]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/bluetooth/hci_conn.c
Bluetooth: Add support connectable advertising setting
[mirror_ubuntu-zesty-kernel.git] / net / bluetooth / hci_conn.c
CommitLineData
8e87d142 1/*
1da177e4 2 BlueZ - Bluetooth protocol stack for Linux
2d0a0346 3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
1da177e4
LT
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI connection handling. */
26
8c520a59 27#include <linux/export.h>
23b9ceb7 28#include <linux/debugfs.h>
1da177e4
LT
29
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
4bc58f51 32#include <net/bluetooth/l2cap.h>
1da177e4 33
0857dd3b 34#include "hci_request.h"
ac4b7236 35#include "smp.h"
7024728e
MH
36#include "a2mp.h"
37
2dea632f
FD
38struct sco_param {
39 u16 pkt_type;
40 u16 max_latency;
c7da5797 41 u8 retrans_effort;
2dea632f
FD
42};
43
48e68ff5 44static const struct sco_param esco_param_cvsd[] = {
c7da5797
JH
45 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000a, 0x01 }, /* S3 */
46 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x0007, 0x01 }, /* S2 */
47 { EDR_ESCO_MASK | ESCO_EV3, 0x0007, 0x01 }, /* S1 */
48 { EDR_ESCO_MASK | ESCO_HV3, 0xffff, 0x01 }, /* D1 */
49 { EDR_ESCO_MASK | ESCO_HV1, 0xffff, 0x01 }, /* D0 */
2dea632f
FD
50};
51
48e68ff5 52static const struct sco_param sco_param_cvsd[] = {
c7da5797
JH
53 { EDR_ESCO_MASK | ESCO_HV3, 0xffff, 0xff }, /* D1 */
54 { EDR_ESCO_MASK | ESCO_HV1, 0xffff, 0xff }, /* D0 */
48e68ff5
BT
55};
56
565766b0 57static const struct sco_param esco_param_msbc[] = {
c7da5797
JH
58 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000d, 0x02 }, /* T2 */
59 { EDR_ESCO_MASK | ESCO_EV3, 0x0008, 0x02 }, /* T1 */
2dea632f
FD
60};
61
1aef8669 62static void hci_le_create_connection_cancel(struct hci_conn *conn)
fcd89c09
VT
63{
64 hci_send_cmd(conn->hdev, HCI_OP_LE_CREATE_CONN_CANCEL, 0, NULL);
65}
66
1aef8669 67static void hci_acl_create_connection(struct hci_conn *conn)
1da177e4
LT
68{
69 struct hci_dev *hdev = conn->hdev;
70 struct inquiry_entry *ie;
71 struct hci_cp_create_conn cp;
72
42d2d87c 73 BT_DBG("hcon %p", conn);
1da177e4
LT
74
75 conn->state = BT_CONNECT;
a0c808b3 76 conn->out = true;
40bef302 77 conn->role = HCI_ROLE_MASTER;
1da177e4 78
4c67bc74
MH
79 conn->attempt++;
80
e4e8e37c
MH
81 conn->link_policy = hdev->link_policy;
82
1da177e4
LT
83 memset(&cp, 0, sizeof(cp));
84 bacpy(&cp.bdaddr, &conn->dst);
85 cp.pscan_rep_mode = 0x02;
86
70f23020
AE
87 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
88 if (ie) {
41a96212
MH
89 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
90 cp.pscan_rep_mode = ie->data.pscan_rep_mode;
91 cp.pscan_mode = ie->data.pscan_mode;
92 cp.clock_offset = ie->data.clock_offset |
dcf4adbf 93 cpu_to_le16(0x8000);
41a96212
MH
94 }
95
1da177e4 96 memcpy(conn->dev_class, ie->data.dev_class, 3);
58a681ef
JH
97 if (ie->data.ssp_mode > 0)
98 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
1da177e4
LT
99 }
100
a8746417 101 cp.pkt_type = cpu_to_le16(conn->pkt_type);
1da177e4 102 if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
b6a0dc82 103 cp.role_switch = 0x01;
1da177e4 104 else
b6a0dc82 105 cp.role_switch = 0x00;
4c67bc74 106
a9de9248 107 hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
1da177e4
LT
108}
109
1aef8669 110static void hci_acl_create_connection_cancel(struct hci_conn *conn)
6ac59344
MH
111{
112 struct hci_cp_create_conn_cancel cp;
113
38b3fef1 114 BT_DBG("hcon %p", conn);
6ac59344 115
d095c1eb 116 if (conn->hdev->hci_ver < BLUETOOTH_VER_1_2)
6ac59344
MH
117 return;
118
119 bacpy(&cp.bdaddr, &conn->dst);
a9de9248 120 hci_send_cmd(conn->hdev, HCI_OP_CREATE_CONN_CANCEL, sizeof(cp), &cp);
6ac59344
MH
121}
122
93796fa6
CT
123static void hci_reject_sco(struct hci_conn *conn)
124{
125 struct hci_cp_reject_sync_conn_req cp;
126
d41c15cf 127 cp.reason = HCI_ERROR_REJ_LIMITED_RESOURCES;
93796fa6
CT
128 bacpy(&cp.bdaddr, &conn->dst);
129
130 hci_send_cmd(conn->hdev, HCI_OP_REJECT_SYNC_CONN_REQ, sizeof(cp), &cp);
131}
132
e3b679d5 133int hci_disconnect(struct hci_conn *conn, __u8 reason)
1da177e4
LT
134{
135 struct hci_cp_disconnect cp;
136
38b3fef1 137 BT_DBG("hcon %p", conn);
1da177e4 138
839035a7
JH
139 /* When we are master of an established connection and it enters
140 * the disconnect timeout, then go ahead and try to read the
141 * current clock offset. Processing of the result is done
142 * within the event handling and hci_clock_offset_evt function.
