mgmt.c 89.7 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31 32
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
#include <net/bluetooth/mgmt.h>
33
#include <net/bluetooth/smp.h>
34

35 36
bool enable_hs;

37
#define MGMT_VERSION	1
38
#define MGMT_REVISION	2
39

40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
	MGMT_OP_SET_PAIRABLE,
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
78
	MGMT_OP_SET_DEVICE_ID,
79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
102
	MGMT_EV_PASSKEY_NOTIFY,
103 104
};

105 106 107 108 109 110 111 112
/*
 * These LE scan and inquiry parameters were chosen according to LE General
 * Discovery Procedure specification.
 */
#define LE_SCAN_TYPE			0x01
#define LE_SCAN_WIN			0x12
#define LE_SCAN_INT			0x12
#define LE_SCAN_TIMEOUT_LE_ONLY		10240	/* TGAP(gen_disc_scan_min) */
113
#define LE_SCAN_TIMEOUT_BREDR_LE	5120	/* TGAP(100)/2 */
114

A
Andre Guedes 已提交
115
#define INQUIRY_LEN_BREDR		0x08	/* TGAP(100) */
116
#define INQUIRY_LEN_BREDR_LE		0x04	/* TGAP(100)/2 */
A
Andre Guedes 已提交
117

118
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
119

120 121 122
#define hdev_is_powered(hdev) (test_bit(HCI_UP, &hdev->flags) && \
				!test_bit(HCI_AUTO_OFF, &hdev->dev_flags))

123 124
struct pending_cmd {
	struct list_head list;
125
	u16 opcode;
126
	int index;
127
	void *param;
128
	struct sock *sk;
129
	void *user_data;
130 131
};

132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
	MGMT_STATUS_NOT_PAIRED,		/* PIN or Key Missing */
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

197 198 199 200 201
bool mgmt_valid_hdev(struct hci_dev *hdev)
{
	return hdev->dev_type == HCI_BREDR;
}

202 203 204 205 206 207 208 209
static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

210
static int cmd_status(struct sock *sk, u16 index, u16 cmd, u8 status)
211 212 213 214
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_status *ev;
215
	int err;
216

217
	BT_DBG("sock %p, index %u, cmd %u, status %u", sk, index, cmd, status);
218

219
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev), GFP_KERNEL);
220 221 222 223 224
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

225
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_STATUS);
226
	hdr->index = cpu_to_le16(index);
227 228 229 230
	hdr->len = cpu_to_le16(sizeof(*ev));

	ev = (void *) skb_put(skb, sizeof(*ev));
	ev->status = status;
231
	ev->opcode = cpu_to_le16(cmd);
232

233 234
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
235 236
		kfree_skb(skb);

237
	return err;
238 239
}

240
static int cmd_complete(struct sock *sk, u16 index, u16 cmd, u8 status,
241
			void *rp, size_t rp_len)
242 243 244 245
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;
	struct mgmt_ev_cmd_complete *ev;
246
	int err;
247 248 249

	BT_DBG("sock %p", sk);

250
	skb = alloc_skb(sizeof(*hdr) + sizeof(*ev) + rp_len, GFP_KERNEL);
251 252 253 254 255
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));

256
	hdr->opcode = __constant_cpu_to_le16(MGMT_EV_CMD_COMPLETE);
257
	hdr->index = cpu_to_le16(index);
258
	hdr->len = cpu_to_le16(sizeof(*ev) + rp_len);
259

260
	ev = (void *) skb_put(skb, sizeof(*ev) + rp_len);
261
	ev->opcode = cpu_to_le16(cmd);
262
	ev->status = status;
263 264 265

	if (rp)
		memcpy(ev->data, rp, rp_len);
266

267 268
	err = sock_queue_rcv_skb(sk, skb);
	if (err < 0)
269 270
		kfree_skb(skb);

271
	return err;
272 273
}

274 275
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
276 277 278 279 280 281
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

	rp.version = MGMT_VERSION;
282
	rp.revision = __constant_cpu_to_le16(MGMT_REVISION);
283

284
	return cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0, &rp,
285
			    sizeof(rp));
286 287
}

288 289
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
290 291
{
	struct mgmt_rp_read_commands *rp;
292 293
	const u16 num_commands = ARRAY_SIZE(mgmt_commands);
	const u16 num_events = ARRAY_SIZE(mgmt_events);
294
	__le16 *opcode;
295 296 297 298 299 300 301 302 303 304 305
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

306 307
	rp->num_commands = __constant_cpu_to_le16(num_commands);
	rp->num_events = __constant_cpu_to_le16(num_events);
308 309 310 311 312 313 314

	for (i = 0, opcode = rp->opcodes; i < num_commands; i++, opcode++)
		put_unaligned_le16(mgmt_commands[i], opcode);

	for (i = 0; i < num_events; i++, opcode++)
		put_unaligned_le16(mgmt_events[i], opcode);

315
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0, rp,
316
			   rp_size);
317 318 319 320 321
	kfree(rp);

	return err;
}

322 323
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
324 325
{
	struct mgmt_rp_read_index_list *rp;
326
	struct hci_dev *d;
327
	size_t rp_len;
328
	u16 count;
329
	int err;
330 331 332 333 334 335

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
336 337 338 339
	list_for_each_entry(d, &hci_dev_list, list) {
		if (!mgmt_valid_hdev(d))
			continue;

340 341 342
		count++;
	}

343 344 345
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
346
		read_unlock(&hci_dev_list_lock);
347
		return -ENOMEM;
348
	}
349

350
	count = 0;
351
	list_for_each_entry(d, &hci_dev_list, list) {
352
		if (test_bit(HCI_SETUP, &d->dev_flags))
353 354
			continue;

355 356 357
		if (!mgmt_valid_hdev(d))
			continue;

358
		rp->index[count++] = cpu_to_le16(d->id);
359 360 361
		BT_DBG("Added hci%u", d->id);
	}

362 363 364
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

365 366
	read_unlock(&hci_dev_list_lock);

367
	err = cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST, 0, rp,
368
			   rp_len);
369

370 371 372
	kfree(rp);

	return err;
373 374
}

375 376 377 378 379 380 381
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
	settings |= MGMT_SETTING_PAIRABLE;

382
	if (lmp_ssp_capable(hdev))
383 384
		settings |= MGMT_SETTING_SSP;

385
	if (lmp_bredr_capable(hdev)) {
386 387 388
		settings |= MGMT_SETTING_CONNECTABLE;
		settings |= MGMT_SETTING_FAST_CONNECTABLE;
		settings |= MGMT_SETTING_DISCOVERABLE;
389 390 391 392
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
	}

393 394 395
	if (enable_hs)
		settings |= MGMT_SETTING_HS;

396
	if (lmp_le_capable(hdev))
397
		settings |= MGMT_SETTING_LE;
398 399 400 401 402 403 404 405

	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

406
	if (hdev_is_powered(hdev))
407 408
		settings |= MGMT_SETTING_POWERED;

409
	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
410 411
		settings |= MGMT_SETTING_CONNECTABLE;

412
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
413 414
		settings |= MGMT_SETTING_DISCOVERABLE;

415
	if (test_bit(HCI_PAIRABLE, &hdev->dev_flags))
416 417
		settings |= MGMT_SETTING_PAIRABLE;

418
	if (lmp_bredr_capable(hdev))
419 420
		settings |= MGMT_SETTING_BREDR;

421
	if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags))
422 423
		settings |= MGMT_SETTING_LE;

424
	if (test_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
425 426
		settings |= MGMT_SETTING_LINK_SECURITY;

427
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
428 429
		settings |= MGMT_SETTING_SSP;

430 431 432
	if (test_bit(HCI_HS_ENABLED, &hdev->dev_flags))
		settings |= MGMT_SETTING_HS;

433 434 435
	return settings;
}

436 437
#define PNP_INFO_SVCLASS_ID		0x1200

438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479
static u8 *create_uuid16_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 4)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		u16 uuid16;

		if (uuid->size != 16)
			continue;

		uuid16 = get_unaligned_le16(&uuid->uuid[12]);
		if (uuid16 < 0x1100)
			continue;

		if (uuid16 == PNP_INFO_SVCLASS_ID)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID16_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u16) > len) {
			uuids_start[1] = EIR_UUID16_SOME;
			break;
		}

		*ptr++ = (uuid16 & 0x00ff);
		*ptr++ = (uuid16 & 0xff00) >> 8;
		uuids_start[0] += sizeof(uuid16);
	}

	return ptr;
}

480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512
static u8 *create_uuid32_list(struct hci_dev *hdev, u8 *data, ptrdiff_t len)
{
	u8 *ptr = data, *uuids_start = NULL;
	struct bt_uuid *uuid;

	if (len < 6)
		return ptr;

	list_for_each_entry(uuid, &hdev->uuids, list) {
		if (uuid->size != 32)
			continue;

		if (!uuids_start) {
			uuids_start = ptr;
			uuids_start[0] = 1;
			uuids_start[1] = EIR_UUID32_ALL;
			ptr += 2;
		}

		/* Stop if not enough space to put next UUID */
		if ((ptr - data) + sizeof(u32) > len) {
			uuids_start[1] = EIR_UUID32_SOME;
			break;
		}

		memcpy(ptr, &uuid->uuid[12], sizeof(u32));
		ptr += sizeof(u32);
		uuids_start[0] += sizeof(u32);
	}

	return ptr;
}

513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535
static void create_eir(struct hci_dev *hdev, u8 *data)
{
	u8 *ptr = data;
	size_t name_len;

	name_len = strlen(hdev->dev_name);

	if (name_len > 0) {
		/* EIR Data type */
		if (name_len > 48) {
			name_len = 48;
			ptr[1] = EIR_NAME_SHORT;
		} else
			ptr[1] = EIR_NAME_COMPLETE;

		/* EIR Data length */
		ptr[0] = name_len + 1;

		memcpy(ptr + 2, hdev->dev_name, name_len);

		ptr += (name_len + 2);
	}

536
	if (hdev->inq_tx_power != HCI_TX_POWER_INVALID) {
537 538 539 540 541 542 543
		ptr[0] = 2;
		ptr[1] = EIR_TX_POWER;
		ptr[2] = (u8) hdev->inq_tx_power;

		ptr += 3;
	}

544 545 546 547 548 549 550 551 552 553 554 555
	if (hdev->devid_source > 0) {
		ptr[0] = 9;
		ptr[1] = EIR_DEVICE_ID;

		put_unaligned_le16(hdev->devid_source, ptr + 2);
		put_unaligned_le16(hdev->devid_vendor, ptr + 4);
		put_unaligned_le16(hdev->devid_product, ptr + 6);
		put_unaligned_le16(hdev->devid_version, ptr + 8);

		ptr += 10;
	}

556
	ptr = create_uuid16_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
557
	ptr = create_uuid32_list(hdev, ptr, HCI_MAX_EIR_LENGTH - (ptr - data));
558 559 560 561 562 563
}

static int update_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

564
	if (!hdev_is_powered(hdev))
565 566
		return 0;

567
	if (!lmp_ext_inq_capable(hdev))
568 569
		return 0;

570
	if (!test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
571 572
		return 0;

573
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601
		return 0;

	memset(&cp, 0, sizeof(cp));

	create_eir(hdev, cp.data);

	if (memcmp(cp.data, hdev->eir, sizeof(cp.data)) == 0)
		return 0;

	memcpy(hdev->eir, cp.data, sizeof(cp.data));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

static u8 get_service_classes(struct hci_dev *hdev)
{
	struct bt_uuid *uuid;
	u8 val = 0;

	list_for_each_entry(uuid, &hdev->uuids, list)
		val |= uuid->svc_hint;

	return val;
}

static int update_class(struct hci_dev *hdev)
{
	u8 cod[3];
602
	int err;
603 604 605

	BT_DBG("%s", hdev->name);

606
	if (!hdev_is_powered(hdev))
607 608
		return 0;

