hci_socket.c revision 1.20.14.2 1 1.20.14.1 tls /* $NetBSD: hci_socket.c,v 1.20.14.2 2017/12/03 11:39:03 jdolecek Exp $ */
2 1.1 gdamore
3 1.1 gdamore /*-
4 1.1 gdamore * Copyright (c) 2005 Iain Hibbert.
5 1.1 gdamore * Copyright (c) 2006 Itronix Inc.
6 1.1 gdamore * All rights reserved.
7 1.1 gdamore *
8 1.1 gdamore * Redistribution and use in source and binary forms, with or without
9 1.1 gdamore * modification, are permitted provided that the following conditions
10 1.1 gdamore * are met:
11 1.1 gdamore * 1. Redistributions of source code must retain the above copyright
12 1.1 gdamore * notice, this list of conditions and the following disclaimer.
13 1.1 gdamore * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 gdamore * notice, this list of conditions and the following disclaimer in the
15 1.1 gdamore * documentation and/or other materials provided with the distribution.
16 1.1 gdamore * 3. The name of Itronix Inc. may not be used to endorse
17 1.1 gdamore * or promote products derived from this software without specific
18 1.1 gdamore * prior written permission.
19 1.1 gdamore *
20 1.1 gdamore * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 1.1 gdamore * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 1.1 gdamore * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 1.1 gdamore * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 1.1 gdamore * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 1.1 gdamore * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 1.1 gdamore * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 1.1 gdamore * ON ANY THEORY OF LIABILITY, WHETHER IN
28 1.1 gdamore * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 1.1 gdamore * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 1.1 gdamore * POSSIBILITY OF SUCH DAMAGE.
31 1.1 gdamore */
32 1.1 gdamore
33 1.1 gdamore #include <sys/cdefs.h>
34 1.20.14.1 tls __KERNEL_RCSID(0, "$NetBSD: hci_socket.c,v 1.20.14.2 2017/12/03 11:39:03 jdolecek Exp $");
35 1.1 gdamore
36 1.10 plunky /* load symbolic names */
37 1.1 gdamore #ifdef BLUETOOTH_DEBUG
38 1.10 plunky #define PRUREQUESTS
39 1.1 gdamore #define PRCOREQUESTS
40 1.1 gdamore #endif
41 1.1 gdamore
42 1.1 gdamore #include <sys/param.h>
43 1.1 gdamore #include <sys/domain.h>
44 1.1 gdamore #include <sys/kauth.h>
45 1.1 gdamore #include <sys/kernel.h>
46 1.20.14.1 tls #include <sys/kmem.h>
47 1.1 gdamore #include <sys/mbuf.h>
48 1.1 gdamore #include <sys/proc.h>
49 1.1 gdamore #include <sys/protosw.h>
50 1.1 gdamore #include <sys/socket.h>
51 1.1 gdamore #include <sys/socketvar.h>
52 1.1 gdamore #include <sys/systm.h>
53 1.1 gdamore
54 1.1 gdamore #include <netbt/bluetooth.h>
55 1.1 gdamore #include <netbt/hci.h>
56 1.1 gdamore
57 1.1 gdamore /*******************************************************************************
58 1.1 gdamore *
59 1.1 gdamore * HCI SOCK_RAW Sockets - for control of Bluetooth Devices
60 1.1 gdamore *
61 1.1 gdamore */
62 1.1 gdamore
63 1.1 gdamore /*
64 1.1 gdamore * the raw HCI protocol control block
65 1.1 gdamore */
66 1.1 gdamore struct hci_pcb {
67 1.1 gdamore struct socket *hp_socket; /* socket */
68 1.18 plunky kauth_cred_t hp_cred; /* owner credential */
69 1.1 gdamore unsigned int hp_flags; /* flags */
70 1.1 gdamore bdaddr_t hp_laddr; /* local address */
71 1.1 gdamore bdaddr_t hp_raddr; /* remote address */
72 1.1 gdamore struct hci_filter hp_efilter; /* user event filter */
73 1.1 gdamore struct hci_filter hp_pfilter; /* user packet filter */
74 1.1 gdamore LIST_ENTRY(hci_pcb) hp_next; /* next HCI pcb */
75 1.1 gdamore };
76 1.1 gdamore
77 1.1 gdamore /* hp_flags */
78 1.1 gdamore #define HCI_DIRECTION (1<<1) /* direction control messages */
79 1.1 gdamore #define HCI_PROMISCUOUS (1<<2) /* listen to all units */
80 1.1 gdamore
81 1.1 gdamore LIST_HEAD(hci_pcb_list, hci_pcb) hci_pcb = LIST_HEAD_INITIALIZER(hci_pcb);
82 1.1 gdamore
83 1.1 gdamore /* sysctl defaults */
84 1.1 gdamore int hci_sendspace = HCI_CMD_PKT_SIZE;
85 1.1 gdamore int hci_recvspace = 4096;
86 1.1 gdamore
87 1.18 plunky /* unprivileged commands opcode table */
88 1.13 plunky static const struct {
89 1.13 plunky uint16_t opcode;
90 1.13 plunky uint8_t offs; /* 0 - 63 */
91 1.13 plunky uint8_t mask; /* bit 0 - 7 */
92 1.18 plunky uint8_t length; /* approved length */
93 1.13 plunky } hci_cmds[] = {
94 1.13 plunky { HCI_CMD_INQUIRY,
95 1.13 plunky 0, 0x01, sizeof(hci_inquiry_cp) },
96 1.13 plunky { HCI_CMD_REMOTE_NAME_REQ,
