Bluetooth HID: HIDP - don't initialize force feedback
[linux-2.6/linux-loongson.git] / net / bluetooth / hidp / core.c
blob3e77e8102e086b20f58a4e3fcf8392eed6cb7403
1 /*
2 HIDP implementation for Linux Bluetooth stack (BlueZ).
3 Copyright (C) 2003-2004 Marcel Holtmann <marcel@holtmann.org>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License version 2 as
7 published by the Free Software Foundation;
9 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
10 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
11 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
12 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
13 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
14 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
18 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
19 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
20 SOFTWARE IS DISCLAIMED.
23 #include <linux/module.h>
25 #include <linux/types.h>
26 #include <linux/errno.h>
27 #include <linux/kernel.h>
28 #include <linux/sched.h>
29 #include <linux/slab.h>
30 #include <linux/poll.h>
31 #include <linux/fcntl.h>
32 #include <linux/skbuff.h>
33 #include <linux/socket.h>
34 #include <linux/ioctl.h>
35 #include <linux/file.h>
36 #include <linux/init.h>
37 #include <linux/wait.h>
38 #include <net/sock.h>
40 #include <linux/input.h>
41 #include <linux/hid.h>
43 #include <net/bluetooth/bluetooth.h>
44 #include <net/bluetooth/hci_core.h>
45 #include <net/bluetooth/l2cap.h>
47 #include "hidp.h"
49 #ifndef CONFIG_BT_HIDP_DEBUG
50 #undef BT_DBG
51 #define BT_DBG(D...)
52 #endif
54 #define VERSION "1.2"
56 static DECLARE_RWSEM(hidp_session_sem);
57 static LIST_HEAD(hidp_session_list);
59 static unsigned char hidp_keycode[256] = {
60 0, 0, 0, 0, 30, 48, 46, 32, 18, 33, 34, 35, 23, 36, 37, 38,
61 50, 49, 24, 25, 16, 19, 31, 20, 22, 47, 17, 45, 21, 44, 2, 3,
62 4, 5, 6, 7, 8, 9, 10, 11, 28, 1, 14, 15, 57, 12, 13, 26,
63 27, 43, 43, 39, 40, 41, 51, 52, 53, 58, 59, 60, 61, 62, 63, 64,
64 65, 66, 67, 68, 87, 88, 99, 70,119,110,102,104,111,107,109,106,
65 105,108,103, 69, 98, 55, 74, 78, 96, 79, 80, 81, 75, 76, 77, 71,
66 72, 73, 82, 83, 86,127,116,117,183,184,185,186,187,188,189,190,
67 191,192,193,194,134,138,130,132,128,129,131,137,133,135,136,113,
68 115,114, 0, 0, 0,121, 0, 89, 93,124, 92, 94, 95, 0, 0, 0,
69 122,123, 90, 91, 85, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
70 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
71 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
72 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
73 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
74 29, 42, 56,125, 97, 54,100,126,164,166,165,163,161,115,114,113,
75 150,158,159,128,136,177,178,176,142,152,173,140
78 static unsigned char hidp_mkeyspat[] = { 0x01, 0x01, 0x01, 0x01, 0x01, 0x01 };
80 static struct hidp_session *__hidp_get_session(bdaddr_t *bdaddr)
82 struct hidp_session *session;
83 struct list_head *p;
85 BT_DBG("");
87 list_for_each(p, &hidp_session_list) {
88 session = list_entry(p, struct hidp_session, list);
