Home | History | Annotate | Line # | Download | only in netbt
l2cap_socket.c revision 1.24
      1 /*	$NetBSD: l2cap_socket.c,v 1.24 2014/07/23 13:17:18 rtr Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2005 Iain Hibbert.
      5  * Copyright (c) 2006 Itronix Inc.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. The name of Itronix Inc. may not be used to endorse
     17  *    or promote products derived from this software without specific
     18  *    prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     27  * ON ANY THEORY OF LIABILITY, WHETHER IN
     28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 #include <sys/cdefs.h>
     34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.24 2014/07/23 13:17:18 rtr Exp $");
     35 
     36 /* load symbolic names */
     37 #ifdef BLUETOOTH_DEBUG
     38 #define PRUREQUESTS
     39 #define PRCOREQUESTS
     40 #endif
     41 
     42 #include <sys/param.h>
     43 #include <sys/domain.h>
     44 #include <sys/kernel.h>
     45 #include <sys/mbuf.h>
     46 #include <sys/proc.h>
     47 #include <sys/protosw.h>
     48 #include <sys/socket.h>
     49 #include <sys/socketvar.h>
     50 #include <sys/systm.h>
     51 
     52 #include <netbt/bluetooth.h>
     53 #include <netbt/l2cap.h>
     54 
     55 /*
     56  * L2CAP Sockets
     57  *
     58  *	SOCK_SEQPACKET - normal L2CAP connection
     59  *
     60  *	SOCK_DGRAM - connectionless L2CAP - XXX not yet
     61  */
     62 
     63 static void l2cap_connecting(void *);
     64 static void l2cap_connected(void *);
     65 static void l2cap_disconnected(void *, int);
     66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
     67 static void l2cap_complete(void *, int);
     68 static void l2cap_linkmode(void *, int);
     69 static void l2cap_input(void *, struct mbuf *);
     70 
     71 static const struct btproto l2cap_proto = {
     72 	l2cap_connecting,
     73 	l2cap_connected,
     74 	l2cap_disconnected,
     75 	l2cap_newconn,
     76 	l2cap_complete,
     77 	l2cap_linkmode,
     78 	l2cap_input,
     79 };
     80 
     81 /* sysctl variables */
     82 int l2cap_sendspace = 4096;
     83 int l2cap_recvspace = 4096;
     84 
     85 static int
     86 l2cap_attach(struct socket *so, int proto)
     87 {
     88 	int error;
     89 
     90 	KASSERT(so->so_pcb == NULL);
     91 
     92 	if (so->so_lock == NULL) {
     93 		mutex_obj_hold(bt_lock);
     94 		so->so_lock = bt_lock;
     95 		solock(so);
     96 	}
     97 	KASSERT(solocked(so));
     98 
     99 	/*
    100 	 * For L2CAP socket PCB we just use an l2cap_channel structure
    101 	 * since we have nothing to add..
