hci_socket.c revision 1.20 1 1.20 plunky /* $NetBSD: hci_socket.c,v 1.20 2011/01/30 17:23:23 plunky Exp $ */
2 1.1 gdamore
3 1.1 gdamore /*-
4 1.1 gdamore * Copyright (c) 2005 Iain Hibbert.
5 1.1 gdamore * Copyright (c) 2006 Itronix Inc.
6 1.1 gdamore * All rights reserved.
7 1.1 gdamore *
8 1.1 gdamore * Redistribution and use in source and binary forms, with or without
9 1.1 gdamore * modification, are permitted provided that the following conditions
10 1.1 gdamore * are met:
11 1.1 gdamore * 1. Redistributions of source code must retain the above copyright
12 1.1 gdamore * notice, this list of conditions and the following disclaimer.
13 1.1 gdamore * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 gdamore * notice, this list of conditions and the following disclaimer in the
15 1.1 gdamore * documentation and/or other materials provided with the distribution.
16 1.1 gdamore * 3. The name of Itronix Inc. may not be used to endorse
17 1.1 gdamore * or promote products derived from this software without specific
18 1.1 gdamore * prior written permission.
19 1.1 gdamore *
20 1.1 gdamore * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 1.1 gdamore * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 1.1 gdamore * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 1.1 gdamore * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 1.1 gdamore * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 1.1 gdamore * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 1.1 gdamore * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 1.1 gdamore * ON ANY THEORY OF LIABILITY, WHETHER IN
28 1.1 gdamore * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 1.1 gdamore * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 1.1 gdamore * POSSIBILITY OF SUCH DAMAGE.
31 1.1 gdamore */
32 1.1 gdamore
33 1.1 gdamore #include <sys/cdefs.h>
34 1.20 plunky __KERNEL_RCSID(0, "$NetBSD: hci_socket.c,v 1.20 2011/01/30 17:23:23 plunky Exp $");
35 1.1 gdamore
36 1.10 plunky /* load symbolic names */
37 1.1 gdamore #ifdef BLUETOOTH_DEBUG
38 1.10 plunky #define PRUREQUESTS
39 1.1 gdamore #define PRCOREQUESTS
40 1.1 gdamore #endif
41 1.1 gdamore
42 1.1 gdamore #include <sys/param.h>
43 1.1 gdamore #include <sys/domain.h>
44 1.1 gdamore #include <sys/kauth.h>
45 1.1 gdamore #include <sys/kernel.h>
46 1.1 gdamore #include <sys/mbuf.h>
47 1.1 gdamore #include <sys/proc.h>
48 1.1 gdamore #include <sys/protosw.h>
49 1.1 gdamore #include <sys/socket.h>
50 1.1 gdamore #include <sys/socketvar.h>
51 1.1 gdamore #include <sys/systm.h>
52 1.1 gdamore
53 1.1 gdamore #include <netbt/bluetooth.h>
54 1.1 gdamore #include <netbt/hci.h>
55 1.1 gdamore
56 1.1 gdamore /*******************************************************************************
57 1.1 gdamore *
58 1.1 gdamore * HCI SOCK_RAW Sockets - for control of Bluetooth Devices
59 1.1 gdamore *
60 1.1 gdamore */
61 1.1 gdamore
62 1.1 gdamore /*
63 1.1 gdamore * the raw HCI protocol control block
64 1.1 gdamore */
65 1.1 gdamore struct hci_pcb {
66 1.1 gdamore struct socket *hp_socket; /* socket */
67 1.18 plunky kauth_cred_t hp_cred; /* owner credential */
68 1.1 gdamore unsigned int hp_flags; /* flags */
69 1.1 gdamore bdaddr_t hp_laddr; /* local address */
70 1.1 gdamore bdaddr_t hp_raddr; /* remote address */
71 1.1 gdamore struct hci_filter hp_efilter; /* user event filter */
72 1.1 gdamore struct hci_filter hp_pfilter; /* user packet filter */
73 1.1 gdamore LIST_ENTRY(hci_pcb) hp_next; /* next HCI pcb */
74 1.1 gdamore };
75 1.1 gdamore
76 1.1 gdamore /* hp_flags */
77 1.1 gdamore #define HCI_DIRECTION (1<<1) /* direction control messages */
78 1.1 gdamore #define HCI_PROMISCUOUS (1<<2) /* listen to all units */
79 1.1 gdamore
80 1.1 gdamore LIST_HEAD(hci_pcb_list, hci_pcb) hci_pcb = LIST_HEAD_INITIALIZER(hci_pcb);
81 1.1 gdamore
82 1.1 gdamore /* sysctl defaults */
83 1.1 gdamore int hci_sendspace = HCI_CMD_PKT_SIZE;
84 1.1 gdamore int hci_recvspace = 4096;
85 1.1 gdamore
86 1.18 plunky /* unprivileged commands opcode table */
87 1.13 plunky static const struct {
88 1.13 plunky uint16_t opcode;
89 1.13 plunky uint8_t offs; /* 0 - 63 */
90 1.13 plunky uint8_t mask; /* bit 0 - 7 */
91 1.18 plunky uint8_t length; /* approved length */
92 1.13 plunky } hci_cmds[] = {
93 1.13 plunky { HCI_CMD_INQUIRY,
94 1.13 plunky 0, 0x01, sizeof(hci_inquiry_cp) },
95 1.13 plunky { HCI_CMD_REMOTE_NAME_REQ,
96 1.13 plunky 2, 0x08, sizeof(hci_remote_name_req_cp) },