89 if (!bacmp(bdaddr, &session->bdaddr))
90 return session;
92 return NULL;
95 static void __hidp_link_session(struct hidp_session *session)
97 __module_get(THIS_MODULE);
98 list_add(&session->list, &hidp_session_list);
101 static void __hidp_unlink_session(struct hidp_session *session)
103 list_del(&session->list);
104 module_put(THIS_MODULE);
107 static void __hidp_copy_session(struct hidp_session *session, struct hidp_conninfo *ci)
109 bacpy(&ci->bdaddr, &session->bdaddr);
111 ci->flags = session->flags;
112 ci->state = session->state;
114 ci->vendor = 0x0000;
115 ci->product = 0x0000;
116 ci->version = 0x0000;
117 memset(ci->name, 0, 128);
119 if (session->input) {
120 ci->vendor = session->input->id.vendor;
121 ci->product = session->input->id.product;
122 ci->version = session->input->id.version;
123 if (session->input->name)
124 strncpy(ci->name, session->input->name, 128);
125 else
126 strncpy(ci->name, "HID Boot Device", 128);
129 if (session->hid) {
130 ci->vendor = session->hid->vendor;
131 ci->product = session->hid->product;
132 ci->version = session->hid->version;
133 strncpy(ci->name, session->hid->name, 128);
137 static inline int hidp_queue_event(struct hidp_session *session, struct input_dev *dev,
138 unsigned int type, unsigned int code, int value)
140 unsigned char newleds;
141 struct sk_buff *skb;
143 BT_DBG("session %p type %d code %d value %d", session, type, code, value);
145 if (type != EV_LED)
146 return -1;
148 newleds = (!!test_bit(LED_KANA, dev->led) << 3) |
149 (!!test_bit(LED_COMPOSE, dev->led) << 3) |
150 (!!test_bit(LED_SCROLLL, dev->led) << 2) |
151 (!!test_bit(LED_CAPSL, dev->led) << 1) |
152 (!!test_bit(LED_NUML, dev->led));
154 if (session->leds == newleds)
155 return 0;
157 session->leds = newleds;
159 if (!(skb = alloc_skb(3, GFP_ATOMIC))) {
160 BT_ERR("Can't allocate memory for new frame");
161 return -ENOMEM;
164 *skb_put(skb, 1) = HIDP_TRANS_DATA | HIDP_DATA_RTYPE_OUPUT;
165 *skb_put(skb, 1) = 0x01;
166 *skb_put(skb, 1) = newleds;
168 skb_queue_tail(&session->intr_transmit, skb);
170 hidp_schedule(session);
172 return 0;
175 static int hidp_hidinput_event(struct input_dev *dev, unsigned int type, unsigned int code, int value)
177 struct hid_device *hid = dev->private;
178 struct hidp_session *session = hid->driver_data;
180 return hidp_queue_event(session, dev, type, code, value);
183 static int hidp_input_event(struct input_dev *dev, unsigned int type, unsigned int code, int value)
185 struct hidp_session *session = dev->private;
187 return hidp_queue_event(session, dev, type, code, value);
190 static void hidp_input_report(struct hidp_session *session, struct sk_buff *skb)
192 struct input_dev *dev = session->input;
193 unsigned char *keys = session->keys;
194 unsigned char *udata = skb->data + 1;
195 signed char *sdata = skb->data + 1;
196 int i, size = skb->len - 1;
198 switch (skb->data[0]) {
199 case 0x01: /* Keyboard report */
200 for (i = 0; i < 8; i++)
201 input_report_key(dev, hidp_keycode[i + 224], (udata[0] >> i) & 1);
203 /* If all the key codes have been set to 0x01, it means
