Home | History | Annotate | Line # | Download | only in netbt
l2cap_signal.c revision 1.6
      1 /*	$NetBSD: l2cap_signal.c,v 1.6 2007/03/15 19:47:51 plunky Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2005 Iain Hibbert.
      5  * Copyright (c) 2006 Itronix Inc.
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  * 1. Redistributions of source code must retain the above copyright
     12  *    notice, this list of conditions and the following disclaimer.
     13  * 2. Redistributions in binary form must reproduce the above copyright
     14  *    notice, this list of conditions and the following disclaimer in the
     15  *    documentation and/or other materials provided with the distribution.
     16  * 3. The name of Itronix Inc. may not be used to endorse
     17  *    or promote products derived from this software without specific
     18  *    prior written permission.
     19  *
     20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
     21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
     24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
     25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
     27  * ON ANY THEORY OF LIABILITY, WHETHER IN
     28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     30  * POSSIBILITY OF SUCH DAMAGE.
     31  */
     32 
     33 #include <sys/cdefs.h>
     34 __KERNEL_RCSID(0, "$NetBSD: l2cap_signal.c,v 1.6 2007/03/15 19:47:51 plunky Exp $");
     35 
     36 #include <sys/param.h>
     37 #include <sys/kernel.h>
     38 #include <sys/mbuf.h>
     39 #include <sys/proc.h>
     40 #include <sys/queue.h>
     41 #include <sys/systm.h>
     42 
     43 #include <machine/stdarg.h>
     44 
     45 #include <netbt/bluetooth.h>
     46 #include <netbt/hci.h>
     47 #include <netbt/l2cap.h>
     48 
     49 /*******************************************************************************
     50  *
     51  *	L2CAP Signal processing
     52  */
     53 
     54 static void l2cap_recv_command_rej(struct mbuf *, struct hci_link *);
     55 static void l2cap_recv_connect_req(struct mbuf *, struct hci_link *);
     56 static void l2cap_recv_connect_rsp(struct mbuf *, struct hci_link *);
     57 static void l2cap_recv_config_req(struct mbuf *, struct hci_link *);
     58 static void l2cap_recv_config_rsp(struct mbuf *, struct hci_link *);
     59 static void l2cap_recv_disconnect_req(struct mbuf *, struct hci_link *);
     60 static void l2cap_recv_disconnect_rsp(struct mbuf *, struct hci_link *);
     61 static void l2cap_recv_info_req(struct mbuf *, struct hci_link *);
     62 static int l2cap_send_signal(struct hci_link *, uint8_t, uint8_t, uint16_t, void *);
     63 static int l2cap_send_command_rej(struct hci_link *, uint8_t, uint16_t, ...);
     64 
     65 /*
     66  * process incoming signal packets (CID 0x0001). Can contain multiple
     67  * requests/responses.
     68  */
     69 void
     70 l2cap_recv_signal(struct mbuf *m, struct hci_link *link)
     71 {
     72 	l2cap_cmd_hdr_t cmd;
     73 
     74 	for(;;) {
     75 		if (m->m_pkthdr.len == 0)
     76 			goto finish;
     77 
     78 		if (m->m_pkthdr.len < sizeof(cmd))
     79 			goto reject;
     80 
     81 		m_copydata(m, 0, sizeof(cmd), &cmd);
     82 		cmd.length = le16toh(cmd.length);
     83 
     84 		if (m->m_pkthdr.len < sizeof(cmd) + cmd.length)
     85 			goto reject;
     86 
     87 		DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
     88 			link->hl_unit->hci_devname,
     89 			cmd.code, cmd.ident, cmd.length);
     90 
     91 		switch (cmd.code) {
     92 		case L2CAP_COMMAND_REJ:
     93 			if (cmd.length > sizeof(l2cap_cmd_rej_cp))
     94 				goto finish;
     95 
     96 			l2cap_recv_command_rej(m, link);
     97 			break;
     98 
     99 		case L2CAP_CONNECT_REQ:
    100 			if (cmd.length != sizeof(l2cap_con_req_cp))
    101 				goto reject;
    102 
    103 			l2cap_recv_connect_req(m, link);
    104 			break;
    105 
    106 		case L2CAP_CONNECT_RSP:
    107 			if (cmd.length != sizeof(l2cap_con_rsp_cp))
    108 				goto finish;
    109 
    110 			l2cap_recv_connect_rsp(m, link);
    111 			break;
    112 
    113 		case L2CAP_CONFIG_REQ:
    114 			l2cap_recv_config_req(m, link);
    115 			break;
    116 
    117 		case L2CAP_CONFIG_RSP:
    118 			l2cap_recv_config_rsp(m, link);
    119 			break;
    120 
    121 		case L2CAP_DISCONNECT_REQ:
    122 			if (cmd.length != sizeof(l2cap_discon_req_cp))
    123 				goto reject;
    124 
    125 			l2cap_recv_disconnect_req(m, link);
    126 			break;
    127 
    128 		case L2CAP_DISCONNECT_RSP:
    129 			if (cmd.length != sizeof(l2cap_discon_rsp_cp))
    130 				goto finish;
    131 
    132 			l2cap_recv_disconnect_rsp(m, link);
    133 			break;
    134 
    135 		case L2CAP_ECHO_REQ:
    136 			m_adj(m, sizeof(cmd) + cmd.length);
    137 			l2cap_send_signal(link, L2CAP_ECHO_RSP, cmd.ident,
    138 					0, NULL);
    139 			break;
    140 
    141 		case L2CAP_ECHO_RSP:
    142 			m_adj(m, sizeof(cmd) + cmd.length);
    143 			break;
    144 
    145 		case L2CAP_INFO_REQ:
    146 			if (cmd.length != sizeof(l2cap_info_req_cp))
    147 				goto reject;
    148 
    149 			l2cap_recv_info_req(m, link);
    150 			break;
    151 
    152 		case L2CAP_INFO_RSP:
    153 			m_adj(m, sizeof(cmd) + cmd.length);
    154 			break;
    155 
    156 		default:
    157 			goto reject;
    158 		}
    159 	}
    160 
    161 #ifdef DIAGNOSTIC
    162 	panic("impossible!");
    163 #endif
    164 
    165 reject:
    166 	l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
    167 finish:
    168 	m_freem(m);
    169 }
    170 
    171 /*
    172  * Process Received Command Reject. For now we dont try to recover gracefully
    173  * from this, it probably means that the link is garbled or the other end is
    174  * insufficiently capable of handling normal traffic. (not *my* fault, no way!)
