mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-24 15:50:59 +07:00
fe66483156
Use smp_mb__before_atomic() instead of smp_mb() and avoid the unnecessary barrier for non LL/SC architectures, such as x86. Signed-off-by: Davidlohr Bueso <dbueso@suse.de> Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
1481 lines
39 KiB
C
1481 lines
39 KiB
C
/*
|
|
HIDP implementation for Linux Bluetooth stack (BlueZ).
|
|
Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>
|
|
Copyright (C) 2013 David Herrmann <dh.herrmann@gmail.com>
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License version 2 as
|
|
published by the Free Software Foundation;
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
|
|
IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
|
|
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
|
|
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
|
|
SOFTWARE IS DISCLAIMED.
|
|
*/
|
|
|
|
#include <linux/kref.h>
|
|
#include <linux/module.h>
|
|
#include <linux/file.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/hidraw.h>
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
#include <net/bluetooth/hci_core.h>
|
|
#include <net/bluetooth/l2cap.h>
|
|
|
|
#include "hidp.h"
|
|
|
|
#define VERSION "1.2"
|
|
|
|
static DECLARE_RWSEM(hidp_session_sem);
|
|
static DECLARE_WAIT_QUEUE_HEAD(hidp_session_wq);
|
|
static LIST_HEAD(hidp_session_list);
|
|
|
|
static unsigned char hidp_keycode[256] = {
|
|
0, 0, 0, 0, 30, 48, 46, 32, 18, 33, 34, 35, 23, 36,
|
|
37, 38, 50, 49, 24, 25, 16, 19, 31, 20, 22, 47, 17, 45,
|
|
21, 44, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 28, 1,
|
|
14, 15, 57, 12, 13, 26, 27, 43, 43, 39, 40, 41, 51, 52,
|
|
53, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 87, 88,
|
|
99, 70, 119, 110, 102, 104, 111, 107, 109, 106, 105, 108, 103, 69,
|
|
98, 55, 74, 78, 96, 79, 80, 81, 75, 76, 77, 71, 72, 73,
|
|
82, 83, 86, 127, 116, 117, 183, 184, 185, 186, 187, 188, 189, 190,
|
|
191, 192, 193, 194, 134, 138, 130, 132, 128, 129, 131, 137, 133, 135,
|
|
136, 113, 115, 114, 0, 0, 0, 121, 0, 89, 93, 124, 92, 94,
|
|
95, 0, 0, 0, 122, 123, 90, 91, 85, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
|
29, 42, 56, 125, 97, 54, 100, 126, 164, 166, 165, 163, 161, 115,
|
|
114, 113, 150, 158, 159, 128, 136, 177, 178, 176, 142, 152, 173, 140
|
|
};
|
|
|
|
static unsigned char hidp_mkeyspat[] = { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 };
|
|
|
|
static int hidp_session_probe(struct l2cap_conn *conn,
|
|
struct l2cap_user *user);
|
|
static void hidp_session_remove(struct l2cap_conn *conn,
|
|
struct l2cap_user *user);
|
|
static int hidp_session_thread(void *arg);
|
|
static void hidp_session_terminate(struct hidp_session *s);
|
|
|
|
static void hidp_copy_session(struct hidp_session *session, struct hidp_conninfo *ci)
|
|
{
|
|
u32 valid_flags = 0;
|
|
memset(ci, 0, sizeof(*ci));
|
|
bacpy(&ci->bdaddr, &session->bdaddr);
|
|
|
|
ci->flags = session->flags & valid_flags;
|
|
ci->state = BT_CONNECTED;
|
|
|
|
if (session->input) {
|
|
ci->vendor = session->input->id.vendor;
|
|
ci->product = session->input->id.product;
|
|
ci->version = session->input->id.version;
|
|
if (session->input->name)
|
|
strlcpy(ci->name, session->input->name, 128);
|
|
else
|
|
strlcpy(ci->name, "HID Boot Device", 128);
|
|
} else if (session->hid) {
|
|
ci->vendor = session->hid->vendor;
|
|
ci->product = session->hid->product;
|
|
ci->version = session->hid->version;
|
|
strlcpy(ci->name, session->hid->name, 128);
|
|
}
|
|
}
|
|
|
|
/* assemble skb, queue message on @transmit and wake up the session thread */
|
|
static int hidp_send_message(struct hidp_session *session, struct socket *sock,
|
|
struct sk_buff_head *transmit, unsigned char hdr,
|
|
const unsigned char *data, int size)
|
|
{
|
|
struct sk_buff *skb;
|
|
struct sock *sk = sock->sk;
|
|
int ret;
|
|
|
|
BT_DBG("session %p data %p size %d", session, data, size);
|
|
|
|
if (atomic_read(&session->terminate))
|
|
return -EIO;
|
|
|
|
skb = alloc_skb(size + 1, GFP_ATOMIC);
|
|
if (!skb) {
|
|
BT_ERR("Can't allocate memory for new frame");
|
|
return -ENOMEM;
|
|
}
|
|
|
|
skb_put_u8(skb, hdr);
|
|
if (data && size > 0) {
|
|
skb_put_data(skb, data, size);
|
|
ret = size;
|
|
} else {
|
|
ret = 0;
|
|
}
|
|
|
|
skb_queue_tail(transmit, skb);
|
|
wake_up_interruptible(sk_sleep(sk));
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int hidp_send_ctrl_message(struct hidp_session *session,
|
|
unsigned char hdr, const unsigned char *data,
|
|
int size)
|
|
{
|
|
return hidp_send_message(session, session->ctrl_sock,
|
|
&session->ctrl_transmit, hdr, data, size);
|
|
}
|
|
|
|
static int hidp_send_intr_message(struct hidp_session *session,
|
|
unsigned char hdr, const unsigned char *data,
|
|
int size)
|
|
{
|
|
return hidp_send_message(session, session->intr_sock,
|
|
&session->intr_transmit, hdr, data, size);
|
|
}
|
|
|
|
static int hidp_input_event(struct input_dev *dev, unsigned int type,
|
|
unsigned int code, int value)
|
|
{
|
|
struct hidp_session *session = input_get_drvdata(dev);
|
|
unsigned char newleds;
|
|
unsigned char hdr, data[2];
|
|
|
|
BT_DBG("session %p type %d code %d value %d",
|
|
session, type, code, value);
|
|
|
|
if (type != EV_LED)
|
|
return -1;
|
|
|
|
newleds = (!!test_bit(LED_KANA, dev->led) << 3) |
|
|
(!!test_bit(LED_COMPOSE, dev->led) << 3) |
|
|
(!!test_bit(LED_SCROLLL, dev->led) << 2) |
|
|
(!!test_bit(LED_CAPSL, dev->led) << 1) |
|
|
(!!test_bit(LED_NUML, dev->led) << 0);
|
|
|
|
if (session->leds == newleds)
|
|
return 0;
|
|
|
|
session->leds = newleds;
|
|
|
|
hdr = HIDP_TRANS_DATA | HIDP_DATA_RTYPE_OUPUT;
|
|
data[0] = 0x01;
|
|
data[1] = newleds;
|
|
|
|
return hidp_send_intr_message(session, hdr, data, 2);
|
|
}
|
|
|
|
static void hidp_input_report(struct hidp_session *session, struct sk_buff *skb)
|
|
{
|
|
struct input_dev *dev = session->input;
|
|
unsigned char *keys = session->keys;
|
|
unsigned char *udata = skb->data + 1;
|
|
signed char *sdata = skb->data + 1;
|
|
int i, size = skb->len - 1;
|
|
|
|
switch (skb->data[0]) {
|
|
case 0x01: /* Keyboard report */
|
|
for (i = 0; i < 8; i++)
|
|
input_report_key(dev, hidp_keycode[i + 224], (udata[0] >> i) & 1);
|
|
|
|
/* If all the key codes have been set to 0x01, it means
|
|
* too many keys were pressed at the same time. */
|
|
if (!memcmp(udata + 2, hidp_mkeyspat, 6))
|
|
break;
|
|
|
|
for (i = 2; i < 8; i++) {
|
|
if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) {
|
|
