8314418629
Currently, the freezer treats all tasks as freezable, except for the kernel threads that explicitly set the PF_NOFREEZE flag for themselves. This approach is problematic, since it requires every kernel thread to either set PF_NOFREEZE explicitly, or call try_to_freeze(), even if it doesn't care for the freezing of tasks at all. It seems better to only require the kernel threads that want to or need to be frozen to use some freezer-related code and to remove any freezer-related code from the other (nonfreezable) kernel threads, which is done in this patch. The patch causes all kernel threads to be nonfreezable by default (ie. to have PF_NOFREEZE set by default) and introduces the set_freezable() function that should be called by the freezable kernel threads in order to unset PF_NOFREEZE. It also makes all of the currently freezable kernel threads call set_freezable(), so it shouldn't cause any (intentional) change of behaviour to appear. Additionally, it updates documentation to describe the freezing of tasks more accurately. [akpm@linux-foundation.org: build fixes] Signed-off-by: Rafael J. Wysocki <rjw@sisk.pl> Acked-by: Nigel Cunningham <nigel@nigel.suspend2.net> Cc: Pavel Machek <pavel@ucw.cz> Cc: Oleg Nesterov <oleg@tv-sign.ru> Cc: Gautham R Shenoy <ego@in.ibm.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
734 lines
16 KiB
C
734 lines
16 KiB
C
/*
|
|
BNEP implementation for Linux Bluetooth stack (BlueZ).
|
|
Copyright (C) 2001-2002 Inventel Systemes
|
|
Written 2001-2002 by
|
|
Clément Moreau <clement.moreau@inventel.fr>
|
|
David Libault <david.libault@inventel.fr>
|
|
|
|
Copyright (C) 2002 Maxim Krasnyansky <maxk@qualcomm.com>
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License version 2 as
|
|
published by the Free Software Foundation;
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
|
|
IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
|
|
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
|
|
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
|
|
SOFTWARE IS DISCLAIMED.
|
|
*/
|
|
|
|
/*
|
|
* $Id: core.c,v 1.20 2002/08/04 21:23:58 maxk Exp $
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kernel.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/signal.h>
|
|
#include <linux/init.h>
|
|
#include <linux/wait.h>
|
|
#include <linux/freezer.h>
|
|
#include <linux/errno.h>
|
|
#include <linux/net.h>
|
|
#include <net/sock.h>
|
|
|
|
#include <linux/socket.h>
|
|
#include <linux/file.h>
|
|
|
|
#include <linux/netdevice.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <asm/unaligned.h>
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
#include <net/bluetooth/hci_core.h>
|
|
#include <net/bluetooth/l2cap.h>
|
|
|
|
#include "bnep.h"
|
|
|
|
#ifndef CONFIG_BT_BNEP_DEBUG
|
|
#undef BT_DBG
|
|
#define BT_DBG(D...)
|
|
#endif
|
|
|
|
#define VERSION "1.2"
|
|
|
|
static LIST_HEAD(bnep_session_list);
|
|
static DECLARE_RWSEM(bnep_session_sem);
|
|
|
|
static struct bnep_session *__bnep_get_session(u8 *dst)
|
|
{
|
|
struct bnep_session *s;
|
|
struct list_head *p;
|
|
|
|
BT_DBG("");
|
|
|
|
list_for_each(p, &bnep_session_list) {
|
|
s = list_entry(p, struct bnep_session, list);
|
|
if (!compare_ether_addr(dst, s->eh.h_source))
|
|
return s;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static void __bnep_link_session(struct bnep_session *s)
|
|
{
|
|
/* It's safe to call __module_get() here because sessions are added
|
|
by the socket layer which has to hold the refference to this module.
