1/*
2 * ng_btsocket_l2cap.c
3 */
4
5/*-
6 * SPDX-License-Identifier: BSD-2-Clause
7 *
8 * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
9 * All rights reserved.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 *    notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 *    notice, this list of conditions and the following disclaimer in the
18 *    documentation and/or other materials provided with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 *
32 * $Id: ng_btsocket_l2cap.c,v 1.16 2003/09/14 23:29:06 max Exp $
33 */
34
35#include <sys/param.h>
36#include <sys/systm.h>
37#include <sys/bitstring.h>
38#include <sys/domain.h>
39#include <sys/endian.h>
40#include <sys/errno.h>
41#include <sys/filedesc.h>
42#include <sys/ioccom.h>
43#include <sys/kernel.h>
44#include <sys/lock.h>
45#include <sys/malloc.h>
46#include <sys/mbuf.h>
47#include <sys/mutex.h>
48#include <sys/protosw.h>
49#include <sys/queue.h>
50#include <sys/socket.h>
51#include <sys/socketvar.h>
52#include <sys/sysctl.h>
53#include <sys/taskqueue.h>
54
55#include <net/vnet.h>
56
57#include <netgraph/ng_message.h>
58#include <netgraph/netgraph.h>
59#include <netgraph/bluetooth/include/ng_bluetooth.h>
60#include <netgraph/bluetooth/include/ng_hci.h>
61#include <netgraph/bluetooth/include/ng_l2cap.h>
62#include <netgraph/bluetooth/include/ng_btsocket.h>
63#include <netgraph/bluetooth/include/ng_btsocket_l2cap.h>
64
65/* MALLOC define */
66#ifdef NG_SEPARATE_MALLOC
67static MALLOC_DEFINE(M_NETGRAPH_BTSOCKET_L2CAP, "netgraph_btsocks_l2cap",
68		"Netgraph Bluetooth L2CAP sockets");
69#else
70#define M_NETGRAPH_BTSOCKET_L2CAP M_NETGRAPH
71#endif /* NG_SEPARATE_MALLOC */
72
73/* Netgraph node methods */
74static ng_constructor_t	ng_btsocket_l2cap_node_constructor;
75static ng_rcvmsg_t	ng_btsocket_l2cap_node_rcvmsg;
76static ng_shutdown_t	ng_btsocket_l2cap_node_shutdown;
77static ng_newhook_t	ng_btsocket_l2cap_node_newhook;
78static ng_connect_t	ng_btsocket_l2cap_node_connect;
79static ng_rcvdata_t	ng_btsocket_l2cap_node_rcvdata;
80static ng_disconnect_t	ng_btsocket_l2cap_node_disconnect;
81
82static void		ng_btsocket_l2cap_input   (void *, int);
83static void		ng_btsocket_l2cap_rtclean (void *, int);
84
85/* Netgraph type descriptor */
86static struct ng_type	typestruct = {
87	.version =	NG_ABI_VERSION,
88	.name =		NG_BTSOCKET_L2CAP_NODE_TYPE,
89	.constructor =	ng_btsocket_l2cap_node_constructor,
90	.rcvmsg =	ng_btsocket_l2cap_node_rcvmsg,
91	.shutdown =	ng_btsocket_l2cap_node_shutdown,
92	.newhook =	ng_btsocket_l2cap_node_newhook,
93	.connect =	ng_btsocket_l2cap_node_connect,
94	.rcvdata =	ng_btsocket_l2cap_node_rcvdata,
95	.disconnect =	ng_btsocket_l2cap_node_disconnect,
96};
97
98/* Globals */
99extern int					ifqmaxlen;
100static u_int32_t				ng_btsocket_l2cap_debug_level;
101static node_p					ng_btsocket_l2cap_node;
102static struct ng_bt_itemq			ng_btsocket_l2cap_queue;
103static struct mtx				ng_btsocket_l2cap_queue_mtx;
104static struct task				ng_btsocket_l2cap_queue_task;
105static LIST_HEAD(, ng_btsocket_l2cap_pcb)	ng_btsocket_l2cap_sockets;
106static struct mtx				ng_btsocket_l2cap_sockets_mtx;
107static LIST_HEAD(, ng_btsocket_l2cap_rtentry)	ng_btsocket_l2cap_rt;
108static struct mtx				ng_btsocket_l2cap_rt_mtx;
109static struct task				ng_btsocket_l2cap_rt_task;
110static struct timeval				ng_btsocket_l2cap_lasttime;
111static int					ng_btsocket_l2cap_curpps;
112
113/* Sysctl tree */
114SYSCTL_DECL(_net_bluetooth_l2cap_sockets);
115static SYSCTL_NODE(_net_bluetooth_l2cap_sockets, OID_AUTO, seq,
116    CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
117    "Bluetooth SEQPACKET L2CAP sockets family");
118SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, debug_level,
119	CTLFLAG_RW,
120	&ng_btsocket_l2cap_debug_level, NG_BTSOCKET_WARN_LEVEL,
121	"Bluetooth SEQPACKET L2CAP sockets debug level");
122SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_len,
123	CTLFLAG_RD,
124	&ng_btsocket_l2cap_queue.len, 0,
125	"Bluetooth SEQPACKET L2CAP sockets input queue length");
126SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_maxlen,
127	CTLFLAG_RD,
128	&ng_btsocket_l2cap_queue.maxlen, 0,
129	"Bluetooth SEQPACKET L2CAP sockets input queue max. length");
130SYSCTL_UINT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_drops,
131	CTLFLAG_RD,
132	&ng_btsocket_l2cap_queue.drops, 0,
133	"Bluetooth SEQPACKET L2CAP sockets input queue drops");
134
135/* Debug */
136#define NG_BTSOCKET_L2CAP_INFO \
137	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_INFO_LEVEL && \
138	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
139		printf
140
141#define NG_BTSOCKET_L2CAP_WARN \
142	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_WARN_LEVEL && \
143	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
144		printf
145
146#define NG_BTSOCKET_L2CAP_ERR \
147	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ERR_LEVEL && \
148	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
149		printf
150
151#define NG_BTSOCKET_L2CAP_ALERT \
152	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ALERT_LEVEL && \
153	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
154		printf
155
156/*
157 * Netgraph message processing routines
158 */
159
160static int ng_btsocket_l2cap_process_l2ca_con_req_rsp
161	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
162static int ng_btsocket_l2cap_process_l2ca_con_rsp_rsp
163	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
164static int ng_btsocket_l2cap_process_l2ca_con_ind
165	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
166
167static int ng_btsocket_l2cap_process_l2ca_cfg_req_rsp
168	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
169static int ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp
170	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
171static int ng_btsocket_l2cap_process_l2ca_cfg_ind
172	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
173
174static int ng_btsocket_l2cap_process_l2ca_discon_rsp
175	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
176static int ng_btsocket_l2cap_process_l2ca_discon_ind
177	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
178
179static int ng_btsocket_l2cap_process_l2ca_write_rsp
180	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
181
182/*
183 * Send L2CA_xxx messages to the lower layer
184 */
185
186static int  ng_btsocket_l2cap_send_l2ca_con_req
187	(ng_btsocket_l2cap_pcb_p);
188static int  ng_btsocket_l2cap_send_l2ca_con_rsp_req
189	(u_int32_t, ng_btsocket_l2cap_rtentry_p, bdaddr_p, int, int, int, int);
190static int  ng_btsocket_l2cap_send_l2ca_cfg_req
191	(ng_btsocket_l2cap_pcb_p);
192static int  ng_btsocket_l2cap_send_l2ca_cfg_rsp
193	(ng_btsocket_l2cap_pcb_p);
194static int  ng_btsocket_l2cap_send_l2ca_discon_req
195	(u_int32_t, ng_btsocket_l2cap_pcb_p);
196
197static int ng_btsocket_l2cap_send2
198	(ng_btsocket_l2cap_pcb_p);
199
200/*
201 * Timeout processing routines
202 */
203
204static void ng_btsocket_l2cap_timeout         (ng_btsocket_l2cap_pcb_p);
205static void ng_btsocket_l2cap_untimeout       (ng_btsocket_l2cap_pcb_p);
206static void ng_btsocket_l2cap_process_timeout (void *);
207
208/*
209 * Other stuff
210 */
211
212static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_addr(bdaddr_p, int);
213static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_token(u_int32_t);
214static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_cid (bdaddr_p, int,int);
215static int                         ng_btsocket_l2cap_result2errno(int);
216
217static int ng_btsock_l2cap_addrtype_to_linktype(int addrtype);
218
219#define ng_btsocket_l2cap_wakeup_input_task() \
220	taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_queue_task)
221
222#define ng_btsocket_l2cap_wakeup_route_task() \
223	taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_rt_task)
224
225int ng_btsock_l2cap_addrtype_to_linktype(int addrtype)
226{
227	switch(addrtype){
228	case BDADDR_LE_PUBLIC:
229		return NG_HCI_LINK_LE_PUBLIC;
230	case BDADDR_LE_RANDOM:
231		return NG_HCI_LINK_LE_RANDOM;
232	default:
233		return NG_HCI_LINK_ACL;
234	}
235}
236
237/*****************************************************************************
238 *****************************************************************************
239 **                        Netgraph node interface
240 *****************************************************************************
241 *****************************************************************************/
242
243/*
244 * Netgraph node constructor. Do not allow to create node of this type.
245 */
246
247static int
248ng_btsocket_l2cap_node_constructor(node_p node)
249{
250	return (EINVAL);
251} /* ng_btsocket_l2cap_node_constructor */
252
253/*
254 * Do local shutdown processing. Let old node go and create new fresh one.
255 */
256
257static int
258ng_btsocket_l2cap_node_shutdown(node_p node)
259{
260	int	error = 0;
261
262	NG_NODE_UNREF(node);
263
264	/* Create new node */
265	error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
266	if (error != 0) {
267		NG_BTSOCKET_L2CAP_ALERT(
268"%s: Could not create Netgraph node, error=%d\n", __func__, error);
269
270		ng_btsocket_l2cap_node = NULL;
271
272		return (error);
273	}
274
275	error = ng_name_node(ng_btsocket_l2cap_node,
276				NG_BTSOCKET_L2CAP_NODE_TYPE);
277	if (error != 0) {
278		NG_BTSOCKET_L2CAP_ALERT(
279"%s: Could not name Netgraph node, error=%d\n", __func__, error);
280
281		NG_NODE_UNREF(ng_btsocket_l2cap_node);
282		ng_btsocket_l2cap_node = NULL;
283
284		return (error);
285	}
286
287	return (0);
288} /* ng_btsocket_l2cap_node_shutdown */
289
290/*
291 * We allow any hook to be connected to the node.
292 */
293
294static int
295ng_btsocket_l2cap_node_newhook(node_p node, hook_p hook, char const *name)
296{
297	return (0);
298} /* ng_btsocket_l2cap_node_newhook */
299
300/*
301 * Just say "YEP, that's OK by me!"
302 */
303
304static int
305ng_btsocket_l2cap_node_connect(hook_p hook)
306{
307	NG_HOOK_SET_PRIVATE(hook, NULL);
308	NG_HOOK_REF(hook); /* Keep extra reference to the hook */
309
310#if 0
311	NG_HOOK_FORCE_QUEUE(NG_HOOK_PEER(hook));
312	NG_HOOK_FORCE_QUEUE(hook);
313#endif
314
315	return (0);
316} /* ng_btsocket_l2cap_node_connect */
317
318/*
319 * Hook disconnection. Schedule route cleanup task
320 */
321
322static int
323ng_btsocket_l2cap_node_disconnect(hook_p hook)
324{
325	/*
326	 * If hook has private information than we must have this hook in
327	 * the routing table and must schedule cleaning for the routing table.
328	 * Otherwise hook was connected but we never got "hook_info" message,
329	 * so we have never added this hook to the routing table and it save
330	 * to just delete it.
