xref: /openbmc/linux/net/bluetooth/hidp/sock.c (revision 5c6ad8eee0a8c5fb4ba8b741008490da9eb66af6)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds    HIDP implementation for Linux Bluetooth stack (BlueZ).
31da177e4SLinus Torvalds    Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>
41da177e4SLinus Torvalds 
51da177e4SLinus Torvalds    This program is free software; you can redistribute it and/or modify
61da177e4SLinus Torvalds    it under the terms of the GNU General Public License version 2 as
71da177e4SLinus Torvalds    published by the Free Software Foundation;
81da177e4SLinus Torvalds 
91da177e4SLinus Torvalds    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
101da177e4SLinus Torvalds    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
111da177e4SLinus Torvalds    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
121da177e4SLinus Torvalds    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
131da177e4SLinus Torvalds    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
141da177e4SLinus Torvalds    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
151da177e4SLinus Torvalds    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
161da177e4SLinus Torvalds    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
171da177e4SLinus Torvalds 
181da177e4SLinus Torvalds    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
191da177e4SLinus Torvalds    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
201da177e4SLinus Torvalds    SOFTWARE IS DISCLAIMED.
211da177e4SLinus Torvalds */
221da177e4SLinus Torvalds 
238c520a59SGustavo Padovan #include <linux/export.h>
241da177e4SLinus Torvalds #include <linux/file.h>
251da177e4SLinus Torvalds 
261da177e4SLinus Torvalds #include "hidp.h"
271da177e4SLinus Torvalds 
28*5c6ad8eeSMasatake YAMATO static struct bt_sock_list hidp_sk_list = {
29*5c6ad8eeSMasatake YAMATO 	.lock = __RW_LOCK_UNLOCKED(hidp_sk_list.lock)
30*5c6ad8eeSMasatake YAMATO };
31*5c6ad8eeSMasatake YAMATO 
321da177e4SLinus Torvalds static int hidp_sock_release(struct socket *sock)
331da177e4SLinus Torvalds {
341da177e4SLinus Torvalds 	struct sock *sk = sock->sk;
351da177e4SLinus Torvalds 
361da177e4SLinus Torvalds 	BT_DBG("sock %p sk %p", sock, sk);
371da177e4SLinus Torvalds 
381da177e4SLinus Torvalds 	if (!sk)
391da177e4SLinus Torvalds 		return 0;
401da177e4SLinus Torvalds 
41*5c6ad8eeSMasatake YAMATO 	bt_sock_unlink(&hidp_sk_list, sk);
42*5c6ad8eeSMasatake YAMATO 
431da177e4SLinus Torvalds 	sock_orphan(sk);
441da177e4SLinus Torvalds 	sock_put(sk);
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds 	return 0;
471da177e4SLinus Torvalds }
481da177e4SLinus Torvalds 
491da177e4SLinus Torvalds static int hidp_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
501da177e4SLinus Torvalds {
511da177e4SLinus Torvalds 	void __user *argp = (void __user *) arg;
521da177e4SLinus Torvalds 	struct hidp_connadd_req ca;
531da177e4SLinus Torvalds 	struct hidp_conndel_req cd;
541da177e4SLinus Torvalds 	struct hidp_connlist_req cl;
551da177e4SLinus Torvalds 	struct hidp_conninfo ci;
561da177e4SLinus Torvalds 	struct socket *csock;
