rfcomm_socket.c revision 1.23 1 /* $NetBSD: rfcomm_socket.c,v 1.23 2014/07/09 04:54:03 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2006 Itronix Inc.
5 * All rights reserved.
6 *
7 * Written by Iain Hibbert for Itronix Inc.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of Itronix Inc. may not be used to endorse
18 * or promote products derived from this software without specific
19 * prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
23 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
25 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 * ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 #include <sys/cdefs.h>
35 __KERNEL_RCSID(0, "$NetBSD: rfcomm_socket.c,v 1.23 2014/07/09 04:54:03 rtr Exp $");
36
37 /* load symbolic names */
38 #ifdef BLUETOOTH_DEBUG
39 #define PRUREQUESTS
40 #define PRCOREQUESTS
41 #endif
42
43 #include <sys/param.h>
44 #include <sys/domain.h>
45 #include <sys/kernel.h>
46 #include <sys/mbuf.h>
47 #include <sys/proc.h>
48 #include <sys/protosw.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/systm.h>
52
53 #include <netbt/bluetooth.h>
54 #include <netbt/rfcomm.h>
55
56 /****************************************************************************
57 *
58 * RFCOMM SOCK_STREAM Sockets - serial line emulation
59 *
60 */
61
62 static void rfcomm_connecting(void *);
63 static void rfcomm_connected(void *);
64 static void rfcomm_disconnected(void *, int);
65 static void *rfcomm_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
66 static void rfcomm_complete(void *, int);
67 static void rfcomm_linkmode(void *, int);
68 static void rfcomm_input(void *, struct mbuf *);
69
70 static const struct btproto rfcomm_proto = {
71 rfcomm_connecting,
72 rfcomm_connected,
73 rfcomm_disconnected,
74 rfcomm_newconn,
75 rfcomm_complete,
76 rfcomm_linkmode,
77 rfcomm_input,
78 };
79
80 /* sysctl variables */
81 int rfcomm_sendspace = 4096;
82 int rfcomm_recvspace = 4096;
83
84 static int
85 rfcomm_attach(struct socket *so, int proto)
86 {
87 int error;
88
89 KASSERT(so->so_pcb == NULL);
90
91 if (so->so_lock == NULL) {
92 mutex_obj_hold(bt_lock);
93 so->so_lock = bt_lock;
94 solock(so);
95 }
96 KASSERT(solocked(so));
97
98 /*
99 * Since we have nothing to add, we attach the DLC
100 * structure directly to our PCB pointer.
101 */
102 error = soreserve(so, rfcomm_sendspace, rfcomm_recvspace);
103 if (error)
104 return error;
105
106 error = rfcomm_attach_pcb((struct rfcomm_dlc **)&so->so_pcb,
107 &rfcomm_proto, so);
108 if (error)
109 return error;
110
111 error = rfcomm_rcvd(so->so_pcb, sbspace(&so->so_rcv));
112 if (error) {
113 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
114 return error;
115 }
116 return 0;
117 }
118
119 static void
120 rfcomm_detach(struct socket *so)
121 {
122 KASSERT(so->so_pcb != NULL);
123 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
124 KASSERT(so->so_pcb == NULL);
125 }
126
127 static int
128 rfcomm_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
129 {
130 return EPASSTHROUGH;
131 }
132
133 static int
134 rfcomm_stat(struct socket *so, struct stat *ub)
135 {
136 KASSERT(solocked(so));
137
138 return 0;
139 }
140
141 static int
142 rfcomm_peeraddr(struct socket *so, struct mbuf *nam)
143 {
144 struct rfcomm_dlc *pcb = so->so_pcb;
145 struct sockaddr_bt *sa;
146
147 KASSERT(solocked(so));
148 KASSERT(pcb != NULL);
149 KASSERT(nam != NULL);
150
151 sa = mtod(nam, struct sockaddr_bt *);
152 nam->m_len = sizeof(struct sockaddr_bt);
153 return rfcomm_peeraddr_pcb(pcb, sa);
154 }
155
156 static int
157 rfcomm_sockaddr(struct socket *so, struct mbuf *nam)
158 {
159 struct rfcomm_dlc *pcb = so->so_pcb;
160 struct sockaddr_bt *sa;
161
162 KASSERT(solocked(so));
163 KASSERT(pcb != NULL);
164 KASSERT(nam != NULL);
165
166 sa = mtod(nam, struct sockaddr_bt *);
167 nam->m_len = sizeof(struct sockaddr_bt);
168 return rfcomm_sockaddr_pcb(pcb, sa);
169 }
170
171 /*
172 * User Request.