    175  */
    176 static void
    177 l2cap_recv_command_rej(struct mbuf *m, struct hci_link *link)
    178 {
    179 	struct l2cap_req *req;
    180 	struct l2cap_channel *chan;
    181 	l2cap_cmd_hdr_t cmd;
    182 	l2cap_cmd_rej_cp cp;
    183 
    184 	m_copydata(m, 0, sizeof(cmd), &cmd);
    185 	m_adj(m, sizeof(cmd));
    186 
    187 	cmd.length = le16toh(cmd.length);
    188 
    189 	m_copydata(m, 0, cmd.length, &cp);
    190 	m_adj(m, cmd.length);
    191 
    192 	req = l2cap_request_lookup(link, cmd.ident);
    193 	if (req == NULL)
    194 		return;
    195 
    196 	switch (le16toh(cp.reason)) {
    197 	case L2CAP_REJ_NOT_UNDERSTOOD:
    198 		/*
    199 		 * I dont know what to do, just move up the timeout
    200 		 */
    201 		callout_schedule(&req->lr_rtx, 0);
    202 		break;
    203 
    204 	case L2CAP_REJ_MTU_EXCEEDED:
    205 		/*
    206 		 * I didnt send any commands over L2CAP_MTU_MINIMUM size, but..
    207 		 *
    208 		 * XXX maybe we should resend this, instead?
    209 		 */
    210 		link->hl_mtu = le16toh(cp.data[0]);
    211 		callout_schedule(&req->lr_rtx, 0);
    212 		break;
    213 
    214 	case L2CAP_REJ_INVALID_CID:
    215 		/*
    216 		 * Well, if they dont have such a channel then our channel is
    217 		 * most likely closed. Make it so.
    218 		 */
    219 		chan = req->lr_chan;
    220 		l2cap_request_free(req);
    221 		if (chan != NULL && chan->lc_state != L2CAP_CLOSED)
    222 			l2cap_close(chan, ECONNABORTED);
    223 
    224 		break;
    225 
    226 	default:
    227 		UNKNOWN(le16toh(cp.reason));
    228 		break;
    229 	}
    230 }
    231 
    232 /*
    233  * Process Received Connect Request. Find listening channel matching
    234  * psm & addr and ask upper layer for a new channel.
    235  */
    236 static void
    237 l2cap_recv_connect_req(struct mbuf *m, struct hci_link *link)
    238 {
    239 	struct sockaddr_bt laddr, raddr;
    240 	struct l2cap_channel *chan, *new;
    241 	l2cap_cmd_hdr_t cmd;
    242 	l2cap_con_req_cp cp;
    243 	l2cap_con_rsp_cp rp;
    244 	int err;
    245 
    246 	/* extract cmd */
    247 	m_copydata(m, 0, sizeof(cmd), &cmd);
    248 	m_adj(m, sizeof(cmd));
    249 
    250 	/* extract request */
    251 	m_copydata(m, 0, sizeof(cp), &cp);
    252 	m_adj(m, sizeof(cp));
    253 
    254 	/* init response */
    255 	memset(&rp, 0, sizeof(rp));
    256 	rp.scid = cp.scid;
    257 
    258 	memset(&laddr, 0, sizeof(struct sockaddr_bt));
    259 	laddr.bt_len = sizeof(struct sockaddr_bt);
    260 	laddr.bt_family = AF_BLUETOOTH;
    261 	laddr.bt_psm = le16toh(cp.psm);
    262 	bdaddr_copy(&laddr.bt_bdaddr, &link->hl_unit->hci_bdaddr);
    263 
    264 	memset(&raddr, 0, sizeof(struct sockaddr_bt));
    265 	raddr.bt_len = sizeof(struct sockaddr_bt);
    266 	raddr.bt_family = AF_BLUETOOTH;
    267 	raddr.bt_psm = le16toh(cp.psm);
    268 	bdaddr_copy(&raddr.bt_bdaddr, &link->hl_bdaddr);
    269 
    270 	LIST_FOREACH(chan, &l2cap_listen_list, lc_ncid) {
    271 		if (chan->lc_laddr.bt_psm != laddr.bt_psm
    272 		    && chan->lc_laddr.bt_psm != L2CAP_PSM_ANY)
    273 			continue;
    274 
    275 		if (!bdaddr_same(&laddr.bt_bdaddr, &chan->lc_laddr.bt_bdaddr)
    276 		    && bdaddr_any(&chan->lc_laddr.bt_bdaddr) == 0)
    277 			continue;
    278 
    279 		new= (*chan->lc_proto->newconn)(chan->lc_upper, &laddr, &raddr);
    280 		if (new == NULL)
    281 			continue;
    282 
