FreeBSD kernel netgraph code
ng_btsocket_l2cap.c
Go to the documentation of this file.
1/*
2 * ng_btsocket_l2cap.c
3 */
4
5/*-
6 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
7 *
8 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
9 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $Id: ng_btsocket_l2cap.c,v 1.16 2003/09/14 23:29:06 max Exp $
33 * $FreeBSD$
34 */
35
36#include <sys/param.h>
37#include <sys/systm.h>
38#include <sys/bitstring.h>
39#include <sys/domain.h>
40#include <sys/endian.h>
41#include <sys/errno.h>
42#include <sys/filedesc.h>
43#include <sys/ioccom.h>
44#include <sys/kernel.h>
45#include <sys/lock.h>
46#include <sys/malloc.h>
47#include <sys/mbuf.h>
48#include <sys/mutex.h>
49#include <sys/protosw.h>
50#include <sys/queue.h>
51#include <sys/socket.h>
52#include <sys/socketvar.h>
53#include <sys/sysctl.h>
54#include <sys/taskqueue.h>
55
56#include <net/vnet.h>
57
58#include <netgraph/ng_message.h>
59#include <netgraph/netgraph.h>
65
66/* MALLOC define */
67#ifdef NG_SEPARATE_MALLOC
68static MALLOC_DEFINE(M_NETGRAPH_BTSOCKET_L2CAP, "netgraph_btsocks_l2cap",
69 "Netgraph Bluetooth L2CAP sockets");
70#else
71#define M_NETGRAPH_BTSOCKET_L2CAP M_NETGRAPH
72#endif /* NG_SEPARATE_MALLOC */
73
74/* Netgraph node methods */
82
83static void ng_btsocket_l2cap_input (void *, int);
84static void ng_btsocket_l2cap_rtclean (void *, int);
85
86/* Netgraph type descriptor */
87static struct ng_type typestruct = {
97};
98
99/* Globals */
100extern int ifqmaxlen;
106static LIST_HEAD(, ng_btsocket_l2cap_pcb) ng_btsocket_l2cap_sockets;
107static struct mtx ng_btsocket_l2cap_sockets_mtx;
108static LIST_HEAD(, ng_btsocket_l2cap_rtentry) ng_btsocket_l2cap_rt;
109static struct mtx ng_btsocket_l2cap_rt_mtx;
110static struct task ng_btsocket_l2cap_rt_task;
111static struct timeval ng_btsocket_l2cap_lasttime;
112static int ng_btsocket_l2cap_curpps;
113
114/* Sysctl tree */
115SYSCTL_DECL(_net_bluetooth_l2cap_sockets);
116static SYSCTL_NODE(_net_bluetooth_l2cap_sockets, OID_AUTO, seq,
117 CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
118 "Bluetooth SEQPACKET L2CAP sockets family");
119SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, debug_level,
120 CTLFLAG_RW,
122 "Bluetooth SEQPACKET L2CAP sockets debug level");
123SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_len,
124 CTLFLAG_RD,
126 "Bluetooth SEQPACKET L2CAP sockets input queue length");
127SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_maxlen,
128 CTLFLAG_RD,
130 "Bluetooth SEQPACKET L2CAP sockets input queue max. length");
131SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_drops,
132 CTLFLAG_RD,
134 "Bluetooth SEQPACKET L2CAP sockets input queue drops");
135
136/* Debug */
137#define NG_BTSOCKET_L2CAP_INFO \
138 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_INFO_LEVEL && \
139 ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
140 printf
141
142#define NG_BTSOCKET_L2CAP_WARN \
143 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_WARN_LEVEL && \
144 ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
145 printf
146
147#define NG_BTSOCKET_L2CAP_ERR \
148 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ERR_LEVEL && \
149 ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
150 printf
151
152#define NG_BTSOCKET_L2CAP_ALERT \
153 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ALERT_LEVEL && \
154 ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
155 printf
156
157/*
158 * Netgraph message processing routines
159 */
160
167
174
179
182
183/*
184 * Send L2CA_xxx messages to the lower layer
185 */
186
190 (u_int32_t, ng_btsocket_l2cap_rtentry_p, bdaddr_p, int, int, int, int);
196 (u_int32_t, ng_btsocket_l2cap_pcb_p);
197
200
201/*
202 * Timeout processing routines
203 */
204
207static void ng_btsocket_l2cap_process_timeout (void *);
208
209/*
210 * Other stuff
211 */
212
216static int ng_btsocket_l2cap_result2errno(int);
217
218static int ng_btsock_l2cap_addrtype_to_linktype(int addrtype);
219
220#define ng_btsocket_l2cap_wakeup_input_task() \
221 taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_queue_task)
222
223#define ng_btsocket_l2cap_wakeup_route_task() \
224 taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_rt_task)
225
226int ng_btsock_l2cap_addrtype_to_linktype(int addrtype)
227{
228 switch(addrtype){
229 case BDADDR_LE_PUBLIC:
231 case BDADDR_LE_RANDOM:
233 default:
234 return NG_HCI_LINK_ACL;
235 }
236}
237
238/*****************************************************************************
239 *****************************************************************************
240 ** Netgraph node interface
241 *****************************************************************************
242 *****************************************************************************/
243
244/*
245 * Netgraph node constructor. Do not allow to create node of this type.
246 */
247
248static int
250{
251 return (EINVAL);
252} /* ng_btsocket_l2cap_node_constructor */
253
254/*
255 * Do local shutdown processing. Let old node go and create new fresh one.
256 */
257
258static int
260{
261 int error = 0;
262
263 NG_NODE_UNREF(node);
264
265 /* Create new node */
267 if (error != 0) {
269"%s: Could not create Netgraph node, error=%d\n", __func__, error);
270
272
273 return (error);
274 }
275
278 if (error != 0) {
280"%s: Could not name Netgraph node, error=%d\n", __func__, error);
281
284
285 return (error);
286 }
287
288 return (0);
289} /* ng_btsocket_l2cap_node_shutdown */
290
291/*
292 * We allow any hook to be connected to the node.
293 */
294
295static int
297{
298 return (0);
299} /* ng_btsocket_l2cap_node_newhook */
300
301/*
302 * Just say "YEP, that's OK by me!"
303 */
304
305static int
307{
308 NG_HOOK_SET_PRIVATE(hook, NULL);
309 NG_HOOK_REF(hook); /* Keep extra reference to the hook */
310
311#if 0
314#endif
315
316 return (0);
317} /* ng_btsocket_l2cap_node_connect */
318
319/*
320 * Hook disconnection. Schedule route cleanup task
321 */
322
323static int
325{
326 /*
327 * If hook has private information than we must have this hook in
328 * the routing table and must schedule cleaning for the routing table.
329 * Otherwise hook was connected but we never got "hook_info" message,
330 * so we have never added this hook to the routing table and it save
331 * to just delete it.
332 */
333
334 if (NG_HOOK_PRIVATE(hook) != NULL)
336
337 NG_HOOK_UNREF(hook); /* Remove extra reference */
338
339 return (0);
340} /* ng_btsocket_l2cap_node_disconnect */
341
342/*
343 * Process incoming messages
344 */
345
346static int
348{
349 struct ng_mesg *msg = NGI_MSG(item); /* item still has message */
350 int error = 0;
351
352 if (msg != NULL && msg->header.typecookie == NGM_L2CAP_COOKIE) {
356"%s: Input queue is full (msg)\n", __func__);
357
359 NG_FREE_ITEM(item);
360 error = ENOBUFS;
361 } else {
362 if (hook != NULL) {
363 NG_HOOK_REF(hook);
364 NGI_SET_HOOK(item, hook);
365 }
366
369 }
370 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
371 } else {
372 NG_FREE_ITEM(item);
373 error = EINVAL;
374 }
375
376 return (error);
377} /* ng_btsocket_l2cap_node_rcvmsg */
378
379/*
380 * Receive data on a hook
381 */
382
383static int
385{
386 int error = 0;
387
391"%s: Input queue is full (data)\n", __func__);
392
394 NG_FREE_ITEM(item);
395 error = ENOBUFS;
396 } else {
397 NG_HOOK_REF(hook);
398 NGI_SET_HOOK(item, hook);
399
402 }
403 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
404
405 return (error);
406} /* ng_btsocket_l2cap_node_rcvdata */
407
408/*
409 * Process L2CA_Connect respose. Socket layer must have initiated connection,
410 * so we have to have a socket associated with message token.
411 */
412
413static int
416{
417 ng_l2cap_l2ca_con_op *op = NULL;
418 ng_btsocket_l2cap_pcb_t *pcb = NULL;
419 int error = 0;
420
421 if (msg->header.arglen != sizeof(*op))
422 return (EMSGSIZE);
423
424 op = (ng_l2cap_l2ca_con_op *)(msg->data);
425
426 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
427
428 /* Look for the socket with the token */
430 if (pcb == NULL) {
431 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
432 return (ENOENT);
433 }
434
435 mtx_lock(&pcb->pcb_mtx);
436
438"%s: Got L2CA_Connect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
439"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, status=%d, " \
440"state=%d\n", __func__, msg->header.token,
441 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
442 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
443 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
444 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
445 pcb->psm, op->lcid, op->result, op->status,
446 pcb->state);
447
449 mtx_unlock(&pcb->pcb_mtx);
450 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
451
452 return (ENOENT);
453 }
454
456
457 if (op->result == NG_L2CAP_PENDING) {
459 mtx_unlock(&pcb->pcb_mtx);
460 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
461
462 return (0);
463 }
464
465 if (op->result == NG_L2CAP_SUCCESS){
466 if((pcb->idtype == NG_L2CAP_L2CA_IDTYPE_ATT)||
468 pcb->encryption = op->encryption; pcb->cid = op->lcid;
469 if(pcb->need_encrypt && !(pcb->encryption)){
472 }else{
474 soisconnected(pcb->so);
475 }
476 }else{
477 /*
478 * Channel is now open, so update local channel ID and
479 * start configuration process. Source and destination
480 * addresses as well as route must be already set.
481 */
482
483 pcb->cid = op->lcid;
484 pcb->encryption = op->encryption;
486 if (error != 0) {
487 /* Send disconnect request with "zero" token */
489
490 /* ... and close the socket */
492 soisdisconnected(pcb->so);
493 } else {
496
498 }
499 }
500 } else {
501 /*
502 * We have failed to open connection, so convert result
503 * code to "errno" code and disconnect the socket. Channel
504 * already has been closed.
505 */
506
507 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
509 soisdisconnected(pcb->so);
510 }
511 mtx_unlock(&pcb->pcb_mtx);
512 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
513
514 return (error);
515} /* ng_btsocket_l2cap_process_l2ca_con_req_rsp */
516
517/*
518 * Process L2CA_ConnectRsp response
519 */
520
521static int
524{
525 ng_l2cap_l2ca_con_rsp_op *op = NULL;
526 ng_btsocket_l2cap_pcb_t *pcb = NULL;
527
528 if (msg->header.arglen != sizeof(*op))
529 return (EMSGSIZE);
530
531 op = (ng_l2cap_l2ca_con_rsp_op *)(msg->data);
532
533 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
534
535 /* Look for the socket with the token */
537 if (pcb == NULL) {
538 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
539 return (ENOENT);
540 }
541
542 mtx_lock(&pcb->pcb_mtx);
543
545"%s: Got L2CA_ConnectRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
546"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
547 __func__, msg->header.token,
548 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
549 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
550 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
551 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
552 pcb->psm, pcb->cid, op->result, pcb->state);
553
555 mtx_unlock(&pcb->pcb_mtx);
556 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
557
558 return (ENOENT);
559 }
560
562
563 /* Check the result and disconnect the socket on failure */
564 if (op->result != NG_L2CAP_SUCCESS) {
565 /* Close the socket - channel already closed */
566 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
568 soisdisconnected(pcb->so);
569 } else {
570 /* Move to CONFIGURING state and wait for CONFIG_IND */
571 pcb->cfg_state = 0;
574 }
575
576 mtx_unlock(&pcb->pcb_mtx);
577 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
578
579 return (0);
580} /* ng_btsocket_process_l2ca_con_rsp_rsp */
581
582/*
583 * Process L2CA_Connect indicator. Find socket that listens on address
584 * and PSM. Find exact or closest match. Create new socket and initiate
585 * connection.
