Adding support for MOXA ART SoC. Testing port of linux-2.6.32.60-moxart.
[linux-3.6.7-moxart.git] / net / bluetooth / hidp / core.c
blobccd985da65180656d7df83a986655c4b82258220
1 /*
2 HIDP implementation for Linux Bluetooth stack (BlueZ).
3 Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
23 #include <linux/module.h>
24 #include <linux/file.h>
25 #include <linux/kthread.h>
26 #include <linux/hidraw.h>
28 #include <net/bluetooth/bluetooth.h>
29 #include <net/bluetooth/hci_core.h>
30 #include <net/bluetooth/l2cap.h>
32 #include "hidp.h"
34 #define VERSION "1.2"
36 static DECLARE_RWSEM(hidp_session_sem);
37 static LIST_HEAD(hidp_session_list);
39 static unsigned char hidp_keycode[256] = {
40 0, 0, 0, 0, 30, 48, 46, 32, 18, 33, 34, 35, 23, 36,
41 37, 38, 50, 49, 24, 25, 16, 19, 31, 20, 22, 47, 17, 45,
42 21, 44, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 28, 1,
43 14, 15, 57, 12, 13, 26, 27, 43, 43, 39, 40, 41, 51, 52,
44 53, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 87, 88,
45 99, 70, 119, 110, 102, 104, 111, 107, 109, 106, 105, 108, 103, 69,
46 98, 55, 74, 78, 96, 79, 80, 81, 75, 76, 77, 71, 72, 73,
47 82, 83, 86, 127, 116, 117, 183, 184, 185, 186, 187, 188, 189, 190,
48 191, 192, 193, 194, 134, 138, 130, 132, 128, 129, 131, 137, 133, 135,
49 136, 113, 115, 114, 0, 0, 0, 121, 0, 89, 93, 124, 92, 94,
50 95, 0, 0, 0, 122, 123, 90, 91, 85, 0, 0, 0, 0, 0,
51 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
52 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
53 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
54 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
55 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
56 29, 42, 56, 125, 97, 54, 100, 126, 164, 166, 165, 163, 161, 115,
57 114, 113, 150, 158, 159, 128, 136, 177, 178, 176, 142, 152, 173, 140
60 static unsigned char hidp_mkeyspat[] = { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 };
62 static struct hidp_session *__hidp_get_session(bdaddr_t *bdaddr)
64 struct hidp_session *session;
66 BT_DBG("");
68 list_for_each_entry(session, &hidp_session_list, list) {
69 if (!bacmp(bdaddr, &session->bdaddr))
70 return session;
73 return NULL;
76 static void __hidp_link_session(struct hidp_session *session)
78 list_add(&session->list, &hidp_session_list);
81 static void __hidp_unlink_session(struct hidp_session *session)
83 hci_conn_put_device(session->conn);
85 list_del(&session->list);
88 static void __hidp_copy_session(struct hidp_session *session, struct hidp_conninfo *ci)
90 memset(ci, 0, sizeof(*ci));
91 bacpy(&ci->bdaddr, &session->bdaddr);
93 ci->flags = session->flags;
94 ci->state = session->state;
96 ci->vendor = 0x0000;
97 ci->product = 0x0000;
98 ci->version = 0x0000;
100 if (session->input) {
101 ci->vendor = session->input->id.vendor;
102 ci->product = session->input->id.product;
103 ci->version = session->input->id.version;
104 if (session->input->name)
105 strncpy(ci->name, session->input->name, 128);
106 else
107 strncpy(ci->name, "HID Boot Device", 128);
110 if (session->hid) {
111 ci->vendor = session->hid->vendor;
112 ci->product = session->hid->product;
113 ci->version = session->hid->version;
114 strncpy(ci->name, session->hid->name, 128);
118 static int hidp_queue_event(struct hidp_session *session, struct input_dev *dev,
119 unsigned int type, unsigned int code, int value)
121 unsigned char newleds;
122 struct sk_buff *skb;
124 BT_DBG("session %p type %d code %d value %d", session, type, code, value);
126 if (type != EV_LED)
127 return -1;
129 newleds = (!!test_bit(LED_KANA, dev->led) << 3) |
130 (!!test_bit(LED_COMPOSE, dev->led) << 3) |
131 (!!test_bit(LED_SCROLLL, dev->led) << 2) |
132 (!!test_bit(LED_CAPSL, dev->led) << 1) |
133 (!!test_bit(LED_NUML, dev->led));
