mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
4ada1282d8
A Linux PC is connected with another device over Bluetooth PAN using a BNEP interface. Whenever a packet is tried to be sent over the BNEP interface, the function "bnep_net_xmit()" in "net/bluetooth/bnep/netdev.c" is called. This function calls "bnep_net_mc_filter()", which checks (if the destination address is multicast) if the address is set in a certain multicast filter (&s->mc_filter). If it is not, then it is not sent out. This filter is only changed in two other functions, found in net/bluetooth/bnep/core.c": in "bnep_ctrl_set_mc_filter()", which is only called if a message of type "BNEP_FILTER_MULTI_ADDR_SET" is received. Otherwise, it is set in "bnep_add_connection()", where it is set to a default value which only adds the broadcast address to the filter: set_bit(bnep_mc_hash(dev->broadcast), (ulong *) &s->mc_filter); To sum up, if the BNEP interface does not receive any message of type "BNEP_FILTER_MULTI_ADDR_SET", it will not send out any messages with multicast destination addresses except for broadcast. However, in the BNEP specification (page 27 in http://grouper.ieee.org/groups/802/15/Bluetooth/BNEP.pdf), it is said that per default, all multicast addresses should not be filtered, i.e. the BNEP interface should be able to send packets with any multicast destination address. It seems that the default case is wrong: the multicast filter should not block almost all multicast addresses, but should not filter out any. This leads to the problem that e.g. Neighbor Solicitation messages sent with Bluetooth PAN over the BNEP interface to a multicast destination address other than broadcast are blocked and not sent out. Therefore, in the default case, we set the mc_filter to ~0LL to not filter out any multicast addresses. Signed-off-by: Danny Schweizer <danny.schweizer@proofnet.de> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
773 lines
17 KiB
C
773 lines
17 KiB
C
/*
|
|
BNEP implementation for Linux Bluetooth stack (BlueZ).
|
|
Copyright (C) 2001-2002 Inventel Systemes
|
|
Written 2001-2002 by
|
|
Clément Moreau <clement.moreau@inventel.fr>
|
|
David Libault <david.libault@inventel.fr>
|
|
|
|
Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License version 2 as
|
|
published by the Free Software Foundation;
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
|
|
IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
|
|
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
|
|
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
|
|
SOFTWARE IS DISCLAIMED.
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/file.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <asm/unaligned.h>
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
#include <net/bluetooth/l2cap.h>
|
|
#include <net/bluetooth/hci_core.h>
|
|
|
|
#include "bnep.h"
|
|
|
|
#define VERSION "1.3"
|
|
|
|
static bool compress_src = true;