586 */
587
588static int
591{
592 ng_l2cap_l2ca_con_ind_ip *ip = NULL;
593 ng_btsocket_l2cap_pcb_t *pcb = NULL, *pcb1 = NULL;
594 int error = 0;
595 u_int32_t token = 0;
596 u_int16_t result = 0;
597
598 if (msg->header.arglen != sizeof(*ip))
599 return (EMSGSIZE);
600
601 ip = (ng_l2cap_l2ca_con_ind_ip *)(msg->data);
602
604"%s: Got L2CA_Connect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
605"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, ident=%d\n",
606 __func__,
607 rt->src.b[5], rt->src.b[4], rt->src.b[3],
608 rt->src.b[2], rt->src.b[1], rt->src.b[0],
609 ip->bdaddr.b[5], ip->bdaddr.b[4], ip->bdaddr.b[3],
610 ip->bdaddr.b[2], ip->bdaddr.b[1], ip->bdaddr.b[0],
611 ip->psm, ip->lcid, ip->ident);
612
613 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
614
615 pcb = ng_btsocket_l2cap_pcb_by_addr(&rt->src, ip->psm);
616 if (pcb != NULL) {
617 struct socket *so1;
618
619 mtx_lock(&pcb->pcb_mtx);
620
621 CURVNET_SET(pcb->so->so_vnet);
622 so1 = sonewconn(pcb->so, 0);
623 CURVNET_RESTORE();
624 if (so1 == NULL) {
625 result = NG_L2CAP_NO_RESOURCES;
626 goto respond;
627 }
628
629 /*
630 * If we got here than we have created new socket. So complete
631 * connection. If we we listening on specific address then copy
632 * source address from listening socket, otherwise copy source
633 * address from hook's routing information.
634 */
635
636 pcb1 = so2l2cap_pcb(so1);
637 KASSERT((pcb1 != NULL),
638("%s: pcb1 == NULL\n", __func__));
639
640 mtx_lock(&pcb1->pcb_mtx);
641
642 if (bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src)) != 0)
643 bcopy(&pcb->src, &pcb1->src, sizeof(pcb1->src));
644 else
645 bcopy(&rt->src, &pcb1->src, sizeof(pcb1->src));
646
647 pcb1->flags &= ~NG_BTSOCKET_L2CAP_CLIENT;
648
649 bcopy(&ip->bdaddr, &pcb1->dst, sizeof(pcb1->dst));
650 pcb1->psm = ip->psm;
651 pcb1->cid = ip->lcid;
652 pcb1->rt = rt;
653
654 /* Copy socket settings */
655 pcb1->imtu = pcb->imtu;
656 bcopy(&pcb->oflow, &pcb1->oflow, sizeof(pcb1->oflow));
657 pcb1->flush_timo = pcb->flush_timo;
658
659 token = pcb1->token;
660 } else
661 /* Nobody listens on requested BDADDR/PSM */
663
664respond:
666 &ip->bdaddr,
667 ip->ident, ip->lcid,
668 result,ip->linktype);
669 if (pcb1 != NULL) {
670 if (error != 0) {
671 pcb1->so->so_error = error;
672 pcb1->state = NG_BTSOCKET_L2CAP_CLOSED;
673 soisdisconnected(pcb1->so);
674 } else {
675 pcb1->state = NG_BTSOCKET_L2CAP_CONNECTING;
676 soisconnecting(pcb1->so);
677
679 }
680
681 mtx_unlock(&pcb1->pcb_mtx);
682 }
683
684 if (pcb != NULL)
685 mtx_unlock(&pcb->pcb_mtx);
686
687 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
688
689 return (error);
690} /* ng_btsocket_l2cap_process_l2ca_con_ind */
691/*Encryption Change*/
693{
694 ng_l2cap_l2ca_enc_chg_op *op = NULL;
695 ng_btsocket_l2cap_pcb_t *pcb = NULL;
696
697 if (msg->header.arglen != sizeof(*op))
698 return (EMSGSIZE);
699
700 op = (ng_l2cap_l2ca_enc_chg_op *)(msg->data);
701
702 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
703
704 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, op->lcid,
705 op->idtype);
706 if (pcb == NULL) {
707 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
708 return (ENOENT);
709 }
710
711 mtx_lock(&pcb->pcb_mtx);
712 pcb->encryption = op->result;
713
714 if(pcb->need_encrypt){
717 NG_BTSOCKET_L2CAP_WARN("%s: Invalid pcb status %d",
718 __func__, pcb->state);
719 }else if(pcb->encryption){
721 soisconnected(pcb->so);
722 }else{
723 pcb->so->so_error = EPERM;
726 soisdisconnected(pcb->so);
727 }
728 }
729 mtx_unlock(&pcb->pcb_mtx);
730 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
731
732 return 0;
733}
734/*
735 * Process L2CA_Config response
736 */
737
738static int
741{
742 ng_l2cap_l2ca_cfg_op *op = NULL;
743 ng_btsocket_l2cap_pcb_p pcb = NULL;
744
745 if (msg->header.arglen != sizeof(*op))
746 return (EMSGSIZE);
747
748 op = (ng_l2cap_l2ca_cfg_op *)(msg->data);
749
750 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
751
752 /*
753 * Socket must have issued a Configure request, so we must have a
754 * socket that wants to be configured. Use Netgraph message token
755 * to find it
756 */
757
759 if (pcb == NULL) {
760 /*
761 * XXX FIXME what to do here? We could not find a
762 * socket with requested token. We even can not send
763 * Disconnect, because we do not know channel ID
764 */
765
766 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
767 return (ENOENT);
768 }
769
770 mtx_lock(&pcb->pcb_mtx);
771
773"%s: Got L2CA_Config response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
774"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
775"cfg_state=%x\n",
776 __func__, msg->header.token,
777 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
778 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
779 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
780 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
781 pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
782
784 mtx_unlock(&pcb->pcb_mtx);
785 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
786
787 return (ENOENT);
788 }
789
790 if (op->result == NG_L2CAP_SUCCESS) {
791 /*
792 * XXX FIXME Actually set flush and link timeout.
793 * Set QoS here if required. Resolve conficts (flush_timo).
794 * Save incoming MTU (peer's outgoing MTU) and outgoing flow
795 * spec.
796 */
797
798 pcb->imtu = op->imtu;
799 bcopy(&op->oflow, &pcb->oflow, sizeof(pcb->oflow));
800 pcb->flush_timo = op->flush_timo;
801
802 /*
803 * We have configured incoming side, so record it and check
804 * if configuration is complete. If complete then mark socket
805 * as connected, otherwise wait for the peer.
806 */
807
808 pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_IN_SENT;
810
812 /* Configuration complete - mark socket as open */
815 soisconnected(pcb->so);
816 }
817 } else {
818 /*
819 * Something went wrong. Could be unacceptable parameters,
820 * reject or unknown option. That's too bad, but we will
821 * not negotiate. Send Disconnect and close the channel.
822 */
823
825
826 switch (op->result) {
829 pcb->so->so_error = EINVAL;
830 break;
831
832 default:
833 pcb->so->so_error = ECONNRESET;
834 break;
835 }
836
837 /* Send disconnect with "zero" token */
839
840 /* ... and close the socket */
842 soisdisconnected(pcb->so);
843 }
844
845 mtx_unlock(&pcb->pcb_mtx);
846 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
847
848 return (0);
849} /* ng_btsocket_l2cap_process_l2ca_cfg_req_rsp */
850
851/*
852 * Process L2CA_ConfigRsp response
853 */
854
855static int
858{
859 ng_l2cap_l2ca_cfg_rsp_op *op = NULL;
860 ng_btsocket_l2cap_pcb_t *pcb = NULL;
861 int error = 0;
862
863 if (msg->header.arglen != sizeof(*op))
864 return (EMSGSIZE);
865
866 op = (ng_l2cap_l2ca_cfg_rsp_op *)(msg->data);
867
868 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
869
870 /* Look for the socket with the token */
872 if (pcb == NULL) {
873 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
874 return (ENOENT);
875 }
876
877 mtx_lock(&pcb->pcb_mtx);
878
880"%s: Got L2CA_ConfigRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
881"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
882"cfg_state=%x\n",
883 __func__, msg->header.token,
884 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
885 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
886 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
887 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
888 pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
889
891 mtx_unlock(&pcb->pcb_mtx);
892 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
893
894 return (ENOENT);
895 }
896
897 /* Check the result and disconnect socket of failure */
898 if (op->result != NG_L2CAP_SUCCESS)
899 goto disconnect;
900
901 /*
902 * Now we done with remote side configuration. Configure local
903 * side if we have not done it yet.
904 */
905
906 pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
908
910 /* Configuration complete - mask socket as open */
913 soisconnected(pcb->so);
914 } else {
916 /* Send L2CA_Config request - incoming path */
918 if (error != 0)
919 goto disconnect;
920
922 }
923 }
924
925 mtx_unlock(&pcb->pcb_mtx);
926 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
927
928 return (error);
929
930disconnect:
932
933 /* Send disconnect with "zero" token */
935
936 /* ... and close the socket */
938 soisdisconnected(pcb->so);
939
940 mtx_unlock(&pcb->pcb_mtx);
941 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
942
943 return (error);
944} /* ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp */
945
946/*
947 * Process L2CA_Config indicator
948 */
949
950static int
953{
954 ng_l2cap_l2ca_cfg_ind_ip *ip = NULL;
955 ng_btsocket_l2cap_pcb_t *pcb = NULL;
956 int error = 0;
957
958 if (msg->header.arglen != sizeof(*ip))
959 return (EMSGSIZE);
960
961 ip = (ng_l2cap_l2ca_cfg_ind_ip *)(msg->data);
962
963 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
964
965 /* Check for the open socket that has given channel ID */
966 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid,
968 if (pcb == NULL) {
969 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
970 return (ENOENT);
971 }
972
973 mtx_lock(&pcb->pcb_mtx);
974
976"%s: Got L2CA_Config indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
977"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d, cfg_state=%x\n",
978 __func__,
979 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
980 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
981 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
982 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
983 pcb->psm, pcb->cid, pcb->state, pcb->cfg_state);
984
985 /* XXX FIXME re-configuration on open socket */
987 mtx_unlock(&pcb->pcb_mtx);
988 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
989
990 return (ENOENT);
991 }
992
993 /*
994 * XXX FIXME Actually set flush and link timeout. Set QoS here if
995 * required. Resolve conficts (flush_timo). Note outgoing MTU (peer's
996 * incoming MTU) and incoming flow spec.
997 */
998
999 pcb->omtu = ip->omtu;
1000 bcopy(&ip->iflow, &pcb->iflow, sizeof(pcb->iflow));
1001 pcb->flush_timo = ip->flush_timo;
1002
1003 /*
1004 * Send L2CA_Config response to our peer and check for the errors,
1005 * if any send disconnect to close the channel.
1006 */
1007
1010 if (error != 0) {
1012
1013 pcb->so->so_error = error;
1014
1015 /* Send disconnect with "zero" token */
1017
1018 /* ... and close the socket */
1020 soisdisconnected(pcb->so);
1021 } else
1023 }
1024
1025 mtx_unlock(&pcb->pcb_mtx);
1026 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1027
1028 return (error);
1029} /* ng_btsocket_l2cap_process_l2cap_cfg_ind */
1030
1031/*
1032 * Process L2CA_Disconnect response
1033 */
1034
1035static int
1038{
1039 ng_l2cap_l2ca_discon_op *op = NULL;
1040 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1041
1042 /* Check message */
1043 if (msg->header.arglen != sizeof(*op))
1044 return (EMSGSIZE);
1045
1046 op = (ng_l2cap_l2ca_discon_op *)(msg->data);
1047
1048 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1049
1050 /*
1051 * Socket layer must have issued L2CA_Disconnect request, so there
1052 * must be a socket that wants to be disconnected. Use Netgraph
1053 * message token to find it.
