- Don't set hardware slot time according to "short slot time" capability
[dragonfly.git] / sys / netbt / hci_socket.c
blob2e5ccfea350b0976cdde860c83e398d01659d8c7
1 /* $OpenBSD: hci_socket.c,v 1.4 2007/09/17 01:33:33 krw Exp $ */
2 /* $NetBSD: hci_socket.c,v 1.10 2007/03/31 18:17:13 plunky Exp $ */
3 /* $DragonFly: src/sys/netbt/hci_socket.c,v 1.1 2007/12/30 20:02:56 hasso Exp $ */
5 /*-
6 * Copyright (c) 2005 Iain Hibbert.
7 * Copyright (c) 2006 Itronix Inc.
8 * All rights reserved.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. The name of Itronix Inc. may not be used to endorse
19 * or promote products derived from this software without specific
20 * prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
24 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
25 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
26 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
27 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
28 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
29 * ON ANY THEORY OF LIABILITY, WHETHER IN
30 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
32 * POSSIBILITY OF SUCH DAMAGE.
35 #include <sys/cdefs.h>
37 /* load symbolic names */
38 #ifdef BLUETOOTH_DEBUG
39 #define PRUREQUESTS
40 #define PRCOREQUESTS
41 #endif
43 #include <sys/param.h>
44 #include <sys/domain.h>
45 #include <sys/kernel.h>
46 #include <sys/mbuf.h>
47 #include <sys/proc.h>
48 #include <sys/protosw.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/systm.h>
52 #include <sys/endian.h>
53 #include <net/if.h>
54 #include <net/if_var.h>
55 #include <sys/sysctl.h>
56 #include <sys/thread2.h>
58 #include <netbt/bluetooth.h>
59 #include <netbt/hci.h>
61 /*******************************************************************************
63 * HCI SOCK_RAW Sockets - for control of Bluetooth Devices
68 * the raw HCI protocol control block
70 struct hci_pcb {
71 struct socket *hp_socket; /* socket */
72 unsigned int hp_flags; /* flags */
73 bdaddr_t hp_laddr; /* local address */
74 bdaddr_t hp_raddr; /* remote address */
75 struct hci_filter hp_efilter; /* user event filter */
76 struct hci_filter hp_pfilter; /* user packet filter */
77 LIST_ENTRY(hci_pcb) hp_next; /* next HCI pcb */
80 /* hp_flags */
81 #define HCI_PRIVILEGED (1<<0) /* no security filter for root */
82 #define HCI_DIRECTION (1<<1) /* direction control messages */
83 #define HCI_PROMISCUOUS (1<<2) /* listen to all units */
85 LIST_HEAD(hci_pcb_list, hci_pcb) hci_pcb = LIST_HEAD_INITIALIZER(hci_pcb);
87 /* sysctl defaults */
88 int hci_sendspace = HCI_CMD_PKT_SIZE;
89 int hci_recvspace = 4096;
91 extern struct pr_usrreqs hci_usrreqs;
93 /* Prototypes for usrreqs methods. */
94 static int hci_sabort (struct socket *so);
95 static int hci_sdetach(struct socket *so);
96 static int hci_sdisconnect (struct socket *so);
97 static int hci_scontrol (struct socket *so, u_long cmd, caddr_t data,
98 struct ifnet *ifp, struct thread *td);
99 static int hci_sattach (struct socket *so, int proto,
100 struct pru_attach_info *ai);
101 static int hci_sbind (struct socket *so, struct sockaddr *nam,
102 struct thread *td);
103 static int hci_sconnect (struct socket *so, struct sockaddr *nam,
104 struct thread *td);
105 static int hci_speeraddr (struct socket *so, struct sockaddr **nam);
106 static int hci_ssockaddr (struct socket *so, struct sockaddr **nam);
107 static int hci_sshutdown (struct socket *so);
108 static int hci_ssend (struct socket *so, int flags, struct mbuf *m,
109 struct sockaddr *addr, struct mbuf *control,
110 struct thread *td);
113 * Security filter routines for unprivileged users.
114 * Allow all but a few critical events, and only permit read commands.
