~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/net/bluetooth/af_bluetooth.c

Version: ~ [ linux-6.1-rc7 ] ~ [ linux-6.0.10 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.80 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.156 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.225 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.267 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.300 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.334 ] ~ [ linux-4.8.17 ] ~ [ linux-4.7.10 ] ~ [ linux-4.6.7 ] ~ [ linux-4.5.7 ] ~ [ linux-4.4.302 ] ~ [ linux-4.3.6 ] ~ [ linux-4.2.8 ] ~ [ linux-4.1.52 ] ~ [ linux-4.0.9 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 /*
  2    BlueZ - Bluetooth protocol stack for Linux
  3    Copyright (C) 2000-2001 Qualcomm Incorporated
  4 
  5    Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
  6 
  7    This program is free software; you can redistribute it and/or modify
  8    it under the terms of the GNU General Public License version 2 as
  9    published by the Free Software Foundation;
 10 
 11    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
 12    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 13    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
 14    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
 15    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
 16    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
 17    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
 18    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 19 
 20    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
 21    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
 22    SOFTWARE IS DISCLAIMED.
 23 */
 24 
 25 /* Bluetooth address family and sockets. */
 26 
 27 #include <linux/module.h>
 28 #include <linux/debugfs.h>
 29 #include <linux/stringify.h>
 30 #include <linux/sched/signal.h>
 31 
 32 #include <asm/ioctls.h>
 33 
 34 #include <net/bluetooth/bluetooth.h>
 35 #include <linux/proc_fs.h>
 36 
 37 #include "leds.h"
 38 #include "selftest.h"
 39 
 40 /* Bluetooth sockets */
 41 #define BT_MAX_PROTO    8
 42 static const struct net_proto_family *bt_proto[BT_MAX_PROTO];
 43 static DEFINE_RWLOCK(bt_proto_lock);
 44 
 45 static struct lock_class_key bt_lock_key[BT_MAX_PROTO];
 46 static const char *const bt_key_strings[BT_MAX_PROTO] = {
 47         "sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP",
 48         "sk_lock-AF_BLUETOOTH-BTPROTO_HCI",
 49         "sk_lock-AF_BLUETOOTH-BTPROTO_SCO",
 50         "sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM",
 51         "sk_lock-AF_BLUETOOTH-BTPROTO_BNEP",
 52         "sk_lock-AF_BLUETOOTH-BTPROTO_CMTP",
 53         "sk_lock-AF_BLUETOOTH-BTPROTO_HIDP",
 54         "sk_lock-AF_BLUETOOTH-BTPROTO_AVDTP",
 55 };
 56 
 57 static struct lock_class_key bt_slock_key[BT_MAX_PROTO];
 58 static const char *const bt_slock_key_strings[BT_MAX_PROTO] = {
 59         "slock-AF_BLUETOOTH-BTPROTO_L2CAP",
 60         "slock-AF_BLUETOOTH-BTPROTO_HCI",
 61         "slock-AF_BLUETOOTH-BTPROTO_SCO",
 62         "slock-AF_BLUETOOTH-BTPROTO_RFCOMM",
 63         "slock-AF_BLUETOOTH-BTPROTO_BNEP",
 64         "slock-AF_BLUETOOTH-BTPROTO_CMTP",
 65         "slock-AF_BLUETOOTH-BTPROTO_HIDP",
 66         "slock-AF_BLUETOOTH-BTPROTO_AVDTP",
 67 };
 68 
 69 void bt_sock_reclassify_lock(struct sock *sk, int proto)
 70 {
 71         BUG_ON(!sk);
 72         BUG_ON(!sock_allow_reclassification(sk));
 73 
 74         sock_lock_init_class_and_name(sk,
 75                         bt_slock_key_strings[proto], &bt_slock_key[proto],
 76                                 bt_key_strings[proto], &bt_lock_key[proto]);
 77 }
 78 EXPORT_SYMBOL(bt_sock_reclassify_lock);
 79 
 80 int bt_sock_register(int proto, const struct net_proto_family *ops)
 81 {
 82         int err = 0;
 83 
 84         if (proto < 0 || proto >= BT_MAX_PROTO)
 85                 return -EINVAL;
 86 
 87         write_lock(&bt_proto_lock);
 88 
 89         if (bt_proto[proto])
 90                 err = -EEXIST;
