Bluetooth: Add Load Connection Parameters command
[deliverable/linux.git] / net / bluetooth / hci_event.c
CommitLineData
8e87d142 1/*
1da177e4 2 BlueZ - Bluetooth protocol stack for Linux
2d0a0346 3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
1da177e4
LT
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI event handling. */
26
1da177e4
LT
27#include <asm/unaligned.h>
28
29#include <net/bluetooth/bluetooth.h>
30#include <net/bluetooth/hci_core.h>
f0d6a0ea 31#include <net/bluetooth/mgmt.h>
7ef9fbf0 32
7024728e 33#include "a2mp.h"
7ef9fbf0 34#include "amp.h"
2ceba539 35#include "smp.h"
1da177e4 36
1da177e4
LT
37/* Handle HCI Event packets */
38
a9de9248 39static void hci_cc_inquiry_cancel(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 40{
a9de9248 41 __u8 status = *((__u8 *) skb->data);
1da177e4 42
9f1db00c 43 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 44
82f4785c 45 if (status)
a9de9248 46 return;
1da177e4 47
89352e7d 48 clear_bit(HCI_INQUIRY, &hdev->flags);
4e857c58 49 smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
3e13fa1e 50 wake_up_bit(&hdev->flags, HCI_INQUIRY);
89352e7d 51
50143a43
JH
52 hci_dev_lock(hdev);
53 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
54 hci_dev_unlock(hdev);
55
a9de9248
MH
56 hci_conn_check_pending(hdev);
57}
6bd57416 58
4d93483b
AG
59static void hci_cc_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
60{
61 __u8 status = *((__u8 *) skb->data);
62
9f1db00c 63 BT_DBG("%s status 0x%2.2x", hdev->name, status);
ae854a70
AG
64
65 if (status)
66 return;
67
68 set_bit(HCI_PERIODIC_INQ, &hdev->dev_flags);
4d93483b
AG
69}
70
a9de9248
MH
71static void hci_cc_exit_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
72{
73 __u8 status = *((__u8 *) skb->data);
6bd57416 74
9f1db00c 75 BT_DBG("%s status 0x%2.2x", hdev->name, status);
6bd57416 76
a9de9248
MH
77 if (status)
78 return;
1da177e4 79
ae854a70
AG
80 clear_bit(HCI_PERIODIC_INQ, &hdev->dev_flags);
81
a9de9248
MH
82 hci_conn_check_pending(hdev);
83}
84
807deac2
GP
85static void hci_cc_remote_name_req_cancel(struct hci_dev *hdev,
86 struct sk_buff *skb)
a9de9248
MH
87{
88 BT_DBG("%s", hdev->name);
89}
90
91static void hci_cc_role_discovery(struct hci_dev *hdev, struct sk_buff *skb)
92{
93 struct hci_rp_role_discovery *rp = (void *) skb->data;
94 struct hci_conn *conn;
95
9f1db00c 96 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
97
98 if (rp->status)
99 return;
100
101 hci_dev_lock(hdev);
102
103 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
104 if (conn) {
105 if (rp->role)
4dae2798 106 clear_bit(HCI_CONN_MASTER, &conn->flags);
a9de9248 107 else
4dae2798 108 set_bit(HCI_CONN_MASTER, &conn->flags);
1da177e4 109 }
a9de9248
MH
110
111 hci_dev_unlock(hdev);
1da177e4
LT
112}
113
e4e8e37c
MH
114static void hci_cc_read_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
115{
116 struct hci_rp_read_link_policy *rp = (void *) skb->data;
117 struct hci_conn *conn;
118
9f1db00c 119 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
e4e8e37c
MH
120
121 if (rp->status)
122 return;
123
124 hci_dev_lock(hdev);
125
126 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
127 if (conn)
128 conn->link_policy = __le16_to_cpu(rp->policy);
129
130 hci_dev_unlock(hdev);
131}
132
a9de9248 133static void hci_cc_write_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 134{
a9de9248 135 struct hci_rp_write_link_policy *rp = (void *) skb->data;
1da177e4 136 struct hci_conn *conn;
04837f64 137 void *sent;
1da177e4 138
9f1db00c 139 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 140
a9de9248
MH
141 if (rp->status)
142 return;
1da177e4 143
a9de9248
MH
144 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LINK_POLICY);
145 if (!sent)
146 return;
1da177e4 147
a9de9248 148 hci_dev_lock(hdev);
1da177e4 149
a9de9248 150 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
e4e8e37c 151 if (conn)
83985319 152 conn->link_policy = get_unaligned_le16(sent + 2);
1da177e4 153
a9de9248
MH
154 hci_dev_unlock(hdev);
155}
1da177e4 156
807deac2
GP
157static void hci_cc_read_def_link_policy(struct hci_dev *hdev,
158 struct sk_buff *skb)
e4e8e37c
MH
159{
160 struct hci_rp_read_def_link_policy *rp = (void *) skb->data;
161
9f1db00c 162 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
e4e8e37c
MH
163
164 if (rp->status)
165 return;
166
167 hdev->link_policy = __le16_to_cpu(rp->policy);
168}
169
807deac2
GP
170static void hci_cc_write_def_link_policy(struct hci_dev *hdev,
171 struct sk_buff *skb)
e4e8e37c
MH
172{
173 __u8 status = *((__u8 *) skb->data);
174 void *sent;
175
9f1db00c 176 BT_DBG("%s status 0x%2.2x", hdev->name, status);
e4e8e37c
MH
177
178 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_DEF_LINK_POLICY);
179 if (!sent)
180 return;
181
182 if (!status)
183 hdev->link_policy = get_unaligned_le16(sent);
e4e8e37c
MH
184}
185
a9de9248
MH
186static void hci_cc_reset(struct hci_dev *hdev, struct sk_buff *skb)
187{
188 __u8 status = *((__u8 *) skb->data);
04837f64 189
9f1db00c 190 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 191
10572132
GP
192 clear_bit(HCI_RESET, &hdev->flags);
193
a297e97c 194 /* Reset all non-persistent flags */
2cc6fb00 195 hdev->dev_flags &= ~HCI_PERSISTENT_MASK;
69775ff6
AG
196
197 hdev->discovery.state = DISCOVERY_STOPPED;
bbaf444a
JH
198 hdev->inq_tx_power = HCI_TX_POWER_INVALID;
199 hdev->adv_tx_power = HCI_TX_POWER_INVALID;
3f0f524b
JH
200
201 memset(hdev->adv_data, 0, sizeof(hdev->adv_data));
202 hdev->adv_data_len = 0;
f8e808bd
MH
203
204 memset(hdev->scan_rsp_data, 0, sizeof(hdev->scan_rsp_data));
205 hdev->scan_rsp_data_len = 0;
06f5b778 206
533553f8
MH
207 hdev->le_scan_type = LE_SCAN_PASSIVE;
208
06f5b778 209 hdev->ssp_debug_mode = 0;
a9de9248 210}
04837f64 211
a9de9248
MH
212static void hci_cc_write_local_name(struct hci_dev *hdev, struct sk_buff *skb)
213{
214 __u8 status = *((__u8 *) skb->data);
215 void *sent;
04837f64 216
9f1db00c 217 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 218
a9de9248
MH
219 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LOCAL_NAME);
220 if (!sent)
221 return;
04837f64 222
56e5cb86
JH
223 hci_dev_lock(hdev);
224
f51d5b24
JH
225 if (test_bit(HCI_MGMT, &hdev->dev_flags))
226 mgmt_set_local_name_complete(hdev, sent, status);
28cc7bde
JH
227 else if (!status)
228 memcpy(hdev->dev_name, sent, HCI_MAX_NAME_LENGTH);
f51d5b24 229
56e5cb86 230 hci_dev_unlock(hdev);
a9de9248
MH
231}
232
233static void hci_cc_read_local_name(struct hci_dev *hdev, struct sk_buff *skb)
234{
235 struct hci_rp_read_local_name *rp = (void *) skb->data;
236
9f1db00c 237 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
238
239 if (rp->status)
240 return;
241
db99b5fc
JH
242 if (test_bit(HCI_SETUP, &hdev->dev_flags))
243 memcpy(hdev->dev_name, rp->name, HCI_MAX_NAME_LENGTH);
a9de9248
MH
244}
245
246static void hci_cc_write_auth_enable(struct hci_dev *hdev, struct sk_buff *skb)
247{
248 __u8 status = *((__u8 *) skb->data);
249 void *sent;
250
9f1db00c 251 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
252
253 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_AUTH_ENABLE);
254 if (!sent)
255 return;
256
257 if (!status) {
258 __u8 param = *((__u8 *) sent);
259
260 if (param == AUTH_ENABLED)
261 set_bit(HCI_AUTH, &hdev->flags);
262 else
263 clear_bit(HCI_AUTH, &hdev->flags);
1da177e4 264 }
a9de9248 265
33ef95ed
JH
266 if (test_bit(HCI_MGMT, &hdev->dev_flags))
267 mgmt_auth_enable_complete(hdev, status);
1da177e4
LT
268}
269
a9de9248 270static void hci_cc_write_encrypt_mode(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 271{
a9de9248 272 __u8 status = *((__u8 *) skb->data);
1da177e4
LT
273 void *sent;
274
9f1db00c 275 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 276
a9de9248
MH
277 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_ENCRYPT_MODE);
278 if (!sent)
279 return;
1da177e4 280
a9de9248
MH
281 if (!status) {
282 __u8 param = *((__u8 *) sent);
283
284 if (param)
285 set_bit(HCI_ENCRYPT, &hdev->flags);
286 else
287 clear_bit(HCI_ENCRYPT, &hdev->flags);
288 }
a9de9248 289}
1da177e4 290
a9de9248
MH
291static void hci_cc_write_scan_enable(struct hci_dev *hdev, struct sk_buff *skb)
292{
36f7fc7e
JH
293 __u8 param, status = *((__u8 *) skb->data);
294 int old_pscan, old_iscan;
a9de9248 295 void *sent;
1da177e4 296
9f1db00c 297 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 298
a9de9248
MH
299 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SCAN_ENABLE);
300 if (!sent)
301 return;
1da177e4 302
36f7fc7e
JH
303 param = *((__u8 *) sent);
304
56e5cb86
JH
305 hci_dev_lock(hdev);
306
fa1bd918 307 if (status) {
744cf19e 308 mgmt_write_scan_failed(hdev, param, status);
2d7cee58
JH
309 hdev->discov_timeout = 0;
310 goto done;
311 }
312
0663ca2a
JH
313 /* We need to ensure that we set this back on if someone changed
314 * the scan mode through a raw HCI socket.
315 */
316 set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);
317
36f7fc7e
JH
318 old_pscan = test_and_clear_bit(HCI_PSCAN, &hdev->flags);
319 old_iscan = test_and_clear_bit(HCI_ISCAN, &hdev->flags);
320
321 if (param & SCAN_INQUIRY) {
322 set_bit(HCI_ISCAN, &hdev->flags);
323 if (!old_iscan)
744cf19e 324 mgmt_discoverable(hdev, 1);
36f7fc7e 325 } else if (old_iscan)
744cf19e 326 mgmt_discoverable(hdev, 0);
36f7fc7e
JH
327
328 if (param & SCAN_PAGE) {
329 set_bit(HCI_PSCAN, &hdev->flags);
330 if (!old_pscan)
744cf19e 331 mgmt_connectable(hdev, 1);
36f7fc7e 332 } else if (old_pscan)
744cf19e 333 mgmt_connectable(hdev, 0);
1da177e4 334
36f7fc7e 335done:
56e5cb86 336 hci_dev_unlock(hdev);
a9de9248 337}
1da177e4 338
a9de9248
MH
339static void hci_cc_read_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
340{
341 struct hci_rp_read_class_of_dev *rp = (void *) skb->data;
1da177e4 342
9f1db00c 343 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 344
a9de9248
MH
345 if (rp->status)
346 return;
1da177e4 347
a9de9248 348 memcpy(hdev->dev_class, rp->dev_class, 3);
1da177e4 349
a9de9248 350 BT_DBG("%s class 0x%.2x%.2x%.2x", hdev->name,
807deac2 351 hdev->dev_class[2], hdev->dev_class[1], hdev->dev_class[0]);
a9de9248 352}
1da177e4 353
a9de9248
MH
354static void hci_cc_write_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
355{
356 __u8 status = *((__u8 *) skb->data);
357 void *sent;
1da177e4 358
9f1db00c 359 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 360
a9de9248
MH
361 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_CLASS_OF_DEV);
362 if (!sent)
363 return;
1da177e4 364
7f9a903c
MH
365 hci_dev_lock(hdev);
366
367 if (status == 0)
368 memcpy(hdev->dev_class, sent, 3);
369
370 if (test_bit(HCI_MGMT, &hdev->dev_flags))
371 mgmt_set_class_of_dev_complete(hdev, sent, status);
372
373 hci_dev_unlock(hdev);
a9de9248 374}
1da177e4 375
a9de9248
MH
376static void hci_cc_read_voice_setting(struct hci_dev *hdev, struct sk_buff *skb)
377{
378 struct hci_rp_read_voice_setting *rp = (void *) skb->data;
379 __u16 setting;
380
9f1db00c 381 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
382
383 if (rp->status)
384 return;
385
386 setting = __le16_to_cpu(rp->voice_setting);
387
f383f275 388 if (hdev->voice_setting == setting)
a9de9248
MH
389 return;
390
391 hdev->voice_setting = setting;
392
9f1db00c 393 BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
a9de9248 394
3c54711c 395 if (hdev->notify)
a9de9248 396 hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
a9de9248
MH
397}
398
8fc9ced3
GP
399static void hci_cc_write_voice_setting(struct hci_dev *hdev,
400 struct sk_buff *skb)
a9de9248
MH
401{
402 __u8 status = *((__u8 *) skb->data);
f383f275 403 __u16 setting;
a9de9248
MH
404 void *sent;
405
9f1db00c 406 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 407
f383f275
MH
408 if (status)
409 return;
410
a9de9248
MH
411 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_VOICE_SETTING);
412 if (!sent)
413 return;
1da177e4 414
f383f275 415 setting = get_unaligned_le16(sent);
1da177e4 416
f383f275
MH
417 if (hdev->voice_setting == setting)
418 return;
419
420 hdev->voice_setting = setting;
1da177e4 421
9f1db00c 422 BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
1da177e4 423
3c54711c 424 if (hdev->notify)
f383f275 425 hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
1da177e4
LT
426}
427
b4cb9fb2
MH
428static void hci_cc_read_num_supported_iac(struct hci_dev *hdev,
429 struct sk_buff *skb)
430{
431 struct hci_rp_read_num_supported_iac *rp = (void *) skb->data;
432
433 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
434
435 if (rp->status)
436 return;
437
438 hdev->num_iac = rp->num_iac;
439
440 BT_DBG("%s num iac %d", hdev->name, hdev->num_iac);
441}
442
333140b5
MH
443static void hci_cc_write_ssp_mode(struct hci_dev *hdev, struct sk_buff *skb)
444{
445 __u8 status = *((__u8 *) skb->data);
5ed8eb2f 446 struct hci_cp_write_ssp_mode *sent;
333140b5 447
9f1db00c 448 BT_DBG("%s status 0x%2.2x", hdev->name, status);
333140b5 449
333140b5
MH
450 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SSP_MODE);
451 if (!sent)
452 return;
453
5ed8eb2f
JH
454 if (!status) {
455 if (sent->mode)
cad718ed 456 hdev->features[1][0] |= LMP_HOST_SSP;
5ed8eb2f 457 else
cad718ed 458 hdev->features[1][0] &= ~LMP_HOST_SSP;
5ed8eb2f
JH
459 }
460
ed2c4ee3 461 if (test_bit(HCI_MGMT, &hdev->dev_flags))
5ed8eb2f 462 mgmt_ssp_enable_complete(hdev, sent->mode, status);
c0ecddc2 463 else if (!status) {
5ed8eb2f 464 if (sent->mode)
c0ecddc2
JH
465 set_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
466 else
467 clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
468 }
333140b5
MH
469}
470
eac83dc6
MH
471static void hci_cc_write_sc_support(struct hci_dev *hdev, struct sk_buff *skb)
472{
473 u8 status = *((u8 *) skb->data);
474 struct hci_cp_write_sc_support *sent;
475
476 BT_DBG("%s status 0x%2.2x", hdev->name, status);
477
478 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SC_SUPPORT);
479 if (!sent)
480 return;
481
482 if (!status) {
483 if (sent->support)
484 hdev->features[1][0] |= LMP_HOST_SC;
485 else
486 hdev->features[1][0] &= ~LMP_HOST_SC;
487 }
488
489 if (test_bit(HCI_MGMT, &hdev->dev_flags))
490 mgmt_sc_enable_complete(hdev, sent->support, status);
491 else if (!status) {
492 if (sent->support)
493 set_bit(HCI_SC_ENABLED, &hdev->dev_flags);
494 else
495 clear_bit(HCI_SC_ENABLED, &hdev->dev_flags);
496 }
497}
498
a9de9248
MH
499static void hci_cc_read_local_version(struct hci_dev *hdev, struct sk_buff *skb)
500{
501 struct hci_rp_read_local_version *rp = (void *) skb->data;
1143e5a6 502
9f1db00c 503 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143e5a6 504
a9de9248 505 if (rp->status)
42c6b129 506 return;
1143e5a6 507
0d5551f5
MH
508 if (test_bit(HCI_SETUP, &hdev->dev_flags)) {
509 hdev->hci_ver = rp->hci_ver;
510 hdev->hci_rev = __le16_to_cpu(rp->hci_rev);
511 hdev->lmp_ver = rp->lmp_ver;
512 hdev->manufacturer = __le16_to_cpu(rp->manufacturer);
513 hdev->lmp_subver = __le16_to_cpu(rp->lmp_subver);
514 }
d5859e22
JH
515}
516
8fc9ced3
GP
517static void hci_cc_read_local_commands(struct hci_dev *hdev,
518 struct sk_buff *skb)
a9de9248
MH
519{
520 struct hci_rp_read_local_commands *rp = (void *) skb->data;
1da177e4 521
9f1db00c 522 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 523
6a070e6e
MH
524 if (rp->status)
525 return;
526
527 if (test_bit(HCI_SETUP, &hdev->dev_flags))
2177bab5 528 memcpy(hdev->commands, rp->commands, sizeof(hdev->commands));
a9de9248 529}
1da177e4 530
8fc9ced3
GP
531static void hci_cc_read_local_features(struct hci_dev *hdev,
532 struct sk_buff *skb)
a9de9248
MH
533{
534 struct hci_rp_read_local_features *rp = (void *) skb->data;
5b7f9909 535
9f1db00c 536 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 537
a9de9248
MH
538 if (rp->status)
539 return;
5b7f9909 540
a9de9248 541 memcpy(hdev->features, rp->features, 8);
5b7f9909 542
a9de9248
MH
543 /* Adjust default settings according to features
544 * supported by device. */
1da177e4 545
cad718ed 546 if (hdev->features[0][0] & LMP_3SLOT)
a9de9248 547 hdev->pkt_type |= (HCI_DM3 | HCI_DH3);
1da177e4 548
cad718ed 549 if (hdev->features[0][0] & LMP_5SLOT)
a9de9248 550 hdev->pkt_type |= (HCI_DM5 | HCI_DH5);
1da177e4 551
cad718ed 552 if (hdev->features[0][1] & LMP_HV2) {
a9de9248
MH
553 hdev->pkt_type |= (HCI_HV2);
554 hdev->esco_type |= (ESCO_HV2);
555 }
1da177e4 556
cad718ed 557 if (hdev->features[0][1] & LMP_HV3) {
a9de9248
MH
558 hdev->pkt_type |= (HCI_HV3);
559 hdev->esco_type |= (ESCO_HV3);
560 }
1da177e4 561
45db810f 562 if (lmp_esco_capable(hdev))
a9de9248 563 hdev->esco_type |= (ESCO_EV3);
da1f5198 564
cad718ed 565 if (hdev->features[0][4] & LMP_EV4)
a9de9248 566 hdev->esco_type |= (ESCO_EV4);
da1f5198 567
cad718ed 568 if (hdev->features[0][4] & LMP_EV5)
a9de9248 569 hdev->esco_type |= (ESCO_EV5);
1da177e4 570
cad718ed 571 if (hdev->features[0][5] & LMP_EDR_ESCO_2M)
efc7688b
MH
572 hdev->esco_type |= (ESCO_2EV3);
573
cad718ed 574 if (hdev->features[0][5] & LMP_EDR_ESCO_3M)
efc7688b
MH
575 hdev->esco_type |= (ESCO_3EV3);
576
cad718ed 577 if (hdev->features[0][5] & LMP_EDR_3S_ESCO)
efc7688b 578 hdev->esco_type |= (ESCO_2EV5 | ESCO_3EV5);
a9de9248 579}
1da177e4 580
971e3a4b 581static void hci_cc_read_local_ext_features(struct hci_dev *hdev,
807deac2 582 struct sk_buff *skb)
971e3a4b
AG
583{
584 struct hci_rp_read_local_ext_features *rp = (void *) skb->data;
