Home | History | Annotate | Line # | Download | only in netbt
hci_socket.c revision 1.3.4.2
      1  1.3.4.2  rpaulo /*	$NetBSD: hci_socket.c,v 1.3.4.2 2006/09/09 02:58:39 rpaulo Exp $	*/
      2  1.3.4.2  rpaulo 
      3  1.3.4.2  rpaulo /*-
      4  1.3.4.2  rpaulo  * Copyright (c) 2005 Iain Hibbert.
      5  1.3.4.2  rpaulo  * Copyright (c) 2006 Itronix Inc.
      6  1.3.4.2  rpaulo  * All rights reserved.
      7  1.3.4.2  rpaulo  *
      8  1.3.4.2  rpaulo  * Redistribution and use in source and binary forms, with or without
      9  1.3.4.2  rpaulo  * modification, are permitted provided that the following conditions
     10  1.3.4.2  rpaulo  * are met:
     11  1.3.4.2  rpaulo  * 1. Redistributions of source code must retain the above copyright
     12  1.3.4.2  rpaulo  *    notice, this list of conditions and the following disclaimer.
     13  1.3.4.2  rpaulo  * 2. Redistributions in binary form must reproduce the above copyright
     14  1.3.4.2  rpaulo  *    notice, this list of conditions and the following disclaimer in the
     15  1.3.4.2  rpaulo  *    documentation and/or other materials provided with the distribution.
     16  1.3.4.2  rpaulo  * 3. The name of Itronix Inc. may not be used to endorse
     17  1.3.4.2  rpaulo  *    or promote products derived from this software without specific
     18  1.3.4.2  rpaulo  *    prior written permission.
     19  1.3.4.2  rpaulo  *
     20  1.3.4.2  rpaulo  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     21  1.3.4.2  rpaulo  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  1.3.4.2  rpaulo  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  1.3.4.2  rpaulo  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     24  1.3.4.2  rpaulo  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     25  1.3.4.2  rpaulo  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  1.3.4.2  rpaulo  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     27  1.3.4.2  rpaulo  * ON ANY THEORY OF LIABILITY, WHETHER IN
     28  1.3.4.2  rpaulo  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  1.3.4.2  rpaulo  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  1.3.4.2  rpaulo  * POSSIBILITY OF SUCH DAMAGE.
     31  1.3.4.2  rpaulo  */
     32  1.3.4.2  rpaulo 
     33  1.3.4.2  rpaulo #include <sys/cdefs.h>
     34  1.3.4.2  rpaulo __KERNEL_RCSID(0, "$NetBSD: hci_socket.c,v 1.3.4.2 2006/09/09 02:58:39 rpaulo Exp $");
     35  1.3.4.2  rpaulo 
     36  1.3.4.2  rpaulo #include "opt_bluetooth.h"
     37  1.3.4.2  rpaulo #ifdef BLUETOOTH_DEBUG
     38  1.3.4.2  rpaulo #define PRCOREQUESTS
     39  1.3.4.2  rpaulo #endif
     40  1.3.4.2  rpaulo 
     41  1.3.4.2  rpaulo #include <sys/param.h>
     42  1.3.4.2  rpaulo #include <sys/domain.h>
     43  1.3.4.2  rpaulo #include <sys/kauth.h>
     44  1.3.4.2  rpaulo #include <sys/kernel.h>
     45  1.3.4.2  rpaulo #include <sys/mbuf.h>
     46  1.3.4.2  rpaulo #include <sys/proc.h>
     47  1.3.4.2  rpaulo #include <sys/protosw.h>
     48  1.3.4.2  rpaulo #include <sys/socket.h>
     49  1.3.4.2  rpaulo #include <sys/socketvar.h>
     50  1.3.4.2  rpaulo #include <sys/systm.h>
     51  1.3.4.2  rpaulo 
     52  1.3.4.2  rpaulo #include <netbt/bluetooth.h>
     53  1.3.4.2  rpaulo #include <netbt/hci.h>
     54  1.3.4.2  rpaulo 
     55  1.3.4.2  rpaulo /*******************************************************************************
     56  1.3.4.2  rpaulo  *
     57  1.3.4.2  rpaulo  * HCI SOCK_RAW Sockets - for control of Bluetooth Devices
     58  1.3.4.2  rpaulo  *
     59  1.3.4.2  rpaulo  */
     60  1.3.4.2  rpaulo 
     61  1.3.4.2  rpaulo /*
     62  1.3.4.2  rpaulo  * the raw HCI protocol control block
     63  1.3.4.2  rpaulo  */
     64  1.3.4.2  rpaulo struct hci_pcb {
     65  1.3.4.2  rpaulo 	struct socket		*hp_socket;	/* socket */
     66  1.3.4.2  rpaulo 	unsigned int		hp_flags;	/* flags */
     67  1.3.4.2  rpaulo 	bdaddr_t		hp_laddr;	/* local address */
     68  1.3.4.2  rpaulo 	bdaddr_t		hp_raddr;	/* remote address */
     69  1.3.4.2  rpaulo 	struct hci_filter	hp_efilter;	/* user event filter */
     70  1.3.4.2  rpaulo 	struct hci_filter	hp_pfilter;	/* user packet filter */
     71  1.3.4.2  rpaulo 	LIST_ENTRY(hci_pcb)	hp_next;	/* next HCI pcb */
     72  1.3.4.2  rpaulo };
     73  1.3.4.2  rpaulo 
     74  1.3.4.2  rpaulo /* hp_flags */
     75  1.3.4.2  rpaulo #define HCI_PRIVILEGED		(1<<0)	/* no security filter for root */
     76  1.3.4.2  rpaulo #define HCI_DIRECTION		(1<<1)	/* direction control messages */
     77  1.3.4.2  rpaulo #define HCI_PROMISCUOUS		(1<<2)	/* listen to all units */
     78  1.3.4.2  rpaulo 
     79  1.3.4.2  rpaulo LIST_HEAD(hci_pcb_list, hci_pcb) hci_pcb = LIST_HEAD_INITIALIZER(hci_pcb);
     80  1.3.4.2  rpaulo 
     81  1.3.4.2  rpaulo /* sysctl defaults */
     82  1.3.4.2  rpaulo int hci_sendspace = HCI_CMD_PKT_SIZE;
     83  1.3.4.2  rpaulo int hci_recvspace = 4096;
     84  1.3.4.2  rpaulo 
     85  1.3.4.2  rpaulo /*
     86  1.3.4.2  rpaulo  * Security filter routines
     87  1.3.4.2  rpaulo  *	The security mask is an bit array.
     88  1.3.4.2  rpaulo  *	If the bit is set, the opcode/event is permitted.
