Merge branch 'inet-frag-fixes'
[linux-2.6-block.git] / net / bluetooth / hci_event.c
CommitLineData
8e87d142 1/*
1da177e4 2 BlueZ - Bluetooth protocol stack for Linux
2d0a0346 3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
1da177e4
LT
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI event handling. */
26
1da177e4
LT
27#include <asm/unaligned.h>
28
29#include <net/bluetooth/bluetooth.h>
30#include <net/bluetooth/hci_core.h>
f0d6a0ea 31#include <net/bluetooth/mgmt.h>
7ef9fbf0 32
0857dd3b 33#include "hci_request.h"
23b9ceb7 34#include "hci_debugfs.h"
7024728e 35#include "a2mp.h"
7ef9fbf0 36#include "amp.h"
2ceba539 37#include "smp.h"
1da177e4 38
aa5b0345
MH
39#define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \
40 "\x00\x00\x00\x00\x00\x00\x00\x00"
41
1da177e4
LT
42/* Handle HCI Event packets */
43
a9de9248 44static void hci_cc_inquiry_cancel(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 45{
a9de9248 46 __u8 status = *((__u8 *) skb->data);
1da177e4 47
9f1db00c 48 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 49
82f4785c 50 if (status)
a9de9248 51 return;
1da177e4 52
89352e7d 53 clear_bit(HCI_INQUIRY, &hdev->flags);
4e857c58 54 smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
3e13fa1e 55 wake_up_bit(&hdev->flags, HCI_INQUIRY);
89352e7d 56
50143a43
JH
57 hci_dev_lock(hdev);
58 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
59 hci_dev_unlock(hdev);
60
a9de9248
MH
61 hci_conn_check_pending(hdev);
62}
6bd57416 63
4d93483b
AG
64static void hci_cc_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
65{
66 __u8 status = *((__u8 *) skb->data);
67
9f1db00c 68 BT_DBG("%s status 0x%2.2x", hdev->name, status);
ae854a70
AG
69
70 if (status)
71 return;
72
a1536da2 73 hci_dev_set_flag(hdev, HCI_PERIODIC_INQ);
4d93483b
AG
74}
75
a9de9248
MH
76static void hci_cc_exit_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
77{
78 __u8 status = *((__u8 *) skb->data);
6bd57416 79
9f1db00c 80 BT_DBG("%s status 0x%2.2x", hdev->name, status);
6bd57416 81
a9de9248
MH
82 if (status)
83 return;
1da177e4 84
a358dc11 85 hci_dev_clear_flag(hdev, HCI_PERIODIC_INQ);
ae854a70 86
a9de9248
MH
87 hci_conn_check_pending(hdev);
88}
89
807deac2
GP
90static void hci_cc_remote_name_req_cancel(struct hci_dev *hdev,
91 struct sk_buff *skb)
a9de9248
MH
92{
93 BT_DBG("%s", hdev->name);
94}
95
96static void hci_cc_role_discovery(struct hci_dev *hdev, struct sk_buff *skb)
97{
98 struct hci_rp_role_discovery *rp = (void *) skb->data;
99 struct hci_conn *conn;
100
9f1db00c 101 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
102
103 if (rp->status)
104 return;
105
106 hci_dev_lock(hdev);
107
108 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
40bef302
JH
109 if (conn)
110 conn->role = rp->role;
a9de9248
MH
111
112 hci_dev_unlock(hdev);
1da177e4
LT
113}
114
e4e8e37c
MH
115static void hci_cc_read_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
116{
117 struct hci_rp_read_link_policy *rp = (void *) skb->data;
118 struct hci_conn *conn;
119
9f1db00c 120 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
e4e8e37c
MH
121
122 if (rp->status)
123 return;
124
125 hci_dev_lock(hdev);
126
127 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
128 if (conn)
129 conn->link_policy = __le16_to_cpu(rp->policy);
130
131 hci_dev_unlock(hdev);
132}
133
a9de9248 134static void hci_cc_write_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 135{
a9de9248 136 struct hci_rp_write_link_policy *rp = (void *) skb->data;
1da177e4 137 struct hci_conn *conn;
04837f64 138 void *sent;
1da177e4 139
9f1db00c 140 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 141
a9de9248
MH
142 if (rp->status)
143 return;
1da177e4 144
a9de9248
MH
145 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LINK_POLICY);
146 if (!sent)
147 return;
1da177e4 148
a9de9248 149 hci_dev_lock(hdev);
1da177e4 150
a9de9248 151 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
e4e8e37c 152 if (conn)
83985319 153 conn->link_policy = get_unaligned_le16(sent + 2);
1da177e4 154
a9de9248
MH
155 hci_dev_unlock(hdev);
156}
1da177e4 157
807deac2
GP
158static void hci_cc_read_def_link_policy(struct hci_dev *hdev,
159 struct sk_buff *skb)
e4e8e37c
MH
160{
161 struct hci_rp_read_def_link_policy *rp = (void *) skb->data;
162
9f1db00c 163 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
e4e8e37c
MH
164
165 if (rp->status)
166 return;
167
168 hdev->link_policy = __le16_to_cpu(rp->policy);
169}
170
807deac2
GP
171static void hci_cc_write_def_link_policy(struct hci_dev *hdev,
172 struct sk_buff *skb)
e4e8e37c
MH
173{
174 __u8 status = *((__u8 *) skb->data);
175 void *sent;
176
9f1db00c 177 BT_DBG("%s status 0x%2.2x", hdev->name, status);
e4e8e37c 178
45296acd
MH
179 if (status)
180 return;
181
e4e8e37c
MH
182 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_DEF_LINK_POLICY);
183 if (!sent)
184 return;
185
45296acd 186 hdev->link_policy = get_unaligned_le16(sent);
e4e8e37c
MH
187}
188
a9de9248
MH
189static void hci_cc_reset(struct hci_dev *hdev, struct sk_buff *skb)
190{
191 __u8 status = *((__u8 *) skb->data);
04837f64 192
9f1db00c 193 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 194
10572132
GP
195 clear_bit(HCI_RESET, &hdev->flags);
196
8761f9d6
MH
197 if (status)
198 return;
199
a297e97c 200 /* Reset all non-persistent flags */
eacb44df 201 hci_dev_clear_volatile_flags(hdev);
69775ff6 202
39c5d970
JH
203 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
204
bbaf444a
JH
205 hdev->inq_tx_power = HCI_TX_POWER_INVALID;
206 hdev->adv_tx_power = HCI_TX_POWER_INVALID;
3f0f524b
JH
207
208 memset(hdev->adv_data, 0, sizeof(hdev->adv_data));
209 hdev->adv_data_len = 0;
f8e808bd
MH
210
211 memset(hdev->scan_rsp_data, 0, sizeof(hdev->scan_rsp_data));
212 hdev->scan_rsp_data_len = 0;
06f5b778 213
533553f8
MH
214 hdev->le_scan_type = LE_SCAN_PASSIVE;
215
06f5b778 216 hdev->ssp_debug_mode = 0;
a4d5504d
MH
217
218 hci_bdaddr_list_clear(&hdev->le_white_list);
a9de9248 219}
04837f64 220
c2f0f979
MH
221static void hci_cc_read_stored_link_key(struct hci_dev *hdev,
222 struct sk_buff *skb)
223{
224 struct hci_rp_read_stored_link_key *rp = (void *)skb->data;
225 struct hci_cp_read_stored_link_key *sent;
226
227 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
228
229 sent = hci_sent_cmd_data(hdev, HCI_OP_READ_STORED_LINK_KEY);
230 if (!sent)
231 return;
232
233 if (!rp->status && sent->read_all == 0x01) {
234 hdev->stored_max_keys = rp->max_keys;
235 hdev->stored_num_keys = rp->num_keys;
236 }
237}
238
a9366120
MH
239static void hci_cc_delete_stored_link_key(struct hci_dev *hdev,
240 struct sk_buff *skb)
241{
242 struct hci_rp_delete_stored_link_key *rp = (void *)skb->data;
243
244 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
245
246 if (rp->status)
247 return;
248
249 if (rp->num_keys <= hdev->stored_num_keys)
250 hdev->stored_num_keys -= rp->num_keys;
251 else
252 hdev->stored_num_keys = 0;
253}
254
a9de9248
MH
255static void hci_cc_write_local_name(struct hci_dev *hdev, struct sk_buff *skb)
256{
257 __u8 status = *((__u8 *) skb->data);
258 void *sent;
04837f64 259
9f1db00c 260 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 261
a9de9248
MH
262 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LOCAL_NAME);
263 if (!sent)
264 return;
04837f64 265
56e5cb86
JH
266 hci_dev_lock(hdev);
267
d7a5a11d 268 if (hci_dev_test_flag(hdev, HCI_MGMT))
f51d5b24 269 mgmt_set_local_name_complete(hdev, sent, status);
28cc7bde
JH
270 else if (!status)
271 memcpy(hdev->dev_name, sent, HCI_MAX_NAME_LENGTH);
f51d5b24 272
56e5cb86 273 hci_dev_unlock(hdev);
a9de9248
MH
274}
275
276static void hci_cc_read_local_name(struct hci_dev *hdev, struct sk_buff *skb)
277{
278 struct hci_rp_read_local_name *rp = (void *) skb->data;
279
9f1db00c 280 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
281
282 if (rp->status)
283 return;
284
d7a5a11d
MH
285 if (hci_dev_test_flag(hdev, HCI_SETUP) ||
286 hci_dev_test_flag(hdev, HCI_CONFIG))
db99b5fc 287 memcpy(hdev->dev_name, rp->name, HCI_MAX_NAME_LENGTH);
a9de9248
MH
288}
289
290static void hci_cc_write_auth_enable(struct hci_dev *hdev, struct sk_buff *skb)
291{
292 __u8 status = *((__u8 *) skb->data);
293 void *sent;
294
9f1db00c 295 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
296
297 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_AUTH_ENABLE);
298 if (!sent)
299 return;
300
5c1a4c8f
JK
301 hci_dev_lock(hdev);
302
a9de9248
MH
303 if (!status) {
304 __u8 param = *((__u8 *) sent);
305
306 if (param == AUTH_ENABLED)
307 set_bit(HCI_AUTH, &hdev->flags);
308 else
309 clear_bit(HCI_AUTH, &hdev->flags);
1da177e4 310 }
a9de9248 311
d7a5a11d 312 if (hci_dev_test_flag(hdev, HCI_MGMT))
33ef95ed 313 mgmt_auth_enable_complete(hdev, status);
5c1a4c8f
JK
314
315 hci_dev_unlock(hdev);
1da177e4
LT
316}
317
a9de9248 318static void hci_cc_write_encrypt_mode(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 319{
a9de9248 320 __u8 status = *((__u8 *) skb->data);
45296acd 321 __u8 param;
1da177e4
LT
322 void *sent;
323
9f1db00c 324 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 325
45296acd
MH
326 if (status)
327 return;
328
a9de9248
MH
329 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_ENCRYPT_MODE);
330 if (!sent)
331 return;
1da177e4 332
45296acd 333 param = *((__u8 *) sent);
a9de9248 334
45296acd
MH
335 if (param)
336 set_bit(HCI_ENCRYPT, &hdev->flags);
337 else
338 clear_bit(HCI_ENCRYPT, &hdev->flags);
a9de9248 339}
1da177e4 340
a9de9248
MH
341static void hci_cc_write_scan_enable(struct hci_dev *hdev, struct sk_buff *skb)
342{
45296acd
MH
343 __u8 status = *((__u8 *) skb->data);
344 __u8 param;
a9de9248 345 void *sent;
1da177e4 346
9f1db00c 347 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 348
a9de9248
MH
349 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SCAN_ENABLE);
350 if (!sent)
351 return;
1da177e4 352
36f7fc7e
JH
353 param = *((__u8 *) sent);
354
56e5cb86
JH
355 hci_dev_lock(hdev);
356
fa1bd918 357 if (status) {
2d7cee58
JH
358 hdev->discov_timeout = 0;
359 goto done;
360 }
361
bc6d2d04 362 if (param & SCAN_INQUIRY)
36f7fc7e 363 set_bit(HCI_ISCAN, &hdev->flags);
bc6d2d04
JH
364 else
365 clear_bit(HCI_ISCAN, &hdev->flags);
36f7fc7e 366
031547d8 367 if (param & SCAN_PAGE)
36f7fc7e 368 set_bit(HCI_PSCAN, &hdev->flags);
bc6d2d04 369 else
204e3990 370 clear_bit(HCI_PSCAN, &hdev->flags);
1da177e4 371
36f7fc7e 372done:
56e5cb86 373 hci_dev_unlock(hdev);
a9de9248 374}
1da177e4 375
a9de9248
MH
376static void hci_cc_read_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
377{
378 struct hci_rp_read_class_of_dev *rp = (void *) skb->data;
1da177e4 379
9f1db00c 380 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 381
a9de9248
MH
382 if (rp->status)
383 return;
1da177e4 384
a9de9248 385 memcpy(hdev->dev_class, rp->dev_class, 3);
1da177e4 386
a9de9248 387 BT_DBG("%s class 0x%.2x%.2x%.2x", hdev->name,
807deac2 388 hdev->dev_class[2], hdev->dev_class[1], hdev->dev_class[0]);
a9de9248 389}
1da177e4 390
a9de9248
MH
391static void hci_cc_write_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
392{
393 __u8 status = *((__u8 *) skb->data);
394 void *sent;
1da177e4 395
9f1db00c 396 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 397
a9de9248
MH
398 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_CLASS_OF_DEV);
399 if (!sent)
400 return;
1da177e4 401
7f9a903c
MH
402 hci_dev_lock(hdev);
403
404 if (status == 0)
405 memcpy(hdev->dev_class, sent, 3);
406
d7a5a11d 407 if (hci_dev_test_flag(hdev, HCI_MGMT))
7f9a903c
MH
408 mgmt_set_class_of_dev_complete(hdev, sent, status);
409
410 hci_dev_unlock(hdev);
a9de9248 411}
1da177e4 412
a9de9248
MH
413static void hci_cc_read_voice_setting(struct hci_dev *hdev, struct sk_buff *skb)
414{
415 struct hci_rp_read_voice_setting *rp = (void *) skb->data;
416 __u16 setting;
417
9f1db00c 418 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248
MH
419
420 if (rp->status)
421 return;
422
423 setting = __le16_to_cpu(rp->voice_setting);
424
f383f275 425 if (hdev->voice_setting == setting)
a9de9248
MH
426 return;
427
428 hdev->voice_setting = setting;
429
9f1db00c 430 BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
a9de9248 431
3c54711c 432 if (hdev->notify)
a9de9248 433 hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
a9de9248
MH
434}
435
8fc9ced3
GP
436static void hci_cc_write_voice_setting(struct hci_dev *hdev,
437 struct sk_buff *skb)
a9de9248
MH
438{
439 __u8 status = *((__u8 *) skb->data);
f383f275 440 __u16 setting;
a9de9248
MH
441 void *sent;
442
9f1db00c 443 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 444
f383f275
MH
445 if (status)
446 return;
447
a9de9248
MH
448 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_VOICE_SETTING);
449 if (!sent)
450 return;
1da177e4 451
f383f275 452 setting = get_unaligned_le16(sent);
1da177e4 453
f383f275
MH
454 if (hdev->voice_setting == setting)
455 return;
456
457 hdev->voice_setting = setting;
1da177e4 458
9f1db00c 459 BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
1da177e4 460
3c54711c 461 if (hdev->notify)
f383f275 462 hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
1da177e4
LT
463}
464
b4cb9fb2
MH
465static void hci_cc_read_num_supported_iac(struct hci_dev *hdev,
466 struct sk_buff *skb)
467{
468 struct hci_rp_read_num_supported_iac *rp = (void *) skb->data;
469
470 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
471
472 if (rp->status)
473 return;
474
475 hdev->num_iac = rp->num_iac;
476
477 BT_DBG("%s num iac %d", hdev->name, hdev->num_iac);
478}
479
333140b5
MH
480static void hci_cc_write_ssp_mode(struct hci_dev *hdev, struct sk_buff *skb)
481{
482 __u8 status = *((__u8 *) skb->data);
5ed8eb2f 483 struct hci_cp_write_ssp_mode *sent;
333140b5 484
9f1db00c 485 BT_DBG("%s status 0x%2.2x", hdev->name, status);
333140b5 486
333140b5
MH
487 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SSP_MODE);
488 if (!sent)
489 return;
490
5c1a4c8f
JK
491 hci_dev_lock(hdev);
492
5ed8eb2f
JH
493 if (!status) {
494 if (sent->mode)
cad718ed 495 hdev->features[1][0] |= LMP_HOST_SSP;
5ed8eb2f 496 else
cad718ed 497 hdev->features[1][0] &= ~LMP_HOST_SSP;
5ed8eb2f
JH
498 }
499
d7a5a11d 500 if (hci_dev_test_flag(hdev, HCI_MGMT))
5ed8eb2f 501 mgmt_ssp_enable_complete(hdev, sent->mode, status);
c0ecddc2 502 else if (!status) {
5ed8eb2f 503 if (sent->mode)
a1536da2 504 hci_dev_set_flag(hdev, HCI_SSP_ENABLED);
c0ecddc2 505 else
a358dc11 506 hci_dev_clear_flag(hdev, HCI_SSP_ENABLED);
c0ecddc2 507 }
5c1a4c8f
JK
508
509 hci_dev_unlock(hdev);
333140b5
MH
510}
511
eac83dc6
MH
512static void hci_cc_write_sc_support(struct hci_dev *hdev, struct sk_buff *skb)
513{
514 u8 status = *((u8 *) skb->data);
515 struct hci_cp_write_sc_support *sent;
516
517 BT_DBG("%s status 0x%2.2x", hdev->name, status);
518
519 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SC_SUPPORT);
520 if (!sent)
521 return;
522
5c1a4c8f
JK
523 hci_dev_lock(hdev);
524
eac83dc6
MH
525 if (!status) {
526 if (sent->support)
527 hdev->features[1][0] |= LMP_HOST_SC;
528 else
529 hdev->features[1][0] &= ~LMP_HOST_SC;
530 }
531
d7a5a11d 532 if (!hci_dev_test_flag(hdev, HCI_MGMT) && !status) {
eac83dc6 533 if (sent->support)
a1536da2 534 hci_dev_set_flag(hdev, HCI_SC_ENABLED);
eac83dc6 535 else
a358dc11 536 hci_dev_clear_flag(hdev, HCI_SC_ENABLED);
eac83dc6 537 }
5c1a4c8f
JK
538
539 hci_dev_unlock(hdev);
eac83dc6
MH
540}
541
a9de9248
MH
542static void hci_cc_read_local_version(struct hci_dev *hdev, struct sk_buff *skb)
543{
544 struct hci_rp_read_local_version *rp = (void *) skb->data;
1143e5a6 545
9f1db00c 546 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143e5a6 547
a9de9248 548 if (rp->status)
42c6b129 549 return;
1143e5a6 550
d7a5a11d
MH
551 if (hci_dev_test_flag(hdev, HCI_SETUP) ||
552 hci_dev_test_flag(hdev, HCI_CONFIG)) {
0d5551f5
MH
553 hdev->hci_ver = rp->hci_ver;
554 hdev->hci_rev = __le16_to_cpu(rp->hci_rev);
555 hdev->lmp_ver = rp->lmp_ver;
556 hdev->manufacturer = __le16_to_cpu(rp->manufacturer);
557 hdev->lmp_subver = __le16_to_cpu(rp->lmp_subver);
558 }
d5859e22
JH
559}
560
8fc9ced3
GP
561static void hci_cc_read_local_commands(struct hci_dev *hdev,
562 struct sk_buff *skb)
a9de9248
MH
563{
564 struct hci_rp_read_local_commands *rp = (void *) skb->data;
1da177e4 565
9f1db00c 566 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 567
6a070e6e
MH
568 if (rp->status)
569 return;
570
d7a5a11d
MH
571 if (hci_dev_test_flag(hdev, HCI_SETUP) ||
572 hci_dev_test_flag(hdev, HCI_CONFIG))
2177bab5 573 memcpy(hdev->commands, rp->commands, sizeof(hdev->commands));
a9de9248 574}
1da177e4 575
8fc9ced3
GP
576static void hci_cc_read_local_features(struct hci_dev *hdev,
577 struct sk_buff *skb)
a9de9248
MH
578{
579 struct hci_rp_read_local_features *rp = (void *) skb->data;
5b7f9909 580
9f1db00c 581 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 582
a9de9248
MH
583 if (rp->status)
584 return;
5b7f9909 585
a9de9248 586 memcpy(hdev->features, rp->features, 8);
5b7f9909 587
a9de9248
MH
588 /* Adjust default settings according to features
589 * supported by device. */
1da177e4 590
cad718ed 591 if (hdev->features[0][0] & LMP_3SLOT)
a9de9248 592 hdev->pkt_type |= (HCI_DM3 | HCI_DH3);
1da177e4 593
cad718ed 594 if (hdev->features[0][0] & LMP_5SLOT)
a9de9248 595 hdev->pkt_type |= (HCI_DM5 | HCI_DH5);
1da177e4 596
cad718ed 597 if (hdev->features[0][1] & LMP_HV2) {
a9de9248
MH
598 hdev->pkt_type |= (HCI_HV2);
599 hdev->esco_type |= (ESCO_HV2);
600 }
1da177e4 601
cad718ed 602 if (hdev->features[0][1] & LMP_HV3) {
a9de9248
MH
603 hdev->pkt_type |= (HCI_HV3);
604 hdev->esco_type |= (ESCO_HV3);
605 }
1da177e4 606
45db810f 607 if (lmp_esco_capable(hdev))
a9de9248 608 hdev->esco_type |= (ESCO_EV3);
da1f5198 609
cad718ed 610 if (hdev->features[0][4] & LMP_EV4)
a9de9248 611 hdev->esco_type |= (ESCO_EV4);
da1f5198 612
cad718ed 613 if (hdev->features[0][4] & LMP_EV5)
a9de9248 614 hdev->esco_type |= (ESCO_EV5);
1da177e4 615
cad718ed 616 if (hdev->features[0][5] & LMP_EDR_ESCO_2M)
efc7688b
MH
617 hdev->esco_type |= (ESCO_2EV3);
618
cad718ed 619 if (hdev->features[0][5] & LMP_EDR_ESCO_3M)
efc7688b
MH
620 hdev->esco_type |= (ESCO_3EV3);
621
cad718ed 622 if (hdev->features[0][5] & LMP_EDR_3S_ESCO)
efc7688b 623 hdev->esco_type |= (ESCO_2EV5 | ESCO_3EV5);
a9de9248 624}
1da177e4 625
971e3a4b 626static void hci_cc_read_local_ext_features(struct hci_dev *hdev,
807deac2 627 struct sk_buff *skb)
971e3a4b
AG
628{
629 struct hci_rp_read_local_ext_features *rp = (void *) skb->data;
630
9f1db00c 631 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
971e3a4b
AG
632
633 if (rp->status)
42c6b129 634 return;
971e3a4b 635
57af75a8
MH
636 if (hdev->max_page < rp->max_page)
637 hdev->max_page = rp->max_page;
d2c5d77f 638
cad718ed
JH
639 if (rp->page < HCI_MAX_PAGES)
640 memcpy(hdev->features[rp->page], rp->features, 8);
971e3a4b
AG
641}
642
1e89cffb 643static void hci_cc_read_flow_control_mode(struct hci_dev *hdev,
807deac2 644 struct sk_buff *skb)
1e89cffb
AE
645{
646 struct hci_rp_read_flow_control_mode *rp = (void *) skb->data;
647
9f1db00c 648 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1e89cffb 649
45296acd
MH
650 if (rp->status)
651 return;
652
653 hdev->flow_ctl_mode = rp->mode;
1e89cffb
AE
654}
655
a9de9248
MH
656static void hci_cc_read_buffer_size(struct hci_dev *hdev, struct sk_buff *skb)
657{
658 struct hci_rp_read_buffer_size *rp = (void *) skb->data;
1da177e4 659
9f1db00c 660 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1da177e4 661
a9de9248
MH
662 if (rp->status)
663 return;
1da177e4 664
a9de9248
MH
665 hdev->acl_mtu = __le16_to_cpu(rp->acl_mtu);
666 hdev->sco_mtu = rp->sco_mtu;
667 hdev->acl_pkts = __le16_to_cpu(rp->acl_max_pkt);
668 hdev->sco_pkts = __le16_to_cpu(rp->sco_max_pkt);
669
670 if (test_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks)) {
671 hdev->sco_mtu = 64;
672 hdev->sco_pkts = 8;
1da177e4 673 }
a9de9248
MH
674
675 hdev->acl_cnt = hdev->acl_pkts;
676 hdev->sco_cnt = hdev->sco_pkts;
677
807deac2
GP
678 BT_DBG("%s acl mtu %d:%d sco mtu %d:%d", hdev->name, hdev->acl_mtu,
679 hdev->acl_pkts, hdev->sco_mtu, hdev->sco_pkts);
a9de9248
MH
680}
681
682static void hci_cc_read_bd_addr(struct hci_dev *hdev, struct sk_buff *skb)
683{
684 struct hci_rp_read_bd_addr *rp = (void *) skb->data;
685
9f1db00c 686 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a9de9248 687
e30d3f5f
MH
688 if (rp->status)
689 return;
690
691 if (test_bit(HCI_INIT, &hdev->flags))
a9de9248 692 bacpy(&hdev->bdaddr, &rp->bdaddr);
e30d3f5f 693
d7a5a11d 694 if (hci_dev_test_flag(hdev, HCI_SETUP))
e30d3f5f 695 bacpy(&hdev->setup_addr, &rp->bdaddr);
23bb5763
JH
696}
697
f332ec66
JH
698static void hci_cc_read_page_scan_activity(struct hci_dev *hdev,
699 struct sk_buff *skb)
700{
701 struct hci_rp_read_page_scan_activity *rp = (void *) skb->data;
702
703 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
704
45296acd
MH
705 if (rp->status)
706 return;
707
708 if (test_bit(HCI_INIT, &hdev->flags)) {
f332ec66
JH
709 hdev->page_scan_interval = __le16_to_cpu(rp->interval);
710 hdev->page_scan_window = __le16_to_cpu(rp->window);
711 }
712}
713
4a3ee763
JH
714static void hci_cc_write_page_scan_activity(struct hci_dev *hdev,
715 struct sk_buff *skb)
716{
717 u8 status = *((u8 *) skb->data);
718 struct hci_cp_write_page_scan_activity *sent;
719
720 BT_DBG("%s status 0x%2.2x", hdev->name, status);
721
722 if (status)
723 return;
724
725 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY);
726 if (!sent)
727 return;
728
729 hdev->page_scan_interval = __le16_to_cpu(sent->interval);
730 hdev->page_scan_window = __le16_to_cpu(sent->window);
731}
732
f332ec66
JH
733static void hci_cc_read_page_scan_type(struct hci_dev *hdev,
734 struct sk_buff *skb)
735{
736 struct hci_rp_read_page_scan_type *rp = (void *) skb->data;
737
738 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
739
45296acd
MH
740 if (rp->status)
741 return;
742
743 if (test_bit(HCI_INIT, &hdev->flags))
f332ec66
JH
744 hdev->page_scan_type = rp->type;
745}
746
4a3ee763
JH
747static void hci_cc_write_page_scan_type(struct hci_dev *hdev,
748 struct sk_buff *skb)
749{
750 u8 status = *((u8 *) skb->data);
751 u8 *type;
752
753 BT_DBG("%s status 0x%2.2x", hdev->name, status);
754
755 if (status)
756 return;
757
758 type = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE);
759 if (type)
760 hdev->page_scan_type = *type;
761}
762
350ee4cf 763static void hci_cc_read_data_block_size(struct hci_dev *hdev,
807deac2 764 struct sk_buff *skb)
350ee4cf
AE
765{
766 struct hci_rp_read_data_block_size *rp = (void *) skb->data;
767
9f1db00c 768 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
350ee4cf
AE
769
770 if (rp->status)
771 return;
772
773 hdev->block_mtu = __le16_to_cpu(rp->max_acl_len);
774 hdev->block_len = __le16_to_cpu(rp->block_len);
775 hdev->num_blocks = __le16_to_cpu(rp->num_blocks);
776
777 hdev->block_cnt = hdev->num_blocks;
778
779 BT_DBG("%s blk mtu %d cnt %d len %d", hdev->name, hdev->block_mtu,
807deac2 780 hdev->block_cnt, hdev->block_len);
350ee4cf
AE
781}
782
33f35721
JH
783static void hci_cc_read_clock(struct hci_dev *hdev, struct sk_buff *skb)
784{
785 struct hci_rp_read_clock *rp = (void *) skb->data;
786 struct hci_cp_read_clock *cp;
787 struct hci_conn *conn;
788
789 BT_DBG("%s", hdev->name);
790
791 if (skb->len < sizeof(*rp))
792 return;
793
794 if (rp->status)
795 return;
796
797 hci_dev_lock(hdev);
798
799 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK);
800 if (!cp)
801 goto unlock;
802
803 if (cp->which == 0x00) {
804 hdev->clock = le32_to_cpu(rp->clock);
805 goto unlock;
806 }
807
808 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
809 if (conn) {
810 conn->clock = le32_to_cpu(rp->clock);
811 conn->clock_accuracy = le16_to_cpu(rp->accuracy);
812 }
813
814unlock:
815 hci_dev_unlock(hdev);
816}
817
928abaa7 818static void hci_cc_read_local_amp_info(struct hci_dev *hdev,
807deac2 819 struct sk_buff *skb)
928abaa7
AE
820{
821 struct hci_rp_read_local_amp_info *rp = (void *) skb->data;
822
9f1db00c 823 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
928abaa7
AE
824
825 if (rp->status)
8e2a0d92 826 goto a2mp_rsp;
928abaa7
AE
827
828 hdev->amp_status = rp->amp_status;
