2007-02-09 17:24:33 +03:00
|
|
|
/*
|
2005-04-17 02:20:36 +04:00
|
|
|
BlueZ - Bluetooth protocol stack for Linux
|
2010-05-28 19:53:46 +04:00
|
|
|
Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
|
|
|
|
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License version 2 as
|
|
|
|
published by the Free Software Foundation;
|
|
|
|
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
|
|
|
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
|
|
|
|
IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
|
2007-02-09 17:24:33 +03:00
|
|
|
CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
|
|
|
|
WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
2005-04-17 02:20:36 +04:00
|
|
|
OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
|
2007-02-09 17:24:33 +03:00
|
|
|
ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
|
|
|
|
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
|
2005-04-17 02:20:36 +04:00
|
|
|
SOFTWARE IS DISCLAIMED.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Bluetooth HCI event handling. */
|
|
|
|
|
|
|
|
#include <asm/unaligned.h>
|
|
|
|
|
|
|
|
#include <net/bluetooth/bluetooth.h>
|
|
|
|
#include <net/bluetooth/hci_core.h>
|
2012-08-09 11:52:30 +04:00
|
|
|
#include <net/bluetooth/mgmt.h>
|
2013-10-11 01:54:14 +04:00
|
|
|
|
2014-12-19 14:40:20 +03:00
|
|
|
#include "hci_request.h"
|
2014-12-20 19:13:41 +03:00
|
|
|
#include "hci_debugfs.h"
|
2013-10-11 01:54:15 +04:00
|
|
|
#include "a2mp.h"
|
2013-10-11 01:54:14 +04:00
|
|
|
#include "amp.h"
|
2014-06-16 20:25:16 +04:00
|
|
|
#include "smp.h"
|
2020-04-03 22:44:01 +03:00
|
|
|
#include "msft.h"
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2015-01-28 03:04:33 +03:00
|
|
|
#define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \
|
|
|
|
"\x00\x00\x00\x00\x00\x00\x00\x00"
|
|
|
|
|
2021-08-03 02:56:19 +03:00
|
|
|
#define secs_to_jiffies(_secs) msecs_to_jiffies((_secs) * 1000)
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/* Handle HCI Event packets */
|
|
|
|
|
2020-05-06 22:55:03 +03:00
|
|
|
static void hci_cc_inquiry_cancel(struct hci_dev *hdev, struct sk_buff *skb,
|
|
|
|
u8 *new_status)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2020-05-06 22:55:03 +03:00
|
|
|
/* It is possible that we receive Inquiry Complete event right
|
|
|
|
* before we receive Inquiry Cancel Command Complete event, in
|
|
|
|
* which case the latter event should have status of Command
|
|
|
|
* Disallowed (0x0c). This should not be treated as error, since
|
|
|
|
* we actually achieve what Inquiry Cancel wants to achieve,
|
|
|
|
* which is to end the last Inquiry session.
|
|
|
|
*/
|
|
|
|
if (status == 0x0c && !test_bit(HCI_INQUIRY, &hdev->flags)) {
|
|
|
|
bt_dev_warn(hdev, "Ignoring error of Inquiry Cancel command");
|
|
|
|
status = 0x00;
|
|
|
|
}
|
|
|
|
|
|
|
|
*new_status = status;
|
|
|
|
|
2013-04-30 22:29:34 +04:00
|
|
|
if (status)
|
2007-10-20 15:33:56 +04:00
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-11-04 21:16:53 +04:00
|
|
|
clear_bit(HCI_INQUIRY, &hdev->flags);
|
2014-03-17 21:06:10 +04:00
|
|
|
smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
|
2013-03-28 03:04:56 +04:00
|
|
|
wake_up_bit(&hdev->flags, HCI_INQUIRY);
|
2011-11-04 21:16:53 +04:00
|
|
|
|
2014-06-10 15:05:57 +04:00
|
|
|
hci_dev_lock(hdev);
|
2015-10-16 10:07:49 +03:00
|
|
|
/* Set discovery state to stopped if we're not doing LE active
|
|
|
|
* scanning.
|
|
|
|
*/
|
|
|
|
if (!hci_dev_test_flag(hdev, HCI_LE_SCAN) ||
|
|
|
|
hdev->le_scan_type != LE_SCAN_ACTIVE)
|
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
2014-06-10 15:05:57 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_conn_check_pending(hdev);
|
|
|
|
}
|
2006-11-19 00:14:22 +03:00
|
|
|
|
2012-03-21 07:03:35 +04:00
|
|
|
static void hci_cc_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2012-03-21 07:03:36 +04:00
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_PERIODIC_INQ);
|
2012-03-21 07:03:35 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_exit_periodic_inq(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2006-11-19 00:14:22 +03:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2006-11-19 00:14:22 +03:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_PERIODIC_INQ);
|
2012-03-21 07:03:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_conn_check_pending(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-17 07:36:24 +04:00
|
|
|
static void hci_cc_remote_name_req_cancel(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_role_discovery(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_role_discovery *rp = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
2014-07-16 12:42:27 +04:00
|
|
|
if (conn)
|
|
|
|
conn->role = rp->role;
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
static void hci_cc_read_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_link_policy *rp = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2008-07-14 22:13:47 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
|
|
|
if (conn)
|
|
|
|
conn->link_policy = __le16_to_cpu(rp->policy);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_write_link_policy(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_rp_write_link_policy *rp = (void *) skb->data;
|
2005-04-17 02:20:36 +04:00
|
|
|
struct hci_conn *conn;
|
2006-07-03 12:02:33 +04:00
|
|
|
void *sent;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LINK_POLICY);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
2008-07-14 22:13:47 +04:00
|
|
|
if (conn)
|
2008-05-03 03:25:46 +04:00
|
|
|
conn->link_policy = get_unaligned_le16(sent + 2);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-05-17 07:36:24 +04:00
|
|
|
static void hci_cc_read_def_link_policy(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2008-07-14 22:13:47 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_def_link_policy *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2008-07-14 22:13:47 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->link_policy = __le16_to_cpu(rp->policy);
|
|
|
|
}
|
|
|
|
|
2012-05-17 07:36:24 +04:00
|
|
|
static void hci_cc_write_def_link_policy(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2008-07-14 22:13:47 +04:00
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
void *sent;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:47 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_DEF_LINK_POLICY);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
hdev->link_policy = get_unaligned_le16(sent);
|
2008-07-14 22:13:47 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_reset(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2011-03-16 21:36:29 +03:00
|
|
|
clear_bit(HCI_RESET, &hdev->flags);
|
|
|
|
|
2014-11-02 04:45:58 +03:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2012-02-21 19:55:47 +04:00
|
|
|
/* Reset all non-persistent flags */
|
2015-03-13 19:04:17 +03:00
|
|
|
hci_dev_clear_volatile_flags(hdev);
|
2012-02-23 18:50:05 +04:00
|
|
|
|
2015-01-28 20:56:01 +03:00
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
|
|
|
|
2012-11-08 04:22:59 +04:00
|
|
|
hdev->inq_tx_power = HCI_TX_POWER_INVALID;
|
|
|
|
hdev->adv_tx_power = HCI_TX_POWER_INVALID;
|
2012-11-08 04:23:00 +04:00
|
|
|
|
|
|
|
memset(hdev->adv_data, 0, sizeof(hdev->adv_data));
|
|
|
|
hdev->adv_data_len = 0;
|
2013-10-16 11:16:47 +04:00
|
|
|
|
|
|
|
memset(hdev->scan_rsp_data, 0, sizeof(hdev->scan_rsp_data));
|
|
|
|
hdev->scan_rsp_data_len = 0;
|
2013-10-19 18:09:11 +04:00
|
|
|
|
2014-03-21 23:18:10 +04:00
|
|
|
hdev->le_scan_type = LE_SCAN_PASSIVE;
|
|
|
|
|
2013-10-19 18:09:11 +04:00
|
|
|
hdev->ssp_debug_mode = 0;
|
2014-10-30 01:37:53 +03:00
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
hci_bdaddr_list_clear(&hdev->le_accept_list);
|
2018-06-29 09:42:50 +03:00
|
|
|
hci_bdaddr_list_clear(&hdev->le_resolv_list);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2015-01-12 20:21:25 +03:00
|
|
|
static void hci_cc_read_stored_link_key(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_stored_link_key *rp = (void *)skb->data;
|
|
|
|
struct hci_cp_read_stored_link_key *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_READ_STORED_LINK_KEY);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!rp->status && sent->read_all == 0x01) {
|
|
|
|
hdev->stored_max_keys = rp->max_keys;
|
|
|
|
hdev->stored_num_keys = rp->num_keys;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-12 20:21:28 +03:00
|
|
|
static void hci_cc_delete_stored_link_key(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_delete_stored_link_key *rp = (void *)skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (rp->num_keys <= hdev->stored_num_keys)
|
|
|
|
hdev->stored_num_keys -= rp->num_keys;
|
|
|
|
else
|
|
|
|
hdev->stored_num_keys = 0;
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_write_local_name(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
void *sent;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LOCAL_NAME);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-02-22 20:17:32 +04:00
|
|
|
mgmt_set_local_name_complete(hdev, sent, status);
|
2012-02-22 23:06:55 +04:00
|
|
|
else if (!status)
|
|
|
|
memcpy(hdev->dev_name, sent, HCI_MAX_NAME_LENGTH);
|
2012-02-22 20:17:32 +04:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_read_local_name(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_local_name *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_SETUP) ||
|
|
|
|
hci_dev_test_flag(hdev, HCI_CONFIG))
|
2012-02-22 22:14:22 +04:00
|
|
|
memcpy(hdev->dev_name, rp->name, HCI_MAX_NAME_LENGTH);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_write_auth_enable(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
void *sent;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_AUTH_ENABLE);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2014-12-11 16:28:15 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (!status) {
|
|
|
|
__u8 param = *((__u8 *) sent);
|
|
|
|
|
|
|
|
if (param == AUTH_ENABLED)
|
|
|
|
set_bit(HCI_AUTH, &hdev->flags);
|
|
|
|
else
|
|
|
|
clear_bit(HCI_AUTH, &hdev->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-02-17 01:56:27 +04:00
|
|
|
mgmt_auth_enable_complete(hdev, status);
|
2014-12-11 16:28:15 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_write_encrypt_mode(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2014-07-05 12:48:01 +04:00
|
|
|
__u8 param;
|
2005-04-17 02:20:36 +04:00
|
|
|
void *sent;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_ENCRYPT_MODE);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
param = *((__u8 *) sent);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (param)
|
|
|
|
set_bit(HCI_ENCRYPT, &hdev->flags);
|
|
|
|
else
|
|
|
|
clear_bit(HCI_ENCRYPT, &hdev->flags);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_write_scan_enable(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
2014-07-05 12:48:01 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
__u8 param;
|
2007-10-20 15:33:56 +04:00
|
|
|
void *sent;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SCAN_ENABLE);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-11-04 02:17:45 +04:00
|
|
|
param = *((__u8 *) sent);
|
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2012-08-09 11:52:29 +04:00
|
|
|
if (status) {
|
2011-11-08 00:16:03 +04:00
|
|
|
hdev->discov_timeout = 0;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2014-07-10 13:09:08 +04:00
|
|
|
if (param & SCAN_INQUIRY)
|
2011-11-04 02:17:45 +04:00
|
|
|
set_bit(HCI_ISCAN, &hdev->flags);
|
2014-07-10 13:09:08 +04:00
|
|
|
else
|
|
|
|
clear_bit(HCI_ISCAN, &hdev->flags);
|
2011-11-04 02:17:45 +04:00
|
|
|
|
2014-07-10 13:09:06 +04:00
|
|
|
if (param & SCAN_PAGE)
|
2011-11-04 02:17:45 +04:00
|
|
|
set_bit(HCI_PSCAN, &hdev->flags);
|
2014-07-10 13:09:08 +04:00
|
|
|
else
|
2014-07-28 16:45:31 +04:00
|
|
|
clear_bit(HCI_PSCAN, &hdev->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-11-04 02:17:45 +04:00
|
|
|
done:
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2021-03-03 19:34:04 +03:00
|
|
|
static void hci_cc_set_event_filter(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *)skb->data);
|
|
|
|
struct hci_cp_set_event_filter *cp;
|
|
|
|
void *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_SET_EVENT_FLT);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = (struct hci_cp_set_event_filter *)sent;
|
|
|
|
|
|
|
|
if (cp->flt_type == HCI_FLT_CLEAR_ALL)
|
|
|
|
hci_dev_clear_flag(hdev, HCI_EVENT_FILTER_CONFIGURED);
|
|
|
|
else
|
|
|
|
hci_dev_set_flag(hdev, HCI_EVENT_FILTER_CONFIGURED);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_read_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_class_of_dev *rp = (void *) skb->data;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
memcpy(hdev->dev_class, rp->dev_class, 3);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s class 0x%.2x%.2x%.2x", hdev->name,
|
2012-05-17 07:36:24 +04:00
|
|
|
hdev->dev_class[2], hdev->dev_class[1], hdev->dev_class[0]);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_write_class_of_dev(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
void *sent;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_CLASS_OF_DEV);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-02-22 21:38:01 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
if (status == 0)
|
|
|
|
memcpy(hdev->dev_class, sent, 3);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-02-22 21:38:01 +04:00
|
|
|
mgmt_set_class_of_dev_complete(hdev, sent, status);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_read_voice_setting(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_voice_setting *rp = (void *) skb->data;
|
|
|
|
__u16 setting;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
setting = __le16_to_cpu(rp->voice_setting);
|
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
if (hdev->voice_setting == setting)
|
2007-10-20 15:33:56 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->voice_setting = setting;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2011-12-15 04:58:44 +04:00
|
|
|
if (hdev->notify)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:21 +04:00
|
|
|
static void hci_cc_write_voice_setting(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2008-07-14 22:13:47 +04:00
|
|
|
__u16 setting;
|
2007-10-20 15:33:56 +04:00
|
|
|
void *sent;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_VOICE_SETTING);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
setting = get_unaligned_le16(sent);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
if (hdev->voice_setting == setting)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->voice_setting = setting;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s voice setting 0x%4.4x", hdev->name, setting);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-12-15 04:58:44 +04:00
|
|
|
if (hdev->notify)
|
2008-07-14 22:13:47 +04:00
|
|
|
hdev->notify(hdev, HCI_NOTIFY_VOICE_SETTING);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2013-10-15 00:56:16 +04:00
|
|
|
static void hci_cc_read_num_supported_iac(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_num_supported_iac *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->num_iac = rp->num_iac;
|
|
|
|
|
|
|
|
BT_DBG("%s num iac %d", hdev->name, hdev->num_iac);
|
|
|
|
}
|
|
|
|
|
2008-07-14 22:13:48 +04:00
|
|
|
static void hci_cc_write_ssp_mode(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2012-10-25 01:09:51 +04:00
|
|
|
struct hci_cp_write_ssp_mode *sent;
|
2008-07-14 22:13:48 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:48 +04:00
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SSP_MODE);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2014-12-11 16:28:15 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2012-10-25 01:09:51 +04:00
|
|
|
if (!status) {
|
|
|
|
if (sent->mode)
|
2013-04-17 16:00:51 +04:00
|
|
|
hdev->features[1][0] |= LMP_HOST_SSP;
|
2012-10-25 01:09:51 +04:00
|
|
|
else
|
2013-04-17 16:00:51 +04:00
|
|
|
hdev->features[1][0] &= ~LMP_HOST_SSP;
|
2012-10-25 01:09:51 +04:00
|
|
|
}
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-10-25 01:09:51 +04:00
|
|
|
mgmt_ssp_enable_complete(hdev, sent->mode, status);
|
2012-02-22 14:38:31 +04:00
|
|
|
else if (!status) {
|
2012-10-25 01:09:51 +04:00
|
|
|
if (sent->mode)
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_SSP_ENABLED);
|
2012-02-22 14:38:31 +04:00
|
|
|
else
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_SSP_ENABLED);
|
2012-02-22 14:38:31 +04:00
|
|
|
}
|
2014-12-11 16:28:15 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2008-07-14 22:13:48 +04:00
|
|
|
}
|
|
|
|
|
2014-01-10 14:07:23 +04:00
|
|
|
static void hci_cc_write_sc_support(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 status = *((u8 *) skb->data);
|
|
|
|
struct hci_cp_write_sc_support *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SC_SUPPORT);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2014-12-11 16:28:15 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-01-10 14:07:23 +04:00
|
|
|
if (!status) {
|
|
|
|
if (sent->support)
|
|
|
|
hdev->features[1][0] |= LMP_HOST_SC;
|
|
|
|
else
|
|
|
|
hdev->features[1][0] &= ~LMP_HOST_SC;
|
|
|
|
}
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT) && !status) {
|
2014-01-10 14:07:23 +04:00
|
|
|
if (sent->support)
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_SC_ENABLED);
|
2014-01-10 14:07:23 +04:00
|
|
|
else
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_SC_ENABLED);
|
2014-01-10 14:07:23 +04:00
|
|
|
}
|
2014-12-11 16:28:15 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2014-01-10 14:07:23 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_read_local_version(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_local_version *rp = (void *) skb->data;
|
2006-09-23 11:57:20 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2006-09-23 11:57:20 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (rp->status)
|
2013-03-05 22:37:49 +04:00
|
|
|
return;
|
2006-09-23 11:57:20 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_SETUP) ||
|
|
|
|
hci_dev_test_flag(hdev, HCI_CONFIG)) {
|
2013-10-18 23:04:50 +04:00
|
|
|
hdev->hci_ver = rp->hci_ver;
|
|
|
|
hdev->hci_rev = __le16_to_cpu(rp->hci_rev);
|
|
|
|
hdev->lmp_ver = rp->lmp_ver;
|
|
|
|
hdev->manufacturer = __le16_to_cpu(rp->manufacturer);
|
|
|
|
hdev->lmp_subver = __le16_to_cpu(rp->lmp_subver);
|
|
|
|
}
|
2011-01-25 02:19:58 +03:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:21 +04:00
|
|
|
static void hci_cc_read_local_commands(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_local_commands *rp = (void *) skb->data;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-10-31 15:54:33 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_SETUP) ||
|
|
|
|
hci_dev_test_flag(hdev, HCI_CONFIG))
|
2013-03-05 22:37:43 +04:00
|
|
|
memcpy(hdev->commands, rp->commands, sizeof(hdev->commands));
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2019-06-21 12:21:56 +03:00
|
|
|
static void hci_cc_read_auth_payload_timeout(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_auth_payload_to *rp = (void *)skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
|
|
|
if (conn)
|
|
|
|
conn->auth_payload_timeout = __le16_to_cpu(rp->timeout);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_write_auth_payload_timeout(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_write_auth_payload_to *rp = (void *)skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
void *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_AUTH_PAYLOAD_TO);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
|
|
|
if (conn)
|
|
|
|
conn->auth_payload_timeout = get_unaligned_le16(sent + 2);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:21 +04:00
|
|
|
static void hci_cc_read_local_features(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_local_features *rp = (void *) skb->data;
|
2007-07-11 11:51:55 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
2007-07-11 11:51:55 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
memcpy(hdev->features, rp->features, 8);
|
2007-07-11 11:51:55 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
/* Adjust default settings according to features
|
|
|
|
* supported by device. */
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][0] & LMP_3SLOT)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->pkt_type |= (HCI_DM3 | HCI_DH3);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][0] & LMP_5SLOT)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->pkt_type |= (HCI_DM5 | HCI_DH5);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][1] & LMP_HV2) {
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->pkt_type |= (HCI_HV2);
|
|
|
|
hdev->esco_type |= (ESCO_HV2);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][1] & LMP_HV3) {
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->pkt_type |= (HCI_HV3);
|
|
|
|
hdev->esco_type |= (ESCO_HV3);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-24 22:03:49 +04:00
|
|
|
if (lmp_esco_capable(hdev))
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->esco_type |= (ESCO_EV3);
|
2006-07-03 12:02:29 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][4] & LMP_EV4)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->esco_type |= (ESCO_EV4);
|
2006-07-03 12:02:29 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][4] & LMP_EV5)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->esco_type |= (ESCO_EV5);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][5] & LMP_EDR_ESCO_2M)
|
2009-02-06 11:13:37 +03:00
|
|
|
hdev->esco_type |= (ESCO_2EV3);
|
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][5] & LMP_EDR_ESCO_3M)
|
2009-02-06 11:13:37 +03:00
|
|
|
hdev->esco_type |= (ESCO_3EV3);
|
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (hdev->features[0][5] & LMP_EDR_3S_ESCO)
|
2009-02-06 11:13:37 +03:00
|
|
|
hdev->esco_type |= (ESCO_2EV5 | ESCO_3EV5);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-07-01 02:20:52 +04:00
|
|
|
static void hci_cc_read_local_ext_features(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-07-01 02:20:52 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_local_ext_features *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-07-01 02:20:52 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
2013-03-05 22:37:49 +04:00
|
|
|
return;
|
2011-07-01 02:20:52 +04:00
|
|
|
|
2013-10-18 23:04:47 +04:00
|
|
|
if (hdev->max_page < rp->max_page)
|
|
|
|
hdev->max_page = rp->max_page;
|
2013-04-17 16:00:52 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (rp->page < HCI_MAX_PAGES)
|
|
|
|
memcpy(hdev->features[rp->page], rp->features, 8);
|
2011-07-01 02:20:52 +04:00
|
|
|
}
|
|
|
|
|
2011-11-24 16:52:02 +04:00
|
|
|
static void hci_cc_read_flow_control_mode(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-11-24 16:52:02 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_flow_control_mode *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-11-24 16:52:02 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->flow_ctl_mode = rp->mode;
|
2011-11-24 16:52:02 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cc_read_buffer_size(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_buffer_size *rp = (void *) skb->data;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->acl_mtu = __le16_to_cpu(rp->acl_mtu);
|
|
|
|
hdev->sco_mtu = rp->sco_mtu;
|
|
|
|
hdev->acl_pkts = __le16_to_cpu(rp->acl_max_pkt);
|
|
|
|
hdev->sco_pkts = __le16_to_cpu(rp->sco_max_pkt);
|
|
|
|
|
|
|
|
if (test_bit(HCI_QUIRK_FIXUP_BUFFER_SIZE, &hdev->quirks)) {
|
|
|
|
hdev->sco_mtu = 64;
|
|
|
|
hdev->sco_pkts = 8;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
hdev->acl_cnt = hdev->acl_pkts;
|
|
|
|
hdev->sco_cnt = hdev->sco_pkts;
|
|
|
|
|
2012-05-17 07:36:24 +04:00
|
|
|
BT_DBG("%s acl mtu %d:%d sco mtu %d:%d", hdev->name, hdev->acl_mtu,
|
|
|
|
hdev->acl_pkts, hdev->sco_mtu, hdev->sco_pkts);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_read_bd_addr(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_bd_addr *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2014-07-05 12:48:03 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (test_bit(HCI_INIT, &hdev->flags))
|
2007-10-20 15:33:56 +04:00
|
|
|
bacpy(&hdev->bdaddr, &rp->bdaddr);
|
2014-07-05 12:48:03 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_SETUP))
|
2014-07-05 12:48:03 +04:00
|
|
|
bacpy(&hdev->setup_addr, &rp->bdaddr);
|
2010-12-22 00:01:27 +03:00
|
|
|
}
|
|
|
|
|
2020-04-03 22:44:04 +03:00
|
|
|
static void hci_cc_read_local_pairing_opts(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_local_pairing_opts *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (hci_dev_test_flag(hdev, HCI_SETUP) ||
|
|
|
|
hci_dev_test_flag(hdev, HCI_CONFIG)) {
|
|
|
|
hdev->pairing_opts = rp->pairing_opts;
|
|
|
|
hdev->max_enc_key_size = rp->max_key_size;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-16 02:07:11 +04:00
|
|
|
static void hci_cc_read_page_scan_activity(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_page_scan_activity *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (test_bit(HCI_INIT, &hdev->flags)) {
|
2013-03-16 02:07:11 +04:00
|
|
|
hdev->page_scan_interval = __le16_to_cpu(rp->interval);
|
|
|
|
hdev->page_scan_window = __le16_to_cpu(rp->window);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-03-16 02:07:12 +04:00
|
|
|
static void hci_cc_write_page_scan_activity(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 status = *((u8 *) skb->data);
|
|
|
|
struct hci_cp_write_page_scan_activity *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->page_scan_interval = __le16_to_cpu(sent->interval);
|
|
|
|
hdev->page_scan_window = __le16_to_cpu(sent->window);
|
|
|
|
}
|
|
|
|
|
2013-03-16 02:07:11 +04:00
|
|
|
static void hci_cc_read_page_scan_type(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_page_scan_type *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (test_bit(HCI_INIT, &hdev->flags))
|
2013-03-16 02:07:11 +04:00
|
|
|
hdev->page_scan_type = rp->type;
|
|
|
|
}
|
|
|
|
|
2013-03-16 02:07:12 +04:00
|
|
|
static void hci_cc_write_page_scan_type(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 status = *((u8 *) skb->data);
|
|
|
|
u8 *type;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
type = hci_sent_cmd_data(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE);
|
|
|
|
if (type)
|
|
|
|
hdev->page_scan_type = *type;
|
|
|
|
}
|
|
|
|
|
2011-12-07 17:56:51 +04:00
|
|
|
static void hci_cc_read_data_block_size(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-12-07 17:56:51 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_data_block_size *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-12-07 17:56:51 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->block_mtu = __le16_to_cpu(rp->max_acl_len);
|
|
|
|
hdev->block_len = __le16_to_cpu(rp->block_len);
|
|
|
|
hdev->num_blocks = __le16_to_cpu(rp->num_blocks);
|
|
|
|
|
|
|
|
hdev->block_cnt = hdev->num_blocks;
|
|
|
|
|
|
|
|
BT_DBG("%s blk mtu %d cnt %d len %d", hdev->name, hdev->block_mtu,
|
2012-05-17 07:36:24 +04:00
|
|
|
hdev->block_cnt, hdev->block_len);
|
2011-12-07 17:56:51 +04:00
|
|
|
}
|
|
|
|
|
2014-06-28 18:54:06 +04:00
|
|
|
static void hci_cc_read_clock(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_clock *rp = (void *) skb->data;
|
|
|
|
struct hci_cp_read_clock *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
if (skb->len < sizeof(*rp))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK);
|
|
|
|
if (!cp)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (cp->which == 0x00) {
|
|
|
|
hdev->clock = le32_to_cpu(rp->clock);
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
|
|
|
if (conn) {
|
|
|
|
conn->clock = le32_to_cpu(rp->clock);
|
|
|
|
conn->clock_accuracy = le16_to_cpu(rp->accuracy);
|
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2011-10-12 11:53:57 +04:00
|
|
|
static void hci_cc_read_local_amp_info(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-10-12 11:53:57 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_read_local_amp_info *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-10-12 11:53:57 +04:00
|
|
|
|
|
|
|
if (rp->status)
|
2015-07-24 12:10:16 +03:00
|
|
|
return;
|
2011-10-12 11:53:57 +04:00
|
|
|
|
|
|
|
hdev->amp_status = rp->amp_status;
|
|
|
|
hdev->amp_total_bw = __le32_to_cpu(rp->total_bw);
|
|
|
|
hdev->amp_max_bw = __le32_to_cpu(rp->max_bw);
|
|
|
|
hdev->amp_min_latency = __le32_to_cpu(rp->min_latency);
|
|
|
|
hdev->amp_max_pdu = __le32_to_cpu(rp->max_pdu);
|
|
|
|
hdev->amp_type = rp->amp_type;
|
|
|
|
hdev->amp_pal_cap = __le16_to_cpu(rp->pal_cap);
|
|
|
|
hdev->amp_assoc_size = __le16_to_cpu(rp->max_assoc_size);
|
|
|
|
hdev->amp_be_flush_to = __le32_to_cpu(rp->be_flush_to);
|
|
|
|
hdev->amp_max_flush_to = __le32_to_cpu(rp->max_flush_to);
|
|
|
|
}
|
|
|
|
|
2011-01-25 02:19:58 +03:00
|
|
|
static void hci_cc_read_inq_rsp_tx_power(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-01-25 02:19:58 +03:00
|
|
|
{
|
2012-03-12 06:27:21 +04:00
|
|
|
struct hci_rp_read_inq_rsp_tx_power *rp = (void *) skb->data;
|
2011-01-25 02:19:58 +03:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2012-03-12 06:27:21 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->inq_tx_power = rp->tx_power;
|
2011-01-25 02:19:58 +03:00
|
|
|
}
|
|
|
|
|
2020-03-05 19:14:59 +03:00
|
|
|
static void hci_cc_read_def_err_data_reporting(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_def_err_data_reporting *rp = (void *)skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->err_data_reporting = rp->err_data_reporting;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_write_def_err_data_reporting(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *)skb->data);
|
|
|
|
struct hci_cp_write_def_err_data_reporting *cp;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_WRITE_DEF_ERR_DATA_REPORTING);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->err_data_reporting = cp->err_data_reporting;
|
|
|
|
}
|
|
|
|
|
2011-01-22 07:10:07 +03:00
|
|
|
static void hci_cc_pin_code_reply(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_pin_code_reply *rp = (void *) skb->data;
|
|
|
|
struct hci_cp_pin_code_reply *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-01-22 07:10:07 +03:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-11-08 22:40:14 +04:00
|
|
|
mgmt_pin_code_reply_complete(hdev, &rp->bdaddr, rp->status);
|
2011-01-22 07:10:07 +03:00
|
|
|
|
2012-08-09 11:52:29 +04:00
|
|
|
if (rp->status)
|
2011-11-08 22:40:16 +04:00
|
|
|
goto unlock;
|
2011-01-22 07:10:07 +03:00
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_PIN_CODE_REPLY);
|
|
|
|
if (!cp)
|
2011-11-08 22:40:16 +04:00
|
|
|
goto unlock;
|
2011-01-22 07:10:07 +03:00
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
|
|
|
|
if (conn)
|
|
|
|
conn->pin_length = cp->pin_len;
|
2011-11-08 22:40:16 +04:00
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
2011-01-22 07:10:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_pin_code_neg_reply(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_pin_code_neg_reply *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-01-22 07:10:07 +03:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-11-08 22:40:14 +04:00
|
|
|
mgmt_pin_code_neg_reply_complete(hdev, &rp->bdaddr,
|
2012-05-17 07:36:24 +04:00
|
|
|
rp->status);
|
2011-11-08 22:40:16 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-01-22 07:10:07 +03:00
|
|
|
}
|
2011-11-08 22:40:16 +04:00
|
|
|
|
2011-02-11 04:38:48 +03:00
|
|
|
static void hci_cc_le_read_buffer_size(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_buffer_size *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-02-11 04:38:48 +03:00
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_mtu = __le16_to_cpu(rp->le_mtu);
|
|
|
|
hdev->le_pkts = rp->le_max_pkt;
|
|
|
|
|
|
|
|
hdev->le_cnt = hdev->le_pkts;
|
|
|
|
|
|
|
|
BT_DBG("%s le mtu %d:%d", hdev->name, hdev->le_mtu, hdev->le_pkts);
|
|
|
|
}
|
2011-01-22 07:10:07 +03:00
|
|
|
|
2013-01-22 16:01:59 +04:00
|
|
|
static void hci_cc_le_read_local_features(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_local_features *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
memcpy(hdev->le_features, rp->features, 8);
|
2013-01-22 16:01:59 +04:00
|
|
|
}
|
|
|
|
|
2012-10-19 21:57:49 +04:00
|
|
|
static void hci_cc_le_read_adv_tx_power(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_adv_tx_power *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->adv_tx_power = rp->tx_power;
|
2012-10-19 21:57:49 +04:00
|
|
|
}
|
|
|
|
|
2011-02-19 18:05:57 +03:00
|
|
|
static void hci_cc_user_confirm_reply(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-02-19 18:05:57 +03:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-03-08 08:25:00 +04:00
|
|
|
mgmt_user_confirm_reply_complete(hdev, &rp->bdaddr, ACL_LINK, 0,
|
|
|
|
rp->status);
|
2011-11-08 22:40:16 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-02-19 18:05:57 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_user_confirm_neg_reply(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-02-19 18:05:57 +03:00
|
|
|
{
|
|
|
|
struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-02-19 18:05:57 +03:00
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-11-08 22:40:14 +04:00
|
|
|
mgmt_user_confirm_neg_reply_complete(hdev, &rp->bdaddr,
|
2012-03-08 08:25:00 +04:00
|
|
|
ACL_LINK, 0, rp->status);
|
2011-11-08 22:40:16 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-02-19 18:05:57 +03:00
|
|
|
}
|
|
|
|
|
2011-11-23 20:28:34 +04:00
|
|
|
static void hci_cc_user_passkey_reply(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-11-23 20:28:34 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-02-09 17:26:12 +04:00
|
|
|
mgmt_user_passkey_reply_complete(hdev, &rp->bdaddr, ACL_LINK,
|
2012-03-08 08:25:00 +04:00
|
|
|
0, rp->status);
|
2011-11-23 20:28:34 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_user_passkey_neg_reply(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct sk_buff *skb)
|
2011-11-23 20:28:34 +04:00
|
|
|
{
|
|
|
|
struct hci_rp_user_confirm_reply *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-11-23 20:28:34 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-11-23 20:28:34 +04:00
|
|
|
mgmt_user_passkey_neg_reply_complete(hdev, &rp->bdaddr,
|
2012-03-08 08:25:00 +04:00
|
|
|
ACL_LINK, 0, rp->status);
|
2011-11-23 20:28:34 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-01-10 14:07:26 +04:00
|
|
|
static void hci_cc_read_local_oob_data(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2011-03-22 15:12:21 +03:00
|
|
|
{
|
|
|
|
struct hci_rp_read_local_oob_data *rp = (void *) skb->data;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2014-01-10 14:07:26 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_read_local_oob_ext_data(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
2011-03-22 15:12:21 +03:00
|
|
|
}
|
|
|
|
|
2014-02-20 07:52:13 +04:00
|
|
|
static void hci_cc_le_set_random_addr(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
bdaddr_t *sent;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2014-02-20 07:52:13 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_RANDOM_ADDR);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
bacpy(&hdev->random_addr, sent);
|
2014-02-20 07:52:13 +04:00
|
|
|
|
2021-08-03 02:56:19 +03:00
|
|
|
if (!bacmp(&hdev->rpa, sent)) {
|
|
|
|
hci_dev_clear_flag(hdev, HCI_RPA_EXPIRED);
|
|
|
|
queue_delayed_work(hdev->workqueue, &hdev->rpa_expired,
|
|
|
|
secs_to_jiffies(hdev->rpa_timeout));
|
|
|
|
}
|
|
|
|
|
2014-02-20 07:52:13 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:35 +03:00
|
|
|
static void hci_cc_le_set_default_phy(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
struct hci_cp_le_set_default_phy *cp;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_DEFAULT_PHY);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
hdev->le_tx_def_phys = cp->tx_phys;
|
|
|
|
hdev->le_rx_def_phys = cp->rx_phys;
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:45 +03:00
|
|
|
static void hci_cc_le_set_adv_set_random_addr(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
struct hci_cp_le_set_adv_set_rand_addr *cp;
|
2021-08-03 02:56:19 +03:00
|
|
|
struct adv_info *adv;
|
2018-07-19 14:39:45 +03:00
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_SET_RAND_ADDR);
|
2021-08-03 02:56:19 +03:00
|
|
|
/* Update only in case the adv instance since handle 0x00 shall be using
|
|
|
|
* HCI_OP_LE_SET_RANDOM_ADDR since that allows both extended and
|
|
|
|
* non-extended adverting.
