l2cap_socket.c revision 1.28 1 /* $NetBSD: l2cap_socket.c,v 1.28 2014/08/05 05:24:26 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.28 2014/08/05 05:24:26 rtr Exp $");
35
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54
55 /*
56 * L2CAP Sockets
57 *
58 * SOCK_SEQPACKET - normal L2CAP connection
59 *
60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 */
62
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70
71 static const struct btproto l2cap_proto = {
72 l2cap_connecting,
73 l2cap_connected,
74 l2cap_disconnected,
75 l2cap_newconn,
76 l2cap_complete,
77 l2cap_linkmode,
78 l2cap_input,
79 };
80
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84
85 static int
86 l2cap_attach(struct socket *so, int proto)
87 {
88 int error;
89
90 KASSERT(so->so_pcb == NULL);
91
92 if (so->so_lock == NULL) {
93 mutex_obj_hold(bt_lock);
94 so->so_lock = bt_lock;
95 solock(so);
96 }
97 KASSERT(solocked(so));
98
99 /*
100 * For L2CAP socket PCB we just use an l2cap_channel structure
101 * since we have nothing to add..
102 */
103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 if (error)
105 return error;
106
107 return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 &l2cap_proto, so);
109 }
110
111 static void
112 l2cap_detach(struct socket *so)
113 {
114 KASSERT(so->so_pcb != NULL);
115 l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 KASSERT(so->so_pcb == NULL);
117 }
118
119 static int
120 l2cap_accept(struct socket *so, struct mbuf *nam)
121 {
122 struct l2cap_channel *pcb = so->so_pcb;
123 struct sockaddr_bt *sa;
124
125 KASSERT(solocked(so));
126 KASSERT(nam != NULL);
127
128 if (pcb == NULL)
129 return EINVAL;
130
131 sa = mtod(nam, struct sockaddr_bt *);
132 nam->m_len = sizeof(struct sockaddr_bt);
133 return l2cap_peeraddr_pcb(pcb, sa);
134 }
135
136 static int
137 l2cap_bind(struct socket *so, struct mbuf *nam, struct lwp *l)
138 {
139 struct l2cap_channel *pcb = so->so_pcb;
140 struct sockaddr_bt *sa;
141
142 KASSERT(solocked(so));
143 KASSERT(nam != NULL);
144
145 if (pcb == NULL)
146 return EINVAL;
147
148 sa = mtod(nam, struct sockaddr_bt *);
149 if (sa->bt_len != sizeof(struct sockaddr_bt))
150 return EINVAL;
151
152 if (sa->bt_family != AF_BLUETOOTH)
153 return EAFNOSUPPORT;
154
155 return l2cap_bind_pcb(pcb, sa);
156 }
157
158 static int
159 l2cap_listen(struct socket *so, struct lwp *l)
160 {
161 struct l2cap_channel *pcb = so->so_pcb;
162
163 KASSERT(solocked(so));
164
165 if (pcb == NULL)
166 return EINVAL;
167
168 return l2cap_listen_pcb(pcb);
169 }
170
171 static int
172 l2cap_connect(struct socket *so, struct mbuf *nam, struct lwp *l)
173 {
174 struct l2cap_channel *pcb = so->so_pcb;
175 struct sockaddr_bt *sa;
176
177 KASSERT(solocked(so));
178 KASSERT(nam != NULL);
179
180 if (pcb == NULL)
181 return EINVAL;
182
183 sa = mtod(nam, struct sockaddr_bt *);
184 if (sa->bt_len != sizeof(struct sockaddr_bt))
185 return EINVAL;
186
187 if (sa->bt_family != AF_BLUETOOTH)
188 return EAFNOSUPPORT;
189
190 soisconnecting(so);
191 return l2cap_connect_pcb(pcb, sa);
192 }
193
194 static int
195 l2cap_disconnect(struct socket *so)
196 {
197 struct l2cap_channel *pcb = so->so_pcb;
198
199 KASSERT(solocked(so));
200
201 if (pcb == NULL)
202 return EINVAL;
203
204 soisdisconnecting(so);
205 return l2cap_disconnect_pcb(pcb, so->so_linger);
206 }
207
208 static int
209 l2cap_shutdown(struct socket *so)
210 {
211 KASSERT(solocked(so));
212
213 socantsendmore(so);
214 return 0;
215 }
216
217 static int
218 l2cap_abort(struct socket *so)
219 {
220 struct l2cap_channel *pcb = so->so_pcb;
221
222 KASSERT(solocked(so));
223
224 if (pcb == NULL)
225 return EINVAL;
226
227 l2cap_disconnect_pcb(pcb, 0);
228 soisdisconnected(so);
229 l2cap_detach(so);