     89  1.3.4.2  rpaulo  *	I only allocate the security mask if needed, and give it back
     90  1.3.4.2  rpaulo  *      if requested as its quite a chunk. This could no doubt be made
     91  1.3.4.2  rpaulo  *	somewhat bit more memory efficient given that most OGF/OCF's are
     92  1.3.4.2  rpaulo  *	not used, but this way is quick.
     93  1.3.4.2  rpaulo  */
     94  1.3.4.2  rpaulo #define HCI_OPCODE_MASK_SIZE	0x800
     95  1.3.4.2  rpaulo 
     96  1.3.4.2  rpaulo uint32_t *hci_event_mask = NULL;
     97  1.3.4.2  rpaulo uint32_t *hci_opcode_mask = NULL;
     98  1.3.4.2  rpaulo 
     99  1.3.4.2  rpaulo static __inline int
    100  1.3.4.2  rpaulo hci_security_check_opcode(uint16_t opcode)
    101  1.3.4.2  rpaulo {
    102  1.3.4.2  rpaulo 
    103  1.3.4.2  rpaulo 	return (hci_opcode_mask[opcode >> 5] & (1 << (opcode & 0x1f)));
    104  1.3.4.2  rpaulo }
    105  1.3.4.2  rpaulo 
    106  1.3.4.2  rpaulo static __inline int
    107  1.3.4.2  rpaulo hci_security_check_event(uint8_t event)
    108  1.3.4.2  rpaulo {
    109  1.3.4.2  rpaulo 
    110  1.3.4.2  rpaulo 	return (hci_event_mask[event >> 5] & (1 << (event & 0x1f)));
    111  1.3.4.2  rpaulo }
    112  1.3.4.2  rpaulo 
    113  1.3.4.2  rpaulo static __inline void
    114  1.3.4.2  rpaulo hci_security_set_opcode(uint16_t opcode)
    115  1.3.4.2  rpaulo {
    116  1.3.4.2  rpaulo 
    117  1.3.4.2  rpaulo 	hci_opcode_mask[opcode >> 5] |= (1 << (opcode & 0x1f));
    118  1.3.4.2  rpaulo }
    119  1.3.4.2  rpaulo 
    120  1.3.4.2  rpaulo static __inline void
    121  1.3.4.2  rpaulo hci_security_clr_event(uint8_t event)
    122  1.3.4.2  rpaulo {
    123  1.3.4.2  rpaulo 
    124  1.3.4.2  rpaulo 	hci_event_mask[event >> 5] &= ~(1 << (event & 0x1f));
    125  1.3.4.2  rpaulo }
    126  1.3.4.2  rpaulo 
    127  1.3.4.2  rpaulo static int
    128  1.3.4.2  rpaulo hci_security_init(void)
    129  1.3.4.2  rpaulo {
    130  1.3.4.2  rpaulo 
    131  1.3.4.2  rpaulo 	if (hci_event_mask)
    132  1.3.4.2  rpaulo 		return 0;
    133  1.3.4.2  rpaulo 
    134  1.3.4.2  rpaulo 	// XXX could wait?
    135  1.3.4.2  rpaulo 	hci_event_mask = malloc(HCI_EVENT_MASK_SIZE + HCI_OPCODE_MASK_SIZE,
    136  1.3.4.2  rpaulo 				M_BLUETOOTH, M_NOWAIT | M_ZERO);
    137  1.3.4.2  rpaulo 	if (hci_event_mask == NULL) {
    138  1.3.4.2  rpaulo 		DPRINTF("no memory\n");
    139  1.3.4.2  rpaulo 		return ENOMEM;
    140  1.3.4.2  rpaulo 	}
    141  1.3.4.2  rpaulo 
    142  1.3.4.2  rpaulo 	hci_opcode_mask = hci_event_mask + HCI_EVENT_MASK_SIZE;
    143  1.3.4.2  rpaulo 
    144  1.3.4.2  rpaulo 	/* Events */
    145  1.3.4.2  rpaulo 	/* enable all but a few critical events */
    146  1.3.4.2  rpaulo 	memset(hci_event_mask, 0xff,
    147  1.3.4.2  rpaulo 		HCI_EVENT_MASK_SIZE * sizeof(*hci_event_mask));
    148  1.3.4.2  rpaulo 	hci_security_clr_event(HCI_EVENT_RETURN_LINK_KEYS);
    149  1.3.4.2  rpaulo 	hci_security_clr_event(HCI_EVENT_LINK_KEY_NOTIFICATION);
    150  1.3.4.2  rpaulo 	hci_security_clr_event(HCI_EVENT_VENDOR);
    151  1.3.4.2  rpaulo 
    152  1.3.4.2  rpaulo 	/* Commands - Link control */
    153  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_INQUIRY);
    154  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_REMOTE_NAME_REQ);
    155  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_REMOTE_FEATURES);
    156  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_REMOTE_EXTENDED_FEATURES);
    157  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_REMOTE_VER_INFO);
    158  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_CLOCK_OFFSET);
    159  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LMP_HANDLE);
    160  1.3.4.2  rpaulo 
    161  1.3.4.2  rpaulo 	/* Commands - Link policy */
    162  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_ROLE_DISCOVERY);
    163  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LINK_POLICY_SETTINGS);
    164  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_DEFAULT_LINK_POLICY_SETTINGS);
    165  1.3.4.2  rpaulo 
    166  1.3.4.2  rpaulo 	/* Commands - Host controller and baseband */
    167  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PIN_TYPE);
    168  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOCAL_NAME);
    169  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_CON_ACCEPT_TIMEOUT);
    170  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PAGE_TIMEOUT);
    171  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_SCAN_ENABLE);
    172  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PAGE_SCAN_ACTIVITY);
    173  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY);
    174  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_AUTH_ENABLE);
    175  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_ENCRYPTION_MODE);
    176  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_UNIT_CLASS);
    177  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_VOICE_SETTING);
    178  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_AUTO_FLUSH_TIMEOUT);
    179  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_NUM_BROADCAST_RETRANS);
    180  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_HOLD_MODE_ACTIVITY);
