mgmt.c 106.4 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35
#define MGMT_VERSION	1
36
#define MGMT_REVISION	4
37

38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
76
	MGMT_OP_SET_DEVICE_ID,
77
	MGMT_OP_SET_ADVERTISING,
78
	MGMT_OP_SET_BREDR,
79
	MGMT_OP_SET_STATIC_ADDRESS,
80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
103
	MGMT_EV_PASSKEY_NOTIFY,
104 105
};

106
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
107

108 109 110
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

111 112
struct pending_cmd {
	struct list_head list;
113
	u16 opcode;
114
	int index;
115
	void *param;
116
	struct sock *sk;
117
	void *user_data;
118 119
};

120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

185 186 187 188 189
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

190 191 192 193 194 195 196 197
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

198
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
199 200 201 202
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
203
	int err;
204

205
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
206

207
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
208 209 210 211 212
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

213
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
214
	hdr->index = cpu_to_le16(index);
215 216 217 218
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
219
	ev->opcode = cpu_to_le16(cmd);
220

221 222
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
223 224
		kfree_skb(skb);

225
	return err;
226 227
}

228
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
229
			void *rp, size_t rp_len)
230 231 232 233
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
234
	int err;
235 236 237

	BT_DBG("sock %p", sk);

238
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
239 240 241 242 243
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

244
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
245
	hdr->index = cpu_to_le16(index);
246
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
247

248
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
249
	ev->opcode = cpu_to_le16(cmd);
250
	ev->status = status;
251 252 253

	if (rp)
		memcpy(ev->data, rp, rp_len);
254

255 256
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
257 258
		kfree_skb(skb);

259
	return err;
260 261
}

262 263
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
264 265 266 267 268 269
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
270
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
271

272
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
273
			    sizeof(rp));
274 275
}

276 277
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
278 279
{
	struct mgmt_rp_read_commands *rp;
280 281
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
282
	__le16 *opcode;
283 284 285 286 287 288 289 290 291 292 293
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

294 295
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
296 297 298 299 300 301 302

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

303
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
304
			   rp_size);
305 306 307 308 309
	kfree(rp);

	return err;
}

310 311
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
312 313
{
	struct mgmt_rp_read_index_list *rp;
314
	struct hci_dev *d;
315
	size_t rp_len;
316
	u16 count;
317
	int err;
318 319 320 321 322 323

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
324 325 326 327
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

328 329 330
		count++;
	}

331 332 333
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
334
		read_unlock(&hci_dev_list_lock);
335
		return -ENOMEM;
336
	}
337

338
	count = 0;
339
	list_for_each_entry(d, &hci_dev_list, list) {
340
		if (test_bit(HCI_SETUP, &d->dev_flags))
341 342
			continue;

343 344 345
		if (test_bit(HCI_USER_CHANNEL, &d->dev_flags))
			continue;

346 347 348
		if (!mgmt_valid_hdev(d))
			continue;

349
		rp->index[count++] = cpu_to_le16(d->id);
350 351 352
		BT_DBG("Added hci%u", d->id);
	}

353 354 355
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

356 357
	read_unlock(&hci_dev_list_lock);

358
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
359
			   rp_len);
360

361 362 363
	kfree(rp);

	return err;
364 365
}

366 367 368 369 370 371 372
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

373
	if (lmp_ssp_capable(hdev))
374 375
		settings |= MGMT_SETTING_SSP;

376
	if (lmp_bredr_capable(hdev)) {
377
		settings |= MGMT_SETTING_CONNECTABLE;
378 379
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
380
		settings |= MGMT_SETTING_DISCOVERABLE;
381 382
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
383
		settings |= MGMT_SETTING_HS;
384
	}
385

386
	if (lmp_le_capable(hdev)) {
387
		settings |= MGMT_SETTING_LE;
388 389
		settings |= MGMT_SETTING_ADVERTISING;
	}
390 391 392 393 394 395 396 397

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

398
	if (hdev_is_powered(hdev))
399 400
		settings |= MGMT_SETTING_POWERED;

401
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
402 403
		settings |= MGMT_SETTING_CONNECTABLE;

404 405 406
	if (test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

407
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
408 409
		settings |= MGMT_SETTING_DISCOVERABLE;

410
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
411 412
		settings |= MGMT_SETTING_PAIRABLE;

413
	if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
414 415
		settings |= MGMT_SETTING_BREDR;

416
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
417 418
		settings |= MGMT_SETTING_LE;

419
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
420 421
		settings |= MGMT_SETTING_LINK_SECURITY;

422
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
423 424
		settings |= MGMT_SETTING_SSP;

425 426 427
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

428 429 430
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags))
		settings |= MGMT_SETTING_ADVERTISING;

431 432 433
	return settings;
}

434 435
#define PNP_INFO_SVCLASS_ID		0x1200

436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543
static u8 *create_uuid128_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 18)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 128)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID128_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + 16 > len) {
			uuids_start[1] = EIR_UUID128_SOME;
			break;
		}

		memcpy(ptr, uuid->uuid, 16);
		ptr += 16;
		uuids_start[0] += 16;
	}

	return ptr;
}

544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

567
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
568 569 570 571 572 573 574
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

575 576 577 578 579 580 581 582 583 584 585 586
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

587
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
588
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
589
	ptr = create_uuid128_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
590 591
}

592
static void update_eir(struct hci_request *req)
593
{
594
	struct hci_dev *hdev = req->hdev;
595 596
	struct hci_cp_write_eir cp;

597
	if (!hdev_is_powered(hdev))
598
		return;
599

600
	if (!lmp_ext_inq_capable(hdev))
601
		return;
602

603
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
604
		return;
605

606
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
607
		return;
608 609 610 611 612 613

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
614
		return;
615 616 617

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

618
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
619 620 621 622 623 624 625 626 627 628 629 630 631
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

632
static void update_class(struct hci_request *req)
633
{
634
	struct hci_dev *hdev = req->hdev;
635 636 637 638
	u8 cod[3];

	BT_DBG("%s", hdev->name);

639
	if (!hdev_is_powered(hdev))
640
		return;
641

642
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
643
		return;
644 645 646 647 648 649

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
650
		return;
651

652
	hci_req_add(req, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
653 654
}

655 656 657
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
658
					    service_cache.work);
659
	struct hci_request req;
660

661
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
662 663
		return;

664 665
	hci_req_init(&req, hdev);

666 667
	hci_dev_lock(hdev);

668 669
	update_eir(&req);
	update_class(&req);
670 671

	hci_dev_unlock(hdev);
672 673

	hci_req_run(&req, NULL);
674 675
}

676
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
677
{
678
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
679 680
		return;

681
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
682

683 684 685 686 687 688
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
689 690
}

691
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
692
				void *data, u16 data_len)
693
{
694
	struct mgmt_rp_read_info rp;
695

696
	BT_DBG("sock %p %s", sk, hdev->name);
697

698
	hci_dev_lock(hdev);
699

700 701
	memset(&rp, 0, sizeof(rp));

702
	bacpy(&rp.bdaddr, &hdev->bdaddr);
703

704
	rp.version = hdev->hci_ver;
705
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
706 707 708

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
709

710
	memcpy(rp.dev_class, hdev->dev_class, 3);
711

712
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
713
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
714

715
	hci_dev_unlock(hdev);
716

717
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
718
			    sizeof(rp));
719 720
}

721 722 723
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
724
	kfree(cmd->param);
725 726 727
	kfree(cmd);
}

728
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
729 730
					    struct hci_dev *hdev, void *data,
					    u16 len)
731 732 733
{
	struct pending_cmd *cmd;

734
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
735
	if (!cmd)
736
		return NULL;
737 738

	cmd->opcode = opcode;
739
	cmd->index = hdev->id;
740

741
	cmd->param = kmalloc(len, GFP_KERNEL);
742
	if (!cmd->param) {
743
		kfree(cmd);
744
		return NULL;
745 746
	}

747 748
	if (data)
		memcpy(cmd->param, data, len);
749 750 751 752

	cmd->sk = sk;
	sock_hold(sk);

753
	list_add(&cmd->list, &hdev->mgmt_pending);
754

755
	return cmd;
756 757
}

758
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
759 760
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
761
				 void *data)
762
{
763
	struct pending_cmd *cmd, *tmp;
764

765
	list_for_each_entry_safe(cmd, tmp, &hdev->mgmt_pending, list) {
766
		if (opcode > 0 && cmd->opcode != opcode)
767 768 769 770 771 772
			continue;

		cb(cmd, data);
	}
}

773
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
774
{
775
	struct pending_cmd *cmd;
776

777
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
778 779
		if (cmd->opcode == opcode)
			return cmd;
780 781 782 783 784
	}

	return NULL;
}

785
static void mgmt_pending_remove(struct pending_cmd *cmd)
786 787 788 789 790
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

791
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
792
{
793
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
794

795
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
796
			    sizeof(settings));
797 798
}

799
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
800
		       u16 len)
801
{
802
	struct mgmt_mode *cp = data;
803
	struct pending_cmd *cmd;
804
	int err;
805

806
	BT_DBG("request for %s", hdev->name);
807

808 809 810 811
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

812
	hci_dev_lock(hdev);
813

814 815 816 817 818 819
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

820 821 822 823
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
824 825 826
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
827 828 829 830
			goto failed;
		}
	}

831
	if (!!cp->val == hdev_is_powered(hdev)) {
832
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
833 834 835
		goto failed;
	}

836
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
837 838
	if (!cmd) {
		err = -ENOMEM;
839
		goto failed;
840
	}
841

842
	if (cp->val)
843
		queue_work(hdev->req_workqueue, &hdev->power_on);
844
	else
845
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
846

847
	err = 0;
848 849

failed:
850
	hci_dev_unlock(hdev);
851
	return err;
852 853
}

854 855
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
856 857 858 859
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

