xref: /netbsd-src/sys/netbt/hci_event.c (revision c2f76ff004a2cb67efe5b12d97bd3ef7fe89e18d)
1 /*	$NetBSD: hci_event.c,v 1.22 2010/11/22 19:56:51 plunky Exp $	*/
2 
3 /*-
4  * Copyright (c) 2005 Iain Hibbert.
5  * Copyright (c) 2006 Itronix Inc.
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of Itronix Inc. may not be used to endorse
17  *    or promote products derived from this software without specific
18  *    prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY ITRONIX INC. ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL ITRONIX INC. BE LIABLE FOR ANY
24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25  * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
26  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
27  * ON ANY THEORY OF LIABILITY, WHETHER IN
28  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30  * POSSIBILITY OF SUCH DAMAGE.
31  */
32 
33 #include <sys/cdefs.h>
34 __KERNEL_RCSID(0, "$NetBSD: hci_event.c,v 1.22 2010/11/22 19:56:51 plunky Exp $");
35 
36 #include <sys/param.h>
37 #include <sys/kernel.h>
38 #include <sys/malloc.h>
39 #include <sys/mbuf.h>
40 #include <sys/proc.h>
41 #include <sys/systm.h>
42 
43 #include <netbt/bluetooth.h>
44 #include <netbt/hci.h>
45 #include <netbt/sco.h>
46 
47 static void hci_event_inquiry_result(struct hci_unit *, struct mbuf *);
48 static void hci_event_rssi_result(struct hci_unit *, struct mbuf *);
49 static void hci_event_extended_result(struct hci_unit *, struct mbuf *);
50 static void hci_event_command_status(struct hci_unit *, struct mbuf *);
51 static void hci_event_command_compl(struct hci_unit *, struct mbuf *);
52 static void hci_event_con_compl(struct hci_unit *, struct mbuf *);
53 static void hci_event_discon_compl(struct hci_unit *, struct mbuf *);
54 static void hci_event_con_req(struct hci_unit *, struct mbuf *);
55 static void hci_event_num_compl_pkts(struct hci_unit *, struct mbuf *);
56 static void hci_event_auth_compl(struct hci_unit *, struct mbuf *);
57 static void hci_event_encryption_change(struct hci_unit *, struct mbuf *);
58 static void hci_event_change_con_link_key_compl(struct hci_unit *, struct mbuf *);
59 static void hci_event_read_clock_offset_compl(struct hci_unit *, struct mbuf *);
60 static void hci_cmd_read_bdaddr(struct hci_unit *, struct mbuf *);
61 static void hci_cmd_read_buffer_size(struct hci_unit *, struct mbuf *);
62 static void hci_cmd_read_local_features(struct hci_unit *, struct mbuf *);
63 static void hci_cmd_read_local_extended_features(struct hci_unit *, struct mbuf *);
64 static void hci_cmd_read_local_ver(struct hci_unit *, struct mbuf *);
65 static void hci_cmd_read_local_commands(struct hci_unit *, struct mbuf *);
66 static void hci_cmd_reset(struct hci_unit *, struct mbuf *);
67 static void hci_cmd_create_con(struct hci_unit *unit, uint8_t status);
68 
69 #ifdef BLUETOOTH_DEBUG
70 int bluetooth_debug;
71 
72 static const char *hci_eventnames[] = {
73 /* 0x00 */ "NULL",
74 /* 0x01 */ "INQUIRY COMPLETE",
75 /* 0x02 */ "INQUIRY RESULT",
76 /* 0x03 */ "CONN COMPLETE",
77 /* 0x04 */ "CONN REQ",
78 /* 0x05 */ "DISCONN COMPLETE",
79 /* 0x06 */ "AUTH COMPLETE",
80 /* 0x07 */ "REMOTE NAME REQ COMPLETE",
81 /* 0x08 */ "ENCRYPTION CHANGE",
82 /* 0x09 */ "CHANGE CONN LINK KEY COMPLETE",
83 /* 0x0a */ "MASTER LINK KEY COMPLETE",
84 /* 0x0b */ "READ REMOTE FEATURES COMPLETE",
85 /* 0x0c */ "READ REMOTE VERSION INFO COMPLETE",
86 /* 0x0d */ "QoS SETUP COMPLETE",
87 /* 0x0e */ "COMMAND COMPLETE",
88 /* 0x0f */ "COMMAND STATUS",
89 /* 0x10 */ "HARDWARE ERROR",
90 /* 0x11 */ "FLUSH OCCUR",
91 /* 0x12 */ "ROLE CHANGE",
92 /* 0x13 */ "NUM COMPLETED PACKETS",
93 /* 0x14 */ "MODE CHANGE",
94 /* 0x15 */ "RETURN LINK KEYS",
95 /* 0x16 */ "PIN CODE REQ",
96 /* 0x17 */ "LINK KEY REQ",
97 /* 0x18 */ "LINK KEY NOTIFICATION",
98 /* 0x19 */ "LOOPBACK COMMAND",
99 /* 0x1a */ "DATA BUFFER OVERFLOW",
100 /* 0x1b */ "MAX SLOT CHANGE",
101 /* 0x1c */ "READ CLOCK OFFSET COMPLETE",
102 /* 0x1d */ "CONN PKT TYPE CHANGED",
103 /* 0x1e */ "QOS VIOLATION",
104 /* 0x1f */ "PAGE SCAN MODE CHANGE",
105 /* 0x20 */ "PAGE SCAN REP MODE CHANGE",
106 /* 0x21 */ "FLOW SPECIFICATION COMPLETE",
107 /* 0x22 */ "RSSI RESULT",
108 /* 0x23 */ "READ REMOTE EXT FEATURES",
109 /* 0x24 */ "UNKNOWN",
110 /* 0x25 */ "UNKNOWN",
111 /* 0x26 */ "UNKNOWN",
112 /* 0x27 */ "UNKNOWN",
113 /* 0x28 */ "UNKNOWN",
114 /* 0x29 */ "UNKNOWN",
115 /* 0x2a */ "UNKNOWN",
116 /* 0x2b */ "UNKNOWN",
117 /* 0x2c */ "SCO CON COMPLETE",
118 /* 0x2d */ "SCO CON CHANGED",
119 /* 0x2e */ "SNIFF SUBRATING",
120 /* 0x2f */ "EXTENDED INQUIRY RESULT",
121 /* 0x30 */ "ENCRYPTION KEY REFRESH",
122 /* 0x31 */ "IO CAPABILITY REQUEST",
123 /* 0x32 */ "IO CAPABILITY RESPONSE",
