mgmt.c 63.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
/*
   BlueZ - Bluetooth protocol stack for Linux
   Copyright (C) 2010  Nokia Corporation

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

25
#include <linux/kernel.h>
26
#include <linux/uaccess.h>
27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36 37
#define MGMT_VERSION	0
#define MGMT_REVISION	1

A
Andre Guedes 已提交
38 39
#define INQUIRY_LEN_BREDR 0x08 /* TGAP(100) */

40 41
#define SERVICE_CACHE_TIMEOUT (5 * 1000)

42 43
struct pending_cmd {
	struct list_head list;
44
	u16 opcode;
45
	int index;
46
	void *param;
47
	struct sock *sk;
48
	void *user_data;
49 50
};

51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

124
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
125 126 127 128
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
129
	int err;
130

131
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
132 133 134 135 136 137 138 139

	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_STATUS);
140
	hdr->index = cpu_to_le16(index);
141 142 143 144 145 146
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
	put_unaligned_le16(cmd, &ev->opcode);

147 148
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
149 150
		kfree_skb(skb);

151
	return err;
152 153
}

154 155
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, void *rp,
								size_t rp_len)
156 157 158 159
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
160
	int err;
161 162 163

	BT_DBG("sock %p", sk);

164
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_ATOMIC);
165 166 167 168 169
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

170
	hdr->opcode = cpu_to_le16(MGMT_EV_CMD_COMPLETE);
171
	hdr->index = cpu_to_le16(index);
172
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
173

174 175
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
	put_unaligned_le16(cmd, &ev->opcode);
176 177 178

	if (rp)
		memcpy(ev->data, rp, rp_len);
179

180 181
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
182 183
		kfree_skb(skb);

184
	return err;;
185 186
}

187 188 189 190 191 192 193 194 195
static int read_version(struct sock *sk)
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
	put_unaligned_le16(MGMT_REVISION, &rp.revision);

196 197
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, &rp,
								sizeof(rp));
198 199
}

200 201 202 203
static int read_index_list(struct sock *sk)
{
	struct mgmt_rp_read_index_list *rp;
	struct list_head *p;
204
	struct hci_dev *d;
205
	size_t rp_len;
206
	u16 count;
207
	int i, err;
208 209 210 211 212 213 214 215 216 217

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each(p, &hci_dev_list) {
		count++;
	}

218 219 220
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
221
		read_unlock(&hci_dev_list_lock);
222
		return -ENOMEM;
223
	}
224 225 226 227

	put_unaligned_le16(count, &rp->num_controllers);

	i = 0;
228
	list_for_each_entry(d, &hci_dev_list, list) {
229
		if (test_and_clear_bit(HCI_AUTO_OFF, &d->flags))
230
			cancel_delayed_work(&d->power_off);
231 232 233 234

		if (test_bit(HCI_SETUP, &d->flags))
			continue;

235 236 237 238 239 240
		put_unaligned_le16(d->id, &rp->index[i++]);
		BT_DBG("Added hci%u", d->id);
	}

	read_unlock(&hci_dev_list_lock);

241 242
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, rp,
									rp_len);
243

244 245 246
	kfree(rp);

	return err;
247 248
}

249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_FAST_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
	settings |= MGMT_SETTING_PAIRABLE;

	if (hdev->features[6] & LMP_SIMPLE_PAIR)
		settings |= MGMT_SETTING_SSP;

	if (!(hdev->features[4] & LMP_NO_BREDR)) {
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

	if (hdev->features[4] & LMP_LE)
		settings |= MGMT_SETTING_LE;

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	if (test_bit(HCI_UP, &hdev->flags))
		settings |= MGMT_SETTING_POWERED;
	else
		return settings;

	if (test_bit(HCI_PSCAN, &hdev->flags))
		settings |= MGMT_SETTING_CONNECTABLE;

	if (test_bit(HCI_ISCAN, &hdev->flags))
		settings |= MGMT_SETTING_DISCOVERABLE;

	if (test_bit(HCI_PAIRABLE, &hdev->flags))
		settings |= MGMT_SETTING_PAIRABLE;

	if (!(hdev->features[4] & LMP_NO_BREDR))
		settings |= MGMT_SETTING_BREDR;

	if (hdev->extfeatures[0] & LMP_HOST_LE)
		settings |= MGMT_SETTING_LE;

	if (test_bit(HCI_AUTH, &hdev->flags))
		settings |= MGMT_SETTING_LINK_SECURITY;

	if (hdev->ssp_mode > 0)
		settings |= MGMT_SETTING_SSP;

	return settings;
}

306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478
#define EIR_FLAGS		0x01 /* flags */
#define EIR_UUID16_SOME		0x02 /* 16-bit UUID, more available */
#define EIR_UUID16_ALL		0x03 /* 16-bit UUID, all listed */
#define EIR_UUID32_SOME		0x04 /* 32-bit UUID, more available */
#define EIR_UUID32_ALL		0x05 /* 32-bit UUID, all listed */
#define EIR_UUID128_SOME	0x06 /* 128-bit UUID, more available */
#define EIR_UUID128_ALL		0x07 /* 128-bit UUID, all listed */
#define EIR_NAME_SHORT		0x08 /* shortened local name */
#define EIR_NAME_COMPLETE	0x09 /* complete local name */
#define EIR_TX_POWER		0x0A /* transmit power level */
#define EIR_DEVICE_ID		0x10 /* device ID */

#define PNP_INFO_SVCLASS_ID		0x1200

static u8 bluetooth_base_uuid[] = {
			0xFB, 0x34, 0x9B, 0x5F, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u16 get_uuid16(u8 *uuid128)
{
	u32 val;
	int i;

	for (i = 0; i < 12; i++) {
		if (bluetooth_base_uuid[i] != uuid128[i])
			return 0;
	}

	memcpy(&val, &uuid128[12], 4);

	val = le32_to_cpu(val);
	if (val > 0xffff)
		return 0;

	return (u16) val;
}

static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	u16 eir_len = 0;
	u16 uuid16_list[HCI_MAX_EIR_LENGTH / sizeof(u16)];
	int i, truncated = 0;
	struct bt_uuid *uuid;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		eir_len += (name_len + 2);
		ptr += (name_len + 2);
	}

	memset(uuid16_list, 0, sizeof(uuid16_list));

	/* Group all UUID16 types */
	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		uuid16 = get_uuid16(uuid->uuid);
		if (uuid16 == 0)
			return;

		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		/* Stop if not enough space to put next UUID */
		if (eir_len + 2 + sizeof(u16) > HCI_MAX_EIR_LENGTH) {
			truncated = 1;
			break;
		}

		/* Check for duplicates */
		for (i = 0; uuid16_list[i] != 0; i++)
			if (uuid16_list[i] == uuid16)
				break;

		if (uuid16_list[i] == 0) {
			uuid16_list[i] = uuid16;
			eir_len += sizeof(u16);
		}
	}

	if (uuid16_list[0] != 0) {
		u8 *length = ptr;

		/* EIR Data type */
		ptr[1] = truncated ? EIR_UUID16_SOME : EIR_UUID16_ALL;

		ptr += 2;
		eir_len += 2;

		for (i = 0; uuid16_list[i] != 0; i++) {
			*ptr++ = (uuid16_list[i] & 0x00ff);
			*ptr++ = (uuid16_list[i] & 0xff00) >> 8;
		}

		/* EIR Data length */
		*length = (i * sizeof(u16)) + 1;
	}
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

	if (!(hdev->features[6] & LMP_EXT_INQ))
		return 0;

	if (hdev->ssp_mode == 0)
		return 0;

	if (test_bit(HCI_SERVICE_CACHE, &hdev->flags))
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];

	BT_DBG("%s", hdev->name);

	if (test_bit(HCI_SERVICE_CACHE, &hdev->flags))
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
}

479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
							service_cache.work);

	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->flags))
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

static void mgmt_init_hdev(struct hci_dev *hdev)
{
	if (!test_and_set_bit(HCI_MGMT, &hdev->flags))
		INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->flags))
		schedule_delayed_work(&hdev->service_cache,
				msecs_to_jiffies(SERVICE_CACHE_TIMEOUT));
}

505
static int read_controller_info(struct sock *sk, u16 index)
506
{
507
	struct mgmt_rp_read_info rp;
508
	struct hci_dev *hdev;
509