135 if (session->leds == newleds)
136 return 0;
138 session->leds = newleds;
140 skb = alloc_skb(3, GFP_ATOMIC);
141 if (!skb) {
142 BT_ERR("Can't allocate memory for new frame");
143 return -ENOMEM;
146 *skb_put(skb, 1) = HIDP_TRANS_DATA | HIDP_DATA_RTYPE_OUPUT;
147 *skb_put(skb, 1) = 0x01;
148 *skb_put(skb, 1) = newleds;
150 skb_queue_tail(&session->intr_transmit, skb);
152 hidp_schedule(session);
154 return 0;
157 static int hidp_hidinput_event(struct input_dev *dev, unsigned int type, unsigned int code, int value)
159 struct hid_device *hid = input_get_drvdata(dev);
160 struct hidp_session *session = hid->driver_data;
162 return hidp_queue_event(session, dev, type, code, value);
165 static int hidp_input_event(struct input_dev *dev, unsigned int type, unsigned int code, int value)
167 struct hidp_session *session = input_get_drvdata(dev);
169 return hidp_queue_event(session, dev, type, code, value);
172 static void hidp_input_report(struct hidp_session *session, struct sk_buff *skb)
174 struct input_dev *dev = session->input;
175 unsigned char *keys = session->keys;
176 unsigned char *udata = skb->data + 1;
177 signed char *sdata = skb->data + 1;
178 int i, size = skb->len - 1;
180 switch (skb->data[0]) {
181 case 0x01: /* Keyboard report */
182 for (i = 0; i < 8; i++)
183 input_report_key(dev, hidp_keycode[i + 224], (udata[0] >> i) & 1);
185 /* If all the key codes have been set to 0x01, it means
186 * too many keys were pressed at the same time. */
187 if (!memcmp(udata + 2, hidp_mkeyspat, 6))
188 break;
190 for (i = 2; i < 8; i++) {
191 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) {
192 if (hidp_keycode[keys[i]])
193 input_report_key(dev, hidp_keycode[keys[i]], 0);
194 else
195 BT_ERR("Unknown key (scancode %#x) released.", keys[i]);
198 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) {
199 if (hidp_keycode[udata[i]])
200 input_report_key(dev, hidp_keycode[udata[i]], 1);
201 else
202 BT_ERR("Unknown key (scancode %#x) pressed.", udata[i]);
206 memcpy(keys, udata, 8);
207 break;
209 case 0x02: /* Mouse report */
210 input_report_key(dev, BTN_LEFT, sdata[0] & 0x01);
211 input_report_key(dev, BTN_RIGHT, sdata[0] & 0x02);
212 input_report_key(dev, BTN_MIDDLE, sdata[0] & 0x04);
213 input_report_key(dev, BTN_SIDE, sdata[0] & 0x08);
214 input_report_key(dev, BTN_EXTRA, sdata[0] & 0x10);
216 input_report_rel(dev, REL_X, sdata[1]);
217 input_report_rel(dev, REL_Y, sdata[2]);
219 if (size > 3)
220 input_report_rel(dev, REL_WHEEL, sdata[3]);
221 break;
224 input_sync(dev);
227 static int __hidp_send_ctrl_message(struct hidp_session *session,
228 unsigned char hdr, unsigned char *data,
229 int size)
231 struct sk_buff *skb;
233 BT_DBG("session %p data %p size %d", session, data, size);
235 if (atomic_read(&session->terminate))
236 return -EIO;
238 skb = alloc_skb(size + 1, GFP_ATOMIC);
239 if (!skb) {
240 BT_ERR("Can't allocate memory for new frame");
241 return -ENOMEM;
244 *skb_put(skb, 1) = hdr;
245 if (data && size > 0)
246 memcpy(skb_put(skb, size), data, size);
248 skb_queue_tail(&session->ctrl_transmit, skb);
250 return 0;
253 static int hidp_send_ctrl_message(struct hidp_session *session,
254 unsigned char hdr, unsigned char *data, int size)
256 int err;
258 err = __hidp_send_ctrl_message(session, hdr, data, size);
260 hidp_schedule(session);
262 return err;
265 static int hidp_queue_report(struct hidp_session *session,
266 unsigned char *data, int size)
268 struct sk_buff *skb;
270 BT_DBG("session %p hid %p data %p size %d", session, session->hid, data, size);
272 skb = alloc_skb(size + 1, GFP_ATOMIC);
273 if (!skb) {
274 BT_ERR("Can't allocate memory for new frame");
275 return -ENOMEM;
278 *skb_put(skb, 1) = 0xa2;
279 if (size > 0)
