2 BlueZ - Bluetooth protocol stack for Linux
3 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
20 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22 SOFTWARE IS DISCLAIMED.
25 /* Bluetooth HCI connection handling. */
27 #include <linux/module.h>
29 #include <linux/types.h>
30 #include <linux/errno.h>
31 #include <linux/kernel.h>
32 #include <linux/slab.h>
33 #include <linux/poll.h>
34 #include <linux/fcntl.h>
35 #include <linux/init.h>
36 #include <linux/skbuff.h>
37 #include <linux/interrupt.h>
38 #include <linux/notifier.h>
41 #include <asm/system.h>
42 #include <linux/uaccess.h>
43 #include <asm/unaligned.h>
45 #include <net/bluetooth/bluetooth.h>
46 #include <net/bluetooth/hci_core.h>
48 static void hci_le_connect(struct hci_conn
*conn
)
50 struct hci_dev
*hdev
= conn
->hdev
;
51 struct hci_cp_le_create_conn cp
;
53 conn
->state
= BT_CONNECT
;
55 conn
->link_mode
|= HCI_LM_MASTER
;
56 conn
->sec_level
= BT_SECURITY_LOW
;
58 memset(&cp
, 0, sizeof(cp
));
59 cp
.scan_interval
= cpu_to_le16(0x0060);
60 cp
.scan_window
= cpu_to_le16(0x0030);
61 bacpy(&cp
.peer_addr
, &conn
->dst
);
62 cp
.peer_addr_type
= conn
->dst_type
;
63 cp
.conn_interval_min
= cpu_to_le16(0x0028);
64 cp
.conn_interval_max
= cpu_to_le16(0x0038);
65 cp
.supervision_timeout
= cpu_to_le16(0x002a);
66 cp
.min_ce_len
= cpu_to_le16(0x0000);
67 cp
.max_ce_len
= cpu_to_le16(0x0000);
69 hci_send_cmd(hdev
, HCI_OP_LE_CREATE_CONN
, sizeof(cp
), &cp
);
72 static void hci_le_connect_cancel(struct hci_conn
*conn
)
74 hci_send_cmd(conn
->hdev
, HCI_OP_LE_CREATE_CONN_CANCEL
, 0, NULL
);
77 void hci_acl_connect(struct hci_conn
*conn
)
79 struct hci_dev
*hdev
= conn
->hdev
;
80 struct inquiry_entry
*ie
;
81 struct hci_cp_create_conn cp
;
85 conn
->state
= BT_CONNECT
;
88 conn
->link_mode
= HCI_LM_MASTER
;
92 conn
->link_policy
= hdev
->link_policy
;
94 memset(&cp
, 0, sizeof(cp
));
95 bacpy(&cp
.bdaddr
, &conn
->dst
);
96 cp
.pscan_rep_mode
= 0x02;
98 ie
= hci_inquiry_cache_lookup(hdev
, &conn
->dst
);
100 if (inquiry_entry_age(ie
) <= INQUIRY_ENTRY_AGE_MAX
) {
101 cp
.pscan_rep_mode
= ie
->data
.pscan_rep_mode
;
102 cp
.pscan_mode
= ie
->data
.pscan_mode
;
103 cp
.clock_offset
= ie
->data
.clock_offset
|
107 memcpy(conn
->dev_class
, ie
->data
.dev_class
, 3);
108 if (ie
->data
.ssp_mode
> 0)
109 set_bit(HCI_CONN_SSP_ENABLED
, &conn
->flags
);
112 cp
.pkt_type
= cpu_to_le16(conn
->pkt_type
);
113 if (lmp_rswitch_capable(hdev
) && !(hdev
->link_mode
& HCI_LM_MASTER
))
114 cp
.role_switch