585
9f1db00c 586 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
971e3a4b
AG
587
588 if (rp->status)
42c6b129 589 return;
971e3a4b 590
57af75a8
MH
591 if (hdev->max_page < rp->max_page)
592 hdev->max_page = rp->max_page;
d2c5d77f 593
cad718ed
JH
594 if (rp->page < HCI_MAX_PAGES)
595 memcpy(hdev->features[rp->page], rp->features, 8);
971e3a4b
AG
596}
597
1e89cffb 598static void hci_cc_read_flow_control_mode(struct hci_dev *hdev,
807deac2 599 struct sk_buff *skb)
1e89cffb
AE
600{
601 struct hci_rp_read_flow_control_mode *rp = (void *) skb->data;
602
9f1db00c 603 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1e89cffb 604
42c6b129
JH
605 if (!rp->status)
606 hdev->flow_ctl_mode = rp->mode;
1e89cffb
AE
607}
608
a9de9248
MH
609static void hci_cc_read_buffer_size(struct hci_dev *hdev, struct sk_buff *skb)
610{
611 struct hci_rp_read_buffer_size *rp = (void *) skb->data;
1da177e4 612
9f1db00c 613 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 614
a9de9248
MH
615 if (rp->status)
616 return;
1da177e4 617
a9de9248
MH
618 hdev->acl_mtu = __le16_to_cpu(rp->acl_mtu);
619 hdev->sco_mtu = rp->sco_mtu;
620 hdev->acl_pkts = __le16_to_cpu(rp->acl_max_pkt);
621 hdev->sco_pkts = __le16_to_cpu(rp->sco_max_pkt);
622
623 if (test_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks)) {
624 hdev->sco_mtu = 64;
625 hdev->sco_pkts = 8;
1da177e4 626 }
a9de9248
MH
627
628 hdev->acl_cnt = hdev->acl_pkts;
629 hdev->sco_cnt = hdev->sco_pkts;
630
807deac2
GP
631 BT_DBG("%s acl mtu %d:%d sco mtu %d:%d", hdev->name, hdev->acl_mtu,
632 hdev->acl_pkts, hdev->sco_mtu, hdev->sco_pkts);
a9de9248
MH
633}
634
635static void hci_cc_read_bd_addr(struct hci_dev *hdev, struct sk_buff *skb)
636{
637 struct hci_rp_read_bd_addr *rp = (void *) skb->data;
638
9f1db00c 639 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
640
641 if (!rp->status)
642 bacpy(&hdev->bdaddr, &rp->bdaddr);
23bb5763
JH
643}
644
f332ec66
JH
645static void hci_cc_read_page_scan_activity(struct hci_dev *hdev,
646 struct sk_buff *skb)
647{
648 struct hci_rp_read_page_scan_activity *rp = (void *) skb->data;
649
650 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
651
652 if (test_bit(HCI_INIT, &hdev->flags) && !rp->status) {
653 hdev->page_scan_interval = __le16_to_cpu(rp->interval);
654 hdev->page_scan_window = __le16_to_cpu(rp->window);
655 }
656}
657
4a3ee763
JH
658static void hci_cc_write_page_scan_activity(struct hci_dev *hdev,
659 struct sk_buff *skb)
660{
661 u8 status = *((u8 *) skb->data);
662 struct hci_cp_write_page_scan_activity *sent;
663
664 BT_DBG("%s status 0x%2.2x", hdev->name, status);
665
666 if (status)
667 return;
668
669 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY);
670 if (!sent)
671 return;
672
673 hdev->page_scan_interval = __le16_to_cpu(sent->interval);
674 hdev->page_scan_window = __le16_to_cpu(sent->window);
675}
676
f332ec66
JH
677static void hci_cc_read_page_scan_type(struct hci_dev *hdev,
678 struct sk_buff *skb)
679{
680 struct hci_rp_read_page_scan_type *rp = (void *) skb->data;
681
682 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
683
684 if (test_bit(HCI_INIT, &hdev->flags) && !rp->status)
685 hdev->page_scan_type = rp->type;
686}
687
4a3ee763
JH
688static void hci_cc_write_page_scan_type(struct hci_dev *hdev,
689 struct sk_buff *skb)
690{
691 u8 status = *((u8 *) skb->data);
692 u8 *type;
693
694 BT_DBG("%s status 0x%2.2x", hdev->name, status);
695
696 if (status)
697 return;
698
699 type = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE);
700 if (type)
701 hdev->page_scan_type = *type;
702}
703
350ee4cf 704static void hci_cc_read_data_block_size(struct hci_dev *hdev,
807deac2 705 struct sk_buff *skb)
350ee4cf
AE
706{
707 struct hci_rp_read_data_block_size *rp = (void *) skb->data;
708
9f1db00c 709 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
350ee4cf
AE
710
711 if (rp->status)
712 return;
713
714 hdev->block_mtu = __le16_to_cpu(rp->max_acl_len);
715 hdev->block_len = __le16_to_cpu(rp->block_len);
716 hdev->num_blocks = __le16_to_cpu(rp->num_blocks);
717
718 hdev->block_cnt = hdev->num_blocks;
719
720 BT_DBG("%s blk mtu %d cnt %d len %d", hdev->name, hdev->block_mtu,
807deac2 721 hdev->block_cnt, hdev->block_len);
350ee4cf
AE
722}
723
33f35721
JH
724static void hci_cc_read_clock(struct hci_dev *hdev, struct sk_buff *skb)
725{
726 struct hci_rp_read_clock *rp = (void *) skb->data;
727 struct hci_cp_read_clock *cp;
728 struct hci_conn *conn;
729
730 BT_DBG("%s", hdev->name);
731
732 if (skb->len < sizeof(*rp))
733 return;
734
735 if (rp->status)
736 return;
737
738 hci_dev_lock(hdev);
739
740 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK);
741 if (!cp)
742 goto unlock;
743
744 if (cp->which == 0x00) {
745 hdev->clock = le32_to_cpu(rp->clock);
746 goto unlock;
747 }
748
749 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
750 if (conn) {
751 conn->clock = le32_to_cpu(rp->clock);
752 conn->clock_accuracy = le16_to_cpu(rp->accuracy);
753 }
754
755unlock:
756 hci_dev_unlock(hdev);
757}
758
928abaa7 759static void hci_cc_read_local_amp_info(struct hci_dev *hdev,
807deac2 760 struct sk_buff *skb)
928abaa7
AE
761{
762 struct hci_rp_read_local_amp_info *rp = (void *) skb->data;
763
9f1db00c 764 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
928abaa7
AE
765
766 if (rp->status)
8e2a0d92 767 goto a2mp_rsp;
928abaa7
AE
768
769 hdev->amp_status = rp->amp_status;
770 hdev->amp_total_bw = __le32_to_cpu(rp->total_bw);
771 hdev->amp_max_bw = __le32_to_cpu(rp->max_bw);
772 hdev->amp_min_latency = __le32_to_cpu(rp->min_latency);
773 hdev->amp_max_pdu = __le32_to_cpu(rp->max_pdu);
774 hdev->amp_type = rp->amp_type;
775 hdev->amp_pal_cap = __le16_to_cpu(rp->pal_cap);
776 hdev->amp_assoc_size = __le16_to_cpu(rp->max_assoc_size);
777 hdev->amp_be_flush_to = __le32_to_cpu(rp->be_flush_to);
778 hdev->amp_max_flush_to = __le32_to_cpu(rp->max_flush_to);
779
8e2a0d92
AE
780a2mp_rsp:
781 a2mp_send_getinfo_rsp(hdev);
928abaa7
AE
782}
783
903e4541
AE
784static void hci_cc_read_local_amp_assoc(struct hci_dev *hdev,
785 struct sk_buff *skb)
786{
787 struct hci_rp_read_local_amp_assoc *rp = (void *) skb->data;
788 struct amp_assoc *assoc = &hdev->loc_assoc;
789 size_t rem_len, frag_len;
790
791 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
792
793 if (rp->status)
794 goto a2mp_rsp;
795
796 frag_len = skb->len - sizeof(*rp);
797 rem_len = __le16_to_cpu(rp->rem_len);
798
799 if (rem_len > frag_len) {
2e430be3 800 BT_DBG("frag_len %zu rem_len %zu", frag_len, rem_len);
903e4541
AE
801
802 memcpy(assoc->data + assoc->offset, rp->frag, frag_len);
803 assoc->offset += frag_len;
804
805 /* Read other fragments */
806 amp_read_loc_assoc_frag(hdev, rp->phy_handle);
807
808 return;
809 }
810
811 memcpy(assoc->data + assoc->offset, rp->frag, rem_len);
812 assoc->len = assoc->offset + rem_len;
813 assoc->offset = 0;
814
815a2mp_rsp:
816 /* Send A2MP Rsp when all fragments are received */
817 a2mp_send_getampassoc_rsp(hdev, rp->status);
9495b2ee 818 a2mp_send_create_phy_link_req(hdev, rp->status);
903e4541
AE
819}
820
d5859e22 821static void hci_cc_read_inq_rsp_tx_power(struct hci_dev *hdev,
807deac2 822 struct sk_buff *skb)
d5859e22 823{
91c4e9b1 824 struct hci_rp_read_inq_rsp_tx_power *rp = (void *) skb->data;
d5859e22 825
9f1db00c 826 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
91c4e9b1
MH
827
828 if (!rp->status)
829 hdev->inq_tx_power = rp->tx_power;
d5859e22
JH
830}
831
980e1a53
JH
832static void hci_cc_pin_code_reply(struct hci_dev *hdev, struct sk_buff *skb)
833{
834 struct hci_rp_pin_code_reply *rp = (void *) skb->data;
835 struct hci_cp_pin_code_reply *cp;
836 struct hci_conn *conn;
837
9f1db00c 838 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
980e1a53 839
56e5cb86
JH
840 hci_dev_lock(hdev);
841
a8b2d5c2 842 if (test_bit(HCI_MGMT, &hdev->dev_flags))
744cf19e 843 mgmt_pin_code_reply_complete(hdev, &rp->bdaddr, rp->status);
980e1a53 844
fa1bd918 845 if (rp->status)
56e5cb86 846 goto unlock;
980e1a53
JH
847
848 cp = hci_sent_cmd_data(hdev, HCI_OP_PIN_CODE_REPLY);
849 if (!cp)
56e5cb86 850 goto unlock;
980e1a53
JH
851
852 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
853 if (conn)
854 conn->pin_length = cp->pin_len;
56e5cb86
JH
855
856unlock:
857 hci_dev_unlock(hdev);
980e1a53
JH
858}
859
860static void hci_cc_pin_code_neg_reply(struct hci_dev *hdev, struct sk_buff *skb)
861{
862 struct hci_rp_pin_code_neg_reply *rp = (void *) skb->data;
863
9f1db00c 864 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
980e1a53 865
56e5cb86
JH
866 hci_dev_lock(hdev);
867
a8b2d5c2 868 if (test_bit(HCI_MGMT, &hdev->dev_flags))
744cf19e 869 mgmt_pin_code_neg_reply_complete(hdev, &rp->bdaddr,
807deac2 870 rp->status);
56e5cb86
JH
871
872 hci_dev_unlock(hdev);
980e1a53 873}
56e5cb86 874
6ed58ec5
VT
875static void hci_cc_le_read_buffer_size(struct hci_dev *hdev,
876 struct sk_buff *skb)
877{
878 struct hci_rp_le_read_buffer_size *rp = (void *) skb->data;
879
9f1db00c 880 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
6ed58ec5
VT
881
882 if (rp->status)
883 return;
884
885 hdev->le_mtu = __le16_to_cpu(rp->le_mtu);
886 hdev->le_pkts = rp->le_max_pkt;
887
888 hdev->le_cnt = hdev->le_pkts;
889
890 BT_DBG("%s le mtu %d:%d", hdev->name, hdev->le_mtu, hdev->le_pkts);
6ed58ec5 891}
980e1a53 892
60e77321
JH
893static void hci_cc_le_read_local_features(struct hci_dev *hdev,
894 struct sk_buff *skb)
895{
896 struct hci_rp_le_read_local_features *rp = (void *) skb->data;
897
898 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
899
900 if (!rp->status)
901 memcpy(hdev->le_features, rp->features, 8);
60e77321
JH
902}
903
8fa19098
JH
904static void hci_cc_le_read_adv_tx_power(struct hci_dev *hdev,
905 struct sk_buff *skb)
906{
907 struct hci_rp_le_read_adv_tx_power *rp = (void *) skb->data;
908
909 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
910
04b4edcb 911 if (!rp->status)
8fa19098 912 hdev->adv_tx_power = rp->tx_power;
8fa19098
JH
913}
914
a5c29683
JH
915static void hci_cc_user_confirm_reply(struct hci_dev *hdev, struct sk_buff *skb)
916{
917 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
918
9f1db00c 919 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a5c29683 920
56e5cb86
JH
921 hci_dev_lock(hdev);
922
a8b2d5c2 923 if (test_bit(HCI_MGMT, &hdev->dev_flags))
04124681
GP
924 mgmt_user_confirm_reply_complete(hdev, &rp->bdaddr, ACL_LINK, 0,
925 rp->status);
56e5cb86
JH
926
927 hci_dev_unlock(hdev);
a5c29683
JH
928}
929
930static void hci_cc_user_confirm_neg_reply(struct hci_dev *hdev,
807deac2 931 struct sk_buff *skb)
a5c29683
JH
932{
933 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
934
9f1db00c 935 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a5c29683 936
56e5cb86
JH
937 hci_dev_lock(hdev);
938
a8b2d5c2 939 if (test_bit(HCI_MGMT, &hdev->dev_flags))
744cf19e 940 mgmt_user_confirm_neg_reply_complete(hdev, &rp->bdaddr,
04124681 941 ACL_LINK, 0, rp->status);
56e5cb86
JH
942
943 hci_dev_unlock(hdev);
a5c29683
JH
944}
945
1143d458
BG
946static void hci_cc_user_passkey_reply(struct hci_dev *hdev, struct sk_buff *skb)
947{
948 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
949
9f1db00c 950 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143d458
BG
951
952 hci_dev_lock(hdev);
953
a8b2d5c2 954 if (test_bit(HCI_MGMT, &hdev->dev_flags))
272d90df 955 mgmt_user_passkey_reply_complete(hdev, &rp->bdaddr, ACL_LINK,
04124681 956 0, rp->status);
1143d458
BG
957
958 hci_dev_unlock(hdev);
959}
960
961static void hci_cc_user_passkey_neg_reply(struct hci_dev *hdev,
807deac2 962 struct sk_buff *skb)
1143d458
BG
963{
964 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
965
9f1db00c 966 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143d458
BG
967
968 hci_dev_lock(hdev);
969
a8b2d5c2 970 if (test_bit(HCI_MGMT, &hdev->dev_flags))
1143d458 971 mgmt_user_passkey_neg_reply_complete(hdev, &rp->bdaddr,
04124681 972 ACL_LINK, 0, rp->status);
1143d458
BG
973
974 hci_dev_unlock(hdev);
975}
976
4d2d2796
MH
977static void hci_cc_read_local_oob_data(struct hci_dev *hdev,
978 struct sk_buff *skb)
c35938b2
SJ
979{
980 struct hci_rp_read_local_oob_data *rp = (void *) skb->data;
981
9f1db00c 982 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
c35938b2 983
56e5cb86 984 hci_dev_lock(hdev);
4d2d2796
MH
985 mgmt_read_local_oob_data_complete(hdev, rp->hash, rp->randomizer,
986 NULL, NULL, rp->status);
987 hci_dev_unlock(hdev);
988}
989
990static void hci_cc_read_local_oob_ext_data(struct hci_dev *hdev,
991 struct sk_buff *skb)
992{
993 struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data;
994
995 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
996
997 hci_dev_lock(hdev);
998 mgmt_read_local_oob_data_complete(hdev, rp->hash192, rp->randomizer192,
999 rp->hash256, rp->randomizer256,
1000 rp->status);
56e5cb86 1001 hci_dev_unlock(hdev);
c35938b2
SJ
1002}
1003
7a4cd51d
MH
1004
1005static void hci_cc_le_set_random_addr(struct hci_dev *hdev, struct sk_buff *skb)
1006{
1007 __u8 status = *((__u8 *) skb->data);
1008 bdaddr_t *sent;
1009
1010 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1011
1012 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_RANDOM_ADDR);
1013 if (!sent)
1014 return;
1015
1016 hci_dev_lock(hdev);
1017
1018 if (!status)
1019 bacpy(&hdev->random_addr, sent);
1020
1021 hci_dev_unlock(hdev);
1022}
1023
c1d5dc4a
JH
1024static void hci_cc_le_set_adv_enable(struct hci_dev *hdev, struct sk_buff *skb)
1025{
1026 __u8 *sent, status = *((__u8 *) skb->data);
1027
1028 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1029
1030 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_ENABLE);
1031 if (!sent)
1032 return;
1033
3c857757
JH
1034 if (status)
1035 return;
1036
c1d5dc4a
JH
1037 hci_dev_lock(hdev);
1038
3c857757
JH
1039 /* If we're doing connection initation as peripheral. Set a
1040 * timeout in case something goes wrong.
1041 */
1042 if (*sent) {
1043 struct hci_conn *conn;
1044
1045 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
1046 if (conn)
1047 queue_delayed_work(hdev->workqueue,
1048 &conn->le_conn_timeout,
1049 HCI_LE_CONN_TIMEOUT);
1050 }
1051
1052 mgmt_advertising(hdev, *sent);
c1d5dc4a 1053
04b4edcb 1054 hci_dev_unlock(hdev);
c1d5dc4a
JH
1055}
1056
533553f8
MH
1057static void hci_cc_le_set_scan_param(struct hci_dev *hdev, struct sk_buff *skb)
1058{
1059 struct hci_cp_le_set_scan_param *cp;
1060 __u8 status = *((__u8 *) skb->data);
1061
1062 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1063
1064 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_PARAM);
1065 if (!cp)
1066 return;
1067
1068 hci_dev_lock(hdev);
1069
1070 if (!status)
1071 hdev->le_scan_type = cp->type;
1072
1073 hci_dev_unlock(hdev);
1074}
1075
b9a6328f
JH
1076static bool has_pending_adv_report(struct hci_dev *hdev)
1077{
1078 struct discovery_state *d = &hdev->discovery;
1079
1080 return bacmp(&d->last_adv_addr, BDADDR_ANY);
1081}
1082
1083static void clear_pending_adv_report(struct hci_dev *hdev)
1084{
1085 struct discovery_state *d = &hdev->discovery;
1086
1087 bacpy(&d->last_adv_addr, BDADDR_ANY);
1088 d->last_adv_data_len = 0;
1089}
1090
1091static void store_pending_adv_report(struct hci_dev *hdev, bdaddr_t *bdaddr,
c70a7e4c
MH
1092 u8 bdaddr_type, s8 rssi, u32 flags,
1093 u8 *data, u8 len)
b9a6328f
JH
1094{
1095 struct discovery_state *d = &hdev->discovery;
1096
1097 bacpy(&d->last_adv_addr, bdaddr);
1098 d->last_adv_addr_type = bdaddr_type;
ff5cd29f 1099 d->last_adv_rssi = rssi;
c70a7e4c 1100 d->last_adv_flags = flags;
b9a6328f
JH
1101 memcpy(d->last_adv_data, data, len);
1102 d->last_adv_data_len = len;
1103}
1104
eb9d91f5 1105static void hci_cc_le_set_scan_enable(struct hci_dev *hdev,
807deac2 1106 struct sk_buff *skb)
eb9d91f5
AG
1107{
1108 struct hci_cp_le_set_scan_enable *cp;
1109 __u8 status = *((__u8 *) skb->data);
1110
9f1db00c 1111 BT_DBG("%s status 0x%2.2x", hdev->name, status);
eb9d91f5 1112
eb9d91f5
AG
1113 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_ENABLE);
1114 if (!cp)
1115 return;
1116
3fd319b8
AG
1117 if (status)
1118 return;
1119
68a8aea4 1120 switch (cp->enable) {
76a388be 1121 case LE_SCAN_ENABLE:
d23264a8 1122 set_bit(HCI_LE_SCAN, &hdev->dev_flags);
b9a6328f
JH
1123 if (hdev->le_scan_type == LE_SCAN_ACTIVE)
1124 clear_pending_adv_report(hdev);
68a8aea4
AE
1125 break;
1126
76a388be 1127 case LE_SCAN_DISABLE:
b9a6328f
JH
1128 /* We do this here instead of when setting DISCOVERY_STOPPED
1129 * since the latter would potentially require waiting for
1130 * inquiry to stop too.
1131 */
1132 if (has_pending_adv_report(hdev)) {
1133 struct discovery_state *d = &hdev->discovery;
1134
1135 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
ab0aa433 1136 d->last_adv_addr_type, NULL,
c70a7e4c 1137 d->last_adv_rssi, d->last_adv_flags,
ab0aa433 1138 d->last_adv_data,
b9a6328f
JH
1139 d->last_adv_data_len, NULL, 0);
1140 }
1141
317ac8cb
JH
1142 /* Cancel this timer so that we don't try to disable scanning
1143 * when it's already disabled.
1144 */
1145 cancel_delayed_work(&hdev->le_scan_disable);
1146
d23264a8 1147 clear_bit(HCI_LE_SCAN, &hdev->dev_flags);
81ad6fd9
JH
1148 /* The HCI_LE_SCAN_INTERRUPTED flag indicates that we
1149 * interrupted scanning due to a connect request. Mark
1150 * therefore discovery as stopped.
