mgmt.c 143.0 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
32
#include <net/bluetooth/l2cap.h>
33
#include <net/bluetooth/mgmt.h>
34 35

#include "smp.h"
36

37
#define MGMT_VERSION	1
38
#define MGMT_REVISION	6
39

40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
78
	MGMT_OP_SET_DEVICE_ID,
79
	MGMT_OP_SET_ADVERTISING,
80
	MGMT_OP_SET_BREDR,
81
	MGMT_OP_SET_STATIC_ADDRESS,
82
	MGMT_OP_SET_SCAN_PARAMS,
83
	MGMT_OP_SET_SECURE_CONN,
84
	MGMT_OP_SET_DEBUG_KEYS,
85
	MGMT_OP_SET_PRIVACY,
86
	MGMT_OP_LOAD_IRKS,
87
	MGMT_OP_GET_CONN_INFO,
88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
111
	MGMT_EV_PASSKEY_NOTIFY,
112
	MGMT_EV_NEW_IRK,
113
	MGMT_EV_NEW_CSRK,
114 115
};

116
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
117

118 119 120
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

121 122
struct pending_cmd {
	struct list_head list;
123
	u16 opcode;
124
	int index;
125
	void *param;
126
	struct sock *sk;
127
	void *user_data;
128 129
};

130 131 132 133 134 135 136 137
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
138
	MGMT_STATUS_AUTH_FAILED,	/* PIN or Key Missing */
139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

203
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
204 205 206 207
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
208
	int err;
209

210
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
211

212
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
213 214 215 216 217
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

218
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
219
	hdr->index = cpu_to_le16(index);
220 221 222 223
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
224
	ev->opcode = cpu_to_le16(cmd);
225

226 227
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
228 229
		kfree_skb(skb);

230
	return err;
231 232
}

233
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
234
			void *rp, size_t rp_len)
235 236 237 238
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
239
	int err;
240 241 242

	BT_DBG("sock %p", sk);

243
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
244 245 246 247 248
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

249
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
250
	hdr->index = cpu_to_le16(index);
251
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
252

253
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
254
	ev->opcode = cpu_to_le16(cmd);
255
	ev->status = status;
256 257 258

	if (rp)
		memcpy(ev->data, rp, rp_len);
259

260 261
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
262 263
		kfree_skb(skb);

264
	return err;
265 266
}

267 268
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
269 270 271 272 273 274
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
275
	rp.revision = cpu_to_le16(MGMT_REVISION);
276

277
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
278
			    sizeof(rp));
279 280
}

281 282
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
283 284
{
	struct mgmt_rp_read_commands *rp;
285 286
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
287
	__le16 *opcode;
288 289 290 291 292 293 294 295 296 297 298
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

299 300
	rp->num_commands = cpu_to_le16(num_commands);
	rp->num_events = cpu_to_le16(num_events);
301 302 303 304 305 306 307

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

308
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
309
			   rp_size);
310 311 312 313 314
	kfree(rp);

	return err;
}

315 316
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
317 318
{
	struct mgmt_rp_read_index_list *rp;
319
	struct hci_dev *d;
320
	size_t rp_len;
321
	u16 count;
322
	int err;
323 324 325 326 327 328

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
329
	list_for_each_entry(d, &hci_dev_list, list) {
330 331
		if (d->dev_type == HCI_BREDR)
			count++;
332 333
	}

334 335 336
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
337
		read_unlock(&hci_dev_list_lock);
338
		return -ENOMEM;
339
	}
340

341
	count = 0;
342
	list_for_each_entry(d, &hci_dev_list, list) {
343
		if (test_bit(HCI_SETUP, &d->dev_flags))
344 345
			continue;

346 347 348
		if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
			continue;

349 350 351 352
		if (d->dev_type == HCI_BREDR) {
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
353 354
	}

355 356 357
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

358 359
	read_unlock(&hci_dev_list_lock);

360
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
361
			   rp_len);
362

363 364 365
	kfree(rp);

	return err;
366 367
}

368 369 370 371 372 373
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;
374
	settings |= MGMT_SETTING_DEBUG_KEYS;
375

376
	if (lmp_bredr_capable(hdev)) {
377
		settings |= MGMT_SETTING_CONNECTABLE;
378 379
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
380
		settings |= MGMT_SETTING_DISCOVERABLE;
381 382
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
383 384 385 386 387

		if (lmp_ssp_capable(hdev)) {
			settings |= MGMT_SETTING_SSP;
			settings |= MGMT_SETTING_HS;
		}
388

389 390
		if (lmp_sc_capable(hdev) ||
		    test_bit(HCI_FORCE_SC, &hdev->dev_flags))
391
			settings |= MGMT_SETTING_SECURE_CONN;
392
	}
393

394
	if (lmp_le_capable(hdev)) {
395
		settings |= MGMT_SETTING_LE;
396
		settings |= MGMT_SETTING_ADVERTISING;
397
		settings |= MGMT_SETTING_PRIVACY;
398
	}
399 400 401 402 403 404 405 406

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

407
	if (hdev_is_powered(hdev))
408 409
		settings |= MGMT_SETTING_POWERED;

410
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
411 412
		settings |= MGMT_SETTING_CONNECTABLE;

413 414 415
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

416
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
417 418
		settings |= MGMT_SETTING_DISCOVERABLE;

419
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
420 421
		settings |= MGMT_SETTING_PAIRABLE;

422
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
423 424
		settings |= MGMT_SETTING_BREDR;

425
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
426 427
		settings |= MGMT_SETTING_LE;

428
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
429 430
		settings |= MGMT_SETTING_LINK_SECURITY;

431
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
432 433
		settings |= MGMT_SETTING_SSP;

434 435 436
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

437
	if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
438 439
		settings |= MGMT_SETTING_ADVERTISING;

440 441 442
	if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_SECURE_CONN;

443 444 445
	if (test_bit(HCI_DEBUG_KEYS, &hdev->dev_flags))
		settings |= MGMT_SETTING_DEBUG_KEYS;

446 447 448
	if (test_bit(HCI_PRIVACY, &hdev->dev_flags))
		settings |= MGMT_SETTING_PRIVACY;

449 450 451
	return settings;
}

452 453
#define PNP_INFO_SVCLASS_ID		0x1200

454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

562 563 564 565 566 567 568 569 570 571 572 573
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		if (cmd->opcode == opcode)
			return cmd;
	}

	return NULL;
}

574 575
static u8 create_scan_rsp_data(struct hci_dev *hdev, u8 *ptr)
{
576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597
	u8 ad_len = 0;
	size_t name_len;

	name_len = strlen(hdev->dev_name);
	if (name_len > 0) {
		size_t max_len = HCI_MAX_AD_LENGTH - ad_len - 2;

		if (name_len > max_len) {
			name_len = max_len;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ad_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	return ad_len;
598 599 600 601 602 603 604 605
}

static void update_scan_rsp_data(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_scan_rsp_data cp;
	u8 len;

606
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
607 608 609 610 611 612
		return;

	memset(&cp, 0, sizeof(cp));

	len = create_scan_rsp_data(hdev, cp.data);

613 614
	if (hdev->scan_rsp_data_len == len &&
	    memcmp(cp.data, hdev->scan_rsp_data, len) == 0)
615 616
		return;

617 618
	memcpy(hdev->scan_rsp_data, cp.data, sizeof(cp.data));
	hdev->scan_rsp_data_len = len;
619 620 621 622 623 624

	cp.length = len;

	hci_req_add(req, HCI_OP_LE_SET_SCAN_RSP_DATA, sizeof(cp), &cp);
}

625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
static u8 get_adv_discov_flags(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	/* If there's a pending mgmt command the flags will not yet have
	 * their final values, so check for this first.
	 */
	cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
		if (cp->val == 0x01)
			return LE_AD_GENERAL;
		else if (cp->val == 0x02)
			return LE_AD_LIMITED;
	} else {
		if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
			return LE_AD_LIMITED;
		else if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			return LE_AD_GENERAL;
	}

	return 0;
}

649
static u8 create_adv_data(struct hci_dev *hdev, u8 *ptr)
650 651 652
{
	u8 ad_len = 0, flags = 0;

653
	flags |= get_adv_discov_flags(hdev);
654

655
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680
		flags |= LE_AD_NO_BREDR;

	if (flags) {
		BT_DBG("adv flags 0x%02x", flags);

		ptr[0] = 2;
		ptr[1] = EIR_FLAGS;
		ptr[2] = flags;

		ad_len += 3;
		ptr += 3;
	}

	if (hdev->adv_tx_power != HCI_TX_POWER_INVALID) {
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->adv_tx_power;

		ad_len += 3;
		ptr += 3;
	}

	return ad_len;
}

681
static void update_adv_data(struct hci_request *req)
682 683 684 685 686
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_adv_data cp;
	u8 len;

687
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
688 689 690 691
		return;

	memset(&cp, 0, sizeof(cp));

692
	len = create_adv_data(hdev, cp.data);
693 694 695 696 697 698 699 700 701 702 703 704 705

	if (hdev->adv_data_len == len &&
	    memcmp(cp.data, hdev->adv_data, len) == 0)
		return;

	memcpy(hdev->adv_data, cp.data, sizeof(cp.data));
	hdev->adv_data_len = len;

	cp.length = len;

	hci_req_add(req, HCI_OP_LE_SET_ADV_DATA, sizeof(cp), &cp);
}

706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

729
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
730 731 732 733 734 735 736
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

737 738 739 740 741 742 743 744 745 746 747 748
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

749
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
750
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
751
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
752 753
}

754
static void update_eir(struct hci_request *req)
755
{
756
	struct hci_dev *hdev = req->hdev;
757 758
	struct hci_cp_write_eir cp;

759
	if (!hdev_is_powered(hdev))
760
		return;
761

762
	if (!lmp_ext_inq_capable(hdev))
763
		return;
764

765
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
766
		return;
767

768
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
769
		return;
770 771 772 773 774 775

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
776
		return;
777 778 779

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

780
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
781 782 783 784 785 786 787 788 789 790 791 792 793
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

794
static void update_class(struct hci_request *req)
795
{
796
	struct hci_dev *hdev = req->hdev;
797 798 799 800
	u8 cod[3];

	BT_DBG("%s", hdev->name);

801
	if (!hdev_is_powered(hdev))
802
		return;
803

804 805 806
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return;

807
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
808
		return;
809 810 811 812 813

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

814 815 816
	if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
		cod[1] |= 0x20;

817
	if (memcmp(cod, hdev->dev_class, 3) == 0)
818
		return;
819

820
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
821 822
}

823
static bool get_connectable(struct hci_dev *hdev)
824 825 826 827 828 829 830 831 832
{
	struct pending_cmd *cmd;

	/* If there's a pending mgmt command the flag will not yet have
	 * it's final value, so check for this first.
	 */
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
833
		return cp->val;
834 835
	}

836
	return test_bit(HCI_CONNECTABLE, &hdev->dev_flags);
837 838 839 840 841 842
}

static void enable_advertising(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_adv_param cp;
843
	u8 own_addr_type, enable = 0x01;
844
	bool connectable;
845

846 847 848 849 850 851 852
	/* Clear the HCI_ADVERTISING bit temporarily so that the
	 * hci_update_random_address knows that it's safe to go ahead
	 * and write a new random address. The flag will be set back on
	 * as soon as the SET_ADV_ENABLE HCI command completes.
	 */
	clear_bit(HCI_ADVERTISING, &hdev->dev_flags);

853
	connectable = get_connectable(hdev);
854

855 856 857 858 859
	/* Set require_privacy to true only when non-connectable
	 * advertising is used. In that case it is fine to use a
	 * non-resolvable private address.
	 */
	if (hci_update_random_address(req, !connectable, &own_addr_type) < 0)
860 861
		return;

862
	memset(&cp, 0, sizeof(cp));
863 864
	cp.min_interval = cpu_to_le16(0x0800);
	cp.max_interval = cpu_to_le16(0x0800);
865
	cp.type = connectable ? LE_ADV_IND : LE_ADV_NONCONN_IND;
866
	cp.own_address_type = own_addr_type;
867 868 869 870 871 872 873 874 875 876 877 878 879 880
	cp.channel_map = hdev->le_adv_channel_map;

	hci_req_add(req, HCI_OP_LE_SET_ADV_PARAM, sizeof(cp), &cp);

	hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
}

static void disable_advertising(struct hci_request *req)
{
	u8 enable = 0x00;

	hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
}

881 882 883
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
884
					    service_cache.work);
885
	struct hci_request req;
886

887
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
888 889
		return;

890 891
	hci_req_init(&req, hdev);

892 893
	hci_dev_lock(hdev);

894 895
	update_eir(&req);
	update_class(&req);
896 897

	hci_dev_unlock(hdev);
898 899

	hci_req_run(&req, NULL);
900 901
}

902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927
static void rpa_expired(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
					    rpa_expired.work);
	struct hci_request req;

	BT_DBG("");

	set_bit(HCI_RPA_EXPIRED, &hdev->dev_flags);

	if (!test_bit(HCI_ADVERTISING, &hdev->dev_flags) ||
	    hci_conn_num(hdev, LE_LINK) > 0)
		return;

	/* The generation of a new RPA and programming it into the
	 * controller happens in the enable_advertising() function.
	 */

	hci_req_init(&req, hdev);

	disable_advertising(&req);
	enable_advertising(&req);

	hci_req_run(&req, NULL);
}

928
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
929
{
930
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
931 932
		return;

933
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
934
	INIT_DELAYED_WORK(&hdev->rpa_expired, rpa_expired);
935

936 937 938 939 940 941
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
942 943
}

944
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
945
				void *data, u16 data_len)
946
{
947
	struct mgmt_rp_read_info rp;
948

949
	BT_DBG("sock %p %s", sk, hdev->name);
950

951
	hci_dev_lock(hdev);
952

953 954
	memset(&rp, 0, sizeof(rp));

955
	bacpy(&rp.bdaddr, &hdev->bdaddr);
956

957
	rp.version = hdev->hci_ver;
958
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
959 960 961

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
962

963
	memcpy(rp.dev_class, hdev->dev_class, 3);
964

965
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
966
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
967

968
	hci_dev_unlock(hdev);
969

970
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
971
			    sizeof(rp));
972 973
}

974 975 976
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
977
	kfree(cmd->param);
978 979 980
	kfree(cmd);
}

981
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
982 983
					    struct hci_dev *hdev, void *data,
					    u16 len)
984 985 986
{
	struct pending_cmd *cmd;