|
|
static bool compress_dst = true;
|
|
|
|
static LIST_HEAD(bnep_session_list);
|
|
static DECLARE_RWSEM(bnep_session_sem);
|
|
|
|
static struct bnep_session *__bnep_get_session(u8 *dst)
|
|
{
|
|
struct bnep_session *s;
|
|
|
|
BT_DBG("");
|
|
|
|
list_for_each_entry(s, &bnep_session_list, list)
|
|
if (ether_addr_equal(dst, s->eh.h_source))
|
|
return s;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static void __bnep_link_session(struct bnep_session *s)
|
|
{
|
|
list_add(&s->list, &bnep_session_list);
|
|
}
|
|
|
|
static void __bnep_unlink_session(struct bnep_session *s)
|
|
{
|
|
list_del(&s->list);
|
|
}
|
|
|
|
static int bnep_send(struct bnep_session *s, void *data, size_t len)
|
|
{
|
|
struct socket *sock = s->sock;
|
|
struct kvec iv = { data, len };
|
|
|
|
return kernel_sendmsg(sock, &s->msg, &iv, 1, len);
|
|
}
|
|
|
|
static int bnep_send_rsp(struct bnep_session *s, u8 ctrl, u16 resp)
|
|
{
|
|
struct bnep_control_rsp rsp;
|
|
rsp.type = BNEP_CONTROL;
|
|
rsp.ctrl = ctrl;
|
|
rsp.resp = htons(resp);
|
|
return bnep_send(s, &rsp, sizeof(rsp));
|
|
}
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
static inline void bnep_set_default_proto_filter(struct bnep_session *s)
|
|
{
|
|
/* (IPv4, ARP) */
|
|
s->proto_filter[0].start = ETH_P_IP;
|
|
s->proto_filter[0].end = ETH_P_ARP;
|
|
/* (RARP, AppleTalk) */
|
|
s->proto_filter[1].start = ETH_P_RARP;
|
|
s->proto_filter[1].end = ETH_P_AARP;
|
|
/* (IPX, IPv6) */
|
|
s->proto_filter[2].start = ETH_P_IPX;
|
|
s->proto_filter[2].end = ETH_P_IPV6;
|
|
}
|
|
#endif
|
|
|
|
static int bnep_ctrl_set_netfilter(struct bnep_session *s, __be16 *data, int len)
|
|
{
|
|
int n;
|
|
|
|
if (len < 2)
|
|
return -EILSEQ;
|
|
|
|
n = get_unaligned_be16(data);
|
|
data++;
|
|
len -= 2;
|
|
|
|
if (len < n)
|
|
return -EILSEQ;
|
|
|
|
BT_DBG("filter len %d", n);
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
n /= 4;
|
|
if (n <= BNEP_MAX_PROTO_FILTERS) {
|
|
struct bnep_proto_filter *f = s->proto_filter;
|
|
int i;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
f[i].start = get_unaligned_be16(data++);
|
|
f[i].end = get_unaligned_be16(data++);
|
|
|
|
BT_DBG("proto filter start %d end %d",
|
|
f[i].start, f[i].end);
|
|
}
|
|
|
|
if (i < BNEP_MAX_PROTO_FILTERS)
|
|
memset(f + i, 0, sizeof(*f));
|
|
|
|
if (n == 0)
|
|
bnep_set_default_proto_filter(s);
|
|
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_SUCCESS);
|
|
} else {
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_LIMIT_REACHED);
|
|
}
|
|
#else
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_UNSUPPORTED_REQ);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static int bnep_ctrl_set_mcfilter(struct bnep_session *s, u8 *data, int len)
|
|
{
|
|
int n;
|
|
|
|
if (len < 2)
|
|
return -EILSEQ;
|
|
|
|
n = get_unaligned_be16(data);
|
|
data += 2;
|
|
len -= 2;
|
|
|
|
if (len < n)
|
|
return -EILSEQ;
|
|
|
|
BT_DBG("filter len %d", n);
