1 /*
2  * ng_btsocket_l2cap.c
3  */
4 
5 /*-
6  * Copyright (c) 2001-2002 Maksim Yevmenkin <m_evmenkin@yahoo.com>
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
19  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
22  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28  * SUCH DAMAGE.
29  *
30  * $Id: ng_btsocket_l2cap.c,v 1.16 2003/09/14 23:29:06 max Exp $
31  * $FreeBSD$
32  */
33 
34 #include <sys/param.h>
35 #include <sys/systm.h>
36 #include <sys/bitstring.h>
37 #include <sys/domain.h>
38 #include <sys/endian.h>
39 #include <sys/errno.h>
40 #include <sys/filedesc.h>
41 #include <sys/ioccom.h>
42 #include <sys/kernel.h>
43 #include <sys/lock.h>
44 #include <sys/malloc.h>
45 #include <sys/mbuf.h>
46 #include <sys/mutex.h>
47 #include <sys/protosw.h>
48 #include <sys/queue.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/sysctl.h>
52 #include <sys/taskqueue.h>
53 #include <netgraph/ng_message.h>
54 #include <netgraph/netgraph.h>
55 #include <netgraph/bluetooth/include/ng_bluetooth.h>
56 #include <netgraph/bluetooth/include/ng_hci.h>
57 #include <netgraph/bluetooth/include/ng_l2cap.h>
58 #include <netgraph/bluetooth/include/ng_btsocket.h>
59 #include <netgraph/bluetooth/include/ng_btsocket_l2cap.h>
60 
61 /* MALLOC define */
62 #ifdef NG_SEPARATE_MALLOC
63 MALLOC_DEFINE(M_NETGRAPH_BTSOCKET_L2CAP, "netgraph_btsocks_l2cap",
64 		"Netgraph Bluetooth L2CAP sockets");
65 #else
66 #define M_NETGRAPH_BTSOCKET_L2CAP M_NETGRAPH
67 #endif /* NG_SEPARATE_MALLOC */
68 
69 /* Netgraph node methods */
70 static ng_constructor_t	ng_btsocket_l2cap_node_constructor;
71 static ng_rcvmsg_t	ng_btsocket_l2cap_node_rcvmsg;
72 static ng_shutdown_t	ng_btsocket_l2cap_node_shutdown;
73 static ng_newhook_t	ng_btsocket_l2cap_node_newhook;
74 static ng_connect_t	ng_btsocket_l2cap_node_connect;
75 static ng_rcvdata_t	ng_btsocket_l2cap_node_rcvdata;
76 static ng_disconnect_t	ng_btsocket_l2cap_node_disconnect;
77 
78 static void		ng_btsocket_l2cap_input   (void *, int);
79 static void		ng_btsocket_l2cap_rtclean (void *, int);
80 
81 /* Netgraph type descriptor */
82 static struct ng_type	typestruct = {
83 	.version =	NG_ABI_VERSION,
84 	.name =		NG_BTSOCKET_L2CAP_NODE_TYPE,
85 	.constructor =	ng_btsocket_l2cap_node_constructor,
86 	.rcvmsg =	ng_btsocket_l2cap_node_rcvmsg,
87 	.shutdown =	ng_btsocket_l2cap_node_shutdown,
88 	.newhook =	ng_btsocket_l2cap_node_newhook,
89 	.connect =	ng_btsocket_l2cap_node_connect,
90 	.rcvdata =	ng_btsocket_l2cap_node_rcvdata,
91 	.disconnect =	ng_btsocket_l2cap_node_disconnect,
92 };
93 
94 /* Globals */
95 extern int					ifqmaxlen;
96 static u_int32_t				ng_btsocket_l2cap_debug_level;
97 static node_p					ng_btsocket_l2cap_node;
98 static struct ng_bt_itemq			ng_btsocket_l2cap_queue;
99 static struct mtx				ng_btsocket_l2cap_queue_mtx;
100 static struct task				ng_btsocket_l2cap_queue_task;
101 static LIST_HEAD(, ng_btsocket_l2cap_pcb)	ng_btsocket_l2cap_sockets;
102 static struct mtx				ng_btsocket_l2cap_sockets_mtx;
103 static LIST_HEAD(, ng_btsocket_l2cap_rtentry)	ng_btsocket_l2cap_rt;
104 static struct mtx				ng_btsocket_l2cap_rt_mtx;
105 static struct task				ng_btsocket_l2cap_rt_task;
106 static struct timeval				ng_btsocket_l2cap_lasttime;
107 static int					ng_btsocket_l2cap_curpps;
108 
109 /* Sysctl tree */
110 SYSCTL_DECL(_net_bluetooth_l2cap_sockets);
111 SYSCTL_NODE(_net_bluetooth_l2cap_sockets, OID_AUTO, seq, CTLFLAG_RW,
112 	0, "Bluetooth SEQPACKET L2CAP sockets family");
113 SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, debug_level,
114 	CTLFLAG_RW,
115 	&ng_btsocket_l2cap_debug_level, NG_BTSOCKET_WARN_LEVEL,
116 	"Bluetooth SEQPACKET L2CAP sockets debug level");
117 SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_len,
118 	CTLFLAG_RD,
119 	&ng_btsocket_l2cap_queue.len, 0,
120 	"Bluetooth SEQPACKET L2CAP sockets input queue length");
121 SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_maxlen,
122 	CTLFLAG_RD,
123 	&ng_btsocket_l2cap_queue.maxlen, 0,
124 	"Bluetooth SEQPACKET L2CAP sockets input queue max. length");
125 SYSCTL_INT(_net_bluetooth_l2cap_sockets_seq, OID_AUTO, queue_drops,
126 	CTLFLAG_RD,
127 	&ng_btsocket_l2cap_queue.drops, 0,
128 	"Bluetooth SEQPACKET L2CAP sockets input queue drops");
129 
130 /* Debug */
131 #define NG_BTSOCKET_L2CAP_INFO \
132 	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_INFO_LEVEL && \
133 	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
134 		printf
135 
136 #define NG_BTSOCKET_L2CAP_WARN \
137 	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_WARN_LEVEL && \
138 	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
139 		printf
140 
141 #define NG_BTSOCKET_L2CAP_ERR \
142 	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ERR_LEVEL && \
143 	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
144 		printf
145 
146 #define NG_BTSOCKET_L2CAP_ALERT \
147 	if (ng_btsocket_l2cap_debug_level >= NG_BTSOCKET_ALERT_LEVEL && \
148 	    ppsratecheck(&ng_btsocket_l2cap_lasttime, &ng_btsocket_l2cap_curpps, 1)) \
149 		printf
150 
151 /*
152  * Netgraph message processing routines
153  */
154 
155 static int ng_btsocket_l2cap_process_l2ca_con_req_rsp
156 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
157 static int ng_btsocket_l2cap_process_l2ca_con_rsp_rsp
158 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
159 static int ng_btsocket_l2cap_process_l2ca_con_ind
160 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
161 
162 static int ng_btsocket_l2cap_process_l2ca_cfg_req_rsp
163 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
164 static int ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp
165 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
166 static int ng_btsocket_l2cap_process_l2ca_cfg_ind
167 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
168 
169 static int ng_btsocket_l2cap_process_l2ca_discon_rsp
170 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
171 static int ng_btsocket_l2cap_process_l2ca_discon_ind
172 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
173 
174 static int ng_btsocket_l2cap_process_l2ca_write_rsp
175 	(struct ng_mesg *, ng_btsocket_l2cap_rtentry_p);
176 
177 /*
178  * Send L2CA_xxx messages to the lower layer
179  */
180 
181 static int  ng_btsocket_l2cap_send_l2ca_con_req
182 	(ng_btsocket_l2cap_pcb_p);
183 static int  ng_btsocket_l2cap_send_l2ca_con_rsp_req
184 	(u_int32_t, ng_btsocket_l2cap_rtentry_p, bdaddr_p, int, int, int);
185 static int  ng_btsocket_l2cap_send_l2ca_cfg_req
186 	(ng_btsocket_l2cap_pcb_p);
187 static int  ng_btsocket_l2cap_send_l2ca_cfg_rsp
188 	(ng_btsocket_l2cap_pcb_p);
189 static int  ng_btsocket_l2cap_send_l2ca_discon_req
190 	(u_int32_t, ng_btsocket_l2cap_pcb_p);
191 
192 static int ng_btsocket_l2cap_send2
193 	(ng_btsocket_l2cap_pcb_p);
194 
195 /*
196  * Timeout processing routines
197  */
198 
199 static void ng_btsocket_l2cap_timeout         (ng_btsocket_l2cap_pcb_p);
200 static void ng_btsocket_l2cap_untimeout       (ng_btsocket_l2cap_pcb_p);
201 static void ng_btsocket_l2cap_process_timeout (void *);
202 
203 /*
204  * Other stuff
205  */
206 
207 static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_addr(bdaddr_p, int);
208 static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_token(u_int32_t);
209 static ng_btsocket_l2cap_pcb_p     ng_btsocket_l2cap_pcb_by_cid (bdaddr_p, int);
210 static int                         ng_btsocket_l2cap_result2errno(int);
211 
212 #define ng_btsocket_l2cap_wakeup_input_task() \
213 	taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_queue_task)
214 
215 #define ng_btsocket_l2cap_wakeup_route_task() \
216 	taskqueue_enqueue(taskqueue_swi_giant, &ng_btsocket_l2cap_rt_task)
217 
218 /*****************************************************************************
219  *****************************************************************************
220  **                        Netgraph node interface
221  *****************************************************************************
222  *****************************************************************************/
223 
224 /*
225  * Netgraph node constructor. Do not allow to create node of this type.
226  */
227 
228 static int
229 ng_btsocket_l2cap_node_constructor(node_p node)
230 {
231 	return (EINVAL);
232 } /* ng_btsocket_l2cap_node_constructor */
233 
234 /*
235  * Do local shutdown processing. Let old node go and create new fresh one.
236  */
237 
238 static int
239 ng_btsocket_l2cap_node_shutdown(node_p node)
240 {
241 	int	error = 0;
242 
243 	NG_NODE_UNREF(node);
244 
245 	/* Create new node */
246 	error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
247 	if (error != 0) {
248 		NG_BTSOCKET_L2CAP_ALERT(
249 "%s: Could not create Netgraph node, error=%d\n", __func__, error);
250 
251 		ng_btsocket_l2cap_node = NULL;
252 
253 		return (error);
254 	}
255 
256 	error = ng_name_node(ng_btsocket_l2cap_node,
257 				NG_BTSOCKET_L2CAP_NODE_TYPE);
258 	if (error != 0) {
259 		NG_BTSOCKET_L2CAP_ALERT(
260 "%s: Could not name Netgraph node, error=%d\n", __func__, error);
261 
262 		NG_NODE_UNREF(ng_btsocket_l2cap_node);
263 		ng_btsocket_l2cap_node = NULL;
264 
265 		return (error);
266 	}
267 
268 	return (0);
269 } /* ng_btsocket_l2cap_node_shutdown */
270 
271 /*
272  * We allow any hook to be connected to the node.
273  */
274 
275 static int
276 ng_btsocket_l2cap_node_newhook(node_p node, hook_p hook, char const *name)
277 {
278 	return (0);
279 } /* ng_btsocket_l2cap_node_newhook */
280 
281 /*
282  * Just say "YEP, that's OK by me!"
283  */
284 
285 static int
286 ng_btsocket_l2cap_node_connect(hook_p hook)
287 {
288 	NG_HOOK_SET_PRIVATE(hook, NULL);
289 	NG_HOOK_REF(hook); /* Keep extra reference to the hook */
290 
291 #if 0
292 	NG_HOOK_FORCE_QUEUE(NG_HOOK_PEER(hook));
293 	NG_HOOK_FORCE_QUEUE(hook);
294 #endif
295 
296 	return (0);
297 } /* ng_btsocket_l2cap_node_connect */
298 
299 /*
300  * Hook disconnection. Schedule route cleanup task
301  */
302 
303 static int
304 ng_btsocket_l2cap_node_disconnect(hook_p hook)
305 {
306 	/*
307 	 * If hook has private information than we must have this hook in
308 	 * the routing table and must schedule cleaning for the routing table.
309 	 * Otherwise hook was connected but we never got "hook_info" message,
310 	 * so we have never added this hook to the routing table and it save
311 	 * to just delete it.
