mgmt.c 106.2 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35
#define MGMT_VERSION	1
36
#define MGMT_REVISION	4
37

38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
76
	MGMT_OP_SET_DEVICE_ID,
77
	MGMT_OP_SET_ADVERTISING,
78
	MGMT_OP_SET_BREDR,
79
	MGMT_OP_SET_STATIC_ADDRESS,
80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
103
	MGMT_EV_PASSKEY_NOTIFY,
104 105
};

106
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
107

108 109 110
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

111 112
struct pending_cmd {
	struct list_head list;
113
	u16 opcode;
114
	int index;
115
	void *param;
116
	struct sock *sk;
117
	void *user_data;
118 119
};

120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

185 186 187 188 189
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

190 191 192 193 194 195 196 197
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

198
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
199 200 201 202
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
203
	int err;
204

205
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
206

207
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
208 209 210 211 212
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

213
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
214
	hdr->index = cpu_to_le16(index);
215 216 217 218
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
219
	ev->opcode = cpu_to_le16(cmd);
220

221 222
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
223 224
		kfree_skb(skb);

225
	return err;
226 227
}

228
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
229
			void *rp, size_t rp_len)
230 231 232 233
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
234
	int err;
235 236 237

	BT_DBG("sock %p", sk);

238
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
239 240 241 242 243
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

244
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
245
	hdr->index = cpu_to_le16(index);
246
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
247

248
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
249
	ev->opcode = cpu_to_le16(cmd);
250
	ev->status = status;
251 252 253

	if (rp)
		memcpy(ev->data, rp, rp_len);
254

255 256
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
257 258
		kfree_skb(skb);

259
	return err;
260 261
}

262 263
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
264 265 266 267 268 269
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
270
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
271

272
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
273
			    sizeof(rp));
274 275
}

276 277
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
278 279
{
	struct mgmt_rp_read_commands *rp;
280 281
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
282
	__le16 *opcode;
283 284 285 286 287 288 289 290 291 292 293
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

294 295
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
296 297 298 299 300 301 302

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

303
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
304
			   rp_size);
305 306 307 308 309
	kfree(rp);

	return err;
}

310 311
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
312 313
{
	struct mgmt_rp_read_index_list *rp;
314
	struct hci_dev *d;
315
	size_t rp_len;
316
	u16 count;
317
	int err;
318 319 320 321 322 323

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
324 325 326 327
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

328 329 330
		count++;
	}

331 332 333
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
334
		read_unlock(&hci_dev_list_lock);
335
		return -ENOMEM;
336
	}
337

338
	count = 0;
339
	list_for_each_entry(d, &hci_dev_list, list) {
340
		if (test_bit(HCI_SETUP, &d->dev_flags))
341 342
			continue;

343 344 345
		if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
			continue;

346 347 348
		if (!mgmt_valid_hdev(d))
			continue;

349
		rp->index[count++] = cpu_to_le16(d->id);
350 351 352
		BT_DBG("Added hci%u", d->id);
	}

353 354 355
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

356 357
	read_unlock(&hci_dev_list_lock);

358
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
359
			   rp_len);
360

361 362 363
	kfree(rp);

	return err;
364 365
}

366 367 368 369 370 371 372
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

373
	if (lmp_ssp_capable(hdev))
374 375
		settings |= MGMT_SETTING_SSP;

376
	if (lmp_bredr_capable(hdev)) {
377
		settings |= MGMT_SETTING_CONNECTABLE;
378 379
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
380
		settings |= MGMT_SETTING_DISCOVERABLE;
381 382
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
383
		settings |= MGMT_SETTING_HS;
384
	}
385

386
	if (lmp_le_capable(hdev)) {
387
		settings |= MGMT_SETTING_LE;
388 389
		settings |= MGMT_SETTING_ADVERTISING;
	}
390 391 392 393 394 395 396 397

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

398
	if (hdev_is_powered(hdev))
399 400
		settings |= MGMT_SETTING_POWERED;

401
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
402 403
		settings |= MGMT_SETTING_CONNECTABLE;

404 405 406
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

407
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
408 409
		settings |= MGMT_SETTING_DISCOVERABLE;

410
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
411 412
		settings |= MGMT_SETTING_PAIRABLE;

413
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
414 415
		settings |= MGMT_SETTING_BREDR;

416
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
417 418
		settings |= MGMT_SETTING_LE;

419
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
420 421
		settings |= MGMT_SETTING_LINK_SECURITY;

422
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
423 424
		settings |= MGMT_SETTING_SSP;

425 426 427
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

428 429 430
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags))
		settings |= MGMT_SETTING_ADVERTISING;

431 432 433
	return settings;
}

434 435
#define PNP_INFO_SVCLASS_ID		0x1200

436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

567
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
568 569 570 571 572 573 574
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

575 576 577 578 579 580 581 582 583 584 585 586
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

587
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
588
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
589
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
590 591
}

592
static void update_eir(struct hci_request *req)
593
{
594
	struct hci_dev *hdev = req->hdev;
595 596
	struct hci_cp_write_eir cp;

597
	if (!hdev_is_powered(hdev))
598
		return;
599

600
	if (!lmp_ext_inq_capable(hdev))
601
		return;
602

603
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
604
		return;
605

606
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
607
		return;
608 609 610 611 612 613

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
614
		return;
615 616 617

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

618
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
619 620 621 622 623 624 625 626 627 628 629 630 631
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

632
static void update_class(struct hci_request *req)
633
{
634
	struct hci_dev *hdev = req->hdev;
635 636 637 638
	u8 cod[3];

	BT_DBG("%s", hdev->name);

639
	if (!hdev_is_powered(hdev))
640
		return;
641

642
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
643
		return;
644 645 646 647 648 649

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
650
		return;
651

652
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
653 654
}

655 656 657
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
658
					    service_cache.work);
659
	struct hci_request req;
660

661
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
662 663
		return;

664 665
	hci_req_init(&req, hdev);

666 667
	hci_dev_lock(hdev);

668 669
	update_eir(&req);
	update_class(&req);
670 671

	hci_dev_unlock(hdev);
672 673

	hci_req_run(&req, NULL);
674 675
}

676
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
677
{
678
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
679 680
		return;

681
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
682

683 684 685 686 687 688
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
689 690
}

691
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
692
				void *data, u16 data_len)
693
{
694
	struct mgmt_rp_read_info rp;
695

696
	BT_DBG("sock %p %s", sk, hdev->name);
697

698
	hci_dev_lock(hdev);
699

700 701
	memset(&rp, 0, sizeof(rp));

702
	bacpy(&rp.bdaddr, &hdev->bdaddr);
703

704
	rp.version = hdev->hci_ver;
705
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
706 707 708

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
709

710
	memcpy(rp.dev_class, hdev->dev_class, 3);
711

712
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
713
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
714

715
	hci_dev_unlock(hdev);
716

717
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
718
			    sizeof(rp));
719 720
}

721 722 723
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
724
	kfree(cmd->param);
725 726 727
	kfree(cmd);
}

728
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
729 730
					    struct hci_dev *hdev, void *data,
					    u16 len)
731 732 733
{
	struct pending_cmd *cmd;

734
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
735
	if (!cmd)
736
		return NULL;
737 738

	cmd->opcode = opcode;
739
	cmd->index = hdev->id;
740

741
	cmd->param = kmalloc(len, GFP_KERNEL);
742
	if (!cmd->param) {
743
		kfree(cmd);
744
		return NULL;
745 746
	}

747 748
	if (data)
		memcpy(cmd->param, data, len);
749 750 751 752

	cmd->sk = sk;
	sock_hold(sk);

753
	list_add(&cmd->list, &hdev->mgmt_pending);
754

755
	return cmd;
756 757
}

758
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
759 760
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
761
				 void *data)
762
{
763
	struct pending_cmd *cmd, *tmp;
764

765
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
766
		if (opcode > 0 && cmd->opcode != opcode)
767 768 769 770 771 772
			continue;

		cb(cmd, data);
	}
}

773
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
774
{
775
	struct pending_cmd *cmd;
776

777
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
778 779
		if (cmd->opcode == opcode)
			return cmd;
780 781 782 783 784
	}

	return NULL;
}

785
static void mgmt_pending_remove(struct pending_cmd *cmd)
786 787 788 789 790
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

791
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
792
{
793
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
794

795
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
796
			    sizeof(settings));
797 798
}

799
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
800
		       u16 len)
801
{
802
	struct mgmt_mode *cp = data;
803
	struct pending_cmd *cmd;
804
	int err;
805

