1 /******************************************************************************
2 *
3 * Copyright 2009-2012 Broadcom Corporation
4 *
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at:
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 *
17 ******************************************************************************/
18
19 #define LOG_TAG "bt_btif_sock_rfcomm"
20
21 #include <base/logging.h>
22 #include <errno.h>
23 #include <features.h>
24 #include <pthread.h>
25 #include <string.h>
26 #include <sys/ioctl.h>
27 #include <sys/socket.h>
28 #include <sys/types.h>
29 #include <unistd.h>
30
31 #include <mutex>
32
33 #include <hardware/bluetooth.h>
34 #include <hardware/bt_sock.h>
35
36 #include "bt_common.h"
37 #include "bt_target.h"
38 #include "bta_api.h"
39 #include "bta_jv_api.h"
40 #include "bta_jv_co.h"
41 #include "btif_common.h"
42 #include "btif_sock_sdp.h"
43 #include "btif_sock_thread.h"
44 #include "btif_sock_util.h"
45 #include "btif_uid.h"
46 #include "btif_util.h"
47 #include "btm_api.h"
48 #include "btm_int.h"
49 #include "btu.h"
50 #include "hcimsgs.h"
51 #include "osi/include/compat.h"
52 #include "osi/include/list.h"
53 #include "osi/include/log.h"
54 #include "osi/include/osi.h"
55 #include "port_api.h"
56 #include "sdp_api.h"
57
58 /* The JV interface can have only one user, hence we need to call a few
59 * L2CAP functions from this file. */
60 #include "btif_sock_l2cap.h"
61
62 using bluetooth::Uuid;
63
64 // Maximum number of RFCOMM channels (1-30 inclusive).
65 #define MAX_RFC_CHANNEL 30
66
67 // Maximum number of devices we can have an RFCOMM connection with.
68 #define MAX_RFC_SESSION 7
69
70 typedef struct {
71 int outgoing_congest : 1;
72 int pending_sdp_request : 1;
73 int doing_sdp_request : 1;
74 int server : 1;
75 int connected : 1;
76 int closing : 1;
77 } flags_t;
78
79 typedef struct {
80 flags_t f;
81 uint32_t id; // Non-zero indicates a valid (in-use) slot.
82 int security;
83 int scn; // Server channel number
84 int scn_notified;
85 RawAddress addr;
86 int is_service_uuid_valid;
87 Uuid service_uuid;
88 char service_name[256];
89 int fd;
90 int app_fd; // Temporary storage for the half of the socketpair that's sent
91 // back to upper layers.
92 int app_uid; // UID of the app for which this socket was created.
93 int mtu;
94 uint8_t* packet;
95 int sdp_handle;
96 int rfc_handle;
97 int rfc_port_handle;
98 int role;
99 list_t* incoming_queue;
100 } rfc_slot_t;
101
102 static rfc_slot_t rfc_slots[MAX_RFC_CHANNEL];
103 static uint32_t rfc_slot_id;
104 static volatile int pth = -1; // poll thread handle
105 static std::recursive_mutex slot_lock;
106 static uid_set_t* uid_set = NULL;
107
108 static rfc_slot_t* find_free_slot(void);
109 static void cleanup_rfc_slot(rfc_slot_t* rs);
110 static void jv_dm_cback(tBTA_JV_EVT event, tBTA_JV* p_data, uint32_t id);
111 static uint32_t rfcomm_cback(tBTA_JV_EVT event, tBTA_JV* p_data,
112 uint32_t rfcomm_slot_id);
113 static bool send_app_scn(rfc_slot_t* rs);
114
is_init_done(void)115 static bool is_init_done(void) { return pth != -1; }
116
btsock_rfc_init(int poll_thread_handle,uid_set_t * set)117 bt_status_t btsock_rfc_init(int poll_thread_handle, uid_set_t* set) {
118 pth = poll_thread_handle;
119 uid_set = set;
120
121 memset(rfc_slots, 0, sizeof(rfc_slots));
122 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i) {
123 rfc_slots[i].scn = -1;
124 rfc_slots[i].sdp_handle = 0;
125 rfc_slots[i].fd = INVALID_FD;
126 rfc_slots[i].app_fd = INVALID_FD;
127 rfc_slots[i].incoming_queue = list_new(osi_free);
128 CHECK(rfc_slots[i].incoming_queue != NULL);
129 }
130
131 BTA_JvEnable(jv_dm_cback);
132
133 return BT_STATUS_SUCCESS;
134 }
135
btsock_rfc_cleanup(void)136 void btsock_rfc_cleanup(void) {
137 pth = -1;
138 uid_set = NULL;
139
140 BTA_JvDisable();
141
142 std::unique_lock<std::recursive_mutex> lock(slot_lock);
143 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i) {
144 if (rfc_slots[i].id) cleanup_rfc_slot(&rfc_slots[i]);
145 list_free(rfc_slots[i].incoming_queue);
146 rfc_slots[i].incoming_queue = NULL;
147 }
148 }
149
find_free_slot(void)150 static rfc_slot_t* find_free_slot(void) {
151 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i)
152 if (rfc_slots[i].fd == INVALID_FD) return &rfc_slots[i];
153 return NULL;
154 }
155
find_rfc_slot_by_id(uint32_t id)156 static rfc_slot_t* find_rfc_slot_by_id(uint32_t id) {
157 CHECK(id != 0);
158