571da177e4SLinus Torvalds 	struct socket *isock;
581da177e4SLinus Torvalds 	int err;
591da177e4SLinus Torvalds 
601da177e4SLinus Torvalds 	BT_DBG("cmd %x arg %lx", cmd, arg);
611da177e4SLinus Torvalds 
621da177e4SLinus Torvalds 	switch (cmd) {
631da177e4SLinus Torvalds 	case HIDPCONNADD:
641da177e4SLinus Torvalds 		if (!capable(CAP_NET_ADMIN))
651da177e4SLinus Torvalds 			return -EACCES;
661da177e4SLinus Torvalds 
671da177e4SLinus Torvalds 		if (copy_from_user(&ca, argp, sizeof(ca)))
681da177e4SLinus Torvalds 			return -EFAULT;
691da177e4SLinus Torvalds 
701da177e4SLinus Torvalds 		csock = sockfd_lookup(ca.ctrl_sock, &err);
711da177e4SLinus Torvalds 		if (!csock)
721da177e4SLinus Torvalds 			return err;
731da177e4SLinus Torvalds 
741da177e4SLinus Torvalds 		isock = sockfd_lookup(ca.intr_sock, &err);
751da177e4SLinus Torvalds 		if (!isock) {
7667b23219SJulia Lawall 			sockfd_put(csock);
771da177e4SLinus Torvalds 			return err;
781da177e4SLinus Torvalds 		}
791da177e4SLinus Torvalds 
8017f09a7eSSzymon Janc 		if (csock->sk->sk_state != BT_CONNECTED ||
8117f09a7eSSzymon Janc 				isock->sk->sk_state != BT_CONNECTED) {
8267b23219SJulia Lawall 			sockfd_put(csock);
8367b23219SJulia Lawall 			sockfd_put(isock);
841da177e4SLinus Torvalds 			return -EBADFD;
851da177e4SLinus Torvalds 		}
861da177e4SLinus Torvalds 
871da177e4SLinus Torvalds 		err = hidp_add_connection(&ca, csock, isock);
881da177e4SLinus Torvalds 		if (!err) {
891da177e4SLinus Torvalds 			if (copy_to_user(argp, &ca, sizeof(ca)))
901da177e4SLinus Torvalds 				err = -EFAULT;
911da177e4SLinus Torvalds 		} else {
9267b23219SJulia Lawall 			sockfd_put(csock);
9367b23219SJulia Lawall 			sockfd_put(isock);
941da177e4SLinus Torvalds 		}
951da177e4SLinus Torvalds 
961da177e4SLinus Torvalds 		return err;
971da177e4SLinus Torvalds 
981da177e4SLinus Torvalds 	case HIDPCONNDEL:
991da177e4SLinus Torvalds 		if (!capable(CAP_NET_ADMIN))
1001da177e4SLinus Torvalds 			return -EACCES;
1011da177e4SLinus Torvalds 
1021da177e4SLinus Torvalds 		if (copy_from_user(&cd, argp, sizeof(cd)))
1031da177e4SLinus Torvalds 			return -EFAULT;
1041da177e4SLinus Torvalds 
1051da177e4SLinus Torvalds 		return hidp_del_connection(&cd);
1061da177e4SLinus Torvalds 
1071da177e4SLinus Torvalds 	case HIDPGETCONNLIST:
1081da177e4SLinus Torvalds 		if (copy_from_user(&cl, argp, sizeof(cl)))
1091da177e4SLinus Torvalds 			return -EFAULT;
1101da177e4SLinus Torvalds 
1111da177e4SLinus Torvalds 		if (cl.cnum <= 0)
1121da177e4SLinus Torvalds 			return -EINVAL;
1131da177e4SLinus Torvalds 
1141da177e4SLinus Torvalds 		err = hidp_get_connlist(&cl);
1151da177e4SLinus Torvalds 		if (!err && copy_to_user(argp, &cl, sizeof(cl)))
1161da177e4SLinus Torvalds 			return -EFAULT;
1171da177e4SLinus Torvalds 
1181da177e4SLinus Torvalds 		return err;
1191da177e4SLinus Torvalds 
1201da177e4SLinus Torvalds 	case HIDPGETCONNINFO:
1211da177e4SLinus Torvalds 		if (copy_from_user(&ci, argp, sizeof(ci)))
1221da177e4SLinus Torvalds 			return -EFAULT;
1231da177e4SLinus Torvalds 
1241da177e4SLinus Torvalds 		err = hidp_get_conninfo(&ci);