    283 		err = l2cap_cid_alloc(new);
    284 		if (err) {
    285 			rp.result = htole16(L2CAP_NO_RESOURCES);
    286 			l2cap_send_signal(link, L2CAP_CONNECT_RSP,
    287 						cmd.ident, sizeof(rp), &rp);
    288 			(*new->lc_proto->disconnected)(new->lc_upper, err);
    289 			return;
    290 		}
    291 
    292 		new->lc_link = hci_acl_open(link->hl_unit, &link->hl_bdaddr);
    293 		KASSERT(new->lc_link == link);
    294 
    295 		new->lc_rcid = le16toh(cp.scid);
    296 
    297 		memcpy(&new->lc_laddr, &laddr, sizeof(struct sockaddr_bt));
    298 		memcpy(&new->lc_raddr, &raddr, sizeof(struct sockaddr_bt));
    299 
    300 		rp.dcid = htole16(new->lc_lcid);
    301 		rp.result = htole16(L2CAP_SUCCESS);
    302 		l2cap_send_signal(link, L2CAP_CONNECT_RSP, cmd.ident,
    303 						sizeof(rp), &rp);
    304 
    305 		new->lc_state = L2CAP_WAIT_CONFIG;
    306 		new->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
    307 		l2cap_send_config_req(new);
    308 		return;
    309 	}
    310 
    311 	rp.result = htole16(L2CAP_PSM_NOT_SUPPORTED);
    312 	l2cap_send_signal(link, L2CAP_CONNECT_RSP, cmd.ident, sizeof(rp), &rp);
    313 }
    314 
    315 /*
    316  * Process Received Connect Response.
    317  */
    318 static void
    319 l2cap_recv_connect_rsp(struct mbuf *m, struct hci_link *link)
    320 {
    321 	l2cap_cmd_hdr_t cmd;
    322 	l2cap_con_rsp_cp cp;
    323 	struct l2cap_req *req;
    324 	struct l2cap_channel *chan;
    325 
    326 	m_copydata(m, 0, sizeof(cmd), &cmd);
    327 	m_adj(m, sizeof(cmd));
    328 
    329 	m_copydata(m, 0, sizeof(cp), &cp);
    330 	m_adj(m, sizeof(cp));
    331 
    332 	cp.scid = le16toh(cp.scid);
    333 	cp.dcid = le16toh(cp.dcid);
    334 	cp.result = le16toh(cp.result);
    335 
    336 	req = l2cap_request_lookup(link, cmd.ident);
    337 	if (req == NULL || req->lr_code != L2CAP_CONNECT_REQ)
    338 		return;
    339 
    340 	chan = req->lr_chan;
    341 	if (chan != NULL && chan->lc_lcid != cp.scid)
    342 		return;
    343 
    344 	if (chan == NULL || chan->lc_state != L2CAP_WAIT_CONNECT_RSP) {
    345 		l2cap_request_free(req);
    346 		return;
    347 	}
    348 
    349 	switch (cp.result) {
    350 	case L2CAP_SUCCESS:
    351 		/*
    352 		 * Ok, at this point we have a connection to the other party. We
    353 		 * could indicate upstream that we are ready for business and
    354 		 * wait for a "Configure Channel Request" but I'm not so sure
    355 		 * that is required in our case - we will proceed directly to
    356 		 * sending our config request. We set two state bits because in
    357 		 * the config state we are waiting for requests and responses.
    358 		 */
    359 		l2cap_request_free(req);
    360 		chan->lc_rcid = cp.dcid;
    361 		chan->lc_state = L2CAP_WAIT_CONFIG;
    362 		chan->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
    363 		l2cap_send_config_req(chan);
    364 		break;
    365 
    366 	case L2CAP_PENDING:
    367 		/* XXX dont release request, should start eRTX timeout? */
    368 		(*chan->lc_proto->connecting)(chan->lc_upper);
    369 		break;
    370 
    371 	case L2CAP_PSM_NOT_SUPPORTED:
    372 	case L2CAP_SECURITY_BLOCK:
    373 	case L2CAP_NO_RESOURCES:
    374 	default:
    375 		l2cap_request_free(req);
    376 		l2cap_close(chan, ECONNREFUSED);
    377 		break;
    378 	}
    379 }
    380 
    381 /*
    382  * Process Received Config Reqest.
