xref: /netbsd-src/sys/netbt/l2cap_socket.c (revision 2c6fc41c810f5088457889d00eba558e8bc74d9e)
1 /*	$NetBSD: l2cap_socket.c,v 1.15 2014/05/20 19:04:00 rmind Exp $	*/
2 
3 /*-
4  * Copyright (c) 2005 Iain Hibbert.
5  * Copyright (c) 2006 Itronix Inc.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of Itronix Inc. may not be used to endorse
17  *    or promote products derived from this software without specific
18  *    prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27  * ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30  * POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_socket.c,v 1.15 2014/05/20 19:04:00 rmind Exp $");
35 
36 /* load symbolic names */
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41 
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51 
52 #include <netbt/bluetooth.h>
53 #include <netbt/l2cap.h>
54 
55 /*
56  * L2CAP Sockets
57  *
58  *	SOCK_SEQPACKET - normal L2CAP connection
59  *
60  *	SOCK_DGRAM - connectionless L2CAP - XXX not yet
61  */
62 
63 static void l2cap_connecting(void *);
64 static void l2cap_connected(void *);
65 static void l2cap_disconnected(void *, int);
66 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
67 static void l2cap_complete(void *, int);
68 static void l2cap_linkmode(void *, int);
69 static void l2cap_input(void *, struct mbuf *);
70 
71 static const struct btproto l2cap_proto = {
72 	l2cap_connecting,
73 	l2cap_connected,
74 	l2cap_disconnected,
75 	l2cap_newconn,
76 	l2cap_complete,
77 	l2cap_linkmode,
78 	l2cap_input,
79 };
80 
81 /* sysctl variables */
82 int l2cap_sendspace = 4096;
83 int l2cap_recvspace = 4096;
84 
85 static int
86 l2cap_attach(struct socket *so, int proto)
87 {
88 	int error;
89 
90 	KASSERT(so->so_pcb == NULL);
91 
92 	if (so->so_lock == NULL) {
93 		mutex_obj_hold(bt_lock);
94 		so->so_lock = bt_lock;
95 		solock(so);
96 	}
97 	KASSERT(solocked(so));
98 
99 	/*
100 	 * For L2CAP socket PCB we just use an l2cap_channel structure
101 	 * since we have nothing to add..
102 	 */
103 	error = soreserve(so, l2cap_sendspace, l2cap_recvspace);
104 	if (error)
105 		return error;
106 
107 	return l2cap_attach_pcb((struct l2cap_channel **)&so->so_pcb,
108 				&l2cap_proto, so);
109 }
110 
111 static void
112 l2cap_detach(struct socket *so)
113 {
114 	KASSERT(so->so_pcb != NULL);
115 	l2cap_detach_pcb((struct l2cap_channel **)&so->so_pcb);
116 	KASSERT(so->so_pcb == NULL);
117 }
118 
119 /*
120  * User Request.
