Bluetooth: Fix updating connection state to BT_CONNECT too early
[firefly-linux-kernel-4.4.55.git] / net / bluetooth / hci_conn.c
1 /*
2    BlueZ - Bluetooth protocol stack for Linux
3    Copyright (c) 2000-2001, 2010, Code Aurora Forum. All rights reserved.
4
5    Written 2000,2001 by Maxim Krasnyansky <maxk@qualcomm.com>
6
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License version 2 as
9    published by the Free Software Foundation;
10
11    THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
12    OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
13    FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
14    IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
15    CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
16    WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17    ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18    OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19
20    ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
21    COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
22    SOFTWARE IS DISCLAIMED.
23 */
24
25 /* Bluetooth HCI connection handling. */
26
27 #include <linux/export.h>
28
29 #include <net/bluetooth/bluetooth.h>
30 #include <net/bluetooth/hci_core.h>
31
32 #include "smp.h"
33 #include "a2mp.h"
34
35 struct sco_param {
36         u16 pkt_type;
37         u16 max_latency;
38 };
39
40 static const struct sco_param sco_param_cvsd[] = {
41         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000a }, /* S3 */
42         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x0007 }, /* S2 */
43         { EDR_ESCO_MASK | ESCO_EV3,   0x0007 }, /* S1 */
44         { EDR_ESCO_MASK | ESCO_HV3,   0xffff }, /* D1 */
45         { EDR_ESCO_MASK | ESCO_HV1,   0xffff }, /* D0 */
46 };
47
48 static const struct sco_param sco_param_wideband[] = {
49         { EDR_ESCO_MASK & ~ESCO_2EV3, 0x000d }, /* T2 */
50         { EDR_ESCO_MASK | ESCO_EV3,   0x0008 }, /* T1 */
51 };
52
53 static void hci_le_create_connection_cancel(struct hci_conn *conn)
54 {
55         hci_send_cmd(conn->hdev, HCI_OP_LE_CREATE_CONN_CANCEL, 0, NULL);
56 }
57
58 static void hci_acl_create_connection(struct hci_conn *conn)
59 {
60         struct hci_dev *hdev = conn->hdev;
61         struct inquiry_entry *ie;
62         struct hci_cp_create_conn cp;
63
64         BT_DBG("hcon %p", conn);
65
66         conn->state = BT_CONNECT;
67         conn->out = true;
68
69         conn->link_mode = HCI_LM_MASTER;
70
71         conn->attempt++;
72
73         conn->link_policy = hdev->link_policy;
74
75         memset(&cp, 0, sizeof(cp));
76         bacpy(&cp.bdaddr, &conn->dst);
77         cp.pscan_rep_mode = 0x02;
78
79         ie = hci_inquiry_cache_lookup(hdev, &conn->dst);
80         if (ie) {
81                 if (inquiry_entry_age(ie) <= INQUIRY_ENTRY_AGE_MAX) {
82                         cp.pscan_rep_mode = ie->data.pscan_rep_mode;
83                         cp.pscan_mode     = ie->data.pscan_mode;
84                         cp.clock_offset   = ie->data.clock_offset |
85                                             __constant_cpu_to_le16(0x8000);
86                 }
87
88                 memcpy(conn->dev_class, ie->data.dev_class, 3);
89                 if (ie->data.ssp_mode > 0)
90                         set_bit(HCI_CONN_SSP_ENABLED, &conn->flags);
91         }
92
93         cp.pkt_type = cpu_to_le16(conn->pkt_type);
94         if (lmp_rswitch_capable(hdev) && !(hdev->link_mode & HCI_LM_MASTER))
95                 cp.role_switch = 0x01;
96         else
97                 cp.role_switch = 0x00;
98
99         hci_send_cmd(hdev, HCI_OP_CREATE_CONN, sizeof(cp), &cp);
100 }
101
102 static void hci_acl_create_connection_cancel(struct hci_conn *conn)
103 {
104         struct hci_cp_create_conn_cancel cp;
105
106         BT_DBG("hcon %p", conn);
107
108         if (conn->hdev->hci_ver < BLUETOOTH_VER_1_2)
109                 return;
110
111         bacpy(&cp.bdaddr, &conn->dst);
112         hci_send_cmd(conn->hdev, HCI_OP_CREATE_CONN_CANCEL, sizeof(cp), &cp);
113 }
114
115 static void hci_reject_sco(struct hci_conn *conn)
116 {
117         struct hci_cp_reject_sync_conn_req cp;
118
119         cp.reason = HCI_ERROR_REMOTE_USER_TERM;
120         bacpy(&cp.bdaddr, &conn->dst);
121
122         hci_send_cmd(conn->hdev, HCI_OP_REJECT_SYNC_CONN_REQ, sizeof(cp), &cp);
123 }
124
125 void hci_disconnect(struct hci_conn *conn, __u8 reason)
126 {
127         struct hci_cp_disconnect cp;
128
129         BT_DBG("hcon %p", conn);
130
131         conn->state = BT_DISCONN;
132
133         cp.handle = cpu_to_le16(conn->handle);
134         cp.reason = reason;
135         hci_send_cmd(conn->hdev, HCI_OP_DISCONNECT, sizeof(cp), &cp);
136 }
137
138 static void hci_amp_disconn(struct hci_conn *conn, __u8 reason)
139 {
140         struct hci_cp_disconn_phy_link cp;
141
142         BT_DBG("hcon %p", conn);
143
144         conn->state = BT_DISCONN;
145
146         cp.phy_handle = HCI_PHY_HANDLE(conn->handle);
147         cp.reason = reason;
148         hci_send_cmd(conn->hdev, HCI_OP_DISCONN_PHY_LINK,
149                      sizeof(cp), &cp);
150 }
151
152 static void hci_add_sco(struct hci_conn *conn, __u16 handle)
153 {
154         struct hci_dev *hdev = conn->hdev;
155         struct hci_cp_add_sco cp;
156
157         BT_DBG("hcon %p", conn);
