Home | History | Annotate | Line # | Download | only in netbt
rfcomm_socket.c revision 1.27
      1 /*	$NetBSD: rfcomm_socket.c,v 1.27 2014/07/30 10:04:26 rtr Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2006 Itronix Inc.
      5  * All rights reserved.
      6  *
      7  * Written by Iain Hibbert for Itronix Inc.
      8  *
      9  * Redistribution and use in source and binary forms, with or without
     10  * modification, are permitted provided that the following conditions
     11  * are met:
     12  * 1. Redistributions of source code must retain the above copyright
     13  *    notice, this list of conditions and the following disclaimer.
     14  * 2. Redistributions in binary form must reproduce the above copyright
     15  *    notice, this list of conditions and the following disclaimer in the
     16  *    documentation and/or other materials provided with the distribution.
     17  * 3. The name of Itronix Inc. may not be used to endorse
     18  *    or promote products derived from this software without specific
     19  *    prior written permission.
     20  *
     21  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     23  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     24  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     25  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     26  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     27  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     28  * ON ANY THEORY OF LIABILITY, WHETHER IN
     29  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     30  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     31  * POSSIBILITY OF SUCH DAMAGE.
     32  */
     33 
     34 #include <sys/cdefs.h>
     35 __KERNEL_RCSID(0, "$NetBSD: rfcomm_socket.c,v 1.27 2014/07/30 10:04:26 rtr Exp $");
     36 
     37 /* load symbolic names */
     38 #ifdef BLUETOOTH_DEBUG
     39 #define PRUREQUESTS
     40 #define PRCOREQUESTS
     41 #endif
     42 
     43 #include <sys/param.h>
     44 #include <sys/domain.h>
     45 #include <sys/kernel.h>
     46 #include <sys/mbuf.h>
     47 #include <sys/proc.h>
     48 #include <sys/protosw.h>
     49 #include <sys/socket.h>
     50 #include <sys/socketvar.h>
     51 #include <sys/systm.h>
     52 
     53 #include <netbt/bluetooth.h>
     54 #include <netbt/rfcomm.h>
     55 
     56 /****************************************************************************
     57  *
     58  *	RFCOMM SOCK_STREAM Sockets - serial line emulation
     59  *
     60  */
     61 
     62 static void rfcomm_connecting(void *);
     63 static void rfcomm_connected(void *);
     64 static void rfcomm_disconnected(void *, int);
     65 static void *rfcomm_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
     66 static void rfcomm_complete(void *, int);
     67 static void rfcomm_linkmode(void *, int);
     68 static void rfcomm_input(void *, struct mbuf *);
     69 
     70 static const struct btproto rfcomm_proto = {
     71 	rfcomm_connecting,
     72 	rfcomm_connected,
     73 	rfcomm_disconnected,
     74 	rfcomm_newconn,
     75 	rfcomm_complete,
     76 	rfcomm_linkmode,
     77 	rfcomm_input,
     78 };
     79 
     80 /* sysctl variables */
     81 int rfcomm_sendspace = 4096;
     82 int rfcomm_recvspace = 4096;
     83 
     84 static int
     85 rfcomm_attach(struct socket *so, int proto)
     86 {
     87 	int error;
     88 
     89 	KASSERT(so->so_pcb == NULL);
     90 
     91 	if (so->so_lock == NULL) {
     92 		mutex_obj_hold(bt_lock);
     93 		so->so_lock = bt_lock;
     94 		solock(so);
     95 	}
     96 	KASSERT(solocked(so));
     97 
     98 	/*
     99 	 * Since we have nothing to add, we attach the DLC
    100 	 * structure directly to our PCB pointer.
