l2cap_socket.c revision 1.31.4.1 1 /* $NetBSD: l2cap_socket.c,v 1.31.4.1 2015/04/06 15:18:22 skrll Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.31.4.1 2015/04/06 15:18:22 skrll Exp $");
35
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54
55 /*
56 * L2CAP Sockets
57 *
58 * SOCK_SEQPACKET - normal L2CAP connection
59 *
60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
61 */
62
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70
71 static const struct btproto l2cap_proto = {
72 l2cap_connecting,
73 l2cap_connected,
74 l2cap_disconnected,
75 l2cap_newconn,
76 l2cap_complete,
77 l2cap_linkmode,
78 l2cap_input,
79 };
80
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84
85 static int
86 l2cap_attach(struct socket *so, int proto)
87 {
88 int error;
89
90 KASSERT(so->so_pcb == NULL);
91
92 if (so->so_lock == NULL) {
93 mutex_obj_hold(bt_lock);
94 so->so_lock = bt_lock;
95 solock(so);
96 }
97 KASSERT(solocked(so));
98
99 /*
100 * For L2CAP socket PCB we just use an l2cap_channel structure
101 * since we have nothing to add..
102 */
103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 if (error)
105 return error;
106
107 return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 &l2cap_proto, so);
109 }
110
111 static void
112 l2cap_detach(struct socket *so)
113 {
114 KASSERT(so->so_pcb != NULL);
115 l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 KASSERT(so->so_pcb == NULL);
117 }
118
119 static int
120 l2cap_accept(struct socket *so, struct mbuf *nam)
121 {
122 struct l2cap_channel *pcb = so->so_pcb;
123 struct sockaddr_bt *sa;
124
125 KASSERT(solocked(so));
126 KASSERT(nam != NULL);
127
128 if (pcb == NULL)
129 return EINVAL;
130
131 sa = mtod(nam, struct sockaddr_bt *);
132 nam->m_len = sizeof(struct sockaddr_bt);
133 return l2cap_peeraddr_pcb(pcb, sa);
134 }
135
136 static int
137 l2cap_bind(struct socket *so, struct sockaddr *nam, struct lwp *l)
138 {
139 struct l2cap_channel *pcb = so->so_pcb;
140 struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
141
142 KASSERT(solocked(so));
143 KASSERT(nam != NULL);
144
145 if (pcb == NULL)
146 return EINVAL;
147
148 if (sa->bt_len != sizeof(struct sockaddr_bt))
149 return EINVAL;
150
151 if (sa->bt_family != AF_BLUETOOTH)
152 return EAFNOSUPPORT;
153
154 return l2cap_bind_pcb(pcb, sa);
155 }
156
157 static int
158 l2cap_listen(struct socket *so, struct lwp *l)
159 {
160 struct l2cap_channel *pcb = so->so_pcb;
161
162 KASSERT(solocked(so));
163
164 if (pcb == NULL)
165 return EINVAL;
166
167 return l2cap_listen_pcb(pcb);
168 }
169
170 static int
171 l2cap_connect(struct socket *so, struct mbuf *nam, struct lwp *l)
172 {
173 struct l2cap_channel *pcb = so->so_pcb;
174 struct sockaddr_bt *sa;
175
176 KASSERT(solocked(so));
177 KASSERT(nam != NULL);
178
179 if (pcb == NULL)
180 return EINVAL;
181
182 sa = mtod(nam, struct sockaddr_bt *);
183 if (sa->bt_len != sizeof(struct sockaddr_bt))
184 return EINVAL;
185
186 if (sa->bt_family != AF_BLUETOOTH)
187 return EAFNOSUPPORT;
188
189 soisconnecting(so);
190 return l2cap_connect_pcb(pcb, sa);
191 }
192
193 static int
194 l2cap_connect2(struct socket *so, struct socket *so2)
195 {
196 KASSERT(solocked(so));
197