121  * up is socket
122  * m is either
123  *	optional mbuf chain containing message
124  *	ioctl command (PRU_CONTROL)
125  * nam is either
126  *	optional mbuf chain containing an address
127  *	ioctl data (PRU_CONTROL)
128  *	message flags (PRU_RCVD)
129  * ctl is either
130  *	optional mbuf chain containing socket options
131  *	optional interface pointer (PRU_CONTROL, PRU_PURGEIF)
132  * l is pointer to process requesting action (if any)
133  *
134  * we are responsible for disposing of m and ctl if
135  * they are mbuf chains
136  */
137 static int
138 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
139     struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
140 {
141 	struct l2cap_channel *pcb = up->so_pcb;
142 	struct sockaddr_bt *sa;
143 	struct mbuf *m0;
144 	int err = 0;
145 
146 	DPRINTFN(2, "%s\n", prurequests[req]);
147 	KASSERT(req != PRU_ATTACH);
148 	KASSERT(req != PRU_DETACH);
149 
150 	switch (req) {
151 	case PRU_CONTROL:
152 		return EPASSTHROUGH;
153 
154 	case PRU_PURGEIF:
155 		return EOPNOTSUPP;
156 	}
157 
158 	if (pcb == NULL) {
159 		err = EINVAL;
160 		goto release;
161 	}
162 
163 	switch(req) {
164 	case PRU_DISCONNECT:
165 		soisdisconnecting(up);
166 		return l2cap_disconnect(pcb, up->so_linger);
167 
168 	case PRU_ABORT:
169 		l2cap_disconnect(pcb, 0);
170 		soisdisconnected(up);
171 		l2cap_detach(up);
172 		return 0;
173 
174 	case PRU_BIND:
175 		KASSERT(nam != NULL);
176 		sa = mtod(nam, struct sockaddr_bt *);
177 
178 		if (sa->bt_len != sizeof(struct sockaddr_bt))
179 			return EINVAL;
180 
181 		if (sa->bt_family != AF_BLUETOOTH)
182 			return EAFNOSUPPORT;
183 
184 		return l2cap_bind(pcb, sa);
185 
186 	case PRU_CONNECT:
187 		KASSERT(nam != NULL);
188 		sa = mtod(nam, struct sockaddr_bt *);
189 
190 		if (sa->bt_len != sizeof(struct sockaddr_bt))
191 			return EINVAL;
192 
193 		if (sa->bt_family != AF_BLUETOOTH)
194 			return EAFNOSUPPORT;
195 
196 		soisconnecting(up);
197 		return l2cap_connect(pcb, sa);
198 
199 	case PRU_PEERADDR:
200 		KASSERT(nam != NULL);
201 		sa = mtod(nam, struct sockaddr_bt *);
202 		nam->m_len = sizeof(struct sockaddr_bt);
203 		return l2cap_peeraddr(pcb, sa);
204 
205 	case PRU_SOCKADDR:
206 		KASSERT(nam != NULL);
207 		sa = mtod(nam, struct sockaddr_bt *);
208 		nam->m_len = sizeof(struct sockaddr_bt);
209 		return l2cap_sockaddr(pcb, sa);
210 
211 	case PRU_SHUTDOWN:
212 		socantsendmore(up);
213 		break;
214 
215 	case PRU_SEND:
216 		KASSERT(m != NULL);
217 		if (m->m_pkthdr.len == 0)
218 			break;
219 
220 		if (m->m_pkthdr.len > pcb->lc_omtu) {
221 			err = EMSGSIZE;
222 			break;
223 		}
224 
225 		m0 = m_copypacket(m, M_DONTWAIT);
226 		if (m0 == NULL) {
227 			err = ENOMEM;
228 			break;
229 		}
230 
231 		if (ctl)	/* no use for that */
232 			m_freem(ctl);
233 
234 		sbappendrecord(&up->so_snd, m);
235 		return l2cap_send(pcb, m0);
236 
237 	case PRU_SENSE:
238 		return 0;		/* (no release) */
239 
240 	case PRU_RCVD:
241 	case PRU_RCVOOB:
242 		return EOPNOTSUPP;	/* (no release) */
243 
244 	case PRU_LISTEN:
245 		return l2cap_listen(pcb);
246 
247 	case PRU_ACCEPT:
248 		KASSERT(nam != NULL);
249 		sa = mtod(nam, struct sockaddr_bt *);
250 		nam->m_len = sizeof(struct sockaddr_bt);
251 		return l2cap_peeraddr(pcb, sa);
252 
253 	case PRU_CONNECT2:
254 	case PRU_SENDOOB:
255 	case PRU_FASTTIMO:
256 	case PRU_SLOWTIMO:
257 	case PRU_PROTORCV:
258 	case PRU_PROTOSEND:
259 		err = EOPNOTSUPP;
260 		break;
261 
262 	default:
263 		UNKNOWN(req);
264 		err = EOPNOTSUPP;
265 		break;
266 	}
267 
268 release:
269 	if (m) m_freem(m);
270 	if (ctl) m_freem(ctl);
271 	return err;
272 }
273 
274 /*
275  * l2cap_ctloutput(req, socket, sockopt)
276  *
277  *	Apply configuration commands to channel. This corresponds to
278  *	"Reconfigure Channel Request" in the L2CAP specification.