1151 */
1152 if (test_and_clear_bit(HCI_LE_SCAN_INTERRUPTED,
1153 &hdev->dev_flags))
1154 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
68a8aea4
AE
1155 break;
1156
1157 default:
1158 BT_ERR("Used reserved LE_Scan_Enable param %d", cp->enable);
1159 break;
35815085 1160 }
eb9d91f5
AG
1161}
1162
cf1d081f
JH
1163static void hci_cc_le_read_white_list_size(struct hci_dev *hdev,
1164 struct sk_buff *skb)
1165{
1166 struct hci_rp_le_read_white_list_size *rp = (void *) skb->data;
1167
1168 BT_DBG("%s status 0x%2.2x size %u", hdev->name, rp->status, rp->size);
1169
1170 if (!rp->status)
1171 hdev->le_white_list_size = rp->size;
cf1d081f
JH
1172}
1173
0f36b589
MH
1174static void hci_cc_le_clear_white_list(struct hci_dev *hdev,
1175 struct sk_buff *skb)
1176{
1177 __u8 status = *((__u8 *) skb->data);
1178
1179 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1180
1181 if (!status)
1182 hci_white_list_clear(hdev);
1183}
1184
1185static void hci_cc_le_add_to_white_list(struct hci_dev *hdev,
1186 struct sk_buff *skb)
1187{
1188 struct hci_cp_le_add_to_white_list *sent;
1189 __u8 status = *((__u8 *) skb->data);
1190
1191 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1192
1193 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_ADD_TO_WHITE_LIST);
1194 if (!sent)
1195 return;
1196
1197 if (!status)
1198 hci_white_list_add(hdev, &sent->bdaddr, sent->bdaddr_type);
1199}
1200
1201static void hci_cc_le_del_from_white_list(struct hci_dev *hdev,
1202 struct sk_buff *skb)
1203{
1204 struct hci_cp_le_del_from_white_list *sent;
1205 __u8 status = *((__u8 *) skb->data);
1206
1207 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1208
1209 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_DEL_FROM_WHITE_LIST);
1210 if (!sent)
1211 return;
1212
1213 if (!status)
1214 hci_white_list_del(hdev, &sent->bdaddr, sent->bdaddr_type);
1215}
1216
9b008c04
JH
1217static void hci_cc_le_read_supported_states(struct hci_dev *hdev,
1218 struct sk_buff *skb)
1219{
1220 struct hci_rp_le_read_supported_states *rp = (void *) skb->data;
1221
1222 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1223
1224 if (!rp->status)
1225 memcpy(hdev->le_states, rp->le_states, 8);
9b008c04
JH
1226}
1227
6039aa73
GP
1228static void hci_cc_write_le_host_supported(struct hci_dev *hdev,
1229 struct sk_buff *skb)
f9b49306 1230{
06199cf8 1231 struct hci_cp_write_le_host_supported *sent;
f9b49306
AG
1232 __u8 status = *((__u8 *) skb->data);
1233
9f1db00c 1234 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f9b49306 1235
06199cf8 1236 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED);
8f984dfa 1237 if (!sent)
f9b49306
AG
1238 return;
1239
8f984dfa 1240 if (!status) {
416a4ae5 1241 if (sent->le) {
cad718ed 1242 hdev->features[1][0] |= LMP_HOST_LE;
416a4ae5
JH
1243 set_bit(HCI_LE_ENABLED, &hdev->dev_flags);
1244 } else {
cad718ed 1245 hdev->features[1][0] &= ~LMP_HOST_LE;
416a4ae5 1246 clear_bit(HCI_LE_ENABLED, &hdev->dev_flags);
f3d3444a 1247 clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
416a4ae5 1248 }
53b2caab
JH
1249
1250 if (sent->simul)
cad718ed 1251 hdev->features[1][0] |= LMP_HOST_LE_BREDR;
53b2caab 1252 else
cad718ed 1253 hdev->features[1][0] &= ~LMP_HOST_LE_BREDR;
8f984dfa 1254 }
f9b49306
AG
1255}
1256
56ed2cb8
JH
1257static void hci_cc_set_adv_param(struct hci_dev *hdev, struct sk_buff *skb)
1258{
1259 struct hci_cp_le_set_adv_param *cp;
1260 u8 status = *((u8 *) skb->data);
1261
1262 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1263
1264 if (status)
1265 return;
1266
1267 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_PARAM);
1268 if (!cp)
1269 return;
1270
1271 hci_dev_lock(hdev);
1272 hdev->adv_addr_type = cp->own_address_type;
1273 hci_dev_unlock(hdev);
1274}
1275
93c284ee
AE
1276static void hci_cc_write_remote_amp_assoc(struct hci_dev *hdev,
1277 struct sk_buff *skb)
1278{
1279 struct hci_rp_write_remote_amp_assoc *rp = (void *) skb->data;
1280
1281 BT_DBG("%s status 0x%2.2x phy_handle 0x%2.2x",
1282 hdev->name, rp->status, rp->phy_handle);
1283
1284 if (rp->status)
1285 return;
1286
1287 amp_write_rem_assoc_continue(hdev, rp->phy_handle);
1288}
1289
5ae76a94
AK
1290static void hci_cc_read_rssi(struct hci_dev *hdev, struct sk_buff *skb)
1291{
1292 struct hci_rp_read_rssi *rp = (void *) skb->data;
1293 struct hci_conn *conn;
1294
1295 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1296
1297 if (rp->status)
1298 return;
1299
1300 hci_dev_lock(hdev);
1301
1302 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
1303 if (conn)
1304 conn->rssi = rp->rssi;
1305
1306 hci_dev_unlock(hdev);
1307}
1308
5a134fae
AK
1309static void hci_cc_read_tx_power(struct hci_dev *hdev, struct sk_buff *skb)
1310{
1311 struct hci_cp_read_tx_power *sent;
1312 struct hci_rp_read_tx_power *rp = (void *) skb->data;
1313 struct hci_conn *conn;
1314
1315 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1316
1317 if (rp->status)
1318 return;
1319
1320 sent = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
1321 if (!sent)
1322 return;
1323
1324 hci_dev_lock(hdev);
1325
1326 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
d0455ed9
AK
1327 if (!conn)
1328 goto unlock;
1329
1330 switch (sent->type) {
1331 case 0x00:
5a134fae 1332 conn->tx_power = rp->tx_power;
d0455ed9
AK
1333 break;
1334 case 0x01:
1335 conn->max_tx_power = rp->tx_power;
1336 break;
1337 }
5a134fae 1338
d0455ed9 1339unlock:
5a134fae
AK
1340 hci_dev_unlock(hdev);
1341}
1342
6039aa73 1343static void hci_cs_inquiry(struct hci_dev *hdev, __u8 status)
a9de9248 1344{
9f1db00c 1345 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
1346
1347 if (status) {
a9de9248 1348 hci_conn_check_pending(hdev);
314b2381
JH
1349 return;
1350 }
1351
89352e7d 1352 set_bit(HCI_INQUIRY, &hdev->flags);
1da177e4
LT
1353}
1354
6039aa73 1355static void hci_cs_create_conn(struct hci_dev *hdev, __u8 status)
1da177e4 1356{
a9de9248 1357 struct hci_cp_create_conn *cp;
1da177e4 1358 struct hci_conn *conn;
1da177e4 1359
9f1db00c 1360 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
1361
1362 cp = hci_sent_cmd_data(hdev, HCI_OP_CREATE_CONN);
1da177e4
LT
1363 if (!cp)
1364 return;
1365
1366 hci_dev_lock(hdev);
1367
1368 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1369
6ed93dc6 1370 BT_DBG("%s bdaddr %pMR hcon %p", hdev->name, &cp->bdaddr, conn);
1da177e4
LT
1371
1372 if (status) {
1373 if (conn && conn->state == BT_CONNECT) {
4c67bc74
MH
1374 if (status != 0x0c || conn->attempt > 2) {
1375 conn->state = BT_CLOSED;
1376 hci_proto_connect_cfm(conn, status);
1377 hci_conn_del(conn);
1378 } else
1379 conn->state = BT_CONNECT2;
1da177e4
LT
1380 }
1381 } else {
1382 if (!conn) {
1383 conn = hci_conn_add(hdev, ACL_LINK, &cp->bdaddr);
1384 if (conn) {
a0c808b3 1385 conn->out = true;
4dae2798 1386 set_bit(HCI_CONN_MASTER, &conn->flags);
1da177e4 1387 } else
893ef971 1388 BT_ERR("No memory for new connection");
1da177e4
LT
1389 }
1390 }
1391
1392 hci_dev_unlock(hdev);
1393}
1394
a9de9248 1395static void hci_cs_add_sco(struct hci_dev *hdev, __u8 status)
1da177e4 1396{
a9de9248
MH
1397 struct hci_cp_add_sco *cp;
1398 struct hci_conn *acl, *sco;
1399 __u16 handle;
1da177e4 1400
9f1db00c 1401 BT_DBG("%s status 0x%2.2x", hdev->name, status);
b6a0dc82 1402
a9de9248
MH
1403 if (!status)
1404 return;
1da177e4 1405
a9de9248
MH
1406 cp = hci_sent_cmd_data(hdev, HCI_OP_ADD_SCO);
1407 if (!cp)
1408 return;
1da177e4 1409
a9de9248 1410 handle = __le16_to_cpu(cp->handle);
1da177e4 1411
9f1db00c 1412 BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
1da177e4 1413
a9de9248 1414 hci_dev_lock(hdev);
1da177e4 1415
a9de9248 1416 acl = hci_conn_hash_lookup_handle(hdev, handle);
5a08ecce
AE
1417 if (acl) {
1418 sco = acl->link;
1419 if (sco) {
1420 sco->state = BT_CLOSED;
1da177e4 1421
5a08ecce
AE
1422 hci_proto_connect_cfm(sco, status);
1423 hci_conn_del(sco);
1424 }
a9de9248 1425 }
1da177e4 1426
a9de9248
MH
1427 hci_dev_unlock(hdev);
1428}
1da177e4 1429
f8558555
MH
1430static void hci_cs_auth_requested(struct hci_dev *hdev, __u8 status)
1431{
1432 struct hci_cp_auth_requested *cp;
1433 struct hci_conn *conn;
1434
9f1db00c 1435 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f8558555
MH
1436
1437 if (!status)
1438 return;
1439
1440 cp = hci_sent_cmd_data(hdev, HCI_OP_AUTH_REQUESTED);
1441 if (!cp)
1442 return;
1443
1444 hci_dev_lock(hdev);
1445
1446 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1447 if (conn) {
1448 if (conn->state == BT_CONFIG) {
1449 hci_proto_connect_cfm(conn, status);
76a68ba0 1450 hci_conn_drop(conn);
f8558555
MH
1451 }
1452 }
1453
1454 hci_dev_unlock(hdev);
1455}
1456
1457static void hci_cs_set_conn_encrypt(struct hci_dev *hdev, __u8 status)
1458{
1459 struct hci_cp_set_conn_encrypt *cp;
1460 struct hci_conn *conn;
1461
9f1db00c 1462 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f8558555
MH
1463
1464 if (!status)
1465 return;
1466
1467 cp = hci_sent_cmd_data(hdev, HCI_OP_SET_CONN_ENCRYPT);
1468 if (!cp)
1469 return;
1470
1471 hci_dev_lock(hdev);
1472
1473 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1474 if (conn) {
1475 if (conn->state == BT_CONFIG) {
1476 hci_proto_connect_cfm(conn, status);
76a68ba0 1477 hci_conn_drop(conn);
f8558555
MH
1478 }
1479 }
1480
1481 hci_dev_unlock(hdev);
1482}
1483
127178d2 1484static int hci_outgoing_auth_needed(struct hci_dev *hdev,
807deac2 1485 struct hci_conn *conn)
392599b9 1486{
392599b9
JH
1487 if (conn->state != BT_CONFIG || !conn->out)
1488 return 0;
1489
765c2a96 1490 if (conn->pending_sec_level == BT_SECURITY_SDP)
392599b9
JH
1491 return 0;
1492
1493 /* Only request authentication for SSP connections or non-SSP
264b8b4e
JH
1494 * devices with sec_level MEDIUM or HIGH or if MITM protection
1495 * is requested.
1496 */
807deac2 1497 if (!hci_conn_ssp_enabled(conn) && !(conn->auth_type & 0x01) &&
7e3691e1 1498 conn->pending_sec_level != BT_SECURITY_FIPS &&
264b8b4e
JH
1499 conn->pending_sec_level != BT_SECURITY_HIGH &&
1500 conn->pending_sec_level != BT_SECURITY_MEDIUM)
392599b9
JH
1501 return 0;
1502
392599b9
JH
1503 return 1;
1504}
1505
6039aa73 1506static int hci_resolve_name(struct hci_dev *hdev,
04124681 1507 struct inquiry_entry *e)
30dc78e1
JH
1508{
1509 struct hci_cp_remote_name_req cp;
1510
1511 memset(&cp, 0, sizeof(cp));
1512
1513 bacpy(&cp.bdaddr, &e->data.bdaddr);
1514 cp.pscan_rep_mode = e->data.pscan_rep_mode;
1515 cp.pscan_mode = e->data.pscan_mode;
1516 cp.clock_offset = e->data.clock_offset;
1517
1518 return hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
1519}
1520
b644ba33 1521static bool hci_resolve_next_name(struct hci_dev *hdev)
30dc78e1
JH
1522{
1523 struct discovery_state *discov = &hdev->discovery;
1524 struct inquiry_entry *e;
1525
b644ba33
JH
1526 if (list_empty(&discov->resolve))
1527 return false;
1528
1529 e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
c810089c
RM
1530 if (!e)
1531 return false;
1532
b644ba33
JH
1533 if (hci_resolve_name(hdev, e) == 0) {
1534 e->name_state = NAME_PENDING;
1535 return true;
1536 }
1537
1538 return false;
1539}
1540
1541static void hci_check_pending_name(struct hci_dev *hdev, struct hci_conn *conn,
04124681 1542 bdaddr_t *bdaddr, u8 *name, u8 name_len)
b644ba33
JH
1543{
1544 struct discovery_state *discov = &hdev->discovery;
1545 struct inquiry_entry *e;
1546
1547 if (conn && !test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
04124681
GP
1548 mgmt_device_connected(hdev, bdaddr, ACL_LINK, 0x00, 0, name,
1549 name_len, conn->dev_class);
b644ba33
JH
1550
1551 if (discov->state == DISCOVERY_STOPPED)
1552 return;
1553
30dc78e1
JH
1554 if (discov->state == DISCOVERY_STOPPING)
1555 goto discov_complete;
1556
1557 if (discov->state != DISCOVERY_RESOLVING)
1558 return;
1559
1560 e = hci_inquiry_cache_lookup_resolve(hdev, bdaddr, NAME_PENDING);
7cc8380e
RM
1561 /* If the device was not found in a list of found devices names of which
1562 * are pending. there is no need to continue resolving a next name as it
1563 * will be done upon receiving another Remote Name Request Complete
1564 * Event */
1565 if (!e)
1566 return;
1567
1568 list_del(&e->list);
1569 if (name) {
30dc78e1 1570 e->name_state = NAME_KNOWN;
7cc8380e
RM
1571 mgmt_remote_name(hdev, bdaddr, ACL_LINK, 0x00,
1572 e->data.rssi, name, name_len);
c3e7c0d9
RM
1573 } else {
1574 e->name_state = NAME_NOT_KNOWN;
30dc78e1
JH
1575 }
1576
b644ba33 1577 if (hci_resolve_next_name(hdev))
30dc78e1 1578 return;
30dc78e1
JH
1579
1580discov_complete:
1581 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
1582}
1583
a9de9248
MH
1584static void hci_cs_remote_name_req(struct hci_dev *hdev, __u8 status)
1585{
127178d2
JH
1586 struct hci_cp_remote_name_req *cp;
1587 struct hci_conn *conn;
1588
9f1db00c 1589 BT_DBG("%s status 0x%2.2x", hdev->name, status);
127178d2
JH
1590
1591 /* If successful wait for the name req complete event before
1592 * checking for the need to do authentication */
1593 if (!status)
1594 return;
1595
1596 cp = hci_sent_cmd_data(hdev, HCI_OP_REMOTE_NAME_REQ);
1597 if (!cp)
1598 return;
1599
1600 hci_dev_lock(hdev);
1601
b644ba33
JH
1602 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1603
a8b2d5c2 1604 if (test_bit(HCI_MGMT, &hdev->dev_flags))
b644ba33 1605 hci_check_pending_name(hdev, conn, &cp->bdaddr, NULL, 0);
30dc78e1 1606
79c6c70c
JH
1607 if (!conn)
1608 goto unlock;
1609
1610 if (!hci_outgoing_auth_needed(hdev, conn))
1611 goto unlock;
1612
51a8efd7 1613 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
c1f23a2b
JB
1614 struct hci_cp_auth_requested auth_cp;
1615
1616 auth_cp.handle = __cpu_to_le16(conn->handle);
1617 hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED,
1618 sizeof(auth_cp), &auth_cp);
127178d2
JH
1619 }
1620
79c6c70c 1621unlock:
127178d2 1622 hci_dev_unlock(hdev);
a9de9248 1623}
1da177e4 1624
769be974
MH
1625static void hci_cs_read_remote_features(struct hci_dev *hdev, __u8 status)
1626{
1627 struct hci_cp_read_remote_features *cp;
1628 struct hci_conn *conn;
1629
9f1db00c 1630 BT_DBG("%s status 0x%2.2x", hdev->name, status);
769be974
MH
1631
1632 if (!status)
1633 return;
1634
1635 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_FEATURES);
1636 if (!cp)
1637 return;
1638
1639 hci_dev_lock(hdev);
1640
1641 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1642 if (conn) {
1643 if (conn->state == BT_CONFIG) {
769be974 1644 hci_proto_connect_cfm(conn, status);
76a68ba0 1645 hci_conn_drop(conn);
769be974
MH
1646 }
1647 }
1648
1649 hci_dev_unlock(hdev);
1650}
1651
1652static void hci_cs_read_remote_ext_features(struct hci_dev *hdev, __u8 status)
1653{
1654 struct hci_cp_read_remote_ext_features *cp;
1655 struct hci_conn *conn;
1656
9f1db00c 1657 BT_DBG("%s status 0x%2.2x", hdev->name, status);
769be974
MH
1658
1659 if (!status)
1660 return;
1661
1662 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES);
1663 if (!cp)
1664 return;
1665
1666 hci_dev_lock(hdev);
1667
1668 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1669 if (conn) {
1670 if (conn->state == BT_CONFIG) {
769be974 1671 hci_proto_connect_cfm(conn, status);
76a68ba0 1672 hci_conn_drop(conn);
769be974
MH
1673 }
1674 }
1675
1676 hci_dev_unlock(hdev);
1677}
1678
a9de9248
MH
1679static void hci_cs_setup_sync_conn(struct hci_dev *hdev, __u8 status)
1680{
b6a0dc82
MH
1681 struct hci_cp_setup_sync_conn *cp;
1682 struct hci_conn *acl, *sco;
1683 __u16 handle;
1684
9f1db00c 1685 BT_DBG("%s status 0x%2.2x", hdev->name, status);
b6a0dc82
MH
1686
1687 if (!status)
1688 return;
1689
1690 cp = hci_sent_cmd_data(hdev, HCI_OP_SETUP_SYNC_CONN);
1691 if (!cp)
1692 return;
1693
1694 handle = __le16_to_cpu(cp->handle);
1695
9f1db00c 1696 BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
b6a0dc82
MH
1697
1698 hci_dev_lock(hdev);
1699
1700 acl = hci_conn_hash_lookup_handle(hdev, handle);
5a08ecce
AE
1701 if (acl) {
1702 sco = acl->link;
1703 if (sco) {
1704 sco->state = BT_CLOSED;
b6a0dc82 1705
5a08ecce
AE
1706 hci_proto_connect_cfm(sco, status);
1707 hci_conn_del(sco);
1708 }
b6a0dc82
MH
1709 }
1710
1711 hci_dev_unlock(hdev);
1da177e4
LT
1712}
1713
a9de9248 1714static void hci_cs_sniff_mode(struct hci_dev *hdev, __u8 status)
1da177e4 1715{
a9de9248
MH
1716 struct hci_cp_sniff_mode *cp;
1717 struct hci_conn *conn;
1da177e4 1718
9f1db00c 1719 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 1720
a9de9248
MH
1721 if (!status)
1722 return;
04837f64 1723
a9de9248
MH
1724 cp = hci_sent_cmd_data(hdev, HCI_OP_SNIFF_MODE);
1725 if (!cp)
1726 return;
04837f64 1727
a9de9248 1728 hci_dev_lock(hdev);
04837f64 1729
a9de9248 1730 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
e73439d8 1731 if (conn) {
51a8efd7 1732 clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
04837f64 1733
51a8efd7 1734 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8
MH
1735 hci_sco_setup(conn, status);
1736 }
1737
a9de9248
MH
1738 hci_dev_unlock(hdev);
1739}
04837f64 1740
a9de9248
MH
1741static void hci_cs_exit_sniff_mode(struct hci_dev *hdev, __u8 status)
1742{
1743 struct hci_cp_exit_sniff_mode *cp;
1744 struct hci_conn *conn;
04837f64 1745
9f1db00c 1746 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 1747
a9de9248
MH
1748 if (!status)
1749 return;
04837f64 1750
a9de9248
MH
1751 cp = hci_sent_cmd_data(hdev, HCI_OP_EXIT_SNIFF_MODE);
1752 if (!cp)
1753 return;
04837f64 1754
a9de9248 1755 hci_dev_lock(hdev);
1da177e4 1756
a9de9248 1757 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
e73439d8 1758 if (conn) {
51a8efd7 1759 clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
1da177e4 1760
51a8efd7 1761 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8
MH
1762 hci_sco_setup(conn, status);
1763 }
1764
a9de9248 1765 hci_dev_unlock(hdev);
1da177e4
LT
1766}
1767
88c3df13
JH
1768static void hci_cs_disconnect(struct hci_dev *hdev, u8 status)
1769{
1770 struct hci_cp_disconnect *cp;
1771 struct hci_conn *conn;
1772
1773 if (!status)
1774 return;
1775
1776 cp = hci_sent_cmd_data(hdev, HCI_OP_DISCONNECT);
1777 if (!cp)
1778 return;
1779
1780 hci_dev_lock(hdev);
1781
1782 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1783 if (conn)
1784 mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
04124681 1785 conn->dst_type, status);
88c3df13
JH
1786
1787 hci_dev_unlock(hdev);
1788}
1789
a02226d6
AE
1790static void hci_cs_create_phylink(struct hci_dev *hdev, u8 status)
1791{
93c284ee
AE
1792 struct hci_cp_create_phy_link *cp;
1793
a02226d6 1794 BT_DBG("%s status 0x%2.2x", hdev->name, status);
93c284ee 1795
93c284ee
AE
1796 cp = hci_sent_cmd_data(hdev, HCI_OP_CREATE_PHY_LINK);
1797 if (!cp)
1798 return;
1799
e58917b9
AE
1800 hci_dev_lock(hdev);
1801
1802 if (status) {
1803 struct hci_conn *hcon;
1804
1805 hcon = hci_conn_hash_lookup_handle(hdev, cp->phy_handle);
1806 if (hcon)
1807 hci_conn_del(hcon);
1808 } else {
1809 amp_write_remote_assoc(hdev, cp->phy_handle);
1810 }
1811
1812 hci_dev_unlock(hdev);
a02226d6
AE
1813}
1814
0b26ab9d
AE
1815static void hci_cs_accept_phylink(struct hci_dev *hdev, u8 status)
1816{
1817 struct hci_cp_accept_phy_link *cp;
1818
1819 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1820
1821 if (status)
1822 return;
1823
1824 cp = hci_sent_cmd_data(hdev, HCI_OP_ACCEPT_PHY_LINK);
1825 if (!cp)
1826 return;
1827
1828 amp_write_remote_assoc(hdev, cp->phy_handle);
1829}
1830
cb1d68f7
JH
1831static void hci_cs_le_create_conn(struct hci_dev *hdev, u8 status)
1832{
1833 struct hci_cp_le_create_conn *cp;
1834 struct hci_conn *conn;
1835
1836 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1837
1838 /* All connection failure handling is taken care of by the
1839 * hci_le_conn_failed function which is triggered by the HCI
1840 * request completion callbacks used for connecting.
1841 */
1842 if (status)
1843 return;
1844
1845 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_CREATE_CONN);
1846 if (!cp)
1847 return;
1848
1849 hci_dev_lock(hdev);
1850
1851 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->peer_addr);
1852 if (!conn)
1853 goto unlock;
1854
1855 /* Store the initiator and responder address information which
1856 * is needed for SMP. These values will not change during the
1857 * lifetime of the connection.
1858 */
1859 conn->init_addr_type = cp->own_address_type;
1860 if (cp->own_address_type == ADDR_LE_DEV_RANDOM)
1861 bacpy(&conn->init_addr, &hdev->random_addr);
1862 else
1863 bacpy(&conn->init_addr, &hdev->bdaddr);
1864
1865 conn->resp_addr_type = cp->peer_addr_type;
1866 bacpy(&conn->resp_addr, &cp->peer_addr);
1867
9489eca4
JH
1868 /* We don't want the connection attempt to stick around
1869 * indefinitely since LE doesn't have a page timeout concept
1870 * like BR/EDR. Set a timer for any connection that doesn't use
1871 * the white list for connecting.
