Bluetooth: Use list _safe deleting from conn chan_list
[deliverable/linux.git] / net / bluetooth / hci_conn.c
CommitLineData
8e87d142 1/*
1da177e4 2 BlueZ - Bluetooth protocol stack for Linux
2d0a0346 3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
1da177e4
LT
4
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
8e87d142
YH
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
1da177e4
LT
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
8e87d142
YH
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
1da177e4
LT
22 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI connection handling. */
26
1da177e4
LT
27#include <linux/module.h>
28
29#include <linux/types.h>
30#include <linux/errno.h>
31#include <linux/kernel.h>
1da177e4
LT
32#include <linux/slab.h>
33#include <linux/poll.h>
34#include <linux/fcntl.h>
35#include <linux/init.h>
36#include <linux/skbuff.h>
37#include <linux/interrupt.h>
38#include <linux/notifier.h>
39#include <net/sock.h>
40
41#include <asm/system.h>
70f23020 42#include <linux/uaccess.h>
1da177e4
LT
43#include <asm/unaligned.h>
44
45#include <net/bluetooth/bluetooth.h>
46#include <net/bluetooth/hci_core.h>
47
fcd89c09
VT
48static void hci_le_connect(struct hci_conn *conn)
49{
50 struct hci_dev *hdev = conn->hdev;
51 struct hci_cp_le_create_conn cp;
52
53 conn->state = BT_CONNECT;
a0c808b3 54 conn->out = true;
b92a6223 55 conn->link_mode |= HCI_LM_MASTER;
7b5c0d52 56 conn->sec_level = BT_SECURITY_LOW;
fcd89c09
VT
57
58 memset(&cp, 0, sizeof(cp));
0e833915
AL
59 cp.scan_interval = cpu_to_le16(0x0060);
60 cp.scan_window = cpu_to_le16(0x0030);
fcd89c09 61 bacpy(&cp.peer_addr, &conn->dst);
6d3ce0e7 62 cp.peer_addr_type = conn->dst_type;
0e833915
AL
63 cp.conn_interval_min = cpu_to_le16(0x0028);
64 cp.conn_interval_max = cpu_to_le16(0x0038);
65 cp.supervision_timeout = cpu_to_le16(0x002a);
66 cp.min_ce_len = cpu_to_le16(0x0000);
67 cp.max_ce_len = cpu_to_le16(0x0000);
fcd89c09
VT
68
69 hci_send_cmd(hdev, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
70}
71
72static void hci_le_connect_cancel(struct hci_conn *conn)
73{
74 hci_send_cmd(conn->hdev, HCI_OP_LE_CREATE_CONN_CANCEL, 0, NULL);
75}
76
4c67bc74 77void hci_acl_connect(struct hci_conn *conn)
1da177e4
LT
78{
79 struct hci_dev *hdev = conn->hdev;
80 struct inquiry_entry *ie;
81 struct hci_cp_create_conn cp;
82
83 BT_DBG("%p", conn);
84
85 conn->state = BT_CONNECT;
a0c808b3 86 conn->out = true;
a8746417 87
1da177e4
LT
88 conn->link_mode = HCI_LM_MASTER;
89
4c67bc74
MH
90 conn->attempt++;
91
e4e8e37c
MH
92 conn->link_policy = hdev->link_policy;
93
1da177e4
LT
94 memset(&cp, 0, sizeof(cp));
95 bacpy(&cp.bdaddr, &conn->dst);
96 cp.pscan_rep_mode = 0x02;
97
70f23020
AE
98 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
99 if (ie) {
41a96212
MH
100 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
101 cp.pscan_rep_mode = ie->data.pscan_rep_mode;
102 cp.pscan_mode = ie->data.pscan_mode;
103 cp.clock_offset = ie->data.clock_offset |
104 cpu_to_le16(0x8000);
105 }
106
1da177e4 107 memcpy(conn->dev_class, ie->data.dev_class, 3);
58a681ef
JH
108 if (ie->data.ssp_mode > 0)
109 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
1da177e4
LT
110 }
111
a8746417 112 cp.pkt_type = cpu_to_le16(conn->pkt_type);
1da177e4 113 if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
b6a0dc82 114 cp.role_switch = 0x01;
1da177e4 115 else
b6a0dc82 116 cp.role_switch = 0x00;
4c67bc74 117
a9de9248 118 hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
1da177e4
LT
119}
120
6ac59344
MH
121static void hci_acl_connect_cancel(struct hci_conn *conn)
122{
123 struct hci_cp_create_conn_cancel cp;
124
125 BT_DBG("%p", conn);
126