 91         else
 92                 bt_proto[proto] = ops;
 93 
 94         write_unlock(&bt_proto_lock);
 95 
 96         return err;
 97 }
 98 EXPORT_SYMBOL(bt_sock_register);
 99 
100 void bt_sock_unregister(int proto)
101 {
102         if (proto < 0 || proto >= BT_MAX_PROTO)
103                 return;
104 
105         write_lock(&bt_proto_lock);
106         bt_proto[proto] = NULL;
107         write_unlock(&bt_proto_lock);
108 }
109 EXPORT_SYMBOL(bt_sock_unregister);
110 
111 static int bt_sock_create(struct net *net, struct socket *sock, int proto,
112                           int kern)
113 {
114         int err;
115 
116         if (net != &init_net)
117                 return -EAFNOSUPPORT;
118 
119         if (proto < 0 || proto >= BT_MAX_PROTO)
120                 return -EINVAL;
121 
122         if (!bt_proto[proto])
123                 request_module("bt-proto-%d", proto);
124 
125         err = -EPROTONOSUPPORT;
126 
127         read_lock(&bt_proto_lock);
128 
129         if (bt_proto[proto] && try_module_get(bt_proto[proto]->owner)) {
130                 err = bt_proto[proto]->create(net, sock, proto, kern);
131                 if (!err)
132                         bt_sock_reclassify_lock(sock->sk, proto);
133                 module_put(bt_proto[proto]->owner);
134         }
135 
136         read_unlock(&bt_proto_lock);
137 
138         return err;
139 }
140 
141 void bt_sock_link(struct bt_sock_list *l, struct sock *sk)
142 {
143         write_lock(&l->lock);
144         sk_add_node(sk, &l->head);
145         write_unlock(&l->lock);
146 }
147 EXPORT_SYMBOL(bt_sock_link);
148 
149 void bt_sock_unlink(struct bt_sock_list *l, struct sock *sk)
150 {
151         write_lock(&l->lock);
152         sk_del_node_init(sk);
153         write_unlock(&l->lock);
154 }
155 EXPORT_SYMBOL(bt_sock_unlink);
156 
157 void bt_accept_enqueue(struct sock *parent, struct sock *sk, bool bh)
158 {
159         BT_DBG("parent %p, sk %p", parent, sk);
160 
161         sock_hold(sk);
162 
163         if (bh)
164                 bh_lock_sock_nested(sk);
165         else
166                 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
167 
168         list_add_tail(&bt_sk(sk)->accept_q, &bt_sk(parent)->accept_q);
169         bt_sk(sk)->parent = parent;
170 
171         if (bh)
172                 bh_unlock_sock(sk);
173         else
174                 release_sock(sk);
175 
176         sk_acceptq_added(parent);
177 }
178 EXPORT_SYMBOL(bt_accept_enqueue);
179 
180 /* Calling function must hold the sk lock.
181  * bt_sk(sk)->parent must be non-NULL meaning sk is in the parent list.
182  */
183 void bt_accept_unlink(struct sock *sk)
184 {
185         BT_DBG("sk %p state %d", sk, sk->sk_state);
186 
187         list_del_init(&bt_sk(sk)->accept_q);
188         sk_acceptq_removed(bt_sk(sk)->parent);
189         bt_sk(sk)->parent = NULL;
190         sock_put(sk);
191 }
192 EXPORT_SYMBOL(bt_accept_unlink);
193 
194 struct sock *bt_accept_dequeue(struct sock *parent, struct socket *newsock)
195 {
196         struct bt_sock *s, *n;
197         struct sock *sk;
198 
199         BT_DBG("parent %p", parent);
200 
201 restart:
202         list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
203                 sk = (struct sock *)s;
204 
205                 /* Prevent early freeing of sk due to unlink and sock_kill */
206                 sock_hold(sk);
207                 lock_sock(sk);
208 
209                 /* Check sk has not already been unlinked via
210                  * bt_accept_unlink() due to serialisation caused by sk locking
211                  */
212                 if (!bt_sk(sk)->parent) {
213                         BT_DBG("sk %p, already unlinked", sk);
214                         release_sock(sk);
215                         sock_put(sk);
216 
217                         /* Restart the loop as sk is no longer in the list
218                          * and also avoid a potential infinite loop because
219                          * list_for_each_entry_safe() is not thread safe.