|
|
|
|
*/
|
|
|
|
if (!cp || !cp->handle)
|
2018-07-19 14:39:45 +03:00
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2021-08-03 02:56:19 +03:00
|
|
|
adv = hci_find_adv_instance(hdev, cp->handle);
|
|
|
|
if (adv) {
|
|
|
|
bacpy(&adv->random_addr, &cp->bdaddr);
|
|
|
|
if (!bacmp(&hdev->rpa, &cp->bdaddr)) {
|
|
|
|
adv->rpa_expired = false;
|
|
|
|
queue_delayed_work(hdev->workqueue,
|
|
|
|
&adv->rpa_expired_cb,
|
|
|
|
secs_to_jiffies(hdev->rpa_timeout));
|
|
|
|
}
|
2018-07-19 14:39:45 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2020-12-03 23:12:51 +03:00
|
|
|
static void hci_cc_le_read_transmit_power(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_transmit_power *rp = (void *)skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->min_le_tx_power = rp->min_le_tx_power;
|
|
|
|
hdev->max_le_tx_power = rp->max_le_tx_power;
|
|
|
|
}
|
|
|
|
|
2012-11-08 04:23:01 +04:00
|
|
|
static void hci_cc_le_set_adv_enable(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 *sent, status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
2012-11-08 04:23:01 +04:00
|
|
|
return;
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_ENABLE);
|
|
|
|
if (!sent)
|
2014-03-25 12:30:49 +04:00
|
|
|
return;
|
|
|
|
|
2012-11-08 04:23:01 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-10-28 07:12:20 +03:00
|
|
|
/* If we're doing connection initiation as peripheral. Set a
|
2014-03-25 12:30:49 +04:00
|
|
|
* timeout in case something goes wrong.
|
|
|
|
*/
|
|
|
|
if (*sent) {
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_LE_ADV);
|
2014-07-08 16:07:47 +04:00
|
|
|
|
2015-08-07 21:22:52 +03:00
|
|
|
conn = hci_lookup_le_connect(hdev);
|
2014-03-25 12:30:49 +04:00
|
|
|
if (conn)
|
|
|
|
queue_delayed_work(hdev->workqueue,
|
|
|
|
&conn->le_conn_timeout,
|
2014-07-06 14:41:15 +04:00
|
|
|
conn->conn_timeout);
|
2014-07-08 16:07:47 +04:00
|
|
|
} else {
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_LE_ADV);
|
2014-03-25 12:30:49 +04:00
|
|
|
}
|
|
|
|
|
2013-03-16 02:07:01 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2012-11-08 04:23:01 +04:00
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
static void hci_cc_le_set_ext_adv_enable(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_ext_adv_enable *cp;
|
2021-08-03 02:56:18 +03:00
|
|
|
struct hci_cp_ext_adv_set *set;
|
2018-07-19 14:39:41 +03:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2021-08-03 02:56:18 +03:00
|
|
|
struct adv_info *adv = NULL, *n;
|
2018-07-19 14:39:41 +03:00
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_EXT_ADV_ENABLE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
2021-08-03 02:56:18 +03:00
|
|
|
set = (void *)cp->data;
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2021-08-03 02:56:18 +03:00
|
|
|
if (cp->num_of_sets)
|
|
|
|
adv = hci_find_adv_instance(hdev, set->handle);
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
if (cp->enable) {
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
hci_dev_set_flag(hdev, HCI_LE_ADV);
|
|
|
|
|
2021-08-03 02:56:18 +03:00
|
|
|
if (adv)
|
|
|
|
adv->enabled = true;
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
conn = hci_lookup_le_connect(hdev);
|
|
|
|
if (conn)
|
|
|
|
queue_delayed_work(hdev->workqueue,
|
|
|
|
&conn->le_conn_timeout,
|
|
|
|
conn->conn_timeout);
|
2018-07-19 14:39:43 +03:00
|
|
|
} else {
|
2021-10-28 14:17:25 +03:00
|
|
|
if (cp->num_of_sets) {
|
|
|
|
if (adv)
|
|
|
|
adv->enabled = false;
|
|
|
|
|
2021-08-03 02:56:18 +03:00
|
|
|
/* If just one instance was disabled check if there are
|
|
|
|
* any other instance enabled before clearing HCI_LE_ADV
|
|
|
|
*/
|
|
|
|
list_for_each_entry_safe(adv, n, &hdev->adv_instances,
|
|
|
|
list) {
|
|
|
|
if (adv->enabled)
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* All instances shall be considered disabled */
|
|
|
|
list_for_each_entry_safe(adv, n, &hdev->adv_instances,
|
|
|
|
list)
|
|
|
|
adv->enabled = false;
|
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:43 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_LE_ADV);
|
2018-07-19 14:39:41 +03:00
|
|
|
}
|
|
|
|
|
2021-08-03 02:56:18 +03:00
|
|
|
unlock:
|
2018-07-19 14:39:41 +03:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-03-21 23:18:10 +04:00
|
|
|
static void hci_cc_le_set_scan_param(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_scan_param *cp;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2014-03-21 23:18:10 +04:00
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_PARAM);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
hdev->le_scan_type = cp->type;
|
2014-03-21 23:18:10 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:28 +03:00
|
|
|
static void hci_cc_le_set_ext_scan_param(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_ext_scan_params *cp;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
struct hci_cp_le_scan_phy_params *phy_param;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_EXT_SCAN_PARAMS);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
phy_param = (void *)cp->data;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
hdev->le_scan_type = phy_param->type;
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-03-25 12:51:52 +04:00
|
|
|
static bool has_pending_adv_report(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct discovery_state *d = &hdev->discovery;
|
|
|
|
|
|
|
|
return bacmp(&d->last_adv_addr, BDADDR_ANY);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void clear_pending_adv_report(struct hci_dev *hdev)
|
|
|
|
{
|
|
|
|
struct discovery_state *d = &hdev->discovery;
|
|
|
|
|
|
|
|
bacpy(&d->last_adv_addr, BDADDR_ANY);
|
|
|
|
d->last_adv_data_len = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void store_pending_adv_report(struct hci_dev *hdev, bdaddr_t *bdaddr,
|
2014-07-01 16:11:21 +04:00
|
|
|
u8 bdaddr_type, s8 rssi, u32 flags,
|
|
|
|
u8 *data, u8 len)
|
2014-03-25 12:51:52 +04:00
|
|
|
{
|
|
|
|
struct discovery_state *d = &hdev->discovery;
|
|
|
|
|
2020-07-27 23:48:55 +03:00
|
|
|
if (len > HCI_MAX_AD_LENGTH)
|
|
|
|
return;
|
|
|
|
|
2014-03-25 12:51:52 +04:00
|
|
|
bacpy(&d->last_adv_addr, bdaddr);
|
|
|
|
d->last_adv_addr_type = bdaddr_type;
|
2014-03-25 16:40:52 +04:00
|
|
|
d->last_adv_rssi = rssi;
|
2014-07-01 16:11:21 +04:00
|
|
|
d->last_adv_flags = flags;
|
2014-03-25 12:51:52 +04:00
|
|
|
memcpy(d->last_adv_data, data, len);
|
|
|
|
d->last_adv_data_len = len;
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:27 +03:00
|
|
|
static void le_set_scan_enable_complete(struct hci_dev *hdev, u8 enable)
|
2011-05-26 23:23:52 +04:00
|
|
|
{
|
2014-12-11 16:28:15 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2018-07-06 14:35:27 +03:00
|
|
|
switch (enable) {
|
2013-04-05 03:21:02 +04:00
|
|
|
case LE_SCAN_ENABLE:
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_LE_SCAN);
|
2014-03-25 12:51:52 +04:00
|
|
|
if (hdev->le_scan_type == LE_SCAN_ACTIVE)
|
|
|
|
clear_pending_adv_report(hdev);
|
2011-12-19 18:14:18 +04:00
|
|
|
break;
|
|
|
|
|
2013-04-05 03:21:02 +04:00
|
|
|
case LE_SCAN_DISABLE:
|
2014-03-25 12:51:52 +04:00
|
|
|
/* We do this here instead of when setting DISCOVERY_STOPPED
|
|
|
|
* since the latter would potentially require waiting for
|
|
|
|
* inquiry to stop too.
|
|
|
|
*/
|
|
|
|
if (has_pending_adv_report(hdev)) {
|
|
|
|
struct discovery_state *d = &hdev->discovery;
|
|
|
|
|
|
|
|
mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
|
2014-03-26 16:17:12 +04:00
|
|
|
d->last_adv_addr_type, NULL,
|
2014-07-01 16:11:21 +04:00
|
|
|
d->last_adv_rssi, d->last_adv_flags,
|
2014-03-26 16:17:12 +04:00
|
|
|
d->last_adv_data,
|
2014-03-25 12:51:52 +04:00
|
|
|
d->last_adv_data_len, NULL, 0);
|
|
|
|
}
|
|
|
|
|
2014-02-28 22:26:12 +04:00
|
|
|
/* Cancel this timer so that we don't try to disable scanning
|
|
|
|
* when it's already disabled.
|
|
|
|
*/
|
|
|
|
cancel_delayed_work(&hdev->le_scan_disable);
|
|
|
|
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_LE_SCAN);
|
2014-07-08 16:07:53 +04:00
|
|
|
|
2014-02-28 22:26:13 +04:00
|
|
|
/* The HCI_LE_SCAN_INTERRUPTED flag indicates that we
|
|
|
|
* interrupted scanning due to a connect request. Mark
|
2014-07-08 16:07:53 +04:00
|
|
|
* therefore discovery as stopped. If this was not
|
|
|
|
* because of a connect request advertising might have
|
|
|
|
* been disabled because of active scanning, so
|
|
|
|
* re-enable it again if necessary.
|
2014-02-28 22:26:13 +04:00
|
|
|
*/
|
2015-03-13 12:11:05 +03:00
|
|
|
if (hci_dev_test_and_clear_flag(hdev, HCI_LE_SCAN_INTERRUPTED))
|
2014-02-28 22:26:13 +04:00
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
2015-03-13 12:11:00 +03:00
|
|
|
else if (!hci_dev_test_flag(hdev, HCI_LE_ADV) &&
|
2014-07-08 17:05:05 +04:00
|
|
|
hdev->discovery.state == DISCOVERY_FINDING)
|
2015-11-18 13:49:20 +03:00
|
|
|
hci_req_reenable_advertising(hdev);
|
2014-07-08 16:07:53 +04:00
|
|
|
|
2011-12-19 18:14:18 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "use of reserved LE_Scan_Enable param %d",
|
2018-07-06 14:35:27 +03:00
|
|
|
enable);
|
2011-12-19 18:14:18 +04:00
|
|
|
break;
|
2011-05-26 23:23:53 +04:00
|
|
|
}
|
2014-12-11 16:28:15 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-05-26 23:23:52 +04:00
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:27 +03:00
|
|
|
static void hci_cc_le_set_scan_enable(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_scan_enable *cp;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_SCAN_ENABLE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
le_set_scan_enable_complete(hdev, cp->enable);
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:28 +03:00
|
|
|
static void hci_cc_le_set_ext_scan_enable(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_ext_scan_enable *cp;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_EXT_SCAN_ENABLE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
le_set_scan_enable_complete(hdev, cp->enable);
|
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:40 +03:00
|
|
|
static void hci_cc_le_read_num_adv_sets(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_num_supported_adv_sets *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x No of Adv sets %u", hdev->name, rp->status,
|
|
|
|
rp->num_of_sets);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_num_of_adv_sets = rp->num_of_sets;
|
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
static void hci_cc_le_read_accept_list_size(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2013-01-22 16:02:00 +04:00
|
|
|
{
|
2021-06-04 11:26:27 +03:00
|
|
|
struct hci_rp_le_read_accept_list_size *rp = (void *)skb->data;
|
2013-01-22 16:02:00 +04:00
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x size %u", hdev->name, rp->status, rp->size);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
hdev->le_accept_list_size = rp->size;
|
2013-01-22 16:02:00 +04:00
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
static void hci_cc_le_clear_accept_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2014-02-28 08:37:31 +04:00
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
hci_bdaddr_list_clear(&hdev->le_accept_list);
|
2014-02-28 08:37:31 +04:00
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
static void hci_cc_le_add_to_accept_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2014-02-28 08:37:31 +04:00
|
|
|
{
|
2021-06-04 11:26:27 +03:00
|
|
|
struct hci_cp_le_add_to_accept_list *sent;
|
2014-02-28 08:37:31 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_ADD_TO_ACCEPT_LIST);
|
2014-02-28 08:37:31 +04:00
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
hci_bdaddr_list_add(&hdev->le_accept_list, &sent->bdaddr,
|
|
|
|
sent->bdaddr_type);
|
2014-02-28 08:37:31 +04:00
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
static void hci_cc_le_del_from_accept_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2014-02-28 08:37:31 +04:00
|
|
|
{
|
2021-06-04 11:26:27 +03:00
|
|
|
struct hci_cp_le_del_from_accept_list *sent;
|
2014-02-28 08:37:31 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_DEL_FROM_ACCEPT_LIST);
|
2014-02-28 08:37:31 +04:00
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
hci_bdaddr_list_del(&hdev->le_accept_list, &sent->bdaddr,
|
2014-07-09 13:59:13 +04:00
|
|
|
sent->bdaddr_type);
|
2014-02-28 08:37:31 +04:00
|
|
|
}
|
|
|
|
|
2013-01-22 16:02:01 +04:00
|
|
|
static void hci_cc_le_read_supported_states(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_supported_states *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
memcpy(hdev->le_states, rp->le_states, 8);
|
2013-01-22 16:02:01 +04:00
|
|
|
}
|
|
|
|
|
2014-12-20 18:28:40 +03:00
|
|
|
static void hci_cc_le_read_def_data_len(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_def_data_len *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_def_tx_len = le16_to_cpu(rp->tx_len);
|
|
|
|
hdev->le_def_tx_time = le16_to_cpu(rp->tx_time);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_le_write_def_data_len(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_write_def_data_len *sent;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_WRITE_DEF_DATA_LEN);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_def_tx_len = le16_to_cpu(sent->tx_len);
|
|
|
|
hdev->le_def_tx_time = le16_to_cpu(sent->tx_time);
|
|
|
|
}
|
|
|
|
|
2018-08-17 04:59:19 +03:00
|
|
|
static void hci_cc_le_add_to_resolv_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_add_to_resolv_list *sent;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_ADD_TO_RESOLV_LIST);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_bdaddr_list_add_with_irk(&hdev->le_resolv_list, &sent->bdaddr,
|
|
|
|
sent->bdaddr_type, sent->peer_irk,
|
|
|
|
sent->local_irk);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cc_le_del_from_resolv_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_del_from_resolv_list *sent;
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_DEL_FROM_RESOLV_LIST);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_bdaddr_list_del_with_irk(&hdev->le_resolv_list, &sent->bdaddr,
|
|
|
|
sent->bdaddr_type);
|
|
|
|
}
|
|
|
|
|
2018-06-29 09:43:20 +03:00
|
|
|
static void hci_cc_le_clear_resolv_list(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_bdaddr_list_clear(&hdev->le_resolv_list);
|
|
|
|
}
|
|
|
|
|
2018-06-29 09:42:50 +03:00
|
|
|
static void hci_cc_le_read_resolv_list_size(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_resolv_list_size *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x size %u", hdev->name, rp->status, rp->size);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_resolv_list_size = rp->size;
|
|
|
|
}
|
|
|
|
|
2018-08-07 10:46:35 +03:00
|
|
|
static void hci_cc_le_set_addr_resolution_enable(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__u8 *sent, status = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADDR_RESOLV_ENABLE);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
if (*sent)
|
|
|
|
hci_dev_set_flag(hdev, HCI_LL_RPA_RESOLUTION);
|
|
|
|
else
|
|
|
|
hci_dev_clear_flag(hdev, HCI_LL_RPA_RESOLUTION);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-12-20 18:28:40 +03:00
|
|
|
static void hci_cc_le_read_max_data_len(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_read_max_data_len *rp = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdev->le_max_tx_len = le16_to_cpu(rp->tx_len);
|
|
|
|
hdev->le_max_tx_time = le16_to_cpu(rp->tx_time);
|
|
|
|
hdev->le_max_rx_len = le16_to_cpu(rp->rx_len);
|
|
|
|
hdev->le_max_rx_time = le16_to_cpu(rp->rx_time);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_cc_write_le_host_supported(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2011-07-01 02:20:53 +04:00
|
|
|
{
|
2012-02-22 18:37:11 +04:00
|
|
|
struct hci_cp_write_le_host_supported *sent;
|
2011-07-01 02:20:53 +04:00
|
|
|
__u8 status = *((__u8 *) skb->data);
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2011-07-01 02:20:53 +04:00
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
2012-02-22 18:37:11 +04:00
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED);
|
2012-02-28 03:07:22 +04:00
|
|
|
if (!sent)
|
2011-07-01 02:20:53 +04:00
|
|
|
return;
|
|
|
|
|
2014-12-11 16:28:15 +03:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-07-05 12:48:01 +04:00
|
|
|
if (sent->le) {
|
|
|
|
hdev->features[1][0] |= LMP_HOST_LE;
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_LE_ENABLED);
|
2014-07-05 12:48:01 +04:00
|
|
|
} else {
|
|
|
|
hdev->features[1][0] &= ~LMP_HOST_LE;
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_LE_ENABLED);
|
|
|
|
hci_dev_clear_flag(hdev, HCI_ADVERTISING);
|
2012-02-28 03:07:22 +04:00
|
|
|
}
|
2014-07-05 12:48:01 +04:00
|
|
|
|
|
|
|
if (sent->simul)
|
|
|
|
hdev->features[1][0] |= LMP_HOST_LE_BREDR;
|
|
|
|
else
|
|
|
|
hdev->features[1][0] &= ~LMP_HOST_LE_BREDR;
|
2014-12-11 16:28:15 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-07-01 02:20:53 +04:00
|
|
|
}
|
|
|
|
|
2014-02-27 16:05:40 +04:00
|
|
|
static void hci_cc_set_adv_param(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_set_adv_param *cp;
|
|
|
|
u8 status = *((u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_ADV_PARAM);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
hdev->adv_addr_type = cp->own_address_type;
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
static void hci_cc_set_ext_adv_param(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_le_set_ext_adv_params *rp = (void *) skb->data;
|
|
|
|
struct hci_cp_le_set_ext_adv_params *cp;
|
|
|
|
struct adv_info *adv_instance;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_SET_EXT_ADV_PARAMS);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
hdev->adv_addr_type = cp->own_addr_type;
|
2021-04-06 02:33:04 +03:00
|
|
|
if (!cp->handle) {
|
2018-07-19 14:39:41 +03:00
|
|
|
/* Store in hdev for instance 0 */
|
|
|
|
hdev->adv_tx_power = rp->tx_power;
|
|
|
|
} else {
|
2021-04-06 02:33:04 +03:00
|
|
|
adv_instance = hci_find_adv_instance(hdev, cp->handle);
|
2018-07-19 14:39:41 +03:00
|
|
|
if (adv_instance)
|
|
|
|
adv_instance->tx_power = rp->tx_power;
|
|
|
|
}
|
2018-07-19 14:39:42 +03:00
|
|
|
/* Update adv data as tx power is known now */
|
2021-04-06 02:33:04 +03:00
|
|
|
hci_req_update_adv_data(hdev, cp->handle);
|
2020-12-03 23:12:49 +03:00
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-05-08 17:32:08 +04:00
|
|
|
static void hci_cc_read_rssi(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_rp_read_rssi *rp = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
|
|
|
if (conn)
|
|
|
|
conn->rssi = rp->rssi;
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-05-09 23:35:28 +04:00
|
|
|
static void hci_cc_read_tx_power(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_cp_read_tx_power *sent;
|
|
|
|
struct hci_rp_read_tx_power *rp = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, rp->status);
|
|
|
|
|
|
|
|
if (rp->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sent = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
|
|
|
|
if (!sent)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(rp->handle));
|
2014-05-14 15:43:05 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
switch (sent->type) {
|
|
|
|
case 0x00:
|
2014-05-09 23:35:28 +04:00
|
|
|
conn->tx_power = rp->tx_power;
|
2014-05-14 15:43:05 +04:00
|
|
|
break;
|
|
|
|
case 0x01:
|
|
|
|
conn->max_tx_power = rp->tx_power;
|
|
|
|
break;
|
|
|
|
}
|
2014-05-09 23:35:28 +04:00
|
|
|
|
2014-05-14 15:43:05 +04:00
|
|
|
unlock:
|
2014-05-09 23:35:28 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2015-02-01 02:07:52 +03:00
|
|
|
static void hci_cc_write_ssp_debug_mode(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 status = *((u8 *) skb->data);
|
|
|
|
u8 *mode;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
mode = hci_sent_cmd_data(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE);
|
|
|
|
if (mode)
|
|
|
|
hdev->ssp_debug_mode = *mode;
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_cs_inquiry(struct hci_dev *hdev, __u8 status)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
if (status) {
|
|
|
|
hci_conn_check_pending(hdev);
|
2011-04-27 18:29:57 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-11-04 21:16:53 +04:00
|
|
|
set_bit(HCI_INQUIRY, &hdev->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_cs_create_conn(struct hci_dev *hdev, __u8 status)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_cp_create_conn *cp;
|
2005-04-17 02:20:36 +04:00
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_CREATE_CONN);
|
2005-04-17 02:20:36 +04:00
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
|
|
|
|
|
2012-09-25 13:49:43 +04:00
|
|
|
BT_DBG("%s bdaddr %pMR hcon %p", hdev->name, &cp->bdaddr, conn);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
if (status) {
|
|
|
|
if (conn && conn->state == BT_CONNECT) {
|
2006-10-15 19:30:56 +04:00
|
|
|
if (status != 0x0c || conn->attempt > 2) {
|
|
|
|
conn->state = BT_CLOSED;
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2006-10-15 19:30:56 +04:00
|
|
|
hci_conn_del(conn);
|
|
|
|
} else
|
|
|
|
conn->state = BT_CONNECT2;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!conn) {
|
2014-07-16 12:56:07 +04:00
|
|
|
conn = hci_conn_add(hdev, ACL_LINK, &cp->bdaddr,
|
|
|
|
HCI_ROLE_MASTER);
|
|
|
|
if (!conn)
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "no memory for new connection");
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cs_add_sco(struct hci_dev *hdev, __u8 status)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_cp_add_sco *cp;
|
|
|
|
struct hci_conn *acl, *sco;
|
|
|
|
__u16 handle;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (!status)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_ADD_SCO);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
handle = __le16_to_cpu(cp->handle);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
acl = hci_conn_hash_lookup_handle(hdev, handle);
|
2011-01-11 18:20:20 +03:00
|
|
|
if (acl) {
|
|
|
|
sco = acl->link;
|
|
|
|
if (sco) {
|
|
|
|
sco->state = BT_CLOSED;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(sco, status);
|
2011-01-11 18:20:20 +03:00
|
|
|
hci_conn_del(sco);
|
|
|
|
}
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:49 +04:00
|
|
|
static void hci_cs_auth_requested(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_auth_requested *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_AUTH_REQUESTED);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (conn->state == BT_CONFIG) {
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:49 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cs_set_conn_encrypt(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_set_conn_encrypt *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_SET_CONN_ENCRYPT);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (conn->state == BT_CONFIG) {
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:49 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2010-11-18 23:22:29 +03:00
|
|
|
static int hci_outgoing_auth_needed(struct hci_dev *hdev,
|
2012-05-17 07:36:24 +04:00
|
|
|
struct hci_conn *conn)
|
2010-11-18 23:22:28 +03:00
|
|
|
{
|
|
|
|
if (conn->state != BT_CONFIG || !conn->out)
|
|
|
|
return 0;
|
|
|
|
|
2011-01-19 09:36:52 +03:00
|
|
|
if (conn->pending_sec_level == BT_SECURITY_SDP)
|
2010-11-18 23:22:28 +03:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Only request authentication for SSP connections or non-SSP
|
2014-01-08 18:40:39 +04:00
|
|
|
* devices with sec_level MEDIUM or HIGH or if MITM protection
|
|
|
|
* is requested.
|
|
|
|
*/
|
2012-05-17 07:36:24 +04:00
|
|
|
if (!hci_conn_ssp_enabled(conn) && !(conn->auth_type & 0x01) &&
|
2014-05-30 15:45:19 +04:00
|
|
|
conn->pending_sec_level != BT_SECURITY_FIPS &&
|
2014-01-08 18:40:39 +04:00
|
|
|
conn->pending_sec_level != BT_SECURITY_HIGH &&
|
|
|
|
conn->pending_sec_level != BT_SECURITY_MEDIUM)
|
2010-11-18 23:22:28 +03:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static int hci_resolve_name(struct hci_dev *hdev,
|
2012-03-08 08:25:00 +04:00
|
|
|
struct inquiry_entry *e)
|
2012-01-04 17:44:20 +04:00
|
|
|
{
|
|
|
|
struct hci_cp_remote_name_req cp;
|
|
|
|
|
|
|
|
memset(&cp, 0, sizeof(cp));
|
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, &e->data.bdaddr);
|
|
|
|
cp.pscan_rep_mode = e->data.pscan_rep_mode;
|
|
|
|
cp.pscan_mode = e->data.pscan_mode;
|
|
|
|
cp.clock_offset = e->data.clock_offset;
|
|
|
|
|
|
|
|
return hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
|
|
|
|
}
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
static bool hci_resolve_next_name(struct hci_dev *hdev)
|
2012-01-04 17:44:20 +04:00
|
|
|
{
|
|
|
|
struct discovery_state *discov = &hdev->discovery;
|
|
|
|
struct inquiry_entry *e;
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
if (list_empty(&discov->resolve))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
|
2012-07-19 11:26:09 +04:00
|
|
|
if (!e)
|
|
|
|
return false;
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
if (hci_resolve_name(hdev, e) == 0) {
|
|
|
|
e->name_state = NAME_PENDING;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_check_pending_name(struct hci_dev *hdev, struct hci_conn *conn,
|
2012-03-08 08:25:00 +04:00
|
|
|
bdaddr_t *bdaddr, u8 *name, u8 name_len)
|
2012-01-17 23:48:47 +04:00
|
|
|
{
|
|
|
|
struct discovery_state *discov = &hdev->discovery;
|
|
|
|
struct inquiry_entry *e;
|
|
|
|
|
2014-11-11 12:33:24 +03:00
|
|
|
/* Update the mgmt connected state if necessary. Be careful with
|
|
|
|
* conn objects that exist but are not (yet) connected however.
|
|
|
|
* Only those in BT_CONFIG or BT_CONNECTED states can be
|
|
|
|
* considered connected.
|
|
|
|
*/
|
|
|
|
if (conn &&
|
|
|
|
(conn->state == BT_CONFIG || conn->state == BT_CONNECTED) &&
|
2014-11-07 14:09:09 +03:00
|
|
|
!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
|
2021-04-10 01:04:06 +03:00
|
|
|
mgmt_device_connected(hdev, conn, name, name_len);
|
2012-01-17 23:48:47 +04:00
|
|
|
|
|
|
|
if (discov->state == DISCOVERY_STOPPED)
|
|
|
|
return;
|
|
|
|
|
2012-01-04 17:44:20 +04:00
|
|
|
if (discov->state == DISCOVERY_STOPPING)
|
|
|
|
goto discov_complete;
|
|
|
|
|
|
|
|
if (discov->state != DISCOVERY_RESOLVING)
|
|
|
|
return;
|
|
|
|
|
|
|
|
e = hci_inquiry_cache_lookup_resolve(hdev, bdaddr, NAME_PENDING);
|
2012-07-19 11:26:10 +04:00
|
|
|
/* If the device was not found in a list of found devices names of which
|
|
|
|
* are pending. there is no need to continue resolving a next name as it
|
|
|
|
* will be done upon receiving another Remote Name Request Complete
|
|
|
|
* Event */
|
|
|
|
if (!e)
|
|
|
|
return;
|
|
|
|
|
|
|
|
list_del(&e->list);
|
|
|
|
if (name) {
|
2012-01-04 17:44:20 +04:00
|
|
|
e->name_state = NAME_KNOWN;
|
2012-07-19 11:26:10 +04:00
|
|
|
mgmt_remote_name(hdev, bdaddr, ACL_LINK, 0x00,
|
|
|
|
e->data.rssi, name, name_len);
|
2012-07-19 11:26:11 +04:00
|
|
|
} else {
|
|
|
|
e->name_state = NAME_NOT_KNOWN;
|
2012-01-04 17:44:20 +04:00
|
|
|
}
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
if (hci_resolve_next_name(hdev))
|
2012-01-04 17:44:20 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
discov_complete:
|
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cs_remote_name_req(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
2010-11-18 23:22:29 +03:00
|
|
|
struct hci_cp_remote_name_req *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2010-11-18 23:22:29 +03:00
|
|
|
|
|
|
|
/* If successful wait for the name req complete event before
|
|
|
|
* checking for the need to do authentication */
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_REMOTE_NAME_REQ);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-01-17 23:48:47 +04:00
|
|
|
hci_check_pending_name(hdev, conn, &cp->bdaddr, NULL, 0);
|
2012-01-04 17:44:20 +04:00
|
|
|
|
2011-04-28 22:28:55 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (!hci_outgoing_auth_needed(hdev, conn))
|
|
|
|
goto unlock;
|
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
|
2013-10-07 20:19:16 +04:00
|
|
|
struct hci_cp_auth_requested auth_cp;
|
|
|
|
|
2014-07-17 16:35:39 +04:00
|
|
|
set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
|
|
|
|
|
2013-10-07 20:19:16 +04:00
|
|
|
auth_cp.handle = __cpu_to_le16(conn->handle);
|
|
|
|
hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED,
|
|
|
|
sizeof(auth_cp), &auth_cp);
|
2010-11-18 23:22:29 +03:00
|
|
|
}
|
|
|
|
|
2011-04-28 22:28:55 +04:00
|
|
|
unlock:
|
2010-11-18 23:22:29 +03:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:49 +04:00
|
|
|
static void hci_cs_read_remote_features(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_read_remote_features *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_FEATURES);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (conn->state == BT_CONFIG) {
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:49 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cs_read_remote_ext_features(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_read_remote_ext_features *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (conn->state == BT_CONFIG) {
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:49 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cs_setup_sync_conn(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
2007-10-20 16:55:10 +04:00
|
|
|
struct hci_cp_setup_sync_conn *cp;
|
|
|
|
struct hci_conn *acl, *sco;
|
|
|
|
__u16 handle;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_SETUP_SYNC_CONN);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
handle = __le16_to_cpu(cp->handle);
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s handle 0x%4.4x", hdev->name, handle);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
acl = hci_conn_hash_lookup_handle(hdev, handle);
|
2011-01-11 18:20:20 +03:00
|
|
|
if (acl) {
|
|
|
|
sco = acl->link;
|
|
|
|
if (sco) {
|
|
|
|
sco->state = BT_CLOSED;
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(sco, status);
|
2011-01-11 18:20:20 +03:00
|
|
|
hci_conn_del(sco);
|
|
|
|
}
|
2007-10-20 16:55:10 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cs_sniff_mode(struct hci_dev *hdev, __u8 status)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_cp_sniff_mode *cp;
|
|
|
|
struct hci_conn *conn;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (!status)
|
|
|
|
return;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_SNIFF_MODE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
2010-07-26 18:06:00 +04:00
|
|
|
if (conn) {
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
|
2010-07-26 18:06:00 +04:00
|
|
|
hci_sco_setup(conn, status);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
static void hci_cs_exit_sniff_mode(struct hci_dev *hdev, __u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_exit_sniff_mode *cp;
|
|
|
|
struct hci_conn *conn;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
if (!status)
|
|
|
|
return;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_EXIT_SNIFF_MODE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
2010-07-26 18:06:00 +04:00
|
|
|
if (conn) {
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
|
2010-07-26 18:06:00 +04:00
|
|
|
hci_sco_setup(conn, status);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2012-02-09 16:27:38 +04:00
|
|
|
static void hci_cs_disconnect(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_disconnect *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_DISCONNECT);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
Bluetooth: clean up connection in hci_cs_disconnect
In bluetooth core specification 4.2,
Vol 2, Part E, 7.8.9 LE Set Advertise Enable Command, it says
The Controller shall continue advertising until ...
or until a connection is created or ...