312 	 */
313 
314 	if (NG_HOOK_PRIVATE(hook) != NULL)
315 		return (ng_btsocket_l2cap_wakeup_route_task());
316 
317 	NG_HOOK_UNREF(hook); /* Remove extra reference */
318 
319 	return (0);
320 } /* ng_btsocket_l2cap_node_disconnect */
321 
322 /*
323  * Process incoming messages
324  */
325 
326 static int
327 ng_btsocket_l2cap_node_rcvmsg(node_p node, item_p item, hook_p hook)
328 {
329 	struct ng_mesg	*msg = NGI_MSG(item); /* item still has message */
330 	int		 error = 0;
331 
332 	if (msg != NULL && msg->header.typecookie == NGM_L2CAP_COOKIE) {
333 		mtx_lock(&ng_btsocket_l2cap_queue_mtx);
334 		if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
335 			NG_BTSOCKET_L2CAP_ERR(
336 "%s: Input queue is full (msg)\n", __func__);
337 
338 			NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
339 			NG_FREE_ITEM(item);
340 			error = ENOBUFS;
341 		} else {
342 			if (hook != NULL) {
343 				NG_HOOK_REF(hook);
344 				NGI_SET_HOOK(item, hook);
345 			}
346 
347 			NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
348 			error = ng_btsocket_l2cap_wakeup_input_task();
349 		}
350 		mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
351 	} else {
352 		NG_FREE_ITEM(item);
353 		error = EINVAL;
354 	}
355 
356 	return (error);
357 } /* ng_btsocket_l2cap_node_rcvmsg */
358 
359 /*
360  * Receive data on a hook
361  */
362 
363 static int
364 ng_btsocket_l2cap_node_rcvdata(hook_p hook, item_p item)
365 {
366 	int	error = 0;
367 
368 	mtx_lock(&ng_btsocket_l2cap_queue_mtx);
369 	if (NG_BT_ITEMQ_FULL(&ng_btsocket_l2cap_queue)) {
370 		NG_BTSOCKET_L2CAP_ERR(
371 "%s: Input queue is full (data)\n", __func__);
372 
373 		NG_BT_ITEMQ_DROP(&ng_btsocket_l2cap_queue);
374 		NG_FREE_ITEM(item);
375 		error = ENOBUFS;
376 	} else {
377 		NG_HOOK_REF(hook);
378 		NGI_SET_HOOK(item, hook);
379 
380 		NG_BT_ITEMQ_ENQUEUE(&ng_btsocket_l2cap_queue, item);
381 		error = ng_btsocket_l2cap_wakeup_input_task();
382 	}
383 	mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
384 
385 	return (error);
386 } /* ng_btsocket_l2cap_node_rcvdata */
387 
388 /*
389  * Process L2CA_Connect respose. Socket layer must have initiated connection,
390  * so we have to have a socket associated with message token.
391  */
392 
393 static int
394 ng_btsocket_l2cap_process_l2ca_con_req_rsp(struct ng_mesg *msg,
395 		ng_btsocket_l2cap_rtentry_p rt)
396 {
397 	ng_l2cap_l2ca_con_op	*op = NULL;
398 	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
399 	int			 error = 0;
400 
401 	if (msg->header.arglen != sizeof(*op))
402 		return (EMSGSIZE);
403 
404 	op = (ng_l2cap_l2ca_con_op *)(msg->data);
405 
406 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
407 
408 	/* Look for the socket with the token */
409 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
410 	if (pcb == NULL) {
411 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
412 		return (ENOENT);
413 	}
414 
415 	mtx_lock(&pcb->pcb_mtx);
416 
417 	NG_BTSOCKET_L2CAP_INFO(
418 "%s: Got L2CA_Connect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
419 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, status=%d, " \
420 "state=%d\n",	__func__, msg->header.token,
421 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
422 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
423 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
424 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
425 		pcb->psm, op->lcid, op->result, op->status,
426 		pcb->state);
427 
428 	if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
429 		mtx_unlock(&pcb->pcb_mtx);
430 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
431 
432 		return (ENOENT);
433 	}
434 
435 	ng_btsocket_l2cap_untimeout(pcb);
436 
437 	if (op->result == NG_L2CAP_PENDING) {
438 		ng_btsocket_l2cap_timeout(pcb);
439 		mtx_unlock(&pcb->pcb_mtx);
440 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
441 
442 		return (0);
443 	}
444 
445 	if (op->result == NG_L2CAP_SUCCESS) {
446 		/*
447 		 * Channel is now open, so update local channel ID and
448 		 * start configuration process. Source and destination
449 		 * addresses as well as route must be already set.
450 		 */
451 
452 		pcb->cid = op->lcid;
453 
454 		error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
455 		if (error != 0) {
456 			/* Send disconnect request with "zero" token */
457 			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
458 
459 			/* ... and close the socket */
460 			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
461 			soisdisconnected(pcb->so);
462 		} else {
463 			pcb->cfg_state = NG_BTSOCKET_L2CAP_CFG_IN_SENT;
464 			pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
465 
466 			ng_btsocket_l2cap_timeout(pcb);
467 		}
468 	} else {
469 		/*
470 		 * We have failed to open connection, so convert result
471 		 * code to "errno" code and disconnect the socket. Channel
472 		 * already has been closed.
473 		 */
474 
475 		pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
476 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
477 		soisdisconnected(pcb->so);
478 	}
479 
480 	mtx_unlock(&pcb->pcb_mtx);
481 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
482 
483 	return (error);
484 } /* ng_btsocket_l2cap_process_l2ca_con_req_rsp */
485 
486 /*
487  * Process L2CA_ConnectRsp response
488  */
489 
490 static int
491 ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(struct ng_mesg *msg,
492 		ng_btsocket_l2cap_rtentry_p rt)
493 {
494 	ng_l2cap_l2ca_con_rsp_op	*op = NULL;
495 	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
496 
497 	if (msg->header.arglen != sizeof(*op))
498 		return (EMSGSIZE);
499 
500 	op = (ng_l2cap_l2ca_con_rsp_op *)(msg->data);
501 
502 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
503 
504 	/* Look for the socket with the token */
505 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
506 	if (pcb == NULL) {
507 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
508 		return (ENOENT);
509 	}
510 
511 	mtx_lock(&pcb->pcb_mtx);
512 
513 	NG_BTSOCKET_L2CAP_INFO(
514 "%s: Got L2CA_ConnectRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
515 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
516 		__func__, msg->header.token,
517 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
518 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
519 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
520 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
521 		pcb->psm, pcb->cid, op->result, pcb->state);
522 
523 	if (pcb->state != NG_BTSOCKET_L2CAP_CONNECTING) {
524 		mtx_unlock(&pcb->pcb_mtx);
525 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
526 
527 		return (ENOENT);
528 	}
529 
530 	ng_btsocket_l2cap_untimeout(pcb);
531 
532 	/* Check the result and disconnect the socket on failure */
533 	if (op->result != NG_L2CAP_SUCCESS) {
534 		/* Close the socket - channel already closed */
535 		pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
536 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
537 		soisdisconnected(pcb->so);
538 	} else {
539 		/* Move to CONFIGURING state and wait for CONFIG_IND */
540 		pcb->cfg_state = 0;
541 		pcb->state = NG_BTSOCKET_L2CAP_CONFIGURING;
542 		ng_btsocket_l2cap_timeout(pcb);
543 	}
544 
545 	mtx_unlock(&pcb->pcb_mtx);
546 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
547 
548 	return (0);
549 } /* ng_btsocket_process_l2ca_con_rsp_rsp */
550 
551 /*
552  * Process L2CA_Connect indicator. Find socket that listens on address
553  * and PSM. Find exact or closest match. Create new socket and initiate
554  * connection.
555  */
556 
557 static int
558 ng_btsocket_l2cap_process_l2ca_con_ind(struct ng_mesg *msg,
559 		ng_btsocket_l2cap_rtentry_p rt)
560 {
561 	ng_l2cap_l2ca_con_ind_ip	*ip = NULL;
562 	ng_btsocket_l2cap_pcb_t		*pcb = NULL, *pcb1 = NULL;
563 	int				 error = 0;
564 	u_int32_t			 token = 0;
565 	u_int16_t			 result = 0;
566 
567 	if (msg->header.arglen != sizeof(*ip))
568 		return (EMSGSIZE);
569 
570 	ip = (ng_l2cap_l2ca_con_ind_ip *)(msg->data);
571 
572 	NG_BTSOCKET_L2CAP_INFO(
573 "%s: Got L2CA_Connect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
574 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, ident=%d\n",
575 		__func__,
576 		rt->src.b[5], rt->src.b[4], rt->src.b[3],
577 		rt->src.b[2], rt->src.b[1], rt->src.b[0],
578 		ip->bdaddr.b[5], ip->bdaddr.b[4], ip->bdaddr.b[3],
579 		ip->bdaddr.b[2], ip->bdaddr.b[1], ip->bdaddr.b[0],
580 		ip->psm, ip->lcid, ip->ident);
581 
582 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
583 
584 	pcb = ng_btsocket_l2cap_pcb_by_addr(&rt->src, ip->psm);
585 	if (pcb != NULL) {
586 		struct socket	*so1 = NULL;
587 
588 		mtx_lock(&pcb->pcb_mtx);
589 
590 		/*
591 		 * First check the pending connections queue and if we have
592 		 * space then create new socket and set proper source address.
593 		 */
594 
595 		if (pcb->so->so_qlen <= pcb->so->so_qlimit)
596 			so1 = sonewconn(pcb->so, 0);
597 
598 		if (so1 == NULL) {
599 			result = NG_L2CAP_NO_RESOURCES;
600 			goto respond;
601 		}
602 
603 		/*
604 		 * If we got here than we have created new socket. So complete
605 		 * connection. If we we listening on specific address then copy
606 		 * source address from listening socket, otherwise copy source
607 		 * address from hook's routing information.
608 		 */
609 
610 		pcb1 = so2l2cap_pcb(so1);
611 		KASSERT((pcb1 != NULL),
612 ("%s: pcb1 == NULL\n", __func__));
613 
614  		mtx_lock(&pcb1->pcb_mtx);
615 
616 		if (bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src)) != 0)
617 			bcopy(&pcb->src, &pcb1->src, sizeof(pcb1->src));
618 		else
619 			bcopy(&rt->src, &pcb1->src, sizeof(pcb1->src));
620 
621 		pcb1->flags &= ~NG_BTSOCKET_L2CAP_CLIENT;
622 
623 		bcopy(&ip->bdaddr, &pcb1->dst, sizeof(pcb1->dst));
624 		pcb1->psm = ip->psm;
625 		pcb1->cid = ip->lcid;
626 		pcb1->rt = rt;
627 
628 		/* Copy socket settings */
629 		pcb1->imtu = pcb->imtu;
630 		bcopy(&pcb->oflow, &pcb1->oflow, sizeof(pcb1->oflow));
631 		pcb1->flush_timo = pcb->flush_timo;
632 
633 		token = pcb1->token;
634 	} else
635 		/* Nobody listens on requested BDADDR/PSM */
636 		result = NG_L2CAP_PSM_NOT_SUPPORTED;
637 
638 respond:
639 	error = ng_btsocket_l2cap_send_l2ca_con_rsp_req(token, rt,
640 			&ip->bdaddr, ip->ident, ip->lcid, result);
641 	if (pcb1 != NULL) {
642 		if (error != 0) {
643 			pcb1->so->so_error = error;
644 			pcb1->state = NG_BTSOCKET_L2CAP_CLOSED;
645 			soisdisconnected(pcb1->so);
646 		} else {
647 			pcb1->state = NG_BTSOCKET_L2CAP_CONNECTING;
648 			soisconnecting(pcb1->so);
649 
650 			ng_btsocket_l2cap_timeout(pcb1);
651 		}
652 
653 		mtx_unlock(&pcb1->pcb_mtx);
654 	}
655 
656 	if (pcb != NULL)
657 		mtx_unlock(&pcb->pcb_mtx);
658 
659 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
660 
661 	return (error);
662 } /* ng_btsocket_l2cap_process_l2ca_con_ind */
663 
664 /*
665  * Process L2CA_Config response
666  */
667 
668 static int
669 ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(struct ng_mesg *msg,
670 		ng_btsocket_l2cap_rtentry_p rt)
671 {
672 	ng_l2cap_l2ca_cfg_op	*op = NULL;
673 	ng_btsocket_l2cap_pcb_p	 pcb = NULL;
674 
675 	if (msg->header.arglen != sizeof(*op))
676 		return (EMSGSIZE);
677 
678 	op = (ng_l2cap_l2ca_cfg_op *)(msg->data);
679 
680 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
681 
682 	/*
683 	 * Socket must have issued a Configure request, so we must have a
684 	 * socket that wants to be configured. Use Netgraph message token
685 	 * to find it
686 	 */
687 
688 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
689 	if (pcb == NULL) {
690 		/*
691 		 * XXX FIXME what to do here? We could not find a
692 		 * socket with requested token. We even can not send
693 		 * Disconnect, because we do not know channel ID
694 		 */
695 
696 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
697 		return (ENOENT);
698 	}
699 
700 	mtx_lock(&pcb->pcb_mtx);
701 
702         NG_BTSOCKET_L2CAP_INFO(
703 "%s: Got L2CA_Config response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
704 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
705 "cfg_state=%x\n",
706 		__func__, msg->header.token,
707 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
708 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
709 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
710 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
711 		pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
712 
713 	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
714 		mtx_unlock(&pcb->pcb_mtx);
715 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
716 
717 		return (ENOENT);
718 	}
719 
720 	if (op->result == NG_L2CAP_SUCCESS) {
721 		/*
722 		 * XXX FIXME Actually set flush and link timeout.
723 		 * Set QoS here if required. Resolve conficts (flush_timo).
724 		 * Save incoming MTU (peer's outgoing MTU) and outgoing flow
725 		 * spec.
726 		 */
727 
728 		pcb->imtu = op->imtu;
729 		bcopy(&op->oflow, &pcb->oflow, sizeof(pcb->oflow));
730 		pcb->flush_timo = op->flush_timo;
731 
732 		/*
733 		 * We have configured incoming side, so record it and check
734 		 * if configuration is complete. If complete then mark socket
735 		 * as connected, otherwise wait for the peer.