158
159         conn->state = BT_CONNECT;
160         conn->out = true;
161
162         conn->attempt++;
163
164         cp.handle   = cpu_to_le16(handle);
165         cp.pkt_type = cpu_to_le16(conn->pkt_type);
166
167         hci_send_cmd(hdev, HCI_OP_ADD_SCO, sizeof(cp), &cp);
168 }
169
170 bool hci_setup_sync(struct hci_conn *conn, __u16 handle)
171 {
172         struct hci_dev *hdev = conn->hdev;
173         struct hci_cp_setup_sync_conn cp;
174         const struct sco_param *param;
175
176         BT_DBG("hcon %p", conn);
177
178         conn->state = BT_CONNECT;
179         conn->out = true;
180
181         conn->attempt++;
182
183         cp.handle   = cpu_to_le16(handle);
184
185         cp.tx_bandwidth   = __constant_cpu_to_le32(0x00001f40);
186         cp.rx_bandwidth   = __constant_cpu_to_le32(0x00001f40);
187         cp.voice_setting  = cpu_to_le16(conn->setting);
188
189         switch (conn->setting & SCO_AIRMODE_MASK) {
190         case SCO_AIRMODE_TRANSP:
191                 if (conn->attempt > ARRAY_SIZE(sco_param_wideband))
192                         return false;
193                 cp.retrans_effort = 0x02;
194                 param = &sco_param_wideband[conn->attempt - 1];
195                 break;
196         case SCO_AIRMODE_CVSD:
197                 if (conn->attempt > ARRAY_SIZE(sco_param_cvsd))
198                         return false;
199                 cp.retrans_effort = 0x01;
200                 param = &sco_param_cvsd[conn->attempt - 1];
201                 break;
202         default:
203                 return false;
204         }
205
206         cp.pkt_type = __cpu_to_le16(param->pkt_type);
207         cp.max_latency = __cpu_to_le16(param->max_latency);
208
209         if (hci_send_cmd(hdev, HCI_OP_SETUP_SYNC_CONN, sizeof(cp), &cp) < 0)
210                 return false;
211
212         return true;
213 }
214
215 void hci_le_conn_update(struct hci_conn *conn, u16 min, u16 max,
216                         u16 latency, u16 to_multiplier)
217 {
218         struct hci_cp_le_conn_update cp;
219         struct hci_dev *hdev = conn->hdev;
220
221         memset(&cp, 0, sizeof(cp));
222
223         cp.handle               = cpu_to_le16(conn->handle);
224         cp.conn_interval_min    = cpu_to_le16(min);
225         cp.conn_interval_max    = cpu_to_le16(max);
226         cp.conn_latency         = cpu_to_le16(latency);
227         cp.supervision_timeout  = cpu_to_le16(to_multiplier);
228         cp.min_ce_len           = __constant_cpu_to_le16(0x0000);
229         cp.max_ce_len           = __constant_cpu_to_le16(0x0000);
230
231         hci_send_cmd(hdev, HCI_OP_LE_CONN_UPDATE, sizeof(cp), &cp);
232 }
233
234 void hci_le_start_enc(struct hci_conn *conn, __le16 ediv, __le64 rand,
235                       __u8 ltk[16])
236 {
237         struct hci_dev *hdev = conn->hdev;
238         struct hci_cp_le_start_enc cp;
239
240         BT_DBG("hcon %p", conn);
241
242         memset(&cp, 0, sizeof(cp));
243
244         cp.handle = cpu_to_le16(conn->handle);
245         cp.rand = rand;
246         cp.ediv = ediv;
247         memcpy(cp.ltk, ltk, sizeof(cp.ltk));
248
249         hci_send_cmd(hdev, HCI_OP_LE_START_ENC, sizeof(cp), &cp);
250 }
251
252 /* Device _must_ be locked */
253 void hci_sco_setup(struct hci_conn *conn, __u8 status)
254 {
255         struct hci_conn *sco = conn->link;
256
257         if (!sco)
258                 return;
259
260         BT_DBG("hcon %p", conn);
261
262         if (!status) {
263                 if (lmp_esco_capable(conn->hdev))
264                         hci_setup_sync(sco, conn->handle);
265                 else
266                         hci_add_sco(sco, conn->handle);
267         } else {
268                 hci_proto_connect_cfm(sco, status);
269                 hci_conn_del(sco);
270         }
271 }
272
273 static void hci_conn_disconnect(struct hci_conn *conn)
274 {
275         __u8 reason = hci_proto_disconn_ind(conn);
276
277         switch (conn->type) {
278         case AMP_LINK:
279                 hci_amp_disconn(conn, reason);
280                 break;
281         default:
282                 hci_disconnect(conn, reason);
283                 break;
284         }
285 }
286
287 static void hci_conn_timeout(struct work_struct *work)
288 {
289         struct hci_conn *conn = container_of(work, struct hci_conn,
290                                              disc_work.work);
291
292         BT_DBG("hcon %p state %s", conn, state_to_string(conn->state));
293
294         if (atomic_read(&conn->refcnt))
295                 return;
296
297         switch (conn->state) {
298         case BT_CONNECT:
299         case BT_CONNECT2:
300                 if (conn->out) {
301                         if (conn->type == ACL_LINK)
302                                 hci_acl_create_connection_cancel(conn);
303                         else if (conn->type == LE_LINK)
304                                 hci_le_create_connection_cancel(conn);
305                 } else if (conn->type == SCO_LINK || conn->type == ESCO_LINK) {
306                         hci_reject_sco(conn);
307                 }
308                 break;
309         case BT_CONFIG:
310         case BT_CONNECTED:
311                 hci_conn_disconnect(conn);
312                 break;
313         default:
