Home | History | Annotate | Line # | Download | only in netbt
l2cap_socket.c revision 1.13
      1 /*	$NetBSD: l2cap_socket.c,v 1.13 2014/05/19 03:18:57 rmind Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2005 Iain Hibbert.
      5  * Copyright (c) 2006 Itronix Inc.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. The name of Itronix Inc. may not be used to endorse
     17  *    or promote products derived from this software without specific
     18  *    prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     27  * ON ANY THEORY OF LIABILITY, WHETHER IN
     28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 #include <sys/cdefs.h>
     34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.13 2014/05/19 03:18:57 rmind Exp $");
     35 
     36 /* load symbolic names */
     37 #ifdef BLUETOOTH_DEBUG
     38 #define PRUREQUESTS
     39 #define PRCOREQUESTS
     40 #endif
     41 
     42 #include <sys/param.h>
     43 #include <sys/domain.h>
     44 #include <sys/kernel.h>
     45 #include <sys/mbuf.h>
     46 #include <sys/proc.h>
     47 #include <sys/protosw.h>
     48 #include <sys/socket.h>
     49 #include <sys/socketvar.h>
     50 #include <sys/systm.h>
     51 
     52 #include <netbt/bluetooth.h>
     53 #include <netbt/l2cap.h>
     54 
     55 /*
     56  * L2CAP Sockets
     57  *
     58  *	SOCK_SEQPACKET - normal L2CAP connection
     59  *
     60  *	SOCK_DGRAM - connectionless L2CAP - XXX not yet
     61  */
     62 
     63 static void l2cap_connecting(void *);
     64 static void l2cap_connected(void *);
     65 static void l2cap_disconnected(void *, int);
     66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
     67 static void l2cap_complete(void *, int);
     68 static void l2cap_linkmode(void *, int);
     69 static void l2cap_input(void *, struct mbuf *);
     70 
     71 static const struct btproto l2cap_proto = {
     72 	l2cap_connecting,
     73 	l2cap_connected,
     74 	l2cap_disconnected,
     75 	l2cap_newconn,
     76 	l2cap_complete,
     77 	l2cap_linkmode,
     78 	l2cap_input,
     79 };
     80 
     81 /* sysctl variables */
     82 int l2cap_sendspace = 4096;
     83 int l2cap_recvspace = 4096;
     84 
     85 static int
     86 l2cap_attach1(struct socket *so, int proto)
     87 {
     88 	int error;
     89 
     90 	KASSERT(so->so_pcb == NULL);
     91 
     92 	if (so->so_lock == NULL) {
     93 		mutex_obj_hold(bt_lock);
     94 		so->so_lock = bt_lock;
     95 		solock(so);
     96 	}
     97 	KASSERT(solocked(so));
     98 
     99 	/*
    100 	 * For L2CAP socket PCB we just use an l2cap_channel structure
    101 	 * since we have nothing to add..
    102 	 */
    103 	error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
    104 	if (error)
    105 		return error;
    106 
    107 	return l2cap_attach((struct l2cap_channel **)&so->so_pcb,
    108 				&l2cap_proto, so);
    109 }
    110 
    111 static void
    112 l2cap_detach1(struct socket *so)
    113 {
    114 	KASSERT(so->so_pcb != NULL);
    115 	l2cap_detach((struct l2cap_channel **)&so->so_pcb);
    116 	KASSERT(so->so_pcb == NULL);
    117 }
    118 
    119 /*
    120  * User Request.