736 		 */
737 
738 		pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_IN_SENT;
739 		pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN;
740 
741 		if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
742 			/* Configuration complete - mark socket as open */
743 			ng_btsocket_l2cap_untimeout(pcb);
744 			pcb->state = NG_BTSOCKET_L2CAP_OPEN;
745 			soisconnected(pcb->so);
746 		}
747 	} else {
748 		/*
749 		 * Something went wrong. Could be unacceptable parameters,
750 		 * reject or unknown option. That's too bad, but we will
751 		 * not negotiate. Send Disconnect and close the channel.
752 		 */
753 
754 		ng_btsocket_l2cap_untimeout(pcb);
755 
756 		switch (op->result) {
757 		case NG_L2CAP_UNACCEPTABLE_PARAMS:
758 		case NG_L2CAP_UNKNOWN_OPTION:
759 			pcb->so->so_error = EINVAL;
760 			break;
761 
762 		default:
763 			pcb->so->so_error = ECONNRESET;
764 			break;
765 		}
766 
767 		/* Send disconnect with "zero" token */
768 		ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
769 
770 		/* ... and close the socket */
771 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
772 		soisdisconnected(pcb->so);
773 	}
774 
775 	mtx_unlock(&pcb->pcb_mtx);
776 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
777 
778 	return (0);
779 } /* ng_btsocket_l2cap_process_l2ca_cfg_req_rsp */
780 
781 /*
782  * Process L2CA_ConfigRsp response
783  */
784 
785 static int
786 ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(struct ng_mesg *msg,
787 		ng_btsocket_l2cap_rtentry_p rt)
788 {
789 	ng_l2cap_l2ca_cfg_rsp_op	*op = NULL;
790 	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
791 	int				 error = 0;
792 
793 	if (msg->header.arglen != sizeof(*op))
794 		return (EMSGSIZE);
795 
796 	op = (ng_l2cap_l2ca_cfg_rsp_op *)(msg->data);
797 
798 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
799 
800 	/* Look for the socket with the token */
801 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
802 	if (pcb == NULL) {
803 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
804 		return (ENOENT);
805 	}
806 
807 	mtx_lock(&pcb->pcb_mtx);
808 
809         NG_BTSOCKET_L2CAP_INFO(
810 "%s: Got L2CA_ConfigRsp response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
811 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d, " \
812 "cfg_state=%x\n",
813 		__func__, msg->header.token,
814 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
815 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
816 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
817 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
818 		pcb->psm, pcb->cid, op->result, pcb->state, pcb->cfg_state);
819 
820 	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
821 		mtx_unlock(&pcb->pcb_mtx);
822 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
823 
824 		return (ENOENT);
825 	}
826 
827 	/* Check the result and disconnect socket of failure */
828 	if (op->result != NG_L2CAP_SUCCESS)
829 		goto disconnect;
830 
831 	/*
832 	 * Now we done with remote side configuration. Configure local
833 	 * side if we have not done it yet.
834 	 */
835 
836 	pcb->cfg_state &= ~NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
837 	pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT;
838 
839 	if (pcb->cfg_state == NG_BTSOCKET_L2CAP_CFG_BOTH) {
840 		/* Configuration complete - mask socket as open */
841 		ng_btsocket_l2cap_untimeout(pcb);
842 		pcb->state = NG_BTSOCKET_L2CAP_OPEN;
843 		soisconnected(pcb->so);
844 	} else {
845 		if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_IN_SENT)) {
846 			/* Send L2CA_Config request - incoming path */
847 			error = ng_btsocket_l2cap_send_l2ca_cfg_req(pcb);
848 			if (error != 0)
849 				goto disconnect;
850 
851 			pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_IN_SENT;
852 		}
853 	}
854 
855 	mtx_unlock(&pcb->pcb_mtx);
856 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
857 
858 	return (error);
859 
860 disconnect:
861 	ng_btsocket_l2cap_untimeout(pcb);
862 
863 	/* Send disconnect with "zero" token */
864 	ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
865 
866 	/* ... and close the socket */
867 	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
868 	soisdisconnected(pcb->so);
869 
870 	mtx_unlock(&pcb->pcb_mtx);
871 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
872 
873 	return (error);
874 } /* ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp */
875 
876 /*
877  * Process L2CA_Config indicator
878  */
879 
880 static int
881 ng_btsocket_l2cap_process_l2ca_cfg_ind(struct ng_mesg *msg,
882 		ng_btsocket_l2cap_rtentry_p rt)
883 {
884 	ng_l2cap_l2ca_cfg_ind_ip	*ip = NULL;
885 	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
886 	int				 error = 0;
887 
888 	if (msg->header.arglen != sizeof(*ip))
889 		return (EMSGSIZE);
890 
891 	ip = (ng_l2cap_l2ca_cfg_ind_ip *)(msg->data);
892 
893 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
894 
895 	/* Check for the open socket that has given channel ID */
896 	pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid);
897 	if (pcb == NULL) {
898 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
899 		return (ENOENT);
900 	}
901 
902 	mtx_lock(&pcb->pcb_mtx);
903 
904         NG_BTSOCKET_L2CAP_INFO(
905 "%s: Got L2CA_Config indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
906 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d, cfg_state=%x\n",
907 		__func__,
908 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
909 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
910 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
911 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
912 		pcb->psm, pcb->cid, pcb->state, pcb->cfg_state);
913 
914 	/* XXX FIXME re-configuration on open socket */
915  	if (pcb->state != NG_BTSOCKET_L2CAP_CONFIGURING) {
916 		mtx_unlock(&pcb->pcb_mtx);
917 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
918 
919 		return (ENOENT);
920 	}
921 
922 	/*
923 	 * XXX FIXME Actually set flush and link timeout. Set QoS here if
924 	 * required. Resolve conficts (flush_timo). Note outgoing MTU (peer's
925 	 * incoming MTU) and incoming flow spec.
926 	 */
927 
928 	pcb->omtu = ip->omtu;
929 	bcopy(&ip->iflow, &pcb->iflow, sizeof(pcb->iflow));
930 	pcb->flush_timo = ip->flush_timo;
931 
932 	/*
933 	 * Send L2CA_Config response to our peer and check for the errors,
934 	 * if any send disconnect to close the channel.
935 	 */
936 
937 	if (!(pcb->cfg_state & NG_BTSOCKET_L2CAP_CFG_OUT_SENT)) {
938 		error = ng_btsocket_l2cap_send_l2ca_cfg_rsp(pcb);
939 		if (error != 0) {
940 			ng_btsocket_l2cap_untimeout(pcb);
941 
942 			pcb->so->so_error = error;
943 
944 			/* Send disconnect with "zero" token */
945 			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
946 
947 			/* ... and close the socket */
948 			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
949 			soisdisconnected(pcb->so);
950 		} else
951 			pcb->cfg_state |= NG_BTSOCKET_L2CAP_CFG_OUT_SENT;
952 	}
953 
954 	mtx_unlock(&pcb->pcb_mtx);
955 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
956 
957 	return (error);
958 } /* ng_btsocket_l2cap_process_l2cap_cfg_ind */
959 
960 /*
961  * Process L2CA_Disconnect response
962  */
963 
964 static int
965 ng_btsocket_l2cap_process_l2ca_discon_rsp(struct ng_mesg *msg,
966 		ng_btsocket_l2cap_rtentry_p rt)
967 {
968 	ng_l2cap_l2ca_discon_op	*op = NULL;
969 	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
970 
971 	/* Check message */
972 	if (msg->header.arglen != sizeof(*op))
973 		return (EMSGSIZE);
974 
975 	op = (ng_l2cap_l2ca_discon_op *)(msg->data);
976 
977 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
978 
979 	/*
980 	 * Socket layer must have issued L2CA_Disconnect request, so there
981 	 * must be a socket that wants to be disconnected. Use Netgraph
982 	 * message token to find it.
983 	 */
984 
985 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
986 	if (pcb == NULL) {
987 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
988 		return (0);
989 	}
990 
991 	mtx_lock(&pcb->pcb_mtx);
992 
993 	/* XXX Close socket no matter what op->result says */
994 	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
995        		NG_BTSOCKET_L2CAP_INFO(
996 "%s: Got L2CA_Disconnect response, token=%d, src bdaddr=%x:%x:%x:%x:%x:%x, " \
997 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, state=%d\n",
998 			__func__, msg->header.token,
999 			pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1000 			pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1001 			pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1002 			pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1003 			pcb->psm, pcb->cid, op->result, pcb->state);
1004 
1005 		ng_btsocket_l2cap_untimeout(pcb);
1006 
1007 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1008 		soisdisconnected(pcb->so);
1009 	}
1010 
1011 	mtx_unlock(&pcb->pcb_mtx);
1012 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1013 
1014 	return (0);
1015 } /* ng_btsocket_l2cap_process_l2ca_discon_rsp */
1016 
1017 /*
1018  * Process L2CA_Disconnect indicator
1019  */
1020 
1021 static int
1022 ng_btsocket_l2cap_process_l2ca_discon_ind(struct ng_mesg *msg,
1023 		ng_btsocket_l2cap_rtentry_p rt)
1024 {
1025 	ng_l2cap_l2ca_discon_ind_ip	*ip = NULL;
1026 	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
1027 
1028 	/* Check message */
1029 	if (msg->header.arglen != sizeof(*ip))
1030 		return (EMSGSIZE);
1031 
1032 	ip = (ng_l2cap_l2ca_discon_ind_ip *)(msg->data);
1033 
1034 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1035 
1036 	/* Look for the socket with given channel ID */
1037 	pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, ip->lcid);
1038 	if (pcb == NULL) {
1039 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1040 		return (0);
1041 	}
1042 
1043 	/*
1044 	 * Channel has already been destroyed, so disconnect the socket
1045 	 * and be done with it. If there was any pending request we can
1046 	 * not do anything here anyway.