1054 */
1055
1057 if (pcb == NULL) {
1058 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1059 return (0);
1060 }
1061
1062 mtx_lock(&pcb->pcb_mtx);
1063
1064 /* XXX Close socket no matter what op->result says */
1065 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
1067"%s: Got L2CA_Disconnect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1068"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
1069 __func__, msg->header.token,
1070 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1071 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1072 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1073 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1074 pcb->psm, pcb->cid, op->result, pcb->state);
1075
1077
1079 soisdisconnected(pcb->so);
1080 }
1081
1082 mtx_unlock(&pcb->pcb_mtx);
1083 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1084
1085 return (0);
1086} /* ng_btsocket_l2cap_process_l2ca_discon_rsp */
1087
1088/*
1089 * Process L2CA_Disconnect indicator
1090 */
1091
1092static int
1095{
1096 ng_l2cap_l2ca_discon_ind_ip *ip = NULL;
1097 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1098
1099 /* Check message */
1100 if (msg->header.arglen != sizeof(*ip))
1101 return (EMSGSIZE);
1102
1103 ip = (ng_l2cap_l2ca_discon_ind_ip *)(msg->data);
1104
1105 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1106
1107 /* Look for the socket with given channel ID */
1108 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid,
1109 ip->idtype);
1110 if (pcb == NULL) {
1111 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1112 return (0);
1113 }
1114
1115 /*
1116 * Channel has already been destroyed, so disconnect the socket
1117 * and be done with it. If there was any pending request we can
1118 * not do anything here anyway.
1119 */
1120
1121 mtx_lock(&pcb->pcb_mtx);
1122
1124"%s: Got L2CA_Disconnect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1125"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d\n",
1126 __func__,
1127 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1128 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1129 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1130 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1131 pcb->psm, pcb->cid, pcb->state);
1132
1133 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1135
1137 soisdisconnected(pcb->so);
1138
1139 mtx_unlock(&pcb->pcb_mtx);
1140 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1141
1142 return (0);
1143} /* ng_btsocket_l2cap_process_l2ca_discon_ind */
1144
1145/*
1146 * Process L2CA_Write response
1147 */
1148
1149static int
1152{
1153 ng_l2cap_l2ca_write_op *op = NULL;
1154 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1155
1156 /* Check message */
1157 if (msg->header.arglen != sizeof(*op))
1158 return (EMSGSIZE);
1159
1160 op = (ng_l2cap_l2ca_write_op *)(msg->data);
1161
1162 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1163
1164 /* Look for the socket with given token */
1166 if (pcb == NULL) {
1167 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1168 return (ENOENT);
1169 }
1170
1171 mtx_lock(&pcb->pcb_mtx);
1172
1174"%s: Got L2CA_Write response, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1175"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, length=%d, " \
1176"state=%d\n", __func__,
1177 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1178 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1179 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1180 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1181 pcb->psm, pcb->cid, op->result, op->length,
1182 pcb->state);
1183
1184 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1185 mtx_unlock(&pcb->pcb_mtx);
1186 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1187
1188 return (ENOENT);
1189 }
1190
1192
1193 /*
1194 * Check if we have more data to send
1195 */
1196 sbdroprecord(&pcb->so->so_snd);
1197 if (sbavail(&pcb->so->so_snd) > 0) {
1198 if (ng_btsocket_l2cap_send2(pcb) == 0)
1200 else
1201 sbdroprecord(&pcb->so->so_snd); /* XXX */
1202 }
1203
1204 /*
1205 * Now set the result, drop packet from the socket send queue and
1206 * ask for more (wakeup sender)
1207 */
1208
1209 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
1210 sowwakeup(pcb->so);
1211
1212 mtx_unlock(&pcb->pcb_mtx);
1213 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1214
1215 return (0);
1216} /* ng_btsocket_l2cap_process_l2ca_write_rsp */
1217
1218/*
1219 * Send L2CA_Connect request
1220 */
1221
1222static int
1224{
1225 struct ng_mesg *msg = NULL;
1226 ng_l2cap_l2ca_con_ip *ip = NULL;
1227 int error = 0;
1228
1229 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1230
1231 if (pcb->rt == NULL ||
1232 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1233 return (ENETDOWN);
1234
1236 sizeof(*ip), M_NOWAIT);
1237 if (msg == NULL)
1238 return (ENOMEM);
1239
1240 msg->header.token = pcb->token;
1241
1242 ip = (ng_l2cap_l2ca_con_ip *)(msg->data);
1243 bcopy(&pcb->dst, &ip->bdaddr, sizeof(ip->bdaddr));
1244 ip->psm = pcb->psm;
1245 ip->linktype = ng_btsock_l2cap_addrtype_to_linktype(pcb->dsttype);
1246 ip->idtype = pcb->idtype;
1247 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1248
1249 return (error);
1250} /* ng_btsocket_l2cap_send_l2ca_con_req */
1251
1252/*
1253 * Send L2CA_Connect response
1254 */
1255
1256static int
1258 ng_btsocket_l2cap_rtentry_p rt, bdaddr_p dst, int ident,
1259 int lcid, int result, int linktype)
1260{
1261 struct ng_mesg *msg = NULL;
1262 ng_l2cap_l2ca_con_rsp_ip *ip = NULL;
1263 int error = 0;
1264
1265 if (rt == NULL || rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
1266 return (ENETDOWN);
1267
1269 sizeof(*ip), M_NOWAIT);
1270 if (msg == NULL)
1271 return (ENOMEM);
1272
1273 msg->header.token = token;
1274
1275 ip = (ng_l2cap_l2ca_con_rsp_ip *)(msg->data);
1276 bcopy(dst, &ip->bdaddr, sizeof(ip->bdaddr));
1277 ip->ident = ident;
1278 ip->lcid = lcid;
1279 ip->linktype = linktype;
1280 ip->result = result;
1281 ip->status = 0;
1282
1283 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, rt->hook, 0);
1284
1285 return (error);
1286} /* ng_btsocket_l2cap_send_l2ca_con_rsp_req */
1287
1288/*
1289 * Send L2CA_Config request
1290 */
1291
1292static int
1294{
1295 struct ng_mesg *msg = NULL;
1296 ng_l2cap_l2ca_cfg_ip *ip = NULL;
1297 int error = 0;
1298
1299 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1300
1301 if (pcb->rt == NULL ||
1302 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1303 return (ENETDOWN);
1304
1306 sizeof(*ip), M_NOWAIT);
1307 if (msg == NULL)
1308 return (ENOMEM);
1309
1310 msg->header.token = pcb->token;
1311
1312 ip = (ng_l2cap_l2ca_cfg_ip *)(msg->data);
1313 ip->lcid = pcb->cid;
1314 ip->imtu = pcb->imtu;
1315 bcopy(&pcb->oflow, &ip->oflow, sizeof(ip->oflow));
1316 ip->flush_timo = pcb->flush_timo;
1317 ip->link_timo = pcb->link_timo;
1318
1319 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1320
1321 return (error);
1322} /* ng_btsocket_l2cap_send_l2ca_cfg_req */
1323
1324/*
1325 * Send L2CA_Config response
1326 */
1327
1328static int
1330{
1331 struct ng_mesg *msg = NULL;
1332 ng_l2cap_l2ca_cfg_rsp_ip *ip = NULL;
1333 int error = 0;
1334
1335 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1336
1337 if (pcb->rt == NULL ||
1338 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1339 return (ENETDOWN);
1340
1342 sizeof(*ip), M_NOWAIT);
1343 if (msg == NULL)
1344 return (ENOMEM);
1345
1346 msg->header.token = pcb->token;
1347
1348 ip = (ng_l2cap_l2ca_cfg_rsp_ip *)(msg->data);
1349 ip->lcid = pcb->cid;
1350 ip->omtu = pcb->omtu;
1351 bcopy(&pcb->iflow, &ip->iflow, sizeof(ip->iflow));
1352
1353 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, pcb->rt->hook, 0);
1354
1355 return (error);
1356} /* ng_btsocket_l2cap_send_l2ca_cfg_rsp */
1357
1358/*
1359 * Send L2CA_Disconnect request
1360 */
1361
1362static int
1365{
1366 struct ng_mesg *msg = NULL;
1367 ng_l2cap_l2ca_discon_ip *ip = NULL;
1368 int error = 0;
1369
1370 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1371
1372 if (pcb->rt == NULL ||
1373 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1374 return (ENETDOWN);
1375
1377 sizeof(*ip), M_NOWAIT);
1378 if (msg == NULL)
1379 return (ENOMEM);
1380
1381 msg->header.token = token;
1382
1383 ip = (ng_l2cap_l2ca_discon_ip *)(msg->data);
1384 ip->lcid = pcb->cid;
1385 ip->idtype = pcb->idtype;
1386
1387 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1388
1389 return (error);
1390} /* ng_btsocket_l2cap_send_l2ca_discon_req */
1391
1392/*****************************************************************************
1393 *****************************************************************************
1394 ** Socket interface
1395 *****************************************************************************
1396 *****************************************************************************/
1397
1398/*
1399 * L2CAP sockets data input routine
1400 */
1401
1402static void
1404{
1405 ng_l2cap_hdr_t *hdr = NULL;
1406 ng_l2cap_clt_hdr_t *clt_hdr = NULL;
1407 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1408 ng_btsocket_l2cap_rtentry_t *rt = NULL;
1409 uint16_t idtype;
1410
1411 if (hook == NULL) {
1413"%s: Invalid source hook for L2CAP data packet\n", __func__);
1414 goto drop;
1415 }
1416
1418 if (rt == NULL) {
1420"%s: Could not find out source bdaddr for L2CAP data packet\n", __func__);
1421 goto drop;
1422 }
1423
1424 m = m_pullup(m, sizeof(uint16_t));
1425 idtype = *mtod(m, uint16_t *);
1426 m_adj(m, sizeof(uint16_t));
1427
1428 /* Make sure we can access header */
1429 if (m->m_pkthdr.len < sizeof(*hdr)) {
1431"%s: L2CAP data packet too small, len=%d\n", __func__, m->m_pkthdr.len);
1432 goto drop;
1433 }
1434
1435 if (m->m_len < sizeof(*hdr)) {
1436 m = m_pullup(m, sizeof(*hdr));
1437 if (m == NULL)
1438 goto drop;
1439 }
1440
1441 /* Strip L2CAP packet header and verify packet length */
1442 hdr = mtod(m, ng_l2cap_hdr_t *);
1443 m_adj(m, sizeof(*hdr));
1444
1445 if (hdr->length != m->m_pkthdr.len) {
1447"%s: Bad L2CAP data packet length, len=%d, length=%d\n",
1448 __func__, m->m_pkthdr.len, hdr->length);
1449 goto drop;
1450 }
1451
1452 /*
1453 * Now process packet. Two cases:
1454 *
1455 * 1) Normal packet (cid != 2) then find connected socket and append
1456 * mbuf to the socket queue. Wakeup socket.
1457 *
1458 * 2) Broadcast packet (cid == 2) then find all sockets that connected
1459 * to the given PSM and have SO_BROADCAST bit set and append mbuf
1460 * to the socket queue. Wakeup socket.
1461 */
1462
1464"%s: Received L2CAP data packet: src bdaddr=%x:%x:%x:%x:%x:%x, " \
1465"dcid=%d, length=%d\n",
1466 __func__,
1467 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1468 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1469 hdr->dcid, hdr->length);
1470
1471 if ((hdr->dcid >= NG_L2CAP_FIRST_CID) ||
1472 (idtype == NG_L2CAP_L2CA_IDTYPE_ATT)||
1473 (idtype == NG_L2CAP_L2CA_IDTYPE_SMP)
1474 ){
1475 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1476
1477 /* Normal packet: find connected socket */
1478 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, hdr->dcid,idtype);
1479 if (pcb == NULL) {
1480 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1481 goto drop;
1482 }
1483
1484 mtx_lock(&pcb->pcb_mtx);
1485
1486 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1488"%s: No connected socket found, src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, " \
1489"state=%d\n", __func__,
1490 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1491 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1492 hdr->dcid, pcb->state);
1493
1494 mtx_unlock(&pcb->pcb_mtx);
1495 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1496 goto drop;
1497 }
1498
1499 /* Check packet size against socket's incoming MTU */
1500 if (hdr->length > pcb->imtu) {
1502"%s: L2CAP data packet too big, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1503"dcid=%d, length=%d, imtu=%d\n",
1504 __func__,
1505 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1506 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1507 hdr->dcid, hdr->length, pcb->imtu);
1508
1509 mtx_unlock(&pcb->pcb_mtx);
1510 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1511 goto drop;
1512 }
1513
1514 /* Check if we have enough space in socket receive queue */
1515 if (m->m_pkthdr.len > sbspace(&pcb->so->so_rcv)) {
1516 /*
1517 * This is really bad. Receive queue on socket does
1518 * not have enough space for the packet. We do not
1519 * have any other choice but drop the packet. L2CAP
1520 * does not provide any flow control.
