forked from Qortal/Brooklyn
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
769 lines
17 KiB
769 lines
17 KiB
/* |
|
BNEP implementation for Linux Bluetooth stack (BlueZ). |
|
Copyright (C) 2001-2002 Inventel Systemes |
|
Written 2001-2002 by |
|
Clément Moreau <[email protected]> |
|
David Libault <[email protected]> |
|
|
|
Copyright (C) 2002 Maxim Krasnyansky <[email protected]> |
|
|
|
This program is free software; you can redistribute it and/or modify |
|
it under the terms of the GNU General Public License version 2 as |
|
published by the Free Software Foundation; |
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, |
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. |
|
IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY |
|
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES |
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
|
|
|
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS, |
|
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS |
|
SOFTWARE IS DISCLAIMED. |
|
*/ |
|
|
|
#include <linux/module.h> |
|
#include <linux/kthread.h> |
|
#include <linux/file.h> |
|
#include <linux/etherdevice.h> |
|
#include <asm/unaligned.h> |
|
|
|
#include <net/bluetooth/bluetooth.h> |
|
#include <net/bluetooth/l2cap.h> |
|
#include <net/bluetooth/hci_core.h> |
|
|
|
#include "bnep.h" |
|
|
|
#define VERSION "1.3" |
|
|
|
static bool compress_src = true; |
|
static bool compress_dst = true; |
|
|
|
static LIST_HEAD(bnep_session_list); |
|
static DECLARE_RWSEM(bnep_session_sem); |
|
|
|
static struct bnep_session *__bnep_get_session(u8 *dst) |
|
{ |
|
struct bnep_session *s; |
|
|
|
BT_DBG(""); |
|
|
|
list_for_each_entry(s, &bnep_session_list, list) |
|
if (ether_addr_equal(dst, s->eh.h_source)) |
|
return s; |
|
|
|
return NULL; |
|
} |
|
|
|
static void __bnep_link_session(struct bnep_session *s) |
|
{ |
|
list_add(&s->list, &bnep_session_list); |
|
} |
|
|
|
static void __bnep_unlink_session(struct bnep_session *s) |
|
{ |
|
list_del(&s->list); |
|
} |
|
|
|
static int bnep_send(struct bnep_session *s, void *data, size_t len) |
|
{ |
|
struct socket *sock = s->sock; |
|
struct kvec iv = { data, len }; |
|
|
|
return kernel_sendmsg(sock, &s->msg, &iv, 1, len); |
|
} |
|
|
|
static int bnep_send_rsp(struct bnep_session *s, u8 ctrl, u16 resp) |
|
{ |
|
struct bnep_control_rsp rsp; |
|
rsp.type = BNEP_CONTROL; |
|
rsp.ctrl = ctrl; |
|
rsp.resp = htons(resp); |
|
return bnep_send(s, &rsp, sizeof(rsp)); |
|
} |
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER |
|
static inline void bnep_set_default_proto_filter(struct bnep_session *s) |
|
{ |
|
/* (IPv4, ARP) */ |
|
s->proto_filter[0].start = ETH_P_IP; |
|
s->proto_filter[0].end = ETH_P_ARP; |
|
/* (RARP, AppleTalk) */ |
|
s->proto_filter[1].start = ETH_P_RARP; |
|
s->proto_filter[1].end = ETH_P_AARP; |
|
/* (IPX, IPv6) */ |
|
s->proto_filter[2].start = ETH_P_IPX; |
|
s->proto_filter[2].end = ETH_P_IPV6; |
|
} |
|
#endif |
|
|
|
static int bnep_ctrl_set_netfilter(struct bnep_session *s, __be16 *data, int len) |
|
{ |
|
int n; |
|
|
|
if (len < 2) |
|
return -EILSEQ; |
|
|
|
n = get_unaligned_be16(data); |
|
data++; |
|