331	 */
332
333	if (NG_HOOK_PRIVATE(hook) != NULL)
334		return (ng_btsocket_l2cap_wakeup_route_task());
335
336	NG_HOOK_UNREF(hook); /* Remove extra reference */
337
338	return (0);
339} /* ng_btsocket_l2cap_node_disconnect */
340
341/*
342 * Process incoming messages
343 */
344
345static int
346ng_btsocket_l2cap_node_rcvmsg(node_p node, item_p item, hook_p hook)
347{
348	struct ng_mesg	*msg = NGI_MSG(item); /* item still has message */
349	int		 error = 0;
350
351	if (msg != NULL && msg->header.typecookie == NGM_L2CAP_COOKIE) {
352		mtx_lock(&ng_btsocket_l2cap_queue_mtx);
353		if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
354			NG_BTSOCKET_L2CAP_ERR(
355"%s: Input queue is full (msg)\n", __func__);
356
357			NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
358			NG_FREE_ITEM(item);
359			error = ENOBUFS;
360		} else {
361			if (hook != NULL) {
362				NG_HOOK_REF(hook);
363				NGI_SET_HOOK(item, hook);
364			}
365
366			NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
367			error = ng_btsocket_l2cap_wakeup_input_task();
368		}
369		mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
370	} else {
371		NG_FREE_ITEM(item);
372		error = EINVAL;
373	}
374
375	return (error);
376} /* ng_btsocket_l2cap_node_rcvmsg */
377
378/*
379 * Receive data on a hook
380 */
381
382static int
383ng_btsocket_l2cap_node_rcvdata(hook_p hook, item_p item)
384{
385	int	error = 0;
386
387	mtx_lock(&ng_btsocket_l2cap_queue_mtx);
388	if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
389		NG_BTSOCKET_L2CAP_ERR(
390"%s: Input queue is full (data)\n", __func__);
391
392		NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
393		NG_FREE_ITEM(item);
394		error = ENOBUFS;
395	} else {
396		NG_HOOK_REF(hook);
397		NGI_SET_HOOK(item, hook);
398
399		NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
400		error = ng_btsocket_l2cap_wakeup_input_task();
401	}
402	mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
403
404	return (error);
405} /* ng_btsocket_l2cap_node_rcvdata */
406
407/*
408 * Process L2CA_Connect respose. Socket layer must have initiated connection,
409 * so we have to have a socket associated with message token.
410 */
411
412static int
413ng_btsocket_l2cap_process_l2ca_con_req_rsp(struct ng_mesg *msg,
414		ng_btsocket_l2cap_rtentry_p rt)
415{
416	ng_l2cap_l2ca_con_op	*op = NULL;
417	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
418	int			 error = 0;
419
420	if (msg->header.arglen != sizeof(*op))
421		return (EMSGSIZE);
422
423	op = (ng_l2cap_l2ca_con_op *)(msg->data);
424
425	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
426
427	/* Look for the socket with the token */
428	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
429	if (pcb == NULL) {
430		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
431		return (ENOENT);
432	}
433
434	mtx_lock(&pcb->pcb_mtx);
435
436	NG_BTSOCKET_L2CAP_INFO(
437"%s: Got L2CA_Connect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
438"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, status=%d, " \
439"state=%d\n",	__func__, msg->header.token,
440		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
441		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
442		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
443		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
444		pcb->psm, op->lcid, op->result, op->status,
445		pcb->state);
446
447	if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
448		mtx_unlock(&pcb->pcb_mtx);
449		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
450
451		return (ENOENT);
452	}
453
454	ng_btsocket_l2cap_untimeout(pcb);
455
456	if (op->result == NG_L2CAP_PENDING) {
457		ng_btsocket_l2cap_timeout(pcb);
458		mtx_unlock(&pcb->pcb_mtx);
459		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
460
461		return (0);
462	}
463
464	if (op->result == NG_L2CAP_SUCCESS){
465		if((pcb->idtype == NG_L2CAP_L2CA_IDTYPE_ATT)||
466		   (pcb->idtype == NG_L2CAP_L2CA_IDTYPE_SMP)){
467			pcb->encryption = op->encryption;					pcb->cid = op->lcid;
468			if(pcb->need_encrypt && !(pcb->encryption)){
469				ng_btsocket_l2cap_timeout(pcb);
470				pcb->state = NG_BTSOCKET_L2CAP_W4_ENC_CHANGE;
471			}else{
472				pcb->state = NG_BTSOCKET_L2CAP_OPEN;
473				soisconnected(pcb->so);
474			}
475		}else{
476			/*
477			 * Channel is now open, so update local channel ID and
478			 * start configuration process. Source and destination
479			 * addresses as well as route must be already set.
480			 */
481
482			pcb->cid = op->lcid;
483			pcb->encryption = op->encryption;
484			error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
485			if (error != 0) {
486				/* Send disconnect request with "zero" token */
487				ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
488
489				/* ... and close the socket */
490				pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
491				soisdisconnected(pcb->so);
492			} else {
493				pcb->cfg_state = NG_BTSOCKET_L2CAP_CFG_IN_SENT;
494				pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
495
496				ng_btsocket_l2cap_timeout(pcb);
497			}
498		}
499	} else {
500		/*
501		 * We have failed to open connection, so convert result
502		 * code to "errno" code and disconnect the socket. Channel
503		 * already has been closed.
504		 */
505
506		pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
507		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
508		soisdisconnected(pcb->so);
509	}
510	mtx_unlock(&pcb->pcb_mtx);
511	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
512
513	return (error);
514} /* ng_btsocket_l2cap_process_l2ca_con_req_rsp */
515
516/*
517 * Process L2CA_ConnectRsp response
518 */
519
520static int
521ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(struct ng_mesg *msg,
522		ng_btsocket_l2cap_rtentry_p rt)
523{
524	ng_l2cap_l2ca_con_rsp_op	*op = NULL;
525	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
526
527	if (msg->header.arglen != sizeof(*op))
528		return (EMSGSIZE);
529
530	op = (ng_l2cap_l2ca_con_rsp_op *)(msg->data);
531
532	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
533
534	/* Look for the socket with the token */
535	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
536	if (pcb == NULL) {
537		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
538		return (ENOENT);
539	}
540
541	mtx_lock(&pcb->pcb_mtx);
542
543	NG_BTSOCKET_L2CAP_INFO(
544"%s: Got L2CA_ConnectRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
545"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
546		__func__, msg->header.token,
547		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
548		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
549		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
550		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
551		pcb->psm, pcb->cid, op->result, pcb->state);
552
553	if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
554		mtx_unlock(&pcb->pcb_mtx);
555		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
556
557		return (ENOENT);
558	}
559
560	ng_btsocket_l2cap_untimeout(pcb);
561
562	/* Check the result and disconnect the socket on failure */
563	if (op->result != NG_L2CAP_SUCCESS) {
564		/* Close the socket - channel already closed */
565		pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
566		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
567		soisdisconnected(pcb->so);
568	} else {
569		/* Move to CONFIGURING state and wait for CONFIG_IND */
570		pcb->cfg_state = 0;
571		pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
572		ng_btsocket_l2cap_timeout(pcb);
573	}
574
575	mtx_unlock(&pcb->pcb_mtx);
576	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
577
578	return (0);
579} /* ng_btsocket_process_l2ca_con_rsp_rsp */
580
581/*
582 * Process L2CA_Connect indicator. Find socket that listens on address
583 * and PSM. Find exact or closest match. Create new socket and initiate
584 * connection.
585 */
586
587static int
588ng_btsocket_l2cap_process_l2ca_con_ind(struct ng_mesg *msg,
589		ng_btsocket_l2cap_rtentry_p rt)
590{
591	ng_l2cap_l2ca_con_ind_ip	*ip = NULL;
592	ng_btsocket_l2cap_pcb_t		*pcb = NULL, *pcb1 = NULL;
593	int				 error = 0;
594	u_int32_t			 token = 0;
595	u_int16_t			 result = 0;
596
597	if (msg->header.arglen != sizeof(*ip))
598		return (EMSGSIZE);
599
600	ip = (ng_l2cap_l2ca_con_ind_ip *)(msg->data);
601
602	NG_BTSOCKET_L2CAP_INFO(
603"%s: Got L2CA_Connect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
604"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, ident=%d\n",
605		__func__,
606		rt->src.b[5], rt->src.b[4], rt->src.b[3],
607		rt->src.b[2], rt->src.b[1], rt->src.b[0],
608		ip->bdaddr.b[5], ip->bdaddr.b[4], ip->bdaddr.b[3],
609		ip->bdaddr.b[2], ip->bdaddr.b[1], ip->bdaddr.b[0],
610		ip->psm, ip->lcid, ip->ident);
611
612	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
613
614	pcb = ng_btsocket_l2cap_pcb_by_addr(&rt->src, ip->psm);
615	if (pcb != NULL) {
616		struct socket *so1;
617
618		mtx_lock(&pcb->pcb_mtx);
619
620		CURVNET_SET(pcb->so->so_vnet);
621		so1 = sonewconn(pcb->so, 0);
622		CURVNET_RESTORE();
623		if (so1 == NULL) {
624			result = NG_L2CAP_NO_RESOURCES;
625			goto respond;
626		}
627
628		/*
629		 * If we got here than we have created new socket. So complete
630		 * connection. If we we listening on specific address then copy
631		 * source address from listening socket, otherwise copy source
632		 * address from hook's routing information.
633		 */
634
635		pcb1 = so2l2cap_pcb(so1);
636		KASSERT((pcb1 != NULL),
637("%s: pcb1 == NULL\n", __func__));
638
639 		mtx_lock(&pcb1->pcb_mtx);
640
641		if (bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src)) != 0)
642			bcopy(&pcb->src, &pcb1->src, sizeof(pcb1->src));
643		else
644			bcopy(&rt->src, &pcb1->src, sizeof(pcb1->src));
645
646		pcb1->flags &= ~NG_BTSOCKET_L2CAP_CLIENT;
647
648		bcopy(&ip->bdaddr, &pcb1->dst, sizeof(pcb1->dst));
649		pcb1->psm = ip->psm;
650		pcb1->cid = ip->lcid;
651		pcb1->rt = rt;
652
653		/* Copy socket settings */
654		pcb1->imtu = pcb->imtu;
655		bcopy(&pcb->oflow, &pcb1->oflow, sizeof(pcb1->oflow));
656		pcb1->flush_timo = pcb->flush_timo;
657
658		token = pcb1->token;
659	} else
660		/* Nobody listens on requested BDADDR/PSM */
661		result = NG_L2CAP_PSM_NOT_SUPPORTED;
662
663respond:
664	error = ng_btsocket_l2cap_send_l2ca_con_rsp_req(token, rt,
665							&ip->bdaddr,
666							ip->ident, ip->lcid,
667							result,ip->linktype);
668	if (pcb1 != NULL) {
669		if (error != 0) {
670			pcb1->so->so_error = error;
671			pcb1->state = NG_BTSOCKET_L2CAP_CLOSED;
672			soisdisconnected(pcb1->so);
673		} else {
674			pcb1->state = NG_BTSOCKET_L2CAP_CONNECTING;
675			soisconnecting(pcb1->so);
676
677			ng_btsocket_l2cap_timeout(pcb1);
678		}
679
680		mtx_unlock(&pcb1->pcb_mtx);
681	}
682
683	if (pcb != NULL)
684		mtx_unlock(&pcb->pcb_mtx);
685
686	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
687
688	return (error);
689} /* ng_btsocket_l2cap_process_l2ca_con_ind */
690/*Encryption Change*/
691static int ng_btsocket_l2cap_process_l2ca_enc_change(struct ng_mesg *msg, ng_btsocket_l2cap_rtentry_p rt)
692{
693	ng_l2cap_l2ca_enc_chg_op	*op = NULL;
694	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
695
696	if (msg->header.arglen != sizeof(*op))
697		return (EMSGSIZE);
698
699	op = (ng_l2cap_l2ca_enc_chg_op *)(msg->data);
700
701	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
702
703	pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, op->lcid,
704					   op->idtype);
705	if (pcb == NULL) {
706		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
707		return (ENOENT);
708	}
709
710	mtx_lock(&pcb->pcb_mtx);
711	pcb->encryption = op->result;
712
713	if(pcb->need_encrypt){
714		ng_btsocket_l2cap_untimeout(pcb);
715		if(pcb->state != NG_BTSOCKET_L2CAP_W4_ENC_CHANGE){
716			NG_BTSOCKET_L2CAP_WARN("%s: Invalid pcb status %d",
717					       __func__, pcb->state);
718		}else if(pcb->encryption){
719			pcb->state = NG_BTSOCKET_L2CAP_OPEN;
720			soisconnected(pcb->so);
721		}else{
722			pcb->so->so_error = EPERM;
723			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
724			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
725			soisdisconnected(pcb->so);
726		}
727	}
728	mtx_unlock(&pcb->pcb_mtx);
729	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
730
731	return 0;
732}
733/*
734 * Process L2CA_Config response
735 */
736
737static int
738ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(struct ng_mesg *msg,
739		ng_btsocket_l2cap_rtentry_p rt)
740{
741	ng_l2cap_l2ca_cfg_op	*op = NULL;
742	ng_btsocket_l2cap_pcb_p	 pcb = NULL;
743
744	if (msg->header.arglen != sizeof(*op))
745		return (EMSGSIZE);
746
747	op = (ng_l2cap_l2ca_cfg_op *)(msg->data);
748
749	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
750
751	/*
752	 * Socket must have issued a Configure request, so we must have a
753	 * socket that wants to be configured. Use Netgraph message token
754	 * to find it
755	 */
756
757	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
758	if (pcb == NULL) {
759		/*
760		 * XXX FIXME what to do here? We could not find a
761		 * socket with requested token. We even can not send
762		 * Disconnect, because we do not know channel ID
763		 */
764
765		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
766		return (ENOENT);
767	}
768
769	mtx_lock(&pcb->pcb_mtx);
770
771        NG_BTSOCKET_L2CAP_INFO(
772"%s: Got L2CA_Config response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
773"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
774"cfg_state=%x\n",
775		__func__, msg->header.token,
776		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
777		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
778		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
779		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
780		pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
781
782	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
783		mtx_unlock(&pcb->pcb_mtx);
784		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
785
786		return (ENOENT);
787	}
788
789	if (op->result == NG_L2CAP_SUCCESS) {
790		/*
791		 * XXX FIXME Actually set flush and link timeout.
