mgmt.c 85.1 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/kernel.h>
28
#include <linux/uaccess.h>
29
#include <linux/module.h>
30 31 32 33 34
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
35
#include <net/bluetooth/smp.h>
36

37 38 39
bool enable_hs;
bool enable_le;

40 41
#define MGMT_VERSION	1
#define MGMT_REVISION	0
42

43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
};

106 107 108 109 110 111 112 113
/*
 * These LE scan and inquiry parameters were chosen according to LE General
 * Discovery Procedure specification.
 */
#define LE_SCAN_TYPE			0x01
#define LE_SCAN_WIN			0x12
#define LE_SCAN_INT			0x12
#define LE_SCAN_TIMEOUT_LE_ONLY		10240	/* TGAP(gen_disc_scan_min) */
114
#define LE_SCAN_TIMEOUT_BREDR_LE	5120	/* TGAP(100)/2 */
115

A
Andre Guedes 已提交
116
#define INQUIRY_LEN_BREDR		0x08	/* TGAP(100) */
117
#define INQUIRY_LEN_BREDR_LE		0x04	/* TGAP(100)/2 */
A
Andre Guedes 已提交
118

119 120
#define SERVICE_CACHE_TIMEOUT (5 * 1000)

121 122 123
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

124 125
struct pending_cmd {
	struct list_head list;
126
	u16 opcode;
127
	int index;
128
	void *param;
129
	struct sock *sk;
130
	void *user_data;
131 132
};

133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

206
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
207 208 209 210
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
211
	int err;
212

213
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
214 215 216 217 218 219 220 221

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
222
	hdr->index = cpu_to_le16(index);
223 224 225 226 227 228
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

229 230
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
231 232
		kfree_skb(skb);

233
	return err;
234 235
}

236 237
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
						void *rp, size_t rp_len)
238 239 240 241
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
242
	int err;
243 244 245

	BT_DBG("sock %p", sk);

246
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
247 248 249 250 251
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

252
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
253
	hdr->index = cpu_to_le16(index);
254
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
255

256 257
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
258
	ev->status = status;
259 260 261

	if (rp)
		memcpy(ev->data, rp, rp_len);
262

263 264
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
265 266
		kfree_skb(skb);

267
	return err;
268 269
}

270 271 272 273 274 275 276 277 278
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

279
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
280
								sizeof(rp));
281 282
}

283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308
static int read_commands(struct sock *sk)
{
	struct mgmt_rp_read_commands *rp;
	u16 num_commands = ARRAY_SIZE(mgmt_commands);
	u16 num_events = ARRAY_SIZE(mgmt_events);
	u16 *opcode;
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

	put_unaligned_le16(num_commands, &rp->num_commands);
	put_unaligned_le16(num_events, &rp->num_events);

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

309
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
310 311 312 313 314 315
								rp_size);
	kfree(rp);

	return err;
}

316 317 318 319
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
320
	struct hci_dev *d;
321
	size_t rp_len;
322
	u16 count;
323
	int i, err;
324 325 326 327 328 329 330 331 332 333

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

334 335 336
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
337
		read_unlock(&hci_dev_list_lock);
338
		return -ENOMEM;
339
	}
340 341 342 343

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
344
	list_for_each_entry(d, &hci_dev_list, list) {
345
		if (test_bit(HCI_SETUP, &d->dev_flags))
346 347
			continue;

348 349 350 351 352 353
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

354
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
355
									rp_len);
356

357 358 359
	kfree(rp);

	return err;
360 361
}

362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_FAST_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
	settings |= MGMT_SETTING_PAIRABLE;

	if (hdev->features[6] & LMP_SIMPLE_PAIR)
		settings |= MGMT_SETTING_SSP;

	if (!(hdev->features[4] & LMP_NO_BREDR)) {
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

380 381 382 383 384 385 386
	if (enable_hs)
		settings |= MGMT_SETTING_HS;

	if (enable_le) {
		if (hdev->features[4] & LMP_LE)
			settings |= MGMT_SETTING_LE;
	}
387 388 389 390 391 392 393 394

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

395
	if (hdev_is_powered(hdev))
396 397
		settings |= MGMT_SETTING_POWERED;

398
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
399 400
		settings |= MGMT_SETTING_CONNECTABLE;

401
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
402 403
		settings |= MGMT_SETTING_DISCOVERABLE;

404
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
405 406 407 408 409
		settings |= MGMT_SETTING_PAIRABLE;

	if (!(hdev->features[4] & LMP_NO_BREDR))
		settings |= MGMT_SETTING_BREDR;

410
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
411 412
		settings |= MGMT_SETTING_LE;

413
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
414 415
		settings |= MGMT_SETTING_LINK_SECURITY;

416
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
417 418
		settings |= MGMT_SETTING_SSP;

419 420 421
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

422 423 424
	return settings;
}

425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534
#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

535
	if (!hdev_is_powered(hdev))
536 537
		return 0;

538 539 540
	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

541
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
542 543
		return 0;

544
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];
573
	int err;
574 575 576

	BT_DBG("%s", hdev->name);

577
	if (!hdev_is_powered(hdev))
578 579
		return 0;

580
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
581 582 583 584 585 586 587 588 589
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

590 591 592 593 594
	err = hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
	if (err == 0)
		set_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

	return err;
595 596
}

597 598 599 600 601
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
							service_cache.work);

602
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
603 604 605 606 607 608 609 610 611 612
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

613
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
614
{
615 616 617
	if (!test_and_clear_bit(HCI_PI_MGMT_INIT, &hci_pi(sk)->flags))
		return;

618
	if (!test_and_set_bit(HCI_MGMT, &hdev->dev_flags)) {
619 620
		INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);

621 622 623 624 625 626 627
		/* Non-mgmt controlled devices get this bit set
		 * implicitly so that pairing works for them, however
		 * for mgmt we require user-space to explicitly enable
		 * it
		 */
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
	}
628 629
}

630
static int read_controller_info(struct sock *sk, struct hci_dev *hdev)
631
{
632
	struct mgmt_rp_read_info rp;
633

634
	BT_DBG("sock %p %s", sk, hdev->name);
635

636
	hci_dev_lock(hdev);
637

638 639
	memset(&rp, 0, sizeof(rp));

640
	bacpy(&rp.bdaddr, &hdev->bdaddr);
641

642
	rp.version = hdev->hci_ver;
643

644 645 646 647
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
648

649
	memcpy(rp.dev_class, hdev->dev_class, 3);
650

651
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
652
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
653

654
	hci_dev_unlock(hdev);
655

656 657
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
								sizeof(rp));
658 659
}

660 661 662
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
663
	kfree(cmd->param);
664 665 666
	kfree(cmd);
}

667
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
668 669
							struct hci_dev *hdev,
							void *data, u16 len)
670 671 672 673 674
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
675
		return NULL;
676 677

	cmd->opcode = opcode;
678
	cmd->index = hdev->id;
679

680 681
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
682
		kfree(cmd);
683
		return NULL;
684 685
	}

686 687
	if (data)
		memcpy(cmd->param, data, len);
688 689 690 691

	cmd->sk = sk;
	sock_hold(sk);

692
	list_add(&cmd->list, &hdev->mgmt_pending);
693

694
	return cmd;
695 696
}

697
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
698 699 700 701 702
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

703
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
704 705 706 707
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

708
		if (opcode > 0 && cmd->opcode != opcode)
709 710 711 712 713 714
			continue;

		cb(cmd, data);
	}
}

715
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
716
{
717
	struct pending_cmd *cmd;
718

719
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
720 721
		if (cmd->opcode == opcode)
			return cmd;
722 723 724 725 726
	}

	return NULL;
}

727
static void mgmt_pending_remove(struct pending_cmd *cmd)
728 729 730 731 732
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

733
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
734
{
735
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
736

737 738
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
							sizeof(settings));
739 740
}

741 742
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
743
{
744
	struct mgmt_mode *cp = data;
745
	struct pending_cmd *cmd;
746
	int err;
747

748
	BT_DBG("request for %s", hdev->name);
749

750
	if (len != sizeof(*cp))
751
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
752
						MGMT_STATUS_INVALID_PARAMS);
753

754
	hci_dev_lock(hdev);
755

756 757 758 759 760 761 762 763 764 765
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
			err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
			mgmt_powered(hdev, 1);
			goto failed;
		}
	}

766
	if (!!cp->val == hdev_is_powered(hdev)) {
767
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
768 769 770
		goto failed;
	}

771
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
772
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
773
							MGMT_STATUS_BUSY);
774 775 776
		goto failed;
	}

777
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
778 779
	if (!cmd) {
		err = -ENOMEM;
780
		goto failed;
781
	}
782

