Bluetooth: Include security level 4 in connections check
[firefly-linux-kernel-4.4.55.git] / net / bluetooth / hci_conn.c
1 /*
2    BlueZ - Bluetooth protocol stack for Linux
3    Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
4
5    Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License version 2 as
9    published by the Free Software Foundation;
10
11    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
20    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22    SOFTWARE IS DISCLAIMED.
23 */
24
25 /* Bluetooth HCI connection handling. */
26
27 #include <linux/export.h>
28
29 #include <net/bluetooth/bluetooth.h>
30 #include <net/bluetooth/hci_core.h>
31
32 #include "smp.h"
33 #include "a2mp.h"
34
35 struct sco_param {
36         u16 pkt_type;
37         u16 max_latency;
38 };
39
40 static const struct sco_param sco_param_cvsd[] = {
41         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000a }, /* S3 */
42         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x0007 }, /* S2 */
43         { EDR_ESCO_MASK | ESCO_EV3,   0x0007 }, /* S1 */
44         { EDR_ESCO_MASK | ESCO_HV3,   0xffff }, /* D1 */
45         { EDR_ESCO_MASK | ESCO_HV1,   0xffff }, /* D0 */
46 };
47
48 static const struct sco_param sco_param_wideband[] = {
49         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000d }, /* T2 */
50         { EDR_ESCO_MASK | ESCO_EV3,   0x0008 }, /* T1 */
51 };
52
53 static void hci_le_create_connection_cancel(struct hci_conn *conn)
54 {
55         hci_send_cmd(conn->hdev, HCI_OP_LE_CREATE_CONN_CANCEL, 0, NULL);
56 }
57
58 static void hci_acl_create_connection(struct hci_conn *conn)
59 {
60         struct hci_dev *hdev = conn->hdev;
61         struct inquiry_entry *ie;
62         struct hci_cp_create_conn cp;
63
64         BT_DBG("hcon %p", conn);
65
66         conn->state = BT_CONNECT;
67         conn->out = true;
68
69         conn->link_mode = HCI_LM_MASTER;
70
71         conn->attempt++;
72
73         conn->link_policy = hdev->link_policy;
74
75         memset(&cp, 0, sizeof(cp));
76         bacpy(&cp.bdaddr, &conn->dst);
77         cp.pscan_rep_mode = 0x02;
78
79         ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
80         if (ie) {
81                 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
82                         cp.pscan_rep_mode = ie->data.pscan_rep_mode;
83                         cp.pscan_mode     = ie->data.pscan_mode;
84                         cp.clock_offset   = ie->data.clock_offset |
85                                             __constant_cpu_to_le16(0x8000);
86                 }
87
88                 memcpy(conn->dev_class, ie->data.dev_class, 3);
89                 if (ie->data.ssp_mode > 0)
90                         set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
91         }
92
93         cp.pkt_type = cpu_to_le16(conn->pkt_type);
94         if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
95                 cp.role_switch = 0x01;
96         else
97                 cp.role_switch = 0x00;
98
99         hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
100 }
101
102 static void hci_acl_create_connection_cancel(struct hci_conn *conn)
103 {
104         struct hci_cp_create_conn_cancel cp;
105
106         BT_DBG("hcon %p", conn);
107
108         if (conn->hdev->hci_ver < BLUETOOTH_VER_1_2)
109                 return;
110
111         bacpy(&cp.bdaddr, &conn->dst);
112         hci_send_cmd(conn->hdev, HCI_OP_CREATE_CONN_CANCEL, sizeof(cp), &cp);
113 }
114
115 static void hci_reject_sco(struct hci_conn *conn)
116 {
117         struct hci_cp_reject_sync_conn_req cp;
118
119         cp.reason = HCI_ERROR_REMOTE_USER_TERM;
120         bacpy(&cp.bdaddr, &conn->dst);
121
122         hci_send_cmd(conn->hdev, HCI_OP_REJECT_SYNC_CONN_REQ, sizeof(cp), &cp);
123 }
124
125 void hci_disconnect(struct hci_conn *conn, __u8 reason)
126 {
127         struct hci_cp_disconnect cp;
128
129         BT_DBG("hcon %p", conn);
130
131         conn->state = BT_DISCONN;
132
133         cp.handle = cpu_to_le16(conn->handle);
134         cp.reason = reason;
135         hci_send_cmd(conn->hdev, HCI_OP_DISCONNECT, sizeof(cp), &cp);
136 }
137
138 static void hci_amp_disconn(struct hci_conn *conn, __u8 reason)
139 {
140         struct hci_cp_disconn_phy_link cp;
141
142         BT_DBG("hcon %p", conn);
143
144         conn->state = BT_DISCONN;
145
146         cp.phy_handle = HCI_PHY_HANDLE(conn->handle);
147         cp.reason = reason;
148         hci_send_cmd(conn->hdev, HCI_OP_DISCONN_PHY_LINK,
149                      sizeof(cp), &cp);
150 }
151
152 static void hci_add_sco(struct hci_conn *conn, __u16 handle)
153 {
154         struct hci_dev *hdev = conn->hdev;
155         struct hci_cp_add_sco cp;
156
157         BT_DBG("hcon %p", conn);
158
159         conn->state = BT_CONNECT;
160         conn->out = true;
161
162         conn->attempt++;
163
164         cp.handle   = cpu_to_le16(handle);
165         cp.pkt_type = cpu_to_le16(conn->pkt_type);
166
