mgmt.c 84.7 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36
bool enable_hs;

37
#define MGMT_VERSION	1
38
#define MGMT_REVISION	2
39

40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
78
	MGMT_OP_SET_DEVICE_ID,
79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
102
	MGMT_EV_PASSKEY_NOTIFY,
103 104
};

105 106 107 108 109 110 111 112
/*
 * These LE scan and inquiry parameters were chosen according to LE General
 * Discovery Procedure specification.
 */
#define LE_SCAN_TYPE			0x01
#define LE_SCAN_WIN			0x12
#define LE_SCAN_INT			0x12
#define LE_SCAN_TIMEOUT_LE_ONLY		10240	/* TGAP(gen_disc_scan_min) */
113
#define LE_SCAN_TIMEOUT_BREDR_LE	5120	/* TGAP(100)/2 */
114

A
Andre Guedes 已提交
115
#define INQUIRY_LEN_BREDR		0x08	/* TGAP(100) */
116
#define INQUIRY_LEN_BREDR_LE		0x04	/* TGAP(100)/2 */
A
Andre Guedes 已提交
117

118
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
119

120 121 122
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

123 124
struct pending_cmd {
	struct list_head list;
125
	u16 opcode;
126
	int index;
127
	void *param;
128
	struct sock *sk;
129
	void *user_data;
130 131
};

132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

197 198 199 200 201
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

202 203 204 205 206 207 208 209
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

210
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
211 212 213 214
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
215
	int err;
216

217
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
218

219
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
220 221 222 223 224 225
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
226
	hdr->index = cpu_to_le16(index);
227 228 229 230
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
231
	ev->opcode = cpu_to_le16(cmd);
232

233 234
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
235 236
		kfree_skb(skb);

237
	return err;
238 239
}

240
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
241
			void *rp, size_t rp_len)
242 243 244 245
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
246
	int err;
247 248 249

	BT_DBG("sock %p", sk);

250
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
251 252 253 254 255
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

256
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
257
	hdr->index = cpu_to_le16(index);
258
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
259

260
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
261
	ev->opcode = cpu_to_le16(cmd);
262
	ev->status = status;
263 264 265

	if (rp)
		memcpy(ev->data, rp, rp_len);
266

267 268
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
269 270
		kfree_skb(skb);

271
	return err;
272 273
}

274 275
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
276 277 278 279 280 281
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
282
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
283

284
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
285
			    sizeof(rp));
286 287
}

288 289
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
290 291
{
	struct mgmt_rp_read_commands *rp;
292 293
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
294
	__le16 *opcode;
295 296 297 298 299 300 301 302 303 304 305
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

306 307
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
308 309 310 311 312 313 314

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

315
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
316
			   rp_size);
317 318 319 320 321
	kfree(rp);

	return err;
}

322 323
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
324 325
{
	struct mgmt_rp_read_index_list *rp;
326
	struct hci_dev *d;
327
	size_t rp_len;
328
	u16 count;
329
	int i, err;
330 331 332 333 334 335

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
336 337 338 339
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

340 341 342
		count++;
	}

343 344 345
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
346
		read_unlock(&hci_dev_list_lock);
347
		return -ENOMEM;
348
	}
349

350
	rp->num_controllers = cpu_to_le16(count);
351 352

	i = 0;
353
	list_for_each_entry(d, &hci_dev_list, list) {
354
		if (test_bit(HCI_SETUP, &d->dev_flags))
355 356
			continue;

357 358 359
		if (!mgmt_valid_hdev(d))
			continue;

360
		rp->index[i++] = cpu_to_le16(d->id);
361 362 363 364 365
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

366
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
367
			   rp_len);
368

369 370 371
	kfree(rp);

	return err;
372 373
}

374 375 376 377 378 379 380
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

381
	if (lmp_ssp_capable(hdev))
382 383
		settings |= MGMT_SETTING_SSP;

384
	if (lmp_bredr_capable(hdev)) {
385 386 387
		settings |= MGMT_SETTING_CONNECTABLE;
		settings |= MGMT_SETTING_FAST_CONNECTABLE;
		settings |= MGMT_SETTING_DISCOVERABLE;
388 389 390 391
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

392 393 394
	if (enable_hs)
		settings |= MGMT_SETTING_HS;

395
	if (lmp_le_capable(hdev))
396
		settings |= MGMT_SETTING_LE;
397 398 399 400 401 402 403 404

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

405
	if (hdev_is_powered(hdev))
406 407
		settings |= MGMT_SETTING_POWERED;

408
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
409 410
		settings |= MGMT_SETTING_CONNECTABLE;

411
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
412 413
		settings |= MGMT_SETTING_DISCOVERABLE;

414
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
415 416
		settings |= MGMT_SETTING_PAIRABLE;

417
	if (lmp_bredr_capable(hdev))
418 419
		settings |= MGMT_SETTING_BREDR;

420
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
421 422
		settings |= MGMT_SETTING_LE;

423
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
424 425
		settings |= MGMT_SETTING_LINK_SECURITY;

426
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
427 428
		settings |= MGMT_SETTING_SSP;

429 430 431
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

432 433 434
	return settings;
}

435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451
#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

452
	val = get_unaligned_le32(&uuid128[12]);
453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

487 488 489 490 491 492 493 494 495
	if (hdev->inq_tx_power) {
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		eir_len += 3;
		ptr += 3;
	}

496 497 498 499 500 501 502 503 504 505 506 507 508
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		eir_len += 10;
		ptr += 10;
	}

509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564
	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

565
	if (!hdev_is_powered(hdev))
566 567
		return 0;

568
	if (!lmp_ext_inq_capable(hdev))
569 570
		return 0;

571
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
572 573
		return 0;

574
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];
603
	int err;
604 605 606

	BT_DBG("%s", hdev->name);

607
	if (!hdev_is_powered(hdev))
608 609
		return 0;

610
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
611 612 613 614 615 616 617 618 619
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

620 621 622 623 624
	err = hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
	if (err == 0)
		set_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

	return err;
625 626
}

627 628 629
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
630
					    service_cache.work);
631

632
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
633 634 635 636 637 638 639 640 641 642
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

643
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
644
{
645
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
646 647
		return;

648
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
649

650 651 652 653 654 655
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
656 657
}

658
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
659
				void *data, u16 data_len)
660
{
661
	struct mgmt_rp_read_info rp;
662

663
	BT_DBG("sock %p %s", sk, hdev->name);
664

665
	hci_dev_lock(hdev);
666

667 668
	memset(&rp, 0, sizeof(rp));

669
	bacpy(&rp.bdaddr, &hdev->bdaddr);
670

671
	rp.version = hdev->hci_ver;
672
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
673 674 675

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
676

677
	memcpy(rp.dev_class, hdev->dev_class, 3);
678

679
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
680
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
681

682
	hci_dev_unlock(hdev);
683

684
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
685
			    sizeof(rp));
686 687
}

688 689 690
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
691
	kfree(cmd->param);
692 693 694
	kfree(cmd);
}

695
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
696 697
					    struct hci_dev *hdev, void *data,
					    u16 len)
698 699 700
{
	struct pending_cmd *cmd;

701
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
702
	if (!cmd)
703
		return NULL;
704 705

	cmd->opcode = opcode;
706
	cmd->index = hdev->id;
707

708
	cmd->param = kmalloc(len, GFP_KERNEL);
709
	if (!cmd->param) {
710
		kfree(cmd);
711
		return NULL;
712 713
	}

714 715
	if (data)
		memcpy(cmd->param, data, len);
716 717 718 719

	cmd->sk = sk;
	sock_hold(sk);

720
	list_add(&cmd->list, &hdev->mgmt_pending);
721

722
	return cmd;
723 724
}

725
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
726 727
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
728
				 void *data)
729 730 731
{
	struct list_head *p, *n;

732
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
733 734 735 736
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

737
		if (opcode > 0 && cmd->opcode != opcode)
738 739 740 741 742 743
			continue;

		cb(cmd, data);
	}
}

744
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
745
{
746
	struct pending_cmd *cmd;
747

