blob: 7ff92dd4c53cd4c783986776ae89308b439ebc3f [file] [log] [blame]
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 BlueZ - Bluetooth protocol stack for Linux
Ron Shaffer2d0a0342010-05-28 11:53:46 -04003 Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
Linus Torvalds1da177e2005-04-16 15:20:36 -07004
5 Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License version 2 as
9 published by the Free Software Foundation;
10
11 THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12 OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13 FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14 IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090015 CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16 WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
Linus Torvalds1da177e2005-04-16 15:20:36 -070018 OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +090020 ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21 COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
Linus Torvalds1da177e2005-04-16 15:20:36 -070022 SOFTWARE IS DISCLAIMED.
23*/
24
25/* Bluetooth HCI connection handling. */
26
Gustavo Padovan8c520a52012-05-23 04:04:22 -030027#include <linux/export.h>
Marcel Holtmann23b9ceb2014-12-20 17:13:41 +010028#include <linux/debugfs.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070029
30#include <net/bluetooth/bluetooth.h>
31#include <net/bluetooth/hci_core.h>
Johan Hedberg4bc58f52014-05-20 09:45:47 +030032#include <net/bluetooth/l2cap.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070033
Johan Hedberg0857dd32014-12-19 13:40:20 +020034#include "hci_request.h"
Marcel Holtmannac4b7232013-10-10 14:54:16 -070035#include "smp.h"
Marcel Holtmann70247282013-10-10 14:54:15 -070036#include "a2mp.h"
37
Frédéric Dalleau2dea6322013-08-19 14:24:03 +020038struct sco_param {
39 u16 pkt_type;
40 u16 max_latency;
Johan Hedbergc7da5792014-09-24 22:41:46 +030041 u8 retrans_effort;
Frédéric Dalleau2dea6322013-08-19 14:24:03 +020042};
43
Bernhard Thaler48e68ff2014-09-23 11:01:07 +020044static const struct sco_param esco_param_cvsd[] = {
Johan Hedbergc7da5792014-09-24 22:41:46 +030045 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000a, 0x01 }, /* S3 */
46 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x0007, 0x01 }, /* S2 */
47 { EDR_ESCO_MASK | ESCO_EV3, 0x0007, 0x01 }, /* S1 */
48 { EDR_ESCO_MASK | ESCO_HV3, 0xffff, 0x01 }, /* D1 */
49 { EDR_ESCO_MASK | ESCO_HV1, 0xffff, 0x01 }, /* D0 */
Frédéric Dalleau2dea6322013-08-19 14:24:03 +020050};
51
Bernhard Thaler48e68ff2014-09-23 11:01:07 +020052static const struct sco_param sco_param_cvsd[] = {
Johan Hedbergc7da5792014-09-24 22:41:46 +030053 { EDR_ESCO_MASK | ESCO_HV3, 0xffff, 0xff }, /* D1 */
54 { EDR_ESCO_MASK | ESCO_HV1, 0xffff, 0xff }, /* D0 */
Bernhard Thaler48e68ff2014-09-23 11:01:07 +020055};
56
Johan Hedberg565766b2014-09-25 09:48:01 +030057static const struct sco_param esco_param_msbc[] = {
Johan Hedbergc7da5792014-09-24 22:41:46 +030058 { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000d, 0x02 }, /* T2 */
59 { EDR_ESCO_MASK | ESCO_EV3, 0x0008, 0x02 }, /* T1 */
Frédéric Dalleau2dea6322013-08-19 14:24:03 +020060};
61
Jakub Pawlowskif75113a2015-08-07 20:22:53 +020062/* This function requires the caller holds hdev->lock */
63static void hci_connect_le_scan_cleanup(struct hci_conn *conn)
64{
65 struct hci_conn_params *params;
Johan Hedbergb5c2b622015-10-21 18:03:09 +030066 struct hci_dev *hdev = conn->hdev;
Jakub Pawlowskif75113a2015-08-07 20:22:53 +020067 struct smp_irk *irk;
68 bdaddr_t *bdaddr;
69 u8 bdaddr_type;
70
71 bdaddr = &conn->dst;
72 bdaddr_type = conn->dst_type;
73
74 /* Check if we need to convert to identity address */
Johan Hedbergb5c2b622015-10-21 18:03:09 +030075 irk = hci_get_irk(hdev, bdaddr, bdaddr_type);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +020076 if (irk) {
77 bdaddr = &irk->bdaddr;
78 bdaddr_type = irk->addr_type;
79 }
80
Johan Hedberg17bc08f2015-10-21 18:03:10 +030081 params = hci_pend_le_action_lookup(&hdev->pend_le_conns, bdaddr,
82 bdaddr_type);
83 if (!params || !params->explicit_connect)
Jakub Pawlowskif75113a2015-08-07 20:22:53 +020084 return;
85
86 /* The connection attempt was doing scan for new RPA, and is
87 * in scan phase. If params are not associated with any other
88 * autoconnect action, remove them completely. If they are, just unmark
89 * them as waiting for connection, by clearing explicit_connect field.
90 */
Johan Hedberg9ad3e6f2015-10-16 10:07:53 +030091 params->explicit_connect = false;
92
93 list_del_init(&params->action);
94
95 switch (params->auto_connect) {
96 case HCI_AUTO_CONN_EXPLICIT:
Johan Hedbergb5c2b622015-10-21 18:03:09 +030097 hci_conn_params_del(hdev, bdaddr, bdaddr_type);
Johan Hedberg9ad3e6f2015-10-16 10:07:53 +030098 /* return instead of break to avoid duplicate scan update */
99 return;
100 case HCI_AUTO_CONN_DIRECT:
101 case HCI_AUTO_CONN_ALWAYS:
Johan Hedbergb5c2b622015-10-21 18:03:09 +0300102 list_add(&params->action, &hdev->pend_le_conns);
Johan Hedberg9ad3e6f2015-10-16 10:07:53 +0300103 break;
104 case HCI_AUTO_CONN_REPORT:
Johan Hedbergb5c2b622015-10-21 18:03:09 +0300105 list_add(&params->action, &hdev->pend_le_reports);
Johan Hedberg9ad3e6f2015-10-16 10:07:53 +0300106 break;
107 default:
108 break;
Jakub Pawlowski168b8a22015-10-16 10:07:49 +0300109 }
Johan Hedberg9ad3e6f2015-10-16 10:07:53 +0300110
Johan Hedbergb5c2b622015-10-21 18:03:09 +0300111 hci_update_background_scan(hdev);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +0200112}
113
Johan Hedbergb958f9a2015-10-16 10:07:50 +0300114static void hci_conn_cleanup(struct hci_conn *conn)
115{
116 struct hci_dev *hdev = conn->hdev;
117
118 if (test_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags))
119 hci_conn_params_del(conn->hdev, &conn->dst, conn->dst_type);
120
121 hci_chan_list_flush(conn);
122
123 hci_conn_hash_del(hdev, conn);
124
125 if (hdev->notify)
126 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
127
128 hci_conn_del_sysfs(conn);
129
130 debugfs_remove_recursive(conn->debugfs);
131
132 hci_dev_put(hdev);
133
134 hci_conn_put(conn);
135}
136
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300137static void le_scan_cleanup(struct work_struct *work)
138{
139 struct hci_conn *conn = container_of(work, struct hci_conn,
140 le_scan_cleanup);
141 struct hci_dev *hdev = conn->hdev;
142 struct hci_conn *c = NULL;
143
144 BT_DBG("%s hcon %p", hdev->name, conn);
145
146 hci_dev_lock(hdev);
147
148 /* Check that the hci_conn is still around */
149 rcu_read_lock();
150 list_for_each_entry_rcu(c, &hdev->conn_hash.list, list) {
151 if (c == conn)
152 break;
153 }
154 rcu_read_unlock();
155
156 if (c == conn) {
157 hci_connect_le_scan_cleanup(conn);
158 hci_conn_cleanup(conn);
159 }
160
161 hci_dev_unlock(hdev);
162 hci_dev_put(hdev);
163 hci_conn_put(conn);
164}
165
Jakub Pawlowskif75113a2015-08-07 20:22:53 +0200166static void hci_connect_le_scan_remove(struct hci_conn *conn)
167{
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300168 BT_DBG("%s hcon %p", conn->hdev->name, conn);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +0200169
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300170 /* We can't call hci_conn_del/hci_conn_cleanup here since that
171 * could deadlock with another hci_conn_del() call that's holding
172 * hci_dev_lock and doing cancel_delayed_work_sync(&conn->disc_work).
173 * Instead, grab temporary extra references to the hci_dev and
174 * hci_conn and perform the necessary cleanup in a separate work
175 * callback.
Johan Hedbergb958f9a2015-10-16 10:07:50 +0300176 */
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300177
178 hci_dev_hold(conn->hdev);
179 hci_conn_get(conn);
180
Johan Hedberg0ebc1812015-11-06 13:35:33 +0200181 /* Even though we hold a reference to the hdev, many other
182 * things might get cleaned up meanwhile, including the hdev's
183 * own workqueue, so we can't use that for scheduling.
184 */
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300185 schedule_work(&conn->le_scan_cleanup);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +0200186}
187
Vinicius Costa Gomes1aef8662012-07-27 19:32:55 -0300188static void hci_acl_create_connection(struct hci_conn *conn)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700189{
190 struct hci_dev *hdev = conn->hdev;
191 struct inquiry_entry *ie;
192 struct hci_cp_create_conn cp;
193
Andrei Emeltchenko42d2d872012-02-17 11:40:57 +0200194 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195
196 conn->state = BT_CONNECT;
Johan Hedberga0c808b2012-01-16 09:49:58 +0200197 conn->out = true;
Johan Hedberg40bef302014-07-16 11:42:27 +0300198 conn->role = HCI_ROLE_MASTER;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700199
Marcel Holtmann4c67bc72006-10-15 17:30:56 +0200200 conn->attempt++;
201
Marcel Holtmanne4e8e372008-07-14 20:13:47 +0200202 conn->link_policy = hdev->link_policy;
203
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204 memset(&cp, 0, sizeof(cp));
205 bacpy(&cp.bdaddr, &conn->dst);
206 cp.pscan_rep_mode = 0x02;
207
Andrei Emeltchenko70f230202010-12-01 16:58:25 +0200208 ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
209 if (ie) {
Marcel Holtmann41a96212008-07-14 20:13:48 +0200210 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
211 cp.pscan_rep_mode = ie->data.pscan_rep_mode;
212 cp.pscan_mode = ie->data.pscan_mode;
213 cp.clock_offset = ie->data.clock_offset |
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700214 cpu_to_le16(0x8000);
Marcel Holtmann41a96212008-07-14 20:13:48 +0200215 }
216
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217 memcpy(conn->dev_class, ie->data.dev_class, 3);
Johan Hedberg58a681e2012-01-16 06:47:28 +0200218 if (ie->data.ssp_mode > 0)
219 set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 }
221
Marcel Holtmanna8746412008-07-14 20:13:46 +0200222 cp.pkt_type = cpu_to_le16(conn->pkt_type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223 if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200224 cp.role_switch = 0x01;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700225 else
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200226 cp.role_switch = 0x00;
Marcel Holtmann4c67bc72006-10-15 17:30:56 +0200227
Marcel Holtmanna9de9242007-10-20 13:33:56 +0200228 hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700229}
230
Johan Hedberge3b679d2014-08-18 20:33:32 +0300231int hci_disconnect(struct hci_conn *conn, __u8 reason)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700232{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300233 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700234
Johan Hedberg839035a2014-08-18 20:33:34 +0300235 /* When we are master of an established connection and it enters
236 * the disconnect timeout, then go ahead and try to read the
237 * current clock offset. Processing of the result is done
238 * within the event handling and hci_clock_offset_evt function.
