]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - net/bluetooth/af_bluetooth.c
net: use skb_queue_empty_lockless() in poll() handlers
[mirror_ubuntu-bionic-kernel.git] / net / bluetooth / af_bluetooth.c
CommitLineData
8e87d142 1/*
1da177e4
LT
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth address family and sockets. */
26
1da177e4 27#include <linux/module.h>
ffcecac6 28#include <linux/debugfs.h>
9e8305b3 29#include <linux/stringify.h>
174cd4b1
IM
30#include <linux/sched/signal.h>
31
3241ad82 32#include <asm/ioctls.h>
1da177e4
LT
33
34#include <net/bluetooth/bluetooth.h>
256a06c8 35#include <linux/proc_fs.h>
1da177e4 36
e64c97b5 37#include "leds.h"
ee485290
MH
38#include "selftest.h"
39
1da177e4
LT
40/* Bluetooth sockets */
41#define BT_MAX_PROTO 8
ec1b4cf7 42static const struct net_proto_family *bt_proto[BT_MAX_PROTO];
db7aa1c2 43static DEFINE_RWLOCK(bt_proto_lock);
68845cb2 44
68845cb2 45static struct lock_class_key bt_lock_key[BT_MAX_PROTO];
36cbd3dc 46static const char *const bt_key_strings[BT_MAX_PROTO] = {
68845cb2
DY
47 "sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP",
48 "sk_lock-AF_BLUETOOTH-BTPROTO_HCI",
49 "sk_lock-AF_BLUETOOTH-BTPROTO_SCO",
50 "sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM",
51 "sk_lock-AF_BLUETOOTH-BTPROTO_BNEP",
52 "sk_lock-AF_BLUETOOTH-BTPROTO_CMTP",
53 "sk_lock-AF_BLUETOOTH-BTPROTO_HIDP",
54 "sk_lock-AF_BLUETOOTH-BTPROTO_AVDTP",
55};
56
db7aa1c2 57static struct lock_class_key bt_slock_key[BT_MAX_PROTO];
36cbd3dc 58static const char *const bt_slock_key_strings[BT_MAX_PROTO] = {
68845cb2
DY
59 "slock-AF_BLUETOOTH-BTPROTO_L2CAP",
60 "slock-AF_BLUETOOTH-BTPROTO_HCI",
61 "slock-AF_BLUETOOTH-BTPROTO_SCO",
62 "slock-AF_BLUETOOTH-BTPROTO_RFCOMM",
63 "slock-AF_BLUETOOTH-BTPROTO_BNEP",
64 "slock-AF_BLUETOOTH-BTPROTO_CMTP",
65 "slock-AF_BLUETOOTH-BTPROTO_HIDP",
66 "slock-AF_BLUETOOTH-BTPROTO_AVDTP",
67};
db7aa1c2 68
b5a30dda 69void bt_sock_reclassify_lock(struct sock *sk, int proto)
db7aa1c2 70{
b5a30dda 71 BUG_ON(!sk);
fafc4e1e 72 BUG_ON(!sock_allow_reclassification(sk));
db7aa1c2
MH
73
74 sock_lock_init_class_and_name(sk,
75 bt_slock_key_strings[proto], &bt_slock_key[proto],
76 bt_key_strings[proto], &bt_lock_key[proto]);
77}
b5a30dda 78EXPORT_SYMBOL(bt_sock_reclassify_lock);
1da177e4 79
ec1b4cf7 80int bt_sock_register(int proto, const struct net_proto_family *ops)
1da177e4 81{
74da626a
MH
82 int err = 0;
83
1da177e4
LT
84 if (proto < 0 || proto >= BT_MAX_PROTO)
85 return -EINVAL;
86
74da626a
MH
87 write_lock(&bt_proto_lock);
88
1da177e4 89 if (bt_proto[proto])
74da626a
MH
90 err = -EEXIST;
91 else
92 bt_proto[proto] = ops;
93
94 write_unlock(&bt_proto_lock);
1da177e4 95
74da626a 96 return err;
1da177e4
LT
97}
98EXPORT_SYMBOL(bt_sock_register);
99
be9f97f0 100void bt_sock_unregister(int proto)
1da177e4
LT
101{
102 if (proto < 0 || proto >= BT_MAX_PROTO)
be9f97f0 103 return;
1da177e4 104
74da626a 105 write_lock(&bt_proto_lock);
be9f97f0 106 bt_proto[proto] = NULL;
74da626a 107 write_unlock(&bt_proto_lock);
1da177e4
LT
108}
109EXPORT_SYMBOL(bt_sock_unregister);
110
3f378b68
EP
111static int bt_sock_create(struct net *net, struct socket *sock, int proto,