829 hdev->amp_total_bw = __le32_to_cpu(rp->total_bw);
830 hdev->amp_max_bw = __le32_to_cpu(rp->max_bw);
831 hdev->amp_min_latency = __le32_to_cpu(rp->min_latency);
832 hdev->amp_max_pdu = __le32_to_cpu(rp->max_pdu);
833 hdev->amp_type = rp->amp_type;
834 hdev->amp_pal_cap = __le16_to_cpu(rp->pal_cap);
835 hdev->amp_assoc_size = __le16_to_cpu(rp->max_assoc_size);
836 hdev->amp_be_flush_to = __le32_to_cpu(rp->be_flush_to);
837 hdev->amp_max_flush_to = __le32_to_cpu(rp->max_flush_to);
838
8e2a0d92
AE
839a2mp_rsp:
840 a2mp_send_getinfo_rsp(hdev);
928abaa7
AE
841}
842
903e4541
AE
843static void hci_cc_read_local_amp_assoc(struct hci_dev *hdev,
844 struct sk_buff *skb)
845{
846 struct hci_rp_read_local_amp_assoc *rp = (void *) skb->data;
847 struct amp_assoc *assoc = &hdev->loc_assoc;
848 size_t rem_len, frag_len;
849
850 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
851
852 if (rp->status)
853 goto a2mp_rsp;
854
855 frag_len = skb->len - sizeof(*rp);
856 rem_len = __le16_to_cpu(rp->rem_len);
857
858 if (rem_len > frag_len) {
2e430be3 859 BT_DBG("frag_len %zu rem_len %zu", frag_len, rem_len);
903e4541
AE
860
861 memcpy(assoc->data + assoc->offset, rp->frag, frag_len);
862 assoc->offset += frag_len;
863
864 /* Read other fragments */
865 amp_read_loc_assoc_frag(hdev, rp->phy_handle);
866
867 return;
868 }
869
870 memcpy(assoc->data + assoc->offset, rp->frag, rem_len);
871 assoc->len = assoc->offset + rem_len;
872 assoc->offset = 0;
873
874a2mp_rsp:
875 /* Send A2MP Rsp when all fragments are received */
876 a2mp_send_getampassoc_rsp(hdev, rp->status);
9495b2ee 877 a2mp_send_create_phy_link_req(hdev, rp->status);
903e4541
AE
878}
879
d5859e22 880static void hci_cc_read_inq_rsp_tx_power(struct hci_dev *hdev,
807deac2 881 struct sk_buff *skb)
d5859e22 882{
91c4e9b1 883 struct hci_rp_read_inq_rsp_tx_power *rp = (void *) skb->data;
d5859e22 884
9f1db00c 885 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
91c4e9b1 886
45296acd
MH
887 if (rp->status)
888 return;
889
890 hdev->inq_tx_power = rp->tx_power;
d5859e22
JH
891}
892
980e1a53
JH
893static void hci_cc_pin_code_reply(struct hci_dev *hdev, struct sk_buff *skb)
894{
895 struct hci_rp_pin_code_reply *rp = (void *) skb->data;
896 struct hci_cp_pin_code_reply *cp;
897 struct hci_conn *conn;
898
9f1db00c 899 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
980e1a53 900
56e5cb86
JH
901 hci_dev_lock(hdev);
902
d7a5a11d 903 if (hci_dev_test_flag(hdev, HCI_MGMT))
744cf19e 904 mgmt_pin_code_reply_complete(hdev, &rp->bdaddr, rp->status);
980e1a53 905
fa1bd918 906 if (rp->status)
56e5cb86 907 goto unlock;
980e1a53
JH
908
909 cp = hci_sent_cmd_data(hdev, HCI_OP_PIN_CODE_REPLY);
910 if (!cp)
56e5cb86 911 goto unlock;
980e1a53
JH
912
913 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
914 if (conn)
915 conn->pin_length = cp->pin_len;
56e5cb86
JH
916
917unlock:
918 hci_dev_unlock(hdev);
980e1a53
JH
919}
920
921static void hci_cc_pin_code_neg_reply(struct hci_dev *hdev, struct sk_buff *skb)
922{
923 struct hci_rp_pin_code_neg_reply *rp = (void *) skb->data;
924
9f1db00c 925 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
980e1a53 926
56e5cb86
JH
927 hci_dev_lock(hdev);
928
d7a5a11d 929 if (hci_dev_test_flag(hdev, HCI_MGMT))
744cf19e 930 mgmt_pin_code_neg_reply_complete(hdev, &rp->bdaddr,
807deac2 931 rp->status);
56e5cb86
JH
932
933 hci_dev_unlock(hdev);
980e1a53 934}
56e5cb86 935
6ed58ec5
VT
936static void hci_cc_le_read_buffer_size(struct hci_dev *hdev,
937 struct sk_buff *skb)
938{
939 struct hci_rp_le_read_buffer_size *rp = (void *) skb->data;
940
9f1db00c 941 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
6ed58ec5
VT
942
943 if (rp->status)
944 return;
945
946 hdev->le_mtu = __le16_to_cpu(rp->le_mtu);
947 hdev->le_pkts = rp->le_max_pkt;
948
949 hdev->le_cnt = hdev->le_pkts;
950
951 BT_DBG("%s le mtu %d:%d", hdev->name, hdev->le_mtu, hdev->le_pkts);
6ed58ec5 952}
980e1a53 953
60e77321
JH
954static void hci_cc_le_read_local_features(struct hci_dev *hdev,
955 struct sk_buff *skb)
956{
957 struct hci_rp_le_read_local_features *rp = (void *) skb->data;
958
959 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
960
45296acd
MH
961 if (rp->status)
962 return;
963
964 memcpy(hdev->le_features, rp->features, 8);
60e77321
JH
965}
966
8fa19098
JH
967static void hci_cc_le_read_adv_tx_power(struct hci_dev *hdev,
968 struct sk_buff *skb)
969{
970 struct hci_rp_le_read_adv_tx_power *rp = (void *) skb->data;
971
972 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
973
45296acd
MH
974 if (rp->status)
975 return;
976
977 hdev->adv_tx_power = rp->tx_power;
8fa19098
JH
978}
979
a5c29683
JH
980static void hci_cc_user_confirm_reply(struct hci_dev *hdev, struct sk_buff *skb)
981{
982 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
983
9f1db00c 984 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a5c29683 985
56e5cb86
JH
986 hci_dev_lock(hdev);
987
d7a5a11d 988 if (hci_dev_test_flag(hdev, HCI_MGMT))
04124681
GP
989 mgmt_user_confirm_reply_complete(hdev, &rp->bdaddr, ACL_LINK, 0,
990 rp->status);
56e5cb86
JH
991
992 hci_dev_unlock(hdev);
a5c29683
JH
993}
994
995static void hci_cc_user_confirm_neg_reply(struct hci_dev *hdev,
807deac2 996 struct sk_buff *skb)
a5c29683
JH
997{
998 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
999
9f1db00c 1000 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
a5c29683 1001
56e5cb86
JH
1002 hci_dev_lock(hdev);
1003
d7a5a11d 1004 if (hci_dev_test_flag(hdev, HCI_MGMT))
744cf19e 1005 mgmt_user_confirm_neg_reply_complete(hdev, &rp->bdaddr,
04124681 1006 ACL_LINK, 0, rp->status);
56e5cb86
JH
1007
1008 hci_dev_unlock(hdev);
a5c29683
JH
1009}
1010
1143d458
BG
1011static void hci_cc_user_passkey_reply(struct hci_dev *hdev, struct sk_buff *skb)
1012{
1013 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
1014
9f1db00c 1015 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143d458
BG
1016
1017 hci_dev_lock(hdev);
1018
d7a5a11d 1019 if (hci_dev_test_flag(hdev, HCI_MGMT))
272d90df 1020 mgmt_user_passkey_reply_complete(hdev, &rp->bdaddr, ACL_LINK,
04124681 1021 0, rp->status);
1143d458
BG
1022
1023 hci_dev_unlock(hdev);
1024}
1025
1026static void hci_cc_user_passkey_neg_reply(struct hci_dev *hdev,
807deac2 1027 struct sk_buff *skb)
1143d458
BG
1028{
1029 struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
1030
9f1db00c 1031 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1143d458
BG
1032
1033 hci_dev_lock(hdev);
1034
d7a5a11d 1035 if (hci_dev_test_flag(hdev, HCI_MGMT))
1143d458 1036 mgmt_user_passkey_neg_reply_complete(hdev, &rp->bdaddr,
04124681 1037 ACL_LINK, 0, rp->status);
1143d458
BG
1038
1039 hci_dev_unlock(hdev);
1040}
1041
4d2d2796
MH
1042static void hci_cc_read_local_oob_data(struct hci_dev *hdev,
1043 struct sk_buff *skb)
c35938b2
SJ
1044{
1045 struct hci_rp_read_local_oob_data *rp = (void *) skb->data;
1046
9f1db00c 1047 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
4d2d2796
MH
1048}
1049
1050static void hci_cc_read_local_oob_ext_data(struct hci_dev *hdev,
1051 struct sk_buff *skb)
1052{
1053 struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data;
1054
1055 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
c35938b2
SJ
1056}
1057
7a4cd51d
MH
1058static void hci_cc_le_set_random_addr(struct hci_dev *hdev, struct sk_buff *skb)
1059{
1060 __u8 status = *((__u8 *) skb->data);
1061 bdaddr_t *sent;
1062
1063 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1064
45296acd
MH
1065 if (status)
1066 return;
1067
7a4cd51d
MH
1068 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_RANDOM_ADDR);
1069 if (!sent)
1070 return;
1071
1072 hci_dev_lock(hdev);
1073
45296acd 1074 bacpy(&hdev->random_addr, sent);
7a4cd51d
MH
1075
1076 hci_dev_unlock(hdev);
1077}
1078
c1d5dc4a
JH
1079static void hci_cc_le_set_adv_enable(struct hci_dev *hdev, struct sk_buff *skb)
1080{
1081 __u8 *sent, status = *((__u8 *) skb->data);
1082
1083 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1084
45296acd 1085 if (status)
c1d5dc4a
JH
1086 return;
1087
45296acd
MH
1088 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_ENABLE);
1089 if (!sent)
3c857757
JH
1090 return;
1091
c1d5dc4a
JH
1092 hci_dev_lock(hdev);
1093
49c922bb 1094 /* If we're doing connection initiation as peripheral. Set a
3c857757
JH
1095 * timeout in case something goes wrong.
1096 */
1097 if (*sent) {
1098 struct hci_conn *conn;
1099
a1536da2 1100 hci_dev_set_flag(hdev, HCI_LE_ADV);
66c417c1 1101
3c857757
JH
1102 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
1103 if (conn)
1104 queue_delayed_work(hdev->workqueue,
1105 &conn->le_conn_timeout,
09ae260b 1106 conn->conn_timeout);
66c417c1 1107 } else {
a358dc11 1108 hci_dev_clear_flag(hdev, HCI_LE_ADV);
3c857757
JH
1109 }
1110
04b4edcb 1111 hci_dev_unlock(hdev);
c1d5dc4a
JH
1112}
1113
533553f8
MH
1114static void hci_cc_le_set_scan_param(struct hci_dev *hdev, struct sk_buff *skb)
1115{
1116 struct hci_cp_le_set_scan_param *cp;
1117 __u8 status = *((__u8 *) skb->data);
1118
1119 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1120
45296acd
MH
1121 if (status)
1122 return;
1123
533553f8
MH
1124 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_PARAM);
1125 if (!cp)
1126 return;
1127
1128 hci_dev_lock(hdev);
1129
45296acd 1130 hdev->le_scan_type = cp->type;
533553f8
MH
1131
1132 hci_dev_unlock(hdev);
1133}
1134
b9a6328f
JH
1135static bool has_pending_adv_report(struct hci_dev *hdev)
1136{
1137 struct discovery_state *d = &hdev->discovery;
1138
1139 return bacmp(&d->last_adv_addr, BDADDR_ANY);
1140}
1141
1142static void clear_pending_adv_report(struct hci_dev *hdev)
1143{
1144 struct discovery_state *d = &hdev->discovery;
1145
1146 bacpy(&d->last_adv_addr, BDADDR_ANY);
1147 d->last_adv_data_len = 0;
1148}
1149
1150static void store_pending_adv_report(struct hci_dev *hdev, bdaddr_t *bdaddr,
c70a7e4c
MH
1151 u8 bdaddr_type, s8 rssi, u32 flags,
1152 u8 *data, u8 len)
b9a6328f
JH
1153{
1154 struct discovery_state *d = &hdev->discovery;
1155
1156 bacpy(&d->last_adv_addr, bdaddr);
1157 d->last_adv_addr_type = bdaddr_type;
ff5cd29f 1158 d->last_adv_rssi = rssi;
c70a7e4c 1159 d->last_adv_flags = flags;
b9a6328f
JH
1160 memcpy(d->last_adv_data, data, len);
1161 d->last_adv_data_len = len;
1162}
1163
eb9d91f5 1164static void hci_cc_le_set_scan_enable(struct hci_dev *hdev,
807deac2 1165 struct sk_buff *skb)
eb9d91f5
AG
1166{
1167 struct hci_cp_le_set_scan_enable *cp;
1168 __u8 status = *((__u8 *) skb->data);
1169
9f1db00c 1170 BT_DBG("%s status 0x%2.2x", hdev->name, status);
eb9d91f5 1171
45296acd 1172 if (status)
eb9d91f5
AG
1173 return;
1174
45296acd
MH
1175 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_ENABLE);
1176 if (!cp)
3fd319b8
AG
1177 return;
1178
5c1a4c8f
JK
1179 hci_dev_lock(hdev);
1180
68a8aea4 1181 switch (cp->enable) {
76a388be 1182 case LE_SCAN_ENABLE:
a1536da2 1183 hci_dev_set_flag(hdev, HCI_LE_SCAN);
b9a6328f
JH
1184 if (hdev->le_scan_type == LE_SCAN_ACTIVE)
1185 clear_pending_adv_report(hdev);
68a8aea4
AE
1186 break;
1187
76a388be 1188 case LE_SCAN_DISABLE:
b9a6328f
JH
1189 /* We do this here instead of when setting DISCOVERY_STOPPED
1190 * since the latter would potentially require waiting for
1191 * inquiry to stop too.
1192 */
1193 if (has_pending_adv_report(hdev)) {
1194 struct discovery_state *d = &hdev->discovery;
1195
1196 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
ab0aa433 1197 d->last_adv_addr_type, NULL,
c70a7e4c 1198 d->last_adv_rssi, d->last_adv_flags,
ab0aa433 1199 d->last_adv_data,
b9a6328f
JH
1200 d->last_adv_data_len, NULL, 0);
1201 }
1202
317ac8cb
JH
1203 /* Cancel this timer so that we don't try to disable scanning
1204 * when it's already disabled.
1205 */
1206 cancel_delayed_work(&hdev->le_scan_disable);
1207
a358dc11 1208 hci_dev_clear_flag(hdev, HCI_LE_SCAN);
e8bb6b97 1209
81ad6fd9
JH
1210 /* The HCI_LE_SCAN_INTERRUPTED flag indicates that we
1211 * interrupted scanning due to a connect request. Mark
e8bb6b97
JH
1212 * therefore discovery as stopped. If this was not
1213 * because of a connect request advertising might have
1214 * been disabled because of active scanning, so
1215 * re-enable it again if necessary.
81ad6fd9 1216 */
a69d8927 1217 if (hci_dev_test_and_clear_flag(hdev, HCI_LE_SCAN_INTERRUPTED))
81ad6fd9 1218 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
d7a5a11d 1219 else if (!hci_dev_test_flag(hdev, HCI_LE_ADV) &&
34722277 1220 hdev->discovery.state == DISCOVERY_FINDING)
e8bb6b97
JH
1221 mgmt_reenable_advertising(hdev);
1222
68a8aea4
AE
1223 break;
1224
1225 default:
1226 BT_ERR("Used reserved LE_Scan_Enable param %d", cp->enable);
1227 break;
35815085 1228 }
5c1a4c8f
JK
1229
1230 hci_dev_unlock(hdev);
eb9d91f5
AG
1231}
1232
cf1d081f
JH
1233static void hci_cc_le_read_white_list_size(struct hci_dev *hdev,
1234 struct sk_buff *skb)
1235{
1236 struct hci_rp_le_read_white_list_size *rp = (void *) skb->data;
1237
1238 BT_DBG("%s status 0x%2.2x size %u", hdev->name, rp->status, rp->size);
1239
45296acd
MH
1240 if (rp->status)
1241 return;
1242
1243 hdev->le_white_list_size = rp->size;
cf1d081f
JH
1244}
1245
0f36b589
MH
1246static void hci_cc_le_clear_white_list(struct hci_dev *hdev,
1247 struct sk_buff *skb)
1248{
1249 __u8 status = *((__u8 *) skb->data);
1250
1251 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1252
45296acd
MH
1253 if (status)
1254 return;
1255
dcc36c16 1256 hci_bdaddr_list_clear(&hdev->le_white_list);
0f36b589
MH
1257}
1258
1259static void hci_cc_le_add_to_white_list(struct hci_dev *hdev,
1260 struct sk_buff *skb)
1261{
1262 struct hci_cp_le_add_to_white_list *sent;
1263 __u8 status = *((__u8 *) skb->data);
1264
1265 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1266
45296acd
MH
1267 if (status)
1268 return;
1269
0f36b589
MH
1270 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_ADD_TO_WHITE_LIST);
1271 if (!sent)
1272 return;
1273
dcc36c16
JH
1274 hci_bdaddr_list_add(&hdev->le_white_list, &sent->bdaddr,
1275 sent->bdaddr_type);
0f36b589
MH
1276}
1277
1278static void hci_cc_le_del_from_white_list(struct hci_dev *hdev,
1279 struct sk_buff *skb)
1280{
1281 struct hci_cp_le_del_from_white_list *sent;
1282 __u8 status = *((__u8 *) skb->data);
1283
1284 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1285
45296acd
MH
1286 if (status)
1287 return;
1288
0f36b589
MH
1289 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_DEL_FROM_WHITE_LIST);
1290 if (!sent)
1291 return;
1292
dcc36c16
JH
1293 hci_bdaddr_list_del(&hdev->le_white_list, &sent->bdaddr,
1294 sent->bdaddr_type);
0f36b589
MH
1295}
1296
9b008c04
JH
1297static void hci_cc_le_read_supported_states(struct hci_dev *hdev,
1298 struct sk_buff *skb)
1299{
1300 struct hci_rp_le_read_supported_states *rp = (void *) skb->data;
1301
1302 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1303
45296acd
MH
1304 if (rp->status)
1305 return;
1306
1307 memcpy(hdev->le_states, rp->le_states, 8);
9b008c04
JH
1308}
1309
a8e1bfaa
MH
1310static void hci_cc_le_read_def_data_len(struct hci_dev *hdev,
1311 struct sk_buff *skb)
1312{
1313 struct hci_rp_le_read_def_data_len *rp = (void *) skb->data;
1314
1315 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1316
1317 if (rp->status)
1318 return;
1319
1320 hdev->le_def_tx_len = le16_to_cpu(rp->tx_len);
1321 hdev->le_def_tx_time = le16_to_cpu(rp->tx_time);
1322}
1323
1324static void hci_cc_le_write_def_data_len(struct hci_dev *hdev,
1325 struct sk_buff *skb)
1326{
1327 struct hci_cp_le_write_def_data_len *sent;
1328 __u8 status = *((__u8 *) skb->data);
1329
1330 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1331
1332 if (status)
1333 return;
1334
1335 sent = hci_sent_cmd_data(hdev, HCI_OP_LE_WRITE_DEF_DATA_LEN);
1336 if (!sent)
1337 return;
1338
1339 hdev->le_def_tx_len = le16_to_cpu(sent->tx_len);
1340 hdev->le_def_tx_time = le16_to_cpu(sent->tx_time);
1341}
1342
1343static void hci_cc_le_read_max_data_len(struct hci_dev *hdev,
1344 struct sk_buff *skb)
1345{
1346 struct hci_rp_le_read_max_data_len *rp = (void *) skb->data;
1347
1348 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1349
1350 if (rp->status)
1351 return;
1352
1353 hdev->le_max_tx_len = le16_to_cpu(rp->tx_len);
1354 hdev->le_max_tx_time = le16_to_cpu(rp->tx_time);
1355 hdev->le_max_rx_len = le16_to_cpu(rp->rx_len);
1356 hdev->le_max_rx_time = le16_to_cpu(rp->rx_time);
1357}
1358
6039aa73
GP
1359static void hci_cc_write_le_host_supported(struct hci_dev *hdev,
1360 struct sk_buff *skb)
f9b49306 1361{
06199cf8 1362 struct hci_cp_write_le_host_supported *sent;
f9b49306
AG
1363 __u8 status = *((__u8 *) skb->data);
1364
9f1db00c 1365 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f9b49306 1366
45296acd
MH
1367 if (status)
1368 return;
1369
06199cf8 1370 sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED);
8f984dfa 1371 if (!sent)
f9b49306
AG
1372 return;
1373
5c1a4c8f
JK
1374 hci_dev_lock(hdev);
1375
45296acd
MH
1376 if (sent->le) {
1377 hdev->features[1][0] |= LMP_HOST_LE;
a1536da2 1378 hci_dev_set_flag(hdev, HCI_LE_ENABLED);
45296acd
MH
1379 } else {
1380 hdev->features[1][0] &= ~LMP_HOST_LE;
a358dc11
MH
1381 hci_dev_clear_flag(hdev, HCI_LE_ENABLED);
1382 hci_dev_clear_flag(hdev, HCI_ADVERTISING);
8f984dfa 1383 }
45296acd
MH
1384
1385 if (sent->simul)
1386 hdev->features[1][0] |= LMP_HOST_LE_BREDR;
1387 else
1388 hdev->features[1][0] &= ~LMP_HOST_LE_BREDR;
5c1a4c8f
JK
1389
1390 hci_dev_unlock(hdev);
f9b49306
AG
1391}
1392
56ed2cb8
JH
1393static void hci_cc_set_adv_param(struct hci_dev *hdev, struct sk_buff *skb)
1394{
1395 struct hci_cp_le_set_adv_param *cp;
1396 u8 status = *((u8 *) skb->data);
1397
1398 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1399
1400 if (status)
1401 return;
1402
1403 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_PARAM);
1404 if (!cp)
1405 return;
1406
1407 hci_dev_lock(hdev);
1408 hdev->adv_addr_type = cp->own_address_type;
1409 hci_dev_unlock(hdev);
1410}
1411
93c284ee
AE
1412static void hci_cc_write_remote_amp_assoc(struct hci_dev *hdev,
1413 struct sk_buff *skb)
1414{
1415 struct hci_rp_write_remote_amp_assoc *rp = (void *) skb->data;
1416
1417 BT_DBG("%s status 0x%2.2x phy_handle 0x%2.2x",
1418 hdev->name, rp->status, rp->phy_handle);
1419
1420 if (rp->status)
1421 return;
1422
1423 amp_write_rem_assoc_continue(hdev, rp->phy_handle);
1424}
1425
5ae76a94
AK
1426static void hci_cc_read_rssi(struct hci_dev *hdev, struct sk_buff *skb)
1427{
1428 struct hci_rp_read_rssi *rp = (void *) skb->data;
1429 struct hci_conn *conn;
1430
1431 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1432
1433 if (rp->status)
1434 return;
1435
1436 hci_dev_lock(hdev);
1437
1438 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
1439 if (conn)
1440 conn->rssi = rp->rssi;
1441
1442 hci_dev_unlock(hdev);
1443}
1444
5a134fae
AK
1445static void hci_cc_read_tx_power(struct hci_dev *hdev, struct sk_buff *skb)
1446{
1447 struct hci_cp_read_tx_power *sent;
1448 struct hci_rp_read_tx_power *rp = (void *) skb->data;
1449 struct hci_conn *conn;
1450
1451 BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
1452
1453 if (rp->status)
1454 return;
1455
1456 sent = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
1457 if (!sent)
1458 return;
1459
1460 hci_dev_lock(hdev);
1461
1462 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
d0455ed9
AK
1463 if (!conn)
1464 goto unlock;
1465
1466 switch (sent->type) {
1467 case 0x00:
5a134fae 1468 conn->tx_power = rp->tx_power;
d0455ed9
AK
1469 break;
1470 case 0x01:
1471 conn->max_tx_power = rp->tx_power;
1472 break;
1473 }
5a134fae 1474
d0455ed9 1475unlock:
5a134fae
AK
1476 hci_dev_unlock(hdev);
1477}
1478
c50b33c8
MH
1479static void hci_cc_write_ssp_debug_mode(struct hci_dev *hdev, struct sk_buff *skb)
1480{
1481 u8 status = *((u8 *) skb->data);
1482 u8 *mode;
1483
1484 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1485
1486 if (status)
1487 return;
1488
1489 mode = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE);
1490 if (mode)
1491 hdev->ssp_debug_mode = *mode;
1492}
1493
6039aa73 1494static void hci_cs_inquiry(struct hci_dev *hdev, __u8 status)
a9de9248 1495{
9f1db00c 1496 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
1497
1498 if (status) {
a9de9248 1499 hci_conn_check_pending(hdev);
314b2381
JH
1500 return;
1501 }
1502
89352e7d 1503 set_bit(HCI_INQUIRY, &hdev->flags);
1da177e4
LT
1504}
1505
6039aa73 1506static void hci_cs_create_conn(struct hci_dev *hdev, __u8 status)
1da177e4 1507{
a9de9248 1508 struct hci_cp_create_conn *cp;
1da177e4 1509 struct hci_conn *conn;
1da177e4 1510
9f1db00c 1511 BT_DBG("%s status 0x%2.2x", hdev->name, status);
a9de9248
MH
1512
1513 cp = hci_sent_cmd_data(hdev, HCI_OP_CREATE_CONN);
1da177e4
LT
1514 if (!cp)
1515 return;
1516
1517 hci_dev_lock(hdev);
1518
1519 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1520
6ed93dc6 1521 BT_DBG("%s bdaddr %pMR hcon %p", hdev->name, &cp->bdaddr, conn);
1da177e4
LT
1522
1523 if (status) {
1524 if (conn && conn->state == BT_CONNECT) {
4c67bc74
MH
1525 if (status != 0x0c || conn->attempt > 2) {
1526 conn->state = BT_CLOSED;
539c496d 1527 hci_connect_cfm(conn, status);
4c67bc74
MH
1528 hci_conn_del(conn);
1529 } else
1530 conn->state = BT_CONNECT2;
1da177e4
LT
1531 }
1532 } else {
1533 if (!conn) {
a5c4e309
JH
1534 conn = hci_conn_add(hdev, ACL_LINK, &cp->bdaddr,
1535 HCI_ROLE_MASTER);
1536 if (!conn)
893ef971 1537 BT_ERR("No memory for new connection");
1da177e4
LT
1538 }
1539 }
1540
1541 hci_dev_unlock(hdev);
1542}
1543
a9de9248 1544static void hci_cs_add_sco(struct hci_dev *hdev, __u8 status)
1da177e4 1545{
a9de9248
MH
1546 struct hci_cp_add_sco *cp;
1547 struct hci_conn *acl, *sco;
1548 __u16 handle;
1da177e4 1549
9f1db00c 1550 BT_DBG("%s status 0x%2.2x", hdev->name, status);
b6a0dc82 1551
a9de9248
MH
1552 if (!status)
1553 return;
1da177e4 1554
a9de9248
MH
1555 cp = hci_sent_cmd_data(hdev, HCI_OP_ADD_SCO);
1556 if (!cp)
1557 return;
1da177e4 1558
a9de9248 1559 handle = __le16_to_cpu(cp->handle);
1da177e4 1560
9f1db00c 1561 BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
1da177e4 1562
a9de9248 1563 hci_dev_lock(hdev);
1da177e4 1564
a9de9248 1565 acl = hci_conn_hash_lookup_handle(hdev, handle);
5a08ecce
AE
1566 if (acl) {
1567 sco = acl->link;
1568 if (sco) {
1569 sco->state = BT_CLOSED;
1da177e4 1570
539c496d 1571 hci_connect_cfm(sco, status);
5a08ecce
AE
1572 hci_conn_del(sco);
1573 }
a9de9248 1574 }
1da177e4 1575
a9de9248
MH
1576 hci_dev_unlock(hdev);
1577}
1da177e4 1578
f8558555
MH
1579static void hci_cs_auth_requested(struct hci_dev *hdev, __u8 status)
1580{
1581 struct hci_cp_auth_requested *cp;
1582 struct hci_conn *conn;
1583
9f1db00c 1584 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f8558555
MH
1585
1586 if (!status)
1587 return;
1588
1589 cp = hci_sent_cmd_data(hdev, HCI_OP_AUTH_REQUESTED);
1590 if (!cp)
1591 return;
1592
1593 hci_dev_lock(hdev);
1594
1595 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1596 if (conn) {
1597 if (conn->state == BT_CONFIG) {
539c496d 1598 hci_connect_cfm(conn, status);
76a68ba0 1599 hci_conn_drop(conn);
f8558555
MH
1600 }
1601 }
1602
1603 hci_dev_unlock(hdev);
1604}
1605
1606static void hci_cs_set_conn_encrypt(struct hci_dev *hdev, __u8 status)
1607{
1608 struct hci_cp_set_conn_encrypt *cp;
1609 struct hci_conn *conn;
1610
9f1db00c 1611 BT_DBG("%s status 0x%2.2x", hdev->name, status);
f8558555
MH
1612
1613 if (!status)
1614 return;
1615
1616 cp = hci_sent_cmd_data(hdev, HCI_OP_SET_CONN_ENCRYPT);
1617 if (!cp)
1618 return;
1619
1620 hci_dev_lock(hdev);
1621
1622 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1623 if (conn) {
1624 if (conn->state == BT_CONFIG) {
539c496d 1625 hci_connect_cfm(conn, status);
76a68ba0 1626 hci_conn_drop(conn);
f8558555
MH
1627 }
1628 }
1629
1630 hci_dev_unlock(hdev);
1631}
1632
127178d2 1633static int hci_outgoing_auth_needed(struct hci_dev *hdev,
807deac2 1634 struct hci_conn *conn)
392599b9 1635{
392599b9
JH
1636 if (conn->state != BT_CONFIG || !conn->out)
1637 return 0;
1638
765c2a96 1639 if (conn->pending_sec_level == BT_SECURITY_SDP)
392599b9
JH
1640 return 0;
1641
1642 /* Only request authentication for SSP connections or non-SSP
264b8b4e
JH
1643 * devices with sec_level MEDIUM or HIGH or if MITM protection
1644 * is requested.