204 * too many keys were pressed at the same time. */
205 if (!memcmp(udata + 2, hidp_mkeyspat, 6))
206 break;
208 for (i = 2; i < 8; i++) {
209 if (keys[i] > 3 && memscan(udata + 2, keys[i], 6) == udata + 8) {
210 if (hidp_keycode[keys[i]])
211 input_report_key(dev, hidp_keycode[keys[i]], 0);
212 else
213 BT_ERR("Unknown key (scancode %#x) released.", keys[i]);
216 if (udata[i] > 3 && memscan(keys + 2, udata[i], 6) == keys + 8) {
217 if (hidp_keycode[udata[i]])
218 input_report_key(dev, hidp_keycode[udata[i]], 1);
219 else
220 BT_ERR("Unknown key (scancode %#x) pressed.", udata[i]);
224 memcpy(keys, udata, 8);
225 break;
227 case 0x02: /* Mouse report */
228 input_report_key(dev, BTN_LEFT, sdata[0] & 0x01);
229 input_report_key(dev, BTN_RIGHT, sdata[0] & 0x02);
230 input_report_key(dev, BTN_MIDDLE, sdata[0] & 0x04);
231 input_report_key(dev, BTN_SIDE, sdata[0] & 0x08);
232 input_report_key(dev, BTN_EXTRA, sdata[0] & 0x10);
234 input_report_rel(dev, REL_X, sdata[1]);
235 input_report_rel(dev, REL_Y, sdata[2]);
237 if (size > 3)
238 input_report_rel(dev, REL_WHEEL, sdata[3]);
239 break;
242 input_sync(dev);
245 static inline int hidp_queue_report(struct hidp_session *session, unsigned char *data, int size)
247 struct sk_buff *skb;
249 BT_DBG("session %p hid %p data %p size %d", session, device, data, size);
251 if (!(skb = alloc_skb(size + 1, GFP_ATOMIC))) {
252 BT_ERR("Can't allocate memory for new frame");
253 return -ENOMEM;
256 *skb_put(skb, 1) = 0xa2;
257 if (size > 0)
258 memcpy(skb_put(skb, size), data, size);
260 skb_queue_tail(&session->intr_transmit, skb);
262 hidp_schedule(session);
264 return 0;
267 static int hidp_send_report(struct hidp_session *session, struct hid_report *report)
269 unsigned char buf[32];
270 int rsize;
272 rsize = ((report->size - 1) >> 3) + 1 + (report->id > 0);
273 if (rsize > sizeof(buf))
274 return -EIO;
276 hid_output_report(report, buf);
278 return hidp_queue_report(session, buf, rsize);
281 static void hidp_idle_timeout(unsigned long arg)
283 struct hidp_session *session = (struct hidp_session *) arg;
285 atomic_inc(&session->terminate);
286 hidp_schedule(session);
289 static inline void hidp_set_timer(struct hidp_session *session)
291 if (session->idle_to > 0)
292 mod_timer(&session->timer, jiffies + HZ * session->idle_to);
295 static inline void hidp_del_timer(struct hidp_session *session)
297 if (session->idle_to > 0)
298 del_timer(&session->timer);
301 static int __hidp_send_ctrl_message(struct hidp_session *session,
302 unsigned char hdr, unsigned char *data, int size)
304 struct sk_buff *skb;
306 BT_DBG("session %p data %p size %d", session, data, size);
308 if (!(skb = alloc_skb(size + 1, GFP_ATOMIC))) {
309 BT_ERR("Can't allocate memory for new frame");
310 return -ENOMEM;
313 *skb_put(skb, 1) = hdr;
314 if (data && size > 0)
315 memcpy(skb_put(skb, size), data, size);
317 skb_queue_tail(&session->ctrl_transmit, skb);
319 return 0;
322 static inline int hidp_send_ctrl_message(struct hidp_session *session,
323 unsigned char hdr, unsigned char *data, int size)