117 static int
118 hci_security_check_opcode(uint16_t opcode)
121 switch (opcode) {
122 /* Link control */
123 case HCI_CMD_INQUIRY:
124 return sizeof(hci_inquiry_cp);
125 case HCI_CMD_REMOTE_NAME_REQ:
126 return sizeof(hci_remote_name_req_cp);
127 case HCI_CMD_READ_REMOTE_FEATURES:
128 return sizeof(hci_read_remote_features_cp);
129 case HCI_CMD_READ_REMOTE_EXTENDED_FEATURES:
130 return sizeof(hci_read_remote_extended_features_cp);
131 case HCI_CMD_READ_REMOTE_VER_INFO:
132 return sizeof(hci_read_remote_ver_info_cp);
133 case HCI_CMD_READ_CLOCK_OFFSET:
134 return sizeof(hci_read_clock_offset_cp);
135 case HCI_CMD_READ_LMP_HANDLE:
136 return sizeof(hci_read_lmp_handle_cp);
138 /* Link policy */
139 case HCI_CMD_ROLE_DISCOVERY:
140 return sizeof(hci_role_discovery_cp);
141 case HCI_CMD_READ_LINK_POLICY_SETTINGS:
142 return sizeof(hci_read_link_policy_settings_cp);
143 case HCI_CMD_READ_DEFAULT_LINK_POLICY_SETTINGS:
144 return 0; /* No command parameters */
146 /* Host controller and baseband */
147 case HCI_CMD_READ_PIN_TYPE:
148 case HCI_CMD_READ_LOCAL_NAME:
149 case HCI_CMD_READ_CON_ACCEPT_TIMEOUT:
150 case HCI_CMD_READ_PAGE_TIMEOUT:
151 case HCI_CMD_READ_SCAN_ENABLE:
152 case HCI_CMD_READ_PAGE_SCAN_ACTIVITY:
153 case HCI_CMD_READ_INQUIRY_SCAN_ACTIVITY:
154 case HCI_CMD_READ_AUTH_ENABLE:
155 case HCI_CMD_READ_ENCRYPTION_MODE:
156 case HCI_CMD_READ_UNIT_CLASS:
157 case HCI_CMD_READ_VOICE_SETTING:
158 return 0; /* No command parameters */
159 case HCI_CMD_READ_AUTO_FLUSH_TIMEOUT:
160 return sizeof(hci_read_auto_flush_timeout_cp);
161 case HCI_CMD_READ_NUM_BROADCAST_RETRANS:
162 case HCI_CMD_READ_HOLD_MODE_ACTIVITY:
163 return 0; /* No command parameters */
164 case HCI_CMD_READ_XMIT_LEVEL:
165 return sizeof(hci_read_xmit_level_cp);
166 case HCI_CMD_READ_SCO_FLOW_CONTROL:
167 return 0; /* No command parameters */
168 case HCI_CMD_READ_LINK_SUPERVISION_TIMEOUT:
169 return sizeof(hci_read_link_supervision_timeout_cp);
170 case HCI_CMD_READ_NUM_SUPPORTED_IAC:
171 case HCI_CMD_READ_IAC_LAP:
172 case HCI_CMD_READ_PAGE_SCAN_PERIOD:
173 case HCI_CMD_READ_PAGE_SCAN:
174 case HCI_CMD_READ_INQUIRY_SCAN_TYPE:
175 case HCI_CMD_READ_INQUIRY_MODE:
176 case HCI_CMD_READ_PAGE_SCAN_TYPE:
177 case HCI_CMD_READ_AFH_ASSESSMENT:
178 return 0; /* No command parameters */
180 /* Informational */
181 case HCI_CMD_READ_LOCAL_VER:
182 case HCI_CMD_READ_LOCAL_COMMANDS:
183 case HCI_CMD_READ_LOCAL_FEATURES:
184 return 0; /* No command parameters */
185 case HCI_CMD_READ_LOCAL_EXTENDED_FEATURES:
186 return sizeof(hci_read_local_extended_features_cp);
187 case HCI_CMD_READ_BUFFER_SIZE:
188 case HCI_CMD_READ_COUNTRY_CODE:
189 case HCI_CMD_READ_BDADDR:
190 return 0; /* No command parameters */
192 /* Status */
193 case HCI_CMD_READ_FAILED_CONTACT_CNTR:
194 return sizeof(hci_read_failed_contact_cntr_cp);
195 case HCI_CMD_READ_LINK_QUALITY:
196 return sizeof(hci_read_link_quality_cp);
197 case HCI_CMD_READ_RSSI:
198 return sizeof(hci_read_rssi_cp);
199 case HCI_CMD_READ_AFH_CHANNEL_MAP:
200 return sizeof(hci_read_afh_channel_map_cp);
201 case HCI_CMD_READ_CLOCK:
202 return sizeof(hci_read_clock_cp);
204 /* Testing */
205 case HCI_CMD_READ_LOOPBACK_MODE:
206 return 0; /* No command parameters */
209 return -1; /* disallowed */
212 static int
213 hci_security_check_event(uint8_t event)
216 switch (event) {
217 case HCI_EVENT_RETURN_LINK_KEYS:
218 case HCI_EVENT_LINK_KEY_NOTIFICATION:
219 case HCI_EVENT_VENDOR:
220 return -1; /* disallowed */
223 return 0; /* ok */
227 * When command packet reaches the device, we can drop
228 * it from the socket buffer (called from hci_output_acl)
230 void
231 hci_drop(void *arg)
233 struct socket *so = arg;
235 sbdroprecord(&so->so_snd.sb);
236 sowwakeup(so);
240 * HCI socket is going away and has some pending packets. We let them
241 * go by design, but remove the context pointer as it will be invalid
242 * and we no longer need to be notified.
244 static void
245 hci_cmdwait_flush(struct socket *so)
247 struct hci_unit *unit;
248 struct socket *ctx;
249 struct mbuf *m;
251 DPRINTF("flushing %p\n", so);
253 TAILQ_FOREACH(unit, &hci_unit_list, hci_next) {
254 IF_POLL(&unit->hci_cmdwait, m);
255 while (m != NULL) {
256 ctx = M_GETCTX(m, struct socket *);
257 if (ctx == so)
258 M_SETCTX(m, NULL);
260 m = m->m_nextpkt;
266 * HCI send packet
267 * This came from userland, so check it out.
269 static int
270 hci_send(struct hci_pcb *pcb, struct mbuf *m, bdaddr_t *addr)
272 struct hci_unit *unit;
273 struct mbuf *m0;
274 hci_cmd_hdr_t hdr;
275 int err;
277 KKASSERT(m != NULL);
278 KKASSERT(addr != NULL);
280 /* wants at least a header to start with */
281 if (m->m_pkthdr.len < sizeof(hdr)) {
282 err = EMSGSIZE;
283 goto bad;
285 m_copydata(m, 0, sizeof(hdr), (caddr_t)&hdr);
287 /* only allows CMD packets to be sent */
288 if (hdr.type != HCI_CMD_PKT) {
289 err = EINVAL;
290 goto bad;
293 /* validates packet length */
294 if (m->m_pkthdr.len != sizeof(hdr) + hdr.length) {
295 err = EMSGSIZE;
296 goto bad;
299 /* security checks for unprivileged users */
300 if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
301 && hci_security_check_opcode(letoh16(hdr.opcode)) != hdr.length) {
302 err = EPERM;
303 goto bad;
306 /* finds destination */
307 unit = hci_unit_lookup(addr);
308 if (unit == NULL) {
309 err = ENETDOWN;
310 goto bad;
313 /* makes a copy for precious to keep */
314 m0 = m_copym(m, 0, M_COPYALL, MB_DONTWAIT);
315 if (m0 == NULL) {
316 err = ENOMEM;
317 goto bad;
319 sbappendrecord(&pcb->hp_socket->so_snd.sb, m0);
320 M_SETCTX(m, pcb->hp_socket); /* enable drop callback */
322 DPRINTFN(2, "(%s) opcode (%03x|%04x)\n", unit->hci_devname,
323 HCI_OGF(letoh16(hdr.opcode)), HCI_OCF(letoh16(hdr.opcode)));
325 /* Sendss it */
326 if (unit->hci_num_cmd_pkts == 0) {
327 IF_ENQUEUE(&unit->hci_cmdwait, m);
328 } else
329 hci_output_cmd(unit, m);
331 return 0;
333 bad:
334 DPRINTF("packet (%d bytes) not sent (error %d)\n",
335 m->m_pkthdr.len, err);
336 if (m) m_freem(m);
337 return err;
341 * Implementation of usrreqs.