1872 */
1873 if (cp->filter_policy == HCI_LE_USE_PEER_ADDR)
1874 queue_delayed_work(conn->hdev->workqueue,
1875 &conn->le_conn_timeout,
1876 HCI_LE_CONN_TIMEOUT);
1877
cb1d68f7
JH
1878unlock:
1879 hci_dev_unlock(hdev);
1880}
1881
81d0c8ad
JH
1882static void hci_cs_le_start_enc(struct hci_dev *hdev, u8 status)
1883{
1884 struct hci_cp_le_start_enc *cp;
1885 struct hci_conn *conn;
1886
1887 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1888
1889 if (!status)
1890 return;
1891
1892 hci_dev_lock(hdev);
1893
1894 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_START_ENC);
1895 if (!cp)
1896 goto unlock;
1897
1898 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1899 if (!conn)
1900 goto unlock;
1901
1902 if (conn->state != BT_CONNECTED)
1903 goto unlock;
1904
1905 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
1906 hci_conn_drop(conn);
1907
1908unlock:
1909 hci_dev_unlock(hdev);
1910}
1911
6039aa73 1912static void hci_inquiry_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4
LT
1913{
1914 __u8 status = *((__u8 *) skb->data);
30dc78e1
JH
1915 struct discovery_state *discov = &hdev->discovery;
1916 struct inquiry_entry *e;
1da177e4 1917
9f1db00c 1918 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 1919
a9de9248 1920 hci_conn_check_pending(hdev);
89352e7d
AG
1921
1922 if (!test_and_clear_bit(HCI_INQUIRY, &hdev->flags))
1923 return;
1924
4e857c58 1925 smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
3e13fa1e
AG
1926 wake_up_bit(&hdev->flags, HCI_INQUIRY);
1927
a8b2d5c2 1928 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
30dc78e1
JH
1929 return;
1930
56e5cb86 1931 hci_dev_lock(hdev);
30dc78e1 1932
343f935b 1933 if (discov->state != DISCOVERY_FINDING)
30dc78e1
JH
1934 goto unlock;
1935
1936 if (list_empty(&discov->resolve)) {
1937 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
1938 goto unlock;
1939 }
1940
1941 e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
1942 if (e && hci_resolve_name(hdev, e) == 0) {
1943 e->name_state = NAME_PENDING;
1944 hci_discovery_set_state(hdev, DISCOVERY_RESOLVING);
1945 } else {
1946 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
1947 }
1948
1949unlock:
56e5cb86 1950 hci_dev_unlock(hdev);
1da177e4
LT
1951}
1952
6039aa73 1953static void hci_inquiry_result_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 1954{
45bb4bf0 1955 struct inquiry_data data;
a9de9248 1956 struct inquiry_info *info = (void *) (skb->data + 1);
1da177e4
LT
1957 int num_rsp = *((__u8 *) skb->data);
1958
1959 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
1960
45bb4bf0
MH
1961 if (!num_rsp)
1962 return;
1963
1519cc17
AG
1964 if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags))
1965 return;
1966
1da177e4 1967 hci_dev_lock(hdev);
45bb4bf0 1968
e17acd40 1969 for (; num_rsp; num_rsp--, info++) {
af58925c 1970 u32 flags;
3175405b 1971
1da177e4
LT
1972 bacpy(&data.bdaddr, &info->bdaddr);
1973 data.pscan_rep_mode = info->pscan_rep_mode;
1974 data.pscan_period_mode = info->pscan_period_mode;
1975 data.pscan_mode = info->pscan_mode;
1976 memcpy(data.dev_class, info->dev_class, 3);
1977 data.clock_offset = info->clock_offset;
1978 data.rssi = 0x00;
41a96212 1979 data.ssp_mode = 0x00;
3175405b 1980
af58925c
MH
1981 flags = hci_inquiry_cache_update(hdev, &data, false);
1982
48264f06 1983 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
af58925c 1984 info->dev_class, 0, flags, NULL, 0, NULL, 0);
1da177e4 1985 }
45bb4bf0 1986
1da177e4
LT
1987 hci_dev_unlock(hdev);
1988}
1989
6039aa73 1990static void hci_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 1991{
a9de9248
MH
1992 struct hci_ev_conn_complete *ev = (void *) skb->data;
1993 struct hci_conn *conn;
1da177e4
LT
1994
1995 BT_DBG("%s", hdev->name);
1996
1997 hci_dev_lock(hdev);
1998
1999 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
9499237a
MH
2000 if (!conn) {
2001 if (ev->link_type != SCO_LINK)
2002 goto unlock;
2003
2004 conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr);
2005 if (!conn)
2006 goto unlock;
2007
2008 conn->type = SCO_LINK;
2009 }
1da177e4
LT
2010
2011 if (!ev->status) {
2012 conn->handle = __le16_to_cpu(ev->handle);
769be974
MH
2013
2014 if (conn->type == ACL_LINK) {
2015 conn->state = BT_CONFIG;
2016 hci_conn_hold(conn);
a9ea3ed9
SJ
2017
2018 if (!conn->out && !hci_conn_ssp_enabled(conn) &&
2019 !hci_find_link_key(hdev, &ev->bdaddr))
2020 conn->disc_timeout = HCI_PAIRING_TIMEOUT;
2021 else
2022 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
769be974
MH
2023 } else
2024 conn->state = BT_CONNECTED;
1da177e4 2025
7d0db0a3
MH
2026 hci_conn_add_sysfs(conn);
2027
1da177e4 2028 if (test_bit(HCI_AUTH, &hdev->flags))
4dae2798 2029 set_bit(HCI_CONN_AUTH, &conn->flags);
1da177e4
LT
2030
2031 if (test_bit(HCI_ENCRYPT, &hdev->flags))
4dae2798 2032 set_bit(HCI_CONN_ENCRYPT, &conn->flags);
1da177e4 2033
04837f64
MH
2034 /* Get remote features */
2035 if (conn->type == ACL_LINK) {
2036 struct hci_cp_read_remote_features cp;
2037 cp.handle = ev->handle;
769be974 2038 hci_send_cmd(hdev, HCI_OP_READ_REMOTE_FEATURES,
04124681 2039 sizeof(cp), &cp);
04837f64
MH
2040 }
2041
1da177e4 2042 /* Set packet type for incoming connection */
d095c1eb 2043 if (!conn->out && hdev->hci_ver < BLUETOOTH_VER_2_0) {
1da177e4
LT
2044 struct hci_cp_change_conn_ptype cp;
2045 cp.handle = ev->handle;
a8746417 2046 cp.pkt_type = cpu_to_le16(conn->pkt_type);
04124681
GP
2047 hci_send_cmd(hdev, HCI_OP_CHANGE_CONN_PTYPE, sizeof(cp),
2048 &cp);
1da177e4 2049 }
17d5c04c 2050 } else {
1da177e4 2051 conn->state = BT_CLOSED;
17d5c04c 2052 if (conn->type == ACL_LINK)
64c7b77c 2053 mgmt_connect_failed(hdev, &conn->dst, conn->type,
04124681 2054 conn->dst_type, ev->status);
17d5c04c 2055 }
1da177e4 2056
e73439d8
MH
2057 if (conn->type == ACL_LINK)
2058 hci_sco_setup(conn, ev->status);
1da177e4 2059
769be974
MH
2060 if (ev->status) {
2061 hci_proto_connect_cfm(conn, ev->status);
1da177e4 2062 hci_conn_del(conn);
c89b6e6b
MH
2063 } else if (ev->link_type != ACL_LINK)
2064 hci_proto_connect_cfm(conn, ev->status);
1da177e4 2065
a9de9248 2066unlock:
1da177e4 2067 hci_dev_unlock(hdev);
1da177e4 2068
a9de9248 2069 hci_conn_check_pending(hdev);
1da177e4
LT
2070}
2071
6039aa73 2072static void hci_conn_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2073{
a9de9248
MH
2074 struct hci_ev_conn_request *ev = (void *) skb->data;
2075 int mask = hdev->link_mode;
20714bfe 2076 __u8 flags = 0;
1da177e4 2077
6ed93dc6 2078 BT_DBG("%s bdaddr %pMR type 0x%x", hdev->name, &ev->bdaddr,
807deac2 2079 ev->link_type);
1da177e4 2080
20714bfe
FD
2081 mask |= hci_proto_connect_ind(hdev, &ev->bdaddr, ev->link_type,
2082 &flags);
1da177e4 2083
138d22ef 2084 if ((mask & HCI_LM_ACCEPT) &&
b9ee0a78 2085 !hci_blacklist_lookup(hdev, &ev->bdaddr, BDADDR_BREDR)) {
a9de9248 2086 /* Connection accepted */
c7bdd502 2087 struct inquiry_entry *ie;
1da177e4 2088 struct hci_conn *conn;
1da177e4 2089
a9de9248 2090 hci_dev_lock(hdev);
b6a0dc82 2091
cc11b9c1
AE
2092 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
2093 if (ie)
c7bdd502
MH
2094 memcpy(ie->data.dev_class, ev->dev_class, 3);
2095
8fc9ced3
GP
2096 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type,
2097 &ev->bdaddr);
a9de9248 2098 if (!conn) {
cc11b9c1
AE
2099 conn = hci_conn_add(hdev, ev->link_type, &ev->bdaddr);
2100 if (!conn) {
893ef971 2101 BT_ERR("No memory for new connection");
a9de9248
MH
2102 hci_dev_unlock(hdev);
2103 return;
1da177e4
LT
2104 }
2105 }
b6a0dc82 2106
a9de9248 2107 memcpy(conn->dev_class, ev->dev_class, 3);
b6a0dc82 2108
a9de9248 2109 hci_dev_unlock(hdev);
1da177e4 2110
20714bfe
FD
2111 if (ev->link_type == ACL_LINK ||
2112 (!(flags & HCI_PROTO_DEFER) && !lmp_esco_capable(hdev))) {
b6a0dc82 2113 struct hci_cp_accept_conn_req cp;
20714bfe 2114 conn->state = BT_CONNECT;
1da177e4 2115
b6a0dc82
MH
2116 bacpy(&cp.bdaddr, &ev->bdaddr);
2117
2118 if (lmp_rswitch_capable(hdev) && (mask & HCI_LM_MASTER))
2119 cp.role = 0x00; /* Become master */
2120 else
2121 cp.role = 0x01; /* Remain slave */
2122
04124681
GP
2123 hci_send_cmd(hdev, HCI_OP_ACCEPT_CONN_REQ, sizeof(cp),
2124 &cp);
20714bfe 2125 } else if (!(flags & HCI_PROTO_DEFER)) {
b6a0dc82 2126 struct hci_cp_accept_sync_conn_req cp;
20714bfe 2127 conn->state = BT_CONNECT;
b6a0dc82
MH
2128
2129 bacpy(&cp.bdaddr, &ev->bdaddr);
a8746417 2130 cp.pkt_type = cpu_to_le16(conn->pkt_type);
b6a0dc82 2131
dcf4adbf
JP
2132 cp.tx_bandwidth = cpu_to_le32(0x00001f40);
2133 cp.rx_bandwidth = cpu_to_le32(0x00001f40);
2134 cp.max_latency = cpu_to_le16(0xffff);
b6a0dc82
MH
2135 cp.content_format = cpu_to_le16(hdev->voice_setting);
2136 cp.retrans_effort = 0xff;
1da177e4 2137
b6a0dc82 2138 hci_send_cmd(hdev, HCI_OP_ACCEPT_SYNC_CONN_REQ,
04124681 2139 sizeof(cp), &cp);
20714bfe
FD
2140 } else {
2141 conn->state = BT_CONNECT2;
2142 hci_proto_connect_cfm(conn, 0);
b6a0dc82 2143 }
a9de9248
MH
2144 } else {
2145 /* Connection rejected */
2146 struct hci_cp_reject_conn_req cp;
1da177e4 2147
a9de9248 2148 bacpy(&cp.bdaddr, &ev->bdaddr);
9f5a0d7b 2149 cp.reason = HCI_ERROR_REJ_BAD_ADDR;
a9de9248 2150 hci_send_cmd(hdev, HCI_OP_REJECT_CONN_REQ, sizeof(cp), &cp);
1da177e4 2151 }
1da177e4
LT
2152}
2153
f0d6a0ea
MA
2154static u8 hci_to_mgmt_reason(u8 err)
2155{
2156 switch (err) {
2157 case HCI_ERROR_CONNECTION_TIMEOUT:
2158 return MGMT_DEV_DISCONN_TIMEOUT;
2159 case HCI_ERROR_REMOTE_USER_TERM:
2160 case HCI_ERROR_REMOTE_LOW_RESOURCES:
2161 case HCI_ERROR_REMOTE_POWER_OFF:
2162 return MGMT_DEV_DISCONN_REMOTE;
2163 case HCI_ERROR_LOCAL_HOST_TERM:
2164 return MGMT_DEV_DISCONN_LOCAL_HOST;
2165 default:
2166 return MGMT_DEV_DISCONN_UNKNOWN;
2167 }
2168}
2169
6039aa73 2170static void hci_disconn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
04837f64 2171{
a9de9248 2172 struct hci_ev_disconn_complete *ev = (void *) skb->data;
abf54a50 2173 u8 reason = hci_to_mgmt_reason(ev->reason);
9fcb18ef 2174 struct hci_conn_params *params;
04837f64 2175 struct hci_conn *conn;
12d4a3b2 2176 bool mgmt_connected;
3846220b 2177 u8 type;
04837f64 2178
9f1db00c 2179 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
04837f64
MH
2180
2181 hci_dev_lock(hdev);
2182
2183 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
f7520543
JH
2184 if (!conn)
2185 goto unlock;
7d0db0a3 2186
abf54a50
AG
2187 if (ev->status) {
2188 mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
2189 conn->dst_type, ev->status);
2190 goto unlock;
37d9ef76 2191 }
f7520543 2192
3846220b
AG
2193 conn->state = BT_CLOSED;
2194
12d4a3b2
JH
2195 mgmt_connected = test_and_clear_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags);
2196 mgmt_device_disconnected(hdev, &conn->dst, conn->type, conn->dst_type,
2197 reason, mgmt_connected);
abf54a50 2198
af6a9c32
JH
2199 if (conn->type == ACL_LINK &&
2200 test_bit(HCI_CONN_FLUSH_KEY, &conn->flags))
3846220b 2201 hci_remove_link_key(hdev, &conn->dst);
2210246c 2202
9fcb18ef
AG
2203 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
2204 if (params) {
2205 switch (params->auto_connect) {
2206 case HCI_AUTO_CONN_LINK_LOSS:
2207 if (ev->reason != HCI_ERROR_CONNECTION_TIMEOUT)
2208 break;
2209 /* Fall through */
2210
2211 case HCI_AUTO_CONN_ALWAYS:
2212 hci_pend_le_conn_add(hdev, &conn->dst, conn->dst_type);
2213 break;
2214
2215 default:
2216 break;
2217 }
2218 }
2219
3846220b 2220 type = conn->type;
2210246c 2221
3846220b
AG
2222 hci_proto_disconn_cfm(conn, ev->reason);
2223 hci_conn_del(conn);
2224
2225 /* Re-enable advertising if necessary, since it might
2226 * have been disabled by the connection. From the
2227 * HCI_LE_Set_Advertise_Enable command description in
2228 * the core specification (v4.0):
2229 * "The Controller shall continue advertising until the Host
2230 * issues an LE_Set_Advertise_Enable command with
2231 * Advertising_Enable set to 0x00 (Advertising is disabled)
2232 * or until a connection is created or until the Advertising
2233 * is timed out due to Directed Advertising."
2234 */
2235 if (type == LE_LINK)
2236 mgmt_reenable_advertising(hdev);
f7520543
JH
2237
2238unlock:
04837f64
MH
2239 hci_dev_unlock(hdev);
2240}
2241
6039aa73 2242static void hci_auth_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2243{
a9de9248 2244 struct hci_ev_auth_complete *ev = (void *) skb->data;
04837f64 2245 struct hci_conn *conn;
1da177e4 2246
9f1db00c 2247 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2248
2249 hci_dev_lock(hdev);
2250
04837f64 2251 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
d7556e20
WR
2252 if (!conn)
2253 goto unlock;
2254
2255 if (!ev->status) {
aa64a8b5 2256 if (!hci_conn_ssp_enabled(conn) &&
807deac2 2257 test_bit(HCI_CONN_REAUTH_PEND, &conn->flags)) {
d7556e20 2258 BT_INFO("re-auth of legacy device is not possible.");
2a611692 2259 } else {
4dae2798 2260 set_bit(HCI_CONN_AUTH, &conn->flags);
d7556e20 2261 conn->sec_level = conn->pending_sec_level;
2a611692 2262 }
d7556e20 2263 } else {
bab73cb6 2264 mgmt_auth_failed(hdev, &conn->dst, conn->type, conn->dst_type,
04124681 2265 ev->status);
d7556e20 2266 }
1da177e4 2267
51a8efd7
JH
2268 clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
2269 clear_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
1da177e4 2270
d7556e20 2271 if (conn->state == BT_CONFIG) {
aa64a8b5 2272 if (!ev->status && hci_conn_ssp_enabled(conn)) {
d7556e20
WR
2273 struct hci_cp_set_conn_encrypt cp;
2274 cp.handle = ev->handle;
2275 cp.encrypt = 0x01;
2276 hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
807deac2 2277 &cp);
052b30b0 2278 } else {
d7556e20
WR
2279 conn->state = BT_CONNECTED;
2280 hci_proto_connect_cfm(conn, ev->status);
76a68ba0 2281 hci_conn_drop(conn);
052b30b0 2282 }
d7556e20
WR
2283 } else {
2284 hci_auth_cfm(conn, ev->status);
052b30b0 2285
d7556e20
WR
2286 hci_conn_hold(conn);
2287 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 2288 hci_conn_drop(conn);
d7556e20
WR
2289 }
2290
51a8efd7 2291 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
d7556e20
WR
2292 if (!ev->status) {
2293 struct hci_cp_set_conn_encrypt cp;
2294 cp.handle = ev->handle;
2295 cp.encrypt = 0x01;
2296 hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
807deac2 2297 &cp);
d7556e20 2298 } else {
51a8efd7 2299 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
d7556e20 2300 hci_encrypt_cfm(conn, ev->status, 0x00);
1da177e4
LT
2301 }
2302 }
2303
d7556e20 2304unlock:
1da177e4
LT
2305 hci_dev_unlock(hdev);
2306}
2307
6039aa73 2308static void hci_remote_name_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2309{
127178d2
JH
2310 struct hci_ev_remote_name *ev = (void *) skb->data;
2311 struct hci_conn *conn;
2312
a9de9248 2313 BT_DBG("%s", hdev->name);
1da177e4 2314
a9de9248 2315 hci_conn_check_pending(hdev);
127178d2
JH
2316
2317 hci_dev_lock(hdev);
2318
b644ba33 2319 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
30dc78e1 2320
b644ba33
JH
2321 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
2322 goto check_auth;
a88a9652 2323
b644ba33
JH
2324 if (ev->status == 0)
2325 hci_check_pending_name(hdev, conn, &ev->bdaddr, ev->name,
04124681 2326 strnlen(ev->name, HCI_MAX_NAME_LENGTH));
b644ba33
JH
2327 else
2328 hci_check_pending_name(hdev, conn, &ev->bdaddr, NULL, 0);
2329
2330check_auth:
79c6c70c
JH
2331 if (!conn)
2332 goto unlock;
2333
2334 if (!hci_outgoing_auth_needed(hdev, conn))
2335 goto unlock;
2336
51a8efd7 2337 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
127178d2
JH
2338 struct hci_cp_auth_requested cp;
2339 cp.handle = __cpu_to_le16(conn->handle);
2340 hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED, sizeof(cp), &cp);
2341 }
2342
79c6c70c 2343unlock:
127178d2 2344 hci_dev_unlock(hdev);
a9de9248
MH
2345}
2346
6039aa73 2347static void hci_encrypt_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2348{
2349 struct hci_ev_encrypt_change *ev = (void *) skb->data;
2350 struct hci_conn *conn;
2351
9f1db00c 2352 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2353
2354 hci_dev_lock(hdev);
2355
04837f64 2356 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
dc8357cc
MH
2357 if (!conn)
2358 goto unlock;
1da177e4 2359
dc8357cc
MH
2360 if (!ev->status) {
2361 if (ev->encrypt) {
2362 /* Encryption implies authentication */
4dae2798
JH
2363 set_bit(HCI_CONN_AUTH, &conn->flags);
2364 set_bit(HCI_CONN_ENCRYPT, &conn->flags);
dc8357cc 2365 conn->sec_level = conn->pending_sec_level;
abf76bad 2366
914a6ffe
MH
2367 /* P-256 authentication key implies FIPS */
2368 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256)
4dae2798 2369 set_bit(HCI_CONN_FIPS, &conn->flags);
914a6ffe 2370
abf76bad
MH
2371 if ((conn->type == ACL_LINK && ev->encrypt == 0x02) ||
2372 conn->type == LE_LINK)
2373 set_bit(HCI_CONN_AES_CCM, &conn->flags);
2374 } else {
4dae2798 2375 clear_bit(HCI_CONN_ENCRYPT, &conn->flags);
abf76bad
MH
2376 clear_bit(HCI_CONN_AES_CCM, &conn->flags);
2377 }
dc8357cc 2378 }
a7d7723a 2379
dc8357cc 2380 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
f8558555 2381
dc8357cc
MH
2382 if (ev->status && conn->state == BT_CONNECTED) {
2383 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
2384 hci_conn_drop(conn);
2385 goto unlock;
1da177e4
LT
2386 }
2387
dc8357cc
MH
2388 if (conn->state == BT_CONFIG) {
2389 if (!ev->status)
2390 conn->state = BT_CONNECTED;
2391
40b552aa
MH
2392 /* In Secure Connections Only mode, do not allow any
2393 * connections that are not encrypted with AES-CCM
2394 * using a P-256 authenticated combination key.
