GUI: Fix Tomato RAF theme for all builds. Compilation typo.
[tomato.git] / release / src-rt-6.x.4708 / linux / linux-2.6.36 / net / bluetooth / hci_sock.c
blob83acd164d39e33d0401edd09273bdfe9223d6284
1 /*
2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (C) 2000-2001 Qualcomm Incorporated
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22 SOFTWARE IS DISCLAIMED.
25 /* Bluetooth HCI sockets. */
27 #include <linux/module.h>
29 #include <linux/types.h>
30 #include <linux/capability.h>
31 #include <linux/errno.h>
32 #include <linux/kernel.h>
33 #include <linux/slab.h>
34 #include <linux/poll.h>
35 #include <linux/fcntl.h>
36 #include <linux/init.h>
37 #include <linux/skbuff.h>
38 #include <linux/workqueue.h>
39 #include <linux/interrupt.h>
40 #include <linux/compat.h>
41 #include <linux/socket.h>
42 #include <linux/ioctl.h>
43 #include <net/sock.h>
45 #include <asm/system.h>
46 #include <asm/uaccess.h>
47 #include <asm/unaligned.h>
49 #include <net/bluetooth/bluetooth.h>
50 #include <net/bluetooth/hci_core.h>
52 /* ----- HCI socket interface ----- */
54 static inline int hci_test_bit(int nr, void *addr)
56 return *((__u32 *) addr + (nr >> 5)) & ((__u32) 1 << (nr & 31));
59 /* Security filter */
60 static struct hci_sec_filter hci_sec_filter = {
61 /* Packet types */
62 0x10,
63 /* Events */
64 { 0x1000d9fe, 0x0000b00c },
65 /* Commands */
67 { 0x0 },
68 /* OGF_LINK_CTL */
69 { 0xbe000006, 0x00000001, 0x00000000, 0x00 },
70 /* OGF_LINK_POLICY */
71 { 0x00005200, 0x00000000, 0x00000000, 0x00 },
72 /* OGF_HOST_CTL */
73 { 0xaab00200, 0x2b402aaa, 0x05220154, 0x00 },
74 /* OGF_INFO_PARAM */
75 { 0x000002be, 0x00000000, 0x00000000, 0x00 },
76 /* OGF_STATUS_PARAM */
77 { 0x000000ea, 0x00000000, 0x00000000, 0x00 }
81 static struct bt_sock_list hci_sk_list = {
82 .lock = __RW_LOCK_UNLOCKED(hci_sk_list.lock)
85 /* Send frame to RAW socket */
86 void hci_send_to_sock(struct hci_dev *hdev, struct sk_buff *skb)
88 struct sock *sk;
89 struct hlist_node *node;
91 BT_DBG("hdev %p len %d", hdev, skb->len);
93 read_lock(&hci_sk_list.lock);
94 sk_for_each(sk, node, &hci_sk_list.head) {
95 struct hci_filter *flt;
96 struct sk_buff *nskb;
98 if (sk->sk_state != BT_BOUND || hci_pi(sk)->hdev != hdev)
99 continue;
101 /* Don't send frame to the socket it came from */
102 if (skb->sk == sk)
103 continue;
105 /* Apply filter */
106 flt = &hci_pi(sk)->filter;
108 if (!test_bit((bt_cb(skb)->pkt_type == HCI_VENDOR_PKT) ?