806
	BT_DBG("request for %s", hdev->name);
807

808 809 810 811
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

812
	hci_dev_lock(hdev);
813

814 815 816 817 818 819
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

820 821 822 823
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
824 825 826
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
827 828 829 830
			goto failed;
		}
	}

831
	if (!!cp->val == hdev_is_powered(hdev)) {
832
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
833 834 835
		goto failed;
	}

836
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
837 838
	if (!cmd) {
		err = -ENOMEM;
839
		goto failed;
840
	}
841

842
	if (cp->val)
843
		queue_work(hdev->req_workqueue, &hdev->power_on);
844
	else
845
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
846

847
	err = 0;
848 849

failed:
850
	hci_dev_unlock(hdev);
851
	return err;
852 853
}

854 855
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
856 857 858 859
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

860
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
861 862 863 864 865 866 867 868
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
869
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
870 871 872 873 874
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

875 876 877
	/* Time stamp */
	__net_timestamp(skb);

878 879 880 881 882 883 884 885 886 887 888 889 890 891 892
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

static void settings_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

943
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
944
			    u16 len)
945
{
946
	struct mgmt_cp_set_discoverable *cp = data;
947
	struct pending_cmd *cmd;
948
	u16 timeout;
949
	u8 scan, status;
950 951
	int err;

952
	BT_DBG("request for %s", hdev->name);
953

954 955
	status = mgmt_bredr_support(hdev);
	if (status)
956
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
957
				  status);
958

959 960 961 962
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

963
	timeout = __le16_to_cpu(cp->timeout);
964
	if (!cp->val && timeout > 0)
965
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
966
				  MGMT_STATUS_INVALID_PARAMS);
967

968
	hci_dev_lock(hdev);
969

970
	if (!hdev_is_powered(hdev) && timeout > 0) {
971
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
972
				 MGMT_STATUS_NOT_POWERED);
973 974 975
		goto failed;
	}

976
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
977
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
978
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
979
				 MGMT_STATUS_BUSY);
980 981 982
		goto failed;
	}

983
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
984
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
985
				 MGMT_STATUS_REJECTED);
986 987 988 989
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
990 991 992 993 994 995 996
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

997
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
998 999 1000 1001 1002 1003
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1004 1005 1006 1007
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

1019
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1020 1021 1022
		goto failed;
	}

1023
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1024 1025
	if (!cmd) {
		err = -ENOMEM;
1026
		goto failed;
1027
	}
1028 1029 1030

	scan = SCAN_PAGE;

1031
	if (cp->val)
1032
		scan |= SCAN_INQUIRY;
1033
	else
1034
		cancel_delayed_work(&hdev->discov_off);
1035 1036 1037

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1038
		mgmt_pending_remove(cmd);
1039

1040
	if (cp->val)
1041
		hdev->discov_timeout = timeout;
1042

1043
failed:
1044
	hci_dev_unlock(hdev);
1045 1046 1047
	return err;
}

1048 1049
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1050
	struct hci_dev *hdev = req->hdev;
1051 1052 1053
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1054 1055 1056
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1071 1072 1073 1074 1075 1076 1077
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1078 1079
}

1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1100
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1101
			   u16 len)
1102
{
1103
	struct mgmt_mode *cp = data;
1104
	struct pending_cmd *cmd;
1105
	struct hci_request req;
1106
	u8 scan, status;
1107 1108
	int err;

1109
	BT_DBG("request for %s", hdev->name);
1110

1111 1112
	status = mgmt_bredr_support(hdev);
	if (status)
1113
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1114
				  status);
1115

1116 1117 1118 1119
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1120
	hci_dev_lock(hdev);
1121

1122
	if (!hdev_is_powered(hdev)) {
1123 1124 1125 1126 1127
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

1128
		if (cp->val) {
1129
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1130
		} else {
1131 1132 1133
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
1134

1135
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1136 1137 1138 1139 1140 1141
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1142 1143 1144
		goto failed;
	}

1145
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1146
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1147
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1148
				 MGMT_STATUS_BUSY);
1149 1150 1151
		goto failed;
	}

1152
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1153
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1154 1155 1156
		goto failed;
	}

1157
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1158 1159
	if (!cmd) {
		err = -ENOMEM;
1160
		goto failed;
1161
	}
1162

1163
	if (cp->val) {
1164
		scan = SCAN_PAGE;
1165
	} else {
1166 1167
		scan = 0;

1168
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1169
		    hdev->discov_timeout > 0)
1170 1171 1172
			cancel_delayed_work(&hdev->discov_off);
	}

1173 1174 1175 1176
	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);

1177 1178 1179 1180 1181 1182 1183
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1184 1185
		write_fast_connectable(&req, false);

1186
	err = hci_req_run(&req, set_connectable_complete);
1187
	if (err < 0)
1188
		mgmt_pending_remove(cmd);
1189 1190

failed:
1191
	hci_dev_unlock(hdev);
1192 1193 1194
	return err;
}

1195
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1196
			u16 len)
1197
{
1198
	struct mgmt_mode *cp = data;
1199 1200
	int err;

1201
	BT_DBG("request for %s", hdev->name);
1202

1203 1204 1205 1206
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1207
	hci_dev_lock(hdev);
1208 1209

	if (cp->val)
1210
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1211
	else
1212
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1213

1214
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1215 1216 1217
	if (err < 0)
		goto failed;

1218
	err = new_settings(hdev, sk);
1219 1220

failed:
1221
	hci_dev_unlock(hdev);
1222 1223 1224
	return err;
}

1225 1226
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1227 1228 1229
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1230
	u8 val, status;
1231 1232
	int err;

1233
	BT_DBG("request for %s", hdev->name);
1234

1235 1236
	status = mgmt_bredr_support(hdev);
	if (status)
1237
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1238
				  status);
1239

1240 1241 1242 1243
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1244 1245
	hci_dev_lock(hdev);

1246
	if (!hdev_is_powered(hdev)) {
1247 1248 1249
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1250
					  &hdev->dev_flags)) {
1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1262 1263 1264 1265
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1266
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1267
				 MGMT_STATUS_BUSY);
1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1295
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1296 1297 1298
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1299
	u8 val, status;
1300 1301
	int err;

1302
	BT_DBG("request for %s", hdev->name);
1303

1304 1305 1306 1307
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);

1308 1309 1310
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1311

1312 1313 1314 1315
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1316
	hci_dev_lock(hdev);
1317

1318 1319
	val = !!cp->val;

1320
	if (!hdev_is_powered(hdev)) {
1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1335 1336 1337 1338
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1339 1340
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1366
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1367 1368
{
	struct mgmt_mode *cp = data;
1369
	bool changed;
1370
	u8 status;
1371
	int err;
1372

1373
	BT_DBG("request for %s", hdev->name);
1374

1375 1376 1377
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1378

1379 1380 1381 1382
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1383 1384
	hci_dev_lock(hdev);

1385
	if (cp->val) {
1386
		changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1387 1388 1389 1390 1391 1392 1393
	} else {
		if (hdev_is_powered(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					 MGMT_STATUS_REJECTED);
			goto unlock;
		}

1394
		changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1395
	}
1396 1397 1398 1399 1400 1401 1402

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1403

1404 1405 1406
unlock:
	hci_dev_unlock(hdev);
	return err;
1407 1408
}

1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428
static void le_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

1429
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1430 1431 1432 1433
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
1434
	struct hci_request req;
1435
	int err;
1436
	u8 val, enabled;
1437

1438
	BT_DBG("request for %s", hdev->name);
1439

1440 1441 1442
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1443

1444 1445 1446 1447
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1448
	/* LE-only devices do not allow toggling LE on/off */
1449
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1450 1451 1452
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1453
	hci_dev_lock(hdev);
1454 1455

	val = !!cp->val;
1456
	enabled = lmp_host_le_capable(hdev);
1457

1458
	if (!hdev_is_powered(hdev) || val == enabled) {
1459 1460 1461 1462 1463 1464 1465
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

1466 1467 1468 1469 1470
		if (!val && test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			clear_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

1471 1472
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1473
			goto unlock;
1474 1475 1476 1477

		if (changed)
			err = new_settings(hdev, sk);

1478
		goto unlock;
1479 1480
	}

1481 1482
	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1483
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1484
				 MGMT_STATUS_BUSY);
1485
		goto unlock;
1486 1487 1488 1489 1490
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1491
		goto unlock;
1492 1493 1494 1495 1496 1497
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1498
		hci_cp.simul = lmp_le_br_capable(hdev);
1499 1500
	}