609
	if (test_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
610 611 612 613 614 615 616 617 618
		return 0;

	cod[0] = hdev->minor_class;
	cod[1] = hdev->major_class;
	cod[2] = get_service_classes(hdev);

	if (memcmp(cod, hdev->dev_class, 3) == 0)
		return 0;

619 620 621 622 623
	err = hci_send_cmd(hdev, HCI_OP_WRITE_CLASS_OF_DEV, sizeof(cod), cod);
	if (err == 0)
		set_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

	return err;
624 625
}

626 627 628
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
629
					    service_cache.work);
630

631
	if (!test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags))
632 633 634 635 636 637 638 639 640 641
		return;

	hci_dev_lock(hdev);

	update_eir(hdev);
	update_class(hdev);

	hci_dev_unlock(hdev);
}

642
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
643
{
644
	if (test_and_set_bit(HCI_MGMT, &hdev->dev_flags))
645 646
		return;

647
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
648

649 650 651 652 653 654
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
	clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
655 656
}

657
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
658
				void *data, u16 data_len)
659
{
660
	struct mgmt_rp_read_info rp;
661

662
	BT_DBG("sock %p %s", sk, hdev->name);
663

664
	hci_dev_lock(hdev);
665

666 667
	memset(&rp, 0, sizeof(rp));

668
	bacpy(&rp.bdaddr, &hdev->bdaddr);
669

670
	rp.version = hdev->hci_ver;
671
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
672 673 674

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
675

676
	memcpy(rp.dev_class, hdev->dev_class, 3);
677

678
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
679
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
680

681
	hci_dev_unlock(hdev);
682

683
	return cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
684
			    sizeof(rp));
685 686
}

687 688 689
static void mgmt_pending_free(struct pending_cmd *cmd)
{
	sock_put(cmd->sk);
690
	kfree(cmd->param);
691 692 693
	kfree(cmd);
}

694
static struct pending_cmd *mgmt_pending_add(struct sock *sk, u16 opcode,
695 696
					    struct hci_dev *hdev, void *data,
					    u16 len)
697 698 699
{
	struct pending_cmd *cmd;

700
	cmd = kmalloc(sizeof(*cmd), GFP_KERNEL);
701
	if (!cmd)
702
		return NULL;
703 704

	cmd->opcode = opcode;
705
	cmd->index = hdev->id;
706

707
	cmd->param = kmalloc(len, GFP_KERNEL);
708
	if (!cmd->param) {
709
		kfree(cmd);
710
		return NULL;
711 712
	}

713 714
	if (data)
		memcpy(cmd->param, data, len);
715 716 717 718

	cmd->sk = sk;
	sock_hold(sk);

719
	list_add(&cmd->list, &hdev->mgmt_pending);
720

721
	return cmd;
722 723
}

724
static void mgmt_pending_foreach(u16 opcode, struct hci_dev *hdev,
725 726
				 void (*cb)(struct pending_cmd *cmd,
					    void *data),
727
				 void *data)
728 729 730
{
	struct list_head *p, *n;

731
	list_for_each_safe(p, n, &hdev->mgmt_pending) {
732 733 734 735
		struct pending_cmd *cmd;

		cmd = list_entry(p, struct pending_cmd, list);

736
		if (opcode > 0 && cmd->opcode != opcode)
737 738 739 740 741 742
			continue;

		cb(cmd, data);
	}
}

743
static struct pending_cmd *mgmt_pending_find(u16 opcode, struct hci_dev *hdev)
744
{
745
	struct pending_cmd *cmd;
746

747
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
748 749
		if (cmd->opcode == opcode)
			return cmd;
750 751 752 753 754
	}

	return NULL;
}

755
static void mgmt_pending_remove(struct pending_cmd *cmd)
756 757 758 759 760
{
	list_del(&cmd->list);
	mgmt_pending_free(cmd);
}

761
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
762
{
763
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
764

765
	return cmd_complete(sk, hdev->id, opcode, 0, &settings,
766
			    sizeof(settings));
767 768
}

769
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
770
		       u16 len)
771
{
772
	struct mgmt_mode *cp = data;
773
	struct pending_cmd *cmd;
774
	int err;
775

776
	BT_DBG("request for %s", hdev->name);
777

778 779 780 781
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				  MGMT_STATUS_INVALID_PARAMS);

782
	hci_dev_lock(hdev);
783

784 785 786 787
	if (test_and_clear_bit(HCI_AUTO_OFF, &hdev->dev_flags)) {
		cancel_delayed_work(&hdev->power_off);

		if (cp->val) {
788 789 790
			mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev,
					 data, len);
			err = mgmt_powered(hdev, 1);
791 792 793 794
			goto failed;
		}
	}

795
	if (!!cp->val == hdev_is_powered(hdev)) {
796
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
797 798 799
		goto failed;
	}

800
	if (mgmt_pending_find(MGMT_OP_SET_POWERED, hdev)) {
801
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
802
				 MGMT_STATUS_BUSY);
803 804 805
		goto failed;
	}

806
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
807 808
	if (!cmd) {
		err = -ENOMEM;
809
		goto failed;
810
	}
811

812
	if (cp->val)
813
		queue_work(hdev->req_workqueue, &hdev->power_on);
814
	else
815
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
816

817
	err = 0;
818 819

failed:
820
	hci_dev_unlock(hdev);
821
	return err;
822 823
}

824 825
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 data_len,
		      struct sock *skip_sk)
826 827 828 829
{
	struct sk_buff *skb;
	struct mgmt_hdr *hdr;

830
	skb = alloc_skb(sizeof(*hdr) + data_len, GFP_KERNEL);
831 832 833 834 835 836 837 838
	if (!skb)
		return -ENOMEM;

	hdr = (void *) skb_put(skb, sizeof(*hdr));
	hdr->opcode = cpu_to_le16(event);
	if (hdev)
		hdr->index = cpu_to_le16(hdev->id);
	else
839
		hdr->index = __constant_cpu_to_le16(MGMT_INDEX_NONE);
840 841 842 843 844
	hdr->len = cpu_to_le16(data_len);

	if (data)
		memcpy(skb_put(skb, data_len), data, data_len);

845 846 847
	/* Time stamp */
	__net_timestamp(skb);

848 849 850 851 852 853 854 855 856 857 858 859 860 861 862
	hci_send_to_control(skb, skip_sk);
	kfree_skb(skb);

	return 0;
}

static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
	__le32 ev;

	ev = cpu_to_le32(get_current_settings(hdev));

	return mgmt_event(MGMT_EV_NEW_SETTINGS, hdev, &ev, sizeof(ev), skip);
}

863
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
864
			    u16 len)
865
{
866
	struct mgmt_cp_set_discoverable *cp = data;
867
	struct pending_cmd *cmd;
868
	u16 timeout;
869 870 871
	u8 scan;
	int err;

872
	BT_DBG("request for %s", hdev->name);
873

874 875 876 877
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				 MGMT_STATUS_NOT_SUPPORTED);

878 879 880 881
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				  MGMT_STATUS_INVALID_PARAMS);

882
	timeout = __le16_to_cpu(cp->timeout);
883
	if (!cp->val && timeout > 0)
884
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
885
				  MGMT_STATUS_INVALID_PARAMS);
886

887
	hci_dev_lock(hdev);
888

889
	if (!hdev_is_powered(hdev) && timeout > 0) {
890
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
891
				 MGMT_STATUS_NOT_POWERED);
892 893 894
		goto failed;
	}

895
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
896
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
897
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
898
				 MGMT_STATUS_BUSY);
899 900 901
		goto failed;
	}

902
	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags)) {
903
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
904
				 MGMT_STATUS_REJECTED);
905 906 907 908
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
909 910 911 912 913 914 915
		bool changed = false;

		if (!!cp->val != test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
			change_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
			changed = true;
		}

916
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
917 918 919 920 921 922
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

923 924 925 926
		goto failed;
	}

	if (!!cp->val == test_bit(HCI_DISCOVERABLE, &hdev->dev_flags)) {
927 928 929 930 931 932 933 934 935 936 937
		if (hdev->discov_timeout > 0) {
			cancel_delayed_work(&hdev->discov_off);
			hdev->discov_timeout = 0;
		}

		if (cp->val && timeout > 0) {
			hdev->discov_timeout = timeout;
			queue_delayed_work(hdev->workqueue, &hdev->discov_off,
				msecs_to_jiffies(hdev->discov_timeout * 1000));
		}

938
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
939 940 941
		goto failed;
	}

942
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
943 944
	if (!cmd) {
		err = -ENOMEM;
945
		goto failed;
946
	}
947 948 949

	scan = SCAN_PAGE;

950
	if (cp->val)
951
		scan |= SCAN_INQUIRY;
952
	else
953
		cancel_delayed_work(&hdev->discov_off);
954 955 956

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
957
		mgmt_pending_remove(cmd);
958

959
	if (cp->val)
960
		hdev->discov_timeout = timeout;
961

962
failed:
963
	hci_dev_unlock(hdev);
964 965 966
	return err;
}

967
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
968
			   u16 len)
969
{
970
	struct mgmt_mode *cp = data;
971
	struct pending_cmd *cmd;
972 973 974
	u8 scan;
	int err;

975
	BT_DBG("request for %s", hdev->name);
976

977 978 979 980
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

981 982 983 984
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

985
	hci_dev_lock(hdev);
986

987
	if (!hdev_is_powered(hdev)) {
988 989 990 991 992
		bool changed = false;

		if (!!cp->val != test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;

993
		if (cp->val) {
994
			set_bit(HCI_CONNECTABLE, &hdev->dev_flags);
995
		} else {
996 997 998
			clear_bit(HCI_CONNECTABLE, &hdev->dev_flags);
			clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags);
		}
999

1000
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1001 1002 1003 1004 1005 1006
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1007 1008 1009
		goto failed;
	}

1010
	if (mgmt_pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
1011
	    mgmt_pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1012
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
1013
				 MGMT_STATUS_BUSY);
1014 1015 1016
		goto failed;
	}

1017
	if (!!cp->val == test_bit(HCI_PSCAN, &hdev->flags)) {
1018
		err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
1019 1020 1021
		goto failed;
	}

1022
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1023 1024
	if (!cmd) {
		err = -ENOMEM;
1025
		goto failed;
1026
	}
1027

1028
	if (cp->val) {
1029
		scan = SCAN_PAGE;
1030
	} else {
1031 1032
		scan = 0;

1033
		if (test_bit(HCI_ISCAN, &hdev->flags) &&
1034
		    hdev->discov_timeout > 0)
1035 1036 1037
			cancel_delayed_work(&hdev->discov_off);
	}

1038 1039
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	if (err < 0)
1040
		mgmt_pending_remove(cmd);
1041 1042

failed:
1043
	hci_dev_unlock(hdev);
1044 1045 1046
	return err;
}

1047
static int set_pairable(struct sock *sk, struct hci_dev *hdev, void *data,
1048
			u16 len)
1049
{
1050
	struct mgmt_mode *cp = data;
1051 1052
	int err;

1053
	BT_DBG("request for %s", hdev->name);
1054

1055 1056 1057 1058
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_PAIRABLE,
				  MGMT_STATUS_INVALID_PARAMS);

1059
	hci_dev_lock(hdev);
1060 1061

	if (cp->val)
1062
		set_bit(HCI_PAIRABLE, &hdev->dev_flags);
1063
	else
1064
		clear_bit(HCI_PAIRABLE, &hdev->dev_flags);
1065

1066
	err = send_settings_rsp(sk, MGMT_OP_SET_PAIRABLE, hdev);
1067 1068 1069
	if (err < 0)
		goto failed;

1070
	err = new_settings(hdev, sk);
1071 1072

failed:
1073
	hci_dev_unlock(hdev);
1074 1075 1076
	return err;
}

1077 1078
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1079 1080 1081
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1082
	u8 val;
1083 1084
	int err;

1085
	BT_DBG("request for %s", hdev->name);
1086

1087 1088 1089 1090
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_NOT_SUPPORTED);