97 1.13 plunky 2, 0x08, sizeof(hci_remote_name_req_cp) },
98 1.13 plunky { HCI_CMD_READ_REMOTE_FEATURES,
99 1.13 plunky 2, 0x20, sizeof(hci_read_remote_features_cp) },
100 1.13 plunky { HCI_CMD_READ_REMOTE_EXTENDED_FEATURES,
101 1.13 plunky 2, 0x40, sizeof(hci_read_remote_extended_features_cp) },
102 1.13 plunky { HCI_CMD_READ_REMOTE_VER_INFO,
103 1.13 plunky 2, 0x80, sizeof(hci_read_remote_ver_info_cp) },
104 1.13 plunky { HCI_CMD_READ_CLOCK_OFFSET,
105 1.13 plunky 3, 0x01, sizeof(hci_read_clock_offset_cp) },
106 1.13 plunky { HCI_CMD_READ_LMP_HANDLE,
107 1.13 plunky 3, 0x02, sizeof(hci_read_lmp_handle_cp) },
108 1.13 plunky { HCI_CMD_ROLE_DISCOVERY,
109 1.13 plunky 4, 0x80, sizeof(hci_role_discovery_cp) },
110 1.13 plunky { HCI_CMD_READ_LINK_POLICY_SETTINGS,
111 1.13 plunky 5, 0x02, sizeof(hci_read_link_policy_settings_cp) },
112 1.13 plunky { HCI_CMD_READ_DEFAULT_LINK_POLICY_SETTINGS,
113 1.13 plunky 5, 0x08, 0 },
114 1.13 plunky { HCI_CMD_READ_PIN_TYPE,
115 1.13 plunky 6, 0x04, 0 },
116 1.13 plunky { HCI_CMD_READ_LOCAL_NAME,
117 1.13 plunky 7, 0x02, 0 },
118 1.13 plunky { HCI_CMD_READ_CON_ACCEPT_TIMEOUT,
119 1.13 plunky 7, 0x04, 0 },
120 1.13 plunky { HCI_CMD_READ_PAGE_TIMEOUT,
121 1.13 plunky 7, 0x10, 0 },
122 1.13 plunky { HCI_CMD_READ_SCAN_ENABLE,
123 1.13 plunky 7, 0x40, 0 },
124 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_ACTIVITY,
125 1.13 plunky 8, 0x01, 0 },
126 1.13 plunky { HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY,
127 1.13 plunky 8, 0x04, 0 },
128 1.13 plunky { HCI_CMD_READ_AUTH_ENABLE,
129 1.13 plunky 8, 0x10, 0 },
130 1.13 plunky { HCI_CMD_READ_ENCRYPTION_MODE,
131 1.13 plunky 8, 0x40, 0 },
132 1.13 plunky { HCI_CMD_READ_UNIT_CLASS,
133 1.13 plunky 9, 0x01, 0 },
134 1.13 plunky { HCI_CMD_READ_VOICE_SETTING,
135 1.13 plunky 9, 0x04, 0 },
136 1.13 plunky { HCI_CMD_READ_AUTO_FLUSH_TIMEOUT,
137 1.13 plunky 9, 0x10, sizeof(hci_read_auto_flush_timeout_cp) },
138 1.13 plunky { HCI_CMD_READ_NUM_BROADCAST_RETRANS,
139 1.13 plunky 9, 0x40, 0 },
140 1.13 plunky { HCI_CMD_READ_HOLD_MODE_ACTIVITY,
141 1.13 plunky 10, 0x01, 0 },
142 1.13 plunky { HCI_CMD_READ_XMIT_LEVEL,
143 1.13 plunky 10, 0x04, sizeof(hci_read_xmit_level_cp) },
144 1.13 plunky { HCI_CMD_READ_SCO_FLOW_CONTROL,
145 1.13 plunky 10, 0x08, 0 },
146 1.13 plunky { HCI_CMD_READ_LINK_SUPERVISION_TIMEOUT,
147 1.13 plunky 11, 0x01, sizeof(hci_read_link_supervision_timeout_cp) },
148 1.13 plunky { HCI_CMD_READ_NUM_SUPPORTED_IAC,
149 1.13 plunky 11, 0x04, 0 },
150 1.13 plunky { HCI_CMD_READ_IAC_LAP,
151 1.13 plunky 11, 0x08, 0 },
152 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_PERIOD,
153 1.13 plunky 11, 0x20, 0 },
154 1.13 plunky { HCI_CMD_READ_PAGE_SCAN,
155 1.13 plunky 11, 0x80, 0 },
156 1.13 plunky { HCI_CMD_READ_INQUIRY_SCAN_TYPE,
157 1.13 plunky 12, 0x10, 0 },
158 1.13 plunky { HCI_CMD_READ_INQUIRY_MODE,
159 1.13 plunky 12, 0x40, 0 },
160 1.13 plunky { HCI_CMD_READ_PAGE_SCAN_TYPE,
161 1.13 plunky 13, 0x01, 0 },
162 1.13 plunky { HCI_CMD_READ_AFH_ASSESSMENT,
163 1.13 plunky 13, 0x04, 0 },
164 1.13 plunky { HCI_CMD_READ_LOCAL_VER,
165 1.13 plunky 14, 0x08, 0 },
166 1.13 plunky { HCI_CMD_READ_LOCAL_COMMANDS,
167 1.13 plunky 14, 0x10, 0 },
168 1.13 plunky { HCI_CMD_READ_LOCAL_FEATURES,
169 1.13 plunky 14, 0x20, 0 },
170 1.13 plunky { HCI_CMD_READ_LOCAL_EXTENDED_FEATURES,
171 1.13 plunky 14, 0x40, sizeof(hci_read_local_extended_features_cp) },
172 1.13 plunky { HCI_CMD_READ_BUFFER_SIZE,
173 1.13 plunky 14, 0x80, 0 },
174 1.13 plunky { HCI_CMD_READ_COUNTRY_CODE,
175 1.13 plunky 15, 0x01, 0 },
176 1.13 plunky { HCI_CMD_READ_BDADDR,
177 1.13 plunky 15, 0x02, 0 },
178 1.13 plunky { HCI_CMD_READ_FAILED_CONTACT_CNTR,
179 1.13 plunky 15, 0x04, sizeof(hci_read_failed_contact_cntr_cp) },
180 1.13 plunky { HCI_CMD_READ_LINK_QUALITY,
181 1.13 plunky 15, 0x10, sizeof(hci_read_link_quality_cp) },
182 1.13 plunky { HCI_CMD_READ_RSSI,
183 1.13 plunky 15, 0x20, sizeof(hci_read_rssi_cp) },
184 1.13 plunky { HCI_CMD_READ_AFH_CHANNEL_MAP,
185 1.13 plunky 15, 0x40, sizeof(hci_read_afh_channel_map_cp) },
186 1.13 plunky { HCI_CMD_READ_CLOCK,
187 1.13 plunky 15, 0x80, sizeof(hci_read_clock_cp) },
188 1.13 plunky { HCI_CMD_READ_LOOPBACK_MODE,
189 1.13 plunky 16, 0x01, 0 },
190 1.14 plunky { HCI_CMD_READ_EXTENDED_INQUIRY_RSP,
191 1.14 plunky 17, 0x01, 0 },
192 1.14 plunky { HCI_CMD_READ_SIMPLE_PAIRING_MODE,
193 1.14 plunky 17, 0x20, 0 },
194 1.14 plunky { HCI_CMD_READ_INQUIRY_RSP_XMIT_POWER,
195 1.14 plunky 18, 0x01, 0 },