143 */
144 if (conn->type == ACL_LINK && conn->role == HCI_ROLE_MASTER) {
145 struct hci_dev *hdev = conn->hdev;
4f639ede 146 struct hci_cp_read_clock_offset clkoff_cp;
839035a7 147
4f639ede
FF
148 clkoff_cp.handle = cpu_to_le16(conn->handle);
149 hci_send_cmd(hdev, HCI_OP_READ_CLOCK_OFFSET, sizeof(clkoff_cp),
150 &clkoff_cp);
839035a7
JH
151 }
152
1da177e4
LT
153 conn->state = BT_DISCONN;
154
aca3192c 155 cp.handle = cpu_to_le16(conn->handle);
1da177e4 156 cp.reason = reason;
e3b679d5 157 return hci_send_cmd(conn->hdev, HCI_OP_DISCONNECT, sizeof(cp), &cp);
1da177e4
LT
158}
159
a2b1976b 160static void hci_amp_disconn(struct hci_conn *conn)
53502d69
AE
161{
162 struct hci_cp_disconn_phy_link cp;
163
164 BT_DBG("hcon %p", conn);
165
166 conn->state = BT_DISCONN;
167
168 cp.phy_handle = HCI_PHY_HANDLE(conn->handle);
a2b1976b 169 cp.reason = hci_proto_disconn_ind(conn);
53502d69
AE
170 hci_send_cmd(conn->hdev, HCI_OP_DISCONN_PHY_LINK,
171 sizeof(cp), &cp);
172}
173
57f5d0d1 174static void hci_add_sco(struct hci_conn *conn, __u16 handle)
1da177e4
LT
175{
176 struct hci_dev *hdev = conn->hdev;
177 struct hci_cp_add_sco cp;
178
38b3fef1 179 BT_DBG("hcon %p", conn);
1da177e4
LT
180
181 conn->state = BT_CONNECT;
a0c808b3 182 conn->out = true;
1da177e4 183
efc7688b
MH
184 conn->attempt++;
185
aca3192c 186 cp.handle = cpu_to_le16(handle);
a8746417 187 cp.pkt_type = cpu_to_le16(conn->pkt_type);
1da177e4 188
a9de9248 189 hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
1da177e4
LT
190}
191
2dea632f 192bool hci_setup_sync(struct hci_conn *conn, __u16 handle)
b6a0dc82
MH
193{
194 struct hci_dev *hdev = conn->hdev;
195 struct hci_cp_setup_sync_conn cp;
2dea632f 196 const struct sco_param *param;
b6a0dc82 197
38b3fef1 198 BT_DBG("hcon %p", conn);
b6a0dc82
MH
199
200 conn->state = BT_CONNECT;
a0c808b3 201 conn->out = true;
b6a0dc82 202
efc7688b
MH
203 conn->attempt++;
204
b6a0dc82 205 cp.handle = cpu_to_le16(handle);
b6a0dc82 206
dcf4adbf
JP
207 cp.tx_bandwidth = cpu_to_le32(0x00001f40);
208 cp.rx_bandwidth = cpu_to_le32(0x00001f40);
10c62ddc
FD
209 cp.voice_setting = cpu_to_le16(conn->setting);
210
211 switch (conn->setting & SCO_AIRMODE_MASK) {
212 case SCO_AIRMODE_TRANSP:
565766b0 213 if (conn->attempt > ARRAY_SIZE(esco_param_msbc))
2dea632f 214 return false;
565766b0 215 param = &esco_param_msbc[conn->attempt - 1];
10c62ddc
FD
216 break;
217 case SCO_AIRMODE_CVSD:
48e68ff5
BT
218 if (lmp_esco_capable(conn->link)) {
219 if (conn->attempt > ARRAY_SIZE(esco_param_cvsd))
220 return false;
48e68ff5
BT
221 param = &esco_param_cvsd[conn->attempt - 1];
222 } else {
223 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
224 return false;
48e68ff5
BT
225 param = &sco_param_cvsd[conn->attempt - 1];
226 }
10c62ddc 227 break;
2dea632f
FD
228 default:
229 return false;
10c62ddc 230 }
b6a0dc82 231
c7da5797 232 cp.retrans_effort = param->retrans_effort;
2dea632f
FD
233 cp.pkt_type = __cpu_to_le16(param->pkt_type);
234 cp.max_latency = __cpu_to_le16(param->max_latency);
235
236 if (hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp) < 0)
237 return false;
238
239 return true;
b6a0dc82
MH
240}
241
7d6ca693
JH
242u8 hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max, u16 latency,
243 u16 to_multiplier)
2ce603eb 244{
2ce603eb 245 struct hci_dev *hdev = conn->hdev;
f044eb05
MH
246 struct hci_conn_params *params;
247 struct hci_cp_le_conn_update cp;
2ce603eb 248
f044eb05 249 hci_dev_lock(hdev);
2ce603eb 250
f044eb05
MH
251 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
252 if (params) {
253 params->conn_min_interval = min;
254 params->conn_max_interval = max;
255 params->conn_latency = latency;
256 params->supervision_timeout = to_multiplier;
257 }
258
259 hci_dev_unlock(hdev);
260
261 memset(&cp, 0, sizeof(cp));
2ce603eb
CT
262 cp.handle = cpu_to_le16(conn->handle);
263 cp.conn_interval_min = cpu_to_le16(min);
264 cp.conn_interval_max = cpu_to_le16(max);
265 cp.conn_latency = cpu_to_le16(latency);
266 cp.supervision_timeout = cpu_to_le16(to_multiplier);
dcf4adbf
JP
267 cp.min_ce_len = cpu_to_le16(0x0000);
268 cp.max_ce_len = cpu_to_le16(0x0000);
2ce603eb
CT
269
270 hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
7d6ca693
JH
271
272 if (params)
273 return 0x01;
274
275 return 0x00;
2ce603eb 276}
2ce603eb 277
fe39c7b2 278void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __le64 rand,
5974e4c4 279 __u8 ltk[16])
a7a595f6
VCG
280{
281 struct hci_dev *hdev = conn->hdev;
282 struct hci_cp_le_start_enc cp;
283
38b3fef1 284 BT_DBG("hcon %p", conn);
a7a595f6
VCG
285
286 memset(&cp, 0, sizeof(cp));
287
288 cp.handle = cpu_to_le16(conn->handle);
fe39c7b2 289 cp.rand = rand;
a7a595f6 290 cp.ediv = ediv;
fe39c7b2 291 memcpy(cp.ltk, ltk, sizeof(cp.ltk));
a7a595f6
VCG
292
293 hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
294}
a7a595f6 295
e73439d8
MH
296/* Device _must_ be locked */
297void hci_sco_setup(struct hci_conn *conn, __u8 status)
298{
299 struct hci_conn *sco = conn->link;
300
e73439d8
MH
301 if (!sco)
302 return;
303
38b3fef1
AE
304 BT_DBG("hcon %p", conn);
305
e73439d8
MH
306 if (!status) {
307 if (lmp_esco_capable(conn->hdev))
308 hci_setup_sync(sco, conn->handle);
309 else
310 hci_add_sco(sco, conn->handle);
311 } else {
539c496d 312 hci_connect_cfm(sco, status);
e73439d8
MH
313 hci_conn_del(sco);
314 }
315}
316
19c40e3b 317static void hci_conn_timeout(struct work_struct *work)
1da177e4 318{
19c40e3b 319 struct hci_conn *conn = container_of(work, struct hci_conn,
5974e4c4 320 disc_work.work);
1d56dc4f 321 int refcnt = atomic_read(&conn->refcnt);
1da177e4 322
38b3fef1 323 BT_DBG("hcon %p state %s", conn, state_to_string(conn->state));
1da177e4 324
1d56dc4f
LR
325 WARN_ON(refcnt < 0);
326
327 /* FIXME: It was observed that in pairing failed scenario, refcnt
328 * drops below 0. Probably this is because l2cap_conn_del calls
329 * l2cap_chan_del for each channel, and inside l2cap_chan_del conn is
330 * dropped. After that loop hci_chan_del is called which also drops
331 * conn. For now make sure that ACL is alive if refcnt is higher then 0,
332 * otherwise drop it.
