rfcomm_socket.c revision 1.27 1 /* $NetBSD: rfcomm_socket.c,v 1.27 2014/07/30 10:04:26 rtr Exp $ */
2
3 /*-
4 * Copyright (c) 2006 Itronix Inc.
5 * All rights reserved.
6 *
7 * Written by Iain Hibbert for Itronix Inc.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of Itronix Inc. may not be used to endorse
18 * or promote products derived from this software without specific
19 * prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
23 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
25 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 * ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
32 */
33
34 #include <sys/cdefs.h>
35 __KERNEL_RCSID(0, "$NetBSD: rfcomm_socket.c,v 1.27 2014/07/30 10:04:26 rtr Exp $");
36
37 /* load symbolic names */
38 #ifdef BLUETOOTH_DEBUG
39 #define PRUREQUESTS
40 #define PRCOREQUESTS
41 #endif
42
43 #include <sys/param.h>
44 #include <sys/domain.h>
45 #include <sys/kernel.h>
46 #include <sys/mbuf.h>
47 #include <sys/proc.h>
48 #include <sys/protosw.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/systm.h>
52
53 #include <netbt/bluetooth.h>
54 #include <netbt/rfcomm.h>
55
56 /****************************************************************************
57 *
58 * RFCOMM SOCK_STREAM Sockets - serial line emulation
59 *
60 */
61
62 static void rfcomm_connecting(void *);
63 static void rfcomm_connected(void *);
64 static void rfcomm_disconnected(void *, int);
65 static void *rfcomm_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
66 static void rfcomm_complete(void *, int);
67 static void rfcomm_linkmode(void *, int);
68 static void rfcomm_input(void *, struct mbuf *);
69
70 static const struct btproto rfcomm_proto = {
71 rfcomm_connecting,
72 rfcomm_connected,
73 rfcomm_disconnected,
74 rfcomm_newconn,
75 rfcomm_complete,
76 rfcomm_linkmode,
77 rfcomm_input,
78 };
79
80 /* sysctl variables */
81 int rfcomm_sendspace = 4096;
82 int rfcomm_recvspace = 4096;
83
84 static int
85 rfcomm_attach(struct socket *so, int proto)
86 {
87 int error;
88
89 KASSERT(so->so_pcb == NULL);
90
91 if (so->so_lock == NULL) {
92 mutex_obj_hold(bt_lock);
93 so->so_lock = bt_lock;
94 solock(so);
95 }
96 KASSERT(solocked(so));
97
98 /*
99 * Since we have nothing to add, we attach the DLC
100 * structure directly to our PCB pointer.
101 */
102 error = soreserve(so, rfcomm_sendspace, rfcomm_recvspace);
103 if (error)
104 return error;
105
106 error = rfcomm_attach_pcb((struct rfcomm_dlc **)&so->so_pcb,
107 &rfcomm_proto, so);
108 if (error)
109 return error;
110
111 error = rfcomm_rcvd(so->so_pcb, sbspace(&so->so_rcv));
112 if (error) {
113 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
114 return error;
115 }
116 return 0;
117 }
118
119 static void
120 rfcomm_detach(struct socket *so)
121 {
122 KASSERT(so->so_pcb != NULL);
123 rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
124 KASSERT(so->so_pcb == NULL);
125 }
126
127 static int