196 1.14 plunky { HCI_CMD_READ_DEFAULT_ERRDATA_REPORTING,
197 1.14 plunky 18, 0x04, 0 },
198 1.13 plunky };
199 1.13 plunky
200 1.1 gdamore /*
201 1.18 plunky * supply a basic device send/recv policy
202 1.1 gdamore */
203 1.4 plunky static int
204 1.18 plunky hci_device_cb(kauth_cred_t cred, kauth_action_t action, void *cookie,
205 1.18 plunky void *arg0, void *arg1, void *arg2, void *arg3)
206 1.1 gdamore {
207 1.18 plunky int i, result;
208 1.18 plunky
209 1.18 plunky result = KAUTH_RESULT_DEFER;
210 1.18 plunky
211 1.18 plunky switch (action) {
212 1.19 plunky case KAUTH_DEVICE_BLUETOOTH_SEND: {
213 1.18 plunky struct hci_unit *unit = (struct hci_unit *)arg0;
214 1.18 plunky hci_cmd_hdr_t *hdr = (hci_cmd_hdr_t *)arg1;
215 1.18 plunky
216 1.18 plunky /*
217 1.18 plunky * Allow sending unprivileged commands if the packet size
218 1.18 plunky * is correct and the unit claims to support it
219 1.18 plunky */
220 1.18 plunky
221 1.19 plunky if (hdr->type != HCI_CMD_PKT)
222 1.19 plunky break;
223 1.19 plunky
224 1.18 plunky for (i = 0; i < __arraycount(hci_cmds); i++) {
225 1.18 plunky if (hdr->opcode == hci_cmds[i].opcode
226 1.18 plunky && hdr->length == hci_cmds[i].length
227 1.18 plunky && (unit->hci_cmds[hci_cmds[i].offs] & hci_cmds[i].mask)) {
228 1.18 plunky result = KAUTH_RESULT_ALLOW;
229 1.18 plunky break;
230 1.18 plunky }
231 1.18 plunky }
232 1.18 plunky
233 1.18 plunky break;
234 1.18 plunky }
235 1.18 plunky
236 1.19 plunky case KAUTH_DEVICE_BLUETOOTH_RECV:
237 1.19 plunky switch((uint8_t)(uintptr_t)arg0) {
238 1.19 plunky case HCI_CMD_PKT: {
239 1.19 plunky uint16_t opcode = (uint16_t)(uintptr_t)arg1;
240 1.19 plunky
241 1.19 plunky /*
242 1.19 plunky * Allow to see any unprivileged command packet
243 1.19 plunky */
244 1.19 plunky
245 1.19 plunky for (i = 0; i < __arraycount(hci_cmds); i++) {
246 1.19 plunky if (opcode == hci_cmds[i].opcode) {
247 1.19 plunky result = KAUTH_RESULT_ALLOW;
248 1.19 plunky break;
249 1.19 plunky }
250 1.19 plunky }
251 1.19 plunky
252 1.19 plunky break;
253 1.19 plunky }
254 1.19 plunky
255 1.19 plunky case HCI_EVENT_PKT: {
256 1.19 plunky uint8_t event = (uint8_t)(uintptr_t)arg1;
257 1.18 plunky
258 1.19 plunky /*
259 1.19 plunky * Allow to receive most events
260 1.19 plunky */
261 1.19 plunky
262 1.19 plunky switch (event) {
263 1.19 plunky case HCI_EVENT_RETURN_LINK_KEYS:
264 1.19 plunky case HCI_EVENT_LINK_KEY_NOTIFICATION:
265 1.19 plunky case HCI_EVENT_USER_CONFIRM_REQ:
266 1.19 plunky case HCI_EVENT_USER_PASSKEY_NOTIFICATION:
267 1.19 plunky case HCI_EVENT_VENDOR:
268 1.19 plunky break;
269 1.18 plunky
270 1.19 plunky default:
271 1.18 plunky result = KAUTH_RESULT_ALLOW;
272 1.18 plunky break;
273 1.18 plunky }
274 1.18 plunky
275 1.19 plunky break;
276 1.19 plunky }
277 1.18 plunky
278 1.19 plunky case HCI_ACL_DATA_PKT:
279 1.19 plunky case HCI_SCO_DATA_PKT: {
280 1.19 plunky /* uint16_t handle = (uint16_t)(uintptr_t)arg1; */
281 1.19 plunky /*
282 1.19 plunky * don't normally allow receiving data packets
283 1.19 plunky */
284 1.18 plunky break;
285 1.19 plunky }
286 1.18 plunky
287 1.18 plunky default:
288 1.18 plunky break;
289 1.18 plunky }
290 1.13 plunky
291 1.18 plunky break;
292 1.18 plunky
293 1.18 plunky default:
294 1.13 plunky break;
295 1.4 plunky }
296 1.1 gdamore
297 1.18 plunky return result;
298 1.1 gdamore }
299 1.1 gdamore
300 1.18 plunky /*
301 1.18 plunky * HCI protocol init routine,
302 1.18 plunky * - set up a kauth listener to provide basic packet access policy
303 1.18 plunky */
304 1.18 plunky void
305 1.18 plunky hci_init(void)
306 1.1 gdamore {
307 1.1 gdamore
308 1.18 plunky if (kauth_listen_scope(KAUTH_SCOPE_DEVICE, hci_device_cb, NULL) == NULL)
309 1.18 plunky panic("Bluetooth HCI: cannot listen on device scope");
310 1.1 gdamore }
311 1.1 gdamore
312 1.1 gdamore /*
313 1.1 gdamore * When command packet reaches the device, we can drop
314 1.1 gdamore * it from the socket buffer (called from hci_output_acl)
315 1.1 gdamore */
316 1.1 gdamore void
317 1.1 gdamore hci_drop(void *arg)
318 1.1 gdamore {
319 1.1 gdamore struct socket *so = arg;
320 1.1 gdamore
321 1.1 gdamore sbdroprecord(&so->so_snd);
322 1.1 gdamore sowwakeup(so);
323 1.1 gdamore }
324 1.1 gdamore
325 1.1 gdamore /*
326 1.1 gdamore * HCI socket is going away and has some pending packets. We let them
327 1.1 gdamore * go by design, but remove the context pointer as it will be invalid
328 1.1 gdamore * and we no longer need to be notified.