239 */
Johan Hedberg88d07fe2015-10-22 10:49:39 +0300240 if (conn->type == ACL_LINK && conn->role == HCI_ROLE_MASTER &&
241 (conn->state == BT_CONNECTED || conn->state == BT_CONFIG)) {
Johan Hedberg839035a2014-08-18 20:33:34 +0300242 struct hci_dev *hdev = conn->hdev;
Fabian Frederick4f639ed2014-10-25 10:48:58 +0200243 struct hci_cp_read_clock_offset clkoff_cp;
Johan Hedberg839035a2014-08-18 20:33:34 +0300244
Fabian Frederick4f639ed2014-10-25 10:48:58 +0200245 clkoff_cp.handle = cpu_to_le16(conn->handle);
246 hci_send_cmd(hdev, HCI_OP_READ_CLOCK_OFFSET, sizeof(clkoff_cp),
247 &clkoff_cp);
Johan Hedberg839035a2014-08-18 20:33:34 +0300248 }
249
Johan Hedberg88d07fe2015-10-22 10:49:39 +0300250 return hci_abort_conn(conn, reason);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700251}
252
Vinicius Costa Gomes57f5d0d2012-07-27 19:32:54 -0300253static void hci_add_sco(struct hci_conn *conn, __u16 handle)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700254{
255 struct hci_dev *hdev = conn->hdev;
256 struct hci_cp_add_sco cp;
257
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300258 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700259
260 conn->state = BT_CONNECT;
Johan Hedberga0c808b2012-01-16 09:49:58 +0200261 conn->out = true;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700262
Marcel Holtmannefc76882009-02-06 09:13:37 +0100263 conn->attempt++;
264
YOSHIFUJI Hideakiaca31922007-03-25 20:12:50 -0700265 cp.handle = cpu_to_le16(handle);
Marcel Holtmanna8746412008-07-14 20:13:46 +0200266 cp.pkt_type = cpu_to_le16(conn->pkt_type);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267
Marcel Holtmanna9de9242007-10-20 13:33:56 +0200268 hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269}
270
Frédéric Dalleau2dea6322013-08-19 14:24:03 +0200271bool hci_setup_sync(struct hci_conn *conn, __u16 handle)
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200272{
273 struct hci_dev *hdev = conn->hdev;
274 struct hci_cp_setup_sync_conn cp;
Frédéric Dalleau2dea6322013-08-19 14:24:03 +0200275 const struct sco_param *param;
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200276
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300277 BT_DBG("hcon %p", conn);
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200278
279 conn->state = BT_CONNECT;
Johan Hedberga0c808b2012-01-16 09:49:58 +0200280 conn->out = true;
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200281
Marcel Holtmannefc76882009-02-06 09:13:37 +0100282 conn->attempt++;
283
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200284 cp.handle = cpu_to_le16(handle);
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200285
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700286 cp.tx_bandwidth = cpu_to_le32(0x00001f40);
287 cp.rx_bandwidth = cpu_to_le32(0x00001f40);
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +0200288 cp.voice_setting = cpu_to_le16(conn->setting);
289
290 switch (conn->setting & SCO_AIRMODE_MASK) {
291 case SCO_AIRMODE_TRANSP:
Johan Hedberg565766b2014-09-25 09:48:01 +0300292 if (conn->attempt > ARRAY_SIZE(esco_param_msbc))
Frédéric Dalleau2dea6322013-08-19 14:24:03 +0200293 return false;
Johan Hedberg565766b2014-09-25 09:48:01 +0300294 param = &esco_param_msbc[conn->attempt - 1];
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +0200295 break;
296 case SCO_AIRMODE_CVSD:
Bernhard Thaler48e68ff2014-09-23 11:01:07 +0200297 if (lmp_esco_capable(conn->link)) {
298 if (conn->attempt > ARRAY_SIZE(esco_param_cvsd))
299 return false;
Bernhard Thaler48e68ff2014-09-23 11:01:07 +0200300 param = &esco_param_cvsd[conn->attempt - 1];
301 } else {
302 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
303 return false;
Bernhard Thaler48e68ff2014-09-23 11:01:07 +0200304 param = &sco_param_cvsd[conn->attempt - 1];
305 }
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +0200306 break;
Frédéric Dalleau2dea6322013-08-19 14:24:03 +0200307 default:
308 return false;
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +0200309 }
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200310
Johan Hedbergc7da5792014-09-24 22:41:46 +0300311 cp.retrans_effort = param->retrans_effort;
Frédéric Dalleau2dea6322013-08-19 14:24:03 +0200312 cp.pkt_type = __cpu_to_le16(param->pkt_type);
313 cp.max_latency = __cpu_to_le16(param->max_latency);
314
315 if (hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp) < 0)
316 return false;
317
318 return true;
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +0200319}
320
Johan Hedberg7d6ca692014-07-02 17:37:31 +0300321u8 hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max, u16 latency,
322 u16 to_multiplier)
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200323{
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200324 struct hci_dev *hdev = conn->hdev;
Marcel Holtmannf044eb02014-06-29 16:43:26 +0200325 struct hci_conn_params *params;
326 struct hci_cp_le_conn_update cp;
327
328 hci_dev_lock(hdev);
329
330 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
331 if (params) {
332 params->conn_min_interval = min;
333 params->conn_max_interval = max;
334 params->conn_latency = latency;
335 params->supervision_timeout = to_multiplier;
336 }
337
338 hci_dev_unlock(hdev);
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200339
340 memset(&cp, 0, sizeof(cp));
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200341 cp.handle = cpu_to_le16(conn->handle);
342 cp.conn_interval_min = cpu_to_le16(min);
343 cp.conn_interval_max = cpu_to_le16(max);
344 cp.conn_latency = cpu_to_le16(latency);
345 cp.supervision_timeout = cpu_to_le16(to_multiplier);
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700346 cp.min_ce_len = cpu_to_le16(0x0000);
347 cp.max_ce_len = cpu_to_le16(0x0000);
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200348
349 hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
Johan Hedberg7d6ca692014-07-02 17:37:31 +0300350
351 if (params)
352 return 0x01;
353
354 return 0x00;
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200355}
Claudio Takahasi2ce603e2011-02-16 20:44:53 -0200356
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -0800357void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __le64 rand,
Johan Hedberg8b76ce32015-06-08 18:14:39 +0300358 __u8 ltk[16], __u8 key_size)
Vinicius Costa Gomesa7a595f2011-06-09 18:50:47 -0300359{
360 struct hci_dev *hdev = conn->hdev;
361 struct hci_cp_le_start_enc cp;
362
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300363 BT_DBG("hcon %p", conn);
Vinicius Costa Gomesa7a595f2011-06-09 18:50:47 -0300364
365 memset(&cp, 0, sizeof(cp));
366
367 cp.handle = cpu_to_le16(conn->handle);
Marcel Holtmannfe39c7b2014-02-27 16:00:28 -0800368 cp.rand = rand;
Vinicius Costa Gomesa7a595f2011-06-09 18:50:47 -0300369 cp.ediv = ediv;
Johan Hedberg8b76ce32015-06-08 18:14:39 +0300370 memcpy(cp.ltk, ltk, key_size);
Vinicius Costa Gomesa7a595f2011-06-09 18:50:47 -0300371
372 hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
373}
Vinicius Costa Gomesa7a595f2011-06-09 18:50:47 -0300374
Marcel Holtmanne73439d2010-07-26 10:06:00 -0400375/* Device _must_ be locked */
376void hci_sco_setup(struct hci_conn *conn, __u8 status)
377{
378 struct hci_conn *sco = conn->link;
379
Marcel Holtmanne73439d2010-07-26 10:06:00 -0400380 if (!sco)
381 return;
382
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300383 BT_DBG("hcon %p", conn);
384
Marcel Holtmanne73439d2010-07-26 10:06:00 -0400385 if (!status) {
386 if (lmp_esco_capable(conn->hdev))
387 hci_setup_sync(sco, conn->handle);
388 else
389 hci_add_sco(sco, conn->handle);
390 } else {
Johan Hedberg539c4962015-02-18 14:53:57 +0200391 hci_connect_cfm(sco, status);
Marcel Holtmanne73439d2010-07-26 10:06:00 -0400392 hci_conn_del(sco);
393 }
394}
395
Gustavo F. Padovan19c40e32011-06-17 13:03:21 -0300396static void hci_conn_timeout(struct work_struct *work)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700397{
Gustavo F. Padovan19c40e32011-06-17 13:03:21 -0300398 struct hci_conn *conn = container_of(work, struct hci_conn,
Gustavo Padovan5974e4c2012-05-17 00:36:25 -0300399 disc_work.work);
Lukasz Rymanowski1d56dc42014-06-17 13:04:20 +0200400 int refcnt = atomic_read(&conn->refcnt);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300402 BT_DBG("hcon %p state %s", conn, state_to_string(conn->state));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700403
Lukasz Rymanowski1d56dc42014-06-17 13:04:20 +0200404 WARN_ON(refcnt < 0);
405
406 /* FIXME: It was observed that in pairing failed scenario, refcnt
407 * drops below 0. Probably this is because l2cap_conn_del calls
408 * l2cap_chan_del for each channel, and inside l2cap_chan_del conn is
409 * dropped. After that loop hci_chan_del is called which also drops
410 * conn. For now make sure that ACL is alive if refcnt is higher then 0,
411 * otherwise drop it.