325 int err;
327 err = __hidp_send_ctrl_message(session, hdr, data, size);
329 hidp_schedule(session);
331 return err;
334 static inline void hidp_process_handshake(struct hidp_session *session, unsigned char param)
336 BT_DBG("session %p param 0x%02x", session, param);
338 switch (param) {
339 case HIDP_HSHK_SUCCESSFUL:
340 /* FIXME: Call into SET_ GET_ handlers here */
341 break;
343 case HIDP_HSHK_NOT_READY:
344 case HIDP_HSHK_ERR_INVALID_REPORT_ID:
345 case HIDP_HSHK_ERR_UNSUPPORTED_REQUEST:
346 case HIDP_HSHK_ERR_INVALID_PARAMETER:
347 /* FIXME: Call into SET_ GET_ handlers here */
348 break;
350 case HIDP_HSHK_ERR_UNKNOWN:
351 break;
353 case HIDP_HSHK_ERR_FATAL:
354 /* Device requests a reboot, as this is the only way this error
355 * can be recovered. */
356 __hidp_send_ctrl_message(session,
357 HIDP_TRANS_HID_CONTROL | HIDP_CTRL_SOFT_RESET, NULL, 0);
358 break;
360 default:
361 __hidp_send_ctrl_message(session,
362 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
363 break;
367 static inline void hidp_process_hid_control(struct hidp_session *session, unsigned char param)
369 BT_DBG("session %p param 0x%02x", session, param);
371 switch (param) {
372 case HIDP_CTRL_NOP:
373 break;
375 case HIDP_CTRL_VIRTUAL_CABLE_UNPLUG:
376 /* Flush the transmit queues */
377 skb_queue_purge(&session->ctrl_transmit);
378 skb_queue_purge(&session->intr_transmit);
380 /* Kill session thread */
381 atomic_inc(&session->terminate);
382 break;
384 case HIDP_CTRL_HARD_RESET:
385 case HIDP_CTRL_SOFT_RESET:
386 case HIDP_CTRL_SUSPEND:
387 case HIDP_CTRL_EXIT_SUSPEND:
388 /* FIXME: We have to parse these and return no error */
389 break;
391 default:
392 __hidp_send_ctrl_message(session,
393 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
394 break;
398 static inline void hidp_process_data(struct hidp_session *session, struct sk_buff *skb, unsigned char param)
400 BT_DBG("session %p skb %p len %d param 0x%02x", session, skb, skb->len, param);
402 switch (param) {
403 case HIDP_DATA_RTYPE_INPUT:
404 hidp_set_timer(session);
406 if (session->input)
407 hidp_input_report(session, skb);
409 if (session->hid)
410 hid_input_report(session->hid, HID_INPUT_REPORT, skb->data, skb->len, 0);
412 break;
414 case HIDP_DATA_RTYPE_OTHER:
415 case HIDP_DATA_RTYPE_OUPUT:
416 case HIDP_DATA_RTYPE_FEATURE:
417 break;
419 default:
420 __hidp_send_ctrl_message(session,
421 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_INVALID_PARAMETER, NULL, 0);
425 static inline void hidp_recv_ctrl_frame(struct hidp_session *session, struct sk_buff *skb)
427 unsigned char hdr, type, param;
429 BT_DBG("session %p skb %p len %d", session, skb, skb->len);
431 hdr = skb->data[0];
432 skb_pull(skb, 1);
434 type = hdr & HIDP_HEADER_TRANS_MASK;
435 param = hdr & HIDP_HEADER_PARAM_MASK;
437 switch (type) {
438 case HIDP_TRANS_HANDSHAKE:
439 hidp_process_handshake(session, param);
440 break;
442 case HIDP_TRANS_HID_CONTROL:
443 hidp_process_hid_control(session, param);
444 break;
446 case HIDP_TRANS_DATA:
447 hidp_process_data(session, skb, param);