109 0 : (bt_cb(skb)->pkt_type & HCI_FLT_TYPE_BITS), &flt->type_mask))
110 continue;
112 if (bt_cb(skb)->pkt_type == HCI_EVENT_PKT) {
113 register int evt = (*(__u8 *)skb->data & HCI_FLT_EVENT_BITS);
115 if (!hci_test_bit(evt, &flt->event_mask))
116 continue;
118 if (flt->opcode &&
119 ((evt == HCI_EV_CMD_COMPLETE &&
120 flt->opcode !=
121 get_unaligned((__le16 *)(skb->data + 3))) ||
122 (evt == HCI_EV_CMD_STATUS &&
123 flt->opcode !=
124 get_unaligned((__le16 *)(skb->data + 4)))))
125 continue;
128 if (!(nskb = skb_clone(skb, GFP_ATOMIC)))
129 continue;
131 /* Put type byte before the data */
132 memcpy(skb_push(nskb, 1), &bt_cb(nskb)->pkt_type, 1);
134 if (sock_queue_rcv_skb(sk, nskb))
135 kfree_skb(nskb);
137 read_unlock(&hci_sk_list.lock);
140 static int hci_sock_release(struct socket *sock)
142 struct sock *sk = sock->sk;
143 struct hci_dev *hdev;
145 BT_DBG("sock %p sk %p", sock, sk);
147 if (!sk)
148 return 0;
150 hdev = hci_pi(sk)->hdev;
152 bt_sock_unlink(&hci_sk_list, sk);
154 if (hdev) {
155 atomic_dec(&hdev->promisc);
156 hci_dev_put(hdev);
159 sock_orphan(sk);
161 skb_queue_purge(&sk->sk_receive_queue);
162 skb_queue_purge(&sk->sk_write_queue);
164 sock_put(sk);
165 return 0;
168 struct bdaddr_list *hci_blacklist_lookup(struct hci_dev *hdev, bdaddr_t *bdaddr)
170 struct list_head *p;
172 list_for_each(p, &hdev->blacklist) {
173 struct bdaddr_list *b;
175 b = list_entry(p, struct bdaddr_list, list);
177 if (bacmp(bdaddr, &b->bdaddr) == 0)
178 return b;
181 return NULL;
184 static int hci_blacklist_add(struct hci_dev *hdev, void __user *arg)
186 bdaddr_t bdaddr;
187 struct bdaddr_list *entry;
189 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
190 return -EFAULT;
192 if (bacmp(&bdaddr, BDADDR_ANY) == 0)
193 return -EBADF;
195 if (hci_blacklist_lookup(hdev, &bdaddr))
196 return -EEXIST;
198 entry = kzalloc(sizeof(struct bdaddr_list), GFP_KERNEL);
199 if (!entry)
200 return -ENOMEM;
202 bacpy(&entry->bdaddr, &bdaddr);
204 list_add(&entry->list, &hdev->blacklist);
206 return 0;
209 int hci_blacklist_clear(struct hci_dev *hdev)
211 struct list_head *p, *n;
213 list_for_each_safe(p, n, &hdev->blacklist) {
214 struct bdaddr_list *b;
216 b = list_entry(p, struct bdaddr_list, list);
218 list_del(p);
219 kfree(b);
222 return 0;
225 static int hci_blacklist_del(struct hci_dev *hdev, void __user *arg)
227 bdaddr_t bdaddr;
228 struct bdaddr_list *entry;
230 if (copy_from_user(&bdaddr, arg, sizeof(bdaddr)))
231 return -EFAULT;
233 if (bacmp(&bdaddr, BDADDR_ANY) == 0)
234 return hci_blacklist_clear(hdev);
236 entry = hci_blacklist_lookup(hdev, &bdaddr);
237 if (!entry)
238 return -ENOENT;
240 list_del(&entry->list);
241 kfree(entry);
243 return 0;
246 /* Ioctls that require bound socket */
247 static inline int hci_sock_bound_ioctl(struct sock *sk, unsigned int cmd, unsigned long arg)
249 struct hci_dev *hdev = hci_pi(sk)->hdev;
251 if (!hdev)
252 return -EBADFD;
254 switch (cmd) {
255 case HCISETRAW:
256 if (!capable(CAP_NET_ADMIN))
257 return -EACCES;