In these cases, advertising is then disabled.
Hence, advertising would be disabled before a connection is
established. In current kernel implementation, advertising would
be re-enabled when all connections are terminated.
The correct disconnection flow looks like
< HCI Command: Disconnect
> HCI Event: Command Status
Status: Success
> HCI Event: Disconnect Complete
Status: Success
Specifically, the last Disconnect Complete Event would trigger a
callback function hci_event.c:hci_disconn_complete_evt() to
cleanup the connection and re-enable advertising when proper.
However, sometimes, there might occur an exception in the controller
when disconnection is being executed. The disconnection flow might
then look like
< HCI Command: Disconnect
> HCI Event: Command Status
Status: Unknown Connection Identifier
Note that "> HCI Event: Disconnect Complete" is missing when such an
exception occurs. This would result in advertising staying disabled
forever since the connection in question is not cleaned up correctly.
To fix the controller exception issue, we need to do some connection
cleanup when the disconnect command status indicates an error.
Signed-off-by: Joseph Hwang <josephsih@chromium.org>
Signed-off-by: Manish Mandlik <mmandlik@google.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-03-12 05:20:14 +03:00
|
|
|
if (conn) {
|
2012-02-09 16:27:38 +04:00
|
|
|
mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
|
2012-03-08 08:25:00 +04:00
|
|
|
conn->dst_type, status);
|
2012-02-09 16:27:38 +04:00
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
if (conn->type == LE_LINK) {
|
|
|
|
hdev->cur_adv_instance = conn->adv_instance;
|
|
|
|
hci_req_reenable_advertising(hdev);
|
|
|
|
}
|
|
|
|
|
Bluetooth: clean up connection in hci_cs_disconnect
In bluetooth core specification 4.2,
Vol 2, Part E, 7.8.9 LE Set Advertise Enable Command, it says
The Controller shall continue advertising until ...
or until a connection is created or ...
In these cases, advertising is then disabled.
Hence, advertising would be disabled before a connection is
established. In current kernel implementation, advertising would
be re-enabled when all connections are terminated.
The correct disconnection flow looks like
< HCI Command: Disconnect
> HCI Event: Command Status
Status: Success
> HCI Event: Disconnect Complete
Status: Success
Specifically, the last Disconnect Complete Event would trigger a
callback function hci_event.c:hci_disconn_complete_evt() to
cleanup the connection and re-enable advertising when proper.
However, sometimes, there might occur an exception in the controller
when disconnection is being executed. The disconnection flow might
then look like
< HCI Command: Disconnect
> HCI Event: Command Status
Status: Unknown Connection Identifier
Note that "> HCI Event: Disconnect Complete" is missing when such an
exception occurs. This would result in advertising staying disabled
forever since the connection in question is not cleaned up correctly.
To fix the controller exception issue, we need to do some connection
cleanup when the disconnect command status indicates an error.
Signed-off-by: Joseph Hwang <josephsih@chromium.org>
Signed-off-by: Manish Mandlik <mmandlik@google.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-03-12 05:20:14 +03:00
|
|
|
/* If the disconnection failed for any reason, the upper layer
|
|
|
|
* does not retry to disconnect in current implementation.
|
|
|
|
* Hence, we need to do some basic cleanup here and re-enable
|
|
|
|
* advertising if necessary.
|
|
|
|
*/
|
|
|
|
hci_conn_del(conn);
|
|
|
|
}
|
|
|
|
|
2012-02-09 16:27:38 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
static void cs_le_create_conn(struct hci_dev *hdev, bdaddr_t *peer_addr,
|
|
|
|
u8 peer_addr_type, u8 own_address_type,
|
|
|
|
u8 filter_policy)
|
2014-02-28 14:54:16 +04:00
|
|
|
{
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
conn = hci_conn_hash_lookup_le(hdev, peer_addr,
|
|
|
|
peer_addr_type);
|
2014-02-28 14:54:16 +04:00
|
|
|
if (!conn)
|
2018-07-06 14:35:30 +03:00
|
|
|
return;
|
2014-02-28 14:54:16 +04:00
|
|
|
|
2020-07-23 15:38:59 +03:00
|
|
|
/* When using controller based address resolution, then the new
|
|
|
|
* address types 0x02 and 0x03 are used. These types need to be
|
|
|
|
* converted back into either public address or random address type
|
|
|
|
*/
|
|
|
|
if (use_ll_privacy(hdev) &&
|
|
|
|
hci_dev_test_flag(hdev, HCI_LL_RPA_RESOLUTION)) {
|
|
|
|
switch (own_address_type) {
|
|
|
|
case ADDR_LE_DEV_PUBLIC_RESOLVED:
|
|
|
|
own_address_type = ADDR_LE_DEV_PUBLIC;
|
|
|
|
break;
|
|
|
|
case ADDR_LE_DEV_RANDOM_RESOLVED:
|
|
|
|
own_address_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-28 14:54:16 +04:00
|
|
|
/* Store the initiator and responder address information which
|
|
|
|
* is needed for SMP. These values will not change during the
|
|
|
|
* lifetime of the connection.
|
|
|
|
*/
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->init_addr_type = own_address_type;
|
|
|
|
if (own_address_type == ADDR_LE_DEV_RANDOM)
|
2014-02-28 14:54:16 +04:00
|
|
|
bacpy(&conn->init_addr, &hdev->random_addr);
|
|
|
|
else
|
|
|
|
bacpy(&conn->init_addr, &hdev->bdaddr);
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->resp_addr_type = peer_addr_type;
|
|
|
|
bacpy(&conn->resp_addr, peer_addr);
|
2014-02-28 14:54:16 +04:00
|
|
|
|
2014-02-28 19:45:46 +04:00
|
|
|
/* We don't want the connection attempt to stick around
|
|
|
|
* indefinitely since LE doesn't have a page timeout concept
|
|
|
|
* like BR/EDR. Set a timer for any connection that doesn't use
|
2021-06-04 11:26:27 +03:00
|
|
|
* the accept list for connecting.
|
2014-02-28 19:45:46 +04:00
|
|
|
*/
|
2018-07-06 14:35:30 +03:00
|
|
|
if (filter_policy == HCI_LE_USE_PEER_ADDR)
|
2014-02-28 19:45:46 +04:00
|
|
|
queue_delayed_work(conn->hdev->workqueue,
|
|
|
|
&conn->le_conn_timeout,
|
2014-07-06 14:41:15 +04:00
|
|
|
conn->conn_timeout);
|
2018-07-06 14:35:30 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_cs_le_create_conn(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_create_conn *cp;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
/* All connection failure handling is taken care of by the
|
|
|
|
* hci_le_conn_failed function which is triggered by the HCI
|
|
|
|
* request completion callbacks used for connecting.
|
|
|
|
*/
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_CREATE_CONN);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
cs_le_create_conn(hdev, &cp->peer_addr, cp->peer_addr_type,
|
|
|
|
cp->own_address_type, cp->filter_policy);
|
2014-02-28 19:45:46 +04:00
|
|
|
|
2014-02-28 14:54:16 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-06 23:50:32 +03:00
|
|
|
static void hci_cs_le_ext_create_conn(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_ext_create_conn *cp;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
/* All connection failure handling is taken care of by the
|
|
|
|
* hci_le_conn_failed function which is triggered by the HCI
|
|
|
|
* request completion callbacks used for connecting.
|
|
|
|
*/
|
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_EXT_CREATE_CONN);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
cs_le_create_conn(hdev, &cp->peer_addr, cp->peer_addr_type,
|
|
|
|
cp->own_addr_type, cp->filter_policy);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2015-04-08 19:05:27 +03:00
|
|
|
static void hci_cs_le_read_remote_features(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_read_remote_features *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_READ_REMOTE_FEATURES);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (conn->state == BT_CONFIG) {
|
|
|
|
hci_connect_cfm(conn, status);
|
|
|
|
hci_conn_drop(conn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-03-24 16:39:04 +04:00
|
|
|
static void hci_cs_le_start_enc(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_start_enc *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_LE_START_ENC);
|
|
|
|
if (!cp)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(cp->handle));
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (conn->state != BT_CONNECTED)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
|
|
|
|
hci_conn_drop(conn);
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2014-11-06 21:36:52 +03:00
|
|
|
static void hci_cs_switch_role(struct hci_dev *hdev, u8 status)
|
|
|
|
{
|
|
|
|
struct hci_cp_switch_role *cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
|
|
|
|
|
|
|
if (!status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
cp = hci_sent_cmd_data(hdev, HCI_OP_SWITCH_ROLE);
|
|
|
|
if (!cp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
|
|
|
|
if (conn)
|
|
|
|
clear_bit(HCI_CONN_RSWITCH_PEND, &conn->flags);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_inquiry_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
|
|
|
__u8 status = *((__u8 *) skb->data);
|
2012-01-04 17:44:20 +04:00
|
|
|
struct discovery_state *discov = &hdev->discovery;
|
|
|
|
struct inquiry_entry *e;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_conn_check_pending(hdev);
|
2011-11-04 21:16:53 +04:00
|
|
|
|
|
|
|
if (!test_and_clear_bit(HCI_INQUIRY, &hdev->flags))
|
|
|
|
return;
|
|
|
|
|
2014-03-17 21:06:10 +04:00
|
|
|
smp_mb__after_atomic(); /* wake_up_bit advises about this barrier */
|
2013-03-28 03:04:56 +04:00
|
|
|
wake_up_bit(&hdev->flags, HCI_INQUIRY);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-01-04 17:44:20 +04:00
|
|
|
return;
|
|
|
|
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_lock(hdev);
|
2012-01-04 17:44:20 +04:00
|
|
|
|
2012-02-18 03:39:37 +04:00
|
|
|
if (discov->state != DISCOVERY_FINDING)
|
2012-01-04 17:44:20 +04:00
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (list_empty(&discov->resolve)) {
|
2015-03-17 19:04:14 +03:00
|
|
|
/* When BR/EDR inquiry is active and no LE scanning is in
|
|
|
|
* progress, then change discovery state to indicate completion.
|
|
|
|
*
|
|
|
|
* When running LE scanning and BR/EDR inquiry simultaneously
|
|
|
|
* and the LE scan already finished, then change the discovery
|
|
|
|
* state to indicate completion.
|
|
|
|
*/
|
|
|
|
if (!hci_dev_test_flag(hdev, HCI_LE_SCAN) ||
|
|
|
|
!test_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks))
|
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
2012-01-04 17:44:20 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_NEEDED);
|
|
|
|
if (e && hci_resolve_name(hdev, e) == 0) {
|
|
|
|
e->name_state = NAME_PENDING;
|
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_RESOLVING);
|
|
|
|
} else {
|
2015-03-17 19:04:14 +03:00
|
|
|
/* When BR/EDR inquiry is active and no LE scanning is in
|
|
|
|
* progress, then change discovery state to indicate completion.
|
|
|
|
*
|
|
|
|
* When running LE scanning and BR/EDR inquiry simultaneously
|
|
|
|
* and the LE scan already finished, then change the discovery
|
|
|
|
* state to indicate completion.
|
|
|
|
*/
|
|
|
|
if (!hci_dev_test_flag(hdev, HCI_LE_SCAN) ||
|
|
|
|
!test_bit(HCI_QUIRK_SIMULTANEOUS_DISCOVERY, &hdev->quirks))
|
|
|
|
hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
|
2012-01-04 17:44:20 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
2011-11-08 22:40:16 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_inquiry_result_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2005-08-10 07:27:49 +04:00
|
|
|
struct inquiry_data data;
|
2007-10-20 15:33:56 +04:00
|
|
|
struct inquiry_info *info = (void *) (skb->data + 1);
|
2005-04-17 02:20:36 +04:00
|
|
|
int num_rsp = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
|
|
|
|
|
2020-07-11 00:39:18 +03:00
|
|
|
if (!num_rsp || skb->len < num_rsp * sizeof(*info) + 1)
|
2005-08-10 07:27:49 +04:00
|
|
|
return;
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
|
2012-03-21 07:03:38 +04:00
|
|
|
return;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_dev_lock(hdev);
|
2005-08-10 07:27:49 +04:00
|
|
|
|
2011-03-31 00:57:16 +04:00
|
|
|
for (; num_rsp; num_rsp--, info++) {
|
2014-07-01 16:11:20 +04:00
|
|
|
u32 flags;
|
2012-01-04 15:39:52 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
bacpy(&data.bdaddr, &info->bdaddr);
|
|
|
|
data.pscan_rep_mode = info->pscan_rep_mode;
|
|
|
|
data.pscan_period_mode = info->pscan_period_mode;
|
|
|
|
data.pscan_mode = info->pscan_mode;
|
|
|
|
memcpy(data.dev_class, info->dev_class, 3);
|
|
|
|
data.clock_offset = info->clock_offset;
|
2014-12-05 15:03:34 +03:00
|
|
|
data.rssi = HCI_RSSI_INVALID;
|
2008-07-14 22:13:48 +04:00
|
|
|
data.ssp_mode = 0x00;
|
2012-01-04 15:39:52 +04:00
|
|
|
|
2014-07-01 16:11:20 +04:00
|
|
|
flags = hci_inquiry_cache_update(hdev, &data, false);
|
|
|
|
|
2011-11-09 15:58:58 +04:00
|
|
|
mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
|
2014-12-05 15:03:34 +03:00
|
|
|
info->dev_class, HCI_RSSI_INVALID,
|
|
|
|
flags, NULL, 0, NULL, 0);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
2005-08-10 07:27:49 +04:00
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_conn_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
|
2009-04-19 21:30:03 +04:00
|
|
|
if (!conn) {
|
2020-08-14 22:09:09 +03:00
|
|
|
/* Connection may not exist if auto-connected. Check the bredr
|
|
|
|
* allowlist to see if this device is allowed to auto connect.
|
|
|
|
* If link is an ACL type, create a connection class
|
2020-03-11 18:54:01 +03:00
|
|
|
* automatically.
|
2020-08-14 22:09:09 +03:00
|
|
|
*
|
|
|
|
* Auto-connect will only occur if the event filter is
|
|
|
|
* programmed with a given address. Right now, event filter is
|
|
|
|
* only used during suspend.
|
2020-03-11 18:54:01 +03:00
|
|
|
*/
|
2020-08-14 22:09:09 +03:00
|
|
|
if (ev->link_type == ACL_LINK &&
|
2021-06-04 11:26:27 +03:00
|
|
|
hci_bdaddr_list_lookup_with_flags(&hdev->accept_list,
|
2020-08-14 22:09:09 +03:00
|
|
|
&ev->bdaddr,
|
|
|
|
BDADDR_BREDR)) {
|
2020-03-11 18:54:01 +03:00
|
|
|
conn = hci_conn_add(hdev, ev->link_type, &ev->bdaddr,
|
|
|
|
HCI_ROLE_SLAVE);
|
|
|
|
if (!conn) {
|
|
|
|
bt_dev_err(hdev, "no memory for new conn");
|
|
|
|
goto unlock;
|
|
|
|
}
|
2020-03-20 03:07:13 +03:00
|
|
|
} else {
|
|
|
|
if (ev->link_type != SCO_LINK)
|
|
|
|
goto unlock;
|
2009-04-19 21:30:03 +04:00
|
|
|
|
2020-03-20 03:07:13 +03:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK,
|
|
|
|
&ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
2009-04-19 21:30:03 +04:00
|
|
|
|
2020-03-20 03:07:13 +03:00
|
|
|
conn->type = SCO_LINK;
|
|
|
|
}
|
2009-04-19 21:30:03 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
if (!ev->status) {
|
|
|
|
conn->handle = __le16_to_cpu(ev->handle);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
|
|
|
if (conn->type == ACL_LINK) {
|
|
|
|
conn->state = BT_CONFIG;
|
|
|
|
hci_conn_hold(conn);
|
2012-07-19 16:46:08 +04:00
|
|
|
|
|
|
|
if (!conn->out && !hci_conn_ssp_enabled(conn) &&
|
|
|
|
!hci_find_link_key(hdev, &ev->bdaddr))
|
|
|
|
conn->disc_timeout = HCI_PAIRING_TIMEOUT;
|
|
|
|
else
|
|
|
|
conn->disc_timeout = HCI_DISCONN_TIMEOUT;
|
2008-07-14 22:13:49 +04:00
|
|
|
} else
|
|
|
|
conn->state = BT_CONNECTED;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-12-20 19:13:41 +03:00
|
|
|
hci_debugfs_create_conn(conn);
|
2008-07-14 22:13:51 +04:00
|
|
|
hci_conn_add_sysfs(conn);
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
if (test_bit(HCI_AUTH, &hdev->flags))
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_AUTH, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
if (test_bit(HCI_ENCRYPT, &hdev->flags))
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_ENCRYPT, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2006-07-03 12:02:33 +04:00
|
|
|
/* Get remote features */
|
|
|
|
if (conn->type == ACL_LINK) {
|
|
|
|
struct hci_cp_read_remote_features cp;
|
|
|
|
cp.handle = ev->handle;
|
2008-07-14 22:13:49 +04:00
|
|
|
hci_send_cmd(hdev, HCI_OP_READ_REMOTE_FEATURES,
|
2012-03-08 08:25:00 +04:00
|
|
|
sizeof(cp), &cp);
|
2014-08-01 12:13:32 +04:00
|
|
|
|
2015-11-16 13:52:21 +03:00
|
|
|
hci_req_update_scan(hdev);
|
2006-07-03 12:02:33 +04:00
|
|
|
}
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
/* Set packet type for incoming connection */
|
2011-12-01 16:33:27 +04:00
|
|
|
if (!conn->out && hdev->hci_ver < BLUETOOTH_VER_2_0) {
|
2005-04-17 02:20:36 +04:00
|
|
|
struct hci_cp_change_conn_ptype cp;
|
|
|
|
cp.handle = ev->handle;
|
2008-07-14 22:13:46 +04:00
|
|
|
cp.pkt_type = cpu_to_le16(conn->pkt_type);
|
2012-03-08 08:25:00 +04:00
|
|
|
hci_send_cmd(hdev, HCI_OP_CHANGE_CONN_PTYPE, sizeof(cp),
|
|
|
|
&cp);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
2011-01-22 07:09:08 +03:00
|
|
|
} else {
|
2005-04-17 02:20:36 +04:00
|
|
|
conn->state = BT_CLOSED;
|
2011-01-22 07:09:08 +03:00
|
|
|
if (conn->type == ACL_LINK)
|
2014-02-19 02:22:20 +04:00
|
|
|
mgmt_connect_failed(hdev, &conn->dst, conn->type,
|
2012-03-08 08:25:00 +04:00
|
|
|
conn->dst_type, ev->status);
|
2011-01-22 07:09:08 +03:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2010-07-26 18:06:00 +04:00
|
|
|
if (conn->type == ACL_LINK)
|
|
|
|
hci_sco_setup(conn, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2008-07-14 22:13:49 +04:00
|
|
|
if (ev->status) {
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_conn_del(conn);
|
2020-04-03 22:43:58 +03:00
|
|
|
} else if (ev->link_type == SCO_LINK) {
|
|
|
|
switch (conn->setting & SCO_AIRMODE_MASK) {
|
|
|
|
case SCO_AIRMODE_CVSD:
|
|
|
|
if (hdev->notify)
|
|
|
|
hdev->notify(hdev, HCI_NOTIFY_ENABLE_SCO_CVSD);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2020-04-03 22:43:58 +03:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
unlock:
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_conn_check_pending(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
static void hci_reject_conn(struct hci_dev *hdev, bdaddr_t *bdaddr)
|
|
|
|
{
|
|
|
|
struct hci_cp_reject_conn_req cp;
|
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, bdaddr);
|
|
|
|
cp.reason = HCI_ERROR_REJ_BAD_ADDR;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REJECT_CONN_REQ, sizeof(cp), &cp);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_conn_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_conn_request *ev = (void *) skb->data;
|
|
|
|
int mask = hdev->link_mode;
|
2014-07-09 13:59:17 +04:00
|
|
|
struct inquiry_entry *ie;
|
|
|
|
struct hci_conn *conn;
|
2012-11-21 13:51:12 +04:00
|
|
|
__u8 flags = 0;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-09-25 13:49:43 +04:00
|
|
|
BT_DBG("%s bdaddr %pMR type 0x%x", hdev->name, &ev->bdaddr,
|
2012-05-17 07:36:24 +04:00
|
|
|
ev->link_type);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-11-21 13:51:12 +04:00
|
|
|
mask |= hci_proto_connect_ind(hdev, &ev->bdaddr, ev->link_type,
|
|
|
|
&flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
if (!(mask & HCI_LM_ACCEPT)) {
|
|
|
|
hci_reject_conn(hdev, &ev->bdaddr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
if (hci_bdaddr_list_lookup(&hdev->reject_list, &ev->bdaddr,
|
2014-07-16 17:19:21 +04:00
|
|
|
BDADDR_BREDR)) {
|
|
|
|
hci_reject_conn(hdev, &ev->bdaddr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
/* Require HCI_CONNECTABLE or an accept list entry to accept the
|
2014-12-24 21:43:11 +03:00
|
|
|
* connection. These features are only touched through mgmt so
|
|
|
|
* only do the checks if HCI_MGMT is set.
|
|
|
|
*/
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT) &&
|
|
|
|
!hci_dev_test_flag(hdev, HCI_CONNECTABLE) &&
|
2021-06-04 11:26:27 +03:00
|
|
|
!hci_bdaddr_list_lookup_with_flags(&hdev->accept_list, &ev->bdaddr,
|
2020-06-17 17:39:08 +03:00
|
|
|
BDADDR_BREDR)) {
|
|
|
|
hci_reject_conn(hdev, &ev->bdaddr);
|
|
|
|
return;
|
2014-07-09 13:59:17 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
/* Connection accepted */
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
|
|
|
|
if (ie)
|
|
|
|
memcpy(ie->data.dev_class, ev->dev_class, 3);
|
2008-07-14 22:13:47 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ev->link_type,
|
|
|
|
&ev->bdaddr);
|
|
|
|
if (!conn) {
|
2014-07-16 12:56:07 +04:00
|
|
|
conn = hci_conn_add(hdev, ev->link_type, &ev->bdaddr,
|
|
|
|
HCI_ROLE_SLAVE);
|
2007-10-20 15:33:56 +04:00
|
|
|
if (!conn) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "no memory for new connection");
|
2014-07-09 13:59:17 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
2014-07-09 13:59:17 +04:00
|
|
|
}
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
memcpy(conn->dev_class, ev->dev_class, 3);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
if (ev->link_type == ACL_LINK ||
|
|
|
|
(!(flags & HCI_PROTO_DEFER) && !lmp_esco_capable(hdev))) {
|
|
|
|
struct hci_cp_accept_conn_req cp;
|
|
|
|
conn->state = BT_CONNECT;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
if (lmp_rswitch_capable(hdev) && (mask & HCI_LM_MASTER))
|
2021-06-04 11:26:25 +03:00
|
|
|
cp.role = 0x00; /* Become central */
|
2014-07-09 13:59:17 +04:00
|
|
|
else
|
2021-06-04 11:26:25 +03:00
|
|
|
cp.role = 0x01; /* Remain peripheral */
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
hci_send_cmd(hdev, HCI_OP_ACCEPT_CONN_REQ, sizeof(cp), &cp);
|
|
|
|
} else if (!(flags & HCI_PROTO_DEFER)) {
|
|
|
|
struct hci_cp_accept_sync_conn_req cp;
|
|
|
|
conn->state = BT_CONNECT;
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
|
|
|
cp.pkt_type = cpu_to_le16(conn->pkt_type);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
cp.tx_bandwidth = cpu_to_le32(0x00001f40);
|
|
|
|
cp.rx_bandwidth = cpu_to_le32(0x00001f40);
|
|
|
|
cp.max_latency = cpu_to_le16(0xffff);
|
|
|
|
cp.content_format = cpu_to_le16(hdev->voice_setting);
|
|
|
|
cp.retrans_effort = 0xff;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-07-09 13:59:17 +04:00
|
|
|
hci_send_cmd(hdev, HCI_OP_ACCEPT_SYNC_CONN_REQ, sizeof(cp),
|
|
|
|
&cp);
|
2007-10-20 15:33:56 +04:00
|
|
|
} else {
|
2014-07-09 13:59:17 +04:00
|
|
|
conn->state = BT_CONNECT2;
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, 0);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-09 11:52:30 +04:00
|
|
|
static u8 hci_to_mgmt_reason(u8 err)
|
|
|
|
{
|
|
|
|
switch (err) {
|
|
|
|
case HCI_ERROR_CONNECTION_TIMEOUT:
|
|
|
|
return MGMT_DEV_DISCONN_TIMEOUT;
|
|
|
|
case HCI_ERROR_REMOTE_USER_TERM:
|
|
|
|
case HCI_ERROR_REMOTE_LOW_RESOURCES:
|
|
|
|
case HCI_ERROR_REMOTE_POWER_OFF:
|
|
|
|
return MGMT_DEV_DISCONN_REMOTE;
|
|
|
|
case HCI_ERROR_LOCAL_HOST_TERM:
|
|
|
|
return MGMT_DEV_DISCONN_LOCAL_HOST;
|
|
|
|
default:
|
|
|
|
return MGMT_DEV_DISCONN_UNKNOWN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_disconn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2006-07-03 12:02:33 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_disconn_complete *ev = (void *) skb->data;
|
2016-07-12 03:12:16 +03:00
|
|
|
u8 reason;
|
2014-02-27 03:21:48 +04:00
|
|
|
struct hci_conn_params *params;
|
2006-07-03 12:02:33 +04:00
|
|
|
struct hci_conn *conn;
|
2014-02-24 16:52:18 +04:00
|
|
|
bool mgmt_connected;
|
2006-07-03 12:02:33 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2011-01-20 13:34:39 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
2008-07-14 22:13:51 +04:00
|
|
|
|
2013-11-08 00:36:09 +04:00
|
|
|
if (ev->status) {
|
|
|
|
mgmt_disconnect_failed(hdev, &conn->dst, conn->type,
|
|
|
|
conn->dst_type, ev->status);
|
|
|
|
goto unlock;
|
2011-11-10 17:54:39 +04:00
|
|
|
}
|
2011-01-20 13:34:39 +03:00
|
|
|
|
2013-11-08 00:36:10 +04:00
|
|
|
conn->state = BT_CLOSED;
|
|
|
|
|
2014-02-24 16:52:18 +04:00
|
|
|
mgmt_connected = test_and_clear_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags);
|
2016-07-12 03:12:16 +03:00
|
|
|
|
|
|
|
if (test_bit(HCI_CONN_AUTH_FAILURE, &conn->flags))
|
|
|
|
reason = MGMT_DEV_DISCONN_AUTH_FAILURE;
|
|
|
|
else
|
|
|
|
reason = hci_to_mgmt_reason(ev->reason);
|
|
|
|
|
2014-02-24 16:52:18 +04:00
|
|
|
mgmt_device_disconnected(hdev, &conn->dst, conn->type, conn->dst_type,
|
|
|
|
reason, mgmt_connected);
|
2013-11-08 00:36:09 +04:00
|
|
|
|
2014-08-01 12:13:32 +04:00
|
|
|
if (conn->type == ACL_LINK) {
|
|
|
|
if (test_bit(HCI_CONN_FLUSH_KEY, &conn->flags))
|
|
|
|
hci_remove_link_key(hdev, &conn->dst);
|
|
|
|
|
2015-11-16 13:52:21 +03:00
|
|
|
hci_req_update_scan(hdev);
|
2014-08-01 12:13:32 +04:00
|
|
|
}
|
2013-10-05 14:01:06 +04:00
|
|
|
|
2014-02-27 03:21:48 +04:00
|
|
|
params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
|
|
|
|
if (params) {
|
|
|
|
switch (params->auto_connect) {
|
|
|
|
case HCI_AUTO_CONN_LINK_LOSS:
|
|
|
|
if (ev->reason != HCI_ERROR_CONNECTION_TIMEOUT)
|
|
|
|
break;
|
2020-07-08 23:18:23 +03:00
|
|
|
fallthrough;
|
2014-02-27 03:21:48 +04:00
|
|
|
|
2014-07-23 23:55:23 +04:00
|
|
|
case HCI_AUTO_CONN_DIRECT:
|
2014-02-27 03:21:48 +04:00
|
|
|
case HCI_AUTO_CONN_ALWAYS:
|
2014-07-04 13:37:24 +04:00
|
|
|
list_del_init(¶ms->action);
|
|
|
|
list_add(¶ms->action, &hdev->pend_le_conns);
|
|
|
|
hci_update_background_scan(hdev);
|
2014-02-27 03:21:48 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-18 15:53:58 +03:00
|
|
|
hci_disconn_cfm(conn, ev->reason);
|
2013-11-08 00:36:10 +04:00
|
|
|
|
2020-03-11 18:54:01 +03:00
|
|
|
/* The suspend notifier is waiting for all devices to disconnect so
|
|
|
|
* clear the bit from pending tasks and inform the wait queue.
|
|
|
|
*/
|
|
|
|
if (list_empty(&hdev->conn_hash.list) &&
|
|
|
|
test_and_clear_bit(SUSPEND_DISCONNECTING, hdev->suspend_tasks)) {
|
|
|
|
wake_up(&hdev->suspend_wait_q);
|
|
|
|
}
|
|
|
|
|
2013-11-08 00:36:10 +04:00
|
|
|
/* Re-enable advertising if necessary, since it might
|
|
|
|
* have been disabled by the connection. From the
|
|
|
|
* HCI_LE_Set_Advertise_Enable command description in
|
|
|
|
* the core specification (v4.0):
|
|
|
|
* "The Controller shall continue advertising until the Host
|
|
|
|
* issues an LE_Set_Advertise_Enable command with
|
|
|
|
* Advertising_Enable set to 0x00 (Advertising is disabled)
|
|
|
|
* or until a connection is created or until the Advertising
|
|
|
|
* is timed out due to Directed Advertising."