510
	BT_DBG("sock %p hci%u", sk, index);
511

512
	hdev = hci_dev_get(index);
513
	if (!hdev)
514 515
		return cmd_status(sk, index, MGMT_OP_READ_INFO,
						MGMT_STATUS_INVALID_PARAMS);
516

517 518
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->flags))
		cancel_delayed_work_sync(&hdev->power_off);
519

520
	hci_dev_lock(hdev);
521

522 523
	if (test_and_clear_bit(HCI_PI_MGMT_INIT, &hci_pi(sk)->flags))
		mgmt_init_hdev(hdev);
524

525 526
	memset(&rp, 0, sizeof(rp));

527
	bacpy(&rp.bdaddr, &hdev->bdaddr);
528

529
	rp.version = hdev->hci_ver;
530

531 532 533 534
	put_unaligned_le16(hdev->manufacturer, &rp.manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
535

536
	memcpy(rp.dev_class, hdev->dev_class, 3);
537

538 539
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));

540
	hci_dev_unlock(hdev);
541
	hci_dev_put(hdev);
542

543
	return cmd_complete(sk, index, MGMT_OP_READ_INFO, &rp, sizeof(rp));
544 545
}

546 547 548
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
549
	kfree(cmd->param);
550 551 552
	kfree(cmd);
}

553
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
554 555
							struct hci_dev *hdev,
							void *data, u16 len)
556 557 558 559 560
{
	struct pending_cmd *cmd;

	cmd = kmalloc(sizeof(*cmd), GFP_ATOMIC);
	if (!cmd)
561
		return NULL;
562 563

	cmd->opcode = opcode;
564
	cmd->index = hdev->id;
565

566 567
	cmd->param = kmalloc(len, GFP_ATOMIC);
	if (!cmd->param) {
568
		kfree(cmd);
569
		return NULL;
570 571
	}

572 573
	if (data)
		memcpy(cmd->param, data, len);
574 575 576 577

	cmd->sk = sk;
	sock_hold(sk);

578
	list_add(&cmd->list, &hdev->mgmt_pending);
579

580
	return cmd;
581 582
}

583
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
584 585 586 587 588
				void (*cb)(struct pending_cmd *cmd, void *data),
				void *data)
{
	struct list_head *p, *n;

589
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
590 591 592 593
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

594
		if (opcode > 0 && cmd->opcode != opcode)
595 596 597 598 599 600
			continue;

		cb(cmd, data);
	}
}

601
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
602
{
603
	struct pending_cmd *cmd;
604

605
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
606 607
		if (cmd->opcode == opcode)
			return cmd;
608 609 610 611 612
	}

	return NULL;
}

613
static void mgmt_pending_remove(struct pending_cmd *cmd)
614 615 616 617 618
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

619
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
620
{
621
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
622

623
	return cmd_complete(sk, hdev->id, opcode, &settings, sizeof(settings));
624 625
}

626
static int set_powered(struct sock *sk, u16 index, unsigned char *data, u16 len)
627
{
628
	struct mgmt_mode *cp;
629
	struct hci_dev *hdev;
630 631
	struct pending_cmd *cmd;
	int err, up;
632 633 634

	cp = (void *) data;

635
	BT_DBG("request for hci%u", index);
636

637
	if (len != sizeof(*cp))
638 639
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
640

641
	hdev = hci_dev_get(index);
642
	if (!hdev)
643 644
		return cmd_status(sk, index, MGMT_OP_SET_POWERED,
						MGMT_STATUS_INVALID_PARAMS);
645

646
	hci_dev_lock(hdev);
647 648

	up = test_bit(HCI_UP, &hdev->flags);
649
	if ((cp->val && up) || (!cp->val && !up)) {
650
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
651 652 653
		goto failed;
	}

654
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
655 656
		err = cmd_status(sk, index, MGMT_OP_SET_POWERED,
							MGMT_STATUS_BUSY);
657 658 659
		goto failed;
	}

660
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
661 662
	if (!cmd) {
		err = -ENOMEM;
663
		goto failed;
664
	}
665

666
	if (cp->val)
667
		schedule_work(&hdev->power_on);
668
	else
669
		schedule_work(&hdev->power_off.work);
670

671
	err = 0;
672 673

failed:
674
	hci_dev_unlock(hdev);
675
	hci_dev_put(hdev);
676
	return err;
677 678
}

679 680
static int set_discoverable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
681
{
682
	struct mgmt_cp_set_discoverable *cp;
683
	struct hci_dev *hdev;
684
	struct pending_cmd *cmd;
685 686 687 688 689
	u8 scan;
	int err;

	cp = (void *) data;

690
	BT_DBG("request for hci%u", index);
691

692
	if (len != sizeof(*cp))
693 694
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
695

696
	hdev = hci_dev_get(index);
697
	if (!hdev)
698 699
		return cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_INVALID_PARAMS);
700

701
	hci_dev_lock(hdev);
702 703

	if (!test_bit(HCI_UP, &hdev->flags)) {
704 705
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
						MGMT_STATUS_NOT_POWERED);
706 707 708
		goto failed;
	}

709 710
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
711 712
		err = cmd_status(sk, index, MGMT_OP_SET_DISCOVERABLE,
							MGMT_STATUS_BUSY);
713 714 715
		goto failed;
	}

716
	if (cp->val == test_bit(HCI_ISCAN, &hdev->flags) &&
717
					test_bit(HCI_PSCAN, &hdev->flags)) {
718
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
719 720 721
		goto failed;
	}

722
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
723 724
	if (!cmd) {
		err = -ENOMEM;
725
		goto failed;
726
	}
727 728 729

	scan = SCAN_PAGE;

730
	if (cp->val)
731
		scan |= SCAN_INQUIRY;
732
	else
733
		cancel_delayed_work(&hdev->discov_off);
734 735 736

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
737
		mgmt_pending_remove(cmd);
738

739 740 741
	if (cp->val)
		hdev->discov_timeout = get_unaligned_le16(&cp->timeout);

742
failed:
743
	hci_dev_unlock(hdev);
744 745 746 747 748
	hci_dev_put(hdev);

	return err;
}

749 750
static int set_connectable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
751
{
752
	struct mgmt_mode *cp;
753
	struct hci_dev *hdev;
754
	struct pending_cmd *cmd;
755 756 757 758 759
	u8 scan;
	int err;

	cp = (void *) data;

760
	BT_DBG("request for hci%u", index);
761

762
	if (len != sizeof(*cp))
763 764
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
765

766
	hdev = hci_dev_get(index);
767
	if (!hdev)
768 769
		return cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_INVALID_PARAMS);
770

771
	hci_dev_lock(hdev);
772 773

	if (!test_bit(HCI_UP, &hdev->flags)) {
774 775
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
						MGMT_STATUS_NOT_POWERED);
776 777 778
		goto failed;
	}

779 780
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
			mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
781 782
		err = cmd_status(sk, index, MGMT_OP_SET_CONNECTABLE,
							MGMT_STATUS_BUSY);
783 784 785
		goto failed;
	}

786
	if (cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
787
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
788 789 790
		goto failed;
	}

791
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
792 793
	if (!cmd) {
		err = -ENOMEM;
794
		goto failed;
795
	}
796

797
	if (cp->val)
798 799 800 801 802 803
		scan = SCAN_PAGE;
	else
		scan = 0;

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
804
		mgmt_pending_remove(cmd);
805 806

failed:
807
	hci_dev_unlock(hdev);
808 809 810 811 812
	hci_dev_put(hdev);

	return err;
}

813 814
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data,
					u16 data_len, struct sock *skip_sk)
815 816 817 818 819 820 821 822 823 824 825 826
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_ATOMIC);
	if (!skb)
		return -ENOMEM;

	bt_cb(skb)->channel = HCI_CHANNEL_CONTROL;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
827 828 829 830
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
		hdr->index = cpu_to_le16(MGMT_INDEX_NONE);
831 832
	hdr->len = cpu_to_le16(data_len);

833 834
	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);
835 836 837 838 839 840 841

	hci_send_to_sock(NULL, skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

842 843
static int set_pairable(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
844
{
845
	struct mgmt_mode *cp;
846
	struct hci_dev *hdev;
847
	__le32 ev;
848 849 850 851
	int err;

	cp = (void *) data;