len -= 2; |
|
|
|
if (len < n) |
|
return -EILSEQ; |
|
|
|
BT_DBG("filter len %d", n); |
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER |
|
n /= 4; |
|
if (n <= BNEP_MAX_PROTO_FILTERS) { |
|
struct bnep_proto_filter *f = s->proto_filter; |
|
int i; |
|
|
|
for (i = 0; i < n; i++) { |
|
f[i].start = get_unaligned_be16(data++); |
|
f[i].end = get_unaligned_be16(data++); |
|
|
|
BT_DBG("proto filter start %u end %u", |
|
f[i].start, f[i].end); |
|
} |
|
|
|
if (i < BNEP_MAX_PROTO_FILTERS) |
|
memset(f + i, 0, sizeof(*f)); |
|
|
|
if (n == 0) |
|
bnep_set_default_proto_filter(s); |
|
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_SUCCESS); |
|
} else { |
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_LIMIT_REACHED); |
|
} |
|
#else |
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_UNSUPPORTED_REQ); |
|
#endif |
|
return 0; |
|
} |
|
|
|
static int bnep_ctrl_set_mcfilter(struct bnep_session *s, u8 *data, int len) |
|
{ |
|
int n; |
|
|
|
if (len < 2) |
|
return -EILSEQ; |
|
|
|
n = get_unaligned_be16(data); |
|
data += 2; |
|
len -= 2; |
|
|
|
if (len < n) |
|
return -EILSEQ; |
|
|
|
BT_DBG("filter len %d", n); |
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER |
|
n /= (ETH_ALEN * 2); |
|
|
|
if (n > 0) { |
|
int i; |
|
|
|
s->mc_filter = 0; |
|
|
|
/* Always send broadcast */ |
|
set_bit(bnep_mc_hash(s->dev->broadcast), (ulong *) &s->mc_filter); |
|
|
|
/* Add address ranges to the multicast hash */ |
|
for (; n > 0; n--) { |
|
u8 a1[6], *a2; |
|
|
|
memcpy(a1, data, ETH_ALEN); |
|
data += ETH_ALEN; |
|
a2 = data; |
|
data += ETH_ALEN; |
|
|
|
BT_DBG("mc filter %pMR -> %pMR", a1, a2); |
|
|
|
/* Iterate from a1 to a2 */ |
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter); |
|
while (memcmp(a1, a2, 6) < 0 && s->mc_filter != ~0LL) { |
|
/* Increment a1 */ |
|
i = 5; |
|
while (i >= 0 && ++a1[i--] == 0) |
|
; |
|
|
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter); |
|
} |
|
} |
|
} |
|
|
|
BT_DBG("mc filter hash 0x%llx", s->mc_filter); |
|
|
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_SUCCESS); |
|
#else |
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_FILTER_UNSUPPORTED_REQ); |
|
#endif |
|
return 0; |
|
} |
|
|
|
static int bnep_rx_control(struct bnep_session *s, void *data, int len) |
|
{ |
|
u8 cmd = *(u8 *)data; |
|
int err = 0; |
|
|
|
data++; |
|
len--; |
|
|
|
switch (cmd) { |
|
case BNEP_CMD_NOT_UNDERSTOOD: |
|
case BNEP_SETUP_CONN_RSP: |
|
case BNEP_FILTER_NET_TYPE_RSP: |
|
case BNEP_FILTER_MULTI_ADDR_RSP: |
|
/* Ignore these for now */ |
|
break; |
|
|
|
case BNEP_FILTER_NET_TYPE_SET: |
|
err = bnep_ctrl_set_netfilter(s, data, len); |
|
break; |
|
|
|
case BNEP_FILTER_MULTI_ADDR_SET: |
|
err = bnep_ctrl_set_mcfilter(s, data, len); |
|
break; |
|
|
|
case BNEP_SETUP_CONN_REQ: |
|
/* Successful response should be sent only once */ |
|
if (test_bit(BNEP_SETUP_RESPONSE, &s->flags) && |
|
!test_and_set_bit(BNEP_SETUP_RSP_SENT, &s->flags)) |
|
err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP, |
|
BNEP_SUCCESS); |
|
else |
|
err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP, |
|
BNEP_CONN_NOT_ALLOWED); |
|
break; |
|
|
|
