mgmt.c 183.0 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
32
#include <net/bluetooth/hci_sock.h>
33
#include <net/bluetooth/l2cap.h>
34
#include <net/bluetooth/mgmt.h>
35

36
#include "hci_request.h"
37
#include "smp.h"
38
#include "mgmt_util.h"
39

40
#define MGMT_VERSION	1
41
#define MGMT_REVISION	13
42

43 44 45 46 47 48 49
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
50
	MGMT_OP_SET_BONDABLE,
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
81
	MGMT_OP_SET_DEVICE_ID,
82
	MGMT_OP_SET_ADVERTISING,
83
	MGMT_OP_SET_BREDR,
84
	MGMT_OP_SET_STATIC_ADDRESS,
85
	MGMT_OP_SET_SCAN_PARAMS,
86
	MGMT_OP_SET_SECURE_CONN,
87
	MGMT_OP_SET_DEBUG_KEYS,
88
	MGMT_OP_SET_PRIVACY,
89
	MGMT_OP_LOAD_IRKS,
90
	MGMT_OP_GET_CONN_INFO,
91
	MGMT_OP_GET_CLOCK_INFO,
92 93
	MGMT_OP_ADD_DEVICE,
	MGMT_OP_REMOVE_DEVICE,
94
	MGMT_OP_LOAD_CONN_PARAM,
95
	MGMT_OP_READ_UNCONF_INDEX_LIST,
96
	MGMT_OP_READ_CONFIG_INFO,
97
	MGMT_OP_SET_EXTERNAL_CONFIG,
98
	MGMT_OP_SET_PUBLIC_ADDRESS,
99
	MGMT_OP_START_SERVICE_DISCOVERY,
100
	MGMT_OP_READ_LOCAL_OOB_EXT_DATA,
101
	MGMT_OP_READ_EXT_INDEX_LIST,
102
	MGMT_OP_READ_ADV_FEATURES,
103
	MGMT_OP_ADD_ADVERTISING,
104
	MGMT_OP_REMOVE_ADVERTISING,
105
	MGMT_OP_GET_ADV_SIZE_INFO,
106
	MGMT_OP_START_LIMITED_DISCOVERY,
107
	MGMT_OP_READ_EXT_INFO,
108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
131
	MGMT_EV_PASSKEY_NOTIFY,
132
	MGMT_EV_NEW_IRK,
133
	MGMT_EV_NEW_CSRK,
134 135
	MGMT_EV_DEVICE_ADDED,
	MGMT_EV_DEVICE_REMOVED,
136
	MGMT_EV_NEW_CONN_PARAM,
137
	MGMT_EV_UNCONF_INDEX_ADDED,
138
	MGMT_EV_UNCONF_INDEX_REMOVED,
139
	MGMT_EV_NEW_CONFIG_OPTIONS,
140 141
	MGMT_EV_EXT_INDEX_ADDED,
	MGMT_EV_EXT_INDEX_REMOVED,
142
	MGMT_EV_LOCAL_OOB_DATA_UPDATED,
143 144
	MGMT_EV_ADVERTISING_ADDED,
	MGMT_EV_ADVERTISING_REMOVED,
145
	MGMT_EV_EXT_INFO_CHANGED,
146 147
};

148 149 150 151 152 153
static const u16 mgmt_untrusted_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_READ_UNCONF_INDEX_LIST,
	MGMT_OP_READ_CONFIG_INFO,
	MGMT_OP_READ_EXT_INDEX_LIST,
154
	MGMT_OP_READ_EXT_INFO,
155 156 157 158 159 160 161 162 163 164 165 166 167
};

static const u16 mgmt_untrusted_events[] = {
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_UNCONF_INDEX_ADDED,
	MGMT_EV_UNCONF_INDEX_REMOVED,
	MGMT_EV_NEW_CONFIG_OPTIONS,
	MGMT_EV_EXT_INDEX_ADDED,
	MGMT_EV_EXT_INDEX_REMOVED,
168
	MGMT_EV_EXT_INFO_CHANGED,
169 170
};

171
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
172

173 174 175
#define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \
		 "\x00\x00\x00\x00\x00\x00\x00\x00"

176 177 178 179 180 181 182 183
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
184
	MGMT_STATUS_AUTH_FAILED,	/* PIN or Key Missing */
185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