1091 1092 1093 1094
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				  MGMT_STATUS_INVALID_PARAMS);

1095 1096
	hci_dev_lock(hdev);

1097
	if (!hdev_is_powered(hdev)) {
1098 1099 1100
		bool changed = false;

		if (!!cp->val != test_bit(HCI_LINK_SECURITY,
1101
					  &hdev->dev_flags)) {
1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112
			change_bit(HCI_LINK_SECURITY, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1113 1114 1115 1116
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1117
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
1118
				 MGMT_STATUS_BUSY);
1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1146
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1147 1148 1149
{
	struct mgmt_mode *cp = data;
	struct pending_cmd *cmd;
1150
	u8 val;
1151 1152
	int err;

1153
	BT_DBG("request for %s", hdev->name);
1154

1155 1156 1157
	if (!lmp_ssp_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_NOT_SUPPORTED);
1158

1159 1160 1161 1162
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				  MGMT_STATUS_INVALID_PARAMS);

1163
	hci_dev_lock(hdev);
1164

1165 1166
	val = !!cp->val;

1167
	if (!hdev_is_powered(hdev)) {
1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181
		bool changed = false;

		if (val != test_bit(HCI_SSP_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_SSP_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1182 1183 1184 1185
		goto failed;
	}

	if (mgmt_pending_find(MGMT_OP_SET_SSP, hdev)) {
1186 1187
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				 MGMT_STATUS_BUSY);
1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212
		goto failed;
	}

	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1213
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1214 1215 1216
{
	struct mgmt_mode *cp = data;

1217
	BT_DBG("request for %s", hdev->name);
1218

1219 1220
	if (!enable_hs)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
1221
				  MGMT_STATUS_NOT_SUPPORTED);
1222

1223 1224 1225 1226
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				  MGMT_STATUS_INVALID_PARAMS);

1227 1228 1229 1230 1231
	if (cp->val)
		set_bit(HCI_HS_ENABLED, &hdev->dev_flags);
	else
		clear_bit(HCI_HS_ENABLED, &hdev->dev_flags);

1232
	return send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
1233 1234
}

1235
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1236 1237 1238 1239 1240
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
	struct pending_cmd *cmd;
	int err;
1241
	u8 val, enabled;
1242

1243
	BT_DBG("request for %s", hdev->name);
1244

1245 1246 1247
	if (!lmp_le_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_NOT_SUPPORTED);
1248

1249 1250 1251 1252
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				  MGMT_STATUS_INVALID_PARAMS);

1253
	hci_dev_lock(hdev);
1254 1255

	val = !!cp->val;
1256
	enabled = lmp_host_le_capable(hdev);
1257

1258
	if (!hdev_is_powered(hdev) || val == enabled) {
1259 1260 1261 1262 1263 1264 1265 1266 1267
		bool changed = false;

		if (val != test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			change_bit(HCI_LE_ENABLED, &hdev->dev_flags);
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1268
			goto unlock;
1269 1270 1271 1272

		if (changed)
			err = new_settings(hdev, sk);

1273
		goto unlock;
1274 1275 1276
	}

	if (mgmt_pending_find(MGMT_OP_SET_LE, hdev)) {
1277
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
1278
				 MGMT_STATUS_BUSY);
1279
		goto unlock;
1280 1281 1282 1283 1284
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1285
		goto unlock;
1286 1287 1288 1289 1290 1291
	}

	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1292
		hci_cp.simul = lmp_le_br_capable(hdev);
1293 1294
	}

1295 1296
	err = hci_send_cmd(hdev, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
			   &hci_cp);
1297
	if (err < 0)
1298 1299
		mgmt_pending_remove(cmd);

1300 1301
unlock:
	hci_dev_unlock(hdev);
1302 1303 1304
	return err;
}

1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1324
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1325
{
1326
	struct mgmt_cp_add_uuid *cp = data;
1327
	struct pending_cmd *cmd;
1328 1329 1330
	struct bt_uuid *uuid;
	int err;

1331
	BT_DBG("request for %s", hdev->name);
1332

1333
	hci_dev_lock(hdev);
1334

1335
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1336
		err = cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
1337
				 MGMT_STATUS_BUSY);
1338 1339 1340
		goto failed;
	}

1341
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1342 1343 1344 1345 1346 1347
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1348
	uuid->svc_hint = cp->svc_hint;
1349
	uuid->size = get_uuid_size(cp->uuid);
1350

1351
	list_add_tail(&uuid->list, &hdev->uuids);
1352

1353 1354 1355 1356
	err = update_class(hdev);
	if (err < 0)
		goto failed;

1357 1358 1359 1360
	err = update_eir(hdev);
	if (err < 0)
		goto failed;

1361
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1362
		err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
1363
				   hdev->dev_class, 3);
1364 1365 1366 1367
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1368
	if (!cmd)
1369
		err = -ENOMEM;
1370 1371

failed:
1372
	hci_dev_unlock(hdev);
1373 1374 1375
	return err;
}

1376 1377 1378 1379 1380 1381
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

	if (!test_and_set_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1382 1383
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1384 1385 1386 1387 1388 1389
		return true;
	}

	return false;
}

1390
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1391
		       u16 len)
1392
{
1393
	struct mgmt_cp_remove_uuid *cp = data;
1394
	struct pending_cmd *cmd;
1395
	struct bt_uuid *match, *tmp;
1396 1397 1398
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
	int err, found;

1399
	BT_DBG("request for %s", hdev->name);
1400

1401
	hci_dev_lock(hdev);
1402

1403
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1404
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1405
				 MGMT_STATUS_BUSY);
1406 1407 1408
		goto unlock;
	}

1409 1410
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
		err = hci_uuids_clear(hdev);
1411

1412
		if (enable_service_cache(hdev)) {
1413
			err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1414
					   0, hdev->dev_class, 3);
1415 1416
			goto unlock;
		}
1417

1418
		goto update_class;
1419 1420 1421 1422
	}

	found = 0;

1423
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1424 1425 1426 1427
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1428
		kfree(match);
1429 1430 1431 1432
		found++;
	}

	if (found == 0) {
1433
		err = cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
1434
				 MGMT_STATUS_INVALID_PARAMS);
1435 1436 1437
		goto unlock;
	}

1438
update_class:
1439 1440 1441 1442
	err = update_class(hdev);
	if (err < 0)
		goto unlock;

1443 1444 1445 1446
	err = update_eir(hdev);
	if (err < 0)
		goto unlock;

1447
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1448
		err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
1449
				   hdev->dev_class, 3);
1450 1451 1452 1453
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1454
	if (!cmd)
1455
		err = -ENOMEM;
1456 1457

unlock:
1458
	hci_dev_unlock(hdev);
1459 1460 1461
	return err;
}

1462
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1463
			 u16 len)
1464
{
1465
	struct mgmt_cp_set_dev_class *cp = data;
1466
	struct pending_cmd *cmd;
1467 1468
	int err;

1469
	BT_DBG("request for %s", hdev->name);
1470

1471 1472 1473
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_NOT_SUPPORTED);
1474

1475 1476 1477
	if (test_bit(HCI_PENDING_CLASS, &hdev->dev_flags))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_BUSY);
1478

1479 1480 1481
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				  MGMT_STATUS_INVALID_PARAMS);
1482

1483
	hci_dev_lock(hdev);
1484

1485 1486 1487
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

1488
	if (!hdev_is_powered(hdev)) {
1489
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1490
				   hdev->dev_class, 3);
1491 1492 1493
		goto unlock;
	}

1494
	if (test_and_clear_bit(HCI_SERVICE_CACHE, &hdev->dev_flags)) {
1495 1496 1497
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
1498
		update_eir(hdev);
1499
	}
1500

1501
	err = update_class(hdev);
1502 1503
	if (err < 0)
		goto unlock;
1504

1505
	if (!test_bit(HCI_PENDING_CLASS, &hdev->dev_flags)) {
1506
		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
1507
				   hdev->dev_class, 3);
1508 1509 1510 1511
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
1512
	if (!cmd)
1513
		err = -ENOMEM;
1514

1515
unlock:
1516
	hci_dev_unlock(hdev);
1517 1518 1519
	return err;
}

1520
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
1521
			  u16 len)
1522
{
1523
	struct mgmt_cp_load_link_keys *cp = data;
1524
	u16 key_count, expected_len;
1525
	int i;
1526

1527
	key_count = __le16_to_cpu(cp->key_count);
1528

1529 1530
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
1531
	if (expected_len != len) {
1532
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
1533
		       len, expected_len);
1534
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
1535
				  MGMT_STATUS_INVALID_PARAMS);
1536 1537
	}

1538 1539 1540 1541
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				  MGMT_STATUS_INVALID_PARAMS);

1542
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
1543
	       key_count);
1544

1545 1546 1547 1548 1549 1550 1551 1552
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

		if (key->addr.type != BDADDR_BREDR)
			return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

1553
	hci_dev_lock(hdev);
1554 1555 1556

	hci_link_keys_clear(hdev);

1557
	set_bit(HCI_LINK_KEYS, &hdev->dev_flags);
1558 1559

	if (cp->debug_keys)
1560
		set_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1561
	else
1562
		clear_bit(HCI_DEBUG_KEYS, &hdev->dev_flags);
1563

1564
	for (i = 0; i < key_count; i++) {
1565
		struct mgmt_link_key_info *key = &cp->keys[i];
1566

1567
		hci_add_link_key(hdev, NULL, 0, &key->addr.bdaddr, key->val,
1568
				 key->type, key->pin_len);
1569 1570
	}

1571
	cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
1572

1573
	hci_dev_unlock(hdev);
1574

1575
	return 0;
1576 1577
}

1578
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
1579
			   u8 addr_type, struct sock *skip_sk)
1580 1581 1582 1583 1584 1585 1586
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
1587
			  skip_sk);
1588 1589
}

1590
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1591
			 u16 len)
1592
{
1593 1594
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
1595 1596
	struct hci_cp_disconnect dc;
	struct pending_cmd *cmd;
1597 1598 1599
	struct hci_conn *conn;
	int err;

1600
	memset(&rp, 0, sizeof(rp));
1601 1602
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
1603

1604 1605 1606 1607 1608
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1609 1610 1611 1612 1613
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
		return cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1614 1615
	hci_dev_lock(hdev);

1616
	if (!hdev_is_powered(hdev)) {
1617
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1618
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1619 1620 1621
		goto unlock;
	}

1622
	if (cp->addr.type == BDADDR_BREDR)
1623 1624 1625
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
	else
		err = hci_remove_ltk(hdev, &cp->addr.bdaddr);
1626

1627
	if (err < 0) {
1628
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
1629
				   MGMT_STATUS_NOT_PAIRED, &rp, sizeof(rp));
1630 1631 1632
		goto unlock;
	}

1633
	if (cp->disconnect) {
1634
		if (cp->addr.type == BDADDR_BREDR)
1635
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
1636
						       &cp->addr.bdaddr);
1637 1638
		else
			conn = hci_conn_hash_lookup_ba(hdev, LE_LINK,
1639
						       &cp->addr.bdaddr);
1640 1641 1642
	} else {
		conn = NULL;
	}
1643

1644
	if (!conn) {
1645
		err = cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
1646
				   &rp, sizeof(rp));
1647
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
1648 1649
		goto unlock;
	}
1650

1651
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
1652
			       sizeof(*cp));
1653 1654 1655
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
1656 1657
	}

1658
	dc.handle = cpu_to_le16(conn->handle);
1659 1660 1661 1662 1663
	dc.reason = 0x13; /* Remote User Terminated Connection */
	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
		mgmt_pending_remove(cmd);

1664
unlock:
1665
	hci_dev_unlock(hdev);
1666 1667 1668
	return err;
}

1669
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
1670
		      u16 len)
1671
{
1672
	struct mgmt_cp_disconnect *cp = data;
1673
	struct mgmt_rp_disconnect rp;
1674
	struct hci_cp_disconnect dc;
1675
	struct pending_cmd *cmd;
1676 1677 1678 1679 1680
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1681 1682 1683 1684
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1685
	if (!bdaddr_type_is_valid(cp->addr.type))
1686 1687 1688
		return cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));
1689

