mgmt.c 129.1 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33 34

#include "smp.h"
35

36
#define MGMT_VERSION	1
37
#define MGMT_REVISION	5
38

39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
77
	MGMT_OP_SET_DEVICE_ID,
78
	MGMT_OP_SET_ADVERTISING,
79
	MGMT_OP_SET_BREDR,
80
	MGMT_OP_SET_STATIC_ADDRESS,
81
	MGMT_OP_SET_SCAN_PARAMS,
82
	MGMT_OP_SET_SECURE_CONN,
83
	MGMT_OP_SET_DEBUG_KEYS,
84
	MGMT_OP_LOAD_IRKS,
85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
108
	MGMT_EV_PASSKEY_NOTIFY,
109
	MGMT_EV_NEW_IRK,
110 111
};

112
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
113

114 115 116
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

117 118
struct pending_cmd {
	struct list_head list;
119
	u16 opcode;
120
	int index;
121
	void *param;
122
	struct sock *sk;
123
	void *user_data;
124 125
};

126 127 128 129 130 131 132 133
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
134
	MGMT_STATUS_AUTH_FAILED,	/* PIN or Key Missing */
135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

199
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
200 201 202 203
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
204
	int err;
205

206
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
207

208
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
209 210 211 212 213
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

214
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
215
	hdr->index = cpu_to_le16(index);
216 217 218 219
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
220
	ev->opcode = cpu_to_le16(cmd);
221

222 223
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
224 225
		kfree_skb(skb);

226
	return err;
227 228
}

229
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
230
			void *rp, size_t rp_len)
231 232 233 234
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
235
	int err;
236 237 238

	BT_DBG("sock %p", sk);

239
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
240 241 242 243 244
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

245
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
246
	hdr->index = cpu_to_le16(index);
247
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
248

249
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
250
	ev->opcode = cpu_to_le16(cmd);
251
	ev->status = status;
252 253 254

	if (rp)
		memcpy(ev->data, rp, rp_len);
255

256 257
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
258 259
		kfree_skb(skb);

260
	return err;
261 262
}

263 264
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
265 266 267 268 269 270
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
271
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
272

273
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
274
			    sizeof(rp));
275 276
}

277 278
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
279 280
{
	struct mgmt_rp_read_commands *rp;
281 282
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
283
	__le16 *opcode;
284 285 286 287 288 289 290 291 292 293 294
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

295 296
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
297 298 299 300 301 302 303

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

304
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
305
			   rp_size);
306 307 308 309 310
	kfree(rp);

	return err;
}

311 312
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
313 314
{
	struct mgmt_rp_read_index_list *rp;
315
	struct hci_dev *d;
316
	size_t rp_len;
317
	u16 count;
318
	int err;
319 320 321 322 323 324

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
325
	list_for_each_entry(d, &hci_dev_list, list) {
326 327
		if (d->dev_type == HCI_BREDR)
			count++;
328 329
	}

330 331 332
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
333
		read_unlock(&hci_dev_list_lock);
334
		return -ENOMEM;
335
	}
336

337
	count = 0;
338
	list_for_each_entry(d, &hci_dev_list, list) {
339
		if (test_bit(HCI_SETUP, &d->dev_flags))
340 341
			continue;

342 343 344
		if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
			continue;

345 346 347 348
		if (d->dev_type == HCI_BREDR) {
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
349 350
	}

351 352 353
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

354 355
	read_unlock(&hci_dev_list_lock);

356
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
357
			   rp_len);
358

359 360 361
	kfree(rp);

	return err;
362 363
}

364 365 366 367 368 369
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;
370
	settings |= MGMT_SETTING_DEBUG_KEYS;
371

372
	if (lmp_bredr_capable(hdev)) {
373
		settings |= MGMT_SETTING_CONNECTABLE;
374 375
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
376
		settings |= MGMT_SETTING_DISCOVERABLE;
377 378
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
379 380 381 382 383

		if (lmp_ssp_capable(hdev)) {
			settings |= MGMT_SETTING_SSP;
			settings |= MGMT_SETTING_HS;
		}
384

385 386
		if (lmp_sc_capable(hdev) ||
		    test_bit(HCI_FORCE_SC, &hdev->dev_flags))
387
			settings |= MGMT_SETTING_SECURE_CONN;
388
	}
389

390
	if (lmp_le_capable(hdev)) {
391
		settings |= MGMT_SETTING_LE;
392 393
		settings |= MGMT_SETTING_ADVERTISING;
	}
394 395 396 397 398 399 400 401

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

402
	if (hdev_is_powered(hdev))
403 404
		settings |= MGMT_SETTING_POWERED;

405
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
406 407
		settings |= MGMT_SETTING_CONNECTABLE;

408 409 410
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

411
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
412 413
		settings |= MGMT_SETTING_DISCOVERABLE;

414
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
415 416
		settings |= MGMT_SETTING_PAIRABLE;

417
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
418 419
		settings |= MGMT_SETTING_BREDR;

420
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
421 422
		settings |= MGMT_SETTING_LE;

423
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
424 425
		settings |= MGMT_SETTING_LINK_SECURITY;

426
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
427 428
		settings |= MGMT_SETTING_SSP;

429 430 431
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

432
	if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
433 434
		settings |= MGMT_SETTING_ADVERTISING;

435 436 437
	if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_SECURE_CONN;

438 439 440
	if (test_bit(HCI_DEBUG_KEYS, &hdev->dev_flags))
		settings |= MGMT_SETTING_DEBUG_KEYS;

441 442 443
	return settings;
}

444 445
#define PNP_INFO_SVCLASS_ID		0x1200

446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

554 555 556 557 558 559 560 561 562 563 564 565
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		if (cmd->opcode == opcode)
			return cmd;
	}

	return NULL;
}

566 567
static u8 create_scan_rsp_data(struct hci_dev *hdev, u8 *ptr)
{
568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589
	u8 ad_len = 0;
	size_t name_len;

	name_len = strlen(hdev->dev_name);
	if (name_len > 0) {
		size_t max_len = HCI_MAX_AD_LENGTH - ad_len - 2;

		if (name_len > max_len) {
			name_len = max_len;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ad_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	return ad_len;
590 591 592 593 594 595 596 597
}

static void update_scan_rsp_data(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_scan_rsp_data cp;
	u8 len;

598
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
599 600 601 602 603 604
		return;

	memset(&cp, 0, sizeof(cp));

	len = create_scan_rsp_data(hdev, cp.data);

605 606
	if (hdev->scan_rsp_data_len == len &&
	    memcmp(cp.data, hdev->scan_rsp_data, len) == 0)
607 608
		return;

609 610
	memcpy(hdev->scan_rsp_data, cp.data, sizeof(cp.data));
	hdev->scan_rsp_data_len = len;
611 612 613 614 615 616

	cp.length = len;

	hci_req_add(req, HCI_OP_LE_SET_SCAN_RSP_DATA, sizeof(cp), &cp);
}

617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640
static u8 get_adv_discov_flags(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	/* If there's a pending mgmt command the flags will not yet have
	 * their final values, so check for this first.
	 */
	cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
		if (cp->val == 0x01)
			return LE_AD_GENERAL;
		else if (cp->val == 0x02)
			return LE_AD_LIMITED;
	} else {
		if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
			return LE_AD_LIMITED;
		else if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			return LE_AD_GENERAL;
	}

	return 0;
}

641
static u8 create_adv_data(struct hci_dev *hdev, u8 *ptr)
642 643 644
{
	u8 ad_len = 0, flags = 0;

645
	flags |= get_adv_discov_flags(hdev);
646

647
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672
		flags |= LE_AD_NO_BREDR;

	if (flags) {
		BT_DBG("adv flags 0x%02x", flags);

		ptr[0] = 2;
		ptr[1] = EIR_FLAGS;
		ptr[2] = flags;

		ad_len += 3;
		ptr += 3;
	}

	if (hdev->adv_tx_power != HCI_TX_POWER_INVALID) {
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->adv_tx_power;

		ad_len += 3;
		ptr += 3;
	}

	return ad_len;
}

673
static void update_adv_data(struct hci_request *req)
674 675 676 677 678
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_adv_data cp;
	u8 len;

679
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
680 681 682 683
		return;

	memset(&cp, 0, sizeof(cp));

684
	len = create_adv_data(hdev, cp.data);
685 686 687 688 689 690 691 692 693 694 695 696 697

	if (hdev->adv_data_len == len &&
	    memcmp(cp.data, hdev->adv_data, len) == 0)
		return;

	memcpy(hdev->adv_data, cp.data, sizeof(cp.data));
	hdev->adv_data_len = len;

	cp.length = len;

	hci_req_add(req, HCI_OP_LE_SET_ADV_DATA, sizeof(cp), &cp);
}

698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

721
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
722 723 724 725 726 727 728
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

729 730 731 732 733 734 735 736 737 738 739 740
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

741
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
742
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
743
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
744 745
}

746
static void update_eir(struct hci_request *req)
747
{
748
	struct hci_dev *hdev = req->hdev;
749 750
	struct hci_cp_write_eir cp;

751
	if (!hdev_is_powered(hdev))
752
		return;
753

754
	if (!lmp_ext_inq_capable(hdev))
755
		return;
756

757
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
758
		return;
759

760
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
761
		return;
762 763 764 765 766 767

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
768
		return;
769 770 771

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

772
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
773 774 775 776 777 778 779 780 781 782 783 784 785
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

786
static void update_class(struct hci_request *req)
787
{
788
	struct hci_dev *hdev = req->hdev;
789 790 791 792
	u8 cod[3];

	BT_DBG("%s", hdev->name);

793
	if (!hdev_is_powered(hdev))
794
		return;
795

796 797 798
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return;

799
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
800
		return;
801 802 803 804 805

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

806 807 808
	if (test_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags))
		cod[1] |= 0x20;

809
	if (memcmp(cod, hdev->dev_class, 3) == 0)
810
		return;
811

812
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
813 814
}

815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858
static u8 get_adv_type(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;
	bool connectable;

	/* If there's a pending mgmt command the flag will not yet have
	 * it's final value, so check for this first.
	 */
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
		connectable = !!cp->val;
	} else {
		connectable = test_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	}

	return connectable ? LE_ADV_IND : LE_ADV_NONCONN_IND;
}

static void enable_advertising(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	struct hci_cp_le_set_adv_param cp;
	u8 enable = 0x01;

	memset(&cp, 0, sizeof(cp));
	cp.min_interval = __constant_cpu_to_le16(0x0800);
	cp.max_interval = __constant_cpu_to_le16(0x0800);
	cp.type = get_adv_type(hdev);
	cp.own_address_type = hdev->own_addr_type;
	cp.channel_map = hdev->le_adv_channel_map;

	hci_req_add(req, HCI_OP_LE_SET_ADV_PARAM, sizeof(cp), &cp);

	hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
}

static void disable_advertising(struct hci_request *req)
{
	u8 enable = 0x00;

	hci_req_add(req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(enable), &enable);
}

859 860 861
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
862
					    service_cache.work);
863
	struct hci_request req;
864

865
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
866 867
		return;

868 869
	hci_req_init(&req, hdev);

870 871
	hci_dev_lock(hdev);

872 873
	update_eir(&req);
	update_class(&req);
874 875

	hci_dev_unlock(hdev);
876 877

	hci_req_run(&req, NULL);
878 879
}

880
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
881
{
882
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
883 884
		return;

885
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
886

887 888 889 890 891 892
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
893 894
}

895
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
896
				void *data, u16 data_len)
897
{
898
	struct mgmt_rp_read_info rp;
899

900
	BT_DBG("sock %p %s", sk, hdev->name);
901

902
	hci_dev_lock(hdev);
903

904 905
	memset(&rp, 0, sizeof(rp));

906
	bacpy(&rp.bdaddr, &hdev->bdaddr);
907

908
	rp.version = hdev->hci_ver;
909
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
910 911 912

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
913

914
	memcpy(rp.dev_class, hdev->dev_class, 3);
915

916
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
917
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
918

919
	hci_dev_unlock(hdev);
920

921
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
922
			    sizeof(rp));
923 924
}

925 926 927
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
928
	kfree(cmd->param);
929 930 931
	kfree(cmd);
}