329 1.1 gdamore */
330 1.1 gdamore static void
331 1.1 gdamore hci_cmdwait_flush(struct socket *so)
332 1.1 gdamore {
333 1.1 gdamore struct hci_unit *unit;
334 1.1 gdamore struct socket *ctx;
335 1.1 gdamore struct mbuf *m;
336 1.1 gdamore
337 1.1 gdamore DPRINTF("flushing %p\n", so);
338 1.1 gdamore
339 1.1 gdamore SIMPLEQ_FOREACH(unit, &hci_unit_list, hci_next) {
340 1.1 gdamore m = MBUFQ_FIRST(&unit->hci_cmdwait);
341 1.1 gdamore while (m != NULL) {
342 1.1 gdamore ctx = M_GETCTX(m, struct socket *);
343 1.1 gdamore if (ctx == so)
344 1.1 gdamore M_SETCTX(m, NULL);
345 1.1 gdamore
346 1.1 gdamore m = MBUFQ_NEXT(m);
347 1.1 gdamore }
348 1.1 gdamore }
349 1.1 gdamore }
350 1.1 gdamore
351 1.20.14.1 tls static int
352 1.20.14.1 tls hci_attach(struct socket *so, int proto)
353 1.20.14.1 tls {
354 1.20.14.1 tls struct hci_pcb *pcb;
355 1.20.14.1 tls int error;
356 1.20.14.1 tls
357 1.20.14.1 tls KASSERT(so->so_pcb == NULL);
358 1.20.14.1 tls
359 1.20.14.1 tls if (so->so_lock == NULL) {
360 1.20.14.1 tls mutex_obj_hold(bt_lock);
361 1.20.14.1 tls so->so_lock = bt_lock;
362 1.20.14.1 tls solock(so);
363 1.20.14.1 tls }
364 1.20.14.1 tls KASSERT(solocked(so));
365 1.20.14.1 tls
366 1.20.14.1 tls error = soreserve(so, hci_sendspace, hci_recvspace);
367 1.20.14.1 tls if (error) {
368 1.20.14.1 tls return error;
369 1.20.14.1 tls }
370 1.20.14.1 tls
371 1.20.14.1 tls pcb = kmem_zalloc(sizeof(struct hci_pcb), KM_SLEEP);
372 1.20.14.1 tls pcb->hp_cred = kauth_cred_dup(curlwp->l_cred);
373 1.20.14.1 tls pcb->hp_socket = so;
374 1.20.14.1 tls
375 1.20.14.1 tls /*
376 1.20.14.1 tls * Set default user filter. By default, socket only passes
377 1.20.14.1 tls * Command_Complete and Command_Status Events.
378 1.20.14.1 tls */
379 1.20.14.1 tls hci_filter_set(HCI_EVENT_COMMAND_COMPL, &pcb->hp_efilter);
380 1.20.14.1 tls hci_filter_set(HCI_EVENT_COMMAND_STATUS, &pcb->hp_efilter);
381 1.20.14.1 tls hci_filter_set(HCI_EVENT_PKT, &pcb->hp_pfilter);
382 1.20.14.1 tls
383 1.20.14.1 tls LIST_INSERT_HEAD(&hci_pcb, pcb, hp_next);
384 1.20.14.1 tls so->so_pcb = pcb;
385 1.20.14.1 tls
386 1.20.14.1 tls return 0;
387 1.20.14.1 tls }
388 1.20.14.1 tls
389 1.20.14.1 tls static void
390 1.20.14.1 tls hci_detach(struct socket *so)
391 1.20.14.1 tls {
392 1.20.14.1 tls struct hci_pcb *pcb;
393 1.20.14.1 tls
394 1.20.14.1 tls pcb = (struct hci_pcb *)so->so_pcb;
395 1.20.14.1 tls KASSERT(pcb != NULL);
396 1.20.14.1 tls
397 1.20.14.1 tls if (so->so_snd.sb_mb != NULL)
398 1.20.14.1 tls hci_cmdwait_flush(so);
399 1.20.14.1 tls
400 1.20.14.1 tls if (pcb->hp_cred != NULL)
401 1.20.14.1 tls kauth_cred_free(pcb->hp_cred);
402 1.20.14.1 tls
403 1.20.14.1 tls so->so_pcb = NULL;
404 1.20.14.1 tls LIST_REMOVE(pcb, hp_next);
405 1.20.14.1 tls kmem_free(pcb, sizeof(*pcb));
406 1.20.14.1 tls }
407 1.20.14.1 tls
408 1.20.14.1 tls static int
409 1.20.14.2 jdolecek hci_accept(struct socket *so, struct sockaddr *nam)
410 1.20.14.1 tls {
411 1.20.14.1 tls KASSERT(solocked(so));
412 1.20.14.1 tls
413 1.20.14.1 tls return EOPNOTSUPP;
414 1.20.14.1 tls }
415 1.20.14.1 tls
416 1.20.14.1 tls static int
417 1.20.14.2 jdolecek hci_bind(struct socket *so, struct sockaddr *nam, struct lwp *l)
418 1.1 gdamore {
419 1.20.14.1 tls struct hci_pcb *pcb = so->so_pcb;
420 1.20.14.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
421 1.1 gdamore
422 1.20.14.1 tls KASSERT(solocked(so));
423 1.20.14.1 tls KASSERT(pcb != NULL);
424 1.20.14.1 tls KASSERT(nam != NULL);
425 1.1 gdamore
426 1.20.14.1 tls if (sa->bt_len != sizeof(struct sockaddr_bt))
427 1.20.14.1 tls return EINVAL;
428 1.1 gdamore
429 1.20.14.1 tls if (sa->bt_family != AF_BLUETOOTH)
430 1.20.14.1 tls return EAFNOSUPPORT;
431 1.4 plunky
432 1.20.14.1 tls bdaddr_copy(&pcb->hp_laddr, &sa->bt_bdaddr);
433 1.1 gdamore
434 1.20.14.1 tls if (bdaddr_any(&sa->bt_bdaddr))
435 1.20.14.1 tls pcb->hp_flags |= HCI_PROMISCUOUS;
436 1.20.14.1 tls else
437 1.20.14.1 tls pcb->hp_flags &= ~HCI_PROMISCUOUS;
438 1.1 gdamore
439 1.20.14.1 tls return 0;
440 1.20.14.1 tls }
441 1.1 gdamore
442 1.20.14.1 tls static int
443 1.20.14.1 tls hci_listen(struct socket *so, struct lwp *l)
444 1.20.14.1 tls {
445 1.20.14.1 tls KASSERT(solocked(so));
446 1.1 gdamore
447 1.20.14.1 tls return EOPNOTSUPP;
448 1.20.14.1 tls }
449 1.1 gdamore
450 1.20.14.1 tls static int
451 1.20.14.2 jdolecek hci_connect(struct socket *so, struct sockaddr *nam, struct lwp *l)
452 1.20.14.1 tls {
453 1.20.14.1 tls struct hci_pcb *pcb = so->so_pcb;
454 1.20.14.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
455 1.1 gdamore
456 1.20.14.1 tls KASSERT(solocked(so));
457 1.20.14.1 tls KASSERT(pcb != NULL);
458 1.20.14.1 tls KASSERT(nam != NULL);
459 1.1 gdamore
460 1.20.14.1 tls if (sa->bt_len != sizeof(struct sockaddr_bt))
461 1.20.14.1 tls return EINVAL;
462 1.1 gdamore
463 1.20.14.1 tls if (sa->bt_family != AF_BLUETOOTH)
464 1.20.14.1 tls return EAFNOSUPPORT;
465 1.1 gdamore
466 1.20.14.1 tls if (hci_unit_lookup(&sa->bt_bdaddr) == NULL)
467 1.20.14.1 tls return EADDRNOTAVAIL;
468 1.1 gdamore
469 1.20.14.1 tls bdaddr_copy(&pcb->hp_raddr, &sa->bt_bdaddr);
470 1.20.14.1 tls soisconnected(so);
471 1.20.14.1 tls return 0;
472 1.20.14.1 tls }
473 1.1 gdamore
474 1.20.14.1 tls static int
475 1.20.14.1 tls hci_connect2(struct socket *so, struct socket *so2)
476 1.20.14.1 tls {
477 1.20.14.1 tls KASSERT(solocked(so));
478 1.1 gdamore
479 1.20.14.1 tls return EOPNOTSUPP;
480 1.20.14.1 tls }
481 1.1 gdamore
482 1.20.14.1 tls static int
483 1.20.14.1 tls hci_disconnect(struct socket *so)
484 1.20.14.1 tls {
485 1.20.14.1 tls struct hci_pcb *pcb = so->so_pcb;
486 1.1 gdamore
487 1.20.14.1 tls KASSERT(solocked(so));
488 1.20.14.1 tls KASSERT(pcb != NULL);
489 1.1 gdamore
490 1.20.14.1 tls bdaddr_copy(&pcb->hp_raddr, BDADDR_ANY);
491 1.1 gdamore
492 1.20.14.1 tls /* XXX we cannot call soisdisconnected() here, as it sets
493 1.20.14.1 tls * SS_CANTRCVMORE and SS_CANTSENDMORE. The problem being,
494 1.20.14.1 tls * that soisconnected() does not clear these and if you
495 1.20.14.1 tls * try to reconnect this socket (which is permitted) you
496 1.20.14.1 tls * get a broken pipe when you try to write any data.
