Home | History | Annotate | Line # | Download | only in netbt
l2cap_signal.c revision 1.13
      1 /*	$NetBSD: l2cap_signal.c,v 1.13 2011/07/17 20:54:53 joerg Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2005 Iain Hibbert.
      5  * Copyright (c) 2006 Itronix Inc.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. The name of Itronix Inc. may not be used to endorse
     17  *    or promote products derived from this software without specific
     18  *    prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     27  * ON ANY THEORY OF LIABILITY, WHETHER IN
     28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 #include <sys/cdefs.h>
     34 __KERNEL_RCSID(0, "$NetBSD: l2cap_signal.c,v 1.13 2011/07/17 20:54:53 joerg Exp $");
     35 
     36 #include <sys/param.h>
     37 #include <sys/kernel.h>
     38 #include <sys/mbuf.h>
     39 #include <sys/proc.h>
     40 #include <sys/queue.h>
     41 #include <sys/systm.h>
     42 
     43 #include <netbt/bluetooth.h>
     44 #include <netbt/hci.h>
     45 #include <netbt/l2cap.h>
     46 
     47 /*******************************************************************************
     48  *
     49  *	L2CAP Signal processing
     50  */
     51 
     52 static void l2cap_recv_command_rej(struct mbuf *, struct hci_link *);
     53 static void l2cap_recv_connect_req(struct mbuf *, struct hci_link *);
     54 static void l2cap_recv_connect_rsp(struct mbuf *, struct hci_link *);
     55 static void l2cap_recv_config_req(struct mbuf *, struct hci_link *);
     56 static void l2cap_recv_config_rsp(struct mbuf *, struct hci_link *);
     57 static void l2cap_recv_disconnect_req(struct mbuf *, struct hci_link *);
     58 static void l2cap_recv_disconnect_rsp(struct mbuf *, struct hci_link *);
     59 static void l2cap_recv_info_req(struct mbuf *, struct hci_link *);
     60 static int l2cap_send_signal(struct hci_link *, uint8_t, uint8_t, uint16_t, void *);
     61 static int l2cap_send_command_rej(struct hci_link *, uint8_t, uint16_t, ...);
     62 
     63 /*
     64  * process incoming signal packets (CID 0x0001). Can contain multiple
     65  * requests/responses.
     66  */
     67 void
     68 l2cap_recv_signal(struct mbuf *m, struct hci_link *link)
     69 {
     70 	l2cap_cmd_hdr_t cmd;
     71 
     72 	for(;;) {
     73 		if (m->m_pkthdr.len == 0)
     74 			goto finish;
     75 
     76 		if (m->m_pkthdr.len < sizeof(cmd))
     77 			goto reject;
     78 
     79 		m_copydata(m, 0, sizeof(cmd), &cmd);
     80 		cmd.length = le16toh(cmd.length);
     81 
     82 		if (m->m_pkthdr.len < sizeof(cmd) + cmd.length)
     83 			goto reject;
     84 
     85 		DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
     86 			device_xname(link->hl_unit->hci_dev),
     87 			cmd.code, cmd.ident, cmd.length);
     88 
     89 		switch (cmd.code) {
     90 		case L2CAP_COMMAND_REJ:
     91 			if (cmd.length > sizeof(l2cap_cmd_rej_cp))
     92 				goto finish;
     93 
     94 			l2cap_recv_command_rej(m, link);
     95 			break;
     96 
     97 		case L2CAP_CONNECT_REQ:
     98 			if (cmd.length != sizeof(l2cap_con_req_cp))
     99 				goto reject;
    100 
    101 			l2cap_recv_connect_req(m, link);
    102 			break;
    103 
    104 		case L2CAP_CONNECT_RSP:
    105 			if (cmd.length != sizeof(l2cap_con_rsp_cp))
    106 				goto finish;
    107 
    108 			l2cap_recv_connect_rsp(m, link);
    109 			break;
    110 
    111 		case L2CAP_CONFIG_REQ:
    112 			l2cap_recv_config_req(m, link);
    113 			break;
    114 
    115 		case L2CAP_CONFIG_RSP:
    116 			l2cap_recv_config_rsp(m, link);
    117 			break;
    118 
    119 		case L2CAP_DISCONNECT_REQ:
    120 			if (cmd.length != sizeof(l2cap_discon_req_cp))
    121 				goto reject;
    122 
    123 			l2cap_recv_disconnect_req(m, link);
    124 			break;
    125 
    126 		case L2CAP_DISCONNECT_RSP:
    127 			if (cmd.length != sizeof(l2cap_discon_rsp_cp))
    128 				goto finish;
    129 
    130 			l2cap_recv_disconnect_rsp(m, link);
    131 			break;
    132 
    133 		case L2CAP_ECHO_REQ:
    134 			m_adj(m, sizeof(cmd) + cmd.length);
    135 			l2cap_send_signal(link, L2CAP_ECHO_RSP, cmd.ident,
    136 					0, NULL);
    137 			break;
    138 
    139 		case L2CAP_ECHO_RSP:
    140 			m_adj(m, sizeof(cmd) + cmd.length);
    141 			break;
    142 
    143 		case L2CAP_INFO_REQ:
    144 			if (cmd.length != sizeof(l2cap_info_req_cp))
    145 				goto reject;
    146 
    147 			l2cap_recv_info_req(m, link);
    148 			break;
    149 
    150 		case L2CAP_INFO_RSP:
    151 			m_adj(m, sizeof(cmd) + cmd.length);
    152 			break;
    153 
    154 		default:
    155 			goto reject;
    156 		}
    157 	}
    158 
    159 #ifdef DIAGNOSTIC
    160 	panic("impossible!");
    161 #endif
    162 
    163 reject:
    164 	l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
    165 finish:
    166 	m_freem(m);
    167 }
    168 
    169 /*
    170  * Process Received Command Reject. For now we dont try to recover gracefully
    171  * from this, it probably means that the link is garbled or the other end is
    172  * insufficiently capable of handling normal traffic. (not *my* fault, no way!)