932
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
933 934
					    struct hci_dev *hdev, void *data,
					    u16 len)
935 936 937
{
	struct pending_cmd *cmd;

938
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
939
	if (!cmd)
940
		return NULL;
941 942

	cmd->opcode = opcode;
943
	cmd->index = hdev->id;
944

945
	cmd->param = kmalloc(len, GFP_KERNEL);
946
	if (!cmd->param) {
947
		kfree(cmd);
948
		return NULL;
949 950
	}

951 952
	if (data)
		memcpy(cmd->param, data, len);
953 954 955 956

	cmd->sk = sk;
	sock_hold(sk);

957
	list_add(&cmd->list, &hdev->mgmt_pending);
958

959
	return cmd;
960 961
}

962
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
963 964
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
965
				 void *data)
966
{
967
	struct pending_cmd *cmd, *tmp;
968

969
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
970
		if (opcode > 0 && cmd->opcode != opcode)
971 972 973 974 975 976
			continue;

		cb(cmd, data);
	}
}

977
static void mgmt_pending_remove(struct pending_cmd *cmd)
978 979 980 981 982
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

983
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
984
{
985
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
986

987
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
988
			    sizeof(settings));
989 990
}

991
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
992
		       u16 len)
993
{
994
	struct mgmt_mode *cp = data;
995
	struct pending_cmd *cmd;
996
	int err;
997

998
	BT_DBG("request for %s", hdev->name);
999

1000 1001 1002 1003
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

1004
	hci_dev_lock(hdev);
1005

1006 1007 1008 1009 1010 1011
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

1012 1013 1014 1015
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
1016 1017 1018
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
1019 1020 1021 1022
			goto failed;
		}
	}

1023
	if (!!cp->val == hdev_is_powered(hdev)) {
1024
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
1025 1026 1027
		goto failed;
	}

1028
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
1029 1030
	if (!cmd) {
		err = -ENOMEM;
1031
		goto failed;
1032
	}
1033

1034
	if (cp->val)
1035
		queue_work(hdev->req_workqueue, &hdev->power_on);
1036
	else
1037
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
1038

1039
	err = 0;
1040 1041

failed:
1042
	hci_dev_unlock(hdev);
1043
	return err;
1044 1045
}

1046 1047
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
1048 1049 1050 1051
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

1052
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
1053 1054 1055 1056 1057 1058 1059 1060
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
1061
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
1062 1063 1064 1065 1066
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

1067 1068 1069
	/* Time stamp */
	__net_timestamp(skb);

1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

static void settings_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

1135 1136 1137 1138
static void set_discoverable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	struct mgmt_mode *cp;
1139
	struct hci_request req;
1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152
	bool changed;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1153
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
1154 1155 1156 1157
		goto remove_cmd;
	}

	cp = cmd->param;
1158
	if (cp->val) {
1159 1160
		changed = !test_and_set_bit(HCI_DISCOVERABLE,
					    &hdev->dev_flags);
1161 1162 1163 1164 1165 1166 1167

		if (hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
					   to);
		}
	} else {
1168 1169
		changed = test_and_clear_bit(HCI_DISCOVERABLE,
					     &hdev->dev_flags);
1170
	}
1171 1172 1173 1174 1175 1176

	send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev);

	if (changed)
		new_settings(hdev, cmd->sk);

1177 1178 1179 1180 1181 1182 1183 1184
	/* When the discoverable mode gets changed, make sure
	 * that class of device has the limited discoverable
	 * bit correctly set.
	 */
	hci_req_init(&req, hdev);
	update_class(&req);
	hci_req_run(&req, NULL);

1185 1186 1187 1188 1189 1190 1191
remove_cmd:
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1192
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
1193
			    u16 len)
1194
{
1195
	struct mgmt_cp_set_discoverable *cp = data;
1196
	struct pending_cmd *cmd;
1197
	struct hci_request req;
1198
	u16 timeout;
1199
	u8 scan;
1200 1201
	int err;

1202
	BT_DBG("request for %s", hdev->name);
1203

1204 1205
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1206
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1207
				  MGMT_STATUS_REJECTED);
1208

1209
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
1210 1211 1212
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1213
	timeout = __le16_to_cpu(cp->timeout);
1214 1215 1216 1217 1218 1219

	/* Disabling discoverable requires that no timeout is set,
	 * and enabling limited discoverable requires a timeout.
	 */
	if ((cp->val == 0x00 && timeout > 0) ||
	    (cp->val == 0x02 && timeout == 0))
1220
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1221
				  MGMT_STATUS_INVALID_PARAMS);
1222

1223
	hci_dev_lock(hdev);
1224

1225
	if (!hdev_is_powered(hdev) && timeout > 0) {
1226
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1227
				 MGMT_STATUS_NOT_POWERED);
1228 1229 1230
		goto failed;
	}

1231
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1232
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1233
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1234
				 MGMT_STATUS_BUSY);
1235 1236 1237
		goto failed;
	}

1238
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
1239
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
1240
				 MGMT_STATUS_REJECTED);
1241 1242 1243 1244
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
1245 1246
		bool changed = false;

1247 1248 1249 1250
		/* Setting limited discoverable when powered off is
		 * not a valid operation since it requires a timeout
		 * and so no need to check HCI_LIMITED_DISCOVERABLE.
		 */
1251 1252 1253 1254 1255
		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

1256
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1257 1258 1259 1260 1261 1262
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1263 1264 1265
		goto failed;
	}

1266 1267 1268 1269 1270 1271 1272
	/* If the current mode is the same, then just update the timeout
	 * value with the new value. And if only the timeout gets updated,
	 * then no need for any HCI transactions.
	 */
	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags) &&
	    (cp->val == 0x02) == test_bit(HCI_LIMITED_DISCOVERABLE,
					  &hdev->dev_flags)) {
1273 1274
		cancel_delayed_work(&hdev->discov_off);
		hdev->discov_timeout = timeout;
1275

1276 1277
		if (cp->val && hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
1278
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
1279
					   to);
1280 1281
		}

1282
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1283 1284 1285
		goto failed;
	}

1286
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1287 1288
	if (!cmd) {
		err = -ENOMEM;
1289
		goto failed;
1290
	}
1291

1292 1293 1294 1295 1296 1297 1298
	/* Cancel any potential discoverable timeout that might be
	 * still active and store new timeout value. The arming of
	 * the timeout happens in the complete handler.
	 */
	cancel_delayed_work(&hdev->discov_off);
	hdev->discov_timeout = timeout;

1299 1300 1301 1302 1303 1304
	/* Limited discoverable mode */
	if (cp->val == 0x02)
		set_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
	else
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);

1305 1306
	hci_req_init(&req, hdev);

1307 1308 1309 1310 1311 1312
	/* The procedure for LE-only controllers is much simpler - just
	 * update the advertising data.
	 */
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		goto update_ad;

1313 1314
	scan = SCAN_PAGE;

1315 1316 1317 1318 1319
	if (cp->val) {
		struct hci_cp_write_current_iac_lap hci_cp;

		if (cp->val == 0x02) {
			/* Limited discoverable mode */
1320
			hci_cp.num_iac = min_t(u8, hdev->num_iac, 2);
1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337
			hci_cp.iac_lap[0] = 0x00;	/* LIAC */
			hci_cp.iac_lap[1] = 0x8b;
			hci_cp.iac_lap[2] = 0x9e;
			hci_cp.iac_lap[3] = 0x33;	/* GIAC */
			hci_cp.iac_lap[4] = 0x8b;
			hci_cp.iac_lap[5] = 0x9e;
		} else {
			/* General discoverable mode */
			hci_cp.num_iac = 1;
			hci_cp.iac_lap[0] = 0x33;	/* GIAC */
			hci_cp.iac_lap[1] = 0x8b;
			hci_cp.iac_lap[2] = 0x9e;
		}

		hci_req_add(&req, HCI_OP_WRITE_CURRENT_IAC_LAP,
			    (hci_cp.num_iac * 3) + 1, &hci_cp);

1338
		scan |= SCAN_INQUIRY;
1339 1340 1341
	} else {
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
	}
1342

1343
	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, sizeof(scan), &scan);
1344

1345 1346 1347
update_ad:
	update_adv_data(&req);

1348
	err = hci_req_run(&req, set_discoverable_complete);
1349
	if (err < 0)
1350
		mgmt_pending_remove(cmd);
1351 1352

failed:
1353
	hci_dev_unlock(hdev);
1354 1355 1356
	return err;
}

1357 1358
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1359
	struct hci_dev *hdev = req->hdev;
1360 1361 1362
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1363 1364 1365
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return;

1366 1367 1368
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1383 1384 1385 1386 1387 1388 1389
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1390 1391
}

1392 1393 1394
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
1395 1396
	struct mgmt_mode *cp;
	bool changed;
1397 1398 1399 1400 1401 1402 1403 1404 1405

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

1406 1407 1408 1409 1410 1411
	if (status) {
		u8 mgmt_err = mgmt_status(status);
		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
		goto remove_cmd;
	}

1412 1413 1414 1415 1416 1417
	cp = cmd->param;
	if (cp->val)
		changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);

1418 1419
	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

1420 1421 1422
	if (changed)
		new_settings(hdev, cmd->sk);

1423
remove_cmd:
1424 1425 1426 1427 1428 1429
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455
static int set_connectable_update_settings(struct hci_dev *hdev,
					   struct sock *sk, u8 val)
{
	bool changed = false;
	int err;

	if (!!val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		changed = true;

	if (val) {
		set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	} else {
		clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
		clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
	if (err < 0)
		return err;

	if (changed)
		return new_settings(hdev, sk);

	return 0;
}

1456
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1457
			   u16 len)
1458
{
1459
	struct mgmt_mode *cp = data;
1460
	struct pending_cmd *cmd;
1461
	struct hci_request req;
1462
	u8 scan;
1463 1464
	int err;

1465
	BT_DBG("request for %s", hdev->name);
1466

1467 1468
	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1469
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1470
				  MGMT_STATUS_REJECTED);
1471

1472 1473 1474 1475
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1476
	hci_dev_lock(hdev);
1477

1478
	if (!hdev_is_powered(hdev)) {
1479
		err = set_connectable_update_settings(hdev, sk, cp->val);
1480 1481 1482
		goto failed;
	}

1483
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1484
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1485
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1486
				 MGMT_STATUS_BUSY);
1487 1488 1489
		goto failed;
	}

1490
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1491 1492
	if (!cmd) {
		err = -ENOMEM;
1493
		goto failed;
1494
	}
1495

1496
	hci_req_init(&req, hdev);
1497

1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508
	/* If BR/EDR is not enabled and we disable advertising as a
	 * by-product of disabling connectable, we need to update the
	 * advertising flags.
	 */
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		if (!cp->val) {
			clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
		update_adv_data(&req);
	} else if (cp->val != test_bit(HCI_PSCAN, &hdev->flags)) {
1509 1510 1511 1512 1513 1514
		if (cp->val) {
			scan = SCAN_PAGE;
		} else {
			scan = 0;

			if (test_bit(HCI_ISCAN, &hdev->flags) &&
1515
			    hdev->discov_timeout > 0)
1516 1517
				cancel_delayed_work(&hdev->discov_off);
		}
1518

1519 1520
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	}
1521

1522 1523 1524 1525 1526 1527 1528
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1529 1530
		write_fast_connectable(&req, false);

1531 1532 1533 1534 1535 1536
	if (test_bit(HCI_ADVERTISING, &hdev->dev_flags) &&
	    hci_conn_num(hdev, LE_LINK) == 0) {
		disable_advertising(&req);
		enable_advertising(&req);
	}

1537
	err = hci_req_run(&req, set_connectable_complete);
1538
	if (err < 0) {
1539
		mgmt_pending_remove(cmd);
1540
		if (err == -ENODATA)
1541 1542
			err = set_connectable_update_settings(hdev, sk,
							      cp->val);
1543 1544
		goto failed;
	}
1545 1546

failed:
1547
	hci_dev_unlock(hdev);
1548 1549 1550
	return err;
}

1551
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1552
			u16 len)
1553
{
1554
	struct mgmt_mode *cp = data;
1555
	bool changed;
1556 1557
	int err;