198 if (so->so_pcb == NULL)
199 return EINVAL;
200
201 return EOPNOTSUPP;
202 }
203
204 static int
205 l2cap_disconnect(struct socket *so)
206 {
207 struct l2cap_channel *pcb = so->so_pcb;
208
209 KASSERT(solocked(so));
210
211 if (pcb == NULL)
212 return EINVAL;
213
214 soisdisconnecting(so);
215 return l2cap_disconnect_pcb(pcb, so->so_linger);
216 }
217
218 static int
219 l2cap_shutdown(struct socket *so)
220 {
221 KASSERT(solocked(so));
222
223 socantsendmore(so);
224 return 0;
225 }
226
227 static int
228 l2cap_abort(struct socket *so)
229 {
230 struct l2cap_channel *pcb = so->so_pcb;
231
232 KASSERT(solocked(so));
233
234 if (pcb == NULL)
235 return EINVAL;
236
237 l2cap_disconnect_pcb(pcb, 0);
238 soisdisconnected(so);
239 l2cap_detach(so);
240 return 0;
241 }
242
243 static int
244 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
245 {
246 return EPASSTHROUGH;
247 }
248
249 static int
250 l2cap_stat(struct socket *so, struct stat *ub)
251 {
252 KASSERT(solocked(so));
253
254 return 0;
255 }
256
257 static int
258 l2cap_peeraddr(struct socket *so, struct mbuf *nam)
259 {
260 struct l2cap_channel *pcb = so->so_pcb;
261 struct sockaddr_bt *sa;
262
263 KASSERT(solocked(so));
264 KASSERT(pcb != NULL);
265 KASSERT(nam != NULL);
266
267 sa = mtod(nam, struct sockaddr_bt *);
268 nam->m_len = sizeof(struct sockaddr_bt);
269 return l2cap_peeraddr_pcb(pcb, sa);
270 }
271
272 static int
273 l2cap_sockaddr(struct socket *so, struct mbuf *nam)
274 {
275 struct l2cap_channel *pcb = so->so_pcb;
276 struct sockaddr_bt *sa;
277
278 KASSERT(solocked(so));
279 KASSERT(pcb != NULL);
280 KASSERT(nam != NULL);
281
282 sa = mtod(nam, struct sockaddr_bt *);
283 nam->m_len = sizeof(struct sockaddr_bt);
284 return l2cap_sockaddr_pcb(pcb, sa);
285 }
286
287 static int
288 l2cap_rcvd(struct socket *so, int flags, struct lwp *l)
289 {
290 KASSERT(solocked(so));
291
292 return EOPNOTSUPP;
293 }
294
295 static int
296 l2cap_recvoob(struct socket *so, struct mbuf *m, int flags)
297 {
298 KASSERT(solocked(so));
299
300 return EOPNOTSUPP;
301 }
302
303 static int
304 l2cap_send(struct socket *so, struct mbuf *m, struct mbuf *nam,
305 struct mbuf *control, struct lwp *l)
306 {
307 struct l2cap_channel *pcb = so->so_pcb;
308 struct mbuf *m0;
309 int error = 0;
310
311 KASSERT(solocked(so));
312 KASSERT(m != NULL);
313
314 if (control)
315 m_freem(control);
316
317 if (pcb == NULL) {
318 error = EINVAL;
319 goto release;
320 }
321
322 if (m->m_pkthdr.len == 0)
323 goto release;
324
325 if (m->m_pkthdr.len > pcb->lc_omtu) {
326 error = EMSGSIZE;
327 goto release;
328 }
329
330 m0 = m_copypacket(m, M_DONTWAIT);
331 if (m0 == NULL) {
332 error = ENOMEM;
333 goto release;
334 }
335
336 sbappendrecord(&so->so_snd, m);
337 return l2cap_send_pcb(pcb, m0);
338
339 release:
340 if (m)
341 m_freem(m);
342
343 return error;
344 }
345
346 static int
347 l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
348 {
349 KASSERT(solocked(so));
350
351 if (m)
352 m_freem(m);
353 if (control)
354 m_freem(control);
355
356 return EOPNOTSUPP;
357 }
358
359 static int
360 l2cap_purgeif(struct socket *so, struct ifnet *ifp)
361 {
362
363 return EOPNOTSUPP;
364 }
365
366 /*
367 * User Request.