1251da177e4SLinus Torvalds 		if (!err && copy_to_user(argp, &ci, sizeof(ci)))
1261da177e4SLinus Torvalds 			return -EFAULT;
1271da177e4SLinus Torvalds 
1281da177e4SLinus Torvalds 		return err;
1291da177e4SLinus Torvalds 	}
1301da177e4SLinus Torvalds 
1311da177e4SLinus Torvalds 	return -EINVAL;
1321da177e4SLinus Torvalds }
1331da177e4SLinus Torvalds 
134e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT
135e9c5702eSMarcel Holtmann struct compat_hidp_connadd_req {
13617f09a7eSSzymon Janc 	int   ctrl_sock;	/* Connected control socket */
13717f09a7eSSzymon Janc 	int   intr_sock;	/* Connected interrupt socket */
138e9c5702eSMarcel Holtmann 	__u16 parser;
139e9c5702eSMarcel Holtmann 	__u16 rd_size;
140e9c5702eSMarcel Holtmann 	compat_uptr_t rd_data;
141e9c5702eSMarcel Holtmann 	__u8  country;
142e9c5702eSMarcel Holtmann 	__u8  subclass;
143e9c5702eSMarcel Holtmann 	__u16 vendor;
144e9c5702eSMarcel Holtmann 	__u16 product;
145e9c5702eSMarcel Holtmann 	__u16 version;
146e9c5702eSMarcel Holtmann 	__u32 flags;
147e9c5702eSMarcel Holtmann 	__u32 idle_to;
148e9c5702eSMarcel Holtmann 	char  name[128];
149e9c5702eSMarcel Holtmann };
150e9c5702eSMarcel Holtmann 
151e9c5702eSMarcel Holtmann static int hidp_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
152e9c5702eSMarcel Holtmann {
153e9c5702eSMarcel Holtmann 	if (cmd == HIDPGETCONNLIST) {
154e9c5702eSMarcel Holtmann 		struct hidp_connlist_req cl;
155816a11d5SJohan Hedberg 		u32 uci;
156e9c5702eSMarcel Holtmann 		int err;
157e9c5702eSMarcel Holtmann 
158816a11d5SJohan Hedberg 		if (get_user(cl.cnum, (u32 __user *) arg) ||
159e9c5702eSMarcel Holtmann 				get_user(uci, (u32 __user *) (arg + 4)))
160e9c5702eSMarcel Holtmann 			return -EFAULT;
161e9c5702eSMarcel Holtmann 
162e9c5702eSMarcel Holtmann 		cl.ci = compat_ptr(uci);
163e9c5702eSMarcel Holtmann 
164e9c5702eSMarcel Holtmann 		if (cl.cnum <= 0)
165e9c5702eSMarcel Holtmann 			return -EINVAL;
166e9c5702eSMarcel Holtmann 
167e9c5702eSMarcel Holtmann 		err = hidp_get_connlist(&cl);
168e9c5702eSMarcel Holtmann 
169816a11d5SJohan Hedberg 		if (!err && put_user(cl.cnum, (u32 __user *) arg))
170e9c5702eSMarcel Holtmann 			err = -EFAULT;
171e9c5702eSMarcel Holtmann 
172e9c5702eSMarcel Holtmann 		return err;
173e9c5702eSMarcel Holtmann 	} else if (cmd == HIDPCONNADD) {
174e9c5702eSMarcel Holtmann 		struct compat_hidp_connadd_req ca;
175e9c5702eSMarcel Holtmann 		struct hidp_connadd_req __user *uca;
176e9c5702eSMarcel Holtmann 
177e9c5702eSMarcel Holtmann 		uca = compat_alloc_user_space(sizeof(*uca));
178e9c5702eSMarcel Holtmann 
17955e74744SAl Viro 		if (copy_from_user(&ca, (void __user *) arg, sizeof(ca)))
180e9c5702eSMarcel Holtmann 			return -EFAULT;
181e9c5702eSMarcel Holtmann 
182e9c5702eSMarcel Holtmann 		if (put_user(ca.ctrl_sock, &uca->ctrl_sock) ||
183e9c5702eSMarcel Holtmann 				put_user(ca.intr_sock, &uca->intr_sock) ||
184e9c5702eSMarcel Holtmann 				put_user(ca.parser, &uca->parser) ||
185a83d6c0dSMarcel Holtmann 				put_user(ca.rd_size, &uca->rd_size) ||
186e9c5702eSMarcel Holtmann 				put_user(compat_ptr(ca.rd_data), &uca->rd_data) ||
187e9c5702eSMarcel Holtmann 				put_user(ca.country, &uca->country) ||