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
n /= (ETH_ALEN * 2);
|
|
|
|
if (n > 0) {
|
|
int i;
|
|
|
|
s->mc_filter = 0;
|
|
|
|
/* Always send broadcast */
|
|
set_bit(bnep_mc_hash(s->dev->broadcast), (ulong *) &s->mc_filter);
|
|
|
|
/* Add address ranges to the multicast hash */
|
|
for (; n > 0; n--) {
|
|
u8 a1[6], *a2;
|
|
|
|
memcpy(a1, data, ETH_ALEN);
|
|
data += ETH_ALEN;
|
|
a2 = data;
|
|
data += ETH_ALEN;
|
|
|
|
BT_DBG("mc filter %pMR -> %pMR", a1, a2);
|
|
|
|
/* Iterate from a1 to a2 */
|
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter);
|
|
while (memcmp(a1, a2, 6) < 0 && s->mc_filter != ~0LL) {
|
|
/* Increment a1 */
|
|
i = 5;
|
|
while (i >= 0 && ++a1[i--] == 0)
|
|
;
|
|
|
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter);
|
|
}
|
|
}
|
|
}
|
|
|
|
BT_DBG("mc filter hash 0x%llx", s->mc_filter);
|
|
|
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_SUCCESS);
|
|
#else
|
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_FILTER_UNSUPPORTED_REQ);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static int bnep_rx_control(struct bnep_session *s, void *data, int len)
|
|
{
|
|
u8 cmd = *(u8 *)data;
|
|
int err = 0;
|
|
|
|
data++;
|
|
len--;
|
|
|
|
switch (cmd) {
|
|
case BNEP_CMD_NOT_UNDERSTOOD:
|
|
case BNEP_SETUP_CONN_RSP:
|
|
case BNEP_FILTER_NET_TYPE_RSP:
|
|
case BNEP_FILTER_MULTI_ADDR_RSP:
|
|
/* Ignore these for now */
|
|
break;
|
|
|
|
case BNEP_FILTER_NET_TYPE_SET:
|
|
err = bnep_ctrl_set_netfilter(s, data, len);
|
|
break;
|
|
|
|
case BNEP_FILTER_MULTI_ADDR_SET:
|
|
err = bnep_ctrl_set_mcfilter(s, data, len);
|
|
break;
|
|
|
|
case BNEP_SETUP_CONN_REQ:
|
|
/* Successful response should be sent only once */
|
|
if (test_bit(BNEP_SETUP_RESPONSE, &s->flags) &&
|
|
!test_and_set_bit(BNEP_SETUP_RSP_SENT, &s->flags))
|
|
err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP,
|
|
BNEP_SUCCESS);
|
|
else
|
|
err = bnep_send_rsp(s, BNEP_SETUP_CONN_RSP,
|
|
BNEP_CONN_NOT_ALLOWED);
|
|
break;
|
|
|
|
default: {
|
|
u8 pkt[3];
|
|
pkt[0] = BNEP_CONTROL;
|
|
pkt[1] = BNEP_CMD_NOT_UNDERSTOOD;
|
|
pkt[2] = cmd;
|
|
err = bnep_send(s, pkt, sizeof(pkt));
|
|
}
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int bnep_rx_extension(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct bnep_ext_hdr *h;
|
|
int err = 0;
|
|
|
|
do {
|
|
h = (void *) skb->data;
|
|
if (!skb_pull(skb, sizeof(*h))) {
|
|
err = -EILSEQ;
|
|
break;
|
|
}
|
|
|
|
BT_DBG("type 0x%x len %d", h->type, h->len);
|
|
|
|
switch (h->type & BNEP_TYPE_MASK) {
|
|
case BNEP_EXT_CONTROL:
|
|
bnep_rx_control(s, skb->data, skb->len);
|
|
break;
|
|
|
|
default:
|
|
/* Unknown extension, skip it. */
|
|
break;
|
|
}
|
|
|
|
if (!skb_pull(skb, h->len)) {
|
|
err = -EILSEQ;
|
|
break;
|
|
}
|
|
} while (!err && (h->type & BNEP_EXT_HEADER));
|
|
|
|
return err;
|
|
}
|
|
|
|
static u8 __bnep_rx_hlen[] = {
|
|
ETH_HLEN, /* BNEP_GENERAL */
|
|
0, /* BNEP_CONTROL */