333 */
334 if (refcnt > 0)
1da177e4
LT
335 return;
336
6ac59344
MH
337 switch (conn->state) {
338 case BT_CONNECT:
769be974 339 case BT_CONNECT2:
fcd89c09
VT
340 if (conn->out) {
341 if (conn->type == ACL_LINK)
1aef8669 342 hci_acl_create_connection_cancel(conn);
fcd89c09 343 else if (conn->type == LE_LINK)
1aef8669 344 hci_le_create_connection_cancel(conn);
93796fa6
CT
345 } else if (conn->type == SCO_LINK || conn->type == ESCO_LINK) {
346 hci_reject_sco(conn);
fcd89c09 347 }
6ac59344 348 break;
769be974 349 case BT_CONFIG:
8e87d142 350 case BT_CONNECTED:
40051e46
MH
351 if (conn->type == AMP_LINK) {
352 hci_amp_disconn(conn);
353 } else {
354 __u8 reason = hci_proto_disconn_ind(conn);
355 hci_disconnect(conn, reason);
356 }
6ac59344
MH
357 break;
358 default:
1da177e4 359 conn->state = BT_CLOSED;
6ac59344
MH
360 break;
361 }
1da177e4
LT
362}
363
416dc94b 364/* Enter sniff mode */
a74a84f6 365static void hci_conn_idle(struct work_struct *work)
416dc94b 366{
a74a84f6
JH
367 struct hci_conn *conn = container_of(work, struct hci_conn,
368 idle_work.work);
416dc94b
GP
369 struct hci_dev *hdev = conn->hdev;
370
38b3fef1 371 BT_DBG("hcon %p mode %d", conn, conn->mode);
416dc94b 372
416dc94b
GP
373 if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
374 return;
375
376 if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
377 return;
378
379 if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
380 struct hci_cp_sniff_subrate cp;
381 cp.handle = cpu_to_le16(conn->handle);
dcf4adbf
JP
382 cp.max_latency = cpu_to_le16(0);
383 cp.min_remote_timeout = cpu_to_le16(0);
384 cp.min_local_timeout = cpu_to_le16(0);
416dc94b
GP
385 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
386 }
387
51a8efd7 388 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
416dc94b
GP
389 struct hci_cp_sniff_mode cp;
390 cp.handle = cpu_to_le16(conn->handle);
391 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
392 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
dcf4adbf
JP
393 cp.attempt = cpu_to_le16(4);
394 cp.timeout = cpu_to_le16(1);
416dc94b
GP
395 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
396 }
397}
398
7bc18d9d 399static void hci_conn_auto_accept(struct work_struct *work)
9f61656a 400{
7bc18d9d
JH
401 struct hci_conn *conn = container_of(work, struct hci_conn,
402 auto_accept_work.work);
9f61656a 403
7bc18d9d 404 hci_send_cmd(conn->hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
5974e4c4 405 &conn->dst);
9f61656a
JH
406}
407
9489eca4
JH
408static void le_conn_timeout(struct work_struct *work)
409{
410 struct hci_conn *conn = container_of(work, struct hci_conn,
411 le_conn_timeout.work);
3c857757 412 struct hci_dev *hdev = conn->hdev;
9489eca4
JH
413
414 BT_DBG("");
415
3c857757
JH
416 /* We could end up here due to having done directed advertising,
417 * so clean up the state if necessary. This should however only
418 * happen with broken hardware or if low duty cycle was used
419 * (which doesn't have a timeout of its own).
420 */
0b1db38c 421 if (conn->role == HCI_ROLE_SLAVE) {
3c857757
JH
422 u8 enable = 0x00;
423 hci_send_cmd(hdev, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable),
424 &enable);
425 hci_le_conn_failed(conn, HCI_ERROR_ADVERTISING_TIMEOUT);
426 return;
427 }
428
9489eca4
JH
429 hci_le_create_connection_cancel(conn);
430}
431
a5c4e309
JH
432struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst,
433 u8 role)
1da177e4
LT
434{
435 struct hci_conn *conn;
436
6ed93dc6 437 BT_DBG("%s dst %pMR", hdev->name, dst);
1da177e4 438
27f70f3e 439 conn = kzalloc(sizeof(*conn), GFP_KERNEL);
04837f64 440 if (!conn)
1da177e4 441 return NULL;
1da177e4
LT
442
443 bacpy(&conn->dst, dst);
662e8820 444 bacpy(&conn->src, &hdev->bdaddr);
a8746417
MH
445 conn->hdev = hdev;
446 conn->type = type;
a5c4e309 447 conn->role = role;
a8746417
MH
448 conn->mode = HCI_CM_ACTIVE;
449 conn->state = BT_OPEN;
93f19c9f 450 conn->auth_type = HCI_AT_GENERAL_BONDING;
17fa4b9d 451 conn->io_capability = hdev->io_capability;
a9583556 452 conn->remote_auth = 0xff;
13d39315 453 conn->key_type = 0xff;
ebf86aa3 454 conn->rssi = HCI_RSSI_INVALID;
5a134fae 455 conn->tx_power = HCI_TX_POWER_INVALID;
d0455ed9 456 conn->max_tx_power = HCI_TX_POWER_INVALID;
1da177e4 457
58a681ef 458 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
052b30b0 459 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
04837f64 460
a5c4e309
JH
461 if (conn->role == HCI_ROLE_MASTER)
462 conn->out = true;
463
a8746417
MH
464 switch (type) {
465 case ACL_LINK:
466 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
467 break;
9c84d1da
JH
468 case LE_LINK:
469 /* conn->src should reflect the local identity address */
470 hci_copy_identity_address(hdev, &conn->src, &conn->src_type);
471 break;
a8746417
MH
472 case SCO_LINK:
473 if (lmp_esco_capable(hdev))
efc7688b
MH
474 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
475 (hdev->esco_type & EDR_ESCO_MASK);
a8746417
MH
476 else
477 conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
478 break;
479 case ESCO_LINK:
efc7688b 480 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
a8746417
MH
481 break;
482 }
483
1da177e4 484 skb_queue_head_init(&conn->data_q);
04837f64 485
70c1f20b 486 INIT_LIST_HEAD(&conn->chan_list);
73d80deb 487