188e9c5702eSMarcel Holtmann 				put_user(ca.subclass, &uca->subclass) ||
189e9c5702eSMarcel Holtmann 				put_user(ca.vendor, &uca->vendor) ||
190e9c5702eSMarcel Holtmann 				put_user(ca.product, &uca->product) ||
191e9c5702eSMarcel Holtmann 				put_user(ca.version, &uca->version) ||
192e9c5702eSMarcel Holtmann 				put_user(ca.flags, &uca->flags) ||
193e9c5702eSMarcel Holtmann 				put_user(ca.idle_to, &uca->idle_to) ||
194e9c5702eSMarcel Holtmann 				copy_to_user(&uca->name[0], &ca.name[0], 128))
195e9c5702eSMarcel Holtmann 			return -EFAULT;
196e9c5702eSMarcel Holtmann 
197e9c5702eSMarcel Holtmann 		arg = (unsigned long) uca;
198e9c5702eSMarcel Holtmann 
199e9c5702eSMarcel Holtmann 		/* Fall through. We don't actually write back any _changes_
200e9c5702eSMarcel Holtmann 		   to the structure anyway, so there's no need to copy back
201e9c5702eSMarcel Holtmann 		   into the original compat version */
202e9c5702eSMarcel Holtmann 	}
203e9c5702eSMarcel Holtmann 
204e9c5702eSMarcel Holtmann 	return hidp_sock_ioctl(sock, cmd, arg);
205e9c5702eSMarcel Holtmann }
206e9c5702eSMarcel Holtmann #endif
207e9c5702eSMarcel Holtmann 
20890ddc4f0SEric Dumazet static const struct proto_ops hidp_sock_ops = {
2091da177e4SLinus Torvalds 	.family		= PF_BLUETOOTH,
2101da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
2111da177e4SLinus Torvalds 	.release	= hidp_sock_release,
2121da177e4SLinus Torvalds 	.ioctl		= hidp_sock_ioctl,
213e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT
214e9c5702eSMarcel Holtmann 	.compat_ioctl	= hidp_sock_compat_ioctl,
215e9c5702eSMarcel Holtmann #endif
2161da177e4SLinus Torvalds 	.bind		= sock_no_bind,
2171da177e4SLinus Torvalds 	.getname	= sock_no_getname,
2181da177e4SLinus Torvalds 	.sendmsg	= sock_no_sendmsg,
2191da177e4SLinus Torvalds 	.recvmsg	= sock_no_recvmsg,
2201da177e4SLinus Torvalds 	.poll		= sock_no_poll,
2211da177e4SLinus Torvalds 	.listen		= sock_no_listen,
2221da177e4SLinus Torvalds 	.shutdown	= sock_no_shutdown,
2231da177e4SLinus Torvalds 	.setsockopt	= sock_no_setsockopt,
2241da177e4SLinus Torvalds 	.getsockopt	= sock_no_getsockopt,
2251da177e4SLinus Torvalds 	.connect	= sock_no_connect,
2261da177e4SLinus Torvalds 	.socketpair	= sock_no_socketpair,
2271da177e4SLinus Torvalds 	.accept		= sock_no_accept,
2281da177e4SLinus Torvalds 	.mmap		= sock_no_mmap
2291da177e4SLinus Torvalds };
2301da177e4SLinus Torvalds 
2311da177e4SLinus Torvalds static struct proto hidp_proto = {
2321da177e4SLinus Torvalds 	.name		= "HIDP",
2331da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
2341da177e4SLinus Torvalds 	.obj_size	= sizeof(struct bt_sock)
2351da177e4SLinus Torvalds };
2361da177e4SLinus Torvalds 
2373f378b68SEric Paris static int hidp_sock_create(struct net *net, struct socket *sock, int protocol,
2383f378b68SEric Paris 			    int kern)
2391da177e4SLinus Torvalds {
2401da177e4SLinus Torvalds 	struct sock *sk;
2411da177e4SLinus Torvalds 
2421da177e4SLinus Torvalds 	BT_DBG("sock %p", sock);
2431da177e4SLinus Torvalds 
2441da177e4SLinus Torvalds 	if (sock->type != SOCK_RAW)