497 1.20.14.1 tls */
498 1.20.14.1 tls so->so_state &= ~SS_ISCONNECTED;
499 1.20.14.1 tls return 0;
500 1.20.14.1 tls }
501 1.1 gdamore
502 1.20.14.1 tls static int
503 1.20.14.1 tls hci_shutdown(struct socket *so)
504 1.20.14.1 tls {
505 1.20.14.1 tls KASSERT(solocked(so));
506 1.1 gdamore
507 1.20.14.1 tls socantsendmore(so);
508 1.20.14.1 tls return 0;
509 1.20.14.1 tls }
510 1.1 gdamore
511 1.20.14.1 tls static int
512 1.20.14.1 tls hci_abort(struct socket *so)
513 1.20.14.1 tls {
514 1.20.14.1 tls KASSERT(solocked(so));
515 1.1 gdamore
516 1.20.14.1 tls soisdisconnected(so);
517 1.20.14.1 tls hci_detach(so);
518 1.20.14.1 tls return 0;
519 1.20.14.1 tls }
520 1.1 gdamore
521 1.20.14.1 tls static int
522 1.20.14.1 tls hci_ioctl(struct socket *so, u_long cmd, void *nam, struct ifnet *ifp)
523 1.20.14.1 tls {
524 1.20.14.1 tls int err;
525 1.20.14.1 tls mutex_enter(bt_lock);
526 1.20.14.1 tls err = hci_ioctl_pcb(cmd, nam);
527 1.20.14.1 tls mutex_exit(bt_lock);
528 1.20.14.1 tls return err;
529 1.20.14.1 tls }
530 1.1 gdamore
531 1.20.14.1 tls static int
532 1.20.14.1 tls hci_stat(struct socket *so, struct stat *ub)
533 1.20.14.1 tls {
534 1.20.14.1 tls KASSERT(solocked(so));
535 1.1 gdamore
536 1.20.14.1 tls return 0;
537 1.20.14.1 tls }
538 1.1 gdamore
539 1.20.14.1 tls static int
540 1.20.14.2 jdolecek hci_peeraddr(struct socket *so, struct sockaddr *nam)
541 1.20.14.1 tls {
542 1.20.14.1 tls struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
543 1.20.14.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
544 1.1 gdamore
545 1.20.14.1 tls KASSERT(solocked(so));
546 1.20.14.1 tls KASSERT(pcb != NULL);
547 1.20.14.1 tls KASSERT(nam != NULL);
548 1.20.14.1 tls
549 1.20.14.1 tls memset(sa, 0, sizeof(struct sockaddr_bt));
550 1.20.14.1 tls sa->bt_len = sizeof(struct sockaddr_bt);
551 1.20.14.1 tls sa->bt_family = AF_BLUETOOTH;
552 1.20.14.1 tls bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_raddr);
553 1.20.14.1 tls return 0;
554 1.20.14.1 tls }
555 1.20.14.1 tls
556 1.20.14.1 tls static int
557 1.20.14.2 jdolecek hci_sockaddr(struct socket *so, struct sockaddr *nam)
558 1.20.14.1 tls {
559 1.20.14.1 tls struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
560 1.20.14.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
561 1.20.14.1 tls
562 1.20.14.1 tls KASSERT(solocked(so));
563 1.20.14.1 tls KASSERT(pcb != NULL);
564 1.20.14.1 tls KASSERT(nam != NULL);
565 1.20.14.1 tls
566 1.20.14.1 tls memset(sa, 0, sizeof(struct sockaddr_bt));
567 1.20.14.1 tls sa->bt_len = sizeof(struct sockaddr_bt);
568 1.20.14.1 tls sa->bt_family = AF_BLUETOOTH;
569 1.20.14.1 tls bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_laddr);
570 1.20.14.1 tls return 0;
571 1.20.14.1 tls }
572 1.20.14.1 tls
573 1.20.14.1 tls static int
574 1.20.14.1 tls hci_rcvd(struct socket *so, int flags, struct lwp *l)
575 1.20.14.1 tls {
576 1.20.14.1 tls KASSERT(solocked(so));
577 1.20.14.1 tls
578 1.20.14.1 tls return EOPNOTSUPP;
579 1.20.14.1 tls }
580 1.20.14.1 tls
581 1.20.14.1 tls static int
582 1.20.14.1 tls hci_recvoob(struct socket *so, struct mbuf *m, int flags)
583 1.20.14.1 tls {
584 1.20.14.1 tls KASSERT(solocked(so));
585 1.20.14.1 tls
586 1.20.14.1 tls return EOPNOTSUPP;
587 1.20.14.1 tls }
588 1.20.14.1 tls
589 1.20.14.1 tls static int
590 1.20.14.2 jdolecek hci_send(struct socket *so, struct mbuf *m, struct sockaddr *nam,
591 1.20.14.1 tls struct mbuf *control, struct lwp *l)
592 1.20.14.1 tls {
593 1.20.14.1 tls struct hci_pcb *pcb = so->so_pcb;
594 1.20.14.2 jdolecek struct sockaddr_bt *sa = (struct sockaddr_bt *)nam;
595 1.20.14.2 jdolecek struct hci_unit *unit;
596 1.20.14.2 jdolecek struct mbuf *m0;
597 1.20.14.2 jdolecek hci_cmd_hdr_t hdr;
598 1.20.14.1 tls int err = 0;
599 1.20.14.1 tls
600 1.20.14.1 tls KASSERT(solocked(so));
601 1.20.14.1 tls KASSERT(pcb != NULL);
602 1.20.14.2 jdolecek KASSERT(m != NULL);
603 1.20.14.1 tls
604 1.20.14.1 tls if (control) /* have no use for this */
605 1.20.14.1 tls m_freem(control);
606 1.20.14.1 tls
607 1.20.14.2 jdolecek if (sa) {
608 1.20.14.1 tls if (sa->bt_len != sizeof(struct sockaddr_bt)) {
609 1.20.14.1 tls err = EINVAL;
610 1.20.14.2 jdolecek goto bad;
611 1.20.14.1 tls }
612 1.20.14.1 tls
