2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22 SOFTWARE IS DISCLAIMED.
25 /* Bluetooth HCI connection handling. */
27 #include <linux/export.h>
29 #include <net/bluetooth/bluetooth.h>
30 #include <net/bluetooth/hci_core.h>
40 static const struct sco_param sco_param_cvsd[] = {
41 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000a }, /* S3 */
42 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x0007 }, /* S2 */
43 { EDR_ESCO_MASK | ESCO_EV3, 0x0007 }, /* S1 */
44 { EDR_ESCO_MASK | ESCO_HV3, 0xffff }, /* D1 */
45 { EDR_ESCO_MASK | ESCO_HV1, 0xffff }, /* D0 */
48 static const struct sco_param sco_param_wideband[] = {
49 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000d }, /* T2 */
50 { EDR_ESCO_MASK | ESCO_EV3, 0x0008 }, /* T1 */
53 static void hci_le_create_connection_cancel(struct hci_conn *conn)
55 hci_send_cmd(conn->hdev, HCI_OP_LE_CREATE_CONN_CANCEL, 0, NULL);
58 static void hci_acl_create_connection(struct hci_conn *conn)
60 struct hci_dev *hdev = conn->hdev;
61 struct inquiry_entry *ie;
62 struct hci_cp_create_conn cp;
64 BT_DBG("hcon %p", conn);
66 conn->state = BT_CONNECT;
69 conn->link_mode = HCI_LM_MASTER;
73 conn->link_policy = hdev->link_policy;
75 memset(&cp, 0, sizeof(cp));
76 bacpy(&cp.bdaddr, &conn->dst);
77 cp.pscan_rep_mode = 0x02;
79 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
81 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
82 cp.pscan_rep_mode = ie->data.pscan_rep_mode;
83 cp.pscan_mode = ie->data.pscan_mode;
84 cp.clock_offset = ie->data.clock_offset |
85 __constant_cpu_to_le16(0x8000);
88 memcpy(conn->dev_class, ie->data.dev_class, 3);
89 if (ie->data.ssp_mode > 0)
90 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
93 cp.pkt_type = cpu_to_le16(conn->pkt_type);
94 if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
95 cp.role_switch = 0x01;
97 cp.role_switch = 0x00;
99 hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
102 static void hci_acl_create_connection_cancel(struct hci_conn *conn)
104 struct hci_cp_create_conn_cancel cp;
106 BT_DBG("hcon %p", conn);
108 if (conn->hdev->hci_ver < BLUETOOTH_VER_1_2)
111 bacpy(&cp.bdaddr, &conn->dst);
112 hci_send_cmd(conn->hdev, HCI_OP_CREATE_CONN_CANCEL, sizeof(cp), &cp);
115 static void hci_reject_sco(struct hci_conn *conn)
117 struct hci_cp_reject_sync_conn_req cp;
119 cp.reason = HCI_ERROR_REMOTE_USER_TERM;
120 bacpy(&cp.bdaddr, &conn->dst);
122 hci_send_cmd(conn->hdev, HCI_OP_REJECT_SYNC_CONN_REQ, sizeof(cp), &cp);
125 void hci_disconnect(struct hci_conn *conn, __u8 reason)
127 struct hci_cp_disconnect cp;
129 BT_DBG("hcon %p", conn);
131 conn->state = BT_DISCONN;
133 cp.handle = cpu_to_le16(conn->handle);
135 hci_send_cmd(conn->hdev, HCI_OP_DISCONNECT, sizeof(cp), &cp);
138 static void hci_amp_disconn(struct hci_conn *conn, __u8 reason)
140 struct hci_cp_disconn_phy_link cp;
142 BT_DBG("hcon %p", conn);
144 conn->state = BT_DISCONN;
146 cp.phy_handle = HCI_PHY_HANDLE(conn->handle);
148 hci_send_cmd(conn->hdev, HCI_OP_DISCONN_PHY_LINK,
152 static void hci_add_sco(struct hci_conn *conn, __u16 handle)
154 struct hci_dev *hdev = conn->hdev;
155 struct hci_cp_add_sco cp;
157 BT_DBG("hcon %p", conn);
159 conn->state = BT_CONNECT;
164 cp.handle = cpu_to_le16(handle);
165 cp.pkt_type = cpu_to_le16(conn->pkt_type);
167 hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
170 bool hci_setup_sync(struct hci_conn *conn, __u16 handle)
172 struct hci_dev *hdev = conn->hdev;
173 struct hci_cp_setup_sync_conn cp;
174 const struct sco_param *param;
176 BT_DBG("hcon %p", conn);
178 conn->state = BT_CONNECT;
183 cp.handle = cpu_to_le16(handle);
185 cp.tx_bandwidth = __constant_cpu_to_le32(0x00001f40);
186 cp.rx_bandwidth = __constant_cpu_to_le32(0x00001f40);
187 cp.voice_setting = cpu_to_le16(conn->setting);
189 switch (conn->setting & SCO_AIRMODE_MASK) {
190 case SCO_AIRMODE_TRANSP:
191 if (conn->attempt > ARRAY_SIZE(sco_param_wideband))