860
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
861 862 863 864 865 866 867 868
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
869
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
870 871 872 873 874
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

875 876 877
	/* Time stamp */
	__net_timestamp(skb);

878 879 880 881 882 883 884 885 886 887 888 889 890 891 892
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

static void settings_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
	else if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

943
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
944
			    u16 len)
945
{
946
	struct mgmt_cp_set_discoverable *cp = data;
947
	struct pending_cmd *cmd;
948
	u16 timeout;
949
	u8 scan, status;
950 951
	int err;

952
	BT_DBG("request for %s", hdev->name);
953

954 955
	status = mgmt_bredr_support(hdev);
	if (status)
956
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
957
				  status);
958

959 960 961 962
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

963
	timeout = __le16_to_cpu(cp->timeout);
964
	if (!cp->val && timeout > 0)
965
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
966
				  MGMT_STATUS_INVALID_PARAMS);
967

968
	hci_dev_lock(hdev);
969

970
	if (!hdev_is_powered(hdev) && timeout > 0) {
971
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
972
				 MGMT_STATUS_NOT_POWERED);
973 974 975
		goto failed;
	}

976
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
977
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
978
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
979
				 MGMT_STATUS_BUSY);
980 981 982
		goto failed;
	}

983
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
984
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
985
				 MGMT_STATUS_REJECTED);
986 987 988 989
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
990 991 992 993 994 995 996
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

997
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
998 999 1000 1001 1002 1003
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1004 1005 1006 1007
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

1019
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1020 1021 1022
		goto failed;
	}

1023
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1024 1025
	if (!cmd) {
		err = -ENOMEM;
1026
		goto failed;
1027
	}
1028 1029 1030

	scan = SCAN_PAGE;

1031
	if (cp->val)
1032
		scan |= SCAN_INQUIRY;
1033
	else
1034
		cancel_delayed_work(&hdev->discov_off);
1035 1036 1037

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1038
		mgmt_pending_remove(cmd);
1039

1040
	if (cp->val)
1041
		hdev->discov_timeout = timeout;
1042

1043
failed:
1044
	hci_dev_unlock(hdev);
1045 1046 1047
	return err;
}

1048 1049
static void write_fast_connectable(struct hci_request *req, bool enable)
{
1050
	struct hci_dev *hdev = req->hdev;
1051 1052 1053
	struct hci_cp_write_page_scan_activity acp;
	u8 type;

1054 1055 1056
	if (hdev->hci_ver < BLUETOOTH_VER_1_2)
		return;

1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070
	if (enable) {
		type = PAGE_SCAN_TYPE_INTERLACED;

		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
	}

	acp.window = __constant_cpu_to_le16(0x0012);

1071 1072 1073 1074 1075 1076 1077
	if (__cpu_to_le16(hdev->page_scan_interval) != acp.interval ||
	    __cpu_to_le16(hdev->page_scan_window) != acp.window)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
			    sizeof(acp), &acp);

	if (hdev->page_scan_type != type)
		hci_req_add(req, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
1078 1079
}

1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099
static void set_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1100
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1101
			   u16 len)
1102
{
1103
	struct mgmt_mode *cp = data;
1104
	struct pending_cmd *cmd;
1105
	struct hci_request req;
1106
	u8 scan, status;
1107 1108
	int err;

1109
	BT_DBG("request for %s", hdev->name);
1110

1111 1112
	status = mgmt_bredr_support(hdev);
	if (status)
1113
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1114
				  status);
1115

1116 1117 1118 1119
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1120
	hci_dev_lock(hdev);
1121

1122
	if (!hdev_is_powered(hdev)) {
1123 1124 1125 1126 1127
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

1128
		if (cp->val) {
1129
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
1130
		} else {
1131 1132 1133
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
1134

1135
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1136 1137 1138 1139 1140 1141
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1142 1143 1144
		goto failed;
	}

1145
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1146
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1147
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1148
				 MGMT_STATUS_BUSY);
1149 1150 1151
		goto failed;
	}

1152
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1153
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1154 1155 1156
		goto failed;
	}

1157
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1158 1159
	if (!cmd) {
		err = -ENOMEM;
1160
		goto failed;
1161
	}
1162

1163
	if (cp->val) {
1164
		scan = SCAN_PAGE;
1165
	} else {
1166 1167
		scan = 0;

1168
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1169
		    hdev->discov_timeout > 0)
1170 1171 1172
			cancel_delayed_work(&hdev->discov_off);
	}

1173 1174 1175 1176
	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);

1177 1178 1179 1180 1181 1182 1183
	/* If we're going from non-connectable to connectable or
	 * vice-versa when fast connectable is enabled ensure that fast
	 * connectable gets disabled. write_fast_connectable won't do
	 * anything if the page scan parameters are already what they
	 * should be.
	 */
	if (cp->val || test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags))
1184 1185
		write_fast_connectable(&req, false);

1186
	err = hci_req_run(&req, set_connectable_complete);
1187
	if (err < 0)
1188
		mgmt_pending_remove(cmd);
1189 1190

failed:
1191
	hci_dev_unlock(hdev);
1192 1193 1194
	return err;
}

1195
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1196
			u16 len)
1197
{
1198
	struct mgmt_mode *cp = data;
1199 1200
	int err;

1201
	BT_DBG("request for %s", hdev->name);
1202

1203 1204 1205 1206
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1207
	hci_dev_lock(hdev);
1208 1209

	if (cp->val)
1210
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1211
	else
1212
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1213

1214
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1215 1216 1217
	if (err < 0)
		goto failed;

1218
	err = new_settings(hdev, sk);
1219 1220

failed:
1221
	hci_dev_unlock(hdev);
1222 1223 1224
	return err;
}

1225 1226
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1227 1228 1229
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1230
	u8 val, status;
1231 1232
	int err;

1233
	BT_DBG("request for %s", hdev->name);
1234

1235 1236
	status = mgmt_bredr_support(hdev);
	if (status)
1237
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1238
				  status);
1239

1240 1241 1242 1243
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1244 1245
	hci_dev_lock(hdev);

1246
	if (!hdev_is_powered(hdev)) {
1247 1248 1249
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1250
					  &hdev->dev_flags)) {
1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1262 1263 1264 1265
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1266
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1267
				 MGMT_STATUS_BUSY);
1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1295
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1296 1297 1298
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1299
	u8 val, status;
1300 1301
	int err;

1302
	BT_DBG("request for %s", hdev->name);
1303

1304 1305 1306 1307
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);

1308 1309 1310
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1311

1312 1313 1314 1315
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1316
	hci_dev_lock(hdev);
1317

1318 1319
	val = !!cp->val;

1320
	if (!hdev_is_powered(hdev)) {
1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1335 1336 1337 1338
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1339 1340
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1366
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1367 1368
{
	struct mgmt_mode *cp = data;
1369
	bool changed;
1370
	u8 status;
1371
	int err;
1372

1373
	BT_DBG("request for %s", hdev->name);
1374

1375 1376 1377
	status = mgmt_bredr_support(hdev);
	if (status)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1378

1379 1380 1381 1382
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1383 1384
	hci_dev_lock(hdev);

1385
	if (cp->val) {
1386
		changed = !test_and_set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1387 1388 1389 1390 1391 1392 1393
	} else {
		if (hdev_is_powered(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					 MGMT_STATUS_REJECTED);
			goto unlock;
		}

1394
		changed = test_and_clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
1395
	}
1396 1397 1398 1399 1400 1401 1402

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1403

1404 1405 1406
unlock:
	hci_dev_unlock(hdev);
	return err;
1407 1408
}

1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428
static void le_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

1429
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1430 1431 1432 1433
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
1434
	struct hci_request req;
1435
	int err;
1436
	u8 val, enabled;
1437

1438
	BT_DBG("request for %s", hdev->name);
1439

1440 1441 1442
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1443

1444 1445 1446 1447
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1448
	/* LE-only devices do not allow toggling LE on/off */
1449
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1450 1451 1452
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_REJECTED);

1453
	hci_dev_lock(hdev);
1454 1455

	val = !!cp->val;
1456
	enabled = lmp_host_le_capable(hdev);
1457

1458
	if (!hdev_is_powered(hdev) || val == enabled) {
1459 1460 1461 1462 1463 1464 1465
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

1466 1467 1468 1469 1470
		if (!val && test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			clear_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

1471 1472
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1473
			goto unlock;
1474 1475 1476 1477

		if (changed)
			err = new_settings(hdev, sk);

1478
		goto unlock;
1479 1480
	}

1481 1482
	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1483
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1484
				 MGMT_STATUS_BUSY);
1485
		goto unlock;
1486 1487 1488 1489 1490
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1491
		goto unlock;
1492 1493 1494 1495 1496 1497
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1498
		hci_cp.simul = lmp_le_br_capable(hdev);
1499 1500
	}

1501 1502
	hci_req_init(&req, hdev);

1503 1504 1505
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags) && !val)
		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

1506 1507 1508 1509
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1510
	if (err < 0)
1511 1512
		mgmt_pending_remove(cmd);

1513 1514
unlock:
	hci_dev_unlock(hdev);
1515 1516 1517
	return err;
}

1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
	struct pending_cmd *cmd;

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
	struct pending_cmd *cmd;

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(mgmt_op, hdev);
	if (!cmd)
		goto unlock;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, mgmt_status(status),
		     hdev->dev_class, 3);

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static void add_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1586
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1587
{
1588
	struct mgmt_cp_add_uuid *cp = data;
1589
	struct pending_cmd *cmd;
1590
	struct hci_request req;
1591 1592 1593
	struct bt_uuid *uuid;
	int err;