128 rfcomm_accept(struct socket *so, struct mbuf *nam)
129 {
130 struct rfcomm_dlc *pcb = so->so_pcb;
131 struct sockaddr_bt *sa;
132
133 KASSERT(solocked(so));
134 KASSERT(nam != NULL);
135
136 if (pcb == NULL)
137 return EINVAL;
138
139 sa = mtod(nam, struct sockaddr_bt *);
140 nam->m_len = sizeof(struct sockaddr_bt);
141 return rfcomm_peeraddr_pcb(pcb, sa);
142 }
143
144 static int
145 rfcomm_bind(struct socket *so, struct mbuf *nam)
146 {
147 struct rfcomm_dlc *pcb = so->so_pcb;
148 struct sockaddr_bt *sa;
149
150 KASSERT(solocked(so));
151 KASSERT(nam != NULL);
152
153 if (pcb == NULL)
154 return EINVAL;
155
156 sa = mtod(nam, struct sockaddr_bt *);
157 if (sa->bt_len != sizeof(struct sockaddr_bt))
158 return EINVAL;
159
160 if (sa->bt_family != AF_BLUETOOTH)
161 return EAFNOSUPPORT;
162
163 return rfcomm_bind_pcb(pcb, sa);
164 }
165
166 static int
167 rfcomm_listen(struct socket *so)
168 {
169 struct rfcomm_dlc *pcb = so->so_pcb;
170
171 KASSERT(solocked(so));
172
173 if (pcb == NULL)
174 return EINVAL;
175
176 return rfcomm_listen_pcb(pcb);
177 }
178
179 static int
180 rfcomm_connect(struct socket *so, struct mbuf *nam)
181 {
182 struct rfcomm_dlc *pcb = so->so_pcb;
183 struct sockaddr_bt *sa;
184
185 KASSERT(solocked(so));
186 KASSERT(nam != NULL);
187
188 if (pcb == NULL)
189 return EINVAL;
190
191 sa = mtod(nam, struct sockaddr_bt *);
192 if (sa->bt_len != sizeof(struct sockaddr_bt))
193 return EINVAL;
194
195 if (sa->bt_family != AF_BLUETOOTH)
196 return EAFNOSUPPORT;
197
198 soisconnecting(so);
199 return rfcomm_connect_pcb(pcb, sa);
200 }
201
202 static int
203 rfcomm_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
204 {
205 return EPASSTHROUGH;
206 }
207
208 static int
209 rfcomm_stat(struct socket *so, struct stat *ub)
210 {
211 KASSERT(solocked(so));
212
213 return 0;
214 }
215
216 static int
217 rfcomm_peeraddr(struct socket *so, struct mbuf *nam)
218 {
219 struct rfcomm_dlc *pcb = so->so_pcb;
220 struct sockaddr_bt *sa;
221
222 KASSERT(solocked(so));
223 KASSERT(pcb != NULL);
224 KASSERT(nam != NULL);
225
226 sa = mtod(nam, struct sockaddr_bt *);
227 nam->m_len = sizeof(struct sockaddr_bt);
228 return rfcomm_peeraddr_pcb(pcb, sa);
229 }
230
231 static int
232 rfcomm_sockaddr(struct socket *so, struct mbuf *nam)
233 {
234 struct rfcomm_dlc *pcb = so->so_pcb;
235 struct sockaddr_bt *sa;
236
237 KASSERT(solocked(so));
238 KASSERT(pcb != NULL);
239 KASSERT(nam != NULL);
240
241 sa = mtod(nam, struct sockaddr_bt *);
242 nam->m_len = sizeof(struct sockaddr_bt);
243 return rfcomm_sockaddr_pcb(pcb, sa);
244 }
245
246 static int
247 rfcomm_recvoob(struct socket *so, struct mbuf *m, int flags)
248 {
249 KASSERT(solocked(so));
250
251 return EOPNOTSUPP;
252 }
253
254 static int
255 rfcomm_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
256 {
257 KASSERT(solocked(so));
258
259 if (m)
260 m_freem(m);
261 if (control)
262 m_freem(control);
263
264 return EOPNOTSUPP;
265 }
266
267 /*
268 * User Request.