124 /* 0x33 */ "USER CONFIRM REQUEST",
125 /* 0x34 */ "USER PASSKEY REQUEST",
126 /* 0x35 */ "REMOTE OOB DATA REQUEST",
127 /* 0x36 */ "SIMPLE PAIRING COMPLETE",
128 /* 0x37 */ "UNKNOWN",
129 /* 0x38 */ "LINK SUPERVISION TIMEOUT CHANGED",
130 /* 0x39 */ "ENHANCED FLUSH COMPLETE",
131 /* 0x3a */ "UNKNOWN",
132 /* 0x3b */ "USER PASSKEY NOTIFICATION",
133 /* 0x3c */ "KEYPRESS NOTIFICATION",
134 /* 0x3d */ "REMOTE HOST FEATURES NOTIFICATION",
135 };
136 
137 static const char *
138 hci_eventstr(unsigned int event)
139 {
140 
141 	if (event < __arraycount(hci_eventnames))
142 		return hci_eventnames[event];
143 
144 	switch (event) {
145 	case HCI_EVENT_BT_LOGO:		/* 0xfe */
146 		return "BT_LOGO";
147 
148 	case HCI_EVENT_VENDOR:		/* 0xff */
149 		return "VENDOR";
150 	}
151 
152 	return "UNKNOWN";
153 }
154 #endif	/* BLUETOOTH_DEBUG */
155 
156 /*
157  * process HCI Events
158  *
159  * We will free the mbuf at the end, no need for any sub
160  * functions to handle that. We kind of assume that the
161  * device sends us valid events.
162  */
163 void
164 hci_event(struct mbuf *m, struct hci_unit *unit)
165 {
166 	hci_event_hdr_t hdr;
167 
168 	KASSERT(m->m_flags & M_PKTHDR);
169 
170 	KASSERT(m->m_pkthdr.len >= sizeof(hdr));
171 	m_copydata(m, 0, sizeof(hdr), &hdr);
172 	m_adj(m, sizeof(hdr));
173 
174 	KASSERT(hdr.type == HCI_EVENT_PKT);
175 
176 	DPRINTFN(1, "(%s) event %s\n",
177 	    device_xname(unit->hci_dev), hci_eventstr(hdr.event));
178 
179 	switch(hdr.event) {
180 	case HCI_EVENT_COMMAND_STATUS:
181 		hci_event_command_status(unit, m);
182 		break;
183 
184 	case HCI_EVENT_COMMAND_COMPL:
185 		hci_event_command_compl(unit, m);
186 		break;
187 
188 	case HCI_EVENT_NUM_COMPL_PKTS:
189 		hci_event_num_compl_pkts(unit, m);
190 		break;
191 
192 	case HCI_EVENT_INQUIRY_RESULT:
193 		hci_event_inquiry_result(unit, m);
194 		break;
195 
196 	case HCI_EVENT_RSSI_RESULT:
197 		hci_event_rssi_result(unit, m);
198 		break;
199 
200 	case HCI_EVENT_EXTENDED_RESULT:
201 		hci_event_extended_result(unit, m);
202 		break;
203 
204 	case HCI_EVENT_CON_COMPL:
205 		hci_event_con_compl(unit, m);
206 		break;
207 
208 	case HCI_EVENT_DISCON_COMPL:
209 		hci_event_discon_compl(unit, m);
210 		break;
211 
212 	case HCI_EVENT_CON_REQ:
213 		hci_event_con_req(unit, m);
214 		break;
215 
216 	case HCI_EVENT_AUTH_COMPL:
217 		hci_event_auth_compl(unit, m);
218 		break;
219 
220 	case HCI_EVENT_ENCRYPTION_CHANGE:
221 		hci_event_encryption_change(unit, m);
222 		break;
223 
224 	case HCI_EVENT_CHANGE_CON_LINK_KEY_COMPL:
225 		hci_event_change_con_link_key_compl(unit, m);
226 		break;
227 
228 	case HCI_EVENT_READ_CLOCK_OFFSET_COMPL:
229 		hci_event_read_clock_offset_compl(unit, m);
230 		break;
231 
232 	default:
233 		break;
234 	}
235 
236 	m_freem(m);
237 }
238 
239 /*
240  * Command Status
241  *
242  * Restart command queue and post-process any pending commands
243  */
244 static void
245 hci_event_command_status(struct hci_unit *unit, struct mbuf *m)
246 {
247 	hci_command_status_ep ep;
248 
249 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
250 	m_copydata(m, 0, sizeof(ep), &ep);
251 	m_adj(m, sizeof(ep));
252 
253 	ep.opcode = le16toh(ep.opcode);
254 
255 	DPRINTFN(1, "(%s) opcode (%03x|%04x) status = 0x%x num_cmd_pkts = %d\n",
256 		device_xname(unit->hci_dev),
257 		HCI_OGF(ep.opcode), HCI_OCF(ep.opcode),
258 		ep.status,
259 		ep.num_cmd_pkts);
260 
261 	hci_num_cmds(unit, ep.num_cmd_pkts);
262 
263 	/*
264 	 * post processing of pending commands
265 	 */
266 	switch(ep.opcode) {
267 	case HCI_CMD_CREATE_CON:
268 		hci_cmd_create_con(unit, ep.status);
269 		break;
270 
271 	default:
272 		if (ep.status == 0)
273 			break;
274 
275 		aprint_error_dev(unit->hci_dev,
276 		    "CommandStatus opcode (%03x|%04x) failed (status=0x%02x)\n",
277 		    HCI_OGF(ep.opcode), HCI_OCF(ep.opcode),
278 		    ep.status);
279 
280 		break;
281 	}
282 }
283 
284 /*
285  * Command Complete
286  *
287  * Restart command queue and handle the completed command
288  */
289 static void
290 hci_event_command_compl(struct hci_unit *unit, struct mbuf *m)
291 {
292 	hci_command_compl_ep ep;
293 	hci_status_rp rp;
294 
295 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
296 	m_copydata(m, 0, sizeof(ep), &ep);
297 	m_adj(m, sizeof(ep));
298 
299 	DPRINTFN(1, "(%s) opcode (%03x|%04x) num_cmd_pkts = %d\n",
300 		device_xname(unit->hci_dev),
301 		HCI_OGF(le16toh(ep.opcode)), HCI_OCF(le16toh(ep.opcode)),
302 		ep.num_cmd_pkts);
303 
304 	hci_num_cmds(unit, ep.num_cmd_pkts);
305 
306 	/*
307 	 * I am not sure if this is completely correct, it is not guaranteed
308 	 * that a command_complete packet will contain the status though most
309 	 * do seem to.
