avdtp.c 91 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. *
  4. * BlueZ - Bluetooth protocol stack for Linux
  5. *
  6. * Copyright (C) 2006-2010 Nokia Corporation
  7. * Copyright (C) 2004-2010 Marcel Holtmann <marcel@holtmann.org>
  8. *
  9. *
  10. */
  11. #ifdef HAVE_CONFIG_H
  12. #include <config.h>
  13. #endif
  14. #include <stdlib.h>
  15. #include <stdio.h>
  16. #include <stdint.h>
  17. #include <stdbool.h>
  18. #include <errno.h>
  19. #include <unistd.h>
  20. #include <assert.h>
  21. #include <glib.h>
  22. #include "lib/bluetooth.h"
  23. #include "lib/sdp.h"
  24. #include "lib/sdp_lib.h"
  25. #include "lib/uuid.h"
  26. #include "btio/btio.h"
  27. #include "src/btd.h"
  28. #include "src/log.h"
  29. #include "src/shared/timeout.h"
  30. #include "src/shared/util.h"
  31. #include "src/shared/queue.h"
  32. #include "src/adapter.h"
  33. #include "src/device.h"
  34. #include "avdtp.h"
  35. #include "sink.h"
  36. #include "source.h"
  37. #define AVDTP_PSM 25
  38. #define MAX_SEID 0x3E
  39. #ifndef MAX
  40. # define MAX(x, y) ((x) > (y) ? (x) : (y))
  41. #endif
  42. #define AVDTP_DISCOVER 0x01
  43. #define AVDTP_GET_CAPABILITIES 0x02
  44. #define AVDTP_SET_CONFIGURATION 0x03
  45. #define AVDTP_GET_CONFIGURATION 0x04
  46. #define AVDTP_RECONFIGURE 0x05
  47. #define AVDTP_OPEN 0x06
  48. #define AVDTP_START 0x07
  49. #define AVDTP_CLOSE 0x08
  50. #define AVDTP_SUSPEND 0x09
  51. #define AVDTP_ABORT 0x0A
  52. #define AVDTP_SECURITY_CONTROL 0x0B
  53. #define AVDTP_GET_ALL_CAPABILITIES 0x0C
  54. #define AVDTP_DELAY_REPORT 0x0D
  55. #define AVDTP_PKT_TYPE_SINGLE 0x00
  56. #define AVDTP_PKT_TYPE_START 0x01
  57. #define AVDTP_PKT_TYPE_CONTINUE 0x02
  58. #define AVDTP_PKT_TYPE_END 0x03
  59. #define AVDTP_MSG_TYPE_COMMAND 0x00
  60. #define AVDTP_MSG_TYPE_GEN_REJECT 0x01
  61. #define AVDTP_MSG_TYPE_ACCEPT 0x02
  62. #define AVDTP_MSG_TYPE_REJECT 0x03
  63. #define REQ_TIMEOUT 6
  64. #define SUSPEND_TIMEOUT 10
  65. #define ABORT_TIMEOUT 2
  66. #define DISCONNECT_TIMEOUT 1
  67. #define START_TIMEOUT 1
  68. #if __BYTE_ORDER == __LITTLE_ENDIAN
  69. struct avdtp_common_header {
  70. uint8_t message_type:2;
  71. uint8_t packet_type:2;
  72. uint8_t transaction:4;
  73. } __attribute__ ((packed));
  74. struct avdtp_single_header {
  75. uint8_t message_type:2;
  76. uint8_t packet_type:2;
  77. uint8_t transaction:4;
  78. uint8_t signal_id:6;
  79. uint8_t rfa0:2;
  80. } __attribute__ ((packed));
  81. struct avdtp_start_header {
  82. uint8_t message_type:2;
  83. uint8_t packet_type:2;
  84. uint8_t transaction:4;
  85. uint8_t no_of_packets;
  86. uint8_t signal_id:6;
  87. uint8_t rfa0:2;
  88. } __attribute__ ((packed));
  89. struct avdtp_continue_header {
  90. uint8_t message_type:2;
  91. uint8_t packet_type:2;
  92. uint8_t transaction:4;
  93. } __attribute__ ((packed));
  94. struct seid_info {
  95. uint8_t rfa0:1;
  96. uint8_t inuse:1;
  97. uint8_t seid:6;
  98. uint8_t rfa2:3;
  99. uint8_t type:1;
  100. uint8_t media_type:4;
  101. } __attribute__ ((packed));
  102. struct seid {
  103. uint8_t rfa0:2;
  104. uint8_t seid:6;
  105. } __attribute__ ((packed));
  106. #elif __BYTE_ORDER == __BIG_ENDIAN
  107. struct avdtp_common_header {
  108. uint8_t transaction:4;
  109. uint8_t packet_type:2;
  110. uint8_t message_type:2;
  111. } __attribute__ ((packed));
  112. struct avdtp_single_header {
  113. uint8_t transaction:4;
  114. uint8_t packet_type:2;
  115. uint8_t message_type:2;
  116. uint8_t rfa0:2;
  117. uint8_t signal_id:6;
  118. } __attribute__ ((packed));
  119. struct avdtp_start_header {
  120. uint8_t transaction:4;
  121. uint8_t packet_type:2;
  122. uint8_t message_type:2;
  123. uint8_t no_of_packets;
  124. uint8_t rfa0:2;
  125. uint8_t signal_id:6;
  126. } __attribute__ ((packed));
  127. struct avdtp_continue_header {
  128. uint8_t transaction:4;
  129. uint8_t packet_type:2;
  130. uint8_t message_type:2;
  131. } __attribute__ ((packed));
  132. struct seid_info {
  133. uint8_t seid:6;
  134. uint8_t inuse:1;
  135. uint8_t rfa0:1;
  136. uint8_t media_type:4;
  137. uint8_t type:1;
  138. uint8_t rfa2:3;
  139. } __attribute__ ((packed));
  140. struct seid {
  141. uint8_t seid:6;
  142. uint8_t rfa0:2;
  143. } __attribute__ ((packed));
  144. #else
  145. #error "Unknown byte order"
  146. #endif
  147. /* packets */
  148. struct discover_resp {
  149. struct seid_info seps[0];
  150. } __attribute__ ((packed));
  151. struct getcap_resp {
  152. uint8_t caps[0];
  153. } __attribute__ ((packed));
  154. struct start_req {
  155. struct seid first_seid;
  156. struct seid other_seids[0];
  157. } __attribute__ ((packed));
  158. struct suspend_req {
  159. struct seid first_seid;
  160. struct seid other_seids[0];
  161. } __attribute__ ((packed));
  162. struct seid_rej {
  163. uint8_t error;
  164. } __attribute__ ((packed));
  165. struct conf_rej {
  166. uint8_t category;
  167. uint8_t error;
  168. } __attribute__ ((packed));
  169. #if __BYTE_ORDER == __LITTLE_ENDIAN
  170. struct seid_req {
  171. uint8_t rfa0:2;
  172. uint8_t acp_seid:6;
  173. } __attribute__ ((packed));
  174. struct setconf_req {
  175. uint8_t rfa0:2;
  176. uint8_t acp_seid:6;
  177. uint8_t rfa1:2;
  178. uint8_t int_seid:6;
  179. uint8_t caps[0];
  180. } __attribute__ ((packed));
  181. struct stream_rej {
  182. uint8_t rfa0:2;
  183. uint8_t acp_seid:6;
  184. uint8_t error;
  185. } __attribute__ ((packed));
  186. struct reconf_req {
  187. uint8_t rfa0:2;
  188. uint8_t acp_seid:6;
  189. uint8_t serv_cap;
  190. uint8_t serv_cap_len;
  191. uint8_t caps[0];
  192. } __attribute__ ((packed));
  193. struct delay_req {
  194. uint8_t rfa0:2;
  195. uint8_t acp_seid:6;
  196. uint16_t delay;
  197. } __attribute__ ((packed));
  198. #elif __BYTE_ORDER == __BIG_ENDIAN
  199. struct seid_req {
  200. uint8_t acp_seid:6;
  201. uint8_t rfa0:2;
  202. } __attribute__ ((packed));
  203. struct setconf_req {
  204. uint8_t acp_seid:6;
  205. uint8_t rfa0:2;
  206. uint8_t int_seid:6;
  207. uint8_t rfa1:2;
  208. uint8_t caps[0];
  209. } __attribute__ ((packed));
  210. struct stream_rej {
  211. uint8_t acp_seid:6;
  212. uint8_t rfa0:2;
  213. uint8_t error;
  214. } __attribute__ ((packed));
  215. struct reconf_req {
  216. uint8_t acp_seid:6;
  217. uint8_t rfa0:2;
  218. uint8_t serv_cap;
  219. uint8_t serv_cap_len;
  220. uint8_t caps[0];
  221. } __attribute__ ((packed));
  222. struct delay_req {
  223. uint8_t acp_seid:6;
  224. uint8_t rfa0:2;
  225. uint16_t delay;
  226. } __attribute__ ((packed));
  227. #else
  228. #error "Unknown byte order"
  229. #endif
  230. struct in_buf {
  231. gboolean active;
  232. int no_of_packets;
  233. uint8_t transaction;
  234. uint8_t message_type;
  235. uint8_t signal_id;
  236. uint8_t buf[1024];
  237. uint8_t data_size;
  238. };
  239. struct pending_req {
  240. uint8_t transaction;
  241. uint8_t signal_id;
  242. void *data;
  243. size_t data_size;
  244. struct avdtp_stream *stream; /* Set if the request targeted a stream */
  245. unsigned int timeout;
  246. gboolean collided;
  247. };
  248. struct avdtp_remote_sep {
  249. uint8_t seid;
  250. uint8_t type;
  251. uint8_t media_type;
  252. struct avdtp_service_capability *codec;
  253. gboolean delay_reporting;
  254. bool discovered;
  255. GSList *caps; /* of type struct avdtp_service_capability */
  256. struct avdtp_stream *stream;
  257. avdtp_remote_sep_destroy_t destroy;
  258. void *user_data;
  259. };
  260. struct avdtp_local_sep {
  261. avdtp_state_t state;
  262. struct avdtp_stream *stream;
  263. struct seid_info info;
  264. uint8_t codec;
  265. gboolean delay_reporting;
  266. GSList *caps;
  267. struct avdtp_sep_ind *ind;
  268. struct avdtp_sep_cfm *cfm;
  269. void *user_data;
  270. };
  271. struct stream_callback {
  272. avdtp_stream_state_cb cb;
  273. void *user_data;
  274. unsigned int id;
  275. };
  276. struct avdtp_state_callback {
  277. avdtp_session_state_cb cb;
  278. struct btd_device *dev;
  279. unsigned int id;
  280. void *user_data;
  281. };
  282. struct discover_callback {
  283. unsigned int id;
  284. avdtp_discover_cb_t cb;
  285. void *user_data;
  286. };
  287. struct avdtp_stream {
  288. GIOChannel *io;
  289. uint16_t imtu;
  290. uint16_t omtu;
  291. struct avdtp *session;
  292. struct avdtp_local_sep *lsep;
  293. uint8_t rseid;
  294. GSList *caps;
  295. GSList *callbacks;
  296. struct avdtp_service_capability *codec;
  297. guint io_id; /* Transport GSource ID */
  298. unsigned int timer; /* Waiting for other side to close or open
  299. * the transport channel */
  300. gboolean open_acp; /* If we are in ACT role for Open */
  301. gboolean close_int; /* If we are in INT role for Close */
  302. gboolean abort_int; /* If we are in INT role for Abort */
  303. unsigned int start_timer; /* Wait START command timer */
  304. gboolean delay_reporting;
  305. uint16_t delay; /* AVDTP 1.3 Delay Reporting feature */
  306. gboolean starting; /* only valid while sep state == OPEN */
  307. };
  308. /* Structure describing an AVDTP connection between two devices */
  309. struct avdtp {
  310. unsigned int ref;
  311. uint16_t version;
  312. struct queue *lseps;
  313. struct btd_device *device;
  314. avdtp_session_state_t state;
  315. GIOChannel *io;
  316. guint io_id;
  317. GSList *seps; /* Elements of type struct avdtp_remote_sep * */
  318. GSList *streams; /* Elements of type struct avdtp_stream * */
  319. GSList *req_queue; /* Elements of type struct pending_req * */
  320. GSList *prio_queue; /* Same as req_queue but is processed before it */
  321. struct avdtp_stream *pending_open;
  322. GIOChannel *pending_open_io;
  323. uint32_t phy;
  324. uint16_t imtu;
  325. uint16_t omtu;
  326. struct in_buf in;
  327. char *buf;
  328. struct discover_callback *discover;
  329. struct pending_req *req;
  330. unsigned int dc_timer;
  331. int dc_timeout;
  332. /* Attempt stream setup instead of disconnecting */
  333. gboolean stream_setup;
  334. };
  335. static GSList *state_callbacks = NULL;
  336. static int send_request(struct avdtp *session, gboolean priority,
  337. struct avdtp_stream *stream, uint8_t signal_id,
  338. void *buffer, size_t size);
  339. static gboolean avdtp_parse_resp(struct avdtp *session,
  340. struct avdtp_stream *stream,
  341. uint8_t transaction, uint8_t signal_id,
  342. void *buf, int size);
  343. static gboolean avdtp_parse_rej(struct avdtp *session,
  344. struct avdtp_stream *stream,
  345. uint8_t transaction, uint8_t signal_id,
  346. void *buf, int size);
  347. static int process_queue(struct avdtp *session);
  348. static void avdtp_sep_set_state(struct avdtp *session,
  349. struct avdtp_local_sep *sep,
  350. avdtp_state_t state);
  351. static const char *avdtp_statestr(avdtp_state_t state)
  352. {
  353. switch (state) {
  354. case AVDTP_STATE_IDLE:
  355. return "IDLE";
  356. case AVDTP_STATE_CONFIGURED:
  357. return "CONFIGURED";
  358. case AVDTP_STATE_OPEN:
  359. return "OPEN";
  360. case AVDTP_STATE_STREAMING:
  361. return "STREAMING";
  362. case AVDTP_STATE_CLOSING:
  363. return "CLOSING";
  364. case AVDTP_STATE_ABORTING:
  365. return "ABORTING";
  366. default:
  367. return "<unknown state>";
  368. }
  369. }
  370. static gboolean try_send(int sk, void *data, size_t len)
  371. {
  372. int err;
  373. do {
  374. err = send(sk, data, len, 0);
  375. } while (err < 0 && errno == EINTR);
  376. if (err < 0) {
  377. error("send: %s (%d)", strerror(errno), errno);
  378. return FALSE;
  379. } else if ((size_t) err != len) {
  380. error("try_send: complete buffer not sent (%d/%zu bytes)",
  381. err, len);
  382. return FALSE;
  383. }
  384. return TRUE;
  385. }
  386. static gboolean avdtp_send(struct avdtp *session, uint8_t transaction,
  387. uint8_t message_type, uint8_t signal_id,
  388. void *data, size_t len)
  389. {
  390. unsigned int cont_fragments, sent;
  391. struct avdtp_start_header start;
  392. struct avdtp_continue_header cont;
  393. int sock;
  394. if (session->io == NULL) {
  395. error("avdtp_send: session is closed");
  396. return FALSE;
  397. }
  398. sock = g_io_channel_unix_get_fd(session->io);
  399. /* Single packet - no fragmentation */
  400. if (sizeof(struct avdtp_single_header) + len <= session->omtu) {
  401. struct avdtp_single_header single;
  402. memset(&single, 0, sizeof(single));
  403. single.transaction = transaction;
  404. single.packet_type = AVDTP_PKT_TYPE_SINGLE;
  405. single.message_type = message_type;
  406. single.signal_id = signal_id;
  407. memcpy(session->buf, &single, sizeof(single));
  408. memcpy(session->buf + sizeof(single), data, len);
  409. return try_send(sock, session->buf, sizeof(single) + len);
  410. }
  411. /* Check if there is enough space to start packet */
  412. if (session->omtu < sizeof(start)) {
  413. error("No enough space to fragment packet");
  414. return FALSE;
  415. }
  416. /* Count the number of needed fragments */
  417. cont_fragments = (len - (session->omtu - sizeof(start))) /
  418. (session->omtu - sizeof(cont)) + 1;
  419. DBG("%zu bytes split into %d fragments", len, cont_fragments + 1);
  420. /* Send the start packet */
  421. memset(&start, 0, sizeof(start));
  422. start.transaction = transaction;
  423. start.packet_type = AVDTP_PKT_TYPE_START;
  424. start.message_type = message_type;
  425. start.no_of_packets = cont_fragments + 1;
  426. start.signal_id = signal_id;
  427. memcpy(session->buf, &start, sizeof(start));
  428. memcpy(session->buf + sizeof(start), data,
  429. session->omtu - sizeof(start));
  430. if (!try_send(sock, session->buf, session->omtu))
  431. return FALSE;
  432. DBG("first packet with %zu bytes sent", session->omtu - sizeof(start));
  433. sent = session->omtu - sizeof(start);
  434. /* Send the continue fragments and the end packet */
  435. while (sent < len) {
  436. int left, to_copy;
  437. left = len - sent;
  438. if (left + sizeof(cont) > session->omtu) {
  439. cont.packet_type = AVDTP_PKT_TYPE_CONTINUE;
  440. to_copy = session->omtu - sizeof(cont);
  441. DBG("sending continue with %d bytes", to_copy);
  442. } else {
  443. cont.packet_type = AVDTP_PKT_TYPE_END;
  444. to_copy = left;
  445. DBG("sending end with %d bytes", to_copy);
  446. }
  447. cont.transaction = transaction;
  448. cont.message_type = message_type;
  449. memcpy(session->buf, &cont, sizeof(cont));
  450. memcpy(session->buf + sizeof(cont), data + sent, to_copy);
  451. if (!try_send(sock, session->buf, to_copy + sizeof(cont)))
  452. return FALSE;
  453. sent += to_copy;
  454. }
  455. return TRUE;
  456. }
  457. static void pending_req_free(void *data)
  458. {
  459. struct pending_req *req = data;
  460. if (req->timeout)
  461. timeout_remove(req->timeout);
  462. g_free(req->data);
  463. g_free(req);
  464. }
  465. static void close_stream(struct avdtp_stream *stream)
  466. {
  467. int sock;
  468. if (stream->io == NULL)
  469. return;
  470. sock = g_io_channel_unix_get_fd(stream->io);
  471. shutdown(sock, SHUT_RDWR);
  472. g_io_channel_shutdown(stream->io, FALSE, NULL);
  473. g_io_channel_unref(stream->io);
  474. stream->io = NULL;
  475. }
  476. static bool stream_close_timeout(gpointer user_data)
  477. {
  478. struct avdtp_stream *stream = user_data;
  479. DBG("Timed out waiting for peer to close the transport channel");
  480. stream->timer = 0;
  481. close_stream(stream);
  482. return FALSE;
  483. }
  484. static bool stream_open_timeout(gpointer user_data)
  485. {
  486. struct avdtp_stream *stream = user_data;
  487. DBG("Timed out waiting for peer to open the transport channel");
  488. stream->timer = 0;
  489. stream->session->pending_open = NULL;
  490. if (stream->session->pending_open_io) {
  491. g_io_channel_unref(stream->session->pending_open_io);
  492. stream->session->pending_open_io = NULL;
  493. }
  494. avdtp_abort(stream->session, stream);
  495. return FALSE;
  496. }
  497. static void stream_set_timer(struct avdtp_stream *stream, guint timeout,
  498. timeout_func_t func)
  499. {
  500. if (stream->timer)
  501. timeout_remove(stream->timer);