987
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
988
	if (!cmd)
989
		return NULL;
990 991

	cmd->opcode = opcode;
992
	cmd->index = hdev->id;
993

994
	cmd->param = kmalloc(len, GFP_KERNEL);
995
	if (!cmd->param) {
996
		kfree(cmd);
997
		return NULL;
998 999
	}

1000 1001
	if (data)
		memcpy(cmd->param, data, len);
1002 1003 1004 1005

	cmd->sk = sk;
	sock_hold(sk);

1006
	list_add(&cmd->list, &hdev->mgmt_pending);
1007

1008
	return cmd;
1009 1010
}

1011
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
1012 1013
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
1014
				 void *data)
1015
{
1016
	struct pending_cmd *cmd, *tmp;
1017

1018
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
1019
		if (opcode > 0 && cmd->opcode != opcode)
1020 1021 1022 1023 1024 1025
			continue;

		cb(cmd, data);
	}
}

1026
static void mgmt_pending_remove(struct pending_cmd *cmd)
1027 1028 1029 1030 1031
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

1032
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
1033
{
1034
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
1035

1036
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
1037
			    sizeof(settings));
1038 1039
}

1040 1041 1042 1043
static void clean_up_hci_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("%s status 0x%02x", hdev->name, status);

1044 1045
	if (hci_conn_count(hdev) == 0) {
		cancel_delayed_work(&hdev->power_off);
1046
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
1047
	}
1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066
}

static int clean_up_hci_state(struct hci_dev *hdev)
{
	struct hci_request req;
	struct hci_conn *conn;

	hci_req_init(&req, hdev);

	if (test_bit(HCI_ISCAN, &hdev->flags) ||
	    test_bit(HCI_PSCAN, &hdev->flags)) {
		u8 scan = 0x00;
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	}

	if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
		disable_advertising(&req);

	if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
1067
		hci_req_add_le_scan_disable(&req);
1068 1069 1070 1071
	}

	list_for_each_entry(conn, &hdev->conn_hash.list, list) {
		struct hci_cp_disconnect dc;
1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099
		struct hci_cp_reject_conn_req rej;

		switch (conn->state) {
		case BT_CONNECTED:
		case BT_CONFIG:
			dc.handle = cpu_to_le16(conn->handle);
			dc.reason = 0x15; /* Terminated due to Power Off */
			hci_req_add(&req, HCI_OP_DISCONNECT, sizeof(dc), &dc);
			break;
		case BT_CONNECT:
			if (conn->type == LE_LINK)
				hci_req_add(&req, HCI_OP_LE_CREATE_CONN_CANCEL,
					    0, NULL);
			else if (conn->type == ACL_LINK)
				hci_req_add(&req, HCI_OP_CREATE_CONN_CANCEL,
					    6, &conn->dst);
			break;
		case BT_CONNECT2:
			bacpy(&rej.bdaddr, &conn->dst);
			rej.reason = 0x15; /* Terminated due to Power Off */
			if (conn->type == ACL_LINK)
				hci_req_add(&req, HCI_OP_REJECT_CONN_REQ,
					    sizeof(rej), &rej);
			else if (conn->type == SCO_LINK)
				hci_req_add(&req, HCI_OP_REJECT_SYNC_CONN_REQ,
					    sizeof(rej), &rej);
			break;
		}
1100 1101 1102 1103 1104
	}

	return hci_req_run(&req, clean_up_hci_complete);
}

1105
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
1106
		       u16 len)
1107
{
1108
	struct mgmt_mode *cp = data;
1109
	struct pending_cmd *cmd;
1110
	int err;
1111

1112
	BT_DBG("request for %s", hdev->name);
1113

1114 1115 1116 1117
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

1118
	hci_dev_lock(hdev);
1119

1120 1121 1122 1123 1124 1125
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

1126 1127 1128 1129
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
1130 1131 1132
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
1133 1134 1135 1136
			goto failed;
		}
	}

1137
	if (!!cp->val == hdev_is_powered(hdev)) {
1138
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
1139 1140 1141
		goto failed;
	}

1142
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
1143 1144
	if (!cmd) {
		err = -ENOMEM;
1145
		goto failed;
1146
	}
1147

1148
	if (cp->val) {
1149
		queue_work(hdev->req_workqueue, &hdev->power_on);
1150 1151 1152 1153
		err = 0;
	} else {
		/* Disconnect connections, stop scans, etc */
		err = clean_up_hci_state(hdev);
1154 1155 1156
		if (!err)
			queue_delayed_work(hdev->req_workqueue, &hdev->power_off,
					   HCI_POWER_OFF_TIMEOUT);
1157

1158 1159
		/* ENODATA means there were no HCI commands queued */
		if (err == -ENODATA) {
1160
			cancel_delayed_work(&hdev->power_off);
1161 1162 1163 1164
			queue_work(hdev->req_workqueue, &hdev->power_off.work);
			err = 0;
		}
	}
1165 1166

failed:
1167
	hci_dev_unlock(hdev);
1168
	return err;
1169 1170
}

1171 1172
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
1173 1174 1175 1176
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

1177
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
1178 1179 1180 1181 1182 1183 1184 1185
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
1186
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
1187 1188 1189 1190 1191
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

1192 1193 1194
	/* Time stamp */
	__net_timestamp(skb);

1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

static void settings_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

1260 1261 1262 1263
static void set_discoverable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	struct mgmt_mode *cp;
1264
	struct hci_request req;
1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277
	bool changed;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1278
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1279 1280 1281 1282
		goto remove_cmd;
	}

	cp = cmd->param;
1283
	if (cp->val) {
1284 1285
		changed = !test_and_set_bit(HCI_DISCOVERABLE,
					    &hdev->dev_flags);
1286 1287 1288 1289 1290 1291 1292

		if (hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
					   to);
		}
	} else {
1293 1294
		changed = test_and_clear_bit(HCI_DISCOVERABLE,
					     &hdev->dev_flags);
1295
	}
1296 1297 1298 1299 1300 1301

	send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev);

	if (changed)
		new_settings(hdev, cmd->sk);

1302 1303 1304 1305 1306 1307 1308 1309
	/* When the discoverable mode gets changed, make sure
	 * that class of device has the limited discoverable
	 * bit correctly set.
	 */
	hci_req_init(&req, hdev);
	update_class(&req);
	hci_req_run(&req, NULL);

1310 1311 1312 1313 1314 1315 1316
remove_cmd:
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1317
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
1318
			    u16 len)
1319
{
1320
	struct mgmt_cp_set_discoverable *cp = data;
1321
	struct pending_cmd *cmd;
1322
	struct hci_request req;
1323
	u16 timeout;
1324
	u8 scan;
1325 1326
	int err;

1327
	BT_DBG("request for %s", hdev->name);
1328

1329 1330
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1331
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1332
				  MGMT_STATUS_REJECTED);
1333

1334
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
1335 1336 1337
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1338
	timeout = __le16_to_cpu(cp->timeout);
1339 1340 1341 1342 1343 1344

	/* Disabling discoverable requires that no timeout is set,
	 * and enabling limited discoverable requires a timeout.
	 */
	if ((cp->val == 0x00 && timeout > 0) ||
	    (cp->val == 0x02 && timeout == 0))
1345
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1346
				  MGMT_STATUS_INVALID_PARAMS);
1347

1348
	hci_dev_lock(hdev);
1349

1350
	if (!hdev_is_powered(hdev) && timeout > 0) {
1351
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1352
				 MGMT_STATUS_NOT_POWERED);
1353 1354 1355
		goto failed;
	}

1356
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1357
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1358
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1359
				 MGMT_STATUS_BUSY);
1360 1361 1362
		goto failed;
	}

1363
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
1364
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1365
				 MGMT_STATUS_REJECTED);
1366 1367 1368 1369
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
1370 1371
		bool changed = false;

1372 1373 1374 1375
		/* Setting limited discoverable when powered off is
		 * not a valid operation since it requires a timeout
		 * and so no need to check HCI_LIMITED_DISCOVERABLE.
		 */
1376 1377 1378 1379 1380
		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

1381
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1382 1383 1384 1385 1386 1387
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1388 1389 1390
		goto failed;
	}

1391 1392 1393 1394 1395 1396 1397
	/* If the current mode is the same, then just update the timeout
	 * value with the new value. And if only the timeout gets updated,
	 * then no need for any HCI transactions.
	 */
	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags) &&
	    (cp->val == 0x02) == test_bit(HCI_LIMITED_DISCOVERABLE,
					  &hdev->dev_flags)) {
1398 1399
		cancel_delayed_work(&hdev->discov_off);
		hdev->discov_timeout = timeout;
1400

1401 1402
		if (cp->val && hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
1403
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
1404
					   to);
1405 1406
		}

1407
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1408 1409 1410
		goto failed;
	}

1411
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1412 1413
	if (!cmd) {
		err = -ENOMEM;
1414
		goto failed;
1415
	}
1416

1417 1418 1419 1420 1421 1422 1423
	/* Cancel any potential discoverable timeout that might be
	 * still active and store new timeout value. The arming of
	 * the timeout happens in the complete handler.
	 */
	cancel_delayed_work(&hdev->discov_off);
	hdev->discov_timeout = timeout;

1424 1425 1426 1427 1428 1429
	/* Limited discoverable mode */
	if (cp->val == 0x02)
		set_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
	else
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);

1430 1431
	hci_req_init(&req, hdev);

1432 1433 1434 1435 1436 1437
	/* The procedure for LE-only controllers is much simpler - just
	 * update the advertising data.
	 */
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		goto update_ad;

1438 1439
	scan = SCAN_PAGE;

1440 1441 1442 1443 1444
	if (cp->val) {
		struct hci_cp_write_current_iac_lap hci_cp;

		if (cp->val == 0x02) {
			/* Limited discoverable mode */
1445
			hci_cp.num_iac = min_t(u8, hdev->num_iac, 2);
1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462
			hci_cp.iac_lap[0] = 0x00;	/* LIAC */
			hci_cp.iac_lap[1] = 0x8b;
			hci_cp.iac_lap[2] = 0x9e;
			hci_cp.iac_lap[3] = 0x33;	/* GIAC */
			hci_cp.iac_lap[4] = 0x8b;
			hci_cp.iac_lap[5] = 0x9e;
		} else {
			/* General discoverable mode */
			hci_cp.num_iac = 1;
			hci_cp.iac_lap[0] = 0x33;	/* GIAC */
			hci_cp.iac_lap[1] = 0x8b;
			hci_cp.iac_lap[2] = 0x9e;
		}

		hci_req_add(&req, HCI_OP_WRITE_CURRENT_IAC_LAP,
			    (hci_cp.num_iac * 3) + 1, &hci_cp);

1463
		scan |= SCAN_INQUIRY;
1464 1465 1466
	} else {
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
	}
1467

1468
	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, sizeof(scan), &scan);
1469

1470 1471 1472
update_ad:
	update_adv_data(&req);

1473
	err = hci_req_run(&req, set_discoverable_complete);
1474
	if (err < 0)
1475
		mgmt_pending_remove(cmd);
1476 1477

failed:
1478
	hci_dev_unlock(hdev);
1479 1480 1481
	return err;
}

1482 1483
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1484
	struct hci_dev *hdev = req->hdev;
1485 1486 1487
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1488 1489 1490
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return;

1491 1492 1493
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1494 1495 1496 1497
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
1498
		acp.interval = cpu_to_le16(0x0100);
1499 1500 1501 1502
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
1503
		acp.interval = cpu_to_le16(0x0800);
1504 1505
	}

1506
	acp.window = cpu_to_le16(0x0012);
1507

1508 1509 1510 1511 1512 1513 1514
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1515 1516
}

1517 1518 1519
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
1520 1521
	struct mgmt_mode *cp;
	bool changed;
1522 1523 1524 1525 1526 1527 1528 1529 1530

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

1531 1532 1533 1534 1535 1536
	if (status) {
		u8 mgmt_err = mgmt_status(status);
		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
		goto remove_cmd;
	}

1537 1538 1539 1540 1541 1542
	cp = cmd->param;
	if (cp->val)
		changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);

1543 1544
	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

1545 1546 1547
	if (changed)
		new_settings(hdev, cmd->sk);

1548
remove_cmd:
1549 1550 1551 1552 1553 1554
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580
static int set_connectable_update_settings(struct hci_dev *hdev,
					   struct sock *sk, u8 val)
{
	bool changed = false;
	int err;

	if (!!val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		changed = true;

	if (val) {
		set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	} else {
		clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
		clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
	if (err < 0)
		return err;

	if (changed)
		return new_settings(hdev, sk);

	return 0;
}

1581
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1582
			   u16 len)
1583
{
1584
	struct mgmt_mode *cp = data;
1585
	struct pending_cmd *cmd;
1586
	struct hci_request req;
1587
	u8 scan;
1588 1589
	int err;

1590
	BT_DBG("request for %s", hdev->name);
1591

1592 1593
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1594
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1595
				  MGMT_STATUS_REJECTED);
1596

1597 1598 1599 1600
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1601
	hci_dev_lock(hdev);
1602

1603
	if (!hdev_is_powered(hdev)) {
1604
		err = set_connectable_update_settings(hdev, sk, cp->val);
1605 1606 1607
		goto failed;
	}

1608
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1609
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1610
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1611
				 MGMT_STATUS_BUSY);
1612 1613 1614
		goto failed;
	}

1615
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1616 1617
	if (!cmd) {
		err = -ENOMEM;
1618
		goto failed;
1619
	}
1620

1621
	hci_req_init(&req, hdev);
1622

1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633
	/* If BR/EDR is not enabled and we disable advertising as a
	 * by-product of disabling connectable, we need to update the
	 * advertising flags.
	 */
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		if (!cp->val) {
			clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
		update_adv_data(&req);
	} else if (cp->val != test_bit(HCI_PSCAN, &hdev->flags)) {
1634 1635 1636 1637 1638 1639
		if (cp->val) {
			scan = SCAN_PAGE;
		} else {
			scan = 0;

			if (test_bit(HCI_ISCAN, &hdev->flags) &&
1640
			    hdev->discov_timeout > 0)
1641 1642
				cancel_delayed_work(&hdev->discov_off);
		}
1643

1644 1645
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	}
1646

1647 1648 1649 1650 1651 1652 1653
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1654 1655
		write_fast_connectable(&req, false);