310 	 */
311 	m_copydata(m, 0, sizeof(rp), &rp);
312 	if (rp.status > 0)
313 		aprint_error_dev(unit->hci_dev,
314 		    "CommandComplete opcode (%03x|%04x) failed (status=0x%02x)\n",
315 		    HCI_OGF(le16toh(ep.opcode)), HCI_OCF(le16toh(ep.opcode)),
316 		    rp.status);
317 
318 	/*
319 	 * post processing of completed commands
320 	 */
321 	switch(le16toh(ep.opcode)) {
322 	case HCI_CMD_READ_BDADDR:
323 		hci_cmd_read_bdaddr(unit, m);
324 		break;
325 
326 	case HCI_CMD_READ_BUFFER_SIZE:
327 		hci_cmd_read_buffer_size(unit, m);
328 		break;
329 
330 	case HCI_CMD_READ_LOCAL_FEATURES:
331 		hci_cmd_read_local_features(unit, m);
332 		break;
333 
334 	case HCI_CMD_READ_LOCAL_EXTENDED_FEATURES:
335 		hci_cmd_read_local_extended_features(unit, m);
336 		break;
337 
338 	case HCI_CMD_READ_LOCAL_VER:
339 		hci_cmd_read_local_ver(unit, m);
340 		break;
341 
342 	case HCI_CMD_READ_LOCAL_COMMANDS:
343 		hci_cmd_read_local_commands(unit, m);
344 		break;
345 
346 	case HCI_CMD_RESET:
347 		hci_cmd_reset(unit, m);
348 		break;
349 
350 	default:
351 		break;
352 	}
353 }
354 
355 /*
356  * Number of Completed Packets
357  *
358  * This is sent periodically by the Controller telling us how many
359  * buffers are now freed up and which handle was using them. From
360  * this we determine which type of buffer it was and add the qty
361  * back into the relevant packet counter, then restart output on
362  * links that have halted.
363  */
364 static void
365 hci_event_num_compl_pkts(struct hci_unit *unit, struct mbuf *m)
366 {
367 	hci_num_compl_pkts_ep ep;
368 	struct hci_link *link, *next;
369 	uint16_t handle, num;
370 	int num_acl = 0, num_sco = 0;
371 
372 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
373 	m_copydata(m, 0, sizeof(ep), &ep);
374 	m_adj(m, sizeof(ep));
375 
376 	while (ep.num_con_handles--) {
377 		m_copydata(m, 0, sizeof(handle), &handle);
378 		m_adj(m, sizeof(handle));
379 		handle = le16toh(handle);
380 
381 		m_copydata(m, 0, sizeof(num), &num);
382 		m_adj(m, sizeof(num));
383 		num = le16toh(num);
384 
385 		link = hci_link_lookup_handle(unit, handle);
386 		if (link) {
387 			if (link->hl_type == HCI_LINK_ACL) {
388 				num_acl += num;
389 				hci_acl_complete(link, num);
390 			} else {
391 				num_sco += num;
392 				hci_sco_complete(link, num);
393 			}
394 		} else {
395 			/* XXX need to issue Read_Buffer_Size or Reset? */
396 			aprint_error_dev(unit->hci_dev,
397 			    "unknown handle %d! (losing track of %d packet buffer%s)\n",
398 			    handle, num, (num == 1 ? "" : "s"));
399 		}
400 	}
401 
402 	/*
403 	 * Move up any queued packets. When a link has sent data, it will move
404 	 * to the back of the queue - technically then if a link had something
405 	 * to send and there were still buffers available it could get started
406 	 * twice but it seemed more important to to handle higher loads fairly
407 	 * than worry about wasting cycles when we are not busy.