  502. stream->timer = timeout_add_seconds(timeout, func, stream, NULL);
  503. }
  504. static void stream_set_pending_open(struct avdtp_stream *stream, GIOChannel *io)
  505. {
  506. stream->open_acp = TRUE;
  507. stream->session->pending_open = stream;
  508. stream->session->pending_open_io = io;
  509. stream_set_timer(stream, REQ_TIMEOUT, stream_open_timeout);
  510. }
  511. void avdtp_error_init(struct avdtp_error *err, uint8_t category, int id)
  512. {
  513. err->category = category;
  514. if (category == AVDTP_ERRNO)
  515. err->err.posix_errno = id;
  516. else
  517. err->err.error_code = id;
  518. }
  519. uint8_t avdtp_error_category(struct avdtp_error *err)
  520. {
  521. return err->category;
  522. }
  523. int avdtp_error_error_code(struct avdtp_error *err)
  524. {
  525. assert(err->category != AVDTP_ERRNO);
  526. return err->err.error_code;
  527. }
  528. int avdtp_error_posix_errno(struct avdtp_error *err)
  529. {
  530. assert(err->category == AVDTP_ERRNO);
  531. return err->err.posix_errno;
  532. }
  533. static struct avdtp_stream *find_stream_by_rseid(struct avdtp *session,
  534. uint8_t rseid)
  535. {
  536. GSList *l;
  537. for (l = session->streams; l != NULL; l = g_slist_next(l)) {
  538. struct avdtp_stream *stream = l->data;
  539. if (stream->rseid == rseid)
  540. return stream;
  541. }
  542. return NULL;
  543. }
  544. static struct avdtp_remote_sep *find_remote_sep(GSList *seps, uint8_t seid)
  545. {
  546. GSList *l;
  547. for (l = seps; l != NULL; l = g_slist_next(l)) {
  548. struct avdtp_remote_sep *sep = l->data;
  549. if (sep->seid == seid)
  550. return sep;
  551. }
  552. return NULL;
  553. }
  554. static void avdtp_set_state(struct avdtp *session,
  555. avdtp_session_state_t new_state)
  556. {
  557. GSList *l;
  558. avdtp_session_state_t old_state = session->state;
  559. session->state = new_state;
  560. for (l = state_callbacks; l != NULL;) {
  561. struct avdtp_state_callback *cb = l->data;
  562. l = g_slist_next(l);
  563. if (session->device != cb->dev)
  564. continue;
  565. cb->cb(cb->dev, session, old_state, new_state, cb->user_data);
  566. }
  567. }
  568. static void stream_free(void *data)
  569. {
  570. struct avdtp_stream *stream = data;
  571. struct avdtp_remote_sep *rsep;
  572. stream->lsep->info.inuse = 0;
  573. stream->lsep->stream = NULL;
  574. rsep = find_remote_sep(stream->session->seps, stream->rseid);
  575. if (rsep)
  576. rsep->stream = NULL;
  577. if (stream->timer)
  578. timeout_remove(stream->timer);
  579. if (stream->io)
  580. close_stream(stream);
  581. if (stream->io_id)
  582. g_source_remove(stream->io_id);
  583. g_slist_free_full(stream->callbacks, g_free);
  584. g_slist_free_full(stream->caps, g_free);
  585. g_free(stream);
  586. }
  587. static gboolean transport_cb(GIOChannel *chan, GIOCondition cond,
  588. gpointer data)
  589. {
  590. struct avdtp_stream *stream = data;
  591. struct avdtp_local_sep *sep = stream->lsep;
  592. if (stream->close_int && sep->cfm && sep->cfm->close)
  593. sep->cfm->close(stream->session, sep, stream, NULL,
  594. sep->user_data);
  595. if (!(cond & G_IO_NVAL))
  596. close_stream(stream);
  597. stream->io_id = 0;
  598. if (!stream->abort_int)
  599. avdtp_sep_set_state(stream->session, sep, AVDTP_STATE_IDLE);
  600. return FALSE;
  601. }
  602. static int get_send_buffer_size(int sk)
  603. {
  604. int size;
  605. socklen_t optlen = sizeof(size);
  606. if (getsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, &optlen) < 0) {
  607. int err = -errno;
  608. error("getsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
  609. -err);
  610. return err;
  611. }
  612. /*
  613. * Doubled value is returned by getsockopt since kernel uses that
  614. * space for its own purposes (see man 7 socket, bookkeeping overhead
  615. * for SO_SNDBUF).
  616. */
  617. return size / 2;
  618. }
  619. static int set_send_buffer_size(int sk, int size)
  620. {
  621. socklen_t optlen = sizeof(size);
  622. if (setsockopt(sk, SOL_SOCKET, SO_SNDBUF, &size, optlen) < 0) {
  623. int err = -errno;
  624. error("setsockopt(SO_SNDBUF) failed: %s (%d)", strerror(-err),
  625. -err);
  626. return err;
  627. }
  628. return 0;
  629. }
  630. static void handle_transport_connect(struct avdtp *session, GIOChannel *io,
  631. uint16_t imtu, uint16_t omtu)
  632. {
  633. struct avdtp_stream *stream = session->pending_open;
  634. struct avdtp_local_sep *sep = stream->lsep;
  635. int sk, buf_size, min_buf_size;
  636. GError *err = NULL;
  637. session->pending_open = NULL;
  638. if (stream->timer) {
  639. timeout_remove(stream->timer);
  640. stream->timer = 0;
  641. }
  642. if (io == NULL) {
  643. if (!stream->open_acp && sep->cfm && sep->cfm->open) {
  644. struct avdtp_error err;
  645. avdtp_error_init(&err, AVDTP_ERRNO, EIO);
  646. sep->cfm->open(session, sep, NULL, &err,
  647. sep->user_data);
  648. }
  649. return;
  650. }
  651. if (stream->io == NULL)
  652. stream->io = g_io_channel_ref(io);
  653. stream->omtu = omtu;
  654. stream->imtu = imtu;
  655. /* Apply special settings only if local SEP is of type SRC */
  656. if (sep->info.type != AVDTP_SEP_TYPE_SOURCE)
  657. goto proceed;
  658. bt_io_set(stream->io, &err, BT_IO_OPT_FLUSHABLE, TRUE,
  659. BT_IO_OPT_INVALID);
  660. if (err != NULL) {
  661. error("Enabling flushable packets failed: %s", err->message);
  662. g_error_free(err);
  663. } else
  664. DBG("Flushable packets enabled");
  665. sk = g_io_channel_unix_get_fd(stream->io);
  666. buf_size = get_send_buffer_size(sk);
  667. if (buf_size < 0)
  668. goto proceed;
  669. DBG("sk %d, omtu %d, send buffer size %d", sk, omtu, buf_size);
  670. min_buf_size = omtu * 2;
  671. if (buf_size < min_buf_size) {
  672. DBG("send buffer size to be increassed to %d",
  673. min_buf_size);
  674. set_send_buffer_size(sk, min_buf_size);
  675. }
  676. proceed:
  677. if (!stream->open_acp && sep->cfm && sep->cfm->open)
  678. sep->cfm->open(session, sep, stream, NULL, sep->user_data);
  679. avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
  680. stream->io_id = g_io_add_watch(io, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
  681. (GIOFunc) transport_cb, stream);
  682. /* Release pending IO */
  683. if (session->pending_open_io) {
  684. g_io_channel_unref(session->pending_open_io);
  685. session->pending_open_io = NULL;
  686. }
  687. }
  688. static int pending_req_cmp(gconstpointer a, gconstpointer b)
  689. {
  690. const struct pending_req *req = a;
  691. const struct avdtp_stream *stream = b;
  692. if (req->stream == stream)
  693. return 0;
  694. return -1;
  695. }
  696. static void cleanup_queue(struct avdtp *session, struct avdtp_stream *stream)
  697. {
  698. GSList *l;
  699. struct pending_req *req;
  700. while ((l = g_slist_find_custom(session->prio_queue, stream,
  701. pending_req_cmp))) {
  702. req = l->data;
  703. pending_req_free(req);
  704. session->prio_queue = g_slist_remove(session->prio_queue, req);
  705. }
  706. while ((l = g_slist_find_custom(session->req_queue, stream,
  707. pending_req_cmp))) {
  708. req = l->data;
  709. pending_req_free(req);
  710. session->req_queue = g_slist_remove(session->req_queue, req);
  711. }
  712. }
  713. static void handle_unanswered_req(struct avdtp *session,
  714. struct avdtp_stream *stream)
  715. {
  716. struct pending_req *req;
  717. struct avdtp_local_sep *lsep;
  718. struct avdtp_error err;
  719. if (session->req->signal_id == AVDTP_ABORT) {
  720. /* Avoid freeing the Abort request here */
  721. DBG("handle_unanswered_req: Abort req, returning");
  722. session->req->stream = NULL;
  723. return;
  724. }
  725. req = session->req;
  726. session->req = NULL;
  727. avdtp_error_init(&err, AVDTP_ERRNO, EIO);
  728. lsep = stream->lsep;
  729. switch (req->signal_id) {
  730. case AVDTP_RECONFIGURE:
  731. error("No reply to Reconfigure request");
  732. if (lsep && lsep->cfm && lsep->cfm->reconfigure)
  733. lsep->cfm->reconfigure(session, lsep, stream, &err,
  734. lsep->user_data);
  735. break;
  736. case AVDTP_OPEN:
  737. error("No reply to Open request");
  738. if (lsep && lsep->cfm && lsep->cfm->open)
  739. lsep->cfm->open(session, lsep, stream, &err,
  740. lsep->user_data);
  741. break;
  742. case AVDTP_START:
  743. error("No reply to Start request");
  744. if (lsep && lsep->cfm && lsep->cfm->start)
  745. lsep->cfm->start(session, lsep, stream, &err,
  746. lsep->user_data);
  747. break;
  748. case AVDTP_SUSPEND:
  749. error("No reply to Suspend request");
  750. if (lsep && lsep->cfm && lsep->cfm->suspend)
  751. lsep->cfm->suspend(session, lsep, stream, &err,
  752. lsep->user_data);
  753. break;
  754. case AVDTP_CLOSE:
  755. error("No reply to Close request");
  756. if (lsep && lsep->cfm && lsep->cfm->close)
  757. lsep->cfm->close(session, lsep, stream, &err,
  758. lsep->user_data);
  759. break;
  760. case AVDTP_SET_CONFIGURATION:
  761. error("No reply to SetConfiguration request");
  762. if (lsep && lsep->cfm && lsep->cfm->set_configuration)
  763. lsep->cfm->set_configuration(session, lsep, stream,
  764. &err, lsep->user_data);
  765. }
  766. pending_req_free(req);
  767. }
  768. static void avdtp_sep_set_state(struct avdtp *session,
  769. struct avdtp_local_sep *sep,
  770. avdtp_state_t state)
  771. {
  772. struct avdtp_stream *stream = sep->stream;
  773. avdtp_state_t old_state;
  774. struct avdtp_error err, *err_ptr = NULL;
  775. GSList *l;
  776. if (!stream) {
  777. error("Error changing sep state: stream not available");
  778. return;
  779. }
  780. if (sep->state == state) {
  781. avdtp_error_init(&err, AVDTP_ERRNO, EIO);
  782. DBG("stream state change failed: %s", avdtp_strerror(&err));
  783. err_ptr = &err;
  784. } else {
  785. err_ptr = NULL;
  786. DBG("stream state changed: %s -> %s",
  787. avdtp_statestr(sep->state),
  788. avdtp_statestr(state));
  789. }
  790. old_state = sep->state;
  791. sep->state = state;
  792. switch (state) {
  793. case AVDTP_STATE_CONFIGURED:
  794. if (sep->info.type == AVDTP_SEP_TYPE_SINK)
  795. avdtp_delay_report(session, stream, stream->delay);
  796. break;
  797. case AVDTP_STATE_OPEN:
  798. stream->starting = FALSE;
  799. break;
  800. case AVDTP_STATE_STREAMING:
  801. if (stream->start_timer) {
  802. timeout_remove(stream->start_timer);
  803. stream->start_timer = 0;
  804. }
  805. stream->open_acp = FALSE;
  806. break;
  807. case AVDTP_STATE_CLOSING:
  808. case AVDTP_STATE_ABORTING:
  809. if (stream->start_timer) {
  810. timeout_remove(stream->start_timer);
  811. stream->start_timer = 0;
  812. }
  813. break;
  814. case AVDTP_STATE_IDLE:
  815. if (stream->start_timer) {
  816. timeout_remove(stream->start_timer);
  817. stream->start_timer = 0;
  818. }
  819. if (session->pending_open == stream)
  820. handle_transport_connect(session, NULL, 0, 0);
  821. if (session->req && session->req->stream == stream)
  822. handle_unanswered_req(session, stream);
  823. /* Remove pending commands for this stream from the queue */
  824. cleanup_queue(session, stream);
  825. session->streams = g_slist_remove(session->streams, stream);
  826. break;
  827. default:
  828. break;
  829. }
  830. l = stream->callbacks;
  831. while (l != NULL) {
  832. struct stream_callback *cb = l->data;
  833. l = g_slist_next(l);
  834. cb->cb(stream, old_state, state, err_ptr, cb->user_data);
  835. }
  836. if (state == AVDTP_STATE_IDLE)
  837. stream_free(stream);
  838. }
  839. static void sep_free(gpointer data)
  840. {
  841. struct avdtp_remote_sep *sep = data;
  842. if (sep->destroy)
  843. sep->destroy(sep->user_data);
  844. g_slist_free_full(sep->caps, g_free);
  845. g_free(sep);
  846. }
  847. static void remove_disappeared(void *data, void *user_data)
  848. {
  849. struct avdtp_remote_sep *sep = data;
  850. struct avdtp *session = user_data;
  851. if (sep->discovered)
  852. return;
  853. DBG("seid %d disappeared", sep->seid);
  854. session->seps = g_slist_remove(session->seps, sep);
  855. sep_free(sep);
  856. }
  857. static void finalize_discovery(struct avdtp *session, int err)
  858. {
  859. struct discover_callback *discover = session->discover;
  860. struct avdtp_error avdtp_err;
  861. if (!discover)
  862. return;
  863. avdtp_error_init(&avdtp_err, AVDTP_ERRNO, err);
  864. if (discover->id > 0)
  865. g_source_remove(discover->id);
  866. if (!err)
  867. g_slist_foreach(session->seps, remove_disappeared, session);
  868. if (discover->cb)
  869. discover->cb(session, session->seps, err ? &avdtp_err : NULL,
  870. discover->user_data);
  871. g_free(discover);
  872. session->discover = NULL;
  873. }
  874. static void release_stream(struct avdtp_stream *stream, struct avdtp *session)
  875. {
  876. struct avdtp_local_sep *sep = stream->lsep;
  877. if (sep->cfm && sep->cfm->abort &&
  878. (sep->state != AVDTP_STATE_ABORTING ||
  879. stream->abort_int))
  880. sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
  881. avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
  882. }
  883. static void remove_disconnect_timer(struct avdtp *session)
  884. {
  885. if (!session->dc_timer)
  886. return;
  887. timeout_remove(session->dc_timer);
  888. session->dc_timer = 0;
  889. session->stream_setup = FALSE;
  890. /* Release disconnect timer reference */
  891. avdtp_unref(session);
  892. }
  893. static void avdtp_free(void *data)
  894. {
  895. struct avdtp *session = data;
  896. DBG("%p", session);
  897. g_slist_free_full(session->streams, stream_free);
  898. if (session->io) {
  899. g_io_channel_shutdown(session->io, FALSE, NULL);
  900. g_io_channel_unref(session->io);
  901. }
  902. if (session->io_id) {
  903. g_source_remove(session->io_id);
  904. session->io_id = 0;
  905. }
  906. if (session->req)
  907. pending_req_free(session->req);
  908. g_slist_free_full(session->req_queue, pending_req_free);
  909. g_slist_free_full(session->prio_queue, pending_req_free);
  910. g_slist_free_full(session->seps, sep_free);
  911. g_free(session->buf);
  912. btd_device_unref(session->device);
  913. g_free(session);
  914. }
  915. static void connection_lost(struct avdtp *session, int err)
  916. {
  917. char address[18];
  918. session = avdtp_ref(session);
  919. ba2str(device_get_address(session->device), address);
  920. DBG("Disconnected from %s", address);
  921. g_slist_foreach(session->streams, (GFunc) release_stream, session);
  922. session->streams = NULL;
  923. finalize_discovery(session, err);
  924. avdtp_set_state(session, AVDTP_SESSION_STATE_DISCONNECTED);
  925. avdtp_unref(session);
  926. }
  927. static bool disconnect_timeout(gpointer user_data)
  928. {
  929. struct avdtp *session = user_data;
  930. struct btd_service *service;
  931. gboolean stream_setup;
  932. session->dc_timer = 0;
  933. stream_setup = session->stream_setup;
  934. session->stream_setup = FALSE;
  935. service = btd_device_get_service(session->device, A2DP_SINK_UUID);
  936. if (service && stream_setup) {
  937. sink_setup_stream(service, session);
  938. goto done;
  939. }
  940. service = btd_device_get_service(session->device, A2DP_SOURCE_UUID);
  941. if (service && stream_setup) {
  942. source_setup_stream(service, session);
  943. goto done;
  944. }
  945. connection_lost(session, ETIMEDOUT);
  946. done:
  947. /* Release disconnect timer reference */
  948. avdtp_unref(session);
  949. return FALSE;
  950. }
  951. static void set_disconnect_timer(struct avdtp *session)
  952. {
  953. /* Take a ref while disconnect timer is active */
  954. avdtp_ref(session);
  955. DBG("timeout %d", session->dc_timeout);
  956. session->dc_timer = timeout_add_seconds(session->dc_timeout,
  957. disconnect_timeout,
  958. session, NULL);
  959. }
  960. void avdtp_unref(struct avdtp *session)
  961. {
  962. if (!session)
  963. return;
  964. session->ref--;
  965. DBG("%p: ref=%d", session, session->ref);
  966. if (session->ref > 0)
  967. return;
  968. switch (session->state) {
  969. case AVDTP_SESSION_STATE_CONNECTED:
  970. /* Only set disconnect timer if there are local endpoints
  971. * otherwise disconnect immediately.