167         hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
168 }
169
170 bool hci_setup_sync(struct hci_conn *conn, __u16 handle)
171 {
172         struct hci_dev *hdev = conn->hdev;
173         struct hci_cp_setup_sync_conn cp;
174         const struct sco_param *param;
175
176         BT_DBG("hcon %p", conn);
177
178         conn->state = BT_CONNECT;
179         conn->out = true;
180
181         conn->attempt++;
182
183         cp.handle   = cpu_to_le16(handle);
184
185         cp.tx_bandwidth   = __constant_cpu_to_le32(0x00001f40);
186         cp.rx_bandwidth   = __constant_cpu_to_le32(0x00001f40);
187         cp.voice_setting  = cpu_to_le16(conn->setting);
188
189         switch (conn->setting & SCO_AIRMODE_MASK) {
190         case SCO_AIRMODE_TRANSP:
191                 if (conn->attempt > ARRAY_SIZE(sco_param_wideband))
192                         return false;
193                 cp.retrans_effort = 0x02;
194                 param = &sco_param_wideband[conn->attempt - 1];
195                 break;
196         case SCO_AIRMODE_CVSD:
197                 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
198                         return false;
199                 cp.retrans_effort = 0x01;
200                 param = &sco_param_cvsd[conn->attempt - 1];
201                 break;
202         default:
203                 return false;
204         }
205
206         cp.pkt_type = __cpu_to_le16(param->pkt_type);
207         cp.max_latency = __cpu_to_le16(param->max_latency);
208
209         if (hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp) < 0)
210                 return false;
211
212         return true;
213 }
214
215 void hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max,
216                         u16 latency, u16 to_multiplier)
217 {
218         struct hci_cp_le_conn_update cp;
219         struct hci_dev *hdev = conn->hdev;
220
221         memset(&cp, 0, sizeof(cp));
222
223         cp.handle               = cpu_to_le16(conn->handle);
224         cp.conn_interval_min    = cpu_to_le16(min);
225         cp.conn_interval_max    = cpu_to_le16(max);
226         cp.conn_latency         = cpu_to_le16(latency);
227         cp.supervision_timeout  = cpu_to_le16(to_multiplier);
228         cp.min_ce_len           = __constant_cpu_to_le16(0x0001);
229         cp.max_ce_len           = __constant_cpu_to_le16(0x0001);
230
231         hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
232 }
233
234 void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __u8 rand[8],
235                       __u8 ltk[16])
236 {
237         struct hci_dev *hdev = conn->hdev;
238         struct hci_cp_le_start_enc cp;
239
240         BT_DBG("hcon %p", conn);
241
242         memset(&cp, 0, sizeof(cp));
243
244         cp.handle = cpu_to_le16(conn->handle);
245         memcpy(cp.ltk, ltk, sizeof(cp.ltk));
246         cp.ediv = ediv;
247         memcpy(cp.rand, rand, sizeof(cp.rand));
248
249         hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
250 }
251
252 /* Device _must_ be locked */
253 void hci_sco_setup(struct hci_conn *conn, __u8 status)
254 {
255         struct hci_conn *sco = conn->link;
256
257         if (!sco)
258                 return;
259
260         BT_DBG("hcon %p", conn);
261
262         if (!status) {
263                 if (lmp_esco_capable(conn->hdev))
264                         hci_setup_sync(sco, conn->handle);
265                 else
266                         hci_add_sco(sco, conn->handle);
267         } else {
268                 hci_proto_connect_cfm(sco, status);
269                 hci_conn_del(sco);
270         }
271 }
272
273 static void hci_conn_disconnect(struct hci_conn *conn)
274 {
275         __u8 reason = hci_proto_disconn_ind(conn);
276
277         switch (conn->type) {
278         case AMP_LINK:
279                 hci_amp_disconn(conn, reason);
280                 break;
281         default:
282                 hci_disconnect(conn, reason);
283                 break;
284         }
285 }
286
287 static void hci_conn_timeout(struct work_struct *work)
288 {
289         struct hci_conn *conn = container_of(work, struct hci_conn,
290                                              disc_work.work);
291
292         BT_DBG("hcon %p state %s", conn, state_to_string(conn->state));
293
294         if (atomic_read(&conn->refcnt))
295                 return;
296
297         switch (conn->state) {
298         case BT_CONNECT:
299         case BT_CONNECT2:
300                 if (conn->out) {
301                         if (conn->type == ACL_LINK)
302                                 hci_acl_create_connection_cancel(conn);
303                         else if (conn->type == LE_LINK)
304                                 hci_le_create_connection_cancel(conn);
305                 } else if (conn->type == SCO_LINK || conn->type == ESCO_LINK) {
306                         hci_reject_sco(conn);
307                 }
308                 break;
309         case BT_CONFIG:
310         case BT_CONNECTED:
311                 hci_conn_disconnect(conn);