2395 */
2396 if (test_bit(HCI_SC_ONLY, &hdev->dev_flags) &&
2397 (!test_bit(HCI_CONN_AES_CCM, &conn->flags) ||
2398 conn->key_type != HCI_LK_AUTH_COMBINATION_P256)) {
2399 hci_proto_connect_cfm(conn, HCI_ERROR_AUTH_FAILURE);
2400 hci_conn_drop(conn);
2401 goto unlock;
2402 }
2403
dc8357cc
MH
2404 hci_proto_connect_cfm(conn, ev->status);
2405 hci_conn_drop(conn);
2406 } else
2407 hci_encrypt_cfm(conn, ev->status, ev->encrypt);
2408
a7d7723a 2409unlock:
1da177e4
LT
2410 hci_dev_unlock(hdev);
2411}
2412
6039aa73
GP
2413static void hci_change_link_key_complete_evt(struct hci_dev *hdev,
2414 struct sk_buff *skb)
1da177e4 2415{
a9de9248 2416 struct hci_ev_change_link_key_complete *ev = (void *) skb->data;
04837f64 2417 struct hci_conn *conn;
1da177e4 2418
9f1db00c 2419 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2420
2421 hci_dev_lock(hdev);
2422
04837f64 2423 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
1da177e4
LT
2424 if (conn) {
2425 if (!ev->status)
4dae2798 2426 set_bit(HCI_CONN_SECURE, &conn->flags);
1da177e4 2427
51a8efd7 2428 clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
1da177e4
LT
2429
2430 hci_key_change_cfm(conn, ev->status);
2431 }
2432
2433 hci_dev_unlock(hdev);
2434}
2435
6039aa73
GP
2436static void hci_remote_features_evt(struct hci_dev *hdev,
2437 struct sk_buff *skb)
1da177e4 2438{
a9de9248
MH
2439 struct hci_ev_remote_features *ev = (void *) skb->data;
2440 struct hci_conn *conn;
2441
9f1db00c 2442 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a9de9248 2443
a9de9248
MH
2444 hci_dev_lock(hdev);
2445
2446 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
ccd556fe
JH
2447 if (!conn)
2448 goto unlock;
769be974 2449
ccd556fe 2450 if (!ev->status)
cad718ed 2451 memcpy(conn->features[0], ev->features, 8);
ccd556fe
JH
2452
2453 if (conn->state != BT_CONFIG)
2454 goto unlock;
2455
2456 if (!ev->status && lmp_ssp_capable(hdev) && lmp_ssp_capable(conn)) {
2457 struct hci_cp_read_remote_ext_features cp;
2458 cp.handle = ev->handle;
2459 cp.page = 0x01;
2460 hci_send_cmd(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES,
807deac2 2461 sizeof(cp), &cp);
392599b9
JH
2462 goto unlock;
2463 }
2464
671267bf 2465 if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
127178d2
JH
2466 struct hci_cp_remote_name_req cp;
2467 memset(&cp, 0, sizeof(cp));
2468 bacpy(&cp.bdaddr, &conn->dst);
2469 cp.pscan_rep_mode = 0x02;
2470 hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
b644ba33
JH
2471 } else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
2472 mgmt_device_connected(hdev, &conn->dst, conn->type,
04124681
GP
2473 conn->dst_type, 0, NULL, 0,
2474 conn->dev_class);
392599b9 2475
127178d2 2476 if (!hci_outgoing_auth_needed(hdev, conn)) {
ccd556fe
JH
2477 conn->state = BT_CONNECTED;
2478 hci_proto_connect_cfm(conn, ev->status);
76a68ba0 2479 hci_conn_drop(conn);
769be974 2480 }
a9de9248 2481
ccd556fe 2482unlock:
a9de9248 2483 hci_dev_unlock(hdev);
1da177e4
LT
2484}
2485
6039aa73 2486static void hci_cmd_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2487{
2488 struct hci_ev_cmd_complete *ev = (void *) skb->data;
9238f36a 2489 u8 status = skb->data[sizeof(*ev)];
a9de9248
MH
2490 __u16 opcode;
2491
2492 skb_pull(skb, sizeof(*ev));
2493
2494 opcode = __le16_to_cpu(ev->opcode);
2495
2496 switch (opcode) {
2497 case HCI_OP_INQUIRY_CANCEL:
2498 hci_cc_inquiry_cancel(hdev, skb);
2499 break;
2500
4d93483b
AG
2501 case HCI_OP_PERIODIC_INQ:
2502 hci_cc_periodic_inq(hdev, skb);
2503 break;
2504
a9de9248
MH
2505 case HCI_OP_EXIT_PERIODIC_INQ:
2506 hci_cc_exit_periodic_inq(hdev, skb);
2507 break;
2508
2509 case HCI_OP_REMOTE_NAME_REQ_CANCEL:
2510 hci_cc_remote_name_req_cancel(hdev, skb);
2511 break;
2512
2513 case HCI_OP_ROLE_DISCOVERY:
2514 hci_cc_role_discovery(hdev, skb);
2515 break;
2516
e4e8e37c
MH
2517 case HCI_OP_READ_LINK_POLICY:
2518 hci_cc_read_link_policy(hdev, skb);
2519 break;
2520
a9de9248
MH
2521 case HCI_OP_WRITE_LINK_POLICY:
2522 hci_cc_write_link_policy(hdev, skb);
2523 break;
2524
e4e8e37c
MH
2525 case HCI_OP_READ_DEF_LINK_POLICY:
2526 hci_cc_read_def_link_policy(hdev, skb);
2527 break;
2528
2529 case HCI_OP_WRITE_DEF_LINK_POLICY:
2530 hci_cc_write_def_link_policy(hdev, skb);
2531 break;
2532
a9de9248
MH
2533 case HCI_OP_RESET:
2534 hci_cc_reset(hdev, skb);
2535 break;
2536
2537 case HCI_OP_WRITE_LOCAL_NAME:
2538 hci_cc_write_local_name(hdev, skb);
2539 break;
2540
2541 case HCI_OP_READ_LOCAL_NAME:
2542 hci_cc_read_local_name(hdev, skb);
2543 break;
2544
2545 case HCI_OP_WRITE_AUTH_ENABLE:
2546 hci_cc_write_auth_enable(hdev, skb);
2547 break;
2548
2549 case HCI_OP_WRITE_ENCRYPT_MODE:
2550 hci_cc_write_encrypt_mode(hdev, skb);
2551 break;
2552
2553 case HCI_OP_WRITE_SCAN_ENABLE:
2554 hci_cc_write_scan_enable(hdev, skb);
2555 break;
2556
2557 case HCI_OP_READ_CLASS_OF_DEV:
2558 hci_cc_read_class_of_dev(hdev, skb);
2559 break;
2560
2561 case HCI_OP_WRITE_CLASS_OF_DEV:
2562 hci_cc_write_class_of_dev(hdev, skb);
2563 break;
2564
2565 case HCI_OP_READ_VOICE_SETTING:
2566 hci_cc_read_voice_setting(hdev, skb);
2567 break;
2568
2569 case HCI_OP_WRITE_VOICE_SETTING:
2570 hci_cc_write_voice_setting(hdev, skb);
2571 break;
2572
b4cb9fb2
MH
2573 case HCI_OP_READ_NUM_SUPPORTED_IAC:
2574 hci_cc_read_num_supported_iac(hdev, skb);
2575 break;
2576
333140b5
MH
2577 case HCI_OP_WRITE_SSP_MODE:
2578 hci_cc_write_ssp_mode(hdev, skb);
2579 break;
2580
eac83dc6
MH
2581 case HCI_OP_WRITE_SC_SUPPORT:
2582 hci_cc_write_sc_support(hdev, skb);
2583 break;
2584
a9de9248
MH
2585 case HCI_OP_READ_LOCAL_VERSION:
2586 hci_cc_read_local_version(hdev, skb);
2587 break;
2588
2589 case HCI_OP_READ_LOCAL_COMMANDS:
2590 hci_cc_read_local_commands(hdev, skb);
2591 break;
2592
2593 case HCI_OP_READ_LOCAL_FEATURES:
2594 hci_cc_read_local_features(hdev, skb);
2595 break;
2596
971e3a4b
AG
2597 case HCI_OP_READ_LOCAL_EXT_FEATURES:
2598 hci_cc_read_local_ext_features(hdev, skb);
2599 break;
2600
a9de9248
MH
2601 case HCI_OP_READ_BUFFER_SIZE:
2602 hci_cc_read_buffer_size(hdev, skb);
2603 break;
2604
2605 case HCI_OP_READ_BD_ADDR:
2606 hci_cc_read_bd_addr(hdev, skb);
2607 break;
2608
f332ec66
JH
2609 case HCI_OP_READ_PAGE_SCAN_ACTIVITY:
2610 hci_cc_read_page_scan_activity(hdev, skb);
2611 break;
2612
4a3ee763
JH
2613 case HCI_OP_WRITE_PAGE_SCAN_ACTIVITY:
2614 hci_cc_write_page_scan_activity(hdev, skb);
2615 break;
2616
f332ec66
JH
2617 case HCI_OP_READ_PAGE_SCAN_TYPE:
2618 hci_cc_read_page_scan_type(hdev, skb);
2619 break;
2620
4a3ee763
JH
2621 case HCI_OP_WRITE_PAGE_SCAN_TYPE:
2622 hci_cc_write_page_scan_type(hdev, skb);
2623 break;
2624
350ee4cf
AE
2625 case HCI_OP_READ_DATA_BLOCK_SIZE:
2626 hci_cc_read_data_block_size(hdev, skb);
2627 break;
2628
1e89cffb
AE
2629 case HCI_OP_READ_FLOW_CONTROL_MODE:
2630 hci_cc_read_flow_control_mode(hdev, skb);
2631 break;
2632
928abaa7
AE
2633 case HCI_OP_READ_LOCAL_AMP_INFO:
2634 hci_cc_read_local_amp_info(hdev, skb);
2635 break;
2636
33f35721
JH
2637 case HCI_OP_READ_CLOCK:
2638 hci_cc_read_clock(hdev, skb);
2639 break;
2640
903e4541
AE
2641 case HCI_OP_READ_LOCAL_AMP_ASSOC:
2642 hci_cc_read_local_amp_assoc(hdev, skb);
2643 break;
2644
d5859e22
JH
2645 case HCI_OP_READ_INQ_RSP_TX_POWER:
2646 hci_cc_read_inq_rsp_tx_power(hdev, skb);
2647 break;
2648
980e1a53
JH
2649 case HCI_OP_PIN_CODE_REPLY:
2650 hci_cc_pin_code_reply(hdev, skb);
2651 break;
2652
2653 case HCI_OP_PIN_CODE_NEG_REPLY:
2654 hci_cc_pin_code_neg_reply(hdev, skb);
2655 break;
2656
c35938b2 2657 case HCI_OP_READ_LOCAL_OOB_DATA:
4d2d2796
MH
2658 hci_cc_read_local_oob_data(hdev, skb);
2659 break;
2660
2661 case HCI_OP_READ_LOCAL_OOB_EXT_DATA:
2662 hci_cc_read_local_oob_ext_data(hdev, skb);
c35938b2
SJ
2663 break;
2664
6ed58ec5
VT
2665 case HCI_OP_LE_READ_BUFFER_SIZE:
2666 hci_cc_le_read_buffer_size(hdev, skb);
2667 break;
2668
60e77321
JH
2669 case HCI_OP_LE_READ_LOCAL_FEATURES:
2670 hci_cc_le_read_local_features(hdev, skb);
2671 break;
2672
8fa19098
JH
2673 case HCI_OP_LE_READ_ADV_TX_POWER:
2674 hci_cc_le_read_adv_tx_power(hdev, skb);
2675 break;
2676
a5c29683
JH
2677 case HCI_OP_USER_CONFIRM_REPLY:
2678 hci_cc_user_confirm_reply(hdev, skb);
2679 break;
2680
2681 case HCI_OP_USER_CONFIRM_NEG_REPLY:
2682 hci_cc_user_confirm_neg_reply(hdev, skb);
2683 break;
2684
1143d458
BG
2685 case HCI_OP_USER_PASSKEY_REPLY:
2686 hci_cc_user_passkey_reply(hdev, skb);
2687 break;
2688
2689 case HCI_OP_USER_PASSKEY_NEG_REPLY:
2690 hci_cc_user_passkey_neg_reply(hdev, skb);
16cde993 2691 break;
07f7fa5d 2692
7a4cd51d
MH
2693 case HCI_OP_LE_SET_RANDOM_ADDR:
2694 hci_cc_le_set_random_addr(hdev, skb);
2695 break;
2696
c1d5dc4a
JH
2697 case HCI_OP_LE_SET_ADV_ENABLE:
2698 hci_cc_le_set_adv_enable(hdev, skb);
2699 break;
2700
533553f8
MH
2701 case HCI_OP_LE_SET_SCAN_PARAM:
2702 hci_cc_le_set_scan_param(hdev, skb);
2703 break;
2704
eb9d91f5
AG
2705 case HCI_OP_LE_SET_SCAN_ENABLE:
2706 hci_cc_le_set_scan_enable(hdev, skb);
2707 break;
2708
cf1d081f
JH
2709 case HCI_OP_LE_READ_WHITE_LIST_SIZE:
2710 hci_cc_le_read_white_list_size(hdev, skb);
2711 break;
2712
0f36b589
MH
2713 case HCI_OP_LE_CLEAR_WHITE_LIST:
2714 hci_cc_le_clear_white_list(hdev, skb);
2715 break;
2716
2717 case HCI_OP_LE_ADD_TO_WHITE_LIST:
2718 hci_cc_le_add_to_white_list(hdev, skb);
2719 break;
2720
2721 case HCI_OP_LE_DEL_FROM_WHITE_LIST:
2722 hci_cc_le_del_from_white_list(hdev, skb);
2723 break;
2724
9b008c04
JH
2725 case HCI_OP_LE_READ_SUPPORTED_STATES:
2726 hci_cc_le_read_supported_states(hdev, skb);
2727 break;
2728
f9b49306
AG
2729 case HCI_OP_WRITE_LE_HOST_SUPPORTED:
2730 hci_cc_write_le_host_supported(hdev, skb);
2731 break;
2732
56ed2cb8
JH
2733 case HCI_OP_LE_SET_ADV_PARAM:
2734 hci_cc_set_adv_param(hdev, skb);
2735 break;
2736
93c284ee
AE
2737 case HCI_OP_WRITE_REMOTE_AMP_ASSOC:
2738 hci_cc_write_remote_amp_assoc(hdev, skb);
2739 break;
2740
5ae76a94
AK
2741 case HCI_OP_READ_RSSI:
2742 hci_cc_read_rssi(hdev, skb);
2743 break;
2744
5a134fae
AK
2745 case HCI_OP_READ_TX_POWER:
2746 hci_cc_read_tx_power(hdev, skb);
2747 break;
2748
a9de9248 2749 default:
9f1db00c 2750 BT_DBG("%s opcode 0x%4.4x", hdev->name, opcode);
a9de9248
MH
2751 break;
2752 }
2753
ad82cdd1 2754 if (opcode != HCI_OP_NOP)
65cc2b49 2755 cancel_delayed_work(&hdev->cmd_timer);
6bd32326 2756
ad82cdd1 2757 hci_req_cmd_complete(hdev, opcode, status);
9238f36a 2758
dbccd791 2759 if (ev->ncmd && !test_bit(HCI_RESET, &hdev->flags)) {
a9de9248
MH
2760 atomic_set(&hdev->cmd_cnt, 1);
2761 if (!skb_queue_empty(&hdev->cmd_q))
c347b765 2762 queue_work(hdev->workqueue, &hdev->cmd_work);
a9de9248
MH
2763 }
2764}
2765
6039aa73 2766static void hci_cmd_status_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2767{
2768 struct hci_ev_cmd_status *ev = (void *) skb->data;
2769 __u16 opcode;
2770
2771 skb_pull(skb, sizeof(*ev));
2772
2773 opcode = __le16_to_cpu(ev->opcode);
2774
2775 switch (opcode) {
2776 case HCI_OP_INQUIRY:
2777 hci_cs_inquiry(hdev, ev->status);
2778 break;
2779
2780 case HCI_OP_CREATE_CONN:
2781 hci_cs_create_conn(hdev, ev->status);
2782 break;
2783
2784 case HCI_OP_ADD_SCO:
2785 hci_cs_add_sco(hdev, ev->status);
2786 break;
2787
f8558555
MH
2788 case HCI_OP_AUTH_REQUESTED:
2789 hci_cs_auth_requested(hdev, ev->status);
2790 break;
2791
2792 case HCI_OP_SET_CONN_ENCRYPT:
2793 hci_cs_set_conn_encrypt(hdev, ev->status);
2794 break;
2795
a9de9248
MH
2796 case HCI_OP_REMOTE_NAME_REQ:
2797 hci_cs_remote_name_req(hdev, ev->status);
2798 break;
2799
769be974
MH
2800 case HCI_OP_READ_REMOTE_FEATURES:
2801 hci_cs_read_remote_features(hdev, ev->status);
2802 break;
2803
2804 case HCI_OP_READ_REMOTE_EXT_FEATURES:
2805 hci_cs_read_remote_ext_features(hdev, ev->status);
2806 break;
2807
a9de9248
MH
2808 case HCI_OP_SETUP_SYNC_CONN:
2809 hci_cs_setup_sync_conn(hdev, ev->status);
2810 break;
2811
2812 case HCI_OP_SNIFF_MODE:
2813 hci_cs_sniff_mode(hdev, ev->status);
2814 break;
2815
2816 case HCI_OP_EXIT_SNIFF_MODE:
2817 hci_cs_exit_sniff_mode(hdev, ev->status);
2818 break;
2819
8962ee74 2820 case HCI_OP_DISCONNECT:
88c3df13 2821 hci_cs_disconnect(hdev, ev->status);
8962ee74
JH
2822 break;
2823
a02226d6
AE
2824 case HCI_OP_CREATE_PHY_LINK:
2825 hci_cs_create_phylink(hdev, ev->status);
2826 break;
2827
0b26ab9d
AE
2828 case HCI_OP_ACCEPT_PHY_LINK:
2829 hci_cs_accept_phylink(hdev, ev->status);
2830 break;
2831
cb1d68f7
JH
2832 case HCI_OP_LE_CREATE_CONN:
2833 hci_cs_le_create_conn(hdev, ev->status);
2834 break;
2835
81d0c8ad
JH
2836 case HCI_OP_LE_START_ENC:
2837 hci_cs_le_start_enc(hdev, ev->status);
2838 break;
2839
a9de9248 2840 default:
9f1db00c 2841 BT_DBG("%s opcode 0x%4.4x", hdev->name, opcode);
a9de9248
MH
2842 break;
2843 }
2844
ad82cdd1 2845 if (opcode != HCI_OP_NOP)
65cc2b49 2846 cancel_delayed_work(&hdev->cmd_timer);
6bd32326 2847
02350a72
JH
2848 if (ev->status ||
2849 (hdev->sent_cmd && !bt_cb(hdev->sent_cmd)->req.event))
2850 hci_req_cmd_complete(hdev, opcode, ev->status);
9238f36a 2851
10572132 2852 if (ev->ncmd && !test_bit(HCI_RESET, &hdev->flags)) {
a9de9248
MH
2853 atomic_set(&hdev->cmd_cnt, 1);
2854 if (!skb_queue_empty(&hdev->cmd_q))
c347b765 2855 queue_work(hdev->workqueue, &hdev->cmd_work);
a9de9248
MH
2856 }
2857}
2858
6039aa73 2859static void hci_role_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2860{
2861 struct hci_ev_role_change *ev = (void *) skb->data;
2862 struct hci_conn *conn;
2863
9f1db00c 2864 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a9de9248
MH
2865
2866 hci_dev_lock(hdev);
2867
2868 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
2869 if (conn) {
2870 if (!ev->status) {
2871 if (ev->role)
4dae2798 2872 clear_bit(HCI_CONN_MASTER, &conn->flags);
a9de9248 2873 else
4dae2798 2874 set_bit(HCI_CONN_MASTER, &conn->flags);
a9de9248
MH
2875 }
2876
51a8efd7 2877 clear_bit(HCI_CONN_RSWITCH_PEND, &conn->flags);
a9de9248
MH
2878
2879 hci_role_switch_cfm(conn, ev->status, ev->role);
2880 }
2881
2882 hci_dev_unlock(hdev);
2883}
2884
6039aa73 2885static void hci_num_comp_pkts_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2886{
2887 struct hci_ev_num_comp_pkts *ev = (void *) skb->data;
a9de9248
MH
2888 int i;
2889
32ac5b9b
AE
2890 if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_PACKET_BASED) {
2891 BT_ERR("Wrong event for mode %d", hdev->flow_ctl_mode);
2892 return;
2893 }
2894
c5993de8 2895 if (skb->len < sizeof(*ev) || skb->len < sizeof(*ev) +
807deac2 2896 ev->num_hndl * sizeof(struct hci_comp_pkts_info)) {
a9de9248
MH
2897 BT_DBG("%s bad parameters", hdev->name);
2898 return;
2899 }
2900
c5993de8
AE
2901 BT_DBG("%s num_hndl %d", hdev->name, ev->num_hndl);
2902
613a1c0c
AE
2903 for (i = 0; i < ev->num_hndl; i++) {
2904 struct hci_comp_pkts_info *info = &ev->handles[i];
a9de9248
MH
2905 struct hci_conn *conn;
2906 __u16 handle, count;
2907
613a1c0c
AE
2908 handle = __le16_to_cpu(info->handle);
2909 count = __le16_to_cpu(info->count);
a9de9248
MH
2910
2911 conn = hci_conn_hash_lookup_handle(hdev, handle);
f4280918
AE
2912 if (!conn)
2913 continue;
2914
2915 conn->sent -= count;
2916
2917 switch (conn->type) {
2918 case ACL_LINK:
2919 hdev->acl_cnt += count;
2920 if (hdev->acl_cnt > hdev->acl_pkts)
2921 hdev->acl_cnt = hdev->acl_pkts;
2922 break;
2923
2924 case LE_LINK:
2925 if (hdev->le_pkts) {
2926 hdev->le_cnt += count;
2927 if (hdev->le_cnt > hdev->le_pkts)
2928 hdev->le_cnt = hdev->le_pkts;
2929 } else {
70f23020
AE
2930 hdev->acl_cnt += count;
2931 if (hdev->acl_cnt > hdev->acl_pkts)
a9de9248 2932 hdev->acl_cnt = hdev->acl_pkts;
a9de9248 2933 }
f4280918
AE
2934 break;
2935
2936 case SCO_LINK:
2937 hdev->sco_cnt += count;
2938 if (hdev->sco_cnt > hdev->sco_pkts)
2939 hdev->sco_cnt = hdev->sco_pkts;
2940 break;
2941
2942 default:
2943 BT_ERR("Unknown type %d conn %p", conn->type, conn);
2944 break;
a9de9248
MH
2945 }
2946 }
2947
3eff45ea 2948 queue_work(hdev->workqueue, &hdev->tx_work);
a9de9248
MH
2949}
2950
76ef7cf7
AE
2951static struct hci_conn *__hci_conn_lookup_handle(struct hci_dev *hdev,
2952 __u16 handle)
2953{
2954 struct hci_chan *chan;
2955
2956 switch (hdev->dev_type) {
2957 case HCI_BREDR:
2958 return hci_conn_hash_lookup_handle(hdev, handle);
2959 case HCI_AMP:
2960 chan = hci_chan_lookup_handle(hdev, handle);
2961 if (chan)
2962 return chan->conn;
2963 break;
2964 default:
2965 BT_ERR("%s unknown dev_type %d", hdev->name, hdev->dev_type);
2966 break;
2967 }
2968
2969 return NULL;
2970}
2971
6039aa73 2972static void hci_num_comp_blocks_evt(struct hci_dev *hdev, struct sk_buff *skb)
25e89e99
AE
2973{
2974 struct hci_ev_num_comp_blocks *ev = (void *) skb->data;
2975 int i;
2976
2977 if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_BLOCK_BASED) {
2978 BT_ERR("Wrong event for mode %d", hdev->flow_ctl_mode);
2979 return;
2980 }
2981
2982 if (skb->len < sizeof(*ev) || skb->len < sizeof(*ev) +
807deac2 2983 ev->num_hndl * sizeof(struct hci_comp_blocks_info)) {
25e89e99
AE
2984 BT_DBG("%s bad parameters", hdev->name);
2985 return;
2986 }
2987
2988 BT_DBG("%s num_blocks %d num_hndl %d", hdev->name, ev->num_blocks,
807deac2 2989 ev->num_hndl);
25e89e99
AE
2990
2991 for (i = 0; i < ev->num_hndl; i++) {
2992 struct hci_comp_blocks_info *info = &ev->handles[i];
76ef7cf7 2993 struct hci_conn *conn = NULL;
25e89e99
AE
2994 __u16 handle, block_count;
2995
2996 handle = __le16_to_cpu(info->handle);
2997 block_count = __le16_to_cpu(info->blocks);
2998
76ef7cf7 2999 conn = __hci_conn_lookup_handle(hdev, handle);
25e89e99
AE
3000 if (!conn)
3001 continue;
3002
3003 conn->sent -= block_count;
3004
3005 switch (conn->type) {
3006 case ACL_LINK:
bd1eb66b 3007 case AMP_LINK:
25e89e99
AE
3008 hdev->block_cnt += block_count;
3009 if (hdev->block_cnt > hdev->num_blocks)
3010 hdev->block_cnt = hdev->num_blocks;
3011 break;
3012
3013 default:
3014 BT_ERR("Unknown type %d conn %p", conn->type, conn);
3015 break;
3016 }
3017 }
3018
3019 queue_work(hdev->workqueue, &hdev->tx_work);
3020}
3021
6039aa73 3022static void hci_mode_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
04837f64 3023{
a9de9248 3024 struct hci_ev_mode_change *ev = (void *) skb->data;
04837f64
MH
3025 struct hci_conn *conn;
3026
9f1db00c 3027 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
04837f64
MH
3028
3029 hci_dev_lock(hdev);
3030
3031 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
a9de9248
MH
3032 if (conn) {
3033 conn->mode = ev->mode;
a9de9248 3034
8fc9ced3
GP
3035 if (!test_and_clear_bit(HCI_CONN_MODE_CHANGE_PEND,
3036 &conn->flags)) {
a9de9248 3037 if (conn->mode == HCI_CM_ACTIVE)
58a681ef 3038 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
a9de9248 3039 else
58a681ef 3040 clear_bit(HCI_CONN_POWER_SAVE, &conn->flags);
a9de9248 3041 }
e73439d8 3042
