1 /* $NetBSD: l2cap_socket.c,v 1.31 2014/08/09 05:33:01 rtr Exp $ */ 2 3 /*- 4 * Copyright (c) 2005 Iain Hibbert. 5 * Copyright (c) 2006 Itronix Inc. 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. The name of Itronix Inc. may not be used to endorse 17 * or promote products derived from this software without specific 18 * prior written permission. 19 * 20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND 21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY 24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND 27 * ON ANY THEORY OF LIABILITY, WHETHER IN 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 30 * POSSIBILITY OF SUCH DAMAGE. 31 */ 32 33 #include <sys/cdefs.h> 34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.31 2014/08/09 05:33:01 rtr Exp $"); 35 36 /* load symbolic names */ 37 #ifdef BLUETOOTH_DEBUG 38 #define PRUREQUESTS 39 #define PRCOREQUESTS 40 #endif 41 42 #include <sys/param.h> 43 #include <sys/domain.h> 44 #include <sys/kernel.h> 45 #include <sys/mbuf.h> 46 #include <sys/proc.h> 47 #include <sys/protosw.h> 48 #include <sys/socket.h> 49 #include <sys/socketvar.h> 50 #include <sys/systm.h> 51 52 #include <netbt/bluetooth.h> 53 #include <netbt/l2cap.h> 54 55 /* 56 * L2CAP Sockets 57 * 58 * SOCK_SEQPACKET - normal L2CAP connection 59 * 60 * SOCK_DGRAM - connectionless L2CAP - XXX not yet 61 */ 62 63 static void l2cap_connecting(void *); 64 static void l2cap_connected(void *); 65 static void l2cap_disconnected(void *, int); 66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *); 67 static void l2cap_complete(void *, int); 68 static void l2cap_linkmode(void *, int); 69 static void l2cap_input(void *, struct mbuf *); 70 71 static const struct btproto l2cap_proto = { 72 l2cap_connecting, 73 l2cap_connected, 74 l2cap_disconnected, 75 l2cap_newconn, 76 l2cap_complete, 77 l2cap_linkmode, 78 l2cap_input, 79 }; 80 81 /* sysctl variables */ 82 int l2cap_sendspace = 4096; 83 int l2cap_recvspace = 4096; 84 85 static int 86 l2cap_attach(struct socket *so, int proto) 87 { 88 int error; 89 90 KASSERT(so->so_pcb == NULL); 91 92 if (so->so_lock == NULL) { 93 mutex_obj_hold(bt_lock); 94 so->so_lock = bt_lock; 95 solock(so); 96 } 97 KASSERT(solocked(so)); 98 99 /* 100 * For L2CAP socket PCB we just use an l2cap_channel structure 101 * since we have nothing to add.. 102 */ 103 error = soreserve(so, l2cap_sendspace, l2cap_recvspace); 104 if (error) 105 return error; 106 107 return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb, 108 &l2cap_proto, so); 109 } 110 111 static void 112 l2cap_detach(struct socket *so) 113 { 114 KASSERT(so->so_pcb != NULL); 115 l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb); 116 KASSERT(so->so_pcb == NULL); 117 } 118 119 static int 120 l2cap_accept(struct socket *so, struct mbuf *nam) 121 { 122 struct l2cap_channel *pcb = so->so_pcb; 123 struct sockaddr_bt *sa; 124 125 KASSERT(solocked(so)); 126 KASSERT(nam != NULL); 127 128 if (pcb == NULL) 129 return EINVAL; 130 131 sa = mtod(nam, struct sockaddr_bt *); 132 nam->m_len = sizeof(struct sockaddr_bt); 133 return l2cap_peeraddr_pcb(pcb, sa); 134 } 135 136 static int 137 l2cap_bind(struct socket *so, struct mbuf *nam, struct lwp *l) 138 { 139 struct l2cap_channel *pcb = so->so_pcb; 140 struct sockaddr_bt *sa; 141 142 KASSERT(solocked(so)); 143 KASSERT(nam != NULL); 144 145 if (pcb == NULL) 146 return EINVAL; 147 148 sa = mtod(nam, struct sockaddr_bt *); 149 if (sa->bt_len != sizeof(struct sockaddr_bt)) 150 