792		 * Set QoS here if required. Resolve conficts (flush_timo).
793		 * Save incoming MTU (peer's outgoing MTU) and outgoing flow
794		 * spec.
795		 */
796
797		pcb->imtu = op->imtu;
798		bcopy(&op->oflow, &pcb->oflow, sizeof(pcb->oflow));
799		pcb->flush_timo = op->flush_timo;
800
801		/*
802		 * We have configured incoming side, so record it and check
803		 * if configuration is complete. If complete then mark socket
804		 * as connected, otherwise wait for the peer.
805		 */
806
807		pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_IN_SENT;
808		pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN;
809
810		if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
811			/* Configuration complete - mark socket as open */
812			ng_btsocket_l2cap_untimeout(pcb);
813			pcb->state = NG_BTSOCKET_L2CAP_OPEN;
814			soisconnected(pcb->so);
815		}
816	} else {
817		/*
818		 * Something went wrong. Could be unacceptable parameters,
819		 * reject or unknown option. That's too bad, but we will
820		 * not negotiate. Send Disconnect and close the channel.
821		 */
822
823		ng_btsocket_l2cap_untimeout(pcb);
824
825		switch (op->result) {
826		case NG_L2CAP_UNACCEPTABLE_PARAMS:
827		case NG_L2CAP_UNKNOWN_OPTION:
828			pcb->so->so_error = EINVAL;
829			break;
830
831		default:
832			pcb->so->so_error = ECONNRESET;
833			break;
834		}
835
836		/* Send disconnect with "zero" token */
837		ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
838
839		/* ... and close the socket */
840		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
841		soisdisconnected(pcb->so);
842	}
843
844	mtx_unlock(&pcb->pcb_mtx);
845	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
846
847	return (0);
848} /* ng_btsocket_l2cap_process_l2ca_cfg_req_rsp */
849
850/*
851 * Process L2CA_ConfigRsp response
852 */
853
854static int
855ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(struct ng_mesg *msg,
856		ng_btsocket_l2cap_rtentry_p rt)
857{
858	ng_l2cap_l2ca_cfg_rsp_op	*op = NULL;
859	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
860	int				 error = 0;
861
862	if (msg->header.arglen != sizeof(*op))
863		return (EMSGSIZE);
864
865	op = (ng_l2cap_l2ca_cfg_rsp_op *)(msg->data);
866
867	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
868
869	/* Look for the socket with the token */
870	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
871	if (pcb == NULL) {
872		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
873		return (ENOENT);
874	}
875
876	mtx_lock(&pcb->pcb_mtx);
877
878        NG_BTSOCKET_L2CAP_INFO(
879"%s: Got L2CA_ConfigRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
880"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
881"cfg_state=%x\n",
882		__func__, msg->header.token,
883		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
884		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
885		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
886		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
887		pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
888
889	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
890		mtx_unlock(&pcb->pcb_mtx);
891		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
892
893		return (ENOENT);
894	}
895
896	/* Check the result and disconnect socket of failure */
897	if (op->result != NG_L2CAP_SUCCESS)
898		goto disconnect;
899
900	/*
901	 * Now we done with remote side configuration. Configure local
902	 * side if we have not done it yet.
903	 */
904
905	pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
906	pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT;
907
908	if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
909		/* Configuration complete - mask socket as open */
910		ng_btsocket_l2cap_untimeout(pcb);
911		pcb->state = NG_BTSOCKET_L2CAP_OPEN;
912		soisconnected(pcb->so);
913	} else {
914		if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_IN_SENT)) {
915			/* Send L2CA_Config request - incoming path */
916			error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
917			if (error != 0)
918				goto disconnect;
919
920			pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN_SENT;
921		}
922	}
923
924	mtx_unlock(&pcb->pcb_mtx);
925	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
926
927	return (error);
928
929disconnect:
930	ng_btsocket_l2cap_untimeout(pcb);
931
932	/* Send disconnect with "zero" token */
933	ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
934
935	/* ... and close the socket */
936	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
937	soisdisconnected(pcb->so);
938
939	mtx_unlock(&pcb->pcb_mtx);
940	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
941
942	return (error);
943} /* ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp */
944
945/*
946 * Process L2CA_Config indicator
947 */
948
949static int
950ng_btsocket_l2cap_process_l2ca_cfg_ind(struct ng_mesg *msg,
951		ng_btsocket_l2cap_rtentry_p rt)
952{
953	ng_l2cap_l2ca_cfg_ind_ip	*ip = NULL;
954	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
955	int				 error = 0;
956
957	if (msg->header.arglen != sizeof(*ip))
958		return (EMSGSIZE);
959
960	ip = (ng_l2cap_l2ca_cfg_ind_ip *)(msg->data);
961
962	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
963
964	/* Check for the open socket that has given channel ID */
965	pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid,
966					   NG_L2CAP_L2CA_IDTYPE_BREDR);
967	if (pcb == NULL) {
968		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
969		return (ENOENT);
970	}
971
972	mtx_lock(&pcb->pcb_mtx);
973
974        NG_BTSOCKET_L2CAP_INFO(
975"%s: Got L2CA_Config indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
976"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d, cfg_state=%x\n",
977		__func__,
978		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
979		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
980		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
981		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
982		pcb->psm, pcb->cid, pcb->state, pcb->cfg_state);
983
984	/* XXX FIXME re-configuration on open socket */
985 	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
986		mtx_unlock(&pcb->pcb_mtx);
987		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
988
989		return (ENOENT);
990	}
991
992	/*
993	 * XXX FIXME Actually set flush and link timeout. Set QoS here if
994	 * required. Resolve conficts (flush_timo). Note outgoing MTU (peer's
995	 * incoming MTU) and incoming flow spec.
996	 */
997
998	pcb->omtu = ip->omtu;
999	bcopy(&ip->iflow, &pcb->iflow, sizeof(pcb->iflow));
1000	pcb->flush_timo = ip->flush_timo;
1001
1002	/*
1003	 * Send L2CA_Config response to our peer and check for the errors,
1004	 * if any send disconnect to close the channel.
1005	 */
1006
1007	if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_OUT_SENT)) {
1008		error = ng_btsocket_l2cap_send_l2ca_cfg_rsp(pcb);
1009		if (error != 0) {
1010			ng_btsocket_l2cap_untimeout(pcb);
1011
1012			pcb->so->so_error = error;
1013
1014			/* Send disconnect with "zero" token */
1015			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
1016
1017			/* ... and close the socket */
1018			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1019			soisdisconnected(pcb->so);
1020		} else
1021			pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
1022	}
1023
1024	mtx_unlock(&pcb->pcb_mtx);
1025	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1026
1027	return (error);
1028} /* ng_btsocket_l2cap_process_l2cap_cfg_ind */
1029
1030/*
1031 * Process L2CA_Disconnect response
1032 */
1033
1034static int
1035ng_btsocket_l2cap_process_l2ca_discon_rsp(struct ng_mesg *msg,
1036		ng_btsocket_l2cap_rtentry_p rt)
1037{
1038	ng_l2cap_l2ca_discon_op	*op = NULL;
1039	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
1040
1041	/* Check message */
1042	if (msg->header.arglen != sizeof(*op))
1043		return (EMSGSIZE);
1044
1045	op = (ng_l2cap_l2ca_discon_op *)(msg->data);
1046
1047	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1048
1049	/*
1050	 * Socket layer must have issued L2CA_Disconnect request, so there
1051	 * must be a socket that wants to be disconnected. Use Netgraph
1052	 * message token to find it.
1053	 */
1054
1055	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
1056	if (pcb == NULL) {
1057		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1058		return (0);
1059	}
1060
1061	mtx_lock(&pcb->pcb_mtx);
1062
1063	/* XXX Close socket no matter what op->result says */
1064	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
1065       		NG_BTSOCKET_L2CAP_INFO(
1066"%s: Got L2CA_Disconnect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1067"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
1068			__func__, msg->header.token,
1069			pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1070			pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1071			pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1072			pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1073			pcb->psm, pcb->cid, op->result, pcb->state);
1074
1075		ng_btsocket_l2cap_untimeout(pcb);
1076
1077		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1078		soisdisconnected(pcb->so);
1079	}
1080
1081	mtx_unlock(&pcb->pcb_mtx);
1082	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1083
1084	return (0);
1085} /* ng_btsocket_l2cap_process_l2ca_discon_rsp */
1086
1087/*
1088 * Process L2CA_Disconnect indicator
1089 */
1090
1091static int
1092ng_btsocket_l2cap_process_l2ca_discon_ind(struct ng_mesg *msg,
1093		ng_btsocket_l2cap_rtentry_p rt)
1094{
1095	ng_l2cap_l2ca_discon_ind_ip	*ip = NULL;
1096	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
1097
1098	/* Check message */
1099	if (msg->header.arglen != sizeof(*ip))
1100		return (EMSGSIZE);
1101
1102	ip = (ng_l2cap_l2ca_discon_ind_ip *)(msg->data);
1103
1104	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1105
1106	/* Look for the socket with given channel ID */
1107	pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid,
1108					   ip->idtype);
1109	if (pcb == NULL) {
1110		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1111		return (0);
1112	}
1113
1114	/*
1115	 * Channel has already been destroyed, so disconnect the socket
1116	 * and be done with it. If there was any pending request we can
1117	 * not do anything here anyway.