97 1.13 plunky { HCI_CMD_READ_REMOTE_FEATURES,
98 1.13 plunky 2, 0x20, sizeof(hci_read_remote_features_cp) },
99 1.13 plunky { HCI_CMD_READ_REMOTE_EXTENDED_FEATURES,
100 1.13 plunky 2, 0x40, sizeof(hci_read_remote_extended_features_cp) },
101 1.13 plunky { HCI_CMD_READ_REMOTE_VER_INFO,
102 1.13 plunky 2, 0x80, sizeof(hci_read_remote_ver_info_cp) },
103 1.13 plunky { HCI_CMD_READ_CLOCK_OFFSET,
104 1.13 plunky 3, 0x01, sizeof(hci_read_clock_offset_cp) },
105 1.13 plunky { HCI_CMD_READ_LMP_HANDLE,
106 1.13 plunky 3, 0x02, sizeof(hci_read_lmp_handle_cp) },
107 1.13 plunky { HCI_CMD_ROLE_DISCOVERY,
108 1.13 plunky 4, 0x80, sizeof(hci_role_discovery_cp) },
109 1.13 plunky { HCI_CMD_READ_LINK_POLICY_SETTINGS,
110 1.13 plunky 5, 0x02, sizeof(hci_read_link_policy_settings_cp) },
111 1.13 plunky { HCI_CMD_READ_DEFAULT_LINK_POLICY_SETTINGS,
112 1.13 plunky 5, 0x08, 0 },
113 1.13 plunky { HCI_CMD_READ_PIN_TYPE,
114 1.13 plunky 6, 0x04, 0 },
115 1.13 plunky { HCI_CMD_READ_LOCAL_NAME,
116 1.13 plunky 7, 0x02, 0 },
117 1.13 plunky { HCI_CMD_READ_CON_ACCEPT_TIMEOUT,
118 1.13 plunky 7, 0x04, 0 },
119 1.13 plunky { HCI_CMD_READ_PAGE_TIMEOUT,
120 1.13 plunky 7, 0x10, 0 },
121 1.13 plunky { HCI_CMD_READ_SCAN_ENABLE,
122 1.13 plunky 7, 0x40, 0 },
123 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_ACTIVITY,
124 1.13 plunky 8, 0x01, 0 },
125 1.13 plunky { HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY,
126 1.13 plunky 8, 0x04, 0 },
127 1.13 plunky { HCI_CMD_READ_AUTH_ENABLE,
128 1.13 plunky 8, 0x10, 0 },
129 1.13 plunky { HCI_CMD_READ_ENCRYPTION_MODE,
130 1.13 plunky 8, 0x40, 0 },
131 1.13 plunky { HCI_CMD_READ_UNIT_CLASS,
132 1.13 plunky 9, 0x01, 0 },
133 1.13 plunky { HCI_CMD_READ_VOICE_SETTING,
134 1.13 plunky 9, 0x04, 0 },
135 1.13 plunky { HCI_CMD_READ_AUTO_FLUSH_TIMEOUT,
136 1.13 plunky 9, 0x10, sizeof(hci_read_auto_flush_timeout_cp) },
137 1.13 plunky { HCI_CMD_READ_NUM_BROADCAST_RETRANS,
138 1.13 plunky 9, 0x40, 0 },
139 1.13 plunky { HCI_CMD_READ_HOLD_MODE_ACTIVITY,
140 1.13 plunky 10, 0x01, 0 },
141 1.13 plunky { HCI_CMD_READ_XMIT_LEVEL,
142 1.13 plunky 10, 0x04, sizeof(hci_read_xmit_level_cp) },
143 1.13 plunky { HCI_CMD_READ_SCO_FLOW_CONTROL,
144 1.13 plunky 10, 0x08, 0 },
145 1.13 plunky { HCI_CMD_READ_LINK_SUPERVISION_TIMEOUT,
146 1.13 plunky 11, 0x01, sizeof(hci_read_link_supervision_timeout_cp) },
147 1.13 plunky { HCI_CMD_READ_NUM_SUPPORTED_IAC,
148 1.13 plunky 11, 0x04, 0 },
149 1.13 plunky { HCI_CMD_READ_IAC_LAP,
150 1.13 plunky 11, 0x08, 0 },
151 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_PERIOD,
152 1.13 plunky 11, 0x20, 0 },
153 1.13 plunky { HCI_CMD_READ_PAGE_SCAN,
154 1.13 plunky 11, 0x80, 0 },
155 1.13 plunky { HCI_CMD_READ_INQUIRY_SCAN_TYPE,
156 1.13 plunky 12, 0x10, 0 },
157 1.13 plunky { HCI_CMD_READ_INQUIRY_MODE,
158 1.13 plunky 12, 0x40, 0 },
159 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_TYPE,
160 1.13 plunky 13, 0x01, 0 },
161 1.13 plunky { HCI_CMD_READ_AFH_ASSESSMENT,
162 1.13 plunky 13, 0x04, 0 },
163 1.13 plunky { HCI_CMD_READ_LOCAL_VER,
164 1.13 plunky 14, 0x08, 0 },
165 1.13 plunky { HCI_CMD_READ_LOCAL_COMMANDS,
166 1.13 plunky 14, 0x10, 0 },
167 1.13 plunky { HCI_CMD_READ_LOCAL_FEATURES,
168 1.13 plunky 14, 0x20, 0 },
169 1.13 plunky { HCI_CMD_READ_LOCAL_EXTENDED_FEATURES,
170 1.13 plunky 14, 0x40, sizeof(hci_read_local_extended_features_cp) },
171 1.13 plunky { HCI_CMD_READ_BUFFER_SIZE,
172 1.13 plunky 14, 0x80, 0 },
173 1.13 plunky { HCI_CMD_READ_COUNTRY_CODE,
174 1.13 plunky 15, 0x01, 0 },
175 1.13 plunky { HCI_CMD_READ_BDADDR,
176 1.13 plunky 15, 0x02, 0 },
177 1.13 plunky { HCI_CMD_READ_FAILED_CONTACT_CNTR,
178 1.13 plunky 15, 0x04, sizeof(hci_read_failed_contact_cntr_cp) },
179 1.13 plunky { HCI_CMD_READ_LINK_QUALITY,
180 1.13 plunky 15, 0x10, sizeof(hci_read_link_quality_cp) },
181 1.13 plunky { HCI_CMD_READ_RSSI,
182 1.13 plunky 15, 0x20, sizeof(hci_read_rssi_cp) },
183 1.13 plunky { HCI_CMD_READ_AFH_CHANNEL_MAP,
184 1.13 plunky 15, 0x40, sizeof(hci_read_afh_channel_map_cp) },
185 1.13 plunky { HCI_CMD_READ_CLOCK,
186 1.13 plunky 15, 0x80, sizeof(hci_read_clock_cp) },
187 1.13 plunky { HCI_CMD_READ_LOOPBACK_MODE,
188 1.13 plunky 16, 0x01, 0 },
189 1.14 plunky { HCI_CMD_READ_EXTENDED_INQUIRY_RSP,
190 1.14 plunky 17, 0x01, 0 },
191 1.14 plunky { HCI_CMD_READ_SIMPLE_PAIRING_MODE,
192 1.14 plunky 17, 0x20, 0 },
193 1.14 plunky { HCI_CMD_READ_INQUIRY_RSP_XMIT_POWER,
194 1.14 plunky 18, 0x01, 0 },