    102 	 */
    103 	error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
    104 	if (error)
    105 		return error;
    106 
    107 	return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
    108 				&l2cap_proto, so);
    109 }
    110 
    111 static void
    112 l2cap_detach(struct socket *so)
    113 {
    114 	KASSERT(so->so_pcb != NULL);
    115 	l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
    116 	KASSERT(so->so_pcb == NULL);
    117 }
    118 
    119 static int
    120 l2cap_accept(struct socket *so, struct mbuf *nam)
    121 {
    122 	struct l2cap_channel *pcb = so->so_pcb;
    123 	struct sockaddr_bt *sa;
    124 
    125 	KASSERT(solocked(so));
    126 	KASSERT(nam != NULL);
    127 
    128 	if (pcb == NULL)
    129 		return EINVAL;
    130 
    131 	sa = mtod(nam, struct sockaddr_bt *);
    132 	nam->m_len = sizeof(struct sockaddr_bt);
    133 	return l2cap_peeraddr_pcb(pcb, sa);
    134 }
    135 
    136 static int
    137 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
    138 {
    139 	return EPASSTHROUGH;
    140 }
    141 
    142 static int
    143 l2cap_stat(struct socket *so, struct stat *ub)
    144 {
    145 	KASSERT(solocked(so));
    146 
    147 	return 0;
    148 }
    149 
    150 static int
    151 l2cap_peeraddr(struct socket *so, struct mbuf *nam)
    152 {
    153 	struct l2cap_channel *pcb = so->so_pcb;
    154 	struct sockaddr_bt *sa;
    155 
    156 	KASSERT(solocked(so));
    157 	KASSERT(pcb != NULL);
    158 	KASSERT(nam != NULL);
    159 
    160 	sa = mtod(nam, struct sockaddr_bt *);
    161 	nam->m_len = sizeof(struct sockaddr_bt);
    162 	return l2cap_peeraddr_pcb(pcb, sa);
    163 }
    164 
    165 static int
    166 l2cap_sockaddr(struct socket *so, struct mbuf *nam)
    167 {
    168 	struct l2cap_channel *pcb = so->so_pcb;
    169 	struct sockaddr_bt *sa;
    170 
    171 	KASSERT(solocked(so));
    172 	KASSERT(pcb != NULL);
    173 	KASSERT(nam != NULL);
    174 
    175 	sa = mtod(nam, struct sockaddr_bt *);
    176 	nam->m_len = sizeof(struct sockaddr_bt);
    177 	return l2cap_sockaddr_pcb(pcb, sa);
    178 }
    179 
    180 static int
    181 l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
    182 {
    183 	KASSERT(solocked(so));
    184 
    185 	return EOPNOTSUPP;
    186 }
    187 
    188 static int
    189 l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
    190 {
    191 	KASSERT(solocked(so));
    192 
    193 	if (m)
    194 		m_freem(m);
    195 	if (control)
    196 		m_freem(control);
    197 
    198 	return EOPNOTSUPP;
    199 }
    200 
    201 /*
    202  * User Request.
    203  * up is socket
    204  * m is optional mbuf chain containing message
    205  * nam is either
    206  *	optional mbuf chain containing an address
    207  *	message flags (PRU_RCVD)
    208  * ctl is either
    209  *	optional mbuf chain containing socket options
    210  *	optional interface pointer PRU_PURGEIF
    211  * l is pointer to process requesting action (if any)
    212  *
    213  * we are responsible for disposing of m and ctl if
    214  * they are mbuf chains
    215  */
    216 static int
    217 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
    218     struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
    219 {
    220 	struct l2cap_channel *pcb = up->so_pcb;
    221 	struct sockaddr_bt *sa;
    222 	struct mbuf *m0;
    223 	int err = 0;
    224 
    225 	DPRINTFN(2, "%s\n", prurequests[req]);
    226 	KASSERT(req != PRU_ATTACH);
    227 	KASSERT(req != PRU_DETACH);
    228 	KASSERT(req != PRU_ACCEPT);
    229 	KASSERT(req != PRU_CONTROL);
