kernel/netgraph7: Replace usage of MALLOC/FREE with kmalloc/kfree here too.
[dragonfly.git] / sys / netgraph7 / bluetooth / socket / ng_btsocket_l2cap.c
CommitLineData
b06ebda0
MD
1/*
2 * ng_btsocket_l2cap.c
3 */
4
5/*-
6 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
7 * All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGE.
29 *
30 * $Id: ng_btsocket_l2cap.c,v 1.16 2003/09/14 23:29:06 max Exp $
31 * $FreeBSD: src/sys/netgraph/bluetooth/socket/ng_btsocket_l2cap.c,v 1.25 2007/10/31 16:17:20 emax Exp $
5a975a3d 32 * $DragonFly: src/sys/netgraph7/bluetooth/socket/ng_btsocket_l2cap.c,v 1.2 2008/06/26 23:05:40 dillon Exp $
b06ebda0
MD
33 */
34
35#include <sys/param.h>
36#include <sys/systm.h>
37#include <sys/bitstring.h>
38#include <sys/domain.h>
39#include <sys/endian.h>
40#include <sys/errno.h>
41#include <sys/filedesc.h>
b06ebda0
MD
42#include <sys/kernel.h>
43#include <sys/lock.h>
44#include <sys/malloc.h>
45#include <sys/mbuf.h>
46#include <sys/mutex.h>
47#include <sys/protosw.h>
48#include <sys/queue.h>
49#include <sys/socket.h>
50#include <sys/socketvar.h>
51#include <sys/sysctl.h>
52#include <sys/taskqueue.h>
5a975a3d
MD
53#include "ng_message.h"
54#include "netgraph.h"
55#include "bluetooth/include/ng_bluetooth.h"
56#include "bluetooth/include/ng_hci.h"
57#include "bluetooth/include/ng_l2cap.h"
58#include "bluetooth/include/ng_btsocket.h"
59#include "bluetooth/include/ng_btsocket_l2cap.h"
b06ebda0
MD
60
61/* MALLOC define */
62#ifdef NG_SEPARATE_MALLOC
63MALLOC_DEFINE(M_NETGRAPH_BTSOCKET_L2CAP, "netgraph_btsocks_l2cap",
64 "Netgraph Bluetooth L2CAP sockets");
65#else
66#define M_NETGRAPH_BTSOCKET_L2CAP M_NETGRAPH
67#endif /* NG_SEPARATE_MALLOC */
68
69/* Netgraph node methods */
70static ng_constructor_t ng_btsocket_l2cap_node_constructor;
71static ng_rcvmsg_t ng_btsocket_l2cap_node_rcvmsg;
72static ng_shutdown_t ng_btsocket_l2cap_node_shutdown;
73static ng_newhook_t ng_btsocket_l2cap_node_newhook;
74static ng_connect_t ng_btsocket_l2cap_node_connect;
75static ng_rcvdata_t ng_btsocket_l2cap_node_rcvdata;
76static ng_disconnect_t ng_btsocket_l2cap_node_disconnect;
77
78static void ng_btsocket_l2cap_input (void *, int);
79static void ng_btsocket_l2cap_rtclean (void *, int);
80
81/* Netgraph type descriptor */
82static struct ng_type typestruct = {
83 .version = NG_ABI_VERSION,
84 .name = NG_BTSOCKET_L2CAP_NODE_TYPE,
85 .constructor = ng_btsocket_l2cap_node_constructor,
86 .rcvmsg = ng_btsocket_l2cap_node_rcvmsg,
87 .shutdown = ng_btsocket_l2cap_node_shutdown,
88 .newhook = ng_btsocket_l2cap_node_newhook,
89 .connect = ng_btsocket_l2cap_node_connect,
90 .rcvdata = ng_btsocket_l2cap_node_rcvdata,
91 .disconnect = ng_btsocket_l2cap_node_disconnect,
92};
93
94/* Globals */
95extern int ifqmaxlen;
96static u_int32_t ng_btsocket_l2cap_debug_level;
97static node_p ng_btsocket_l2cap_node;
98static struct ng_bt_itemq ng_btsocket_l2cap_queue;
99static struct mtx ng_btsocket_l2cap_queue_mtx;
100static struct task ng_btsocket_l2cap_queue_task;
101static LIST_HEAD(, ng_btsocket_l2cap_pcb) ng_btsocket_l2cap_sockets;
102static struct mtx ng_btsocket_l2cap_sockets_mtx;
103static LIST_HEAD(, ng_btsocket_l2cap_rtentry) ng_btsocket_l2cap_rt;
104static struct mtx ng_btsocket_l2cap_rt_mtx;
105static struct task ng_btsocket_l2cap_rt_task;
106
107/* Sysctl tree */
108SYSCTL_DECL(_net_bluetooth_l2cap_sockets);
109SYSCTL_NODE(_net_bluetooth_l2cap_sockets, OID_AUTO, seq, CTLFLAG_RW,
110 0, "Bluetooth SEQPACKET L2CAP sockets family");
111SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, debug_level,
112 CTLFLAG_RW,
113 &ng_btsocket_l2cap_debug_level, NG_BTSOCKET_WARN_LEVEL,
114 "Bluetooth SEQPACKET L2CAP sockets debug level");
115SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_len,
116 CTLFLAG_RD,
117 &ng_btsocket_l2cap_queue.len, 0,
118 "Bluetooth SEQPACKET L2CAP sockets input queue length");
119SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_maxlen,
120 CTLFLAG_RD,
121 &ng_btsocket_l2cap_queue.maxlen, 0,
122 "Bluetooth SEQPACKET L2CAP sockets input queue max. length");
123SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_drops,
124 CTLFLAG_RD,
125 &ng_btsocket_l2cap_queue.drops, 0,
126 "Bluetooth SEQPACKET L2CAP sockets input queue drops");
127
128/* Debug */
129#define NG_BTSOCKET_L2CAP_INFO \
130 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_INFO_LEVEL) \
131 printf
132
133#define NG_BTSOCKET_L2CAP_WARN \
134 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_WARN_LEVEL) \
135 printf
136
137#define NG_BTSOCKET_L2CAP_ERR \
138 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ERR_LEVEL) \
139 printf
140
141#define NG_BTSOCKET_L2CAP_ALERT \
142 if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ALERT_LEVEL) \
143 printf
144
145/*
146 * Netgraph message processing routines
147 */
148
149static int ng_btsocket_l2cap_process_l2ca_con_req_rsp
150 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
151static int ng_btsocket_l2cap_process_l2ca_con_rsp_rsp
152 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
153static int ng_btsocket_l2cap_process_l2ca_con_ind
154 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
155
156static int ng_btsocket_l2cap_process_l2ca_cfg_req_rsp
157 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
158static int ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp
159 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
160static int ng_btsocket_l2cap_process_l2ca_cfg_ind
161 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
162
163static int ng_btsocket_l2cap_process_l2ca_discon_rsp
164 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
165static int ng_btsocket_l2cap_process_l2ca_discon_ind
166 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
167
168static int ng_btsocket_l2cap_process_l2ca_write_rsp
169 (struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
170
171/*
172 * Send L2CA_xxx messages to the lower layer
173 */
174
175static int ng_btsocket_l2cap_send_l2ca_con_req
176 (ng_btsocket_l2cap_pcb_p);
177static int ng_btsocket_l2cap_send_l2ca_con_rsp_req
178 (u_int32_t, ng_btsocket_l2cap_rtentry_p, bdaddr_p, int, int, int);
179static int ng_btsocket_l2cap_send_l2ca_cfg_req
180 (ng_btsocket_l2cap_pcb_p);
181static int ng_btsocket_l2cap_send_l2ca_cfg_rsp
182 (ng_btsocket_l2cap_pcb_p);
183static int ng_btsocket_l2cap_send_l2ca_discon_req
184 (u_int32_t, ng_btsocket_l2cap_pcb_p);
185
186static int ng_btsocket_l2cap_send2
187 (ng_btsocket_l2cap_pcb_p);
188
189/*
190 * Timeout processing routines
191 */
192
193static void ng_btsocket_l2cap_timeout (ng_btsocket_l2cap_pcb_p);
194static void ng_btsocket_l2cap_untimeout (ng_btsocket_l2cap_pcb_p);
195static void ng_btsocket_l2cap_process_timeout (void *);
196
197/*
198 * Other stuff
199 */
200
201static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_addr(bdaddr_p, int);
202static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_token(u_int32_t);
203static ng_btsocket_l2cap_pcb_p ng_btsocket_l2cap_pcb_by_cid (bdaddr_p, int);
204static int ng_btsocket_l2cap_result2errno(int);
205
206#define ng_btsocket_l2cap_wakeup_input_task() \
207 taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_queue_task)
208
209#define ng_btsocket_l2cap_wakeup_route_task() \
210 taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_rt_task)
211
212/*****************************************************************************
213 *****************************************************************************
214 ** Netgraph node interface
215 *****************************************************************************
216 *****************************************************************************/
217
218/*
219 * Netgraph node constructor. Do not allow to create node of this type.
220 */
221
222static int
223ng_btsocket_l2cap_node_constructor(node_p node)
224{
225 return (EINVAL);
226} /* ng_btsocket_l2cap_node_constructor */
227
228/*
229 * Do local shutdown processing. Let old node go and create new fresh one.
230 */
231
232static int
233ng_btsocket_l2cap_node_shutdown(node_p node)
234{
235 int error = 0;
236
237 NG_NODE_UNREF(node);
238
239 /* Create new node */
240 error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
241 if (error != 0) {
242 NG_BTSOCKET_L2CAP_ALERT(
243"%s: Could not create Netgraph node, error=%d\n", __func__, error);
244
245 ng_btsocket_l2cap_node = NULL;
246
247 return (error);
248 }
249
250 error = ng_name_node(ng_btsocket_l2cap_node,
251 NG_BTSOCKET_L2CAP_NODE_TYPE);
252 if (error != 0) {
253 NG_BTSOCKET_L2CAP_ALERT(
254"%s: Could not name Netgraph node, error=%d\n", __func__, error);
255
256 NG_NODE_UNREF(ng_btsocket_l2cap_node);
257 ng_btsocket_l2cap_node = NULL;
258
259 return (error);
260 }
261
262 return (0);
263} /* ng_btsocket_l2cap_node_shutdown */
264
265/*
266 * We allow any hook to be connected to the node.
267 */
268
269static int
270ng_btsocket_l2cap_node_newhook(node_p node, hook_p hook, char const *name)
271{
272 return (0);
273} /* ng_btsocket_l2cap_node_newhook */
274
275/*
276 * Just say "YEP, that's OK by me!"
277 */
278
279static int
280ng_btsocket_l2cap_node_connect(hook_p hook)
281{
282 NG_HOOK_SET_PRIVATE(hook, NULL);
283 NG_HOOK_REF(hook); /* Keep extra reference to the hook */
284
285#if 0
286 NG_HOOK_FORCE_QUEUE(NG_HOOK_PEER(hook));
287 NG_HOOK_FORCE_QUEUE(hook);
288#endif
289
290 return (0);
291} /* ng_btsocket_l2cap_node_connect */
292
293/*
294 * Hook disconnection. Schedule route cleanup task
295 */
296
297static int
298ng_btsocket_l2cap_node_disconnect(hook_p hook)
299{
300 /*
301 * If hook has private information than we must have this hook in
302 * the routing table and must schedule cleaning for the routing table.
303 * Otherwise hook was connected but we never got "hook_info" message,
304 * so we have never added this hook to the routing table and it save
305 * to just delete it.