1558
	BT_DBG("request for %s", hdev->name);
1559

1560 1561 1562 1563
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1564
	hci_dev_lock(hdev);
1565 1566

	if (cp->val)
1567
		changed = !test_and_set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1568
	else
1569
		changed = test_and_clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1570

1571
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1572
	if (err < 0)
1573
		goto unlock;
1574

1575 1576
	if (changed)
		err = new_settings(hdev, sk);
1577

1578
unlock:
1579
	hci_dev_unlock(hdev);
1580 1581 1582
	return err;
}

1583 1584
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1585 1586 1587
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1588
	u8 val, status;
1589 1590
	int err;

1591
	BT_DBG("request for %s", hdev->name);
1592

1593 1594
	status = mgmt_bredr_support(hdev);
	if (status)
1595
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1596
				  status);
1597

1598 1599 1600 1601
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1602 1603
	hci_dev_lock(hdev);

1604
	if (!hdev_is_powered(hdev)) {
1605 1606 1607
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1608
					  &hdev->dev_flags)) {
1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1620 1621 1622 1623
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1624
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1625
				 MGMT_STATUS_BUSY);
1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1653
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1654 1655 1656
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1657
	u8 status;
1658 1659
	int err;

1660
	BT_DBG("request for %s", hdev->name);
1661

1662 1663 1664 1665
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);

1666 1667 1668
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1669

1670 1671 1672 1673
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1674
	hci_dev_lock(hdev);
1675

1676
	if (!hdev_is_powered(hdev)) {
1677
		bool changed;
1678

1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689
		if (cp->val) {
			changed = !test_and_set_bit(HCI_SSP_ENABLED,
						    &hdev->dev_flags);
		} else {
			changed = test_and_clear_bit(HCI_SSP_ENABLED,
						     &hdev->dev_flags);
			if (!changed)
				changed = test_and_clear_bit(HCI_HS_ENABLED,
							     &hdev->dev_flags);
			else
				clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1690 1691 1692 1693 1694 1695 1696 1697 1698
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1699 1700 1701
		goto failed;
	}

1702 1703
	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_HS, hdev)) {
1704 1705
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1706 1707 1708
		goto failed;
	}

1709
	if (!!cp->val == test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
1710 1711 1712 1713 1714 1715 1716 1717 1718 1719
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1720
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val);
1721 1722 1723 1724 1725 1726 1727 1728 1729 1730
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1731
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1732 1733
{
	struct mgmt_mode *cp = data;
1734
	bool changed;
1735
	u8 status;
1736
	int err;
1737

1738
	BT_DBG("request for %s", hdev->name);
1739

1740 1741 1742
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1743

1744 1745 1746 1747 1748 1749 1750 1751
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_REJECTED);

1752 1753 1754 1755
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1756 1757
	hci_dev_lock(hdev);

1758
	if (cp->val) {
1759
		changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1760 1761 1762 1763 1764 1765 1766
	} else {
		if (hdev_is_powered(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					 MGMT_STATUS_REJECTED);
			goto unlock;
		}

1767
		changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1768
	}
1769 1770 1771 1772 1773 1774 1775

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1776

1777 1778 1779
unlock:
	hci_dev_unlock(hdev);
	return err;
1780 1781
}

1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799
static void le_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811

	/* Make sure the controller has a good default for
	 * advertising data. Restrict the update to when LE
	 * has actually been enabled. During power on, the
	 * update in powered_update_hci will take care of it.
	 */
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
		struct hci_request req;

		hci_dev_lock(hdev);

		hci_req_init(&req, hdev);
1812
		update_adv_data(&req);
1813
		update_scan_rsp_data(&req);
1814 1815 1816 1817
		hci_req_run(&req, NULL);

		hci_dev_unlock(hdev);
	}
1818 1819
}

1820
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1821 1822 1823 1824
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
1825
	struct hci_request req;
1826
	int err;
1827
	u8 val, enabled;
1828

1829
	BT_DBG("request for %s", hdev->name);
1830

1831 1832 1833
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1834

1835 1836 1837 1838
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1839
	/* LE-only devices do not allow toggling LE on/off */
1840
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1841 1842 1843
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1844
	hci_dev_lock(hdev);
1845 1846

	val = !!cp->val;
1847
	enabled = lmp_host_le_capable(hdev);
1848

1849
	if (!hdev_is_powered(hdev) || val == enabled) {
1850 1851 1852 1853 1854 1855 1856
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

1857 1858
		if (!val && test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
			clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
1859 1860 1861
			changed = true;
		}

1862 1863
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1864
			goto unlock;
1865 1866 1867 1868

		if (changed)
			err = new_settings(hdev, sk);

1869
		goto unlock;
1870 1871
	}

1872 1873
	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1874
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1875
				 MGMT_STATUS_BUSY);
1876
		goto unlock;
1877 1878 1879 1880 1881
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1882
		goto unlock;
1883 1884
	}

1885 1886
	hci_req_init(&req, hdev);

1887 1888 1889 1890
	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1891
		hci_cp.simul = lmp_le_br_capable(hdev);
1892 1893 1894
	} else {
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
			disable_advertising(&req);
1895 1896
	}

1897 1898 1899 1900
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1901
	if (err < 0)
1902 1903
		mgmt_pending_remove(cmd);

1904 1905
unlock:
	hci_dev_unlock(hdev);
1906 1907 1908
	return err;
}

1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1977
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1978
{
1979
	struct mgmt_cp_add_uuid *cp = data;
1980
	struct pending_cmd *cmd;
1981
	struct hci_request req;
1982 1983 1984
	struct bt_uuid *uuid;
	int err;

1985
	BT_DBG("request for %s", hdev->name);
1986

1987
	hci_dev_lock(hdev);
1988

1989
	if (pending_eir_or_class(hdev)) {
1990
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1991
				 MGMT_STATUS_BUSY);
1992 1993 1994
		goto failed;
	}

1995
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1996 1997 1998 1999 2000 2001
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
2002
	uuid->svc_hint = cp->svc_hint;
2003
	uuid->size = get_uuid_size(cp->uuid);
2004

2005
	list_add_tail(&uuid->list, &hdev->uuids);
2006

2007
	hci_req_init(&req, hdev);
2008

2009 2010 2011
	update_class(&req);
	update_eir(&req);

2012 2013 2014 2015
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
2016

2017
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
2018
				   hdev->dev_class, 3);
2019 2020 2021 2022
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
2023
	if (!cmd) {
2024
		err = -ENOMEM;
2025 2026 2027 2028
		goto failed;
	}

	err = 0;
2029 2030

failed:
2031
	hci_dev_unlock(hdev);
2032 2033 2034
	return err;
}

2035 2036 2037 2038 2039 2040
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
2041 2042
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
2043 2044 2045 2046 2047 2048
		return true;
	}

	return false;
}

2049 2050 2051 2052 2053 2054 2055
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

2056
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
2057
		       u16 len)
2058
{
2059
	struct mgmt_cp_remove_uuid *cp = data;
2060
	struct pending_cmd *cmd;
2061
	struct bt_uuid *match, *tmp;
2062
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
2063
	struct hci_request req;
2064 2065
	int err, found;

2066
	BT_DBG("request for %s", hdev->name);
2067

2068
	hci_dev_lock(hdev);
2069

2070
	if (pending_eir_or_class(hdev)) {
2071
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2072
				 MGMT_STATUS_BUSY);
2073 2074 2075
		goto unlock;
	}

2076
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
2077
		hci_uuids_clear(hdev);
2078

2079
		if (enable_service_cache(hdev)) {
2080
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2081
					   0, hdev->dev_class, 3);
2082 2083
			goto unlock;
		}
2084

2085
		goto update_class;
2086 2087 2088 2089
	}

	found = 0;

2090
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
2091 2092 2093 2094
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
2095
		kfree(match);
2096 2097 2098 2099
		found++;
	}

	if (found == 0) {
2100
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
2101
				 MGMT_STATUS_INVALID_PARAMS);
2102 2103 2104
		goto unlock;
	}

2105
update_class:
2106
	hci_req_init(&req, hdev);
2107

2108 2109 2110
	update_class(&req);
	update_eir(&req);

2111 2112 2113 2114
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2115

2116
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
2117
				   hdev->dev_class, 3);
2118 2119 2120 2121
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
2122
	if (!cmd) {
2123
		err = -ENOMEM;
2124 2125 2126 2127
		goto unlock;
	}

	err = 0;
2128 2129

unlock:
2130
	hci_dev_unlock(hdev);
2131 2132 2133
	return err;
}

2134 2135 2136 2137 2138 2139 2140
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

2141
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
2142
			 u16 len)
2143
{
2144
	struct mgmt_cp_set_dev_class *cp = data;
2145
	struct pending_cmd *cmd;
2146
	struct hci_request req;
2147 2148
	int err;

2149
	BT_DBG("request for %s", hdev->name);
2150

2151
	if (!lmp_bredr_capable(hdev))
2152 2153
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
2154

2155
	hci_dev_lock(hdev);
2156

2157 2158 2159 2160 2161
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
2162

2163 2164 2165 2166 2167
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
2168

2169 2170 2171
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

2172
	if (!hdev_is_powered(hdev)) {
2173
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
2174
				   hdev->dev_class, 3);
2175 2176 2177
		goto unlock;
	}

2178 2179
	hci_req_init(&req, hdev);

2180
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
2181 2182 2183
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
2184
		update_eir(&req);
2185
	}
2186

2187 2188
	update_class(&req);

2189 2190 2191 2192
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2193

2194
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
2195
				   hdev->dev_class, 3);
2196 2197 2198 2199
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
2200
	if (!cmd) {
2201
		err = -ENOMEM;
2202 2203 2204 2205
		goto unlock;
	}

	err = 0;
2206

2207
unlock:
2208
	hci_dev_unlock(hdev);
2209 2210 2211
	return err;
}

2212
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
2213
			  u16 len)
2214
{
2215
	struct mgmt_cp_load_link_keys *cp = data;
2216
	u16 key_count, expected_len;
2217
	bool changed;
2218
	int i;
2219

2220 2221 2222 2223 2224 2225
	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_NOT_SUPPORTED);

2226
	key_count = __le16_to_cpu(cp->key_count);
2227

2228 2229
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
2230
	if (expected_len != len) {
2231
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
2232
		       len, expected_len);
2233
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
2234
				  MGMT_STATUS_INVALID_PARAMS);
2235 2236
	}

2237 2238 2239 2240
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

2241
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
2242
	       key_count);
2243

2244 2245 2246
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

2247
		if (key->addr.type != BDADDR_BREDR || key->type > 0x08)
2248 2249 2250 2251
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

2252
	hci_dev_lock(hdev);
2253 2254 2255 2256

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
2257
		changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
2258
	else
2259 2260 2261 2262
		changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);

	if (changed)
		new_settings(hdev, NULL);
2263

2264
	for (i = 0; i < key_count; i++) {
2265
		struct mgmt_link_key_info *key = &cp->keys[i];
2266

2267
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
2268
				 key->type, key->pin_len);
2269 2270
	}

2271
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
2272

2273
	hci_dev_unlock(hdev);
2274

2275
	return 0;
2276 2277
}

2278
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
2279
			   u8 addr_type, struct sock *skip_sk)
2280 2281 2282 2283 2284 2285 2286
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
2287
			  skip_sk);
2288 2289
}

2290
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2291
			 u16 len)
2292
{
2293 2294
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
2295 2296
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
2297 2298 2299
	struct hci_conn *conn;
	int err;

2300
	memset(&rp, 0, sizeof(rp));
2301 2302
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2303

2304 2305 2306 2307 2308
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2309 2310 2311 2312 2313
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2314 2315
	hci_dev_lock(hdev);

2316
	if (!hdev_is_powered(hdev)) {
2317
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2318
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2319 2320 2321
		goto unlock;
	}

2322
	if (cp->addr.type == BDADDR_BREDR) {
2323
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
2324 2325 2326 2327 2328 2329 2330 2331
	} else {
		u8 addr_type;

		if (cp->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;

2332 2333
		hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type);

2334 2335
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type);
	}
2336

2337
	if (err < 0) {
2338
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
2339
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
2340 2341 2342
		goto unlock;
	}

2343
	if (cp->disconnect) {
2344
		if (cp->addr.type == BDADDR_BREDR)
2345
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
2346
						       &cp->addr.bdaddr);
2347 2348
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
2349
						       &cp->addr.bdaddr);
2350 2351 2352
	} else {
		conn = NULL;
	}
2353