1501 1502
	hci_req_init(&req, hdev);

1503 1504 1505
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags) && !val)
		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

1506 1507 1508 1509
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1510
	if (err < 0)
1511 1512
		mgmt_pending_remove(cmd);

1513 1514
unlock:
	hci_dev_unlock(hdev);
1515 1516 1517
	return err;
}

1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1586
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1587
{
1588
	struct mgmt_cp_add_uuid *cp = data;
1589
	struct pending_cmd *cmd;
1590
	struct hci_request req;
1591 1592 1593
	struct bt_uuid *uuid;
	int err;

1594
	BT_DBG("request for %s", hdev->name);
1595

1596
	hci_dev_lock(hdev);
1597

1598
	if (pending_eir_or_class(hdev)) {
1599
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1600
				 MGMT_STATUS_BUSY);
1601 1602 1603
		goto failed;
	}

1604
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1605 1606 1607 1608 1609 1610
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1611
	uuid->svc_hint = cp->svc_hint;
1612
	uuid->size = get_uuid_size(cp->uuid);
1613

1614
	list_add_tail(&uuid->list, &hdev->uuids);
1615

1616
	hci_req_init(&req, hdev);
1617

1618 1619 1620
	update_class(&req);
	update_eir(&req);

1621 1622 1623 1624
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1625

1626
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1627
				   hdev->dev_class, 3);
1628 1629 1630 1631
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1632
	if (!cmd) {
1633
		err = -ENOMEM;
1634 1635 1636 1637
		goto failed;
	}

	err = 0;
1638 1639

failed:
1640
	hci_dev_unlock(hdev);
1641 1642 1643
	return err;
}

1644 1645 1646 1647 1648 1649
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1650 1651
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1652 1653 1654 1655 1656 1657
		return true;
	}

	return false;
}

1658 1659 1660 1661 1662 1663 1664
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1665
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1666
		       u16 len)
1667
{
1668
	struct mgmt_cp_remove_uuid *cp = data;
1669
	struct pending_cmd *cmd;
1670
	struct bt_uuid *match, *tmp;
1671
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1672
	struct hci_request req;
1673 1674
	int err, found;

1675
	BT_DBG("request for %s", hdev->name);
1676

1677
	hci_dev_lock(hdev);
1678

1679
	if (pending_eir_or_class(hdev)) {
1680
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1681
				 MGMT_STATUS_BUSY);
1682 1683 1684
		goto unlock;
	}

1685 1686
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1687

1688
		if (enable_service_cache(hdev)) {
1689
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1690
					   0, hdev->dev_class, 3);
1691 1692
			goto unlock;
		}
1693

1694
		goto update_class;
1695 1696 1697 1698
	}

	found = 0;

1699
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1700 1701 1702 1703
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1704
		kfree(match);
1705 1706 1707 1708
		found++;
	}

	if (found == 0) {
1709
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1710
				 MGMT_STATUS_INVALID_PARAMS);
1711 1712 1713
		goto unlock;
	}

1714
update_class:
1715
	hci_req_init(&req, hdev);
1716

1717 1718 1719
	update_class(&req);
	update_eir(&req);

1720 1721 1722 1723
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1724

1725
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1726
				   hdev->dev_class, 3);
1727 1728 1729 1730
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1731
	if (!cmd) {
1732
		err = -ENOMEM;
1733 1734 1735 1736
		goto unlock;
	}

	err = 0;
1737 1738

unlock:
1739
	hci_dev_unlock(hdev);
1740 1741 1742
	return err;
}

1743 1744 1745 1746 1747 1748 1749
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1750
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1751
			 u16 len)
1752
{
1753
	struct mgmt_cp_set_dev_class *cp = data;
1754
	struct pending_cmd *cmd;
1755
	struct hci_request req;
1756 1757
	int err;

1758
	BT_DBG("request for %s", hdev->name);
1759

1760
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1761 1762
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1763

1764
	hci_dev_lock(hdev);
1765

1766 1767 1768 1769 1770
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
1771

1772 1773 1774 1775 1776
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
1777

1778 1779 1780
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1781
	if (!hdev_is_powered(hdev)) {
1782
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1783
				   hdev->dev_class, 3);
1784 1785 1786
		goto unlock;
	}

1787 1788
	hci_req_init(&req, hdev);

1789
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1790 1791 1792
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1793
		update_eir(&req);
1794
	}
1795

1796 1797
	update_class(&req);

1798 1799 1800 1801
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1802

1803
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1804
				   hdev->dev_class, 3);
1805 1806 1807 1808
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1809
	if (!cmd) {
1810
		err = -ENOMEM;
1811 1812 1813 1814
		goto unlock;
	}

	err = 0;
1815

1816
unlock:
1817
	hci_dev_unlock(hdev);
1818 1819 1820
	return err;
}

1821
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1822
			  u16 len)
1823
{
1824
	struct mgmt_cp_load_link_keys *cp = data;
1825
	u16 key_count, expected_len;
1826
	int i;
1827

1828
	key_count = __le16_to_cpu(cp->key_count);
1829

1830 1831
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1832
	if (expected_len != len) {
1833
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1834
		       len, expected_len);
1835
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1836
				  MGMT_STATUS_INVALID_PARAMS);
1837 1838
	}

1839 1840 1841 1842
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1843
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1844
	       key_count);
1845

1846 1847 1848 1849 1850 1851 1852 1853
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1854
	hci_dev_lock(hdev);
1855 1856 1857 1858

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
1859
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1860
	else
1861
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1862

1863
	for (i = 0; i < key_count; i++) {
1864
		struct mgmt_link_key_info *key = &cp->keys[i];
1865

1866
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1867
				 key->type, key->pin_len);
1868 1869
	}

1870
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1871

1872
	hci_dev_unlock(hdev);
1873

1874
	return 0;
1875 1876
}

1877
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1878
			   u8 addr_type, struct sock *skip_sk)
1879 1880 1881 1882 1883 1884 1885
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1886
			  skip_sk);
1887 1888
}

1889
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1890
			 u16 len)
1891
{
1892 1893
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1894 1895
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1896 1897 1898
	struct hci_conn *conn;
	int err;

1899
	memset(&rp, 0, sizeof(rp));
1900 1901
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1902

1903 1904 1905 1906 1907
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1908 1909 1910 1911 1912
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1913 1914
	hci_dev_lock(hdev);

1915
	if (!hdev_is_powered(hdev)) {
1916
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1917
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1918 1919 1920
		goto unlock;
	}

1921
	if (cp->addr.type == BDADDR_BREDR)
1922 1923 1924
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1925

1926
	if (err < 0) {
1927
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1928
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1929 1930 1931
		goto unlock;
	}

1932
	if (cp->disconnect) {
1933
		if (cp->addr.type == BDADDR_BREDR)
1934
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1935
						       &cp->addr.bdaddr);
1936 1937
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1938
						       &cp->addr.bdaddr);
1939 1940 1941
	} else {
		conn = NULL;
	}
1942

1943
	if (!conn) {
1944
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1945
				   &rp, sizeof(rp));
1946
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1947 1948
		goto unlock;
	}
1949

1950
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1951
			       sizeof(*cp));
1952 1953 1954
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1955 1956
	}

1957
	dc.handle = cpu_to_le16(conn->handle);
1958 1959 1960 1961 1962
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1963
unlock:
1964
	hci_dev_unlock(hdev);
1965 1966 1967
	return err;
}

1968
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1969
		      u16 len)
1970
{
1971
	struct mgmt_cp_disconnect *cp = data;
1972
	struct mgmt_rp_disconnect rp;
1973
	struct hci_cp_disconnect dc;
1974
	struct pending_cmd *cmd;
1975 1976 1977 1978 1979
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1980 1981 1982 1983
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1984
	if (!bdaddr_type_is_valid(cp->addr.type))
1985 1986 1987
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1988

1989
	hci_dev_lock(hdev);
1990 1991

	if (!test_bit(HCI_UP, &hdev->flags)) {
1992 1993
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1994 1995 1996
		goto failed;
	}

1997
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1998 1999
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2000 2001 2002
		goto failed;
	}

2003
	if (cp->addr.type == BDADDR_BREDR)
2004 2005
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2006 2007
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
2008

2009
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2010 2011
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
2012 2013 2014
		goto failed;
	}

2015
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2016 2017
	if (!cmd) {
		err = -ENOMEM;
2018
		goto failed;
2019
	}
2020

