xref: /openbmc/linux/net/bluetooth/hidp/sock.c (revision dcae9052ebb0c5b2614de620323d615fcbfda7f8)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds    HIDP implementation for Linux Bluetooth stack (BlueZ).
31da177e4SLinus Torvalds    Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>
41da177e4SLinus Torvalds 
51da177e4SLinus Torvalds    This program is free software; you can redistribute it and/or modify
61da177e4SLinus Torvalds    it under the terms of the GNU General Public License version 2 as
71da177e4SLinus Torvalds    published by the Free Software Foundation;
81da177e4SLinus Torvalds 
91da177e4SLinus Torvalds    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
101da177e4SLinus Torvalds    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
111da177e4SLinus Torvalds    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
121da177e4SLinus Torvalds    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
131da177e4SLinus Torvalds    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
141da177e4SLinus Torvalds    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
151da177e4SLinus Torvalds    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
161da177e4SLinus Torvalds    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
171da177e4SLinus Torvalds 
181da177e4SLinus Torvalds    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
191da177e4SLinus Torvalds    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
201da177e4SLinus Torvalds    SOFTWARE IS DISCLAIMED.
211da177e4SLinus Torvalds */
221da177e4SLinus Torvalds 
238c520a59SGustavo Padovan #include <linux/export.h>
241da177e4SLinus Torvalds #include <linux/file.h>
251da177e4SLinus Torvalds 
261da177e4SLinus Torvalds #include "hidp.h"
271da177e4SLinus Torvalds 
285c6ad8eeSMasatake YAMATO static struct bt_sock_list hidp_sk_list = {
295c6ad8eeSMasatake YAMATO 	.lock = __RW_LOCK_UNLOCKED(hidp_sk_list.lock)
305c6ad8eeSMasatake YAMATO };
315c6ad8eeSMasatake YAMATO 
321da177e4SLinus Torvalds static int hidp_sock_release(struct socket *sock)
331da177e4SLinus Torvalds {
341da177e4SLinus Torvalds 	struct sock *sk = sock->sk;
351da177e4SLinus Torvalds 
361da177e4SLinus Torvalds 	BT_DBG("sock %p sk %p", sock, sk);
371da177e4SLinus Torvalds 
381da177e4SLinus Torvalds 	if (!sk)
391da177e4SLinus Torvalds 		return 0;
401da177e4SLinus Torvalds 
415c6ad8eeSMasatake YAMATO 	bt_sock_unlink(&hidp_sk_list, sk);
425c6ad8eeSMasatake YAMATO 
431da177e4SLinus Torvalds 	sock_orphan(sk);
441da177e4SLinus Torvalds 	sock_put(sk);
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds 	return 0;
471da177e4SLinus Torvalds }
481da177e4SLinus Torvalds 
49702ec307SAl Viro static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp)
501da177e4SLinus Torvalds {
511da177e4SLinus Torvalds 	struct hidp_connadd_req ca;
521da177e4SLinus Torvalds 	struct hidp_conndel_req cd;
531da177e4SLinus Torvalds 	struct hidp_connlist_req cl;
541da177e4SLinus Torvalds 	struct hidp_conninfo ci;
551da177e4SLinus Torvalds 	struct socket *csock;
561da177e4SLinus Torvalds 	struct socket *isock;