112 int kern)
1da177e4 113{
74da626a 114 int err;
1da177e4 115
1b8d7ae4
EB
116 if (net != &init_net)
117 return -EAFNOSUPPORT;
118
1da177e4
LT
119 if (proto < 0 || proto >= BT_MAX_PROTO)
120 return -EINVAL;
121
95a5afca 122 if (!bt_proto[proto])
1da177e4 123 request_module("bt-proto-%d", proto);
74da626a 124
1da177e4 125 err = -EPROTONOSUPPORT;
74da626a
MH
126
127 read_lock(&bt_proto_lock);
128
1da177e4 129 if (bt_proto[proto] && try_module_get(bt_proto[proto]->owner)) {
3f378b68 130 err = bt_proto[proto]->create(net, sock, proto, kern);
b5a30dda
OP
131 if (!err)
132 bt_sock_reclassify_lock(sock->sk, proto);
1da177e4
LT
133 module_put(bt_proto[proto]->owner);
134 }
74da626a
MH
135
136 read_unlock(&bt_proto_lock);
137
8e87d142 138 return err;
1da177e4
LT
139}
140
141void bt_sock_link(struct bt_sock_list *l, struct sock *sk)
142{
94f5bfb8 143 write_lock(&l->lock);
1da177e4 144 sk_add_node(sk, &l->head);
94f5bfb8 145 write_unlock(&l->lock);
1da177e4
LT
146}
147EXPORT_SYMBOL(bt_sock_link);
148
149void bt_sock_unlink(struct bt_sock_list *l, struct sock *sk)
150{
94f5bfb8 151 write_lock(&l->lock);
1da177e4 152 sk_del_node_init(sk);
94f5bfb8 153 write_unlock(&l->lock);
1da177e4
LT
154}
155EXPORT_SYMBOL(bt_sock_unlink);
156
a60ccf97 157void bt_accept_enqueue(struct sock *parent, struct sock *sk, bool bh)
1da177e4
LT
158{
159 BT_DBG("parent %p, sk %p", parent, sk);
160
161 sock_hold(sk);
a60ccf97
MK
162
163 if (bh)
164 bh_lock_sock_nested(sk);
165 else
166 lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
167
1da177e4
LT
168 list_add_tail(&bt_sk(sk)->accept_q, &bt_sk(parent)->accept_q);
169 bt_sk(sk)->parent = parent;
a60ccf97
MK
170
171 if (bh)
172 bh_unlock_sock(sk);
173 else
174 release_sock(sk);
175
1da177e4
LT
176 parent->sk_ack_backlog++;
177}
178EXPORT_SYMBOL(bt_accept_enqueue);
179
27bfbc21
DJ
180/* Calling function must hold the sk lock.
181 * bt_sk(sk)->parent must be non-NULL meaning sk is in the parent list.
182 */
1da177e4
LT
183void bt_accept_unlink(struct sock *sk)
184{
185 BT_DBG("sk %p state %d", sk, sk->sk_state);
186
187 list_del_init(&bt_sk(sk)->accept_q);
188 bt_sk(sk)->parent->sk_ack_backlog--;
189 bt_sk(sk)->parent = NULL;
190 sock_put(sk);
191}
192EXPORT_SYMBOL(bt_accept_unlink);
193
194struct sock *bt_accept_dequeue(struct sock *parent, struct socket *newsock)
195{
7eb7404f 196 struct bt_sock *s, *n;
1da177e4
LT
197 struct sock *sk;
198
199 BT_DBG("parent %p", parent);
200
27bfbc21 201restart:
7eb7404f
GT
202 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
203 sk = (struct sock *)s;
1da177e4 204
27bfbc21
DJ
205 /* Prevent early freeing of sk due to unlink and sock_kill */
206 sock_hold(sk);
8a154a8f 207 lock_sock(sk);
1da177e4 208
27bfbc21
DJ
209 /* Check sk has not already been unlinked via
210 * bt_accept_unlink() due to serialisation caused by sk locking
211 */
212 if (!bt_sk(sk)->parent) {
213 BT_DBG("sk %p, already unlinked", sk);
214 release_sock(sk);
215 sock_put(sk);
216
217 /* Restart the loop as sk is no longer in the list
218 * and also avoid a potential infinite loop because
219 * list_for_each_entry_safe() is not thread safe.
