usr.sbin/makefs/ffs: Remove m_buf::b_is_hammer2
[dragonfly.git] / sys / netbt / l2cap_socket.c
bloba458ce0c667909cc0138f42dece7fded62cfc200
1 /* $OpenBSD: l2cap_socket.c,v 1.1 2007/06/01 02:46:11 uwe Exp $ */
2 /* $NetBSD: l2cap_socket.c,v 1.7 2007/04/21 06:15:23 plunky Exp $ */
4 /*-
5 * Copyright (c) 2005 Iain Hibbert.
6 * Copyright (c) 2006 Itronix Inc.
7 * All rights reserved.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. The name of Itronix Inc. may not be used to endorse
18 * or promote products derived from this software without specific
19 * prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
23 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
25 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
27 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
28 * ON ANY THEORY OF LIABILITY, WHETHER IN
29 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
34 /* load symbolic names */
35 #ifdef BLUETOOTH_DEBUG
36 #define PRUREQUESTS
37 #define PRCOREQUESTS
38 #endif
40 #include <sys/param.h>
41 #include <sys/domain.h>
42 #include <sys/kernel.h>
43 #include <sys/malloc.h> /* for M_NOWAIT */
44 #include <sys/mbuf.h>
45 #include <sys/proc.h>
46 #include <sys/protosw.h>
47 #include <sys/socket.h>
48 #include <sys/socketvar.h>
49 #include <sys/systm.h>
51 #include <sys/msgport2.h>
53 #include <vm/vm_zone.h>
55 #include <netbt/bluetooth.h>
56 #include <netbt/hci.h> /* XXX for EPASSTHROUGH */
57 #include <netbt/l2cap.h>
60 * L2CAP Sockets
62 * SOCK_SEQPACKET - normal L2CAP connection
64 * SOCK_DGRAM - connectionless L2CAP - XXX not yet
67 static void l2cap_connecting(void *);
68 static void l2cap_connected(void *);
69 static void l2cap_disconnected(void *, int);
70 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
71 static void l2cap_complete(void *, int);
72 static void l2cap_linkmode(void *, int);
73 static void l2cap_input(void *, struct mbuf *);
75 static const struct btproto l2cap_proto = {
76 l2cap_connecting,
77 l2cap_connected,
78 l2cap_disconnected,
79 l2cap_newconn,
80 l2cap_complete,
81 l2cap_linkmode,
82 l2cap_input,
85 /* sysctl variables */
86 int l2cap_sendspace = 4096;
87 int l2cap_recvspace = 4096;
90 * l2cap_ctloutput(request, socket, level, optname, opt)
92 * Apply configuration commands to channel. This corresponds to
93 * "Reconfigure Channel Request" in the L2CAP specification.
95 void
96 l2cap_ctloutput(netmsg_t msg)
98 struct socket *so = msg->ctloutput.base.nm_so;
99 struct sockopt *sopt = msg->ctloutput.nm_sopt;
100 struct l2cap_channel *pcb = (struct l2cap_channel *) so->so_pcb;
101 struct mbuf *m;
102 int error = 0;
104 #ifdef notyet /* XXX */
105 DPRINTFN(2, "%s\n", prcorequests[req]);
106 #endif
108 if (pcb == NULL) {
109 error = EINVAL;
110 goto out;
113 if (sopt->sopt_level != BTPROTO_L2CAP) {
114 error = ENOPROTOOPT;
115 goto out;
118 switch(sopt->sopt_dir) {
119 case PRCO_GETOPT:
120 m = m_get(M_NOWAIT, MT_DATA);
121 if (m == NULL) {
122 error = ENOMEM;
123 break;
125 m->m_len = l2cap_getopt(pcb, sopt->sopt_name, mtod(m, void *));
126 if (m->m_len == 0) {
127 m_freem(m);
128 m = NULL;
129 error = ENOPROTOOPT;
131 soopt_from_kbuf(sopt, mtod(m, void *), m->m_len);
132 break;
134 case PRCO_SETOPT:
135 error = l2cap_setopt2(pcb, sopt->sopt_name, so, sopt);
136 break;
138 default:
139 error = ENOPROTOOPT;
140 break;
142 out:
143 lwkt_replymsg(&msg->ctloutput.base.lmsg, error);
146 /**********************************************************************
148 * L2CAP Protocol socket callbacks
152 static void
153 l2cap_connecting(void *arg)
155 struct socket *so = arg;
157 DPRINTF("Connecting\n");
158 soisconnecting(so);
161 static void
162 l2cap_connected(void *arg)
164 struct socket *so = arg;
166 DPRINTF("Connected\n");
167 soisconnected(so);
170 static void
171 l2cap_disconnected(void *arg, int err)
173 struct socket *so = arg;
175 DPRINTF("Disconnected (%d)\n", err);
177 so->so_error = err;
178 soisdisconnected(so);
181 static void *
182 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
183 struct sockaddr_bt *raddr)
185 struct socket *so = arg;
187 DPRINTF("New Connection\n");
188 so = sonewconn(so, 0);
189 if (so == NULL)
190 return NULL;
192 soisconnecting(so);
194 return so->so_pcb;
197 static void
198 l2cap_complete(void *arg, int count)
200 struct socket *so = arg;
202 while (count-- > 0)
203 sbdroprecord(&so->so_snd.sb);
205 sowwakeup(so);
208 static void
209 l2cap_linkmode(void *arg, int new)
211 struct socket *so = arg;
212 int mode;
214 DPRINTF("auth %s, encrypt %s, secure %s\n",
215 (new & L2CAP_LM_AUTH ? "on" : "off"),
216 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
217 (new & L2CAP_LM_SECURE ? "on" : "off"));
219 (void)l2cap_getopt(so->so_pcb, SO_L2CAP_LM, &mode);
220 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
221 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
222 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
223 l2cap_disconnect(so->so_pcb, 0);
226 static void
227 l2cap_input(void *arg, struct mbuf *m)
229 struct socket *so = arg;
231 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
232 kprintf("%s: packet (%d bytes) dropped (socket buffer full)\n",
233 __func__, m->m_pkthdr.len);
234 m_freem(m);
235 return;
238 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
240 sbappendrecord(&so->so_rcv.sb, m);
241 sorwakeup(so);
246 * Implementation of usrreqs.