306 */
307
308 if (NG_HOOK_PRIVATE(hook) != NULL)
309 return (ng_btsocket_l2cap_wakeup_route_task());
310
311 NG_HOOK_UNREF(hook); /* Remove extra reference */
312
313 return (0);
314} /* ng_btsocket_l2cap_node_disconnect */
315
316/*
317 * Process incoming messages
318 */
319
320static int
321ng_btsocket_l2cap_node_rcvmsg(node_p node, item_p item, hook_p hook)
322{
323 struct ng_mesg *msg = NGI_MSG(item); /* item still has message */
324 int error = 0;
325
326 if (msg != NULL && msg->header.typecookie == NGM_L2CAP_COOKIE) {
327 mtx_lock(&ng_btsocket_l2cap_queue_mtx);
328 if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
329 NG_BTSOCKET_L2CAP_ERR(
330"%s: Input queue is full (msg)\n", __func__);
331
332 NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
333 NG_FREE_ITEM(item);
334 error = ENOBUFS;
335 } else {
336 if (hook != NULL) {
337 NG_HOOK_REF(hook);
338 NGI_SET_HOOK(item, hook);
339 }
340
341 NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
342 error = ng_btsocket_l2cap_wakeup_input_task();
343 }
344 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
345 } else {
346 NG_FREE_ITEM(item);
347 error = EINVAL;
348 }
349
350 return (error);
351} /* ng_btsocket_l2cap_node_rcvmsg */
352
353/*
354 * Receive data on a hook
355 */
356
357static int
358ng_btsocket_l2cap_node_rcvdata(hook_p hook, item_p item)
359{
360 int error = 0;
361
362 mtx_lock(&ng_btsocket_l2cap_queue_mtx);
363 if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
364 NG_BTSOCKET_L2CAP_ERR(
365"%s: Input queue is full (data)\n", __func__);
366
367 NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
368 NG_FREE_ITEM(item);
369 error = ENOBUFS;
370 } else {
371 NG_HOOK_REF(hook);
372 NGI_SET_HOOK(item, hook);
373
374 NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
375 error = ng_btsocket_l2cap_wakeup_input_task();
376 }
377 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
378
379 return (error);
380} /* ng_btsocket_l2cap_node_rcvdata */
381
382/*
383 * Process L2CA_Connect respose. Socket layer must have initiated connection,
384 * so we have to have a socket associated with message token.
385 */
386
387static int
388ng_btsocket_l2cap_process_l2ca_con_req_rsp(struct ng_mesg *msg,
389 ng_btsocket_l2cap_rtentry_p rt)
390{
391 ng_l2cap_l2ca_con_op *op = NULL;
392 ng_btsocket_l2cap_pcb_t *pcb = NULL;
393 int error = 0;
394
395 if (msg->header.arglen != sizeof(*op))
396 return (EMSGSIZE);
397
398 op = (ng_l2cap_l2ca_con_op *)(msg->data);
399
400 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
401
402 /* Look for the socket with the token */
403 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
404 if (pcb == NULL) {
405 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
406 return (ENOENT);
407 }
408
409 mtx_lock(&pcb->pcb_mtx);
410
411 NG_BTSOCKET_L2CAP_INFO(
412"%s: Got L2CA_Connect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
413"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, status=%d, " \
414"state=%d\n", __func__, msg->header.token,
415 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
416 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
417 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
418 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
419 pcb->psm, op->lcid, op->result, op->status,
420 pcb->state);
421
422 if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
423 mtx_unlock(&pcb->pcb_mtx);
424 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
425
426 return (ENOENT);
427 }
428
429 ng_btsocket_l2cap_untimeout(pcb);
430
431 if (op->result == NG_L2CAP_PENDING) {
432 ng_btsocket_l2cap_timeout(pcb);
433 mtx_unlock(&pcb->pcb_mtx);
434 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
435
436 return (0);
437 }
438
439 if (op->result == NG_L2CAP_SUCCESS) {
440 /*
441 * Channel is now open, so update local channel ID and
442 * start configuration process. Source and destination
443 * addresses as well as route must be already set.
444 */
445
446 pcb->cid = op->lcid;
447
448 error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
449 if (error != 0) {
450 /* Send disconnect request with "zero" token */
451 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
452
453 /* ... and close the socket */
454 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
455 soisdisconnected(pcb->so);
456 } else {
457 pcb->cfg_state = NG_BTSOCKET_L2CAP_CFG_IN_SENT;
458 pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
459
460 ng_btsocket_l2cap_timeout(pcb);
461 }
462 } else {
463 /*
464 * We have failed to open connection, so convert result
465 * code to "errno" code and disconnect the socket. Channel
466 * already has been closed.
467 */
468
469 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
470 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
471 soisdisconnected(pcb->so);
472 }
473
474 mtx_unlock(&pcb->pcb_mtx);
475 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
476
477 return (error);
478} /* ng_btsocket_l2cap_process_l2ca_con_req_rsp */
479
480/*
481 * Process L2CA_ConnectRsp response
482 */
483
484static int
485ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(struct ng_mesg *msg,
486 ng_btsocket_l2cap_rtentry_p rt)
487{
488 ng_l2cap_l2ca_con_rsp_op *op = NULL;
489 ng_btsocket_l2cap_pcb_t *pcb = NULL;
490
491 if (msg->header.arglen != sizeof(*op))
492 return (EMSGSIZE);
493
494 op = (ng_l2cap_l2ca_con_rsp_op *)(msg->data);
495
496 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
497
498 /* Look for the socket with the token */
499 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
500 if (pcb == NULL) {
501 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
502 return (ENOENT);
503 }
504
505 mtx_lock(&pcb->pcb_mtx);
506
507 NG_BTSOCKET_L2CAP_INFO(
508"%s: Got L2CA_ConnectRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
509"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
510 __func__, msg->header.token,
511 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
512 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
513 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
514 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
515 pcb->psm, pcb->cid, op->result, pcb->state);
516
517 if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
518 mtx_unlock(&pcb->pcb_mtx);
519 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
520
521 return (ENOENT);
522 }
523
524 ng_btsocket_l2cap_untimeout(pcb);
525
526 /* Check the result and disconnect the socket on failure */
527 if (op->result != NG_L2CAP_SUCCESS) {
528 /* Close the socket - channel already closed */
529 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
530 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
531 soisdisconnected(pcb->so);
532 } else {
533 /* Move to CONFIGURING state and wait for CONFIG_IND */
534 pcb->cfg_state = 0;
535 pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
536 ng_btsocket_l2cap_timeout(pcb);
537 }
538
539 mtx_unlock(&pcb->pcb_mtx);
540 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
541
542 return (0);
543} /* ng_btsocket_process_l2ca_con_rsp_rsp */
544
545/*
546 * Process L2CA_Connect indicator. Find socket that listens on address
547 * and PSM. Find exact or closest match. Create new socket and initiate
548 * connection.
549 */
550
551static int
552ng_btsocket_l2cap_process_l2ca_con_ind(struct ng_mesg *msg,
553 ng_btsocket_l2cap_rtentry_p rt)
554{
555 ng_l2cap_l2ca_con_ind_ip *ip = NULL;
556 ng_btsocket_l2cap_pcb_t *pcb = NULL, *pcb1 = NULL;
557 int error = 0;
558 u_int32_t token = 0;
559 u_int16_t result = 0;
560
561 if (msg->header.arglen != sizeof(*ip))
562 return (EMSGSIZE);
563
564 ip = (ng_l2cap_l2ca_con_ind_ip *)(msg->data);
565
566 NG_BTSOCKET_L2CAP_INFO(
567"%s: Got L2CA_Connect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
568"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, ident=%d\n",
569 __func__,
570 rt->src.b[5], rt->src.b[4], rt->src.b[3],
571 rt->src.b[2], rt->src.b[1], rt->src.b[0],
572 ip->bdaddr.b[5], ip->bdaddr.b[4], ip->bdaddr.b[3],
573 ip->bdaddr.b[2], ip->bdaddr.b[1], ip->bdaddr.b[0],
574 ip->psm, ip->lcid, ip->ident);
575
576 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
577
578 pcb = ng_btsocket_l2cap_pcb_by_addr(&rt->src, ip->psm);
579 if (pcb != NULL) {
580 struct socket *so1 = NULL;
581
582 mtx_lock(&pcb->pcb_mtx);
583
584 /*
585 * First check the pending connections queue and if we have
586 * space then create new socket and set proper source address.
587 */
588
589 if (pcb->so->so_qlen <= pcb->so->so_qlimit)
590 so1 = sonewconn(pcb->so, 0);
591
592 if (so1 == NULL) {
593 result = NG_L2CAP_NO_RESOURCES;
594 goto respond;
595 }
596
597 /*
598 * If we got here than we have created new socket. So complete
599 * connection. If we we listening on specific address then copy
600 * source address from listening socket, otherwise copy source
601 * address from hook's routing information.
602 */
603
604 pcb1 = so2l2cap_pcb(so1);
605 KASSERT((pcb1 != NULL),
606("%s: pcb1 == NULL\n", __func__));
607
608 mtx_lock(&pcb1->pcb_mtx);
609
610 if (bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src)) != 0)
611 bcopy(&pcb->src, &pcb1->src, sizeof(pcb1->src));
612 else
613 bcopy(&rt->src, &pcb1->src, sizeof(pcb1->src));
614
615 pcb1->flags &= ~NG_BTSOCKET_L2CAP_CLIENT;
616
617 bcopy(&ip->bdaddr, &pcb1->dst, sizeof(pcb1->dst));
618 pcb1->psm = ip->psm;
619 pcb1->cid = ip->lcid;
620 pcb1->rt = rt;
621
622 /* Copy socket settings */
623 pcb1->imtu = pcb->imtu;
624 bcopy(&pcb->oflow, &pcb1->oflow, sizeof(pcb1->oflow));
625 pcb1->flush_timo = pcb->flush_timo;
626
627 token = pcb1->token;
628 } else
629 /* Nobody listens on requested BDADDR/PSM */
630 result = NG_L2CAP_PSM_NOT_SUPPORTED;
631
632respond:
633 error = ng_btsocket_l2cap_send_l2ca_con_rsp_req(token, rt,
634 &ip->bdaddr, ip->ident, ip->lcid, result);
635 if (pcb1 != NULL) {
636 if (error != 0) {
637 pcb1->so->so_error = error;
638 pcb1->state = NG_BTSOCKET_L2CAP_CLOSED;
639 soisdisconnected(pcb1->so);
640 } else {
641 pcb1->state = NG_BTSOCKET_L2CAP_CONNECTING;
642 soisconnecting(pcb1->so);
643
644 ng_btsocket_l2cap_timeout(pcb1);
645 }
646
647 mtx_unlock(&pcb1->pcb_mtx);
648 }
649
650 if (pcb != NULL)
651 mtx_unlock(&pcb->pcb_mtx);
652
653 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
654
655 return (error);
656} /* ng_btsocket_l2cap_process_l2ca_con_ind */
657
658/*
659 * Process L2CA_Config response
660 */
661
662static int
663ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(struct ng_mesg *msg,
664 ng_btsocket_l2cap_rtentry_p rt)
665{
666 ng_l2cap_l2ca_cfg_op *op = NULL;
667 ng_btsocket_l2cap_pcb_p pcb = NULL;
668
669 if (msg->header.arglen != sizeof(*op))
670 return (EMSGSIZE);
671
672 op = (ng_l2cap_l2ca_cfg_op *)(msg->data);
673
674 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
675
676 /*
677 * Socket must have issued a Configure request, so we must have a
678 * socket that wants to be configured. Use Netgraph message token
679 * to find it
680 */
681
682 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
683 if (pcb == NULL) {
684 /*
685 * XXX FIXME what to do here? We could not find a
686 * socket with requested token. We even can not send
687 * Disconnect, because we do not know channel ID
688 */
689
690 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
691 return (ENOENT);
692 }
693
694 mtx_lock(&pcb->pcb_mtx);
695
696 NG_BTSOCKET_L2CAP_INFO(
697"%s: Got L2CA_Config response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
698"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
699"cfg_state=%x\n",
700 __func__, msg->header.token,
701 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
702 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
703 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
704 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
705 pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
706
707 if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
708 mtx_unlock(&pcb->pcb_mtx);
709 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
710
711 return (ENOENT);
712 }
713
714 if (op->result == NG_L2CAP_SUCCESS) {
715 /*
716 * XXX FIXME Actually set flush and link timeout.
