l2cap_signal.c revision 1.9 1 /* $NetBSD: l2cap_signal.c,v 1.9 2007/11/10 23:12:23 plunky Exp $ */
2
3 /*-
4 * Copyright (c) 2005 Iain Hibbert.
5 * Copyright (c) 2006 Itronix Inc.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. The name of Itronix Inc. may not be used to endorse
17 * or promote products derived from this software without specific
18 * prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27 * ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: l2cap_signal.c,v 1.9 2007/11/10 23:12:23 plunky Exp $");
35
36 #include <sys/param.h>
37 #include <sys/kernel.h>
38 #include <sys/mbuf.h>
39 #include <sys/proc.h>
40 #include <sys/queue.h>
41 #include <sys/systm.h>
42
43 #include <machine/stdarg.h>
44
45 #include <netbt/bluetooth.h>
46 #include <netbt/hci.h>
47 #include <netbt/l2cap.h>
48
49 /*******************************************************************************
50 *
51 * L2CAP Signal processing
52 */
53
54 static void l2cap_recv_command_rej(struct mbuf *, struct hci_link *);
55 static void l2cap_recv_connect_req(struct mbuf *, struct hci_link *);
56 static void l2cap_recv_connect_rsp(struct mbuf *, struct hci_link *);
57 static void l2cap_recv_config_req(struct mbuf *, struct hci_link *);
58 static void l2cap_recv_config_rsp(struct mbuf *, struct hci_link *);
59 static void l2cap_recv_disconnect_req(struct mbuf *, struct hci_link *);
60 static void l2cap_recv_disconnect_rsp(struct mbuf *, struct hci_link *);
61 static void l2cap_recv_info_req(struct mbuf *, struct hci_link *);
62 static int l2cap_send_signal(struct hci_link *, uint8_t, uint8_t, uint16_t, void *);
63 static int l2cap_send_command_rej(struct hci_link *, uint8_t, uint16_t, ...);
64
65 /*
66 * process incoming signal packets (CID 0x0001). Can contain multiple
67 * requests/responses.
68 */
69 void
70 l2cap_recv_signal(struct mbuf *m, struct hci_link *link)
71 {
72 l2cap_cmd_hdr_t cmd;
73
74 for(;;) {
75 if (m->m_pkthdr.len == 0)
76 goto finish;
77
78 if (m->m_pkthdr.len < sizeof(cmd))
79 goto reject;
80
81 m_copydata(m, 0, sizeof(cmd), &cmd);
82 cmd.length = le16toh(cmd.length);
83
84 if (m->m_pkthdr.len < sizeof(cmd) + cmd.length)
85 goto reject;
86
87 DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
88 device_xname(link->hl_unit->hci_dev),
89 cmd.code, cmd.ident, cmd.length);
90
91 switch (cmd.code) {
92 case L2CAP_COMMAND_REJ:
93 if (cmd.length > sizeof(l2cap_cmd_rej_cp))
94 goto finish;
95
96 l2cap_recv_command_rej(m, link);
97 break;
98
99 case L2CAP_CONNECT_REQ:
100 if (cmd.length != sizeof(l2cap_con_req_cp))
101 goto reject;
102
103 l2cap_recv_connect_req(m, link);
104 break;
105
106 case L2CAP_CONNECT_RSP:
107 if (cmd.length != sizeof(l2cap_con_rsp_cp))
108 goto finish;
109
110 l2cap_recv_connect_rsp(m, link);
111 break;
112
113 case L2CAP_CONFIG_REQ:
114 l2cap_recv_config_req(m, link);
115 break;
116
117 case L2CAP_CONFIG_RSP:
118 l2cap_recv_config_rsp(m, link);
119 break;
120
121 case L2CAP_DISCONNECT_REQ:
122 if (cmd.length != sizeof(l2cap_discon_req_cp))
123 goto reject;
124
125 l2cap_recv_disconnect_req(m, link);
126 break;
127
128 case L2CAP_DISCONNECT_RSP:
129 if (cmd.length != sizeof(l2cap_discon_rsp_cp))
130 goto finish;
131
132 l2cap_recv_disconnect_rsp(m, link);
133 break;
134
135 case L2CAP_ECHO_REQ:
136 m_adj(m, sizeof(cmd) + cmd.length);
137 l2cap_send_signal(link, L2CAP_ECHO_RSP, cmd.ident,
138 0, NULL);
139 break;
140
141 case L2CAP_ECHO_RSP:
142 m_adj(m, sizeof(cmd) + cmd.length);
143 break;
144
145 case L2CAP_INFO_REQ:
146 if (cmd.length != sizeof(l2cap_info_req_cp))
147 goto reject;
148
149 l2cap_recv_info_req(m, link);
150 break;
151
152 case L2CAP_INFO_RSP:
153 m_adj(m, sizeof(cmd) + cmd.length);
154 break;
155
156 default:
157 goto reject;
158 }
159 }
160
161 #ifdef DIAGNOSTIC
162 panic("impossible!");
163 #endif
164
165 reject:
166 l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
167 finish:
168 m_freem(m);
169 }
170
171 /*
172 * Process Received Command Reject. For now we dont try to recover gracefully
173 * from this, it probably means that the link is garbled or the other end is
174 * insufficiently capable of handling normal traffic. (not *my* fault, no way!)