|
|
*/
|
|
__module_get(THIS_MODULE);
|
|
list_add(&s->list, &bnep_session_list);
|
|
}
|
|
|
|
static void __bnep_unlink_session(struct bnep_session *s)
|
|
{
|
|
list_del(&s->list);
|
|
module_put(THIS_MODULE);
|
|
}
|
|
|
|
static int bnep_send(struct bnep_session *s, void *data, size_t len)
|
|
{
|
|
struct socket *sock = s->sock;
|
|
struct kvec iv = { data, len };
|
|
|
|
return kernel_sendmsg(sock, &s->msg, &iv, 1, len);
|
|
}
|
|
|
|
static int bnep_send_rsp(struct bnep_session *s, u8 ctrl, u16 resp)
|
|
{
|
|
struct bnep_control_rsp rsp;
|
|
rsp.type = BNEP_CONTROL;
|
|
rsp.ctrl = ctrl;
|
|
rsp.resp = htons(resp);
|
|
return bnep_send(s, &rsp, sizeof(rsp));
|
|
}
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
static inline void bnep_set_default_proto_filter(struct bnep_session *s)
|
|
{
|
|
/* (IPv4, ARP) */
|
|
s->proto_filter[0].start = ETH_P_IP;
|
|
s->proto_filter[0].end = ETH_P_ARP;
|
|
/* (RARP, AppleTalk) */
|
|
s->proto_filter[1].start = ETH_P_RARP;
|
|
s->proto_filter[1].end = ETH_P_AARP;
|
|
/* (IPX, IPv6) */
|
|
s->proto_filter[2].start = ETH_P_IPX;
|
|
s->proto_filter[2].end = ETH_P_IPV6;
|
|
}
|
|
#endif
|
|
|
|
static int bnep_ctrl_set_netfilter(struct bnep_session *s, __be16 *data, int len)
|
|
{
|
|
int n;
|
|
|
|
if (len < 2)
|
|
return -EILSEQ;
|
|
|
|
n = ntohs(get_unaligned(data));
|
|
data++; len -= 2;
|
|
|
|
if (len < n)
|
|
return -EILSEQ;
|
|
|
|
BT_DBG("filter len %d", n);
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
n /= 4;
|
|
if (n <= BNEP_MAX_PROTO_FILTERS) {
|
|
struct bnep_proto_filter *f = s->proto_filter;
|
|
int i;
|
|
|
|
for (i = 0; i < n; i++) {
|
|
f[i].start = ntohs(get_unaligned(data++));
|
|
f[i].end = ntohs(get_unaligned(data++));
|
|
|
|
BT_DBG("proto filter start %d end %d",
|
|
f[i].start, f[i].end);
|
|
}
|
|
|
|
if (i < BNEP_MAX_PROTO_FILTERS)
|
|
memset(f + i, 0, sizeof(*f));
|
|
|
|
if (n == 0)
|
|
bnep_set_default_proto_filter(s);
|
|
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_SUCCESS);
|
|
} else {
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_LIMIT_REACHED);
|
|
}
|
|
#else
|
|
bnep_send_rsp(s, BNEP_FILTER_NET_TYPE_RSP, BNEP_FILTER_UNSUPPORTED_REQ);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static int bnep_ctrl_set_mcfilter(struct bnep_session *s, u8 *data, int len)
|
|
{
|
|
int n;
|
|
|
|
if (len < 2)
|
|
return -EILSEQ;
|
|
|
|
n = ntohs(get_unaligned((__be16 *) data));
|
|
data += 2; len -= 2;
|
|
|
|
if (len < n)
|
|
return -EILSEQ;
|
|
|
|
BT_DBG("filter len %d", n);
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
n /= (ETH_ALEN * 2);
|
|
|
|
if (n > 0) {
|
|
s->mc_filter = 0;
|
|
|
|
/* Always send broadcast */
|
|
set_bit(bnep_mc_hash(s->dev->broadcast), (ulong *) &s->mc_filter);
|
|
|
|
/* Add address ranges to the multicast hash */
|
|
for (; n > 0; n--) {
|
|
u8 a1[6], *a2;
|
|
|
|
memcpy(a1, data, ETH_ALEN); data += ETH_ALEN;
|
|
a2 = data; data += ETH_ALEN;