783
	if (cp->val)
784
		schedule_work(&hdev->power_on);
785
	else
786
		schedule_work(&hdev->power_off.work);
787

788
	err = 0;
789 790

failed:
791
	hci_dev_unlock(hdev);
792
	return err;
793 794
}

795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

816 817 818
	/* Time stamp */
	__net_timestamp(skb);

819 820 821 822 823 824 825 826 827 828 829 830 831 832 833
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

834 835
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
836
{
837
	struct mgmt_cp_set_discoverable *cp = data;
838
	struct pending_cmd *cmd;
839
	u16 timeout;
840 841 842
	u8 scan;
	int err;

843
	BT_DBG("request for %s", hdev->name);
844

845
	if (len != sizeof(*cp))
846
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
847
						MGMT_STATUS_INVALID_PARAMS);
848

849 850
	timeout = get_unaligned_le16(&cp->timeout);
	if (!cp->val && timeout > 0)
851
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
852
						MGMT_STATUS_INVALID_PARAMS);
853

854
	hci_dev_lock(hdev);
855

856
	if (!hdev_is_powered(hdev) && timeout > 0) {
857
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
858
						MGMT_STATUS_NOT_POWERED);
859 860 861
		goto failed;
	}

862 863
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
864
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
865
							MGMT_STATUS_BUSY);
866 867 868
		goto failed;
	}

869
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
870
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
871 872 873 874 875
							MGMT_STATUS_REJECTED);
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
876 877 878 879 880 881 882
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

883
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
884 885 886 887 888 889
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

890 891 892 893
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
894 895 896 897 898 899 900 901 902 903 904
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

905
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
906 907 908
		goto failed;
	}

909
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
910 911
	if (!cmd) {
		err = -ENOMEM;
912
		goto failed;
913
	}
914 915 916

	scan = SCAN_PAGE;

917
	if (cp->val)
918
		scan |= SCAN_INQUIRY;
919
	else
920
		cancel_delayed_work(&hdev->discov_off);
921 922 923

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
924
		mgmt_pending_remove(cmd);
925

926
	if (cp->val)
927
		hdev->discov_timeout = timeout;
928

929
failed:
930
	hci_dev_unlock(hdev);
931 932 933
	return err;
}

934 935
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
936
{
937
	struct mgmt_mode *cp = data;
938
	struct pending_cmd *cmd;
939 940 941
	u8 scan;
	int err;

942
	BT_DBG("request for %s", hdev->name);
943

944
	if (len != sizeof(*cp))
945
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
946
						MGMT_STATUS_INVALID_PARAMS);
947

948
	hci_dev_lock(hdev);
949

950
	if (!hdev_is_powered(hdev)) {
951 952 953 954 955
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

956
		if (cp->val) {
957
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
958
		} else {
959 960 961
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
962

963
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
964 965 966 967 968 969
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

970 971 972
		goto failed;
	}

973 974
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
975
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
976
							MGMT_STATUS_BUSY);
977 978 979
		goto failed;
	}

980
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
981
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
982 983 984
		goto failed;
	}

985
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
986 987
	if (!cmd) {
		err = -ENOMEM;
988
		goto failed;
989
	}
990

991
	if (cp->val) {
992
		scan = SCAN_PAGE;
993
	} else {
994 995
		scan = 0;

996 997 998 999 1000
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
						hdev->discov_timeout > 0)
			cancel_delayed_work(&hdev->discov_off);
	}

1001 1002
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1003
		mgmt_pending_remove(cmd);
1004 1005

failed:
1006
	hci_dev_unlock(hdev);
1007 1008 1009
	return err;
}

1010 1011
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1012
{
1013
	struct mgmt_mode *cp = data;
1014 1015
	int err;

1016
	BT_DBG("request for %s", hdev->name);
1017

1018
	if (len != sizeof(*cp))
1019
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
1020
						MGMT_STATUS_INVALID_PARAMS);
1021

1022
	hci_dev_lock(hdev);
1023 1024

	if (cp->val)
1025
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1026
	else
1027
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1028

1029
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1030 1031 1032
	if (err < 0)
		goto failed;

1033
	err = new_settings(hdev, sk);
1034 1035

failed:
1036
	hci_dev_unlock(hdev);
1037 1038 1039
	return err;
}

1040 1041
static int set_link_security(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
1042 1043 1044
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1045
	u8 val;
1046 1047
	int err;

1048
	BT_DBG("request for %s", hdev->name);
1049 1050

	if (len != sizeof(*cp))
1051
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1052 1053 1054 1055
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

1056
	if (!hdev_is_powered(hdev)) {
1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
							&hdev->dev_flags)) {
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1072 1073 1074 1075
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1076
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104
							MGMT_STATUS_BUSY);
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1105
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1106 1107 1108
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1109
	u8 val;
1110 1111
	int err;

1112
	BT_DBG("request for %s", hdev->name);
1113 1114

	if (len != sizeof(*cp))
1115
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1116 1117 1118 1119
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

1120
	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
1121
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
1122 1123 1124 1125
						MGMT_STATUS_NOT_SUPPORTED);
		goto failed;
	}

1126 1127
	val = !!cp->val;

1128
	if (!hdev_is_powered(hdev)) {
1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1143 1144 1145 1146
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1147 1148
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
							MGMT_STATUS_BUSY);
1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1174
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1175 1176 1177
{
	struct mgmt_mode *cp = data;

1178
	BT_DBG("request for %s", hdev->name);
1179 1180

	if (len != sizeof(*cp))
1181
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1182 1183
						MGMT_STATUS_INVALID_PARAMS);

1184 1185 1186
	if (!enable_hs)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
						MGMT_STATUS_NOT_SUPPORTED);
1187 1188 1189 1190 1191 1192

	if (cp->val)
		set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
	else
		clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);

1193
	return send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1194 1195
}

1196
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1197 1198 1199 1200 1201
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
	int err;
1202
	u8 val, enabled;
1203

1204
	BT_DBG("request for %s", hdev->name);
1205 1206

	if (len != sizeof(*cp))
1207
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1208 1209
						MGMT_STATUS_INVALID_PARAMS);

1210 1211
	hci_dev_lock(hdev);

1212
	if (!enable_le || !(hdev->features[4] & LMP_LE)) {
1213
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1214
						MGMT_STATUS_NOT_SUPPORTED);
1215
		goto unlock;
1216 1217 1218
	}

	val = !!cp->val;
1219
	enabled = !!(hdev->host_features[0] & LMP_HOST_LE);
1220

1221
	if (!hdev_is_powered(hdev) || val == enabled) {
1222 1223 1224 1225 1226 1227 1228 1229 1230
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1231
			goto unlock;
1232 1233 1234 1235

		if (changed)
			err = new_settings(hdev, sk);

1236
		goto unlock;
1237 1238 1239
	}

	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
1240 1241
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
							MGMT_STATUS_BUSY);
1242
		goto unlock;
1243 1244 1245 1246 1247
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1248
		goto unlock;
1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
		hci_cp.simul = !!(hdev->features[6] & LMP_SIMUL_LE_BR);
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED,
						sizeof(hci_cp), &hci_cp);
	if (err < 0) {
		mgmt_pending_remove(cmd);
1262
		goto unlock;
1263 1264
	}

1265 1266
unlock:
	hci_dev_unlock(hdev);
1267 1268 1269
	return err;
}

1270
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1271
{
1272
	struct mgmt_cp_add_uuid *cp = data;
1273
	struct pending_cmd *cmd;
1274 1275 1276
	struct bt_uuid *uuid;
	int err;

1277
	BT_DBG("request for %s", hdev->name);
1278

1279
	if (len != sizeof(*cp))
1280
		return cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1281
						MGMT_STATUS_INVALID_PARAMS);
1282

1283
	hci_dev_lock(hdev);
1284

1285
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1286
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1287 1288 1289 1290
							MGMT_STATUS_BUSY);
		goto failed;
	}

1291 1292 1293 1294 1295 1296 1297
	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1298
	uuid->svc_hint = cp->svc_hint;
1299 1300 1301

	list_add(&uuid->list, &hdev->uuids);

1302 1303 1304 1305
	err = update_class(hdev);
	if (err < 0)
		goto failed;

1306 1307 1308 1309
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

1310
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1311
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1312 1313 1314 1315 1316 1317 1318 1319 1320
							hdev->dev_class, 3);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}
1321 1322

failed:
1323
	hci_dev_unlock(hdev);
1324 1325 1326
	return err;
}

1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
		schedule_delayed_work(&hdev->service_cache,
				msecs_to_jiffies(SERVICE_CACHE_TIMEOUT));
		return true;
	}

	return false;
}

1341 1342
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1343
{
1344
	struct mgmt_cp_remove_uuid *cp = data;
1345
	struct pending_cmd *cmd;
1346 1347 1348 1349
	struct list_head *p, *n;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