193 cp.retrans_effort = 0x02;
194 param = &sco_param_wideband[conn->attempt - 1];
196 case SCO_AIRMODE_CVSD:
197 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
199 cp.retrans_effort = 0x01;
200 param = &sco_param_cvsd[conn->attempt - 1];
206 cp.pkt_type = __cpu_to_le16(param->pkt_type);
207 cp.max_latency = __cpu_to_le16(param->max_latency);
209 if (hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp) < 0)
215 void hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max,
216 u16 latency, u16 to_multiplier)
218 struct hci_cp_le_conn_update cp;
219 struct hci_dev *hdev = conn->hdev;
221 memset(&cp, 0, sizeof(cp));
223 cp.handle = cpu_to_le16(conn->handle);
224 cp.conn_interval_min = cpu_to_le16(min);
225 cp.conn_interval_max = cpu_to_le16(max);
226 cp.conn_latency = cpu_to_le16(latency);
227 cp.supervision_timeout = cpu_to_le16(to_multiplier);
228 cp.min_ce_len = __constant_cpu_to_le16(0x0001);
229 cp.max_ce_len = __constant_cpu_to_le16(0x0001);
231 hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
234 void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __u8 rand[8],
237 struct hci_dev *hdev = conn->hdev;
238 struct hci_cp_le_start_enc cp;
240 BT_DBG("hcon %p", conn);
242 memset(&cp, 0, sizeof(cp));
244 cp.handle = cpu_to_le16(conn->handle);
245 memcpy(cp.ltk, ltk, sizeof(cp.ltk));
247 memcpy(cp.rand, rand, sizeof(cp.rand));
249 hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
252 /* Device _must_ be locked */
253 void hci_sco_setup(struct hci_conn *conn, __u8 status)
255 struct hci_conn *sco = conn->link;
260 BT_DBG("hcon %p", conn);
263 if (lmp_esco_capable(conn->hdev))
264 hci_setup_sync(sco, conn->handle);
266 hci_add_sco(sco, conn->handle);
268 hci_proto_connect_cfm(sco, status);
273 static void hci_conn_disconnect(struct hci_conn *conn)
275 __u8 reason = hci_proto_disconn_ind(conn);
277 switch (conn->type) {
279 hci_amp_disconn(conn, reason);
282 hci_disconnect(conn, reason);
287 static void hci_conn_timeout(struct work_struct *work)
289 struct hci_conn *conn = container_of(work, struct hci_conn,
292 BT_DBG("hcon %p state %s", conn, state_to_string(conn->state));
294 if (atomic_read(&conn->refcnt))
297 switch (conn->state) {
301 if (conn->type == ACL_LINK)
302 hci_acl_create_connection_cancel(conn);
303 else if (conn->type == LE_LINK)
304 hci_le_create_connection_cancel(conn);
305 } else if (conn->type == SCO_LINK || conn->type == ESCO_LINK) {
306 hci_reject_sco(conn);
311 hci_conn_disconnect(conn);
314 conn->state = BT_CLOSED;
319 /* Enter sniff mode */
320 static void hci_conn_idle(struct work_struct *work)
322 struct hci_conn *conn = container_of(work, struct hci_conn,
324 struct hci_dev *hdev = conn->hdev;
326 BT_DBG("hcon %p mode %d", conn, conn->mode);
328 if (test_bit(HCI_RAW, &hdev->flags))
331 if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
334 if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
337 if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
338 struct hci_cp_sniff_subrate cp;
339 cp.handle = cpu_to_le16(conn->handle);
340 cp.max_latency = __constant_cpu_to_le16(0);
341 cp.min_remote_timeout = __constant_cpu_to_le16(0);
342 cp.min_local_timeout = __constant_cpu_to_le16(0);
343 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
346 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
347 struct hci_cp_sniff_mode cp;
348 cp.handle = cpu_to_le16(conn->handle);
349 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
350 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
351 cp.attempt = __constant_cpu_to_le16(4);
352 cp.timeout = __constant_cpu_to_le16(1);
353 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
357 static void hci_conn_auto_accept(struct work_struct *work)
359 struct hci_conn *conn = container_of(work, struct hci_conn,
360 auto_accept_work.work);
362 hci_send_cmd(conn->hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