d095c1eb 127 if (conn->hdev->hci_ver < BLUETOOTH_VER_1_2)
6ac59344
MH
128 return;
129
130 bacpy(&cp.bdaddr, &conn->dst);
a9de9248 131 hci_send_cmd(conn->hdev, HCI_OP_CREATE_CONN_CANCEL, sizeof(cp), &cp);
6ac59344
MH
132}
133
1da177e4
LT
134void hci_acl_disconn(struct hci_conn *conn, __u8 reason)
135{
136 struct hci_cp_disconnect cp;
137
138 BT_DBG("%p", conn);
139
140 conn->state = BT_DISCONN;
141
aca3192c 142 cp.handle = cpu_to_le16(conn->handle);
1da177e4 143 cp.reason = reason;
a9de9248 144 hci_send_cmd(conn->hdev, HCI_OP_DISCONNECT, sizeof(cp), &cp);
1da177e4
LT
145}
146
147void hci_add_sco(struct hci_conn *conn, __u16 handle)
148{
149 struct hci_dev *hdev = conn->hdev;
150 struct hci_cp_add_sco cp;
151
152 BT_DBG("%p", conn);
153
154 conn->state = BT_CONNECT;
a0c808b3 155 conn->out = true;
1da177e4 156
efc7688b
MH
157 conn->attempt++;
158
aca3192c 159 cp.handle = cpu_to_le16(handle);
a8746417 160 cp.pkt_type = cpu_to_le16(conn->pkt_type);
1da177e4 161
a9de9248 162 hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
1da177e4
LT
163}
164
b6a0dc82
MH
165void hci_setup_sync(struct hci_conn *conn, __u16 handle)
166{
167 struct hci_dev *hdev = conn->hdev;
168 struct hci_cp_setup_sync_conn cp;
169
170 BT_DBG("%p", conn);
171
172 conn->state = BT_CONNECT;
a0c808b3 173 conn->out = true;
b6a0dc82 174
efc7688b
MH
175 conn->attempt++;
176
b6a0dc82 177 cp.handle = cpu_to_le16(handle);
a8746417 178 cp.pkt_type = cpu_to_le16(conn->pkt_type);
b6a0dc82
MH
179
180 cp.tx_bandwidth = cpu_to_le32(0x00001f40);
181 cp.rx_bandwidth = cpu_to_le32(0x00001f40);
182 cp.max_latency = cpu_to_le16(0xffff);
183 cp.voice_setting = cpu_to_le16(hdev->voice_setting);
184 cp.retrans_effort = 0xff;
185
186 hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp);
187}
188
2ce603eb
CT
189void hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max,
190 u16 latency, u16 to_multiplier)
191{
192 struct hci_cp_le_conn_update cp;
193 struct hci_dev *hdev = conn->hdev;
194
195 memset(&cp, 0, sizeof(cp));
196
197 cp.handle = cpu_to_le16(conn->handle);
198 cp.conn_interval_min = cpu_to_le16(min);
199 cp.conn_interval_max = cpu_to_le16(max);
200 cp.conn_latency = cpu_to_le16(latency);
201 cp.supervision_timeout = cpu_to_le16(to_multiplier);
202 cp.min_ce_len = cpu_to_le16(0x0001);
203 cp.max_ce_len = cpu_to_le16(0x0001);
204
205 hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
206}
207EXPORT_SYMBOL(hci_le_conn_update);
208
a7a595f6
VCG
209void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __u8 rand[8],
210 __u8 ltk[16])
211{
212 struct hci_dev *hdev = conn->hdev;
213 struct hci_cp_le_start_enc cp;
214
215 BT_DBG("%p", conn);
216
217 memset(&cp, 0, sizeof(cp));
218
219 cp.handle = cpu_to_le16(conn->handle);
220 memcpy(cp.ltk, ltk, sizeof(cp.ltk));
221 cp.ediv = ediv;
51beabdf 222 memcpy(cp.rand, rand, sizeof(cp.rand));
a7a595f6
VCG
223
224 hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
225}
226EXPORT_SYMBOL(hci_le_start_enc);
227
228void hci_le_ltk_reply(struct hci_conn *conn, u8 ltk[16])
229{
230 struct hci_dev *hdev = conn->hdev;
231 struct hci_cp_le_ltk_reply cp;
232
233 BT_DBG("%p", conn);
234
235 memset(&cp, 0, sizeof(cp));
236
237 cp.handle = cpu_to_le16(conn->handle);
238 memcpy(cp.ltk, ltk, sizeof(ltk));
239
240 hci_send_cmd(hdev, HCI_OP_LE_LTK_REPLY, sizeof(cp), &cp);
241}
242EXPORT_SYMBOL(hci_le_ltk_reply);
243
244void hci_le_ltk_neg_reply(struct hci_conn *conn)
245{
246 struct hci_dev *hdev = conn->hdev;
247 struct hci_cp_le_ltk_neg_reply cp;
248
249 BT_DBG("%p", conn);
250
251 memset(&cp, 0, sizeof(cp));
252
253 cp.handle = cpu_to_le16(conn->handle);
254
255 hci_send_cmd(hdev, HCI_OP_LE_LTK_NEG_REPLY, sizeof(cp), &cp);