19c40e3b 488 INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
7bc18d9d 489 INIT_DELAYED_WORK(&conn->auto_accept_work, hci_conn_auto_accept);
a74a84f6 490 INIT_DELAYED_WORK(&conn->idle_work, hci_conn_idle);
9489eca4 491 INIT_DELAYED_WORK(&conn->le_conn_timeout, le_conn_timeout);
1da177e4
LT
492
493 atomic_set(&conn->refcnt, 0);
494
495 hci_dev_hold(hdev);
496
1da177e4 497 hci_conn_hash_add(hdev, conn);
3c54711c 498 if (hdev->notify)
1da177e4
LT
499 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
500
a67e899c
MH
501 hci_conn_init_sysfs(conn);
502
1da177e4
LT
503 return conn;
504}
505
506int hci_conn_del(struct hci_conn *conn)
507{
508 struct hci_dev *hdev = conn->hdev;
509
38b3fef1 510 BT_DBG("%s hcon %p handle %d", hdev->name, conn, conn->handle);
1da177e4 511
19c40e3b 512 cancel_delayed_work_sync(&conn->disc_work);
7bc18d9d 513 cancel_delayed_work_sync(&conn->auto_accept_work);
a74a84f6 514 cancel_delayed_work_sync(&conn->idle_work);
9f61656a 515
5b7f9909 516 if (conn->type == ACL_LINK) {
1da177e4
LT
517 struct hci_conn *sco = conn->link;
518 if (sco)
519 sco->link = NULL;
520
521 /* Unacked frames */
522 hdev->acl_cnt += conn->sent;
6ed58ec5 523 } else if (conn->type == LE_LINK) {
980ffc0a 524 cancel_delayed_work(&conn->le_conn_timeout);
9489eca4 525
6ed58ec5
VT
526 if (hdev->le_pkts)
527 hdev->le_cnt += conn->sent;
528 else
529 hdev->acl_cnt += conn->sent;
5b7f9909
MH
530 } else {
531 struct hci_conn *acl = conn->link;
532 if (acl) {
533 acl->link = NULL;
76a68ba0 534 hci_conn_drop(acl);
5b7f9909 535 }
1da177e4
LT
536 }
537
2c33c06a 538 hci_chan_list_flush(conn);
73d80deb 539
9740e49d
AE
540 if (conn->amp_mgr)
541 amp_mgr_put(conn->amp_mgr);
542
1da177e4 543 hci_conn_hash_del(hdev, conn);
3c54711c 544 if (hdev->notify)
1da177e4 545 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
7d0db0a3 546
1da177e4 547 skb_queue_purge(&conn->data_q);
1da177e4 548
fc225c3f 549 hci_conn_del_sysfs(conn);
2ae9a6be 550
23b9ceb7
MH
551 debugfs_remove_recursive(conn->debugfs);
552
89cbb063
AA
553 if (test_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags))
554 hci_conn_params_del(conn->hdev, &conn->dst, conn->dst_type);
555
384943ec
MH
556 hci_dev_put(hdev);
557
8d12356f 558 hci_conn_put(conn);
163f4dab 559
1da177e4
LT
560 return 0;
561}
562
563struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src)
564{
565 int use_src = bacmp(src, BDADDR_ANY);
8035ded4 566 struct hci_dev *hdev = NULL, *d;
1da177e4 567
6ed93dc6 568 BT_DBG("%pMR -> %pMR", src, dst);
1da177e4 569
f20d09d5 570 read_lock(&hci_dev_list_lock);
1da177e4 571
8035ded4 572 list_for_each_entry(d, &hci_dev_list, list) {
8fc9ced3 573 if (!test_bit(HCI_UP, &d->flags) ||
af750e94 574 test_bit(HCI_USER_CHANNEL, &d->dev_flags) ||
d300fa9b 575 d->dev_type != HCI_BREDR)
1da177e4
LT
576 continue;
577
8e87d142 578 /* Simple routing:
1da177e4
LT
579 * No source address - find interface with bdaddr != dst
580 * Source address - find interface with bdaddr == src
581 */
582
583 if (use_src) {
584 if (!bacmp(&d->bdaddr, src)) {
585 hdev = d; break;
586 }
587 } else {
588 if (bacmp(&d->bdaddr, dst)) {
589 hdev = d; break;
590 }
591 }
592 }
593
594 if (hdev)
595 hdev = hci_dev_hold(hdev);
596
f20d09d5 597 read_unlock(&hci_dev_list_lock);
1da177e4
LT
598 return hdev;
599}
600EXPORT_SYMBOL(hci_get_route);
601
9bb3c01f 602/* This function requires the caller holds hdev->lock */
06c053fb 603void hci_le_conn_failed(struct hci_conn *conn, u8 status)
9bb3c01f
AG
604{
605 struct hci_dev *hdev = conn->hdev;
f161dd41
JH
606 struct hci_conn_params *params;
607
608 params = hci_pend_le_action_lookup(&hdev->pend_le_conns, &conn->dst,
609 conn->dst_type);
610 if (params && params->conn) {
611 hci_conn_drop(params->conn);
f8aaf9b6 612 hci_conn_put(params->conn);
f161dd41
JH
613 params->conn = NULL;
614 }
9bb3c01f
AG
615
616 conn->state = BT_CLOSED;
617
618 mgmt_connect_failed(hdev, &conn->dst, conn->type, conn->dst_type,
619 status);
620
539c496d 621 hci_connect_cfm(conn, status);
9bb3c01f
AG
622
623 hci_conn_del(conn);
a4790dbd
AG
624
625 /* Since we may have temporarily stopped the background scanning in
626 * favor of connection establishment, we should restart it.
627 */
628 hci_update_background_scan(hdev);
3c857757
JH
629
630 /* Re-enable advertising in case this was a failed connection
631 * attempt as a peripheral.
632 */
633 mgmt_reenable_advertising(hdev);
9bb3c01f
AG
634}
635
1904a853 636static void create_le_conn_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1d399ae5
AG
637{
638 struct hci_conn *conn;
639
640 if (status == 0)
641 return;
642
643 BT_ERR("HCI request failed to create LE connection: status 0x%2.2x",
644 status);
645
646 hci_dev_lock(hdev);
647
648 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
649 if (!conn)
650 goto done;
651
06c053fb 652 hci_le_conn_failed(conn, status);
1d399ae5
AG
653
654done:
655 hci_dev_unlock(hdev);
656}
657
2acf3d90
AG
658static void hci_req_add_le_create_conn(struct hci_request *req,
659 struct hci_conn *conn)
660{
661 struct hci_cp_le_create_conn cp;
662 struct hci_dev *hdev = conn->hdev;
663 u8 own_addr_type;
664
665 memset(&cp, 0, sizeof(cp));
666
667 /* Update random address, but set require_privacy to false so
9437d2ed 668 * that we never connect with an non-resolvable address.