|
|
|
|
*/
|
2021-08-12 02:20:16 +03:00
|
|
|
if (conn->type == LE_LINK) {
|
|
|
|
hdev->cur_adv_instance = conn->adv_instance;
|
2015-11-18 13:49:20 +03:00
|
|
|
hci_req_reenable_advertising(hdev);
|
2021-08-12 02:20:16 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_conn_del(conn);
|
2011-01-20 13:34:39 +03:00
|
|
|
|
|
|
|
unlock:
|
2006-07-03 12:02:33 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_auth_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_auth_complete *ev = (void *) skb->data;
|
2006-07-03 12:02:33 +04:00
|
|
|
struct hci_conn *conn;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2006-07-03 12:02:33 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2011-05-31 17:49:26 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (!ev->status) {
|
2016-07-12 03:12:16 +03:00
|
|
|
clear_bit(HCI_CONN_AUTH_FAILURE, &conn->flags);
|
|
|
|
|
2012-01-18 23:33:12 +04:00
|
|
|
if (!hci_conn_ssp_enabled(conn) &&
|
2012-05-17 07:36:24 +04:00
|
|
|
test_bit(HCI_CONN_REAUTH_PEND, &conn->flags)) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_info(hdev, "re-auth of legacy device is not possible.");
|
2011-02-19 18:06:00 +03:00
|
|
|
} else {
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_AUTH, &conn->flags);
|
2011-05-31 17:49:26 +04:00
|
|
|
conn->sec_level = conn->pending_sec_level;
|
2011-02-19 18:06:00 +03:00
|
|
|
}
|
2011-05-31 17:49:26 +04:00
|
|
|
} else {
|
2016-07-12 03:12:16 +03:00
|
|
|
if (ev->status == HCI_ERROR_PIN_OR_KEY_MISSING)
|
|
|
|
set_bit(HCI_CONN_AUTH_FAILURE, &conn->flags);
|
|
|
|
|
2014-09-09 04:09:49 +04:00
|
|
|
mgmt_auth_failed(conn, ev->status);
|
2011-05-31 17:49:26 +04:00
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
|
|
|
|
clear_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2011-05-31 17:49:26 +04:00
|
|
|
if (conn->state == BT_CONFIG) {
|
2012-01-18 23:33:12 +04:00
|
|
|
if (!ev->status && hci_conn_ssp_enabled(conn)) {
|
2011-05-31 17:49:26 +04:00
|
|
|
struct hci_cp_set_conn_encrypt cp;
|
|
|
|
cp.handle = ev->handle;
|
|
|
|
cp.encrypt = 0x01;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
|
2012-05-17 07:36:24 +04:00
|
|
|
&cp);
|
2009-04-26 22:01:22 +04:00
|
|
|
} else {
|
2011-05-31 17:49:26 +04:00
|
|
|
conn->state = BT_CONNECTED;
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2009-04-26 22:01:22 +04:00
|
|
|
}
|
2011-05-31 17:49:26 +04:00
|
|
|
} else {
|
|
|
|
hci_auth_cfm(conn, ev->status);
|
2009-04-26 22:01:22 +04:00
|
|
|
|
2011-05-31 17:49:26 +04:00
|
|
|
hci_conn_hold(conn);
|
|
|
|
conn->disc_timeout = HCI_DISCONN_TIMEOUT;
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2011-05-31 17:49:26 +04:00
|
|
|
}
|
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
|
2011-05-31 17:49:26 +04:00
|
|
|
if (!ev->status) {
|
|
|
|
struct hci_cp_set_conn_encrypt cp;
|
|
|
|
cp.handle = ev->handle;
|
|
|
|
cp.encrypt = 0x01;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
|
2012-05-17 07:36:24 +04:00
|
|
|
&cp);
|
2011-05-31 17:49:26 +04:00
|
|
|
} else {
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
|
2020-05-19 23:25:19 +03:00
|
|
|
hci_encrypt_cfm(conn, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-05-31 17:49:26 +04:00
|
|
|
unlock:
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_remote_name_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2010-11-18 23:22:29 +03:00
|
|
|
struct hci_ev_remote_name *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s", hdev->name);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_conn_check_pending(hdev);
|
2010-11-18 23:22:29 +03:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2012-01-04 17:44:20 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-01-17 23:48:47 +04:00
|
|
|
goto check_auth;
|
2011-03-30 14:18:12 +04:00
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
if (ev->status == 0)
|
|
|
|
hci_check_pending_name(hdev, conn, &ev->bdaddr, ev->name,
|
2012-03-08 08:25:00 +04:00
|
|
|
strnlen(ev->name, HCI_MAX_NAME_LENGTH));
|
2012-01-17 23:48:47 +04:00
|
|
|
else
|
|
|
|
hci_check_pending_name(hdev, conn, &ev->bdaddr, NULL, 0);
|
|
|
|
|
|
|
|
check_auth:
|
2011-04-28 22:28:55 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (!hci_outgoing_auth_needed(hdev, conn))
|
|
|
|
goto unlock;
|
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
|
2010-11-18 23:22:29 +03:00
|
|
|
struct hci_cp_auth_requested cp;
|
2014-07-17 16:35:39 +04:00
|
|
|
|
|
|
|
set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
|
|
|
|
|
2010-11-18 23:22:29 +03:00
|
|
|
cp.handle = __cpu_to_le16(conn->handle);
|
|
|
|
hci_send_cmd(hdev, HCI_OP_AUTH_REQUESTED, sizeof(cp), &cp);
|
|
|
|
}
|
|
|
|
|
2011-04-28 22:28:55 +04:00
|
|
|
unlock:
|
2010-11-18 23:22:29 +03:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2015-06-11 13:52:29 +03:00
|
|
|
static void read_enc_key_size_complete(struct hci_dev *hdev, u8 status,
|
|
|
|
u16 opcode, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
const struct hci_rp_read_enc_key_size *rp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
u16 handle;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%02x", hdev->name, status);
|
|
|
|
|
|
|
|
if (!skb || skb->len < sizeof(*rp)) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "invalid read key size response");
|
2015-06-11 13:52:29 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
rp = (void *)skb->data;
|
|
|
|
handle = le16_to_cpu(rp->handle);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, handle);
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
2020-03-25 17:48:34 +03:00
|
|
|
/* While unexpected, the read_enc_key_size command may fail. The most
|
|
|
|
* secure approach is to then assume the key size is 0 to force a
|
|
|
|
* disconnection.
|
2015-06-11 13:52:29 +03:00
|
|
|
*/
|
|
|
|
if (rp->status) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "failed to read key size for handle %u",
|
|
|
|
handle);
|
2020-03-25 17:48:34 +03:00
|
|
|
conn->enc_key_size = 0;
|
2015-06-11 13:52:29 +03:00
|
|
|
} else {
|
|
|
|
conn->enc_key_size = rp->key_size;
|
|
|
|
}
|
|
|
|
|
2020-05-19 23:25:19 +03:00
|
|
|
hci_encrypt_cfm(conn, 0);
|
2015-06-11 13:52:29 +03:00
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_encrypt_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_encrypt_change *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2006-07-03 12:02:33 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2014-02-01 04:24:27 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2014-02-01 04:24:27 +04:00
|
|
|
if (!ev->status) {
|
|
|
|
if (ev->encrypt) {
|
|
|
|
/* Encryption implies authentication */
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_AUTH, &conn->flags);
|
|
|
|
set_bit(HCI_CONN_ENCRYPT, &conn->flags);
|
2014-02-01 04:24:27 +04:00
|
|
|
conn->sec_level = conn->pending_sec_level;
|
2014-02-01 04:24:28 +04:00
|
|
|
|
2014-02-01 23:52:02 +04:00
|
|
|
/* P-256 authentication key implies FIPS */
|
|
|
|
if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256)
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_FIPS, &conn->flags);
|
2014-02-01 23:52:02 +04:00
|
|
|
|
2014-02-01 04:24:28 +04:00
|
|
|
if ((conn->type == ACL_LINK && ev->encrypt == 0x02) ||
|
|
|
|
conn->type == LE_LINK)
|
|
|
|
set_bit(HCI_CONN_AES_CCM, &conn->flags);
|
|
|
|
} else {
|
2014-06-24 18:03:50 +04:00
|
|
|
clear_bit(HCI_CONN_ENCRYPT, &conn->flags);
|
2014-02-01 04:24:28 +04:00
|
|
|
clear_bit(HCI_CONN_AES_CCM, &conn->flags);
|
|
|
|
}
|
2014-02-01 04:24:27 +04:00
|
|
|
}
|
2012-05-13 10:20:07 +04:00
|
|
|
|
2014-09-11 09:16:35 +04:00
|
|
|
/* We should disregard the current RPA and generate a new one
|
|
|
|
* whenever the encryption procedure fails.
|
|
|
|
*/
|
2018-07-19 14:39:45 +03:00
|
|
|
if (ev->status && conn->type == LE_LINK) {
|
2015-03-13 12:11:01 +03:00
|
|
|
hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
|
2018-07-19 14:39:45 +03:00
|
|
|
hci_adv_instances_set_rpa_expired(hdev, true);
|
|
|
|
}
|
2014-09-11 09:16:35 +04:00
|
|
|
|
2014-02-01 04:24:27 +04:00
|
|
|
clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
2020-05-21 00:20:14 +03:00
|
|
|
/* Check link security requirements are met */
|
|
|
|
if (!hci_conn_check_link_mode(conn))
|
|
|
|
ev->status = HCI_ERROR_AUTH_FAILURE;
|
|
|
|
|
2014-02-01 04:24:27 +04:00
|
|
|
if (ev->status && conn->state == BT_CONNECTED) {
|
2016-07-12 03:12:16 +03:00
|
|
|
if (ev->status == HCI_ERROR_PIN_OR_KEY_MISSING)
|
|
|
|
set_bit(HCI_CONN_AUTH_FAILURE, &conn->flags);
|
|
|
|
|
2020-05-21 00:20:14 +03:00
|
|
|
/* Notify upper layers so they can cleanup before
|
|
|
|
* disconnecting.
|
|
|
|
*/
|
|
|
|
hci_encrypt_cfm(conn, ev->status);
|
2014-02-01 04:24:27 +04:00
|
|
|
hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
|
|
|
|
hci_conn_drop(conn);
|
|
|
|
goto unlock;
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2015-06-11 13:52:29 +03:00
|
|
|
/* Try reading the encryption key size for encrypted ACL links */
|
|
|
|
if (!ev->status && ev->encrypt && conn->type == ACL_LINK) {
|
|
|
|
struct hci_cp_read_enc_key_size cp;
|
|
|
|
struct hci_request req;
|
|
|
|
|
|
|
|
/* Only send HCI_Read_Encryption_Key_Size if the
|
|
|
|
* controller really supports it. If it doesn't, assume
|
|
|
|
* the default size (16).
|
|
|
|
*/
|
|
|
|
if (!(hdev->commands[20] & 0x10)) {
|
|
|
|
conn->enc_key_size = HCI_LINK_KEY_SIZE;
|
|
|
|
goto notify;
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_req_init(&req, hdev);
|
|
|
|
|
|
|
|
cp.handle = cpu_to_le16(conn->handle);
|
|
|
|
hci_req_add(&req, HCI_OP_READ_ENC_KEY_SIZE, sizeof(cp), &cp);
|
|
|
|
|
|
|
|
if (hci_req_run_skb(&req, read_enc_key_size_complete)) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "sending read key size failed");
|
2015-06-11 13:52:29 +03:00
|
|
|
conn->enc_key_size = HCI_LINK_KEY_SIZE;
|
|
|
|
goto notify;
|
|
|
|
}
|
|
|
|
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2019-06-21 12:21:56 +03:00
|
|
|
/* Set the default Authenticated Payload Timeout after
|
|
|
|
* an LE Link is established. As per Core Spec v5.0, Vol 2, Part B
|
|
|
|
* Section 3.3, the HCI command WRITE_AUTH_PAYLOAD_TIMEOUT should be
|
|
|
|
* sent when the link is active and Encryption is enabled, the conn
|
|
|
|
* type can be either LE or ACL and controller must support LMP Ping.
|
|
|
|
* Ensure for AES-CCM encryption as well.
|
|
|
|
*/
|
|
|
|
if (test_bit(HCI_CONN_ENCRYPT, &conn->flags) &&
|
|
|
|
test_bit(HCI_CONN_AES_CCM, &conn->flags) &&
|
|
|
|
((conn->type == ACL_LINK && lmp_ping_capable(hdev)) ||
|
|
|
|
(conn->type == LE_LINK && (hdev->le_features[0] & HCI_LE_PING)))) {
|
|
|
|
struct hci_cp_write_auth_payload_to cp;
|
|
|
|
|
|
|
|
cp.handle = cpu_to_le16(conn->handle);
|
|
|
|
cp.timeout = cpu_to_le16(hdev->auth_payload_timeout);
|
|
|
|
hci_send_cmd(conn->hdev, HCI_OP_WRITE_AUTH_PAYLOAD_TO,
|
|
|
|
sizeof(cp), &cp);
|
|
|
|
}
|
|
|
|
|
2015-06-11 13:52:29 +03:00
|
|
|
notify:
|
2020-05-19 23:25:19 +03:00
|
|
|
hci_encrypt_cfm(conn, ev->status);
|
2014-02-01 04:24:27 +04:00
|
|
|
|
2012-05-13 10:20:07 +04:00
|
|
|
unlock:
|
2005-04-17 02:20:36 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_change_link_key_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_change_link_key_complete *ev = (void *) skb->data;
|
2006-07-03 12:02:33 +04:00
|
|
|
struct hci_conn *conn;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2006-07-03 12:02:33 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2005-04-17 02:20:36 +04:00
|
|
|
if (conn) {
|
|
|
|
if (!ev->status)
|
2014-06-24 18:03:50 +04:00
|
|
|
set_bit(HCI_CONN_SECURE, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_AUTH_PEND, &conn->flags);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
hci_key_change_cfm(conn, ev->status);
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_remote_features_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_remote_features *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2010-11-10 18:11:51 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
2008-07-14 22:13:49 +04:00
|
|
|
|
2010-11-10 18:11:51 +03:00
|
|
|
if (!ev->status)
|
2013-04-17 16:00:51 +04:00
|
|
|
memcpy(conn->features[0], ev->features, 8);
|
2010-11-10 18:11:51 +03:00
|
|
|
|
|
|
|
if (conn->state != BT_CONFIG)
|
|
|
|
goto unlock;
|
|
|
|
|
2015-01-29 18:36:59 +03:00
|
|
|
if (!ev->status && lmp_ext_feat_capable(hdev) &&
|
|
|
|
lmp_ext_feat_capable(conn)) {
|
2010-11-10 18:11:51 +03:00
|
|
|
struct hci_cp_read_remote_ext_features cp;
|
|
|
|
cp.handle = ev->handle;
|
|
|
|
cp.page = 0x01;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_READ_REMOTE_EXT_FEATURES,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(cp), &cp);
|
2010-11-18 23:22:28 +03:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2012-05-12 23:11:50 +04:00
|
|
|
if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
|
2010-11-18 23:22:29 +03:00
|
|
|
struct hci_cp_remote_name_req cp;
|
|
|
|
memset(&cp, 0, sizeof(cp));
|
|
|
|
bacpy(&cp.bdaddr, &conn->dst);
|
|
|
|
cp.pscan_rep_mode = 0x02;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
|
2012-01-17 23:48:47 +04:00
|
|
|
} else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
|
2021-04-10 01:04:06 +03:00
|
|
|
mgmt_device_connected(hdev, conn, NULL, 0);
|
2010-11-18 23:22:28 +03:00
|
|
|
|
2010-11-18 23:22:29 +03:00
|
|
|
if (!hci_outgoing_auth_needed(hdev, conn)) {
|
2010-11-10 18:11:51 +03:00
|
|
|
conn->state = BT_CONNECTED;
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:49 +04:00
|
|
|
}
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2010-11-10 18:11:51 +03:00
|
|
|
unlock:
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2005-04-17 02:20:36 +04:00
|
|
|
}
|
|
|
|
|
2021-08-16 02:37:47 +03:00
|
|
|
static inline void handle_cmd_cnt_and_timer(struct hci_dev *hdev, u8 ncmd)
|
2021-04-29 20:24:22 +03:00
|
|
|
{
|
2021-08-16 02:37:47 +03:00
|
|
|
cancel_delayed_work(&hdev->cmd_timer);
|
2021-04-29 20:24:22 +03:00
|
|
|
|
|
|
|
if (!test_bit(HCI_RESET, &hdev->flags)) {
|
|
|
|
if (ncmd) {
|
|
|
|
cancel_delayed_work(&hdev->ncmd_timer);
|
|
|
|
atomic_set(&hdev->cmd_cnt, 1);
|
|
|
|
} else {
|
|
|
|
schedule_delayed_work(&hdev->ncmd_timer,
|
|
|
|
HCI_NCMD_TIMEOUT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
static void hci_cmd_complete_evt(struct hci_dev *hdev, struct sk_buff *skb,
|
|
|
|
u16 *opcode, u8 *status,
|
|
|
|
hci_req_complete_t *req_complete,
|
|
|
|
hci_req_complete_skb_t *req_complete_skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_cmd_complete *ev = (void *) skb->data;
|
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
*opcode = __le16_to_cpu(ev->opcode);
|
|
|
|
*status = skb->data[sizeof(*ev)];
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
skb_pull(skb, sizeof(*ev));
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
switch (*opcode) {
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_INQUIRY_CANCEL:
|
2020-05-06 22:55:03 +03:00
|
|
|
hci_cc_inquiry_cancel(hdev, skb, status);
|
2007-10-20 15:33:56 +04:00
|
|
|
break;
|
|
|
|
|
2012-03-21 07:03:35 +04:00
|
|
|
case HCI_OP_PERIODIC_INQ:
|
|
|
|
hci_cc_periodic_inq(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_EXIT_PERIODIC_INQ:
|
|
|
|
hci_cc_exit_periodic_inq(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_REMOTE_NAME_REQ_CANCEL:
|
|
|
|
hci_cc_remote_name_req_cancel(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_ROLE_DISCOVERY:
|
|
|
|
hci_cc_role_discovery(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
case HCI_OP_READ_LINK_POLICY:
|
|
|
|
hci_cc_read_link_policy(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_WRITE_LINK_POLICY:
|
|
|
|
hci_cc_write_link_policy(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:47 +04:00
|
|
|
case HCI_OP_READ_DEF_LINK_POLICY:
|
|
|
|
hci_cc_read_def_link_policy(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_DEF_LINK_POLICY:
|
|
|
|
hci_cc_write_def_link_policy(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_RESET:
|
|
|
|
hci_cc_reset(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2015-01-12 20:21:25 +03:00
|
|
|
case HCI_OP_READ_STORED_LINK_KEY:
|
|
|
|
hci_cc_read_stored_link_key(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2015-01-12 20:21:28 +03:00
|
|
|
case HCI_OP_DELETE_STORED_LINK_KEY:
|
|
|
|
hci_cc_delete_stored_link_key(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_WRITE_LOCAL_NAME:
|
|
|
|
hci_cc_write_local_name(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_LOCAL_NAME:
|
|
|
|
hci_cc_read_local_name(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_AUTH_ENABLE:
|
|
|
|
hci_cc_write_auth_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_ENCRYPT_MODE:
|
|
|
|
hci_cc_write_encrypt_mode(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_SCAN_ENABLE:
|
|
|
|
hci_cc_write_scan_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2021-03-03 19:34:04 +03:00
|
|
|
case HCI_OP_SET_EVENT_FLT:
|
|
|
|
hci_cc_set_event_filter(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_READ_CLASS_OF_DEV:
|
|
|
|
hci_cc_read_class_of_dev(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_CLASS_OF_DEV:
|
|
|
|
hci_cc_write_class_of_dev(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_VOICE_SETTING:
|
|
|
|
hci_cc_read_voice_setting(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_VOICE_SETTING:
|
|
|
|
hci_cc_write_voice_setting(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-10-15 00:56:16 +04:00
|
|
|
case HCI_OP_READ_NUM_SUPPORTED_IAC:
|
|
|
|
hci_cc_read_num_supported_iac(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:48 +04:00
|
|
|
case HCI_OP_WRITE_SSP_MODE:
|
|
|
|
hci_cc_write_ssp_mode(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-01-10 14:07:23 +04:00
|
|
|
case HCI_OP_WRITE_SC_SUPPORT:
|
|
|
|
hci_cc_write_sc_support(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2019-06-21 12:21:56 +03:00
|
|
|
case HCI_OP_READ_AUTH_PAYLOAD_TO:
|
|
|
|
hci_cc_read_auth_payload_timeout(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_AUTH_PAYLOAD_TO:
|
|
|
|
hci_cc_write_auth_payload_timeout(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_READ_LOCAL_VERSION:
|
|
|
|
hci_cc_read_local_version(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_LOCAL_COMMANDS:
|
|
|
|
hci_cc_read_local_commands(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_LOCAL_FEATURES:
|
|
|
|
hci_cc_read_local_features(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-07-01 02:20:52 +04:00
|
|
|
case HCI_OP_READ_LOCAL_EXT_FEATURES:
|
|
|
|
hci_cc_read_local_ext_features(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_READ_BUFFER_SIZE:
|
|
|
|
hci_cc_read_buffer_size(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_BD_ADDR:
|
|
|
|
hci_cc_read_bd_addr(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2020-04-03 22:44:04 +03:00
|
|
|
case HCI_OP_READ_LOCAL_PAIRING_OPTS:
|
|
|
|
hci_cc_read_local_pairing_opts(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-03-16 02:07:11 +04:00
|
|
|
case HCI_OP_READ_PAGE_SCAN_ACTIVITY:
|
|
|
|
hci_cc_read_page_scan_activity(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-03-16 02:07:12 +04:00
|
|
|
case HCI_OP_WRITE_PAGE_SCAN_ACTIVITY:
|
|
|
|
hci_cc_write_page_scan_activity(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-03-16 02:07:11 +04:00
|
|
|
case HCI_OP_READ_PAGE_SCAN_TYPE:
|
|
|
|
hci_cc_read_page_scan_type(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-03-16 02:07:12 +04:00
|
|
|
case HCI_OP_WRITE_PAGE_SCAN_TYPE:
|
|
|
|
hci_cc_write_page_scan_type(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-12-07 17:56:51 +04:00
|
|
|
case HCI_OP_READ_DATA_BLOCK_SIZE:
|
|
|
|
hci_cc_read_data_block_size(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-11-24 16:52:02 +04:00
|
|
|
case HCI_OP_READ_FLOW_CONTROL_MODE:
|
|
|
|
hci_cc_read_flow_control_mode(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-10-12 11:53:57 +04:00
|
|
|
case HCI_OP_READ_LOCAL_AMP_INFO:
|
|
|
|
hci_cc_read_local_amp_info(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-06-28 18:54:06 +04:00
|
|
|
case HCI_OP_READ_CLOCK:
|
|
|
|
hci_cc_read_clock(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-01-25 02:19:58 +03:00
|
|
|
case HCI_OP_READ_INQ_RSP_TX_POWER:
|
|
|
|
hci_cc_read_inq_rsp_tx_power(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2020-03-05 19:14:59 +03:00
|
|
|
case HCI_OP_READ_DEF_ERR_DATA_REPORTING:
|
|
|
|
hci_cc_read_def_err_data_reporting(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_WRITE_DEF_ERR_DATA_REPORTING:
|
|
|
|
hci_cc_write_def_err_data_reporting(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-01-22 07:10:07 +03:00
|
|
|
case HCI_OP_PIN_CODE_REPLY:
|
|
|
|
hci_cc_pin_code_reply(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_PIN_CODE_NEG_REPLY:
|
|
|
|
hci_cc_pin_code_neg_reply(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-03-22 15:12:21 +03:00
|
|
|
case HCI_OP_READ_LOCAL_OOB_DATA:
|
2014-01-10 14:07:26 +04:00
|
|
|
hci_cc_read_local_oob_data(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_LOCAL_OOB_EXT_DATA:
|
|
|
|
hci_cc_read_local_oob_ext_data(hdev, skb);
|
2011-03-22 15:12:21 +03:00
|
|
|
break;
|
|
|
|
|
2011-02-11 04:38:48 +03:00
|
|
|
case HCI_OP_LE_READ_BUFFER_SIZE:
|
|
|
|
hci_cc_le_read_buffer_size(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2013-01-22 16:01:59 +04:00
|
|
|
case HCI_OP_LE_READ_LOCAL_FEATURES:
|
|
|
|
hci_cc_le_read_local_features(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-10-19 21:57:49 +04:00
|
|
|
case HCI_OP_LE_READ_ADV_TX_POWER:
|
|
|
|
hci_cc_le_read_adv_tx_power(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-02-19 18:05:57 +03:00
|
|
|
case HCI_OP_USER_CONFIRM_REPLY:
|
|
|
|
hci_cc_user_confirm_reply(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_USER_CONFIRM_NEG_REPLY:
|
|
|
|
hci_cc_user_confirm_neg_reply(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-11-23 20:28:34 +04:00
|
|
|
case HCI_OP_USER_PASSKEY_REPLY:
|
|
|
|
hci_cc_user_passkey_reply(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_USER_PASSKEY_NEG_REPLY:
|
|
|
|
hci_cc_user_passkey_neg_reply(hdev, skb);
|
2012-04-13 14:32:42 +04:00
|
|
|
break;
|
2011-12-02 16:13:31 +04:00
|
|
|
|
2014-02-20 07:52:13 +04:00
|
|
|
case HCI_OP_LE_SET_RANDOM_ADDR:
|
|
|
|
hci_cc_le_set_random_addr(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-11-08 04:23:01 +04:00
|
|
|
case HCI_OP_LE_SET_ADV_ENABLE:
|
|
|
|
hci_cc_le_set_adv_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-03-21 23:18:10 +04:00
|
|
|
case HCI_OP_LE_SET_SCAN_PARAM:
|
|
|
|
hci_cc_le_set_scan_param(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-05-26 23:23:52 +04:00
|
|
|
case HCI_OP_LE_SET_SCAN_ENABLE:
|
|
|
|
hci_cc_le_set_scan_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
case HCI_OP_LE_READ_ACCEPT_LIST_SIZE:
|
|
|
|
hci_cc_le_read_accept_list_size(hdev, skb);
|
2013-01-22 16:02:00 +04:00
|
|
|
break;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
case HCI_OP_LE_CLEAR_ACCEPT_LIST:
|
|
|
|
hci_cc_le_clear_accept_list(hdev, skb);
|
2014-02-28 08:37:31 +04:00
|
|
|
break;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
case HCI_OP_LE_ADD_TO_ACCEPT_LIST:
|
|
|
|
hci_cc_le_add_to_accept_list(hdev, skb);
|
2014-02-28 08:37:31 +04:00
|
|
|
break;
|
|
|
|
|
2021-06-04 11:26:27 +03:00
|
|
|
case HCI_OP_LE_DEL_FROM_ACCEPT_LIST:
|
|
|
|
hci_cc_le_del_from_accept_list(hdev, skb);
|
2014-02-28 08:37:31 +04:00
|
|
|
break;
|
|
|
|
|
2013-01-22 16:02:01 +04:00
|
|
|
case HCI_OP_LE_READ_SUPPORTED_STATES:
|
|
|
|
hci_cc_le_read_supported_states(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-12-20 18:28:40 +03:00
|
|
|
case HCI_OP_LE_READ_DEF_DATA_LEN:
|
|
|
|
hci_cc_le_read_def_data_len(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_LE_WRITE_DEF_DATA_LEN:
|
|
|
|
hci_cc_le_write_def_data_len(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-08-17 04:59:19 +03:00
|
|
|
case HCI_OP_LE_ADD_TO_RESOLV_LIST:
|
|
|
|
hci_cc_le_add_to_resolv_list(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_LE_DEL_FROM_RESOLV_LIST:
|
|
|
|
hci_cc_le_del_from_resolv_list(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-06-29 09:43:20 +03:00
|
|
|
case HCI_OP_LE_CLEAR_RESOLV_LIST:
|
|
|
|
hci_cc_le_clear_resolv_list(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-06-29 09:42:50 +03:00
|
|
|
case HCI_OP_LE_READ_RESOLV_LIST_SIZE:
|
|
|
|
hci_cc_le_read_resolv_list_size(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-08-07 10:46:35 +03:00
|
|
|
case HCI_OP_LE_SET_ADDR_RESOLV_ENABLE:
|
|
|
|
hci_cc_le_set_addr_resolution_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-12-20 18:28:40 +03:00
|
|
|
case HCI_OP_LE_READ_MAX_DATA_LEN:
|
|
|
|
hci_cc_le_read_max_data_len(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-07-01 02:20:53 +04:00
|
|
|
case HCI_OP_WRITE_LE_HOST_SUPPORTED:
|
|
|
|
hci_cc_write_le_host_supported(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-02-27 16:05:40 +04:00
|
|
|
case HCI_OP_LE_SET_ADV_PARAM:
|
|
|
|
hci_cc_set_adv_param(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-05-08 17:32:08 +04:00
|
|
|
case HCI_OP_READ_RSSI:
|
|
|
|
hci_cc_read_rssi(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-05-09 23:35:28 +04:00
|
|
|
case HCI_OP_READ_TX_POWER:
|
|
|
|
hci_cc_read_tx_power(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2015-02-01 02:07:52 +03:00
|
|
|
case HCI_OP_WRITE_SSP_DEBUG_MODE:
|
|
|
|
hci_cc_write_ssp_debug_mode(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-06 14:35:28 +03:00
|
|
|
case HCI_OP_LE_SET_EXT_SCAN_PARAMS:
|
|
|
|
hci_cc_le_set_ext_scan_param(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_LE_SET_EXT_SCAN_ENABLE:
|
|
|
|
hci_cc_le_set_ext_scan_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-19 14:39:35 +03:00
|
|
|
case HCI_OP_LE_SET_DEFAULT_PHY:
|
|
|
|
hci_cc_le_set_default_phy(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-19 14:39:40 +03:00
|
|
|
case HCI_OP_LE_READ_NUM_SUPPORTED_ADV_SETS:
|
|
|
|
hci_cc_le_read_num_adv_sets(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-19 14:39:41 +03:00
|
|
|
case HCI_OP_LE_SET_EXT_ADV_PARAMS:
|
|
|
|
hci_cc_set_ext_adv_param(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_LE_SET_EXT_ADV_ENABLE:
|
|
|
|
hci_cc_le_set_ext_adv_enable(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-19 14:39:45 +03:00
|
|
|
case HCI_OP_LE_SET_ADV_SET_RAND_ADDR:
|
|
|
|
hci_cc_le_set_adv_set_random_addr(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2020-12-03 23:12:51 +03:00
|
|
|
case HCI_OP_LE_READ_TRANSMIT_POWER:
|
|
|
|
hci_cc_le_read_transmit_power(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
default:
|
2015-04-02 13:41:08 +03:00
|
|
|
BT_DBG("%s opcode 0x%4.4x", hdev->name, *opcode);
|
2007-10-20 15:33:56 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-08-16 02:37:47 +03:00
|
|
|
handle_cmd_cnt_and_timer(hdev, ev->ncmd);
|
2015-03-28 12:17:36 +03:00
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
hci_req_cmd_complete(hdev, *opcode, *status, req_complete,
|
|
|
|
req_complete_skb);
|
2013-03-05 22:37:48 +04:00
|
|
|
|
2019-05-02 05:01:52 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_CMD_PENDING)) {
|
|
|
|
bt_dev_err(hdev,
|
|
|
|
"unexpected event for opcode 0x%4.4x", *opcode);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-28 12:17:36 +03:00
|
|
|
if (atomic_read(&hdev->cmd_cnt) && !skb_queue_empty(&hdev->cmd_q))
|
|
|
|
queue_work(hdev->workqueue, &hdev->cmd_work);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
static void hci_cmd_status_evt(struct hci_dev *hdev, struct sk_buff *skb,
|
|
|
|
u16 *opcode, u8 *status,
|
|
|
|
hci_req_complete_t *req_complete,
|
|
|
|
hci_req_complete_skb_t *req_complete_skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_cmd_status *ev = (void *) skb->data;
|
|
|
|
|
|
|
|
skb_pull(skb, sizeof(*ev));
|
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
*opcode = __le16_to_cpu(ev->opcode);
|
|
|
|
*status = ev->status;
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
switch (*opcode) {
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_INQUIRY:
|
|
|
|
hci_cs_inquiry(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_CREATE_CONN:
|
|
|
|
hci_cs_create_conn(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2014-11-06 21:36:53 +03:00
|
|
|
case HCI_OP_DISCONNECT:
|
|
|
|
hci_cs_disconnect(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_ADD_SCO:
|
|
|
|
hci_cs_add_sco(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:49 +04:00
|
|
|
case HCI_OP_AUTH_REQUESTED:
|
|
|
|
hci_cs_auth_requested(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_SET_CONN_ENCRYPT:
|
|
|
|
hci_cs_set_conn_encrypt(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_REMOTE_NAME_REQ:
|
|
|
|
hci_cs_remote_name_req(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:49 +04:00
|
|
|
case HCI_OP_READ_REMOTE_FEATURES:
|
|
|
|
hci_cs_read_remote_features(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_READ_REMOTE_EXT_FEATURES:
|
|
|
|
hci_cs_read_remote_ext_features(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_OP_SETUP_SYNC_CONN:
|
|
|
|
hci_cs_setup_sync_conn(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_SNIFF_MODE:
|
|
|
|
hci_cs_sniff_mode(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_OP_EXIT_SNIFF_MODE:
|
|
|
|
hci_cs_exit_sniff_mode(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2014-11-06 21:36:52 +03:00
|
|
|
case HCI_OP_SWITCH_ROLE:
|
|
|
|
hci_cs_switch_role(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2014-02-28 14:54:16 +04:00
|
|
|
case HCI_OP_LE_CREATE_CONN:
|
|
|
|
hci_cs_le_create_conn(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2015-04-08 19:05:27 +03:00
|
|
|
case HCI_OP_LE_READ_REMOTE_FEATURES:
|
|
|
|
hci_cs_le_read_remote_features(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2014-03-24 16:39:04 +04:00
|
|
|
case HCI_OP_LE_START_ENC:
|
|
|
|
hci_cs_le_start_enc(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2018-07-06 23:50:32 +03:00
|
|
|
case HCI_OP_LE_EXT_CREATE_CONN:
|
|
|
|
hci_cs_le_ext_create_conn(hdev, ev->status);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
default:
|
2015-04-02 13:41:08 +03:00
|
|
|
BT_DBG("%s opcode 0x%4.4x", hdev->name, *opcode);
|
2007-10-20 15:33:56 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-08-16 02:37:47 +03:00
|
|
|
handle_cmd_cnt_and_timer(hdev, ev->ncmd);
|
2015-03-28 12:17:36 +03:00
|
|
|
|
2015-04-02 13:41:07 +03:00
|
|
|
/* Indicate request completion if the command failed. Also, if
|
|
|
|
* we're not waiting for a special event and we get a success
|
|
|
|
* command status we should try to flag the request as completed
|
|
|
|
* (since for this kind of commands there will not be a command
|
|
|
|
* complete event).
