xref: /linux/net/bluetooth/af_bluetooth.c (revision bd628c1bed7902ec1f24ba0fe70758949146abbe)
1 /*
2    BlueZ - Bluetooth protocol stack for Linux
3    Copyright (C) 2000-2001 Qualcomm Incorporated
4 
5    Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6 
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License version 2 as
9    published by the Free Software Foundation;
10 
11    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 
20    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22    SOFTWARE IS DISCLAIMED.
23 */
24 
25 /* Bluetooth address family and sockets. */
26 
27 #include <linux/module.h>
28 #include <linux/debugfs.h>
29 #include <linux/stringify.h>
30 #include <linux/sched/signal.h>
31 
32 #include <asm/ioctls.h>
33 
34 #include <net/bluetooth/bluetooth.h>
35 #include <linux/proc_fs.h>
36 
37 #include "leds.h"
38 #include "selftest.h"
39 
40 /* Bluetooth sockets */
41 #define BT_MAX_PROTO	8
42 static const struct net_proto_family *bt_proto[BT_MAX_PROTO];
43 static DEFINE_RWLOCK(bt_proto_lock);
44 
45 static struct lock_class_key bt_lock_key[BT_MAX_PROTO];
46 static const char *const bt_key_strings[BT_MAX_PROTO] = {
47 	"sk_lock-AF_BLUETOOTH-BTPROTO_L2CAP",
48 	"sk_lock-AF_BLUETOOTH-BTPROTO_HCI",
49 	"sk_lock-AF_BLUETOOTH-BTPROTO_SCO",
50 	"sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM",
51 	"sk_lock-AF_BLUETOOTH-BTPROTO_BNEP",
52 	"sk_lock-AF_BLUETOOTH-BTPROTO_CMTP",
53 	"sk_lock-AF_BLUETOOTH-BTPROTO_HIDP",
54 	"sk_lock-AF_BLUETOOTH-BTPROTO_AVDTP",
55 };
56 
57 static struct lock_class_key bt_slock_key[BT_MAX_PROTO];
58 static const char *const bt_slock_key_strings[BT_MAX_PROTO] = {
59 	"slock-AF_BLUETOOTH-BTPROTO_L2CAP",
60 	"slock-AF_BLUETOOTH-BTPROTO_HCI",
61 	"slock-AF_BLUETOOTH-BTPROTO_SCO",
62 	"slock-AF_BLUETOOTH-BTPROTO_RFCOMM",
63 	"slock-AF_BLUETOOTH-BTPROTO_BNEP",
64 	"slock-AF_BLUETOOTH-BTPROTO_CMTP",
65 	"slock-AF_BLUETOOTH-BTPROTO_HIDP",
66 	"slock-AF_BLUETOOTH-BTPROTO_AVDTP",
67 };
68 
69 void bt_sock_reclassify_lock(struct sock *sk, int proto)
70 {
71 	BUG_ON(!sk);
72 	BUG_ON(!sock_allow_reclassification(sk));
73 
74 	sock_lock_init_class_and_name(sk,
75 			bt_slock_key_strings[proto], &bt_slock_key[proto],
76 				bt_key_strings[proto], &bt_lock_key[proto]);
77 }
78 EXPORT_SYMBOL(bt_sock_reclassify_lock);
79 
80 int bt_sock_register(int proto, const struct net_proto_family *ops)
81 {
82 	int err = 0;
83 
84 	if (proto < 0 || proto >= BT_MAX_PROTO)
85 		return -EINVAL;
86 
87 	write_lock(&bt_proto_lock);
88 
89 	if (bt_proto[proto])
90 		err = -EEXIST;
91 	else
92 		bt_proto[proto] = ops;
93 
94 	write_unlock(&bt_proto_lock);
95 
96 	return err;
97 }
98 EXPORT_SYMBOL(bt_sock_register);
99 
100 void bt_sock_unregister(int proto)
101 {
102 	if (proto < 0 || proto >= BT_MAX_PROTO)
103 		return;
104 
105 	write_lock(&bt_proto_lock);
106 	bt_proto[proto] = NULL;