1656 1657 1658 1659 1660 1661
	if (test_bit(HCI_ADVERTISING, &hdev->dev_flags) &&
	    hci_conn_num(hdev, LE_LINK) == 0) {
		disable_advertising(&req);
		enable_advertising(&req);
	}

1662
	err = hci_req_run(&req, set_connectable_complete);
1663
	if (err < 0) {
1664
		mgmt_pending_remove(cmd);
1665
		if (err == -ENODATA)
1666 1667
			err = set_connectable_update_settings(hdev, sk,
							      cp->val);
1668 1669
		goto failed;
	}
1670 1671

failed:
1672
	hci_dev_unlock(hdev);
1673 1674 1675
	return err;
}

1676
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1677
			u16 len)
1678
{
1679
	struct mgmt_mode *cp = data;
1680
	bool changed;
1681 1682
	int err;

1683
	BT_DBG("request for %s", hdev->name);
1684

1685 1686 1687 1688
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1689
	hci_dev_lock(hdev);
1690 1691

	if (cp->val)
1692
		changed = !test_and_set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1693
	else
1694
		changed = test_and_clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1695

1696
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1697
	if (err < 0)
1698
		goto unlock;
1699

1700 1701
	if (changed)
		err = new_settings(hdev, sk);
1702

1703
unlock:
1704
	hci_dev_unlock(hdev);
1705 1706 1707
	return err;
}

1708 1709
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1710 1711 1712
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1713
	u8 val, status;
1714 1715
	int err;

1716
	BT_DBG("request for %s", hdev->name);
1717

1718 1719
	status = mgmt_bredr_support(hdev);
	if (status)
1720
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1721
				  status);
1722

1723 1724 1725 1726
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1727 1728
	hci_dev_lock(hdev);

1729
	if (!hdev_is_powered(hdev)) {
1730 1731 1732
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1733
					  &hdev->dev_flags)) {
1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1745 1746 1747 1748
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1749
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1750
				 MGMT_STATUS_BUSY);
1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1778
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1779 1780 1781
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1782
	u8 status;
1783 1784
	int err;

1785
	BT_DBG("request for %s", hdev->name);
1786

1787 1788 1789 1790
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);

1791 1792 1793
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1794

1795 1796 1797 1798
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1799
	hci_dev_lock(hdev);
1800

1801
	if (!hdev_is_powered(hdev)) {
1802
		bool changed;
1803

1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814
		if (cp->val) {
			changed = !test_and_set_bit(HCI_SSP_ENABLED,
						    &hdev->dev_flags);
		} else {
			changed = test_and_clear_bit(HCI_SSP_ENABLED,
						     &hdev->dev_flags);
			if (!changed)
				changed = test_and_clear_bit(HCI_HS_ENABLED,
							     &hdev->dev_flags);
			else
				clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1815 1816 1817 1818 1819 1820 1821 1822 1823
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1824 1825 1826
		goto failed;
	}

1827 1828
	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_HS, hdev)) {
1829 1830
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1831 1832 1833
		goto failed;
	}

1834
	if (!!cp->val == test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
1835 1836 1837 1838 1839 1840 1841 1842 1843 1844
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1845
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val);
1846 1847 1848 1849 1850 1851 1852 1853 1854 1855
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1856
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1857 1858
{
	struct mgmt_mode *cp = data;
1859
	bool changed;
1860
	u8 status;
1861
	int err;
1862

1863
	BT_DBG("request for %s", hdev->name);
1864

1865 1866 1867
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1868

1869 1870 1871 1872 1873 1874 1875 1876
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_REJECTED);

1877 1878 1879 1880
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1881 1882
	hci_dev_lock(hdev);

1883
	if (cp->val) {
1884
		changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1885 1886 1887 1888 1889 1890 1891
	} else {
		if (hdev_is_powered(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					 MGMT_STATUS_REJECTED);
			goto unlock;
		}

1892
		changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1893
	}
1894 1895 1896 1897 1898 1899 1900

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1901

1902 1903 1904
unlock:
	hci_dev_unlock(hdev);
	return err;
1905 1906
}

1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924
static void le_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936

	/* Make sure the controller has a good default for
	 * advertising data. Restrict the update to when LE
	 * has actually been enabled. During power on, the
	 * update in powered_update_hci will take care of it.
	 */
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
		struct hci_request req;

		hci_dev_lock(hdev);

		hci_req_init(&req, hdev);
1937
		update_adv_data(&req);
1938
		update_scan_rsp_data(&req);
1939 1940 1941 1942
		hci_req_run(&req, NULL);

		hci_dev_unlock(hdev);
	}
1943 1944
}

1945
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1946 1947 1948 1949
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
1950
	struct hci_request req;
1951
	int err;
1952
	u8 val, enabled;
1953

1954
	BT_DBG("request for %s", hdev->name);
1955

1956 1957 1958
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1959

1960 1961 1962 1963
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1964
	/* LE-only devices do not allow toggling LE on/off */
1965
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1966 1967 1968
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1969
	hci_dev_lock(hdev);
1970 1971

	val = !!cp->val;
1972
	enabled = lmp_host_le_capable(hdev);
1973

1974
	if (!hdev_is_powered(hdev) || val == enabled) {
1975 1976 1977 1978 1979 1980 1981
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

1982 1983
		if (!val && test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
			clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
1984 1985 1986
			changed = true;
		}

1987 1988
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1989
			goto unlock;
1990 1991 1992 1993

		if (changed)
			err = new_settings(hdev, sk);

1994
		goto unlock;
1995 1996
	}

1997 1998
	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1999
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
2000
				 MGMT_STATUS_BUSY);
2001
		goto unlock;
2002 2003 2004 2005 2006
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
2007
		goto unlock;
2008 2009
	}

2010 2011
	hci_req_init(&req, hdev);

2012 2013 2014 2015
	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
2016
		hci_cp.simul = lmp_le_br_capable(hdev);
2017 2018 2019
	} else {
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
			disable_advertising(&req);
2020 2021
	}

2022 2023 2024 2025
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
2026
	if (err < 0)
2027 2028
		mgmt_pending_remove(cmd);

2029 2030
unlock:
	hci_dev_unlock(hdev);
2031 2032 2033
	return err;
}

2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

2102
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
2103
{
2104
	struct mgmt_cp_add_uuid *cp = data;
2105
	struct pending_cmd *cmd;
2106
	struct hci_request req;
2107 2108 2109
	struct bt_uuid *uuid;
	int err;

2110
	BT_DBG("request for %s", hdev->name);
2111

2112
	hci_dev_lock(hdev);
2113

2114
	if (pending_eir_or_class(hdev)) {
2115
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
2116
				 MGMT_STATUS_BUSY);
2117 2118 2119
		goto failed;
	}

2120
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
2121 2122 2123 2124 2125 2126
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
2127
	uuid->svc_hint = cp->svc_hint;
2128
	uuid->size = get_uuid_size(cp->uuid);
2129

2130
	list_add_tail(&uuid->list, &hdev->uuids);
2131

2132
	hci_req_init(&req, hdev);
2133

2134 2135 2136
	update_class(&req);
	update_eir(&req);

2137 2138 2139 2140
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
2141

2142
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
2143
				   hdev->dev_class, 3);
2144 2145 2146 2147
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
2148
	if (!cmd) {
2149
		err = -ENOMEM;
2150 2151 2152 2153
		goto failed;
	}

	err = 0;
2154 2155

failed:
2156
	hci_dev_unlock(hdev);
2157 2158 2159
	return err;
}

2160 2161 2162 2163 2164 2165
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
2166 2167
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
2168 2169 2170 2171 2172 2173
		return true;
	}

	return false;
}

2174 2175 2176 2177 2178 2179 2180
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

2181
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
2182
		       u16 len)
2183
{
2184
	struct mgmt_cp_remove_uuid *cp = data;
2185
	struct pending_cmd *cmd;
2186
	struct bt_uuid *match, *tmp;
2187
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
2188
	struct hci_request req;
2189 2190
	int err, found;

2191
	BT_DBG("request for %s", hdev->name);
2192

2193
	hci_dev_lock(hdev);
2194

2195
	if (pending_eir_or_class(hdev)) {
2196
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2197
				 MGMT_STATUS_BUSY);
2198 2199 2200
		goto unlock;
	}

2201
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
2202
		hci_uuids_clear(hdev);
2203

2204
		if (enable_service_cache(hdev)) {
2205
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2206
					   0, hdev->dev_class, 3);
2207 2208
			goto unlock;
		}
2209

2210
		goto update_class;
2211 2212 2213 2214
	}

	found = 0;

2215
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
2216 2217 2218 2219
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
2220
		kfree(match);
2221 2222 2223 2224
		found++;
	}

	if (found == 0) {
2225
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2226
				 MGMT_STATUS_INVALID_PARAMS);
2227 2228 2229
		goto unlock;
	}

2230
update_class:
2231
	hci_req_init(&req, hdev);
2232

2233 2234 2235
	update_class(&req);
	update_eir(&req);

2236 2237 2238 2239
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2240

2241
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
2242
				   hdev->dev_class, 3);
2243 2244 2245 2246
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
2247
	if (!cmd) {
2248
		err = -ENOMEM;
2249 2250 2251 2252
		goto unlock;
	}

	err = 0;
2253 2254

unlock:
2255
	hci_dev_unlock(hdev);
2256 2257 2258
	return err;
}

2259 2260 2261 2262 2263 2264 2265
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

2266
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
2267
			 u16 len)
2268
{
2269
	struct mgmt_cp_set_dev_class *cp = data;
2270
	struct pending_cmd *cmd;
2271
	struct hci_request req;
2272 2273
	int err;

2274
	BT_DBG("request for %s", hdev->name);
2275

2276
	if (!lmp_bredr_capable(hdev))
2277 2278
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
2279

2280
	hci_dev_lock(hdev);
2281

2282 2283 2284 2285 2286
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
2287

2288 2289 2290 2291 2292
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
2293

2294 2295 2296
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

2297
	if (!hdev_is_powered(hdev)) {
2298
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
2299
				   hdev->dev_class, 3);
2300 2301 2302
		goto unlock;
	}

2303 2304
	hci_req_init(&req, hdev);

2305
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
2306 2307 2308
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
2309
		update_eir(&req);
2310
	}
2311

2312 2313
	update_class(&req);

2314 2315 2316 2317
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2318

2319
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
2320
				   hdev->dev_class, 3);
2321 2322 2323 2324
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
2325
	if (!cmd) {
2326
		err = -ENOMEM;
2327 2328 2329 2330
		goto unlock;
	}

	err = 0;
2331

2332
unlock:
2333
	hci_dev_unlock(hdev);
2334 2335 2336
	return err;
}

2337
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
2338
			  u16 len)
2339
{
2340
	struct mgmt_cp_load_link_keys *cp = data;
2341
	u16 key_count, expected_len;
2342
	bool changed;
2343
	int i;
2344

2345 2346 2347 2348 2349 2350
	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_NOT_SUPPORTED);

2351
	key_count = __le16_to_cpu(cp->key_count);
2352

2353 2354
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
2355
	if (expected_len != len) {
2356
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
2357
		       expected_len, len);
2358
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
2359
				  MGMT_STATUS_INVALID_PARAMS);
2360 2361
	}

2362 2363 2364 2365
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

2366
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
2367
	       key_count);
2368

2369 2370 2371
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

2372
		if (key->addr.type != BDADDR_BREDR || key->type > 0x08)
2373 2374 2375 2376
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

2377
	hci_dev_lock(hdev);
2378 2379 2380 2381

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
2382
		changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
2383
	else
2384 2385 2386 2387
		changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);

	if (changed)
		new_settings(hdev, NULL);
2388

2389
	for (i = 0; i < key_count; i++) {
2390
		struct mgmt_link_key_info *key = &cp->keys[i];
2391

2392
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
2393
				 key->type, key->pin_len);
2394 2395
	}

2396
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
2397

2398
	hci_dev_unlock(hdev);
2399

2400
	return 0;
2401 2402
}

2403
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
2404
			   u8 addr_type, struct sock *skip_sk)
2405 2406 2407 2408 2409 2410 2411
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
2412
			  skip_sk);
2413 2414
}

2415
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2416
			 u16 len)
2417
{
2418 2419
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
2420 2421
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
2422 2423 2424
	struct hci_conn *conn;
	int err;

2425
	memset(&rp, 0, sizeof(rp));
2426 2427
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2428

2429 2430 2431 2432 2433
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2434 2435 2436 2437 2438
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2439 2440
	hci_dev_lock(hdev);

2441
	if (!hdev_is_powered(hdev)) {
2442
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2443
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2444 2445 2446
		goto unlock;
	}

2447
	if (cp->addr.type == BDADDR_BREDR) {
2448
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
2449 2450 2451 2452 2453 2454 2455 2456
	} else {
		u8 addr_type;

		if (cp->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;

2457 2458
		hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type);

2459 2460
		hci_conn_params_del(hdev, &cp->addr.bdaddr, addr_type);

2461 2462
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type);
	}
2463

2464
	if (err < 0) {
2465
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2466
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
2467 2468 2469
		goto unlock;
	}

2470
	if (cp->disconnect) {
2471
		if (cp->addr.type == BDADDR_BREDR)
2472
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
2473
						       &cp->addr.bdaddr);
2474 2475
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
2476
						       &cp->addr.bdaddr);
2477 2478 2479
	} else {
		conn = NULL;
	}
2480

2481
	if (!conn) {
2482
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
2483
				   &rp, sizeof(rp));
2484
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
2485 2486
		goto unlock;
	}
2487

2488
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
2489
			       sizeof(*cp));
2490 2491 2492
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
2493 2494
	}

2495
	dc.handle = cpu_to_le16(conn->handle);
2496 2497 2498 2499 2500
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

2501
unlock:
2502
	hci_dev_unlock(hdev);
2503 2504 2505
	return err;
}

2506
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
2507
		      u16 len)
2508
{
2509
	struct mgmt_cp_disconnect *cp = data;
2510
	struct mgmt_rp_disconnect rp;
2511
	struct hci_cp_disconnect dc;
2512
	struct pending_cmd *cmd;
2513 2514 2515 2516 2517
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2518 2519 2520 2521
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2522
	if (!bdaddr_type_is_valid(cp->addr.type))
2523 2524 2525
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
2526

2527
	hci_dev_lock(hdev);
2528 2529

	if (!test_bit(HCI_UP, &hdev->flags)) {
2530 2531
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2532 2533 2534
		goto failed;
	}