|
|
|
|
*/
|
2013-04-03 22:50:29 +04:00
|
|
|
if (ev->status ||
|
2015-10-26 00:45:53 +03:00
|
|
|
(hdev->sent_cmd && !bt_cb(hdev->sent_cmd)->hci.req_event))
|
2015-04-02 13:41:08 +03:00
|
|
|
hci_req_cmd_complete(hdev, *opcode, ev->status, req_complete,
|
|
|
|
req_complete_skb);
|
2013-03-05 22:37:48 +04:00
|
|
|
|
2019-05-02 05:01:52 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_CMD_PENDING)) {
|
|
|
|
bt_dev_err(hdev,
|
|
|
|
"unexpected event for opcode 0x%4.4x", *opcode);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-28 12:17:36 +03:00
|
|
|
if (atomic_read(&hdev->cmd_cnt) && !skb_queue_empty(&hdev->cmd_q))
|
|
|
|
queue_work(hdev->workqueue, &hdev->cmd_work);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2014-11-02 04:56:41 +03:00
|
|
|
static void hci_hardware_error_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_hardware_error *ev = (void *) skb->data;
|
|
|
|
|
2015-01-28 22:09:55 +03:00
|
|
|
hdev->hw_error_code = ev->code;
|
|
|
|
|
|
|
|
queue_work(hdev->req_workqueue, &hdev->error_reset);
|
2014-11-02 04:56:41 +03:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_role_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_role_change *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (conn) {
|
2014-07-16 12:42:27 +04:00
|
|
|
if (!ev->status)
|
|
|
|
conn->role = ev->role;
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
clear_bit(HCI_CONN_RSWITCH_PEND, &conn->flags);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
hci_role_switch_cfm(conn, ev->status, ev->role);
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_num_comp_pkts_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_num_comp_pkts *ev = (void *) skb->data;
|
|
|
|
int i;
|
|
|
|
|
2011-12-19 18:31:29 +04:00
|
|
|
if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_PACKET_BASED) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "wrong event for mode %d", hdev->flow_ctl_mode);
|
2011-12-19 18:31:29 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-08 03:40:33 +03:00
|
|
|
if (skb->len < sizeof(*ev) ||
|
|
|
|
skb->len < struct_size(ev, handles, ev->num_hndl)) {
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s bad parameters", hdev->name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-12-30 14:07:47 +04:00
|
|
|
BT_DBG("%s num_hndl %d", hdev->name, ev->num_hndl);
|
|
|
|
|
2011-12-19 18:31:30 +04:00
|
|
|
for (i = 0; i < ev->num_hndl; i++) {
|
|
|
|
struct hci_comp_pkts_info *info = &ev->handles[i];
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_conn *conn;
|
|
|
|
__u16 handle, count;
|
|
|
|
|
2011-12-19 18:31:30 +04:00
|
|
|
handle = __le16_to_cpu(info->handle);
|
|
|
|
count = __le16_to_cpu(info->count);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, handle);
|
2011-12-07 17:56:52 +04:00
|
|
|
if (!conn)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
conn->sent -= count;
|
|
|
|
|
|
|
|
switch (conn->type) {
|
|
|
|
case ACL_LINK:
|
|
|
|
hdev->acl_cnt += count;
|
|
|
|
if (hdev->acl_cnt > hdev->acl_pkts)
|
|
|
|
hdev->acl_cnt = hdev->acl_pkts;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case LE_LINK:
|
|
|
|
if (hdev->le_pkts) {
|
|
|
|
hdev->le_cnt += count;
|
|
|
|
if (hdev->le_cnt > hdev->le_pkts)
|
|
|
|
hdev->le_cnt = hdev->le_pkts;
|
|
|
|
} else {
|
2010-12-01 17:58:25 +03:00
|
|
|
hdev->acl_cnt += count;
|
|
|
|
if (hdev->acl_cnt > hdev->acl_pkts)
|
2007-10-20 15:33:56 +04:00
|
|
|
hdev->acl_cnt = hdev->acl_pkts;
|
|
|
|
}
|
2011-12-07 17:56:52 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case SCO_LINK:
|
|
|
|
hdev->sco_cnt += count;
|
|
|
|
if (hdev->sco_cnt > hdev->sco_pkts)
|
|
|
|
hdev->sco_cnt = hdev->sco_pkts;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "unknown type %d conn %p",
|
|
|
|
conn->type, conn);
|
2011-12-07 17:56:52 +04:00
|
|
|
break;
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-12-15 06:50:02 +04:00
|
|
|
queue_work(hdev->workqueue, &hdev->tx_work);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2012-10-10 18:38:29 +04:00
|
|
|
static struct hci_conn *__hci_conn_lookup_handle(struct hci_dev *hdev,
|
|
|
|
__u16 handle)
|
|
|
|
{
|
|
|
|
struct hci_chan *chan;
|
|
|
|
|
|
|
|
switch (hdev->dev_type) {
|
2016-07-05 15:30:14 +03:00
|
|
|
case HCI_PRIMARY:
|
2012-10-10 18:38:29 +04:00
|
|
|
return hci_conn_hash_lookup_handle(hdev, handle);
|
|
|
|
case HCI_AMP:
|
|
|
|
chan = hci_chan_lookup_handle(hdev, handle);
|
|
|
|
if (chan)
|
|
|
|
return chan->conn;
|
|
|
|
break;
|
|
|
|
default:
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "unknown dev_type %d", hdev->dev_type);
|
2012-10-10 18:38:29 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_num_comp_blocks_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2012-01-04 14:41:58 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_num_comp_blocks *ev = (void *) skb->data;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (hdev->flow_ctl_mode != HCI_FLOW_CTL_MODE_BLOCK_BASED) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "wrong event for mode %d", hdev->flow_ctl_mode);
|
2012-01-04 14:41:58 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-02-08 03:40:33 +03:00
|
|
|
if (skb->len < sizeof(*ev) ||
|
|
|
|
skb->len < struct_size(ev, handles, ev->num_hndl)) {
|
2012-01-04 14:41:58 +04:00
|
|
|
BT_DBG("%s bad parameters", hdev->name);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
BT_DBG("%s num_blocks %d num_hndl %d", hdev->name, ev->num_blocks,
|
2012-05-17 07:36:24 +04:00
|
|
|
ev->num_hndl);
|
2012-01-04 14:41:58 +04:00
|
|
|
|
|
|
|
for (i = 0; i < ev->num_hndl; i++) {
|
|
|
|
struct hci_comp_blocks_info *info = &ev->handles[i];
|
2012-10-10 18:38:29 +04:00
|
|
|
struct hci_conn *conn = NULL;
|
2012-01-04 14:41:58 +04:00
|
|
|
__u16 handle, block_count;
|
|
|
|
|
|
|
|
handle = __le16_to_cpu(info->handle);
|
|
|
|
block_count = __le16_to_cpu(info->blocks);
|
|
|
|
|
2012-10-10 18:38:29 +04:00
|
|
|
conn = __hci_conn_lookup_handle(hdev, handle);
|
2012-01-04 14:41:58 +04:00
|
|
|
if (!conn)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
conn->sent -= block_count;
|
|
|
|
|
|
|
|
switch (conn->type) {
|
|
|
|
case ACL_LINK:
|
2012-10-10 18:38:30 +04:00
|
|
|
case AMP_LINK:
|
2012-01-04 14:41:58 +04:00
|
|
|
hdev->block_cnt += block_count;
|
|
|
|
if (hdev->block_cnt > hdev->num_blocks)
|
|
|
|
hdev->block_cnt = hdev->num_blocks;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "unknown type %d conn %p",
|
|
|
|
conn->type, conn);
|
2012-01-04 14:41:58 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
queue_work(hdev->workqueue, &hdev->tx_work);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_mode_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2006-07-03 12:02:33 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_mode_change *ev = (void *) skb->data;
|
2006-07-03 12:02:33 +04:00
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2006-07-03 12:02:33 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2007-10-20 15:33:56 +04:00
|
|
|
if (conn) {
|
|
|
|
conn->mode = ev->mode;
|
|
|
|
|
2012-05-23 11:04:21 +04:00
|
|
|
if (!test_and_clear_bit(HCI_CONN_MODE_CHANGE_PEND,
|
|
|
|
&conn->flags)) {
|
2007-10-20 15:33:56 +04:00
|
|
|
if (conn->mode == HCI_CM_ACTIVE)
|
2012-01-16 08:47:28 +04:00
|
|
|
set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
|
2007-10-20 15:33:56 +04:00
|
|
|
else
|
2012-01-16 08:47:28 +04:00
|
|
|
clear_bit(HCI_CONN_POWER_SAVE, &conn->flags);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
2010-07-26 18:06:00 +04:00
|
|
|
|
2012-01-16 08:10:31 +04:00
|
|
|
if (test_and_clear_bit(HCI_CONN_SCO_SETUP_PEND, &conn->flags))
|
2010-07-26 18:06:00 +04:00
|
|
|
hci_sco_setup(conn, ev->status);
|
2006-07-03 12:02:33 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_pin_code_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2009-04-26 22:01:22 +04:00
|
|
|
struct hci_ev_pin_code_req *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s", hdev->name);
|
2009-04-26 22:01:22 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2011-09-23 12:01:30 +04:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
if (conn->state == BT_CONNECTED) {
|
2009-04-26 22:01:22 +04:00
|
|
|
hci_conn_hold(conn);
|
|
|
|
conn->disc_timeout = HCI_PAIRING_TIMEOUT;
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2009-04-26 22:01:22 +04:00
|
|
|
}
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_BONDABLE) &&
|
2014-07-17 16:35:40 +04:00
|
|
|
!test_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags)) {
|
2011-01-04 16:40:05 +03:00
|
|
|
hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(ev->bdaddr), &ev->bdaddr);
|
2015-03-13 12:11:00 +03:00
|
|
|
} else if (hci_dev_test_flag(hdev, HCI_MGMT)) {
|
2011-04-28 14:07:59 +04:00
|
|
|
u8 secure;
|
|
|
|
|
|
|
|
if (conn->pending_sec_level == BT_SECURITY_HIGH)
|
|
|
|
secure = 1;
|
|
|
|
else
|
|
|
|
secure = 0;
|
|
|
|
|
2011-11-08 22:40:14 +04:00
|
|
|
mgmt_pin_code_request(hdev, &ev->bdaddr, secure);
|
2011-04-28 14:07:59 +04:00
|
|
|
}
|
2011-01-22 07:10:07 +03:00
|
|
|
|
2011-09-23 12:01:30 +04:00
|
|
|
unlock:
|
2009-04-26 22:01:22 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2014-11-19 15:53:04 +03:00
|
|
|
static void conn_set_key(struct hci_conn *conn, u8 key_type, u8 pin_len)
|
|
|
|
{
|
|
|
|
if (key_type == HCI_LK_CHANGED_COMBINATION)
|
|
|
|
return;
|
|
|
|
|
|
|
|
conn->pin_length = pin_len;
|
|
|
|
conn->key_type = key_type;
|
|
|
|
|
|
|
|
switch (key_type) {
|
|
|
|
case HCI_LK_LOCAL_UNIT:
|
|
|
|
case HCI_LK_REMOTE_UNIT:
|
|
|
|
case HCI_LK_DEBUG_COMBINATION:
|
|
|
|
return;
|
|
|
|
case HCI_LK_COMBINATION:
|
|
|
|
if (pin_len == 16)
|
|
|
|
conn->pending_sec_level = BT_SECURITY_HIGH;
|
|
|
|
else
|
|
|
|
conn->pending_sec_level = BT_SECURITY_MEDIUM;
|
|
|
|
break;
|
|
|
|
case HCI_LK_UNAUTH_COMBINATION_P192:
|
|
|
|
case HCI_LK_UNAUTH_COMBINATION_P256:
|
|
|
|
conn->pending_sec_level = BT_SECURITY_MEDIUM;
|
|
|
|
break;
|
|
|
|
case HCI_LK_AUTH_COMBINATION_P192:
|
|
|
|
conn->pending_sec_level = BT_SECURITY_HIGH;
|
|
|
|
break;
|
|
|
|
case HCI_LK_AUTH_COMBINATION_P256:
|
|
|
|
conn->pending_sec_level = BT_SECURITY_FIPS;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_link_key_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2011-01-17 15:41:05 +03:00
|
|
|
struct hci_ev_link_key_req *ev = (void *) skb->data;
|
|
|
|
struct hci_cp_link_key_reply cp;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
struct link_key *key;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s", hdev->name);
|
2011-01-17 15:41:05 +03:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-01-17 15:41:05 +03:00
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
key = hci_find_link_key(hdev, &ev->bdaddr);
|
|
|
|
if (!key) {
|
2012-09-25 13:49:43 +04:00
|
|
|
BT_DBG("%s link key not found for %pMR", hdev->name,
|
|
|
|
&ev->bdaddr);
|
2011-01-17 15:41:05 +03:00
|
|
|
goto not_found;
|
|
|
|
}
|
|
|
|
|
2012-09-25 13:49:43 +04:00
|
|
|
BT_DBG("%s found key type %u for %pMR", hdev->name, key->type,
|
|
|
|
&ev->bdaddr);
|
2011-01-17 15:41:05 +03:00
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2011-04-28 14:07:56 +04:00
|
|
|
if (conn) {
|
2014-08-14 13:33:17 +04:00
|
|
|
clear_bit(HCI_CONN_NEW_LINK_KEY, &conn->flags);
|
|
|
|
|
2014-01-10 14:07:20 +04:00
|
|
|
if ((key->type == HCI_LK_UNAUTH_COMBINATION_P192 ||
|
|
|
|
key->type == HCI_LK_UNAUTH_COMBINATION_P256) &&
|
2012-05-17 07:36:24 +04:00
|
|
|
conn->auth_type != 0xff && (conn->auth_type & 0x01)) {
|
2011-04-28 14:07:56 +04:00
|
|
|
BT_DBG("%s ignoring unauthenticated key", hdev->name);
|
|
|
|
goto not_found;
|
|
|
|
}
|
2011-01-17 15:41:05 +03:00
|
|
|
|
2011-04-28 14:07:56 +04:00
|
|
|
if (key->type == HCI_LK_COMBINATION && key->pin_len < 16 &&
|
2014-06-02 11:12:44 +04:00
|
|
|
(conn->pending_sec_level == BT_SECURITY_HIGH ||
|
|
|
|
conn->pending_sec_level == BT_SECURITY_FIPS)) {
|
2012-05-23 11:04:21 +04:00
|
|
|
BT_DBG("%s ignoring key unauthenticated for high security",
|
|
|
|
hdev->name);
|
2011-04-28 14:07:56 +04:00
|
|
|
goto not_found;
|
|
|
|
}
|
|
|
|
|
2014-11-19 15:53:04 +03:00
|
|
|
conn_set_key(conn, key->type, key->pin_len);
|
2011-01-17 15:41:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2012-05-23 12:31:20 +04:00
|
|
|
memcpy(cp.link_key, key->val, HCI_LINK_KEY_SIZE);
|
2011-01-17 15:41:05 +03:00
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LINK_KEY_REPLY, sizeof(cp), &cp);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
not_found:
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LINK_KEY_NEG_REPLY, 6, &ev->bdaddr);
|
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_link_key_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2009-04-26 22:01:22 +04:00
|
|
|
struct hci_ev_link_key_notify *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
2014-06-24 14:15:49 +04:00
|
|
|
struct link_key *key;
|
|
|
|
bool persistent;
|
2011-01-17 15:41:05 +03:00
|
|
|
u8 pin_len = 0;
|
2009-04-26 22:01:22 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s", hdev->name);
|
2009-04-26 22:01:22 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2014-12-03 12:03:06 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
hci_conn_hold(conn);
|
|
|
|
conn->disc_timeout = HCI_DISCONN_TIMEOUT;
|
|
|
|
hci_conn_drop(conn);
|
|
|
|
|
2014-08-14 13:33:17 +04:00
|
|
|
set_bit(HCI_CONN_NEW_LINK_KEY, &conn->flags);
|
2014-12-03 12:03:06 +03:00
|
|
|
conn_set_key(conn, ev->key_type, conn->pin_length);
|
2009-04-26 22:01:22 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2014-06-24 14:15:49 +04:00
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
key = hci_add_link_key(hdev, conn, &ev->bdaddr, ev->link_key,
|
|
|
|
ev->key_type, pin_len, &persistent);
|
|
|
|
if (!key)
|
|
|
|
goto unlock;
|
|
|
|
|
2014-11-19 15:53:04 +03:00
|
|
|
/* Update connection information since adding the key will have
|
|
|
|
* fixed up the type in the case of changed combination keys.
|
|
|
|
*/
|
|
|
|
if (ev->key_type == HCI_LK_CHANGED_COMBINATION)
|
|
|
|
conn_set_key(conn, key->type, key->pin_len);
|
|
|
|
|
2014-06-24 14:15:49 +04:00
|
|
|
mgmt_new_link_key(hdev, key, persistent);
|
2011-01-17 15:41:05 +03:00
|
|
|
|
2014-06-24 14:15:51 +04:00
|
|
|
/* Keep debug keys around only if the HCI_KEEP_DEBUG_KEYS flag
|
|
|
|
* is set. If it's not set simply remove the key from the kernel
|
|
|
|
* list (we've still notified user space about it but with
|
|
|
|
* store_hint being 0).
|
|
|
|
*/
|
|
|
|
if (key->type == HCI_LK_DEBUG_COMBINATION &&
|
2015-03-13 12:11:00 +03:00
|
|
|
!hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS)) {
|
2014-11-19 16:22:22 +03:00
|
|
|
list_del_rcu(&key->list);
|
|
|
|
kfree_rcu(key, rcu);
|
2014-12-03 12:03:06 +03:00
|
|
|
goto unlock;
|
2014-06-24 14:15:51 +04:00
|
|
|
}
|
2014-06-24 14:15:49 +04:00
|
|
|
|
2014-12-03 12:03:06 +03:00
|
|
|
if (persistent)
|
|
|
|
clear_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
|
|
|
|
else
|
|
|
|
set_bit(HCI_CONN_FLUSH_KEY, &conn->flags);
|
|
|
|
|
2014-06-24 14:15:49 +04:00
|
|
|
unlock:
|
2009-04-26 22:01:22 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_clock_offset_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_clock_offset *ev = (void *) skb->data;
|
2006-07-03 12:02:33 +04:00
|
|
|
struct hci_conn *conn;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2006-07-03 12:02:33 +04:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2005-04-17 02:20:36 +04:00
|
|
|
if (conn && !ev->status) {
|
|
|
|
struct inquiry_entry *ie;
|
|
|
|
|
2010-11-22 14:21:37 +03:00
|
|
|
ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
|
|
|
|
if (ie) {
|
2005-04-17 02:20:36 +04:00
|
|
|
ie->data.clock_offset = ev->clock_offset;
|
|
|
|
ie->timestamp = jiffies;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_pkt_type_change_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2008-07-14 22:13:46 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_pkt_type_change *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2008-07-14 22:13:46 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
|
|
|
if (conn && !ev->status)
|
|
|
|
conn->pkt_type = __le16_to_cpu(ev->pkt_type);
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_pscan_rep_mode_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2005-08-10 07:28:02 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct hci_ev_pscan_rep_mode *ev = (void *) skb->data;
|
2005-08-10 07:28:02 +04:00
|
|
|
struct inquiry_entry *ie;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2010-11-22 14:21:37 +03:00
|
|
|
ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
|
|
|
|
if (ie) {
|
2005-08-10 07:28:02 +04:00
|
|
|
ie->data.pscan_rep_mode = ev->pscan_rep_mode;
|
|
|
|
ie->timestamp = jiffies;
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_inquiry_result_with_rssi_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
|
|
|
struct inquiry_data data;
|
|
|
|
int num_rsp = *((__u8 *) skb->data);
|
|
|
|
|
|
|
|
BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
|
|
|
|
|
|
|
|
if (!num_rsp)
|
|
|
|
return;
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
|
2012-03-21 07:03:38 +04:00
|
|
|
return;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
if ((skb->len - 1) / num_rsp != sizeof(struct inquiry_info_with_rssi)) {
|
2011-02-17 18:44:23 +03:00
|
|
|
struct inquiry_info_with_rssi_and_pscan_mode *info;
|
|
|
|
info = (void *) (skb->data + 1);
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2020-07-11 00:45:26 +03:00
|
|
|
if (skb->len < num_rsp * sizeof(*info) + 1)
|
|
|
|
goto unlock;
|
|
|
|
|
2011-03-31 00:57:16 +04:00
|
|
|
for (; num_rsp; num_rsp--, info++) {
|
2014-07-01 16:11:20 +04:00
|
|
|
u32 flags;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
bacpy(&data.bdaddr, &info->bdaddr);
|
|
|
|
data.pscan_rep_mode = info->pscan_rep_mode;
|
|
|
|
data.pscan_period_mode = info->pscan_period_mode;
|
|
|
|
data.pscan_mode = info->pscan_mode;
|
|
|
|
memcpy(data.dev_class, info->dev_class, 3);
|
|
|
|
data.clock_offset = info->clock_offset;
|
|
|
|
data.rssi = info->rssi;
|
2008-07-14 22:13:48 +04:00
|
|
|
data.ssp_mode = 0x00;
|
2012-01-04 15:39:52 +04:00
|
|
|
|
2014-07-01 16:11:20 +04:00
|
|
|
flags = hci_inquiry_cache_update(hdev, &data, false);
|
|
|
|
|
2011-11-09 15:58:58 +04:00
|
|
|
mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
|
2012-03-08 08:25:00 +04:00
|
|
|
info->dev_class, info->rssi,
|
2014-07-01 16:11:20 +04:00
|
|
|
flags, NULL, 0, NULL, 0);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
struct inquiry_info_with_rssi *info = (void *) (skb->data + 1);
|
|
|
|
|
2020-07-11 00:45:26 +03:00
|
|
|
if (skb->len < num_rsp * sizeof(*info) + 1)
|
|
|
|
goto unlock;
|
|
|
|
|
2011-03-31 00:57:16 +04:00
|
|
|
for (; num_rsp; num_rsp--, info++) {
|
2014-07-01 16:11:20 +04:00
|
|
|
u32 flags;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
bacpy(&data.bdaddr, &info->bdaddr);
|
|
|
|
data.pscan_rep_mode = info->pscan_rep_mode;
|
|
|
|
data.pscan_period_mode = info->pscan_period_mode;
|
|
|
|
data.pscan_mode = 0x00;
|
|
|
|
memcpy(data.dev_class, info->dev_class, 3);
|
|
|
|
data.clock_offset = info->clock_offset;
|
|
|
|
data.rssi = info->rssi;
|
2008-07-14 22:13:48 +04:00
|
|
|
data.ssp_mode = 0x00;
|
2014-07-01 16:11:20 +04:00
|
|
|
|
|
|
|
flags = hci_inquiry_cache_update(hdev, &data, false);
|
|
|
|
|
2011-11-09 15:58:58 +04:00
|
|
|
mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
|
2012-03-08 08:25:00 +04:00
|
|
|
info->dev_class, info->rssi,
|
2014-07-01 16:11:20 +04:00
|
|
|
flags, NULL, 0, NULL, 0);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-11 00:45:26 +03:00
|
|
|
unlock:
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_remote_ext_features_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2008-07-14 22:13:48 +04:00
|
|
|
struct hci_ev_remote_ext_features *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s", hdev->name);
|
2008-07-14 22:13:48 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2010-11-10 18:11:51 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
2008-07-14 22:13:48 +04:00
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
if (ev->page < HCI_MAX_PAGES)
|
|
|
|
memcpy(conn->features[ev->page], ev->features, 8);
|
|
|
|
|
2010-11-10 18:11:51 +03:00
|
|
|
if (!ev->status && ev->page == 0x01) {
|
|
|
|
struct inquiry_entry *ie;
|
2008-07-14 22:13:48 +04:00
|
|
|
|
2010-11-22 14:21:37 +03:00
|
|
|
ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
|
|
|
|
if (ie)
|
2012-02-28 04:28:43 +04:00
|
|
|
ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
|
2008-07-14 22:13:49 +04:00
|
|
|
|
2013-04-16 18:46:30 +04:00
|
|
|
if (ev->features[0] & LMP_HOST_SSP) {
|
2012-01-16 08:47:28 +04:00
|
|
|
set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
|
2013-04-16 18:46:30 +04:00
|
|
|
} else {
|
|
|
|
/* It is mandatory by the Bluetooth specification that
|
|
|
|
* Extended Inquiry Results are only used when Secure
|
|
|
|
* Simple Pairing is enabled, but some devices violate
|
|
|
|
* this.
|
|
|
|
*
|
|
|
|
* To make these devices work, the internal SSP
|
|
|
|
* enabled flag needs to be cleared if the remote host
|
|
|
|
* features do not indicate SSP support */
|
|
|
|
clear_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
|
|
|
|
}
|
2014-01-16 10:37:38 +04:00
|
|
|
|
|
|
|
if (ev->features[0] & LMP_HOST_SC)
|
|
|
|
set_bit(HCI_CONN_SC_ENABLED, &conn->flags);
|
2010-11-10 18:11:51 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->state != BT_CONFIG)
|
|
|
|
goto unlock;
|
|
|
|
|
2012-05-12 23:11:50 +04:00
|
|
|
if (!ev->status && !test_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags)) {
|
2010-11-18 23:22:29 +03:00
|
|
|
struct hci_cp_remote_name_req cp;
|
|
|
|
memset(&cp, 0, sizeof(cp));
|
|
|
|
bacpy(&cp.bdaddr, &conn->dst);
|
|
|
|
cp.pscan_rep_mode = 0x02;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ, sizeof(cp), &cp);
|
2012-01-17 23:48:47 +04:00
|
|
|
} else if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
|
2021-04-10 01:04:06 +03:00
|
|
|
mgmt_device_connected(hdev, conn, NULL, 0);
|
2010-11-18 23:22:28 +03:00
|
|
|
|
2010-11-18 23:22:29 +03:00
|
|
|
if (!hci_outgoing_auth_needed(hdev, conn)) {
|
2010-11-10 18:11:51 +03:00
|
|
|
conn->state = BT_CONNECTED;
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2008-07-14 22:13:48 +04:00
|
|
|
}
|
|
|
|
|
2010-11-10 18:11:51 +03:00
|
|
|
unlock:
|
2008-07-14 22:13:48 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_sync_conn_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2007-10-20 15:33:56 +04:00
|
|
|
{
|
2007-10-20 16:55:10 +04:00
|
|
|
struct hci_ev_sync_conn_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
2007-10-20 16:55:10 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ev->link_type, &ev->bdaddr);
|
2008-07-14 22:13:46 +04:00
|
|
|
if (!conn) {
|
|
|
|
if (ev->link_type == ESCO_LINK)
|
|
|
|
goto unlock;
|
|
|
|
|
2015-08-28 15:05:22 +03:00
|
|
|
/* When the link type in the event indicates SCO connection
|
|
|
|
* and lookup of the connection object fails, then check
|
|
|
|
* if an eSCO connection object exists.
|
|
|
|
*
|
|
|
|
* The core limits the synchronous connections to either
|
|
|
|
* SCO or eSCO. The eSCO connection is preferred and tried
|
|
|
|
* to be setup first and until successfully established,
|
|
|
|
* the link type will be hinted as eSCO.
|
|
|
|
*/
|
2008-07-14 22:13:46 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ESCO_LINK, &ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
}
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2009-04-19 21:14:14 +04:00
|
|
|
switch (ev->status) {
|
|
|
|
case 0x00:
|
2021-07-28 10:51:04 +03:00
|
|
|
/* The synchronous connection complete event should only be
|
|
|
|
* sent once per new connection. Receiving a successful
|
|
|
|
* complete event when the connection status is already
|
|
|
|
* BT_CONNECTED means that the device is misbehaving and sent
|
|
|
|
* multiple complete event packets for the same new connection.
|
|
|
|
*
|
|
|
|
* Registering the device more than once can corrupt kernel
|
|
|
|
* memory, hence upon detecting this invalid event, we report
|
|
|
|
* an error and ignore the packet.
|
|
|
|
*/
|
|
|
|
if (conn->state == BT_CONNECTED) {
|
|
|
|
bt_dev_err(hdev, "Ignoring connect complete event for existing connection");
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2007-10-20 16:55:10 +04:00
|
|
|
conn->handle = __le16_to_cpu(ev->handle);
|
|
|
|
conn->state = BT_CONNECTED;
|
2015-08-28 15:05:22 +03:00
|
|
|
conn->type = ev->link_type;
|
2008-07-14 22:13:51 +04:00
|
|
|
|
2014-12-20 19:13:41 +03:00
|
|
|
hci_debugfs_create_conn(conn);
|
2008-07-14 22:13:51 +04:00
|
|
|
hci_conn_add_sysfs(conn);
|
2009-04-19 21:14:14 +04:00
|
|
|
break;
|
|
|
|
|
2014-06-30 09:55:01 +04:00
|
|
|
case 0x10: /* Connection Accept Timeout */
|
2013-08-19 16:24:02 +04:00
|
|
|
case 0x0d: /* Connection Rejected due to Limited Resources */
|
2010-02-16 19:29:44 +03:00
|
|
|
case 0x11: /* Unsupported Feature or Parameter Value */
|
2009-04-19 21:14:14 +04:00
|
|
|
case 0x1c: /* SCO interval rejected */
|
2010-02-03 22:42:26 +03:00
|
|
|
case 0x1a: /* Unsupported Remote Feature */
|
2020-05-15 12:27:04 +03:00
|
|
|
case 0x1e: /* Invalid LMP Parameters */
|
2009-04-19 21:14:14 +04:00
|
|
|
case 0x1f: /* Unspecified error */
|
2014-03-10 14:31:04 +04:00
|
|
|
case 0x20: /* Unsupported LMP Parameter value */
|
2013-08-19 16:24:03 +04:00
|
|
|
if (conn->out) {
|
2009-04-19 21:14:14 +04:00
|
|
|
conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
|
|
|
|
(hdev->esco_type & EDR_ESCO_MASK);
|
2013-08-19 16:24:03 +04:00
|
|
|
if (hci_setup_sync(conn, conn->link->handle))
|
|
|
|
goto unlock;
|
2009-04-19 21:14:14 +04:00
|
|
|
}
|
2020-07-08 23:18:23 +03:00
|
|
|
fallthrough;
|
2009-04-19 21:14:14 +04:00
|
|
|
|
|
|
|
default:
|
2007-10-20 16:55:10 +04:00
|
|
|
conn->state = BT_CLOSED;
|
2009-04-19 21:14:14 +04:00
|
|
|
break;
|
|
|
|
}
|
2007-10-20 16:55:10 +04:00
|
|
|
|
2020-04-03 22:43:58 +03:00
|
|
|
bt_dev_dbg(hdev, "SCO connected with air mode: %02x", ev->air_mode);
|
|
|
|
|
2021-04-08 20:01:59 +03:00
|
|
|
switch (ev->air_mode) {
|
|
|
|
case 0x02:
|
2020-04-03 22:43:58 +03:00
|
|
|
if (hdev->notify)
|
|
|
|
hdev->notify(hdev, HCI_NOTIFY_ENABLE_SCO_CVSD);
|
|
|
|
break;
|
2021-04-08 20:01:59 +03:00
|
|
|
case 0x03:
|
2020-04-03 22:43:58 +03:00
|
|
|
if (hdev->notify)
|
|
|
|
hdev->notify(hdev, HCI_NOTIFY_ENABLE_SCO_TRANSP);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2007-10-20 16:55:10 +04:00
|
|
|
if (ev->status)
|
|
|
|
hci_conn_del(conn);
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
2013-10-15 21:31:12 +04:00
|
|
|
static inline size_t eir_get_length(u8 *eir, size_t eir_len)
|
|
|
|
{
|
|
|
|
size_t parsed = 0;
|
|
|
|
|
|
|
|
while (parsed < eir_len) {
|
|
|
|
u8 field_len = eir[0];
|
|
|
|
|
|
|
|
if (field_len == 0)
|
|
|
|
return parsed;
|
|
|
|
|
|
|
|
parsed += field_len + 1;
|
|
|
|
eir += field_len + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return eir_len;
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_extended_inquiry_result_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2005-04-17 02:20:36 +04:00
|
|
|
{
|
2007-10-20 15:33:56 +04:00
|
|
|
struct inquiry_data data;
|
|
|
|
struct extended_inquiry_info *info = (void *) (skb->data + 1);
|
|
|
|
int num_rsp = *((__u8 *) skb->data);
|
2012-04-26 17:49:56 +04:00
|
|
|
size_t eir_len;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
BT_DBG("%s num_rsp %d", hdev->name, num_rsp);
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2020-07-10 19:09:15 +03:00
|
|
|
if (!num_rsp || skb->len < num_rsp * sizeof(*info) + 1)
|
2007-10-20 15:33:56 +04:00
|
|
|
return;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_PERIODIC_INQ))
|
2012-03-21 07:03:38 +04:00
|
|
|
return;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2011-03-31 00:57:16 +04:00
|
|
|
for (; num_rsp; num_rsp--, info++) {
|
2014-07-01 16:11:20 +04:00
|
|
|
u32 flags;
|
|
|
|
bool name_known;
|
2012-01-04 15:31:59 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
bacpy(&data.bdaddr, &info->bdaddr);
|
2011-02-17 18:44:23 +03:00
|
|
|
data.pscan_rep_mode = info->pscan_rep_mode;
|
|
|
|
data.pscan_period_mode = info->pscan_period_mode;
|
|
|
|
data.pscan_mode = 0x00;
|
2007-10-20 15:33:56 +04:00
|
|
|
memcpy(data.dev_class, info->dev_class, 3);
|
2011-02-17 18:44:23 +03:00
|
|
|
data.clock_offset = info->clock_offset;
|
|
|
|
data.rssi = info->rssi;
|
2008-07-14 22:13:48 +04:00
|
|
|
data.ssp_mode = 0x01;
|
2012-01-04 15:31:59 +04:00
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2016-01-05 14:19:31 +03:00
|
|
|
name_known = eir_get_data(info->data,
|
|
|
|
sizeof(info->data),
|
|
|
|
EIR_NAME_COMPLETE, NULL);
|
2012-01-04 15:31:59 +04:00
|
|
|
else
|
|
|
|
name_known = true;
|
|
|
|
|
2014-07-01 16:11:20 +04:00
|
|
|
flags = hci_inquiry_cache_update(hdev, &data, name_known);
|
|
|
|
|
2012-04-26 17:49:56 +04:00
|
|
|
eir_len = eir_get_length(info->data, sizeof(info->data));
|
2014-07-01 16:11:20 +04:00
|
|
|
|
2011-11-09 15:58:58 +04:00
|
|
|
mgmt_device_found(hdev, &info->bdaddr, ACL_LINK, 0x00,
|
2014-07-01 16:11:20 +04:00
|
|
|
info->dev_class, info->rssi,
|
|
|
|
flags, info->data, eir_len, NULL, 0);
|
2007-10-20 15:33:56 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-06-08 19:31:13 +04:00
|
|
|
static void hci_key_refresh_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_key_refresh_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s status 0x%2.2x handle 0x%4.4x", hdev->name, ev->status,
|
2012-06-08 19:31:13 +04:00
|
|
|
__le16_to_cpu(ev->handle));
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
2014-04-11 23:02:31 +04:00
|
|
|
/* For BR/EDR the necessary steps are taken through the
|
|
|
|
* auth_complete event.