314                 conn->state = BT_CLOSED;
315                 break;
316         }
317 }
318
319 /* Enter sniff mode */
320 static void hci_conn_idle(struct work_struct *work)
321 {
322         struct hci_conn *conn = container_of(work, struct hci_conn,
323                                              idle_work.work);
324         struct hci_dev *hdev = conn->hdev;
325
326         BT_DBG("hcon %p mode %d", conn, conn->mode);
327
328         if (test_bit(HCI_RAW, &hdev->flags))
329                 return;
330
331         if (!lmp_sniff_capable(hdev) || !lmp_sniff_capable(conn))
332                 return;
333
334         if (conn->mode != HCI_CM_ACTIVE || !(conn->link_policy & HCI_LP_SNIFF))
335                 return;
336
337         if (lmp_sniffsubr_capable(hdev) && lmp_sniffsubr_capable(conn)) {
338                 struct hci_cp_sniff_subrate cp;
339                 cp.handle             = cpu_to_le16(conn->handle);
340                 cp.max_latency        = __constant_cpu_to_le16(0);
341                 cp.min_remote_timeout = __constant_cpu_to_le16(0);
342                 cp.min_local_timeout  = __constant_cpu_to_le16(0);
343                 hci_send_cmd(hdev, HCI_OP_SNIFF_SUBRATE, sizeof(cp), &cp);
344         }
345
346         if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
347                 struct hci_cp_sniff_mode cp;
348                 cp.handle       = cpu_to_le16(conn->handle);
349                 cp.max_interval = cpu_to_le16(hdev->sniff_max_interval);
350                 cp.min_interval = cpu_to_le16(hdev->sniff_min_interval);
351                 cp.attempt      = __constant_cpu_to_le16(4);
352                 cp.timeout      = __constant_cpu_to_le16(1);
353                 hci_send_cmd(hdev, HCI_OP_SNIFF_MODE, sizeof(cp), &cp);
354         }
355 }
356
357 static void hci_conn_auto_accept(struct work_struct *work)
358 {
359         struct hci_conn *conn = container_of(work, struct hci_conn,
360                                              auto_accept_work.work);
361
362         hci_send_cmd(conn->hdev, HCI_OP_USER_CONFIRM_REPLY, sizeof(conn->dst),
363                      &conn->dst);
364 }
365
366 struct hci_conn *hci_conn_add(struct hci_dev *hdev, int type, bdaddr_t *dst)
367 {
368         struct hci_conn *conn;
369
370         BT_DBG("%s dst %pMR", hdev->name, dst);
371
372         conn = kzalloc(sizeof(struct hci_conn), GFP_KERNEL);
373         if (!conn)
374                 return NULL;
375
376         bacpy(&conn->dst, dst);
377         bacpy(&conn->src, &hdev->bdaddr);
378         conn->hdev  = hdev;
379         conn->type  = type;
380         conn->mode  = HCI_CM_ACTIVE;
381         conn->state = BT_OPEN;
382         conn->auth_type = HCI_AT_GENERAL_BONDING;
383         conn->io_capability = hdev->io_capability;
384         conn->remote_auth = 0xff;
385         conn->key_type = 0xff;
386
387         set_bit(HCI_CONN_POWER_SAVE, &conn->flags);
388         conn->disc_timeout = HCI_DISCONN_TIMEOUT;
389
390         switch (type) {
391         case ACL_LINK:
392                 conn->pkt_type = hdev->pkt_type & ACL_PTYPE_MASK;
393                 break;
394         case SCO_LINK:
395                 if (lmp_esco_capable(hdev))
396                         conn->pkt_type = (hdev->esco_type & SCO_ESCO_MASK) |
397                                         (hdev->esco_type & EDR_ESCO_MASK);
398                 else
399                         conn->pkt_type = hdev->pkt_type & SCO_PTYPE_MASK;
400                 break;
401         case ESCO_LINK:
402                 conn->pkt_type = hdev->esco_type & ~EDR_ESCO_MASK;
403                 break;
404         }
405
406         skb_queue_head_init(&conn->data_q);
407
408         INIT_LIST_HEAD(&conn->chan_list);
409
410         INIT_DELAYED_WORK(&conn->disc_work, hci_conn_timeout);
411         INIT_DELAYED_WORK(&conn->auto_accept_work, hci_conn_auto_accept);
412         INIT_DELAYED_WORK(&conn->idle_work, hci_conn_idle);
413
414         atomic_set(&conn->refcnt, 0);
415
416         hci_dev_hold(hdev);
417
418         hci_conn_hash_add(hdev, conn);
419         if (hdev->notify)
420                 hdev->notify(hdev, HCI_NOTIFY_CONN_ADD);
421
422         hci_conn_init_sysfs(conn);
423
424         return conn;
425 }
426
427 int hci_conn_del(struct hci_conn *conn)
428 {
429         struct hci_dev *hdev = conn->hdev;
430
431         BT_DBG("%s hcon %p handle %d", hdev->name, conn, conn->handle);
432
433         cancel_delayed_work_sync(&conn->disc_work);
434         cancel_delayed_work_sync(&conn->auto_accept_work);
435         cancel_delayed_work_sync(&conn->idle_work);
436
437         if (conn->type == ACL_LINK) {
438                 struct hci_conn *sco = conn->link;
439                 if (sco)
440                         sco->link = NULL;
441
442                 /* Unacked frames */
443                 hdev->acl_cnt += conn->sent;
444         } else if (conn->type == LE_LINK) {
445                 if (hdev->le_pkts)
446                         hdev->le_cnt += conn->sent;
447                 else
448                         hdev->acl_cnt += conn->sent;
449         } else {
450                 struct hci_conn *acl = conn->link;
451                 if (acl) {
452                         acl->link = NULL;
453                         hci_conn_drop(acl);
454                 }
455         }