852
	BT_DBG("request for hci%u", index);
853

854
	if (len != sizeof(*cp))
855 856
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
857

858
	hdev = hci_dev_get(index);
859
	if (!hdev)
860 861
		return cmd_status(sk, index, MGMT_OP_SET_PAIRABLE,
						MGMT_STATUS_INVALID_PARAMS);
862

863
	hci_dev_lock(hdev);
864 865 866 867 868 869

	if (cp->val)
		set_bit(HCI_PAIRABLE, &hdev->flags);
	else
		clear_bit(HCI_PAIRABLE, &hdev->flags);

870
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
871 872 873
	if (err < 0)
		goto failed;

874
	ev = cpu_to_le32(get_current_settings(hdev));
875

876
	err = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), sk);
877 878

failed:
879
	hci_dev_unlock(hdev);
880 881 882 883 884
	hci_dev_put(hdev);

	return err;
}

885
static int add_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
886 887 888 889 890 891 892 893
{
	struct mgmt_cp_add_uuid *cp;
	struct hci_dev *hdev;
	struct bt_uuid *uuid;
	int err;

	cp = (void *) data;

894
	BT_DBG("request for hci%u", index);
895

896
	if (len != sizeof(*cp))
897 898
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
899

900
	hdev = hci_dev_get(index);
901
	if (!hdev)
902 903
		return cmd_status(sk, index, MGMT_OP_ADD_UUID,
						MGMT_STATUS_INVALID_PARAMS);
904

905
	hci_dev_lock(hdev);
906 907 908 909 910 911 912 913

	uuid = kmalloc(sizeof(*uuid), GFP_ATOMIC);
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
914
	uuid->svc_hint = cp->svc_hint;
915 916 917

	list_add(&uuid->list, &hdev->uuids);

918 919 920 921
	err = update_class(hdev);
	if (err < 0)
		goto failed;

922 923 924 925
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

926
	err = cmd_complete(sk, index, MGMT_OP_ADD_UUID, NULL, 0);
927 928

failed:
929
	hci_dev_unlock(hdev);
930 931 932 933 934
	hci_dev_put(hdev);

	return err;
}

935
static int remove_uuid(struct sock *sk, u16 index, unsigned char *data, u16 len)
936 937
{
	struct list_head *p, *n;
938
	struct mgmt_cp_remove_uuid *cp;
939 940 941 942 943 944
	struct hci_dev *hdev;
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

	cp = (void *) data;

945
	BT_DBG("request for hci%u", index);
946

947
	if (len != sizeof(*cp))
948 949
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
950

951
	hdev = hci_dev_get(index);
952
	if (!hdev)
953 954
		return cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
955

956
	hci_dev_lock(hdev);
957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975

	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
		goto unlock;
	}

	found = 0;

	list_for_each_safe(p, n, &hdev->uuids) {
		struct bt_uuid *match = list_entry(p, struct bt_uuid, list);

		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
		found++;
	}

	if (found == 0) {
976 977
		err = cmd_status(sk, index, MGMT_OP_REMOVE_UUID,
						MGMT_STATUS_INVALID_PARAMS);
978 979 980
		goto unlock;
	}

981 982 983 984
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

985 986 987 988
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

989
	err = cmd_complete(sk, index, MGMT_OP_REMOVE_UUID, NULL, 0);
990 991

unlock:
992
	hci_dev_unlock(hdev);
993 994 995 996 997
	hci_dev_put(hdev);

	return err;
}

998 999
static int set_dev_class(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1000 1001 1002 1003 1004 1005 1006
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_dev_class *cp;
	int err;

	cp = (void *) data;

1007
	BT_DBG("request for hci%u", index);
1008

1009
	if (len != sizeof(*cp))
1010 1011
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1012

1013
	hdev = hci_dev_get(index);
1014
	if (!hdev)
1015 1016
		return cmd_status(sk, index, MGMT_OP_SET_DEV_CLASS,
						MGMT_STATUS_INVALID_PARAMS);
1017

1018
	hci_dev_lock(hdev);
1019 1020 1021 1022

	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1023 1024 1025 1026
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->flags)) {
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1027
		update_eir(hdev);
1028
	}
1029

1030 1031 1032
	err = update_class(hdev);

	if (err == 0)
1033
		err = cmd_complete(sk, index, MGMT_OP_SET_DEV_CLASS, NULL, 0);
1034

1035
	hci_dev_unlock(hdev);
1036 1037 1038 1039 1040
	hci_dev_put(hdev);

	return err;
}

1041 1042
static int load_link_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1043 1044
{
	struct hci_dev *hdev;
1045
	struct mgmt_cp_load_link_keys *cp;
1046
	u16 key_count, expected_len;
1047
	int i;
1048 1049

	cp = (void *) data;
1050 1051

	if (len < sizeof(*cp))
1052 1053
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1054

1055 1056
	key_count = get_unaligned_le16(&cp->key_count);

1057 1058
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1059
	if (expected_len != len) {
1060
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1061
							len, expected_len);
1062 1063
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1064 1065
	}

1066
	hdev = hci_dev_get(index);
1067
	if (!hdev)
1068 1069
		return cmd_status(sk, index, MGMT_OP_LOAD_LINK_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1070

1071
	BT_DBG("hci%u debug_keys %u key_count %u", index, cp->debug_keys,
1072 1073
								key_count);

1074
	hci_dev_lock(hdev);
1075 1076 1077 1078 1079 1080 1081 1082 1083 1084

	hci_link_keys_clear(hdev);

	set_bit(HCI_LINK_KEYS, &hdev->flags);

	if (cp->debug_keys)
		set_bit(HCI_DEBUG_KEYS, &hdev->flags);
	else
		clear_bit(HCI_DEBUG_KEYS, &hdev->flags);

1085
	for (i = 0; i < key_count; i++) {
1086
		struct mgmt_link_key_info *key = &cp->keys[i];
1087

1088
		hci_add_link_key(hdev, NULL, 0, &key->bdaddr, key->val, key->type,
1089 1090 1091
								key->pin_len);
	}

1092 1093
	cmd_complete(sk, index, MGMT_OP_LOAD_LINK_KEYS, NULL, 0);

1094
	hci_dev_unlock(hdev);
1095 1096
	hci_dev_put(hdev);

1097
	return 0;
1098 1099
}

1100 1101
static int remove_keys(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
1102 1103
{
	struct hci_dev *hdev;
1104
	struct mgmt_cp_remove_keys *cp;
1105 1106 1107
	struct mgmt_rp_remove_keys rp;
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1108 1109 1110 1111 1112
	struct hci_conn *conn;
	int err;

	cp = (void *) data;

1113
	if (len != sizeof(*cp))
1114 1115
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1116

1117
	hdev = hci_dev_get(index);
1118
	if (!hdev)
1119 1120
		return cmd_status(sk, index, MGMT_OP_REMOVE_KEYS,
						MGMT_STATUS_INVALID_PARAMS);
1121

1122
	hci_dev_lock(hdev);
1123

1124 1125
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
1126
	rp.status = MGMT_STATUS_FAILED;
1127

1128 1129
	err = hci_remove_link_key(hdev, &cp->bdaddr);
	if (err < 0) {
1130
		rp.status = MGMT_STATUS_NOT_PAIRED;
1131 1132 1133
		goto unlock;
	}

1134 1135 1136
	if (!test_bit(HCI_UP, &hdev->flags) || !cp->disconnect) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1137
		goto unlock;
1138
	}
1139 1140

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1141 1142 1143 1144 1145
	if (!conn) {
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
		goto unlock;
	}
1146

1147 1148 1149 1150
	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_KEYS, hdev, cp, sizeof(*cp));
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1151 1152
	}

1153 1154 1155 1156 1157 1158
	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1159
unlock:
1160
	if (err < 0)
1161 1162
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));
1163
	hci_dev_unlock(hdev);
1164 1165 1166 1167 1168
	hci_dev_put(hdev);

	return err;
}

1169
static int disconnect(struct sock *sk, u16 index, unsigned char *data, u16 len)
1170 1171 1172 1173
{
	struct hci_dev *hdev;
	struct mgmt_cp_disconnect *cp;
	struct hci_cp_disconnect dc;
1174
	struct pending_cmd *cmd;
1175 1176 1177 1178 1179 1180 1181
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1182
	if (len != sizeof(*cp))
1183 1184
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1185