1594
	BT_DBG("request for %s", hdev->name);
1595

1596
	hci_dev_lock(hdev);
1597

1598
	if (pending_eir_or_class(hdev)) {
1599
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1600
				 MGMT_STATUS_BUSY);
1601 1602 1603
		goto failed;
	}

1604
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1605 1606 1607 1608 1609 1610
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1611
	uuid->svc_hint = cp->svc_hint;
1612
	uuid->size = get_uuid_size(cp->uuid);
1613

1614
	list_add_tail(&uuid->list, &hdev->uuids);
1615

1616
	hci_req_init(&req, hdev);
1617

1618 1619 1620
	update_class(&req);
	update_eir(&req);

1621 1622 1623 1624
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1625

1626
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1627
				   hdev->dev_class, 3);
1628 1629 1630 1631
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1632
	if (!cmd) {
1633
		err = -ENOMEM;
1634 1635 1636 1637
		goto failed;
	}

	err = 0;
1638 1639

failed:
1640
	hci_dev_unlock(hdev);
1641 1642 1643
	return err;
}

1644 1645 1646 1647 1648 1649
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1650 1651
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1652 1653 1654 1655 1656 1657
		return true;
	}

	return false;
}

1658 1659 1660 1661 1662 1663 1664
static void remove_uuid_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1665
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1666
		       u16 len)
1667
{
1668
	struct mgmt_cp_remove_uuid *cp = data;
1669
	struct pending_cmd *cmd;
1670
	struct bt_uuid *match, *tmp;
1671
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1672
	struct hci_request req;
1673 1674
	int err, found;

1675
	BT_DBG("request for %s", hdev->name);
1676

1677
	hci_dev_lock(hdev);
1678

1679
	if (pending_eir_or_class(hdev)) {
1680
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1681
				 MGMT_STATUS_BUSY);
1682 1683 1684
		goto unlock;
	}

1685 1686
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1687

1688
		if (enable_service_cache(hdev)) {
1689
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1690
					   0, hdev->dev_class, 3);
1691 1692
			goto unlock;
		}
1693

1694
		goto update_class;
1695 1696 1697 1698
	}

	found = 0;

1699
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1700 1701 1702 1703
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1704
		kfree(match);
1705 1706 1707 1708
		found++;
	}

	if (found == 0) {
1709
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1710
				 MGMT_STATUS_INVALID_PARAMS);
1711 1712 1713
		goto unlock;
	}

1714
update_class:
1715
	hci_req_init(&req, hdev);
1716

1717 1718 1719
	update_class(&req);
	update_eir(&req);

1720 1721 1722 1723
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1724

1725
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1726
				   hdev->dev_class, 3);
1727 1728 1729 1730
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1731
	if (!cmd) {
1732
		err = -ENOMEM;
1733 1734 1735 1736
		goto unlock;
	}

	err = 0;
1737 1738

unlock:
1739
	hci_dev_unlock(hdev);
1740 1741 1742
	return err;
}

1743 1744 1745 1746 1747 1748 1749
static void set_class_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1750
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1751
			 u16 len)
1752
{
1753
	struct mgmt_cp_set_dev_class *cp = data;
1754
	struct pending_cmd *cmd;
1755
	struct hci_request req;
1756 1757
	int err;

1758
	BT_DBG("request for %s", hdev->name);
1759

1760
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
1761 1762
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1763

1764
	hci_dev_lock(hdev);
1765

1766 1767 1768 1769 1770
	if (pending_eir_or_class(hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}
1771

1772 1773 1774 1775 1776
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				 MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}
1777

1778 1779 1780
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1781
	if (!hdev_is_powered(hdev)) {
1782
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1783
				   hdev->dev_class, 3);
1784 1785 1786
		goto unlock;
	}

1787 1788
	hci_req_init(&req, hdev);

1789
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1790 1791 1792
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1793
		update_eir(&req);
1794
	}
1795

1796 1797
	update_class(&req);

1798 1799 1800 1801
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1802

1803
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1804
				   hdev->dev_class, 3);
1805 1806 1807 1808
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1809
	if (!cmd) {
1810
		err = -ENOMEM;
1811 1812 1813 1814
		goto unlock;
	}

	err = 0;
1815

1816
unlock:
1817
	hci_dev_unlock(hdev);
1818 1819 1820
	return err;
}

1821
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1822
			  u16 len)
1823
{
1824
	struct mgmt_cp_load_link_keys *cp = data;
1825
	u16 key_count, expected_len;
1826
	int i;
1827

1828 1829 1830 1831 1832 1833
	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_NOT_SUPPORTED);

1834
	key_count = __le16_to_cpu(cp->key_count);
1835

1836 1837
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1838
	if (expected_len != len) {
1839
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1840
		       len, expected_len);
1841
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1842
				  MGMT_STATUS_INVALID_PARAMS);
1843 1844
	}

1845 1846 1847 1848
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1849
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1850
	       key_count);
1851

1852 1853 1854 1855 1856 1857 1858 1859
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1860
	hci_dev_lock(hdev);
1861 1862 1863 1864

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
1865
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1866
	else
1867
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1868

1869
	for (i = 0; i < key_count; i++) {
1870
		struct mgmt_link_key_info *key = &cp->keys[i];
1871

1872
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1873
				 key->type, key->pin_len);
1874 1875
	}

1876
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1877

1878
	hci_dev_unlock(hdev);
1879

1880
	return 0;
1881 1882
}

1883
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1884
			   u8 addr_type, struct sock *skip_sk)
1885 1886 1887 1888 1889 1890 1891
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1892
			  skip_sk);
1893 1894
}

1895
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1896
			 u16 len)
1897
{
1898 1899
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1900 1901
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1902 1903 1904
	struct hci_conn *conn;
	int err;

1905
	memset(&rp, 0, sizeof(rp));
1906 1907
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1908

1909 1910 1911 1912 1913
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1914 1915 1916 1917 1918
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1919 1920
	hci_dev_lock(hdev);

1921
	if (!hdev_is_powered(hdev)) {
1922
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1923
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1924 1925 1926
		goto unlock;
	}

1927
	if (cp->addr.type == BDADDR_BREDR)
1928 1929 1930
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1931

1932
	if (err < 0) {
1933
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1934
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1935 1936 1937
		goto unlock;
	}

1938
	if (cp->disconnect) {
1939
		if (cp->addr.type == BDADDR_BREDR)
1940
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1941
						       &cp->addr.bdaddr);
1942 1943
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1944
						       &cp->addr.bdaddr);
1945 1946 1947
	} else {
		conn = NULL;
	}
1948

1949
	if (!conn) {
1950
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1951
				   &rp, sizeof(rp));
1952
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1953 1954
		goto unlock;
	}
1955

1956
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1957
			       sizeof(*cp));
1958 1959 1960
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1961 1962
	}

1963
	dc.handle = cpu_to_le16(conn->handle);
1964 1965 1966 1967 1968
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1969
unlock:
1970
	hci_dev_unlock(hdev);
1971 1972 1973
	return err;
}

1974
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1975
		      u16 len)
1976
{
1977
	struct mgmt_cp_disconnect *cp = data;
1978
	struct mgmt_rp_disconnect rp;
1979
	struct hci_cp_disconnect dc;
1980
	struct pending_cmd *cmd;
1981 1982 1983 1984 1985
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1986 1987 1988 1989
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1990
	if (!bdaddr_type_is_valid(cp->addr.type))
1991 1992 1993
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1994

1995
	hci_dev_lock(hdev);
1996 1997

	if (!test_bit(HCI_UP, &hdev->flags)) {
1998 1999
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2000 2001 2002
		goto failed;
	}

2003
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
2004 2005
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2006 2007 2008
		goto failed;
	}

2009
	if (cp->addr.type == BDADDR_BREDR)
2010 2011
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2012 2013
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
2014

2015
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2016 2017
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
2018 2019 2020
		goto failed;
	}

2021
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2022 2023
	if (!cmd) {
		err = -ENOMEM;
2024
		goto failed;
2025
	}
2026

2027
	dc.handle = cpu_to_le16(conn->handle);
2028
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
2029 2030 2031

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
2032
		mgmt_pending_remove(cmd);
2033 2034

failed:
2035
	hci_dev_unlock(hdev);
2036 2037 2038
	return err;
}

2039
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2040 2041 2042
{
	switch (link_type) {
	case LE_LINK:
2043 2044
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2045
			return BDADDR_LE_PUBLIC;
2046

2047
		default:
2048
			/* Fallback to LE Random address type */
2049
			return BDADDR_LE_RANDOM;
2050
		}
2051

2052
	default:
2053
		/* Fallback to BR/EDR type */
2054
		return BDADDR_BREDR;
2055 2056 2057
	}
}

2058 2059
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2060 2061
{
	struct mgmt_rp_get_connections *rp;
2062
	struct hci_conn *c;
2063
	size_t rp_len;
2064 2065
	int err;
	u16 i;
2066 2067 2068

	BT_DBG("");

2069
	hci_dev_lock(hdev);
2070

2071
	if (!hdev_is_powered(hdev)) {
2072
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
2073
				 MGMT_STATUS_NOT_POWERED);
2074 2075 2076
		goto unlock;
	}

2077
	i = 0;
2078 2079
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2080
			i++;
2081 2082
	}

2083
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2084
	rp = kmalloc(rp_len, GFP_KERNEL);
2085
	if (!rp) {
2086 2087 2088 2089 2090
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2091
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2092 2093
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2094
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2095
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2096
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2097 2098 2099 2100
			continue;
		i++;
	}

2101
	rp->conn_count = cpu_to_le16(i);
2102

2103 2104
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2105

2106
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
2107
			   rp_len);
2108

2109
	kfree(rp);
2110 2111

unlock:
2112
	hci_dev_unlock(hdev);
2113 2114 2115
	return err;
}

2116
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2117
				   struct mgmt_cp_pin_code_neg_reply *cp)
2118 2119 2120 2121
{
	struct pending_cmd *cmd;
	int err;