220 */
221 goto restart;
222 }
223
224 /* sk is safely in the parent list so reduce reference count */
225 sock_put(sk);
226
1da177e4
LT
227 /* FIXME: Is this check still needed */
228 if (sk->sk_state == BT_CLOSED) {
1da177e4 229 bt_accept_unlink(sk);
1a11ec89 230 release_sock(sk);
1da177e4
LT
231 continue;
232 }
233
c4f912e1 234 if (sk->sk_state == BT_CONNECTED || !newsock ||
d060991f 235 test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) {
1da177e4
LT
236 bt_accept_unlink(sk);
237 if (newsock)
238 sock_graft(sk, newsock);
d37f50e1 239
8a154a8f 240 release_sock(sk);
1da177e4
LT
241 return sk;
242 }
243
8a154a8f 244 release_sock(sk);
1da177e4 245 }
d37f50e1 246
1da177e4
LT
247 return NULL;
248}
249EXPORT_SYMBOL(bt_accept_dequeue);
250
1b784140
YX
251int bt_sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
252 int flags)
1da177e4
LT
253{
254 int noblock = flags & MSG_DONTWAIT;
255 struct sock *sk = sock->sk;
256 struct sk_buff *skb;
257 size_t copied;
b5f34f94 258 size_t skblen;
1da177e4
LT
259 int err;
260
a418b893 261 BT_DBG("sock %p sk %p len %zu", sock, sk, len);
1da177e4 262
d94a6104 263 if (flags & MSG_OOB)
1da177e4
LT
264 return -EOPNOTSUPP;
265
5a08ecce
AE
266 skb = skb_recv_datagram(sk, flags, noblock, &err);
267 if (!skb) {
f3d33426 268 if (sk->sk_shutdown & RCV_SHUTDOWN)
1da177e4 269 return 0;
f3d33426 270
1da177e4
LT
271 return err;
272 }
273
b5f34f94 274 skblen = skb->len;
1da177e4
LT
275 copied = skb->len;
276 if (len < copied) {
277 msg->msg_flags |= MSG_TRUNC;
278 copied = len;
279 }
280
badff6d0 281 skb_reset_transport_header(skb);
51f3d02b 282 err = skb_copy_datagram_msg(skb, 0, msg, copied);
d9763698 283 if (err == 0) {
3b885787 284 sock_recv_ts_and_drops(msg, sk, skb);
1da177e4 285
9dcbc313 286 if (msg->msg_name && bt_sk(sk)->skb_msg_name)
d9763698
MH
287 bt_sk(sk)->skb_msg_name(skb, msg->msg_name,
288 &msg->msg_namelen);
d9763698
MH
289 }
290
1da177e4
LT
291 skb_free_datagram(sk, skb);
292
90a56f72 293 if (flags & MSG_TRUNC)
b5f34f94
DK
294 copied = skblen;
295
1da177e4
LT
296 return err ? : copied;
297}
298EXPORT_SYMBOL(bt_sock_recvmsg);
299
796c86ee
MM
300static long bt_sock_data_wait(struct sock *sk, long timeo)
301{
302 DECLARE_WAITQUEUE(wait, current);
303
304 add_wait_queue(sk_sleep(sk), &wait);
305 for (;;) {
306 set_current_state(TASK_INTERRUPTIBLE);
307
308 if (!skb_queue_empty(&sk->sk_receive_queue))
309 break;
310
311 if (sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN))
312 break;
313
314 if (signal_pending(current) || !timeo)
315 break;
316
9cd3e072 317 sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
796c86ee
MM
318 release_sock(sk);
319 timeo = schedule_timeout(timeo);
320 lock_sock(sk);
9cd3e072 321 sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
796c86ee
MM
322 }
323
324 __set_current_state(TASK_RUNNING);
325 remove_wait_queue(sk_sleep(sk), &wait);
326 return timeo;
327}
328
1b784140
YX
329int bt_sock_stream_recvmsg(struct socket *sock, struct msghdr *msg,
330 size_t size, int flags)
796c86ee
MM
331{
332 struct sock *sk = sock->sk;
333 int err = 0;
334 size_t target, copied = 0;
335 long timeo;
336
337 if (flags & MSG_OOB)
338 return -EOPNOTSUPP;
339