= 0x01;
116 cp
.role_switch
= 0x00;
118 hci_send_cmd(hdev
, HCI_OP_CREATE_CONN
, sizeof(cp
), &cp
);
121 static void hci_acl_connect_cancel(struct hci_conn
*conn
)
123 struct hci_cp_create_conn_cancel cp
;
127 if (conn
->hdev
->hci_ver
< BLUETOOTH_VER_1_2
)
130 bacpy(&cp
.bdaddr
, &conn
->dst
);
131 hci_send_cmd(conn
->hdev
, HCI_OP_CREATE_CONN_CANCEL
, sizeof(cp
), &cp
);
134 void hci_acl_disconn(struct hci_conn
*conn
, __u8 reason
)
136 struct hci_cp_disconnect cp
;
140 conn
->state
= BT_DISCONN
;
142 cp
.handle
= cpu_to_le16(conn
->handle
);
144 hci_send_cmd(conn
->hdev
, HCI_OP_DISCONNECT
, sizeof(cp
), &cp
);
147 void hci_add_sco(struct hci_conn
*conn
, __u16 handle
)
149 struct hci_dev
*hdev
= conn
->hdev
;
150 struct hci_cp_add_sco cp
;
154 conn
->state
= BT_CONNECT
;
159 cp
.handle
= cpu_to_le16(handle
);
160 cp
.pkt_type
= cpu_to_le16(conn
->pkt_type
);
162 hci_send_cmd(hdev
, HCI_OP_ADD_SCO
, sizeof(cp
), &cp
);
165 void hci_setup_sync(struct hci_conn
*conn
, __u16 handle
)
167 struct hci_dev
*hdev
= conn
->hdev
;
168 struct hci_cp_setup_sync_conn cp
;
172 conn
->state
= BT_CONNECT
;
177 cp
.handle
= cpu_to_le16(handle
);
178 cp
.pkt_type
= cpu_to_le16(conn
->pkt_type
);
180 cp
.tx_bandwidth
= cpu_to_le32(0x00001f40);
181 cp
.rx_bandwidth
= cpu_to_le32(0x00001f40);
182 cp
.max_latency
= cpu_to_le16(0xffff);
183 cp
.voice_setting
= cpu_to_le16(hdev
->voice_setting
);
184 cp
.retrans_effort
= 0xff;
186 hci_send_cmd(hdev
, HCI_OP_SETUP_SYNC_CONN
, sizeof(cp
), &cp
);
189 void hci_le_conn_update(struct hci_conn
*conn
, u16 min
, u16 max
,
190 u16 latency
, u16 to_multiplier
)
192 struct hci_cp_le_conn_update cp
;
193 struct hci_dev
*hdev
= conn
->hdev
;
195 memset(&cp
, 0, sizeof(cp
));
197 cp
.handle
= cpu_to_le16(conn
->handle
);
198 cp
.conn_interval_min
= cpu_to_le16(min
);
199 cp
.conn_interval_max
= cpu_to_le16(max
);
200 cp
.conn_latency
= cpu_to_le16(latency
);
201 cp
.supervision_timeout
= cpu_to_le16(to_multiplier
);
202 cp
.min_ce_len
= cpu_to_le16(0x0001);
203 cp
.max_ce_len
= cpu_to_le16(0x0001);
205 hci_send_cmd(hdev
, HCI_OP_LE_CONN_UPDATE
, sizeof(cp
), &cp
);
207 EXPORT_SYMBOL(hci_le_conn_update
);
209 void hci_le_start_enc(struct hci_conn
*conn
, __le16 ediv
, __u8 rand
[8],
212 struct hci_dev
*hdev
= conn
->hdev
;
213 struct hci_cp_le_start_enc cp
;
217 memset(&cp
, 0, sizeof(cp
));
219 cp
.handle
= cpu_to_le16(conn
->handle
);
220 memcpy(cp
.ltk
, ltk
, sizeof(cp
.ltk
));
222 memcpy(cp
.rand
, rand
, sizeof(cp
.rand
));