2122
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2123
			       sizeof(*cp));
2124 2125 2126
	if (!cmd)
		return -ENOMEM;

2127
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2128
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2129 2130 2131 2132 2133 2134
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2135
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2136
			  u16 len)
2137
{
2138
	struct hci_conn *conn;
2139
	struct mgmt_cp_pin_code_reply *cp = data;
2140
	struct hci_cp_pin_code_reply reply;
2141
	struct pending_cmd *cmd;
2142 2143 2144 2145
	int err;

	BT_DBG("");

2146
	hci_dev_lock(hdev);
2147

2148
	if (!hdev_is_powered(hdev)) {
2149
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2150
				 MGMT_STATUS_NOT_POWERED);
2151 2152 2153
		goto failed;
	}

2154
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2155
	if (!conn) {
2156
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2157
				 MGMT_STATUS_NOT_CONNECTED);
2158 2159 2160 2161
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2162 2163 2164
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2165 2166 2167

		BT_ERR("PIN code is not 16 bytes long");

2168
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2169
		if (err >= 0)
2170
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
2171
					 MGMT_STATUS_INVALID_PARAMS);
2172 2173 2174 2175

		goto failed;
	}

2176
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2177 2178
	if (!cmd) {
		err = -ENOMEM;
2179
		goto failed;
2180
	}
2181

2182
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2183
	reply.pin_len = cp->pin_len;
2184
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2185 2186 2187

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2188
		mgmt_pending_remove(cmd);
2189 2190

failed:
2191
	hci_dev_unlock(hdev);
2192 2193 2194
	return err;
}

2195 2196
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2197
{
2198
	struct mgmt_cp_set_io_capability *cp = data;
2199 2200 2201

	BT_DBG("");

2202
	hci_dev_lock(hdev);
2203 2204 2205 2206

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2207
	       hdev->io_capability);
2208

2209
	hci_dev_unlock(hdev);
2210

2211 2212
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
2213 2214
}

2215
static struct pending_cmd *find_pairing(struct hci_conn *conn)
2216 2217
{
	struct hci_dev *hdev = conn->hdev;
2218
	struct pending_cmd *cmd;
2219

2220
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

2238
	bacpy(&rp.addr.bdaddr, &conn->dst);
2239
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2240

2241
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
2242
		     &rp, sizeof(rp));
2243 2244 2245 2246 2247 2248

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2249
	hci_conn_drop(conn);
2250

2251
	mgmt_pending_remove(cmd);
2252 2253 2254 2255 2256 2257 2258 2259 2260
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2261
	if (!cmd)
2262
		BT_DBG("Unable to find a pending command");
2263
	else
2264
		pairing_complete(cmd, mgmt_status(status));
2265 2266
}

2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

2283
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2284
		       u16 len)
2285
{
2286
	struct mgmt_cp_pair_device *cp = data;
2287
	struct mgmt_rp_pair_device rp;
2288 2289 2290 2291 2292 2293 2294
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2295 2296 2297 2298
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2299 2300 2301 2302 2303
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

2304
	hci_dev_lock(hdev);
2305

2306
	if (!hdev_is_powered(hdev)) {
2307 2308
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2309 2310 2311
		goto unlock;
	}

2312 2313
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2314
		auth_type = HCI_AT_DEDICATED_BONDING;
2315
	else
2316 2317
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2318
	if (cp->addr.type == BDADDR_BREDR)
2319 2320
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2321
	else
2322 2323
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2324

2325
	if (IS_ERR(conn)) {
2326 2327 2328 2329 2330 2331 2332
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2333
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2334
				   status, &rp,
2335
				   sizeof(rp));
2336 2337 2338 2339
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2340
		hci_conn_drop(conn);
2341
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2342
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2343 2344 2345
		goto unlock;
	}

2346
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2347 2348
	if (!cmd) {
		err = -ENOMEM;
2349
		hci_conn_drop(conn);
2350 2351 2352
		goto unlock;
	}

2353
	/* For LE, just connecting isn't a proof that the pairing finished */
2354
	if (cp->addr.type == BDADDR_BREDR)
2355
		conn->connect_cfm_cb = pairing_complete_cb;
2356 2357
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2358

2359 2360 2361 2362 2363 2364
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2365
	    hci_conn_security(conn, sec_level, auth_type))
2366 2367 2368 2369 2370
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2371
	hci_dev_unlock(hdev);
2372 2373 2374
	return err;
}

2375 2376
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2377
{
2378
	struct mgmt_addr_info *addr = data;
2379 2380 2381 2382 2383 2384 2385 2386
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2387
	if (!hdev_is_powered(hdev)) {
2388
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2389
				 MGMT_STATUS_NOT_POWERED);
2390 2391 2392
		goto unlock;
	}

2393 2394
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2395
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2396
				 MGMT_STATUS_INVALID_PARAMS);
2397 2398 2399 2400 2401 2402
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2403
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2404
				 MGMT_STATUS_INVALID_PARAMS);
2405 2406 2407 2408 2409
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2410
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2411
			   addr, sizeof(*addr));
2412 2413 2414 2415 2416
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2417
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2418
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2419
			     u16 hci_op, __le32 passkey)
2420 2421
{
	struct pending_cmd *cmd;
2422
	struct hci_conn *conn;
2423 2424
	int err;

2425
	hci_dev_lock(hdev);
2426

2427
	if (!hdev_is_powered(hdev)) {
2428 2429 2430
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_POWERED, addr,
				   sizeof(*addr));
2431
		goto done;
2432 2433
	}

2434 2435
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2436
	else
2437
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &addr->bdaddr);
2438 2439

	if (!conn) {
2440 2441 2442
		err = cmd_complete(sk, hdev->id, mgmt_op,
				   MGMT_STATUS_NOT_CONNECTED, addr,
				   sizeof(*addr));
2443 2444
		goto done;
	}
2445

2446
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2447
		/* Continue with pairing via SMP */
2448 2449 2450
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2451 2452 2453
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_SUCCESS, addr,
					   sizeof(*addr));
2454
		else
2455 2456 2457
			err = cmd_complete(sk, hdev->id, mgmt_op,
					   MGMT_STATUS_FAILED, addr,
					   sizeof(*addr));
2458 2459 2460 2461

		goto done;
	}

2462
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2463 2464
	if (!cmd) {
		err = -ENOMEM;
2465
		goto done;
2466 2467
	}

2468
	/* Continue with pairing via HCI */
2469 2470 2471
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2472
		bacpy(&cp.bdaddr, &addr->bdaddr);
2473 2474 2475
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2476 2477
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2478

2479 2480
	if (err < 0)
		mgmt_pending_remove(cmd);
2481

2482
done:
2483
	hci_dev_unlock(hdev);
2484 2485 2486
	return err;
}

2487 2488 2489 2490 2491 2492 2493
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2494
	return user_pairing_resp(sk, hdev, &cp->addr,
2495 2496 2497 2498
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2499 2500
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2501
{
2502
	struct mgmt_cp_user_confirm_reply *cp = data;
2503 2504 2505 2506

	BT_DBG("");

	if (len != sizeof(*cp))
2507
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2508
				  MGMT_STATUS_INVALID_PARAMS);
2509

2510
	return user_pairing_resp(sk, hdev, &cp->addr,
2511 2512
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2513 2514
}

2515
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2516
				  void *data, u16 len)
2517
{
2518
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2519 2520 2521

	BT_DBG("");

2522
	return user_pairing_resp(sk, hdev, &cp->addr,
2523 2524
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2525 2526
}

2527 2528
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2529
{
2530
	struct mgmt_cp_user_passkey_reply *cp = data;
2531 2532 2533

	BT_DBG("");

2534
	return user_pairing_resp(sk, hdev, &cp->addr,
2535 2536
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2537 2538
}

2539
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2540
				  void *data, u16 len)
2541
{
2542
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2543 2544 2545

	BT_DBG("");

2546
	return user_pairing_resp(sk, hdev, &cp->addr,
2547 2548
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2549 2550
}

2551
static void update_name(struct hci_request *req)
2552
{
2553
	struct hci_dev *hdev = req->hdev;
2554 2555
	struct hci_cp_write_local_name cp;

2556
	memcpy(cp.name, hdev->dev_name, sizeof(cp.name));
2557

2558
	hci_req_add(req, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
2559 2560
}

2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588
static void set_name_complete(struct hci_dev *hdev, u8 status)
{
	struct mgmt_cp_set_local_name *cp;
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			   mgmt_status(status));
	else
		cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
			     cp, sizeof(*cp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2589
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2590
			  u16 len)
2591
{
2592
	struct mgmt_cp_set_local_name *cp = data;
2593
	struct pending_cmd *cmd;
2594
	struct hci_request req;
2595 2596 2597 2598
	int err;

	BT_DBG("");

2599
	hci_dev_lock(hdev);
2600

2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				   data, len);
		goto failed;
	}

2612
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2613

2614
	if (!hdev_is_powered(hdev)) {
2615
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2616 2617

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2618
				   data, len);
2619 2620 2621 2622
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2623
				 sk);
2624

2625 2626 2627
		goto failed;
	}

2628
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2629 2630 2631 2632 2633
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2634 2635
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

2636
	hci_req_init(&req, hdev);
2637 2638 2639 2640 2641 2642 2643 2644 2645

	if (lmp_bredr_capable(hdev)) {
		update_name(&req);
		update_eir(&req);
	}

	if (lmp_le_capable(hdev))
		hci_update_ad(&req);

2646
	err = hci_req_run(&req, set_name_complete);
2647 2648 2649 2650
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2651
	hci_dev_unlock(hdev);
2652 2653 2654
	return err;
}

2655
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2656
			       void *data, u16 data_len)
2657 2658 2659 2660
{
	struct pending_cmd *cmd;
	int err;

