1 /* 1 /* 2 HIDP implementation for Linux Bluetooth sta 2 HIDP implementation for Linux Bluetooth stack (BlueZ). 3 Copyright (C) 2003-2004 Marcel Holtmann <ma 3 Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org> 4 4 5 This program is free software; you can redi 5 This program is free software; you can redistribute it and/or modify 6 it under the terms of the GNU General Publi 6 it under the terms of the GNU General Public License version 2 as 7 published by the Free Software Foundation; 7 published by the Free Software Foundation; 8 8 9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT W 9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS 10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO TH 10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 11 FITNESS FOR A PARTICULAR PURPOSE AND NONINF 11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. 12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) A 12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY 13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUEN 13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES 14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA 14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TOR 15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 16 OR IN CONNECTION WITH THE USE OR PERFORMANC 16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 17 17 18 ALL LIABILITY, INCLUDING LIABILITY FOR INFR 18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, 19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, REL 19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS 20 SOFTWARE IS DISCLAIMED. 20 SOFTWARE IS DISCLAIMED. 21 */ 21 */ 22 22 23 #include <linux/compat.h> << 24 #include <linux/export.h> 23 #include <linux/export.h> 25 #include <linux/file.h> 24 #include <linux/file.h> 26 25 27 #include "hidp.h" 26 #include "hidp.h" 28 27 29 static struct bt_sock_list hidp_sk_list = { 28 static struct bt_sock_list hidp_sk_list = { 30 .lock = __RW_LOCK_UNLOCKED(hidp_sk_lis 29 .lock = __RW_LOCK_UNLOCKED(hidp_sk_list.lock) 31 }; 30 }; 32 31 33 static int hidp_sock_release(struct socket *so 32 static int hidp_sock_release(struct socket *sock) 34 { 33 { 35 struct sock *sk = sock->sk; 34 struct sock *sk = sock->sk; 36 35 37 BT_DBG("sock %p sk %p", sock, sk); 36 BT_DBG("sock %p sk %p", sock, sk); 38 37 39 if (!sk) 38 if (!sk) 40 return 0; 39 return 0; 41 40 42 bt_sock_unlink(&hidp_sk_list, sk); 41 bt_sock_unlink(&hidp_sk_list, sk); 43 42 44 sock_orphan(sk); 43 sock_orphan(sk); 45 sock_put(sk); 44 sock_put(sk); 46 45 47 return 0; 46 return 0; 48 } 47 } 49 48 50 static int do_hidp_sock_ioctl(struct socket *s 49 static int do_hidp_sock_ioctl(struct socket *sock, unsigned int cmd, void __user *argp) 51 { 50 { 52 struct hidp_connadd_req ca; 51 struct hidp_connadd_req ca; 53 struct hidp_conndel_req cd; 52 struct hidp_conndel_req cd; 54 struct hidp_connlist_req cl; 53 struct hidp_connlist_req cl; 55 struct hidp_conninfo ci; 54 struct hidp_conninfo ci; 56 struct socket *csock; 55 struct socket *csock; 57 struct socket *isock; 56 struct socket *isock; 58 int err; 57 int err; 59 58 60 BT_DBG("cmd %x arg %p", cmd, argp); 59 BT_DBG("cmd %x arg %p", cmd, argp); 61 60 62 switch (cmd) { 61 switch (cmd) { 63 case HIDPCONNADD: 62 case HIDPCONNADD: 64 if (!capable(CAP_NET_ADMIN)) 63 if (!capable(CAP_NET_ADMIN)) 65 return -EPERM; 64 return -EPERM; 66 65 67 if (copy_from_user(&ca, argp, 66 if (copy_from_user(&ca, argp, sizeof(ca))) 68 return -EFAULT; 67 return -EFAULT; 69 68 70 csock = sockfd_lookup(ca.ctrl_ 69 csock = sockfd_lookup(ca.ctrl_sock, &err); 71 if (!csock) 