256}
257
e73439d8
MH
258/* Device _must_ be locked */
259void hci_sco_setup(struct hci_conn *conn, __u8 status)
260{
261 struct hci_conn *sco = conn->link;
262
263 BT_DBG("%p", conn);
264
265 if (!sco)
266 return;
267
268 if (!status) {
269 if (lmp_esco_capable(conn->hdev))
270 hci_setup_sync(sco, conn->handle);
271 else
272 hci_add_sco(sco, conn->handle);
273 } else {
274 hci_proto_connect_cfm(sco, status);
275 hci_conn_del(sco);
276 }
277}
278
19c40e3b 279static void hci_conn_timeout(struct work_struct *work)
1da177e4 280{
19c40e3b
GP
281 struct hci_conn *conn = container_of(work, struct hci_conn,
282 disc_work.work);
2950f21a 283 __u8 reason;
1da177e4
LT
284
285 BT_DBG("conn %p state %d", conn, conn->state);
286
287 if (atomic_read(&conn->refcnt))
288 return;
289
6ac59344
MH
290 switch (conn->state) {
291 case BT_CONNECT:
769be974 292 case BT_CONNECT2:
fcd89c09
VT
293 if (conn->out) {
294 if (conn->type == ACL_LINK)
295 hci_acl_connect_cancel(conn);
296 else if (conn->type == LE_LINK)
297 hci_le_connect_cancel(conn);
298 }
6ac59344 299 break;
769be974 300 case BT_CONFIG:
8e87d142 301 case BT_CONNECTED:
2950f21a
MH
302 reason = hci_proto_disconn_ind(conn);
303 hci_acl_disconn(conn, reason);
6ac59344
MH
304 break;
305 default:
1da177e4 306 conn->state = BT_CLOSED;
6ac59344
MH
307 break;
308 }
1da177e4
LT
309}
310
416dc94b
GP
311/* Enter sniff mode */
312static void hci_conn_enter_sniff_mode(struct hci_conn *conn)
313{
314 struct hci_dev *hdev = conn->hdev;
315
316 BT_DBG("conn %p mode %d", conn, conn->mode);
317
318 if (test_bit(HCI_RAW, &hdev->flags))
319 return;
320
321 if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
322 return;
323
324 if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
325 return;
326
327 if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
328 struct hci_cp_sniff_subrate cp;
329 cp.handle = cpu_to_le16(conn->handle);
330 cp.max_latency = cpu_to_le16(0);
331 cp.min_remote_timeout = cpu_to_le16(0);
332 cp.min_local_timeout = cpu_to_le16(0);
333 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
334 }
335
51a8efd7 336 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
416dc94b
GP
337 struct hci_cp_sniff_mode cp;
338 cp.handle = cpu_to_le16(conn->handle);
339 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
340 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
341 cp.attempt = cpu_to_le16(4);
342 cp.timeout = cpu_to_le16(1);
343 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
344 }
345}
346
04837f64 347static void hci_conn_idle(unsigned long arg)
1da177e4 348{
04837f64
MH
349 struct hci_conn *conn = (void *) arg;
350
351 BT_DBG("conn %p mode %d", conn, conn->mode);
352
353 hci_conn_enter_sniff_mode(conn);
1da177e4
LT
354}
355
9f61656a
JH
356static void hci_conn_auto_accept(unsigned long arg)
357{
358 struct hci_conn *conn = (void *) arg;
359 struct hci_dev *hdev = conn->hdev;
360
9f61656a
JH
361 hci_send_cmd(hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
362 &conn->dst);
9f61656a
JH
363}
364
1da177e4
LT
365struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst)
366{
367 struct hci_conn *conn;
368
369 BT_DBG("%s dst %s", hdev->name, batostr(dst));
370
cb601d7e 371 conn = kzalloc(sizeof(struct hci_conn), GFP_KERNEL);
04837f64 372 if (!conn)
1da177e4 373 return NULL;
1da177e4
LT
374
375 bacpy(&conn->dst, dst);
a8746417
MH
376 conn->hdev = hdev;
377 conn->type = type;
378 conn->mode = HCI_CM_ACTIVE;
379 conn->state = BT_OPEN;
93f19c9f 380 conn->auth_type = HCI_AT_GENERAL_BONDING;
17fa4b9d 381 conn->io_capability = hdev->io_capability;
a9583556 382 conn->remote_auth = 0xff;
13d39315 383 conn->key_type = 0xff;
1da177e4 384