  972. */
  973. if (queue_isempty(session->lseps))
  974. connection_lost(session, ECONNRESET);
  975. else
  976. set_disconnect_timer(session);
  977. break;
  978. case AVDTP_SESSION_STATE_CONNECTING:
  979. connection_lost(session, ECONNABORTED);
  980. break;
  981. case AVDTP_SESSION_STATE_DISCONNECTED:
  982. default:
  983. avdtp_free(session);
  984. break;
  985. }
  986. }
  987. struct avdtp *avdtp_ref(struct avdtp *session)
  988. {
  989. session->ref++;
  990. DBG("%p: ref=%d", session, session->ref);
  991. remove_disconnect_timer(session);
  992. return session;
  993. }
  994. static bool match_by_seid(const void *data, const void *user_data)
  995. {
  996. const struct avdtp_local_sep *sep = data;
  997. uint8_t seid = PTR_TO_UINT(user_data);
  998. return sep->info.seid == seid;
  999. }
  1000. static struct avdtp_local_sep *find_local_sep_by_seid(struct avdtp *session,
  1001. uint8_t seid)
  1002. {
  1003. return queue_find(session->lseps, match_by_seid, INT_TO_PTR(seid));
  1004. }
  1005. struct avdtp_remote_sep *avdtp_find_remote_sep(struct avdtp *session,
  1006. struct avdtp_local_sep *lsep)
  1007. {
  1008. GSList *l;
  1009. if (lsep->info.inuse)
  1010. return NULL;
  1011. for (l = session->seps; l != NULL; l = g_slist_next(l)) {
  1012. struct avdtp_remote_sep *sep = l->data;
  1013. struct avdtp_service_capability *cap;
  1014. struct avdtp_media_codec_capability *codec_data;
  1015. /* Type must be different: source <-> sink */
  1016. if (sep->type == lsep->info.type)
  1017. continue;
  1018. if (sep->media_type != lsep->info.media_type)
  1019. continue;
  1020. if (!sep->codec)
  1021. continue;
  1022. cap = sep->codec;
  1023. codec_data = (void *) cap->data;
  1024. if (codec_data->media_codec_type != lsep->codec)
  1025. continue;
  1026. if (lsep->ind && lsep->ind->match_codec)
  1027. if (!lsep->ind->match_codec(session, codec_data,
  1028. lsep->user_data))
  1029. continue;
  1030. if (sep->stream == NULL)
  1031. return sep;
  1032. }
  1033. return NULL;
  1034. }
  1035. static GSList *caps_to_list(uint8_t *data, size_t size,
  1036. struct avdtp_service_capability **codec,
  1037. gboolean *delay_reporting)
  1038. {
  1039. struct avdtp_service_capability *cap;
  1040. GSList *caps;
  1041. if (delay_reporting)
  1042. *delay_reporting = FALSE;
  1043. if (size < sizeof(*cap))
  1044. return NULL;
  1045. for (caps = NULL; size >= sizeof(*cap);) {
  1046. struct avdtp_service_capability *cpy;
  1047. cap = (struct avdtp_service_capability *)data;
  1048. if (sizeof(*cap) + cap->length > size) {
  1049. error("Invalid capability data in getcap resp");
  1050. break;
  1051. }
  1052. if (cap->category == AVDTP_MEDIA_CODEC &&
  1053. cap->length < sizeof(**codec)) {
  1054. error("Invalid codec data in getcap resp");
  1055. break;
  1056. }
  1057. cpy = btd_malloc(sizeof(*cpy) + cap->length);
  1058. memcpy(cpy, cap, sizeof(*cap) + cap->length);
  1059. size -= sizeof(*cap) + cap->length;
  1060. data += sizeof(*cap) + cap->length;
  1061. caps = g_slist_append(caps, cpy);
  1062. switch (cap->category) {
  1063. case AVDTP_MEDIA_CODEC:
  1064. if (codec)
  1065. *codec = cpy;
  1066. break;
  1067. case AVDTP_DELAY_REPORTING:
  1068. if (delay_reporting)
  1069. *delay_reporting = TRUE;
  1070. break;
  1071. }
  1072. }
  1073. return caps;
  1074. }
  1075. static gboolean avdtp_unknown_cmd(struct avdtp *session, uint8_t transaction,
  1076. uint8_t signal_id)
  1077. {
  1078. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_GEN_REJECT,
  1079. signal_id, NULL, 0);
  1080. }
  1081. static void copy_seps(void *data, void *user_data)
  1082. {
  1083. struct avdtp_local_sep *sep = data;
  1084. struct seid_info **p = user_data;
  1085. memcpy(*p, &sep->info, sizeof(struct seid_info));
  1086. *p = *p + 1;
  1087. }
  1088. static gboolean avdtp_discover_cmd(struct avdtp *session, uint8_t transaction,
  1089. void *buf, int size)
  1090. {
  1091. unsigned int rsp_size, sep_count;
  1092. struct seid_info *seps, *p;
  1093. gboolean ret;
  1094. sep_count = queue_length(session->lseps);
  1095. if (sep_count == 0) {
  1096. uint8_t err = AVDTP_NOT_SUPPORTED_COMMAND;
  1097. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1098. AVDTP_DISCOVER, &err, sizeof(err));
  1099. }
  1100. rsp_size = sep_count * sizeof(struct seid_info);
  1101. seps = g_new0(struct seid_info, sep_count);
  1102. p = seps;
  1103. queue_foreach(session->lseps, copy_seps, &p);
  1104. ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1105. AVDTP_DISCOVER, seps, rsp_size);
  1106. g_free(seps);
  1107. return ret;
  1108. }
  1109. static gboolean avdtp_getcap_cmd(struct avdtp *session, uint8_t transaction,
  1110. struct seid_req *req, unsigned int size,
  1111. gboolean get_all)
  1112. {
  1113. GSList *l, *caps;
  1114. struct avdtp_local_sep *sep = NULL;
  1115. unsigned int rsp_size;
  1116. uint8_t err, buf[1024], *ptr = buf;
  1117. uint8_t cmd;
  1118. cmd = get_all ? AVDTP_GET_ALL_CAPABILITIES : AVDTP_GET_CAPABILITIES;
  1119. if (size < sizeof(struct seid_req)) {
  1120. err = AVDTP_BAD_LENGTH;
  1121. goto failed;
  1122. }
  1123. sep = find_local_sep_by_seid(session, req->acp_seid);
  1124. if (!sep) {
  1125. err = AVDTP_BAD_ACP_SEID;
  1126. goto failed;
  1127. }
  1128. if (!sep->ind->get_capability(session, sep, get_all, &caps,
  1129. &err, sep->user_data))
  1130. goto failed;
  1131. for (l = caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
  1132. struct avdtp_service_capability *cap = l->data;
  1133. if (rsp_size + cap->length + 2 > sizeof(buf))
  1134. break;
  1135. memcpy(ptr, cap, cap->length + 2);
  1136. rsp_size += cap->length + 2;
  1137. ptr += cap->length + 2;
  1138. g_free(cap);
  1139. }
  1140. g_slist_free(caps);
  1141. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT, cmd,
  1142. buf, rsp_size);
  1143. failed:
  1144. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT, cmd,
  1145. &err, sizeof(err));
  1146. }
  1147. static void setconf_cb(struct avdtp *session, struct avdtp_stream *stream,
  1148. struct avdtp_error *err)
  1149. {
  1150. struct conf_rej rej;
  1151. struct avdtp_local_sep *sep;
  1152. if (err != NULL) {
  1153. rej.error = AVDTP_UNSUPPORTED_CONFIGURATION;
  1154. rej.category = err->err.error_code;
  1155. avdtp_send(session, session->in.transaction,
  1156. AVDTP_MSG_TYPE_REJECT, AVDTP_SET_CONFIGURATION,
  1157. &rej, sizeof(rej));
  1158. stream_free(stream);
  1159. return;
  1160. }
  1161. if (!avdtp_send(session, session->in.transaction, AVDTP_MSG_TYPE_ACCEPT,
  1162. AVDTP_SET_CONFIGURATION, NULL, 0)) {
  1163. stream_free(stream);
  1164. return;
  1165. }
  1166. sep = stream->lsep;
  1167. sep->stream = stream;
  1168. sep->info.inuse = 1;
  1169. session->streams = g_slist_append(session->streams, stream);
  1170. avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
  1171. }
  1172. static gboolean avdtp_setconf_cmd(struct avdtp *session, uint8_t transaction,
  1173. struct setconf_req *req, unsigned int size)
  1174. {
  1175. struct conf_rej rej;
  1176. struct avdtp_local_sep *sep;
  1177. struct avdtp_stream *stream;
  1178. uint8_t err, category = 0x00;
  1179. struct btd_service *service;
  1180. GSList *l;
  1181. if (size < sizeof(struct setconf_req)) {
  1182. error("Too short getcap request");
  1183. return FALSE;
  1184. }
  1185. sep = find_local_sep_by_seid(session, req->acp_seid);
  1186. if (!sep) {
  1187. err = AVDTP_BAD_ACP_SEID;
  1188. goto failed;
  1189. }
  1190. if (sep->stream) {
  1191. err = AVDTP_SEP_IN_USE;
  1192. goto failed;
  1193. }
  1194. switch (sep->info.type) {
  1195. case AVDTP_SEP_TYPE_SOURCE:
  1196. service = btd_device_get_service(session->device,
  1197. A2DP_SINK_UUID);
  1198. if (service == NULL) {
  1199. btd_device_add_uuid(session->device, A2DP_SINK_UUID);
  1200. service = btd_device_get_service(session->device,
  1201. A2DP_SINK_UUID);
  1202. if (service == NULL) {
  1203. error("Unable to get a audio sink object");
  1204. err = AVDTP_BAD_STATE;
  1205. goto failed;
  1206. }
  1207. }
  1208. break;
  1209. case AVDTP_SEP_TYPE_SINK:
  1210. service = btd_device_get_service(session->device,
  1211. A2DP_SOURCE_UUID);
  1212. if (service == NULL) {
  1213. btd_device_add_uuid(session->device, A2DP_SOURCE_UUID);
  1214. service = btd_device_get_service(session->device,
  1215. A2DP_SOURCE_UUID);
  1216. if (service == NULL) {
  1217. error("Unable to get a audio source object");
  1218. err = AVDTP_BAD_STATE;
  1219. goto failed;
  1220. }
  1221. }
  1222. break;
  1223. }
  1224. stream = g_new0(struct avdtp_stream, 1);
  1225. stream->session = session;
  1226. stream->lsep = sep;
  1227. stream->rseid = req->int_seid;
  1228. stream->caps = caps_to_list(req->caps,
  1229. size - sizeof(struct setconf_req),
  1230. &stream->codec,
  1231. &stream->delay_reporting);
  1232. if (!stream->caps || !stream->codec) {
  1233. err = AVDTP_UNSUPPORTED_CONFIGURATION;
  1234. category = 0x00;
  1235. goto failed_stream;
  1236. }
  1237. /* Verify that the Media Transport capability's length = 0. Reject otherwise */
  1238. for (l = stream->caps; l != NULL; l = g_slist_next(l)) {
  1239. struct avdtp_service_capability *cap = l->data;
  1240. if (cap->category == AVDTP_MEDIA_TRANSPORT && cap->length != 0) {
  1241. err = AVDTP_BAD_MEDIA_TRANSPORT_FORMAT;
  1242. goto failed_stream;
  1243. }
  1244. }
  1245. if (stream->delay_reporting && session->version < 0x0103)
  1246. session->version = 0x0103;
  1247. if (sep->ind && sep->ind->set_configuration) {
  1248. if (!sep->ind->set_configuration(session, sep, stream,
  1249. stream->caps,
  1250. setconf_cb,
  1251. sep->user_data)) {
  1252. err = AVDTP_UNSUPPORTED_CONFIGURATION;
  1253. category = 0x00;
  1254. goto failed_stream;
  1255. }
  1256. } else {
  1257. if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1258. AVDTP_SET_CONFIGURATION, NULL, 0)) {
  1259. stream_free(stream);
  1260. return FALSE;
  1261. }
  1262. sep->stream = stream;
  1263. sep->info.inuse = 1;
  1264. session->streams = g_slist_append(session->streams, stream);
  1265. avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
  1266. }
  1267. return TRUE;
  1268. failed_stream:
  1269. stream_free(stream);
  1270. failed:
  1271. rej.error = err;
  1272. rej.category = category;
  1273. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1274. AVDTP_SET_CONFIGURATION, &rej, sizeof(rej));
  1275. }
  1276. static gboolean avdtp_getconf_cmd(struct avdtp *session, uint8_t transaction,
  1277. struct seid_req *req, int size)
  1278. {
  1279. GSList *l;
  1280. struct avdtp_local_sep *sep = NULL;
  1281. int rsp_size;
  1282. uint8_t err;
  1283. uint8_t buf[1024];
  1284. uint8_t *ptr = buf;
  1285. if (size < (int) sizeof(struct seid_req)) {
  1286. error("Too short getconf request");
  1287. return FALSE;
  1288. }
  1289. memset(buf, 0, sizeof(buf));
  1290. sep = find_local_sep_by_seid(session, req->acp_seid);
  1291. if (!sep) {
  1292. err = AVDTP_BAD_ACP_SEID;
  1293. goto failed;
  1294. }
  1295. if (!sep->stream || !sep->stream->caps) {
  1296. err = AVDTP_UNSUPPORTED_CONFIGURATION;
  1297. goto failed;
  1298. }
  1299. for (l = sep->stream->caps, rsp_size = 0; l != NULL; l = g_slist_next(l)) {
  1300. struct avdtp_service_capability *cap = l->data;
  1301. if (rsp_size + cap->length + 2 > (int) sizeof(buf))
  1302. break;
  1303. memcpy(ptr, cap, cap->length + 2);
  1304. rsp_size += cap->length + 2;
  1305. ptr += cap->length + 2;
  1306. }
  1307. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1308. AVDTP_GET_CONFIGURATION, buf, rsp_size);
  1309. failed:
  1310. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1311. AVDTP_GET_CONFIGURATION, &err, sizeof(err));
  1312. }
  1313. static gboolean avdtp_reconf_cmd(struct avdtp *session, uint8_t transaction,
  1314. struct seid_req *req, int size)
  1315. {
  1316. struct conf_rej rej;
  1317. rej.error = AVDTP_NOT_SUPPORTED_COMMAND;
  1318. rej.category = 0x00;
  1319. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1320. AVDTP_RECONFIGURE, &rej, sizeof(rej));
  1321. }
  1322. static void check_seid_collision(struct pending_req *req, uint8_t id)
  1323. {
  1324. struct seid_req *seid = req->data;
  1325. if (seid->acp_seid == id)
  1326. req->collided = TRUE;
  1327. }
  1328. static void check_start_collision(struct pending_req *req, uint8_t id)
  1329. {
  1330. struct start_req *start = req->data;
  1331. struct seid *seid = &start->first_seid;
  1332. int count = 1 + req->data_size - sizeof(struct start_req);
  1333. int i;
  1334. for (i = 0; i < count; i++, seid++) {
  1335. if (seid->seid == id) {
  1336. req->collided = TRUE;
  1337. return;
  1338. }
  1339. }
  1340. }
  1341. static void check_suspend_collision(struct pending_req *req, uint8_t id)
  1342. {
  1343. struct suspend_req *suspend = req->data;
  1344. struct seid *seid = &suspend->first_seid;
  1345. int count = 1 + req->data_size - sizeof(struct suspend_req);
  1346. int i;
  1347. for (i = 0; i < count; i++, seid++) {
  1348. if (seid->seid == id) {
  1349. req->collided = TRUE;
  1350. return;
  1351. }
  1352. }
  1353. }
  1354. static void avdtp_check_collision(struct avdtp *session, uint8_t cmd,
  1355. struct avdtp_stream *stream)
  1356. {
  1357. struct pending_req *req = session->req;
  1358. if (req == NULL || (req->signal_id != cmd && cmd != AVDTP_ABORT))
  1359. return;
  1360. if (cmd == AVDTP_ABORT)
  1361. cmd = req->signal_id;
  1362. switch (cmd) {
  1363. case AVDTP_OPEN:
  1364. case AVDTP_CLOSE:
  1365. check_seid_collision(req, stream->rseid);
  1366. break;
  1367. case AVDTP_START:
  1368. check_start_collision(req, stream->rseid);