1118	 */
1119
1120	mtx_lock(&pcb->pcb_mtx);
1121
1122       	NG_BTSOCKET_L2CAP_INFO(
1123"%s: Got L2CA_Disconnect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1124"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d\n",
1125		__func__,
1126		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1127		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1128		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1129		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1130		pcb->psm, pcb->cid, pcb->state);
1131
1132	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1133		ng_btsocket_l2cap_untimeout(pcb);
1134
1135	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1136	soisdisconnected(pcb->so);
1137
1138	mtx_unlock(&pcb->pcb_mtx);
1139	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1140
1141	return (0);
1142} /* ng_btsocket_l2cap_process_l2ca_discon_ind */
1143
1144/*
1145 * Process L2CA_Write response
1146 */
1147
1148static int
1149ng_btsocket_l2cap_process_l2ca_write_rsp(struct ng_mesg *msg,
1150		ng_btsocket_l2cap_rtentry_p rt)
1151{
1152	ng_l2cap_l2ca_write_op	*op = NULL;
1153	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
1154
1155	/* Check message */
1156	if (msg->header.arglen != sizeof(*op))
1157		return (EMSGSIZE);
1158
1159	op = (ng_l2cap_l2ca_write_op *)(msg->data);
1160
1161	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1162
1163	/* Look for the socket with given token */
1164	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
1165	if (pcb == NULL) {
1166		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1167		return (ENOENT);
1168	}
1169
1170	mtx_lock(&pcb->pcb_mtx);
1171
1172       	NG_BTSOCKET_L2CAP_INFO(
1173"%s: Got L2CA_Write response, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1174"dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, length=%d, " \
1175"state=%d\n",		__func__,
1176			pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1177			pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1178			pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1179			pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1180			pcb->psm, pcb->cid, op->result, op->length,
1181			pcb->state);
1182
1183	if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1184		mtx_unlock(&pcb->pcb_mtx);
1185		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1186
1187		return (ENOENT);
1188	}
1189
1190	ng_btsocket_l2cap_untimeout(pcb);
1191
1192	/*
1193 	 * Check if we have more data to send
1194 	 */
1195	sbdroprecord(&pcb->so->so_snd);
1196	if (sbavail(&pcb->so->so_snd) > 0) {
1197		if (ng_btsocket_l2cap_send2(pcb) == 0)
1198			ng_btsocket_l2cap_timeout(pcb);
1199		else
1200			sbdroprecord(&pcb->so->so_snd); /* XXX */
1201	}
1202
1203	/*
1204	 * Now set the result, drop packet from the socket send queue and
1205	 * ask for more (wakeup sender)
1206	 */
1207
1208	pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
1209	sowwakeup(pcb->so);
1210
1211	mtx_unlock(&pcb->pcb_mtx);
1212	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1213
1214	return (0);
1215} /* ng_btsocket_l2cap_process_l2ca_write_rsp */
1216
1217/*
1218 * Send L2CA_Connect request
1219 */
1220
1221static int
1222ng_btsocket_l2cap_send_l2ca_con_req(ng_btsocket_l2cap_pcb_p pcb)
1223{
1224	struct ng_mesg		*msg = NULL;
1225	ng_l2cap_l2ca_con_ip	*ip = NULL;
1226	int			 error = 0;
1227
1228	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1229
1230	if (pcb->rt == NULL ||
1231	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1232		return (ENETDOWN);
1233
1234	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON,
1235		sizeof(*ip), M_NOWAIT);
1236	if (msg == NULL)
1237		return (ENOMEM);
1238
1239	msg->header.token = pcb->token;
1240
1241	ip = (ng_l2cap_l2ca_con_ip *)(msg->data);
1242	bcopy(&pcb->dst, &ip->bdaddr, sizeof(ip->bdaddr));
1243	ip->psm = pcb->psm;
1244	ip->linktype = ng_btsock_l2cap_addrtype_to_linktype(pcb->dsttype);
1245	ip->idtype = pcb->idtype;
1246	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1247
1248	return (error);
1249} /* ng_btsocket_l2cap_send_l2ca_con_req */
1250
1251/*
1252 * Send L2CA_Connect response
1253 */
1254
1255static int
1256ng_btsocket_l2cap_send_l2ca_con_rsp_req(u_int32_t token,
1257		ng_btsocket_l2cap_rtentry_p rt, bdaddr_p dst, int ident,
1258					int lcid, int result, int linktype)
1259{
1260	struct ng_mesg			*msg = NULL;
1261	ng_l2cap_l2ca_con_rsp_ip	*ip = NULL;
1262	int				 error = 0;
1263
1264	if (rt == NULL || rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
1265		return (ENETDOWN);
1266
1267	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON_RSP,
1268		sizeof(*ip), M_NOWAIT);
1269	if (msg == NULL)
1270		return (ENOMEM);
1271
1272	msg->header.token = token;
1273
1274	ip = (ng_l2cap_l2ca_con_rsp_ip *)(msg->data);
1275	bcopy(dst, &ip->bdaddr, sizeof(ip->bdaddr));
1276	ip->ident = ident;
1277	ip->lcid = lcid;
1278	ip->linktype = linktype;
1279	ip->result = result;
1280	ip->status = 0;
1281
1282	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, rt->hook, 0);
1283
1284	return (error);
1285} /* ng_btsocket_l2cap_send_l2ca_con_rsp_req */
1286
1287/*
1288 * Send L2CA_Config request
1289 */
1290
1291static int
1292ng_btsocket_l2cap_send_l2ca_cfg_req(ng_btsocket_l2cap_pcb_p pcb)
1293{
1294	struct ng_mesg		*msg = NULL;
1295	ng_l2cap_l2ca_cfg_ip	*ip = NULL;
1296	int			 error = 0;
1297
1298	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1299
1300	if (pcb->rt == NULL ||
1301	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1302		return (ENETDOWN);
1303
1304	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG,
1305		sizeof(*ip), M_NOWAIT);
1306	if (msg == NULL)
1307		return (ENOMEM);
1308
1309	msg->header.token = pcb->token;
1310
1311	ip = (ng_l2cap_l2ca_cfg_ip *)(msg->data);
1312	ip->lcid = pcb->cid;
1313	ip->imtu = pcb->imtu;
1314	bcopy(&pcb->oflow, &ip->oflow, sizeof(ip->oflow));
1315	ip->flush_timo = pcb->flush_timo;
1316	ip->link_timo = pcb->link_timo;
1317
1318	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1319
1320	return (error);
1321} /* ng_btsocket_l2cap_send_l2ca_cfg_req */
1322
1323/*
1324 * Send L2CA_Config response
1325 */
1326
1327static int
1328ng_btsocket_l2cap_send_l2ca_cfg_rsp(ng_btsocket_l2cap_pcb_p pcb)
1329{
1330	struct ng_mesg			*msg = NULL;
1331	ng_l2cap_l2ca_cfg_rsp_ip	*ip = NULL;
1332	int				 error = 0;
1333
1334	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1335
1336	if (pcb->rt == NULL ||
1337	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1338		return (ENETDOWN);
1339
1340	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG_RSP,
1341		sizeof(*ip), M_NOWAIT);
1342	if (msg == NULL)
1343		return (ENOMEM);
1344
1345	msg->header.token = pcb->token;
1346
1347	ip = (ng_l2cap_l2ca_cfg_rsp_ip *)(msg->data);
1348	ip->lcid = pcb->cid;
1349	ip->omtu = pcb->omtu;
1350	bcopy(&pcb->iflow, &ip->iflow, sizeof(ip->iflow));
1351
1352	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, pcb->rt->hook, 0);
1353
1354	return (error);
1355} /* ng_btsocket_l2cap_send_l2ca_cfg_rsp */
1356
1357/*
1358 * Send L2CA_Disconnect request
1359 */
1360
1361static int
1362ng_btsocket_l2cap_send_l2ca_discon_req(u_int32_t token,
1363		ng_btsocket_l2cap_pcb_p pcb)
1364{
1365	struct ng_mesg		*msg = NULL;
1366	ng_l2cap_l2ca_discon_ip	*ip = NULL;
1367	int			 error = 0;
1368
1369	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1370
1371	if (pcb->rt == NULL ||
1372	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1373		return (ENETDOWN);
1374
1375	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_DISCON,
1376		sizeof(*ip), M_NOWAIT);
1377	if (msg == NULL)
1378		return (ENOMEM);
1379
1380	msg->header.token = token;
1381
1382	ip = (ng_l2cap_l2ca_discon_ip *)(msg->data);
1383	ip->lcid = pcb->cid;
1384	ip->idtype = pcb->idtype;
1385
1386	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1387
1388	return (error);
1389} /* ng_btsocket_l2cap_send_l2ca_discon_req */
1390
1391/*****************************************************************************
1392 *****************************************************************************
1393 **                              Socket interface
1394 *****************************************************************************
1395 *****************************************************************************/
1396
1397/*
1398 * L2CAP sockets data input routine
1399 */
1400
1401static void
1402ng_btsocket_l2cap_data_input(struct mbuf *m, hook_p hook)
1403{
1404	ng_l2cap_hdr_t			*hdr = NULL;
1405	ng_l2cap_clt_hdr_t		*clt_hdr = NULL;
1406	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
1407	ng_btsocket_l2cap_rtentry_t	*rt = NULL;
1408	uint16_t idtype;
1409
1410	if (hook == NULL) {
1411		NG_BTSOCKET_L2CAP_ALERT(
1412"%s: Invalid source hook for L2CAP data packet\n", __func__);
1413		goto drop;
1414	}
1415
1416	rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1417	if (rt == NULL) {
1418		NG_BTSOCKET_L2CAP_ALERT(
1419"%s: Could not find out source bdaddr for L2CAP data packet\n", __func__);
1420		goto drop;
1421	}
1422
1423	m = m_pullup(m, sizeof(uint16_t));
1424	idtype = *mtod(m, uint16_t *);
1425	m_adj(m, sizeof(uint16_t));
1426
1427	/* Make sure we can access header */
1428	if (m->m_pkthdr.len < sizeof(*hdr)) {
1429		NG_BTSOCKET_L2CAP_ERR(
1430"%s: L2CAP data packet too small, len=%d\n", __func__, m->m_pkthdr.len);
1431		goto drop;
1432	}
1433
1434	if (m->m_len < sizeof(*hdr)) {
1435		m = m_pullup(m, sizeof(*hdr));
1436		if (m == NULL)
1437			goto drop;
1438	}
1439
1440	/* Strip L2CAP packet header and verify packet length */
1441	hdr = mtod(m, ng_l2cap_hdr_t *);
1442	m_adj(m, sizeof(*hdr));
1443
1444	if (hdr->length != m->m_pkthdr.len) {
1445		NG_BTSOCKET_L2CAP_ERR(
1446"%s: Bad L2CAP data packet length, len=%d, length=%d\n",
1447			__func__, m->m_pkthdr.len, hdr->length);
1448		goto drop;
1449	}
1450
1451	/*
1452	 * Now process packet. Two cases:
1453	 *
1454	 * 1) Normal packet (cid != 2) then find connected socket and append
1455	 *    mbuf to the socket queue. Wakeup socket.
1456	 *
1457	 * 2) Broadcast packet (cid == 2) then find all sockets that connected
1458	 *    to the given PSM and have SO_BROADCAST bit set and append mbuf
1459	 *    to the socket queue. Wakeup socket.
1460	 */
1461
1462	NG_BTSOCKET_L2CAP_INFO(
1463"%s: Received L2CAP data packet: src bdaddr=%x:%x:%x:%x:%x:%x, " \
1464"dcid=%d, length=%d\n",
1465		__func__,
1466		rt->src.b[5], rt->src.b[4], rt->src.b[3],
1467		rt->src.b[2], rt->src.b[1], rt->src.b[0],
1468		hdr->dcid, hdr->length);
1469
1470	if ((hdr->dcid >= NG_L2CAP_FIRST_CID) ||
1471	    (idtype == NG_L2CAP_L2CA_IDTYPE_ATT)||
1472	    (idtype == NG_L2CAP_L2CA_IDTYPE_SMP)
1473	    ){
1474		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1475
1476		/* Normal packet: find connected socket */
1477		pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, hdr->dcid,idtype);
1478		if (pcb == NULL) {
1479			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1480			goto drop;
1481		}
1482
1483		mtx_lock(&pcb->pcb_mtx);
1484
1485		if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1486			NG_BTSOCKET_L2CAP_ERR(
1487"%s: No connected socket found, src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, " \
1488"state=%d\n",			__func__,
1489				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1490				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1491				hdr->dcid, pcb->state);
1492
1493			mtx_unlock(&pcb->pcb_mtx);
1494			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1495			goto drop;
1496		}
1497
1498		/* Check packet size against socket's incoming MTU */
1499		if (hdr->length > pcb->imtu) {
1500			NG_BTSOCKET_L2CAP_ERR(
1501"%s: L2CAP data packet too big, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1502"dcid=%d, length=%d, imtu=%d\n",
1503				__func__,
1504				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1505				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1506				hdr->dcid, hdr->length, pcb->imtu);
1507
1508			mtx_unlock(&pcb->pcb_mtx);
1509			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1510			goto drop;
1511		}
1512
1513		/* Check if we have enough space in socket receive queue */
1514		if (m->m_pkthdr.len > sbspace(&pcb->so->so_rcv)) {
1515			/*
1516			 * This is really bad. Receive queue on socket does
1517			 * not have enough space for the packet. We do not
1518			 * have any other choice but drop the packet. L2CAP
1519			 * does not provide any flow control.