159 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i)
160 if (rfc_slots[i].id == id) return &rfc_slots[i];
161
162 LOG_ERROR(LOG_TAG, "%s unable to find RFCOMM slot id: %u", __func__, id);
163 return NULL;
164 }
165
find_rfc_slot_by_pending_sdp(void)166 static rfc_slot_t* find_rfc_slot_by_pending_sdp(void) {
167 uint32_t min_id = UINT32_MAX;
168 int slot = -1;
169 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i)
170 if (rfc_slots[i].id && rfc_slots[i].f.pending_sdp_request &&
171 rfc_slots[i].id < min_id) {
172 min_id = rfc_slots[i].id;
173 slot = i;
174 }
175
176 return (slot == -1) ? NULL : &rfc_slots[slot];
177 }
178
is_requesting_sdp(void)179 static bool is_requesting_sdp(void) {
180 for (size_t i = 0; i < ARRAY_SIZE(rfc_slots); ++i)
181 if (rfc_slots[i].id && rfc_slots[i].f.doing_sdp_request) return true;
182 return false;
183 }
184
alloc_rfc_slot(const RawAddress * addr,const char * name,const Uuid & uuid,int channel,int flags,bool server)185 static rfc_slot_t* alloc_rfc_slot(const RawAddress* addr, const char* name,
186 const Uuid& uuid, int channel, int flags,
187 bool server) {
188 int security = 0;
189 if (flags & BTSOCK_FLAG_ENCRYPT)
190 security |= server ? BTM_SEC_IN_ENCRYPT : BTM_SEC_OUT_ENCRYPT;
191 if (flags & BTSOCK_FLAG_AUTH)
192 security |= server ? BTM_SEC_IN_AUTHENTICATE : BTM_SEC_OUT_AUTHENTICATE;
193 if (flags & BTSOCK_FLAG_AUTH_MITM)
194 security |= server ? BTM_SEC_IN_MITM : BTM_SEC_OUT_MITM;
195 if (flags & BTSOCK_FLAG_AUTH_16_DIGIT)
196 security |= BTM_SEC_IN_MIN_16_DIGIT_PIN;
197
198 rfc_slot_t* slot = find_free_slot();
199 if (!slot) {
200 LOG_ERROR(LOG_TAG, "%s unable to find free RFCOMM slot.", __func__);
201 return NULL;
202 }
203
204 int fds[2] = {INVALID_FD, INVALID_FD};
205 if (socketpair(AF_LOCAL, SOCK_STREAM, 0, fds) == -1) {
206 LOG_ERROR(LOG_TAG, "%s error creating socketpair: %s", __func__,
207 strerror(errno));
208 return NULL;
209 }
210
211 // Increment slot id and make sure we don't use id=0.
212 if (++rfc_slot_id == 0) rfc_slot_id = 1;
213
214 slot->fd = fds[0];
215 slot->app_fd = fds[1];
216 slot->security = security;
217 slot->scn = channel;
218 slot->app_uid = -1;
219
220 slot->is_service_uuid_valid = !uuid.IsEmpty();
221 slot->service_uuid = uuid;
222
223 if (name && *name) {
224 strlcpy(slot->service_name, name, sizeof(slot->service_name));
225 } else {
226 memset(slot->service_name, 0, sizeof(slot->service_name));
227 }
228 if (addr) slot->addr = *addr;
229
230 slot->id = rfc_slot_id;
231 slot->f.server = server;
232
233 return slot;
234 }
235
create_srv_accept_rfc_slot(rfc_slot_t * srv_rs,const RawAddress * addr,int open_handle,int new_listen_handle)236 static rfc_slot_t* create_srv_accept_rfc_slot(rfc_slot_t* srv_rs,
237 const RawAddress* addr,
238 int open_handle,
239 int new_listen_handle) {
240 rfc_slot_t* accept_rs = alloc_rfc_slot(
241 addr, srv_rs->service_name, srv_rs->service_uuid, srv_rs->scn, 0, false);
242 if (!accept_rs) {
243 LOG_ERROR(LOG_TAG, "%s unable to allocate RFCOMM slot.", __func__);
244 return NULL;
245 }
246
247 accept_rs->f.server = false;
248 accept_rs->f.connected = true;
249 accept_rs->security = srv_rs->security;
250 accept_rs->mtu = srv_rs->mtu;
251 accept_rs->role = srv_rs->role;
252 accept_rs->rfc_handle = open_handle;
253 accept_rs->rfc_port_handle = BTA_JvRfcommGetPortHdl(open_handle);
254 accept_rs->app_uid = srv_rs->app_uid;
255
256 srv_rs->rfc_handle = new_listen_handle;
257 srv_rs->rfc_port_handle = BTA_JvRfcommGetPortHdl(new_listen_handle);
258
259 CHECK(accept_rs->rfc_port_handle != srv_rs->rfc_port_handle);
260
261 // now swap the slot id
262 uint32_t new_listen_id = accept_rs->id;
263 accept_rs->id = srv_rs->id;
264 srv_rs->id = new_listen_id;
265
266 return accept_rs;
267 }
268
btsock_rfc_listen(const char * service_name,const Uuid * service_uuid,int channel,int * sock_fd,int flags,int app_uid)269 bt_status_t btsock_rfc_listen(const char* service_name,
270 const Uuid* service_uuid, int channel,
271 int* sock_fd, int flags, int app_uid) {
272 CHECK(sock_fd != NULL);
273 CHECK((service_uuid != NULL) ||
274 (channel >= 1 && channel <= MAX_RFC_CHANNEL) ||
275 ((flags & BTSOCK_FLAG_NO_SDP) != 0));
276
277 *sock_fd = INVALID_FD;
278
279 // TODO(sharvil): not sure that this check makes sense; seems like a logic
280 // error to call
281 // functions on RFCOMM sockets before initializing the module. Probably should
282 // be an assert.