2acf3d90
AG
669 */
670 if (hci_update_random_address(req, false, &own_addr_type))
671 return;
672
2acf3d90
AG
673 cp.scan_interval = cpu_to_le16(hdev->le_scan_interval);
674 cp.scan_window = cpu_to_le16(hdev->le_scan_window);
675 bacpy(&cp.peer_addr, &conn->dst);
676 cp.peer_addr_type = conn->dst_type;
677 cp.own_address_type = own_addr_type;
678 cp.conn_interval_min = cpu_to_le16(conn->le_conn_min_interval);
679 cp.conn_interval_max = cpu_to_le16(conn->le_conn_max_interval);
037fc415
MH
680 cp.conn_latency = cpu_to_le16(conn->le_conn_latency);
681 cp.supervision_timeout = cpu_to_le16(conn->le_supv_timeout);
dcf4adbf
JP
682 cp.min_ce_len = cpu_to_le16(0x0000);
683 cp.max_ce_len = cpu_to_le16(0x0000);
2acf3d90
AG
684
685 hci_req_add(req, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
b46e0030
JH
686
687 conn->state = BT_CONNECT;
2acf3d90
AG
688}
689
3c857757
JH
690static void hci_req_directed_advertising(struct hci_request *req,
691 struct hci_conn *conn)
692{
693 struct hci_dev *hdev = req->hdev;
694 struct hci_cp_le_set_adv_param cp;
695 u8 own_addr_type;
696 u8 enable;
697
5ce194c4 698 /* Clear the HCI_LE_ADV bit temporarily so that the
3c857757
JH
699 * hci_update_random_address knows that it's safe to go ahead
700 * and write a new random address. The flag will be set back on
701 * as soon as the SET_ADV_ENABLE HCI command completes.
702 */
5ce194c4 703 clear_bit(HCI_LE_ADV, &hdev->dev_flags);
3c857757
JH
704
705 /* Set require_privacy to false so that the remote device has a
706 * chance of identifying us.
707 */
708 if (hci_update_random_address(req, false, &own_addr_type) < 0)
709 return;
710
711 memset(&cp, 0, sizeof(cp));
712 cp.type = LE_ADV_DIRECT_IND;
713 cp.own_address_type = own_addr_type;
714 cp.direct_addr_type = conn->dst_type;
715 bacpy(&cp.direct_addr, &conn->dst);
716 cp.channel_map = hdev->le_adv_channel_map;
717
718 hci_req_add(req, HCI_OP_LE_SET_ADV_PARAM, sizeof(cp), &cp);
719
720 enable = 0x01;
721 hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
722
723 conn->state = BT_CONNECT;
724}
725
04a6c589 726struct hci_conn *hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst,
cdd6275e 727 u8 dst_type, u8 sec_level, u16 conn_timeout,
e804d25d 728 u8 role)
1da177e4 729{
4292f1f3 730 struct hci_conn_params *params;
f1e5d547 731 struct hci_conn *conn;
1ebfcc1f 732 struct smp_irk *irk;
2acf3d90 733 struct hci_request req;
1d399ae5 734 int err;
1da177e4 735
152d386e
LR
736 /* Let's make sure that le is enabled.*/
737 if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
738 if (lmp_le_capable(hdev))
739 return ERR_PTR(-ECONNREFUSED);
740
741 return ERR_PTR(-EOPNOTSUPP);
742 }
743
620ad521
AG
744 /* Some devices send ATT messages as soon as the physical link is
745 * established. To be able to handle these ATT messages, the user-
746 * space first establishes the connection and then starts the pairing
747 * process.
748 *
749 * So if a hci_conn object already exists for the following connection
750 * attempt, we simply update pending_sec_level and auth_type fields
751 * and return the object found.
752 */
f1e5d547 753 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, dst);
620ad521
AG
754 if (conn) {
755 conn->pending_sec_level = sec_level;
620ad521
AG
756 goto done;
757 }
dfc94dbd 758
620ad521
AG
759 /* Since the controller supports only one LE connection attempt at a
760 * time, we return -EBUSY if there is any connection attempt running.
761 */
762 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
763 if (conn)
764 return ERR_PTR(-EBUSY);
46a190cb 765
edb4b466
MH
766 /* When given an identity address with existing identity
767 * resolving key, the connection needs to be established
768 * to a resolvable random address.
769 *
770 * This uses the cached random resolvable address from
771 * a previous scan. When no cached address is available,
772 * try connecting to the identity address instead.
773 *
774 * Storing the resolvable random address is required here
775 * to handle connection failures. The address will later
776 * be resolved back into the original identity address
777 * from the connect request.
778 */
1ebfcc1f
JH
779 irk = hci_find_irk_by_addr(hdev, dst, dst_type);
780 if (irk && bacmp(&irk->rpa, BDADDR_ANY)) {
781 dst = &irk->rpa;
782 dst_type = ADDR_LE_DEV_RANDOM;
783 }
784
a5c4e309 785 conn = hci_conn_add(hdev, LE_LINK, dst, role);
620ad521
AG
786 if (!conn)
787 return ERR_PTR(-ENOMEM);
9f0caeb1 788
1ebfcc1f 789 conn->dst_type = dst_type;
620ad521 790 conn->sec_level = BT_SECURITY_LOW;
f1e5d547 791 conn->pending_sec_level = sec_level;
09ae260b 792 conn->conn_timeout = conn_timeout;
4292f1f3 793
3c857757
JH
794 hci_req_init(&req, hdev);
795
376f54c1
JH
796 /* Disable advertising if we're active. For master role
797 * connections most controllers will refuse to connect if
798 * advertising is enabled, and for slave role connections we
799 * anyway have to disable it in order to start directed
800 * advertising.
801 */
802 if (test_bit(HCI_LE_ADV, &hdev->dev_flags)) {
803 u8 enable = 0x00;
804 hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable),
805 &enable);
806 }
807
cdd6275e 808 /* If requested to connect as slave use directed advertising */
e804d25d 809 if (conn->role == HCI_ROLE_SLAVE) {
e8bb6b97
JH
810 /* If we're active scanning most controllers are unable
811 * to initiate advertising. Simply reject the attempt.
812 */
813 if (test_bit(HCI_LE_SCAN, &hdev->dev_flags) &&
814 hdev->le_scan_type == LE_SCAN_ACTIVE) {
815 skb_queue_purge(&req.cmd_q);
816 hci_conn_del(conn);
817 return ERR_PTR(-EBUSY);
818 }
819
3c857757
JH
820 hci_req_directed_advertising(&req, conn);
821 goto create_conn;
822 }
823
4292f1f3
AG
824 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
825 if (params) {
826 conn->le_conn_min_interval = params->conn_min_interval;
827 conn->le_conn_max_interval = params->conn_max_interval;
037fc415
MH
828 conn->le_conn_latency = params->conn_latency;
829 conn->le_supv_timeout = params->supervision_timeout;
4292f1f3
AG
830 } else {
831 conn->le_conn_min_interval = hdev->le_conn_min_interval;
832 conn->le_conn_max_interval = hdev->le_conn_max_interval;
04fb7d90
MH
833 conn->le_conn_latency = hdev->le_conn_latency;
834 conn->le_supv_timeout = hdev->le_supv_timeout;
4292f1f3 835 }
eda42b50 836
2acf3d90 837 /* If controller is scanning, we stop it since some controllers are
81ad6fd9
JH
838 * not able to scan and connect at the same time. Also set the
839 * HCI_LE_SCAN_INTERRUPTED flag so that the command complete
840 * handler for scan disabling knows to set the correct discovery
841 * state.