|
|
|
|
*/
|
|
|
|
if (conn->type != LE_LINK)
|
|
|
|
goto unlock;
|
|
|
|
|
2012-06-08 19:31:13 +04:00
|
|
|
if (!ev->status)
|
|
|
|
conn->sec_level = conn->pending_sec_level;
|
|
|
|
|
|
|
|
clear_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
|
|
|
|
|
|
|
|
if (ev->status && conn->state == BT_CONNECTED) {
|
2013-01-30 18:50:56 +04:00
|
|
|
hci_disconnect(conn, HCI_ERROR_AUTH_FAILURE);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2012-06-08 19:31:13 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (conn->state == BT_CONFIG) {
|
|
|
|
if (!ev->status)
|
|
|
|
conn->state = BT_CONNECTED;
|
|
|
|
|
2015-02-18 15:53:57 +03:00
|
|
|
hci_connect_cfm(conn, ev->status);
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2012-06-08 19:31:13 +04:00
|
|
|
} else {
|
|
|
|
hci_auth_cfm(conn, ev->status);
|
|
|
|
|
|
|
|
hci_conn_hold(conn);
|
|
|
|
conn->disc_timeout = HCI_DISCONN_TIMEOUT;
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2012-06-08 19:31:13 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static u8 hci_get_auth_req(struct hci_conn *conn)
|
2011-01-25 14:28:33 +03:00
|
|
|
{
|
|
|
|
/* If remote requests no-bonding follow that lead */
|
2013-06-28 12:56:28 +04:00
|
|
|
if (conn->remote_auth == HCI_AT_NO_BONDING ||
|
|
|
|
conn->remote_auth == HCI_AT_NO_BONDING_MITM)
|
2011-04-28 14:07:58 +04:00
|
|
|
return conn->remote_auth | (conn->auth_type & 0x01);
|
2011-01-25 14:28:33 +03:00
|
|
|
|
2014-04-08 16:21:31 +04:00
|
|
|
/* If both remote and local have enough IO capabilities, require
|
|
|
|
* MITM protection
|
|
|
|
*/
|
|
|
|
if (conn->remote_cap != HCI_IO_NO_INPUT_OUTPUT &&
|
|
|
|
conn->io_capability != HCI_IO_NO_INPUT_OUTPUT)
|
|
|
|
return conn->remote_auth | 0x01;
|
|
|
|
|
2014-04-08 16:21:33 +04:00
|
|
|
/* No MITM protection possible so ignore remote requirement */
|
|
|
|
return (conn->remote_auth & ~0x01) | (conn->auth_type & 0x01);
|
2011-01-25 14:28:33 +03:00
|
|
|
}
|
|
|
|
|
2015-01-28 03:04:32 +03:00
|
|
|
static u8 bredr_oob_data_present(struct hci_conn *conn)
|
|
|
|
{
|
|
|
|
struct hci_dev *hdev = conn->hdev;
|
|
|
|
struct oob_data *data;
|
|
|
|
|
|
|
|
data = hci_find_remote_oob_data(hdev, &conn->dst, BDADDR_BREDR);
|
|
|
|
if (!data)
|
|
|
|
return 0x00;
|
|
|
|
|
2015-03-16 02:42:53 +03:00
|
|
|
if (bredr_sc_enabled(hdev)) {
|
|
|
|
/* When Secure Connections is enabled, then just
|
|
|
|
* return the present value stored with the OOB
|
|
|
|
* data. The stored value contains the right present
|
|
|
|
* information. However it can only be trusted when
|
|
|
|
* not in Secure Connection Only mode.
|
|
|
|
*/
|
|
|
|
if (!hci_dev_test_flag(hdev, HCI_SC_ONLY))
|
|
|
|
return data->present;
|
2015-01-31 10:20:56 +03:00
|
|
|
|
2015-03-16 02:42:53 +03:00
|
|
|
/* When Secure Connections Only mode is enabled, then
|
|
|
|
* the P-256 values are required. If they are not
|
|
|
|
* available, then do not declare that OOB data is
|
|
|
|
* present.
|
2015-01-31 10:20:56 +03:00
|
|
|
*/
|
2015-03-16 02:42:53 +03:00
|
|
|
if (!memcmp(data->rand256, ZERO_KEY, 16) ||
|
|
|
|
!memcmp(data->hash256, ZERO_KEY, 16))
|
2015-01-31 10:20:56 +03:00
|
|
|
return 0x00;
|
|
|
|
|
2015-03-16 02:42:53 +03:00
|
|
|
return 0x02;
|
2015-01-31 10:20:56 +03:00
|
|
|
}
|
2015-01-28 03:04:32 +03:00
|
|
|
|
2015-03-16 02:42:53 +03:00
|
|
|
/* When Secure Connections is not enabled or actually
|
|
|
|
* not supported by the hardware, then check that if
|
|
|
|
* P-192 data values are present.
|
|
|
|
*/
|
|
|
|
if (!memcmp(data->rand192, ZERO_KEY, 16) ||
|
|
|
|
!memcmp(data->hash192, ZERO_KEY, 16))
|
|
|
|
return 0x00;
|
|
|
|
|
|
|
|
return 0x01;
|
2015-01-28 03:04:32 +03:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_io_capa_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2008-07-14 22:13:48 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_io_capa_request *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2011-01-04 16:40:05 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
hci_conn_hold(conn);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-01-04 16:40:05 +03:00
|
|
|
goto unlock;
|
|
|
|
|
2014-07-17 16:35:40 +04:00
|
|
|
/* Allow pairing if we're pairable, the initiators of the
|
|
|
|
* pairing or if the remote is not requesting bonding.
|
|
|
|
*/
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_BONDABLE) ||
|
2014-07-17 16:35:40 +04:00
|
|
|
test_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags) ||
|
2012-05-17 07:36:24 +04:00
|
|
|
(conn->remote_auth & ~0x01) == HCI_AT_NO_BONDING) {
|
2011-01-25 14:28:33 +03:00
|
|
|
struct hci_cp_io_capability_reply cp;
|
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2012-01-16 12:04:29 +04:00
|
|
|
/* Change the IO capability from KeyboardDisplay
|
|
|
|
* to DisplayYesNo as it is not supported by BT spec. */
|
|
|
|
cp.capability = (conn->io_capability == 0x04) ?
|
2013-06-28 12:56:29 +04:00
|
|
|
HCI_IO_DISPLAY_YESNO : conn->io_capability;
|
2014-04-08 16:21:31 +04:00
|
|
|
|
|
|
|
/* If we are initiators, there is no remote information yet */
|
|
|
|
if (conn->remote_auth == 0xff) {
|
2014-04-08 16:21:34 +04:00
|
|
|
/* Request MITM protection if our IO caps allow it
|
2014-06-09 15:41:25 +04:00
|
|
|
* except for the no-bonding case.
|
2014-04-08 16:21:34 +04:00
|
|
|
*/
|
2014-04-08 16:21:32 +04:00
|
|
|
if (conn->io_capability != HCI_IO_NO_INPUT_OUTPUT &&
|
2014-07-17 12:56:33 +04:00
|
|
|
conn->auth_type != HCI_AT_NO_BONDING)
|
2014-07-11 16:32:23 +04:00
|
|
|
conn->auth_type |= 0x01;
|
2014-04-08 16:21:31 +04:00
|
|
|
} else {
|
|
|
|
conn->auth_type = hci_get_auth_req(conn);
|
|
|
|
}
|
2011-01-25 14:28:33 +03:00
|
|
|
|
2014-07-30 10:22:24 +04:00
|
|
|
/* If we're not bondable, force one of the non-bondable
|
|
|
|
* authentication requirement values.
|
|
|
|
*/
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_BONDABLE))
|
2014-07-30 10:22:24 +04:00
|
|
|
conn->auth_type &= HCI_AT_NO_BONDING_MITM;
|
|
|
|
|
|
|
|
cp.authentication = conn->auth_type;
|
2015-01-28 03:04:32 +03:00
|
|
|
cp.oob_data = bredr_oob_data_present(conn);
|
2011-03-22 15:12:23 +03:00
|
|
|
|
2011-01-25 14:28:33 +03:00
|
|
|
hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_REPLY,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(cp), &cp);
|
2011-01-04 16:40:05 +03:00
|
|
|
} else {
|
|
|
|
struct hci_cp_io_capability_neg_reply cp;
|
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2011-11-07 16:20:25 +04:00
|
|
|
cp.reason = HCI_ERROR_PAIRING_NOT_ALLOWED;
|
2008-07-14 22:13:48 +04:00
|
|
|
|
2011-01-04 16:40:05 +03:00
|
|
|
hci_send_cmd(hdev, HCI_OP_IO_CAPABILITY_NEG_REPLY,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(cp), &cp);
|
2011-01-04 16:40:05 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_io_capa_reply_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2011-01-04 16:40:05 +03:00
|
|
|
{
|
|
|
|
struct hci_ev_io_capa_reply *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
conn->remote_cap = ev->capability;
|
|
|
|
conn->remote_auth = ev->authentication;
|
|
|
|
|
|
|
|
unlock:
|
2008-07-14 22:13:48 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_user_confirm_request_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2011-02-19 18:05:57 +03:00
|
|
|
{
|
|
|
|
struct hci_ev_user_confirm_req *ev = (void *) skb->data;
|
2011-04-28 22:28:56 +04:00
|
|
|
int loc_mitm, rem_mitm, confirm_hint = 0;
|
2011-04-28 22:28:53 +04:00
|
|
|
struct hci_conn *conn;
|
2011-02-19 18:05:57 +03:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-04-28 22:28:53 +04:00
|
|
|
goto unlock;
|
2011-02-19 18:05:57 +03:00
|
|
|
|
2011-04-28 22:28:53 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
loc_mitm = (conn->auth_type & 0x01);
|
|
|
|
rem_mitm = (conn->remote_auth & 0x01);
|
|
|
|
|
|
|
|
/* If we require MITM but the remote device can't provide that
|
2014-07-11 16:32:23 +04:00
|
|
|
* (it has NoInputNoOutput) then reject the confirmation
|
|
|
|
* request. We check the security level here since it doesn't
|
|
|
|
* necessarily match conn->auth_type.
|
2014-04-08 16:21:32 +04:00
|
|
|
*/
|
2014-07-11 16:32:23 +04:00
|
|
|
if (conn->pending_sec_level > BT_SECURITY_MEDIUM &&
|
|
|
|
conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) {
|
2011-04-28 22:28:53 +04:00
|
|
|
BT_DBG("Rejecting request: remote device can't provide MITM");
|
|
|
|
hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_NEG_REPLY,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(ev->bdaddr), &ev->bdaddr);
|
2011-04-28 22:28:53 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If no side requires MITM protection; auto-accept */
|
2013-06-28 12:56:29 +04:00
|
|
|
if ((!loc_mitm || conn->remote_cap == HCI_IO_NO_INPUT_OUTPUT) &&
|
|
|
|
(!rem_mitm || conn->io_capability == HCI_IO_NO_INPUT_OUTPUT)) {
|
2011-04-28 22:28:56 +04:00
|
|
|
|
|
|
|
/* If we're not the initiators request authorization to
|
|
|
|
* proceed from user space (mgmt_user_confirm with
|
2014-06-09 14:58:14 +04:00
|
|
|
* confirm_hint set to 1). The exception is if neither
|
2014-07-16 16:09:13 +04:00
|
|
|
* side had MITM or if the local IO capability is
|
|
|
|
* NoInputNoOutput, in which case we do auto-accept
|
2014-06-09 14:58:14 +04:00
|
|
|
*/
|
|
|
|
if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) &&
|
2014-07-16 16:09:13 +04:00
|
|
|
conn->io_capability != HCI_IO_NO_INPUT_OUTPUT &&
|
2014-06-09 14:58:14 +04:00
|
|
|
(loc_mitm || rem_mitm)) {
|
2011-04-28 22:28:56 +04:00
|
|
|
BT_DBG("Confirming auto-accept as acceptor");
|
|
|
|
confirm_hint = 1;
|
|
|
|
goto confirm;
|
|
|
|
}
|
|
|
|
|
Bluetooth: secure bluetooth stack from bluedump attack
Attack scenario:
1. A Chromebook (let's call this device A) is paired to a legitimate
Bluetooth classic device (e.g. a speaker) (let's call this device
B).
2. A malicious device (let's call this device C) pretends to be the
Bluetooth speaker by using the same BT address.
3. If device A is not currently connected to device B, device A will
be ready to accept connection from device B in the background
(technically, doing Page Scan).
4. Therefore, device C can initiate connection to device A
(because device A is doing Page Scan) and device A will accept the
connection because device A trusts device C's address which is the
same as device B's address.
5. Device C won't be able to communicate at any high level Bluetooth
profile with device A because device A enforces that device C is
encrypted with their common Link Key, which device C doesn't have.
But device C can initiate pairing with device A with just-works
model without requiring user interaction (there is only pairing
notification). After pairing, device A now trusts device C with a
new different link key, common between device A and C.
6. From now on, device A trusts device C, so device C can at anytime
connect to device A to do any kind of high-level hijacking, e.g.
speaker hijack or mouse/keyboard hijack.
Since we don't know whether the repairing is legitimate or not,
leave the decision to user space if all the conditions below are met.
- the pairing is initialized by peer
- the authorization method is just-work
- host already had the link key to the peer
Signed-off-by: Howard Chung <howardchung@google.com>
Acked-by: Johan Hedberg <johan.hedberg@intel.com>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2020-02-14 14:16:41 +03:00
|
|
|
/* If there already exists link key in local host, leave the
|
|
|
|
* decision to user space since the remote device could be
|
|
|
|
* legitimate or malicious.
|
|
|
|
*/
|
|
|
|
if (hci_find_link_key(hdev, &ev->bdaddr)) {
|
|
|
|
bt_dev_dbg(hdev, "Local host already has link key");
|
|
|
|
confirm_hint = 1;
|
|
|
|
goto confirm;
|
|
|
|
}
|
|
|
|
|
2011-04-28 22:28:54 +04:00
|
|
|
BT_DBG("Auto-accept of user confirmation with %ums delay",
|
2012-05-17 07:36:24 +04:00
|
|
|
hdev->auto_accept_delay);
|
2011-04-28 22:28:54 +04:00
|
|
|
|
|
|
|
if (hdev->auto_accept_delay > 0) {
|
|
|
|
int delay = msecs_to_jiffies(hdev->auto_accept_delay);
|
2013-10-16 19:11:39 +04:00
|
|
|
queue_delayed_work(conn->hdev->workqueue,
|
|
|
|
&conn->auto_accept_work, delay);
|
2011-04-28 22:28:54 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2011-04-28 22:28:53 +04:00
|
|
|
hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_REPLY,
|
2012-05-17 07:36:24 +04:00
|
|
|
sizeof(ev->bdaddr), &ev->bdaddr);
|
2011-04-28 22:28:53 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2011-04-28 22:28:56 +04:00
|
|
|
confirm:
|
2014-03-20 10:18:14 +04:00
|
|
|
mgmt_user_confirm_request(hdev, &ev->bdaddr, ACL_LINK, 0,
|
|
|
|
le32_to_cpu(ev->passkey), confirm_hint);
|
2011-04-28 22:28:53 +04:00
|
|
|
|
|
|
|
unlock:
|
2011-02-19 18:05:57 +03:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_user_passkey_request_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2011-11-23 20:28:34 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_user_passkey_req *ev = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-02-09 17:26:12 +04:00
|
|
|
mgmt_user_passkey_request(hdev, &ev->bdaddr, ACL_LINK, 0);
|
2011-11-23 20:28:34 +04:00
|
|
|
}
|
|
|
|
|
2012-09-06 19:39:26 +04:00
|
|
|
static void hci_user_passkey_notify_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_user_passkey_notify *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
return;
|
|
|
|
|
|
|
|
conn->passkey_notify = __le32_to_cpu(ev->passkey);
|
|
|
|
conn->passkey_entered = 0;
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-09-06 19:39:26 +04:00
|
|
|
mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
|
|
|
|
conn->dst_type, conn->passkey_notify,
|
|
|
|
conn->passkey_entered);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_keypress_notify_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_keypress_notify *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (!conn)
|
|
|
|
return;
|
|
|
|
|
|
|
|
switch (ev->type) {
|
|
|
|
case HCI_KEYPRESS_STARTED:
|
|
|
|
conn->passkey_entered = 0;
|
|
|
|
return;
|
|
|
|
|
|
|
|
case HCI_KEYPRESS_ENTERED:
|
|
|
|
conn->passkey_entered++;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_KEYPRESS_ERASED:
|
|
|
|
conn->passkey_entered--;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_KEYPRESS_CLEARED:
|
|
|
|
conn->passkey_entered = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_KEYPRESS_COMPLETED:
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_MGMT))
|
2012-09-06 19:39:26 +04:00
|
|
|
mgmt_user_passkey_notify(hdev, &conn->dst, conn->type,
|
|
|
|
conn->dst_type, conn->passkey_notify,
|
|
|
|
conn->passkey_entered);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_simple_pair_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2008-07-14 22:13:48 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_simple_pair_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
2011-02-19 18:06:00 +03:00
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
2014-07-17 16:14:50 +04:00
|
|
|
/* Reset the authentication requirement to unknown */
|
|
|
|
conn->remote_auth = 0xff;
|
|
|
|
|
2011-02-19 18:06:00 +03:00
|
|
|
/* To avoid duplicate auth_failed events to user space we check
|
|
|
|
* the HCI_CONN_AUTH_PEND flag which will be set if we
|
|
|
|
* initiated the authentication. A traditional auth_complete
|
|
|
|
* event gets always produced as initiator and is also mapped to
|
|
|
|
* the mgmt_auth_failed event */
|
2012-08-09 11:52:29 +04:00
|
|
|
if (!test_bit(HCI_CONN_AUTH_PEND, &conn->flags) && ev->status)
|
2014-09-09 04:09:49 +04:00
|
|
|
mgmt_auth_failed(conn, ev->status);
|
2008-07-14 22:13:48 +04:00
|
|
|
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(conn);
|
2011-02-19 18:06:00 +03:00
|
|
|
|
|
|
|
unlock:
|
2008-07-14 22:13:48 +04:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_remote_host_features_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2008-07-14 22:13:48 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_remote_host_features *ev = (void *) skb->data;
|
|
|
|
struct inquiry_entry *ie;
|
2013-04-17 16:00:51 +04:00
|
|
|
struct hci_conn *conn;
|
2008-07-14 22:13:48 +04:00
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2013-04-17 16:00:51 +04:00
|
|
|
conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &ev->bdaddr);
|
|
|
|
if (conn)
|
|
|
|
memcpy(conn->features[1], ev->features, 8);
|
|
|
|
|
2010-11-22 14:21:37 +03:00
|
|
|
ie = hci_inquiry_cache_lookup(hdev, &ev->bdaddr);
|
|
|
|
if (ie)
|
2012-02-28 04:28:43 +04:00
|
|
|
ie->data.ssp_mode = (ev->features[0] & LMP_HOST_SSP);
|
2008-07-14 22:13:48 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_remote_oob_data_request_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
2011-03-22 15:12:22 +03:00
|
|
|
{
|
|
|
|
struct hci_ev_remote_oob_data_request *ev = (void *) skb->data;
|
|
|
|
struct oob_data *data;
|
|
|
|
|
|
|
|
BT_DBG("%s", hdev->name);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_MGMT))
|
2011-04-06 15:01:59 +04:00
|
|
|
goto unlock;
|
|
|
|
|
2014-10-26 22:46:09 +03:00
|
|
|
data = hci_find_remote_oob_data(hdev, &ev->bdaddr, BDADDR_BREDR);
|
2015-01-28 03:04:31 +03:00
|
|
|
if (!data) {
|
|
|
|
struct hci_cp_remote_oob_data_neg_reply cp;
|
2014-01-10 14:07:28 +04:00
|
|
|
|
2015-01-28 03:04:31 +03:00
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_NEG_REPLY,
|
|
|
|
sizeof(cp), &cp);
|
|
|
|
goto unlock;
|
|
|
|
}
|
2011-03-22 15:12:22 +03:00
|
|
|
|
2015-01-28 03:04:31 +03:00
|
|
|
if (bredr_sc_enabled(hdev)) {
|
|
|
|
struct hci_cp_remote_oob_ext_data_reply cp;
|
2014-01-10 14:07:28 +04:00
|
|
|
|
2015-01-28 03:04:31 +03:00
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
|
2015-01-28 03:04:31 +03:00
|
|
|
memset(cp.hash192, 0, sizeof(cp.hash192));
|
|
|
|
memset(cp.rand192, 0, sizeof(cp.rand192));
|
|
|
|
} else {
|
|
|
|
memcpy(cp.hash192, data->hash192, sizeof(cp.hash192));
|
|
|
|
memcpy(cp.rand192, data->rand192, sizeof(cp.rand192));
|
2014-01-10 14:07:28 +04:00
|
|
|
}
|
2015-01-28 03:04:31 +03:00
|
|
|
memcpy(cp.hash256, data->hash256, sizeof(cp.hash256));
|
|
|
|
memcpy(cp.rand256, data->rand256, sizeof(cp.rand256));
|
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_EXT_DATA_REPLY,
|
|
|
|
sizeof(cp), &cp);
|
2011-03-22 15:12:22 +03:00
|
|
|
} else {
|
2015-01-28 03:04:31 +03:00
|
|
|
struct hci_cp_remote_oob_data_reply cp;
|
2011-03-22 15:12:22 +03:00
|
|
|
|
|
|
|
bacpy(&cp.bdaddr, &ev->bdaddr);
|
2015-01-28 03:04:31 +03:00
|
|
|
memcpy(cp.hash, data->hash192, sizeof(cp.hash));
|
|
|
|
memcpy(cp.rand, data->rand192, sizeof(cp.rand));
|
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_REMOTE_OOB_DATA_REPLY,
|
2014-01-10 14:07:28 +04:00
|
|
|
sizeof(cp), &cp);
|
2011-03-22 15:12:22 +03:00
|
|
|
}
|
|
|
|
|
2011-04-06 15:01:59 +04:00
|
|
|
unlock:
|
2011-03-22 15:12:22 +03:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2015-07-24 12:13:15 +03:00
|
|
|
#if IS_ENABLED(CONFIG_BT_HS)
|
|
|
|
static void hci_chan_selected_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_channel_selected *ev = (void *)skb->data;
|
|
|
|
struct hci_conn *hcon;
|
|
|
|
|
|
|
|
BT_DBG("%s handle 0x%2.2x", hdev->name, ev->phy_handle);
|
|
|
|
|
|
|
|
skb_pull(skb, sizeof(*ev));
|
|
|
|
|
|
|
|
hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
|
|
|
|
if (!hcon)
|
|
|
|
return;
|
|
|
|
|
|
|
|
amp_read_loc_assoc_final_data(hdev, hcon);
|
|
|
|
}
|
|
|
|
|
2012-10-25 16:20:44 +04:00
|
|
|
static void hci_phy_link_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_phy_link_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *hcon, *bredr_hcon;
|
|
|
|
|
|
|
|
BT_DBG("%s handle 0x%2.2x status 0x%2.2x", hdev->name, ev->phy_handle,
|
|
|
|
ev->status);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
|
2020-10-07 18:54:15 +03:00
|
|
|
if (!hcon)
|
|
|
|
goto unlock;
|
2012-10-25 16:20:44 +04:00
|
|
|
|
2020-10-07 18:54:15 +03:00
|
|
|
if (!hcon->amp_mgr)
|
|
|
|
goto unlock;
|
2020-09-30 17:18:13 +03:00
|
|
|
|
2012-10-25 16:20:44 +04:00
|
|
|
if (ev->status) {
|
|
|
|
hci_conn_del(hcon);
|
2020-10-07 18:54:15 +03:00
|
|
|
goto unlock;
|
2012-10-25 16:20:44 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bredr_hcon = hcon->amp_mgr->l2cap_conn->hcon;
|
|
|
|
|
|
|
|
hcon->state = BT_CONNECTED;
|
|
|
|
bacpy(&hcon->dst, &bredr_hcon->dst);
|
|
|
|
|
|
|
|
hci_conn_hold(hcon);
|
|
|
|
hcon->disc_timeout = HCI_DISCONN_TIMEOUT;
|
2013-04-06 22:28:37 +04:00
|
|
|
hci_conn_drop(hcon);
|
2012-10-25 16:20:44 +04:00
|
|
|
|
2014-12-20 19:13:41 +03:00
|
|
|
hci_debugfs_create_conn(hcon);
|
2012-10-25 16:20:44 +04:00
|
|
|
hci_conn_add_sysfs(hcon);
|
|
|
|
|
2012-10-31 17:46:36 +04:00
|
|
|
amp_physical_cfm(bredr_hcon, hcon);
|
2012-10-25 16:20:44 +04:00
|
|
|
|
2020-10-07 18:54:15 +03:00
|
|
|
unlock:
|
2012-10-31 17:46:36 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2012-10-25 16:20:44 +04:00
|
|
|
}
|
|
|
|
|
2012-10-25 16:20:45 +04:00
|
|
|
static void hci_loglink_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_logical_link_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *hcon;
|
|
|
|
struct hci_chan *hchan;
|
|
|
|
struct amp_mgr *mgr;
|
|
|
|
|
|
|
|
BT_DBG("%s log_handle 0x%4.4x phy_handle 0x%2.2x status 0x%2.2x",
|
|
|
|
hdev->name, le16_to_cpu(ev->handle), ev->phy_handle,
|
|
|
|
ev->status);
|
|
|
|
|
|
|
|
hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
|
|
|
|
if (!hcon)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Create AMP hchan */
|
|
|
|
hchan = hci_chan_create(hcon);
|
|
|
|
if (!hchan)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hchan->handle = le16_to_cpu(ev->handle);
|
2021-03-22 09:03:11 +03:00
|
|
|
hchan->amp = true;
|
2012-10-25 16:20:45 +04:00
|
|
|
|
|
|
|
BT_DBG("hcon %p mgr %p hchan %p", hcon, hcon->amp_mgr, hchan);
|
|
|
|
|
|
|
|
mgr = hcon->amp_mgr;
|
|
|
|
if (mgr && mgr->bredr_chan) {
|
|
|
|
struct l2cap_chan *bredr_chan = mgr->bredr_chan;
|
|
|
|
|
|
|
|
l2cap_chan_lock(bredr_chan);
|
|
|
|
|
|
|
|
bredr_chan->conn->mtu = hdev->block_mtu;
|
|
|
|
l2cap_logical_cfm(bredr_chan, hchan, 0);
|
|
|
|
hci_conn_hold(hcon);
|
|
|
|
|
|
|
|
l2cap_chan_unlock(bredr_chan);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-10-31 17:46:31 +04:00
|
|
|
static void hci_disconn_loglink_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_disconn_logical_link_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_chan *hchan;
|
|
|
|
|
|
|
|
BT_DBG("%s log handle 0x%4.4x status 0x%2.2x", hdev->name,
|
|
|
|
le16_to_cpu(ev->handle), ev->status);
|
|
|
|
|
|
|
|
if (ev->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
hchan = hci_chan_lookup_handle(hdev, le16_to_cpu(ev->handle));
|
2021-03-22 09:03:11 +03:00
|
|
|
if (!hchan || !hchan->amp)
|
2012-10-31 17:46:31 +04:00
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
amp_destroy_logical_link(hchan, ev->reason);
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-10-31 17:46:32 +04:00
|
|
|
static void hci_disconn_phylink_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_disconn_phy_link_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *hcon;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
|
|
|
if (ev->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
hcon = hci_conn_hash_lookup_handle(hdev, ev->phy_handle);
|
|
|
|
if (hcon) {
|
|
|
|
hcon->state = BT_CLOSED;
|
|
|
|
hci_conn_del(hcon);
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
2015-07-24 12:13:15 +03:00
|
|
|
#endif
|
2012-10-31 17:46:32 +04:00
|
|
|
|
2021-08-12 02:20:15 +03:00
|
|
|
static void le_conn_update_addr(struct hci_conn *conn, bdaddr_t *bdaddr,
|
|
|
|
u8 bdaddr_type, bdaddr_t *local_rpa)
|
|
|
|
{
|
|
|
|
if (conn->out) {
|
|
|
|
conn->dst_type = bdaddr_type;
|
|
|
|
conn->resp_addr_type = bdaddr_type;
|
|
|
|
bacpy(&conn->resp_addr, bdaddr);
|
|
|
|
|
|
|
|
/* Check if the controller has set a Local RPA then it must be
|
|
|
|
* used instead or hdev->rpa.
|
|
|
|
*/
|
|
|
|
if (local_rpa && bacmp(local_rpa, BDADDR_ANY)) {
|
|
|
|
conn->init_addr_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
bacpy(&conn->init_addr, local_rpa);
|
|
|
|
} else if (hci_dev_test_flag(conn->hdev, HCI_PRIVACY)) {
|
|
|
|
conn->init_addr_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
bacpy(&conn->init_addr, &conn->hdev->rpa);
|
|
|
|
} else {
|
|
|
|
hci_copy_identity_address(conn->hdev, &conn->init_addr,
|
|
|
|
&conn->init_addr_type);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
conn->resp_addr_type = conn->hdev->adv_addr_type;
|
|
|
|
/* Check if the controller has set a Local RPA then it must be
|
|
|
|
* used instead or hdev->rpa.
|
|
|
|
*/
|
|
|
|
if (local_rpa && bacmp(local_rpa, BDADDR_ANY)) {
|
|
|
|
conn->resp_addr_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
bacpy(&conn->resp_addr, local_rpa);
|
|
|
|
} else if (conn->hdev->adv_addr_type == ADDR_LE_DEV_RANDOM) {
|
|
|
|
/* In case of ext adv, resp_addr will be updated in
|
|
|
|
* Adv Terminated event.
|
|
|
|
*/
|
|
|
|
if (!ext_adv_capable(conn->hdev))
|
|
|
|
bacpy(&conn->resp_addr,
|
|
|
|
&conn->hdev->random_addr);
|
|
|
|
} else {
|
|
|
|
bacpy(&conn->resp_addr, &conn->hdev->bdaddr);
|
|
|
|
}
|
|
|
|
|
|
|
|
conn->init_addr_type = bdaddr_type;
|
|
|
|
bacpy(&conn->init_addr, bdaddr);
|
|
|
|
|
|
|
|
/* For incoming connections, set the default minimum
|
|
|
|
* and maximum connection interval. They will be used
|
|
|
|
* to check if the parameters are in range and if not
|
|
|
|
* trigger the connection update procedure.
|
|
|
|
*/
|
|
|
|
conn->le_conn_min_interval = conn->hdev->le_conn_min_interval;
|
|
|
|
conn->le_conn_max_interval = conn->hdev->le_conn_max_interval;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
static void le_conn_complete_evt(struct hci_dev *hdev, u8 status,
|
2021-08-12 02:20:15 +03:00
|
|
|
bdaddr_t *bdaddr, u8 bdaddr_type,
|
|
|
|
bdaddr_t *local_rpa, u8 role, u16 handle,
|
|
|
|
u16 interval, u16 latency,
|
|
|
|
u16 supervision_timeout)
|
2011-02-11 04:38:47 +03:00
|
|
|
{
|
2014-07-03 20:33:49 +04:00
|
|
|
struct hci_conn_params *params;
|
2011-02-11 04:38:47 +03:00
|
|
|
struct hci_conn *conn;
|
2014-02-18 23:41:32 +04:00
|
|
|
struct smp_irk *irk;
|
2014-07-02 10:36:22 +04:00
|
|
|
u8 addr_type;
|
2011-02-11 04:38:47 +03:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2014-07-08 18:21:51 +04:00
|
|
|
/* All controllers implicitly stop advertising in the event of a
|
|
|
|
* connection, so ensure that the state bit is cleared.
|
|
|
|
*/
|
2015-03-13 12:11:02 +03:00
|
|
|
hci_dev_clear_flag(hdev, HCI_LE_ADV);
|
2014-07-08 18:21:51 +04:00
|
|
|
|
2015-08-07 21:22:52 +03:00
|
|
|
conn = hci_lookup_le_connect(hdev);
|
2011-02-11 04:38:50 +03:00
|
|
|
if (!conn) {
|
2018-07-06 14:35:30 +03:00
|
|
|
conn = hci_conn_add(hdev, LE_LINK, bdaddr, role);
|
2011-02-11 04:38:50 +03:00
|
|
|
if (!conn) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "no memory for new connection");
|
2012-07-27 22:10:10 +04:00
|
|
|
goto unlock;
|
2011-02-11 04:38:50 +03:00
|
|
|
}
|
2011-05-31 21:20:54 +04:00
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->dst_type = bdaddr_type;
|
2012-07-27 22:10:11 +04:00
|
|
|
|
2014-02-28 14:54:16 +04:00
|
|
|
/* If we didn't have a hci_conn object previously
|
2021-06-04 11:26:25 +03:00
|
|
|
* but we're in central role this must be something
|
2021-06-04 11:26:27 +03:00
|
|
|
* initiated using an accept list. Since accept list based
|
2014-02-28 14:54:16 +04:00
|
|
|
* connections are not "first class citizens" we don't
|
|
|
|
* have full tracking of them. Therefore, we go ahead
|
|
|
|
* with a "best effort" approach of determining the
|
|
|
|
* initiator address based on the HCI_PRIVACY flag.