2661
	BT_DBG("%s", hdev->name);
2662

2663
	hci_dev_lock(hdev);
2664

2665
	if (!hdev_is_powered(hdev)) {
2666
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2667
				 MGMT_STATUS_NOT_POWERED);
2668 2669 2670
		goto unlock;
	}

2671
	if (!lmp_ssp_capable(hdev)) {
2672
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2673
				 MGMT_STATUS_NOT_SUPPORTED);
2674 2675 2676
		goto unlock;
	}

2677
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2678
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2679
				 MGMT_STATUS_BUSY);
2680 2681 2682
		goto unlock;
	}

2683
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2684 2685 2686 2687 2688 2689 2690 2691 2692 2693
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2694
	hci_dev_unlock(hdev);
2695 2696 2697
	return err;
}

2698
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2699
			       void *data, u16 len)
2700
{
2701
	struct mgmt_cp_add_remote_oob_data *cp = data;
2702
	u8 status;
2703 2704
	int err;

2705
	BT_DBG("%s ", hdev->name);
2706

2707
	hci_dev_lock(hdev);
2708

2709
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2710
				      cp->randomizer);
2711
	if (err < 0)
2712
		status = MGMT_STATUS_FAILED;
2713
	else
2714
		status = MGMT_STATUS_SUCCESS;
2715

2716
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2717
			   &cp->addr, sizeof(cp->addr));
2718

2719
	hci_dev_unlock(hdev);
2720 2721 2722
	return err;
}

2723
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2724
				  void *data, u16 len)
2725
{
2726
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2727
	u8 status;
2728 2729
	int err;

2730
	BT_DBG("%s", hdev->name);
2731

2732
	hci_dev_lock(hdev);
2733

2734
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2735
	if (err < 0)
2736
		status = MGMT_STATUS_INVALID_PARAMS;
2737
	else
2738
		status = MGMT_STATUS_SUCCESS;
2739

2740
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2741
			   status, &cp->addr, sizeof(cp->addr));
2742

2743
	hci_dev_unlock(hdev);
2744 2745 2746
	return err;
}

2747 2748 2749 2750 2751 2752 2753 2754 2755 2756 2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767
static int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	u8 type;
	int err;

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &type, sizeof(type));
	mgmt_pending_remove(cmd);

	return err;
}

2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785
static void start_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	if (status) {
		hci_dev_lock(hdev);
		mgmt_start_discovery_failed(hdev, status);
		hci_dev_unlock(hdev);
		return;
	}

	hci_dev_lock(hdev);
	hci_discovery_set_state(hdev, DISCOVERY_FINDING);
	hci_dev_unlock(hdev);

	switch (hdev->discovery.type) {
	case DISCOV_TYPE_LE:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2786
				   DISCOV_LE_TIMEOUT);
2787 2788 2789 2790
		break;

	case DISCOV_TYPE_INTERLEAVED:
		queue_delayed_work(hdev->workqueue, &hdev->le_scan_disable,
2791
				   DISCOV_INTERLEAVED_TIMEOUT);
2792 2793 2794 2795 2796 2797 2798 2799 2800 2801
		break;

	case DISCOV_TYPE_BREDR:
		break;

	default:
		BT_ERR("Invalid discovery type %d", hdev->discovery.type);
	}
}

2802
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2803
			   void *data, u16 len)
2804
{
2805
	struct mgmt_cp_start_discovery *cp = data;
2806
	struct pending_cmd *cmd;
2807 2808 2809 2810 2811 2812
	struct hci_cp_le_set_scan_param param_cp;
	struct hci_cp_le_set_scan_enable enable_cp;
	struct hci_cp_inquiry inq_cp;
	struct hci_request req;
	/* General inquiry access code (GIAC) */
	u8 lap[3] = { 0x33, 0x8b, 0x9e };
2813
	u8 status;
2814 2815
	int err;

2816
	BT_DBG("%s", hdev->name);
2817

2818
	hci_dev_lock(hdev);
2819

2820
	if (!hdev_is_powered(hdev)) {
2821
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2822
				 MGMT_STATUS_NOT_POWERED);
2823 2824 2825
		goto failed;
	}

2826 2827 2828 2829 2830 2831
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2832
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2833
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2834
				 MGMT_STATUS_BUSY);
2835 2836 2837
		goto failed;
	}

2838
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2839 2840 2841 2842 2843
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2844 2845
	hdev->discovery.type = cp->type;

2846 2847
	hci_req_init(&req, hdev);

A
Andre Guedes 已提交
2848
	switch (hdev->discovery.type) {
2849
	case DISCOV_TYPE_BREDR:
2850 2851
		status = mgmt_bredr_support(hdev);
		if (status) {
2852
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2853
					 status);
2854 2855 2856 2857
			mgmt_pending_remove(cmd);
			goto failed;
		}

2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		hci_inquiry_cache_flush(hdev);

		memset(&inq_cp, 0, sizeof(inq_cp));
		memcpy(&inq_cp.lap, lap, sizeof(inq_cp.lap));
2869
		inq_cp.length = DISCOV_BREDR_INQUIRY_LEN;
2870
		hci_req_add(&req, HCI_OP_INQUIRY, sizeof(inq_cp), &inq_cp);
2871 2872 2873
		break;

	case DISCOV_TYPE_LE:
2874
	case DISCOV_TYPE_INTERLEAVED:
2875 2876
		status = mgmt_le_support(hdev);
		if (status) {
2877
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2878
					 status);
2879 2880 2881 2882
			mgmt_pending_remove(cmd);
			goto failed;
		}

2883
		if (hdev->discovery.type == DISCOV_TYPE_INTERLEAVED &&
2884
		    !test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
2885 2886 2887 2888 2889 2890
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

2891 2892 2893 2894 2895 2896 2897 2898 2899 2900 2901 2902 2903 2904 2905 2906
		if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_REJECTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		if (test_bit(HCI_LE_SCAN, &hdev->dev_flags)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_BUSY);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		memset(&param_cp, 0, sizeof(param_cp));
		param_cp.type = LE_SCAN_ACTIVE;
2907 2908
		param_cp.interval = cpu_to_le16(DISCOV_LE_SCAN_INT);
		param_cp.window = cpu_to_le16(DISCOV_LE_SCAN_WIN);
2909 2910 2911 2912 2913 2914 2915 2916
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_PARAM, sizeof(param_cp),
			    &param_cp);

		memset(&enable_cp, 0, sizeof(enable_cp));
		enable_cp.enable = LE_SCAN_ENABLE;
		enable_cp.filter_dup = LE_SCAN_FILTER_DUP_ENABLE;
		hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE, sizeof(enable_cp),
			    &enable_cp);
2917 2918
		break;

2919
	default:
2920 2921 2922 2923
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2924
	}
2925

2926
	err = hci_req_run(&req, start_discovery_complete);
2927 2928
	if (err < 0)
		mgmt_pending_remove(cmd);
2929 2930
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2931 2932

failed:
2933
	hci_dev_unlock(hdev);
2934 2935 2936
	return err;
}

2937 2938 2939 2940 2941 2942 2943 2944 2945 2946 2947 2948 2949 2950 2951 2952
static int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
	mgmt_pending_remove(cmd);

	return err;
}

2953 2954 2955 2956 2957 2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969
static void stop_discovery_complete(struct hci_dev *hdev, u8 status)
{
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	if (status) {
		mgmt_stop_discovery_failed(hdev, status);
		goto unlock;
	}

	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

unlock:
	hci_dev_unlock(hdev);
}

2970
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2971
			  u16 len)
2972
{
2973
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2974
	struct pending_cmd *cmd;
2975 2976
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2977 2978
	struct hci_request req;
	struct hci_cp_le_set_scan_enable enable_cp;
2979 2980
	int err;

2981
	BT_DBG("%s", hdev->name);
2982

2983
	hci_dev_lock(hdev);
2984

2985
	if (!hci_discovery_active(hdev)) {
2986
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2987 2988
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2989 2990 2991 2992
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2993
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2994 2995
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2996
		goto unlock;
2997 2998
	}

2999
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
3000 3001
	if (!cmd) {
		err = -ENOMEM;
3002 3003 3004
		goto unlock;
	}

3005 3006
	hci_req_init(&req, hdev);

3007 3008
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
3009 3010 3011 3012 3013 3014 3015 3016 3017 3018
		if (test_bit(HCI_INQUIRY, &hdev->flags)) {
			hci_req_add(&req, HCI_OP_INQUIRY_CANCEL, 0, NULL);
		} else {
			cancel_delayed_work(&hdev->le_scan_disable);

			memset(&enable_cp, 0, sizeof(enable_cp));
			enable_cp.enable = LE_SCAN_DISABLE;
			hci_req_add(&req, HCI_OP_LE_SET_SCAN_ENABLE,
				    sizeof(enable_cp), &enable_cp);
		}
3019

3020 3021 3022 3023
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
3024
						     NAME_PENDING);
3025
		if (!e) {
3026
			mgmt_pending_remove(cmd);
3027 3028 3029 3030 3031 3032 3033
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
3034

3035
		bacpy(&cp.bdaddr, &e->data.bdaddr);
3036 3037
		hci_req_add(&req, HCI_OP_REMOTE_NAME_REQ_CANCEL, sizeof(cp),
			    &cp);
3038 3039 3040 3041 3042

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
3043 3044 3045 3046 3047 3048

		mgmt_pending_remove(cmd);
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
				   MGMT_STATUS_FAILED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
		goto unlock;
3049 3050
	}

3051
	err = hci_req_run(&req, stop_discovery_complete);
3052 3053
	if (err < 0)
		mgmt_pending_remove(cmd);
3054 3055
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
3056