796c86ee
MM
340 BT_DBG("sk %p size %zu", sk, size);
341
342 lock_sock(sk);
343
344 target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
345 timeo = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
346
347 do {
348 struct sk_buff *skb;
349 int chunk;
350
351 skb = skb_dequeue(&sk->sk_receive_queue);
352 if (!skb) {
353 if (copied >= target)
354 break;
355
5a08ecce
AE
356 err = sock_error(sk);
357 if (err)
796c86ee
MM
358 break;
359 if (sk->sk_shutdown & RCV_SHUTDOWN)
360 break;
361
362 err = -EAGAIN;
363 if (!timeo)
364 break;
365
366 timeo = bt_sock_data_wait(sk, timeo);
367
368 if (signal_pending(current)) {
369 err = sock_intr_errno(timeo);
370 goto out;
371 }
372 continue;
373 }
374
375 chunk = min_t(unsigned int, skb->len, size);
51f3d02b 376 if (skb_copy_datagram_msg(skb, 0, msg, chunk)) {
796c86ee
MM
377 skb_queue_head(&sk->sk_receive_queue, skb);
378 if (!copied)
379 copied = -EFAULT;
380 break;
381 }
382 copied += chunk;
383 size -= chunk;
384
385 sock_recv_ts_and_drops(msg, sk, skb);
386
387 if (!(flags & MSG_PEEK)) {
5b668eb3
MM
388 int skb_len = skb_headlen(skb);
389
390 if (chunk <= skb_len) {
391 __skb_pull(skb, chunk);
392 } else {
393 struct sk_buff *frag;
394
395 __skb_pull(skb, skb_len);
396 chunk -= skb_len;
397
398 skb_walk_frags(skb, frag) {
399 if (chunk <= frag->len) {
400 /* Pulling partial data */
401 skb->len -= chunk;
402 skb->data_len -= chunk;
403 __skb_pull(frag, chunk);
404 break;
405 } else if (frag->len) {
406 /* Pulling all frag data */
407 chunk -= frag->len;
408 skb->len -= frag->len;
409 skb->data_len -= frag->len;
410 __skb_pull(frag, frag->len);
411 }
412 }
413 }
414
796c86ee
MM
415 if (skb->len) {
416 skb_queue_head(&sk->sk_receive_queue, skb);
417 break;
418 }
419 kfree_skb(skb);
420
421 } else {
422 /* put message back and return */
423 skb_queue_head(&sk->sk_receive_queue, skb);
424 break;
425 }
426 } while (size);
427
428out:
429 release_sock(sk);
430 return copied ? : err;
431}
432EXPORT_SYMBOL(bt_sock_stream_recvmsg);
433
1da177e4
LT
434static inline unsigned int bt_accept_poll(struct sock *parent)
435{
7eb7404f 436 struct bt_sock *s, *n;
1da177e4
LT
437 struct sock *sk;
438
7eb7404f
GT
439 list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
440 sk = (struct sock *)s;
d5f2d2be 441 if (sk->sk_state == BT_CONNECTED ||
c5daa683
GP
442 (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags) &&
443 sk->sk_state == BT_CONNECT2))
1da177e4
LT
444 return POLLIN | POLLRDNORM;
445 }
446
447 return 0;
448}
449
8fc9ced3
GP
450unsigned int bt_sock_poll(struct file *file, struct socket *sock,
451 poll_table *wait)
1da177e4
LT
452{
453 struct sock *sk = sock->sk;
454 unsigned int mask = 0;
455
456 BT_DBG("sock %p, sk %p", sock, sk);
457
aa395145 458 poll_wait(file, sk_sleep(sk), wait);
1da177e4
LT
459
460 if (sk->sk_state == BT_LISTEN)
461 return bt_accept_poll(sk);
462
09f6676b 463 if (sk->sk_err || !skb_queue_empty_lockless(&sk->sk_error_queue))
7d4c04fc 464 mask |= POLLERR |
8facd5fb 465 (sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? POLLPRI : 0);
1da177e4 466
f348d70a 467 if (sk->sk_shutdown & RCV_SHUTDOWN)
db40980f 468 mask |= POLLRDHUP | POLLIN | POLLRDNORM;
f348d70a 469