613 1.20.14.1 tls if (sa->bt_family != AF_BLUETOOTH) {
614 1.20.14.1 tls err = EAFNOSUPPORT;
615 1.20.14.2 jdolecek goto bad;
616 1.1 gdamore }
617 1.20.14.1 tls }
618 1.20.14.1 tls
619 1.20.14.2 jdolecek /*
620 1.20.14.2 jdolecek * this came from userland, so we check it out first
621 1.20.14.2 jdolecek */
622 1.20.14.1 tls
623 1.20.14.2 jdolecek /* wants at least a header to start with */
624 1.20.14.2 jdolecek if (m->m_pkthdr.len < sizeof(hdr)) {
625 1.20.14.2 jdolecek err = EMSGSIZE;
626 1.20.14.2 jdolecek goto bad;
627 1.20.14.2 jdolecek }
628 1.20.14.2 jdolecek m_copydata(m, 0, sizeof(hdr), &hdr);
629 1.20.14.2 jdolecek hdr.opcode = le16toh(hdr.opcode);
630 1.20.14.2 jdolecek
631 1.20.14.2 jdolecek /* only allows CMD packets to be sent */
632 1.20.14.2 jdolecek if (hdr.type != HCI_CMD_PKT) {
633 1.20.14.2 jdolecek err = EINVAL;
634 1.20.14.2 jdolecek goto bad;
635 1.20.14.2 jdolecek }
636 1.20.14.2 jdolecek
637 1.20.14.2 jdolecek /* validates packet length */
638 1.20.14.2 jdolecek if (m->m_pkthdr.len != sizeof(hdr) + hdr.length) {
639 1.20.14.2 jdolecek err = EMSGSIZE;
640 1.20.14.2 jdolecek goto bad;
641 1.20.14.2 jdolecek }
642 1.20.14.2 jdolecek
643 1.20.14.2 jdolecek /* finds destination */
644 1.20.14.2 jdolecek unit = hci_unit_lookup((sa ? &sa->bt_bdaddr : &pcb->hp_raddr));
645 1.20.14.2 jdolecek if (unit == NULL) {
646 1.20.14.2 jdolecek err = ENETDOWN;
647 1.20.14.2 jdolecek goto bad;
648 1.20.14.2 jdolecek }
649 1.20.14.2 jdolecek
650 1.20.14.2 jdolecek /* security checks for unprivileged users */
651 1.20.14.2 jdolecek if (pcb->hp_cred != NULL
652 1.20.14.2 jdolecek && kauth_authorize_device(pcb->hp_cred,
653 1.20.14.2 jdolecek KAUTH_DEVICE_BLUETOOTH_SEND,
654 1.20.14.2 jdolecek unit, &hdr, NULL, NULL) != 0) {
655 1.20.14.2 jdolecek err = EPERM;
656 1.20.14.2 jdolecek goto bad;
657 1.20.14.2 jdolecek }
658 1.20.14.2 jdolecek
659 1.20.14.2 jdolecek /* makess a copy for precious to keep */
660 1.20.14.2 jdolecek m0 = m_copypacket(m, M_DONTWAIT);
661 1.20.14.2 jdolecek if (m0 == NULL) {
662 1.20.14.2 jdolecek err = ENOMEM;
663 1.20.14.2 jdolecek goto bad;
664 1.20.14.2 jdolecek }
665 1.20.14.2 jdolecek sbappendrecord(&pcb->hp_socket->so_snd, m0);
666 1.20.14.2 jdolecek M_SETCTX(m, pcb->hp_socket); /* enable drop callback */
667 1.20.14.2 jdolecek
668 1.20.14.2 jdolecek DPRINTFN(2, "(%s) opcode (%03x|%04x)\n", device_xname(unit->hci_dev),
669 1.20.14.2 jdolecek HCI_OGF(hdr.opcode), HCI_OCF(hdr.opcode));
670 1.20.14.2 jdolecek
671 1.20.14.2 jdolecek /* Sendss it */
672 1.20.14.2 jdolecek if (unit->hci_num_cmd_pkts == 0)
673 1.20.14.2 jdolecek MBUFQ_ENQUEUE(&unit->hci_cmdwait, m);
674 1.20.14.2 jdolecek else
675 1.20.14.2 jdolecek hci_output_cmd(unit, m);
676 1.20.14.2 jdolecek
677 1.20.14.2 jdolecek return 0;
678 1.20.14.2 jdolecek
679 1.20.14.2 jdolecek bad:
680 1.20.14.2 jdolecek DPRINTF("packet (%d bytes) not sent (error %d)\n",
681 1.20.14.2 jdolecek m->m_pkthdr.len, err);
682 1.20.14.1 tls if (m)
683 1.20.14.1 tls m_freem(m);
684 1.20.14.1 tls
685 1.20.14.1 tls return err;
686 1.20.14.1 tls }
687 1.20.14.1 tls
688 1.20.14.1 tls static int
689 1.20.14.1 tls hci_sendoob(struct socket *so, struct mbuf *m, struct mbuf *control)
690 1.20.14.1 tls {
691 1.20.14.1 tls KASSERT(solocked(so));
692 1.20.14.1 tls
693 1.20.14.1 tls if (m)
694 1.20.14.1 tls m_freem(m);
695 1.20.14.1 tls if (control)
696 1.20.14.1 tls m_freem(control);
697 1.20.14.1 tls
698 1.20.14.1 tls return EOPNOTSUPP;
699 1.20.14.1 tls }
700 1.20.14.1 tls
701 1.20.14.1 tls static int
702 1.20.14.1 tls hci_purgeif(struct socket *so, struct ifnet *ifp)
703 1.20.14.1 tls {
704 1.20.14.1 tls
705 1.20.14.1 tls return EOPNOTSUPP;
706 1.20.14.1 tls }
707 1.1 gdamore
708 1.20.14.1 tls /*
709 1.1 gdamore * get/set socket options
710 1.1 gdamore */
711 1.1 gdamore int
712 1.17 plunky hci_ctloutput(int req, struct socket *so, struct sockopt *sopt)
713 1.1 gdamore {
714 1.1 gdamore struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
715 1.17 plunky int optval, err = 0;
716 1.1 gdamore
717 1.1 gdamore DPRINTFN(2, "req %s\n", prcorequests[req]);
718 1.1 gdamore
719 1.1 gdamore if (pcb == NULL)
720 1.1 gdamore return EINVAL;
721 1.1 gdamore
722 1.17 plunky if (sopt->sopt_level != BTPROTO_HCI)