if (hidp_keycode[keys[i]])
|
|
input_report_key(dev, hidp_keycode[keys[i]], 0);
|
|
else
|
|
BT_ERR("Unknown key (scancode %#x) released.", keys[i]);
|
|
}
|
|
|
|
if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) {
|
|
if (hidp_keycode[udata[i]])
|
|
input_report_key(dev, hidp_keycode[udata[i]], 1);
|
|
else
|
|
BT_ERR("Unknown key (scancode %#x) pressed.", udata[i]);
|
|
}
|
|
}
|
|
|
|
memcpy(keys, udata, 8);
|
|
break;
|
|
|
|
case 0x02: /* Mouse report */
|
|
input_report_key(dev, BTN_LEFT, sdata[0] & 0x01);
|
|
input_report_key(dev, BTN_RIGHT, sdata[0] & 0x02);
|
|
input_report_key(dev, BTN_MIDDLE, sdata[0] & 0x04);
|
|
input_report_key(dev, BTN_SIDE, sdata[0] & 0x08);
|
|
input_report_key(dev, BTN_EXTRA, sdata[0] & 0x10);
|
|
|
|
input_report_rel(dev, REL_X, sdata[1]);
|
|
input_report_rel(dev, REL_Y, sdata[2]);
|
|
|
|
if (size > 3)
|
|
input_report_rel(dev, REL_WHEEL, sdata[3]);
|
|
break;
|
|
}
|
|
|
|
input_sync(dev);
|
|
}
|
|
|
|
static int hidp_get_raw_report(struct hid_device *hid,
|
|
unsigned char report_number,
|
|
unsigned char *data, size_t count,
|
|
unsigned char report_type)
|
|
{
|
|
struct hidp_session *session = hid->driver_data;
|
|
struct sk_buff *skb;
|
|
size_t len;
|
|
int numbered_reports = hid->report_enum[report_type].numbered;
|
|
int ret;
|
|
|
|
if (atomic_read(&session->terminate))
|
|
return -EIO;
|
|
|
|
switch (report_type) {
|
|
case HID_FEATURE_REPORT:
|
|
report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_FEATURE;
|
|
break;
|
|
case HID_INPUT_REPORT:
|
|
report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_INPUT;
|
|
break;
|
|
case HID_OUTPUT_REPORT:
|
|
report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_OUPUT;
|
|
break;
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (mutex_lock_interruptible(&session->report_mutex))
|
|
return -ERESTARTSYS;
|
|
|
|
/* Set up our wait, and send the report request to the device. */
|
|
session->waiting_report_type = report_type & HIDP_DATA_RTYPE_MASK;
|
|
session->waiting_report_number = numbered_reports ? report_number : -1;
|
|
set_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
|
|
data[0] = report_number;
|
|
ret = hidp_send_ctrl_message(session, report_type, data, 1);
|
|
if (ret < 0)
|
|
goto err;
|
|
|
|
/* Wait for the return of the report. The returned report
|
|
gets put in session->report_return. */
|
|
while (test_bit(HIDP_WAITING_FOR_RETURN, &session->flags) &&
|
|
!atomic_read(&session->terminate)) {
|
|
int res;
|
|
|
|
res = wait_event_interruptible_timeout(session->report_queue,
|
|
!test_bit(HIDP_WAITING_FOR_RETURN, &session->flags)
|
|
|| atomic_read(&session->terminate),
|
|
5*HZ);
|
|
if (res == 0) {
|
|
/* timeout */
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
if (res < 0) {
|
|
/* signal */
|
|
ret = -ERESTARTSYS;
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
skb = session->report_return;
|
|
if (skb) {
|
|
len = skb->len < count ? skb->len : count;
|
|
memcpy(data, skb->data, len);
|
|
|
|
kfree_skb(skb);
|
|
session->report_return = NULL;
|
|
} else {
|
|
/* Device returned a HANDSHAKE, indicating protocol error. */
|
|
len = -EIO;
|
|
}
|
|
|
|
clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
|
|
mutex_unlock(&session->report_mutex);
|
|
|
|
return len;
|
|
|
|
err:
|
|
clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
|
|
mutex_unlock(&session->report_mutex);
|
|
return ret;
|
|
}
|
|
|
|
static int hidp_set_raw_report(struct hid_device *hid, unsigned char reportnum,
|
|
unsigned char *data, size_t count,
|
|
unsigned char report_type)
|
|
{
|
|
struct hidp_session *session = hid->driver_data;
|
|
int ret;
|
|
|
|
switch (report_type) {
|
|
case HID_FEATURE_REPORT:
|
|
report_type = HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_FEATURE;
|
|
break;
|
|
case HID_INPUT_REPORT:
|
|
report_type = HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_INPUT;
|
|
break;
|
|
case HID_OUTPUT_REPORT:
|
|
report_type = HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_OUPUT;
|
|
break;
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (mutex_lock_interruptible(&session->report_mutex))
|
|
return -ERESTARTSYS;
|
|
|
|
/* Set up our wait, and send the report request to the device. */
|
|
data[0] = reportnum;
|
|
set_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags);
|
|
ret = hidp_send_ctrl_message(session, report_type, data, count);
|
|
if (ret < 0)
|
|
goto err;
|
|
|
|
/* Wait for the ACK from the device. */
|
|
while (test_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags) &&
|
|
!atomic_read(&session->terminate)) {
|
|
int res;
|
|
|
|
res = wait_event_interruptible_timeout(session->report_queue,
|
|
!test_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags)
|
|
|| atomic_read(&session->terminate),
|
|
10*HZ);
|
|
if (res == 0) {
|
|
/* timeout */
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
if (res < 0) {
|
|
/* signal */
|
|
ret = -ERESTARTSYS;
|
|
goto err;
|
|
}
|
|
}
|
|
|
|
if (!session->output_report_success) {
|
|
ret = -EIO;
|
|
goto err;
|
|
}
|
|
|
|
ret = count;
|
|
|
|
err:
|
|
clear_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags);
|
|
mutex_unlock(&session->report_mutex);
|
|
return ret;
|
|
}
|
|
|
|
static int hidp_output_report(struct hid_device *hid, __u8 *data, size_t count)
|
|
{
|
|
struct hidp_session *session = hid->driver_data;
|
|
|
|
return hidp_send_intr_message(session,
|
|
HIDP_TRANS_DATA | HIDP_DATA_RTYPE_OUPUT,
|
|
data, count);
|
|
}
|
|
|
|
static int hidp_raw_request(struct hid_device *hid, unsigned char reportnum,
|
|
__u8 *buf, size_t len, unsigned char rtype,
|
|
int reqtype)
|
|
{
|
|
switch (reqtype) {
|
|
case HID_REQ_GET_REPORT:
|
|
return hidp_get_raw_report(hid, reportnum, buf, len, rtype);
|
|
case HID_REQ_SET_REPORT:
|
|
return hidp_set_raw_report(hid, reportnum, buf, len, rtype);
|
|
default:
|
|
return -EIO;
|
|
}
|
|
}
|
|
|
|
static void hidp_idle_timeout(struct timer_list *t)
|
|
{
|
|
struct hidp_session *session = from_timer(session, t, timer);
|
|
|
|
/* The HIDP user-space API only contains calls to add and remove
|
|
* devices. There is no way to forward events of any kind. Therefore,
|
|
* we have to forcefully disconnect a device on idle-timeouts. This is
|
|
* unfortunate and weird API design, but it is spec-compliant and
|
|
* required for backwards-compatibility. Hence, on idle-timeout, we
|
|
* signal driver-detach events, so poll() will be woken up with an
|
|
* error-condition on both sockets.