|
|
|
|
BT_DBG("mc filter %s -> %s",
|
|
batostr((void *) a1), batostr((void *) a2));
|
|
|
|
#define INCA(a) { int i = 5; while (i >=0 && ++a[i--] == 0); }
|
|
|
|
/* Iterate from a1 to a2 */
|
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter);
|
|
while (memcmp(a1, a2, 6) < 0 && s->mc_filter != ~0LL) {
|
|
INCA(a1);
|
|
set_bit(bnep_mc_hash(a1), (ulong *) &s->mc_filter);
|
|
}
|
|
}
|
|
}
|
|
|
|
BT_DBG("mc filter hash 0x%llx", s->mc_filter);
|
|
|
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_SUCCESS);
|
|
#else
|
|
bnep_send_rsp(s, BNEP_FILTER_MULTI_ADDR_RSP, BNEP_FILTER_UNSUPPORTED_REQ);
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
static int bnep_rx_control(struct bnep_session *s, void *data, int len)
|
|
{
|
|
u8 cmd = *(u8 *)data;
|
|
int err = 0;
|
|
|
|
data++; len--;
|
|
|
|
switch (cmd) {
|
|
case BNEP_CMD_NOT_UNDERSTOOD:
|
|
case BNEP_SETUP_CONN_REQ:
|
|
case BNEP_SETUP_CONN_RSP:
|
|
case BNEP_FILTER_NET_TYPE_RSP:
|
|
case BNEP_FILTER_MULTI_ADDR_RSP:
|
|
/* Ignore these for now */
|
|
break;
|
|
|
|
case BNEP_FILTER_NET_TYPE_SET:
|
|
err = bnep_ctrl_set_netfilter(s, data, len);
|
|
break;
|
|
|
|
case BNEP_FILTER_MULTI_ADDR_SET:
|
|
err = bnep_ctrl_set_mcfilter(s, data, len);
|
|
break;
|
|
|
|
default: {
|
|
u8 pkt[3];
|
|
pkt[0] = BNEP_CONTROL;
|
|
pkt[1] = BNEP_CMD_NOT_UNDERSTOOD;
|
|
pkt[2] = cmd;
|
|
bnep_send(s, pkt, sizeof(pkt));
|
|
}
|
|
break;
|
|
}
|
|
|
|
return err;
|
|
}
|
|
|
|
static int bnep_rx_extension(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct bnep_ext_hdr *h;
|
|
int err = 0;
|
|
|
|
do {
|
|
h = (void *) skb->data;
|
|
if (!skb_pull(skb, sizeof(*h))) {
|
|
err = -EILSEQ;
|
|
break;
|
|
}
|
|
|
|
BT_DBG("type 0x%x len %d", h->type, h->len);
|
|
|
|
switch (h->type & BNEP_TYPE_MASK) {
|
|
case BNEP_EXT_CONTROL:
|
|
bnep_rx_control(s, skb->data, skb->len);
|
|
break;
|
|
|
|
default:
|
|
/* Unknown extension, skip it. */
|
|
break;
|
|
}
|
|
|
|
if (!skb_pull(skb, h->len)) {
|
|
err = -EILSEQ;
|
|
break;
|
|
}
|
|
} while (!err && (h->type & BNEP_EXT_HEADER));
|
|
|
|
return err;
|
|
}
|
|
|
|
static u8 __bnep_rx_hlen[] = {
|
|
ETH_HLEN, /* BNEP_GENERAL */
|
|
0, /* BNEP_CONTROL */
|
|
2, /* BNEP_COMPRESSED */
|
|
ETH_ALEN + 2, /* BNEP_COMPRESSED_SRC_ONLY */
|
|
ETH_ALEN + 2 /* BNEP_COMPRESSED_DST_ONLY */
|
|
};
|
|
#define BNEP_RX_TYPES (sizeof(__bnep_rx_hlen) - 1)
|
|
|
|
static inline int bnep_rx_frame(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct net_device *dev = s->dev;
|
|
struct sk_buff *nskb;
|
|
u8 type;
|
|
|
|
dev->last_rx = jiffies;
|
|
s->stats.rx_bytes += skb->len;
|
|
|
|
type = *(u8 *) skb->data; skb_pull(skb, 1);
|
|
|
|
if ((type & BNEP_TYPE_MASK) > BNEP_RX_TYPES)
|
|
goto badframe;
|
|
|
|
if ((type & BNEP_TYPE_MASK) == BNEP_CONTROL) {
|
|
bnep_rx_control(s, skb->data, skb->len);
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
|
|
skb_reset_mac_header(skb);
|
|
|
|