195 1.14 plunky { HCI_CMD_READ_DEFAULT_ERRDATA_REPORTING,
196 1.14 plunky 18, 0x04, 0 },
197 1.13 plunky };
198 1.13 plunky
199 1.1 gdamore /*
200 1.18 plunky * supply a basic device send/recv policy
201 1.1 gdamore */
202 1.4 plunky static int
203 1.18 plunky hci_device_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
204 1.18 plunky void *arg0, void *arg1, void *arg2, void *arg3)
205 1.1 gdamore {
206 1.18 plunky int i, result;
207 1.18 plunky
208 1.18 plunky result = KAUTH_RESULT_DEFER;
209 1.18 plunky
210 1.18 plunky switch (action) {
211 1.19 plunky case KAUTH_DEVICE_BLUETOOTH_SEND: {
212 1.18 plunky struct hci_unit *unit = (struct hci_unit *)arg0;
213 1.18 plunky hci_cmd_hdr_t *hdr = (hci_cmd_hdr_t *)arg1;
214 1.18 plunky
215 1.18 plunky /*
216 1.18 plunky * Allow sending unprivileged commands if the packet size
217 1.18 plunky * is correct and the unit claims to support it
218 1.18 plunky */
219 1.18 plunky
220 1.19 plunky if (hdr->type != HCI_CMD_PKT)
221 1.19 plunky break;
222 1.19 plunky
223 1.18 plunky for (i = 0; i < __arraycount(hci_cmds); i++) {
224 1.18 plunky if (hdr->opcode == hci_cmds[i].opcode
225 1.18 plunky && hdr->length == hci_cmds[i].length
226 1.18 plunky && (unit->hci_cmds[hci_cmds[i].offs] & hci_cmds[i].mask)) {
227 1.18 plunky result = KAUTH_RESULT_ALLOW;
228 1.18 plunky break;
229 1.18 plunky }
230 1.18 plunky }
231 1.18 plunky
232 1.18 plunky break;
233 1.18 plunky }
234 1.18 plunky
235 1.19 plunky case KAUTH_DEVICE_BLUETOOTH_RECV:
236 1.19 plunky switch((uint8_t)(uintptr_t)arg0) {
237 1.19 plunky case HCI_CMD_PKT: {
238 1.19 plunky uint16_t opcode = (uint16_t)(uintptr_t)arg1;
239 1.19 plunky
240 1.19 plunky /*
241 1.19 plunky * Allow to see any unprivileged command packet
242 1.19 plunky */
243 1.19 plunky
244 1.19 plunky for (i = 0; i < __arraycount(hci_cmds); i++) {
245 1.19 plunky if (opcode == hci_cmds[i].opcode) {
246 1.19 plunky result = KAUTH_RESULT_ALLOW;
247 1.19 plunky break;
248 1.19 plunky }
249 1.19 plunky }
250 1.19 plunky
251 1.19 plunky break;
252 1.19 plunky }
253 1.19 plunky
254 1.19 plunky case HCI_EVENT_PKT: {
255 1.19 plunky uint8_t event = (uint8_t)(uintptr_t)arg1;
256 1.18 plunky
257 1.19 plunky /*
258 1.19 plunky * Allow to receive most events
259 1.19 plunky */
260 1.19 plunky
261 1.19 plunky switch (event) {
262 1.19 plunky case HCI_EVENT_RETURN_LINK_KEYS:
263 1.19 plunky case HCI_EVENT_LINK_KEY_NOTIFICATION:
264 1.19 plunky case HCI_EVENT_USER_CONFIRM_REQ:
265 1.19 plunky case HCI_EVENT_USER_PASSKEY_NOTIFICATION:
266 1.19 plunky case HCI_EVENT_VENDOR:
267 1.19 plunky break;
268 1.18 plunky
269 1.19 plunky default:
270 1.18 plunky result = KAUTH_RESULT_ALLOW;
271 1.18 plunky break;
272 1.18 plunky }
273 1.18 plunky
274 1.19 plunky break;
275 1.19 plunky }
276 1.18 plunky
277 1.19 plunky case HCI_ACL_DATA_PKT:
278 1.19 plunky case HCI_SCO_DATA_PKT: {
279 1.19 plunky /* uint16_t handle = (uint16_t)(uintptr_t)arg1; */
280 1.19 plunky /*
281 1.19 plunky * don't normally allow receiving data packets
282 1.19 plunky */
283 1.18 plunky break;
284 1.19 plunky }
285 1.18 plunky
286 1.18 plunky default:
287 1.18 plunky break;
288 1.18 plunky }
289 1.13 plunky
290 1.18 plunky break;
291 1.18 plunky
292 1.18 plunky default:
293 1.13 plunky break;
294 1.4 plunky }
295 1.1 gdamore
296 1.18 plunky return result;
297 1.1 gdamore }
298 1.1 gdamore
299 1.18 plunky /*
300 1.18 plunky * HCI protocol init routine,
301 1.18 plunky * - set up a kauth listener to provide basic packet access policy
302 1.18 plunky */
303 1.18 plunky void
304 1.18 plunky hci_init(void)
305 1.1 gdamore {
306 1.1 gdamore
307 1.18 plunky if (kauth_listen_scope(KAUTH_SCOPE_DEVICE, hci_device_cb, NULL) == NULL)
308 1.18 plunky panic("Bluetooth HCI: cannot listen on device scope");
309 1.1 gdamore }
310 1.1 gdamore
311 1.1 gdamore /*
312 1.1 gdamore * When command packet reaches the device, we can drop
313 1.1 gdamore * it from the socket buffer (called from hci_output_acl)
314 1.1 gdamore */
315 1.1 gdamore void
316 1.1 gdamore hci_drop(void *arg)
317 1.1 gdamore {
318 1.1 gdamore struct socket *so = arg;
319 1.1 gdamore
320 1.1 gdamore sbdroprecord(&so->so_snd);
321 1.1 gdamore sowwakeup(so);
322 1.1 gdamore }
323 1.1 gdamore
324 1.1 gdamore /*
325 1.1 gdamore * HCI socket is going away and has some pending packets. We let them
326 1.1 gdamore * go by design, but remove the context pointer as it will be invalid
327 1.1 gdamore * and we no longer need to be notified.