1690
	hci_dev_lock(hdev);
1691 1692

	if (!test_bit(HCI_UP, &hdev->flags)) {
1693 1694
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
1695 1696 1697
		goto failed;
	}

1698
	if (mgmt_pending_find(MGMT_OP_DISCONNECT, hdev)) {
1699 1700
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
1701 1702 1703
		goto failed;
	}

1704
	if (cp->addr.type == BDADDR_BREDR)
1705 1706
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
1707 1708
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);
1709

1710
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
1711 1712
		err = cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
				   MGMT_STATUS_NOT_CONNECTED, &rp, sizeof(rp));
1713 1714 1715
		goto failed;
	}

1716
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
1717 1718
	if (!cmd) {
		err = -ENOMEM;
1719
		goto failed;
1720
	}
1721

1722
	dc.handle = cpu_to_le16(conn->handle);
1723
	dc.reason = HCI_ERROR_REMOTE_USER_TERM;
1724 1725 1726

	err = hci_send_cmd(hdev, HCI_OP_DISCONNECT, sizeof(dc), &dc);
	if (err < 0)
1727
		mgmt_pending_remove(cmd);
1728 1729

failed:
1730
	hci_dev_unlock(hdev);
1731 1732 1733
	return err;
}

1734
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
1735 1736 1737
{
	switch (link_type) {
	case LE_LINK:
1738 1739
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
1740
			return BDADDR_LE_PUBLIC;
1741

1742
		default:
1743
			/* Fallback to LE Random address type */
1744
			return BDADDR_LE_RANDOM;
1745
		}
1746

1747
	default:
1748
		/* Fallback to BR/EDR type */
1749
		return BDADDR_BREDR;
1750 1751 1752
	}
}

1753 1754
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
1755 1756
{
	struct mgmt_rp_get_connections *rp;
1757
	struct hci_conn *c;
1758
	size_t rp_len;
1759 1760
	int err;
	u16 i;
1761 1762 1763

	BT_DBG("");

1764
	hci_dev_lock(hdev);
1765

1766
	if (!hdev_is_powered(hdev)) {
1767
		err = cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
1768
				 MGMT_STATUS_NOT_POWERED);
1769 1770 1771
		goto unlock;
	}

1772
	i = 0;
1773 1774
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
1775
			i++;
1776 1777
	}

1778
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1779
	rp = kmalloc(rp_len, GFP_KERNEL);
1780
	if (!rp) {
1781 1782 1783 1784 1785
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
1786
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
1787 1788
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
1789
		bacpy(&rp->addr[i].bdaddr, &c->dst);
1790
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
1791
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
1792 1793 1794 1795
			continue;
		i++;
	}

1796
	rp->conn_count = cpu_to_le16(i);
1797

1798 1799
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
1800

1801
	err = cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
1802
			   rp_len);
1803

1804
	kfree(rp);
1805 1806

unlock:
1807
	hci_dev_unlock(hdev);
1808 1809 1810
	return err;
}

1811
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
1812
				   struct mgmt_cp_pin_code_neg_reply *cp)
1813 1814 1815 1816
{
	struct pending_cmd *cmd;
	int err;

1817
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
1818
			       sizeof(*cp));
1819 1820 1821
	if (!cmd)
		return -ENOMEM;

1822
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
1823
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
1824 1825 1826 1827 1828 1829
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

1830
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
1831
			  u16 len)
1832
{
1833
	struct hci_conn *conn;
1834
	struct mgmt_cp_pin_code_reply *cp = data;
1835
	struct hci_cp_pin_code_reply reply;
1836
	struct pending_cmd *cmd;
1837 1838 1839 1840
	int err;

	BT_DBG("");

1841
	hci_dev_lock(hdev);
1842

1843
	if (!hdev_is_powered(hdev)) {
1844
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1845
				 MGMT_STATUS_NOT_POWERED);
1846 1847 1848
		goto failed;
	}

1849
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
1850
	if (!conn) {
1851
		err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1852
				 MGMT_STATUS_NOT_CONNECTED);
1853 1854 1855 1856
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
1857 1858 1859
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
1860 1861 1862

		BT_ERR("PIN code is not 16 bytes long");

1863
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
1864
		if (err >= 0)
1865
			err = cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
1866
					 MGMT_STATUS_INVALID_PARAMS);
1867 1868 1869 1870

		goto failed;
	}

1871
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
1872 1873
	if (!cmd) {
		err = -ENOMEM;
1874
		goto failed;
1875
	}
1876

1877
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
1878
	reply.pin_len = cp->pin_len;
1879
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
1880 1881 1882

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
1883
		mgmt_pending_remove(cmd);
1884 1885

failed:
1886
	hci_dev_unlock(hdev);
1887 1888 1889
	return err;
}

1890 1891
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1892
{
1893
	struct mgmt_cp_set_io_capability *cp = data;
1894 1895 1896

	BT_DBG("");

1897
	hci_dev_lock(hdev);
1898 1899 1900 1901

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
1902
	       hdev->io_capability);
1903

1904
	hci_dev_unlock(hdev);
1905

1906 1907
	return cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0, NULL,
			    0);
1908 1909
}

1910
static struct pending_cmd *find_pairing(struct hci_conn *conn)
1911 1912
{
	struct hci_dev *hdev = conn->hdev;
1913
	struct pending_cmd *cmd;
1914

1915
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

static void pairing_complete(struct pending_cmd *cmd, u8 status)
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;

1933
	bacpy(&rp.addr.bdaddr, &conn->dst);
1934
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
1935

1936
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE, status,
1937
		     &rp, sizeof(rp));
1938 1939 1940 1941 1942 1943 1944 1945

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

	hci_conn_put(conn);

1946
	mgmt_pending_remove(cmd);
1947 1948 1949 1950 1951 1952 1953 1954 1955
}

static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
1956
	if (!cmd)
1957
		BT_DBG("Unable to find a pending command");
1958
	else
1959
		pairing_complete(cmd, mgmt_status(status));
1960 1961
}

1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977
static void le_connect_complete_cb(struct hci_conn *conn, u8 status)
{
	struct pending_cmd *cmd;

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
	if (!cmd)
		BT_DBG("Unable to find a pending command");
	else
		pairing_complete(cmd, mgmt_status(status));
}

1978
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
1979
		       u16 len)
1980
{
1981
	struct mgmt_cp_pair_device *cp = data;
1982
	struct mgmt_rp_pair_device rp;
1983 1984 1985 1986 1987 1988 1989
	struct pending_cmd *cmd;
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

1990 1991 1992 1993
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

1994 1995 1996 1997 1998
	if (!bdaddr_type_is_valid(cp->addr.type))
		return cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &rp, sizeof(rp));

1999
	hci_dev_lock(hdev);
2000

2001
	if (!hdev_is_powered(hdev)) {
2002 2003
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
				   MGMT_STATUS_NOT_POWERED, &rp, sizeof(rp));
2004 2005 2006
		goto unlock;
	}

2007 2008
	sec_level = BT_SECURITY_MEDIUM;
	if (cp->io_cap == 0x03)
2009
		auth_type = HCI_AT_DEDICATED_BONDING;
2010
	else
2011 2012
		auth_type = HCI_AT_DEDICATED_BONDING_MITM;

2013
	if (cp->addr.type == BDADDR_BREDR)
2014 2015
		conn = hci_connect(hdev, ACL_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2016
	else
2017 2018
		conn = hci_connect(hdev, LE_LINK, &cp->addr.bdaddr,
				   cp->addr.type, sec_level, auth_type);
2019

2020
	if (IS_ERR(conn)) {
2021 2022 2023 2024 2025 2026 2027
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2028
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2029
				   status, &rp,
2030
				   sizeof(rp));
2031 2032 2033 2034 2035
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
		hci_conn_put(conn);
2036
		err = cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
2037
				   MGMT_STATUS_BUSY, &rp, sizeof(rp));
2038 2039 2040
		goto unlock;
	}

2041
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2042 2043 2044 2045 2046 2047
	if (!cmd) {
		err = -ENOMEM;
		hci_conn_put(conn);
		goto unlock;
	}

2048
	/* For LE, just connecting isn't a proof that the pairing finished */
2049
	if (cp->addr.type == BDADDR_BREDR)
2050
		conn->connect_cfm_cb = pairing_complete_cb;
2051 2052
	else
		conn->connect_cfm_cb = le_connect_complete_cb;
2053

2054 2055 2056 2057 2058 2059
	conn->security_cfm_cb = pairing_complete_cb;
	conn->disconn_cfm_cb = pairing_complete_cb;
	conn->io_capability = cp->io_cap;
	cmd->user_data = conn;

	if (conn->state == BT_CONNECTED &&
2060
	    hci_conn_security(conn, sec_level, auth_type))
2061 2062 2063 2064 2065
		pairing_complete(cmd, 0);

	err = 0;

unlock:
2066
	hci_dev_unlock(hdev);
2067 2068 2069
	return err;
}

2070 2071
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2072
{
2073
	struct mgmt_addr_info *addr = data;
2074 2075 2076 2077 2078 2079 2080 2081
	struct pending_cmd *cmd;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2082
	if (!hdev_is_powered(hdev)) {
2083
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2084
				 MGMT_STATUS_NOT_POWERED);
2085 2086 2087
		goto unlock;
	}

2088 2089
	cmd = mgmt_pending_find(MGMT_OP_PAIR_DEVICE, hdev);
	if (!cmd) {
2090
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2091
				 MGMT_STATUS_INVALID_PARAMS);
2092 2093 2094 2095 2096 2097
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2098
		err = cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
2099
				 MGMT_STATUS_INVALID_PARAMS);
2100 2101 2102 2103 2104
		goto unlock;
	}

	pairing_complete(cmd, MGMT_STATUS_CANCELLED);

2105
	err = cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
2106
			   addr, sizeof(*addr));
2107 2108 2109 2110 2111
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2112
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2113 2114
			     bdaddr_t *bdaddr, u8 type, u16 mgmt_op,
			     u16 hci_op, __le32 passkey)
2115 2116
{
	struct pending_cmd *cmd;
2117
	struct hci_conn *conn;
2118 2119
	int err;

2120
	hci_dev_lock(hdev);
2121

2122
	if (!hdev_is_powered(hdev)) {
2123
		err = cmd_status(sk, hdev->id, mgmt_op,
2124
				 MGMT_STATUS_NOT_POWERED);
2125
		goto done;
2126 2127
	}

2128
	if (type == BDADDR_BREDR)
2129 2130
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, bdaddr);
	else
2131
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, bdaddr);
2132 2133

	if (!conn) {
2134
		err = cmd_status(sk, hdev->id, mgmt_op,
2135
				 MGMT_STATUS_NOT_CONNECTED);
2136 2137
		goto done;
	}
2138

2139
	if (type == BDADDR_LE_PUBLIC || type == BDADDR_LE_RANDOM) {
2140
		/* Continue with pairing via SMP */
2141 2142 2143
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);

		if (!err)
2144
			err = cmd_status(sk, hdev->id, mgmt_op,
2145
					 MGMT_STATUS_SUCCESS);
2146
		else
2147
			err = cmd_status(sk, hdev->id, mgmt_op,
2148
					 MGMT_STATUS_FAILED);
2149 2150 2151 2152

		goto done;
	}

2153
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, bdaddr, sizeof(*bdaddr));
2154 2155
	if (!cmd) {
		err = -ENOMEM;
2156
		goto done;
2157 2158
	}

2159
	/* Continue with pairing via HCI */
2160 2161 2162 2163 2164 2165 2166 2167 2168
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

		bacpy(&cp.bdaddr, bdaddr);
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
		err = hci_send_cmd(hdev, hci_op, sizeof(*bdaddr), bdaddr);