    181  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_XMIT_LEVEL);
    182  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_SCO_FLOW_CONTROL);
    183  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LINK_SUPERVISION_TIMEOUT);
    184  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_NUM_SUPPORTED_IAC);
    185  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_IAC_LAP);
    186  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PAGE_SCAN_PERIOD);
    187  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PAGE_SCAN);
    188  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_INQUIRY_SCAN_TYPE);
    189  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_INQUIRY_MODE);
    190  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_PAGE_SCAN_TYPE);
    191  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_AFH_ASSESSMENT);
    192  1.3.4.2  rpaulo 
    193  1.3.4.2  rpaulo 	/* Commands - Informational */
    194  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOCAL_VER);
    195  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOCAL_COMMANDS);
    196  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOCAL_FEATURES);
    197  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOCAL_EXTENDED_FEATURES);
    198  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_BUFFER_SIZE);
    199  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_COUNTRY_CODE);
    200  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_BDADDR);
    201  1.3.4.2  rpaulo 
    202  1.3.4.2  rpaulo 	/* Commands - Status */
    203  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_FAILED_CONTACT_CNTR);
    204  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LINK_QUALITY);
    205  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_RSSI);
    206  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_AFH_CHANNEL_MAP);
    207  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_CLOCK);
    208  1.3.4.2  rpaulo 
    209  1.3.4.2  rpaulo 	/* Commands - Testing */
    210  1.3.4.2  rpaulo 	hci_security_set_opcode(HCI_CMD_READ_LOOPBACK_MODE);
    211  1.3.4.2  rpaulo 
    212  1.3.4.2  rpaulo 	return 0;
    213  1.3.4.2  rpaulo }
    214  1.3.4.2  rpaulo 
    215  1.3.4.2  rpaulo /*
    216  1.3.4.2  rpaulo  * When command packet reaches the device, we can drop
    217  1.3.4.2  rpaulo  * it from the socket buffer (called from hci_output_acl)
    218  1.3.4.2  rpaulo  */
    219  1.3.4.2  rpaulo void
    220  1.3.4.2  rpaulo hci_drop(void *arg)
    221  1.3.4.2  rpaulo {
    222  1.3.4.2  rpaulo 	struct socket *so = arg;
    223  1.3.4.2  rpaulo 
    224  1.3.4.2  rpaulo 	sbdroprecord(&so->so_snd);
    225  1.3.4.2  rpaulo 	sowwakeup(so);
    226  1.3.4.2  rpaulo }
    227  1.3.4.2  rpaulo 
    228  1.3.4.2  rpaulo /*
    229  1.3.4.2  rpaulo  * HCI socket is going away and has some pending packets. We let them
    230  1.3.4.2  rpaulo  * go by design, but remove the context pointer as it will be invalid
    231  1.3.4.2  rpaulo  * and we no longer need to be notified.
    232  1.3.4.2  rpaulo  */
    233  1.3.4.2  rpaulo static void
    234  1.3.4.2  rpaulo hci_cmdwait_flush(struct socket *so)
    235  1.3.4.2  rpaulo {
    236  1.3.4.2  rpaulo 	struct hci_unit *unit;
    237  1.3.4.2  rpaulo 	struct socket *ctx;
    238  1.3.4.2  rpaulo 	struct mbuf *m;
    239  1.3.4.2  rpaulo 
    240  1.3.4.2  rpaulo 	DPRINTF("flushing %p\n", so);
    241  1.3.4.2  rpaulo 
    242  1.3.4.2  rpaulo 	SIMPLEQ_FOREACH(unit, &hci_unit_list, hci_next) {
    243  1.3.4.2  rpaulo 		m = MBUFQ_FIRST(&unit->hci_cmdwait);
    244  1.3.4.2  rpaulo 		while (m != NULL) {
    245  1.3.4.2  rpaulo 			ctx = M_GETCTX(m, struct socket *);
    246  1.3.4.2  rpaulo 			if (ctx == so)
    247  1.3.4.2  rpaulo 				M_SETCTX(m, NULL);
    248  1.3.4.2  rpaulo 
    249  1.3.4.2  rpaulo 			m = MBUFQ_NEXT(m);
    250  1.3.4.2  rpaulo 		}
    251  1.3.4.2  rpaulo 	}
    252  1.3.4.2  rpaulo }
    253  1.3.4.2  rpaulo 
    254  1.3.4.2  rpaulo /*
    255  1.3.4.2  rpaulo  * HCI send packet
    256  1.3.4.2  rpaulo  *     This came from userland, so check it out.
    257  1.3.4.2  rpaulo  */
    258  1.3.4.2  rpaulo static int
    259  1.3.4.2  rpaulo hci_send(struct hci_pcb *pcb, struct mbuf *m, bdaddr_t *addr)
    260  1.3.4.2  rpaulo {
    261  1.3.4.2  rpaulo 	struct hci_unit *unit;
    262  1.3.4.2  rpaulo 	struct mbuf *m0;
    263  1.3.4.2  rpaulo 	hci_cmd_hdr_t hdr;
    264  1.3.4.2  rpaulo 	int err;
    265  1.3.4.2  rpaulo 
    266  1.3.4.2  rpaulo 	KASSERT(m);
    267  1.3.4.2  rpaulo 	KASSERT(addr);
    268  1.3.4.2  rpaulo 
    269  1.3.4.2  rpaulo 	/* wants at least a header to start with */
    270  1.3.4.2  rpaulo 	if (m->m_pkthdr.len < sizeof(hdr)) {
    271  1.3.4.2  rpaulo 		err = EMSGSIZE;
    272  1.3.4.2  rpaulo 		goto bad;
    273  1.3.4.2  rpaulo 	}
    274  1.3.4.2  rpaulo 	m_copydata(m, 0, sizeof(hdr), &hdr);
    275  1.3.4.2  rpaulo 
    276  1.3.4.2  rpaulo 	/* only allows CMD packets to be sent */
    277  1.3.4.2  rpaulo 	if (hdr.type != HCI_CMD_PKT) {
    278  1.3.4.2  rpaulo 		err = EINVAL;
    279  1.3.4.2  rpaulo 		goto bad;
    280  1.3.4.2  rpaulo 	}
    281  1.3.4.2  rpaulo 