1047 	 */
1048 
1049 	mtx_lock(&pcb->pcb_mtx);
1050 
1051        	NG_BTSOCKET_L2CAP_INFO(
1052 "%s: Got L2CA_Disconnect indicator, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1053 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, state=%d\n",
1054 		__func__,
1055 		pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1056 		pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1057 		pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1058 		pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1059 		pcb->psm, pcb->cid, pcb->state);
1060 
1061 	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1062 		ng_btsocket_l2cap_untimeout(pcb);
1063 
1064 	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1065 	soisdisconnected(pcb->so);
1066 
1067 	mtx_unlock(&pcb->pcb_mtx);
1068 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1069 
1070 	return (0);
1071 } /* ng_btsocket_l2cap_process_l2ca_discon_ind */
1072 
1073 /*
1074  * Process L2CA_Write response
1075  */
1076 
1077 static int
1078 ng_btsocket_l2cap_process_l2ca_write_rsp(struct ng_mesg *msg,
1079 		ng_btsocket_l2cap_rtentry_p rt)
1080 {
1081 	ng_l2cap_l2ca_write_op	*op = NULL;
1082 	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
1083 
1084 	/* Check message */
1085 	if (msg->header.arglen != sizeof(*op))
1086 		return (EMSGSIZE);
1087 
1088 	op = (ng_l2cap_l2ca_write_op *)(msg->data);
1089 
1090 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1091 
1092 	/* Look for the socket with given token */
1093 	pcb = ng_btsocket_l2cap_pcb_by_token(msg->header.token);
1094 	if (pcb == NULL) {
1095 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1096 		return (ENOENT);
1097 	}
1098 
1099 	mtx_lock(&pcb->pcb_mtx);
1100 
1101        	NG_BTSOCKET_L2CAP_INFO(
1102 "%s: Got L2CA_Write response, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1103 "dst bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, lcid=%d, result=%d, length=%d, " \
1104 "state=%d\n",		__func__,
1105 			pcb->src.b[5], pcb->src.b[4], pcb->src.b[3],
1106 			pcb->src.b[2], pcb->src.b[1], pcb->src.b[0],
1107 			pcb->dst.b[5], pcb->dst.b[4], pcb->dst.b[3],
1108 			pcb->dst.b[2], pcb->dst.b[1], pcb->dst.b[0],
1109 			pcb->psm, pcb->cid, op->result, op->length,
1110 			pcb->state);
1111 
1112 	if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1113 		mtx_unlock(&pcb->pcb_mtx);
1114 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1115 
1116 		return (ENOENT);
1117 	}
1118 
1119 	ng_btsocket_l2cap_untimeout(pcb);
1120 
1121 	/*
1122  	 * Check if we have more data to send
1123  	 */
1124 
1125 	sbdroprecord(&pcb->so->so_snd);
1126 	if (pcb->so->so_snd.sb_cc > 0) {
1127 		if (ng_btsocket_l2cap_send2(pcb) == 0)
1128 			ng_btsocket_l2cap_timeout(pcb);
1129 		else
1130 			sbdroprecord(&pcb->so->so_snd); /* XXX */
1131 	}
1132 
1133 	/*
1134 	 * Now set the result, drop packet from the socket send queue and
1135 	 * ask for more (wakeup sender)
1136 	 */
1137 
1138 	pcb->so->so_error = ng_btsocket_l2cap_result2errno(op->result);
1139 	sowwakeup(pcb->so);
1140 
1141 	mtx_unlock(&pcb->pcb_mtx);
1142 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1143 
1144 	return (0);
1145 } /* ng_btsocket_l2cap_process_l2ca_write_rsp */
1146 
1147 /*
1148  * Send L2CA_Connect request
1149  */
1150 
1151 static int
1152 ng_btsocket_l2cap_send_l2ca_con_req(ng_btsocket_l2cap_pcb_p pcb)
1153 {
1154 	struct ng_mesg		*msg = NULL;
1155 	ng_l2cap_l2ca_con_ip	*ip = NULL;
1156 	int			 error = 0;
1157 
1158 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1159 
1160 	if (pcb->rt == NULL ||
1161 	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1162 		return (ENETDOWN);
1163 
1164 	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON,
1165 		sizeof(*ip), M_NOWAIT);
1166 	if (msg == NULL)
1167 		return (ENOMEM);
1168 
1169 	msg->header.token = pcb->token;
1170 
1171 	ip = (ng_l2cap_l2ca_con_ip *)(msg->data);
1172 	bcopy(&pcb->dst, &ip->bdaddr, sizeof(ip->bdaddr));
1173 	ip->psm = pcb->psm;
1174 
1175 	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1176 
1177 	return (error);
1178 } /* ng_btsocket_l2cap_send_l2ca_con_req */
1179 
1180 /*
1181  * Send L2CA_Connect response
1182  */
1183 
1184 static int
1185 ng_btsocket_l2cap_send_l2ca_con_rsp_req(u_int32_t token,
1186 		ng_btsocket_l2cap_rtentry_p rt, bdaddr_p dst, int ident,
1187 		int lcid, int result)
1188 {
1189 	struct ng_mesg			*msg = NULL;
1190 	ng_l2cap_l2ca_con_rsp_ip	*ip = NULL;
1191 	int				 error = 0;
1192 
1193 	if (rt == NULL || rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
1194 		return (ENETDOWN);
1195 
1196 	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CON_RSP,
1197 		sizeof(*ip), M_NOWAIT);
1198 	if (msg == NULL)
1199 		return (ENOMEM);
1200 
1201 	msg->header.token = token;
1202 
1203 	ip = (ng_l2cap_l2ca_con_rsp_ip *)(msg->data);
1204 	bcopy(dst, &ip->bdaddr, sizeof(ip->bdaddr));
1205 	ip->ident = ident;
1206 	ip->lcid = lcid;
1207 	ip->result = result;
1208 	ip->status = 0;
1209 
1210 	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, rt->hook, 0);
1211 
1212 	return (error);
1213 } /* ng_btsocket_l2cap_send_l2ca_con_rsp_req */
1214 
1215 /*
1216  * Send L2CA_Config request
1217  */
1218 
1219 static int
1220 ng_btsocket_l2cap_send_l2ca_cfg_req(ng_btsocket_l2cap_pcb_p pcb)
1221 {
1222 	struct ng_mesg		*msg = NULL;
1223 	ng_l2cap_l2ca_cfg_ip	*ip = NULL;
1224 	int			 error = 0;
1225 
1226 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1227 
1228 	if (pcb->rt == NULL ||
1229 	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1230 		return (ENETDOWN);
1231 
1232 	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG,
1233 		sizeof(*ip), M_NOWAIT);
1234 	if (msg == NULL)
1235 		return (ENOMEM);
1236 
1237 	msg->header.token = pcb->token;
1238 
1239 	ip = (ng_l2cap_l2ca_cfg_ip *)(msg->data);
1240 	ip->lcid = pcb->cid;
1241 	ip->imtu = pcb->imtu;
1242 	bcopy(&pcb->oflow, &ip->oflow, sizeof(ip->oflow));
1243 	ip->flush_timo = pcb->flush_timo;
1244 	ip->link_timo = pcb->link_timo;
1245 
1246 	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1247 
1248 	return (error);
1249 } /* ng_btsocket_l2cap_send_l2ca_cfg_req */
1250 
1251 /*
1252  * Send L2CA_Config response
1253  */
1254 
1255 static int
1256 ng_btsocket_l2cap_send_l2ca_cfg_rsp(ng_btsocket_l2cap_pcb_p pcb)
1257 {
1258 	struct ng_mesg			*msg = NULL;
1259 	ng_l2cap_l2ca_cfg_rsp_ip	*ip = NULL;
1260 	int				 error = 0;
1261 
1262 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1263 
1264 	if (pcb->rt == NULL ||
1265 	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1266 		return (ENETDOWN);
1267 
1268 	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_CFG_RSP,
1269 		sizeof(*ip), M_NOWAIT);
1270 	if (msg == NULL)
1271 		return (ENOMEM);
1272 
1273 	msg->header.token = pcb->token;
1274 
1275 	ip = (ng_l2cap_l2ca_cfg_rsp_ip *)(msg->data);
1276 	ip->lcid = pcb->cid;
1277 	ip->omtu = pcb->omtu;
1278 	bcopy(&pcb->iflow, &ip->iflow, sizeof(ip->iflow));
1279 
1280 	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg, pcb->rt->hook, 0);
1281 
1282 	return (error);
1283 } /* ng_btsocket_l2cap_send_l2ca_cfg_rsp */
1284 
1285 /*
1286  * Send L2CA_Disconnect request
1287  */
1288 
1289 static int
1290 ng_btsocket_l2cap_send_l2ca_discon_req(u_int32_t token,
1291 		ng_btsocket_l2cap_pcb_p pcb)
1292 {
1293 	struct ng_mesg		*msg = NULL;
1294 	ng_l2cap_l2ca_discon_ip	*ip = NULL;
1295 	int			 error = 0;
1296 
1297 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
1298 
1299 	if (pcb->rt == NULL ||
1300 	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook))
1301 		return (ENETDOWN);
1302 
1303 	NG_MKMESSAGE(msg, NGM_L2CAP_COOKIE, NGM_L2CAP_L2CA_DISCON,
1304 		sizeof(*ip), M_NOWAIT);
1305 	if (msg == NULL)
1306 		return (ENOMEM);
1307 
1308 	msg->header.token = token;
1309 
1310 	ip = (ng_l2cap_l2ca_discon_ip *)(msg->data);
1311 	ip->lcid = pcb->cid;
1312 
1313 	NG_SEND_MSG_HOOK(error, ng_btsocket_l2cap_node, msg,pcb->rt->hook, 0);
1314 
1315 	return (error);
1316 } /* ng_btsocket_l2cap_send_l2ca_discon_req */
1317 
1318 /*****************************************************************************
1319  *****************************************************************************
1320  **                              Socket interface
1321  *****************************************************************************
1322  *****************************************************************************/
1323 
1324 /*
1325  * L2CAP sockets data input routine
1326  */
1327 
1328 static void
1329 ng_btsocket_l2cap_data_input(struct mbuf *m, hook_p hook)
1330 {
1331 	ng_l2cap_hdr_t			*hdr = NULL;
1332 	ng_l2cap_clt_hdr_t		*clt_hdr = NULL;
1333 	ng_btsocket_l2cap_pcb_t		*pcb = NULL;
1334 	ng_btsocket_l2cap_rtentry_t	*rt = NULL;
1335 
1336 	if (hook == NULL) {
1337 		NG_BTSOCKET_L2CAP_ALERT(
1338 "%s: Invalid source hook for L2CAP data packet\n", __func__);
1339 		goto drop;
1340 	}
1341 
1342 	rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1343 	if (rt == NULL) {
1344 		NG_BTSOCKET_L2CAP_ALERT(
1345 "%s: Could not find out source bdaddr for L2CAP data packet\n", __func__);
1346 		goto drop;
1347 	}
1348 
1349 	/* Make sure we can access header */
1350 	if (m->m_pkthdr.len < sizeof(*hdr)) {
1351 		NG_BTSOCKET_L2CAP_ERR(
1352 "%s: L2CAP data packet too small, len=%d\n", __func__, m->m_pkthdr.len);
1353 		goto drop;
1354 	}
1355 
1356 	if (m->m_len < sizeof(*hdr)) {
1357 		m = m_pullup(m, sizeof(*hdr));
1358 		if (m == NULL)
1359 			goto drop;
1360 	}
1361 
1362 	/* Strip L2CAP packet header and verify packet length */
1363 	hdr = mtod(m, ng_l2cap_hdr_t *);
1364 	m_adj(m, sizeof(*hdr));
1365 
1366 	if (hdr->length != m->m_pkthdr.len) {
1367 		NG_BTSOCKET_L2CAP_ERR(
1368 "%s: Bad L2CAP data packet length, len=%d, length=%d\n",
1369 			__func__, m->m_pkthdr.len, hdr->length);
1370 		goto drop;
1371 	}
1372 
1373 	/*
1374 	 * Now process packet. Two cases:
1375 	 *
1376 	 * 1) Normal packet (cid != 2) then find connected socket and append
1377 	 *    mbuf to the socket queue. Wakeup socket.
1378 	 *
1379 	 * 2) Broadcast packet (cid == 2) then find all sockets that connected
1380 	 *    to the given PSM and have SO_BROADCAST bit set and append mbuf
1381 	 *    to the socket queue. Wakeup socket.
1382 	 */
1383 
1384 	NG_BTSOCKET_L2CAP_INFO(
1385 "%s: Received L2CAP data packet: src bdaddr=%x:%x:%x:%x:%x:%x, " \
1386 "dcid=%d, length=%d\n",
1387 		__func__,
1388 		rt->src.b[5], rt->src.b[4], rt->src.b[3],
1389 		rt->src.b[2], rt->src.b[1], rt->src.b[0],
1390 		hdr->dcid, hdr->length);
1391 
1392 	if (hdr->dcid >= NG_L2CAP_FIRST_CID) {
1393 
1394 		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1395 
1396 		/* Normal packet: find connected socket */
1397 		pcb = ng_btsocket_l2cap_pcb_by_cid(&rt->src, hdr->dcid);
1398 		if (pcb == NULL) {
1399 			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1400 			goto drop;
1401 		}
1402 
1403 		mtx_lock(&pcb->pcb_mtx);
1404 
1405 		if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
1406 			NG_BTSOCKET_L2CAP_ERR(
1407 "%s: No connected socket found, src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, " \
1408 "state=%d\n",			__func__,
1409 				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1410 				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1411 				hdr->dcid, pcb->state);
1412 
1413 			mtx_unlock(&pcb->pcb_mtx);
1414 			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1415 			goto drop;
1416 		}
1417 
1418 		/* Check packet size against socket's incoming MTU */
1419 		if (hdr->length > pcb->imtu) {
1420 			NG_BTSOCKET_L2CAP_ERR(
1421 "%s: L2CAP data packet too big, src bdaddr=%x:%x:%x:%x:%x:%x, " \
1422 "dcid=%d, length=%d, imtu=%d\n",
1423 				__func__,
1424 				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1425 				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1426 				hdr->dcid, hdr->length, pcb->imtu);
1427 
1428 			mtx_unlock(&pcb->pcb_mtx);
1429 			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1430 			goto drop;
1431 		}
1432 
1433 		/* Check if we have enough space in socket receive queue */
1434 		if (m->m_pkthdr.len > sbspace(&pcb->so->so_rcv)) {
1435 
1436 			/*
1437 			 * This is really bad. Receive queue on socket does
1438 			 * not have enough space for the packet. We do not
1439 			 * have any other choice but drop the packet. L2CAP
1440 			 * does not provide any flow control.