default: { |
|
u8 pkt[3]; |
|
pkt[0] = BNEP_CONTROL; |
|
pkt[1] = BNEP_CMD_NOT_UNDERSTOOD; |
|
pkt[2] = cmd; |
|
err = bnep_send(s, pkt, sizeof(pkt)); |
|
} |
|
break; |
|
} |
|
|
|
return err; |
|
} |
|
|
|
static int bnep_rx_extension(struct bnep_session *s, struct sk_buff *skb) |
|
{ |
|
struct bnep_ext_hdr *h; |
|
int err = 0; |
|
|
|
do { |
|
h = (void *) skb->data; |
|
if (!skb_pull(skb, sizeof(*h))) { |
|
err = -EILSEQ; |
|
break; |
|
} |
|
|
|
BT_DBG("type 0x%x len %u", h->type, h->len); |
|
|
|
switch (h->type & BNEP_TYPE_MASK) { |
|
case BNEP_EXT_CONTROL: |
|
bnep_rx_control(s, skb->data, skb->len); |
|
break; |
|
|
|
default: |
|
/* Unknown extension, skip it. */ |
|
break; |
|
} |
|
|
|
if (!skb_pull(skb, h->len)) { |
|
err = -EILSEQ; |
|
break; |
|
} |
|
} while (!err && (h->type & BNEP_EXT_HEADER)); |
|
|
|
return err; |
|
} |
|
|
|
static u8 __bnep_rx_hlen[] = { |
|
ETH_HLEN, /* BNEP_GENERAL */ |
|
0, /* BNEP_CONTROL */ |
|
2, /* BNEP_COMPRESSED */ |
|
ETH_ALEN + 2, /* BNEP_COMPRESSED_SRC_ONLY */ |
|
ETH_ALEN + 2 /* BNEP_COMPRESSED_DST_ONLY */ |
|
}; |
|
|
|
static int bnep_rx_frame(struct bnep_session *s, struct sk_buff *skb) |
|
{ |
|
struct net_device *dev = s->dev; |
|
struct sk_buff *nskb; |
|
u8 type, ctrl_type; |
|
|
|
dev->stats.rx_bytes += skb->len; |
|
|
|
type = *(u8 *) skb->data; |
|
skb_pull(skb, 1); |
|
ctrl_type = *(u8 *)skb->data; |
|
|
|
if ((type & BNEP_TYPE_MASK) >= sizeof(__bnep_rx_hlen)) |
|
goto badframe; |
|
|
|
if ((type & BNEP_TYPE_MASK) == BNEP_CONTROL) { |
|
if (bnep_rx_control(s, skb->data, skb->len) < 0) { |
|
dev->stats.tx_errors++; |
|
kfree_skb(skb); |
|
return 0; |
|
} |
|
|
|
if (!(type & BNEP_EXT_HEADER)) { |
|
kfree_skb(skb); |
|
return 0; |
|
} |
|
|
|
/* Verify and pull ctrl message since it's already processed */ |
|
switch (ctrl_type) { |
|
case BNEP_SETUP_CONN_REQ: |
|
/* Pull: ctrl type (1 b), len (1 b), data (len bytes) */ |
|
if (!skb_pull(skb, 2 + *(u8 *)(skb->data + 1) * 2)) |
|
goto badframe; |
|
break; |
|
case BNEP_FILTER_MULTI_ADDR_SET: |
|
case BNEP_FILTER_NET_TYPE_SET: |
|
/* Pull: ctrl type (1 b), len (2 b), data (len bytes) */ |
|
if (!skb_pull(skb, 3 + *(u16 *)(skb->data + 1) * 2)) |
|
goto badframe; |
|
break; |
|
default: |
|
kfree_skb(skb); |
|
return 0; |
|
} |
|
} else { |
|
skb_reset_mac_header(skb); |
|
|
|
/* Verify and pull out header */ |
|
if (!skb_pull(skb, __bnep_rx_hlen[type & BNEP_TYPE_MASK])) |
|
goto badframe; |
|
|
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2)); |
|
} |
|
|
|
if (type & BNEP_EXT_HEADER) { |
|
if (bnep_rx_extension(s, skb) < 0) |
|
goto badframe; |
|
} |
|
|
|
/* Strip 802.1p header */ |
|
if (ntohs(s->eh.h_proto) == ETH_P_8021Q) { |
|
if (!skb_pull(skb, 4)) |
|
goto badframe; |
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2)); |
|
} |
|
|
|
/* We have to alloc new skb and copy data here :(. Because original skb |
|
* may not be modified and because of the alignment requirements. */ |
|
nskb = alloc_skb(2 + ETH_HLEN + skb->len, GFP_KERNEL); |
|
if (!nskb) { |
|
dev->stats.rx_dropped++; |
|
kfree_skb(skb); |
|
return -ENOMEM; |
|
} |
|
skb_reserve(nskb, 2); |
|
|
|
/* Decompress header and construct ether frame */ |
