l2cap_socket.c revision 1.24 1 /* $NetBSD: l2cap_socket.c,v 1.24 2014/07/23 13:17:18 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.24 2014/07/23 13:17:18 rtr Exp $");
35
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54
55 /*
56 * L2CAP Sockets
57 *
58 * SOCK_SEQPACKET - normal L2CAP connection
59 *
60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 */
62
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70
71 static const struct btproto l2cap_proto = {
72 l2cap_connecting,
73 l2cap_connected,
74 l2cap_disconnected,
75 l2cap_newconn,
76 l2cap_complete,
77 l2cap_linkmode,
78 l2cap_input,
79 };
80
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84
85 static int
86 l2cap_attach(struct socket *so, int proto)
87 {
88 int error;
89
90 KASSERT(so->so_pcb == NULL);
91
92 if (so->so_lock == NULL) {
93 mutex_obj_hold(bt_lock);
94 so->so_lock = bt_lock;
95 solock(so);
96 }
97 KASSERT(solocked(so));
98
99 /*
100 * For L2CAP socket PCB we just use an l2cap_channel structure
101 * since we have nothing to add..
102 */
103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 if (error)
105 return error;
106
107 return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 &l2cap_proto, so);
109 }
110
111 static void
112 l2cap_detach(struct socket *so)
113 {
114 KASSERT(so->so_pcb != NULL);
115 l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 KASSERT(so->so_pcb == NULL);
117 }
118
119 static int
120 l2cap_accept(struct socket *so, struct mbuf *nam)
121 {
122 struct l2cap_channel *pcb = so->so_pcb;
123 struct sockaddr_bt *sa;
124
125 KASSERT(solocked(so));
126 KASSERT(nam != NULL);
127
128 if (pcb == NULL)
129 return EINVAL;
130
131 sa = mtod(nam, struct sockaddr_bt *);
132 nam->m_len = sizeof(struct sockaddr_bt);
133 return l2cap_peeraddr_pcb(pcb, sa);
134 }
135
136 static int
137 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
138 {
139 return EPASSTHROUGH;
140 }
141
142 static int
143 l2cap_stat(struct socket *so, struct stat *ub)
144 {
145 KASSERT(solocked(so));
146
147 return 0;
148 }
149
150 static int
151 l2cap_peeraddr(struct socket *so, struct mbuf *nam)
152 {
153 struct l2cap_channel *pcb = so->so_pcb;
154 struct sockaddr_bt *sa;
155
156 KASSERT(solocked(so));
157 KASSERT(pcb != NULL);
158 KASSERT(nam != NULL);
159
160 sa = mtod(nam, struct sockaddr_bt *);
161 nam->m_len = sizeof(struct sockaddr_bt);
162 return l2cap_peeraddr_pcb(pcb, sa);
163 }
164
165 static int
166 l2cap_sockaddr(struct socket *so, struct mbuf *nam)
167 {
168 struct l2cap_channel *pcb = so->so_pcb;
169 struct sockaddr_bt *sa;
170
171 KASSERT(solocked(so));
172 KASSERT(pcb != NULL);
173 KASSERT(nam != NULL);
174
175 sa = mtod(nam, struct sockaddr_bt *);
176 nam->m_len = sizeof(struct sockaddr_bt);
177 return l2cap_sockaddr_pcb(pcb, sa);
178 }
179
180 static int
181 l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
182 {
183 KASSERT(solocked(so));
184
185 return EOPNOTSUPP;
186 }
187
188 static int
189 l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
190 {
191 KASSERT(solocked(so));
192
193 if (m)
194 m_freem(m);
195 if (control)
196 m_freem(control);
197
198 return EOPNOTSUPP;
199 }
200
201 /*
202 * User Request.