1521 */
1522
1524"%s: Not enough space in socket receive queue. Dropping L2CAP data packet, " \
1525"src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, len=%d, space=%ld\n",
1526 __func__,
1527 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1528 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1529 hdr->dcid, m->m_pkthdr.len,
1530 sbspace(&pcb->so->so_rcv));
1531
1532 mtx_unlock(&pcb->pcb_mtx);
1533 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1534 goto drop;
1535 }
1536
1537 /* Append packet to the socket receive queue and wakeup */
1538 sbappendrecord(&pcb->so->so_rcv, m);
1539 m = NULL;
1540
1541 sorwakeup(pcb->so);
1542
1543 mtx_unlock(&pcb->pcb_mtx);
1544 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1545 } else if (hdr->dcid == NG_L2CAP_CLT_CID) {
1546 /* Broadcast packet: give packet to all sockets */
1547
1548 /* Check packet size against connectionless MTU */
1549 if (hdr->length > NG_L2CAP_MTU_DEFAULT) {
1551"%s: Connectionless L2CAP data packet too big, " \
1552"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1553 __func__,
1554 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1555 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1556 hdr->length);
1557 goto drop;
1558 }
1559
1560 /* Make sure we can access connectionless header */
1561 if (m->m_pkthdr.len < sizeof(*clt_hdr)) {
1563"%s: Can not get L2CAP connectionless packet header, " \
1564"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1565 __func__,
1566 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1567 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1568 hdr->length);
1569 goto drop;
1570 }
1571
1572 if (m->m_len < sizeof(*clt_hdr)) {
1573 m = m_pullup(m, sizeof(*clt_hdr));
1574 if (m == NULL)
1575 goto drop;
1576 }
1577
1578 /* Strip connectionless header and deliver packet */
1579 clt_hdr = mtod(m, ng_l2cap_clt_hdr_t *);
1580 m_adj(m, sizeof(*clt_hdr));
1581
1583"%s: Got L2CAP connectionless data packet, " \
1584"src bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, length=%d\n",
1585 __func__,
1586 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1587 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1588 clt_hdr->psm, hdr->length);
1589
1590 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1591
1592 LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next) {
1593 struct mbuf *copy = NULL;
1594
1595 mtx_lock(&pcb->pcb_mtx);
1596
1597 if (bcmp(&rt->src, &pcb->src, sizeof(pcb->src)) != 0 ||
1598 pcb->psm != clt_hdr->psm ||
1599 pcb->state != NG_BTSOCKET_L2CAP_OPEN ||
1600 (pcb->so->so_options & SO_BROADCAST) == 0 ||
1601 m->m_pkthdr.len > sbspace(&pcb->so->so_rcv))
1602 goto next;
1603
1604 /*
1605 * Create a copy of the packet and append it to the
1606 * socket's queue. If m_dup() failed - no big deal
1607 * it is a broadcast traffic after all
1608 */
1609
1610 copy = m_dup(m, M_NOWAIT);
1611 if (copy != NULL) {
1612 sbappendrecord(&pcb->so->so_rcv, copy);
1613 sorwakeup(pcb->so);
1614 }
1615next:
1616 mtx_unlock(&pcb->pcb_mtx);
1617 }
1618
1619 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1620 }
1621drop:
1622 NG_FREE_M(m); /* checks for m != NULL */
1623} /* ng_btsocket_l2cap_data_input */
1624
1625/*
1626 * L2CAP sockets default message input routine
1627 */
1628
1629static void
1631{
1632 switch (msg->header.cmd) {
1634 ng_btsocket_l2cap_rtentry_t *rt = NULL;
1637 if (hook == NULL || msg->header.arglen != sizeof(*ep))
1638 break;
1639
1640 if (bcmp(&ep->addr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
1641 break;
1642
1643 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1644
1646 if (rt == NULL) {
1647 rt = malloc(sizeof(*rt),
1648 M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT|M_ZERO);
1649 if (rt == NULL) {
1650 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1651 break;
1652 }
1653
1654 LIST_INSERT_HEAD(&ng_btsocket_l2cap_rt, rt, next);
1655
1656 NG_HOOK_SET_PRIVATE(hook, rt);
1657 }
1658
1659 bcopy(&ep->addr, &rt->src, sizeof(rt->src));
1660 rt->hook = hook;
1661
1662 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1663
1665"%s: Updating hook \"%s\", src bdaddr=%x:%x:%x:%x:%x:%x\n",
1666 __func__, NG_HOOK_NAME(hook),
1667 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1668 rt->src.b[2], rt->src.b[1], rt->src.b[0]);
1669 } break;
1670
1671 default:
1673"%s: Unknown message, cmd=%d\n", __func__, msg->header.cmd);
1674 break;
1675 }
1676
1677 NG_FREE_MSG(msg); /* Checks for msg != NULL */
1678} /* ng_btsocket_l2cap_default_msg_input */
1679
1680/*
1681 * L2CAP sockets L2CA message input routine
1682 */
1683
1684static void
1686{
1688
1689 if (hook == NULL) {
1691"%s: Invalid source hook for L2CA message\n", __func__);
1692 goto drop;
1693 }
1694
1696 if (rt == NULL) {
1698"%s: Could not find out source bdaddr for L2CA message\n", __func__);
1699 goto drop;
1700 }
1701
1702 switch (msg->header.cmd) {
1703 case NGM_L2CAP_L2CA_CON: /* L2CA_Connect response */
1705 break;
1706
1707 case NGM_L2CAP_L2CA_CON_RSP: /* L2CA_ConnectRsp response */
1709 break;
1710
1711 case NGM_L2CAP_L2CA_CON_IND: /* L2CA_Connect indicator */
1713 break;
1714
1715 case NGM_L2CAP_L2CA_CFG: /* L2CA_Config response */
1717 break;
1718
1719 case NGM_L2CAP_L2CA_CFG_RSP: /* L2CA_ConfigRsp response */
1721 break;
1722
1723 case NGM_L2CAP_L2CA_CFG_IND: /* L2CA_Config indicator */
1725 break;
1726
1727 case NGM_L2CAP_L2CA_DISCON: /* L2CA_Disconnect response */
1729 break;
1730
1731 case NGM_L2CAP_L2CA_DISCON_IND: /* L2CA_Disconnect indicator */
1733 break;
1734
1735 case NGM_L2CAP_L2CA_WRITE: /* L2CA_Write response */
1737 break;
1740
1741 break;
1742 /* XXX FIXME add other L2CA messages */
1743
1744 default:
1746"%s: Unknown L2CA message, cmd=%d\n", __func__, msg->header.cmd);
1747 break;
1748 }
1749drop:
1750 NG_FREE_MSG(msg);
1751} /* ng_btsocket_l2cap_l2ca_msg_input */
1752
1753/*
1754 * L2CAP sockets input routine
1755 */
1756
1757static void
1758ng_btsocket_l2cap_input(void *context, int pending)
1759{
1760 item_p item = NULL;
1761 hook_p hook = NULL;
1762
1763 for (;;) {
1764 mtx_lock(&ng_btsocket_l2cap_queue_mtx);
1766 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
1767
1768 if (item == NULL)
1769 break;
1770
1771 NGI_GET_HOOK(item, hook);
1772 if (hook != NULL && NG_HOOK_NOT_VALID(hook))
1773 goto drop;
1774
1775 switch(item->el_flags & NGQF_TYPE) {
1776 case NGQF_DATA: {
1777 struct mbuf *m = NULL;
1778
1779 NGI_GET_M(item, m);
1781 } break;
1782
1783 case NGQF_MESG: {
1784 struct ng_mesg *msg = NULL;
1785
1786 NGI_GET_MSG(item, msg);
1787
1788 switch (msg->header.cmd) {
1789 case NGM_L2CAP_L2CA_CON:
1792 case NGM_L2CAP_L2CA_CFG:
1799 /* XXX FIXME add other L2CA messages */
1801 break;
1802
1803 default:
1805 break;
1806 }
1807 } break;
1808
1809 default:
1810 KASSERT(0,
1811("%s: invalid item type=%ld\n", __func__, (item->el_flags & NGQF_TYPE)));
1812 break;
1813 }
1814drop:
1815 if (hook != NULL)
1816 NG_HOOK_UNREF(hook);
1817
1818 NG_FREE_ITEM(item);
1819 }
1820} /* ng_btsocket_l2cap_input */
1821
1822/*
1823 * Route cleanup task. Gets scheduled when hook is disconnected. Here we
1824 * will find all sockets that use "invalid" hook and disconnect them.
1825 */
1826
1827static void
1828ng_btsocket_l2cap_rtclean(void *context, int pending)
1829{
1830 ng_btsocket_l2cap_pcb_p pcb = NULL, pcb_next = NULL;
1832
1833 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1834 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1835
1836 /*
1837 * First disconnect all sockets that use "invalid" hook
1838 */
1839
1840 for (pcb = LIST_FIRST(&ng_btsocket_l2cap_sockets); pcb != NULL; ) {
1841 mtx_lock(&pcb->pcb_mtx);
1842 pcb_next = LIST_NEXT(pcb, next);
1843
1844 if (pcb->rt != NULL &&
1845 pcb->rt->hook != NULL && NG_HOOK_NOT_VALID(pcb->rt->hook)) {
1846 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1848
1849 pcb->so->so_error = ENETDOWN;
1851 soisdisconnected(pcb->so);
1852
1853 pcb->token = 0;
1854 pcb->cid = 0;
1855 pcb->rt = NULL;
1856 }
1857
1858 mtx_unlock(&pcb->pcb_mtx);
1859 pcb = pcb_next;
1860 }
1861
1862 /*
1863 * Now cleanup routing table
1864 */
1865
1866 for (rt = LIST_FIRST(&ng_btsocket_l2cap_rt); rt != NULL; ) {
1867 ng_btsocket_l2cap_rtentry_p rt_next = LIST_NEXT(rt, next);
1868
1869 if (rt->hook != NULL && NG_HOOK_NOT_VALID(rt->hook)) {
1870 LIST_REMOVE(rt, next);
1871
1872 NG_HOOK_SET_PRIVATE(rt->hook, NULL);
1873 NG_HOOK_UNREF(rt->hook); /* Remove extra reference */
1874
1875 bzero(rt, sizeof(*rt));
1876 free(rt, M_NETGRAPH_BTSOCKET_L2CAP);
1877 }
1878
1879 rt = rt_next;
1880 }
1881
1882 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1883 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1884} /* ng_btsocket_l2cap_rtclean */
1885
1886/*
1887 * Initialize everything
1888 */
1889
1890static void
1891ng_btsocket_l2cap_init(void *arg __unused)
1892{
1893 int error = 0;
1894
1897
1898 /* Register Netgraph node type */
1899 error = ng_newtype(&typestruct);
1900 if (error != 0) {
1902"%s: Could not register Netgraph node type, error=%d\n", __func__, error);
1903
1904 return;
1905 }
1906
1907 /* Create Netgrapg node */
1909 if (error != 0) {
1911"%s: Could not create Netgraph node, error=%d\n", __func__, error);
1912
1914
1915 return;
1916 }
1917
1920 if (error != 0) {
1922"%s: Could not name Netgraph node, error=%d\n", __func__, error);
1923
1926
1927 return;
1928 }
1929
1930 /* Create input queue */
1933 "btsocks_l2cap_queue_mtx", NULL, MTX_DEF);
1934 TASK_INIT(&ng_btsocket_l2cap_queue_task, 0,
1936
1937 /* Create list of sockets */
1938 LIST_INIT(&ng_btsocket_l2cap_sockets);
1939 mtx_init(&ng_btsocket_l2cap_sockets_mtx,
1940 "btsocks_l2cap_sockets_mtx", NULL, MTX_DEF);
1941
1942 /* Routing table */
1943 LIST_INIT(&ng_btsocket_l2cap_rt);
1944 mtx_init(&ng_btsocket_l2cap_rt_mtx,
1945 "btsocks_l2cap_rt_mtx", NULL, MTX_DEF);
1946 TASK_INIT(&ng_btsocket_l2cap_rt_task, 0,
1948} /* ng_btsocket_l2cap_init */
1949SYSINIT(ng_btsocket_l2cap_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD,
1951
1952/*
1953 * Abort connection on socket
1954 */
1955
1956void
1957ng_btsocket_l2cap_abort(struct socket *so)
1958{
1959 so->so_error = ECONNABORTED;
1960
1962} /* ng_btsocket_l2cap_abort */
1963
1964void
1965ng_btsocket_l2cap_close(struct socket *so)
1966{
1967
1969} /* ng_btsocket_l2cap_close */
1970
1971/*
1972 * Accept connection on socket. Nothing to do here, socket must be connected
1973 * and ready, so just return peer address and be done with it.