408 	 */
409 
410 	unit->hci_num_acl_pkts += num_acl;
411 	unit->hci_num_sco_pkts += num_sco;
412 
413 	link = TAILQ_FIRST(&unit->hci_links);
414 	while (link && (unit->hci_num_acl_pkts > 0 || unit->hci_num_sco_pkts > 0)) {
415 		next = TAILQ_NEXT(link, hl_next);
416 
417 		if (link->hl_type == HCI_LINK_ACL) {
418 			if (unit->hci_num_acl_pkts > 0 && link->hl_txqlen > 0)
419 				hci_acl_start(link);
420 		} else {
421 			if (unit->hci_num_sco_pkts > 0 && link->hl_txqlen > 0)
422 				hci_sco_start(link);
423 		}
424 
425 		link = next;
426 	}
427 }
428 
429 /*
430  * Inquiry Result
431  *
432  * keep a note of devices seen, so we know which unit to use
433  * on outgoing connections
434  */
435 static void
436 hci_event_inquiry_result(struct hci_unit *unit, struct mbuf *m)
437 {
438 	hci_inquiry_result_ep ep;
439 	hci_inquiry_response ir;
440 	struct hci_memo *memo;
441 
442 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
443 	m_copydata(m, 0, sizeof(ep), &ep);
444 	m_adj(m, sizeof(ep));
445 
446 	DPRINTFN(1, "%d response%s\n", ep.num_responses,
447 				(ep.num_responses == 1 ? "" : "s"));
448 
449 	while(ep.num_responses--) {
450 		KASSERT(m->m_pkthdr.len >= sizeof(ir));
451 		m_copydata(m, 0, sizeof(ir), &ir);
452 		m_adj(m, sizeof(ir));
453 
454 		DPRINTFN(1, "bdaddr %02x:%02x:%02x:%02x:%02x:%02x\n",
455 			ir.bdaddr.b[5], ir.bdaddr.b[4], ir.bdaddr.b[3],
456 			ir.bdaddr.b[2], ir.bdaddr.b[1], ir.bdaddr.b[0]);
457 
458 		memo = hci_memo_new(unit, &ir.bdaddr);
459 		if (memo != NULL) {
460 			memo->page_scan_rep_mode = ir.page_scan_rep_mode;
461 			memo->page_scan_mode = ir.page_scan_mode;
462 			memo->clock_offset = ir.clock_offset;
463 		}
464 	}
465 }
466 
467 /*
468  * Inquiry Result with RSSI
469  *
470  * as above but different packet when RSSI result is enabled
471  */
472 static void
473 hci_event_rssi_result(struct hci_unit *unit, struct mbuf *m)
474 {
475 	hci_rssi_result_ep ep;
476 	hci_rssi_response rr;
477 	struct hci_memo *memo;
478 
479 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
480 	m_copydata(m, 0, sizeof(ep), &ep);
481 	m_adj(m, sizeof(ep));
482 
483 	DPRINTFN(1, "%d response%s\n", ep.num_responses,
484 				(ep.num_responses == 1 ? "" : "s"));
485 
486 	while(ep.num_responses--) {
487 		KASSERT(m->m_pkthdr.len >= sizeof(rr));
488 		m_copydata(m, 0, sizeof(rr), &rr);
489 		m_adj(m, sizeof(rr));
490 
491 		DPRINTFN(1, "bdaddr %02x:%02x:%02x:%02x:%02x:%02x\n",
492 			rr.bdaddr.b[5], rr.bdaddr.b[4], rr.bdaddr.b[3],
493 			rr.bdaddr.b[2], rr.bdaddr.b[1], rr.bdaddr.b[0]);
494 
495 		memo = hci_memo_new(unit, &rr.bdaddr);
496 		if (memo != NULL) {
497 			memo->page_scan_rep_mode = rr.page_scan_rep_mode;
498 			memo->page_scan_mode = 0;
499 			memo->clock_offset = rr.clock_offset;
500 		}
501 	}
502 }
503 
504 /*
505  * Extended Inquiry Result
506  *
507  * as above but provides only one response and extended service info
508  */
509 static void
510 hci_event_extended_result(struct hci_unit *unit, struct mbuf *m)
511 {
512 	hci_extended_result_ep ep;
513 	struct hci_memo *memo;
514 
515 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
516 	m_copydata(m, 0, sizeof(ep), &ep);
517 	m_adj(m, sizeof(ep));
518 
519 	if (ep.num_responses != 1)
520 		return;
521 
522 	DPRINTFN(1, "bdaddr %02x:%02x:%02x:%02x:%02x:%02x\n",
523 		ep.bdaddr.b[5], ep.bdaddr.b[4], ep.bdaddr.b[3],
524 		ep.bdaddr.b[2], ep.bdaddr.b[1], ep.bdaddr.b[0]);
525 
526 	memo = hci_memo_new(unit, &ep.bdaddr);
527 	if (memo != NULL) {
528 		memo->page_scan_rep_mode = ep.page_scan_rep_mode;
529 		memo->page_scan_mode = 0;
530 		memo->clock_offset = ep.clock_offset;
531 	}
532 }
533 
534 /*
535  * Connection Complete
536  *
537  * Sent to us when a connection is made. If there is no link
538  * structure already allocated for this, we must have changed
539  * our mind, so just disconnect.
540  */
541 static void
542 hci_event_con_compl(struct hci_unit *unit, struct mbuf *m)
543 {
544 	hci_con_compl_ep ep;
545 	hci_write_link_policy_settings_cp cp;
546 	struct hci_link *link;
547 	int err;
548 
549 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
550 	m_copydata(m, 0, sizeof(ep), &ep);
551 	m_adj(m, sizeof(ep));
552 
553 	DPRINTFN(1, "(%s) %s connection complete for "
554 		"%02x:%02x:%02x:%02x:%02x:%02x status %#x\n",
555 		device_xname(unit->hci_dev),
556 		(ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO"),
557 		ep.bdaddr.b[5], ep.bdaddr.b[4], ep.bdaddr.b[3],
558 		ep.bdaddr.b[2], ep.bdaddr.b[1], ep.bdaddr.b[0],
559 		ep.status);
560 
561 	link = hci_link_lookup_bdaddr(unit, &ep.bdaddr, ep.link_type);
562 
563 	if (ep.status) {
564 		if (link != NULL) {
565 			switch (ep.status) {
566 			case 0x04: /* "Page Timeout" */
567 				err = EHOSTDOWN;
568 				break;
569 
570 			case 0x08: /* "Connection Timed Out" */
571 				err = ETIMEDOUT;
572 				break;
573 
574 			case 0x16: /* "Connection Terminated by Local Host" */
575 				err = 0;
576 				break;
577 
578 			default:
579 				err = ECONNREFUSED;
580 				break;
581 			}
582 
583 			hci_link_free(link, err);
584 		}
585 
586 		return;
587 	}
588 
589 	if (link == NULL) {
590 		hci_discon_cp dp;
591 
592 		dp.con_handle = ep.con_handle;
593 		dp.reason = 0x13; /* "Remote User Terminated Connection" */
594 
595 		hci_send_cmd(unit, HCI_CMD_DISCONNECT, &dp, sizeof(dp));
596 		return;
597 	}
598 
599 	/* XXX could check auth_enable here */
600 
601 	if (ep.encryption_mode)
602 		link->hl_flags |= (HCI_LINK_AUTH | HCI_LINK_ENCRYPT);
603 
604 	link->hl_state = HCI_LINK_OPEN;
605 	link->hl_handle = HCI_CON_HANDLE(le16toh(ep.con_handle));
606 
607 	if (ep.link_type == HCI_LINK_ACL) {
608 		cp.con_handle = ep.con_handle;
609 		cp.settings = htole16(unit->hci_link_policy);
610 		err = hci_send_cmd(unit, HCI_CMD_WRITE_LINK_POLICY_SETTINGS,
611 						&cp, sizeof(cp));
612 		if (err)
613 			aprint_error_dev(unit->hci_dev,
614 			    "Warning, could not write link policy\n");
615 
616 		err = hci_send_cmd(unit, HCI_CMD_READ_CLOCK_OFFSET,
617 				    &cp.con_handle, sizeof(cp.con_handle));
618 		if (err)
619 			aprint_error_dev(unit->hci_dev,
620 			    "Warning, could not read clock offset\n");
621 
622 		err = hci_acl_setmode(link);
623 		if (err == EINPROGRESS)
624 			return;
625 
626 		hci_acl_linkmode(link);
627 	} else {
628 		(*link->hl_sco->sp_proto->connected)(link->hl_sco->sp_upper);
629 	}
630 }
631 
632 /*
633  * Disconnection Complete
634  *
635  * This is sent in response to a disconnection request, but also if
636  * the remote device goes out of range.