203 * up is socket
204 * m is optional mbuf chain containing message
205 * nam is either
206 * optional mbuf chain containing an address
207 * message flags (PRU_RCVD)
208 * ctl is either
209 * optional mbuf chain containing socket options
210 * optional interface pointer PRU_PURGEIF
211 * l is pointer to process requesting action (if any)
212 *
213 * we are responsible for disposing of m and ctl if
214 * they are mbuf chains
215 */
216 static int
217 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
218 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
219 {
220 struct l2cap_channel *pcb = up->so_pcb;
221 struct sockaddr_bt *sa;
222 struct mbuf *m0;
223 int err = 0;
224
225 DPRINTFN(2, "%s\n", prurequests[req]);
226 KASSERT(req != PRU_ATTACH);
227 KASSERT(req != PRU_DETACH);
228 KASSERT(req != PRU_ACCEPT);
229 KASSERT(req != PRU_CONTROL);
230 KASSERT(req != PRU_SENSE);
231 KASSERT(req != PRU_PEERADDR);
232 KASSERT(req != PRU_SOCKADDR);
233 KASSERT(req != PRU_RCVOOB);
234 KASSERT(req != PRU_SENDOOB);
235
236 switch (req) {
237 case PRU_PURGEIF:
238 return EOPNOTSUPP;
239 }
240
241 if (pcb == NULL) {
242 err = EINVAL;
243 goto release;
244 }
245
246 switch(req) {
247 case PRU_DISCONNECT:
248 soisdisconnecting(up);
249 return l2cap_disconnect(pcb, up->so_linger);
250
251 case PRU_ABORT:
252 l2cap_disconnect(pcb, 0);
253 soisdisconnected(up);
254 l2cap_detach(up);
255 return 0;
256
257 case PRU_BIND:
258 KASSERT(nam != NULL);
259 sa = mtod(nam, struct sockaddr_bt *);
260
261 if (sa->bt_len != sizeof(struct sockaddr_bt))
262 return EINVAL;
263
264 if (sa->bt_family != AF_BLUETOOTH)
265 return EAFNOSUPPORT;
266
267 return l2cap_bind(pcb, sa);
268
269 case PRU_CONNECT:
270 KASSERT(nam != NULL);
271 sa = mtod(nam, struct sockaddr_bt *);
272
273 if (sa->bt_len != sizeof(struct sockaddr_bt))
274 return EINVAL;
275
276 if (sa->bt_family != AF_BLUETOOTH)
277 return EAFNOSUPPORT;
278
279 soisconnecting(up);
280 return l2cap_connect(pcb, sa);
281
282 case PRU_SHUTDOWN:
283 socantsendmore(up);
284 break;
285
286 case PRU_SEND:
287 KASSERT(m != NULL);
288 if (m->m_pkthdr.len == 0)
289 break;
290
291 if (m->m_pkthdr.len > pcb->lc_omtu) {
292 err = EMSGSIZE;
293 break;
294 }
295
296 m0 = m_copypacket(m, M_DONTWAIT);
297 if (m0 == NULL) {
298 err = ENOMEM;
299 break;
300 }
301
302 if (ctl) /* no use for that */
303 m_freem(ctl);
304
305 sbappendrecord(&up->so_snd, m);
306 return l2cap_send(pcb, m0);
307
308 case PRU_RCVD:
309 return EOPNOTSUPP; /* (no release) */
310
311 case PRU_LISTEN:
312 return l2cap_listen(pcb);
313
314 case PRU_CONNECT2:
315 case PRU_FASTTIMO:
316 case PRU_SLOWTIMO:
317 case PRU_PROTORCV:
318 case PRU_PROTOSEND:
319 err = EOPNOTSUPP;
320 break;
321
322 default:
323 UNKNOWN(req);
324 err = EOPNOTSUPP;
325 break;
326 }
327
328 release:
329 if (m) m_freem(m);
330 if (ctl) m_freem(ctl);
331 return err;
332 }
333
334 /*
335 * l2cap_ctloutput(req, socket, sockopt)
336 *
337 * Apply configuration commands to channel. This corresponds to
338 * "Reconfigure Channel Request" in the L2CAP specification.