343 static int
344 hci_sabort (struct socket *so)
346 /* struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb; */
348 soisdisconnected(so);
349 return hci_sdetach(so);
352 static int
353 hci_sdetach(struct socket *so)
355 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
357 if (pcb == NULL)
358 return EINVAL;
359 if (so->so_snd.ssb_mb != NULL)
360 hci_cmdwait_flush(so);
362 so->so_pcb = NULL;
363 LIST_REMOVE(pcb, hp_next);
364 kfree(pcb, M_PCB);
366 return 0;
369 static int
370 hci_sdisconnect (struct socket *so)
372 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
374 if (pcb==NULL)
375 return EINVAL;
377 bdaddr_copy(&pcb->hp_raddr, BDADDR_ANY);
379 * XXX We cannot call soisdisconnected() here, as it sets
380 * SS_CANTRCVMORE and SS_CANTSENDMORE. The problem is that
381 * soisconnected() does not clear these and if you try to reconnect
382 * this socket (which is permitted) you get a broken pipe when you
383 * try to write any data.
385 so->so_state &= ~SS_ISCONNECTED;
387 return 0;
390 static int
391 hci_scontrol (struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
392 struct thread *td)
394 return hci_ioctl(cmd, (void*)data, NULL);
397 static int
398 hci_sattach (struct socket *so, int proto, struct pru_attach_info *ai)
400 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
401 int err = 0;
403 if (pcb)
404 return EINVAL;
406 err = soreserve(so, hci_sendspace, hci_recvspace,NULL);
407 if (err)
408 return err;
410 pcb = kmalloc(sizeof *pcb, M_PCB, M_NOWAIT | M_ZERO);
411 if (pcb == NULL)
412 return ENOMEM;
414 so->so_pcb = pcb;
415 pcb->hp_socket = so;
417 if (curproc == NULL || suser(curthread) == 0)
418 pcb->hp_flags |= HCI_PRIVILEGED;
421 * Set default user filter. By default, socket only passes
422 * Command_Complete and Command_Status Events.
424 hci_filter_set(HCI_EVENT_COMMAND_COMPL, &pcb->hp_efilter);
425 hci_filter_set(HCI_EVENT_COMMAND_STATUS, &pcb->hp_efilter);
426 hci_filter_set(HCI_EVENT_PKT, &pcb->hp_pfilter);
428 crit_enter();
429 LIST_INSERT_HEAD(&hci_pcb, pcb, hp_next);
430 crit_exit();
432 return 0;
435 static int
436 hci_sbind (struct socket *so, struct sockaddr *nam,
437 struct thread *td)
439 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
440 struct sockaddr_bt *sa;
442 KKASSERT(nam != NULL);
443 sa = (struct sockaddr_bt *)nam;
445 if (sa->bt_len != sizeof(struct sockaddr_bt))
446 return EINVAL;
448 if (sa->bt_family != AF_BLUETOOTH)
449 return EAFNOSUPPORT;
451 bdaddr_copy(&pcb->hp_laddr, &sa->bt_bdaddr);
453 if (bdaddr_any(&sa->bt_bdaddr))
454 pcb->hp_flags |= HCI_PROMISCUOUS;
455 else
456 pcb->hp_flags &= ~HCI_PROMISCUOUS;
458 return 0;
461 static int
462 hci_sconnect (struct socket *so, struct sockaddr *nam,
463 struct thread *td)
465 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
466 struct sockaddr_bt *sa;
467 KKASSERT(nam != NULL);
468 sa = (struct sockaddr_bt *)nam;
470 if (sa->bt_len != sizeof(struct sockaddr_bt))
471 return EINVAL;
473 if (sa->bt_family != AF_BLUETOOTH)
474 return EAFNOSUPPORT;
476 if (hci_unit_lookup(&sa->bt_bdaddr) == NULL)
477 return EADDRNOTAVAIL;
479 bdaddr_copy(&pcb->hp_raddr, &sa->bt_bdaddr);