283 if (!is_init_done()) return BT_STATUS_NOT_READY;
284
285 if ((flags & BTSOCK_FLAG_NO_SDP) == 0) {
286 if (!service_uuid || service_uuid->IsEmpty()) {
287 APPL_TRACE_DEBUG(
288 "%s: service_uuid not set AND BTSOCK_FLAG_NO_SDP is not set - "
289 "changing to SPP",
290 __func__);
291 // Use serial port profile to listen to specified channel
292 service_uuid = &UUID_SPP;
293 } else {
294 // Check the service_uuid. overwrite the channel # if reserved
295 int reserved_channel = get_reserved_rfc_channel(*service_uuid);
296 if (reserved_channel > 0) {
297 channel = reserved_channel;
298 }
299 }
300 }
301
302 std::unique_lock<std::recursive_mutex> lock(slot_lock);
303
304 rfc_slot_t* slot =
305 alloc_rfc_slot(NULL, service_name, *service_uuid, channel, flags, true);
306 if (!slot) {
307 LOG_ERROR(LOG_TAG, "%s unable to allocate RFCOMM slot.", __func__);
308 return BT_STATUS_FAIL;
309 }
310 APPL_TRACE_DEBUG("BTA_JvGetChannelId: service_name: %s - channel: %d",
311 service_name, channel);
312 BTA_JvGetChannelId(BTA_JV_CONN_TYPE_RFCOMM, slot->id, channel);
313 *sock_fd = slot->app_fd; // Transfer ownership of fd to caller.
314 /*TODO:
315 * We are leaking one of the app_fd's - either the listen socket, or the
316 connection socket.
317 * WE need to close this in native, as the FD might belong to another process
318 - This is the server socket FD
319 - For accepted connections, we close the FD after passing it to JAVA.
320 - Try to simply remove the = -1 to free the FD at rs cleanup.*/
321 // close(rs->app_fd);
322 slot->app_fd = INVALID_FD; // Drop our reference to the fd.
323 slot->app_uid = app_uid;
324 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_EXCEPTION,
325 slot->id);
326
327 return BT_STATUS_SUCCESS;
328 }
329
btsock_rfc_connect(const RawAddress * bd_addr,const Uuid * service_uuid,int channel,int * sock_fd,int flags,int app_uid)330 bt_status_t btsock_rfc_connect(const RawAddress* bd_addr,
331 const Uuid* service_uuid, int channel,
332 int* sock_fd, int flags, int app_uid) {
333 CHECK(sock_fd != NULL);
334 CHECK((service_uuid != NULL) || (channel >= 1 && channel <= MAX_RFC_CHANNEL));
335
336 *sock_fd = INVALID_FD;
337
338 // TODO(sharvil): not sure that this check makes sense; seems like a logic
339 // error to call
340 // functions on RFCOMM sockets before initializing the module. Probably should
341 // be an assert.