280 memcpy(skb_put(skb, size), data, size);
282 skb_queue_tail(&session->intr_transmit, skb);
284 hidp_schedule(session);
286 return 0;
289 static int hidp_send_report(struct hidp_session *session, struct hid_report *report)
291 unsigned char buf[32];
292 int rsize;
294 rsize = ((report->size - 1) >> 3) + 1 + (report->id > 0);
295 if (rsize > sizeof(buf))
296 return -EIO;
298 hid_output_report(report, buf);
300 return hidp_queue_report(session, buf, rsize);
303 static int hidp_get_raw_report(struct hid_device *hid,
304 unsigned char report_number,
305 unsigned char *data, size_t count,
306 unsigned char report_type)
308 struct hidp_session *session = hid->driver_data;
309 struct sk_buff *skb;
310 size_t len;
311 int numbered_reports = hid->report_enum[report_type].numbered;
312 int ret;
314 switch (report_type) {
315 case HID_FEATURE_REPORT:
316 report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_FEATURE;
317 break;
318 case HID_INPUT_REPORT:
319 report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_INPUT;
320 break;
321 case HID_OUTPUT_REPORT:
322 report_type = HIDP_TRANS_GET_REPORT | HIDP_DATA_RTYPE_OUPUT;
323 break;
324 default:
325 return -EINVAL;
328 if (mutex_lock_interruptible(&session->report_mutex))
329 return -ERESTARTSYS;
331 /* Set up our wait, and send the report request to the device. */
332 session->waiting_report_type = report_type & HIDP_DATA_RTYPE_MASK;
333 session->waiting_report_number = numbered_reports ? report_number : -1;
334 set_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
335 data[0] = report_number;
336 ret = hidp_send_ctrl_message(hid->driver_data, report_type, data, 1);
337 if (ret)
338 goto err;
340 /* Wait for the return of the report. The returned report
341 gets put in session->report_return. */
342 while (test_bit(HIDP_WAITING_FOR_RETURN, &session->flags)) {
343 int res;
345 res = wait_event_interruptible_timeout(session->report_queue,
346 !test_bit(HIDP_WAITING_FOR_RETURN, &session->flags),
347 5*HZ);
348 if (res == 0) {
349 /* timeout */
350 ret = -EIO;
351 goto err;
353 if (res < 0) {
354 /* signal */
355 ret = -ERESTARTSYS;
356 goto err;
360 skb = session->report_return;
361 if (skb) {
362 len = skb->len < count ? skb->len : count;
363 memcpy(data, skb->data, len);
365 kfree_skb(skb);
366 session->report_return = NULL;
367 } else {
368 /* Device returned a HANDSHAKE, indicating protocol error. */
369 len = -EIO;
372 clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
373 mutex_unlock(&session->report_mutex);
375 return len;
377 err:
378 clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
379 mutex_unlock(&session->report_mutex);
380 return ret;
383 static int hidp_output_raw_report(struct hid_device *hid, unsigned char *data, size_t count,
384 unsigned char report_type)
386 struct hidp_session *session = hid->driver_data;
387 int ret;
389 switch (report_type) {
390 case HID_FEATURE_REPORT:
391 report_type = HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_FEATURE;
392 break;
393 case HID_OUTPUT_REPORT:
394 report_type = HIDP_TRANS_SET_REPORT | HIDP_DATA_RTYPE_OUPUT;
395 break;
396 default:
397 return -EINVAL;
400 if (mutex_lock_interruptible(&session->report_mutex))
401 return -ERESTARTSYS;
403 /* Set up our wait, and send the report request to the device. */
404 set_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags);
405 ret = hidp_send_ctrl_message(hid->driver_data, report_type, data,
406 count);
407 if (ret)
408 goto err;
410 /* Wait for the ACK from the device. */
411 while (test_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags)) {
412 int res;
414 res = wait_event_interruptible_timeout(session->report_queue,
415 !test_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags),
416 10*HZ);
417 if (res == 0) {