328 1.1 gdamore */
329 1.1 gdamore static void
330 1.1 gdamore hci_cmdwait_flush(struct socket *so)
331 1.1 gdamore {
332 1.1 gdamore struct hci_unit *unit;
333 1.1 gdamore struct socket *ctx;
334 1.1 gdamore struct mbuf *m;
335 1.1 gdamore
336 1.1 gdamore DPRINTF("flushing %p\n", so);
337 1.1 gdamore
338 1.1 gdamore SIMPLEQ_FOREACH(unit, &hci_unit_list, hci_next) {
339 1.1 gdamore m = MBUFQ_FIRST(&unit->hci_cmdwait);
340 1.1 gdamore while (m != NULL) {
341 1.1 gdamore ctx = M_GETCTX(m, struct socket *);
342 1.1 gdamore if (ctx == so)
343 1.1 gdamore M_SETCTX(m, NULL);
344 1.1 gdamore
345 1.1 gdamore m = MBUFQ_NEXT(m);
346 1.1 gdamore }
347 1.1 gdamore }
348 1.1 gdamore }
349 1.1 gdamore
350 1.1 gdamore /*
351 1.1 gdamore * HCI send packet
352 1.1 gdamore * This came from userland, so check it out.
353 1.1 gdamore */
354 1.1 gdamore static int
355 1.1 gdamore hci_send(struct hci_pcb *pcb, struct mbuf *m, bdaddr_t *addr)
356 1.1 gdamore {
357 1.1 gdamore struct hci_unit *unit;
358 1.1 gdamore struct mbuf *m0;
359 1.1 gdamore hci_cmd_hdr_t hdr;
360 1.1 gdamore int err;
361 1.1 gdamore
362 1.9 plunky KASSERT(m != NULL);
363 1.9 plunky KASSERT(addr != NULL);
364 1.1 gdamore
365 1.1 gdamore /* wants at least a header to start with */
366 1.1 gdamore if (m->m_pkthdr.len < sizeof(hdr)) {
367 1.1 gdamore err = EMSGSIZE;
368 1.1 gdamore goto bad;
369 1.1 gdamore }
370 1.1 gdamore m_copydata(m, 0, sizeof(hdr), &hdr);
371 1.13 plunky hdr.opcode = le16toh(hdr.opcode);
372 1.1 gdamore
373 1.1 gdamore /* only allows CMD packets to be sent */
374 1.1 gdamore if (hdr.type != HCI_CMD_PKT) {
375 1.1 gdamore err = EINVAL;
376 1.1 gdamore goto bad;
377 1.1 gdamore }
378 1.1 gdamore
379 1.1 gdamore /* validates packet length */
380 1.1 gdamore if (m->m_pkthdr.len != sizeof(hdr) + hdr.length) {
381 1.1 gdamore err = EMSGSIZE;
382 1.1 gdamore goto bad;
383 1.1 gdamore }
384 1.1 gdamore
385 1.1 gdamore /* finds destination */
386 1.1 gdamore unit = hci_unit_lookup(addr);
387 1.1 gdamore if (unit == NULL) {
388 1.1 gdamore err = ENETDOWN;
389 1.1 gdamore goto bad;
390 1.1 gdamore }
391 1.1 gdamore
392 1.13 plunky /* security checks for unprivileged users */
393 1.18 plunky if (pcb->hp_cred != NULL
394 1.18 plunky && kauth_authorize_device(pcb->hp_cred,
395 1.19 plunky KAUTH_DEVICE_BLUETOOTH_SEND,
396 1.18 plunky unit, &hdr, NULL, NULL) != 0) {
397 1.13 plunky err = EPERM;
398 1.13 plunky goto bad;
399 1.13 plunky }
400 1.13 plunky
401 1.1 gdamore /* makess a copy for precious to keep */
402 1.1 gdamore m0 = m_copypacket(m, M_DONTWAIT);
403 1.1 gdamore if (m0 == NULL) {
404 1.1 gdamore err = ENOMEM;
405 1.1 gdamore goto bad;
406 1.1 gdamore }
407 1.1 gdamore sbappendrecord(&pcb->hp_socket->so_snd, m0);
408 1.1 gdamore M_SETCTX(m, pcb->hp_socket); /* enable drop callback */
409 1.1 gdamore
410 1.12 plunky DPRINTFN(2, "(%s) opcode (%03x|%04x)\n", device_xname(unit->hci_dev),
411 1.13 plunky HCI_OGF(hdr.opcode), HCI_OCF(hdr.opcode));
412 1.1 gdamore
413 1.1 gdamore /* Sendss it */
414 1.1 gdamore if (unit->hci_num_cmd_pkts == 0)
415 1.1 gdamore MBUFQ_ENQUEUE(&unit->hci_cmdwait, m);
416 1.1 gdamore else
417 1.1 gdamore hci_output_cmd(unit, m);
418 1.1 gdamore
419 1.1 gdamore return 0;
420 1.1 gdamore
421 1.1 gdamore bad:
422 1.1 gdamore DPRINTF("packet (%d bytes) not sent (error %d)\n",
423 1.1 gdamore m->m_pkthdr.len, err);
424 1.1 gdamore if (m) m_freem(m);
425 1.1 gdamore return err;
426 1.1 gdamore }
427 1.1 gdamore
428 1.1 gdamore /*
429 1.1 gdamore * User Request.