1520			 */
1521
1522			NG_BTSOCKET_L2CAP_ERR(
1523"%s: Not enough space in socket receive queue. Dropping L2CAP data packet, " \
1524"src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, len=%d, space=%ld\n",
1525				__func__,
1526				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1527				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1528				hdr->dcid, m->m_pkthdr.len,
1529				sbspace(&pcb->so->so_rcv));
1530
1531			mtx_unlock(&pcb->pcb_mtx);
1532			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1533			goto drop;
1534		}
1535
1536		/* Append packet to the socket receive queue and wakeup */
1537		sbappendrecord(&pcb->so->so_rcv, m);
1538		m = NULL;
1539
1540		sorwakeup(pcb->so);
1541
1542		mtx_unlock(&pcb->pcb_mtx);
1543		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1544	} else if (hdr->dcid == NG_L2CAP_CLT_CID) {
1545		/* Broadcast packet: give packet to all sockets  */
1546
1547		/* Check packet size against connectionless MTU */
1548		if (hdr->length > NG_L2CAP_MTU_DEFAULT) {
1549			NG_BTSOCKET_L2CAP_ERR(
1550"%s: Connectionless L2CAP data packet too big, " \
1551"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1552				__func__,
1553				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1554				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1555				hdr->length);
1556			goto drop;
1557		}
1558
1559		/* Make sure we can access connectionless header */
1560		if (m->m_pkthdr.len < sizeof(*clt_hdr)) {
1561			NG_BTSOCKET_L2CAP_ERR(
1562"%s: Can not get L2CAP connectionless packet header, " \
1563"src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1564				__func__,
1565				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1566				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1567				hdr->length);
1568			goto drop;
1569		}
1570
1571		if (m->m_len < sizeof(*clt_hdr)) {
1572			m = m_pullup(m, sizeof(*clt_hdr));
1573			if (m == NULL)
1574				goto drop;
1575		}
1576
1577		/* Strip connectionless header and deliver packet */
1578		clt_hdr = mtod(m, ng_l2cap_clt_hdr_t *);
1579		m_adj(m, sizeof(*clt_hdr));
1580
1581		NG_BTSOCKET_L2CAP_INFO(
1582"%s: Got L2CAP connectionless data packet, " \
1583"src bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, length=%d\n",
1584			__func__,
1585			rt->src.b[5], rt->src.b[4], rt->src.b[3],
1586			rt->src.b[2], rt->src.b[1], rt->src.b[0],
1587			clt_hdr->psm, hdr->length);
1588
1589		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1590
1591		LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next) {
1592			struct mbuf	*copy = NULL;
1593
1594			mtx_lock(&pcb->pcb_mtx);
1595
1596			if (bcmp(&rt->src, &pcb->src, sizeof(pcb->src)) != 0 ||
1597			    pcb->psm != clt_hdr->psm ||
1598			    pcb->state != NG_BTSOCKET_L2CAP_OPEN ||
1599			    (pcb->so->so_options & SO_BROADCAST) == 0 ||
1600			    m->m_pkthdr.len > sbspace(&pcb->so->so_rcv))
1601				goto next;
1602
1603			/*
1604			 * Create a copy of the packet and append it to the
1605			 * socket's queue. If m_dup() failed - no big deal
1606			 * it is a broadcast traffic after all
1607			 */
1608
1609			copy = m_dup(m, M_NOWAIT);
1610			if (copy != NULL) {
1611				sbappendrecord(&pcb->so->so_rcv, copy);
1612				sorwakeup(pcb->so);
1613			}
1614next:
1615			mtx_unlock(&pcb->pcb_mtx);
1616		}
1617
1618		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1619	}
1620drop:
1621	NG_FREE_M(m); /* checks for m != NULL */
1622} /* ng_btsocket_l2cap_data_input */
1623
1624/*
1625 * L2CAP sockets default message input routine
1626 */
1627
1628static void
1629ng_btsocket_l2cap_default_msg_input(struct ng_mesg *msg, hook_p hook)
1630{
1631	switch (msg->header.cmd) {
1632	case NGM_L2CAP_NODE_HOOK_INFO: {
1633		ng_btsocket_l2cap_rtentry_t	*rt = NULL;
1634		ng_l2cap_node_hook_info_ep *ep =
1635		  (ng_l2cap_node_hook_info_ep *)msg->data;
1636		if (hook == NULL || msg->header.arglen != sizeof(*ep))
1637			break;
1638
1639		if (bcmp(&ep->addr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
1640			break;
1641
1642		mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1643
1644		rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1645		if (rt == NULL) {
1646			rt = malloc(sizeof(*rt),
1647				M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT|M_ZERO);
1648			if (rt == NULL) {
1649				mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1650				break;
1651			}
1652
1653			LIST_INSERT_HEAD(&ng_btsocket_l2cap_rt, rt, next);
1654
1655			NG_HOOK_SET_PRIVATE(hook, rt);
1656		}
1657
1658		bcopy(&ep->addr, &rt->src, sizeof(rt->src));
1659		rt->hook = hook;
1660
1661		mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1662
1663		NG_BTSOCKET_L2CAP_INFO(
1664"%s: Updating hook \"%s\", src bdaddr=%x:%x:%x:%x:%x:%x\n",
1665			__func__, NG_HOOK_NAME(hook),
1666			rt->src.b[5], rt->src.b[4], rt->src.b[3],
1667			rt->src.b[2], rt->src.b[1], rt->src.b[0]);
1668		} break;
1669
1670	default:
1671		NG_BTSOCKET_L2CAP_WARN(
1672"%s: Unknown message, cmd=%d\n", __func__, msg->header.cmd);
1673		break;
1674	}
1675
1676	NG_FREE_MSG(msg); /* Checks for msg != NULL */
1677} /* ng_btsocket_l2cap_default_msg_input */
1678
1679/*
1680 * L2CAP sockets L2CA message input routine
1681 */
1682
1683static void
1684ng_btsocket_l2cap_l2ca_msg_input(struct ng_mesg *msg, hook_p hook)
1685{
1686	ng_btsocket_l2cap_rtentry_p	rt = NULL;
1687
1688	if (hook == NULL) {
1689		NG_BTSOCKET_L2CAP_ALERT(
1690"%s: Invalid source hook for L2CA message\n", __func__);
1691		goto drop;
1692	}
1693
1694	rt = (ng_btsocket_l2cap_rtentry_p) NG_HOOK_PRIVATE(hook);
1695	if (rt == NULL) {
1696		NG_BTSOCKET_L2CAP_ALERT(
1697"%s: Could not find out source bdaddr for L2CA message\n", __func__);
1698		goto drop;
1699	}
1700
1701	switch (msg->header.cmd) {
1702	case NGM_L2CAP_L2CA_CON: /* L2CA_Connect response */
1703		ng_btsocket_l2cap_process_l2ca_con_req_rsp(msg, rt);
1704		break;
1705
1706	case NGM_L2CAP_L2CA_CON_RSP: /* L2CA_ConnectRsp response */
1707		ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(msg, rt);
1708		break;
1709
1710	case NGM_L2CAP_L2CA_CON_IND: /* L2CA_Connect indicator */
1711		ng_btsocket_l2cap_process_l2ca_con_ind(msg, rt);
1712		break;
1713
1714	case NGM_L2CAP_L2CA_CFG: /* L2CA_Config response */
1715		ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(msg, rt);
1716		break;
1717
1718	case NGM_L2CAP_L2CA_CFG_RSP: /* L2CA_ConfigRsp response */
1719		ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(msg, rt);
1720		break;
1721
1722	case NGM_L2CAP_L2CA_CFG_IND: /* L2CA_Config indicator */
1723		ng_btsocket_l2cap_process_l2ca_cfg_ind(msg, rt);
1724		break;
1725
1726	case NGM_L2CAP_L2CA_DISCON: /* L2CA_Disconnect response */
1727		ng_btsocket_l2cap_process_l2ca_discon_rsp(msg, rt);
1728		break;
1729
1730	case NGM_L2CAP_L2CA_DISCON_IND: /* L2CA_Disconnect indicator */
1731		ng_btsocket_l2cap_process_l2ca_discon_ind(msg, rt);
1732		break;
1733
1734	case NGM_L2CAP_L2CA_WRITE: /* L2CA_Write response */
1735		ng_btsocket_l2cap_process_l2ca_write_rsp(msg, rt);
1736		break;
1737	case NGM_L2CAP_L2CA_ENC_CHANGE:
1738		ng_btsocket_l2cap_process_l2ca_enc_change(msg, rt);
1739
1740		break;
1741	/* XXX FIXME add other L2CA messages */
1742
1743	default:
1744		NG_BTSOCKET_L2CAP_WARN(
1745"%s: Unknown L2CA message, cmd=%d\n", __func__, msg->header.cmd);
1746		break;
1747	}
1748drop:
1749	NG_FREE_MSG(msg);
1750} /* ng_btsocket_l2cap_l2ca_msg_input */
1751
1752/*
1753 * L2CAP sockets input routine
1754 */
1755
1756static void
1757ng_btsocket_l2cap_input(void *context, int pending)
1758{
1759	item_p	item = NULL;
1760	hook_p	hook = NULL;
1761
1762	for (;;) {
1763		mtx_lock(&ng_btsocket_l2cap_queue_mtx);
1764		NG_BT_ITEMQ_DEQUEUE(&ng_btsocket_l2cap_queue, item);
1765		mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
1766
1767		if (item == NULL)
1768			break;
1769
1770		NGI_GET_HOOK(item, hook);
1771		if (hook != NULL && NG_HOOK_NOT_VALID(hook))
1772			goto drop;
1773
1774		switch(item->el_flags & NGQF_TYPE) {
1775		case NGQF_DATA: {
1776			struct mbuf     *m = NULL;
1777
1778			NGI_GET_M(item, m);
1779			ng_btsocket_l2cap_data_input(m, hook);
1780			} break;
1781
1782		case NGQF_MESG: {
1783			struct ng_mesg  *msg = NULL;
1784
1785			NGI_GET_MSG(item, msg);
1786
1787			switch (msg->header.cmd) {
1788			case NGM_L2CAP_L2CA_CON:
1789			case NGM_L2CAP_L2CA_CON_RSP:
1790			case NGM_L2CAP_L2CA_CON_IND:
1791			case NGM_L2CAP_L2CA_CFG:
1792			case NGM_L2CAP_L2CA_CFG_RSP:
1793			case NGM_L2CAP_L2CA_CFG_IND:
1794			case NGM_L2CAP_L2CA_DISCON:
1795			case NGM_L2CAP_L2CA_DISCON_IND:
1796			case NGM_L2CAP_L2CA_WRITE:
1797			case NGM_L2CAP_L2CA_ENC_CHANGE:
1798			/* XXX FIXME add other L2CA messages */
1799				ng_btsocket_l2cap_l2ca_msg_input(msg, hook);
1800				break;
1801
1802			default:
1803				ng_btsocket_l2cap_default_msg_input(msg, hook);
1804				break;
1805			}
1806			} break;
1807
1808		default:
1809			KASSERT(0,
1810("%s: invalid item type=%ld\n", __func__, (item->el_flags & NGQF_TYPE)));
1811			break;
1812		}
1813drop:
1814		if (hook != NULL)
1815			NG_HOOK_UNREF(hook);
1816
1817		NG_FREE_ITEM(item);
1818	}
1819} /* ng_btsocket_l2cap_input */
1820
1821/*
1822 * Route cleanup task. Gets scheduled when hook is disconnected. Here we
1823 * will find all sockets that use "invalid" hook and disconnect them.