107 	write_unlock(&bt_proto_lock);
108 }
109 EXPORT_SYMBOL(bt_sock_unregister);
110 
111 static int bt_sock_create(struct net *net, struct socket *sock, int proto,
112 			  int kern)
113 {
114 	int err;
115 
116 	if (net != &init_net)
117 		return -EAFNOSUPPORT;
118 
119 	if (proto < 0 || proto >= BT_MAX_PROTO)
120 		return -EINVAL;
121 
122 	if (!bt_proto[proto])
123 		request_module("bt-proto-%d", proto);
124 
125 	err = -EPROTONOSUPPORT;
126 
127 	read_lock(&bt_proto_lock);
128 
129 	if (bt_proto[proto] && try_module_get(bt_proto[proto]->owner)) {
130 		err = bt_proto[proto]->create(net, sock, proto, kern);
131 		if (!err)
132 			bt_sock_reclassify_lock(sock->sk, proto);
133 		module_put(bt_proto[proto]->owner);
134 	}
135 
136 	read_unlock(&bt_proto_lock);
137 
138 	return err;
139 }
140 
141 void bt_sock_link(struct bt_sock_list *l, struct sock *sk)
142 {
143 	write_lock(&l->lock);
144 	sk_add_node(sk, &l->head);
145 	write_unlock(&l->lock);
146 }
147 EXPORT_SYMBOL(bt_sock_link);
148 
149 void bt_sock_unlink(struct bt_sock_list *l, struct sock *sk)
150 {
151 	write_lock(&l->lock);
152 	sk_del_node_init(sk);
153 	write_unlock(&l->lock);
154 }
155 EXPORT_SYMBOL(bt_sock_unlink);
156 
157 void bt_accept_enqueue(struct sock *parent, struct sock *sk)
158 {
159 	BT_DBG("parent %p, sk %p", parent, sk);
160 
161 	sock_hold(sk);
162 	lock_sock_nested(sk, SINGLE_DEPTH_NESTING);
163 	list_add_tail(&bt_sk(sk)->accept_q, &bt_sk(parent)->accept_q);
164 	bt_sk(sk)->parent = parent;
165 	release_sock(sk);
166 	parent->sk_ack_backlog++;
167 }
168 EXPORT_SYMBOL(bt_accept_enqueue);
169 
170 /* Calling function must hold the sk lock.
171  * bt_sk(sk)->parent must be non-NULL meaning sk is in the parent list.
172  */
173 void bt_accept_unlink(struct sock *sk)
174 {
175 	BT_DBG("sk %p state %d", sk, sk->sk_state);
176 
177 	list_del_init(&bt_sk(sk)->accept_q);
178 	bt_sk(sk)->parent->sk_ack_backlog--;
179 	bt_sk(sk)->parent = NULL;
180 	sock_put(sk);
181 }
182 EXPORT_SYMBOL(bt_accept_unlink);
183 
184 struct sock *bt_accept_dequeue(struct sock *parent, struct socket *newsock)
185 {
186 	struct bt_sock *s, *n;
187 	struct sock *sk;
188 
189 	BT_DBG("parent %p", parent);
190 
191 restart:
192 	list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
193 		sk = (struct sock *)s;
194 
195 		/* Prevent early freeing of sk due to unlink and sock_kill */
196 		sock_hold(sk);
197 		lock_sock(sk);
198 
199 		/* Check sk has not already been unlinked via
200 		 * bt_accept_unlink() due to serialisation caused by sk locking
201 		 */
202 		if (!bt_sk(sk)->parent) {
203 			BT_DBG("sk %p, already unlinked", sk);
204 			release_sock(sk);
205 			sock_put(sk);
206 
207 			/* Restart the loop as sk is no longer in the list
208 			 * and also avoid a potential infinite loop because
209 			 * list_for_each_entry_safe() is not thread safe.