748
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
749 750
		if (cmd->opcode == opcode)
			return cmd;
751 752 753 754 755
	}

	return NULL;
}

756
static void mgmt_pending_remove(struct pending_cmd *cmd)
757 758 759 760 761
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

762
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
763
{
764
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
765

766
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
767
			    sizeof(settings));
768 769
}

770
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
771
		       u16 len)
772
{
773
	struct mgmt_mode *cp = data;
774
	struct pending_cmd *cmd;
775
	int err;
776

777
	BT_DBG("request for %s", hdev->name);
778

779
	hci_dev_lock(hdev);
780

781 782 783 784 785 786 787 788 789 790
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
			err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
			mgmt_powered(hdev, 1);
			goto failed;
		}
	}

791
	if (!!cp->val == hdev_is_powered(hdev)) {
792
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
793 794 795
		goto failed;
	}

796
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
797
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
798
				 MGMT_STATUS_BUSY);
799 800 801
		goto failed;
	}

802
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
803 804
	if (!cmd) {
		err = -ENOMEM;
805
		goto failed;
806
	}
807

808
	if (cp->val)
809
		schedule_work(&hdev->power_on);
810
	else
811
		schedule_work(&hdev->power_off.work);
812

813
	err = 0;
814 815

failed:
816
	hci_dev_unlock(hdev);
817
	return err;
818 819
}

820 821
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
822 823 824 825
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

826
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
827 828 829 830 831 832 833 834 835 836 837 838 839 840
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

841 842 843
	/* Time stamp */
	__net_timestamp(skb);

844 845 846 847 848 849 850 851 852 853 854 855 856 857 858
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

859
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
860
			    u16 len)
861
{
862
	struct mgmt_cp_set_discoverable *cp = data;
863
	struct pending_cmd *cmd;
864
	u16 timeout;
865 866 867
	u8 scan;
	int err;

868
	BT_DBG("request for %s", hdev->name);
869

870 871 872 873
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				 MGMT_STATUS_NOT_SUPPORTED);

874
	timeout = __le16_to_cpu(cp->timeout);
875
	if (!cp->val && timeout > 0)
876
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
877
				  MGMT_STATUS_INVALID_PARAMS);
878

879
	hci_dev_lock(hdev);
880

881
	if (!hdev_is_powered(hdev) && timeout > 0) {
882
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
883
				 MGMT_STATUS_NOT_POWERED);
884 885 886
		goto failed;
	}

887
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
888
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
889
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
890
				 MGMT_STATUS_BUSY);
891 892 893
		goto failed;
	}

894
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
895
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
896
				 MGMT_STATUS_REJECTED);
897 898 899 900
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
901 902 903 904 905 906 907
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

908
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
909 910 911 912 913 914
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

915 916 917 918
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
919 920 921 922 923 924 925 926 927 928 929
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

930
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
931 932 933
		goto failed;
	}

934
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
935 936
	if (!cmd) {
		err = -ENOMEM;
937
		goto failed;
938
	}
939 940 941

	scan = SCAN_PAGE;

942
	if (cp->val)
943
		scan |= SCAN_INQUIRY;
944
	else
945
		cancel_delayed_work(&hdev->discov_off);
946 947 948

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
949
		mgmt_pending_remove(cmd);
950

951
	if (cp->val)
952
		hdev->discov_timeout = timeout;
953

954
failed:
955
	hci_dev_unlock(hdev);
956 957 958
	return err;
}

959
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
960
			   u16 len)
961
{
962
	struct mgmt_mode *cp = data;
963
	struct pending_cmd *cmd;
964 965 966
	u8 scan;
	int err;

967
	BT_DBG("request for %s", hdev->name);
968

969 970 971 972
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

973
	hci_dev_lock(hdev);
974

975
	if (!hdev_is_powered(hdev)) {
976 977 978 979 980
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

981
		if (cp->val) {
982
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
983
		} else {
984 985 986
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
987

988
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
989 990 991 992 993 994
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

995 996 997
		goto failed;
	}

998
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
999
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1000
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1001
				 MGMT_STATUS_BUSY);
1002 1003 1004
		goto failed;
	}

1005
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1006
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1007 1008 1009
		goto failed;
	}

1010
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1011 1012
	if (!cmd) {
		err = -ENOMEM;
1013
		goto failed;
1014
	}
1015

1016
	if (cp->val) {
1017
		scan = SCAN_PAGE;
1018
	} else {
1019 1020
		scan = 0;

1021
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1022
		    hdev->discov_timeout > 0)
1023 1024 1025
			cancel_delayed_work(&hdev->discov_off);
	}

1026 1027
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1028
		mgmt_pending_remove(cmd);
1029 1030

failed:
1031
	hci_dev_unlock(hdev);
1032 1033 1034
	return err;
}

1035
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1036
			u16 len)
1037
{
1038
	struct mgmt_mode *cp = data;
1039 1040
	int err;

1041
	BT_DBG("request for %s", hdev->name);
1042

1043
	hci_dev_lock(hdev);
1044 1045

	if (cp->val)
1046
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1047
	else
1048
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1049

1050
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1051 1052 1053
	if (err < 0)
		goto failed;

1054
	err = new_settings(hdev, sk);
1055 1056

failed:
1057
	hci_dev_unlock(hdev);
1058 1059 1060
	return err;
}

1061 1062
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1063 1064 1065
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1066
	u8 val;
1067 1068
	int err;

1069
	BT_DBG("request for %s", hdev->name);
1070

1071 1072 1073 1074
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_NOT_SUPPORTED);

1075 1076
	hci_dev_lock(hdev);

1077
	if (!hdev_is_powered(hdev)) {
1078 1079 1080
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1081
					  &hdev->dev_flags)) {
1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1093 1094 1095 1096
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1097
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1098
				 MGMT_STATUS_BUSY);
1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1126
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1127 1128 1129
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1130
	u8 val;
1131 1132
	int err;

1133
	BT_DBG("request for %s", hdev->name);
1134 1135 1136

	hci_dev_lock(hdev);

1137
	if (!lmp_ssp_capable(hdev)) {
1138
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1139
				 MGMT_STATUS_NOT_SUPPORTED);
1140 1141 1142
		goto failed;
	}

1143 1144
	val = !!cp->val;

1145
	if (!hdev_is_powered(hdev)) {
1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1160 1161 1162 1163
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1164 1165
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1191
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1192 1193 1194
{
	struct mgmt_mode *cp = data;

1195
	BT_DBG("request for %s", hdev->name);
1196

1197 1198
	if (!enable_hs)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1199
				  MGMT_STATUS_NOT_SUPPORTED);
1200 1201 1202 1203 1204 1205

	if (cp->val)
		set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
	else
		clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);

1206
	return send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1207 1208
}

1209
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1210 1211 1212 1213 1214
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
	int err;
1215
	u8 val, enabled;
1216

1217
	BT_DBG("request for %s", hdev->name);
1218

1219 1220
	hci_dev_lock(hdev);

1221
	if (!lmp_le_capable(hdev)) {
1222
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1223
				 MGMT_STATUS_NOT_SUPPORTED);
1224
		goto unlock;
1225 1226 1227
	}

	val = !!cp->val;
1228
	enabled = !!lmp_host_le_capable(hdev);
1229

1230
	if (!hdev_is_powered(hdev) || val == enabled) {
1231 1232 1233 1234 1235 1236 1237 1238 1239
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1240
			goto unlock;
1241 1242 1243 1244

		if (changed)
			err = new_settings(hdev, sk);

1245
		goto unlock;
1246 1247 1248
	}

	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
1249
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1250
				 MGMT_STATUS_BUSY);
1251
		goto unlock;
1252 1253 1254 1255 1256
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1257
		goto unlock;
1258 1259 1260 1261 1262 1263
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1264
		hci_cp.simul = !!lmp_le_br_capable(hdev);
1265 1266
	}

1267 1268
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
			   &hci_cp);
1269
	if (err < 0)
1270 1271
		mgmt_pending_remove(cmd);