1974 */
1975
1976int
1977ng_btsocket_l2cap_accept(struct socket *so, struct sockaddr **nam)
1978{
1979 if (ng_btsocket_l2cap_node == NULL)
1980 return (EINVAL);
1981
1982 return (ng_btsocket_l2cap_peeraddr(so, nam));
1983} /* ng_btsocket_l2cap_accept */
1984
1985/*
1986 * Create and attach new socket
1987 */
1988
1989int
1990ng_btsocket_l2cap_attach(struct socket *so, int proto, struct thread *td)
1991{
1992 static u_int32_t token = 0;
1994 int error;
1995
1996 /* Check socket and protocol */
1997 if (ng_btsocket_l2cap_node == NULL)
1998 return (EPROTONOSUPPORT);
1999 if (so->so_type != SOCK_SEQPACKET)
2000 return (ESOCKTNOSUPPORT);
2001
2002#if 0 /* XXX sonewconn() calls "pru_attach" with proto == 0 */
2003 if (proto != 0)
2004 if (proto != BLUETOOTH_PROTO_L2CAP)
2005 return (EPROTONOSUPPORT);
2006#endif /* XXX */
2007
2008 if (pcb != NULL)
2009 return (EISCONN);
2010
2011 /* Reserve send and receive space if it is not reserved yet */
2012 if ((so->so_snd.sb_hiwat == 0) || (so->so_rcv.sb_hiwat == 0)) {
2013 error = soreserve(so, NG_BTSOCKET_L2CAP_SENDSPACE,
2015 if (error != 0)
2016 return (error);
2017 }
2018
2019 /* Allocate the PCB */
2020 pcb = malloc(sizeof(*pcb),
2021 M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT | M_ZERO);
2022 if (pcb == NULL)
2023 return (ENOMEM);
2024
2025 /* Link the PCB and the socket */
2026 so->so_pcb = (caddr_t) pcb;
2027 pcb->so = so;
2029
2030 /* Initialize PCB */
2031 pcb->imtu = pcb->omtu = NG_L2CAP_MTU_DEFAULT;
2032
2033 /* Default flow */
2034 pcb->iflow.flags = 0x0;
2035 pcb->iflow.service_type = NG_HCI_SERVICE_TYPE_BEST_EFFORT;
2036 pcb->iflow.token_rate = 0xffffffff; /* maximum */
2037 pcb->iflow.token_bucket_size = 0xffffffff; /* maximum */
2038 pcb->iflow.peak_bandwidth = 0x00000000; /* maximum */
2039 pcb->iflow.latency = 0xffffffff; /* don't care */
2040 pcb->iflow.delay_variation = 0xffffffff; /* don't care */
2041
2042 bcopy(&pcb->iflow, &pcb->oflow, sizeof(pcb->oflow));
2043
2046
2047 /*
2048 * XXX Mark PCB mutex as DUPOK to prevent "duplicated lock of
2049 * the same type" message. When accepting new L2CAP connection
2050 * ng_btsocket_l2cap_process_l2ca_con_ind() holds both PCB mutexes
2051 * for "old" (accepting) PCB and "new" (created) PCB.
2052 */
2053
2054 mtx_init(&pcb->pcb_mtx, "btsocks_l2cap_pcb_mtx", NULL,
2055 MTX_DEF|MTX_DUPOK);
2056 callout_init_mtx(&pcb->timo, &pcb->pcb_mtx, 0);
2057
2058 /*
2059 * Add the PCB to the list
2060 *
2061 * XXX FIXME VERY IMPORTANT!
2062 *
2063 * This is totally FUBAR. We could get here in two cases:
2064 *
2065 * 1) When user calls socket()
2066 * 2) When we need to accept new incoming connection and call
2067 * sonewconn()
2068 *
2069 * In the first case we must acquire ng_btsocket_l2cap_sockets_mtx.
2070 * In the second case we hold ng_btsocket_l2cap_sockets_mtx already.
2071 * So we now need to distinguish between these cases. From reading
2072 * /sys/kern/uipc_socket.c we can find out that sonewconn() calls
2073 * pru_attach with proto == 0 and td == NULL. For now use this fact
2074 * to figure out if we were called from socket() or from sonewconn().
2075 */
2076
2077 if (td != NULL)
2078 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2079 else
2080 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2081
2082 /* Set PCB token. Use ng_btsocket_l2cap_sockets_mtx for protection */
2083 if (++ token == 0)
2084 token ++;
2085
2086 pcb->token = token;
2087
2088 LIST_INSERT_HEAD(&ng_btsocket_l2cap_sockets, pcb, next);
2089
2090 if (td != NULL)
2091 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2092
2093 return (0);
2094} /* ng_btsocket_l2cap_attach */
2095
2096/*
2097 * Bind socket
2098 */
2099
2100int
2101ng_btsocket_l2cap_bind(struct socket *so, struct sockaddr *nam,
2102 struct thread *td)
2103{
2104 ng_btsocket_l2cap_pcb_t *pcb = NULL;
2105 struct sockaddr_l2cap *sa = (struct sockaddr_l2cap *) nam;
2106 int psm, error = 0;
2107
2108 if (ng_btsocket_l2cap_node == NULL)
2109 return (EINVAL);
2110
2111 /* Verify address */
2112 if (sa == NULL)
2113 return (EINVAL);
2114 if (sa->l2cap_family != AF_BLUETOOTH)
2115 return (EAFNOSUPPORT);
2116 /*For the time being, Not support LE binding.*/
2117 if ((sa->l2cap_len != sizeof(*sa))&&
2118 (sa->l2cap_len != sizeof(struct sockaddr_l2cap_compat)))
2119 return (EINVAL);
2120
2121 psm = le16toh(sa->l2cap_psm);
2122
2123 /*
2124 * Check if other socket has this address already (look for exact
2125 * match PSM and bdaddr) and assign socket address if it's available.
2126 *
2127 * Note: socket can be bound to ANY PSM (zero) thus allowing several
2128 * channels with the same PSM between the same pair of BD_ADDR'es.
2129 */
2130
2131 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2132
2133 LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next)
2134 if (psm != 0 && psm == pcb->psm &&
2135 bcmp(&pcb->src, &sa->l2cap_bdaddr, sizeof(bdaddr_t)) == 0)
2136 break;
2137
2138 if (pcb == NULL) {
2139 /* Set socket address */
2140 pcb = so2l2cap_pcb(so);
2141 if (pcb != NULL) {
2142 bcopy(&sa->l2cap_bdaddr, &pcb->src, sizeof(pcb->src));
2143 pcb->psm = psm;
2144 } else
2145 error = EINVAL;
2146 } else
2147 error = EADDRINUSE;
2148
2149 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2150
2151 return (error);
2152} /* ng_btsocket_l2cap_bind */
2153
2154/*
2155 * Connect socket
2156 */
2157
2158int
2159ng_btsocket_l2cap_connect(struct socket *so, struct sockaddr *nam,
2160 struct thread *td)
2161{
2163 struct sockaddr_l2cap_compat *sal = (struct sockaddr_l2cap_compat *) nam;
2164 struct sockaddr_l2cap *sa = (struct sockaddr_l2cap *)nam;
2165 struct sockaddr_l2cap ba;
2166 ng_btsocket_l2cap_rtentry_t *rt = NULL;
2167 int have_src, error = 0;
2168 int idtype = NG_L2CAP_L2CA_IDTYPE_BREDR;
2169 /* Check socket */
2170 if (pcb == NULL)
2171 return (EINVAL);
2172 if (ng_btsocket_l2cap_node == NULL)
2173 return (EINVAL);
2175 return (EINPROGRESS);
2176
2177 /* Verify address */
2178 if (sa == NULL)
2179 return (EINVAL);
2180 if (sa->l2cap_family != AF_BLUETOOTH)
2181 return (EAFNOSUPPORT);
2182 if (sa->l2cap_len == sizeof(*sal)){
2183 bcopy(sal, &ba, sizeof(*sal));
2184 sa = &ba;
2185 sa->l2cap_len = sizeof(*sa);
2187 }
2188 if (sa->l2cap_len != sizeof(*sa))
2189 return (EINVAL);
2190 if ((sa->l2cap_psm && sa->l2cap_cid))
2191 return EINVAL;
2192 if (bcmp(&sa->l2cap_bdaddr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
2193 return (EDESTADDRREQ);
2194 if((sa->l2cap_bdaddr_type == BDADDR_BREDR)&&
2195 (sa->l2cap_psm == 0))
2196 return EDESTADDRREQ;
2198 if(sa->l2cap_cid == NG_L2CAP_ATT_CID){
2199 idtype = NG_L2CAP_L2CA_IDTYPE_ATT;
2200 }else if (sa->l2cap_cid == NG_L2CAP_SMP_CID){
2202 }else{
2203 //if cid == 0 idtype = NG_L2CAP_L2CA_IDTYPE_LE;
2204 // Not supported yet
2205 return EINVAL;
2206 }
2207 }
2208 if (pcb->psm != 0 && pcb->psm != le16toh(sa->l2cap_psm))
2209 return (EINVAL);
2210 /*
2211 * Routing. Socket should be bound to some source address. The source
2212 * address can be ANY. Destination address must be set and it must not
2213 * be ANY. If source address is ANY then find first rtentry that has
2214 * src != dst.