173 * up is socket
174 * m is optional mbuf chain containing message
175 * nam is either
176 * optional mbuf chain containing an address
177 * message flags (PRU_RCVD)
178 * ctl is either
179 * optional mbuf chain containing socket options
180 * optional interface pointer PRU_PURGEIF
181 * l is pointer to process requesting action (if any)
182 *
183 * we are responsible for disposing of m and ctl if
184 * they are mbuf chains
185 */
186 static int
187 rfcomm_usrreq(struct socket *up, int req, struct mbuf *m,
188 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
189 {
190 struct rfcomm_dlc *pcb = up->so_pcb;
191 struct sockaddr_bt *sa;
192 struct mbuf *m0;
193 int err = 0;
194
195 DPRINTFN(2, "%s\n", prurequests[req]);
196 KASSERT(req != PRU_ATTACH);
197 KASSERT(req != PRU_DETACH);
198 KASSERT(req != PRU_CONTROL);
199 KASSERT(req != PRU_SENSE);
200 KASSERT(req != PRU_PEERADDR);
201 KASSERT(req != PRU_SOCKADDR);
202
203 switch (req) {
204 case PRU_PURGEIF:
205 return EOPNOTSUPP;
206 }
207 if (pcb == NULL) {
208 err = EINVAL;
209 goto release;
210 }
211
212 switch(req) {
213 case PRU_DISCONNECT:
214 soisdisconnecting(up);
215 return rfcomm_disconnect(pcb, up->so_linger);
216
217 case PRU_ABORT:
218 rfcomm_disconnect(pcb, 0);
219 soisdisconnected(up);
220 rfcomm_detach(up);
221 return 0;
222
223 case PRU_BIND:
224 KASSERT(nam != NULL);
225 sa = mtod(nam, struct sockaddr_bt *);
226
227 if (sa->bt_len != sizeof(struct sockaddr_bt))
228 return EINVAL;
229
230 if (sa->bt_family != AF_BLUETOOTH)
231 return EAFNOSUPPORT;
232
233 return rfcomm_bind(pcb, sa);
234
235 case PRU_CONNECT:
236 KASSERT(nam != NULL);
237 sa = mtod(nam, struct sockaddr_bt *);
238
239 if (sa->bt_len != sizeof(struct sockaddr_bt))
240 return EINVAL;
241
242 if (sa->bt_family != AF_BLUETOOTH)
243 return EAFNOSUPPORT;
244
245 soisconnecting(up);
246 return rfcomm_connect(pcb, sa);
247
248 case PRU_SHUTDOWN:
249 socantsendmore(up);
250 break;
251
252 case PRU_SEND:
253 KASSERT(m != NULL);
254
255 if (ctl) /* no use for that */
256 m_freem(ctl);
257
258 m0 = m_copypacket(m, M_DONTWAIT);
259 if (m0 == NULL)
260 return ENOMEM;
261
262 sbappendstream(&up->so_snd, m);
263
264 return rfcomm_send(pcb, m0);
265
266 case PRU_RCVD:
267 return rfcomm_rcvd(pcb, sbspace(&up->so_rcv));
268
269 case PRU_RCVOOB:
270 return EOPNOTSUPP; /* (no release) */
271
272 case PRU_LISTEN:
273 return rfcomm_listen(pcb);
274
275 case PRU_ACCEPT:
276 KASSERT(nam != NULL);
277 sa = mtod(nam, struct sockaddr_bt *);
278 nam->m_len = sizeof(struct sockaddr_bt);
279 return rfcomm_peeraddr_pcb(pcb, sa);
280
281 case PRU_CONNECT2:
282 case PRU_SENDOOB:
283 case PRU_FASTTIMO:
284 case PRU_SLOWTIMO:
285 case PRU_PROTORCV:
286 case PRU_PROTOSEND:
287 err = EOPNOTSUPP;
288 break;
289
290 default:
291 UNKNOWN(req);
292 err = EOPNOTSUPP;
293 break;
294 }
295
296 release:
297 if (m) m_freem(m);
298 if (ctl) m_freem(ctl);
299 return err;
300 }
301
302 /*
303 * rfcomm_ctloutput(req, socket, sockopt)
304 *
305 */
306 int
307 rfcomm_ctloutput(int req, struct socket *so, struct sockopt *sopt)
308 {
309 struct rfcomm_dlc *pcb = so->so_pcb;
310 int err = 0;
311
312 DPRINTFN(2, "%s\n", prcorequests[req]);
313
314 if (pcb == NULL)
315 return EINVAL;
316
317 if (sopt->sopt_level != BTPROTO_RFCOMM)
318 return ENOPROTOOPT;
319
320 switch(req) {
321 case PRCO_GETOPT:
322 err = rfcomm_getopt(pcb, sopt);
323 break;
324