    282  1.3.4.2  rpaulo 	/* validates packet length */
    283  1.3.4.2  rpaulo 	if (m->m_pkthdr.len != sizeof(hdr) + hdr.length) {
    284  1.3.4.2  rpaulo 		err = EMSGSIZE;
    285  1.3.4.2  rpaulo 		goto bad;
    286  1.3.4.2  rpaulo 	}
    287  1.3.4.2  rpaulo 
    288  1.3.4.2  rpaulo 	/* security checks for unprivileged users */
    289  1.3.4.2  rpaulo 	if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
    290  1.3.4.2  rpaulo 	    && (hci_security_check_opcode(le16toh(hdr.opcode)) == 0)) {
    291  1.3.4.2  rpaulo 		err = EPERM;
    292  1.3.4.2  rpaulo 		goto bad;
    293  1.3.4.2  rpaulo 	}
    294  1.3.4.2  rpaulo 
    295  1.3.4.2  rpaulo 	/* finds destination */
    296  1.3.4.2  rpaulo 	unit = hci_unit_lookup(addr);
    297  1.3.4.2  rpaulo 	if (unit == NULL) {
    298  1.3.4.2  rpaulo 		err = ENETDOWN;
    299  1.3.4.2  rpaulo 		goto bad;
    300  1.3.4.2  rpaulo 	}
    301  1.3.4.2  rpaulo 
    302  1.3.4.2  rpaulo 	/* makess a copy for precious to keep */
    303  1.3.4.2  rpaulo 	m0 = m_copypacket(m, M_DONTWAIT);
    304  1.3.4.2  rpaulo 	if (m0 == NULL) {
    305  1.3.4.2  rpaulo 		err = ENOMEM;
    306  1.3.4.2  rpaulo 		goto bad;
    307  1.3.4.2  rpaulo 	}
    308  1.3.4.2  rpaulo 	sbappendrecord(&pcb->hp_socket->so_snd, m0);
    309  1.3.4.2  rpaulo 	M_SETCTX(m, pcb->hp_socket);	/* enable drop callback */
    310  1.3.4.2  rpaulo 
    311  1.3.4.2  rpaulo 	DPRINTFN(2, "(%s) opcode (%03x|%04x)\n", unit->hci_devname,
    312  1.3.4.2  rpaulo 		HCI_OGF(le16toh(hdr.opcode)), HCI_OCF(le16toh(hdr.opcode)));
    313  1.3.4.2  rpaulo 
    314  1.3.4.2  rpaulo 	/* Sendss it */
    315  1.3.4.2  rpaulo 	if (unit->hci_num_cmd_pkts == 0)
    316  1.3.4.2  rpaulo 		MBUFQ_ENQUEUE(&unit->hci_cmdwait, m);
    317  1.3.4.2  rpaulo 	else
    318  1.3.4.2  rpaulo 		hci_output_cmd(unit, m);
    319  1.3.4.2  rpaulo 
    320  1.3.4.2  rpaulo 	return 0;
    321  1.3.4.2  rpaulo 
    322  1.3.4.2  rpaulo bad:
    323  1.3.4.2  rpaulo 	DPRINTF("packet (%d bytes) not sent (error %d)\n",
    324  1.3.4.2  rpaulo 			m->m_pkthdr.len, err);
    325  1.3.4.2  rpaulo 	if (m) m_freem(m);
    326  1.3.4.2  rpaulo 	return err;
    327  1.3.4.2  rpaulo }
    328  1.3.4.2  rpaulo 
    329  1.3.4.2  rpaulo /*
    330  1.3.4.2  rpaulo  * User Request.
    331  1.3.4.2  rpaulo  * up is socket
    332  1.3.4.2  rpaulo  * m is either
    333  1.3.4.2  rpaulo  *	optional mbuf chain containing message
    334  1.3.4.2  rpaulo  *	ioctl command (PRU_CONTROL)
    335  1.3.4.2  rpaulo  * nam is either
    336  1.3.4.2  rpaulo  *	optional mbuf chain containing an address
    337  1.3.4.2  rpaulo  *	ioctl data (PRU_CONTROL)
    338  1.3.4.2  rpaulo  *      optionally, protocol number (PRU_ATTACH)
    339  1.3.4.2  rpaulo  * ctl is optional mbuf chain containing socket options
    340  1.3.4.2  rpaulo  * l is pointer to process requesting action (if any)
    341  1.3.4.2  rpaulo  *
    342  1.3.4.2  rpaulo  * we are responsible for disposing of m and ctl if
    343  1.3.4.2  rpaulo  * they are mbuf chains
    344  1.3.4.2  rpaulo  */
    345  1.3.4.2  rpaulo int
    346  1.3.4.2  rpaulo hci_usrreq(struct socket *up, int req, struct mbuf *m,
    347  1.3.4.2  rpaulo 		struct mbuf *nam, struct mbuf *ctl, struct lwp *l)
    348  1.3.4.2  rpaulo {
    349  1.3.4.2  rpaulo 	struct hci_pcb *pcb = (struct hci_pcb *)up->so_pcb;
    350  1.3.4.2  rpaulo 	struct sockaddr_bt *sa;
    351  1.3.4.2  rpaulo 	int err = 0, flags;
    352  1.3.4.2  rpaulo 
    353  1.3.4.2  rpaulo 	DPRINTFN(2, "%s\n", prurequests[req]);
    354  1.3.4.2  rpaulo 
    355  1.3.4.2  rpaulo 	switch(req) {
    356  1.3.4.2  rpaulo 	case PRU_CONTROL:
    357  1.3.4.2  rpaulo 		return hci_ioctl((unsigned long)m, (void *)nam, l);
    358  1.3.4.2  rpaulo 
    359  1.3.4.2  rpaulo 	case PRU_PURGEIF:
    360  1.3.4.2  rpaulo 		return EOPNOTSUPP;
    361  1.3.4.2  rpaulo 
    362  1.3.4.2  rpaulo 	case PRU_ATTACH:
    363  1.3.4.2  rpaulo 		if (pcb)
    364  1.3.4.2  rpaulo 			return EINVAL;
    365  1.3.4.2  rpaulo 
    366  1.3.4.2  rpaulo 		flags = 0;
    367  1.3.4.2  rpaulo 		if (l != NULL && kauth_authorize_generic(l->l_cred,
    368  1.3.4.2  rpaulo 		    KAUTH_GENERIC_ISSUSER, &l->l_acflag)) {
    369  1.3.4.2  rpaulo 			err = hci_security_init();
    370  1.3.4.2  rpaulo 			if (err)
    371  1.3.4.2  rpaulo 				return err;
    372  1.3.4.2  rpaulo 		} else {
    373  1.3.4.2  rpaulo 			flags = HCI_PRIVILEGED;
    374  1.3.4.2  rpaulo 		}
    375  1.3.4.2  rpaulo 
    376  1.3.4.2  rpaulo 		err = soreserve(up, hci_sendspace, hci_recvspace);
    377  1.3.4.2  rpaulo 		if (err)
    378  1.3.4.2  rpaulo 			return err;
    379  1.3.4.2  rpaulo 
    380  1.3.4.2  rpaulo 		pcb = malloc(sizeof(struct hci_pcb), M_PCB, M_NOWAIT | M_ZERO);
    381  1.3.4.2  rpaulo 		if (pcb == NULL)
    382  1.3.4.2  rpaulo 			return ENOMEM;
    383  1.3.4.2  rpaulo 
    384  1.3.4.2  rpaulo 		up->so_pcb = pcb;
    385  1.3.4.2  rpaulo 		pcb->hp_socket = up;
    386  1.3.4.2  rpaulo 		pcb->hp_flags = flags;
    387  1.3.4.2  rpaulo 
    388  1.3.4.2  rpaulo 		/*
    389  1.3.4.2  rpaulo 		 * Set default user filter. By default, socket only passes
    390  1.3.4.2  rpaulo 		 * Command_Complete and Command_Status Events.