220                          */
221                         goto restart;
222                 }
223 
224                 /* sk is safely in the parent list so reduce reference count */
225                 sock_put(sk);
226 
227                 /* FIXME: Is this check still needed */
228                 if (sk->sk_state == BT_CLOSED) {
229                         bt_accept_unlink(sk);
230                         release_sock(sk);
231                         continue;
232                 }
233 
234                 if (sk->sk_state == BT_CONNECTED || !newsock ||
235                     test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) {
236                         bt_accept_unlink(sk);
237                         if (newsock)
238                                 sock_graft(sk, newsock);
239 
240                         release_sock(sk);
241                         return sk;
242                 }
243 
244                 release_sock(sk);
245         }
246 
247         return NULL;
248 }
249 EXPORT_SYMBOL(bt_accept_dequeue);
250 
251 int bt_sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
252                     int flags)
253 {
254         int noblock = flags & MSG_DONTWAIT;
255         struct sock *sk = sock->sk;
256         struct sk_buff *skb;
257         size_t copied;
258         size_t skblen;
259         int err;
260 
261         BT_DBG("sock %p sk %p len %zu", sock, sk, len);
262 
263         if (flags & MSG_OOB)
264                 return -EOPNOTSUPP;
265 
266         skb = skb_recv_datagram(sk, flags, noblock, &err);
267         if (!skb) {
268                 if (sk->sk_shutdown & RCV_SHUTDOWN)
269                         return 0;
270 
271                 return err;
272         }
273 
274         skblen = skb->len;
275         copied = skb->len;
276         if (len < copied) {
277                 msg->msg_flags |= MSG_TRUNC;
278                 copied = len;
279         }
280 
281         skb_reset_transport_header(skb);
282         err = skb_copy_datagram_msg(skb, 0, msg, copied);
283         if (err == 0) {
284                 sock_recv_ts_and_drops(msg, sk, skb);
285 
286                 if (msg->msg_name && bt_sk(sk)->skb_msg_name)
287                         bt_sk(sk)->skb_msg_name(skb, msg->msg_name,
288                                                 &msg->msg_namelen);
289         }
290 
291         skb_free_datagram(sk, skb);
292 
293         if (flags & MSG_TRUNC)
294                 copied = skblen;
295 
296         return err ? : copied;
297 }
298 EXPORT_SYMBOL(bt_sock_recvmsg);
299 
300 static long bt_sock_data_wait(struct sock *sk, long timeo)
301 {
302         DECLARE_WAITQUEUE(wait, current);
303 
304         add_wait_queue(sk_sleep(sk), &wait);
305         for (;;) {
306                 set_current_state(TASK_INTERRUPTIBLE);
307 
308                 if (!skb_queue_empty(&sk->sk_receive_queue))
309                         break;
310 
311                 if (sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN))
312                         break;
313 
314                 if (signal_pending(current) || !timeo)
315                         break;
316 
317                 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
318                 release_sock(sk);
319                 timeo = schedule_timeout(timeo);
320                 lock_sock(sk);
321                 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
322         }
323 
324         __set_current_state(TASK_RUNNING);
325         remove_wait_queue(sk_sleep(sk), &wait);
326         return timeo;
327 }
328 
329 int bt_sock_stream_recvmsg(struct socket *sock, struct msghdr *msg,
330                            size_t size, int flags)
331 {
332         struct sock *sk = sock->sk;
333         int err = 0;
334         size_t target, copied = 0;
335         long timeo;
336 
337         if (flags & MSG_OOB)
338                 return -EOPNOTSUPP;
339 
340         BT_DBG("sk %p size %zu", sk, size);
341 
342         lock_sock(sk);
343 
344         target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
345         timeo  = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
346 
347         do {
348                 struct sk_buff *skb;
349                 int chunk;
350 
351                 skb = skb_dequeue(&sk->sk_receive_queue);
352                 if (!skb) {
353                         if (copied >= target)
354                                 break;
355 
356                         err = sock_error(sk);
357                         if (err)
358                                 break;
359                         if (sk->sk_shutdown & RCV_SHUTDOWN)
360                                 break;
361 
362                         err = -EAGAIN;
363                         if (!timeo)
364                                 break;
365 
366                         timeo = bt_sock_data_wait(sk, timeo);
367 