    383  */
    384 static void
    385 l2cap_recv_config_req(struct mbuf *m, struct hci_link *link)
    386 {
    387 	uint8_t buf[L2CAP_MTU_MINIMUM];
    388 	l2cap_cmd_hdr_t cmd;
    389 	l2cap_cfg_req_cp cp;
    390 	l2cap_cfg_opt_t opt;
    391 	l2cap_cfg_opt_val_t val;
    392 	l2cap_cfg_rsp_cp rp;
    393 	struct l2cap_channel *chan;
    394 	int left, len;
    395 
    396 	m_copydata(m, 0, sizeof(cmd), &cmd);
    397 	m_adj(m, sizeof(cmd));
    398 	left = le16toh(cmd.length);
    399 
    400 	if (left < sizeof(cp))
    401 		goto reject;
    402 
    403 	m_copydata(m, 0, sizeof(cp), &cp);
    404 	m_adj(m, sizeof(cp));
    405 	left -= sizeof(cp);
    406 
    407 	cp.dcid = le16toh(cp.dcid);
    408 	cp.flags = le16toh(cp.flags);
    409 
    410 	chan = l2cap_cid_lookup(cp.dcid);
    411 	if (chan == NULL || chan->lc_link != link
    412 	    || chan->lc_state != L2CAP_WAIT_CONFIG
    413 	    || (chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
    414 		/* XXX we should really accept reconfiguration requests */
    415 		l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
    416 					L2CAP_NULL_CID, cp.dcid);
    417 		goto out;
    418 	}
    419 
    420 	/* ready our response packet */
    421 	rp.scid = htole16(chan->lc_rcid);
    422 	rp.flags = 0;	/* "No Continuation" */
    423 	rp.result = L2CAP_SUCCESS;
    424 	len = sizeof(rp);
    425 
    426 	/*
    427 	 * Process the packet. We build the return packet on the fly adding any
    428 	 * unacceptable parameters as we go. As we can only return one result,
    429 	 * unknown option takes precedence so we start our return packet anew
    430 	 * and ignore option values thereafter as they will be re-sent.
    431 	 *
    432 	 * Since we do not support enough options to make overflowing the min
    433 	 * MTU size an issue in normal use, we just reject config requests that
    434 	 * make that happen. This could be because options are repeated or the
    435 	 * packet is corrupted in some way.
    436 	 *
    437 	 * If unknown option types threaten to overflow the packet, we just
    438 	 * ignore them. We can deny them next time.
    439 	 */
    440 	while (left > 0) {
    441 		if (left < sizeof(opt))
    442 			goto reject;
    443 
    444 		m_copydata(m, 0, sizeof(opt), &opt);
    445 		m_adj(m, sizeof(opt));
    446 		left -= sizeof(opt);
    447 
    448 		if (left < opt.length)
    449 			goto reject;
    450 
    451 		switch(opt.type & L2CAP_OPT_HINT_MASK) {
    452 		case L2CAP_OPT_MTU:
    453 			if (rp.result == L2CAP_UNKNOWN_OPTION)
    454 				break;
    455 
    456 			if (opt.length != L2CAP_OPT_MTU_SIZE)
    457 				goto reject;
    458 
    459 			m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
    460 			val.mtu = le16toh(val.mtu);
    461 
    462 			/*
    463 			 * XXX how do we know what the minimum acceptable MTU is
    464 			 * for a channel? Spec says some profiles have a higher
    465 			 * minimum but I have no way to find that out at this
    466 			 * juncture..
    467 			 */
    468 			if (val.mtu < L2CAP_MTU_MINIMUM) {
    469 				if (len + sizeof(opt) + L2CAP_OPT_MTU_SIZE > sizeof(buf))
    470 					goto reject;
    471 
    472 				rp.result = L2CAP_UNACCEPTABLE_PARAMS;
    473 				memcpy(buf + len, &opt, sizeof(opt));
    474 				len += sizeof(opt);
    475 				val.mtu = htole16(L2CAP_MTU_MINIMUM);
    476 				memcpy(buf + len, &val, L2CAP_OPT_MTU_SIZE);
    477 				len += L2CAP_OPT_MTU_SIZE;
    478 			} else
    479 				chan->lc_omtu = val.mtu;
    480 
    481 			break;
    482 
    483 		case L2CAP_OPT_FLUSH_TIMO:
    484 			if (rp.result == L2CAP_UNKNOWN_OPTION)
    485 				break;
    486 
    487 			if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
    488 				goto reject;
    489 
    490 			/*
    491 			 * I think that this is informational only - he is
    492 			 * informing us of the flush timeout he will be using.
    493 			 * I dont think this affects us in any significant way,
    494 			 * so just ignore this value for now.