|
|
*/
|
|
|
|
session->intr_sock->sk->sk_err = EUNATCH;
|
|
session->ctrl_sock->sk->sk_err = EUNATCH;
|
|
wake_up_interruptible(sk_sleep(session->intr_sock->sk));
|
|
wake_up_interruptible(sk_sleep(session->ctrl_sock->sk));
|
|
|
|
hidp_session_terminate(session);
|
|
}
|
|
|
|
static void hidp_set_timer(struct hidp_session *session)
|
|
{
|
|
if (session->idle_to > 0)
|
|
mod_timer(&session->timer, jiffies + HZ * session->idle_to);
|
|
}
|
|
|
|
static void hidp_del_timer(struct hidp_session *session)
|
|
{
|
|
if (session->idle_to > 0)
|
|
del_timer(&session->timer);
|
|
}
|
|
|
|
static void hidp_process_report(struct hidp_session *session, int type,
|
|
const u8 *data, unsigned int len, int intr)
|
|
{
|
|
if (len > HID_MAX_BUFFER_SIZE)
|
|
len = HID_MAX_BUFFER_SIZE;
|
|
|
|
memcpy(session->input_buf, data, len);
|
|
hid_input_report(session->hid, type, session->input_buf, len, intr);
|
|
}
|
|
|
|
static void hidp_process_handshake(struct hidp_session *session,
|
|
unsigned char param)
|
|
{
|
|
BT_DBG("session %p param 0x%02x", session, param);
|
|
session->output_report_success = 0; /* default condition */
|
|
|
|
switch (param) {
|
|
case HIDP_HSHK_SUCCESSFUL:
|
|
/* FIXME: Call into SET_ GET_ handlers here */
|
|
session->output_report_success = 1;
|
|
break;
|
|
|
|
case HIDP_HSHK_NOT_READY:
|
|
case HIDP_HSHK_ERR_INVALID_REPORT_ID:
|
|
case HIDP_HSHK_ERR_UNSUPPORTED_REQUEST:
|
|
case HIDP_HSHK_ERR_INVALID_PARAMETER:
|
|
if (test_and_clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags))
|
|
wake_up_interruptible(&session->report_queue);
|
|
|
|
/* FIXME: Call into SET_ GET_ handlers here */
|
|
break;
|
|
|
|
case HIDP_HSHK_ERR_UNKNOWN:
|
|
break;
|
|
|
|
case HIDP_HSHK_ERR_FATAL:
|
|
/* Device requests a reboot, as this is the only way this error
|
|
* can be recovered. */
|
|
hidp_send_ctrl_message(session,
|
|
HIDP_TRANS_HID_CONTROL | HIDP_CTRL_SOFT_RESET, NULL, 0);
|
|
break;
|
|
|
|
default:
|
|
hidp_send_ctrl_message(session,
|
|
HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
|
|
break;
|
|
}
|
|
|
|
/* Wake up the waiting thread. */
|
|
if (test_and_clear_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags))
|
|
wake_up_interruptible(&session->report_queue);
|
|
}
|
|
|
|
static void hidp_process_hid_control(struct hidp_session *session,
|
|
unsigned char param)
|
|
{
|
|
BT_DBG("session %p param 0x%02x", session, param);
|
|
|
|
if (param == HIDP_CTRL_VIRTUAL_CABLE_UNPLUG) {
|
|
/* Flush the transmit queues */
|
|
skb_queue_purge(&session->ctrl_transmit);
|
|
skb_queue_purge(&session->intr_transmit);
|
|
|
|
hidp_session_terminate(session);
|
|
}
|
|
}
|
|
|
|
/* Returns true if the passed-in skb should be freed by the caller. */
|
|
static int hidp_process_data(struct hidp_session *session, struct sk_buff *skb,
|
|
unsigned char param)
|
|
{
|
|
int done_with_skb = 1;
|
|
BT_DBG("session %p skb %p len %d param 0x%02x", session, skb, skb->len, param);
|
|
|
|
switch (param) {
|
|
case HIDP_DATA_RTYPE_INPUT:
|
|
hidp_set_timer(session);
|
|
|
|
if (session->input)
|
|
hidp_input_report(session, skb);
|
|
|
|
if (session->hid)
|
|
hidp_process_report(session, HID_INPUT_REPORT,
|
|
skb->data, skb->len, 0);
|
|
break;
|
|
|
|
case HIDP_DATA_RTYPE_OTHER:
|
|
case HIDP_DATA_RTYPE_OUPUT:
|
|
case HIDP_DATA_RTYPE_FEATURE:
|
|
break;
|
|
|
|
default:
|
|
hidp_send_ctrl_message(session,
|
|
HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
|
|
}
|
|
|
|
if (test_bit(HIDP_WAITING_FOR_RETURN, &session->flags) &&
|
|
param == session->waiting_report_type) {
|
|
if (session->waiting_report_number < 0 ||
|
|
session->waiting_report_number == skb->data[0]) {
|
|
/* hidp_get_raw_report() is waiting on this report. */
|
|
session->report_return = skb;
|
|
done_with_skb = 0;
|
|
clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
|
|
wake_up_interruptible(&session->report_queue);
|
|
}
|
|
}
|
|
|
|
return done_with_skb;
|
|
}
|
|
|
|
static void hidp_recv_ctrl_frame(struct hidp_session *session,
|
|
struct sk_buff *skb)
|
|
{
|
|
unsigned char hdr, type, param;
|
|
int free_skb = 1;
|
|
|
|
BT_DBG("session %p skb %p len %d", session, skb, skb->len);
|
|
|
|
hdr = skb->data[0];
|
|
skb_pull(skb, 1);
|
|
|
|
type = hdr & HIDP_HEADER_TRANS_MASK;
|
|
param = hdr & HIDP_HEADER_PARAM_MASK;
|
|
|
|
switch (type) {
|
|
case HIDP_TRANS_HANDSHAKE:
|
|
hidp_process_handshake(session, param);
|
|
break;
|
|
|
|
case HIDP_TRANS_HID_CONTROL:
|
|
hidp_process_hid_control(session, param);
|
|
break;
|
|
|