    173  */
    174 static void
    175 l2cap_recv_command_rej(struct mbuf *m, struct hci_link *link)
    176 {
    177 	struct l2cap_req *req;
    178 	struct l2cap_channel *chan;
    179 	l2cap_cmd_hdr_t cmd;
    180 	l2cap_cmd_rej_cp cp;
    181 
    182 	m_copydata(m, 0, sizeof(cmd), &cmd);
    183 	m_adj(m, sizeof(cmd));
    184 
    185 	cmd.length = le16toh(cmd.length);
    186 
    187 	m_copydata(m, 0, cmd.length, &cp);
    188 	m_adj(m, cmd.length);
    189 
    190 	req = l2cap_request_lookup(link, cmd.ident);
    191 	if (req == NULL)
    192 		return;
    193 
    194 	switch (le16toh(cp.reason)) {
    195 	case L2CAP_REJ_NOT_UNDERSTOOD:
    196 		/*
    197 		 * I dont know what to do, just move up the timeout
    198 		 */
    199 		callout_schedule(&req->lr_rtx, 0);
    200 		break;
    201 
    202 	case L2CAP_REJ_MTU_EXCEEDED:
    203 		/*
    204 		 * I didnt send any commands over L2CAP_MTU_MINIMUM size, but..
    205 		 *
    206 		 * XXX maybe we should resend this, instead?
    207 		 */
    208 		link->hl_mtu = le16toh(cp.data[0]);
    209 		callout_schedule(&req->lr_rtx, 0);
    210 		break;
    211 
    212 	case L2CAP_REJ_INVALID_CID:
    213 		/*
    214 		 * Well, if they dont have such a channel then our channel is
    215 		 * most likely closed. Make it so.
    216 		 */
    217 		chan = req->lr_chan;
    218 		l2cap_request_free(req);
    219 		if (chan != NULL && chan->lc_state != L2CAP_CLOSED)
    220 			l2cap_close(chan, ECONNABORTED);
    221 
    222 		break;
    223 
    224 	default:
    225 		UNKNOWN(le16toh(cp.reason));
    226 		break;
    227 	}
    228 }
    229 
    230 /*
    231  * Process Received Connect Request. Find listening channel matching
    232  * psm & addr and ask upper layer for a new channel.
    233  */
    234 static void
    235 l2cap_recv_connect_req(struct mbuf *m, struct hci_link *link)
    236 {
    237 	struct sockaddr_bt laddr, raddr;
    238 	struct l2cap_channel *chan, *new;
    239 	l2cap_cmd_hdr_t cmd;
    240 	l2cap_con_req_cp cp;
    241 	int err;
    242 
    243 	/* extract cmd */
    244 	m_copydata(m, 0, sizeof(cmd), &cmd);
    245 	m_adj(m, sizeof(cmd));
    246 
    247 	/* extract request */
    248 	m_copydata(m, 0, sizeof(cp), &cp);
    249 	m_adj(m, sizeof(cp));
    250 
    251 	cp.scid = le16toh(cp.scid);
    252 	cp.psm = le16toh(cp.psm);
    253 
    254 	memset(&laddr, 0, sizeof(struct sockaddr_bt));
    255 	laddr.bt_len = sizeof(struct sockaddr_bt);
    256 	laddr.bt_family = AF_BLUETOOTH;
    257 	laddr.bt_psm = cp.psm;
    258 	bdaddr_copy(&laddr.bt_bdaddr, &link->hl_unit->hci_bdaddr);
    259 
    260 	memset(&raddr, 0, sizeof(struct sockaddr_bt));
    261 	raddr.bt_len = sizeof(struct sockaddr_bt);
    262 	raddr.bt_family = AF_BLUETOOTH;
    263 	raddr.bt_psm = cp.psm;
    264 	bdaddr_copy(&raddr.bt_bdaddr, &link->hl_bdaddr);
    265 
    266 	LIST_FOREACH(chan, &l2cap_listen_list, lc_ncid) {
    267 		if (chan->lc_laddr.bt_psm != laddr.bt_psm)
    268 			continue;
    269 
    270 		if (!bdaddr_same(&laddr.bt_bdaddr, &chan->lc_laddr.bt_bdaddr)
    271 		    && bdaddr_any(&chan->lc_laddr.bt_bdaddr) == 0)
    272 			continue;
    273 
    274 		new= (*chan->lc_proto->newconn)(chan->lc_upper, &laddr, &raddr);
    275 		if (new == NULL)
    276 			continue;
    277 
    278 		err = l2cap_cid_alloc(new);
    279 		if (err) {
    280 			l2cap_send_connect_rsp(link, cmd.ident,
    281 						0, cp.scid,
    282 						L2CAP_NO_RESOURCES);
    283 
    284 			(*new->lc_proto->disconnected)(new->lc_upper, err);
    285 			return;
    286 		}
    287 
    288 		new->lc_link = hci_acl_open(link->hl_unit, &link->hl_bdaddr);
    289 		KASSERT(new->lc_link == link);
    290 