2215 */
2216
2217 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
2218 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2219 mtx_lock(&pcb->pcb_mtx);
2220
2221 /* Send destination address and PSM */
2222 bcopy(&sa->l2cap_bdaddr, &pcb->dst, sizeof(pcb->dst));
2223 pcb->psm = le16toh(sa->l2cap_psm);
2224 pcb->dsttype = sa->l2cap_bdaddr_type;
2225 pcb->cid = 0;
2226 pcb->idtype = idtype;
2227 pcb->rt = NULL;
2228 have_src = bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src));
2229
2230 LIST_FOREACH(rt, &ng_btsocket_l2cap_rt, next) {
2231 if (rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
2232 continue;
2233
2234 /* Match src and dst */
2235 if (have_src) {
2236 if (bcmp(&pcb->src, &rt->src, sizeof(rt->src)) == 0)
2237 break;
2238 } else {
2239 if (bcmp(&pcb->dst, &rt->src, sizeof(rt->src)) != 0)
2240 break;
2241 }
2242 }
2243
2244 if (rt != NULL) {
2245 pcb->rt = rt;
2246
2247 if (!have_src){
2248 bcopy(&rt->src, &pcb->src, sizeof(pcb->src));
2249 pcb->srctype =
2252 }
2253 } else
2254 error = EHOSTUNREACH;
2255
2256 /*
2257 * Send L2CA_Connect request
2258 */
2259
2260 if (error == 0) {
2262 if (error == 0) {
2265 soisconnecting(pcb->so);
2266
2268 }
2269 }
2270
2271 mtx_unlock(&pcb->pcb_mtx);
2272 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2273 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
2274
2275 return (error);
2276} /* ng_btsocket_l2cap_connect */
2277
2278/*
2279 * Process ioctl's calls on socket
2280 */
2281
2282int
2283ng_btsocket_l2cap_control(struct socket *so, u_long cmd, caddr_t data,
2284 struct ifnet *ifp, struct thread *td)
2285{
2286 return (EINVAL);
2287} /* ng_btsocket_l2cap_control */
2288
2289/*
2290 * Process getsockopt/setsockopt system calls
2291 */
2292
2293int
2294ng_btsocket_l2cap_ctloutput(struct socket *so, struct sockopt *sopt)
2295{
2297 int error = 0;
2299
2300 if (pcb == NULL)
2301 return (EINVAL);
2302 if (ng_btsocket_l2cap_node == NULL)
2303 return (EINVAL);
2304
2305 if (sopt->sopt_level != SOL_L2CAP)
2306 return (0);
2307
2308 mtx_lock(&pcb->pcb_mtx);
2309
2310 switch (sopt->sopt_dir) {
2311 case SOPT_GET:
2312 switch (sopt->sopt_name) {
2313 case SO_L2CAP_IMTU: /* get incoming MTU */
2314 error = sooptcopyout(sopt, &pcb->imtu,
2315 sizeof(pcb->imtu));
2316 break;
2317
2318 case SO_L2CAP_OMTU: /* get outgoing (peer incoming) MTU */
2319 error = sooptcopyout(sopt, &pcb->omtu,
2320 sizeof(pcb->omtu));
2321 break;
2322
2323 case SO_L2CAP_IFLOW: /* get incoming flow spec. */
2324 error = sooptcopyout(sopt, &pcb->iflow,
2325 sizeof(pcb->iflow));
2326 break;
2327
2328 case SO_L2CAP_OFLOW: /* get outgoing flow spec. */
2329 error = sooptcopyout(sopt, &pcb->oflow,
2330 sizeof(pcb->oflow));
2331 break;
2332
2333 case SO_L2CAP_FLUSH: /* get flush timeout */
2334 error = sooptcopyout(sopt, &pcb->flush_timo,
2335 sizeof(pcb->flush_timo));
2336 break;
2337 case SO_L2CAP_ENCRYPTED: /* get encrypt required */
2338 error = sooptcopyout(sopt, &pcb->need_encrypt,
2339 sizeof(pcb->need_encrypt));
2340 break;
2341
2342 default:
2343 error = ENOPROTOOPT;
2344 break;
2345 }
2346 break;
2347
2348 case SOPT_SET:
2349 /*
2350 * XXX
2351 * We do not allow to change these parameters while socket is
2352 * connected or we are in the process of creating a connection.
2353 * May be this should indicate re-configuration of the open
2354 * channel?
2355 */
2356
2357 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2358 error = EACCES;
2359 break;
2360 }
2361
2362 switch (sopt->sopt_name) {
2363 case SO_L2CAP_IMTU: /* set incoming MTU */
2364 error = sooptcopyin(sopt, &v, sizeof(v), sizeof(v.mtu));
2365 if (error == 0)
2366 pcb->imtu = v.mtu;
2367 break;
2368
2369 case SO_L2CAP_OFLOW: /* set outgoing flow spec. */
2370 error = sooptcopyin(sopt, &v, sizeof(v),sizeof(v.flow));
2371 if (error == 0)
2372 bcopy(&v.flow, &pcb->oflow, sizeof(pcb->oflow));
2373 break;
2374
2375 case SO_L2CAP_FLUSH: /* set flush timeout */
2376 error = sooptcopyin(sopt, &v, sizeof(v),
2377 sizeof(v.flush_timo));
2378 if (error == 0)
2379 pcb->flush_timo = v.flush_timo;
2380 break;
2381 case SO_L2CAP_ENCRYPTED: /*set connect encryption opt*/
2382 if((pcb->state != NG_BTSOCKET_L2CAP_OPEN) &&
2384 error = sooptcopyin(sopt, &v, sizeof(v),
2385 sizeof(v.encryption));
2386 if(error == 0)
2387 pcb->need_encrypt = (v.encryption)?1:0;
2388 }else{
2389 error = EINVAL;
2390 }
2391 break;
2392 default:
2393 error = ENOPROTOOPT;
2394 break;
2395 }
2396 break;
2397
2398 default:
2399 error = EINVAL;
2400 break;
2401 }
2402
2403 mtx_unlock(&pcb->pcb_mtx);
2404
2405 return (error);
2406} /* ng_btsocket_l2cap_ctloutput */
2407
2408/*
2409 * Detach and destroy socket
2410 */
2411
2412void
2414{
2416
2417 KASSERT(pcb != NULL, ("ng_btsocket_l2cap_detach: pcb == NULL"));
2418
2419 if (ng_btsocket_l2cap_node == NULL)
2420 return;
2421
2422 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2423 mtx_lock(&pcb->pcb_mtx);
2424
2425 /* XXX what to do with pending request? */
2426 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2428
2429 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED &&
2431 /* Send disconnect request with "zero" token */
2433
2435
2436 LIST_REMOVE(pcb, next);
2437
2438 mtx_unlock(&pcb->pcb_mtx);
2439 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2440
2441 mtx_destroy(&pcb->pcb_mtx);
2442 bzero(pcb, sizeof(*pcb));
2443 free(pcb, M_NETGRAPH_BTSOCKET_L2CAP);
2444
2445 soisdisconnected(so);
2446 so->so_pcb = NULL;
2447} /* ng_btsocket_l2cap_detach */
2448
2449/*
2450 * Disconnect socket
2451 */
2452
2453int
2455{
2457 int error = 0;
2458
2459 if (pcb == NULL)
2460 return (EINVAL);
2461 if (ng_btsocket_l2cap_node == NULL)
2462 return (EINVAL);
2463
2464 mtx_lock(&pcb->pcb_mtx);
2465
2467 mtx_unlock(&pcb->pcb_mtx);
2468 return (EINPROGRESS);
2469 }
2470
2471 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2472 /* XXX FIXME what to do with pending request? */
2473 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2475
2477 if (error == 0) {
2479 soisdisconnecting(so);
2480
2482 }
2483
2484 /* XXX FIXME what to do if error != 0 */
2485 }
2486
2487 mtx_unlock(&pcb->pcb_mtx);
2488
2489 return (error);
2490} /* ng_btsocket_l2cap_disconnect */
2491
2492/*
2493 * Listen on socket
2494 */
2495
2496int
2497ng_btsocket_l2cap_listen(struct socket *so, int backlog, struct thread *td)
2498{
2500 int error;
2501
2502 SOCK_LOCK(so);
2503 error = solisten_proto_check(so);
2504 if (error != 0)
2505 goto out;
2506 if (pcb == NULL) {
2507 solisten_proto_abort(so);
2508 error = EINVAL;
2509 goto out;
2510 }
2511 if (ng_btsocket_l2cap_node == NULL) {
2512 solisten_proto_abort(so);
2513 error = EINVAL;
2514 goto out;
2515 }
2516 if (pcb->psm == 0) {
2517 solisten_proto_abort(so);
2518 error = EADDRNOTAVAIL;
2519 goto out;
2520 }
2521 solisten_proto(so, backlog);
2522out:
2523 SOCK_UNLOCK(so);
2524 return (error);
2525} /* ng_btsocket_listen */
2526
2527/*
2528 * Get peer address
2529 */
2530
2531int
2532ng_btsocket_l2cap_peeraddr(struct socket *so, struct sockaddr **nam)
2533{
2535 struct sockaddr_l2cap sa;
2536
2537 if (pcb == NULL)
2538 return (EINVAL);
2539 if (ng_btsocket_l2cap_node == NULL)
2540 return (EINVAL);
2541
2542 bcopy(&pcb->dst, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2543 sa.l2cap_psm = htole16(pcb->psm);
2544 sa.l2cap_len = sizeof(sa);
2545 sa.l2cap_family = AF_BLUETOOTH;
2546 switch(pcb->idtype){
2549 break;
2552 break;
2553 default:
2554 sa.l2cap_cid = 0;
2555 break;
2556 }
2557 sa.l2cap_bdaddr_type = pcb->dsttype;
2558 *nam = sodupsockaddr((struct sockaddr *) &sa, M_NOWAIT);
2559
2560 return ((*nam == NULL)? ENOMEM : 0);
2561} /* ng_btsocket_l2cap_peeraddr */
2562
2563/*
2564 * Send data to socket
2565 */
2566
2567int
2568ng_btsocket_l2cap_send(struct socket *so, int flags, struct mbuf *m,
2569 struct sockaddr *nam, struct mbuf *control, struct thread *td)
2570{
2572 int error = 0;
2573
2574 if (ng_btsocket_l2cap_node == NULL) {
2575 error = ENETDOWN;
2576 goto drop;
2577 }
2578
2579 /* Check socket and input */
2580 if (pcb == NULL || m == NULL || control != NULL) {
2581 error = EINVAL;
2582 goto drop;
2583 }
2584
2585 mtx_lock(&pcb->pcb_mtx);
2586
2587 /* Make sure socket is connected */
2588 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
2589 mtx_unlock(&pcb->pcb_mtx);
2590 error = ENOTCONN;
2591 goto drop;
2592 }
2593
2594 /* Check route */
2595 if (pcb->rt == NULL ||
2596 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook)) {
2597 mtx_unlock(&pcb->pcb_mtx);
2598 error = ENETDOWN;
2599 goto drop;
2600 }
2601
2602 /* Check packet size against outgoing (peer's incoming) MTU) */
2603 if (m->m_pkthdr.len > pcb->omtu) {
2605"%s: Packet too big, len=%d, omtu=%d\n", __func__, m->m_pkthdr.len, pcb->omtu);
2606
2607 mtx_unlock(&pcb->pcb_mtx);
2608 error = EMSGSIZE;
2609 goto drop;
2610 }
2611
2612 /*
2613 * First put packet on socket send queue. Then check if we have
2614 * pending timeout. If we do not have timeout then we must send
2615 * packet and schedule timeout. Otherwise do nothing and wait for
2616 * L2CA_WRITE_RSP.
2617 */
2618
2619 sbappendrecord(&pcb->so->so_snd, m);
2620 m = NULL;
2621
2622 if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2623 error = ng_btsocket_l2cap_send2(pcb);
2624 if (error == 0)
2626 else
2627 sbdroprecord(&pcb->so->so_snd); /* XXX */
2628 }
2629
2630 mtx_unlock(&pcb->pcb_mtx);
2631drop:
2632 NG_FREE_M(m); /* checks for != NULL */
2634
2635 return (error);
2636} /* ng_btsocket_l2cap_send */
2637
2638/*
2639 * Send first packet in the socket queue to the L2CAP layer
2640 */
2641
2642static int
2644{
2645 struct mbuf *m = NULL;
2646 ng_l2cap_l2ca_hdr_t *hdr = NULL;
2647 int error = 0;
2648
2649 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2650
2651 if (sbavail(&pcb->so->so_snd) == 0)
2652 return (EINVAL); /* XXX */
2653
2654 m = m_dup(pcb->so->so_snd.sb_mb, M_NOWAIT);
2655 if (m == NULL)
2656 return (ENOBUFS);
2657
2658 /* Create L2CA packet header */
2659 M_PREPEND(m, sizeof(*hdr), M_NOWAIT);
2660 if (m != NULL)
2661 if (m->m_len < sizeof(*hdr))
2662 m = m_pullup(m, sizeof(*hdr));
2663
2664 if (m == NULL) {
2666"%s: Failed to create L2CA packet header\n", __func__);
2667
2668 return (ENOBUFS);
2669 }
2670
2671 hdr = mtod(m, ng_l2cap_l2ca_hdr_t *);
2672 hdr->token = pcb->token;
2673 hdr->length = m->m_pkthdr.len - sizeof(*hdr);
2674 hdr->lcid = pcb->cid;
2675 hdr->idtype = pcb->idtype;
2677"%s: Sending packet: len=%d, length=%d, lcid=%d, token=%d, state=%d\n",
2678 __func__, m->m_pkthdr.len, hdr->length, hdr->lcid,
2679 hdr->token, pcb->state);
2680
2681 /*
2682 * If we got here than we have successfully creates new L2CAP
2683 * data packet and now we can send it to the L2CAP layer
2684 */
2685
2686 NG_SEND_DATA_ONLY(error, pcb->rt->hook, m);
2687
2688 return (error);
2689} /* ng_btsocket_l2cap_send2 */
2690
2691/*
2692 * Get socket address
2693 */
2694
2695int
2696ng_btsocket_l2cap_sockaddr(struct socket *so, struct sockaddr **nam)
2697{
2699 struct sockaddr_l2cap sa;
2700
2701 if (pcb == NULL)
2702 return (EINVAL);
2703 if (ng_btsocket_l2cap_node == NULL)
2704 return (EINVAL);
2705
2706 bcopy(&pcb->src, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2707 sa.l2cap_psm = htole16(pcb->psm);
2708 sa.l2cap_len = sizeof(sa);
2709 sa.l2cap_family = AF_BLUETOOTH;
2710 sa.l2cap_cid = 0;
2711 sa.l2cap_bdaddr_type = pcb->srctype;
2712
2713 *nam = sodupsockaddr((struct sockaddr *) &sa, M_NOWAIT);
2714
2715 return ((*nam == NULL)? ENOMEM : 0);
2716} /* ng_btsocket_l2cap_sockaddr */
2717
2718/*****************************************************************************
2719 *****************************************************************************
2720 ** Misc. functions
2721 *****************************************************************************
2722 *****************************************************************************/
2723
2724/*
2725 * Look for the socket that listens on given PSM and bdaddr. Returns exact or
2726 * close match (if any). Caller must hold ng_btsocket_l2cap_sockets_mtx.