412 */
413 if (refcnt > 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414 return;
415
Johan Hedberg89e0ccc2015-10-22 10:49:38 +0300416 /* LE connections in scanning state need special handling */
417 if (conn->state == BT_CONNECT && conn->type == LE_LINK &&
418 test_bit(HCI_CONN_SCANNING, &conn->flags)) {
419 hci_connect_le_scan_remove(conn);
420 return;
Marcel Holtmann6ac59342006-09-26 09:43:48 +0200421 }
Johan Hedberg89e0ccc2015-10-22 10:49:38 +0300422
423 hci_abort_conn(conn, hci_proto_disconn_ind(conn));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700424}
425
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200426/* Enter sniff mode */
Johan Hedberga74a84f2013-10-16 18:11:40 +0300427static void hci_conn_idle(struct work_struct *work)
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200428{
Johan Hedberga74a84f2013-10-16 18:11:40 +0300429 struct hci_conn *conn = container_of(work, struct hci_conn,
430 idle_work.work);
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200431 struct hci_dev *hdev = conn->hdev;
432
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300433 BT_DBG("hcon %p mode %d", conn, conn->mode);
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200434
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200435 if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
436 return;
437
438 if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
439 return;
440
441 if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
442 struct hci_cp_sniff_subrate cp;
443 cp.handle = cpu_to_le16(conn->handle);
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700444 cp.max_latency = cpu_to_le16(0);
445 cp.min_remote_timeout = cpu_to_le16(0);
446 cp.min_local_timeout = cpu_to_le16(0);
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200447 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
448 }
449
Johan Hedberg51a8efd2012-01-16 06:10:31 +0200450 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200451 struct hci_cp_sniff_mode cp;
452 cp.handle = cpu_to_le16(conn->handle);
453 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
454 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
Joe Perchesdcf4adb2014-03-12 10:52:35 -0700455 cp.attempt = cpu_to_le16(4);
456 cp.timeout = cpu_to_le16(1);
Gustavo F. Padovan416dc942011-12-07 13:24:33 -0200457 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
458 }
459}
460
Johan Hedberg7bc18d92013-10-16 18:11:39 +0300461static void hci_conn_auto_accept(struct work_struct *work)
Johan Hedberg9f616562011-04-28 11:28:54 -0700462{
Johan Hedberg7bc18d92013-10-16 18:11:39 +0300463 struct hci_conn *conn = container_of(work, struct hci_conn,
464 auto_accept_work.work);
Johan Hedberg9f616562011-04-28 11:28:54 -0700465
Johan Hedberg7bc18d92013-10-16 18:11:39 +0300466 hci_send_cmd(conn->hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
Gustavo Padovan5974e4c2012-05-17 00:36:25 -0300467 &conn->dst);
Johan Hedberg9f616562011-04-28 11:28:54 -0700468}
469
Johan Hedberg9489eca2014-02-28 17:45:46 +0200470static void le_conn_timeout(struct work_struct *work)
471{
472 struct hci_conn *conn = container_of(work, struct hci_conn,
473 le_conn_timeout.work);
Johan Hedberg3c857752014-03-25 10:30:49 +0200474 struct hci_dev *hdev = conn->hdev;
Johan Hedberg9489eca2014-02-28 17:45:46 +0200475
476 BT_DBG("");
477
Johan Hedberg3c857752014-03-25 10:30:49 +0200478 /* We could end up here due to having done directed advertising,
479 * so clean up the state if necessary. This should however only
480 * happen with broken hardware or if low duty cycle was used
481 * (which doesn't have a timeout of its own).
482 */
Johan Hedberg0b1db38c2014-10-28 22:23:27 +0100483 if (conn->role == HCI_ROLE_SLAVE) {
Johan Hedberg3c857752014-03-25 10:30:49 +0200484 u8 enable = 0x00;
485 hci_send_cmd(hdev, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable),
486 &enable);
487 hci_le_conn_failed(conn, HCI_ERROR_ADVERTISING_TIMEOUT);
488 return;
489 }
490
Johan Hedberg89e0ccc2015-10-22 10:49:38 +0300491 hci_abort_conn(conn, HCI_ERROR_REMOTE_USER_TERM);
Johan Hedberg9489eca2014-02-28 17:45:46 +0200492}
493
Johan Hedberga5c4e302014-07-16 11:56:07 +0300494struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst,
495 u8 role)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700496{
497 struct hci_conn *conn;
498
Andrei Emeltchenko6ed93dc2012-09-25 12:49:43 +0300499 BT_DBG("%s dst %pMR", hdev->name, dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700500
Johan Hedberg27f70f32014-07-21 10:50:06 +0300501 conn = kzalloc(sizeof(*conn), GFP_KERNEL);
Marcel Holtmann04837f62006-07-03 10:02:33 +0200502 if (!conn)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700503 return NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700504
505 bacpy(&conn->dst, dst);
Marcel Holtmann662e8822013-10-13 05:23:59 -0700506 bacpy(&conn->src, &hdev->bdaddr);
Marcel Holtmanna8746412008-07-14 20:13:46 +0200507 conn->hdev = hdev;
508 conn->type = type;
Johan Hedberga5c4e302014-07-16 11:56:07 +0300509 conn->role = role;
Marcel Holtmanna8746412008-07-14 20:13:46 +0200510 conn->mode = HCI_CM_ACTIVE;
511 conn->state = BT_OPEN;
Andrei Emeltchenko93f19c92009-09-03 12:34:19 +0300512 conn->auth_type = HCI_AT_GENERAL_BONDING;
Johan Hedberg17fa4b92011-01-25 13:28:33 +0200513 conn->io_capability = hdev->io_capability;
Johan Hedberga9583552011-02-19 12:06:01 -0300514 conn->remote_auth = 0xff;
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +0200515 conn->key_type = 0xff;
Johan Hedbergebf86aa2014-12-05 13:36:08 +0200516 conn->rssi = HCI_RSSI_INVALID;
Andrzej Kaczmarek5a134fa2014-05-09 21:35:28 +0200517 conn->tx_power = HCI_TX_POWER_INVALID;
Andrzej Kaczmarekd0455ed2014-05-14 13:43:05 +0200518 conn->max_tx_power = HCI_TX_POWER_INVALID;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519
Johan Hedberg58a681e2012-01-16 06:47:28 +0200520 set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
Marcel Holtmann052b30b2009-04-26 20:01:22 +0200521 conn->disc_timeout = HCI_DISCONN_TIMEOUT;
Marcel Holtmann04837f62006-07-03 10:02:33 +0200522
Spoorthi Ravishankar Koppad302975c2019-06-21 14:51:56 +0530523 /* Set Default Authenticated payload timeout to 30s */
524 conn->auth_payload_timeout = DEFAULT_AUTH_PAYLOAD_TIMEOUT;
525
Johan Hedberga5c4e302014-07-16 11:56:07 +0300526 if (conn->role == HCI_ROLE_MASTER)
527 conn->out = true;
528
Marcel Holtmanna8746412008-07-14 20:13:46 +0200529 switch (type) {
530 case ACL_LINK:
531 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
532 break;
Johan Hedberg9c84d1d2014-03-24 20:21:50 +0200533 case LE_LINK:
534 /* conn->src should reflect the local identity address */
535 hci_copy_identity_address(hdev, &conn->src, &conn->src_type);
536 break;
Marcel Holtmanna8746412008-07-14 20:13:46 +0200537 case SCO_LINK:
538 if (lmp_esco_capable(hdev))
Marcel Holtmannefc76882009-02-06 09:13:37 +0100539 conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
540 (hdev->esco_type & EDR_ESCO_MASK);
Marcel Holtmanna8746412008-07-14 20:13:46 +0200541 else
542 conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
543 break;
544 case ESCO_LINK:
Marcel Holtmannefc76882009-02-06 09:13:37 +0100545 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
Marcel Holtmanna8746412008-07-14 20:13:46 +0200546 break;
547 }
548
Linus Torvalds1da177e2005-04-16 15:20:36 -0700549 skb_queue_head_init(&conn->data_q);
Marcel Holtmann04837f62006-07-03 10:02:33 +0200550
Marcel Holtmann70c1f202012-02-22 12:06:43 +0100551 INIT_LIST_HEAD(&conn->chan_list);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +0200552
Gustavo F. Padovan19c40e32011-06-17 13:03:21 -0300553 INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
Johan Hedberg7bc18d92013-10-16 18:11:39 +0300554 INIT_DELAYED_WORK(&conn->auto_accept_work, hci_conn_auto_accept);
Johan Hedberga74a84f2013-10-16 18:11:40 +0300555 INIT_DELAYED_WORK(&conn->idle_work, hci_conn_idle);
Johan Hedberg9489eca2014-02-28 17:45:46 +0200556 INIT_DELAYED_WORK(&conn->le_conn_timeout, le_conn_timeout);
Johan Hedberg8ce783d2015-10-21 15:21:31 +0300557 INIT_WORK(&conn->le_scan_cleanup, le_scan_cleanup);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700558
559 atomic_set(&conn->refcnt, 0);
560
561 hci_dev_hold(hdev);
562
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563 hci_conn_hash_add(hdev, conn);
Gustavo F. Padovan3c547112011-12-14 22:58:44 -0200564 if (hdev->notify)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700565 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
566
Marcel Holtmanna67e8992009-05-02 18:24:06 -0700567 hci_conn_init_sysfs(conn);
568
Linus Torvalds1da177e2005-04-16 15:20:36 -0700569 return conn;
570}
571
572int hci_conn_del(struct hci_conn *conn)
573{
574 struct hci_dev *hdev = conn->hdev;
575
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +0300576 BT_DBG("%s hcon %p handle %d", hdev->name, conn, conn->handle);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577
Gustavo F. Padovan19c40e32011-06-17 13:03:21 -0300578 cancel_delayed_work_sync(&conn->disc_work);
Johan Hedberg7bc18d92013-10-16 18:11:39 +0300579 cancel_delayed_work_sync(&conn->auto_accept_work);
Johan Hedberga74a84f2013-10-16 18:11:40 +0300580 cancel_delayed_work_sync(&conn->idle_work);
Johan Hedberg9f616562011-04-28 11:28:54 -0700581
Marcel Holtmann5b7f9902007-07-11 09:51:55 +0200582 if (conn->type == ACL_LINK) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700583 struct hci_conn *sco = conn->link;
584 if (sco)
585 sco->link = NULL;
586
587 /* Unacked frames */
588 hdev->acl_cnt += conn->sent;
Ville Tervo6ed58ec2011-02-10 22:38:48 -0300589 } else if (conn->type == LE_LINK) {
Johan Hedberg980ffc02014-10-28 22:23:26 +0100590 cancel_delayed_work(&conn->le_conn_timeout);
Johan Hedberg9489eca2014-02-28 17:45:46 +0200591
Ville Tervo6ed58ec2011-02-10 22:38:48 -0300592 if (hdev->le_pkts)
593 hdev->le_cnt += conn->sent;
594 else
595 hdev->acl_cnt += conn->sent;
Marcel Holtmann5b7f9902007-07-11 09:51:55 +0200596 } else {
597 struct hci_conn *acl = conn->link;
598 if (acl) {
599 acl->link = NULL;
David Herrmann76a68ba2013-04-06 20:28:37 +0200600 hci_conn_drop(acl);
Marcel Holtmann5b7f9902007-07-11 09:51:55 +0200601 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700602 }
603
Andrei Emeltchenko9740e492012-05-29 13:59:02 +0300604 if (conn->amp_mgr)
605 amp_mgr_put(conn->amp_mgr);
606
Linus Torvalds1da177e2005-04-16 15:20:36 -0700607 skb_queue_purge(&conn->data_q);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700608
Johan Hedbergb958f9a2015-10-16 10:07:50 +0300609 /* Remove the connection from the list and cleanup its remaining
610 * state. This is a separate function since for some cases like
611 * BT_CONNECT_SCAN we *only* want the cleanup part without the
612 * rest of hci_conn_del.