210 			 */
211 			goto restart;
212 		}
213 
214 		/* sk is safely in the parent list so reduce reference count */
215 		sock_put(sk);
216 
217 		/* FIXME: Is this check still needed */
218 		if (sk->sk_state == BT_CLOSED) {
219 			bt_accept_unlink(sk);
220 			release_sock(sk);
221 			continue;
222 		}
223 
224 		if (sk->sk_state == BT_CONNECTED || !newsock ||
225 		    test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags)) {
226 			bt_accept_unlink(sk);
227 			if (newsock)
228 				sock_graft(sk, newsock);
229 
230 			release_sock(sk);
231 			return sk;
232 		}
233 
234 		release_sock(sk);
235 	}
236 
237 	return NULL;
238 }
239 EXPORT_SYMBOL(bt_accept_dequeue);
240 
241 int bt_sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t len,
242 		    int flags)
243 {
244 	int noblock = flags & MSG_DONTWAIT;
245 	struct sock *sk = sock->sk;
246 	struct sk_buff *skb;
247 	size_t copied;
248 	size_t skblen;
249 	int err;
250 
251 	BT_DBG("sock %p sk %p len %zu", sock, sk, len);
252 
253 	if (flags & MSG_OOB)
254 		return -EOPNOTSUPP;
255 
256 	skb = skb_recv_datagram(sk, flags, noblock, &err);
257 	if (!skb) {
258 		if (sk->sk_shutdown & RCV_SHUTDOWN)
259 			return 0;
260 
261 		return err;
262 	}
263 
264 	skblen = skb->len;
265 	copied = skb->len;
266 	if (len < copied) {
267 		msg->msg_flags |= MSG_TRUNC;
268 		copied = len;
269 	}
270 
271 	skb_reset_transport_header(skb);
272 	err = skb_copy_datagram_msg(skb, 0, msg, copied);
273 	if (err == 0) {
274 		sock_recv_ts_and_drops(msg, sk, skb);
275 
276 		if (msg->msg_name && bt_sk(sk)->skb_msg_name)
277 			bt_sk(sk)->skb_msg_name(skb, msg->msg_name,
278 						&msg->msg_namelen);
279 	}
280 
281 	skb_free_datagram(sk, skb);
282 
283 	if (flags & MSG_TRUNC)
284 		copied = skblen;
285 
286 	return err ? : copied;
287 }
288 EXPORT_SYMBOL(bt_sock_recvmsg);
289 
290 static long bt_sock_data_wait(struct sock *sk, long timeo)
291 {
292 	DECLARE_WAITQUEUE(wait, current);
293 
294 	add_wait_queue(sk_sleep(sk), &wait);
295 	for (;;) {
296 		set_current_state(TASK_INTERRUPTIBLE);
297 
298 		if (!skb_queue_empty(&sk->sk_receive_queue))
299 			break;
300 
301 		if (sk->sk_err || (sk->sk_shutdown & RCV_SHUTDOWN))
302 			break;
303 
304 		if (signal_pending(current) || !timeo)
305 			break;
306 
307 		sk_set_bit(SOCKWQ_ASYNC_WAITDATA, sk);
308 		release_sock(sk);
309 		timeo = schedule_timeout(timeo);
310 		lock_sock(sk);
311 		sk_clear_bit(SOCKWQ_ASYNC_WAITDATA, sk);
312 	}
313 
314 	__set_current_state(TASK_RUNNING);
315 	remove_wait_queue(sk_sleep(sk), &wait);
316 	return timeo;
317 }
318 
319 int bt_sock_stream_recvmsg(struct socket *sock, struct msghdr *msg,
320 			   size_t size, int flags)
321 {
322 	struct sock *sk = sock->sk;
323 	int err = 0;
324 	size_t target, copied = 0;
325 	long timeo;
326 
327 	if (flags & MSG_OOB)
328 		return -EOPNOTSUPP;
329 