175 */
176 static void
177 l2cap_recv_command_rej(struct mbuf *m, struct hci_link *link)
178 {
179 struct l2cap_req *req;
180 struct l2cap_channel *chan;
181 l2cap_cmd_hdr_t cmd;
182 l2cap_cmd_rej_cp cp;
183
184 m_copydata(m, 0, sizeof(cmd), &cmd);
185 m_adj(m, sizeof(cmd));
186
187 cmd.length = le16toh(cmd.length);
188
189 m_copydata(m, 0, cmd.length, &cp);
190 m_adj(m, cmd.length);
191
192 req = l2cap_request_lookup(link, cmd.ident);
193 if (req == NULL)
194 return;
195
196 switch (le16toh(cp.reason)) {
197 case L2CAP_REJ_NOT_UNDERSTOOD:
198 /*
199 * I dont know what to do, just move up the timeout
200 */
201 callout_schedule(&req->lr_rtx, 0);
202 break;
203
204 case L2CAP_REJ_MTU_EXCEEDED:
205 /*
206 * I didnt send any commands over L2CAP_MTU_MINIMUM size, but..
207 *
208 * XXX maybe we should resend this, instead?
209 */
210 link->hl_mtu = le16toh(cp.data[0]);
211 callout_schedule(&req->lr_rtx, 0);
212 break;
213
214 case L2CAP_REJ_INVALID_CID:
215 /*
216 * Well, if they dont have such a channel then our channel is
217 * most likely closed. Make it so.
218 */
219 chan = req->lr_chan;
220 l2cap_request_free(req);
221 if (chan != NULL && chan->lc_state != L2CAP_CLOSED)
222 l2cap_close(chan, ECONNABORTED);
223
224 break;
225
226 default:
227 UNKNOWN(le16toh(cp.reason));
228 break;
229 }
230 }
231
232 /*
233 * Process Received Connect Request. Find listening channel matching
234 * psm & addr and ask upper layer for a new channel.
235 */
236 static void
237 l2cap_recv_connect_req(struct mbuf *m, struct hci_link *link)
238 {
239 struct sockaddr_bt laddr, raddr;
240 struct l2cap_channel *chan, *new;
241 l2cap_cmd_hdr_t cmd;
242 l2cap_con_req_cp cp;
243 int err;
244
245 /* extract cmd */
246 m_copydata(m, 0, sizeof(cmd), &cmd);
247 m_adj(m, sizeof(cmd));
248
249 /* extract request */
250 m_copydata(m, 0, sizeof(cp), &cp);
251 m_adj(m, sizeof(cp));
252
253 cp.scid = le16toh(cp.scid);
254 cp.psm = le16toh(cp.psm);
255
256 memset(&laddr, 0, sizeof(struct sockaddr_bt));
257 laddr.bt_len = sizeof(struct sockaddr_bt);
258 laddr.bt_family = AF_BLUETOOTH;
259 laddr.bt_psm = cp.psm;
260 bdaddr_copy(&laddr.bt_bdaddr, &link->hl_unit->hci_bdaddr);
261
262 memset(&raddr, 0, sizeof(struct sockaddr_bt));
263 raddr.bt_len = sizeof(struct sockaddr_bt);
264 raddr.bt_family = AF_BLUETOOTH;
265 raddr.bt_psm = cp.psm;
266 bdaddr_copy(&raddr.bt_bdaddr, &link->hl_bdaddr);
267
268 LIST_FOREACH(chan, &l2cap_listen_list, lc_ncid) {
269 if (chan->lc_laddr.bt_psm != laddr.bt_psm
270 && chan->lc_laddr.bt_psm != L2CAP_PSM_ANY)
271 continue;
272
273 if (!bdaddr_same(&laddr.bt_bdaddr, &chan->lc_laddr.bt_bdaddr)
274 && bdaddr_any(&chan->lc_laddr.bt_bdaddr) == 0)
275 continue;
276
277 new= (*chan->lc_proto->newconn)(chan->lc_upper, &laddr, &raddr);
278 if (new == NULL)
279 continue;
280
281 err = l2cap_cid_alloc(new);
282 if (err) {
283 l2cap_send_connect_rsp(link, cmd.ident,
284 0, cp.scid,
285 L2CAP_NO_RESOURCES);
286
287 (*new->lc_proto->disconnected)(new->lc_upper, err);
288 return;
289 }
290
291 new->lc_link = hci_acl_open(link->hl_unit, &link->hl_bdaddr);