2021
	dc.handle = cpu_to_le16(conn->handle);
2022
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
2023 2024 2025

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
2026
		mgmt_pending_remove(cmd);
2027 2028

failed:
2029
	hci_dev_unlock(hdev);
2030 2031 2032
	return err;
}

2033
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2034 2035 2036
{
	switch (link_type) {
	case LE_LINK:
2037 2038
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2039
			return BDADDR_LE_PUBLIC;
2040

2041
		default:
2042
			/* Fallback to LE Random address type */
2043
			return BDADDR_LE_RANDOM;
2044
		}
2045

2046
	default:
2047
		/* Fallback to BR/EDR type */
2048
		return BDADDR_BREDR;
2049 2050 2051
	}
}

2052 2053
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2054 2055
{
	struct mgmt_rp_get_connections *rp;
2056
	struct hci_conn *c;
2057
	size_t rp_len;
2058 2059
	int err;
	u16 i;
2060 2061 2062

	BT_DBG("");

2063
	hci_dev_lock(hdev);
2064

2065
	if (!hdev_is_powered(hdev)) {
2066
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
2067
				 MGMT_STATUS_NOT_POWERED);
2068 2069 2070
		goto unlock;
	}

2071
	i = 0;
2072 2073
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2074
			i++;
2075 2076
	}

2077
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2078
	rp = kmalloc(rp_len, GFP_KERNEL);
2079
	if (!rp) {
2080 2081 2082 2083 2084
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2085
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2086 2087
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2088
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2089
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2090
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2091 2092 2093 2094
			continue;
		i++;
	}

2095
	rp->conn_count = cpu_to_le16(i);
2096

2097 2098
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2099

2100
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
2101
			   rp_len);
2102

2103
	kfree(rp);
2104 2105

unlock:
2106
	hci_dev_unlock(hdev);
2107 2108 2109
	return err;
}

2110
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2111
				   struct mgmt_cp_pin_code_neg_reply *cp)
2112 2113 2114 2115
{
	struct pending_cmd *cmd;
	int err;

2116
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2117
			       sizeof(*cp));
2118 2119 2120
	if (!cmd)
		return -ENOMEM;

2121
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2122
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2123 2124 2125 2126 2127 2128
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2129
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2130
			  u16 len)
2131
{
2132
	struct hci_conn *conn;
2133
	struct mgmt_cp_pin_code_reply *cp = data;
2134
	struct hci_cp_pin_code_reply reply;
2135
	struct pending_cmd *cmd;
2136 2137 2138 2139
	int err;

	BT_DBG("");

2140
	hci_dev_lock(hdev);
2141

2142
	if (!hdev_is_powered(hdev)) {
2143
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2144
				 MGMT_STATUS_NOT_POWERED);
2145 2146 2147
		goto failed;
	}

2148
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2149
	if (!conn) {
2150
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2151
				 MGMT_STATUS_NOT_CONNECTED);
2152 2153 2154 2155
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2156 2157 2158
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2159 2160 2161

		BT_ERR("PIN code is not 16 bytes long");

2162
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2163
		if (err >= 0)
2164
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2165
					 MGMT_STATUS_INVALID_PARAMS);
2166 2167 2168 2169

		goto failed;
	}

2170
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2171 2172
	if (!cmd) {
		err = -ENOMEM;
2173
		goto failed;
2174
	}
2175

2176
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2177
	reply.pin_len = cp->pin_len;
2178
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2179 2180 2181

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2182
		mgmt_pending_remove(cmd);
2183 2184

failed:
2185
	hci_dev_unlock(hdev);
2186 2187 2188
	return err;
}

2189 2190
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2191
{
2192
	struct mgmt_cp_set_io_capability *cp = data;
2193 2194 2195

	BT_DBG("");

2196
	hci_dev_lock(hdev);
2197 2198 2199 2200

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2201
	       hdev->io_capability);
2202

2203
	hci_dev_unlock(hdev);
2204

2205 2206
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2207 2208
}

2209
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2210 2211
{
	struct hci_dev *hdev = conn->hdev;
2212
	struct pending_cmd *cmd;
2213

2214
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2232
	bacpy(&rp.addr.bdaddr, &conn->dst);
2233
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2234

2235
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2236
		     &rp, sizeof(rp));
2237 2238 2239 2240 2241 2242

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2243
	hci_conn_drop(conn);
2244

2245
	mgmt_pending_remove(cmd);
2246 2247 2248 2249 2250 2251 2252 2253 2254
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2255
	if (!cmd)
2256
		BT_DBG("Unable to find a pending command");
2257
	else
2258
		pairing_complete(cmd, mgmt_status(status));
2259 2260
}

2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2277
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2278
		       u16 len)
2279
{
2280
	struct mgmt_cp_pair_device *cp = data;
2281
	struct mgmt_rp_pair_device rp;
2282 2283 2284 2285 2286 2287 2288
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2289 2290 2291 2292
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2293 2294 2295 2296 2297
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2298
	hci_dev_lock(hdev);
2299

2300
	if (!hdev_is_powered(hdev)) {
2301 2302
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2303 2304 2305
		goto unlock;
	}

2306 2307
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2308
		auth_type = HCI_AT_DEDICATED_BONDING;
2309
	else
2310 2311
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2312
	if (cp->addr.type == BDADDR_BREDR)
2313 2314
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2315
	else
2316 2317
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2318

2319
	if (IS_ERR(conn)) {
2320 2321 2322 2323 2324 2325 2326
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2327
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2328
				   status, &rp,
2329
				   sizeof(rp));
2330 2331 2332 2333
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2334
		hci_conn_drop(conn);
2335
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2336
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2337 2338 2339
		goto unlock;
	}

2340
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2341 2342
	if (!cmd) {
		err = -ENOMEM;
2343
		hci_conn_drop(conn);
2344 2345 2346
		goto unlock;
	}

2347
	/* For LE, just connecting isn't a proof that the pairing finished */
2348
	if (cp->addr.type == BDADDR_BREDR)
2349
		conn->connect_cfm_cb = pairing_complete_cb;
2350 2351
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2352

2353 2354 2355 2356 2357 2358
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2359
	    hci_conn_security(conn, sec_level, auth_type))
2360 2361 2362 2363 2364
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2365
	hci_dev_unlock(hdev);
2366 2367 2368
	return err;
}

2369 2370
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2371
{
2372
	struct mgmt_addr_info *addr = data;
2373 2374 2375 2376 2377 2378 2379 2380
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2381
	if (!hdev_is_powered(hdev)) {
2382
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2383
				 MGMT_STATUS_NOT_POWERED);
2384 2385 2386
		goto unlock;
	}

2387 2388
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2389
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2390
				 MGMT_STATUS_INVALID_PARAMS);
2391 2392 2393 2394 2395 2396
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2397
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2398
				 MGMT_STATUS_INVALID_PARAMS);
2399 2400 2401 2402 2403
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2404
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2405
			   addr, sizeof(*addr));
2406 2407 2408 2409 2410
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2411
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2412
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2413
			     u16 hci_op, __le32 passkey)
2414 2415
{
	struct pending_cmd *cmd;
2416
	struct hci_conn *conn;
2417 2418
	int err;

2419
	hci_dev_lock(hdev);
2420

2421
	if (!hdev_is_powered(hdev)) {
2422 2423 2424
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2425
		goto done;
2426 2427
	}

2428 2429
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2430
	else
2431
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2432 2433

	if (!conn) {
2434 2435 2436
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2437 2438
		goto done;
	}
2439

2440
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2441
		/* Continue with pairing via SMP */
2442 2443 2444
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2445 2446 2447
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2448
		else
2449 2450 2451
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2452 2453 2454 2455

		goto done;
	}

2456
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2457 2458
	if (!cmd) {
		err = -ENOMEM;
2459
		goto done;
2460 2461
	}

2462
	/* Continue with pairing via HCI */
2463 2464 2465
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2466
		bacpy(&cp.bdaddr, &addr->bdaddr);
2467 2468 2469
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2470 2471
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2472

2473 2474
	if (err < 0)
		mgmt_pending_remove(cmd);
2475

2476
done:
2477
	hci_dev_unlock(hdev);
2478 2479 2480
	return err;
}

2481 2482 2483 2484 2485 2486 2487
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2488
	return user_pairing_resp(sk, hdev, &cp->addr,
2489 2490 2491 2492
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2493 2494
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2495
{
2496
	struct mgmt_cp_user_confirm_reply *cp = data;
2497 2498 2499 2500