339 */
340 int
341 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
342 {
343 struct l2cap_channel *pcb = so->so_pcb;
344 int err = 0;
345
346 DPRINTFN(2, "%s\n", prcorequests[req]);
347
348 if (pcb == NULL)
349 return EINVAL;
350
351 if (sopt->sopt_level != BTPROTO_L2CAP)
352 return ENOPROTOOPT;
353
354 switch(req) {
355 case PRCO_GETOPT:
356 err = l2cap_getopt(pcb, sopt);
357 break;
358
359 case PRCO_SETOPT:
360 err = l2cap_setopt(pcb, sopt);
361 break;
362
363 default:
364 err = ENOPROTOOPT;
365 break;
366 }
367
368 return err;
369 }
370
371 /**********************************************************************
372 *
373 * L2CAP Protocol socket callbacks
374 *
375 */
376
377 static void
378 l2cap_connecting(void *arg)
379 {
380 struct socket *so = arg;
381
382 DPRINTF("Connecting\n");
383 soisconnecting(so);
384 }
385
386 static void
387 l2cap_connected(void *arg)
388 {
389 struct socket *so = arg;
390
391 DPRINTF("Connected\n");
392 soisconnected(so);
393 }
394
395 static void
396 l2cap_disconnected(void *arg, int err)
397 {
398 struct socket *so = arg;
399
400 DPRINTF("Disconnected (%d)\n", err);
401
402 so->so_error = err;
403 soisdisconnected(so);
404 }
405
406 static void *
407 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
408 struct sockaddr_bt *raddr)
409 {
410 struct socket *so = arg;
411
412 DPRINTF("New Connection\n");
413 so = sonewconn(so, false);
414 if (so == NULL)
415 return NULL;
416
417 soisconnecting(so);
418
419 return so->so_pcb;
420 }
421
422 static void
423 l2cap_complete(void *arg, int count)
424 {
425 struct socket *so = arg;
426
427 while (count-- > 0)
428 sbdroprecord(&so->so_snd);
429
430 sowwakeup(so);
431 }
432
433 static void
434 l2cap_linkmode(void *arg, int new)
435 {
436 struct socket *so = arg;
437 struct sockopt sopt;
438 int mode;
439
440 DPRINTF("auth %s, encrypt %s, secure %s\n",
441 (new & L2CAP_LM_AUTH ? "on" : "off"),
442 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
443 (new & L2CAP_LM_SECURE ? "on" : "off"));
444
445 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
446 (void)l2cap_getopt(so->so_pcb, &sopt);
447 (void)sockopt_getint(&sopt, &mode);
448 sockopt_destroy(&sopt);
449
450 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
451 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
452 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
453 l2cap_disconnect(so->so_pcb, 0);
454 }
455
456 static void
457 l2cap_input(void *arg, struct mbuf *m)
458 {
459 struct socket *so = arg;
460
461 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
462 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
463 __func__, m->m_pkthdr.len);
464 m_freem(m);
465 return;
466 }
467
468 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
469
470 sbappendrecord(&so->so_rcv, m);
471 sorwakeup(so);
472 }
473
474 PR_WRAP_USRREQS(l2cap)
475
476 #define l2cap_attach l2cap_attach_wrapper
477 #define l2cap_detach l2cap_detach_wrapper
478 #define l2cap_accept l2cap_accept_wrapper
479 #define l2cap_ioctl l2cap_ioctl_wrapper
480 #define l2cap_stat l2cap_stat_wrapper
481 #define l2cap_peeraddr l2cap_peeraddr_wrapper
482 #define l2cap_sockaddr l2cap_sockaddr_wrapper
483 #define l2cap_recvoob l2cap_recvoob_wrapper
484 #define l2cap_sendoob l2cap_sendoob_wrapper
485 #define l2cap_usrreq l2cap_usrreq_wrapper
486
487 const struct pr_usrreqs l2cap_usrreqs = {
488 .pr_attach = l2cap_attach,
489 .pr_detach = l2cap_detach,
490 .pr_accept = l2cap_accept,
491 .pr_ioctl = l2cap_ioctl,
492 .pr_stat = l2cap_stat,
493 .pr_peeraddr = l2cap_peeraddr,
494 .pr_sockaddr = l2cap_sockaddr,
495 .pr_recvoob = l2cap_recvoob,
496 .pr_sendoob = l2cap_sendoob,
497 .pr_generic = l2cap_usrreq,
498 };
499