1645 */
807deac2 1646 if (!hci_conn_ssp_enabled(conn) && !(conn->auth_type & 0x01) &&
7e3691e1 1647 conn->pending_sec_level != BT_SECURITY_FIPS &&
264b8b4e
JH
1648 conn->pending_sec_level != BT_SECURITY_HIGH &&
1649 conn->pending_sec_level != BT_SECURITY_MEDIUM)
392599b9
JH
1650 return 0;
1651
392599b9
JH
1652 return 1;
1653}
1654
6039aa73 1655static int hci_resolve_name(struct hci_dev *hdev,
04124681 1656 struct inquiry_entry *e)
30dc78e1
JH
1657{
1658 struct hci_cp_remote_name_req cp;
1659
1660 memset(&cp, 0, sizeof(cp));
1661
1662 bacpy(&cp.bdaddr, &e->data.bdaddr);
1663 cp.pscan_rep_mode = e->data.pscan_rep_mode;
1664 cp.pscan_mode = e->data.pscan_mode;
1665 cp.clock_offset = e->data.clock_offset;
1666
1667 return hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
1668}
1669
b644ba33 1670static bool hci_resolve_next_name(struct hci_dev *hdev)
30dc78e1
JH
1671{
1672 struct discovery_state *discov = &hdev->discovery;
1673 struct inquiry_entry *e;
1674
b644ba33
JH
1675 if (list_empty(&discov->resolve))
1676 return false;
1677
1678 e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
c810089c
RM
1679 if (!e)
1680 return false;
1681
b644ba33
JH
1682 if (hci_resolve_name(hdev, e) == 0) {
1683 e->name_state = NAME_PENDING;
1684 return true;
1685 }
1686
1687 return false;
1688}
1689
1690static void hci_check_pending_name(struct hci_dev *hdev, struct hci_conn *conn,
04124681 1691 bdaddr_t *bdaddr, u8 *name, u8 name_len)
b644ba33
JH
1692{
1693 struct discovery_state *discov = &hdev->discovery;
1694 struct inquiry_entry *e;
1695
60cb49d2
JH
1696 /* Update the mgmt connected state if necessary. Be careful with
1697 * conn objects that exist but are not (yet) connected however.
1698 * Only those in BT_CONFIG or BT_CONNECTED states can be
1699 * considered connected.
1700 */
1701 if (conn &&
1702 (conn->state == BT_CONFIG || conn->state == BT_CONNECTED) &&
cb77c3ec 1703 !test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
48ec92fa 1704 mgmt_device_connected(hdev, conn, 0, name, name_len);
b644ba33
JH
1705
1706 if (discov->state == DISCOVERY_STOPPED)
1707 return;
1708
30dc78e1
JH
1709 if (discov->state == DISCOVERY_STOPPING)
1710 goto discov_complete;
1711
1712 if (discov->state != DISCOVERY_RESOLVING)
1713 return;
1714
1715 e = hci_inquiry_cache_lookup_resolve(hdev, bdaddr, NAME_PENDING);
7cc8380e
RM
1716 /* If the device was not found in a list of found devices names of which
1717 * are pending. there is no need to continue resolving a next name as it
1718 * will be done upon receiving another Remote Name Request Complete
1719 * Event */
1720 if (!e)
1721 return;
1722
1723 list_del(&e->list);
1724 if (name) {
30dc78e1 1725 e->name_state = NAME_KNOWN;
7cc8380e
RM
1726 mgmt_remote_name(hdev, bdaddr, ACL_LINK, 0x00,
1727 e->data.rssi, name, name_len);
c3e7c0d9
RM
1728 } else {
1729 e->name_state = NAME_NOT_KNOWN;
30dc78e1
JH
1730 }
1731
b644ba33 1732 if (hci_resolve_next_name(hdev))
30dc78e1 1733 return;
30dc78e1
JH
1734
1735discov_complete:
1736 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
1737}
1738
a9de9248
MH
1739static void hci_cs_remote_name_req(struct hci_dev *hdev, __u8 status)
1740{
127178d2
JH
1741 struct hci_cp_remote_name_req *cp;
1742 struct hci_conn *conn;
1743
9f1db00c 1744 BT_DBG("%s status 0x%2.2x", hdev->name, status);
127178d2
JH
1745
1746 /* If successful wait for the name req complete event before
1747 * checking for the need to do authentication */
1748 if (!status)
1749 return;
1750
1751 cp = hci_sent_cmd_data(hdev, HCI_OP_REMOTE_NAME_REQ);
1752 if (!cp)
1753 return;
1754
1755 hci_dev_lock(hdev);
1756
b644ba33
JH
1757 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1758
d7a5a11d 1759 if (hci_dev_test_flag(hdev, HCI_MGMT))
b644ba33 1760 hci_check_pending_name(hdev, conn, &cp->bdaddr, NULL, 0);
30dc78e1 1761
79c6c70c
JH
1762 if (!conn)
1763 goto unlock;
1764
1765 if (!hci_outgoing_auth_needed(hdev, conn))
1766 goto unlock;
1767
51a8efd7 1768 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
c1f23a2b
JB
1769 struct hci_cp_auth_requested auth_cp;
1770
977f8fce
JH
1771 set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
1772
c1f23a2b
JB
1773 auth_cp.handle = __cpu_to_le16(conn->handle);
1774 hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED,
1775 sizeof(auth_cp), &auth_cp);
127178d2
JH
1776 }
1777
79c6c70c 1778unlock:
127178d2 1779 hci_dev_unlock(hdev);
a9de9248 1780}
1da177e4 1781
769be974
MH
1782static void hci_cs_read_remote_features(struct hci_dev *hdev, __u8 status)
1783{
1784 struct hci_cp_read_remote_features *cp;
1785 struct hci_conn *conn;
1786
9f1db00c 1787 BT_DBG("%s status 0x%2.2x", hdev->name, status);
769be974
MH
1788
1789 if (!status)
1790 return;
1791
1792 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_FEATURES);
1793 if (!cp)
1794 return;
1795
1796 hci_dev_lock(hdev);
1797
1798 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1799 if (conn) {
1800 if (conn->state == BT_CONFIG) {
539c496d 1801 hci_connect_cfm(conn, status);
76a68ba0 1802 hci_conn_drop(conn);
769be974
MH
1803 }
1804 }
1805
1806 hci_dev_unlock(hdev);
1807}
1808
1809static void hci_cs_read_remote_ext_features(struct hci_dev *hdev, __u8 status)
1810{
1811 struct hci_cp_read_remote_ext_features *cp;
1812 struct hci_conn *conn;
1813
9f1db00c 1814 BT_DBG("%s status 0x%2.2x", hdev->name, status);
769be974
MH
1815
1816 if (!status)
1817 return;
1818
1819 cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES);
1820 if (!cp)
1821 return;
1822
1823 hci_dev_lock(hdev);
1824
1825 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1826 if (conn) {
1827 if (conn->state == BT_CONFIG) {
539c496d 1828 hci_connect_cfm(conn, status);
76a68ba0 1829 hci_conn_drop(conn);
769be974
MH
1830 }
1831 }
1832
1833 hci_dev_unlock(hdev);
1834}
1835
a9de9248
MH
1836static void hci_cs_setup_sync_conn(struct hci_dev *hdev, __u8 status)
1837{
b6a0dc82
MH
1838 struct hci_cp_setup_sync_conn *cp;
1839 struct hci_conn *acl, *sco;
1840 __u16 handle;
1841
9f1db00c 1842 BT_DBG("%s status 0x%2.2x", hdev->name, status);
b6a0dc82
MH
1843
1844 if (!status)
1845 return;
1846
1847 cp = hci_sent_cmd_data(hdev, HCI_OP_SETUP_SYNC_CONN);
1848 if (!cp)
1849 return;
1850
1851 handle = __le16_to_cpu(cp->handle);
1852
9f1db00c 1853 BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
b6a0dc82
MH
1854
1855 hci_dev_lock(hdev);
1856
1857 acl = hci_conn_hash_lookup_handle(hdev, handle);
5a08ecce
AE
1858 if (acl) {
1859 sco = acl->link;
1860 if (sco) {
1861 sco->state = BT_CLOSED;
b6a0dc82 1862
539c496d 1863 hci_connect_cfm(sco, status);
5a08ecce
AE
1864 hci_conn_del(sco);
1865 }
b6a0dc82
MH
1866 }
1867
1868 hci_dev_unlock(hdev);
1da177e4
LT
1869}
1870
a9de9248 1871static void hci_cs_sniff_mode(struct hci_dev *hdev, __u8 status)
1da177e4 1872{
a9de9248
MH
1873 struct hci_cp_sniff_mode *cp;
1874 struct hci_conn *conn;
1da177e4 1875
9f1db00c 1876 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 1877
a9de9248
MH
1878 if (!status)
1879 return;
04837f64 1880
a9de9248
MH
1881 cp = hci_sent_cmd_data(hdev, HCI_OP_SNIFF_MODE);
1882 if (!cp)
1883 return;
04837f64 1884
a9de9248 1885 hci_dev_lock(hdev);
04837f64 1886
a9de9248 1887 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
e73439d8 1888 if (conn) {
51a8efd7 1889 clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
04837f64 1890
51a8efd7 1891 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8
MH
1892 hci_sco_setup(conn, status);
1893 }
1894
a9de9248
MH
1895 hci_dev_unlock(hdev);
1896}
04837f64 1897
a9de9248
MH
1898static void hci_cs_exit_sniff_mode(struct hci_dev *hdev, __u8 status)
1899{
1900 struct hci_cp_exit_sniff_mode *cp;
1901 struct hci_conn *conn;
04837f64 1902
9f1db00c 1903 BT_DBG("%s status 0x%2.2x", hdev->name, status);
04837f64 1904
a9de9248
MH
1905 if (!status)
1906 return;
04837f64 1907
a9de9248
MH
1908 cp = hci_sent_cmd_data(hdev, HCI_OP_EXIT_SNIFF_MODE);
1909 if (!cp)
1910 return;
04837f64 1911
a9de9248 1912 hci_dev_lock(hdev);
1da177e4 1913
a9de9248 1914 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
e73439d8 1915 if (conn) {
51a8efd7 1916 clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
1da177e4 1917
51a8efd7 1918 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8
MH
1919 hci_sco_setup(conn, status);
1920 }
1921
a9de9248 1922 hci_dev_unlock(hdev);
1da177e4
LT
1923}
1924
88c3df13
JH
1925static void hci_cs_disconnect(struct hci_dev *hdev, u8 status)
1926{
1927 struct hci_cp_disconnect *cp;
1928 struct hci_conn *conn;
1929
1930 if (!status)
1931 return;
1932
1933 cp = hci_sent_cmd_data(hdev, HCI_OP_DISCONNECT);
1934 if (!cp)
1935 return;
1936
1937 hci_dev_lock(hdev);
1938
1939 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
1940 if (conn)
1941 mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
04124681 1942 conn->dst_type, status);
88c3df13
JH
1943
1944 hci_dev_unlock(hdev);
1945}
1946
a02226d6
AE
1947static void hci_cs_create_phylink(struct hci_dev *hdev, u8 status)
1948{
93c284ee
AE
1949 struct hci_cp_create_phy_link *cp;
1950
a02226d6 1951 BT_DBG("%s status 0x%2.2x", hdev->name, status);
93c284ee 1952
93c284ee
AE
1953 cp = hci_sent_cmd_data(hdev, HCI_OP_CREATE_PHY_LINK);
1954 if (!cp)
1955 return;
1956
e58917b9
AE
1957 hci_dev_lock(hdev);
1958
1959 if (status) {
1960 struct hci_conn *hcon;
1961
1962 hcon = hci_conn_hash_lookup_handle(hdev, cp->phy_handle);
1963 if (hcon)
1964 hci_conn_del(hcon);
1965 } else {
1966 amp_write_remote_assoc(hdev, cp->phy_handle);
1967 }
1968
1969 hci_dev_unlock(hdev);
a02226d6
AE
1970}
1971
0b26ab9d
AE
1972static void hci_cs_accept_phylink(struct hci_dev *hdev, u8 status)
1973{
1974 struct hci_cp_accept_phy_link *cp;
1975
1976 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1977
1978 if (status)
1979 return;
1980
1981 cp = hci_sent_cmd_data(hdev, HCI_OP_ACCEPT_PHY_LINK);
1982 if (!cp)
1983 return;
1984
1985 amp_write_remote_assoc(hdev, cp->phy_handle);
1986}
1987
cb1d68f7
JH
1988static void hci_cs_le_create_conn(struct hci_dev *hdev, u8 status)
1989{
1990 struct hci_cp_le_create_conn *cp;
1991 struct hci_conn *conn;
1992
1993 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1994
1995 /* All connection failure handling is taken care of by the
1996 * hci_le_conn_failed function which is triggered by the HCI
1997 * request completion callbacks used for connecting.
1998 */
1999 if (status)
2000 return;
2001
2002 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_CREATE_CONN);
2003 if (!cp)
2004 return;
2005
2006 hci_dev_lock(hdev);
2007
2008 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->peer_addr);
2009 if (!conn)
2010 goto unlock;
2011
2012 /* Store the initiator and responder address information which
2013 * is needed for SMP. These values will not change during the
2014 * lifetime of the connection.
2015 */
2016 conn->init_addr_type = cp->own_address_type;
2017 if (cp->own_address_type == ADDR_LE_DEV_RANDOM)
2018 bacpy(&conn->init_addr, &hdev->random_addr);
2019 else
2020 bacpy(&conn->init_addr, &hdev->bdaddr);
2021
2022 conn->resp_addr_type = cp->peer_addr_type;
2023 bacpy(&conn->resp_addr, &cp->peer_addr);
2024
9489eca4
JH
2025 /* We don't want the connection attempt to stick around
2026 * indefinitely since LE doesn't have a page timeout concept
2027 * like BR/EDR. Set a timer for any connection that doesn't use
2028 * the white list for connecting.
2029 */
2030 if (cp->filter_policy == HCI_LE_USE_PEER_ADDR)
2031 queue_delayed_work(conn->hdev->workqueue,
2032 &conn->le_conn_timeout,
09ae260b 2033 conn->conn_timeout);
9489eca4 2034
cb1d68f7
JH
2035unlock:
2036 hci_dev_unlock(hdev);
2037}
2038
0fe29fd1
MH
2039static void hci_cs_le_read_remote_features(struct hci_dev *hdev, u8 status)
2040{
2041 struct hci_cp_le_read_remote_features *cp;
2042 struct hci_conn *conn;
2043
2044 BT_DBG("%s status 0x%2.2x", hdev->name, status);
2045
2046 if (!status)
2047 return;
2048
2049 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_READ_REMOTE_FEATURES);
2050 if (!cp)
2051 return;
2052
2053 hci_dev_lock(hdev);
2054
2055 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
2056 if (conn) {
2057 if (conn->state == BT_CONFIG) {
2058 hci_connect_cfm(conn, status);
2059 hci_conn_drop(conn);
2060 }
2061 }
2062
2063 hci_dev_unlock(hdev);
2064}
2065
81d0c8ad
JH
2066static void hci_cs_le_start_enc(struct hci_dev *hdev, u8 status)
2067{
2068 struct hci_cp_le_start_enc *cp;
2069 struct hci_conn *conn;
2070
2071 BT_DBG("%s status 0x%2.2x", hdev->name, status);
2072
2073 if (!status)
2074 return;
2075
2076 hci_dev_lock(hdev);
2077
2078 cp = hci_sent_cmd_data(hdev, HCI_OP_LE_START_ENC);
2079 if (!cp)
2080 goto unlock;
2081
2082 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
2083 if (!conn)
2084 goto unlock;
2085
2086 if (conn->state != BT_CONNECTED)
2087 goto unlock;
2088
2089 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
2090 hci_conn_drop(conn);
2091
2092unlock:
2093 hci_dev_unlock(hdev);
2094}
2095
50fc85f1
KP
2096static void hci_cs_switch_role(struct hci_dev *hdev, u8 status)
2097{
2098 struct hci_cp_switch_role *cp;
2099 struct hci_conn *conn;
2100
2101 BT_DBG("%s status 0x%2.2x", hdev->name, status);
2102
2103 if (!status)
2104 return;
2105
2106 cp = hci_sent_cmd_data(hdev, HCI_OP_SWITCH_ROLE);
2107 if (!cp)
2108 return;
2109
2110 hci_dev_lock(hdev);
2111
2112 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
2113 if (conn)
2114 clear_bit(HCI_CONN_RSWITCH_PEND, &conn->flags);
2115
2116 hci_dev_unlock(hdev);
2117}
2118
6039aa73 2119static void hci_inquiry_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4
LT
2120{
2121 __u8 status = *((__u8 *) skb->data);
30dc78e1
JH
2122 struct discovery_state *discov = &hdev->discovery;
2123 struct inquiry_entry *e;
1da177e4 2124
9f1db00c 2125 BT_DBG("%s status 0x%2.2x", hdev->name, status);
1da177e4 2126
a9de9248 2127 hci_conn_check_pending(hdev);
89352e7d
AG
2128
2129 if (!test_and_clear_bit(HCI_INQUIRY, &hdev->flags))
2130 return;
2131
4e857c58 2132 smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
3e13fa1e
AG
2133 wake_up_bit(&hdev->flags, HCI_INQUIRY);
2134
d7a5a11d 2135 if (!hci_dev_test_flag(hdev, HCI_MGMT))
30dc78e1
JH
2136 return;
2137
56e5cb86 2138 hci_dev_lock(hdev);
30dc78e1 2139
343f935b 2140 if (discov->state != DISCOVERY_FINDING)
30dc78e1
JH
2141 goto unlock;
2142
2143 if (list_empty(&discov->resolve)) {
07d2334a
JP
2144 /* When BR/EDR inquiry is active and no LE scanning is in
2145 * progress, then change discovery state to indicate completion.
2146 *
2147 * When running LE scanning and BR/EDR inquiry simultaneously
2148 * and the LE scan already finished, then change the discovery
2149 * state to indicate completion.
2150 */
2151 if (!hci_dev_test_flag(hdev, HCI_LE_SCAN) ||
2152 !test_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks))
2153 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
30dc78e1
JH
2154 goto unlock;
2155 }
2156
2157 e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
2158 if (e && hci_resolve_name(hdev, e) == 0) {
2159 e->name_state = NAME_PENDING;
2160 hci_discovery_set_state(hdev, DISCOVERY_RESOLVING);
2161 } else {
07d2334a
JP
2162 /* When BR/EDR inquiry is active and no LE scanning is in
2163 * progress, then change discovery state to indicate completion.
2164 *
2165 * When running LE scanning and BR/EDR inquiry simultaneously
2166 * and the LE scan already finished, then change the discovery
2167 * state to indicate completion.