259 if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
260 return -EPERM;
262 if (arg)
263 set_bit(HCI_RAW, &hdev->flags);
264 else
265 clear_bit(HCI_RAW, &hdev->flags);
267 return 0;
269 case HCIGETCONNINFO:
270 return hci_get_conn_info(hdev, (void __user *) arg);
272 case HCIGETAUTHINFO:
273 return hci_get_auth_info(hdev, (void __user *) arg);
275 case HCIBLOCKADDR:
276 if (!capable(CAP_NET_ADMIN))
277 return -EACCES;
278 return hci_blacklist_add(hdev, (void __user *) arg);
280 case HCIUNBLOCKADDR:
281 if (!capable(CAP_NET_ADMIN))
282 return -EACCES;
283 return hci_blacklist_del(hdev, (void __user *) arg);
285 default:
286 if (hdev->ioctl)
287 return hdev->ioctl(hdev, cmd, arg);
288 return -EINVAL;
292 static int hci_sock_ioctl(struct socket *sock, unsigned int cmd, unsigned long arg)
294 struct sock *sk = sock->sk;
295 void __user *argp = (void __user *) arg;
296 int err;
298 BT_DBG("cmd %x arg %lx", cmd, arg);
300 switch (cmd) {
301 case HCIGETDEVLIST:
302 return hci_get_dev_list(argp);
304 case HCIGETDEVINFO:
305 return hci_get_dev_info(argp);
307 case HCIGETCONNLIST:
308 return hci_get_conn_list(argp);
310 case HCIDEVUP:
311 if (!capable(CAP_NET_ADMIN))
312 return -EACCES;
313 return hci_dev_open(arg);
315 case HCIDEVDOWN:
316 if (!capable(CAP_NET_ADMIN))
317 return -EACCES;
318 return hci_dev_close(arg);
320 case HCIDEVRESET:
321 if (!capable(CAP_NET_ADMIN))
322 return -EACCES;
323 return hci_dev_reset(arg);
325 case HCIDEVRESTAT:
326 if (!capable(CAP_NET_ADMIN))
327 return -EACCES;
328 return hci_dev_reset_stat(arg);
330 case HCISETSCAN:
331 case HCISETAUTH:
332 case HCISETENCRYPT:
333 case HCISETPTYPE:
334 case HCISETLINKPOL:
335 case HCISETLINKMODE:
336 case HCISETACLMTU:
337 case HCISETSCOMTU:
338 if (!capable(CAP_NET_ADMIN))
339 return -EACCES;
340 return hci_dev_cmd(cmd, argp);
342 case HCIINQUIRY:
343 return hci_inquiry(argp);
345 default:
346 lock_sock(sk);
347 err = hci_sock_bound_ioctl(sk, cmd, arg);
348 release_sock(sk);
349 return err;
353 static int hci_sock_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
355 struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
356 struct sock *sk = sock->sk;
357 struct hci_dev *hdev = NULL;
358 int err = 0;
360 BT_DBG("sock %p sk %p", sock, sk);
362 if (!haddr || haddr->hci_family != AF_BLUETOOTH)
363 return -EINVAL;
365 lock_sock(sk);
367 if (hci_pi(sk)->hdev) {
368 err = -EALREADY;
369 goto done;
372 if (haddr->hci_dev != HCI_DEV_NONE) {
373 if (!(hdev = hci_dev_get(haddr->hci_dev))) {
374 err = -ENODEV;
375 goto done;
378 atomic_inc(&hdev->promisc);
381 hci_pi(sk)->hdev = hdev;
382 sk->sk_state = BT_BOUND;
384 done:
385 release_sock(sk);
386 return err;
389 static int hci_sock_getname(struct socket *sock, struct sockaddr *addr, int *addr_len, int peer)
391 struct sockaddr_hci *haddr = (struct sockaddr_hci *) addr;
392 struct sock *sk = sock->sk;
393 struct hci_dev *hdev = hci_pi(sk)->hdev;
395 BT_DBG("sock %p sk %p", sock, sk);
397 if (!hdev)
398 return -EBADFD;
400 lock_sock(sk);
402 *addr_len = sizeof(*haddr);