    121  * up is socket
    122  * m is either
    123  *	optional mbuf chain containing message
    124  *	ioctl command (PRU_CONTROL)
    125  * nam is either
    126  *	optional mbuf chain containing an address
    127  *	ioctl data (PRU_CONTROL)
    128  *	message flags (PRU_RCVD)
    129  * ctl is either
    130  *	optional mbuf chain containing socket options
    131  *	optional interface pointer (PRU_CONTROL, PRU_PURGEIF)
    132  * l is pointer to process requesting action (if any)
    133  *
    134  * we are responsible for disposing of m and ctl if
    135  * they are mbuf chains
    136  */
    137 static int
    138 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
    139     struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
    140 {
    141 	struct l2cap_channel *pcb = up->so_pcb;
    142 	struct sockaddr_bt *sa;
    143 	struct mbuf *m0;
    144 	int err = 0;
    145 
    146 	DPRINTFN(2, "%s\n", prurequests[req]);
    147 	KASSERT(req != PRU_ATTACH);
    148 	KASSERT(req != PRU_DETACH);
    149 
    150 	switch (req) {
    151 	case PRU_CONTROL:
    152 		return EPASSTHROUGH;
    153 
    154 	case PRU_PURGEIF:
    155 		return EOPNOTSUPP;
    156 	}
    157 
    158 	if (pcb == NULL) {
    159 		err = EINVAL;
    160 		goto release;
    161 	}
    162 
    163 	switch(req) {
    164 	case PRU_DISCONNECT:
    165 		soisdisconnecting(up);
    166 		return l2cap_disconnect(pcb, up->so_linger);
    167 
    168 	case PRU_ABORT:
    169 		l2cap_disconnect(pcb, 0);
    170 		soisdisconnected(up);
    171 		l2cap_detach1(up);
    172 		return 0;
    173 
    174 	case PRU_BIND:
    175 		KASSERT(nam != NULL);
    176 		sa = mtod(nam, struct sockaddr_bt *);
    177 
    178 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    179 			return EINVAL;
    180 
    181 		if (sa->bt_family != AF_BLUETOOTH)
    182 			return EAFNOSUPPORT;
    183 
    184 		return l2cap_bind(pcb, sa);
    185 
    186 	case PRU_CONNECT:
    187 		KASSERT(nam != NULL);
    188 		sa = mtod(nam, struct sockaddr_bt *);
    189 
    190 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    191 			return EINVAL;
    192 
    193 		if (sa->bt_family != AF_BLUETOOTH)
    194 			return EAFNOSUPPORT;
    195 
    196 		soisconnecting(up);
    197 		return l2cap_connect(pcb, sa);
    198 
    199 	case PRU_PEERADDR:
    200 		KASSERT(nam != NULL);
    201 		sa = mtod(nam, struct sockaddr_bt *);
    202 		nam->m_len = sizeof(struct sockaddr_bt);
    203 		return l2cap_peeraddr(pcb, sa);
    204 
    205 	case PRU_SOCKADDR:
    206 		KASSERT(nam != NULL);
    207 		sa = mtod(nam, struct sockaddr_bt *);
    208 		nam->m_len = sizeof(struct sockaddr_bt);
    209 		return l2cap_sockaddr(pcb, sa);
    210 
    211 	case PRU_SHUTDOWN:
    212 		socantsendmore(up);
    213 		break;
    214 
    215 	case PRU_SEND:
    216 		KASSERT(m != NULL);
    217 		if (m->m_pkthdr.len == 0)
    218 			break;
    219 
    220 		if (m->m_pkthdr.len > pcb->lc_omtu) {
    221 			err = EMSGSIZE;
    222 			break;
    223 		}
    224 
    225 		m0 = m_copypacket(m, M_DONTWAIT);
    226 		if (m0 == NULL) {
    227 			err = ENOMEM;
    228 			break;
    229 		}
    230 
    231 		if (ctl)	/* no use for that */
    232 			m_freem(ctl);
    233 
    234 		sbappendrecord(&up->so_snd, m);
    235 		return l2cap_send(pcb, m0);
    236 
    237 	case PRU_SENSE:
    238 		return 0;		/* (no release) */
    239 
    240 	case PRU_RCVD:
    241 	case PRU_RCVOOB:
    242 		return EOPNOTSUPP;	/* (no release) */
    243 
    244 	case PRU_LISTEN:
    245 		return l2cap_listen(pcb);
    246 
    247 	case PRU_ACCEPT:
    248 		KASSERT(nam != NULL);
    249 		sa = mtod(nam, struct sockaddr_bt *);
    250 		nam->m_len = sizeof(struct sockaddr_bt);
    251 		return l2cap_peeraddr(pcb, sa);
    252 
    253 	case PRU_CONNECT2:
    254 	case PRU_SENDOOB:
    255 	case PRU_FASTTIMO:
    256 	case PRU_SLOWTIMO:
    257 	case PRU_PROTORCV:
    258 	case PRU_PROTOSEND:
    259 		err = EOPNOTSUPP;
    260 		break;
    261 
    262 	default:
    263 		UNKNOWN(req);
    264 		err = EOPNOTSUPP;
    265 		break;
    266 	}
    267 
    268 release:
    269 	if (m) m_freem(m);
    270 	if (ctl) m_freem(ctl);
    271 	return err;
    272 }
    273 
    274 /*
    275  * l2cap_ctloutput(req, socket, sockopt)
    276  *
    277  *	Apply configuration commands to channel. This corresponds to
    278  *	"Reconfigure Channel Request" in the L2CAP specification.