366 struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst)
368 struct hci_conn *conn;
370 BT_DBG("%s dst %pMR", hdev->name, dst);
372 conn = kzalloc(sizeof(struct hci_conn), GFP_KERNEL);
376 bacpy(&conn->dst, dst);
377 bacpy(&conn->src, &hdev->bdaddr);
380 conn->mode = HCI_CM_ACTIVE;
381 conn->state = BT_OPEN;
382 conn->auth_type = HCI_AT_GENERAL_BONDING;
383 conn->io_capability = hdev->io_capability;
384 conn->remote_auth = 0xff;
385 conn->key_type = 0xff;
387 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
388 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
392 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
395 if (lmp_esco_capable(hdev))
396 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
397 (hdev->esco_type & EDR_ESCO_MASK);
399 conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
402 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
406 skb_queue_head_init(&conn->data_q);
408 INIT_LIST_HEAD(&conn->chan_list);
410 INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
411 INIT_DELAYED_WORK(&conn->auto_accept_work, hci_conn_auto_accept);
412 INIT_DELAYED_WORK(&conn->idle_work, hci_conn_idle);
414 atomic_set(&conn->refcnt, 0);
418 hci_conn_hash_add(hdev, conn);
420 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
422 hci_conn_init_sysfs(conn);
427 int hci_conn_del(struct hci_conn *conn)
429 struct hci_dev *hdev = conn->hdev;
431 BT_DBG("%s hcon %p handle %d", hdev->name, conn, conn->handle);
433 cancel_delayed_work_sync(&conn->disc_work);
434 cancel_delayed_work_sync(&conn->auto_accept_work);
435 cancel_delayed_work_sync(&conn->idle_work);
437 if (conn->type == ACL_LINK) {
438 struct hci_conn *sco = conn->link;
443 hdev->acl_cnt += conn->sent;
444 } else if (conn->type == LE_LINK) {
446 hdev->le_cnt += conn->sent;
448 hdev->acl_cnt += conn->sent;
450 struct hci_conn *acl = conn->link;
457 hci_chan_list_flush(conn);
460 amp_mgr_put(conn->amp_mgr);
462 hci_conn_hash_del(hdev, conn);
464 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
466 skb_queue_purge(&conn->data_q);
468 hci_conn_del_sysfs(conn);
477 struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src)
479 int use_src = bacmp(src, BDADDR_ANY);
480 struct hci_dev *hdev = NULL, *d;
482 BT_DBG("%pMR -> %pMR", src, dst);
484 read_lock(&hci_dev_list_lock);
486 list_for_each_entry(d, &hci_dev_list, list) {
487 if (!test_bit(HCI_UP, &d->flags) ||
488 test_bit(HCI_RAW, &d->flags) ||
489 test_bit(HCI_USER_CHANNEL, &d->dev_flags) ||
490 d->dev_type != HCI_BREDR)
494 * No source address - find interface with bdaddr != dst
495 * Source address - find interface with bdaddr == src
499 if (!bacmp(&d->bdaddr, src)) {
503 if (bacmp(&d->bdaddr, dst)) {
510 hdev = hci_dev_hold(hdev);
512 read_unlock(&hci_dev_list_lock);
515 EXPORT_SYMBOL(hci_get_route);
517 static void create_le_conn_complete(struct hci_dev *hdev, u8 status)
519 struct hci_conn *conn;
524 BT_ERR("HCI request failed to create LE connection: status 0x%2.2x",
529 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
533 conn->state = BT_CLOSED;
535 mgmt_connect_failed(hdev, &conn->dst, conn->type, conn->dst_type,
538 hci_proto_connect_cfm(conn, status);
543 hci_dev_unlock(hdev);
546 static int hci_create_le_conn(struct hci_conn *conn)
548 struct hci_dev *hdev = conn->hdev;
549 struct hci_cp_le_create_conn cp;
550 struct hci_request req;
553 hci_req_init(&req, hdev);
555 memset(&cp, 0, sizeof(cp));
556 cp.scan_interval = cpu_to_le16(hdev->le_scan_interval);
557 cp.scan_window = cpu_to_le16(hdev->le_scan_window);
558 bacpy(&cp.peer_addr, &conn->dst);
559 cp.peer_addr_type = conn->dst_type;
560 cp.own_address_type = conn->src_type;
561 cp.conn_interval_min = cpu_to_le16(hdev->le_conn_min_interval);
562 cp.conn_interval_max = cpu_to_le16(hdev->le_conn_max_interval);
563 cp.supervision_timeout = __constant_cpu_to_le16(0x002a);
564 cp.min_ce_len = __constant_cpu_to_le16(0x0000);
