This source file includes following definitions.
- l2cap_usrreq
- l2cap_ctloutput
- l2cap_connecting
- l2cap_connected
- l2cap_disconnected
- l2cap_newconn
- l2cap_complete
- l2cap_linkmode
- l2cap_input
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34 #include <sys/cdefs.h>
35
36
37 #ifdef BLUETOOTH_DEBUG
38 #define PRUREQUESTS
39 #define PRCOREQUESTS
40 #endif
41
42 #include <sys/param.h>
43 #include <sys/domain.h>
44 #include <sys/kernel.h>
45 #include <sys/mbuf.h>
46 #include <sys/proc.h>
47 #include <sys/protosw.h>
48 #include <sys/socket.h>
49 #include <sys/socketvar.h>
50 #include <sys/systm.h>
51
52 #include <netbt/bluetooth.h>
53 #include <netbt/hci.h>
54 #include <netbt/l2cap.h>
55
56
57
58
59
60
61
62
63
64 static void l2cap_connecting(void *);
65 static void l2cap_connected(void *);
66 static void l2cap_disconnected(void *, int);
67 static void *l2cap_newconn(void *, struct sockaddr_bt *, struct sockaddr_bt *);
68 static void l2cap_complete(void *, int);
69 static void l2cap_linkmode(void *, int);
70 static void l2cap_input(void *, struct mbuf *);
71
72 static const struct btproto l2cap_proto = {
73 l2cap_connecting,
74 l2cap_connected,
75 l2cap_disconnected,
76 l2cap_newconn,
77 l2cap_complete,
78 l2cap_linkmode,
79 l2cap_input,
80 };
81
82
83 int l2cap_sendspace = 4096;
84 int l2cap_recvspace = 4096;
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105 int
106 l2cap_usrreq(struct socket *up, int req, struct mbuf *m,
107 struct mbuf *nam, struct mbuf *ctl)
108 {
109 struct l2cap_channel *pcb = up->so_pcb;
110 struct sockaddr_bt *sa;
111 struct mbuf *m0;
112 int err = 0;
113
114 #ifdef notyet
115 DPRINTFN(2, "%s\n", prurequests[req]);
116 #endif
117
118 switch (req) {
119 case PRU_CONTROL:
120 return EPASSTHROUGH;
121
122 #ifdef notyet
123 case PRU_PURGEIF:
124 return EOPNOTSUPP;
125 #endif
126
127 case PRU_ATTACH:
128 if (pcb != NULL)
129 return EINVAL;
130
131
132
133
134
135 err = soreserve(up, l2cap_sendspace, l2cap_recvspace);
136 if (err)
137 return err;
138
139 return l2cap_attach((struct l2cap_channel **)&up->so_pcb,
140 &l2cap_proto, up);
141 }
142
143 if (pcb == NULL) {
144 err = EINVAL;
145 goto release;
146 }
147
148 switch(req) {
149 case PRU_DISCONNECT:
150 soisdisconnecting(up);
151 return l2cap_disconnect(pcb, up->so_linger);
152
153 case PRU_ABORT:
154 l2cap_disconnect(pcb, 0);
155 soisdisconnected(up);
156
157 case PRU_DETACH:
158 return l2cap_detach((struct l2cap_channel **)&up->so_pcb);
159
160 case PRU_BIND:
161 KASSERT(nam != NULL);
162 sa = mtod(nam, struct sockaddr_bt *);
163
164 if (sa->bt_len != sizeof(struct sockaddr_bt))
165 return EINVAL;
166
167 if (sa->bt_family != AF_BLUETOOTH)
168 return EAFNOSUPPORT;
169
170 return l2cap_bind(pcb, sa);
171
172 case PRU_CONNECT:
173 KASSERT(nam != NULL);
174 sa = mtod(nam, struct sockaddr_bt *);
175
176 if (sa->bt_len != sizeof(struct sockaddr_bt))
177 return EINVAL;
178
179 if (sa->bt_family != AF_BLUETOOTH)
180 return EAFNOSUPPORT;
181
182 soisconnecting(up);
183 return l2cap_connect(pcb, sa);
184
185 case PRU_PEERADDR:
186 KASSERT(nam != NULL);
187 sa = mtod(nam, struct sockaddr_bt *);
188 nam->m_len = sizeof(struct sockaddr_bt);
189 return l2cap_peeraddr(pcb, sa);
190
191 case PRU_SOCKADDR:
192 KASSERT(nam != NULL);
193 sa = mtod(nam, struct sockaddr_bt *);
194 nam->m_len = sizeof(struct sockaddr_bt);
195 return l2cap_sockaddr(pcb, sa);
196
197 case PRU_SHUTDOWN:
198 socantsendmore(up);
199 break;
200
201 case PRU_SEND:
202 KASSERT(m != NULL);
203 if (m->m_pkthdr.len == 0)
204 break;
205
206 if (m->m_pkthdr.len > pcb->lc_omtu) {
207 err = EMSGSIZE;
208 break;
209 }
210
211 m0 = m_copym(m, 0, M_COPYALL, M_DONTWAIT);
212 if (m0 == NULL) {