325 case PRCO_SETOPT:
326 err = rfcomm_setopt(pcb, sopt);
327 break;
328
329 default:
330 err = ENOPROTOOPT;
331 break;
332 }
333
334 return err;
335 }
336
337 /**********************************************************************
338 *
339 * RFCOMM callbacks
340 */
341
342 static void
343 rfcomm_connecting(void *arg)
344 {
345 /* struct socket *so = arg; */
346
347 KASSERT(arg != NULL);
348 DPRINTF("Connecting\n");
349 }
350
351 static void
352 rfcomm_connected(void *arg)
353 {
354 struct socket *so = arg;
355
356 KASSERT(so != NULL);
357 DPRINTF("Connected\n");
358 soisconnected(so);
359 }
360
361 static void
362 rfcomm_disconnected(void *arg, int err)
363 {
364 struct socket *so = arg;
365
366 KASSERT(so != NULL);
367 DPRINTF("Disconnected\n");
368
369 so->so_error = err;
370 soisdisconnected(so);
371 }
372
373 static void *
374 rfcomm_newconn(void *arg, struct sockaddr_bt *laddr,
375 struct sockaddr_bt *raddr)
376 {
377 struct socket *so = arg;
378
379 DPRINTF("New Connection\n");
380 so = sonewconn(so, false);
381 if (so == NULL)
382 return NULL;
383
384 soisconnecting(so);
385
386 return so->so_pcb;
387 }
388
389 /*
390 * rfcomm_complete(rfcomm_dlc, length)
391 *
392 * length bytes are sent and may be removed from socket buffer
393 */
394 static void
395 rfcomm_complete(void *arg, int length)
396 {
397 struct socket *so = arg;
398
399 sbdrop(&so->so_snd, length);
400 sowwakeup(so);
401 }
402
403 /*
404 * rfcomm_linkmode(rfcomm_dlc, new)
405 *
406 * link mode change notification.
407 */
408 static void
409 rfcomm_linkmode(void *arg, int new)
410 {
411 struct socket *so = arg;
412 struct sockopt sopt;
413 int mode;
414
415 DPRINTF("auth %s, encrypt %s, secure %s\n",
416 (new & RFCOMM_LM_AUTH ? "on" : "off"),
417 (new & RFCOMM_LM_ENCRYPT ? "on" : "off"),
418 (new & RFCOMM_LM_SECURE ? "on" : "off"));
419
420 sockopt_init(&sopt, BTPROTO_RFCOMM, SO_RFCOMM_LM, 0);
421 (void)rfcomm_getopt(so->so_pcb, &sopt);
422 (void)sockopt_getint(&sopt, &mode);
423 sockopt_destroy(&sopt);
424
425 if (((mode & RFCOMM_LM_AUTH) && !(new & RFCOMM_LM_AUTH))
426 || ((mode & RFCOMM_LM_ENCRYPT) && !(new & RFCOMM_LM_ENCRYPT))
427 || ((mode & RFCOMM_LM_SECURE) && !(new & RFCOMM_LM_SECURE)))
428 rfcomm_disconnect(so->so_pcb, 0);
429 }
430
431 /*
432 * rfcomm_input(rfcomm_dlc, mbuf)
433 */
434 static void
435 rfcomm_input(void *arg, struct mbuf *m)
436 {
437 struct socket *so = arg;
438
439 KASSERT(so != NULL);
440
441 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
442 printf("%s: %d bytes dropped (socket buffer full)\n",
443 __func__, m->m_pkthdr.len);
444 m_freem(m);
445 return;
446 }
447
448 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
449
450 sbappendstream(&so->so_rcv, m);
451 sorwakeup(so);
452 }
453
454 PR_WRAP_USRREQS(rfcomm)
455
456 #define rfcomm_attach rfcomm_attach_wrapper
457 #define rfcomm_detach rfcomm_detach_wrapper
458 #define rfcomm_ioctl rfcomm_ioctl_wrapper
459 #define rfcomm_stat rfcomm_stat_wrapper
460 #define rfcomm_peeraddr rfcomm_peeraddr_wrapper
461 #define rfcomm_sockaddr rfcomm_sockaddr_wrapper
462 #define rfcomm_usrreq rfcomm_usrreq_wrapper
463
464 const struct pr_usrreqs rfcomm_usrreqs = {
465 .pr_attach = rfcomm_attach,
466 .pr_detach = rfcomm_detach,
467 .pr_ioctl = rfcomm_ioctl,
468 .pr_stat = rfcomm_stat,
469 .pr_peeraddr = rfcomm_peeraddr,
470 .pr_sockaddr = rfcomm_sockaddr,
471 .pr_generic = rfcomm_usrreq,
472 };
473