|
|
|
|
*/
|
|
|
|
if (conn->out) {
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->resp_addr_type = bdaddr_type;
|
|
|
|
bacpy(&conn->resp_addr, bdaddr);
|
2015-03-13 12:11:00 +03:00
|
|
|
if (hci_dev_test_flag(hdev, HCI_PRIVACY)) {
|
2014-02-28 14:54:16 +04:00
|
|
|
conn->init_addr_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
bacpy(&conn->init_addr, &hdev->rpa);
|
|
|
|
} else {
|
|
|
|
hci_copy_identity_address(hdev,
|
|
|
|
&conn->init_addr,
|
|
|
|
&conn->init_addr_type);
|
|
|
|
}
|
|
|
|
}
|
2014-02-28 19:45:46 +04:00
|
|
|
} else {
|
|
|
|
cancel_delayed_work(&conn->le_conn_timeout);
|
2011-02-11 04:38:50 +03:00
|
|
|
}
|
2011-02-11 04:38:47 +03:00
|
|
|
|
2021-08-12 02:20:15 +03:00
|
|
|
le_conn_update_addr(conn, bdaddr, bdaddr_type, local_rpa);
|
2014-02-23 21:42:17 +04:00
|
|
|
|
2014-02-19 03:13:43 +04:00
|
|
|
/* Lookup the identity address from the stored connection
|
|
|
|
* address and address type.
|
|
|
|
*
|
|
|
|
* When establishing connections to an identity address, the
|
|
|
|
* connection procedure will store the resolvable random
|
|
|
|
* address first. Now if it can be converted back into the
|
|
|
|
* identity address, start using the identity address from
|
|
|
|
* now on.
|
|
|
|
*/
|
|
|
|
irk = hci_get_irk(hdev, &conn->dst, conn->dst_type);
|
2014-02-18 23:41:32 +04:00
|
|
|
if (irk) {
|
|
|
|
bacpy(&conn->dst, &irk->bdaddr);
|
|
|
|
conn->dst_type = irk->addr_type;
|
|
|
|
}
|
|
|
|
|
2021-05-20 14:42:01 +03:00
|
|
|
/* When using controller based address resolution, then the new
|
|
|
|
* address types 0x02 and 0x03 are used. These types need to be
|
|
|
|
* converted back into either public address or random address type
|
|
|
|
*/
|
|
|
|
if (use_ll_privacy(hdev) &&
|
|
|
|
hci_dev_test_flag(hdev, HCI_ENABLE_LL_PRIVACY) &&
|
|
|
|
hci_dev_test_flag(hdev, HCI_LL_RPA_RESOLUTION)) {
|
|
|
|
switch (conn->dst_type) {
|
|
|
|
case ADDR_LE_DEV_PUBLIC_RESOLVED:
|
|
|
|
conn->dst_type = ADDR_LE_DEV_PUBLIC;
|
|
|
|
break;
|
|
|
|
case ADDR_LE_DEV_RANDOM_RESOLVED:
|
|
|
|
conn->dst_type = ADDR_LE_DEV_RANDOM;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
if (status) {
|
|
|
|
hci_le_conn_failed(conn, status);
|
2014-07-02 10:36:22 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2014-08-15 22:06:55 +04:00
|
|
|
if (conn->dst_type == ADDR_LE_DEV_PUBLIC)
|
|
|
|
addr_type = BDADDR_LE_PUBLIC;
|
|
|
|
else
|
|
|
|
addr_type = BDADDR_LE_RANDOM;
|
|
|
|
|
2014-07-15 12:51:28 +04:00
|
|
|
/* Drop the connection if the device is blocked */
|
2021-06-04 11:26:27 +03:00
|
|
|
if (hci_bdaddr_list_lookup(&hdev->reject_list, &conn->dst, addr_type)) {
|
2014-07-15 12:51:28 +04:00
|
|
|
hci_conn_drop(conn);
|
2012-07-27 22:10:16 +04:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2012-01-17 23:48:47 +04:00
|
|
|
if (!test_and_set_bit(HCI_CONN_MGMT_CONNECTED, &conn->flags))
|
2021-04-10 01:04:06 +03:00
|
|
|
mgmt_device_connected(hdev, conn, NULL, 0);
|
2011-05-07 01:41:43 +04:00
|
|
|
|
2011-06-10 01:50:50 +04:00
|
|
|
conn->sec_level = BT_SECURITY_LOW;
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->handle = handle;
|
2015-04-08 19:05:27 +03:00
|
|
|
conn->state = BT_CONFIG;
|
2011-02-11 04:38:47 +03:00
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
/* Store current advertising instance as connection advertising instance
|
|
|
|
* when sotfware rotation is in use so it can be re-enabled when
|
|
|
|
* disconnected.
|
|
|
|
*/
|
|
|
|
if (!ext_adv_capable(hdev))
|
|
|
|
conn->adv_instance = hdev->cur_adv_instance;
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
conn->le_conn_interval = interval;
|
|
|
|
conn->le_conn_latency = latency;
|
|
|
|
conn->le_supv_timeout = supervision_timeout;
|
2014-06-23 13:40:04 +04:00
|
|
|
|
2014-12-20 19:13:41 +03:00
|
|
|
hci_debugfs_create_conn(conn);
|
2011-02-11 04:38:47 +03:00
|
|
|
hci_conn_add_sysfs(conn);
|
|
|
|
|
2021-05-31 11:37:23 +03:00
|
|
|
/* The remote features procedure is defined for central
|
2018-10-10 17:37:31 +03:00
|
|
|
* role only. So only in case of an initiated connection
|
|
|
|
* request the remote features.
|
|
|
|
*
|
2021-05-31 11:37:23 +03:00
|
|
|
* If the local controller supports peripheral-initiated features
|
|
|
|
* exchange, then requesting the remote features in peripheral
|
2018-10-10 17:37:31 +03:00
|
|
|
* role is possible. Otherwise just transition into the
|
|
|
|
* connected state without requesting the remote features.
|
|
|
|
*/
|
|
|
|
if (conn->out ||
|
2021-05-31 11:37:23 +03:00
|
|
|
(hdev->le_features[0] & HCI_LE_PERIPHERAL_FEATURES)) {
|
2018-10-10 17:37:31 +03:00
|
|
|
struct hci_cp_le_read_remote_features cp;
|
2015-04-08 19:05:27 +03:00
|
|
|
|
2018-10-10 17:37:31 +03:00
|
|
|
cp.handle = __cpu_to_le16(conn->handle);
|
2015-04-08 19:05:27 +03:00
|
|
|
|
2018-10-10 17:37:31 +03:00
|
|
|
hci_send_cmd(hdev, HCI_OP_LE_READ_REMOTE_FEATURES,
|
|
|
|
sizeof(cp), &cp);
|
2015-04-08 19:05:27 +03:00
|
|
|
|
2018-10-10 17:37:31 +03:00
|
|
|
hci_conn_hold(conn);
|
2015-04-08 19:05:27 +03:00
|
|
|
} else {
|
2018-10-10 17:37:31 +03:00
|
|
|
conn->state = BT_CONNECTED;
|
2018-07-06 14:35:30 +03:00
|
|
|
hci_connect_cfm(conn, status);
|
2015-04-08 19:05:27 +03:00
|
|
|
}
|
2011-02-11 04:38:47 +03:00
|
|
|
|
2014-08-15 22:06:56 +04:00
|
|
|
params = hci_pend_le_action_lookup(&hdev->pend_le_conns, &conn->dst,
|
|
|
|
conn->dst_type);
|
2014-08-15 22:06:54 +04:00
|
|
|
if (params) {
|
2014-07-04 13:37:21 +04:00
|
|
|
list_del_init(¶ms->action);
|
2014-08-15 22:06:54 +04:00
|
|
|
if (params->conn) {
|
|
|
|
hci_conn_drop(params->conn);
|
2014-08-18 00:28:57 +04:00
|
|
|
hci_conn_put(params->conn);
|
2014-08-15 22:06:54 +04:00
|
|
|
params->conn = NULL;
|
|
|
|
}
|
|
|
|
}
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
2011-02-11 04:38:47 +03:00
|
|
|
unlock:
|
2014-07-06 16:44:23 +04:00
|
|
|
hci_update_background_scan(hdev);
|
2011-02-11 04:38:47 +03:00
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2018-07-06 14:35:30 +03:00
|
|
|
static void hci_le_conn_complete_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_conn_complete *ev = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
|
|
|
le_conn_complete_evt(hdev, ev->status, &ev->bdaddr, ev->bdaddr_type,
|
2021-08-12 02:20:15 +03:00
|
|
|
NULL, ev->role, le16_to_cpu(ev->handle),
|
2018-07-06 14:35:30 +03:00
|
|
|
le16_to_cpu(ev->interval),
|
|
|
|
le16_to_cpu(ev->latency),
|
|
|
|
le16_to_cpu(ev->supervision_timeout));
|
|
|
|
}
|
|
|
|
|
2018-07-06 23:50:32 +03:00
|
|
|
static void hci_le_enh_conn_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_enh_conn_complete *ev = (void *) skb->data;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
|
|
|
le_conn_complete_evt(hdev, ev->status, &ev->bdaddr, ev->bdaddr_type,
|
2021-08-12 02:20:15 +03:00
|
|
|
&ev->local_rpa, ev->role, le16_to_cpu(ev->handle),
|
2018-07-06 23:50:32 +03:00
|
|
|
le16_to_cpu(ev->interval),
|
|
|
|
le16_to_cpu(ev->latency),
|
|
|
|
le16_to_cpu(ev->supervision_timeout));
|
2020-07-23 15:39:01 +03:00
|
|
|
|
|
|
|
if (use_ll_privacy(hdev) &&
|
2020-07-23 15:39:03 +03:00
|
|
|
hci_dev_test_flag(hdev, HCI_ENABLE_LL_PRIVACY) &&
|
2020-07-23 15:39:01 +03:00
|
|
|
hci_dev_test_flag(hdev, HCI_LL_RPA_RESOLUTION))
|
|
|
|
hci_req_disable_address_resolution(hdev);
|
2018-07-06 23:50:32 +03:00
|
|
|
}
|
|
|
|
|
2018-07-19 14:39:46 +03:00
|
|
|
static void hci_le_ext_adv_term_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_evt_le_ext_adv_set_term *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
2021-08-12 02:20:16 +03:00
|
|
|
struct adv_info *adv;
|
2018-07-19 14:39:46 +03:00
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
adv = hci_find_adv_instance(hdev, ev->handle);
|
2021-06-23 06:59:02 +03:00
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
if (ev->status) {
|
2021-06-23 06:59:02 +03:00
|
|
|
if (!adv)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Remove advertising as it has been terminated */
|
|
|
|
hci_remove_adv_instance(hdev, ev->handle);
|
|
|
|
mgmt_advertising_removed(NULL, hdev, ev->handle);
|
|
|
|
|
2018-07-19 14:39:46 +03:00
|
|
|
return;
|
2021-06-23 06:59:02 +03:00
|
|
|
}
|
2018-07-19 14:39:46 +03:00
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
if (adv)
|
|
|
|
adv->enabled = false;
|
|
|
|
|
2018-07-19 14:39:46 +03:00
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->conn_handle));
|
|
|
|
if (conn) {
|
2021-08-12 02:20:16 +03:00
|
|
|
/* Store handle in the connection so the correct advertising
|
|
|
|
* instance can be re-enabled when disconnected.
|
|
|
|
*/
|
|
|
|
conn->adv_instance = ev->handle;
|
2018-07-19 14:39:46 +03:00
|
|
|
|
2021-08-12 02:20:15 +03:00
|
|
|
if (hdev->adv_addr_type != ADDR_LE_DEV_RANDOM ||
|
|
|
|
bacmp(&conn->resp_addr, BDADDR_ANY))
|
2018-07-19 14:39:46 +03:00
|
|
|
return;
|
|
|
|
|
2021-04-06 02:33:04 +03:00
|
|
|
if (!ev->handle) {
|
2018-07-19 14:39:46 +03:00
|
|
|
bacpy(&conn->resp_addr, &hdev->random_addr);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-08-12 02:20:16 +03:00
|
|
|
if (adv)
|
|
|
|
bacpy(&conn->resp_addr, &adv->random_addr);
|
2018-07-19 14:39:46 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-23 13:40:05 +04:00
|
|
|
static void hci_le_conn_update_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_conn_update_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
|
|
|
if (ev->status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
|
|
|
if (conn) {
|
|
|
|
conn->le_conn_interval = le16_to_cpu(ev->interval);
|
|
|
|
conn->le_conn_latency = le16_to_cpu(ev->latency);
|
|
|
|
conn->le_supv_timeout = le16_to_cpu(ev->supervision_timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
/* This function requires the caller holds hdev->lock */
|
2014-10-07 12:44:11 +04:00
|
|
|
static struct hci_conn *check_pending_le_conn(struct hci_dev *hdev,
|
|
|
|
bdaddr_t *addr,
|
2018-04-03 14:40:06 +03:00
|
|
|
u8 addr_type, u8 adv_type,
|
|
|
|
bdaddr_t *direct_rpa)
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
{
|
|
|
|
struct hci_conn *conn;
|
2014-07-23 23:55:23 +04:00
|
|
|
struct hci_conn_params *params;
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
2014-07-07 13:45:53 +04:00
|
|
|
/* If the event is not connectable don't proceed further */
|
|
|
|
if (adv_type != LE_ADV_IND && adv_type != LE_ADV_DIRECT_IND)
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
2014-07-07 13:45:53 +04:00
|
|
|
|
|
|
|
/* Ignore if the device is blocked */
|
2021-06-04 11:26:27 +03:00
|
|
|
if (hci_bdaddr_list_lookup(&hdev->reject_list, addr, addr_type))
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
2014-07-07 13:45:53 +04:00
|
|
|
|
2014-07-16 12:56:09 +04:00
|
|
|
/* Most controller will fail if we try to create new connections
|
2021-06-04 11:26:26 +03:00
|
|
|
* while we have an existing one in peripheral role.
|
2014-07-16 12:56:09 +04:00
|
|
|
*/
|
2021-06-04 11:26:26 +03:00
|
|
|
if (hdev->conn_hash.le_num_peripheral > 0 &&
|
2020-04-23 17:43:29 +03:00
|
|
|
(!test_bit(HCI_QUIRK_VALID_LE_STATES, &hdev->quirks) ||
|
|
|
|
!(hdev->le_states[3] & 0x10)))
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
2014-07-16 12:56:09 +04:00
|
|
|
|
2014-07-07 13:45:53 +04:00
|
|
|
/* If we're not connectable only connect devices that we have in
|
|
|
|
* our pend_le_conns list.
|
|
|
|
*/
|
2015-10-16 10:07:51 +03:00
|
|
|
params = hci_pend_le_action_lookup(&hdev->pend_le_conns, addr,
|
|
|
|
addr_type);
|
2014-07-23 23:55:23 +04:00
|
|
|
if (!params)
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
2014-07-23 23:55:23 +04:00
|
|
|
|
2015-08-07 21:22:54 +03:00
|
|
|
if (!params->explicit_connect) {
|
|
|
|
switch (params->auto_connect) {
|
|
|
|
case HCI_AUTO_CONN_DIRECT:
|
|
|
|
/* Only devices advertising with ADV_DIRECT_IND are
|
|
|
|
* triggering a connection attempt. This is allowing
|
2021-05-31 11:37:28 +03:00
|
|
|
* incoming connections from peripheral devices.
|
2015-08-07 21:22:54 +03:00
|
|
|
*/
|
|
|
|
if (adv_type != LE_ADV_DIRECT_IND)
|
|
|
|
return NULL;
|
|
|
|
break;
|
|
|
|
case HCI_AUTO_CONN_ALWAYS:
|
|
|
|
/* Devices advertising with ADV_IND or ADV_DIRECT_IND
|
|
|
|
* are triggering a connection attempt. This means
|
2021-05-31 11:37:28 +03:00
|
|
|
* that incoming connections from peripheral device are
|
|
|
|
* accepted and also outgoing connections to peripheral
|
2015-08-07 21:22:54 +03:00
|
|
|
* devices are established when found.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
default:
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
2015-08-07 21:22:54 +03:00
|
|
|
}
|
2014-07-23 23:55:23 +04:00
|
|
|
}
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
|
|
|
conn = hci_connect_le(hdev, addr, addr_type, BT_SECURITY_LOW,
|
2020-06-29 19:11:00 +03:00
|
|
|
hdev->def_le_autoconnect_timeout, HCI_ROLE_MASTER,
|
2018-04-03 14:40:06 +03:00
|
|
|
direct_rpa);
|
2014-08-15 22:06:54 +04:00
|
|
|
if (!IS_ERR(conn)) {
|
2015-08-07 21:22:54 +03:00
|
|
|
/* If HCI_AUTO_CONN_EXPLICIT is set, conn is already owned
|
|
|
|
* by higher layer that tried to connect, if no then
|
|
|
|
* store the pointer since we don't really have any
|
2014-08-15 22:06:54 +04:00
|
|
|
* other owner of the object besides the params that
|
|
|
|
* triggered it. This way we can abort the connection if
|
|
|
|
* the parameters get removed and keep the reference
|
|
|
|
* count consistent once the connection is established.
|
|
|
|
*/
|
2015-08-07 21:22:54 +03:00
|
|
|
|
|
|
|
if (!params->explicit_connect)
|
|
|
|
params->conn = hci_conn_get(conn);
|
|
|
|
|
2014-10-07 12:44:11 +04:00
|
|
|
return conn;
|
2014-08-15 22:06:54 +04:00
|
|
|
}
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
|
|
|
switch (PTR_ERR(conn)) {
|
|
|
|
case -EBUSY:
|
|
|
|
/* If hci_connect() returns -EBUSY it means there is already
|
|
|
|
* an LE connection attempt going on. Since controllers don't
|
|
|
|
* support more than one connection attempt at the time, we
|
|
|
|
* don't consider this an error case.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
BT_DBG("Failed to connect: err %ld", PTR_ERR(conn));
|
2014-10-07 12:44:11 +04:00
|
|
|
return NULL;
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
}
|
2014-10-07 12:44:11 +04:00
|
|
|
|
|
|
|
return NULL;
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
}
|
|
|
|
|
2014-03-24 12:48:00 +04:00
|
|
|
static void process_adv_report(struct hci_dev *hdev, u8 type, bdaddr_t *bdaddr,
|
2014-12-05 18:20:13 +03:00
|
|
|
u8 bdaddr_type, bdaddr_t *direct_addr,
|
2020-07-27 23:48:55 +03:00
|
|
|
u8 direct_addr_type, s8 rssi, u8 *data, u8 len,
|
|
|
|
bool ext_adv)
|
2014-03-24 12:48:00 +04:00
|
|
|
{
|
2014-03-25 12:51:52 +04:00
|
|
|
struct discovery_state *d = &hdev->discovery;
|
2014-07-07 13:45:53 +04:00
|
|
|
struct smp_irk *irk;
|
2014-10-07 12:44:11 +04:00
|
|
|
struct hci_conn *conn;
|
2014-03-25 16:34:59 +04:00
|
|
|
bool match;
|
2014-07-01 16:11:21 +04:00
|
|
|
u32 flags;
|
2021-05-18 17:54:36 +03:00
|
|
|
u8 *ptr;
|
2015-09-16 21:21:54 +03:00
|
|
|
|
2016-04-07 21:01:27 +03:00
|
|
|
switch (type) {
|
|
|
|
case LE_ADV_IND:
|
|
|
|
case LE_ADV_DIRECT_IND:
|
|
|
|
case LE_ADV_SCAN_IND:
|
|
|
|
case LE_ADV_NONCONN_IND:
|
|
|
|
case LE_ADV_SCAN_RSP:
|
|
|
|
break;
|
|
|
|
default:
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err_ratelimited(hdev, "unknown advertising packet "
|
|
|
|
"type: 0x%02x", type);
|
2016-04-07 21:01:27 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-07-27 23:48:55 +03:00
|
|
|
if (!ext_adv && len > HCI_MAX_AD_LENGTH) {
|
|
|
|
bt_dev_err_ratelimited(hdev, "legacy adv larger than 31 bytes");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-09-16 21:21:54 +03:00
|
|
|
/* Find the end of the data in case the report contains padded zero
|
|
|
|
* bytes at the end causing an invalid length value.
|
|
|
|
*
|
|
|
|
* When data is NULL, len is 0 so there is no need for extra ptr
|
|
|
|
* check as 'ptr < data + 0' is already false in such case.
|
|
|
|
*/
|
|
|
|
for (ptr = data; ptr < data + len && *ptr; ptr += *ptr + 1) {
|
|
|
|
if (ptr + 1 + *ptr > data + len)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-05-18 17:54:36 +03:00
|
|
|
/* Adjust for actual length. This handles the case when remote
|
|
|
|
* device is advertising with incorrect data length.
|
|
|
|
*/
|
|
|
|
len = ptr - data;
|
2014-03-25 12:51:52 +04:00
|
|
|
|
2014-12-05 18:20:13 +03:00
|
|
|
/* If the direct address is present, then this report is from
|
|
|
|
* a LE Direct Advertising Report event. In that case it is
|
|
|
|
* important to see if the address is matching the local
|
|
|
|
* controller address.
|
|
|
|
*/
|
|
|
|
if (direct_addr) {
|
|
|
|
/* Only resolvable random addresses are valid for these
|
|
|
|
* kind of reports and others can be ignored.
|
|
|
|
*/
|
|
|
|
if (!hci_bdaddr_is_rpa(direct_addr, direct_addr_type))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* If the controller is not using resolvable random
|
|
|
|
* addresses, then this report can be ignored.
|
|
|
|
*/
|
2015-03-13 12:11:00 +03:00
|
|
|
if (!hci_dev_test_flag(hdev, HCI_PRIVACY))
|
2014-12-05 18:20:13 +03:00
|
|
|
return;
|
|
|
|
|
|
|
|
/* If the local IRK of the controller does not match
|
|
|
|
* with the resolvable random address provided, then
|
|
|
|
* this report can be ignored.
|
|
|
|
*/
|
|
|
|
if (!smp_irk_matches(hdev, hdev->irk, direct_addr))
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-07-07 13:45:53 +04:00
|
|
|
/* Check if we need to convert to identity address */
|
|
|
|
irk = hci_get_irk(hdev, bdaddr, bdaddr_type);
|
|
|
|
if (irk) {
|
|
|
|
bdaddr = &irk->bdaddr;
|
|
|
|
bdaddr_type = irk->addr_type;
|
|
|
|
}
|
|
|
|
|
2018-04-03 14:40:06 +03:00
|
|
|
/* Check if we have been requested to connect to this device.
|
|
|
|
*
|
|
|
|
* direct_addr is set only for directed advertising reports (it is NULL
|
|
|
|
* for advertising reports) and is already verified to be RPA above.
|
|
|
|
*/
|
|
|
|
conn = check_pending_le_conn(hdev, bdaddr, bdaddr_type, type,
|
|
|
|
direct_addr);
|
2020-07-27 23:48:55 +03:00
|
|
|
if (!ext_adv && conn && type == LE_ADV_IND && len <= HCI_MAX_AD_LENGTH) {
|
2014-10-07 12:44:11 +04:00
|
|
|
/* Store report for later inclusion by
|
|
|
|
* mgmt_device_connected
|
|
|
|
*/
|
|
|
|
memcpy(conn->le_adv_data, data, len);
|
|
|
|
conn->le_adv_data_len = len;
|
|
|
|
}
|
2014-07-07 13:45:53 +04:00
|
|
|
|
2014-07-02 23:42:02 +04:00
|
|
|
/* Passive scanning shouldn't trigger any device found events,
|
|
|
|
* except for devices marked as CONN_REPORT for which we do send
|
2020-06-17 17:39:18 +03:00
|
|
|
* device found events, or advertisement monitoring requested.
|
2014-07-02 23:42:02 +04:00
|
|
|
*/
|
2014-03-25 12:30:46 +04:00
|
|
|
if (hdev->le_scan_type == LE_SCAN_PASSIVE) {
|
2014-07-02 23:42:02 +04:00
|
|
|
if (type == LE_ADV_DIRECT_IND)
|
|
|
|
return;
|
|
|
|
|
2014-07-15 09:07:59 +04:00
|
|
|
if (!hci_pend_le_action_lookup(&hdev->pend_le_reports,
|
2020-06-17 17:39:18 +03:00
|
|
|
bdaddr, bdaddr_type) &&
|
|
|
|
idr_is_empty(&hdev->adv_monitors_idr))
|
2014-07-02 23:42:02 +04:00
|
|
|
return;
|
|
|
|
|
|
|
|
if (type == LE_ADV_NONCONN_IND || type == LE_ADV_SCAN_IND)
|
|
|
|
flags = MGMT_DEV_FOUND_NOT_CONNECTABLE;
|
|
|
|
else
|
|
|
|
flags = 0;
|
|
|
|
mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
|
|
|
|
rssi, flags, data, len, NULL, 0);
|
2014-07-04 13:37:16 +04:00
|
|
|
return;
|
2014-03-25 12:30:46 +04:00
|
|
|
}
|
2014-03-24 12:48:00 +04:00
|
|
|
|
2014-07-01 16:11:21 +04:00
|
|
|
/* When receiving non-connectable or scannable undirected
|
|
|
|
* advertising reports, this means that the remote device is
|
|
|
|
* not connectable and then clearly indicate this in the
|
|
|
|
* device found event.
|
|
|
|
*
|
|
|
|
* When receiving a scan response, then there is no way to
|
|
|
|
* know if the remote device is connectable or not. However
|
|
|
|
* since scan responses are merged with a previously seen
|
|
|
|
* advertising report, the flags field from that report
|
|
|
|
* will be used.
|
|
|
|
*
|
|
|
|
* In the really unlikely case that a controller get confused
|
|
|
|
* and just sends a scan response event, then it is marked as
|
|
|
|
* not connectable as well.
|
|
|
|
*/
|
|
|
|
if (type == LE_ADV_NONCONN_IND || type == LE_ADV_SCAN_IND ||
|
|
|
|
type == LE_ADV_SCAN_RSP)
|
|
|
|
flags = MGMT_DEV_FOUND_NOT_CONNECTABLE;
|
|
|
|
else
|
|
|
|
flags = 0;
|
|
|
|
|
2014-03-25 12:51:52 +04:00
|
|
|
/* If there's nothing pending either store the data from this
|
|
|
|
* event or send an immediate device found event if the data
|
|
|
|
* should not be stored for later.
|
|
|
|
*/
|
2020-07-27 23:48:55 +03:00
|
|
|
if (!ext_adv && !has_pending_adv_report(hdev)) {
|
2014-03-25 12:51:52 +04:00
|
|
|
/* If the report will trigger a SCAN_REQ store it for
|
|
|
|
* later merging.
|
|
|
|
*/
|
|
|
|
if (type == LE_ADV_IND || type == LE_ADV_SCAN_IND) {
|
|
|
|
store_pending_adv_report(hdev, bdaddr, bdaddr_type,
|
2014-07-01 16:11:21 +04:00
|
|
|
rssi, flags, data, len);
|
2014-03-25 12:51:52 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
|
2014-07-01 16:11:21 +04:00
|
|
|
rssi, flags, data, len, NULL, 0);
|
2014-03-25 12:51:52 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-03-25 16:34:59 +04:00
|
|
|
/* Check if the pending report is for the same device as the new one */
|
|
|
|
match = (!bacmp(bdaddr, &d->last_adv_addr) &&
|
|
|
|
bdaddr_type == d->last_adv_addr_type);
|
|
|
|
|
2014-03-25 12:51:52 +04:00
|
|
|
/* If the pending data doesn't match this report or this isn't a
|
|
|
|
* scan response (e.g. we got a duplicate ADV_IND) then force
|
|
|
|
* sending of the pending data.
|
|
|
|
*/
|
2014-03-25 16:34:59 +04:00
|
|
|
if (type != LE_ADV_SCAN_RSP || !match) {
|
|
|
|
/* Send out whatever is in the cache, but skip duplicates */
|
|
|
|
if (!match)
|
|
|
|
mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
|
2014-03-25 16:40:52 +04:00
|
|
|
d->last_adv_addr_type, NULL,
|
2014-07-01 16:11:21 +04:00
|
|
|
d->last_adv_rssi, d->last_adv_flags,
|
2014-03-25 16:40:52 +04:00
|
|
|
d->last_adv_data,
|
2014-03-25 16:34:59 +04:00
|
|
|
d->last_adv_data_len, NULL, 0);
|
2014-03-25 12:51:52 +04:00
|
|
|
|
|
|
|
/* If the new report will trigger a SCAN_REQ store it for
|
|
|
|
* later merging.
|
|
|
|
*/
|
2020-07-27 23:48:55 +03:00
|
|
|
if (!ext_adv && (type == LE_ADV_IND ||
|
|
|
|
type == LE_ADV_SCAN_IND)) {
|
2014-03-25 12:51:52 +04:00
|
|
|
store_pending_adv_report(hdev, bdaddr, bdaddr_type,
|
2014-07-01 16:11:21 +04:00
|
|
|
rssi, flags, data, len);
|
2014-03-25 12:51:52 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The advertising reports cannot be merged, so clear
|
|
|
|
* the pending report and send out a device found event.
|
|
|
|
*/
|
|
|
|
clear_pending_adv_report(hdev);
|
2014-03-29 10:39:53 +04:00
|
|
|
mgmt_device_found(hdev, bdaddr, LE_LINK, bdaddr_type, NULL,
|
2014-07-01 16:11:21 +04:00
|
|
|
rssi, flags, data, len, NULL, 0);
|
2014-03-25 12:51:52 +04:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If we get here we've got a pending ADV_IND or ADV_SCAN_IND and
|
|
|
|
* the new event is a SCAN_RSP. We can therefore proceed with
|
|
|
|
* sending a merged device found event.
|
|
|
|
*/
|
|
|
|
mgmt_device_found(hdev, &d->last_adv_addr, LE_LINK,
|
2014-07-01 16:11:21 +04:00
|
|
|
d->last_adv_addr_type, NULL, rssi, d->last_adv_flags,
|
2014-07-01 16:11:19 +04:00
|
|
|
d->last_adv_data, d->last_adv_data_len, data, len);
|
2014-03-25 12:51:52 +04:00
|
|
|
clear_pending_adv_report(hdev);
|
2014-03-24 12:48:00 +04:00
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_le_adv_report_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2011-05-26 23:23:51 +04:00
|
|
|
{
|
2011-09-27 03:48:35 +04:00
|
|
|
u8 num_reports = skb->data[0];
|
|
|
|
void *ptr = &skb->data[1];
|
2011-05-26 23:23:51 +04:00
|
|
|
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
2011-09-27 03:48:35 +04:00
|
|
|
while (num_reports--) {
|
|
|
|
struct hci_ev_le_advertising_info *ev = ptr;
|
2014-03-24 12:48:00 +04:00
|
|
|
s8 rssi;
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
2021-11-01 10:12:12 +03:00
|
|
|
if (ev->length <= HCI_MAX_AD_LENGTH &&
|
|
|
|
ev->data + ev->length <= skb_tail_pointer(skb)) {
|
2018-04-20 10:46:24 +03:00
|
|
|
rssi = ev->data[ev->length];
|
|
|
|
process_adv_report(hdev, ev->evt_type, &ev->bdaddr,
|
|
|
|
ev->bdaddr_type, NULL, 0, rssi,
|
2020-07-27 23:48:55 +03:00
|
|
|
ev->data, ev->length, false);
|
2018-04-20 10:46:24 +03:00
|
|
|
} else {
|
|
|
|
bt_dev_err(hdev, "Dropping invalid advertising data");
|
|
|
|
}
|
2012-01-11 01:20:50 +04:00
|
|
|
|
2011-09-27 03:48:35 +04:00
|
|
|
ptr += sizeof(*ev) + ev->length + 1;
|
2021-11-01 10:12:12 +03:00
|
|
|
|
|
|
|
if (ptr > (void *) skb_tail_pointer(skb) - sizeof(*ev)) {
|
|
|
|
bt_dev_err(hdev, "Malicious advertising data. Stopping processing");
|
|
|
|
break;
|
|
|
|
}
|
2011-05-26 23:23:51 +04:00
|
|
|
}
|
Bluetooth: Introduce LE auto connection infrastructure
This patch introduces the LE auto connection infrastructure which
will be used to implement the LE auto connection options.
In summary, the auto connection mechanism works as follows: Once the
first pending LE connection is created, the background scanning is
started. When the target device is found in range, the kernel
autonomously starts the connection attempt. If connection is
established successfully, that pending LE connection is deleted and
the background is stopped.
To achieve that, this patch introduces the hci_update_background_scan()
which controls the background scanning state. This function starts or
stops the background scanning based on the hdev->pend_le_conns list. If
there is no pending LE connection, the background scanning is stopped.
Otherwise, we start the background scanning.
Then, every time a pending LE connection is added we call hci_update_
background_scan() so the background scanning is started (in case it is
not already running). Likewise, every time a pending LE connection is
deleted we call hci_update_background_scan() so the background scanning
is stopped (in case this was the last pending LE connection) or it is
started again (in case we have more pending LE connections). Finally,
we also call hci_update_background_scan() in hci_le_conn_failed() so
the background scan is restarted in case the connection establishment
fails. This way the background scanning keeps running until all pending
LE connection are established.
At this point, resolvable addresses are not support by this
infrastructure. The proper support is added in upcoming patches.