224 hci_send_cmd(hdev
, HCI_OP_LE_START_ENC
, sizeof(cp
), &cp
);
226 EXPORT_SYMBOL(hci_le_start_enc
);
228 void hci_le_ltk_reply(struct hci_conn
*conn
, u8 ltk
[16])
230 struct hci_dev
*hdev
= conn
->hdev
;
231 struct hci_cp_le_ltk_reply cp
;
235 memset(&cp
, 0, sizeof(cp
));
237 cp
.handle
= cpu_to_le16(conn
->handle
);
238 memcpy(cp
.ltk
, ltk
, sizeof(ltk
));
240 hci_send_cmd(hdev
, HCI_OP_LE_LTK_REPLY
, sizeof(cp
), &cp
);
242 EXPORT_SYMBOL(hci_le_ltk_reply
);
244 void hci_le_ltk_neg_reply(struct hci_conn
*conn
)
246 struct hci_dev
*hdev
= conn
->hdev
;
247 struct hci_cp_le_ltk_neg_reply cp
;
251 memset(&cp
, 0, sizeof(cp
));
253 cp
.handle
= cpu_to_le16(conn
->handle
);
255 hci_send_cmd(hdev
, HCI_OP_LE_LTK_NEG_REPLY
, sizeof(cp
), &cp
);
258 /* Device _must_ be locked */
259 void hci_sco_setup(struct hci_conn
*conn
, __u8 status
)
261 struct hci_conn
*sco
= conn
->link
;
269 if (lmp_esco_capable(conn
->hdev
))
270 hci_setup_sync(sco
, conn
->handle
);
272 hci_add_sco(sco
, conn
->handle
);
274 hci_proto_connect_cfm(sco
, status
);
279 static void hci_conn_timeout(struct work_struct
*work
)
281 struct hci_conn
*conn
= container_of(work
, struct hci_conn
,
285 BT_DBG("conn %p state %d", conn
, conn
->state
);
287 if (atomic_read(&conn
->refcnt
))
290 switch (conn
->state
) {
294 if (conn
->type
== ACL_LINK
)
295 hci_acl_connect_cancel(conn
);
296 else if (conn
->type
== LE_LINK
)
297 hci_le_connect_cancel(conn
);
302 reason
= hci_proto_disconn_ind(conn
);
303 hci_acl_disconn(conn
, reason
);
306 conn
->state
= BT_CLOSED
;
311 /* Enter sniff mode */
312 static void hci_conn_enter_sniff_mode(struct hci_conn
*conn
)
314 struct hci_dev
*hdev
= conn
->hdev
;
316 BT_DBG("conn %p mode %d", conn
, conn
->mode
);
318 if (test_bit(HCI_RAW
, &hdev
->flags
))
321 if (!lmp_sniff_capable(hdev
) || !lmp_sniff_capable(conn
))
324 if (conn
->mode
!= HCI_CM_ACTIVE
|| !(conn
->link_policy
& HCI_LP_SNIFF
))
327 if (lmp_sniffsubr_capable(hdev
) && lmp_sniffsubr_capable(conn
)) {
328 struct hci_cp_sniff_subrate cp
;
329 cp
.handle
= cpu_to_le16(conn
->handle
);
330 cp
.max_latency
= cpu_to_le16(0);
331 cp
.min_remote_timeout
= cpu_to_le16(0);
332 cp
.min_local_timeout
= cpu_to_le16(0);
333 hci_send_cmd(hdev
, HCI_OP_SNIFF_SUBRATE
, sizeof(cp
), &cp
);
336 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND
, &conn
->flags
)) {
337 struct hci_cp_sniff_mode cp
;
338 cp
.handle
= cpu_to_le16(conn
->handle
);
339 cp
.max_interval
= cpu_to_le16(hdev
->sniff_max_interval
);