    291 		new->lc_rcid = cp.scid;
    292 		new->lc_ident = cmd.ident;
    293 
    294 		memcpy(&new->lc_laddr, &laddr, sizeof(struct sockaddr_bt));
    295 		memcpy(&new->lc_raddr, &raddr, sizeof(struct sockaddr_bt));
    296 
    297 		new->lc_mode = chan->lc_mode;
    298 
    299 		err = l2cap_setmode(new);
    300 		if (err == EINPROGRESS) {
    301 			new->lc_state = L2CAP_WAIT_SEND_CONNECT_RSP;
    302 			(*new->lc_proto->connecting)(new->lc_upper);
    303 			return;
    304 		}
    305 		if (err) {
    306 			new->lc_state = L2CAP_CLOSED;
    307 			hci_acl_close(link, err);
    308 			new->lc_link = NULL;
    309 
    310 			l2cap_send_connect_rsp(link, cmd.ident,
    311 						0, cp.scid,
    312 						L2CAP_NO_RESOURCES);
    313 
    314 			(*new->lc_proto->disconnected)(new->lc_upper, err);
    315 			return;
    316 		}
    317 
    318 		err = l2cap_send_connect_rsp(link, cmd.ident,
    319 					      new->lc_lcid, new->lc_rcid,
    320 					      L2CAP_SUCCESS);
    321 		if (err) {
    322 			l2cap_close(new, err);
    323 			return;
    324 		}
    325 
    326 		new->lc_state = L2CAP_WAIT_CONFIG;
    327 		new->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
    328 		err = l2cap_send_config_req(new);
    329 		if (err)
    330 			l2cap_close(new, err);
    331 
    332 		return;
    333 	}
    334 
    335 	l2cap_send_connect_rsp(link, cmd.ident,
    336 				0, cp.scid,
    337 				L2CAP_PSM_NOT_SUPPORTED);
    338 }
    339 
    340 /*
    341  * Process Received Connect Response.
    342  */
    343 static void
    344 l2cap_recv_connect_rsp(struct mbuf *m, struct hci_link *link)
    345 {
    346 	l2cap_cmd_hdr_t cmd;
    347 	l2cap_con_rsp_cp cp;
    348 	struct l2cap_req *req;
    349 	struct l2cap_channel *chan;
    350 
    351 	m_copydata(m, 0, sizeof(cmd), &cmd);
    352 	m_adj(m, sizeof(cmd));
    353 
    354 	m_copydata(m, 0, sizeof(cp), &cp);
    355 	m_adj(m, sizeof(cp));
    356 
    357 	cp.scid = le16toh(cp.scid);
    358 	cp.dcid = le16toh(cp.dcid);
    359 	cp.result = le16toh(cp.result);
    360 
    361 	req = l2cap_request_lookup(link, cmd.ident);
    362 	if (req == NULL || req->lr_code != L2CAP_CONNECT_REQ)
    363 		return;
    364 
    365 	chan = req->lr_chan;
    366 	if (chan != NULL && chan->lc_lcid != cp.scid)
    367 		return;
    368 
    369 	if (chan == NULL || chan->lc_state != L2CAP_WAIT_RECV_CONNECT_RSP) {
    370 		l2cap_request_free(req);
    371 		return;
    372 	}
    373 
    374 	switch (cp.result) {
    375 	case L2CAP_SUCCESS:
    376 		/*
    377 		 * Ok, at this point we have a connection to the other party. We
    378 		 * could indicate upstream that we are ready for business and
    379 		 * wait for a "Configure Channel Request" but I'm not so sure
    380 		 * that is required in our case - we will proceed directly to
    381 		 * sending our config request. We set two state bits because in
    382 		 * the config state we are waiting for requests and responses.
    383 		 */
    384 		l2cap_request_free(req);
    385 		chan->lc_rcid = cp.dcid;
    386 		chan->lc_state = L2CAP_WAIT_CONFIG;
    387 		chan->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
    388 		l2cap_send_config_req(chan);
    389 		break;
    390 
    391 	case L2CAP_PENDING:
    392 		/* XXX dont release request, should start eRTX timeout? */
    393 		(*chan->lc_proto->connecting)(chan->lc_upper);
    394 		break;
    395 
    396 	case L2CAP_PSM_NOT_SUPPORTED:
    397 	case L2CAP_SECURITY_BLOCK:
    398 	case L2CAP_NO_RESOURCES:
    399 	default:
    400 		l2cap_request_free(req);
    401 		l2cap_close(chan, ECONNREFUSED);
    402 		break;
    403 	}
    404 }
    405 
    406 /*
    407  * Process Received Config Reqest.