    101 	 */
    102 	error = soreserve(so, rfcomm_sendspace, rfcomm_recvspace);
    103 	if (error)
    104 		return error;
    105 
    106 	error = rfcomm_attach_pcb((struct rfcomm_dlc **)&so->so_pcb,
    107 				&rfcomm_proto, so);
    108 	if (error)
    109 		return error;
    110 
    111 	error = rfcomm_rcvd(so->so_pcb, sbspace(&so->so_rcv));
    112 	if (error) {
    113 		rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
    114 		return error;
    115 	}
    116 	return 0;
    117 }
    118 
    119 static void
    120 rfcomm_detach(struct socket *so)
    121 {
    122 	KASSERT(so->so_pcb != NULL);
    123 	rfcomm_detach_pcb((struct rfcomm_dlc **)&so->so_pcb);
    124 	KASSERT(so->so_pcb == NULL);
    125 }
    126 
    127 static int
    128 rfcomm_accept(struct socket *so, struct mbuf *nam)
    129 {
    130 	struct rfcomm_dlc *pcb = so->so_pcb;
    131 	struct sockaddr_bt *sa;
    132 
    133 	KASSERT(solocked(so));
    134 	KASSERT(nam != NULL);
    135 
    136 	if (pcb == NULL)
    137 		return EINVAL;
    138 
    139 	sa = mtod(nam, struct sockaddr_bt *);
    140 	nam->m_len = sizeof(struct sockaddr_bt);
    141 	return rfcomm_peeraddr_pcb(pcb, sa);
    142 }
    143 
    144 static int
    145 rfcomm_bind(struct socket *so, struct mbuf *nam)
    146 {
    147 	struct rfcomm_dlc *pcb = so->so_pcb;
    148 	struct sockaddr_bt *sa;
    149 
    150 	KASSERT(solocked(so));
    151 	KASSERT(nam != NULL);
    152 
    153 	if (pcb == NULL)
    154 		return EINVAL;
    155 
    156 	sa = mtod(nam, struct sockaddr_bt *);
    157 	if (sa->bt_len != sizeof(struct sockaddr_bt))
    158 		return EINVAL;
    159 
    160 	if (sa->bt_family != AF_BLUETOOTH)
    161 		return EAFNOSUPPORT;
    162 
    163 	return rfcomm_bind_pcb(pcb, sa);
    164 }
    165 
    166 static int
    167 rfcomm_listen(struct socket *so)
    168 {
    169 	struct rfcomm_dlc *pcb = so->so_pcb;
    170 
    171 	KASSERT(solocked(so));
    172 
    173 	if (pcb == NULL)
    174 		return EINVAL;
    175 
    176 	return rfcomm_listen_pcb(pcb);
    177 }
    178 
    179 static int
    180 rfcomm_connect(struct socket *so, struct mbuf *nam)
    181 {
    182 	struct rfcomm_dlc *pcb = so->so_pcb;
    183 	struct sockaddr_bt *sa;
    184 
    185 	KASSERT(solocked(so));
    186 	KASSERT(nam != NULL);
    187 
    188 	if (pcb == NULL)
    189 		return EINVAL;
    190 
    191 	sa = mtod(nam, struct sockaddr_bt *);
    192 	if (sa->bt_len != sizeof(struct sockaddr_bt))
    193 		return EINVAL;
    194 
    195 	if (sa->bt_family != AF_BLUETOOTH)
    196 		return EAFNOSUPPORT;
    197 
    198 	soisconnecting(so);
    199 	return rfcomm_connect_pcb(pcb, sa);
    200 }
    201 
    202 static int
    203 rfcomm_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
    204 {
    205 	return EPASSTHROUGH;
    206 }
    207 
    208 static int
    209 rfcomm_stat(struct socket *so, struct stat *ub)
    210 {
    211 	KASSERT(solocked(so));
    212 
    213 	return 0;
    214 }
    215 
    216 static int
    217 rfcomm_peeraddr(struct socket *so, struct mbuf *nam)
    218 {
    219 	struct rfcomm_dlc *pcb = so->so_pcb;
    220 	struct sockaddr_bt *sa;
    221 