368                         if (signal_pending(current)) {
369                                 err = sock_intr_errno(timeo);
370                                 goto out;
371                         }
372                         continue;
373                 }
374 
375                 chunk = min_t(unsigned int, skb->len, size);
376                 if (skb_copy_datagram_msg(skb, 0, msg, chunk)) {
377                         skb_queue_head(&sk->sk_receive_queue, skb);
378                         if (!copied)
379                                 copied = -EFAULT;
380                         break;
381                 }
382                 copied += chunk;
383                 size   -= chunk;
384 
385                 sock_recv_ts_and_drops(msg, sk, skb);
386 
387                 if (!(flags & MSG_PEEK)) {
388                         int skb_len = skb_headlen(skb);
389 
390                         if (chunk <= skb_len) {
391                                 __skb_pull(skb, chunk);
392                         } else {
393                                 struct sk_buff *frag;
394 
395                                 __skb_pull(skb, skb_len);
396                                 chunk -= skb_len;
397 
398                                 skb_walk_frags(skb, frag) {
399                                         if (chunk <= frag->len) {
400                                                 /* Pulling partial data */
401                                                 skb->len -= chunk;
402                                                 skb->data_len -= chunk;
403                                                 __skb_pull(frag, chunk);
404                                                 break;
405                                         } else if (frag->len) {
406                                                 /* Pulling all frag data */
407                                                 chunk -= frag->len;
408                                                 skb->len -= frag->len;
409                                                 skb->data_len -= frag->len;
410                                                 __skb_pull(frag, frag->len);
411                                         }
412                                 }
413                         }
414 
415                         if (skb->len) {
416                                 skb_queue_head(&sk->sk_receive_queue, skb);
417                                 break;
418                         }
419                         kfree_skb(skb);
420 
421                 } else {
422                         /* put message back and return */
423                         skb_queue_head(&sk->sk_receive_queue, skb);
424                         break;
425                 }
426         } while (size);
427 
428 out:
429         release_sock(sk);
430         return copied ? : err;
431 }
432 EXPORT_SYMBOL(bt_sock_stream_recvmsg);
433 
434 static inline __poll_t bt_accept_poll(struct sock *parent)
435 {
436         struct bt_sock *s, *n;
437         struct sock *sk;
438 
439         list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
440                 sk = (struct sock *)s;
441                 if (sk->sk_state == BT_CONNECTED ||
442                     (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags) &&
443                      sk->sk_state == BT_CONNECT2))
444                         return EPOLLIN | EPOLLRDNORM;
445         }
446 
447         return 0;
448 }
449 
450 __poll_t bt_sock_poll(struct file *file, struct socket *sock,
451                           poll_table *wait)
452 {
453         struct sock *sk = sock->sk;
454         __poll_t mask = 0;
455 
456         BT_DBG("sock %p, sk %p", sock, sk);
457 
458         poll_wait(file, sk_sleep(sk), wait);
459 
460         if (sk->sk_state == BT_LISTEN)
461                 return bt_accept_poll(sk);
462 
463         if (sk->sk_err || !skb_queue_empty_lockless(&sk->sk_error_queue))
464                 mask |= EPOLLERR |
465                         (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? EPOLLPRI : 0);
466 
467         if (sk->sk_shutdown & RCV_SHUTDOWN)
468                 mask |= EPOLLRDHUP | EPOLLIN | EPOLLRDNORM;
469 
470         if (sk->sk_shutdown == SHUTDOWN_MASK)
471                 mask |= EPOLLHUP;
472 
473         if (!skb_queue_empty_lockless(&sk->sk_receive_queue))
474                 mask |= EPOLLIN | EPOLLRDNORM;
475 
476         if (sk->sk_state == BT_CLOSED)
477                 mask |= EPOLLHUP;
478 
479         if (sk->sk_state == BT_CONNECT ||
480                         sk->sk_state == BT_CONNECT2 ||
481                         sk->sk_state == BT_CONFIG)
482                 return mask;
483 
484         if (!test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags) && sock_writeable(sk))
485                 mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