  1369. break;
  1370. case AVDTP_SUSPEND:
  1371. check_suspend_collision(req, stream->rseid);
  1372. break;
  1373. }
  1374. }
  1375. static gboolean avdtp_open_cmd(struct avdtp *session, uint8_t transaction,
  1376. struct seid_req *req, unsigned int size)
  1377. {
  1378. struct avdtp_local_sep *sep;
  1379. struct avdtp_stream *stream;
  1380. uint8_t err;
  1381. if (size < sizeof(struct seid_req)) {
  1382. error("Too short abort request");
  1383. return FALSE;
  1384. }
  1385. sep = find_local_sep_by_seid(session, req->acp_seid);
  1386. if (!sep) {
  1387. err = AVDTP_BAD_ACP_SEID;
  1388. goto failed;
  1389. }
  1390. if (sep->state != AVDTP_STATE_CONFIGURED) {
  1391. err = AVDTP_BAD_STATE;
  1392. goto failed;
  1393. }
  1394. stream = sep->stream;
  1395. /* Check if the stream is pending and there is an IO set already */
  1396. if (stream == session->pending_open && session->pending_open_io) {
  1397. handle_transport_connect(session, session->pending_open_io,
  1398. stream->imtu, stream->omtu);
  1399. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1400. AVDTP_OPEN, NULL, 0);
  1401. }
  1402. if (sep->ind && sep->ind->open && !session->pending_open) {
  1403. if (!sep->ind->open(session, sep, stream, &err,
  1404. sep->user_data))
  1405. goto failed;
  1406. }
  1407. avdtp_check_collision(session, AVDTP_OPEN, stream);
  1408. if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1409. AVDTP_OPEN, NULL, 0))
  1410. return FALSE;
  1411. if (!session->pending_open)
  1412. stream_set_pending_open(stream, NULL);
  1413. return TRUE;
  1414. failed:
  1415. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1416. AVDTP_OPEN, &err, sizeof(err));
  1417. }
  1418. static gboolean avdtp_start_cmd(struct avdtp *session, uint8_t transaction,
  1419. struct start_req *req, unsigned int size)
  1420. {
  1421. struct avdtp_local_sep *sep;
  1422. struct avdtp_stream *stream;
  1423. struct stream_rej rej;
  1424. struct seid *seid;
  1425. uint8_t err, failed_seid;
  1426. int seid_count, i;
  1427. if (size < sizeof(struct start_req)) {
  1428. error("Too short start request");
  1429. return FALSE;
  1430. }
  1431. seid_count = 1 + size - sizeof(struct start_req);
  1432. seid = &req->first_seid;
  1433. for (i = 0; i < seid_count; i++, seid++) {
  1434. failed_seid = seid->seid;
  1435. sep = find_local_sep_by_seid(session, seid->seid);
  1436. if (!sep || !sep->stream) {
  1437. err = AVDTP_BAD_ACP_SEID;
  1438. goto failed;
  1439. }
  1440. stream = sep->stream;
  1441. /* Also reject start cmd if state is not open */
  1442. if (sep->state != AVDTP_STATE_OPEN) {
  1443. err = AVDTP_BAD_STATE;
  1444. goto failed;
  1445. }
  1446. stream->starting = TRUE;
  1447. if (sep->ind && sep->ind->start) {
  1448. if (!sep->ind->start(session, sep, stream, &err,
  1449. sep->user_data))
  1450. goto failed;
  1451. }
  1452. avdtp_check_collision(session, AVDTP_START, stream);
  1453. avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
  1454. }
  1455. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1456. AVDTP_START, NULL, 0);
  1457. failed:
  1458. DBG("Rejecting (%d)", err);
  1459. memset(&rej, 0, sizeof(rej));
  1460. rej.acp_seid = failed_seid;
  1461. rej.error = err;
  1462. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1463. AVDTP_START, &rej, sizeof(rej));
  1464. }
  1465. static gboolean avdtp_close_cmd(struct avdtp *session, uint8_t transaction,
  1466. struct seid_req *req, unsigned int size)
  1467. {
  1468. struct avdtp_local_sep *sep;
  1469. struct avdtp_stream *stream;
  1470. uint8_t err;
  1471. if (size < sizeof(struct seid_req)) {
  1472. error("Too short close request");
  1473. return FALSE;
  1474. }
  1475. sep = find_local_sep_by_seid(session, req->acp_seid);
  1476. if (!sep || !sep->stream) {
  1477. err = AVDTP_BAD_ACP_SEID;
  1478. goto failed;
  1479. }
  1480. if (sep->state != AVDTP_STATE_OPEN &&
  1481. sep->state != AVDTP_STATE_STREAMING) {
  1482. err = AVDTP_BAD_STATE;
  1483. goto failed;
  1484. }
  1485. stream = sep->stream;
  1486. if (sep->ind && sep->ind->close) {
  1487. if (!sep->ind->close(session, sep, stream, &err,
  1488. sep->user_data))
  1489. goto failed;
  1490. }
  1491. avdtp_check_collision(session, AVDTP_CLOSE, stream);
  1492. avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
  1493. session->dc_timeout = DISCONNECT_TIMEOUT;
  1494. if (!avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1495. AVDTP_CLOSE, NULL, 0))
  1496. return FALSE;
  1497. stream->timer = timeout_add_seconds(REQ_TIMEOUT,
  1498. stream_close_timeout,
  1499. stream, NULL);
  1500. return TRUE;
  1501. failed:
  1502. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1503. AVDTP_CLOSE, &err, sizeof(err));
  1504. }
  1505. static gboolean avdtp_suspend_cmd(struct avdtp *session, uint8_t transaction,
  1506. struct suspend_req *req, unsigned int size)
  1507. {
  1508. struct avdtp_local_sep *sep;
  1509. struct avdtp_stream *stream;
  1510. struct stream_rej rej;
  1511. struct seid *seid;
  1512. uint8_t err, failed_seid;
  1513. int seid_count, i;
  1514. if (size < sizeof(struct suspend_req)) {
  1515. error("Too short suspend request");
  1516. return FALSE;
  1517. }
  1518. seid_count = 1 + size - sizeof(struct suspend_req);
  1519. seid = &req->first_seid;
  1520. for (i = 0; i < seid_count; i++, seid++) {
  1521. failed_seid = seid->seid;
  1522. sep = find_local_sep_by_seid(session, seid->seid);
  1523. if (!sep || !sep->stream) {
  1524. err = AVDTP_BAD_ACP_SEID;
  1525. goto failed;
  1526. }
  1527. stream = sep->stream;
  1528. if (sep->state != AVDTP_STATE_STREAMING) {
  1529. err = AVDTP_BAD_STATE;
  1530. goto failed;
  1531. }
  1532. if (sep->ind && sep->ind->suspend) {
  1533. if (!sep->ind->suspend(session, sep, stream, &err,
  1534. sep->user_data))
  1535. goto failed;
  1536. }
  1537. avdtp_check_collision(session, AVDTP_SUSPEND, stream);
  1538. avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
  1539. }
  1540. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1541. AVDTP_SUSPEND, NULL, 0);
  1542. failed:
  1543. memset(&rej, 0, sizeof(rej));
  1544. rej.acp_seid = failed_seid;
  1545. rej.error = err;
  1546. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1547. AVDTP_SUSPEND, &rej, sizeof(rej));
  1548. }
  1549. static gboolean avdtp_abort_cmd(struct avdtp *session, uint8_t transaction,
  1550. struct seid_req *req, unsigned int size)
  1551. {
  1552. struct avdtp_local_sep *sep;
  1553. uint8_t err;
  1554. gboolean ret;
  1555. if (size < sizeof(struct seid_req)) {
  1556. error("Too short abort request");
  1557. return FALSE;
  1558. }
  1559. sep = find_local_sep_by_seid(session, req->acp_seid);
  1560. if (!sep || !sep->stream)
  1561. return TRUE;
  1562. if (sep->ind && sep->ind->abort)
  1563. sep->ind->abort(session, sep, sep->stream, &err,
  1564. sep->user_data);
  1565. avdtp_check_collision(session, AVDTP_ABORT, sep->stream);
  1566. ret = avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1567. AVDTP_ABORT, NULL, 0);
  1568. if (ret) {
  1569. avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
  1570. session->dc_timeout = DISCONNECT_TIMEOUT;
  1571. }
  1572. return ret;
  1573. }
  1574. static gboolean avdtp_secctl_cmd(struct avdtp *session, uint8_t transaction,
  1575. struct seid_req *req, int size)
  1576. {
  1577. return avdtp_unknown_cmd(session, transaction, AVDTP_SECURITY_CONTROL);
  1578. }
  1579. static gboolean avdtp_delayreport_cmd(struct avdtp *session,
  1580. uint8_t transaction,
  1581. struct delay_req *req,
  1582. unsigned int size)
  1583. {
  1584. struct avdtp_local_sep *sep;
  1585. struct avdtp_stream *stream;
  1586. uint8_t err;
  1587. if (size < sizeof(struct delay_req)) {
  1588. error("Too short delay report request");
  1589. return FALSE;
  1590. }
  1591. sep = find_local_sep_by_seid(session, req->acp_seid);
  1592. if (!sep || !sep->stream) {
  1593. err = AVDTP_BAD_ACP_SEID;
  1594. goto failed;
  1595. }
  1596. stream = sep->stream;
  1597. if (sep->state != AVDTP_STATE_CONFIGURED &&
  1598. sep->state != AVDTP_STATE_OPEN &&
  1599. sep->state != AVDTP_STATE_STREAMING) {
  1600. err = AVDTP_BAD_STATE;
  1601. goto failed;
  1602. }
  1603. stream->delay = ntohs(req->delay);
  1604. if (sep->ind && sep->ind->delayreport) {
  1605. if (!sep->ind->delayreport(session, sep, stream->rseid,
  1606. stream->delay, &err,
  1607. sep->user_data))
  1608. goto failed;
  1609. }
  1610. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_ACCEPT,
  1611. AVDTP_DELAY_REPORT, NULL, 0);
  1612. failed:
  1613. return avdtp_send(session, transaction, AVDTP_MSG_TYPE_REJECT,
  1614. AVDTP_DELAY_REPORT, &err, sizeof(err));
  1615. }
  1616. static gboolean avdtp_parse_cmd(struct avdtp *session, uint8_t transaction,
  1617. uint8_t signal_id, void *buf, int size)
  1618. {
  1619. switch (signal_id) {
  1620. case AVDTP_DISCOVER:
  1621. DBG("Received DISCOVER_CMD");
  1622. return avdtp_discover_cmd(session, transaction, buf, size);
  1623. case AVDTP_GET_CAPABILITIES:
  1624. DBG("Received GET_CAPABILITIES_CMD");
  1625. return avdtp_getcap_cmd(session, transaction, buf, size,
  1626. FALSE);
  1627. case AVDTP_GET_ALL_CAPABILITIES:
  1628. DBG("Received GET_ALL_CAPABILITIES_CMD");
  1629. return avdtp_getcap_cmd(session, transaction, buf, size, TRUE);
  1630. case AVDTP_SET_CONFIGURATION:
  1631. DBG("Received SET_CONFIGURATION_CMD");
  1632. return avdtp_setconf_cmd(session, transaction, buf, size);
  1633. case AVDTP_GET_CONFIGURATION:
  1634. DBG("Received GET_CONFIGURATION_CMD");
  1635. return avdtp_getconf_cmd(session, transaction, buf, size);
  1636. case AVDTP_RECONFIGURE:
  1637. DBG("Received RECONFIGURE_CMD");
  1638. return avdtp_reconf_cmd(session, transaction, buf, size);
  1639. case AVDTP_OPEN:
  1640. DBG("Received OPEN_CMD");
  1641. return avdtp_open_cmd(session, transaction, buf, size);
  1642. case AVDTP_START:
  1643. DBG("Received START_CMD");
  1644. return avdtp_start_cmd(session, transaction, buf, size);
  1645. case AVDTP_CLOSE:
  1646. DBG("Received CLOSE_CMD");
  1647. return avdtp_close_cmd(session, transaction, buf, size);
  1648. case AVDTP_SUSPEND:
  1649. DBG("Received SUSPEND_CMD");
  1650. return avdtp_suspend_cmd(session, transaction, buf, size);
  1651. case AVDTP_ABORT:
  1652. DBG("Received ABORT_CMD");
  1653. return avdtp_abort_cmd(session, transaction, buf, size);
  1654. case AVDTP_SECURITY_CONTROL:
  1655. DBG("Received SECURITY_CONTROL_CMD");
  1656. return avdtp_secctl_cmd(session, transaction, buf, size);
  1657. case AVDTP_DELAY_REPORT:
  1658. DBG("Received DELAY_REPORT_CMD");
  1659. return avdtp_delayreport_cmd(session, transaction, buf, size);
  1660. default:
  1661. DBG("Received unknown request id %u", signal_id);
  1662. return avdtp_unknown_cmd(session, transaction, signal_id);
  1663. }
  1664. }
  1665. enum avdtp_parse_result { PARSE_ERROR, PARSE_FRAGMENT, PARSE_SUCCESS };
  1666. static enum avdtp_parse_result avdtp_parse_data(struct avdtp *session,
  1667. void *buf, size_t size)
  1668. {
  1669. struct avdtp_common_header *header = buf;
  1670. struct avdtp_single_header *single = (void *) session->buf;
  1671. struct avdtp_start_header *start = (void *) session->buf;
  1672. void *payload;
  1673. gsize payload_size;
  1674. switch (header->packet_type) {
  1675. case AVDTP_PKT_TYPE_SINGLE:
  1676. if (size < sizeof(*single)) {
  1677. error("Received too small single packet (%zu bytes)", size);
  1678. return PARSE_ERROR;
  1679. }
  1680. if (session->in.active) {
  1681. error("SINGLE: Invalid AVDTP packet fragmentation");
  1682. return PARSE_ERROR;
  1683. }
  1684. payload = session->buf + sizeof(*single);
  1685. payload_size = size - sizeof(*single);
  1686. session->in.active = TRUE;
  1687. session->in.data_size = 0;
  1688. session->in.no_of_packets = 1;
  1689. session->in.transaction = header->transaction;
  1690. session->in.message_type = header->message_type;
  1691. session->in.signal_id = single->signal_id;
  1692. break;
  1693. case AVDTP_PKT_TYPE_START:
  1694. if (size < sizeof(*start)) {
  1695. error("Received too small start packet (%zu bytes)", size);
  1696. return PARSE_ERROR;
  1697. }
  1698. if (session->in.active) {
  1699. error("START: Invalid AVDTP packet fragmentation");
  1700. return PARSE_ERROR;
  1701. }
  1702. session->in.active = TRUE;
  1703. session->in.data_size = 0;
  1704. session->in.transaction = header->transaction;
  1705. session->in.message_type = header->message_type;
  1706. session->in.no_of_packets = start->no_of_packets;
  1707. session->in.signal_id = start->signal_id;
  1708. payload = session->buf + sizeof(*start);
  1709. payload_size = size - sizeof(*start);
  1710. break;
  1711. case AVDTP_PKT_TYPE_CONTINUE:
  1712. if (size < sizeof(struct avdtp_continue_header)) {
  1713. error("Received too small continue packet (%zu bytes)",
  1714. size);
  1715. return PARSE_ERROR;
  1716. }
  1717. if (!session->in.active) {
  1718. error("CONTINUE: Invalid AVDTP packet fragmentation");
  1719. return PARSE_ERROR;
  1720. }
  1721. if (session->in.transaction != header->transaction) {
  1722. error("Continue transaction id doesn't match");
  1723. return PARSE_ERROR;
  1724. }
  1725. if (session->in.no_of_packets <= 1) {
  1726. error("Too few continue packets");
  1727. return PARSE_ERROR;
  1728. }
  1729. payload = session->buf + sizeof(struct avdtp_continue_header);
  1730. payload_size = size - sizeof(struct avdtp_continue_header);
  1731. break;
  1732. case AVDTP_PKT_TYPE_END:
  1733. if (size < sizeof(struct avdtp_continue_header)) {
  1734. error("Received too small end packet (%zu bytes)", size);
  1735. return PARSE_ERROR;