2354
	if (!conn) {
2355
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
2356
				   &rp, sizeof(rp));
2357
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
2358 2359
		goto unlock;
	}
2360

2361
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
2362
			       sizeof(*cp));
2363 2364 2365
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
2366 2367
	}

2368
	dc.handle = cpu_to_le16(conn->handle);
2369 2370 2371 2372 2373
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

2374
unlock:
2375
	hci_dev_unlock(hdev);
2376 2377 2378
	return err;
}

2379
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
2380
		      u16 len)
2381
{
2382
	struct mgmt_cp_disconnect *cp = data;
2383
	struct mgmt_rp_disconnect rp;
2384
	struct hci_cp_disconnect dc;
2385
	struct pending_cmd *cmd;
2386 2387 2388 2389 2390
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2391 2392 2393 2394
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2395
	if (!bdaddr_type_is_valid(cp->addr.type))
2396 2397 2398
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
2399

2400
	hci_dev_lock(hdev);
2401 2402

	if (!test_bit(HCI_UP, &hdev->flags)) {
2403 2404
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2405 2406 2407
		goto failed;
	}

2408
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
2409 2410
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2411 2412 2413
		goto failed;
	}

2414
	if (cp->addr.type == BDADDR_BREDR)
2415 2416
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2417 2418
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
2419

2420
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2421 2422
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
2423 2424 2425
		goto failed;
	}

2426
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2427 2428
	if (!cmd) {
		err = -ENOMEM;
2429
		goto failed;
2430
	}
2431

2432
	dc.handle = cpu_to_le16(conn->handle);
2433
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
2434 2435 2436

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
2437
		mgmt_pending_remove(cmd);
2438 2439

failed:
2440
	hci_dev_unlock(hdev);
2441 2442 2443
	return err;
}

2444
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2445 2446 2447
{
	switch (link_type) {
	case LE_LINK:
2448 2449
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2450
			return BDADDR_LE_PUBLIC;
2451

2452
		default:
2453
			/* Fallback to LE Random address type */
2454
			return BDADDR_LE_RANDOM;
2455
		}
2456

2457
	default:
2458
		/* Fallback to BR/EDR type */
2459
		return BDADDR_BREDR;
2460 2461 2462
	}
}

2463 2464
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2465 2466
{
	struct mgmt_rp_get_connections *rp;
2467
	struct hci_conn *c;
2468
	size_t rp_len;
2469 2470
	int err;
	u16 i;
2471 2472 2473

	BT_DBG("");

2474
	hci_dev_lock(hdev);
2475

2476
	if (!hdev_is_powered(hdev)) {
2477
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
2478
				 MGMT_STATUS_NOT_POWERED);
2479 2480 2481
		goto unlock;
	}

2482
	i = 0;
2483 2484
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2485
			i++;
2486 2487
	}

2488
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2489
	rp = kmalloc(rp_len, GFP_KERNEL);
2490
	if (!rp) {
2491 2492 2493 2494 2495
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2496
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2497 2498
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2499
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2500
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2501
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2502 2503 2504 2505
			continue;
		i++;
	}

2506
	rp->conn_count = cpu_to_le16(i);
2507

2508 2509
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2510

2511
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
2512
			   rp_len);
2513

2514
	kfree(rp);
2515 2516

unlock:
2517
	hci_dev_unlock(hdev);
2518 2519 2520
	return err;
}

2521
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2522
				   struct mgmt_cp_pin_code_neg_reply *cp)
2523 2524 2525 2526
{
	struct pending_cmd *cmd;
	int err;

2527
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2528
			       sizeof(*cp));
2529 2530 2531
	if (!cmd)
		return -ENOMEM;

2532
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2533
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2534 2535 2536 2537 2538 2539
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2540
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2541
			  u16 len)
2542
{
2543
	struct hci_conn *conn;
2544
	struct mgmt_cp_pin_code_reply *cp = data;
2545
	struct hci_cp_pin_code_reply reply;
2546
	struct pending_cmd *cmd;
2547 2548 2549 2550
	int err;

	BT_DBG("");

2551
	hci_dev_lock(hdev);
2552

2553
	if (!hdev_is_powered(hdev)) {
2554
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2555
				 MGMT_STATUS_NOT_POWERED);
2556 2557 2558
		goto failed;
	}

2559
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2560
	if (!conn) {
2561
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2562
				 MGMT_STATUS_NOT_CONNECTED);
2563 2564 2565 2566
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2567 2568 2569
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2570 2571 2572

		BT_ERR("PIN code is not 16 bytes long");

2573
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2574
		if (err >= 0)
2575
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2576
					 MGMT_STATUS_INVALID_PARAMS);
2577 2578 2579 2580

		goto failed;
	}

2581
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2582 2583
	if (!cmd) {
		err = -ENOMEM;
2584
		goto failed;
2585
	}
2586

2587
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2588
	reply.pin_len = cp->pin_len;
2589
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2590 2591 2592

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2593
		mgmt_pending_remove(cmd);
2594 2595

failed:
2596
	hci_dev_unlock(hdev);
2597 2598 2599
	return err;
}

2600 2601
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2602
{
2603
	struct mgmt_cp_set_io_capability *cp = data;
2604 2605 2606

	BT_DBG("");

2607
	hci_dev_lock(hdev);
2608 2609 2610 2611

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2612
	       hdev->io_capability);
2613

2614
	hci_dev_unlock(hdev);
2615

2616 2617
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2618 2619
}

2620
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2621 2622
{
	struct hci_dev *hdev = conn->hdev;
2623
	struct pending_cmd *cmd;
2624

2625
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2626 2627 2628 2629 2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2643
	bacpy(&rp.addr.bdaddr, &conn->dst);
2644
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2645

2646
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2647
		     &rp, sizeof(rp));
2648 2649 2650 2651 2652 2653

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2654
	hci_conn_drop(conn);
2655

2656
	mgmt_pending_remove(cmd);
2657 2658
}

2659 2660 2661 2662 2663 2664 2665 2666 2667 2668
void mgmt_smp_complete(struct hci_conn *conn, bool complete)
{
	u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED;
	struct pending_cmd *cmd;

	cmd = find_pairing(conn);
	if (cmd)
		pairing_complete(cmd, status);
}

2669 2670 2671 2672 2673 2674 2675
static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2676
	if (!cmd)
2677
		BT_DBG("Unable to find a pending command");
2678
	else
2679
		pairing_complete(cmd, mgmt_status(status));
2680 2681
}

2682
static void le_pairing_complete_cb(struct hci_conn *conn, u8 status)
2683 2684 2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2698
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2699
		       u16 len)
2700
{
2701
	struct mgmt_cp_pair_device *cp = data;
2702
	struct mgmt_rp_pair_device rp;
2703 2704 2705 2706 2707 2708 2709
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2710 2711 2712 2713
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2714 2715 2716 2717 2718
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2719
	hci_dev_lock(hdev);
2720

2721
	if (!hdev_is_powered(hdev)) {
2722 2723
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2724 2725 2726
		goto unlock;
	}

2727 2728
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2729
		auth_type = HCI_AT_DEDICATED_BONDING;
2730
	else
2731 2732
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2733
	if (cp->addr.type == BDADDR_BREDR)
2734 2735
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2736
	else
2737 2738
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2739

2740
	if (IS_ERR(conn)) {
2741 2742 2743 2744 2745 2746 2747
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2748
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2749
				   status, &rp,
2750
				   sizeof(rp));
2751 2752 2753 2754
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2755
		hci_conn_drop(conn);
2756
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2757
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2758 2759 2760
		goto unlock;
	}

2761
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2762 2763
	if (!cmd) {
		err = -ENOMEM;
2764
		hci_conn_drop(conn);
2765 2766 2767
		goto unlock;
	}

2768
	/* For LE, just connecting isn't a proof that the pairing finished */
2769
	if (cp->addr.type == BDADDR_BREDR) {
2770
		conn->connect_cfm_cb = pairing_complete_cb;
2771 2772 2773 2774 2775 2776 2777
		conn->security_cfm_cb = pairing_complete_cb;
		conn->disconn_cfm_cb = pairing_complete_cb;
	} else {
		conn->connect_cfm_cb = le_pairing_complete_cb;
		conn->security_cfm_cb = le_pairing_complete_cb;
		conn->disconn_cfm_cb = le_pairing_complete_cb;
	}
2778

2779 2780 2781 2782
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2783
	    hci_conn_security(conn, sec_level, auth_type))
2784 2785 2786 2787 2788
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2789
	hci_dev_unlock(hdev);
2790 2791 2792
	return err;
}

2793 2794
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2795
{
2796
	struct mgmt_addr_info *addr = data;
2797 2798 2799 2800 2801 2802 2803 2804
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2805
	if (!hdev_is_powered(hdev)) {
2806
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2807
				 MGMT_STATUS_NOT_POWERED);
2808 2809 2810
		goto unlock;
	}

2811 2812
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2813
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2814
				 MGMT_STATUS_INVALID_PARAMS);
2815 2816 2817 2818 2819 2820
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2821
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2822
				 MGMT_STATUS_INVALID_PARAMS);
2823 2824 2825 2826 2827
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2828
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2829
			   addr, sizeof(*addr));
2830 2831 2832 2833 2834
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2835
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2836
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2837
			     u16 hci_op, __le32 passkey)
2838 2839
{
	struct pending_cmd *cmd;
2840
	struct hci_conn *conn;
2841 2842
	int err;

2843
	hci_dev_lock(hdev);
2844

2845
	if (!hdev_is_powered(hdev)) {
2846 2847 2848
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2849
		goto done;
2850 2851
	}

2852 2853
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2854
	else
2855
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2856 2857

	if (!conn) {
2858 2859 2860
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2861 2862
		goto done;
	}
2863

2864
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2865
		/* Continue with pairing via SMP */
2866 2867 2868
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2869 2870 2871
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2872
		else
2873 2874 2875
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2876 2877 2878 2879

		goto done;
	}

2880
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2881 2882
	if (!cmd) {
		err = -ENOMEM;
2883
		goto done;
2884 2885
	}

2886
	/* Continue with pairing via HCI */
2887 2888 2889
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2890
		bacpy(&cp.bdaddr, &addr->bdaddr);
2891 2892 2893
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2894 2895
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2896

2897 2898
	if (err < 0)
		mgmt_pending_remove(cmd);
2899

2900
done:
2901
	hci_dev_unlock(hdev);
2902 2903 2904
	return err;
}

2905 2906 2907 2908 2909 2910 2911
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2912
	return user_pairing_resp(sk, hdev, &cp->addr,
2913 2914 2915 2916
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2917 2918
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2919
{
2920
	struct mgmt_cp_user_confirm_reply *cp = data;
2921 2922 2923 2924

	BT_DBG("");

	if (len != sizeof(*cp))
2925
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2926
				  MGMT_STATUS_INVALID_PARAMS);
2927

2928
	return user_pairing_resp(sk, hdev, &cp->addr,
2929 2930
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2931 2932
}

2933
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2934
				  void *data, u16 len)
2935
{
2936
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2937 2938 2939

	BT_DBG("");

2940
	return user_pairing_resp(sk, hdev, &cp->addr,
2941 2942
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2943 2944
}

2945 2946
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2947
{
2948
	struct mgmt_cp_user_passkey_reply *cp = data;
2949 2950 2951

	BT_DBG("");

2952
	return user_pairing_resp(sk, hdev, &cp->addr,
2953 2954
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2955 2956
}

2957
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2958
				  void *data, u16 len)
2959
{
2960
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2961 2962 2963

	BT_DBG("");

2964
	return user_pairing_resp(sk, hdev, &cp->addr,
2965 2966
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2967 2968
}

2969
static void update_name(struct hci_request *req)
2970
{
2971
	struct hci_dev *hdev = req->hdev;
2972 2973
	struct hci_cp_write_local_name cp;

2974
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2975

2976
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2977 2978
}

2979 2980 2981 2982 2983 2984 2985 2986 2987 2988 2989 2990 2991 2992 2993 2994 2995 2996 2997 2998 2999 3000 3001 3002 3003 3004 3005 3006
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3007
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
3008
			  u16 len)
3009
{
3010
	struct mgmt_cp_set_local_name *cp = data;
3011
	struct pending_cmd *cmd;
3012
	struct hci_request req;
3013 3014 3015 3016
	int err;