565 cp.max_ce_len = __constant_cpu_to_le16(0x0000);
567 hci_req_add(&req, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
569 err = hci_req_run(&req, create_le_conn_complete);
578 static struct hci_conn *hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst,
579 u8 dst_type, u8 sec_level, u8 auth_type)
581 struct hci_conn *conn;
584 if (test_bit(HCI_ADVERTISING, &hdev->flags))
585 return ERR_PTR(-ENOTSUPP);
587 /* Some devices send ATT messages as soon as the physical link is
588 * established. To be able to handle these ATT messages, the user-
589 * space first establishes the connection and then starts the pairing
592 * So if a hci_conn object already exists for the following connection
593 * attempt, we simply update pending_sec_level and auth_type fields
594 * and return the object found.
596 conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, dst);
598 conn->pending_sec_level = sec_level;
599 conn->auth_type = auth_type;
603 /* Since the controller supports only one LE connection attempt at a
604 * time, we return -EBUSY if there is any connection attempt running.
606 conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
608 return ERR_PTR(-EBUSY);
610 conn = hci_conn_add(hdev, LE_LINK, dst);
612 return ERR_PTR(-ENOMEM);
614 if (dst_type == BDADDR_LE_PUBLIC)
615 conn->dst_type = ADDR_LE_DEV_PUBLIC;
617 conn->dst_type = ADDR_LE_DEV_RANDOM;
619 conn->src_type = hdev->own_addr_type;
621 conn->state = BT_CONNECT;
623 conn->link_mode |= HCI_LM_MASTER;
624 conn->sec_level = BT_SECURITY_LOW;
625 conn->pending_sec_level = sec_level;
626 conn->auth_type = auth_type;
628 err = hci_create_le_conn(conn);
637 static struct hci_conn *hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst,
638 u8 sec_level, u8 auth_type)
640 struct hci_conn *acl;
642 if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
643 return ERR_PTR(-ENOTSUPP);
645 acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
647 acl = hci_conn_add(hdev, ACL_LINK, dst);
649 return ERR_PTR(-ENOMEM);
654 if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
655 acl->sec_level = BT_SECURITY_LOW;
656 acl->pending_sec_level = sec_level;
657 acl->auth_type = auth_type;
658 hci_acl_create_connection(acl);
664 struct hci_conn *hci_connect_sco(struct hci_dev *hdev, int type, bdaddr_t *dst,
667 struct hci_conn *acl;
668 struct hci_conn *sco;
670 acl = hci_connect_acl(hdev, dst, BT_SECURITY_LOW, HCI_AT_NO_BONDING);
674 sco = hci_conn_hash_lookup_ba(hdev, type, dst);
676 sco = hci_conn_add(hdev, type, dst);
679 return ERR_PTR(-ENOMEM);
688 sco->setting = setting;
690 if (acl->state == BT_CONNECTED &&
691 (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
692 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
693 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
695 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
696 /* defer SCO setup until mode change completed */
697 set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
701 hci_sco_setup(acl, 0x00);
707 /* Create SCO, ACL or LE connection. */
708 struct hci_conn *hci_connect(struct hci_dev *hdev, int type, bdaddr_t *dst,
709 __u8 dst_type, __u8 sec_level, __u8 auth_type)
711 BT_DBG("%s dst %pMR type 0x%x", hdev->name, dst, type);
715 return hci_connect_le(hdev, dst, dst_type, sec_level, auth_type);
717 return hci_connect_acl(hdev, dst, sec_level, auth_type);
720 return ERR_PTR(-EINVAL);
723 /* Check link security requirement */
724 int hci_conn_check_link_mode(struct hci_conn *conn)
726 BT_DBG("hcon %p", conn);
728 if (hci_conn_ssp_enabled(conn) && !(conn->link_mode & HCI_LM_ENCRYPT))
734 /* Authenticate remote device */
735 static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
737 BT_DBG("hcon %p", conn);
739 if (conn->pending_sec_level > sec_level)
740 sec_level = conn->pending_sec_level;
742 if (sec_level > conn->sec_level)
743 conn->pending_sec_level = sec_level;
744 else if (conn->link_mode & HCI_LM_AUTH)