2acf3d90
AG
842 */
843 if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
844 hci_req_add_le_scan_disable(&req);
81ad6fd9 845 set_bit(HCI_LE_SCAN_INTERRUPTED, &hdev->dev_flags);
2acf3d90
AG
846 }
847
81ad6fd9
JH
848 hci_req_add_le_create_conn(&req, conn);
849
3c857757 850create_conn:
81ad6fd9 851 err = hci_req_run(&req, create_le_conn_complete);
2acf3d90
AG
852 if (err) {
853 hci_conn_del(conn);
620ad521 854 return ERR_PTR(err);
2acf3d90 855 }
fcd89c09 856
620ad521
AG
857done:
858 hci_conn_hold(conn);
f1e5d547 859 return conn;
d04aef4c 860}
fcd89c09 861
04a6c589
AG
862struct hci_conn *hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst,
863 u8 sec_level, u8 auth_type)
1da177e4
LT
864{
865 struct hci_conn *acl;
fcd89c09 866
c411110e
LR
867 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
868 if (lmp_bredr_capable(hdev))
869 return ERR_PTR(-ECONNREFUSED);
870
beb19e4c 871 return ERR_PTR(-EOPNOTSUPP);
c411110e 872 }
56f87901 873
70f23020
AE
874 acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
875 if (!acl) {
a5c4e309 876 acl = hci_conn_add(hdev, ACL_LINK, dst, HCI_ROLE_MASTER);
70f23020 877 if (!acl)
48c7aba9 878 return ERR_PTR(-ENOMEM);
1da177e4
LT
879 }
880
881 hci_conn_hold(acl);
882
09ab6f4c 883 if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
765c2a96
JH
884 acl->sec_level = BT_SECURITY_LOW;
885 acl->pending_sec_level = sec_level;
09ab6f4c 886 acl->auth_type = auth_type;
1aef8669 887 hci_acl_create_connection(acl);
09ab6f4c 888 }
1da177e4 889
db474275
VCG
890 return acl;
891}
892
10c62ddc
FD
893struct hci_conn *hci_connect_sco(struct hci_dev *hdev, int type, bdaddr_t *dst,
894 __u16 setting)
db474275
VCG
895{
896 struct hci_conn *acl;
897 struct hci_conn *sco;
898
e660ed6c 899 acl = hci_connect_acl(hdev, dst, BT_SECURITY_LOW, HCI_AT_NO_BONDING);
db474275 900 if (IS_ERR(acl))
5b7f9909 901 return acl;
1da177e4 902
70f23020
AE
903 sco = hci_conn_hash_lookup_ba(hdev, type, dst);
904 if (!sco) {
a5c4e309 905 sco = hci_conn_add(hdev, type, dst, HCI_ROLE_MASTER);
70f23020 906 if (!sco) {
76a68ba0 907 hci_conn_drop(acl);
48c7aba9 908 return ERR_PTR(-ENOMEM);
1da177e4 909 }
5b7f9909 910 }
1da177e4 911
5b7f9909
MH
912 acl->link = sco;
913 sco->link = acl;
1da177e4 914
5b7f9909 915 hci_conn_hold(sco);
1da177e4 916
10c62ddc
FD
917 sco->setting = setting;
918
5b7f9909 919 if (acl->state == BT_CONNECTED &&
5974e4c4 920 (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
58a681ef 921 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
14b12d0b 922 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
c390216b 923
51a8efd7 924 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
e73439d8 925 /* defer SCO setup until mode change completed */
51a8efd7 926 set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
e73439d8
MH
927 return sco;
928 }
929
930 hci_sco_setup(acl, 0x00);
b6a0dc82 931 }
5b7f9909
MH
932
933 return sco;
1da177e4 934}
1da177e4 935
e7c29cb1
MH
936/* Check link security requirement */
937int hci_conn_check_link_mode(struct hci_conn *conn)
938{
38b3fef1 939 BT_DBG("hcon %p", conn);
e7c29cb1 940
40b552aa
MH
941 /* In Secure Connections Only mode, it is required that Secure
942 * Connections is used and the link is encrypted with AES-CCM
943 * using a P-256 authenticated combination key.
944 */
945 if (test_bit(HCI_SC_ONLY, &conn->hdev->flags)) {
946 if (!hci_conn_sc_enabled(conn) ||
947 !test_bit(HCI_CONN_AES_CCM, &conn->flags) ||
948 conn->key_type != HCI_LK_AUTH_COMBINATION_P256)
949 return 0;
950 }
951
4dae2798
JH
952 if (hci_conn_ssp_enabled(conn) &&
953 !test_bit(HCI_CONN_ENCRYPT, &conn->flags))
e7c29cb1
MH
954 return 0;
955
956 return 1;
957}
e7c29cb1 958
1da177e4 959/* Authenticate remote device */
0684e5f9 960static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
1da177e4 961{
38b3fef1 962 BT_DBG("hcon %p", conn);
1da177e4 963
765c2a96
JH
964 if (conn->pending_sec_level > sec_level)
965 sec_level = conn->pending_sec_level;
966
96a31833 967 if (sec_level > conn->sec_level)
765c2a96 968 conn->pending_sec_level = sec_level;
4dae2798 969 else if (test_bit(HCI_CONN_AUTH, &conn->flags))
1da177e4
LT
970 return 1;
971
65cf686e
JH
972 /* Make sure we preserve an existing MITM requirement*/
973 auth_type |= (conn->auth_type & 0x01);
974
96a31833
MH
975 conn->auth_type = auth_type;
976
51a8efd7 977 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
1da177e4 978 struct hci_cp_auth_requested cp;
b7d05bad 979
aca3192c 980 cp.handle = cpu_to_le16(conn->handle);
40be492f 981 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
5974e4c4 982 sizeof(cp), &cp);
09da1f34
JH
983
984 /* If we're already encrypted set the REAUTH_PEND flag,
985 * otherwise set the ENCRYPT_PEND.