2168 */
2169 if (!hci_dev_test_flag(hdev, HCI_LE_SCAN) ||
2170 !test_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks))
2171 hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
30dc78e1
JH
2172 }
2173
2174unlock:
56e5cb86 2175 hci_dev_unlock(hdev);
1da177e4
LT
2176}
2177
6039aa73 2178static void hci_inquiry_result_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2179{
45bb4bf0 2180 struct inquiry_data data;
a9de9248 2181 struct inquiry_info *info = (void *) (skb->data + 1);
1da177e4
LT
2182 int num_rsp = *((__u8 *) skb->data);
2183
2184 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
2185
45bb4bf0
MH
2186 if (!num_rsp)
2187 return;
2188
d7a5a11d 2189 if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
1519cc17
AG
2190 return;
2191
1da177e4 2192 hci_dev_lock(hdev);
45bb4bf0 2193
e17acd40 2194 for (; num_rsp; num_rsp--, info++) {
af58925c 2195 u32 flags;
3175405b 2196
1da177e4
LT
2197 bacpy(&data.bdaddr, &info->bdaddr);
2198 data.pscan_rep_mode = info->pscan_rep_mode;
2199 data.pscan_period_mode = info->pscan_period_mode;
2200 data.pscan_mode = info->pscan_mode;
2201 memcpy(data.dev_class, info->dev_class, 3);
2202 data.clock_offset = info->clock_offset;
efb2513f 2203 data.rssi = HCI_RSSI_INVALID;
41a96212 2204 data.ssp_mode = 0x00;
3175405b 2205
af58925c
MH
2206 flags = hci_inquiry_cache_update(hdev, &data, false);
2207
48264f06 2208 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
efb2513f
MH
2209 info->dev_class, HCI_RSSI_INVALID,
2210 flags, NULL, 0, NULL, 0);
1da177e4 2211 }
45bb4bf0 2212
1da177e4
LT
2213 hci_dev_unlock(hdev);
2214}
2215
6039aa73 2216static void hci_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2217{
a9de9248
MH
2218 struct hci_ev_conn_complete *ev = (void *) skb->data;
2219 struct hci_conn *conn;
1da177e4
LT
2220
2221 BT_DBG("%s", hdev->name);
2222
2223 hci_dev_lock(hdev);
2224
2225 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
9499237a
MH
2226 if (!conn) {
2227 if (ev->link_type != SCO_LINK)
2228 goto unlock;
2229
2230 conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr);
2231 if (!conn)
2232 goto unlock;
2233
2234 conn->type = SCO_LINK;
2235 }
1da177e4
LT
2236
2237 if (!ev->status) {
2238 conn->handle = __le16_to_cpu(ev->handle);
769be974
MH
2239
2240 if (conn->type == ACL_LINK) {
2241 conn->state = BT_CONFIG;
2242 hci_conn_hold(conn);
a9ea3ed9
SJ
2243
2244 if (!conn->out && !hci_conn_ssp_enabled(conn) &&
2245 !hci_find_link_key(hdev, &ev->bdaddr))
2246 conn->disc_timeout = HCI_PAIRING_TIMEOUT;
2247 else
2248 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
769be974
MH
2249 } else
2250 conn->state = BT_CONNECTED;
1da177e4 2251
23b9ceb7 2252 hci_debugfs_create_conn(conn);
7d0db0a3
MH
2253 hci_conn_add_sysfs(conn);
2254
1da177e4 2255 if (test_bit(HCI_AUTH, &hdev->flags))
4dae2798 2256 set_bit(HCI_CONN_AUTH, &conn->flags);
1da177e4
LT
2257
2258 if (test_bit(HCI_ENCRYPT, &hdev->flags))
4dae2798 2259 set_bit(HCI_CONN_ENCRYPT, &conn->flags);
1da177e4 2260
04837f64
MH
2261 /* Get remote features */
2262 if (conn->type == ACL_LINK) {
2263 struct hci_cp_read_remote_features cp;
2264 cp.handle = ev->handle;
769be974 2265 hci_send_cmd(hdev, HCI_OP_READ_REMOTE_FEATURES,
04124681 2266 sizeof(cp), &cp);
22f433dc 2267
1d2dc5b7 2268 hci_update_page_scan(hdev);
04837f64
MH
2269 }
2270
1da177e4 2271 /* Set packet type for incoming connection */
d095c1eb 2272 if (!conn->out && hdev->hci_ver < BLUETOOTH_VER_2_0) {
1da177e4
LT
2273 struct hci_cp_change_conn_ptype cp;
2274 cp.handle = ev->handle;
a8746417 2275 cp.pkt_type = cpu_to_le16(conn->pkt_type);
04124681
GP
2276 hci_send_cmd(hdev, HCI_OP_CHANGE_CONN_PTYPE, sizeof(cp),
2277 &cp);
1da177e4 2278 }
17d5c04c 2279 } else {
1da177e4 2280 conn->state = BT_CLOSED;
17d5c04c 2281 if (conn->type == ACL_LINK)
64c7b77c 2282 mgmt_connect_failed(hdev, &conn->dst, conn->type,
04124681 2283 conn->dst_type, ev->status);
17d5c04c 2284 }
1da177e4 2285
e73439d8
MH
2286 if (conn->type == ACL_LINK)
2287 hci_sco_setup(conn, ev->status);
1da177e4 2288
769be974 2289 if (ev->status) {
539c496d 2290 hci_connect_cfm(conn, ev->status);
1da177e4 2291 hci_conn_del(conn);
c89b6e6b 2292 } else if (ev->link_type != ACL_LINK)
539c496d 2293 hci_connect_cfm(conn, ev->status);
1da177e4 2294
a9de9248 2295unlock:
1da177e4 2296 hci_dev_unlock(hdev);
1da177e4 2297
a9de9248 2298 hci_conn_check_pending(hdev);
1da177e4
LT
2299}
2300
70c46425
JH
2301static void hci_reject_conn(struct hci_dev *hdev, bdaddr_t *bdaddr)
2302{
2303 struct hci_cp_reject_conn_req cp;
2304
2305 bacpy(&cp.bdaddr, bdaddr);
2306 cp.reason = HCI_ERROR_REJ_BAD_ADDR;
2307 hci_send_cmd(hdev, HCI_OP_REJECT_CONN_REQ, sizeof(cp), &cp);
2308}
2309
6039aa73 2310static void hci_conn_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2311{
a9de9248
MH
2312 struct hci_ev_conn_request *ev = (void *) skb->data;
2313 int mask = hdev->link_mode;
70c46425
JH
2314 struct inquiry_entry *ie;
2315 struct hci_conn *conn;
20714bfe 2316 __u8 flags = 0;
1da177e4 2317
6ed93dc6 2318 BT_DBG("%s bdaddr %pMR type 0x%x", hdev->name, &ev->bdaddr,
807deac2 2319 ev->link_type);
1da177e4 2320
20714bfe
FD
2321 mask |= hci_proto_connect_ind(hdev, &ev->bdaddr, ev->link_type,
2322 &flags);
1da177e4 2323
70c46425
JH
2324 if (!(mask & HCI_LM_ACCEPT)) {
2325 hci_reject_conn(hdev, &ev->bdaddr);
2326 return;
2327 }
2328
46c4c941
JH
2329 if (hci_bdaddr_list_lookup(&hdev->blacklist, &ev->bdaddr,
2330 BDADDR_BREDR)) {
2331 hci_reject_conn(hdev, &ev->bdaddr);
2332 return;
2333 }
2334
6a8fc95c
JH
2335 /* Require HCI_CONNECTABLE or a whitelist entry to accept the
2336 * connection. These features are only touched through mgmt so
2337 * only do the checks if HCI_MGMT is set.
2338 */
d7a5a11d
MH
2339 if (hci_dev_test_flag(hdev, HCI_MGMT) &&
2340 !hci_dev_test_flag(hdev, HCI_CONNECTABLE) &&
46c4c941
JH
2341 !hci_bdaddr_list_lookup(&hdev->whitelist, &ev->bdaddr,
2342 BDADDR_BREDR)) {
2343 hci_reject_conn(hdev, &ev->bdaddr);
2344 return;
70c46425 2345 }
1da177e4 2346
70c46425 2347 /* Connection accepted */
b6a0dc82 2348
70c46425
JH
2349 hci_dev_lock(hdev);
2350
2351 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
2352 if (ie)
2353 memcpy(ie->data.dev_class, ev->dev_class, 3);
c7bdd502 2354
70c46425
JH
2355 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type,
2356 &ev->bdaddr);
2357 if (!conn) {
a5c4e309
JH
2358 conn = hci_conn_add(hdev, ev->link_type, &ev->bdaddr,
2359 HCI_ROLE_SLAVE);
a9de9248 2360 if (!conn) {
70c46425
JH
2361 BT_ERR("No memory for new connection");
2362 hci_dev_unlock(hdev);
2363 return;
1da177e4 2364 }
70c46425 2365 }
b6a0dc82 2366
70c46425 2367 memcpy(conn->dev_class, ev->dev_class, 3);
b6a0dc82 2368
70c46425 2369 hci_dev_unlock(hdev);
1da177e4 2370
70c46425
JH
2371 if (ev->link_type == ACL_LINK ||
2372 (!(flags & HCI_PROTO_DEFER) && !lmp_esco_capable(hdev))) {
2373 struct hci_cp_accept_conn_req cp;
2374 conn->state = BT_CONNECT;
1da177e4 2375
70c46425 2376 bacpy(&cp.bdaddr, &ev->bdaddr);
b6a0dc82 2377
70c46425
JH
2378 if (lmp_rswitch_capable(hdev) && (mask & HCI_LM_MASTER))
2379 cp.role = 0x00; /* Become master */
2380 else
2381 cp.role = 0x01; /* Remain slave */
b6a0dc82 2382
70c46425
JH
2383 hci_send_cmd(hdev, HCI_OP_ACCEPT_CONN_REQ, sizeof(cp), &cp);
2384 } else if (!(flags & HCI_PROTO_DEFER)) {
2385 struct hci_cp_accept_sync_conn_req cp;
2386 conn->state = BT_CONNECT;
b6a0dc82 2387
70c46425
JH
2388 bacpy(&cp.bdaddr, &ev->bdaddr);
2389 cp.pkt_type = cpu_to_le16(conn->pkt_type);
b6a0dc82 2390
70c46425
JH
2391 cp.tx_bandwidth = cpu_to_le32(0x00001f40);
2392 cp.rx_bandwidth = cpu_to_le32(0x00001f40);
2393 cp.max_latency = cpu_to_le16(0xffff);
2394 cp.content_format = cpu_to_le16(hdev->voice_setting);
2395 cp.retrans_effort = 0xff;
1da177e4 2396
70c46425
JH
2397 hci_send_cmd(hdev, HCI_OP_ACCEPT_SYNC_CONN_REQ, sizeof(cp),
2398 &cp);
a9de9248 2399 } else {
70c46425 2400 conn->state = BT_CONNECT2;
539c496d 2401 hci_connect_cfm(conn, 0);
1da177e4 2402 }
1da177e4
LT
2403}
2404
f0d6a0ea
MA
2405static u8 hci_to_mgmt_reason(u8 err)
2406{
2407 switch (err) {
2408 case HCI_ERROR_CONNECTION_TIMEOUT:
2409 return MGMT_DEV_DISCONN_TIMEOUT;
2410 case HCI_ERROR_REMOTE_USER_TERM:
2411 case HCI_ERROR_REMOTE_LOW_RESOURCES:
2412 case HCI_ERROR_REMOTE_POWER_OFF:
2413 return MGMT_DEV_DISCONN_REMOTE;
2414 case HCI_ERROR_LOCAL_HOST_TERM:
2415 return MGMT_DEV_DISCONN_LOCAL_HOST;
2416 default:
2417 return MGMT_DEV_DISCONN_UNKNOWN;
2418 }
2419}
2420
6039aa73 2421static void hci_disconn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
04837f64 2422{
a9de9248 2423 struct hci_ev_disconn_complete *ev = (void *) skb->data;
abf54a50 2424 u8 reason = hci_to_mgmt_reason(ev->reason);
9fcb18ef 2425 struct hci_conn_params *params;
04837f64 2426 struct hci_conn *conn;
12d4a3b2 2427 bool mgmt_connected;
3846220b 2428 u8 type;
04837f64 2429
9f1db00c 2430 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
04837f64
MH
2431
2432 hci_dev_lock(hdev);
2433
2434 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
f7520543
JH
2435 if (!conn)
2436 goto unlock;
7d0db0a3 2437
abf54a50
AG
2438 if (ev->status) {
2439 mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
2440 conn->dst_type, ev->status);
2441 goto unlock;
37d9ef76 2442 }
f7520543 2443
3846220b
AG
2444 conn->state = BT_CLOSED;
2445
12d4a3b2
JH
2446 mgmt_connected = test_and_clear_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags);
2447 mgmt_device_disconnected(hdev, &conn->dst, conn->type, conn->dst_type,
2448 reason, mgmt_connected);
abf54a50 2449
22f433dc
JH
2450 if (conn->type == ACL_LINK) {
2451 if (test_bit(HCI_CONN_FLUSH_KEY, &conn->flags))
2452 hci_remove_link_key(hdev, &conn->dst);
2453
1d2dc5b7 2454 hci_update_page_scan(hdev);
22f433dc 2455 }
2210246c 2456
9fcb18ef
AG
2457 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
2458 if (params) {
2459 switch (params->auto_connect) {
2460 case HCI_AUTO_CONN_LINK_LOSS:
2461 if (ev->reason != HCI_ERROR_CONNECTION_TIMEOUT)
2462 break;
2463 /* Fall through */
2464
4b9e7e75 2465 case HCI_AUTO_CONN_DIRECT:
9fcb18ef 2466 case HCI_AUTO_CONN_ALWAYS:
418025d1
JH
2467 list_del_init(&params->action);
2468 list_add(&params->action, &hdev->pend_le_conns);
2469 hci_update_background_scan(hdev);
9fcb18ef
AG
2470 break;
2471
2472 default:
2473 break;
2474 }
2475 }
2476
3846220b 2477 type = conn->type;
2210246c 2478
3a6d576b 2479 hci_disconn_cfm(conn, ev->reason);
3846220b
AG
2480 hci_conn_del(conn);
2481
2482 /* Re-enable advertising if necessary, since it might
2483 * have been disabled by the connection. From the
2484 * HCI_LE_Set_Advertise_Enable command description in
2485 * the core specification (v4.0):
2486 * "The Controller shall continue advertising until the Host
2487 * issues an LE_Set_Advertise_Enable command with
2488 * Advertising_Enable set to 0x00 (Advertising is disabled)
2489 * or until a connection is created or until the Advertising
2490 * is timed out due to Directed Advertising."
2491 */
2492 if (type == LE_LINK)
2493 mgmt_reenable_advertising(hdev);
f7520543
JH
2494
2495unlock:
04837f64
MH
2496 hci_dev_unlock(hdev);
2497}
2498
6039aa73 2499static void hci_auth_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2500{
a9de9248 2501 struct hci_ev_auth_complete *ev = (void *) skb->data;
04837f64 2502 struct hci_conn *conn;
1da177e4 2503
9f1db00c 2504 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2505
2506 hci_dev_lock(hdev);
2507
04837f64 2508 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
d7556e20
WR
2509 if (!conn)
2510 goto unlock;
2511
2512 if (!ev->status) {
aa64a8b5 2513 if (!hci_conn_ssp_enabled(conn) &&
807deac2 2514 test_bit(HCI_CONN_REAUTH_PEND, &conn->flags)) {
d7556e20 2515 BT_INFO("re-auth of legacy device is not possible.");
2a611692 2516 } else {
4dae2798 2517 set_bit(HCI_CONN_AUTH, &conn->flags);
d7556e20 2518 conn->sec_level = conn->pending_sec_level;
2a611692 2519 }
d7556e20 2520 } else {
e1e930f5 2521 mgmt_auth_failed(conn, ev->status);
d7556e20 2522 }
1da177e4 2523
51a8efd7
JH
2524 clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
2525 clear_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
1da177e4 2526
d7556e20 2527 if (conn->state == BT_CONFIG) {
aa64a8b5 2528 if (!ev->status && hci_conn_ssp_enabled(conn)) {
d7556e20
WR
2529 struct hci_cp_set_conn_encrypt cp;
2530 cp.handle = ev->handle;
2531 cp.encrypt = 0x01;
2532 hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
807deac2 2533 &cp);
052b30b0 2534 } else {
d7556e20 2535 conn->state = BT_CONNECTED;
539c496d 2536 hci_connect_cfm(conn, ev->status);
76a68ba0 2537 hci_conn_drop(conn);
052b30b0 2538 }
d7556e20
WR
2539 } else {
2540 hci_auth_cfm(conn, ev->status);
052b30b0 2541
d7556e20
WR
2542 hci_conn_hold(conn);
2543 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 2544 hci_conn_drop(conn);
d7556e20
WR
2545 }
2546
51a8efd7 2547 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
d7556e20
WR
2548 if (!ev->status) {
2549 struct hci_cp_set_conn_encrypt cp;
2550 cp.handle = ev->handle;
2551 cp.encrypt = 0x01;
2552 hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
807deac2 2553 &cp);
d7556e20 2554 } else {
51a8efd7 2555 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
d7556e20 2556 hci_encrypt_cfm(conn, ev->status, 0x00);
1da177e4
LT
2557 }
2558 }
2559
d7556e20 2560unlock:
1da177e4
LT
2561 hci_dev_unlock(hdev);
2562}
2563
6039aa73 2564static void hci_remote_name_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 2565{
127178d2
JH
2566 struct hci_ev_remote_name *ev = (void *) skb->data;
2567 struct hci_conn *conn;
2568
a9de9248 2569 BT_DBG("%s", hdev->name);
1da177e4 2570
a9de9248 2571 hci_conn_check_pending(hdev);
127178d2
JH
2572
2573 hci_dev_lock(hdev);
2574
b644ba33 2575 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
30dc78e1 2576
d7a5a11d 2577 if (!hci_dev_test_flag(hdev, HCI_MGMT))
b644ba33 2578 goto check_auth;
a88a9652 2579
b644ba33
JH
2580 if (ev->status == 0)
2581 hci_check_pending_name(hdev, conn, &ev->bdaddr, ev->name,
04124681 2582 strnlen(ev->name, HCI_MAX_NAME_LENGTH));
b644ba33
JH
2583 else
2584 hci_check_pending_name(hdev, conn, &ev->bdaddr, NULL, 0);
2585
2586check_auth:
79c6c70c
JH
2587 if (!conn)
2588 goto unlock;
2589
2590 if (!hci_outgoing_auth_needed(hdev, conn))
2591 goto unlock;
2592
51a8efd7 2593 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
127178d2 2594 struct hci_cp_auth_requested cp;
977f8fce
JH
2595
2596 set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
2597
127178d2
JH
2598 cp.handle = __cpu_to_le16(conn->handle);
2599 hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED, sizeof(cp), &cp);
2600 }
2601
79c6c70c 2602unlock:
127178d2 2603 hci_dev_unlock(hdev);
a9de9248
MH
2604}
2605
821f3766
JH
2606static void read_enc_key_size_complete(struct hci_dev *hdev, u8 status,
2607 u16 opcode, struct sk_buff *skb)
2608{
2609 const struct hci_rp_read_enc_key_size *rp;
2610 struct hci_conn *conn;
2611 u16 handle;
2612
2613 BT_DBG("%s status 0x%02x", hdev->name, status);
2614
2615 if (!skb || skb->len < sizeof(*rp)) {
2616 BT_ERR("%s invalid HCI Read Encryption Key Size response",
2617 hdev->name);
2618 return;
2619 }
2620
2621 rp = (void *)skb->data;
2622 handle = le16_to_cpu(rp->handle);
2623
2624 hci_dev_lock(hdev);
2625
2626 conn = hci_conn_hash_lookup_handle(hdev, handle);
2627 if (!conn)
2628 goto unlock;
2629
2630 /* If we fail to read the encryption key size, assume maximum
2631 * (which is the same we do also when this HCI command isn't
2632 * supported.
2633 */
2634 if (rp->status) {
2635 BT_ERR("%s failed to read key size for handle %u", hdev->name,
2636 handle);
2637 conn->enc_key_size = HCI_LINK_KEY_SIZE;
2638 } else {
2639 conn->enc_key_size = rp->key_size;
2640 }
2641
2642 if (conn->state == BT_CONFIG) {
2643 conn->state = BT_CONNECTED;
2644 hci_connect_cfm(conn, 0);
2645 hci_conn_drop(conn);
2646 } else {
2647 u8 encrypt;
2648
2649 if (!test_bit(HCI_CONN_ENCRYPT, &conn->flags))
2650 encrypt = 0x00;
5d667ef6 2651 else if (test_bit(HCI_CONN_AES_CCM, &conn->flags))
821f3766
JH
2652 encrypt = 0x02;
2653 else
2654 encrypt = 0x01;
2655
2656 hci_encrypt_cfm(conn, 0, encrypt);
2657 }
2658
2659unlock:
2660 hci_dev_unlock(hdev);
2661}
2662
6039aa73 2663static void hci_encrypt_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
2664{
2665 struct hci_ev_encrypt_change *ev = (void *) skb->data;
2666 struct hci_conn *conn;
2667
9f1db00c 2668 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2669
2670 hci_dev_lock(hdev);
2671
04837f64 2672 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
dc8357cc
MH
2673 if (!conn)
2674 goto unlock;
1da177e4 2675
dc8357cc
MH
2676 if (!ev->status) {
2677 if (ev->encrypt) {
2678 /* Encryption implies authentication */
4dae2798
JH
2679 set_bit(HCI_CONN_AUTH, &conn->flags);
2680 set_bit(HCI_CONN_ENCRYPT, &conn->flags);
dc8357cc 2681 conn->sec_level = conn->pending_sec_level;
abf76bad 2682
914a6ffe
MH
2683 /* P-256 authentication key implies FIPS */
2684 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256)
4dae2798 2685 set_bit(HCI_CONN_FIPS, &conn->flags);
914a6ffe 2686
abf76bad
MH
2687 if ((conn->type == ACL_LINK && ev->encrypt == 0x02) ||
2688 conn->type == LE_LINK)
2689 set_bit(HCI_CONN_AES_CCM, &conn->flags);
2690 } else {
4dae2798 2691 clear_bit(HCI_CONN_ENCRYPT, &conn->flags);
abf76bad
MH
2692 clear_bit(HCI_CONN_AES_CCM, &conn->flags);
2693 }
dc8357cc 2694 }
a7d7723a 2695
7ed3fa20
JH
2696 /* We should disregard the current RPA and generate a new one
2697 * whenever the encryption procedure fails.
2698 */
2699 if (ev->status && conn->type == LE_LINK)
a1536da2 2700 hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
7ed3fa20 2701
dc8357cc 2702 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
f8558555 2703
dc8357cc
MH
2704 if (ev->status && conn->state == BT_CONNECTED) {
2705 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
2706 hci_conn_drop(conn);
2707 goto unlock;
1da177e4
LT
2708 }
2709
035ad621
JH
2710 /* In Secure Connections Only mode, do not allow any connections
2711 * that are not encrypted with AES-CCM using a P-256 authenticated
2712 * combination key.
2713 */
2714 if (hci_dev_test_flag(hdev, HCI_SC_ONLY) &&
2715 (!test_bit(HCI_CONN_AES_CCM, &conn->flags) ||
2716 conn->key_type != HCI_LK_AUTH_COMBINATION_P256)) {
2717 hci_connect_cfm(conn, HCI_ERROR_AUTH_FAILURE);
2718 hci_conn_drop(conn);
2719 goto unlock;
2720 }
2721
821f3766
JH
2722 /* Try reading the encryption key size for encrypted ACL links */
2723 if (!ev->status && ev->encrypt && conn->type == ACL_LINK) {
2724 struct hci_cp_read_enc_key_size cp;
2725 struct hci_request req;
2726
2727 /* Only send HCI_Read_Encryption_Key_Size if the
2728 * controller really supports it. If it doesn't, assume
2729 * the default size (16).