    495 			 */
    496 			break;
    497 
    498 		case L2CAP_OPT_QOS:
    499 		default:
    500 			/* ignore hints */
    501 			if (opt.type & L2CAP_OPT_HINT_BIT)
    502 				break;
    503 
    504 			/* unknown options supercede all else */
    505 			if (rp.result != L2CAP_UNKNOWN_OPTION) {
    506 				rp.result = L2CAP_UNKNOWN_OPTION;
    507 				len = sizeof(rp);
    508 			}
    509 
    510 			/* ignore if it don't fit */
    511 			if (len + sizeof(opt) > sizeof(buf))
    512 				break;
    513 
    514 			/* return unknown option type, but no data */
    515 			buf[len++] = opt.type;
    516 			buf[len++] = 0;
    517 			break;
    518 		}
    519 
    520 		m_adj(m, opt.length);
    521 		left -= opt.length;
    522 	}
    523 
    524 	rp.result = htole16(rp.result);
    525 	memcpy(buf, &rp, sizeof(rp));
    526 	l2cap_send_signal(link, L2CAP_CONFIG_RSP, cmd.ident, len, buf);
    527 
    528 	if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0
    529 	    && rp.result == le16toh(L2CAP_SUCCESS)) {
    530 
    531 		chan->lc_flags &= ~L2CAP_WAIT_CONFIG_REQ;
    532 
    533 		if ((chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0) {
    534 			chan->lc_state = L2CAP_OPEN;
    535 			/* XXX how to distinguish REconfiguration? */
    536 			(*chan->lc_proto->connected)(chan->lc_upper);
    537 		}
    538 	}
    539 	return;
    540 
    541 reject:
    542 	l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
    543 out:
    544 	m_adj(m, left);
    545 }
    546 
    547 /*
    548  * Process Received Config Response.
    549  */
    550 static void
    551 l2cap_recv_config_rsp(struct mbuf *m, struct hci_link *link)
    552 {
    553 	l2cap_cmd_hdr_t cmd;
    554 	l2cap_cfg_rsp_cp cp;
    555 	l2cap_cfg_opt_t opt;
    556 	l2cap_cfg_opt_val_t val;
    557 	struct l2cap_req *req;
    558 	struct l2cap_channel *chan;
    559 	int left;
    560 
    561 	m_copydata(m, 0, sizeof(cmd), &cmd);
    562 	m_adj(m, sizeof(cmd));
    563 	left = le16toh(cmd.length);
    564 
    565 	if (left < sizeof(cp))
    566 		goto out;
    567 
    568 	m_copydata(m, 0, sizeof(cp), &cp);
    569 	m_adj(m, sizeof(cp));
    570 	left -= sizeof(cp);
    571 
    572 	cp.scid = le16toh(cp.scid);
    573 	cp.flags = le16toh(cp.flags);
    574 	cp.result = le16toh(cp.result);
    575 
    576 	req = l2cap_request_lookup(link, cmd.ident);
    577 	if (req == NULL || req->lr_code != L2CAP_CONFIG_REQ)
    578 		goto out;
    579 
    580 	chan = req->lr_chan;
    581 	if (chan != NULL && chan->lc_lcid != cp.scid)
    582 		goto out;
    583 
    584 	l2cap_request_free(req);
    585 
    586 	if (chan == NULL || chan->lc_state != L2CAP_WAIT_CONFIG
    587 	    || (chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0)
    588 		goto out;
    589 
    590 	if ((cp.flags & L2CAP_OPT_CFLAG_BIT)) {
    591 		l2cap_cfg_req_cp rp;
    592 
    593 		/*
    594 		 * They have more to tell us and want another ID to
    595 		 * use, so send an empty config request
    596 		 */
    597 		if (l2cap_request_alloc(chan, L2CAP_CONFIG_REQ))
    598 			goto discon;
    599 
    600 		rp.dcid = htole16(cp.scid);
    601 		rp.flags = 0;
    602 
    603 		if (l2cap_send_signal(link, L2CAP_CONFIG_REQ, link->hl_lastid,
    604 					sizeof(rp), &rp))
    605 			goto discon;
    606 	}
    607 
    608 	switch(cp.result) {
    609 	case L2CAP_SUCCESS:
    610 		/*
    611 		 * If continuation flag was not set, our config request was
    612 		 * accepted. We may have to wait for their config request to
    613 		 * complete, so check that but otherwise we are open
    614 		 *
    615 		 * There may be 'advisory' values in the packet but we just
    616 		 * ignore those..
    617 		 */
    618 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0) {
    619 			chan->lc_flags &= ~L2CAP_WAIT_CONFIG_RSP;
    620 
    621 			if ((chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
    622 				chan->lc_state = L2CAP_OPEN;
    623 				/* XXX how to distinguish REconfiguration? */
    624 				(*chan->lc_proto->connected)(chan->lc_upper);
    625 			}
    626 		}
    627 		goto out;
    628 
    629 	case L2CAP_UNACCEPTABLE_PARAMS:
    630 		/*
    631 		 * Packet contains unacceptable parameters with preferred values
    632 		 */
    633 		while (left > 0) {
    634 			if (left < sizeof(opt))
    635 				goto discon;
    636 
    637 			m_copydata(m, 0, sizeof(opt), &opt);
    638 			m_adj(m, sizeof(opt));
    639 			left -= sizeof(opt);
    640 
    641 			if (left < opt.length)
    642 				goto discon;
    643 
    644 			switch (opt.type) {
    645 			case L2CAP_OPT_MTU:
    646 				if (opt.length != L2CAP_OPT_MTU_SIZE)
    647 					goto discon;
    648 
    649 				m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
    650 				chan->lc_imtu = le16toh(val.mtu);
    651 				if (chan->lc_imtu < L2CAP_MTU_MINIMUM)
    652 					chan->lc_imtu = L2CAP_MTU_DEFAULT;
    653 				break;
    654 
    655 			case L2CAP_OPT_FLUSH_TIMO:
    656 				if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
    657 					goto discon;
    658 
    659 				/*
    660 				 * Spec says: If we cannot honor proposed value,
    661 				 * either disconnect or try again with original
    662 				 * value. I can't really see why they want to
    663 				 * interfere with OUR flush timeout in any case
    664 				 * so we just punt for now.