418 /* timeout */
419 ret = -EIO;
420 goto err;
422 if (res < 0) {
423 /* signal */
424 ret = -ERESTARTSYS;
425 goto err;
429 if (!session->output_report_success) {
430 ret = -EIO;
431 goto err;
434 ret = count;
436 err:
437 clear_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags);
438 mutex_unlock(&session->report_mutex);
439 return ret;
442 static void hidp_idle_timeout(unsigned long arg)
444 struct hidp_session *session = (struct hidp_session *) arg;
446 atomic_inc(&session->terminate);
447 wake_up_process(session->task);
450 static void hidp_set_timer(struct hidp_session *session)
452 if (session->idle_to > 0)
453 mod_timer(&session->timer, jiffies + HZ * session->idle_to);
456 static void hidp_del_timer(struct hidp_session *session)
458 if (session->idle_to > 0)
459 del_timer(&session->timer);
462 static void hidp_process_handshake(struct hidp_session *session,
463 unsigned char param)
465 BT_DBG("session %p param 0x%02x", session, param);
466 session->output_report_success = 0; /* default condition */
468 switch (param) {
469 case HIDP_HSHK_SUCCESSFUL:
470 /* FIXME: Call into SET_ GET_ handlers here */
471 session->output_report_success = 1;
472 break;
474 case HIDP_HSHK_NOT_READY:
475 case HIDP_HSHK_ERR_INVALID_REPORT_ID:
476 case HIDP_HSHK_ERR_UNSUPPORTED_REQUEST:
477 case HIDP_HSHK_ERR_INVALID_PARAMETER:
478 if (test_and_clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags))
479 wake_up_interruptible(&session->report_queue);
481 /* FIXME: Call into SET_ GET_ handlers here */
482 break;
484 case HIDP_HSHK_ERR_UNKNOWN:
485 break;
487 case HIDP_HSHK_ERR_FATAL:
488 /* Device requests a reboot, as this is the only way this error
489 * can be recovered. */
490 __hidp_send_ctrl_message(session,
491 HIDP_TRANS_HID_CONTROL | HIDP_CTRL_SOFT_RESET, NULL, 0);
492 break;
494 default:
495 __hidp_send_ctrl_message(session,
496 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
497 break;
500 /* Wake up the waiting thread. */
501 if (test_and_clear_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags))
502 wake_up_interruptible(&session->report_queue);
505 static void hidp_process_hid_control(struct hidp_session *session,
506 unsigned char param)
508 BT_DBG("session %p param 0x%02x", session, param);
510 if (param == HIDP_CTRL_VIRTUAL_CABLE_UNPLUG) {
511 /* Flush the transmit queues */
512 skb_queue_purge(&session->ctrl_transmit);
513 skb_queue_purge(&session->intr_transmit);
515 atomic_inc(&session->terminate);
516 wake_up_process(current);
520 /* Returns true if the passed-in skb should be freed by the caller. */
521 static int hidp_process_data(struct hidp_session *session, struct sk_buff *skb,
522 unsigned char param)
524 int done_with_skb = 1;
525 BT_DBG("session %p skb %p len %d param 0x%02x", session, skb, skb->len, param);
527 switch (param) {
528 case HIDP_DATA_RTYPE_INPUT:
529 hidp_set_timer(session);
531 if (session->input)
532 hidp_input_report(session, skb);
534 if (session->hid)
535 hid_input_report(session->hid, HID_INPUT_REPORT, skb->data, skb->len, 0);
536 break;
538 case HIDP_DATA_RTYPE_OTHER:
539 case HIDP_DATA_RTYPE_OUPUT:
540 case HIDP_DATA_RTYPE_FEATURE:
541 break;
543 default:
544 __hidp_send_ctrl_message(session,
545 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
548 if (test_bit(HIDP_WAITING_FOR_RETURN, &session->flags) &&
549 param == session->waiting_report_type) {
550 if (session->waiting_report_number < 0 ||
551 session->waiting_report_number == skb->data[0]) {
552 /* hidp_get_raw_report() is waiting on this report. */
553 session->report_return = skb;
554 done_with_skb = 0;
555 clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
556 wake_up_interruptible(&session->report_queue);
560 return done_with_skb;