368 * up is socket
369 * m is optional mbuf chain containing message
370 * ctl is either
371 * optional mbuf chain containing socket options
372 * l is pointer to process requesting action (if any)
373 *
374 * we are responsible for disposing of m and ctl if
375 * they are mbuf chains
376 */
377 static int
378 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
379 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
380 {
381 struct l2cap_channel *pcb = up->so_pcb;
382 int err = 0;
383
384 DPRINTFN(2, "%s\n", prurequests[req]);
385 KASSERT(req != PRU_ATTACH);
386 KASSERT(req != PRU_DETACH);
387 KASSERT(req != PRU_ACCEPT);
388 KASSERT(req != PRU_BIND);
389 KASSERT(req != PRU_LISTEN);
390 KASSERT(req != PRU_CONNECT);
391 KASSERT(req != PRU_CONNECT2);
392 KASSERT(req != PRU_DISCONNECT);
393 KASSERT(req != PRU_SHUTDOWN);
394 KASSERT(req != PRU_ABORT);
395 KASSERT(req != PRU_CONTROL);
396 KASSERT(req != PRU_SENSE);
397 KASSERT(req != PRU_PEERADDR);
398 KASSERT(req != PRU_SOCKADDR);
399 KASSERT(req != PRU_RCVD);
400 KASSERT(req != PRU_RCVOOB);
401 KASSERT(req != PRU_SEND);
402 KASSERT(req != PRU_SENDOOB);
403 KASSERT(req != PRU_PURGEIF);
404
405 if (pcb == NULL) {
406 err = EINVAL;
407 goto release;
408 }
409
410 switch(req) {
411 case PRU_FASTTIMO:
412 case PRU_SLOWTIMO:
413 case PRU_PROTORCV:
414 case PRU_PROTOSEND:
415 err = EOPNOTSUPP;
416 break;
417
418 default:
419 UNKNOWN(req);
420 err = EOPNOTSUPP;
421 break;
422 }
423
424 release:
425 if (m) m_freem(m);
426 if (ctl) m_freem(ctl);
427 return err;
428 }
429
430 /*
431 * l2cap_ctloutput(req, socket, sockopt)
432 *
433 * Apply configuration commands to channel. This corresponds to
434 * "Reconfigure Channel Request" in the L2CAP specification.
435 */
436 int
437 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
438 {
439 struct l2cap_channel *pcb = so->so_pcb;
440 int err = 0;
441
442 DPRINTFN(2, "%s\n", prcorequests[req]);
443
444 if (pcb == NULL)
445 return EINVAL;
446
447 if (sopt->sopt_level != BTPROTO_L2CAP)
448 return ENOPROTOOPT;
449
450 switch(req) {
451 case PRCO_GETOPT:
452 err = l2cap_getopt(pcb, sopt);
453 break;
454
455 case PRCO_SETOPT:
456 err = l2cap_setopt(pcb, sopt);
457 break;
458
459 default:
460 err = ENOPROTOOPT;
461 break;
462 }
463
464 return err;
465 }
466
467 /**********************************************************************
468 *
469 * L2CAP Protocol socket callbacks
470 *
471 */
472
473 static void
474 l2cap_connecting(void *arg)
475 {
476 struct socket *so = arg;
477
478 DPRINTF("Connecting\n");
479 soisconnecting(so);
480 }
481
482 static void
483 l2cap_connected(void *arg)
484 {
485 struct socket *so = arg;
486
487 DPRINTF("Connected\n");
488 soisconnected(so);
489 }
490
491 static void
492 l2cap_disconnected(void *arg, int err)
493 {
494 struct socket *so = arg;
495
496 DPRINTF("Disconnected (%d)\n", err);
497
498 so->so_error = err;
499 soisdisconnected(so);
500 }
501
502 static void *
503 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
504 struct sockaddr_bt *raddr)
505 {
506 struct socket *so = arg;
507
508 DPRINTF("New Connection\n");