330 	BT_DBG("sk %p size %zu", sk, size);
331 
332 	lock_sock(sk);
333 
334 	target = sock_rcvlowat(sk, flags & MSG_WAITALL, size);
335 	timeo  = sock_rcvtimeo(sk, flags & MSG_DONTWAIT);
336 
337 	do {
338 		struct sk_buff *skb;
339 		int chunk;
340 
341 		skb = skb_dequeue(&sk->sk_receive_queue);
342 		if (!skb) {
343 			if (copied >= target)
344 				break;
345 
346 			err = sock_error(sk);
347 			if (err)
348 				break;
349 			if (sk->sk_shutdown & RCV_SHUTDOWN)
350 				break;
351 
352 			err = -EAGAIN;
353 			if (!timeo)
354 				break;
355 
356 			timeo = bt_sock_data_wait(sk, timeo);
357 
358 			if (signal_pending(current)) {
359 				err = sock_intr_errno(timeo);
360 				goto out;
361 			}
362 			continue;
363 		}
364 
365 		chunk = min_t(unsigned int, skb->len, size);
366 		if (skb_copy_datagram_msg(skb, 0, msg, chunk)) {
367 			skb_queue_head(&sk->sk_receive_queue, skb);
368 			if (!copied)
369 				copied = -EFAULT;
370 			break;
371 		}
372 		copied += chunk;
373 		size   -= chunk;
374 
375 		sock_recv_ts_and_drops(msg, sk, skb);
376 
377 		if (!(flags & MSG_PEEK)) {
378 			int skb_len = skb_headlen(skb);
379 
380 			if (chunk <= skb_len) {
381 				__skb_pull(skb, chunk);
382 			} else {
383 				struct sk_buff *frag;
384 
385 				__skb_pull(skb, skb_len);
386 				chunk -= skb_len;
387 
388 				skb_walk_frags(skb, frag) {
389 					if (chunk <= frag->len) {
390 						/* Pulling partial data */
391 						skb->len -= chunk;
392 						skb->data_len -= chunk;
393 						__skb_pull(frag, chunk);
394 						break;
395 					} else if (frag->len) {
396 						/* Pulling all frag data */
397 						chunk -= frag->len;
398 						skb->len -= frag->len;
399 						skb->data_len -= frag->len;
400 						__skb_pull(frag, frag->len);
401 					}
402 				}
403 			}
404 
405 			if (skb->len) {
406 				skb_queue_head(&sk->sk_receive_queue, skb);
407 				break;
408 			}
409 			kfree_skb(skb);
410 
411 		} else {
412 			/* put message back and return */
413 			skb_queue_head(&sk->sk_receive_queue, skb);
414 			break;
415 		}
416 	} while (size);
417 
418 out:
419 	release_sock(sk);
420 	return copied ? : err;
421 }
422 EXPORT_SYMBOL(bt_sock_stream_recvmsg);
423 
424 static inline __poll_t bt_accept_poll(struct sock *parent)
425 {
426 	struct bt_sock *s, *n;
427 	struct sock *sk;
428 
429 	list_for_each_entry_safe(s, n, &bt_sk(parent)->accept_q, accept_q) {
430 		sk = (struct sock *)s;
431 		if (sk->sk_state == BT_CONNECTED ||
432 		    (test_bit(BT_SK_DEFER_SETUP, &bt_sk(parent)->flags) &&
433 		     sk->sk_state == BT_CONNECT2))
434 			return EPOLLIN | EPOLLRDNORM;
435 	}
436 
437 	return 0;
438 }
439 
440 __poll_t bt_sock_poll(struct file *file, struct socket *sock,
441 			  poll_table *wait)
442 {
443 	struct sock *sk = sock->sk;
444 	__poll_t mask = 0;
445 
446 	BT_DBG("sock %p, sk %p", sock, sk);
447 
448 	poll_wait(file, sk_sleep(sk), wait);
449 