230 return 0;
231 }
232
233 static int
234 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
235 {
236 return EPASSTHROUGH;
237 }
238
239 static int
240 l2cap_stat(struct socket *so, struct stat *ub)
241 {
242 KASSERT(solocked(so));
243
244 return 0;
245 }
246
247 static int
248 l2cap_peeraddr(struct socket *so, struct mbuf *nam)
249 {
250 struct l2cap_channel *pcb = so->so_pcb;
251 struct sockaddr_bt *sa;
252
253 KASSERT(solocked(so));
254 KASSERT(pcb != NULL);
255 KASSERT(nam != NULL);
256
257 sa = mtod(nam, struct sockaddr_bt *);
258 nam->m_len = sizeof(struct sockaddr_bt);
259 return l2cap_peeraddr_pcb(pcb, sa);
260 }
261
262 static int
263 l2cap_sockaddr(struct socket *so, struct mbuf *nam)
264 {
265 struct l2cap_channel *pcb = so->so_pcb;
266 struct sockaddr_bt *sa;
267
268 KASSERT(solocked(so));
269 KASSERT(pcb != NULL);
270 KASSERT(nam != NULL);
271
272 sa = mtod(nam, struct sockaddr_bt *);
273 nam->m_len = sizeof(struct sockaddr_bt);
274 return l2cap_sockaddr_pcb(pcb, sa);
275 }
276
277 static int
278 l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
279 {
280 KASSERT(solocked(so));
281
282 return EOPNOTSUPP;
283 }
284
285 static int
286 l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
287 {
288 KASSERT(solocked(so));
289
290 if (m)
291 m_freem(m);
292 if (control)
293 m_freem(control);
294
295 return EOPNOTSUPP;
296 }
297
298 /*
299 * User Request.
300 * up is socket
301 * m is optional mbuf chain containing message
302 * nam is either
303 * optional mbuf chain containing an address
304 * message flags (PRU_RCVD)
305 * ctl is either
306 * optional mbuf chain containing socket options
307 * optional interface pointer PRU_PURGEIF
308 * l is pointer to process requesting action (if any)
309 *
310 * we are responsible for disposing of m and ctl if
311 * they are mbuf chains
312 */
313 static int
314 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
315 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
316 {
317 struct l2cap_channel *pcb = up->so_pcb;
318 struct mbuf *m0;
319 int err = 0;
320
321 DPRINTFN(2, "%s\n", prurequests[req]);
322 KASSERT(req != PRU_ATTACH);
323 KASSERT(req != PRU_DETACH);
324 KASSERT(req != PRU_ACCEPT);
325 KASSERT(req != PRU_BIND);
326 KASSERT(req != PRU_LISTEN);
327 KASSERT(req != PRU_CONNECT);
328 KASSERT(req != PRU_DISCONNECT);
329 KASSERT(req != PRU_SHUTDOWN);
330 KASSERT(req != PRU_ABORT);
331 KASSERT(req != PRU_CONTROL);
332 KASSERT(req != PRU_SENSE);
333 KASSERT(req != PRU_PEERADDR);
334 KASSERT(req != PRU_SOCKADDR);
335 KASSERT(req != PRU_RCVOOB);
336 KASSERT(req != PRU_SENDOOB);
337
338 switch (req) {
339 case PRU_PURGEIF:
340 return EOPNOTSUPP;
341 }
342
343 if (pcb == NULL) {
344 err = EINVAL;
345 goto release;
346 }
347
348 switch(req) {
349 case PRU_SEND:
350 KASSERT(m != NULL);
351 if (m->m_pkthdr.len == 0)
352 break;
353
354 if (m->m_pkthdr.len > pcb->lc_omtu) {
355 err = EMSGSIZE;
356 break;
357 }
358
359 m0 = m_copypacket(m, M_DONTWAIT);
360 if (m0 == NULL) {
361 err = ENOMEM;
362 break;
363 }
364
365 if (ctl) /* no use for that */
366 m_freem(ctl);
367
368 sbappendrecord(&up->so_snd, m);
369 return l2cap_send(pcb, m0);
370
371 case PRU_RCVD:
372 return EOPNOTSUPP; /* (no release) */
373
374 case PRU_CONNECT2:
375 case PRU_FASTTIMO:
376 case PRU_SLOWTIMO:
377 case PRU_PROTORCV:
378 case PRU_PROTOSEND:
379 err = EOPNOTSUPP;
380 break;
381
382 default:
383 UNKNOWN(req);
384 err = EOPNOTSUPP;
385 break;
386 }
387
388 release:
389 if (m) m_freem(m);
390 if (ctl) m_freem(ctl);
391 return err;
392 }
393
394 /*
395 * l2cap_ctloutput(req, socket, sockopt)
396 *
397 * Apply configuration commands to channel. This corresponds to
398 * "Reconfigure Channel Request" in the L2CAP specification.