1186
	hdev = hci_dev_get(index);
1187
	if (!hdev)
1188 1189
		return cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_INVALID_PARAMS);
1190

1191
	hci_dev_lock(hdev);
1192 1193

	if (!test_bit(HCI_UP, &hdev->flags)) {
1194 1195
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_POWERED);
1196 1197 1198
		goto failed;
	}

1199
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1200 1201
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
							MGMT_STATUS_BUSY);
1202 1203 1204 1205
		goto failed;
	}

	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
1206 1207 1208
	if (!conn)
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->bdaddr);

1209
	if (!conn) {
1210 1211
		err = cmd_status(sk, index, MGMT_OP_DISCONNECT,
						MGMT_STATUS_NOT_CONNECTED);
1212 1213 1214
		goto failed;
	}

1215
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1216 1217
	if (!cmd) {
		err = -ENOMEM;
1218
		goto failed;
1219
	}
1220 1221 1222 1223 1224 1225

	put_unaligned_le16(conn->handle, &dc.handle);
	dc.reason = 0x13; /* Remote User Terminated Connection */

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1226
		mgmt_pending_remove(cmd);
1227 1228

failed:
1229
	hci_dev_unlock(hdev);
1230 1231 1232 1233 1234
	hci_dev_put(hdev);

	return err;
}

1235
static u8 link_to_mgmt(u8 link_type, u8 addr_type)
1236 1237 1238
{
	switch (link_type) {
	case LE_LINK:
1239 1240 1241 1242 1243 1244 1245 1246
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
			return MGMT_ADDR_LE_PUBLIC;
		case ADDR_LE_DEV_RANDOM:
			return MGMT_ADDR_LE_RANDOM;
		default:
			return MGMT_ADDR_INVALID;
		}
1247 1248 1249 1250 1251 1252 1253
	case ACL_LINK:
		return MGMT_ADDR_BREDR;
	default:
		return MGMT_ADDR_INVALID;
	}
}

1254
static int get_connections(struct sock *sk, u16 index)
1255 1256 1257
{
	struct mgmt_rp_get_connections *rp;
	struct hci_dev *hdev;
1258
	struct hci_conn *c;
1259
	struct list_head *p;
1260
	size_t rp_len;
1261
	u16 count;
1262 1263 1264 1265
	int i, err;

	BT_DBG("");

1266
	hdev = hci_dev_get(index);
1267
	if (!hdev)
1268 1269
		return cmd_status(sk, index, MGMT_OP_GET_CONNECTIONS,
						MGMT_STATUS_INVALID_PARAMS);
1270

1271
	hci_dev_lock(hdev);
1272 1273 1274 1275 1276 1277

	count = 0;
	list_for_each(p, &hdev->conn_hash.list) {
		count++;
	}

1278
	rp_len = sizeof(*rp) + (count * sizeof(struct mgmt_addr_info));
1279 1280
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
1281 1282 1283 1284 1285 1286 1287
		err = -ENOMEM;
		goto unlock;
	}

	put_unaligned_le16(count, &rp->conn_count);

	i = 0;
1288 1289
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1290
		rp->addr[i].type = link_to_mgmt(c->type, c->dst_type);
1291 1292 1293 1294 1295 1296 1297
		if (rp->addr[i].type == MGMT_ADDR_INVALID)
			continue;
		i++;
	}

	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1298

1299
	err = cmd_complete(sk, index, MGMT_OP_GET_CONNECTIONS, rp, rp_len);
1300 1301

unlock:
1302
	kfree(rp);
1303
	hci_dev_unlock(hdev);
1304 1305 1306 1307
	hci_dev_put(hdev);
	return err;
}

1308 1309 1310 1311 1312 1313
static int send_pin_code_neg_reply(struct sock *sk, u16 index,
		struct hci_dev *hdev, struct mgmt_cp_pin_code_neg_reply *cp)
{
	struct pending_cmd *cmd;
	int err;

1314
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326
								sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY, sizeof(cp->bdaddr),
								&cp->bdaddr);
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1327 1328
static int pin_code_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1329 1330
{
	struct hci_dev *hdev;
1331
	struct hci_conn *conn;
1332
	struct mgmt_cp_pin_code_reply *cp;
1333
	struct mgmt_cp_pin_code_neg_reply ncp;
1334
	struct hci_cp_pin_code_reply reply;
1335
	struct pending_cmd *cmd;
1336 1337 1338 1339 1340 1341
	int err;

	BT_DBG("");

	cp = (void *) data;

1342
	if (len != sizeof(*cp))
1343 1344
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1345

1346
	hdev = hci_dev_get(index);
1347
	if (!hdev)
1348 1349
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_INVALID_PARAMS);
1350

1351
	hci_dev_lock(hdev);
1352 1353

	if (!test_bit(HCI_UP, &hdev->flags)) {
1354 1355
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_POWERED);
1356 1357 1358
		goto failed;
	}

1359 1360
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->bdaddr);
	if (!conn) {
1361 1362
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
						MGMT_STATUS_NOT_CONNECTED);
1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
		bacpy(&ncp.bdaddr, &cp->bdaddr);

		BT_ERR("PIN code is not 16 bytes long");

		err = send_pin_code_neg_reply(sk, index, hdev, &ncp);
		if (err >= 0)
			err = cmd_status(sk, index, MGMT_OP_PIN_CODE_REPLY,
1374
						MGMT_STATUS_INVALID_PARAMS);
1375 1376 1377 1378

		goto failed;
	}

1379
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1380 1381
	if (!cmd) {
		err = -ENOMEM;
1382
		goto failed;
1383
	}
1384 1385 1386

	bacpy(&reply.bdaddr, &cp->bdaddr);
	reply.pin_len = cp->pin_len;
1387
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1388 1389 1390

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1391
		mgmt_pending_remove(cmd);
1392 1393

failed:
1394
	hci_dev_unlock(hdev);
1395 1396 1397 1398 1399
	hci_dev_put(hdev);

	return err;
}

1400 1401
static int pin_code_neg_reply(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1402 1403 1404 1405 1406 1407 1408 1409 1410
{
	struct hci_dev *hdev;
	struct mgmt_cp_pin_code_neg_reply *cp;
	int err;

	BT_DBG("");

	cp = (void *) data;

1411 1412
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1413
						MGMT_STATUS_INVALID_PARAMS);
1414

1415
	hdev = hci_dev_get(index);
1416
	if (!hdev)
1417
		return cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1418
						MGMT_STATUS_INVALID_PARAMS);
1419

1420
	hci_dev_lock(hdev);
1421 1422

	if (!test_bit(HCI_UP, &hdev->flags)) {
1423
		err = cmd_status(sk, index, MGMT_OP_PIN_CODE_NEG_REPLY,
1424
						MGMT_STATUS_NOT_POWERED);
1425 1426 1427
		goto failed;
	}

1428
	err = send_pin_code_neg_reply(sk, index, hdev, cp);
1429 1430

failed:
1431
	hci_dev_unlock(hdev);
1432 1433 1434 1435 1436
	hci_dev_put(hdev);

	return err;
}

1437 1438
static int set_io_capability(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
1439 1440 1441 1442 1443 1444 1445 1446
{
	struct hci_dev *hdev;
	struct mgmt_cp_set_io_capability *cp;

	BT_DBG("");

	cp = (void *) data;

1447
	if (len != sizeof(*cp))
1448 1449
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1450

1451
	hdev = hci_dev_get(index);
1452
	if (!hdev)
1453 1454
		return cmd_status(sk, index, MGMT_OP_SET_IO_CAPABILITY,
						MGMT_STATUS_INVALID_PARAMS);
1455

1456
	hci_dev_lock(hdev);
1457 1458 1459 1460

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1461
							hdev->io_capability);
1462

1463
	hci_dev_unlock(hdev);
1464 1465
	hci_dev_put(hdev);

1466
	return cmd_complete(sk, index, MGMT_OP_SET_IO_CAPABILITY, NULL, 0);
1467 1468
}

1469 1470 1471
static inline struct pending_cmd *find_pairing(struct hci_conn *conn)
{
	struct hci_dev *hdev = conn->hdev;
1472
	struct pending_cmd *cmd;
1473

1474
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1492 1493
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_mgmt(conn->type, conn->dst_type);
1494 1495
	rp.status = status;