571da177e4SLinus Torvalds 	int err;
581da177e4SLinus Torvalds 
59702ec307SAl Viro 	BT_DBG("cmd %x arg %p", cmd, argp);
601da177e4SLinus Torvalds 
611da177e4SLinus Torvalds 	switch (cmd) {
621da177e4SLinus Torvalds 	case HIDPCONNADD:
631da177e4SLinus Torvalds 		if (!capable(CAP_NET_ADMIN))
64bf5b30b8SZhao Hongjiang 			return -EPERM;
651da177e4SLinus Torvalds 
661da177e4SLinus Torvalds 		if (copy_from_user(&ca, argp, sizeof(ca)))
671da177e4SLinus Torvalds 			return -EFAULT;
681da177e4SLinus Torvalds 
691da177e4SLinus Torvalds 		csock = sockfd_lookup(ca.ctrl_sock, &err);
701da177e4SLinus Torvalds 		if (!csock)
711da177e4SLinus Torvalds 			return err;
721da177e4SLinus Torvalds 
731da177e4SLinus Torvalds 		isock = sockfd_lookup(ca.intr_sock, &err);
741da177e4SLinus Torvalds 		if (!isock) {
7567b23219SJulia Lawall 			sockfd_put(csock);
761da177e4SLinus Torvalds 			return err;
771da177e4SLinus Torvalds 		}
78a1616a5aSYoung Xiao 		ca.name[sizeof(ca.name)-1] = 0;
791da177e4SLinus Torvalds 
805205185dSDavid Herrmann 		err = hidp_connection_add(&ca, csock, isock);
815205185dSDavid Herrmann 		if (!err && copy_to_user(argp, &ca, sizeof(ca)))
821da177e4SLinus Torvalds 			err = -EFAULT;
835205185dSDavid Herrmann 
8467b23219SJulia Lawall 		sockfd_put(csock);
8567b23219SJulia Lawall 		sockfd_put(isock);
861da177e4SLinus Torvalds 
871da177e4SLinus Torvalds 		return err;
881da177e4SLinus Torvalds 
891da177e4SLinus Torvalds 	case HIDPCONNDEL:
901da177e4SLinus Torvalds 		if (!capable(CAP_NET_ADMIN))
91bf5b30b8SZhao Hongjiang 			return -EPERM;
921da177e4SLinus Torvalds 
931da177e4SLinus Torvalds 		if (copy_from_user(&cd, argp, sizeof(cd)))
941da177e4SLinus Torvalds 			return -EFAULT;
951da177e4SLinus Torvalds 
965205185dSDavid Herrmann 		return hidp_connection_del(&cd);
971da177e4SLinus Torvalds 
981da177e4SLinus Torvalds 	case HIDPGETCONNLIST:
991da177e4SLinus Torvalds 		if (copy_from_user(&cl, argp, sizeof(cl)))
1001da177e4SLinus Torvalds 			return -EFAULT;
1011da177e4SLinus Torvalds 
1021da177e4SLinus Torvalds 		if (cl.cnum <= 0)
1031da177e4SLinus Torvalds 			return -EINVAL;
1041da177e4SLinus Torvalds 
1051da177e4SLinus Torvalds 		err = hidp_get_connlist(&cl);
1061da177e4SLinus Torvalds 		if (!err && copy_to_user(argp, &cl, sizeof(cl)))
1071da177e4SLinus Torvalds 			return -EFAULT;
1081da177e4SLinus Torvalds 
1091da177e4SLinus Torvalds 		return err;
1101da177e4SLinus Torvalds 
1111da177e4SLinus Torvalds 	case HIDPGETCONNINFO:
1121da177e4SLinus Torvalds 		if (copy_from_user(&ci, argp, sizeof(ci)))
1131da177e4SLinus Torvalds 			return -EFAULT;
1141da177e4SLinus Torvalds 
1151da177e4SLinus Torvalds 		err = hidp_get_conninfo(&ci);
1161da177e4SLinus Torvalds 		if (!err && copy_to_user(argp, &ci, sizeof(ci)))
1171da177e4SLinus Torvalds 			return -EFAULT;
1181da177e4SLinus Torvalds 
1191da177e4SLinus Torvalds 		return err;
1201da177e4SLinus Torvalds 	}
1211da177e4SLinus Torvalds 
1221da177e4SLinus Torvalds 	return -EINVAL;
1231da177e4SLinus Torvalds }
1241da177e4SLinus Torvalds 