    408  */
    409 static void
    410 l2cap_recv_config_req(struct mbuf *m, struct hci_link *link)
    411 {
    412 	uint8_t buf[L2CAP_MTU_MINIMUM];
    413 	l2cap_cmd_hdr_t cmd;
    414 	l2cap_cfg_req_cp cp;
    415 	l2cap_cfg_opt_t opt;
    416 	l2cap_cfg_opt_val_t val;
    417 	l2cap_cfg_rsp_cp rp;
    418 	struct l2cap_channel *chan;
    419 	int left, len;
    420 
    421 	m_copydata(m, 0, sizeof(cmd), &cmd);
    422 	m_adj(m, sizeof(cmd));
    423 	left = le16toh(cmd.length);
    424 
    425 	if (left < sizeof(cp))
    426 		goto reject;
    427 
    428 	m_copydata(m, 0, sizeof(cp), &cp);
    429 	m_adj(m, sizeof(cp));
    430 	left -= sizeof(cp);
    431 
    432 	cp.dcid = le16toh(cp.dcid);
    433 	cp.flags = le16toh(cp.flags);
    434 
    435 	chan = l2cap_cid_lookup(cp.dcid);
    436 	if (chan == NULL || chan->lc_link != link
    437 	    || chan->lc_state != L2CAP_WAIT_CONFIG
    438 	    || (chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
    439 		/* XXX we should really accept reconfiguration requests */
    440 		l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
    441 					L2CAP_NULL_CID, cp.dcid);
    442 		goto out;
    443 	}
    444 
    445 	/* ready our response packet */
    446 	rp.scid = htole16(chan->lc_rcid);
    447 	rp.flags = 0;	/* "No Continuation" */
    448 	rp.result = L2CAP_SUCCESS;
    449 	len = sizeof(rp);
    450 
    451 	/*
    452 	 * Process the packet. We build the return packet on the fly adding any
    453 	 * unacceptable parameters as we go. As we can only return one result,
    454 	 * unknown option takes precedence so we start our return packet anew
    455 	 * and ignore option values thereafter as they will be re-sent.
    456 	 *
    457 	 * Since we do not support enough options to make overflowing the min
    458 	 * MTU size an issue in normal use, we just reject config requests that
    459 	 * make that happen. This could be because options are repeated or the
    460 	 * packet is corrupted in some way.
    461 	 *
    462 	 * If unknown option types threaten to overflow the packet, we just
    463 	 * ignore them. We can deny them next time.
    464 	 */
    465 	while (left > 0) {
    466 		if (left < sizeof(opt))
    467 			goto reject;
    468 
    469 		m_copydata(m, 0, sizeof(opt), &opt);
    470 		m_adj(m, sizeof(opt));
    471 		left -= sizeof(opt);
    472 
    473 		if (left < opt.length)
    474 			goto reject;
    475 
    476 		switch(opt.type & L2CAP_OPT_HINT_MASK) {
    477 		case L2CAP_OPT_MTU:
    478 			if (rp.result == L2CAP_UNKNOWN_OPTION)
    479 				break;
    480 
    481 			if (opt.length != L2CAP_OPT_MTU_SIZE)
    482 				goto reject;
    483 
    484 			m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
    485 			val.mtu = le16toh(val.mtu);
    486 
    487 			/*
    488 			 * XXX how do we know what the minimum acceptable MTU is
    489 			 * for a channel? Spec says some profiles have a higher
    490 			 * minimum but I have no way to find that out at this
    491 			 * juncture..
    492 			 */
    493 			if (val.mtu < L2CAP_MTU_MINIMUM) {
    494 				if (len + sizeof(opt) + L2CAP_OPT_MTU_SIZE > sizeof(buf))
    495 					goto reject;
    496 
    497 				rp.result = L2CAP_UNACCEPTABLE_PARAMS;
    498 				memcpy(buf + len, &opt, sizeof(opt));
    499 				len += sizeof(opt);
    500 				val.mtu = htole16(L2CAP_MTU_MINIMUM);
    501 				memcpy(buf + len, &val, L2CAP_OPT_MTU_SIZE);
    502 				len += L2CAP_OPT_MTU_SIZE;
    503 			} else
    504 				chan->lc_omtu = val.mtu;
    505 
    506 			break;
    507 
    508 		case L2CAP_OPT_FLUSH_TIMO:
    509 			if (rp.result == L2CAP_UNKNOWN_OPTION)
    510 				break;
    511 
    512 			if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
    513 				goto reject;
    514 
    515 			/*
    516 			 * I think that this is informational only - he is
    517 			 * informing us of the flush timeout he will be using.
    518 			 * I dont think this affects us in any significant way,
    519 			 * so just ignore this value for now.
    520 			 */
    521 			break;
    522 
    523 		case L2CAP_OPT_QOS:
    524 		default:
    525 			/* ignore hints */
    526 			if (opt.type & L2CAP_OPT_HINT_BIT)
    527 				break;
    528 
    529 			/* unknown options supercede all else */
    530 			if (rp.result != L2CAP_UNKNOWN_OPTION) {
    531 				rp.result = L2CAP_UNKNOWN_OPTION;
    532 				len = sizeof(rp);
    533 			}
    534 
    535 			/* ignore if it don't fit */
    536 			if (len + sizeof(opt) > sizeof(buf))
    537 				break;
    538 
    539 			/* return unknown option type, but no data */
    540 			buf[len++] = opt.type;
    541 			buf[len++] = 0;
    542 			break;
    543 		}
    544 
    545 		m_adj(m, opt.length);
    546 		left -= opt.length;
    547 	}
    548 
    549 	rp.result = htole16(rp.result);
    550 	memcpy(buf, &rp, sizeof(rp));
    551 	l2cap_send_signal(link, L2CAP_CONFIG_RSP, cmd.ident, len, buf);
    552 
    553 	if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0
    554 	    && rp.result == le16toh(L2CAP_SUCCESS)) {
    555 
    556 		chan->lc_flags &= ~L2CAP_WAIT_CONFIG_REQ;
    557 
    558 		if ((chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0) {
    559 			chan->lc_state = L2CAP_OPEN;
    560 			/* XXX how to distinguish REconfiguration? */
    561 			(*chan->lc_proto->connected)(chan->lc_upper);
    562 		}
    563 	}
    564 	return;
    565 
    566 reject:
    567 	l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
    568 out:
    569 	m_adj(m, left);
    570 }
    571 
    572 /*
    573  * Process Received Config Response.