|
case HIDP_TRANS_DATA:
|
|
free_skb = hidp_process_data(session, skb, param);
|
|
break;
|
|
|
|
default:
|
|
hidp_send_ctrl_message(session,
|
|
HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_UNSUPPORTED_REQUEST, NULL, 0);
|
|
break;
|
|
}
|
|
|
|
if (free_skb)
|
|
kfree_skb(skb);
|
|
}
|
|
|
|
static void hidp_recv_intr_frame(struct hidp_session *session,
|
|
struct sk_buff *skb)
|
|
{
|
|
unsigned char hdr;
|
|
|
|
BT_DBG("session %p skb %p len %d", session, skb, skb->len);
|
|
|
|
hdr = skb->data[0];
|
|
skb_pull(skb, 1);
|
|
|
|
if (hdr == (HIDP_TRANS_DATA | HIDP_DATA_RTYPE_INPUT)) {
|
|
hidp_set_timer(session);
|
|
|
|
if (session->input)
|
|
hidp_input_report(session, skb);
|
|
|
|
if (session->hid) {
|
|
hidp_process_report(session, HID_INPUT_REPORT,
|
|
skb->data, skb->len, 1);
|
|
BT_DBG("report len %d", skb->len);
|
|
}
|
|
} else {
|
|
BT_DBG("Unsupported protocol header 0x%02x", hdr);
|
|
}
|
|
|
|
kfree_skb(skb);
|
|
}
|
|
|
|
static int hidp_send_frame(struct socket *sock, unsigned char *data, int len)
|
|
{
|
|
struct kvec iv = { data, len };
|
|
struct msghdr msg;
|
|
|
|
BT_DBG("sock %p data %p len %d", sock, data, len);
|
|
|
|
if (!len)
|
|
return 0;
|
|
|
|
memset(&msg, 0, sizeof(msg));
|
|
|
|
return kernel_sendmsg(sock, &msg, &iv, 1, len);
|
|
}
|
|
|
|
/* dequeue message from @transmit and send via @sock */
|
|
static void hidp_process_transmit(struct hidp_session *session,
|
|
struct sk_buff_head *transmit,
|
|
struct socket *sock)
|
|
{
|
|
struct sk_buff *skb;
|
|
int ret;
|
|
|
|
BT_DBG("session %p", session);
|
|
|
|
while ((skb = skb_dequeue(transmit))) {
|
|
ret = hidp_send_frame(sock, skb->data, skb->len);
|
|
if (ret == -EAGAIN) {
|
|
skb_queue_head(transmit, skb);
|
|
break;
|
|
} else if (ret < 0) {
|
|
hidp_session_terminate(session);
|
|
kfree_skb(skb);
|
|
break;
|
|
}
|
|
|
|
hidp_set_timer(session);
|
|
kfree_skb(skb);
|
|
}
|
|
}
|
|
|
|
static int hidp_setup_input(struct hidp_session *session,
|
|
const struct hidp_connadd_req *req)
|
|
{
|
|
struct input_dev *input;
|
|
int i;
|
|
|
|
input = input_allocate_device();
|
|
if (!input)
|
|
return -ENOMEM;
|
|
|
|
session->input = input;
|
|
|
|
input_set_drvdata(input, session);
|
|
|
|
input->name = "Bluetooth HID Boot Protocol Device";
|
|
|
|
input->id.bustype = BUS_BLUETOOTH;
|
|
input->id.vendor = req->vendor;
|
|
input->id.product = req->product;
|
|
input->id.version = req->version;
|
|
|
|
if (req->subclass & 0x40) {
|
|
set_bit(EV_KEY, input->evbit);
|
|
set_bit(EV_LED, input->evbit);
|
|
set_bit(EV_REP, input->evbit);
|
|
|
|
set_bit(LED_NUML, input->ledbit);
|
|
set_bit(LED_CAPSL, input->ledbit);
|
|
set_bit(LED_SCROLLL, input->ledbit);
|
|
set_bit(LED_COMPOSE, input->ledbit);
|
|
set_bit(LED_KANA, input->ledbit);
|
|
|
|
for (i = 0; i < sizeof(hidp_keycode); i++)
|
|
set_bit(hidp_keycode[i], input->keybit);
|
|
clear_bit(0, input->keybit);
|
|
}
|
|
|
|
if (req->subclass & 0x80) {
|
|
input->evbit[0] = BIT_MASK(EV_KEY) | BIT_MASK(EV_REL);
|
|
input->keybit[BIT_WORD(BTN_MOUSE)] = BIT_MASK(BTN_LEFT) |
|
|
BIT_MASK(BTN_RIGHT) | BIT_MASK(BTN_MIDDLE);
|
|
input->relbit[0] = BIT_MASK(REL_X) | BIT_MASK(REL_Y);
|
|
input->keybit[BIT_WORD(BTN_MOUSE)] |= BIT_MASK(BTN_SIDE) |
|
|
BIT_MASK(BTN_EXTRA);
|
|
input->relbit[0] |= BIT_MASK(REL_WHEEL);
|
|
}
|
|
|
|
input->dev.parent = &session->conn->hcon->dev;
|
|
|
|
input->event = hidp_input_event;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int hidp_open(struct hid_device *hid)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static void hidp_close(struct hid_device *hid)
|
|
{
|
|
}
|
|
|
|
static int hidp_parse(struct hid_device *hid)
|
|
{
|
|
struct hidp_session *session = hid->driver_data;
|
|
|
|
return hid_parse_report(session->hid, session->rd_data,
|
|
session->rd_size);
|
|
}
|
|
|
|
static int hidp_start(struct hid_device *hid)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static void hidp_stop(struct hid_device *hid)
|
|
{
|
|
struct hidp_session *session = hid->driver_data;
|
|
|
|
skb_queue_purge(&session->ctrl_transmit);
|
|
skb_queue_purge(&session->intr_transmit);
|
|
|
|
hid->claimed = 0;
|
|
}
|
|
|
|
struct hid_ll_driver hidp_hid_driver = {
|
|
.parse = hidp_parse,
|
|
.start = hidp_start,
|
|
.stop = hidp_stop,
|
|
.open = hidp_open,
|
|
.close = hidp_close,
|
|
.raw_request = hidp_raw_request,
|
|
.output_report = hidp_output_report,
|
|
};
|
|
EXPORT_SYMBOL_GPL(hidp_hid_driver);
|
|
|
|
/* This function sets up the hid device. It does not add it