1441 			 */
1442 
1443 			NG_BTSOCKET_L2CAP_ERR(
1444 "%s: Not enough space in socket receive queue. Dropping L2CAP data packet, " \
1445 "src bdaddr=%x:%x:%x:%x:%x:%x, dcid=%d, len=%d, space=%ld\n",
1446 				__func__,
1447 				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1448 				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1449 				hdr->dcid, m->m_pkthdr.len,
1450 				sbspace(&pcb->so->so_rcv));
1451 
1452 			mtx_unlock(&pcb->pcb_mtx);
1453 			mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1454 			goto drop;
1455 		}
1456 
1457 		/* Append packet to the socket receive queue and wakeup */
1458 		sbappendrecord(&pcb->so->so_rcv, m);
1459 		m = NULL;
1460 
1461 		sorwakeup(pcb->so);
1462 
1463 		mtx_unlock(&pcb->pcb_mtx);
1464 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1465 	} else if (hdr->dcid == NG_L2CAP_CLT_CID) {
1466 		/* Broadcast packet: give packet to all sockets  */
1467 
1468 		/* Check packet size against connectionless MTU */
1469 		if (hdr->length > NG_L2CAP_MTU_DEFAULT) {
1470 			NG_BTSOCKET_L2CAP_ERR(
1471 "%s: Connectionless L2CAP data packet too big, " \
1472 "src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1473 				__func__,
1474 				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1475 				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1476 				hdr->length);
1477 			goto drop;
1478 		}
1479 
1480 		/* Make sure we can access connectionless header */
1481 		if (m->m_pkthdr.len < sizeof(*clt_hdr)) {
1482 			NG_BTSOCKET_L2CAP_ERR(
1483 "%s: Can not get L2CAP connectionless packet header, " \
1484 "src bdaddr=%x:%x:%x:%x:%x:%x, length=%d\n",
1485 				__func__,
1486 				rt->src.b[5], rt->src.b[4], rt->src.b[3],
1487 				rt->src.b[2], rt->src.b[1], rt->src.b[0],
1488 				hdr->length);
1489 			goto drop;
1490 		}
1491 
1492 		if (m->m_len < sizeof(*clt_hdr)) {
1493 			m = m_pullup(m, sizeof(*clt_hdr));
1494 			if (m == NULL)
1495 				goto drop;
1496 		}
1497 
1498 		/* Strip connectionless header and deliver packet */
1499 		clt_hdr = mtod(m, ng_l2cap_clt_hdr_t *);
1500 		m_adj(m, sizeof(*clt_hdr));
1501 
1502 		NG_BTSOCKET_L2CAP_INFO(
1503 "%s: Got L2CAP connectionless data packet, " \
1504 "src bdaddr=%x:%x:%x:%x:%x:%x, psm=%d, length=%d\n",
1505 			__func__,
1506 			rt->src.b[5], rt->src.b[4], rt->src.b[3],
1507 			rt->src.b[2], rt->src.b[1], rt->src.b[0],
1508 			clt_hdr->psm, hdr->length);
1509 
1510 		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1511 
1512 		LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next) {
1513 			struct mbuf	*copy = NULL;
1514 
1515 			mtx_lock(&pcb->pcb_mtx);
1516 
1517 			if (bcmp(&rt->src, &pcb->src, sizeof(pcb->src)) != 0 ||
1518 			    pcb->psm != clt_hdr->psm ||
1519 			    pcb->state != NG_BTSOCKET_L2CAP_OPEN ||
1520 			    (pcb->so->so_options & SO_BROADCAST) == 0 ||
1521 			    m->m_pkthdr.len > sbspace(&pcb->so->so_rcv))
1522 				goto next;
1523 
1524 			/*
1525 			 * Create a copy of the packet and append it to the
1526 			 * socket's queue. If m_dup() failed - no big deal
1527 			 * it is a broadcast traffic after all
1528 			 */
1529 
1530 			copy = m_dup(m, M_DONTWAIT);
1531 			if (copy != NULL) {
1532 				sbappendrecord(&pcb->so->so_rcv, copy);
1533 				sorwakeup(pcb->so);
1534 			}
1535 next:
1536 			mtx_unlock(&pcb->pcb_mtx);
1537 		}
1538 
1539 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1540 	}
1541 drop:
1542 	NG_FREE_M(m); /* checks for m != NULL */
1543 } /* ng_btsocket_l2cap_data_input */
1544 
1545 /*
1546  * L2CAP sockets default message input routine
1547  */
1548 
1549 static void
1550 ng_btsocket_l2cap_default_msg_input(struct ng_mesg *msg, hook_p hook)
1551 {
1552 	switch (msg->header.cmd) {
1553 	case NGM_L2CAP_NODE_HOOK_INFO: {
1554 		ng_btsocket_l2cap_rtentry_t	*rt = NULL;
1555 
1556 		if (hook == NULL || msg->header.arglen != sizeof(bdaddr_t))
1557 			break;
1558 
1559 		if (bcmp(msg->data, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
1560 			break;
1561 
1562 		mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1563 
1564 		rt = (ng_btsocket_l2cap_rtentry_t *) NG_HOOK_PRIVATE(hook);
1565 		if (rt == NULL) {
1566 			rt = malloc(sizeof(*rt),
1567 				M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT|M_ZERO);
1568 			if (rt == NULL) {
1569 				mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1570 				break;
1571 			}
1572 
1573 			LIST_INSERT_HEAD(&ng_btsocket_l2cap_rt, rt, next);
1574 
1575 			NG_HOOK_SET_PRIVATE(hook, rt);
1576 		}
1577 
1578 		bcopy(msg->data, &rt->src, sizeof(rt->src));
1579 		rt->hook = hook;
1580 
1581 		mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1582 
1583 		NG_BTSOCKET_L2CAP_INFO(
1584 "%s: Updating hook \"%s\", src bdaddr=%x:%x:%x:%x:%x:%x\n",
1585 			__func__, NG_HOOK_NAME(hook),
1586 			rt->src.b[5], rt->src.b[4], rt->src.b[3],
1587 			rt->src.b[2], rt->src.b[1], rt->src.b[0]);
1588 		} break;
1589 
1590 	default:
1591 		NG_BTSOCKET_L2CAP_WARN(
1592 "%s: Unknown message, cmd=%d\n", __func__, msg->header.cmd);
1593 		break;
1594 	}
1595 
1596 	NG_FREE_MSG(msg); /* Checks for msg != NULL */
1597 } /* ng_btsocket_l2cap_default_msg_input */
1598 
1599 /*
1600  * L2CAP sockets L2CA message input routine
1601  */
1602 
1603 static void
1604 ng_btsocket_l2cap_l2ca_msg_input(struct ng_mesg *msg, hook_p hook)
1605 {
1606 	ng_btsocket_l2cap_rtentry_p	rt = NULL;
1607 
1608 	if (hook == NULL) {
1609 		NG_BTSOCKET_L2CAP_ALERT(
1610 "%s: Invalid source hook for L2CA message\n", __func__);
1611 		goto drop;
1612 	}
1613 
1614 	rt = (ng_btsocket_l2cap_rtentry_p) NG_HOOK_PRIVATE(hook);
1615 	if (rt == NULL) {
1616 		NG_BTSOCKET_L2CAP_ALERT(
1617 "%s: Could not find out source bdaddr for L2CA message\n", __func__);
1618 		goto drop;
1619 	}
1620 
1621 	switch (msg->header.cmd) {
1622 	case NGM_L2CAP_L2CA_CON: /* L2CA_Connect response */
1623 		ng_btsocket_l2cap_process_l2ca_con_req_rsp(msg, rt);
1624 		break;
1625 
1626 	case NGM_L2CAP_L2CA_CON_RSP: /* L2CA_ConnectRsp response */
1627 		ng_btsocket_l2cap_process_l2ca_con_rsp_rsp(msg, rt);
1628 		break;
1629 
1630 	case NGM_L2CAP_L2CA_CON_IND: /* L2CA_Connect indicator */
1631 		ng_btsocket_l2cap_process_l2ca_con_ind(msg, rt);
1632 		break;
1633 
1634 	case NGM_L2CAP_L2CA_CFG: /* L2CA_Config response */
1635 		ng_btsocket_l2cap_process_l2ca_cfg_req_rsp(msg, rt);
1636 		break;
1637 
1638 	case NGM_L2CAP_L2CA_CFG_RSP: /* L2CA_ConfigRsp response */
1639 		ng_btsocket_l2cap_process_l2ca_cfg_rsp_rsp(msg, rt);
1640 		break;
1641 
1642 	case NGM_L2CAP_L2CA_CFG_IND: /* L2CA_Config indicator */
1643 		ng_btsocket_l2cap_process_l2ca_cfg_ind(msg, rt);
1644 		break;
1645 
1646 	case NGM_L2CAP_L2CA_DISCON: /* L2CA_Disconnect response */
1647 		ng_btsocket_l2cap_process_l2ca_discon_rsp(msg, rt);
1648 		break;
1649 
1650 	case NGM_L2CAP_L2CA_DISCON_IND: /* L2CA_Disconnect indicator */
1651 		ng_btsocket_l2cap_process_l2ca_discon_ind(msg, rt);
1652 		break;
1653 
1654 	case NGM_L2CAP_L2CA_WRITE: /* L2CA_Write response */
1655 		ng_btsocket_l2cap_process_l2ca_write_rsp(msg, rt);
1656 		break;
1657 
1658 	/* XXX FIXME add other L2CA messages */
1659 
1660 	default:
1661 		NG_BTSOCKET_L2CAP_WARN(
1662 "%s: Unknown L2CA message, cmd=%d\n", __func__, msg->header.cmd);
1663 		break;
1664 	}
1665 drop:
1666 	NG_FREE_MSG(msg);
1667 } /* ng_btsocket_l2cap_l2ca_msg_input */
1668 
1669 /*
1670  * L2CAP sockets input routine
1671  */
1672 
1673 static void
1674 ng_btsocket_l2cap_input(void *context, int pending)
1675 {
1676 	item_p	item = NULL;
1677 	hook_p	hook = NULL;
1678 
1679 	for (;;) {
1680 		mtx_lock(&ng_btsocket_l2cap_queue_mtx);
1681 		NG_BT_ITEMQ_DEQUEUE(&ng_btsocket_l2cap_queue, item);
1682 		mtx_unlock(&ng_btsocket_l2cap_queue_mtx);
1683 
1684 		if (item == NULL)
1685 			break;
1686 
1687 		NGI_GET_HOOK(item, hook);
1688 		if (hook != NULL && NG_HOOK_NOT_VALID(hook))
1689 			goto drop;
1690 
1691 		switch(item->el_flags & NGQF_TYPE) {
1692 		case NGQF_DATA: {
1693 			struct mbuf     *m = NULL;
1694 
1695 			NGI_GET_M(item, m);
1696 			ng_btsocket_l2cap_data_input(m, hook);
1697 			} break;
1698 
1699 		case NGQF_MESG: {
1700 			struct ng_mesg  *msg = NULL;
1701 
1702 			NGI_GET_MSG(item, msg);
1703 
1704 			switch (msg->header.cmd) {
1705 			case NGM_L2CAP_L2CA_CON:
1706 			case NGM_L2CAP_L2CA_CON_RSP:
1707 			case NGM_L2CAP_L2CA_CON_IND:
1708 			case NGM_L2CAP_L2CA_CFG:
1709 			case NGM_L2CAP_L2CA_CFG_RSP:
1710 			case NGM_L2CAP_L2CA_CFG_IND:
1711 			case NGM_L2CAP_L2CA_DISCON:
1712 			case NGM_L2CAP_L2CA_DISCON_IND:
1713 			case NGM_L2CAP_L2CA_WRITE:
1714 			/* XXX FIXME add other L2CA messages */
1715 				ng_btsocket_l2cap_l2ca_msg_input(msg, hook);
1716 				break;
1717 
1718 			default:
1719 				ng_btsocket_l2cap_default_msg_input(msg, hook);
1720 				break;
1721 			}
1722 			} break;
1723 
1724 		default:
1725 			KASSERT(0,
1726 ("%s: invalid item type=%ld\n", __func__, (item->el_flags & NGQF_TYPE)));
1727 			break;
1728 		}
1729 drop:
1730 		if (hook != NULL)
1731 			NG_HOOK_UNREF(hook);
1732 
1733 		NG_FREE_ITEM(item);
1734 	}
1735 } /* ng_btsocket_l2cap_input */
1736 
1737 /*
1738  * Route cleanup task. Gets scheduled when hook is disconnected. Here we
1739  * will find all sockets that use "invalid" hook and disconnect them.