292 KASSERT(new->lc_link == link);
293
294 new->lc_rcid = cp.scid;
295 new->lc_ident = cmd.ident;
296
297 memcpy(&new->lc_laddr, &laddr, sizeof(struct sockaddr_bt));
298 memcpy(&new->lc_raddr, &raddr, sizeof(struct sockaddr_bt));
299
300 new->lc_mode = chan->lc_mode;
301
302 err = l2cap_setmode(new);
303 if (err == EINPROGRESS) {
304 new->lc_state = L2CAP_WAIT_SEND_CONNECT_RSP;
305 (*new->lc_proto->connecting)(new->lc_upper);
306 return;
307 }
308 if (err) {
309 new->lc_state = L2CAP_CLOSED;
310 hci_acl_close(link, err);
311 new->lc_link = NULL;
312
313 l2cap_send_connect_rsp(link, cmd.ident,
314 0, cp.scid,
315 L2CAP_NO_RESOURCES);
316
317 (*new->lc_proto->disconnected)(new->lc_upper, err);
318 return;
319 }
320
321 err = l2cap_send_connect_rsp(link, cmd.ident,
322 new->lc_lcid, new->lc_rcid,
323 L2CAP_SUCCESS);
324 if (err) {
325 l2cap_close(new, err);
326 return;
327 }
328
329 new->lc_state = L2CAP_WAIT_CONFIG;
330 new->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
331 err = l2cap_send_config_req(new);
332 if (err)
333 l2cap_close(new, err);
334
335 return;
336 }
337
338 l2cap_send_connect_rsp(link, cmd.ident,
339 0, cp.scid,
340 L2CAP_PSM_NOT_SUPPORTED);
341 }
342
343 /*
344 * Process Received Connect Response.
345 */
346 static void
347 l2cap_recv_connect_rsp(struct mbuf *m, struct hci_link *link)
348 {
349 l2cap_cmd_hdr_t cmd;
350 l2cap_con_rsp_cp cp;
351 struct l2cap_req *req;
352 struct l2cap_channel *chan;
353
354 m_copydata(m, 0, sizeof(cmd), &cmd);
355 m_adj(m, sizeof(cmd));
356
357 m_copydata(m, 0, sizeof(cp), &cp);
358 m_adj(m, sizeof(cp));
359
360 cp.scid = le16toh(cp.scid);
361 cp.dcid = le16toh(cp.dcid);
362 cp.result = le16toh(cp.result);
363
364 req = l2cap_request_lookup(link, cmd.ident);
365 if (req == NULL || req->lr_code != L2CAP_CONNECT_REQ)
366 return;
367
368 chan = req->lr_chan;
369 if (chan != NULL && chan->lc_lcid != cp.scid)
370 return;
371
372 if (chan == NULL || chan->lc_state != L2CAP_WAIT_RECV_CONNECT_RSP) {
373 l2cap_request_free(req);
374 return;
375 }
376
377 switch (cp.result) {
378 case L2CAP_SUCCESS:
379 /*
380 * Ok, at this point we have a connection to the other party. We
381 * could indicate upstream that we are ready for business and
382 * wait for a "Configure Channel Request" but I'm not so sure
383 * that is required in our case - we will proceed directly to
384 * sending our config request. We set two state bits because in
385 * the config state we are waiting for requests and responses.
386 */
387 l2cap_request_free(req);
388 chan->lc_rcid = cp.dcid;
389 chan->lc_state = L2CAP_WAIT_CONFIG;
390 chan->lc_flags |= (L2CAP_WAIT_CONFIG_REQ | L2CAP_WAIT_CONFIG_RSP);
391 l2cap_send_config_req(chan);
392 break;
393
394 case L2CAP_PENDING:
395 /* XXX dont release request, should start eRTX timeout? */
396 (*chan->lc_proto->connecting)(chan->lc_upper);
397 break;
398
399 case L2CAP_PSM_NOT_SUPPORTED:
400 case L2CAP_SECURITY_BLOCK:
401 case L2CAP_NO_RESOURCES:
402 default:
403 l2cap_request_free(req);
404 l2cap_close(chan, ECONNREFUSED);
405 break;
406 }
407 }
408
409 /*
410 * Process Received Config Reqest.