613 */
614 hci_conn_cleanup(conn);
Tomas Targownik163f4da2011-06-30 16:30:44 -0300615
Linus Torvalds1da177e2005-04-16 15:20:36 -0700616 return 0;
617}
618
Johan Hedberg39385cb2016-11-12 17:03:07 +0200619struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src, uint8_t src_type)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700620{
621 int use_src = bacmp(src, BDADDR_ANY);
Luiz Augusto von Dentz8035ded2011-11-01 10:58:56 +0200622 struct hci_dev *hdev = NULL, *d;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700623
Andrei Emeltchenko6ed93dc2012-09-25 12:49:43 +0300624 BT_DBG("%pMR -> %pMR", src, dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700625
Gustavo F. Padovanf20d09d2011-12-22 16:30:27 -0200626 read_lock(&hci_dev_list_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700627
Luiz Augusto von Dentz8035ded2011-11-01 10:58:56 +0200628 list_for_each_entry(d, &hci_dev_list, list) {
Gustavo Padovan8fc9ced2012-05-23 04:04:21 -0300629 if (!test_bit(HCI_UP, &d->flags) ||
Marcel Holtmannd7a5a112015-03-13 02:11:00 -0700630 hci_dev_test_flag(d, HCI_USER_CHANNEL) ||
Marcel Holtmannca8bee52016-07-05 14:30:14 +0200631 d->dev_type != HCI_PRIMARY)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700632 continue;
633
YOSHIFUJI Hideaki8e87d142007-02-09 23:24:33 +0900634 /* Simple routing:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700635 * No source address - find interface with bdaddr != dst
636 * Source address - find interface with bdaddr == src
637 */
638
639 if (use_src) {
Johan Hedberg39385cb2016-11-12 17:03:07 +0200640 bdaddr_t id_addr;
641 u8 id_addr_type;
642
643 if (src_type == BDADDR_BREDR) {
644 if (!lmp_bredr_capable(d))
645 continue;
646 bacpy(&id_addr, &d->bdaddr);
647 id_addr_type = BDADDR_BREDR;
648 } else {
649 if (!lmp_le_capable(d))
650 continue;
651
652 hci_copy_identity_address(d, &id_addr,
653 &id_addr_type);
654
655 /* Convert from HCI to three-value type */
656 if (id_addr_type == ADDR_LE_DEV_PUBLIC)
657 id_addr_type = BDADDR_LE_PUBLIC;
658 else
659 id_addr_type = BDADDR_LE_RANDOM;
660 }
661
662 if (!bacmp(&id_addr, src) && id_addr_type == src_type) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700663 hdev = d; break;
664 }
665 } else {
666 if (bacmp(&d->bdaddr, dst)) {
667 hdev = d; break;
668 }
669 }
670 }
671
672 if (hdev)
673 hdev = hci_dev_hold(hdev);
674
Gustavo F. Padovanf20d09d2011-12-22 16:30:27 -0200675 read_unlock(&hci_dev_list_lock);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700676 return hdev;
677}
678EXPORT_SYMBOL(hci_get_route);
679
Andre Guedes9bb3c012014-01-30 18:22:08 -0300680/* This function requires the caller holds hdev->lock */
Andre Guedes06c053f2014-02-26 20:21:41 -0300681void hci_le_conn_failed(struct hci_conn *conn, u8 status)
Andre Guedes9bb3c012014-01-30 18:22:08 -0300682{
683 struct hci_dev *hdev = conn->hdev;
Johan Hedbergf161dd42014-08-15 21:06:54 +0300684 struct hci_conn_params *params;
685
686 params = hci_pend_le_action_lookup(&hdev->pend_le_conns, &conn->dst,
687 conn->dst_type);
688 if (params && params->conn) {
689 hci_conn_drop(params->conn);
Johan Hedbergf8aaf9b2014-08-17 23:28:57 +0300690 hci_conn_put(params->conn);
Johan Hedbergf161dd42014-08-15 21:06:54 +0300691 params->conn = NULL;
692 }
Andre Guedes9bb3c012014-01-30 18:22:08 -0300693
694 conn->state = BT_CLOSED;
695
Johan Hedbergacb9f912015-12-03 12:45:20 +0200696 /* If the status indicates successful cancellation of
697 * the attempt (i.e. Unkown Connection Id) there's no point of
698 * notifying failure since we'll go back to keep trying to
699 * connect. The only exception is explicit connect requests
700 * where a timeout + cancel does indicate an actual failure.
701 */
702 if (status != HCI_ERROR_UNKNOWN_CONN_ID ||
703 (params && params->explicit_connect))
704 mgmt_connect_failed(hdev, &conn->dst, conn->type,
705 conn->dst_type, status);
Andre Guedes9bb3c012014-01-30 18:22:08 -0300706
Johan Hedberg539c4962015-02-18 14:53:57 +0200707 hci_connect_cfm(conn, status);
Andre Guedes9bb3c012014-01-30 18:22:08 -0300708
709 hci_conn_del(conn);
Andre Guedesa4790db2014-02-26 20:21:47 -0300710
711 /* Since we may have temporarily stopped the background scanning in
712 * favor of connection establishment, we should restart it.
713 */
714 hci_update_background_scan(hdev);
Johan Hedberg3c857752014-03-25 10:30:49 +0200715
716 /* Re-enable advertising in case this was a failed connection
717 * attempt as a peripheral.
718 */
Johan Hedbergf2252572015-11-18 12:49:20 +0200719 hci_req_reenable_advertising(hdev);
Andre Guedes9bb3c012014-01-30 18:22:08 -0300720}
721
Marcel Holtmann1904a852015-01-11 13:50:44 -0800722static void create_le_conn_complete(struct hci_dev *hdev, u8 status, u16 opcode)
Andre Guedes1d399ae2013-10-08 08:21:17 -0300723{
724 struct hci_conn *conn;
725
Jakub Pawlowski28a667c2015-08-07 20:22:54 +0200726 hci_dev_lock(hdev);
727
728 conn = hci_lookup_le_connect(hdev);
729
730 if (!status) {
731 hci_connect_le_scan_cleanup(conn);
732 goto done;
733 }
Andre Guedes1d399ae2013-10-08 08:21:17 -0300734
Marcel Holtmann2064ee32017-10-30 10:42:59 +0100735 bt_dev_err(hdev, "request failed to create LE connection: "
736 "status 0x%2.2x", status);
Andre Guedes1d399ae2013-10-08 08:21:17 -0300737
Andre Guedes1d399ae2013-10-08 08:21:17 -0300738 if (!conn)
739 goto done;
740
Andre Guedes06c053f2014-02-26 20:21:41 -0300741 hci_le_conn_failed(conn, status);
Andre Guedes1d399ae2013-10-08 08:21:17 -0300742
743done:
744 hci_dev_unlock(hdev);
745}
746
Johan Hedberg82a37ad2016-03-09 17:30:34 +0200747static bool conn_use_rpa(struct hci_conn *conn)
748{
749 struct hci_dev *hdev = conn->hdev;
750
751 return hci_dev_test_flag(hdev, HCI_PRIVACY);
752}
753
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530754static void set_ext_conn_params(struct hci_conn *conn,
755 struct hci_cp_le_ext_conn_param *p)
756{
757 struct hci_dev *hdev = conn->hdev;
758
759 memset(p, 0, sizeof(*p));
760
761 /* Set window to be the same value as the interval to
762 * enable continuous scanning.
763 */
764 p->scan_interval = cpu_to_le16(hdev->le_scan_interval);
765 p->scan_window = p->scan_interval;
766 p->conn_interval_min = cpu_to_le16(conn->le_conn_min_interval);
767 p->conn_interval_max = cpu_to_le16(conn->le_conn_max_interval);
768 p->conn_latency = cpu_to_le16(conn->le_conn_latency);
769 p->supervision_timeout = cpu_to_le16(conn->le_supv_timeout);
770 p->min_ce_len = cpu_to_le16(0x0000);
771 p->max_ce_len = cpu_to_le16(0x0000);
772}
773
Andre Guedes2acf3d92014-02-26 20:21:42 -0300774static void hci_req_add_le_create_conn(struct hci_request *req,
Szymon Janc082f2302018-04-03 13:40:06 +0200775 struct hci_conn *conn,
776 bdaddr_t *direct_rpa)
Andre Guedes2acf3d92014-02-26 20:21:42 -0300777{
Andre Guedes2acf3d92014-02-26 20:21:42 -0300778 struct hci_dev *hdev = conn->hdev;
779 u8 own_addr_type;
780
Szymon Janc082f2302018-04-03 13:40:06 +0200781 /* If direct address was provided we use it instead of current
782 * address.
Andre Guedes2acf3d92014-02-26 20:21:42 -0300783 */
Szymon Janc082f2302018-04-03 13:40:06 +0200784 if (direct_rpa) {
785 if (bacmp(&req->hdev->random_addr, direct_rpa))
786 hci_req_add(req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
787 direct_rpa);
788
789 /* direct address is always RPA */
790 own_addr_type = ADDR_LE_DEV_RANDOM;
791 } else {
792 /* Update random address, but set require_privacy to false so
793 * that we never connect with an non-resolvable address.
794 */
795 if (hci_update_random_address(req, false, conn_use_rpa(conn),
796 &own_addr_type))
797 return;
798 }
Andre Guedes2acf3d92014-02-26 20:21:42 -0300799
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200800 if (use_ext_conn(hdev)) {
801 struct hci_cp_le_ext_create_conn *cp;
802 struct hci_cp_le_ext_conn_param *p;
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530803 u8 data[sizeof(*cp) + sizeof(*p) * 3];
804 u32 plen;
Johan Hedbergeec7a012016-03-09 17:30:32 +0200805
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200806 cp = (void *) data;
807 p = (void *) cp->data;
Johan Hedberg2f995362015-12-03 12:45:19 +0200808
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200809 memset(cp, 0, sizeof(*cp));
Andre Guedes2acf3d92014-02-26 20:21:42 -0300810
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200811 bacpy(&cp->peer_addr, &conn->dst);
812 cp->peer_addr_type = conn->dst_type;
813 cp->own_addr_type = own_addr_type;
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200814
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530815 plen = sizeof(*cp);
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200816
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530817 if (scan_1m(hdev)) {
818 cp->phys |= LE_SCAN_PHY_1M;
819 set_ext_conn_params(conn, p);
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200820
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530821 p++;
822 plen += sizeof(*p);
823 }
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200824
Jaganath Kanakkassery4e6e99e2018-07-19 17:09:39 +0530825 if (scan_2m(hdev)) {
826 cp->phys |= LE_SCAN_PHY_2M;
827 set_ext_conn_params(conn, p);
828
829 p++;
830 plen += sizeof(*p);
831 }
832
833 if (scan_coded(hdev)) {
834 cp->phys |= LE_SCAN_PHY_CODED;
835 set_ext_conn_params(conn, p);
836
837 plen += sizeof(*p);
838 }
839
840 hci_req_add(req, HCI_OP_LE_EXT_CREATE_CONN, plen, data);
Jaganath Kanakkassery4d94f952018-07-06 22:50:32 +0200841
842 } else {
843 struct hci_cp_le_create_conn cp;
844
845 memset(&cp, 0, sizeof(cp));
846
847 /* Set window to be the same value as the interval to enable
848 * continuous scanning.