70 if (!csock) 72 return err; 71 return err; 73 72 74 isock = sockfd_lookup(ca.intr_ 73 isock = sockfd_lookup(ca.intr_sock, &err); 75 if (!isock) { 74 if (!isock) { 76 sockfd_put(csock); 75 sockfd_put(csock); 77 return err; 76 return err; 78 } 77 } 79 ca.name[sizeof(ca.name)-1] = 0 78 ca.name[sizeof(ca.name)-1] = 0; 80 79 81 err = hidp_connection_add(&ca, 80 err = hidp_connection_add(&ca, csock, isock); 82 if (!err && copy_to_user(argp, 81 if (!err && copy_to_user(argp, &ca, sizeof(ca))) 83 err = -EFAULT; 82 err = -EFAULT; 84 83 85 sockfd_put(csock); 84 sockfd_put(csock); 86 sockfd_put(isock); 85 sockfd_put(isock); 87 86 88 return err; 87 return err; 89 88 90 case HIDPCONNDEL: 89 case HIDPCONNDEL: 91 if (!capable(CAP_NET_ADMIN)) 90 if (!capable(CAP_NET_ADMIN)) 92 return -EPERM; 91 return -EPERM; 93 92 94 if (copy_from_user(&cd, argp, 93 if (copy_from_user(&cd, argp, sizeof(cd))) 95 return -EFAULT; 94 return -EFAULT; 96 95 97 return hidp_connection_del(&cd 96 return hidp_connection_del(&cd); 98 97 99 case HIDPGETCONNLIST: 98 case HIDPGETCONNLIST: 100 if (copy_from_user(&cl, argp, 99 if (copy_from_user(&cl, argp, sizeof(cl))) 101 return -EFAULT; 100 return -EFAULT; 102 101 103 if (cl.cnum <= 0) 102 if (cl.cnum <= 0) 104 return -EINVAL; 103 return -EINVAL; 105 104 106 err = hidp_get_connlist(&cl); 105 err = hidp_get_connlist(&cl); 107 if (!err && copy_to_user(argp, 106 if (!err && copy_to_user(argp, &cl, sizeof(cl))) 108 return -EFAULT; 107 return -EFAULT; 109 108 110 return err; 109 return err; 111 110 112 case HIDPGETCONNINFO: 111 case HIDPGETCONNINFO: 113 if (copy_from_user(&ci, argp, 112 if (copy_from_user(&ci, argp, sizeof(ci))) 114 return -EFAULT; 113 return -EFAULT; 115 114 116 err = hidp_get_conninfo(&ci); 115 err = hidp_get_conninfo(&ci); 117 if (!err && copy_to_user(argp, 116 if (!err && copy_to_user(argp, &ci, sizeof(ci))) 118 return -EFAULT; 117 return -EFAULT; 119 118 120 return err; 119 return err; 121 } 120 } 122 121 123 return -EINVAL; 122 return -EINVAL; 124 } 123 } 125 124 126 static int hidp_sock_ioctl(struct socket *sock 125 static int hidp_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) 127 { 126 { 128 return do_hidp_sock_ioctl(sock, cmd, ( 127 return do_hidp_sock_ioctl(sock, cmd, (void __user *)arg); 129 } 128 } 130 129 131 #ifdef CONFIG_COMPAT 130 #ifdef CONFIG_COMPAT 132 struct compat_hidp_connadd_req { 131 struct compat_hidp_connadd_req { 133 int ctrl_sock; /* Connected c 132 int ctrl_sock; /* Connected control socket */ 134 int intr_sock; /* Connected i 133 int intr_sock; /* Connected interrupt socket */ 135 __u16 parser; 134 __u16 parser; 136 __u16 rd_size; 135 __u16 rd_size; 137 compat_uptr_t rd_data; 136 compat_uptr_t rd_data; 138 __u8 country; 137 __u8 country; 139 __u8 subclass; 138 __u8 subclass; 140 __u16 vendor; 139 __u16 vendor; 141 __u16 product; 140 __u16 product; 142 __u16 version; 141 __u16 version; 143 __u32 flags; 142 __u32 flags; 144 __u32 idle_to; 143 __u32 idle_to; 145 char name[128]; 144 char name[128]; 146 }; 145 }; 147 146 148 static int hidp_sock_compat_ioctl(struct socke 147 static int hidp_sock_compat_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg) 149 { 148 { 150 void __user *argp = compat_ptr(arg); 149 void __user *argp = compat_ptr(arg); 151 int err; 150 int err; 152 151 153 if (cmd == HIDPGETCONNLIST) { 152 if (cmd == HIDPGETCONNLIST) { 154 struct hidp_connlist_req cl; 153 struct hidp_connlist_req cl; 155 u32 __user *p = argp; 154 u32 __user *p = argp; 156 u32 uci; 155 u32 uci; 157 156 158 if (get_user(cl.cnum, p) || ge 157 if (get_user(cl.cnum, p) || get_user(uci, p + 1)) 159 return -EFAULT; 158 return -EFAULT; 160 159 161 cl.ci = compat_ptr(uci); 160 cl.ci = compat_ptr(uci); 162 161 163 if (cl.cnum <= 0) 162 if (cl.cnum <= 0) 164 return -EINVAL; 163 return -EINVAL; 165 164 166 err = hidp_get_connlist(&cl); 165 err = hidp_get_connlist(&cl); 167 166 168 if (!err && put_user(cl.cnum, 167 if (!err && put_user(cl.cnum, p)) 169 err = -EFAULT; 168 err = -EFAULT; 170 169 171 return err; 170 return err; 172 } else if (cmd == HIDPCONNADD) { 171 } else if (cmd == HIDPCONNADD) { 173 struct compat_hidp_connadd_req 172 struct compat_hidp_connadd_req ca32; 174 struct hidp_connadd_req ca; 173 struct hidp_connadd_req ca; 175 struct socket *csock; 174 struct socket *csock; 176 struct socket *isock; 175 struct socket *isock; 177 176 178 if (!capable(CAP_NET_ADMIN)) 177 if (!capable(CAP_NET_ADMIN)) 179 return -EPERM; 178 return -EPERM; 180 179 181 if (copy_from_user(&ca32, (voi 180 if (copy_from_user(&ca32, (void __user *) arg, sizeof(ca32))) 182 return -EFAULT; 181 return -EFAULT; 183 182 184 ca.ctrl_sock = ca32.ctrl_sock; 183 ca.ctrl_sock = ca32.ctrl_sock; 185 ca.intr_sock = ca32.intr_sock; 184 ca.intr_sock = ca32.intr_sock; 186 ca.parser = ca32.parser; 185 ca.parser = ca32.parser; 187 ca.rd_size = ca32.rd_size; 186 ca.rd_size = ca32.rd_size; 188 ca.rd_data = compat_ptr(ca32.r 187 ca.rd_data = compat_ptr(ca32.rd_data); 189 ca.country = ca32.country; 188 ca.country = ca32.country; 190 ca.subclass = ca32.subclass; 189 ca.subclass = ca32.subclass; 191 ca.vendor = ca32.vendor; 190 ca.vendor = ca32.vendor; 192 ca.product = ca32.product; 191 ca.product = ca32.product; 193 ca.version = ca32.version; 192 ca.version = ca32.version; 194 ca.flags = ca32.flags; 193 ca.flags = ca32.flags; 195 ca.idle_to = ca32.idle_to; 194 ca.idle_to = ca32.idle_to; 196 ca32.name[sizeof(ca32.name) - 195 ca32.name[sizeof(ca32.name) - 1] = '\0'; 197 memcpy(ca.name, ca32.name, 128 196 memcpy(ca.name, ca32.name, 128); 198 197 199 csock = sockfd_lookup(ca.ctrl_ 198 csock = sockfd_lookup(ca.ctrl_sock, &err); 200 if (!csock) 199 if (!csock) 201 return err; 200 return err; 202 201 203 isock = sockfd_lookup(ca.intr_ 202 isock = sockfd_lookup(ca.intr_sock, &err); 204 if (!isock) { 203 if (!isock) { 205 sockfd_put(csock); 204 sockfd_put(csock); 206 return err; 205 return err; 207 } 206 } 208 207 209 err = hidp_connection_add(&ca, 208 err = hidp_connection_add(&ca, csock, isock); 210 if (!err && copy_to_user(argp, 209 if (!err && copy_to_user(argp, &ca32, sizeof(ca32))) 211 err = -EFAULT; 210 err = -EFAULT; 212 211 213 sockfd_put(csock); 212 sockfd_put(csock); 214 sockfd_put(isock); 213 sockfd_put(isock); 215 214 216 return err; 215 return err; 217 } 216 } 218 217 219 return hidp_sock_ioctl(sock, cmd, arg) 218 return hidp_sock_ioctl(sock, cmd, arg); 220 } 219 } 221 #endif 220 #endif 222 221 223 static const struct proto_ops hidp_sock_ops = 222 static const struct proto_ops hidp_sock_ops = { 224 .family = PF_BLUETOOTH, 223 .family = PF_BLUETOOTH, 225 .owner = THIS_MODULE, 224 .owner = THIS_MODULE, 226 .release = hidp_sock_release, 225 .release = hidp_sock_release, 227 .ioctl = hidp_sock_ioctl, 226 .ioctl = hidp_sock_ioctl, 228 #ifdef CONFIG_COMPAT 227 #ifdef CONFIG_COMPAT 229 .compat_ioctl = hidp_sock_compat_ioc 228 .compat_ioctl = hidp_sock_compat_ioctl, 230 #endif 229 #endif 231 .bind = sock_no_bind, 230 .bind = sock_no_bind, 232 .getname = sock_no_getname, 231 .getname = sock_no_getname, 233 .sendmsg = sock_no_sendmsg, 232 .sendmsg = sock_no_sendmsg, 234 .recvmsg = sock_no_recvmsg, 233 .recvmsg = sock_no_recvmsg, 235 .listen = sock_no_listen, 234 .listen = sock_no_listen, 236 .shutdown = sock_no_shutdown, 235 .shutdown = sock_no_shutdown, >> 236 .setsockopt = sock_no_setsockopt, >> 237 .getsockopt = sock_no_getsockopt, 237 .connect = sock_no_connect, 238 .connect = sock_no_connect, 238 .socketpair = sock_no_socketpair, 239 .socketpair = sock_no_socketpair, 239 .accept = sock_no_accept, 240 .accept = sock_no_accept, 240 .mmap = sock_no_mmap 241 .mmap = sock_no_mmap 241 }; 242 }; 242 243 243 static struct proto hidp_proto = { 244 static struct proto hidp_proto = { 244 .name = "HIDP", 245 .name = "HIDP", 245 .owner = THIS_MODULE, 246 .owner = THIS_MODULE, 246 .obj_size = sizeof(struct bt_soc 247 .obj_size = sizeof(struct bt_sock) 247 }; 248 }; 248 249 249 static int hidp_sock_create(struct net *net, s 250 static int hidp_sock_create(struct net *net, struct socket *sock, int protocol, 250 int kern) 251 int kern) 251 { 252 { 252 struct sock *sk; 253 struct sock *sk; 253 254 254 BT_DBG("sock %p", sock); 255 BT_DBG("sock %p", sock); 255 256 256 if (sock->type != SOCK_RAW) 257 if (sock->type != SOCK_RAW) 257 return -ESOCKTNOSUPPORT; 258 return -ESOCKTNOSUPPORT; 258 259 259 sk = bt_sock_alloc(net, sock, &hidp_pr !! 260 sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hidp_proto, kern); 260 if (!sk) 261 if (!sk) 261 return -ENOMEM; 262 return -ENOMEM; 262 263 >> 264 sock_init_data(sock, sk); >> 265 263 sock->ops = &hidp_sock_ops; 266 sock->ops = &hidp_sock_ops; >> 267 264 sock->state = SS_UNCONNECTED; 268 sock->state = SS_UNCONNECTED; >> 269 >> 270 sock_reset_flag(sk, SOCK_ZAPPED); >> 271 >> 272 sk->sk_protocol = protocol; >> 273 sk->sk_state = BT_OPEN; 265 274 266 bt_sock_link(&hidp_sk_list, sk); 275 bt_sock_link(&hidp_sk_list, sk); 267 276 268 return 0; 277 return 0; 269 } 278 } 270 279 271 static const struct net_proto_family hidp_sock 280 static const struct net_proto_family hidp_sock_family_ops = { 272 .family = PF_BLUETOOTH, 281 .family = PF_BLUETOOTH, 273 .owner = THIS_MODULE, 282 .owner = THIS_MODULE, 274 .create = hidp_sock_create 283 .create = hidp_sock_create 275 }; 284 }; 276 285 277 int __init hidp_init_sockets(void) 286 int __init hidp_init_sockets(void) 278 { 287 { 279 int err; 288 int err; 280 289 281 err = proto_register(&hidp_proto, 0); 290 err = proto_register(&hidp_proto, 0); 282 if (err < 0) 291 if (err < 0) 283 return err; 292 return err; 284 293 285 err = bt_sock_register(BTPROTO_HIDP, & 294 err = bt_sock_register(BTPROTO_HIDP, &hidp_sock_family_ops); 286 if (err < 0) { 295 if (err < 0) { 287 BT_ERR("Can't register HIDP so 296 BT_ERR("Can't register HIDP socket"); 288 goto error; 297 goto error; 289 } 298 } 290 299 291 err = bt_procfs_init(&init_net, "hidp" 300 err = bt_procfs_init(&init_net, "hidp", &hidp_sk_list, NULL); 292 if (err < 0) { 301 if (err < 0) { 293 BT_ERR("Failed to create HIDP 302 BT_ERR("Failed to create HIDP proc file"); 294 bt_sock_unregister(BTPROTO_HID 303 bt_sock_unregister(BTPROTO_HIDP); 295 goto error; 304 goto error; 296 } 305 } 297 306 298 BT_INFO("HIDP socket layer initialized 307 BT_INFO("HIDP socket layer initialized"); 299 308 300 return 0; 309 return 0; 301 310 302 error: 311 error: 303 proto_unregister(&hidp_proto); 312 proto_unregister(&hidp_proto); 304 return err; 313 return err; 305 } 314 } 306 315 307 void __exit hidp_cleanup_sockets(void) 316 void __exit hidp_cleanup_sockets(void) 308 { 317 { 309 bt_procfs_cleanup(&init_net, "hidp"); 318 bt_procfs_cleanup(&init_net, "hidp"); 310 bt_sock_unregister(BTPROTO_HIDP); 319 bt_sock_unregister(BTPROTO_HIDP); 311 proto_unregister(&hidp_proto); 320 proto_unregister(&hidp_proto); 312 } 321 } 313 322
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.