342 if (!is_init_done()) return BT_STATUS_NOT_READY;
343
344 std::unique_lock<std::recursive_mutex> lock(slot_lock);
345
346 rfc_slot_t* slot =
347 alloc_rfc_slot(bd_addr, NULL, *service_uuid, channel, flags, false);
348 if (!slot) {
349 LOG_ERROR(LOG_TAG, "%s unable to allocate RFCOMM slot.", __func__);
350 return BT_STATUS_FAIL;
351 }
352
353 if (!service_uuid || service_uuid->IsEmpty()) {
354 tBTA_JV_STATUS ret =
355 BTA_JvRfcommConnect(slot->security, slot->role, slot->scn, slot->addr,
356 rfcomm_cback, slot->id);
357 if (ret != BTA_JV_SUCCESS) {
358 LOG_ERROR(LOG_TAG, "%s unable to initiate RFCOMM connection: %d",
359 __func__, ret);
360 cleanup_rfc_slot(slot);
361 return BT_STATUS_FAIL;
362 }
363
364 if (!send_app_scn(slot)) {
365 LOG_ERROR(LOG_TAG, "%s unable to send channel number.", __func__);
366 cleanup_rfc_slot(slot);
367 return BT_STATUS_FAIL;
368 }
369 } else {
370 if (!is_requesting_sdp()) {
371 BTA_JvStartDiscovery(*bd_addr, 1, service_uuid, slot->id);
372 slot->f.pending_sdp_request = false;
373 slot->f.doing_sdp_request = true;
374 } else {
375 slot->f.pending_sdp_request = true;
376 slot->f.doing_sdp_request = false;
377 }
378 }
379
380 *sock_fd = slot->app_fd; // Transfer ownership of fd to caller.
381 slot->app_fd = INVALID_FD; // Drop our reference to the fd.
382 slot->app_uid = app_uid;
383 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_RD,
384 slot->id);
385
386 return BT_STATUS_SUCCESS;
387 }
388
create_server_sdp_record(rfc_slot_t * slot)389 static int create_server_sdp_record(rfc_slot_t* slot) {
390 if (slot->scn == 0) {
391 return false;
392 }
393 slot->sdp_handle =
394 add_rfc_sdp_rec(slot->service_name, slot->service_uuid, slot->scn);
395 return (slot->sdp_handle > 0);
396 }
397
free_rfc_slot_scn(rfc_slot_t * slot)398 static void free_rfc_slot_scn(rfc_slot_t* slot) {
399 if (slot->scn <= 0) return;
400
401 if (slot->f.server && !slot->f.closing && slot->rfc_handle) {
402 BTA_JvRfcommStopServer(slot->rfc_handle, slot->id);
403 slot->rfc_handle = 0;
404 }
405
406 if (slot->f.server) BTM_FreeSCN(slot->scn);
407 slot->scn = 0;
408 }
409
cleanup_rfc_slot(rfc_slot_t * slot)410 static void cleanup_rfc_slot(rfc_slot_t* slot) {
411 if (slot->fd != INVALID_FD) {
412 shutdown(slot->fd, SHUT_RDWR);
413 close(slot->fd);
414 slot->fd = INVALID_FD;
415 }
416
417 if (slot->app_fd != INVALID_FD) {
418 close(slot->app_fd);
419 slot->app_fd = INVALID_FD;
420 }
421
422 if (slot->sdp_handle > 0) {
423 del_rfc_sdp_rec(slot->sdp_handle);
424 slot->sdp_handle = 0;
425 }
426
427 if (slot->rfc_handle && !slot->f.closing && !slot->f.server) {
428 BTA_JvRfcommClose(slot->rfc_handle, slot->id);
429 slot->rfc_handle = 0;
430 }
431
432 free_rfc_slot_scn(slot);
433 list_clear(slot->incoming_queue);
434
435 slot->rfc_port_handle = 0;
436 memset(&slot->f, 0, sizeof(slot->f));
437 slot->id = 0;
438 slot->scn_notified = false;
439 }
440
send_app_scn(rfc_slot_t * slot)441 static bool send_app_scn(rfc_slot_t* slot) {
442 if (slot->scn_notified) {
443 // already send, just return success.
444 return true;
445 }
446 slot->scn_notified = true;
447 return sock_send_all(slot->fd, (const uint8_t*)&slot->scn,
448 sizeof(slot->scn)) == sizeof(slot->scn);
449 }
450
send_app_connect_signal(int fd,const RawAddress * addr,int channel,int status,int send_fd)451 static bool send_app_connect_signal(int fd, const RawAddress* addr, int channel,