	BT_DBG("");

3017
	hci_dev_lock(hdev);
3018

3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

3030
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
3031

3032
	if (!hdev_is_powered(hdev)) {
3033
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
3034 3035

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
3036
				   data, len);
3037 3038 3039 3040
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
3041
				 sk);
3042

3043 3044 3045
		goto failed;
	}

3046
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
3047 3048 3049 3050 3051
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3052 3053
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

3054
	hci_req_init(&req, hdev);
3055 3056 3057 3058 3059 3060

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

3061 3062 3063
	/* The name is stored in the scan response data and so
	 * no need to udpate the advertising data here.
	 */
3064
	if (lmp_le_capable(hdev))
3065
		update_scan_rsp_data(&req);
3066

3067
	err = hci_req_run(&req, set_name_complete);
3068 3069 3070 3071
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
3072
	hci_dev_unlock(hdev);
3073 3074 3075
	return err;
}

3076
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
3077
			       void *data, u16 data_len)
3078 3079 3080 3081
{
	struct pending_cmd *cmd;
	int err;

3082
	BT_DBG("%s", hdev->name);
3083

3084
	hci_dev_lock(hdev);
3085

3086
	if (!hdev_is_powered(hdev)) {
3087
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3088
				 MGMT_STATUS_NOT_POWERED);
3089 3090 3091
		goto unlock;
	}

3092
	if (!lmp_ssp_capable(hdev)) {
3093
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3094
				 MGMT_STATUS_NOT_SUPPORTED);
3095 3096 3097
		goto unlock;
	}

3098
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
3099
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
3100
				 MGMT_STATUS_BUSY);
3101 3102 3103
		goto unlock;
	}

3104
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
3105 3106 3107 3108 3109
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

3110 3111 3112 3113 3114 3115
	if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags))
		err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_EXT_DATA,
				   0, NULL);
	else
		err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);

3116 3117 3118 3119
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
3120
	hci_dev_unlock(hdev);
3121 3122 3123
	return err;
}

3124
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3125
			       void *data, u16 len)
3126 3127 3128
{
	int err;

3129
	BT_DBG("%s ", hdev->name);
3130

3131
	hci_dev_lock(hdev);
3132

3133 3134 3135
	if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_data *cp = data;
		u8 status;
3136

3137 3138 3139 3140 3141 3142 3143 3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
					      cp->hash, cp->randomizer);
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				   status, &cp->addr, sizeof(cp->addr));
	} else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_ext_data *cp = data;
		u8 status;

		err = hci_add_remote_oob_ext_data(hdev, &cp->addr.bdaddr,
						  cp->hash192,
						  cp->randomizer192,
						  cp->hash256,
						  cp->randomizer256);
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				   status, &cp->addr, sizeof(cp->addr));
	} else {
		BT_ERR("add_remote_oob_data: invalid length of %u bytes", len);
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				 MGMT_STATUS_INVALID_PARAMS);
	}
3167

3168
	hci_dev_unlock(hdev);
3169 3170 3171
	return err;
}

3172
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3173
				  void *data, u16 len)
3174
{
3175
	struct mgmt_cp_remove_remote_oob_data *cp = data;
3176
	u8 status;
3177 3178
	int err;

3179
	BT_DBG("%s", hdev->name);
3180

3181
	hci_dev_lock(hdev);
3182

3183
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
3184
	if (err < 0)
3185
		status = MGMT_STATUS_INVALID_PARAMS;
3186
	else
3187
		status = MGMT_STATUS_SUCCESS;
3188

3189
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
3190
			   status, &cp->addr, sizeof(cp->addr));
3191

3192
	hci_dev_unlock(hdev);
3193 3194 3195
	return err;
}

3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231 3232 3233 3234
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
3235
				   DISCOV_LE_TIMEOUT);
3236 3237 3238 3239
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
3240
				   DISCOV_INTERLEAVED_TIMEOUT);
3241 3242 3243 3244 3245 3246 3247 3248 3249 3250
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

3251
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
3252
			   void *data, u16 len)
3253
{
3254
	struct mgmt_cp_start_discovery *cp = data;
3255
	struct pending_cmd *cmd;
3256 3257 3258 3259 3260 3261
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
3262
	u8 status;
3263 3264
	int err;

3265
	BT_DBG("%s", hdev->name);
3266

3267
	hci_dev_lock(hdev);
3268

3269
	if (!hdev_is_powered(hdev)) {
3270
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3271
				 MGMT_STATUS_NOT_POWERED);
3272 3273 3274
		goto failed;
	}

3275 3276 3277 3278 3279 3280
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

3281
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
3282
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3283
				 MGMT_STATUS_BUSY);
3284 3285 3286
		goto failed;
	}

3287
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
3288 3289 3290 3291 3292
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
3293 3294
	hdev->discovery.type = cp->type;

3295 3296
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
3297
	switch (hdev->discovery.type) {
3298
	case DISCOV_TYPE_BREDR:
3299 3300
		status = mgmt_bredr_support(hdev);
		if (status) {
3301
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3302
					 status);
3303 3304 3305 3306
			mgmt_pending_remove(cmd);
			goto failed;
		}

3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
3318
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
3319
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
3320 3321 3322
		break;

	case DISCOV_TYPE_LE:
3323
	case DISCOV_TYPE_INTERLEAVED:
3324 3325
		status = mgmt_le_support(hdev);
		if (status) {
3326
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
3327
					 status);
3328 3329 3330 3331
			mgmt_pending_remove(cmd);
			goto failed;
		}

3332
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
3333
		    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
3334 3335 3336 3337 3338 3339
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

3340
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
3341 3342 3343 3344 3345 3346 3347 3348 3349 3350 3351 3352 3353 3354 3355
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
3356 3357
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
3358
		param_cp.own_address_type = hdev->own_addr_type;
3359 3360 3361 3362 3363 3364 3365 3366
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
3367 3368
		break;

3369
	default:
3370 3371 3372 3373
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
3374
	}
3375

3376
	err = hci_req_run(&req, start_discovery_complete);
3377 3378
	if (err < 0)
		mgmt_pending_remove(cmd);
3379 3380
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3381 3382

failed:
3383
	hci_dev_unlock(hdev);
3384 3385 3386
	return err;
}

3387 3388 3389 3390 3391 3392 3393 3394 3395 3396 3397 3398 3399 3400 3401 3402
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

3403 3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418 3419
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

3420
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
3421
			  u16 len)
3422
{
3423
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
3424
	struct pending_cmd *cmd;
3425 3426
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
3427 3428
	struct hci_request req;
	struct hci_cp_le_set_scan_enable enable_cp;
3429 3430
	int err;

3431
	BT_DBG("%s", hdev->name);
3432

3433
	hci_dev_lock(hdev);
3434

3435
	if (!hci_discovery_active(hdev)) {
3436
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
3437 3438
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
3439 3440 3441 3442
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
3443
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
3444 3445
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
3446
		goto unlock;
3447 3448
	}

3449
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
3450 3451
	if (!cmd) {
		err = -ENOMEM;
3452 3453 3454
		goto unlock;
	}

3455 3456
	hci_req_init(&req, hdev);

3457 3458
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
3459 3460 3461 3462 3463 3464 3465 3466 3467 3468
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

			memset(&enable_cp, 0, sizeof(enable_cp));
			enable_cp.enable = LE_SCAN_DISABLE;
			hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
				    sizeof(enable_cp), &enable_cp);
		}
3469

3470 3471 3472 3473
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
3474
						     NAME_PENDING);
3475
		if (!e) {
3476
			mgmt_pending_remove(cmd);
3477 3478 3479 3480 3481 3482 3483
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
3484

3485
		bacpy(&cp.bdaddr, &e->data.bdaddr);
3486 3487
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
3488 3489 3490 3491 3492

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
3493 3494 3495 3496 3497 3498

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
3499 3500
	}

3501
	err = hci_req_run(&req, stop_discovery_complete);
3502 3503
	if (err < 0)
		mgmt_pending_remove(cmd);
3504 3505
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
3506

3507
unlock:
3508
	hci_dev_unlock(hdev);
3509 3510 3511
	return err;
}

3512
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3513
			u16 len)
3514
{
3515
	struct mgmt_cp_confirm_name *cp = data;
3516 3517 3518
	struct inquiry_entry *e;
	int err;

3519
	BT_DBG("%s", hdev->name);
3520 3521 3522

	hci_dev_lock(hdev);

3523
	if (!hci_discovery_active(hdev)) {
3524
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3525
				 MGMT_STATUS_FAILED);
3526 3527 3528
		goto failed;
	}

3529
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3530
	if (!e) {
3531
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3532
				 MGMT_STATUS_INVALID_PARAMS);
3533 3534 3535 3536 3537 3538 3539 3540
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3541
		hci_inquiry_cache_update_resolve(hdev, e);
3542 3543
	}

3544 3545
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
3546 3547 3548 3549 3550 3551

failed:
	hci_dev_unlock(hdev);
	return err;
}

3552
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3553
			u16 len)
3554
{
3555
	struct mgmt_cp_block_device *cp = data;
3556
	u8 status;
3557 3558
	int err;

3559
	BT_DBG("%s", hdev->name);
3560

3561
	if (!bdaddr_type_is_valid(cp->addr.type))
3562 3563 3564
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3565

3566
	hci_dev_lock(hdev);
3567

3568
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
3569
	if (err < 0)
3570
		status = MGMT_STATUS_FAILED;
3571
	else
3572
		status = MGMT_STATUS_SUCCESS;
3573

3574
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
3575
			   &cp->addr, sizeof(cp->addr));
3576

3577
	hci_dev_unlock(hdev);
3578 3579 3580 3581

	return err;
}

3582
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3583
			  u16 len)
3584
{
3585
	struct mgmt_cp_unblock_device *cp = data;
3586
	u8 status;
3587 3588
	int err;

3589
	BT_DBG("%s", hdev->name);
3590

3591
	if (!bdaddr_type_is_valid(cp->addr.type))
3592 3593 3594
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3595

3596
	hci_dev_lock(hdev);
3597

3598
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3599
	if (err < 0)
3600
		status = MGMT_STATUS_INVALID_PARAMS;
3601
	else
3602
		status = MGMT_STATUS_SUCCESS;
3603

3604
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3605
			   &cp->addr, sizeof(cp->addr));
3606

3607
	hci_dev_unlock(hdev);
3608 3609 3610 3611

	return err;
}

3612 3613 3614 3615
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3616
	struct hci_request req;
3617
	int err;
3618
	__u16 source;
3619 3620 3621

	BT_DBG("%s", hdev->name);

3622 3623 3624 3625 3626 3627
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3628 3629
	hci_dev_lock(hdev);

3630
	hdev->devid_source = source;
3631 3632 3633 3634 3635 3636
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3637 3638 3639
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3640 3641 3642 3643 3644 3645

	hci_dev_unlock(hdev);

	return err;
}

3646 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666
static void set_advertising_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

3667 3668
static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
3669 3670 3671 3672
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
3673
	u8 val, enabled, status;
3674 3675 3676 3677
	int err;

	BT_DBG("request for %s", hdev->name);

3678 3679
	status = mgmt_le_support(hdev);
	if (status)
3680
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3681
				  status);
3682 3683 3684 3685 3686 3687 3688 3689

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	val = !!cp->val;
3690
	enabled = test_bit(HCI_ADVERTISING, &hdev->dev_flags);
3691

3692 3693 3694 3695 3696 3697
	/* The following conditions are ones which mean that we should
	 * not do any HCI communication but directly send a mgmt
	 * response to user space (after toggling the flag if
	 * necessary).
	 */
	if (!hdev_is_powered(hdev) || val == enabled ||
3698
	    hci_conn_num(hdev, LE_LINK) > 0) {
3699 3700
		bool changed = false;

3701 3702
		if (val != test_bit(HCI_ADVERTISING, &hdev->dev_flags)) {
			change_bit(HCI_ADVERTISING, &hdev->dev_flags);
3703 3704 3705 3706 3707 3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