849 */
850 cp.scan_interval = cpu_to_le16(hdev->le_scan_interval);
851 cp.scan_window = cp.scan_interval;
852
853 bacpy(&cp.peer_addr, &conn->dst);
854 cp.peer_addr_type = conn->dst_type;
855 cp.own_address_type = own_addr_type;
856 cp.conn_interval_min = cpu_to_le16(conn->le_conn_min_interval);
857 cp.conn_interval_max = cpu_to_le16(conn->le_conn_max_interval);
858 cp.conn_latency = cpu_to_le16(conn->le_conn_latency);
859 cp.supervision_timeout = cpu_to_le16(conn->le_supv_timeout);
860 cp.min_ce_len = cpu_to_le16(0x0000);
861 cp.max_ce_len = cpu_to_le16(0x0000);
862
863 hci_req_add(req, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
864 }
Johan Hedbergb46e0032014-02-28 12:54:15 +0200865
866 conn->state = BT_CONNECT;
Jakub Pawlowski28a667c2015-08-07 20:22:54 +0200867 clear_bit(HCI_CONN_SCANNING, &conn->flags);
Andre Guedes2acf3d92014-02-26 20:21:42 -0300868}
869
Johan Hedberg3c857752014-03-25 10:30:49 +0200870static void hci_req_directed_advertising(struct hci_request *req,
871 struct hci_conn *conn)
872{
873 struct hci_dev *hdev = req->hdev;
Johan Hedberg3c857752014-03-25 10:30:49 +0200874 u8 own_addr_type;
875 u8 enable;
876
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530877 if (ext_adv_capable(hdev)) {
878 struct hci_cp_le_set_ext_adv_params cp;
Jaganath Kanakkasserya73c0462018-07-19 17:09:45 +0530879 bdaddr_t random_addr;
880
881 /* Set require_privacy to false so that the remote device has a
882 * chance of identifying us.
883 */
884 if (hci_get_random_address(hdev, false, conn_use_rpa(conn), NULL,
885 &own_addr_type, &random_addr) < 0)
886 return;
Johan Hedberg3c857752014-03-25 10:30:49 +0200887
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530888 memset(&cp, 0, sizeof(cp));
Johan Hedberg3c857752014-03-25 10:30:49 +0200889
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530890 cp.evt_properties = cpu_to_le16(LE_LEGACY_ADV_DIRECT_IND);
891 cp.own_addr_type = own_addr_type;
892 cp.channel_map = hdev->le_adv_channel_map;
893 cp.tx_power = HCI_TX_POWER_INVALID;
894 cp.primary_phy = HCI_ADV_PHY_1M;
895 cp.secondary_phy = HCI_ADV_PHY_1M;
896 cp.handle = 0; /* Use instance 0 for directed adv */
897 cp.own_addr_type = own_addr_type;
898 cp.peer_addr_type = conn->dst_type;
899 bacpy(&cp.peer_addr, &conn->dst);
Johan Hedberg3c857752014-03-25 10:30:49 +0200900
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530901 hci_req_add(req, HCI_OP_LE_SET_EXT_ADV_PARAMS, sizeof(cp), &cp);
Johan Hedberg3c857752014-03-25 10:30:49 +0200902
Jaganath Kanakkasserya73c0462018-07-19 17:09:45 +0530903 if (own_addr_type == ADDR_LE_DEV_RANDOM &&
904 bacmp(&random_addr, BDADDR_ANY) &&
905 bacmp(&random_addr, &hdev->random_addr)) {
906 struct hci_cp_le_set_adv_set_rand_addr cp;
907
908 memset(&cp, 0, sizeof(cp));
909
910 cp.handle = 0;
911 bacpy(&cp.bdaddr, &random_addr);
912
913 hci_req_add(req,
914 HCI_OP_LE_SET_ADV_SET_RAND_ADDR,
915 sizeof(cp), &cp);
916 }
917
Luiz Augusto von Dentz1d0fac22019-06-03 13:48:42 +0300918 __hci_req_enable_ext_advertising(req, 0x00);
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530919 } else {
920 struct hci_cp_le_set_adv_param cp;
921
922 /* Clear the HCI_LE_ADV bit temporarily so that the
923 * hci_update_random_address knows that it's safe to go ahead
924 * and write a new random address. The flag will be set back on
925 * as soon as the SET_ADV_ENABLE HCI command completes.
926 */
927 hci_dev_clear_flag(hdev, HCI_LE_ADV);
928
929 /* Set require_privacy to false so that the remote device has a
930 * chance of identifying us.
931 */
932 if (hci_update_random_address(req, false, conn_use_rpa(conn),
933 &own_addr_type) < 0)
934 return;
935
936 memset(&cp, 0, sizeof(cp));
Szymon Janc4c371bb2019-10-02 14:22:43 +0200937
938 /* Some controllers might reject command if intervals are not
939 * within range for undirected advertising.
940 * BCM20702A0 is known to be affected by this.
941 */
942 cp.min_interval = cpu_to_le16(0x0020);
943 cp.max_interval = cpu_to_le16(0x0020);
944
Jaganath Kanakkassery075e40b2018-07-19 17:09:44 +0530945 cp.type = LE_ADV_DIRECT_IND;
946 cp.own_address_type = own_addr_type;
947 cp.direct_addr_type = conn->dst_type;
948 bacpy(&cp.direct_addr, &conn->dst);
949 cp.channel_map = hdev->le_adv_channel_map;
950
951 hci_req_add(req, HCI_OP_LE_SET_ADV_PARAM, sizeof(cp), &cp);
952
953 enable = 0x01;
954 hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable),
955 &enable);
956 }
Johan Hedberg3c857752014-03-25 10:30:49 +0200957
958 conn->state = BT_CONNECT;
959}
960
Andre Guedes04a6c582014-02-26 20:21:44 -0300961struct hci_conn *hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst,
Johan Hedbergcdd62752014-07-07 15:02:28 +0300962 u8 dst_type, u8 sec_level, u16 conn_timeout,
Szymon Janc082f2302018-04-03 13:40:06 +0200963 u8 role, bdaddr_t *direct_rpa)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700964{
Andre Guedes4292f1f2014-02-03 13:56:19 -0300965 struct hci_conn_params *params;
Johan Hedberge2caced2015-11-11 14:44:59 +0200966 struct hci_conn *conn;
Johan Hedberg1ebfcc12014-02-18 21:41:36 +0200967 struct smp_irk *irk;
Andre Guedes2acf3d92014-02-26 20:21:42 -0300968 struct hci_request req;
Andre Guedes1d399ae2013-10-08 08:21:17 -0300969 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700970
Lukasz Rymanowski152d3862015-02-11 12:31:40 +0100971 /* Let's make sure that le is enabled.*/
Marcel Holtmannd7a5a112015-03-13 02:11:00 -0700972 if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
Lukasz Rymanowski152d3862015-02-11 12:31:40 +0100973 if (lmp_le_capable(hdev))
974 return ERR_PTR(-ECONNREFUSED);
975
976 return ERR_PTR(-EOPNOTSUPP);
977 }
978
Johan Hedberg658aead2015-11-11 14:44:58 +0200979 /* Since the controller supports only one LE connection attempt at a
980 * time, we return -EBUSY if there is any connection attempt running.
981 */
982 if (hci_lookup_le_connect(hdev))
983 return ERR_PTR(-EBUSY);
984
Johan Hedberge2caced2015-11-11 14:44:59 +0200985 /* If there's already a connection object but it's not in
986 * scanning state it means it must already be established, in
987 * which case we can't do anything else except report a failure
988 * to connect.
Andre Guedes620ad522013-10-08 08:21:18 -0300989 */
Johan Hedberg9d4c1cc2015-10-21 18:03:01 +0300990 conn = hci_conn_hash_lookup_le(hdev, dst, dst_type);
Johan Hedberge2caced2015-11-11 14:44:59 +0200991 if (conn && !test_bit(HCI_CONN_SCANNING, &conn->flags)) {
992 return ERR_PTR(-EBUSY);
Ville Tervofcd89c02011-02-10 22:38:47 -0300993 }
994
Marcel Holtmannedb4b462014-02-18 15:13:43 -0800995 /* When given an identity address with existing identity
996 * resolving key, the connection needs to be established
997 * to a resolvable random address.
998 *
Marcel Holtmannedb4b462014-02-18 15:13:43 -0800999 * Storing the resolvable random address is required here
1000 * to handle connection failures. The address will later
1001 * be resolved back into the original identity address
1002 * from the connect request.
1003 */
Johan Hedberg1ebfcc12014-02-18 21:41:36 +02001004 irk = hci_find_irk_by_addr(hdev, dst, dst_type);
1005 if (irk && bacmp(&irk->rpa, BDADDR_ANY)) {
1006 dst = &irk->rpa;
1007 dst_type = ADDR_LE_DEV_RANDOM;
1008 }
1009
Johan Hedberge2caced2015-11-11 14:44:59 +02001010 if (conn) {
Jakub Pawlowski28a667c2015-08-07 20:22:54 +02001011 bacpy(&conn->dst, dst);
1012 } else {
1013 conn = hci_conn_add(hdev, LE_LINK, dst, role);
Johan Hedberge2caced2015-11-11 14:44:59 +02001014 if (!conn)
1015 return ERR_PTR(-ENOMEM);
1016 hci_conn_hold(conn);
1017 conn->pending_sec_level = sec_level;
Jakub Pawlowski28a667c2015-08-07 20:22:54 +02001018 }
1019
Johan Hedberg1ebfcc12014-02-18 21:41:36 +02001020 conn->dst_type = dst_type;
Andre Guedes620ad522013-10-08 08:21:18 -03001021 conn->sec_level = BT_SECURITY_LOW;
Johan Hedberg09ae2602014-07-06 13:41:15 +03001022 conn->conn_timeout = conn_timeout;
Andre Guedes4292f1f2014-02-03 13:56:19 -03001023
Johan Hedberg3c857752014-03-25 10:30:49 +02001024 hci_req_init(&req, hdev);
1025
Johan Hedberg376f54c2014-07-08 15:07:52 +03001026 /* Disable advertising if we're active. For master role
1027 * connections most controllers will refuse to connect if
1028 * advertising is enabled, and for slave role connections we
1029 * anyway have to disable it in order to start directed
1030 * advertising.
1031 */
Marcel Holtmannd7a5a112015-03-13 02:11:00 -07001032 if (hci_dev_test_flag(hdev, HCI_LE_ADV)) {
Johan Hedberg376f54c2014-07-08 15:07:52 +03001033 u8 enable = 0x00;
1034 hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable),
1035 &enable);
1036 }
1037
Johan Hedbergcdd62752014-07-07 15:02:28 +03001038 /* If requested to connect as slave use directed advertising */
Johan Hedberge804d252014-07-16 11:42:28 +03001039 if (conn->role == HCI_ROLE_SLAVE) {
Johan Hedberge8bb6b92014-07-08 15:07:53 +03001040 /* If we're active scanning most controllers are unable
1041 * to initiate advertising. Simply reject the attempt.