    230 	KASSERT(req != PRU_SENSE);
    231 	KASSERT(req != PRU_PEERADDR);
    232 	KASSERT(req != PRU_SOCKADDR);
    233 	KASSERT(req != PRU_RCVOOB);
    234 	KASSERT(req != PRU_SENDOOB);
    235 
    236 	switch (req) {
    237 	case PRU_PURGEIF:
    238 		return EOPNOTSUPP;
    239 	}
    240 
    241 	if (pcb == NULL) {
    242 		err = EINVAL;
    243 		goto release;
    244 	}
    245 
    246 	switch(req) {
    247 	case PRU_DISCONNECT:
    248 		soisdisconnecting(up);
    249 		return l2cap_disconnect(pcb, up->so_linger);
    250 
    251 	case PRU_ABORT:
    252 		l2cap_disconnect(pcb, 0);
    253 		soisdisconnected(up);
    254 		l2cap_detach(up);
    255 		return 0;
    256 
    257 	case PRU_BIND:
    258 		KASSERT(nam != NULL);
    259 		sa = mtod(nam, struct sockaddr_bt *);
    260 
    261 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    262 			return EINVAL;
    263 
    264 		if (sa->bt_family != AF_BLUETOOTH)
    265 			return EAFNOSUPPORT;
    266 
    267 		return l2cap_bind(pcb, sa);
    268 
    269 	case PRU_CONNECT:
    270 		KASSERT(nam != NULL);
    271 		sa = mtod(nam, struct sockaddr_bt *);
    272 
    273 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    274 			return EINVAL;
    275 
    276 		if (sa->bt_family != AF_BLUETOOTH)
    277 			return EAFNOSUPPORT;
    278 
    279 		soisconnecting(up);
    280 		return l2cap_connect(pcb, sa);
    281 
    282 	case PRU_SHUTDOWN:
    283 		socantsendmore(up);
    284 		break;
    285 
    286 	case PRU_SEND:
    287 		KASSERT(m != NULL);
    288 		if (m->m_pkthdr.len == 0)
    289 			break;
    290 
    291 		if (m->m_pkthdr.len > pcb->lc_omtu) {
    292 			err = EMSGSIZE;
    293 			break;
    294 		}
    295 
    296 		m0 = m_copypacket(m, M_DONTWAIT);
    297 		if (m0 == NULL) {
    298 			err = ENOMEM;
    299 			break;
    300 		}
    301 
    302 		if (ctl)	/* no use for that */
    303 			m_freem(ctl);
    304 
    305 		sbappendrecord(&up->so_snd, m);
    306 		return l2cap_send(pcb, m0);
    307 
    308 	case PRU_RCVD:
    309 		return EOPNOTSUPP;	/* (no release) */
    310 
    311 	case PRU_LISTEN:
    312 		return l2cap_listen(pcb);
    313 
    314 	case PRU_CONNECT2:
    315 	case PRU_FASTTIMO:
    316 	case PRU_SLOWTIMO:
    317 	case PRU_PROTORCV:
    318 	case PRU_PROTOSEND:
    319 		err = EOPNOTSUPP;
    320 		break;
    321 
    322 	default:
    323 		UNKNOWN(req);
    324 		err = EOPNOTSUPP;
    325 		break;
    326 	}
    327 
    328 release:
    329 	if (m) m_freem(m);
    330 	if (ctl) m_freem(ctl);
    331 	return err;
    332 }
    333 
    334 /*
    335  * l2cap_ctloutput(req, socket, sockopt)
    336  *
    337  *	Apply configuration commands to channel. This corresponds to
    338  *	"Reconfigure Channel Request" in the L2CAP specification.
    339  */
    340 int
    341 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
    342 {
    343 	struct l2cap_channel *pcb = so->so_pcb;
    344 	int err = 0;
    345 
    346 	DPRINTFN(2, "%s\n", prcorequests[req]);
    347 
    348 	if (pcb == NULL)
    349 		return EINVAL;
    350 
    351 	if (sopt->sopt_level != BTPROTO_L2CAP)
    352 		return ENOPROTOOPT;
    353 
    354 	switch(req) {
    355 	case PRCO_GETOPT:
    356 		err = l2cap_getopt(pcb, sopt);
    357 		break;
    358 
    359 	case PRCO_SETOPT:
    360 		err = l2cap_setopt(pcb, sopt);
    361 		break;
    362 
    363 	default:
    364 		err = ENOPROTOOPT;
    365 		break;
    366 	}
    367 
    368 	return err;
    369 }
    370 
    371 /**********************************************************************
    372  *
    373  *	L2CAP Protocol socket callbacks