125702ec307SAl Viro static int hidp_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
126702ec307SAl Viro {
127702ec307SAl Viro 	return do_hidp_sock_ioctl(sock, cmd, (void __user *)arg);
128702ec307SAl Viro }
129702ec307SAl Viro 
130e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT
131e9c5702eSMarcel Holtmann struct compat_hidp_connadd_req {
13217f09a7eSSzymon Janc 	int   ctrl_sock;	/* Connected control socket */
13317f09a7eSSzymon Janc 	int   intr_sock;	/* Connected interrupt socket */
134e9c5702eSMarcel Holtmann 	__u16 parser;
135e9c5702eSMarcel Holtmann 	__u16 rd_size;
136e9c5702eSMarcel Holtmann 	compat_uptr_t rd_data;
137e9c5702eSMarcel Holtmann 	__u8  country;
138e9c5702eSMarcel Holtmann 	__u8  subclass;
139e9c5702eSMarcel Holtmann 	__u16 vendor;
140e9c5702eSMarcel Holtmann 	__u16 product;
141e9c5702eSMarcel Holtmann 	__u16 version;
142e9c5702eSMarcel Holtmann 	__u32 flags;
143e9c5702eSMarcel Holtmann 	__u32 idle_to;
144e9c5702eSMarcel Holtmann 	char  name[128];
145e9c5702eSMarcel Holtmann };
146e9c5702eSMarcel Holtmann 
147e9c5702eSMarcel Holtmann static int hidp_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
148e9c5702eSMarcel Holtmann {
149702ec307SAl Viro 	void __user *argp = compat_ptr(arg);
150e9c5702eSMarcel Holtmann 	int err;
151e9c5702eSMarcel Holtmann 
152702ec307SAl Viro 	if (cmd == HIDPGETCONNLIST) {
153702ec307SAl Viro 		struct hidp_connlist_req cl;
154702ec307SAl Viro 		u32 __user *p = argp;
155702ec307SAl Viro 		u32 uci;
156702ec307SAl Viro 
157702ec307SAl Viro 		if (get_user(cl.cnum, p) || get_user(uci, p + 1))
158e9c5702eSMarcel Holtmann 			return -EFAULT;
159e9c5702eSMarcel Holtmann 
160e9c5702eSMarcel Holtmann 		cl.ci = compat_ptr(uci);
161e9c5702eSMarcel Holtmann 
162e9c5702eSMarcel Holtmann 		if (cl.cnum <= 0)
163e9c5702eSMarcel Holtmann 			return -EINVAL;
164e9c5702eSMarcel Holtmann 
165e9c5702eSMarcel Holtmann 		err = hidp_get_connlist(&cl);
166e9c5702eSMarcel Holtmann 
167702ec307SAl Viro 		if (!err && put_user(cl.cnum, p))
168e9c5702eSMarcel Holtmann 			err = -EFAULT;
169e9c5702eSMarcel Holtmann 
170e9c5702eSMarcel Holtmann 		return err;
171e9c5702eSMarcel Holtmann 	} else if (cmd == HIDPCONNADD) {
172702ec307SAl Viro 		struct compat_hidp_connadd_req ca32;
173702ec307SAl Viro 		struct hidp_connadd_req ca;
174702ec307SAl Viro 		struct socket *csock;
175702ec307SAl Viro 		struct socket *isock;
176e9c5702eSMarcel Holtmann 
177702ec307SAl Viro 		if (!capable(CAP_NET_ADMIN))
178702ec307SAl Viro 			return -EPERM;
179e9c5702eSMarcel Holtmann 
180702ec307SAl Viro 		if (copy_from_user(&ca32, (void __user *) arg, sizeof(ca32)))
181e9c5702eSMarcel Holtmann 			return -EFAULT;
182e9c5702eSMarcel Holtmann 
183702ec307SAl Viro 		ca.ctrl_sock = ca32.ctrl_sock;
184702ec307SAl Viro 		ca.intr_sock = ca32.intr_sock;
185702ec307SAl Viro 		ca.parser = ca32.parser;
186702ec307SAl Viro 		ca.rd_size = ca32.rd_size;
187702ec307SAl Viro 		ca.rd_data = compat_ptr(ca32.rd_data);
188702ec307SAl Viro 		ca.country = ca32.country;
189702ec307SAl Viro 		ca.subclass = ca32.subclass;