|
switch (type & BNEP_TYPE_MASK) { |
|
case BNEP_COMPRESSED: |
|
__skb_put_data(nskb, &s->eh, ETH_HLEN); |
|
break; |
|
|
|
case BNEP_COMPRESSED_SRC_ONLY: |
|
__skb_put_data(nskb, s->eh.h_dest, ETH_ALEN); |
|
__skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN); |
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2)); |
|
break; |
|
|
|
case BNEP_COMPRESSED_DST_ONLY: |
|
__skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN); |
|
__skb_put_data(nskb, s->eh.h_source, ETH_ALEN + 2); |
|
break; |
|
|
|
case BNEP_GENERAL: |
|
__skb_put_data(nskb, skb_mac_header(skb), ETH_ALEN * 2); |
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2)); |
|
break; |
|
} |
|
|
|
skb_copy_from_linear_data(skb, __skb_put(nskb, skb->len), skb->len); |
|
kfree_skb(skb); |
|
|
|
dev->stats.rx_packets++; |
|
nskb->ip_summed = CHECKSUM_NONE; |
|
nskb->protocol = eth_type_trans(nskb, dev); |
|
netif_rx_ni(nskb); |
|
return 0; |
|
|
|
badframe: |
|
dev->stats.rx_errors++; |
|
kfree_skb(skb); |
|
return 0; |
|
} |
|
|
|
static u8 __bnep_tx_types[] = { |
|
BNEP_GENERAL, |
|
BNEP_COMPRESSED_SRC_ONLY, |
|
BNEP_COMPRESSED_DST_ONLY, |
|
BNEP_COMPRESSED |
|
}; |
|
|
|
static int bnep_tx_frame(struct bnep_session *s, struct sk_buff *skb) |
|
{ |
|
struct ethhdr *eh = (void *) skb->data; |
|
struct socket *sock = s->sock; |
|
struct kvec iv[3]; |
|
int len = 0, il = 0; |
|
u8 type = 0; |
|
|
|
BT_DBG("skb %p dev %p type %u", skb, skb->dev, skb->pkt_type); |
|
|
|
if (!skb->dev) { |
|
/* Control frame sent by us */ |
|
goto send; |
|
} |
|
|
|
iv[il++] = (struct kvec) { &type, 1 }; |
|
len++; |
|
|
|
if (compress_src && ether_addr_equal(eh->h_dest, s->eh.h_source)) |
|
type |= 0x01; |
|
|
|
if (compress_dst && ether_addr_equal(eh->h_source, s->eh.h_dest)) |
|
type |= 0x02; |
|
|
|
if (type) |
|
skb_pull(skb, ETH_ALEN * 2); |
|
|
|
type = __bnep_tx_types[type]; |
|
switch (type) { |
|
case BNEP_COMPRESSED_SRC_ONLY: |
|
iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN }; |
|
len += ETH_ALEN; |
|
break; |
|
|
|
case BNEP_COMPRESSED_DST_ONLY: |
|
iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN }; |
|
len += ETH_ALEN; |
|
break; |
|
} |
|
|
|
send: |
|
iv[il++] = (struct kvec) { skb->data, skb->len }; |
|
len += skb->len; |
|
|
|
/* FIXME: linearize skb */ |
|
{ |
|
len = kernel_sendmsg(sock, &s->msg, iv, il, len); |
|
} |
|
kfree_skb(skb); |
|
|
|
if (len > 0) { |
|
s->dev->stats.tx_bytes += len; |
|
s->dev->stats.tx_packets++; |
|
return 0; |
|
} |
|
|
|
return len; |
|
} |
|
|
|
static int bnep_session(void *arg) |
|
{ |
|
struct bnep_session *s = arg; |
|
struct net_device *dev = s->dev; |
|
struct sock *sk = s->sock->sk; |
|
struct sk_buff *skb; |
|
DEFINE_WAIT_FUNC(wait, woken_wake_function); |
|
|
|
BT_DBG(""); |
|
|
|
set_user_nice(current, -15); |
|
|
|
add_wait_queue(sk_sleep(sk), &wait); |
|
while (1) { |
|
if (atomic_read(&s->terminate)) |
|
break; |
|
/* RX */ |
|
while ((skb = skb_dequeue(&sk->sk_receive_queue))) { |
|
skb_orphan(skb); |
|
if (!skb_linearize(skb)) |
|
bnep_rx_frame(s, skb); |
|
else |
|
kfree_skb(skb); |
|
} |
|
|
|
if (sk->sk_state != BT_CONNECTED) |
|
break; |
|
|