  1736. }
  1737. if (!session->in.active) {
  1738. error("END: Invalid AVDTP packet fragmentation");
  1739. return PARSE_ERROR;
  1740. }
  1741. if (session->in.transaction != header->transaction) {
  1742. error("End transaction id doesn't match");
  1743. return PARSE_ERROR;
  1744. }
  1745. if (session->in.no_of_packets > 1) {
  1746. error("Got an end packet too early");
  1747. return PARSE_ERROR;
  1748. }
  1749. payload = session->buf + sizeof(struct avdtp_continue_header);
  1750. payload_size = size - sizeof(struct avdtp_continue_header);
  1751. break;
  1752. default:
  1753. error("Invalid AVDTP packet type 0x%02X", header->packet_type);
  1754. return PARSE_ERROR;
  1755. }
  1756. if (session->in.data_size + payload_size >
  1757. sizeof(session->in.buf)) {
  1758. error("Not enough incoming buffer space!");
  1759. return PARSE_ERROR;
  1760. }
  1761. memcpy(session->in.buf + session->in.data_size, payload, payload_size);
  1762. session->in.data_size += payload_size;
  1763. if (session->in.no_of_packets > 1) {
  1764. session->in.no_of_packets--;
  1765. DBG("Received AVDTP fragment. %d to go",
  1766. session->in.no_of_packets);
  1767. return PARSE_FRAGMENT;
  1768. }
  1769. session->in.active = FALSE;
  1770. return PARSE_SUCCESS;
  1771. }
  1772. static gboolean session_cb(GIOChannel *chan, GIOCondition cond,
  1773. gpointer data)
  1774. {
  1775. struct avdtp *session = data;
  1776. struct avdtp_common_header *header;
  1777. ssize_t size;
  1778. int fd;
  1779. DBG("");
  1780. if (cond & G_IO_NVAL)
  1781. return FALSE;
  1782. header = (void *) session->buf;
  1783. if (cond & (G_IO_HUP | G_IO_ERR))
  1784. goto failed;
  1785. fd = g_io_channel_unix_get_fd(chan);
  1786. size = read(fd, session->buf, session->imtu);
  1787. if (size < 0) {
  1788. error("IO Channel read error");
  1789. goto failed;
  1790. }
  1791. if ((size_t) size < sizeof(struct avdtp_common_header)) {
  1792. error("Received too small packet (%zu bytes)", size);
  1793. goto failed;
  1794. }
  1795. switch (avdtp_parse_data(session, session->buf, size)) {
  1796. case PARSE_ERROR:
  1797. goto failed;
  1798. case PARSE_FRAGMENT:
  1799. return TRUE;
  1800. case PARSE_SUCCESS:
  1801. break;
  1802. }
  1803. if (session->in.message_type == AVDTP_MSG_TYPE_COMMAND) {
  1804. if (!avdtp_parse_cmd(session, session->in.transaction,
  1805. session->in.signal_id,
  1806. session->in.buf,
  1807. session->in.data_size)) {
  1808. error("Unable to handle command. Disconnecting");
  1809. goto failed;
  1810. }
  1811. if (session->req && session->req->collided) {
  1812. DBG("Collision detected");
  1813. goto next;
  1814. }
  1815. return TRUE;
  1816. }
  1817. if (session->req == NULL) {
  1818. error("No pending request, ignoring message");
  1819. return TRUE;
  1820. }
  1821. if (header->transaction != session->req->transaction) {
  1822. error("Transaction label doesn't match");
  1823. return TRUE;
  1824. }
  1825. if (session->in.signal_id != session->req->signal_id) {
  1826. error("Response signal doesn't match");
  1827. return TRUE;
  1828. }
  1829. timeout_remove(session->req->timeout);
  1830. session->req->timeout = 0;
  1831. switch (header->message_type) {
  1832. case AVDTP_MSG_TYPE_ACCEPT:
  1833. if (!avdtp_parse_resp(session, session->req->stream,
  1834. session->in.transaction,
  1835. session->in.signal_id,
  1836. session->in.buf,
  1837. session->in.data_size)) {
  1838. error("Unable to parse accept response");
  1839. goto failed;
  1840. }
  1841. break;
  1842. case AVDTP_MSG_TYPE_REJECT:
  1843. if (!avdtp_parse_rej(session, session->req->stream,
  1844. session->in.transaction,
  1845. session->in.signal_id,
  1846. session->in.buf,
  1847. session->in.data_size)) {
  1848. error("Unable to parse reject response");
  1849. goto failed;
  1850. }
  1851. break;
  1852. case AVDTP_MSG_TYPE_GEN_REJECT:
  1853. error("Received a General Reject message");
  1854. break;
  1855. default:
  1856. error("Unknown message type 0x%02X", header->message_type);
  1857. break;
  1858. }
  1859. next:
  1860. pending_req_free(session->req);
  1861. session->req = NULL;
  1862. process_queue(session);
  1863. return TRUE;
  1864. failed:
  1865. connection_lost(session, EIO);
  1866. return FALSE;
  1867. }
  1868. static uint16_t get_version(struct avdtp *session)
  1869. {
  1870. const sdp_record_t *rec;
  1871. sdp_list_t *protos;
  1872. sdp_data_t *proto_desc;
  1873. uint16_t ver = 0x0000;
  1874. rec = btd_device_get_record(session->device, A2DP_SINK_UUID);
  1875. if (!rec)
  1876. rec = btd_device_get_record(session->device, A2DP_SOURCE_UUID);
  1877. if (!rec)
  1878. return ver;
  1879. if (sdp_get_access_protos(rec, &protos) < 0)
  1880. return ver;
  1881. proto_desc = sdp_get_proto_desc(protos, AVDTP_UUID);
  1882. if (proto_desc && proto_desc->dtd == SDP_UINT16)
  1883. ver = proto_desc->val.uint16;
  1884. sdp_list_foreach(protos, (sdp_list_func_t) sdp_list_free, NULL);
  1885. sdp_list_free(protos, NULL);
  1886. return ver;
  1887. }
  1888. static void avdtp_connect_cb(GIOChannel *chan, GError *err, gpointer user_data)
  1889. {
  1890. struct avdtp *session = user_data;
  1891. char address[18];
  1892. int err_no = EIO;
  1893. if (err) {
  1894. err_no = err->code;
  1895. error("%s", err->message);
  1896. goto failed;
  1897. }
  1898. if (!session->io)
  1899. session->io = g_io_channel_ref(chan);
  1900. /* Check if kernel supports reading packet types */
  1901. bt_io_get(chan, NULL, BT_IO_OPT_PHY, &session->phy, BT_IO_OPT_INVALID);
  1902. bt_io_get(chan, &err,
  1903. BT_IO_OPT_OMTU, &session->omtu,
  1904. BT_IO_OPT_IMTU, &session->imtu,
  1905. BT_IO_OPT_INVALID);
  1906. if (err) {
  1907. err_no = err->code;
  1908. error("%s", err->message);
  1909. goto failed;
  1910. }
  1911. ba2str(device_get_address(session->device), address);
  1912. DBG("AVDTP: connected %s channel to %s",
  1913. session->pending_open ? "transport" : "signaling",
  1914. address);
  1915. if (session->state == AVDTP_SESSION_STATE_CONNECTING) {
  1916. DBG("AVDTP imtu=%u, omtu=%u", session->imtu, session->omtu);
  1917. session->buf = g_malloc0(MAX(session->imtu, session->omtu));
  1918. avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTED);
  1919. if (session->io_id)
  1920. g_source_remove(session->io_id);
  1921. session->io_id = g_io_add_watch(chan,
  1922. G_IO_IN | G_IO_ERR | G_IO_HUP
  1923. | G_IO_NVAL,
  1924. (GIOFunc) session_cb, session);
  1925. if (session->stream_setup)
  1926. set_disconnect_timer(session);
  1927. } else if (session->pending_open)
  1928. handle_transport_connect(session, chan, session->imtu,
  1929. session->omtu);
  1930. else
  1931. goto failed;
  1932. process_queue(session);
  1933. return;
  1934. failed:
  1935. if (session->pending_open) {
  1936. struct avdtp_stream *stream = session->pending_open;
  1937. handle_transport_connect(session, NULL, 0, 0);
  1938. if (avdtp_abort(session, stream) < 0)
  1939. avdtp_sep_set_state(session, stream->lsep,
  1940. AVDTP_STATE_IDLE);
  1941. } else
  1942. connection_lost(session, err_no);
  1943. }
  1944. struct avdtp *avdtp_new(GIOChannel *chan, struct btd_device *device,
  1945. struct queue *lseps)
  1946. {
  1947. struct avdtp *session;
  1948. session = g_new0(struct avdtp, 1);
  1949. session->device = btd_device_ref(device);
  1950. /* We don't use avdtp_set_state() here since this isn't a state change
  1951. * but just setting of the initial state */
  1952. session->state = AVDTP_SESSION_STATE_DISCONNECTED;
  1953. session->lseps = lseps;
  1954. session->version = get_version(session);
  1955. if (!chan)
  1956. return session;
  1957. avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
  1958. btd_device_add_uuid(device, ADVANCED_AUDIO_UUID);
  1959. session->io = g_io_channel_ref(chan);
  1960. session->io_id = g_io_add_watch(chan, G_IO_ERR | G_IO_HUP | G_IO_NVAL,
  1961. (GIOFunc) session_cb, session);
  1962. /* This is so that avdtp_connect_cb will know to do the right thing
  1963. * with respect to the disconnect timer */
  1964. session->stream_setup = TRUE;
  1965. session->dc_timeout = DISCONNECT_TIMEOUT;
  1966. avdtp_connect_cb(chan, NULL, session);
  1967. return session;
  1968. }
  1969. uint16_t avdtp_get_version(struct avdtp *session)
  1970. {
  1971. return session->version;
  1972. }
  1973. static GIOChannel *l2cap_connect(struct avdtp *session, BtIOMode mode)
  1974. {
  1975. GError *err = NULL;
  1976. GIOChannel *io;
  1977. const bdaddr_t *src;
  1978. src = btd_adapter_get_address(device_get_adapter(session->device));
  1979. if (session->phy)
  1980. io = bt_io_connect(avdtp_connect_cb, session,
  1981. NULL, &err,
  1982. BT_IO_OPT_SOURCE_BDADDR, src,
  1983. BT_IO_OPT_DEST_BDADDR,
  1984. device_get_address(session->device),
  1985. BT_IO_OPT_PSM, AVDTP_PSM,
  1986. BT_IO_OPT_MODE, mode,
  1987. BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
  1988. /* Set Input MTU to 0 to auto-tune */
  1989. BT_IO_OPT_IMTU, 0,
  1990. BT_IO_OPT_INVALID);
  1991. else
  1992. io = bt_io_connect(avdtp_connect_cb, session,
  1993. NULL, &err,
  1994. BT_IO_OPT_SOURCE_BDADDR, src,
  1995. BT_IO_OPT_DEST_BDADDR,
  1996. device_get_address(session->device),
  1997. BT_IO_OPT_PSM, AVDTP_PSM,
  1998. BT_IO_OPT_MODE, mode,
  1999. BT_IO_OPT_SEC_LEVEL, BT_IO_SEC_MEDIUM,
  2000. BT_IO_OPT_INVALID);
  2001. if (!io) {
  2002. error("%s", err->message);
  2003. g_error_free(err);
  2004. return NULL;
  2005. }
  2006. return io;
  2007. }
  2008. static void queue_request(struct avdtp *session, struct pending_req *req,
  2009. gboolean priority)
  2010. {
  2011. if (priority)
  2012. session->prio_queue = g_slist_append(session->prio_queue, req);
  2013. else
  2014. session->req_queue = g_slist_append(session->req_queue, req);
  2015. }
  2016. static uint8_t req_get_seid(struct pending_req *req)
  2017. {
  2018. if (req->signal_id == AVDTP_DISCOVER)
  2019. return 0;
  2020. return ((struct seid_req *) (req->data))->acp_seid;
  2021. }
  2022. static int cancel_request(struct avdtp *session, int err)
  2023. {
  2024. struct pending_req *req;
  2025. struct seid_req sreq;
  2026. struct avdtp_local_sep *lsep;
  2027. struct avdtp_stream *stream;
  2028. uint8_t seid;
  2029. struct avdtp_error averr;
  2030. req = session->req;
  2031. session->req = NULL;
  2032. avdtp_error_init(&averr, AVDTP_ERRNO, err);
  2033. seid = req_get_seid(req);
  2034. if (seid)
  2035. stream = find_stream_by_rseid(session, seid);
  2036. else
  2037. stream = NULL;
  2038. if (stream)
  2039. lsep = stream->lsep;
  2040. else
  2041. lsep = NULL;
  2042. switch (req->signal_id) {
  2043. case AVDTP_RECONFIGURE:
  2044. error("Reconfigure: %s (%d)", strerror(err), err);
  2045. if (lsep && lsep->cfm && lsep->cfm->reconfigure)
  2046. lsep->cfm->reconfigure(session, lsep, stream, &averr,
  2047. lsep->user_data);
  2048. break;
  2049. case AVDTP_OPEN:
  2050. error("Open: %s (%d)", strerror(err), err);
  2051. if (lsep && lsep->cfm && lsep->cfm->open)
  2052. lsep->cfm->open(session, lsep, stream, &averr,
  2053. lsep->user_data);
  2054. break;
  2055. case AVDTP_START:
  2056. error("Start: %s (%d)", strerror(err), err);
  2057. if (lsep && lsep->cfm && lsep->cfm->start) {
  2058. lsep->cfm->start(session, lsep, stream, &averr,
  2059. lsep->user_data);
  2060. if (stream)
  2061. stream->starting = FALSE;
  2062. }
  2063. break;
  2064. case AVDTP_SUSPEND:
  2065. error("Suspend: %s (%d)", strerror(err), err);
  2066. if (lsep && lsep->cfm && lsep->cfm->suspend)
  2067. lsep->cfm->suspend(session, lsep, stream, &averr,
  2068. lsep->user_data);
  2069. break;
  2070. case AVDTP_CLOSE:
  2071. error("Close: %s (%d)", strerror(err), err);
  2072. if (lsep && lsep->cfm && lsep->cfm->close) {
  2073. lsep->cfm->close(session, lsep, stream, &averr,
  2074. lsep->user_data);
  2075. if (stream)
  2076. stream->close_int = FALSE;
  2077. }
  2078. break;
  2079. case AVDTP_SET_CONFIGURATION:
  2080. error("SetConfiguration: %s (%d)", strerror(err), err);
  2081. if (lsep && lsep->cfm && lsep->cfm->set_configuration)
  2082. lsep->cfm->set_configuration(session, lsep, stream,
  2083. &averr, lsep->user_data);
  2084. break;
  2085. case AVDTP_DISCOVER:
  2086. error("Discover: %s (%d)", strerror(err), err);
  2087. goto failed;
  2088. case AVDTP_GET_CAPABILITIES:
  2089. error("GetCapabilities: %s (%d)", strerror(err), err);
  2090. goto failed;
  2091. case AVDTP_ABORT:
  2092. error("Abort: %s (%d)", strerror(err), err);
  2093. goto failed;
  2094. }
  2095. if (!stream)
  2096. goto failed;
  2097. memset(&sreq, 0, sizeof(sreq));
  2098. sreq.acp_seid = seid;
  2099. err = send_request(session, TRUE, stream, AVDTP_ABORT, &sreq,
  2100. sizeof(sreq));
  2101. if (err < 0) {
  2102. error("Unable to send abort request");
  2103. goto failed;
  2104. }
  2105. stream->abort_int = TRUE;
  2106. goto done;
  2107. failed:
  2108. connection_lost(session, err);
  2109. done:
  2110. pending_req_free(req);
  2111. return err;
  2112. }
  2113. static bool request_timeout(gpointer user_data)
  2114. {
  2115. struct avdtp *session = user_data;
  2116. cancel_request(session, ETIMEDOUT);
  2117. return FALSE;
  2118. }
  2119. static int send_req(struct avdtp *session, gboolean priority,
  2120. struct pending_req *req)
  2121. {
  2122. static int transaction = 0;
  2123. int err, timeout;
  2124. if (session->state == AVDTP_SESSION_STATE_DISCONNECTED) {
  2125. BtIOMode mode = btd_opts.avdtp.session_mode;
  2126. session->io = l2cap_connect(session, mode);
  2127. if (!session->io) {
  2128. /* Report disconnection anyways, as the other layers
  2129. * are using this state for cleanup.