    574  */
    575 static void
    576 l2cap_recv_config_rsp(struct mbuf *m, struct hci_link *link)
    577 {
    578 	l2cap_cmd_hdr_t cmd;
    579 	l2cap_cfg_rsp_cp cp;
    580 	l2cap_cfg_opt_t opt;
    581 	l2cap_cfg_opt_val_t val;
    582 	struct l2cap_req *req;
    583 	struct l2cap_channel *chan;
    584 	int left;
    585 
    586 	m_copydata(m, 0, sizeof(cmd), &cmd);
    587 	m_adj(m, sizeof(cmd));
    588 	left = le16toh(cmd.length);
    589 
    590 	if (left < sizeof(cp))
    591 		goto out;
    592 
    593 	m_copydata(m, 0, sizeof(cp), &cp);
    594 	m_adj(m, sizeof(cp));
    595 	left -= sizeof(cp);
    596 
    597 	cp.scid = le16toh(cp.scid);
    598 	cp.flags = le16toh(cp.flags);
    599 	cp.result = le16toh(cp.result);
    600 
    601 	req = l2cap_request_lookup(link, cmd.ident);
    602 	if (req == NULL || req->lr_code != L2CAP_CONFIG_REQ)
    603 		goto out;
    604 
    605 	chan = req->lr_chan;
    606 	if (chan != NULL && chan->lc_lcid != cp.scid)
    607 		goto out;
    608 
    609 	l2cap_request_free(req);
    610 
    611 	if (chan == NULL || chan->lc_state != L2CAP_WAIT_CONFIG
    612 	    || (chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0)
    613 		goto out;
    614 
    615 	if ((cp.flags & L2CAP_OPT_CFLAG_BIT)) {
    616 		l2cap_cfg_req_cp rp;
    617 
    618 		/*
    619 		 * They have more to tell us and want another ID to
    620 		 * use, so send an empty config request
    621 		 */
    622 		if (l2cap_request_alloc(chan, L2CAP_CONFIG_REQ))
    623 			goto discon;
    624 
    625 		rp.dcid = htole16(cp.scid);
    626 		rp.flags = 0;
    627 
    628 		if (l2cap_send_signal(link, L2CAP_CONFIG_REQ, link->hl_lastid,
    629 					sizeof(rp), &rp))
    630 			goto discon;
    631 	}
    632 
    633 	switch(cp.result) {
    634 	case L2CAP_SUCCESS:
    635 		/*
    636 		 * If continuation flag was not set, our config request was
    637 		 * accepted. We may have to wait for their config request to
    638 		 * complete, so check that but otherwise we are open
    639 		 *
    640 		 * There may be 'advisory' values in the packet but we just
    641 		 * ignore those..
    642 		 */
    643 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0) {
    644 			chan->lc_flags &= ~L2CAP_WAIT_CONFIG_RSP;
    645 
    646 			if ((chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
    647 				chan->lc_state = L2CAP_OPEN;
    648 				/* XXX how to distinguish REconfiguration? */
    649 				(*chan->lc_proto->connected)(chan->lc_upper);
    650 			}
    651 		}
    652 		goto out;
    653 
    654 	case L2CAP_UNACCEPTABLE_PARAMS:
    655 		/*
    656 		 * Packet contains unacceptable parameters with preferred values
    657 		 */
    658 		while (left > 0) {
    659 			if (left < sizeof(opt))
    660 				goto discon;
    661 
    662 			m_copydata(m, 0, sizeof(opt), &opt);
    663 			m_adj(m, sizeof(opt));
    664 			left -= sizeof(opt);
    665 
    666 			if (left < opt.length)
    667 				goto discon;
    668 
    669 			switch (opt.type) {
    670 			case L2CAP_OPT_MTU:
    671 				if (opt.length != L2CAP_OPT_MTU_SIZE)
    672 					goto discon;
    673 
    674 				m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
    675 				chan->lc_imtu = le16toh(val.mtu);
    676 				if (chan->lc_imtu < L2CAP_MTU_MINIMUM)
    677 					chan->lc_imtu = L2CAP_MTU_DEFAULT;
    678 				break;
    679 
    680 			case L2CAP_OPT_FLUSH_TIMO:
    681 				if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
    682 					goto discon;
    683 
    684 				/*
    685 				 * Spec says: If we cannot honor proposed value,
    686 				 * either disconnect or try again with original
    687 				 * value. I can't really see why they want to
    688 				 * interfere with OUR flush timeout in any case
    689 				 * so we just punt for now.
    690 				 */
    691 				goto discon;
    692 
    693 			case L2CAP_OPT_QOS:
    694 				break;
    695 
    696 			default:
    697 				UNKNOWN(opt.type);
    698 				goto discon;
    699 			}
    700 
    701 			m_adj(m, opt.length);
    702 			left -= opt.length;
    703 		}
    704 
    705 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
    706 			l2cap_send_config_req(chan);	/* no state change */
    707 
    708 		goto out;
    709 
    710 	case L2CAP_REJECT:
    711 		goto discon;
    712 
    713 	case L2CAP_UNKNOWN_OPTION:
    714 		/*
    715 		 * Packet contains options not understood. Turn off unknown
    716 		 * options by setting them to default values (means they will
    717 		 * not be requested again).
    718 		 *
    719 		 * If our option was already off then fail (paranoia?)
    720 		 *
    721 		 * XXX Should we consider that options were set for a reason?
