rfcomm_socket.c revision 1.24 1 /* $NetBSD: rfcomm_socket.c,v 1.24 2014/07/09 14:41:42 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2006 Itronix Inc.
5 * All rights reserved.
6 *
7 * Written by Iain Hibbert for Itronix Inc.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of Itronix Inc. may not be used to endorse
18 * or promote products derived from this software without specific
19 * prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
23 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
25 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 * ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 #include <sys/cdefs.h>
35 __KERNEL_RCSID(0, "$NetBSD: rfcomm_socket.c,v 1.24 2014/07/09 14:41:42 rtr Exp $");
36
37 /* load symbolic names */
38 #ifdef BLUETOOTH_DEBUG
39 #define PRUREQUESTS
40 #define PRCOREQUESTS
41 #endif
42
43 #include <sys/param.h>
44 #include <sys/domain.h>
45 #include <sys/kernel.h>
46 #include <sys/mbuf.h>
47 #include <sys/proc.h>
48 #include <sys/protosw.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/systm.h>
52
53 #include <netbt/bluetooth.h>
54 #include <netbt/rfcomm.h>
55
56 /****************************************************************************
57 *
58 * RFCOMM SOCK_STREAM Sockets - serial line emulation
59 *
60 */
61
62 static void rfcomm_connecting(void *);
63 static void rfcomm_connected(void *);
64 static void rfcomm_disconnected(void *, int);
65 static void *rfcomm_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
66 static void rfcomm_complete(void *, int);
67 static void rfcomm_linkmode(void *, int);
68 static void rfcomm_input(void *, struct mbuf *);
69
70 static const struct btproto rfcomm_proto = {
71 rfcomm_connecting,
72 rfcomm_connected,
73 rfcomm_disconnected,
74 rfcomm_newconn,
75 rfcomm_complete,
76 rfcomm_linkmode,
77 rfcomm_input,
78 };
79
80 /* sysctl variables */
81 int rfcomm_sendspace = 4096;
82 int rfcomm_recvspace = 4096;
83
84 static int
85 rfcomm_attach(struct socket *so, int proto)
86 {
87 int error;
88
89 KASSERT(so->so_pcb == NULL);
90
91 if (so->so_lock == NULL) {
92 mutex_obj_hold(bt_lock);
93 so->so_lock = bt_lock;
94 solock(so);
95 }
96 KASSERT(solocked(so));
97
98 /*
99 * Since we have nothing to add, we attach the DLC
100 * structure directly to our PCB pointer.
101 */
102 error = soreserve(so, rfcomm_sendspace, rfcomm_recvspace);
103 if (error)
104 return error;
105
106 error = rfcomm_attach_pcb((struct rfcomm_dlc **)&so->so_pcb,
107 &rfcomm_proto, so);
108 if (error)
109 return error;
110
111 error = rfcomm_rcvd(so->so_pcb, sbspace(&so->so_rcv));
112 if (error) {
113 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
114 return error;
115 }
116 return 0;
117 }
118
119 static void
120 rfcomm_detach(struct socket *so)
121 {
122 KASSERT(so->so_pcb != NULL);
123 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
124 KASSERT(so->so_pcb == NULL);
125 }
126
127 static int
128 rfcomm_accept(struct socket *so, struct mbuf *nam)
129 {
130 struct rfcomm_dlc *pcb = so->so_pcb;
131 struct sockaddr_bt *sa;
132
133 KASSERT(solocked(so));
134 KASSERT(nam != NULL);
135
136 if (pcb == NULL)
137 return EINVAL;
138
139 sa = mtod(nam, struct sockaddr_bt *);
140 nam->m_len = sizeof(struct sockaddr_bt);
141 return rfcomm_peeraddr_pcb(pcb, sa);
142 }
143
144 static int
145 rfcomm_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
146 {
147 return EPASSTHROUGH;
148 }
149
150 static int
151 rfcomm_stat(struct socket *so, struct stat *ub)
152 {
153 KASSERT(solocked(so));
154
155 return 0;
156 }
157
158 static int
159 rfcomm_peeraddr(struct socket *so, struct mbuf *nam)
160 {
161 struct rfcomm_dlc *pcb = so->so_pcb;
162 struct sockaddr_bt *sa;
163
164 KASSERT(solocked(so));
165 KASSERT(pcb != NULL);
166 KASSERT(nam != NULL);
167
168 sa = mtod(nam, struct sockaddr_bt *);
169 nam->m_len = sizeof(struct sockaddr_bt);
170 return rfcomm_peeraddr_pcb(pcb, sa);
171 }
172
173 static int
174 rfcomm_sockaddr(struct socket *so, struct mbuf *nam)
175 {
176 struct rfcomm_dlc *pcb = so->so_pcb;
177 struct sockaddr_bt *sa;
178
179 KASSERT(solocked(so));
180 KASSERT(pcb != NULL);
181 KASSERT(nam != NULL);
182
183 sa = mtod(nam, struct sockaddr_bt *);
184 nam->m_len = sizeof(struct sockaddr_bt);
185 return rfcomm_sockaddr_pcb(pcb, sa);
186 }
187
188 /*
189 * User Request.