456
457         hci_chan_list_flush(conn);
458
459         if (conn->amp_mgr)
460                 amp_mgr_put(conn->amp_mgr);
461
462         hci_conn_hash_del(hdev, conn);
463         if (hdev->notify)
464                 hdev->notify(hdev, HCI_NOTIFY_CONN_DEL);
465
466         skb_queue_purge(&conn->data_q);
467
468         hci_conn_del_sysfs(conn);
469
470         hci_dev_put(hdev);
471
472         hci_conn_put(conn);
473
474         return 0;
475 }
476
477 struct hci_dev *hci_get_route(bdaddr_t *dst, bdaddr_t *src)
478 {
479         int use_src = bacmp(src, BDADDR_ANY);
480         struct hci_dev *hdev = NULL, *d;
481
482         BT_DBG("%pMR -> %pMR", src, dst);
483
484         read_lock(&hci_dev_list_lock);
485
486         list_for_each_entry(d, &hci_dev_list, list) {
487                 if (!test_bit(HCI_UP, &d->flags) ||
488                     test_bit(HCI_RAW, &d->flags) ||
489                     test_bit(HCI_USER_CHANNEL, &d->dev_flags) ||
490                     d->dev_type != HCI_BREDR)
491                         continue;
492
493                 /* Simple routing:
494                  *   No source address - find interface with bdaddr != dst
495                  *   Source address    - find interface with bdaddr == src
496                  */
497
498                 if (use_src) {
499                         if (!bacmp(&d->bdaddr, src)) {
500                                 hdev = d; break;
501                         }
502                 } else {
503                         if (bacmp(&d->bdaddr, dst)) {
504                                 hdev = d; break;
505                         }
506                 }
507         }
508
509         if (hdev)
510                 hdev = hci_dev_hold(hdev);
511
512         read_unlock(&hci_dev_list_lock);
513         return hdev;
514 }
515 EXPORT_SYMBOL(hci_get_route);
516
517 /* This function requires the caller holds hdev->lock */
518 void hci_le_conn_failed(struct hci_conn *conn, u8 status)
519 {
520         struct hci_dev *hdev = conn->hdev;
521
522         conn->state = BT_CLOSED;
523
524         mgmt_connect_failed(hdev, &conn->dst, conn->type, conn->dst_type,
525                             status);
526
527         hci_proto_connect_cfm(conn, status);
528
529         hci_conn_del(conn);
530
531         /* Since we may have temporarily stopped the background scanning in
532          * favor of connection establishment, we should restart it.
533          */
534         hci_update_background_scan(hdev);
535 }
536
537 static void create_le_conn_complete(struct hci_dev *hdev, u8 status)
538 {
539         struct hci_conn *conn;
540
541         if (status == 0)
542                 return;
543
544         BT_ERR("HCI request failed to create LE connection: status 0x%2.2x",
545                status);
546
547         hci_dev_lock(hdev);
548
549         conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
550         if (!conn)
551                 goto done;
552
553         hci_le_conn_failed(conn, status);
554
555 done:
556         hci_dev_unlock(hdev);
557 }
558
559 static void hci_req_add_le_create_conn(struct hci_request *req,
560                                        struct hci_conn *conn)
561 {
562         struct hci_cp_le_create_conn cp;
563         struct hci_dev *hdev = conn->hdev;
564         u8 own_addr_type;
565
566         memset(&cp, 0, sizeof(cp));
567
568         /* Update random address, but set require_privacy to false so
569          * that we never connect with an unresolvable address.
570          */
571         if (hci_update_random_address(req, false, &own_addr_type))
572                 return;
573
574         /* Save the address type used for this connnection attempt so we able
575          * to retrieve this information if we need it.
576          */
577         conn->src_type = own_addr_type;
578
579         cp.scan_interval = cpu_to_le16(hdev->le_scan_interval);
580         cp.scan_window = cpu_to_le16(hdev->le_scan_window);
581         bacpy(&cp.peer_addr, &conn->dst);
582         cp.peer_addr_type = conn->dst_type;
583         cp.own_address_type = own_addr_type;
584         cp.conn_interval_min = cpu_to_le16(conn->le_conn_min_interval);
585         cp.conn_interval_max = cpu_to_le16(conn->le_conn_max_interval);
586         cp.supervision_timeout = __constant_cpu_to_le16(0x002a);
587         cp.min_ce_len = __constant_cpu_to_le16(0x0000);
588         cp.max_ce_len = __constant_cpu_to_le16(0x0000);
589
590         hci_req_add(req, HCI_OP_LE_CREATE_CONN, sizeof(cp), &cp);
591
592         conn->state = BT_CONNECT;
593 }
594
595 static void stop_scan_complete(struct hci_dev *hdev, u8 status)
596 {
597         struct hci_request req;
598         struct hci_conn *conn;
599         int err;
600
601         conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
602         if (!conn)
603                 return;
604
605         if (status) {
606                 BT_DBG("HCI request failed to stop scanning: status 0x%2.2x",
607                        status);
608
609                 hci_dev_lock(hdev);
610                 hci_le_conn_failed(conn, status);
611                 hci_dev_unlock(hdev);
612                 return;
613         }
614
615         /* Since we may have prematurely stopped discovery procedure, we should
616          * update discovery state.
