l2cap_socket.c revision 1.26 1 1.26 rtr /* $NetBSD: l2cap_socket.c,v 1.26 2014/07/30 10:04:26 rtr Exp $ */
2 1.1 gdamore
3 1.1 gdamore /*-
4 1.1 gdamore * Copyright (c) 2005 Iain Hibbert.
5 1.1 gdamore * Copyright (c) 2006 Itronix Inc.
6 1.1 gdamore * All rights reserved.
7 1.1 gdamore *
8 1.1 gdamore * Redistribution and use in source and binary forms, with or without
9 1.1 gdamore * modification, are permitted provided that the following conditions
10 1.1 gdamore * are met:
11 1.1 gdamore * 1. Redistributions of source code must retain the above copyright
12 1.1 gdamore * notice, this list of conditions and the following disclaimer.
13 1.1 gdamore * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 gdamore * notice, this list of conditions and the following disclaimer in the
15 1.1 gdamore * documentation and/or other materials provided with the distribution.
16 1.1 gdamore * 3. The name of Itronix Inc. may not be used to endorse
17 1.1 gdamore * or promote products derived from this software without specific
18 1.1 gdamore * prior written permission.
19 1.1 gdamore *
20 1.1 gdamore * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 1.1 gdamore * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 1.1 gdamore * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 1.1 gdamore * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 1.1 gdamore * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 1.1 gdamore * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 1.1 gdamore * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 1.1 gdamore * ON ANY THEORY OF LIABILITY, WHETHER IN
28 1.1 gdamore * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 1.1 gdamore * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 1.1 gdamore * POSSIBILITY OF SUCH DAMAGE.
31 1.1 gdamore */
32 1.1 gdamore
33 1.1 gdamore #include <sys/cdefs.h>
34 1.26 rtr __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.26 2014/07/30 10:04:26 rtr Exp $");
35 1.6 plunky
36 1.6 plunky /* load symbolic names */
37 1.6 plunky #ifdef BLUETOOTH_DEBUG
38 1.6 plunky #define PRUREQUESTS
39 1.6 plunky #define PRCOREQUESTS
40 1.6 plunky #endif
41 1.1 gdamore
42 1.1 gdamore #include <sys/param.h>
43 1.1 gdamore #include <sys/domain.h>
44 1.1 gdamore #include <sys/kernel.h>
45 1.1 gdamore #include <sys/mbuf.h>
46 1.1 gdamore #include <sys/proc.h>
47 1.1 gdamore #include <sys/protosw.h>
48 1.1 gdamore #include <sys/socket.h>
49 1.1 gdamore #include <sys/socketvar.h>
50 1.1 gdamore #include <sys/systm.h>
51 1.1 gdamore
52 1.1 gdamore #include <netbt/bluetooth.h>
53 1.1 gdamore #include <netbt/l2cap.h>
54 1.1 gdamore
55 1.1 gdamore /*
56 1.1 gdamore * L2CAP Sockets
57 1.1 gdamore *
58 1.1 gdamore * SOCK_SEQPACKET - normal L2CAP connection
59 1.1 gdamore *
60 1.1 gdamore * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 1.1 gdamore */
62 1.1 gdamore
63 1.1 gdamore static void l2cap_connecting(void *);
64 1.1 gdamore static void l2cap_connected(void *);
65 1.1 gdamore static void l2cap_disconnected(void *, int);
66 1.1 gdamore static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 1.1 gdamore static void l2cap_complete(void *, int);
68 1.7 plunky static void l2cap_linkmode(void *, int);
69 1.1 gdamore static void l2cap_input(void *, struct mbuf *);
70 1.1 gdamore
71 1.1 gdamore static const struct btproto l2cap_proto = {
72 1.1 gdamore l2cap_connecting,
73 1.1 gdamore l2cap_connected,
74 1.1 gdamore l2cap_disconnected,
75 1.1 gdamore l2cap_newconn,
76 1.1 gdamore l2cap_complete,
77 1.7 plunky l2cap_linkmode,
78 1.7 plunky l2cap_input,
79 1.1 gdamore };
80 1.1 gdamore
81 1.1 gdamore /* sysctl variables */
82 1.1 gdamore int l2cap_sendspace = 4096;
83 1.1 gdamore int l2cap_recvspace = 4096;
84 1.1 gdamore
85 1.12 rmind static int
86 1.14 rmind l2cap_attach(struct socket *so, int proto)
87 1.12 rmind {
88 1.12 rmind int error;
89 1.12 rmind
90 1.12 rmind KASSERT(so->so_pcb == NULL);
91 1.12 rmind
92 1.12 rmind if (so->so_lock == NULL) {
93 1.12 rmind mutex_obj_hold(bt_lock);
94 1.12 rmind so->so_lock = bt_lock;
95 1.12 rmind solock(so);
96 1.12 rmind }
97 1.12 rmind KASSERT(solocked(so));
98 1.12 rmind
99 1.12 rmind /*
100 1.12 rmind * For L2CAP socket PCB we just use an l2cap_channel structure
101 1.12 rmind * since we have nothing to add..