430 1.1 gdamore * up is socket
431 1.1 gdamore * m is either
432 1.1 gdamore * optional mbuf chain containing message
433 1.1 gdamore * ioctl command (PRU_CONTROL)
434 1.1 gdamore * nam is either
435 1.1 gdamore * optional mbuf chain containing an address
436 1.1 gdamore * ioctl data (PRU_CONTROL)
437 1.1 gdamore * optionally, protocol number (PRU_ATTACH)
438 1.1 gdamore * ctl is optional mbuf chain containing socket options
439 1.1 gdamore * l is pointer to process requesting action (if any)
440 1.1 gdamore *
441 1.1 gdamore * we are responsible for disposing of m and ctl if
442 1.1 gdamore * they are mbuf chains
443 1.1 gdamore */
444 1.1 gdamore int
445 1.1 gdamore hci_usrreq(struct socket *up, int req, struct mbuf *m,
446 1.1 gdamore struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
447 1.1 gdamore {
448 1.1 gdamore struct hci_pcb *pcb = (struct hci_pcb *)up->so_pcb;
449 1.1 gdamore struct sockaddr_bt *sa;
450 1.4 plunky int err = 0;
451 1.1 gdamore
452 1.1 gdamore DPRINTFN(2, "%s\n", prurequests[req]);
453 1.1 gdamore
454 1.1 gdamore switch(req) {
455 1.1 gdamore case PRU_CONTROL:
456 1.16 ad mutex_enter(bt_lock);
457 1.16 ad err = hci_ioctl((unsigned long)m, (void *)nam, l);
458 1.16 ad mutex_exit(bt_lock);
459 1.16 ad return err;
460 1.1 gdamore
461 1.1 gdamore case PRU_PURGEIF:
462 1.1 gdamore return EOPNOTSUPP;
463 1.1 gdamore
464 1.1 gdamore case PRU_ATTACH:
465 1.15 ad if (up->so_lock == NULL) {
466 1.15 ad mutex_obj_hold(bt_lock);
467 1.15 ad up->so_lock = bt_lock;
468 1.15 ad solock(up);
469 1.15 ad }
470 1.15 ad KASSERT(solocked(up));
471 1.1 gdamore if (pcb)
472 1.1 gdamore return EINVAL;
473 1.1 gdamore err = soreserve(up, hci_sendspace, hci_recvspace);
474 1.1 gdamore if (err)
475 1.1 gdamore return err;
476 1.1 gdamore
477 1.1 gdamore pcb = malloc(sizeof(struct hci_pcb), M_PCB, M_NOWAIT | M_ZERO);
478 1.1 gdamore if (pcb == NULL)
479 1.1 gdamore return ENOMEM;
480 1.1 gdamore
481 1.1 gdamore up->so_pcb = pcb;
482 1.1 gdamore pcb->hp_socket = up;
483 1.4 plunky
484 1.18 plunky if (l != NULL)
485 1.18 plunky pcb->hp_cred = kauth_cred_dup(l->l_cred);
486 1.1 gdamore
487 1.1 gdamore /*
488 1.1 gdamore * Set default user filter. By default, socket only passes
489 1.1 gdamore * Command_Complete and Command_Status Events.
490 1.1 gdamore */
491 1.1 gdamore hci_filter_set(HCI_EVENT_COMMAND_COMPL, &pcb->hp_efilter);
492 1.1 gdamore hci_filter_set(HCI_EVENT_COMMAND_STATUS, &pcb->hp_efilter);
493 1.1 gdamore hci_filter_set(HCI_EVENT_PKT, &pcb->hp_pfilter);
494 1.1 gdamore
495 1.1 gdamore LIST_INSERT_HEAD(&hci_pcb, pcb, hp_next);
496 1.1 gdamore
497 1.1 gdamore return 0;
498 1.1 gdamore }
499 1.1 gdamore
500 1.1 gdamore /* anything after here *requires* a pcb */
501 1.1 gdamore if (pcb == NULL) {
502 1.1 gdamore err = EINVAL;
503 1.1 gdamore goto release;
504 1.1 gdamore }
505 1.1 gdamore
506 1.1 gdamore switch(req) {
507 1.1 gdamore case PRU_DISCONNECT:
508 1.1 gdamore bdaddr_copy(&pcb->hp_raddr, BDADDR_ANY);
509 1.1 gdamore
510 1.1 gdamore /* XXX we cannot call soisdisconnected() here, as it sets
511 1.1 gdamore * SS_CANTRCVMORE and SS_CANTSENDMORE. The problem being,
512 1.1 gdamore * that soisconnected() does not clear these and if you
513 1.1 gdamore * try to reconnect this socket (which is permitted) you
514 1.1 gdamore * get a broken pipe when you try to write any data.