248 static void
249 l2cap_sdetach(netmsg_t msg)
251 struct socket *so = msg->detach.base.nm_so;
252 int error;
254 error = l2cap_detach((struct l2cap_channel **)&so->so_pcb);
255 lwkt_replymsg(&msg->detach.base.lmsg, error);
259 * NOTE: (so) is referenced from soabort*() and netmsg_pru_abort()
260 * will sofree() it when we return.
262 static void
263 l2cap_sabort(netmsg_t msg)
265 struct socket *so = msg->abort.base.nm_so;
266 struct l2cap_channel *pcb = so->so_pcb;
268 l2cap_disconnect(pcb, 0);
269 soisdisconnected(so);
271 l2cap_sdetach(msg);
272 /* msg invalid now */
275 static void
276 l2cap_sdisconnect(netmsg_t msg)
278 struct socket *so = msg->disconnect.base.nm_so;
279 struct l2cap_channel *pcb = so->so_pcb;
280 int error;
282 soisdisconnecting(so);
284 error = l2cap_disconnect(pcb, so->so_linger);
285 lwkt_replymsg(&msg->disconnect.base.lmsg, error);
288 static void
289 l2cap_scontrol(netmsg_t msg)
291 lwkt_replymsg(&msg->control.base.lmsg, EPASSTHROUGH);
294 static void
295 l2cap_sattach(netmsg_t msg)
297 struct socket *so = msg->attach.base.nm_so;
298 struct l2cap_channel *pcb = so->so_pcb;
299 int error;
301 if (pcb != NULL) {
302 error = EINVAL;
303 goto out;
307 * For L2CAP socket PCB we just use an l2cap_channel structure
308 * since we have nothing to add..
310 error = soreserve(so, l2cap_sendspace, l2cap_recvspace, NULL);
311 if (error == 0) {
312 error = l2cap_attach((struct l2cap_channel **)&so->so_pcb,
313 &l2cap_proto, so);
315 out:
316 lwkt_replymsg(&msg->attach.base.lmsg, error);
319 static void
320 l2cap_sbind (netmsg_t msg)
322 struct socket *so = msg->bind.base.nm_so;
323 struct sockaddr *nam = msg->bind.nm_nam;
324 struct l2cap_channel *pcb = so->so_pcb;
325 struct sockaddr_bt *sa;
326 int error;
328 KKASSERT(nam != NULL);
329 sa = (struct sockaddr_bt *)nam;
331 if (sa->bt_len != sizeof(struct sockaddr_bt)) {
332 error = EINVAL;
333 } else if (sa->bt_family != AF_BLUETOOTH) {
334 error = EAFNOSUPPORT;
335 } else {
336 error = l2cap_bind(pcb, sa);
338 lwkt_replymsg(&msg->bind.base.lmsg, error);
341 static void
342 l2cap_sconnect(netmsg_t msg)
344 struct socket *so = msg->connect.base.nm_so;
345 struct sockaddr *nam = msg->connect.nm_nam;
346 struct l2cap_channel *pcb = so->so_pcb;
347 struct sockaddr_bt *sa;
348 int error;
350 KKASSERT(nam != NULL);
351 sa = (struct sockaddr_bt *)nam;
353 if (sa->bt_len != sizeof(struct sockaddr_bt)) {
354 error = EINVAL;
355 } else if (sa->bt_family != AF_BLUETOOTH) {
356 error = EAFNOSUPPORT;
357 } else {
358 soisconnecting(so);
359 error = l2cap_connect(pcb, sa);
361 lwkt_replymsg(&msg->connect.base.lmsg, error);
364 static void
365 l2cap_speeraddr(netmsg_t msg)
367 struct socket *so = msg->peeraddr.base.nm_so;
368 struct sockaddr **nam = msg->peeraddr.nm_nam;
369 struct l2cap_channel *pcb = so->so_pcb;
370 struct sockaddr_bt *sa, ssa;
371 int error;
373 sa = &ssa;
374 bzero(sa, sizeof *sa);
375 sa->bt_len = sizeof(struct sockaddr_bt);
376 sa->bt_family = AF_BLUETOOTH;
377 error = l2cap_peeraddr(pcb, sa);
378 *nam = dup_sockaddr((struct sockaddr *)sa);