452 int status, int send_fd) {
453 sock_connect_signal_t cs;
454 cs.size = sizeof(cs);
455 cs.bd_addr = *addr;
456 cs.channel = channel;
457 cs.status = status;
458 cs.max_rx_packet_size = 0; // not used for RFCOMM
459 cs.max_tx_packet_size = 0; // not used for RFCOMM
460 if (send_fd == INVALID_FD)
461 return sock_send_all(fd, (const uint8_t*)&cs, sizeof(cs)) == sizeof(cs);
462
463 return sock_send_fd(fd, (const uint8_t*)&cs, sizeof(cs), send_fd) ==
464 sizeof(cs);
465 }
466
on_cl_rfc_init(tBTA_JV_RFCOMM_CL_INIT * p_init,uint32_t id)467 static void on_cl_rfc_init(tBTA_JV_RFCOMM_CL_INIT* p_init, uint32_t id) {
468 std::unique_lock<std::recursive_mutex> lock(slot_lock);
469 rfc_slot_t* slot = find_rfc_slot_by_id(id);
470 if (!slot) return;
471
472 if (p_init->status == BTA_JV_SUCCESS) {
473 slot->rfc_handle = p_init->handle;
474 } else {
475 cleanup_rfc_slot(slot);
476 }
477 }
478
on_srv_rfc_listen_started(tBTA_JV_RFCOMM_START * p_start,uint32_t id)479 static void on_srv_rfc_listen_started(tBTA_JV_RFCOMM_START* p_start,
480 uint32_t id) {
481 std::unique_lock<std::recursive_mutex> lock(slot_lock);
482 rfc_slot_t* slot = find_rfc_slot_by_id(id);
483 if (!slot) return;
484
485 if (p_start->status == BTA_JV_SUCCESS) {
486 slot->rfc_handle = p_start->handle;
487 } else {
488 cleanup_rfc_slot(slot);
489 }
490 }
491
on_srv_rfc_connect(tBTA_JV_RFCOMM_SRV_OPEN * p_open,uint32_t id)492 static uint32_t on_srv_rfc_connect(tBTA_JV_RFCOMM_SRV_OPEN* p_open,
493 uint32_t id) {
494 std::unique_lock<std::recursive_mutex> lock(slot_lock);
495 rfc_slot_t* accept_rs;
496 rfc_slot_t* srv_rs = find_rfc_slot_by_id(id);
497 if (!srv_rs) return 0;
498
499 accept_rs = create_srv_accept_rfc_slot(
500 srv_rs, &p_open->rem_bda, p_open->handle, p_open->new_listen_handle);
501 if (!accept_rs) return 0;
502
503 // Start monitoring the socket.
504 btsock_thread_add_fd(pth, srv_rs->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_EXCEPTION,
505 srv_rs->id);
506 btsock_thread_add_fd(pth, accept_rs->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_RD,
507 accept_rs->id);
508 send_app_connect_signal(srv_rs->fd, &accept_rs->addr, srv_rs->scn, 0,
509 accept_rs->app_fd);
510 accept_rs->app_fd =
511 INVALID_FD; // Ownership of the application fd has been transferred.
512 return srv_rs->id;
513 }
514
on_cli_rfc_connect(tBTA_JV_RFCOMM_OPEN * p_open,uint32_t id)515 static void on_cli_rfc_connect(tBTA_JV_RFCOMM_OPEN* p_open, uint32_t id) {
516 std::unique_lock<std::recursive_mutex> lock(slot_lock);
517 rfc_slot_t* slot = find_rfc_slot_by_id(id);
518 if (!slot) return;
519
520 if (p_open->status != BTA_JV_SUCCESS) {
521 cleanup_rfc_slot(slot);
522 return;
523 }
524
525 slot->rfc_port_handle = BTA_JvRfcommGetPortHdl(p_open->handle);
526 slot->addr = p_open->rem_bda;
527
528 if (send_app_connect_signal(slot->fd, &slot->addr, slot->scn, 0, -1)) {
529 slot->f.connected = true;
530 } else {
531 LOG_ERROR(LOG_TAG, "%s unable to send connect completion signal to caller.",
532 __func__);
533 }
534 }
535
on_rfc_close(UNUSED_ATTR tBTA_JV_RFCOMM_CLOSE * p_close,uint32_t id)536 static void on_rfc_close(UNUSED_ATTR tBTA_JV_RFCOMM_CLOSE* p_close,
537 uint32_t id) {
538 std::unique_lock<std::recursive_mutex> lock(slot_lock);
539
540 // rfc_handle already closed when receiving rfcomm close event from stack.