1740  */
1741 
1742 static void
1743 ng_btsocket_l2cap_rtclean(void *context, int pending)
1744 {
1745 	ng_btsocket_l2cap_pcb_p		pcb = NULL, pcb_next = NULL;
1746 	ng_btsocket_l2cap_rtentry_p	rt = NULL;
1747 
1748 	mtx_lock(&ng_btsocket_l2cap_rt_mtx);
1749 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1750 
1751 	/*
1752 	 * First disconnect all sockets that use "invalid" hook
1753 	 */
1754 
1755 	for (pcb = LIST_FIRST(&ng_btsocket_l2cap_sockets); pcb != NULL; ) {
1756 		mtx_lock(&pcb->pcb_mtx);
1757 		pcb_next = LIST_NEXT(pcb, next);
1758 
1759 		if (pcb->rt != NULL &&
1760 		    pcb->rt->hook != NULL && NG_HOOK_NOT_VALID(pcb->rt->hook)) {
1761 			if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
1762 				ng_btsocket_l2cap_untimeout(pcb);
1763 
1764 			pcb->so->so_error = ENETDOWN;
1765 			pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1766 			soisdisconnected(pcb->so);
1767 
1768 			pcb->token = 0;
1769 			pcb->cid = 0;
1770 			pcb->rt = NULL;
1771 		}
1772 
1773 		mtx_unlock(&pcb->pcb_mtx);
1774 		pcb = pcb_next;
1775 	}
1776 
1777 	/*
1778 	 * Now cleanup routing table
1779 	 */
1780 
1781 	for (rt = LIST_FIRST(&ng_btsocket_l2cap_rt); rt != NULL; ) {
1782 		ng_btsocket_l2cap_rtentry_p	rt_next = LIST_NEXT(rt, next);
1783 
1784 		if (rt->hook != NULL && NG_HOOK_NOT_VALID(rt->hook)) {
1785 			LIST_REMOVE(rt, next);
1786 
1787 			NG_HOOK_SET_PRIVATE(rt->hook, NULL);
1788 			NG_HOOK_UNREF(rt->hook); /* Remove extra reference */
1789 
1790 			bzero(rt, sizeof(*rt));
1791 			free(rt, M_NETGRAPH_BTSOCKET_L2CAP);
1792 		}
1793 
1794 		rt = rt_next;
1795 	}
1796 
1797 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
1798 	mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
1799 } /* ng_btsocket_l2cap_rtclean */
1800 
1801 /*
1802  * Initialize everything
1803  */
1804 
1805 void
1806 ng_btsocket_l2cap_init(void)
1807 {
1808 	int	error = 0;
1809 
1810 	ng_btsocket_l2cap_node = NULL;
1811 	ng_btsocket_l2cap_debug_level = NG_BTSOCKET_WARN_LEVEL;
1812 
1813 	/* Register Netgraph node type */
1814 	error = ng_newtype(&typestruct);
1815 	if (error != 0) {
1816 		NG_BTSOCKET_L2CAP_ALERT(
1817 "%s: Could not register Netgraph node type, error=%d\n", __func__, error);
1818 
1819                 return;
1820 	}
1821 
1822 	/* Create Netgrapg node */
1823 	error = ng_make_node_common(&typestruct, &ng_btsocket_l2cap_node);
1824 	if (error != 0) {
1825 		NG_BTSOCKET_L2CAP_ALERT(
1826 "%s: Could not create Netgraph node, error=%d\n", __func__, error);
1827 
1828 		ng_btsocket_l2cap_node = NULL;
1829 
1830 		return;
1831 	}
1832 
1833 	error = ng_name_node(ng_btsocket_l2cap_node,
1834 				NG_BTSOCKET_L2CAP_NODE_TYPE);
1835 	if (error != 0) {
1836 		NG_BTSOCKET_L2CAP_ALERT(
1837 "%s: Could not name Netgraph node, error=%d\n", __func__, error);
1838 
1839 		NG_NODE_UNREF(ng_btsocket_l2cap_node);
1840 		ng_btsocket_l2cap_node = NULL;
1841 
1842 		return;
1843 	}
1844 
1845 	/* Create input queue */
1846 	NG_BT_ITEMQ_INIT(&ng_btsocket_l2cap_queue, ifqmaxlen);
1847 	mtx_init(&ng_btsocket_l2cap_queue_mtx,
1848 		"btsocks_l2cap_queue_mtx", NULL, MTX_DEF);
1849 	TASK_INIT(&ng_btsocket_l2cap_queue_task, 0,
1850 		ng_btsocket_l2cap_input, NULL);
1851 
1852 	/* Create list of sockets */
1853 	LIST_INIT(&ng_btsocket_l2cap_sockets);
1854 	mtx_init(&ng_btsocket_l2cap_sockets_mtx,
1855 		"btsocks_l2cap_sockets_mtx", NULL, MTX_DEF);
1856 
1857 	/* Routing table */
1858 	LIST_INIT(&ng_btsocket_l2cap_rt);
1859 	mtx_init(&ng_btsocket_l2cap_rt_mtx,
1860 		"btsocks_l2cap_rt_mtx", NULL, MTX_DEF);
1861 	TASK_INIT(&ng_btsocket_l2cap_rt_task, 0,
1862 		ng_btsocket_l2cap_rtclean, NULL);
1863 } /* ng_btsocket_l2cap_init */
1864 
1865 /*
1866  * Abort connection on socket
1867  */
1868 
1869 void
1870 ng_btsocket_l2cap_abort(struct socket *so)
1871 {
1872 	so->so_error = ECONNABORTED;
1873 
1874 	(void)ng_btsocket_l2cap_disconnect(so);
1875 } /* ng_btsocket_l2cap_abort */
1876 
1877 void
1878 ng_btsocket_l2cap_close(struct socket *so)
1879 {
1880 
1881 	(void)ng_btsocket_l2cap_disconnect(so);
1882 } /* ng_btsocket_l2cap_close */
1883 
1884 /*
1885  * Accept connection on socket. Nothing to do here, socket must be connected
1886  * and ready, so just return peer address and be done with it.
1887  */
1888 
1889 int
1890 ng_btsocket_l2cap_accept(struct socket *so, struct sockaddr **nam)
1891 {
1892 	if (ng_btsocket_l2cap_node == NULL)
1893 		return (EINVAL);
1894 
1895 	return (ng_btsocket_l2cap_peeraddr(so, nam));
1896 } /* ng_btsocket_l2cap_accept */
1897 
1898 /*
1899  * Create and attach new socket
1900  */
1901 
1902 int
1903 ng_btsocket_l2cap_attach(struct socket *so, int proto, struct thread *td)
1904 {
1905 	static u_int32_t	token = 0;
1906 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
1907 	int			error;
1908 
1909 	/* Check socket and protocol */
1910 	if (ng_btsocket_l2cap_node == NULL)
1911 		return (EPROTONOSUPPORT);
1912 	if (so->so_type != SOCK_SEQPACKET)
1913 		return (ESOCKTNOSUPPORT);
1914 
1915 #if 0 /* XXX sonewconn() calls "pru_attach" with proto == 0 */
1916 	if (proto != 0)
1917 		if (proto != BLUETOOTH_PROTO_L2CAP)
1918 			return (EPROTONOSUPPORT);
1919 #endif /* XXX */
1920 
1921 	if (pcb != NULL)
1922 		return (EISCONN);
1923 
1924 	/* Reserve send and receive space if it is not reserved yet */
1925 	if ((so->so_snd.sb_hiwat == 0) || (so->so_rcv.sb_hiwat == 0)) {
1926 		error = soreserve(so, NG_BTSOCKET_L2CAP_SENDSPACE,
1927 					NG_BTSOCKET_L2CAP_RECVSPACE);
1928 		if (error != 0)
1929 			return (error);
1930 	}
1931 
1932 	/* Allocate the PCB */
1933         pcb = malloc(sizeof(*pcb),
1934 		M_NETGRAPH_BTSOCKET_L2CAP, M_NOWAIT | M_ZERO);
1935         if (pcb == NULL)
1936                 return (ENOMEM);
1937 
1938 	/* Link the PCB and the socket */
1939 	so->so_pcb = (caddr_t) pcb;
1940 	pcb->so = so;
1941 	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
1942 
1943 	/* Initialize PCB */
1944 	pcb->imtu = pcb->omtu = NG_L2CAP_MTU_DEFAULT;
1945 
1946 	/* Default flow */
1947 	pcb->iflow.flags = 0x0;
1948 	pcb->iflow.service_type = NG_HCI_SERVICE_TYPE_BEST_EFFORT;
1949 	pcb->iflow.token_rate = 0xffffffff; /* maximum */
1950 	pcb->iflow.token_bucket_size = 0xffffffff; /* maximum */
1951 	pcb->iflow.peak_bandwidth = 0x00000000; /* maximum */
1952 	pcb->iflow.latency = 0xffffffff; /* don't care */
1953 	pcb->iflow.delay_variation = 0xffffffff; /* don't care */
1954 
1955 	bcopy(&pcb->iflow, &pcb->oflow, sizeof(pcb->oflow));
1956 
1957 	pcb->flush_timo = NG_L2CAP_FLUSH_TIMO_DEFAULT;
1958 	pcb->link_timo = NG_L2CAP_LINK_TIMO_DEFAULT;
1959 
1960 	callout_handle_init(&pcb->timo);
1961 
1962 	/*
1963 	 * XXX Mark PCB mutex as DUPOK to prevent "duplicated lock of
1964 	 * the same type" message. When accepting new L2CAP connection
1965 	 * ng_btsocket_l2cap_process_l2ca_con_ind() holds both PCB mutexes
1966 	 * for "old" (accepting) PCB and "new" (created) PCB.
1967 	 */
1968 
1969 	mtx_init(&pcb->pcb_mtx, "btsocks_l2cap_pcb_mtx", NULL,
1970 		MTX_DEF|MTX_DUPOK);
1971 
1972         /*
1973 	 * Add the PCB to the list
1974 	 *
1975 	 * XXX FIXME VERY IMPORTANT!
1976 	 *
1977 	 * This is totally FUBAR. We could get here in two cases:
1978 	 *
1979 	 * 1) When user calls socket()
1980 	 * 2) When we need to accept new incomming connection and call
1981 	 *    sonewconn()
1982 	 *
1983 	 * In the first case we must acquire ng_btsocket_l2cap_sockets_mtx.
1984 	 * In the second case we hold ng_btsocket_l2cap_sockets_mtx already.
1985 	 * So we now need to distinguish between these cases. From reading
1986 	 * /sys/kern/uipc_socket.c we can find out that sonewconn() calls
1987 	 * pru_attach with proto == 0 and td == NULL. For now use this fact
1988 	 * to figure out if we were called from socket() or from sonewconn().
1989 	 */
1990 
1991 	if (td != NULL)
1992 		mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
1993 	else
1994 		mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
1995 
1996 	/* Set PCB token. Use ng_btsocket_l2cap_sockets_mtx for protection */
1997 	if (++ token == 0)
1998 		token ++;
1999 
2000 	pcb->token = token;
2001 
2002 	LIST_INSERT_HEAD(&ng_btsocket_l2cap_sockets, pcb, next);
2003 
2004 	if (td != NULL)
2005 		mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2006 
2007         return (0);
2008 } /* ng_btsocket_l2cap_attach */
2009 
2010 /*
2011  * Bind socket
2012  */
2013 
2014 int
2015 ng_btsocket_l2cap_bind(struct socket *so, struct sockaddr *nam,
2016 		struct thread *td)
2017 {
2018 	ng_btsocket_l2cap_pcb_t	*pcb = NULL;
2019 	struct sockaddr_l2cap	*sa = (struct sockaddr_l2cap *) nam;
2020 	int			 psm, error = 0;
2021 
2022 	if (ng_btsocket_l2cap_node == NULL)
2023 		return (EINVAL);
2024 
2025 	/* Verify address */
2026 	if (sa == NULL)
2027 		return (EINVAL);
2028 	if (sa->l2cap_family != AF_BLUETOOTH)
2029 		return (EAFNOSUPPORT);
2030 	if (sa->l2cap_len != sizeof(*sa))
2031 		return (EINVAL);
2032 
2033 	psm = le16toh(sa->l2cap_psm);
2034 
2035 	/*
2036 	 * Check if other socket has this address already (look for exact
2037 	 * match PSM and bdaddr) and assign socket address if it's available.
2038 	 *
2039 	 * Note: socket can be bound to ANY PSM (zero) thus allowing several
2040 	 * channels with the same PSM between the same pair of BD_ADDR'es.
2041 	 */
2042 
2043 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2044 
2045 	LIST_FOREACH(pcb, &ng_btsocket_l2cap_sockets, next)
2046 		if (psm != 0 && psm == pcb->psm &&
2047 		    bcmp(&pcb->src, &sa->l2cap_bdaddr, sizeof(bdaddr_t)) == 0)
2048 			break;
2049 
2050 	if (pcb == NULL) {
2051 		/* Set socket address */
2052 		pcb = so2l2cap_pcb(so);
2053 		if (pcb != NULL) {
2054 			bcopy(&sa->l2cap_bdaddr, &pcb->src, sizeof(pcb->src));
2055 			pcb->psm = psm;
2056 		} else
2057 			error = EINVAL;
2058 	} else
2059 		error = EADDRINUSE;
2060 
2061 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2062 
2063 	return (error);
2064 } /* ng_btsocket_l2cap_bind */
2065 
2066 /*
2067  * Connect socket
2068  */
2069 
2070 int
2071 ng_btsocket_l2cap_connect(struct socket *so, struct sockaddr *nam,
2072 		struct thread *td)
2073 {
2074 	ng_btsocket_l2cap_pcb_t		*pcb = so2l2cap_pcb(so);
2075 	struct sockaddr_l2cap		*sa = (struct sockaddr_l2cap *) nam;
2076 	ng_btsocket_l2cap_rtentry_t	*rt = NULL;
2077 	int				 have_src, error = 0;
2078 
2079 	/* Check socket */
2080 	if (pcb == NULL)
2081 		return (EINVAL);
2082 	if (ng_btsocket_l2cap_node == NULL)
2083 		return (EINVAL);
2084 	if (pcb->state == NG_BTSOCKET_L2CAP_CONNECTING)
2085 		return (EINPROGRESS);
2086 
2087 	/* Verify address */
2088 	if (sa == NULL)
2089 		return (EINVAL);
2090 	if (sa->l2cap_family != AF_BLUETOOTH)
2091 		return (EAFNOSUPPORT);
2092 	if (sa->l2cap_len != sizeof(*sa))
2093 		return (EINVAL);
2094 	if (sa->l2cap_psm == 0 ||
2095 	    bcmp(&sa->l2cap_bdaddr, NG_HCI_BDADDR_ANY, sizeof(bdaddr_t)) == 0)
2096 		return (EDESTADDRREQ);
2097 	if (pcb->psm != 0 && pcb->psm != le16toh(sa->l2cap_psm))
2098 		return (EINVAL);
2099 
2100 	/*
2101 	 * Routing. Socket should be bound to some source address. The source
2102 	 * address can be ANY. Destination address must be set and it must not
2103 	 * be ANY. If source address is ANY then find first rtentry that has
2104 	 * src != dst.