1272 1273
unlock:
	hci_dev_unlock(hdev);
1274 1275 1276
	return err;
}

1277
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1278
{
1279
	struct mgmt_cp_add_uuid *cp = data;
1280
	struct pending_cmd *cmd;
1281 1282 1283
	struct bt_uuid *uuid;
	int err;

1284
	BT_DBG("request for %s", hdev->name);
1285

1286
	hci_dev_lock(hdev);
1287

1288
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1289
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1290
				 MGMT_STATUS_BUSY);
1291 1292 1293
		goto failed;
	}

1294
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1295 1296 1297 1298 1299 1300
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1301
	uuid->svc_hint = cp->svc_hint;
1302 1303 1304

	list_add(&uuid->list, &hdev->uuids);

1305 1306 1307 1308
	err = update_class(hdev);
	if (err < 0)
		goto failed;

1309 1310 1311 1312
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

1313
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1314
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1315
				   hdev->dev_class, 3);
1316 1317 1318 1319
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1320
	if (!cmd)
1321
		err = -ENOMEM;
1322 1323

failed:
1324
	hci_dev_unlock(hdev);
1325 1326 1327
	return err;
}

1328 1329 1330 1331 1332 1333
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1334
		schedule_delayed_work(&hdev->service_cache, CACHE_TIMEOUT);
1335 1336 1337 1338 1339 1340
		return true;
	}

	return false;
}

1341
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1342
		       u16 len)
1343
{
1344
	struct mgmt_cp_remove_uuid *cp = data;
1345
	struct pending_cmd *cmd;
1346 1347 1348 1349
	struct list_head *p, *n;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

1350
	BT_DBG("request for %s", hdev->name);
1351

1352
	hci_dev_lock(hdev);
1353

1354
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1355
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1356
				 MGMT_STATUS_BUSY);
1357 1358 1359
		goto unlock;
	}

1360 1361
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1362

1363
		if (enable_service_cache(hdev)) {
1364
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1365
					   0, hdev->dev_class, 3);
1366 1367
			goto unlock;
		}
1368

1369
		goto update_class;
1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
1385
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1386
				 MGMT_STATUS_INVALID_PARAMS);
1387 1388 1389
		goto unlock;
	}

1390
update_class:
1391 1392 1393 1394
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

1395 1396 1397 1398
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

1399
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1400
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1401
				   hdev->dev_class, 3);
1402 1403 1404 1405
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1406
	if (!cmd)
1407
		err = -ENOMEM;
1408 1409

unlock:
1410
	hci_dev_unlock(hdev);
1411 1412 1413
	return err;
}

1414
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1415
			 u16 len)
1416
{
1417
	struct mgmt_cp_set_dev_class *cp = data;
1418
	struct pending_cmd *cmd;
1419 1420
	int err;

1421
	BT_DBG("request for %s", hdev->name);
1422

1423
	hci_dev_lock(hdev);
1424

1425
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1426
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
1427
				 MGMT_STATUS_BUSY);
1428 1429 1430
		goto unlock;
	}

1431 1432 1433
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1434
	if (!hdev_is_powered(hdev)) {
1435
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1436
				   hdev->dev_class, 3);
1437 1438 1439
		goto unlock;
	}

1440
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1441 1442 1443
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1444
		update_eir(hdev);
1445
	}
1446

1447
	err = update_class(hdev);
1448 1449
	if (err < 0)
		goto unlock;
1450

1451
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1452
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1453
				   hdev->dev_class, 3);
1454 1455 1456 1457
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1458
	if (!cmd)
1459
		err = -ENOMEM;
1460

1461
unlock:
1462
	hci_dev_unlock(hdev);
1463 1464 1465
	return err;
}

1466
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1467
			  u16 len)
1468
{
1469
	struct mgmt_cp_load_link_keys *cp = data;
1470
	u16 key_count, expected_len;
1471
	int i;
1472

1473
	key_count = __le16_to_cpu(cp->key_count);
1474

1475 1476
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1477
	if (expected_len != len) {
1478
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1479
		       len, expected_len);
1480
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1481
				  MGMT_STATUS_INVALID_PARAMS);
1482 1483
	}

1484
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1485
	       key_count);
1486

1487
	hci_dev_lock(hdev);
1488 1489 1490

	hci_link_keys_clear(hdev);

1491
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1492 1493

	if (cp->debug_keys)
1494
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1495
	else
1496
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1497

1498
	for (i = 0; i < key_count; i++) {
1499
		struct mgmt_link_key_info *key = &cp->keys[i];
1500

1501
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1502
				 key->type, key->pin_len);
1503 1504
	}

1505
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1506

1507
	hci_dev_unlock(hdev);
1508

1509
	return 0;
1510 1511
}

1512
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1513
			   u8 addr_type, struct sock *skip_sk)
1514 1515 1516 1517 1518 1519 1520
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1521
			  skip_sk);
1522 1523
}

1524
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1525
			 u16 len)
1526
{
1527 1528
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1529 1530
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1531 1532 1533
	struct hci_conn *conn;
	int err;

1534
	hci_dev_lock(hdev);
1535

1536
	memset(&rp, 0, sizeof(rp));
1537 1538
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1539

1540
	if (!hdev_is_powered(hdev)) {
1541
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1542
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1543 1544 1545
		goto unlock;
	}

1546
	if (cp->addr.type == BDADDR_BREDR)
1547 1548 1549
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1550

1551
	if (err < 0) {
1552
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1553
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1554 1555 1556
		goto unlock;
	}

1557
	if (cp->disconnect) {
1558
		if (cp->addr.type == BDADDR_BREDR)
1559
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1560
						       &cp->addr.bdaddr);
1561 1562
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1563
						       &cp->addr.bdaddr);
1564 1565 1566
	} else {
		conn = NULL;
	}
1567

1568
	if (!conn) {
1569
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1570
				   &rp, sizeof(rp));
1571
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1572 1573
		goto unlock;
	}
1574

1575
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1576
			       sizeof(*cp));
1577 1578 1579
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1580 1581
	}

1582
	dc.handle = cpu_to_le16(conn->handle);
1583 1584 1585 1586 1587
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1588
unlock:
1589
	hci_dev_unlock(hdev);
1590 1591 1592
	return err;
}

1593
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1594
		      u16 len)
1595
{
1596
	struct mgmt_cp_disconnect *cp = data;
1597
	struct hci_cp_disconnect dc;
1598
	struct pending_cmd *cmd;
1599 1600 1601 1602 1603
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1604
	hci_dev_lock(hdev);
1605 1606

	if (!test_bit(HCI_UP, &hdev->flags)) {
1607
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1608
				 MGMT_STATUS_NOT_POWERED);
1609 1610 1611
		goto failed;
	}

1612
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1613
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1614
				 MGMT_STATUS_BUSY);
1615 1616 1617
		goto failed;
	}

1618
	if (cp->addr.type == BDADDR_BREDR)
1619 1620
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
1621 1622
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1623

1624
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
1625
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1626
				 MGMT_STATUS_NOT_CONNECTED);
1627 1628 1629
		goto failed;
	}

1630
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1631 1632
	if (!cmd) {
		err = -ENOMEM;
1633
		goto failed;
1634
	}
1635

1636
	dc.handle = cpu_to_le16(conn->handle);
1637
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
1638 1639 1640

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1641
		mgmt_pending_remove(cmd);
1642 1643

failed:
1644
	hci_dev_unlock(hdev);
1645 1646 1647
	return err;
}

1648
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
1649 1650 1651
{
	switch (link_type) {
	case LE_LINK:
1652 1653
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
1654
			return BDADDR_LE_PUBLIC;
1655

1656
		default:
1657
			/* Fallback to LE Random address type */
1658
			return BDADDR_LE_RANDOM;
1659
		}
1660

1661
	default:
1662
		/* Fallback to BR/EDR type */
1663
		return BDADDR_BREDR;
1664 1665 1666
	}
}