190702ec307SAl Viro 		ca.vendor = ca32.vendor;
191702ec307SAl Viro 		ca.product = ca32.product;
192702ec307SAl Viro 		ca.version = ca32.version;
193702ec307SAl Viro 		ca.flags = ca32.flags;
194702ec307SAl Viro 		ca.idle_to = ca32.idle_to;
195*dcae9052SDan Carpenter 		ca32.name[sizeof(ca32.name) - 1] = '\0';
196702ec307SAl Viro 		memcpy(ca.name, ca32.name, 128);
197e9c5702eSMarcel Holtmann 
198702ec307SAl Viro 		csock = sockfd_lookup(ca.ctrl_sock, &err);
199702ec307SAl Viro 		if (!csock)
200702ec307SAl Viro 			return err;
201e9c5702eSMarcel Holtmann 
202702ec307SAl Viro 		isock = sockfd_lookup(ca.intr_sock, &err);
203702ec307SAl Viro 		if (!isock) {
204702ec307SAl Viro 			sockfd_put(csock);
205702ec307SAl Viro 			return err;
206702ec307SAl Viro 		}
207702ec307SAl Viro 
208702ec307SAl Viro 		err = hidp_connection_add(&ca, csock, isock);
209702ec307SAl Viro 		if (!err && copy_to_user(argp, &ca32, sizeof(ca32)))
210702ec307SAl Viro 			err = -EFAULT;
211702ec307SAl Viro 
212702ec307SAl Viro 		sockfd_put(csock);
213702ec307SAl Viro 		sockfd_put(isock);
214702ec307SAl Viro 
215702ec307SAl Viro 		return err;
216e9c5702eSMarcel Holtmann 	}
217e9c5702eSMarcel Holtmann 
218e9c5702eSMarcel Holtmann 	return hidp_sock_ioctl(sock, cmd, arg);
219e9c5702eSMarcel Holtmann }
220e9c5702eSMarcel Holtmann #endif
221e9c5702eSMarcel Holtmann 
22290ddc4f0SEric Dumazet static const struct proto_ops hidp_sock_ops = {
2231da177e4SLinus Torvalds 	.family		= PF_BLUETOOTH,
2241da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
2251da177e4SLinus Torvalds 	.release	= hidp_sock_release,
2261da177e4SLinus Torvalds 	.ioctl		= hidp_sock_ioctl,
227e9c5702eSMarcel Holtmann #ifdef CONFIG_COMPAT
228e9c5702eSMarcel Holtmann 	.compat_ioctl	= hidp_sock_compat_ioctl,
229e9c5702eSMarcel Holtmann #endif
2301da177e4SLinus Torvalds 	.bind		= sock_no_bind,
2311da177e4SLinus Torvalds 	.getname	= sock_no_getname,
2321da177e4SLinus Torvalds 	.sendmsg	= sock_no_sendmsg,
2331da177e4SLinus Torvalds 	.recvmsg	= sock_no_recvmsg,
2341da177e4SLinus Torvalds 	.listen		= sock_no_listen,
2351da177e4SLinus Torvalds 	.shutdown	= sock_no_shutdown,
2361da177e4SLinus Torvalds 	.setsockopt	= sock_no_setsockopt,
2371da177e4SLinus Torvalds 	.getsockopt	= sock_no_getsockopt,
2381da177e4SLinus Torvalds 	.connect	= sock_no_connect,
2391da177e4SLinus Torvalds 	.socketpair	= sock_no_socketpair,
2401da177e4SLinus Torvalds 	.accept		= sock_no_accept,
2411da177e4SLinus Torvalds 	.mmap		= sock_no_mmap
2421da177e4SLinus Torvalds };
2431da177e4SLinus Torvalds 
2441da177e4SLinus Torvalds static struct proto hidp_proto = {
2451da177e4SLinus Torvalds 	.name		= "HIDP",
2461da177e4SLinus Torvalds 	.owner		= THIS_MODULE,
2471da177e4SLinus Torvalds 	.obj_size	= sizeof(struct bt_sock)
2481da177e4SLinus Torvalds };
2491da177e4SLinus Torvalds 
2503f378b68SEric Paris static int hidp_sock_create(struct net *net, struct socket *sock, int protocol,
2513f378b68SEric Paris 			    int kern)
2521da177e4SLinus Torvalds {
2531da177e4SLinus Torvalds 	struct sock *sk;
2541da177e4SLinus Torvalds 