541 rfc_slot_t* slot = find_rfc_slot_by_id(id);
542 if (slot) cleanup_rfc_slot(slot);
543 }
544
on_rfc_write_done(tBTA_JV_RFCOMM_WRITE * p,uint32_t id)545 static void on_rfc_write_done(tBTA_JV_RFCOMM_WRITE* p, uint32_t id) {
546 if (p->status != BTA_JV_SUCCESS) {
547 LOG_ERROR(LOG_TAG, "%s error writing to RFCOMM socket with slot %u.",
548 __func__, p->req_id);
549 return;
550 }
551
552 int app_uid = -1;
553 std::unique_lock<std::recursive_mutex> lock(slot_lock);
554
555 rfc_slot_t* slot = find_rfc_slot_by_id(id);
556 if (slot) {
557 app_uid = slot->app_uid;
558 if (!slot->f.outgoing_congest) {
559 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_RD,
560 slot->id);
561 }
562 }
563
564 uid_set_add_tx(uid_set, app_uid, p->len);
565 }
566
on_rfc_outgoing_congest(tBTA_JV_RFCOMM_CONG * p,uint32_t id)567 static void on_rfc_outgoing_congest(tBTA_JV_RFCOMM_CONG* p, uint32_t id) {
568 std::unique_lock<std::recursive_mutex> lock(slot_lock);
569
570 rfc_slot_t* slot = find_rfc_slot_by_id(id);
571 if (slot) {
572 slot->f.outgoing_congest = p->cong ? 1 : 0;
573 if (!slot->f.outgoing_congest)
574 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_RD,
575 slot->id);
576 }
577 }
578
rfcomm_cback(tBTA_JV_EVT event,tBTA_JV * p_data,uint32_t rfcomm_slot_id)579 static uint32_t rfcomm_cback(tBTA_JV_EVT event, tBTA_JV* p_data,
580 uint32_t rfcomm_slot_id) {
581 uint32_t id = 0;
582
583 switch (event) {
584 case BTA_JV_RFCOMM_START_EVT:
585 on_srv_rfc_listen_started(&p_data->rfc_start, rfcomm_slot_id);
586 break;
587
588 case BTA_JV_RFCOMM_CL_INIT_EVT:
589 on_cl_rfc_init(&p_data->rfc_cl_init, rfcomm_slot_id);
590 break;
591
592 case BTA_JV_RFCOMM_OPEN_EVT:
593 BTA_JvSetPmProfile(p_data->rfc_open.handle, BTA_JV_PM_ID_1,
594 BTA_JV_CONN_OPEN);
595 on_cli_rfc_connect(&p_data->rfc_open, rfcomm_slot_id);
596 break;
597
598 case BTA_JV_RFCOMM_SRV_OPEN_EVT:
599 BTA_JvSetPmProfile(p_data->rfc_srv_open.handle, BTA_JV_PM_ALL,
600 BTA_JV_CONN_OPEN);
601 id = on_srv_rfc_connect(&p_data->rfc_srv_open, rfcomm_slot_id);
602 break;
603
604 case BTA_JV_RFCOMM_CLOSE_EVT:
605 APPL_TRACE_DEBUG("BTA_JV_RFCOMM_CLOSE_EVT: rfcomm_slot_id:%d",
606 rfcomm_slot_id);
607 on_rfc_close(&p_data->rfc_close, rfcomm_slot_id);
608 break;
609
610 case BTA_JV_RFCOMM_WRITE_EVT:
611 on_rfc_write_done(&p_data->rfc_write, rfcomm_slot_id);
612 break;
613
614 case BTA_JV_RFCOMM_CONG_EVT:
615 on_rfc_outgoing_congest(&p_data->rfc_cong, rfcomm_slot_id);
616 break;
617
618 case BTA_JV_RFCOMM_DATA_IND_EVT:
619 // Unused.
620 break;
621
622 default:
623 LOG_ERROR(LOG_TAG, "%s unhandled event %d, slot id: %u", __func__, event,
624 rfcomm_slot_id);
625 break;
626 }
627 return id;
628 }
629
jv_dm_cback(tBTA_JV_EVT event,tBTA_JV * p_data,uint32_t id)630 static void jv_dm_cback(tBTA_JV_EVT event, tBTA_JV* p_data, uint32_t id) {
631 switch (event) {
632 case BTA_JV_GET_SCN_EVT: {
633 std::unique_lock<std::recursive_mutex> lock(slot_lock);
634 rfc_slot_t* rs = find_rfc_slot_by_id(id);
635 int new_scn = p_data->scn;
636
637 if (rs && (new_scn != 0)) {
638 rs->scn = new_scn;
639 /* BTA_JvCreateRecordByUser will only create a record if a UUID is
640 * specified,
641 * else it just allocate a RFC channel and start the RFCOMM thread -
642 * needed
643 * for the java
644 * layer to get a RFCOMM channel.
645 * If uuid is null the create_sdp_record() will be called from Java when
646 * it
647 * has received the RFCOMM and L2CAP channel numbers through the
648 * sockets.*/
649
650 // Send channel ID to java layer
651 if (!send_app_scn(rs)) {
652 // closed
653 APPL_TRACE_DEBUG("send_app_scn() failed, close rs->id:%d", rs->id);
654 cleanup_rfc_slot(rs);
655 } else {
656 if (rs->is_service_uuid_valid) {
657 // We already have data for SDP record, create it (RFC-only
658 // profiles)
659 BTA_JvCreateRecordByUser(rs->id);
660 } else {
661 APPL_TRACE_DEBUG(
662 "is_service_uuid_valid==false - don't set SDP-record, "
663 "just start the RFCOMM server",
664 rs->id);
665 // now start the rfcomm server after sdp & channel # assigned
666 BTA_JvRfcommStartServer(rs->security, rs->role, rs->scn,
667 MAX_RFC_SESSION, rfcomm_cback, rs->id);
668 }
669 }
670 } else if (rs) {
671 APPL_TRACE_ERROR(
672 "jv_dm_cback: Error: allocate channel %d, slot found:%p", rs->scn,
673 rs);
674 cleanup_rfc_slot(rs);
675 }
676 break;
677 }
678 case BTA_JV_GET_PSM_EVT: {
679 APPL_TRACE_DEBUG("Received PSM: 0x%04x", p_data->psm);
680 on_l2cap_psm_assigned(id, p_data->psm);
681 break;
682 }
683 case BTA_JV_CREATE_RECORD_EVT: {
684 std::unique_lock<std::recursive_mutex> lock(slot_lock);
685 rfc_slot_t* slot = find_rfc_slot_by_id(id);
686
687 if (slot && create_server_sdp_record(slot)) {
688 // Start the rfcomm server after sdp & channel # assigned.