3731 3732 3733 3734
	if (val)
		enable_advertising(&req);
	else
		disable_advertising(&req);
3735 3736 3737 3738 3739 3740 3741 3742 3743 3744

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3745 3746 3747 3748 3749 3750 3751 3752
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3753
	if (!lmp_le_capable(hdev))
3754
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
3755
				  MGMT_STATUS_NOT_SUPPORTED);
3756 3757 3758 3759 3760 3761 3762 3763 3764 3765 3766 3767 3768 3769 3770 3771 3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783 3784

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_REJECTED);

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807 3808 3809
static int set_scan_params(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_cp_set_scan_params *cp = data;
	__u16 interval, window;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_NOT_SUPPORTED);

	interval = __le16_to_cpu(cp->interval);

	if (interval < 0x0004 || interval > 0x4000)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

	window = __le16_to_cpu(cp->window);

	if (window < 0x0004 || window > 0x4000)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

3810 3811 3812 3813
	if (window > interval)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				  MGMT_STATUS_INVALID_PARAMS);

3814 3815 3816 3817 3818 3819 3820 3821 3822 3823 3824 3825
	hci_dev_lock(hdev);

	hdev->le_scan_interval = interval;
	hdev->le_scan_window = window;

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3826 3827 3828 3829 3830 3831 3832 3833 3834 3835 3836 3837 3838 3839 3840 3841
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3842 3843 3844 3845 3846 3847 3848
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3849 3850 3851 3852 3853 3854 3855 3856 3857 3858
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3859
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3860
				void *data, u16 len)
3861
{
3862
	struct mgmt_mode *cp = data;
3863 3864
	struct pending_cmd *cmd;
	struct hci_request req;
3865 3866
	int err;

3867
	BT_DBG("%s", hdev->name);
3868

3869 3870
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
3871 3872 3873
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3874 3875 3876 3877
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3878
	if (!hdev_is_powered(hdev))
3879
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3880
				  MGMT_STATUS_NOT_POWERED);
3881 3882

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3883
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3884
				  MGMT_STATUS_REJECTED);
3885 3886 3887

	hci_dev_lock(hdev);

3888 3889 3890 3891 3892 3893
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3894 3895 3896 3897 3898 3899
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3900 3901 3902 3903 3904
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3905 3906
	}

3907 3908
	hci_req_init(&req, hdev);

3909
	write_fast_connectable(&req, cp->val);
3910 3911

	err = hci_req_run(&req, fast_connectable_complete);
3912
	if (err < 0) {
3913
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3914
				 MGMT_STATUS_FAILED);
3915
		mgmt_pending_remove(cmd);
3916 3917
	}

3918
unlock:
3919
	hci_dev_unlock(hdev);
3920

3921 3922 3923
	return err;
}

3924 3925 3926 3927 3928 3929 3930 3931 3932 3933 3934 3935 3936 3937 3938 3939 3940 3941 3942 3943
static void set_bredr_scan(struct hci_request *req)
{
	struct hci_dev *hdev = req->hdev;
	u8 scan = 0;

	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
}

3944 3945 3946 3947 3948 3949 3950 3951 3952 3953 3954 3955 3956 3957 3958 3959 3960 3961 3962 3963 3964 3965 3966 3967 3968 3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994 3995 3996 3997 3998 3999 4000 4001 4002 4003 4004 4005 4006 4007 4008 4009 4010 4011 4012 4013 4014 4015 4016 4017 4018 4019 4020 4021 4022 4023 4024 4025 4026 4027 4028 4029 4030 4031 4032 4033 4034 4035 4036 4037 4038 4039 4040 4041
static void set_bredr_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
		clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
		}

		change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_REJECTED);
		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

4042
	/* We need to flip the bit already here so that update_adv_data
4043 4044 4045 4046 4047
	 * generates the correct flags.
	 */
	set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

	hci_req_init(&req, hdev);
4048 4049 4050 4051

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		set_bredr_scan(&req);

4052 4053 4054
	/* Since only the advertising data flags will change, there
	 * is no need to update the scan response data.
	 */
4055
	update_adv_data(&req);
4056

4057 4058 4059 4060 4061 4062 4063 4064 4065
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4066 4067 4068 4069 4070
static int set_secure_conn(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
4071
	u8 val, status;
4072 4073 4074 4075 4076 4077 4078 4079 4080
	int err;

	BT_DBG("request for %s", hdev->name);

	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  status);

4081 4082
	if (!lmp_sc_capable(hdev) &&
	    !test_bit(HCI_FORCE_SC, &hdev->dev_flags))
4083 4084 4085
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  MGMT_STATUS_NOT_SUPPORTED);

4086
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4087 4088 4089 4090 4091 4092 4093 4094
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
		bool changed;

4095
		if (cp->val) {
4096 4097
			changed = !test_and_set_bit(HCI_SC_ENABLED,
						    &hdev->dev_flags);
4098 4099 4100 4101 4102
			if (cp->val == 0x02)
				set_bit(HCI_SC_ONLY, &hdev->dev_flags);
			else
				clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		} else {
4103 4104
			changed = test_and_clear_bit(HCI_SC_ENABLED,
						     &hdev->dev_flags);
4105 4106
			clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		}
4107 4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121 4122 4123

		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

4124 4125 4126 4127
	val = !!cp->val;

	if (val == test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
	    (cp->val == 0x02) == test_bit(HCI_SC_ONLY, &hdev->dev_flags)) {
4128 4129 4130 4131 4132 4133 4134 4135 4136 4137
		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

4138
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SC_SUPPORT, 1, &val);
4139 4140 4141 4142 4143
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

4144 4145 4146 4147 4148
	if (cp->val == 0x02)
		set_bit(HCI_SC_ONLY, &hdev->dev_flags);
	else
		clear_bit(HCI_SC_ONLY, &hdev->dev_flags);

4149 4150 4151 4152 4153
failed:
	hci_dev_unlock(hdev);
	return err;
}

4154 4155 4156 4157 4158 4159 4160 4161 4162 4163 4164 4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185
static int set_debug_keys(struct sock *sk, struct hci_dev *hdev,
			  void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	bool changed;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val)
		changed = !test_and_set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);

	err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203 4204 4205 4206 4207 4208 4209 4210 4211 4212 4213 4214 4215 4216 4217 4218 4219 4220 4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231 4232 4233 4234 4235 4236 4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261
static bool irk_is_valid(struct mgmt_irk_info *irk)
{
	switch (irk->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
}

static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		     u16 len)
{
	struct mgmt_cp_load_irks *cp = cp_data;
	u16 irk_count, expected_len;
	int i, err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				  MGMT_STATUS_NOT_SUPPORTED);

	irk_count = __le16_to_cpu(cp->irk_count);

	expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info);
	if (expected_len != len) {
		BT_ERR("load_irks: expected %u bytes, got %u bytes",
		       len, expected_len);
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				  MGMT_STATUS_INVALID_PARAMS);
	}

	BT_DBG("%s irk_count %u", hdev->name, irk_count);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *key = &cp->irks[i];

		if (!irk_is_valid(key))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_IRKS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	hci_smp_irks_clear(hdev);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *irk = &cp->irks[i];
		u8 addr_type;

		if (irk->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;

		hci_add_irk(hdev, &irk->addr.bdaddr, addr_type, irk->val,
			    BDADDR_ANY);
	}

	set_bit(HCI_RPA_RESOLVING, &hdev->dev_flags);

	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

4262 4263 4264 4265
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
	if (key->master != 0x00 && key->master != 0x01)
		return false;
4266 4267 4268 4269 4270 4271 4272 4273 4274 4275 4276 4277 4278

	switch (key->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
4279 4280
}

4281
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
4282
			       void *cp_data, u16 len)
4283 4284 4285
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
4286
	int i, err;
4287

4288 4289 4290 4291 4292 4293
	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				  MGMT_STATUS_NOT_SUPPORTED);

4294
	key_count = __le16_to_cpu(cp->key_count);
4295 4296 4297 4298 4299

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
4300
		       len, expected_len);
4301
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
4302
				  MGMT_STATUS_INVALID_PARAMS);
4303 4304
	}

4305
	BT_DBG("%s key_count %u", hdev->name, key_count);
4306

4307 4308 4309
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

4310
		if (!ltk_is_valid(key))
4311 4312 4313 4314 4315
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

4316 4317 4318 4319 4320 4321
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
4322 4323 4324 4325 4326 4327
		u8 type, addr_type;

		if (key->addr.type == BDADDR_LE_PUBLIC)
			addr_type = ADDR_LE_DEV_PUBLIC;
		else
			addr_type = ADDR_LE_DEV_RANDOM;
4328 4329 4330 4331 4332 4333

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

4334 4335 4336
		hci_add_ltk(hdev, &key->addr.bdaddr, addr_type, type,
			    key->type, key->val, key->enc_size, key->ediv,
			    key->rand);
4337 4338
	}

4339 4340 4341
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

4342 4343
	hci_dev_unlock(hdev);

4344
	return err;
4345 4346
}

4347
static const struct mgmt_handler {
4348 4349
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
4350 4351
	bool var_len;
	size_t data_len;
4352 4353
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366 4367 4368 4369 4370 4371 4372 4373 4374 4375 4376 4377 4378 4379 4380 4381 4382 4383 4384 4385
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
4386
	{ add_remote_oob_data,    true,  MGMT_ADD_REMOTE_OOB_DATA_SIZE },
4387 4388 4389 4390 4391 4392
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
4393
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
4394
	{ set_advertising,        false, MGMT_SETTING_SIZE },
4395
	{ set_bredr,              false, MGMT_SETTING_SIZE },
4396
	{ set_static_address,     false, MGMT_SET_STATIC_ADDRESS_SIZE },
4397
	{ set_scan_params,        false, MGMT_SET_SCAN_PARAMS_SIZE },
4398
	{ set_secure_conn,        false, MGMT_SETTING_SIZE },
4399
	{ set_debug_keys,         false, MGMT_SETTING_SIZE },
4400 4401
	{ },
	{ load_irks,              true,  MGMT_LOAD_IRKS_SIZE },
4402 4403 4404
};


4405 4406
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
4407 4408
	void *buf;
	u8 *cp;
4409
	struct mgmt_hdr *hdr;
4410
	u16 opcode, index, len;
4411
	struct hci_dev *hdev = NULL;
4412
	const struct mgmt_handler *handler;
4413 4414 4415 4416 4417 4418 4419
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

4420
	buf = kmalloc(msglen, GFP_KERNEL);
4421 4422 4423 4424 4425 4426 4427 4428
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

4429
	hdr = buf;
4430 4431 4432
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
4433 4434 4435 4436 4437 4438

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

4439
	if (index != MGMT_INDEX_NONE) {
4440 4441 4442
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
4443
					 MGMT_STATUS_INVALID_INDEX);
4444 4445
			goto done;
		}
4446

4447 4448
		if (test_bit(HCI_SETUP, &hdev->dev_flags) ||
		    test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
4449 4450 4451 4452
			err = cmd_status(sk, index, opcode,
					 MGMT_STATUS_INVALID_INDEX);
			goto done;
		}
4453 4454
	}

4455
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
4456
	    mgmt_handlers[opcode].func == NULL) {
4457
		BT_DBG("Unknown op %u", opcode);
4458
		err = cmd_status(sk, index, opcode,
4459
				 MGMT_STATUS_UNKNOWN_COMMAND);
4460 4461 4462 4463
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
4464
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
4465
		err = cmd_status(sk, index, opcode,
4466
				 MGMT_STATUS_INVALID_INDEX);
4467
		goto done;
4468 4469
	}

4470 4471 4472
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
4473
	    (!handler->var_len && len != handler->data_len)) {
4474
		err = cmd_status(sk, index, opcode,
4475
				 MGMT_STATUS_INVALID_PARAMS);
4476 4477 4478
		goto done;
	}

4479 4480 4481 4482 4483
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

4484
	err = handler->func(sk, hdev, cp, len);
4485 4486 4487
	if (err < 0)
		goto done;

4488 4489 4490
	err = msglen;

done:
4491 4492 4493
	if (hdev)
		hci_dev_put(hdev);

4494 4495 4496
	kfree(buf);
	return err;
}
4497

4498
void mgmt_index_added(struct hci_dev *hdev)
4499
{
4500
	if (hdev->dev_type != HCI_BREDR)
4501
		return;
4502