2551da177e4SLinus Torvalds 	BT_DBG("sock %p", sock);
2561da177e4SLinus Torvalds 
2571da177e4SLinus Torvalds 	if (sock->type != SOCK_RAW)
2581da177e4SLinus Torvalds 		return -ESOCKTNOSUPPORT;
2591da177e4SLinus Torvalds 
26011aa9c28SEric W. Biederman 	sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hidp_proto, kern);
2611da177e4SLinus Torvalds 	if (!sk)
2621da177e4SLinus Torvalds 		return -ENOMEM;
2631da177e4SLinus Torvalds 
2641da177e4SLinus Torvalds 	sock_init_data(sock, sk);
2651da177e4SLinus Torvalds 
2661da177e4SLinus Torvalds 	sock->ops = &hidp_sock_ops;
2671da177e4SLinus Torvalds 
2681da177e4SLinus Torvalds 	sock->state = SS_UNCONNECTED;
2691da177e4SLinus Torvalds 
2701da177e4SLinus Torvalds 	sock_reset_flag(sk, SOCK_ZAPPED);
2711da177e4SLinus Torvalds 
2721da177e4SLinus Torvalds 	sk->sk_protocol = protocol;
2731da177e4SLinus Torvalds 	sk->sk_state	= BT_OPEN;
2741da177e4SLinus Torvalds 
2755c6ad8eeSMasatake YAMATO 	bt_sock_link(&hidp_sk_list, sk);
2765c6ad8eeSMasatake YAMATO 
2771da177e4SLinus Torvalds 	return 0;
2781da177e4SLinus Torvalds }
2791da177e4SLinus Torvalds 
280ec1b4cf7SStephen Hemminger static const struct net_proto_family hidp_sock_family_ops = {
2811da177e4SLinus Torvalds 	.family	= PF_BLUETOOTH,
2821da177e4SLinus Torvalds 	.owner	= THIS_MODULE,
2831da177e4SLinus Torvalds 	.create	= hidp_sock_create
2841da177e4SLinus Torvalds };
2851da177e4SLinus Torvalds 
2861da177e4SLinus Torvalds int __init hidp_init_sockets(void)
2871da177e4SLinus Torvalds {
2881da177e4SLinus Torvalds 	int err;
2891da177e4SLinus Torvalds 
2901da177e4SLinus Torvalds 	err = proto_register(&hidp_proto, 0);
2911da177e4SLinus Torvalds 	if (err < 0)
2921da177e4SLinus Torvalds 		return err;
2931da177e4SLinus Torvalds 
2941da177e4SLinus Torvalds 	err = bt_sock_register(BTPROTO_HIDP, &hidp_sock_family_ops);
2955c6ad8eeSMasatake YAMATO 	if (err < 0) {
2965c6ad8eeSMasatake YAMATO 		BT_ERR("Can't register HIDP socket");
2971da177e4SLinus Torvalds 		goto error;
2985c6ad8eeSMasatake YAMATO 	}
2995c6ad8eeSMasatake YAMATO 
300b0316615SAl Viro 	err = bt_procfs_init(&init_net, "hidp", &hidp_sk_list, NULL);
3015c6ad8eeSMasatake YAMATO 	if (err < 0) {
3025c6ad8eeSMasatake YAMATO 		BT_ERR("Failed to create HIDP proc file");
3035c6ad8eeSMasatake YAMATO 		bt_sock_unregister(BTPROTO_HIDP);
3045c6ad8eeSMasatake YAMATO 		goto error;
3055c6ad8eeSMasatake YAMATO 	}
3065c6ad8eeSMasatake YAMATO 
3075c6ad8eeSMasatake YAMATO 	BT_INFO("HIDP socket layer initialized");
3081da177e4SLinus Torvalds 
3091da177e4SLinus Torvalds 	return 0;
3101da177e4SLinus Torvalds 
3111da177e4SLinus Torvalds error:
3121da177e4SLinus Torvalds 	proto_unregister(&hidp_proto);
3131da177e4SLinus Torvalds 	return err;
3141da177e4SLinus Torvalds }
3151da177e4SLinus Torvalds 
3161da177e4SLinus Torvalds void __exit hidp_cleanup_sockets(void)
3171da177e4SLinus Torvalds {
3185c6ad8eeSMasatake YAMATO 	bt_procfs_cleanup(&init_net, "hidp");
3195e9d7f86SDavid Herrmann 	bt_sock_unregister(BTPROTO_HIDP);
3201da177e4SLinus Torvalds 	proto_unregister(&hidp_proto);
3211da177e4SLinus Torvalds }
322