51a8efd7 3043 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8 3044 hci_sco_setup(conn, ev->status);
04837f64
MH
3045 }
3046
3047 hci_dev_unlock(hdev);
3048}
3049
6039aa73 3050static void hci_pin_code_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3051{
052b30b0
MH
3052 struct hci_ev_pin_code_req *ev = (void *) skb->data;
3053 struct hci_conn *conn;
3054
a9de9248 3055 BT_DBG("%s", hdev->name);
052b30b0
MH
3056
3057 hci_dev_lock(hdev);
3058
3059 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
b6f98044
WR
3060 if (!conn)
3061 goto unlock;
3062
3063 if (conn->state == BT_CONNECTED) {
052b30b0
MH
3064 hci_conn_hold(conn);
3065 conn->disc_timeout = HCI_PAIRING_TIMEOUT;
76a68ba0 3066 hci_conn_drop(conn);
052b30b0
MH
3067 }
3068
a8b2d5c2 3069 if (!test_bit(HCI_PAIRABLE, &hdev->dev_flags))
03b555e1 3070 hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
807deac2 3071 sizeof(ev->bdaddr), &ev->bdaddr);
a8b2d5c2 3072 else if (test_bit(HCI_MGMT, &hdev->dev_flags)) {
a770bb5a
WR
3073 u8 secure;
3074
3075 if (conn->pending_sec_level == BT_SECURITY_HIGH)
3076 secure = 1;
3077 else
3078 secure = 0;
3079
744cf19e 3080 mgmt_pin_code_request(hdev, &ev->bdaddr, secure);
a770bb5a 3081 }
980e1a53 3082
b6f98044 3083unlock:
052b30b0 3084 hci_dev_unlock(hdev);
a9de9248
MH
3085}
3086
6039aa73 3087static void hci_link_key_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3088{
55ed8ca1
JH
3089 struct hci_ev_link_key_req *ev = (void *) skb->data;
3090 struct hci_cp_link_key_reply cp;
3091 struct hci_conn *conn;
3092 struct link_key *key;
3093
a9de9248 3094 BT_DBG("%s", hdev->name);
55ed8ca1 3095
034cbea0 3096 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
55ed8ca1
JH
3097 return;
3098
3099 hci_dev_lock(hdev);
3100
3101 key = hci_find_link_key(hdev, &ev->bdaddr);
3102 if (!key) {
6ed93dc6
AE
3103 BT_DBG("%s link key not found for %pMR", hdev->name,
3104 &ev->bdaddr);
55ed8ca1
JH
3105 goto not_found;
3106 }
3107
6ed93dc6
AE
3108 BT_DBG("%s found key type %u for %pMR", hdev->name, key->type,
3109 &ev->bdaddr);
55ed8ca1 3110
55ed8ca1 3111 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
60b83f57 3112 if (conn) {
66138ce8
MH
3113 if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 ||
3114 key->type == HCI_LK_UNAUTH_COMBINATION_P256) &&
807deac2 3115 conn->auth_type != 0xff && (conn->auth_type & 0x01)) {
60b83f57
WR
3116 BT_DBG("%s ignoring unauthenticated key", hdev->name);
3117 goto not_found;
3118 }
55ed8ca1 3119
60b83f57 3120 if (key->type == HCI_LK_COMBINATION && key->pin_len < 16 &&
f3fb0b58
JH
3121 (conn->pending_sec_level == BT_SECURITY_HIGH ||
3122 conn->pending_sec_level == BT_SECURITY_FIPS)) {
8fc9ced3
GP
3123 BT_DBG("%s ignoring key unauthenticated for high security",
3124 hdev->name);
60b83f57
WR
3125 goto not_found;
3126 }
3127
3128 conn->key_type = key->type;
3129 conn->pin_length = key->pin_len;
55ed8ca1
JH
3130 }
3131
3132 bacpy(&cp.bdaddr, &ev->bdaddr);
9b3b4460 3133 memcpy(cp.link_key, key->val, HCI_LINK_KEY_SIZE);
55ed8ca1
JH
3134
3135 hci_send_cmd(hdev, HCI_OP_LINK_KEY_REPLY, sizeof(cp), &cp);
3136
3137 hci_dev_unlock(hdev);
3138
3139 return;
3140
3141not_found:
3142 hci_send_cmd(hdev, HCI_OP_LINK_KEY_NEG_REPLY, 6, &ev->bdaddr);
3143 hci_dev_unlock(hdev);
a9de9248
MH
3144}
3145
6039aa73 3146static void hci_link_key_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3147{
052b30b0
MH
3148 struct hci_ev_link_key_notify *ev = (void *) skb->data;
3149 struct hci_conn *conn;
7652ff6a
JH
3150 struct link_key *key;
3151 bool persistent;
55ed8ca1 3152 u8 pin_len = 0;
052b30b0 3153
a9de9248 3154 BT_DBG("%s", hdev->name);
052b30b0
MH
3155
3156 hci_dev_lock(hdev);
3157
3158 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3159 if (conn) {
3160 hci_conn_hold(conn);
3161 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
980e1a53 3162 pin_len = conn->pin_length;
13d39315
WR
3163
3164 if (ev->key_type != HCI_LK_CHANGED_COMBINATION)
3165 conn->key_type = ev->key_type;
3166
76a68ba0 3167 hci_conn_drop(conn);
052b30b0
MH
3168 }
3169
7652ff6a
JH
3170 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
3171 goto unlock;
3172
3173 key = hci_add_link_key(hdev, conn, &ev->bdaddr, ev->link_key,
3174 ev->key_type, pin_len, &persistent);
3175 if (!key)
3176 goto unlock;
3177
3178 mgmt_new_link_key(hdev, key, persistent);
55ed8ca1 3179
6d5650c4
JH
3180 /* Keep debug keys around only if the HCI_KEEP_DEBUG_KEYS flag
3181 * is set. If it's not set simply remove the key from the kernel
3182 * list (we've still notified user space about it but with
3183 * store_hint being 0).
3184 */
3185 if (key->type == HCI_LK_DEBUG_COMBINATION &&
3186 !test_bit(HCI_KEEP_DEBUG_KEYS, &hdev->dev_flags)) {
3187 list_del(&key->list);
3188 kfree(key);
3189 } else if (conn) {
af6a9c32
JH
3190 if (persistent)
3191 clear_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
3192 else
3193 set_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
6d5650c4 3194 }
7652ff6a
JH
3195
3196unlock:
052b30b0 3197 hci_dev_unlock(hdev);
a9de9248
MH
3198}
3199
6039aa73 3200static void hci_clock_offset_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 3201{
a9de9248 3202 struct hci_ev_clock_offset *ev = (void *) skb->data;
04837f64 3203 struct hci_conn *conn;
1da177e4 3204
9f1db00c 3205 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
3206
3207 hci_dev_lock(hdev);
3208
04837f64 3209 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
1da177e4
LT
3210 if (conn && !ev->status) {
3211 struct inquiry_entry *ie;
3212
cc11b9c1
AE
3213 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
3214 if (ie) {
1da177e4
LT
3215 ie->data.clock_offset = ev->clock_offset;
3216 ie->timestamp = jiffies;
3217 }
3218 }
3219
3220 hci_dev_unlock(hdev);
3221}
3222
6039aa73 3223static void hci_pkt_type_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a8746417
MH
3224{
3225 struct hci_ev_pkt_type_change *ev = (void *) skb->data;
3226 struct hci_conn *conn;
3227
9f1db00c 3228 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a8746417
MH
3229
3230 hci_dev_lock(hdev);
3231
3232 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
3233 if (conn && !ev->status)
3234 conn->pkt_type = __le16_to_cpu(ev->pkt_type);
3235
3236 hci_dev_unlock(hdev);
3237}
3238
6039aa73 3239static void hci_pscan_rep_mode_evt(struct hci_dev *hdev, struct sk_buff *skb)
85a1e930 3240{
a9de9248 3241 struct hci_ev_pscan_rep_mode *ev = (void *) skb->data;
85a1e930
MH
3242 struct inquiry_entry *ie;
3243
3244 BT_DBG("%s", hdev->name);
3245
3246 hci_dev_lock(hdev);
3247
cc11b9c1
AE
3248 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
3249 if (ie) {
85a1e930
MH
3250 ie->data.pscan_rep_mode = ev->pscan_rep_mode;
3251 ie->timestamp = jiffies;
3252 }
3253
3254 hci_dev_unlock(hdev);
3255}
3256
6039aa73
GP
3257static void hci_inquiry_result_with_rssi_evt(struct hci_dev *hdev,
3258 struct sk_buff *skb)
a9de9248
MH
3259{
3260 struct inquiry_data data;
3261 int num_rsp = *((__u8 *) skb->data);
3262
3263 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
3264
3265 if (!num_rsp)
3266 return;
3267
1519cc17
AG
3268 if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags))
3269 return;
3270
a9de9248
MH
3271 hci_dev_lock(hdev);
3272
3273 if ((skb->len - 1) / num_rsp != sizeof(struct inquiry_info_with_rssi)) {
138d22ef
SJ
3274 struct inquiry_info_with_rssi_and_pscan_mode *info;
3275 info = (void *) (skb->data + 1);
a9de9248 3276
e17acd40 3277 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3278 u32 flags;
3279
a9de9248
MH
3280 bacpy(&data.bdaddr, &info->bdaddr);
3281 data.pscan_rep_mode = info->pscan_rep_mode;
3282 data.pscan_period_mode = info->pscan_period_mode;
3283 data.pscan_mode = info->pscan_mode;
3284 memcpy(data.dev_class, info->dev_class, 3);
3285 data.clock_offset = info->clock_offset;
3286 data.rssi = info->rssi;
41a96212 3287 data.ssp_mode = 0x00;
3175405b 3288
af58925c
MH
3289 flags = hci_inquiry_cache_update(hdev, &data, false);
3290
48264f06 3291 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
04124681 3292 info->dev_class, info->rssi,
af58925c 3293 flags, NULL, 0, NULL, 0);
a9de9248
MH
3294 }
3295 } else {
3296 struct inquiry_info_with_rssi *info = (void *) (skb->data + 1);
3297
e17acd40 3298 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3299 u32 flags;
3300
a9de9248
MH
3301 bacpy(&data.bdaddr, &info->bdaddr);
3302 data.pscan_rep_mode = info->pscan_rep_mode;
3303 data.pscan_period_mode = info->pscan_period_mode;
3304 data.pscan_mode = 0x00;
3305 memcpy(data.dev_class, info->dev_class, 3);
3306 data.clock_offset = info->clock_offset;
3307 data.rssi = info->rssi;
41a96212 3308 data.ssp_mode = 0x00;
af58925c
MH
3309
3310 flags = hci_inquiry_cache_update(hdev, &data, false);
3311
48264f06 3312 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
04124681 3313 info->dev_class, info->rssi,
af58925c 3314 flags, NULL, 0, NULL, 0);
a9de9248
MH
3315 }
3316 }
3317
3318 hci_dev_unlock(hdev);
3319}
3320
6039aa73
GP
3321static void hci_remote_ext_features_evt(struct hci_dev *hdev,
3322 struct sk_buff *skb)
a9de9248 3323{
41a96212
MH
3324 struct hci_ev_remote_ext_features *ev = (void *) skb->data;
3325 struct hci_conn *conn;
3326
a9de9248 3327 BT_DBG("%s", hdev->name);
41a96212 3328
41a96212
MH
3329 hci_dev_lock(hdev);
3330
3331 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
ccd556fe
JH
3332 if (!conn)
3333 goto unlock;
41a96212 3334
cad718ed
JH
3335 if (ev->page < HCI_MAX_PAGES)
3336 memcpy(conn->features[ev->page], ev->features, 8);
3337
ccd556fe
JH
3338 if (!ev->status && ev->page == 0x01) {
3339 struct inquiry_entry *ie;
41a96212 3340
cc11b9c1
AE
3341 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
3342 if (ie)
02b7cc62 3343 ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
769be974 3344
bbb0eada 3345 if (ev->features[0] & LMP_HOST_SSP) {
58a681ef 3346 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
bbb0eada
JK
3347 } else {
3348 /* It is mandatory by the Bluetooth specification that
3349 * Extended Inquiry Results are only used when Secure
3350 * Simple Pairing is enabled, but some devices violate
3351 * this.
3352 *
3353 * To make these devices work, the internal SSP
3354 * enabled flag needs to be cleared if the remote host
3355 * features do not indicate SSP support */
3356 clear_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
3357 }
eb9a8f3f
MH
3358
3359 if (ev->features[0] & LMP_HOST_SC)
3360 set_bit(HCI_CONN_SC_ENABLED, &conn->flags);
ccd556fe
JH
3361 }
3362
3363 if (conn->state != BT_CONFIG)
3364 goto unlock;
3365
671267bf 3366 if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
127178d2
JH
3367 struct hci_cp_remote_name_req cp;
3368 memset(&cp, 0, sizeof(cp));
3369 bacpy(&cp.bdaddr, &conn->dst);
3370 cp.pscan_rep_mode = 0x02;
3371 hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
b644ba33
JH
3372 } else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
3373 mgmt_device_connected(hdev, &conn->dst, conn->type,
04124681
GP
3374 conn->dst_type, 0, NULL, 0,
3375 conn->dev_class);
392599b9 3376
127178d2 3377 if (!hci_outgoing_auth_needed(hdev, conn)) {
ccd556fe
JH
3378 conn->state = BT_CONNECTED;
3379 hci_proto_connect_cfm(conn, ev->status);
76a68ba0 3380 hci_conn_drop(conn);
41a96212
MH
3381 }
3382
ccd556fe 3383unlock:
41a96212 3384 hci_dev_unlock(hdev);
a9de9248
MH
3385}
3386
6039aa73
GP
3387static void hci_sync_conn_complete_evt(struct hci_dev *hdev,
3388 struct sk_buff *skb)
a9de9248 3389{
b6a0dc82
MH
3390 struct hci_ev_sync_conn_complete *ev = (void *) skb->data;
3391 struct hci_conn *conn;
3392
9f1db00c 3393 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
b6a0dc82
MH
3394
3395 hci_dev_lock(hdev);
3396
3397 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
9dc0a3af
MH
3398 if (!conn) {
3399 if (ev->link_type == ESCO_LINK)
3400 goto unlock;
3401
3402 conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr);
3403 if (!conn)
3404 goto unlock;
3405
3406 conn->type = SCO_LINK;
3407 }
b6a0dc82 3408
732547f9
MH
3409 switch (ev->status) {
3410 case 0x00:
b6a0dc82
MH
3411 conn->handle = __le16_to_cpu(ev->handle);
3412 conn->state = BT_CONNECTED;
7d0db0a3
MH
3413
3414 hci_conn_add_sysfs(conn);
732547f9
MH
3415 break;
3416
81218d20 3417 case 0x10: /* Connection Accept Timeout */
1a4c958c 3418 case 0x0d: /* Connection Rejected due to Limited Resources */
705e5711 3419 case 0x11: /* Unsupported Feature or Parameter Value */
732547f9 3420 case 0x1c: /* SCO interval rejected */
1038a00b 3421 case 0x1a: /* Unsupported Remote Feature */
732547f9 3422 case 0x1f: /* Unspecified error */
27539bc4 3423 case 0x20: /* Unsupported LMP Parameter value */
2dea632f 3424 if (conn->out) {
732547f9
MH
3425 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
3426 (hdev->esco_type & EDR_ESCO_MASK);
2dea632f
FD
3427 if (hci_setup_sync(conn, conn->link->handle))
3428 goto unlock;
732547f9
MH
3429 }
3430 /* fall through */
3431
3432 default:
b6a0dc82 3433 conn->state = BT_CLOSED;
732547f9
MH
3434 break;
3435 }
b6a0dc82
MH
3436
3437 hci_proto_connect_cfm(conn, ev->status);
3438 if (ev->status)
3439 hci_conn_del(conn);
3440
3441unlock:
3442 hci_dev_unlock(hdev);
a9de9248
MH
3443}
3444
efdcf8e3
MH
3445static inline size_t eir_get_length(u8 *eir, size_t eir_len)
3446{
3447 size_t parsed = 0;
3448
3449 while (parsed < eir_len) {
3450 u8 field_len = eir[0];
3451
3452 if (field_len == 0)
3453 return parsed;
3454
3455 parsed += field_len + 1;
3456 eir += field_len + 1;
3457 }
3458
3459 return eir_len;
3460}
3461
6039aa73
GP
3462static void hci_extended_inquiry_result_evt(struct hci_dev *hdev,
3463 struct sk_buff *skb)
1da177e4 3464{
a9de9248
MH
3465 struct inquiry_data data;
3466 struct extended_inquiry_info *info = (void *) (skb->data + 1);
3467 int num_rsp = *((__u8 *) skb->data);
9d939d94 3468 size_t eir_len;
1da177e4 3469
a9de9248 3470 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
1da177e4 3471
a9de9248
MH
3472 if (!num_rsp)
3473 return;
1da177e4 3474
1519cc17
AG
3475 if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags))
3476 return;
3477
a9de9248
MH
3478 hci_dev_lock(hdev);
3479
e17acd40 3480 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3481 u32 flags;
3482 bool name_known;
561aafbc 3483
a9de9248 3484 bacpy(&data.bdaddr, &info->bdaddr);
138d22ef
SJ
3485 data.pscan_rep_mode = info->pscan_rep_mode;
3486 data.pscan_period_mode = info->pscan_period_mode;
3487 data.pscan_mode = 0x00;
a9de9248 3488 memcpy(data.dev_class, info->dev_class, 3);
138d22ef
SJ
3489 data.clock_offset = info->clock_offset;
3490 data.rssi = info->rssi;
41a96212 3491 data.ssp_mode = 0x01;
561aafbc 3492
a8b2d5c2 3493 if (test_bit(HCI_MGMT, &hdev->dev_flags))
4ddb1930 3494 name_known = eir_has_data_type(info->data,
04124681
GP
3495 sizeof(info->data),
3496 EIR_NAME_COMPLETE);
561aafbc
JH
3497 else
3498 name_known = true;
3499
af58925c
MH
3500 flags = hci_inquiry_cache_update(hdev, &data, name_known);
3501
9d939d94 3502 eir_len = eir_get_length(info->data, sizeof(info->data));
af58925c 3503
48264f06 3504 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
af58925c
MH
3505 info->dev_class, info->rssi,
3506 flags, info->data, eir_len, NULL, 0);
a9de9248
MH
3507 }
3508
3509 hci_dev_unlock(hdev);
3510}
1da177e4 3511
1c2e0041
JH
3512static void hci_key_refresh_complete_evt(struct hci_dev *hdev,
3513 struct sk_buff *skb)
3514{
3515 struct hci_ev_key_refresh_complete *ev = (void *) skb->data;
3516 struct hci_conn *conn;
3517
9f1db00c 3518 BT_DBG("%s status 0x%2.2x handle 0x%4.4x", hdev->name, ev->status,
1c2e0041
JH
3519 __le16_to_cpu(ev->handle));
3520
3521 hci_dev_lock(hdev);
3522
3523 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
3524 if (!conn)
3525 goto unlock;
3526
9eb1fbfa
JH
3527 /* For BR/EDR the necessary steps are taken through the
3528 * auth_complete event.
3529 */
3530 if (conn->type != LE_LINK)
3531 goto unlock;
3532
1c2e0041
JH
3533 if (!ev->status)
3534 conn->sec_level = conn->pending_sec_level;
3535
3536 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
3537
3538 if (ev->status && conn->state == BT_CONNECTED) {
bed71748 3539 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
76a68ba0 3540 hci_conn_drop(conn);
1c2e0041
JH
3541 goto unlock;
3542 }
3543
3544 if (conn->state == BT_CONFIG) {
3545 if (!ev->status)
3546 conn->state = BT_CONNECTED;
3547
3548 hci_proto_connect_cfm(conn, ev->status);
76a68ba0 3549 hci_conn_drop(conn);
1c2e0041
JH
3550 } else {
3551 hci_auth_cfm(conn, ev->status);
3552
3553 hci_conn_hold(conn);
3554 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 3555 hci_conn_drop(conn);
1c2e0041
JH
3556 }
3557
3558unlock:
3559 hci_dev_unlock(hdev);
3560}
3561
6039aa73 3562static u8 hci_get_auth_req(struct hci_conn *conn)
17fa4b9d 3563{
17fa4b9d 3564 /* If remote requests no-bonding follow that lead */
acabae96
MA
3565 if (conn->remote_auth == HCI_AT_NO_BONDING ||
3566 conn->remote_auth == HCI_AT_NO_BONDING_MITM)
58797bf7 3567 return conn->remote_auth | (conn->auth_type & 0x01);
17fa4b9d 3568
b7f94c88
MA
3569 /* If both remote and local have enough IO capabilities, require
3570 * MITM protection
3571 */
3572 if (conn->remote_cap != HCI_IO_NO_INPUT_OUTPUT &&
3573 conn->io_capability != HCI_IO_NO_INPUT_OUTPUT)
3574 return conn->remote_auth | 0x01;
3575
7e74170a
TM
3576 /* No MITM protection possible so ignore remote requirement */
3577 return (conn->remote_auth & ~0x01) | (conn->auth_type & 0x01);
17fa4b9d
JH
3578}
3579
6039aa73 3580static void hci_io_capa_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
0493684e
MH
3581{
3582 struct hci_ev_io_capa_request *ev = (void *) skb->data;
3583 struct hci_conn *conn;
3584
3585 BT_DBG("%s", hdev->name);
3586
3587 hci_dev_lock(hdev);
3588
3589 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
03b555e1
JH
3590 if (!conn)
3591 goto unlock;
3592
3593 hci_conn_hold(conn);
3594
a8b2d5c2 3595 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
03b555e1
JH
3596 goto unlock;
3597
a8b2d5c2 3598 if (test_bit(HCI_PAIRABLE, &hdev->dev_flags) ||
807deac2 3599 (conn->remote_auth & ~0x01) == HCI_AT_NO_BONDING) {
17fa4b9d
JH
3600 struct hci_cp_io_capability_reply cp;
3601
3602 bacpy(&cp.bdaddr, &ev->bdaddr);
7a7f1e7c
HG
3603 /* Change the IO capability from KeyboardDisplay
3604 * to DisplayYesNo as it is not supported by BT spec. */
3605 cp.capability = (conn->io_capability == 0x04) ?
a767631a 3606 HCI_IO_DISPLAY_YESNO : conn->io_capability;
b7f94c88
MA
3607
3608 /* If we are initiators, there is no remote information yet */
3609 if (conn->remote_auth == 0xff) {
3610 cp.authentication = conn->auth_type;
6fd6b915 3611
b16c6604 3612 /* Request MITM protection if our IO caps allow it
4ad51a75
JH
3613 * except for the no-bonding case.