340 cp
.min_interval
= cpu_to_le16(hdev
->sniff_min_interval
);
341 cp
.attempt
= cpu_to_le16(4);
342 cp
.timeout
= cpu_to_le16(1);
343 hci_send_cmd(hdev
, HCI_OP_SNIFF_MODE
, sizeof(cp
), &cp
);
347 static void hci_conn_idle(unsigned long arg
)
349 struct hci_conn
*conn
= (void *) arg
;
351 BT_DBG("conn %p mode %d", conn
, conn
->mode
);
353 hci_conn_enter_sniff_mode(conn
);
356 static void hci_conn_auto_accept(unsigned long arg
)
358 struct hci_conn
*conn
= (void *) arg
;
359 struct hci_dev
*hdev
= conn
->hdev
;
361 hci_send_cmd(hdev
, HCI_OP_USER_CONFIRM_REPLY
, sizeof(conn
->dst
),
365 struct hci_conn
*hci_conn_add(struct hci_dev
*hdev
, int type
, bdaddr_t
*dst
)
367 struct hci_conn
*conn
;
369 BT_DBG("%s dst %s", hdev
->name
, batostr(dst
));
371 conn
= kzalloc(sizeof(struct hci_conn
), GFP_KERNEL
);
375 bacpy(&conn
->dst
, dst
);
378 conn
->mode
= HCI_CM_ACTIVE
;
379 conn
->state
= BT_OPEN
;
380 conn
->auth_type
= HCI_AT_GENERAL_BONDING
;
381 conn
->io_capability
= hdev
->io_capability
;
382 conn
->remote_auth
= 0xff;
383 conn
->key_type
= 0xff;
385 set_bit(HCI_CONN_POWER_SAVE
, &conn
->flags
);
386 conn
->disc_timeout
= HCI_DISCONN_TIMEOUT
;
390 conn
->pkt_type
= hdev
->pkt_type
& ACL_PTYPE_MASK
;
393 if (lmp_esco_capable(hdev
))
394 conn
->pkt_type
= (hdev
->esco_type
& SCO_ESCO_MASK
) |
395 (hdev
->esco_type
& EDR_ESCO_MASK
);
397 conn
->pkt_type
= hdev
->pkt_type
& SCO_PTYPE_MASK
;
400 conn
->pkt_type
= hdev
->esco_type
& ~EDR_ESCO_MASK
;
404 skb_queue_head_init(&conn
->data_q
);
406 INIT_LIST_HEAD(&conn
->chan_list
);;
408 INIT_DELAYED_WORK(&conn
->disc_work
, hci_conn_timeout
);
409 setup_timer(&conn
->idle_timer
, hci_conn_idle
, (unsigned long)conn
);
410 setup_timer(&conn
->auto_accept_timer
, hci_conn_auto_accept
,
411 (unsigned long) conn
);
413 atomic_set(&conn
->refcnt
, 0);
417 hci_conn_hash_add(hdev
, conn
);
419 hdev
->notify(hdev
, HCI_NOTIFY_CONN_ADD
);
421 atomic_set(&conn
->devref
, 0);
423 hci_conn_init_sysfs(conn
);
428 int hci_conn_del(struct hci_conn
*conn
)
430 struct hci_dev
*hdev
= conn
->hdev
;
432 BT_DBG("%s conn %p handle %d", hdev
->name
, conn
, conn
->handle
);
434 del_timer(&conn
->idle_timer
);
436 cancel_delayed_work_sync(&conn
->disc_work
);
438 del_timer(&conn
->auto_accept_timer
);
440 if (conn
->type
== ACL_LINK
) {
441 struct hci_conn
*sco
= conn
->link
;
446 hdev
->acl_cnt
+= conn
->sent
;
447 } else if (conn
->type
== LE_LINK
) {
449 hdev
->le_cnt
+= conn
->sent
;
451 hdev
->acl_cnt
+= conn
->sent
;
