l2cap_socket.c revision 1.23 1 /* $NetBSD: l2cap_socket.c,v 1.23 2014/07/09 14:41:42 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.23 2014/07/09 14:41:42 rtr Exp $");
35
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54
55 /*
56 * L2CAP Sockets
57 *
58 * SOCK_SEQPACKET - normal L2CAP connection
59 *
60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 */
62
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70
71 static const struct btproto l2cap_proto = {
72 l2cap_connecting,
73 l2cap_connected,
74 l2cap_disconnected,
75 l2cap_newconn,
76 l2cap_complete,
77 l2cap_linkmode,
78 l2cap_input,
79 };
80
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84
85 static int
86 l2cap_attach(struct socket *so, int proto)
87 {
88 int error;
89
90 KASSERT(so->so_pcb == NULL);
91
92 if (so->so_lock == NULL) {
93 mutex_obj_hold(bt_lock);
94 so->so_lock = bt_lock;
95 solock(so);
96 }
97 KASSERT(solocked(so));
98
99 /*
100 * For L2CAP socket PCB we just use an l2cap_channel structure
101 * since we have nothing to add..
102 */
103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 if (error)
105 return error;
106
107 return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 &l2cap_proto, so);
109 }
110
111 static void
112 l2cap_detach(struct socket *so)
113 {
114 KASSERT(so->so_pcb != NULL);
115 l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 KASSERT(so->so_pcb == NULL);
117 }
118
119 static int
120 l2cap_accept(struct socket *so, struct mbuf *nam)
121 {
122 struct l2cap_channel *pcb = so->so_pcb;
123 struct sockaddr_bt *sa;
124
125 KASSERT(solocked(so));
126 KASSERT(nam != NULL);
127
128 if (pcb == NULL)
129 return EINVAL;
130
131 sa = mtod(nam, struct sockaddr_bt *);
132 nam->m_len = sizeof(struct sockaddr_bt);
133 return l2cap_peeraddr_pcb(pcb, sa);
134 }
135
136 static int
137 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
138 {
139 return EPASSTHROUGH;
140 }
141
142 static int
143 l2cap_stat(struct socket *so, struct stat *ub)
144 {
145 KASSERT(solocked(so));
146
147 return 0;
148 }
149
150 static int
151 l2cap_peeraddr(struct socket *so, struct mbuf *nam)
152 {
153 struct l2cap_channel *pcb = so->so_pcb;
154 struct sockaddr_bt *sa;
155
156 KASSERT(solocked(so));
157 KASSERT(pcb != NULL);
158 KASSERT(nam != NULL);
159
160 sa = mtod(nam, struct sockaddr_bt *);
161 nam->m_len = sizeof(struct sockaddr_bt);
162 return l2cap_peeraddr_pcb(pcb, sa);
163 }
164
165 static int
166 l2cap_sockaddr(struct socket *so, struct mbuf *nam)
167 {
168 struct l2cap_channel *pcb = so->so_pcb;
169 struct sockaddr_bt *sa;
170
171 KASSERT(solocked(so));
172 KASSERT(pcb != NULL);
173 KASSERT(nam != NULL);
174
175 sa = mtod(nam, struct sockaddr_bt *);
176 nam->m_len = sizeof(struct sockaddr_bt);
177 return l2cap_sockaddr_pcb(pcb, sa);
178 }
179
180 /*
181 * User Request.