2535
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
2536 2537
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2538 2539 2540
		goto failed;
	}

2541
	if (cp->addr.type == BDADDR_BREDR)
2542 2543
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2544 2545
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
2546

2547
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2548 2549
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
2550 2551 2552
		goto failed;
	}

2553
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2554 2555
	if (!cmd) {
		err = -ENOMEM;
2556
		goto failed;
2557
	}
2558

2559
	dc.handle = cpu_to_le16(conn->handle);
2560
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
2561 2562 2563

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
2564
		mgmt_pending_remove(cmd);
2565 2566

failed:
2567
	hci_dev_unlock(hdev);
2568 2569 2570
	return err;
}

2571
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2572 2573 2574
{
	switch (link_type) {
	case LE_LINK:
2575 2576
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2577
			return BDADDR_LE_PUBLIC;
2578

2579
		default:
2580
			/* Fallback to LE Random address type */
2581
			return BDADDR_LE_RANDOM;
2582
		}
2583

2584
	default:
2585
		/* Fallback to BR/EDR type */
2586
		return BDADDR_BREDR;
2587 2588 2589
	}
}

2590 2591
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2592 2593
{
	struct mgmt_rp_get_connections *rp;
2594
	struct hci_conn *c;
2595
	size_t rp_len;
2596 2597
	int err;
	u16 i;
2598 2599 2600

	BT_DBG("");

2601
	hci_dev_lock(hdev);
2602

2603
	if (!hdev_is_powered(hdev)) {
2604
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
2605
				 MGMT_STATUS_NOT_POWERED);
2606 2607 2608
		goto unlock;
	}

2609
	i = 0;
2610 2611
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2612
			i++;
2613 2614
	}

2615
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2616
	rp = kmalloc(rp_len, GFP_KERNEL);
2617
	if (!rp) {
2618 2619 2620 2621 2622
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2623
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2624 2625
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2626
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2627
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2628
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2629 2630 2631 2632
			continue;
		i++;
	}

2633
	rp->conn_count = cpu_to_le16(i);
2634

2635 2636
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2637

2638
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
2639
			   rp_len);
2640

2641
	kfree(rp);
2642 2643

unlock:
2644
	hci_dev_unlock(hdev);
2645 2646 2647
	return err;
}

2648
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2649
				   struct mgmt_cp_pin_code_neg_reply *cp)
2650 2651 2652 2653
{
	struct pending_cmd *cmd;
	int err;

2654
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2655
			       sizeof(*cp));
2656 2657 2658
	if (!cmd)
		return -ENOMEM;

2659
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2660
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2661 2662 2663 2664 2665 2666
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2667
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2668
			  u16 len)
2669
{
2670
	struct hci_conn *conn;
2671
	struct mgmt_cp_pin_code_reply *cp = data;
2672
	struct hci_cp_pin_code_reply reply;
2673
	struct pending_cmd *cmd;
2674 2675 2676 2677
	int err;

	BT_DBG("");

2678
	hci_dev_lock(hdev);
2679

2680
	if (!hdev_is_powered(hdev)) {
2681
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2682
				 MGMT_STATUS_NOT_POWERED);
2683 2684 2685
		goto failed;
	}

2686
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2687
	if (!conn) {
2688
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2689
				 MGMT_STATUS_NOT_CONNECTED);
2690 2691 2692 2693
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2694 2695 2696
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2697 2698 2699

		BT_ERR("PIN code is not 16 bytes long");

2700
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2701
		if (err >= 0)
2702
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2703
					 MGMT_STATUS_INVALID_PARAMS);
2704 2705 2706 2707

		goto failed;
	}

2708
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2709 2710
	if (!cmd) {
		err = -ENOMEM;
2711
		goto failed;
2712
	}
2713

2714
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2715
	reply.pin_len = cp->pin_len;
2716
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2717 2718 2719

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2720
		mgmt_pending_remove(cmd);
2721 2722

failed:
2723
	hci_dev_unlock(hdev);
2724 2725 2726
	return err;
}

2727 2728
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2729
{
2730
	struct mgmt_cp_set_io_capability *cp = data;
2731 2732 2733

	BT_DBG("");

2734
	hci_dev_lock(hdev);
2735 2736 2737 2738

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2739
	       hdev->io_capability);
2740

2741
	hci_dev_unlock(hdev);
2742

2743 2744
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2745 2746
}

2747
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2748 2749
{
	struct hci_dev *hdev = conn->hdev;
2750
	struct pending_cmd *cmd;
2751

2752
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2770 2771
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2772

2773
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2774
		     &rp, sizeof(rp));
2775 2776 2777 2778 2779 2780

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2781
	hci_conn_drop(conn);
2782

2783
	mgmt_pending_remove(cmd);
2784 2785
}

2786 2787 2788 2789 2790 2791 2792 2793 2794 2795
void mgmt_smp_complete(struct hci_conn *conn, bool complete)
{
	u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED;
	struct pending_cmd *cmd;

	cmd = find_pairing(conn);
	if (cmd)
		pairing_complete(cmd, status);
}

2796 2797 2798 2799 2800 2801 2802
static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2803
	if (!cmd)
2804
		BT_DBG("Unable to find a pending command");
2805
	else
2806
		pairing_complete(cmd, mgmt_status(status));
2807 2808
}

2809
static void le_pairing_complete_cb(struct hci_conn *conn, u8 status)
2810 2811 2812 2813 2814 2815 2816 2817 2818 2819 2820 2821 2822 2823 2824
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2825
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2826
		       u16 len)
2827
{
2828
	struct mgmt_cp_pair_device *cp = data;
2829
	struct mgmt_rp_pair_device rp;
2830 2831 2832 2833 2834 2835 2836
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2837 2838 2839 2840
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2841 2842 2843 2844 2845
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2846
	hci_dev_lock(hdev);
2847

2848
	if (!hdev_is_powered(hdev)) {
2849 2850
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2851 2852 2853
		goto unlock;
	}

2854
	sec_level = BT_SECURITY_MEDIUM;
2855
	auth_type = HCI_AT_DEDICATED_BONDING;
2856

2857
	if (cp->addr.type == BDADDR_BREDR) {
2858 2859
		conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level,
				       auth_type);
2860 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870
	} else {
		u8 addr_type;

		/* Convert from L2CAP channel address type to HCI address type
		 */
		if (cp->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;

		conn = hci_connect_le(hdev, &cp->addr.bdaddr, addr_type,
2871
				      sec_level, auth_type);
2872
	}
2873

2874
	if (IS_ERR(conn)) {
2875 2876 2877 2878 2879 2880 2881
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2882
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2883
				   status, &rp,
2884
				   sizeof(rp));
2885 2886 2887 2888
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2889
		hci_conn_drop(conn);
2890
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2891
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2892 2893 2894
		goto unlock;
	}

2895
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2896 2897
	if (!cmd) {
		err = -ENOMEM;
2898
		hci_conn_drop(conn);
2899 2900 2901
		goto unlock;
	}

2902
	/* For LE, just connecting isn't a proof that the pairing finished */
2903
	if (cp->addr.type == BDADDR_BREDR) {
2904
		conn->connect_cfm_cb = pairing_complete_cb;
2905 2906 2907 2908 2909 2910 2911
		conn->security_cfm_cb = pairing_complete_cb;
		conn->disconn_cfm_cb = pairing_complete_cb;
	} else {
		conn->connect_cfm_cb = le_pairing_complete_cb;
		conn->security_cfm_cb = le_pairing_complete_cb;
		conn->disconn_cfm_cb = le_pairing_complete_cb;
	}
2912

2913 2914 2915 2916
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2917
	    hci_conn_security(conn, sec_level, auth_type))
2918 2919 2920 2921 2922
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2923
	hci_dev_unlock(hdev);
2924 2925 2926
	return err;
}

2927 2928
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2929
{
2930
	struct mgmt_addr_info *addr = data;
2931 2932 2933 2934 2935 2936 2937 2938
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2939
	if (!hdev_is_powered(hdev)) {
2940
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2941
				 MGMT_STATUS_NOT_POWERED);
2942 2943 2944
		goto unlock;
	}

2945 2946
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2947
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2948
				 MGMT_STATUS_INVALID_PARAMS);
2949 2950 2951 2952 2953 2954
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2955
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2956
				 MGMT_STATUS_INVALID_PARAMS);
2957 2958 2959 2960 2961
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2962
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2963
			   addr, sizeof(*addr));
2964 2965 2966 2967 2968
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2969
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2970
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2971
			     u16 hci_op, __le32 passkey)
2972 2973
{
	struct pending_cmd *cmd;
2974
	struct hci_conn *conn;
2975 2976
	int err;

2977
	hci_dev_lock(hdev);
2978

2979
	if (!hdev_is_powered(hdev)) {
2980 2981 2982
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2983
		goto done;
2984 2985
	}

2986 2987
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2988
	else
2989
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2990 2991

	if (!conn) {
2992 2993 2994
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2995 2996
		goto done;
	}
2997

2998
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2999
		/* Continue with pairing via SMP */
3000 3001 3002
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
3003 3004 3005
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
3006
		else
3007 3008 3009
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
3010 3011 3012 3013

		goto done;
	}

3014
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
3015 3016
	if (!cmd) {
		err = -ENOMEM;
3017
		goto done;
3018 3019
	}

3020
	/* Continue with pairing via HCI */
3021 3022 3023
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

3024
		bacpy(&cp.bdaddr, &addr->bdaddr);
3025 3026 3027
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
3028 3029
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
3030

3031 3032
	if (err < 0)
		mgmt_pending_remove(cmd);
3033

3034
done:
3035
	hci_dev_unlock(hdev);
3036 3037 3038
	return err;
}

3039 3040 3041 3042 3043 3044 3045
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

3046
	return user_pairing_resp(sk, hdev, &cp->addr,
3047 3048 3049 3050
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

3051 3052
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
3053
{
3054
	struct mgmt_cp_user_confirm_reply *cp = data;
3055 3056 3057 3058

	BT_DBG("");

	if (len != sizeof(*cp))
3059
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
3060
				  MGMT_STATUS_INVALID_PARAMS);
3061

3062
	return user_pairing_resp(sk, hdev, &cp->addr,
3063 3064
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
3065 3066
}

3067
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
3068
				  void *data, u16 len)
3069
{
3070
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
3071 3072 3073

	BT_DBG("");

3074
	return user_pairing_resp(sk, hdev, &cp->addr,
3075 3076
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
3077 3078
}

3079 3080
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
3081
{
3082
	struct mgmt_cp_user_passkey_reply *cp = data;
3083 3084 3085

	BT_DBG("");

3086
	return user_pairing_resp(sk, hdev, &cp->addr,
3087 3088
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
3089 3090
}

3091
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
3092
				  void *data, u16 len)
3093
{
3094
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
3095 3096 3097

	BT_DBG("");

3098
	return user_pairing_resp(sk, hdev, &cp->addr,
3099 3100
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
3101 3102
}

3103
static void update_name(struct hci_request *req)
3104
{
3105
	struct hci_dev *hdev = req->hdev;
3106 3107
	struct hci_cp_write_local_name cp;

3108
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
3109

3110
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
3111 3112
}

3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3141
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
3142
			  u16 len)
3143
{
3144
	struct mgmt_cp_set_local_name *cp = data;
3145
	struct pending_cmd *cmd;
3146
	struct hci_request req;
3147 3148 3149 3150
	int err;

	BT_DBG("");

3151
	hci_dev_lock(hdev);
3152

3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

3164
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
3165

3166
	if (!hdev_is_powered(hdev)) {
3167
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
3168 3169

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
3170
				   data, len);
3171 3172 3173 3174
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
3175
				 sk);
3176

3177 3178 3179
		goto failed;
	}

3180
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
3181 3182 3183 3184 3185
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3186 3187
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

3188
	hci_req_init(&req, hdev);
3189 3190 3191 3192 3193 3194

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

3195 3196 3197
	/* The name is stored in the scan response data and so
	 * no need to udpate the advertising data here.
	 */
3198
	if (lmp_le_capable(hdev))
3199
		update_scan_rsp_data(&req);
3200

3201
	err = hci_req_run(&req, set_name_complete);
3202 3203 3204 3205
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
3206
	hci_dev_unlock(hdev);
3207 3208 3209
	return err;
}

3210
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
3211
			       void *data, u16 data_len)
3212 3213 3214 3215
{
	struct pending_cmd *cmd;
	int err;

3216
	BT_DBG("%s", hdev->name);
3217

3218
	hci_dev_lock(hdev);
3219

3220
	if (!hdev_is_powered(hdev)) {
3221
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3222
				 MGMT_STATUS_NOT_POWERED);
3223 3224 3225
		goto unlock;
	}

3226
	if (!lmp_ssp_capable(hdev)) {
3227
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3228
				 MGMT_STATUS_NOT_SUPPORTED);
3229 3230 3231
		goto unlock;
	}

3232
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
3233
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3234
				 MGMT_STATUS_BUSY);
3235 3236 3237
		goto unlock;
	}

3238
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
3239 3240 3241 3242 3243
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

3244 3245 3246 3247 3248 3249
	if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
		err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_EXT_DATA,
				   0, NULL);
	else
		err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);

3250 3251 3252 3253
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
3254
	hci_dev_unlock(hdev);
3255 3256 3257
	return err;
}

3258
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3259
			       void *data, u16 len)
3260 3261 3262
{
	int err;

3263
	BT_DBG("%s ", hdev->name);
3264

3265
	hci_dev_lock(hdev);
3266

3267 3268 3269
	if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_data *cp = data;
		u8 status;
3270

3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
					      cp->hash, cp->randomizer);
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				   status, &cp->addr, sizeof(cp->addr));
	} else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_ext_data *cp = data;
		u8 status;

		err = hci_add_remote_oob_ext_data(hdev, &cp->addr.bdaddr,
						  cp->hash192,
						  cp->randomizer192,
						  cp->hash256,
						  cp->randomizer256);
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				   status, &cp->addr, sizeof(cp->addr));
	} else {
		BT_ERR("add_remote_oob_data: invalid length of %u bytes", len);
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				 MGMT_STATUS_INVALID_PARAMS);
	}
3301

3302
	hci_dev_unlock(hdev);
3303 3304 3305
	return err;
}

3306
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3307
				  void *data, u16 len)
3308
{
3309
	struct mgmt_cp_remove_remote_oob_data *cp = data;
3310
	u8 status;
3311 3312
	int err;