58a681ef 385 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
052b30b0 386 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
04837f64 387
a8746417
MH
388 switch (type) {
389 case ACL_LINK:
390 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
391 break;
392 case SCO_LINK:
393 if (lmp_esco_capable(hdev))
efc7688b
MH
394 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
395 (hdev->esco_type & EDR_ESCO_MASK);
a8746417
MH
396 else
397 conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
398 break;
399 case ESCO_LINK:
efc7688b 400 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
a8746417
MH
401 break;
402 }
403
1da177e4 404 skb_queue_head_init(&conn->data_q);
04837f64 405
2c33c06a 406 INIT_LIST_HEAD(&conn->chan_list);;
73d80deb 407
19c40e3b 408 INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
b24b8a24 409 setup_timer(&conn->idle_timer, hci_conn_idle, (unsigned long)conn);
9f61656a
JH
410 setup_timer(&conn->auto_accept_timer, hci_conn_auto_accept,
411 (unsigned long) conn);
1da177e4
LT
412
413 atomic_set(&conn->refcnt, 0);
414
415 hci_dev_hold(hdev);
416
1da177e4 417 hci_conn_hash_add(hdev, conn);
3c54711c 418 if (hdev->notify)
1da177e4
LT
419 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
420
9eba32b8
MH
421 atomic_set(&conn->devref, 0);
422
a67e899c
MH
423 hci_conn_init_sysfs(conn);
424
1da177e4
LT
425 return conn;
426}
427
428int hci_conn_del(struct hci_conn *conn)
429{
430 struct hci_dev *hdev = conn->hdev;
431
432 BT_DBG("%s conn %p handle %d", hdev->name, conn, conn->handle);
433
04837f64
MH
434 del_timer(&conn->idle_timer);
435
19c40e3b 436 cancel_delayed_work_sync(&conn->disc_work);
1da177e4 437
9f61656a
JH
438 del_timer(&conn->auto_accept_timer);
439
5b7f9909 440 if (conn->type == ACL_LINK) {
1da177e4
LT
441 struct hci_conn *sco = conn->link;
442 if (sco)
443 sco->link = NULL;
444
445 /* Unacked frames */
446 hdev->acl_cnt += conn->sent;
6ed58ec5
VT
447 } else if (conn->type == LE_LINK) {
448 if (hdev->le_pkts)
449 hdev->le_cnt += conn->sent;
450 else
451 hdev->acl_cnt += conn->sent;
5b7f9909
MH
452 } else {
453 struct hci_conn *acl = conn->link;
454 if (acl) {
455 acl->link = NULL;
456 hci_conn_put(acl);
457 }
1da177e4
LT
458 }
459
7d0db0a3 460
2c33c06a 461 hci_chan_list_flush(conn);
73d80deb 462
1da177e4 463 hci_conn_hash_del(hdev, conn);
3c54711c 464 if (hdev->notify)
1da177e4 465 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
7d0db0a3 466
1da177e4 467 skb_queue_purge(&conn->data_q);
1da177e4 468
9eba32b8 469 hci_conn_put_device(conn);
2ae9a6be 470
384943ec
MH
471 hci_dev_put(hdev);
472
163f4dab
TT
473 if (conn->handle == 0)
474 kfree(conn);
475
1da177e4
LT
476 return 0;
477}
478
479struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src)
480{
481 int use_src = bacmp(src, BDADDR_ANY);
8035ded4 482 struct hci_dev *hdev = NULL, *d;
1da177e4
LT
483
484 BT_DBG("%s -> %s", batostr(src), batostr(dst));
485
f20d09d5 486 read_lock(&hci_dev_list_lock);
1da177e4 487
8035ded4 488 list_for_each_entry(d, &hci_dev_list, list) {
1da177e4
LT
489 if (!test_bit(HCI_UP, &d->flags) || test_bit(HCI_RAW, &d->flags))
490 continue;
491
8e87d142 492 /* Simple routing:
1da177e4
LT
493 * No source address - find interface with bdaddr != dst
494 * Source address - find interface with bdaddr == src
495 */
496
497 if (use_src) {
498 if (!bacmp(&d->bdaddr, src)) {
499 hdev = d; break;
500 }
501 } else {
502 if (bacmp(&d->bdaddr, dst)) {
503 hdev = d; break;
504 }
505 }
506 }
507
508 if (hdev)
509 hdev = hci_dev_hold(hdev);
510
f20d09d5 511 read_unlock(&hci_dev_list_lock);
1da177e4
LT
512 return hdev;
513}
514EXPORT_SYMBOL(hci_get_route);
515
fcd89c09 516/* Create SCO, ACL or LE connection.