190 * up is socket
191 * m is optional mbuf chain containing message
192 * nam is either
193 * optional mbuf chain containing an address
194 * message flags (PRU_RCVD)
195 * ctl is either
196 * optional mbuf chain containing socket options
197 * optional interface pointer PRU_PURGEIF
198 * l is pointer to process requesting action (if any)
199 *
200 * we are responsible for disposing of m and ctl if
201 * they are mbuf chains
202 */
203 static int
204 rfcomm_usrreq(struct socket *up, int req, struct mbuf *m,
205 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
206 {
207 struct rfcomm_dlc *pcb = up->so_pcb;
208 struct sockaddr_bt *sa;
209 struct mbuf *m0;
210 int err = 0;
211
212 DPRINTFN(2, "%s\n", prurequests[req]);
213 KASSERT(req != PRU_ATTACH);
214 KASSERT(req != PRU_DETACH);
215 KASSERT(req != PRU_ACCEPT);
216 KASSERT(req != PRU_CONTROL);
217 KASSERT(req != PRU_SENSE);
218 KASSERT(req != PRU_PEERADDR);
219 KASSERT(req != PRU_SOCKADDR);
220
221 switch (req) {
222 case PRU_PURGEIF:
223 return EOPNOTSUPP;
224 }
225 if (pcb == NULL) {
226 err = EINVAL;
227 goto release;
228 }
229
230 switch(req) {
231 case PRU_DISCONNECT:
232 soisdisconnecting(up);
233 return rfcomm_disconnect(pcb, up->so_linger);
234
235 case PRU_ABORT:
236 rfcomm_disconnect(pcb, 0);
237 soisdisconnected(up);
238 rfcomm_detach(up);
239 return 0;
240
241 case PRU_BIND:
242 KASSERT(nam != NULL);
243 sa = mtod(nam, struct sockaddr_bt *);
244
245 if (sa->bt_len != sizeof(struct sockaddr_bt))
246 return EINVAL;
247
248 if (sa->bt_family != AF_BLUETOOTH)
249 return EAFNOSUPPORT;
250
251 return rfcomm_bind(pcb, sa);
252
253 case PRU_CONNECT:
254 KASSERT(nam != NULL);
255 sa = mtod(nam, struct sockaddr_bt *);
256
257 if (sa->bt_len != sizeof(struct sockaddr_bt))
258 return EINVAL;
259
260 if (sa->bt_family != AF_BLUETOOTH)
261 return EAFNOSUPPORT;
262
263 soisconnecting(up);
264 return rfcomm_connect(pcb, sa);
265
266 case PRU_SHUTDOWN:
267 socantsendmore(up);
268 break;
269
270 case PRU_SEND:
271 KASSERT(m != NULL);
272
273 if (ctl) /* no use for that */
274 m_freem(ctl);
275
276 m0 = m_copypacket(m, M_DONTWAIT);
277 if (m0 == NULL)
278 return ENOMEM;
279
280 sbappendstream(&up->so_snd, m);
281
282 return rfcomm_send(pcb, m0);
283
284 case PRU_RCVD:
285 return rfcomm_rcvd(pcb, sbspace(&up->so_rcv));
286
287 case PRU_RCVOOB:
288 return EOPNOTSUPP; /* (no release) */
289
290 case PRU_LISTEN:
291 return rfcomm_listen(pcb);
292
293 case PRU_CONNECT2:
294 case PRU_SENDOOB:
295 case PRU_FASTTIMO:
296 case PRU_SLOWTIMO:
297 case PRU_PROTORCV:
298 case PRU_PROTOSEND:
299 err = EOPNOTSUPP;
300 break;
301
302 default:
303 UNKNOWN(req);
304 err = EOPNOTSUPP;
305 break;
306 }
307
308 release:
309 if (m) m_freem(m);
310 if (ctl) m_freem(ctl);
311 return err;
312 }
313
314 /*
315 * rfcomm_ctloutput(req, socket, sockopt)
316 *
317 */
318 int
319 rfcomm_ctloutput(int req, struct socket *so, struct sockopt *sopt)
320 {
321 struct rfcomm_dlc *pcb = so->so_pcb;
322 int err = 0;
323
324 DPRINTFN(2, "%s\n", prcorequests[req]);
325
326 if (pcb == NULL)
327 return EINVAL;
328
329 if (sopt->sopt_level != BTPROTO_RFCOMM)
330 return ENOPROTOOPT;
331
332 switch(req) {
333 case PRCO_GETOPT:
334 err = rfcomm_getopt(pcb, sopt);
335 break;
336
337 case PRCO_SETOPT:
338 err = rfcomm_setopt(pcb, sopt);
339 break;
340
341 default:
342 err = ENOPROTOOPT;
343 break;