617          */
618         cancel_delayed_work(&hdev->le_scan_disable);
619         hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
620
621         hci_req_init(&req, hdev);
622
623         hci_req_add_le_create_conn(&req, conn);
624
625         err = hci_req_run(&req, create_le_conn_complete);
626         if (err) {
627                 hci_dev_lock(hdev);
628                 hci_le_conn_failed(conn, HCI_ERROR_MEMORY_EXCEEDED);
629                 hci_dev_unlock(hdev);
630                 return;
631         }
632 }
633
634 struct hci_conn *hci_connect_le(struct hci_dev *hdev, bdaddr_t *dst,
635                                 u8 dst_type, u8 sec_level, u8 auth_type)
636 {
637         struct hci_conn_params *params;
638         struct hci_conn *conn;
639         struct smp_irk *irk;
640         struct hci_request req;
641         int err;
642
643         if (test_bit(HCI_ADVERTISING, &hdev->flags))
644                 return ERR_PTR(-ENOTSUPP);
645
646         /* Some devices send ATT messages as soon as the physical link is
647          * established. To be able to handle these ATT messages, the user-
648          * space first establishes the connection and then starts the pairing
649          * process.
650          *
651          * So if a hci_conn object already exists for the following connection
652          * attempt, we simply update pending_sec_level and auth_type fields
653          * and return the object found.
654          */
655         conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, dst);
656         if (conn) {
657                 conn->pending_sec_level = sec_level;
658                 conn->auth_type = auth_type;
659                 goto done;
660         }
661
662         /* Since the controller supports only one LE connection attempt at a
663          * time, we return -EBUSY if there is any connection attempt running.
664          */
665         conn = hci_conn_hash_lookup_state(hdev, LE_LINK, BT_CONNECT);
666         if (conn)
667                 return ERR_PTR(-EBUSY);
668
669         /* When given an identity address with existing identity
670          * resolving key, the connection needs to be established
671          * to a resolvable random address.
672          *
673          * This uses the cached random resolvable address from
674          * a previous scan. When no cached address is available,
675          * try connecting to the identity address instead.
676          *
677          * Storing the resolvable random address is required here
678          * to handle connection failures. The address will later
679          * be resolved back into the original identity address
680          * from the connect request.
681          */
682         irk = hci_find_irk_by_addr(hdev, dst, dst_type);
683         if (irk && bacmp(&irk->rpa, BDADDR_ANY)) {
684                 dst = &irk->rpa;
685                 dst_type = ADDR_LE_DEV_RANDOM;
686         }
687
688         conn = hci_conn_add(hdev, LE_LINK, dst);
689         if (!conn)
690                 return ERR_PTR(-ENOMEM);
691
692         conn->dst_type = dst_type;
693
694         conn->out = true;
695         conn->link_mode |= HCI_LM_MASTER;
696         conn->sec_level = BT_SECURITY_LOW;
697         conn->pending_sec_level = sec_level;
698         conn->auth_type = auth_type;
699
700         params = hci_conn_params_lookup(hdev, &conn->dst, conn->dst_type);
701         if (params) {
702                 conn->le_conn_min_interval = params->conn_min_interval;
703                 conn->le_conn_max_interval = params->conn_max_interval;
704         } else {
705                 conn->le_conn_min_interval = hdev->le_conn_min_interval;
706                 conn->le_conn_max_interval = hdev->le_conn_max_interval;
707         }
708
709         hci_req_init(&req, hdev);
710
711         /* If controller is scanning, we stop it since some controllers are
712          * not able to scan and connect at the same time.