403 haddr->hci_family = AF_BLUETOOTH;
404 haddr->hci_dev = hdev->id;
406 release_sock(sk);
407 return 0;
410 static inline void hci_sock_cmsg(struct sock *sk, struct msghdr *msg, struct sk_buff *skb)
412 __u32 mask = hci_pi(sk)->cmsg_mask;
414 if (mask & HCI_CMSG_DIR) {
415 int incoming = bt_cb(skb)->incoming;
416 put_cmsg(msg, SOL_HCI, HCI_CMSG_DIR, sizeof(incoming), &incoming);
419 if (mask & HCI_CMSG_TSTAMP) {
420 #ifdef CONFIG_COMPAT
421 struct compat_timeval ctv;
422 #endif
423 struct timeval tv;
424 void *data;
425 int len;
427 skb_get_timestamp(skb, &tv);
429 data = &tv;
430 len = sizeof(tv);
431 #ifdef CONFIG_COMPAT
432 if (msg->msg_flags & MSG_CMSG_COMPAT) {
433 ctv.tv_sec = tv.tv_sec;
434 ctv.tv_usec = tv.tv_usec;
435 data = &ctv;
436 len = sizeof(ctv);
438 #endif
440 put_cmsg(msg, SOL_HCI, HCI_CMSG_TSTAMP, len, data);
444 static int hci_sock_recvmsg(struct kiocb *iocb, struct socket *sock,
445 struct msghdr *msg, size_t len, int flags)
447 int noblock = flags & MSG_DONTWAIT;
448 struct sock *sk = sock->sk;
449 struct sk_buff *skb;
450 int copied, err;
452 BT_DBG("sock %p, sk %p", sock, sk);
454 if (flags & (MSG_OOB))
455 return -EOPNOTSUPP;
457 if (sk->sk_state == BT_CLOSED)
458 return 0;
460 if (!(skb = skb_recv_datagram(sk, flags, noblock, &err)))
461 return err;
463 msg->msg_namelen = 0;
465 copied = skb->len;
466 if (len < copied) {
467 msg->msg_flags |= MSG_TRUNC;
468 copied = len;
471 skb_reset_transport_header(skb);
472 err = skb_copy_datagram_iovec(skb, 0, msg->msg_iov, copied);
474 hci_sock_cmsg(sk, msg, skb);
476 skb_free_datagram(sk, skb);
478 return err ? : copied;
481 static int hci_sock_sendmsg(struct kiocb *iocb, struct socket *sock,
482 struct msghdr *msg, size_t len)
484 struct sock *sk = sock->sk;
485 struct hci_dev *hdev;
486 struct sk_buff *skb;
487 int err;
489 BT_DBG("sock %p sk %p", sock, sk);
491 if (msg->msg_flags & MSG_OOB)
492 return -EOPNOTSUPP;
494 if (msg->msg_flags & ~(MSG_DONTWAIT|MSG_NOSIGNAL|MSG_ERRQUEUE))
495 return -EINVAL;
497 if (len < 4 || len > HCI_MAX_FRAME_SIZE)
498 return -EINVAL;
500 lock_sock(sk);
502 if (!(hdev = hci_pi(sk)->hdev)) {
503 err = -EBADFD;
504 goto done;
507 if (!test_bit(HCI_UP, &hdev->flags)) {
508 err = -ENETDOWN;
509 goto done;
512 if (!(skb = bt_skb_send_alloc(sk, len, msg->msg_flags & MSG_DONTWAIT, &err)))
513 goto done;
515 if (memcpy_fromiovec(skb_put(skb, len), msg->msg_iov, len)) {
516 err = -EFAULT;
517 goto drop;
520 bt_cb(skb)->pkt_type = *((unsigned char *) skb->data);
521 skb_pull(skb, 1);
522 skb->dev = (void *) hdev;
524 if (bt_cb(skb)->pkt_type == HCI_COMMAND_PKT) {
525 u16 opcode = get_unaligned_le16(skb->data);
526 u16 ogf = hci_opcode_ogf(opcode);
527 u16 ocf = hci_opcode_ocf(opcode);
529 if (((ogf > HCI_SFLT_MAX_OGF) ||
530 !hci_test_bit(ocf & HCI_FLT_OCF_BITS, &hci_sec_filter.ocf_mask[ogf])) &&
531 !capable(CAP_NET_RAW)) {
532 err = -EPERM;
533 goto drop;
536 if (test_bit(HCI_RAW, &hdev->flags) || (ogf == 0x3f)) {
537 skb_queue_tail(&hdev->raw_q, skb);
538 tasklet_schedule(&hdev->tx_task);
539 } else {