3057
unlock:
3058
	hci_dev_unlock(hdev);
3059 3060 3061
	return err;
}

3062
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3063
			u16 len)
3064
{
3065
	struct mgmt_cp_confirm_name *cp = data;
3066 3067 3068
	struct inquiry_entry *e;
	int err;

3069
	BT_DBG("%s", hdev->name);
3070 3071 3072

	hci_dev_lock(hdev);

3073
	if (!hci_discovery_active(hdev)) {
3074
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3075
				 MGMT_STATUS_FAILED);
3076 3077 3078
		goto failed;
	}

3079
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3080
	if (!e) {
3081
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
3082
				 MGMT_STATUS_INVALID_PARAMS);
3083 3084 3085 3086 3087 3088 3089 3090
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3091
		hci_inquiry_cache_update_resolve(hdev, e);
3092 3093
	}

3094 3095
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
3096 3097 3098 3099 3100 3101

failed:
	hci_dev_unlock(hdev);
	return err;
}

3102
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3103
			u16 len)
3104
{
3105
	struct mgmt_cp_block_device *cp = data;
3106
	u8 status;
3107 3108
	int err;

3109
	BT_DBG("%s", hdev->name);
3110

3111
	if (!bdaddr_type_is_valid(cp->addr.type))
3112 3113 3114
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3115

3116
	hci_dev_lock(hdev);
3117

3118
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
3119
	if (err < 0)
3120
		status = MGMT_STATUS_FAILED;
3121
	else
3122
		status = MGMT_STATUS_SUCCESS;
3123

3124
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
3125
			   &cp->addr, sizeof(cp->addr));
3126

3127
	hci_dev_unlock(hdev);
3128 3129 3130 3131

	return err;
}

3132
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3133
			  u16 len)
3134
{
3135
	struct mgmt_cp_unblock_device *cp = data;
3136
	u8 status;
3137 3138
	int err;

3139
	BT_DBG("%s", hdev->name);
3140

3141
	if (!bdaddr_type_is_valid(cp->addr.type))
3142 3143 3144
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
3145

3146
	hci_dev_lock(hdev);
3147

3148
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
3149
	if (err < 0)
3150
		status = MGMT_STATUS_INVALID_PARAMS;
3151
	else
3152
		status = MGMT_STATUS_SUCCESS;
3153

3154
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
3155
			   &cp->addr, sizeof(cp->addr));
3156

3157
	hci_dev_unlock(hdev);
3158 3159 3160 3161

	return err;
}

3162 3163 3164 3165
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3166
	struct hci_request req;
3167
	int err;
3168
	__u16 source;
3169 3170 3171

	BT_DBG("%s", hdev->name);

3172 3173 3174 3175 3176 3177
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

3178 3179
	hci_dev_lock(hdev);

3180
	hdev->devid_source = source;
3181 3182 3183 3184 3185 3186
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

3187 3188 3189
	hci_req_init(&req, hdev);
	update_eir(&req);
	hci_req_run(&req, NULL);
3190 3191 3192 3193 3194 3195

	hci_dev_unlock(hdev);

	return err;
}

3196 3197 3198 3199 3200 3201 3202 3203 3204 3205 3206 3207 3208 3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221
static void set_advertising_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
		return;
	}

	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
}

static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
3222
	u8 val, enabled, status;
3223 3224 3225 3226
	int err;

	BT_DBG("request for %s", hdev->name);

3227 3228
	status = mgmt_le_support(hdev);
	if (status)
3229
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
3230
				  status);
3231 3232 3233 3234 3235 3236 3237 3238 3239 3240 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	val = !!cp->val;
	enabled = test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);

	if (!hdev_is_powered(hdev) || val == enabled) {
		bool changed = false;

		if (val != test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
			change_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

	hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(val), &val);

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3285 3286 3287 3288 3289 3290 3291 3292
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3293
	if (!lmp_le_capable(hdev))
3294
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
3295
				  MGMT_STATUS_NOT_SUPPORTED);
3296 3297 3298 3299 3300 3301 3302 3303 3304 3305 3306 3307 3308 3309 3310 3311 3312 3313 3314 3315 3316 3317 3318 3319 3320 3321 3322 3323 3324

	if (hdev_is_powered(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				  MGMT_STATUS_REJECTED);

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
			return cmd_status(sk, hdev->id,
					  MGMT_OP_SET_STATIC_ADDRESS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS, 0, NULL, 0);

	hci_dev_unlock(hdev);

	return err;
}

3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340
static void fast_connectable_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			   mgmt_status(status));
	} else {
3341 3342 3343 3344 3345 3346 3347
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
			set_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
		else
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);

3348 3349 3350 3351 3352 3353 3354 3355 3356 3357
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3358
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
3359
				void *data, u16 len)
3360
{
3361
	struct mgmt_mode *cp = data;
3362 3363
	struct pending_cmd *cmd;
	struct hci_request req;
3364 3365
	int err;

3366
	BT_DBG("%s", hdev->name);
3367

3368 3369
	if (!test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags) ||
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
3370 3371 3372
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

3373 3374 3375 3376
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

3377
	if (!hdev_is_powered(hdev))
3378
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3379
				  MGMT_STATUS_NOT_POWERED);
3380 3381

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
3382
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3383
				  MGMT_STATUS_REJECTED);
3384 3385 3386

	hci_dev_lock(hdev);

3387 3388 3389 3390 3391 3392
	if (mgmt_pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

3393 3394 3395 3396 3397 3398
	if (!!cp->val == test_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

3399 3400 3401 3402 3403
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
3404 3405
	}

3406 3407
	hci_req_init(&req, hdev);

3408
	write_fast_connectable(&req, cp->val);
3409 3410

	err = hci_req_run(&req, fast_connectable_complete);
3411
	if (err < 0) {
3412
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
3413
				 MGMT_STATUS_FAILED);
3414
		mgmt_pending_remove(cmd);
3415 3416
	}

3417
unlock:
3418
	hci_dev_unlock(hdev);
3419

3420 3421 3422
	return err;
}

3423 3424 3425 3426 3427 3428 3429 3430 3431 3432 3433 3434 3435 3436 3437 3438 3439 3440 3441 3442 3443 3444 3445 3446 3447 3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475 3476 3477 3478 3479 3480 3481 3482 3483 3484 3485 3486 3487 3488 3489 3490 3491 3492 3493 3494 3495 3496 3497 3498 3499 3500 3501 3502 3503 3504 3505 3506 3507 3508 3509 3510 3511 3512 3513 3514 3515 3516 3517 3518 3519 3520 3521 3522 3523 3524 3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537
static void set_bredr_complete(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	cmd = mgmt_pending_find(MGMT_OP_SET_BREDR, hdev);
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
		clear_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_NOT_SUPPORTED);

	if (!test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_REJECTED);

	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

	if (cp->val == test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags)) {
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			clear_bit(HCI_FAST_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);
		}

		change_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_REJECTED);
		goto unlock;
	}

	if (mgmt_pending_find(MGMT_OP_SET_BREDR, hdev)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				 MGMT_STATUS_BUSY);
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	/* We need to flip the bit already here so that hci_update_ad
	 * generates the correct flags.
	 */
	set_bit(HCI_BREDR_ENABLED, &hdev->dev_flags);

	hci_req_init(&req, hdev);
	hci_update_ad(&req);
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3538 3539
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
3540 3541
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
3542 3543
	if (key->master != 0x00 && key->master != 0x01)
		return false;
3544 3545
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
3546 3547 3548
	return true;
}

3549
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
3550
			       void *cp_data, u16 len)
3551 3552 3553
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
3554
	int i, err;
3555

3556
	key_count = __le16_to_cpu(cp->key_count);
3557 3558 3559 3560 3561

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
3562
		       len, expected_len);
3563
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
3564
				  MGMT_STATUS_INVALID_PARAMS);
3565 3566
	}

3567
	BT_DBG("%s key_count %u", hdev->name, key_count);
3568

3569 3570 3571
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

3572
		if (!ltk_is_valid(key))
3573 3574 3575 3576 3577
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

3591
		hci_add_ltk(hdev, &key->addr.bdaddr,
3592
			    bdaddr_to_le(key->addr.type),
3593 3594
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
3595 3596
	}

3597 3598 3599
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

3600 3601
	hci_dev_unlock(hdev);

3602
	return err;
3603 3604
}

3605
static const struct mgmt_handler {
3606 3607
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
3608 3609
	bool var_len;
	size_t data_len;
3610 3611
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635 3636 3637 3638 3639 3640 3641 3642 3643 3644 3645 3646 3647 3648 3649 3650
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
3651
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
3652
	{ set_advertising,        false, MGMT_SETTING_SIZE },
3653
	{ set_bredr,              false, MGMT_SETTING_SIZE },
3654
	{ set_static_address,     false, MGMT_SET_STATIC_ADDRESS_SIZE },
3655 3656 3657
};


3658 3659
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
3660 3661
	void *buf;
	u8 *cp;
3662
	struct mgmt_hdr *hdr;
3663
	u16 opcode, index, len;
3664
	struct hci_dev *hdev = NULL;
3665
	const struct mgmt_handler *handler;
3666 3667 3668 3669 3670 3671 3672
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

3673
	buf = kmalloc(msglen, GFP_KERNEL);
3674 3675 3676 3677 3678 3679 3680 3681
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

3682
	hdr = buf;
3683 3684 3685
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
3686 3687 3688 3689 3690 3691

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

3692
	if (index != MGMT_INDEX_NONE) {
3693 3694 3695
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
3696
					 MGMT_STATUS_INVALID_INDEX);
3697 3698
			goto done;
		}
3699 3700 3701 3702 3703 3704

		if (test_bit(HCI_USER_CHANNEL, &hdev->dev_flags)) {
			err = cmd_status(sk, index, opcode,
					 MGMT_STATUS_INVALID_INDEX);
			goto done;
		}
3705 3706
	}