2169 2170
	if (err < 0)
		mgmt_pending_remove(cmd);
2171

2172
done:
2173
	hci_dev_unlock(hdev);
2174 2175 2176
	return err;
}

2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2189 2190
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2191
{
2192
	struct mgmt_cp_user_confirm_reply *cp = data;
2193 2194 2195 2196

	BT_DBG("");

	if (len != sizeof(*cp))
2197
		return cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
2198
				  MGMT_STATUS_INVALID_PARAMS);
2199

2200
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2201 2202
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2203 2204
}

2205
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2206
				  void *data, u16 len)
2207
{
2208
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2209 2210 2211

	BT_DBG("");

2212
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2213 2214
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2215 2216
}

2217 2218
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2219
{
2220
	struct mgmt_cp_user_passkey_reply *cp = data;
2221 2222 2223

	BT_DBG("");

2224
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2225 2226
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2227 2228
}

2229
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2230
				  void *data, u16 len)
2231
{
2232
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2233 2234 2235

	BT_DBG("");

2236
	return user_pairing_resp(sk, hdev, &cp->addr.bdaddr, cp->addr.type,
2237 2238
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2239 2240
}

2241 2242 2243 2244 2245 2246 2247 2248 2249
static int update_name(struct hci_dev *hdev, const char *name)
{
	struct hci_cp_write_local_name cp;

	memcpy(cp.name, name, sizeof(cp.name));

	return hci_send_cmd(hdev, HCI_OP_WRITE_LOCAL_NAME, sizeof(cp), &cp);
}

2250
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2251
			  u16 len)
2252
{
2253
	struct mgmt_cp_set_local_name *cp = data;
2254 2255 2256 2257 2258
	struct pending_cmd *cmd;
	int err;

	BT_DBG("");

2259
	hci_dev_lock(hdev);
2260

2261
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2262

2263
	if (!hdev_is_powered(hdev)) {
2264
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2265 2266

		err = cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
2267
				   data, len);
2268 2269 2270 2271
		if (err < 0)
			goto failed;

		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data, len,
2272
				 sk);
2273

2274 2275 2276
		goto failed;
	}

2277
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
2278 2279 2280 2281 2282
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

2283
	err = update_name(hdev, cp->name);
2284 2285 2286 2287
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
2288
	hci_dev_unlock(hdev);
2289 2290 2291
	return err;
}

2292
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
2293
			       void *data, u16 data_len)
2294 2295 2296 2297
{
	struct pending_cmd *cmd;
	int err;

2298
	BT_DBG("%s", hdev->name);
2299

2300
	hci_dev_lock(hdev);
2301

2302
	if (!hdev_is_powered(hdev)) {
2303
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2304
				 MGMT_STATUS_NOT_POWERED);
2305 2306 2307
		goto unlock;
	}

2308
	if (!lmp_ssp_capable(hdev)) {
2309
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2310
				 MGMT_STATUS_NOT_SUPPORTED);
2311 2312 2313
		goto unlock;
	}

2314
	if (mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
2315
		err = cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
2316
				 MGMT_STATUS_BUSY);
2317 2318 2319
		goto unlock;
	}

2320
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
2321 2322 2323 2324 2325 2326 2327 2328 2329 2330
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_send_cmd(hdev, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
2331
	hci_dev_unlock(hdev);
2332 2333 2334
	return err;
}

2335
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2336
			       void *data, u16 len)
2337
{
2338
	struct mgmt_cp_add_remote_oob_data *cp = data;
2339
	u8 status;
2340 2341
	int err;

2342
	BT_DBG("%s ", hdev->name);
2343

2344
	hci_dev_lock(hdev);
2345

2346
	err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr, cp->hash,
2347
				      cp->randomizer);
2348
	if (err < 0)
2349
		status = MGMT_STATUS_FAILED;
2350
	else
2351
		status = MGMT_STATUS_SUCCESS;
2352

2353
	err = cmd_complete(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA, status,
2354
			   &cp->addr, sizeof(cp->addr));
2355

2356
	hci_dev_unlock(hdev);
2357 2358 2359
	return err;
}

2360
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
2361
				  void *data, u16 len)
2362
{
2363
	struct mgmt_cp_remove_remote_oob_data *cp = data;
2364
	u8 status;
2365 2366
	int err;

2367
	BT_DBG("%s", hdev->name);
2368

2369
	hci_dev_lock(hdev);
2370

2371
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr);
2372
	if (err < 0)
2373
		status = MGMT_STATUS_INVALID_PARAMS;
2374
	else
2375
		status = MGMT_STATUS_SUCCESS;
2376

2377
	err = cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
2378
			   status, &cp->addr, sizeof(cp->addr));
2379

2380
	hci_dev_unlock(hdev);
2381 2382 2383
	return err;
}

2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400
int mgmt_interleaved_discovery(struct hci_dev *hdev)
{
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR_LE);
	if (err < 0)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

	hci_dev_unlock(hdev);

	return err;
}

2401
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
2402
			   void *data, u16 len)
2403
{
2404
	struct mgmt_cp_start_discovery *cp = data;
2405 2406 2407
	struct pending_cmd *cmd;
	int err;

2408
	BT_DBG("%s", hdev->name);
2409

2410
	hci_dev_lock(hdev);
2411

2412
	if (!hdev_is_powered(hdev)) {
2413
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2414
				 MGMT_STATUS_NOT_POWERED);
2415 2416 2417
		goto failed;
	}

2418 2419 2420 2421 2422 2423
	if (test_bit(HCI_PERIODIC_INQ, &hdev->dev_flags)) {
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_BUSY);
		goto failed;
	}

2424
	if (hdev->discovery.state != DISCOVERY_STOPPED) {
2425
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
2426
				 MGMT_STATUS_BUSY);
2427 2428 2429
		goto failed;
	}

2430
	cmd = mgmt_pending_add(sk, MGMT_OP_START_DISCOVERY, hdev, NULL, 0);
2431 2432 2433 2434 2435
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

A
Andre Guedes 已提交
2436 2437 2438
	hdev->discovery.type = cp->type;

	switch (hdev->discovery.type) {
2439
	case DISCOV_TYPE_BREDR:
2440 2441 2442 2443 2444 2445 2446 2447
		if (!lmp_bredr_capable(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		err = hci_do_inquiry(hdev, INQUIRY_LEN_BREDR);
2448 2449 2450
		break;

	case DISCOV_TYPE_LE:
2451 2452 2453 2454 2455 2456 2457 2458 2459
		if (!lmp_host_le_capable(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT,
				  LE_SCAN_WIN, LE_SCAN_TIMEOUT_LE_ONLY);
2460 2461
		break;

2462
	case DISCOV_TYPE_INTERLEAVED:
2463 2464 2465 2466 2467 2468 2469 2470 2471
		if (!lmp_host_le_capable(hdev) || !lmp_bredr_capable(hdev)) {
			err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
					 MGMT_STATUS_NOT_SUPPORTED);
			mgmt_pending_remove(cmd);
			goto failed;
		}

		err = hci_le_scan(hdev, LE_SCAN_TYPE, LE_SCAN_INT, LE_SCAN_WIN,
				  LE_SCAN_TIMEOUT_BREDR_LE);
2472 2473
		break;

2474
	default:
2475 2476 2477 2478
		err = cmd_status(sk, hdev->id, MGMT_OP_START_DISCOVERY,
				 MGMT_STATUS_INVALID_PARAMS);
		mgmt_pending_remove(cmd);
		goto failed;
2479
	}
2480

2481 2482
	if (err < 0)
		mgmt_pending_remove(cmd);
2483 2484
	else
		hci_discovery_set_state(hdev, DISCOVERY_STARTING);
2485 2486

failed:
2487
	hci_dev_unlock(hdev);
2488 2489 2490
	return err;
}

2491
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
2492
			  u16 len)
2493
{
2494
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
2495
	struct pending_cmd *cmd;
2496 2497
	struct hci_cp_remote_name_req_cancel cp;
	struct inquiry_entry *e;
2498 2499
	int err;

2500
	BT_DBG("%s", hdev->name);
2501

2502
	hci_dev_lock(hdev);
2503

2504
	if (!hci_discovery_active(hdev)) {
2505
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2506 2507
				   MGMT_STATUS_REJECTED, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2508 2509 2510 2511
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
2512
		err = cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
2513 2514
				   MGMT_STATUS_INVALID_PARAMS, &mgmt_cp->type,
				   sizeof(mgmt_cp->type));
2515
		goto unlock;
2516 2517
	}

2518
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, NULL, 0);
2519 2520
	if (!cmd) {
		err = -ENOMEM;
2521 2522 2523
		goto unlock;
	}

2524 2525
	switch (hdev->discovery.state) {
	case DISCOVERY_FINDING:
2526 2527 2528 2529 2530
		if (test_bit(HCI_INQUIRY, &hdev->flags))
			err = hci_cancel_inquiry(hdev);
		else
			err = hci_cancel_le_scan(hdev);

2531 2532 2533 2534
		break;

	case DISCOVERY_RESOLVING:
		e = hci_inquiry_cache_lookup_resolve(hdev, BDADDR_ANY,
2535
						     NAME_PENDING);
2536
		if (!e) {
2537
			mgmt_pending_remove(cmd);
2538 2539 2540 2541 2542 2543 2544
			err = cmd_complete(sk, hdev->id,
					   MGMT_OP_STOP_DISCOVERY, 0,
					   &mgmt_cp->type,
					   sizeof(mgmt_cp->type));
			hci_discovery_set_state(hdev, DISCOVERY_STOPPED);
			goto unlock;
		}
2545

2546 2547 2548 2549 2550 2551 2552 2553 2554
		bacpy(&cp.bdaddr, &e->data.bdaddr);
		err = hci_send_cmd(hdev, HCI_OP_REMOTE_NAME_REQ_CANCEL,
				   sizeof(cp), &cp);

		break;

	default:
		BT_DBG("unknown discovery state %u", hdev->discovery.state);
		err = -EFAULT;
2555 2556 2557 2558
	}

	if (err < 0)
		mgmt_pending_remove(cmd);
2559 2560
	else
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
2561

2562
unlock:
2563
	hci_dev_unlock(hdev);
2564 2565 2566
	return err;
}

2567
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
2568
			u16 len)
2569
{
2570
	struct mgmt_cp_confirm_name *cp = data;
2571 2572 2573
	struct inquiry_entry *e;
	int err;

2574
	BT_DBG("%s", hdev->name);
2575 2576 2577

	hci_dev_lock(hdev);

2578
	if (!hci_discovery_active(hdev)) {
2579
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2580
				 MGMT_STATUS_FAILED);
2581 2582 2583
		goto failed;
	}

2584
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
2585
	if (!e) {
2586
		err = cmd_status(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
2587
				 MGMT_STATUS_INVALID_PARAMS);
2588 2589 2590 2591 2592 2593 2594 2595
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
2596
		hci_inquiry_cache_update_resolve(hdev, e);
2597 2598
	}

2599 2600
	err = cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0, &cp->addr,
			   sizeof(cp->addr));
2601 2602 2603 2604 2605 2606

failed:
	hci_dev_unlock(hdev);
	return err;
}

2607
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
2608
			u16 len)
2609
{
2610
	struct mgmt_cp_block_device *cp = data;
2611
	u8 status;
2612 2613
	int err;

2614
	BT_DBG("%s", hdev->name);
2615

2616
	if (!bdaddr_type_is_valid(cp->addr.type))
2617 2618 2619
		return cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
2620

2621
	hci_dev_lock(hdev);
2622

2623
	err = hci_blacklist_add(hdev, &cp->addr.bdaddr, cp->addr.type);
2624
	if (err < 0)
2625
		status = MGMT_STATUS_FAILED;
2626
	else
2627
		status = MGMT_STATUS_SUCCESS;
2628

2629
	err = cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
2630
			   &cp->addr, sizeof(cp->addr));
2631