1350
	BT_DBG("request for %s", hdev->name);
1351

1352
	if (len != sizeof(*cp))
1353
		return cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1354
						MGMT_STATUS_INVALID_PARAMS);
1355

1356
	hci_dev_lock(hdev);
1357

1358
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1359
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1360 1361 1362 1363
							MGMT_STATUS_BUSY);
		goto unlock;
	}

1364 1365
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1366

1367
		if (enable_service_cache(hdev)) {
1368 1369
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
							0, hdev->dev_class, 3);
1370 1371
			goto unlock;
		}
1372

1373
		goto update_class;
1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
1389
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1390
						MGMT_STATUS_INVALID_PARAMS);
1391 1392 1393
		goto unlock;
	}

1394
update_class:
1395 1396 1397 1398
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

1399 1400 1401 1402
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

1403
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1404
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1405
							hdev->dev_class, 3);
1406 1407 1408 1409 1410 1411 1412 1413
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}
1414 1415

unlock:
1416
	hci_dev_unlock(hdev);
1417 1418 1419
	return err;
}

1420 1421
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1422
{
1423
	struct mgmt_cp_set_dev_class *cp = data;
1424
	struct pending_cmd *cmd;
1425 1426
	int err;

1427
	BT_DBG("request for %s", hdev->name);
1428

1429
	if (len != sizeof(*cp))
1430
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
1431
						MGMT_STATUS_INVALID_PARAMS);
1432

1433
	hci_dev_lock(hdev);
1434

1435
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1436
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
1437 1438 1439 1440
							MGMT_STATUS_BUSY);
		goto unlock;
	}

1441 1442 1443
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1444
	if (!hdev_is_powered(hdev)) {
1445
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1446
							hdev->dev_class, 3);
1447 1448 1449
		goto unlock;
	}

1450
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1451 1452 1453
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1454
		update_eir(hdev);
1455
	}
1456

1457
	err = update_class(hdev);
1458 1459
	if (err < 0)
		goto unlock;
1460

1461
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1462
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1463
							hdev->dev_class, 3);
1464 1465 1466 1467 1468 1469 1470 1471
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}
1472

1473
unlock:
1474
	hci_dev_unlock(hdev);
1475 1476 1477
	return err;
}

1478 1479
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1480
{
1481
	struct mgmt_cp_load_link_keys *cp = data;
1482
	u16 key_count, expected_len;
1483
	int i;
1484

1485
	if (len < sizeof(*cp))
1486
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1487
						MGMT_STATUS_INVALID_PARAMS);
1488

1489 1490
	key_count = get_unaligned_le16(&cp->key_count);

1491 1492
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1493
	if (expected_len != len) {
1494
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1495
							len, expected_len);
1496
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1497
						MGMT_STATUS_INVALID_PARAMS);
1498 1499
	}

1500
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1501 1502
								key_count);

1503
	hci_dev_lock(hdev);
1504 1505 1506

	hci_link_keys_clear(hdev);

1507
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1508 1509

	if (cp->debug_keys)
1510
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1511
	else
1512
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1513

1514
	for (i = 0; i < key_count; i++) {
1515
		struct mgmt_link_key_info *key = &cp->keys[i];
1516

1517 1518
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
						key->type, key->pin_len);
1519 1520
	}

1521
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1522

1523
	hci_dev_unlock(hdev);
1524

1525
	return 0;
1526 1527
}

1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 addr_type, struct sock *skip_sk)
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
								skip_sk);
}

1540 1541
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1542
{
1543 1544
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1545 1546
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1547 1548 1549
	struct hci_conn *conn;
	int err;

1550
	if (len != sizeof(*cp))
1551
		return cmd_status(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1552
						MGMT_STATUS_INVALID_PARAMS);
1553

1554
	hci_dev_lock(hdev);
1555

1556
	memset(&rp, 0, sizeof(rp));
1557 1558
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1559

1560
	if (!hdev_is_powered(hdev)) {
1561
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1562 1563 1564 1565 1566
						MGMT_STATUS_NOT_POWERED,
						&rp, sizeof(rp));
		goto unlock;
	}

1567 1568 1569 1570
	if (cp->addr.type == MGMT_ADDR_BREDR)
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1571

1572
	if (err < 0) {
1573
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1574 1575
						MGMT_STATUS_NOT_PAIRED,
						&rp, sizeof(rp));
1576 1577 1578
		goto unlock;
	}

1579 1580 1581
	if (cp->disconnect) {
		if (cp->addr.type == MGMT_ADDR_BREDR)
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1582
							&cp->addr.bdaddr);
1583 1584
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1585
							&cp->addr.bdaddr);
1586 1587 1588
	} else {
		conn = NULL;
	}
1589

1590
	if (!conn) {
1591
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1592
							&rp, sizeof(rp));
1593
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1594 1595
		goto unlock;
	}
1596

1597 1598
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
								sizeof(*cp));
1599 1600 1601
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1602 1603
	}

1604 1605 1606 1607 1608 1609
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1610
unlock:
1611
	hci_dev_unlock(hdev);
1612 1613 1614
	return err;
}

1615 1616
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1617
{
1618
	struct mgmt_cp_disconnect *cp = data;
1619
	struct hci_cp_disconnect dc;
1620
	struct pending_cmd *cmd;
1621 1622 1623 1624 1625
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1626
	if (len != sizeof(*cp))
1627
		return cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1628
						MGMT_STATUS_INVALID_PARAMS);
1629

1630
	hci_dev_lock(hdev);
1631 1632

	if (!test_bit(HCI_UP, &hdev->flags)) {
1633
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1634
						MGMT_STATUS_NOT_POWERED);
1635 1636 1637
		goto failed;
	}

1638
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1639
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1640
							MGMT_STATUS_BUSY);
1641 1642 1643
		goto failed;
	}

1644 1645 1646 1647
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1648

1649
	if (!conn) {
1650
		err = cmd_status(sk, hdev->id, MGMT_OP_DISCONNECT,
1651
						MGMT_STATUS_NOT_CONNECTED);
1652 1653 1654
		goto failed;
	}

1655
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1656 1657
	if (!cmd) {
		err = -ENOMEM;
1658
		goto failed;
1659
	}
1660 1661 1662 1663 1664 1665

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1666
		mgmt_pending_remove(cmd);
1667 1668

failed:
1669
	hci_dev_unlock(hdev);
1670 1671 1672
	return err;
}

1673
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1674 1675 1676
{
	switch (link_type) {
	case LE_LINK:
1677 1678 1679 1680 1681 1682 1683 1684
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1685 1686 1687 1688 1689 1690 1691
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1692
static int get_connections(struct sock *sk, struct hci_dev *hdev)
1693 1694
{
	struct mgmt_rp_get_connections *rp;
1695
	struct hci_conn *c;
1696
	size_t rp_len;
1697 1698
	int err;
	u16 i;
1699 1700 1701

	BT_DBG("");

1702
	hci_dev_lock(hdev);
1703

1704
	if (!hdev_is_powered(hdev)) {
1705
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
1706 1707 1708 1709
						MGMT_STATUS_NOT_POWERED);
		goto unlock;
	}

1710
	i = 0;
1711 1712
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
1713
			i++;
1714 1715
	}

1716
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1717 1718
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1719 1720 1721 1722 1723
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
1724
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1725 1726
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1727
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1728
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1729 1730 1731 1732 1733
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

1734 1735
	put_unaligned_le16(i, &rp->conn_count);

1736 1737
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1738

1739 1740
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
								rp_len);
1741

1742
	kfree(rp);
1743 1744

unlock:
1745
	hci_dev_unlock(hdev);
1746 1747 1748
	return err;
}

1749 1750
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
					struct mgmt_cp_pin_code_neg_reply *cp)
1751 1752 1753 1754
{
	struct pending_cmd *cmd;
	int err;

1755
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1756 1757 1758 1759
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

1760 1761
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
				sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
1762 1763 1764 1765 1766 1767
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1768 1769
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1770
{
1771
	struct hci_conn *conn;
1772
	struct mgmt_cp_pin_code_reply *cp = data;
1773
	struct hci_cp_pin_code_reply reply;
1774
	struct pending_cmd *cmd;
1775 1776 1777 1778
	int err;

	BT_DBG("");

1779
	if (len != sizeof(*cp))
1780
		return cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1781
						MGMT_STATUS_INVALID_PARAMS);
1782

1783
	hci_dev_lock(hdev);
1784

1785
	if (!hdev_is_powered(hdev)) {
1786
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1787
						MGMT_STATUS_NOT_POWERED);
1788 1789 1790
		goto failed;
	}