450 	if (sk->sk_state == BT_LISTEN)
451 		return bt_accept_poll(sk);
452 
453 	if (sk->sk_err || !skb_queue_empty(&sk->sk_error_queue))
454 		mask |= EPOLLERR |
455 			(sock_flag(sk, SOCK_SELECT_ERR_QUEUE) ? EPOLLPRI : 0);
456 
457 	if (sk->sk_shutdown & RCV_SHUTDOWN)
458 		mask |= EPOLLRDHUP | EPOLLIN | EPOLLRDNORM;
459 
460 	if (sk->sk_shutdown == SHUTDOWN_MASK)
461 		mask |= EPOLLHUP;
462 
463 	if (!skb_queue_empty(&sk->sk_receive_queue))
464 		mask |= EPOLLIN | EPOLLRDNORM;
465 
466 	if (sk->sk_state == BT_CLOSED)
467 		mask |= EPOLLHUP;
468 
469 	if (sk->sk_state == BT_CONNECT ||
470 			sk->sk_state == BT_CONNECT2 ||
471 			sk->sk_state == BT_CONFIG)
472 		return mask;
473 
474 	if (!test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags) && sock_writeable(sk))
475 		mask |= EPOLLOUT | EPOLLWRNORM | EPOLLWRBAND;
476 	else
477 		sk_set_bit(SOCKWQ_ASYNC_NOSPACE, sk);
478 
479 	return mask;
480 }
481 EXPORT_SYMBOL(bt_sock_poll);
482 
483 int bt_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
484 {
485 	struct sock *sk = sock->sk;
486 	struct sk_buff *skb;
487 	long amount;
488 	int err;
489 
490 	BT_DBG("sk %p cmd %x arg %lx", sk, cmd, arg);
491 
492 	switch (cmd) {
493 	case TIOCOUTQ:
494 		if (sk->sk_state == BT_LISTEN)
495 			return -EINVAL;
496 
497 		amount = sk->sk_sndbuf - sk_wmem_alloc_get(sk);
498 		if (amount < 0)
499 			amount = 0;
500 		err = put_user(amount, (int __user *) arg);
501 		break;
502 
503 	case TIOCINQ:
504 		if (sk->sk_state == BT_LISTEN)
505 			return -EINVAL;
506 
507 		lock_sock(sk);
508 		skb = skb_peek(&sk->sk_receive_queue);
509 		amount = skb ? skb->len : 0;
510 		release_sock(sk);
511 		err = put_user(amount, (int __user *) arg);
512 		break;
513 
514 	case SIOCGSTAMP:
515 		err = sock_get_timestamp(sk, (struct timeval __user *) arg);
516 		break;
517 
518 	case SIOCGSTAMPNS:
519 		err = sock_get_timestampns(sk, (struct timespec __user *) arg);
520 		break;
521 
522 	default:
523 		err = -ENOIOCTLCMD;
524 		break;
525 	}
526 
527 	return err;
528 }
529 EXPORT_SYMBOL(bt_sock_ioctl);
530 
531 /* This function expects the sk lock to be held when called */
532 int bt_sock_wait_state(struct sock *sk, int state, unsigned long timeo)
533 {
534 	DECLARE_WAITQUEUE(wait, current);
535 	int err = 0;
536 
537 	BT_DBG("sk %p", sk);
538 
539 	add_wait_queue(sk_sleep(sk), &wait);
540 	set_current_state(TASK_INTERRUPTIBLE);
541 	while (sk->sk_state != state) {
542 		if (!timeo) {
543 			err = -EINPROGRESS;
544 			break;
545 		}
546 
547 		if (signal_pending(current)) {
548 			err = sock_intr_errno(timeo);
549 			break;
550 		}
551 
552 		release_sock(sk);
553 		timeo = schedule_timeout(timeo);
554 		lock_sock(sk);
555 		set_current_state(TASK_INTERRUPTIBLE);
556 
557 		err = sock_error(sk);
558 		if (err)
559 			break;
560 	}
561 	__set_current_state(TASK_RUNNING);
562 	remove_wait_queue(sk_sleep(sk), &wait);
