blob: 90121b14e999635e8428de679a9dc9118dbb1507 [file] [log] [blame]
/******************************************************************************
*
* Copyright 2014 Google, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
******************************************************************************/
#define LOG_TAG "bt_btif_sock"
#include <atomic>
#include <base/logging.h>
#include <hardware/bluetooth.h>
#include <hardware/bt_sock.h>
#include "bta_api.h"
#include "btif_common.h"
#include "btif_sock_l2cap.h"
#include "btif_sock_rfc.h"
#include "btif_sock_sco.h"
#include "btif_sock_sdp.h"
#include "btif_sock_thread.h"
#include "btif_uid.h"
#include "btif_util.h"
#include "device/include/controller.h"
#include "osi/include/thread.h"
using bluetooth::Uuid;
static bt_status_t btsock_listen(btsock_type_t type, const char* service_name,
const Uuid* uuid, int channel, int* sock_fd,
int flags, int app_uid);
static bt_status_t btsock_connect(const RawAddress* bd_addr, btsock_type_t type,
const Uuid* uuid, int channel, int* sock_fd,
int flags, int app_uid);
static void btsock_request_max_tx_data_length(const RawAddress& bd_addr);
static void btsock_signaled(int fd, int type, int flags, uint32_t user_id);
static std::atomic_int thread_handle{-1};
static thread_t* thread;
const btsock_interface_t* btif_sock_get_interface(void) {
static btsock_interface_t interface = {
sizeof(interface), btsock_listen, /* listen */
btsock_connect, /* connect */
btsock_request_max_tx_data_length /* request_max_tx_data_length */
};
return &interface;
}
bt_status_t btif_sock_init(uid_set_t* uid_set) {
CHECK(thread_handle == -1);
CHECK(thread == NULL);
bt_status_t status;
btsock_thread_init();
thread_handle = btsock_thread_create(btsock_signaled, NULL);
if (thread_handle == -1) {
LOG_ERROR(LOG_TAG, "%s unable to create btsock_thread.", __func__);
goto error;
}
status = btsock_rfc_init(thread_handle, uid_set);
if (status != BT_STATUS_SUCCESS) {
LOG_ERROR(LOG_TAG, "%s error initializing RFCOMM sockets: %d", __func__,
status);
goto error;
}
status = btsock_l2cap_init(thread_handle, uid_set);
if (status != BT_STATUS_SUCCESS) {
LOG_ERROR(LOG_TAG, "%s error initializing L2CAP sockets: %d", __func__,
status);
goto error;
}
thread = thread_new("btif_sock");
if (!thread) {
LOG_ERROR(LOG_TAG, "%s error creating new thread.", __func__);
btsock_rfc_cleanup();
goto error;
}
status = btsock_sco_init(thread);
if (status != BT_STATUS_SUCCESS) {
LOG_ERROR(LOG_TAG, "%s error initializing SCO sockets: %d", __func__,
status);
btsock_rfc_cleanup();
goto error;
}
return BT_STATUS_SUCCESS;
error:;
thread_free(thread);
thread = NULL;
if (thread_handle != -1) btsock_thread_exit(thread_handle);
thread_handle = -1;
uid_set = NULL;
return BT_STATUS_FAIL;
}
void btif_sock_cleanup(void) {
int saved_handle = thread_handle;
if (std::atomic_exchange(&thread_handle, -1) == -1) return;
btsock_thread_exit(saved_handle);
btsock_rfc_cleanup();
btsock_sco_cleanup();
btsock_l2cap_cleanup();
thread_free(thread);
thread = NULL;
}
static bt_status_t btsock_listen(btsock_type_t type, const char* service_name,
const Uuid* service_uuid, int channel,
int* sock_fd, int flags, int app_uid) {
if ((flags & BTSOCK_FLAG_NO_SDP) == 0) {
CHECK(sock_fd != NULL);
}
*sock_fd = INVALID_FD;
bt_status_t status = BT_STATUS_FAIL;
int original_channel = channel;
switch (type) {
case BTSOCK_RFCOMM:
status = btsock_rfc_listen(service_name, service_uuid, channel, sock_fd,
flags, app_uid);
break;
case BTSOCK_L2CAP:
status =
btsock_l2cap_listen(service_name, channel, sock_fd, flags, app_uid);
break;
case BTSOCK_L2CAP_LE:
if (flags & BTSOCK_FLAG_NO_SDP) {
/* Set channel to zero so that it will be assigned */
channel = 0;
} else if (channel <= 0) {
LOG_ERROR(LOG_TAG, "%s: type BTSOCK_L2CAP_LE: invalid channel=%d",
__func__, channel);
break;
}
flags |= BTSOCK_FLAG_LE_COC;
LOG_DEBUG(
LOG_TAG,
"%s: type=BTSOCK_L2CAP_LE, channel=0x%x, original=0x%x, flags=0x%x",
__func__, channel, original_channel, flags);
status =
btsock_l2cap_listen(service_name, channel, sock_fd, flags, app_uid);
break;
case BTSOCK_SCO:
status = btsock_sco_listen(sock_fd, flags);
break;
default:
LOG_ERROR(LOG_TAG, "%s unknown/unsupported socket type: %d", __func__,
type);
status = BT_STATUS_UNSUPPORTED;
break;
}
return status;
}
static bt_status_t btsock_connect(const RawAddress* bd_addr, btsock_type_t type,
const Uuid* uuid, int channel, int* sock_fd,
int flags, int app_uid) {
CHECK(bd_addr != NULL);
CHECK(sock_fd != NULL);
*sock_fd = INVALID_FD;
bt_status_t status = BT_STATUS_FAIL;
switch (type) {
case BTSOCK_RFCOMM:
status =
btsock_rfc_connect(bd_addr, uuid, channel, sock_fd, flags, app_uid);
break;
case BTSOCK_L2CAP:
status = btsock_l2cap_connect(bd_addr, channel, sock_fd, flags, app_uid);
break;
case BTSOCK_L2CAP_LE:
flags |= BTSOCK_FLAG_LE_COC;
LOG_DEBUG(LOG_TAG, "%s: type=BTSOCK_L2CAP_LE, channel=0x%x, flags=0x%x",
__func__, channel, flags);
status = btsock_l2cap_connect(bd_addr, channel, sock_fd, flags, app_uid);
break;
case BTSOCK_SCO:
status = btsock_sco_connect(bd_addr, sock_fd, flags);
break;
default:
LOG_ERROR(LOG_TAG, "%s unknown/unsupported socket type: %d", __func__,
type);
status = BT_STATUS_UNSUPPORTED;
break;
}
return status;
}
static void btsock_request_max_tx_data_length(const RawAddress& remote_device) {
const controller_t* controller = controller_get_interface();
uint16_t max_len = controller->get_ble_maximum_tx_data_length();
DVLOG(2) << __func__ << ": max_len=" << max_len;
BTA_DmBleSetDataLength(remote_device, max_len);
}
static void btsock_signaled(int fd, int type, int flags, uint32_t user_id) {
switch (type) {
case BTSOCK_RFCOMM:
btsock_rfc_signaled(fd, flags, user_id);
break;
case BTSOCK_L2CAP:
case BTSOCK_L2CAP_LE:
/* Note: The caller may not distinguish between BTSOCK_L2CAP and
* BTSOCK_L2CAP_LE correctly */
btsock_l2cap_signaled(fd, flags, user_id);
break;
default:
CHECK(false && "Invalid socket type");
break;
}
}