1791
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
1792
	if (!conn) {
1793
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1794
						MGMT_STATUS_NOT_CONNECTED);
1795 1796 1797 1798
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
1799 1800 1801
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
1802 1803 1804

		BT_ERR("PIN code is not 16 bytes long");

1805
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
1806
		if (err >= 0)
1807
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1808
						MGMT_STATUS_INVALID_PARAMS);
1809 1810 1811 1812

		goto failed;
	}

1813
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1814 1815
	if (!cmd) {
		err = -ENOMEM;
1816
		goto failed;
1817
	}
1818

1819
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
1820
	reply.pin_len = cp->pin_len;
1821
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1822 1823 1824

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1825
		mgmt_pending_remove(cmd);
1826 1827

failed:
1828
	hci_dev_unlock(hdev);
1829 1830 1831
	return err;
}

1832 1833
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
1834
{
1835
	struct mgmt_cp_pin_code_neg_reply *cp = data;
1836 1837 1838 1839
	int err;

	BT_DBG("");

1840
	if (len != sizeof(*cp))
1841
		return cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
1842
						MGMT_STATUS_INVALID_PARAMS);
1843

1844
	hci_dev_lock(hdev);
1845

1846
	if (!hdev_is_powered(hdev)) {
1847
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
1848
						MGMT_STATUS_NOT_POWERED);
1849 1850 1851
		goto failed;
	}

1852
	err = send_pin_code_neg_reply(sk, hdev, cp);
1853 1854

failed:
1855
	hci_dev_unlock(hdev);
1856 1857 1858
	return err;
}

1859 1860
static int set_io_capability(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
1861
{
1862
	struct mgmt_cp_set_io_capability *cp = data;
1863 1864 1865

	BT_DBG("");

1866
	if (len != sizeof(*cp))
1867
		return cmd_status(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY,
1868
						MGMT_STATUS_INVALID_PARAMS);
1869

1870
	hci_dev_lock(hdev);
1871 1872 1873 1874

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1875
							hdev->io_capability);
1876

1877
	hci_dev_unlock(hdev);
1878

1879 1880
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0,
								NULL, 0);
1881 1882
}

1883 1884 1885
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1886
	struct pending_cmd *cmd;
1887

1888
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1906 1907
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1908

1909 1910
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
							&rp, sizeof(rp));
1911 1912 1913 1914 1915 1916 1917 1918

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1919
	mgmt_pending_remove(cmd);
1920 1921 1922 1923 1924 1925 1926 1927 1928
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1929
	if (!cmd)
1930
		BT_DBG("Unable to find a pending command");
1931
	else
1932
		pairing_complete(cmd, mgmt_status(status));
1933 1934
}

1935 1936
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
1937
{
1938
	struct mgmt_cp_pair_device *cp = data;
1939
	struct mgmt_rp_pair_device rp;
1940 1941 1942 1943 1944 1945 1946
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1947
	if (len != sizeof(*cp))
1948
		return cmd_status(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1949
						MGMT_STATUS_INVALID_PARAMS);
1950

1951
	hci_dev_lock(hdev);
1952

1953
	if (!hdev_is_powered(hdev)) {
1954
		err = cmd_status(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1955 1956 1957 1958
						MGMT_STATUS_NOT_POWERED);
		goto unlock;
	}

1959 1960
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1961
		auth_type = HCI_AT_DEDICATED_BONDING;
1962
	else
1963 1964
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1965 1966
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1967 1968
								auth_type);
	else
1969
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1970 1971
								auth_type);

1972 1973 1974 1975
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1976
	if (IS_ERR(conn)) {
1977
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1978 1979
						MGMT_STATUS_CONNECT_FAILED,
						&rp, sizeof(rp));
1980 1981 1982 1983 1984
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1985
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
1986
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
1987 1988 1989
		goto unlock;
	}

1990
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1991 1992 1993 1994 1995 1996
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1997
	/* For LE, just connecting isn't a proof that the pairing finished */
1998
	if (cp->addr.type == MGMT_ADDR_BREDR)
1999 2000
		conn->connect_cfm_cb = pairing_complete_cb;

2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2013
	hci_dev_unlock(hdev);
2014 2015 2016
	return err;
}

2017
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev,
2018 2019 2020 2021 2022 2023 2024 2025 2026 2027
						unsigned char *data, u16 len)
{
	struct mgmt_addr_info *addr = (void *) data;
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	if (len != sizeof(*addr))
2028
		return cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2029 2030 2031 2032
						MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

2033
	if (!hdev_is_powered(hdev)) {
2034
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2035 2036 2037 2038
						MGMT_STATUS_NOT_POWERED);
		goto unlock;
	}

2039 2040
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2041
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2042 2043 2044 2045 2046 2047 2048
						MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2049
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2050 2051 2052 2053 2054 2055
						MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2056 2057
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
							addr, sizeof(*addr));
2058 2059 2060 2061 2062
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2063 2064 2065
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
				bdaddr_t *bdaddr, u8 type, u16 mgmt_op,
				u16 hci_op, __le32 passkey)
2066 2067
{
	struct pending_cmd *cmd;
2068
	struct hci_conn *conn;
2069 2070
	int err;

2071
	hci_dev_lock(hdev);
2072

2073
	if (!hdev_is_powered(hdev)) {
2074 2075
		err = cmd_status(sk, hdev->id, mgmt_op,
						MGMT_STATUS_NOT_POWERED);
2076
		goto done;
2077 2078
	}

2079 2080 2081
	if (type == MGMT_ADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	else
2082
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
2083 2084

	if (!conn) {
2085
		err = cmd_status(sk, hdev->id, mgmt_op,
2086
						MGMT_STATUS_NOT_CONNECTED);
2087 2088
		goto done;
	}
2089

2090
	if (type == MGMT_ADDR_LE_PUBLIC || type == MGMT_ADDR_LE_RANDOM) {
2091
		/* Continue with pairing via SMP */
2092 2093 2094
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2095
			err = cmd_status(sk, hdev->id, mgmt_op,
2096 2097
							MGMT_STATUS_SUCCESS);
		else
2098
			err = cmd_status(sk, hdev->id, mgmt_op,
2099
							MGMT_STATUS_FAILED);
2100 2101 2102 2103

		goto done;
	}

2104
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
2105 2106
	if (!cmd) {
		err = -ENOMEM;
2107
		goto done;
2108 2109
	}

2110
	/* Continue with pairing via HCI */
2111 2112 2113 2114 2115 2116 2117 2118 2119
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

2120 2121
	if (err < 0)
		mgmt_pending_remove(cmd);
2122

2123
done:
2124
	hci_dev_unlock(hdev);
2125 2126 2127
	return err;
}

2128 2129
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2130
{
2131
	struct mgmt_cp_user_confirm_reply *cp = data;
2132 2133 2134 2135

	BT_DBG("");

	if (len != sizeof(*cp))
2136
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2137 2138
						MGMT_STATUS_INVALID_PARAMS);

2139
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2140 2141
						MGMT_OP_USER_CONFIRM_REPLY,
						HCI_OP_USER_CONFIRM_REPLY, 0);
2142 2143
}

2144 2145
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2146
{
2147
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2148 2149 2150 2151

	BT_DBG("");

	if (len != sizeof(*cp))
2152
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_NEG_REPLY,
2153 2154
						MGMT_STATUS_INVALID_PARAMS);

2155
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2156 2157
					MGMT_OP_USER_CONFIRM_NEG_REPLY,
					HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2158 2159
}

2160 2161
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2162
{
2163
	struct mgmt_cp_user_passkey_reply *cp = data;
2164 2165 2166 2167

	BT_DBG("");

	if (len != sizeof(*cp))
2168
		return cmd_status(sk, hdev->id, MGMT_OP_USER_PASSKEY_REPLY,
2169 2170
									EINVAL);

2171
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2172 2173 2174
						MGMT_OP_USER_PASSKEY_REPLY,
						HCI_OP_USER_PASSKEY_REPLY,
						cp->passkey);
2175 2176
}

2177 2178
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2179
{
2180
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2181 2182 2183 2184

	BT_DBG("");

	if (len != sizeof(*cp))
2185 2186
		return cmd_status(sk, hdev->id, MGMT_OP_USER_PASSKEY_NEG_REPLY,
								EINVAL);
2187

2188
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2189 2190
					MGMT_OP_USER_PASSKEY_NEG_REPLY,
					HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2191 2192
}

2193
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2194 2195
								u16 len)
{
2196
	struct mgmt_cp_set_local_name *mgmt_cp = data;
2197 2198 2199 2200 2201 2202 2203
	struct hci_cp_write_local_name hci_cp;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
2204
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2205
						MGMT_STATUS_INVALID_PARAMS);
2206