4503
	mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
4504 4505
}

4506
void mgmt_index_removed(struct hci_dev *hdev)
4507
{
4508
	u8 status = MGMT_STATUS_INVALID_INDEX;
4509

4510
	if (hdev->dev_type != HCI_BREDR)
4511
		return;
4512

4513
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
4514

4515
	mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
4516 4517
}

4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529 4530 4531 4532 4533 4534 4535
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

4536
static int powered_update_hci(struct hci_dev *hdev)
4537
{
4538
	struct hci_request req;
4539
	u8 link_sec;
4540

4541 4542
	hci_req_init(&req, hdev);

4543 4544 4545
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
4546

4547
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
4548
	}
4549

4550 4551
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
4552
		struct hci_cp_write_le_host_supported cp;
4553

4554 4555
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
4556

4557 4558 4559 4560 4561
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
4562 4563
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
4564
	}
4565

4566 4567 4568 4569 4570
	if (lmp_le_capable(hdev)) {
		/* Set random address to static address if configured */
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			hci_req_add(&req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
				    &hdev->static_addr);
4571

4572 4573 4574 4575
		/* Make sure the controller has a good default for
		 * advertising data. This also applies to the case
		 * where BR/EDR was toggled during the AUTO_OFF phase.
		 */
4576
		if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
4577
			update_adv_data(&req);
4578 4579
			update_scan_rsp_data(&req);
		}
4580

4581 4582
		if (test_bit(HCI_ADVERTISING, &hdev->dev_flags))
			enable_advertising(&req);
4583 4584
	}

4585 4586
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
4587 4588
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
4589

4590
	if (lmp_bredr_capable(hdev)) {
4591 4592
		if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
			set_bredr_scan(&req);
4593
		update_class(&req);
4594
		update_name(&req);
4595
		update_eir(&req);
4596
	}
4597

4598
	return hci_req_run(&req, powered_complete);
4599
}
4600

4601 4602 4603
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
4604 4605
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
4606
	int err;
4607

4608 4609 4610 4611
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
4612 4613
		if (powered_update_hci(hdev) == 0)
			return 0;
4614

4615 4616 4617
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
4618 4619
	}

4620 4621 4622 4623 4624 4625 4626 4627
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
4628
	err = new_settings(hdev, match.sk);
4629 4630 4631 4632

	if (match.sk)
		sock_put(match.sk);

4633
	return err;
4634
}
4635

4636
void mgmt_set_powered_failed(struct hci_dev *hdev, int err)
4637 4638 4639 4640 4641 4642
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
4643
		return;
4644 4645 4646 4647 4648 4649

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

4650
	cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);
4651 4652 4653 4654

	mgmt_pending_remove(cmd);
}

4655 4656 4657 4658 4659 4660 4661 4662 4663 4664 4665 4666
void mgmt_discoverable_timeout(struct hci_dev *hdev)
{
	struct hci_request req;

	hci_dev_lock(hdev);

	/* When discoverable timeout triggers, then just make sure
	 * the limited discoverable flag is cleared. Even in the case
	 * of a timeout triggered from general discoverable, it is
	 * safe to unconditionally clear the flag.
	 */
	clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
4667
	clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
4668 4669

	hci_req_init(&req, hdev);
4670 4671 4672 4673 4674
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		u8 scan = SCAN_PAGE;
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE,
			    sizeof(scan), &scan);
	}
4675
	update_class(&req);
4676
	update_adv_data(&req);
4677 4678 4679 4680
	hci_req_run(&req, NULL);

	hdev->discov_timeout = 0;

4681 4682
	new_settings(hdev, NULL);

4683 4684 4685
	hci_dev_unlock(hdev);
}

4686
void mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
4687
{
4688
	bool changed;
4689

4690 4691 4692 4693 4694
	/* Nothing needed here if there's a pending command since that
	 * commands request completion callback takes care of everything
	 * necessary.
	 */
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev))
4695
		return;
4696

4697
	if (discoverable) {
4698
		changed = !test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
4699 4700
	} else {
		clear_bit(HCI_LIMITED_DISCOVERABLE, &hdev->dev_flags);
4701
		changed = test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
4702 4703 4704 4705 4706 4707 4708 4709 4710 4711 4712 4713
	}

	if (changed) {
		struct hci_request req;

		/* In case this change in discoverable was triggered by
		 * a disabling of connectable there could be a need to
		 * update the advertising flags.
		 */
		hci_req_init(&req, hdev);
		update_adv_data(&req);
		hci_req_run(&req, NULL);
4714

4715
		new_settings(hdev, NULL);
4716
	}
4717
}
4718

4719
void mgmt_connectable(struct hci_dev *hdev, u8 connectable)
4720
{
4721
	bool changed;
4722

4723 4724 4725 4726 4727
	/* Nothing needed here if there's a pending command since that
	 * commands request completion callback takes care of everything
	 * necessary.
	 */
	if (mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev))
4728
		return;
4729

4730 4731 4732 4733
	if (connectable)
		changed = !test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
4734

4735
	if (changed)
4736
		new_settings(hdev, NULL);
4737
}
4738

4739
void mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
4740
{
4741 4742
	u8 mgmt_err = mgmt_status(status);

4743
	if (scan & SCAN_PAGE)
4744
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
4745
				     cmd_status_rsp, &mgmt_err);
4746 4747

	if (scan & SCAN_INQUIRY)
4748
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
4749
				     cmd_status_rsp, &mgmt_err);
4750 4751
}

4752 4753
void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		       bool persistent)
4754
{
4755
	struct mgmt_ev_new_link_key ev;
4756

4757
	memset(&ev, 0, sizeof(ev));
4758

4759
	ev.store_hint = persistent;
4760
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
4761
	ev.key.addr.type = BDADDR_BREDR;
4762
	ev.key.type = key->type;
4763
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
4764
	ev.key.pin_len = key->pin_len;
4765

4766
	mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
4767
}
4768

4769
void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key)
4770 4771 4772 4773 4774
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

4775 4776 4777 4778 4779 4780 4781 4782 4783 4784 4785
	/* Devices using resolvable or non-resolvable random addresses
	 * without providing an indentity resolving key don't require
	 * to store long term keys. Their addresses will change the
	 * next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the long term key is stored. If the remote
	 * identity is known, the long term keys are internally
	 * mapped to the identity address. So allow static random
	 * and public addresses here.
	 */
4786 4787 4788 4789 4790 4791
	if (key->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (key->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
		ev.store_hint = 0x01;

4792
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
4793
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
4794
	ev.key.type = key->authenticated;
4795 4796 4797 4798 4799 4800 4801 4802 4803
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

4804
	mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL);
4805 4806
}

4807 4808 4809 4810 4811 4812
void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk)
{
	struct mgmt_ev_new_irk ev;

	memset(&ev, 0, sizeof(ev));

4813 4814 4815 4816 4817 4818 4819 4820 4821 4822 4823 4824 4825 4826 4827 4828
	/* For identity resolving keys from devices that are already
	 * using a public address or static random address, do not
	 * ask for storing this key. The identity resolving key really
	 * is only mandatory for devices using resovlable random
	 * addresses.
	 *
	 * Storing all identity resolving keys has the downside that
	 * they will be also loaded on next boot of they system. More
	 * identity resolving keys, means more time during scanning is
	 * needed to actually resolve these addresses.
	 */
	if (bacmp(&irk->rpa, BDADDR_ANY))
		ev.store_hint = 0x01;
	else
		ev.store_hint = 0x00;

4829 4830 4831 4832 4833 4834 4835 4836
	bacpy(&ev.rpa, &irk->rpa);
	bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr);
	ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type);
	memcpy(ev.irk.val, irk->val, sizeof(irk->val));

	mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL);
}

4837 4838 4839 4840 4841 4842 4843 4844 4845 4846 4847
static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data,
				  u8 data_len)
{
	eir[eir_len++] = sizeof(type) + data_len;
	eir[eir_len++] = type;
	memcpy(&eir[eir_len], data, data_len);
	eir_len += data_len;

	return eir_len;
}

4848 4849 4850
void mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			   u8 addr_type, u32 flags, u8 *name, u8 name_len,
			   u8 *dev_class)
4851
{
4852 4853 4854
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
4855

4856
	bacpy(&ev->addr.bdaddr, bdaddr);
4857
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4858

4859
	ev->flags = __cpu_to_le32(flags);
4860

4861 4862
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
4863
					  name, name_len);
4864 4865

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
4866
		eir_len = eir_append_data(ev->eir, eir_len,
4867
					  EIR_CLASS_OF_DEV, dev_class, 3);
4868

4869
	ev->eir_len = cpu_to_le16(eir_len);
4870

4871 4872
	mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
		    sizeof(*ev) + eir_len, NULL);
4873 4874
}

4875 4876
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
4877
	struct mgmt_cp_disconnect *cp = cmd->param;
4878
	struct sock **sk = data;
4879
	struct mgmt_rp_disconnect rp;
4880

4881 4882
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4883

4884
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
4885
		     sizeof(rp));
4886 4887 4888 4889

	*sk = cmd->sk;
	sock_hold(*sk);

4890
	mgmt_pending_remove(cmd);
4891 4892
}

4893
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
4894
{
4895
	struct hci_dev *hdev = data;
4896 4897
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
4898 4899

	memset(&rp, 0, sizeof(rp));
4900 4901
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4902

4903 4904
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

4905
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
4906 4907 4908 4909

	mgmt_pending_remove(cmd);
}

4910 4911
void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
			      u8 link_type, u8 addr_type, u8 reason)
4912
{
4913
	struct mgmt_ev_device_disconnected ev;
4914 4915
	struct sock *sk = NULL;

4916 4917 4918
	if (link_type != ACL_LINK && link_type != LE_LINK)
		return;

4919
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
4920

4921 4922 4923
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
4924

4925
	mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
4926 4927

	if (sk)
4928
		sock_put(sk);
4929

4930
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
4931
			     hdev);
4932 4933
}

4934 4935
void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
			    u8 link_type, u8 addr_type, u8 status)
4936
{
4937 4938
	u8 bdaddr_type = link_to_bdaddr(link_type, addr_type);
	struct mgmt_cp_disconnect *cp;
4939
	struct mgmt_rp_disconnect rp;
4940 4941
	struct pending_cmd *cmd;

4942 4943 4944
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

4945
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
4946
	if (!cmd)
4947
		return;
4948

4949 4950 4951 4952 4953 4954 4955 4956
	cp = cmd->param;

	if (bacmp(bdaddr, &cp->addr.bdaddr))
		return;

	if (cp->addr.type != bdaddr_type)
		return;

4957
	bacpy(&rp.addr.bdaddr, bdaddr);
4958
	rp.addr.type = bdaddr_type;
4959

4960 4961
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
		     mgmt_status(status), &rp, sizeof(rp));
4962

4963
	mgmt_pending_remove(cmd);
4964
}
4965

4966 4967
void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			 u8 addr_type, u8 status)
4968 4969 4970
{
	struct mgmt_ev_connect_failed ev;

4971
	bacpy(&ev.addr.bdaddr, bdaddr);
4972
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4973
	ev.status = mgmt_status(status);
4974

4975
	mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
4976
}
4977

4978
void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
4979 4980 4981
{
	struct mgmt_ev_pin_code_request ev;

4982
	bacpy(&ev.addr.bdaddr, bdaddr);
4983
	ev.addr.type = BDADDR_BREDR;
4984
	ev.secure = secure;
4985

4986
	mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL);
4987 4988
}

4989 4990
void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				  u8 status)
4991 4992
{
	struct pending_cmd *cmd;
4993
	struct mgmt_rp_pin_code_reply rp;
4994

4995
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
4996
	if (!cmd)
4997
		return;
4998

4999
	bacpy(&rp.addr.bdaddr, bdaddr);
5000
	rp.addr.type = BDADDR_BREDR;
5001

5002 5003
	cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
		     mgmt_status(status), &rp, sizeof(rp));
5004

5005
	mgmt_pending_remove(cmd);
5006 5007
}

5008 5009
void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				      u8 status)
5010 5011
{
	struct pending_cmd *cmd;
5012
	struct mgmt_rp_pin_code_reply rp;
5013