3707
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
3708
	    mgmt_handlers[opcode].func == NULL) {
3709
		BT_DBG("Unknown op %u", opcode);
3710
		err = cmd_status(sk, index, opcode,
3711
				 MGMT_STATUS_UNKNOWN_COMMAND);
3712 3713 3714 3715
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
3716
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
3717
		err = cmd_status(sk, index, opcode,
3718
				 MGMT_STATUS_INVALID_INDEX);
3719
		goto done;
3720 3721
	}

3722 3723 3724
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
3725
	    (!handler->var_len && len != handler->data_len)) {
3726
		err = cmd_status(sk, index, opcode,
3727
				 MGMT_STATUS_INVALID_PARAMS);
3728 3729 3730
		goto done;
	}

3731 3732 3733 3734 3735
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

3736
	err = handler->func(sk, hdev, cp, len);
3737 3738 3739
	if (err < 0)
		goto done;

3740 3741 3742
	err = msglen;

done:
3743 3744 3745
	if (hdev)
		hci_dev_put(hdev);

3746 3747 3748
	kfree(buf);
	return err;
}
3749

3750
int mgmt_index_added(struct hci_dev *hdev)
3751
{
3752 3753 3754
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3755
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
3756 3757
}

3758
int mgmt_index_removed(struct hci_dev *hdev)
3759
{
3760
	u8 status = MGMT_STATUS_INVALID_INDEX;
3761

3762 3763 3764
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

3765
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3766

3767
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
3768 3769
}

3770
static void set_bredr_scan(struct hci_request *req)
3771
{
3772
	struct hci_dev *hdev = req->hdev;
3773 3774
	u8 scan = 0;

3775 3776 3777 3778 3779 3780
	/* Ensure that fast connectable is disabled. This function will
	 * not do anything if the page scan parameters are already what
	 * they should be.
	 */
	write_fast_connectable(req, false);

3781 3782 3783 3784 3785
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

3786 3787
	if (scan)
		hci_req_add(req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
3788 3789
}

3790 3791 3792 3793 3794 3795 3796 3797 3798 3799 3800 3801 3802 3803 3804 3805 3806 3807
static void powered_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	hci_dev_unlock(hdev);

	if (match.sk)
		sock_put(match.sk);
}

3808
static int powered_update_hci(struct hci_dev *hdev)
3809
{
3810
	struct hci_request req;
3811
	u8 link_sec;
3812

3813 3814
	hci_req_init(&req, hdev);

3815 3816 3817
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
	    !lmp_host_ssp_capable(hdev)) {
		u8 ssp = 1;
3818

3819
		hci_req_add(&req, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
3820
	}
3821

3822 3823
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags) &&
	    lmp_bredr_capable(hdev)) {
3824
		struct hci_cp_write_le_host_supported cp;
3825

3826 3827
		cp.le = 1;
		cp.simul = lmp_le_br_capable(hdev);
3828

3829 3830 3831 3832 3833
		/* Check first if we already have the right
		 * host state (host features set)
		 */
		if (cp.le != lmp_host_le_capable(hdev) ||
		    cp.simul != lmp_host_le_br_capable(hdev))
3834 3835
			hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED,
				    sizeof(cp), &cp);
3836 3837 3838

		/* In case BR/EDR was toggled during the AUTO_OFF phase */
		hci_update_ad(&req);
3839
	}
3840

3841 3842 3843 3844 3845 3846 3847
	if (lmp_le_capable(hdev)) {
		/* Set random address to static address if configured */
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			hci_req_add(&req, HCI_OP_LE_SET_RANDOM_ADDR, 6,
				    &hdev->static_addr);
	}

3848 3849 3850 3851 3852 3853
	if (test_bit(HCI_LE_PERIPHERAL, &hdev->dev_flags)) {
		u8 adv = 0x01;

		hci_req_add(&req, HCI_OP_LE_SET_ADV_ENABLE, sizeof(adv), &adv);
	}

3854 3855
	link_sec = test_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
	if (link_sec != test_bit(HCI_AUTH, &hdev->flags))
3856 3857
		hci_req_add(&req, HCI_OP_WRITE_AUTH_ENABLE,
			    sizeof(link_sec), &link_sec);
3858

3859
	if (lmp_bredr_capable(hdev)) {
3860 3861
		if (test_bit(HCI_BREDR_ENABLED, &hdev->dev_flags))
			set_bredr_scan(&req);
3862
		update_class(&req);
3863
		update_name(&req);
3864
		update_eir(&req);
3865
	}
3866

3867
	return hci_req_run(&req, powered_complete);
3868
}
3869

3870 3871 3872
int mgmt_powered(struct hci_dev *hdev, u8 powered)
{
	struct cmd_lookup match = { NULL, hdev };
3873 3874
	u8 status_not_powered = MGMT_STATUS_NOT_POWERED;
	u8 zero_cod[] = { 0, 0, 0 };
3875
	int err;
3876

3877 3878 3879 3880
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

	if (powered) {
3881 3882
		if (powered_update_hci(hdev) == 0)
			return 0;
3883

3884 3885 3886
		mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp,
				     &match);
		goto new_settings;
3887 3888
	}

3889 3890 3891 3892 3893 3894 3895 3896
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status_not_powered);

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
		mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
			   zero_cod, sizeof(zero_cod), NULL);

new_settings:
3897
	err = new_settings(hdev, match.sk);
3898 3899 3900 3901

	if (match.sk)
		sock_put(match.sk);

3902
	return err;
3903
}
3904

3905 3906 3907 3908 3909 3910 3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921 3922 3923 3924 3925
int mgmt_set_powered_failed(struct hci_dev *hdev, int err)
{
	struct pending_cmd *cmd;
	u8 status;

	cmd = mgmt_pending_find(MGMT_OP_SET_POWERED, hdev);
	if (!cmd)
		return -ENOENT;

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

	err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);

	mgmt_pending_remove(cmd);

	return err;
}

3926
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3927
{
3928
	struct cmd_lookup match = { NULL, hdev };
3929 3930
	bool changed = false;
	int err = 0;
3931

3932 3933 3934 3935 3936 3937 3938
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3939

3940
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3941
			     &match);
3942

3943 3944
	if (changed)
		err = new_settings(hdev, match.sk);
3945

3946 3947 3948
	if (match.sk)
		sock_put(match.sk);

3949
	return err;
3950
}
3951

3952
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3953
{
3954
	struct pending_cmd *cmd;
3955 3956
	bool changed = false;
	int err = 0;
3957

3958 3959 3960 3961 3962 3963 3964
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3965

3966
	cmd = mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
3967

3968
	if (changed)
3969
		err = new_settings(hdev, cmd ? cmd->sk : NULL);
3970

3971
	return err;
3972
}
3973

3974
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3975
{
3976 3977
	u8 mgmt_err = mgmt_status(status);

3978
	if (scan & SCAN_PAGE)
3979
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3980
				     cmd_status_rsp, &mgmt_err);
3981 3982

	if (scan & SCAN_INQUIRY)
3983
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3984
				     cmd_status_rsp, &mgmt_err);
3985 3986 3987 3988

	return 0;
}

3989 3990
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3991
{
3992
	struct mgmt_ev_new_link_key ev;
3993

3994
	memset(&ev, 0, sizeof(ev));
3995

3996
	ev.store_hint = persistent;
3997
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3998
	ev.key.addr.type = BDADDR_BREDR;
3999
	ev.key.type = key->type;
4000
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
4001
	ev.key.pin_len = key->pin_len;
4002

4003
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
4004
}
4005

4006 4007 4008 4009 4010 4011 4012 4013
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
4014
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
4015 4016 4017 4018 4019 4020 4021 4022 4023 4024
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

4025 4026
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
4027 4028
}

4029
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4030 4031
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
4032
{
4033 4034 4035
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
4036

4037
	bacpy(&ev->addr.bdaddr, bdaddr);
4038
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4039

4040
	ev->flags = __cpu_to_le32(flags);
4041

4042 4043
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
4044
					  name, name_len);
4045 4046

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
4047
		eir_len = eir_append_data(ev->eir, eir_len,
4048
					  EIR_CLASS_OF_DEV, dev_class, 3);
4049

4050
	ev->eir_len = cpu_to_le16(eir_len);
4051 4052

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
4053
			  sizeof(*ev) + eir_len, NULL);
4054 4055
}

4056 4057
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
4058
	struct mgmt_cp_disconnect *cp = cmd->param;
4059
	struct sock **sk = data;
4060
	struct mgmt_rp_disconnect rp;
4061

4062 4063
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4064

4065
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
4066
		     sizeof(rp));
4067 4068 4069 4070

	*sk = cmd->sk;
	sock_hold(*sk);

4071
	mgmt_pending_remove(cmd);
4072 4073
}

4074
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
4075
{
4076
	struct hci_dev *hdev = data;
4077 4078
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
4079 4080

	memset(&rp, 0, sizeof(rp));
4081 4082
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
4083

4084 4085
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

4086
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
4087 4088 4089 4090

	mgmt_pending_remove(cmd);
}

4091
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
4092
			     u8 link_type, u8 addr_type, u8 reason)
4093
{
4094
	struct mgmt_ev_device_disconnected ev;
4095 4096 4097
	struct sock *sk = NULL;
	int err;

4098
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
4099

4100 4101 4102
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
4103

4104
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
4105
			 sk);
4106 4107

	if (sk)
4108
		sock_put(sk);
4109

4110
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
4111
			     hdev);
4112

4113 4114 4115
	return err;
}

4116
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
4117
			   u8 link_type, u8 addr_type, u8 status)
4118
{
4119
	struct mgmt_rp_disconnect rp;
4120 4121 4122
	struct pending_cmd *cmd;
	int err;