1496
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, &rp, sizeof(rp));
1497 1498 1499 1500 1501 1502 1503 1504

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1505
	mgmt_pending_remove(cmd);
1506 1507 1508 1509 1510 1511 1512 1513 1514
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1515
	if (!cmd)
1516
		BT_DBG("Unable to find a pending command");
1517 1518
	else
		pairing_complete(cmd, status);
1519 1520
}

1521
static int pair_device(struct sock *sk, u16 index, unsigned char *data, u16 len)
1522 1523 1524
{
	struct hci_dev *hdev;
	struct mgmt_cp_pair_device *cp;
1525
	struct mgmt_rp_pair_device rp;
1526 1527 1528 1529 1530 1531 1532 1533 1534
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	cp = (void *) data;

1535
	if (len != sizeof(*cp))
1536 1537
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1538

1539
	hdev = hci_dev_get(index);
1540
	if (!hdev)
1541 1542
		return cmd_status(sk, index, MGMT_OP_PAIR_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
1543

1544
	hci_dev_lock(hdev);
1545

1546 1547
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
1548
		auth_type = HCI_AT_DEDICATED_BONDING;
1549
	else
1550 1551
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

1552 1553
	if (cp->addr.type == MGMT_ADDR_BREDR)
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr, sec_level,
1554 1555
								auth_type);
	else
1556
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr, sec_level,
1557 1558
								auth_type);

1559 1560 1561 1562
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1563
	if (IS_ERR(conn)) {
1564 1565 1566
		rp.status = -PTR_ERR(conn);
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1567 1568 1569 1570 1571
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
1572 1573 1574
		rp.status = EBUSY;
		err = cmd_complete(sk, index, MGMT_OP_PAIR_DEVICE,
							&rp, sizeof(rp));
1575 1576 1577
		goto unlock;
	}

1578
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
1579 1580 1581 1582 1583 1584
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

1585
	/* For LE, just connecting isn't a proof that the pairing finished */
1586
	if (cp->addr.type == MGMT_ADDR_BREDR)
1587 1588
		conn->connect_cfm_cb = pairing_complete_cb;

1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
				hci_conn_security(conn, sec_level, auth_type))
		pairing_complete(cmd, 0);

	err = 0;

unlock:
1601
	hci_dev_unlock(hdev);
1602 1603 1604 1605 1606
	hci_dev_put(hdev);

	return err;
}

1607 1608
static int user_pairing_resp(struct sock *sk, u16 index, bdaddr_t *bdaddr,
					u16 mgmt_op, u16 hci_op, __le32 passkey)
1609 1610 1611
{
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
1612
	struct hci_conn *conn;
1613 1614
	int err;

1615
	hdev = hci_dev_get(index);
1616
	if (!hdev)
1617 1618
		return cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_INVALID_PARAMS);
1619

1620
	hci_dev_lock(hdev);
1621

1622
	if (!test_bit(HCI_UP, &hdev->flags)) {
1623 1624
		err = cmd_status(sk, index, mgmt_op, MGMT_STATUS_NOT_POWERED);
		goto done;
1625 1626
	}

1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645
	/*
	 * Check for an existing ACL link, if present pair via
	 * HCI commands.
	 *
	 * If no ACL link is present, check for an LE link and if
	 * present, pair via the SMP engine.
	 *
	 * If neither ACL nor LE links are present, fail with error.
	 */
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	if (!conn) {
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
		if (!conn) {
			err = cmd_status(sk, index, mgmt_op,
						MGMT_STATUS_NOT_CONNECTED);
			goto done;
		}

		/* Continue with pairing via SMP */
1646 1647 1648 1649 1650 1651 1652 1653
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_SUCCESS);
		else
			err = cmd_status(sk, index, mgmt_op,
							MGMT_STATUS_FAILED);
1654 1655 1656 1657

		goto done;
	}

1658
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
1659 1660
	if (!cmd) {
		err = -ENOMEM;
1661
		goto done;
1662 1663
	}

1664
	/* Continue with pairing via HCI */
1665 1666 1667 1668 1669 1670 1671 1672 1673
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

1674 1675
	if (err < 0)
		mgmt_pending_remove(cmd);
1676

1677
done:
1678
	hci_dev_unlock(hdev);
1679 1680 1681 1682 1683
	hci_dev_put(hdev);

	return err;
}

1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701
static int user_confirm_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_confirm_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_REPLY,
			HCI_OP_USER_CONFIRM_REPLY, 0);
}

static int user_confirm_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
1702
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_CONFIRM_NEG_REPLY,
						MGMT_STATUS_INVALID_PARAMS);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_CONFIRM_NEG_REPLY,
			HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
}

1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745
static int user_passkey_reply(struct sock *sk, u16 index, void *data, u16 len)
{
	struct mgmt_cp_user_passkey_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_REPLY,
			HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
}

static int user_passkey_neg_reply(struct sock *sk, u16 index, void *data,
									u16 len)
{
	struct mgmt_cp_user_passkey_neg_reply *cp = (void *) data;

	BT_DBG("");

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_USER_PASSKEY_NEG_REPLY,
									EINVAL);

	return user_pairing_resp(sk, index, &cp->bdaddr,
			MGMT_OP_USER_PASSKEY_NEG_REPLY,
			HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
}

1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757
static int set_local_name(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct mgmt_cp_set_local_name *mgmt_cp = (void *) data;
	struct hci_cp_write_local_name hci_cp;
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

	if (len != sizeof(*mgmt_cp))
1758 1759
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1760 1761 1762

	hdev = hci_dev_get(index);
	if (!hdev)
1763 1764
		return cmd_status(sk, index, MGMT_OP_SET_LOCAL_NAME,
						MGMT_STATUS_INVALID_PARAMS);
1765

1766
	hci_dev_lock(hdev);
1767

1768
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(hci_cp.name, mgmt_cp->name, sizeof(hci_cp.name));
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(hci_cp),
								&hci_cp);
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1781
	hci_dev_unlock(hdev);
1782 1783 1784 1785 1786
	hci_dev_put(hdev);

	return err;
}

1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797
static int read_local_oob_data(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1798
						MGMT_STATUS_INVALID_PARAMS);
1799

1800
	hci_dev_lock(hdev);
1801 1802 1803

	if (!test_bit(HCI_UP, &hdev->flags)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1804
						MGMT_STATUS_NOT_POWERED);
1805 1806 1807 1808 1809
		goto unlock;
	}

	if (!(hdev->features[6] & LMP_SIMPLE_PAIR)) {
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
1810
						MGMT_STATUS_NOT_SUPPORTED);
1811 1812 1813
		goto unlock;
	}

1814
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
1815 1816
		err = cmd_status(sk, index, MGMT_OP_READ_LOCAL_OOB_DATA,
							MGMT_STATUS_BUSY);
1817 1818 1819
		goto unlock;
	}

1820
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
1821 1822 1823 1824 1825 1826 1827 1828 1829 1830
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
1831
	hci_dev_unlock(hdev);
1832 1833 1834 1835 1836
	hci_dev_put(hdev);

	return err;
}

1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847
static int add_remote_oob_data(struct sock *sk, u16 index, unsigned char *data,
									u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_add_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1848
						MGMT_STATUS_INVALID_PARAMS);
1849 1850 1851 1852

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
1853
						MGMT_STATUS_INVALID_PARAMS);
1854

1855
	hci_dev_lock(hdev);
1856 1857 1858 1859

	err = hci_add_remote_oob_data(hdev, &cp->bdaddr, cp->hash,
								cp->randomizer);
	if (err < 0)
1860 1861
		err = cmd_status(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_FAILED);
1862 1863 1864 1865
	else
		err = cmd_complete(sk, index, MGMT_OP_ADD_REMOTE_OOB_DATA, NULL,
									0);

1866
	hci_dev_unlock(hdev);
1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882
	hci_dev_put(hdev);

	return err;
}

static int remove_remote_oob_data(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
	struct mgmt_cp_remove_remote_oob_data *cp = (void *) data;
	int err;

	BT_DBG("hci%u ", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1883
						MGMT_STATUS_INVALID_PARAMS);
1884 1885 1886 1887

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1888
						MGMT_STATUS_INVALID_PARAMS);
1889