448 break;
450 default:
451 __hidp_send_ctrl_message(session,
452 HIDP_TRANS_HANDSHAKE | HIDP_HSHK_ERR_UNSUPPORTED_REQUEST, NULL, 0);
453 break;
456 kfree_skb(skb);
459 static inline void hidp_recv_intr_frame(struct hidp_session *session, struct sk_buff *skb)
461 unsigned char hdr;
463 BT_DBG("session %p skb %p len %d", session, skb, skb->len);
465 hdr = skb->data[0];
466 skb_pull(skb, 1);
468 if (hdr == (HIDP_TRANS_DATA | HIDP_DATA_RTYPE_INPUT)) {
469 hidp_set_timer(session);
471 if (session->input)
472 hidp_input_report(session, skb);
474 if (session->hid) {
475 hid_input_report(session->hid, HID_INPUT_REPORT, skb->data, skb->len, 1);
476 BT_DBG("report len %d", skb->len);
478 } else {
479 BT_DBG("Unsupported protocol header 0x%02x", hdr);
482 kfree_skb(skb);
485 static int hidp_send_frame(struct socket *sock, unsigned char *data, int len)
487 struct kvec iv = { data, len };
488 struct msghdr msg;
490 BT_DBG("sock %p data %p len %d", sock, data, len);
492 if (!len)
493 return 0;
495 memset(&msg, 0, sizeof(msg));
497 return kernel_sendmsg(sock, &msg, &iv, 1, len);
500 static void hidp_process_transmit(struct hidp_session *session)
502 struct sk_buff *skb;
504 BT_DBG("session %p", session);
506 while ((skb = skb_dequeue(&session->ctrl_transmit))) {
507 if (hidp_send_frame(session->ctrl_sock, skb->data, skb->len) < 0) {
508 skb_queue_head(&session->ctrl_transmit, skb);
509 break;
512 hidp_set_timer(session);
513 kfree_skb(skb);
516 while ((skb = skb_dequeue(&session->intr_transmit))) {
517 if (hidp_send_frame(session->intr_sock, skb->data, skb->len) < 0) {
518 skb_queue_head(&session->intr_transmit, skb);
519 break;
522 hidp_set_timer(session);
523 kfree_skb(skb);
527 static int hidp_session(void *arg)
529 struct hidp_session *session = arg;
530 struct sock *ctrl_sk = session->ctrl_sock->sk;
531 struct sock *intr_sk = session->intr_sock->sk;
532 struct sk_buff *skb;
533 int vendor = 0x0000, product = 0x0000;
534 wait_queue_t ctrl_wait, intr_wait;
536 BT_DBG("session %p", session);
538 if (session->input) {
539 vendor = session->input->id.vendor;
540 product = session->input->id.product;
543 if (session->hid) {
544 vendor = session->hid->vendor;
545 product = session->hid->product;
548 daemonize("khidpd_%04x%04x", vendor, product);
549 set_user_nice(current, -15);
550 current->flags |= PF_NOFREEZE;
552 init_waitqueue_entry(&ctrl_wait, current);
553 init_waitqueue_entry(&intr_wait, current);
554 add_wait_queue(ctrl_sk->sk_sleep, &ctrl_wait);
555 add_wait_queue(intr_sk->sk_sleep, &intr_wait);
556 while (!atomic_read(&session->terminate)) {
557 set_current_state(TASK_INTERRUPTIBLE);
559 if (ctrl_sk->sk_state != BT_CONNECTED || intr_sk->sk_state != BT_CONNECTED)
560 break;
562 while ((skb = skb_dequeue(&ctrl_sk->sk_receive_queue))) {
563 skb_orphan(skb);
564 hidp_recv_ctrl_frame(session, skb);
567 while ((skb = skb_dequeue(&intr_sk->sk_receive_queue))) {
568 skb_orphan(skb);
569 hidp_recv_intr_frame(session, skb);
572 hidp_process_transmit(session);
574 schedule();
576 set_current_state(TASK_RUNNING);