|
|
2, /* BNEP_COMPRESSED */
|
|
ETH_ALEN + 2, /* BNEP_COMPRESSED_SRC_ONLY */
|
|
ETH_ALEN + 2 /* BNEP_COMPRESSED_DST_ONLY */
|
|
};
|
|
|
|
static int bnep_rx_frame(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct net_device *dev = s->dev;
|
|
struct sk_buff *nskb;
|
|
u8 type, ctrl_type;
|
|
|
|
dev->stats.rx_bytes += skb->len;
|
|
|
|
type = *(u8 *) skb->data;
|
|
skb_pull(skb, 1);
|
|
ctrl_type = *(u8 *)skb->data;
|
|
|
|
if ((type & BNEP_TYPE_MASK) >= sizeof(__bnep_rx_hlen))
|
|
goto badframe;
|
|
|
|
if ((type & BNEP_TYPE_MASK) == BNEP_CONTROL) {
|
|
if (bnep_rx_control(s, skb->data, skb->len) < 0) {
|
|
dev->stats.tx_errors++;
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
|
|
if (!(type & BNEP_EXT_HEADER)) {
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
|
|
/* Verify and pull ctrl message since it's already processed */
|
|
switch (ctrl_type) {
|
|
case BNEP_SETUP_CONN_REQ:
|
|
/* Pull: ctrl type (1 b), len (1 b), data (len bytes) */
|
|
if (!skb_pull(skb, 2 + *(u8 *)(skb->data + 1) * 2))
|
|
goto badframe;
|
|
break;
|
|
case BNEP_FILTER_MULTI_ADDR_SET:
|
|
case BNEP_FILTER_NET_TYPE_SET:
|
|
/* Pull: ctrl type (1 b), len (2 b), data (len bytes) */
|
|
if (!skb_pull(skb, 3 + *(u16 *)(skb->data + 1) * 2))
|
|
goto badframe;
|
|
break;
|
|
default:
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
} else {
|
|
skb_reset_mac_header(skb);
|
|
|
|
/* Verify and pull out header */
|
|
if (!skb_pull(skb, __bnep_rx_hlen[type & BNEP_TYPE_MASK]))
|
|
goto badframe;
|
|
|
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2));
|
|
}
|
|
|
|
if (type & BNEP_EXT_HEADER) {
|
|
if (bnep_rx_extension(s, skb) < 0)
|
|
goto badframe;
|
|
}
|
|
|
|
/* Strip 802.1p header */
|
|
if (ntohs(s->eh.h_proto) == ETH_P_8021Q) {
|
|
if (!skb_pull(skb, 4))
|
|
goto badframe;
|
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2));
|
|
}
|
|
|
|
/* We have to alloc new skb and copy data here :(. Because original skb
|
|
* may not be modified and because of the alignment requirements. */
|
|
nskb = alloc_skb(2 + ETH_HLEN + skb->len, GFP_KERNEL);
|
|
if (!nskb) {
|
|
dev->stats.rx_dropped++;
|
|
kfree_skb(skb);
|
|
return -ENOMEM;
|
|
}
|
|
skb_reserve(nskb, 2);
|
|
|
|
/* Decompress header and construct ether frame */
|
|
switch (type & BNEP_TYPE_MASK) {
|
|
case BNEP_COMPRESSED:
|
|
memcpy(__skb_put(nskb, ETH_HLEN), &s->eh, ETH_HLEN);
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_SRC_ONLY:
|
|
memcpy(__skb_put(nskb, ETH_ALEN), s->eh.h_dest, ETH_ALEN);
|
|
memcpy(__skb_put(nskb, ETH_ALEN), skb_mac_header(skb), ETH_ALEN);
|
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2));
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_DST_ONLY:
|
|
memcpy(__skb_put(nskb, ETH_ALEN), skb_mac_header(skb),
|
|
ETH_ALEN);
|
|
memcpy(__skb_put(nskb, ETH_ALEN + 2), s->eh.h_source,
|
|
ETH_ALEN + 2);
|
|
break;
|
|
|
|
case BNEP_GENERAL:
|
|
memcpy(__skb_put(nskb, ETH_ALEN * 2), skb_mac_header(skb),