2451da177e4SLinus Torvalds 		return -ESOCKTNOSUPPORT;
2461da177e4SLinus Torvalds 
2476257ff21SPavel Emelyanov 	sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hidp_proto);
2481da177e4SLinus Torvalds 	if (!sk)
2491da177e4SLinus Torvalds 		return -ENOMEM;
2501da177e4SLinus Torvalds 
2511da177e4SLinus Torvalds 	sock_init_data(sock, sk);
2521da177e4SLinus Torvalds 
2531da177e4SLinus Torvalds 	sock->ops = &hidp_sock_ops;
2541da177e4SLinus Torvalds 
2551da177e4SLinus Torvalds 	sock->state = SS_UNCONNECTED;
2561da177e4SLinus Torvalds 
2571da177e4SLinus Torvalds 	sock_reset_flag(sk, SOCK_ZAPPED);
2581da177e4SLinus Torvalds 
2591da177e4SLinus Torvalds 	sk->sk_protocol = protocol;
2601da177e4SLinus Torvalds 	sk->sk_state	= BT_OPEN;
2611da177e4SLinus Torvalds 
262*5c6ad8eeSMasatake YAMATO 	bt_sock_link(&hidp_sk_list, sk);
263*5c6ad8eeSMasatake YAMATO 
2641da177e4SLinus Torvalds 	return 0;
2651da177e4SLinus Torvalds }
2661da177e4SLinus Torvalds 
267ec1b4cf7SStephen Hemminger static const struct net_proto_family hidp_sock_family_ops = {
2681da177e4SLinus Torvalds 	.family	= PF_BLUETOOTH,
2691da177e4SLinus Torvalds 	.owner	= THIS_MODULE,
2701da177e4SLinus Torvalds 	.create	= hidp_sock_create
2711da177e4SLinus Torvalds };
2721da177e4SLinus Torvalds 
2731da177e4SLinus Torvalds int __init hidp_init_sockets(void)
2741da177e4SLinus Torvalds {
2751da177e4SLinus Torvalds 	int err;
2761da177e4SLinus Torvalds 
2771da177e4SLinus Torvalds 	err = proto_register(&hidp_proto, 0);
2781da177e4SLinus Torvalds 	if (err < 0)
2791da177e4SLinus Torvalds 		return err;
2801da177e4SLinus Torvalds 
2811da177e4SLinus Torvalds 	err = bt_sock_register(BTPROTO_HIDP, &hidp_sock_family_ops);
282*5c6ad8eeSMasatake YAMATO 	if (err < 0) {
283*5c6ad8eeSMasatake YAMATO 		BT_ERR("Can't register HIDP socket");
2841da177e4SLinus Torvalds 		goto error;
285*5c6ad8eeSMasatake YAMATO 	}
286*5c6ad8eeSMasatake YAMATO 
287*5c6ad8eeSMasatake YAMATO 	err = bt_procfs_init(THIS_MODULE, &init_net, "hidp", &hidp_sk_list, NULL);
288*5c6ad8eeSMasatake YAMATO 	if (err < 0) {
289*5c6ad8eeSMasatake YAMATO 		BT_ERR("Failed to create HIDP proc file");
290*5c6ad8eeSMasatake YAMATO 		bt_sock_unregister(BTPROTO_HIDP);
291*5c6ad8eeSMasatake YAMATO 		goto error;
292*5c6ad8eeSMasatake YAMATO 	}
293*5c6ad8eeSMasatake YAMATO 
294*5c6ad8eeSMasatake YAMATO 	BT_INFO("HIDP socket layer initialized");
2951da177e4SLinus Torvalds 
2961da177e4SLinus Torvalds 	return 0;
2971da177e4SLinus Torvalds 
2981da177e4SLinus Torvalds error:
2991da177e4SLinus Torvalds 	BT_ERR("Can't register HIDP socket");
3001da177e4SLinus Torvalds 	proto_unregister(&hidp_proto);
3011da177e4SLinus Torvalds 	return err;
3021da177e4SLinus Torvalds }
3031da177e4SLinus Torvalds 
3041da177e4SLinus Torvalds void __exit hidp_cleanup_sockets(void)
3051da177e4SLinus Torvalds {
306*5c6ad8eeSMasatake YAMATO 	bt_procfs_cleanup(&init_net, "hidp");
3071da177e4SLinus Torvalds 	if (bt_sock_unregister(BTPROTO_HIDP) < 0)
3081da177e4SLinus Torvalds 		BT_ERR("Can't unregister HIDP socket");
3091da177e4SLinus Torvalds 
3101da177e4SLinus Torvalds 	proto_unregister(&hidp_proto);
3111da177e4SLinus Torvalds }
312