986 */
4dae2798 987 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
51a8efd7 988 set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
09da1f34
JH
989 else
990 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
1da177e4 991 }
8c1b2355 992
1da177e4
LT
993 return 0;
994}
1da177e4 995
13d39315
WR
996/* Encrypt the the link */
997static void hci_conn_encrypt(struct hci_conn *conn)
998{
38b3fef1 999 BT_DBG("hcon %p", conn);
13d39315 1000
51a8efd7 1001 if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
13d39315
WR
1002 struct hci_cp_set_conn_encrypt cp;
1003 cp.handle = cpu_to_le16(conn->handle);
1004 cp.encrypt = 0x01;
1005 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
5974e4c4 1006 &cp);
13d39315
WR
1007 }
1008}
1009
8c1b2355 1010/* Enable security */
e7cafc45
JH
1011int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type,
1012 bool initiator)
1da177e4 1013{
38b3fef1 1014 BT_DBG("hcon %p", conn);
1da177e4 1015
d8343f12
VCG
1016 if (conn->type == LE_LINK)
1017 return smp_conn_security(conn, sec_level);
1018
13d39315 1019 /* For sdp we don't need the link key. */
8c1b2355
MH
1020 if (sec_level == BT_SECURITY_SDP)
1021 return 1;
1022
13d39315
WR
1023 /* For non 2.1 devices and low security level we don't need the link
1024 key. */
aa64a8b5 1025 if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
3fdca1e1 1026 return 1;
8c1b2355 1027
13d39315 1028 /* For other security levels we need the link key. */
4dae2798 1029 if (!test_bit(HCI_CONN_AUTH, &conn->flags))
13d39315
WR
1030 goto auth;
1031
7b5a9241
MH
1032 /* An authenticated FIPS approved combination key has sufficient
1033 * security for security level 4. */
1034 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256 &&
1035 sec_level == BT_SECURITY_FIPS)
1036 goto encrypt;
1037
1038 /* An authenticated combination key has sufficient security for
1039 security level 3. */
1040 if ((conn->key_type == HCI_LK_AUTH_COMBINATION_P192 ||
1041 conn->key_type == HCI_LK_AUTH_COMBINATION_P256) &&
1042 sec_level == BT_SECURITY_HIGH)
13d39315
WR
1043 goto encrypt;
1044
1045 /* An unauthenticated combination key has sufficient security for
1046 security level 1 and 2. */
66138ce8
MH
1047 if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 ||
1048 conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) &&
5974e4c4 1049 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW))
13d39315
WR
1050 goto encrypt;
1051
1052 /* A combination key has always sufficient security for the security
1053 levels 1 or 2. High security level requires the combination key
1054 is generated using maximum PIN code length (16).
1055 For pre 2.1 units. */
1056 if (conn->key_type == HCI_LK_COMBINATION &&
7b5a9241
MH
1057 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW ||
1058 conn->pin_length == 16))
13d39315
WR
1059 goto encrypt;
1060
1061auth:
51a8efd7 1062 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
1da177e4
LT
1063 return 0;
1064
977f8fce
JH
1065 if (initiator)
1066 set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
1067
6fdf658c
LAD
1068 if (!hci_conn_auth(conn, sec_level, auth_type))
1069 return 0;
13d39315
WR
1070
1071encrypt:
4dae2798 1072 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
13d39315 1073 return 1;
8c1b2355 1074
13d39315 1075 hci_conn_encrypt(conn);
1da177e4
LT
1076 return 0;
1077}
8c1b2355 1078EXPORT_SYMBOL(hci_conn_security);
1da177e4 1079
b3b1b061
WR
1080/* Check secure link requirement */
1081int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
1082{
38b3fef1 1083 BT_DBG("hcon %p", conn);
b3b1b061 1084
9cb2e030
MH
1085 /* Accept if non-secure or higher security level is required */
1086 if (sec_level != BT_SECURITY_HIGH && sec_level != BT_SECURITY_FIPS)
1087 return 1;
b3b1b061 1088
9cb2e030
MH
1089 /* Accept if secure or higher security level is already present */
1090 if (conn->sec_level == BT_SECURITY_HIGH ||
1091 conn->sec_level == BT_SECURITY_FIPS)
b3b1b061
WR
1092 return 1;
1093
9cb2e030
MH
1094 /* Reject not secure link */
1095 return 0;
b3b1b061
WR
1096}
1097EXPORT_SYMBOL(hci_conn_check_secure);
1098
1da177e4 1099/* Switch role */
8c1b2355 1100int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
1da177e4 1101{
38b3fef1 1102 BT_DBG("hcon %p", conn);
1da177e4 1103
40bef302 1104 if (role == conn->role)
1da177e4
LT
1105 return 1;
1106
51a8efd7 1107 if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
1da177e4
LT
1108 struct hci_cp_switch_role cp;
1109 bacpy(&cp.bdaddr, &conn->dst);
1110 cp.role = role;
a9de9248 1111 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
1da177e4 1112 }
8c1b2355 1113
1da177e4
LT
1114 return 0;
1115}
1116EXPORT_SYMBOL(hci_conn_switch_role);
1117
04837f64 1118/* Enter active mode */
14b12d0b 1119void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
04837f64
MH
1120{
1121 struct hci_dev *hdev = conn->hdev;
1122
38b3fef1 1123 BT_DBG("hcon %p mode %d", conn, conn->mode);
04837f64 1124
14b12d0b
JG
1125 if (conn->mode != HCI_CM_SNIFF)
1126 goto timer;
1127
58a681ef 1128 if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
04837f64
MH
1129 goto timer;
1130
51a8efd7 1131 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
04837f64 1132 struct hci_cp_exit_sniff_mode cp;
aca3192c 1133 cp.handle = cpu_to_le16(conn->handle);
a9de9248 1134 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
04837f64
MH
1135 }
1136
1137timer:
1138 if (hdev->idle_timeout > 0)
a74a84f6
JH
1139 queue_delayed_work(hdev->workqueue, &conn->idle_work,
1140 msecs_to_jiffies(hdev->idle_timeout));
04837f64
MH
1141}
1142
1da177e4
LT
1143/* Drop all connection on the device */
1144void hci_conn_hash_flush(struct hci_dev *hdev)
1145{
1146 struct hci_conn_hash *h = &hdev->conn_hash;
3c4e0df0 1147 struct hci_conn *c, *n;
1da177e4
LT
1148
1149 BT_DBG("hdev %s", hdev->name);
1150
3c4e0df0 1151 list_for_each_entry_safe(c, n, &h->list, list) {
1da177e4
LT
1152 c->state = BT_CLOSED;
1153
3a6d576b 1154 hci_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
1da177e4
LT
1155 hci_conn_del(c);
1156 }
1157}
1158
a9de9248
MH
1159/* Check pending connect attempts */