411 */
412 static void
413 l2cap_recv_config_req(struct mbuf *m, struct hci_link *link)
414 {
415 uint8_t buf[L2CAP_MTU_MINIMUM];
416 l2cap_cmd_hdr_t cmd;
417 l2cap_cfg_req_cp cp;
418 l2cap_cfg_opt_t opt;
419 l2cap_cfg_opt_val_t val;
420 l2cap_cfg_rsp_cp rp;
421 struct l2cap_channel *chan;
422 int left, len;
423
424 m_copydata(m, 0, sizeof(cmd), &cmd);
425 m_adj(m, sizeof(cmd));
426 left = le16toh(cmd.length);
427
428 if (left < sizeof(cp))
429 goto reject;
430
431 m_copydata(m, 0, sizeof(cp), &cp);
432 m_adj(m, sizeof(cp));
433 left -= sizeof(cp);
434
435 cp.dcid = le16toh(cp.dcid);
436 cp.flags = le16toh(cp.flags);
437
438 chan = l2cap_cid_lookup(cp.dcid);
439 if (chan == NULL || chan->lc_link != link
440 || chan->lc_state != L2CAP_WAIT_CONFIG
441 || (chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
442 /* XXX we should really accept reconfiguration requests */
443 l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
444 L2CAP_NULL_CID, cp.dcid);
445 goto out;
446 }
447
448 /* ready our response packet */
449 rp.scid = htole16(chan->lc_rcid);
450 rp.flags = 0; /* "No Continuation" */
451 rp.result = L2CAP_SUCCESS;
452 len = sizeof(rp);
453
454 /*
455 * Process the packet. We build the return packet on the fly adding any
456 * unacceptable parameters as we go. As we can only return one result,
457 * unknown option takes precedence so we start our return packet anew
458 * and ignore option values thereafter as they will be re-sent.
459 *
460 * Since we do not support enough options to make overflowing the min
461 * MTU size an issue in normal use, we just reject config requests that
462 * make that happen. This could be because options are repeated or the
463 * packet is corrupted in some way.
464 *
465 * If unknown option types threaten to overflow the packet, we just
466 * ignore them. We can deny them next time.
467 */
468 while (left > 0) {
469 if (left < sizeof(opt))
470 goto reject;
471
472 m_copydata(m, 0, sizeof(opt), &opt);
473 m_adj(m, sizeof(opt));
474 left -= sizeof(opt);
475
476 if (left < opt.length)
477 goto reject;
478
479 switch(opt.type & L2CAP_OPT_HINT_MASK) {
480 case L2CAP_OPT_MTU:
481 if (rp.result == L2CAP_UNKNOWN_OPTION)
482 break;
483
484 if (opt.length != L2CAP_OPT_MTU_SIZE)
485 goto reject;
486
487 m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
488 val.mtu = le16toh(val.mtu);
489
490 /*
491 * XXX how do we know what the minimum acceptable MTU is
492 * for a channel? Spec says some profiles have a higher
493 * minimum but I have no way to find that out at this
494 * juncture..
495 */
496 if (val.mtu < L2CAP_MTU_MINIMUM) {
497 if (len + sizeof(opt) + L2CAP_OPT_MTU_SIZE > sizeof(buf))
498 goto reject;
499
500 rp.result = L2CAP_UNACCEPTABLE_PARAMS;
501 memcpy(buf + len, &opt, sizeof(opt));
502 len += sizeof(opt);
503 val.mtu = htole16(L2CAP_MTU_MINIMUM);
504 memcpy(buf + len, &val, L2CAP_OPT_MTU_SIZE);
505 len += L2CAP_OPT_MTU_SIZE;
506 } else
507 chan->lc_omtu = val.mtu;
508
509 break;
510
511 case L2CAP_OPT_FLUSH_TIMO:
512 if (rp.result == L2CAP_UNKNOWN_OPTION)
513 break;
514
515 if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
516 goto reject;
517
518 /*
519 * I think that this is informational only - he is
520 * informing us of the flush timeout he will be using.
521 * I dont think this affects us in any significant way,
522 * so just ignore this value for now.
523 */
524 break;
525
526 case L2CAP_OPT_QOS:
527 default:
528 /* ignore hints */
529 if (opt.type & L2CAP_OPT_HINT_BIT)
530 break;
531
532 /* unknown options supercede all else */
533 if (rp.result != L2CAP_UNKNOWN_OPTION) {
534 rp.result = L2CAP_UNKNOWN_OPTION;
535 len = sizeof(rp);
536 }
537
538 /* ignore if it don't fit */
539 if (len + sizeof(opt) > sizeof(buf))
540 break;
541
542 /* return unknown option type, but no data */
543 buf[len++] = opt.type;
544 buf[len++] = 0;
545 break;
546 }
547
548 m_adj(m, opt.length);
549 left -= opt.length;
550 }
551
552 rp.result = htole16(rp.result);
553 memcpy(buf, &rp, sizeof(rp));
554 l2cap_send_signal(link, L2CAP_CONFIG_RSP, cmd.ident, len, buf);
555
556 if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0
557 && rp.result == le16toh(L2CAP_SUCCESS)) {
558
559 chan->lc_flags &= ~L2CAP_WAIT_CONFIG_REQ;
560
561 if ((chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0) {
562 chan->lc_state = L2CAP_OPEN;
563 /* XXX how to distinguish REconfiguration? */
564 (*chan->lc_proto->connected)(chan->lc_upper);
565 }
566 }
567 return;
568
569 reject:
570 l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_NOT_UNDERSTOOD);
571 out:
572 m_adj(m, left);
573 }
574
575 /*
576 * Process Received Config Response.