1da177e4
LT
470 if (sk->sk_shutdown == SHUTDOWN_MASK)
471 mask |= POLLHUP;
472
09f6676b 473 if (!skb_queue_empty_lockless(&sk->sk_receive_queue))
1da177e4
LT
474 mask |= POLLIN | POLLRDNORM;
475
476 if (sk->sk_state == BT_CLOSED)
477 mask |= POLLHUP;
478
479 if (sk->sk_state == BT_CONNECT ||
480 sk->sk_state == BT_CONNECT2 ||
481 sk->sk_state == BT_CONFIG)
482 return mask;
483
c5daa683 484 if (!test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags) && sock_writeable(sk))
1da177e4
LT
485 mask |= POLLOUT | POLLWRNORM | POLLWRBAND;
486 else
9cd3e072 487 sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
1da177e4
LT
488
489 return mask;
490}
491EXPORT_SYMBOL(bt_sock_poll);
492
3241ad82
MH
493int bt_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
494{
495 struct sock *sk = sock->sk;
43cbeee9
MH
496 struct sk_buff *skb;
497 long amount;
3241ad82
MH
498 int err;
499
500 BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
501
502 switch (cmd) {
43cbeee9
MH
503 case TIOCOUTQ:
504 if (sk->sk_state == BT_LISTEN)
505 return -EINVAL;
506
31e6d363 507 amount = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
43cbeee9
MH
508 if (amount < 0)
509 amount = 0;
510 err = put_user(amount, (int __user *) arg);
511 break;
512
513 case TIOCINQ:
514 if (sk->sk_state == BT_LISTEN)
515 return -EINVAL;
516
517 lock_sock(sk);
518 skb = skb_peek(&sk->sk_receive_queue);
519 amount = skb ? skb->len : 0;
520 release_sock(sk);
521 err = put_user(amount, (int __user *) arg);
522 break;
523
3241ad82
MH
524 case SIOCGSTAMP:
525 err = sock_get_timestamp(sk, (struct timeval __user *) arg);
526 break;
527
528 case SIOCGSTAMPNS:
529 err = sock_get_timestampns(sk, (struct timespec __user *) arg);
530 break;
531
532 default:
533 err = -ENOIOCTLCMD;
534 break;
535 }
536
537 return err;
538}
539EXPORT_SYMBOL(bt_sock_ioctl);
540
0fba96f9 541/* This function expects the sk lock to be held when called */
1da177e4
LT
542int bt_sock_wait_state(struct sock *sk, int state, unsigned long timeo)
543{
544 DECLARE_WAITQUEUE(wait, current);
545 int err = 0;
546
547 BT_DBG("sk %p", sk);
548
aa395145 549 add_wait_queue(sk_sleep(sk), &wait);
9be4e3fb 550 set_current_state(TASK_INTERRUPTIBLE);
1da177e4 551 while (sk->sk_state != state) {
1da177e4 552 if (!timeo) {
b4c612a4 553 err = -EINPROGRESS;
1da177e4
LT
554 break;
555 }
556
557 if (signal_pending(current)) {
558 err = sock_intr_errno(timeo);
559 break;
560 }
561
562 release_sock(sk);
563 timeo = schedule_timeout(timeo);
564 lock_sock(sk);
9be4e3fb 565 set_current_state(TASK_INTERRUPTIBLE);
1da177e4 566
c1cbe4b7
BL
567 err = sock_error(sk);
568 if (err)
1da177e4 569 break;
1da177e4 570 }
9be4e3fb 571 __set_current_state(TASK_RUNNING);
aa395145 572 remove_wait_queue(sk_sleep(sk), &wait);
1da177e4
LT
573 return err;
574}
575EXPORT_SYMBOL(bt_sock_wait_state);
576
e793dcf0
JH
577/* This function expects the sk lock to be held when called */
578int bt_sock_wait_ready(struct sock *sk, unsigned long flags)
579{
580 DECLARE_WAITQUEUE(wait, current);
581 unsigned long timeo;
582 int err = 0;
583
584 BT_DBG("sk %p", sk);
585
586 timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
587
588 add_wait_queue(sk_sleep(sk), &wait);