713          */
714         if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
715                 hci_req_add_le_scan_disable(&req);
716                 err = hci_req_run(&req, stop_scan_complete);
717         } else {
718                 hci_req_add_le_create_conn(&req, conn);
719                 err = hci_req_run(&req, create_le_conn_complete);
720         }
721
722         if (err) {
723                 hci_conn_del(conn);
724                 return ERR_PTR(err);
725         }
726
727 done:
728         hci_conn_hold(conn);
729         return conn;
730 }
731
732 struct hci_conn *hci_connect_acl(struct hci_dev *hdev, bdaddr_t *dst,
733                                  u8 sec_level, u8 auth_type)
734 {
735         struct hci_conn *acl;
736
737         if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
738                 return ERR_PTR(-ENOTSUPP);
739
740         acl = hci_conn_hash_lookup_ba(hdev, ACL_LINK, dst);
741         if (!acl) {
742                 acl = hci_conn_add(hdev, ACL_LINK, dst);
743                 if (!acl)
744                         return ERR_PTR(-ENOMEM);
745         }
746
747         hci_conn_hold(acl);
748
749         if (acl->state == BT_OPEN || acl->state == BT_CLOSED) {
750                 acl->sec_level = BT_SECURITY_LOW;
751                 acl->pending_sec_level = sec_level;
752                 acl->auth_type = auth_type;
753                 hci_acl_create_connection(acl);
754         }
755
756         return acl;
757 }
758
759 struct hci_conn *hci_connect_sco(struct hci_dev *hdev, int type, bdaddr_t *dst,
760                                  __u16 setting)
761 {
762         struct hci_conn *acl;
763         struct hci_conn *sco;
764
765         acl = hci_connect_acl(hdev, dst, BT_SECURITY_LOW, HCI_AT_NO_BONDING);
766         if (IS_ERR(acl))
767                 return acl;
768
769         sco = hci_conn_hash_lookup_ba(hdev, type, dst);
770         if (!sco) {
771                 sco = hci_conn_add(hdev, type, dst);
772                 if (!sco) {
773                         hci_conn_drop(acl);
774                         return ERR_PTR(-ENOMEM);
775                 }
776         }
777
778         acl->link = sco;
779         sco->link = acl;
780
781         hci_conn_hold(sco);
782
783         sco->setting = setting;
784
785         if (acl->state == BT_CONNECTED &&
786             (sco->state == BT_OPEN || sco->state == BT_CLOSED)) {
787                 set_bit(HCI_CONN_POWER_SAVE, &acl->flags);
788                 hci_conn_enter_active_mode(acl, BT_POWER_FORCE_ACTIVE_ON);
789
790                 if (test_bit(HCI_CONN_MODE_CHANGE_PEND, &acl->flags)) {
791                         /* defer SCO setup until mode change completed */
792                         set_bit(HCI_CONN_SCO_SETUP_PEND, &acl->flags);
793                         return sco;
794                 }
795
796                 hci_sco_setup(acl, 0x00);
797         }
798
799         return sco;
800 }
801
802 /* Check link security requirement */
803 int hci_conn_check_link_mode(struct hci_conn *conn)
804 {
805         BT_DBG("hcon %p", conn);
806
807         if (hci_conn_ssp_enabled(conn) && !(conn->link_mode & HCI_LM_ENCRYPT))
808                 return 0;
809
810         return 1;
811 }
812
813 /* Authenticate remote device */
814 static int hci_conn_auth(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
815 {
816         BT_DBG("hcon %p", conn);
817
818         if (conn->pending_sec_level > sec_level)
819                 sec_level = conn->pending_sec_level;
820
821         if (sec_level > conn->sec_level)
822                 conn->pending_sec_level = sec_level;
823         else if (conn->link_mode & HCI_LM_AUTH)
824                 return 1;
825
826         /* Make sure we preserve an existing MITM requirement*/
827         auth_type |= (conn->auth_type & 0x01);
828
829         conn->auth_type = auth_type;
830
831         if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
832                 struct hci_cp_auth_requested cp;
833
834                 /* encrypt must be pending if auth is also pending */
835                 set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags);
836
837                 cp.handle = cpu_to_le16(conn->handle);
838                 hci_send_cmd(conn->hdev, HCI_OP_AUTH_REQUESTED,
839                              sizeof(cp), &cp);
840                 if (conn->key_type != 0xff)
841                         set_bit(HCI_CONN_REAUTH_PEND, &conn->flags);
842         }
843
844         return 0;
845 }
846
847 /* Encrypt the the link */
848 static void hci_conn_encrypt(struct hci_conn *conn)
849 {
850         BT_DBG("hcon %p", conn);
851
852         if (!test_and_set_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags)) {
853                 struct hci_cp_set_conn_encrypt cp;
854                 cp.handle  = cpu_to_le16(conn->handle);
855                 cp.encrypt = 0x01;
856                 hci_send_cmd(conn->hdev, HCI_OP_SET_CONN_ENCRYPT, sizeof(cp),
857                              &cp);
858         }
859 }
860
861 /* Enable security */
862 int hci_conn_security(struct hci_conn *conn, __u8 sec_level, __u8 auth_type)
863 {
864         BT_DBG("hcon %p", conn);
865
866         if (conn->type == LE_LINK)
867                 return smp_conn_security(conn, sec_level);
868
869         /* For sdp we don't need the link key. */
870         if (sec_level == BT_SECURITY_SDP)
871                 return 1;
872
873         /* For non 2.1 devices and low security level we don't need the link
874            key. */
875         if (sec_level == BT_SECURITY_LOW && !hci_conn_ssp_enabled(conn))
876                 return 1;
877
878         /* For other security levels we need the link key. */
879         if (!(conn->link_mode & HCI_LM_AUTH))
880                 goto auth;
881
882         /* An authenticated FIPS approved combination key has sufficient
883          * security for security level 4. */
884         if (conn->key_type == HCI_LK_AUTH_COMBINATION_P256 &&
885             sec_level == BT_SECURITY_FIPS)
886                 goto encrypt;
887
888         /* An authenticated combination key has sufficient security for
889            security level 3. */
890         if ((conn->key_type == HCI_LK_AUTH_COMBINATION_P192 ||
891              conn->key_type == HCI_LK_AUTH_COMBINATION_P256) &&
892             sec_level == BT_SECURITY_HIGH)
893                 goto encrypt;
894
895         /* An unauthenticated combination key has sufficient security for
896            security level 1 and 2. */
897         if ((conn->key_type == HCI_LK_UNAUTH_COMBINATION_P192 ||
898              conn->key_type == HCI_LK_UNAUTH_COMBINATION_P256) &&
899             (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW))
900                 goto encrypt;
901
902         /* A combination key has always sufficient security for the security
903            levels 1 or 2. High security level requires the combination key
904            is generated using maximum PIN code length (16).