2207
	hci_dev_lock(hdev);
2208

2209 2210 2211
	memcpy(hdev->short_name, mgmt_cp->short_name,
						sizeof(hdev->short_name));

2212
	if (!hdev_is_powered(hdev)) {
2213 2214 2215 2216 2217 2218 2219 2220 2221 2222
		memcpy(hdev->dev_name, mgmt_cp->name, sizeof(hdev->dev_name));

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
								data, len);
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
									sk);

2223 2224 2225
		goto failed;
	}

2226
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2239
	hci_dev_unlock(hdev);
2240 2241 2242
	return err;
}

2243
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev)
2244 2245 2246 2247
{
	struct pending_cmd *cmd;
	int err;

2248
	BT_DBG("%s", hdev->name);
2249

2250
	hci_dev_lock(hdev);
2251

2252
	if (!hdev_is_powered(hdev)) {
2253
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2254
						MGMT_STATUS_NOT_POWERED);
2255 2256 2257 2258
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
2259
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2260
						MGMT_STATUS_NOT_SUPPORTED);
2261 2262 2263
		goto unlock;
	}

2264
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2265
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2266
							MGMT_STATUS_BUSY);
2267 2268 2269
		goto unlock;
	}

2270
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2271 2272 2273 2274 2275 2276 2277 2278 2279 2280
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2281
	hci_dev_unlock(hdev);
2282 2283 2284
	return err;
}

2285 2286
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2287
{
2288
	struct mgmt_cp_add_remote_oob_data *cp = data;
2289
	u8 status;
2290 2291
	int err;

2292
	BT_DBG("%s ", hdev->name);
2293 2294

	if (len != sizeof(*cp))
2295
		return cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
2296
						MGMT_STATUS_INVALID_PARAMS);
2297

2298
	hci_dev_lock(hdev);
2299

2300
	if (!hdev_is_powered(hdev)) {
2301
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
2302 2303 2304 2305 2306
						MGMT_STATUS_NOT_POWERED,
						&cp->addr, sizeof(cp->addr));
		goto unlock;
	}

2307
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2308 2309
								cp->randomizer);
	if (err < 0)
2310
		status = MGMT_STATUS_FAILED;
2311
	else
2312 2313
		status = 0;

2314
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2315
						&cp->addr, sizeof(cp->addr));
2316

2317
unlock:
2318
	hci_dev_unlock(hdev);
2319 2320 2321
	return err;
}

2322
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2323
						void *data, u16 len)
2324
{
2325
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2326
	u8 status;
2327 2328
	int err;

2329
	BT_DBG("%s", hdev->name);
2330 2331

	if (len != sizeof(*cp))
2332
		return cmd_status(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2333
						MGMT_STATUS_INVALID_PARAMS);
2334

2335
	hci_dev_lock(hdev);
2336

2337
	if (!hdev_is_powered(hdev)) {
2338 2339 2340 2341
		err = cmd_complete(sk, hdev->id,
					MGMT_OP_REMOVE_REMOTE_OOB_DATA,
					MGMT_STATUS_NOT_POWERED,
					&cp->addr, sizeof(cp->addr));
2342 2343 2344
		goto unlock;
	}

2345
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2346
	if (err < 0)
2347
		status = MGMT_STATUS_INVALID_PARAMS;
2348
	else
2349 2350
		status = 0;

2351 2352
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
					status, &cp->addr, sizeof(cp->addr));
2353

2354
unlock:
2355
	hci_dev_unlock(hdev);
2356 2357 2358
	return err;
}

2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375
int mgmt_interleaved_discovery(struct hci_dev *hdev)
{
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR_LE);
	if (err < 0)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	hci_dev_unlock(hdev);

	return err;
}

2376
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2377
						void *data, u16 len)
2378
{
2379
	struct mgmt_cp_start_discovery *cp = data;
2380 2381 2382
	struct pending_cmd *cmd;
	int err;

2383
	BT_DBG("%s", hdev->name);
2384

2385
	if (len != sizeof(*cp))
2386
		return cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2387
						MGMT_STATUS_INVALID_PARAMS);
2388

2389
	hci_dev_lock(hdev);
2390

2391
	if (!hdev_is_powered(hdev)) {
2392
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2393
						MGMT_STATUS_NOT_POWERED);
2394 2395 2396
		goto failed;
	}

2397
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2398 2399
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
							MGMT_STATUS_BUSY);
2400 2401 2402
		goto failed;
	}

2403
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2404 2405 2406 2407 2408
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2409 2410 2411
	hdev->discovery.type = cp->type;

	switch (hdev->discovery.type) {
2412
	case DISCOV_TYPE_BREDR:
2413 2414 2415 2416
		if (lmp_bredr_capable(hdev))
			err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
		else
			err = -ENOTSUPP;
2417 2418 2419
		break;

	case DISCOV_TYPE_LE:
2420 2421
		if (lmp_host_le_capable(hdev))
			err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
2422
					LE_SCAN_WIN, LE_SCAN_TIMEOUT_LE_ONLY);
2423 2424
		else
			err = -ENOTSUPP;
2425 2426
		break;

2427
	case DISCOV_TYPE_INTERLEAVED:
2428 2429 2430 2431 2432
		if (lmp_host_le_capable(hdev) && lmp_bredr_capable(hdev))
			err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
					LE_SCAN_WIN, LE_SCAN_TIMEOUT_BREDR_LE);
		else
			err = -ENOTSUPP;
2433 2434
		break;

2435
	default:
2436
		err = -EINVAL;
2437
	}
2438

2439 2440
	if (err < 0)
		mgmt_pending_remove(cmd);
2441 2442
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2443 2444

failed:
2445
	hci_dev_unlock(hdev);
2446 2447 2448
	return err;
}

2449 2450
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
2451
{
2452
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2453
	struct pending_cmd *cmd;
2454 2455
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2456 2457
	int err;

2458
	BT_DBG("%s", hdev->name);
2459

2460
	if (len != sizeof(*mgmt_cp))
2461
		return cmd_status(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2462
						MGMT_STATUS_INVALID_PARAMS);
2463

2464
	hci_dev_lock(hdev);
2465

2466
	if (!hci_discovery_active(hdev)) {
2467
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2468 2469 2470 2471 2472 2473
					MGMT_STATUS_REJECTED,
					&mgmt_cp->type, sizeof(mgmt_cp->type));
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2474
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2475 2476
					MGMT_STATUS_INVALID_PARAMS,
					&mgmt_cp->type, sizeof(mgmt_cp->type));
2477
		goto unlock;
2478 2479
	}

2480
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2481 2482
	if (!cmd) {
		err = -ENOMEM;
2483 2484 2485
		goto unlock;
	}

2486
	if (hdev->discovery.state == DISCOVERY_FINDING) {
2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497
		err = hci_cancel_inquiry(hdev);
		if (err < 0)
			mgmt_pending_remove(cmd);
		else
			hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
		goto unlock;
	}

	e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY, NAME_PENDING);
	if (!e) {
		mgmt_pending_remove(cmd);
2498
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY, 0,
2499
					&mgmt_cp->type, sizeof(mgmt_cp->type));
2500 2501
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
		goto unlock;
2502 2503
	}

2504 2505 2506
	bacpy(&cp.bdaddr, &e->data.bdaddr);
	err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
							sizeof(cp), &cp);
2507 2508
	if (err < 0)
		mgmt_pending_remove(cmd);
2509 2510
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2511

2512
unlock:
2513
	hci_dev_unlock(hdev);
2514 2515 2516
	return err;
}

2517 2518
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
2519
{
2520
	struct mgmt_cp_confirm_name *cp = data;
2521 2522 2523
	struct inquiry_entry *e;
	int err;

2524
	BT_DBG("%s", hdev->name);
2525 2526

	if (len != sizeof(*cp))
2527 2528
		return cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
						MGMT_STATUS_INVALID_PARAMS);
2529 2530 2531

	hci_dev_lock(hdev);

2532
	if (!hci_discovery_active(hdev)) {
2533
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2534 2535 2536 2537
							MGMT_STATUS_FAILED);
		goto failed;
	}

2538
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
2539
	if (!e) {
2540 2541
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
						MGMT_STATUS_INVALID_PARAMS);
2542 2543 2544 2545 2546 2547 2548 2549
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2550
		hci_inquiry_cache_update_resolve(hdev, e);
2551 2552 2553 2554 2555 2556 2557 2558 2559
	}

	err = 0;

failed:
	hci_dev_unlock(hdev);
	return err;
}

2560 2561
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
2562
{
2563
	struct mgmt_cp_block_device *cp = data;
2564
	u8 status;
2565 2566
	int err;