717 * Set QoS here if required. Resolve conficts (flush_timo).
718 * Save incoming MTU (peer's outgoing MTU) and outgoing flow
719 * spec.
720 */
721
722 pcb->imtu = op->imtu;
723 bcopy(&op->oflow, &pcb->oflow, sizeof(pcb->oflow));
724 pcb->flush_timo = op->flush_timo;
725
726 /*
727 * We have configured incoming side, so record it and check
728 * if configuration is complete. If complete then mark socket
729 * as connected, otherwise wait for the peer.
730 */
731
732 pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_IN_SENT;
733 pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN;
734
735 if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
736 /* Configuration complete - mark socket as open */
737 ng_btsocket_l2cap_untimeout(pcb);
738 pcb->state = NG_BTSOCKET_L2CAP_OPEN;
739 soisconnected(pcb->so);
740 }
741 } else {
742 /*
743 * Something went wrong. Could be unacceptable parameters,
744 * reject or unknown option. That's too bad, but we will
745 * not negotiate. Send Disconnect and close the channel.
746 */
747
748 ng_btsocket_l2cap_untimeout(pcb);
749
750 switch (op->result) {
751 case NG_L2CAP_UNACCEPTABLE_PARAMS:
752 case NG_L2CAP_UNKNOWN_OPTION:
753 pcb->so->so_error = EINVAL;
754 break;
755
756 default:
757 pcb->so->so_error = ECONNRESET;
758 break;
759 }
760
761 /* Send disconnect with "zero" token */
762 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
763
764 /* ... and close the socket */
765 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
766 soisdisconnected(pcb->so);
767 }
768
769 mtx_unlock(&pcb->pcb_mtx);
770 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
771
772 return (0);
773} /* ng_btsocket_l2cap_process_l2ca_cfg_req_rsp */
774
775/*
776 * Process L2CA_ConfigRsp response
777 */
778
779static int
780ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(struct ng_mesg *msg,
781 ng_btsocket_l2cap_rtentry_p rt)
782{
783 ng_l2cap_l2ca_cfg_rsp_op *op = NULL;
784 ng_btsocket_l2cap_pcb_t *pcb = NULL;
785 int error = 0;
786
787 if (msg->header.arglen != sizeof(*op))
788 return (EMSGSIZE);
789
790 op = (ng_l2cap_l2ca_cfg_rsp_op *)(msg->data);
791
792 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
793
794 /* Look for the socket with the token */
795 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
796 if (pcb == NULL) {
797 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
798 return (ENOENT);
799 }
800
801 mtx_lock(&pcb->pcb_mtx);
802
803 NG_BTSOCKET_L2CAP_INFO(
804"%s: Got L2CA_ConfigRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
805"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
806"cfg_state=%x\n",
807 __func__, msg->header.token,
808 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
809 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
810 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
811 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
812 pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
813
814 if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
815 mtx_unlock(&pcb->pcb_mtx);
816 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
817
818 return (ENOENT);
819 }
820
821 /* Check the result and disconnect socket of failure */
822 if (op->result != NG_L2CAP_SUCCESS)
823 goto disconnect;
824
825 /*
826 * Now we done with remote side configuration. Configure local
827 * side if we have not done it yet.
828 */
829
830 pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
831 pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT;
832
833 if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
834 /* Configuration complete - mask socket as open */
835 ng_btsocket_l2cap_untimeout(pcb);
836 pcb->state = NG_BTSOCKET_L2CAP_OPEN;
837 soisconnected(pcb->so);
838 } else {
839 if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_IN_SENT)) {
840 /* Send L2CA_Config request - incoming path */
841 error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
842 if (error != 0)
843 goto disconnect;
844
845 pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN_SENT;
846 }
847 }
848
849 mtx_unlock(&pcb->pcb_mtx);
850 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
851
852 return (error);
853
854disconnect:
855 ng_btsocket_l2cap_untimeout(pcb);
856
857 /* Send disconnect with "zero" token */
858 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
859
860 /* ... and close the socket */
861 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
862 soisdisconnected(pcb->so);
863
864 mtx_unlock(&pcb->pcb_mtx);
865 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
866
867 return (error);
868} /* ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp */
869
870/*
871 * Process L2CA_Config indicator
872 */
873
874static int
875ng_btsocket_l2cap_process_l2ca_cfg_ind(struct ng_mesg *msg,
876 ng_btsocket_l2cap_rtentry_p rt)
877{
878 ng_l2cap_l2ca_cfg_ind_ip *ip = NULL;
879 ng_btsocket_l2cap_pcb_t *pcb = NULL;
880 int error = 0;
881
882 if (msg->header.arglen != sizeof(*ip))
883 return (EMSGSIZE);
884
885 ip = (ng_l2cap_l2ca_cfg_ind_ip *)(msg->data);
886
887 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
888
889 /* Check for the open socket that has given channel ID */
890 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid);
891 if (pcb == NULL) {
892 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
893 return (ENOENT);
894 }
895
896 mtx_lock(&pcb->pcb_mtx);
897
898 NG_BTSOCKET_L2CAP_INFO(
899"%s: Got L2CA_Config indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
900"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d, cfg_state=%x\n",
901 __func__,
902 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
903 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
904 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
905 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
906 pcb->psm, pcb->cid, pcb->state, pcb->cfg_state);
907
908 /* XXX FIXME re-configuration on open socket */
909 if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
910 mtx_unlock(&pcb->pcb_mtx);
911 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
912
913 return (ENOENT);
914 }
915
916 /*
917 * XXX FIXME Actually set flush and link timeout. Set QoS here if
918 * required. Resolve conficts (flush_timo). Note outgoing MTU (peer's
919 * incoming MTU) and incoming flow spec.
920 */
921
922 pcb->omtu = ip->omtu;
923 bcopy(&ip->iflow, &pcb->iflow, sizeof(pcb->iflow));
924 pcb->flush_timo = ip->flush_timo;
925
926 /*
927 * Send L2CA_Config response to our peer and check for the errors,
928 * if any send disconnect to close the channel.
929 */
930
931 if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_OUT_SENT)) {
932 error = ng_btsocket_l2cap_send_l2ca_cfg_rsp(pcb);
933 if (error != 0) {
934 ng_btsocket_l2cap_untimeout(pcb);
935
936 pcb->so->so_error = error;
937
938 /* Send disconnect with "zero" token */
939 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
940
941 /* ... and close the socket */
942 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
943 soisdisconnected(pcb->so);
944 } else
945 pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
946 }
947
948 mtx_unlock(&pcb->pcb_mtx);
949 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
950
951 return (error);
952} /* ng_btsocket_l2cap_process_l2cap_cfg_ind */
953
954/*
955 * Process L2CA_Disconnect response
956 */
957
958static int
959ng_btsocket_l2cap_process_l2ca_discon_rsp(struct ng_mesg *msg,
960 ng_btsocket_l2cap_rtentry_p rt)
961{
962 ng_l2cap_l2ca_discon_op *op = NULL;
963 ng_btsocket_l2cap_pcb_t *pcb = NULL;
964
965 /* Check message */
966 if (msg->header.arglen != sizeof(*op))
967 return (EMSGSIZE);
968
969 op = (ng_l2cap_l2ca_discon_op *)(msg->data);
970
971 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
972
973 /*
974 * Socket layer must have issued L2CA_Disconnect request, so there
975 * must be a socket that wants to be disconnected. Use Netgraph
976 * message token to find it.
977 */
978
979 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
980 if (pcb == NULL) {
981 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
982 return (0);
983 }
984
985 mtx_lock(&pcb->pcb_mtx);
986
987 /* XXX Close socket no matter what op->result says */
988 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
989 NG_BTSOCKET_L2CAP_INFO(
990"%s: Got L2CA_Disconnect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
991"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
992 __func__, msg->header.token,
993 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
994 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
995 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
996 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
997 pcb->psm, pcb->cid, op->result, pcb->state);
998
999 ng_btsocket_l2cap_untimeout(pcb);
1000
1001 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1002 soisdisconnected(pcb->so);
1003 }
1004
1005 mtx_unlock(&pcb->pcb_mtx);
1006 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1007
1008 return (0);
1009} /* ng_btsocket_l2cap_process_l2ca_discon_rsp */
1010
1011/*
1012 * Process L2CA_Disconnect indicator
1013 */
1014
1015static int
1016ng_btsocket_l2cap_process_l2ca_discon_ind(struct ng_mesg *msg,
1017 ng_btsocket_l2cap_rtentry_p rt)
1018{
1019 ng_l2cap_l2ca_discon_ind_ip *ip = NULL;
1020 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1021
1022 /* Check message */
1023 if (msg->header.arglen != sizeof(*ip))
1024 return (EMSGSIZE);
1025
1026 ip = (ng_l2cap_l2ca_discon_ind_ip *)(msg->data);
1027
1028 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1029
1030 /* Look for the socket with given channel ID */
1031 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid);
1032 if (pcb == NULL) {
1033 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1034 return (0);
1035 }
1036
1037 /*
1038 * Channel has already been destroyed, so disconnect the socket
1039 * and be done with it. If there was any pending request we can
1040 * not do anything here anyway.