    374  *
    375  */
    376 
    377 static void
    378 l2cap_connecting(void *arg)
    379 {
    380 	struct socket *so = arg;
    381 
    382 	DPRINTF("Connecting\n");
    383 	soisconnecting(so);
    384 }
    385 
    386 static void
    387 l2cap_connected(void *arg)
    388 {
    389 	struct socket *so = arg;
    390 
    391 	DPRINTF("Connected\n");
    392 	soisconnected(so);
    393 }
    394 
    395 static void
    396 l2cap_disconnected(void *arg, int err)
    397 {
    398 	struct socket *so = arg;
    399 
    400 	DPRINTF("Disconnected (%d)\n", err);
    401 
    402 	so->so_error = err;
    403 	soisdisconnected(so);
    404 }
    405 
    406 static void *
    407 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
    408     struct sockaddr_bt *raddr)
    409 {
    410 	struct socket *so = arg;
    411 
    412 	DPRINTF("New Connection\n");
    413 	so = sonewconn(so, false);
    414 	if (so == NULL)
    415 		return NULL;
    416 
    417 	soisconnecting(so);
    418 
    419 	return so->so_pcb;
    420 }
    421 
    422 static void
    423 l2cap_complete(void *arg, int count)
    424 {
    425 	struct socket *so = arg;
    426 
    427 	while (count-- > 0)
    428 		sbdroprecord(&so->so_snd);
    429 
    430 	sowwakeup(so);
    431 }
    432 
    433 static void
    434 l2cap_linkmode(void *arg, int new)
    435 {
    436 	struct socket *so = arg;
    437 	struct sockopt sopt;
    438 	int mode;
    439 
    440 	DPRINTF("auth %s, encrypt %s, secure %s\n",
    441 		(new & L2CAP_LM_AUTH ? "on" : "off"),
    442 		(new & L2CAP_LM_ENCRYPT ? "on" : "off"),
    443 		(new & L2CAP_LM_SECURE ? "on" : "off"));
    444 
    445 	sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
    446 	(void)l2cap_getopt(so->so_pcb, &sopt);
    447 	(void)sockopt_getint(&sopt, &mode);
    448 	sockopt_destroy(&sopt);
    449 
    450 	if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
    451 	    || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
    452 	    || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
    453 		l2cap_disconnect(so->so_pcb, 0);
    454 }
    455 
    456 static void
    457 l2cap_input(void *arg, struct mbuf *m)
    458 {
    459 	struct socket *so = arg;
    460 
    461 	if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
    462 		printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
    463 			__func__, m->m_pkthdr.len);
    464 		m_freem(m);
    465 		return;
    466 	}
    467 
    468 	DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
    469 
    470 	sbappendrecord(&so->so_rcv, m);
    471 	sorwakeup(so);
    472 }
    473 
    474 PR_WRAP_USRREQS(l2cap)
    475 
    476 #define	l2cap_attach		l2cap_attach_wrapper
    477 #define	l2cap_detach		l2cap_detach_wrapper
    478 #define	l2cap_accept		l2cap_accept_wrapper
    479 #define	l2cap_ioctl		l2cap_ioctl_wrapper
    480 #define	l2cap_stat		l2cap_stat_wrapper
    481 #define	l2cap_peeraddr		l2cap_peeraddr_wrapper
    482 #define	l2cap_sockaddr		l2cap_sockaddr_wrapper
    483 #define	l2cap_recvoob		l2cap_recvoob_wrapper
    484 #define	l2cap_sendoob		l2cap_sendoob_wrapper
    485 #define	l2cap_usrreq		l2cap_usrreq_wrapper
    486 
    487 const struct pr_usrreqs l2cap_usrreqs = {
    488 	.pr_attach	= l2cap_attach,
    489 	.pr_detach	= l2cap_detach,
    490 	.pr_accept	= l2cap_accept,
    491 	.pr_ioctl	= l2cap_ioctl,
    492 	.pr_stat	= l2cap_stat,
    493 	.pr_peeraddr	= l2cap_peeraddr,
    494 	.pr_sockaddr	= l2cap_sockaddr,
    495 	.pr_recvoob	= l2cap_recvoob,
    496 	.pr_sendoob	= l2cap_sendoob,
    497 	.pr_generic	= l2cap_usrreq,
    498 };
    499