1824 */
1825
1826static void
1827ng_btsocket_l2cap_rtclean(void *context, int pending)
1828{
1829	ng_btsocket_l2cap_pcb_p		pcb = NULL, pcb_next = NULL;
1830	ng_btsocket_l2cap_rtentry_p	rt = NULL;
1831
1832	mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1833	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1834
1835	/*
1836	 * First disconnect all sockets that use "invalid" hook
1837	 */
1838
1839	for (pcb = LIST_FIRST(&ng_btsocket_l2cap_sockets); pcb != NULL; ) {
1840		mtx_lock(&pcb->pcb_mtx);
1841		pcb_next = LIST_NEXT(pcb, next);
1842
1843		if (pcb->rt != NULL &&
1844		    pcb->rt->hook != NULL && NG_HOOK_NOT_VALID(pcb->rt->hook)) {
1845			if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1846				ng_btsocket_l2cap_untimeout(pcb);
1847
1848			pcb->so->so_error = ENETDOWN;
1849			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1850			soisdisconnected(pcb->so);
1851
1852			pcb->token = 0;
1853			pcb->cid = 0;
1854			pcb->rt = NULL;
1855		}
1856
1857		mtx_unlock(&pcb->pcb_mtx);
1858		pcb = pcb_next;
1859	}
1860
1861	/*
1862	 * Now cleanup routing table
1863	 */
1864
1865	for (rt = LIST_FIRST(&ng_btsocket_l2cap_rt); rt != NULL; ) {
1866		ng_btsocket_l2cap_rtentry_p	rt_next = LIST_NEXT(rt, next);
1867
1868		if (rt->hook != NULL && NG_HOOK_NOT_VALID(rt->hook)) {
1869			LIST_REMOVE(rt, next);
1870
1871			NG_HOOK_SET_PRIVATE(rt->hook, NULL);
1872			NG_HOOK_UNREF(rt->hook); /* Remove extra reference */
1873
1874			bzero(rt, sizeof(*rt));
1875			free(rt, M_NETGRAPH_BTSOCKET_L2CAP);
1876		}
1877
1878		rt = rt_next;
1879	}
1880
1881	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1882	mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1883} /* ng_btsocket_l2cap_rtclean */
1884
1885/*
1886 * Initialize everything
1887 */
1888
1889static void
1890ng_btsocket_l2cap_init(void *arg __unused)
1891{
1892	int	error = 0;
1893
1894	ng_btsocket_l2cap_node = NULL;
1895	ng_btsocket_l2cap_debug_level = NG_BTSOCKET_WARN_LEVEL;
1896
1897	/* Register Netgraph node type */
1898	error = ng_newtype(&typestruct);
1899	if (error != 0) {
1900		NG_BTSOCKET_L2CAP_ALERT(
1901"%s: Could not register Netgraph node type, error=%d\n", __func__, error);
1902
1903                return;
1904	}
1905
1906	/* Create Netgrapg node */
1907	error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
1908	if (error != 0) {
1909		NG_BTSOCKET_L2CAP_ALERT(
1910"%s: Could not create Netgraph node, error=%d\n", __func__, error);
1911
1912		ng_btsocket_l2cap_node = NULL;
1913
1914		return;
1915	}
1916
1917	error = ng_name_node(ng_btsocket_l2cap_node,
1918				NG_BTSOCKET_L2CAP_NODE_TYPE);
1919	if (error != 0) {
1920		NG_BTSOCKET_L2CAP_ALERT(
1921"%s: Could not name Netgraph node, error=%d\n", __func__, error);
1922
1923		NG_NODE_UNREF(ng_btsocket_l2cap_node);
1924		ng_btsocket_l2cap_node = NULL;
1925
1926		return;
1927	}
1928
1929	/* Create input queue */
1930	NG_BT_ITEMQ_INIT(&ng_btsocket_l2cap_queue, ifqmaxlen);
1931	mtx_init(&ng_btsocket_l2cap_queue_mtx,
1932		"btsocks_l2cap_queue_mtx", NULL, MTX_DEF);
1933	TASK_INIT(&ng_btsocket_l2cap_queue_task, 0,
1934		ng_btsocket_l2cap_input, NULL);
1935
1936	/* Create list of sockets */
1937	LIST_INIT(&ng_btsocket_l2cap_sockets);
1938	mtx_init(&ng_btsocket_l2cap_sockets_mtx,
1939		"btsocks_l2cap_sockets_mtx", NULL, MTX_DEF);
1940
1941	/* Routing table */
1942	LIST_INIT(&ng_btsocket_l2cap_rt);
1943	mtx_init(&ng_btsocket_l2cap_rt_mtx,
1944		"btsocks_l2cap_rt_mtx", NULL, MTX_DEF);
1945	TASK_INIT(&ng_btsocket_l2cap_rt_task, 0,
1946		ng_btsocket_l2cap_rtclean, NULL);
1947} /* ng_btsocket_l2cap_init */
1948SYSINIT(ng_btsocket_l2cap_init, SI_SUB_PROTO_DOMAIN, SI_ORDER_THIRD,
1949    ng_btsocket_l2cap_init, NULL);
1950
1951/*
1952 * Abort connection on socket
1953 */
1954
1955void
1956ng_btsocket_l2cap_abort(struct socket *so)
1957{
1958	so->so_error = ECONNABORTED;
1959
1960	(void)ng_btsocket_l2cap_disconnect(so);
1961} /* ng_btsocket_l2cap_abort */
1962
1963void
1964ng_btsocket_l2cap_close(struct socket *so)
1965{
1966
1967	(void)ng_btsocket_l2cap_disconnect(so);
1968} /* ng_btsocket_l2cap_close */
1969
1970/*
1971 * Create and attach new socket
1972 */
1973
1974int
1975ng_btsocket_l2cap_attach(struct socket *so, int proto, struct thread *td)
1976{
1977	static u_int32_t	token = 0;
1978	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
1979	int			error;
1980
1981	/* Check socket and protocol */
1982	if (ng_btsocket_l2cap_node == NULL)
1983		return (EPROTONOSUPPORT);
1984	if (so->so_type != SOCK_SEQPACKET)
1985		return (ESOCKTNOSUPPORT);
1986
1987#if 0 /* XXX sonewconn() calls "pru_attach" with proto == 0 */
1988	if (proto != 0)
1989		if (proto != BLUETOOTH_PROTO_L2CAP)
1990			return (EPROTONOSUPPORT);
1991#endif /* XXX */
1992
1993	if (pcb != NULL)
1994		return (EISCONN);
1995
1996	/* Reserve send and receive space if it is not reserved yet */
1997	if ((so->so_snd.sb_hiwat == 0) || (so->so_rcv.sb_hiwat == 0)) {
1998		error = soreserve(so, NG_BTSOCKET_L2CAP_SENDSPACE,
1999					NG_BTSOCKET_L2CAP_RECVSPACE);
2000		if (error != 0)
2001			return (error);
2002	}
2003
2004	/* Allocate the PCB */
2005        pcb = malloc(sizeof(*pcb),
2006		M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT | M_ZERO);
2007        if (pcb == NULL)
2008                return (ENOMEM);
2009
2010	/* Link the PCB and the socket */
2011	so->so_pcb = (caddr_t) pcb;
2012	pcb->so = so;
2013	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2014
2015	/* Initialize PCB */
2016	pcb->imtu = pcb->omtu = NG_L2CAP_MTU_DEFAULT;
2017
2018	/* Default flow */
2019	pcb->iflow.flags = 0x0;
2020	pcb->iflow.service_type = NG_HCI_SERVICE_TYPE_BEST_EFFORT;
2021	pcb->iflow.token_rate = 0xffffffff; /* maximum */
2022	pcb->iflow.token_bucket_size = 0xffffffff; /* maximum */
2023	pcb->iflow.peak_bandwidth = 0x00000000; /* maximum */
2024	pcb->iflow.latency = 0xffffffff; /* don't care */
2025	pcb->iflow.delay_variation = 0xffffffff; /* don't care */
2026
2027	bcopy(&pcb->iflow, &pcb->oflow, sizeof(pcb->oflow));
2028
2029	pcb->flush_timo = NG_L2CAP_FLUSH_TIMO_DEFAULT;
2030	pcb->link_timo = NG_L2CAP_LINK_TIMO_DEFAULT;
2031
2032	/*
2033	 * XXX Mark PCB mutex as DUPOK to prevent "duplicated lock of
2034	 * the same type" message. When accepting new L2CAP connection
2035	 * ng_btsocket_l2cap_process_l2ca_con_ind() holds both PCB mutexes
2036	 * for "old" (accepting) PCB and "new" (created) PCB.
2037	 */
2038
2039	mtx_init(&pcb->pcb_mtx, "btsocks_l2cap_pcb_mtx", NULL,
2040		MTX_DEF|MTX_DUPOK);
2041	callout_init_mtx(&pcb->timo, &pcb->pcb_mtx, 0);
2042
2043        /*
2044	 * Add the PCB to the list
2045	 *
2046	 * XXX FIXME VERY IMPORTANT!
2047	 *
2048	 * This is totally FUBAR. We could get here in two cases:
2049	 *
2050	 * 1) When user calls socket()
2051	 * 2) When we need to accept new incoming connection and call
2052	 *    sonewconn()
2053	 *
2054	 * In the first case we must acquire ng_btsocket_l2cap_sockets_mtx.
2055	 * In the second case we hold ng_btsocket_l2cap_sockets_mtx already.
2056	 * So we now need to distinguish between these cases. From reading
2057	 * /sys/kern/uipc_socket.c we can find out that sonewconn() calls
2058	 * pru_attach with proto == 0 and td == NULL. For now use this fact
2059	 * to figure out if we were called from socket() or from sonewconn().
2060	 */
2061
2062	if (td != NULL)
2063		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2064	else
2065		mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2066
2067	/* Set PCB token. Use ng_btsocket_l2cap_sockets_mtx for protection */
2068	if (++ token == 0)
2069		token ++;
2070
2071	pcb->token = token;
2072
2073	LIST_INSERT_HEAD(&ng_btsocket_l2cap_sockets, pcb, next);
2074
2075	if (td != NULL)
2076		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2077
2078        return (0);
2079} /* ng_btsocket_l2cap_attach */
2080
2081/*
2082 * Bind socket
2083 */
2084
2085int
2086ng_btsocket_l2cap_bind(struct socket *so, struct sockaddr *nam,
2087		struct thread *td)
2088{
2089	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
2090	struct sockaddr_l2cap	*sa = (struct sockaddr_l2cap *) nam;
2091	int			 psm, error = 0;
2092
2093	if (ng_btsocket_l2cap_node == NULL)
2094		return (EINVAL);
2095
2096	/* Verify address */
2097	if (sa == NULL)
2098		return (EINVAL);
2099	if (sa->l2cap_family != AF_BLUETOOTH)
2100		return (EAFNOSUPPORT);
2101	/*For the time being, Not support LE binding.*/
2102	if ((sa->l2cap_len != sizeof(*sa))&&
2103	    (sa->l2cap_len != sizeof(struct sockaddr_l2cap_compat)))
2104		return (EINVAL);
2105
2106	psm = le16toh(sa->l2cap_psm);
2107
2108	/*
2109	 * Check if other socket has this address already (look for exact
2110	 * match PSM and bdaddr) and assign socket address if it's available.
2111	 *
2112	 * Note: socket can be bound to ANY PSM (zero) thus allowing several
2113	 * channels with the same PSM between the same pair of BD_ADDR'es.
2114	 */
2115
2116	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2117
2118	LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next)
2119		if (psm != 0 && psm == pcb->psm &&
2120		    bcmp(&pcb->src, &sa->l2cap_bdaddr, sizeof(bdaddr_t)) == 0)
2121			break;
2122
2123	if (pcb == NULL) {
2124		/* Set socket address */
2125		pcb = so2l2cap_pcb(so);
2126		if (pcb != NULL) {
2127			bcopy(&sa->l2cap_bdaddr, &pcb->src, sizeof(pcb->src));
2128			pcb->psm = psm;
2129		} else
2130			error = EINVAL;
2131	} else
2132		error = EADDRINUSE;
2133
2134	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2135
2136	return (error);
2137} /* ng_btsocket_l2cap_bind */
2138
2139/*
2140 * Connect socket
2141 */
2142
2143int
2144ng_btsocket_l2cap_connect(struct socket *so, struct sockaddr *nam,
2145		struct thread *td)
2146{
2147	ng_btsocket_l2cap_pcb_t		*pcb = so2l2cap_pcb(so);
2148	struct sockaddr_l2cap_compat	*sal = (struct sockaddr_l2cap_compat *) nam;
2149	struct sockaddr_l2cap *sa  = (struct sockaddr_l2cap *)nam;
2150	struct sockaddr_l2cap  ba;
2151	ng_btsocket_l2cap_rtentry_t	*rt = NULL;
2152	int				 have_src, error = 0;
2153	int idtype = NG_L2CAP_L2CA_IDTYPE_BREDR;
2154	/* Check socket */
2155	if (pcb == NULL)
2156		return (EINVAL);
2157	if (ng_btsocket_l2cap_node == NULL)
2158		return (EINVAL);
2159	if (pcb->state == NG_BTSOCKET_L2CAP_CONNECTING)
2160		return (EINPROGRESS);
2161
2162	/* Verify address */
2163	if (sa == NULL)
2164		return (EINVAL);
2165	if (sa->l2cap_family != AF_BLUETOOTH)
2166		return (EAFNOSUPPORT);
2167	if (sa->l2cap_len == sizeof(*sal)){
2168		bcopy(sal, &ba, sizeof(*sal));
2169		sa = &ba;
2170		sa->l2cap_len = sizeof(*sa);
2171		sa->l2cap_bdaddr_type = BDADDR_BREDR;
2172	}
2173	if (sa->l2cap_len != sizeof(*sa))
2174		return (EINVAL);
2175	if ((sa->l2cap_psm &&  sa->l2cap_cid))
2176		return EINVAL;
2177	if (bcmp(&sa->l2cap_bdaddr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
2178		return (EDESTADDRREQ);
2179	if((sa->l2cap_bdaddr_type == BDADDR_BREDR)&&
2180	   (sa->l2cap_psm == 0))
2181		return EDESTADDRREQ;
2182	if(sa->l2cap_bdaddr_type != BDADDR_BREDR){
2183		if(sa->l2cap_cid == NG_L2CAP_ATT_CID){
2184			idtype = NG_L2CAP_L2CA_IDTYPE_ATT;
2185		}else if (sa->l2cap_cid == NG_L2CAP_SMP_CID){
2186			idtype =NG_L2CAP_L2CA_IDTYPE_SMP;
2187		}else{
2188			//if cid == 0 idtype = NG_L2CAP_L2CA_IDTYPE_LE;
2189			// Not supported yet
2190			return EINVAL;
2191		}
2192	}
2193	if (pcb->psm != 0 && pcb->psm != le16toh(sa->l2cap_psm))
2194		return (EINVAL);
2195	/*
2196	 * Routing. Socket should be bound to some source address. The source
2197	 * address can be ANY. Destination address must be set and it must not
2198	 * be ANY. If source address is ANY then find first rtentry that has
2199	 * src != dst.