1890
	hci_dev_lock(hdev);
1891 1892 1893 1894

	err = hci_remove_remote_oob_data(hdev, &cp->bdaddr);
	if (err < 0)
		err = cmd_status(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
1895
						MGMT_STATUS_INVALID_PARAMS);
1896 1897 1898 1899
	else
		err = cmd_complete(sk, index, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
								NULL, 0);

1900
	hci_dev_unlock(hdev);
1901 1902 1903 1904 1905
	hci_dev_put(hdev);

	return err;
}

1906 1907
static int start_discovery(struct sock *sk, u16 index,
						unsigned char *data, u16 len)
1908
{
1909
	struct mgmt_cp_start_discovery *cp = (void *) data;
1910 1911 1912 1913 1914 1915
	struct pending_cmd *cmd;
	struct hci_dev *hdev;
	int err;

	BT_DBG("hci%u", index);

1916 1917 1918 1919
	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);

1920 1921
	hdev = hci_dev_get(index);
	if (!hdev)
1922 1923
		return cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1924

1925
	hci_dev_lock(hdev);
1926

1927
	if (!test_bit(HCI_UP, &hdev->flags)) {
1928 1929
		err = cmd_status(sk, index, MGMT_OP_START_DISCOVERY,
						MGMT_STATUS_NOT_POWERED);
1930 1931 1932
		goto failed;
	}

1933
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
1934 1935 1936 1937 1938
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
1939
	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
1940 1941 1942 1943
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1944
	hci_dev_unlock(hdev);
1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959
	hci_dev_put(hdev);

	return err;
}

static int stop_discovery(struct sock *sk, u16 index)
{
	struct hci_dev *hdev;
	struct pending_cmd *cmd;
	int err;

	BT_DBG("hci%u", index);

	hdev = hci_dev_get(index);
	if (!hdev)
1960 1961
		return cmd_status(sk, index, MGMT_OP_STOP_DISCOVERY,
						MGMT_STATUS_INVALID_PARAMS);
1962

1963
	hci_dev_lock(hdev);
1964

1965
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
1966 1967 1968 1969 1970
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1971
	err = hci_cancel_inquiry(hdev);
1972 1973 1974 1975
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
1976
	hci_dev_unlock(hdev);
1977 1978 1979 1980 1981
	hci_dev_put(hdev);

	return err;
}

1982 1983 1984 1985
static int block_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
1986
	struct mgmt_cp_block_device *cp = (void *) data;
1987 1988 1989 1990 1991 1992
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
1993
						MGMT_STATUS_INVALID_PARAMS);
1994 1995 1996 1997

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
1998
						MGMT_STATUS_INVALID_PARAMS);
1999

2000
	hci_dev_lock(hdev);
2001

2002 2003
	err = hci_blacklist_add(hdev, &cp->bdaddr);
	if (err < 0)
2004 2005
		err = cmd_status(sk, index, MGMT_OP_BLOCK_DEVICE,
							MGMT_STATUS_FAILED);
2006 2007 2008
	else
		err = cmd_complete(sk, index, MGMT_OP_BLOCK_DEVICE,
							NULL, 0);
2009

2010
	hci_dev_unlock(hdev);
2011 2012 2013 2014 2015 2016 2017 2018 2019
	hci_dev_put(hdev);

	return err;
}

static int unblock_device(struct sock *sk, u16 index, unsigned char *data,
								u16 len)
{
	struct hci_dev *hdev;
2020
	struct mgmt_cp_unblock_device *cp = (void *) data;
2021 2022 2023 2024 2025 2026
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2027
						MGMT_STATUS_INVALID_PARAMS);
2028 2029 2030 2031

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
2032
						MGMT_STATUS_INVALID_PARAMS);
2033

2034
	hci_dev_lock(hdev);
2035

2036 2037 2038
	err = hci_blacklist_del(hdev, &cp->bdaddr);

	if (err < 0)
2039 2040
		err = cmd_status(sk, index, MGMT_OP_UNBLOCK_DEVICE,
						MGMT_STATUS_INVALID_PARAMS);
2041 2042 2043
	else
		err = cmd_complete(sk, index, MGMT_OP_UNBLOCK_DEVICE,
								NULL, 0);
2044

2045
	hci_dev_unlock(hdev);
2046 2047 2048 2049 2050
	hci_dev_put(hdev);

	return err;
}

2051 2052 2053 2054
static int set_fast_connectable(struct sock *sk, u16 index,
					unsigned char *data, u16 len)
{
	struct hci_dev *hdev;
2055
	struct mgmt_mode *cp = (void *) data;
2056 2057 2058 2059 2060 2061 2062 2063
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

	BT_DBG("hci%u", index);

	if (len != sizeof(*cp))
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2064
						MGMT_STATUS_INVALID_PARAMS);
2065 2066 2067 2068

	hdev = hci_dev_get(index);
	if (!hdev)
		return cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2069
						MGMT_STATUS_INVALID_PARAMS);
2070 2071 2072

	hci_dev_lock(hdev);

2073
	if (cp->val) {
2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086
		type = PAGE_SCAN_TYPE_INTERLACED;
		acp.interval = 0x0024;	/* 22.5 msec page scan interval */
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
		acp.interval = 0x0800;	/* default 1.28 sec page scan */
	}

	acp.window = 0x0012;	/* default 11.25 msec page scan window */

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY,
						sizeof(acp), &acp);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2087
							MGMT_STATUS_FAILED);
2088 2089 2090 2091 2092 2093
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
		err = cmd_status(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
2094
							MGMT_STATUS_FAILED);
2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106
		goto done;
	}

	err = cmd_complete(sk, index, MGMT_OP_SET_FAST_CONNECTABLE,
							NULL, 0);
done:
	hci_dev_unlock(hdev);
	hci_dev_put(hdev);

	return err;
}

2107 2108 2109 2110
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
	unsigned char *buf;
	struct mgmt_hdr *hdr;
2111
	u16 opcode, index, len;
2112 2113 2114 2115 2116 2117 2118
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2119
	buf = kmalloc(msglen, GFP_KERNEL);
2120 2121 2122 2123 2124 2125 2126 2127 2128 2129
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

	hdr = (struct mgmt_hdr *) buf;
	opcode = get_unaligned_le16(&hdr->opcode);
2130
	index = get_unaligned_le16(&hdr->index);
2131 2132 2133 2134 2135 2136 2137 2138
	len = get_unaligned_le16(&hdr->len);