905            For pre 2.1 units. */
906         if (conn->key_type == HCI_LK_COMBINATION &&
907             (sec_level == BT_SECURITY_MEDIUM || sec_level == BT_SECURITY_LOW ||
908              conn->pin_length == 16))
909                 goto encrypt;
910
911 auth:
912         if (test_bit(HCI_CONN_ENCRYPT_PEND, &conn->flags))
913                 return 0;
914
915         if (!hci_conn_auth(conn, sec_level, auth_type))
916                 return 0;
917
918 encrypt:
919         if (conn->link_mode & HCI_LM_ENCRYPT)
920                 return 1;
921
922         hci_conn_encrypt(conn);
923         return 0;
924 }
925 EXPORT_SYMBOL(hci_conn_security);
926
927 /* Check secure link requirement */
928 int hci_conn_check_secure(struct hci_conn *conn, __u8 sec_level)
929 {
930         BT_DBG("hcon %p", conn);
931
932         /* Accept if non-secure or higher security level is required */
933         if (sec_level != BT_SECURITY_HIGH && sec_level != BT_SECURITY_FIPS)
934                 return 1;
935
936         /* Accept if secure or higher security level is already present */
937         if (conn->sec_level == BT_SECURITY_HIGH ||
938             conn->sec_level == BT_SECURITY_FIPS)
939                 return 1;
940
941         /* Reject not secure link */
942         return 0;
943 }
944 EXPORT_SYMBOL(hci_conn_check_secure);
945
946 /* Change link key */
947 int hci_conn_change_link_key(struct hci_conn *conn)
948 {
949         BT_DBG("hcon %p", conn);
950
951         if (!test_and_set_bit(HCI_CONN_AUTH_PEND, &conn->flags)) {
952                 struct hci_cp_change_conn_link_key cp;
953                 cp.handle = cpu_to_le16(conn->handle);
954                 hci_send_cmd(conn->hdev, HCI_OP_CHANGE_CONN_LINK_KEY,
955                              sizeof(cp), &cp);
956         }
957
958         return 0;
959 }
960
961 /* Switch role */
962 int hci_conn_switch_role(struct hci_conn *conn, __u8 role)
963 {
964         BT_DBG("hcon %p", conn);
965
966         if (!role && conn->link_mode & HCI_LM_MASTER)
967                 return 1;
968
969         if (!test_and_set_bit(HCI_CONN_RSWITCH_PEND, &conn->flags)) {
970                 struct hci_cp_switch_role cp;
971                 bacpy(&cp.bdaddr, &conn->dst);
972                 cp.role = role;
973                 hci_send_cmd(conn->hdev, HCI_OP_SWITCH_ROLE, sizeof(cp), &cp);
974         }
975
976         return 0;
977 }
978 EXPORT_SYMBOL(hci_conn_switch_role);
979
980 /* Enter active mode */
981 void hci_conn_enter_active_mode(struct hci_conn *conn, __u8 force_active)
982 {
983         struct hci_dev *hdev = conn->hdev;
984
985         BT_DBG("hcon %p mode %d", conn, conn->mode);
986
987         if (test_bit(HCI_RAW, &hdev->flags))
988                 return;
989
990         if (conn->mode != HCI_CM_SNIFF)
991                 goto timer;
992
993         if (!test_bit(HCI_CONN_POWER_SAVE, &conn->flags) && !force_active)
994                 goto timer;
995
996         if (!test_and_set_bit(HCI_CONN_MODE_CHANGE_PEND, &conn->flags)) {
997                 struct hci_cp_exit_sniff_mode cp;
998                 cp.handle = cpu_to_le16(conn->handle);
999                 hci_send_cmd(hdev, HCI_OP_EXIT_SNIFF_MODE, sizeof(cp), &cp);
1000         }
1001
1002 timer:
1003         if (hdev->idle_timeout > 0)
1004                 queue_delayed_work(hdev->workqueue, &conn->idle_work,
1005                                    msecs_to_jiffies(hdev->idle_timeout));
1006 }
1007
1008 /* Drop all connection on the device */
1009 void hci_conn_hash_flush(struct hci_dev *hdev)
1010 {
1011         struct hci_conn_hash *h = &hdev->conn_hash;
1012         struct hci_conn *c, *n;
1013
1014         BT_DBG("hdev %s", hdev->name);
1015
1016         list_for_each_entry_safe(c, n, &h->list, list) {
1017                 c->state = BT_CLOSED;
1018
1019                 hci_proto_disconn_cfm(c, HCI_ERROR_LOCAL_HOST_TERM);
1020                 hci_conn_del(c);
1021         }
1022 }
1023
1024 /* Check pending connect attempts */
1025 void hci_conn_check_pending(struct hci_dev *hdev)
1026 {
1027         struct hci_conn *conn;
1028
1029         BT_DBG("hdev %s", hdev->name);
1030
1031         hci_dev_lock(hdev);
1032
1033         conn = hci_conn_hash_lookup_state(hdev, ACL_LINK, BT_CONNECT2);
1034         if (conn)
1035                 hci_acl_create_connection(conn);
1036
1037         hci_dev_unlock(hdev);
1038 }
1039
1040 int hci_get_conn_list(void __user *arg)
1041 {
1042         struct hci_conn *c;
1043         struct hci_conn_list_req req, *cl;
1044         struct hci_conn_info *ci;
1045         struct hci_dev *hdev;
1046         int n = 0, size, err;
1047
1048         if (copy_from_user(&req, arg, sizeof(req)))
1049                 return -EFAULT;
1050
1051         if (!req.conn_num || req.conn_num > (PAGE_SIZE * 2) / sizeof(*ci))
1052                 return -EINVAL;
1053
1054         size = sizeof(req) + req.conn_num * sizeof(*ci);
1055
1056         cl = kmalloc(size, GFP_KERNEL);