453 struct hci_conn
*acl
= conn
->link
;
461 hci_chan_list_flush(conn
);
463 hci_conn_hash_del(hdev
, conn
);
465 hdev
->notify(hdev
, HCI_NOTIFY_CONN_DEL
);
467 skb_queue_purge(&conn
->data_q
);
469 hci_conn_put_device(conn
);
473 if (conn
->handle
== 0)
479 struct hci_dev
*hci_get_route(bdaddr_t
*dst
, bdaddr_t
*src
)
481 int use_src
= bacmp(src
, BDADDR_ANY
);
482 struct hci_dev
*hdev
= NULL
, *d
;
484 BT_DBG("%s -> %s", batostr(src
), batostr(dst
));
486 read_lock(&hci_dev_list_lock
);
488 list_for_each_entry(d
, &hci_dev_list
, list
) {
489 if (!test_bit(HCI_UP
, &d
->flags
) || test_bit(HCI_RAW
, &d
->flags
))
493 * No source address - find interface with bdaddr != dst
494 * Source address - find interface with bdaddr == src
498 if (!bacmp(&d
->bdaddr
, src
)) {
502 if (bacmp(&d
->bdaddr
, dst
)) {
509 hdev
= hci_dev_hold(hdev
);
511 read_unlock(&hci_dev_list_lock
);
514 EXPORT_SYMBOL(hci_get_route
);
516 /* Create SCO, ACL or LE connection.
517 * Device _must_ be locked */
518 struct hci_conn
*hci_connect(struct hci_dev
*hdev
, int type
, bdaddr_t
*dst
, __u8 sec_level
, __u8 auth_type
)
520 struct hci_conn
*acl
;
521 struct hci_conn
*sco
;
524 BT_DBG("%s dst %s", hdev
->name
, batostr(dst
));
526 if (type
== LE_LINK
) {
527 struct adv_entry
*entry
;
529 le
= hci_conn_hash_lookup_ba(hdev
, LE_LINK
, dst
);
531 return ERR_PTR(-EBUSY
);
533 entry
= hci_find_adv_entry(hdev
, dst
);
535 return ERR_PTR(-EHOSTUNREACH
);
537 le
= hci_conn_add(hdev
, LE_LINK
, dst
);
539 return ERR_PTR(-ENOMEM
);
541 le
->dst_type
= entry
->bdaddr_type
;
550 acl
= hci_conn_hash_lookup_ba(hdev
, ACL_LINK
, dst
);
552 acl
= hci_conn_add(hdev
, ACL_LINK
, dst
);
559 if (acl
->state
== BT_OPEN
|| acl
->state
== BT_CLOSED
) {
560 acl
->sec_level
= BT_SECURITY_LOW
;
561 acl
->pending_sec_level
= sec_level
;
562 acl
->auth_type
= auth_type
;
563 hci_acl_connect(acl
);
566 if (type
== ACL_LINK
)
569 sco
= hci_conn_hash_lookup_ba(hdev
, type
, dst
);
571 sco
= hci_conn_add(hdev
, type
, dst
);
583 if (acl
->state
== BT_CONNECTED
&&
584 (sco
->state
== BT_OPEN
|| sco
->state
== BT_CLOSED
)) {
585 set_bit(HCI_CONN_POWER_SAVE
, &acl
->flags
);
586 hci_conn_enter_active_mode(acl
, BT_POWER_FORCE_ACTIVE_ON
);
588 if (test_bit(HCI_CONN_MODE_CHANGE_PEND
, &acl
->flags
)) {
589 /* defer SCO setup until mode change completed */
590 set_bit(HCI_CONN_SCO_SETUP_PEND
, &acl
->flags
);
594 hci_sco_setup(acl
, 0x00);
599 EXPORT_SYMBOL(hci_connect
);
601 /* Check link security requirement */