344 }
345
346 return err;
347 }
348
349 /**********************************************************************
350 *
351 * RFCOMM callbacks
352 */
353
354 static void
355 rfcomm_connecting(void *arg)
356 {
357 /* struct socket *so = arg; */
358
359 KASSERT(arg != NULL);
360 DPRINTF("Connecting\n");
361 }
362
363 static void
364 rfcomm_connected(void *arg)
365 {
366 struct socket *so = arg;
367
368 KASSERT(so != NULL);
369 DPRINTF("Connected\n");
370 soisconnected(so);
371 }
372
373 static void
374 rfcomm_disconnected(void *arg, int err)
375 {
376 struct socket *so = arg;
377
378 KASSERT(so != NULL);
379 DPRINTF("Disconnected\n");
380
381 so->so_error = err;
382 soisdisconnected(so);
383 }
384
385 static void *
386 rfcomm_newconn(void *arg, struct sockaddr_bt *laddr,
387 struct sockaddr_bt *raddr)
388 {
389 struct socket *so = arg;
390
391 DPRINTF("New Connection\n");
392 so = sonewconn(so, false);
393 if (so == NULL)
394 return NULL;
395
396 soisconnecting(so);
397
398 return so->so_pcb;
399 }
400
401 /*
402 * rfcomm_complete(rfcomm_dlc, length)
403 *
404 * length bytes are sent and may be removed from socket buffer
405 */
406 static void
407 rfcomm_complete(void *arg, int length)
408 {
409 struct socket *so = arg;
410
411 sbdrop(&so->so_snd, length);
412 sowwakeup(so);
413 }
414
415 /*
416 * rfcomm_linkmode(rfcomm_dlc, new)
417 *
418 * link mode change notification.
419 */
420 static void
421 rfcomm_linkmode(void *arg, int new)
422 {
423 struct socket *so = arg;
424 struct sockopt sopt;
425 int mode;
426
427 DPRINTF("auth %s, encrypt %s, secure %s\n",
428 (new & RFCOMM_LM_AUTH ? "on" : "off"),
429 (new & RFCOMM_LM_ENCRYPT ? "on" : "off"),
430 (new & RFCOMM_LM_SECURE ? "on" : "off"));
431
432 sockopt_init(&sopt, BTPROTO_RFCOMM, SO_RFCOMM_LM, 0);
433 (void)rfcomm_getopt(so->so_pcb, &sopt);
434 (void)sockopt_getint(&sopt, &mode);
435 sockopt_destroy(&sopt);
436
437 if (((mode & RFCOMM_LM_AUTH) && !(new & RFCOMM_LM_AUTH))
438 || ((mode & RFCOMM_LM_ENCRYPT) && !(new & RFCOMM_LM_ENCRYPT))
439 || ((mode & RFCOMM_LM_SECURE) && !(new & RFCOMM_LM_SECURE)))
440 rfcomm_disconnect(so->so_pcb, 0);
441 }
442
443 /*
444 * rfcomm_input(rfcomm_dlc, mbuf)
445 */
446 static void
447 rfcomm_input(void *arg, struct mbuf *m)
448 {
449 struct socket *so = arg;
450
451 KASSERT(so != NULL);
452
453 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
454 printf("%s: %d bytes dropped (socket buffer full)\n",
455 __func__, m->m_pkthdr.len);
456 m_freem(m);
457 return;
458 }
459
460 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
461
462 sbappendstream(&so->so_rcv, m);
463 sorwakeup(so);
464 }
465
466 PR_WRAP_USRREQS(rfcomm)
467
468 #define rfcomm_attach rfcomm_attach_wrapper
469 #define rfcomm_detach rfcomm_detach_wrapper
470 #define rfcomm_accept rfcomm_accept_wrapper
471 #define rfcomm_ioctl rfcomm_ioctl_wrapper
472 #define rfcomm_stat rfcomm_stat_wrapper
473 #define rfcomm_peeraddr rfcomm_peeraddr_wrapper
474 #define rfcomm_sockaddr rfcomm_sockaddr_wrapper
475 #define rfcomm_usrreq rfcomm_usrreq_wrapper
476
477 const struct pr_usrreqs rfcomm_usrreqs = {
478 .pr_attach = rfcomm_attach,
479 .pr_detach = rfcomm_detach,
480 .pr_accept = rfcomm_accept,
481 .pr_ioctl = rfcomm_ioctl,
482 .pr_stat = rfcomm_stat,
483 .pr_peeraddr = rfcomm_peeraddr,
484 .pr_sockaddr = rfcomm_sockaddr,
485 .pr_generic = rfcomm_usrreq,
486 };
487