2200	 */
2201
2202	mtx_lock(&ng_btsocket_l2cap_rt_mtx);
2203	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2204	mtx_lock(&pcb->pcb_mtx);
2205
2206	/* Send destination address and PSM */
2207	bcopy(&sa->l2cap_bdaddr, &pcb->dst, sizeof(pcb->dst));
2208	pcb->psm = le16toh(sa->l2cap_psm);
2209	pcb->dsttype = sa->l2cap_bdaddr_type;
2210	pcb->cid = 0;
2211	pcb->idtype = idtype;
2212	pcb->rt = NULL;
2213	have_src = bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src));
2214
2215	LIST_FOREACH(rt, &ng_btsocket_l2cap_rt, next) {
2216		if (rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
2217			continue;
2218
2219		/* Match src and dst */
2220		if (have_src) {
2221			if (bcmp(&pcb->src, &rt->src, sizeof(rt->src)) == 0)
2222				break;
2223		} else {
2224			if (bcmp(&pcb->dst, &rt->src, sizeof(rt->src)) != 0)
2225				break;
2226		}
2227	}
2228
2229	if (rt != NULL) {
2230		pcb->rt = rt;
2231
2232		if (!have_src){
2233			bcopy(&rt->src, &pcb->src, sizeof(pcb->src));
2234			pcb->srctype =
2235			  (sa->l2cap_bdaddr_type == BDADDR_BREDR)?
2236			  BDADDR_BREDR : BDADDR_LE_PUBLIC;
2237		}
2238	} else
2239		error = EHOSTUNREACH;
2240
2241	/*
2242	 * Send L2CA_Connect request
2243	 */
2244
2245	if (error == 0) {
2246		error = ng_btsocket_l2cap_send_l2ca_con_req(pcb);
2247		if (error == 0) {
2248			pcb->flags |= NG_BTSOCKET_L2CAP_CLIENT;
2249			pcb->state = NG_BTSOCKET_L2CAP_CONNECTING;
2250			soisconnecting(pcb->so);
2251
2252			ng_btsocket_l2cap_timeout(pcb);
2253		}
2254	}
2255
2256	mtx_unlock(&pcb->pcb_mtx);
2257	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2258	mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
2259
2260	return (error);
2261} /* ng_btsocket_l2cap_connect */
2262
2263/*
2264 * Process ioctl's calls on socket
2265 */
2266
2267int
2268ng_btsocket_l2cap_control(struct socket *so, u_long cmd, void *data,
2269		struct ifnet *ifp, struct thread *td)
2270{
2271	return (EINVAL);
2272} /* ng_btsocket_l2cap_control */
2273
2274/*
2275 * Process getsockopt/setsockopt system calls
2276 */
2277
2278int
2279ng_btsocket_l2cap_ctloutput(struct socket *so, struct sockopt *sopt)
2280{
2281	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2282	int			error = 0;
2283	ng_l2cap_cfg_opt_val_t	v;
2284
2285	if (pcb == NULL)
2286		return (EINVAL);
2287	if (ng_btsocket_l2cap_node == NULL)
2288		return (EINVAL);
2289
2290	if (sopt->sopt_level != SOL_L2CAP)
2291		return (0);
2292
2293	mtx_lock(&pcb->pcb_mtx);
2294
2295	switch (sopt->sopt_dir) {
2296	case SOPT_GET:
2297		switch (sopt->sopt_name) {
2298		case SO_L2CAP_IMTU: /* get incoming MTU */
2299			error = sooptcopyout(sopt, &pcb->imtu,
2300						sizeof(pcb->imtu));
2301			break;
2302
2303		case SO_L2CAP_OMTU: /* get outgoing (peer incoming) MTU */
2304			error = sooptcopyout(sopt, &pcb->omtu,
2305						sizeof(pcb->omtu));
2306			break;
2307
2308		case SO_L2CAP_IFLOW: /* get incoming flow spec. */
2309			error = sooptcopyout(sopt, &pcb->iflow,
2310						sizeof(pcb->iflow));
2311			break;
2312
2313		case SO_L2CAP_OFLOW: /* get outgoing flow spec. */
2314			error = sooptcopyout(sopt, &pcb->oflow,
2315						sizeof(pcb->oflow));
2316			break;
2317
2318		case SO_L2CAP_FLUSH: /* get flush timeout */
2319			error = sooptcopyout(sopt, &pcb->flush_timo,
2320						sizeof(pcb->flush_timo));
2321			break;
2322		case SO_L2CAP_ENCRYPTED: /* get encrypt required */
2323			error = sooptcopyout(sopt, &pcb->need_encrypt,
2324						sizeof(pcb->need_encrypt));
2325			break;
2326
2327		default:
2328			error = ENOPROTOOPT;
2329			break;
2330		}
2331		break;
2332
2333	case SOPT_SET:
2334		/*
2335		 * XXX
2336		 * We do not allow to change these parameters while socket is
2337		 * connected or we are in the process of creating a connection.
2338		 * May be this should indicate re-configuration of the open
2339		 * channel?
2340		 */
2341
2342		if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2343			error = EACCES;
2344			break;
2345		}
2346
2347		switch (sopt->sopt_name) {
2348		case SO_L2CAP_IMTU: /* set incoming MTU */
2349			error = sooptcopyin(sopt, &v, sizeof(v), sizeof(v.mtu));
2350			if (error == 0)
2351				pcb->imtu = v.mtu;
2352			break;
2353
2354		case SO_L2CAP_OFLOW: /* set outgoing flow spec. */
2355			error = sooptcopyin(sopt, &v, sizeof(v),sizeof(v.flow));
2356			if (error == 0)
2357				bcopy(&v.flow, &pcb->oflow, sizeof(pcb->oflow));
2358			break;
2359
2360		case SO_L2CAP_FLUSH: /* set flush timeout */
2361			error = sooptcopyin(sopt, &v, sizeof(v),
2362						sizeof(v.flush_timo));
2363			if (error == 0)
2364				pcb->flush_timo = v.flush_timo;
2365			break;
2366		case SO_L2CAP_ENCRYPTED: /*set connect encryption opt*/
2367			if((pcb->state != NG_BTSOCKET_L2CAP_OPEN) &&
2368			   (pcb->state != NG_BTSOCKET_L2CAP_W4_ENC_CHANGE)){
2369				error = sooptcopyin(sopt, &v, sizeof(v),
2370						    sizeof(v.encryption));
2371				if(error == 0)
2372					pcb->need_encrypt = (v.encryption)?1:0;
2373			}else{
2374				error = EINVAL;
2375			}
2376			break;
2377		default:
2378			error = ENOPROTOOPT;
2379			break;
2380		}
2381		break;
2382
2383	default:
2384		error = EINVAL;
2385		break;
2386	}
2387
2388	mtx_unlock(&pcb->pcb_mtx);
2389
2390	return (error);
2391} /* ng_btsocket_l2cap_ctloutput */
2392
2393/*
2394 * Detach and destroy socket
2395 */
2396
2397void
2398ng_btsocket_l2cap_detach(struct socket *so)
2399{
2400	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2401
2402	KASSERT(pcb != NULL, ("ng_btsocket_l2cap_detach: pcb == NULL"));
2403
2404	if (ng_btsocket_l2cap_node == NULL)
2405		return;
2406
2407	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2408	mtx_lock(&pcb->pcb_mtx);
2409
2410	/* XXX what to do with pending request? */
2411	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2412		ng_btsocket_l2cap_untimeout(pcb);
2413
2414	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED &&
2415	    pcb->state != NG_BTSOCKET_L2CAP_DISCONNECTING)
2416		/* Send disconnect request with "zero" token */
2417		ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2418
2419	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2420
2421	LIST_REMOVE(pcb, next);
2422
2423	mtx_unlock(&pcb->pcb_mtx);
2424	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2425
2426	mtx_destroy(&pcb->pcb_mtx);
2427	bzero(pcb, sizeof(*pcb));
2428	free(pcb, M_NETGRAPH_BTSOCKET_L2CAP);
2429
2430	soisdisconnected(so);
2431	so->so_pcb = NULL;
2432} /* ng_btsocket_l2cap_detach */
2433
2434/*
2435 * Disconnect socket
2436 */
2437
2438int
2439ng_btsocket_l2cap_disconnect(struct socket *so)
2440{
2441	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2442	int			error = 0;
2443
2444	if (pcb == NULL)
2445		return (EINVAL);
2446	if (ng_btsocket_l2cap_node == NULL)
2447		return (EINVAL);
2448
2449	mtx_lock(&pcb->pcb_mtx);
2450
2451	if (pcb->state == NG_BTSOCKET_L2CAP_DISCONNECTING) {
2452		mtx_unlock(&pcb->pcb_mtx);
2453		return (EINPROGRESS);
2454	}
2455
2456	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2457		/* XXX FIXME what to do with pending request? */
2458		if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2459			ng_btsocket_l2cap_untimeout(pcb);
2460
2461		error = ng_btsocket_l2cap_send_l2ca_discon_req(pcb->token, pcb);
2462		if (error == 0) {
2463			pcb->state = NG_BTSOCKET_L2CAP_DISCONNECTING;
2464			soisdisconnecting(so);
2465
2466			ng_btsocket_l2cap_timeout(pcb);
2467		}
2468
2469		/* XXX FIXME what to do if error != 0 */
2470	}
2471
2472	mtx_unlock(&pcb->pcb_mtx);
2473
2474	return (error);
2475} /* ng_btsocket_l2cap_disconnect */
2476
2477/*
2478 * Listen on socket
2479 */
2480
2481int
2482ng_btsocket_l2cap_listen(struct socket *so, int backlog, struct thread *td)
2483{
2484	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2485	int error;
2486
2487	SOCK_LOCK(so);
2488	error = solisten_proto_check(so);
2489	if (error != 0)
2490		goto out;
2491	if (pcb == NULL) {
2492		solisten_proto_abort(so);
2493		error = EINVAL;
2494		goto out;
2495	}
2496	if (ng_btsocket_l2cap_node == NULL) {
2497		solisten_proto_abort(so);
2498		error = EINVAL;
2499		goto out;
2500	}
2501	if (pcb->psm == 0) {
2502		solisten_proto_abort(so);
2503		error = EADDRNOTAVAIL;
2504		goto out;
2505	}
2506	solisten_proto(so, backlog);
2507out:
2508	SOCK_UNLOCK(so);
2509	return (error);
2510} /* ng_btsocket_listen */
2511
2512/*
2513 * Return peer address for getpeername(2) or for accept(2).  For the latter
2514 * case no extra work to do here, socket must be connected and ready.
2515 */
2516int
2517ng_btsocket_l2cap_peeraddr(struct socket *so, struct sockaddr *sa)
2518{
2519	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2520	struct sockaddr_l2cap *l2cap = (struct sockaddr_l2cap *)sa;
2521
2522	if (pcb == NULL)
2523		return (EINVAL);
2524	if (ng_btsocket_l2cap_node == NULL)
2525		return (EINVAL);
2526
2527	*l2cap = (struct sockaddr_l2cap ){
2528		.l2cap_len = sizeof(struct sockaddr_l2cap),
2529		.l2cap_family = AF_BLUETOOTH,
2530		.l2cap_psm = htole16(pcb->psm),
2531	};
2532	bcopy(&pcb->dst, &l2cap->l2cap_bdaddr, sizeof(l2cap->l2cap_bdaddr));
2533	switch(pcb->idtype){
2534	case NG_L2CAP_L2CA_IDTYPE_ATT:
2535		l2cap->l2cap_cid = NG_L2CAP_ATT_CID;
2536		break;
2537	case NG_L2CAP_L2CA_IDTYPE_SMP:
2538		l2cap->l2cap_cid = NG_L2CAP_SMP_CID;
2539		break;
2540	default:
2541		l2cap->l2cap_cid = 0;
2542		break;
2543	}
2544	l2cap->l2cap_bdaddr_type = pcb->dsttype;
2545
2546	return (0);
2547}
2548
2549/*
2550 * Send data to socket
2551 */
2552
2553int
2554ng_btsocket_l2cap_send(struct socket *so, int flags, struct mbuf *m,
2555		struct sockaddr *nam, struct mbuf *control, struct thread *td)
2556{
2557	ng_btsocket_l2cap_pcb_t	*pcb = so2l2cap_pcb(so);
2558	int			 error = 0;
2559
2560	if (ng_btsocket_l2cap_node == NULL) {
2561		error = ENETDOWN;
2562		goto drop;
2563	}
2564
2565	/* Check socket and input */
2566	if (pcb == NULL || m == NULL || control != NULL) {
2567		error = EINVAL;
2568		goto drop;
2569	}
2570
2571	mtx_lock(&pcb->pcb_mtx);
2572
2573	/* Make sure socket is connected */
2574	if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
2575		mtx_unlock(&pcb->pcb_mtx);
2576		error = ENOTCONN;
2577		goto drop;
2578	}
2579
2580	/* Check route */
2581	if (pcb->rt == NULL ||
2582	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook)) {
2583		mtx_unlock(&pcb->pcb_mtx);
2584		error = ENETDOWN;
2585		goto drop;
2586	}
2587
2588	/* Check packet size against outgoing (peer's incoming) MTU) */
2589	if (m->m_pkthdr.len > pcb->omtu) {
2590		NG_BTSOCKET_L2CAP_ERR(
2591"%s: Packet too big, len=%d, omtu=%d\n", __func__, m->m_pkthdr.len, pcb->omtu);
2592
2593		mtx_unlock(&pcb->pcb_mtx);
2594		error = EMSGSIZE;
2595		goto drop;
2596	}
2597
2598	/*
2599	 * First put packet on socket send queue. Then check if we have
2600	 * pending timeout. If we do not have timeout then we must send
2601	 * packet and schedule timeout. Otherwise do nothing and wait for
2602	 * L2CA_WRITE_RSP.