3313
	BT_DBG("%s", hdev->name);
3314

3315
	hci_dev_lock(hdev);
3316

3317
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
3318
	if (err < 0)
3319
		status = MGMT_STATUS_INVALID_PARAMS;
3320
	else
3321
		status = MGMT_STATUS_SUCCESS;
3322

3323
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
3324
			   status, &cp->addr, sizeof(cp->addr));
3325

3326
	hci_dev_unlock(hdev);
3327 3328 3329
	return err;
}

3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342 3343 3344 3345 3346 3347 3348 3349 3350
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

3351 3352
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
3353 3354
	unsigned long timeout = 0;

3355 3356 3357 3358 3359 3360 3361 3362 3363 3364 3365 3366 3367 3368 3369
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
3370
		timeout = msecs_to_jiffies(DISCOV_LE_TIMEOUT);
3371 3372 3373
		break;

	case DISCOV_TYPE_INTERLEAVED:
3374
		timeout = msecs_to_jiffies(hdev->discov_interleaved_timeout);
3375 3376 3377 3378 3379 3380 3381 3382
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
3383 3384 3385 3386 3387

	if (!timeout)
		return;

	queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable, timeout);
3388 3389
}

3390
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
3391
			   void *data, u16 len)
3392
{
3393
	struct mgmt_cp_start_discovery *cp = data;
3394
	struct pending_cmd *cmd;
3395 3396 3397 3398 3399 3400
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
3401
	u8 status, own_addr_type;
3402 3403
	int err;

3404
	BT_DBG("%s", hdev->name);
3405

3406
	hci_dev_lock(hdev);
3407

3408
	if (!hdev_is_powered(hdev)) {
3409
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3410
				 MGMT_STATUS_NOT_POWERED);
3411 3412 3413
		goto failed;
	}

3414 3415 3416 3417 3418 3419
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

3420
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
3421
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3422
				 MGMT_STATUS_BUSY);
3423 3424 3425
		goto failed;
	}

3426
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
3427 3428 3429 3430 3431
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
3432 3433
	hdev->discovery.type = cp->type;

3434 3435
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
3436
	switch (hdev->discovery.type) {
3437
	case DISCOV_TYPE_BREDR:
3438 3439
		status = mgmt_bredr_support(hdev);
		if (status) {
3440
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3441
					 status);
3442 3443 3444 3445
			mgmt_pending_remove(cmd);
			goto failed;
		}

3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
3457
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
3458
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
3459 3460 3461
		break;

	case DISCOV_TYPE_LE:
3462
	case DISCOV_TYPE_INTERLEAVED:
3463 3464
		status = mgmt_le_support(hdev);
		if (status) {
3465
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3466
					 status);
3467 3468 3469 3470
			mgmt_pending_remove(cmd);
			goto failed;
		}

3471
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
3472
		    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
3473 3474 3475 3476 3477 3478
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

3479
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
3480 3481 3482 3483 3484 3485
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

3486 3487 3488 3489 3490 3491
		/* If controller is scanning, it means the background scanning
		 * is running. Thus, we should temporarily stop it in order to
		 * set the discovery scanning parameters.
		 */
		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags))
			hci_req_add_le_scan_disable(&req);
3492 3493

		memset(&param_cp, 0, sizeof(param_cp));
3494

3495 3496 3497 3498 3499
		/* All active scans will be done with either a resolvable
		 * private address (when privacy feature has been enabled)
		 * or unresolvable private address.
		 */
		err = hci_update_random_address(&req, true, &own_addr_type);
3500 3501 3502 3503 3504 3505 3506
		if (err < 0) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_FAILED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

3507
		param_cp.type = LE_SCAN_ACTIVE;
3508 3509
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
3510
		param_cp.own_address_type = own_addr_type;
3511 3512 3513 3514 3515 3516 3517 3518
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
3519 3520
		break;

3521
	default:
3522 3523 3524 3525
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
3526
	}
3527

3528
	err = hci_req_run(&req, start_discovery_complete);
3529 3530
	if (err < 0)
		mgmt_pending_remove(cmd);
3531 3532
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3533 3534

failed:
3535
	hci_dev_unlock(hdev);
3536 3537 3538
	return err;
}

3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565 3566 3567 3568 3569 3570 3571
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

3572
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
3573
			  u16 len)
3574
{
3575
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
3576
	struct pending_cmd *cmd;
3577 3578
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
3579
	struct hci_request req;
3580 3581
	int err;

3582
	BT_DBG("%s", hdev->name);
3583

3584
	hci_dev_lock(hdev);
3585

3586
	if (!hci_discovery_active(hdev)) {
3587
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
3588 3589
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
3590 3591 3592 3593
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
3594
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
3595 3596
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
3597
		goto unlock;
3598 3599
	}

3600
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
3601 3602
	if (!cmd) {
		err = -ENOMEM;
3603 3604 3605
		goto unlock;
	}

3606 3607
	hci_req_init(&req, hdev);

3608 3609
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
3610 3611 3612 3613 3614
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

3615
			hci_req_add_le_scan_disable(&req);
3616
		}
3617

3618 3619 3620 3621
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
3622
						     NAME_PENDING);
3623
		if (!e) {
3624
			mgmt_pending_remove(cmd);
3625 3626 3627 3628 3629 3630 3631
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
3632

3633
		bacpy(&cp.bdaddr, &e->data.bdaddr);
3634 3635
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
3636 3637 3638 3639 3640

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
3641 3642 3643 3644 3645 3646

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
3647 3648
	}

3649
	err = hci_req_run(&req, stop_discovery_complete);
3650 3651
	if (err < 0)
		mgmt_pending_remove(cmd);
3652 3653
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
3654

3655
unlock:
3656
	hci_dev_unlock(hdev);
3657 3658 3659
	return err;
}

3660
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3661
			u16 len)
3662
{
3663
	struct mgmt_cp_confirm_name *cp = data;
3664 3665 3666
	struct inquiry_entry *e;
	int err;

3667
	BT_DBG("%s", hdev->name);
3668 3669 3670

	hci_dev_lock(hdev);

3671
	if (!hci_discovery_active(hdev)) {
3672 3673 3674
		err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
				   MGMT_STATUS_FAILED, &cp->addr,
				   sizeof(cp->addr));
3675 3676 3677
		goto failed;
	}

3678
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3679
	if (!e) {
3680 3681 3682
		err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
				   MGMT_STATUS_INVALID_PARAMS, &cp->addr,
				   sizeof(cp->addr));
3683 3684 3685 3686 3687 3688 3689 3690
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3691
		hci_inquiry_cache_update_resolve(hdev, e);
3692 3693
	}

3694 3695
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
3696 3697 3698 3699 3700 3701

failed:
	hci_dev_unlock(hdev);
	return err;
}

3702
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3703
			u16 len)
3704
{
3705
	struct mgmt_cp_block_device *cp = data;
3706
	u8 status;
3707 3708
	int err;

3709
	BT_DBG("%s", hdev->name);
3710

3711
	if (!bdaddr_type_is_valid(cp->addr.type))
3712 3713 3714
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3715

3716
	hci_dev_lock(hdev);
3717

3718
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
3719
	if (err < 0)
3720
		status = MGMT_STATUS_FAILED;
3721
	else
3722
		status = MGMT_STATUS_SUCCESS;
3723

3724
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
3725
			   &cp->addr, sizeof(cp->addr));
3726

3727
	hci_dev_unlock(hdev);
3728 3729 3730 3731

	return err;
}

3732
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3733
			  u16 len)
3734
{
3735
	struct mgmt_cp_unblock_device *cp = data;
3736
	u8 status;
3737 3738
	int err;

3739
	BT_DBG("%s", hdev->name);
3740

3741
	if (!bdaddr_type_is_valid(cp->addr.type))
3742 3743 3744
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3745

3746
	hci_dev_lock(hdev);
3747

3748
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3749
	if (err < 0)
3750
		status = MGMT_STATUS_INVALID_PARAMS;
3751
	else
3752
		status = MGMT_STATUS_SUCCESS;
3753

3754
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3755
			   &cp->addr, sizeof(cp->addr));
3756

3757
	hci_dev_unlock(hdev);
3758 3759 3760 3761

	return err;
}

3762 3763 3764 3765
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3766
	struct hci_request req;
3767
	int err;
3768
	__u16 source;
3769 3770 3771

	BT_DBG("%s", hdev->name);

3772 3773 3774 3775 3776 3777
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3778 3779
	hci_dev_lock(hdev);

3780
	hdev->devid_source = source;
3781 3782 3783 3784 3785 3786
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3787 3788 3789
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3790 3791 3792 3793 3794 3795

	hci_dev_unlock(hdev);

	return err;
}

3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809 3810 3811 3812 3813 3814 3815 3816
static void set_advertising_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

3817 3818
static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
3819 3820 3821 3822
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
3823
	u8 val, enabled, status;
3824 3825 3826 3827
	int err;

	BT_DBG("request for %s", hdev->name);

3828 3829
	status = mgmt_le_support(hdev);
	if (status)
3830
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3831
				  status);
3832 3833 3834 3835 3836 3837 3838 3839

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	val = !!cp->val;
3840
	enabled = test_bit(HCI_ADVERTISING, &hdev->dev_flags);
3841

3842 3843 3844 3845 3846 3847
	/* The following conditions are ones which mean that we should
	 * not do any HCI communication but directly send a mgmt
	 * response to user space (after toggling the flag if
	 * necessary).
	 */
	if (!hdev_is_powered(hdev) || val == enabled ||
3848
	    hci_conn_num(hdev, LE_LINK) > 0) {
3849 3850
		bool changed = false;

3851 3852
		if (val != test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
			change_bit(HCI_ADVERTISING, &hdev->dev_flags);
3853 3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 3864 3865 3866 3867 3868 3869 3870 3871 3872 3873 3874 3875 3876 3877 3878 3879 3880
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

3881 3882 3883 3884
	if (val)
		enable_advertising(&req);
	else
		disable_advertising(&req);
3885 3886 3887 3888 3889 3890 3891 3892 3893 3894

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3895 3896 3897 3898 3899 3900 3901 3902
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3903
	if (!lmp_le_capable(hdev))
3904
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
3905
				  MGMT_STATUS_NOT_SUPPORTED);
3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925 3926 3927 3928 3929 3930 3931 3932 3933 3934

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_REJECTED);

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3935 3936 3937 3938 3939 3940 3941 3942 3943 3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959
static int set_scan_params(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_cp_set_scan_params *cp = data;
	__u16 interval, window;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_NOT_SUPPORTED);

	interval = __le16_to_cpu(cp->interval);

	if (interval < 0x0004 || interval > 0x4000)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

	window = __le16_to_cpu(cp->window);

	if (window < 0x0004 || window > 0x4000)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

3960 3961 3962 3963
	if (window > interval)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

3964 3965 3966 3967 3968 3969 3970
	hci_dev_lock(hdev);

	hdev->le_scan_interval = interval;
	hdev->le_scan_window = window;

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0, NULL, 0);

3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985
	/* If background scan is running, restart it so new parameters are
	 * loaded.
	 */
	if (test_bit(HCI_LE_SCAN, &hdev->dev_flags) &&
	    hdev->discovery.state == DISCOVERY_STOPPED) {
		struct hci_request req;

		hci_req_init(&req, hdev);

		hci_req_add_le_scan_disable(&req);
		hci_req_add_le_passive_scan(&req);

		hci_req_run(&req, NULL);
	}

3986 3987 3988 3989 3990
	hci_dev_unlock(hdev);

	return err;
}

3991 3992 3993 3994 3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
4007 4008 4009 4010 4011 4012 4013
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

4014 4015 4016 4017 4018 4019 4020 4021 4022 4023
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

4024
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
4025
				void *data, u16 len)
4026
{
4027
	struct mgmt_mode *cp = data;
4028 4029
	struct pending_cmd *cmd;
	struct hci_request req;
4030 4031
	int err;

4032
	BT_DBG("%s", hdev->name);
4033

4034 4035
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
4036 4037 4038
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

4039 4040 4041 4042
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

4043
	if (!hdev_is_powered(hdev))
4044
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
4045
				  MGMT_STATUS_NOT_POWERED);
4046 4047

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
4048
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
4049
				  MGMT_STATUS_REJECTED);
4050 4051 4052

	hci_dev_lock(hdev);

4053 4054 4055 4056 4057 4058
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

4059 4060 4061 4062 4063 4064
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

4065 4066 4067 4068 4069
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
4070 4071
	}

4072 4073
	hci_req_init(&req, hdev);

4074
	write_fast_connectable(&req, cp->val);
4075 4076

	err = hci_req_run(&req, fast_connectable_complete);
4077
	if (err < 0) {
4078
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
4079
				 MGMT_STATUS_FAILED);
4080
		mgmt_pending_remove(cmd);
4081 4082
	}

4083
unlock:
4084
	hci_dev_unlock(hdev);
4085

4086 4087 4088
	return err;
}

4089 4090 4091 4092 4093 4094 4095 4096 4097 4098 4099 4100 4101 4102 4103 4104 4105 4106 4107 4108
static void set_bredr_scan(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	u8 scan = 0;

	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
}

4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123 4124 4125 4126 4127 4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203 4204 4205 4206
static void set_bredr_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
		clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
		}

		change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_REJECTED);
		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

4207
	/* We need to flip the bit already here so that update_adv_data
4208 4209 4210 4211 4212
	 * generates the correct flags.
	 */
	set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

	hci_req_init(&req, hdev);
4213 4214 4215 4216

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		set_bredr_scan(&req);

4217 4218 4219
	/* Since only the advertising data flags will change, there
	 * is no need to update the scan response data.
	 */
4220
	update_adv_data(&req);
4221

4222 4223 4224 4225 4226 4227 4228 4229 4230
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4231 4232 4233 4234 4235
static int set_secure_conn(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
4236
	u8 val, status;
4237 4238 4239 4240 4241 4242 4243 4244 4245
	int err;

	BT_DBG("request for %s", hdev->name);

	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  status);

4246 4247
	if (!lmp_sc_capable(hdev) &&
	    !test_bit(HCI_FORCE_SC, &hdev->dev_flags))
4248 4249 4250
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  MGMT_STATUS_NOT_SUPPORTED);

4251
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4252 4253 4254 4255 4256 4257 4258 4259
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
		bool changed;