	BT_DBG("");

	if (len != sizeof(*cp))
2501
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2502
				  MGMT_STATUS_INVALID_PARAMS);
2503

2504
	return user_pairing_resp(sk, hdev, &cp->addr,
2505 2506
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2507 2508
}

2509
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2510
				  void *data, u16 len)
2511
{
2512
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2513 2514 2515

	BT_DBG("");

2516
	return user_pairing_resp(sk, hdev, &cp->addr,
2517 2518
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2519 2520
}

2521 2522
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2523
{
2524
	struct mgmt_cp_user_passkey_reply *cp = data;
2525 2526 2527

	BT_DBG("");

2528
	return user_pairing_resp(sk, hdev, &cp->addr,
2529 2530
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2531 2532
}

2533
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2534
				  void *data, u16 len)
2535
{
2536
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2537 2538 2539

	BT_DBG("");

2540
	return user_pairing_resp(sk, hdev, &cp->addr,
2541 2542
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2543 2544
}

2545
static void update_name(struct hci_request *req)
2546
{
2547
	struct hci_dev *hdev = req->hdev;
2548 2549
	struct hci_cp_write_local_name cp;

2550
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2551

2552
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2553 2554
}

2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2583
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2584
			  u16 len)
2585
{
2586
	struct mgmt_cp_set_local_name *cp = data;
2587
	struct pending_cmd *cmd;
2588
	struct hci_request req;
2589 2590 2591 2592
	int err;

	BT_DBG("");

2593
	hci_dev_lock(hdev);
2594

2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

2606
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2607

2608
	if (!hdev_is_powered(hdev)) {
2609
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2610 2611

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2612
				   data, len);
2613 2614 2615 2616
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2617
				 sk);
2618

2619 2620 2621
		goto failed;
	}

2622
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2623 2624 2625 2626 2627
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2628 2629
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

2630
	hci_req_init(&req, hdev);
2631 2632 2633 2634 2635 2636 2637 2638 2639

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

	if (lmp_le_capable(hdev))
		hci_update_ad(&req);

2640
	err = hci_req_run(&req, set_name_complete);
2641 2642 2643 2644
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2645
	hci_dev_unlock(hdev);
2646 2647 2648
	return err;
}

2649
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2650
			       void *data, u16 data_len)
2651 2652 2653 2654
{
	struct pending_cmd *cmd;
	int err;

2655
	BT_DBG("%s", hdev->name);
2656

2657
	hci_dev_lock(hdev);
2658

2659
	if (!hdev_is_powered(hdev)) {
2660
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2661
				 MGMT_STATUS_NOT_POWERED);
2662 2663 2664
		goto unlock;
	}

2665
	if (!lmp_ssp_capable(hdev)) {
2666
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2667
				 MGMT_STATUS_NOT_SUPPORTED);
2668 2669 2670
		goto unlock;
	}

2671
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2672
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2673
				 MGMT_STATUS_BUSY);
2674 2675 2676
		goto unlock;
	}

2677
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2678 2679 2680 2681 2682 2683 2684 2685 2686 2687
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2688
	hci_dev_unlock(hdev);
2689 2690 2691
	return err;
}

2692
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2693
			       void *data, u16 len)
2694
{
2695
	struct mgmt_cp_add_remote_oob_data *cp = data;
2696
	u8 status;
2697 2698
	int err;

2699
	BT_DBG("%s ", hdev->name);
2700

2701
	hci_dev_lock(hdev);
2702

2703
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2704
				      cp->randomizer);
2705
	if (err < 0)
2706
		status = MGMT_STATUS_FAILED;
2707
	else
2708
		status = MGMT_STATUS_SUCCESS;
2709

2710
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2711
			   &cp->addr, sizeof(cp->addr));
2712

2713
	hci_dev_unlock(hdev);
2714 2715 2716
	return err;
}

2717
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2718
				  void *data, u16 len)
2719
{
2720
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2721
	u8 status;
2722 2723
	int err;

2724
	BT_DBG("%s", hdev->name);
2725

2726
	hci_dev_lock(hdev);
2727

2728
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2729
	if (err < 0)
2730
		status = MGMT_STATUS_INVALID_PARAMS;
2731
	else
2732
		status = MGMT_STATUS_SUCCESS;
2733

2734
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2735
			   status, &cp->addr, sizeof(cp->addr));
2736

2737
	hci_dev_unlock(hdev);
2738 2739 2740
	return err;
}

2741 2742 2743 2744 2745 2746 2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2780
				   DISCOV_LE_TIMEOUT);
2781 2782 2783 2784
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2785
				   DISCOV_INTERLEAVED_TIMEOUT);
2786 2787 2788 2789 2790 2791 2792 2793 2794 2795
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

2796
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2797
			   void *data, u16 len)
2798
{
2799
	struct mgmt_cp_start_discovery *cp = data;
2800
	struct pending_cmd *cmd;
2801 2802 2803 2804 2805 2806
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
2807
	u8 status;
2808 2809
	int err;

2810
	BT_DBG("%s", hdev->name);
2811

2812
	hci_dev_lock(hdev);
2813

2814
	if (!hdev_is_powered(hdev)) {
2815
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2816
				 MGMT_STATUS_NOT_POWERED);
2817 2818 2819
		goto failed;
	}

2820 2821 2822 2823 2824 2825
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2826
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2827
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2828
				 MGMT_STATUS_BUSY);
2829 2830 2831
		goto failed;
	}

2832
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2833 2834 2835 2836 2837
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2838 2839
	hdev->discovery.type = cp->type;

2840 2841
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
2842
	switch (hdev->discovery.type) {
2843
	case DISCOV_TYPE_BREDR:
2844 2845
		status = mgmt_bredr_support(hdev);
		if (status) {
2846
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2847
					 status);
2848 2849 2850 2851
			mgmt_pending_remove(cmd);
			goto failed;
		}

2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
2863
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
2864
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
2865 2866 2867
		break;

	case DISCOV_TYPE_LE:
2868
	case DISCOV_TYPE_INTERLEAVED:
2869 2870
		status = mgmt_le_support(hdev);
		if (status) {
2871
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2872
					 status);
2873 2874 2875 2876
			mgmt_pending_remove(cmd);
			goto failed;
		}

2877
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
2878
		    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
2879 2880 2881 2882 2883 2884
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2885 2886 2887 2888 2889 2890 2891 2892 2893 2894 2895 2896 2897 2898 2899 2900
		if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
2901 2902
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
2903 2904 2905 2906 2907 2908 2909 2910
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
2911 2912
		break;

2913
	default:
2914 2915 2916 2917
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2918
	}
2919

2920
	err = hci_req_run(&req, start_discovery_complete);
2921 2922
	if (err < 0)
		mgmt_pending_remove(cmd);
2923 2924
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2925 2926

failed:
2927
	hci_dev_unlock(hdev);
2928 2929 2930
	return err;
}

2931 2932 2933 2934 2935 2936 2937 2938 2939 2940 2941 2942 2943 2944 2945 2946
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

2947 2948 2949 2950 2951 2952 2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

2964
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2965
			  u16 len)
2966
{
2967
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2968
	struct pending_cmd *cmd;
2969 2970
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2971 2972
	struct hci_request req;
	struct hci_cp_le_set_scan_enable enable_cp;
2973 2974
	int err;

2975
	BT_DBG("%s", hdev->name);
2976

2977
	hci_dev_lock(hdev);
2978

2979
	if (!hci_discovery_active(hdev)) {
2980
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2981 2982
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2983 2984 2985 2986
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2987
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2988 2989
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2990
		goto unlock;
2991 2992
	}

2993
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2994 2995
	if (!cmd) {
		err = -ENOMEM;
2996 2997 2998
		goto unlock;
	}

2999 3000
	hci_req_init(&req, hdev);

3001 3002
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
3003 3004 3005 3006 3007 3008 3009 3010 3011 3012
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

			memset(&enable_cp, 0, sizeof(enable_cp));
			enable_cp.enable = LE_SCAN_DISABLE;
			hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
				    sizeof(enable_cp), &enable_cp);
		}
3013

3014 3015 3016 3017
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
3018
						     NAME_PENDING);
3019
		if (!e) {
3020
			mgmt_pending_remove(cmd);
3021 3022 3023 3024 3025 3026 3027
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
3028

3029
		bacpy(&cp.bdaddr, &e->data.bdaddr);
3030 3031
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
3032 3033 3034 3035 3036

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
3037 3038 3039 3040 3041 3042