2632
	hci_dev_unlock(hdev);
2633 2634 2635 2636

	return err;
}

2637
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
2638
			  u16 len)
2639
{
2640
	struct mgmt_cp_unblock_device *cp = data;
2641
	u8 status;
2642 2643
	int err;

2644
	BT_DBG("%s", hdev->name);
2645

2646
	if (!bdaddr_type_is_valid(cp->addr.type))
2647 2648 2649
		return cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
				    MGMT_STATUS_INVALID_PARAMS,
				    &cp->addr, sizeof(cp->addr));
2650

2651
	hci_dev_lock(hdev);
2652

2653
	err = hci_blacklist_del(hdev, &cp->addr.bdaddr, cp->addr.type);
2654
	if (err < 0)
2655
		status = MGMT_STATUS_INVALID_PARAMS;
2656
	else
2657
		status = MGMT_STATUS_SUCCESS;
2658

2659
	err = cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
2660
			   &cp->addr, sizeof(cp->addr));
2661

2662
	hci_dev_unlock(hdev);
2663 2664 2665 2666

	return err;
}

2667 2668 2669 2670 2671
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
	int err;
2672
	__u16 source;
2673 2674 2675

	BT_DBG("%s", hdev->name);

2676 2677 2678 2679 2680 2681
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				  MGMT_STATUS_INVALID_PARAMS);

2682 2683
	hci_dev_lock(hdev);

2684
	hdev->devid_source = source;
2685 2686 2687 2688 2689 2690 2691 2692 2693 2694 2695 2696 2697
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0, NULL, 0);

	update_eir(hdev);

	hci_dev_unlock(hdev);

	return err;
}

2698
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
2699
				void *data, u16 len)
2700
{
2701
	struct mgmt_mode *cp = data;
2702 2703 2704 2705
	struct hci_cp_write_page_scan_activity acp;
	u8 type;
	int err;

2706
	BT_DBG("%s", hdev->name);
2707

2708 2709 2710 2711
	if (!lmp_bredr_capable(hdev))
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_NOT_SUPPORTED);

2712 2713 2714 2715
	if (cp->val != 0x00 && cp->val != 0x01)
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				  MGMT_STATUS_INVALID_PARAMS);

2716
	if (!hdev_is_powered(hdev))
2717
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2718
				  MGMT_STATUS_NOT_POWERED);
2719 2720

	if (!test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
2721
		return cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2722
				  MGMT_STATUS_REJECTED);
2723 2724 2725

	hci_dev_lock(hdev);

2726
	if (cp->val) {
2727
		type = PAGE_SCAN_TYPE_INTERLACED;
2728

2729 2730
		/* 160 msec page scan interval */
		acp.interval = __constant_cpu_to_le16(0x0100);
2731 2732
	} else {
		type = PAGE_SCAN_TYPE_STANDARD;	/* default */
2733 2734 2735

		/* default 1.28 sec page scan */
		acp.interval = __constant_cpu_to_le16(0x0800);
2736 2737
	}

2738 2739
	/* default 11.25 msec page scan window */
	acp.window = __constant_cpu_to_le16(0x0012);
2740

2741 2742
	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_ACTIVITY, sizeof(acp),
			   &acp);
2743
	if (err < 0) {
2744
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2745
				 MGMT_STATUS_FAILED);
2746 2747 2748 2749 2750
		goto done;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_PAGE_SCAN_TYPE, 1, &type);
	if (err < 0) {
2751
		err = cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
2752
				 MGMT_STATUS_FAILED);
2753 2754 2755
		goto done;
	}

2756
	err = cmd_complete(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE, 0,
2757
			   NULL, 0);
2758 2759 2760 2761 2762
done:
	hci_dev_unlock(hdev);
	return err;
}

2763 2764
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
2765 2766
	if (key->authenticated != 0x00 && key->authenticated != 0x01)
		return false;
2767 2768
	if (key->master != 0x00 && key->master != 0x01)
		return false;
2769 2770
	if (!bdaddr_type_is_le(key->addr.type))
		return false;
2771 2772 2773
	return true;
}

2774
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
2775
			       void *cp_data, u16 len)
2776 2777 2778
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
	u16 key_count, expected_len;
2779
	int i, err;
2780

2781
	key_count = __le16_to_cpu(cp->key_count);
2782 2783 2784 2785 2786

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
2787
		       len, expected_len);
2788
		return cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
2789
				  MGMT_STATUS_INVALID_PARAMS);
2790 2791
	}

2792
	BT_DBG("%s key_count %u", hdev->name, key_count);
2793

2794 2795 2796
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

2797
		if (!ltk_is_valid(key))
2798 2799 2800 2801 2802
			return cmd_status(sk, hdev->id,
					  MGMT_OP_LOAD_LONG_TERM_KEYS,
					  MGMT_STATUS_INVALID_PARAMS);
	}

2803 2804 2805 2806 2807 2808 2809 2810 2811 2812 2813 2814 2815
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
		u8 type;

		if (key->master)
			type = HCI_SMP_LTK;
		else
			type = HCI_SMP_LTK_SLAVE;

2816
		hci_add_ltk(hdev, &key->addr.bdaddr,
2817
			    bdaddr_to_le(key->addr.type),
2818 2819
			    type, 0, key->authenticated, key->val,
			    key->enc_size, key->ediv, key->rand);
2820 2821
	}

2822 2823 2824
	err = cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
			   NULL, 0);

2825 2826
	hci_dev_unlock(hdev);

2827
	return err;
2828 2829
}

2830
static const struct mgmt_handler {
2831 2832
	int (*func) (struct sock *sk, struct hci_dev *hdev, void *data,
		     u16 data_len);
2833 2834
	bool var_len;
	size_t data_len;
2835 2836
} mgmt_handlers[] = {
	{ NULL }, /* 0x0000 (no command) */
2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868 2869 2870 2871 2872 2873 2874 2875
	{ read_version,           false, MGMT_READ_VERSION_SIZE },
	{ read_commands,          false, MGMT_READ_COMMANDS_SIZE },
	{ read_index_list,        false, MGMT_READ_INDEX_LIST_SIZE },
	{ read_controller_info,   false, MGMT_READ_INFO_SIZE },
	{ set_powered,            false, MGMT_SETTING_SIZE },
	{ set_discoverable,       false, MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,        false, MGMT_SETTING_SIZE },
	{ set_fast_connectable,   false, MGMT_SETTING_SIZE },
	{ set_pairable,           false, MGMT_SETTING_SIZE },
	{ set_link_security,      false, MGMT_SETTING_SIZE },
	{ set_ssp,                false, MGMT_SETTING_SIZE },
	{ set_hs,                 false, MGMT_SETTING_SIZE },
	{ set_le,                 false, MGMT_SETTING_SIZE },
	{ set_dev_class,          false, MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,         false, MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,               false, MGMT_ADD_UUID_SIZE },
	{ remove_uuid,            false, MGMT_REMOVE_UUID_SIZE },
	{ load_link_keys,         true,  MGMT_LOAD_LINK_KEYS_SIZE },
	{ load_long_term_keys,    true,  MGMT_LOAD_LONG_TERM_KEYS_SIZE },
	{ disconnect,             false, MGMT_DISCONNECT_SIZE },
	{ get_connections,        false, MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,         false, MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,     false, MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,      false, MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,            false, MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,     false, MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,          false, MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,     false, MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply, false, MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,     false, MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply, false, MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
	{ read_local_oob_data,    false, MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,    false, MGMT_ADD_REMOTE_OOB_DATA_SIZE },
	{ remove_remote_oob_data, false, MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,        false, MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,         false, MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,           false, MGMT_CONFIRM_NAME_SIZE },
	{ block_device,           false, MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,         false, MGMT_UNBLOCK_DEVICE_SIZE },
2876
	{ set_device_id,          false, MGMT_SET_DEVICE_ID_SIZE },
2877 2878 2879
};


2880 2881
int mgmt_control(struct sock *sk, struct msghdr *msg, size_t msglen)
{
2882 2883
	void *buf;
	u8 *cp;
2884
	struct mgmt_hdr *hdr;
2885
	u16 opcode, index, len;
2886
	struct hci_dev *hdev = NULL;
2887
	const struct mgmt_handler *handler;
2888 2889 2890 2891 2892 2893 2894
	int err;

	BT_DBG("got %zu bytes", msglen);

	if (msglen < sizeof(*hdr))
		return -EINVAL;

2895
	buf = kmalloc(msglen, GFP_KERNEL);
2896 2897 2898 2899 2900 2901 2902 2903
	if (!buf)
		return -ENOMEM;

	if (memcpy_fromiovec(buf, msg->msg_iov, msglen)) {
		err = -EFAULT;
		goto done;
	}

2904
	hdr = buf;
2905 2906 2907
	opcode = __le16_to_cpu(hdr->opcode);
	index = __le16_to_cpu(hdr->index);
	len = __le16_to_cpu(hdr->len);
2908 2909 2910 2911 2912 2913

	if (len != msglen - sizeof(*hdr)) {
		err = -EINVAL;
		goto done;
	}

2914
	if (index != MGMT_INDEX_NONE) {
2915 2916 2917
		hdev = hci_dev_get(index);
		if (!hdev) {
			err = cmd_status(sk, index, opcode,
2918
					 MGMT_STATUS_INVALID_INDEX);
2919 2920 2921 2922
			goto done;
		}
	}

2923
	if (opcode >= ARRAY_SIZE(mgmt_handlers) ||
2924
	    mgmt_handlers[opcode].func == NULL) {
2925
		BT_DBG("Unknown op %u", opcode);
2926
		err = cmd_status(sk, index, opcode,
2927
				 MGMT_STATUS_UNKNOWN_COMMAND);
2928 2929 2930 2931
		goto done;
	}

	if ((hdev && opcode < MGMT_OP_READ_INFO) ||
2932
	    (!hdev && opcode >= MGMT_OP_READ_INFO)) {
2933
		err = cmd_status(sk, index, opcode,
2934
				 MGMT_STATUS_INVALID_INDEX);
2935
		goto done;
2936 2937
	}

2938 2939 2940
	handler = &mgmt_handlers[opcode];

	if ((handler->var_len && len < handler->data_len) ||
2941
	    (!handler->var_len && len != handler->data_len)) {
2942
		err = cmd_status(sk, index, opcode,
2943
				 MGMT_STATUS_INVALID_PARAMS);
2944 2945 2946
		goto done;
	}

2947 2948 2949 2950 2951
	if (hdev)
		mgmt_init_hdev(sk, hdev);

	cp = buf + sizeof(*hdr);

2952
	err = handler->func(sk, hdev, cp, len);
2953 2954 2955
	if (err < 0)
		goto done;

2956 2957 2958
	err = msglen;

done:
2959 2960 2961
	if (hdev)
		hci_dev_put(hdev);

2962 2963 2964
	kfree(buf);
	return err;
}
2965

2966 2967 2968 2969 2970 2971 2972 2973
static void cmd_status_rsp(struct pending_cmd *cmd, void *data)
{
	u8 *status = data;

	cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
	mgmt_pending_remove(cmd);
}

2974
int mgmt_index_added(struct hci_dev *hdev)
2975
{
2976 2977 2978
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

2979
	return mgmt_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0, NULL);
2980 2981
}

2982
int mgmt_index_removed(struct hci_dev *hdev)
2983
{
2984
	u8 status = MGMT_STATUS_INVALID_INDEX;
2985

2986 2987 2988
	if (!mgmt_valid_hdev(hdev))
		return -ENOTSUPP;

2989
	mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
2990

2991
	return mgmt_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0, NULL);
2992 2993
}

2994
struct cmd_lookup {
2995
	struct sock *sk;
2996
	struct hci_dev *hdev;
2997
	u8 mgmt_status;
2998 2999
};

3000
static void settings_rsp(struct pending_cmd *cmd, void *data)
3001
{
3002
	struct cmd_lookup *match = data;
3003

3004
	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);
3005 3006 3007 3008 3009 3010 3011 3012 3013