1667 1668
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
1669 1670
{
	struct mgmt_rp_get_connections *rp;
1671
	struct hci_conn *c;
1672
	size_t rp_len;
1673 1674
	int err;
	u16 i;
1675 1676 1677

	BT_DBG("");

1678
	hci_dev_lock(hdev);
1679

1680
	if (!hdev_is_powered(hdev)) {
1681
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
1682
				 MGMT_STATUS_NOT_POWERED);
1683 1684 1685
		goto unlock;
	}

1686
	i = 0;
1687 1688
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
1689
			i++;
1690 1691
	}

1692
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1693
	rp = kmalloc(rp_len, GFP_KERNEL);
1694
	if (!rp) {
1695 1696 1697 1698 1699
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
1700
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1701 1702
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1703
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1704
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
1705
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
1706 1707 1708 1709
			continue;
		i++;
	}

1710
	rp->conn_count = cpu_to_le16(i);
1711

1712 1713
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1714

1715
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
1716
			   rp_len);
1717

1718
	kfree(rp);
1719 1720

unlock:
1721
	hci_dev_unlock(hdev);
1722 1723 1724
	return err;
}

1725
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
1726
				   struct mgmt_cp_pin_code_neg_reply *cp)
1727 1728 1729 1730
{
	struct pending_cmd *cmd;
	int err;

1731
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1732
			       sizeof(*cp));
1733 1734 1735
	if (!cmd)
		return -ENOMEM;

1736
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
1737
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
1738 1739 1740 1741 1742 1743
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1744
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
1745
			  u16 len)
1746
{
1747
	struct hci_conn *conn;
1748
	struct mgmt_cp_pin_code_reply *cp = data;
1749
	struct hci_cp_pin_code_reply reply;
1750
	struct pending_cmd *cmd;
1751 1752 1753 1754
	int err;

	BT_DBG("");

1755
	hci_dev_lock(hdev);
1756

1757
	if (!hdev_is_powered(hdev)) {
1758
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1759
				 MGMT_STATUS_NOT_POWERED);
1760 1761 1762
		goto failed;
	}

1763
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
1764
	if (!conn) {
1765
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1766
				 MGMT_STATUS_NOT_CONNECTED);
1767 1768 1769 1770
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
1771 1772 1773
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
1774 1775 1776

		BT_ERR("PIN code is not 16 bytes long");

1777
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
1778
		if (err >= 0)
1779
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1780
					 MGMT_STATUS_INVALID_PARAMS);
1781 1782 1783 1784

		goto failed;
	}

1785
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1786 1787
	if (!cmd) {
		err = -ENOMEM;
1788
		goto failed;
1789
	}
1790

1791
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
1792
	reply.pin_len = cp->pin_len;
1793
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1794 1795 1796

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1797
		mgmt_pending_remove(cmd);
1798 1799

failed:
1800
	hci_dev_unlock(hdev);
1801 1802 1803
	return err;
}

1804 1805
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1806
{
1807
	struct mgmt_cp_set_io_capability *cp = data;
1808 1809 1810

	BT_DBG("");

1811
	hci_dev_lock(hdev);
1812 1813 1814 1815

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1816
	       hdev->io_capability);
1817

1818
	hci_dev_unlock(hdev);
1819

1820 1821
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
1822 1823
}

1824
static struct pending_cmd *find_pairing(struct hci_conn *conn)
1825 1826
{
	struct hci_dev *hdev = conn->hdev;
1827
	struct pending_cmd *cmd;
1828

1829
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1847
	bacpy(&rp.addr.bdaddr, &conn->dst);
1848
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
1849

1850
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
1851
		     &rp, sizeof(rp));
1852 1853 1854 1855 1856 1857 1858 1859

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1860
	mgmt_pending_remove(cmd);
1861 1862 1863 1864 1865 1866 1867 1868 1869
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1870
	if (!cmd)
1871
		BT_DBG("Unable to find a pending command");
1872
	else
1873
		pairing_complete(cmd, mgmt_status(status));
1874 1875
}

1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

1892
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1893
		       u16 len)
1894
{
1895
	struct mgmt_cp_pair_device *cp = data;
1896
	struct mgmt_rp_pair_device rp;
1897 1898 1899 1900 1901 1902 1903
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1904
	hci_dev_lock(hdev);
1905

1906
	if (!hdev_is_powered(hdev)) {
1907
		err = cmd_status(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1908
				 MGMT_STATUS_NOT_POWERED);
1909 1910 1911
		goto unlock;
	}

1912 1913
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1914
		auth_type = HCI_AT_DEDICATED_BONDING;
1915
	else
1916 1917
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1918
	if (cp->addr.type == BDADDR_BREDR)
1919 1920
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
1921
	else
1922 1923
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
1924

1925 1926 1927 1928
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1929
	if (IS_ERR(conn)) {
1930 1931 1932 1933 1934 1935 1936
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

1937
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1938
				   status, &rp,
1939
				   sizeof(rp));
1940 1941 1942 1943 1944
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1945
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1946
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
1947 1948 1949
		goto unlock;
	}

1950
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1951 1952 1953 1954 1955 1956
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1957
	/* For LE, just connecting isn't a proof that the pairing finished */
1958
	if (cp->addr.type == BDADDR_BREDR)
1959
		conn->connect_cfm_cb = pairing_complete_cb;
1960 1961
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
1962

1963 1964 1965 1966 1967 1968
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
1969
	    hci_conn_security(conn, sec_level, auth_type))
1970 1971 1972 1973 1974
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1975
	hci_dev_unlock(hdev);
1976 1977 1978
	return err;
}

1979 1980
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
1981
{
1982
	struct mgmt_addr_info *addr = data;
1983 1984 1985 1986 1987 1988 1989 1990
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

1991
	if (!hdev_is_powered(hdev)) {
1992
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
1993
				 MGMT_STATUS_NOT_POWERED);
1994 1995 1996
		goto unlock;
	}

1997 1998
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
1999
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2000
				 MGMT_STATUS_INVALID_PARAMS);
2001 2002 2003 2004 2005 2006
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2007
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2008
				 MGMT_STATUS_INVALID_PARAMS);
2009 2010 2011 2012 2013
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2014
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2015
			   addr, sizeof(*addr));
2016 2017 2018 2019 2020
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2021
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2022 2023
			     bdaddr_t *bdaddr, u8 type, u16 mgmt_op,
			     u16 hci_op, __le32 passkey)
2024 2025
{
	struct pending_cmd *cmd;
2026
	struct hci_conn *conn;
2027 2028
	int err;

2029
	hci_dev_lock(hdev);
2030

2031
	if (!hdev_is_powered(hdev)) {
2032
		err = cmd_status(sk, hdev->id, mgmt_op,
2033
				 MGMT_STATUS_NOT_POWERED);
2034
		goto done;
2035 2036
	}

2037
	if (type == BDADDR_BREDR)
2038 2039
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	else
2040
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
2041 2042

	if (!conn) {
2043
		err = cmd_status(sk, hdev->id, mgmt_op,
2044
				 MGMT_STATUS_NOT_CONNECTED);
2045 2046
		goto done;
	}
2047

2048
	if (type == BDADDR_LE_PUBLIC || type == BDADDR_LE_RANDOM) {
2049
		/* Continue with pairing via SMP */
2050 2051 2052
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2053
			err = cmd_status(sk, hdev->id, mgmt_op,
2054
					 MGMT_STATUS_SUCCESS);
2055
		else
2056
			err = cmd_status(sk, hdev->id, mgmt_op,
2057
					 MGMT_STATUS_FAILED);
2058 2059 2060 2061

		goto done;
	}

2062
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
2063 2064
	if (!cmd) {
		err = -ENOMEM;
2065
		goto done;
2066 2067
	}

2068
	/* Continue with pairing via HCI */
2069 2070 2071 2072 2073 2074 2075 2076 2077
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

2078 2079
	if (err < 0)
		mgmt_pending_remove(cmd);
2080

2081
done:
2082
	hci_dev_unlock(hdev);
2083 2084 2085
	return err;
}

2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2098 2099
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2100
{
2101
	struct mgmt_cp_user_confirm_reply *cp = data;
2102 2103 2104 2105