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
3043 3044
	}

3045
	err = hci_req_run(&req, stop_discovery_complete);
3046 3047
	if (err < 0)
		mgmt_pending_remove(cmd);
3048 3049
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
3050

3051
unlock:
3052
	hci_dev_unlock(hdev);
3053 3054 3055
	return err;
}

3056
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3057
			u16 len)
3058
{
3059
	struct mgmt_cp_confirm_name *cp = data;
3060 3061 3062
	struct inquiry_entry *e;
	int err;

3063
	BT_DBG("%s", hdev->name);
3064 3065 3066

	hci_dev_lock(hdev);

3067
	if (!hci_discovery_active(hdev)) {
3068
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3069
				 MGMT_STATUS_FAILED);
3070 3071 3072
		goto failed;
	}

3073
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3074
	if (!e) {
3075
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3076
				 MGMT_STATUS_INVALID_PARAMS);
3077 3078 3079 3080 3081 3082 3083 3084
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3085
		hci_inquiry_cache_update_resolve(hdev, e);
3086 3087
	}

3088 3089
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
3090 3091 3092 3093 3094 3095

failed:
	hci_dev_unlock(hdev);
	return err;
}

3096
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3097
			u16 len)
3098
{
3099
	struct mgmt_cp_block_device *cp = data;
3100
	u8 status;
3101 3102
	int err;

3103
	BT_DBG("%s", hdev->name);
3104

3105
	if (!bdaddr_type_is_valid(cp->addr.type))
3106 3107 3108
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3109

3110
	hci_dev_lock(hdev);
3111

3112
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
3113
	if (err < 0)
3114
		status = MGMT_STATUS_FAILED;
3115
	else
3116
		status = MGMT_STATUS_SUCCESS;
3117

3118
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
3119
			   &cp->addr, sizeof(cp->addr));
3120

3121
	hci_dev_unlock(hdev);
3122 3123 3124 3125

	return err;
}

3126
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3127
			  u16 len)
3128
{
3129
	struct mgmt_cp_unblock_device *cp = data;
3130
	u8 status;
3131 3132
	int err;

3133
	BT_DBG("%s", hdev->name);
3134

3135
	if (!bdaddr_type_is_valid(cp->addr.type))
3136 3137 3138
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3139

3140
	hci_dev_lock(hdev);
3141

3142
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3143
	if (err < 0)
3144
		status = MGMT_STATUS_INVALID_PARAMS;
3145
	else
3146
		status = MGMT_STATUS_SUCCESS;
3147

3148
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3149
			   &cp->addr, sizeof(cp->addr));
3150

3151
	hci_dev_unlock(hdev);
3152 3153 3154 3155

	return err;
}

3156 3157 3158 3159
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3160
	struct hci_request req;
3161
	int err;
3162
	__u16 source;
3163 3164 3165

	BT_DBG("%s", hdev->name);

3166 3167 3168 3169 3170 3171
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3172 3173
	hci_dev_lock(hdev);

3174
	hdev->devid_source = source;
3175 3176 3177 3178 3179 3180
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3181 3182 3183
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3184 3185 3186 3187 3188 3189

	hci_dev_unlock(hdev);

	return err;
}

3190 3191 3192 3193 3194 3195 3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215
static void set_advertising_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
3216
	u8 val, enabled, status;
3217 3218 3219 3220
	int err;

	BT_DBG("request for %s", hdev->name);

3221 3222
	status = mgmt_le_support(hdev);
	if (status)
3223
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3224
				  status);
3225 3226 3227 3228 3229 3230 3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	val = !!cp->val;
	enabled = test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);

	if (!hdev_is_powered(hdev) || val == enabled) {
		bool changed = false;

		if (val != test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			change_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3279 3280 3281 3282 3283 3284 3285 3286
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3287
	if (!lmp_le_capable(hdev))
3288
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
3289
				  MGMT_STATUS_NOT_SUPPORTED);
3290 3291 3292 3293 3294 3295 3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_REJECTED);

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3335 3336 3337 3338 3339 3340 3341
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3342 3343 3344 3345 3346 3347 3348 3349 3350 3351
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3352
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3353
				void *data, u16 len)
3354
{
3355
	struct mgmt_mode *cp = data;
3356 3357
	struct pending_cmd *cmd;
	struct hci_request req;
3358 3359
	int err;

3360
	BT_DBG("%s", hdev->name);
3361

3362 3363
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
3364 3365 3366
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3367 3368 3369 3370
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3371
	if (!hdev_is_powered(hdev))
3372
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3373
				  MGMT_STATUS_NOT_POWERED);
3374 3375

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3376
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3377
				  MGMT_STATUS_REJECTED);
3378 3379 3380

	hci_dev_lock(hdev);

3381 3382 3383 3384 3385 3386
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3387 3388 3389 3390 3391 3392
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3393 3394 3395 3396 3397
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3398 3399
	}

3400 3401
	hci_req_init(&req, hdev);

3402
	write_fast_connectable(&req, cp->val);
3403 3404

	err = hci_req_run(&req, fast_connectable_complete);
3405
	if (err < 0) {
3406
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3407
				 MGMT_STATUS_FAILED);
3408
		mgmt_pending_remove(cmd);
3409 3410
	}

3411
unlock:
3412
	hci_dev_unlock(hdev);
3413

3414 3415 3416
	return err;
}

3417 3418 3419 3420 3421 3422 3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531
static void set_bredr_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
		clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
		}

		change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_REJECTED);
		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	/* We need to flip the bit already here so that hci_update_ad
	 * generates the correct flags.
	 */
	set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

	hci_req_init(&req, hdev);
	hci_update_ad(&req);
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3532 3533
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
3534 3535
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
3536 3537
	if (key->master != 0x00 && key->master != 0x01)
		return false;
3538 3539
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
3540 3541 3542
	return true;
}

3543
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
3544
			       void *cp_data, u16 len)
3545 3546 3547
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
3548
	int i, err;
3549

3550
	key_count = __le16_to_cpu(cp->key_count);
3551 3552 3553 3554 3555

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
3556
		       len, expected_len);
3557
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
3558
				  MGMT_STATUS_INVALID_PARAMS);
3559 3560
	}

3561
	BT_DBG("%s key_count %u", hdev->name, key_count);
3562

3563 3564 3565
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

3566
		if (!ltk_is_valid(key))
3567 3568 3569 3570 3571
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

3585
		hci_add_ltk(hdev, &key->addr.bdaddr,
3586
			    bdaddr_to_le(key->addr.type),
3587 3588
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
3589 3590
	}

3591 3592 3593
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

3594 3595
	hci_dev_unlock(hdev);

3596
	return err;
3597 3598
}

3599
static const struct mgmt_handler {
3600 3601
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
3602 3603
	bool var_len;
	size_t data_len;
3604 3605
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
3645
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
3646
	{ set_advertising,        false, MGMT_SETTING_SIZE },
3647
	{ set_bredr,              false, MGMT_SETTING_SIZE },
3648
	{ set_static_address,     false, MGMT_SET_STATIC_ADDRESS_SIZE },
3649 3650 3651
};


3652 3653
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
3654 3655
	void *buf;
	u8 *cp;
3656
	struct mgmt_hdr *hdr;
3657
	u16 opcode, index, len;
3658
	struct hci_dev *hdev = NULL;
3659
	const struct mgmt_handler *handler;
3660 3661 3662 3663 3664 3665 3666
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

3667
	buf = kmalloc(msglen, GFP_KERNEL);
3668 3669 3670 3671 3672 3673 3674 3675
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

3676
	hdr = buf;
3677 3678 3679
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
3680 3681 3682 3683 3684 3685

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

3686
	if (index != MGMT_INDEX_NONE) {
3687 3688 3689
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
3690
					 MGMT_STATUS_INVALID_INDEX);
3691 3692
			goto done;
		}
3693 3694 3695 3696 3697 3698

		if (test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
			err = cmd_status(sk, index, opcode,
					 MGMT_STATUS_INVALID_INDEX);
			goto done;
		}
3699 3700
	}

3701
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
3702
	    mgmt_handlers[opcode].func == NULL) {
3703
		BT_DBG("Unknown op %u", opcode);
3704
		err = cmd_status(sk, index, opcode,
3705
				 MGMT_STATUS_UNKNOWN_COMMAND);
3706 3707 3708 3709
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
3710
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
3711
		err = cmd_status(sk, index, opcode,
3712
				 MGMT_STATUS_INVALID_INDEX);
3713
		goto done;
3714 3715
	}