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
3014
}
3015

3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 3029 3030
static int set_bredr_scan(struct hci_dev *hdev)
{
	u8 scan = 0;

	if (test_bit(HCI_CONNECTABLE, &hdev->dev_flags))
		scan |= SCAN_PAGE;
	if (test_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
		scan |= SCAN_INQUIRY;

	if (!scan)
		return 0;

	return hci_send_cmd(hdev, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
}

3031
int mgmt_powered(struct hci_dev *hdev, u8 powered)
3032
{
3033
	struct cmd_lookup match = { NULL, hdev };
3034
	int err;
3035

3036 3037 3038
	if (!test_bit(HCI_MGMT, &hdev->dev_flags))
		return 0;

3039
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
3040

3041
	if (powered) {
3042 3043
		if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags) &&
		    !lmp_host_ssp_capable(hdev)) {
3044 3045 3046 3047 3048
			u8 ssp = 1;

			hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &ssp);
		}

3049 3050 3051 3052
		if (test_bit(HCI_LE_ENABLED, &hdev->dev_flags)) {
			struct hci_cp_write_le_host_supported cp;

			cp.le = 1;
3053
			cp.simul = lmp_le_br_capable(hdev);
3054

3055 3056 3057
			/* Check first if we already have the right
			 * host state (host features set)
			 */
3058 3059
			if (cp.le != lmp_host_le_capable(hdev) ||
			    cp.simul != lmp_host_le_br_capable(hdev))
3060 3061 3062
				hci_send_cmd(hdev,
					     HCI_OP_WRITE_LE_HOST_SUPPORTED,
					     sizeof(cp), &cp);
3063 3064
		}

3065 3066 3067 3068 3069 3070
		if (lmp_bredr_capable(hdev)) {
			set_bredr_scan(hdev);
			update_class(hdev);
			update_name(hdev, hdev->dev_name);
			update_eir(hdev);
		}
3071
	} else {
3072
		u8 status = MGMT_STATUS_NOT_POWERED;
3073 3074
		u8 zero_cod[] = { 0, 0, 0 };

3075
		mgmt_pending_foreach(0, hdev, cmd_status_rsp, &status);
3076 3077 3078 3079

		if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
			mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
				   zero_cod, sizeof(zero_cod), NULL);
3080 3081
	}

3082
	err = new_settings(hdev, match.sk);
3083 3084 3085 3086

	if (match.sk)
		sock_put(match.sk);

3087
	return err;
3088
}
3089

3090
int mgmt_discoverable(struct hci_dev *hdev, u8 discoverable)
3091
{
3092
	struct cmd_lookup match = { NULL, hdev };
3093 3094
	bool changed = false;
	int err = 0;
3095

3096 3097 3098 3099 3100 3101 3102
	if (discoverable) {
		if (!test_and_set_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_DISCOVERABLE, &hdev->dev_flags))
			changed = true;
	}
3103

3104
	mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev, settings_rsp,
3105
			     &match);
3106

3107 3108
	if (changed)
		err = new_settings(hdev, match.sk);
3109

3110 3111 3112
	if (match.sk)
		sock_put(match.sk);

3113
	return err;
3114
}
3115

3116
int mgmt_connectable(struct hci_dev *hdev, u8 connectable)
3117
{
3118
	struct cmd_lookup match = { NULL, hdev };
3119 3120
	bool changed = false;
	int err = 0;
3121

3122 3123 3124 3125 3126 3127 3128
	if (connectable) {
		if (!test_and_set_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_CONNECTABLE, &hdev->dev_flags))
			changed = true;
	}
3129

3130
	mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev, settings_rsp,
3131
			     &match);
3132

3133 3134
	if (changed)
		err = new_settings(hdev, match.sk);
3135 3136 3137 3138

	if (match.sk)
		sock_put(match.sk);

3139
	return err;
3140
}
3141

3142
int mgmt_write_scan_failed(struct hci_dev *hdev, u8 scan, u8 status)
3143
{
3144 3145
	u8 mgmt_err = mgmt_status(status);

3146
	if (scan & SCAN_PAGE)
3147
		mgmt_pending_foreach(MGMT_OP_SET_CONNECTABLE, hdev,
3148
				     cmd_status_rsp, &mgmt_err);
3149 3150

	if (scan & SCAN_INQUIRY)
3151
		mgmt_pending_foreach(MGMT_OP_SET_DISCOVERABLE, hdev,
3152
				     cmd_status_rsp, &mgmt_err);
3153 3154 3155 3156

	return 0;
}

3157 3158
int mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		      bool persistent)
3159
{
3160
	struct mgmt_ev_new_link_key ev;
3161

3162
	memset(&ev, 0, sizeof(ev));
3163

3164
	ev.store_hint = persistent;
3165
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3166
	ev.key.addr.type = BDADDR_BREDR;
3167
	ev.key.type = key->type;
3168
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
3169
	ev.key.pin_len = key->pin_len;
3170

3171
	return mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
3172
}
3173

3174 3175 3176 3177 3178 3179 3180 3181
int mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, u8 persistent)
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

	ev.store_hint = persistent;
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
3182
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
3183 3184 3185 3186 3187 3188 3189 3190 3191 3192
	ev.key.authenticated = key->authenticated;
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;

	if (key->type == HCI_SMP_LTK)
		ev.key.master = 1;

	memcpy(ev.key.rand, key->rand, sizeof(key->rand));
	memcpy(ev.key.val, key->val, sizeof(key->val));

3193 3194
	return mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev),
			  NULL);
3195 3196
}

3197
int mgmt_device_connected(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3198 3199
			  u8 addr_type, u32 flags, u8 *name, u8 name_len,
			  u8 *dev_class)
3200
{
3201 3202 3203
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
3204

3205
	bacpy(&ev->addr.bdaddr, bdaddr);
3206
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3207

3208
	ev->flags = __cpu_to_le32(flags);
3209

3210 3211
	if (name_len > 0)
		eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
3212
					  name, name_len);
3213 3214

	if (dev_class && memcmp(dev_class, "\0\0\0", 3) != 0)
3215
		eir_len = eir_append_data(ev->eir, eir_len,
3216
					  EIR_CLASS_OF_DEV, dev_class, 3);
3217

3218
	ev->eir_len = cpu_to_le16(eir_len);
3219 3220

	return mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
3221
			  sizeof(*ev) + eir_len, NULL);
3222 3223
}

3224 3225
static void disconnect_rsp(struct pending_cmd *cmd, void *data)
{
3226
	struct mgmt_cp_disconnect *cp = cmd->param;
3227
	struct sock **sk = data;
3228
	struct mgmt_rp_disconnect rp;
3229

3230 3231
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3232

3233
	cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT, 0, &rp,
3234
		     sizeof(rp));
3235 3236 3237 3238

	*sk = cmd->sk;
	sock_hold(*sk);

3239
	mgmt_pending_remove(cmd);
3240 3241
}

3242
static void unpair_device_rsp(struct pending_cmd *cmd, void *data)
3243
{
3244
	struct hci_dev *hdev = data;
3245 3246
	struct mgmt_cp_unpair_device *cp = cmd->param;
	struct mgmt_rp_unpair_device rp;
3247 3248

	memset(&rp, 0, sizeof(rp));
3249 3250
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
3251

3252 3253
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

3254
	cmd_complete(cmd->sk, cmd->index, cmd->opcode, 0, &rp, sizeof(rp));
3255 3256 3257 3258

	mgmt_pending_remove(cmd);
}

3259
int mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
3260
			     u8 link_type, u8 addr_type, u8 reason)
3261
{
3262
	struct mgmt_ev_device_disconnected ev;
3263 3264 3265
	struct sock *sk = NULL;
	int err;

3266
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
3267

3268 3269 3270
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
3271

3272
	err = mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev),
3273
			 sk);
3274 3275

	if (sk)
3276
		sock_put(sk);
3277

3278
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
3279
			     hdev);
3280

3281 3282 3283
	return err;
}

3284
int mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
3285
			   u8 link_type, u8 addr_type, u8 status)
3286
{
3287
	struct mgmt_rp_disconnect rp;
3288 3289 3290
	struct pending_cmd *cmd;
	int err;

3291 3292 3293
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

3294
	cmd = mgmt_pending_find(MGMT_OP_DISCONNECT, hdev);
3295 3296 3297
	if (!cmd)
		return -ENOENT;

3298
	bacpy(&rp.addr.bdaddr, bdaddr);
3299
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3300

3301
	err = cmd_complete(cmd->sk, cmd->index, MGMT_OP_DISCONNECT,
3302
			   mgmt_status(status), &rp, sizeof(rp));
3303

3304
	mgmt_pending_remove(cmd);
3305 3306

	return err;
3307
}
3308

3309
int mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3310
			u8 addr_type, u8 status)
3311 3312 3313
{
	struct mgmt_ev_connect_failed ev;

3314
	bacpy(&ev.addr.bdaddr, bdaddr);
3315
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3316
	ev.status = mgmt_status(status);
3317

3318
	return mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
3319
}
3320

3321
int mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
3322 3323 3324
{
	struct mgmt_ev_pin_code_request ev;

3325
	bacpy(&ev.addr.bdaddr, bdaddr);
3326
	ev.addr.type = BDADDR_BREDR;
3327
	ev.secure = secure;
3328

3329
	return mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev),
3330
			  NULL);
3331 3332
}

3333
int mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3334
				 u8 status)
3335 3336
{
	struct pending_cmd *cmd;
3337
	struct mgmt_rp_pin_code_reply rp;
3338 3339
	int err;

3340
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
3341 3342 3343
	if (!cmd)
		return -ENOENT;

3344
	bacpy(&rp.addr.bdaddr, bdaddr);
3345
	rp.addr.type = BDADDR_BREDR;
3346

3347
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
3348
			   mgmt_status(status), &rp, sizeof(rp));
3349

3350
	mgmt_pending_remove(cmd);
3351 3352 3353 3354

	return err;
}

3355
int mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3356
				     u8 status)
3357 3358
{
	struct pending_cmd *cmd;
3359
	struct mgmt_rp_pin_code_reply rp;
3360 3361
	int err;

3362
	cmd = mgmt_pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
3363 3364 3365
	if (!cmd)
		return -ENOENT;

3366
	bacpy(&rp.addr.bdaddr, bdaddr);
3367
	rp.addr.type = BDADDR_BREDR;
3368

3369
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_PIN_CODE_NEG_REPLY,
3370
			   mgmt_status(status), &rp, sizeof(rp));
3371

3372
	mgmt_pending_remove(cmd);
3373 3374 3375

	return err;
}
3376

3377
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3378 3379
			      u8 link_type, u8 addr_type, __le32 value,
			      u8 confirm_hint)
3380 3381 3382
{
	struct mgmt_ev_user_confirm_request ev;

3383
	BT_DBG("%s", hdev->name);
3384

3385
	bacpy(&ev.addr.bdaddr, bdaddr);
3386
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3387
	ev.confirm_hint = confirm_hint;
3388
	ev.value = value;
3389

3390
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
3391
			  NULL);
3392 3393
}

3394
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
3395
			      u8 link_type, u8 addr_type)
3396 3397 3398 3399 3400
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

3401
	bacpy(&ev.addr.bdaddr, bdaddr);
3402
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3403 3404

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
3405
			  NULL);
3406 3407
}

3408
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3409 3410
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
3411 3412 3413 3414 3415
{
	struct pending_cmd *cmd;
	struct mgmt_rp_user_confirm_reply rp;
	int err;

3416
	cmd = mgmt_pending_find(opcode, hdev);
3417 3418 3419
	if (!cmd)
		return -ENOENT;

3420
	bacpy(&rp.addr.bdaddr, bdaddr);
3421
	rp.addr.type = link_to_bdaddr(link_type, addr_type);
3422
	err = cmd_complete(cmd->sk, hdev->id, opcode, mgmt_status(status),
3423
			   &rp, sizeof(rp));
3424