637  */
638 static void
639 hci_event_discon_compl(struct hci_unit *unit, struct mbuf *m)
640 {
641 	hci_discon_compl_ep ep;
642 	struct hci_link *link;
643 
644 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
645 	m_copydata(m, 0, sizeof(ep), &ep);
646 	m_adj(m, sizeof(ep));
647 
648 	ep.con_handle = le16toh(ep.con_handle);
649 
650 	DPRINTFN(1, "handle #%d, status=0x%x\n", ep.con_handle, ep.status);
651 
652 	link = hci_link_lookup_handle(unit, HCI_CON_HANDLE(ep.con_handle));
653 	if (link)
654 		hci_link_free(link, ENOLINK);
655 }
656 
657 /*
658  * Connect Request
659  *
660  * We check upstream for appropriate listeners and accept connections
661  * that are wanted.
662  */
663 static void
664 hci_event_con_req(struct hci_unit *unit, struct mbuf *m)
665 {
666 	hci_con_req_ep ep;
667 	hci_accept_con_cp ap;
668 	hci_reject_con_cp rp;
669 	struct hci_link *link;
670 
671 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
672 	m_copydata(m, 0, sizeof(ep), &ep);
673 	m_adj(m, sizeof(ep));
674 
675 	DPRINTFN(1, "bdaddr %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2x "
676 		"class %2.2x%2.2x%2.2x type %s\n",
677 		ep.bdaddr.b[5], ep.bdaddr.b[4], ep.bdaddr.b[3],
678 		ep.bdaddr.b[2], ep.bdaddr.b[1], ep.bdaddr.b[0],
679 		ep.uclass[0], ep.uclass[1], ep.uclass[2],
680 		ep.link_type == HCI_LINK_ACL ? "ACL" : "SCO");
681 
682 	if (ep.link_type == HCI_LINK_ACL)
683 		link = hci_acl_newconn(unit, &ep.bdaddr);
684 	else
685 		link = hci_sco_newconn(unit, &ep.bdaddr);
686 
687 	if (link == NULL) {
688 		memset(&rp, 0, sizeof(rp));
689 		bdaddr_copy(&rp.bdaddr, &ep.bdaddr);
690 		rp.reason = 0x0f;	/* Unacceptable BD_ADDR */
691 
692 		hci_send_cmd(unit, HCI_CMD_REJECT_CON, &rp, sizeof(rp));
693 	} else {
694 		memset(&ap, 0, sizeof(ap));
695 		bdaddr_copy(&ap.bdaddr, &ep.bdaddr);
696 		if (unit->hci_flags & BTF_MASTER)
697 			ap.role = HCI_ROLE_MASTER;
698 		else
699 			ap.role = HCI_ROLE_SLAVE;
700 
701 		hci_send_cmd(unit, HCI_CMD_ACCEPT_CON, &ap, sizeof(ap));
702 	}
703 }
704 
705 /*
706  * Auth Complete
707  *
708  * Authentication has been completed on an ACL link. We can notify the
709  * upper layer protocols unless further mode changes are pending.
710  */
711 static void
712 hci_event_auth_compl(struct hci_unit *unit, struct mbuf *m)
713 {
714 	hci_auth_compl_ep ep;
715 	struct hci_link *link;
716 	int err;
717 
718 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
719 	m_copydata(m, 0, sizeof(ep), &ep);
720 	m_adj(m, sizeof(ep));
721 
722 	ep.con_handle = HCI_CON_HANDLE(le16toh(ep.con_handle));
723 
724 	DPRINTFN(1, "handle #%d, status=0x%x\n", ep.con_handle, ep.status);
725 
726 	link = hci_link_lookup_handle(unit, ep.con_handle);
727 	if (link == NULL || link->hl_type != HCI_LINK_ACL)
728 		return;
729 
730 	if (ep.status == 0) {
731 		link->hl_flags |= HCI_LINK_AUTH;
732 
733 		if (link->hl_state == HCI_LINK_WAIT_AUTH)
734 			link->hl_state = HCI_LINK_OPEN;
735 
736 		err = hci_acl_setmode(link);
737 		if (err == EINPROGRESS)
738 			return;
739 	}
740 
741 	hci_acl_linkmode(link);
742 }
743 
744 /*
745  * Encryption Change
746  *
747  * The encryption status has changed. Basically, we note the change
748  * then notify the upper layer protocol unless further mode changes
749  * are pending.