312                 break;
313         default:
314                 conn->state = BT_CLOSED;
315                 break;
316         }
317 }
318
319 /* Enter sniff mode */
320 static void hci_conn_idle(struct work_struct *work)
321 {
322         struct hci_conn *conn = container_of(work, struct hci_conn,
323                                              idle_work.work);
324         struct hci_dev *hdev = conn->hdev;
325
326         BT_DBG("hcon %p mode %d", conn, conn->mode);
327
328         if (test_bit(HCI_RAW, &hdev->flags))
329                 return;
330
331         if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
332                 return;
333
334         if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
335                 return;
336
337         if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
338                 struct hci_cp_sniff_subrate cp;
339                 cp.handle             = cpu_to_le16(conn->handle);
340                 cp.max_latency        = __constant_cpu_to_le16(0);
341                 cp.min_remote_timeout = __constant_cpu_to_le16(0);
342                 cp.min_local_timeout  = __constant_cpu_to_le16(0);
343                 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
344         }
345
346         if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
347                 struct hci_cp_sniff_mode cp;
348                 cp.handle       = cpu_to_le16(conn->handle);
349                 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
350                 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
351                 cp.attempt      = __constant_cpu_to_le16(4);
352                 cp.timeout      = __constant_cpu_to_le16(1);
353                 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
354         }
355 }
356
357 static void hci_conn_auto_accept(struct work_struct *work)
358 {
359         struct hci_conn *conn = container_of(work, struct hci_conn,
360                                              auto_accept_work.work);
361
362         hci_send_cmd(conn->hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
363                      &conn->dst);
364 }
365
366 struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst)
367 {
368         struct hci_conn *conn;
369
370         BT_DBG("%s dst %pMR", hdev->name, dst);
371
372         conn = kzalloc(sizeof(struct hci_conn), GFP_KERNEL);
373         if (!conn)
374                 return NULL;
375
376         bacpy(&conn->dst, dst);
377         bacpy(&conn->src, &hdev->bdaddr);
378         conn->hdev  = hdev;
379         conn->type  = type;
380         conn->mode  = HCI_CM_ACTIVE;
381         conn->state = BT_OPEN;
382         conn->auth_type = HCI_AT_GENERAL_BONDING;
383         conn->io_capability = hdev->io_capability;
384         conn->remote_auth = 0xff;
385         conn->key_type = 0xff;
386
387         set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
388         conn->disc_timeout = HCI_DISCONN_TIMEOUT;
389
390         switch (type) {
391         case ACL_LINK:
392                 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
393                 break;
394         case SCO_LINK:
395                 if (lmp_esco_capable(hdev))
396                         conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
397                                         (hdev->esco_type & EDR_ESCO_MASK);
398                 else
399                         conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
400                 break;
401         case ESCO_LINK:
402                 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
403                 break;
404         }
405
406         skb_queue_head_init(&conn->data_q);
407
408         INIT_LIST_HEAD(&conn->chan_list);
409
410         INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
411         INIT_DELAYED_WORK(&conn->auto_accept_work, hci_conn_auto_accept);
412         INIT_DELAYED_WORK(&conn->idle_work, hci_conn_idle);
413
414         atomic_set(&conn->refcnt, 0);
415
416         hci_dev_hold(hdev);
417
418         hci_conn_hash_add(hdev, conn);
419         if (hdev->notify)
420                 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
421
422         hci_conn_init_sysfs(conn);
423
424         return conn;
425 }
426
427 int hci_conn_del(struct hci_conn *conn)
428 {
429         struct hci_dev *hdev = conn->hdev;
430
431         BT_DBG("%s hcon %p handle %d", hdev->name, conn, conn->handle);
432
433         cancel_delayed_work_sync(&conn->disc_work);
434         cancel_delayed_work_sync(&conn->auto_accept_work);
435         cancel_delayed_work_sync(&conn->idle_work);
436
437         if (conn->type == ACL_LINK) {
438                 struct hci_conn *sco = conn->link;
439                 if (sco)
440                         sco->link = NULL;
441
442                 /* Unacked frames */
443                 hdev->acl_cnt += conn->sent;
444         } else if (conn->type == LE_LINK) {
445                 if (hdev->le_pkts)