747 /* Make sure we preserve an existing MITM requirement*/
748 auth_type |= (conn->auth_type & 0x01);
750 conn->auth_type = auth_type;
752 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
753 struct hci_cp_auth_requested cp;
755 /* encrypt must be pending if auth is also pending */
756 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
758 cp.handle = cpu_to_le16(conn->handle);
759 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
761 if (conn->key_type != 0xff)
762 set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
768 /* Encrypt the the link */
769 static void hci_conn_encrypt(struct hci_conn *conn)
771 BT_DBG("hcon %p", conn);
773 if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
774 struct hci_cp_set_conn_encrypt cp;
775 cp.handle = cpu_to_le16(conn->handle);
777 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
782 /* Enable security */
783 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
785 BT_DBG("hcon %p", conn);
787 if (conn->type == LE_LINK)
788 return smp_conn_security(conn, sec_level);
790 /* For sdp we don't need the link key. */
791 if (sec_level == BT_SECURITY_SDP)
794 /* For non 2.1 devices and low security level we don't need the link
796 if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
799 /* For other security levels we need the link key. */
800 if (!(conn->link_mode & HCI_LM_AUTH))
803 /* An authenticated combination key has sufficient security for any
805 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P192 ||
806 conn->key_type == HCI_LK_AUTH_COMBINATION_P256)
809 /* An unauthenticated combination key has sufficient security for
810 security level 1 and 2. */
811 if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 ||
812 conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) &&
813 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW))
816 /* A combination key has always sufficient security for the security
817 levels 1 or 2. High security level requires the combination key
818 is generated using maximum PIN code length (16).
819 For pre 2.1 units. */
820 if (conn->key_type == HCI_LK_COMBINATION &&
821 (sec_level != BT_SECURITY_HIGH || conn->pin_length == 16))
825 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
828 if (!hci_conn_auth(conn, sec_level, auth_type))
832 if (conn->link_mode & HCI_LM_ENCRYPT)
835 hci_conn_encrypt(conn);
838 EXPORT_SYMBOL(hci_conn_security);
840 /* Check secure link requirement */
841 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
843 BT_DBG("hcon %p", conn);
845 if (sec_level != BT_SECURITY_HIGH)
846 return 1; /* Accept if non-secure is required */
848 if (conn->sec_level == BT_SECURITY_HIGH)
851 return 0; /* Reject not secure link */
853 EXPORT_SYMBOL(hci_conn_check_secure);
855 /* Change link key */
856 int hci_conn_change_link_key(struct hci_conn *conn)
858 BT_DBG("hcon %p", conn);
860 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
861 struct hci_cp_change_conn_link_key cp;
862 cp.handle = cpu_to_le16(conn->handle);
863 hci_send_cmd(conn->hdev, HCI_OP_CHANGE_CONN_LINK_KEY,
871 int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
873 BT_DBG("hcon %p", conn);
875 if (!role && conn->link_mode & HCI_LM_MASTER)
878 if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
879 struct hci_cp_switch_role cp;
880 bacpy(&cp.bdaddr, &conn->dst);
882 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
887 EXPORT_SYMBOL(hci_conn_switch_role);
889 /* Enter active mode */
890 void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
892 struct hci_dev *hdev = conn->hdev;
894 BT_DBG("hcon %p mode %d", conn, conn->mode);
896 if (test_bit(HCI_RAW, &hdev->flags))
899 if (conn->mode != HCI_CM_SNIFF)
902 if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
905 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
906 struct hci_cp_exit_sniff_mode cp;
907 cp.handle = cpu_to_le16(conn->handle);