    222 	KASSERT(solocked(so));
    223 	KASSERT(pcb != NULL);
    224 	KASSERT(nam != NULL);
    225 
    226 	sa = mtod(nam, struct sockaddr_bt *);
    227 	nam->m_len = sizeof(struct sockaddr_bt);
    228 	return rfcomm_peeraddr_pcb(pcb, sa);
    229 }
    230 
    231 static int
    232 rfcomm_sockaddr(struct socket *so, struct mbuf *nam)
    233 {
    234 	struct rfcomm_dlc *pcb = so->so_pcb;
    235 	struct sockaddr_bt *sa;
    236 
    237 	KASSERT(solocked(so));
    238 	KASSERT(pcb != NULL);
    239 	KASSERT(nam != NULL);
    240 
    241 	sa = mtod(nam, struct sockaddr_bt *);
    242 	nam->m_len = sizeof(struct sockaddr_bt);
    243 	return rfcomm_sockaddr_pcb(pcb, sa);
    244 }
    245 
    246 static int
    247 rfcomm_recvoob(struct socket *so, struct mbuf *m, int flags)
    248 {
    249 	KASSERT(solocked(so));
    250 
    251 	return EOPNOTSUPP;
    252 }
    253 
    254 static int
    255 rfcomm_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
    256 {
    257 	KASSERT(solocked(so));
    258 
    259 	if (m)
    260 		m_freem(m);
    261 	if (control)
    262 		m_freem(control);
    263 
    264 	return EOPNOTSUPP;
    265 }
    266 
    267 /*
    268  * User Request.
    269  * up is socket
    270  * m is optional mbuf chain containing message
    271  * nam is either
    272  *	optional mbuf chain containing an address
    273  *	message flags (PRU_RCVD)
    274  * ctl is either
    275  *	optional mbuf chain containing socket options
    276  *	optional interface pointer PRU_PURGEIF
    277  * l is pointer to process requesting action (if any)
    278  *
    279  * we are responsible for disposing of m and ctl if
    280  * they are mbuf chains
    281  */
    282 static int
    283 rfcomm_usrreq(struct socket *up, int req, struct mbuf *m,
    284 		struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
    285 {
    286 	struct rfcomm_dlc *pcb = up->so_pcb;
    287 	struct mbuf *m0;
    288 	int err = 0;
    289 
    290 	DPRINTFN(2, "%s\n", prurequests[req]);
    291 	KASSERT(req != PRU_ATTACH);
    292 	KASSERT(req != PRU_DETACH);
    293 	KASSERT(req != PRU_ACCEPT);
    294 	KASSERT(req != PRU_BIND);
    295 	KASSERT(req != PRU_LISTEN);
    296 	KASSERT(req != PRU_CONNECT);
    297 	KASSERT(req != PRU_CONTROL);
    298 	KASSERT(req != PRU_SENSE);
    299 	KASSERT(req != PRU_PEERADDR);
    300 	KASSERT(req != PRU_SOCKADDR);
    301 	KASSERT(req != PRU_RCVOOB);
    302 	KASSERT(req != PRU_SENDOOB);
    303 
    304 	switch (req) {
    305 	case PRU_PURGEIF:
    306 		return EOPNOTSUPP;
    307 	}
    308 	if (pcb == NULL) {
    309 		err = EINVAL;
    310 		goto release;
    311 	}
    312 
    313 	switch(req) {
    314 	case PRU_DISCONNECT:
    315 		soisdisconnecting(up);
    316 		return rfcomm_disconnect(pcb, up->so_linger);
    317 
    318 	case PRU_ABORT:
    319 		rfcomm_disconnect(pcb, 0);
    320 		soisdisconnected(up);
    321 		rfcomm_detach(up);
    322 		return 0;
    323 
    324 	case PRU_SHUTDOWN:
    325 		socantsendmore(up);
    326 		break;
    327 
    328 	case PRU_SEND:
    329 		KASSERT(m != NULL);
    330 
    331 		if (ctl)	/* no use for that */
    332 			m_freem(ctl);
    333 