589 set_current_state(TASK_INTERRUPTIBLE);
590 while (test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags)) {
591 if (!timeo) {
592 err = -EAGAIN;
593 break;
594 }
595
596 if (signal_pending(current)) {
597 err = sock_intr_errno(timeo);
598 break;
599 }
600
601 release_sock(sk);
602 timeo = schedule_timeout(timeo);
603 lock_sock(sk);
604 set_current_state(TASK_INTERRUPTIBLE);
605
606 err = sock_error(sk);
607 if (err)
608 break;
609 }
610 __set_current_state(TASK_RUNNING);
611 remove_wait_queue(sk_sleep(sk), &wait);
612
613 return err;
614}
615EXPORT_SYMBOL(bt_sock_wait_ready);
616
256a06c8
MY
617#ifdef CONFIG_PROC_FS
618struct bt_seq_state {
619 struct bt_sock_list *l;
620};
621
622static void *bt_seq_start(struct seq_file *seq, loff_t *pos)
623 __acquires(seq->private->l->lock)
624{
625 struct bt_seq_state *s = seq->private;
626 struct bt_sock_list *l = s->l;
627
628 read_lock(&l->lock);
629 return seq_hlist_start_head(&l->head, *pos);
630}
631
632static void *bt_seq_next(struct seq_file *seq, void *v, loff_t *pos)
633{
634 struct bt_seq_state *s = seq->private;
635 struct bt_sock_list *l = s->l;
636
637 return seq_hlist_next(v, &l->head, pos);
638}
639
640static void bt_seq_stop(struct seq_file *seq, void *v)
641 __releases(seq->private->l->lock)
642{
643 struct bt_seq_state *s = seq->private;
644 struct bt_sock_list *l = s->l;
645
646 read_unlock(&l->lock);
647}
648
649static int bt_seq_show(struct seq_file *seq, void *v)
650{
256a06c8
MY
651 struct bt_seq_state *s = seq->private;
652 struct bt_sock_list *l = s->l;
256a06c8
MY
653
654 if (v == SEQ_START_TOKEN) {
c5605755 655 seq_puts(seq ,"sk RefCnt Rmem Wmem User Inode Parent");
256a06c8
MY
656
657 if (l->custom_seq_show) {
658 seq_putc(seq, ' ');
659 l->custom_seq_show(seq, v);
660 }
661
662 seq_putc(seq, '\n');
663 } else {
09d5d4aa
AE
664 struct sock *sk = sk_entry(v);
665 struct bt_sock *bt = bt_sk(sk);
256a06c8 666
7028a886 667 seq_printf(seq,
5f6cd79f 668 "%pK %-6d %-6u %-6u %-6u %-6lu %-6lu",
256a06c8 669 sk,
41c6d650 670 refcount_read(&sk->sk_refcnt),
256a06c8
MY
671 sk_rmem_alloc_get(sk),
672 sk_wmem_alloc_get(sk),
1bbb3095 673 from_kuid(seq_user_ns(seq), sock_i_uid(sk)),
256a06c8 674 sock_i_ino(sk),
256a06c8
MY
675 bt->parent? sock_i_ino(bt->parent): 0LU);
676
677 if (l->custom_seq_show) {
678 seq_putc(seq, ' ');
679 l->custom_seq_show(seq, v);
680 }
681
682 seq_putc(seq, '\n');
683 }
684 return 0;
685}
686
26b0f4e2 687static const struct seq_operations bt_seq_ops = {
256a06c8
MY
688 .start = bt_seq_start,
689 .next = bt_seq_next,
690 .stop = bt_seq_stop,
691 .show = bt_seq_show,
692};
693
694static int bt_seq_open(struct inode *inode, struct file *file)
695{
696 struct bt_sock_list *sk_list;
697 struct bt_seq_state *s;
698
d9dda78b 699 sk_list = PDE_DATA(inode);
256a06c8
MY
700 s = __seq_open_private(file, &bt_seq_ops,
701 sizeof(struct bt_seq_state));
31f47073 702 if (!s)
256a06c8
MY
703 return -ENOMEM;
704
705 s->l = sk_list;
706 return 0;
707}
708
14805359
AV
709static const struct file_operations bt_fops = {
710 .open = bt_seq_open,
711 .read = seq_read,
712 .llseek = seq_lseek,
713 .release = seq_release_private
714};
715