2727 */
2728
2731{
2732 ng_btsocket_l2cap_pcb_p p = NULL, p1 = NULL;
2733
2734 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2735
2736 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next) {
2737 if (p->so == NULL || !SOLISTENING(p->so) || p->psm != psm)
2738 continue;
2739
2740 if (bcmp(&p->src, bdaddr, sizeof(p->src)) == 0)
2741 break;
2742
2743 if (bcmp(&p->src, NG_HCI_BDADDR_ANY, sizeof(p->src)) == 0)
2744 p1 = p;
2745 }
2746
2747 return ((p != NULL)? p : p1);
2748} /* ng_btsocket_l2cap_pcb_by_addr */
2749
2750/*
2751 * Look for the socket that has given token.
2752 * Caller must hold ng_btsocket_l2cap_sockets_mtx.
2753 */
2754
2757{
2758 ng_btsocket_l2cap_pcb_p p = NULL;
2759
2760 if (token == 0)
2761 return (NULL);
2762
2763 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2764
2765 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2766 if (p->token == token)
2767 break;
2768
2769 return (p);
2770} /* ng_btsocket_l2cap_pcb_by_token */
2771
2772/*
2773 * Look for the socket that assigned to given source address and channel ID.
2774 * Caller must hold ng_btsocket_l2cap_sockets_mtx
2775 */
2776
2779{
2780 ng_btsocket_l2cap_pcb_p p = NULL;
2781
2782 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2783
2784 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next){
2785 if (p->cid == cid &&
2786 bcmp(src, &p->src, sizeof(p->src)) == 0&&
2787 p->idtype == idtype)
2788 break;
2789 }
2790 return (p);
2791} /* ng_btsocket_l2cap_pcb_by_cid */
2792
2793/*
2794 * Set timeout on socket
2795 */
2796
2797static void
2799{
2800 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2801
2802 if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2804 callout_reset(&pcb->timo, bluetooth_l2cap_ertx_timeout(),
2806 } else
2807 KASSERT(0,
2808("%s: Duplicated socket timeout?!\n", __func__));
2809} /* ng_btsocket_l2cap_timeout */
2810
2811/*
2812 * Unset timeout on socket
2813 */
2814
2815static void
2817{
2818 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2819
2820 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO) {
2821 callout_stop(&pcb->timo);
2822 pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2823 } else
2824 KASSERT(0,
2825("%s: No socket timeout?!\n", __func__));
2826} /* ng_btsocket_l2cap_untimeout */
2827
2828/*
2829 * Process timeout on socket
2830 */
2831
2832static void
2834{
2836
2837 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2838
2839 pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2840 pcb->so->so_error = ETIMEDOUT;
2841
2842 switch (pcb->state) {
2846 /* Send disconnect request with "zero" token */
2847 if (pcb->cid != 0)
2849
2850 /* ... and close the socket */
2852 soisdisconnected(pcb->so);
2853 break;
2854
2856 /* Send timeout - drop packet and wakeup sender */
2857 sbdroprecord(&pcb->so->so_snd);
2858 sowwakeup(pcb->so);
2859 break;
2860
2862 /* Disconnect timeout - disconnect the socket anyway */
2864 soisdisconnected(pcb->so);
2865 break;
2866
2867 default:
2869"%s: Invalid socket state=%d\n", __func__, pcb->state);
2870 break;
2871 }
2872} /* ng_btsocket_l2cap_process_timeout */
2873
2874/*
2875 * Translate HCI/L2CAP error code into "errno" code
2876 * XXX Note: Some L2CAP and HCI error codes have the same value, but
2877 * different meaning
2878 */
2879
2880static int
2882{
2883 switch (result) {
2884 case 0x00: /* No error */
2885 return (0);
2886
2887 case 0x01: /* Unknown HCI command */
2888 return (ENODEV);
2889
2890 case 0x02: /* No connection */
2891 return (ENOTCONN);
2892
2893 case 0x03: /* Hardware failure */
2894 return (EIO);
2895
2896 case 0x04: /* Page timeout */
2897 return (EHOSTDOWN);
2898
2899 case 0x05: /* Authentication failure */
2900 case 0x06: /* Key missing */
2901 case 0x18: /* Pairing not allowed */
2902 case 0x21: /* Role change not allowed */
2903 case 0x24: /* LMP PSU not allowed */
2904 case 0x25: /* Encryption mode not acceptable */
2905 case 0x26: /* Unit key used */
2906 return (EACCES);
2907
2908 case 0x07: /* Memory full */
2909 return (ENOMEM);
2910
2911 case 0x08: /* Connection timeout */
2912 case 0x10: /* Host timeout */
2913 case 0x22: /* LMP response timeout */
2914 case 0xee: /* HCI timeout */
2915 case 0xeeee: /* L2CAP timeout */
2916 return (ETIMEDOUT);
2917
2918 case 0x09: /* Max number of connections */
2919 case 0x0a: /* Max number of SCO connections to a unit */
2920 return (EMLINK);
2921
2922 case 0x0b: /* ACL connection already exists */
2923 return (EEXIST);
2924
2925 case 0x0c: /* Command disallowed */
2926 return (EBUSY);
2927
2928 case 0x0d: /* Host rejected due to limited resources */
2929 case 0x0e: /* Host rejected due to securiity reasons */
2930 case 0x0f: /* Host rejected due to remote unit is a personal unit */
2931 case 0x1b: /* SCO offset rejected */
2932 case 0x1c: /* SCO interval rejected */
2933 case 0x1d: /* SCO air mode rejected */
2934 return (ECONNREFUSED);
2935
2936 case 0x11: /* Unsupported feature or parameter value */
2937 case 0x19: /* Unknown LMP PDU */
2938 case 0x1a: /* Unsupported remote feature */
2939 case 0x20: /* Unsupported LMP parameter value */
2940 case 0x27: /* QoS is not supported */
2941 case 0x29: /* Paring with unit key not supported */
2942 return (EOPNOTSUPP);
2943
2944 case 0x12: /* Invalid HCI command parameter */
2945 case 0x1e: /* Invalid LMP parameters */
2946 return (EINVAL);
2947
2948 case 0x13: /* Other end terminated connection: User ended connection */
2949 case 0x14: /* Other end terminated connection: Low resources */
2950 case 0x15: /* Other end terminated connection: About to power off */
2951 return (ECONNRESET);
2952
2953 case 0x16: /* Connection terminated by local host */
2954 return (ECONNABORTED);
2955
2956#if 0 /* XXX not yet */
2957 case 0x17: /* Repeated attempts */
2958 case 0x1f: /* Unspecified error */
2959 case 0x23: /* LMP error transaction collision */
2960 case 0x28: /* Instant passed */
2961#endif
2962 }
2963
2964 return (ENOSYS);
2965} /* ng_btsocket_l2cap_result2errno */
uint8_t flags
Definition: netflow.h:14
#define NGI_SET_HOOK(i, h)
Definition: netgraph.h:842
int ng_connect_t(hook_p hook)
Definition: netgraph.h:104
#define NGI_MSG(i)
Definition: netgraph.h:834
#define NGI_GET_HOOK(i, h)
Definition: netgraph.h:870
#define NG_FREE_M(m)
Definition: netgraph.h:946
#define NG_HOOK_UNREF(hook)
Definition: netgraph.h:332
#define NG_HOOK_NOT_VALID(hook)
Definition: netgraph.h:337
int ng_rcvmsg_t(node_p node, item_p item, hook_p lasthook)
Definition: netgraph.h:105
#define NGQF_TYPE
Definition: netgraph.h:668
#define NGQF_DATA
Definition: netgraph.h:670
int ng_disconnect_t(hook_p hook)
Definition: netgraph.h:107
int ng_newtype(struct ng_type *tp)
Definition: ng_base.c:1272
#define NG_HOOK_PEER(hook)
Definition: netgraph.h:340
#define NG_NODE_UNREF(node)
Definition: netgraph.h:607
#define NG_HOOK_SET_PRIVATE(hook, val)
Definition: netgraph.h:333
#define NG_SEND_DATA_ONLY(error, hook, m)
Definition: netgraph.h:932
#define NGQF_MESG
Definition: netgraph.h:669
#define NG_HOOK_FORCE_QUEUE(hook)
Definition: netgraph.h:342
#define NG_HOOK_REF(hook)
Definition: netgraph.h:330
int ng_rcvdata_t(hook_p hook, item_p item)
Definition: netgraph.h:106
int ng_shutdown_t(node_p node)
Definition: netgraph.h:101
#define NG_HOOK_NAME(hook)
Definition: netgraph.h:331
#define NG_FREE_ITEM(item)
Definition: netgraph.h:847
int ng_make_node_common(struct ng_type *typep, node_p *nodep)
Definition: ng_base.c:642
int ng_name_node(node_p node, const char *name)
Definition: ng_base.c:852
int ng_constructor_t(node_p node)
Definition: netgraph.h:99
#define NGI_GET_M(i, m)
Definition: netgraph.h:852
#define NG_FREE_MSG(msg)
Definition: netgraph.h:938
#define NG_ABI_VERSION
Definition: netgraph.h:77
#define NGI_GET_MSG(i, m)
Definition: netgraph.h:858
#define NG_SEND_MSG_HOOK(error, here, msg, hook, retaddr)
Definition: netgraph.h:958
int ng_newhook_t(node_p node, hook_p hook, const char *name)
Definition: netgraph.h:102
#define NG_HOOK_PRIVATE(hook)
Definition: netgraph.h:336
u_int32_t bluetooth_l2cap_ertx_timeout(void)
Definition: ng_bluetooth.c:209
SYSCTL_NODE(_net, OID_AUTO, bluetooth, CTLFLAG_RW|CTLFLAG_MPSAFE, 0, "Bluetooth family")
SYSCTL_UINT(_net_bluetooth_hci, OID_AUTO, max_neighbor_age, CTLFLAG_RW, &bluetooth_hci_max_neighbor_age_value, 600, "Maximal HCI neighbor cache entry age (sec)")
#define NG_BT_ITEMQ_ENQUEUE(q, i)
Definition: ng_bluetooth.h:184
#define NG_BT_ITEMQ_FULL(q)
Definition: ng_bluetooth.h:180
#define BDADDR_BREDR
Definition: ng_bluetooth.h:229
#define NG_BT_ITEMQ_INIT(q, _maxlen)
Definition: ng_bluetooth.h:163
#define NG_BT_ITEMQ_DEQUEUE(q, i)
Definition: ng_bluetooth.h:190
#define BDADDR_LE_PUBLIC
Definition: ng_bluetooth.h:230
#define NG_BT_ITEMQ_DROP(q)
Definition: ng_bluetooth.h:182
#define BDADDR_LE_RANDOM
Definition: ng_bluetooth.h:231
#define SO_L2CAP_IMTU
Definition: ng_btsocket.h:249
#define SOL_L2CAP
Definition: ng_btsocket.h:247
#define SO_L2CAP_IFLOW
Definition: ng_btsocket.h:251
#define SO_L2CAP_FLUSH