446                         hdev->le_cnt += conn->sent;
447                 else
448                         hdev->acl_cnt += conn->sent;
449         } else {
450                 struct hci_conn *acl = conn->link;
451                 if (acl) {
452                         acl->link = NULL;
453                         hci_conn_drop(acl);
454                 }
455         }
456
457         hci_chan_list_flush(conn);
458
459         if (conn->amp_mgr)
460                 amp_mgr_put(conn->amp_mgr);
461
462         hci_conn_hash_del(hdev, conn);
463         if (hdev->notify)
464                 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
465
466         skb_queue_purge(&conn->data_q);
467
468         hci_conn_del_sysfs(conn);
469
470         hci_dev_put(hdev);
471
472         hci_conn_put(conn);
473
474         return 0;
475 }
476
477 struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src)
478 {
479         int use_src = bacmp(src, BDADDR_ANY);
480         struct hci_dev *hdev = NULL, *d;
481
482         BT_DBG("%pMR -> %pMR", src, dst);
483
484         read_lock(&hci_dev_list_lock);
485
486         list_for_each_entry(d, &hci_dev_list, list) {
487                 if (!test_bit(HCI_UP, &d->flags) ||
488                     test_bit(HCI_RAW, &d->flags) ||
489                     test_bit(HCI_USER_CHANNEL, &d->dev_flags) ||
490                     d->dev_type != HCI_BREDR)
491                         continue;
492
493                 /* Simple routing:
494                  *   No source address - find interface with bdaddr != dst
495                  *   Source address    - find interface with bdaddr == src
496                  */
497
498                 if (use_src) {
499                         if (!bacmp(&d->bdaddr, src)) {
500                                 hdev = d; break;
501                         }
502                 } else {
503                         if (bacmp(&d->bdaddr, dst)) {
504                                 hdev = d; break;
505                         }
506                 }
507         }
508
509         if (hdev)
510                 hdev = hci_dev_hold(hdev);
511
512         read_unlock(&hci_dev_list_lock);
513         return hdev;
514 }
515 EXPORT_SYMBOL(hci_get_route);
516
517 /* This function requires the caller holds hdev->lock */
518 static void le_conn_failed(struct hci_conn *conn, u8 status)
519 {
520         struct hci_dev *hdev = conn->hdev;
521
522         conn->state = BT_CLOSED;
523
524         mgmt_connect_failed(hdev, &conn->dst, conn->type, conn->dst_type,
525                             status);
526
527         hci_proto_connect_cfm(conn, status);
528
529         hci_conn_del(conn);
530 }
531
532 static void create_le_conn_complete(struct hci_dev *hdev, u8 status)
533 {
534         struct hci_conn *conn;
535
536         if (status == 0)
537                 return;
538
539         BT_ERR("HCI request failed to create LE connection: status 0x%2.2x",
540                status);
541
542         hci_dev_lock(hdev);
543
544         conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
545         if (!conn)
546                 goto done;
547
548         le_conn_failed(conn, status);
549
550 done:
551         hci_dev_unlock(hdev);
552 }
553
554 static int hci_create_le_conn(struct hci_conn *conn)
555 {
556         struct hci_dev *hdev = conn->hdev;
557         struct hci_cp_le_create_conn cp;
558         struct hci_request req;
559         int err;
560
561         hci_req_init(&req, hdev);
562
563         memset(&cp, 0, sizeof(cp));
564         cp.scan_interval = cpu_to_le16(hdev->le_scan_interval);
565         cp.scan_window = cpu_to_le16(hdev->le_scan_window);
566         bacpy(&cp.peer_addr, &conn->dst);
567         cp.peer_addr_type = conn->dst_type;
568         cp.own_address_type = conn->src_type;
569         cp.conn_interval_min = cpu_to_le16(conn->le_conn_min_interval);
570         cp.conn_interval_max = cpu_to_le16(conn->le_conn_max_interval);
571         cp.supervision_timeout = __constant_cpu_to_le16(0x002a);
572         cp.min_ce_len = __constant_cpu_to_le16(0x0000);
573         cp.max_ce_len = __constant_cpu_to_le16(0x0000);
574
575         hci_req_add(&req, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
576
577         err = hci_req_run(&req, create_le_conn_complete);
578         if (err) {
579                 hci_conn_del(conn);
580                 return err;
581         }
582
583         return 0;
584 }
585
586 static struct hci_conn *hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst,
587                                     u8 dst_type, u8 sec_level, u8 auth_type)
588 {
589         struct hci_conn *conn;
590         int err;
591
592         if (test_bit(HCI_ADVERTISING, &hdev->flags))
593                 return ERR_PTR(-ENOTSUPP);
594
595         /* Some devices send ATT messages as soon as the physical link is
596          * established. To be able to handle these ATT messages, the user-
597          * space first establishes the connection and then starts the pairing
598          * process.