2567
	BT_DBG("%s", hdev->name);
2568 2569

	if (len != sizeof(*cp))
2570
		return cmd_status(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
2571
						MGMT_STATUS_INVALID_PARAMS);
2572

2573
	hci_dev_lock(hdev);
2574

2575
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2576
	if (err < 0)
2577
		status = MGMT_STATUS_FAILED;
2578
	else
2579 2580
		status = 0;

2581
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
2582
						&cp->addr, sizeof(cp->addr));
2583

2584
	hci_dev_unlock(hdev);
2585 2586 2587 2588

	return err;
}

2589 2590
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
								u16 len)
2591
{
2592
	struct mgmt_cp_unblock_device *cp = data;
2593
	u8 status;
2594 2595
	int err;

2596
	BT_DBG("%s", hdev->name);
2597 2598

	if (len != sizeof(*cp))
2599
		return cmd_status(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
2600
						MGMT_STATUS_INVALID_PARAMS);
2601

2602
	hci_dev_lock(hdev);
2603

2604
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
2605
	if (err < 0)
2606
		status = MGMT_STATUS_INVALID_PARAMS;
2607
	else
2608 2609
		status = 0;

2610
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
2611
						&cp->addr, sizeof(cp->addr));
2612

2613
	hci_dev_unlock(hdev);
2614 2615 2616 2617

	return err;
}

2618 2619
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
							void *data, u16 len)
2620
{
2621
	struct mgmt_mode *cp = data;
2622 2623 2624 2625
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

2626
	BT_DBG("%s", hdev->name);
2627 2628

	if (len != sizeof(*cp))
2629
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2630
						MGMT_STATUS_INVALID_PARAMS);
2631

2632
	if (!hdev_is_powered(hdev))
2633
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2634 2635 2636
						MGMT_STATUS_NOT_POWERED);

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
2637 2638
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
						MGMT_STATUS_REJECTED);
2639 2640 2641

	hci_dev_lock(hdev);

2642
	if (cp->val) {
2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
2655 2656
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
						MGMT_STATUS_FAILED);
2657 2658 2659 2660 2661
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
2662 2663
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
						MGMT_STATUS_FAILED);
2664 2665 2666
		goto done;
	}

2667
	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, 0,
2668
								NULL, 0);
2669 2670 2671 2672 2673
done:
	hci_dev_unlock(hdev);
	return err;
}

2674
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
2675 2676 2677 2678 2679 2680 2681
					void *cp_data, u16 len)
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
	int i;

	if (len < sizeof(*cp))
2682
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
2683 2684 2685 2686 2687 2688 2689 2690 2691
								EINVAL);

	key_count = get_unaligned_le16(&cp->key_count);

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
							len, expected_len);
2692
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
2693 2694 2695
								EINVAL);
	}

2696
	BT_DBG("%s key_count %u", hdev->name, key_count);
2697 2698 2699 2700 2701 2702 2703 2704 2705 2706 2707 2708 2709 2710 2711 2712 2713 2714 2715 2716 2717 2718 2719 2720

	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

		hci_add_ltk(hdev, &key->addr.bdaddr, key->addr.type,
					type, 0, key->authenticated, key->val,
					key->enc_size, key->ediv, key->rand);
	}

	hci_dev_unlock(hdev);

	return 0;
}

2721 2722
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
2723 2724
	void *buf;
	u8 *cp;
2725
	struct mgmt_hdr *hdr;
2726
	u16 opcode, index, len;
2727
	struct hci_dev *hdev = NULL;
2728 2729 2730 2731 2732 2733 2734
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2735
	buf = kmalloc(msglen, GFP_KERNEL);
2736 2737 2738 2739 2740 2741 2742 2743
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

2744
	hdr = buf;
2745
	opcode = get_unaligned_le16(&hdr->opcode);
2746
	index = get_unaligned_le16(&hdr->index);
2747 2748 2749 2750 2751 2752 2753
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766
	if (opcode < MGMT_OP_READ_INFO) {
		if (index != MGMT_INDEX_NONE) {
			err = cmd_status(sk, index, opcode,
						MGMT_STATUS_INVALID_PARAMS);
			goto done;
		}
	} else {
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
						MGMT_STATUS_INVALID_PARAMS);
			goto done;
		}
2767 2768

		mgmt_init_hdev(sk, hdev);
2769 2770
	}

2771 2772
	cp = buf + sizeof(*hdr);

2773
	switch (opcode) {
2774 2775 2776
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2777 2778 2779
	case MGMT_OP_READ_COMMANDS:
		err = read_commands(sk);
		break;
2780 2781 2782
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2783
	case MGMT_OP_READ_INFO:
2784
		err = read_controller_info(sk, hdev);
2785
		break;
2786
	case MGMT_OP_SET_POWERED:
2787
		err = set_powered(sk, hdev, cp, len);
2788
		break;
2789
	case MGMT_OP_SET_DISCOVERABLE:
2790
		err = set_discoverable(sk, hdev, cp, len);
2791
		break;
2792
	case MGMT_OP_SET_CONNECTABLE:
2793
		err = set_connectable(sk, hdev, cp, len);
2794
		break;
2795
	case MGMT_OP_SET_FAST_CONNECTABLE:
2796
		err = set_fast_connectable(sk, hdev, cp, len);
2797
		break;
2798
	case MGMT_OP_SET_PAIRABLE:
2799
		err = set_pairable(sk, hdev, cp, len);
2800
		break;
2801
	case MGMT_OP_SET_LINK_SECURITY:
2802
		err = set_link_security(sk, hdev, cp, len);
2803
		break;
2804
	case MGMT_OP_SET_SSP:
2805
		err = set_ssp(sk, hdev, cp, len);
2806
		break;
2807
	case MGMT_OP_SET_HS:
2808
		err = set_hs(sk, hdev, cp, len);
2809
		break;
2810
	case MGMT_OP_SET_LE:
2811
		err = set_le(sk, hdev, cp, len);
2812
		break;
2813
	case MGMT_OP_ADD_UUID:
2814
		err = add_uuid(sk, hdev, cp, len);
2815 2816
		break;
	case MGMT_OP_REMOVE_UUID:
2817
		err = remove_uuid(sk, hdev, cp, len);
2818
		break;
2819
	case MGMT_OP_SET_DEV_CLASS:
2820
		err = set_dev_class(sk, hdev, cp, len);
2821
		break;
2822
	case MGMT_OP_LOAD_LINK_KEYS:
2823
		err = load_link_keys(sk, hdev, cp, len);
2824
		break;
2825
	case MGMT_OP_DISCONNECT:
2826
		err = disconnect(sk, hdev, cp, len);
2827
		break;
2828
	case MGMT_OP_GET_CONNECTIONS:
2829
		err = get_connections(sk, hdev);
2830
		break;
2831
	case MGMT_OP_PIN_CODE_REPLY:
2832
		err = pin_code_reply(sk, hdev, cp, len);
2833 2834
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2835
		err = pin_code_neg_reply(sk, hdev, cp, len);
2836
		break;
2837
	case MGMT_OP_SET_IO_CAPABILITY:
2838
		err = set_io_capability(sk, hdev, cp, len);
2839
		break;
2840
	case MGMT_OP_PAIR_DEVICE:
2841
		err = pair_device(sk, hdev, cp, len);
2842
		break;
2843
	case MGMT_OP_CANCEL_PAIR_DEVICE:
2844
		err = cancel_pair_device(sk, hdev, buf + sizeof(*hdr), len);
2845
		break;
2846
	case MGMT_OP_UNPAIR_DEVICE:
2847
		err = unpair_device(sk, hdev, cp, len);
2848
		break;
2849
	case MGMT_OP_USER_CONFIRM_REPLY:
2850
		err = user_confirm_reply(sk, hdev, cp, len);
2851 2852
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2853
		err = user_confirm_neg_reply(sk, hdev, cp, len);
2854
		break;
2855
	case MGMT_OP_USER_PASSKEY_REPLY:
2856
		err = user_passkey_reply(sk, hdev, cp, len);
2857 2858
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
2859
		err = user_passkey_neg_reply(sk, hdev, cp, len);
2860
		break;
2861
	case MGMT_OP_SET_LOCAL_NAME:
2862
		err = set_local_name(sk, hdev, cp, len);
2863
		break;
2864
	case MGMT_OP_READ_LOCAL_OOB_DATA:
2865
		err = read_local_oob_data(sk, hdev);
2866
		break;
2867
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
2868
		err = add_remote_oob_data(sk, hdev, cp, len);
2869 2870
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
2871
		err = remove_remote_oob_data(sk, hdev, cp, len);
2872
		break;
2873
	case MGMT_OP_START_DISCOVERY:
2874
		err = start_discovery(sk, hdev, cp, len);
2875 2876
		break;
	case MGMT_OP_STOP_DISCOVERY:
2877
		err = stop_discovery(sk, hdev, cp, len);
2878
		break;
2879
	case MGMT_OP_CONFIRM_NAME:
2880
		err = confirm_name(sk, hdev, cp, len);
2881
		break;
2882
	case MGMT_OP_BLOCK_DEVICE:
2883
		err = block_device(sk, hdev, cp, len);
2884 2885
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
2886
		err = unblock_device(sk, hdev, cp, len);
2887
		break;
2888
	case MGMT_OP_LOAD_LONG_TERM_KEYS:
2889
		err = load_long_term_keys(sk, hdev, cp, len);
2890
		break;
2891 2892
	default:
		BT_DBG("Unknown op %u", opcode);
2893 2894
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2895 2896 2897
		break;
	}