577 remove_wait_queue(intr_sk->sk_sleep, &intr_wait);
578 remove_wait_queue(ctrl_sk->sk_sleep, &ctrl_wait);
580 down_write(&hidp_session_sem);
582 hidp_del_timer(session);
584 fput(session->intr_sock->file);
586 wait_event_timeout(*(ctrl_sk->sk_sleep),
587 (ctrl_sk->sk_state == BT_CLOSED), msecs_to_jiffies(500));
589 fput(session->ctrl_sock->file);
591 __hidp_unlink_session(session);
593 if (session->input) {
594 input_unregister_device(session->input);
595 session->input = NULL;
598 if (session->hid) {
599 if (session->hid->claimed & HID_CLAIMED_INPUT)
600 hidinput_disconnect(session->hid);
601 hid_free_device(session->hid);
604 up_write(&hidp_session_sem);
606 kfree(session);
607 return 0;
610 static struct device *hidp_get_device(struct hidp_session *session)
612 bdaddr_t *src = &bt_sk(session->ctrl_sock->sk)->src;
613 bdaddr_t *dst = &bt_sk(session->ctrl_sock->sk)->dst;
614 struct hci_dev *hdev;
615 struct hci_conn *conn;
617 hdev = hci_get_route(dst, src);
618 if (!hdev)
619 return NULL;
621 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
623 hci_dev_put(hdev);
625 return conn ? &conn->dev : NULL;
628 static inline void hidp_setup_input(struct hidp_session *session, struct hidp_connadd_req *req)
630 struct input_dev *input = session->input;
631 int i;
633 input->private = session;
635 input->name = "Bluetooth HID Boot Protocol Device";
637 input->id.bustype = BUS_BLUETOOTH;
638 input->id.vendor = req->vendor;
639 input->id.product = req->product;
640 input->id.version = req->version;
642 if (req->subclass & 0x40) {
643 set_bit(EV_KEY, input->evbit);
644 set_bit(EV_LED, input->evbit);
645 set_bit(EV_REP, input->evbit);
647 set_bit(LED_NUML, input->ledbit);
648 set_bit(LED_CAPSL, input->ledbit);
649 set_bit(LED_SCROLLL, input->ledbit);
650 set_bit(LED_COMPOSE, input->ledbit);
651 set_bit(LED_KANA, input->ledbit);
653 for (i = 0; i < sizeof(hidp_keycode); i++)
654 set_bit(hidp_keycode[i], input->keybit);
655 clear_bit(0, input->keybit);
658 if (req->subclass & 0x80) {
659 input->evbit[0] = BIT(EV_KEY) | BIT(EV_REL);
660 input->keybit[LONG(BTN_MOUSE)] = BIT(BTN_LEFT) | BIT(BTN_RIGHT) | BIT(BTN_MIDDLE);
661 input->relbit[0] = BIT(REL_X) | BIT(REL_Y);
662 input->keybit[LONG(BTN_MOUSE)] |= BIT(BTN_SIDE) | BIT(BTN_EXTRA);
663 input->relbit[0] |= BIT(REL_WHEEL);
666 input->cdev.dev = hidp_get_device(session);
668 input->event = hidp_input_event;
670 input_register_device(input);
673 static int hidp_open(struct hid_device *hid)
675 return 0;
678 static void hidp_close(struct hid_device *hid)
682 static const struct {
683 __u16 idVendor;
684 __u16 idProduct;
685 unsigned quirks;
686 } hidp_blacklist[] = {
687 /* Apple wireless Mighty Mouse */
688 { 0x05ac, 0x030c, HID_QUIRK_MIGHTYMOUSE | HID_QUIRK_INVERT_HWHEEL },
690 { } /* Terminating entry */
693 static void hidp_setup_quirks(struct hid_device *hid)
695 unsigned int n;
697 for (n = 0; hidp_blacklist[n].idVendor; n++)
698 if (hidp_blacklist[n].idVendor == le16_to_cpu(hid->vendor) &&
699 hidp_blacklist[n].idProduct == le16_to_cpu(hid->product))
700 hid->quirks = hidp_blacklist[n].quirks;