4123 4124 4125
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

4126
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
4127 4128 4129
	if (!cmd)
		return -ENOENT;

4130
	bacpy(&rp.addr.bdaddr, bdaddr);
4131
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4132

4133
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
4134
			   mgmt_status(status), &rp, sizeof(rp));
4135

4136
	mgmt_pending_remove(cmd);
4137 4138

	return err;
4139
}
4140

4141
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4142
			u8 addr_type, u8 status)
4143 4144 4145
{
	struct mgmt_ev_connect_failed ev;

4146
	bacpy(&ev.addr.bdaddr, bdaddr);
4147
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4148
	ev.status = mgmt_status(status);
4149

4150
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
4151
}
4152

4153
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
4154 4155 4156
{
	struct mgmt_ev_pin_code_request ev;

4157
	bacpy(&ev.addr.bdaddr, bdaddr);
4158
	ev.addr.type = BDADDR_BREDR;
4159
	ev.secure = secure;
4160

4161
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
4162
			  NULL);
4163 4164
}

4165
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4166
				 u8 status)
4167 4168
{
	struct pending_cmd *cmd;
4169
	struct mgmt_rp_pin_code_reply rp;
4170 4171
	int err;

4172
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
4173 4174 4175
	if (!cmd)
		return -ENOENT;

4176
	bacpy(&rp.addr.bdaddr, bdaddr);
4177
	rp.addr.type = BDADDR_BREDR;
4178

4179
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
4180
			   mgmt_status(status), &rp, sizeof(rp));
4181

4182
	mgmt_pending_remove(cmd);
4183 4184 4185 4186

	return err;
}

4187
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4188
				     u8 status)
4189 4190
{
	struct pending_cmd *cmd;
4191
	struct mgmt_rp_pin_code_reply rp;
4192 4193
	int err;

4194
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
4195 4196 4197
	if (!cmd)
		return -ENOENT;

4198
	bacpy(&rp.addr.bdaddr, bdaddr);
4199
	rp.addr.type = BDADDR_BREDR;
4200

4201
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
4202
			   mgmt_status(status), &rp, sizeof(rp));
4203

4204
	mgmt_pending_remove(cmd);
4205 4206 4207

	return err;
}
4208

4209
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4210 4211
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
4212 4213 4214
{
	struct mgmt_ev_user_confirm_request ev;

4215
	BT_DBG("%s", hdev->name);
4216

4217
	bacpy(&ev.addr.bdaddr, bdaddr);
4218
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4219
	ev.confirm_hint = confirm_hint;
4220
	ev.value = value;
4221

4222
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
4223
			  NULL);
4224 4225
}

4226
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
4227
			      u8 link_type, u8 addr_type)
4228 4229 4230 4231 4232
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

4233
	bacpy(&ev.addr.bdaddr, bdaddr);
4234
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4235 4236

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
4237
			  NULL);
4238 4239
}

4240
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4241 4242
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
4243 4244 4245 4246 4247
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

4248
	cmd = mgmt_pending_find(opcode, hdev);
4249 4250 4251
	if (!cmd)
		return -ENOENT;

4252
	bacpy(&rp.addr.bdaddr, bdaddr);
4253
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
4254
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
4255
			   &rp, sizeof(rp));
4256

4257
	mgmt_pending_remove(cmd);
4258 4259 4260 4261

	return err;
}

4262
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4263
				     u8 link_type, u8 addr_type, u8 status)
4264
{
4265
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4266
					  status, MGMT_OP_USER_CONFIRM_REPLY);
4267 4268
}

4269
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4270
					 u8 link_type, u8 addr_type, u8 status)
4271
{
4272
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4273 4274
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
4275
}
4276

4277
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4278
				     u8 link_type, u8 addr_type, u8 status)
4279
{
4280
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4281
					  status, MGMT_OP_USER_PASSKEY_REPLY);
4282 4283
}

4284
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
4285
					 u8 link_type, u8 addr_type, u8 status)
4286
{
4287
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
4288 4289
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
4290 4291
}

4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305 4306 4307
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

4308
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4309
		     u8 addr_type, u8 status)
4310 4311 4312
{
	struct mgmt_ev_auth_failed ev;

4313
	bacpy(&ev.addr.bdaddr, bdaddr);
4314
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
4315
	ev.status = mgmt_status(status);
4316

4317
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
4318
}
4319

4320 4321 4322
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
4323 4324
	bool changed = false;
	int err = 0;
4325 4326 4327 4328

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
4329
				     cmd_status_rsp, &mgmt_err);
4330 4331 4332
		return 0;
	}

4333 4334 4335 4336 4337 4338 4339 4340
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

4341
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
4342
			     &match);
4343

4344 4345
	if (changed)
		err = new_settings(hdev, match.sk);
4346 4347 4348 4349 4350 4351 4352

	if (match.sk)
		sock_put(match.sk);

	return err;
}

4353
static void clear_eir(struct hci_request *req)
4354
{
4355
	struct hci_dev *hdev = req->hdev;
4356 4357
	struct hci_cp_write_eir cp;

4358
	if (!lmp_ext_inq_capable(hdev))
4359
		return;
4360

4361 4362
	memset(hdev->eir, 0, sizeof(hdev->eir));

4363 4364
	memset(&cp, 0, sizeof(cp));

4365
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
4366 4367
}

4368
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
4369 4370
{
	struct cmd_lookup match = { NULL, hdev };
4371
	struct hci_request req;
4372 4373
	bool changed = false;
	int err = 0;
4374 4375 4376

	if (status) {
		u8 mgmt_err = mgmt_status(status);
4377 4378

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
4379
						 &hdev->dev_flags))
4380 4381
			err = new_settings(hdev, NULL);

4382 4383
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
4384 4385 4386 4387 4388 4389 4390 4391 4392 4393

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
4394 4395 4396 4397
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

4398 4399
	if (changed)
		err = new_settings(hdev, match.sk);
4400

4401
	if (match.sk)
4402 4403
		sock_put(match.sk);

4404 4405
	hci_req_init(&req, hdev);

4406
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
4407
		update_eir(&req);
4408
	else
4409 4410 4411
		clear_eir(&req);

	hci_req_run(&req, NULL);
4412

4413 4414 4415
	return err;
}

4416
static void sk_lookup(struct pending_cmd *cmd, void *data)
4417 4418 4419 4420 4421 4422 4423 4424 4425
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

4426
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
4427
				   u8 status)
4428
{
4429 4430
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
4431

4432 4433 4434
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
4435 4436

	if (!status)
4437 4438
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
4439 4440 4441

	if (match.sk)
		sock_put(match.sk);
4442 4443 4444 4445

	return err;
}

4446
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
4447 4448
{
	struct mgmt_cp_set_local_name ev;
4449
	struct pending_cmd *cmd;
4450

4451 4452
	if (status)
		return 0;
4453 4454 4455

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
4456
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
4457

4458
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
4459 4460
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
4461

4462 4463 4464 4465 4466
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
		if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev))
			return 0;
4467
	}
4468

4469 4470
	return mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			  cmd ? cmd->sk : NULL);
4471
}
4472

4473
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
4474
					    u8 *randomizer, u8 status)
4475 4476 4477 4478
{
	struct pending_cmd *cmd;
	int err;

4479
	BT_DBG("%s status %u", hdev->name, status);
4480

4481
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
4482 4483 4484 4485
	if (!cmd)
		return -ENOENT;

	if (status) {
4486 4487
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
4488 4489 4490 4491 4492 4493
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

4494
		err = cmd_complete(cmd->sk, hdev->id,
4495 4496
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
4497 4498 4499 4500 4501 4502
	}

	mgmt_pending_remove(cmd);

	return err;
}
4503

4504
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4505 4506
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
4507
{
4508 4509
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
4510
	size_t ev_size;
4511

4512 4513 4514
	if (!hci_discovery_active(hdev))
		return -EPERM;

4515 4516
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
4517 4518
		return -EINVAL;

4519 4520
	memset(buf, 0, sizeof(buf));

4521
	bacpy(&ev->addr.bdaddr, bdaddr);
4522
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4523
	ev->rssi = rssi;
4524
	if (cfm_name)
4525
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
4526
	if (!ssp)
4527
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
4528

4529
	if (eir_len > 0)
4530
		memcpy(ev->eir, eir, eir_len);
4531

4532 4533
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
4534
					  dev_class, 3);
4535

4536
	ev->eir_len = cpu_to_le16(eir_len);
4537
	ev_size = sizeof(*ev) + eir_len;
4538

4539
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
4540
}
4541

4542
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
4543
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
4544
{
4545 4546 4547
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
4548

4549
	ev = (struct mgmt_ev_device_found *) buf;
4550

4551 4552 4553
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
4554
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
4555 4556 4557
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
4558
				  name_len);
4559

4560
	ev->eir_len = cpu_to_le16(eir_len);
4561

4562
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
4563
			  sizeof(*ev) + eir_len, NULL);
4564
}
4565

4566
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
4567
{
4568
	struct mgmt_ev_discovering ev;
4569 4570
	struct pending_cmd *cmd;

4571 4572
	BT_DBG("%s discovering %u", hdev->name, discovering);

4573
	if (discovering)
4574
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
4575
	else
4576
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
4577 4578

	if (cmd != NULL) {
4579 4580
		u8 type = hdev->discovery.type;

4581 4582
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
4583 4584 4585
		mgmt_pending_remove(cmd);
	}

4586 4587 4588 4589 4590
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
4591
}
4592

4593
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4594 4595 4596 4597
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

4598
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
4599

4600 4601
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4602

4603
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
4604
			  cmd ? cmd->sk : NULL);
4605 4606
}

4607
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
4608 4609 4610 4611
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

4612
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
4613

4614 4615
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
4616

4617
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
4618
			  cmd ? cmd->sk : NULL);
4619
}