|
/* TX */ |
|
while ((skb = skb_dequeue(&sk->sk_write_queue))) |
|
if (bnep_tx_frame(s, skb)) |
|
break; |
|
netif_wake_queue(dev); |
|
|
|
/* |
|
* wait_woken() performs the necessary memory barriers |
|
* for us; see the header comment for this primitive. |
|
*/ |
|
wait_woken(&wait, TASK_INTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT); |
|
} |
|
remove_wait_queue(sk_sleep(sk), &wait); |
|
|
|
/* Cleanup session */ |
|
down_write(&bnep_session_sem); |
|
|
|
/* Delete network device */ |
|
unregister_netdev(dev); |
|
|
|
/* Wakeup user-space polling for socket errors */ |
|
s->sock->sk->sk_err = EUNATCH; |
|
|
|
wake_up_interruptible(sk_sleep(s->sock->sk)); |
|
|
|
/* Release the socket */ |
|
fput(s->sock->file); |
|
|
|
__bnep_unlink_session(s); |
|
|
|
up_write(&bnep_session_sem); |
|
free_netdev(dev); |
|
module_put_and_kthread_exit(0); |
|
return 0; |
|
} |
|
|
|
static struct device *bnep_get_device(struct bnep_session *session) |
|
{ |
|
struct l2cap_conn *conn = l2cap_pi(session->sock->sk)->chan->conn; |
|
|
|
if (!conn || !conn->hcon) |
|
return NULL; |
|
|
|
return &conn->hcon->dev; |
|
} |
|
|
|
static struct device_type bnep_type = { |
|
.name = "bluetooth", |
|
}; |
|
|
|
int bnep_add_connection(struct bnep_connadd_req *req, struct socket *sock) |
|
{ |
|
u32 valid_flags = BIT(BNEP_SETUP_RESPONSE); |
|
struct net_device *dev; |
|
struct bnep_session *s, *ss; |
|
u8 dst[ETH_ALEN], src[ETH_ALEN]; |
|
int err; |
|
|
|
BT_DBG(""); |
|
|
|
if (!l2cap_is_socket(sock)) |
|
return -EBADFD; |
|
|
|
if (req->flags & ~valid_flags) |
|
return -EINVAL; |
|
|
|
baswap((void *) dst, &l2cap_pi(sock->sk)->chan->dst); |
|
baswap((void *) src, &l2cap_pi(sock->sk)->chan->src); |
|
|
|
/* session struct allocated as private part of net_device */ |
|
dev = alloc_netdev(sizeof(struct bnep_session), |
|
(*req->device) ? req->device : "bnep%d", |
|
NET_NAME_UNKNOWN, |
|
bnep_net_setup); |
|
if (!dev) |
|
return -ENOMEM; |
|
|
|
down_write(&bnep_session_sem); |
|
|
|
ss = __bnep_get_session(dst); |
|
if (ss && ss->state == BT_CONNECTED) { |
|
err = -EEXIST; |
|
goto failed; |
|
} |
|
|
|
s = netdev_priv(dev); |
|
|
|
/* This is rx header therefore addresses are swapped. |
|
* ie. eh.h_dest is our local address. */ |
|
memcpy(s->eh.h_dest, &src, ETH_ALEN); |
|
memcpy(s->eh.h_source, &dst, ETH_ALEN); |
|
eth_hw_addr_set(dev, s->eh.h_dest); |
|
|
|
s->dev = dev; |
|
s->sock = sock; |
|
s->role = req->role; |
|
s->state = BT_CONNECTED; |
|
s->flags = req->flags; |
|
|
|
s->msg.msg_flags = MSG_NOSIGNAL; |
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER |
|
/* Set default mc filter to not filter out any mc addresses |
|
* as defined in the BNEP specification (revision 0.95a) |
|
* http://grouper.ieee.org/groups/802/15/Bluetooth/BNEP.pdf |
|
*/ |
|
s->mc_filter = ~0LL; |
|
#endif |
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER |
|
/* Set default protocol filter */ |
|
bnep_set_default_proto_filter(s); |
|
#endif |
|
|
|
SET_NETDEV_DEV(dev, bnep_get_device(s)); |
|
SET_NETDEV_DEVTYPE(dev, &bnep_type); |
|
|
|
err = register_netdev(dev); |
|
if (err) |
|
goto failed; |
|
|
|
__bnep_link_session(s); |
|