b0316615 716int bt_procfs_init(struct net *net, const char *name,
f37590bd 717 struct bt_sock_list *sk_list,
256a06c8
MY
718 int (* seq_show)(struct seq_file *, void *))
719{
256a06c8
MY
720 sk_list->custom_seq_show = seq_show;
721
4d006263 722 if (!proc_create_data(name, 0, net->proc_net, &bt_fops, sk_list))
256a06c8 723 return -ENOMEM;
256a06c8
MY
724 return 0;
725}
726
727void bt_procfs_cleanup(struct net *net, const char *name)
728{
ece31ffd 729 remove_proc_entry(name, net->proc_net);
256a06c8
MY
730}
731#else
b0316615 732int bt_procfs_init(struct net *net, const char *name,
f37590bd 733 struct bt_sock_list *sk_list,
256a06c8
MY
734 int (* seq_show)(struct seq_file *, void *))
735{
736 return 0;
737}
738
739void bt_procfs_cleanup(struct net *net, const char *name)
740{
741}
742#endif
743EXPORT_SYMBOL(bt_procfs_init);
744EXPORT_SYMBOL(bt_procfs_cleanup);
745
173e7837 746static const struct net_proto_family bt_sock_family_ops = {
1da177e4
LT
747 .owner = THIS_MODULE,
748 .family = PF_BLUETOOTH,
749 .create = bt_sock_create,
750};
751
ffcecac6
MH
752struct dentry *bt_debugfs;
753EXPORT_SYMBOL_GPL(bt_debugfs);
754
9e8305b3
MH
755#define VERSION __stringify(BT_SUBSYS_VERSION) "." \
756 __stringify(BT_SUBSYS_REVISION)
757
1da177e4
LT
758static int __init bt_init(void)
759{
27d35284
MH
760 int err;
761
b4772ef8 762 sock_skb_cb_check_size(sizeof(struct bt_skb_cb));
7cb9d20f 763
9e8305b3 764 BT_INFO("Core ver %s", VERSION);
1da177e4 765
ee485290
MH
766 err = bt_selftest();
767 if (err < 0)
768 return err;
769
ffcecac6
MH
770 bt_debugfs = debugfs_create_dir("bluetooth", NULL);
771
e64c97b5
MH
772 bt_leds_init();
773
27d35284
MH
774 err = bt_sysfs_init();
775 if (err < 0)
776 return err;
1da177e4 777
27d35284
MH
778 err = sock_register(&bt_sock_family_ops);
779 if (err < 0) {
780 bt_sysfs_cleanup();
781 return err;
782 }
1da177e4 783
27d35284 784 BT_INFO("HCI device and connection manager initialized");
1da177e4 785
64274518
GP
786 err = hci_sock_init();
787 if (err < 0)
788 goto error;
789
790 err = l2cap_init();
0ed54dad 791 if (err < 0)
64274518 792 goto sock_err;
64274518
GP
793
794 err = sco_init();
795 if (err < 0) {
796 l2cap_exit();
797 goto sock_err;
798 }
1da177e4 799
6d785aa3
JH
800 err = mgmt_init();
801 if (err < 0) {
802 sco_exit();
803 l2cap_exit();
804 goto sock_err;
805 }
806
1da177e4 807 return 0;
64274518
GP
808
809sock_err:
810 hci_sock_cleanup();
811
812error:
813 sock_unregister(PF_BLUETOOTH);
814 bt_sysfs_cleanup();
815
816 return err;
1da177e4
LT
817}
818
819static void __exit bt_exit(void)
820{
6d785aa3
JH
821 mgmt_exit();
822
64274518
GP
823 sco_exit();
824
825 l2cap_exit();
826
1da177e4
LT
827 hci_sock_cleanup();
828
1da177e4 829 sock_unregister(PF_BLUETOOTH);
27d35284
MH
830
831 bt_sysfs_cleanup();
ffcecac6 832
e64c97b5
MH
833 bt_leds_cleanup();
834
ffcecac6 835 debugfs_remove_recursive(bt_debugfs);
1da177e4
LT
836}
837
838subsys_initcall(bt_init);
839module_exit(bt_exit);
840
63fbd24e 841MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
9e8305b3
MH
842MODULE_DESCRIPTION("Bluetooth Core ver " VERSION);
843MODULE_VERSION(VERSION);
1da177e4
LT
844MODULE_LICENSE("GPL");
845MODULE_ALIAS_NETPROTO(PF_BLUETOOTH);