703 static inline void hidp_setup_hid(struct hidp_session *session, struct hidp_connadd_req *req)
705 struct hid_device *hid = session->hid;
706 struct hid_report *report;
707 bdaddr_t src, dst;
709 baswap(&src, &bt_sk(session->ctrl_sock->sk)->src);
710 baswap(&dst, &bt_sk(session->ctrl_sock->sk)->dst);
712 hid->driver_data = session;
714 hid->country = req->country;
716 hid->bus = BUS_BLUETOOTH;
717 hid->vendor = req->vendor;
718 hid->product = req->product;
719 hid->version = req->version;
721 strncpy(hid->name, req->name, 128);
722 strncpy(hid->phys, batostr(&src), 64);
723 strncpy(hid->uniq, batostr(&dst), 64);
725 hid->dev = hidp_get_device(session);
727 hid->hid_open = hidp_open;
728 hid->hid_close = hidp_close;
730 hid->hidinput_input_event = hidp_hidinput_event;
732 hidp_setup_quirks(hid);
734 list_for_each_entry(report, &hid->report_enum[HID_INPUT_REPORT].report_list, list)
735 hidp_send_report(session, report);
737 list_for_each_entry(report, &hid->report_enum[HID_FEATURE_REPORT].report_list, list)
738 hidp_send_report(session, report);
740 if (hidinput_connect(hid) == 0)
741 hid->claimed |= HID_CLAIMED_INPUT;
744 int hidp_add_connection(struct hidp_connadd_req *req, struct socket *ctrl_sock, struct socket *intr_sock)
746 struct hidp_session *session, *s;
747 int err;
749 BT_DBG("");
751 if (bacmp(&bt_sk(ctrl_sock->sk)->src, &bt_sk(intr_sock->sk)->src) ||
752 bacmp(&bt_sk(ctrl_sock->sk)->dst, &bt_sk(intr_sock->sk)->dst))
753 return -ENOTUNIQ;
755 session = kzalloc(sizeof(struct hidp_session), GFP_KERNEL);
756 if (!session)
757 return -ENOMEM;
759 BT_DBG("rd_data %p rd_size %d", req->rd_data, req->rd_size);
761 if (req->rd_size > 0) {
762 unsigned char *buf = kmalloc(req->rd_size, GFP_KERNEL);
764 if (!buf) {
765 kfree(session);
766 return -ENOMEM;
769 if (copy_from_user(buf, req->rd_data, req->rd_size)) {
770 kfree(buf);
771 kfree(session);
772 return -EFAULT;
775 session->hid = hid_parse_report(buf, req->rd_size);
777 kfree(buf);
779 if (!session->hid) {
780 kfree(session);
781 return -EINVAL;
785 if (!session->hid) {
786 session->input = input_allocate_device();
787 if (!session->input) {
788 kfree(session);
789 return -ENOMEM;
793 down_write(&hidp_session_sem);
795 s = __hidp_get_session(&bt_sk(ctrl_sock->sk)->dst);
796 if (s && s->state == BT_CONNECTED) {
797 err = -EEXIST;
798 goto failed;
801 bacpy(&session->bdaddr, &bt_sk(ctrl_sock->sk)->dst);
803 session->ctrl_mtu = min_t(uint, l2cap_pi(ctrl_sock->sk)->omtu, l2cap_pi(ctrl_sock->sk)->imtu);
804 session->intr_mtu = min_t(uint, l2cap_pi(intr_sock->sk)->omtu, l2cap_pi(intr_sock->sk)->imtu);
806 BT_DBG("ctrl mtu %d intr mtu %d", session->ctrl_mtu, session->intr_mtu);
808 session->ctrl_sock = ctrl_sock;
809 session->intr_sock = intr_sock;
810 session->state = BT_CONNECTED;
812 init_timer(&session->timer);
814 session->timer.function = hidp_idle_timeout;
815 session->timer.data = (unsigned long) session;
817 skb_queue_head_init(&session->ctrl_transmit);
818 skb_queue_head_init(&session->intr_transmit);
820 session->flags = req->flags & (1 << HIDP_BLUETOOTH_VENDOR_ID);