723 1.7 plunky return ENOPROTOOPT;
724 1.1 gdamore
725 1.1 gdamore switch(req) {
726 1.1 gdamore case PRCO_GETOPT:
727 1.17 plunky switch (sopt->sopt_name) {
728 1.1 gdamore case SO_HCI_EVT_FILTER:
729 1.17 plunky err = sockopt_set(sopt, &pcb->hp_efilter,
730 1.17 plunky sizeof(struct hci_filter));
731 1.17 plunky
732 1.1 gdamore break;
733 1.1 gdamore
734 1.1 gdamore case SO_HCI_PKT_FILTER:
735 1.17 plunky err = sockopt_set(sopt, &pcb->hp_pfilter,
736 1.17 plunky sizeof(struct hci_filter));
737 1.17 plunky
738 1.1 gdamore break;
739 1.1 gdamore
740 1.1 gdamore case SO_HCI_DIRECTION:
741 1.17 plunky err = sockopt_setint(sopt,
742 1.17 plunky (pcb->hp_flags & HCI_DIRECTION ? 1 : 0));
743 1.17 plunky
744 1.1 gdamore break;
745 1.1 gdamore
746 1.1 gdamore default:
747 1.7 plunky err = ENOPROTOOPT;
748 1.1 gdamore break;
749 1.1 gdamore }
750 1.1 gdamore break;
751 1.1 gdamore
752 1.1 gdamore case PRCO_SETOPT:
753 1.17 plunky switch (sopt->sopt_name) {
754 1.1 gdamore case SO_HCI_EVT_FILTER: /* set event filter */
755 1.17 plunky err = sockopt_get(sopt, &pcb->hp_efilter,
756 1.17 plunky sizeof(pcb->hp_efilter));
757 1.17 plunky
758 1.1 gdamore break;
759 1.1 gdamore
760 1.1 gdamore case SO_HCI_PKT_FILTER: /* set packet filter */
761 1.17 plunky err = sockopt_get(sopt, &pcb->hp_pfilter,
762 1.17 plunky sizeof(pcb->hp_pfilter));
763 1.17 plunky
764 1.1 gdamore break;
765 1.1 gdamore
766 1.1 gdamore case SO_HCI_DIRECTION: /* request direction ctl messages */
767 1.17 plunky err = sockopt_getint(sopt, &optval);
768 1.17 plunky if (err)
769 1.17 plunky break;
770 1.17 plunky
771 1.17 plunky if (optval)
772 1.1 gdamore pcb->hp_flags |= HCI_DIRECTION;
773 1.1 gdamore else
774 1.1 gdamore pcb->hp_flags &= ~HCI_DIRECTION;
775 1.1 gdamore break;
776 1.1 gdamore
777 1.1 gdamore default:
778 1.7 plunky err = ENOPROTOOPT;
779 1.1 gdamore break;
780 1.1 gdamore }
781 1.1 gdamore break;
782 1.1 gdamore
783 1.1 gdamore default:
784 1.7 plunky err = ENOPROTOOPT;
785 1.1 gdamore break;
786 1.1 gdamore }
787 1.1 gdamore
788 1.1 gdamore return err;
789 1.1 gdamore }
790 1.1 gdamore
791 1.1 gdamore /*
792 1.1 gdamore * HCI mbuf tap routine
793 1.1 gdamore *
794 1.1 gdamore * copy packets to any raw HCI sockets that wish (and are
795 1.1 gdamore * permitted) to see them
796 1.1 gdamore */
797 1.1 gdamore void
798 1.1 gdamore hci_mtap(struct mbuf *m, struct hci_unit *unit)
799 1.1 gdamore {
800 1.1 gdamore struct hci_pcb *pcb;
801 1.1 gdamore struct mbuf *m0, *ctlmsg, **ctl;
802 1.1 gdamore struct sockaddr_bt sa;
803 1.1 gdamore uint8_t type;
804 1.1 gdamore uint8_t event;
805 1.19 plunky uint16_t arg1;
806 1.1 gdamore
807 1.1 gdamore KASSERT(m->m_len >= sizeof(type));
808 1.1 gdamore
809 1.1 gdamore type = *mtod(m, uint8_t *);
810 1.1 gdamore
811 1.1 gdamore memset(&sa, 0, sizeof(sa));
812 1.1 gdamore sa.bt_len = sizeof(struct sockaddr_bt);
813 1.1 gdamore sa.bt_family = AF_BLUETOOTH;
814 1.1 gdamore bdaddr_copy(&sa.bt_bdaddr, &unit->hci_bdaddr);
815 1.1 gdamore
816 1.1 gdamore LIST_FOREACH(pcb, &hci_pcb, hp_next) {
817 1.1 gdamore /*
818 1.1 gdamore * filter according to source address
819 1.1 gdamore */
820 1.1 gdamore if ((pcb->hp_flags & HCI_PROMISCUOUS) == 0
821 1.1 gdamore && bdaddr_same(&pcb->hp_laddr, &sa.bt_bdaddr) == 0)
822 1.1 gdamore continue;
823 1.1 gdamore
824 1.1 gdamore /*
825 1.1 gdamore * filter according to packet type filter
826 1.1 gdamore */
827 1.1 gdamore if (hci_filter_test(type, &pcb->hp_pfilter) == 0)
828 1.1 gdamore continue;
829 1.1 gdamore
830 1.1 gdamore /*
831 1.1 gdamore * filter according to event/security filters
832 1.1 gdamore */
833 1.1 gdamore switch(type) {
834 1.1 gdamore case HCI_EVENT_PKT:
835 1.1 gdamore KASSERT(m->m_len >= sizeof(hci_event_hdr_t));
836 1.1 gdamore
837 1.1 gdamore event = mtod(m, hci_event_hdr_t *)->event;
838 1.1 gdamore
839 1.1 gdamore if (hci_filter_test(event, &pcb->hp_efilter) == 0)
840 1.1 gdamore continue;
841 1.1 gdamore
842 1.19 plunky arg1 = event;
843 1.1 gdamore break;
844 1.1 gdamore
845 1.1 gdamore case HCI_CMD_PKT:
846 1.1 gdamore KASSERT(m->m_len >= sizeof(hci_cmd_hdr_t));
847 1.19 plunky arg1 = le16toh(mtod(m, hci_cmd_hdr_t *)->opcode);
848 1.19 plunky break;
849 1.1 gdamore