750  * Note that if encryption gets disabled when it has been requested,
751  * we will attempt to enable it again.. (its a feature not a bug :)
752  */
753 static void
754 hci_event_encryption_change(struct hci_unit *unit, struct mbuf *m)
755 {
756 	hci_encryption_change_ep ep;
757 	struct hci_link *link;
758 	int err;
759 
760 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
761 	m_copydata(m, 0, sizeof(ep), &ep);
762 	m_adj(m, sizeof(ep));
763 
764 	ep.con_handle = HCI_CON_HANDLE(le16toh(ep.con_handle));
765 
766 	DPRINTFN(1, "handle #%d, status=0x%x, encryption_enable=0x%x\n",
767 		 ep.con_handle, ep.status, ep.encryption_enable);
768 
769 	link = hci_link_lookup_handle(unit, ep.con_handle);
770 	if (link == NULL || link->hl_type != HCI_LINK_ACL)
771 		return;
772 
773 	if (ep.status == 0) {
774 		if (ep.encryption_enable == 0)
775 			link->hl_flags &= ~HCI_LINK_ENCRYPT;
776 		else
777 			link->hl_flags |= (HCI_LINK_AUTH | HCI_LINK_ENCRYPT);
778 
779 		if (link->hl_state == HCI_LINK_WAIT_ENCRYPT)
780 			link->hl_state = HCI_LINK_OPEN;
781 
782 		err = hci_acl_setmode(link);
783 		if (err == EINPROGRESS)
784 			return;
785 	}
786 
787 	hci_acl_linkmode(link);
788 }
789 
790 /*
791  * Change Connection Link Key Complete
792  *
793  * Link keys are handled in userland but if we are waiting to secure
794  * this link, we should notify the upper protocols. A SECURE request
795  * only needs a single key change, so we can cancel the request.
796  */
797 static void
798 hci_event_change_con_link_key_compl(struct hci_unit *unit, struct mbuf *m)
799 {
800 	hci_change_con_link_key_compl_ep ep;
801 	struct hci_link *link;
802 	int err;
803 
804 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
805 	m_copydata(m, 0, sizeof(ep), &ep);
806 	m_adj(m, sizeof(ep));
807 
808 	ep.con_handle = HCI_CON_HANDLE(le16toh(ep.con_handle));
809 
810 	DPRINTFN(1, "handle #%d, status=0x%x\n", ep.con_handle, ep.status);
811 
812 	link = hci_link_lookup_handle(unit, ep.con_handle);
813 	if (link == NULL || link->hl_type != HCI_LINK_ACL)
814 		return;
815 
816 	link->hl_flags &= ~HCI_LINK_SECURE_REQ;
817 
818 	if (ep.status == 0) {
819 		link->hl_flags |= (HCI_LINK_AUTH | HCI_LINK_SECURE);
820 
821 		if (link->hl_state == HCI_LINK_WAIT_SECURE)
822 			link->hl_state = HCI_LINK_OPEN;
823 
824 		err = hci_acl_setmode(link);
825 		if (err == EINPROGRESS)
826 			return;
827 	}
828 
829 	hci_acl_linkmode(link);
830 }
831 
832 /*
833  * Read Clock Offset Complete
834  *
835  * We keep a note of the clock offset of remote devices when a
836  * link is made, in order to facilitate reconnections to the device
837  */
838 static void
839 hci_event_read_clock_offset_compl(struct hci_unit *unit, struct mbuf *m)
840 {
841 	hci_read_clock_offset_compl_ep ep;
842 	struct hci_link *link;
843 
844 	KASSERT(m->m_pkthdr.len >= sizeof(ep));
845 	m_copydata(m, 0, sizeof(ep), &ep);
846 	m_adj(m, sizeof(ep));
847 
848 	DPRINTFN(1, "handle #%d, offset=%u, status=0x%x\n",
849 		le16toh(ep.con_handle), le16toh(ep.clock_offset), ep.status);
850 
851 	ep.con_handle = HCI_CON_HANDLE(le16toh(ep.con_handle));
852 	link = hci_link_lookup_handle(unit, ep.con_handle);
853 	if (link == NULL || link->hl_type != HCI_LINK_ACL)
854 		return;
855 
856 	if (ep.status == 0)
857 		link->hl_clock = ep.clock_offset;
858 }
859 
860 /*
861  * process results of read_bdaddr command_complete event
862  */
863 static void
864 hci_cmd_read_bdaddr(struct hci_unit *unit, struct mbuf *m)
865 {
866 	hci_read_bdaddr_rp rp;
867 
868 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
869 	m_copydata(m, 0, sizeof(rp), &rp);
870 	m_adj(m, sizeof(rp));
871 
872 	if (rp.status > 0)
873 		return;
874 
875 	if ((unit->hci_flags & BTF_INIT_BDADDR) == 0)
876 		return;
877 
878 	bdaddr_copy(&unit->hci_bdaddr, &rp.bdaddr);
879 
880 	unit->hci_flags &= ~BTF_INIT_BDADDR;
881 
882 	cv_broadcast(&unit->hci_init);
883 }
884 
885 /*
886  * process results of read_buffer_size command_complete event
887  */
888 static void
889 hci_cmd_read_buffer_size(struct hci_unit *unit, struct mbuf *m)
890 {
891 	hci_read_buffer_size_rp rp;
892 
893 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
894 	m_copydata(m, 0, sizeof(rp), &rp);
895 	m_adj(m, sizeof(rp));
896 
897 	if (rp.status > 0)
898 		return;
899 
900 	if ((unit->hci_flags & BTF_INIT_BUFFER_SIZE) == 0)
901 		return;
902 
903 	unit->hci_max_acl_size = le16toh(rp.max_acl_size);
904 	unit->hci_num_acl_pkts = le16toh(rp.num_acl_pkts);