1da177e4 517 * Device _must_ be locked */
8c1b2355 518struct hci_conn *hci_connect(struct hci_dev *hdev, int type, bdaddr_t *dst, __u8 sec_level, __u8 auth_type)
1da177e4
LT
519{
520 struct hci_conn *acl;
5b7f9909 521 struct hci_conn *sco;
fcd89c09 522 struct hci_conn *le;
1da177e4
LT
523
524 BT_DBG("%s dst %s", hdev->name, batostr(dst));
525
fcd89c09 526 if (type == LE_LINK) {
eda42b50
AG
527 struct adv_entry *entry;
528
fcd89c09 529 le = hci_conn_hash_lookup_ba(hdev, LE_LINK, dst);
15c4794f 530 if (le)
30e76272 531 return ERR_PTR(-EBUSY);
eda42b50
AG
532
533 entry = hci_find_adv_entry(hdev, dst);
534 if (!entry)
535 return ERR_PTR(-EHOSTUNREACH);
536
15c4794f 537 le = hci_conn_add(hdev, LE_LINK, dst);
fcd89c09 538 if (!le)
30e76272 539 return ERR_PTR(-ENOMEM);
893d6751 540
eda42b50
AG
541 le->dst_type = entry->bdaddr_type;
542
893d6751 543 hci_le_connect(le);
fcd89c09
VT
544
545 hci_conn_hold(le);
546
547 return le;
548 }
549
70f23020
AE
550 acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
551 if (!acl) {
552 acl = hci_conn_add(hdev, ACL_LINK, dst);
553 if (!acl)
1da177e4
LT
554 return NULL;
555 }
556
557 hci_conn_hold(acl);
558
09ab6f4c 559 if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
765c2a96
JH
560 acl->sec_level = BT_SECURITY_LOW;
561 acl->pending_sec_level = sec_level;
09ab6f4c 562 acl->auth_type = auth_type;
1da177e4 563 hci_acl_connect(acl);
09ab6f4c 564 }
1da177e4 565
5b7f9909
MH
566 if (type == ACL_LINK)
567 return acl;
1da177e4 568
70f23020
AE
569 sco = hci_conn_hash_lookup_ba(hdev, type, dst);
570 if (!sco) {
571 sco = hci_conn_add(hdev, type, dst);
572 if (!sco) {
5b7f9909
MH
573 hci_conn_put(acl);
574 return NULL;
1da177e4 575 }
5b7f9909 576 }
1da177e4 577
5b7f9909
MH
578 acl->link = sco;
579 sco->link = acl;
1da177e4 580
5b7f9909 581 hci_conn_hold(sco);
1da177e4 582
5b7f9909 583 if (acl->state == BT_CONNECTED &&
b6a0dc82 584 (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
58a681ef 585 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
14b12d0b 586 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
c390216b 587
51a8efd7 588 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
e73439d8 589 /* defer SCO setup until mode change completed */
51a8efd7 590 set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
e73439d8
MH
591 return sco;
592 }
593
594 hci_sco_setup(acl, 0x00);
b6a0dc82 595 }
5b7f9909
MH
596
597 return sco;
1da177e4
LT
598}
599EXPORT_SYMBOL(hci_connect);
600
e7c29cb1
MH
601/* Check link security requirement */
602int hci_conn_check_link_mode(struct hci_conn *conn)
603{
604 BT_DBG("conn %p", conn);
605
aa64a8b5 606 if (hci_conn_ssp_enabled(conn) && !(conn->link_mode & HCI_LM_ENCRYPT))
e7c29cb1
MH
607 return 0;
608
609 return 1;
610}
611EXPORT_SYMBOL(hci_conn_check_link_mode);
612