515 1.1 gdamore */
516 1.1 gdamore up->so_state &= ~SS_ISCONNECTED;
517 1.1 gdamore break;
518 1.1 gdamore
519 1.1 gdamore case PRU_ABORT:
520 1.1 gdamore soisdisconnected(up);
521 1.1 gdamore /* fall through to */
522 1.1 gdamore case PRU_DETACH:
523 1.1 gdamore if (up->so_snd.sb_mb != NULL)
524 1.1 gdamore hci_cmdwait_flush(up);
525 1.1 gdamore
526 1.18 plunky if (pcb->hp_cred != NULL)
527 1.18 plunky kauth_cred_free(pcb->hp_cred);
528 1.18 plunky
529 1.1 gdamore up->so_pcb = NULL;
530 1.1 gdamore LIST_REMOVE(pcb, hp_next);
531 1.1 gdamore free(pcb, M_PCB);
532 1.1 gdamore return 0;
533 1.1 gdamore
534 1.1 gdamore case PRU_BIND:
535 1.9 plunky KASSERT(nam != NULL);
536 1.1 gdamore sa = mtod(nam, struct sockaddr_bt *);
537 1.1 gdamore
538 1.1 gdamore if (sa->bt_len != sizeof(struct sockaddr_bt))
539 1.1 gdamore return EINVAL;
540 1.1 gdamore
541 1.1 gdamore if (sa->bt_family != AF_BLUETOOTH)
542 1.1 gdamore return EAFNOSUPPORT;
543 1.1 gdamore
544 1.1 gdamore bdaddr_copy(&pcb->hp_laddr, &sa->bt_bdaddr);
545 1.1 gdamore
546 1.1 gdamore if (bdaddr_any(&sa->bt_bdaddr))
547 1.1 gdamore pcb->hp_flags |= HCI_PROMISCUOUS;
548 1.1 gdamore else
549 1.1 gdamore pcb->hp_flags &= ~HCI_PROMISCUOUS;
550 1.1 gdamore
551 1.1 gdamore return 0;
552 1.1 gdamore
553 1.1 gdamore case PRU_CONNECT:
554 1.9 plunky KASSERT(nam != NULL);
555 1.1 gdamore sa = mtod(nam, struct sockaddr_bt *);
556 1.1 gdamore
557 1.1 gdamore if (sa->bt_len != sizeof(struct sockaddr_bt))
558 1.1 gdamore return EINVAL;
559 1.1 gdamore
560 1.1 gdamore if (sa->bt_family != AF_BLUETOOTH)
561 1.1 gdamore return EAFNOSUPPORT;
562 1.1 gdamore
563 1.1 gdamore if (hci_unit_lookup(&sa->bt_bdaddr) == NULL)
564 1.1 gdamore return EADDRNOTAVAIL;
565 1.1 gdamore
566 1.1 gdamore bdaddr_copy(&pcb->hp_raddr, &sa->bt_bdaddr);
567 1.1 gdamore soisconnected(up);
568 1.1 gdamore return 0;
569 1.1 gdamore
570 1.1 gdamore case PRU_PEERADDR:
571 1.9 plunky KASSERT(nam != NULL);
572 1.1 gdamore sa = mtod(nam, struct sockaddr_bt *);
573 1.1 gdamore
574 1.1 gdamore memset(sa, 0, sizeof(struct sockaddr_bt));
575 1.1 gdamore nam->m_len =
576 1.1 gdamore sa->bt_len = sizeof(struct sockaddr_bt);
577 1.1 gdamore sa->bt_family = AF_BLUETOOTH;
578 1.1 gdamore bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_raddr);
579 1.1 gdamore return 0;
580 1.1 gdamore
581 1.1 gdamore case PRU_SOCKADDR:
582 1.9 plunky KASSERT(nam != NULL);
583 1.1 gdamore sa = mtod(nam, struct sockaddr_bt *);
584 1.1 gdamore
585 1.1 gdamore memset(sa, 0, sizeof(struct sockaddr_bt));
586 1.1 gdamore nam->m_len =
587 1.1 gdamore sa->bt_len = sizeof(struct sockaddr_bt);
588 1.1 gdamore sa->bt_family = AF_BLUETOOTH;
589 1.1 gdamore bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_laddr);
590 1.1 gdamore return 0;
591 1.1 gdamore
592 1.1 gdamore case PRU_SHUTDOWN:
593 1.1 gdamore socantsendmore(up);
594 1.1 gdamore break;
595 1.1 gdamore
596 1.1 gdamore case PRU_SEND:
597 1.1 gdamore sa = NULL;
598 1.1 gdamore if (nam) {
599 1.1 gdamore sa = mtod(nam, struct sockaddr_bt *);
600 1.1 gdamore
601 1.1 gdamore if (sa->bt_len != sizeof(struct sockaddr_bt)) {
602 1.1 gdamore err = EINVAL;
603 1.1 gdamore goto release;
604 1.1 gdamore }
605 1.1 gdamore
606 1.1 gdamore if (sa->bt_family != AF_BLUETOOTH) {
607 1.1 gdamore err = EAFNOSUPPORT;
608 1.1 gdamore goto release;
609 1.1 gdamore }
610 1.1 gdamore }
611 1.1 gdamore
612 1.1 gdamore if (ctl) /* have no use for this */
613 1.1 gdamore m_freem(ctl);
614 1.1 gdamore
615 1.1 gdamore return hci_send(pcb, m, (sa ? &sa->bt_bdaddr : &pcb->hp_raddr));
616 1.1 gdamore
617 1.1 gdamore case PRU_SENSE:
618 1.1 gdamore return 0; /* (no sense - Doh!) */
619 1.1 gdamore
620 1.1 gdamore case PRU_RCVD:
621 1.1 gdamore case PRU_RCVOOB:
622 1.1 gdamore return EOPNOTSUPP; /* (no release) */