|
|
to the HID system. That is done in hidp_add_connection(). */
|
|
static int hidp_setup_hid(struct hidp_session *session,
|
|
const struct hidp_connadd_req *req)
|
|
{
|
|
struct hid_device *hid;
|
|
int err;
|
|
|
|
session->rd_data = memdup_user(req->rd_data, req->rd_size);
|
|
if (IS_ERR(session->rd_data))
|
|
return PTR_ERR(session->rd_data);
|
|
|
|
session->rd_size = req->rd_size;
|
|
|
|
hid = hid_allocate_device();
|
|
if (IS_ERR(hid)) {
|
|
err = PTR_ERR(hid);
|
|
goto fault;
|
|
}
|
|
|
|
session->hid = hid;
|
|
|
|
hid->driver_data = session;
|
|
|
|
hid->bus = BUS_BLUETOOTH;
|
|
hid->vendor = req->vendor;
|
|
hid->product = req->product;
|
|
hid->version = req->version;
|
|
hid->country = req->country;
|
|
|
|
strscpy(hid->name, req->name, sizeof(hid->name));
|
|
|
|
snprintf(hid->phys, sizeof(hid->phys), "%pMR",
|
|
&l2cap_pi(session->ctrl_sock->sk)->chan->src);
|
|
|
|
/* NOTE: Some device modules depend on the dst address being stored in
|
|
* uniq. Please be aware of this before making changes to this behavior.
|
|
*/
|
|
snprintf(hid->uniq, sizeof(hid->uniq), "%pMR",
|
|
&l2cap_pi(session->ctrl_sock->sk)->chan->dst);
|
|
|
|
hid->dev.parent = &session->conn->hcon->dev;
|
|
hid->ll_driver = &hidp_hid_driver;
|
|
|
|
/* True if device is blacklisted in drivers/hid/hid-quirks.c */
|
|
if (hid_ignore(hid)) {
|
|
hid_destroy_device(session->hid);
|
|
session->hid = NULL;
|
|
return -ENODEV;
|
|
}
|
|
|
|
return 0;
|
|
|
|
fault:
|
|
kfree(session->rd_data);
|
|
session->rd_data = NULL;
|
|
|
|
return err;
|
|
}
|
|
|
|
/* initialize session devices */
|
|
static int hidp_session_dev_init(struct hidp_session *session,
|
|
const struct hidp_connadd_req *req)
|
|
{
|
|
int ret;
|
|
|
|
if (req->rd_size > 0) {
|
|
ret = hidp_setup_hid(session, req);
|
|
if (ret && ret != -ENODEV)
|
|
return ret;
|
|
}
|
|
|
|
if (!session->hid) {
|
|
ret = hidp_setup_input(session, req);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* destroy session devices */
|
|
static void hidp_session_dev_destroy(struct hidp_session *session)
|
|
{
|
|
if (session->hid)
|
|
put_device(&session->hid->dev);
|
|
else if (session->input)
|
|
input_put_device(session->input);
|
|
|
|
kfree(session->rd_data);
|
|
session->rd_data = NULL;
|
|
}
|
|
|
|
/* add HID/input devices to their underlying bus systems */
|
|
static int hidp_session_dev_add(struct hidp_session *session)
|
|
{
|
|
int ret;
|
|
|
|
/* Both HID and input systems drop a ref-count when unregistering the
|
|
* device but they don't take a ref-count when registering them. Work
|
|
* around this by explicitly taking a refcount during registration
|
|
* which is dropped automatically by unregistering the devices. */
|
|
|
|
if (session->hid) {
|
|
ret = hid_add_device(session->hid);
|
|
if (ret)
|
|
return ret;
|
|
get_device(&session->hid->dev);
|
|
} else if (session->input) {
|
|
ret = input_register_device(session->input);
|
|
if (ret)
|
|
return ret;
|
|
input_get_device(session->input);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* remove HID/input devices from their bus systems */
|
|
static void hidp_session_dev_del(struct hidp_session *session)
|
|
{
|
|
if (session->hid)
|
|
hid_destroy_device(session->hid);
|
|
else if (session->input)
|
|
input_unregister_device(session->input);
|
|
}
|
|
|
|
/*
|
|
* Asynchronous device registration
|
|
* HID device drivers might want to perform I/O during initialization to
|
|
* detect device types. Therefore, call device registration in a separate
|
|
* worker so the HIDP thread can schedule I/O operations.
|
|
* Note that this must be called after the worker thread was initialized
|
|
* successfully. This will then add the devices and increase session state
|
|
* on success, otherwise it will terminate the session thread.
|
|
*/
|
|
static void hidp_session_dev_work(struct work_struct *work)
|
|
{
|
|
struct hidp_session *session = container_of(work,
|
|
struct hidp_session,
|
|
dev_init);
|
|
int ret;
|
|
|
|
ret = hidp_session_dev_add(session);
|
|
if (!ret)
|
|
atomic_inc(&session->state);
|
|
else
|
|
hidp_session_terminate(session);
|
|
}
|
|
|
|
/*
|
|
* Create new session object
|
|
* Allocate session object, initialize static fields, copy input data into the
|
|
* object and take a reference to all sub-objects.
|
|
* This returns 0 on success and puts a pointer to the new session object in
|
|
* \out. Otherwise, an error code is returned.
|
|
* The new session object has an initial ref-count of 1.