1da177e4 613/* Authenticate remote device */
0684e5f9 614static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
1da177e4
LT
615{
616 BT_DBG("conn %p", conn);
617
765c2a96
JH
618 if (conn->pending_sec_level > sec_level)
619 sec_level = conn->pending_sec_level;
620
96a31833 621 if (sec_level > conn->sec_level)
765c2a96 622 conn->pending_sec_level = sec_level;
96a31833 623 else if (conn->link_mode & HCI_LM_AUTH)
1da177e4
LT
624 return 1;
625
65cf686e
JH
626 /* Make sure we preserve an existing MITM requirement*/
627 auth_type |= (conn->auth_type & 0x01);
628
96a31833
MH
629 conn->auth_type = auth_type;
630
51a8efd7 631 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
1da177e4 632 struct hci_cp_auth_requested cp;
b7d05bad
PH
633
634 /* encrypt must be pending if auth is also pending */
635 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
636
aca3192c 637 cp.handle = cpu_to_le16(conn->handle);
40be492f
MH
638 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
639 sizeof(cp), &cp);
19f8def0 640 if (conn->key_type != 0xff)
51a8efd7 641 set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
1da177e4 642 }
8c1b2355 643
1da177e4
LT
644 return 0;
645}
1da177e4 646
13d39315
WR
647/* Encrypt the the link */
648static void hci_conn_encrypt(struct hci_conn *conn)
649{
650 BT_DBG("conn %p", conn);
651
51a8efd7 652 if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
13d39315
WR
653 struct hci_cp_set_conn_encrypt cp;
654 cp.handle = cpu_to_le16(conn->handle);
655 cp.encrypt = 0x01;
656 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
657 &cp);
658 }
659}
660
8c1b2355 661/* Enable security */
0684e5f9 662int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
1da177e4
LT
663{
664 BT_DBG("conn %p", conn);
665
13d39315 666 /* For sdp we don't need the link key. */
8c1b2355
MH
667 if (sec_level == BT_SECURITY_SDP)
668 return 1;
669
13d39315
WR
670 /* For non 2.1 devices and low security level we don't need the link
671 key. */
aa64a8b5 672 if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
3fdca1e1 673 return 1;
8c1b2355 674
13d39315
WR
675 /* For other security levels we need the link key. */
676 if (!(conn->link_mode & HCI_LM_AUTH))
677 goto auth;
678
679 /* An authenticated combination key has sufficient security for any
680 security level. */
681 if (conn->key_type == HCI_LK_AUTH_COMBINATION)
682 goto encrypt;
683
684 /* An unauthenticated combination key has sufficient security for
685 security level 1 and 2. */
686 if (conn->key_type == HCI_LK_UNAUTH_COMBINATION &&
687 (sec_level == BT_SECURITY_MEDIUM ||
688 sec_level == BT_SECURITY_LOW))
689 goto encrypt;
690
691 /* A combination key has always sufficient security for the security
692 levels 1 or 2. High security level requires the combination key
693 is generated using maximum PIN code length (16).