905 	unit->hci_max_acl_pkts = le16toh(rp.num_acl_pkts);
906 	unit->hci_max_sco_size = rp.max_sco_size;
907 	unit->hci_num_sco_pkts = le16toh(rp.num_sco_pkts);
908 	unit->hci_max_sco_pkts = le16toh(rp.num_sco_pkts);
909 
910 	unit->hci_flags &= ~BTF_INIT_BUFFER_SIZE;
911 
912 	cv_broadcast(&unit->hci_init);
913 }
914 
915 /*
916  * process results of read_local_features command_complete event
917  */
918 static void
919 hci_cmd_read_local_features(struct hci_unit *unit, struct mbuf *m)
920 {
921 	hci_read_local_features_rp rp;
922 
923 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
924 	m_copydata(m, 0, sizeof(rp), &rp);
925 	m_adj(m, sizeof(rp));
926 
927 	if (rp.status > 0)
928 		return;
929 
930 	if ((unit->hci_flags & BTF_INIT_FEATURES) == 0)
931 		return;
932 
933 	memcpy(unit->hci_feat0, rp.features, HCI_FEATURES_SIZE);
934 
935 	unit->hci_lmp_mask = 0;
936 
937 	if (rp.features[0] & HCI_LMP_ROLE_SWITCH)
938 		unit->hci_lmp_mask |= HCI_LINK_POLICY_ENABLE_ROLE_SWITCH;
939 
940 	if (rp.features[0] & HCI_LMP_HOLD_MODE)
941 		unit->hci_lmp_mask |= HCI_LINK_POLICY_ENABLE_HOLD_MODE;
942 
943 	if (rp.features[0] & HCI_LMP_SNIFF_MODE)
944 		unit->hci_lmp_mask |= HCI_LINK_POLICY_ENABLE_SNIFF_MODE;
945 
946 	if (rp.features[1] & HCI_LMP_PARK_MODE)
947 		unit->hci_lmp_mask |= HCI_LINK_POLICY_ENABLE_PARK_MODE;
948 
949 	DPRINTFN(1, "%s: lmp_mask %4.4x\n",
950 		device_xname(unit->hci_dev), unit->hci_lmp_mask);
951 
952 	/* ACL packet mask */
953 	unit->hci_acl_mask = HCI_PKT_DM1 | HCI_PKT_DH1;
954 
955 	if (rp.features[0] & HCI_LMP_3SLOT)
956 		unit->hci_acl_mask |= HCI_PKT_DM3 | HCI_PKT_DH3;
957 
958 	if (rp.features[0] & HCI_LMP_5SLOT)
959 		unit->hci_acl_mask |= HCI_PKT_DM5 | HCI_PKT_DH5;
960 
961 	if ((rp.features[3] & HCI_LMP_EDR_ACL_2MBPS) == 0)
962 		unit->hci_acl_mask |= HCI_PKT_2MBPS_DH1
963 				    | HCI_PKT_2MBPS_DH3
964 				    | HCI_PKT_2MBPS_DH5;
965 
966 	if ((rp.features[3] & HCI_LMP_EDR_ACL_3MBPS) == 0)
967 		unit->hci_acl_mask |= HCI_PKT_3MBPS_DH1
968 				    | HCI_PKT_3MBPS_DH3
969 				    | HCI_PKT_3MBPS_DH5;
970 
971 	if ((rp.features[4] & HCI_LMP_3SLOT_EDR_ACL) == 0)
972 		unit->hci_acl_mask |= HCI_PKT_2MBPS_DH3
973 				    | HCI_PKT_3MBPS_DH3;
974 
975 	if ((rp.features[5] & HCI_LMP_5SLOT_EDR_ACL) == 0)
976 		unit->hci_acl_mask |= HCI_PKT_2MBPS_DH5
977 				    | HCI_PKT_3MBPS_DH5;
978 
979 	DPRINTFN(1, "%s: acl_mask %4.4x\n",
980 		device_xname(unit->hci_dev), unit->hci_acl_mask);
981 
982 	unit->hci_packet_type = unit->hci_acl_mask;
983 
984 	/* SCO packet mask */
985 	unit->hci_sco_mask = 0;
986 	if (rp.features[1] & HCI_LMP_SCO_LINK)
987 		unit->hci_sco_mask |= HCI_PKT_HV1;
988 
989 	if (rp.features[1] & HCI_LMP_HV2_PKT)
990 		unit->hci_sco_mask |= HCI_PKT_HV2;
991 
992 	if (rp.features[1] & HCI_LMP_HV3_PKT)
993 		unit->hci_sco_mask |= HCI_PKT_HV3;
994 
995 	if (rp.features[3] & HCI_LMP_EV3_PKT)
996 		unit->hci_sco_mask |= HCI_PKT_EV3;
997 
998 	if (rp.features[4] & HCI_LMP_EV4_PKT)
999 		unit->hci_sco_mask |= HCI_PKT_EV4;
1000 
1001 	if (rp.features[4] & HCI_LMP_EV5_PKT)
1002 		unit->hci_sco_mask |= HCI_PKT_EV5;
1003 
1004 	/* XXX what do 2MBPS/3MBPS/3SLOT eSCO mean? */
1005 
1006 	DPRINTFN(1, "%s: sco_mask %4.4x\n",
1007 		device_xname(unit->hci_dev), unit->hci_sco_mask);
1008 
1009 	/* extended feature masks */
1010 	if (rp.features[7] & HCI_LMP_EXTENDED_FEATURES) {
1011 		hci_read_local_extended_features_cp cp;
1012 
1013 		cp.page = 0;
1014 		hci_send_cmd(unit, HCI_CMD_READ_LOCAL_EXTENDED_FEATURES,
1015 		    &cp, sizeof(cp));
1016 
1017 		return;
1018 	}
1019 
1020 	unit->hci_flags &= ~BTF_INIT_FEATURES;
1021 	cv_broadcast(&unit->hci_init);
1022 }
1023 
1024 /*
1025  * process results of read_local_extended_features command_complete event
1026  */
1027 static void
1028 hci_cmd_read_local_extended_features(struct hci_unit *unit, struct mbuf *m)
1029 {
1030 	hci_read_local_extended_features_rp rp;
1031 
1032 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
1033 	m_copydata(m, 0, sizeof(rp), &rp);
1034 	m_adj(m, sizeof(rp));
1035 
1036 	if (rp.status > 0)
1037 		return;
1038 
1039 	if ((unit->hci_flags & BTF_INIT_FEATURES) == 0)
1040 		return;
1041 
1042 	DPRINTFN(1, "%s: page %d of %d\n", device_xname(unit->hci_dev),
1043 	    rp.page, rp.max_page);
1044 
1045 	switch (rp.page) {
1046 	case 1:
1047 		memcpy(unit->hci_feat1, rp.features, HCI_FEATURES_SIZE);
1048 		break;
1049 
1050 	case 0:	/* (already handled) */
1051 	default:
1052 		break;
1053 	}