623 1.1 gdamore
624 1.1 gdamore case PRU_ACCEPT:
625 1.1 gdamore case PRU_CONNECT2:
626 1.1 gdamore case PRU_LISTEN:
627 1.1 gdamore case PRU_SENDOOB:
628 1.1 gdamore case PRU_FASTTIMO:
629 1.1 gdamore case PRU_SLOWTIMO:
630 1.1 gdamore case PRU_PROTORCV:
631 1.1 gdamore case PRU_PROTOSEND:
632 1.1 gdamore err = EOPNOTSUPP;
633 1.1 gdamore break;
634 1.1 gdamore
635 1.1 gdamore default:
636 1.1 gdamore UNKNOWN(req);
637 1.1 gdamore err = EOPNOTSUPP;
638 1.1 gdamore break;
639 1.1 gdamore }
640 1.1 gdamore
641 1.1 gdamore release:
642 1.2 ad if (m)
643 1.2 ad m_freem(m);
644 1.2 ad if (ctl)
645 1.2 ad m_freem(ctl);
646 1.1 gdamore return err;
647 1.1 gdamore }
648 1.1 gdamore
649 1.1 gdamore /*
650 1.1 gdamore * get/set socket options
651 1.1 gdamore */
652 1.1 gdamore int
653 1.17 plunky hci_ctloutput(int req, struct socket *so, struct sockopt *sopt)
654 1.1 gdamore {
655 1.1 gdamore struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
656 1.17 plunky int optval, err = 0;
657 1.1 gdamore
658 1.1 gdamore DPRINTFN(2, "req %s\n", prcorequests[req]);
659 1.1 gdamore
660 1.1 gdamore if (pcb == NULL)
661 1.1 gdamore return EINVAL;
662 1.1 gdamore
663 1.17 plunky if (sopt->sopt_level != BTPROTO_HCI)
664 1.7 plunky return ENOPROTOOPT;
665 1.1 gdamore
666 1.1 gdamore switch(req) {
667 1.1 gdamore case PRCO_GETOPT:
668 1.17 plunky switch (sopt->sopt_name) {
669 1.1 gdamore case SO_HCI_EVT_FILTER:
670 1.17 plunky err = sockopt_set(sopt, &pcb->hp_efilter,
671 1.17 plunky sizeof(struct hci_filter));
672 1.17 plunky
673 1.1 gdamore break;
674 1.1 gdamore
675 1.1 gdamore case SO_HCI_PKT_FILTER:
676 1.17 plunky err = sockopt_set(sopt, &pcb->hp_pfilter,
677 1.17 plunky sizeof(struct hci_filter));
678 1.17 plunky
679 1.1 gdamore break;
680 1.1 gdamore
681 1.1 gdamore case SO_HCI_DIRECTION:
682 1.17 plunky err = sockopt_setint(sopt,
683 1.17 plunky (pcb->hp_flags & HCI_DIRECTION ? 1 : 0));
684 1.17 plunky
685 1.1 gdamore break;
686 1.1 gdamore
687 1.1 gdamore default:
688 1.7 plunky err = ENOPROTOOPT;
689 1.1 gdamore break;
690 1.1 gdamore }
691 1.1 gdamore break;
692 1.1 gdamore
693 1.1 gdamore case PRCO_SETOPT:
694 1.17 plunky switch (sopt->sopt_name) {
695 1.1 gdamore case SO_HCI_EVT_FILTER: /* set event filter */
696 1.17 plunky err = sockopt_get(sopt, &pcb->hp_efilter,
697 1.17 plunky sizeof(pcb->hp_efilter));
698 1.17 plunky
699 1.1 gdamore break;
700 1.1 gdamore
701 1.1 gdamore case SO_HCI_PKT_FILTER: /* set packet filter */
702 1.17 plunky err = sockopt_get(sopt, &pcb->hp_pfilter,
703 1.17 plunky sizeof(pcb->hp_pfilter));
704 1.17 plunky
705 1.1 gdamore break;
706 1.1 gdamore
707 1.1 gdamore case SO_HCI_DIRECTION: /* request direction ctl messages */
708 1.17 plunky err = sockopt_getint(sopt, &optval);
709 1.17 plunky if (err)
710 1.17 plunky break;
711 1.17 plunky
712 1.17 plunky if (optval)
713 1.1 gdamore pcb->hp_flags |= HCI_DIRECTION;
714 1.1 gdamore else
715 1.1 gdamore pcb->hp_flags &= ~HCI_DIRECTION;
716 1.1 gdamore break;
717 1.1 gdamore
718 1.1 gdamore default:
719 1.7 plunky err = ENOPROTOOPT;
720 1.1 gdamore break;
721 1.1 gdamore }
722 1.1 gdamore break;
723 1.1 gdamore
724 1.1 gdamore default:
725 1.7 plunky err = ENOPROTOOPT;
726 1.1 gdamore break;
727 1.1 gdamore }
728 1.1 gdamore
729 1.1 gdamore return err;
730 1.1 gdamore }
731 1.1 gdamore
732 1.1 gdamore /*
733 1.1 gdamore * HCI mbuf tap routine
734 1.1 gdamore *
735 1.1 gdamore * copy packets to any raw HCI sockets that wish (and are
736 1.1 gdamore * permitted) to see them
737 1.1 gdamore */
738 1.1 gdamore void
739 1.1 gdamore hci_mtap(struct mbuf *m, struct hci_unit *unit)
740 1.1 gdamore {
741 1.1 gdamore struct hci_pcb *pcb;
742 1.1 gdamore struct mbuf *m0, *ctlmsg, **ctl;
743 1.1 gdamore struct sockaddr_bt sa;
744 1.1 gdamore uint8_t type;
745 1.1 gdamore uint8_t event;