850 1.19 plunky case HCI_ACL_DATA_PKT:
851 1.19 plunky KASSERT(m->m_len >= sizeof(hci_acldata_hdr_t));
852 1.19 plunky arg1 = le16toh(mtod(m, hci_acldata_hdr_t *)->con_handle);
853 1.19 plunky arg1 = HCI_CON_HANDLE(arg1);
854 1.19 plunky break;
855 1.18 plunky
856 1.19 plunky case HCI_SCO_DATA_PKT:
857 1.19 plunky KASSERT(m->m_len >= sizeof(hci_scodata_hdr_t));
858 1.19 plunky arg1 = le16toh(mtod(m, hci_scodata_hdr_t *)->con_handle);
859 1.19 plunky arg1 = HCI_CON_HANDLE(arg1);
860 1.1 gdamore break;
861 1.1 gdamore
862 1.1 gdamore default:
863 1.19 plunky arg1 = 0;
864 1.1 gdamore break;
865 1.1 gdamore }
866 1.1 gdamore
867 1.19 plunky if (pcb->hp_cred != NULL
868 1.19 plunky && kauth_authorize_device(pcb->hp_cred,
869 1.19 plunky KAUTH_DEVICE_BLUETOOTH_RECV,
870 1.19 plunky KAUTH_ARG(type), KAUTH_ARG(arg1), NULL, NULL) != 0)
871 1.19 plunky continue;
872 1.19 plunky
873 1.1 gdamore /*
874 1.1 gdamore * create control messages
875 1.1 gdamore */
876 1.1 gdamore ctlmsg = NULL;
877 1.1 gdamore ctl = &ctlmsg;
878 1.1 gdamore if (pcb->hp_flags & HCI_DIRECTION) {
879 1.1 gdamore int dir = m->m_flags & M_LINK0 ? 1 : 0;
880 1.1 gdamore
881 1.11 plunky *ctl = sbcreatecontrol(&dir, sizeof(dir),
882 1.1 gdamore SCM_HCI_DIRECTION, BTPROTO_HCI);
883 1.1 gdamore
884 1.1 gdamore if (*ctl != NULL)
885 1.1 gdamore ctl = &((*ctl)->m_next);
886 1.1 gdamore }
887 1.20 plunky if (pcb->hp_socket->so_options & SO_TIMESTAMP) {
888 1.20 plunky struct timeval tv;
889 1.20 plunky
890 1.20 plunky microtime(&tv);
891 1.20 plunky *ctl = sbcreatecontrol(&tv, sizeof(tv),
892 1.20 plunky SCM_TIMESTAMP, SOL_SOCKET);
893 1.20 plunky
894 1.20 plunky if (*ctl != NULL)
895 1.20 plunky ctl = &((*ctl)->m_next);
896 1.20 plunky }
897 1.1 gdamore
898 1.1 gdamore /*
899 1.1 gdamore * copy to socket
900 1.1 gdamore */
901 1.1 gdamore m0 = m_copypacket(m, M_DONTWAIT);
902 1.1 gdamore if (m0 && sbappendaddr(&pcb->hp_socket->so_rcv,
903 1.1 gdamore (struct sockaddr *)&sa, m0, ctlmsg)) {
904 1.1 gdamore sorwakeup(pcb->hp_socket);
905 1.1 gdamore } else {
906 1.1 gdamore m_freem(ctlmsg);
907 1.1 gdamore m_freem(m0);
908 1.1 gdamore }
909 1.1 gdamore }
910 1.1 gdamore }
911 1.20.14.1 tls
912 1.20.14.1 tls PR_WRAP_USRREQS(hci)
913 1.20.14.1 tls
914 1.20.14.1 tls #define hci_attach hci_attach_wrapper
915 1.20.14.1 tls #define hci_detach hci_detach_wrapper
916 1.20.14.1 tls #define hci_accept hci_accept_wrapper
917 1.20.14.1 tls #define hci_bind hci_bind_wrapper
918 1.20.14.1 tls #define hci_listen hci_listen_wrapper
919 1.20.14.1 tls #define hci_connect hci_connect_wrapper
920 1.20.14.1 tls #define hci_connect2 hci_connect2_wrapper
921 1.20.14.1 tls #define hci_disconnect hci_disconnect_wrapper
922 1.20.14.1 tls #define hci_shutdown hci_shutdown_wrapper
923 1.20.14.1 tls #define hci_abort hci_abort_wrapper
924 1.20.14.1 tls #define hci_ioctl hci_ioctl_wrapper
925 1.20.14.1 tls #define hci_stat hci_stat_wrapper
926 1.20.14.1 tls #define hci_peeraddr hci_peeraddr_wrapper
927 1.20.14.1 tls #define hci_sockaddr hci_sockaddr_wrapper
928 1.20.14.1 tls #define hci_rcvd hci_rcvd_wrapper
929 1.20.14.1 tls #define hci_recvoob hci_recvoob_wrapper
930 1.20.14.1 tls #define hci_send hci_send_wrapper
931 1.20.14.1 tls #define hci_sendoob hci_sendoob_wrapper
932 1.20.14.1 tls #define hci_purgeif hci_purgeif_wrapper
933 1.20.14.1 tls
934 1.20.14.1 tls const struct pr_usrreqs hci_usrreqs = {
935 1.20.14.1 tls .pr_attach = hci_attach,
936 1.20.14.1 tls .pr_detach = hci_detach,
937 1.20.14.1 tls .pr_accept = hci_accept,
938 1.20.14.1 tls .pr_bind = hci_bind,
939 1.20.14.1 tls .pr_listen = hci_listen,
940 1.20.14.1 tls .pr_connect = hci_connect,
941 1.20.14.1 tls .pr_connect2 = hci_connect2,
942 1.20.14.1 tls .pr_disconnect = hci_disconnect,
943 1.20.14.1 tls .pr_shutdown = hci_shutdown,
944 1.20.14.1 tls .pr_abort = hci_abort,
945 1.20.14.1 tls .pr_ioctl = hci_ioctl,
946 1.20.14.1 tls .pr_stat = hci_stat,
947 1.20.14.1 tls .pr_peeraddr = hci_peeraddr,
948 1.20.14.1 tls .pr_sockaddr = hci_sockaddr,
949 1.20.14.1 tls .pr_rcvd = hci_rcvd,
950 1.20.14.1 tls .pr_recvoob = hci_recvoob,
951 1.20.14.1 tls .pr_send = hci_send,
952 1.20.14.1 tls .pr_sendoob = hci_sendoob,
953 1.20.14.1 tls .pr_purgeif = hci_purgeif,
954 1.20.14.1 tls };
955