486         else
487                 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
488 
489         return mask;
490 }
491 EXPORT_SYMBOL(bt_sock_poll);
492 
493 int bt_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
494 {
495         struct sock *sk = sock->sk;
496         struct sk_buff *skb;
497         long amount;
498         int err;
499 
500         BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
501 
502         switch (cmd) {
503         case TIOCOUTQ:
504                 if (sk->sk_state == BT_LISTEN)
505                         return -EINVAL;
506 
507                 amount = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
508                 if (amount < 0)
509                         amount = 0;
510                 err = put_user(amount, (int __user *) arg);
511                 break;
512 
513         case TIOCINQ:
514                 if (sk->sk_state == BT_LISTEN)
515                         return -EINVAL;
516 
517                 lock_sock(sk);
518                 skb = skb_peek(&sk->sk_receive_queue);
519                 amount = skb ? skb->len : 0;
520                 release_sock(sk);
521                 err = put_user(amount, (int __user *) arg);
522                 break;
523 
524         default:
525                 err = -ENOIOCTLCMD;
526                 break;
527         }
528 
529         return err;
530 }
531 EXPORT_SYMBOL(bt_sock_ioctl);
532 
533 /* This function expects the sk lock to be held when called */
534 int bt_sock_wait_state(struct sock *sk, int state, unsigned long timeo)
535 {
536         DECLARE_WAITQUEUE(wait, current);
537         int err = 0;
538 
539         BT_DBG("sk %p", sk);
540 
541         add_wait_queue(sk_sleep(sk), &wait);
542         set_current_state(TASK_INTERRUPTIBLE);
543         while (sk->sk_state != state) {
544                 if (!timeo) {
545                         err = -EINPROGRESS;
546                         break;
547                 }
548 
549                 if (signal_pending(current)) {
550                         err = sock_intr_errno(timeo);
551                         break;
552                 }
553 
554                 release_sock(sk);
555                 timeo = schedule_timeout(timeo);
556                 lock_sock(sk);
557                 set_current_state(TASK_INTERRUPTIBLE);
558 
559                 err = sock_error(sk);
560                 if (err)
561                         break;
562         }
563         __set_current_state(TASK_RUNNING);
564         remove_wait_queue(sk_sleep(sk), &wait);
565         return err;
566 }
567 EXPORT_SYMBOL(bt_sock_wait_state);
568 
569 /* This function expects the sk lock to be held when called */
570 int bt_sock_wait_ready(struct sock *sk, unsigned long flags)
571 {
572         DECLARE_WAITQUEUE(wait, current);
573         unsigned long timeo;
574         int err = 0;
575 
576         BT_DBG("sk %p", sk);
577 
578         timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
579 
580         add_wait_queue(sk_sleep(sk), &wait);
581         set_current_state(TASK_INTERRUPTIBLE);
582         while (test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags)) {
583                 if (!timeo) {
584                         err = -EAGAIN;
585                         break;
586                 }
587 
588                 if (signal_pending(current)) {
589                         err = sock_intr_errno(timeo);
590                         break;
591                 }
592 
593                 release_sock(sk);
594                 timeo = schedule_timeout(timeo);
595                 lock_sock(sk);
596                 set_current_state(TASK_INTERRUPTIBLE);
597 
598                 err = sock_error(sk);
599                 if (err)
600                         break;
601         }
602         __set_current_state(TASK_RUNNING);
603         remove_wait_queue(sk_sleep(sk), &wait);
604 
605         return err;
606 }
607 EXPORT_SYMBOL(bt_sock_wait_ready);
608 
609 #ifdef CONFIG_PROC_FS
610 static void *bt_seq_start(struct seq_file *seq, loff_t *pos)
611         __acquires(seq->private->l->lock)
612 {
613         struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
614 
615         read_lock(&l->lock);
616         return seq_hlist_start_head(&l->head, *pos);
617 }
618 
619 static void *bt_seq_next(struct seq_file *seq, void *v, loff_t *pos)
620 {
621         struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
622 
623         return seq_hlist_next(v, &l->head, pos);
624 }
625 
626 static void bt_seq_stop(struct seq_file *seq, void *v)
627         __releases(seq->private->l->lock)
628 {
629         struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
630 
631         read_unlock(&l->lock);
632 }
633 
634 static int bt_seq_show(struct seq_file *seq, void *v)
635 {
636         struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
637 
638         if (v == SEQ_START_TOKEN) {