    722 		 */
    723 		while (left > 0) {
    724 			if (left < sizeof(opt))
    725 				goto discon;
    726 
    727 			m_copydata(m, 0, sizeof(opt), &opt);
    728 			m_adj(m, sizeof(opt));
    729 			left -= sizeof(opt);
    730 
    731 			if (left < opt.length)
    732 				goto discon;
    733 
    734 			m_adj(m, opt.length);
    735 			left -= opt.length;
    736 
    737 			switch(opt.type) {
    738 			case L2CAP_OPT_MTU:
    739 				if (chan->lc_imtu == L2CAP_MTU_DEFAULT)
    740 					goto discon;
    741 
    742 				chan->lc_imtu = L2CAP_MTU_DEFAULT;
    743 				break;
    744 
    745 			case L2CAP_OPT_FLUSH_TIMO:
    746 				if (chan->lc_flush == L2CAP_FLUSH_TIMO_DEFAULT)
    747 					goto discon;
    748 
    749 				chan->lc_flush = L2CAP_FLUSH_TIMO_DEFAULT;
    750 				break;
    751 
    752 			case L2CAP_OPT_QOS:
    753 				break;
    754 
    755 			default:
    756 				UNKNOWN(opt.type);
    757 				goto discon;
    758 			}
    759 		}
    760 
    761 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
    762 			l2cap_send_config_req(chan);	/* no state change */
    763 
    764 		goto out;
    765 
    766 	default:
    767 		UNKNOWN(cp.result);
    768 		goto discon;
    769 	}
    770 
    771 	DPRINTF("how did I get here!?\n");
    772 
    773 discon:
    774 	l2cap_send_disconnect_req(chan);
    775 	l2cap_close(chan, ECONNABORTED);
    776 
    777 out:
    778 	m_adj(m, left);
    779 }
    780 
    781 /*
    782  * Process Received Disconnect Request. We must validate scid and dcid
    783  * just in case but otherwise this connection is finished.
    784  */
    785 static void
    786 l2cap_recv_disconnect_req(struct mbuf *m, struct hci_link *link)
    787 {
    788 	l2cap_cmd_hdr_t cmd;
    789 	l2cap_discon_req_cp cp;
    790 	l2cap_discon_rsp_cp rp;
    791 	struct l2cap_channel *chan;
    792 
    793 	m_copydata(m, 0, sizeof(cmd), &cmd);
    794 	m_adj(m, sizeof(cmd));
    795 
    796 	m_copydata(m, 0, sizeof(cp), &cp);
    797 	m_adj(m, sizeof(cp));
    798 
    799 	cp.scid = le16toh(cp.scid);
    800 	cp.dcid = le16toh(cp.dcid);
    801 
    802 	chan = l2cap_cid_lookup(cp.dcid);
    803 	if (chan == NULL || chan->lc_link != link || chan->lc_rcid != cp.scid) {
    804 		l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
    805 					cp.dcid, cp.scid);
    806 		return;
    807 	}
    808 
    809 	rp.dcid = htole16(chan->lc_lcid);
    810 	rp.scid = htole16(chan->lc_rcid);
    811 	l2cap_send_signal(link, L2CAP_DISCONNECT_RSP, cmd.ident,
    812 				sizeof(rp), &rp);
    813 
    814 	if (chan->lc_state != L2CAP_CLOSED)
    815 		l2cap_close(chan, 0);
    816 }
    817 
    818 /*
    819  * Process Received Disconnect Response. We must validate scid and dcid but
    820  * unless we were waiting for this signal, ignore it.
    821  */
    822 static void
    823 l2cap_recv_disconnect_rsp(struct mbuf *m, struct hci_link *link)
    824 {
    825 	l2cap_cmd_hdr_t cmd;
    826 	l2cap_discon_rsp_cp cp;
    827 	struct l2cap_req *req;
    828 	struct l2cap_channel *chan;
    829 
    830 	m_copydata(m, 0, sizeof(cmd), &cmd);
    831 	m_adj(m, sizeof(cmd));
    832 
    833 	m_copydata(m, 0, sizeof(cp), &cp);
    834 	m_adj(m, sizeof(cp));
    835 
    836 	cp.scid = le16toh(cp.scid);
    837 	cp.dcid = le16toh(cp.dcid);
    838 
    839 	req = l2cap_request_lookup(link, cmd.ident);
    840 	if (req == NULL || req->lr_code != L2CAP_DISCONNECT_REQ)
    841 		return;
    842 
    843 	chan = req->lr_chan;
    844 	if (chan == NULL
    845 	    || chan->lc_lcid != cp.scid
    846 	    || chan->lc_rcid != cp.dcid)
    847 		return;
    848 
    849 	l2cap_request_free(req);
    850 
    851 	if (chan->lc_state != L2CAP_WAIT_DISCONNECT)
    852 		return;
    853 
    854 	l2cap_close(chan, 0);
    855 }
    856 
    857 /*
    858  * Process Received Info Request.