  2130. */
  2131. avdtp_set_state(session,
  2132. AVDTP_SESSION_STATE_DISCONNECTED);
  2133. err = -EIO;
  2134. goto failed;
  2135. }
  2136. avdtp_set_state(session, AVDTP_SESSION_STATE_CONNECTING);
  2137. }
  2138. if (session->state < AVDTP_SESSION_STATE_CONNECTED ||
  2139. session->req != NULL) {
  2140. queue_request(session, req, priority);
  2141. return 0;
  2142. }
  2143. req->transaction = transaction++;
  2144. transaction %= 16;
  2145. /* FIXME: Should we retry to send if the buffer
  2146. was not totally sent or in case of EINTR? */
  2147. if (!avdtp_send(session, req->transaction, AVDTP_MSG_TYPE_COMMAND,
  2148. req->signal_id, req->data, req->data_size)) {
  2149. err = -EIO;
  2150. goto failed;
  2151. }
  2152. session->req = req;
  2153. switch (req->signal_id) {
  2154. case AVDTP_ABORT:
  2155. timeout = ABORT_TIMEOUT;
  2156. break;
  2157. case AVDTP_SUSPEND:
  2158. timeout = SUSPEND_TIMEOUT;
  2159. break;
  2160. default:
  2161. timeout = REQ_TIMEOUT;
  2162. }
  2163. req->timeout = timeout_add_seconds(timeout, request_timeout,
  2164. session, NULL);
  2165. return 0;
  2166. failed:
  2167. g_free(req->data);
  2168. g_free(req);
  2169. return err;
  2170. }
  2171. static int send_request(struct avdtp *session, gboolean priority,
  2172. struct avdtp_stream *stream, uint8_t signal_id,
  2173. void *buffer, size_t size)
  2174. {
  2175. struct pending_req *req;
  2176. if (stream && stream->abort_int && signal_id != AVDTP_ABORT) {
  2177. DBG("Unable to send requests while aborting");
  2178. return -EINVAL;
  2179. }
  2180. req = g_new0(struct pending_req, 1);
  2181. req->signal_id = signal_id;
  2182. req->data = g_malloc(size);
  2183. memcpy(req->data, buffer, size);
  2184. req->data_size = size;
  2185. req->stream = stream;
  2186. return send_req(session, priority, req);
  2187. }
  2188. static gboolean avdtp_discover_resp(struct avdtp *session,
  2189. struct discover_resp *resp, int size)
  2190. {
  2191. int sep_count, i;
  2192. uint8_t getcap_cmd;
  2193. int ret = 0;
  2194. gboolean getcap_pending = FALSE;
  2195. if (session->version >= 0x0103)
  2196. getcap_cmd = AVDTP_GET_ALL_CAPABILITIES;
  2197. else
  2198. getcap_cmd = AVDTP_GET_CAPABILITIES;
  2199. sep_count = size / sizeof(struct seid_info);
  2200. for (i = 0; i < sep_count; i++) {
  2201. struct avdtp_remote_sep *sep;
  2202. struct avdtp_stream *stream;
  2203. struct seid_req req;
  2204. DBG("seid %d type %d media %d in use %d",
  2205. resp->seps[i].seid, resp->seps[i].type,
  2206. resp->seps[i].media_type, resp->seps[i].inuse);
  2207. stream = find_stream_by_rseid(session, resp->seps[i].seid);
  2208. sep = find_remote_sep(session->seps, resp->seps[i].seid);
  2209. if (sep && sep->type == resp->seps[i].type &&
  2210. sep->media_type == resp->seps[i].media_type &&
  2211. sep->codec) {
  2212. sep->discovered = true;
  2213. continue;
  2214. }
  2215. if (resp->seps[i].inuse && !stream)
  2216. continue;
  2217. sep = g_new0(struct avdtp_remote_sep, 1);
  2218. session->seps = g_slist_append(session->seps, sep);
  2219. sep->stream = stream;
  2220. sep->seid = resp->seps[i].seid;
  2221. sep->type = resp->seps[i].type;
  2222. sep->media_type = resp->seps[i].media_type;
  2223. sep->discovered = true;
  2224. memset(&req, 0, sizeof(req));
  2225. req.acp_seid = sep->seid;
  2226. ret = send_request(session, TRUE, NULL, getcap_cmd,
  2227. &req, sizeof(req));
  2228. if (ret < 0)
  2229. break;
  2230. getcap_pending = TRUE;
  2231. }
  2232. if (!getcap_pending)
  2233. finalize_discovery(session, -ret);
  2234. return TRUE;
  2235. }
  2236. static gboolean avdtp_get_capabilities_resp(struct avdtp *session,
  2237. struct getcap_resp *resp,
  2238. unsigned int size)
  2239. {
  2240. struct avdtp_remote_sep *sep;
  2241. uint8_t seid;
  2242. /* Check for minimum required packet size includes:
  2243. * 1. getcap resp header
  2244. * 2. media transport capability (2 bytes)
  2245. * 3. media codec capability type + length (2 bytes)
  2246. * 4. the actual media codec elements
  2247. * */
  2248. if (size < (sizeof(struct getcap_resp) + 4 +
  2249. sizeof(struct avdtp_media_codec_capability))) {
  2250. error("Too short getcap resp packet");
  2251. return FALSE;
  2252. }
  2253. seid = ((struct seid_req *) session->req->data)->acp_seid;
  2254. sep = find_remote_sep(session->seps, seid);
  2255. DBG("seid %d type %d media %d", sep->seid,
  2256. sep->type, sep->media_type);
  2257. if (sep->caps) {
  2258. g_slist_free_full(sep->caps, g_free);
  2259. sep->caps = NULL;
  2260. sep->codec = NULL;
  2261. sep->delay_reporting = FALSE;
  2262. }
  2263. sep->caps = caps_to_list(resp->caps, size - sizeof(struct getcap_resp),
  2264. &sep->codec, &sep->delay_reporting);
  2265. return TRUE;
  2266. }
  2267. static gboolean avdtp_set_configuration_resp(struct avdtp *session,
  2268. struct avdtp_stream *stream,
  2269. struct avdtp_single_header *resp,
  2270. int size)
  2271. {
  2272. struct avdtp_local_sep *sep = stream->lsep;
  2273. if (sep->cfm && sep->cfm->set_configuration)
  2274. sep->cfm->set_configuration(session, sep, stream, NULL,
  2275. sep->user_data);
  2276. avdtp_sep_set_state(session, sep, AVDTP_STATE_CONFIGURED);
  2277. return TRUE;
  2278. }
  2279. static gboolean avdtp_reconfigure_resp(struct avdtp *session,
  2280. struct avdtp_stream *stream,
  2281. struct avdtp_single_header *resp, int size)
  2282. {
  2283. return TRUE;
  2284. }
  2285. static gboolean avdtp_open_resp(struct avdtp *session, struct avdtp_stream *stream,
  2286. struct seid_rej *resp, int size)
  2287. {
  2288. struct avdtp_local_sep *sep = stream->lsep;
  2289. BtIOMode mode = btd_opts.avdtp.stream_mode;
  2290. stream->io = l2cap_connect(session, mode);
  2291. if (!stream->io) {
  2292. avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
  2293. return FALSE;
  2294. }
  2295. session->pending_open = stream;
  2296. return TRUE;
  2297. }
  2298. static gboolean avdtp_start_resp(struct avdtp *session,
  2299. struct avdtp_stream *stream,
  2300. struct seid_rej *resp, int size)
  2301. {
  2302. struct avdtp_local_sep *sep = stream->lsep;
  2303. if (sep->cfm && sep->cfm->start)
  2304. sep->cfm->start(session, sep, stream, NULL, sep->user_data);
  2305. /* We might be in STREAMING already if both sides send START_CMD at the
  2306. * same time and the one in SNK role doesn't reject it as it should */
  2307. if (sep->state != AVDTP_STATE_STREAMING)
  2308. avdtp_sep_set_state(session, sep, AVDTP_STATE_STREAMING);
  2309. return TRUE;
  2310. }
  2311. static gboolean avdtp_close_resp(struct avdtp *session,
  2312. struct avdtp_stream *stream,
  2313. struct seid_rej *resp, int size)
  2314. {
  2315. struct avdtp_local_sep *sep = stream->lsep;
  2316. avdtp_sep_set_state(session, sep, AVDTP_STATE_CLOSING);
  2317. close_stream(stream);
  2318. return TRUE;
  2319. }
  2320. static gboolean avdtp_suspend_resp(struct avdtp *session,
  2321. struct avdtp_stream *stream,
  2322. void *data, int size)
  2323. {
  2324. struct avdtp_local_sep *sep = stream->lsep;
  2325. avdtp_sep_set_state(session, sep, AVDTP_STATE_OPEN);
  2326. if (sep->cfm && sep->cfm->suspend)
  2327. sep->cfm->suspend(session, sep, stream, NULL, sep->user_data);
  2328. return TRUE;
  2329. }
  2330. static gboolean avdtp_abort_resp(struct avdtp *session,
  2331. struct avdtp_stream *stream,
  2332. struct seid_rej *resp, int size)
  2333. {
  2334. struct avdtp_local_sep *sep = stream->lsep;
  2335. avdtp_sep_set_state(session, sep, AVDTP_STATE_ABORTING);
  2336. if (sep->cfm && sep->cfm->abort)
  2337. sep->cfm->abort(session, sep, stream, NULL, sep->user_data);
  2338. avdtp_sep_set_state(session, sep, AVDTP_STATE_IDLE);
  2339. return TRUE;
  2340. }
  2341. static gboolean avdtp_delay_report_resp(struct avdtp *session,
  2342. struct avdtp_stream *stream,
  2343. void *data, int size)
  2344. {
  2345. struct avdtp_local_sep *sep = stream->lsep;
  2346. if (sep->cfm && sep->cfm->delay_report)
  2347. sep->cfm->delay_report(session, sep, stream, NULL, sep->user_data);
  2348. return TRUE;
  2349. }
  2350. static gboolean avdtp_parse_resp(struct avdtp *session,
  2351. struct avdtp_stream *stream,
  2352. uint8_t transaction, uint8_t signal_id,
  2353. void *buf, int size)
  2354. {
  2355. struct pending_req *next;
  2356. const char *get_all = "";
  2357. if (session->prio_queue)
  2358. next = session->prio_queue->data;
  2359. else if (session->req_queue)
  2360. next = session->req_queue->data;
  2361. else
  2362. next = NULL;
  2363. switch (signal_id) {
  2364. case AVDTP_DISCOVER:
  2365. DBG("DISCOVER request succeeded");
  2366. return avdtp_discover_resp(session, buf, size);
  2367. case AVDTP_GET_ALL_CAPABILITIES:
  2368. get_all = "ALL_";
  2369. /* fall through */
  2370. case AVDTP_GET_CAPABILITIES:
  2371. DBG("GET_%sCAPABILITIES request succeeded", get_all);
  2372. if (!avdtp_get_capabilities_resp(session, buf, size))
  2373. return FALSE;
  2374. if (!(next && (next->signal_id == AVDTP_GET_CAPABILITIES ||
  2375. next->signal_id == AVDTP_GET_ALL_CAPABILITIES)))
  2376. finalize_discovery(session, 0);
  2377. return TRUE;
  2378. }
  2379. /* The remaining commands require an existing stream so bail out
  2380. * here if the stream got unexpectedly disconnected */
  2381. if (!stream) {
  2382. DBG("AVDTP: stream was closed while waiting for reply");
  2383. return TRUE;
  2384. }
  2385. switch (signal_id) {
  2386. case AVDTP_SET_CONFIGURATION:
  2387. DBG("SET_CONFIGURATION request succeeded");
  2388. return avdtp_set_configuration_resp(session, stream,
  2389. buf, size);
  2390. case AVDTP_RECONFIGURE:
  2391. DBG("RECONFIGURE request succeeded");
  2392. return avdtp_reconfigure_resp(session, stream, buf, size);
  2393. case AVDTP_OPEN:
  2394. DBG("OPEN request succeeded");
  2395. return avdtp_open_resp(session, stream, buf, size);
  2396. case AVDTP_SUSPEND:
  2397. DBG("SUSPEND request succeeded");
  2398. return avdtp_suspend_resp(session, stream, buf, size);
  2399. case AVDTP_START:
  2400. DBG("START request succeeded");
  2401. return avdtp_start_resp(session, stream, buf, size);
  2402. case AVDTP_CLOSE:
  2403. DBG("CLOSE request succeeded");
  2404. return avdtp_close_resp(session, stream, buf, size);
  2405. case AVDTP_ABORT:
  2406. DBG("ABORT request succeeded");
  2407. return avdtp_abort_resp(session, stream, buf, size);
  2408. case AVDTP_DELAY_REPORT:
  2409. DBG("DELAY_REPORT request succeeded");
  2410. return avdtp_delay_report_resp(session, stream, buf, size);
  2411. }
  2412. error("Unknown signal id in accept response: %u", signal_id);
  2413. return TRUE;
  2414. }
  2415. static gboolean seid_rej_to_err(struct seid_rej *rej, unsigned int size,
  2416. struct avdtp_error *err)
  2417. {
  2418. if (size < sizeof(struct seid_rej)) {
  2419. error("Too small packet for seid_rej");
  2420. return FALSE;
  2421. }
  2422. avdtp_error_init(err, 0x00, rej->error);
  2423. return TRUE;
  2424. }
  2425. static gboolean conf_rej_to_err(struct conf_rej *rej, unsigned int size,
  2426. struct avdtp_error *err)