1042 */
Marcel Holtmannd7a5a112015-03-13 02:11:00 -07001043 if (hci_dev_test_flag(hdev, HCI_LE_SCAN) &&
Johan Hedberge8bb6b92014-07-08 15:07:53 +03001044 hdev->le_scan_type == LE_SCAN_ACTIVE) {
Jaganath Kanakkasseryf17d8582017-10-25 10:58:48 +05301045 hci_req_purge(&req);
Johan Hedberge8bb6b92014-07-08 15:07:53 +03001046 hci_conn_del(conn);
1047 return ERR_PTR(-EBUSY);
1048 }
1049
Johan Hedberg3c857752014-03-25 10:30:49 +02001050 hci_req_directed_advertising(&req, conn);
1051 goto create_conn;
1052 }
1053
Andre Guedes4292f1f2014-02-03 13:56:19 -03001054 params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
1055 if (params) {
1056 conn->le_conn_min_interval = params->conn_min_interval;
1057 conn->le_conn_max_interval = params->conn_max_interval;
Marcel Holtmann037fc412014-06-29 16:43:27 +02001058 conn->le_conn_latency = params->conn_latency;
1059 conn->le_supv_timeout = params->supervision_timeout;
Andre Guedes4292f1f2014-02-03 13:56:19 -03001060 } else {
1061 conn->le_conn_min_interval = hdev->le_conn_min_interval;
1062 conn->le_conn_max_interval = hdev->le_conn_max_interval;
Marcel Holtmann04fb7d92014-06-30 12:34:36 +02001063 conn->le_conn_latency = hdev->le_conn_latency;
1064 conn->le_supv_timeout = hdev->le_supv_timeout;
Andre Guedes4292f1f2014-02-03 13:56:19 -03001065 }
Vinicius Costa Gomesd04aef42012-07-27 19:32:56 -03001066
Andre Guedes2acf3d92014-02-26 20:21:42 -03001067 /* If controller is scanning, we stop it since some controllers are
Johan Hedberg81ad6fd2014-02-28 20:26:13 +02001068 * not able to scan and connect at the same time. Also set the
1069 * HCI_LE_SCAN_INTERRUPTED flag so that the command complete
1070 * handler for scan disabling knows to set the correct discovery
1071 * state.
Andre Guedes2acf3d92014-02-26 20:21:42 -03001072 */
Marcel Holtmannd7a5a112015-03-13 02:11:00 -07001073 if (hci_dev_test_flag(hdev, HCI_LE_SCAN)) {
Andre Guedes2acf3d92014-02-26 20:21:42 -03001074 hci_req_add_le_scan_disable(&req);
Marcel Holtmanna1536da2015-03-13 02:11:01 -07001075 hci_dev_set_flag(hdev, HCI_LE_SCAN_INTERRUPTED);
Andre Guedes2acf3d92014-02-26 20:21:42 -03001076 }
1077
Szymon Janc082f2302018-04-03 13:40:06 +02001078 hci_req_add_le_create_conn(&req, conn, direct_rpa);
Johan Hedberg81ad6fd2014-02-28 20:26:13 +02001079
Johan Hedberg3c857752014-03-25 10:30:49 +02001080create_conn:
Johan Hedberg81ad6fd2014-02-28 20:26:13 +02001081 err = hci_req_run(&req, create_le_conn_complete);
Andre Guedes2acf3d92014-02-26 20:21:42 -03001082 if (err) {
1083 hci_conn_del(conn);
Andre Guedes620ad522013-10-08 08:21:18 -03001084 return ERR_PTR(err);
Andre Guedes2acf3d92014-02-26 20:21:42 -03001085 }
Vinicius Costa Gomesd04aef42012-07-27 19:32:56 -03001086
Andre Guedesf1e5d542013-10-03 18:25:44 -03001087 return conn;
Vinicius Costa Gomesd04aef42012-07-27 19:32:56 -03001088}
1089
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001090static bool is_connected(struct hci_dev *hdev, bdaddr_t *addr, u8 type)
1091{
1092 struct hci_conn *conn;
1093
Johan Hedberg9d4c1cc2015-10-21 18:03:01 +03001094 conn = hci_conn_hash_lookup_le(hdev, addr, type);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001095 if (!conn)
1096 return false;
1097
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001098 if (conn->state != BT_CONNECTED)
1099 return false;
1100
1101 return true;
1102}
1103
1104/* This function requires the caller holds hdev->lock */
Johan Hedberg84235d22015-11-11 08:11:20 +02001105static int hci_explicit_conn_params_set(struct hci_dev *hdev,
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001106 bdaddr_t *addr, u8 addr_type)
1107{
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001108 struct hci_conn_params *params;
1109
1110 if (is_connected(hdev, addr, addr_type))
1111 return -EISCONN;
1112
Jakub Pawlowski5157b8a2015-10-16 10:07:54 +03001113 params = hci_conn_params_lookup(hdev, addr, addr_type);
1114 if (!params) {
1115 params = hci_conn_params_add(hdev, addr, addr_type);
1116 if (!params)
1117 return -ENOMEM;
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001118
Jakub Pawlowski5157b8a2015-10-16 10:07:54 +03001119 /* If we created new params, mark them to be deleted in
1120 * hci_connect_le_scan_cleanup. It's different case than
1121 * existing disabled params, those will stay after cleanup.
1122 */
1123 params->auto_connect = HCI_AUTO_CONN_EXPLICIT;
1124 }
1125
1126 /* We're trying to connect, so make sure params are at pend_le_conns */
Johan Hedberg49c50922015-10-16 10:07:51 +03001127 if (params->auto_connect == HCI_AUTO_CONN_DISABLED ||
Jakub Pawlowski5157b8a2015-10-16 10:07:54 +03001128 params->auto_connect == HCI_AUTO_CONN_REPORT ||
1129 params->auto_connect == HCI_AUTO_CONN_EXPLICIT) {
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001130 list_del_init(&params->action);
1131 list_add(&params->action, &hdev->pend_le_conns);
1132 }
1133
1134 params->explicit_connect = true;
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001135
1136 BT_DBG("addr %pMR (type %u) auto_connect %u", addr, addr_type,
1137 params->auto_connect);
1138
1139 return 0;
1140}
1141
1142/* This function requires the caller holds hdev->lock */
1143struct hci_conn *hci_connect_le_scan(struct hci_dev *hdev, bdaddr_t *dst,
1144 u8 dst_type, u8 sec_level,
Johan Hedberg0ad06aa2015-11-11 14:44:57 +02001145 u16 conn_timeout)
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001146{
1147 struct hci_conn *conn;
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001148
1149 /* Let's make sure that le is enabled.*/
1150 if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
1151 if (lmp_le_capable(hdev))
1152 return ERR_PTR(-ECONNREFUSED);
1153
1154 return ERR_PTR(-EOPNOTSUPP);
1155 }
1156
1157 /* Some devices send ATT messages as soon as the physical link is
1158 * established. To be able to handle these ATT messages, the user-
1159 * space first establishes the connection and then starts the pairing
1160 * process.
1161 *
1162 * So if a hci_conn object already exists for the following connection
1163 * attempt, we simply update pending_sec_level and auth_type fields
1164 * and return the object found.
1165 */
Johan Hedberg9d4c1cc2015-10-21 18:03:01 +03001166 conn = hci_conn_hash_lookup_le(hdev, dst, dst_type);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001167 if (conn) {
1168 if (conn->pending_sec_level < sec_level)
1169 conn->pending_sec_level = sec_level;
1170 goto done;
1171 }
1172
1173 BT_DBG("requesting refresh of dst_addr");
1174
Johan Hedberg0ad06aa2015-11-11 14:44:57 +02001175 conn = hci_conn_add(hdev, LE_LINK, dst, HCI_ROLE_MASTER);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001176 if (!conn)
1177 return ERR_PTR(-ENOMEM);
1178
Johan Hedberg84235d22015-11-11 08:11:20 +02001179 if (hci_explicit_conn_params_set(hdev, dst, dst_type) < 0)
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001180 return ERR_PTR(-EBUSY);
1181
1182 conn->state = BT_CONNECT;
1183 set_bit(HCI_CONN_SCANNING, &conn->flags);
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001184 conn->dst_type = dst_type;
1185 conn->sec_level = BT_SECURITY_LOW;
1186 conn->pending_sec_level = sec_level;
1187 conn->conn_timeout = conn_timeout;
1188
Johan Hedberg84235d22015-11-11 08:11:20 +02001189 hci_update_background_scan(hdev);
1190
Jakub Pawlowskif75113a2015-08-07 20:22:53 +02001191done:
1192 hci_conn_hold(conn);
1193 return conn;
1194}
1195
Andre Guedes04a6c582014-02-26 20:21:44 -03001196struct hci_conn *hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst,
1197 u8 sec_level, u8 auth_type)
Marcel Holtmann5b7f9902007-07-11 09:51:55 +02001198{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001199 struct hci_conn *acl;
Marcel Holtmanne73439d2010-07-26 10:06:00 -04001200
Marcel Holtmannd7a5a112015-03-13 02:11:00 -07001201 if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
Lukasz Rymanowskic4111102015-02-11 12:31:41 +01001202 if (lmp_bredr_capable(hdev))
1203 return ERR_PTR(-ECONNREFUSED);
1204
Johan Hedbergbeb19e42014-07-18 11:15:26 +03001205 return ERR_PTR(-EOPNOTSUPP);
Lukasz Rymanowskic4111102015-02-11 12:31:41 +01001206 }
Johan Hedberg56f87902013-10-02 13:43:13 +03001207
Linus Torvalds1da177e2005-04-16 15:20:36 -07001208 acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
1209 if (!acl) {
Johan Hedberga5c4e302014-07-16 11:56:07 +03001210 acl = hci_conn_add(hdev, ACL_LINK, dst, HCI_ROLE_MASTER);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001211 if (!acl)
Johan Hedberg48c7aba2012-02-19 14:06:48 +02001212 return ERR_PTR(-ENOMEM);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001213 }
1214
1215 hci_conn_hold(acl);
1216
1217 if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
1218 acl->sec_level = BT_SECURITY_LOW;
Marcel Holtmann5b7f9902007-07-11 09:51:55 +02001219 acl->pending_sec_level = sec_level;
1220 acl->auth_type = auth_type;
Vinicius Costa Gomes1aef8662012-07-27 19:32:55 -03001221 hci_acl_create_connection(acl);
Nick Pellyc3902162009-11-13 14:16:32 -08001222 }
1223
Vinicius Costa Gomesdb474272012-07-28 22:35:59 -03001224 return acl;
1225}
1226
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +02001227struct hci_conn *hci_connect_sco(struct hci_dev *hdev, int type, bdaddr_t *dst,
1228 __u16 setting)
Vinicius Costa Gomesdb474272012-07-28 22:35:59 -03001229{
1230 struct hci_conn *acl;
1231 struct hci_conn *sco;
1232
Frédéric Dalleaue660ed62013-08-19 14:23:54 +02001233 acl = hci_connect_acl(hdev, dst, BT_SECURITY_LOW, HCI_AT_NO_BONDING);
Vinicius Costa Gomesdb474272012-07-28 22:35:59 -03001234 if (IS_ERR(acl))
Marcel Holtmannb6a0dc82007-10-20 14:55:10 +02001235 return acl;
1236
1237 sco = hci_conn_hash_lookup_ba(hdev, type, dst);
1238 if (!sco) {
Johan Hedberga5c4e302014-07-16 11:56:07 +03001239 sco = hci_conn_add(hdev, type, dst, HCI_ROLE_MASTER);
Marcel Holtmann5b7f9902007-07-11 09:51:55 +02001240 if (!sco) {
David Herrmann76a68ba2013-04-06 20:28:37 +02001241 hci_conn_drop(acl);
Johan Hedberg48c7aba2012-02-19 14:06:48 +02001242 return ERR_PTR(-ENOMEM);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001243 }
1244 }
Marcel Holtmanne7c29cb2008-09-09 07:19:20 +02001245
1246 acl->link = sco;
1247 sco->link = acl;
1248
1249 hci_conn_hold(sco);
1250
Frédéric Dalleau10c62dd2013-08-19 14:23:59 +02001251 sco->setting = setting;
1252
Marcel Holtmanne7c29cb2008-09-09 07:19:20 +02001253 if (acl->state == BT_CONNECTED &&
Gustavo Padovan5974e4c2012-05-17 00:36:25 -03001254 (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
Johan Hedberg58a681e2012-01-16 06:47:28 +02001255 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -07001256 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
Marcel Holtmanne7c29cb2008-09-09 07:19:20 +02001257
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001258 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
Marcel Holtmanne7c29cb2008-09-09 07:19:20 +02001259 /* defer SCO setup until mode change completed */
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001260 set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
Marcel Holtmann0684e5f2009-02-09 02:48:38 +01001261 return sco;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001262 }
1263
1264 hci_sco_setup(acl, 0x00);
Marcel Holtmann96a31832009-02-12 16:23:03 +01001265 }
Marcel Holtmann0684e5f2009-02-09 02:48:38 +01001266
Marcel Holtmann96a31832009-02-12 16:23:03 +01001267 return sco;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001268}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001269
1270/* Check link security requirement */
1271int hci_conn_check_link_mode(struct hci_conn *conn)
1272{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001273 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001274
Marcel Holtmann40b552a2014-03-19 14:10:25 -07001275 /* In Secure Connections Only mode, it is required that Secure
1276 * Connections is used and the link is encrypted with AES-CCM
1277 * using a P-256 authenticated combination key.