599          *
600          * So if a hci_conn object already exists for the following connection
601          * attempt, we simply update pending_sec_level and auth_type fields
602          * and return the object found.
603          */
604         conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, dst);
605         if (conn) {
606                 conn->pending_sec_level = sec_level;
607                 conn->auth_type = auth_type;
608                 goto done;
609         }
610
611         /* Since the controller supports only one LE connection attempt at a
612          * time, we return -EBUSY if there is any connection attempt running.
613          */
614         conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
615         if (conn)
616                 return ERR_PTR(-EBUSY);
617
618         conn = hci_conn_add(hdev, LE_LINK, dst);
619         if (!conn)
620                 return ERR_PTR(-ENOMEM);
621
622         if (dst_type == BDADDR_LE_PUBLIC)
623                 conn->dst_type = ADDR_LE_DEV_PUBLIC;
624         else
625                 conn->dst_type = ADDR_LE_DEV_RANDOM;
626
627         conn->src_type = hdev->own_addr_type;
628
629         conn->state = BT_CONNECT;
630         conn->out = true;
631         conn->link_mode |= HCI_LM_MASTER;
632         conn->sec_level = BT_SECURITY_LOW;
633         conn->pending_sec_level = sec_level;
634         conn->auth_type = auth_type;
635         conn->le_conn_min_interval = hdev->le_conn_min_interval;
636         conn->le_conn_max_interval = hdev->le_conn_max_interval;
637
638         err = hci_create_le_conn(conn);
639         if (err)
640                 return ERR_PTR(err);
641
642 done:
643         hci_conn_hold(conn);
644         return conn;
645 }
646
647 static struct hci_conn *hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst,
648                                                 u8 sec_level, u8 auth_type)
649 {
650         struct hci_conn *acl;
651
652         if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
653                 return ERR_PTR(-ENOTSUPP);
654
655         acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
656         if (!acl) {
657                 acl = hci_conn_add(hdev, ACL_LINK, dst);
658                 if (!acl)
659                         return ERR_PTR(-ENOMEM);
660         }
661
662         hci_conn_hold(acl);
663
664         if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
665                 acl->sec_level = BT_SECURITY_LOW;
666                 acl->pending_sec_level = sec_level;
667                 acl->auth_type = auth_type;
668                 hci_acl_create_connection(acl);
669         }
670
671         return acl;
672 }
673
674 struct hci_conn *hci_connect_sco(struct hci_dev *hdev, int type, bdaddr_t *dst,
675                                  __u16 setting)
676 {
677         struct hci_conn *acl;
678         struct hci_conn *sco;
679
680         acl = hci_connect_acl(hdev, dst, BT_SECURITY_LOW, HCI_AT_NO_BONDING);
681         if (IS_ERR(acl))
682                 return acl;
683
684         sco = hci_conn_hash_lookup_ba(hdev, type, dst);
685         if (!sco) {
686                 sco = hci_conn_add(hdev, type, dst);
687                 if (!sco) {
688                         hci_conn_drop(acl);
689                         return ERR_PTR(-ENOMEM);
690                 }
691         }
692
693         acl->link = sco;
694         sco->link = acl;
695
696         hci_conn_hold(sco);
697
698         sco->setting = setting;
699
700         if (acl->state == BT_CONNECTED &&
701             (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
702                 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
703                 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
704
705                 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
706                         /* defer SCO setup until mode change completed */
707                         set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
708                         return sco;
709                 }
710
711                 hci_sco_setup(acl, 0x00);
712         }
713
714         return sco;
715 }
716
717 /* Create SCO, ACL or LE connection. */
718 struct hci_conn *hci_connect(struct hci_dev *hdev, int type, bdaddr_t *dst,
719                              __u8 dst_type, __u8 sec_level, __u8 auth_type)