|
|
*/
|
|
static int hidp_session_new(struct hidp_session **out, const bdaddr_t *bdaddr,
|
|
struct socket *ctrl_sock,
|
|
struct socket *intr_sock,
|
|
const struct hidp_connadd_req *req,
|
|
struct l2cap_conn *conn)
|
|
{
|
|
struct hidp_session *session;
|
|
int ret;
|
|
struct bt_sock *ctrl, *intr;
|
|
|
|
ctrl = bt_sk(ctrl_sock->sk);
|
|
intr = bt_sk(intr_sock->sk);
|
|
|
|
session = kzalloc(sizeof(*session), GFP_KERNEL);
|
|
if (!session)
|
|
return -ENOMEM;
|
|
|
|
/* object and runtime management */
|
|
kref_init(&session->ref);
|
|
atomic_set(&session->state, HIDP_SESSION_IDLING);
|
|
init_waitqueue_head(&session->state_queue);
|
|
session->flags = req->flags & BIT(HIDP_BLUETOOTH_VENDOR_ID);
|
|
|
|
/* connection management */
|
|
bacpy(&session->bdaddr, bdaddr);
|
|
session->conn = l2cap_conn_get(conn);
|
|
session->user.probe = hidp_session_probe;
|
|
session->user.remove = hidp_session_remove;
|
|
INIT_LIST_HEAD(&session->user.list);
|
|
session->ctrl_sock = ctrl_sock;
|
|
session->intr_sock = intr_sock;
|
|
skb_queue_head_init(&session->ctrl_transmit);
|
|
skb_queue_head_init(&session->intr_transmit);
|
|
session->ctrl_mtu = min_t(uint, l2cap_pi(ctrl)->chan->omtu,
|
|
l2cap_pi(ctrl)->chan->imtu);
|
|
session->intr_mtu = min_t(uint, l2cap_pi(intr)->chan->omtu,
|
|
l2cap_pi(intr)->chan->imtu);
|
|
session->idle_to = req->idle_to;
|
|
|
|
/* device management */
|
|
INIT_WORK(&session->dev_init, hidp_session_dev_work);
|
|
timer_setup(&session->timer, hidp_idle_timeout, 0);
|
|
|
|
/* session data */
|
|
mutex_init(&session->report_mutex);
|
|
init_waitqueue_head(&session->report_queue);
|
|
|
|
ret = hidp_session_dev_init(session, req);
|
|
if (ret)
|
|
goto err_free;
|
|
|
|
get_file(session->intr_sock->file);
|
|
get_file(session->ctrl_sock->file);
|
|
*out = session;
|
|
return 0;
|
|
|
|
err_free:
|
|
l2cap_conn_put(session->conn);
|
|
kfree(session);
|
|
return ret;
|
|
}
|
|
|
|
/* increase ref-count of the given session by one */
|
|
static void hidp_session_get(struct hidp_session *session)
|
|
{
|
|
kref_get(&session->ref);
|
|
}
|
|
|
|
/* release callback */
|
|
static void session_free(struct kref *ref)
|
|
{
|
|
struct hidp_session *session = container_of(ref, struct hidp_session,
|
|
ref);
|
|
|
|
hidp_session_dev_destroy(session);
|
|
skb_queue_purge(&session->ctrl_transmit);
|
|
skb_queue_purge(&session->intr_transmit);
|
|
fput(session->intr_sock->file);
|
|
fput(session->ctrl_sock->file);
|
|
l2cap_conn_put(session->conn);
|
|
kfree(session);
|
|
}
|
|
|
|
/* decrease ref-count of the given session by one */
|
|
static void hidp_session_put(struct hidp_session *session)
|
|
{
|
|
kref_put(&session->ref, session_free);
|
|
}
|
|
|
|
/*
|
|
* Search the list of active sessions for a session with target address
|
|
* \bdaddr. You must hold at least a read-lock on \hidp_session_sem. As long as
|
|
* you do not release this lock, the session objects cannot vanish and you can
|
|
* safely take a reference to the session yourself.
|
|
*/
|
|
static struct hidp_session *__hidp_session_find(const bdaddr_t *bdaddr)
|
|
{
|
|
struct hidp_session *session;
|
|
|
|
list_for_each_entry(session, &hidp_session_list, list) {
|
|
if (!bacmp(bdaddr, &session->bdaddr))
|
|
return session;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Same as __hidp_session_find() but no locks must be held. This also takes a
|
|
* reference of the returned session (if non-NULL) so you must drop this
|
|
* reference if you no longer use the object.
|
|
*/
|
|
static struct hidp_session *hidp_session_find(const bdaddr_t *bdaddr)
|
|
{
|
|
struct hidp_session *session;
|
|
|
|
down_read(&hidp_session_sem);
|
|
|
|
session = __hidp_session_find(bdaddr);
|
|
if (session)
|
|
hidp_session_get(session);
|
|
|
|
up_read(&hidp_session_sem);
|
|
|
|
return session;
|
|
}
|
|
|
|
/*
|
|
* Start session synchronously
|
|
* This starts a session thread and waits until initialization
|
|
* is done or returns an error if it couldn't be started.
|
|
* If this returns 0 the session thread is up and running. You must call
|
|
* hipd_session_stop_sync() before deleting any runtime resources.
|
|
*/
|
|
static int hidp_session_start_sync(struct hidp_session *session)
|
|
{
|
|
unsigned int vendor, product;
|
|
|
|
if (session->hid) {
|
|
vendor = session->hid->vendor;
|
|
product = session->hid->product;
|
|
} else if (session->input) {
|
|
vendor = session->input->id.vendor;
|
|
product = session->input->id.product;
|
|
} else {
|
|
vendor = 0x0000;
|
|
product = 0x0000;
|
|
}
|
|
|
|
session->task = kthread_run(hidp_session_thread, session,
|
|
"khidpd_%04x%04x", vendor, product);
|
|
if (IS_ERR(session->task))
|
|
return PTR_ERR(session->task);
|
|
|
|
while (atomic_read(&session->state) <= HIDP_SESSION_IDLING)
|
|
wait_event(session->state_queue,
|
|
atomic_read(&session->state) > HIDP_SESSION_IDLING);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Terminate session thread
|
|
* Wake up session thread and notify it to stop. This is asynchronous and
|
|
* returns immediately. Call this whenever a runtime error occurs and you want
|
|
* the session to stop.
|
|
* Note: wake_up_interruptible() performs any necessary memory-barriers for us.
|
|
*/
|
|
static void hidp_session_terminate(struct hidp_session *session)
|
|
{
|
|
atomic_inc(&session->terminate);
|
|
/*
|
|
* See the comment preceding the call to wait_woken()
|
|
* in hidp_session_run().
|
|
*/
|
|
wake_up_interruptible(&hidp_session_wq);
|
|
}
|
|
|
|
/*
|
|
* Probe HIDP session
|
|
* This is called from the l2cap_conn core when our l2cap_user object is bound
|
|
* to the hci-connection. We get the session via the \user object and can now
|
|
* start the session thread, link it into the global session list and
|
|
* schedule HID/input device registration.
|
|
* The global session-list owns its own reference to the session object so you
|
|
* can drop your own reference after registering the l2cap_user object.