563 	return err;
564 }
565 EXPORT_SYMBOL(bt_sock_wait_state);
566 
567 /* This function expects the sk lock to be held when called */
568 int bt_sock_wait_ready(struct sock *sk, unsigned long flags)
569 {
570 	DECLARE_WAITQUEUE(wait, current);
571 	unsigned long timeo;
572 	int err = 0;
573 
574 	BT_DBG("sk %p", sk);
575 
576 	timeo = sock_sndtimeo(sk, flags & O_NONBLOCK);
577 
578 	add_wait_queue(sk_sleep(sk), &wait);
579 	set_current_state(TASK_INTERRUPTIBLE);
580 	while (test_bit(BT_SK_SUSPEND, &bt_sk(sk)->flags)) {
581 		if (!timeo) {
582 			err = -EAGAIN;
583 			break;
584 		}
585 
586 		if (signal_pending(current)) {
587 			err = sock_intr_errno(timeo);
588 			break;
589 		}
590 
591 		release_sock(sk);
592 		timeo = schedule_timeout(timeo);
593 		lock_sock(sk);
594 		set_current_state(TASK_INTERRUPTIBLE);
595 
596 		err = sock_error(sk);
597 		if (err)
598 			break;
599 	}
600 	__set_current_state(TASK_RUNNING);
601 	remove_wait_queue(sk_sleep(sk), &wait);
602 
603 	return err;
604 }
605 EXPORT_SYMBOL(bt_sock_wait_ready);
606 
607 #ifdef CONFIG_PROC_FS
608 static void *bt_seq_start(struct seq_file *seq, loff_t *pos)
609 	__acquires(seq->private->l->lock)
610 {
611 	struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
612 
613 	read_lock(&l->lock);
614 	return seq_hlist_start_head(&l->head, *pos);
615 }
616 
617 static void *bt_seq_next(struct seq_file *seq, void *v, loff_t *pos)
618 {
619 	struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
620 
621 	return seq_hlist_next(v, &l->head, pos);
622 }
623 
624 static void bt_seq_stop(struct seq_file *seq, void *v)
625 	__releases(seq->private->l->lock)
626 {
627 	struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
628 
629 	read_unlock(&l->lock);
630 }
631 
632 static int bt_seq_show(struct seq_file *seq, void *v)
633 {
634 	struct bt_sock_list *l = PDE_DATA(file_inode(seq->file));
635 
636 	if (v == SEQ_START_TOKEN) {
637 		seq_puts(seq ,"sk               RefCnt Rmem   Wmem   User   Inode  Parent");
638 
639 		if (l->custom_seq_show) {
640 			seq_putc(seq, ' ');
641 			l->custom_seq_show(seq, v);
642 		}
643 
644 		seq_putc(seq, '\n');
645 	} else {
646 		struct sock *sk = sk_entry(v);
647 		struct bt_sock *bt = bt_sk(sk);
648 
649 		seq_printf(seq,
650 			   "%pK %-6d %-6u %-6u %-6u %-6lu %-6lu",
651 			   sk,
652 			   refcount_read(&sk->sk_refcnt),
653 			   sk_rmem_alloc_get(sk),
654 			   sk_wmem_alloc_get(sk),
655 			   from_kuid(seq_user_ns(seq), sock_i_uid(sk)),
656 			   sock_i_ino(sk),
657 			   bt->parent? sock_i_ino(bt->parent): 0LU);
658 
659 		if (l->custom_seq_show) {
660 			seq_putc(seq, ' ');
661 			l->custom_seq_show(seq, v);
662 		}
663 
664 		seq_putc(seq, '\n');
665 	}
666 	return 0;
667 }
668 
669 static const struct seq_operations bt_seq_ops = {
670 	.start = bt_seq_start,
671 	.next  = bt_seq_next,