821 session->idle_to = req->idle_to;
823 if (session->input)
824 hidp_setup_input(session, req);
826 if (session->hid)
827 hidp_setup_hid(session, req);
829 __hidp_link_session(session);
831 hidp_set_timer(session);
833 err = kernel_thread(hidp_session, session, CLONE_KERNEL);
834 if (err < 0)
835 goto unlink;
837 if (session->input) {
838 hidp_send_ctrl_message(session,
839 HIDP_TRANS_SET_PROTOCOL | HIDP_PROTO_BOOT, NULL, 0);
840 session->flags |= (1 << HIDP_BOOT_PROTOCOL_MODE);
842 session->leds = 0xff;
843 hidp_input_event(session->input, EV_LED, 0, 0);
846 up_write(&hidp_session_sem);
847 return 0;
849 unlink:
850 hidp_del_timer(session);
852 __hidp_unlink_session(session);
854 if (session->input) {
855 input_unregister_device(session->input);
856 session->input = NULL; /* don't try to free it here */
859 failed:
860 up_write(&hidp_session_sem);
862 if (session->hid)
863 hid_free_device(session->hid);
865 kfree(session->input);
866 kfree(session);
867 return err;
870 int hidp_del_connection(struct hidp_conndel_req *req)
872 struct hidp_session *session;
873 int err = 0;
875 BT_DBG("");
877 down_read(&hidp_session_sem);
879 session = __hidp_get_session(&req->bdaddr);
880 if (session) {
881 if (req->flags & (1 << HIDP_VIRTUAL_CABLE_UNPLUG)) {
882 hidp_send_ctrl_message(session,
883 HIDP_TRANS_HID_CONTROL | HIDP_CTRL_VIRTUAL_CABLE_UNPLUG, NULL, 0);
884 } else {
885 /* Flush the transmit queues */
886 skb_queue_purge(&session->ctrl_transmit);
887 skb_queue_purge(&session->intr_transmit);
889 /* Kill session thread */
890 atomic_inc(&session->terminate);
891 hidp_schedule(session);
893 } else
894 err = -ENOENT;
896 up_read(&hidp_session_sem);
897 return err;
900 int hidp_get_connlist(struct hidp_connlist_req *req)
902 struct list_head *p;
903 int err = 0, n = 0;
905 BT_DBG("");
907 down_read(&hidp_session_sem);
909 list_for_each(p, &hidp_session_list) {
910 struct hidp_session *session;
911 struct hidp_conninfo ci;
913 session = list_entry(p, struct hidp_session, list);
915 __hidp_copy_session(session, &ci);
917 if (copy_to_user(req->ci, &ci, sizeof(ci))) {
918 err = -EFAULT;
919 break;
922 if (++n >= req->cnum)
923 break;
925 req->ci++;
927 req->cnum = n;
929 up_read(&hidp_session_sem);
930 return err;
933 int hidp_get_conninfo(struct hidp_conninfo *ci)
935 struct hidp_session *session;
936 int err = 0;
938 down_read(&hidp_session_sem);
940 session = __hidp_get_session(&ci->bdaddr);
941 if (session)
942 __hidp_copy_session(session, ci);
943 else
944 err = -ENOENT;
946 up_read(&hidp_session_sem);
947 return err;
950 static int __init hidp_init(void)
952 l2cap_load();
954 BT_INFO("HIDP (Human Interface Emulation) ver %s", VERSION);
956 return hidp_init_sockets();
959 static void __exit hidp_exit(void)
961 hidp_cleanup_sockets();
964 module_init(hidp_init);
965 module_exit(hidp_exit);
967 MODULE_AUTHOR("Marcel Holtmann <marcel@holtmann.org>");
968 MODULE_DESCRIPTION("Bluetooth HIDP ver " VERSION);
969 MODULE_VERSION(VERSION);
970 MODULE_LICENSE("GPL");
971 MODULE_ALIAS("bt-proto-6");