2730 */
2731 if (!(hdev->commands[20] & 0x10)) {
2732 conn->enc_key_size = HCI_LINK_KEY_SIZE;
2733 goto notify;
2734 }
2735
2736 hci_req_init(&req, hdev);
2737
2738 cp.handle = cpu_to_le16(conn->handle);
2739 hci_req_add(&req, HCI_OP_READ_ENC_KEY_SIZE, sizeof(cp), &cp);
2740
2741 if (hci_req_run_skb(&req, read_enc_key_size_complete)) {
2742 BT_ERR("Sending HCI Read Encryption Key Size failed");
2743 conn->enc_key_size = HCI_LINK_KEY_SIZE;
2744 goto notify;
2745 }
2746
2747 goto unlock;
2748 }
2749
2750notify:
dc8357cc
MH
2751 if (conn->state == BT_CONFIG) {
2752 if (!ev->status)
2753 conn->state = BT_CONNECTED;
2754
539c496d 2755 hci_connect_cfm(conn, ev->status);
dc8357cc
MH
2756 hci_conn_drop(conn);
2757 } else
2758 hci_encrypt_cfm(conn, ev->status, ev->encrypt);
2759
a7d7723a 2760unlock:
1da177e4
LT
2761 hci_dev_unlock(hdev);
2762}
2763
6039aa73
GP
2764static void hci_change_link_key_complete_evt(struct hci_dev *hdev,
2765 struct sk_buff *skb)
1da177e4 2766{
a9de9248 2767 struct hci_ev_change_link_key_complete *ev = (void *) skb->data;
04837f64 2768 struct hci_conn *conn;
1da177e4 2769
9f1db00c 2770 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
2771
2772 hci_dev_lock(hdev);
2773
04837f64 2774 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
1da177e4
LT
2775 if (conn) {
2776 if (!ev->status)
4dae2798 2777 set_bit(HCI_CONN_SECURE, &conn->flags);
1da177e4 2778
51a8efd7 2779 clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
1da177e4
LT
2780
2781 hci_key_change_cfm(conn, ev->status);
2782 }
2783
2784 hci_dev_unlock(hdev);
2785}
2786
6039aa73
GP
2787static void hci_remote_features_evt(struct hci_dev *hdev,
2788 struct sk_buff *skb)
1da177e4 2789{
a9de9248
MH
2790 struct hci_ev_remote_features *ev = (void *) skb->data;
2791 struct hci_conn *conn;
2792
9f1db00c 2793 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a9de9248 2794
a9de9248
MH
2795 hci_dev_lock(hdev);
2796
2797 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
ccd556fe
JH
2798 if (!conn)
2799 goto unlock;
769be974 2800
ccd556fe 2801 if (!ev->status)
cad718ed 2802 memcpy(conn->features[0], ev->features, 8);
ccd556fe
JH
2803
2804 if (conn->state != BT_CONFIG)
2805 goto unlock;
2806
ac363cf9
SJ
2807 if (!ev->status && lmp_ext_feat_capable(hdev) &&
2808 lmp_ext_feat_capable(conn)) {
ccd556fe
JH
2809 struct hci_cp_read_remote_ext_features cp;
2810 cp.handle = ev->handle;
2811 cp.page = 0x01;
2812 hci_send_cmd(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES,
807deac2 2813 sizeof(cp), &cp);
392599b9
JH
2814 goto unlock;
2815 }
2816
671267bf 2817 if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
127178d2
JH
2818 struct hci_cp_remote_name_req cp;
2819 memset(&cp, 0, sizeof(cp));
2820 bacpy(&cp.bdaddr, &conn->dst);
2821 cp.pscan_rep_mode = 0x02;
2822 hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
b644ba33 2823 } else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
48ec92fa 2824 mgmt_device_connected(hdev, conn, 0, NULL, 0);
392599b9 2825
127178d2 2826 if (!hci_outgoing_auth_needed(hdev, conn)) {
ccd556fe 2827 conn->state = BT_CONNECTED;
539c496d 2828 hci_connect_cfm(conn, ev->status);
76a68ba0 2829 hci_conn_drop(conn);
769be974 2830 }
a9de9248 2831
ccd556fe 2832unlock:
a9de9248 2833 hci_dev_unlock(hdev);
1da177e4
LT
2834}
2835
e6214487
JH
2836static void hci_cmd_complete_evt(struct hci_dev *hdev, struct sk_buff *skb,
2837 u16 *opcode, u8 *status,
2838 hci_req_complete_t *req_complete,
2839 hci_req_complete_skb_t *req_complete_skb)
a9de9248
MH
2840{
2841 struct hci_ev_cmd_complete *ev = (void *) skb->data;
a9de9248 2842
e6214487
JH
2843 *opcode = __le16_to_cpu(ev->opcode);
2844 *status = skb->data[sizeof(*ev)];
a9de9248 2845
e6214487 2846 skb_pull(skb, sizeof(*ev));
a9de9248 2847
e6214487 2848 switch (*opcode) {
a9de9248
MH
2849 case HCI_OP_INQUIRY_CANCEL:
2850 hci_cc_inquiry_cancel(hdev, skb);
2851 break;
2852
4d93483b
AG
2853 case HCI_OP_PERIODIC_INQ:
2854 hci_cc_periodic_inq(hdev, skb);
2855 break;
2856
a9de9248
MH
2857 case HCI_OP_EXIT_PERIODIC_INQ:
2858 hci_cc_exit_periodic_inq(hdev, skb);
2859 break;
2860
2861 case HCI_OP_REMOTE_NAME_REQ_CANCEL:
2862 hci_cc_remote_name_req_cancel(hdev, skb);
2863 break;
2864
2865 case HCI_OP_ROLE_DISCOVERY:
2866 hci_cc_role_discovery(hdev, skb);
2867 break;
2868
e4e8e37c
MH
2869 case HCI_OP_READ_LINK_POLICY:
2870 hci_cc_read_link_policy(hdev, skb);
2871 break;
2872
a9de9248
MH
2873 case HCI_OP_WRITE_LINK_POLICY:
2874 hci_cc_write_link_policy(hdev, skb);
2875 break;
2876
e4e8e37c
MH
2877 case HCI_OP_READ_DEF_LINK_POLICY:
2878 hci_cc_read_def_link_policy(hdev, skb);
2879 break;
2880
2881 case HCI_OP_WRITE_DEF_LINK_POLICY:
2882 hci_cc_write_def_link_policy(hdev, skb);
2883 break;
2884
a9de9248
MH
2885 case HCI_OP_RESET:
2886 hci_cc_reset(hdev, skb);
2887 break;
2888
c2f0f979
MH
2889 case HCI_OP_READ_STORED_LINK_KEY:
2890 hci_cc_read_stored_link_key(hdev, skb);
2891 break;
2892
a9366120
MH
2893 case HCI_OP_DELETE_STORED_LINK_KEY:
2894 hci_cc_delete_stored_link_key(hdev, skb);
2895 break;
2896
a9de9248
MH
2897 case HCI_OP_WRITE_LOCAL_NAME:
2898 hci_cc_write_local_name(hdev, skb);
2899 break;
2900
2901 case HCI_OP_READ_LOCAL_NAME:
2902 hci_cc_read_local_name(hdev, skb);
2903 break;
2904
2905 case HCI_OP_WRITE_AUTH_ENABLE:
2906 hci_cc_write_auth_enable(hdev, skb);
2907 break;
2908
2909 case HCI_OP_WRITE_ENCRYPT_MODE:
2910 hci_cc_write_encrypt_mode(hdev, skb);
2911 break;
2912
2913 case HCI_OP_WRITE_SCAN_ENABLE:
2914 hci_cc_write_scan_enable(hdev, skb);
2915 break;
2916
2917 case HCI_OP_READ_CLASS_OF_DEV:
2918 hci_cc_read_class_of_dev(hdev, skb);
2919 break;
2920
2921 case HCI_OP_WRITE_CLASS_OF_DEV:
2922 hci_cc_write_class_of_dev(hdev, skb);
2923 break;
2924
2925 case HCI_OP_READ_VOICE_SETTING:
2926 hci_cc_read_voice_setting(hdev, skb);
2927 break;
2928
2929 case HCI_OP_WRITE_VOICE_SETTING:
2930 hci_cc_write_voice_setting(hdev, skb);
2931 break;
2932
b4cb9fb2
MH
2933 case HCI_OP_READ_NUM_SUPPORTED_IAC:
2934 hci_cc_read_num_supported_iac(hdev, skb);
2935 break;
2936
333140b5
MH
2937 case HCI_OP_WRITE_SSP_MODE:
2938 hci_cc_write_ssp_mode(hdev, skb);
2939 break;
2940
eac83dc6
MH
2941 case HCI_OP_WRITE_SC_SUPPORT:
2942 hci_cc_write_sc_support(hdev, skb);
2943 break;
2944
a9de9248
MH
2945 case HCI_OP_READ_LOCAL_VERSION:
2946 hci_cc_read_local_version(hdev, skb);
2947 break;
2948
2949 case HCI_OP_READ_LOCAL_COMMANDS:
2950 hci_cc_read_local_commands(hdev, skb);
2951 break;
2952
2953 case HCI_OP_READ_LOCAL_FEATURES:
2954 hci_cc_read_local_features(hdev, skb);
2955 break;
2956
971e3a4b
AG
2957 case HCI_OP_READ_LOCAL_EXT_FEATURES:
2958 hci_cc_read_local_ext_features(hdev, skb);
2959 break;
2960
a9de9248
MH
2961 case HCI_OP_READ_BUFFER_SIZE:
2962 hci_cc_read_buffer_size(hdev, skb);
2963 break;
2964
2965 case HCI_OP_READ_BD_ADDR:
2966 hci_cc_read_bd_addr(hdev, skb);
2967 break;
2968
f332ec66
JH
2969 case HCI_OP_READ_PAGE_SCAN_ACTIVITY:
2970 hci_cc_read_page_scan_activity(hdev, skb);
2971 break;
2972
4a3ee763
JH
2973 case HCI_OP_WRITE_PAGE_SCAN_ACTIVITY:
2974 hci_cc_write_page_scan_activity(hdev, skb);
2975 break;
2976
f332ec66
JH
2977 case HCI_OP_READ_PAGE_SCAN_TYPE:
2978 hci_cc_read_page_scan_type(hdev, skb);
2979 break;
2980
4a3ee763
JH
2981 case HCI_OP_WRITE_PAGE_SCAN_TYPE:
2982 hci_cc_write_page_scan_type(hdev, skb);
2983 break;
2984
350ee4cf
AE
2985 case HCI_OP_READ_DATA_BLOCK_SIZE:
2986 hci_cc_read_data_block_size(hdev, skb);
2987 break;
2988
1e89cffb
AE
2989 case HCI_OP_READ_FLOW_CONTROL_MODE:
2990 hci_cc_read_flow_control_mode(hdev, skb);
2991 break;
2992
928abaa7
AE
2993 case HCI_OP_READ_LOCAL_AMP_INFO:
2994 hci_cc_read_local_amp_info(hdev, skb);
2995 break;
2996
33f35721
JH
2997 case HCI_OP_READ_CLOCK:
2998 hci_cc_read_clock(hdev, skb);
2999 break;
3000
903e4541
AE
3001 case HCI_OP_READ_LOCAL_AMP_ASSOC:
3002 hci_cc_read_local_amp_assoc(hdev, skb);
3003 break;
3004
d5859e22
JH
3005 case HCI_OP_READ_INQ_RSP_TX_POWER:
3006 hci_cc_read_inq_rsp_tx_power(hdev, skb);
3007 break;
3008
980e1a53
JH
3009 case HCI_OP_PIN_CODE_REPLY:
3010 hci_cc_pin_code_reply(hdev, skb);
3011 break;
3012
3013 case HCI_OP_PIN_CODE_NEG_REPLY:
3014 hci_cc_pin_code_neg_reply(hdev, skb);
3015 break;
3016
c35938b2 3017 case HCI_OP_READ_LOCAL_OOB_DATA:
4d2d2796
MH
3018 hci_cc_read_local_oob_data(hdev, skb);
3019 break;
3020
3021 case HCI_OP_READ_LOCAL_OOB_EXT_DATA:
3022 hci_cc_read_local_oob_ext_data(hdev, skb);
c35938b2
SJ
3023 break;
3024
6ed58ec5
VT
3025 case HCI_OP_LE_READ_BUFFER_SIZE:
3026 hci_cc_le_read_buffer_size(hdev, skb);
3027 break;
3028
60e77321
JH
3029 case HCI_OP_LE_READ_LOCAL_FEATURES:
3030 hci_cc_le_read_local_features(hdev, skb);
3031 break;
3032
8fa19098
JH
3033 case HCI_OP_LE_READ_ADV_TX_POWER:
3034 hci_cc_le_read_adv_tx_power(hdev, skb);
3035 break;
3036
a5c29683
JH
3037 case HCI_OP_USER_CONFIRM_REPLY:
3038 hci_cc_user_confirm_reply(hdev, skb);
3039 break;
3040
3041 case HCI_OP_USER_CONFIRM_NEG_REPLY:
3042 hci_cc_user_confirm_neg_reply(hdev, skb);
3043 break;
3044
1143d458
BG
3045 case HCI_OP_USER_PASSKEY_REPLY:
3046 hci_cc_user_passkey_reply(hdev, skb);
3047 break;
3048
3049 case HCI_OP_USER_PASSKEY_NEG_REPLY:
3050 hci_cc_user_passkey_neg_reply(hdev, skb);
16cde993 3051 break;
07f7fa5d 3052
7a4cd51d
MH
3053 case HCI_OP_LE_SET_RANDOM_ADDR:
3054 hci_cc_le_set_random_addr(hdev, skb);
3055 break;
3056
c1d5dc4a
JH
3057 case HCI_OP_LE_SET_ADV_ENABLE:
3058 hci_cc_le_set_adv_enable(hdev, skb);
3059 break;
3060
533553f8
MH
3061 case HCI_OP_LE_SET_SCAN_PARAM:
3062 hci_cc_le_set_scan_param(hdev, skb);
3063 break;
3064
eb9d91f5
AG
3065 case HCI_OP_LE_SET_SCAN_ENABLE:
3066 hci_cc_le_set_scan_enable(hdev, skb);
3067 break;
3068
cf1d081f
JH
3069 case HCI_OP_LE_READ_WHITE_LIST_SIZE:
3070 hci_cc_le_read_white_list_size(hdev, skb);
3071 break;
3072
0f36b589
MH
3073 case HCI_OP_LE_CLEAR_WHITE_LIST:
3074 hci_cc_le_clear_white_list(hdev, skb);
3075 break;
3076
3077 case HCI_OP_LE_ADD_TO_WHITE_LIST:
3078 hci_cc_le_add_to_white_list(hdev, skb);
3079 break;
3080
3081 case HCI_OP_LE_DEL_FROM_WHITE_LIST:
3082 hci_cc_le_del_from_white_list(hdev, skb);
3083 break;
3084
9b008c04
JH
3085 case HCI_OP_LE_READ_SUPPORTED_STATES:
3086 hci_cc_le_read_supported_states(hdev, skb);
3087 break;
3088
a8e1bfaa
MH
3089 case HCI_OP_LE_READ_DEF_DATA_LEN:
3090 hci_cc_le_read_def_data_len(hdev, skb);
3091 break;
3092
3093 case HCI_OP_LE_WRITE_DEF_DATA_LEN:
3094 hci_cc_le_write_def_data_len(hdev, skb);
3095 break;
3096
3097 case HCI_OP_LE_READ_MAX_DATA_LEN:
3098 hci_cc_le_read_max_data_len(hdev, skb);
3099 break;
3100
f9b49306
AG
3101 case HCI_OP_WRITE_LE_HOST_SUPPORTED:
3102 hci_cc_write_le_host_supported(hdev, skb);
3103 break;
3104
56ed2cb8
JH
3105 case HCI_OP_LE_SET_ADV_PARAM:
3106 hci_cc_set_adv_param(hdev, skb);
3107 break;
3108
93c284ee
AE
3109 case HCI_OP_WRITE_REMOTE_AMP_ASSOC:
3110 hci_cc_write_remote_amp_assoc(hdev, skb);
3111 break;
3112
5ae76a94
AK
3113 case HCI_OP_READ_RSSI:
3114 hci_cc_read_rssi(hdev, skb);
3115 break;
3116
5a134fae
AK
3117 case HCI_OP_READ_TX_POWER:
3118 hci_cc_read_tx_power(hdev, skb);
3119 break;
3120
c50b33c8
MH
3121 case HCI_OP_WRITE_SSP_DEBUG_MODE:
3122 hci_cc_write_ssp_debug_mode(hdev, skb);
3123 break;
3124
a9de9248 3125 default:
e6214487 3126 BT_DBG("%s opcode 0x%4.4x", hdev->name, *opcode);
a9de9248
MH
3127 break;
3128 }
3129
e6214487 3130 if (*opcode != HCI_OP_NOP)
65cc2b49 3131 cancel_delayed_work(&hdev->cmd_timer);
6bd32326 3132
600b2150
JH
3133 if (ev->ncmd && !test_bit(HCI_RESET, &hdev->flags))
3134 atomic_set(&hdev->cmd_cnt, 1);
3135
e6214487
JH
3136 hci_req_cmd_complete(hdev, *opcode, *status, req_complete,
3137 req_complete_skb);
9238f36a 3138
600b2150
JH
3139 if (atomic_read(&hdev->cmd_cnt) && !skb_queue_empty(&hdev->cmd_q))
3140 queue_work(hdev->workqueue, &hdev->cmd_work);
a9de9248
MH
3141}
3142
e6214487
JH
3143static void hci_cmd_status_evt(struct hci_dev *hdev, struct sk_buff *skb,
3144 u16 *opcode, u8 *status,
3145 hci_req_complete_t *req_complete,
3146 hci_req_complete_skb_t *req_complete_skb)
a9de9248
MH
3147{
3148 struct hci_ev_cmd_status *ev = (void *) skb->data;
a9de9248
MH
3149
3150 skb_pull(skb, sizeof(*ev));
3151
e6214487
JH
3152 *opcode = __le16_to_cpu(ev->opcode);
3153 *status = ev->status;
a9de9248 3154
e6214487 3155 switch (*opcode) {
a9de9248
MH
3156 case HCI_OP_INQUIRY:
3157 hci_cs_inquiry(hdev, ev->status);
3158 break;
3159
3160 case HCI_OP_CREATE_CONN:
3161 hci_cs_create_conn(hdev, ev->status);
3162 break;
3163
9645c76c
KP
3164 case HCI_OP_DISCONNECT:
3165 hci_cs_disconnect(hdev, ev->status);
3166 break;
3167
a9de9248
MH
3168 case HCI_OP_ADD_SCO:
3169 hci_cs_add_sco(hdev, ev->status);
3170 break;
3171
f8558555
MH
3172 case HCI_OP_AUTH_REQUESTED:
3173 hci_cs_auth_requested(hdev, ev->status);
3174 break;
3175
3176 case HCI_OP_SET_CONN_ENCRYPT:
3177 hci_cs_set_conn_encrypt(hdev, ev->status);
3178 break;
3179
a9de9248
MH
3180 case HCI_OP_REMOTE_NAME_REQ:
3181 hci_cs_remote_name_req(hdev, ev->status);
3182 break;
3183
769be974
MH
3184 case HCI_OP_READ_REMOTE_FEATURES:
3185 hci_cs_read_remote_features(hdev, ev->status);
3186 break;
3187
3188 case HCI_OP_READ_REMOTE_EXT_FEATURES:
3189 hci_cs_read_remote_ext_features(hdev, ev->status);
3190 break;
3191
a9de9248
MH
3192 case HCI_OP_SETUP_SYNC_CONN:
3193 hci_cs_setup_sync_conn(hdev, ev->status);
3194 break;
3195
9645c76c
KP
3196 case HCI_OP_CREATE_PHY_LINK:
3197 hci_cs_create_phylink(hdev, ev->status);
3198 break;
3199
3200 case HCI_OP_ACCEPT_PHY_LINK:
3201 hci_cs_accept_phylink(hdev, ev->status);
3202 break;
3203
a9de9248
MH
3204 case HCI_OP_SNIFF_MODE:
3205 hci_cs_sniff_mode(hdev, ev->status);
3206 break;
3207
3208 case HCI_OP_EXIT_SNIFF_MODE:
3209 hci_cs_exit_sniff_mode(hdev, ev->status);
3210 break;
3211
50fc85f1
KP
3212 case HCI_OP_SWITCH_ROLE:
3213 hci_cs_switch_role(hdev, ev->status);
3214 break;
3215
cb1d68f7
JH
3216 case HCI_OP_LE_CREATE_CONN:
3217 hci_cs_le_create_conn(hdev, ev->status);
3218 break;
3219
0fe29fd1
MH
3220 case HCI_OP_LE_READ_REMOTE_FEATURES:
3221 hci_cs_le_read_remote_features(hdev, ev->status);
3222 break;
3223
81d0c8ad
JH
3224 case HCI_OP_LE_START_ENC:
3225 hci_cs_le_start_enc(hdev, ev->status);
3226 break;
3227
a9de9248 3228 default:
e6214487 3229 BT_DBG("%s opcode 0x%4.4x", hdev->name, *opcode);
a9de9248
MH
3230 break;
3231 }
3232
e6214487 3233 if (*opcode != HCI_OP_NOP)
65cc2b49 3234 cancel_delayed_work(&hdev->cmd_timer);
6bd32326 3235
600b2150
JH
3236 if (ev->ncmd && !test_bit(HCI_RESET, &hdev->flags))
3237 atomic_set(&hdev->cmd_cnt, 1);
3238
444c6dd5
JH
3239 /* Indicate request completion if the command failed. Also, if
3240 * we're not waiting for a special event and we get a success
3241 * command status we should try to flag the request as completed
3242 * (since for this kind of commands there will not be a command
3243 * complete event).
3244 */
02350a72 3245 if (ev->status ||
db6e3e8d 3246 (hdev->sent_cmd && !bt_cb(hdev->sent_cmd)->req.event))
e6214487
JH
3247 hci_req_cmd_complete(hdev, *opcode, ev->status, req_complete,
3248 req_complete_skb);
9238f36a 3249
600b2150
JH
3250 if (atomic_read(&hdev->cmd_cnt) && !skb_queue_empty(&hdev->cmd_q))
3251 queue_work(hdev->workqueue, &hdev->cmd_work);
a9de9248
MH
3252}
3253
24dfa343
MH
3254static void hci_hardware_error_evt(struct hci_dev *hdev, struct sk_buff *skb)
3255{
3256 struct hci_ev_hardware_error *ev = (void *) skb->data;
3257
c7741d16
MH
3258 hdev->hw_error_code = ev->code;
3259
3260 queue_work(hdev->req_workqueue, &hdev->error_reset);
24dfa343
MH
3261}
3262
6039aa73 3263static void hci_role_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
3264{
3265 struct hci_ev_role_change *ev = (void *) skb->data;
3266 struct hci_conn *conn;
3267
9f1db00c 3268 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a9de9248
MH
3269
3270 hci_dev_lock(hdev);
3271
3272 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
3273 if (conn) {
40bef302
JH
3274 if (!ev->status)
3275 conn->role = ev->role;
a9de9248 3276
51a8efd7 3277 clear_bit(HCI_CONN_RSWITCH_PEND, &conn->flags);
a9de9248
MH
3278
3279 hci_role_switch_cfm(conn, ev->status, ev->role);
3280 }
3281
3282 hci_dev_unlock(hdev);
3283}
3284
6039aa73 3285static void hci_num_comp_pkts_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248
MH
3286{
3287 struct hci_ev_num_comp_pkts *ev = (void *) skb->data;
a9de9248
MH
3288 int i;
3289
32ac5b9b
AE
3290 if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_PACKET_BASED) {
3291 BT_ERR("Wrong event for mode %d", hdev->flow_ctl_mode);
3292 return;
3293 }
3294
c5993de8 3295 if (skb->len < sizeof(*ev) || skb->len < sizeof(*ev) +
807deac2 3296 ev->num_hndl * sizeof(struct hci_comp_pkts_info)) {
a9de9248
MH
3297 BT_DBG("%s bad parameters", hdev->name);
3298 return;
3299 }
3300
c5993de8
AE
3301 BT_DBG("%s num_hndl %d", hdev->name, ev->num_hndl);
3302
613a1c0c
AE
3303 for (i = 0; i < ev->num_hndl; i++) {
3304 struct hci_comp_pkts_info *info = &ev->handles[i];
a9de9248
MH
3305 struct hci_conn *conn;
3306 __u16 handle, count;
3307
613a1c0c
AE
3308 handle = __le16_to_cpu(info->handle);
3309 count = __le16_to_cpu(info->count);
a9de9248
MH
3310
3311 conn = hci_conn_hash_lookup_handle(hdev, handle);
f4280918
AE
3312 if (!conn)
3313 continue;
3314
3315 conn->sent -= count;
3316
3317 switch (conn->type) {
3318 case ACL_LINK:
3319 hdev->acl_cnt += count;
3320 if (hdev->acl_cnt > hdev->acl_pkts)
3321 hdev->acl_cnt = hdev->acl_pkts;
3322 break;
3323
3324 case LE_LINK:
3325 if (hdev->le_pkts) {
3326 hdev->le_cnt += count;
3327 if (hdev->le_cnt > hdev->le_pkts)
3328 hdev->le_cnt = hdev->le_pkts;
3329 } else {
70f23020
AE
3330 hdev->acl_cnt += count;
3331 if (hdev->acl_cnt > hdev->acl_pkts)
a9de9248 3332 hdev->acl_cnt = hdev->acl_pkts;
a9de9248 3333 }
f4280918
AE
3334 break;
3335
3336 case SCO_LINK:
3337 hdev->sco_cnt += count;
3338 if (hdev->sco_cnt > hdev->sco_pkts)
3339 hdev->sco_cnt = hdev->sco_pkts;
3340 break;
3341
3342 default:
3343 BT_ERR("Unknown type %d conn %p", conn->type, conn);
3344 break;
a9de9248
MH
3345 }
3346 }
3347
3eff45ea 3348 queue_work(hdev->workqueue, &hdev->tx_work);
a9de9248
MH
3349}
3350
76ef7cf7
AE
3351static struct hci_conn *__hci_conn_lookup_handle(struct hci_dev *hdev,
3352 __u16 handle)
3353{
3354 struct hci_chan *chan;
3355
3356 switch (hdev->dev_type) {
3357 case HCI_BREDR:
3358 return hci_conn_hash_lookup_handle(hdev, handle);
3359 case HCI_AMP:
3360 chan = hci_chan_lookup_handle(hdev, handle);
3361 if (chan)
3362 return chan->conn;
3363 break;
3364 default:
3365 BT_ERR("%s unknown dev_type %d", hdev->name, hdev->dev_type);
3366 break;
3367 }
3368
3369 return NULL;
3370}
3371
6039aa73 3372static void hci_num_comp_blocks_evt(struct hci_dev *hdev, struct sk_buff *skb)
25e89e99
AE
3373{
3374 struct hci_ev_num_comp_blocks *ev = (void *) skb->data;
3375 int i;
3376
3377 if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_BLOCK_BASED) {
3378 BT_ERR("Wrong event for mode %d", hdev->flow_ctl_mode);
3379 return;
3380 }
3381
3382 if (skb->len < sizeof(*ev) || skb->len < sizeof(*ev) +
807deac2 3383 ev->num_hndl * sizeof(struct hci_comp_blocks_info)) {
25e89e99
AE
3384 BT_DBG("%s bad parameters", hdev->name);
3385 return;
3386 }
3387
3388 BT_DBG("%s num_blocks %d num_hndl %d", hdev->name, ev->num_blocks,
807deac2 3389 ev->num_hndl);
25e89e99
AE
3390
3391 for (i = 0; i < ev->num_hndl; i++) {
3392 struct hci_comp_blocks_info *info = &ev->handles[i];
76ef7cf7 3393 struct hci_conn *conn = NULL;
25e89e99
AE
3394 __u16 handle, block_count;
3395
3396 handle = __le16_to_cpu(info->handle);
3397 block_count = __le16_to_cpu(info->blocks);
3398
76ef7cf7 3399 conn = __hci_conn_lookup_handle(hdev, handle);
25e89e99
AE
3400 if (!conn)
3401 continue;
3402
3403 conn->sent -= block_count;
3404
3405 switch (conn->type) {
3406 case ACL_LINK:
bd1eb66b 3407 case AMP_LINK:
25e89e99
AE
3408 hdev->block_cnt += block_count;
3409 if (hdev->block_cnt > hdev->num_blocks)
3410 hdev->block_cnt = hdev->num_blocks;
3411 break;
3412
3413 default:
3414 BT_ERR("Unknown type %d conn %p", conn->type, conn);
3415 break;
3416 }
3417 }
3418
3419 queue_work(hdev->workqueue, &hdev->tx_work);
3420}
3421
6039aa73 3422static void hci_mode_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
04837f64 3423{
a9de9248 3424 struct hci_ev_mode_change *ev = (void *) skb->data;
04837f64
MH
3425 struct hci_conn *conn;
3426
9f1db00c 3427 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
04837f64
MH
3428
3429 hci_dev_lock(hdev);
3430
3431 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
a9de9248
MH
3432 if (conn) {
3433 conn->mode = ev->mode;
a9de9248 3434
8fc9ced3
GP
3435 if (!test_and_clear_bit(HCI_CONN_MODE_CHANGE_PEND,
3436 &conn->flags)) {
a9de9248 3437 if (conn->mode == HCI_CM_ACTIVE)
58a681ef 3438 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
a9de9248 3439 else
58a681ef 3440 clear_bit(HCI_CONN_POWER_SAVE, &conn->flags);
a9de9248 3441 }
e73439d8 3442
51a8efd7 3443 if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
e73439d8 3444 hci_sco_setup(conn, ev->status);
04837f64
MH
3445 }
3446
3447 hci_dev_unlock(hdev);
3448}
3449
6039aa73 3450static void hci_pin_code_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3451{
052b30b0
MH
3452 struct hci_ev_pin_code_req *ev = (void *) skb->data;
3453 struct hci_conn *conn;
3454
a9de9248 3455 BT_DBG("%s", hdev->name);
052b30b0
MH
3456
3457 hci_dev_lock(hdev);
3458
3459 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
b6f98044
WR
3460 if (!conn)
3461 goto unlock;
3462
3463 if (conn->state == BT_CONNECTED) {
052b30b0
MH
3464 hci_conn_hold(conn);
3465 conn->disc_timeout = HCI_PAIRING_TIMEOUT;
76a68ba0 3466 hci_conn_drop(conn);
052b30b0
MH
3467 }
3468
d7a5a11d 3469 if (!hci_dev_test_flag(hdev, HCI_BONDABLE) &&
2f407f0a 3470 !test_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags)) {
03b555e1 3471 hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
807deac2 3472 sizeof(ev->bdaddr), &ev->bdaddr);
d7a5a11d 3473 } else if (hci_dev_test_flag(hdev, HCI_MGMT)) {
a770bb5a
WR
3474 u8 secure;
3475
3476 if (conn->pending_sec_level == BT_SECURITY_HIGH)
3477 secure = 1;
3478 else
3479 secure = 0;
3480
744cf19e 3481 mgmt_pin_code_request(hdev, &ev->bdaddr, secure);
a770bb5a 3482 }
980e1a53 3483
b6f98044 3484unlock:
052b30b0 3485 hci_dev_unlock(hdev);
a9de9248
MH
3486}
3487
cb6f3f7a
JH
3488static void conn_set_key(struct hci_conn *conn, u8 key_type, u8 pin_len)
3489{
3490 if (key_type == HCI_LK_CHANGED_COMBINATION)
3491 return;
3492
3493 conn->pin_length = pin_len;
3494 conn->key_type = key_type;
3495
3496 switch (key_type) {
3497 case HCI_LK_LOCAL_UNIT:
3498 case HCI_LK_REMOTE_UNIT:
3499 case HCI_LK_DEBUG_COMBINATION:
3500 return;
3501 case HCI_LK_COMBINATION:
3502 if (pin_len == 16)
3503 conn->pending_sec_level = BT_SECURITY_HIGH;
3504 else
3505 conn->pending_sec_level = BT_SECURITY_MEDIUM;
3506 break;
3507 case HCI_LK_UNAUTH_COMBINATION_P192:
3508 case HCI_LK_UNAUTH_COMBINATION_P256:
3509 conn->pending_sec_level = BT_SECURITY_MEDIUM;
3510 break;
3511 case HCI_LK_AUTH_COMBINATION_P192:
3512 conn->pending_sec_level = BT_SECURITY_HIGH;
3513 break;
3514 case HCI_LK_AUTH_COMBINATION_P256:
3515 conn->pending_sec_level = BT_SECURITY_FIPS;
3516 break;
3517 }
3518}
3519
6039aa73 3520static void hci_link_key_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3521{
55ed8ca1
JH
3522 struct hci_ev_link_key_req *ev = (void *) skb->data;
3523 struct hci_cp_link_key_reply cp;
3524 struct hci_conn *conn;
3525 struct link_key *key;
3526
a9de9248 3527 BT_DBG("%s", hdev->name);
55ed8ca1 3528
d7a5a11d 3529 if (!hci_dev_test_flag(hdev, HCI_MGMT))
55ed8ca1
JH
3530 return;
3531
3532 hci_dev_lock(hdev);
3533
3534 key = hci_find_link_key(hdev, &ev->bdaddr);
3535 if (!key) {
6ed93dc6
AE
3536 BT_DBG("%s link key not found for %pMR", hdev->name,
3537 &ev->bdaddr);
55ed8ca1
JH
3538 goto not_found;
3539 }
3540
6ed93dc6
AE
3541 BT_DBG("%s found key type %u for %pMR", hdev->name, key->type,
3542 &ev->bdaddr);
55ed8ca1 3543
55ed8ca1 3544 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
60b83f57 3545 if (conn) {
fe8bc5ac
JH
3546 clear_bit(HCI_CONN_NEW_LINK_KEY, &conn->flags);
3547
66138ce8
MH
3548 if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 ||
3549 key->type == HCI_LK_UNAUTH_COMBINATION_P256) &&
807deac2 3550 conn->auth_type != 0xff && (conn->auth_type & 0x01)) {
60b83f57
WR
3551 BT_DBG("%s ignoring unauthenticated key", hdev->name);
3552 goto not_found;
3553 }
55ed8ca1 3554
60b83f57 3555 if (key->type == HCI_LK_COMBINATION && key->pin_len < 16 &&
f3fb0b58
JH
3556 (conn->pending_sec_level == BT_SECURITY_HIGH ||
3557 conn->pending_sec_level == BT_SECURITY_FIPS)) {
8fc9ced3
GP
3558 BT_DBG("%s ignoring key unauthenticated for high security",
3559 hdev->name);
60b83f57
WR
3560 goto not_found;
3561 }
3562
cb6f3f7a 3563 conn_set_key(conn, key->type, key->pin_len);
55ed8ca1
JH
3564 }
3565
3566 bacpy(&cp.bdaddr, &ev->bdaddr);
9b3b4460 3567 memcpy(cp.link_key, key->val, HCI_LINK_KEY_SIZE);
55ed8ca1
JH
3568
3569 hci_send_cmd(hdev, HCI_OP_LINK_KEY_REPLY, sizeof(cp), &cp);
3570
3571 hci_dev_unlock(hdev);
3572
3573 return;
3574
3575not_found:
3576 hci_send_cmd(hdev, HCI_OP_LINK_KEY_NEG_REPLY, 6, &ev->bdaddr);
3577 hci_dev_unlock(hdev);
a9de9248
MH
3578}
3579
6039aa73 3580static void hci_link_key_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
a9de9248 3581{
052b30b0
MH
3582 struct hci_ev_link_key_notify *ev = (void *) skb->data;
3583 struct hci_conn *conn;
7652ff6a
JH
3584 struct link_key *key;
3585 bool persistent;
55ed8ca1 3586 u8 pin_len = 0;
052b30b0 3587
a9de9248 3588 BT_DBG("%s", hdev->name);
052b30b0
MH
3589
3590 hci_dev_lock(hdev);
3591
3592 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
82c13d42
JH
3593 if (!conn)
3594 goto unlock;
3595
3596 hci_conn_hold(conn);
3597 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
3598 hci_conn_drop(conn);
3599
fe8bc5ac 3600 set_bit(HCI_CONN_NEW_LINK_KEY, &conn->flags);
82c13d42 3601 conn_set_key(conn, ev->key_type, conn->pin_length);
052b30b0 3602
d7a5a11d 3603 if (!hci_dev_test_flag(hdev, HCI_MGMT))
7652ff6a
JH
3604 goto unlock;
3605
3606 key = hci_add_link_key(hdev, conn, &ev->bdaddr, ev->link_key,
3607 ev->key_type, pin_len, &persistent);
3608 if (!key)
3609 goto unlock;
3610
cb6f3f7a
JH
3611 /* Update connection information since adding the key will have
3612 * fixed up the type in the case of changed combination keys.