	BT_DBG("");

	if (len != sizeof(*cp))
2106
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2107
				  MGMT_STATUS_INVALID_PARAMS);
2108

2109
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2110 2111
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2112 2113
}

2114
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2115
				  void *data, u16 len)
2116
{
2117
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2118 2119 2120

	BT_DBG("");

2121
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2122 2123
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2124 2125
}

2126 2127
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2128
{
2129
	struct mgmt_cp_user_passkey_reply *cp = data;
2130 2131 2132

	BT_DBG("");

2133
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2134 2135
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2136 2137
}

2138
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2139
				  void *data, u16 len)
2140
{
2141
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2142 2143 2144

	BT_DBG("");

2145
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2146 2147
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2148 2149
}

2150 2151 2152 2153 2154 2155 2156 2157 2158
static int update_name(struct hci_dev *hdev, const char *name)
{
	struct hci_cp_write_local_name cp;

	memcpy(cp.name, name, sizeof(cp.name));

	return hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
}

2159
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2160
			  u16 len)
2161
{
2162
	struct mgmt_cp_set_local_name *cp = data;
2163 2164 2165 2166 2167
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

2168
	hci_dev_lock(hdev);
2169

2170
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2171

2172
	if (!hdev_is_powered(hdev)) {
2173
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2174 2175

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2176
				   data, len);
2177 2178 2179 2180
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2181
				 sk);
2182

2183 2184 2185
		goto failed;
	}

2186
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2187 2188 2189 2190 2191
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2192
	err = update_name(hdev, cp->name);
2193 2194 2195 2196
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2197
	hci_dev_unlock(hdev);
2198 2199 2200
	return err;
}

2201
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2202
			       void *data, u16 data_len)
2203 2204 2205 2206
{
	struct pending_cmd *cmd;
	int err;

2207
	BT_DBG("%s", hdev->name);
2208

2209
	hci_dev_lock(hdev);
2210

2211
	if (!hdev_is_powered(hdev)) {
2212
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2213
				 MGMT_STATUS_NOT_POWERED);
2214 2215 2216
		goto unlock;
	}

2217
	if (!lmp_ssp_capable(hdev)) {
2218
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2219
				 MGMT_STATUS_NOT_SUPPORTED);
2220 2221 2222
		goto unlock;
	}

2223
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2224
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2225
				 MGMT_STATUS_BUSY);
2226 2227 2228
		goto unlock;
	}

2229
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2230 2231 2232 2233 2234 2235 2236 2237 2238 2239
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2240
	hci_dev_unlock(hdev);
2241 2242 2243
	return err;
}

2244
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2245
			       void *data, u16 len)
2246
{
2247
	struct mgmt_cp_add_remote_oob_data *cp = data;
2248
	u8 status;
2249 2250
	int err;

2251
	BT_DBG("%s ", hdev->name);
2252

2253
	hci_dev_lock(hdev);
2254

2255
	if (!hdev_is_powered(hdev)) {
2256
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
2257 2258
				   MGMT_STATUS_NOT_POWERED, &cp->addr,
				   sizeof(cp->addr));
2259 2260 2261
		goto unlock;
	}

2262
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2263
				      cp->randomizer);
2264
	if (err < 0)
2265
		status = MGMT_STATUS_FAILED;
2266
	else
2267 2268
		status = 0;

2269
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2270
			   &cp->addr, sizeof(cp->addr));
2271

2272
unlock:
2273
	hci_dev_unlock(hdev);
2274 2275 2276
	return err;
}

2277
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2278
				  void *data, u16 len)
2279
{
2280
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2281
	u8 status;
2282 2283
	int err;

2284
	BT_DBG("%s", hdev->name);
2285

2286
	hci_dev_lock(hdev);
2287

2288
	if (!hdev_is_powered(hdev)) {
2289
		err = cmd_complete(sk, hdev->id,
2290 2291 2292
				   MGMT_OP_REMOVE_REMOTE_OOB_DATA,
				   MGMT_STATUS_NOT_POWERED, &cp->addr,
				   sizeof(cp->addr));
2293 2294 2295
		goto unlock;
	}

2296
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2297
	if (err < 0)
2298
		status = MGMT_STATUS_INVALID_PARAMS;
2299
	else
2300 2301
		status = 0;

2302
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2303
			   status, &cp->addr, sizeof(cp->addr));
2304

2305
unlock:
2306
	hci_dev_unlock(hdev);
2307 2308 2309
	return err;
}

2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326
int mgmt_interleaved_discovery(struct hci_dev *hdev)
{
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR_LE);
	if (err < 0)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	hci_dev_unlock(hdev);

	return err;
}

2327
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2328
			   void *data, u16 len)
2329
{
2330
	struct mgmt_cp_start_discovery *cp = data;
2331 2332 2333
	struct pending_cmd *cmd;
	int err;

2334
	BT_DBG("%s", hdev->name);
2335

2336
	hci_dev_lock(hdev);
2337

2338
	if (!hdev_is_powered(hdev)) {
2339
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2340
				 MGMT_STATUS_NOT_POWERED);
2341 2342 2343
		goto failed;
	}

2344 2345 2346 2347 2348 2349
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2350
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2351
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2352
				 MGMT_STATUS_BUSY);
2353 2354 2355
		goto failed;
	}

2356
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2357 2358 2359 2360 2361
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2362 2363 2364
	hdev->discovery.type = cp->type;

	switch (hdev->discovery.type) {
2365
	case DISCOV_TYPE_BREDR:
2366 2367 2368 2369
		if (lmp_bredr_capable(hdev))
			err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
		else
			err = -ENOTSUPP;
2370 2371 2372
		break;

	case DISCOV_TYPE_LE:
2373 2374
		if (lmp_host_le_capable(hdev))
			err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
2375
					  LE_SCAN_WIN, LE_SCAN_TIMEOUT_LE_ONLY);
2376 2377
		else
			err = -ENOTSUPP;
2378 2379
		break;

2380
	case DISCOV_TYPE_INTERLEAVED:
2381 2382
		if (lmp_host_le_capable(hdev) && lmp_bredr_capable(hdev))
			err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
2383 2384
					  LE_SCAN_WIN,
					  LE_SCAN_TIMEOUT_BREDR_LE);
2385 2386
		else
			err = -ENOTSUPP;
2387 2388
		break;

2389
	default:
2390
		err = -EINVAL;
2391
	}
2392

2393 2394
	if (err < 0)
		mgmt_pending_remove(cmd);
2395 2396
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2397 2398

failed:
2399
	hci_dev_unlock(hdev);
2400 2401 2402
	return err;
}

2403
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2404
			  u16 len)
2405
{
2406
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2407
	struct pending_cmd *cmd;
2408 2409
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2410 2411
	int err;

2412
	BT_DBG("%s", hdev->name);
2413

2414
	hci_dev_lock(hdev);
2415

2416
	if (!hci_discovery_active(hdev)) {
2417
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2418 2419
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2420 2421 2422 2423
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2424
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2425 2426
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2427
		goto unlock;
2428 2429
	}

2430
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2431 2432
	if (!cmd) {
		err = -ENOMEM;
2433 2434 2435
		goto unlock;
	}

2436 2437
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
2438 2439 2440 2441 2442
		if (test_bit(HCI_INQUIRY, &hdev->flags))
			err = hci_cancel_inquiry(hdev);
		else
			err = hci_cancel_le_scan(hdev);

2443 2444 2445 2446
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
2447
						     NAME_PENDING);
2448
		if (!e) {
2449
			mgmt_pending_remove(cmd);
2450 2451 2452 2453 2454 2455 2456
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
2457

2458 2459 2460 2461 2462 2463 2464 2465 2466
		bacpy(&cp.bdaddr, &e->data.bdaddr);
		err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
				   sizeof(cp), &cp);