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

	switch (opcode) {
2139 2140 2141
	case MGMT_OP_READ_VERSION:
		err = read_version(sk);
		break;
2142 2143 2144
	case MGMT_OP_READ_INDEX_LIST:
		err = read_index_list(sk);
		break;
2145
	case MGMT_OP_READ_INFO:
2146
		err = read_controller_info(sk, index);
2147
		break;
2148
	case MGMT_OP_SET_POWERED:
2149
		err = set_powered(sk, index, buf + sizeof(*hdr), len);
2150
		break;
2151
	case MGMT_OP_SET_DISCOVERABLE:
2152
		err = set_discoverable(sk, index, buf + sizeof(*hdr), len);
2153
		break;
2154
	case MGMT_OP_SET_CONNECTABLE:
2155
		err = set_connectable(sk, index, buf + sizeof(*hdr), len);
2156
		break;
2157 2158 2159 2160
	case MGMT_OP_SET_FAST_CONNECTABLE:
		err = set_fast_connectable(sk, index, buf + sizeof(*hdr),
								len);
		break;
2161
	case MGMT_OP_SET_PAIRABLE:
2162
		err = set_pairable(sk, index, buf + sizeof(*hdr), len);
2163
		break;
2164
	case MGMT_OP_ADD_UUID:
2165
		err = add_uuid(sk, index, buf + sizeof(*hdr), len);
2166 2167
		break;
	case MGMT_OP_REMOVE_UUID:
2168
		err = remove_uuid(sk, index, buf + sizeof(*hdr), len);
2169
		break;
2170
	case MGMT_OP_SET_DEV_CLASS:
2171
		err = set_dev_class(sk, index, buf + sizeof(*hdr), len);
2172
		break;
2173 2174
	case MGMT_OP_LOAD_LINK_KEYS:
		err = load_link_keys(sk, index, buf + sizeof(*hdr), len);
2175
		break;
2176 2177
	case MGMT_OP_REMOVE_KEYS:
		err = remove_keys(sk, index, buf + sizeof(*hdr), len);
2178
		break;
2179
	case MGMT_OP_DISCONNECT:
2180
		err = disconnect(sk, index, buf + sizeof(*hdr), len);
2181
		break;
2182
	case MGMT_OP_GET_CONNECTIONS:
2183
		err = get_connections(sk, index);
2184
		break;
2185
	case MGMT_OP_PIN_CODE_REPLY:
2186
		err = pin_code_reply(sk, index, buf + sizeof(*hdr), len);
2187 2188
		break;
	case MGMT_OP_PIN_CODE_NEG_REPLY:
2189
		err = pin_code_neg_reply(sk, index, buf + sizeof(*hdr), len);
2190
		break;
2191
	case MGMT_OP_SET_IO_CAPABILITY:
2192
		err = set_io_capability(sk, index, buf + sizeof(*hdr), len);
2193
		break;
2194
	case MGMT_OP_PAIR_DEVICE:
2195
		err = pair_device(sk, index, buf + sizeof(*hdr), len);
2196
		break;
2197
	case MGMT_OP_USER_CONFIRM_REPLY:
2198
		err = user_confirm_reply(sk, index, buf + sizeof(*hdr), len);
2199 2200
		break;
	case MGMT_OP_USER_CONFIRM_NEG_REPLY:
2201 2202
		err = user_confirm_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2203
		break;
2204 2205 2206 2207 2208 2209
	case MGMT_OP_USER_PASSKEY_REPLY:
		err = user_passkey_reply(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_USER_PASSKEY_NEG_REPLY:
		err = user_passkey_neg_reply(sk, index, buf + sizeof(*hdr),
									len);
2210
		break;
2211 2212 2213
	case MGMT_OP_SET_LOCAL_NAME:
		err = set_local_name(sk, index, buf + sizeof(*hdr), len);
		break;
2214 2215 2216
	case MGMT_OP_READ_LOCAL_OOB_DATA:
		err = read_local_oob_data(sk, index);
		break;
2217 2218 2219 2220 2221 2222 2223
	case MGMT_OP_ADD_REMOTE_OOB_DATA:
		err = add_remote_oob_data(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_REMOVE_REMOTE_OOB_DATA:
		err = remove_remote_oob_data(sk, index, buf + sizeof(*hdr),
									len);
		break;
2224
	case MGMT_OP_START_DISCOVERY:
2225
		err = start_discovery(sk, index, buf + sizeof(*hdr), len);
2226 2227 2228 2229
		break;
	case MGMT_OP_STOP_DISCOVERY:
		err = stop_discovery(sk, index);
		break;
2230 2231 2232 2233 2234 2235
	case MGMT_OP_BLOCK_DEVICE:
		err = block_device(sk, index, buf + sizeof(*hdr), len);
		break;
	case MGMT_OP_UNBLOCK_DEVICE:
		err = unblock_device(sk, index, buf + sizeof(*hdr), len);
		break;
2236 2237
	default:
		BT_DBG("Unknown op %u", opcode);
2238 2239
		err = cmd_status(sk, index, opcode,
						MGMT_STATUS_UNKNOWN_COMMAND);
2240 2241 2242
		break;
	}

2243 2244 2245
	if (err < 0)
		goto done;

2246 2247 2248 2249 2250 2251
	err = msglen;

done:
	kfree(buf);
	return err;
}
2252

2253 2254 2255 2256 2257 2258 2259 2260
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2261
int mgmt_index_added(struct hci_dev *hdev)
2262
{
2263
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2264 2265
}

2266
int mgmt_index_removed(struct hci_dev *hdev)
2267
{
2268 2269
	u8 status = ENODEV;

2270
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2271

2272
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2273 2274
}

2275
struct cmd_lookup {
2276
	u8 val;
2277
	struct sock *sk;
2278
	struct hci_dev *hdev;
2279 2280
};

2281
static void settings_rsp(struct pending_cmd *cmd, void *data)
2282
{
2283
	struct cmd_lookup *match = data;
2284

2285
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
2286 2287 2288 2289 2290 2291 2292 2293 2294

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
2295
}
2296

2297
int mgmt_powered(struct hci_dev *hdev, u8 powered)
2298
{
2299 2300
	struct cmd_lookup match = { powered, NULL, hdev };
	__le32 ev;
2301
	int ret;
2302

2303
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
2304

2305 2306
	if (!powered) {
		u8 status = ENETDOWN;
2307
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2308 2309
	}

2310
	ev = cpu_to_le32(get_current_settings(hdev));
2311

2312 2313
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
								match.sk);
2314 2315 2316 2317 2318

	if (match.sk)
		sock_put(match.sk);

	return ret;
2319
}
2320

2321
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
2322
{
2323 2324
	struct cmd_lookup match = { discoverable, NULL, hdev };
	__le32 ev;
2325 2326
	int ret;

2327
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp, &match);
2328

2329
	ev = cpu_to_le32(get_current_settings(hdev));
2330

2331
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev),
2332
								match.sk);
2333 2334 2335 2336 2337
	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2338

2339
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
2340
{
2341 2342
	__le32 ev;
	struct cmd_lookup match = { connectable, NULL, hdev };
2343 2344
	int ret;

2345 2346
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
								&match);
2347

2348
	ev = cpu_to_le32(get_current_settings(hdev));
2349

2350
	ret = mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), match.sk);
2351 2352 2353 2354 2355 2356

	if (match.sk)
		sock_put(match.sk);

	return ret;
}
2357

2358
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
2359
{
2360 2361
	u8 mgmt_err = mgmt_status(status);

2362
	if (scan & SCAN_PAGE)
2363
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
2364
						cmd_status_rsp, &mgmt_err);
2365 2366

	if (scan & SCAN_INQUIRY)
2367
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
2368
						cmd_status_rsp, &mgmt_err);
2369 2370 2371 2372

	return 0;
}

2373 2374
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
								u8 persistent)
2375
{
2376
	struct mgmt_ev_new_link_key ev;
2377

2378
	memset(&ev, 0, sizeof(ev));
2379

2380 2381 2382 2383 2384
	ev.store_hint = persistent;
	bacpy(&ev.key.bdaddr, &key->bdaddr);
	ev.key.type = key->type;
	memcpy(ev.key.val, key->val, 16);
	ev.key.pin_len = key->pin_len;
2385

2386
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
2387
}
2388

2389 2390
int mgmt_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
								u8 addr_type)
2391
{
2392
	struct mgmt_addr_info ev;
2393 2394

	bacpy(&ev.bdaddr, bdaddr);
2395
	ev.type = link_to_mgmt(link_type, addr_type);
2396

2397
	return mgmt_event(MGMT_EV_CONNECTED, hdev, &ev, sizeof(ev), NULL);
2398 2399
}

2400 2401
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
2402
	struct mgmt_cp_disconnect *cp = cmd->param;
2403
	struct sock **sk = data;
2404
	struct mgmt_rp_disconnect rp;
2405

2406
	bacpy(&rp.bdaddr, &cp->bdaddr);
2407
	rp.status = 0;
2408

2409
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, &rp, sizeof(rp));
2410 2411 2412 2413

	*sk = cmd->sk;
	sock_hold(*sk);

2414
	mgmt_pending_remove(cmd);
2415 2416
}

2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433
static void remove_keys_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;
	struct mgmt_cp_remove_keys *cp = cmd->param;
	struct mgmt_rp_remove_keys rp;

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.bdaddr, &cp->bdaddr);
	if (status != NULL)
		rp.status = *status;

	cmd_complete(cmd->sk, cmd->index, MGMT_OP_REMOVE_KEYS, &rp,
								sizeof(rp));

	mgmt_pending_remove(cmd);
}

2434 2435
int mgmt_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
								u8 addr_type)
2436
{
2437
	struct mgmt_addr_info ev;
2438 2439 2440
	struct sock *sk = NULL;
	int err;

2441
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
2442 2443

	bacpy(&ev.bdaddr, bdaddr);
2444
	ev.type = link_to_mgmt(link_type, addr_type);
2445

2446
	err = mgmt_event(MGMT_EV_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
2447 2448 2449 2450

	if (sk)
		sock_put(sk);

2451 2452
	mgmt_pending_foreach(MGMT_OP_REMOVE_KEYS, hdev, remove_keys_rsp, NULL);