689 BTA_JvRfcommStartServer(slot->security, slot->role, slot->scn,
690 MAX_RFC_SESSION, rfcomm_cback, slot->id);
691 } else if (slot) {
692 APPL_TRACE_ERROR("jv_dm_cback: cannot start server, slot found:%p",
693 slot);
694 cleanup_rfc_slot(slot);
695 }
696 break;
697 }
698
699 case BTA_JV_DISCOVERY_COMP_EVT: {
700 std::unique_lock<std::recursive_mutex> lock(slot_lock);
701 rfc_slot_t* slot = find_rfc_slot_by_id(id);
702 if (p_data->disc_comp.status == BTA_JV_SUCCESS && p_data->disc_comp.scn) {
703 if (slot && slot->f.doing_sdp_request) {
704 // Establish the connection if we successfully looked up a channel
705 // number to connect to.
706 if (BTA_JvRfcommConnect(slot->security, slot->role,
707 p_data->disc_comp.scn, slot->addr,
708 rfcomm_cback, slot->id) == BTA_JV_SUCCESS) {
709 slot->scn = p_data->disc_comp.scn;
710 slot->f.doing_sdp_request = false;
711 if (!send_app_scn(slot)) cleanup_rfc_slot(slot);
712 } else {
713 cleanup_rfc_slot(slot);
714 }
715 } else if (slot) {
716 // TODO(sharvil): this is really a logic error and we should probably
717 // assert.
718 LOG_ERROR(LOG_TAG,
719 "%s SDP response returned but RFCOMM slot %d did not "
720 "request SDP record.",
721 __func__, id);
722 }
723 } else if (slot) {
724 cleanup_rfc_slot(slot);
725 }
726
727 // Find the next slot that needs to perform an SDP request and service it.
728 slot = find_rfc_slot_by_pending_sdp();
729 if (slot) {
730 BTA_JvStartDiscovery(slot->addr, 1, &slot->service_uuid, slot->id);
731 slot->f.pending_sdp_request = false;
732 slot->f.doing_sdp_request = true;
733 }
734 break;
735 }
736
737 default:
738 APPL_TRACE_DEBUG("unhandled event:%d, slot id:%d", event, id);
739 break;
740 }
741 }
742
743 typedef enum {
744 SENT_FAILED,
745 SENT_NONE,
746 SENT_PARTIAL,
747 SENT_ALL,
748 } sent_status_t;
749
send_data_to_app(int fd,BT_HDR * p_buf)750 static sent_status_t send_data_to_app(int fd, BT_HDR* p_buf) {
751 if (p_buf->len == 0) return SENT_ALL;
752
753 ssize_t sent;
754 OSI_NO_INTR(
755 sent = send(fd, p_buf->data + p_buf->offset, p_buf->len, MSG_DONTWAIT));
756
757 if (sent == -1) {
758 if (errno == EAGAIN || errno == EWOULDBLOCK) return SENT_NONE;
759 LOG_ERROR(LOG_TAG, "%s error writing RFCOMM data back to app: %s", __func__,
760 strerror(errno));
761 return SENT_FAILED;
762 }
763
764 if (sent == 0) return SENT_FAILED;
765
766 if (sent == p_buf->len) return SENT_ALL;
767
768 p_buf->offset += sent;
769 p_buf->len -= sent;
770 return SENT_PARTIAL;
771 }
772
flush_incoming_que_on_wr_signal(rfc_slot_t * slot)773 static bool flush_incoming_que_on_wr_signal(rfc_slot_t* slot) {
774 while (!list_is_empty(slot->incoming_queue)) {
775 BT_HDR* p_buf = (BT_HDR*)list_front(slot->incoming_queue);
776 switch (send_data_to_app(slot->fd, p_buf)) {
777 case SENT_NONE:
778 case SENT_PARTIAL:
779 // monitor the fd to get callback when app is ready to receive data
780 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_WR,
781 slot->id);
782 return true;
783
784 case SENT_ALL:
785 list_remove(slot->incoming_queue, p_buf);
786 break;
787
788 case SENT_FAILED:
789 list_remove(slot->incoming_queue, p_buf);
790 return false;
791 }
792 }
793
794 // app is ready to receive data, tell stack to start the data flow
795 // fix me: need a jv flow control api to serialize the call in stack
796 APPL_TRACE_DEBUG(
797 "enable data flow, rfc_handle:0x%x, rfc_port_handle:0x%x, user_id:%d",
798 slot->rfc_handle, slot->rfc_port_handle, slot->id);
799 PORT_FlowControl_MaxCredit(slot->rfc_port_handle, true);
800 return true;
801 }
802
btsock_rfc_signaled(UNUSED_ATTR int fd,int flags,uint32_t user_id)803 void btsock_rfc_signaled(UNUSED_ATTR int fd, int flags, uint32_t user_id) {
804 bool need_close = false;
805 std::unique_lock<std::recursive_mutex> lock(slot_lock);
806 rfc_slot_t* slot = find_rfc_slot_by_id(user_id);
807 if (!slot) return;
808
809 // Data available from app, tell stack we have outgoing data.