    391  1.3.4.2  rpaulo 		 */
    392  1.3.4.2  rpaulo 		hci_filter_set(HCI_EVENT_COMMAND_COMPL, &pcb->hp_efilter);
    393  1.3.4.2  rpaulo 		hci_filter_set(HCI_EVENT_COMMAND_STATUS, &pcb->hp_efilter);
    394  1.3.4.2  rpaulo 		hci_filter_set(HCI_EVENT_PKT, &pcb->hp_pfilter);
    395  1.3.4.2  rpaulo 
    396  1.3.4.2  rpaulo 		LIST_INSERT_HEAD(&hci_pcb, pcb, hp_next);
    397  1.3.4.2  rpaulo 
    398  1.3.4.2  rpaulo 		return 0;
    399  1.3.4.2  rpaulo 	}
    400  1.3.4.2  rpaulo 
    401  1.3.4.2  rpaulo 	/* anything after here *requires* a pcb */
    402  1.3.4.2  rpaulo 	if (pcb == NULL) {
    403  1.3.4.2  rpaulo 		err = EINVAL;
    404  1.3.4.2  rpaulo 		goto release;
    405  1.3.4.2  rpaulo 	}
    406  1.3.4.2  rpaulo 
    407  1.3.4.2  rpaulo 	switch(req) {
    408  1.3.4.2  rpaulo 	case PRU_DISCONNECT:
    409  1.3.4.2  rpaulo 		bdaddr_copy(&pcb->hp_raddr, BDADDR_ANY);
    410  1.3.4.2  rpaulo 
    411  1.3.4.2  rpaulo 		/* XXX we cannot call soisdisconnected() here, as it sets
    412  1.3.4.2  rpaulo 		 * SS_CANTRCVMORE and SS_CANTSENDMORE. The problem being,
    413  1.3.4.2  rpaulo 		 * that soisconnected() does not clear these and if you
    414  1.3.4.2  rpaulo 		 * try to reconnect this socket (which is permitted) you
    415  1.3.4.2  rpaulo 		 * get a broken pipe when you try to write any data.
    416  1.3.4.2  rpaulo 		 */
    417  1.3.4.2  rpaulo 		up->so_state &= ~SS_ISCONNECTED;
    418  1.3.4.2  rpaulo 		break;
    419  1.3.4.2  rpaulo 
    420  1.3.4.2  rpaulo 	case PRU_ABORT:
    421  1.3.4.2  rpaulo 		soisdisconnected(up);
    422  1.3.4.2  rpaulo 		/* fall through to */
    423  1.3.4.2  rpaulo 	case PRU_DETACH:
    424  1.3.4.2  rpaulo 		if (up->so_snd.sb_mb != NULL)
    425  1.3.4.2  rpaulo 			hci_cmdwait_flush(up);
    426  1.3.4.2  rpaulo 
    427  1.3.4.2  rpaulo 		up->so_pcb = NULL;
    428  1.3.4.2  rpaulo 		LIST_REMOVE(pcb, hp_next);
    429  1.3.4.2  rpaulo 		free(pcb, M_PCB);
    430  1.3.4.2  rpaulo 		return 0;
    431  1.3.4.2  rpaulo 
    432  1.3.4.2  rpaulo 	case PRU_BIND:
    433  1.3.4.2  rpaulo 		KASSERT(nam);
    434  1.3.4.2  rpaulo 		sa = mtod(nam, struct sockaddr_bt *);
    435  1.3.4.2  rpaulo 
    436  1.3.4.2  rpaulo 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    437  1.3.4.2  rpaulo 			return EINVAL;
    438  1.3.4.2  rpaulo 
    439  1.3.4.2  rpaulo 		if (sa->bt_family != AF_BLUETOOTH)
    440  1.3.4.2  rpaulo 			return EAFNOSUPPORT;
    441  1.3.4.2  rpaulo 
    442  1.3.4.2  rpaulo 		bdaddr_copy(&pcb->hp_laddr, &sa->bt_bdaddr);
    443  1.3.4.2  rpaulo 
    444  1.3.4.2  rpaulo 		if (bdaddr_any(&sa->bt_bdaddr))
    445  1.3.4.2  rpaulo 			pcb->hp_flags |= HCI_PROMISCUOUS;
    446  1.3.4.2  rpaulo 		else
    447  1.3.4.2  rpaulo 			pcb->hp_flags &= ~HCI_PROMISCUOUS;
    448  1.3.4.2  rpaulo 
    449  1.3.4.2  rpaulo 		return 0;
    450  1.3.4.2  rpaulo 
    451  1.3.4.2  rpaulo 	case PRU_CONNECT:
    452  1.3.4.2  rpaulo 		KASSERT(nam);
    453  1.3.4.2  rpaulo 		sa = mtod(nam, struct sockaddr_bt *);
    454  1.3.4.2  rpaulo 
    455  1.3.4.2  rpaulo 		if (sa->bt_len != sizeof(struct sockaddr_bt))
    456  1.3.4.2  rpaulo 			return EINVAL;
    457  1.3.4.2  rpaulo 
    458  1.3.4.2  rpaulo 		if (sa->bt_family != AF_BLUETOOTH)
    459  1.3.4.2  rpaulo 			return EAFNOSUPPORT;
    460  1.3.4.2  rpaulo 
    461  1.3.4.2  rpaulo 		if (hci_unit_lookup(&sa->bt_bdaddr) == NULL)
    462  1.3.4.2  rpaulo 			return EADDRNOTAVAIL;
    463  1.3.4.2  rpaulo 
    464  1.3.4.2  rpaulo 		bdaddr_copy(&pcb->hp_raddr, &sa->bt_bdaddr);
    465  1.3.4.2  rpaulo 		soisconnected(up);
    466  1.3.4.2  rpaulo 		return 0;
    467  1.3.4.2  rpaulo 
    468  1.3.4.2  rpaulo 	case PRU_PEERADDR:
    469  1.3.4.2  rpaulo 		KASSERT(nam);