102 1.12 rmind */
103 1.12 rmind error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 1.12 rmind if (error)
105 1.12 rmind return error;
106 1.12 rmind
107 1.14 rmind return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 1.12 rmind &l2cap_proto, so);
109 1.12 rmind }
110 1.12 rmind
111 1.12 rmind static void
112 1.14 rmind l2cap_detach(struct socket *so)
113 1.12 rmind {
114 1.13 rmind KASSERT(so->so_pcb != NULL);
115 1.14 rmind l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 1.12 rmind KASSERT(so->so_pcb == NULL);
117 1.12 rmind }
118 1.12 rmind
119 1.16 rtr static int
120 1.23 rtr l2cap_accept(struct socket *so, struct mbuf *nam)
121 1.23 rtr {
122 1.23 rtr struct l2cap_channel *pcb = so->so_pcb;
123 1.23 rtr struct sockaddr_bt *sa;
124 1.23 rtr
125 1.23 rtr KASSERT(solocked(so));
126 1.23 rtr KASSERT(nam != NULL);
127 1.23 rtr
128 1.23 rtr if (pcb == NULL)
129 1.23 rtr return EINVAL;
130 1.23 rtr
131 1.23 rtr sa = mtod(nam, struct sockaddr_bt *);
132 1.23 rtr nam->m_len = sizeof(struct sockaddr_bt);
133 1.23 rtr return l2cap_peeraddr_pcb(pcb, sa);
134 1.23 rtr }
135 1.23 rtr
136 1.23 rtr static int
137 1.25 rtr l2cap_bind(struct socket *so, struct mbuf *nam)
138 1.25 rtr {
139 1.25 rtr struct l2cap_channel *pcb = so->so_pcb;
140 1.25 rtr struct sockaddr_bt *sa;
141 1.25 rtr
142 1.25 rtr KASSERT(solocked(so));
143 1.25 rtr KASSERT(nam != NULL);
144 1.25 rtr
145 1.25 rtr if (pcb == NULL)
146 1.25 rtr return EINVAL;
147 1.25 rtr
148 1.25 rtr sa = mtod(nam, struct sockaddr_bt *);
149 1.25 rtr if (sa->bt_len != sizeof(struct sockaddr_bt))
150 1.25 rtr return EINVAL;
151 1.25 rtr
152 1.25 rtr if (sa->bt_family != AF_BLUETOOTH)
153 1.25 rtr return EAFNOSUPPORT;
154 1.25 rtr
155 1.25 rtr return l2cap_bind_pcb(pcb, sa);
156 1.25 rtr }
157 1.25 rtr
158 1.25 rtr static int
159 1.25 rtr l2cap_listen(struct socket *so)
160 1.25 rtr {
161 1.25 rtr struct l2cap_channel *pcb = so->so_pcb;
162 1.25 rtr
163 1.25 rtr KASSERT(solocked(so));
164 1.25 rtr
165 1.25 rtr if (pcb == NULL)
166 1.25 rtr return EINVAL;
167 1.25 rtr
168 1.25 rtr return l2cap_listen_pcb(pcb);
169 1.25 rtr }
170 1.25 rtr
171 1.25 rtr static int
172 1.26 rtr l2cap_connect(struct socket *so, struct mbuf *nam)
173 1.26 rtr {
174 1.26 rtr struct l2cap_channel *pcb = so->so_pcb;
175 1.26 rtr struct sockaddr_bt *sa;
176 1.26 rtr
177 1.26 rtr KASSERT(solocked(so));
178 1.26 rtr KASSERT(nam != NULL);