540 skb_queue_tail(&hdev->cmd_q, skb);
541 tasklet_schedule(&hdev->cmd_task);
543 } else {
544 if (!capable(CAP_NET_RAW)) {
545 err = -EPERM;
546 goto drop;
549 skb_queue_tail(&hdev->raw_q, skb);
550 tasklet_schedule(&hdev->tx_task);
553 err = len;
555 done:
556 release_sock(sk);
557 return err;
559 drop:
560 kfree_skb(skb);
561 goto done;
564 static int hci_sock_setsockopt(struct socket *sock, int level, int optname, char __user *optval, unsigned int len)
566 struct hci_ufilter uf = { .opcode = 0 };
567 struct sock *sk = sock->sk;
568 int err = 0, opt = 0;
570 BT_DBG("sk %p, opt %d", sk, optname);
572 lock_sock(sk);
574 switch (optname) {
575 case HCI_DATA_DIR:
576 if (get_user(opt, (int __user *)optval)) {
577 err = -EFAULT;
578 break;
581 if (opt)
582 hci_pi(sk)->cmsg_mask |= HCI_CMSG_DIR;
583 else
584 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_DIR;
585 break;
587 case HCI_TIME_STAMP:
588 if (get_user(opt, (int __user *)optval)) {
589 err = -EFAULT;
590 break;
593 if (opt)
594 hci_pi(sk)->cmsg_mask |= HCI_CMSG_TSTAMP;
595 else
596 hci_pi(sk)->cmsg_mask &= ~HCI_CMSG_TSTAMP;
597 break;
599 case HCI_FILTER:
601 struct hci_filter *f = &hci_pi(sk)->filter;
603 uf.type_mask = f->type_mask;
604 uf.opcode = f->opcode;
605 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
606 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
609 len = min_t(unsigned int, len, sizeof(uf));
610 if (copy_from_user(&uf, optval, len)) {
611 err = -EFAULT;
612 break;
615 if (!capable(CAP_NET_RAW)) {
616 uf.type_mask &= hci_sec_filter.type_mask;
617 uf.event_mask[0] &= *((u32 *) hci_sec_filter.event_mask + 0);
618 uf.event_mask[1] &= *((u32 *) hci_sec_filter.event_mask + 1);
622 struct hci_filter *f = &hci_pi(sk)->filter;
624 f->type_mask = uf.type_mask;
625 f->opcode = uf.opcode;
626 *((u32 *) f->event_mask + 0) = uf.event_mask[0];
627 *((u32 *) f->event_mask + 1) = uf.event_mask[1];
629 break;
631 default:
632 err = -ENOPROTOOPT;
633 break;
636 release_sock(sk);
637 return err;
640 static int hci_sock_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen)
642 struct hci_ufilter uf;
643 struct sock *sk = sock->sk;
644 int len, opt;
646 if (get_user(len, optlen))
647 return -EFAULT;
649 switch (optname) {
650 case HCI_DATA_DIR:
651 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_DIR)
652 opt = 1;
653 else
654 opt = 0;
656 if (put_user(opt, optval))
657 return -EFAULT;
658 break;
660 case HCI_TIME_STAMP:
661 if (hci_pi(sk)->cmsg_mask & HCI_CMSG_TSTAMP)
662 opt = 1;
663 else
664 opt = 0;
666 if (put_user(opt, optval))
667 return -EFAULT;
668 break;
670 case HCI_FILTER:
672 struct hci_filter *f = &hci_pi(sk)->filter;
674 uf.type_mask = f->type_mask;
675 uf.opcode = f->opcode;
676 uf.event_mask[0] = *((u32 *) f->event_mask + 0);
677 uf.event_mask[1] = *((u32 *) f->event_mask + 1);
680 len = min_t(unsigned int, len, sizeof(uf));
681 if (copy_to_user(optval, &uf, len))
682 return -EFAULT;
683 break;
685 default:
686 return -ENOPROTOOPT;
687 break;
690 return 0;