269 * up is socket
270 * m is optional mbuf chain containing message
271 * nam is either
272 * optional mbuf chain containing an address
273 * message flags (PRU_RCVD)
274 * ctl is either
275 * optional mbuf chain containing socket options
276 * optional interface pointer PRU_PURGEIF
277 * l is pointer to process requesting action (if any)
278 *
279 * we are responsible for disposing of m and ctl if
280 * they are mbuf chains
281 */
282 static int
283 rfcomm_usrreq(struct socket *up, int req, struct mbuf *m,
284 struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
285 {
286 struct rfcomm_dlc *pcb = up->so_pcb;
287 struct mbuf *m0;
288 int err = 0;
289
290 DPRINTFN(2, "%s\n", prurequests[req]);
291 KASSERT(req != PRU_ATTACH);
292 KASSERT(req != PRU_DETACH);
293 KASSERT(req != PRU_ACCEPT);
294 KASSERT(req != PRU_BIND);
295 KASSERT(req != PRU_LISTEN);
296 KASSERT(req != PRU_CONNECT);
297 KASSERT(req != PRU_CONTROL);
298 KASSERT(req != PRU_SENSE);
299 KASSERT(req != PRU_PEERADDR);
300 KASSERT(req != PRU_SOCKADDR);
301 KASSERT(req != PRU_RCVOOB);
302 KASSERT(req != PRU_SENDOOB);
303
304 switch (req) {
305 case PRU_PURGEIF:
306 return EOPNOTSUPP;
307 }
308 if (pcb == NULL) {
309 err = EINVAL;
310 goto release;
311 }
312
313 switch(req) {
314 case PRU_DISCONNECT:
315 soisdisconnecting(up);
316 return rfcomm_disconnect(pcb, up->so_linger);
317
318 case PRU_ABORT:
319 rfcomm_disconnect(pcb, 0);
320 soisdisconnected(up);
321 rfcomm_detach(up);
322 return 0;
323
324 case PRU_SHUTDOWN:
325 socantsendmore(up);
326 break;
327
328 case PRU_SEND:
329 KASSERT(m != NULL);
330
331 if (ctl) /* no use for that */
332 m_freem(ctl);
333
334 m0 = m_copypacket(m, M_DONTWAIT);
335 if (m0 == NULL)
336 return ENOMEM;
337
338 sbappendstream(&up->so_snd, m);
339
340 return rfcomm_send(pcb, m0);
341
342 case PRU_RCVD:
343 return rfcomm_rcvd(pcb, sbspace(&up->so_rcv));
344
345 case PRU_CONNECT2:
346 case PRU_FASTTIMO:
347 case PRU_SLOWTIMO:
348 case PRU_PROTORCV:
349 case PRU_PROTOSEND:
350 err = EOPNOTSUPP;
351 break;
352
353 default:
354 UNKNOWN(req);
355 err = EOPNOTSUPP;
356 break;
357 }
358
359 release:
360 if (m) m_freem(m);
361 if (ctl) m_freem(ctl);
362 return err;
363 }
364
365 /*
366 * rfcomm_ctloutput(req, socket, sockopt)
367 *
368 */
369 int
370 rfcomm_ctloutput(int req, struct socket *so, struct sockopt *sopt)
371 {
372 struct rfcomm_dlc *pcb = so->so_pcb;
373 int err = 0;
374
375 DPRINTFN(2, "%s\n", prcorequests[req]);
376
377 if (pcb == NULL)
378 return EINVAL;
379
380 if (sopt->sopt_level != BTPROTO_RFCOMM)
381 return ENOPROTOOPT;
382
383 switch(req) {
384 case PRCO_GETOPT:
385 err = rfcomm_getopt(pcb, sopt);
386 break;
387
388 case PRCO_SETOPT:
389 err = rfcomm_setopt(pcb, sopt);
390 break;
391
392 default:
393 err = ENOPROTOOPT;
394 break;
395 }
396
397 return err;
398 }
399
400 /**********************************************************************
401 *
402 * RFCOMM callbacks
403 */
404
405 static void
406 rfcomm_connecting(void *arg)
407 {
408 /* struct socket *so = arg; */
409
410 KASSERT(arg != NULL);
411 DPRINTF("Connecting\n");
412 }
413
414 static void
415 rfcomm_connected(void *arg)
416 {
417 struct socket *so = arg;
418
419 KASSERT(so != NULL);
420 DPRINTF("Connected\n");
421 soisconnected(so);
422 }
423
424 static void
425 rfcomm_disconnected(void *arg, int err)
426 {
427 struct socket *so = arg;
428
429 KASSERT(so != NULL);
430 DPRINTF("Disconnected\n");
431
432 so->so_error = err;
433 soisdisconnected(so);
434 }
435
436 static void *
437 rfcomm_newconn(void *arg, struct sockaddr_bt *laddr,
438 struct sockaddr_bt *raddr)
439 {
440 struct socket *so = arg;
441
442 DPRINTF("New Connection\n");
443 so = sonewconn(so, false);
444 if (so == NULL)
445 return NULL;
446
447 soisconnecting(so);
448
449 return so->so_pcb;
450 }
451
452 /*
453 * rfcomm_complete(rfcomm_dlc, length)
454 *
455 * length bytes are sent and may be removed from socket buffer
456 */
457 static void
458 rfcomm_complete(void *arg, int length)
459 {
460 struct socket *so = arg;
461
462 sbdrop(&so->so_snd, length);
463 sowwakeup(so);
464 }
465
466 /*
467 * rfcomm_linkmode(rfcomm_dlc, new)
468 *
469 * link mode change notification.