1041 */
1042
1043 mtx_lock(&pcb->pcb_mtx);
1044
1045 NG_BTSOCKET_L2CAP_INFO(
1046"%s: Got L2CA_Disconnect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1047"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d\n",
1048 __func__,
1049 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1050 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1051 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1052 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1053 pcb->psm, pcb->cid, pcb->state);
1054
1055 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1056 ng_btsocket_l2cap_untimeout(pcb);
1057
1058 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1059 soisdisconnected(pcb->so);
1060
1061 mtx_unlock(&pcb->pcb_mtx);
1062 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1063
1064 return (0);
1065} /* ng_btsocket_l2cap_process_l2ca_discon_ind */
1066
1067/*
1068 * Process L2CA_Write response
1069 */
1070
1071static int
1072ng_btsocket_l2cap_process_l2ca_write_rsp(struct ng_mesg *msg,
1073 ng_btsocket_l2cap_rtentry_p rt)
1074{
1075 ng_l2cap_l2ca_write_op *op = NULL;
1076 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1077
1078 /* Check message */
1079 if (msg->header.arglen != sizeof(*op))
1080 return (EMSGSIZE);
1081
1082 op = (ng_l2cap_l2ca_write_op *)(msg->data);
1083
1084 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1085
1086 /* Look for the socket with given token */
1087 pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
1088 if (pcb == NULL) {
1089 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1090 return (ENOENT);
1091 }
1092
1093 mtx_lock(&pcb->pcb_mtx);
1094
1095 NG_BTSOCKET_L2CAP_INFO(
1096"%s: Got L2CA_Write response, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1097"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, length=%d, " \
1098"state=%d\n", __func__,
1099 pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1100 pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1101 pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1102 pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1103 pcb->psm, pcb->cid, op->result, op->length,
1104 pcb->state);
1105
1106 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1107 mtx_unlock(&pcb->pcb_mtx);
1108 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1109
1110 return (ENOENT);
1111 }
1112
1113 ng_btsocket_l2cap_untimeout(pcb);
1114
1115 /*
1116 * Check if we have more data to send
1117 */
1118
1119 sbdroprecord(&pcb->so->so_snd);
1120 if (pcb->so->so_snd.sb_cc > 0) {
1121 if (ng_btsocket_l2cap_send2(pcb) == 0)
1122 ng_btsocket_l2cap_timeout(pcb);
1123 else
1124 sbdroprecord(&pcb->so->so_snd); /* XXX */
1125 }
1126
1127 /*
1128 * Now set the result, drop packet from the socket send queue and
1129 * ask for more (wakeup sender)
1130 */
1131
1132 pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
1133 sowwakeup(pcb->so);
1134
1135 mtx_unlock(&pcb->pcb_mtx);
1136 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1137
1138 return (0);
1139} /* ng_btsocket_l2cap_process_l2ca_write_rsp */
1140
1141/*
1142 * Send L2CA_Connect request
1143 */
1144
1145static int
1146ng_btsocket_l2cap_send_l2ca_con_req(ng_btsocket_l2cap_pcb_p pcb)
1147{
1148 struct ng_mesg *msg = NULL;
1149 ng_l2cap_l2ca_con_ip *ip = NULL;
1150 int error = 0;
1151
1152 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1153
1154 if (pcb->rt == NULL ||
1155 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1156 return (ENETDOWN);
1157
1158 NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON,
5a975a3d 1159 sizeof(*ip), M_WAITOK | M_NULLOK);
b06ebda0
MD
1160 if (msg == NULL)
1161 return (ENOMEM);
1162
1163 msg->header.token = pcb->token;
1164
1165 ip = (ng_l2cap_l2ca_con_ip *)(msg->data);
1166 bcopy(&pcb->dst, &ip->bdaddr, sizeof(ip->bdaddr));
1167 ip->psm = pcb->psm;
1168
1169 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1170
1171 return (error);
1172} /* ng_btsocket_l2cap_send_l2ca_con_req */
1173
1174/*
1175 * Send L2CA_Connect response
1176 */
1177
1178static int
1179ng_btsocket_l2cap_send_l2ca_con_rsp_req(u_int32_t token,
1180 ng_btsocket_l2cap_rtentry_p rt, bdaddr_p dst, int ident,
1181 int lcid, int result)
1182{
1183 struct ng_mesg *msg = NULL;
1184 ng_l2cap_l2ca_con_rsp_ip *ip = NULL;
1185 int error = 0;
1186
1187 if (rt == NULL || rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
1188 return (ENETDOWN);
1189
1190 NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON_RSP,
5a975a3d 1191 sizeof(*ip), M_WAITOK | M_NULLOK);
b06ebda0
MD
1192 if (msg == NULL)
1193 return (ENOMEM);
1194
1195 msg->header.token = token;
1196
1197 ip = (ng_l2cap_l2ca_con_rsp_ip *)(msg->data);
1198 bcopy(dst, &ip->bdaddr, sizeof(ip->bdaddr));
1199 ip->ident = ident;
1200 ip->lcid = lcid;
1201 ip->result = result;
1202 ip->status = 0;
1203
1204 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, rt->hook, 0);
1205
1206 return (error);
1207} /* ng_btsocket_l2cap_send_l2ca_con_rsp_req */
1208
1209/*
1210 * Send L2CA_Config request
1211 */
1212
1213static int
1214ng_btsocket_l2cap_send_l2ca_cfg_req(ng_btsocket_l2cap_pcb_p pcb)
1215{
1216 struct ng_mesg *msg = NULL;
1217 ng_l2cap_l2ca_cfg_ip *ip = NULL;
1218 int error = 0;
1219
1220 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1221
1222 if (pcb->rt == NULL ||
1223 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1224 return (ENETDOWN);
1225
1226 NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG,
5a975a3d 1227 sizeof(*ip), M_WAITOK | M_NULLOK);
b06ebda0
MD
1228 if (msg == NULL)
1229 return (ENOMEM);
1230
1231 msg->header.token = pcb->token;
1232
1233 ip = (ng_l2cap_l2ca_cfg_ip *)(msg->data);
1234 ip->lcid = pcb->cid;
1235 ip->imtu = pcb->imtu;
1236 bcopy(&pcb->oflow, &ip->oflow, sizeof(ip->oflow));
1237 ip->flush_timo = pcb->flush_timo;
1238 ip->link_timo = pcb->link_timo;
1239
1240 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1241
1242 return (error);
1243} /* ng_btsocket_l2cap_send_l2ca_cfg_req */
1244
1245/*
1246 * Send L2CA_Config response
1247 */
1248
1249static int
1250ng_btsocket_l2cap_send_l2ca_cfg_rsp(ng_btsocket_l2cap_pcb_p pcb)
1251{
1252 struct ng_mesg *msg = NULL;
1253 ng_l2cap_l2ca_cfg_rsp_ip *ip = NULL;
1254 int error = 0;
1255
1256 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1257
1258 if (pcb->rt == NULL ||
1259 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1260 return (ENETDOWN);
1261
1262 NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG_RSP,
5a975a3d 1263 sizeof(*ip), M_WAITOK | M_NULLOK);
b06ebda0
MD
1264 if (msg == NULL)
1265 return (ENOMEM);
1266
1267 msg->header.token = pcb->token;
1268
1269 ip = (ng_l2cap_l2ca_cfg_rsp_ip *)(msg->data);
1270 ip->lcid = pcb->cid;
1271 ip->omtu = pcb->omtu;
1272 bcopy(&pcb->iflow, &ip->iflow, sizeof(ip->iflow));
1273
1274 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, pcb->rt->hook, 0);
1275
1276 return (error);
1277} /* ng_btsocket_l2cap_send_l2ca_cfg_rsp */
1278
1279/*
1280 * Send L2CA_Disconnect request
1281 */
1282
1283static int
1284ng_btsocket_l2cap_send_l2ca_discon_req(u_int32_t token,
1285 ng_btsocket_l2cap_pcb_p pcb)
1286{
1287 struct ng_mesg *msg = NULL;
1288 ng_l2cap_l2ca_discon_ip *ip = NULL;
1289 int error = 0;
1290
1291 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1292
1293 if (pcb->rt == NULL ||
1294 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1295 return (ENETDOWN);
1296
1297 NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_DISCON,
5a975a3d 1298 sizeof(*ip), M_WAITOK | M_NULLOK);
b06ebda0
MD
1299 if (msg == NULL)
1300 return (ENOMEM);
1301
1302 msg->header.token = token;
1303
1304 ip = (ng_l2cap_l2ca_discon_ip *)(msg->data);
1305 ip->lcid = pcb->cid;
1306
1307 NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1308
1309 return (error);
1310} /* ng_btsocket_l2cap_send_l2ca_discon_req */
1311
1312/*****************************************************************************
1313 *****************************************************************************
1314 ** Socket interface
1315 *****************************************************************************
1316 *****************************************************************************/
1317
1318/*
1319 * L2CAP sockets data input routine
1320 */
1321
1322static void
1323ng_btsocket_l2cap_data_input(struct mbuf *m, hook_p hook)
1324{
1325 ng_l2cap_hdr_t *hdr = NULL;
1326 ng_l2cap_clt_hdr_t *clt_hdr = NULL;
1327 ng_btsocket_l2cap_pcb_t *pcb = NULL;
1328 ng_btsocket_l2cap_rtentry_t *rt = NULL;
1329
1330 if (hook == NULL) {
1331 NG_BTSOCKET_L2CAP_ALERT(
1332"%s: Invalid source hook for L2CAP data packet\n", __func__);
1333 goto drop;
1334 }
1335
1336 rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1337 if (rt == NULL) {
1338 NG_BTSOCKET_L2CAP_ALERT(
1339"%s: Could not find out source bdaddr for L2CAP data packet\n", __func__);
1340 goto drop;
1341 }
1342
1343 /* Make sure we can access header */
1344 if (m->m_pkthdr.len < sizeof(*hdr)) {
1345 NG_BTSOCKET_L2CAP_ERR(
1346"%s: L2CAP data packet too small, len=%d\n", __func__, m->m_pkthdr.len);
1347 goto drop;
1348 }
1349
1350 if (m->m_len < sizeof(*hdr)) {
1351 m = m_pullup(m, sizeof(*hdr));
1352 if (m == NULL)
1353 goto drop;
1354 }
1355
1356 /* Strip L2CAP packet header and verify packet length */
1357 hdr = mtod(m, ng_l2cap_hdr_t *);
1358 m_adj(m, sizeof(*hdr));
1359
1360 if (hdr->length != m->m_pkthdr.len) {
1361 NG_BTSOCKET_L2CAP_ERR(
1362"%s: Bad L2CAP data packet length, len=%d, length=%d\n",
1363 __func__, m->m_pkthdr.len, hdr->length);
1364 goto drop;
1365 }
1366
1367 /*
1368 * Now process packet. Two cases:
1369 *
1370 * 1) Normal packet (cid != 2) then find connected socket and append
1371 * mbuf to the socket queue. Wakeup socket.
1372 *
1373 * 2) Broadcast packet (cid == 2) then find all sockets that connected
1374 * to the given PSM and have SO_BROADCAST bit set and append mbuf
1375 * to the socket queue. Wakeup socket.
1376 */
1377
1378 NG_BTSOCKET_L2CAP_INFO(
1379"%s: Received L2CAP data packet: src bdaddr=%x:%x:%x:%x:%x:%x, " \
1380"dcid=%d, length=%d\n",
1381 __func__,
1382 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1383 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1384 hdr->dcid, hdr->length);
1385
1386 if (hdr->dcid >= NG_L2CAP_FIRST_CID) {
1387
1388 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1389
1390 /* Normal packet: find connected socket */
1391 pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, hdr->dcid);
1392 if (pcb == NULL) {
1393 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1394 goto drop;
1395 }
1396
1397 mtx_lock(&pcb->pcb_mtx);
1398
1399 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1400 NG_BTSOCKET_L2CAP_ERR(
1401"%s: No connected socket found, src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, " \
1402"state=%d\n", __func__,
1403 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1404 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1405 hdr->dcid, pcb->state);
1406
1407 mtx_unlock(&pcb->pcb_mtx);
1408 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1409 goto drop;
1410 }
1411
1412 /* Check packet size against socket's incoming MTU */
1413 if (hdr->length > pcb->imtu) {
1414 NG_BTSOCKET_L2CAP_ERR(
1415"%s: L2CAP data packet too big, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1416"dcid=%d, length=%d, imtu=%d\n",
1417 __func__,
1418 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1419 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1420 hdr->dcid, hdr->length, pcb->imtu);
1421
1422 mtx_unlock(&pcb->pcb_mtx);
1423 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1424 goto drop;
1425 }
1426
1427 /* Check if we have enough space in socket receive queue */
1428 if (m->m_pkthdr.len > sbspace(&pcb->so->so_rcv)) {
1429
1430 /*
1431 * This is really bad. Receive queue on socket does
1432 * not have enough space for the packet. We do not
1433 * have any other choice but drop the packet. L2CAP
1434 * does not provide any flow control.