720 {
721         BT_DBG("%s dst %pMR type 0x%x", hdev->name, dst, type);
722
723         switch (type) {
724         case LE_LINK:
725                 return hci_connect_le(hdev, dst, dst_type, sec_level, auth_type);
726         case ACL_LINK:
727                 return hci_connect_acl(hdev, dst, sec_level, auth_type);
728         }
729
730         return ERR_PTR(-EINVAL);
731 }
732
733 /* Check link security requirement */
734 int hci_conn_check_link_mode(struct hci_conn *conn)
735 {
736         BT_DBG("hcon %p", conn);
737
738         if (hci_conn_ssp_enabled(conn) && !(conn->link_mode & HCI_LM_ENCRYPT))
739                 return 0;
740
741         return 1;
742 }
743
744 /* Authenticate remote device */
745 static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
746 {
747         BT_DBG("hcon %p", conn);
748
749         if (conn->pending_sec_level > sec_level)
750                 sec_level = conn->pending_sec_level;
751
752         if (sec_level > conn->sec_level)
753                 conn->pending_sec_level = sec_level;
754         else if (conn->link_mode & HCI_LM_AUTH)
755                 return 1;
756
757         /* Make sure we preserve an existing MITM requirement*/
758         auth_type |= (conn->auth_type & 0x01);
759
760         conn->auth_type = auth_type;
761
762         if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
763                 struct hci_cp_auth_requested cp;
764
765                 /* encrypt must be pending if auth is also pending */
766                 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
767
768                 cp.handle = cpu_to_le16(conn->handle);
769                 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
770                              sizeof(cp), &cp);
771                 if (conn->key_type != 0xff)
772                         set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
773         }
774
775         return 0;
776 }
777
778 /* Encrypt the the link */
779 static void hci_conn_encrypt(struct hci_conn *conn)
780 {
781         BT_DBG("hcon %p", conn);
782
783         if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
784                 struct hci_cp_set_conn_encrypt cp;
785                 cp.handle  = cpu_to_le16(conn->handle);
786                 cp.encrypt = 0x01;
787                 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
788                              &cp);
789         }
790 }
791
792 /* Enable security */
793 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
794 {
795         BT_DBG("hcon %p", conn);
796
797         if (conn->type == LE_LINK)
798                 return smp_conn_security(conn, sec_level);
799
800         /* For sdp we don't need the link key. */
801         if (sec_level == BT_SECURITY_SDP)
802                 return 1;
803
804         /* For non 2.1 devices and low security level we don't need the link
805            key. */
806         if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
807                 return 1;
808
809         /* For other security levels we need the link key. */
810         if (!(conn->link_mode & HCI_LM_AUTH))
811                 goto auth;
812
813         /* An authenticated FIPS approved combination key has sufficient
814          * security for security level 4. */
815         if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256 &&
816             sec_level == BT_SECURITY_FIPS)
817                 goto encrypt;
818
819         /* An authenticated combination key has sufficient security for
820            security level 3. */
821         if ((conn->key_type == HCI_LK_AUTH_COMBINATION_P192 ||
822              conn->key_type == HCI_LK_AUTH_COMBINATION_P256) &&
823             sec_level == BT_SECURITY_HIGH)
824                 goto encrypt;
825
826         /* An unauthenticated combination key has sufficient security for
827            security level 1 and 2. */
828         if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 ||
829              conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) &&
830             (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW))
831                 goto encrypt;
832
833         /* A combination key has always sufficient security for the security
834            levels 1 or 2. High security level requires the combination key
835            is generated using maximum PIN code length (16).