602 int hci_conn_check_link_mode(struct hci_conn
*conn
)
604 BT_DBG("conn %p", conn
);
606 if (hci_conn_ssp_enabled(conn
) && !(conn
->link_mode
& HCI_LM_ENCRYPT
))
611 EXPORT_SYMBOL(hci_conn_check_link_mode
);
613 /* Authenticate remote device */
614 static int hci_conn_auth(struct hci_conn
*conn
, __u8 sec_level
, __u8 auth_type
)
616 BT_DBG("conn %p", conn
);
618 if (conn
->pending_sec_level
> sec_level
)
619 sec_level
= conn
->pending_sec_level
;
621 if (sec_level
> conn
->sec_level
)
622 conn
->pending_sec_level
= sec_level
;
623 else if (conn
->link_mode
& HCI_LM_AUTH
)
626 /* Make sure we preserve an existing MITM requirement*/
627 auth_type
|= (conn
->auth_type
& 0x01);
629 conn
->auth_type
= auth_type
;
631 if (!test_and_set_bit(HCI_CONN_AUTH_PEND
, &conn
->flags
)) {
632 struct hci_cp_auth_requested cp
;
634 /* encrypt must be pending if auth is also pending */
635 set_bit(HCI_CONN_ENCRYPT_PEND
, &conn
->flags
);
637 cp
.handle
= cpu_to_le16(conn
->handle
);
638 hci_send_cmd(conn
->hdev
, HCI_OP_AUTH_REQUESTED
,
640 if (conn
->key_type
!= 0xff)
641 set_bit(HCI_CONN_REAUTH_PEND
, &conn
->flags
);
647 /* Encrypt the the link */
648 static void hci_conn_encrypt(struct hci_conn
*conn
)
650 BT_DBG("conn %p", conn
);
652 if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND
, &conn
->flags
)) {
653 struct hci_cp_set_conn_encrypt cp
;
654 cp
.handle
= cpu_to_le16(conn
->handle
);
656 hci_send_cmd(conn
->hdev
, HCI_OP_SET_CONN_ENCRYPT
, sizeof(cp
),
661 /* Enable security */
662 int hci_conn_security(struct hci_conn
*conn
, __u8 sec_level
, __u8 auth_type
)
664 BT_DBG("conn %p", conn
);
666 /* For sdp we don't need the link key. */
667 if (sec_level
== BT_SECURITY_SDP
)
670 /* For non 2.1 devices and low security level we don't need the link
672 if (sec_level
== BT_SECURITY_LOW
&& !hci_conn_ssp_enabled(conn
))
675 /* For other security levels we need the link key. */
676 if (!(conn
->link_mode
& HCI_LM_AUTH
))
679 /* An authenticated combination key has sufficient security for any
681 if (conn
->key_type
== HCI_LK_AUTH_COMBINATION
)
684 /* An unauthenticated combination key has sufficient security for
685 security level 1 and 2. */
686 if (conn
->key_type
== HCI_LK_UNAUTH_COMBINATION
&&
687 (sec_level
== BT_SECURITY_MEDIUM
||
688 sec_level
== BT_SECURITY_LOW
))
691 /* A combination key has always sufficient security for the security
692 levels 1 or 2. High security level requires the combination key
693 is generated using maximum PIN code length (16).