Signed-off-by: Andre Guedes <andre.guedes@openbossa.org>
Signed-off-by: Marcel Holtmann <marcel@holtmann.org>
2014-02-27 03:21:47 +04:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
2011-05-26 23:23:51 +04:00
|
|
|
}
|
|
|
|
|
2019-12-11 13:34:36 +03:00
|
|
|
static u8 ext_evt_type_to_legacy(struct hci_dev *hdev, u16 evt_type)
|
2018-07-19 14:39:38 +03:00
|
|
|
{
|
|
|
|
if (evt_type & LE_EXT_ADV_LEGACY_PDU) {
|
|
|
|
switch (evt_type) {
|
|
|
|
case LE_LEGACY_ADV_IND:
|
|
|
|
return LE_ADV_IND;
|
|
|
|
case LE_LEGACY_ADV_DIRECT_IND:
|
|
|
|
return LE_ADV_DIRECT_IND;
|
|
|
|
case LE_LEGACY_ADV_SCAN_IND:
|
|
|
|
return LE_ADV_SCAN_IND;
|
|
|
|
case LE_LEGACY_NONCONN_IND:
|
|
|
|
return LE_ADV_NONCONN_IND;
|
|
|
|
case LE_LEGACY_SCAN_RSP_ADV:
|
|
|
|
case LE_LEGACY_SCAN_RSP_ADV_SCAN:
|
|
|
|
return LE_ADV_SCAN_RSP;
|
|
|
|
}
|
|
|
|
|
2019-12-11 13:34:36 +03:00
|
|
|
goto invalid;
|
2018-07-19 14:39:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (evt_type & LE_EXT_ADV_CONN_IND) {
|
|
|
|
if (evt_type & LE_EXT_ADV_DIRECT_IND)
|
|
|
|
return LE_ADV_DIRECT_IND;
|
|
|
|
|
2018-07-06 14:35:29 +03:00
|
|
|
return LE_ADV_IND;
|
2018-07-19 14:39:38 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if (evt_type & LE_EXT_ADV_SCAN_RSP)
|
|
|
|
return LE_ADV_SCAN_RSP;
|
|
|
|
|
|
|
|
if (evt_type & LE_EXT_ADV_SCAN_IND)
|
2018-07-06 14:35:29 +03:00
|
|
|
return LE_ADV_SCAN_IND;
|
2018-07-19 14:39:38 +03:00
|
|
|
|
|
|
|
if (evt_type == LE_EXT_ADV_NON_CONN_IND ||
|
|
|
|
evt_type & LE_EXT_ADV_DIRECT_IND)
|
2018-07-06 14:35:29 +03:00
|
|
|
return LE_ADV_NONCONN_IND;
|
|
|
|
|
2019-12-11 13:34:36 +03:00
|
|
|
invalid:
|
|
|
|
bt_dev_err_ratelimited(hdev, "Unknown advertising packet type: 0x%02x",
|
|
|
|
evt_type);
|
2018-07-06 14:35:29 +03:00
|
|
|
|
|
|
|
return LE_ADV_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_le_ext_adv_report_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 num_reports = skb->data[0];
|
|
|
|
void *ptr = &skb->data[1];
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
while (num_reports--) {
|
|
|
|
struct hci_ev_le_ext_adv_report *ev = ptr;
|
|
|
|
u8 legacy_evt_type;
|
|
|
|
u16 evt_type;
|
|
|
|
|
|
|
|
evt_type = __le16_to_cpu(ev->evt_type);
|
2019-12-11 13:34:36 +03:00
|
|
|
legacy_evt_type = ext_evt_type_to_legacy(hdev, evt_type);
|
2018-07-06 14:35:29 +03:00
|
|
|
if (legacy_evt_type != LE_ADV_INVALID) {
|
|
|
|
process_adv_report(hdev, legacy_evt_type, &ev->bdaddr,
|
|
|
|
ev->bdaddr_type, NULL, 0, ev->rssi,
|
2020-07-27 23:48:55 +03:00
|
|
|
ev->data, ev->length,
|
|
|
|
!(evt_type & LE_EXT_ADV_LEGACY_PDU));
|
2018-07-06 14:35:29 +03:00
|
|
|
}
|
|
|
|
|
2019-04-03 09:41:44 +03:00
|
|
|
ptr += sizeof(*ev) + ev->length;
|
2018-07-06 14:35:29 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2015-04-08 19:05:27 +03:00
|
|
|
static void hci_le_remote_feat_complete_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_remote_feat_complete *ev = (void *)skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
|
|
|
if (conn) {
|
|
|
|
if (!ev->status)
|
|
|
|
memcpy(conn->features[0], ev->features, 8);
|
|
|
|
|
|
|
|
if (conn->state == BT_CONFIG) {
|
|
|
|
__u8 status;
|
|
|
|
|
2021-05-31 11:37:23 +03:00
|
|
|
/* If the local controller supports peripheral-initiated
|
2015-04-08 19:05:27 +03:00
|
|
|
* features exchange, but the remote controller does
|
|
|
|
* not, then it is possible that the error code 0x1a
|
|
|
|
* for unsupported remote feature gets returned.
|
|
|
|
*
|
|
|
|
* In this specific case, allow the connection to
|
|
|
|
* transition into connected state and mark it as
|
|
|
|
* successful.
|
|
|
|
*/
|
2021-05-31 11:37:23 +03:00
|
|
|
if (!conn->out && ev->status == 0x1a &&
|
|
|
|
(hdev->le_features[0] & HCI_LE_PERIPHERAL_FEATURES))
|
2015-04-08 19:05:27 +03:00
|
|
|
status = 0x00;
|
|
|
|
else
|
|
|
|
status = ev->status;
|
|
|
|
|
|
|
|
conn->state = BT_CONNECTED;
|
|
|
|
hci_connect_cfm(conn, status);
|
|
|
|
hci_conn_drop(conn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_le_ltk_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2011-06-10 01:50:47 +04:00
|
|
|
{
|
|
|
|
struct hci_ev_le_ltk_req *ev = (void *) skb->data;
|
|
|
|
struct hci_cp_le_ltk_reply cp;
|
2011-07-08 01:59:37 +04:00
|
|
|
struct hci_cp_le_ltk_neg_reply neg;
|
2011-06-10 01:50:47 +04:00
|
|
|
struct hci_conn *conn;
|
2012-02-03 04:08:01 +04:00
|
|
|
struct smp_ltk *ltk;
|
2011-06-10 01:50:47 +04:00
|
|
|
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s handle 0x%4.4x", hdev->name, __le16_to_cpu(ev->handle));
|
2011-06-10 01:50:47 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
2011-07-08 01:59:37 +04:00
|
|
|
if (conn == NULL)
|
|
|
|
goto not_found;
|
2011-06-10 01:50:47 +04:00
|
|
|
|
2014-05-29 16:02:59 +04:00
|
|
|
ltk = hci_find_ltk(hdev, &conn->dst, conn->dst_type, conn->role);
|
2014-05-29 15:00:39 +04:00
|
|
|
if (!ltk)
|
2011-07-08 01:59:37 +04:00
|
|
|
goto not_found;
|
|
|
|
|
2014-05-29 15:00:39 +04:00
|
|
|
if (smp_ltk_is_sc(ltk)) {
|
|
|
|
/* With SC both EDiv and Rand are set to zero */
|
|
|
|
if (ev->ediv || ev->rand)
|
|
|
|
goto not_found;
|
|
|
|
} else {
|
|
|
|
/* For non-SC keys check that EDiv and Rand match */
|
|
|
|
if (ev->ediv != ltk->ediv || ev->rand != ltk->rand)
|
|
|
|
goto not_found;
|
|
|
|
}
|
|
|
|
|
2015-06-08 18:14:39 +03:00
|
|
|
memcpy(cp.ltk, ltk->val, ltk->enc_size);
|
|
|
|
memset(cp.ltk + ltk->enc_size, 0, sizeof(cp.ltk) - ltk->enc_size);
|
2011-06-10 01:50:47 +04:00
|
|
|
cp.handle = cpu_to_le16(conn->handle);
|
2012-02-03 04:08:01 +04:00
|
|
|
|
2014-09-11 04:37:45 +04:00
|
|
|
conn->pending_sec_level = smp_ltk_sec_level(ltk);
|
2011-06-10 01:50:47 +04:00
|
|
|
|
2013-07-31 23:25:29 +04:00
|
|
|
conn->enc_key_size = ltk->enc_size;
|
2011-06-10 01:50:47 +04:00
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LE_LTK_REPLY, sizeof(cp), &cp);
|
|
|
|
|
2013-07-25 23:34:24 +04:00
|
|
|
/* Ref. Bluetooth Core SPEC pages 1975 and 2004. STK is a
|
|
|
|
* temporary key used to encrypt a connection following
|
|
|
|
* pairing. It is used during the Encrypted Session Setup to
|
|
|
|
* distribute the keys. Later, security can be re-established
|
|
|
|
* using a distributed LTK.
|
|
|
|
*/
|
2014-06-16 20:25:16 +04:00
|
|
|
if (ltk->type == SMP_STK) {
|
2014-07-01 20:14:12 +04:00
|
|
|
set_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
|
2014-11-13 15:37:47 +03:00
|
|
|
list_del_rcu(<k->list);
|
|
|
|
kfree_rcu(ltk, rcu);
|
2014-07-01 20:14:12 +04:00
|
|
|
} else {
|
|
|
|
clear_bit(HCI_CONN_STK_ENCRYPT, &conn->flags);
|
2012-02-03 04:08:01 +04:00
|
|
|
}
|
|
|
|
|
2011-06-10 01:50:47 +04:00
|
|
|
hci_dev_unlock(hdev);
|
2011-07-08 01:59:37 +04:00
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
not_found:
|
|
|
|
neg.handle = ev->handle;
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LE_LTK_NEG_REPLY, sizeof(neg), &neg);
|
|
|
|
hci_dev_unlock(hdev);
|
2011-06-10 01:50:47 +04:00
|
|
|
}
|
|
|
|
|
2014-07-02 01:10:08 +04:00
|
|
|
static void send_conn_param_neg_reply(struct hci_dev *hdev, u16 handle,
|
|
|
|
u8 reason)
|
|
|
|
{
|
|
|
|
struct hci_cp_le_conn_param_req_neg_reply cp;
|
|
|
|
|
|
|
|
cp.handle = cpu_to_le16(handle);
|
|
|
|
cp.reason = reason;
|
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_NEG_REPLY, sizeof(cp),
|
|
|
|
&cp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void hci_le_remote_conn_param_req_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_remote_conn_param_req *ev = (void *) skb->data;
|
|
|
|
struct hci_cp_le_conn_param_req_reply cp;
|
|
|
|
struct hci_conn *hcon;
|
|
|
|
u16 handle, min, max, latency, timeout;
|
|
|
|
|
|
|
|
handle = le16_to_cpu(ev->handle);
|
|
|
|
min = le16_to_cpu(ev->interval_min);
|
|
|
|
max = le16_to_cpu(ev->interval_max);
|
|
|
|
latency = le16_to_cpu(ev->latency);
|
|
|
|
timeout = le16_to_cpu(ev->timeout);
|
|
|
|
|
|
|
|
hcon = hci_conn_hash_lookup_handle(hdev, handle);
|
|
|
|
if (!hcon || hcon->state != BT_CONNECTED)
|
|
|
|
return send_conn_param_neg_reply(hdev, handle,
|
|
|
|
HCI_ERROR_UNKNOWN_CONN_ID);
|
|
|
|
|
|
|
|
if (hci_check_conn_params(min, max, latency, timeout))
|
|
|
|
return send_conn_param_neg_reply(hdev, handle,
|
|
|
|
HCI_ERROR_INVALID_LL_PARAMS);
|
|
|
|
|
2014-07-16 12:42:27 +04:00
|
|
|
if (hcon->role == HCI_ROLE_MASTER) {
|
2014-07-02 18:37:30 +04:00
|
|
|
struct hci_conn_params *params;
|
2014-07-02 18:37:32 +04:00
|
|
|
u8 store_hint;
|
2014-07-02 18:37:30 +04:00
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
params = hci_conn_params_lookup(hdev, &hcon->dst,
|
|
|
|
hcon->dst_type);
|
|
|
|
if (params) {
|
|
|
|
params->conn_min_interval = min;
|
|
|
|
params->conn_max_interval = max;
|
|
|
|
params->conn_latency = latency;
|
|
|
|
params->supervision_timeout = timeout;
|
2014-07-02 18:37:32 +04:00
|
|
|
store_hint = 0x01;
|
2021-04-01 09:50:39 +03:00
|
|
|
} else {
|
2014-07-02 18:37:32 +04:00
|
|
|
store_hint = 0x00;
|
2014-07-02 18:37:30 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
|
2014-07-02 18:37:32 +04:00
|
|
|
mgmt_new_conn_param(hdev, &hcon->dst, hcon->dst_type,
|
|
|
|
store_hint, min, max, latency, timeout);
|
2014-07-02 18:37:30 +04:00
|
|
|
}
|
2014-07-02 01:10:11 +04:00
|
|
|
|
2014-07-02 01:10:08 +04:00
|
|
|
cp.handle = ev->handle;
|
|
|
|
cp.interval_min = ev->interval_min;
|
|
|
|
cp.interval_max = ev->interval_max;
|
|
|
|
cp.latency = ev->latency;
|
|
|
|
cp.timeout = ev->timeout;
|
|
|
|
cp.min_ce_len = 0;
|
|
|
|
cp.max_ce_len = 0;
|
|
|
|
|
|
|
|
hci_send_cmd(hdev, HCI_OP_LE_CONN_PARAM_REQ_REPLY, sizeof(cp), &cp);
|
|
|
|
}
|
|
|
|
|
2014-12-05 18:20:13 +03:00
|
|
|
static void hci_le_direct_adv_report_evt(struct hci_dev *hdev,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
u8 num_reports = skb->data[0];
|
2020-09-09 10:17:00 +03:00
|
|
|
struct hci_ev_le_direct_adv_info *ev = (void *)&skb->data[1];
|
2014-12-05 18:20:13 +03:00
|
|
|
|
2020-09-09 10:17:00 +03:00
|
|
|
if (!num_reports || skb->len < num_reports * sizeof(*ev) + 1)
|
|
|
|
return;
|
2014-12-05 18:20:13 +03:00
|
|
|
|
2020-09-09 10:17:00 +03:00
|
|
|
hci_dev_lock(hdev);
|
2014-12-05 18:20:13 +03:00
|
|
|
|
2020-09-09 10:17:00 +03:00
|
|
|
for (; num_reports; num_reports--, ev++)
|
2014-12-05 18:20:13 +03:00
|
|
|
process_adv_report(hdev, ev->evt_type, &ev->bdaddr,
|
|
|
|
ev->bdaddr_type, &ev->direct_addr,
|
2020-07-27 23:48:55 +03:00
|
|
|
ev->direct_addr_type, ev->rssi, NULL, 0,
|
|
|
|
false);
|
2014-12-05 18:20:13 +03:00
|
|
|
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2020-01-03 02:00:55 +03:00
|
|
|
static void hci_le_phy_update_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_phy_update_complete *ev = (void *) skb->data;
|
|
|
|
struct hci_conn *conn;
|
|
|
|
|
|
|
|
BT_DBG("%s status 0x%2.2x", hdev->name, ev->status);
|
|
|
|
|
2021-03-17 14:22:14 +03:00
|
|
|
if (ev->status)
|
2020-01-03 02:00:55 +03:00
|
|
|
return;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
conn = hci_conn_hash_lookup_handle(hdev, __le16_to_cpu(ev->handle));
|
|
|
|
if (!conn)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
conn->le_tx_phy = ev->tx_phy;
|
|
|
|
conn->le_rx_phy = ev->rx_phy;
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2012-05-23 11:04:18 +04:00
|
|
|
static void hci_le_meta_evt(struct hci_dev *hdev, struct sk_buff *skb)
|
2011-02-11 04:38:47 +03:00
|
|
|
{
|
|
|
|
struct hci_ev_le_meta *le_ev = (void *) skb->data;
|
|
|
|
|
|
|
|
skb_pull(skb, sizeof(*le_ev));
|
|
|
|
|
|
|
|
switch (le_ev->subevent) {
|
|
|
|
case HCI_EV_LE_CONN_COMPLETE:
|
|
|
|
hci_le_conn_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-06-23 13:40:05 +04:00
|
|
|
case HCI_EV_LE_CONN_UPDATE_COMPLETE:
|
|
|
|
hci_le_conn_update_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-05-26 23:23:51 +04:00
|
|
|
case HCI_EV_LE_ADVERTISING_REPORT:
|
|
|
|
hci_le_adv_report_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2015-04-08 19:05:27 +03:00
|
|
|
case HCI_EV_LE_REMOTE_FEAT_COMPLETE:
|
|
|
|
hci_le_remote_feat_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-06-10 01:50:47 +04:00
|
|
|
case HCI_EV_LE_LTK_REQ:
|
|
|
|
hci_le_ltk_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-07-02 01:10:08 +04:00
|
|
|
case HCI_EV_LE_REMOTE_CONN_PARAM_REQ:
|
|
|
|
hci_le_remote_conn_param_req_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2014-12-05 18:20:13 +03:00
|
|
|
case HCI_EV_LE_DIRECT_ADV_REPORT:
|
|
|
|
hci_le_direct_adv_report_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2020-01-03 02:00:55 +03:00
|
|
|
case HCI_EV_LE_PHY_UPDATE_COMPLETE:
|
|
|
|
hci_le_phy_update_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-06 14:35:29 +03:00
|
|
|
case HCI_EV_LE_EXT_ADV_REPORT:
|
|
|
|
hci_le_ext_adv_report_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-06 23:50:32 +03:00
|
|
|
case HCI_EV_LE_ENHANCED_CONN_COMPLETE:
|
|
|
|
hci_le_enh_conn_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2018-07-19 14:39:46 +03:00
|
|
|
case HCI_EV_LE_EXT_ADV_SET_TERM:
|
|
|
|
hci_le_ext_adv_term_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-02-11 04:38:47 +03:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-02 13:41:12 +03:00
|
|
|
static bool hci_get_cmd_complete(struct hci_dev *hdev, u16 opcode,
|
|
|
|
u8 event, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_cmd_complete *ev;
|
|
|
|
struct hci_event_hdr *hdr;
|
|
|
|
|
|
|
|
if (!skb)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (skb->len < sizeof(*hdr)) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "too short HCI event");
|
2015-04-02 13:41:12 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr = (void *) skb->data;
|
|
|
|
skb_pull(skb, HCI_EVENT_HDR_SIZE);
|
|
|
|
|
|
|
|
if (event) {
|
|
|
|
if (hdr->evt != event)
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-06-02 09:54:58 +03:00
|
|
|
/* Check if request ended in Command Status - no way to retrieve
|
2018-11-27 12:37:46 +03:00
|
|
|
* any extra parameters in this case.
|
|
|
|
*/
|
|
|
|
if (hdr->evt == HCI_EV_CMD_STATUS)
|
|
|
|
return false;
|
|
|
|
|
2015-04-02 13:41:12 +03:00
|
|
|
if (hdr->evt != HCI_EV_CMD_COMPLETE) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "last event is not cmd complete (0x%2.2x)",
|
|
|
|
hdr->evt);
|
2015-04-02 13:41:12 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (skb->len < sizeof(*ev)) {
|
2017-10-30 12:42:59 +03:00
|
|
|
bt_dev_err(hdev, "too short cmd_complete event");
|
2015-04-02 13:41:12 +03:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
ev = (void *) skb->data;
|
|
|
|
skb_pull(skb, sizeof(*ev));
|
|
|
|
|
|
|
|
if (opcode != __le16_to_cpu(ev->opcode)) {
|
|
|
|
BT_DBG("opcode doesn't match (0x%2.2x != 0x%2.2x)", opcode,
|
|
|
|
__le16_to_cpu(ev->opcode));
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-09-12 00:07:13 +03:00
|
|
|
static void hci_store_wake_reason(struct hci_dev *hdev, u8 event,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_ev_le_advertising_info *adv;
|
|
|
|
struct hci_ev_le_direct_adv_info *direct_adv;
|
|
|
|
struct hci_ev_le_ext_adv_report *ext_adv;
|
|
|
|
const struct hci_ev_conn_complete *conn_complete = (void *)skb->data;
|
|
|
|
const struct hci_ev_conn_request *conn_request = (void *)skb->data;
|
|
|
|
|
|
|
|
hci_dev_lock(hdev);
|
|
|
|
|
|
|
|
/* If we are currently suspended and this is the first BT event seen,
|
|
|
|
* save the wake reason associated with the event.
|
|
|
|
*/
|
|
|
|
if (!hdev->suspended || hdev->wake_reason)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
/* Default to remote wake. Values for wake_reason are documented in the
|
|
|
|
* Bluez mgmt api docs.
|
|
|
|
*/
|
|
|
|
hdev->wake_reason = MGMT_WAKE_REASON_REMOTE_WAKE;
|
|
|
|
|
|
|
|
/* Once configured for remote wakeup, we should only wake up for
|
|
|
|
* reconnections. It's useful to see which device is waking us up so
|
|
|
|
* keep track of the bdaddr of the connection event that woke us up.
|
|
|
|
*/
|
|
|
|
if (event == HCI_EV_CONN_REQUEST) {
|
|
|
|
bacpy(&hdev->wake_addr, &conn_complete->bdaddr);
|
|
|
|
hdev->wake_addr_type = BDADDR_BREDR;
|
|
|
|
} else if (event == HCI_EV_CONN_COMPLETE) {
|
|
|
|
bacpy(&hdev->wake_addr, &conn_request->bdaddr);
|
|
|
|
hdev->wake_addr_type = BDADDR_BREDR;
|
|
|
|
} else if (event == HCI_EV_LE_META) {
|
|
|
|
struct hci_ev_le_meta *le_ev = (void *)skb->data;
|
|
|
|
u8 subevent = le_ev->subevent;
|
|
|
|
u8 *ptr = &skb->data[sizeof(*le_ev)];
|
|
|
|
u8 num_reports = *ptr;
|
|
|
|
|
|
|
|
if ((subevent == HCI_EV_LE_ADVERTISING_REPORT ||
|
|
|
|
subevent == HCI_EV_LE_DIRECT_ADV_REPORT ||
|
|
|
|
subevent == HCI_EV_LE_EXT_ADV_REPORT) &&
|
|
|
|
num_reports) {
|
|
|
|
adv = (void *)(ptr + 1);
|
|
|
|
direct_adv = (void *)(ptr + 1);
|
|
|
|
ext_adv = (void *)(ptr + 1);
|
|
|
|
|
|
|
|
switch (subevent) {
|
|
|
|
case HCI_EV_LE_ADVERTISING_REPORT:
|
|
|
|
bacpy(&hdev->wake_addr, &adv->bdaddr);
|
|
|
|
hdev->wake_addr_type = adv->bdaddr_type;
|
|
|
|
break;
|
|
|
|
case HCI_EV_LE_DIRECT_ADV_REPORT:
|
|
|
|
bacpy(&hdev->wake_addr, &direct_adv->bdaddr);
|
|
|
|
hdev->wake_addr_type = direct_adv->bdaddr_type;
|
|
|
|
break;
|
|
|
|
case HCI_EV_LE_EXT_ADV_REPORT:
|
|
|
|
bacpy(&hdev->wake_addr, &ext_adv->bdaddr);
|
|
|
|
hdev->wake_addr_type = ext_adv->bdaddr_type;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
hdev->wake_reason = MGMT_WAKE_REASON_UNEXPECTED;
|
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
hci_dev_unlock(hdev);
|
|
|
|
}
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
void hci_event_packet(struct hci_dev *hdev, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct hci_event_hdr *hdr = (void *) skb->data;
|
2015-04-02 13:41:08 +03:00
|
|
|
hci_req_complete_t req_complete = NULL;
|
|
|
|
hci_req_complete_skb_t req_complete_skb = NULL;
|
|
|
|
struct sk_buff *orig_skb = NULL;
|
2015-04-02 13:41:12 +03:00
|
|
|
u8 status = 0, event = hdr->evt, req_evt = 0;
|
2015-04-02 13:41:08 +03:00
|
|
|
u16 opcode = HCI_OP_NOP;
|
2007-10-20 15:33:56 +04:00
|
|
|
|
2020-03-03 18:55:34 +03:00
|
|
|
if (!event) {
|
|
|
|
bt_dev_warn(hdev, "Received unexpected HCI Event 00000000");
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
2015-10-26 00:45:53 +03:00
|
|
|
if (hdev->sent_cmd && bt_cb(hdev->sent_cmd)->hci.req_event == event) {
|
2013-10-07 20:19:16 +04:00
|
|
|
struct hci_command_hdr *cmd_hdr = (void *) hdev->sent_cmd->data;
|
2015-04-02 13:41:08 +03:00
|
|
|
opcode = __le16_to_cpu(cmd_hdr->opcode);
|
|
|
|
hci_req_cmd_complete(hdev, opcode, status, &req_complete,
|
|
|
|
&req_complete_skb);
|
2015-04-02 13:41:12 +03:00
|
|
|
req_evt = event;
|
2013-04-03 22:50:29 +04:00
|
|
|
}
|
|
|
|
|
2015-04-02 13:41:08 +03:00
|
|
|
/* If it looks like we might end up having to call
|
|
|
|
* req_complete_skb, store a pristine copy of the skb since the
|
|
|
|
* various handlers may modify the original one through
|
|
|
|
* skb_pull() calls, etc.
|
|
|
|
*/
|
|
|
|
if (req_complete_skb || event == HCI_EV_CMD_STATUS ||
|
|
|
|
event == HCI_EV_CMD_COMPLETE)
|
|
|
|
orig_skb = skb_clone(skb, GFP_KERNEL);
|
|
|
|
|
|
|
|
skb_pull(skb, HCI_EVENT_HDR_SIZE);
|
|
|
|
|
2020-09-12 00:07:13 +03:00
|
|
|
/* Store wake reason if we're suspended */
|
|
|
|
hci_store_wake_reason(hdev, event, skb);
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
switch (event) {
|
2005-04-17 02:20:36 +04:00
|
|
|
case HCI_EV_INQUIRY_COMPLETE:
|
|
|
|
hci_inquiry_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_INQUIRY_RESULT:
|
|
|
|
hci_inquiry_result_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_CONN_COMPLETE:
|
|
|
|
hci_conn_complete_evt(hdev, skb);
|
2005-09-13 03:32:25 +04:00
|
|
|
break;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
case HCI_EV_CONN_REQUEST:
|
|
|
|
hci_conn_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_DISCONN_COMPLETE:
|
|
|
|
hci_disconn_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_AUTH_COMPLETE:
|
|
|
|
hci_auth_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_REMOTE_NAME:
|
|
|
|
hci_remote_name_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2005-04-17 02:20:36 +04:00
|
|
|
case HCI_EV_ENCRYPT_CHANGE:
|
|
|
|
hci_encrypt_change_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_CHANGE_LINK_KEY_COMPLETE:
|
|
|
|
hci_change_link_key_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_REMOTE_FEATURES:
|
|
|
|
hci_remote_features_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_CMD_COMPLETE:
|
2015-04-02 13:41:08 +03:00
|
|
|
hci_cmd_complete_evt(hdev, skb, &opcode, &status,
|
|
|
|
&req_complete, &req_complete_skb);
|
2007-10-20 15:33:56 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_CMD_STATUS:
|
2015-04-02 13:41:08 +03:00
|
|
|
hci_cmd_status_evt(hdev, skb, &opcode, &status, &req_complete,
|
|
|
|
&req_complete_skb);
|
2007-10-20 15:33:56 +04:00
|
|
|
break;
|
|
|
|
|
2014-11-02 04:56:41 +03:00
|
|
|
case HCI_EV_HARDWARE_ERROR:
|
|
|
|
hci_hardware_error_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_ROLE_CHANGE:
|
|
|
|
hci_role_change_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_NUM_COMP_PKTS:
|
|
|
|
hci_num_comp_pkts_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_MODE_CHANGE:
|
|
|
|
hci_mode_change_evt(hdev, skb);
|
2005-04-17 02:20:36 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_PIN_CODE_REQ:
|
|
|
|
hci_pin_code_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_LINK_KEY_REQ:
|
|
|
|
hci_link_key_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_LINK_KEY_NOTIFY:
|
|
|
|
hci_link_key_notify_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_CLOCK_OFFSET:
|
|
|
|
hci_clock_offset_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:46 +04:00
|
|
|
case HCI_EV_PKT_TYPE_CHANGE:
|
|
|
|
hci_pkt_type_change_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2005-08-10 07:28:02 +04:00
|
|
|
case HCI_EV_PSCAN_REP_MODE:
|
|
|
|
hci_pscan_rep_mode_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_INQUIRY_RESULT_WITH_RSSI:
|
|
|
|
hci_inquiry_result_with_rssi_evt(hdev, skb);
|
2006-07-03 12:02:33 +04:00
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_REMOTE_EXT_FEATURES:
|
|
|
|
hci_remote_ext_features_evt(hdev, skb);
|
2005-04-17 02:20:36 +04:00
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_SYNC_CONN_COMPLETE:
|
|
|
|
hci_sync_conn_complete_evt(hdev, skb);
|
|
|
|
break;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
case HCI_EV_EXTENDED_INQUIRY_RESULT:
|
|
|
|
hci_extended_inquiry_result_evt(hdev, skb);
|
|
|
|
break;
|
2005-04-17 02:20:36 +04:00
|
|
|
|
2012-06-08 19:31:13 +04:00
|
|
|
case HCI_EV_KEY_REFRESH_COMPLETE:
|
|
|
|
hci_key_refresh_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:48 +04:00
|
|
|
case HCI_EV_IO_CAPA_REQUEST:
|
|
|
|
hci_io_capa_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-01-04 16:40:05 +03:00
|
|
|
case HCI_EV_IO_CAPA_REPLY:
|
|
|
|
hci_io_capa_reply_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-02-19 18:05:57 +03:00
|
|
|
case HCI_EV_USER_CONFIRM_REQUEST:
|
|
|
|
hci_user_confirm_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-11-23 20:28:34 +04:00
|
|
|
case HCI_EV_USER_PASSKEY_REQUEST:
|
|
|
|
hci_user_passkey_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-09-06 19:39:26 +04:00
|
|
|
case HCI_EV_USER_PASSKEY_NOTIFY:
|
|
|
|
hci_user_passkey_notify_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case HCI_EV_KEYPRESS_NOTIFY:
|
|
|
|
hci_keypress_notify_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:48 +04:00
|
|
|
case HCI_EV_SIMPLE_PAIR_COMPLETE:
|
|
|
|
hci_simple_pair_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2008-07-14 22:13:48 +04:00
|
|
|
case HCI_EV_REMOTE_HOST_FEATURES:
|
|
|
|
hci_remote_host_features_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-02-11 04:38:47 +03:00
|
|
|
case HCI_EV_LE_META:
|
|
|
|
hci_le_meta_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2011-03-22 15:12:22 +03:00
|
|
|
case HCI_EV_REMOTE_OOB_DATA_REQUEST:
|
|
|
|
hci_remote_oob_data_request_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2015-07-24 12:13:15 +03:00
|
|
|
#if IS_ENABLED(CONFIG_BT_HS)
|
|
|
|
case HCI_EV_CHANNEL_SELECTED:
|
|
|
|
hci_chan_selected_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-10-25 16:20:44 +04:00
|
|
|
case HCI_EV_PHY_LINK_COMPLETE:
|
|
|
|
hci_phy_link_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-10-25 16:20:45 +04:00
|
|
|
case HCI_EV_LOGICAL_LINK_COMPLETE:
|
|
|
|
hci_loglink_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-10-31 17:46:31 +04:00
|
|
|
case HCI_EV_DISCONN_LOGICAL_LINK_COMPLETE:
|
|
|
|
hci_disconn_loglink_complete_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2012-10-31 17:46:32 +04:00
|
|
|
case HCI_EV_DISCONN_PHY_LINK_COMPLETE:
|
|
|
|
hci_disconn_phylink_complete_evt(hdev, skb);
|
|
|
|
break;
|
2015-07-24 12:13:15 +03:00
|
|
|
#endif
|
2012-10-31 17:46:32 +04:00
|
|
|
|
2012-01-04 14:41:58 +04:00
|
|
|
case HCI_EV_NUM_COMP_BLOCKS:
|
|
|
|
hci_num_comp_blocks_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2020-04-03 22:44:01 +03:00
|
|
|
case HCI_EV_VENDOR:
|
|
|
|
msft_vendor_evt(hdev, skb);
|
|
|
|
break;
|
|
|
|
|
2007-10-20 15:33:56 +04:00
|
|
|
default:
|
2012-07-11 15:32:43 +04:00
|
|
|
BT_DBG("%s event 0x%2.2x", hdev->name, event);
|
2005-04-17 02:20:36 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-04-02 13:41:12 +03:00
|
|
|
if (req_complete) {
|
2015-04-02 13:41:08 +03:00
|
|
|
req_complete(hdev, status, opcode);
|
2015-04-02 13:41:12 +03:00
|
|
|
} else if (req_complete_skb) {
|
|
|
|
if (!hci_get_cmd_complete(hdev, opcode, req_evt, orig_skb)) {
|
|
|
|
kfree_skb(orig_skb);
|
|
|
|
orig_skb = NULL;
|
|
|
|
}
|
2015-04-02 13:41:08 +03:00
|
|
|
req_complete_skb(hdev, status, opcode, orig_skb);
|
2015-04-02 13:41:12 +03:00
|
|
|
}
|
2015-04-02 13:41:08 +03:00
|
|
|
|
2020-03-03 18:55:34 +03:00
|
|
|
done:
|
2015-04-02 13:41:08 +03:00
|
|
|
kfree_skb(orig_skb);
|
2005-04-17 02:20:36 +04:00
|
|
|
kfree_skb(skb);
|
|
|
|
hdev->stat.evt_rx++;
|
|
|
|
}
|