/* Verify and pull out header */
|
|
if (!skb_pull(skb, __bnep_rx_hlen[type & BNEP_TYPE_MASK]))
|
|
goto badframe;
|
|
|
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2));
|
|
|
|
if (type & BNEP_EXT_HEADER) {
|
|
if (bnep_rx_extension(s, skb) < 0)
|
|
goto badframe;
|
|
}
|
|
|
|
/* Strip 802.1p header */
|
|
if (ntohs(s->eh.h_proto) == 0x8100) {
|
|
if (!skb_pull(skb, 4))
|
|
goto badframe;
|
|
s->eh.h_proto = get_unaligned((__be16 *) (skb->data - 2));
|
|
}
|
|
|
|
/* We have to alloc new skb and copy data here :(. Because original skb
|
|
* may not be modified and because of the alignment requirements. */
|
|
nskb = alloc_skb(2 + ETH_HLEN + skb->len, GFP_KERNEL);
|
|
if (!nskb) {
|
|
s->stats.rx_dropped++;
|
|
kfree_skb(skb);
|
|
return -ENOMEM;
|
|
}
|
|
skb_reserve(nskb, 2);
|
|
|
|
/* Decompress header and construct ether frame */
|
|
switch (type & BNEP_TYPE_MASK) {
|
|
case BNEP_COMPRESSED:
|
|
memcpy(__skb_put(nskb, ETH_HLEN), &s->eh, ETH_HLEN);
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_SRC_ONLY:
|
|
memcpy(__skb_put(nskb, ETH_ALEN), s->eh.h_dest, ETH_ALEN);
|
|
memcpy(__skb_put(nskb, ETH_ALEN), skb_mac_header(skb), ETH_ALEN);
|
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2));
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_DST_ONLY:
|
|
memcpy(__skb_put(nskb, ETH_ALEN), skb_mac_header(skb),
|
|
ETH_ALEN);
|
|
memcpy(__skb_put(nskb, ETH_ALEN + 2), s->eh.h_source,
|
|
ETH_ALEN + 2);
|
|
break;
|
|
|
|
case BNEP_GENERAL:
|
|
memcpy(__skb_put(nskb, ETH_ALEN * 2), skb_mac_header(skb),
|
|
ETH_ALEN * 2);
|
|
put_unaligned(s->eh.h_proto, (__be16 *) __skb_put(nskb, 2));
|
|
break;
|
|
}
|
|
|
|
skb_copy_from_linear_data(skb, __skb_put(nskb, skb->len), skb->len);
|
|
kfree_skb(skb);
|
|
|
|
s->stats.rx_packets++;
|
|
nskb->ip_summed = CHECKSUM_NONE;
|
|
nskb->protocol = eth_type_trans(nskb, dev);
|
|
netif_rx_ni(nskb);
|
|
return 0;
|
|
|
|
badframe:
|
|
s->stats.rx_errors++;
|
|
kfree_skb(skb);
|
|
return 0;
|
|
}
|
|
|
|
static u8 __bnep_tx_types[] = {
|
|
BNEP_GENERAL,
|
|
BNEP_COMPRESSED_SRC_ONLY,
|
|
BNEP_COMPRESSED_DST_ONLY,
|
|
BNEP_COMPRESSED
|
|
};
|
|
|
|
static inline int bnep_tx_frame(struct bnep_session *s, struct sk_buff *skb)
|
|
{
|
|
struct ethhdr *eh = (void *) skb->data;
|
|
struct socket *sock = s->sock;
|
|
struct kvec iv[3];
|
|
int len = 0, il = 0;
|
|
u8 type = 0;
|
|
|
|
BT_DBG("skb %p dev %p type %d", skb, skb->dev, skb->pkt_type);
|
|
|
|
if (!skb->dev) {
|
|
/* Control frame sent by us */
|
|
goto send;
|
|
}
|
|
|
|
iv[il++] = (struct kvec) { &type, 1 };
|
|
len++;
|
|
|
|
if (!compare_ether_addr(eh->h_dest, s->eh.h_source))
|
|
type |= 0x01;
|
|
|
|
if (!compare_ether_addr(eh->h_source, s->eh.h_dest))
|
|
type |= 0x02;
|
|
|
|
if (type)
|
|
skb_pull(skb, ETH_ALEN * 2);
|
|
|
|
type = __bnep_tx_types[type];
|
|
switch (type) {
|
|
case BNEP_COMPRESSED_SRC_ONLY:
|
|
iv[il++] = (struct kvec) { eh->h_source, ETH_ALEN };