179 1.26 rtr
180 1.26 rtr if (pcb == NULL)
181 1.26 rtr return EINVAL;
182 1.26 rtr
183 1.26 rtr sa = mtod(nam, struct sockaddr_bt *);
184 1.26 rtr if (sa->bt_len != sizeof(struct sockaddr_bt))
185 1.26 rtr return EINVAL;
186 1.26 rtr
187 1.26 rtr if (sa->bt_family != AF_BLUETOOTH)
188 1.26 rtr return EAFNOSUPPORT;
189 1.26 rtr
190 1.26 rtr soisconnecting(so);
191 1.26 rtr return l2cap_connect_pcb(pcb, sa);
192 1.26 rtr }
193 1.26 rtr
194 1.26 rtr static int
195 1.21 rtr l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
196 1.16 rtr {
197 1.16 rtr return EPASSTHROUGH;
198 1.16 rtr }
199 1.16 rtr
200 1.18 rtr static int
201 1.18 rtr l2cap_stat(struct socket *so, struct stat *ub)
202 1.18 rtr {
203 1.21 rtr KASSERT(solocked(so));
204 1.21 rtr
205 1.20 rtr return 0;
206 1.18 rtr }
207 1.18 rtr
208 1.22 rtr static int
209 1.22 rtr l2cap_peeraddr(struct socket *so, struct mbuf *nam)
210 1.22 rtr {
211 1.22 rtr struct l2cap_channel *pcb = so->so_pcb;
212 1.22 rtr struct sockaddr_bt *sa;
213 1.22 rtr
214 1.22 rtr KASSERT(solocked(so));
215 1.22 rtr KASSERT(pcb != NULL);
216 1.22 rtr KASSERT(nam != NULL);
217 1.22 rtr
218 1.22 rtr sa = mtod(nam, struct sockaddr_bt *);
219 1.22 rtr nam->m_len = sizeof(struct sockaddr_bt);
220 1.22 rtr return l2cap_peeraddr_pcb(pcb, sa);
221 1.22 rtr }
222 1.22 rtr
223 1.22 rtr static int
224 1.22 rtr l2cap_sockaddr(struct socket *so, struct mbuf *nam)
225 1.22 rtr {
226 1.22 rtr struct l2cap_channel *pcb = so->so_pcb;
227 1.22 rtr struct sockaddr_bt *sa;
228 1.22 rtr
229 1.22 rtr KASSERT(solocked(so));
230 1.22 rtr KASSERT(pcb != NULL);
231 1.22 rtr KASSERT(nam != NULL);
232 1.22 rtr
233 1.22 rtr sa = mtod(nam, struct sockaddr_bt *);
234 1.22 rtr nam->m_len = sizeof(struct sockaddr_bt);
235 1.22 rtr return l2cap_sockaddr_pcb(pcb, sa);
236 1.22 rtr }
237 1.22 rtr
238 1.24 rtr static int
239 1.24 rtr l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
240 1.24 rtr {
241 1.24 rtr KASSERT(solocked(so));
242 1.24 rtr
243 1.24 rtr return EOPNOTSUPP;
244 1.24 rtr }
245 1.24 rtr
246 1.24 rtr static int
247 1.24 rtr l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
248 1.24 rtr {
249 1.24 rtr KASSERT(solocked(so));
250 1.24 rtr
251 1.24 rtr if (m)
252 1.24 rtr m_freem(m);
253 1.24 rtr if (control)
254 1.24 rtr m_freem(control);
255 1.24 rtr
256 1.24 rtr return EOPNOTSUPP;
257 1.24 rtr }
258 1.24 rtr
259 1.1 gdamore /*
260 1.1 gdamore * User Request.