694 For pre 2.1 units. */
695 if (conn->key_type == HCI_LK_COMBINATION &&
696 (sec_level != BT_SECURITY_HIGH ||
697 conn->pin_length == 16))
698 goto encrypt;
699
700auth:
51a8efd7 701 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
1da177e4
LT
702 return 0;
703
6fdf658c
LAD
704 if (!hci_conn_auth(conn, sec_level, auth_type))
705 return 0;
13d39315
WR
706
707encrypt:
708 if (conn->link_mode & HCI_LM_ENCRYPT)
709 return 1;
8c1b2355 710
13d39315 711 hci_conn_encrypt(conn);
1da177e4
LT
712 return 0;
713}
8c1b2355 714EXPORT_SYMBOL(hci_conn_security);
1da177e4 715
b3b1b061
WR
716/* Check secure link requirement */
717int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
718{
719 BT_DBG("conn %p", conn);
720
721 if (sec_level != BT_SECURITY_HIGH)
722 return 1; /* Accept if non-secure is required */
723
ef4177e2 724 if (conn->sec_level == BT_SECURITY_HIGH)
b3b1b061
WR
725 return 1;
726
727 return 0; /* Reject not secure link */
728}
729EXPORT_SYMBOL(hci_conn_check_secure);
730
1da177e4
LT
731/* Change link key */
732int hci_conn_change_link_key(struct hci_conn *conn)
733{
734 BT_DBG("conn %p", conn);
735
51a8efd7 736 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
1da177e4 737 struct hci_cp_change_conn_link_key cp;
aca3192c 738 cp.handle = cpu_to_le16(conn->handle);
40be492f
MH
739 hci_send_cmd(conn->hdev, HCI_OP_CHANGE_CONN_LINK_KEY,
740 sizeof(cp), &cp);
1da177e4 741 }
8c1b2355 742
1da177e4
LT
743 return 0;
744}
745EXPORT_SYMBOL(hci_conn_change_link_key);
746
747/* Switch role */
8c1b2355 748int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
1da177e4
LT
749{
750 BT_DBG("conn %p", conn);
751
752 if (!role && conn->link_mode & HCI_LM_MASTER)
753 return 1;
754
51a8efd7 755 if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
1da177e4
LT
756 struct hci_cp_switch_role cp;
757 bacpy(&cp.bdaddr, &conn->dst);
758 cp.role = role;
a9de9248 759 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
1da177e4 760 }
8c1b2355 761
1da177e4
LT
762 return 0;
763}
764EXPORT_SYMBOL(hci_conn_switch_role);
765
04837f64 766/* Enter active mode */
14b12d0b 767void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
04837f64
MH
768{
769 struct hci_dev *hdev = conn->hdev;
770
771 BT_DBG("conn %p mode %d", conn, conn->mode);
772
773 if (test_bit(HCI_RAW, &hdev->flags))
774 return;
775
14b12d0b
JG
776 if (conn->mode != HCI_CM_SNIFF)
777 goto timer;
778
58a681ef 779 if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
04837f64
MH
780 goto timer;
781
51a8efd7 782 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
04837f64 783 struct hci_cp_exit_sniff_mode cp;
aca3192c 784 cp.handle = cpu_to_le16(conn->handle);
a9de9248 785 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
04837f64
MH
786 }
787
788timer:
789 if (hdev->idle_timeout > 0)
790 mod_timer(&conn->idle_timer,
791 jiffies + msecs_to_jiffies(hdev->idle_timeout));
792}
793
1da177e4
LT
794/* Drop all connection on the device */
795void hci_conn_hash_flush(struct hci_dev *hdev)
796{
797 struct hci_conn_hash *h = &hdev->conn_hash;
3c4e0df0 798 struct hci_conn *c, *n;
1da177e4
LT
799
800 BT_DBG("hdev %s", hdev->name);
801
3c4e0df0 802 list_for_each_entry_safe(c, n, &h->list, list) {
1da177e4
LT
803 c->state = BT_CLOSED;
804
9f5a0d7b 805 hci_proto_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
1da177e4
LT
806 hci_conn_del(c);
807 }
808}
809
a9de9248
MH
810/* Check pending connect attempts */
811void hci_conn_check_pending(struct hci_dev *hdev)
812{
813 struct hci_conn *conn;
814
815 BT_DBG("hdev %s", hdev->name);
816
817 hci_dev_lock(hdev);
818
819 conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
820 if (conn)
821 hci_acl_connect(conn);
822
823 hci_dev_unlock(hdev);
824}
825
9eba32b8
MH
826void hci_conn_hold_device(struct hci_conn *conn)
827{
828 atomic_inc(&conn->devref);
829}
830EXPORT_SYMBOL(hci_conn_hold_device);
831
832void hci_conn_put_device(struct hci_conn *conn)
833{