|
|
ETH_ALEN * 2);
|
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2));
|
|
break;
|
|
}
|
|
|
|
skb_copy_from_linear_data(skb, __skb_put(nskb, skb->len), skb->len);
|
|
kfree_skb(skb);
|
|
|
|
dev->stats.rx_packets++;
|
|
nskb->ip_summed = CHECKSUM_NONE;
|
|
nskb->protocol = eth_type_trans(nskb, dev);
|
|
netif_rx_ni(nskb);
|
|
return 0;
|
|
|
|
badframe:
|
|
dev->stats.rx_errors++;
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
|
|
static u8 __bnep_tx_types[] = {
|
|
BNEP_GENERAL,
|
|
BNEP_COMPRESSED_SRC_ONLY,
|
|
BNEP_COMPRESSED_DST_ONLY,
|
|
BNEP_COMPRESSED
|
|
};
|
|
|
|
static int bnep_tx_frame(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct ethhdr *eh = (void *) skb->data;
|
|
struct socket *sock = s->sock;
|
|
struct kvec iv[3];
|
|
int len = 0, il = 0;
|
|
u8 type = 0;
|
|
|
|
BT_DBG("skb %p dev %p type %d", skb, skb->dev, skb->pkt_type);
|
|
|
|
if (!skb->dev) {
|
|
/* Control frame sent by us */
|
|
goto send;
|
|
}
|
|
|
|
iv[il++] = (struct kvec) { &type, 1 };
|
|
len++;
|
|
|
|
if (compress_src && ether_addr_equal(eh->h_dest, s->eh.h_source))
|
|
type |= 0x01;
|
|
|
|
if (compress_dst && ether_addr_equal(eh->h_source, s->eh.h_dest))
|
|
type |= 0x02;
|
|
|
|
if (type)
|
|
skb_pull(skb, ETH_ALEN * 2);
|
|
|
|
type = __bnep_tx_types[type];
|
|
switch (type) {
|
|
case BNEP_COMPRESSED_SRC_ONLY:
|
|
iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN };
|
|
len += ETH_ALEN;
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_DST_ONLY:
|
|
iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN };
|
|
len += ETH_ALEN;
|
|
break;
|
|
}
|
|
|
|
send:
|
|
iv[il++] = (struct kvec) { skb->data, skb->len };
|
|
len += skb->len;
|
|
|
|
/* FIXME: linearize skb */
|
|
{
|
|
len = kernel_sendmsg(sock, &s->msg, iv, il, len);
|
|
}
|
|
kfree_skb(skb);
|
|
|
|
if (len > 0) {
|
|
s->dev->stats.tx_bytes += len;
|
|
s->dev->stats.tx_packets++;
|
|
return 0;
|
|
}
|
|
|
|
return len;
|
|
}
|
|
|
|
static int bnep_session(void *arg)
|
|
{
|
|
struct bnep_session *s = arg;
|
|
struct net_device *dev = s->dev;
|
|
struct sock *sk = s->sock->sk;
|
|
struct sk_buff *skb;
|
|
wait_queue_t wait;
|
|
|
|
BT_DBG("");
|
|
|
|
set_user_nice(current, -15);
|
|
|
|
init_waitqueue_entry(&wait, current);
|
|
add_wait_queue(sk_sleep(sk), &wait);
|
|
while (1) {
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
|
|
if (atomic_read(&s->terminate))
|
|
break;
|
|
/* RX */
|
|
while ((skb = skb_dequeue(&sk->sk_receive_queue))) {
|
|
skb_orphan(skb);
|
|
if (!skb_linearize(skb))
|
|
bnep_rx_frame(s, skb);
|
|
else
|
|
kfree_skb(skb);
|
|
}
|
|
|
|
if (sk->sk_state != BT_CONNECTED)
|
|
break;
|
|
|
|
/* TX */
|
|
while ((skb = skb_dequeue(&sk->sk_write_queue)))
|
|
if (bnep_tx_frame(s, skb))
|
|
break;
|
|
netif_wake_queue(dev);
|
|
|
|
schedule();
|
|
}
|
|
__set_current_state(TASK_RUNNING);
|
|
remove_wait_queue(sk_sleep(sk), &wait);
|
|
|
|