2105 	 */
2106 
2107 	mtx_lock(&ng_btsocket_l2cap_rt_mtx);
2108 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2109 	mtx_lock(&pcb->pcb_mtx);
2110 
2111 	/* Send destination address and PSM */
2112 	bcopy(&sa->l2cap_bdaddr, &pcb->dst, sizeof(pcb->dst));
2113 	pcb->psm = le16toh(sa->l2cap_psm);
2114 
2115 	pcb->rt = NULL;
2116 	have_src = bcmp(&pcb->src, NG_HCI_BDADDR_ANY, sizeof(pcb->src));
2117 
2118 	LIST_FOREACH(rt, &ng_btsocket_l2cap_rt, next) {
2119 		if (rt->hook == NULL || NG_HOOK_NOT_VALID(rt->hook))
2120 			continue;
2121 
2122 		/* Match src and dst */
2123 		if (have_src) {
2124 			if (bcmp(&pcb->src, &rt->src, sizeof(rt->src)) == 0)
2125 				break;
2126 		} else {
2127 			if (bcmp(&pcb->dst, &rt->src, sizeof(rt->src)) != 0)
2128 				break;
2129 		}
2130 	}
2131 
2132 	if (rt != NULL) {
2133 		pcb->rt = rt;
2134 
2135 		if (!have_src)
2136 			bcopy(&rt->src, &pcb->src, sizeof(pcb->src));
2137 	} else
2138 		error = EHOSTUNREACH;
2139 
2140 	/*
2141 	 * Send L2CA_Connect request
2142 	 */
2143 
2144 	if (error == 0) {
2145 		error = ng_btsocket_l2cap_send_l2ca_con_req(pcb);
2146 		if (error == 0) {
2147 			pcb->flags |= NG_BTSOCKET_L2CAP_CLIENT;
2148 			pcb->state = NG_BTSOCKET_L2CAP_CONNECTING;
2149 			soisconnecting(pcb->so);
2150 
2151 			ng_btsocket_l2cap_timeout(pcb);
2152 		}
2153 	}
2154 
2155 	mtx_unlock(&pcb->pcb_mtx);
2156 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2157 	mtx_unlock(&ng_btsocket_l2cap_rt_mtx);
2158 
2159 	return (error);
2160 } /* ng_btsocket_l2cap_connect */
2161 
2162 /*
2163  * Process ioctl's calls on socket
2164  */
2165 
2166 int
2167 ng_btsocket_l2cap_control(struct socket *so, u_long cmd, caddr_t data,
2168 		struct ifnet *ifp, struct thread *td)
2169 {
2170 	return (EINVAL);
2171 } /* ng_btsocket_l2cap_control */
2172 
2173 /*
2174  * Process getsockopt/setsockopt system calls
2175  */
2176 
2177 int
2178 ng_btsocket_l2cap_ctloutput(struct socket *so, struct sockopt *sopt)
2179 {
2180 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2181 	int			error = 0;
2182 	ng_l2cap_cfg_opt_val_t	v;
2183 
2184 	if (pcb == NULL)
2185 		return (EINVAL);
2186 	if (ng_btsocket_l2cap_node == NULL)
2187 		return (EINVAL);
2188 
2189 	if (sopt->sopt_level != SOL_L2CAP)
2190 		return (0);
2191 
2192 	mtx_lock(&pcb->pcb_mtx);
2193 
2194 	switch (sopt->sopt_dir) {
2195 	case SOPT_GET:
2196 		switch (sopt->sopt_name) {
2197 		case SO_L2CAP_IMTU: /* get incoming MTU */
2198 			error = sooptcopyout(sopt, &pcb->imtu,
2199 						sizeof(pcb->imtu));
2200 			break;
2201 
2202 		case SO_L2CAP_OMTU: /* get outgoing (peer incoming) MTU */
2203 			error = sooptcopyout(sopt, &pcb->omtu,
2204 						sizeof(pcb->omtu));
2205 			break;
2206 
2207 		case SO_L2CAP_IFLOW: /* get incoming flow spec. */
2208 			error = sooptcopyout(sopt, &pcb->iflow,
2209 						sizeof(pcb->iflow));
2210 			break;
2211 
2212 		case SO_L2CAP_OFLOW: /* get outgoing flow spec. */
2213 			error = sooptcopyout(sopt, &pcb->oflow,
2214 						sizeof(pcb->oflow));
2215 			break;
2216 
2217 		case SO_L2CAP_FLUSH: /* get flush timeout */
2218 			error = sooptcopyout(sopt, &pcb->flush_timo,
2219 						sizeof(pcb->flush_timo));
2220 			break;
2221 
2222 		default:
2223 			error = ENOPROTOOPT;
2224 			break;
2225 		}
2226 		break;
2227 
2228 	case SOPT_SET:
2229 		/*
2230 		 * XXX
2231 		 * We do not allow to change these parameters while socket is
2232 		 * connected or we are in the process of creating a connection.
2233 		 * May be this should indicate re-configuration of the open
2234 		 * channel?
2235 		 */
2236 
2237 		if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2238 			error = EACCES;
2239 			break;
2240 		}
2241 
2242 		switch (sopt->sopt_name) {
2243 		case SO_L2CAP_IMTU: /* set incoming MTU */
2244 			error = sooptcopyin(sopt, &v, sizeof(v), sizeof(v.mtu));
2245 			if (error == 0)
2246 				pcb->imtu = v.mtu;
2247 			break;
2248 
2249 		case SO_L2CAP_OFLOW: /* set outgoing flow spec. */
2250 			error = sooptcopyin(sopt, &v, sizeof(v),sizeof(v.flow));
2251 			if (error == 0)
2252 				bcopy(&v.flow, &pcb->oflow, sizeof(pcb->oflow));
2253 			break;
2254 
2255 		case SO_L2CAP_FLUSH: /* set flush timeout */
2256 			error = sooptcopyin(sopt, &v, sizeof(v),
2257 						sizeof(v.flush_timo));
2258 			if (error == 0)
2259 				pcb->flush_timo = v.flush_timo;
2260 			break;
2261 
2262 		default:
2263 			error = ENOPROTOOPT;
2264 			break;
2265 		}
2266 		break;
2267 
2268 	default:
2269 		error = EINVAL;
2270 		break;
2271 	}
2272 
2273 	mtx_unlock(&pcb->pcb_mtx);
2274 
2275 	return (error);
2276 } /* ng_btsocket_l2cap_ctloutput */
2277 
2278 /*
2279  * Detach and destroy socket
2280  */
2281 
2282 void
2283 ng_btsocket_l2cap_detach(struct socket *so)
2284 {
2285 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2286 
2287 	KASSERT(pcb != NULL, ("ng_btsocket_l2cap_detach: pcb == NULL"));
2288 
2289 	if (ng_btsocket_l2cap_node == NULL)
2290 		return;
2291 
2292 	mtx_lock(&ng_btsocket_l2cap_sockets_mtx);
2293 	mtx_lock(&pcb->pcb_mtx);
2294 
2295 	/* XXX what to do with pending request? */
2296 	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2297 		ng_btsocket_l2cap_untimeout(pcb);
2298 
2299 	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED &&
2300 	    pcb->state != NG_BTSOCKET_L2CAP_DISCONNECTING)
2301 		/* Send disconnect request with "zero" token */
2302 		ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2303 
2304 	pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2305 
2306 	LIST_REMOVE(pcb, next);
2307 
2308 	mtx_unlock(&pcb->pcb_mtx);
2309 	mtx_unlock(&ng_btsocket_l2cap_sockets_mtx);
2310 
2311 	mtx_destroy(&pcb->pcb_mtx);
2312 	bzero(pcb, sizeof(*pcb));
2313 	free(pcb, M_NETGRAPH_BTSOCKET_L2CAP);
2314 
2315 	soisdisconnected(so);
2316 	so->so_pcb = NULL;
2317 } /* ng_btsocket_l2cap_detach */
2318 
2319 /*
2320  * Disconnect socket
2321  */
2322 
2323 int
2324 ng_btsocket_l2cap_disconnect(struct socket *so)
2325 {
2326 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2327 	int			error = 0;
2328 
2329 	if (pcb == NULL)
2330 		return (EINVAL);
2331 	if (ng_btsocket_l2cap_node == NULL)
2332 		return (EINVAL);
2333 
2334 	mtx_lock(&pcb->pcb_mtx);
2335 
2336 	if (pcb->state == NG_BTSOCKET_L2CAP_DISCONNECTING) {
2337 		mtx_unlock(&pcb->pcb_mtx);
2338 		return (EINPROGRESS);
2339 	}
2340 
2341 	if (pcb->state != NG_BTSOCKET_L2CAP_CLOSED) {
2342 		/* XXX FIXME what to do with pending request? */
2343 		if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO)
2344 			ng_btsocket_l2cap_untimeout(pcb);
2345 
2346 		error = ng_btsocket_l2cap_send_l2ca_discon_req(pcb->token, pcb);
2347 		if (error == 0) {
2348 			pcb->state = NG_BTSOCKET_L2CAP_DISCONNECTING;
2349 			soisdisconnecting(so);
2350 
2351 			ng_btsocket_l2cap_timeout(pcb);
2352 		}
2353 
2354 		/* XXX FIXME what to do if error != 0 */
2355 	}
2356 
2357 	mtx_unlock(&pcb->pcb_mtx);
2358 
2359 	return (error);
2360 } /* ng_btsocket_l2cap_disconnect */
2361 
2362 /*
2363  * Listen on socket
2364  */
2365 
2366 int
2367 ng_btsocket_l2cap_listen(struct socket *so, int backlog, struct thread *td)
2368 {
2369 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2370 	int error;
2371 
2372 	SOCK_LOCK(so);
2373 	error = solisten_proto_check(so);
2374 	if (error != 0)
2375 		goto out;
2376 	if (pcb == NULL) {
2377 		error = EINVAL;
2378 		goto out;
2379 	}
2380 	if (ng_btsocket_l2cap_node == NULL) {
2381 		error = EINVAL;
2382 		goto out;
2383 	}
2384 	if (pcb->psm == 0) {
2385 		error = EADDRNOTAVAIL;
2386 		goto out;
2387 	}
2388 	solisten_proto(so, backlog);
2389 out:
2390 	SOCK_UNLOCK(so);
2391 	return (error);
2392 } /* ng_btsocket_listen */
2393 
2394 /*
2395  * Get peer address
2396  */
2397 
2398 int
2399 ng_btsocket_l2cap_peeraddr(struct socket *so, struct sockaddr **nam)
2400 {
2401 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2402 	struct sockaddr_l2cap	sa;
2403 
2404 	if (pcb == NULL)
2405 		return (EINVAL);
2406 	if (ng_btsocket_l2cap_node == NULL)
2407 		return (EINVAL);
2408 
2409 	bcopy(&pcb->dst, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2410 	sa.l2cap_psm = htole16(pcb->psm);
2411 	sa.l2cap_len = sizeof(sa);
2412 	sa.l2cap_family = AF_BLUETOOTH;
2413 
2414 	*nam = sodupsockaddr((struct sockaddr *) &sa, M_NOWAIT);
2415 
2416 	return ((*nam == NULL)? ENOMEM : 0);
2417 } /* ng_btsocket_l2cap_peeraddr */
2418 
2419 /*
2420  * Send data to socket
2421  */
2422 
2423 int
2424 ng_btsocket_l2cap_send(struct socket *so, int flags, struct mbuf *m,
2425 		struct sockaddr *nam, struct mbuf *control, struct thread *td)
2426 {
2427 	ng_btsocket_l2cap_pcb_t	*pcb = so2l2cap_pcb(so);
2428 	int			 error = 0;
2429 
2430 	if (ng_btsocket_l2cap_node == NULL) {
2431 		error = ENETDOWN;
2432 		goto drop;
2433 	}
2434 
2435 	/* Check socket and input */
2436 	if (pcb == NULL || m == NULL || control != NULL) {
2437 		error = EINVAL;
2438 		goto drop;
2439 	}
2440 
2441 	mtx_lock(&pcb->pcb_mtx);
2442 
2443 	/* Make sure socket is connected */
2444 	if (pcb->state != NG_BTSOCKET_L2CAP_OPEN) {
2445 		mtx_unlock(&pcb->pcb_mtx);
2446 		error = ENOTCONN;
2447 		goto drop;
2448 	}
2449 
2450 	/* Check route */
2451 	if (pcb->rt == NULL ||
2452 	    pcb->rt->hook == NULL || NG_HOOK_NOT_VALID(pcb->rt->hook)) {
2453 		mtx_unlock(&pcb->pcb_mtx);
2454 		error = ENETDOWN;
2455 		goto drop;
2456 	}
2457 
2458 	/* Check packet size agains outgoing (peer's incoming) MTU) */
2459 	if (m->m_pkthdr.len > pcb->omtu) {
2460 		NG_BTSOCKET_L2CAP_ERR(
2461 "%s: Packet too big, len=%d, omtu=%d\n", __func__, m->m_pkthdr.len, pcb->omtu);
2462 
2463 		mtx_unlock(&pcb->pcb_mtx);
2464 		error = EMSGSIZE;
2465 		goto drop;
2466 	}
2467 
2468 	/*
2469 	 * First put packet on socket send queue. Then check if we have
2470 	 * pending timeout. If we do not have timeout then we must send
2471 	 * packet and schedule timeout. Otherwise do nothing and wait for
2472 	 * L2CA_WRITE_RSP.