810 if (flags & SOCK_THREAD_FD_RD && !slot->f.server) {
811 if (slot->f.connected) {
812 // Make sure there's data pending in case the peer closed the socket.
813 int size = 0;
814 if (!(flags & SOCK_THREAD_FD_EXCEPTION) ||
815 (ioctl(slot->fd, FIONREAD, &size) == 0 && size)) {
816 BTA_JvRfcommWrite(slot->rfc_handle, slot->id);
817 }
818 } else {
819 LOG_ERROR(LOG_TAG,
820 "%s socket signaled for read while disconnected, slot: %d, "
821 "channel: %d",
822 __func__, slot->id, slot->scn);
823 need_close = true;
824 }
825 }
826
827 if (flags & SOCK_THREAD_FD_WR) {
828 // App is ready to receive more data, tell stack to enable data flow.
829 if (!slot->f.connected || !flush_incoming_que_on_wr_signal(slot)) {
830 LOG_ERROR(LOG_TAG,
831 "%s socket signaled for write while disconnected (or write "
832 "failure), slot: %d, channel: %d",
833 __func__, slot->id, slot->scn);
834 need_close = true;
835 }
836 }
837
838 if (need_close || (flags & SOCK_THREAD_FD_EXCEPTION)) {
839 // Clean up if there's no data pending.
840 int size = 0;
841 if (need_close || ioctl(slot->fd, FIONREAD, &size) != 0 || !size)
842 cleanup_rfc_slot(slot);
843 }
844 }
845
bta_co_rfc_data_incoming(uint32_t id,BT_HDR * p_buf)846 int bta_co_rfc_data_incoming(uint32_t id, BT_HDR* p_buf) {
847 int app_uid = -1;
848 uint64_t bytes_rx = 0;
849 int ret = 0;
850 std::unique_lock<std::recursive_mutex> lock(slot_lock);
851 rfc_slot_t* slot = find_rfc_slot_by_id(id);
852 if (!slot) return 0;
853
854 app_uid = slot->app_uid;
855 bytes_rx = p_buf->len;
856
857 if (list_is_empty(slot->incoming_queue)) {
858 switch (send_data_to_app(slot->fd, p_buf)) {
859 case SENT_NONE:
860 case SENT_PARTIAL:
861 list_append(slot->incoming_queue, p_buf);
862 btsock_thread_add_fd(pth, slot->fd, BTSOCK_RFCOMM, SOCK_THREAD_FD_WR,
863 slot->id);
864 break;
865
866 case SENT_ALL:
867 osi_free(p_buf);
868 ret = 1; // Enable data flow.
869 break;
870
871 case SENT_FAILED:
872 osi_free(p_buf);
873 cleanup_rfc_slot(slot);
874 break;
875 }
876 } else {
877 list_append(slot->incoming_queue, p_buf);
878 }
879
880 uid_set_add_rx(uid_set, app_uid, bytes_rx);
881
882 return ret; // Return 0 to disable data flow.
883 }
884
bta_co_rfc_data_outgoing_size(uint32_t id,int * size)885 int bta_co_rfc_data_outgoing_size(uint32_t id, int* size) {
886 *size = 0;
887 std::unique_lock<std::recursive_mutex> lock(slot_lock);
888 rfc_slot_t* slot = find_rfc_slot_by_id(id);
889 if (!slot) return false;
890
891 if (ioctl(slot->fd, FIONREAD, size) != 0) {
892 LOG_ERROR(LOG_TAG,
893 "%s unable to determine bytes remaining to be read on fd %d: %s",
894 __func__, slot->fd, strerror(errno));
895 cleanup_rfc_slot(slot);
896 return false;
897 }
898
899 return true;
900 }
901
bta_co_rfc_data_outgoing(uint32_t id,uint8_t * buf,uint16_t size)902 int bta_co_rfc_data_outgoing(uint32_t id, uint8_t* buf, uint16_t size) {
903 std::unique_lock<std::recursive_mutex> lock(slot_lock);
904 rfc_slot_t* slot = find_rfc_slot_by_id(id);
905 if (!slot) return false;
906
907 ssize_t received;
908 OSI_NO_INTR(received = recv(slot->fd, buf, size, 0));
909
910 if (received != size) {
911 LOG_ERROR(LOG_TAG, "%s error receiving RFCOMM data from app: %s", __func__,
912 strerror(errno));
913 cleanup_rfc_slot(slot);
914 return false;
915 }
916
917 return true;
918 }
919