563 static void hidp_recv_ctrl_frame(struct hidp_session *session,
564 struct sk_buff *skb)
566 unsigned char hdr, type, param;
567 int free_skb = 1;
569 BT_DBG("session %p skb %p len %d", session, skb, skb->len);
571 hdr = skb->data[0];
572 skb_pull(skb, 1);
574 type = hdr & HIDP_HEADER_TRANS_MASK;
575 param = hdr & HIDP_HEADER_PARAM_MASK;
577 switch (type) {
578 case HIDP_TRANS_HANDSHAKE:
579 hidp_process_handshake(session, param);
580 break;
582 case HIDP_TRANS_HID_CONTROL:
583 hidp_process_hid_control(session, param);
584 break;
586 case HIDP_TRANS_DATA:
587 free_skb = hidp_process_data(session, skb, param);
588 break;
590 default:
591 __hidp_send_ctrl_message(session,
592 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_UNSUPPORTED_REQUEST, NULL, 0);
593 break;
596 if (free_skb)
597 kfree_skb(skb);
600 static void hidp_recv_intr_frame(struct hidp_session *session,
601 struct sk_buff *skb)
603 unsigned char hdr;
605 BT_DBG("session %p skb %p len %d", session, skb, skb->len);
607 hdr = skb->data[0];
608 skb_pull(skb, 1);
610 if (hdr == (HIDP_TRANS_DATA | HIDP_DATA_RTYPE_INPUT)) {
611 hidp_set_timer(session);
613 if (session->input)
614 hidp_input_report(session, skb);
616 if (session->hid) {
617 hid_input_report(session->hid, HID_INPUT_REPORT, skb->data, skb->len, 1);
618 BT_DBG("report len %d", skb->len);
620 } else {
621 BT_DBG("Unsupported protocol header 0x%02x", hdr);
624 kfree_skb(skb);
627 static int hidp_send_frame(struct socket *sock, unsigned char *data, int len)
629 struct kvec iv = { data, len };
630 struct msghdr msg;
632 BT_DBG("sock %p data %p len %d", sock, data, len);
634 if (!len)
635 return 0;
637 memset(&msg, 0, sizeof(msg));
639 return kernel_sendmsg(sock, &msg, &iv, 1, len);
642 static void hidp_process_intr_transmit(struct hidp_session *session)
644 struct sk_buff *skb;
646 BT_DBG("session %p", session);
648 while ((skb = skb_dequeue(&session->intr_transmit))) {
649 if (hidp_send_frame(session->intr_sock, skb->data, skb->len) < 0) {
650 skb_queue_head(&session->intr_transmit, skb);
651 break;
654 hidp_set_timer(session);
655 kfree_skb(skb);
659 static void hidp_process_ctrl_transmit(struct hidp_session *session)
661 struct sk_buff *skb;
663 BT_DBG("session %p", session);
665 while ((skb = skb_dequeue(&session->ctrl_transmit))) {
666 if (hidp_send_frame(session->ctrl_sock, skb->data, skb->len) < 0) {
667 skb_queue_head(&session->ctrl_transmit, skb);
668 break;
671 hidp_set_timer(session);
672 kfree_skb(skb);
676 static int hidp_session(void *arg)
678 struct hidp_session *session = arg;
679 struct sock *ctrl_sk = session->ctrl_sock->sk;
680 struct sock *intr_sk = session->intr_sock->sk;
681 struct sk_buff *skb;
682 wait_queue_t ctrl_wait, intr_wait;
684 BT_DBG("session %p", session);
686 __module_get(THIS_MODULE);
687 set_user_nice(current, -15);
689 init_waitqueue_entry(&ctrl_wait, current);
690 init_waitqueue_entry(&intr_wait, current);
691 add_wait_queue(sk_sleep(ctrl_sk), &ctrl_wait);
692 add_wait_queue(sk_sleep(intr_sk), &intr_wait);
693 session->waiting_for_startup = 0;
694 wake_up_interruptible(&session->startup_queue);
695 set_current_state(TASK_INTERRUPTIBLE);
696 while (!atomic_read(&session->terminate)) {
697 if (ctrl_sk->sk_state != BT_CONNECTED ||
698 intr_sk->sk_state != BT_CONNECTED)
699 break;
701 while ((skb = skb_dequeue(&intr_sk->sk_receive_queue))) {
702 skb_orphan(skb);
703 if (!skb_linearize(skb))
704 hidp_recv_intr_frame(session, skb);
705 else
706 kfree_skb(skb);
709 hidp_process_intr_transmit(session);
711 while ((skb = skb_dequeue(&ctrl_sk->sk_receive_queue))) {
712 skb_orphan(skb);
713 if (!skb_linearize(skb))
714 hidp_recv_ctrl_frame(session, skb);
715 else
716 kfree_skb(skb);
719 hidp_process_ctrl_transmit(session);
721 schedule();