639                 seq_puts(seq ,"sk               RefCnt Rmem   Wmem   User   Inode  Parent");
640 
641                 if (l->custom_seq_show) {
642                         seq_putc(seq, ' ');
643                         l->custom_seq_show(seq, v);
644                 }
645 
646                 seq_putc(seq, '\n');
647         } else {
648                 struct sock *sk = sk_entry(v);
649                 struct bt_sock *bt = bt_sk(sk);
650 
651                 seq_printf(seq,
652                            "%pK %-6d %-6u %-6u %-6u %-6lu %-6lu",
653                            sk,
654                            refcount_read(&sk->sk_refcnt),
655                            sk_rmem_alloc_get(sk),
656                            sk_wmem_alloc_get(sk),
657                            from_kuid(seq_user_ns(seq), sock_i_uid(sk)),
658                            sock_i_ino(sk),
659                            bt->parent? sock_i_ino(bt->parent): 0LU);
660 
661                 if (l->custom_seq_show) {
662                         seq_putc(seq, ' ');
663                         l->custom_seq_show(seq, v);
664                 }
665 
666                 seq_putc(seq, '\n');
667         }
668         return 0;
669 }
670 
671 static const struct seq_operations bt_seq_ops = {
672         .start = bt_seq_start,
673         .next  = bt_seq_next,
674         .stop  = bt_seq_stop,
675         .show  = bt_seq_show,
676 };
677 
678 int bt_procfs_init(struct net *net, const char *name,
679                    struct bt_sock_list *sk_list,
680                    int (* seq_show)(struct seq_file *, void *))
681 {
682         sk_list->custom_seq_show = seq_show;
683 
684         if (!proc_create_seq_data(name, 0, net->proc_net, &bt_seq_ops, sk_list))
685                 return -ENOMEM;
686         return 0;
687 }
688 
689 void bt_procfs_cleanup(struct net *net, const char *name)
690 {
691         remove_proc_entry(name, net->proc_net);
692 }
693 #else
694 int bt_procfs_init(struct net *net, const char *name,
695                    struct bt_sock_list *sk_list,
696                    int (* seq_show)(struct seq_file *, void *))
697 {
698         return 0;
699 }
700 
701 void bt_procfs_cleanup(struct net *net, const char *name)
702 {
703 }
704 #endif
705 EXPORT_SYMBOL(bt_procfs_init);
706 EXPORT_SYMBOL(bt_procfs_cleanup);
707 
708 static const struct net_proto_family bt_sock_family_ops = {
709         .owner  = THIS_MODULE,
710         .family = PF_BLUETOOTH,
711         .create = bt_sock_create,
712 };
713 
714 struct dentry *bt_debugfs;
715 EXPORT_SYMBOL_GPL(bt_debugfs);
716 
717 #define VERSION __stringify(BT_SUBSYS_VERSION) "." \
718                 __stringify(BT_SUBSYS_REVISION)
719 
720 static int __init bt_init(void)
721 {
722         int err;
723 
724         sock_skb_cb_check_size(sizeof(struct bt_skb_cb));
725 
726         BT_INFO("Core ver %s", VERSION);
727 
728         err = bt_selftest();
729         if (err < 0)
730                 return err;
731 
732         bt_debugfs = debugfs_create_dir("bluetooth", NULL);
733 
734         bt_leds_init();
735 
736         err = bt_sysfs_init();
737         if (err < 0)
738                 return err;
739 
740         err = sock_register(&bt_sock_family_ops);
741         if (err)
742                 goto cleanup_sysfs;
743 
744         BT_INFO("HCI device and connection manager initialized");
745 
746         err = hci_sock_init();
747         if (err)
748                 goto unregister_socket;
749 
750         err = l2cap_init();
751         if (err)
752                 goto cleanup_socket;
753 
754         err = sco_init();
755         if (err)
756                 goto cleanup_cap;
757 
758         err = mgmt_init();
759         if (err)
760                 goto cleanup_sco;
761 
762         return 0;
763 
764 cleanup_sco:
765         sco_exit();
766 cleanup_cap:
767         l2cap_exit();
768 cleanup_socket:
769         hci_sock_cleanup();
770 unregister_socket:
771         sock_unregister(PF_BLUETOOTH);
772 cleanup_sysfs:
773         bt_sysfs_cleanup();
774         return err;
775 }
776 
777 static void __exit bt_exit(void)
778 {
779         mgmt_exit();
780 
781         sco_exit();
782 
783         l2cap_exit();
784 
785         hci_sock_cleanup();
786 
787         sock_unregister(PF_BLUETOOTH);
788 
789         bt_sysfs_cleanup();
790 
791         bt_leds_cleanup();
792 
793         debugfs_remove_recursive(bt_debugfs);
794 }
795 
796 subsys_initcall(bt_init);
797 module_exit(bt_exit);
798 
799 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
800 MODULE_DESCRIPTION("Bluetooth Core ver " VERSION);
801 MODULE_VERSION(VERSION);
802 MODULE_LICENSE("GPL");
803 MODULE_ALIAS_NETPROTO(PF_BLUETOOTH);
804 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | Wiki (Japanese) | Wiki (English) | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

osdn.jp