249 250
static int mgmt_index_event(u16 event, struct hci_dev *hdev, void *data,
			    u16 len, int flag)
251
{
252 253
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
			       flag, NULL);
254 255
}

256 257 258 259 260 261 262
static int mgmt_limited_event(u16 event, struct hci_dev *hdev, void *data,
			      u16 len, int flag, struct sock *skip_sk)
{
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
			       flag, skip_sk);
}

263 264 265 266
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 len,
		      struct sock *skip_sk)
{
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
267
			       HCI_SOCK_TRUSTED, skip_sk);
268 269
}

270 271 272 273 274 275 276 277
static u8 le_addr_type(u8 mgmt_addr_type)
{
	if (mgmt_addr_type == BDADDR_LE_PUBLIC)
		return ADDR_LE_DEV_PUBLIC;
	else
		return ADDR_LE_DEV_RANDOM;
}

278 279 280 281 282 283 284 285
void mgmt_fill_version_info(void *ver)
{
	struct mgmt_rp_read_version *rp = ver;

	rp->version = MGMT_VERSION;
	rp->revision = cpu_to_le16(MGMT_REVISION);
}

286 287
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
288 289 290 291 292
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

293
	mgmt_fill_version_info(&rp);
294

295 296
	return mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0,
				 &rp, sizeof(rp));
297 298
}

299 300
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
301 302
{
	struct mgmt_rp_read_commands *rp;
303
	u16 num_commands, num_events;
304 305 306 307 308
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

309 310 311 312 313 314 315 316
	if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) {
		num_commands = ARRAY_SIZE(mgmt_commands);
		num_events = ARRAY_SIZE(mgmt_events);
	} else {
		num_commands = ARRAY_SIZE(mgmt_untrusted_commands);
		num_events = ARRAY_SIZE(mgmt_untrusted_events);
	}

317 318 319 320 321 322
	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

323 324
	rp->num_commands = cpu_to_le16(num_commands);
	rp->num_events = cpu_to_le16(num_events);
325

326 327 328 329 330
	if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) {
		__le16 *opcode = rp->opcodes;

		for (i = 0; i < num_commands; i++, opcode++)
			put_unaligned_le16(mgmt_commands[i], opcode);
331

332 333 334 335 336 337 338 339 340 341 342
		for (i = 0; i < num_events; i++, opcode++)
			put_unaligned_le16(mgmt_events[i], opcode);
	} else {
		__le16 *opcode = rp->opcodes;

		for (i = 0; i < num_commands; i++, opcode++)
			put_unaligned_le16(mgmt_untrusted_commands[i], opcode);

		for (i = 0; i < num_events; i++, opcode++)
			put_unaligned_le16(mgmt_untrusted_events[i], opcode);
	}
343

344 345
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0,
				rp, rp_size);
346 347 348 349 350
	kfree(rp);

	return err;
}

351 352
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
353 354
{
	struct mgmt_rp_read_index_list *rp;
355
	struct hci_dev *d;
356
	size_t rp_len;
357
	u16 count;
358
	int err;
359 360 361 362 363 364

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
365
	list_for_each_entry(d, &hci_dev_list, list) {
366
		if (d->dev_type == HCI_PRIMARY &&
367
		    !hci_dev_test_flag(d, HCI_UNCONFIGURED))
368
			count++;
369 370
	}

371 372 373
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
374
		read_unlock(&hci_dev_list_lock);
375
		return -ENOMEM;
376
	}
377

378
	count = 0;
379
	list_for_each_entry(d, &hci_dev_list, list) {
380 381 382
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
383 384
			continue;

385 386 387 388
		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
389 390
			continue;

391
		if (d->dev_type == HCI_PRIMARY &&
392
		    !hci_dev_test_flag(d, HCI_UNCONFIGURED)) {
393 394 395
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
396 397
	}

398 399 400
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

401 402
	read_unlock(&hci_dev_list_lock);

403 404
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST,
				0, rp, rp_len);
405

406 407 408
	kfree(rp);

	return err;
409 410
}

411 412 413 414 415 416 417 418 419 420 421 422 423 424 425
static int read_unconf_index_list(struct sock *sk, struct hci_dev *hdev,
				  void *data, u16 data_len)
{
	struct mgmt_rp_read_unconf_index_list *rp;
	struct hci_dev *d;
	size_t rp_len;
	u16 count;
	int err;