3425
	mgmt_pending_remove(cmd);
3426 3427 3428 3429

	return err;
}

3430
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3431
				     u8 link_type, u8 addr_type, u8 status)
3432
{
3433
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3434
					  status, MGMT_OP_USER_CONFIRM_REPLY);
3435 3436
}

3437
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3438
					 u8 link_type, u8 addr_type, u8 status)
3439
{
3440
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3441 3442
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
3443
}
3444

3445
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3446
				     u8 link_type, u8 addr_type, u8 status)
3447
{
3448
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3449
					  status, MGMT_OP_USER_PASSKEY_REPLY);
3450 3451
}

3452
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
3453
					 u8 link_type, u8 addr_type, u8 status)
3454
{
3455
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
3456 3457
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
3458 3459
}

3460 3461 3462 3463 3464 3465 3466 3467 3468 3469 3470 3471 3472 3473 3474 3475
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

3476
int mgmt_auth_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3477
		     u8 addr_type, u8 status)
3478 3479 3480
{
	struct mgmt_ev_auth_failed ev;

3481
	bacpy(&ev.addr.bdaddr, bdaddr);
3482
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
3483
	ev.status = mgmt_status(status);
3484

3485
	return mgmt_event(MGMT_EV_AUTH_FAILED, hdev, &ev, sizeof(ev), NULL);
3486
}
3487

3488 3489 3490
int mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
3491 3492
	bool changed = false;
	int err = 0;
3493 3494 3495 3496

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
3497
				     cmd_status_rsp, &mgmt_err);
3498 3499 3500
		return 0;
	}

3501 3502 3503 3504 3505 3506 3507 3508
	if (test_bit(HCI_AUTH, &hdev->flags)) {
		if (!test_and_set_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LINK_SECURITY, &hdev->dev_flags))
			changed = true;
	}

3509
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
3510
			     &match);
3511

3512 3513
	if (changed)
		err = new_settings(hdev, match.sk);
3514 3515 3516 3517 3518 3519 3520

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3521 3522 3523 3524
static int clear_eir(struct hci_dev *hdev)
{
	struct hci_cp_write_eir cp;

3525
	if (!lmp_ext_inq_capable(hdev))
3526 3527
		return 0;

3528 3529
	memset(hdev->eir, 0, sizeof(hdev->eir));

3530 3531 3532 3533 3534
	memset(&cp, 0, sizeof(cp));

	return hci_send_cmd(hdev, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
}

3535
int mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
3536 3537
{
	struct cmd_lookup match = { NULL, hdev };
3538 3539
	bool changed = false;
	int err = 0;
3540 3541 3542

	if (status) {
		u8 mgmt_err = mgmt_status(status);
3543 3544

		if (enable && test_and_clear_bit(HCI_SSP_ENABLED,
3545
						 &hdev->dev_flags))
3546 3547
			err = new_settings(hdev, NULL);

3548 3549
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
3550 3551 3552 3553 3554 3555 3556 3557 3558 3559

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
			changed = true;
3560 3561 3562 3563
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

3564 3565
	if (changed)
		err = new_settings(hdev, match.sk);
3566

3567
	if (match.sk)
3568 3569
		sock_put(match.sk);

3570 3571 3572 3573
	if (test_bit(HCI_SSP_ENABLED, &hdev->dev_flags))
		update_eir(hdev);
	else
		clear_eir(hdev);
3574

3575 3576 3577
	return err;
}

3578 3579 3580 3581 3582
static void class_rsp(struct pending_cmd *cmd, void *data)
{
	struct cmd_lookup *match = data;

	cmd_complete(cmd->sk, cmd->index, cmd->opcode, match->mgmt_status,
3583
		     match->hdev->dev_class, 3);
3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

3595
int mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
3596
				   u8 status)
3597
{
3598 3599
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
	int err = 0;
3600

3601 3602
	clear_bit(HCI_PENDING_CLASS, &hdev->dev_flags);

3603 3604 3605 3606 3607
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, class_rsp, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, class_rsp, &match);

	if (!status)
3608 3609
		err = mgmt_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				 3, NULL);
3610 3611 3612

	if (match.sk)
		sock_put(match.sk);
3613 3614 3615 3616

	return err;
}

3617
int mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
3618 3619 3620
{
	struct pending_cmd *cmd;
	struct mgmt_cp_set_local_name ev;
3621 3622 3623 3624 3625 3626 3627
	bool changed = false;
	int err = 0;

	if (memcmp(name, hdev->dev_name, sizeof(hdev->dev_name)) != 0) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
		changed = true;
	}
3628 3629 3630

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
3631
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
3632

3633
	cmd = mgmt_pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
3634 3635 3636
	if (!cmd)
		goto send_event;

3637 3638 3639 3640
	/* Always assume that either the short or the complete name has
	 * changed if there was a pending mgmt command */
	changed = true;

3641
	if (status) {
3642
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
3643
				 mgmt_status(status));
3644 3645 3646
		goto failed;
	}

3647
	err = cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0, &ev,
3648
			   sizeof(ev));
3649 3650 3651 3652
	if (err < 0)
		goto failed;

send_event:
3653 3654
	if (changed)
		err = mgmt_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev,
3655
				 sizeof(ev), cmd ? cmd->sk : NULL);
3656

3657 3658 3659 3660 3661 3662
	/* EIR is taken care of separately when powering on the
	 * adapter so only update them here if this is a name change
	 * unrelated to power on.
	 */
	if (!test_bit(HCI_INIT, &hdev->flags))
		update_eir(hdev);
3663 3664 3665 3666 3667 3668

failed:
	if (cmd)
		mgmt_pending_remove(cmd);
	return err;
}
3669

3670
int mgmt_read_local_oob_data_reply_complete(struct hci_dev *hdev, u8 *hash,
3671
					    u8 *randomizer, u8 status)
3672 3673 3674 3675
{
	struct pending_cmd *cmd;
	int err;

3676
	BT_DBG("%s status %u", hdev->name, status);
3677

3678
	cmd = mgmt_pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
3679 3680 3681 3682
	if (!cmd)
		return -ENOENT;

	if (status) {
3683 3684
		err = cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				 mgmt_status(status));
3685 3686 3687 3688 3689 3690
	} else {
		struct mgmt_rp_read_local_oob_data rp;

		memcpy(rp.hash, hash, sizeof(rp.hash));
		memcpy(rp.randomizer, randomizer, sizeof(rp.randomizer));

3691
		err = cmd_complete(cmd->sk, hdev->id,
3692 3693
				   MGMT_OP_READ_LOCAL_OOB_DATA, 0, &rp,
				   sizeof(rp));
3694 3695 3696 3697 3698 3699
	}

	mgmt_pending_remove(cmd);

	return err;
}
3700

3701 3702 3703 3704 3705 3706 3707 3708 3709 3710
int mgmt_le_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
{
	struct cmd_lookup match = { NULL, hdev };
	bool changed = false;
	int err = 0;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		if (enable && test_and_clear_bit(HCI_LE_ENABLED,
3711
						 &hdev->dev_flags))
3712
			err = new_settings(hdev, NULL);
3713

3714 3715
		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737 3738

		return err;
	}

	if (enable) {
		if (!test_and_set_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	} else {
		if (test_and_clear_bit(HCI_LE_ENABLED, &hdev->dev_flags))
			changed = true;
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	if (changed)
		err = new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

	return err;
}

3739
int mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3740 3741
		      u8 addr_type, u8 *dev_class, s8 rssi, u8 cfm_name, u8
		      ssp, u8 *eir, u16 eir_len)
3742
{
3743 3744
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *) buf;
3745
	size_t ev_size;
3746

3747 3748
	/* Leave 5 bytes for a potential CoD field */
	if (sizeof(*ev) + eir_len + 5 > sizeof(buf))
3749 3750
		return -EINVAL;

3751 3752
	memset(buf, 0, sizeof(buf));

3753
	bacpy(&ev->addr.bdaddr, bdaddr);
3754
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3755
	ev->rssi = rssi;
3756
	if (cfm_name)
3757
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_CONFIRM_NAME);
3758
	if (!ssp)
3759
		ev->flags |= __constant_cpu_to_le32(MGMT_DEV_FOUND_LEGACY_PAIRING);
3760

3761
	if (eir_len > 0)
3762
		memcpy(ev->eir, eir, eir_len);
3763

3764 3765
	if (dev_class && !eir_has_data_type(ev->eir, eir_len, EIR_CLASS_OF_DEV))
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
3766
					  dev_class, 3);
3767

3768
	ev->eir_len = cpu_to_le16(eir_len);
3769
	ev_size = sizeof(*ev) + eir_len;
3770

3771
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
3772
}
3773

3774
int mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
3775
		     u8 addr_type, s8 rssi, u8 *name, u8 name_len)
3776
{
3777 3778 3779
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
3780

3781
	ev = (struct mgmt_ev_device_found *) buf;
3782

3783 3784 3785
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
3786
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
3787 3788 3789
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
3790
				  name_len);
3791

3792
	ev->eir_len = cpu_to_le16(eir_len);
3793

3794
	return mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev,
3795
			  sizeof(*ev) + eir_len, NULL);
3796
}
3797

3798
int mgmt_start_discovery_failed(struct hci_dev *hdev, u8 status)
3799 3800
{
	struct pending_cmd *cmd;
3801
	u8 type;
3802 3803
	int err;

3804 3805
	hci_discovery_set_state(hdev, DISCOVERY_STOPPED);

3806
	cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3807 3808 3809
	if (!cmd)
		return -ENOENT;

3810 3811 3812
	type = hdev->discovery.type;

	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3813
			   &type, sizeof(type));
3814 3815 3816 3817 3818
	mgmt_pending_remove(cmd);

	return err;
}

3819 3820 3821 3822 3823 3824 3825 3826 3827
int mgmt_stop_discovery_failed(struct hci_dev *hdev, u8 status)
{
	struct pending_cmd *cmd;
	int err;

	cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
	if (!cmd)
		return -ENOENT;

3828
	err = cmd_complete(cmd->sk, hdev->id, cmd->opcode, mgmt_status(status),
3829
			   &hdev->discovery.type, sizeof(hdev->discovery.type));
3830 3831 3832 3833 3834
	mgmt_pending_remove(cmd);

	return err;
}

3835
int mgmt_discovering(struct hci_dev *hdev, u8 discovering)
3836
{
3837
	struct mgmt_ev_discovering ev;
3838 3839
	struct pending_cmd *cmd;

3840 3841
	BT_DBG("%s discovering %u", hdev->name, discovering);

3842
	if (discovering)
3843
		cmd = mgmt_pending_find(MGMT_OP_START_DISCOVERY, hdev);
3844
	else
3845
		cmd = mgmt_pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3846 3847

	if (cmd != NULL) {
3848 3849
		u8 type = hdev->discovery.type;

3850 3851
		cmd_complete(cmd->sk, hdev->id, cmd->opcode, 0, &type,
			     sizeof(type));
3852 3853 3854
		mgmt_pending_remove(cmd);
	}

3855 3856 3857 3858 3859
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

	return mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
3860
}
3861

3862
int mgmt_device_blocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3863 3864 3865 3866
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_blocked ev;

3867
	cmd = mgmt_pending_find(MGMT_OP_BLOCK_DEVICE, hdev);
3868

3869 3870
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3871

3872
	return mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &ev, sizeof(ev),
3873
			  cmd ? cmd->sk : NULL);
3874 3875
}

3876
int mgmt_device_unblocked(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 type)
3877 3878 3879 3880
{
	struct pending_cmd *cmd;
	struct mgmt_ev_device_unblocked ev;

3881
	cmd = mgmt_pending_find(MGMT_OP_UNBLOCK_DEVICE, hdev);
3882

3883 3884
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
3885

3886
	return mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &ev, sizeof(ev),
3887
			  cmd ? cmd->sk : NULL);
3888
}
3889 3890 3891

module_param(enable_hs, bool, 0644);
MODULE_PARM_DESC(enable_hs, "Enable High Speed support");