1278 */
Marcel Holtmannd7a5a112015-03-13 02:11:00 -07001279 if (hci_dev_test_flag(conn->hdev, HCI_SC_ONLY)) {
Marcel Holtmann40b552a2014-03-19 14:10:25 -07001280 if (!hci_conn_sc_enabled(conn) ||
1281 !test_bit(HCI_CONN_AES_CCM, &conn->flags) ||
1282 conn->key_type != HCI_LK_AUTH_COMBINATION_P256)
1283 return 0;
1284 }
1285
Johan Hedberg4dae2792014-06-24 17:03:50 +03001286 if (hci_conn_ssp_enabled(conn) &&
1287 !test_bit(HCI_CONN_ENCRYPT, &conn->flags))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001288 return 0;
1289
1290 return 1;
1291}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001292
1293/* Authenticate remote device */
1294static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
1295{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001296 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001297
Johan Hedberg765c2a92011-01-19 12:06:52 +05301298 if (conn->pending_sec_level > sec_level)
1299 sec_level = conn->pending_sec_level;
1300
Linus Torvalds1da177e2005-04-16 15:20:36 -07001301 if (sec_level > conn->sec_level)
Johan Hedberg765c2a92011-01-19 12:06:52 +05301302 conn->pending_sec_level = sec_level;
Johan Hedberg4dae2792014-06-24 17:03:50 +03001303 else if (test_bit(HCI_CONN_AUTH, &conn->flags))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001304 return 1;
1305
Johan Hedberg65cf6862011-01-19 12:06:49 +05301306 /* Make sure we preserve an existing MITM requirement*/
1307 auth_type |= (conn->auth_type & 0x01);
1308
Marcel Holtmann96a31832009-02-12 16:23:03 +01001309 conn->auth_type = auth_type;
1310
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001311 if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001312 struct hci_cp_auth_requested cp;
Peter Hurleyb7d05ba2012-01-13 15:11:30 +01001313
YOSHIFUJI Hideakiaca31922007-03-25 20:12:50 -07001314 cp.handle = cpu_to_le16(conn->handle);
Marcel Holtmann40be4922008-07-14 20:13:50 +02001315 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
Gustavo Padovan5974e4c2012-05-17 00:36:25 -03001316 sizeof(cp), &cp);
Johan Hedberg09da1f32014-04-11 12:02:32 -07001317
1318 /* If we're already encrypted set the REAUTH_PEND flag,
1319 * otherwise set the ENCRYPT_PEND.
1320 */
Johan Hedberg4dae2792014-06-24 17:03:50 +03001321 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001322 set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
Johan Hedberg09da1f32014-04-11 12:02:32 -07001323 else
1324 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001325 }
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001326
Linus Torvalds1da177e2005-04-16 15:20:36 -07001327 return 0;
1328}
Linus Torvalds1da177e2005-04-16 15:20:36 -07001329
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001330/* Encrypt the the link */
1331static void hci_conn_encrypt(struct hci_conn *conn)
1332{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001333 BT_DBG("hcon %p", conn);
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001334
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001335 if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001336 struct hci_cp_set_conn_encrypt cp;
1337 cp.handle = cpu_to_le16(conn->handle);
1338 cp.encrypt = 0x01;
1339 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
Gustavo Padovan5974e4c2012-05-17 00:36:25 -03001340 &cp);
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001341 }
1342}
1343
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001344/* Enable security */
Johan Hedberge7cafc42014-07-17 15:35:38 +03001345int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type,
1346 bool initiator)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001347{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001348 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001349
Vinicius Costa Gomesd8343f12012-08-23 21:32:44 -03001350 if (conn->type == LE_LINK)
1351 return smp_conn_security(conn, sec_level);
1352
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001353 /* For sdp we don't need the link key. */
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001354 if (sec_level == BT_SECURITY_SDP)
1355 return 1;
1356
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001357 /* For non 2.1 devices and low security level we don't need the link
1358 key. */
Johan Hedbergaa64a8b2012-01-18 21:33:12 +02001359 if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
Marcel Holtmann3fdca1e2009-04-28 09:04:55 -07001360 return 1;
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001361
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001362 /* For other security levels we need the link key. */
Johan Hedberg4dae2792014-06-24 17:03:50 +03001363 if (!test_bit(HCI_CONN_AUTH, &conn->flags))
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001364 goto auth;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001365
Marcel Holtmann7b5a9242014-01-15 22:37:39 -08001366 /* An authenticated FIPS approved combination key has sufficient
1367 * security for security level 4. */
1368 if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256 &&
1369 sec_level == BT_SECURITY_FIPS)
1370 goto encrypt;
1371
1372 /* An authenticated combination key has sufficient security for
1373 security level 3. */
1374 if ((conn->key_type == HCI_LK_AUTH_COMBINATION_P192 ||
1375 conn->key_type == HCI_LK_AUTH_COMBINATION_P256) &&
1376 sec_level == BT_SECURITY_HIGH)
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001377 goto encrypt;
1378
1379 /* An unauthenticated combination key has sufficient security for
1380 security level 1 and 2. */
Marcel Holtmann66138ce2014-01-10 02:07:20 -08001381 if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 ||
1382 conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) &&
Gustavo Padovan5974e4c2012-05-17 00:36:25 -03001383 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW))
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001384 goto encrypt;
1385
1386 /* A combination key has always sufficient security for the security
1387 levels 1 or 2. High security level requires the combination key
1388 is generated using maximum PIN code length (16).
1389 For pre 2.1 units. */
1390 if (conn->key_type == HCI_LK_COMBINATION &&
Marcel Holtmann7b5a9242014-01-15 22:37:39 -08001391 (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW ||
1392 conn->pin_length == 16))
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001393 goto encrypt;
1394
1395auth:
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001396 if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001397 return 0;
1398
Johan Hedberg977f8fc2014-07-17 15:35:39 +03001399 if (initiator)
1400 set_bit(HCI_CONN_AUTH_INITIATOR, &conn->flags);
1401
Luiz Augusto von Dentz6fdf6582011-06-13 15:37:35 +03001402 if (!hci_conn_auth(conn, sec_level, auth_type))
1403 return 0;
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001404
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001405encrypt:
Marcel Holtmann693cd8c2019-06-22 15:47:01 +02001406 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags)) {
1407 /* Ensure that the encryption key size has been read,
1408 * otherwise stall the upper layer responses.