    470  1.3.4.2  rpaulo 		sa = mtod(nam, struct sockaddr_bt *);
    471  1.3.4.2  rpaulo 
    472  1.3.4.2  rpaulo 		memset(sa, 0, sizeof(struct sockaddr_bt));
    473  1.3.4.2  rpaulo 		nam->m_len =
    474  1.3.4.2  rpaulo 		sa->bt_len = sizeof(struct sockaddr_bt);
    475  1.3.4.2  rpaulo 		sa->bt_family = AF_BLUETOOTH;
    476  1.3.4.2  rpaulo 		bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_raddr);
    477  1.3.4.2  rpaulo 		return 0;
    478  1.3.4.2  rpaulo 
    479  1.3.4.2  rpaulo 	case PRU_SOCKADDR:
    480  1.3.4.2  rpaulo 		KASSERT(nam);
    481  1.3.4.2  rpaulo 		sa = mtod(nam, struct sockaddr_bt *);
    482  1.3.4.2  rpaulo 
    483  1.3.4.2  rpaulo 		memset(sa, 0, sizeof(struct sockaddr_bt));
    484  1.3.4.2  rpaulo 		nam->m_len =
    485  1.3.4.2  rpaulo 		sa->bt_len = sizeof(struct sockaddr_bt);
    486  1.3.4.2  rpaulo 		sa->bt_family = AF_BLUETOOTH;
    487  1.3.4.2  rpaulo 		bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_laddr);
    488  1.3.4.2  rpaulo 		return 0;
    489  1.3.4.2  rpaulo 
    490  1.3.4.2  rpaulo 	case PRU_SHUTDOWN:
    491  1.3.4.2  rpaulo 		socantsendmore(up);
    492  1.3.4.2  rpaulo 		break;
    493  1.3.4.2  rpaulo 
    494  1.3.4.2  rpaulo 	case PRU_SEND:
    495  1.3.4.2  rpaulo 		sa = NULL;
    496  1.3.4.2  rpaulo 		if (nam) {
    497  1.3.4.2  rpaulo 			sa = mtod(nam, struct sockaddr_bt *);
    498  1.3.4.2  rpaulo 
    499  1.3.4.2  rpaulo 			if (sa->bt_len != sizeof(struct sockaddr_bt)) {
    500  1.3.4.2  rpaulo 				err = EINVAL;
    501  1.3.4.2  rpaulo 				goto release;
    502  1.3.4.2  rpaulo 			}
    503  1.3.4.2  rpaulo 
    504  1.3.4.2  rpaulo 			if (sa->bt_family != AF_BLUETOOTH) {
    505  1.3.4.2  rpaulo 				err = EAFNOSUPPORT;
    506  1.3.4.2  rpaulo 				goto release;
    507  1.3.4.2  rpaulo 			}
    508  1.3.4.2  rpaulo 		}
    509  1.3.4.2  rpaulo 
    510  1.3.4.2  rpaulo 		if (ctl) /* have no use for this */
    511  1.3.4.2  rpaulo 			m_freem(ctl);
    512  1.3.4.2  rpaulo 
    513  1.3.4.2  rpaulo 		return hci_send(pcb, m, (sa ? &sa->bt_bdaddr : &pcb->hp_raddr));
    514  1.3.4.2  rpaulo 
    515  1.3.4.2  rpaulo 	case PRU_SENSE:
    516  1.3.4.2  rpaulo 		return 0;		/* (no sense - Doh!) */
    517  1.3.4.2  rpaulo 
    518  1.3.4.2  rpaulo 	case PRU_RCVD:
    519  1.3.4.2  rpaulo 	case PRU_RCVOOB:
    520  1.3.4.2  rpaulo 		return EOPNOTSUPP;	/* (no release) */
    521  1.3.4.2  rpaulo 
    522  1.3.4.2  rpaulo 	case PRU_ACCEPT:
    523  1.3.4.2  rpaulo 	case PRU_CONNECT2:
    524  1.3.4.2  rpaulo 	case PRU_LISTEN:
    525  1.3.4.2  rpaulo 	case PRU_SENDOOB:
    526  1.3.4.2  rpaulo 	case PRU_FASTTIMO:
    527  1.3.4.2  rpaulo 	case PRU_SLOWTIMO:
    528  1.3.4.2  rpaulo 	case PRU_PROTORCV:
    529  1.3.4.2  rpaulo 	case PRU_PROTOSEND:
    530  1.3.4.2  rpaulo 		err = EOPNOTSUPP;
    531  1.3.4.2  rpaulo 		break;
    532  1.3.4.2  rpaulo 
    533  1.3.4.2  rpaulo 	default:
    534  1.3.4.2  rpaulo 		UNKNOWN(req);
    535  1.3.4.2  rpaulo 		err = EOPNOTSUPP;
    536  1.3.4.2  rpaulo 		break;
    537  1.3.4.2  rpaulo 	}
    538  1.3.4.2  rpaulo 
    539  1.3.4.2  rpaulo release:
    540  1.3.4.2  rpaulo 	if (m)
    541  1.3.4.2  rpaulo 		m_freem(m);
    542  1.3.4.2  rpaulo 	if (ctl)
    543  1.3.4.2  rpaulo 		m_freem(ctl);
    544  1.3.4.2  rpaulo 	return err;
    545  1.3.4.2  rpaulo }
    546  1.3.4.2  rpaulo 
    547  1.3.4.2  rpaulo /*
    548  1.3.4.2  rpaulo  * System is short on memory.
    549  1.3.4.2  rpaulo  */
    550  1.3.4.2  rpaulo void
    551  1.3.4.2  rpaulo hci_drain(void)
    552  1.3.4.2  rpaulo {
    553  1.3.4.2  rpaulo 
    554  1.3.4.2  rpaulo 	/*
    555  1.3.4.2  rpaulo 	 * We can give the security masks back, if there
    556  1.3.4.2  rpaulo 	 * are no unprivileged sockets in operation..