4260
		if (cp->val) {
4261 4262
			changed = !test_and_set_bit(HCI_SC_ENABLED,
						    &hdev->dev_flags);
4263 4264 4265 4266 4267
			if (cp->val == 0x02)
				set_bit(HCI_SC_ONLY, &hdev->dev_flags);
			else
				clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		} else {
4268 4269
			changed = test_and_clear_bit(HCI_SC_ENABLED,
						     &hdev->dev_flags);
4270 4271
			clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		}
4272 4273 4274 4275 4276 4277 4278 4279 4280 4281 4282 4283 4284 4285 4286 4287 4288

		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

4289 4290 4291 4292
	val = !!cp->val;

	if (val == test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
	    (cp->val == 0x02) == test_bit(HCI_SC_ONLY, &hdev->dev_flags)) {
4293 4294 4295 4296 4297 4298 4299 4300 4301 4302
		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

4303
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SC_SUPPORT, 1, &val);
4304 4305 4306 4307 4308
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

4309 4310 4311 4312 4313
	if (cp->val == 0x02)
		set_bit(HCI_SC_ONLY, &hdev->dev_flags);
	else
		clear_bit(HCI_SC_ONLY, &hdev->dev_flags);

4314 4315 4316 4317 4318
failed:
	hci_dev_unlock(hdev);
	return err;
}

4319 4320 4321 4322 4323 4324 4325 4326 4327 4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339 4340 4341 4342 4343 4344 4345 4346 4347 4348 4349 4350
static int set_debug_keys(struct sock *sk, struct hci_dev *hdev,
			  void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	bool changed;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val)
		changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);

	err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373
static int set_privacy(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		       u16 len)
{
	struct mgmt_cp_set_privacy *cp = cp_data;
	bool changed;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (cp->privacy != 0x00 && cp->privacy != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				  MGMT_STATUS_INVALID_PARAMS);

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				  MGMT_STATUS_REJECTED);

	hci_dev_lock(hdev);

4374 4375 4376 4377 4378
	/* If user space supports this command it is also expected to
	 * handle IRKs. Therefore, set the HCI_RPA_RESOLVING flag.
	 */
	set_bit(HCI_RPA_RESOLVING, &hdev->dev_flags);

4379 4380 4381 4382 4383 4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394 4395 4396 4397 4398 4399 4400
	if (cp->privacy) {
		changed = !test_and_set_bit(HCI_PRIVACY, &hdev->dev_flags);
		memcpy(hdev->irk, cp->irk, sizeof(hdev->irk));
		set_bit(HCI_RPA_EXPIRED, &hdev->dev_flags);
	} else {
		changed = test_and_clear_bit(HCI_PRIVACY, &hdev->dev_flags);
		memset(hdev->irk, 0, sizeof(hdev->irk));
		clear_bit(HCI_RPA_EXPIRED, &hdev->dev_flags);
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_PRIVACY, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4401 4402 4403 4404 4405 4406 4407 4408 4409 4410 4411 4412 4413 4414 4415 4416 4417 4418 4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430 4431 4432 4433 4434
static bool irk_is_valid(struct mgmt_irk_info *irk)
{
	switch (irk->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
}

static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		     u16 len)
{
	struct mgmt_cp_load_irks *cp = cp_data;
	u16 irk_count, expected_len;
	int i, err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				  MGMT_STATUS_NOT_SUPPORTED);

	irk_count = __le16_to_cpu(cp->irk_count);

	expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info);
	if (expected_len != len) {
		BT_ERR("load_irks: expected %u bytes, got %u bytes",
4435
		       expected_len, len);
4436 4437 4438 4439 4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450 4451 4452 4453 4454 4455 4456 4457 4458 4459 4460 4461 4462 4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				  MGMT_STATUS_INVALID_PARAMS);
	}

	BT_DBG("%s irk_count %u", hdev->name, irk_count);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *key = &cp->irks[i];

		if (!irk_is_valid(key))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_IRKS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	hci_smp_irks_clear(hdev);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *irk = &cp->irks[i];
		u8 addr_type;

		if (irk->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;

		hci_add_irk(hdev, &irk->addr.bdaddr, addr_type, irk->val,
			    BDADDR_ANY);
	}

	set_bit(HCI_RPA_RESOLVING, &hdev->dev_flags);

	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

4477 4478 4479 4480
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
	if (key->master != 0x00 && key->master != 0x01)
		return false;
4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493

	switch (key->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
4494 4495
}

4496
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
4497
			       void *cp_data, u16 len)
4498 4499 4500
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
4501
	int i, err;
4502

4503 4504 4505 4506 4507 4508
	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				  MGMT_STATUS_NOT_SUPPORTED);

4509
	key_count = __le16_to_cpu(cp->key_count);
4510 4511 4512 4513 4514

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
4515
		       expected_len, len);
4516
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
4517
				  MGMT_STATUS_INVALID_PARAMS);
4518 4519
	}

4520
	BT_DBG("%s key_count %u", hdev->name, key_count);
4521

4522 4523 4524
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

4525
		if (!ltk_is_valid(key))
4526 4527 4528 4529 4530
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

4531 4532 4533 4534 4535 4536
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
4537 4538 4539 4540 4541 4542
		u8 type, addr_type;

		if (key->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;
4543 4544 4545 4546 4547 4548

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

4549 4550 4551
		hci_add_ltk(hdev, &key->addr.bdaddr, addr_type, type,
			    key->type, key->val, key->enc_size, key->ediv,
			    key->rand);
4552 4553
	}

4554 4555 4556
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

4557 4558
	hci_dev_unlock(hdev);

4559
	return err;
4560 4561
}

4562 4563 4564 4565 4566 4567 4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580 4581 4582 4583 4584 4585 4586
struct cmd_conn_lookup {
	struct hci_conn *conn;
	bool valid_tx_power;
	u8 mgmt_status;
};

static void get_conn_info_complete(struct pending_cmd *cmd, void *data)
{
	struct cmd_conn_lookup *match = data;
	struct mgmt_cp_get_conn_info *cp;
	struct mgmt_rp_get_conn_info rp;
	struct hci_conn *conn = cmd->user_data;

	if (conn != match->conn)
		return;

	cp = (struct mgmt_cp_get_conn_info *) cmd->param;

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (!match->mgmt_status) {
		rp.rssi = conn->rssi;

4587
		if (match->valid_tx_power) {
4588
			rp.tx_power = conn->tx_power;
4589 4590
			rp.max_tx_power = conn->max_tx_power;
		} else {
4591
			rp.tx_power = HCI_TX_POWER_INVALID;
4592 4593
			rp.max_tx_power = HCI_TX_POWER_INVALID;
		}
4594 4595 4596 4597 4598 4599 4600 4601 4602 4603 4604 4605 4606 4607 4608 4609 4610 4611 4612 4613 4614 4615
	}

	cmd_complete(cmd->sk, cmd->index, MGMT_OP_GET_CONN_INFO,
		     match->mgmt_status, &rp, sizeof(rp));

	hci_conn_drop(conn);

	mgmt_pending_remove(cmd);
}

static void conn_info_refresh_complete(struct hci_dev *hdev, u8 status)
{
	struct hci_cp_read_rssi *cp;
	struct hci_conn *conn;
	struct cmd_conn_lookup match;
	u16 handle;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	/* TX power data is valid in case request completed successfully,
4616 4617 4618
	 * otherwise we assume it's not valid. At the moment we assume that
	 * either both or none of current and max values are valid to keep code
	 * simple.
4619 4620 4621 4622 4623 4624 4625 4626 4627 4628 4629 4630 4631 4632 4633 4634 4635 4636 4637 4638 4639 4640 4641 4642 4643 4644 4645 4646 4647 4648 4649 4650 4651 4652 4653 4654 4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666 4667 4668 4669 4670 4671 4672 4673 4674 4675 4676 4677 4678 4679 4680 4681 4682 4683 4684 4685 4686 4687 4688 4689 4690 4691 4692 4693 4694 4695 4696 4697 4698 4699 4700 4701 4702 4703 4704 4705 4706 4707 4708 4709 4710 4711
	 */
	match.valid_tx_power = !status;

	/* Commands sent in request are either Read RSSI or Read Transmit Power
	 * Level so we check which one was last sent to retrieve connection
	 * handle.  Both commands have handle as first parameter so it's safe to
	 * cast data on the same command struct.
	 *
	 * First command sent is always Read RSSI and we fail only if it fails.
	 * In other case we simply override error to indicate success as we
	 * already remembered if TX power value is actually valid.
	 */
	cp = hci_sent_cmd_data(hdev, HCI_OP_READ_RSSI);
	if (!cp) {
		cp = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
		status = 0;
	}

	if (!cp) {
		BT_ERR("invalid sent_cmd in response");
		goto unlock;
	}

	handle = __le16_to_cpu(cp->handle);
	conn = hci_conn_hash_lookup_handle(hdev, handle);
	if (!conn) {
		BT_ERR("unknown handle (%d) in response", handle);
		goto unlock;
	}

	match.conn = conn;
	match.mgmt_status = mgmt_status(status);

	/* Cache refresh is complete, now reply for mgmt request for given
	 * connection only.
	 */
	mgmt_pending_foreach(MGMT_OP_GET_CONN_INFO, hdev,
			     get_conn_info_complete, &match);

unlock:
	hci_dev_unlock(hdev);
}

static int get_conn_info(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_get_conn_info *cp = data;
	struct mgmt_rp_get_conn_info rp;
	struct hci_conn *conn;
	unsigned long conn_info_age;
	int err = 0;

	BT_DBG("%s", hdev->name);

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
		goto unlock;
	}

	if (cp->addr.type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);

	if (!conn || conn->state != BT_CONNECTED) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
		goto unlock;
	}

	/* To avoid client trying to guess when to poll again for information we
	 * calculate conn info age as random value between min/max set in hdev.
	 */
	conn_info_age = hdev->conn_info_min_age +
			prandom_u32_max(hdev->conn_info_max_age -
					hdev->conn_info_min_age);

	/* Query controller to refresh cached values if they are too old or were
	 * never read.
	 */
4712 4713
	if (time_after(jiffies, conn->conn_info_timestamp +
		       msecs_to_jiffies(conn_info_age)) ||
4714 4715 4716 4717 4718 4719 4720 4721 4722 4723 4724
	    !conn->conn_info_timestamp) {
		struct hci_request req;
		struct hci_cp_read_tx_power req_txp_cp;
		struct hci_cp_read_rssi req_rssi_cp;
		struct pending_cmd *cmd;

		hci_req_init(&req, hdev);
		req_rssi_cp.handle = cpu_to_le16(conn->handle);
		hci_req_add(&req, HCI_OP_READ_RSSI, sizeof(req_rssi_cp),
			    &req_rssi_cp);

4725 4726 4727 4728 4729 4730 4731 4732 4733 4734
		/* For LE links TX power does not change thus we don't need to
		 * query for it once value is known.
		 */
		if (!bdaddr_type_is_le(cp->addr.type) ||
		    conn->tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x00;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}
4735

4736 4737 4738 4739 4740 4741 4742 4743
		/* Max TX power needs to be read only once per connection */
		if (conn->max_tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x01;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}

4744 4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762
		err = hci_req_run(&req, conn_info_refresh_complete);
		if (err < 0)
			goto unlock;

		cmd = mgmt_pending_add(sk, MGMT_OP_GET_CONN_INFO, hdev,
				       data, len);
		if (!cmd) {
			err = -ENOMEM;
			goto unlock;
		}

		hci_conn_hold(conn);
		cmd->user_data = conn;

		conn->conn_info_timestamp = jiffies;
	} else {
		/* Cache is valid, just reply with values cached in hci_conn */
		rp.rssi = conn->rssi;
		rp.tx_power = conn->tx_power;
4763
		rp.max_tx_power = conn->max_tx_power;
4764 4765 4766 4767 4768 4769 4770 4771 4772 4773

		err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
				   MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4774
static const struct mgmt_handler {
4775 4776
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
4777 4778
	bool var_len;
	size_t data_len;
4779 4780
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
4781 4782 4783 4784 4785 4786 4787 4788 4789 4790 4791 4792 4793 4794 4795 4796 4797 4798 4799 4800 4801 4802 4803 4804 4805 4806 4807 4808 4809 4810 4811 4812
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
4813
	{ add_remote_oob_data,    true,  MGMT_ADD_REMOTE_OOB_DATA_SIZE },
4814 4815 4816 4817 4818 4819
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
4820
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
4821
	{ set_advertising,        false, MGMT_SETTING_SIZE },
4822
	{ set_bredr,              false, MGMT_SETTING_SIZE },
4823
	{ set_static_address,     false, MGMT_SET_STATIC_ADDRESS_SIZE },
4824
	{ set_scan_params,        false, MGMT_SET_SCAN_PARAMS_SIZE },
4825
	{ set_secure_conn,        false, MGMT_SETTING_SIZE },
4826
	{ set_debug_keys,         false, MGMT_SETTING_SIZE },
4827
	{ set_privacy,            false, MGMT_SET_PRIVACY_SIZE },
4828
	{ load_irks,              true,  MGMT_LOAD_IRKS_SIZE },
4829
	{ get_conn_info,          false, MGMT_GET_CONN_INFO_SIZE },
4830 4831 4832
};


4833 4834
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
4835 4836
	void *buf;
	u8 *cp;
4837
	struct mgmt_hdr *hdr;
4838
	u16 opcode, index, len;
4839
	struct hci_dev *hdev = NULL;
4840
	const struct mgmt_handler *handler;
4841 4842 4843 4844 4845 4846 4847
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

4848
	buf = kmalloc(msglen, GFP_KERNEL);
4849 4850 4851 4852 4853 4854 4855 4856
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

4857
	hdr = buf;
4858 4859 4860
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
4861 4862 4863 4864 4865 4866

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

4867
	if (index != MGMT_INDEX_NONE) {
4868 4869 4870
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
4871
					 MGMT_STATUS_INVALID_INDEX);
4872 4873
			goto done;
		}
4874

4875 4876
		if (test_bit(HCI_SETUP, &hdev->dev_flags) ||
		    test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
4877 4878 4879 4880
			err = cmd_status(sk, index, opcode,
					 MGMT_STATUS_INVALID_INDEX);
			goto done;
		}
4881 4882
	}