279  */
280 int
281 l2cap_ctloutput(int req, struct socket *so, struct sockopt *sopt)
282 {
283 	struct l2cap_channel *pcb = so->so_pcb;
284 	int err = 0;
285 
286 	DPRINTFN(2, "%s\n", prcorequests[req]);
287 
288 	if (pcb == NULL)
289 		return EINVAL;
290 
291 	if (sopt->sopt_level != BTPROTO_L2CAP)
292 		return ENOPROTOOPT;
293 
294 	switch(req) {
295 	case PRCO_GETOPT:
296 		err = l2cap_getopt(pcb, sopt);
297 		break;
298 
299 	case PRCO_SETOPT:
300 		err = l2cap_setopt(pcb, sopt);
301 		break;
302 
303 	default:
304 		err = ENOPROTOOPT;
305 		break;
306 	}
307 
308 	return err;
309 }
310 
311 /**********************************************************************
312  *
313  *	L2CAP Protocol socket callbacks
314  *
315  */
316 
317 static void
318 l2cap_connecting(void *arg)
319 {
320 	struct socket *so = arg;
321 
322 	DPRINTF("Connecting\n");
323 	soisconnecting(so);
324 }
325 
326 static void
327 l2cap_connected(void *arg)
328 {
329 	struct socket *so = arg;
330 
331 	DPRINTF("Connected\n");
332 	soisconnected(so);
333 }
334 
335 static void
336 l2cap_disconnected(void *arg, int err)
337 {
338 	struct socket *so = arg;
339 
340 	DPRINTF("Disconnected (%d)\n", err);
341 
342 	so->so_error = err;
343 	soisdisconnected(so);
344 }
345 
346 static void *
347 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
348     struct sockaddr_bt *raddr)
349 {
350 	struct socket *so = arg;
351 
352 	DPRINTF("New Connection\n");
353 	so = sonewconn(so, false);
354 	if (so == NULL)
355 		return NULL;
356 
357 	soisconnecting(so);
358 
359 	return so->so_pcb;
360 }
361 
362 static void
363 l2cap_complete(void *arg, int count)
364 {
365 	struct socket *so = arg;
366 
367 	while (count-- > 0)
368 		sbdroprecord(&so->so_snd);
369 
370 	sowwakeup(so);
371 }
372 
373 static void
374 l2cap_linkmode(void *arg, int new)
375 {
376 	struct socket *so = arg;
377 	struct sockopt sopt;
378 	int mode;
379 
380 	DPRINTF("auth %s, encrypt %s, secure %s\n",
381 		(new & L2CAP_LM_AUTH ? "on" : "off"),
382 		(new & L2CAP_LM_ENCRYPT ? "on" : "off"),
383 		(new & L2CAP_LM_SECURE ? "on" : "off"));
384 
385 	sockopt_init(&sopt, BTPROTO_L2CAP, SO_L2CAP_LM, 0);
386 	(void)l2cap_getopt(so->so_pcb, &sopt);
387 	(void)sockopt_getint(&sopt, &mode);
388 	sockopt_destroy(&sopt);
389 
390 	if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
391 	    || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
392 	    || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
393 		l2cap_disconnect(so->so_pcb, 0);
394 }
395 
396 static void
397 l2cap_input(void *arg, struct mbuf *m)
398 {
399 	struct socket *so = arg;
400 
401 	if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
402 		printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
403 			__func__, m->m_pkthdr.len);
404 		m_freem(m);
405 		return;
406 	}
407 
408 	DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
409 
410 	sbappendrecord(&so->so_rcv, m);
411 	sorwakeup(so);
412 }
413 
414 PR_WRAP_USRREQS(l2cap)
415 
416 #define	l2cap_attach		l2cap_attach_wrapper
417 #define	l2cap_detach		l2cap_detach_wrapper
418 #define	l2cap_usrreq		l2cap_usrreq_wrapper
419 
420 const struct pr_usrreqs l2cap_usrreqs = {
421 	.pr_attach	= l2cap_attach,
422 	.pr_detach	= l2cap_detach,
423 	.pr_generic	= l2cap_usrreq,
424 };
425