693 static const struct proto_ops hci_sock_ops = {
694 .family = PF_BLUETOOTH,
695 .owner = THIS_MODULE,
696 .release = hci_sock_release,
697 .bind = hci_sock_bind,
698 .getname = hci_sock_getname,
699 .sendmsg = hci_sock_sendmsg,
700 .recvmsg = hci_sock_recvmsg,
701 .ioctl = hci_sock_ioctl,
702 .poll = datagram_poll,
703 .listen = sock_no_listen,
704 .shutdown = sock_no_shutdown,
705 .setsockopt = hci_sock_setsockopt,
706 .getsockopt = hci_sock_getsockopt,
707 .connect = sock_no_connect,
708 .socketpair = sock_no_socketpair,
709 .accept = sock_no_accept,
710 .mmap = sock_no_mmap
713 static struct proto hci_sk_proto = {
714 .name = "HCI",
715 .owner = THIS_MODULE,
716 .obj_size = sizeof(struct hci_pinfo)
719 static int hci_sock_create(struct net *net, struct socket *sock, int protocol,
720 int kern)
722 struct sock *sk;
724 BT_DBG("sock %p", sock);
726 if (sock->type != SOCK_RAW)
727 return -ESOCKTNOSUPPORT;
729 sock->ops = &hci_sock_ops;
731 sk = sk_alloc(net, PF_BLUETOOTH, GFP_ATOMIC, &hci_sk_proto);
732 if (!sk)
733 return -ENOMEM;
735 sock_init_data(sock, sk);
737 sock_reset_flag(sk, SOCK_ZAPPED);
739 sk->sk_protocol = protocol;
741 sock->state = SS_UNCONNECTED;
742 sk->sk_state = BT_OPEN;
744 bt_sock_link(&hci_sk_list, sk);
745 return 0;
748 static int hci_sock_dev_event(struct notifier_block *this, unsigned long event, void *ptr)
750 struct hci_dev *hdev = (struct hci_dev *) ptr;
751 struct hci_ev_si_device ev;
753 BT_DBG("hdev %s event %ld", hdev->name, event);
755 /* Send event to sockets */
756 ev.event = event;
757 ev.dev_id = hdev->id;
758 hci_si_event(NULL, HCI_EV_SI_DEVICE, sizeof(ev), &ev);
760 if (event == HCI_DEV_UNREG) {
761 struct sock *sk;
762 struct hlist_node *node;
764 /* Detach sockets from device */
765 read_lock(&hci_sk_list.lock);
766 sk_for_each(sk, node, &hci_sk_list.head) {
767 local_bh_disable();
768 bh_lock_sock_nested(sk);
769 if (hci_pi(sk)->hdev == hdev) {
770 hci_pi(sk)->hdev = NULL;
771 sk->sk_err = EPIPE;
772 sk->sk_state = BT_OPEN;
773 sk->sk_state_change(sk);
775 hci_dev_put(hdev);
777 bh_unlock_sock(sk);
778 local_bh_enable();
780 read_unlock(&hci_sk_list.lock);
783 return NOTIFY_DONE;
786 static const struct net_proto_family hci_sock_family_ops = {
787 .family = PF_BLUETOOTH,
788 .owner = THIS_MODULE,
789 .create = hci_sock_create,
792 static struct notifier_block hci_sock_nblock = {
793 .notifier_call = hci_sock_dev_event
796 int __init hci_sock_init(void)
798 int err;
800 err = proto_register(&hci_sk_proto, 0);
801 if (err < 0)
802 return err;
804 err = bt_sock_register(BTPROTO_HCI, &hci_sock_family_ops);
805 if (err < 0)
806 goto error;
808 hci_register_notifier(&hci_sock_nblock);
810 BT_INFO("HCI socket layer initialized");
812 return 0;
814 error:
815 BT_ERR("HCI socket registration failed");
816 proto_unregister(&hci_sk_proto);
817 return err;
820 void __exit hci_sock_cleanup(void)
822 if (bt_sock_unregister(BTPROTO_HCI) < 0)
823 BT_ERR("HCI socket unregistration failed");
825 hci_unregister_notifier(&hci_sock_nblock);
827 proto_unregister(&hci_sk_proto);