836            For pre 2.1 units. */
837         if (conn->key_type == HCI_LK_COMBINATION &&
838             (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW ||
839              conn->pin_length == 16))
840                 goto encrypt;
841
842 auth:
843         if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
844                 return 0;
845
846         if (!hci_conn_auth(conn, sec_level, auth_type))
847                 return 0;
848
849 encrypt:
850         if (conn->link_mode & HCI_LM_ENCRYPT)
851                 return 1;
852
853         hci_conn_encrypt(conn);
854         return 0;
855 }
856 EXPORT_SYMBOL(hci_conn_security);
857
858 /* Check secure link requirement */
859 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
860 {
861         BT_DBG("hcon %p", conn);
862
863         /* Accept if non-secure or higher security level is required */
864         if (sec_level != BT_SECURITY_HIGH && sec_level != BT_SECURITY_FIPS)
865                 return 1;
866
867         /* Accept if secure or higher security level is already present */
868         if (conn->sec_level == BT_SECURITY_HIGH ||
869             conn->sec_level == BT_SECURITY_FIPS)
870                 return 1;
871
872         /* Reject not secure link */
873         return 0;
874 }
875 EXPORT_SYMBOL(hci_conn_check_secure);
876
877 /* Change link key */
878 int hci_conn_change_link_key(struct hci_conn *conn)
879 {
880         BT_DBG("hcon %p", conn);
881
882         if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
883                 struct hci_cp_change_conn_link_key cp;
884                 cp.handle = cpu_to_le16(conn->handle);
885                 hci_send_cmd(conn->hdev, HCI_OP_CHANGE_CONN_LINK_KEY,
886                              sizeof(cp), &cp);
887         }
888
889         return 0;
890 }
891
892 /* Switch role */
893 int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
894 {
895         BT_DBG("hcon %p", conn);
896
897         if (!role && conn->link_mode & HCI_LM_MASTER)
898                 return 1;
899
900         if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
901                 struct hci_cp_switch_role cp;
902                 bacpy(&cp.bdaddr, &conn->dst);
903                 cp.role = role;
904                 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
905         }
906
907         return 0;
908 }
909 EXPORT_SYMBOL(hci_conn_switch_role);
910
911 /* Enter active mode */
912 void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
913 {
914         struct hci_dev *hdev = conn->hdev;
915
916         BT_DBG("hcon %p mode %d", conn, conn->mode);
917
918         if (test_bit(HCI_RAW, &hdev->flags))
919                 return;
920
921         if (conn->mode != HCI_CM_SNIFF)
922                 goto timer;
923
924         if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
925                 goto timer;
926
927         if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
928                 struct hci_cp_exit_sniff_mode cp;
929                 cp.handle = cpu_to_le16(conn->handle);
930                 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
931         }
932
933 timer:
934         if (hdev->idle_timeout > 0)
935                 queue_delayed_work(hdev->workqueue, &conn->idle_work,
936                                    msecs_to_jiffies(hdev->idle_timeout));
937 }
938
939 /* Drop all connection on the device */
940 void hci_conn_hash_flush(struct hci_dev *hdev)
941 {
942         struct hci_conn_hash *h = &hdev->conn_hash;
943         struct hci_conn *c, *n;
944
945         BT_DBG("hdev %s", hdev->name);
946
947         list_for_each_entry_safe(c, n, &h->list, list) {
948                 c->state = BT_CLOSED;
949
950                 hci_proto_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
951                 hci_conn_del(c);
952         }
953 }
954
955 /* Check pending connect attempts */
956 void hci_conn_check_pending(struct hci_dev *hdev)
957 {
958         struct hci_conn *conn;
959
960         BT_DBG("hdev %s", hdev->name);
961
962         hci_dev_lock(hdev);
963
964         conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
965         if (conn)
966                 hci_acl_create_connection(conn);
967
968         hci_dev_unlock(hdev);
969 }
970
971 int hci_get_conn_list(void __user *arg)
972 {
973         struct hci_conn *c;
974         struct hci_conn_list_req req, *cl;
975         struct hci_conn_info *ci;
976         struct hci_dev *hdev;
977         int n = 0, size, err;
978
979         if (copy_from_user(&req, arg, sizeof(req)))
980                 return -EFAULT;
981
982         if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
983                 return -EINVAL;
984
985         size = sizeof(req) + req.conn_num * sizeof(*ci);
986
987         cl = kmalloc(size, GFP_KERNEL);
988         if (!cl)