return EINVAL; 151 152 if (sa->bt_family != AF_BLUETOOTH) 153 return EAFNOSUPPORT; 154 155 return l2cap_bind_pcb(pcb, sa); 156 } 157 158 static int 159 l2cap_listen(struct socket *so, struct lwp *l) 160 { 161 struct l2cap_channel *pcb = so->so_pcb; 162 163 KASSERT(solocked(so)); 164 165 if (pcb == NULL) 166 return EINVAL; 167 168 return l2cap_listen_pcb(pcb); 169 } 170 171 static int 172 l2cap_connect(struct socket *so, struct mbuf *nam, struct lwp *l) 173 { 174 struct l2cap_channel *pcb = so->so_pcb; 175 struct sockaddr_bt *sa; 176 177 KASSERT(solocked(so)); 178 KASSERT(nam != NULL); 179 180 if (pcb == NULL) 181 return EINVAL; 182 183 sa = mtod(nam, struct sockaddr_bt *); 184 if (sa->bt_len != sizeof(struct sockaddr_bt)) 185 return EINVAL; 186 187 if (sa->bt_family != AF_BLUETOOTH) 188 return EAFNOSUPPORT; 189 190 soisconnecting(so); 191 return l2cap_connect_pcb(pcb, sa); 192 } 193 194 static int 195 l2cap_connect2(struct socket *so, struct socket *so2) 196 { 197 KASSERT(solocked(so)); 198 199 if (so->so_pcb == NULL) 200 return EINVAL; 201 202 return EOPNOTSUPP; 203 } 204 205 static int 206 l2cap_disconnect(struct socket *so) 207 { 208 struct l2cap_channel *pcb = so->so_pcb; 209 210 KASSERT(solocked(so)); 211 212 if (pcb == NULL) 213 return EINVAL; 214 215 soisdisconnecting(so); 216 return l2cap_disconnect_pcb(pcb, so->so_linger); 217 } 218 219 static int 220 l2cap_shutdown(struct socket *so) 221 { 222 KASSERT(solocked(so)); 223 224 socantsendmore(so); 225 return 0; 226 } 227 228 static int 229 l2cap_abort(struct socket *so) 230 { 231 struct l2cap_channel *pcb = so->so_pcb; 232 233 KASSERT(solocked(so)); 234 235 if (pcb == NULL) 236 return EINVAL; 237 238 l2cap_disconnect_pcb(pcb, 0); 239 soisdisconnected(so); 240 l2cap_detach(so); 241 return 0; 242 } 243 244 static int 245 l2cap_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp) 246 { 247 return EPASSTHROUGH; 248 } 249 250 static int 251 l2cap_stat(struct socket *so, struct stat *ub) 252 { 253 KASSERT(solocked(so)); 254 255 return 0; 256 } 257 258 static int 259 l2cap_peeraddr(struct socket *so, struct mbuf *nam) 260 { 261 struct l2cap_channel *pcb = so->so_pcb; 262 struct sockaddr_bt *sa; 263 264 KASSERT(solocked(so)); 265 KASSERT(pcb != NULL); 266 KASSERT(nam != NULL); 267 268 sa = mtod(nam, struct sockaddr_bt *); 269 nam->m_len = sizeof(struct sockaddr_bt); 270 return l2cap_peeraddr_pcb(pcb, sa); 271 } 272 273 static int 274 l2cap_sockaddr(struct socket *so, struct mbuf *nam) 275 { 276 struct l2cap_channel *pcb = so->so_pcb; 277 struct sockaddr_bt *sa; 278 279 KASSERT(solocked(so)); 280 KASSERT(pcb != NULL); 281 KASSERT(nam != NULL); 282 283 sa = mtod(nam, struct sockaddr_bt *); 284 nam->m_len = sizeof(struct sockaddr_bt); 285 return l2cap_sockaddr_pcb(pcb, sa); 286 } 287 288 static int 289 l2cap_rcvd(struct socket *so, int flags, struct lwp *l) 290 { 291 KASSERT(solocked(so)); 292 293 return EOPNOTSUPP; 294 } 295 296 static int 297 l2cap_recvoob(struct socket *so, struct mbuf *m, int flags) 298 { 299 KASSERT(solocked(so)); 300 301 return EOPNOTSUPP; 302 } 303 304 static int 305 l2cap_send(struct socket *so, struct mbuf *m, struct mbuf *nam, 306 struct mbuf *control, struct lwp *l) 307 { 308 struct l2cap_channel *pcb = so->so_pcb; 309 struct mbuf *m0; 310 int error = 0; 311 312 KASSERT(solocked(so)); 313 KASSERT(m != NULL); 314 315 if (control) 316 m_freem(control); 317 318 if (pcb == NULL) { 319 error = EINVAL; 320 goto release; 321 } 322 323 if (m->m_pkthdr.len == 0) 324 goto release; 325 326 if (m->m_pkthdr.len > pcb->lc_omtu) { 327 error = EMSGSIZE; 328 goto release; 329 } 330 331 m0 = m_copypacket(m, M_DONTWAIT); 332 if (m0 == NULL) { 333 error = ENOMEM; 334 goto release; 335 } 336 337 sbappendrecord(&so->so_snd, m); 338 return l2cap_send_pcb(pcb, m0); 339 340 release: 341 if (m) 342 m_freem(m); 343 344 return error; 345 } 346 347 static int 348 l2cap_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control) 349 { 350 KASSERT(solocked(so)); 351 352 if (m) 353 m_freem(m); 354 if (control) 355 m_freem(control); 356 357 return EOPNOTSUPP; 358 } 359 360 static int 361 l2cap_purgeif(struct socket *so, struct ifnet *ifp) 362 { 363 364 return EOPNOTSUPP; 365 } 366 367 /* 368 * User Request. 369 * up is socket 370 * m is optional mbuf chain containing message 371 * ctl is either 372 * optional mbuf chain containing socket options 373 * l is pointer to process requesting action (if any) 374 * 375 * we are responsible for disposing of m and ctl if 376 * they are mbuf chains 377 */ 378 static int 379 l2cap_usrreq(struct socket *up, int req, struct mbuf *m, 380 struct mbuf *nam, struct mbuf *ctl, struct lwp *l) 381 { 382 struct l2cap_channel *pcb = up->so_pcb; 383 int err = 0; 384 385 DPRINTFN(2, "%s\n", prurequests[req]); 386 KASSERT(req != PRU_ATTACH); 387 KASSERT(req != PRU_DETACH); 388 KASSERT(req != PRU_ACCEPT); 389 KASSERT(req != PRU_BIND); 390 KASSERT(req != PRU_LISTEN); 391 KASSERT(req != PRU_CONNECT); 392 KASSERT(req != PRU_CONNECT2); 393 KASSERT(req != PRU_DISCONNECT); 394 KASSERT(req != PRU_SHUTDOWN); 395 KASSERT(req != PRU_ABORT); 396 KASSERT(req != PRU_CONTROL); 397 KASSERT(req != PRU_SENSE); 398 KASSERT(req != PRU_PEERADDR); 399 KASSERT(req != PRU_SOCKADDR); 400 KASSERT(req != PRU_RCVD); 401 KASSERT(req != PRU_RCVOOB); 402 KASSERT(req != PRU_SEND); 403 KASSERT(req != PRU_SENDOOB); 404 KASSERT(req != PRU_PURGEIF); 405 406 if (pcb == NULL) { 407 err = EINVAL; 408 goto release; 409 } 410 411 switch(req) { 412 case PRU_FASTTIMO: 413 case PRU_SLOWTIMO: 414 case PRU_PROTORCV: 415 case PRU_PROTOSEND: 416 err = EOPNOTSUPP; 417 break; 418 419 default: 420 UNKNOWN(req); 421 err = EOPNOTSUPP; 422 break; 423 } 424 425 release: 426 if (m) m_freem(m); 427 if (ctl) m_freem(ctl); 428 return err; 429 } 430 431 /* 432 * l2cap_ctloutput(req, socket, sockopt) 433 * 434 * Apply configuration commands to channel. This corresponds to 435 * "Reconfigure Channel Request" in the L2CAP specification. 436 */ 437 int 438 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt) 439 { 440 struct l2cap_channel *pcb = so->so_pcb; 441 int err = 0; 442 443 DPRINTFN(2, "%s\n", prcorequests[req]); 444 445 if (pcb == NULL) 446 return EINVAL; 447 448 if (sopt->sopt_level != BTPROTO_L2CAP) 449 return ENOPROTOOPT; 450 451 switch(req) { 452 case PRCO_GETOPT: 453 err = l2cap_getopt(pcb, sopt); 454 break; 455 456 case PRCO_SETOPT: 457 err = l2cap_setopt(pcb, sopt); 458 break; 459 460 default: 461 err = ENOPROTOOPT; 462 break; 463 } 464 465 return err; 466 } 467 468 /********************************************************************** 469 * 470 * L2CAP Protocol socket callbacks 471 * 472 */ 473 474 static void 475 l2cap_connecting(void *arg) 476 { 477 struct socket *so = arg; 478 479 DPRINTF("Connecting\n"); 480 soisconnecting(so); 481 } 482 483 static void 484 l2cap_connected(void *arg) 485 { 486 struct socket *so = arg; 487 488 DPRINTF("Connected\n"); 489 soisconnected(so); 490 } 491 492 static void 493 