3613 */
3614 if (ev->key_type == HCI_LK_CHANGED_COMBINATION)
3615 conn_set_key(conn, key->type, key->pin_len);
3616
7652ff6a 3617 mgmt_new_link_key(hdev, key, persistent);
55ed8ca1 3618
6d5650c4
JH
3619 /* Keep debug keys around only if the HCI_KEEP_DEBUG_KEYS flag
3620 * is set. If it's not set simply remove the key from the kernel
3621 * list (we've still notified user space about it but with
3622 * store_hint being 0).
3623 */
3624 if (key->type == HCI_LK_DEBUG_COMBINATION &&
d7a5a11d 3625 !hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS)) {
0378b597
JH
3626 list_del_rcu(&key->list);
3627 kfree_rcu(key, rcu);
82c13d42 3628 goto unlock;
6d5650c4 3629 }
7652ff6a 3630
82c13d42
JH
3631 if (persistent)
3632 clear_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
3633 else
3634 set_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
3635
7652ff6a 3636unlock:
052b30b0 3637 hci_dev_unlock(hdev);
a9de9248
MH
3638}
3639
6039aa73 3640static void hci_clock_offset_evt(struct hci_dev *hdev, struct sk_buff *skb)
1da177e4 3641{
a9de9248 3642 struct hci_ev_clock_offset *ev = (void *) skb->data;
04837f64 3643 struct hci_conn *conn;
1da177e4 3644
9f1db00c 3645 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
1da177e4
LT
3646
3647 hci_dev_lock(hdev);
3648
04837f64 3649 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
1da177e4
LT
3650 if (conn && !ev->status) {
3651 struct inquiry_entry *ie;
3652
cc11b9c1
AE
3653 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
3654 if (ie) {
1da177e4
LT
3655 ie->data.clock_offset = ev->clock_offset;
3656 ie->timestamp = jiffies;
3657 }
3658 }
3659
3660 hci_dev_unlock(hdev);
3661}
3662
6039aa73 3663static void hci_pkt_type_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
a8746417
MH
3664{
3665 struct hci_ev_pkt_type_change *ev = (void *) skb->data;
3666 struct hci_conn *conn;
3667
9f1db00c 3668 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
a8746417
MH
3669
3670 hci_dev_lock(hdev);
3671
3672 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
3673 if (conn && !ev->status)
3674 conn->pkt_type = __le16_to_cpu(ev->pkt_type);
3675
3676 hci_dev_unlock(hdev);
3677}
3678
6039aa73 3679static void hci_pscan_rep_mode_evt(struct hci_dev *hdev, struct sk_buff *skb)
85a1e930 3680{
a9de9248 3681 struct hci_ev_pscan_rep_mode *ev = (void *) skb->data;
85a1e930
MH
3682 struct inquiry_entry *ie;
3683
3684 BT_DBG("%s", hdev->name);
3685
3686 hci_dev_lock(hdev);
3687
cc11b9c1
AE
3688 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
3689 if (ie) {
85a1e930
MH
3690 ie->data.pscan_rep_mode = ev->pscan_rep_mode;
3691 ie->timestamp = jiffies;
3692 }
3693
3694 hci_dev_unlock(hdev);
3695}
3696
6039aa73
GP
3697static void hci_inquiry_result_with_rssi_evt(struct hci_dev *hdev,
3698 struct sk_buff *skb)
a9de9248
MH
3699{
3700 struct inquiry_data data;
3701 int num_rsp = *((__u8 *) skb->data);
3702
3703 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
3704
3705 if (!num_rsp)
3706 return;
3707
d7a5a11d 3708 if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
1519cc17
AG
3709 return;
3710
a9de9248
MH
3711 hci_dev_lock(hdev);
3712
3713 if ((skb->len - 1) / num_rsp != sizeof(struct inquiry_info_with_rssi)) {
138d22ef
SJ
3714 struct inquiry_info_with_rssi_and_pscan_mode *info;
3715 info = (void *) (skb->data + 1);
a9de9248 3716
e17acd40 3717 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3718 u32 flags;
3719
a9de9248
MH
3720 bacpy(&data.bdaddr, &info->bdaddr);
3721 data.pscan_rep_mode = info->pscan_rep_mode;
3722 data.pscan_period_mode = info->pscan_period_mode;
3723 data.pscan_mode = info->pscan_mode;
3724 memcpy(data.dev_class, info->dev_class, 3);
3725 data.clock_offset = info->clock_offset;
3726 data.rssi = info->rssi;
41a96212 3727 data.ssp_mode = 0x00;
3175405b 3728
af58925c
MH
3729 flags = hci_inquiry_cache_update(hdev, &data, false);
3730
48264f06 3731 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
04124681 3732 info->dev_class, info->rssi,
af58925c 3733 flags, NULL, 0, NULL, 0);
a9de9248
MH
3734 }
3735 } else {
3736 struct inquiry_info_with_rssi *info = (void *) (skb->data + 1);
3737
e17acd40 3738 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3739 u32 flags;
3740
a9de9248
MH
3741 bacpy(&data.bdaddr, &info->bdaddr);
3742 data.pscan_rep_mode = info->pscan_rep_mode;
3743 data.pscan_period_mode = info->pscan_period_mode;
3744 data.pscan_mode = 0x00;
3745 memcpy(data.dev_class, info->dev_class, 3);
3746 data.clock_offset = info->clock_offset;
3747 data.rssi = info->rssi;
41a96212 3748 data.ssp_mode = 0x00;
af58925c
MH
3749
3750 flags = hci_inquiry_cache_update(hdev, &data, false);
3751
48264f06 3752 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
04124681 3753 info->dev_class, info->rssi,
af58925c 3754 flags, NULL, 0, NULL, 0);
a9de9248
MH
3755 }
3756 }
3757
3758 hci_dev_unlock(hdev);
3759}
3760
6039aa73
GP
3761static void hci_remote_ext_features_evt(struct hci_dev *hdev,
3762 struct sk_buff *skb)
a9de9248 3763{
41a96212
MH
3764 struct hci_ev_remote_ext_features *ev = (void *) skb->data;
3765 struct hci_conn *conn;
3766
a9de9248 3767 BT_DBG("%s", hdev->name);
41a96212 3768
41a96212
MH
3769 hci_dev_lock(hdev);
3770
3771 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
ccd556fe
JH
3772 if (!conn)
3773 goto unlock;
41a96212 3774
cad718ed
JH
3775 if (ev->page < HCI_MAX_PAGES)
3776 memcpy(conn->features[ev->page], ev->features, 8);
3777
ccd556fe
JH
3778 if (!ev->status && ev->page == 0x01) {
3779 struct inquiry_entry *ie;
41a96212 3780
cc11b9c1
AE
3781 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
3782 if (ie)
02b7cc62 3783 ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
769be974 3784
bbb0eada 3785 if (ev->features[0] & LMP_HOST_SSP) {
58a681ef 3786 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
bbb0eada
JK
3787 } else {
3788 /* It is mandatory by the Bluetooth specification that
3789 * Extended Inquiry Results are only used when Secure
3790 * Simple Pairing is enabled, but some devices violate
3791 * this.
3792 *
3793 * To make these devices work, the internal SSP
3794 * enabled flag needs to be cleared if the remote host
3795 * features do not indicate SSP support */
3796 clear_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
3797 }
eb9a8f3f
MH
3798
3799 if (ev->features[0] & LMP_HOST_SC)
3800 set_bit(HCI_CONN_SC_ENABLED, &conn->flags);
ccd556fe
JH
3801 }
3802
3803 if (conn->state != BT_CONFIG)
3804 goto unlock;
3805
671267bf 3806 if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
127178d2
JH
3807 struct hci_cp_remote_name_req cp;
3808 memset(&cp, 0, sizeof(cp));
3809 bacpy(&cp.bdaddr, &conn->dst);
3810 cp.pscan_rep_mode = 0x02;
3811 hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
b644ba33 3812 } else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
48ec92fa 3813 mgmt_device_connected(hdev, conn, 0, NULL, 0);
392599b9 3814
127178d2 3815 if (!hci_outgoing_auth_needed(hdev, conn)) {
ccd556fe 3816 conn->state = BT_CONNECTED;
539c496d 3817 hci_connect_cfm(conn, ev->status);
76a68ba0 3818 hci_conn_drop(conn);
41a96212
MH
3819 }
3820
ccd556fe 3821unlock:
41a96212 3822 hci_dev_unlock(hdev);
a9de9248
MH
3823}
3824
6039aa73
GP
3825static void hci_sync_conn_complete_evt(struct hci_dev *hdev,
3826 struct sk_buff *skb)
a9de9248 3827{
b6a0dc82
MH
3828 struct hci_ev_sync_conn_complete *ev = (void *) skb->data;
3829 struct hci_conn *conn;
3830
9f1db00c 3831 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
b6a0dc82
MH
3832
3833 hci_dev_lock(hdev);
3834
3835 conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
9dc0a3af
MH
3836 if (!conn) {
3837 if (ev->link_type == ESCO_LINK)
3838 goto unlock;
3839
3840 conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr);
3841 if (!conn)
3842 goto unlock;
3843
3844 conn->type = SCO_LINK;
3845 }
b6a0dc82 3846
732547f9
MH
3847 switch (ev->status) {
3848 case 0x00:
b6a0dc82
MH
3849 conn->handle = __le16_to_cpu(ev->handle);
3850 conn->state = BT_CONNECTED;
7d0db0a3 3851
23b9ceb7 3852 hci_debugfs_create_conn(conn);
7d0db0a3 3853 hci_conn_add_sysfs(conn);
732547f9
MH
3854 break;
3855
81218d20 3856 case 0x10: /* Connection Accept Timeout */
1a4c958c 3857 case 0x0d: /* Connection Rejected due to Limited Resources */
705e5711 3858 case 0x11: /* Unsupported Feature or Parameter Value */
732547f9 3859 case 0x1c: /* SCO interval rejected */
1038a00b 3860 case 0x1a: /* Unsupported Remote Feature */
732547f9 3861 case 0x1f: /* Unspecified error */
27539bc4 3862 case 0x20: /* Unsupported LMP Parameter value */
2dea632f 3863 if (conn->out) {
732547f9
MH
3864 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
3865 (hdev->esco_type & EDR_ESCO_MASK);
2dea632f
FD
3866 if (hci_setup_sync(conn, conn->link->handle))
3867 goto unlock;
732547f9
MH
3868 }
3869 /* fall through */
3870
3871 default:
b6a0dc82 3872 conn->state = BT_CLOSED;
732547f9
MH
3873 break;
3874 }
b6a0dc82 3875
539c496d 3876 hci_connect_cfm(conn, ev->status);
b6a0dc82
MH
3877 if (ev->status)
3878 hci_conn_del(conn);
3879
3880unlock:
3881 hci_dev_unlock(hdev);
a9de9248
MH
3882}
3883
efdcf8e3
MH
3884static inline size_t eir_get_length(u8 *eir, size_t eir_len)
3885{
3886 size_t parsed = 0;
3887
3888 while (parsed < eir_len) {
3889 u8 field_len = eir[0];
3890
3891 if (field_len == 0)
3892 return parsed;
3893
3894 parsed += field_len + 1;
3895 eir += field_len + 1;
3896 }
3897
3898 return eir_len;
3899}
3900
6039aa73
GP
3901static void hci_extended_inquiry_result_evt(struct hci_dev *hdev,
3902 struct sk_buff *skb)
1da177e4 3903{
a9de9248
MH
3904 struct inquiry_data data;
3905 struct extended_inquiry_info *info = (void *) (skb->data + 1);
3906 int num_rsp = *((__u8 *) skb->data);
9d939d94 3907 size_t eir_len;
1da177e4 3908
a9de9248 3909 BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
1da177e4 3910
a9de9248
MH
3911 if (!num_rsp)
3912 return;
1da177e4 3913
d7a5a11d 3914 if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
1519cc17
AG
3915 return;
3916
a9de9248
MH
3917 hci_dev_lock(hdev);
3918
e17acd40 3919 for (; num_rsp; num_rsp--, info++) {
af58925c
MH
3920 u32 flags;
3921 bool name_known;
561aafbc 3922
a9de9248 3923 bacpy(&data.bdaddr, &info->bdaddr);
138d22ef
SJ
3924 data.pscan_rep_mode = info->pscan_rep_mode;
3925 data.pscan_period_mode = info->pscan_period_mode;
3926 data.pscan_mode = 0x00;
a9de9248 3927 memcpy(data.dev_class, info->dev_class, 3);
138d22ef
SJ
3928 data.clock_offset = info->clock_offset;
3929 data.rssi = info->rssi;
41a96212 3930 data.ssp_mode = 0x01;
561aafbc 3931
d7a5a11d 3932 if (hci_dev_test_flag(hdev, HCI_MGMT))
4ddb1930 3933 name_known = eir_has_data_type(info->data,
04124681
GP
3934 sizeof(info->data),
3935 EIR_NAME_COMPLETE);
561aafbc
JH
3936 else
3937 name_known = true;
3938
af58925c
MH
3939 flags = hci_inquiry_cache_update(hdev, &data, name_known);
3940
9d939d94 3941 eir_len = eir_get_length(info->data, sizeof(info->data));
af58925c 3942
48264f06 3943 mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
af58925c
MH
3944 info->dev_class, info->rssi,
3945 flags, info->data, eir_len, NULL, 0);
a9de9248
MH
3946 }
3947
3948 hci_dev_unlock(hdev);
3949}
1da177e4 3950
1c2e0041
JH
3951static void hci_key_refresh_complete_evt(struct hci_dev *hdev,
3952 struct sk_buff *skb)
3953{
3954 struct hci_ev_key_refresh_complete *ev = (void *) skb->data;
3955 struct hci_conn *conn;
3956
9f1db00c 3957 BT_DBG("%s status 0x%2.2x handle 0x%4.4x", hdev->name, ev->status,
1c2e0041
JH
3958 __le16_to_cpu(ev->handle));
3959
3960 hci_dev_lock(hdev);
3961
3962 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
3963 if (!conn)
3964 goto unlock;
3965
9eb1fbfa
JH
3966 /* For BR/EDR the necessary steps are taken through the
3967 * auth_complete event.
3968 */
3969 if (conn->type != LE_LINK)
3970 goto unlock;
3971
1c2e0041
JH
3972 if (!ev->status)
3973 conn->sec_level = conn->pending_sec_level;
3974
3975 clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
3976
3977 if (ev->status && conn->state == BT_CONNECTED) {
bed71748 3978 hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
76a68ba0 3979 hci_conn_drop(conn);
1c2e0041
JH
3980 goto unlock;
3981 }
3982
3983 if (conn->state == BT_CONFIG) {
3984 if (!ev->status)
3985 conn->state = BT_CONNECTED;
3986
539c496d 3987 hci_connect_cfm(conn, ev->status);
76a68ba0 3988 hci_conn_drop(conn);
1c2e0041
JH
3989 } else {
3990 hci_auth_cfm(conn, ev->status);
3991
3992 hci_conn_hold(conn);
3993 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 3994 hci_conn_drop(conn);
1c2e0041
JH
3995 }
3996
3997unlock:
3998 hci_dev_unlock(hdev);
3999}
4000
6039aa73 4001static u8 hci_get_auth_req(struct hci_conn *conn)
17fa4b9d 4002{
17fa4b9d 4003 /* If remote requests no-bonding follow that lead */
acabae96
MA
4004 if (conn->remote_auth == HCI_AT_NO_BONDING ||
4005 conn->remote_auth == HCI_AT_NO_BONDING_MITM)
58797bf7 4006 return conn->remote_auth | (conn->auth_type & 0x01);
17fa4b9d 4007
b7f94c88
MA
4008 /* If both remote and local have enough IO capabilities, require
4009 * MITM protection
4010 */
4011 if (conn->remote_cap != HCI_IO_NO_INPUT_OUTPUT &&
4012 conn->io_capability != HCI_IO_NO_INPUT_OUTPUT)
4013 return conn->remote_auth | 0x01;
4014
7e74170a
TM
4015 /* No MITM protection possible so ignore remote requirement */
4016 return (conn->remote_auth & ~0x01) | (conn->auth_type & 0x01);
17fa4b9d
JH
4017}
4018
a83ed81e
MH
4019static u8 bredr_oob_data_present(struct hci_conn *conn)
4020{
4021 struct hci_dev *hdev = conn->hdev;
4022 struct oob_data *data;
4023
4024 data = hci_find_remote_oob_data(hdev, &conn->dst, BDADDR_BREDR);
4025 if (!data)
4026 return 0x00;
4027
455c2ff0
MH
4028 if (bredr_sc_enabled(hdev)) {
4029 /* When Secure Connections is enabled, then just
4030 * return the present value stored with the OOB
4031 * data. The stored value contains the right present
4032 * information. However it can only be trusted when
4033 * not in Secure Connection Only mode.
4034 */
4035 if (!hci_dev_test_flag(hdev, HCI_SC_ONLY))
4036 return data->present;
659c7fb0 4037
455c2ff0
MH
4038 /* When Secure Connections Only mode is enabled, then
4039 * the P-256 values are required. If they are not
4040 * available, then do not declare that OOB data is
4041 * present.
659c7fb0 4042 */
455c2ff0
MH
4043 if (!memcmp(data->rand256, ZERO_KEY, 16) ||
4044 !memcmp(data->hash256, ZERO_KEY, 16))
659c7fb0
MH
4045 return 0x00;
4046
455c2ff0 4047 return 0x02;
659c7fb0 4048 }
a83ed81e 4049
455c2ff0
MH
4050 /* When Secure Connections is not enabled or actually
4051 * not supported by the hardware, then check that if
4052 * P-192 data values are present.
4053 */
4054 if (!memcmp(data->rand192, ZERO_KEY, 16) ||
4055 !memcmp(data->hash192, ZERO_KEY, 16))
4056 return 0x00;
4057
4058 return 0x01;
a83ed81e
MH
4059}
4060
6039aa73 4061static void hci_io_capa_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
0493684e
MH
4062{
4063 struct hci_ev_io_capa_request *ev = (void *) skb->data;
4064 struct hci_conn *conn;
4065
4066 BT_DBG("%s", hdev->name);
4067
4068 hci_dev_lock(hdev);
4069
4070 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
03b555e1
JH
4071 if (!conn)
4072 goto unlock;
4073
4074 hci_conn_hold(conn);
4075
d7a5a11d 4076 if (!hci_dev_test_flag(hdev, HCI_MGMT))
03b555e1
JH
4077 goto unlock;
4078
2f407f0a
JH
4079 /* Allow pairing if we're pairable, the initiators of the
4080 * pairing or if the remote is not requesting bonding.
4081 */
d7a5a11d 4082 if (hci_dev_test_flag(hdev, HCI_BONDABLE) ||
2f407f0a 4083 test_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags) ||
807deac2 4084 (conn->remote_auth & ~0x01) == HCI_AT_NO_BONDING) {
17fa4b9d
JH
4085 struct hci_cp_io_capability_reply cp;
4086
4087 bacpy(&cp.bdaddr, &ev->bdaddr);
7a7f1e7c
HG
4088 /* Change the IO capability from KeyboardDisplay
4089 * to DisplayYesNo as it is not supported by BT spec. */
4090 cp.capability = (conn->io_capability == 0x04) ?
a767631a 4091 HCI_IO_DISPLAY_YESNO : conn->io_capability;
b7f94c88
MA
4092
4093 /* If we are initiators, there is no remote information yet */
4094 if (conn->remote_auth == 0xff) {
b16c6604 4095 /* Request MITM protection if our IO caps allow it
4ad51a75 4096 * except for the no-bonding case.
b16c6604 4097 */
6fd6b915 4098 if (conn->io_capability != HCI_IO_NO_INPUT_OUTPUT &&
9f743d74 4099 conn->auth_type != HCI_AT_NO_BONDING)
6c53823a 4100 conn->auth_type |= 0x01;
b7f94c88
MA
4101 } else {
4102 conn->auth_type = hci_get_auth_req(conn);
b7f94c88 4103 }
17fa4b9d 4104
82c295b1
JH
4105 /* If we're not bondable, force one of the non-bondable
4106 * authentication requirement values.
4107 */
d7a5a11d 4108 if (!hci_dev_test_flag(hdev, HCI_BONDABLE))
82c295b1
JH
4109 conn->auth_type &= HCI_AT_NO_BONDING_MITM;
4110
4111 cp.authentication = conn->auth_type;
a83ed81e 4112 cp.oob_data = bredr_oob_data_present(conn);
ce85ee13 4113
17fa4b9d 4114 hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_REPLY,
807deac2 4115 sizeof(cp), &cp);
03b555e1
JH
4116 } else {
4117 struct hci_cp_io_capability_neg_reply cp;
4118
4119 bacpy(&cp.bdaddr, &ev->bdaddr);
9f5a0d7b 4120 cp.reason = HCI_ERROR_PAIRING_NOT_ALLOWED;
0493684e 4121
03b555e1 4122 hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_NEG_REPLY,
807deac2 4123 sizeof(cp), &cp);
03b555e1
JH
4124 }
4125
4126unlock:
4127 hci_dev_unlock(hdev);
4128}
4129
6039aa73 4130static void hci_io_capa_reply_evt(struct hci_dev *hdev, struct sk_buff *skb)
03b555e1
JH
4131{
4132 struct hci_ev_io_capa_reply *ev = (void *) skb->data;
4133 struct hci_conn *conn;
4134
4135 BT_DBG("%s", hdev->name);
4136
4137 hci_dev_lock(hdev);
4138
4139 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
4140 if (!conn)
4141 goto unlock;
4142
03b555e1 4143 conn->remote_cap = ev->capability;
03b555e1
JH
4144 conn->remote_auth = ev->authentication;
4145
4146unlock:
0493684e
MH
4147 hci_dev_unlock(hdev);
4148}
4149
6039aa73
GP
4150static void hci_user_confirm_request_evt(struct hci_dev *hdev,
4151 struct sk_buff *skb)
a5c29683
JH
4152{
4153 struct hci_ev_user_confirm_req *ev = (void *) skb->data;
55bc1a37 4154 int loc_mitm, rem_mitm, confirm_hint = 0;
7a828908 4155 struct hci_conn *conn;
a5c29683
JH
4156
4157 BT_DBG("%s", hdev->name);
4158
4159 hci_dev_lock(hdev);
4160
d7a5a11d 4161 if (!hci_dev_test_flag(hdev, HCI_MGMT))
7a828908 4162 goto unlock;
a5c29683 4163
7a828908
JH
4164 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
4165 if (!conn)
4166 goto unlock;
4167
4168 loc_mitm = (conn->auth_type & 0x01);
4169 rem_mitm = (conn->remote_auth & 0x01);
4170
4171 /* If we require MITM but the remote device can't provide that
6c53823a
JH
4172 * (it has NoInputNoOutput) then reject the confirmation
4173 * request. We check the security level here since it doesn't
4174 * necessarily match conn->auth_type.