989                 return -ENOMEM;
990
991         hdev = hci_dev_get(req.dev_id);
992         if (!hdev) {
993                 kfree(cl);
994                 return -ENODEV;
995         }
996
997         ci = cl->conn_info;
998
999         hci_dev_lock(hdev);
1000         list_for_each_entry(c, &hdev->conn_hash.list, list) {
1001                 bacpy(&(ci + n)->bdaddr, &c->dst);
1002                 (ci + n)->handle = c->handle;
1003                 (ci + n)->type  = c->type;
1004                 (ci + n)->out   = c->out;
1005                 (ci + n)->state = c->state;
1006                 (ci + n)->link_mode = c->link_mode;
1007                 if (++n >= req.conn_num)
1008                         break;
1009         }
1010         hci_dev_unlock(hdev);
1011
1012         cl->dev_id = hdev->id;
1013         cl->conn_num = n;
1014         size = sizeof(req) + n * sizeof(*ci);
1015
1016         hci_dev_put(hdev);
1017
1018         err = copy_to_user(arg, cl, size);
1019         kfree(cl);
1020
1021         return err ? -EFAULT : 0;
1022 }
1023
1024 int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
1025 {
1026         struct hci_conn_info_req req;
1027         struct hci_conn_info ci;
1028         struct hci_conn *conn;
1029         char __user *ptr = arg + sizeof(req);
1030
1031         if (copy_from_user(&req, arg, sizeof(req)))
1032                 return -EFAULT;
1033
1034         hci_dev_lock(hdev);
1035         conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
1036         if (conn) {
1037                 bacpy(&ci.bdaddr, &conn->dst);
1038                 ci.handle = conn->handle;
1039                 ci.type  = conn->type;
1040                 ci.out   = conn->out;
1041                 ci.state = conn->state;
1042                 ci.link_mode = conn->link_mode;
1043         }
1044         hci_dev_unlock(hdev);
1045
1046         if (!conn)
1047                 return -ENOENT;
1048
1049         return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
1050 }
1051
1052 int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
1053 {
1054         struct hci_auth_info_req req;
1055         struct hci_conn *conn;
1056
1057         if (copy_from_user(&req, arg, sizeof(req)))
1058                 return -EFAULT;
1059
1060         hci_dev_lock(hdev);
1061         conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
1062         if (conn)
1063                 req.type = conn->auth_type;
1064         hci_dev_unlock(hdev);
1065
1066         if (!conn)
1067                 return -ENOENT;
1068
1069         return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
1070 }
1071
1072 struct hci_chan *hci_chan_create(struct hci_conn *conn)
1073 {
1074         struct hci_dev *hdev = conn->hdev;
1075         struct hci_chan *chan;
1076
1077         BT_DBG("%s hcon %p", hdev->name, conn);
1078
1079         chan = kzalloc(sizeof(struct hci_chan), GFP_KERNEL);
1080         if (!chan)
1081                 return NULL;
1082
1083         chan->conn = conn;
1084         skb_queue_head_init(&chan->data_q);
1085         chan->state = BT_CONNECTED;
1086
1087         list_add_rcu(&chan->list, &conn->chan_list);
1088
1089         return chan;
1090 }
1091
1092 void hci_chan_del(struct hci_chan *chan)
1093 {
1094         struct hci_conn *conn = chan->conn;
1095         struct hci_dev *hdev = conn->hdev;
1096
1097         BT_DBG("%s hcon %p chan %p", hdev->name, conn, chan);
1098
1099         list_del_rcu(&chan->list);
1100
1101         synchronize_rcu();
1102
1103         hci_conn_drop(conn);
1104
1105         skb_queue_purge(&chan->data_q);
1106         kfree(chan);
1107 }
1108
1109 void hci_chan_list_flush(struct hci_conn *conn)
1110 {
1111         struct hci_chan *chan, *n;
1112
1113         BT_DBG("hcon %p", conn);
1114
1115         list_for_each_entry_safe(chan, n, &conn->chan_list, list)
1116                 hci_chan_del(chan);
1117 }
1118
1119 static struct hci_chan *__hci_chan_lookup_handle(struct hci_conn *hcon,
1120                                                  __u16 handle)
1121 {
1122         struct hci_chan *hchan;
1123
1124         list_for_each_entry(hchan, &hcon->chan_list, list) {
1125                 if (hchan->handle == handle)
1126                         return hchan;
1127         }
1128
1129         return NULL;
1130 }
1131
1132 struct hci_chan *hci_chan_lookup_handle(struct hci_dev *hdev, __u16 handle)
1133 {
1134         struct hci_conn_hash *h = &hdev->conn_hash;
1135         struct hci_conn *hcon;
1136         struct hci_chan *hchan = NULL;
1137
1138         rcu_read_lock();
1139
1140         list_for_each_entry_rcu(hcon, &h->list, list) {
1141                 hchan = __hci_chan_lookup_handle(hcon, handle);
1142                 if (hchan)
1143                         break;
1144         }
1145
1146         rcu_read_unlock();
1147
1148         return hchan;
1149 }