1409 */
1410 if (!conn->enc_key_size)
1411 return 0;
1412
1413 /* Nothing else needed, all requirements are met */
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001414 return 1;
Marcel Holtmann693cd8c2019-06-22 15:47:01 +02001415 }
Waldemar Rymarkiewicz13d39312011-04-28 12:07:55 +02001416
1417 hci_conn_encrypt(conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001418 return 0;
1419}
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001420EXPORT_SYMBOL(hci_conn_security);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001421
Waldemar Rymarkiewiczb3b1b062011-05-06 09:42:31 +02001422/* Check secure link requirement */
1423int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
1424{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001425 BT_DBG("hcon %p", conn);
Waldemar Rymarkiewiczb3b1b062011-05-06 09:42:31 +02001426
Marcel Holtmann9cb2e032014-02-01 11:32:25 -08001427 /* Accept if non-secure or higher security level is required */
1428 if (sec_level != BT_SECURITY_HIGH && sec_level != BT_SECURITY_FIPS)
Waldemar Rymarkiewiczb3b1b062011-05-06 09:42:31 +02001429 return 1;
1430
Marcel Holtmann9cb2e032014-02-01 11:32:25 -08001431 /* Accept if secure or higher security level is already present */
1432 if (conn->sec_level == BT_SECURITY_HIGH ||
1433 conn->sec_level == BT_SECURITY_FIPS)
1434 return 1;
1435
1436 /* Reject not secure link */
1437 return 0;
Waldemar Rymarkiewiczb3b1b062011-05-06 09:42:31 +02001438}
1439EXPORT_SYMBOL(hci_conn_check_secure);
1440
Linus Torvalds1da177e2005-04-16 15:20:36 -07001441/* Switch role */
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001442int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001443{
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001444 BT_DBG("hcon %p", conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001445
Johan Hedberg40bef302014-07-16 11:42:27 +03001446 if (role == conn->role)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001447 return 1;
1448
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001449 if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001450 struct hci_cp_switch_role cp;
1451 bacpy(&cp.bdaddr, &conn->dst);
1452 cp.role = role;
Marcel Holtmanna9de9242007-10-20 13:33:56 +02001453 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001454 }
Marcel Holtmann8c1b2352009-01-15 21:58:04 +01001455
Linus Torvalds1da177e2005-04-16 15:20:36 -07001456 return 0;
1457}
1458EXPORT_SYMBOL(hci_conn_switch_role);
1459
Marcel Holtmann04837f62006-07-03 10:02:33 +02001460/* Enter active mode */
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -07001461void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
Marcel Holtmann04837f62006-07-03 10:02:33 +02001462{
1463 struct hci_dev *hdev = conn->hdev;
1464
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001465 BT_DBG("hcon %p mode %d", conn, conn->mode);
Marcel Holtmann04837f62006-07-03 10:02:33 +02001466
Jaikumar Ganesh14b12d02011-05-23 18:06:04 -07001467 if (conn->mode != HCI_CM_SNIFF)
1468 goto timer;
1469
Johan Hedberg58a681e2012-01-16 06:47:28 +02001470 if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
Marcel Holtmann04837f62006-07-03 10:02:33 +02001471 goto timer;
1472
Johan Hedberg51a8efd2012-01-16 06:10:31 +02001473 if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
Marcel Holtmann04837f62006-07-03 10:02:33 +02001474 struct hci_cp_exit_sniff_mode cp;
YOSHIFUJI Hideakiaca31922007-03-25 20:12:50 -07001475 cp.handle = cpu_to_le16(conn->handle);
Marcel Holtmanna9de9242007-10-20 13:33:56 +02001476 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
Marcel Holtmann04837f62006-07-03 10:02:33 +02001477 }
1478
1479timer:
1480 if (hdev->idle_timeout > 0)
Johan Hedberga74a84f2013-10-16 18:11:40 +03001481 queue_delayed_work(hdev->workqueue, &conn->idle_work,
1482 msecs_to_jiffies(hdev->idle_timeout));
Marcel Holtmann04837f62006-07-03 10:02:33 +02001483}
1484
Linus Torvalds1da177e2005-04-16 15:20:36 -07001485/* Drop all connection on the device */
1486void hci_conn_hash_flush(struct hci_dev *hdev)
1487{
1488 struct hci_conn_hash *h = &hdev->conn_hash;
Andrei Emeltchenko3c4e0df02012-02-02 10:32:17 +02001489 struct hci_conn *c, *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001490
1491 BT_DBG("hdev %s", hdev->name);
1492
Andrei Emeltchenko3c4e0df02012-02-02 10:32:17 +02001493 list_for_each_entry_safe(c, n, &h->list, list) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001494 c->state = BT_CLOSED;
1495
Johan Hedberg3a6d5762015-02-18 14:53:58 +02001496 hci_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001497 hci_conn_del(c);
1498 }
1499}
1500
Marcel Holtmanna9de9242007-10-20 13:33:56 +02001501/* Check pending connect attempts */
1502void hci_conn_check_pending(struct hci_dev *hdev)
1503{
1504 struct hci_conn *conn;
1505
1506 BT_DBG("hdev %s", hdev->name);
1507
1508 hci_dev_lock(hdev);
1509
1510 conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
1511 if (conn)
Vinicius Costa Gomes1aef8662012-07-27 19:32:55 -03001512 hci_acl_create_connection(conn);
Marcel Holtmanna9de9242007-10-20 13:33:56 +02001513
1514 hci_dev_unlock(hdev);
1515}
1516
Johan Hedberg4dae2792014-06-24 17:03:50 +03001517static u32 get_link_mode(struct hci_conn *conn)
1518{
1519 u32 link_mode = 0;
1520
Johan Hedberg40bef302014-07-16 11:42:27 +03001521 if (conn->role == HCI_ROLE_MASTER)
Johan Hedberg4dae2792014-06-24 17:03:50 +03001522 link_mode |= HCI_LM_MASTER;
1523
1524 if (test_bit(HCI_CONN_ENCRYPT, &conn->flags))
1525 link_mode |= HCI_LM_ENCRYPT;
1526
1527 if (test_bit(HCI_CONN_AUTH, &conn->flags))
1528 link_mode |= HCI_LM_AUTH;
1529
1530 if (test_bit(HCI_CONN_SECURE, &conn->flags))
1531 link_mode |= HCI_LM_SECURE;
1532
1533 if (test_bit(HCI_CONN_FIPS, &conn->flags))
1534 link_mode |= HCI_LM_FIPS;
1535
1536 return link_mode;
1537}
1538
Linus Torvalds1da177e2005-04-16 15:20:36 -07001539int hci_get_conn_list(void __user *arg)
1540{
Gustavo Padovanfc5fef62012-05-23 04:04:19 -03001541 struct hci_conn *c;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001542 struct hci_conn_list_req req, *cl;
1543 struct hci_conn_info *ci;
1544 struct hci_dev *hdev;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001545 int n = 0, size, err;
1546
1547 if (copy_from_user(&req, arg, sizeof(req)))
1548 return -EFAULT;
1549
1550 if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
1551 return -EINVAL;
1552
1553 size = sizeof(req) + req.conn_num * sizeof(*ci);
1554
Andrei Emeltchenko70f230202010-12-01 16:58:25 +02001555 cl = kmalloc(size, GFP_KERNEL);
1556 if (!cl)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001557 return -ENOMEM;
1558
Andrei Emeltchenko70f230202010-12-01 16:58:25 +02001559 hdev = hci_dev_get(req.dev_id);
1560 if (!hdev) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001561 kfree(cl);
1562 return -ENODEV;
1563 }
1564
1565 ci = cl->conn_info;
1566
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001567 hci_dev_lock(hdev);
Luiz Augusto von Dentz8035ded2011-11-01 10:58:56 +02001568 list_for_each_entry(c, &hdev->conn_hash.list, list) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001569 bacpy(&(ci + n)->bdaddr, &c->dst);
1570 (ci + n)->handle = c->handle;
1571 (ci + n)->type = c->type;
1572 (ci + n)->out = c->out;
1573 (ci + n)->state = c->state;
Johan Hedberg4dae2792014-06-24 17:03:50 +03001574 (ci + n)->link_mode = get_link_mode(c);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001575 if (++n >= req.conn_num)
1576 break;
1577 }
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001578 hci_dev_unlock(hdev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001579
1580 cl->dev_id = hdev->id;
1581 cl->conn_num = n;
1582 size = sizeof(req) + n * sizeof(*ci);
1583
1584 hci_dev_put(hdev);
1585
1586 err = copy_to_user(arg, cl, size);
1587 kfree(cl);
1588
1589 return err ? -EFAULT : 0;
1590}
1591
1592int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
1593{
1594 struct hci_conn_info_req req;
1595 struct hci_conn_info ci;
1596 struct hci_conn *conn;
1597 char __user *ptr = arg + sizeof(req);
1598
1599 if (copy_from_user(&req, arg, sizeof(req)))
1600 return -EFAULT;
1601
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001602 hci_dev_lock(hdev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001603 conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
1604 if (conn) {
1605 bacpy(&ci.bdaddr, &conn->dst);
1606 ci.handle = conn->handle;
1607 ci.type = conn->type;
1608 ci.out = conn->out;
1609 ci.state = conn->state;
Johan Hedberg4dae2792014-06-24 17:03:50 +03001610 ci.link_mode = get_link_mode(conn);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001611 }
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001612 hci_dev_unlock(hdev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001613
1614 if (!conn)
1615 return -ENOENT;
1616
1617 return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
1618}
Marcel Holtmann40be4922008-07-14 20:13:50 +02001619
1620int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
1621{
1622 struct hci_auth_info_req req;
1623 struct hci_conn *conn;
1624
1625 if (copy_from_user(&req, arg, sizeof(req)))
1626 return -EFAULT;
1627
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001628 hci_dev_lock(hdev);
Marcel Holtmann40be4922008-07-14 20:13:50 +02001629 conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
1630 if (conn)
1631 req.type = conn->auth_type;
Gustavo F. Padovan09fd0de2011-06-17 13:03:21 -03001632 hci_dev_unlock(hdev);
Marcel Holtmann40be4922008-07-14 20:13:50 +02001633
1634 if (!conn)
1635 return -ENOENT;
1636
1637 return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
1638}
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001639
1640struct hci_chan *hci_chan_create(struct hci_conn *conn)
1641{
1642 struct hci_dev *hdev = conn->hdev;
1643 struct hci_chan *chan;
1644
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001645 BT_DBG("%s hcon %p", hdev->name, conn);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001646
Johan Hedbergf94b6652014-08-18 00:41:44 +03001647 if (test_bit(HCI_CONN_DROP, &conn->flags)) {
1648 BT_DBG("Refusing to create new hci_chan");
1649 return NULL;
1650 }
1651
Johan Hedberg27f70f32014-07-21 10:50:06 +03001652 chan = kzalloc(sizeof(*chan), GFP_KERNEL);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001653 if (!chan)
1654 return NULL;
1655
Johan Hedberg6c388d32014-08-18 00:41:42 +03001656 chan->conn = hci_conn_get(conn);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001657 skb_queue_head_init(&chan->data_q);
Mat Martineau168df8e2012-10-23 15:24:13 -07001658 chan->state = BT_CONNECTED;
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001659
Gustavo F. Padovan8192ede2011-12-14 15:08:48 -02001660 list_add_rcu(&chan->list, &conn->chan_list);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001661
1662 return chan;
1663}
1664
Andrei Emeltchenko94720072012-09-06 15:05:43 +03001665void hci_chan_del(struct hci_chan *chan)
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001666{
1667 struct hci_conn *conn = chan->conn;
1668 struct hci_dev *hdev = conn->hdev;
1669
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001670 BT_DBG("%s hcon %p chan %p", hdev->name, conn, chan);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001671
Gustavo F. Padovan8192ede2011-12-14 15:08:48 -02001672 list_del_rcu(&chan->list);
1673
1674 synchronize_rcu();
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001675
Johan Hedbergbcbb6552014-08-18 20:33:27 +03001676 /* Prevent new hci_chan's to be created for this hci_conn */
Johan Hedbergf94b6652014-08-18 00:41:44 +03001677 set_bit(HCI_CONN_DROP, &conn->flags);
Johan Hedbergb3ff6702014-08-18 00:41:43 +03001678
Johan Hedberg6c388d32014-08-18 00:41:42 +03001679 hci_conn_put(conn);
Andrei Emeltchenkoe9b02742012-10-25 15:20:51 +03001680
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001681 skb_queue_purge(&chan->data_q);
1682 kfree(chan);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001683}
1684
Gustavo F. Padovan2c33c062011-12-14 13:02:51 -02001685void hci_chan_list_flush(struct hci_conn *conn)
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001686{
Andrei Emeltchenko2a5a5ec2012-02-02 10:32:18 +02001687 struct hci_chan *chan, *n;
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001688
Andrei Emeltchenko38b3fef2012-06-15 11:50:28 +03001689 BT_DBG("hcon %p", conn);
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001690
Andrei Emeltchenko2a5a5ec2012-02-02 10:32:18 +02001691 list_for_each_entry_safe(chan, n, &conn->chan_list, list)
Luiz Augusto von Dentz73d80de2011-11-02 15:52:01 +02001692 hci_chan_del(chan);
1693}
Andrei Emeltchenko42c4e532012-10-10 17:38:28 +03001694
1695static struct hci_chan *__hci_chan_lookup_handle(struct hci_conn *hcon,
1696 __u16 handle)
1697{
1698 struct hci_chan *hchan;
1699
1700 list_for_each_entry(hchan, &hcon->chan_list, list) {
1701 if (hchan->handle == handle)
1702 return hchan;
1703 }
1704
1705 return NULL;
1706}
1707
1708struct hci_chan *hci_chan_lookup_handle(struct hci_dev *hdev, __u16 handle)
1709{
1710 struct hci_conn_hash *h = &hdev->conn_hash;
1711 struct hci_conn *hcon;
1712 struct hci_chan *hchan = NULL;
1713
1714 rcu_read_lock();
1715
1716 list_for_each_entry_rcu(hcon, &h->list, list) {
1717 hchan = __hci_chan_lookup_handle(hcon, handle);
1718 if (hchan)
1719 break;
1720 }
1721
1722 rcu_read_unlock();
1723
1724 return hchan;
1725}