577 */
578 static void
579 l2cap_recv_config_rsp(struct mbuf *m, struct hci_link *link)
580 {
581 l2cap_cmd_hdr_t cmd;
582 l2cap_cfg_rsp_cp cp;
583 l2cap_cfg_opt_t opt;
584 l2cap_cfg_opt_val_t val;
585 struct l2cap_req *req;
586 struct l2cap_channel *chan;
587 int left;
588
589 m_copydata(m, 0, sizeof(cmd), &cmd);
590 m_adj(m, sizeof(cmd));
591 left = le16toh(cmd.length);
592
593 if (left < sizeof(cp))
594 goto out;
595
596 m_copydata(m, 0, sizeof(cp), &cp);
597 m_adj(m, sizeof(cp));
598 left -= sizeof(cp);
599
600 cp.scid = le16toh(cp.scid);
601 cp.flags = le16toh(cp.flags);
602 cp.result = le16toh(cp.result);
603
604 req = l2cap_request_lookup(link, cmd.ident);
605 if (req == NULL || req->lr_code != L2CAP_CONFIG_REQ)
606 goto out;
607
608 chan = req->lr_chan;
609 if (chan != NULL && chan->lc_lcid != cp.scid)
610 goto out;
611
612 l2cap_request_free(req);
613
614 if (chan == NULL || chan->lc_state != L2CAP_WAIT_CONFIG
615 || (chan->lc_flags & L2CAP_WAIT_CONFIG_RSP) == 0)
616 goto out;
617
618 if ((cp.flags & L2CAP_OPT_CFLAG_BIT)) {
619 l2cap_cfg_req_cp rp;
620
621 /*
622 * They have more to tell us and want another ID to
623 * use, so send an empty config request
624 */
625 if (l2cap_request_alloc(chan, L2CAP_CONFIG_REQ))
626 goto discon;
627
628 rp.dcid = htole16(cp.scid);
629 rp.flags = 0;
630
631 if (l2cap_send_signal(link, L2CAP_CONFIG_REQ, link->hl_lastid,
632 sizeof(rp), &rp))
633 goto discon;
634 }
635
636 switch(cp.result) {
637 case L2CAP_SUCCESS:
638 /*
639 * If continuation flag was not set, our config request was
640 * accepted. We may have to wait for their config request to
641 * complete, so check that but otherwise we are open
642 *
643 * There may be 'advisory' values in the packet but we just
644 * ignore those..
645 */
646 if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0) {
647 chan->lc_flags &= ~L2CAP_WAIT_CONFIG_RSP;
648
649 if ((chan->lc_flags & L2CAP_WAIT_CONFIG_REQ) == 0) {
650 chan->lc_state = L2CAP_OPEN;
651 /* XXX how to distinguish REconfiguration? */
652 (*chan->lc_proto->connected)(chan->lc_upper);
653 }
654 }
655 goto out;
656
657 case L2CAP_UNACCEPTABLE_PARAMS:
658 /*
659 * Packet contains unacceptable parameters with preferred values
660 */
661 while (left > 0) {
662 if (left < sizeof(opt))
663 goto discon;
664
665 m_copydata(m, 0, sizeof(opt), &opt);
666 m_adj(m, sizeof(opt));
667 left -= sizeof(opt);
668
669 if (left < opt.length)
670 goto discon;
671
672 switch (opt.type) {
673 case L2CAP_OPT_MTU:
674 if (opt.length != L2CAP_OPT_MTU_SIZE)
675 goto discon;
676
677 m_copydata(m, 0, L2CAP_OPT_MTU_SIZE, &val);
678 chan->lc_imtu = le16toh(val.mtu);
679 if (chan->lc_imtu < L2CAP_MTU_MINIMUM)
680 chan->lc_imtu = L2CAP_MTU_DEFAULT;
681 break;
682
683 case L2CAP_OPT_FLUSH_TIMO:
684 if (opt.length != L2CAP_OPT_FLUSH_TIMO_SIZE)
685 goto discon;
686
687 /*
688 * Spec says: If we cannot honor proposed value,
689 * either disconnect or try again with original
690 * value. I can't really see why they want to
691 * interfere with OUR flush timeout in any case
692 * so we just punt for now.