182 * up is socket
183 * m is optional mbuf chain containing message
184 * nam is either
185 * optional mbuf chain containing an address
186 * message flags (PRU_RCVD)
187 * ctl is either
188 * optional mbuf chain containing socket options
189 * optional interface pointer PRU_PURGEIF
190 * l is pointer to process requesting action (if any)
191 *
192 * we are responsible for disposing of m and ctl if
193 * they are mbuf chains
194 */
195 static int
196 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
197 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
198 {
199 struct l2cap_channel *pcb = up->so_pcb;
200 struct sockaddr_bt *sa;
201 struct mbuf *m0;
202 int err = 0;
203
204 DPRINTFN(2, "%s\n", prurequests[req]);
205 KASSERT(req != PRU_ATTACH);
206 KASSERT(req != PRU_DETACH);
207 KASSERT(req != PRU_ACCEPT);
208 KASSERT(req != PRU_CONTROL);
209 KASSERT(req != PRU_SENSE);
210 KASSERT(req != PRU_PEERADDR);
211 KASSERT(req != PRU_SOCKADDR);
212
213 switch (req) {
214 case PRU_PURGEIF:
215 return EOPNOTSUPP;
216 }
217
218 if (pcb == NULL) {
219 err = EINVAL;
220 goto release;
221 }
222
223 switch(req) {
224 case PRU_DISCONNECT:
225 soisdisconnecting(up);
226 return l2cap_disconnect(pcb, up->so_linger);
227
228 case PRU_ABORT:
229 l2cap_disconnect(pcb, 0);
230 soisdisconnected(up);
231 l2cap_detach(up);
232 return 0;
233
234 case PRU_BIND:
235 KASSERT(nam != NULL);
236 sa = mtod(nam, struct sockaddr_bt *);
237
238 if (sa->bt_len != sizeof(struct sockaddr_bt))
239 return EINVAL;
240
241 if (sa->bt_family != AF_BLUETOOTH)
242 return EAFNOSUPPORT;
243
244 return l2cap_bind(pcb, sa);
245
246 case PRU_CONNECT:
247 KASSERT(nam != NULL);
248 sa = mtod(nam, struct sockaddr_bt *);
249
250 if (sa->bt_len != sizeof(struct sockaddr_bt))
251 return EINVAL;
252
253 if (sa->bt_family != AF_BLUETOOTH)
254 return EAFNOSUPPORT;
255
256 soisconnecting(up);
257 return l2cap_connect(pcb, sa);
258
259 case PRU_SHUTDOWN:
260 socantsendmore(up);
261 break;
262
263 case PRU_SEND:
264 KASSERT(m != NULL);
265 if (m->m_pkthdr.len == 0)
266 break;
267
268 if (m->m_pkthdr.len > pcb->lc_omtu) {
269 err = EMSGSIZE;
270 break;
271 }
272
273 m0 = m_copypacket(m, M_DONTWAIT);
274 if (m0 == NULL) {
275 err = ENOMEM;
276 break;
277 }
278
279 if (ctl) /* no use for that */
280 m_freem(ctl);
281
282 sbappendrecord(&up->so_snd, m);
283 return l2cap_send(pcb, m0);
284
285 case PRU_RCVD:
286 case PRU_RCVOOB:
287 return EOPNOTSUPP; /* (no release) */
288
289 case PRU_LISTEN:
290 return l2cap_listen(pcb);
291
292 case PRU_CONNECT2:
293 case PRU_SENDOOB:
294 case PRU_FASTTIMO:
295 case PRU_SLOWTIMO:
296 case PRU_PROTORCV:
297 case PRU_PROTOSEND:
298 err = EOPNOTSUPP;
299 break;
300
301 default:
302 UNKNOWN(req);
303 err = EOPNOTSUPP;
304 break;
305 }
306
307 release:
308 if (m) m_freem(m);
309 if (ctl) m_freem(ctl);
310 return err;
311 }
312
313 /*
314 * l2cap_ctloutput(req, socket, sockopt)
315 *
316 * Apply configuration commands to channel. This corresponds to
317 * "Reconfigure Channel Request" in the L2CAP specification.