2898 2899 2900
	if (err < 0)
		goto done;

2901 2902 2903
	err = msglen;

done:
2904 2905 2906
	if (hdev)
		hci_dev_put(hdev);

2907 2908 2909
	kfree(buf);
	return err;
}
2910

2911 2912 2913 2914 2915 2916 2917 2918
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2919
int mgmt_index_added(struct hci_dev *hdev)
2920
{
2921
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2922 2923
}

2924
int mgmt_index_removed(struct hci_dev *hdev)
2925
{
2926 2927
	u8 status = ENODEV;

2928
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2929

2930
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2931 2932
}

2933
struct cmd_lookup {
2934
	struct sock *sk;
2935
	struct hci_dev *hdev;
2936
	u8 mgmt_status;
2937 2938
};

2939
static void settings_rsp(struct pending_cmd *cmd, void *data)
2940
{
2941
	struct cmd_lookup *match = data;
2942

2943
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2944 2945 2946 2947 2948 2949 2950 2951 2952

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2953
}
2954

2955
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2956
{
2957
	struct cmd_lookup match = { NULL, hdev };
2958
	int err;
2959

2960 2961 2962
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

2963
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2964

2965 2966 2967 2968 2969 2970 2971 2972 2973 2974
	if (powered) {
		u8 scan = 0;

		if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			scan |= SCAN_PAGE;
		if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			scan |= SCAN_INQUIRY;

		if (scan)
			hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
2975 2976 2977

		update_class(hdev);
		update_eir(hdev);
2978
	} else {
2979
		u8 status = ENETDOWN;
2980
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2981 2982
	}

2983
	err = new_settings(hdev, match.sk);
2984 2985 2986 2987

	if (match.sk)
		sock_put(match.sk);

2988
	return err;
2989
}
2990

2991
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2992
{
2993
	struct cmd_lookup match = { NULL, hdev };
2994 2995
	bool changed = false;
	int err = 0;
2996

2997 2998 2999 3000 3001 3002 3003
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3004

3005 3006 3007
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
								&match);

3008 3009
	if (changed)
		err = new_settings(hdev, match.sk);
3010

3011 3012 3013
	if (match.sk)
		sock_put(match.sk);

3014
	return err;
3015
}
3016

3017
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3018
{
3019
	struct cmd_lookup match = { NULL, hdev };
3020 3021
	bool changed = false;
	int err = 0;
3022

3023 3024 3025 3026 3027 3028 3029
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3030

3031 3032 3033
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
								&match);

3034 3035
	if (changed)
		err = new_settings(hdev, match.sk);
3036 3037 3038 3039

	if (match.sk)
		sock_put(match.sk);

3040
	return err;
3041
}
3042

3043
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3044
{
3045 3046
	u8 mgmt_err = mgmt_status(status);

3047
	if (scan & SCAN_PAGE)
3048
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3049
						cmd_status_rsp, &mgmt_err);
3050 3051

	if (scan & SCAN_INQUIRY)
3052
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3053
						cmd_status_rsp, &mgmt_err);
3054 3055 3056 3057

	return 0;
}

3058 3059
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
3060
{
3061
	struct mgmt_ev_new_link_key ev;
3062

3063
	memset(&ev, 0, sizeof(ev));
3064

3065
	ev.store_hint = persistent;
3066 3067
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
	ev.key.addr.type = MGMT_ADDR_BREDR;
3068 3069 3070
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
3071

3072
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3073
}
3074

3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
	ev.key.addr.type = key->bdaddr_type;
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev,
						&ev, sizeof(ev), NULL);
}

3098
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3099 3100
					u8 addr_type, u32 flags, u8 *name,
					u8 name_len, u8 *dev_class)
3101
{
3102 3103 3104
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
3105

3106 3107
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
3108

3109
	ev->flags = __cpu_to_le32(flags);
3110

3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
								name, name_len);

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
		eir_len = eir_append_data(&ev->eir[eir_len], eir_len,
					EIR_CLASS_OF_DEV, dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
						sizeof(*ev) + eir_len, NULL);
3123 3124
}

3125 3126
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
3127
	struct mgmt_cp_disconnect *cp = cmd->param;
3128
	struct sock **sk = data;
3129
	struct mgmt_rp_disconnect rp;
3130

3131 3132
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3133

3134 3135
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
								sizeof(rp));
3136 3137 3138 3139

	*sk = cmd->sk;
	sock_hold(*sk);

3140
	mgmt_pending_remove(cmd);
3141 3142
}

3143
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
3144
{
3145
	struct hci_dev *hdev = data;
3146 3147
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
3148 3149

	memset(&rp, 0, sizeof(rp));
3150 3151
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3152

3153 3154
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

3155
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
3156 3157 3158 3159

	mgmt_pending_remove(cmd);
}

3160 3161
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
3162
{
3163
	struct mgmt_addr_info ev;
3164 3165 3166
	struct sock *sk = NULL;
	int err;

3167
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
3168 3169

	bacpy(&ev.bdaddr, bdaddr);
3170
	ev.type = link_to_mgmt(link_type, addr_type);
3171

3172 3173
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
									sk);
3174 3175 3176 3177

	if (sk)
		sock_put(sk);

3178
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
3179
									hdev);
3180

3181 3182 3183
	return err;
}

3184 3185
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
3186
{
3187
	struct mgmt_rp_disconnect rp;
3188 3189 3190
	struct pending_cmd *cmd;
	int err;

3191
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
3192 3193 3194
	if (!cmd)
		return -ENOENT;

3195 3196
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = link_to_mgmt(link_type, addr_type);
3197

3198
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
3199
					mgmt_status(status), &rp, sizeof(rp));
3200

3201
	mgmt_pending_remove(cmd);
3202

3203 3204
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
									hdev);
3205
	return err;
3206
}
3207

3208 3209
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
3210 3211 3212
{
	struct mgmt_ev_connect_failed ev;

3213
	bacpy(&ev.addr.bdaddr, bdaddr);
3214
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3215
	ev.status = mgmt_status(status);
3216

3217
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
3218
}
3219

3220
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
3221 3222 3223
{
	struct mgmt_ev_pin_code_request ev;

3224 3225
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = MGMT_ADDR_BREDR;
3226
	ev.secure = secure;
3227

3228
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
3229
									NULL);
3230 3231
}

3232 3233
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
3234 3235
{
	struct pending_cmd *cmd;
3236
	struct mgmt_rp_pin_code_reply rp;
3237 3238
	int err;

3239
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
3240 3241 3242
	if (!cmd)
		return -ENOENT;

3243 3244
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = MGMT_ADDR_BREDR;
3245

3246 3247
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
					mgmt_status(status), &rp, sizeof(rp));
3248

3249
	mgmt_pending_remove(cmd);
3250 3251 3252 3253

	return err;
}

3254 3255
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
3256 3257
{
	struct pending_cmd *cmd;
3258
	struct mgmt_rp_pin_code_reply rp;
3259 3260
	int err;

3261
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
3262 3263 3264
	if (!cmd)
		return -ENOENT;

3265 3266
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = MGMT_ADDR_BREDR;
3267

3268 3269
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
					mgmt_status(status), &rp, sizeof(rp));
3270

3271
	mgmt_pending_remove(cmd);
3272 3273 3274

	return err;
}
3275

3276
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3277 3278
				u8 link_type, u8 addr_type, __le32 value,
				u8 confirm_hint)
3279 3280 3281
{
	struct mgmt_ev_user_confirm_request ev;

3282
	BT_DBG("%s", hdev->name);
3283

3284 3285
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3286
	ev.confirm_hint = confirm_hint;
3287 3288
	put_unaligned_le32(value, &ev.value);

3289
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3290
									NULL);
3291 3292
}