693 */
694 goto discon;
695
696 case L2CAP_OPT_QOS:
697 break;
698
699 default:
700 UNKNOWN(opt.type);
701 goto discon;
702 }
703
704 m_adj(m, opt.length);
705 left -= opt.length;
706 }
707
708 if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
709 l2cap_send_config_req(chan); /* no state change */
710
711 goto out;
712
713 case L2CAP_REJECT:
714 goto discon;
715
716 case L2CAP_UNKNOWN_OPTION:
717 /*
718 * Packet contains options not understood. Turn off unknown
719 * options by setting them to default values (means they will
720 * not be requested again).
721 *
722 * If our option was already off then fail (paranoia?)
723 *
724 * XXX Should we consider that options were set for a reason?
725 */
726 while (left > 0) {
727 if (left < sizeof(opt))
728 goto discon;
729
730 m_copydata(m, 0, sizeof(opt), &opt);
731 m_adj(m, sizeof(opt));
732 left -= sizeof(opt);
733
734 if (left < opt.length)
735 goto discon;
736
737 m_adj(m, opt.length);
738 left -= opt.length;
739
740 switch(opt.type) {
741 case L2CAP_OPT_MTU:
742 if (chan->lc_imtu == L2CAP_MTU_DEFAULT)
743 goto discon;
744
745 chan->lc_imtu = L2CAP_MTU_DEFAULT;
746 break;
747
748 case L2CAP_OPT_FLUSH_TIMO:
749 if (chan->lc_flush == L2CAP_FLUSH_TIMO_DEFAULT)
750 goto discon;
751
752 chan->lc_flush = L2CAP_FLUSH_TIMO_DEFAULT;
753 break;
754
755 case L2CAP_OPT_QOS:
756 break;
757
758 default:
759 UNKNOWN(opt.type);
760 goto discon;
761 }
762 }
763
764 if ((cp.flags & L2CAP_OPT_CFLAG_BIT) == 0)
765 l2cap_send_config_req(chan); /* no state change */
766
767 goto out;
768
769 default:
770 UNKNOWN(cp.result);
771 goto discon;
772 }
773
774 DPRINTF("how did I get here!?\n");
775
776 discon:
777 l2cap_send_disconnect_req(chan);
778 l2cap_close(chan, ECONNABORTED);
779
780 out:
781 m_adj(m, left);
782 }
783
784 /*
785 * Process Received Disconnect Request. We must validate scid and dcid
786 * just in case but otherwise this connection is finished.
787 */
788 static void
789 l2cap_recv_disconnect_req(struct mbuf *m, struct hci_link *link)
790 {
791 l2cap_cmd_hdr_t cmd;
792 l2cap_discon_req_cp cp;
793 l2cap_discon_rsp_cp rp;
794 struct l2cap_channel *chan;
795
796 m_copydata(m, 0, sizeof(cmd), &cmd);
797 m_adj(m, sizeof(cmd));
798
799 m_copydata(m, 0, sizeof(cp), &cp);
800 m_adj(m, sizeof(cp));
801
802 cp.scid = le16toh(cp.scid);
803 cp.dcid = le16toh(cp.dcid);
804
805 chan = l2cap_cid_lookup(cp.dcid);
806 if (chan == NULL || chan->lc_link != link || chan->lc_rcid != cp.scid) {
807 l2cap_send_command_rej(link, cmd.ident, L2CAP_REJ_INVALID_CID,
808 cp.dcid, cp.scid);
809 return;
810 }
811
812 rp.dcid = htole16(chan->lc_lcid);
813 rp.scid = htole16(chan->lc_rcid);
814 l2cap_send_signal(link, L2CAP_DISCONNECT_RSP, cmd.ident,
815 sizeof(rp), &rp);
816
817 if (chan->lc_state != L2CAP_CLOSED)
818 l2cap_close(chan, ECONNRESET);
819 }
820
821 /*
822 * Process Received Disconnect Response. We must validate scid and dcid but
823 * unless we were waiting for this signal, ignore it.
824 */
825 static void
826 l2cap_recv_disconnect_rsp(struct mbuf *m, struct hci_link *link)
827 {
828 l2cap_cmd_hdr_t cmd;
829 l2cap_discon_rsp_cp cp;
830 struct l2cap_req *req;
831 struct l2cap_channel *chan;
832
833 m_copydata(m, 0, sizeof(cmd), &cmd);
834 m_adj(m, sizeof(cmd));
835
836 m_copydata(m, 0, sizeof(cp), &cp);
837 m_adj(m, sizeof(cp));
838
839 cp.scid = le16toh(cp.scid);
840 cp.dcid = le16toh(cp.dcid);
841
842 req = l2cap_request_lookup(link, cmd.ident);
843 if (req == NULL || req->lr_code != L2CAP_DISCONNECT_REQ)
844 return;
845
846 chan = req->lr_chan;
847 if (chan == NULL
848 || chan->lc_lcid != cp.scid
849 || chan->lc_rcid != cp.dcid)
850 return;
851
852 l2cap_request_free(req);
853
854 if (chan->lc_state != L2CAP_WAIT_DISCONNECT)
855 return;
856
857 l2cap_close(chan, 0);
858 }
859
860 /*
861 * Process Received Info Request. We must respond but alas dont
862 * support anything as yet so thats easy.