    859  */
    860 static void
    861 l2cap_recv_info_req(struct mbuf *m, struct hci_link *link)
    862 {
    863 	l2cap_cmd_hdr_t cmd;
    864 	l2cap_info_req_cp cp;
    865 	uint8_t rsp[12];
    866 
    867 	m_copydata(m, 0, sizeof(cmd), &cmd);
    868 	m_adj(m, sizeof(cmd));
    869 
    870 	m_copydata(m, 0, sizeof(cp), &cp);
    871 	m_adj(m, sizeof(cp));
    872 
    873 	cp.type = le16toh(cp.type);
    874 	switch(cp.type) {
    875 	case L2CAP_EXTENDED_FEATURES:
    876 		/*
    877 		 * 32-bit data field, unused bits set to zero
    878 		 *
    879 		 * octet bit feature
    880 		 *   0   0   Flow control mode
    881 		 *   0   1   Retransmission mode
    882 		 *   0   2   Bi-directional QoS
    883 		 *   0   3   Enhanced retransmission mode
    884 		 *   0   4   Streaming mode
    885 		 *   0   5   FCS option
    886 		 *   0   6   Extended flow specification for BR/EDR
    887 		 *   0   7   Fixed channels (SET)
    888 		 *   1   0   Extended window size
    889 		 *   1   1   Unicast connectionless data reception
    890 		 */
    891 		le16enc(rsp + 0, cp.type);
    892 		le16enc(rsp + 2, L2CAP_SUCCESS);
    893 		le32enc(rsp + 4, 0x00000080);
    894 		l2cap_send_signal(link, L2CAP_INFO_RSP, cmd.ident, 8, rsp);
    895 		break;
    896 
    897 	case L2CAP_FIXED_CHANNELS:
    898 		/*
    899 		 * 64-bit data field, unused bits set to zero
    900 		 *
    901 		 * octet bit channel
    902 		 *   0   0   0x0000 Null
    903 		 *   0   1   0x0001 L2CAP Signalling Channel (SET)
    904 		 *   0   2   0x0002 Connectionless Reception
    905 		 *   0   3   0x0003 AMP Manager Protocol Channel
    906 		 */
    907 		le16enc(rsp + 0, cp.type);
    908 		le16enc(rsp + 2, L2CAP_SUCCESS);
    909 		le64enc(rsp + 4, 0x0000000000000002);
    910 		l2cap_send_signal(link, L2CAP_INFO_RSP, cmd.ident, 12, rsp);
    911 		break;
    912 
    913 	case L2CAP_CONNLESS_MTU:
    914 	default:
    915 		le16enc(rsp + 0, cp.type);
    916 		le16enc(rsp + 2, L2CAP_NOT_SUPPORTED);
    917 		l2cap_send_signal(link, L2CAP_INFO_RSP, cmd.ident, 4, rsp);
    918 		break;
    919 	}
    920 }
    921 
    922 /*
    923  * Construct signal and wrap in C-Frame for link.
    924  */
    925 static int
    926 l2cap_send_signal(struct hci_link *link, uint8_t code, uint8_t ident,
    927 			uint16_t length, void *data)
    928 {
    929 	struct mbuf *m;
    930 	l2cap_hdr_t *hdr;
    931 	l2cap_cmd_hdr_t *cmd;
    932 
    933 #ifdef DIAGNOSTIC
    934 	if (link == NULL)
    935 		return ENETDOWN;
    936 
    937 	if (sizeof(l2cap_cmd_hdr_t) + length > link->hl_mtu)
    938 		aprint_error_dev(link->hl_unit->hci_dev,
    939 		    "exceeding L2CAP Signal MTU for link!\n");
    940 #endif
    941 
    942 	m = m_gethdr(M_DONTWAIT, MT_DATA);
    943 	if (m == NULL)
    944 		return ENOMEM;
    945 
    946 	hdr = mtod(m, l2cap_hdr_t *);
    947 	cmd = (l2cap_cmd_hdr_t *)(hdr + 1);
    948 
    949 	m->m_len = m->m_pkthdr.len = MHLEN;
    950 
    951 	/* Command Data */
    952 	if (length > 0)
    953 		m_copyback(m, sizeof(*hdr) + sizeof(*cmd), length, data);
    954 
    955 	/* Command Header */
    956 	cmd->code = code;
    957 	cmd->ident = ident;
    958 	cmd->length = htole16(length);
    959 	length += sizeof(*cmd);
    960 
    961 	/* C-Frame Header */
    962 	hdr->length = htole16(length);
    963 	hdr->dcid = htole16(L2CAP_SIGNAL_CID);
    964 	length += sizeof(*hdr);
    965 
    966 	if (m->m_pkthdr.len != MAX(MHLEN, length)) {
    967 		m_freem(m);
    968 		return ENOMEM;
    969 	}
    970 
    971 	m->m_pkthdr.len = length;
    972 	m->m_len = MIN(length, MHLEN);
    973 
    974 	DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
    975 		device_xname(link->hl_unit->hci_dev), code, ident, length);
    976 
    977 	return hci_acl_send(m, link, NULL);
    978 }
    979 
    980 /*
    981  * Send Command Reject packet.
    982  */
    983 static int
    984 l2cap_send_command_rej(struct hci_link *link, uint8_t ident,
    985 			uint16_t reason, ...)