672 	.stop  = bt_seq_stop,
673 	.show  = bt_seq_show,
674 };
675 
676 int bt_procfs_init(struct net *net, const char *name,
677 		   struct bt_sock_list *sk_list,
678 		   int (* seq_show)(struct seq_file *, void *))
679 {
680 	sk_list->custom_seq_show = seq_show;
681 
682 	if (!proc_create_seq_data(name, 0, net->proc_net, &bt_seq_ops, sk_list))
683 		return -ENOMEM;
684 	return 0;
685 }
686 
687 void bt_procfs_cleanup(struct net *net, const char *name)
688 {
689 	remove_proc_entry(name, net->proc_net);
690 }
691 #else
692 int bt_procfs_init(struct net *net, const char *name,
693 		   struct bt_sock_list *sk_list,
694 		   int (* seq_show)(struct seq_file *, void *))
695 {
696 	return 0;
697 }
698 
699 void bt_procfs_cleanup(struct net *net, const char *name)
700 {
701 }
702 #endif
703 EXPORT_SYMBOL(bt_procfs_init);
704 EXPORT_SYMBOL(bt_procfs_cleanup);
705 
706 static const struct net_proto_family bt_sock_family_ops = {
707 	.owner	= THIS_MODULE,
708 	.family	= PF_BLUETOOTH,
709 	.create	= bt_sock_create,
710 };
711 
712 struct dentry *bt_debugfs;
713 EXPORT_SYMBOL_GPL(bt_debugfs);
714 
715 #define VERSION __stringify(BT_SUBSYS_VERSION) "." \
716 		__stringify(BT_SUBSYS_REVISION)
717 
718 static int __init bt_init(void)
719 {
720 	int err;
721 
722 	sock_skb_cb_check_size(sizeof(struct bt_skb_cb));
723 
724 	BT_INFO("Core ver %s", VERSION);
725 
726 	err = bt_selftest();
727 	if (err < 0)
728 		return err;
729 
730 	bt_debugfs = debugfs_create_dir("bluetooth", NULL);
731 
732 	bt_leds_init();
733 
734 	err = bt_sysfs_init();
735 	if (err < 0)
736 		return err;
737 
738 	err = sock_register(&bt_sock_family_ops);
739 	if (err)
740 		goto cleanup_sysfs;
741 
742 	BT_INFO("HCI device and connection manager initialized");
743 
744 	err = hci_sock_init();
745 	if (err)
746 		goto unregister_socket;
747 
748 	err = l2cap_init();
749 	if (err)
750 		goto cleanup_socket;
751 
752 	err = sco_init();
753 	if (err)
754 		goto cleanup_cap;
755 
756 	err = mgmt_init();
757 	if (err)
758 		goto cleanup_sco;
759 
760 	return 0;
761 
762 cleanup_sco:
763 	sco_exit();
764 cleanup_cap:
765 	l2cap_exit();
766 cleanup_socket:
767 	hci_sock_cleanup();
768 unregister_socket:
769 	sock_unregister(PF_BLUETOOTH);
770 cleanup_sysfs:
771 	bt_sysfs_cleanup();
772 	return err;
773 }
774 
775 static void __exit bt_exit(void)
776 {
777 	mgmt_exit();
778 
779 	sco_exit();
780 
781 	l2cap_exit();
782 
783 	hci_sock_cleanup();
784 
785 	sock_unregister(PF_BLUETOOTH);
786 
787 	bt_sysfs_cleanup();
788 
789 	bt_leds_cleanup();
790 
791 	debugfs_remove_recursive(bt_debugfs);
792 }
793 
794 subsys_initcall(bt_init);
795 module_exit(bt_exit);
796 
797 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
798 MODULE_DESCRIPTION("Bluetooth Core ver " VERSION);
799 MODULE_VERSION(VERSION);
800 MODULE_LICENSE("GPL");
801 MODULE_ALIAS_NETPROTO(PF_BLUETOOTH);
802