694 For pre 2.1 units. */
695 if (conn
->key_type
== HCI_LK_COMBINATION
&&
696 (sec_level
!= BT_SECURITY_HIGH
||
697 conn
->pin_length
== 16))
701 if (test_bit(HCI_CONN_ENCRYPT_PEND
, &conn
->flags
))
704 if (!hci_conn_auth(conn
, sec_level
, auth_type
))
708 if (conn
->link_mode
& HCI_LM_ENCRYPT
)
711 hci_conn_encrypt(conn
);
714 EXPORT_SYMBOL(hci_conn_security
);
716 /* Check secure link requirement */
717 int hci_conn_check_secure(struct hci_conn
*conn
, __u8 sec_level
)
719 BT_DBG("conn %p", conn
);
721 if (sec_level
!= BT_SECURITY_HIGH
)
722 return 1; /* Accept if non-secure is required */
724 if (conn
->sec_level
== BT_SECURITY_HIGH
)
727 return 0; /* Reject not secure link */
729 EXPORT_SYMBOL(hci_conn_check_secure
);
731 /* Change link key */
732 int hci_conn_change_link_key(struct hci_conn
*conn
)
734 BT_DBG("conn %p", conn
);
736 if (!test_and_set_bit(HCI_CONN_AUTH_PEND
, &conn
->flags
)) {
737 struct hci_cp_change_conn_link_key cp
;
738 cp
.handle
= cpu_to_le16(conn
->handle
);
739 hci_send_cmd(conn
->hdev
, HCI_OP_CHANGE_CONN_LINK_KEY
,
745 EXPORT_SYMBOL(hci_conn_change_link_key
);
748 int hci_conn_switch_role(struct hci_conn
*conn
, __u8 role
)
750 BT_DBG("conn %p", conn
);
752 if (!role
&& conn
->link_mode
& HCI_LM_MASTER
)
755 if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND
, &conn
->flags
)) {
756 struct hci_cp_switch_role cp
;
757 bacpy(&cp
.bdaddr
, &conn
->dst
);
759 hci_send_cmd(conn
->hdev
, HCI_OP_SWITCH_ROLE
, sizeof(cp
), &cp
);
764 EXPORT_SYMBOL(hci_conn_switch_role
);
766 /* Enter active mode */
767 void hci_conn_enter_active_mode(struct hci_conn
*conn
, __u8 force_active
)
769 struct hci_dev
*hdev
= conn
->hdev
;
771 BT_DBG("conn %p mode %d", conn
, conn
->mode
);
773 if (test_bit(HCI_RAW
, &hdev
->flags
))
776 if (conn
->mode
!= HCI_CM_SNIFF
)
779 if (!test_bit(HCI_CONN_POWER_SAVE
, &conn
->flags
) && !force_active
)
782 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND
, &conn
->flags
)) {
783 struct hci_cp_exit_sniff_mode cp
;
784 cp
.handle
= cpu_to_le16(conn
->handle
);
785 hci_send_cmd(hdev
, HCI_OP_EXIT_SNIFF_MODE
, sizeof(cp
), &cp
);
789 if (hdev
->idle_timeout
> 0)
790 mod_timer(&conn
->idle_timer
,
791 jiffies
+ msecs_to_jiffies(hdev
->idle_timeout
));
794 /* Drop all connection on the device */
795 void hci_conn_hash_flush(struct hci_dev
*hdev
)
797 struct hci_conn_hash
*h
= &hdev
->conn_hash
;
798 struct hci_conn
*c
, *n
;
800 BT_DBG("hdev %s", hdev
->name
);
802 list_for_each_entry_safe(c
, n
, &h
->list
, list
) {
803 c
->state
= BT_CLOSED
;
805 hci_proto_disconn_cfm(c
, HCI_ERROR_LOCAL_HOST_TERM
);
810 /* Check pending connect attempts */
811 void hci_conn_check_pending(struct hci_dev
*hdev
)
813 struct hci_conn
*conn
;
815 BT_DBG("hdev %s", hdev
->name
);
819 conn
= hci_conn_hash_lookup_state(hdev
, ACL_LINK
, BT_CONNECT2
);
821 hci_acl_connect(conn
);
823 hci_dev_unlock(hdev
);
826 void hci_conn_hold_device(struct hci_conn
