SLinus Torvalds if (!sk) 2491da177e4SLinus Torvalds return -ENOMEM; 2501da177e4SLinus Torvalds 2511da177e4SLinus Torvalds sock_init_data(sock, sk); 2521da177e4SLinus Torvalds 2531da177e4SLinus Torvalds sock->ops = &hidp_sock_ops; 2541da177e4SLinus Torvalds 2551da177e4SLinus Torvalds sock->state = SS_UNCONNECTED; 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds sock_reset_flag(sk, SOCK_ZAPPED); 2581da177e4SLinus Torvalds 2591da177e4SLinus Torvalds sk->sk_protocol = protocol; 2601da177e4SLinus Torvalds sk->sk_state = BT_OPEN; 2611da177e4SLinus Torvalds 262*5c6ad8eeSMasatake YAMATO bt_sock_link(&hidp_sk_list, sk); 263*5c6ad8eeSMasatake YAMATO 2641da177e4SLinus Torvalds return 0; 2651da177e4SLinus Torvalds } 2661da177e4SLinus Torvalds 267ec1b4cf7SStephen Hemminger static const struct net_proto_family hidp_sock_family_ops = { 2681da177e4SLinus Torvalds .family = PF_BLUETOOTH, 2691da177e4SLinus Torvalds .owner = THIS_MODULE, 2701da177e4SLinus Torvalds .create = hidp_sock_create 2711da177e4SLinus Torvalds }; 2721da177e4SLinus Torvalds 2731da177e4SLinus Torvalds int __init hidp_init_sockets(void) 2741da177e4SLinus Torvalds { 2751da177e4SLinus Torvalds int err; 2761da177e4SLinus Torvalds 2771da177e4SLinus Torvalds err = proto_register(&hidp_proto, 0); 2781da177e4SLinus Torvalds if (err < 0) 2791da177e4SLinus Torvalds return err; 2801da177e4SLinus Torvalds 2811da177e4SLinus Torvalds err = bt_sock_register(BTPROTO_HIDP, &hidp_sock_family_ops); 282*5c6ad8eeSMasatake YAMATO if (err < 0) { 283*5c6ad8eeSMasatake YAMATO BT_ERR("Can't register HIDP socket"); 2841da177e4SLinus Torvalds goto error; 285*5c6ad8eeSMasatake YAMATO } 286*5c6ad8eeSMasatake YAMATO 287*5c6ad8eeSMasatake YAMATO err = bt_procfs_init(THIS_MODULE, &init_net, "hidp", &hidp_sk_list, NULL); 288*5c6ad8eeSMasatake YAMATO if (err < 0) { 289*5c6ad8eeSMasatake YAMATO BT_ERR("Failed to create HIDP proc file"); 290*5c6ad8eeSMasatake YAMATO bt_sock_unregister(BTPROTO_HIDP); 291*5c6ad8eeSMasatake YAMATO goto error; 292*5c6ad8eeSMasatake YAMATO } 293*5c6ad8eeSMasatake YAMATO 294*5c6ad8eeSMasatake YAMATO BT_INFO("HIDP socket layer initialized"); 2951da177e4SLinus Torvalds 2961da177e4SLinus Torvalds return 0; 2971da177e4SLinus Torvalds 2981da177e4SLinus Torvalds error: 2991da177e4SLinus Torvalds BT_ERR("Can't register HIDP socket"); 3001da177e4SLinus Torvalds proto_unregister(&hidp_proto); 3011da177e4SLinus Torvalds return err; 3021da177e4SLinus Torvalds } 3031da177e4SLinus Torvalds 3041da177e4SLinus Torvalds void __exit hidp_cleanup_sockets(void) 3051da177e4SLinus Torvalds { 306*5c6ad8eeSMasatake YAMATO bt_procfs_cleanup(&init_net, "hidp"); 3071da177e4SLinus Torvalds if (bt_sock_unregister(BTPROTO_HIDP) < 0) 3081da177e4SLinus Torvalds BT_ERR("Can't unregister HIDP socket"); 3091da177e4SLinus Torvalds 3101da177e4SLinus Torvalds proto_unregister(&hidp_proto); 3111da177e4SLinus Torvalds } 312