3716 3717 3718
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
3719
	    (!handler->var_len && len != handler->data_len)) {
3720
		err = cmd_status(sk, index, opcode,
3721
				 MGMT_STATUS_INVALID_PARAMS);
3722 3723 3724
		goto done;
	}

3725 3726 3727 3728 3729
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

3730
	err = handler->func(sk, hdev, cp, len);
3731 3732 3733
	if (err < 0)
		goto done;

3734 3735 3736
	err = msglen;

done:
3737 3738 3739
	if (hdev)
		hci_dev_put(hdev);

3740 3741 3742
	kfree(buf);
	return err;
}
3743

3744
int mgmt_index_added(struct hci_dev *hdev)
3745
{
3746 3747 3748
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3749
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
3750 3751
}

3752
int mgmt_index_removed(struct hci_dev *hdev)
3753
{
3754
	u8 status = MGMT_STATUS_INVALID_INDEX;
3755

3756 3757 3758
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3759
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3760

3761
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
3762 3763
}

3764
static void set_bredr_scan(struct hci_request *req)
3765
{
3766
	struct hci_dev *hdev = req->hdev;
3767 3768
	u8 scan = 0;

3769 3770 3771 3772 3773 3774
	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

3775 3776 3777 3778 3779
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

3780 3781
	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3782 3783
}

3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

3802
static int powered_update_hci(struct hci_dev *hdev)
3803
{
3804
	struct hci_request req;
3805
	u8 link_sec;
3806

3807 3808
	hci_req_init(&req, hdev);

3809 3810 3811
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
3812

3813
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
3814
	}
3815

3816 3817
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
3818
		struct hci_cp_write_le_host_supported cp;
3819

3820 3821
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
3822

3823 3824 3825 3826 3827
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
3828 3829
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
3830 3831 3832

		/* In case BR/EDR was toggled during the AUTO_OFF phase */
		hci_update_ad(&req);
3833
	}
3834

3835 3836 3837 3838 3839 3840 3841
	if (lmp_le_capable(hdev)) {
		/* Set random address to static address if configured */
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			hci_req_add(&req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
				    &hdev->static_addr);
	}

3842 3843 3844 3845 3846 3847
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
		u8 adv = 0x01;

		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(adv), &adv);
	}

3848 3849
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
3850 3851
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
3852

3853
	if (lmp_bredr_capable(hdev)) {
3854 3855
		if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
			set_bredr_scan(&req);
3856
		update_class(&req);
3857
		update_name(&req);
3858
		update_eir(&req);
3859
	}
3860

3861
	return hci_req_run(&req, powered_complete);
3862
}
3863

3864 3865 3866
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
3867 3868
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
3869
	int err;
3870

3871 3872 3873 3874
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
3875 3876
		if (powered_update_hci(hdev) == 0)
			return 0;
3877

3878 3879 3880
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
3881 3882
	}

3883 3884 3885 3886 3887 3888 3889 3890
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
3891
	err = new_settings(hdev, match.sk);
3892 3893 3894 3895

	if (match.sk)
		sock_put(match.sk);

3896
	return err;
3897
}
3898

3899 3900 3901 3902 3903 3904 3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919
int mgmt_set_powered_failed(struct hci_dev *hdev, int err)
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
		return -ENOENT;

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

	err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);

	mgmt_pending_remove(cmd);

	return err;
}

3920
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3921
{
3922
	struct cmd_lookup match = { NULL, hdev };
3923 3924
	bool changed = false;
	int err = 0;
3925

3926 3927 3928 3929 3930 3931 3932
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3933

3934
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3935
			     &match);
3936

3937 3938
	if (changed)
		err = new_settings(hdev, match.sk);
3939

3940 3941 3942
	if (match.sk)
		sock_put(match.sk);

3943
	return err;
3944
}
3945

3946
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3947
{
3948
	struct pending_cmd *cmd;
3949 3950
	bool changed = false;
	int err = 0;
3951

3952 3953 3954 3955 3956 3957 3958
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3959

3960
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
3961

3962
	if (changed)
3963
		err = new_settings(hdev, cmd ? cmd->sk : NULL);
3964

3965
	return err;
3966
}
3967

3968
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3969
{
3970 3971
	u8 mgmt_err = mgmt_status(status);

3972
	if (scan & SCAN_PAGE)
3973
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3974
				     cmd_status_rsp, &mgmt_err);
3975 3976

	if (scan & SCAN_INQUIRY)
3977
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3978
				     cmd_status_rsp, &mgmt_err);
3979 3980 3981 3982

	return 0;
}

3983 3984
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3985
{
3986
	struct mgmt_ev_new_link_key ev;
3987

3988
	memset(&ev, 0, sizeof(ev));
3989

3990
	ev.store_hint = persistent;
3991
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3992
	ev.key.addr.type = BDADDR_BREDR;
3993
	ev.key.type = key->type;
3994
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3995
	ev.key.pin_len = key->pin_len;
3996

3997
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3998
}
3999

4000 4001 4002 4003 4004 4005 4006 4007
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
4008
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
4009 4010 4011 4012 4013 4014 4015 4016 4017 4018
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

4019 4020
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
4021 4022
}

4023
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4024 4025
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
4026
{
4027 4028 4029
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
4030

4031
	bacpy(&ev->addr.bdaddr, bdaddr);
4032
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4033

4034
	ev->flags = __cpu_to_le32(flags);
4035

4036 4037
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
4038
					  name, name_len);
4039 4040

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
4041
		eir_len = eir_append_data(ev->eir, eir_len,
4042
					  EIR_CLASS_OF_DEV, dev_class, 3);
4043

4044
	ev->eir_len = cpu_to_le16(eir_len);
4045 4046

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
4047
			  sizeof(*ev) + eir_len, NULL);
4048 4049
}

4050 4051
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
4052
	struct mgmt_cp_disconnect *cp = cmd->param;
4053
	struct sock **sk = data;
4054
	struct mgmt_rp_disconnect rp;
4055

4056 4057
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4058

4059
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
4060
		     sizeof(rp));
4061 4062 4063 4064

	*sk = cmd->sk;
	sock_hold(*sk);

4065
	mgmt_pending_remove(cmd);
4066 4067
}

4068
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
4069
{
4070
	struct hci_dev *hdev = data;
4071 4072
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
4073 4074

	memset(&rp, 0, sizeof(rp));
4075 4076
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4077

4078 4079
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

4080
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
4081 4082 4083 4084

	mgmt_pending_remove(cmd);
}

4085
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
4086
			     u8 link_type, u8 addr_type, u8 reason)
4087
{
4088
	struct mgmt_ev_device_disconnected ev;
4089 4090 4091
	struct sock *sk = NULL;
	int err;

4092
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
4093

4094 4095 4096
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
4097

4098
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
4099
			 sk);
4100 4101

	if (sk)
4102
		sock_put(sk);
4103

4104
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
4105
			     hdev);
4106

4107 4108 4109
	return err;
}

4110
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
4111
			   u8 link_type, u8 addr_type, u8 status)
4112
{
4113
	struct mgmt_rp_disconnect rp;
4114 4115 4116
	struct pending_cmd *cmd;
	int err;

4117 4118 4119
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

4120
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
4121 4122 4123
	if (!cmd)
		return -ENOENT;

4124
	bacpy(&rp.addr.bdaddr, bdaddr);
4125
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4126

4127
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
4128
			   mgmt_status(status), &rp, sizeof(rp));
4129

4130
	mgmt_pending_remove(cmd);
4131 4132

	return err;
4133
}
4134

4135
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4136
			u8 addr_type, u8 status)
4137 4138 4139
{
	struct mgmt_ev_connect_failed ev;

4140
	bacpy(&ev.addr.bdaddr, bdaddr);
4141
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4142
	ev.status = mgmt_status(status);
4143

4144
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
4145
}
4146

4147
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
4148 4149 4150
{
	struct mgmt_ev_pin_code_request ev;

4151
	bacpy(&ev.addr.bdaddr, bdaddr);
4152
	ev.addr.type = BDADDR_BREDR;
4153
	ev.secure = secure;
4154

4155
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
4156
			  NULL);
4157 4158
}

4159
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4160
				 u8 status)
4161 4162
{
	struct pending_cmd *cmd;
4163
	struct mgmt_rp_pin_code_reply rp;
4164 4165
	int err;

4166
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
4167 4168 4169
	if (!cmd)
		return -ENOENT;