2473 	 */
2474 
2475 	sbappendrecord(&pcb->so->so_snd, m);
2476 	m = NULL;
2477 
2478 	if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2479 		error = ng_btsocket_l2cap_send2(pcb);
2480 		if (error == 0)
2481 			ng_btsocket_l2cap_timeout(pcb);
2482 		else
2483 			sbdroprecord(&pcb->so->so_snd); /* XXX */
2484 	}
2485 
2486 	mtx_unlock(&pcb->pcb_mtx);
2487 drop:
2488 	NG_FREE_M(m); /* checks for != NULL */
2489 	NG_FREE_M(control);
2490 
2491 	return (error);
2492 } /* ng_btsocket_l2cap_send */
2493 
2494 /*
2495  * Send first packet in the socket queue to the L2CAP layer
2496  */
2497 
2498 static int
2499 ng_btsocket_l2cap_send2(ng_btsocket_l2cap_pcb_p pcb)
2500 {
2501 	struct	mbuf		*m = NULL;
2502 	ng_l2cap_l2ca_hdr_t	*hdr = NULL;
2503 	int			 error = 0;
2504 
2505 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2506 
2507 	if (pcb->so->so_snd.sb_cc == 0)
2508 		return (EINVAL); /* XXX */
2509 
2510 	m = m_dup(pcb->so->so_snd.sb_mb, M_DONTWAIT);
2511 	if (m == NULL)
2512 		return (ENOBUFS);
2513 
2514 	/* Create L2CA packet header */
2515 	M_PREPEND(m, sizeof(*hdr), M_DONTWAIT);
2516 	if (m != NULL)
2517 		if (m->m_len < sizeof(*hdr))
2518 			m = m_pullup(m, sizeof(*hdr));
2519 
2520 	if (m == NULL) {
2521 		NG_BTSOCKET_L2CAP_ERR(
2522 "%s: Failed to create L2CA packet header\n", __func__);
2523 
2524 		return (ENOBUFS);
2525 	}
2526 
2527 	hdr = mtod(m, ng_l2cap_l2ca_hdr_t *);
2528 	hdr->token = pcb->token;
2529 	hdr->length = m->m_pkthdr.len - sizeof(*hdr);
2530 	hdr->lcid = pcb->cid;
2531 
2532 	NG_BTSOCKET_L2CAP_INFO(
2533 "%s: Sending packet: len=%d, length=%d, lcid=%d, token=%d, state=%d\n",
2534 		__func__, m->m_pkthdr.len, hdr->length, hdr->lcid,
2535 		hdr->token, pcb->state);
2536 
2537 	/*
2538 	 * If we got here than we have successfuly creates new L2CAP
2539 	 * data packet and now we can send it to the L2CAP layer
2540 	 */
2541 
2542 	NG_SEND_DATA_ONLY(error, pcb->rt->hook, m);
2543 
2544 	return (error);
2545 } /* ng_btsocket_l2cap_send2 */
2546 
2547 /*
2548  * Get socket address
2549  */
2550 
2551 int
2552 ng_btsocket_l2cap_sockaddr(struct socket *so, struct sockaddr **nam)
2553 {
2554 	ng_btsocket_l2cap_pcb_p	pcb = so2l2cap_pcb(so);
2555 	struct sockaddr_l2cap	sa;
2556 
2557 	if (pcb == NULL)
2558 		return (EINVAL);
2559 	if (ng_btsocket_l2cap_node == NULL)
2560 		return (EINVAL);
2561 
2562 	bcopy(&pcb->src, &sa.l2cap_bdaddr, sizeof(sa.l2cap_bdaddr));
2563 	sa.l2cap_psm = htole16(pcb->psm);
2564 	sa.l2cap_len = sizeof(sa);
2565 	sa.l2cap_family = AF_BLUETOOTH;
2566 
2567 	*nam = sodupsockaddr((struct sockaddr *) &sa, M_NOWAIT);
2568 
2569 	return ((*nam == NULL)? ENOMEM : 0);
2570 } /* ng_btsocket_l2cap_sockaddr */
2571 
2572 /*****************************************************************************
2573  *****************************************************************************
2574  **                              Misc. functions
2575  *****************************************************************************
2576  *****************************************************************************/
2577 
2578 /*
2579  * Look for the socket that listens on given PSM and bdaddr. Returns exact or
2580  * close match (if any). Caller must hold ng_btsocket_l2cap_sockets_mtx.
2581  */
2582 
2583 static ng_btsocket_l2cap_pcb_p
2584 ng_btsocket_l2cap_pcb_by_addr(bdaddr_p bdaddr, int psm)
2585 {
2586 	ng_btsocket_l2cap_pcb_p	p = NULL, p1 = NULL;
2587 
2588 	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2589 
2590 	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next) {
2591 		if (p->so == NULL || !(p->so->so_options & SO_ACCEPTCONN) ||
2592 		    p->psm != psm)
2593 			continue;
2594 
2595 		if (bcmp(&p->src, bdaddr, sizeof(p->src)) == 0)
2596 			break;
2597 
2598 		if (bcmp(&p->src, NG_HCI_BDADDR_ANY, sizeof(p->src)) == 0)
2599 			p1 = p;
2600 	}
2601 
2602 	return ((p != NULL)? p : p1);
2603 } /* ng_btsocket_l2cap_pcb_by_addr */
2604 
2605 /*
2606  * Look for the socket that has given token.
2607  * Caller must hold ng_btsocket_l2cap_sockets_mtx.
2608  */
2609 
2610 static ng_btsocket_l2cap_pcb_p
2611 ng_btsocket_l2cap_pcb_by_token(u_int32_t token)
2612 {
2613 	ng_btsocket_l2cap_pcb_p	p = NULL;
2614 
2615 	if (token == 0)
2616 		return (NULL);
2617 
2618 	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2619 
2620 	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2621 		if (p->token == token)
2622 			break;
2623 
2624 	return (p);
2625 } /* ng_btsocket_l2cap_pcb_by_token */
2626 
2627 /*
2628  * Look for the socket that assigned to given source address and channel ID.
2629  * Caller must hold ng_btsocket_l2cap_sockets_mtx
2630  */
2631 
2632 static ng_btsocket_l2cap_pcb_p
2633 ng_btsocket_l2cap_pcb_by_cid(bdaddr_p src, int cid)
2634 {
2635 	ng_btsocket_l2cap_pcb_p	p = NULL;
2636 
2637 	mtx_assert(&ng_btsocket_l2cap_sockets_mtx, MA_OWNED);
2638 
2639 	LIST_FOREACH(p, &ng_btsocket_l2cap_sockets, next)
2640 		if (p->cid == cid && bcmp(src, &p->src, sizeof(p->src)) == 0)
2641 			break;
2642 
2643 	return (p);
2644 } /* ng_btsocket_l2cap_pcb_by_cid */
2645 
2646 /*
2647  * Set timeout on socket
2648  */
2649 
2650 static void
2651 ng_btsocket_l2cap_timeout(ng_btsocket_l2cap_pcb_p pcb)
2652 {
2653 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2654 
2655 	if (!(pcb->flags & NG_BTSOCKET_L2CAP_TIMO)) {
2656 		pcb->flags |= NG_BTSOCKET_L2CAP_TIMO;
2657 		pcb->timo = timeout(ng_btsocket_l2cap_process_timeout, pcb,
2658 					bluetooth_l2cap_ertx_timeout());
2659 	} else
2660 		KASSERT(0,
2661 ("%s: Duplicated socket timeout?!\n", __func__));
2662 } /* ng_btsocket_l2cap_timeout */
2663 
2664 /*
2665  * Unset timeout on socket
2666  */
2667 
2668 static void
2669 ng_btsocket_l2cap_untimeout(ng_btsocket_l2cap_pcb_p pcb)
2670 {
2671 	mtx_assert(&pcb->pcb_mtx, MA_OWNED);
2672 
2673 	if (pcb->flags & NG_BTSOCKET_L2CAP_TIMO) {
2674 		untimeout(ng_btsocket_l2cap_process_timeout, pcb, pcb->timo);
2675 		pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2676 	} else
2677 		KASSERT(0,
2678 ("%s: No socket timeout?!\n", __func__));
2679 } /* ng_btsocket_l2cap_untimeout */
2680 
2681 /*
2682  * Process timeout on socket
2683  */
2684 
2685 static void
2686 ng_btsocket_l2cap_process_timeout(void *xpcb)
2687 {
2688 	ng_btsocket_l2cap_pcb_p	pcb = (ng_btsocket_l2cap_pcb_p) xpcb;
2689 
2690 	mtx_lock(&pcb->pcb_mtx);
2691 
2692 	pcb->flags &= ~NG_BTSOCKET_L2CAP_TIMO;
2693 	pcb->so->so_error = ETIMEDOUT;
2694 
2695 	switch (pcb->state) {
2696 	case NG_BTSOCKET_L2CAP_CONNECTING:
2697 	case NG_BTSOCKET_L2CAP_CONFIGURING:
2698 		/* Send disconnect request with "zero" token */
2699 		if (pcb->cid != 0)
2700 			ng_btsocket_l2cap_send_l2ca_discon_req(0, pcb);
2701 
2702 		/* ... and close the socket */
2703 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2704 		soisdisconnected(pcb->so);
2705 		break;
2706 
2707 	case NG_BTSOCKET_L2CAP_OPEN:
2708 		/* Send timeout - drop packet and wakeup sender */
2709 		sbdroprecord(&pcb->so->so_snd);
2710 		sowwakeup(pcb->so);
2711 		break;
2712 
2713 	case NG_BTSOCKET_L2CAP_DISCONNECTING:
2714 		/* Disconnect timeout - disconnect the socket anyway */
2715 		pcb->state = NG_BTSOCKET_L2CAP_CLOSED;
2716 		soisdisconnected(pcb->so);
2717 		break;
2718 
2719 	default:
2720 		NG_BTSOCKET_L2CAP_ERR(
2721 "%s: Invalid socket state=%d\n", __func__, pcb->state);
2722 		break;
2723 	}
2724 
2725 	mtx_unlock(&pcb->pcb_mtx);
2726 } /* ng_btsocket_l2cap_process_timeout */
2727 
2728 /*
2729  * Translate HCI/L2CAP error code into "errno" code
2730  * XXX Note: Some L2CAP and HCI error codes have the same value, but
2731  *     different meaning
2732  */
2733 
2734 static int
2735 ng_btsocket_l2cap_result2errno(int result)
2736 {
2737 	switch (result) {
2738 	case 0x00: /* No error */
2739 		return (0);
2740 
2741 	case 0x01: /* Unknown HCI command */
2742 		return (ENODEV);
2743 
2744 	case 0x02: /* No connection */
2745 		return (ENOTCONN);
2746 
2747 	case 0x03: /* Hardware failure */
2748 		return (EIO);
2749 
2750 	case 0x04: /* Page timeout */
2751 		return (EHOSTDOWN);
2752 
2753 	case 0x05: /* Authentication failure */
2754 	case 0x06: /* Key missing */
2755 	case 0x18: /* Pairing not allowed */
2756 	case 0x21: /* Role change not allowed */
2757 	case 0x24: /* LMP PSU not allowed */
2758 	case 0x25: /* Encryption mode not acceptable */
2759 	case 0x26: /* Unit key used */
2760 		return (EACCES);
2761 
2762 	case 0x07: /* Memory full */
2763 		return (ENOMEM);
2764 
2765 	case 0x08:   /* Connection timeout */
2766 	case 0x10:   /* Host timeout */
2767 	case 0x22:   /* LMP response timeout */
2768 	case 0xee:   /* HCI timeout */
2769 	case 0xeeee: /* L2CAP timeout */
2770 		return (ETIMEDOUT);
2771 
2772 	case 0x09: /* Max number of connections */
2773 	case 0x0a: /* Max number of SCO connections to a unit */
2774 		return (EMLINK);
2775 
2776 	case 0x0b: /* ACL connection already exists */
2777 		return (EEXIST);
2778 
2779 	case 0x0c: /* Command disallowed */
2780 		return (EBUSY);
2781 
2782 	case 0x0d: /* Host rejected due to limited resources */
2783 	case 0x0e: /* Host rejected due to securiity reasons */
2784 	case 0x0f: /* Host rejected due to remote unit is a personal unit */
2785 	case 0x1b: /* SCO offset rejected */
2786 	case 0x1c: /* SCO interval rejected */
2787 	case 0x1d: /* SCO air mode rejected */
2788 		return (ECONNREFUSED);
2789 
2790 	case 0x11: /* Unsupported feature or parameter value */
2791 	case 0x19: /* Unknown LMP PDU */
2792 	case 0x1a: /* Unsupported remote feature */
2793 	case 0x20: /* Unsupported LMP parameter value */
2794 	case 0x27: /* QoS is not supported */
2795 	case 0x29: /* Paring with unit key not supported */
2796 		return (EOPNOTSUPP);
2797 
2798 	case 0x12: /* Invalid HCI command parameter */
2799 	case 0x1e: /* Invalid LMP parameters */
2800 		return (EINVAL);
2801 
2802 	case 0x13: /* Other end terminated connection: User ended connection */
2803 	case 0x14: /* Other end terminated connection: Low resources */
2804 	case 0x15: /* Other end terminated connection: About to power off */
2805 		return (ECONNRESET);
2806 
2807 	case 0x16: /* Connection terminated by local host */
2808 		return (ECONNABORTED);
2809 
2810 #if 0 /* XXX not yet */
2811 	case 0x17: /* Repeated attempts */
2812 	case 0x1f: /* Unspecified error */
2813 	case 0x23: /* LMP error transaction collision */
2814 	case 0x28: /* Instant passed */
2815 #endif
2816 	}
2817 
2818 	return (ENOSYS);
2819 } /* ng_btsocket_l2cap_result2errno */
2820 
2821