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
		err = -EFAULT;
2467 2468 2469 2470
	}

	if (err < 0)
		mgmt_pending_remove(cmd);
2471 2472
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2473

2474
unlock:
2475
	hci_dev_unlock(hdev);
2476 2477 2478
	return err;
}

2479
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
2480
			u16 len)
2481
{
2482
	struct mgmt_cp_confirm_name *cp = data;
2483 2484 2485
	struct inquiry_entry *e;
	int err;

2486
	BT_DBG("%s", hdev->name);
2487 2488 2489

	hci_dev_lock(hdev);

2490
	if (!hci_discovery_active(hdev)) {
2491
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2492
				 MGMT_STATUS_FAILED);
2493 2494 2495
		goto failed;
	}

2496
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
2497
	if (!e) {
2498
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2499
				 MGMT_STATUS_INVALID_PARAMS);
2500 2501 2502 2503 2504 2505 2506 2507
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2508
		hci_inquiry_cache_update_resolve(hdev, e);
2509 2510 2511 2512 2513 2514 2515 2516 2517
	}

	err = 0;

failed:
	hci_dev_unlock(hdev);
	return err;
}

2518
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
2519
			u16 len)
2520
{
2521
	struct mgmt_cp_block_device *cp = data;
2522
	u8 status;
2523 2524
	int err;

2525
	BT_DBG("%s", hdev->name);
2526

2527
	hci_dev_lock(hdev);
2528

2529
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2530
	if (err < 0)
2531
		status = MGMT_STATUS_FAILED;
2532
	else
2533 2534
		status = 0;

2535
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
2536
			   &cp->addr, sizeof(cp->addr));
2537

2538
	hci_dev_unlock(hdev);
2539 2540 2541 2542

	return err;
}

2543
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
2544
			  u16 len)
2545
{
2546
	struct mgmt_cp_unblock_device *cp = data;
2547
	u8 status;
2548 2549
	int err;

2550
	BT_DBG("%s", hdev->name);
2551

2552
	hci_dev_lock(hdev);
2553

2554
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
2555
	if (err < 0)
2556
		status = MGMT_STATUS_INVALID_PARAMS;
2557
	else
2558 2559
		status = 0;

2560
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
2561
			   &cp->addr, sizeof(cp->addr));
2562

2563
	hci_dev_unlock(hdev);
2564 2565 2566 2567

	return err;
}

2568 2569 2570 2571 2572
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
	int err;
2573
	__u16 source;
2574 2575 2576

	BT_DBG("%s", hdev->name);

2577 2578 2579 2580 2581 2582
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

2583 2584
	hci_dev_lock(hdev);

2585
	hdev->devid_source = source;
2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

	update_eir(hdev);

	hci_dev_unlock(hdev);

	return err;
}

2599
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
2600
				void *data, u16 len)
2601
{
2602
	struct mgmt_mode *cp = data;
2603 2604 2605 2606
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

2607
	BT_DBG("%s", hdev->name);
2608

2609 2610 2611 2612
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

2613
	if (!hdev_is_powered(hdev))
2614
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2615
				  MGMT_STATUS_NOT_POWERED);
2616 2617

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
2618
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2619
				  MGMT_STATUS_REJECTED);
2620 2621 2622

	hci_dev_lock(hdev);

2623
	if (cp->val) {
2624
		type = PAGE_SCAN_TYPE_INTERLACED;
2625

2626 2627
		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
2628 2629
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
2630 2631 2632

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
2633 2634
	}

2635 2636
	/* default 11.25 msec page scan window */
	acp.window = __constant_cpu_to_le16(0x0012);
2637

2638 2639
	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY, sizeof(acp),
			   &acp);
2640
	if (err < 0) {
2641
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2642
				 MGMT_STATUS_FAILED);
2643 2644 2645 2646 2647
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
2648
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2649
				 MGMT_STATUS_FAILED);
2650 2651 2652
		goto done;
	}

2653
	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, 0,
2654
			   NULL, 0);
2655 2656 2657 2658 2659
done:
	hci_dev_unlock(hdev);
	return err;
}

2660
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
2661
			       void *cp_data, u16 len)
2662 2663 2664 2665 2666
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
	int i;

2667
	key_count = __le16_to_cpu(cp->key_count);
2668 2669 2670 2671 2672

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
2673
		       len, expected_len);
2674
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
2675
				  EINVAL);
2676 2677
	}

2678
	BT_DBG("%s key_count %u", hdev->name, key_count);
2679 2680 2681 2682 2683 2684 2685 2686 2687 2688 2689 2690 2691 2692

	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

2693
		hci_add_ltk(hdev, &key->addr.bdaddr,
2694
			    bdaddr_to_le(key->addr.type),
2695 2696
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
2697 2698 2699 2700 2701 2702 2703
	}

	hci_dev_unlock(hdev);

	return 0;
}

2704
static const struct mgmt_handler {
2705 2706
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
2707 2708
	bool var_len;
	size_t data_len;
2709 2710
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
2711 2712 2713 2714 2715 2716 2717 2718 2719 2720 2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733 2734 2735 2736 2737 2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748 2749
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
2750
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
2751 2752 2753
};


2754 2755
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
2756 2757
	void *buf;
	u8 *cp;
2758
	struct mgmt_hdr *hdr;
2759
	u16 opcode, index, len;
2760
	struct hci_dev *hdev = NULL;
2761
	const struct mgmt_handler *handler;
2762 2763 2764 2765 2766 2767 2768
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2769
	buf = kmalloc(msglen, GFP_KERNEL);
2770 2771 2772 2773 2774 2775 2776 2777
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

2778
	hdr = buf;
2779 2780 2781
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
2782 2783 2784 2785 2786 2787

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

2788
	if (index != MGMT_INDEX_NONE) {
2789 2790 2791
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
2792
					 MGMT_STATUS_INVALID_INDEX);
2793 2794 2795 2796
			goto done;
		}
	}

2797
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
2798
	    mgmt_handlers[opcode].func == NULL) {
2799
		BT_DBG("Unknown op %u", opcode);
2800
		err = cmd_status(sk, index, opcode,
2801
				 MGMT_STATUS_UNKNOWN_COMMAND);
2802 2803 2804 2805
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
2806
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
2807
		err = cmd_status(sk, index, opcode,
2808
				 MGMT_STATUS_INVALID_INDEX);
2809
		goto done;
2810 2811
	}

2812 2813 2814
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
2815
	    (!handler->var_len && len != handler->data_len)) {
2816
		err = cmd_status(sk, index, opcode,
2817
				 MGMT_STATUS_INVALID_PARAMS);
2818 2819 2820
		goto done;
	}

2821 2822 2823 2824 2825
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

2826
	err = handler->func(sk, hdev, cp, len);
2827 2828 2829
	if (err < 0)
		goto done;

2830 2831 2832
	err = msglen;

done:
2833 2834 2835
	if (hdev)
		hci_dev_put(hdev);

2836 2837 2838
	kfree(buf);
	return err;
}
2839

2840 2841 2842 2843 2844 2845 2846 2847
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2848
int mgmt_index_added(struct hci_dev *hdev)
2849
{
2850 2851 2852
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

2853
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2854 2855
}

2856
int mgmt_index_removed(struct hci_dev *hdev)
2857
{
2858
	u8 status = MGMT_STATUS_INVALID_INDEX;
2859

2860 2861 2862
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

2863
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2864

2865
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2866 2867
}

2868
struct cmd_lookup {
2869
	struct sock *sk;
2870
	struct hci_dev *hdev;
2871
	u8 mgmt_status;
2872 2873
};

2874
static void settings_rsp(struct pending_cmd *cmd, void *data)
2875
{
2876
	struct cmd_lookup *match = data;
2877

2878
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2879 2880 2881 2882 2883 2884 2885 2886 2887

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2888
}
2889

2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904
static int set_bredr_scan(struct hci_dev *hdev)
{
	u8 scan = 0;

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

	if (!scan)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
}

2905
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2906
{
2907
	struct cmd_lookup match = { NULL, hdev };
2908
	int err;
2909