6fd6b915 4175 */
6c53823a
JH
4176 if (conn->pending_sec_level > BT_SECURITY_MEDIUM &&
4177 conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) {
7a828908
JH
4178 BT_DBG("Rejecting request: remote device can't provide MITM");
4179 hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_NEG_REPLY,
807deac2 4180 sizeof(ev->bdaddr), &ev->bdaddr);
7a828908
JH
4181 goto unlock;
4182 }
4183
4184 /* If no side requires MITM protection; auto-accept */
a767631a
MA
4185 if ((!loc_mitm || conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) &&
4186 (!rem_mitm || conn->io_capability == HCI_IO_NO_INPUT_OUTPUT)) {
55bc1a37
JH
4187
4188 /* If we're not the initiators request authorization to
4189 * proceed from user space (mgmt_user_confirm with
ba15a58b 4190 * confirm_hint set to 1). The exception is if neither
02f3e254
JH
4191 * side had MITM or if the local IO capability is
4192 * NoInputNoOutput, in which case we do auto-accept
ba15a58b
JH
4193 */
4194 if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) &&
02f3e254 4195 conn->io_capability != HCI_IO_NO_INPUT_OUTPUT &&
ba15a58b 4196 (loc_mitm || rem_mitm)) {
55bc1a37
JH
4197 BT_DBG("Confirming auto-accept as acceptor");
4198 confirm_hint = 1;
4199 goto confirm;
4200 }
4201
9f61656a 4202 BT_DBG("Auto-accept of user confirmation with %ums delay",
807deac2 4203 hdev->auto_accept_delay);
9f61656a
JH
4204
4205 if (hdev->auto_accept_delay > 0) {
4206 int delay = msecs_to_jiffies(hdev->auto_accept_delay);
7bc18d9d
JH
4207 queue_delayed_work(conn->hdev->workqueue,
4208 &conn->auto_accept_work, delay);
9f61656a
JH
4209 goto unlock;
4210 }
4211
7a828908 4212 hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_REPLY,
807deac2 4213 sizeof(ev->bdaddr), &ev->bdaddr);
7a828908
JH
4214 goto unlock;
4215 }
4216
55bc1a37 4217confirm:
39adbffe
JH
4218 mgmt_user_confirm_request(hdev, &ev->bdaddr, ACL_LINK, 0,
4219 le32_to_cpu(ev->passkey), confirm_hint);
7a828908
JH
4220
4221unlock:
a5c29683
JH
4222 hci_dev_unlock(hdev);
4223}
4224
6039aa73
GP
4225static void hci_user_passkey_request_evt(struct hci_dev *hdev,
4226 struct sk_buff *skb)
1143d458
BG
4227{
4228 struct hci_ev_user_passkey_req *ev = (void *) skb->data;
4229
4230 BT_DBG("%s", hdev->name);
4231
d7a5a11d 4232 if (hci_dev_test_flag(hdev, HCI_MGMT))
272d90df 4233 mgmt_user_passkey_request(hdev, &ev->bdaddr, ACL_LINK, 0);
1143d458
BG
4234}
4235
92a25256
JH
4236static void hci_user_passkey_notify_evt(struct hci_dev *hdev,
4237 struct sk_buff *skb)
4238{
4239 struct hci_ev_user_passkey_notify *ev = (void *) skb->data;
4240 struct hci_conn *conn;
4241
4242 BT_DBG("%s", hdev->name);
4243
4244 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
4245 if (!conn)
4246 return;
4247
4248 conn->passkey_notify = __le32_to_cpu(ev->passkey);
4249 conn->passkey_entered = 0;
4250
d7a5a11d 4251 if (hci_dev_test_flag(hdev, HCI_MGMT))
92a25256
JH
4252 mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
4253 conn->dst_type, conn->passkey_notify,
4254 conn->passkey_entered);
4255}
4256
4257static void hci_keypress_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
4258{
4259 struct hci_ev_keypress_notify *ev = (void *) skb->data;
4260 struct hci_conn *conn;
4261
4262 BT_DBG("%s", hdev->name);
4263
4264 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
4265 if (!conn)
4266 return;
4267
4268 switch (ev->type) {
4269 case HCI_KEYPRESS_STARTED:
4270 conn->passkey_entered = 0;
4271 return;
4272
4273 case HCI_KEYPRESS_ENTERED:
4274 conn->passkey_entered++;
4275 break;
4276
4277 case HCI_KEYPRESS_ERASED:
4278 conn->passkey_entered--;
4279 break;
4280
4281 case HCI_KEYPRESS_CLEARED:
4282 conn->passkey_entered = 0;
4283 break;
4284
4285 case HCI_KEYPRESS_COMPLETED:
4286 return;
4287 }
4288
d7a5a11d 4289 if (hci_dev_test_flag(hdev, HCI_MGMT))
92a25256
JH
4290 mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
4291 conn->dst_type, conn->passkey_notify,
4292 conn->passkey_entered);
4293}
4294
6039aa73
GP
4295static void hci_simple_pair_complete_evt(struct hci_dev *hdev,
4296 struct sk_buff *skb)
0493684e
MH
4297{
4298 struct hci_ev_simple_pair_complete *ev = (void *) skb->data;
4299 struct hci_conn *conn;
4300
4301 BT_DBG("%s", hdev->name);
4302
4303 hci_dev_lock(hdev);
4304
4305 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
2a611692
JH
4306 if (!conn)
4307 goto unlock;
4308
c1d4fa7a
JH
4309 /* Reset the authentication requirement to unknown */
4310 conn->remote_auth = 0xff;
4311
2a611692
JH
4312 /* To avoid duplicate auth_failed events to user space we check
4313 * the HCI_CONN_AUTH_PEND flag which will be set if we
4314 * initiated the authentication. A traditional auth_complete
4315 * event gets always produced as initiator and is also mapped to
4316 * the mgmt_auth_failed event */
fa1bd918 4317 if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) && ev->status)
e1e930f5 4318 mgmt_auth_failed(conn, ev->status);
0493684e 4319
76a68ba0 4320 hci_conn_drop(conn);
2a611692
JH
4321
4322unlock:
0493684e
MH
4323 hci_dev_unlock(hdev);
4324}
4325
6039aa73
GP
4326static void hci_remote_host_features_evt(struct hci_dev *hdev,
4327 struct sk_buff *skb)
41a96212
MH
4328{
4329 struct hci_ev_remote_host_features *ev = (void *) skb->data;
4330 struct inquiry_entry *ie;
cad718ed 4331 struct hci_conn *conn;
41a96212
MH
4332
4333 BT_DBG("%s", hdev->name);
4334
4335 hci_dev_lock(hdev);
4336
cad718ed
JH
4337 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
4338 if (conn)
4339 memcpy(conn->features[1], ev->features, 8);
4340
cc11b9c1
AE
4341 ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
4342 if (ie)
02b7cc62 4343 ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
41a96212
MH
4344
4345 hci_dev_unlock(hdev);
4346}
4347
6039aa73
GP
4348static void hci_remote_oob_data_request_evt(struct hci_dev *hdev,
4349 struct sk_buff *skb)
2763eda6
SJ
4350{
4351 struct hci_ev_remote_oob_data_request *ev = (void *) skb->data;
4352 struct oob_data *data;
4353
4354 BT_DBG("%s", hdev->name);
4355
4356 hci_dev_lock(hdev);
4357
d7a5a11d 4358 if (!hci_dev_test_flag(hdev, HCI_MGMT))
e1ba1f15
SJ
4359 goto unlock;
4360
6928a924 4361 data = hci_find_remote_oob_data(hdev, &ev->bdaddr, BDADDR_BREDR);
6665d057
MH
4362 if (!data) {
4363 struct hci_cp_remote_oob_data_neg_reply cp;
519ca9d0 4364
6665d057
MH
4365 bacpy(&cp.bdaddr, &ev->bdaddr);
4366 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_NEG_REPLY,
4367 sizeof(cp), &cp);
4368 goto unlock;
4369 }
2763eda6 4370
6665d057
MH
4371 if (bredr_sc_enabled(hdev)) {
4372 struct hci_cp_remote_oob_ext_data_reply cp;
519ca9d0 4373
6665d057 4374 bacpy(&cp.bdaddr, &ev->bdaddr);
d7a5a11d 4375 if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
6665d057
MH
4376 memset(cp.hash192, 0, sizeof(cp.hash192));
4377 memset(cp.rand192, 0, sizeof(cp.rand192));
4378 } else {
4379 memcpy(cp.hash192, data->hash192, sizeof(cp.hash192));
4380 memcpy(cp.rand192, data->rand192, sizeof(cp.rand192));
519ca9d0 4381 }
6665d057
MH
4382 memcpy(cp.hash256, data->hash256, sizeof(cp.hash256));
4383 memcpy(cp.rand256, data->rand256, sizeof(cp.rand256));
4384
4385 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_EXT_DATA_REPLY,
4386 sizeof(cp), &cp);
2763eda6 4387 } else {
6665d057 4388 struct hci_cp_remote_oob_data_reply cp;
2763eda6
SJ
4389
4390 bacpy(&cp.bdaddr, &ev->bdaddr);
6665d057
MH
4391 memcpy(cp.hash, data->hash192, sizeof(cp.hash));
4392 memcpy(cp.rand, data->rand192, sizeof(cp.rand));
4393
4394 hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_REPLY,
519ca9d0 4395 sizeof(cp), &cp);
2763eda6
SJ
4396 }
4397
e1ba1f15 4398unlock:
2763eda6
SJ
4399 hci_dev_unlock(hdev);
4400}
4401
d5e91192
AE
4402static void hci_phy_link_complete_evt(struct hci_dev *hdev,
4403 struct sk_buff *skb)
4404{
4405 struct hci_ev_phy_link_complete *ev = (void *) skb->data;
4406 struct hci_conn *hcon, *bredr_hcon;
4407
4408 BT_DBG("%s handle 0x%2.2x status 0x%2.2x", hdev->name, ev->phy_handle,
4409 ev->status);
4410
4411 hci_dev_lock(hdev);
4412
4413 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
4414 if (!hcon) {
4415 hci_dev_unlock(hdev);
4416 return;
4417 }
4418
4419 if (ev->status) {
4420 hci_conn_del(hcon);
4421 hci_dev_unlock(hdev);
4422 return;
4423 }
4424
4425 bredr_hcon = hcon->amp_mgr->l2cap_conn->hcon;
4426
4427 hcon->state = BT_CONNECTED;
4428 bacpy(&hcon->dst, &bredr_hcon->dst);
4429
4430 hci_conn_hold(hcon);
4431 hcon->disc_timeout = HCI_DISCONN_TIMEOUT;
76a68ba0 4432 hci_conn_drop(hcon);
d5e91192 4433
23b9ceb7 4434 hci_debugfs_create_conn(hcon);
d5e91192
AE
4435 hci_conn_add_sysfs(hcon);
4436
cf70ff22 4437 amp_physical_cfm(bredr_hcon, hcon);
d5e91192 4438
cf70ff22 4439 hci_dev_unlock(hdev);
d5e91192
AE
4440}
4441
27695fb4
AE
4442static void hci_loglink_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
4443{
4444 struct hci_ev_logical_link_complete *ev = (void *) skb->data;
4445 struct hci_conn *hcon;
4446 struct hci_chan *hchan;
4447 struct amp_mgr *mgr;
4448
4449 BT_DBG("%s log_handle 0x%4.4x phy_handle 0x%2.2x status 0x%2.2x",
4450 hdev->name, le16_to_cpu(ev->handle), ev->phy_handle,
4451 ev->status);
4452
4453 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
4454 if (!hcon)
4455 return;
4456
4457 /* Create AMP hchan */
4458 hchan = hci_chan_create(hcon);
4459 if (!hchan)
4460 return;
4461
4462 hchan->handle = le16_to_cpu(ev->handle);
4463
4464 BT_DBG("hcon %p mgr %p hchan %p", hcon, hcon->amp_mgr, hchan);
4465
4466 mgr = hcon->amp_mgr;
4467 if (mgr && mgr->bredr_chan) {
4468 struct l2cap_chan *bredr_chan = mgr->bredr_chan;
4469
4470 l2cap_chan_lock(bredr_chan);
4471
4472 bredr_chan->conn->mtu = hdev->block_mtu;
4473 l2cap_logical_cfm(bredr_chan, hchan, 0);
4474 hci_conn_hold(hcon);
4475
4476 l2cap_chan_unlock(bredr_chan);
4477 }
4478}
4479
606e2a10
AE
4480static void hci_disconn_loglink_complete_evt(struct hci_dev *hdev,
4481 struct sk_buff *skb)
4482{
4483 struct hci_ev_disconn_logical_link_complete *ev = (void *) skb->data;
4484 struct hci_chan *hchan;
4485
4486 BT_DBG("%s log handle 0x%4.4x status 0x%2.2x", hdev->name,
4487 le16_to_cpu(ev->handle), ev->status);
4488
4489 if (ev->status)
4490 return;
4491
4492 hci_dev_lock(hdev);
4493
4494 hchan = hci_chan_lookup_handle(hdev, le16_to_cpu(ev->handle));
4495 if (!hchan)
4496 goto unlock;
4497
4498 amp_destroy_logical_link(hchan, ev->reason);
4499
4500unlock:
4501 hci_dev_unlock(hdev);
4502}
4503
9eef6b3a
AE
4504static void hci_disconn_phylink_complete_evt(struct hci_dev *hdev,
4505 struct sk_buff *skb)
4506{
4507 struct hci_ev_disconn_phy_link_complete *ev = (void *) skb->data;
4508 struct hci_conn *hcon;
4509
4510 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
4511
4512 if (ev->status)
4513 return;
4514
4515 hci_dev_lock(hdev);
4516
4517 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
4518 if (hcon) {
4519 hcon->state = BT_CLOSED;
4520 hci_conn_del(hcon);
4521 }
4522
4523 hci_dev_unlock(hdev);
4524}
4525
6039aa73 4526static void hci_le_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
fcd89c09
VT
4527{
4528 struct hci_ev_le_conn_complete *ev = (void *) skb->data;
912b42ef 4529 struct hci_conn_params *params;
fcd89c09 4530 struct hci_conn *conn;
68d6f6de 4531 struct smp_irk *irk;
837d502e 4532 u8 addr_type;
fcd89c09 4533
9f1db00c 4534 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
fcd89c09
VT
4535
4536 hci_dev_lock(hdev);
4537
fbd96c15
JH
4538 /* All controllers implicitly stop advertising in the event of a
4539 * connection, so ensure that the state bit is cleared.
4540 */
a358dc11 4541 hci_dev_clear_flag(hdev, HCI_LE_ADV);
fbd96c15 4542
b47a09b3 4543 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
b62f328b 4544 if (!conn) {
a5c4e309 4545 conn = hci_conn_add(hdev, LE_LINK, &ev->bdaddr, ev->role);
b62f328b
VT
4546 if (!conn) {
4547 BT_ERR("No memory for new connection");
230fd16a 4548 goto unlock;
b62f328b 4549 }
29b7988a
AG
4550
4551 conn->dst_type = ev->bdaddr_type;
b9b343d2 4552
cb1d68f7
JH
4553 /* If we didn't have a hci_conn object previously
4554 * but we're in master role this must be something
4555 * initiated using a white list. Since white list based
4556 * connections are not "first class citizens" we don't
4557 * have full tracking of them. Therefore, we go ahead
4558 * with a "best effort" approach of determining the
4559 * initiator address based on the HCI_PRIVACY flag.
4560 */
4561 if (conn->out) {
4562 conn->resp_addr_type = ev->bdaddr_type;
4563 bacpy(&conn->resp_addr, &ev->bdaddr);
d7a5a11d 4564 if (hci_dev_test_flag(hdev, HCI_PRIVACY)) {
cb1d68f7
JH
4565 conn->init_addr_type = ADDR_LE_DEV_RANDOM;
4566 bacpy(&conn->init_addr, &hdev->rpa);
4567 } else {
4568 hci_copy_identity_address(hdev,
4569 &conn->init_addr,
4570 &conn->init_addr_type);
4571 }
cb1d68f7 4572 }
9489eca4
JH
4573 } else {
4574 cancel_delayed_work(&conn->le_conn_timeout);
b62f328b 4575 }
fcd89c09 4576
80c24ab8
JH
4577 if (!conn->out) {
4578 /* Set the responder (our side) address type based on
4579 * the advertising address type.
4580 */
4581 conn->resp_addr_type = hdev->adv_addr_type;
4582 if (hdev->adv_addr_type == ADDR_LE_DEV_RANDOM)
4583 bacpy(&conn->resp_addr, &hdev->random_addr);
4584 else
4585 bacpy(&conn->resp_addr, &hdev->bdaddr);
4586
4587 conn->init_addr_type = ev->bdaddr_type;
4588 bacpy(&conn->init_addr, &ev->bdaddr);
a720d735
MH
4589
4590 /* For incoming connections, set the default minimum
4591 * and maximum connection interval. They will be used
4592 * to check if the parameters are in range and if not
4593 * trigger the connection update procedure.
4594 */
4595 conn->le_conn_min_interval = hdev->le_conn_min_interval;
4596 conn->le_conn_max_interval = hdev->le_conn_max_interval;
80c24ab8 4597 }
7be2edbb 4598
edb4b466
MH
4599 /* Lookup the identity address from the stored connection
4600 * address and address type.
4601 *
4602 * When establishing connections to an identity address, the
4603 * connection procedure will store the resolvable random
4604 * address first. Now if it can be converted back into the
4605 * identity address, start using the identity address from
4606 * now on.
4607 */
4608 irk = hci_get_irk(hdev, &conn->dst, conn->dst_type);
68d6f6de
JH
4609 if (irk) {
4610 bacpy(&conn->dst, &irk->bdaddr);
4611 conn->dst_type = irk->addr_type;
4612 }
4613
2d3c2260
JH
4614 if (ev->status) {
4615 hci_le_conn_failed(conn, ev->status);
837d502e
JH
4616 goto unlock;
4617 }
4618
08853f18
JH
4619 if (conn->dst_type == ADDR_LE_DEV_PUBLIC)
4620 addr_type = BDADDR_LE_PUBLIC;
4621 else
4622 addr_type = BDADDR_LE_RANDOM;
4623
2d3c2260
JH
4624 /* Drop the connection if the device is blocked */
4625 if (hci_bdaddr_list_lookup(&hdev->blacklist, &conn->dst, addr_type)) {
4626 hci_conn_drop(conn);
cd17decb
AG
4627 goto unlock;
4628 }
4629
b644ba33 4630 if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
48ec92fa 4631 mgmt_device_connected(hdev, conn, 0, NULL, 0);
83bc71b4 4632
7b5c0d52 4633 conn->sec_level = BT_SECURITY_LOW;
fcd89c09 4634 conn->handle = __le16_to_cpu(ev->handle);
0fe29fd1 4635 conn->state = BT_CONFIG;
fcd89c09 4636
e04fde60
MH
4637 conn->le_conn_interval = le16_to_cpu(ev->interval);
4638 conn->le_conn_latency = le16_to_cpu(ev->latency);
4639 conn->le_supv_timeout = le16_to_cpu(ev->supervision_timeout);
4640
23b9ceb7 4641 hci_debugfs_create_conn(conn);
fcd89c09
VT
4642 hci_conn_add_sysfs(conn);
4643
0fe29fd1
MH
4644 if (!ev->status) {
4645 /* The remote features procedure is defined for master
4646 * role only. So only in case of an initiated connection
4647 * request the remote features.
4648 *
4649 * If the local controller supports slave-initiated features
4650 * exchange, then requesting the remote features in slave
4651 * role is possible. Otherwise just transition into the
4652 * connected state without requesting the remote features.
4653 */
4654 if (conn->out ||
4655 (hdev->le_features[0] & HCI_LE_SLAVE_FEATURES)) {
4656 struct hci_cp_le_read_remote_features cp;
4657
4658 cp.handle = __cpu_to_le16(conn->handle);
4659
4660 hci_send_cmd(hdev, HCI_OP_LE_READ_REMOTE_FEATURES,
4661 sizeof(cp), &cp);
4662
4663 hci_conn_hold(conn);
4664 } else {
4665 conn->state = BT_CONNECTED;
4666 hci_connect_cfm(conn, ev->status);
4667 }
4668 } else {
4669 hci_connect_cfm(conn, ev->status);
4670 }
fcd89c09 4671
5477610f
JH
4672 params = hci_pend_le_action_lookup(&hdev->pend_le_conns, &conn->dst,
4673 conn->dst_type);
f161dd41 4674 if (params) {
95305baa 4675 list_del_init(&params->action);
f161dd41
JH
4676 if (params->conn) {
4677 hci_conn_drop(params->conn);
f8aaf9b6 4678 hci_conn_put(params->conn);
f161dd41
JH
4679 params->conn = NULL;
4680 }
4681 }
a4790dbd 4682
fcd89c09 4683unlock:
223683a5 4684 hci_update_background_scan(hdev);
fcd89c09
VT
4685 hci_dev_unlock(hdev);
4686}
4687
1855d92d
MH
4688static void hci_le_conn_update_complete_evt(struct hci_dev *hdev,
4689 struct sk_buff *skb)
4690{
4691 struct hci_ev_le_conn_update_complete *ev = (void *) skb->data;
4692 struct hci_conn *conn;
4693
4694 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
4695
4696 if (ev->status)
4697 return;
4698
4699 hci_dev_lock(hdev);
4700
4701 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
4702 if (conn) {
4703 conn->le_conn_interval = le16_to_cpu(ev->interval);
4704 conn->le_conn_latency = le16_to_cpu(ev->latency);
4705 conn->le_supv_timeout = le16_to_cpu(ev->supervision_timeout);
4706 }
4707
4708 hci_dev_unlock(hdev);
4709}
4710
a4790dbd 4711/* This function requires the caller holds hdev->lock */
fd45ada9
AA
4712static struct hci_conn *check_pending_le_conn(struct hci_dev *hdev,
4713 bdaddr_t *addr,
4714 u8 addr_type, u8 adv_type)
a4790dbd
AG
4715{
4716 struct hci_conn *conn;
4b9e7e75 4717 struct hci_conn_params *params;
a4790dbd 4718
1c1abcab
JH
4719 /* If the event is not connectable don't proceed further */
4720 if (adv_type != LE_ADV_IND && adv_type != LE_ADV_DIRECT_IND)
fd45ada9 4721 return NULL;
1c1abcab
JH
4722
4723 /* Ignore if the device is blocked */
dcc36c16 4724 if (hci_bdaddr_list_lookup(&hdev->blacklist, addr, addr_type))
fd45ada9 4725 return NULL;
1c1abcab 4726
f99353cf
JH
4727 /* Most controller will fail if we try to create new connections
4728 * while we have an existing one in slave role.
4729 */
4730 if (hdev->conn_hash.le_num_slave > 0)
fd45ada9 4731 return NULL;
f99353cf 4732
1c1abcab
JH
4733 /* If we're not connectable only connect devices that we have in
4734 * our pend_le_conns list.
4735 */
4b9e7e75
MH
4736 params = hci_pend_le_action_lookup(&hdev->pend_le_conns,
4737 addr, addr_type);
4738 if (!params)
fd45ada9 4739 return NULL;
4b9e7e75
MH
4740
4741 switch (params->auto_connect) {
4742 case HCI_AUTO_CONN_DIRECT:
4743 /* Only devices advertising with ADV_DIRECT_IND are
4744 * triggering a connection attempt. This is allowing
4745 * incoming connections from slave devices.
4746 */
4747 if (adv_type != LE_ADV_DIRECT_IND)
fd45ada9 4748 return NULL;
4b9e7e75
MH
4749 break;
4750 case HCI_AUTO_CONN_ALWAYS:
4751 /* Devices advertising with ADV_IND or ADV_DIRECT_IND
4752 * are triggering a connection attempt. This means
4753 * that incoming connectioms from slave device are
4754 * accepted and also outgoing connections to slave
4755 * devices are established when found.
4756 */
4757 break;
4758 default:
fd45ada9 4759 return NULL;
4b9e7e75 4760 }
a4790dbd
AG
4761
4762 conn = hci_connect_le(hdev, addr, addr_type, BT_SECURITY_LOW,
e804d25d 4763 HCI_LE_AUTOCONN_TIMEOUT, HCI_ROLE_MASTER);
f161dd41
JH
4764 if (!IS_ERR(conn)) {
4765 /* Store the pointer since we don't really have any
4766 * other owner of the object besides the params that
4767 * triggered it. This way we can abort the connection if
4768 * the parameters get removed and keep the reference
4769 * count consistent once the connection is established.
4770 */
f8aaf9b6 4771 params->conn = hci_conn_get(conn);
fd45ada9 4772 return conn;
f161dd41 4773 }
a4790dbd
AG
4774
4775 switch (PTR_ERR(conn)) {
4776 case -EBUSY:
4777 /* If hci_connect() returns -EBUSY it means there is already
4778 * an LE connection attempt going on. Since controllers don't
4779 * support more than one connection attempt at the time, we
4780 * don't consider this an error case.
4781 */
4782 break;
4783 default:
4784 BT_DBG("Failed to connect: err %ld", PTR_ERR(conn));
fd45ada9 4785 return NULL;
a4790dbd 4786 }
fd45ada9
AA
4787
4788 return NULL;
a4790dbd
AG
4789}
4790
4af605d8 4791static void process_adv_report(struct hci_dev *hdev, u8 type, bdaddr_t *bdaddr,
2f010b55
MH
4792 u8 bdaddr_type, bdaddr_t *direct_addr,
4793 u8 direct_addr_type, s8 rssi, u8 *data, u8 len)
4af605d8 4794{
b9a6328f 4795 struct discovery_state *d = &hdev->discovery;
1c1abcab 4796 struct smp_irk *irk;
fd45ada9 4797 struct hci_conn *conn;
474ee066 4798 bool match;
c70a7e4c 4799 u32 flags;
b9a6328f 4800
2f010b55
MH
4801 /* If the direct address is present, then this report is from
4802 * a LE Direct Advertising Report event. In that case it is
4803 * important to see if the address is matching the local
4804 * controller address.
4805 */
4806 if (direct_addr) {
4807 /* Only resolvable random addresses are valid for these
4808 * kind of reports and others can be ignored.
4809 */
4810 if (!hci_bdaddr_is_rpa(direct_addr, direct_addr_type))
4811 return;
4812
4813 /* If the controller is not using resolvable random
4814 * addresses, then this report can be ignored.
4815 */
d7a5a11d 4816 if (!hci_dev_test_flag(hdev, HCI_PRIVACY))
2f010b55
MH
4817 return;
4818
4819 /* If the local IRK of the controller does not match
4820 * with the resolvable random address provided, then
4821 * this report can be ignored.
4822 */
4823 if (!smp_irk_matches(hdev, hdev->irk, direct_addr))
4824 return;
4825 }
4826
1c1abcab
JH
4827 /* Check if we need to convert to identity address */
4828 irk = hci_get_irk(hdev, bdaddr, bdaddr_type);
4829 if (irk) {
4830 bdaddr = &irk->bdaddr;
4831 bdaddr_type = irk->addr_type;
4832 }
4833
4834 /* Check if we have been requested to connect to this device */
fd45ada9
AA
4835 conn = check_pending_le_conn(hdev, bdaddr, bdaddr_type, type);
4836 if (conn && type == LE_ADV_IND) {
4837 /* Store report for later inclusion by
4838 * mgmt_device_connected
4839 */
4840 memcpy(conn->le_adv_data, data, len);
4841 conn->le_adv_data_len = len;
4842 }
1c1abcab 4843
0d2bf134
JH
4844 /* Passive scanning shouldn't trigger any device found events,
4845 * except for devices marked as CONN_REPORT for which we do send
4846 * device found events.