  2427. {
  2428. if (size < sizeof(struct conf_rej)) {
  2429. error("Too small packet for conf_rej");
  2430. return FALSE;
  2431. }
  2432. avdtp_error_init(err, rej->category, rej->error);
  2433. return TRUE;
  2434. }
  2435. static gboolean stream_rej_to_err(struct stream_rej *rej, unsigned int size,
  2436. struct avdtp_error *err,
  2437. uint8_t *acp_seid)
  2438. {
  2439. if (size < sizeof(struct stream_rej)) {
  2440. error("Too small packet for stream_rej");
  2441. return FALSE;
  2442. }
  2443. avdtp_error_init(err, 0x00, rej->error);
  2444. if (acp_seid)
  2445. *acp_seid = rej->acp_seid;
  2446. return TRUE;
  2447. }
  2448. static gboolean avdtp_parse_rej(struct avdtp *session,
  2449. struct avdtp_stream *stream,
  2450. uint8_t transaction, uint8_t signal_id,
  2451. void *buf, int size)
  2452. {
  2453. struct avdtp_error err;
  2454. uint8_t acp_seid;
  2455. struct avdtp_local_sep *sep = stream ? stream->lsep : NULL;
  2456. switch (signal_id) {
  2457. case AVDTP_DISCOVER:
  2458. if (!seid_rej_to_err(buf, size, &err))
  2459. return FALSE;
  2460. error("DISCOVER request rejected: %s (%d)",
  2461. avdtp_strerror(&err), err.err.error_code);
  2462. return TRUE;
  2463. case AVDTP_GET_CAPABILITIES:
  2464. case AVDTP_GET_ALL_CAPABILITIES:
  2465. if (!seid_rej_to_err(buf, size, &err))
  2466. return FALSE;
  2467. error("GET_CAPABILITIES request rejected: %s (%d)",
  2468. avdtp_strerror(&err), err.err.error_code);
  2469. return TRUE;
  2470. case AVDTP_OPEN:
  2471. if (!seid_rej_to_err(buf, size, &err))
  2472. return FALSE;
  2473. error("OPEN request rejected: %s (%d)",
  2474. avdtp_strerror(&err), err.err.error_code);
  2475. if (sep && sep->cfm && sep->cfm->open)
  2476. sep->cfm->open(session, sep, stream, &err,
  2477. sep->user_data);
  2478. return TRUE;
  2479. case AVDTP_SET_CONFIGURATION:
  2480. if (!conf_rej_to_err(buf, size, &err))
  2481. return FALSE;
  2482. error("SET_CONFIGURATION request rejected: %s (%d)",
  2483. avdtp_strerror(&err), err.err.error_code);
  2484. if (sep && sep->cfm && sep->cfm->set_configuration)
  2485. sep->cfm->set_configuration(session, sep, stream,
  2486. &err, sep->user_data);
  2487. return TRUE;
  2488. case AVDTP_RECONFIGURE:
  2489. if (!conf_rej_to_err(buf, size, &err))
  2490. return FALSE;
  2491. error("RECONFIGURE request rejected: %s (%d)",
  2492. avdtp_strerror(&err), err.err.error_code);
  2493. if (sep && sep->cfm && sep->cfm->reconfigure)
  2494. sep->cfm->reconfigure(session, sep, stream, &err,
  2495. sep->user_data);
  2496. return TRUE;
  2497. case AVDTP_START:
  2498. if (!stream_rej_to_err(buf, size, &err, &acp_seid))
  2499. return FALSE;
  2500. error("START request rejected: %s (%d)",
  2501. avdtp_strerror(&err), err.err.error_code);
  2502. if (sep && sep->cfm && sep->cfm->start) {
  2503. sep->cfm->start(session, sep, stream, &err,
  2504. sep->user_data);
  2505. stream->starting = FALSE;
  2506. }
  2507. return TRUE;
  2508. case AVDTP_SUSPEND:
  2509. if (!stream_rej_to_err(buf, size, &err, &acp_seid))
  2510. return FALSE;
  2511. error("SUSPEND request rejected: %s (%d)",
  2512. avdtp_strerror(&err), err.err.error_code);
  2513. if (sep && sep->cfm && sep->cfm->suspend)
  2514. sep->cfm->suspend(session, sep, stream, &err,
  2515. sep->user_data);
  2516. return TRUE;
  2517. case AVDTP_CLOSE:
  2518. if (!stream_rej_to_err(buf, size, &err, &acp_seid))
  2519. return FALSE;
  2520. error("CLOSE request rejected: %s (%d)",
  2521. avdtp_strerror(&err), err.err.error_code);
  2522. if (sep && sep->cfm && sep->cfm->close) {
  2523. sep->cfm->close(session, sep, stream, &err,
  2524. sep->user_data);
  2525. stream->close_int = FALSE;
  2526. }
  2527. return TRUE;
  2528. case AVDTP_ABORT:
  2529. if (!stream_rej_to_err(buf, size, &err, &acp_seid))
  2530. return FALSE;
  2531. error("ABORT request rejected: %s (%d)",
  2532. avdtp_strerror(&err), err.err.error_code);
  2533. if (sep && sep->cfm && sep->cfm->abort)
  2534. sep->cfm->abort(session, sep, stream, &err,
  2535. sep->user_data);
  2536. return FALSE;
  2537. case AVDTP_DELAY_REPORT:
  2538. if (!stream_rej_to_err(buf, size, &err, &acp_seid))
  2539. return FALSE;
  2540. error("DELAY_REPORT request rejected: %s (%d)",
  2541. avdtp_strerror(&err), err.err.error_code);
  2542. if (sep && sep->cfm && sep->cfm->delay_report)
  2543. sep->cfm->delay_report(session, sep, stream, &err,
  2544. sep->user_data);
  2545. return TRUE;
  2546. default:
  2547. error("Unknown reject response signal id: %u", signal_id);
  2548. return TRUE;
  2549. }
  2550. }
  2551. struct avdtp_service_capability *avdtp_stream_get_codec(
  2552. struct avdtp_stream *stream)
  2553. {
  2554. GSList *l;
  2555. for (l = stream->caps; l; l = l->next) {
  2556. struct avdtp_service_capability *cap = l->data;
  2557. if (cap->category == AVDTP_MEDIA_CODEC)
  2558. return cap;
  2559. }
  2560. return NULL;
  2561. }
  2562. static gboolean avdtp_stream_has_capability(struct avdtp_stream *stream,
  2563. struct avdtp_service_capability *cap)
  2564. {
  2565. GSList *l;
  2566. struct avdtp_service_capability *stream_cap;
  2567. for (l = stream->caps; l; l = g_slist_next(l)) {
  2568. stream_cap = l->data;
  2569. if (stream_cap->category != cap->category ||
  2570. stream_cap->length != cap->length)
  2571. continue;
  2572. if (memcmp(stream_cap->data, cap->data, cap->length) == 0)
  2573. return TRUE;
  2574. }
  2575. return FALSE;
  2576. }
  2577. gboolean avdtp_stream_has_capabilities(struct avdtp_stream *stream,
  2578. GSList *caps)
  2579. {
  2580. for (; caps; caps = g_slist_next(caps)) {
  2581. struct avdtp_service_capability *cap = caps->data;
  2582. if (!avdtp_stream_has_capability(stream, cap))
  2583. return FALSE;
  2584. }
  2585. return TRUE;
  2586. }
  2587. struct avdtp_remote_sep *avdtp_stream_get_remote_sep(
  2588. struct avdtp_stream *stream)
  2589. {
  2590. GSList *l;
  2591. for (l = stream->session->seps; l; l = l->next) {
  2592. struct avdtp_remote_sep *sep = l->data;
  2593. if (sep->seid == stream->rseid)
  2594. return sep;
  2595. }
  2596. return NULL;
  2597. }
  2598. gboolean avdtp_stream_set_transport(struct avdtp_stream *stream, int fd,
  2599. size_t imtu, size_t omtu)
  2600. {
  2601. GIOChannel *io = g_io_channel_unix_new(fd);
  2602. if (stream != stream->session->pending_open) {
  2603. uint8_t err;
  2604. if (stream->session->pending_open)
  2605. goto failed;
  2606. /* Attempt to Open there is no pending stream set yet */
  2607. if (stream->lsep->ind && stream->lsep->ind->open) {
  2608. if (!stream->lsep->ind->open(stream->session,
  2609. stream->lsep,
  2610. stream, &err,
  2611. stream->lsep->user_data))
  2612. goto failed;
  2613. }
  2614. stream_set_pending_open(stream, io);
  2615. stream->imtu = imtu;
  2616. stream->omtu = omtu;
  2617. return TRUE;
  2618. }
  2619. handle_transport_connect(stream->session, io, imtu, omtu);
  2620. g_io_channel_unref(io);
  2621. return TRUE;
  2622. failed:
  2623. g_io_channel_unref(io);
  2624. return FALSE;
  2625. }
  2626. gboolean avdtp_stream_get_transport(struct avdtp_stream *stream, int *sock,
  2627. uint16_t *imtu, uint16_t *omtu,
  2628. GSList **caps)
  2629. {
  2630. if (stream->io == NULL)
  2631. return FALSE;
  2632. if (sock)
  2633. *sock = g_io_channel_unix_get_fd(stream->io);
  2634. if (omtu)
  2635. *omtu = stream->omtu;
  2636. if (imtu)
  2637. *imtu = stream->imtu;
  2638. if (caps)
  2639. *caps = stream->caps;
  2640. return TRUE;
  2641. }
  2642. static int process_queue(struct avdtp *session)
  2643. {
  2644. GSList **queue, *l;
  2645. struct pending_req *req;
  2646. if (session->req)
  2647. return 0;
  2648. if (session->prio_queue)
  2649. queue = &session->prio_queue;
  2650. else
  2651. queue = &session->req_queue;
  2652. if (!*queue)
  2653. return 0;
  2654. l = *queue;
  2655. req = l->data;
  2656. *queue = g_slist_remove(*queue, req);
  2657. return send_req(session, FALSE, req);
  2658. }
  2659. uint8_t avdtp_get_seid(struct avdtp_remote_sep *sep)
  2660. {
  2661. return sep->seid;
  2662. }
  2663. uint8_t avdtp_get_type(struct avdtp_remote_sep *sep)
  2664. {
  2665. return sep->type;
  2666. }
  2667. struct avdtp_service_capability *avdtp_get_codec(struct avdtp_remote_sep *sep)
  2668. {
  2669. return sep->codec;
  2670. }
  2671. bool avdtp_get_delay_reporting(struct avdtp_remote_sep *sep)
  2672. {
  2673. return sep->delay_reporting;
  2674. }
  2675. struct avdtp_service_capability *avdtp_service_cap_new(uint8_t category,
  2676. void *data, int length)
  2677. {
  2678. struct avdtp_service_capability *cap;
  2679. if (category < AVDTP_MEDIA_TRANSPORT || category > AVDTP_DELAY_REPORTING)
  2680. return NULL;
  2681. cap = g_malloc(sizeof(struct avdtp_service_capability) + length);
  2682. cap->category = category;
  2683. cap->length = length;
  2684. memcpy(cap->data, data, length);
  2685. return cap;
  2686. }
  2687. struct avdtp_remote_sep *avdtp_register_remote_sep(struct avdtp *session,
  2688. uint8_t seid,
  2689. uint8_t type,
  2690. GSList *caps,
  2691. bool delay_reporting)
  2692. {
  2693. struct avdtp_remote_sep *sep;
  2694. GSList *l;
  2695. sep = find_remote_sep(session->seps, seid);
  2696. if (sep)
  2697. return sep;
  2698. sep = g_new0(struct avdtp_remote_sep, 1);
  2699. session->seps = g_slist_append(session->seps, sep);
  2700. sep->seid = seid;
  2701. sep->type = type;
  2702. sep->media_type = AVDTP_MEDIA_TYPE_AUDIO;
  2703. sep->caps = caps;
  2704. sep->delay_reporting = delay_reporting;
  2705. for (l = caps; l; l = g_slist_next(l)) {
  2706. struct avdtp_service_capability *cap = l->data;
  2707. if (cap->category == AVDTP_MEDIA_CODEC)
  2708. sep->codec = cap;
  2709. }
  2710. DBG("seid %d type %d media %d delay_reporting %s", sep->seid, sep->type,
  2711. sep->media_type,
  2712. sep->delay_reporting ? "true" : "false");
  2713. return sep;
  2714. }
  2715. int avdtp_unregister_remote_sep(struct avdtp *session,
  2716. struct avdtp_remote_sep *rsep)
  2717. {
  2718. if (!session || !rsep)
  2719. return -EINVAL;
  2720. session->seps = g_slist_remove(session->seps, rsep);
  2721. sep_free(rsep);
  2722. return 0;
  2723. }
  2724. void avdtp_remote_sep_set_destroy(struct avdtp_remote_sep *sep, void *user_data,
  2725. avdtp_remote_sep_destroy_t destroy)
  2726. {
  2727. if (!sep)
  2728. return;
  2729. sep->user_data = user_data;
  2730. sep->destroy = destroy;
  2731. }
  2732. static gboolean process_discover(gpointer data)
  2733. {
  2734. struct avdtp *session = data;
  2735. session->discover->id = 0;
  2736. finalize_discovery(session, 0);
  2737. return FALSE;
  2738. }
  2739. int avdtp_discover(struct avdtp *session, avdtp_discover_cb_t cb,
  2740. void *user_data)
  2741. {
  2742. int err;
  2743. if (session->discover)
  2744. return -EBUSY;
  2745. session->discover = g_new0(struct discover_callback, 1);
  2746. if (session->seps) {
  2747. struct avdtp_remote_sep *sep = session->seps->data;
  2748. /* Check that SEP have been discovered as it may be loaded from
  2749. * cache.