    986 {
    987 	l2cap_cmd_rej_cp cp;
    988 	int len = 0;
    989 	va_list ap;
    990 
    991 	va_start(ap, reason);
    992 
    993 	cp.reason = htole16(reason);
    994 
    995 	switch (reason) {
    996 	case L2CAP_REJ_NOT_UNDERSTOOD:
    997 		len = 2;
    998 		break;
    999 
   1000 	case L2CAP_REJ_MTU_EXCEEDED:
   1001 		len = 4;
   1002 		cp.data[0] = va_arg(ap, int);		/* SigMTU */
   1003 		cp.data[0] = htole16(cp.data[0]);
   1004 		break;
   1005 
   1006 	case L2CAP_REJ_INVALID_CID:
   1007 		len = 6;
   1008 		cp.data[0] = va_arg(ap, int);		/* dcid */
   1009 		cp.data[0] = htole16(cp.data[0]);
   1010 		cp.data[1] = va_arg(ap, int);		/* scid */
   1011 		cp.data[1] = htole16(cp.data[1]);
   1012 		break;
   1013 
   1014 	default:
   1015 		UNKNOWN(reason);
   1016 		return EINVAL;
   1017 	}
   1018 
   1019 	va_end(ap);
   1020 
   1021 	return l2cap_send_signal(link, L2CAP_COMMAND_REJ, ident, len, &cp);
   1022 }
   1023 
   1024 /*
   1025  * Send Connect Request
   1026  */
   1027 int
   1028 l2cap_send_connect_req(struct l2cap_channel *chan)
   1029 {
   1030 	l2cap_con_req_cp cp;
   1031 	int err;
   1032 
   1033 	err = l2cap_request_alloc(chan, L2CAP_CONNECT_REQ);
   1034 	if (err)
   1035 		return err;
   1036 
   1037 	cp.psm = htole16(chan->lc_raddr.bt_psm);
   1038 	cp.scid = htole16(chan->lc_lcid);
   1039 
   1040 	return l2cap_send_signal(chan->lc_link, L2CAP_CONNECT_REQ,
   1041 				chan->lc_link->hl_lastid, sizeof(cp), &cp);
   1042 }
   1043 
   1044 /*
   1045  * Send Config Request
   1046  *
   1047  * For outgoing config request, we only put options in the packet if they
   1048  * differ from the default and would have to be actioned. We dont support
   1049  * enough option types to make overflowing SigMTU an issue so it can all
   1050  * go in one packet.
   1051  */
   1052 int
   1053 l2cap_send_config_req(struct l2cap_channel *chan)
   1054 {
   1055 	l2cap_cfg_req_cp *cp;
   1056 	l2cap_cfg_opt_t *opt;
   1057 	l2cap_cfg_opt_val_t *val;
   1058 	uint8_t *next, buf[L2CAP_MTU_MINIMUM];
   1059 	int err;
   1060 
   1061 	err = l2cap_request_alloc(chan, L2CAP_CONFIG_REQ);
   1062 	if (err)
   1063 		return err;
   1064 
   1065 	/* Config Header (4 octets) */
   1066 	cp = (l2cap_cfg_req_cp *)buf;
   1067 	cp->dcid = htole16(chan->lc_rcid);
   1068 	cp->flags = 0;	/* "No Continuation" */
   1069 
   1070 	next = buf + sizeof(l2cap_cfg_req_cp);
   1071 
   1072 	/* Incoming MTU (4 octets) */
   1073 	if (chan->lc_imtu != L2CAP_MTU_DEFAULT) {
   1074 		opt = (l2cap_cfg_opt_t *)next;
   1075 		opt->type = L2CAP_OPT_MTU;
   1076 		opt->length = L2CAP_OPT_MTU_SIZE;
   1077 
   1078 		val = (l2cap_cfg_opt_val_t *)(opt + 1);
   1079 		val->mtu = htole16(chan->lc_imtu);
   1080 
   1081 		next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_MTU_SIZE;
   1082 	}
   1083 
   1084 	/* Flush Timeout (4 octets) */
   1085 	if (chan->lc_flush != L2CAP_FLUSH_TIMO_DEFAULT) {
   1086 		opt = (l2cap_cfg_opt_t *)next;
   1087 		opt->type = L2CAP_OPT_FLUSH_TIMO;
   1088 		opt->length = L2CAP_OPT_FLUSH_TIMO_SIZE;
   1089 
   1090 		val = (l2cap_cfg_opt_val_t *)(opt + 1);
   1091 		val->flush_timo = htole16(chan->lc_flush);
   1092 
   1093 		next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_FLUSH_TIMO_SIZE;
   1094 	}
   1095 
   1096 	/* Outgoing QoS Flow (24 octets) */
   1097 	/* Retransmission & Flow Control (11 octets) */
   1098 	/*
   1099 	 * From here we need to start paying attention to SigMTU as we have
   1100 	 * possibly overflowed the minimum supported..
   1101 	 */
   1102 
   1103 	return l2cap_send_signal(chan->lc_link, L2CAP_CONFIG_REQ,
   1104 				    chan->lc_link->hl_lastid, (int)(next - buf), buf);
   1105 }
   1106 
   1107 /*
   1108  * Send Disconnect Request
   1109  */
   1110 int
   1111 l2cap_send_disconnect_req(struct l2cap_channel *chan)
   1112 {
   1113 	l2cap_discon_req_cp cp;
   1114 	int err;
   1115 
   1116 	err = l2cap_request_alloc(chan, L2CAP_DISCONNECT_REQ);
   1117 	if (err)
   1118 		return err;
   1119 
   1120 	cp.dcid = htole16(chan->lc_rcid);
   1121 	cp.scid = htole16(chan->lc_lcid);
   1122 
   1123 	return l2cap_send_signal(chan->lc_link, L2CAP_DISCONNECT_REQ,
   1124 				    chan->lc_link->hl_lastid, sizeof(cp), &cp);
   1125 }
   1126 
   1127 /*
   1128  * Send Connect Response
   1129  */
   1130 int
   1131 l2cap_send_connect_rsp(struct hci_link *link, uint8_t ident, uint16_t dcid, uint16_t scid, uint16_t result)
   1132 {
   1133 	l2cap_con_rsp_cp cp;
   1134 
   1135 	memset(&cp, 0, sizeof(cp));
   1136 	cp.dcid = htole16(dcid);
   1137 	cp.scid = htole16(scid);
   1138 	cp.result = htole16(result);
   1139 
   1140 	return l2cap_send_signal(link, L2CAP_CONNECT_RSP, ident, sizeof(cp), &cp);
   1141 }
   1142