1435 */
1436
1437 NG_BTSOCKET_L2CAP_ERR(
1438"%s: Not enough space in socket receive queue. Dropping L2CAP data packet, " \
1439"src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, len=%d, space=%ld\n",
1440 __func__,
1441 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1442 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1443 hdr->dcid, m->m_pkthdr.len,
1444 sbspace(&pcb->so->so_rcv));
1445
1446 mtx_unlock(&pcb->pcb_mtx);
1447 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1448 goto drop;
1449 }
1450
1451 /* Append packet to the socket receive queue and wakeup */
1452 sbappendrecord(&pcb->so->so_rcv, m);
1453 m = NULL;
1454
1455 sorwakeup(pcb->so);
1456
1457 mtx_unlock(&pcb->pcb_mtx);
1458 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1459 } else if (hdr->dcid == NG_L2CAP_CLT_CID) {
1460 /* Broadcast packet: give packet to all sockets */
1461
1462 /* Check packet size against connectionless MTU */
1463 if (hdr->length > NG_L2CAP_MTU_DEFAULT) {
1464 NG_BTSOCKET_L2CAP_ERR(
1465"%s: Connectionless L2CAP data packet too big, " \
1466"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1467 __func__,
1468 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1469 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1470 hdr->length);
1471 goto drop;
1472 }
1473
1474 /* Make sure we can access connectionless header */
1475 if (m->m_pkthdr.len < sizeof(*clt_hdr)) {
1476 NG_BTSOCKET_L2CAP_ERR(
1477"%s: Can not get L2CAP connectionless packet header, " \
1478"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1479 __func__,
1480 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1481 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1482 hdr->length);
1483 goto drop;
1484 }
1485
1486 if (m->m_len < sizeof(*clt_hdr)) {
1487 m = m_pullup(m, sizeof(*clt_hdr));
1488 if (m == NULL)
1489 goto drop;
1490 }
1491
1492 /* Strip connectionless header and deliver packet */
1493 clt_hdr = mtod(m, ng_l2cap_clt_hdr_t *);
1494 m_adj(m, sizeof(*clt_hdr));
1495
1496 NG_BTSOCKET_L2CAP_INFO(
1497"%s: Got L2CAP connectionless data packet, " \
1498"src bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, length=%d\n",
1499 __func__,
1500 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1501 rt->src.b[2], rt->src.b[1], rt->src.b[0],
1502 clt_hdr->psm, hdr->length);
1503
1504 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1505
1506 LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next) {
1507 struct mbuf *copy = NULL;
1508
1509 mtx_lock(&pcb->pcb_mtx);
1510
1511 if (bcmp(&rt->src, &pcb->src, sizeof(pcb->src)) != 0 ||
1512 pcb->psm != clt_hdr->psm ||
1513 pcb->state != NG_BTSOCKET_L2CAP_OPEN ||
1514 (pcb->so->so_options & SO_BROADCAST) == 0 ||
1515 m->m_pkthdr.len > sbspace(&pcb->so->so_rcv))
1516 goto next;
1517
1518 /*
1519 * Create a copy of the packet and append it to the
1520 * socket's queue. If m_dup() failed - no big deal
1521 * it is a broadcast traffic after all
1522 */
1523
5a975a3d 1524 copy = m_dup(m, MB_DONTWAIT);
b06ebda0
MD
1525 if (copy != NULL) {
1526 sbappendrecord(&pcb->so->so_rcv, copy);
1527 sorwakeup(pcb->so);
1528 }
1529next:
1530 mtx_unlock(&pcb->pcb_mtx);
1531 }
1532
1533 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1534 }
1535drop:
1536 NG_FREE_M(m); /* checks for m != NULL */
1537} /* ng_btsocket_l2cap_data_input */
1538
1539/*
1540 * L2CAP sockets default message input routine
1541 */
1542
1543static void
1544ng_btsocket_l2cap_default_msg_input(struct ng_mesg *msg, hook_p hook)
1545{
1546 switch (msg->header.cmd) {
1547 case NGM_L2CAP_NODE_HOOK_INFO: {
1548 ng_btsocket_l2cap_rtentry_t *rt = NULL;
1549
1550 if (hook == NULL || msg->header.arglen != sizeof(bdaddr_t))
1551 break;
1552
1553 if (bcmp(msg->data, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
1554 break;
1555
1556 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1557
1558 rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1559 if (rt == NULL) {
fc025606
SW
1560 rt = kmalloc(sizeof(*rt), M_NETGRAPH_BTSOCKET_L2CAP,
1561 M_WAITOK | M_NULLOK | M_ZERO);
b06ebda0
MD
1562 if (rt == NULL) {
1563 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1564 break;
1565 }
1566
1567 LIST_INSERT_HEAD(&ng_btsocket_l2cap_rt, rt, next);
1568
1569 NG_HOOK_SET_PRIVATE(hook, rt);
1570 }
1571
1572 bcopy(msg->data, &rt->src, sizeof(rt->src));
1573 rt->hook = hook;
1574
1575 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1576
1577 NG_BTSOCKET_L2CAP_INFO(
1578"%s: Updating hook \"%s\", src bdaddr=%x:%x:%x:%x:%x:%x\n",
1579 __func__, NG_HOOK_NAME(hook),
1580 rt->src.b[5], rt->src.b[4], rt->src.b[3],
1581 rt->src.b[2], rt->src.b[1], rt->src.b[0]);
1582 } break;
1583
1584 default:
1585 NG_BTSOCKET_L2CAP_WARN(
1586"%s: Unknown message, cmd=%d\n", __func__, msg->header.cmd);
1587 break;
1588 }
1589
1590 NG_FREE_MSG(msg); /* Checks for msg != NULL */
1591} /* ng_btsocket_l2cap_default_msg_input */
1592
1593/*
1594 * L2CAP sockets L2CA message input routine
1595 */
1596
1597static void
1598ng_btsocket_l2cap_l2ca_msg_input(struct ng_mesg *msg, hook_p hook)
1599{
1600 ng_btsocket_l2cap_rtentry_p rt = NULL;
1601
1602 if (hook == NULL) {
1603 NG_BTSOCKET_L2CAP_ALERT(
1604"%s: Invalid source hook for L2CA message\n", __func__);
1605 goto drop;
1606 }
1607
1608 rt = (ng_btsocket_l2cap_rtentry_p) NG_HOOK_PRIVATE(hook);
1609 if (rt == NULL) {
1610 NG_BTSOCKET_L2CAP_ALERT(
1611"%s: Could not find out source bdaddr for L2CA message\n", __func__);
1612 goto drop;
1613 }
1614
1615 switch (msg->header.cmd) {
1616 case NGM_L2CAP_L2CA_CON: /* L2CA_Connect response */
1617 ng_btsocket_l2cap_process_l2ca_con_req_rsp(msg, rt);
1618 break;
1619
1620 case NGM_L2CAP_L2CA_CON_RSP: /* L2CA_ConnectRsp response */
1621 ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(msg, rt);
1622 break;
1623
1624 case NGM_L2CAP_L2CA_CON_IND: /* L2CA_Connect indicator */
1625 ng_btsocket_l2cap_process_l2ca_con_ind(msg, rt);
1626 break;
1627
1628 case NGM_L2CAP_L2CA_CFG: /* L2CA_Config response */
1629 ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(msg, rt);
1630 break;
1631
1632 case NGM_L2CAP_L2CA_CFG_RSP: /* L2CA_ConfigRsp response */
1633 ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(msg, rt);
1634 break;
1635
1636 case NGM_L2CAP_L2CA_CFG_IND: /* L2CA_Config indicator */
1637 ng_btsocket_l2cap_process_l2ca_cfg_ind(msg, rt);
1638 break;
1639
1640 case NGM_L2CAP_L2CA_DISCON: /* L2CA_Disconnect response */
1641 ng_btsocket_l2cap_process_l2ca_discon_rsp(msg, rt);
1642 break;
1643
1644 case NGM_L2CAP_L2CA_DISCON_IND: /* L2CA_Disconnect indicator */
1645 ng_btsocket_l2cap_process_l2ca_discon_ind(msg, rt);
1646 break;
1647
1648 case NGM_L2CAP_L2CA_WRITE: /* L2CA_Write response */
1649 ng_btsocket_l2cap_process_l2ca_write_rsp(msg, rt);
1650 break;
1651
1652 /* XXX FIXME add other L2CA messages */
1653
1654 default:
1655 NG_BTSOCKET_L2CAP_WARN(
1656"%s: Unknown L2CA message, cmd=%d\n", __func__, msg->header.cmd);
1657 break;
1658 }
1659drop:
1660 NG_FREE_MSG(msg);
1661} /* ng_btsocket_l2cap_l2ca_msg_input */
1662
1663/*
1664 * L2CAP sockets input routine
1665 */
1666
1667static void
1668ng_btsocket_l2cap_input(void *context, int pending)
1669{
1670 item_p item = NULL;
1671 hook_p hook = NULL;
1672
1673 for (;;) {
1674 mtx_lock(&ng_btsocket_l2cap_queue_mtx);
1675 NG_BT_ITEMQ_DEQUEUE(&ng_btsocket_l2cap_queue, item);
1676 mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
1677
1678 if (item == NULL)
1679 break;
1680
1681 NGI_GET_HOOK(item, hook);
1682 if (hook != NULL && NG_HOOK_NOT_VALID(hook))
1683 goto drop;
1684
1685 switch(item->el_flags & NGQF_TYPE) {
1686 case NGQF_DATA: {
1687 struct mbuf *m = NULL;
1688
1689 NGI_GET_M(item, m);
1690 ng_btsocket_l2cap_data_input(m, hook);
1691 } break;
1692
1693 case NGQF_MESG: {
1694 struct ng_mesg *msg = NULL;
1695
1696 NGI_GET_MSG(item, msg);
1697
1698 switch (msg->header.cmd) {
1699 case NGM_L2CAP_L2CA_CON:
1700 case NGM_L2CAP_L2CA_CON_RSP:
1701 case NGM_L2CAP_L2CA_CON_IND:
1702 case NGM_L2CAP_L2CA_CFG:
1703 case NGM_L2CAP_L2CA_CFG_RSP:
1704 case NGM_L2CAP_L2CA_CFG_IND:
1705 case NGM_L2CAP_L2CA_DISCON:
1706 case NGM_L2CAP_L2CA_DISCON_IND:
1707 case NGM_L2CAP_L2CA_WRITE:
1708 /* XXX FIXME add other L2CA messages */
1709 ng_btsocket_l2cap_l2ca_msg_input(msg, hook);
1710 break;
1711
1712 default:
1713 ng_btsocket_l2cap_default_msg_input(msg, hook);
1714 break;
1715 }
1716 } break;
1717
1718 default:
1719 KASSERT(0,
1720("%s: invalid item type=%ld\n", __func__, (item->el_flags & NGQF_TYPE)));
1721 break;
1722 }
1723drop:
1724 if (hook != NULL)
1725 NG_HOOK_UNREF(hook);
1726
1727 NG_FREE_ITEM(item);
1728 }
1729} /* ng_btsocket_l2cap_input */
1730
1731/*
1732 * Route cleanup task. Gets scheduled when hook is disconnected. Here we
1733 * will find all sockets that use "invalid" hook and disconnect them.