|
|
__module_get(THIS_MODULE); |
|
s->task = kthread_run(bnep_session, s, "kbnepd %s", dev->name); |
|
if (IS_ERR(s->task)) { |
|
/* Session thread start failed, gotta cleanup. */ |
|
module_put(THIS_MODULE); |
|
unregister_netdev(dev); |
|
__bnep_unlink_session(s); |
|
err = PTR_ERR(s->task); |
|
goto failed; |
|
} |
|
|
|
up_write(&bnep_session_sem); |
|
strcpy(req->device, dev->name); |
|
return 0; |
|
|
|
failed: |
|
up_write(&bnep_session_sem); |
|
free_netdev(dev); |
|
return err; |
|
} |
|
|
|
int bnep_del_connection(struct bnep_conndel_req *req) |
|
{ |
|
u32 valid_flags = 0; |
|
struct bnep_session *s; |
|
int err = 0; |
|
|
|
BT_DBG(""); |
|
|
|
if (req->flags & ~valid_flags) |
|
return -EINVAL; |
|
|
|
down_read(&bnep_session_sem); |
|
|
|
s = __bnep_get_session(req->dst); |
|
if (s) { |
|
atomic_inc(&s->terminate); |
|
wake_up_interruptible(sk_sleep(s->sock->sk)); |
|
} else |
|
err = -ENOENT; |
|
|
|
up_read(&bnep_session_sem); |
|
return err; |
|
} |
|
|
|
static void __bnep_copy_ci(struct bnep_conninfo *ci, struct bnep_session *s) |
|
{ |
|
u32 valid_flags = BIT(BNEP_SETUP_RESPONSE); |
|
|
|
memset(ci, 0, sizeof(*ci)); |
|
memcpy(ci->dst, s->eh.h_source, ETH_ALEN); |
|
strcpy(ci->device, s->dev->name); |
|
ci->flags = s->flags & valid_flags; |
|
ci->state = s->state; |
|
ci->role = s->role; |
|
} |
|
|
|
int bnep_get_connlist(struct bnep_connlist_req *req) |
|
{ |
|
struct bnep_session *s; |
|
int err = 0, n = 0; |
|
|
|
down_read(&bnep_session_sem); |
|
|
|
list_for_each_entry(s, &bnep_session_list, list) { |
|
struct bnep_conninfo ci; |
|
|
|
__bnep_copy_ci(&ci, s); |
|
|
|
if (copy_to_user(req->ci, &ci, sizeof(ci))) { |
|
err = -EFAULT; |
|
break; |
|
} |
|
|
|
if (++n >= req->cnum) |
|
break; |
|
|
|
req->ci++; |
|
} |
|
req->cnum = n; |
|
|
|
up_read(&bnep_session_sem); |
|
return err; |
|
} |
|
|
|
int bnep_get_conninfo(struct bnep_conninfo *ci) |
|
{ |
|
struct bnep_session *s; |
|
int err = 0; |
|
|
|
down_read(&bnep_session_sem); |
|
|
|
s = __bnep_get_session(ci->dst); |
|
if (s) |
|
__bnep_copy_ci(ci, s); |
|
else |
|
err = -ENOENT; |
|
|
|
up_read(&bnep_session_sem); |
|
return err; |
|
} |
|
|
|
static int __init bnep_init(void) |
|
{ |
|
char flt[50] = ""; |
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER |
|
strcat(flt, "protocol "); |
|
#endif |
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER |
|
strcat(flt, "multicast"); |
|
#endif |
|
|
|
BT_INFO("BNEP (Ethernet Emulation) ver %s", VERSION); |
|
if (flt[0]) |
|
BT_INFO("BNEP filters: %s", flt); |
|
|
|
bnep_sock_init(); |
|
return 0; |
|
} |
|
|
|
static void __exit bnep_exit(void) |
|
{ |
|
bnep_sock_cleanup(); |
|
} |
|
|
|
module_init(bnep_init); |
|
module_exit(bnep_exit); |
|
|
|
module_param(compress_src, bool, 0644); |
|
MODULE_PARM_DESC(compress_src, "Compress sources headers"); |
|
|
|
module_param(compress_dst, bool, 0644); |
|
MODULE_PARM_DESC(compress_dst, "Compress destination headers"); |
|
|
|
MODULE_AUTHOR("Marcel Holtmann <[email protected]>"); |
|
MODULE_DESCRIPTION("Bluetooth BNEP ver " VERSION); |
|
MODULE_VERSION(VERSION); |
|
MODULE_LICENSE("GPL"); |
|
MODULE_ALIAS("bt-proto-4");
|
|
|