3293 3294
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						u8 link_type, u8 addr_type)
3295 3296 3297 3298 3299
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3300 3301
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3302 3303 3304 3305 3306

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

3307
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3308 3309
					u8 link_type, u8 addr_type, u8 status,
					u8 opcode)
3310 3311 3312 3313 3314
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3315
	cmd = mgmt_pending_find(opcode, hdev);
3316 3317 3318
	if (!cmd)
		return -ENOENT;

3319 3320
	bacpy(&rp.addr.bdaddr, bdaddr);
	rp.addr.type = link_to_mgmt(link_type, addr_type);
3321 3322
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
							&rp, sizeof(rp));
3323

3324
	mgmt_pending_remove(cmd);
3325 3326 3327 3328

	return err;
}

3329
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3330
					u8 link_type, u8 addr_type, u8 status)
3331
{
3332 3333
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_CONFIRM_REPLY);
3334 3335
}

3336 3337
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
3338
{
3339 3340
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_CONFIRM_NEG_REPLY);
3341
}
3342

3343
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3344
					u8 link_type, u8 addr_type, u8 status)
3345
{
3346 3347
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_PASSKEY_REPLY);
3348 3349
}

3350 3351
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
					u8 link_type, u8 addr_type, u8 status)
3352
{
3353 3354
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
					status, MGMT_OP_USER_PASSKEY_NEG_REPLY);
3355 3356
}

3357 3358
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
3359 3360 3361
{
	struct mgmt_ev_auth_failed ev;

3362 3363
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_mgmt(link_type, addr_type);
3364
	ev.status = mgmt_status(status);
3365

3366
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3367
}
3368

3369 3370 3371
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
3372 3373
	bool changed = false;
	int err = 0;
3374 3375 3376 3377 3378 3379 3380 3381

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
						cmd_status_rsp, &mgmt_err);
		return 0;
	}

3382 3383 3384 3385 3386 3387 3388 3389
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

3390 3391 3392
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
								&match);

3393 3394
	if (changed)
		err = new_settings(hdev, match.sk);
3395 3396 3397 3398 3399 3400 3401

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3402 3403 3404 3405 3406 3407 3408
static int clear_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

3409 3410
	memset(hdev->eir, 0, sizeof(hdev->eir));

3411 3412 3413 3414 3415
	memset(&cp, 0, sizeof(cp));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

3416
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
3417 3418
{
	struct cmd_lookup match = { NULL, hdev };
3419 3420
	bool changed = false;
	int err = 0;
3421 3422 3423

	if (status) {
		u8 mgmt_err = mgmt_status(status);
3424 3425 3426 3427 3428

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
							&hdev->dev_flags))
			err = new_settings(hdev, NULL);

3429 3430
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev,
						cmd_status_rsp, &mgmt_err);
3431 3432 3433 3434 3435 3436 3437 3438 3439 3440

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
3441 3442 3443 3444
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

3445 3446
	if (changed)
		err = new_settings(hdev, match.sk);
3447

3448
	if (match.sk)
3449 3450
		sock_put(match.sk);

3451 3452 3453 3454
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
		update_eir(hdev);
	else
		clear_eir(hdev);
3455

3456 3457 3458
	return err;
}

3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475
static void class_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, match->mgmt_status,
						match->hdev->dev_class, 3);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

3476 3477 3478
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
								u8 status)
{
3479 3480
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
3481

3482 3483
	clear_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

3484 3485 3486 3487 3488 3489 3490 3491 3492 3493
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, class_rsp, &match);

	if (!status)
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
							dev_class, 3, NULL);

	if (match.sk)
		sock_put(match.sk);
3494 3495 3496 3497

	return err;
}

3498
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
3499 3500 3501
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
3502 3503 3504 3505 3506 3507 3508
	bool changed = false;
	int err = 0;

	if (memcmp(name, hdev->dev_name, sizeof(hdev->dev_name)) != 0) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
		changed = true;
	}
3509 3510 3511

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
3512
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
3513

3514
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
3515 3516 3517
	if (!cmd)
		goto send_event;

3518 3519 3520 3521
	/* Always assume that either the short or the complete name has
	 * changed if there was a pending mgmt command */
	changed = true;

3522
	if (status) {
3523
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
3524
							mgmt_status(status));
3525 3526 3527
		goto failed;
	}

3528
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, &ev,
3529 3530 3531 3532 3533
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
3534 3535 3536 3537
	if (changed)
		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev,
					sizeof(ev), cmd ? cmd->sk : NULL);

3538
	update_eir(hdev);
3539 3540 3541 3542 3543 3544

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
3545

3546 3547
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
3548 3549 3550 3551
{
	struct pending_cmd *cmd;
	int err;

3552
	BT_DBG("%s status %u", hdev->name, status);
3553

3554
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
3555 3556 3557 3558
	if (!cmd)
		return -ENOENT;

	if (status) {
3559
		err = cmd_status(cmd->sk, hdev->id,
3560 3561
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
3562 3563 3564 3565 3566 3567
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

3568 3569
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
3570
						0, &rp, sizeof(rp));
3571 3572 3573 3574 3575 3576
	}

	mgmt_pending_remove(cmd);

	return err;
}
3577

3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615
int mgmt_le_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;
	int err = 0;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		if (enable && test_and_clear_bit(HCI_LE_ENABLED,
							&hdev->dev_flags))
			err = new_settings(hdev, NULL);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev,
						cmd_status_rsp, &mgmt_err);

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	if (changed)
		err = new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3616
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3617
				u8 addr_type, u8 *dev_class, s8 rssi,
3618
				u8 cfm_name, u8 ssp, u8 *eir, u16 eir_len)
3619
{
3620 3621
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
3622
	size_t ev_size;
3623

3624 3625
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
3626 3627
		return -EINVAL;

3628 3629
	memset(buf, 0, sizeof(buf));

3630 3631 3632
	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;
3633 3634
	if (cfm_name)
		ev->flags[0] |= MGMT_DEV_FOUND_CONFIRM_NAME;
3635 3636
	if (!ssp)
		ev->flags[0] |= MGMT_DEV_FOUND_LEGACY_PAIRING;
3637

3638
	if (eir_len > 0)
3639
		memcpy(ev->eir, eir, eir_len);
3640

3641 3642 3643 3644 3645 3646 3647
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
								dev_class, 3);

	put_unaligned_le16(eir_len, &ev->eir_len);

	ev_size = sizeof(*ev) + eir_len;
3648

3649
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
3650
}
3651

3652 3653
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
				u8 addr_type, s8 rssi, u8 *name, u8 name_len)
3654
{
3655 3656 3657
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
3658

3659
	ev = (struct mgmt_ev_device_found *) buf;
3660

3661 3662 3663 3664 3665 3666 3667 3668 3669 3670
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_mgmt(link_type, addr_type);
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
								name_len);

	put_unaligned_le16(eir_len, &ev->eir_len);
3671

3672 3673
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
						sizeof(*ev) + eir_len, NULL);
3674
}
3675

3676
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
3677 3678
{
	struct pending_cmd *cmd;
3679
	u8 type;
3680 3681
	int err;

3682 3683
	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

3684
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3685 3686 3687
	if (!cmd)
		return -ENOENT;

3688 3689 3690 3691
	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
							&type, sizeof(type));
3692 3693 3694 3695 3696
	mgmt_pending_remove(cmd);

	return err;
}

3697 3698 3699 3700 3701 3702 3703 3704 3705
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

3706 3707 3708
	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
						&hdev->discovery.type,
						sizeof(hdev->discovery.type));
3709 3710 3711 3712 3713
	mgmt_pending_remove(cmd);

	return err;
}

3714
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
3715
{
3716
	struct mgmt_ev_discovering ev;
3717 3718
	struct pending_cmd *cmd;

3719 3720
	BT_DBG("%s discovering %u", hdev->name, discovering);

3721
	if (discovering)
3722
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3723
	else
3724
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3725 3726

	if (cmd != NULL) {
3727 3728
		u8 type = hdev->discovery.type;

3729
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0,
3730
							&type, sizeof(type));
3731 3732 3733
		mgmt_pending_remove(cmd);
	}

3734 3735 3736 3737 3738
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
3739
}
3740

3741
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3742 3743 3744 3745
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

3746
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
3747

3748 3749
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3750

3751 3752
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
3753 3754
}

3755
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3756 3757 3758 3759
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

3760
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
3761

3762 3763
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3764

3765 3766
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
3767
}
3768 3769 3770 3771 3772 3773

module_param(enable_hs, bool, 0644);
MODULE_PARM_DESC(enable_hs, "Enable High Speed support");

module_param(enable_le, bool, 0644);
MODULE_PARM_DESC(enable_le, "Enable Low Energy support");