4883
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
4884
	    mgmt_handlers[opcode].func == NULL) {
4885
		BT_DBG("Unknown op %u", opcode);
4886
		err = cmd_status(sk, index, opcode,
4887
				 MGMT_STATUS_UNKNOWN_COMMAND);
4888 4889 4890 4891
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
4892
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
4893
		err = cmd_status(sk, index, opcode,
4894
				 MGMT_STATUS_INVALID_INDEX);
4895
		goto done;
4896 4897
	}

4898 4899 4900
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
4901
	    (!handler->var_len && len != handler->data_len)) {
4902
		err = cmd_status(sk, index, opcode,
4903
				 MGMT_STATUS_INVALID_PARAMS);
4904 4905 4906
		goto done;
	}

4907 4908 4909 4910 4911
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

4912
	err = handler->func(sk, hdev, cp, len);
4913 4914 4915
	if (err < 0)
		goto done;

4916 4917 4918
	err = msglen;

done:
4919 4920 4921
	if (hdev)
		hci_dev_put(hdev);

4922 4923 4924
	kfree(buf);
	return err;
}
4925

4926
void mgmt_index_added(struct hci_dev *hdev)
4927
{
4928
	if (hdev->dev_type != HCI_BREDR)
4929
		return;
4930

4931
	mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
4932 4933
}

4934
void mgmt_index_removed(struct hci_dev *hdev)
4935
{
4936
	u8 status = MGMT_STATUS_INVALID_INDEX;
4937

4938
	if (hdev->dev_type != HCI_BREDR)
4939
		return;
4940

4941
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
4942

4943
	mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
4944 4945
}

4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956
/* This function requires the caller holds hdev->lock */
static void restart_le_auto_conns(struct hci_dev *hdev)
{
	struct hci_conn_params *p;

	list_for_each_entry(p, &hdev->le_conn_params, list) {
		if (p->auto_connect == HCI_AUTO_CONN_ALWAYS)
			hci_pend_le_conn_add(hdev, &p->addr, p->addr_type);
	}
}

4957 4958 4959 4960 4961 4962 4963 4964
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

4965 4966
	restart_le_auto_conns(hdev);

4967 4968 4969 4970 4971 4972 4973 4974 4975 4976
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

4977
static int powered_update_hci(struct hci_dev *hdev)
4978
{
4979
	struct hci_request req;
4980
	u8 link_sec;
4981

4982 4983
	hci_req_init(&req, hdev);

4984 4985 4986
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
4987

4988
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
4989
	}
4990

4991 4992
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
4993
		struct hci_cp_write_le_host_supported cp;
4994

4995 4996
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
4997

4998 4999 5000 5001 5002
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
5003 5004
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
5005
	}
5006

5007
	if (lmp_le_capable(hdev)) {
5008 5009 5010 5011
		/* Make sure the controller has a good default for
		 * advertising data. This also applies to the case
		 * where BR/EDR was toggled during the AUTO_OFF phase.
		 */
5012
		if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
5013
			update_adv_data(&req);
5014 5015
			update_scan_rsp_data(&req);
		}
5016

5017 5018
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
			enable_advertising(&req);
5019 5020
	}

5021 5022
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
5023 5024
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
5025

5026
	if (lmp_bredr_capable(hdev)) {
5027 5028
		if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
			set_bredr_scan(&req);
5029
		update_class(&req);
5030
		update_name(&req);
5031
		update_eir(&req);
5032
	}
5033

5034
	return hci_req_run(&req, powered_complete);
5035
}
5036

5037 5038 5039
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
5040 5041
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
5042
	int err;
5043

5044 5045 5046 5047
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
5048 5049
		if (powered_update_hci(hdev) == 0)
			return 0;
5050

5051 5052 5053
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
5054 5055
	}

5056 5057 5058 5059 5060 5061 5062 5063
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
5064
	err = new_settings(hdev, match.sk);
5065 5066 5067 5068

	if (match.sk)
		sock_put(match.sk);

5069
	return err;
5070
}
5071

5072
void mgmt_set_powered_failed(struct hci_dev *hdev, int err)
5073 5074 5075 5076 5077 5078
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
5079
		return;
5080 5081 5082 5083 5084 5085

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

5086
	cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);
5087 5088 5089 5090

	mgmt_pending_remove(cmd);
}

5091 5092 5093 5094 5095 5096 5097 5098 5099 5100 5101 5102
void mgmt_discoverable_timeout(struct hci_dev *hdev)
{
	struct hci_request req;

	hci_dev_lock(hdev);

	/* When discoverable timeout triggers, then just make sure
	 * the limited discoverable flag is cleared. Even in the case
	 * of a timeout triggered from general discoverable, it is
	 * safe to unconditionally clear the flag.
	 */
	clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
5103
	clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
5104 5105

	hci_req_init(&req, hdev);
5106 5107 5108 5109 5110
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		u8 scan = SCAN_PAGE;
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE,
			    sizeof(scan), &scan);
	}
5111
	update_class(&req);
5112
	update_adv_data(&req);
5113 5114 5115 5116
	hci_req_run(&req, NULL);

	hdev->discov_timeout = 0;

5117 5118
	new_settings(hdev, NULL);

5119 5120 5121
	hci_dev_unlock(hdev);
}

5122
void mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
5123
{
5124
	bool changed;
5125

5126 5127 5128 5129 5130
	/* Nothing needed here if there's a pending command since that
	 * commands request completion callback takes care of everything
	 * necessary.
	 */
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev))
5131
		return;
5132

5133 5134 5135 5136
	/* Powering off may clear the scan mode - don't let that interfere */
	if (!discoverable && mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
		return;

5137
	if (discoverable) {
5138
		changed = !test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
5139 5140
	} else {
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
5141
		changed = test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
5142 5143 5144 5145 5146 5147 5148 5149 5150 5151 5152 5153
	}

	if (changed) {
		struct hci_request req;

		/* In case this change in discoverable was triggered by
		 * a disabling of connectable there could be a need to
		 * update the advertising flags.
		 */
		hci_req_init(&req, hdev);
		update_adv_data(&req);
		hci_req_run(&req, NULL);
5154

5155
		new_settings(hdev, NULL);
5156
	}
5157
}
5158

5159
void mgmt_connectable(struct hci_dev *hdev, u8 connectable)
5160
{
5161
	bool changed;
5162

5163 5164 5165 5166 5167
	/* Nothing needed here if there's a pending command since that
	 * commands request completion callback takes care of everything
	 * necessary.
	 */
	if (mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev))
5168
		return;
5169

5170 5171 5172 5173
	/* Powering off may clear the scan mode - don't let that interfere */
	if (!connectable && mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
		return;

5174 5175 5176 5177
	if (connectable)
		changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
5178

5179
	if (changed)
5180
		new_settings(hdev, NULL);
5181
}
5182

5183 5184
void mgmt_advertising(struct hci_dev *hdev, u8 advertising)
{
5185 5186 5187 5188
	/* Powering off may stop advertising - don't let that interfere */
	if (!advertising && mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
		return;

5189 5190 5191 5192 5193 5194
	if (advertising)
		set_bit(HCI_ADVERTISING, &hdev->dev_flags);
	else
		clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
}

5195
void mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
5196
{
5197 5198
	u8 mgmt_err = mgmt_status(status);

5199
	if (scan & SCAN_PAGE)
5200
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
5201
				     cmd_status_rsp, &mgmt_err);
5202 5203

	if (scan & SCAN_INQUIRY)
5204
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
5205
				     cmd_status_rsp, &mgmt_err);
5206 5207
}

5208 5209
void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		       bool persistent)
5210
{
5211
	struct mgmt_ev_new_link_key ev;
5212

5213
	memset(&ev, 0, sizeof(ev));
5214

5215
	ev.store_hint = persistent;
5216
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
5217
	ev.key.addr.type = BDADDR_BREDR;
5218
	ev.key.type = key->type;
5219
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
5220
	ev.key.pin_len = key->pin_len;
5221

5222
	mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
5223
}
5224

5225
void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent)
5226 5227 5228 5229 5230
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

5231 5232 5233 5234 5235 5236 5237 5238 5239 5240 5241
	/* Devices using resolvable or non-resolvable random addresses
	 * without providing an indentity resolving key don't require
	 * to store long term keys. Their addresses will change the
	 * next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the long term key is stored. If the remote
	 * identity is known, the long term keys are internally
	 * mapped to the identity address. So allow static random
	 * and public addresses here.
	 */
5242 5243 5244 5245
	if (key->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (key->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
5246
		ev.store_hint = persistent;
5247

5248
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
5249
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
5250
	ev.key.type = key->authenticated;
5251 5252
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;
5253
	ev.key.rand = key->rand;
5254 5255 5256 5257 5258 5259

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.val, key->val, sizeof(key->val));

5260
	mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL);
5261 5262
}

5263 5264 5265 5266 5267 5268
void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk)
{
	struct mgmt_ev_new_irk ev;

	memset(&ev, 0, sizeof(ev));

5269 5270 5271 5272 5273 5274 5275 5276 5277 5278 5279 5280 5281 5282 5283 5284
	/* For identity resolving keys from devices that are already
	 * using a public address or static random address, do not
	 * ask for storing this key. The identity resolving key really
	 * is only mandatory for devices using resovlable random
	 * addresses.
	 *
	 * Storing all identity resolving keys has the downside that
	 * they will be also loaded on next boot of they system. More
	 * identity resolving keys, means more time during scanning is
	 * needed to actually resolve these addresses.
	 */
	if (bacmp(&irk->rpa, BDADDR_ANY))
		ev.store_hint = 0x01;
	else
		ev.store_hint = 0x00;

5285 5286 5287 5288 5289 5290 5291 5292
	bacpy(&ev.rpa, &irk->rpa);
	bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr);
	ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type);
	memcpy(ev.irk.val, irk->val, sizeof(irk->val));

	mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL);
}

5293 5294
void mgmt_new_csrk(struct hci_dev *hdev, struct smp_csrk *csrk,
		   bool persistent)
5295 5296 5297 5298 5299 5300 5301 5302 5303 5304 5305 5306 5307 5308 5309 5310 5311 5312
{
	struct mgmt_ev_new_csrk ev;

	memset(&ev, 0, sizeof(ev));

	/* Devices using resolvable or non-resolvable random addresses
	 * without providing an indentity resolving key don't require
	 * to store signature resolving keys. Their addresses will change
	 * the next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the signature resolving key is stored. So allow
	 * static random and public addresses here.
	 */
	if (csrk->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (csrk->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
5313
		ev.store_hint = persistent;
5314 5315 5316 5317 5318 5319 5320 5321 5322

	bacpy(&ev.key.addr.bdaddr, &csrk->bdaddr);
	ev.key.addr.type = link_to_bdaddr(LE_LINK, csrk->bdaddr_type);
	ev.key.master = csrk->master;
	memcpy(ev.key.val, csrk->val, sizeof(csrk->val));

	mgmt_event(MGMT_EV_NEW_CSRK, hdev, &ev, sizeof(ev), NULL);
}

5323 5324 5325 5326 5327 5328 5329 5330 5331 5332 5333
static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data,
				  u8 data_len)
{
	eir[eir_len++] = sizeof(type) + data_len;
	eir[eir_len++] = type;
	memcpy(&eir[eir_len], data, data_len);
	eir_len += data_len;

	return eir_len;
}

5334 5335 5336
void mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			   u8 addr_type, u32 flags, u8 *name, u8 name_len,
			   u8 *dev_class)
5337
{
5338 5339 5340
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
5341

5342
	bacpy(&ev->addr.bdaddr, bdaddr);
5343
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
5344

5345
	ev->flags = __cpu_to_le32(flags);
5346

5347 5348
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
5349
					  name, name_len);
5350 5351

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
5352
		eir_len = eir_append_data(ev->eir, eir_len,
5353
					  EIR_CLASS_OF_DEV, dev_class, 3);
5354

5355
	ev->eir_len = cpu_to_le16(eir_len);
5356

5357 5358
	mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
		    sizeof(*ev) + eir_len, NULL);
5359 5360
}

5361 5362
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
5363
	struct mgmt_cp_disconnect *cp = cmd->param;
5364
	struct sock **sk = data;
5365
	struct mgmt_rp_disconnect rp;
5366

5367 5368
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
5369

5370
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
5371
		     sizeof(rp));
5372 5373 5374 5375

	*sk = cmd->sk;
	sock_hold(*sk);

5376
	mgmt_pending_remove(cmd);
5377 5378
}

5379
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
5380
{
5381
	struct hci_dev *hdev = data;
5382 5383
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
5384 5385

	memset(&rp, 0, sizeof(rp));
5386 5387
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
5388

5389 5390
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

5391
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
5392 5393 5394 5395

	mgmt_pending_remove(cmd);
}

5396
void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
5397 5398
			      u8 link_type, u8 addr_type, u8 reason,
			      bool mgmt_connected)
5399
{
5400
	struct mgmt_ev_device_disconnected ev;
5401
	struct pending_cmd *power_off;
5402 5403
	struct sock *sk = NULL;

5404 5405 5406 5407 5408 5409 5410
	power_off = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (power_off) {
		struct mgmt_mode *cp = power_off->param;

		/* The connection is still in hci_conn_hash so test for 1
		 * instead of 0 to know if this is the last one.
		 */
5411 5412
		if (!cp->val && hci_conn_count(hdev) == 1) {
			cancel_delayed_work(&hdev->power_off);
5413
			queue_work(hdev->req_workqueue, &hdev->power_off.work);
5414
		}
5415 5416
	}

5417 5418 5419
	if (!mgmt_connected)
		return;

5420 5421 5422
	if (link_type != ACL_LINK && link_type != LE_LINK)
		return;

5423
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
5424

5425 5426 5427
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
5428

5429
	mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
5430 5431

	if (sk)
5432
		sock_put(sk);
5433

5434
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
5435
			     hdev);
5436 5437
}

5438 5439
void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
			    u8 link_type, u8 addr_type, u8 status)
5440
{
5441 5442
	u8 bdaddr_type = link_to_bdaddr(link_type, addr_type);
	struct mgmt_cp_disconnect *cp;
5443
	struct mgmt_rp_disconnect rp;
5444 5445
	struct pending_cmd *cmd;

5446 5447 5448
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

5449
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
5450
	if (!cmd)
5451
		return;
5452

5453 5454 5455 5456 5457 5458 5459 5460
	cp = cmd->param;

	if (bacmp(bdaddr, &cp->addr.bdaddr))
		return;

	if (cp->addr.type != bdaddr_type)
		return;