1057         if (!cl)
1058                 return -ENOMEM;
1059
1060         hdev = hci_dev_get(req.dev_id);
1061         if (!hdev) {
1062                 kfree(cl);
1063                 return -ENODEV;
1064         }
1065
1066         ci = cl->conn_info;
1067
1068         hci_dev_lock(hdev);
1069         list_for_each_entry(c, &hdev->conn_hash.list, list) {
1070                 bacpy(&(ci + n)->bdaddr, &c->dst);
1071                 (ci + n)->handle = c->handle;
1072                 (ci + n)->type  = c->type;
1073                 (ci + n)->out   = c->out;
1074                 (ci + n)->state = c->state;
1075                 (ci + n)->link_mode = c->link_mode;
1076                 if (++n >= req.conn_num)
1077                         break;
1078         }
1079         hci_dev_unlock(hdev);
1080
1081         cl->dev_id = hdev->id;
1082         cl->conn_num = n;
1083         size = sizeof(req) + n * sizeof(*ci);
1084
1085         hci_dev_put(hdev);
1086
1087         err = copy_to_user(arg, cl, size);
1088         kfree(cl);
1089
1090         return err ? -EFAULT : 0;
1091 }
1092
1093 int hci_get_conn_info(struct hci_dev *hdev, void __user *arg)
1094 {
1095         struct hci_conn_info_req req;
1096         struct hci_conn_info ci;
1097         struct hci_conn *conn;
1098         char __user *ptr = arg + sizeof(req);
1099
1100         if (copy_from_user(&req, arg, sizeof(req)))
1101                 return -EFAULT;
1102
1103         hci_dev_lock(hdev);
1104         conn = hci_conn_hash_lookup_ba(hdev, req.type, &req.bdaddr);
1105         if (conn) {
1106                 bacpy(&ci.bdaddr, &conn->dst);
1107                 ci.handle = conn->handle;
1108                 ci.type  = conn->type;
1109                 ci.out   = conn->out;
1110                 ci.state = conn->state;
1111                 ci.link_mode = conn->link_mode;
1112         }
1113         hci_dev_unlock(hdev);
1114
1115         if (!conn)
1116                 return -ENOENT;
1117
1118         return copy_to_user(ptr, &ci, sizeof(ci)) ? -EFAULT : 0;
1119 }
1120
1121 int hci_get_auth_info(struct hci_dev *hdev, void __user *arg)
1122 {
1123         struct hci_auth_info_req req;
1124         struct hci_conn *conn;
1125
1126         if (copy_from_user(&req, arg, sizeof(req)))
1127                 return -EFAULT;
1128
1129         hci_dev_lock(hdev);
1130         conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &req.bdaddr);
1131         if (conn)
1132                 req.type = conn->auth_type;
1133         hci_dev_unlock(hdev);
1134
1135         if (!conn)
1136                 return -ENOENT;
1137
1138         return copy_to_user(arg, &req, sizeof(req)) ? -EFAULT : 0;
1139 }
1140
1141 struct hci_chan *hci_chan_create(struct hci_conn *conn)
1142 {
1143         struct hci_dev *hdev = conn->hdev;
1144         struct hci_chan *chan;
1145
1146         BT_DBG("%s hcon %p", hdev->name, conn);
1147
1148         chan = kzalloc(sizeof(struct hci_chan), GFP_KERNEL);
1149         if (!chan)
1150                 return NULL;
1151
1152         chan->conn = conn;
1153         skb_queue_head_init(&chan->data_q);
1154         chan->state = BT_CONNECTED;
1155
1156         list_add_rcu(&chan->list, &conn->chan_list);
1157
1158         return chan;
1159 }
1160
1161 void hci_chan_del(struct hci_chan *chan)
1162 {
1163         struct hci_conn *conn = chan->conn;
1164         struct hci_dev *hdev = conn->hdev;
1165
1166         BT_DBG("%s hcon %p chan %p", hdev->name, conn, chan);
1167
1168         list_del_rcu(&chan->list);
1169
1170         synchronize_rcu();
1171
1172         hci_conn_drop(conn);
1173
1174         skb_queue_purge(&chan->data_q);
1175         kfree(chan);
1176 }
1177
1178 void hci_chan_list_flush(struct hci_conn *conn)
1179 {
1180         struct hci_chan *chan, *n;
1181
1182         BT_DBG("hcon %p", conn);
1183
1184         list_for_each_entry_safe(chan, n, &conn->chan_list, list)
1185                 hci_chan_del(chan);
1186 }
1187
1188 static struct hci_chan *__hci_chan_lookup_handle(struct hci_conn *hcon,
1189                                                  __u16 handle)
1190 {
1191         struct hci_chan *hchan;
1192
1193         list_for_each_entry(hchan, &hcon->chan_list, list) {
1194                 if (hchan->handle == handle)
1195                         return hchan;
1196         }
1197
1198         return NULL;
1199 }
1200
1201 struct hci_chan *hci_chan_lookup_handle(struct hci_dev *hdev, __u16 handle)
1202 {
1203         struct hci_conn_hash *h = &hdev->conn_hash;
1204         struct hci_conn *hcon;
1205         struct hci_chan *hchan = NULL;
1206
1207         rcu_read_lock();
1208
1209         list_for_each_entry_rcu(hcon, &h->list, list) {
1210                 hchan = __hci_chan_lookup_handle(hcon, handle);
1211                 if (hchan)
1212                         break;
1213         }
1214
1215         rcu_read_unlock();
1216
1217         return hchan;
1218 }