1734 */
1735
1736static void
1737ng_btsocket_l2cap_rtclean(void *context, int pending)
1738{
1739 ng_btsocket_l2cap_pcb_p pcb = NULL, pcb_next = NULL;
1740 ng_btsocket_l2cap_rtentry_p rt = NULL;
1741
1742 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1743 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1744
1745 /*
1746 * First disconnect all sockets that use "invalid" hook
1747 */
1748
1749 for (pcb = LIST_FIRST(&ng_btsocket_l2cap_sockets); pcb != NULL; ) {
1750 mtx_lock(&pcb->pcb_mtx);
1751 pcb_next = LIST_NEXT(pcb, next);
1752
1753 if (pcb->rt != NULL &&
1754 pcb->rt->hook != NULL && NG_HOOK_NOT_VALID(pcb->rt->hook)) {
1755 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1756 ng_btsocket_l2cap_untimeout(pcb);
1757
1758 pcb->so->so_error = ENETDOWN;
1759 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1760 soisdisconnected(pcb->so);
1761
1762 pcb->token = 0;
1763 pcb->cid = 0;
1764 pcb->rt = NULL;
1765 }
1766
1767 mtx_unlock(&pcb->pcb_mtx);
1768 pcb = pcb_next;
1769 }
1770
1771 /*
1772 * Now cleanup routing table
1773 */
1774
1775 for (rt = LIST_FIRST(&ng_btsocket_l2cap_rt); rt != NULL; ) {
1776 ng_btsocket_l2cap_rtentry_p rt_next = LIST_NEXT(rt, next);
1777
1778 if (rt->hook != NULL && NG_HOOK_NOT_VALID(rt->hook)) {
1779 LIST_REMOVE(rt, next);
1780
1781 NG_HOOK_SET_PRIVATE(rt->hook, NULL);
1782 NG_HOOK_UNREF(rt->hook); /* Remove extra reference */
1783
1784 bzero(rt, sizeof(*rt));
fc025606 1785 kfree(rt, M_NETGRAPH_BTSOCKET_L2CAP);
b06ebda0
MD
1786 }
1787
1788 rt = rt_next;
1789 }
1790
1791 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1792 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1793} /* ng_btsocket_l2cap_rtclean */
1794
1795/*
1796 * Initialize everything
1797 */
1798
1799void
1800ng_btsocket_l2cap_init(void)
1801{
1802 int error = 0;
1803
1804 ng_btsocket_l2cap_node = NULL;
1805 ng_btsocket_l2cap_debug_level = NG_BTSOCKET_WARN_LEVEL;
1806
1807 /* Register Netgraph node type */
1808 error = ng_newtype(&typestruct);
1809 if (error != 0) {
1810 NG_BTSOCKET_L2CAP_ALERT(
1811"%s: Could not register Netgraph node type, error=%d\n", __func__, error);
1812
1813 return;
1814 }
1815
1816 /* Create Netgrapg node */
1817 error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
1818 if (error != 0) {
1819 NG_BTSOCKET_L2CAP_ALERT(
1820"%s: Could not create Netgraph node, error=%d\n", __func__, error);
1821
1822 ng_btsocket_l2cap_node = NULL;
1823
1824 return;
1825 }
1826
1827 error = ng_name_node(ng_btsocket_l2cap_node,
1828 NG_BTSOCKET_L2CAP_NODE_TYPE);
1829 if (error != 0) {
1830 NG_BTSOCKET_L2CAP_ALERT(
1831"%s: Could not name Netgraph node, error=%d\n", __func__, error);
1832
1833 NG_NODE_UNREF(ng_btsocket_l2cap_node);
1834 ng_btsocket_l2cap_node = NULL;
1835
1836 return;
1837 }
1838
1839 /* Create input queue */
1840 NG_BT_ITEMQ_INIT(&ng_btsocket_l2cap_queue, ifqmaxlen);
1841 mtx_init(&ng_btsocket_l2cap_queue_mtx,
1842 "btsocks_l2cap_queue_mtx", NULL, MTX_DEF);
1843 TASK_INIT(&ng_btsocket_l2cap_queue_task, 0,
1844 ng_btsocket_l2cap_input, NULL);
1845
1846 /* Create list of sockets */
1847 LIST_INIT(&ng_btsocket_l2cap_sockets);
1848 mtx_init(&ng_btsocket_l2cap_sockets_mtx,
1849 "btsocks_l2cap_sockets_mtx", NULL, MTX_DEF);
1850
1851 /* Routing table */
1852 LIST_INIT(&ng_btsocket_l2cap_rt);
1853 mtx_init(&ng_btsocket_l2cap_rt_mtx,
1854 "btsocks_l2cap_rt_mtx", NULL, MTX_DEF);
1855 TASK_INIT(&ng_btsocket_l2cap_rt_task, 0,
1856 ng_btsocket_l2cap_rtclean, NULL);
1857} /* ng_btsocket_l2cap_init */
1858
1859/*
1860 * Abort connection on socket
1861 */
1862
1863void
1864ng_btsocket_l2cap_abort(struct socket *so)
1865{
1866 so->so_error = ECONNABORTED;
1867
1868 (void)ng_btsocket_l2cap_disconnect(so);
1869} /* ng_btsocket_l2cap_abort */
1870
1871void
1872ng_btsocket_l2cap_close(struct socket *so)
1873{
1874
1875 (void)ng_btsocket_l2cap_disconnect(so);
1876} /* ng_btsocket_l2cap_close */
1877
1878/*
1879 * Accept connection on socket. Nothing to do here, socket must be connected
1880 * and ready, so just return peer address and be done with it.
1881 */
1882
1883int
1884ng_btsocket_l2cap_accept(struct socket *so, struct sockaddr **nam)
1885{
1886 if (ng_btsocket_l2cap_node == NULL)
1887 return (EINVAL);
1888
1889 return (ng_btsocket_l2cap_peeraddr(so, nam));
1890} /* ng_btsocket_l2cap_accept */
1891
1892/*
1893 * Create and attach new socket
1894 */
1895
1896int
1897ng_btsocket_l2cap_attach(struct socket *so, int proto, struct thread *td)
1898{
1899 static u_int32_t token = 0;
1900 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
1901 int error;
1902
1903 /* Check socket and protocol */
1904 if (ng_btsocket_l2cap_node == NULL)
1905 return (EPROTONOSUPPORT);
1906 if (so->so_type != SOCK_SEQPACKET)
1907 return (ESOCKTNOSUPPORT);
1908
1909#if 0 /* XXX sonewconn() calls "pru_attach" with proto == 0 */
1910 if (proto != 0)
1911 if (proto != BLUETOOTH_PROTO_L2CAP)
1912 return (EPROTONOSUPPORT);
1913#endif /* XXX */
1914
1915 if (pcb != NULL)
1916 return (EISCONN);
1917
1918 /* Reserve send and receive space if it is not reserved yet */
1919 if ((so->so_snd.sb_hiwat == 0) || (so->so_rcv.sb_hiwat == 0)) {
1920 error = soreserve(so, NG_BTSOCKET_L2CAP_SENDSPACE,
1921 NG_BTSOCKET_L2CAP_RECVSPACE);
1922 if (error != 0)
1923 return (error);
1924 }
1925
1926 /* Allocate the PCB */
fc025606
SW
1927 pcb = kmalloc(sizeof(*pcb), M_NETGRAPH_BTSOCKET_L2CAP,
1928 M_WAITOK | M_NULLOK | M_ZERO);
b06ebda0
MD
1929 if (pcb == NULL)
1930 return (ENOMEM);
1931
1932 /* Link the PCB and the socket */
1933 so->so_pcb = (caddr_t) pcb;
1934 pcb->so = so;
1935 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1936
1937 /* Initialize PCB */
1938 pcb->imtu = pcb->omtu = NG_L2CAP_MTU_DEFAULT;
1939
1940 /* Default flow */
1941 pcb->iflow.flags = 0x0;
1942 pcb->iflow.service_type = NG_HCI_SERVICE_TYPE_BEST_EFFORT;
1943 pcb->iflow.token_rate = 0xffffffff; /* maximum */
1944 pcb->iflow.token_bucket_size = 0xffffffff; /* maximum */
1945 pcb->iflow.peak_bandwidth = 0x00000000; /* maximum */
1946 pcb->iflow.latency = 0xffffffff; /* don't care */
1947 pcb->iflow.delay_variation = 0xffffffff; /* don't care */
1948
1949 bcopy(&pcb->iflow, &pcb->oflow, sizeof(pcb->oflow));
1950
1951 pcb->flush_timo = NG_L2CAP_FLUSH_TIMO_DEFAULT;
1952 pcb->link_timo = NG_L2CAP_LINK_TIMO_DEFAULT;
1953
1954 callout_handle_init(&pcb->timo);
1955
1956 /*
1957 * XXX Mark PCB mutex as DUPOK to prevent "duplicated lock of
1958 * the same type" message. When accepting new L2CAP connection
1959 * ng_btsocket_l2cap_process_l2ca_con_ind() holds both PCB mutexes
1960 * for "old" (accepting) PCB and "new" (created) PCB.
1961 */
1962
1963 mtx_init(&pcb->pcb_mtx, "btsocks_l2cap_pcb_mtx", NULL,
1964 MTX_DEF|MTX_DUPOK);
1965
1966 /*
1967 * Add the PCB to the list
1968 *
1969 * XXX FIXME VERY IMPORTANT!
1970 *
1971 * This is totally FUBAR. We could get here in two cases:
1972 *
1973 * 1) When user calls socket()
1974 * 2) When we need to accept new incomming connection and call
1975 * sonewconn()
1976 *
1977 * In the first case we must acquire ng_btsocket_l2cap_sockets_mtx.
1978 * In the second case we hold ng_btsocket_l2cap_sockets_mtx already.
1979 * So we now need to distinguish between these cases. From reading
1980 * /sys/kern/uipc_socket.c we can find out that sonewconn() calls
1981 * pru_attach with proto == 0 and td == NULL. For now use this fact
1982 * to figure out if we were called from socket() or from sonewconn().
1983 */
1984
1985 if (td != NULL)
1986 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1987 else
1988 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
1989
1990 /* Set PCB token. Use ng_btsocket_l2cap_sockets_mtx for protection */
1991 if (++ token == 0)
1992 token ++;
1993
1994 pcb->token = token;
1995
1996 LIST_INSERT_HEAD(&ng_btsocket_l2cap_sockets, pcb, next);
1997
1998 if (td != NULL)
1999 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2000
2001 return (0);
2002} /* ng_btsocket_l2cap_attach */
2003
2004/*
2005 * Bind socket
2006 */
2007
2008int
2009ng_btsocket_l2cap_bind(struct socket *so, struct sockaddr *nam,
2010 struct thread *td)
2011{
2012 ng_btsocket_l2cap_pcb_t *pcb = NULL;
2013 struct sockaddr_l2cap *sa = (struct sockaddr_l2cap *) nam;
2014 int psm, error = 0;
2015
2016 if (ng_btsocket_l2cap_node == NULL)
2017 return (EINVAL);
2018
2019 /* Verify address */
2020 if (sa == NULL)
2021 return (EINVAL);
2022 if (sa->l2cap_family != AF_BLUETOOTH)
2023 return (EAFNOSUPPORT);
2024 if (sa->l2cap_len != sizeof(*sa))
2025 return (EINVAL);
2026
2027 psm = le16toh(sa->l2cap_psm);
2028
2029 /*
2030 * Check if other socket has this address already (look for exact
2031 * match PSM and bdaddr) and assign socket address if it's available.
2032 *
2033 * Note: socket can be bound to ANY PSM (zero) thus allowing several
2034 * channels with the same PSM between the same pair of BD_ADDR'es.
2035 */
2036
2037 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2038
2039 LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next)
2040 if (psm != 0 && psm == pcb->psm &&
2041 bcmp(&pcb->src, &sa->l2cap_bdaddr, sizeof(bdaddr_t)) == 0)
2042 break;
2043
2044 if (pcb == NULL) {
2045 /* Set socket address */
2046 pcb = so2l2cap_pcb(so);
2047 if (pcb != NULL) {
2048 bcopy(&sa->l2cap_bdaddr, &pcb->src, sizeof(pcb->src));
2049 pcb->psm = psm;
2050 } else
2051 error = EINVAL;
2052 } else
2053 error = EADDRINUSE;
2054
2055 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2056
2057 return (error);
2058} /* ng_btsocket_l2cap_bind */
2059
2060/*
2061 * Connect socket
2062 */
2063
2064int
2065ng_btsocket_l2cap_connect(struct socket *so, struct sockaddr *nam,
2066 struct thread *td)
2067{
2068 ng_btsocket_l2cap_pcb_t *pcb = so2l2cap_pcb(so);
2069 struct sockaddr_l2cap *sa = (struct sockaddr_l2cap *) nam;
2070 ng_btsocket_l2cap_rtentry_t *rt = NULL;
2071 int have_src, error = 0;
2072
2073 /* Check socket */
2074 if (pcb == NULL)
2075 return (EINVAL);
2076 if (ng_btsocket_l2cap_node == NULL)
2077 return (EINVAL);
2078 if (pcb->state == NG_BTSOCKET_L2CAP_CONNECTING)
2079 return (EINPROGRESS);
2080
2081 /* Verify address */
2082 if (sa == NULL)
2083 return (EINVAL);
2084 if (sa->l2cap_family != AF_BLUETOOTH)
2085 return (EAFNOSUPPORT);
2086 if (sa->l2cap_len != sizeof(*sa))
2087 return (EINVAL);
2088 if (sa->l2cap_psm == 0 ||
2089 bcmp(&sa->l2cap_bdaddr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
2090 return (EDESTADDRREQ);
2091 if (pcb->psm != 0 && pcb->psm != le16toh(sa->l2cap_psm))
2092 return (EINVAL);
2093
2094 /*
2095 * Routing. Socket should be bound to some source address. The source
2096 * address can be ANY. Destination address must be set and it must not
2097 * be ANY. If source address is ANY then find first rtentry that has
2098 * src != dst.