213 err = ENOMEM;
214 break;
215 }
216
217 if (ctl)
218 m_freem(ctl);
219
220 sbappendrecord(&up->so_snd, m);
221 return l2cap_send(pcb, m0);
222
223 case PRU_SENSE:
224 return 0;
225
226 case PRU_RCVD:
227 case PRU_RCVOOB:
228 return EOPNOTSUPP;
229
230 case PRU_LISTEN:
231 return l2cap_listen(pcb);
232
233 case PRU_ACCEPT:
234 KASSERT(nam != NULL);
235 sa = mtod(nam, struct sockaddr_bt *);
236 nam->m_len = sizeof(struct sockaddr_bt);
237 return l2cap_peeraddr(pcb, sa);
238
239 case PRU_CONNECT2:
240 case PRU_SENDOOB:
241 case PRU_FASTTIMO:
242 case PRU_SLOWTIMO:
243 case PRU_PROTORCV:
244 case PRU_PROTOSEND:
245 err = EOPNOTSUPP;
246 break;
247
248 default:
249 UNKNOWN(req);
250 err = EOPNOTSUPP;
251 break;
252 }
253
254 release:
255 if (m) m_freem(m);
256 if (ctl) m_freem(ctl);
257 return err;
258 }
259
260
261
262
263
264
265
266 int
267 l2cap_ctloutput(int req, struct socket *so, int level,
268 int optname, struct mbuf **opt)
269 {
270 struct l2cap_channel *pcb = so->so_pcb;
271 struct mbuf *m;
272 int err = 0;
273
274 #ifdef notyet
275 DPRINTFN(2, "%s\n", prcorequests[req]);
276 #endif
277
278 if (pcb == NULL)
279 return EINVAL;
280
281 if (level != BTPROTO_L2CAP)
282 return ENOPROTOOPT;
283
284 switch(req) {
285 case PRCO_GETOPT:
286 m = m_get(M_WAIT, MT_SOOPTS);
287 m->m_len = l2cap_getopt(pcb, optname, mtod(m, void *));
288 if (m->m_len == 0) {
289 m_freem(m);
290 m = NULL;
291 err = ENOPROTOOPT;
292 }
293 *opt = m;
294 break;
295
296 case PRCO_SETOPT:
297 m = *opt;
298 KASSERT(m != NULL);
299 err = l2cap_setopt(pcb, optname, mtod(m, void *));
300 m_freem(m);
301 break;
302
303 default:
304 err = ENOPROTOOPT;
305 break;
306 }
307
308 return err;
309 }
310
311
312
313
314
315
316
317 static void
318 l2cap_connecting(void *arg)
319 {
320 struct socket *so = arg;
321
322 DPRINTF("Connecting\n");
323 soisconnecting(so);
324 }
325
326 static void
327 l2cap_connected(void *arg)
328 {
329 struct socket *so = arg;
330
331 DPRINTF("Connected\n");
332 soisconnected(so);
333 }
334
335 static void
336 l2cap_disconnected(void *arg, int err)
337 {
338 struct socket *so = arg;
339
340 DPRINTF("Disconnected (%d)\n", err);
341
342 so->so_error = err;
343 soisdisconnected(so);
344 }
345
346 static void *
347 l2cap_newconn(void *arg, struct sockaddr_bt *laddr,
348 struct sockaddr_bt *raddr)
349 {
350 struct socket *so = arg;
351
352 DPRINTF("New Connection\n");
353 so = sonewconn(so, 0);
354 if (so == NULL)
355 return NULL;
356
357 soisconnecting(so);
358
359 return so->so_pcb;
360 }
361
362 static void
363 l2cap_complete(void *arg, int count)
364 {
365 struct socket *so = arg;
366
367 while (count-- > 0)
368 sbdroprecord(&so->so_snd);
369
370 sowwakeup(so);
371 }
372
373 static void
374 l2cap_linkmode(void *arg, int new)
375 {
376 struct socket *so = arg;
377 int mode;
378
379 DPRINTF("auth %s, encrypt %s, secure %s\n",
380 (new & L2CAP_LM_AUTH ? "on" : "off"),
381 (new & L2CAP_LM_ENCRYPT ? "on" : "off"),
382 (new & L2CAP_LM_SECURE ? "on" : "off"));
383
384 (void)l2cap_getopt(so->so_pcb, SO_L2CAP_LM, &mode);
385 if (((mode & L2CAP_LM_AUTH) && !(new & L2CAP_LM_AUTH))
386 || ((mode & L2CAP_LM_ENCRYPT) && !(new & L2CAP_LM_ENCRYPT))
387 || ((mode & L2CAP_LM_SECURE) && !(new & L2CAP_LM_SECURE)))
388 l2cap_disconnect(so->so_pcb, 0);
389 }
390
391 static void
392 l2cap_input(void *arg, struct mbuf *m)
393 {
394 struct socket *so = arg;
395
396 if (m->m_pkthdr.len > sbspace(&so->so_rcv)) {
397 printf("%s: packet (%d bytes) dropped (socket buffer full)\n",
398 __func__, m->m_pkthdr.len);
399 m_freem(m);
400 return;
401 }
402
403 DPRINTFN(10, "received %d bytes\n", m->m_pkthdr.len);
404
405 sbappendrecord(&so->so_rcv, m);
406 sorwakeup(so);
407 }