5461
	bacpy(&rp.addr.bdaddr, bdaddr);
5462
	rp.addr.type = bdaddr_type;
5463

5464 5465
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
		     mgmt_status(status), &rp, sizeof(rp));
5466

5467
	mgmt_pending_remove(cmd);
5468
}
5469

5470 5471
void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			 u8 addr_type, u8 status)
5472 5473
{
	struct mgmt_ev_connect_failed ev;
5474 5475 5476 5477 5478 5479 5480 5481 5482
	struct pending_cmd *power_off;

	power_off = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (power_off) {
		struct mgmt_mode *cp = power_off->param;

		/* The connection is still in hci_conn_hash so test for 1
		 * instead of 0 to know if this is the last one.
		 */
5483 5484
		if (!cp->val && hci_conn_count(hdev) == 1) {
			cancel_delayed_work(&hdev->power_off);
5485
			queue_work(hdev->req_workqueue, &hdev->power_off.work);
5486
		}
5487
	}
5488

5489
	bacpy(&ev.addr.bdaddr, bdaddr);
5490
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5491
	ev.status = mgmt_status(status);
5492

5493
	mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
5494
}
5495

5496
void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
5497 5498 5499
{
	struct mgmt_ev_pin_code_request ev;

5500
	bacpy(&ev.addr.bdaddr, bdaddr);
5501
	ev.addr.type = BDADDR_BREDR;
5502
	ev.secure = secure;
5503

5504
	mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL);
5505 5506
}

5507 5508
void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				  u8 status)
5509 5510
{
	struct pending_cmd *cmd;
5511
	struct mgmt_rp_pin_code_reply rp;
5512

5513
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
5514
	if (!cmd)
5515
		return;
5516

5517
	bacpy(&rp.addr.bdaddr, bdaddr);
5518
	rp.addr.type = BDADDR_BREDR;
5519

5520 5521
	cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
		     mgmt_status(status), &rp, sizeof(rp));
5522

5523
	mgmt_pending_remove(cmd);
5524 5525
}

5526 5527
void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				      u8 status)
5528 5529
{
	struct pending_cmd *cmd;
5530
	struct mgmt_rp_pin_code_reply rp;
5531

5532
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
5533
	if (!cmd)
5534
		return;
5535

5536
	bacpy(&rp.addr.bdaddr, bdaddr);
5537
	rp.addr.type = BDADDR_BREDR;
5538

5539 5540
	cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
		     mgmt_status(status), &rp, sizeof(rp));
5541

5542
	mgmt_pending_remove(cmd);
5543
}
5544

5545
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
5546
			      u8 link_type, u8 addr_type, u32 value,
5547
			      u8 confirm_hint)
5548 5549 5550
{
	struct mgmt_ev_user_confirm_request ev;

5551
	BT_DBG("%s", hdev->name);
5552

5553
	bacpy(&ev.addr.bdaddr, bdaddr);
5554
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5555
	ev.confirm_hint = confirm_hint;
5556
	ev.value = cpu_to_le32(value);
5557

5558
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
5559
			  NULL);
5560 5561
}

5562
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
5563
			      u8 link_type, u8 addr_type)
5564 5565 5566 5567 5568
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

5569
	bacpy(&ev.addr.bdaddr, bdaddr);
5570
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5571 5572

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
5573
			  NULL);
5574 5575
}

5576
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5577 5578
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
5579 5580 5581 5582 5583
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

5584
	cmd = mgmt_pending_find(opcode, hdev);
5585 5586 5587
	if (!cmd)
		return -ENOENT;

5588
	bacpy(&rp.addr.bdaddr, bdaddr);
5589
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
5590
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
5591
			   &rp, sizeof(rp));
5592

5593
	mgmt_pending_remove(cmd);
5594 5595 5596 5597

	return err;
}

5598
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5599
				     u8 link_type, u8 addr_type, u8 status)
5600
{
5601
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5602
					  status, MGMT_OP_USER_CONFIRM_REPLY);
5603 5604
}

5605
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5606
					 u8 link_type, u8 addr_type, u8 status)
5607
{
5608
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5609 5610
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
5611
}
5612

5613
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5614
				     u8 link_type, u8 addr_type, u8 status)
5615
{
5616
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5617
					  status, MGMT_OP_USER_PASSKEY_REPLY);
5618 5619
}

5620
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5621
					 u8 link_type, u8 addr_type, u8 status)
5622
{
5623
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5624 5625
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
5626 5627
}

5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

5644 5645
void mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, u8 status)
5646 5647 5648
{
	struct mgmt_ev_auth_failed ev;

5649
	bacpy(&ev.addr.bdaddr, bdaddr);
5650
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5651
	ev.status = mgmt_status(status);
5652

5653
	mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
5654
}
5655

5656
void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
5657 5658
{
	struct cmd_lookup match = { NULL, hdev };
5659
	bool changed;
5660 5661 5662 5663

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
5664
				     cmd_status_rsp, &mgmt_err);
5665
		return;
5666 5667
	}

5668 5669 5670 5671 5672 5673
	if (test_bit(HCI_AUTH, &hdev->flags))
		changed = !test_and_set_bit(HCI_LINK_SECURITY,
					    &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_LINK_SECURITY,
					     &hdev->dev_flags);
5674

5675
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
5676
			     &match);
5677

5678
	if (changed)
5679
		new_settings(hdev, match.sk);
5680 5681 5682 5683 5684

	if (match.sk)
		sock_put(match.sk);
}

5685
static void clear_eir(struct hci_request *req)
5686
{
5687
	struct hci_dev *hdev = req->hdev;
5688 5689
	struct hci_cp_write_eir cp;

5690
	if (!lmp_ext_inq_capable(hdev))
5691
		return;
5692

5693 5694
	memset(hdev->eir, 0, sizeof(hdev->eir));

5695 5696
	memset(&cp, 0, sizeof(cp));

5697
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
5698 5699
}

5700
void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
5701 5702
{
	struct cmd_lookup match = { NULL, hdev };
5703
	struct hci_request req;
5704
	bool changed = false;
5705 5706 5707

	if (status) {
		u8 mgmt_err = mgmt_status(status);
5708 5709

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
5710 5711
						 &hdev->dev_flags)) {
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
5712
			new_settings(hdev, NULL);
5713
		}
5714

5715 5716
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
5717
		return;
5718 5719 5720
	}

	if (enable) {
5721
		changed = !test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
5722
	} else {
5723 5724 5725 5726 5727 5728
		changed = test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
		if (!changed)
			changed = test_and_clear_bit(HCI_HS_ENABLED,
						     &hdev->dev_flags);
		else
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
5729 5730 5731 5732
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

5733
	if (changed)
5734
		new_settings(hdev, match.sk);
5735

5736
	if (match.sk)
5737 5738
		sock_put(match.sk);

5739 5740
	hci_req_init(&req, hdev);

5741
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
5742
		update_eir(&req);
5743
	else
5744 5745 5746
		clear_eir(&req);

	hci_req_run(&req, NULL);
5747 5748
}

5749 5750 5751 5752 5753 5754 5755 5756
void mgmt_sc_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

5757 5758 5759 5760 5761 5762
		if (enable) {
			if (test_and_clear_bit(HCI_SC_ENABLED,
					       &hdev->dev_flags))
				new_settings(hdev, NULL);
			clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		}
5763 5764 5765 5766 5767 5768

		mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

5769
	if (enable) {
5770
		changed = !test_and_set_bit(HCI_SC_ENABLED, &hdev->dev_flags);
5771
	} else {
5772
		changed = test_and_clear_bit(HCI_SC_ENABLED, &hdev->dev_flags);
5773 5774
		clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
	}
5775 5776 5777 5778 5779 5780 5781 5782 5783 5784 5785

	mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
			     settings_rsp, &match);

	if (changed)
		new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

5786
static void sk_lookup(struct pending_cmd *cmd, void *data)
5787 5788 5789 5790 5791 5792 5793 5794 5795
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

5796 5797
void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
				    u8 status)
5798
{
5799
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
5800

5801 5802 5803
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
5804 5805

	if (!status)
5806 5807
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class, 3,
			   NULL);
5808 5809 5810

	if (match.sk)
		sock_put(match.sk);
5811 5812
}

5813
void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
5814 5815
{
	struct mgmt_cp_set_local_name ev;
5816
	struct pending_cmd *cmd;
5817

5818
	if (status)
5819
		return;
5820 5821 5822

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
5823
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
5824

5825
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
5826 5827
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
5828

5829 5830 5831 5832
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
5833
			return;
5834
	}
5835

5836 5837
	mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
		   cmd ? cmd->sk : NULL);
5838
}
5839

5840 5841 5842
void mgmt_read_local_oob_data_complete(struct hci_dev *hdev, u8 *hash192,
				       u8 *randomizer192, u8 *hash256,
				       u8 *randomizer256, u8 status)
5843 5844 5845
{
	struct pending_cmd *cmd;

5846
	BT_DBG("%s status %u", hdev->name, status);
5847

5848
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
5849
	if (!cmd)
5850
		return;
5851 5852

	if (status) {
5853 5854
		cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
			   mgmt_status(status));
5855
	} else {
5856 5857 5858 5859 5860 5861 5862
		if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
		    hash256 && randomizer256) {
			struct mgmt_rp_read_local_oob_ext_data rp;

			memcpy(rp.hash192, hash192, sizeof(rp.hash192));
			memcpy(rp.randomizer192, randomizer192,
			       sizeof(rp.randomizer192));
5863

5864 5865 5866
			memcpy(rp.hash256, hash256, sizeof(rp.hash256));
			memcpy(rp.randomizer256, randomizer256,
			       sizeof(rp.randomizer256));
5867

5868 5869 5870 5871 5872 5873 5874 5875 5876 5877 5878 5879 5880 5881
			cmd_complete(cmd->sk, hdev->id,
				     MGMT_OP_READ_LOCAL_OOB_DATA, 0,
				     &rp, sizeof(rp));
		} else {
			struct mgmt_rp_read_local_oob_data rp;

			memcpy(rp.hash, hash192, sizeof(rp.hash));
			memcpy(rp.randomizer, randomizer192,
			       sizeof(rp.randomizer));

			cmd_complete(cmd->sk, hdev->id,
				     MGMT_OP_READ_LOCAL_OOB_DATA, 0,
				     &rp, sizeof(rp));
		}
5882 5883 5884 5885
	}

	mgmt_pending_remove(cmd);
}
5886

5887
void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
5888 5889
		       u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name,
		       u8 ssp, u8 *eir, u16 eir_len, u8 *scan_rsp,
5890
		       u8 scan_rsp_len)
5891
{
5892 5893
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
5894
	struct smp_irk *irk;
5895
	size_t ev_size;
5896

5897
	if (!hci_discovery_active(hdev))
5898
		return;
5899

5900 5901 5902 5903
	/* Make sure that the buffer is big enough. The 5 extra bytes
	 * are for the potential CoD field.
	 */
	if (sizeof(*ev) + eir_len + scan_rsp_len + 5 > sizeof(buf))
5904
		return;
5905

5906 5907
	memset(buf, 0, sizeof(buf));

5908 5909 5910 5911 5912 5913 5914 5915 5916
	irk = hci_get_irk(hdev, bdaddr, addr_type);
	if (irk) {
		bacpy(&ev->addr.bdaddr, &irk->bdaddr);
		ev->addr.type = link_to_bdaddr(link_type, irk->addr_type);
	} else {
		bacpy(&ev->addr.bdaddr, bdaddr);
		ev->addr.type = link_to_bdaddr(link_type, addr_type);
	}

5917
	ev->rssi = rssi;
5918
	if (cfm_name)
5919
		ev->flags |= cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
5920
	if (!ssp)
5921
		ev->flags |= cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
5922

5923
	if (eir_len > 0)
5924
		memcpy(ev->eir, eir, eir_len);
5925

5926 5927
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
5928
					  dev_class, 3);
5929

5930 5931 5932 5933 5934
	if (scan_rsp_len > 0)
		memcpy(ev->eir + eir_len, scan_rsp, scan_rsp_len);

	ev->eir_len = cpu_to_le16(eir_len + scan_rsp_len);
	ev_size = sizeof(*ev) + eir_len + scan_rsp_len;
5935

5936
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
5937
}
5938

5939 5940
void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, s8 rssi, u8 *name, u8 name_len)
5941
{
5942 5943 5944
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
5945

5946
	ev = (struct mgmt_ev_device_found *) buf;
5947

5948 5949 5950
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
5951
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
5952 5953 5954
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
5955
				  name_len);
5956

5957
	ev->eir_len = cpu_to_le16(eir_len);
5958

5959
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL);
5960
}
5961

5962
void mgmt_discovering(struct hci_dev *hdev, u8 discovering)
5963
{
5964
	struct mgmt_ev_discovering ev;
5965 5966
	struct pending_cmd *cmd;

5967 5968
	BT_DBG("%s discovering %u", hdev->name, discovering);

5969
	if (discovering)
5970
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
5971
	else
5972
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
5973 5974

	if (cmd != NULL) {
5975 5976
		u8 type = hdev->discovery.type;

5977 5978
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
5979 5980 5981
		mgmt_pending_remove(cmd);
	}

5982 5983 5984 5985
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

5986
	mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
5987
}
5988

5989
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
5990 5991 5992 5993
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

5994
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
5995

5996 5997
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
5998

5999
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
6000
			  cmd ? cmd->sk : NULL);
6001 6002
}

6003
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
6004 6005 6006 6007
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

6008
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
6009

6010 6011
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
6012

6013
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
6014
			  cmd ? cmd->sk : NULL);
6015
}
6016 6017 6018 6019 6020 6021 6022 6023

static void adv_enable_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("%s status %u", hdev->name, status);

	/* Clear the advertising mgmt setting if we failed to re-enable it */
	if (status) {
		clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
6024
		new_settings(hdev, NULL);
6025 6026 6027 6028 6029 6030 6031
	}
}

void mgmt_reenable_advertising(struct hci_dev *hdev)
{
	struct hci_request req;

6032
	if (hci_conn_num(hdev, LE_LINK) > 0)
6033 6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044 6045
		return;

	if (!test_bit(HCI_ADVERTISING, &hdev->dev_flags))
		return;

	hci_req_init(&req, hdev);
	enable_advertising(&req);

	/* If this fails we have no option but to let user space know
	 * that we've disabled advertising.
	 */
	if (hci_req_run(&req, adv_enable_complete) < 0) {
		clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
6046
		new_settings(hdev, NULL);
6047 6048
	}
}