  2750. */
  2751. if (sep->discovered) {
  2752. session->discover->cb = cb;
  2753. session->discover->user_data = user_data;
  2754. session->discover->id = g_idle_add(process_discover,
  2755. session);
  2756. return 0;
  2757. }
  2758. }
  2759. err = send_request(session, FALSE, NULL, AVDTP_DISCOVER, NULL, 0);
  2760. if (err == 0) {
  2761. session->discover->cb = cb;
  2762. session->discover->user_data = user_data;
  2763. }
  2764. return err;
  2765. }
  2766. gboolean avdtp_stream_remove_cb(struct avdtp *session,
  2767. struct avdtp_stream *stream,
  2768. unsigned int id)
  2769. {
  2770. GSList *l;
  2771. struct stream_callback *cb;
  2772. if (!stream)
  2773. return FALSE;
  2774. for (cb = NULL, l = stream->callbacks; l != NULL; l = l->next) {
  2775. struct stream_callback *tmp = l->data;
  2776. if (tmp && tmp->id == id) {
  2777. cb = tmp;
  2778. break;
  2779. }
  2780. }
  2781. if (!cb)
  2782. return FALSE;
  2783. stream->callbacks = g_slist_remove(stream->callbacks, cb);
  2784. g_free(cb);
  2785. return TRUE;
  2786. }
  2787. unsigned int avdtp_stream_add_cb(struct avdtp *session,
  2788. struct avdtp_stream *stream,
  2789. avdtp_stream_state_cb cb, void *data)
  2790. {
  2791. struct stream_callback *stream_cb;
  2792. static unsigned int id = 0;
  2793. stream_cb = g_new(struct stream_callback, 1);
  2794. stream_cb->cb = cb;
  2795. stream_cb->user_data = data;
  2796. stream_cb->id = ++id;
  2797. stream->callbacks = g_slist_append(stream->callbacks, stream_cb);
  2798. return stream_cb->id;
  2799. }
  2800. int avdtp_get_configuration(struct avdtp *session, struct avdtp_stream *stream)
  2801. {
  2802. struct seid_req req;
  2803. if (session->state < AVDTP_SESSION_STATE_CONNECTED)
  2804. return -EINVAL;
  2805. memset(&req, 0, sizeof(req));
  2806. req.acp_seid = stream->rseid;
  2807. return send_request(session, FALSE, stream, AVDTP_GET_CONFIGURATION,
  2808. &req, sizeof(req));
  2809. }
  2810. static void copy_capabilities(gpointer data, gpointer user_data)
  2811. {
  2812. struct avdtp_service_capability *src_cap = data;
  2813. struct avdtp_service_capability *dst_cap;
  2814. GSList **l = user_data;
  2815. dst_cap = avdtp_service_cap_new(src_cap->category, src_cap->data,
  2816. src_cap->length);
  2817. *l = g_slist_append(*l, dst_cap);
  2818. }
  2819. int avdtp_set_configuration(struct avdtp *session,
  2820. struct avdtp_remote_sep *rsep,
  2821. struct avdtp_local_sep *lsep,
  2822. GSList *caps,
  2823. struct avdtp_stream **stream)
  2824. {
  2825. struct setconf_req *req;
  2826. struct avdtp_stream *new_stream;
  2827. unsigned char *ptr;
  2828. int err, caps_len;
  2829. struct avdtp_service_capability *cap;
  2830. GSList *l;
  2831. if (session->state != AVDTP_SESSION_STATE_CONNECTED)
  2832. return -ENOTCONN;
  2833. if (!(lsep && rsep))
  2834. return -EINVAL;
  2835. DBG("%p: int_seid=%u, acp_seid=%u", session,
  2836. lsep->info.seid, rsep->seid);
  2837. new_stream = g_new0(struct avdtp_stream, 1);
  2838. new_stream->session = session;
  2839. new_stream->lsep = lsep;
  2840. new_stream->rseid = rsep->seid;
  2841. if (rsep->delay_reporting && lsep->delay_reporting) {
  2842. struct avdtp_service_capability *delay_reporting;
  2843. delay_reporting = avdtp_service_cap_new(AVDTP_DELAY_REPORTING,
  2844. NULL, 0);
  2845. caps = g_slist_append(caps, delay_reporting);
  2846. new_stream->delay_reporting = TRUE;
  2847. }
  2848. g_slist_foreach(caps, copy_capabilities, &new_stream->caps);
  2849. /* Calculate total size of request */
  2850. for (l = caps, caps_len = 0; l != NULL; l = g_slist_next(l)) {
  2851. cap = l->data;
  2852. caps_len += cap->length + 2;
  2853. }
  2854. req = g_malloc0(sizeof(struct setconf_req) + caps_len);
  2855. req->int_seid = lsep->info.seid;
  2856. req->acp_seid = rsep->seid;
  2857. /* Copy the capabilities into the request */
  2858. for (l = caps, ptr = req->caps; l != NULL; l = g_slist_next(l)) {
  2859. cap = l->data;
  2860. memcpy(ptr, cap, cap->length + 2);
  2861. ptr += cap->length + 2;
  2862. }
  2863. err = send_request(session, FALSE, new_stream,
  2864. AVDTP_SET_CONFIGURATION, req,
  2865. sizeof(struct setconf_req) + caps_len);
  2866. if (err < 0)
  2867. stream_free(new_stream);
  2868. else {
  2869. lsep->info.inuse = 1;
  2870. lsep->stream = new_stream;
  2871. rsep->stream = new_stream;
  2872. session->streams = g_slist_append(session->streams, new_stream);
  2873. if (stream)
  2874. *stream = new_stream;
  2875. session->dc_timeout = DISCONNECT_TIMEOUT;
  2876. }
  2877. g_free(req);
  2878. return err;
  2879. }
  2880. int avdtp_open(struct avdtp *session, struct avdtp_stream *stream)
  2881. {
  2882. struct seid_req req;
  2883. if (!g_slist_find(session->streams, stream))
  2884. return -EINVAL;
  2885. if (stream->lsep->state > AVDTP_STATE_CONFIGURED)
  2886. return -EINVAL;
  2887. memset(&req, 0, sizeof(req));
  2888. req.acp_seid = stream->rseid;
  2889. return send_request(session, FALSE, stream, AVDTP_OPEN,
  2890. &req, sizeof(req));
  2891. }
  2892. static bool start_timeout(gpointer user_data)
  2893. {
  2894. struct avdtp_stream *stream = user_data;
  2895. struct avdtp *session = stream->session;
  2896. stream->open_acp = FALSE;
  2897. if (avdtp_start(session, stream) < 0)
  2898. error("wait_timeout: avdtp_start failed");
  2899. stream->start_timer = 0;
  2900. return FALSE;
  2901. }
  2902. int avdtp_start(struct avdtp *session, struct avdtp_stream *stream)
  2903. {
  2904. struct start_req req;
  2905. int ret;
  2906. if (!g_slist_find(session->streams, stream))
  2907. return -EINVAL;
  2908. if (stream->lsep->state != AVDTP_STATE_OPEN)
  2909. return -EINVAL;
  2910. /* Recommendation 12:
  2911. * If the RD has configured and opened a stream it is also responsible
  2912. * to start the streaming via GAVDP_START.
  2913. */
  2914. if (stream->open_acp) {
  2915. /* If timer already active wait it */
  2916. if (stream->start_timer)
  2917. return 0;
  2918. stream->start_timer = timeout_add_seconds(START_TIMEOUT,
  2919. start_timeout,
  2920. stream, NULL);
  2921. return 0;
  2922. }
  2923. if (stream->close_int == TRUE) {
  2924. error("avdtp_start: rejecting start since close is initiated");
  2925. return -EINVAL;
  2926. }
  2927. if (stream->starting == TRUE) {
  2928. DBG("stream already started");
  2929. return -EINPROGRESS;
  2930. }
  2931. memset(&req, 0, sizeof(req));
  2932. req.first_seid.seid = stream->rseid;
  2933. ret = send_request(session, FALSE, stream, AVDTP_START,
  2934. &req, sizeof(req));
  2935. if (ret == 0)
  2936. stream->starting = TRUE;
  2937. return ret;
  2938. }
  2939. int avdtp_close(struct avdtp *session, struct avdtp_stream *stream,
  2940. gboolean immediate)
  2941. {
  2942. struct seid_req req;
  2943. int ret;
  2944. if (!g_slist_find(session->streams, stream))
  2945. return -EINVAL;
  2946. if (stream->lsep->state < AVDTP_STATE_OPEN)
  2947. return -EINVAL;
  2948. if (stream->close_int == TRUE) {
  2949. error("avdtp_close: rejecting since close is already initiated");
  2950. return -EINVAL;
  2951. }
  2952. if (immediate && session->req && stream == session->req->stream)
  2953. return avdtp_abort(session, stream);
  2954. memset(&req, 0, sizeof(req));
  2955. req.acp_seid = stream->rseid;
  2956. ret = send_request(session, FALSE, stream, AVDTP_CLOSE,
  2957. &req, sizeof(req));
  2958. if (ret == 0) {
  2959. stream->close_int = TRUE;
  2960. session->dc_timeout = 0;
  2961. }
  2962. return ret;
  2963. }
  2964. int avdtp_suspend(struct avdtp *session, struct avdtp_stream *stream)
  2965. {
  2966. struct seid_req req;
  2967. if (!g_slist_find(session->streams, stream))
  2968. return -EINVAL;
  2969. if (stream->lsep->state <= AVDTP_STATE_OPEN || stream->close_int)
  2970. return -EINVAL;
  2971. memset(&req, 0, sizeof(req));
  2972. req.acp_seid = stream->rseid;
  2973. return send_request(session, FALSE, stream, AVDTP_SUSPEND,
  2974. &req, sizeof(req));
  2975. }
  2976. int avdtp_abort(struct avdtp *session, struct avdtp_stream *stream)
  2977. {
  2978. struct seid_req req;
  2979. int ret;
  2980. if (!stream && session->discover) {
  2981. /* Don't call cb since it being aborted */
  2982. session->discover->cb = NULL;
  2983. finalize_discovery(session, ECANCELED);
  2984. return -EALREADY;
  2985. }
  2986. if (!g_slist_find(session->streams, stream))
  2987. return -EINVAL;
  2988. if (stream->lsep->state == AVDTP_STATE_ABORTING)
  2989. return -EINVAL;
  2990. avdtp_sep_set_state(session, stream->lsep, AVDTP_STATE_ABORTING);
  2991. if (session->req && stream == session->req->stream)
  2992. return cancel_request(session, ECANCELED);
  2993. memset(&req, 0, sizeof(req));
  2994. req.acp_seid = stream->rseid;
  2995. ret = send_request(session, TRUE, stream, AVDTP_ABORT,
  2996. &req, sizeof(req));
  2997. if (ret == 0) {
  2998. stream->abort_int = TRUE;
  2999. session->dc_timeout = 0;
  3000. }
  3001. return ret;
  3002. }
  3003. int avdtp_delay_report(struct avdtp *session, struct avdtp_stream *stream,
  3004. uint16_t delay)
  3005. {
  3006. struct delay_req req;
  3007. if (!g_slist_find(session->streams, stream))
  3008. return -EINVAL;
  3009. if (stream->lsep->state != AVDTP_STATE_CONFIGURED &&
  3010. stream->lsep->state != AVDTP_STATE_STREAMING)
  3011. return -EINVAL;
  3012. if (!stream->delay_reporting || session->version < 0x0103)
  3013. return -EINVAL;
  3014. stream->delay = delay;
  3015. memset(&req, 0, sizeof(req));
  3016. req.acp_seid = stream->rseid;
  3017. req.delay = htons(delay);
  3018. return send_request(session, TRUE, stream, AVDTP_DELAY_REPORT,
  3019. &req, sizeof(req));
  3020. }
  3021. struct avdtp_local_sep *avdtp_register_sep(struct queue *lseps,
  3022. uint64_t *seid_pool,
  3023. uint8_t type,
  3024. uint8_t media_type,
  3025. uint8_t codec_type,
  3026. gboolean delay_reporting,
  3027. struct avdtp_sep_ind *ind,
  3028. struct avdtp_sep_cfm *cfm,
  3029. void *user_data)
  3030. {
  3031. struct avdtp_local_sep *sep;
  3032. uint8_t seid = util_get_uid(seid_pool, MAX_SEID);
  3033. if (!seid)
  3034. return NULL;
  3035. sep = g_new0(struct avdtp_local_sep, 1);
  3036. sep->state = AVDTP_STATE_IDLE;
  3037. sep->info.seid = seid;
  3038. sep->info.type = type;
  3039. sep->info.media_type = media_type;
  3040. sep->codec = codec_type;
  3041. sep->ind = ind;
  3042. sep->cfm = cfm;
  3043. sep->user_data = user_data;
  3044. sep->delay_reporting = delay_reporting;
  3045. DBG("SEP %p registered: type:%d codec:%d seid_pool:%p seid:%d", sep,
  3046. sep->info.type, sep->codec, seid_pool,
  3047. sep->info.seid);
  3048. if (!queue_push_tail(lseps, sep)) {
  3049. g_free(sep);
  3050. util_clear_uid(seid_pool, seid);
  3051. return NULL;
  3052. }
  3053. return sep;
  3054. }
  3055. int avdtp_unregister_sep(struct queue *lseps, uint64_t *seid_pool,
  3056. struct avdtp_local_sep *sep)
  3057. {
  3058. if (!sep)
  3059. return -EINVAL;
  3060. if (sep->stream)
  3061. release_stream(sep->stream, sep->stream->session);
  3062. DBG("SEP %p unregistered: type:%d codec:%d seid_pool:%p seid:%d", sep,
  3063. sep->info.type, sep->codec, seid_pool,
  3064. sep->info.seid);
  3065. util_clear_uid(seid_pool, sep->info.seid);
  3066. queue_remove(lseps, sep);
  3067. g_free(sep);
  3068. return 0;
  3069. }
  3070. const char *avdtp_strerror(struct avdtp_error *err)
  3071. {
  3072. if (err->category == AVDTP_ERRNO)
  3073. return strerror(err->err.posix_errno);
  3074. switch(err->err.error_code) {
  3075. case AVDTP_BAD_HEADER_FORMAT:
  3076. return "Bad Header Format";
  3077. case AVDTP_BAD_LENGTH:
  3078. return "Bad Packet Length";
  3079. case AVDTP_BAD_ACP_SEID:
  3080. return "Bad Acceptor SEID";
  3081. case AVDTP_SEP_IN_USE:
  3082. return "Stream End Point in Use";
  3083. case AVDTP_SEP_NOT_IN_USE:
  3084. return "Stream End Point Not in Use";
  3085. case AVDTP_BAD_SERV_CATEGORY:
  3086. return "Bad Service Category";
  3087. case AVDTP_BAD_PAYLOAD_FORMAT:
  3088. return "Bad Payload format";
  3089. case AVDTP_NOT_SUPPORTED_COMMAND:
  3090. return "Command Not Supported";
  3091. case AVDTP_INVALID_CAPABILITIES:
  3092. return "Invalid Capabilities";
  3093. case AVDTP_BAD_RECOVERY_TYPE:
  3094. return "Bad Recovery Type";
  3095. case AVDTP_BAD_MEDIA_TRANSPORT_FORMAT:
  3096. return "Bad Media Transport Format";
  3097. case AVDTP_BAD_RECOVERY_FORMAT:
  3098. return "Bad Recovery Format";
  3099. case AVDTP_BAD_ROHC_FORMAT:
  3100. return "Bad Header Compression Format";
  3101. case AVDTP_BAD_CP_FORMAT:
  3102. return "Bad Content Protection Format";
  3103. case AVDTP_BAD_MULTIPLEXING_FORMAT:
  3104. return "Bad Multiplexing Format";
  3105. case AVDTP_UNSUPPORTED_CONFIGURATION:
  3106. return "Configuration not supported";
  3107. case AVDTP_BAD_STATE:
  3108. return "Bad State";
  3109. default:
  3110. return "Unknown error";
  3111. }
  3112. }
  3113. avdtp_state_t avdtp_sep_get_state(struct avdtp_local_sep *sep)
  3114. {
  3115. return sep->state;
  3116. }
  3117. uint8_t avdtp_sep_get_seid(struct avdtp_local_sep *sep)
  3118. {
  3119. return sep->info.seid;
  3120. }
  3121. struct btd_adapter *avdtp_get_adapter(struct avdtp *session)
  3122. {
  3123. if (!session)
  3124. return NULL;
  3125. return device_get_adapter(session->device);
  3126. }
  3127. struct btd_device *avdtp_get_device(struct avdtp *session)
  3128. {
  3129. if (!session)
  3130. return NULL;
  3131. return session->device;
  3132. }
  3133. gboolean avdtp_has_stream(struct avdtp *session, struct avdtp_stream *stream)
  3134. {
  3135. return g_slist_find(session->streams, stream) ? TRUE : FALSE;
  3136. }
  3137. unsigned int avdtp_add_state_cb(struct btd_device *dev,
  3138. avdtp_session_state_cb cb, void *user_data)
  3139. {
  3140. struct avdtp_state_callback *state_cb;
  3141. static unsigned int id = 0;
  3142. state_cb = g_new(struct avdtp_state_callback, 1);
  3143. state_cb->cb = cb;
  3144. state_cb->dev = dev;
  3145. state_cb->id = ++id;
  3146. state_cb->user_data = user_data;
  3147. state_callbacks = g_slist_append(state_callbacks, state_cb);
  3148. return state_cb->id;
  3149. }
  3150. gboolean avdtp_remove_state_cb(unsigned int id)
  3151. {
  3152. GSList *l;
  3153. for (l = state_callbacks; l != NULL; l = l->next) {
  3154. struct avdtp_state_callback *cb = l->data;
  3155. if (cb && cb->id == id) {
  3156. state_callbacks = g_slist_remove(state_callbacks, cb);
  3157. g_free(cb);
  3158. return TRUE;
  3159. }
  3160. }
  3161. return FALSE;
  3162. }