|
|
*/
|
|
static int hidp_session_probe(struct l2cap_conn *conn,
|
|
struct l2cap_user *user)
|
|
{
|
|
struct hidp_session *session = container_of(user,
|
|
struct hidp_session,
|
|
user);
|
|
struct hidp_session *s;
|
|
int ret;
|
|
|
|
down_write(&hidp_session_sem);
|
|
|
|
/* check that no other session for this device exists */
|
|
s = __hidp_session_find(&session->bdaddr);
|
|
if (s) {
|
|
ret = -EEXIST;
|
|
goto out_unlock;
|
|
}
|
|
|
|
if (session->input) {
|
|
ret = hidp_session_dev_add(session);
|
|
if (ret)
|
|
goto out_unlock;
|
|
}
|
|
|
|
ret = hidp_session_start_sync(session);
|
|
if (ret)
|
|
goto out_del;
|
|
|
|
/* HID device registration is async to allow I/O during probe */
|
|
if (session->input)
|
|
atomic_inc(&session->state);
|
|
else
|
|
schedule_work(&session->dev_init);
|
|
|
|
hidp_session_get(session);
|
|
list_add(&session->list, &hidp_session_list);
|
|
ret = 0;
|
|
goto out_unlock;
|
|
|
|
out_del:
|
|
if (session->input)
|
|
hidp_session_dev_del(session);
|
|
out_unlock:
|
|
up_write(&hidp_session_sem);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Remove HIDP session
|
|
* Called from the l2cap_conn core when either we explicitly unregistered
|
|
* the l2cap_user object or if the underlying connection is shut down.
|
|
* We signal the hidp-session thread to shut down, unregister the HID/input
|
|
* devices and unlink the session from the global list.
|
|
* This drops the reference to the session that is owned by the global
|
|
* session-list.
|
|
* Note: We _must_ not synchronosly wait for the session-thread to shut down.
|
|
* This is, because the session-thread might be waiting for an HCI lock that is
|
|
* held while we are called. Therefore, we only unregister the devices and
|
|
* notify the session-thread to terminate. The thread itself owns a reference
|
|
* to the session object so it can safely shut down.
|
|
*/
|
|
static void hidp_session_remove(struct l2cap_conn *conn,
|
|
struct l2cap_user *user)
|
|
{
|
|
struct hidp_session *session = container_of(user,
|
|
struct hidp_session,
|
|
user);
|
|
|
|
down_write(&hidp_session_sem);
|
|
|
|
hidp_session_terminate(session);
|
|
|
|
cancel_work_sync(&session->dev_init);
|
|
if (session->input ||
|
|
atomic_read(&session->state) > HIDP_SESSION_PREPARING)
|
|
hidp_session_dev_del(session);
|
|
|
|
list_del(&session->list);
|
|
|
|
up_write(&hidp_session_sem);
|
|
|
|
hidp_session_put(session);
|
|
}
|
|
|
|
/*
|
|
* Session Worker
|
|
* This performs the actual main-loop of the HIDP worker. We first check
|
|
* whether the underlying connection is still alive, then parse all pending
|
|
* messages and finally send all outstanding messages.
|
|
*/
|
|
static void hidp_session_run(struct hidp_session *session)
|
|
{
|
|
struct sock *ctrl_sk = session->ctrl_sock->sk;
|
|
struct sock *intr_sk = session->intr_sock->sk;
|
|
struct sk_buff *skb;
|
|
DEFINE_WAIT_FUNC(wait, woken_wake_function);
|
|
|
|
add_wait_queue(&hidp_session_wq, &wait);
|
|
for (;;) {
|
|
/*
|
|
* This thread can be woken up two ways:
|
|
* - You call hidp_session_terminate() which sets the
|
|
* session->terminate flag and wakes this thread up.
|
|
* - Via modifying the socket state of ctrl/intr_sock. This
|
|
* thread is woken up by ->sk_state_changed().
|
|
*/
|
|
|
|
if (atomic_read(&session->terminate))
|
|
break;
|
|
|
|
if (ctrl_sk->sk_state != BT_CONNECTED ||
|
|
intr_sk->sk_state != BT_CONNECTED)
|
|
break;
|
|
|
|
/* parse incoming intr-skbs */
|
|
while ((skb = skb_dequeue(&intr_sk->sk_receive_queue))) {
|
|
skb_orphan(skb);
|
|
if (!skb_linearize(skb))
|
|
hidp_recv_intr_frame(session, skb);
|
|
else
|
|
kfree_skb(skb);
|
|
}
|
|
|
|
/* send pending intr-skbs */
|
|
hidp_process_transmit(session, &session->intr_transmit,
|
|
session->intr_sock);
|
|
|
|
/* parse incoming ctrl-skbs */
|
|
while ((skb = skb_dequeue(&ctrl_sk->sk_receive_queue))) {
|
|
skb_orphan(skb);
|
|
if (!skb_linearize(skb))
|
|
hidp_recv_ctrl_frame(session, skb);
|
|
else
|
|
kfree_skb(skb);
|
|
}
|
|
|
|
/* send pending ctrl-skbs */
|
|
hidp_process_transmit(session, &session->ctrl_transmit,
|
|
session->ctrl_sock);
|
|
|
|
/*
|
|
* wait_woken() performs the necessary memory barriers
|
|
* for us; see the header comment for this primitive.
|
|
*/
|
|
wait_woken(&wait, TASK_INTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT);
|
|
}
|
|
remove_wait_queue(&hidp_session_wq, &wait);
|
|
|
|
atomic_inc(&session->terminate);
|
|
}
|
|
|
|
static int hidp_session_wake_function(wait_queue_entry_t *wait,
|
|
unsigned int mode,
|
|
int sync, void *key)
|
|
{
|
|
wake_up_interruptible(&hidp_session_wq);
|
|
return false;
|
|
}
|
|
|
|
/*
|
|
* HIDP session thread
|
|
* This thread runs the I/O for a single HIDP session. Startup is synchronous
|
|
* which allows us to take references to ourself here instead of doing that in
|
|
* the caller.
|
|
* When we are ready to run we notify the caller and call hidp_session_run().
|
|
*/
|
|
static int hidp_session_thread(void *arg)
|
|
{
|
|
struct hidp_session *session = arg;
|
|
DEFINE_WAIT_FUNC(ctrl_wait, hidp_session_wake_function);
|
|
DEFINE_WAIT_FUNC(intr_wait, hidp_session_wake_function);
|
|
|
|
BT_DBG("session %p", session);
|
|
|
|
/* initialize runtime environment */
|
|
hidp_session_get(session);
|
|
__module_get(THIS_MODULE);
|
|
set_user_nice(current, -15);
|
|
hidp_set_timer(session);
|
|
|
|
add_wait_queue(sk_sleep(session->ctrl_sock->sk), &ctrl_wait);
|
|
add_wait_queue(sk_sleep(session->intr_sock->sk), &intr_wait);
|
|
/* This memory barrier is paired with wq_has_sleeper(). See
|
|
* sock_poll_wait() for more information why this is needed. */
|
|
smp_mb__before_atomic();
|
|
|
|
/* notify synchronous startup that we're ready */
|
|
atomic_inc(&session->state);
|
|
wake_up(&session->state_queue);
|
|
|
|
/* run session */
|
|
hidp_session_run(session);
|
|
|
|
/* cleanup runtime environment */
|
|
remove_wait_queue(sk_sleep(session->intr_sock->sk), &intr_wait);
|
|
remove_wait_queue(sk_sleep(session->intr_sock->sk), &ctrl_wait);
|
|
wake_up_interruptible(&session->report_queue);
|
|
hidp_del_timer(session);
|
|
|
|
/*
|
|
* If we stopped ourself due to any internal signal, we should try to
|
|
* unregister our own session here to avoid having it linger until the
|
|
* parent l2cap_conn dies or user-space cleans it up.