722 set_current_state(TASK_INTERRUPTIBLE);
724 set_current_state(TASK_RUNNING);
725 remove_wait_queue(sk_sleep(intr_sk), &intr_wait);
726 remove_wait_queue(sk_sleep(ctrl_sk), &ctrl_wait);
728 clear_bit(HIDP_WAITING_FOR_SEND_ACK, &session->flags);
729 clear_bit(HIDP_WAITING_FOR_RETURN, &session->flags);
730 wake_up_interruptible(&session->report_queue);
732 down_write(&hidp_session_sem);
734 hidp_del_timer(session);
736 if (session->input) {
737 input_unregister_device(session->input);
738 session->input = NULL;
741 if (session->hid) {
742 hid_destroy_device(session->hid);
743 session->hid = NULL;
746 /* Wakeup user-space polling for socket errors */
747 session->intr_sock->sk->sk_err = EUNATCH;
748 session->ctrl_sock->sk->sk_err = EUNATCH;
750 hidp_schedule(session);
752 fput(session->intr_sock->file);
754 wait_event_timeout(*(sk_sleep(ctrl_sk)),
755 (ctrl_sk->sk_state == BT_CLOSED), msecs_to_jiffies(500));
757 fput(session->ctrl_sock->file);
759 __hidp_unlink_session(session);
761 up_write(&hidp_session_sem);
763 kfree(session->rd_data);
764 kfree(session);
765 module_put_and_exit(0);
766 return 0;
769 static struct hci_conn *hidp_get_connection(struct hidp_session *session)
771 bdaddr_t *src = &bt_sk(session->ctrl_sock->sk)->src;
772 bdaddr_t *dst = &bt_sk(session->ctrl_sock->sk)->dst;
773 struct hci_conn *conn;
774 struct hci_dev *hdev;
776 hdev = hci_get_route(dst, src);
777 if (!hdev)
778 return NULL;
780 hci_dev_lock(hdev);
781 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
782 if (conn)
783 hci_conn_hold_device(conn);
784 hci_dev_unlock(hdev);
786 hci_dev_put(hdev);
788 return conn;
791 static int hidp_setup_input(struct hidp_session *session,
792 struct hidp_connadd_req *req)
794 struct input_dev *input;
795 int i;
797 input = input_allocate_device();
798 if (!input)
799 return -ENOMEM;
801 session->input = input;
803 input_set_drvdata(input, session);
805 input->name = "Bluetooth HID Boot Protocol Device";
807 input->id.bustype = BUS_BLUETOOTH;
808 input->id.vendor = req->vendor;
809 input->id.product = req->product;
810 input->id.version = req->version;
812 if (req->subclass & 0x40) {
813 set_bit(EV_KEY, input->evbit);
814 set_bit(EV_LED, input->evbit);
815 set_bit(EV_REP, input->evbit);
817 set_bit(LED_NUML, input->ledbit);
818 set_bit(LED_CAPSL, input->ledbit);
819 set_bit(LED_SCROLLL, input->ledbit);
820 set_bit(LED_COMPOSE, input->ledbit);
821 set_bit(LED_KANA, input->ledbit);
823 for (i = 0; i < sizeof(hidp_keycode); i++)
824 set_bit(hidp_keycode[i], input->keybit);
825 clear_bit(0, input->keybit);
828 if (req->subclass & 0x80) {
829 input->evbit[0] = BIT_MASK(EV_KEY) | BIT_MASK(EV_REL);
830 input->keybit[BIT_WORD(BTN_MOUSE)] = BIT_MASK(BTN_LEFT) |
831 BIT_MASK(BTN_RIGHT) | BIT_MASK(BTN_MIDDLE);
832 input->relbit[0] = BIT_MASK(REL_X) | BIT_MASK(REL_Y);
833 input->keybit[BIT_WORD(BTN_MOUSE)] |= BIT_MASK(BTN_SIDE) |
834 BIT_MASK(BTN_EXTRA);
835 input->relbit[0] |= BIT_MASK(REL_WHEEL);
838 input->dev.parent = &session->conn->dev;
840 input->event = hidp_input_event;
842 return 0;
845 static int hidp_open(struct hid_device *hid)
847 return 0;
850 static void hidp_close(struct hid_device *hid)
854 static int hidp_parse(struct hid_device *hid)
856 struct hidp_session *session = hid->driver_data;
858 return hid_parse_report(session->hid, session->rd_data,
859 session->rd_size);
862 static int hidp_start(struct hid_device *hid)
864 struct hidp_session *session = hid->driver_data;
865 struct hid_report *report;
867 if (hid->quirks & HID_QUIRK_NO_INIT_REPORTS)
868 return 0;
870 list_for_each_entry(report, &hid->report_enum[HID_INPUT_REPORT].
871 report_list, list)
872 hidp_send_report(session, report);
874 list_for_each_entry(report, &hid->report_enum[HID_FEATURE_REPORT].