    665 				 */
    666 				goto discon;
    667 
    668 			case L2CAP_OPT_QOS:
    669 				break;
    670 
    671 			default:
    672 				UNKNOWN(opt.type);
    673 				goto discon;
    674 			}
    675 
    676 			m_adj(m, opt.length);
    677 			left -= opt.length;
    678 		}
    679 
    680 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
    681 			l2cap_send_config_req(chan);	/* no state change */
    682 
    683 		goto out;
    684 
    685 	case L2CAP_REJECT:
    686 		goto discon;
    687 
    688 	case L2CAP_UNKNOWN_OPTION:
    689 		/*
    690 		 * Packet contains options not understood. Turn off unknown
    691 		 * options by setting them to default values (means they will
    692 		 * not be requested again).
    693 		 *
    694 		 * If our option was already off then fail (paranoia?)
    695 		 *
    696 		 * XXX Should we consider that options were set for a reason?
    697 		 */
    698 		while (left > 0) {
    699 			if (left < sizeof(opt))
    700 				goto discon;
    701 
    702 			m_copydata(m, 0, sizeof(opt), &opt);
    703 			m_adj(m, sizeof(opt));
    704 			left -= sizeof(opt);
    705 
    706 			if (left < opt.length)
    707 				goto discon;
    708 
    709 			m_adj(m, opt.length);
    710 			left -= opt.length;
    711 
    712 			switch(opt.type) {
    713 			case L2CAP_OPT_MTU:
    714 				if (chan->lc_imtu == L2CAP_MTU_DEFAULT)
    715 					goto discon;
    716 
    717 				chan->lc_imtu = L2CAP_MTU_DEFAULT;
    718 				break;
    719 
    720 			case L2CAP_OPT_FLUSH_TIMO:
    721 				if (chan->lc_flush == L2CAP_FLUSH_TIMO_DEFAULT)
    722 					goto discon;
    723 
    724 				chan->lc_flush = L2CAP_FLUSH_TIMO_DEFAULT;
    725 				break;
    726 
    727 			case L2CAP_OPT_QOS:
    728 				break;
    729 
    730 			default:
    731 				UNKNOWN(opt.type);
    732 				goto discon;
    733 			}
    734 		}
    735 
    736 		if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
    737 			l2cap_send_config_req(chan);	/* no state change */
    738 
    739 		goto out;
    740 
    741 	default:
    742 		UNKNOWN(cp.result);
    743 		goto discon;
    744 	}
    745 
    746 	DPRINTF("how did I get here!?\n");
    747 
    748 discon:
    749 	l2cap_send_disconnect_req(chan);
    750 	l2cap_close(chan, ECONNABORTED);
    751 
    752 out:
    753 	m_adj(m, left);
    754 }
    755 
    756 /*
    757  * Process Received Disconnect Request. We must validate scid and dcid
    758  * just in case but otherwise this connection is finished.
    759  */
    760 static void
    761 l2cap_recv_disconnect_req(struct mbuf *m, struct hci_link *link)
    762 {
    763 	l2cap_cmd_hdr_t cmd;
    764 	l2cap_discon_req_cp cp;
    765 	l2cap_discon_rsp_cp rp;
    766 	struct l2cap_channel *chan;
    767 
    768 	m_copydata(m, 0, sizeof(cmd), &cmd);
    769 	m_adj(m, sizeof(cmd));
    770 
    771 	m_copydata(m, 0, sizeof(cp), &cp);
    772 	m_adj(m, sizeof(cp));
    773 
    774 	cp.scid = le16toh(cp.scid);
    775 	cp.dcid = le16toh(cp.dcid);
    776 
    777 	chan = l2cap_cid_lookup(cp.dcid);
    778 	if (chan == NULL || chan->lc_link != link || chan->lc_rcid != cp.scid) {
    779 		l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
    780 					cp.dcid, cp.scid);
    781 		return;
    782 	}
    783 
    784 	rp.dcid = htole16(chan->lc_lcid);
    785 	rp.scid = htole16(chan->lc_rcid);
    786 	l2cap_send_signal(link, L2CAP_DISCONNECT_RSP, cmd.ident,
    787 				sizeof(rp), &rp);
    788 
    789 	if (chan->lc_state != L2CAP_CLOSED)
    790 		l2cap_close(chan, ECONNRESET);
    791 }
    792 
    793 /*
    794  * Process Received Disconnect Response. We must validate scid and dcid but
    795  * unless we were waiting for this signal, ignore it.
