l2cap_socket.c revision 1.13 1 /* $NetBSD: l2cap_socket.c,v 1.13 2014/05/19 03:18:57 rmind Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.13 2014/05/19 03:18:57 rmind Exp $");
35
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54
55 /*
56 * L2CAP Sockets
57 *
58 * SOCK_SEQPACKET - normal L2CAP connection
59 *
60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 */
62
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70
71 static const struct btproto l2cap_proto = {
72 l2cap_connecting,
73 l2cap_connected,
74 l2cap_disconnected,
75 l2cap_newconn,
76 l2cap_complete,
77 l2cap_linkmode,
78 l2cap_input,
79 };
80
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84
85 static int
86 l2cap_attach1(struct socket *so, int proto)
87 {
88 int error;
89
90 KASSERT(so->so_pcb == NULL);
91
92 if (so->so_lock == NULL) {
93 mutex_obj_hold(bt_lock);
94 so->so_lock = bt_lock;
95 solock(so);
96 }
97 KASSERT(solocked(so));
98
99 /*
100 * For L2CAP socket PCB we just use an l2cap_channel structure
101 * since we have nothing to add..
102 */
103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 if (error)
105 return error;
106
107 return l2cap_attach((struct l2cap_channel **)&so->so_pcb,
108 &l2cap_proto, so);
109 }
110
111 static void
112 l2cap_detach1(struct socket *so)
113 {
114 KASSERT(so->so_pcb != NULL);
115 l2cap_detach((struct l2cap_channel **)&so->so_pcb);
116 KASSERT(so->so_pcb == NULL);
117 }
118
119 /*
120 * User Request.
121 * up is socket
122 * m is either
123 * optional mbuf chain containing message
124 * ioctl command (PRU_CONTROL)
125 * nam is either
126 * optional mbuf chain containing an address
127 * ioctl data (PRU_CONTROL)
128 * message flags (PRU_RCVD)
129 * ctl is either
130 * optional mbuf chain containing socket options
131 * optional interface pointer (PRU_CONTROL, PRU_PURGEIF)
132 * l is pointer to process requesting action (if any)
133 *
134 * we are responsible for disposing of m and ctl if
135 * they are mbuf chains
136 */
137 static int
138 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
139 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
140 {
141 struct l2cap_channel *pcb = up->so_pcb;
142 struct sockaddr_bt *sa;
143 struct mbuf *m0;
144 int err = 0;
145
146 DPRINTFN(2, "%s\n", prurequests[req]);
147 KASSERT(req != PRU_ATTACH);
148 KASSERT(req != PRU_DETACH);
149
150 switch (req) {
151 case PRU_CONTROL:
152 return EPASSTHROUGH;
153
154 case PRU_PURGEIF:
155 return EOPNOTSUPP;
156 }
157
158 if (pcb == NULL) {
159 err = EINVAL;
160 goto release;
161 }
162
163 switch(req) {
164 case PRU_DISCONNECT:
165 soisdisconnecting(up);
166 return l2cap_disconnect(pcb, up->so_linger);
167
168 case PRU_ABORT:
169 l2cap_disconnect(pcb, 0);
170 soisdisconnected(up);
171 l2cap_detach1(up);
172 return 0;
173
174 case PRU_BIND:
175 KASSERT(nam != NULL);
176 sa = mtod(nam, struct sockaddr_bt *);
177
178 if (sa->bt_len != sizeof(struct sockaddr_bt))
179 return EINVAL;
180
181 if (sa->bt_family != AF_BLUETOOTH)
182 return EAFNOSUPPORT;
183
184 return l2cap_bind(pcb, sa);
185
186 case PRU_CONNECT:
187 KASSERT(nam != NULL);
188 sa = mtod(nam, struct sockaddr_bt *);
189
190 if (sa->bt_len != sizeof(struct sockaddr_bt))
191 return EINVAL;
192
193 if (sa->bt_family != AF_BLUETOOTH)
194 return EAFNOSUPPORT;
195
196 soisconnecting(up);
197 return l2cap_connect(pcb, sa);
198
199 case PRU_PEERADDR:
200 KASSERT(nam != NULL);
201 sa = mtod(nam, struct sockaddr_bt *);
202 nam->m_len = sizeof(struct sockaddr_bt);
203 return l2cap_peeraddr(pcb, sa);
204
205 case PRU_SOCKADDR:
206 KASSERT(nam != NULL);
207 sa = mtod(nam, struct sockaddr_bt *);
208 nam->m_len = sizeof(struct sockaddr_bt);
209 return l2cap_sockaddr(pcb, sa);
210
211 case PRU_SHUTDOWN:
212 socantsendmore(up);
213 break;
214
215 case PRU_SEND:
216 KASSERT(m != NULL);
217 if (m->m_pkthdr.len == 0)
218 break;
219
220 if (m->m_pkthdr.len > pcb->lc_omtu) {
221 err = EMSGSIZE;
222 break;
223 }
224
225 m0 = m_copypacket(m, M_DONTWAIT);
226 if (m0 == NULL) {
227 err = ENOMEM;
228 break;
229 }
230
231 if (ctl) /* no use for that */