    279  */
    280 int
    281 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
    282 {
    283 	struct l2cap_channel *pcb = so->so_pcb;
    284 	int err = 0;
    285 
    286 	DPRINTFN(2, "%s\n", prcorequests[req]);
    287 
    288 	if (pcb == NULL)
    289 		return EINVAL;
    290 
    291 	if (sopt->sopt_level != BTPROTO_L2CAP)
    292 		return ENOPROTOOPT;
    293 
    294 	switch(req) {
    295 	case PRCO_GETOPT:
    296 		err = l2cap_getopt(pcb, sopt);
    297 		break;
    298 
    299 	case PRCO_SETOPT:
    300 		err = l2cap_setopt(pcb, sopt);
    301 		break;
    302 
    303 	default:
    304 		err = ENOPROTOOPT;
    305 		break;
    306 	}
    307 
    308 	return err;
    309 }
    310 
    311 /**********************************************************************
    312  *
    313  *	L2CAP Protocol socket callbacks
    314  *
    315  */
    316 
    317 static void
    318 l2cap_connecting(void *arg)
    319 {
    320 	struct socket *so = arg;
    321 
    322 	DPRINTF("Connecting\n");
    323 	soisconnecting(so);
    324 }
    325 
    326 static void
    327 l2cap_connected(void *arg)
    328 {
    329 	struct socket *so = arg;
    330 
    331 	DPRINTF("Connected\n");
    332 	soisconnected(so);
    333 }
    334 
    335 static void
    336 l2cap_disconnected(void *arg, int err)
    337 {
    338 	struct socket *so = arg;
    339 
    340 	DPRINTF("Disconnected (%d)\n", err);
    341 
    342 	so->so_error = err;
    343 	soisdisconnected(so);
    344 }
    345 
    346 static void *
    347 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
    348     struct sockaddr_bt *raddr)
    349 {
    350 	struct socket *so = arg;
    351 
    352 	DPRINTF("New Connection\n");
    353 	so = sonewconn(so, false);
    354 	if (so == NULL)
    355 		return NULL;
    356 
    357 	soisconnecting(so);
    358 
    359 	return so->so_pcb;
    360 }
    361 
    362 static void
    363 l2cap_complete(void *arg, int count)
    364 {
    365 	struct socket *so = arg;
    366 
    367 	while (count-- > 0)
    368 		sbdroprecord(&so->so_snd);
    369 
    370 	sowwakeup(so);
    371 }
    372 
    373 static void
    374 l2cap_linkmode(void *arg, int new)
    375 {
    376 	struct socket *so = arg;
    377 	struct sockopt sopt;
    378 	int mode;
    379 
    380 	DPRINTF("auth %s, encrypt %s, secure %s\n",
    381 		(new & L2CAP_LM_AUTH ? "on" : "off"),
    382 		(new & L2CAP_LM_ENCRYPT ? "on" : "off"),
    383 		(new & L2CAP_LM_SECURE ? "on" : "off"));
    384 
    385 	sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
    386 	(void)l2cap_getopt(so->so_pcb, &sopt);
    387 	(void)sockopt_getint(&sopt, &mode);
    388 	sockopt_destroy(&sopt);
    389 
    390 	if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
    391 	    || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
    392 	    || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
    393 		l2cap_disconnect(so->so_pcb, 0);
    394 }
    395 
    396 static void
    397 l2cap_input(void *arg, struct mbuf *m)
    398 {
    399 	struct socket *so = arg;
    400 
    401 	if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
    402 		printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
    403 			__func__, m->m_pkthdr.len);
    404 		m_freem(m);
    405 		return;
    406 	}
    407 
    408 	DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
    409 
    410 	sbappendrecord(&so->so_rcv, m);
    411 	sorwakeup(so);
    412 }
    413 
    414 PR_WRAP_USRREQ(l2cap_usrreq)
    415 
    416 #define	l2cap_usrreq		l2cap_usrreq_wrapper
    417 
    418 const struct pr_usrreqs l2cap_usrreqs = {
    419 	.pr_attach	= l2cap_attach1,
    420 	.pr_detach	= l2cap_detach1,
    421 	.pr_generic	= l2cap_usrreq,
    422 };
    423