3614 * conn->auth_type is not updated here since
3615 * that might cause the user confirmation to be
3616 * rejected in case the remote doesn't have the
3617 * IO capabilities for MITM.
b16c6604 3618 */
6fd6b915 3619 if (conn->io_capability != HCI_IO_NO_INPUT_OUTPUT &&
b16c6604 3620 cp.authentication != HCI_AT_NO_BONDING)
6fd6b915 3621 cp.authentication |= 0x01;
b7f94c88
MA
3622 } else {
3623 conn->auth_type = hci_get_auth_req(conn);
3624 cp.authentication = conn->auth_type;
3625 }
17fa4b9d 3626
8fc9ced3
GP
3627 if (hci_find_remote_oob_data(hdev, &conn->dst) &&
3628 (conn->out || test_bit(HCI_CONN_REMOTE_OOB, &conn->flags)))
ce85ee13
SJ
3629 cp.oob_data = 0x01;
3630 else
3631 cp.oob_data = 0x00;
3632
17fa4b9d 3633 hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_REPLY,
807deac2 3634 sizeof(cp), &cp);
03b555e1
JH
3635 } else {
3636 struct hci_cp_io_capability_neg_reply cp;
3637
3638 bacpy(&cp.bdaddr, &ev->bdaddr);
9f5a0d7b 3639 cp.reason = HCI_ERROR_PAIRING_NOT_ALLOWED;
0493684e 3640
03b555e1 3641 hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_NEG_REPLY,
807deac2 3642 sizeof(cp), &cp);
03b555e1
JH
3643 }
3644
3645unlock:
3646 hci_dev_unlock(hdev);
3647}
3648
6039aa73 3649static void hci_io_capa_reply_evt(struct hci_dev *hdev, struct sk_buff *skb)
03b555e1
JH
3650{
3651 struct hci_ev_io_capa_reply *ev = (void *) skb->data;
3652 struct hci_conn *conn;
3653
3654 BT_DBG("%s", hdev->name);
3655
3656 hci_dev_lock(hdev);
3657
3658 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3659 if (!conn)
3660 goto unlock;
3661
03b555e1 3662 conn->remote_cap = ev->capability;
03b555e1 3663 conn->remote_auth = ev->authentication;
58a681ef
JH
3664 if (ev->oob_data)
3665 set_bit(HCI_CONN_REMOTE_OOB, &conn->flags);
03b555e1
JH
3666
3667unlock:
0493684e
MH
3668 hci_dev_unlock(hdev);
3669}
3670
6039aa73
GP
3671static void hci_user_confirm_request_evt(struct hci_dev *hdev,
3672 struct sk_buff *skb)
a5c29683
JH
3673{
3674 struct hci_ev_user_confirm_req *ev = (void *) skb->data;
55bc1a37 3675 int loc_mitm, rem_mitm, confirm_hint = 0;
7a828908 3676 struct hci_conn *conn;
a5c29683
JH
3677
3678 BT_DBG("%s", hdev->name);
3679
3680 hci_dev_lock(hdev);
3681
a8b2d5c2 3682 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
7a828908 3683 goto unlock;
a5c29683 3684
7a828908
JH
3685 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3686 if (!conn)
3687 goto unlock;
3688
3689 loc_mitm = (conn->auth_type & 0x01);
3690 rem_mitm = (conn->remote_auth & 0x01);
3691
3692 /* If we require MITM but the remote device can't provide that
6fd6b915
MA
3693 * (it has NoInputNoOutput) then reject the confirmation request
3694 */
3695 if (loc_mitm && conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) {
7a828908
JH
3696 BT_DBG("Rejecting request: remote device can't provide MITM");
3697 hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_NEG_REPLY,
807deac2 3698 sizeof(ev->bdaddr), &ev->bdaddr);
7a828908
JH
3699 goto unlock;
3700 }
3701
3702 /* If no side requires MITM protection; auto-accept */
a767631a
MA
3703 if ((!loc_mitm || conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) &&
3704 (!rem_mitm || conn->io_capability == HCI_IO_NO_INPUT_OUTPUT)) {
55bc1a37
JH
3705
3706 /* If we're not the initiators request authorization to
3707 * proceed from user space (mgmt_user_confirm with
ba15a58b
JH
3708 * confirm_hint set to 1). The exception is if neither
3709 * side had MITM in which case we do auto-accept.
3710 */
3711 if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) &&
3712 (loc_mitm || rem_mitm)) {
55bc1a37
JH
3713 BT_DBG("Confirming auto-accept as acceptor");
3714 confirm_hint = 1;
3715 goto confirm;
3716 }
3717
9f61656a 3718 BT_DBG("Auto-accept of user confirmation with %ums delay",
807deac2 3719 hdev->auto_accept_delay);
9f61656a
JH
3720
3721 if (hdev->auto_accept_delay > 0) {
3722 int delay = msecs_to_jiffies(hdev->auto_accept_delay);
7bc18d9d
JH
3723 queue_delayed_work(conn->hdev->workqueue,
3724 &conn->auto_accept_work, delay);
9f61656a
JH
3725 goto unlock;
3726 }
3727
7a828908 3728 hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_REPLY,
807deac2 3729 sizeof(ev->bdaddr), &ev->bdaddr);
7a828908
JH
3730 goto unlock;
3731 }
3732
55bc1a37 3733confirm:
39adbffe
JH
3734 mgmt_user_confirm_request(hdev, &ev->bdaddr, ACL_LINK, 0,
3735 le32_to_cpu(ev->passkey), confirm_hint);
7a828908
JH
3736
3737unlock:
a5c29683
JH
3738 hci_dev_unlock(hdev);
3739}
3740
6039aa73
GP
3741static void hci_user_passkey_request_evt(struct hci_dev *hdev,
3742 struct sk_buff *skb)
1143d458
BG
3743{
3744 struct hci_ev_user_passkey_req *ev = (void *) skb->data;
3745
3746 BT_DBG("%s", hdev->name);
3747
a8b2d5c2 3748 if (test_bit(HCI_MGMT, &hdev->dev_flags))
272d90df 3749 mgmt_user_passkey_request(hdev, &ev->bdaddr, ACL_LINK, 0);
1143d458
BG
3750}
3751
92a25256
JH
3752static void hci_user_passkey_notify_evt(struct hci_dev *hdev,
3753 struct sk_buff *skb)
3754{
3755 struct hci_ev_user_passkey_notify *ev = (void *) skb->data;
3756 struct hci_conn *conn;
3757
3758 BT_DBG("%s", hdev->name);
3759
3760 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3761 if (!conn)
3762 return;
3763
3764 conn->passkey_notify = __le32_to_cpu(ev->passkey);
3765 conn->passkey_entered = 0;
3766
3767 if (test_bit(HCI_MGMT, &hdev->dev_flags))
3768 mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
3769 conn->dst_type, conn->passkey_notify,
3770 conn->passkey_entered);
3771}
3772
3773static void hci_keypress_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
3774{
3775 struct hci_ev_keypress_notify *ev = (void *) skb->data;
3776 struct hci_conn *conn;
3777
3778 BT_DBG("%s", hdev->name);
3779
3780 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3781 if (!conn)
3782 return;
3783
3784 switch (ev->type) {
3785 case HCI_KEYPRESS_STARTED:
3786 conn->passkey_entered = 0;
3787 return;
3788
3789 case HCI_KEYPRESS_ENTERED:
3790 conn->passkey_entered++;
3791 break;
3792
3793 case HCI_KEYPRESS_ERASED:
3794 conn->passkey_entered--;
3795 break;
3796
3797 case HCI_KEYPRESS_CLEARED:
3798 conn->passkey_entered = 0;
3799 break;
3800
3801 case HCI_KEYPRESS_COMPLETED:
3802 return;
3803 }
3804
3805 if (test_bit(HCI_MGMT, &hdev->dev_flags))
3806 mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
3807 conn->dst_type, conn->passkey_notify,
3808 conn->passkey_entered);
3809}
3810
6039aa73
GP
3811static void hci_simple_pair_complete_evt(struct hci_dev *hdev,
3812 struct sk_buff *skb)
0493684e
MH
3813{
3814 struct hci_ev_simple_pair_complete *ev = (void *) skb->data;
3815 struct hci_conn *conn;
3816
3817 BT_DBG("%s", hdev->name);
3818
3819 hci_dev_lock(hdev);
3820
3821 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
2a611692
JH
3822 if (!conn)
3823 goto unlock;
3824
3825 /* To avoid duplicate auth_failed events to user space we check
3826 * the HCI_CONN_AUTH_PEND flag which will be set if we
3827 * initiated the authentication. A traditional auth_complete
3828 * event gets always produced as initiator and is also mapped to
3829 * the mgmt_auth_failed event */
fa1bd918 3830 if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) && ev->status)
bab73cb6 3831 mgmt_auth_failed(hdev, &conn->dst, conn->type, conn->dst_type,
04124681 3832 ev->status);
0493684e 3833
76a68ba0 3834 hci_conn_drop(conn);
2a611692
JH
3835
3836unlock:
0493684e
MH
3837 hci_dev_unlock(hdev);
3838}
3839
6039aa73
GP
3840static void hci_remote_host_features_evt(struct hci_dev *hdev,
3841 struct sk_buff *skb)
41a96212
MH
3842{
3843 struct hci_ev_remote_host_features *ev = (void *) skb->data;
3844 struct inquiry_entry *ie;
cad718ed 3845 struct hci_conn *conn;
41a96212
MH
3846
3847 BT_DBG("%s", hdev->name);
3848
3849 hci_dev_lock(hdev);
3850
cad718ed
JH
3851 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3852 if (conn)
3853 memcpy(conn->features[1], ev->features, 8);
3854
cc11b9c1
AE
3855 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
3856 if (ie)
02b7cc62 3857 ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
41a96212
MH
3858
3859 hci_dev_unlock(hdev);
3860}
3861
6039aa73
GP
3862static void hci_remote_oob_data_request_evt(struct hci_dev *hdev,
3863 struct sk_buff *skb)
2763eda6
SJ
3864{
3865 struct hci_ev_remote_oob_data_request *ev = (void *) skb->data;
3866 struct oob_data *data;
3867
3868 BT_DBG("%s", hdev->name);
3869
3870 hci_dev_lock(hdev);
3871
a8b2d5c2 3872 if (!test_bit(HCI_MGMT, &hdev->dev_flags))
e1ba1f15
SJ
3873 goto unlock;
3874
2763eda6
SJ
3875 data = hci_find_remote_oob_data(hdev, &ev->bdaddr);
3876 if (data) {
519ca9d0
MH
3877 if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags)) {
3878 struct hci_cp_remote_oob_ext_data_reply cp;
2763eda6 3879
519ca9d0
MH
3880 bacpy(&cp.bdaddr, &ev->bdaddr);
3881 memcpy(cp.hash192, data->hash192, sizeof(cp.hash192));
3882 memcpy(cp.randomizer192, data->randomizer192,
3883 sizeof(cp.randomizer192));
3884 memcpy(cp.hash256, data->hash256, sizeof(cp.hash256));
3885 memcpy(cp.randomizer256, data->randomizer256,
3886 sizeof(cp.randomizer256));
3887
3888 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_EXT_DATA_REPLY,
3889 sizeof(cp), &cp);
3890 } else {
3891 struct hci_cp_remote_oob_data_reply cp;
2763eda6 3892
519ca9d0
MH
3893 bacpy(&cp.bdaddr, &ev->bdaddr);
3894 memcpy(cp.hash, data->hash192, sizeof(cp.hash));
3895 memcpy(cp.randomizer, data->randomizer192,
3896 sizeof(cp.randomizer));
3897
3898 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_REPLY,
3899 sizeof(cp), &cp);
3900 }
2763eda6
SJ
3901 } else {
3902 struct hci_cp_remote_oob_data_neg_reply cp;
3903
3904 bacpy(&cp.bdaddr, &ev->bdaddr);
519ca9d0
MH
3905 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_NEG_REPLY,
3906 sizeof(cp), &cp);
2763eda6
SJ
3907 }
3908
e1ba1f15 3909unlock:
2763eda6
SJ
3910 hci_dev_unlock(hdev);
3911}
3912
d5e91192
AE
3913static void hci_phy_link_complete_evt(struct hci_dev *hdev,
3914 struct sk_buff *skb)
3915{
3916 struct hci_ev_phy_link_complete *ev = (void *) skb->data;
3917 struct hci_conn *hcon, *bredr_hcon;
3918
3919 BT_DBG("%s handle 0x%2.2x status 0x%2.2x", hdev->name, ev->phy_handle,
3920 ev->status);
3921
3922 hci_dev_lock(hdev);
3923
3924 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
3925 if (!hcon) {
3926 hci_dev_unlock(hdev);
3927 return;
3928 }
3929
3930 if (ev->status) {
3931 hci_conn_del(hcon);
3932 hci_dev_unlock(hdev);
3933 return;
3934 }
3935
3936 bredr_hcon = hcon->amp_mgr->l2cap_conn->hcon;
3937
3938 hcon->state = BT_CONNECTED;
3939 bacpy(&hcon->dst, &bredr_hcon->dst);
3940
3941 hci_conn_hold(hcon);
3942 hcon->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 3943 hci_conn_drop(hcon);
d5e91192 3944
d5e91192
AE
3945 hci_conn_add_sysfs(hcon);
3946
cf70ff22 3947 amp_physical_cfm(bredr_hcon, hcon);
d5e91192 3948
cf70ff22 3949 hci_dev_unlock(hdev);
d5e91192
AE
3950}
3951
27695fb4
AE
3952static void hci_loglink_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
3953{
3954 struct hci_ev_logical_link_complete *ev = (void *) skb->data;
3955 struct hci_conn *hcon;
3956 struct hci_chan *hchan;
3957 struct amp_mgr *mgr;
3958
3959 BT_DBG("%s log_handle 0x%4.4x phy_handle 0x%2.2x status 0x%2.2x",
3960 hdev->name, le16_to_cpu(ev->handle), ev->phy_handle,
3961 ev->status);
3962
3963 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
3964 if (!hcon)
3965 return;
3966
3967 /* Create AMP hchan */
3968 hchan = hci_chan_create(hcon);
3969 if (!hchan)
3970 return;
3971
3972 hchan->handle = le16_to_cpu(ev->handle);
3973
3974 BT_DBG("hcon %p mgr %p hchan %p", hcon, hcon->amp_mgr, hchan);
3975
3976 mgr = hcon->amp_mgr;
3977 if (mgr && mgr->bredr_chan) {
3978 struct l2cap_chan *bredr_chan = mgr->bredr_chan;
3979
3980 l2cap_chan_lock(bredr_chan);
3981
3982 bredr_chan->conn->mtu = hdev->block_mtu;
3983 l2cap_logical_cfm(bredr_chan, hchan, 0);
3984 hci_conn_hold(hcon);
3985
3986 l2cap_chan_unlock(bredr_chan);
3987 }
3988}
3989
606e2a10
AE
3990static void hci_disconn_loglink_complete_evt(struct hci_dev *hdev,
3991 struct sk_buff *skb)
3992{
3993 struct hci_ev_disconn_logical_link_complete *ev = (void *) skb->data;
3994 struct hci_chan *hchan;
3995
3996 BT_DBG("%s log handle 0x%4.4x status 0x%2.2x", hdev->name,
3997 le16_to_cpu(ev->handle), ev->status);
3998
3999 if (ev->status)
4000 return;
4001
4002 hci_dev_lock(hdev);
4003
4004 hchan = hci_chan_lookup_handle(hdev, le16_to_cpu(ev->handle));
4005 if (!hchan)
4006 goto unlock;
4007
4008 amp_destroy_logical_link(hchan, ev->reason);
4009
4010unlock:
4011 hci_dev_unlock(hdev);
4012}
4013
9eef6b3a
AE
4014static void hci_disconn_phylink_complete_evt(struct hci_dev *hdev,
4015 struct sk_buff *skb)
4016{
4017 struct hci_ev_disconn_phy_link_complete *ev = (void *) skb->data;
4018 struct hci_conn *hcon;
4019
4020 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
4021
4022 if (ev->status)
4023 return;
4024
4025 hci_dev_lock(hdev);
4026
4027 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
4028 if (hcon) {
4029 hcon->state = BT_CLOSED;
4030 hci_conn_del(hcon);
4031 }
4032
4033 hci_dev_unlock(hdev);
4034}
4035
6039aa73 4036static void hci_le_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
fcd89c09
VT
4037{
4038 struct hci_ev_le_conn_complete *ev = (void *) skb->data;
4039 struct hci_conn *conn;
68d6f6de 4040 struct smp_irk *irk;
837d502e 4041 u8 addr_type;
fcd89c09 4042
9f1db00c 4043 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
fcd89c09
VT
4044
4045 hci_dev_lock(hdev);
4046
b47a09b3 4047 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
b62f328b
VT
4048 if (!conn) {
4049 conn = hci_conn_add(hdev, LE_LINK, &ev->bdaddr);
4050 if (!conn) {
4051 BT_ERR("No memory for new connection");
230fd16a 4052 goto unlock;
b62f328b 4053 }
29b7988a
AG
4054
4055 conn->dst_type = ev->bdaddr_type;
b9b343d2
AG
4056
4057 if (ev->role == LE_CONN_ROLE_MASTER) {
4058 conn->out = true;
4dae2798 4059 set_bit(HCI_CONN_MASTER, &conn->flags);
b9b343d2 4060 }
cb1d68f7
JH
4061
4062 /* If we didn't have a hci_conn object previously
4063 * but we're in master role this must be something
4064 * initiated using a white list. Since white list based
4065 * connections are not "first class citizens" we don't
4066 * have full tracking of them. Therefore, we go ahead
4067 * with a "best effort" approach of determining the
4068 * initiator address based on the HCI_PRIVACY flag.
4069 */
4070 if (conn->out) {
4071 conn->resp_addr_type = ev->bdaddr_type;
4072 bacpy(&conn->resp_addr, &ev->bdaddr);
4073 if (test_bit(HCI_PRIVACY, &hdev->dev_flags)) {
4074 conn->init_addr_type = ADDR_LE_DEV_RANDOM;
4075 bacpy(&conn->init_addr, &hdev->rpa);
4076 } else {
4077 hci_copy_identity_address(hdev,
4078 &conn->init_addr,
4079 &conn->init_addr_type);
4080 }
cb1d68f7 4081 }
9489eca4
JH
4082 } else {
4083 cancel_delayed_work(&conn->le_conn_timeout);
b62f328b 4084 }
fcd89c09 4085
80c24ab8
JH
4086 if (!conn->out) {
4087 /* Set the responder (our side) address type based on
4088 * the advertising address type.
4089 */
4090 conn->resp_addr_type = hdev->adv_addr_type;
4091 if (hdev->adv_addr_type == ADDR_LE_DEV_RANDOM)
4092 bacpy(&conn->resp_addr, &hdev->random_addr);
4093 else
4094 bacpy(&conn->resp_addr, &hdev->bdaddr);
4095
4096 conn->init_addr_type = ev->bdaddr_type;
4097 bacpy(&conn->init_addr, &ev->bdaddr);
a720d735
MH
4098
4099 /* For incoming connections, set the default minimum
4100 * and maximum connection interval. They will be used
4101 * to check if the parameters are in range and if not
4102 * trigger the connection update procedure.
4103 */
4104 conn->le_conn_min_interval = hdev->le_conn_min_interval;
4105 conn->le_conn_max_interval = hdev->le_conn_max_interval;
80c24ab8 4106 }
7be2edbb 4107
edb4b466
MH
4108 /* Lookup the identity address from the stored connection
4109 * address and address type.
4110 *
4111 * When establishing connections to an identity address, the
4112 * connection procedure will store the resolvable random
4113 * address first. Now if it can be converted back into the
4114 * identity address, start using the identity address from
4115 * now on.
4116 */
4117 irk = hci_get_irk(hdev, &conn->dst, conn->dst_type);
68d6f6de
JH
4118 if (irk) {
4119 bacpy(&conn->dst, &irk->bdaddr);
4120 conn->dst_type = irk->addr_type;
4121 }
4122
837d502e
JH
4123 if (conn->dst_type == ADDR_LE_DEV_PUBLIC)
4124 addr_type = BDADDR_LE_PUBLIC;
4125 else
4126 addr_type = BDADDR_LE_RANDOM;
4127
4128 /* Drop the connection if he device is blocked */
4129 if (hci_blacklist_lookup(hdev, &conn->dst, addr_type)) {
4130 hci_conn_drop(conn);
4131 goto unlock;
4132 }
4133
cd17decb 4134 if (ev->status) {
06c053fb 4135 hci_le_conn_failed(conn, ev->status);
cd17decb
AG
4136 goto unlock;
4137 }
4138
b644ba33 4139 if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
01fdb0fc 4140 mgmt_device_connected(hdev, &conn->dst, conn->type,
04124681 4141 conn->dst_type, 0, NULL, 0, NULL);
83bc71b4 4142
7b5c0d52 4143 conn->sec_level = BT_SECURITY_LOW;
fcd89c09
VT
4144 conn->handle = __le16_to_cpu(ev->handle);
4145 conn->state = BT_CONNECTED;
4146
e04fde60
MH
4147 conn->le_conn_interval = le16_to_cpu(ev->interval);
4148 conn->le_conn_latency = le16_to_cpu(ev->latency);
4149 conn->le_supv_timeout = le16_to_cpu(ev->supervision_timeout);
4150
fcd89c09
VT
4151 hci_conn_add_sysfs(conn);
4152
4153 hci_proto_connect_cfm(conn, ev->status);
4154
a4790dbd
AG
4155 hci_pend_le_conn_del(hdev, &conn->dst, conn->dst_type);
4156
fcd89c09
VT
4157unlock:
4158 hci_dev_unlock(hdev);
4159}
4160
1855d92d
MH
4161static void hci_le_conn_update_complete_evt(struct hci_dev *hdev,
4162 struct sk_buff *skb)
4163{
4164 struct hci_ev_le_conn_update_complete *ev = (void *) skb->data;
4165 struct hci_conn *conn;
4166
4167 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
4168
4169 if (ev->status)
4170 return;
4171
4172 hci_dev_lock(hdev);
4173
4174 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
4175 if (conn) {
4176 conn->le_conn_interval = le16_to_cpu(ev->interval);
4177 conn->le_conn_latency = le16_to_cpu(ev->latency);
4178 conn->le_supv_timeout = le16_to_cpu(ev->supervision_timeout);
4179 }
4180
4181 hci_dev_unlock(hdev);
4182}
4183
a4790dbd
AG
4184/* This function requires the caller holds hdev->lock */
4185static void check_pending_le_conn(struct hci_dev *hdev, bdaddr_t *addr,
4186 u8 addr_type)
4187{
4188 struct hci_conn *conn;
5b906a84
AG
4189 struct smp_irk *irk;
4190
4191 /* If this is a resolvable address, we should resolve it and then
4192 * update address and address type variables.