261 1.1 gdamore * up is socket
262 1.16 rtr * m is optional mbuf chain containing message
263 1.1 gdamore * nam is either
264 1.1 gdamore * optional mbuf chain containing an address
265 1.1 gdamore * message flags (PRU_RCVD)
266 1.1 gdamore * ctl is either
267 1.1 gdamore * optional mbuf chain containing socket options
268 1.16 rtr * optional interface pointer PRU_PURGEIF
269 1.1 gdamore * l is pointer to process requesting action (if any)
270 1.1 gdamore *
271 1.1 gdamore * we are responsible for disposing of m and ctl if
272 1.1 gdamore * they are mbuf chains
273 1.1 gdamore */
274 1.11 rmind static int
275 1.1 gdamore l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
276 1.3 christos struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
277 1.1 gdamore {
278 1.1 gdamore struct l2cap_channel *pcb = up->so_pcb;
279 1.1 gdamore struct mbuf *m0;
280 1.1 gdamore int err = 0;
281 1.1 gdamore
282 1.1 gdamore DPRINTFN(2, "%s\n", prurequests[req]);
283 1.12 rmind KASSERT(req != PRU_ATTACH);
284 1.12 rmind KASSERT(req != PRU_DETACH);
285 1.23 rtr KASSERT(req != PRU_ACCEPT);
286 1.25 rtr KASSERT(req != PRU_BIND);
287 1.25 rtr KASSERT(req != PRU_LISTEN);
288 1.26 rtr KASSERT(req != PRU_CONNECT);
289 1.16 rtr KASSERT(req != PRU_CONTROL);
290 1.18 rtr KASSERT(req != PRU_SENSE);
291 1.22 rtr KASSERT(req != PRU_PEERADDR);
292 1.22 rtr KASSERT(req != PRU_SOCKADDR);
293 1.24 rtr KASSERT(req != PRU_RCVOOB);
294 1.24 rtr KASSERT(req != PRU_SENDOOB);
295 1.1 gdamore
296 1.1 gdamore switch (req) {
297 1.1 gdamore case PRU_PURGEIF:
298 1.1 gdamore return EOPNOTSUPP;
299 1.1 gdamore }
300 1.1 gdamore
301 1.1 gdamore if (pcb == NULL) {
302 1.1 gdamore err = EINVAL;
303 1.1 gdamore goto release;
304 1.1 gdamore }
305 1.1 gdamore
306 1.1 gdamore switch(req) {
307 1.1 gdamore case PRU_DISCONNECT:
308 1.1 gdamore soisdisconnecting(up);
309 1.1 gdamore return l2cap_disconnect(pcb, up->so_linger);
310 1.1 gdamore
311 1.1 gdamore case PRU_ABORT:
312 1.1 gdamore l2cap_disconnect(pcb, 0);
313 1.1 gdamore soisdisconnected(up);
314 1.14 rmind l2cap_detach(up);
315 1.12 rmind return 0;
316 1.1 gdamore
317 1.1 gdamore case PRU_SHUTDOWN:
318 1.1 gdamore socantsendmore(up);
319 1.1 gdamore break;
320 1.1 gdamore
321 1.1 gdamore case PRU_SEND:
322 1.5 plunky KASSERT(m != NULL);
323 1.1 gdamore if (m->m_pkthdr.len == 0)
324 1.1 gdamore break;
325 1.1 gdamore
326 1.1 gdamore if (m->m_pkthdr.len > pcb->lc_omtu) {
327 1.1 gdamore err = EMSGSIZE;
328 1.1 gdamore break;
329 1.1 gdamore }
330 1.1 gdamore
331 1.1 gdamore m0 = m_copypacket(m, M_DONTWAIT);
332 1.1 gdamore if (m0 == NULL) {
333 1.1 gdamore err = ENOMEM;
334 1.1 gdamore break;
335 1.1 gdamore }
336 1.1 gdamore
337 1.1 gdamore if (ctl) /* no use for that */
338 1.1 gdamore m_freem(ctl);
339 1.1 gdamore
340 1.1 gdamore sbappendrecord(&up->so_snd, m);
341 1.1 gdamore return l2cap_send(pcb, m0);
342 1.1 gdamore
343 1.1 gdamore case PRU_RCVD:
344 1.1 gdamore return EOPNOTSUPP; /* (no release) */
345 1.1 gdamore
346 1.1 gdamore case PRU_CONNECT2:
347 1.1 gdamore case PRU_FASTTIMO:
348 1.1 gdamore case PRU_SLOWTIMO:
349 1.1 gdamore case PRU_PROTORCV:
350 1.1 gdamore case PRU_PROTOSEND:
351 1.1 gdamore err = EOPNOTSUPP;
352 1.1 gdamore break;
353 1.1 gdamore
354 1.1 gdamore default:
355 1.1 gdamore UNKNOWN(req);
356 1.1 gdamore err = EOPNOTSUPP;
357 1.1 gdamore break;
358 1.1 gdamore }
359 1.1 gdamore
360 1.1 gdamore release:
361 1.1 gdamore if (m) m_freem(m);
362 1.1 gdamore if (ctl) m_freem(ctl);
363 1.1 gdamore return err;
364 1.1 gdamore }
365 1.1 gdamore
366 1.1 gdamore /*
367 1.9 plunky * l2cap_ctloutput(req, socket, sockopt)
368 1.1 gdamore *
369 1.1 gdamore * Apply configuration commands to channel. This corresponds to
370 1.1 gdamore * "Reconfigure Channel Request" in the L2CAP specification.