746 1.19 plunky uint16_t arg1;
747 1.1 gdamore
748 1.1 gdamore KASSERT(m->m_len >= sizeof(type));
749 1.1 gdamore
750 1.1 gdamore type = *mtod(m, uint8_t *);
751 1.1 gdamore
752 1.1 gdamore memset(&sa, 0, sizeof(sa));
753 1.1 gdamore sa.bt_len = sizeof(struct sockaddr_bt);
754 1.1 gdamore sa.bt_family = AF_BLUETOOTH;
755 1.1 gdamore bdaddr_copy(&sa.bt_bdaddr, &unit->hci_bdaddr);
756 1.1 gdamore
757 1.1 gdamore LIST_FOREACH(pcb, &hci_pcb, hp_next) {
758 1.1 gdamore /*
759 1.1 gdamore * filter according to source address
760 1.1 gdamore */
761 1.1 gdamore if ((pcb->hp_flags & HCI_PROMISCUOUS) == 0
762 1.1 gdamore && bdaddr_same(&pcb->hp_laddr, &sa.bt_bdaddr) == 0)
763 1.1 gdamore continue;
764 1.1 gdamore
765 1.1 gdamore /*
766 1.1 gdamore * filter according to packet type filter
767 1.1 gdamore */
768 1.1 gdamore if (hci_filter_test(type, &pcb->hp_pfilter) == 0)
769 1.1 gdamore continue;
770 1.1 gdamore
771 1.1 gdamore /*
772 1.1 gdamore * filter according to event/security filters
773 1.1 gdamore */
774 1.1 gdamore switch(type) {
775 1.1 gdamore case HCI_EVENT_PKT:
776 1.1 gdamore KASSERT(m->m_len >= sizeof(hci_event_hdr_t));
777 1.1 gdamore
778 1.1 gdamore event = mtod(m, hci_event_hdr_t *)->event;
779 1.1 gdamore
780 1.1 gdamore if (hci_filter_test(event, &pcb->hp_efilter) == 0)
781 1.1 gdamore continue;
782 1.1 gdamore
783 1.19 plunky arg1 = event;
784 1.1 gdamore break;
785 1.1 gdamore
786 1.1 gdamore case HCI_CMD_PKT:
787 1.1 gdamore KASSERT(m->m_len >= sizeof(hci_cmd_hdr_t));
788 1.19 plunky arg1 = le16toh(mtod(m, hci_cmd_hdr_t *)->opcode);
789 1.19 plunky break;
790 1.1 gdamore
791 1.19 plunky case HCI_ACL_DATA_PKT:
792 1.19 plunky KASSERT(m->m_len >= sizeof(hci_acldata_hdr_t));
793 1.19 plunky arg1 = le16toh(mtod(m, hci_acldata_hdr_t *)->con_handle);
794 1.19 plunky arg1 = HCI_CON_HANDLE(arg1);
795 1.19 plunky break;
796 1.18 plunky
797 1.19 plunky case HCI_SCO_DATA_PKT:
798 1.19 plunky KASSERT(m->m_len >= sizeof(hci_scodata_hdr_t));
799 1.19 plunky arg1 = le16toh(mtod(m, hci_scodata_hdr_t *)->con_handle);
800 1.19 plunky arg1 = HCI_CON_HANDLE(arg1);
801 1.1 gdamore break;
802 1.1 gdamore
803 1.1 gdamore default:
804 1.19 plunky arg1 = 0;
805 1.1 gdamore break;
806 1.1 gdamore }
807 1.1 gdamore
808 1.19 plunky if (pcb->hp_cred != NULL
809 1.19 plunky && kauth_authorize_device(pcb->hp_cred,
810 1.19 plunky KAUTH_DEVICE_BLUETOOTH_RECV,
811 1.19 plunky KAUTH_ARG(type), KAUTH_ARG(arg1), NULL, NULL) != 0)
812 1.19 plunky continue;
813 1.19 plunky
814 1.1 gdamore /*
815 1.1 gdamore * create control messages
816 1.1 gdamore */
817 1.1 gdamore ctlmsg = NULL;
818 1.1 gdamore ctl = &ctlmsg;
819 1.1 gdamore if (pcb->hp_flags & HCI_DIRECTION) {
820 1.1 gdamore int dir = m->m_flags & M_LINK0 ? 1 : 0;
821 1.1 gdamore
822 1.11 plunky *ctl = sbcreatecontrol(&dir, sizeof(dir),
823 1.1 gdamore SCM_HCI_DIRECTION, BTPROTO_HCI);
824 1.1 gdamore
825 1.1 gdamore if (*ctl != NULL)
826 1.1 gdamore ctl = &((*ctl)->m_next);
827 1.1 gdamore }
828 1.20 plunky if (pcb->hp_socket->so_options & SO_TIMESTAMP) {
829 1.20 plunky struct timeval tv;
830 1.20 plunky
831 1.20 plunky microtime(&tv);
832 1.20 plunky *ctl = sbcreatecontrol(&tv, sizeof(tv),
833 1.20 plunky SCM_TIMESTAMP, SOL_SOCKET);
834 1.20 plunky
835 1.20 plunky if (*ctl != NULL)
836 1.20 plunky ctl = &((*ctl)->m_next);
837 1.20 plunky }
838 1.1 gdamore
839 1.1 gdamore /*
840 1.1 gdamore * copy to socket
841 1.1 gdamore */
842 1.1 gdamore m0 = m_copypacket(m, M_DONTWAIT);
843 1.1 gdamore if (m0 && sbappendaddr(&pcb->hp_socket->so_rcv,
844 1.1 gdamore (struct sockaddr *)&sa, m0, ctlmsg)) {
845 1.1 gdamore sorwakeup(pcb->hp_socket);
846 1.1 gdamore } else {
847 1.1 gdamore m_freem(ctlmsg);
848 1.1 gdamore m_freem(m0);
849 1.1 gdamore }
850 1.1 gdamore }
851 1.1 gdamore }
852