834 if (atomic_dec_and_test(&conn->devref))
835 hci_conn_del_sysfs(conn);
836}
837EXPORT_SYMBOL(hci_conn_put_device);
838
1da177e4
LT
839int hci_get_conn_list(void __user *arg)
840{
8035ded4 841 register struct hci_conn *c;
1da177e4
LT
842 struct hci_conn_list_req req, *cl;
843 struct hci_conn_info *ci;
844 struct hci_dev *hdev;
1da177e4
LT
845 int n = 0, size, err;
846
847 if (copy_from_user(&req, arg, sizeof(req)))
848 return -EFAULT;
849
850 if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
851 return -EINVAL;
852
853 size = sizeof(req) + req.conn_num * sizeof(*ci);
854
70f23020
AE
855 cl = kmalloc(size, GFP_KERNEL);
856 if (!cl)
1da177e4
LT
857 return -ENOMEM;
858
70f23020
AE
859 hdev = hci_dev_get(req.dev_id);
860 if (!hdev) {
1da177e4
LT
861 kfree(cl);
862 return -ENODEV;
863 }
864
865 ci = cl->conn_info;
866
09fd0de5 867 hci_dev_lock(hdev);
8035ded4 868 list_for_each_entry(c, &hdev->conn_hash.list, list) {
1da177e4
LT
869 bacpy(&(ci + n)->bdaddr, &c->dst);
870 (ci + n)->handle = c->handle;
871 (ci + n)->type = c->type;
872 (ci + n)->out = c->out;
873 (ci + n)->state = c->state;
874 (ci + n)->link_mode = c->link_mode;
875 if (++n >= req.conn_num)
876 break;
877 }
09fd0de5 878 hci_dev_unlock(hdev);
1da177e4
LT
879
880 cl->dev_id = hdev->id;
881 cl->conn_num = n;
882 size = sizeof(req) + n * sizeof(*ci);
883
884 hci_dev_put(hdev);
885
886 err = copy_to_user(arg, cl, size);
887 kfree(cl);
888
889 return err ? -EFAULT : 0;
890}
891
892int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
893{
894 struct hci_conn_info_req req;
895 struct hci_conn_info ci;
896 struct hci_conn *conn;
897 char __user *ptr = arg + sizeof(req);
898
899 if (copy_from_user(&req, arg, sizeof(req)))
900 return -EFAULT;
901
09fd0de5 902 hci_dev_lock(hdev);
1da177e4
LT
903 conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
904 if (conn) {
905 bacpy(&ci.bdaddr, &conn->dst);
906 ci.handle = conn->handle;
907 ci.type = conn->type;
908 ci.out = conn->out;
909 ci.state = conn->state;
910 ci.link_mode = conn->link_mode;
911 }
09fd0de5 912 hci_dev_unlock(hdev);
1da177e4
LT
913
914 if (!conn)
915 return -ENOENT;
916
917 return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
918}
40be492f
MH
919
920int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
921{
922 struct hci_auth_info_req req;
923 struct hci_conn *conn;
924
925 if (copy_from_user(&req, arg, sizeof(req)))
926 return -EFAULT;
927
09fd0de5 928 hci_dev_lock(hdev);
40be492f
MH
929 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
930 if (conn)
931 req.type = conn->auth_type;
09fd0de5 932 hci_dev_unlock(hdev);
40be492f
MH
933
934 if (!conn)
935 return -ENOENT;
936
937 return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
938}
73d80deb
LAD
939
940struct hci_chan *hci_chan_create(struct hci_conn *conn)
941{
942 struct hci_dev *hdev = conn->hdev;
943 struct hci_chan *chan;
944
945 BT_DBG("%s conn %p", hdev->name, conn);
946
75d7735c 947 chan = kzalloc(sizeof(struct hci_chan), GFP_KERNEL);
73d80deb
LAD
948 if (!chan)
949 return NULL;
950
951 chan->conn = conn;
952 skb_queue_head_init(&chan->data_q);
953
8192edef 954 list_add_rcu(&chan->list, &conn->chan_list);
73d80deb
LAD
955
956 return chan;
957}
958
959int hci_chan_del(struct hci_chan *chan)
960{
961 struct hci_conn *conn = chan->conn;
962 struct hci_dev *hdev = conn->hdev;
963
964 BT_DBG("%s conn %p chan %p", hdev->name, conn, chan);
965
8192edef
GP
966 list_del_rcu(&chan->list);
967
968 synchronize_rcu();
73d80deb
LAD
969
970 skb_queue_purge(&chan->data_q);
971 kfree(chan);
972
973 return 0;
974}
975
2c33c06a 976void hci_chan_list_flush(struct hci_conn *conn)
73d80deb 977{
2a5a5ec6 978 struct hci_chan *chan, *n;
73d80deb
LAD
979
980 BT_DBG("conn %p", conn);
981
2a5a5ec6 982 list_for_each_entry_safe(chan, n, &conn->chan_list, list)
73d80deb
LAD
983 hci_chan_del(chan);
984}
This page took 0.636759 seconds and 5 git commands to generate.