    796  */
    797 static void
    798 l2cap_recv_disconnect_rsp(struct mbuf *m, struct hci_link *link)
    799 {
    800 	l2cap_cmd_hdr_t cmd;
    801 	l2cap_discon_rsp_cp cp;
    802 	struct l2cap_req *req;
    803 	struct l2cap_channel *chan;
    804 
    805 	m_copydata(m, 0, sizeof(cmd), &cmd);
    806 	m_adj(m, sizeof(cmd));
    807 
    808 	m_copydata(m, 0, sizeof(cp), &cp);
    809 	m_adj(m, sizeof(cp));
    810 
    811 	cp.scid = le16toh(cp.scid);
    812 	cp.dcid = le16toh(cp.dcid);
    813 
    814 	req = l2cap_request_lookup(link, cmd.ident);
    815 	if (req == NULL || req->lr_code != L2CAP_DISCONNECT_REQ)
    816 		return;
    817 
    818 	chan = req->lr_chan;
    819 	if (chan == NULL
    820 	    || chan->lc_lcid != cp.scid
    821 	    || chan->lc_rcid != cp.dcid)
    822 		return;
    823 
    824 	l2cap_request_free(req);
    825 
    826 	if (chan->lc_state != L2CAP_WAIT_DISCONNECT)
    827 		return;
    828 
    829 	l2cap_close(chan, 0);
    830 }
    831 
    832 /*
    833  * Process Received Info Request. We must respond but alas dont
    834  * support anything as yet so thats easy.
    835  */
    836 static void
    837 l2cap_recv_info_req(struct mbuf *m, struct hci_link *link)
    838 {
    839 	l2cap_cmd_hdr_t cmd;
    840 	l2cap_info_req_cp cp;
    841 	l2cap_info_rsp_cp rp;
    842 
    843 	m_copydata(m, 0, sizeof(cmd), &cmd);
    844 	m_adj(m, sizeof(cmd));
    845 
    846 	m_copydata(m, 0, sizeof(cp), &cp);
    847 	m_adj(m, sizeof(cp));
    848 
    849 	switch(le16toh(cp.type)) {
    850 	case L2CAP_CONNLESS_MTU:
    851 	case L2CAP_EXTENDED_FEATURES:
    852 	default:
    853 		rp.type = cp.type;
    854 		rp.result = htole16(L2CAP_NOT_SUPPORTED);
    855 
    856 		l2cap_send_signal(link, L2CAP_INFO_RSP, cmd.ident,
    857 					sizeof(rp), &rp);
    858 		break;
    859 	}
    860 }
    861 
    862 /*
    863  * Construct signal and wrap in C-Frame for link.
    864  */
    865 static int
    866 l2cap_send_signal(struct hci_link *link, uint8_t code, uint8_t ident,
    867 			uint16_t length, void *data)
    868 {
    869 	struct mbuf *m;
    870 	l2cap_hdr_t *hdr;
    871 	l2cap_cmd_hdr_t *cmd;
    872 
    873 #ifdef DIAGNOSTIC
    874 	if (link == NULL)
    875 		return ENETDOWN;
    876 
    877 	if (sizeof(l2cap_cmd_hdr_t) + length > link->hl_mtu)
    878 		printf("(%s) exceeding L2CAP Signal MTU for link!\n",
    879 			link->hl_unit->hci_devname);
    880 #endif
    881 
    882 	m = m_gethdr(M_DONTWAIT, MT_DATA);
    883 	if (m == NULL)
    884 		return ENOMEM;
    885 
    886 	hdr = mtod(m, l2cap_hdr_t *);
    887 	cmd = (l2cap_cmd_hdr_t *)(hdr + 1);
    888 
    889 	m->m_len = m->m_pkthdr.len = MHLEN;
    890 
    891 	/* Command Data */
    892 	if (length > 0)
    893 		m_copyback(m, sizeof(hdr) + sizeof(cmd), length, data);
    894 
    895 	/* Command Header */
    896 	cmd->code = code;
    897 	cmd->ident = ident;
    898 	cmd->length = htole16(length);
    899 	length += sizeof(cmd);
    900 
    901 	/* C-Frame Header */
    902 	hdr->length = htole16(length);
    903 	hdr->dcid = htole16(L2CAP_SIGNAL_CID);
    904 	length += sizeof(hdr);
    905 
    906 	if (m->m_pkthdr.len != MAX(MHLEN, length)) {
    907 		m_freem(m);
    908 		return ENOMEM;
    909 	}
    910 
    911 	m->m_pkthdr.len = length;
    912 	m->m_len = MIN(length, MHLEN);
    913 
    914 	DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
    915 		link->hl_unit->hci_devname, code, ident, length);
    916 
    917 	return hci_acl_send(m, link, NULL);
    918 }
    919 
    920 /*
    921  * Send Command Reject packet.
    922  */
    923 static int
    924 l2cap_send_command_rej(struct hci_link *link, uint8_t ident,
    925 			uint16_t reason, ...)