4193 */
4194 irk = hci_get_irk(hdev, addr, addr_type);
4195 if (irk) {
4196 addr = &irk->bdaddr;
4197 addr_type = irk->addr_type;
4198 }
a4790dbd
AG
4199
4200 if (!hci_pend_le_conn_lookup(hdev, addr, addr_type))
4201 return;
4202
4203 conn = hci_connect_le(hdev, addr, addr_type, BT_SECURITY_LOW,
4204 HCI_AT_NO_BONDING);
4205 if (!IS_ERR(conn))
4206 return;
4207
4208 switch (PTR_ERR(conn)) {
4209 case -EBUSY:
4210 /* If hci_connect() returns -EBUSY it means there is already
4211 * an LE connection attempt going on. Since controllers don't
4212 * support more than one connection attempt at the time, we
4213 * don't consider this an error case.
4214 */
4215 break;
4216 default:
4217 BT_DBG("Failed to connect: err %ld", PTR_ERR(conn));
4218 }
4219}
4220
4af605d8
JH
4221static void process_adv_report(struct hci_dev *hdev, u8 type, bdaddr_t *bdaddr,
4222 u8 bdaddr_type, s8 rssi, u8 *data, u8 len)
4223{
b9a6328f 4224 struct discovery_state *d = &hdev->discovery;
474ee066 4225 bool match;
c70a7e4c 4226 u32 flags;
b9a6328f 4227
ca5c4be7
JH
4228 /* Passive scanning shouldn't trigger any device found events */
4229 if (hdev->le_scan_type == LE_SCAN_PASSIVE) {
4230 if (type == LE_ADV_IND || type == LE_ADV_DIRECT_IND)
4231 check_pending_le_conn(hdev, bdaddr, bdaddr_type);
4232 return;
4233 }
4af605d8 4234
c70a7e4c
MH
4235 /* When receiving non-connectable or scannable undirected
4236 * advertising reports, this means that the remote device is
4237 * not connectable and then clearly indicate this in the
4238 * device found event.
4239 *
4240 * When receiving a scan response, then there is no way to
4241 * know if the remote device is connectable or not. However
4242 * since scan responses are merged with a previously seen
4243 * advertising report, the flags field from that report
4244 * will be used.
4245 *
4246 * In the really unlikely case that a controller get confused
4247 * and just sends a scan response event, then it is marked as
4248 * not connectable as well.
4249 */
4250 if (type == LE_ADV_NONCONN_IND || type == LE_ADV_SCAN_IND ||
4251 type == LE_ADV_SCAN_RSP)
4252 flags = MGMT_DEV_FOUND_NOT_CONNECTABLE;
4253 else
4254 flags = 0;
4255
b9a6328f
JH
4256 /* If there's nothing pending either store the data from this
4257 * event or send an immediate device found event if the data
4258 * should not be stored for later.
4259 */
4260 if (!has_pending_adv_report(hdev)) {
4261 /* If the report will trigger a SCAN_REQ store it for
4262 * later merging.
4263 */
4264 if (type == LE_ADV_IND || type == LE_ADV_SCAN_IND) {
4265 store_pending_adv_report(hdev, bdaddr, bdaddr_type,
c70a7e4c 4266 rssi, flags, data, len);
b9a6328f
JH
4267 return;
4268 }
4269
4270 mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
c70a7e4c 4271 rssi, flags, data, len, NULL, 0);
b9a6328f
JH
4272 return;
4273 }
4274
474ee066
JH
4275 /* Check if the pending report is for the same device as the new one */
4276 match = (!bacmp(bdaddr, &d->last_adv_addr) &&
4277 bdaddr_type == d->last_adv_addr_type);
4278
b9a6328f
JH
4279 /* If the pending data doesn't match this report or this isn't a
4280 * scan response (e.g. we got a duplicate ADV_IND) then force
4281 * sending of the pending data.
4282 */
474ee066
JH
4283 if (type != LE_ADV_SCAN_RSP || !match) {
4284 /* Send out whatever is in the cache, but skip duplicates */
4285 if (!match)
4286 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
ff5cd29f 4287 d->last_adv_addr_type, NULL,
c70a7e4c 4288 d->last_adv_rssi, d->last_adv_flags,
ff5cd29f 4289 d->last_adv_data,
474ee066 4290 d->last_adv_data_len, NULL, 0);
b9a6328f
JH
4291
4292 /* If the new report will trigger a SCAN_REQ store it for
4293 * later merging.
4294 */
4295 if (type == LE_ADV_IND || type == LE_ADV_SCAN_IND) {
4296 store_pending_adv_report(hdev, bdaddr, bdaddr_type,
c70a7e4c 4297 rssi, flags, data, len);
b9a6328f
JH
4298 return;
4299 }
4300
4301 /* The advertising reports cannot be merged, so clear
4302 * the pending report and send out a device found event.
4303 */
4304 clear_pending_adv_report(hdev);
5c5b93e4 4305 mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
c70a7e4c 4306 rssi, flags, data, len, NULL, 0);
b9a6328f
JH
4307 return;
4308 }
4309
4310 /* If we get here we've got a pending ADV_IND or ADV_SCAN_IND and
4311 * the new event is a SCAN_RSP. We can therefore proceed with
4312 * sending a merged device found event.
4313 */
4314 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
c70a7e4c 4315 d->last_adv_addr_type, NULL, rssi, d->last_adv_flags,
42bd6a56 4316 d->last_adv_data, d->last_adv_data_len, data, len);
b9a6328f 4317 clear_pending_adv_report(hdev);
4af605d8
JH
4318}
4319
6039aa73 4320static void hci_le_adv_report_evt(struct hci_dev *hdev, struct sk_buff *skb)
9aa04c91 4321{
e95beb41
AG
4322 u8 num_reports = skb->data[0];
4323 void *ptr = &skb->data[1];
9aa04c91 4324
a4790dbd
AG
4325 hci_dev_lock(hdev);
4326
e95beb41
AG
4327 while (num_reports--) {
4328 struct hci_ev_le_advertising_info *ev = ptr;
4af605d8 4329 s8 rssi;
a4790dbd 4330
3c9e9195 4331 rssi = ev->data[ev->length];
4af605d8
JH
4332 process_adv_report(hdev, ev->evt_type, &ev->bdaddr,
4333 ev->bdaddr_type, rssi, ev->data, ev->length);
3c9e9195 4334
e95beb41 4335 ptr += sizeof(*ev) + ev->length + 1;
9aa04c91 4336 }
a4790dbd
AG
4337
4338 hci_dev_unlock(hdev);
9aa04c91
AG
4339}
4340
6039aa73 4341static void hci_le_ltk_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a7a595f6
VCG
4342{
4343 struct hci_ev_le_ltk_req *ev = (void *) skb->data;
4344 struct hci_cp_le_ltk_reply cp;
bea710fe 4345 struct hci_cp_le_ltk_neg_reply neg;
a7a595f6 4346 struct hci_conn *conn;
c9839a11 4347 struct smp_ltk *ltk;
a7a595f6 4348
9f1db00c 4349 BT_DBG("%s handle 0x%4.4x", hdev->name, __le16_to_cpu(ev->handle));
a7a595f6
VCG
4350
4351 hci_dev_lock(hdev);
4352
4353 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
bea710fe
VCG
4354 if (conn == NULL)
4355 goto not_found;
a7a595f6 4356
fe39c7b2 4357 ltk = hci_find_ltk(hdev, ev->ediv, ev->rand, conn->out);
bea710fe
VCG
4358 if (ltk == NULL)
4359 goto not_found;
4360
4361 memcpy(cp.ltk, ltk->val, sizeof(ltk->val));
a7a595f6 4362 cp.handle = cpu_to_le16(conn->handle);
c9839a11
VCG
4363
4364 if (ltk->authenticated)
f8776218
AG
4365 conn->pending_sec_level = BT_SECURITY_HIGH;
4366 else
4367 conn->pending_sec_level = BT_SECURITY_MEDIUM;
a7a595f6 4368
89cbb4da 4369 conn->enc_key_size = ltk->enc_size;
a7a595f6
VCG
4370
4371 hci_send_cmd(hdev, HCI_OP_LE_LTK_REPLY, sizeof(cp), &cp);
4372
5981a882
CT
4373 /* Ref. Bluetooth Core SPEC pages 1975 and 2004. STK is a
4374 * temporary key used to encrypt a connection following
4375 * pairing. It is used during the Encrypted Session Setup to
4376 * distribute the keys. Later, security can be re-established
4377 * using a distributed LTK.
4378 */
2ceba539 4379 if (ltk->type == SMP_STK) {
fe59a05f 4380 set_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
c9839a11
VCG
4381 list_del(&ltk->list);
4382 kfree(ltk);
fe59a05f
JH
4383 } else {
4384 clear_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
c9839a11
VCG
4385 }
4386
a7a595f6 4387 hci_dev_unlock(hdev);
bea710fe
VCG
4388
4389 return;
4390
4391not_found:
4392 neg.handle = ev->handle;
4393 hci_send_cmd(hdev, HCI_OP_LE_LTK_NEG_REPLY, sizeof(neg), &neg);
4394 hci_dev_unlock(hdev);
a7a595f6
VCG
4395}
4396
8e75b46a
AG
4397static void send_conn_param_neg_reply(struct hci_dev *hdev, u16 handle,
4398 u8 reason)
4399{
4400 struct hci_cp_le_conn_param_req_neg_reply cp;
4401
4402 cp.handle = cpu_to_le16(handle);
4403 cp.reason = reason;
4404
4405 hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_NEG_REPLY, sizeof(cp),
4406 &cp);
4407}
4408
4409static void hci_le_remote_conn_param_req_evt(struct hci_dev *hdev,
4410 struct sk_buff *skb)
4411{
4412 struct hci_ev_le_remote_conn_param_req *ev = (void *) skb->data;
4413 struct hci_cp_le_conn_param_req_reply cp;
4414 struct hci_conn *hcon;
4415 u16 handle, min, max, latency, timeout;
4416
4417 handle = le16_to_cpu(ev->handle);
4418 min = le16_to_cpu(ev->interval_min);
4419 max = le16_to_cpu(ev->interval_max);
4420 latency = le16_to_cpu(ev->latency);
4421 timeout = le16_to_cpu(ev->timeout);
4422
4423 hcon = hci_conn_hash_lookup_handle(hdev, handle);
4424 if (!hcon || hcon->state != BT_CONNECTED)
4425 return send_conn_param_neg_reply(hdev, handle,
4426 HCI_ERROR_UNKNOWN_CONN_ID);
4427
4428 if (hci_check_conn_params(min, max, latency, timeout))
4429 return send_conn_param_neg_reply(hdev, handle,
4430 HCI_ERROR_INVALID_LL_PARAMS);
4431
ffb5a827
AG
4432 if (test_bit(HCI_CONN_MASTER, &hcon->flags))
4433 mgmt_new_conn_param(hdev, &hcon->dst, hcon->dst_type, min, max,
4434 latency, timeout);
4435
8e75b46a
AG
4436 cp.handle = ev->handle;
4437 cp.interval_min = ev->interval_min;
4438 cp.interval_max = ev->interval_max;
4439 cp.latency = ev->latency;
4440 cp.timeout = ev->timeout;
4441 cp.min_ce_len = 0;
4442 cp.max_ce_len = 0;
4443
4444 hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_REPLY, sizeof(cp), &cp);
4445}
4446
6039aa73 4447static void hci_le_meta_evt(struct hci_dev *hdev, struct sk_buff *skb)
fcd89c09
VT
4448{
4449 struct hci_ev_le_meta *le_ev = (void *) skb->data;
4450
4451 skb_pull(skb, sizeof(*le_ev));
4452
4453 switch (le_ev->subevent) {
4454 case HCI_EV_LE_CONN_COMPLETE:
4455 hci_le_conn_complete_evt(hdev, skb);
4456 break;
4457
1855d92d
MH
4458 case HCI_EV_LE_CONN_UPDATE_COMPLETE:
4459 hci_le_conn_update_complete_evt(hdev, skb);
4460 break;
4461
9aa04c91
AG
4462 case HCI_EV_LE_ADVERTISING_REPORT:
4463 hci_le_adv_report_evt(hdev, skb);
4464 break;
4465
a7a595f6
VCG
4466 case HCI_EV_LE_LTK_REQ:
4467 hci_le_ltk_request_evt(hdev, skb);
4468 break;
4469
8e75b46a
AG
4470 case HCI_EV_LE_REMOTE_CONN_PARAM_REQ:
4471 hci_le_remote_conn_param_req_evt(hdev, skb);
4472 break;
4473
fcd89c09
VT
4474 default:
4475 break;
4476 }
4477}
4478
9495b2ee
AE
4479static void hci_chan_selected_evt(struct hci_dev *hdev, struct sk_buff *skb)
4480{
4481 struct hci_ev_channel_selected *ev = (void *) skb->data;
4482 struct hci_conn *hcon;
4483
4484 BT_DBG("%s handle 0x%2.2x", hdev->name, ev->phy_handle);
4485
4486 skb_pull(skb, sizeof(*ev));
4487
4488 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
4489 if (!hcon)
4490 return;
4491
4492 amp_read_loc_assoc_final_data(hdev, hcon);
4493}
4494
a9de9248
MH
4495void hci_event_packet(struct hci_dev *hdev, struct sk_buff *skb)
4496{
4497 struct hci_event_hdr *hdr = (void *) skb->data;
4498 __u8 event = hdr->evt;
4499
b6ddb638
JH
4500 hci_dev_lock(hdev);
4501
4502 /* Received events are (currently) only needed when a request is
4503 * ongoing so avoid unnecessary memory allocation.
4504 */
4505 if (hdev->req_status == HCI_REQ_PEND) {
4506 kfree_skb(hdev->recv_evt);
4507 hdev->recv_evt = skb_clone(skb, GFP_KERNEL);
4508 }
4509
4510 hci_dev_unlock(hdev);
4511
a9de9248
MH
4512 skb_pull(skb, HCI_EVENT_HDR_SIZE);
4513
02350a72 4514 if (hdev->sent_cmd && bt_cb(hdev->sent_cmd)->req.event == event) {
c1f23a2b
JB
4515 struct hci_command_hdr *cmd_hdr = (void *) hdev->sent_cmd->data;
4516 u16 opcode = __le16_to_cpu(cmd_hdr->opcode);
02350a72
JH
4517
4518 hci_req_cmd_complete(hdev, opcode, 0);
4519 }
4520
a9de9248 4521 switch (event) {
1da177e4
LT
4522 case HCI_EV_INQUIRY_COMPLETE:
4523 hci_inquiry_complete_evt(hdev, skb);
4524 break;
4525
4526 case HCI_EV_INQUIRY_RESULT:
4527 hci_inquiry_result_evt(hdev, skb);
4528 break;
4529
a9de9248
MH
4530 case HCI_EV_CONN_COMPLETE:
4531 hci_conn_complete_evt(hdev, skb);
21d9e30e
MH
4532 break;
4533
1da177e4
LT
4534 case HCI_EV_CONN_REQUEST:
4535 hci_conn_request_evt(hdev, skb);
4536 break;
4537
1da177e4
LT
4538 case HCI_EV_DISCONN_COMPLETE:
4539 hci_disconn_complete_evt(hdev, skb);
4540 break;
4541
1da177e4
LT
4542 case HCI_EV_AUTH_COMPLETE:
4543 hci_auth_complete_evt(hdev, skb);
4544 break;
4545
a9de9248
MH
4546 case HCI_EV_REMOTE_NAME:
4547 hci_remote_name_evt(hdev, skb);
4548 break;
4549
1da177e4
LT
4550 case HCI_EV_ENCRYPT_CHANGE:
4551 hci_encrypt_change_evt(hdev, skb);
4552 break;
4553
a9de9248
MH
4554 case HCI_EV_CHANGE_LINK_KEY_COMPLETE:
4555 hci_change_link_key_complete_evt(hdev, skb);
4556 break;
4557
4558 case HCI_EV_REMOTE_FEATURES:
4559 hci_remote_features_evt(hdev, skb);
4560 break;
4561
a9de9248
MH
4562 case HCI_EV_CMD_COMPLETE:
4563 hci_cmd_complete_evt(hdev, skb);
4564 break;
4565
4566 case HCI_EV_CMD_STATUS:
4567 hci_cmd_status_evt(hdev, skb);
4568 break;
4569
4570 case HCI_EV_ROLE_CHANGE:
4571 hci_role_change_evt(hdev, skb);
4572 break;
4573
4574 case HCI_EV_NUM_COMP_PKTS:
4575 hci_num_comp_pkts_evt(hdev, skb);
4576 break;
4577
4578 case HCI_EV_MODE_CHANGE:
4579 hci_mode_change_evt(hdev, skb);
1da177e4
LT
4580 break;
4581
4582 case HCI_EV_PIN_CODE_REQ:
4583 hci_pin_code_request_evt(hdev, skb);
4584 break;
4585
4586 case HCI_EV_LINK_KEY_REQ:
4587 hci_link_key_request_evt(hdev, skb);
4588 break;
4589
4590 case HCI_EV_LINK_KEY_NOTIFY:
4591 hci_link_key_notify_evt(hdev, skb);
4592 break;
4593
4594 case HCI_EV_CLOCK_OFFSET:
4595 hci_clock_offset_evt(hdev, skb);
4596 break;
4597
a8746417
MH
4598 case HCI_EV_PKT_TYPE_CHANGE:
4599 hci_pkt_type_change_evt(hdev, skb);
4600 break;
4601
85a1e930
MH
4602 case HCI_EV_PSCAN_REP_MODE:
4603 hci_pscan_rep_mode_evt(hdev, skb);
4604 break;
4605
a9de9248
MH
4606 case HCI_EV_INQUIRY_RESULT_WITH_RSSI:
4607 hci_inquiry_result_with_rssi_evt(hdev, skb);
04837f64
MH
4608 break;
4609
a9de9248
MH
4610 case HCI_EV_REMOTE_EXT_FEATURES:
4611 hci_remote_ext_features_evt(hdev, skb);
1da177e4
LT
4612 break;
4613
a9de9248
MH
4614 case HCI_EV_SYNC_CONN_COMPLETE:
4615 hci_sync_conn_complete_evt(hdev, skb);
4616 break;
1da177e4 4617
a9de9248
MH
4618 case HCI_EV_EXTENDED_INQUIRY_RESULT:
4619 hci_extended_inquiry_result_evt(hdev, skb);
4620 break;
1da177e4 4621
1c2e0041
JH
4622 case HCI_EV_KEY_REFRESH_COMPLETE:
4623 hci_key_refresh_complete_evt(hdev, skb);
4624 break;
4625
0493684e
MH
4626 case HCI_EV_IO_CAPA_REQUEST:
4627 hci_io_capa_request_evt(hdev, skb);
4628 break;
4629
03b555e1
JH
4630 case HCI_EV_IO_CAPA_REPLY:
4631 hci_io_capa_reply_evt(hdev, skb);
4632 break;
4633
a5c29683
JH
4634 case HCI_EV_USER_CONFIRM_REQUEST:
4635 hci_user_confirm_request_evt(hdev, skb);
4636 break;
4637
1143d458
BG
4638 case HCI_EV_USER_PASSKEY_REQUEST:
4639 hci_user_passkey_request_evt(hdev, skb);
4640 break;
4641
92a25256
JH
4642 case HCI_EV_USER_PASSKEY_NOTIFY:
4643 hci_user_passkey_notify_evt(hdev, skb);
4644 break;
4645
4646 case HCI_EV_KEYPRESS_NOTIFY:
4647 hci_keypress_notify_evt(hdev, skb);
4648 break;
4649
0493684e
MH
4650 case HCI_EV_SIMPLE_PAIR_COMPLETE:
4651 hci_simple_pair_complete_evt(hdev, skb);
4652 break;
4653
41a96212
MH
4654 case HCI_EV_REMOTE_HOST_FEATURES:
4655 hci_remote_host_features_evt(hdev, skb);
4656 break;
4657
fcd89c09
VT
4658 case HCI_EV_LE_META:
4659 hci_le_meta_evt(hdev, skb);
4660 break;
4661
9495b2ee
AE
4662 case HCI_EV_CHANNEL_SELECTED:
4663 hci_chan_selected_evt(hdev, skb);
4664 break;
4665
2763eda6
SJ
4666 case HCI_EV_REMOTE_OOB_DATA_REQUEST:
4667 hci_remote_oob_data_request_evt(hdev, skb);
4668 break;
4669
d5e91192
AE
4670 case HCI_EV_PHY_LINK_COMPLETE:
4671 hci_phy_link_complete_evt(hdev, skb);
4672 break;
4673
27695fb4
AE
4674 case HCI_EV_LOGICAL_LINK_COMPLETE:
4675 hci_loglink_complete_evt(hdev, skb);
4676 break;
4677
606e2a10
AE
4678 case HCI_EV_DISCONN_LOGICAL_LINK_COMPLETE:
4679 hci_disconn_loglink_complete_evt(hdev, skb);
4680 break;
4681
9eef6b3a
AE
4682 case HCI_EV_DISCONN_PHY_LINK_COMPLETE:
4683 hci_disconn_phylink_complete_evt(hdev, skb);
4684 break;
4685
25e89e99
AE
4686 case HCI_EV_NUM_COMP_BLOCKS:
4687 hci_num_comp_blocks_evt(hdev, skb);
4688 break;
4689
a9de9248 4690 default:
9f1db00c 4691 BT_DBG("%s event 0x%2.2x", hdev->name, event);
1da177e4
LT
4692 break;
4693 }
4694
4695 kfree_skb(skb);
4696 hdev->stat.evt_rx++;
4697}
This page took 1.460727 seconds and 5 git commands to generate.