480 soisconnected(so);
482 return 0;
485 static int
486 hci_speeraddr (struct socket *so, struct sockaddr **nam)
488 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
489 struct sockaddr_bt *sa;
491 KKASSERT(nam != NULL);
492 sa = (struct sockaddr_bt *)nam;
494 memset(sa, 0, sizeof(struct sockaddr_bt));
495 sa->bt_len = sizeof(struct sockaddr_bt);
496 sa->bt_family = AF_BLUETOOTH;
497 bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_raddr);
499 return 0;
502 static int
503 hci_ssockaddr (struct socket *so, struct sockaddr **nam)
505 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
506 struct sockaddr_bt *sa;
508 KKASSERT(nam != NULL);
509 sa = (struct sockaddr_bt *)nam;
511 memset(sa, 0, sizeof(struct sockaddr_bt));
512 sa->bt_len = sizeof(struct sockaddr_bt);
513 sa->bt_family = AF_BLUETOOTH;
514 bdaddr_copy(&sa->bt_bdaddr, &pcb->hp_laddr);
516 return 0;
519 static int
520 hci_sshutdown (struct socket *so)
522 socantsendmore(so);
523 return 0;
526 static int
527 hci_ssend (struct socket *so, int flags, struct mbuf *m,
528 struct sockaddr *addr, struct mbuf *control,
529 struct thread *td)
531 int err = 0;
532 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
533 struct sockaddr_bt *sa;
535 sa = NULL;
536 if (addr) {
537 sa = (struct sockaddr_bt *)addr;
539 if (sa->bt_len != sizeof(struct sockaddr_bt)) {
540 err = EINVAL;
541 if (m) m_freem(m);
542 if (control) m_freem(control);
543 return err;
546 if (sa->bt_family != AF_BLUETOOTH) {
547 err = EAFNOSUPPORT;
548 if (m) m_freem(m);
549 if (control) m_freem(control);
550 return err;
554 if (control) /* have no use for this */
555 m_freem(control);
557 return hci_send(pcb, m, (sa ? &sa->bt_bdaddr : &pcb->hp_raddr));
561 * get/set socket options
564 hci_ctloutput (struct socket *so, struct sockopt *sopt)
566 struct hci_pcb *pcb = (struct hci_pcb *)so->so_pcb;
567 int idir = 0;
568 int err = 0;
570 #ifdef notyet /* XXX */
571 DPRINTFN(2, "req %s\n", prcorequests[req]);
572 #endif
574 if (pcb == NULL)
575 return EINVAL;
577 if (sopt->sopt_level != BTPROTO_HCI)
578 return ENOPROTOOPT;
580 switch(sopt->sopt_dir) {
581 case PRCO_GETOPT:
582 switch (sopt->sopt_name) {
583 case SO_HCI_EVT_FILTER:
584 err = sooptcopyout(sopt, &pcb->hp_efilter,
585 sizeof(struct hci_filter));
586 break;
588 case SO_HCI_PKT_FILTER:
589 err = sooptcopyout(sopt, &pcb->hp_pfilter,
590 sizeof(struct hci_filter));
591 break;
593 case SO_HCI_DIRECTION:
594 if (pcb->hp_flags & HCI_DIRECTION)
595 idir = 1;
596 else
597 idir = 0;
598 err = sooptcopyout(sopt, &idir, sizeof(int));
599 break;
601 default:
602 err = ENOPROTOOPT;
603 break;
605 break;
607 case PRCO_SETOPT:
608 switch (sopt->sopt_name) {
609 case SO_HCI_EVT_FILTER: /* set event filter */
610 err = sooptcopyin(sopt, &pcb->hp_efilter,
611 sizeof(struct hci_filter),
612 sizeof(struct hci_filter));
613 break;
615 case SO_HCI_PKT_FILTER: /* set packet filter */
616 err = sooptcopyin(sopt, &pcb->hp_pfilter,
617 sizeof(struct hci_filter),
618 sizeof(struct hci_filter));
619 break;
621 case SO_HCI_DIRECTION: /* request direction ctl messages */
622 err = sooptcopyin(sopt, &idir, sizeof(int),
623 sizeof(int));