371 1.1 gdamore */
372 1.1 gdamore int
373 1.9 plunky l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
374 1.1 gdamore {
375 1.1 gdamore struct l2cap_channel *pcb = so->so_pcb;
376 1.1 gdamore int err = 0;
377 1.1 gdamore
378 1.1 gdamore DPRINTFN(2, "%s\n", prcorequests[req]);
379 1.1 gdamore
380 1.4 plunky if (pcb == NULL)
381 1.4 plunky return EINVAL;
382 1.4 plunky
383 1.9 plunky if (sopt->sopt_level != BTPROTO_L2CAP)
384 1.4 plunky return ENOPROTOOPT;
385 1.1 gdamore
386 1.1 gdamore switch(req) {
387 1.1 gdamore case PRCO_GETOPT:
388 1.9 plunky err = l2cap_getopt(pcb, sopt);
389 1.1 gdamore break;
390 1.1 gdamore
391 1.1 gdamore case PRCO_SETOPT:
392 1.9 plunky err = l2cap_setopt(pcb, sopt);
393 1.1 gdamore break;
394 1.1 gdamore
395 1.1 gdamore default:
396 1.4 plunky err = ENOPROTOOPT;
397 1.1 gdamore break;
398 1.1 gdamore }
399 1.1 gdamore
400 1.1 gdamore return err;
401 1.1 gdamore }
402 1.1 gdamore
403 1.1 gdamore /**********************************************************************
404 1.1 gdamore *
405 1.1 gdamore * L2CAP Protocol socket callbacks
406 1.1 gdamore *
407 1.1 gdamore */
408 1.1 gdamore
409 1.1 gdamore static void
410 1.1 gdamore l2cap_connecting(void *arg)
411 1.1 gdamore {
412 1.1 gdamore struct socket *so = arg;
413 1.1 gdamore
414 1.1 gdamore DPRINTF("Connecting\n");
415 1.1 gdamore soisconnecting(so);
416 1.1 gdamore }
417 1.1 gdamore
418 1.1 gdamore static void
419 1.1 gdamore l2cap_connected(void *arg)
420 1.1 gdamore {
421 1.1 gdamore struct socket *so = arg;
422 1.1 gdamore
423 1.1 gdamore DPRINTF("Connected\n");
424 1.1 gdamore soisconnected(so);
425 1.1 gdamore }
426 1.1 gdamore
427 1.1 gdamore static void
428 1.1 gdamore l2cap_disconnected(void *arg, int err)
429 1.1 gdamore {
430 1.1 gdamore struct socket *so = arg;
431 1.1 gdamore
432 1.1 gdamore DPRINTF("Disconnected (%d)\n", err);
433 1.1 gdamore
434 1.1 gdamore so->so_error = err;
435 1.1 gdamore soisdisconnected(so);
436 1.1 gdamore }
437 1.1 gdamore
438 1.1 gdamore static void *
439 1.3 christos l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
440 1.3 christos struct sockaddr_bt *raddr)
441 1.1 gdamore {
442 1.1 gdamore struct socket *so = arg;
443 1.1 gdamore
444 1.1 gdamore DPRINTF("New Connection\n");
445 1.10 rmind so = sonewconn(so, false);
446 1.1 gdamore if (so == NULL)
447 1.1 gdamore return NULL;
448 1.1 gdamore
449 1.1 gdamore soisconnecting(so);
450 1.1 gdamore
451 1.1 gdamore return so->so_pcb;
452 1.1 gdamore }
453 1.1 gdamore
454 1.1 gdamore static void
455 1.1 gdamore l2cap_complete(void *arg, int count)
456 1.1 gdamore {
457 1.1 gdamore struct socket *so = arg;
458 1.1 gdamore
459 1.1 gdamore while (count-- > 0)
460 1.1 gdamore sbdroprecord(&so->so_snd);
461 1.1 gdamore
462 1.1 gdamore sowwakeup(so);
463 1.1 gdamore }
464 1.1 gdamore
465 1.1 gdamore static void
466 1.7 plunky l2cap_linkmode(void *arg, int new)
467 1.7 plunky {