908 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
912 if (hdev->idle_timeout > 0)
913 queue_delayed_work(hdev->workqueue, &conn->idle_work,
914 msecs_to_jiffies(hdev->idle_timeout));
917 /* Drop all connection on the device */
918 void hci_conn_hash_flush(struct hci_dev *hdev)
920 struct hci_conn_hash *h = &hdev->conn_hash;
921 struct hci_conn *c, *n;
923 BT_DBG("hdev %s", hdev->name);
925 list_for_each_entry_safe(c, n, &h->list, list) {
926 c->state = BT_CLOSED;
928 hci_proto_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
933 /* Check pending connect attempts */
934 void hci_conn_check_pending(struct hci_dev *hdev)
936 struct hci_conn *conn;
938 BT_DBG("hdev %s", hdev->name);
942 conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
944 hci_acl_create_connection(conn);
946 hci_dev_unlock(hdev);
949 int hci_get_conn_list(void __user *arg)
952 struct hci_conn_list_req req, *cl;
953 struct hci_conn_info *ci;
954 struct hci_dev *hdev;
955 int n = 0, size, err;
957 if (copy_from_user(&req, arg, sizeof(req)))
960 if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
963 size = sizeof(req) + req.conn_num * sizeof(*ci);
965 cl = kmalloc(size, GFP_KERNEL);
969 hdev = hci_dev_get(req.dev_id);
978 list_for_each_entry(c, &hdev->conn_hash.list, list) {
979 bacpy(&(ci + n)->bdaddr, &c->dst);
980 (ci + n)->handle = c->handle;
981 (ci + n)->type = c->type;
982 (ci + n)->out = c->out;
983 (ci + n)->state = c->state;
984 (ci + n)->link_mode = c->link_mode;
985 if (++n >= req.conn_num)
988 hci_dev_unlock(hdev);
990 cl->dev_id = hdev->id;
992 size = sizeof(req) + n * sizeof(*ci);
996 err = copy_to_user(arg, cl, size);
999 return err ? -EFAULT : 0;
1002 int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
1004 struct hci_conn_info_req req;
1005 struct hci_conn_info ci;
1006 struct hci_conn *conn;
1007 char __user *ptr = arg + sizeof(req);
1009 if (copy_from_user(&req, arg, sizeof(req)))
1013 conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
1015 bacpy(&ci.bdaddr, &conn->dst);
1016 ci.handle = conn->handle;
1017 ci.type = conn->type;
1019 ci.state = conn->state;
1020 ci.link_mode = conn->link_mode;
1022 hci_dev_unlock(hdev);
1027 return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
1030 int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
1032 struct hci_auth_info_req req;
1033 struct hci_conn *conn;
1035 if (copy_from_user(&req, arg, sizeof(req)))
1039 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
1041 req.type = conn->auth_type;
1042 hci_dev_unlock(hdev);
1047 return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
1050 struct hci_chan *hci_chan_create(struct hci_conn *conn)
1052 struct hci_dev *hdev = conn->hdev;
1053 struct hci_chan *chan;
1055 BT_DBG("%s hcon %p", hdev->name, conn);
1057 chan = kzalloc(sizeof(struct hci_chan), GFP_KERNEL);
1062 skb_queue_head_init(&chan->data_q);
1063 chan->state = BT_CONNECTED;
1065 list_add_rcu(&chan->list, &conn->chan_list);
1070 void hci_chan_del(struct hci_chan *chan)
1072 struct hci_conn *conn = chan->conn;
1073 struct hci_dev *hdev = conn->hdev;
1075 BT_DBG("%s hcon %p chan %p", hdev->name, conn, chan);
1077 list_del_rcu(&chan->list);
1081 hci_conn_drop(conn);
1083 skb_queue_purge(&chan->data_q);
1087 void hci_chan_list_flush(struct hci_conn *conn)
1089 struct hci_chan *chan, *n;
1091 BT_DBG("hcon %p", conn);
1093 list_for_each_entry_safe(chan, n, &conn->chan_list, list)
1097 static struct hci_chan *__hci_chan_lookup_handle(struct hci_conn *hcon,
1100 struct hci_chan *hchan;
1102 list_for_each_entry(hchan, &hcon->chan_list, list) {
1103 if (hchan->handle == handle)
1110 struct hci_chan *hci_chan_lookup_handle(struct hci_dev *hdev, __u16 handle)
1112 struct hci_conn_hash *h = &hdev->conn_hash;
1113 struct hci_conn *hcon;
1114 struct hci_chan *hchan = NULL;
1118 list_for_each_entry_rcu(hcon, &h->list, list) {
1119 hchan = __hci_chan_lookup_handle(hcon, handle);