    557  1.3.4.2  rpaulo 	 */
    558  1.3.4.2  rpaulo 	if (hci_event_mask) {
    559  1.3.4.2  rpaulo 		struct hci_pcb *pcb;
    560  1.3.4.2  rpaulo 
    561  1.3.4.2  rpaulo 		LIST_FOREACH(pcb, &hci_pcb, hp_next) {
    562  1.3.4.2  rpaulo 			if ((pcb->hp_flags & HCI_PRIVILEGED) == 0)
    563  1.3.4.2  rpaulo 				break;
    564  1.3.4.2  rpaulo 		}
    565  1.3.4.2  rpaulo 
    566  1.3.4.2  rpaulo 		if (pcb == NULL) {
    567  1.3.4.2  rpaulo 			free(hci_event_mask, M_BLUETOOTH);
    568  1.3.4.2  rpaulo 			hci_event_mask = NULL;
    569  1.3.4.2  rpaulo 			hci_opcode_mask = NULL;
    570  1.3.4.2  rpaulo 		}
    571  1.3.4.2  rpaulo 	}
    572  1.3.4.2  rpaulo }
    573  1.3.4.2  rpaulo 
    574  1.3.4.2  rpaulo /*
    575  1.3.4.2  rpaulo  * get/set socket options
    576  1.3.4.2  rpaulo  */
    577  1.3.4.2  rpaulo int
    578  1.3.4.2  rpaulo hci_ctloutput(int req, struct socket *so, int level,
    579  1.3.4.2  rpaulo 		int optname, struct mbuf **opt)
    580  1.3.4.2  rpaulo {
    581  1.3.4.2  rpaulo 	struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
    582  1.3.4.2  rpaulo 	struct mbuf *m;
    583  1.3.4.2  rpaulo 	int err = 0;
    584  1.3.4.2  rpaulo 
    585  1.3.4.2  rpaulo 	DPRINTFN(2, "req %s\n", prcorequests[req]);
    586  1.3.4.2  rpaulo 
    587  1.3.4.2  rpaulo 	if (pcb == NULL)
    588  1.3.4.2  rpaulo 		return EINVAL;
    589  1.3.4.2  rpaulo 
    590  1.3.4.2  rpaulo 	if (level != BTPROTO_HCI)
    591  1.3.4.2  rpaulo 		return 0;
    592  1.3.4.2  rpaulo 
    593  1.3.4.2  rpaulo 	switch(req) {
    594  1.3.4.2  rpaulo 	case PRCO_GETOPT:
    595  1.3.4.2  rpaulo 		m = m_get(M_WAIT, MT_SOOPTS);
    596  1.3.4.2  rpaulo 		switch (optname) {
    597  1.3.4.2  rpaulo 		case SO_HCI_EVT_FILTER:
    598  1.3.4.2  rpaulo 			m->m_len = sizeof(struct hci_filter);
    599  1.3.4.2  rpaulo 			memcpy(mtod(m, void *), &pcb->hp_efilter, m->m_len);
    600  1.3.4.2  rpaulo 			break;
    601  1.3.4.2  rpaulo 
    602  1.3.4.2  rpaulo 		case SO_HCI_PKT_FILTER:
    603  1.3.4.2  rpaulo 			m->m_len = sizeof(struct hci_filter);
    604  1.3.4.2  rpaulo 			memcpy(mtod(m, void *), &pcb->hp_pfilter, m->m_len);
    605  1.3.4.2  rpaulo 			break;
    606  1.3.4.2  rpaulo 
    607  1.3.4.2  rpaulo 		case SO_HCI_DIRECTION:
    608  1.3.4.2  rpaulo 			m->m_len = sizeof(int);
    609  1.3.4.2  rpaulo 			if (pcb->hp_flags & HCI_DIRECTION)
    610  1.3.4.2  rpaulo 				*mtod(m, int *) = 1;
    611  1.3.4.2  rpaulo 			else
    612  1.3.4.2  rpaulo 				*mtod(m, int *) = 0;
    613  1.3.4.2  rpaulo 			break;
    614  1.3.4.2  rpaulo 
    615  1.3.4.2  rpaulo 		default:
    616  1.3.4.2  rpaulo 			err = EINVAL;
    617  1.3.4.2  rpaulo 			m_freem(m);
    618  1.3.4.2  rpaulo 			m = NULL;
    619  1.3.4.2  rpaulo 			break;
    620  1.3.4.2  rpaulo 		}
    621  1.3.4.2  rpaulo 		*opt = m;
    622  1.3.4.2  rpaulo 		break;
    623  1.3.4.2  rpaulo 
    624  1.3.4.2  rpaulo 	case PRCO_SETOPT:
    625  1.3.4.2  rpaulo 		m = *opt;
    626  1.3.4.2  rpaulo 		if (m) switch (optname) {
    627  1.3.4.2  rpaulo 		case SO_HCI_EVT_FILTER:	/* set event filter */
    628  1.3.4.2  rpaulo 			m->m_len = min(m->m_len, sizeof(struct hci_filter));
    629  1.3.4.2  rpaulo 			memcpy(&pcb->hp_efilter, mtod(m, void *), m->m_len);
    630  1.3.4.2  rpaulo 			break;
    631  1.3.4.2  rpaulo 
    632  1.3.4.2  rpaulo 		case SO_HCI_PKT_FILTER:	/* set packet filter */
    633  1.3.4.2  rpaulo 			m->m_len = min(m->m_len, sizeof(struct hci_filter));
    634  1.3.4.2  rpaulo 			memcpy(&pcb->hp_pfilter, mtod(m, void *), m->m_len);
    635  1.3.4.2  rpaulo 			break;
    636  1.3.4.2  rpaulo 
    637  1.3.4.2  rpaulo 		case SO_HCI_DIRECTION:	/* request direction ctl messages */
    638  1.3.4.2  rpaulo 			if (*mtod(m, int *))
    639  1.3.4.2  rpaulo 				pcb->hp_flags |= HCI_DIRECTION;
    640  1.3.4.2  rpaulo 			else
    641  1.3.4.2  rpaulo 				pcb->hp_flags &= ~HCI_DIRECTION;
    642  1.3.4.2  rpaulo 			break;
    643  1.3.4.2  rpaulo 
    644  1.3.4.2  rpaulo 		default:
    645  1.3.4.2  rpaulo 			err = EINVAL;
    646  1.3.4.2  rpaulo 			break;
    647  1.3.4.2  rpaulo 		}
    648  1.3.4.2  rpaulo 		m_freem(m);
    649  1.3.4.2  rpaulo 		break;
    650  1.3.4.2  rpaulo 
    651  1.3.4.2  rpaulo 	default:
    652  1.3.4.2  rpaulo 		err = EINVAL;
    653  1.3.4.2  rpaulo 		break;
    654  1.3.4.2  rpaulo 	}
    655  1.3.4.2  rpaulo 
    656  1.3.4.2  rpaulo 	return err;
    657  1.3.4.2  rpaulo }
    658  1.3.4.2  rpaulo 
    659  1.3.4.2  rpaulo /*
    660  1.3.4.2  rpaulo  * HCI mbuf tap routine
    661  1.3.4.2  rpaulo  *
    662  1.3.4.2  rpaulo  * copy packets to any raw HCI sockets that wish (and are