863 */
864 static void
865 l2cap_recv_info_req(struct mbuf *m, struct hci_link *link)
866 {
867 l2cap_cmd_hdr_t cmd;
868 l2cap_info_req_cp cp;
869 l2cap_info_rsp_cp rp;
870
871 m_copydata(m, 0, sizeof(cmd), &cmd);
872 m_adj(m, sizeof(cmd));
873
874 m_copydata(m, 0, sizeof(cp), &cp);
875 m_adj(m, sizeof(cp));
876
877 switch(le16toh(cp.type)) {
878 case L2CAP_CONNLESS_MTU:
879 case L2CAP_EXTENDED_FEATURES:
880 default:
881 rp.type = cp.type;
882 rp.result = htole16(L2CAP_NOT_SUPPORTED);
883
884 l2cap_send_signal(link, L2CAP_INFO_RSP, cmd.ident,
885 sizeof(rp), &rp);
886 break;
887 }
888 }
889
890 /*
891 * Construct signal and wrap in C-Frame for link.
892 */
893 static int
894 l2cap_send_signal(struct hci_link *link, uint8_t code, uint8_t ident,
895 uint16_t length, void *data)
896 {
897 struct mbuf *m;
898 l2cap_hdr_t *hdr;
899 l2cap_cmd_hdr_t *cmd;
900
901 #ifdef DIAGNOSTIC
902 if (link == NULL)
903 return ENETDOWN;
904
905 if (sizeof(l2cap_cmd_hdr_t) + length > link->hl_mtu)
906 aprint_error_dev(link->hl_unit->hci_dev,
907 "exceeding L2CAP Signal MTU for link!\n");
908 #endif
909
910 m = m_gethdr(M_DONTWAIT, MT_DATA);
911 if (m == NULL)
912 return ENOMEM;
913
914 hdr = mtod(m, l2cap_hdr_t *);
915 cmd = (l2cap_cmd_hdr_t *)(hdr + 1);
916
917 m->m_len = m->m_pkthdr.len = MHLEN;
918
919 /* Command Data */
920 if (length > 0)
921 m_copyback(m, sizeof(*hdr) + sizeof(*cmd), length, data);
922
923 /* Command Header */
924 cmd->code = code;
925 cmd->ident = ident;
926 cmd->length = htole16(length);
927 length += sizeof(*cmd);
928
929 /* C-Frame Header */
930 hdr->length = htole16(length);
931 hdr->dcid = htole16(L2CAP_SIGNAL_CID);
932 length += sizeof(*hdr);
933
934 if (m->m_pkthdr.len != MAX(MHLEN, length)) {
935 m_freem(m);
936 return ENOMEM;
937 }
938
939 m->m_pkthdr.len = length;
940 m->m_len = MIN(length, MHLEN);
941
942 DPRINTFN(2, "(%s) code %d, ident %d, len %d\n",
943 device_xname(link->hl_unit->hci_dev), code, ident, length);
944
945 return hci_acl_send(m, link, NULL);
946 }
947
948 /*
949 * Send Command Reject packet.
950 */
951 static int
952 l2cap_send_command_rej(struct hci_link *link, uint8_t ident,
953 uint16_t reason, ...)
954 {
955 l2cap_cmd_rej_cp cp;
956 int len = 0;
957 va_list ap;
958
959 va_start(ap, reason);
960
961 cp.reason = htole16(reason);
962
963 switch (reason) {
964 case L2CAP_REJ_NOT_UNDERSTOOD:
965 len = 2;
966 break;
967
968 case L2CAP_REJ_MTU_EXCEEDED:
969 len = 4;
970 cp.data[0] = va_arg(ap, int); /* SigMTU */
971 cp.data[0] = htole16(cp.data[0]);
972 break;
973
974 case L2CAP_REJ_INVALID_CID:
975 len = 6;
976 cp.data[0] = va_arg(ap, int); /* dcid */
977 cp.data[0] = htole16(cp.data[0]);
978 cp.data[1] = va_arg(ap, int); /* scid */
979 cp.data[1] = htole16(cp.data[1]);
980 break;
981
982 default:
983 UNKNOWN(reason);
984 return EINVAL;
985 }
986
987 va_end(ap);
988
989 return l2cap_send_signal(link, L2CAP_COMMAND_REJ, ident, len, &cp);
990 }
991
992 /*
993 * Send Connect Request
994 */
995 int
996 l2cap_send_connect_req(struct l2cap_channel *chan)
997 {
998 l2cap_con_req_cp cp;
999 int err;
1000
1001 err = l2cap_request_alloc(chan, L2CAP_CONNECT_REQ);
1002 if (err)
1003 return err;
1004
1005 cp.psm = htole16(chan->lc_raddr.bt_psm);
1006 cp.scid = htole16(chan->lc_lcid);
1007
1008 return l2cap_send_signal(chan->lc_link, L2CAP_CONNECT_REQ,
1009 chan->lc_link->hl_lastid, sizeof(cp), &cp);
1010 }
1011
1012 /*
1013 * Send Config Request
1014 *
1015 * For outgoing config request, we only put options in the packet if they
1016 * differ from the default and would have to be actioned. We dont support
1017 * enough option types to make overflowing SigMTU an issue so it can all
1018 * go in one packet.