/* Cleanup session */
|
|
down_write(&bnep_session_sem);
|
|
|
|
/* Delete network device */
|
|
unregister_netdev(dev);
|
|
|
|
/* Wakeup user-space polling for socket errors */
|
|
s->sock->sk->sk_err = EUNATCH;
|
|
|
|
wake_up_interruptible(sk_sleep(s->sock->sk));
|
|
|
|
/* Release the socket */
|
|
fput(s->sock->file);
|
|
|
|
__bnep_unlink_session(s);
|
|
|
|
up_write(&bnep_session_sem);
|
|
free_netdev(dev);
|
|
module_put_and_exit(0);
|
|
return 0;
|
|
}
|
|
|
|
static struct device *bnep_get_device(struct bnep_session *session)
|
|
{
|
|
struct l2cap_conn *conn = l2cap_pi(session->sock->sk)->chan->conn;
|
|
|
|
if (!conn || !conn->hcon)
|
|
return NULL;
|
|
|
|
return &conn->hcon->dev;
|
|
}
|
|
|
|
static struct device_type bnep_type = {
|
|
.name = "bluetooth",
|
|
};
|
|
|
|
int bnep_add_connection(struct bnep_connadd_req *req, struct socket *sock)
|
|
{
|
|
u32 valid_flags = BIT(BNEP_SETUP_RESPONSE);
|
|
struct net_device *dev;
|
|
struct bnep_session *s, *ss;
|
|
u8 dst[ETH_ALEN], src[ETH_ALEN];
|
|
int err;
|
|
|
|
BT_DBG("");
|
|
|
|
if (!l2cap_is_socket(sock))
|
|
return -EBADFD;
|
|
|
|
if (req->flags & ~valid_flags)
|
|
return -EINVAL;
|
|
|
|
baswap((void *) dst, &l2cap_pi(sock->sk)->chan->dst);
|
|
baswap((void *) src, &l2cap_pi(sock->sk)->chan->src);
|
|
|
|
/* session struct allocated as private part of net_device */
|
|
dev = alloc_netdev(sizeof(struct bnep_session),
|
|
(*req->device) ? req->device : "bnep%d",
|
|
NET_NAME_UNKNOWN,
|
|
bnep_net_setup);
|
|
if (!dev)
|
|
return -ENOMEM;
|
|
|
|
down_write(&bnep_session_sem);
|
|
|
|
ss = __bnep_get_session(dst);
|
|
if (ss && ss->state == BT_CONNECTED) {
|
|
err = -EEXIST;
|
|
goto failed;
|
|
}
|
|
|
|
s = netdev_priv(dev);
|
|
|
|
/* This is rx header therefore addresses are swapped.
|
|
* ie. eh.h_dest is our local address. */
|
|
memcpy(s->eh.h_dest, &src, ETH_ALEN);
|
|
memcpy(s->eh.h_source, &dst, ETH_ALEN);
|
|
memcpy(dev->dev_addr, s->eh.h_dest, ETH_ALEN);
|
|
|
|
s->dev = dev;
|
|
s->sock = sock;
|
|
s->role = req->role;
|
|
s->state = BT_CONNECTED;
|
|
s->flags = req->flags;
|
|
|
|
s->msg.msg_flags = MSG_NOSIGNAL;
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
/* Set default mc filter to not filter out any mc addresses
|
|
* as defined in the BNEP specification (revision 0.95a)
|
|
* http://grouper.ieee.org/groups/802/15/Bluetooth/BNEP.pdf
|
|
*/
|
|
s->mc_filter = ~0LL;
|
|
#endif
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
/* Set default protocol filter */
|
|
bnep_set_default_proto_filter(s);
|
|
#endif
|
|
|
|
SET_NETDEV_DEV(dev, bnep_get_device(s));
|
|
SET_NETDEV_DEVTYPE(dev, &bnep_type);
|
|
|
|
err = register_netdev(dev);
|
|
if (err)
|
|
goto failed;
|
|
|
|
__bnep_link_session(s);
|
|
|
|
__module_get(THIS_MODULE);
|
|
s->task = kthread_run(bnep_session, s, "kbnepd %s", dev->name);
|
|
if (IS_ERR(s->task)) {
|
|
/* Session thread start failed, gotta cleanup. */
|
|
module_put(THIS_MODULE);