875 report_list, list)
876 hidp_send_report(session, report);
878 return 0;
881 static void hidp_stop(struct hid_device *hid)
883 struct hidp_session *session = hid->driver_data;
885 skb_queue_purge(&session->ctrl_transmit);
886 skb_queue_purge(&session->intr_transmit);
888 hid->claimed = 0;
891 static struct hid_ll_driver hidp_hid_driver = {
892 .parse = hidp_parse,
893 .start = hidp_start,
894 .stop = hidp_stop,
895 .open = hidp_open,
896 .close = hidp_close,
897 .hidinput_input_event = hidp_hidinput_event,
900 /* This function sets up the hid device. It does not add it
901 to the HID system. That is done in hidp_add_connection(). */
902 static int hidp_setup_hid(struct hidp_session *session,
903 struct hidp_connadd_req *req)
905 struct hid_device *hid;
906 int err;
908 session->rd_data = kzalloc(req->rd_size, GFP_KERNEL);
909 if (!session->rd_data)
910 return -ENOMEM;
912 if (copy_from_user(session->rd_data, req->rd_data, req->rd_size)) {
913 err = -EFAULT;
914 goto fault;
916 session->rd_size = req->rd_size;
918 hid = hid_allocate_device();
919 if (IS_ERR(hid)) {
920 err = PTR_ERR(hid);
921 goto fault;
924 session->hid = hid;
926 hid->driver_data = session;
928 hid->bus = BUS_BLUETOOTH;
929 hid->vendor = req->vendor;
930 hid->product = req->product;
931 hid->version = req->version;
932 hid->country = req->country;
934 strncpy(hid->name, req->name, 128);
935 strncpy(hid->phys, batostr(&bt_sk(session->ctrl_sock->sk)->src), 64);
936 strncpy(hid->uniq, batostr(&bt_sk(session->ctrl_sock->sk)->dst), 64);
938 hid->dev.parent = &session->conn->dev;
939 hid->ll_driver = &hidp_hid_driver;
941 hid->hid_get_raw_report = hidp_get_raw_report;
942 hid->hid_output_raw_report = hidp_output_raw_report;
944 return 0;
946 fault:
947 kfree(session->rd_data);
948 session->rd_data = NULL;
950 return err;
953 int hidp_add_connection(struct hidp_connadd_req *req, struct socket *ctrl_sock, struct socket *intr_sock)
955 struct hidp_session *session, *s;
956 int vendor, product;
957 int err;
959 BT_DBG("");
961 if (bacmp(&bt_sk(ctrl_sock->sk)->src, &bt_sk(intr_sock->sk)->src) ||
962 bacmp(&bt_sk(ctrl_sock->sk)->dst, &bt_sk(intr_sock->sk)->dst))
963 return -ENOTUNIQ;
965 BT_DBG("rd_data %p rd_size %d", req->rd_data, req->rd_size);
967 down_write(&hidp_session_sem);
969 s = __hidp_get_session(&bt_sk(ctrl_sock->sk)->dst);
970 if (s && s->state == BT_CONNECTED) {
971 up_write(&hidp_session_sem);
972 return -EEXIST;
975 session = kzalloc(sizeof(struct hidp_session), GFP_KERNEL);
976 if (!session) {
977 up_write(&hidp_session_sem);
978 return -ENOMEM;
981 bacpy(&session->bdaddr, &bt_sk(ctrl_sock->sk)->dst);
983 session->ctrl_mtu = min_t(uint, l2cap_pi(ctrl_sock->sk)->chan->omtu,
984 l2cap_pi(ctrl_sock->sk)->chan->imtu);
985 session->intr_mtu = min_t(uint, l2cap_pi(intr_sock->sk)->chan->omtu,
986 l2cap_pi(intr_sock->sk)->chan->imtu);
988 BT_DBG("ctrl mtu %d intr mtu %d", session->ctrl_mtu, session->intr_mtu);
990 session->ctrl_sock = ctrl_sock;
991 session->intr_sock = intr_sock;
992 session->state = BT_CONNECTED;
994 session->conn = hidp_get_connection(session);
995 if (!session->conn) {
996 err = -ENOTCONN;
997 goto failed;
1000 setup_timer(&session->timer, hidp_idle_timeout, (unsigned long)session);
1002 skb_queue_head_init(&session->ctrl_transmit);
1003 skb_queue_head_init(&session->intr_transmit);
1005 mutex_init(&session->report_mutex);
1006 init_waitqueue_head(&session->report_queue);
1007 init_waitqueue_head(&session->startup_queue);
1008 session->waiting_for_startup = 1;
1009 session->flags = req->flags & (1 << HIDP_BLUETOOTH_VENDOR_ID);
1010 session->idle_to = req->idle_to;
1012 __hidp_link_session(session);
1014 if (req->rd_size > 0) {
1015 err = hidp_setup_hid(session, req);
1016 if (err)
1017 goto purge;
1020 if (!session->hid) {