    334 		m0 = m_copypacket(m, M_DONTWAIT);
    335 		if (m0 == NULL)
    336 			return ENOMEM;
    337 
    338 		sbappendstream(&up->so_snd, m);
    339 
    340 		return rfcomm_send(pcb, m0);
    341 
    342 	case PRU_RCVD:
    343 		return rfcomm_rcvd(pcb, sbspace(&up->so_rcv));
    344 
    345 	case PRU_CONNECT2:
    346 	case PRU_FASTTIMO:
    347 	case PRU_SLOWTIMO:
    348 	case PRU_PROTORCV:
    349 	case PRU_PROTOSEND:
    350 		err = EOPNOTSUPP;
    351 		break;
    352 
    353 	default:
    354 		UNKNOWN(req);
    355 		err = EOPNOTSUPP;
    356 		break;
    357 	}
    358 
    359 release:
    360 	if (m) m_freem(m);
    361 	if (ctl) m_freem(ctl);
    362 	return err;
    363 }
    364 
    365 /*
    366  * rfcomm_ctloutput(req, socket, sockopt)
    367  *
    368  */
    369 int
    370 rfcomm_ctloutput(int req, struct socket *so, struct sockopt *sopt)
    371 {
    372 	struct rfcomm_dlc *pcb = so->so_pcb;
    373 	int err = 0;
    374 
    375 	DPRINTFN(2, "%s\n", prcorequests[req]);
    376 
    377 	if (pcb == NULL)
    378 		return EINVAL;
    379 
    380 	if (sopt->sopt_level != BTPROTO_RFCOMM)
    381 		return ENOPROTOOPT;
    382 
    383 	switch(req) {
    384 	case PRCO_GETOPT:
    385 		err = rfcomm_getopt(pcb, sopt);
    386 		break;
    387 
    388 	case PRCO_SETOPT:
    389 		err = rfcomm_setopt(pcb, sopt);
    390 		break;
    391 
    392 	default:
    393 		err = ENOPROTOOPT;
    394 		break;
    395 	}
    396 
    397 	return err;
    398 }
    399 
    400 /**********************************************************************
    401  *
    402  * RFCOMM callbacks
    403  */
    404 
    405 static void
    406 rfcomm_connecting(void *arg)
    407 {
    408 	/* struct socket *so = arg; */
    409 
    410 	KASSERT(arg != NULL);
    411 	DPRINTF("Connecting\n");
    412 }
    413 
    414 static void
    415 rfcomm_connected(void *arg)
    416 {
    417 	struct socket *so = arg;
    418 
    419 	KASSERT(so != NULL);
    420 	DPRINTF("Connected\n");
    421 	soisconnected(so);
    422 }
    423 
    424 static void
    425 rfcomm_disconnected(void *arg, int err)
    426 {
    427 	struct socket *so = arg;
    428 
    429 	KASSERT(so != NULL);
    430 	DPRINTF("Disconnected\n");
    431 
    432 	so->so_error = err;
    433 	soisdisconnected(so);
    434 }
    435 
    436 static void *
    437 rfcomm_newconn(void *arg, struct sockaddr_bt *laddr,
    438     struct sockaddr_bt *raddr)
    439 {
    440 	struct socket *so = arg;
    441 
    442 	DPRINTF("New Connection\n");
    443 	so = sonewconn(so, false);
    444 	if (so == NULL)
    445 		return NULL;
    446 
    447 	soisconnecting(so);
    448 
    449 	return so->so_pcb;
    450 }
    451 
    452 /*
    453  * rfcomm_complete(rfcomm_dlc, length)
    454  *
    455  * length bytes are sent and may be removed from socket buffer
    456  */
    457 static void
    458 rfcomm_complete(void *arg, int length)
    459 {
    460 	struct socket *so = arg;
    461 
    462 	sbdrop(&so->so_snd, length);
    463 	sowwakeup(so);
    464 }
    465 
    466 /*
    467  * rfcomm_linkmode(rfcomm_dlc, new)
    468  *
    469  * link mode change notification.