399 */
400 int
401 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
402 {
403 struct l2cap_channel *pcb = so->so_pcb;
404 int err = 0;
405
406 DPRINTFN(2, "%s\n", prcorequests[req]);
407
408 if (pcb == NULL)
409 return EINVAL;
410
411 if (sopt->sopt_level != BTPROTO_L2CAP)
412 return ENOPROTOOPT;
413
414 switch(req) {
415 case PRCO_GETOPT:
416 err = l2cap_getopt(pcb, sopt);
417 break;
418
419 case PRCO_SETOPT:
420 err = l2cap_setopt(pcb, sopt);
421 break;
422
423 default:
424 err = ENOPROTOOPT;
425 break;
426 }
427
428 return err;
429 }
430
431 /**********************************************************************
432 *
433 * L2CAP Protocol socket callbacks
434 *
435 */
436
437 static void
438 l2cap_connecting(void *arg)
439 {
440 struct socket *so = arg;
441
442 DPRINTF("Connecting\n");
443 soisconnecting(so);
444 }
445
446 static void
447 l2cap_connected(void *arg)
448 {
449 struct socket *so = arg;
450
451 DPRINTF("Connected\n");
452 soisconnected(so);
453 }
454
455 static void
456 l2cap_disconnected(void *arg, int err)
457 {
458 struct socket *so = arg;
459
460 DPRINTF("Disconnected (%d)\n", err);
461
462 so->so_error = err;
463 soisdisconnected(so);
464 }
465
466 static void *
467 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
468 struct sockaddr_bt *raddr)
469 {
470 struct socket *so = arg;
471
472 DPRINTF("New Connection\n");
473 so = sonewconn(so, false);
474 if (so == NULL)
475 return NULL;
476
477 soisconnecting(so);
478
479 return so->so_pcb;
480 }
481
482 static void
483 l2cap_complete(void *arg, int count)
484 {
485 struct socket *so = arg;
486
487 while (count-- > 0)
488 sbdroprecord(&so->so_snd);
489
490 sowwakeup(so);
491 }
492
493 static void
494 l2cap_linkmode(void *arg, int new)
495 {
496 struct socket *so = arg;
497 struct sockopt sopt;
498 int mode;
499
500 DPRINTF("auth %s, encrypt %s, secure %s\n",
501 (new & L2CAP_LM_AUTH ? "on" : "off"),
502 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
503 (new & L2CAP_LM_SECURE ? "on" : "off"));
504
505 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
506 (void)l2cap_getopt(so->so_pcb, &sopt);
507 (void)sockopt_getint(&sopt, &mode);
508 sockopt_destroy(&sopt);
509
510 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
511 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
512 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
513 l2cap_disconnect_pcb(so->so_pcb, 0);
514 }
515
516 static void
517 l2cap_input(void *arg, struct mbuf *m)
518 {
519 struct socket *so = arg;
520
521 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
522 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
523 __func__, m->m_pkthdr.len);
524 m_freem(m);
525 return;
526 }
527
528 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
529
530 sbappendrecord(&so->so_rcv, m);
531 sorwakeup(so);
532 }
533
534 PR_WRAP_USRREQS(l2cap)
535
536 #define l2cap_attach l2cap_attach_wrapper
537 #define l2cap_detach l2cap_detach_wrapper
538 #define l2cap_accept l2cap_accept_wrapper
539 #define l2cap_bind l2cap_bind_wrapper
540 #define l2cap_listen l2cap_listen_wrapper
541 #define l2cap_connect l2cap_connect_wrapper
542 #define l2cap_disconnect l2cap_disconnect_wrapper
543 #define l2cap_shutdown l2cap_shutdown_wrapper
544 #define l2cap_abort l2cap_abort_wrapper
545 #define l2cap_ioctl l2cap_ioctl_wrapper
546 #define l2cap_stat l2cap_stat_wrapper
547 #define l2cap_peeraddr l2cap_peeraddr_wrapper
548 #define l2cap_sockaddr l2cap_sockaddr_wrapper
549 #define l2cap_recvoob l2cap_recvoob_wrapper
550 #define l2cap_sendoob l2cap_sendoob_wrapper
551 #define l2cap_usrreq l2cap_usrreq_wrapper
552
553 const struct pr_usrreqs l2cap_usrreqs = {
554 .pr_attach = l2cap_attach,
555 .pr_detach = l2cap_detach,
556 .pr_accept = l2cap_accept,
557 .pr_bind = l2cap_bind,
558 .pr_listen = l2cap_listen,
559 .pr_connect = l2cap_connect,
560 .pr_disconnect = l2cap_disconnect,
561 .pr_shutdown = l2cap_shutdown,
562 .pr_abort = l2cap_abort,
563 .pr_ioctl = l2cap_ioctl,
564 .pr_stat = l2cap_stat,
565 .pr_peeraddr = l2cap_peeraddr,
566 .pr_sockaddr = l2cap_sockaddr,
567 .pr_recvoob = l2cap_recvoob,
568 .pr_sendoob = l2cap_sendoob,
569 .pr_generic = l2cap_usrreq,
570 };
571