2453 2454 2455
	return err;
}

2456
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2457 2458
{
	struct pending_cmd *cmd;
2459
	u8 mgmt_err = mgmt_status(status);
2460 2461
	int err;

2462
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
2463 2464 2465
	if (!cmd)
		return -ENOENT;

2466 2467 2468 2469 2470 2471 2472 2473 2474 2475
	if (bdaddr) {
		struct mgmt_rp_disconnect rp;

		bacpy(&rp.bdaddr, bdaddr);
		rp.status = status;

		err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
							&rp, sizeof(rp));
	} else
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_DISCONNECT,
2476
								mgmt_err);
2477

2478
	mgmt_pending_remove(cmd);
2479 2480

	return err;
2481
}
2482

2483 2484
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
						u8 addr_type, u8 status)
2485 2486 2487
{
	struct mgmt_ev_connect_failed ev;

2488
	bacpy(&ev.addr.bdaddr, bdaddr);
2489
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2490
	ev.status = mgmt_status(status);
2491

2492
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
2493
}
2494

2495
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
2496 2497 2498 2499
{
	struct mgmt_ev_pin_code_request ev;

	bacpy(&ev.bdaddr, bdaddr);
2500
	ev.secure = secure;
2501

2502
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
2503
									NULL);
2504 2505
}

2506 2507
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2508 2509
{
	struct pending_cmd *cmd;
2510
	struct mgmt_rp_pin_code_reply rp;
2511 2512
	int err;

2513
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
2514 2515 2516
	if (!cmd)
		return -ENOENT;

2517
	bacpy(&rp.bdaddr, bdaddr);
2518
	rp.status = mgmt_status(status);
2519

2520
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY, &rp,
2521
								sizeof(rp));
2522

2523
	mgmt_pending_remove(cmd);
2524 2525 2526 2527

	return err;
}

2528 2529
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2530 2531
{
	struct pending_cmd *cmd;
2532
	struct mgmt_rp_pin_code_reply rp;
2533 2534
	int err;

2535
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
2536 2537 2538
	if (!cmd)
		return -ENOENT;

2539
	bacpy(&rp.bdaddr, bdaddr);
2540
	rp.status = mgmt_status(status);
2541

2542
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY, &rp,
2543
								sizeof(rp));
2544

2545
	mgmt_pending_remove(cmd);
2546 2547 2548

	return err;
}
2549

2550 2551
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
						__le32 value, u8 confirm_hint)
2552 2553 2554
{
	struct mgmt_ev_user_confirm_request ev;

2555
	BT_DBG("%s", hdev->name);
2556 2557

	bacpy(&ev.bdaddr, bdaddr);
2558
	ev.confirm_hint = confirm_hint;
2559 2560
	put_unaligned_le32(value, &ev.value);

2561
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
2562
									NULL);
2563 2564
}

2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr)
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.bdaddr, bdaddr);

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
									NULL);
}

2577
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
2578
							u8 status, u8 opcode)
2579 2580 2581 2582 2583
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

2584
	cmd = mgmt_pending_find(opcode, hdev);
2585 2586 2587 2588
	if (!cmd)
		return -ENOENT;

	bacpy(&rp.bdaddr, bdaddr);
2589
	rp.status = mgmt_status(status);
2590
	err = cmd_complete(cmd->sk, hdev->id, opcode, &rp, sizeof(rp));
2591

2592
	mgmt_pending_remove(cmd);
2593 2594 2595 2596

	return err;
}

2597 2598
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
2599
{
2600
	return user_pairing_resp_complete(hdev, bdaddr, status,
2601 2602 2603
						MGMT_OP_USER_CONFIRM_REPLY);
}

2604 2605
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
2606
{
2607
	return user_pairing_resp_complete(hdev, bdaddr, status,
2608 2609
					MGMT_OP_USER_CONFIRM_NEG_REPLY);
}
2610

2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
								u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
						MGMT_OP_USER_PASSKEY_REPLY);
}

int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev,
						bdaddr_t *bdaddr, u8 status)
{
	return user_pairing_resp_complete(hdev, bdaddr, status,
					MGMT_OP_USER_PASSKEY_NEG_REPLY);
}

2625
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 status)
2626 2627 2628 2629
{
	struct mgmt_ev_auth_failed ev;

	bacpy(&ev.bdaddr, bdaddr);
2630
	ev.status = mgmt_status(status);
2631

2632
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
2633
}
2634

2635
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
2636 2637 2638 2639 2640 2641 2642 2643
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
	int err;

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2644
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2645 2646 2647 2648
	if (!cmd)
		goto send_event;

	if (status) {
2649
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
2650
							mgmt_status(status));
2651 2652 2653
		goto failed;
	}

2654
	update_eir(hdev);
2655

2656
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, &ev,
2657 2658 2659 2660 2661
								sizeof(ev));
	if (err < 0)
		goto failed;

send_event:
2662
	err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
2663 2664 2665 2666 2667 2668 2669
							cmd ? cmd->sk : NULL);

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
2670

2671 2672
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
						u8 *randomizer, u8 status)
2673 2674 2675 2676
{
	struct pending_cmd *cmd;
	int err;

2677
	BT_DBG("%s status %u", hdev->name, status);
2678

2679
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
2680 2681 2682 2683
	if (!cmd)
		return -ENOENT;

	if (status) {
2684
		err = cmd_status(cmd->sk, hdev->id,
2685 2686
						MGMT_OP_READ_LOCAL_OOB_DATA,
						mgmt_status(status));
2687 2688 2689 2690 2691 2692
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

2693 2694 2695
		err = cmd_complete(cmd->sk, hdev->id,
						MGMT_OP_READ_LOCAL_OOB_DATA,
						&rp, sizeof(rp));
2696 2697 2698 2699 2700 2701
	}

	mgmt_pending_remove(cmd);

	return err;
}
2702

2703 2704
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
				u8 addr_type, u8 *dev_class, s8 rssi, u8 *eir)
2705 2706 2707 2708 2709
{
	struct mgmt_ev_device_found ev;

	memset(&ev, 0, sizeof(ev));

2710
	bacpy(&ev.addr.bdaddr, bdaddr);
2711
	ev.addr.type = link_to_mgmt(link_type, addr_type);
2712 2713 2714 2715 2716
	ev.rssi = rssi;

	if (eir)
		memcpy(ev.eir, eir, sizeof(ev.eir));

2717 2718 2719
	if (dev_class)
		memcpy(ev.dev_class, dev_class, sizeof(ev.dev_class));

2720
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, &ev, sizeof(ev), NULL);
2721
}
2722

2723
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 *name)
2724 2725 2726 2727 2728 2729 2730 2731
{
	struct mgmt_ev_remote_name ev;

	memset(&ev, 0, sizeof(ev));

	bacpy(&ev.bdaddr, bdaddr);
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);

2732
	return mgmt_event(MGMT_EV_REMOTE_NAME, hdev, &ev, sizeof(ev), NULL);
2733
}
2734

2735
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
2736 2737 2738 2739
{
	struct pending_cmd *cmd;
	int err;

2740
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2741 2742 2743
	if (!cmd)
		return -ENOENT;

2744
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status));
2745 2746 2747 2748 2749
	mgmt_pending_remove(cmd);

	return err;
}

2750 2751 2752 2753 2754 2755 2756 2757 2758
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

2759
	err = cmd_status(cmd->sk, hdev->id, cmd->opcode, status);
2760 2761 2762 2763 2764
	mgmt_pending_remove(cmd);

	return err;
}

2765
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
2766
{
2767 2768 2769
	struct pending_cmd *cmd;

	if (discovering)
2770
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
2771
	else
2772
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
2773 2774

	if (cmd != NULL) {
2775
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, NULL, 0);
2776 2777 2778
		mgmt_pending_remove(cmd);
	}

2779
	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &discovering,
2780 2781
						sizeof(discovering), NULL);
}
2782

2783
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2784 2785 2786 2787
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

2788
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
2789 2790 2791

	bacpy(&ev.bdaddr, bdaddr);

2792 2793
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2794 2795
}

2796
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr)
2797 2798 2799 2800
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

2801
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
2802 2803 2804

	bacpy(&ev.bdaddr, bdaddr);

2805 2806
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
							cmd ? cmd->sk : NULL);
2807
}