1054 
1055 	if (rp.page < rp.max_page) {
1056 		hci_read_local_extended_features_cp cp;
1057 
1058 		cp.page = rp.page + 1;
1059 		hci_send_cmd(unit, HCI_CMD_READ_LOCAL_EXTENDED_FEATURES,
1060 		    &cp, sizeof(cp));
1061 
1062 		return;
1063 	}
1064 
1065 	unit->hci_flags &= ~BTF_INIT_FEATURES;
1066 	cv_broadcast(&unit->hci_init);
1067 }
1068 
1069 /*
1070  * process results of read_local_ver command_complete event
1071  *
1072  * reading local supported commands is only supported from 1.2 spec
1073  */
1074 static void
1075 hci_cmd_read_local_ver(struct hci_unit *unit, struct mbuf *m)
1076 {
1077 	hci_read_local_ver_rp rp;
1078 
1079 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
1080 	m_copydata(m, 0, sizeof(rp), &rp);
1081 	m_adj(m, sizeof(rp));
1082 
1083 	if (rp.status != 0)
1084 		return;
1085 
1086 	if ((unit->hci_flags & BTF_INIT_COMMANDS) == 0)
1087 		return;
1088 
1089 	if (rp.hci_version < HCI_SPEC_V12) {
1090 		unit->hci_flags &= ~BTF_INIT_COMMANDS;
1091 		cv_broadcast(&unit->hci_init);
1092 		return;
1093 	}
1094 
1095 	hci_send_cmd(unit, HCI_CMD_READ_LOCAL_COMMANDS, NULL, 0);
1096 }
1097 
1098 /*
1099  * process results of read_local_commands command_complete event
1100  */
1101 static void
1102 hci_cmd_read_local_commands(struct hci_unit *unit, struct mbuf *m)
1103 {
1104 	hci_read_local_commands_rp rp;
1105 
1106 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
1107 	m_copydata(m, 0, sizeof(rp), &rp);
1108 	m_adj(m, sizeof(rp));
1109 
1110 	if (rp.status != 0)
1111 		return;
1112 
1113 	if ((unit->hci_flags & BTF_INIT_COMMANDS) == 0)
1114 		return;
1115 
1116 	unit->hci_flags &= ~BTF_INIT_COMMANDS;
1117 	memcpy(unit->hci_cmds, rp.commands, HCI_COMMANDS_SIZE);
1118 
1119 	cv_broadcast(&unit->hci_init);
1120 }
1121 
1122 /*
1123  * process results of reset command_complete event
1124  *
1125  * This has killed all the connections, so close down anything we have left,
1126  * and reinitialise the unit.
1127  */
1128 static void
1129 hci_cmd_reset(struct hci_unit *unit, struct mbuf *m)
1130 {
1131 	hci_reset_rp rp;
1132 	struct hci_link *link, *next;
1133 	int acl;
1134 
1135 	KASSERT(m->m_pkthdr.len >= sizeof(rp));
1136 	m_copydata(m, 0, sizeof(rp), &rp);
1137 	m_adj(m, sizeof(rp));
1138 
1139 	if (rp.status != 0)
1140 		return;
1141 
1142 	/*
1143 	 * release SCO links first, since they may be holding
1144 	 * an ACL link reference.
1145 	 */
1146 	for (acl = 0 ; acl < 2 ; acl++) {
1147 		next = TAILQ_FIRST(&unit->hci_links);
1148 		while ((link = next) != NULL) {
1149 			next = TAILQ_NEXT(link, hl_next);
1150 			if (acl || link->hl_type != HCI_LINK_ACL)
1151 				hci_link_free(link, ECONNABORTED);
1152 		}
1153 	}
1154 
1155 	unit->hci_num_acl_pkts = 0;
1156 	unit->hci_num_sco_pkts = 0;
1157 
1158 	if (hci_send_cmd(unit, HCI_CMD_READ_BDADDR, NULL, 0))
1159 		return;
1160 
1161 	if (hci_send_cmd(unit, HCI_CMD_READ_BUFFER_SIZE, NULL, 0))
1162 		return;
1163 
1164 	if (hci_send_cmd(unit, HCI_CMD_READ_LOCAL_FEATURES, NULL, 0))
1165 		return;
1166 
1167 	if (hci_send_cmd(unit, HCI_CMD_READ_LOCAL_VER, NULL, 0))
1168 		return;
1169 }
1170 
1171 /*
1172  * process command_status event for create_con command
1173  *
1174  * a "Create Connection" command can sometimes fail to start for whatever
1175  * reason and the command_status event returns failure but we get no
1176  * indication of which connection failed (for instance in the case where
1177  * we tried to open too many connections all at once) So, we keep a flag
1178  * on the link to indicate pending status until the command_status event
1179  * is returned to help us decide which needs to be failed.
1180  *
1181  * since created links are inserted at the tail of hci_links, we know that
1182  * the first pending link we find will be the one that this command status
1183  * refers to.
1184  */
1185 static void
1186 hci_cmd_create_con(struct hci_unit *unit, uint8_t status)
1187 {
1188 	struct hci_link *link;
1189 
1190 	TAILQ_FOREACH(link, &unit->hci_links, hl_next) {
1191 		if ((link->hl_flags & HCI_LINK_CREATE_CON) == 0)
1192 			continue;
1193 
1194 		link->hl_flags &= ~HCI_LINK_CREATE_CON;
1195 
1196 		switch(status) {
1197 		case 0x00:	/* success */
1198 			break;
1199 
1200 		case 0x0c:	/* "Command Disallowed" */
1201 			hci_link_free(link, EBUSY);
1202 			break;
1203 
1204 		default:	/* some other trouble */
1205 			hci_link_free(link, EPROTO);
1206 			break;
1207 		}
1208 
1209 		return;
1210 	}
1211 }
1212