1021 err = hidp_setup_input(session, req);
1022 if (err < 0)
1023 goto purge;
1026 hidp_set_timer(session);
1028 if (session->hid) {
1029 vendor = session->hid->vendor;
1030 product = session->hid->product;
1031 } else if (session->input) {
1032 vendor = session->input->id.vendor;
1033 product = session->input->id.product;
1034 } else {
1035 vendor = 0x0000;
1036 product = 0x0000;
1039 session->task = kthread_run(hidp_session, session, "khidpd_%04x%04x",
1040 vendor, product);
1041 if (IS_ERR(session->task)) {
1042 err = PTR_ERR(session->task);
1043 goto unlink;
1046 while (session->waiting_for_startup) {
1047 wait_event_interruptible(session->startup_queue,
1048 !session->waiting_for_startup);
1051 if (session->hid)
1052 err = hid_add_device(session->hid);
1053 else
1054 err = input_register_device(session->input);
1056 if (err < 0) {
1057 atomic_inc(&session->terminate);
1058 wake_up_process(session->task);
1059 up_write(&hidp_session_sem);
1060 return err;
1063 if (session->input) {
1064 hidp_send_ctrl_message(session,
1065 HIDP_TRANS_SET_PROTOCOL | HIDP_PROTO_BOOT, NULL, 0);
1066 session->flags |= (1 << HIDP_BOOT_PROTOCOL_MODE);
1068 session->leds = 0xff;
1069 hidp_input_event(session->input, EV_LED, 0, 0);
1072 up_write(&hidp_session_sem);
1073 return 0;
1075 unlink:
1076 hidp_del_timer(session);
1078 if (session->input) {
1079 input_unregister_device(session->input);
1080 session->input = NULL;
1083 if (session->hid) {
1084 hid_destroy_device(session->hid);
1085 session->hid = NULL;
1088 kfree(session->rd_data);
1089 session->rd_data = NULL;
1091 purge:
1092 __hidp_unlink_session(session);
1094 skb_queue_purge(&session->ctrl_transmit);
1095 skb_queue_purge(&session->intr_transmit);
1097 failed:
1098 up_write(&hidp_session_sem);
1100 kfree(session);
1101 return err;
1104 int hidp_del_connection(struct hidp_conndel_req *req)
1106 struct hidp_session *session;
1107 int err = 0;
1109 BT_DBG("");
1111 down_read(&hidp_session_sem);
1113 session = __hidp_get_session(&req->bdaddr);
1114 if (session) {
1115 if (req->flags & (1 << HIDP_VIRTUAL_CABLE_UNPLUG)) {
1116 hidp_send_ctrl_message(session,
1117 HIDP_TRANS_HID_CONTROL | HIDP_CTRL_VIRTUAL_CABLE_UNPLUG, NULL, 0);
1118 } else {
1119 /* Flush the transmit queues */
1120 skb_queue_purge(&session->ctrl_transmit);
1121 skb_queue_purge(&session->intr_transmit);
1123 atomic_inc(&session->terminate);
1124 wake_up_process(session->task);
1126 } else
1127 err = -ENOENT;
1129 up_read(&hidp_session_sem);
1130 return err;
1133 int hidp_get_connlist(struct hidp_connlist_req *req)
1135 struct hidp_session *session;
1136 int err = 0, n = 0;
1138 BT_DBG("");
1140 down_read(&hidp_session_sem);
1142 list_for_each_entry(session, &hidp_session_list, list) {
1143 struct hidp_conninfo ci;
1145 __hidp_copy_session(session, &ci);
1147 if (copy_to_user(req->ci, &ci, sizeof(ci))) {
1148 err = -EFAULT;
1149 break;
1152 if (++n >= req->cnum)
1153 break;
1155 req->ci++;
1157 req->cnum = n;
1159 up_read(&hidp_session_sem);
1160 return err;
1163 int hidp_get_conninfo(struct hidp_conninfo *ci)
1165 struct hidp_session *session;
1166 int err = 0;
1168 down_read(&hidp_session_sem);
1170 session = __hidp_get_session(&ci->bdaddr);
1171 if (session)
1172 __hidp_copy_session(session, ci);
1173 else
1174 err = -ENOENT;
1176 up_read(&hidp_session_sem);
1177 return err;
1180 static int __init hidp_init(void)
1182 BT_INFO("HIDP (Human Interface Emulation) ver %s", VERSION);
1184 return hidp_init_sockets();
1187 static void __exit hidp_exit(void)
1189 hidp_cleanup_sockets();
1192 module_init(hidp_init);
1193 module_exit(hidp_exit);
1195 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
1196 MODULE_DESCRIPTION("Bluetooth HIDP ver " VERSION);
1197 MODULE_VERSION(VERSION);
1198 MODULE_LICENSE("GPL");
1199 MODULE_ALIAS("bt-proto-6");