624 if (err) break;
625 if (idir)
626 pcb->hp_flags |= HCI_DIRECTION;
627 else
628 pcb->hp_flags &= ~HCI_DIRECTION;
629 break;
631 default:
632 err = ENOPROTOOPT;
633 break;
635 break;
637 default:
638 err = ENOPROTOOPT;
639 break;
642 return err;
646 * HCI mbuf tap routine
648 * copy packets to any raw HCI sockets that wish (and are
649 * permitted) to see them
651 void
652 hci_mtap(struct mbuf *m, struct hci_unit *unit)
654 struct hci_pcb *pcb;
655 struct mbuf *m0, *ctlmsg, **ctl;
656 struct sockaddr_bt sa;
657 uint8_t type;
658 uint8_t event;
659 uint16_t opcode;
661 KKASSERT(m->m_len >= sizeof(type));
663 type = *mtod(m, uint8_t *);
665 memset(&sa, 0, sizeof(sa));
666 sa.bt_len = sizeof(struct sockaddr_bt);
667 sa.bt_family = AF_BLUETOOTH;
668 bdaddr_copy(&sa.bt_bdaddr, &unit->hci_bdaddr);
670 LIST_FOREACH(pcb, &hci_pcb, hp_next) {
672 * filter according to source address
674 if ((pcb->hp_flags & HCI_PROMISCUOUS) == 0
675 && bdaddr_same(&pcb->hp_laddr, &sa.bt_bdaddr) == 0)
676 continue;
679 * filter according to packet type filter
681 if (hci_filter_test(type, &pcb->hp_pfilter) == 0)
682 continue;
685 * filter according to event/security filters
687 switch(type) {
688 case HCI_EVENT_PKT:
689 KKASSERT(m->m_len >= sizeof(hci_event_hdr_t));
691 event = mtod(m, hci_event_hdr_t *)->event;
693 if (hci_filter_test(event, &pcb->hp_efilter) == 0)
694 continue;
696 if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
697 && hci_security_check_event(event) == -1)
698 continue;
699 break;
701 case HCI_CMD_PKT:
702 KKASSERT(m->m_len >= sizeof(hci_cmd_hdr_t));
704 opcode = letoh16(mtod(m, hci_cmd_hdr_t *)->opcode);
706 if ((pcb->hp_flags & HCI_PRIVILEGED) == 0
707 && hci_security_check_opcode(opcode) == -1)
708 continue;
709 break;
711 case HCI_ACL_DATA_PKT:
712 case HCI_SCO_DATA_PKT:
713 default:
714 if ((pcb->hp_flags & HCI_PRIVILEGED) == 0)
715 continue;
717 break;
721 * create control messages
723 ctlmsg = NULL;
724 ctl = &ctlmsg;
725 if (pcb->hp_flags & HCI_DIRECTION) {
726 int dir = m->m_flags & IFF_LINK0 ? 1 : 0;
728 *ctl = sbcreatecontrol((void *)&dir, sizeof(dir),
729 SCM_HCI_DIRECTION, BTPROTO_HCI);
731 if (*ctl != NULL)
732 ctl = &((*ctl)->m_next);
736 * copy to socket
738 m0 = m_copym(m, 0, M_COPYALL, MB_DONTWAIT);
739 if (m0 && sbappendaddr(&pcb->hp_socket->so_rcv.sb,
740 (struct sockaddr *)&sa, m0, ctlmsg)) {
741 sorwakeup(pcb->hp_socket);
742 } else {
743 m_freem(ctlmsg);
744 m_freem(m0);
749 struct pr_usrreqs hci_usrreqs = {
750 .pru_abort = hci_sabort,
751 .pru_accept = pru_accept_notsupp,
752 .pru_attach = hci_sattach,
753 .pru_bind = hci_sbind,
754 .pru_connect = hci_sconnect,
755 .pru_connect2 = pru_connect2_notsupp,
756 .pru_control = hci_scontrol,
757 .pru_detach = hci_sdetach,
758 .pru_disconnect = hci_sdisconnect,
759 .pru_listen = pru_listen_notsupp,
760 .pru_peeraddr = hci_speeraddr,
761 .pru_rcvd = pru_rcvd_notsupp,
762 .pru_rcvoob = pru_rcvoob_notsupp,
763 .pru_send = hci_ssend,
764 .pru_sense = pru_sense_null,
765 .pru_shutdown = hci_sshutdown,
766 .pru_sockaddr = hci_ssockaddr,
767 .pru_sosend = sosend,
768 .pru_soreceive = soreceive,
769 .pru_sopoll = sopoll