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
426
		if (d->dev_type == HCI_PRIMARY &&
427
		    hci_dev_test_flag(d, HCI_UNCONFIGURED))
428 429 430 431 432 433 434 435 436 437 438 439
			count++;
	}

	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		read_unlock(&hci_dev_list_lock);
		return -ENOMEM;
	}

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
440 441 442
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
443 444 445 446 447 448 449 450
			continue;

		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
			continue;

451
		if (d->dev_type == HCI_PRIMARY &&
452
		    hci_dev_test_flag(d, HCI_UNCONFIGURED)) {
453 454 455 456 457 458 459 460 461 462
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
	}

	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

	read_unlock(&hci_dev_list_lock);

463 464
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE,
				MGMT_OP_READ_UNCONF_INDEX_LIST, 0, rp, rp_len);
465 466 467 468 469 470

	kfree(rp);

	return err;
}

471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
static int read_ext_index_list(struct sock *sk, struct hci_dev *hdev,
			       void *data, u16 data_len)
{
	struct mgmt_rp_read_ext_index_list *rp;
	struct hci_dev *d;
	size_t rp_len;
	u16 count;
	int err;

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
486
		if (d->dev_type == HCI_PRIMARY || d->dev_type == HCI_AMP)
487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509
			count++;
	}

	rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		read_unlock(&hci_dev_list_lock);
		return -ENOMEM;
	}

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
			continue;

		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
			continue;

510
		if (d->dev_type == HCI_PRIMARY) {
511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546
			if (hci_dev_test_flag(d, HCI_UNCONFIGURED))
				rp->entry[count].type = 0x01;
			else
				rp->entry[count].type = 0x00;
		} else if (d->dev_type == HCI_AMP) {
			rp->entry[count].type = 0x02;
		} else {
			continue;
		}

		rp->entry[count].bus = d->bus;
		rp->entry[count++].index = cpu_to_le16(d->id);
		BT_DBG("Added hci%u", d->id);
	}

	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count);

	read_unlock(&hci_dev_list_lock);

	/* If this command is called at least once, then all the
	 * default index and unconfigured index events are disabled
	 * and from now on only extended index events are used.
	 */
	hci_sock_set_flag(sk, HCI_MGMT_EXT_INDEX_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_INDEX_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_UNCONF_INDEX_EVENTS);

	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE,
				MGMT_OP_READ_EXT_INDEX_LIST, 0, rp, rp_len);

	kfree(rp);

	return err;
}

547 548 549
static bool is_configured(struct hci_dev *hdev)
{
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) &&
550
	    !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED))
551 552 553 554 555 556 557 558 559
		return false;

	if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) &&
	    !bacmp(&hdev->public_addr, BDADDR_ANY))
		return false;

	return true;
}

560 561 562 563
static __le32 get_missing_options(struct hci_dev *hdev)
{
	u32 options = 0;

564
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) &&
565
	    !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED))
566 567
		options |= MGMT_OPTION_EXTERNAL_CONFIG;

568 569 570 571 572 573 574
	if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) &&
	    !bacmp(&hdev->public_addr, BDADDR_ANY))
		options |= MGMT_OPTION_PUBLIC_ADDRESS;

	return cpu_to_le32(options);
}

575 576 577 578
static int new_options(struct hci_dev *hdev, struct sock *skip)
{
	__le32 options = get_missing_options(hdev);

579 580
	return mgmt_limited_event(MGMT_EV_NEW_CONFIG_OPTIONS, hdev, &options,
				  sizeof(options), HCI_MGMT_OPTION_EVENTS, skip);
581 582
}

583 584 585 586
static int send_options_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
{
	__le32 options = get_missing_options(hdev);

587 588
	return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &options,
				 sizeof(options));
589 590
}

591 592 593 594
static int read_config_info(struct sock *sk, struct hci_dev *hdev,
			    void *data, u16 data_len)
{
	struct mgmt_rp_read_config_info rp;
595
	u32 options = 0;
596 597 598 599 600 601 602

	BT_DBG("sock %p %s", sk, hdev->name);

	hci_dev_lock(hdev);

	memset(&rp, 0, sizeof(rp));
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
603

604 605 606
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks))
		options |= MGMT_OPTION_EXTERNAL_CONFIG;