1019 */
1020 int
1021 l2cap_send_config_req(struct l2cap_channel *chan)
1022 {
1023 l2cap_cfg_req_cp *cp;
1024 l2cap_cfg_opt_t *opt;
1025 l2cap_cfg_opt_val_t *val;
1026 uint8_t *next, buf[L2CAP_MTU_MINIMUM];
1027 int err;
1028
1029 err = l2cap_request_alloc(chan, L2CAP_CONFIG_REQ);
1030 if (err)
1031 return err;
1032
1033 /* Config Header (4 octets) */
1034 cp = (l2cap_cfg_req_cp *)buf;
1035 cp->dcid = htole16(chan->lc_rcid);
1036 cp->flags = 0; /* "No Continuation" */
1037
1038 next = buf + sizeof(l2cap_cfg_req_cp);
1039
1040 /* Incoming MTU (4 octets) */
1041 if (chan->lc_imtu != L2CAP_MTU_DEFAULT) {
1042 opt = (l2cap_cfg_opt_t *)next;
1043 opt->type = L2CAP_OPT_MTU;
1044 opt->length = L2CAP_OPT_MTU_SIZE;
1045
1046 val = (l2cap_cfg_opt_val_t *)(opt + 1);
1047 val->mtu = htole16(chan->lc_imtu);
1048
1049 next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_MTU_SIZE;
1050 }
1051
1052 /* Flush Timeout (4 octets) */
1053 if (chan->lc_flush != L2CAP_FLUSH_TIMO_DEFAULT) {
1054 opt = (l2cap_cfg_opt_t *)next;
1055 opt->type = L2CAP_OPT_FLUSH_TIMO;
1056 opt->length = L2CAP_OPT_FLUSH_TIMO_SIZE;
1057
1058 val = (l2cap_cfg_opt_val_t *)(opt + 1);
1059 val->flush_timo = htole16(chan->lc_flush);
1060
1061 next += sizeof(l2cap_cfg_opt_t) + L2CAP_OPT_FLUSH_TIMO_SIZE;
1062 }
1063
1064 /* Outgoing QoS Flow (24 octets) */
1065 /* Retransmission & Flow Control (11 octets) */
1066 /*
1067 * From here we need to start paying attention to SigMTU as we have
1068 * possibly overflowed the minimum supported..
1069 */
1070
1071 return l2cap_send_signal(chan->lc_link, L2CAP_CONFIG_REQ,
1072 chan->lc_link->hl_lastid, (int)(next - buf), buf);
1073 }
1074
1075 /*
1076 * Send Disconnect Request
1077 */
1078 int
1079 l2cap_send_disconnect_req(struct l2cap_channel *chan)
1080 {
1081 l2cap_discon_req_cp cp;
1082 int err;
1083
1084 err = l2cap_request_alloc(chan, L2CAP_DISCONNECT_REQ);
1085 if (err)
1086 return err;
1087
1088 cp.dcid = htole16(chan->lc_rcid);
1089 cp.scid = htole16(chan->lc_lcid);
1090
1091 return l2cap_send_signal(chan->lc_link, L2CAP_DISCONNECT_REQ,
1092 chan->lc_link->hl_lastid, sizeof(cp), &cp);
1093 }
1094
1095 /*
1096 * Send Connect Response
1097 */
1098 int
1099 l2cap_send_connect_rsp(struct hci_link *link, uint8_t ident, uint16_t dcid, uint16_t scid, uint16_t result)
1100 {
1101 l2cap_con_rsp_cp cp;
1102
1103 memset(&cp, 0, sizeof(cp));
1104 cp.dcid = htole16(dcid);
1105 cp.scid = htole16(scid);
1106 cp.result = htole16(result);
1107
1108 return l2cap_send_signal(link, L2CAP_CONNECT_RSP, ident, sizeof(cp), &cp);
1109 }
1110