    663  1.3.4.2  rpaulo  * permitted) to see them
    664  1.3.4.2  rpaulo  */
    665  1.3.4.2  rpaulo void
    666  1.3.4.2  rpaulo hci_mtap(struct mbuf *m, struct hci_unit *unit)
    667  1.3.4.2  rpaulo {
    668  1.3.4.2  rpaulo 	struct hci_pcb *pcb;
    669  1.3.4.2  rpaulo 	struct mbuf *m0, *ctlmsg, **ctl;
    670  1.3.4.2  rpaulo 	struct sockaddr_bt sa;
    671  1.3.4.2  rpaulo 	uint8_t type;
    672  1.3.4.2  rpaulo 	uint8_t event;
    673  1.3.4.2  rpaulo 	uint16_t opcode;
    674  1.3.4.2  rpaulo 
    675  1.3.4.2  rpaulo 	KASSERT(m->m_len >= sizeof(type));
    676  1.3.4.2  rpaulo 
    677  1.3.4.2  rpaulo 	type = *mtod(m, uint8_t *);
    678  1.3.4.2  rpaulo 
    679  1.3.4.2  rpaulo 	memset(&sa, 0, sizeof(sa));
    680  1.3.4.2  rpaulo 	sa.bt_len = sizeof(struct sockaddr_bt);
    681  1.3.4.2  rpaulo 	sa.bt_family = AF_BLUETOOTH;
    682  1.3.4.2  rpaulo 	bdaddr_copy(&sa.bt_bdaddr, &unit->hci_bdaddr);
    683  1.3.4.2  rpaulo 
    684  1.3.4.2  rpaulo 	LIST_FOREACH(pcb, &hci_pcb, hp_next) {
    685  1.3.4.2  rpaulo 		/*
    686  1.3.4.2  rpaulo 		 * filter according to source address
    687  1.3.4.2  rpaulo 		 */
    688  1.3.4.2  rpaulo 		if ((pcb->hp_flags & HCI_PROMISCUOUS) == 0
    689  1.3.4.2  rpaulo 		    && bdaddr_same(&pcb->hp_laddr, &sa.bt_bdaddr) == 0)
    690  1.3.4.2  rpaulo 			continue;
    691  1.3.4.2  rpaulo 
    692  1.3.4.2  rpaulo 		/*
    693  1.3.4.2  rpaulo 		 * filter according to packet type filter
    694  1.3.4.2  rpaulo 		 */
    695  1.3.4.2  rpaulo 		if (hci_filter_test(type, &pcb->hp_pfilter) == 0)
    696  1.3.4.2  rpaulo 			continue;
    697  1.3.4.2  rpaulo 
    698  1.3.4.2  rpaulo 		/*
    699  1.3.4.2  rpaulo 		 * filter according to event/security filters
    700  1.3.4.2  rpaulo 		 */
    701  1.3.4.2  rpaulo 		switch(type) {
    702  1.3.4.2  rpaulo 		case HCI_EVENT_PKT:
    703  1.3.4.2  rpaulo 			KASSERT(m->m_len >= sizeof(hci_event_hdr_t));
    704  1.3.4.2  rpaulo 
    705  1.3.4.2  rpaulo 			event = mtod(m, hci_event_hdr_t *)->event;
    706  1.3.4.2  rpaulo 
    707  1.3.4.2  rpaulo 			if (hci_filter_test(event, &pcb->hp_efilter) == 0)
    708  1.3.4.2  rpaulo 				continue;
    709  1.3.4.2  rpaulo 
    710  1.3.4.2  rpaulo 			if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
    711  1.3.4.2  rpaulo 			    && hci_security_check_event(event) == 0)
    712  1.3.4.2  rpaulo 				continue;
    713  1.3.4.2  rpaulo 			break;
    714  1.3.4.2  rpaulo 
    715  1.3.4.2  rpaulo 		case HCI_CMD_PKT:
    716  1.3.4.2  rpaulo 			KASSERT(m->m_len >= sizeof(hci_cmd_hdr_t));
    717  1.3.4.2  rpaulo 
    718  1.3.4.2  rpaulo 			opcode = le16toh(mtod(m, hci_cmd_hdr_t *)->opcode);
    719  1.3.4.2  rpaulo 
    720  1.3.4.2  rpaulo 			if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
    721  1.3.4.2  rpaulo 			    && hci_security_check_opcode(opcode) == 0)
    722  1.3.4.2  rpaulo 				continue;
    723  1.3.4.2  rpaulo 			break;
    724  1.3.4.2  rpaulo 
    725  1.3.4.2  rpaulo 		case HCI_ACL_DATA_PKT:
    726  1.3.4.2  rpaulo 		case HCI_SCO_DATA_PKT:
    727  1.3.4.2  rpaulo 		default:
    728  1.3.4.2  rpaulo 			if ((pcb->hp_flags & HCI_PRIVILEGED) == 0)
    729  1.3.4.2  rpaulo 				continue;
    730  1.3.4.2  rpaulo 
    731  1.3.4.2  rpaulo 			break;
    732  1.3.4.2  rpaulo 		}
    733  1.3.4.2  rpaulo 
    734  1.3.4.2  rpaulo 		/*
    735  1.3.4.2  rpaulo 		 * create control messages
    736  1.3.4.2  rpaulo 		 */
    737  1.3.4.2  rpaulo 		ctlmsg = NULL;
    738  1.3.4.2  rpaulo 		ctl = &ctlmsg;
    739  1.3.4.2  rpaulo 		if (pcb->hp_flags & HCI_DIRECTION) {
    740  1.3.4.2  rpaulo 			int dir = m->m_flags & M_LINK0 ? 1 : 0;
    741  1.3.4.2  rpaulo 
    742  1.3.4.2  rpaulo 			*ctl = sbcreatecontrol((caddr_t)&dir, sizeof(dir),
    743  1.3.4.2  rpaulo 			    SCM_HCI_DIRECTION, BTPROTO_HCI);
    744  1.3.4.2  rpaulo 
    745  1.3.4.2  rpaulo 			if (*ctl != NULL)
    746  1.3.4.2  rpaulo 				ctl = &((*ctl)->m_next);
    747  1.3.4.2  rpaulo 		}
    748  1.3.4.2  rpaulo 
    749  1.3.4.2  rpaulo 		/*
    750  1.3.4.2  rpaulo 		 * copy to socket
    751  1.3.4.2  rpaulo 		 */
    752  1.3.4.2  rpaulo 		m0 = m_copypacket(m, M_DONTWAIT);
    753  1.3.4.2  rpaulo 		if (m0 && sbappendaddr(&pcb->hp_socket->so_rcv,
    754  1.3.4.2  rpaulo 				(struct sockaddr *)&sa, m0, ctlmsg)) {
    755  1.3.4.2  rpaulo 			sorwakeup(pcb->hp_socket);
    756  1.3.4.2  rpaulo 		} else {
    757  1.3.4.2  rpaulo 			m_freem(ctlmsg);
    758  1.3.4.2  rpaulo 			m_freem(m0);
    759  1.3.4.2  rpaulo 		}
    760  1.3.4.2  rpaulo 	}
    761  1.3.4.2  rpaulo }
    762