1160void hci_conn_check_pending(struct hci_dev *hdev)
1161{
1162 struct hci_conn *conn;
1163
1164 BT_DBG("hdev %s", hdev->name);
1165
1166 hci_dev_lock(hdev);
1167
1168 conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
1169 if (conn)
1aef8669 1170 hci_acl_create_connection(conn);
a9de9248
MH
1171
1172 hci_dev_unlock(hdev);
1173}
1174
4dae2798
JH
1175static u32 get_link_mode(struct hci_conn *conn)
1176{
1177 u32 link_mode = 0;
1178
40bef302 1179 if (conn->role == HCI_ROLE_MASTER)
4dae2798
JH
1180 link_mode |= HCI_LM_MASTER;
1181
1182 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
1183 link_mode |= HCI_LM_ENCRYPT;
1184
1185 if (test_bit(HCI_CONN_AUTH, &conn->flags))
1186 link_mode |= HCI_LM_AUTH;
1187
1188 if (test_bit(HCI_CONN_SECURE, &conn->flags))
1189 link_mode |= HCI_LM_SECURE;
1190
1191 if (test_bit(HCI_CONN_FIPS, &conn->flags))
1192 link_mode |= HCI_LM_FIPS;
1193
1194 return link_mode;
1195}
1196
1da177e4
LT
1197int hci_get_conn_list(void __user *arg)
1198{
fc5fef61 1199 struct hci_conn *c;
1da177e4
LT
1200 struct hci_conn_list_req req, *cl;
1201 struct hci_conn_info *ci;
1202 struct hci_dev *hdev;
1da177e4
LT
1203 int n = 0, size, err;
1204
1205 if (copy_from_user(&req, arg, sizeof(req)))
1206 return -EFAULT;
1207
1208 if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
1209 return -EINVAL;
1210
1211 size = sizeof(req) + req.conn_num * sizeof(*ci);
1212
70f23020
AE
1213 cl = kmalloc(size, GFP_KERNEL);
1214 if (!cl)
1da177e4
LT
1215 return -ENOMEM;
1216
70f23020
AE
1217 hdev = hci_dev_get(req.dev_id);
1218 if (!hdev) {
1da177e4
LT
1219 kfree(cl);
1220 return -ENODEV;
1221 }
1222
1223 ci = cl->conn_info;
1224
09fd0de5 1225 hci_dev_lock(hdev);
8035ded4 1226 list_for_each_entry(c, &hdev->conn_hash.list, list) {
1da177e4
LT
1227 bacpy(&(ci + n)->bdaddr, &c->dst);
1228 (ci + n)->handle = c->handle;
1229 (ci + n)->type = c->type;
1230 (ci + n)->out = c->out;
1231 (ci + n)->state = c->state;
4dae2798 1232 (ci + n)->link_mode = get_link_mode(c);
1da177e4
LT
1233 if (++n >= req.conn_num)
1234 break;
1235 }
09fd0de5 1236 hci_dev_unlock(hdev);
1da177e4
LT
1237
1238 cl->dev_id = hdev->id;
1239 cl->conn_num = n;
1240 size = sizeof(req) + n * sizeof(*ci);
1241
1242 hci_dev_put(hdev);
1243
1244 err = copy_to_user(arg, cl, size);
1245 kfree(cl);
1246
1247 return err ? -EFAULT : 0;
1248}
1249
1250int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
1251{
1252 struct hci_conn_info_req req;
1253 struct hci_conn_info ci;
1254 struct hci_conn *conn;
1255 char __user *ptr = arg + sizeof(req);
1256
1257 if (copy_from_user(&req, arg, sizeof(req)))
1258 return -EFAULT;
1259
09fd0de5 1260 hci_dev_lock(hdev);
1da177e4
LT
1261 conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
1262 if (conn) {
1263 bacpy(&ci.bdaddr, &conn->dst);
1264 ci.handle = conn->handle;
1265 ci.type = conn->type;
1266 ci.out = conn->out;
1267 ci.state = conn->state;
4dae2798 1268 ci.link_mode = get_link_mode(conn);
1da177e4 1269 }
09fd0de5 1270 hci_dev_unlock(hdev);
1da177e4
LT
1271
1272 if (!conn)
1273 return -ENOENT;
1274
1275 return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
1276}
40be492f
MH
1277
1278int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
1279{
1280 struct hci_auth_info_req req;
1281 struct hci_conn *conn;
1282
1283 if (copy_from_user(&req, arg, sizeof(req)))
1284 return -EFAULT;
1285
09fd0de5 1286 hci_dev_lock(hdev);
40be492f
MH
1287 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
1288 if (conn)
1289 req.type = conn->auth_type;
09fd0de5 1290 hci_dev_unlock(hdev);
40be492f
MH
1291
1292 if (!conn)
1293 return -ENOENT;
1294
1295 return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
1296}
73d80deb
LAD
1297
1298struct hci_chan *hci_chan_create(struct hci_conn *conn)
1299{
1300 struct hci_dev *hdev = conn->hdev;
1301 struct hci_chan *chan;
1302
38b3fef1 1303 BT_DBG("%s hcon %p", hdev->name, conn);
73d80deb 1304
f94b665d
JH
1305 if (test_bit(HCI_CONN_DROP, &conn->flags)) {
1306 BT_DBG("Refusing to create new hci_chan");
1307 return NULL;
1308 }
1309
27f70f3e 1310 chan = kzalloc(sizeof(*chan), GFP_KERNEL);
73d80deb
LAD
1311 if (!chan)
1312 return NULL;
1313
6c388d32 1314 chan->conn = hci_conn_get(conn);
73d80deb 1315 skb_queue_head_init(&chan->data_q);
168df8e5 1316 chan->state = BT_CONNECTED;
73d80deb 1317
8192edef 1318 list_add_rcu(&chan->list, &conn->chan_list);
73d80deb
LAD
1319
1320 return chan;
1321}
1322
9472007c 1323void hci_chan_del(struct hci_chan *chan)
73d80deb
LAD
1324{
1325 struct hci_conn *conn = chan->conn;
1326 struct hci_dev *hdev = conn->hdev;
1327
38b3fef1 1328 BT_DBG("%s hcon %p chan %p", hdev->name, conn, chan);
73d80deb 1329
8192edef
GP
1330 list_del_rcu(&chan->list);
1331
1332 synchronize_rcu();
73d80deb 1333
bcbb655a 1334 /* Prevent new hci_chan's to be created for this hci_conn */
f94b665d 1335 set_bit(HCI_CONN_DROP, &conn->flags);
b3ff670a 1336
6c388d32 1337 hci_conn_put(conn);
e9b02748 1338
73d80deb
LAD
1339 skb_queue_purge(&chan->data_q);
1340 kfree(chan);
73d80deb
LAD
1341}
1342
2c33c06a 1343void hci_chan_list_flush(struct hci_conn *conn)
73d80deb 1344{
2a5a5ec6 1345 struct hci_chan *chan, *n;
73d80deb 1346
38b3fef1 1347 BT_DBG("hcon %p", conn);
73d80deb 1348
2a5a5ec6 1349 list_for_each_entry_safe(chan, n, &conn->chan_list, list)
73d80deb
LAD
1350 hci_chan_del(chan);
1351}
42c4e53e
AE
1352
1353static struct hci_chan *__hci_chan_lookup_handle(struct hci_conn *hcon,
1354 __u16 handle)
1355{
1356 struct hci_chan *hchan;
1357
1358 list_for_each_entry(hchan, &hcon->chan_list, list) {
1359 if (hchan->handle == handle)
1360 return hchan;
1361 }
1362
1363 return NULL;
1364}
1365
1366struct hci_chan *hci_chan_lookup_handle(struct hci_dev *hdev, __u16 handle)
1367{
1368 struct hci_conn_hash *h = &hdev->conn_hash;
1369 struct hci_conn *hcon;
1370 struct hci_chan *hchan = NULL;
1371
1372 rcu_read_lock();
1373
1374 list_for_each_entry_rcu(hcon, &h->list, list) {
1375 hchan = __hci_chan_lookup_handle(hcon, handle);
1376 if (hchan)
1377 break;
1378 }
1379
1380 rcu_read_unlock();
1381
1382 return hchan;
1383}