470 */
471 static void
472 rfcomm_linkmode(void *arg, int new)
473 {
474 struct socket *so = arg;
475 struct sockopt sopt;
476 int mode;
477
478 DPRINTF("auth %s, encrypt %s, secure %s\n",
479 (new & RFCOMM_LM_AUTH ? "on" : "off"),
480 (new & RFCOMM_LM_ENCRYPT ? "on" : "off"),
481 (new & RFCOMM_LM_SECURE ? "on" : "off"));
482
483 sockopt_init(&sopt, BTPROTO_RFCOMM, SO_RFCOMM_LM, 0);
484 (void)rfcomm_getopt(so->so_pcb, &sopt);
485 (void)sockopt_getint(&sopt, &mode);
486 sockopt_destroy(&sopt);
487
488 if (((mode & RFCOMM_LM_AUTH) && !(new & RFCOMM_LM_AUTH))
489 || ((mode & RFCOMM_LM_ENCRYPT) && !(new & RFCOMM_LM_ENCRYPT))
490 || ((mode & RFCOMM_LM_SECURE) && !(new & RFCOMM_LM_SECURE)))
491 rfcomm_disconnect(so->so_pcb, 0);
492 }
493
494 /*
495 * rfcomm_input(rfcomm_dlc, mbuf)
496 */
497 static void
498 rfcomm_input(void *arg, struct mbuf *m)
499 {
500 struct socket *so = arg;
501
502 KASSERT(so != NULL);
503
504 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
505 printf("%s: %d bytes dropped (socket buffer full)\n",
506 __func__, m->m_pkthdr.len);
507 m_freem(m);
508 return;
509 }
510
511 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
512
513 sbappendstream(&so->so_rcv, m);
514 sorwakeup(so);
515 }
516
517 PR_WRAP_USRREQS(rfcomm)
518
519 #define rfcomm_attach rfcomm_attach_wrapper
520 #define rfcomm_detach rfcomm_detach_wrapper
521 #define rfcomm_accept rfcomm_accept_wrapper
522 #define rfcomm_bind rfcomm_bind_wrapper
523 #define rfcomm_listen rfcomm_listen_wrapper
524 #define rfcomm_connect rfcomm_connect_wrapper
525 #define rfcomm_ioctl rfcomm_ioctl_wrapper
526 #define rfcomm_stat rfcomm_stat_wrapper
527 #define rfcomm_peeraddr rfcomm_peeraddr_wrapper
528 #define rfcomm_sockaddr rfcomm_sockaddr_wrapper
529 #define rfcomm_recvoob rfcomm_recvoob_wrapper
530 #define rfcomm_sendoob rfcomm_sendoob_wrapper
531 #define rfcomm_usrreq rfcomm_usrreq_wrapper
532
533 const struct pr_usrreqs rfcomm_usrreqs = {
534 .pr_attach = rfcomm_attach,
535 .pr_detach = rfcomm_detach,
536 .pr_accept = rfcomm_accept,
537 .pr_bind = rfcomm_bind,
538 .pr_listen = rfcomm_listen,
539 .pr_connect = rfcomm_connect,
540 .pr_ioctl = rfcomm_ioctl,
541 .pr_stat = rfcomm_stat,
542 .pr_peeraddr = rfcomm_peeraddr,
543 .pr_sockaddr = rfcomm_sockaddr,
544 .pr_recvoob = rfcomm_recvoob,
545 .pr_sendoob = rfcomm_sendoob,
546 .pr_generic = rfcomm_usrreq,
547 };
548