*conn
)
828 atomic_inc(&conn
->devref
);
830 EXPORT_SYMBOL(hci_conn_hold_device
);
832 void hci_conn_put_device(struct hci_conn
*conn
)
834 if (atomic_dec_and_test(&conn
->devref
))
835 hci_conn_del_sysfs(conn
);
837 EXPORT_SYMBOL(hci_conn_put_device
);
839 int hci_get_conn_list(void __user
*arg
)
841 register struct hci_conn
*c
;
842 struct hci_conn_list_req req
, *cl
;
843 struct hci_conn_info
*ci
;
844 struct hci_dev
*hdev
;
845 int n
= 0, size
, err
;
847 if (copy_from_user(&req
, arg
, sizeof(req
)))
850 if (!req
.conn_num
|| req
.conn_num
> (PAGE_SIZE
* 2) / sizeof(*ci
))
853 size
= sizeof(req
) + req
.conn_num
* sizeof(*ci
);
855 cl
= kmalloc(size
, GFP_KERNEL
);
859 hdev
= hci_dev_get(req
.dev_id
);
868 list_for_each_entry(c
, &hdev
->conn_hash
.list
, list
) {
869 bacpy(&(ci
+ n
)->bdaddr
, &c
->dst
);
870 (ci
+ n
)->handle
= c
->handle
;
871 (ci
+ n
)->type
= c
->type
;
872 (ci
+ n
)->out
= c
->out
;
873 (ci
+ n
)->state
= c
->state
;
874 (ci
+ n
)->link_mode
= c
->link_mode
;
875 if (++n
>= req
.conn_num
)
878 hci_dev_unlock(hdev
);
880 cl
->dev_id
= hdev
->id
;
882 size
= sizeof(req
) + n
* sizeof(*ci
);
886 err
= copy_to_user(arg
, cl
, size
);
889 return err
? -EFAULT
: 0;
892 int hci_get_conn_info(struct hci_dev
*hdev
, void __user
*arg
)
894 struct hci_conn_info_req req
;
895 struct hci_conn_info ci
;
896 struct hci_conn
*conn
;
897 char __user
*ptr
= arg
+ sizeof(req
);
899 if (copy_from_user(&req
, arg
, sizeof(req
)))
903 conn
= hci_conn_hash_lookup_ba(hdev
, req
.type
, &req
.bdaddr
);
905 bacpy(&ci
.bdaddr
, &conn
->dst
);
906 ci
.handle
= conn
->handle
;
907 ci
.type
= conn
->type
;
909 ci
.state
= conn
->state
;
910 ci
.link_mode
= conn
->link_mode
;
912 hci_dev_unlock(hdev
);
917 return copy_to_user(ptr
, &ci
, sizeof(ci
)) ? -EFAULT
: 0;
920 int hci_get_auth_info(struct hci_dev
*hdev
, void __user
*arg
)
922 struct hci_auth_info_req req
;
923 struct hci_conn
*conn
;
925 if (copy_from_user(&req
, arg
, sizeof(req
)))
929 conn
= hci_conn_hash_lookup_ba(hdev
, ACL_LINK
, &req
.bdaddr
);
931 req
.type
= conn
->auth_type
;
932 hci_dev_unlock(hdev
);
937 return copy_to_user(arg
, &req
, sizeof(req
)) ? -EFAULT
: 0;
940 struct hci_chan
*hci_chan_create(struct hci_conn
*conn
)
942 struct hci_dev
*hdev
= conn
->hdev
;
943 struct hci_chan
*chan
;
945 BT_DBG("%s conn %p", hdev
->name
, conn
);
947 chan
= kzalloc(sizeof(struct hci_chan
), GFP_KERNEL
);
952 skb_queue_head_init(&chan
->data_q
);
954 list_add_rcu(&chan
->list
, &conn
->chan_list
);
959 int hci_chan_del(struct hci_chan
*chan
)
961 struct hci_conn
*conn
= chan
->conn
;
962 struct hci_dev
*hdev
= conn
->hdev
;
964 BT_DBG("%s conn %p chan %p", hdev
->name
, conn
, chan
);
966 list_del_rcu(&chan
->list
);
970 skb_queue_purge(&chan
->data_q
);
976 void hci_chan_list_flush(struct hci_conn
*conn
)
978 struct hci_chan
*chan
;
980 BT_DBG("conn %p", conn
);
982 list_for_each_entry_rcu(chan
, &conn
->chan_list
, list
)