2910 2911 2912
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

2913
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2914

2915
	if (powered) {
2916 2917 2918 2919 2920 2921
		if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			u8 ssp = 1;

			hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
		}

2922 2923 2924 2925
		if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			struct hci_cp_write_le_host_supported cp;

			cp.le = 1;
2926
			cp.simul = !!lmp_le_br_capable(hdev);
2927 2928 2929 2930 2931

			hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				     sizeof(cp), &cp);
		}

2932 2933 2934 2935 2936 2937
		if (lmp_bredr_capable(hdev)) {
			set_bredr_scan(hdev);
			update_class(hdev);
			update_name(hdev, hdev->dev_name);
			update_eir(hdev);
		}
2938
	} else {
2939
		u8 status = MGMT_STATUS_NOT_POWERED;
2940
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2941 2942
	}

2943
	err = new_settings(hdev, match.sk);
2944 2945 2946 2947

	if (match.sk)
		sock_put(match.sk);

2948
	return err;
2949
}
2950

2951
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2952
{
2953
	struct cmd_lookup match = { NULL, hdev };
2954 2955
	bool changed = false;
	int err = 0;
2956

2957 2958 2959 2960 2961 2962 2963
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
2964

2965
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
2966
			     &match);
2967

2968 2969
	if (changed)
		err = new_settings(hdev, match.sk);
2970

2971 2972 2973
	if (match.sk)
		sock_put(match.sk);

2974
	return err;
2975
}
2976

2977
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2978
{
2979
	struct cmd_lookup match = { NULL, hdev };
2980 2981
	bool changed = false;
	int err = 0;
2982

2983 2984 2985 2986 2987 2988 2989
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
2990

2991
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
2992
			     &match);
2993

2994 2995
	if (changed)
		err = new_settings(hdev, match.sk);
2996 2997 2998 2999

	if (match.sk)
		sock_put(match.sk);

3000
	return err;
3001
}
3002

3003
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3004
{
3005 3006
	u8 mgmt_err = mgmt_status(status);

3007
	if (scan & SCAN_PAGE)
3008
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3009
				     cmd_status_rsp, &mgmt_err);
3010 3011

	if (scan & SCAN_INQUIRY)
3012
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3013
				     cmd_status_rsp, &mgmt_err);
3014 3015 3016 3017

	return 0;
}

3018 3019
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3020
{
3021
	struct mgmt_ev_new_link_key ev;
3022

3023
	memset(&ev, 0, sizeof(ev));
3024

3025
	ev.store_hint = persistent;
3026
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3027
	ev.key.addr.type = BDADDR_BREDR;
3028
	ev.key.type = key->type;
3029
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3030
	ev.key.pin_len = key->pin_len;
3031

3032
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3033
}
3034

3035 3036 3037 3038 3039 3040 3041 3042
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3043
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
3044 3045 3046 3047 3048 3049 3050 3051 3052 3053
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

3054 3055
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
3056 3057
}

3058
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3059 3060
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
3061
{
3062 3063 3064
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
3065

3066
	bacpy(&ev->addr.bdaddr, bdaddr);
3067
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3068

3069
	ev->flags = __cpu_to_le32(flags);
3070

3071 3072
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
3073
					  name, name_len);
3074 3075

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
3076
		eir_len = eir_append_data(ev->eir, eir_len,
3077
					  EIR_CLASS_OF_DEV, dev_class, 3);
3078

3079
	ev->eir_len = cpu_to_le16(eir_len);
3080 3081

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
3082
			  sizeof(*ev) + eir_len, NULL);
3083 3084
}

3085 3086
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
3087
	struct mgmt_cp_disconnect *cp = cmd->param;
3088
	struct sock **sk = data;
3089
	struct mgmt_rp_disconnect rp;
3090

3091 3092
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3093

3094
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
3095
		     sizeof(rp));
3096 3097 3098 3099

	*sk = cmd->sk;
	sock_hold(*sk);

3100
	mgmt_pending_remove(cmd);
3101 3102
}

3103
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
3104
{
3105
	struct hci_dev *hdev = data;
3106 3107
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
3108 3109

	memset(&rp, 0, sizeof(rp));
3110 3111
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3112

3113 3114
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

3115
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
3116 3117 3118 3119

	mgmt_pending_remove(cmd);
}

3120
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
3121
			     u8 link_type, u8 addr_type, u8 reason)
3122
{
3123
	struct mgmt_ev_device_disconnected ev;
3124 3125 3126
	struct sock *sk = NULL;
	int err;

3127
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
3128

3129 3130 3131
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
3132

3133
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
3134
			 sk);
3135 3136

	if (sk)
3137
		sock_put(sk);
3138

3139
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
3140
			     hdev);
3141

3142 3143 3144
	return err;
}

3145
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
3146
			   u8 link_type, u8 addr_type, u8 status)
3147
{
3148
	struct mgmt_rp_disconnect rp;
3149 3150 3151
	struct pending_cmd *cmd;
	int err;

3152 3153 3154
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

3155
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
3156 3157 3158
	if (!cmd)
		return -ENOENT;

3159
	bacpy(&rp.addr.bdaddr, bdaddr);
3160
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3161

3162
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
3163
			   mgmt_status(status), &rp, sizeof(rp));
3164

3165
	mgmt_pending_remove(cmd);
3166 3167

	return err;
3168
}
3169

3170
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3171
			u8 addr_type, u8 status)
3172 3173 3174
{
	struct mgmt_ev_connect_failed ev;

3175
	bacpy(&ev.addr.bdaddr, bdaddr);
3176
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3177
	ev.status = mgmt_status(status);
3178

3179
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
3180
}
3181

3182
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
3183 3184 3185
{
	struct mgmt_ev_pin_code_request ev;

3186
	bacpy(&ev.addr.bdaddr, bdaddr);
3187
	ev.addr.type = BDADDR_BREDR;
3188
	ev.secure = secure;
3189

3190
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
3191
			  NULL);
3192 3193
}

3194
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3195
				 u8 status)
3196 3197
{
	struct pending_cmd *cmd;
3198
	struct mgmt_rp_pin_code_reply rp;
3199 3200
	int err;

3201
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
3202 3203 3204
	if (!cmd)
		return -ENOENT;

3205
	bacpy(&rp.addr.bdaddr, bdaddr);
3206
	rp.addr.type = BDADDR_BREDR;
3207

3208
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
3209
			   mgmt_status(status), &rp, sizeof(rp));
3210

3211
	mgmt_pending_remove(cmd);
3212 3213 3214 3215

	return err;
}

3216
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3217
				     u8 status)
3218 3219
{
	struct pending_cmd *cmd;
3220
	struct mgmt_rp_pin_code_reply rp;
3221 3222
	int err;

3223
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
3224 3225 3226
	if (!cmd)
		return -ENOENT;

3227
	bacpy(&rp.addr.bdaddr, bdaddr);
3228
	rp.addr.type = BDADDR_BREDR;
3229

3230
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
3231
			   mgmt_status(status), &rp, sizeof(rp));
3232

3233
	mgmt_pending_remove(cmd);
3234 3235 3236

	return err;
}
3237

3238
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3239 3240
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
3241 3242 3243
{
	struct mgmt_ev_user_confirm_request ev;

3244
	BT_DBG("%s", hdev->name);
3245

3246
	bacpy(&ev.addr.bdaddr, bdaddr);
3247
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3248
	ev.confirm_hint = confirm_hint;
3249
	ev.value = value;
3250

3251
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3252
			  NULL);
3253 3254
}

3255
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3256
			      u8 link_type, u8 addr_type)
3257 3258 3259 3260 3261
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3262
	bacpy(&ev.addr.bdaddr, bdaddr);
3263
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3264 3265

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
3266
			  NULL);
3267 3268
}

3269
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3270 3271
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
3272 3273 3274 3275 3276
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3277
	cmd = mgmt_pending_find(opcode, hdev);
3278 3279 3280
	if (!cmd)
		return -ENOENT;