2603	 */
2604
2605	sbappendrecord(&pcb->so->so_snd, m);
2606	m = NULL;
2607
2608	if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2609		error = ng_btsocket_l2cap_send2(pcb);
2610		if (error == 0)
2611			ng_btsocket_l2cap_timeout(pcb);
2612		else
2613			sbdroprecord(&pcb->so->so_snd); /* XXX */
2614	}
2615
2616	mtx_unlock(&pcb->pcb_mtx);
2617drop:
2618	NG_FREE_M(m); /* checks for != NULL */
2619	NG_FREE_M(control);
2620
2621	return (error);
2622} /* ng_btsocket_l2cap_send */
2623
2624/*
2625 * Send first packet in the socket queue to the L2CAP layer
2626 */
2627
2628static int
2629ng_btsocket_l2cap_send2(ng_btsocket_l2cap_pcb_p pcb)
2630{
2631	struct	mbuf		*m = NULL;
2632	ng_l2cap_l2ca_hdr_t	*hdr = NULL;
2633	int			 error = 0;
2634
2635	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2636
2637	if (sbavail(&pcb->so->so_snd) == 0)
2638		return (EINVAL); /* XXX */
2639
2640	m = m_dup(pcb->so->so_snd.sb_mb, M_NOWAIT);
2641	if (m == NULL)
2642		return (ENOBUFS);
2643
2644	/* Create L2CA packet header */
2645	M_PREPEND(m, sizeof(*hdr), M_NOWAIT);
2646	if (m != NULL)
2647		if (m->m_len < sizeof(*hdr))
2648			m = m_pullup(m, sizeof(*hdr));
2649
2650	if (m == NULL) {
2651		NG_BTSOCKET_L2CAP_ERR(
2652"%s: Failed to create L2CA packet header\n", __func__);
2653
2654		return (ENOBUFS);
2655	}
2656
2657	hdr = mtod(m, ng_l2cap_l2ca_hdr_t *);
2658	hdr->token = pcb->token;
2659	hdr->length = m->m_pkthdr.len - sizeof(*hdr);
2660	hdr->lcid = pcb->cid;
2661	hdr->idtype = pcb->idtype;
2662	NG_BTSOCKET_L2CAP_INFO(
2663"%s: Sending packet: len=%d, length=%d, lcid=%d, token=%d, state=%d\n",
2664		__func__, m->m_pkthdr.len, hdr->length, hdr->lcid,
2665		hdr->token, pcb->state);
2666
2667	/*
2668	 * If we got here than we have successfully creates new L2CAP
2669	 * data packet and now we can send it to the L2CAP layer
2670	 */
2671
2672	NG_SEND_DATA_ONLY(error, pcb->rt->hook, m);
2673
2674	return (error);
2675} /* ng_btsocket_l2cap_send2 */
2676
2677/*
2678 * Get socket address
2679 */
2680int
2681ng_btsocket_l2cap_sockaddr(struct socket *so, struct sockaddr *sa)
2682{
2683	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2684	struct sockaddr_l2cap *l2cap = (struct sockaddr_l2cap *)sa;
2685
2686	if (pcb == NULL)
2687		return (EINVAL);
2688	if (ng_btsocket_l2cap_node == NULL)
2689		return (EINVAL);
2690
2691	*l2cap = (struct sockaddr_l2cap ){
2692		.l2cap_len = sizeof(struct sockaddr_l2cap),
2693		.l2cap_family = AF_BLUETOOTH,
2694		.l2cap_psm = htole16(pcb->psm),
2695		.l2cap_bdaddr_type = pcb->srctype,
2696	};
2697	bcopy(&pcb->src, &l2cap->l2cap_bdaddr, sizeof(l2cap->l2cap_bdaddr));
2698
2699	return (0);
2700}
2701
2702/*****************************************************************************
2703 *****************************************************************************
2704 **                              Misc. functions
2705 *****************************************************************************
2706 *****************************************************************************/
2707
2708/*
2709 * Look for the socket that listens on given PSM and bdaddr. Returns exact or
2710 * close match (if any). Caller must hold ng_btsocket_l2cap_sockets_mtx.
2711 */
2712
2713static ng_btsocket_l2cap_pcb_p
2714ng_btsocket_l2cap_pcb_by_addr(bdaddr_p bdaddr, int psm)
2715{
2716	ng_btsocket_l2cap_pcb_p	p = NULL, p1 = NULL;
2717
2718	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2719
2720	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next) {
2721		if (p->so == NULL || !SOLISTENING(p->so) || p->psm != psm)
2722			continue;
2723
2724		if (bcmp(&p->src, bdaddr, sizeof(p->src)) == 0)
2725			break;
2726
2727		if (bcmp(&p->src, NG_HCI_BDADDR_ANY, sizeof(p->src)) == 0)
2728			p1 = p;
2729	}
2730
2731	return ((p != NULL)? p : p1);
2732} /* ng_btsocket_l2cap_pcb_by_addr */
2733
2734/*
2735 * Look for the socket that has given token.
2736 * Caller must hold ng_btsocket_l2cap_sockets_mtx.
2737 */
2738
2739static ng_btsocket_l2cap_pcb_p
2740ng_btsocket_l2cap_pcb_by_token(u_int32_t token)
2741{
2742	ng_btsocket_l2cap_pcb_p	p = NULL;
2743
2744	if (token == 0)
2745		return (NULL);
2746
2747	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2748
2749	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2750		if (p->token == token)
2751			break;
2752
2753	return (p);
2754} /* ng_btsocket_l2cap_pcb_by_token */
2755
2756/*
2757 * Look for the socket that assigned to given source address and channel ID.
2758 * Caller must hold ng_btsocket_l2cap_sockets_mtx
2759 */
2760
2761static ng_btsocket_l2cap_pcb_p
2762ng_btsocket_l2cap_pcb_by_cid(bdaddr_p src, int cid, int idtype)
2763{
2764	ng_btsocket_l2cap_pcb_p	p = NULL;
2765
2766	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2767
2768	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next){
2769		if (p->cid == cid &&
2770		    bcmp(src, &p->src, sizeof(p->src)) == 0&&
2771		    p->idtype == idtype)
2772			break;
2773	}
2774	return (p);
2775} /* ng_btsocket_l2cap_pcb_by_cid */
2776
2777/*
2778 * Set timeout on socket
2779 */
2780
2781static void
2782ng_btsocket_l2cap_timeout(ng_btsocket_l2cap_pcb_p pcb)
2783{
2784	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2785
2786	if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2787		pcb->flags |= NG_BTSOCKET_L2CAP_TIMO;
2788		callout_reset(&pcb->timo, bluetooth_l2cap_ertx_timeout(),
2789		    ng_btsocket_l2cap_process_timeout, pcb);
2790	} else
2791		KASSERT(0,
2792("%s: Duplicated socket timeout?!\n", __func__));
2793} /* ng_btsocket_l2cap_timeout */
2794
2795/*
2796 * Unset timeout on socket
2797 */
2798
2799static void
2800ng_btsocket_l2cap_untimeout(ng_btsocket_l2cap_pcb_p pcb)
2801{
2802	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2803
2804	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO) {
2805		callout_stop(&pcb->timo);
2806		pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2807	} else
2808		KASSERT(0,
2809("%s: No socket timeout?!\n", __func__));
2810} /* ng_btsocket_l2cap_untimeout */
2811
2812/*
2813 * Process timeout on socket
2814 */
2815
2816static void
2817ng_btsocket_l2cap_process_timeout(void *xpcb)
2818{
2819	ng_btsocket_l2cap_pcb_p	pcb = (ng_btsocket_l2cap_pcb_p) xpcb;
2820
2821	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2822
2823	pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2824	pcb->so->so_error = ETIMEDOUT;
2825
2826	switch (pcb->state) {
2827	case NG_BTSOCKET_L2CAP_CONNECTING:
2828	case NG_BTSOCKET_L2CAP_CONFIGURING:
2829	case NG_BTSOCKET_L2CAP_W4_ENC_CHANGE:
2830		/* Send disconnect request with "zero" token */
2831		if (pcb->cid != 0)
2832			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2833
2834		/* ... and close the socket */
2835		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2836		soisdisconnected(pcb->so);
2837		break;
2838
2839	case NG_BTSOCKET_L2CAP_OPEN:
2840		/* Send timeout - drop packet and wakeup sender */
2841		sbdroprecord(&pcb->so->so_snd);
2842		sowwakeup(pcb->so);
2843		break;
2844
2845	case NG_BTSOCKET_L2CAP_DISCONNECTING:
2846		/* Disconnect timeout - disconnect the socket anyway */
2847		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2848		soisdisconnected(pcb->so);
2849		break;
2850
2851	default:
2852		NG_BTSOCKET_L2CAP_ERR(
2853"%s: Invalid socket state=%d\n", __func__, pcb->state);
2854		break;
2855	}
2856} /* ng_btsocket_l2cap_process_timeout */
2857
2858/*
2859 * Translate HCI/L2CAP error code into "errno" code
2860 * XXX Note: Some L2CAP and HCI error codes have the same value, but
2861 *     different meaning
2862 */
2863
2864static int
2865ng_btsocket_l2cap_result2errno(int result)
2866{
2867	switch (result) {
2868	case 0x00: /* No error */
2869		return (0);
2870
2871	case 0x01: /* Unknown HCI command */
2872		return (ENODEV);
2873
2874	case 0x02: /* No connection */
2875		return (ENOTCONN);
2876
2877	case 0x03: /* Hardware failure */
2878		return (EIO);
2879
2880	case 0x04: /* Page timeout */
2881		return (EHOSTDOWN);
2882
2883	case 0x05: /* Authentication failure */
2884	case 0x06: /* Key missing */
2885	case 0x18: /* Pairing not allowed */
2886	case 0x21: /* Role change not allowed */
2887	case 0x24: /* LMP PSU not allowed */
2888	case 0x25: /* Encryption mode not acceptable */
2889	case 0x26: /* Unit key used */
2890		return (EACCES);
2891
2892	case 0x07: /* Memory full */
2893		return (ENOMEM);
2894
2895	case 0x08:   /* Connection timeout */
2896	case 0x10:   /* Host timeout */
2897	case 0x22:   /* LMP response timeout */
2898	case 0xee:   /* HCI timeout */
2899	case 0xeeee: /* L2CAP timeout */
2900		return (ETIMEDOUT);
2901
2902	case 0x09: /* Max number of connections */
2903	case 0x0a: /* Max number of SCO connections to a unit */
2904		return (EMLINK);
2905
2906	case 0x0b: /* ACL connection already exists */
2907		return (EEXIST);
2908
2909	case 0x0c: /* Command disallowed */
2910		return (EBUSY);
2911
2912	case 0x0d: /* Host rejected due to limited resources */
2913	case 0x0e: /* Host rejected due to securiity reasons */
2914	case 0x0f: /* Host rejected due to remote unit is a personal unit */
2915	case 0x1b: /* SCO offset rejected */
2916	case 0x1c: /* SCO interval rejected */
2917	case 0x1d: /* SCO air mode rejected */
2918		return (ECONNREFUSED);
2919
2920	case 0x11: /* Unsupported feature or parameter value */
2921	case 0x19: /* Unknown LMP PDU */
2922	case 0x1a: /* Unsupported remote feature */
2923	case 0x20: /* Unsupported LMP parameter value */
2924	case 0x27: /* QoS is not supported */
2925	case 0x29: /* Paring with unit key not supported */
2926		return (EOPNOTSUPP);
2927
2928	case 0x12: /* Invalid HCI command parameter */
2929	case 0x1e: /* Invalid LMP parameters */
2930		return (EINVAL);
2931
2932	case 0x13: /* Other end terminated connection: User ended connection */
2933	case 0x14: /* Other end terminated connection: Low resources */
2934	case 0x15: /* Other end terminated connection: About to power off */
2935		return (ECONNRESET);
2936
2937	case 0x16: /* Connection terminated by local host */
2938		return (ECONNABORTED);
2939
2940#if 0 /* XXX not yet */
2941	case 0x17: /* Repeated attempts */
2942	case 0x1f: /* Unspecified error */
2943	case 0x23: /* LMP error transaction collision */
2944	case 0x28: /* Instant passed */
2945#endif
2946	}
2947
2948	return (ENOSYS);
2949} /* ng_btsocket_l2cap_result2errno */
2950