    470  */
    471 static void
    472 rfcomm_linkmode(void *arg, int new)
    473 {
    474 	struct socket *so = arg;
    475 	struct sockopt sopt;
    476 	int mode;
    477 
    478 	DPRINTF("auth %s, encrypt %s, secure %s\n",
    479 		(new & RFCOMM_LM_AUTH ? "on" : "off"),
    480 		(new & RFCOMM_LM_ENCRYPT ? "on" : "off"),
    481 		(new & RFCOMM_LM_SECURE ? "on" : "off"));
    482 
    483 	sockopt_init(&sopt, BTPROTO_RFCOMM, SO_RFCOMM_LM, 0);
    484 	(void)rfcomm_getopt(so->so_pcb, &sopt);
    485 	(void)sockopt_getint(&sopt, &mode);
    486 	sockopt_destroy(&sopt);
    487 
    488 	if (((mode & RFCOMM_LM_AUTH) && !(new & RFCOMM_LM_AUTH))
    489 	    || ((mode & RFCOMM_LM_ENCRYPT) && !(new & RFCOMM_LM_ENCRYPT))
    490 	    || ((mode & RFCOMM_LM_SECURE) && !(new & RFCOMM_LM_SECURE)))
    491 		rfcomm_disconnect(so->so_pcb, 0);
    492 }
    493 
    494 /*
    495  * rfcomm_input(rfcomm_dlc, mbuf)
    496  */
    497 static void
    498 rfcomm_input(void *arg, struct mbuf *m)
    499 {
    500 	struct socket *so = arg;
    501 
    502 	KASSERT(so != NULL);
    503 
    504 	if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
    505 		printf("%s: %d bytes dropped (socket buffer full)\n",
    506 			__func__, m->m_pkthdr.len);
    507 		m_freem(m);
    508 		return;
    509 	}
    510 
    511 	DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
    512 
    513 	sbappendstream(&so->so_rcv, m);
    514 	sorwakeup(so);
    515 }
    516 
    517 PR_WRAP_USRREQS(rfcomm)
    518 
    519 #define	rfcomm_attach		rfcomm_attach_wrapper
    520 #define	rfcomm_detach		rfcomm_detach_wrapper
    521 #define	rfcomm_accept		rfcomm_accept_wrapper
    522 #define	rfcomm_bind		rfcomm_bind_wrapper
    523 #define	rfcomm_listen		rfcomm_listen_wrapper
    524 #define	rfcomm_connect		rfcomm_connect_wrapper
    525 #define	rfcomm_ioctl		rfcomm_ioctl_wrapper
    526 #define	rfcomm_stat		rfcomm_stat_wrapper
    527 #define	rfcomm_peeraddr		rfcomm_peeraddr_wrapper
    528 #define	rfcomm_sockaddr		rfcomm_sockaddr_wrapper
    529 #define	rfcomm_recvoob		rfcomm_recvoob_wrapper
    530 #define	rfcomm_sendoob		rfcomm_sendoob_wrapper
    531 #define	rfcomm_usrreq		rfcomm_usrreq_wrapper
    532 
    533 const struct pr_usrreqs rfcomm_usrreqs = {
    534 	.pr_attach	= rfcomm_attach,
    535 	.pr_detach	= rfcomm_detach,
    536 	.pr_accept	= rfcomm_accept,
    537 	.pr_bind	= rfcomm_bind,
    538 	.pr_listen	= rfcomm_listen,
    539 	.pr_connect	= rfcomm_connect,
    540 	.pr_ioctl	= rfcomm_ioctl,
    541 	.pr_stat	= rfcomm_stat,
    542 	.pr_peeraddr	= rfcomm_peeraddr,
    543 	.pr_sockaddr	= rfcomm_sockaddr,
    544 	.pr_recvoob	= rfcomm_recvoob,
    545 	.pr_sendoob	= rfcomm_sendoob,
    546 	.pr_generic	= rfcomm_usrreq,
    547 };
    548