3281
	bacpy(&rp.addr.bdaddr, bdaddr);
3282
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3283
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
3284
			   &rp, sizeof(rp));
3285

3286
	mgmt_pending_remove(cmd);
3287 3288 3289 3290

	return err;
}

3291
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3292
				     u8 link_type, u8 addr_type, u8 status)
3293
{
3294
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3295
					  status, MGMT_OP_USER_CONFIRM_REPLY);
3296 3297
}

3298
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3299
					 u8 link_type, u8 addr_type, u8 status)
3300
{
3301
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3302 3303
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
3304
}
3305

3306
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3307
				     u8 link_type, u8 addr_type, u8 status)
3308
{
3309
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3310
					  status, MGMT_OP_USER_PASSKEY_REPLY);
3311 3312
}

3313
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3314
					 u8 link_type, u8 addr_type, u8 status)
3315
{
3316
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3317 3318
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
3319 3320
}

3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

3337
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3338
		     u8 addr_type, u8 status)
3339 3340 3341
{
	struct mgmt_ev_auth_failed ev;

3342
	bacpy(&ev.addr.bdaddr, bdaddr);
3343
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3344
	ev.status = mgmt_status(status);
3345

3346
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3347
}
3348

3349 3350 3351
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
3352 3353
	bool changed = false;
	int err = 0;
3354 3355 3356 3357

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
3358
				     cmd_status_rsp, &mgmt_err);
3359 3360 3361
		return 0;
	}

3362 3363 3364 3365 3366 3367 3368 3369
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

3370
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
3371
			     &match);
3372

3373 3374
	if (changed)
		err = new_settings(hdev, match.sk);
3375 3376 3377 3378 3379 3380 3381

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3382 3383 3384 3385
static int clear_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

3386
	if (!lmp_ext_inq_capable(hdev))
3387 3388
		return 0;

3389 3390
	memset(hdev->eir, 0, sizeof(hdev->eir));

3391 3392 3393 3394 3395
	memset(&cp, 0, sizeof(cp));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

3396
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
3397 3398
{
	struct cmd_lookup match = { NULL, hdev };
3399 3400
	bool changed = false;
	int err = 0;
3401 3402 3403

	if (status) {
		u8 mgmt_err = mgmt_status(status);
3404 3405

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
3406
						 &hdev->dev_flags))
3407 3408
			err = new_settings(hdev, NULL);

3409 3410
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
3411 3412 3413 3414 3415 3416 3417 3418 3419 3420

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
3421 3422 3423 3424
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

3425 3426
	if (changed)
		err = new_settings(hdev, match.sk);
3427

3428
	if (match.sk)
3429 3430
		sock_put(match.sk);

3431 3432 3433 3434
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
		update_eir(hdev);
	else
		clear_eir(hdev);
3435

3436 3437 3438
	return err;
}

3439 3440 3441 3442 3443
static void class_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, match->mgmt_status,
3444
		     match->hdev->dev_class, 3);
3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

3456
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
3457
				   u8 status)
3458
{
3459 3460
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
3461

3462 3463
	clear_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

3464 3465 3466 3467 3468
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, class_rsp, &match);

	if (!status)
3469 3470
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
3471 3472 3473

	if (match.sk)
		sock_put(match.sk);
3474 3475 3476 3477

	return err;
}

3478
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
3479 3480 3481
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
3482 3483 3484 3485 3486 3487 3488
	bool changed = false;
	int err = 0;

	if (memcmp(name, hdev->dev_name, sizeof(hdev->dev_name)) != 0) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
		changed = true;
	}
3489 3490 3491

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
3492
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
3493

3494
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
3495 3496 3497
	if (!cmd)
		goto send_event;

3498 3499 3500 3501
	/* Always assume that either the short or the complete name has
	 * changed if there was a pending mgmt command */
	changed = true;

3502
	if (status) {
3503
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
3504
				 mgmt_status(status));
3505 3506 3507
		goto failed;
	}

3508
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, &ev,
3509
			   sizeof(ev));
3510 3511 3512 3513
	if (err < 0)
		goto failed;

send_event:
3514 3515
	if (changed)
		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev,
3516
				 sizeof(ev), cmd ? cmd->sk : NULL);
3517

3518
	update_eir(hdev);
3519 3520 3521 3522 3523 3524

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
3525

3526
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
3527
					    u8 *randomizer, u8 status)
3528 3529 3530 3531
{
	struct pending_cmd *cmd;
	int err;

3532
	BT_DBG("%s status %u", hdev->name, status);
3533

3534
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
3535 3536 3537 3538
	if (!cmd)
		return -ENOENT;

	if (status) {
3539 3540
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
3541 3542 3543 3544 3545 3546
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

3547
		err = cmd_complete(cmd->sk, hdev->id,
3548 3549
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
3550 3551 3552 3553 3554 3555
	}

	mgmt_pending_remove(cmd);

	return err;
}
3556

3557 3558 3559 3560 3561 3562 3563 3564 3565 3566
int mgmt_le_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;
	int err = 0;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		if (enable && test_and_clear_bit(HCI_LE_ENABLED,
3567
						 &hdev->dev_flags))
3568
			err = new_settings(hdev, NULL);
3569

3570 3571
		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	if (changed)
		err = new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3595
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3596 3597
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
3598
{
3599 3600
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
3601
	size_t ev_size;
3602

3603 3604
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
3605 3606
		return -EINVAL;

3607 3608
	memset(buf, 0, sizeof(buf));

3609
	bacpy(&ev->addr.bdaddr, bdaddr);
3610
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3611
	ev->rssi = rssi;
3612
	if (cfm_name)
3613
		ev->flags |= cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
3614
	if (!ssp)
3615
		ev->flags |= cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
3616

3617
	if (eir_len > 0)
3618
		memcpy(ev->eir, eir, eir_len);
3619

3620 3621
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
3622
					  dev_class, 3);
3623

3624
	ev->eir_len = cpu_to_le16(eir_len);
3625
	ev_size = sizeof(*ev) + eir_len;
3626

3627
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
3628
}
3629

3630
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3631
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
3632
{
3633 3634 3635
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
3636

3637
	ev = (struct mgmt_ev_device_found *) buf;
3638

3639 3640 3641
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
3642
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3643 3644 3645
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
3646
				  name_len);
3647

3648
	ev->eir_len = cpu_to_le16(eir_len);
3649

3650
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
3651
			  sizeof(*ev) + eir_len, NULL);
3652
}
3653

3654
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
3655 3656
{
	struct pending_cmd *cmd;
3657
	u8 type;
3658 3659
	int err;

3660 3661
	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

3662
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3663 3664 3665
	if (!cmd)
		return -ENOENT;

3666 3667 3668
	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3669
			   &type, sizeof(type));
3670 3671 3672 3673 3674
	mgmt_pending_remove(cmd);

	return err;
}

3675 3676 3677 3678 3679 3680 3681 3682 3683
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

3684
	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3685
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
3686 3687 3688 3689 3690
	mgmt_pending_remove(cmd);

	return err;
}

3691
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
3692
{
3693
	struct mgmt_ev_discovering ev;
3694 3695
	struct pending_cmd *cmd;

3696 3697
	BT_DBG("%s discovering %u", hdev->name, discovering);

3698
	if (discovering)
3699
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3700
	else
3701
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3702 3703

	if (cmd != NULL) {
3704 3705
		u8 type = hdev->discovery.type;

3706 3707
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
3708 3709 3710
		mgmt_pending_remove(cmd);
	}

3711 3712 3713 3714 3715
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
3716
}
3717

3718
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3719 3720 3721 3722
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

3723
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
3724

3725 3726
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3727

3728
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
3729
			  cmd ? cmd->sk : NULL);
3730 3731
}

3732
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3733 3734 3735 3736
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

3737
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
3738

3739 3740
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3741

3742
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
3743
			  cmd ? cmd->sk : NULL);
3744
}
3745 3746 3747

module_param(enable_hs, bool, 0644);
MODULE_PARM_DESC(enable_hs, "Enable High Speed support");