|
|
len += ETH_ALEN;
|
|
break;
|
|
|
|
case BNEP_COMPRESSED_DST_ONLY:
|
|
iv[il++] = (struct kvec) { eh->h_dest, ETH_ALEN };
|
|
len += ETH_ALEN;
|
|
break;
|
|
}
|
|
|
|
send:
|
|
iv[il++] = (struct kvec) { skb->data, skb->len };
|
|
len += skb->len;
|
|
|
|
/* FIXME: linearize skb */
|
|
{
|
|
len = kernel_sendmsg(sock, &s->msg, iv, il, len);
|
|
}
|
|
kfree_skb(skb);
|
|
|
|
if (len > 0) {
|
|
s->stats.tx_bytes += len;
|
|
s->stats.tx_packets++;
|
|
return 0;
|
|
}
|
|
|
|
return len;
|
|
}
|
|
|
|
static int bnep_session(void *arg)
|
|
{
|
|
struct bnep_session *s = arg;
|
|
struct net_device *dev = s->dev;
|
|
struct sock *sk = s->sock->sk;
|
|
struct sk_buff *skb;
|
|
wait_queue_t wait;
|
|
|
|
BT_DBG("");
|
|
|
|
daemonize("kbnepd %s", dev->name);
|
|
set_user_nice(current, -15);
|
|
|
|
init_waitqueue_entry(&wait, current);
|
|
add_wait_queue(sk->sk_sleep, &wait);
|
|
while (!atomic_read(&s->killed)) {
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
|
|
// RX
|
|
while ((skb = skb_dequeue(&sk->sk_receive_queue))) {
|
|
skb_orphan(skb);
|
|
bnep_rx_frame(s, skb);
|
|
}
|
|
|
|
if (sk->sk_state != BT_CONNECTED)
|
|
break;
|
|
|
|
// TX
|
|
while ((skb = skb_dequeue(&sk->sk_write_queue)))
|
|
if (bnep_tx_frame(s, skb))
|
|
break;
|
|
netif_wake_queue(dev);
|
|
|
|
schedule();
|
|
}
|
|
set_current_state(TASK_RUNNING);
|
|
remove_wait_queue(sk->sk_sleep, &wait);
|
|
|
|
/* Cleanup session */
|
|
down_write(&bnep_session_sem);
|
|
|
|
/* Delete network device */
|
|
unregister_netdev(dev);
|
|
|
|
/* Release the socket */
|
|
fput(s->sock->file);
|
|
|
|
__bnep_unlink_session(s);
|
|
|
|
up_write(&bnep_session_sem);
|
|
free_netdev(dev);
|
|
return 0;
|
|
}
|
|
|
|
static struct device *bnep_get_device(struct bnep_session *session)
|
|
{
|
|
bdaddr_t *src = &bt_sk(session->sock->sk)->src;
|
|
bdaddr_t *dst = &bt_sk(session->sock->sk)->dst;
|
|
struct hci_dev *hdev;
|
|
struct hci_conn *conn;
|
|
|
|
hdev = hci_get_route(dst, src);
|
|
if (!hdev)
|
|
return NULL;
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
|
|
|
|
hci_dev_put(hdev);
|
|
|
|
return conn ? &conn->dev : NULL;
|
|
}
|
|
|
|
int bnep_add_connection(struct bnep_connadd_req *req, struct socket *sock)
|
|
{
|
|
struct net_device *dev;
|
|
struct bnep_session *s, *ss;
|
|
u8 dst[ETH_ALEN], src[ETH_ALEN];
|
|
int err;
|
|
|
|
BT_DBG("");
|
|
|
|
baswap((void *) dst, &bt_sk(sock->sk)->dst);
|
|
baswap((void *) src, &bt_sk(sock->sk)->src);
|
|
|
|
/* session struct allocated as private part of net_device */
|
|
dev = alloc_netdev(sizeof(struct bnep_session),
|
|
(*req->device) ? req->device : "bnep%d",
|
|
bnep_net_setup);
|
|
if (!dev)
|
|
return -ENOMEM;
|
|
|
|
down_write(&bnep_session_sem);
|
|
|
|
ss = __bnep_get_session(dst);
|
|
if (ss && ss->state == BT_CONNECTED) {
|
|
err = -EEXIST;
|
|
goto failed;
|
|
}
|
|
|
|
s = dev->priv;
|
|
|
|
/* This is rx header therefore addresses are swapped.