380 lwkt_replymsg(&msg->peeraddr.base.lmsg, error);
383 static void
384 l2cap_ssockaddr(netmsg_t msg)
386 struct socket *so = msg->sockaddr.base.nm_so;
387 struct sockaddr **nam = msg->sockaddr.nm_nam;
388 struct l2cap_channel *pcb = so->so_pcb;
389 struct sockaddr_bt *sa, ssa;
390 int error;
392 sa = &ssa;
393 bzero(sa, sizeof *sa);
394 sa->bt_len = sizeof(struct sockaddr_bt);
395 sa->bt_family = AF_BLUETOOTH;
396 error = l2cap_sockaddr(pcb, sa);
397 *nam = dup_sockaddr((struct sockaddr *)sa);
399 lwkt_replymsg(&msg->sockaddr.base.lmsg, error);
402 static void
403 l2cap_sshutdown(netmsg_t msg)
405 struct socket *so = msg->shutdown.base.nm_so;
407 socantsendmore(so);
409 lwkt_replymsg(&msg->shutdown.base.lmsg, 0);
412 static void
413 l2cap_ssend(netmsg_t msg)
415 struct socket *so = msg->send.base.nm_so;
416 struct mbuf *m = msg->send.nm_m;
417 struct mbuf *control = msg->send.nm_control;
418 struct l2cap_channel *pcb = so->so_pcb;
419 struct mbuf *m0;
420 int error;
422 KKASSERT(m != NULL);
423 if (m->m_pkthdr.len == 0) {
424 error = 0;
425 goto out;
428 if (m->m_pkthdr.len > pcb->lc_omtu) {
429 error = EMSGSIZE;
430 goto out;
433 m0 = m_copym(m, 0, M_COPYALL, M_NOWAIT);
434 if (m0 == NULL) {
435 error = ENOMEM;
436 goto out;
439 m0 = m_copym(m, 0, M_COPYALL, M_NOWAIT);
440 if (m0 == NULL) {
441 error = ENOMEM;
442 goto out;
445 /* no use for that */
446 if (control) {
447 m_freem(control);
448 control = NULL;
450 sbappendrecord(&so->so_snd.sb, m);
451 error = l2cap_send(pcb, m0);
452 m = NULL;
453 out:
454 if (m)
455 m_freem(m);
456 if (control)
457 m_freem(control);
459 lwkt_replymsg(&msg->send.base.lmsg, error);
462 static void
463 l2cap_saccept(netmsg_t msg)
465 struct socket *so = msg->accept.base.nm_so;
466 struct sockaddr **nam = msg->accept.nm_nam;
467 struct l2cap_channel *pcb = so->so_pcb;
468 struct sockaddr_bt sa;
469 int error;
471 KKASSERT(nam != NULL);
473 bzero(&sa, sizeof (sa) );
474 sa.bt_len = sizeof(struct sockaddr_bt);
475 sa.bt_family = AF_BLUETOOTH;
477 error = l2cap_peeraddr(pcb, &sa);
478 *nam = dup_sockaddr((struct sockaddr *)&sa);
480 lwkt_replymsg(&msg->accept.base.lmsg, error);
483 static void
484 l2cap_slisten(netmsg_t msg)
486 struct socket *so = msg->listen.base.nm_so;
487 struct l2cap_channel *pcb = so->so_pcb;
488 int error;
490 error = l2cap_listen(pcb);
491 lwkt_replymsg(&msg->accept.base.lmsg, error);
495 struct pr_usrreqs l2cap_usrreqs = {
496 .pru_abort = l2cap_sabort,
497 .pru_accept = l2cap_saccept,
498 .pru_attach = l2cap_sattach,
499 .pru_bind = l2cap_sbind,
500 .pru_connect = l2cap_sconnect,
501 .pru_connect2 = pr_generic_notsupp,
502 .pru_control = l2cap_scontrol,
503 .pru_detach = l2cap_sdetach,
504 .pru_disconnect = l2cap_sdisconnect,
505 .pru_listen = l2cap_slisten,
506 .pru_peeraddr = l2cap_speeraddr,
507 .pru_rcvd = pr_generic_notsupp,
508 .pru_rcvoob = pr_generic_notsupp,
509 .pru_send = l2cap_ssend,
510 .pru_sense = pru_sense_null,
511 .pru_shutdown = l2cap_sshutdown,
512 .pru_sockaddr = l2cap_ssockaddr,
513 .pru_sosend = sosend,
514 .pru_soreceive = soreceive