4170
	bacpy(&rp.addr.bdaddr, bdaddr);
4171
	rp.addr.type = BDADDR_BREDR;
4172

4173
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
4174
			   mgmt_status(status), &rp, sizeof(rp));
4175

4176
	mgmt_pending_remove(cmd);
4177 4178 4179 4180

	return err;
}

4181
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4182
				     u8 status)
4183 4184
{
	struct pending_cmd *cmd;
4185
	struct mgmt_rp_pin_code_reply rp;
4186 4187
	int err;

4188
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
4189 4190 4191
	if (!cmd)
		return -ENOENT;

4192
	bacpy(&rp.addr.bdaddr, bdaddr);
4193
	rp.addr.type = BDADDR_BREDR;
4194

4195
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
4196
			   mgmt_status(status), &rp, sizeof(rp));
4197

4198
	mgmt_pending_remove(cmd);
4199 4200 4201

	return err;
}
4202

4203
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4204 4205
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
4206 4207 4208
{
	struct mgmt_ev_user_confirm_request ev;

4209
	BT_DBG("%s", hdev->name);
4210

4211
	bacpy(&ev.addr.bdaddr, bdaddr);
4212
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4213
	ev.confirm_hint = confirm_hint;
4214
	ev.value = value;
4215

4216
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
4217
			  NULL);
4218 4219
}

4220
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4221
			      u8 link_type, u8 addr_type)
4222 4223 4224 4225 4226
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

4227
	bacpy(&ev.addr.bdaddr, bdaddr);
4228
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4229 4230

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
4231
			  NULL);
4232 4233
}

4234
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4235 4236
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
4237 4238 4239 4240 4241
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

4242
	cmd = mgmt_pending_find(opcode, hdev);
4243 4244 4245
	if (!cmd)
		return -ENOENT;

4246
	bacpy(&rp.addr.bdaddr, bdaddr);
4247
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4248
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
4249
			   &rp, sizeof(rp));
4250

4251
	mgmt_pending_remove(cmd);
4252 4253 4254 4255

	return err;
}

4256
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4257
				     u8 link_type, u8 addr_type, u8 status)
4258
{
4259
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4260
					  status, MGMT_OP_USER_CONFIRM_REPLY);
4261 4262
}

4263
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4264
					 u8 link_type, u8 addr_type, u8 status)
4265
{
4266
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4267 4268
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
4269
}
4270

4271
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4272
				     u8 link_type, u8 addr_type, u8 status)
4273
{
4274
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4275
					  status, MGMT_OP_USER_PASSKEY_REPLY);
4276 4277
}

4278
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4279
					 u8 link_type, u8 addr_type, u8 status)
4280
{
4281
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4282 4283
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
4284 4285
}

4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

4302
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4303
		     u8 addr_type, u8 status)
4304 4305 4306
{
	struct mgmt_ev_auth_failed ev;

4307
	bacpy(&ev.addr.bdaddr, bdaddr);
4308
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4309
	ev.status = mgmt_status(status);
4310

4311
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
4312
}
4313

4314 4315 4316
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
4317 4318
	bool changed = false;
	int err = 0;
4319 4320 4321 4322

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
4323
				     cmd_status_rsp, &mgmt_err);
4324 4325 4326
		return 0;
	}

4327 4328 4329 4330 4331 4332 4333 4334
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

4335
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
4336
			     &match);
4337

4338 4339
	if (changed)
		err = new_settings(hdev, match.sk);
4340 4341 4342 4343 4344 4345 4346

	if (match.sk)
		sock_put(match.sk);

	return err;
}

4347
static void clear_eir(struct hci_request *req)
4348
{
4349
	struct hci_dev *hdev = req->hdev;
4350 4351
	struct hci_cp_write_eir cp;

4352
	if (!lmp_ext_inq_capable(hdev))
4353
		return;
4354

4355 4356
	memset(hdev->eir, 0, sizeof(hdev->eir));

4357 4358
	memset(&cp, 0, sizeof(cp));

4359
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
4360 4361
}

4362
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
4363 4364
{
	struct cmd_lookup match = { NULL, hdev };
4365
	struct hci_request req;
4366 4367
	bool changed = false;
	int err = 0;
4368 4369 4370

	if (status) {
		u8 mgmt_err = mgmt_status(status);
4371 4372

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
4373
						 &hdev->dev_flags))
4374 4375
			err = new_settings(hdev, NULL);

4376 4377
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
4378 4379 4380 4381 4382 4383 4384 4385 4386 4387

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
4388 4389 4390 4391
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

4392 4393
	if (changed)
		err = new_settings(hdev, match.sk);
4394

4395
	if (match.sk)
4396 4397
		sock_put(match.sk);

4398 4399
	hci_req_init(&req, hdev);

4400
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
4401
		update_eir(&req);
4402
	else
4403 4404 4405
		clear_eir(&req);

	hci_req_run(&req, NULL);
4406

4407 4408 4409
	return err;
}

4410
static void sk_lookup(struct pending_cmd *cmd, void *data)
4411 4412 4413 4414 4415 4416 4417 4418 4419
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

4420
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
4421
				   u8 status)
4422
{
4423 4424
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
4425

4426 4427 4428
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
4429 4430

	if (!status)
4431 4432
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
4433 4434 4435

	if (match.sk)
		sock_put(match.sk);
4436 4437 4438 4439

	return err;
}

4440
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
4441 4442
{
	struct mgmt_cp_set_local_name ev;
4443
	struct pending_cmd *cmd;
4444

4445 4446
	if (status)
		return 0;
4447 4448 4449

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
4450
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
4451

4452
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
4453 4454
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
4455

4456 4457 4458 4459 4460
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
			return 0;
4461
	}
4462

4463 4464
	return mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			  cmd ? cmd->sk : NULL);
4465
}
4466

4467
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
4468
					    u8 *randomizer, u8 status)
4469 4470 4471 4472
{
	struct pending_cmd *cmd;
	int err;

4473
	BT_DBG("%s status %u", hdev->name, status);
4474

4475
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
4476 4477 4478 4479
	if (!cmd)
		return -ENOENT;

	if (status) {
4480 4481
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
4482 4483 4484 4485 4486 4487
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

4488
		err = cmd_complete(cmd->sk, hdev->id,
4489 4490
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
4491 4492 4493 4494 4495 4496
	}

	mgmt_pending_remove(cmd);

	return err;
}
4497

4498
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4499 4500
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
4501
{
4502 4503
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
4504
	size_t ev_size;
4505

4506 4507 4508
	if (!hci_discovery_active(hdev))
		return -EPERM;

4509 4510
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
4511 4512
		return -EINVAL;

4513 4514
	memset(buf, 0, sizeof(buf));

4515
	bacpy(&ev->addr.bdaddr, bdaddr);
4516
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4517
	ev->rssi = rssi;
4518
	if (cfm_name)
4519
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
4520
	if (!ssp)
4521
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
4522

4523
	if (eir_len > 0)
4524
		memcpy(ev->eir, eir, eir_len);
4525

4526 4527
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
4528
					  dev_class, 3);
4529

4530
	ev->eir_len = cpu_to_le16(eir_len);
4531
	ev_size = sizeof(*ev) + eir_len;
4532

4533
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
4534
}
4535

4536
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4537
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
4538
{
4539 4540 4541
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
4542

4543
	ev = (struct mgmt_ev_device_found *) buf;
4544

4545 4546 4547
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
4548
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4549 4550 4551
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
4552
				  name_len);
4553

4554
	ev->eir_len = cpu_to_le16(eir_len);
4555

4556
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
4557
			  sizeof(*ev) + eir_len, NULL);
4558
}
4559

4560
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
4561
{
4562
	struct mgmt_ev_discovering ev;
4563 4564
	struct pending_cmd *cmd;

4565 4566
	BT_DBG("%s discovering %u", hdev->name, discovering);

4567
	if (discovering)
4568
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
4569
	else
4570
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
4571 4572

	if (cmd != NULL) {
4573 4574
		u8 type = hdev->discovery.type;

4575 4576
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
4577 4578 4579
		mgmt_pending_remove(cmd);
	}

4580 4581 4582 4583 4584
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
4585
}
4586

4587
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4588 4589 4590 4591
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

4592
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
4593

4594 4595
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4596

4597
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
4598
			  cmd ? cmd->sk : NULL);
4599 4600
}

4601
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4602 4603 4604 4605
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

4606
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
4607

4608 4609
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4610

4611
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
4612
			  cmd ? cmd->sk : NULL);
4613
}