|
|
* ie eh.h_dest is our local address. */
|
|
memcpy(s->eh.h_dest, &src, ETH_ALEN);
|
|
memcpy(s->eh.h_source, &dst, ETH_ALEN);
|
|
memcpy(dev->dev_addr, s->eh.h_dest, ETH_ALEN);
|
|
|
|
s->dev = dev;
|
|
s->sock = sock;
|
|
s->role = req->role;
|
|
s->state = BT_CONNECTED;
|
|
|
|
s->msg.msg_flags = MSG_NOSIGNAL;
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
/* Set default mc filter */
|
|
set_bit(bnep_mc_hash(dev->broadcast), (ulong *) &s->mc_filter);
|
|
#endif
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
/* Set default protocol filter */
|
|
bnep_set_default_proto_filter(s);
|
|
#endif
|
|
|
|
SET_NETDEV_DEV(dev, bnep_get_device(s));
|
|
|
|
err = register_netdev(dev);
|
|
if (err) {
|
|
goto failed;
|
|
}
|
|
|
|
__bnep_link_session(s);
|
|
|
|
err = kernel_thread(bnep_session, s, CLONE_KERNEL);
|
|
if (err < 0) {
|
|
/* Session thread start failed, gotta cleanup. */
|
|
unregister_netdev(dev);
|
|
__bnep_unlink_session(s);
|
|
goto failed;
|
|
}
|
|
|
|
up_write(&bnep_session_sem);
|
|
strcpy(req->device, dev->name);
|
|
return 0;
|
|
|
|
failed:
|
|
up_write(&bnep_session_sem);
|
|
free_netdev(dev);
|
|
return err;
|
|
}
|
|
|
|
int bnep_del_connection(struct bnep_conndel_req *req)
|
|
{
|
|
struct bnep_session *s;
|
|
int err = 0;
|
|
|
|
BT_DBG("");
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
s = __bnep_get_session(req->dst);
|
|
if (s) {
|
|
/* Wakeup user-space which is polling for socket errors.
|
|
* This is temporary hack untill we have shutdown in L2CAP */
|
|
s->sock->sk->sk_err = EUNATCH;
|
|
|
|
/* Kill session thread */
|
|
atomic_inc(&s->killed);
|
|
wake_up_interruptible(s->sock->sk->sk_sleep);
|
|
} else
|
|
err = -ENOENT;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
static void __bnep_copy_ci(struct bnep_conninfo *ci, struct bnep_session *s)
|
|
{
|
|
memcpy(ci->dst, s->eh.h_source, ETH_ALEN);
|
|
strcpy(ci->device, s->dev->name);
|
|
ci->flags = s->flags;
|
|
ci->state = s->state;
|
|
ci->role = s->role;
|
|
}
|
|
|
|
int bnep_get_connlist(struct bnep_connlist_req *req)
|
|
{
|
|
struct list_head *p;
|
|
int err = 0, n = 0;
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
list_for_each(p, &bnep_session_list) {
|
|
struct bnep_session *s;
|
|
struct bnep_conninfo ci;
|
|
|
|
s = list_entry(p, struct bnep_session, list);
|
|
|
|
__bnep_copy_ci(&ci, s);
|
|
|
|
if (copy_to_user(req->ci, &ci, sizeof(ci))) {
|
|
err = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if (++n >= req->cnum)
|
|
break;
|
|
|
|
req->ci++;
|
|
}
|
|
req->cnum = n;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
int bnep_get_conninfo(struct bnep_conninfo *ci)
|
|
{
|
|
struct bnep_session *s;
|
|
int err = 0;
|
|
|
|
down_read(&bnep_session_sem);
|
|
|
|
s = __bnep_get_session(ci->dst);
|
|
if (s)
|
|
__bnep_copy_ci(ci, s);
|
|
else
|
|
err = -ENOENT;
|
|
|
|
up_read(&bnep_session_sem);
|
|
return err;
|
|
}
|
|
|
|
static int __init bnep_init(void)
|
|
{
|
|
char flt[50] = "";
|
|
|
|
l2cap_load();
|
|
|
|
#ifdef CONFIG_BT_BNEP_PROTO_FILTER
|
|
strcat(flt, "protocol ");
|
|
#endif
|
|
|
|
#ifdef CONFIG_BT_BNEP_MC_FILTER
|
|
strcat(flt, "multicast");
|
|
#endif
|
|
|
|
BT_INFO("BNEP (Ethernet Emulation) ver %s", VERSION);
|
|
if (flt[0])
|
|
BT_INFO("BNEP filters: %s", flt);
|
|
|
|
bnep_sock_init();
|
|
return 0;
|
|
}
|
|
|
|
static void __exit bnep_exit(void)
|
|
{
|
|
bnep_sock_cleanup();
|
|
}
|
|
|
|
module_init(bnep_init);
|
|
module_exit(bnep_exit);
|
|
|
|
MODULE_AUTHOR("David Libault <david.libault@inventel.fr>, Maxim Krasnyansky <maxk@qualcomm.com>");
|
|
MODULE_DESCRIPTION("Bluetooth BNEP ver " VERSION);
|
|
MODULE_VERSION(VERSION);
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS("bt-proto-4");
|