318 */
319 int
320 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
321 {
322 struct l2cap_channel *pcb = so->so_pcb;
323 int err = 0;
324
325 DPRINTFN(2, "%s\n", prcorequests[req]);
326
327 if (pcb == NULL)
328 return EINVAL;
329
330 if (sopt->sopt_level != BTPROTO_L2CAP)
331 return ENOPROTOOPT;
332
333 switch(req) {
334 case PRCO_GETOPT:
335 err = l2cap_getopt(pcb, sopt);
336 break;
337
338 case PRCO_SETOPT:
339 err = l2cap_setopt(pcb, sopt);
340 break;
341
342 default:
343 err = ENOPROTOOPT;
344 break;
345 }
346
347 return err;
348 }
349
350 /**********************************************************************
351 *
352 * L2CAP Protocol socket callbacks
353 *
354 */
355
356 static void
357 l2cap_connecting(void *arg)
358 {
359 struct socket *so = arg;
360
361 DPRINTF("Connecting\n");
362 soisconnecting(so);
363 }
364
365 static void
366 l2cap_connected(void *arg)
367 {
368 struct socket *so = arg;
369
370 DPRINTF("Connected\n");
371 soisconnected(so);
372 }
373
374 static void
375 l2cap_disconnected(void *arg, int err)
376 {
377 struct socket *so = arg;
378
379 DPRINTF("Disconnected (%d)\n", err);
380
381 so->so_error = err;
382 soisdisconnected(so);
383 }
384
385 static void *
386 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
387 struct sockaddr_bt *raddr)
388 {
389 struct socket *so = arg;
390
391 DPRINTF("New Connection\n");
392 so = sonewconn(so, false);
393 if (so == NULL)
394 return NULL;
395
396 soisconnecting(so);
397
398 return so->so_pcb;
399 }
400
401 static void
402 l2cap_complete(void *arg, int count)
403 {
404 struct socket *so = arg;
405
406 while (count-- > 0)
407 sbdroprecord(&so->so_snd);
408
409 sowwakeup(so);
410 }
411
412 static void
413 l2cap_linkmode(void *arg, int new)
414 {
415 struct socket *so = arg;
416 struct sockopt sopt;
417 int mode;
418
419 DPRINTF("auth %s, encrypt %s, secure %s\n",
420 (new & L2CAP_LM_AUTH ? "on" : "off"),
421 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
422 (new & L2CAP_LM_SECURE ? "on" : "off"));
423
424 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
425 (void)l2cap_getopt(so->so_pcb, &sopt);
426 (void)sockopt_getint(&sopt, &mode);
427 sockopt_destroy(&sopt);
428
429 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
430 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
431 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
432 l2cap_disconnect(so->so_pcb, 0);
433 }
434
435 static void
436 l2cap_input(void *arg, struct mbuf *m)
437 {
438 struct socket *so = arg;
439
440 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
441 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
442 __func__, m->m_pkthdr.len);
443 m_freem(m);
444 return;
445 }
446
447 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
448
449 sbappendrecord(&so->so_rcv, m);
450 sorwakeup(so);
451 }
452
453 PR_WRAP_USRREQS(l2cap)
454
455 #define l2cap_attach l2cap_attach_wrapper
456 #define l2cap_detach l2cap_detach_wrapper
457 #define l2cap_accept l2cap_accept_wrapper
458 #define l2cap_ioctl l2cap_ioctl_wrapper
459 #define l2cap_stat l2cap_stat_wrapper
460 #define l2cap_peeraddr l2cap_peeraddr_wrapper
461 #define l2cap_sockaddr l2cap_sockaddr_wrapper
462 #define l2cap_usrreq l2cap_usrreq_wrapper
463
464 const struct pr_usrreqs l2cap_usrreqs = {
465 .pr_attach = l2cap_attach,
466 .pr_detach = l2cap_detach,
467 .pr_accept = l2cap_accept,
468 .pr_ioctl = l2cap_ioctl,
469 .pr_stat = l2cap_stat,
470 .pr_peeraddr = l2cap_peeraddr,
471 .pr_sockaddr = l2cap_sockaddr,
472 .pr_generic = l2cap_usrreq,
473 };
474