2099 */
2100
2101 mtx_lock(&ng_btsocket_l2cap_rt_mtx);
2102 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2103 mtx_lock(&pcb->pcb_mtx);
2104
2105 /* Send destination address and PSM */
2106 bcopy(&sa->l2cap_bdaddr, &pcb->dst, sizeof(pcb->dst));
2107 pcb->psm = le16toh(sa->l2cap_psm);
2108
2109 pcb->rt = NULL;
2110 have_src = bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src));
2111
2112 LIST_FOREACH(rt, &ng_btsocket_l2cap_rt, next) {
2113 if (rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
2114 continue;
2115
2116 /* Match src and dst */
2117 if (have_src) {
2118 if (bcmp(&pcb->src, &rt->src, sizeof(rt->src)) == 0)
2119 break;
2120 } else {
2121 if (bcmp(&pcb->dst, &rt->src, sizeof(rt->src)) != 0)
2122 break;
2123 }
2124 }
2125
2126 if (rt != NULL) {
2127 pcb->rt = rt;
2128
2129 if (!have_src)
2130 bcopy(&rt->src, &pcb->src, sizeof(pcb->src));
2131 } else
2132 error = EHOSTUNREACH;
2133
2134 /*
2135 * Send L2CA_Connect request
2136 */
2137
2138 if (error == 0) {
2139 error = ng_btsocket_l2cap_send_l2ca_con_req(pcb);
2140 if (error == 0) {
2141 pcb->flags |= NG_BTSOCKET_L2CAP_CLIENT;
2142 pcb->state = NG_BTSOCKET_L2CAP_CONNECTING;
2143 soisconnecting(pcb->so);
2144
2145 ng_btsocket_l2cap_timeout(pcb);
2146 }
2147 }
2148
2149 mtx_unlock(&pcb->pcb_mtx);
2150 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2151 mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
2152
2153 return (error);
2154} /* ng_btsocket_l2cap_connect */
2155
2156/*
2157 * Process ioctl's calls on socket
2158 */
2159
2160int
2161ng_btsocket_l2cap_control(struct socket *so, u_long cmd, caddr_t data,
2162 struct ifnet *ifp, struct thread *td)
2163{
2164 return (EINVAL);
2165} /* ng_btsocket_l2cap_control */
2166
2167/*
2168 * Process getsockopt/setsockopt system calls
2169 */
2170
2171int
2172ng_btsocket_l2cap_ctloutput(struct socket *so, struct sockopt *sopt)
2173{
2174 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2175 int error = 0;
2176 ng_l2cap_cfg_opt_val_t v;
2177
2178 if (pcb == NULL)
2179 return (EINVAL);
2180 if (ng_btsocket_l2cap_node == NULL)
2181 return (EINVAL);
2182
2183 if (sopt->sopt_level != SOL_L2CAP)
2184 return (0);
2185
2186 mtx_lock(&pcb->pcb_mtx);
2187
2188 switch (sopt->sopt_dir) {
2189 case SOPT_GET:
2190 switch (sopt->sopt_name) {
2191 case SO_L2CAP_IMTU: /* get incoming MTU */
2192 error = sooptcopyout(sopt, &pcb->imtu,
2193 sizeof(pcb->imtu));
2194 break;
2195
2196 case SO_L2CAP_OMTU: /* get outgoing (peer incoming) MTU */
2197 error = sooptcopyout(sopt, &pcb->omtu,
2198 sizeof(pcb->omtu));
2199 break;
2200
2201 case SO_L2CAP_IFLOW: /* get incoming flow spec. */
2202 error = sooptcopyout(sopt, &pcb->iflow,
2203 sizeof(pcb->iflow));
2204 break;
2205
2206 case SO_L2CAP_OFLOW: /* get outgoing flow spec. */
2207 error = sooptcopyout(sopt, &pcb->oflow,
2208 sizeof(pcb->oflow));
2209 break;
2210
2211 case SO_L2CAP_FLUSH: /* get flush timeout */
2212 error = sooptcopyout(sopt, &pcb->flush_timo,
2213 sizeof(pcb->flush_timo));
2214 break;
2215
2216 default:
2217 error = ENOPROTOOPT;
2218 break;
2219 }
2220 break;
2221
2222 case SOPT_SET:
2223 /*
2224 * XXX
2225 * We do not allow to change these parameters while socket is
2226 * connected or we are in the process of creating a connection.
2227 * May be this should indicate re-configuration of the open
2228 * channel?
2229 */
2230
2231 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2232 error = EACCES;
2233 break;
2234 }
2235
2236 switch (sopt->sopt_name) {
2237 case SO_L2CAP_IMTU: /* set incoming MTU */
2238 error = sooptcopyin(sopt, &v, sizeof(v), sizeof(v.mtu));
2239 if (error == 0)
2240 pcb->imtu = v.mtu;
2241 break;
2242
2243 case SO_L2CAP_OFLOW: /* set outgoing flow spec. */
2244 error = sooptcopyin(sopt, &v, sizeof(v),sizeof(v.flow));
2245 if (error == 0)
2246 bcopy(&v.flow, &pcb->oflow, sizeof(pcb->oflow));
2247 break;
2248
2249 case SO_L2CAP_FLUSH: /* set flush timeout */
2250 error = sooptcopyin(sopt, &v, sizeof(v),
2251 sizeof(v.flush_timo));
2252 if (error == 0)
2253 pcb->flush_timo = v.flush_timo;
2254 break;
2255
2256 default:
2257 error = ENOPROTOOPT;
2258 break;
2259 }
2260 break;
2261
2262 default:
2263 error = EINVAL;
2264 break;
2265 }
2266
2267 mtx_unlock(&pcb->pcb_mtx);
2268
2269 return (error);
2270} /* ng_btsocket_l2cap_ctloutput */
2271
2272/*
2273 * Detach and destroy socket
2274 */
2275
2276void
2277ng_btsocket_l2cap_detach(struct socket *so)
2278{
2279 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2280
2281 KASSERT(pcb != NULL, ("ng_btsocket_l2cap_detach: pcb == NULL"));
2282
2283 if (ng_btsocket_l2cap_node == NULL)
2284 return;
2285
2286 mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2287 mtx_lock(&pcb->pcb_mtx);
2288
2289 /* XXX what to do with pending request? */
2290 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2291 ng_btsocket_l2cap_untimeout(pcb);
2292
2293 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED &&
2294 pcb->state != NG_BTSOCKET_L2CAP_DISCONNECTING)
2295 /* Send disconnect request with "zero" token */
2296 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2297
2298 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2299
2300 LIST_REMOVE(pcb, next);
2301
2302 mtx_unlock(&pcb->pcb_mtx);
2303 mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2304
2305 mtx_destroy(&pcb->pcb_mtx);
2306 bzero(pcb, sizeof(*pcb));
fc025606 2307 kfree(pcb, M_NETGRAPH_BTSOCKET_L2CAP);
b06ebda0
MD
2308
2309 soisdisconnected(so);
2310 so->so_pcb = NULL;
2311} /* ng_btsocket_l2cap_detach */
2312
2313/*
2314 * Disconnect socket
2315 */
2316
2317int
2318ng_btsocket_l2cap_disconnect(struct socket *so)
2319{
2320 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2321 int error = 0;
2322
2323 if (pcb == NULL)
2324 return (EINVAL);
2325 if (ng_btsocket_l2cap_node == NULL)
2326 return (EINVAL);
2327
2328 mtx_lock(&pcb->pcb_mtx);
2329
2330 if (pcb->state == NG_BTSOCKET_L2CAP_DISCONNECTING) {
2331 mtx_unlock(&pcb->pcb_mtx);
2332 return (EINPROGRESS);
2333 }
2334
2335 if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2336 /* XXX FIXME what to do with pending request? */
2337 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2338 ng_btsocket_l2cap_untimeout(pcb);
2339
2340 error = ng_btsocket_l2cap_send_l2ca_discon_req(pcb->token, pcb);
2341 if (error == 0) {
2342 pcb->state = NG_BTSOCKET_L2CAP_DISCONNECTING;
2343 soisdisconnecting(so);
2344
2345 ng_btsocket_l2cap_timeout(pcb);
2346 }
2347
2348 /* XXX FIXME what to do if error != 0 */
2349 }
2350
2351 mtx_unlock(&pcb->pcb_mtx);
2352
2353 return (error);
2354} /* ng_btsocket_l2cap_disconnect */
2355
2356/*
2357 * Listen on socket
2358 */
2359
2360int
2361ng_btsocket_l2cap_listen(struct socket *so, int backlog, struct thread *td)
2362{
2363 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2364 int error;
2365
2366 SOCK_LOCK(so);
2367 error = solisten_proto_check(so);
2368 if (error != 0)
2369 goto out;
2370 if (pcb == NULL) {
2371 error = EINVAL;
2372 goto out;
2373 }
2374 if (ng_btsocket_l2cap_node == NULL) {
2375 error = EINVAL;
2376 goto out;
2377 }
2378 if (pcb->psm == 0) {
2379 error = EADDRNOTAVAIL;
2380 goto out;
2381 }
2382 solisten_proto(so, backlog);
2383out:
2384 SOCK_UNLOCK(so);
2385 return (error);
2386} /* ng_btsocket_listen */
2387
2388/*
2389 * Get peer address
2390 */
2391
2392int
2393ng_btsocket_l2cap_peeraddr(struct socket *so, struct sockaddr **nam)
2394{
2395 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2396 struct sockaddr_l2cap sa;
2397
2398 if (pcb == NULL)
2399 return (EINVAL);
2400 if (ng_btsocket_l2cap_node == NULL)
2401 return (EINVAL);
2402
2403 bcopy(&pcb->dst, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2404 sa.l2cap_psm = htole16(pcb->psm);
2405 sa.l2cap_len = sizeof(sa);
2406 sa.l2cap_family = AF_BLUETOOTH;
2407
5a975a3d 2408 *nam = sodupsockaddr((struct sockaddr *) &sa, M_WAITOK | M_NULLOK);
b06ebda0
MD
2409
2410 return ((*nam == NULL)? ENOMEM : 0);
2411} /* ng_btsocket_l2cap_peeraddr */
2412
2413/*
2414 * Send data to socket
2415 */
2416
2417int
2418ng_btsocket_l2cap_send(struct socket *so, int flags, struct mbuf *m,
2419 struct sockaddr *nam, struct mbuf *control, struct thread *td)
2420{
2421 ng_btsocket_l2cap_pcb_t *pcb = so2l2cap_pcb(so);
2422 int error = 0;
2423
2424 if (ng_btsocket_l2cap_node == NULL) {
2425 error = ENETDOWN;
2426 goto drop;
2427 }
2428
2429 /* Check socket and input */
2430 if (pcb == NULL || m == NULL || control != NULL) {
2431 error = EINVAL;
2432 goto drop;
2433 }
2434
2435 mtx_lock(&pcb->pcb_mtx);
2436
2437 /* Make sure socket is connected */
2438 if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
2439 mtx_unlock(&pcb->pcb_mtx);
2440 error = ENOTCONN;
2441 goto drop;
2442 }
2443
2444 /* Check route */
2445 if (pcb->rt == NULL ||
2446 pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook)) {
2447 mtx_unlock(&pcb->pcb_mtx);
2448 error = ENETDOWN;
2449 goto drop;
2450 }
2451
2452 /* Check packet size agains outgoing (peer's incoming) MTU) */
2453 if (m->m_pkthdr.len > pcb->omtu) {
2454 NG_BTSOCKET_L2CAP_ERR(
2455"%s: Packet too big, len=%d, omtu=%d\n", __func__, m->m_pkthdr.len, pcb->omtu);
2456
2457 mtx_unlock(&pcb->pcb_mtx);
2458 error = EMSGSIZE;
2459 goto drop;
2460 }
2461
2462 /*
2463 * First put packet on socket send queue. Then check if we have
2464 * pending timeout. If we do not have timeout then we must send
2465 * packet and schedule timeout. Otherwise do nothing and wait for
2466 * L2CA_WRITE_RSP.