Definition: ng_btsocket.h:253
#define BLUETOOTH_PROTO_L2CAP
Definition: ng_btsocket.h:44
#define NG_BTSOCKET_L2CAP_NODE_TYPE
Definition: ng_btsocket.h:363
#define SO_L2CAP_ENCRYPTED
Definition: ng_btsocket.h:254
#define NG_BTSOCKET_WARN_LEVEL
Definition: ng_btsocket.h:372
#define SO_L2CAP_OFLOW
Definition: ng_btsocket.h:252
#define SO_L2CAP_OMTU
Definition: ng_btsocket.h:250
SYSINIT(ng_btsocket_l2cap_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD, ng_btsocket_l2cap_init, NULL)
static int ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static void ng_btsocket_l2cap_init(void *arg __unused)
int ng_btsocket_l2cap_sockaddr(struct socket *so, struct sockaddr **nam)
static void ng_btsocket_l2cap_rtclean(void *, int)
static void ng_btsocket_l2cap_input(void *, int)
static int ng_btsocket_l2cap_send_l2ca_cfg_rsp(ng_btsocket_l2cap_pcb_p pcb)
static ng_disconnect_t ng_btsocket_l2cap_node_disconnect
static LIST_HEAD(ng_btsocket_l2cap_pcb)
void ng_btsocket_l2cap_close(struct socket *so)
static int ng_btsocket_l2cap_send_l2ca_discon_req(u_int32_t token, ng_btsocket_l2cap_pcb_p pcb)
static void ng_btsocket_l2cap_l2ca_msg_input(struct ng_mesg *msg, hook_p hook)
#define NG_BTSOCKET_L2CAP_ALERT
static int ng_btsocket_l2cap_process_l2ca_write_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
int ng_btsocket_l2cap_accept(struct socket *so, struct sockaddr **nam)
static struct mtx ng_btsocket_l2cap_queue_mtx
int ng_btsocket_l2cap_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
#define NG_BTSOCKET_L2CAP_ERR
static struct task ng_btsocket_l2cap_queue_task
static int ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
#define NG_BTSOCKET_L2CAP_INFO
#define M_NETGRAPH_BTSOCKET_L2CAP
static void ng_btsocket_l2cap_data_input(struct mbuf *m, hook_p hook)
static int ng_btsocket_l2cap_process_l2ca_enc_change(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
int ifqmaxlen
#define NG_BTSOCKET_L2CAP_WARN
static void ng_btsocket_l2cap_process_timeout(void *xpcb)
static int ng_btsocket_l2cap_process_l2ca_discon_ind(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_addr(bdaddr_p bdaddr, int psm)
#define ng_btsocket_l2cap_wakeup_route_task()
static int ng_btsocket_l2cap_process_l2ca_con_req_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static void ng_btsocket_l2cap_untimeout(ng_btsocket_l2cap_pcb_p pcb)
static ng_connect_t ng_btsocket_l2cap_node_connect
static int ng_btsocket_l2cap_send2(ng_btsocket_l2cap_pcb_p pcb)
static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_token(u_int32_t token)
int ng_btsocket_l2cap_ctloutput(struct socket *so, struct sockopt *sopt)
static struct ng_type typestruct
static int ng_btsocket_l2cap_send_l2ca_con_rsp_req(u_int32_t token, ng_btsocket_l2cap_rtentry_p rt, bdaddr_p dst, int ident, int lcid, int result, int linktype)
static int ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
int ng_btsocket_l2cap_peeraddr(struct socket *so, struct sockaddr **nam)
int ng_btsocket_l2cap_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam, struct mbuf *control, struct thread *td)
static int ng_btsocket_l2cap_process_l2ca_con_ind(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static int ng_btsocket_l2cap_send_l2ca_con_req(ng_btsocket_l2cap_pcb_p pcb)
int ng_btsocket_l2cap_disconnect(struct socket *so)
static int ng_btsocket_l2cap_result2errno(int result)
static void ng_btsocket_l2cap_timeout(ng_btsocket_l2cap_pcb_p pcb)
static int ng_btsocket_l2cap_send_l2ca_cfg_req(ng_btsocket_l2cap_pcb_p pcb)
static int ng_btsocket_l2cap_process_l2ca_cfg_ind(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static node_p ng_btsocket_l2cap_node
int ng_btsocket_l2cap_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
static ng_constructor_t ng_btsocket_l2cap_node_constructor
static ng_shutdown_t ng_btsocket_l2cap_node_shutdown
static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_cid(bdaddr_p src, int cid, int idtype)
void ng_btsocket_l2cap_abort(struct socket *so)
int ng_btsocket_l2cap_listen(struct socket *so, int backlog, struct thread *td)
static struct ng_bt_itemq ng_btsocket_l2cap_queue
#define ng_btsocket_l2cap_wakeup_input_task()
void ng_btsocket_l2cap_detach(struct socket *so)
static u_int32_t ng_btsocket_l2cap_debug_level
int ng_btsocket_l2cap_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
static ng_rcvdata_t ng_btsocket_l2cap_node_rcvdata
int ng_btsocket_l2cap_attach(struct socket *so, int proto, struct thread *td)
static int ng_btsocket_l2cap_process_l2ca_discon_rsp(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
static ng_newhook_t ng_btsocket_l2cap_node_newhook
static void ng_btsocket_l2cap_default_msg_input(struct ng_mesg *msg, hook_p hook)
static ng_rcvmsg_t ng_btsocket_l2cap_node_rcvmsg
#define NG_BTSOCKET_L2CAP_DISCONNECTING
#define NG_BTSOCKET_L2CAP_CLIENT
#define NG_BTSOCKET_L2CAP_CONNECTING
#define so2l2cap_pcb(so)
#define NG_BTSOCKET_L2CAP_CFG_OUT_SENT
#define NG_BTSOCKET_L2CAP_TIMO
#define NG_BTSOCKET_L2CAP_CFG_OUT
#define NG_BTSOCKET_L2CAP_RECVSPACE
#define NG_BTSOCKET_L2CAP_CFG_IN
#define NG_BTSOCKET_L2CAP_CFG_BOTH
struct ng_btsocket_l2cap_pcb * ng_btsocket_l2cap_pcb_p
#define NG_BTSOCKET_L2CAP_W4_ENC_CHANGE
#define NG_BTSOCKET_L2CAP_CLOSED
struct ng_btsocket_l2cap_rtentry * ng_btsocket_l2cap_rtentry_p
#define NG_BTSOCKET_L2CAP_SENDSPACE
#define NG_BTSOCKET_L2CAP_CFG_IN_SENT
#define NG_BTSOCKET_L2CAP_CONFIGURING
#define NG_BTSOCKET_L2CAP_OPEN
u_int8_t control
MALLOC_DEFINE(M_NG_CCATM, "ng_ccatm", "netgraph uni api node")
#define NG_HCI_BDADDR_ANY
Definition: ng_hci.h:450
#define NG_HCI_LINK_LE_RANDOM
Definition: ng_hci.h:123
bdaddr_t * bdaddr_p
Definition: ng_hci.h:447
#define NG_HCI_LINK_ACL
Definition: ng_hci.h:121
#define NG_HCI_SERVICE_TYPE_BEST_EFFORT
Definition: ng_hci.h:215
#define NG_HCI_LINK_LE_PUBLIC
Definition: ng_hci.h:122
#define NGM_L2CAP_L2CA_DISCON
Definition: ng_l2cap.h:464
#define NGM_L2CAP_L2CA_ENC_CHANGE
Definition: ng_l2cap.h:605
#define NG_L2CAP_SMP_CID
Definition: ng_l2cap.h:81
#define NG_L2CAP_CLT_CID
Definition: ng_l2cap.h:77
#define NG_L2CAP_PSM_NOT_SUPPORTED
Definition: ng_l2cap.h:113
#define NGM_L2CAP_L2CA_CFG_RSP
Definition: ng_l2cap.h:431
#define NG_L2CAP_PENDING
Definition: ng_l2cap.h:112
#define NGM_L2CAP_L2CA_WRITE
Definition: ng_l2cap.h:483
#define NG_L2CAP_L2CA_IDTYPE_BREDR
Definition: ng_l2cap.h:359
#define NG_L2CAP_L2CA_IDTYPE_SMP
Definition: ng_l2cap.h:362
#define NG_L2CAP_FLUSH_TIMO_DEFAULT
Definition: ng_l2cap.h:94
#define NG_L2CAP_ATT_CID
Definition: ng_l2cap.h:79
#define NGM_L2CAP_COOKIE
Definition: ng_l2cap.h:60
#define NGM_L2CAP_L2CA_CFG
Definition: ng_l2cap.h:412
#define NGM_L2CAP_L2CA_DISCON_IND
Definition: ng_l2cap.h:477
#define NG_L2CAP_MTU_DEFAULT
Definition: ng_l2cap.h:90
#define NG_L2CAP_L2CA_IDTYPE_ATT
Definition: ng_l2cap.h:360
#define NG_L2CAP_SUCCESS
Definition: ng_l2cap.h:111
#define NGM_L2CAP_L2CA_CFG_IND
Definition: ng_l2cap.h:445
#define NG_L2CAP_UNACCEPTABLE_PARAMS
Definition: ng_l2cap.h:127
#define NGM_L2CAP_L2CA_CON_RSP
Definition: ng_l2cap.h:395
#define NGM_L2CAP_L2CA_CON
Definition: ng_l2cap.h:364
#define NGM_L2CAP_L2CA_CON_IND
Definition: ng_l2cap.h:383
#define NG_L2CAP_NO_RESOURCES
Definition: ng_l2cap.h:115
#define NG_L2CAP_UNKNOWN_OPTION
Definition: ng_l2cap.h:129
#define NG_L2CAP_LINK_TIMO_DEFAULT
Definition: ng_l2cap.h:95
#define NGM_L2CAP_NODE_HOOK_INFO
Definition: ng_l2cap.h:652
#define NG_L2CAP_FIRST_CID
Definition: ng_l2cap.h:83
#define NG_MKMESSAGE(msg, cookie, cmdid, len, how)
Definition: ng_message.h:378
char *const name
Definition: ng_ppp.c:261
cmd
Definition: ng_pppoe.h:74
uint8_t data[]
Definition: ng_ubt_var.h:2
u_int32_t maxlen
Definition: ng_bluetooth.h:157
u_int32_t drops
Definition: ng_bluetooth.h:158
u_int32_t len
Definition: ng_bluetooth.h:156
ng_btsocket_l2cap_rtentry_p rt
u_long el_flags
Definition: netgraph.h:636
ng_l2cap_flow_t iflow
Definition: ng_l2cap.h:450
u_int16_t link_timo
Definition: ng_l2cap.h:419
u_int16_t flush_timo
Definition: ng_l2cap.h:418
ng_l2cap_flow_t oflow
Definition: ng_l2cap.h:417
u_int16_t result
Definition: ng_l2cap.h:424
ng_l2cap_flow_t oflow
Definition: ng_l2cap.h:426
u_int16_t flush_timo
Definition: ng_l2cap.h:427
ng_l2cap_flow_t iflow
Definition: ng_l2cap.h:436
u_int16_t result
Definition: ng_l2cap.h:377
u_int16_t status
Definition: ng_l2cap.h:378
u_int32_t arglen
Definition: ng_message.h:62
u_int32_t token
Definition: ng_message.h:65
u_int32_t typecookie
Definition: ng_message.h:66
struct ng_mesg::ng_msghdr header
char data[]
Definition: ng_message.h:69
u_int32_t version
Definition: netgraph.h:1077
u_char l2cap_len
Definition: ng_btsocket.h:234
u_int16_t l2cap_cid
Definition: ng_btsocket.h:238
u_int8_t l2cap_bdaddr_type
Definition: ng_btsocket.h:239
u_int16_t l2cap_psm
Definition: ng_btsocket.h:236
bdaddr_t l2cap_bdaddr
Definition: ng_btsocket.h:237
u_char l2cap_family
Definition: ng_btsocket.h:235
ng_l2cap_flow_t flow
Definition: ng_l2cap.h:259
u_int16_t flush_timo
Definition: ng_l2cap.h:258