4847 */
ca5c4be7 4848 if (hdev->le_scan_type == LE_SCAN_PASSIVE) {
0d2bf134
JH
4849 if (type == LE_ADV_DIRECT_IND)
4850 return;
4851
3a19b6fe
JH
4852 if (!hci_pend_le_action_lookup(&hdev->pend_le_reports,
4853 bdaddr, bdaddr_type))
0d2bf134
JH
4854 return;
4855
4856 if (type == LE_ADV_NONCONN_IND || type == LE_ADV_SCAN_IND)
4857 flags = MGMT_DEV_FOUND_NOT_CONNECTABLE;
4858 else
4859 flags = 0;
4860 mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
4861 rssi, flags, data, len, NULL, 0);
97bf2e99 4862 return;
ca5c4be7 4863 }
4af605d8 4864
c70a7e4c
MH
4865 /* When receiving non-connectable or scannable undirected
4866 * advertising reports, this means that the remote device is
4867 * not connectable and then clearly indicate this in the
4868 * device found event.
4869 *
4870 * When receiving a scan response, then there is no way to
4871 * know if the remote device is connectable or not. However
4872 * since scan responses are merged with a previously seen
4873 * advertising report, the flags field from that report
4874 * will be used.
4875 *
4876 * In the really unlikely case that a controller get confused
4877 * and just sends a scan response event, then it is marked as
4878 * not connectable as well.
4879 */
4880 if (type == LE_ADV_NONCONN_IND || type == LE_ADV_SCAN_IND ||
4881 type == LE_ADV_SCAN_RSP)
4882 flags = MGMT_DEV_FOUND_NOT_CONNECTABLE;
4883 else
4884 flags = 0;
4885
b9a6328f
JH
4886 /* If there's nothing pending either store the data from this
4887 * event or send an immediate device found event if the data
4888 * should not be stored for later.
4889 */
4890 if (!has_pending_adv_report(hdev)) {
4891 /* If the report will trigger a SCAN_REQ store it for
4892 * later merging.
4893 */
4894 if (type == LE_ADV_IND || type == LE_ADV_SCAN_IND) {
4895 store_pending_adv_report(hdev, bdaddr, bdaddr_type,
c70a7e4c 4896 rssi, flags, data, len);
b9a6328f
JH
4897 return;
4898 }
4899
4900 mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
c70a7e4c 4901 rssi, flags, data, len, NULL, 0);
b9a6328f
JH
4902 return;
4903 }
4904
474ee066
JH
4905 /* Check if the pending report is for the same device as the new one */
4906 match = (!bacmp(bdaddr, &d->last_adv_addr) &&
4907 bdaddr_type == d->last_adv_addr_type);
4908
b9a6328f
JH
4909 /* If the pending data doesn't match this report or this isn't a
4910 * scan response (e.g. we got a duplicate ADV_IND) then force
4911 * sending of the pending data.
4912 */
474ee066
JH
4913 if (type != LE_ADV_SCAN_RSP || !match) {
4914 /* Send out whatever is in the cache, but skip duplicates */
4915 if (!match)
4916 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
ff5cd29f 4917 d->last_adv_addr_type, NULL,
c70a7e4c 4918 d->last_adv_rssi, d->last_adv_flags,
ff5cd29f 4919 d->last_adv_data,
474ee066 4920 d->last_adv_data_len, NULL, 0);
b9a6328f
JH
4921
4922 /* If the new report will trigger a SCAN_REQ store it for
4923 * later merging.
4924 */
4925 if (type == LE_ADV_IND || type == LE_ADV_SCAN_IND) {
4926 store_pending_adv_report(hdev, bdaddr, bdaddr_type,
c70a7e4c 4927 rssi, flags, data, len);
b9a6328f
JH
4928 return;
4929 }
4930
4931 /* The advertising reports cannot be merged, so clear
4932 * the pending report and send out a device found event.
4933 */
4934 clear_pending_adv_report(hdev);
5c5b93e4 4935 mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
c70a7e4c 4936 rssi, flags, data, len, NULL, 0);
b9a6328f
JH
4937 return;
4938 }
4939
4940 /* If we get here we've got a pending ADV_IND or ADV_SCAN_IND and
4941 * the new event is a SCAN_RSP. We can therefore proceed with
4942 * sending a merged device found event.
4943 */
4944 mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
c70a7e4c 4945 d->last_adv_addr_type, NULL, rssi, d->last_adv_flags,
42bd6a56 4946 d->last_adv_data, d->last_adv_data_len, data, len);
b9a6328f 4947 clear_pending_adv_report(hdev);
4af605d8
JH
4948}
4949
6039aa73 4950static void hci_le_adv_report_evt(struct hci_dev *hdev, struct sk_buff *skb)
9aa04c91 4951{
e95beb41
AG
4952 u8 num_reports = skb->data[0];
4953 void *ptr = &skb->data[1];
9aa04c91 4954
a4790dbd
AG
4955 hci_dev_lock(hdev);
4956
e95beb41
AG
4957 while (num_reports--) {
4958 struct hci_ev_le_advertising_info *ev = ptr;
4af605d8 4959 s8 rssi;
a4790dbd 4960
3c9e9195 4961 rssi = ev->data[ev->length];
4af605d8 4962 process_adv_report(hdev, ev->evt_type, &ev->bdaddr,
2f010b55
MH
4963 ev->bdaddr_type, NULL, 0, rssi,
4964 ev->data, ev->length);
3c9e9195 4965
e95beb41 4966 ptr += sizeof(*ev) + ev->length + 1;
9aa04c91 4967 }
a4790dbd
AG
4968
4969 hci_dev_unlock(hdev);
9aa04c91
AG
4970}
4971
0fe29fd1
MH
4972static void hci_le_remote_feat_complete_evt(struct hci_dev *hdev,
4973 struct sk_buff *skb)
4974{
4975 struct hci_ev_le_remote_feat_complete *ev = (void *)skb->data;
4976 struct hci_conn *conn;
4977
4978 BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
4979
4980 hci_dev_lock(hdev);
4981
4982 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
4983 if (conn) {
4984 if (!ev->status)
4985 memcpy(conn->features[0], ev->features, 8);
4986
4987 if (conn->state == BT_CONFIG) {
4988 __u8 status;
4989
4990 /* If the local controller supports slave-initiated
4991 * features exchange, but the remote controller does
4992 * not, then it is possible that the error code 0x1a
4993 * for unsupported remote feature gets returned.
4994 *
4995 * In this specific case, allow the connection to
4996 * transition into connected state and mark it as
4997 * successful.
4998 */
4999 if ((hdev->le_features[0] & HCI_LE_SLAVE_FEATURES) &&
5000 !conn->out && ev->status == 0x1a)
5001 status = 0x00;
5002 else
5003 status = ev->status;
5004
5005 conn->state = BT_CONNECTED;
5006 hci_connect_cfm(conn, status);
5007 hci_conn_drop(conn);
5008 }
5009 }
5010
5011 hci_dev_unlock(hdev);
5012}
5013
6039aa73 5014static void hci_le_ltk_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
a7a595f6
VCG
5015{
5016 struct hci_ev_le_ltk_req *ev = (void *) skb->data;
5017 struct hci_cp_le_ltk_reply cp;
bea710fe 5018 struct hci_cp_le_ltk_neg_reply neg;
a7a595f6 5019 struct hci_conn *conn;
c9839a11 5020 struct smp_ltk *ltk;
a7a595f6 5021
9f1db00c 5022 BT_DBG("%s handle 0x%4.4x", hdev->name, __le16_to_cpu(ev->handle));
a7a595f6
VCG
5023
5024 hci_dev_lock(hdev);
5025
5026 conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
bea710fe
VCG
5027 if (conn == NULL)
5028 goto not_found;
a7a595f6 5029
f3a73d97 5030 ltk = hci_find_ltk(hdev, &conn->dst, conn->dst_type, conn->role);
5378bc56 5031 if (!ltk)
bea710fe
VCG
5032 goto not_found;
5033
5378bc56
JH
5034 if (smp_ltk_is_sc(ltk)) {
5035 /* With SC both EDiv and Rand are set to zero */
5036 if (ev->ediv || ev->rand)
5037 goto not_found;
5038 } else {
5039 /* For non-SC keys check that EDiv and Rand match */
5040 if (ev->ediv != ltk->ediv || ev->rand != ltk->rand)
5041 goto not_found;
5042 }
5043
8b76ce34
JH
5044 memcpy(cp.ltk, ltk->val, ltk->enc_size);
5045 memset(cp.ltk + ltk->enc_size, 0, sizeof(cp.ltk) - ltk->enc_size);
a7a595f6 5046 cp.handle = cpu_to_le16(conn->handle);
c9839a11 5047
a6f7833c 5048 conn->pending_sec_level = smp_ltk_sec_level(ltk);
a7a595f6 5049
89cbb4da 5050 conn->enc_key_size = ltk->enc_size;
a7a595f6
VCG
5051
5052 hci_send_cmd(hdev, HCI_OP_LE_LTK_REPLY, sizeof(cp), &cp);
5053
5981a882
CT
5054 /* Ref. Bluetooth Core SPEC pages 1975 and 2004. STK is a
5055 * temporary key used to encrypt a connection following
5056 * pairing. It is used during the Encrypted Session Setup to
5057 * distribute the keys. Later, security can be re-established
5058 * using a distributed LTK.
5059 */
2ceba539 5060 if (ltk->type == SMP_STK) {
fe59a05f 5061 set_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
970d0f1b
JH
5062 list_del_rcu(&ltk->list);
5063 kfree_rcu(ltk, rcu);
fe59a05f
JH
5064 } else {
5065 clear_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
c9839a11
VCG
5066 }
5067
a7a595f6 5068 hci_dev_unlock(hdev);
bea710fe
VCG
5069
5070 return;
5071
5072not_found:
5073 neg.handle = ev->handle;
5074 hci_send_cmd(hdev, HCI_OP_LE_LTK_NEG_REPLY, sizeof(neg), &neg);
5075 hci_dev_unlock(hdev);
a7a595f6
VCG
5076}
5077
8e75b46a
AG
5078static void send_conn_param_neg_reply(struct hci_dev *hdev, u16 handle,
5079 u8 reason)
5080{
5081 struct hci_cp_le_conn_param_req_neg_reply cp;
5082
5083 cp.handle = cpu_to_le16(handle);
5084 cp.reason = reason;
5085
5086 hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_NEG_REPLY, sizeof(cp),
5087 &cp);
5088}
5089
5090static void hci_le_remote_conn_param_req_evt(struct hci_dev *hdev,
5091 struct sk_buff *skb)
5092{
5093 struct hci_ev_le_remote_conn_param_req *ev = (void *) skb->data;
5094 struct hci_cp_le_conn_param_req_reply cp;
5095 struct hci_conn *hcon;
5096 u16 handle, min, max, latency, timeout;
5097
5098 handle = le16_to_cpu(ev->handle);
5099 min = le16_to_cpu(ev->interval_min);
5100 max = le16_to_cpu(ev->interval_max);
5101 latency = le16_to_cpu(ev->latency);
5102 timeout = le16_to_cpu(ev->timeout);
5103
5104 hcon = hci_conn_hash_lookup_handle(hdev, handle);
5105 if (!hcon || hcon->state != BT_CONNECTED)
5106 return send_conn_param_neg_reply(hdev, handle,
5107 HCI_ERROR_UNKNOWN_CONN_ID);
5108
5109 if (hci_check_conn_params(min, max, latency, timeout))
5110 return send_conn_param_neg_reply(hdev, handle,
5111 HCI_ERROR_INVALID_LL_PARAMS);
5112
40bef302 5113 if (hcon->role == HCI_ROLE_MASTER) {
348d50b8 5114 struct hci_conn_params *params;
f4869e2a 5115 u8 store_hint;
348d50b8
JH
5116
5117 hci_dev_lock(hdev);
5118
5119 params = hci_conn_params_lookup(hdev, &hcon->dst,
5120 hcon->dst_type);
5121 if (params) {
5122 params->conn_min_interval = min;
5123 params->conn_max_interval = max;
5124 params->conn_latency = latency;
5125 params->supervision_timeout = timeout;
f4869e2a
JH
5126 store_hint = 0x01;
5127 } else{
5128 store_hint = 0x00;
348d50b8
JH
5129 }
5130
5131 hci_dev_unlock(hdev);
5132
f4869e2a
JH
5133 mgmt_new_conn_param(hdev, &hcon->dst, hcon->dst_type,
5134 store_hint, min, max, latency, timeout);
348d50b8 5135 }
ffb5a827 5136
8e75b46a
AG
5137 cp.handle = ev->handle;
5138 cp.interval_min = ev->interval_min;
5139 cp.interval_max = ev->interval_max;
5140 cp.latency = ev->latency;
5141 cp.timeout = ev->timeout;
5142 cp.min_ce_len = 0;
5143 cp.max_ce_len = 0;
5144
5145 hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_REPLY, sizeof(cp), &cp);
5146}
5147
2f010b55
MH
5148static void hci_le_direct_adv_report_evt(struct hci_dev *hdev,
5149 struct sk_buff *skb)
5150{
5151 u8 num_reports = skb->data[0];
5152 void *ptr = &skb->data[1];
5153
5154 hci_dev_lock(hdev);
5155
5156 while (num_reports--) {
5157 struct hci_ev_le_direct_adv_info *ev = ptr;
5158
5159 process_adv_report(hdev, ev->evt_type, &ev->bdaddr,
5160 ev->bdaddr_type, &ev->direct_addr,
5161 ev->direct_addr_type, ev->rssi, NULL, 0);
5162
5163 ptr += sizeof(*ev);
5164 }
5165
5166 hci_dev_unlock(hdev);
5167}
5168
6039aa73 5169static void hci_le_meta_evt(struct hci_dev *hdev, struct sk_buff *skb)
fcd89c09
VT
5170{
5171 struct hci_ev_le_meta *le_ev = (void *) skb->data;
5172
5173 skb_pull(skb, sizeof(*le_ev));
5174
5175 switch (le_ev->subevent) {
5176 case HCI_EV_LE_CONN_COMPLETE:
5177 hci_le_conn_complete_evt(hdev, skb);
5178 break;
5179
1855d92d
MH
5180 case HCI_EV_LE_CONN_UPDATE_COMPLETE:
5181 hci_le_conn_update_complete_evt(hdev, skb);
5182 break;
5183
9aa04c91
AG
5184 case HCI_EV_LE_ADVERTISING_REPORT:
5185 hci_le_adv_report_evt(hdev, skb);
5186 break;
5187
0fe29fd1
MH
5188 case HCI_EV_LE_REMOTE_FEAT_COMPLETE:
5189 hci_le_remote_feat_complete_evt(hdev, skb);
5190 break;
5191
a7a595f6
VCG
5192 case HCI_EV_LE_LTK_REQ:
5193 hci_le_ltk_request_evt(hdev, skb);
5194 break;
5195
8e75b46a
AG
5196 case HCI_EV_LE_REMOTE_CONN_PARAM_REQ:
5197 hci_le_remote_conn_param_req_evt(hdev, skb);
5198 break;
5199
2f010b55
MH
5200 case HCI_EV_LE_DIRECT_ADV_REPORT:
5201 hci_le_direct_adv_report_evt(hdev, skb);
5202 break;
5203
fcd89c09
VT
5204 default:
5205 break;
5206 }
5207}
5208
9495b2ee
AE
5209static void hci_chan_selected_evt(struct hci_dev *hdev, struct sk_buff *skb)
5210{
5211 struct hci_ev_channel_selected *ev = (void *) skb->data;
5212 struct hci_conn *hcon;
5213
5214 BT_DBG("%s handle 0x%2.2x", hdev->name, ev->phy_handle);
5215
5216 skb_pull(skb, sizeof(*ev));
5217
5218 hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
5219 if (!hcon)
5220 return;
5221
5222 amp_read_loc_assoc_final_data(hdev, hcon);
5223}
5224
757aa0b5
JH
5225static bool hci_get_cmd_complete(struct hci_dev *hdev, u16 opcode,
5226 u8 event, struct sk_buff *skb)
5227{
5228 struct hci_ev_cmd_complete *ev;
5229 struct hci_event_hdr *hdr;
5230
5231 if (!skb)
5232 return false;
5233
5234 if (skb->len < sizeof(*hdr)) {
5235 BT_ERR("Too short HCI event");
5236 return false;
5237 }
5238
5239 hdr = (void *) skb->data;
5240 skb_pull(skb, HCI_EVENT_HDR_SIZE);
5241
5242 if (event) {
5243 if (hdr->evt != event)
5244 return false;
5245 return true;
5246 }
5247
5248 if (hdr->evt != HCI_EV_CMD_COMPLETE) {
5249 BT_DBG("Last event is not cmd complete (0x%2.2x)", hdr->evt);
5250 return false;
5251 }
5252
5253 if (skb->len < sizeof(*ev)) {
5254 BT_ERR("Too short cmd_complete event");
5255 return false;
5256 }
5257
5258 ev = (void *) skb->data;
5259 skb_pull(skb, sizeof(*ev));
5260
5261 if (opcode != __le16_to_cpu(ev->opcode)) {
5262 BT_DBG("opcode doesn't match (0x%2.2x != 0x%2.2x)", opcode,
5263 __le16_to_cpu(ev->opcode));
5264 return false;
5265 }
5266
5267 return true;
5268}
5269
a9de9248
MH
5270void hci_event_packet(struct hci_dev *hdev, struct sk_buff *skb)
5271{
5272 struct hci_event_hdr *hdr = (void *) skb->data;
e6214487
JH
5273 hci_req_complete_t req_complete = NULL;
5274 hci_req_complete_skb_t req_complete_skb = NULL;
5275 struct sk_buff *orig_skb = NULL;
757aa0b5 5276 u8 status = 0, event = hdr->evt, req_evt = 0;
e6214487 5277 u16 opcode = HCI_OP_NOP;
a9de9248 5278
db6e3e8d 5279 if (hdev->sent_cmd && bt_cb(hdev->sent_cmd)->req.event == event) {
c1f23a2b 5280 struct hci_command_hdr *cmd_hdr = (void *) hdev->sent_cmd->data;
e6214487
JH
5281 opcode = __le16_to_cpu(cmd_hdr->opcode);
5282 hci_req_cmd_complete(hdev, opcode, status, &req_complete,
5283 &req_complete_skb);
757aa0b5 5284 req_evt = event;
02350a72
JH
5285 }
5286
e6214487
JH
5287 /* If it looks like we might end up having to call
5288 * req_complete_skb, store a pristine copy of the skb since the
5289 * various handlers may modify the original one through
5290 * skb_pull() calls, etc.
5291 */
5292 if (req_complete_skb || event == HCI_EV_CMD_STATUS ||
5293 event == HCI_EV_CMD_COMPLETE)
5294 orig_skb = skb_clone(skb, GFP_KERNEL);
5295
5296 skb_pull(skb, HCI_EVENT_HDR_SIZE);
5297
a9de9248 5298 switch (event) {
1da177e4
LT
5299 case HCI_EV_INQUIRY_COMPLETE:
5300 hci_inquiry_complete_evt(hdev, skb);
5301 break;
5302
5303 case HCI_EV_INQUIRY_RESULT:
5304 hci_inquiry_result_evt(hdev, skb);
5305 break;
5306
a9de9248
MH
5307 case HCI_EV_CONN_COMPLETE:
5308 hci_conn_complete_evt(hdev, skb);
21d9e30e
MH
5309 break;
5310
1da177e4
LT
5311 case HCI_EV_CONN_REQUEST:
5312 hci_conn_request_evt(hdev, skb);
5313 break;
5314
1da177e4
LT
5315 case HCI_EV_DISCONN_COMPLETE:
5316 hci_disconn_complete_evt(hdev, skb);
5317 break;
5318
1da177e4
LT
5319 case HCI_EV_AUTH_COMPLETE:
5320 hci_auth_complete_evt(hdev, skb);
5321 break;
5322
a9de9248
MH
5323 case HCI_EV_REMOTE_NAME:
5324 hci_remote_name_evt(hdev, skb);
5325 break;
5326
1da177e4
LT
5327 case HCI_EV_ENCRYPT_CHANGE:
5328 hci_encrypt_change_evt(hdev, skb);
5329 break;
5330
a9de9248
MH
5331 case HCI_EV_CHANGE_LINK_KEY_COMPLETE:
5332 hci_change_link_key_complete_evt(hdev, skb);
5333 break;
5334
5335 case HCI_EV_REMOTE_FEATURES:
5336 hci_remote_features_evt(hdev, skb);
5337 break;
5338
a9de9248 5339 case HCI_EV_CMD_COMPLETE:
e6214487
JH
5340 hci_cmd_complete_evt(hdev, skb, &opcode, &status,
5341 &req_complete, &req_complete_skb);
a9de9248
MH
5342 break;
5343
5344 case HCI_EV_CMD_STATUS:
e6214487
JH
5345 hci_cmd_status_evt(hdev, skb, &opcode, &status, &req_complete,
5346 &req_complete_skb);
a9de9248
MH
5347 break;
5348
24dfa343
MH
5349 case HCI_EV_HARDWARE_ERROR:
5350 hci_hardware_error_evt(hdev, skb);
5351 break;
5352
a9de9248
MH
5353 case HCI_EV_ROLE_CHANGE:
5354 hci_role_change_evt(hdev, skb);
5355 break;
5356
5357 case HCI_EV_NUM_COMP_PKTS:
5358 hci_num_comp_pkts_evt(hdev, skb);
5359 break;
5360
5361 case HCI_EV_MODE_CHANGE:
5362 hci_mode_change_evt(hdev, skb);
1da177e4
LT
5363 break;
5364
5365 case HCI_EV_PIN_CODE_REQ:
5366 hci_pin_code_request_evt(hdev, skb);
5367 break;
5368
5369 case HCI_EV_LINK_KEY_REQ:
5370 hci_link_key_request_evt(hdev, skb);
5371 break;
5372
5373 case HCI_EV_LINK_KEY_NOTIFY:
5374 hci_link_key_notify_evt(hdev, skb);
5375 break;
5376
5377 case HCI_EV_CLOCK_OFFSET:
5378 hci_clock_offset_evt(hdev, skb);
5379 break;
5380
a8746417
MH
5381 case HCI_EV_PKT_TYPE_CHANGE:
5382 hci_pkt_type_change_evt(hdev, skb);
5383 break;
5384
85a1e930
MH
5385 case HCI_EV_PSCAN_REP_MODE:
5386 hci_pscan_rep_mode_evt(hdev, skb);
5387 break;
5388
a9de9248
MH
5389 case HCI_EV_INQUIRY_RESULT_WITH_RSSI:
5390 hci_inquiry_result_with_rssi_evt(hdev, skb);
04837f64
MH
5391 break;
5392
a9de9248
MH
5393 case HCI_EV_REMOTE_EXT_FEATURES:
5394 hci_remote_ext_features_evt(hdev, skb);
1da177e4
LT
5395 break;
5396
a9de9248
MH
5397 case HCI_EV_SYNC_CONN_COMPLETE:
5398 hci_sync_conn_complete_evt(hdev, skb);
5399 break;
1da177e4 5400
a9de9248
MH
5401 case HCI_EV_EXTENDED_INQUIRY_RESULT:
5402 hci_extended_inquiry_result_evt(hdev, skb);
5403 break;
1da177e4 5404
1c2e0041
JH
5405 case HCI_EV_KEY_REFRESH_COMPLETE:
5406 hci_key_refresh_complete_evt(hdev, skb);
5407 break;
5408
0493684e
MH
5409 case HCI_EV_IO_CAPA_REQUEST:
5410 hci_io_capa_request_evt(hdev, skb);
5411 break;
5412
03b555e1
JH
5413 case HCI_EV_IO_CAPA_REPLY:
5414 hci_io_capa_reply_evt(hdev, skb);
5415 break;
5416
a5c29683
JH
5417 case HCI_EV_USER_CONFIRM_REQUEST:
5418 hci_user_confirm_request_evt(hdev, skb);
5419 break;
5420
1143d458
BG
5421 case HCI_EV_USER_PASSKEY_REQUEST:
5422 hci_user_passkey_request_evt(hdev, skb);
5423 break;
5424
92a25256
JH
5425 case HCI_EV_USER_PASSKEY_NOTIFY:
5426 hci_user_passkey_notify_evt(hdev, skb);
5427 break;
5428
5429 case HCI_EV_KEYPRESS_NOTIFY:
5430 hci_keypress_notify_evt(hdev, skb);
5431 break;
5432
0493684e
MH
5433 case HCI_EV_SIMPLE_PAIR_COMPLETE:
5434 hci_simple_pair_complete_evt(hdev, skb);
5435 break;
5436
41a96212
MH
5437 case HCI_EV_REMOTE_HOST_FEATURES:
5438 hci_remote_host_features_evt(hdev, skb);
5439 break;
5440
fcd89c09
VT
5441 case HCI_EV_LE_META:
5442 hci_le_meta_evt(hdev, skb);
5443 break;
5444
9495b2ee
AE
5445 case HCI_EV_CHANNEL_SELECTED:
5446 hci_chan_selected_evt(hdev, skb);
5447 break;
5448
2763eda6
SJ
5449 case HCI_EV_REMOTE_OOB_DATA_REQUEST:
5450 hci_remote_oob_data_request_evt(hdev, skb);
5451 break;
5452
d5e91192
AE
5453 case HCI_EV_PHY_LINK_COMPLETE:
5454 hci_phy_link_complete_evt(hdev, skb);
5455 break;
5456
27695fb4
AE
5457 case HCI_EV_LOGICAL_LINK_COMPLETE:
5458 hci_loglink_complete_evt(hdev, skb);
5459 break;
5460
606e2a10
AE
5461 case HCI_EV_DISCONN_LOGICAL_LINK_COMPLETE:
5462 hci_disconn_loglink_complete_evt(hdev, skb);
5463 break;
5464
9eef6b3a
AE
5465 case HCI_EV_DISCONN_PHY_LINK_COMPLETE:
5466 hci_disconn_phylink_complete_evt(hdev, skb);
5467 break;
5468
25e89e99
AE
5469 case HCI_EV_NUM_COMP_BLOCKS:
5470 hci_num_comp_blocks_evt(hdev, skb);
5471 break;
5472
a9de9248 5473 default:
9f1db00c 5474 BT_DBG("%s event 0x%2.2x", hdev->name, event);
1da177e4
LT
5475 break;
5476 }
5477
757aa0b5 5478 if (req_complete) {
e6214487 5479 req_complete(hdev, status, opcode);
757aa0b5
JH
5480 } else if (req_complete_skb) {
5481 if (!hci_get_cmd_complete(hdev, opcode, req_evt, orig_skb)) {
5482 kfree_skb(orig_skb);
5483 orig_skb = NULL;
5484 }
e6214487 5485 req_complete_skb(hdev, status, opcode, orig_skb);
757aa0b5 5486 }
e6214487
JH
5487
5488 kfree_skb(orig_skb);
1da177e4
LT
5489 kfree_skb(skb);
5490 hdev->stat.evt_rx++;
5491}