l2cap_disconnected(void *arg, int err) 494 { 495 struct socket *so = arg; 496 497 DPRINTF("Disconnected (%d)\n", err); 498 499 so->so_error = err; 500 soisdisconnected(so); 501 } 502 503 static void * 504 l2cap_newconn(void *arg, struct sockaddr_bt *laddr, 505 struct sockaddr_bt *raddr) 506 { 507 struct socket *so = arg; 508 509 DPRINTF("New Connection\n"); 510 so = sonewconn(so, false); 511 if (so == NULL) 512 return NULL; 513 514 soisconnecting(so); 515 516 return so->so_pcb; 517 } 518 519 static void 520 l2cap_complete(void *arg, int count) 521 { 522 struct socket *so = arg; 523 524 while (count-- > 0) 525 sbdroprecord(&so->so_snd); 526 527 sowwakeup(so); 528 } 529 530 static void 531 l2cap_linkmode(void *arg, int new) 532 { 533 struct socket *so = arg; 534 struct sockopt sopt; 535 int mode; 536 537 DPRINTF("auth %s, encrypt %s, secure %s\n", 538 (new & L2CAP_LM_AUTH ? "on" : "off"), 539 (new & L2CAP_LM_ENCRYPT ? "on" : "off"), 540 (new & L2CAP_LM_SECURE ? "on" : "off")); 541 542 sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0); 543 (void)l2cap_getopt(so->so_pcb, &sopt); 544 (void)sockopt_getint(&sopt, &mode); 545 sockopt_destroy(&sopt); 546 547 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH)) 548 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT)) 549 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE))) 550 l2cap_disconnect_pcb(so->so_pcb, 0); 551 } 552 553 static void 554 l2cap_input(void *arg, struct mbuf *m) 555 { 556 struct socket *so = arg; 557 558 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) { 559 printf("%s: packet (%d bytes) dropped (socket buffer full)\n", 560 __func__, m->m_pkthdr.len); 561 m_freem(m); 562 return; 563 } 564 565 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len); 566 567 sbappendrecord(&so->so_rcv, m); 568 sorwakeup(so); 569 } 570 571 PR_WRAP_USRREQS(l2cap) 572 573 #define l2cap_attach l2cap_attach_wrapper 574 #define l2cap_detach l2cap_detach_wrapper 575 #define l2cap_accept l2cap_accept_wrapper 576 #define l2cap_bind l2cap_bind_wrapper 577 #define l2cap_listen l2cap_listen_wrapper 578 #define l2cap_connect l2cap_connect_wrapper 579 #define l2cap_connect2 l2cap_connect2_wrapper 580 #define l2cap_disconnect l2cap_disconnect_wrapper 581 #define l2cap_shutdown l2cap_shutdown_wrapper 582 #define l2cap_abort l2cap_abort_wrapper 583 #define l2cap_ioctl l2cap_ioctl_wrapper 584 #define l2cap_stat l2cap_stat_wrapper 585 #define l2cap_peeraddr l2cap_peeraddr_wrapper 586 #define l2cap_sockaddr l2cap_sockaddr_wrapper 587 #define l2cap_rcvd l2cap_rcvd_wrapper 588 #define l2cap_recvoob l2cap_recvoob_wrapper 589 #define l2cap_send l2cap_send_wrapper 590 #define l2cap_sendoob l2cap_sendoob_wrapper 591 #define l2cap_purgeif l2cap_purgeif_wrapper 592 #define l2cap_usrreq l2cap_usrreq_wrapper 593 594 const struct pr_usrreqs l2cap_usrreqs = { 595 .pr_attach = l2cap_attach, 596 .pr_detach = l2cap_detach, 597 .pr_accept = l2cap_accept, 598 .pr_bind = l2cap_bind, 599 .pr_listen = l2cap_listen, 600 .pr_connect = l2cap_connect, 601 .pr_connect2 = l2cap_connect2, 602 .pr_disconnect = l2cap_disconnect, 603 .pr_shutdown = l2cap_shutdown, 604 .pr_abort = l2cap_abort, 605 .pr_ioctl = l2cap_ioctl, 606 .pr_stat = l2cap_stat, 607 .pr_peeraddr = l2cap_peeraddr, 608 .pr_sockaddr = l2cap_sockaddr, 609 .pr_rcvd = l2cap_rcvd, 610 .pr_recvoob = l2cap_recvoob, 611 .pr_send = l2cap_send, 612 .pr_sendoob = l2cap_sendoob, 613 .pr_purgeif = l2cap_purgeif, 614 .pr_generic = l2cap_usrreq, 615 }; 616