|
|
* This does not deadlock as we don't do any synchronous shutdown.
|
|
* Instead, this call has the same semantics as if user-space tried to
|
|
* delete the session.
|
|
*/
|
|
l2cap_unregister_user(session->conn, &session->user);
|
|
hidp_session_put(session);
|
|
|
|
module_put_and_exit(0);
|
|
return 0;
|
|
}
|
|
|
|
static int hidp_verify_sockets(struct socket *ctrl_sock,
|
|
struct socket *intr_sock)
|
|
{
|
|
struct l2cap_chan *ctrl_chan, *intr_chan;
|
|
struct bt_sock *ctrl, *intr;
|
|
struct hidp_session *session;
|
|
|
|
if (!l2cap_is_socket(ctrl_sock) || !l2cap_is_socket(intr_sock))
|
|
return -EINVAL;
|
|
|
|
ctrl_chan = l2cap_pi(ctrl_sock->sk)->chan;
|
|
intr_chan = l2cap_pi(intr_sock->sk)->chan;
|
|
|
|
if (bacmp(&ctrl_chan->src, &intr_chan->src) ||
|
|
bacmp(&ctrl_chan->dst, &intr_chan->dst))
|
|
return -ENOTUNIQ;
|
|
|
|
ctrl = bt_sk(ctrl_sock->sk);
|
|
intr = bt_sk(intr_sock->sk);
|
|
|
|
if (ctrl->sk.sk_state != BT_CONNECTED ||
|
|
intr->sk.sk_state != BT_CONNECTED)
|
|
return -EBADFD;
|
|
|
|
/* early session check, we check again during session registration */
|
|
session = hidp_session_find(&ctrl_chan->dst);
|
|
if (session) {
|
|
hidp_session_put(session);
|
|
return -EEXIST;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int hidp_connection_add(const struct hidp_connadd_req *req,
|
|
struct socket *ctrl_sock,
|
|
struct socket *intr_sock)
|
|
{
|
|
u32 valid_flags = BIT(HIDP_VIRTUAL_CABLE_UNPLUG) |
|
|
BIT(HIDP_BOOT_PROTOCOL_MODE);
|
|
struct hidp_session *session;
|
|
struct l2cap_conn *conn;
|
|
struct l2cap_chan *chan;
|
|
int ret;
|
|
|
|
ret = hidp_verify_sockets(ctrl_sock, intr_sock);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (req->flags & ~valid_flags)
|
|
return -EINVAL;
|
|
|
|
chan = l2cap_pi(ctrl_sock->sk)->chan;
|
|
conn = NULL;
|
|
l2cap_chan_lock(chan);
|
|
if (chan->conn)
|
|
conn = l2cap_conn_get(chan->conn);
|
|
l2cap_chan_unlock(chan);
|
|
|
|
if (!conn)
|
|
return -EBADFD;
|
|
|
|
ret = hidp_session_new(&session, &chan->dst, ctrl_sock,
|
|
intr_sock, req, conn);
|
|
if (ret)
|
|
goto out_conn;
|
|
|
|
ret = l2cap_register_user(conn, &session->user);
|
|
if (ret)
|
|
goto out_session;
|
|
|
|
ret = 0;
|
|
|
|
out_session:
|
|
hidp_session_put(session);
|
|
out_conn:
|
|
l2cap_conn_put(conn);
|
|
return ret;
|
|
}
|
|
|
|
int hidp_connection_del(struct hidp_conndel_req *req)
|
|
{
|
|
u32 valid_flags = BIT(HIDP_VIRTUAL_CABLE_UNPLUG);
|
|
struct hidp_session *session;
|
|
|
|
if (req->flags & ~valid_flags)
|
|
return -EINVAL;
|
|
|
|
session = hidp_session_find(&req->bdaddr);
|
|
if (!session)
|
|
return -ENOENT;
|
|
|
|
if (req->flags & BIT(HIDP_VIRTUAL_CABLE_UNPLUG))
|
|
hidp_send_ctrl_message(session,
|
|
HIDP_TRANS_HID_CONTROL |
|
|
HIDP_CTRL_VIRTUAL_CABLE_UNPLUG,
|
|
NULL, 0);
|
|
else
|
|
l2cap_unregister_user(session->conn, &session->user);
|
|
|
|
hidp_session_put(session);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int hidp_get_connlist(struct hidp_connlist_req *req)
|
|
{
|
|
struct hidp_session *session;
|
|
int err = 0, n = 0;
|
|
|
|
BT_DBG("");
|
|
|
|
down_read(&hidp_session_sem);
|
|
|
|
list_for_each_entry(session, &hidp_session_list, list) {
|
|
struct hidp_conninfo ci;
|
|
|
|
hidp_copy_session(session, &ci);
|
|
|
|
if (copy_to_user(req->ci, &ci, sizeof(ci))) {
|
|
err = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if (++n >= req->cnum)
|
|
break;
|
|
|
|
req->ci++;
|
|
}
|
|
req->cnum = n;
|
|
|
|
up_read(&hidp_session_sem);
|
|
return err;
|
|
}
|
|
|
|
int hidp_get_conninfo(struct hidp_conninfo *ci)
|
|
{
|
|
struct hidp_session *session;
|
|
|
|
session = hidp_session_find(&ci->bdaddr);
|
|
if (session) {
|
|
hidp_copy_session(session, ci);
|
|
hidp_session_put(session);
|
|
}
|
|
|
|
return session ? 0 : -ENOENT;
|
|
}
|
|
|
|
static int __init hidp_init(void)
|
|
{
|
|
BT_INFO("HIDP (Human Interface Emulation) ver %s", VERSION);
|
|
|
|
return hidp_init_sockets();
|
|
}
|
|
|
|
static void __exit hidp_exit(void)
|
|
{
|
|
hidp_cleanup_sockets();
|
|
}
|
|
|
|
module_init(hidp_init);
|
|
module_exit(hidp_exit);
|
|
|
|
MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
|
|
MODULE_AUTHOR("David Herrmann <dh.herrmann@gmail.com>");
|
|
MODULE_DESCRIPTION("Bluetooth HIDP ver " VERSION);
|
|
MODULE_VERSION(VERSION);
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS("bt-proto-6");
|