|
|
unregister_netdev(dev);
|
|
__bnep_unlink_session(s);
|
|
err = PTR_ERR(s->task);
|
|
goto failed;
|
|
}
|
|
|
|
up_write(&bnep_session_sem);
|
|
strcpy(req->device, dev->name);
|
|
return 0;
|
|
|
|
failed:
|
|
up_write(&bnep_session_sem);
|
|
free_netdev(dev);
|
|
return err;
|
|
}
|
|
|
|
int bnep_del_connection(struct bnep_conndel_req *req)
|
|
{
|
|
u32 valid_flags = 0;
|
|
struct bnep_session *s;
|
|
int err = 0;
|
|
|
|
BT_DBG("");
|
|
|
|
if (req->flags & ~valid_flags)
|
|
return -EINVAL;
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
s = __bnep_get_session(req->dst);
|
|
if (s) {
|
|
atomic_inc(&s->terminate);
|
|
wake_up_process(s->task);
|
|
} else
|
|
err = -ENOENT;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
static void __bnep_copy_ci(struct bnep_conninfo *ci, struct bnep_session *s)
|
|
{
|
|
u32 valid_flags = BIT(BNEP_SETUP_RESPONSE);
|
|
|
|
memset(ci, 0, sizeof(*ci));
|
|
memcpy(ci->dst, s->eh.h_source, ETH_ALEN);
|
|
strcpy(ci->device, s->dev->name);
|
|
ci->flags = s->flags & valid_flags;
|
|
ci->state = s->state;
|
|
ci->role = s->role;
|
|
}
|
|
|
|
int bnep_get_connlist(struct bnep_connlist_req *req)
|
|
{
|
|
struct bnep_session *s;
|
|
int err = 0, n = 0;
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
list_for_each_entry(s, &bnep_session_list, list) {
|
|
struct bnep_conninfo ci;
|
|
|
|
__bnep_copy_ci(&ci, s);
|
|
|
|
if (copy_to_user(req->ci, &ci, sizeof(ci))) {
|
|
err = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if (++n >= req->cnum)
|
|
break;
|
|
|
|
req->ci++;
|
|
}
|
|
req->cnum = n;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
int bnep_get_conninfo(struct bnep_conninfo *ci)
|
|
{
|
|
struct bnep_session *s;
|
|
int err = 0;
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
s = __bnep_get_session(ci->dst);
|
|
if (s)
|
|
__bnep_copy_ci(ci, s);
|
|
else
|
|
err = -ENOENT;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
static int __init bnep_init(void)
|
|
{
|
|
char flt[50] = "";
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
strcat(flt, "protocol ");
|
|
#endif
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
strcat(flt, "multicast");
|
|
#endif
|
|
|
|
BT_INFO("BNEP (Ethernet Emulation) ver %s", VERSION);
|
|
if (flt[0])
|
|
BT_INFO("BNEP filters: %s", flt);
|
|
|
|
bnep_sock_init();
|
|
return 0;
|
|
}
|
|
|
|
static void __exit bnep_exit(void)
|
|
{
|
|
bnep_sock_cleanup();
|
|
}
|
|
|
|
module_init(bnep_init);
|
|
module_exit(bnep_exit);
|
|
|
|
module_param(compress_src, bool, 0644);
|
|
MODULE_PARM_DESC(compress_src, "Compress sources headers");
|
|
|
|
module_param(compress_dst, bool, 0644);
|
|
MODULE_PARM_DESC(compress_dst, "Compress destination headers");
|
|
|
|
MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
|
|
MODULE_DESCRIPTION("Bluetooth BNEP ver " VERSION);
|
|
MODULE_VERSION(VERSION);
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS("bt-proto-4");
|