232 m_freem(ctl);
233
234 sbappendrecord(&up->so_snd, m);
235 return l2cap_send(pcb, m0);
236
237 case PRU_SENSE:
238 return 0; /* (no release) */
239
240 case PRU_RCVD:
241 case PRU_RCVOOB:
242 return EOPNOTSUPP; /* (no release) */
243
244 case PRU_LISTEN:
245 return l2cap_listen(pcb);
246
247 case PRU_ACCEPT:
248 KASSERT(nam != NULL);
249 sa = mtod(nam, struct sockaddr_bt *);
250 nam->m_len = sizeof(struct sockaddr_bt);
251 return l2cap_peeraddr(pcb, sa);
252
253 case PRU_CONNECT2:
254 case PRU_SENDOOB:
255 case PRU_FASTTIMO:
256 case PRU_SLOWTIMO:
257 case PRU_PROTORCV:
258 case PRU_PROTOSEND:
259 err = EOPNOTSUPP;
260 break;
261
262 default:
263 UNKNOWN(req);
264 err = EOPNOTSUPP;
265 break;
266 }
267
268 release:
269 if (m) m_freem(m);
270 if (ctl) m_freem(ctl);
271 return err;
272 }
273
274 /*
275 * l2cap_ctloutput(req, socket, sockopt)
276 *
277 * Apply configuration commands to channel. This corresponds to
278 * "Reconfigure Channel Request" in the L2CAP specification.
279 */
280 int
281 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
282 {
283 struct l2cap_channel *pcb = so->so_pcb;
284 int err = 0;
285
286 DPRINTFN(2, "%s\n", prcorequests[req]);
287
288 if (pcb == NULL)
289 return EINVAL;
290
291 if (sopt->sopt_level != BTPROTO_L2CAP)
292 return ENOPROTOOPT;
293
294 switch(req) {
295 case PRCO_GETOPT:
296 err = l2cap_getopt(pcb, sopt);
297 break;
298
299 case PRCO_SETOPT:
300 err = l2cap_setopt(pcb, sopt);
301 break;
302
303 default:
304 err = ENOPROTOOPT;
305 break;
306 }
307
308 return err;
309 }
310
311 /**********************************************************************
312 *
313 * L2CAP Protocol socket callbacks
314 *
315 */
316
317 static void
318 l2cap_connecting(void *arg)
319 {
320 struct socket *so = arg;
321
322 DPRINTF("Connecting\n");
323 soisconnecting(so);
324 }
325
326 static void
327 l2cap_connected(void *arg)
328 {
329 struct socket *so = arg;
330
331 DPRINTF("Connected\n");
332 soisconnected(so);
333 }
334
335 static void
336 l2cap_disconnected(void *arg, int err)
337 {
338 struct socket *so = arg;
339
340 DPRINTF("Disconnected (%d)\n", err);
341
342 so->so_error = err;
343 soisdisconnected(so);
344 }
345
346 static void *
347 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
348 struct sockaddr_bt *raddr)
349 {
350 struct socket *so = arg;
351
352 DPRINTF("New Connection\n");
353 so = sonewconn(so, false);
354 if (so == NULL)
355 return NULL;
356
357 soisconnecting(so);
358
359 return so->so_pcb;
360 }
361
362 static void
363 l2cap_complete(void *arg, int count)
364 {
365 struct socket *so = arg;
366
367 while (count-- > 0)
368 sbdroprecord(&so->so_snd);
369
370 sowwakeup(so);
371 }
372
373 static void
374 l2cap_linkmode(void *arg, int new)
375 {
376 struct socket *so = arg;
377 struct sockopt sopt;
378 int mode;
379
380 DPRINTF("auth %s, encrypt %s, secure %s\n",
381 (new & L2CAP_LM_AUTH ? "on" : "off"),
382 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
383 (new & L2CAP_LM_SECURE ? "on" : "off"));
384
385 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
386 (void)l2cap_getopt(so->so_pcb, &sopt);
387 (void)sockopt_getint(&sopt, &mode);
388 sockopt_destroy(&sopt);
389
390 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
391 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
392 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
393 l2cap_disconnect(so->so_pcb, 0);
394 }
395
396 static void
397 l2cap_input(void *arg, struct mbuf *m)
398 {
399 struct socket *so = arg;
400
401 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
402 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
403 __func__, m->m_pkthdr.len);
404 m_freem(m);
405 return;
406 }
407
408 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
409
410 sbappendrecord(&so->so_rcv, m);
411 sorwakeup(so);
412 }
413
414 PR_WRAP_USRREQ(l2cap_usrreq)
415
416 #define l2cap_usrreq l2cap_usrreq_wrapper
417
418 const struct pr_usrreqs l2cap_usrreqs = {
419 .pr_attach = l2cap_attach1,
420 .pr_detach = l2cap_detach1,
421 .pr_generic = l2cap_usrreq,
422 };
423