5014
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
5015
	if (!cmd)
5016
		return;
5017

5018
	bacpy(&rp.addr.bdaddr, bdaddr);
5019
	rp.addr.type = BDADDR_BREDR;
5020

5021 5022
	cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
		     mgmt_status(status), &rp, sizeof(rp));
5023

5024
	mgmt_pending_remove(cmd);
5025
}
5026

5027
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
5028 5029
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
5030 5031 5032
{
	struct mgmt_ev_user_confirm_request ev;

5033
	BT_DBG("%s", hdev->name);
5034

5035
	bacpy(&ev.addr.bdaddr, bdaddr);
5036
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5037
	ev.confirm_hint = confirm_hint;
5038
	ev.value = value;
5039

5040
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
5041
			  NULL);
5042 5043
}

5044
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
5045
			      u8 link_type, u8 addr_type)
5046 5047 5048 5049 5050
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

5051
	bacpy(&ev.addr.bdaddr, bdaddr);
5052
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5053 5054

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
5055
			  NULL);
5056 5057
}

5058
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5059 5060
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
5061 5062 5063 5064 5065
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

5066
	cmd = mgmt_pending_find(opcode, hdev);
5067 5068 5069
	if (!cmd)
		return -ENOENT;

5070
	bacpy(&rp.addr.bdaddr, bdaddr);
5071
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
5072
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
5073
			   &rp, sizeof(rp));
5074

5075
	mgmt_pending_remove(cmd);
5076 5077 5078 5079

	return err;
}

5080
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5081
				     u8 link_type, u8 addr_type, u8 status)
5082
{
5083
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5084
					  status, MGMT_OP_USER_CONFIRM_REPLY);
5085 5086
}

5087
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5088
					 u8 link_type, u8 addr_type, u8 status)
5089
{
5090
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5091 5092
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
5093
}
5094

5095
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5096
				     u8 link_type, u8 addr_type, u8 status)
5097
{
5098
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5099
					  status, MGMT_OP_USER_PASSKEY_REPLY);
5100 5101
}

5102
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
5103
					 u8 link_type, u8 addr_type, u8 status)
5104
{
5105
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
5106 5107
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
5108 5109
}

5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120 5121 5122 5123 5124 5125
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

5126 5127
void mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, u8 status)
5128 5129 5130
{
	struct mgmt_ev_auth_failed ev;

5131
	bacpy(&ev.addr.bdaddr, bdaddr);
5132
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
5133
	ev.status = mgmt_status(status);
5134

5135
	mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
5136
}
5137

5138
void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
5139 5140
{
	struct cmd_lookup match = { NULL, hdev };
5141
	bool changed;
5142 5143 5144 5145

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
5146
				     cmd_status_rsp, &mgmt_err);
5147
		return;
5148 5149
	}

5150 5151 5152 5153 5154 5155
	if (test_bit(HCI_AUTH, &hdev->flags))
		changed = !test_and_set_bit(HCI_LINK_SECURITY,
					    &hdev->dev_flags);
	else
		changed = test_and_clear_bit(HCI_LINK_SECURITY,
					     &hdev->dev_flags);
5156

5157
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
5158
			     &match);
5159

5160
	if (changed)
5161
		new_settings(hdev, match.sk);
5162 5163 5164 5165 5166

	if (match.sk)
		sock_put(match.sk);
}

5167
static void clear_eir(struct hci_request *req)
5168
{
5169
	struct hci_dev *hdev = req->hdev;
5170 5171
	struct hci_cp_write_eir cp;

5172
	if (!lmp_ext_inq_capable(hdev))
5173
		return;
5174

5175 5176
	memset(hdev->eir, 0, sizeof(hdev->eir));

5177 5178
	memset(&cp, 0, sizeof(cp));

5179
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
5180 5181
}

5182
void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
5183 5184
{
	struct cmd_lookup match = { NULL, hdev };
5185
	struct hci_request req;
5186
	bool changed = false;
5187 5188 5189

	if (status) {
		u8 mgmt_err = mgmt_status(status);
5190 5191

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
5192 5193
						 &hdev->dev_flags)) {
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
5194
			new_settings(hdev, NULL);
5195
		}
5196

5197 5198
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
5199
		return;
5200 5201 5202
	}

	if (enable) {
5203
		changed = !test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
5204
	} else {
5205 5206 5207 5208 5209 5210
		changed = test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
		if (!changed)
			changed = test_and_clear_bit(HCI_HS_ENABLED,
						     &hdev->dev_flags);
		else
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
5211 5212 5213 5214
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

5215
	if (changed)
5216
		new_settings(hdev, match.sk);
5217

5218
	if (match.sk)
5219 5220
		sock_put(match.sk);

5221 5222
	hci_req_init(&req, hdev);

5223
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
5224
		update_eir(&req);
5225
	else
5226 5227 5228
		clear_eir(&req);

	hci_req_run(&req, NULL);
5229 5230
}

5231 5232 5233 5234 5235 5236 5237 5238
void mgmt_sc_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

5239 5240 5241 5242 5243 5244
		if (enable) {
			if (test_and_clear_bit(HCI_SC_ENABLED,
					       &hdev->dev_flags))
				new_settings(hdev, NULL);
			clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
		}
5245 5246 5247 5248 5249 5250

		mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

5251
	if (enable) {
5252
		changed = !test_and_set_bit(HCI_SC_ENABLED, &hdev->dev_flags);
5253
	} else {
5254
		changed = test_and_clear_bit(HCI_SC_ENABLED, &hdev->dev_flags);
5255 5256
		clear_bit(HCI_SC_ONLY, &hdev->dev_flags);
	}
5257 5258 5259 5260 5261 5262 5263 5264 5265 5266 5267

	mgmt_pending_foreach(MGMT_OP_SET_SECURE_CONN, hdev,
			     settings_rsp, &match);

	if (changed)
		new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

5268
static void sk_lookup(struct pending_cmd *cmd, void *data)
5269 5270 5271 5272 5273 5274 5275 5276 5277
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

5278 5279
void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
				    u8 status)
5280
{
5281
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
5282

5283 5284 5285
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
5286 5287

	if (!status)
5288 5289
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class, 3,
			   NULL);
5290 5291 5292

	if (match.sk)
		sock_put(match.sk);
5293 5294
}

5295
void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
5296 5297
{
	struct mgmt_cp_set_local_name ev;
5298
	struct pending_cmd *cmd;
5299

5300
	if (status)
5301
		return;
5302 5303 5304

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
5305
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
5306

5307
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
5308 5309
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
5310

5311 5312 5313 5314
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
5315
			return;
5316
	}
5317

5318 5319
	mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
		   cmd ? cmd->sk : NULL);
5320
}
5321

5322 5323 5324
void mgmt_read_local_oob_data_complete(struct hci_dev *hdev, u8 *hash192,
				       u8 *randomizer192, u8 *hash256,
				       u8 *randomizer256, u8 status)
5325 5326 5327
{
	struct pending_cmd *cmd;

5328
	BT_DBG("%s status %u", hdev->name, status);
5329

5330
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
5331
	if (!cmd)
5332
		return;
5333 5334

	if (status) {
5335 5336
		cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
			   mgmt_status(status));
5337
	} else {
5338 5339 5340 5341 5342 5343 5344
		if (test_bit(HCI_SC_ENABLED, &hdev->dev_flags) &&
		    hash256 && randomizer256) {
			struct mgmt_rp_read_local_oob_ext_data rp;

			memcpy(rp.hash192, hash192, sizeof(rp.hash192));
			memcpy(rp.randomizer192, randomizer192,
			       sizeof(rp.randomizer192));
5345

5346 5347 5348
			memcpy(rp.hash256, hash256, sizeof(rp.hash256));
			memcpy(rp.randomizer256, randomizer256,
			       sizeof(rp.randomizer256));
5349

5350 5351 5352 5353 5354 5355 5356 5357 5358 5359 5360 5361 5362 5363
			cmd_complete(cmd->sk, hdev->id,
				     MGMT_OP_READ_LOCAL_OOB_DATA, 0,
				     &rp, sizeof(rp));
		} else {
			struct mgmt_rp_read_local_oob_data rp;

			memcpy(rp.hash, hash192, sizeof(rp.hash));
			memcpy(rp.randomizer, randomizer192,
			       sizeof(rp.randomizer));

			cmd_complete(cmd->sk, hdev->id,
				     MGMT_OP_READ_LOCAL_OOB_DATA, 0,
				     &rp, sizeof(rp));
		}
5364 5365 5366 5367
	}

	mgmt_pending_remove(cmd);
}
5368

5369 5370 5371
void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		       u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		       ssp, u8 *eir, u16 eir_len)
5372
{
5373 5374
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
5375
	struct smp_irk *irk;
5376
	size_t ev_size;
5377

5378
	if (!hci_discovery_active(hdev))
5379
		return;
5380

5381 5382
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
5383
		return;
5384

5385 5386
	memset(buf, 0, sizeof(buf));

5387 5388 5389 5390 5391 5392 5393 5394 5395
	irk = hci_get_irk(hdev, bdaddr, addr_type);
	if (irk) {
		bacpy(&ev->addr.bdaddr, &irk->bdaddr);
		ev->addr.type = link_to_bdaddr(link_type, irk->addr_type);
	} else {
		bacpy(&ev->addr.bdaddr, bdaddr);
		ev->addr.type = link_to_bdaddr(link_type, addr_type);
	}

5396
	ev->rssi = rssi;
5397
	if (cfm_name)
5398
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
5399
	if (!ssp)
5400
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
5401

5402
	if (eir_len > 0)
5403
		memcpy(ev->eir, eir, eir_len);
5404

5405 5406
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
5407
					  dev_class, 3);
5408

5409
	ev->eir_len = cpu_to_le16(eir_len);
5410
	ev_size = sizeof(*ev) + eir_len;
5411

5412
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
5413
}
5414

5415 5416
void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, s8 rssi, u8 *name, u8 name_len)
5417
{
5418 5419 5420
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
5421

5422
	ev = (struct mgmt_ev_device_found *) buf;
5423

5424 5425 5426
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
5427
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
5428 5429 5430
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
5431
				  name_len);
5432

5433
	ev->eir_len = cpu_to_le16(eir_len);
5434

5435
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL);
5436
}
5437

5438
void mgmt_discovering(struct hci_dev *hdev, u8 discovering)
5439
{
5440
	struct mgmt_ev_discovering ev;
5441 5442
	struct pending_cmd *cmd;

5443 5444
	BT_DBG("%s discovering %u", hdev->name, discovering);

5445
	if (discovering)
5446
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
5447
	else
5448
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
5449 5450

	if (cmd != NULL) {
5451 5452
		u8 type = hdev->discovery.type;

5453 5454
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
5455 5456 5457
		mgmt_pending_remove(cmd);
	}

5458 5459 5460 5461
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

5462
	mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
5463
}
5464

5465
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
5466 5467 5468 5469
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

5470
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
5471

5472 5473
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
5474

5475
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
5476
			  cmd ? cmd->sk : NULL);
5477 5478
}

5479
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
5480 5481 5482 5483
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

5484
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
5485

5486 5487
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
5488

5489
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
5490
			  cmd ? cmd->sk : NULL);
5491
}
5492 5493 5494 5495 5496 5497 5498 5499

static void adv_enable_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("%s status %u", hdev->name, status);

	/* Clear the advertising mgmt setting if we failed to re-enable it */
	if (status) {
		clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
5500
		new_settings(hdev, NULL);
5501 5502 5503 5504 5505 5506 5507
	}
}

void mgmt_reenable_advertising(struct hci_dev *hdev)
{
	struct hci_request req;

5508
	if (hci_conn_num(hdev, LE_LINK) > 0)
5509 5510 5511 5512 5513 5514 5515 5516 5517 5518 5519 5520 5521
		return;

	if (!test_bit(HCI_ADVERTISING, &hdev->dev_flags))
		return;

	hci_req_init(&req, hdev);
	enable_advertising(&req);

	/* If this fails we have no option but to let user space know
	 * that we've disabled advertising.
	 */
	if (hci_req_run(&req, adv_enable_complete) < 0) {
		clear_bit(HCI_ADVERTISING, &hdev->dev_flags);
5522
		new_settings(hdev, NULL);
5523 5524
	}
}