2467 */
2468
2469 sbappendrecord(&pcb->so->so_snd, m);
2470 m = NULL;
2471
2472 if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2473 error = ng_btsocket_l2cap_send2(pcb);
2474 if (error == 0)
2475 ng_btsocket_l2cap_timeout(pcb);
2476 else
2477 sbdroprecord(&pcb->so->so_snd); /* XXX */
2478 }
2479
2480 mtx_unlock(&pcb->pcb_mtx);
2481drop:
2482 NG_FREE_M(m); /* checks for != NULL */
2483 NG_FREE_M(control);
2484
2485 return (error);
2486} /* ng_btsocket_l2cap_send */
2487
2488/*
2489 * Send first packet in the socket queue to the L2CAP layer
2490 */
2491
2492static int
2493ng_btsocket_l2cap_send2(ng_btsocket_l2cap_pcb_p pcb)
2494{
2495 struct mbuf *m = NULL;
2496 ng_l2cap_l2ca_hdr_t *hdr = NULL;
2497 int error = 0;
2498
2499 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2500
2501 if (pcb->so->so_snd.sb_cc == 0)
2502 return (EINVAL); /* XXX */
2503
5a975a3d 2504 m = m_dup(pcb->so->so_snd.sb_mb, MB_DONTWAIT);
b06ebda0
MD
2505 if (m == NULL)
2506 return (ENOBUFS);
2507
2508 /* Create L2CA packet header */
5a975a3d 2509 M_PREPEND(m, sizeof(*hdr), MB_DONTWAIT);
b06ebda0
MD
2510 if (m != NULL)
2511 if (m->m_len < sizeof(*hdr))
2512 m = m_pullup(m, sizeof(*hdr));
2513
2514 if (m == NULL) {
2515 NG_BTSOCKET_L2CAP_ERR(
2516"%s: Failed to create L2CA packet header\n", __func__);
2517
2518 return (ENOBUFS);
2519 }
2520
2521 hdr = mtod(m, ng_l2cap_l2ca_hdr_t *);
2522 hdr->token = pcb->token;
2523 hdr->length = m->m_pkthdr.len - sizeof(*hdr);
2524 hdr->lcid = pcb->cid;
2525
2526 NG_BTSOCKET_L2CAP_INFO(
2527"%s: Sending packet: len=%d, length=%d, lcid=%d, token=%d, state=%d\n",
2528 __func__, m->m_pkthdr.len, hdr->length, hdr->lcid,
2529 hdr->token, pcb->state);
2530
2531 /*
2532 * If we got here than we have successfuly creates new L2CAP
2533 * data packet and now we can send it to the L2CAP layer
2534 */
2535
2536 NG_SEND_DATA_ONLY(error, pcb->rt->hook, m);
2537
2538 return (error);
2539} /* ng_btsocket_l2cap_send2 */
2540
2541/*
2542 * Get socket address
2543 */
2544
2545int
2546ng_btsocket_l2cap_sockaddr(struct socket *so, struct sockaddr **nam)
2547{
2548 ng_btsocket_l2cap_pcb_p pcb = so2l2cap_pcb(so);
2549 struct sockaddr_l2cap sa;
2550
2551 if (pcb == NULL)
2552 return (EINVAL);
2553 if (ng_btsocket_l2cap_node == NULL)
2554 return (EINVAL);
2555
2556 bcopy(&pcb->src, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2557 sa.l2cap_psm = htole16(pcb->psm);
2558 sa.l2cap_len = sizeof(sa);
2559 sa.l2cap_family = AF_BLUETOOTH;
2560
5a975a3d 2561 *nam = sodupsockaddr((struct sockaddr *) &sa, M_WAITOK | M_NULLOK);
b06ebda0
MD
2562
2563 return ((*nam == NULL)? ENOMEM : 0);
2564} /* ng_btsocket_l2cap_sockaddr */
2565
2566/*****************************************************************************
2567 *****************************************************************************
2568 ** Misc. functions
2569 *****************************************************************************
2570 *****************************************************************************/
2571
2572/*
2573 * Look for the socket that listens on given PSM and bdaddr. Returns exact or
2574 * close match (if any). Caller must hold ng_btsocket_l2cap_sockets_mtx.
2575 */
2576
2577static ng_btsocket_l2cap_pcb_p
2578ng_btsocket_l2cap_pcb_by_addr(bdaddr_p bdaddr, int psm)
2579{
2580 ng_btsocket_l2cap_pcb_p p = NULL, p1 = NULL;
2581
2582 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2583
2584 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next) {
2585 if (p->so == NULL || !(p->so->so_options & SO_ACCEPTCONN) ||
2586 p->psm != psm)
2587 continue;
2588
2589 if (bcmp(&p->src, bdaddr, sizeof(p->src)) == 0)
2590 break;
2591
2592 if (bcmp(&p->src, NG_HCI_BDADDR_ANY, sizeof(p->src)) == 0)
2593 p1 = p;
2594 }
2595
2596 return ((p != NULL)? p : p1);
2597} /* ng_btsocket_l2cap_pcb_by_addr */
2598
2599/*
2600 * Look for the socket that has given token.
2601 * Caller must hold ng_btsocket_l2cap_sockets_mtx.
2602 */
2603
2604static ng_btsocket_l2cap_pcb_p
2605ng_btsocket_l2cap_pcb_by_token(u_int32_t token)
2606{
2607 ng_btsocket_l2cap_pcb_p p = NULL;
2608
2609 if (token == 0)
2610 return (NULL);
2611
2612 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2613
2614 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2615 if (p->token == token)
2616 break;
2617
2618 return (p);
2619} /* ng_btsocket_l2cap_pcb_by_token */
2620
2621/*
2622 * Look for the socket that assigned to given source address and channel ID.
2623 * Caller must hold ng_btsocket_l2cap_sockets_mtx
2624 */
2625
2626static ng_btsocket_l2cap_pcb_p
2627ng_btsocket_l2cap_pcb_by_cid(bdaddr_p src, int cid)
2628{
2629 ng_btsocket_l2cap_pcb_p p = NULL;
2630
2631 mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2632
2633 LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2634 if (p->cid == cid && bcmp(src, &p->src, sizeof(p->src)) == 0)
2635 break;
2636
2637 return (p);
2638} /* ng_btsocket_l2cap_pcb_by_cid */
2639
2640/*
2641 * Set timeout on socket
2642 */
2643
2644static void
2645ng_btsocket_l2cap_timeout(ng_btsocket_l2cap_pcb_p pcb)
2646{
2647 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2648
2649 if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2650 pcb->flags |= NG_BTSOCKET_L2CAP_TIMO;
2651 pcb->timo = timeout(ng_btsocket_l2cap_process_timeout, pcb,
2652 bluetooth_l2cap_ertx_timeout());
2653 } else
2654 KASSERT(0,
2655("%s: Duplicated socket timeout?!\n", __func__));
2656} /* ng_btsocket_l2cap_timeout */
2657
2658/*
2659 * Unset timeout on socket
2660 */
2661
2662static void
2663ng_btsocket_l2cap_untimeout(ng_btsocket_l2cap_pcb_p pcb)
2664{
2665 mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2666
2667 if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO) {
2668 untimeout(ng_btsocket_l2cap_process_timeout, pcb, pcb->timo);
2669 pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2670 } else
2671 KASSERT(0,
2672("%s: No socket timeout?!\n", __func__));
2673} /* ng_btsocket_l2cap_untimeout */
2674
2675/*
2676 * Process timeout on socket
2677 */
2678
2679static void
2680ng_btsocket_l2cap_process_timeout(void *xpcb)
2681{
2682 ng_btsocket_l2cap_pcb_p pcb = (ng_btsocket_l2cap_pcb_p) xpcb;
2683
2684 mtx_lock(&pcb->pcb_mtx);
2685
2686 pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2687 pcb->so->so_error = ETIMEDOUT;
2688
2689 switch (pcb->state) {
2690 case NG_BTSOCKET_L2CAP_CONNECTING:
2691 case NG_BTSOCKET_L2CAP_CONFIGURING:
2692 /* Send disconnect request with "zero" token */
2693 if (pcb->cid != 0)
2694 ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2695
2696 /* ... and close the socket */
2697 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2698 soisdisconnected(pcb->so);
2699 break;
2700
2701 case NG_BTSOCKET_L2CAP_OPEN:
2702 /* Send timeout - drop packet and wakeup sender */
2703 sbdroprecord(&pcb->so->so_snd);
2704 sowwakeup(pcb->so);
2705 break;
2706
2707 case NG_BTSOCKET_L2CAP_DISCONNECTING:
2708 /* Disconnect timeout - disconnect the socket anyway */
2709 pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2710 soisdisconnected(pcb->so);
2711 break;
2712
2713 default:
2714 NG_BTSOCKET_L2CAP_ERR(
2715"%s: Invalid socket state=%d\n", __func__, pcb->state);
2716 break;
2717 }
2718
2719 mtx_unlock(&pcb->pcb_mtx);
2720} /* ng_btsocket_l2cap_process_timeout */
2721
2722/*
2723 * Translate HCI/L2CAP error code into "errno" code
2724 * XXX Note: Some L2CAP and HCI error codes have the same value, but
2725 * different meaning
2726 */
2727
2728static int
2729ng_btsocket_l2cap_result2errno(int result)
2730{
2731 switch (result) {
2732 case 0x00: /* No error */
2733 return (0);
2734
2735 case 0x01: /* Unknown HCI command */
2736 return (ENODEV);
2737
2738 case 0x02: /* No connection */
2739 return (ENOTCONN);
2740
2741 case 0x03: /* Hardware failure */
2742 return (EIO);
2743
2744 case 0x04: /* Page timeout */
2745 return (EHOSTDOWN);
2746
2747 case 0x05: /* Authentication failure */
2748 case 0x06: /* Key missing */
2749 case 0x18: /* Pairing not allowed */
2750 case 0x21: /* Role change not allowed */
2751 case 0x24: /* LMP PSU not allowed */
2752 case 0x25: /* Encryption mode not acceptable */
2753 case 0x26: /* Unit key used */
2754 return (EACCES);
2755
2756 case 0x07: /* Memory full */
2757 return (ENOMEM);
2758
2759 case 0x08: /* Connection timeout */
2760 case 0x10: /* Host timeout */
2761 case 0x22: /* LMP response timeout */
2762 case 0xee: /* HCI timeout */
2763 case 0xeeee: /* L2CAP timeout */
2764 return (ETIMEDOUT);
2765
2766 case 0x09: /* Max number of connections */
2767 case 0x0a: /* Max number of SCO connections to a unit */
2768 return (EMLINK);
2769
2770 case 0x0b: /* ACL connection already exists */
2771 return (EEXIST);
2772
2773 case 0x0c: /* Command disallowed */
2774 return (EBUSY);
2775
2776 case 0x0d: /* Host rejected due to limited resources */
2777 case 0x0e: /* Host rejected due to securiity reasons */
2778 case 0x0f: /* Host rejected due to remote unit is a personal unit */
2779 case 0x1b: /* SCO offset rejected */
2780 case 0x1c: /* SCO interval rejected */
2781 case 0x1d: /* SCO air mode rejected */
2782 return (ECONNREFUSED);
2783
2784 case 0x11: /* Unsupported feature or parameter value */
2785 case 0x19: /* Unknown LMP PDU */
2786 case 0x1a: /* Unsupported remote feature */
2787 case 0x20: /* Unsupported LMP parameter value */
2788 case 0x27: /* QoS is not supported */
2789 case 0x29: /* Paring with unit key not supported */
2790 return (EOPNOTSUPP);
2791
2792 case 0x12: /* Invalid HCI command parameter */
2793 case 0x1e: /* Invalid LMP parameters */
2794 return (EINVAL);
2795
2796 case 0x13: /* Other end terminated connection: User ended connection */
2797 case 0x14: /* Other end terminated connection: Low resources */
2798 case 0x15: /* Other end terminated connection: About to power off */
2799 return (ECONNRESET);
2800
2801 case 0x16: /* Connection terminated by local host */
2802 return (ECONNABORTED);
2803
2804#if 0 /* XXX not yet */
2805 case 0x17: /* Repeated attempts */
2806 case 0x1f: /* Unspecified error */
2807 case 0x23: /* LMP error transaction collision */
2808 case 0x28: /* Instant passed */
2809#endif
2810 }
2811
2812 return (ENOSYS);
2813} /* ng_btsocket_l2cap_result2errno */
2814