468 1.7 plunky struct socket *so = arg;
469 1.9 plunky struct sockopt sopt;
470 1.7 plunky int mode;
471 1.7 plunky
472 1.7 plunky DPRINTF("auth %s, encrypt %s, secure %s\n",
473 1.7 plunky (new & L2CAP_LM_AUTH ? "on" : "off"),
474 1.7 plunky (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
475 1.7 plunky (new & L2CAP_LM_SECURE ? "on" : "off"));
476 1.7 plunky
477 1.9 plunky sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
478 1.9 plunky (void)l2cap_getopt(so->so_pcb, &sopt);
479 1.9 plunky (void)sockopt_getint(&sopt, &mode);
480 1.9 plunky sockopt_destroy(&sopt);
481 1.9 plunky
482 1.7 plunky if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
483 1.7 plunky || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
484 1.7 plunky || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
485 1.7 plunky l2cap_disconnect(so->so_pcb, 0);
486 1.7 plunky }
487 1.7 plunky
488 1.7 plunky static void
489 1.1 gdamore l2cap_input(void *arg, struct mbuf *m)
490 1.1 gdamore {
491 1.1 gdamore struct socket *so = arg;
492 1.1 gdamore
493 1.1 gdamore if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
494 1.1 gdamore printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
495 1.1 gdamore __func__, m->m_pkthdr.len);
496 1.1 gdamore m_freem(m);
497 1.1 gdamore return;
498 1.1 gdamore }
499 1.1 gdamore
500 1.1 gdamore DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
501 1.1 gdamore
502 1.1 gdamore sbappendrecord(&so->so_rcv, m);
503 1.1 gdamore sorwakeup(so);
504 1.1 gdamore }
505 1.11 rmind
506 1.15 rmind PR_WRAP_USRREQS(l2cap)
507 1.11 rmind
508 1.15 rmind #define l2cap_attach l2cap_attach_wrapper
509 1.15 rmind #define l2cap_detach l2cap_detach_wrapper
510 1.23 rtr #define l2cap_accept l2cap_accept_wrapper
511 1.25 rtr #define l2cap_bind l2cap_bind_wrapper
512 1.25 rtr #define l2cap_listen l2cap_listen_wrapper
513 1.26 rtr #define l2cap_connect l2cap_connect_wrapper
514 1.16 rtr #define l2cap_ioctl l2cap_ioctl_wrapper
515 1.18 rtr #define l2cap_stat l2cap_stat_wrapper
516 1.22 rtr #define l2cap_peeraddr l2cap_peeraddr_wrapper
517 1.22 rtr #define l2cap_sockaddr l2cap_sockaddr_wrapper
518 1.24 rtr #define l2cap_recvoob l2cap_recvoob_wrapper
519 1.24 rtr #define l2cap_sendoob l2cap_sendoob_wrapper
520 1.11 rmind #define l2cap_usrreq l2cap_usrreq_wrapper
521 1.11 rmind
522 1.11 rmind const struct pr_usrreqs l2cap_usrreqs = {
523 1.14 rmind .pr_attach = l2cap_attach,
524 1.14 rmind .pr_detach = l2cap_detach,
525 1.23 rtr .pr_accept = l2cap_accept,
526 1.25 rtr .pr_bind = l2cap_bind,
527 1.25 rtr .pr_listen = l2cap_listen,
528 1.26 rtr .pr_connect = l2cap_connect,
529 1.16 rtr .pr_ioctl = l2cap_ioctl,
530 1.18 rtr .pr_stat = l2cap_stat,
531 1.22 rtr .pr_peeraddr = l2cap_peeraddr,
532 1.22 rtr .pr_sockaddr = l2cap_sockaddr,
533 1.24 rtr .pr_recvoob = l2cap_recvoob,
534 1.24 rtr .pr_sendoob = l2cap_sendoob,
535 1.11 rmind .pr_generic = l2cap_usrreq,
536 1.11 rmind };
537