509 so = sonewconn(so, false);
510 if (so == NULL)
511 return NULL;
512
513 soisconnecting(so);
514
515 return so->so_pcb;
516 }
517
518 static void
519 l2cap_complete(void *arg, int count)
520 {
521 struct socket *so = arg;
522
523 while (count-- > 0)
524 sbdroprecord(&so->so_snd);
525
526 sowwakeup(so);
527 }
528
529 static void
530 l2cap_linkmode(void *arg, int new)
531 {
532 struct socket *so = arg;
533 struct sockopt sopt;
534 int mode;
535
536 DPRINTF("auth %s, encrypt %s, secure %s\n",
537 (new & L2CAP_LM_AUTH ? "on" : "off"),
538 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
539 (new & L2CAP_LM_SECURE ? "on" : "off"));
540
541 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
542 (void)l2cap_getopt(so->so_pcb, &sopt);
543 (void)sockopt_getint(&sopt, &mode);
544 sockopt_destroy(&sopt);
545
546 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
547 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
548 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
549 l2cap_disconnect_pcb(so->so_pcb, 0);
550 }
551
552 static void
553 l2cap_input(void *arg, struct mbuf *m)
554 {
555 struct socket *so = arg;
556
557 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
558 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
559 __func__, m->m_pkthdr.len);
560 m_freem(m);
561 return;
562 }
563
564 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
565
566 sbappendrecord(&so->so_rcv, m);
567 sorwakeup(so);
568 }
569
570 PR_WRAP_USRREQS(l2cap)
571
572 #define l2cap_attach l2cap_attach_wrapper
573 #define l2cap_detach l2cap_detach_wrapper
574 #define l2cap_accept l2cap_accept_wrapper
575 #define l2cap_bind l2cap_bind_wrapper
576 #define l2cap_listen l2cap_listen_wrapper
577 #define l2cap_connect l2cap_connect_wrapper
578 #define l2cap_connect2 l2cap_connect2_wrapper
579 #define l2cap_disconnect l2cap_disconnect_wrapper
580 #define l2cap_shutdown l2cap_shutdown_wrapper
581 #define l2cap_abort l2cap_abort_wrapper
582 #define l2cap_ioctl l2cap_ioctl_wrapper
583 #define l2cap_stat l2cap_stat_wrapper
584 #define l2cap_peeraddr l2cap_peeraddr_wrapper
585 #define l2cap_sockaddr l2cap_sockaddr_wrapper
586 #define l2cap_rcvd l2cap_rcvd_wrapper
587 #define l2cap_recvoob l2cap_recvoob_wrapper
588 #define l2cap_send l2cap_send_wrapper
589 #define l2cap_sendoob l2cap_sendoob_wrapper
590 #define l2cap_purgeif l2cap_purgeif_wrapper
591 #define l2cap_usrreq l2cap_usrreq_wrapper
592
593 const struct pr_usrreqs l2cap_usrreqs = {
594 .pr_attach = l2cap_attach,
595 .pr_detach = l2cap_detach,
596 .pr_accept = l2cap_accept,
597 .pr_bind = l2cap_bind,
598 .pr_listen = l2cap_listen,
599 .pr_connect = l2cap_connect,
600 .pr_connect2 = l2cap_connect2,
601 .pr_disconnect = l2cap_disconnect,
602 .pr_shutdown = l2cap_shutdown,
603 .pr_abort = l2cap_abort,
604 .pr_ioctl = l2cap_ioctl,
605 .pr_stat = l2cap_stat,
606 .pr_peeraddr = l2cap_peeraddr,
607 .pr_sockaddr = l2cap_sockaddr,
608 .pr_rcvd = l2cap_rcvd,
609 .pr_recvoob = l2cap_recvoob,
610 .pr_send = l2cap_send,
611 .pr_sendoob = l2cap_sendoob,
612 .pr_purgeif = l2cap_purgeif,
613 .pr_generic = l2cap_usrreq,
614 };
615