    926 {
    927 	l2cap_cmd_rej_cp cp;
    928 	int len = 0;
    929 	va_list ap;
    930 
    931 	va_start(ap, reason);
    932 
    933 	cp.reason = htole16(reason);
    934 
    935 	switch (reason) {
    936 	case L2CAP_REJ_NOT_UNDERSTOOD:
    937 		len = 2;
    938 		break;
    939 
    940 	case L2CAP_REJ_MTU_EXCEEDED:
    941 		len = 4;
    942 		cp.data[0] = va_arg(ap, int);		/* SigMTU */
    943 		cp.data[0] = htole16(cp.data[0]);
    944 		break;
    945 
    946 	case L2CAP_REJ_INVALID_CID:
    947 		len = 6;
    948 		cp.data[0] = va_arg(ap, int);		/* dcid */
    949 		cp.data[0] = htole16(cp.data[0]);
    950 		cp.data[1] = va_arg(ap, int);		/* scid */
    951 		cp.data[1] = htole16(cp.data[1]);
    952 		break;
    953 
    954 	default:
    955 		UNKNOWN(reason);
    956 		return EINVAL;
    957 	}
    958 
    959 	va_end(ap);
    960 
    961 	return l2cap_send_signal(link, L2CAP_COMMAND_REJ, ident, len, &cp);
    962 }
    963 
    964 /*
    965  * Send Connect Request
    966  */
    967 int
    968 l2cap_send_connect_req(struct l2cap_channel *chan)
    969 {
    970 	l2cap_con_req_cp cp;
    971 	int err;
    972 
    973 	err = l2cap_request_alloc(chan, L2CAP_CONNECT_REQ);
    974 	if (err)
    975 		return err;
    976 
    977 	cp.psm = htole16(chan->lc_raddr.bt_psm);
    978 	cp.scid = htole16(chan->lc_lcid);
    979 
    980 	return l2cap_send_signal(chan->lc_link, L2CAP_CONNECT_REQ,
    981 				chan->lc_link->hl_lastid, sizeof(cp), &cp);
    982 }
    983 
    984 /*
    985  * Send Config Request
    986  *
    987  * For outgoing config request, we only put options in the packet if they
    988  * differ from the default and would have to be actioned. We dont support
    989  * enough option types to make overflowing SigMTU an issue so it can all
    990  * go in one packet.
    991  */
    992 int
    993 l2cap_send_config_req(struct l2cap_channel *chan)
    994 {
    995 	l2cap_cfg_req_cp *cp;
    996 	l2cap_cfg_opt_t *opt;
    997 	l2cap_cfg_opt_val_t *val;
    998 	uint8_t *next, buf[L2CAP_MTU_MINIMUM];
    999 	int err;
   1000 
   1001 	err = l2cap_request_alloc(chan, L2CAP_CONFIG_REQ);
   1002 	if (err)
   1003 		return err;
   1004 
   1005 	/* Config Header (4 octets) */
   1006 	cp = (l2cap_cfg_req_cp *)buf;
   1007 	cp->dcid = htole16(chan->lc_rcid);
   1008 	cp->flags = 0;	/* "No Continuation" */
   1009 
   1010 	next = buf + sizeof(l2cap_cfg_req_cp);
   1011 
   1012 	/* Incoming MTU (4 octets) */
   1013 	if (chan->lc_imtu != L2CAP_MTU_DEFAULT) {
   1014 		opt = (l2cap_cfg_opt_t *)next;
   1015 		opt->type = L2CAP_OPT_MTU;
   1016 		opt->length = L2CAP_OPT_MTU_SIZE;
   1017 
   1018 		val = (l2cap_cfg_opt_val_t *)(opt + 1);
   1019 		val->mtu = htole16(chan->lc_imtu);
   1020 
   1021 		next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_MTU_SIZE;
   1022 	}
   1023 
   1024 	/* Flush Timeout (4 octets) */
   1025 	if (chan->lc_flush != L2CAP_FLUSH_TIMO_DEFAULT) {
   1026 		opt = (l2cap_cfg_opt_t *)next;
   1027 		opt->type = L2CAP_OPT_FLUSH_TIMO;
   1028 		opt->length = L2CAP_OPT_FLUSH_TIMO_SIZE;
   1029 
   1030 		val = (l2cap_cfg_opt_val_t *)(opt + 1);
   1031 		val->flush_timo = htole16(chan->lc_flush);
   1032 
   1033 		next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_FLUSH_TIMO_SIZE;
   1034 	}
   1035 
   1036 	/* Outgoing QoS Flow (24 octets) */
   1037 	/* Retransmission & Flow Control (11 octets) */
   1038 	/*
   1039 	 * From here we need to start paying attention to SigMTU as we have
   1040 	 * possibly overflowed the minimum supported..
   1041 	 */
   1042 
   1043 	return l2cap_send_signal(chan->lc_link, L2CAP_CONFIG_REQ,
   1044 				    chan->lc_link->hl_lastid, (int)(next - buf), buf);
   1045 }
   1046 
   1047 /*
   1048  * Send Disconnect Request
   1049  */
   1050 int
   1051 l2cap_send_disconnect_req(struct l2cap_channel *chan)
   1052 {
   1053 	l2cap_discon_req_cp cp;
   1054 	int err;
   1055 
   1056 	err = l2cap_request_alloc(chan, L2CAP_DISCONNECT_REQ);
   1057 	if (err)
   1058 		return err;
   1059 
   1060 	cp.dcid = htole16(chan->lc_rcid);
   1061 	cp.scid = htole16(chan->lc_lcid);
   1062 
   1063 	return l2cap_send_signal(chan->lc_link, L2CAP_DISCONNECT_REQ,
   1064 				    chan->lc_link->hl_lastid, sizeof(cp), &cp);
   1065 }
   1066