607
	if (hdev->set_bdaddr)
608 609 610 611
		options |= MGMT_OPTION_PUBLIC_ADDRESS;

	rp.supported_options = cpu_to_le32(options);
	rp.missing_options = get_missing_options(hdev);
612 613 614

	hci_dev_unlock(hdev);

615 616
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_CONFIG_INFO, 0,
				 &rp, sizeof(rp));
617 618
}

619 620 621 622 623
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
624
	settings |= MGMT_SETTING_BONDABLE;
625
	settings |= MGMT_SETTING_DEBUG_KEYS;
626 627
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
628

629
	if (lmp_bredr_capable(hdev)) {
630 631
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
632 633
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
634 635 636 637 638

		if (lmp_ssp_capable(hdev)) {
			settings |= MGMT_SETTING_SSP;
			settings |= MGMT_SETTING_HS;
		}
639

640
		if (lmp_sc_capable(hdev))
641
			settings |= MGMT_SETTING_SECURE_CONN;
642
	}
643

644
	if (lmp_le_capable(hdev)) {
645
		settings |= MGMT_SETTING_LE;
646
		settings |= MGMT_SETTING_ADVERTISING;
647
		settings |= MGMT_SETTING_SECURE_CONN;
648
		settings |= MGMT_SETTING_PRIVACY;
649
		settings |= MGMT_SETTING_STATIC_ADDRESS;
650
	}
651

652 653
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) ||
	    hdev->set_bdaddr)
654 655
		settings |= MGMT_SETTING_CONFIGURATION;

656 657 658 659 660 661 662
	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

663
	if (hdev_is_powered(hdev))
664 665
		settings |= MGMT_SETTING_POWERED;

666
	if (hci_dev_test_flag(hdev, HCI_CONNECTABLE))
667 668
		settings |= MGMT_SETTING_CONNECTABLE;

669
	if (hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE))
670 671
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

672
	if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE))
673 674
		settings |= MGMT_SETTING_DISCOVERABLE;

675
	if (hci_dev_test_flag(hdev, HCI_BONDABLE))
676
		settings |= MGMT_SETTING_BONDABLE;
677

678
	if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
679 680
		settings |= MGMT_SETTING_BREDR;

681
	if (hci_dev_test_flag(hdev, HCI_LE_ENABLED))
682 683
		settings |= MGMT_SETTING_LE;

684
	if (hci_dev_test_flag(hdev, HCI_LINK_SECURITY))
685 686
		settings |= MGMT_SETTING_LINK_SECURITY;

687
	if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
688 689
		settings |= MGMT_SETTING_SSP;

690
	if (hci_dev_test_flag(hdev, HCI_HS_ENABLED))
691 692
		settings |= MGMT_SETTING_HS;

693
	if (hci_dev_test_flag(hdev, HCI_ADVERTISING))
694 695
		settings |= MGMT_SETTING_ADVERTISING;

696
	if (hci_dev_test_flag(hdev, HCI_SC_ENABLED))
697 698
		settings |= MGMT_SETTING_SECURE_CONN;

699
	if (hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS))
700 701
		settings |= MGMT_SETTING_DEBUG_KEYS;

702
	if (hci_dev_test_flag(hdev, HCI_PRIVACY))
703 704
		settings |= MGMT_SETTING_PRIVACY;

705 706 707 708 709
	/* The current setting for static address has two purposes. The
	 * first is to indicate if the static address will be used and
	 * the second is to indicate if it is actually set.
	 *
	 * This means if the static address is not configured, this flag
710
	 * will never be set. If the address is configured, then if the
711 712 713 714 715 716
	 * address is actually used decides if the flag is set or not.
	 *
	 * For single mode LE only controllers and dual-mode controllers
	 * with BR/EDR disabled, the existence of the static address will
	 * be evaluated.
	 */
717
	if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) ||
718
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) ||
719 720 721 722 723
	    !bacmp(&hdev->bdaddr, BDADDR_ANY)) {
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			settings |= MGMT_SETTING_STATIC_ADDRESS;
	}

724 725 726
	return settings;
}

727 728 729 730 731 732 733 734 735 736 737 738
static struct mgmt_pending_cmd *pending_find(u16 opcode, struct hci_dev *hdev)
{
	return mgmt_pending_find(HCI_CHANNEL_CONTROL, opcode, hdev);
}

static struct mgmt_pending_cmd *pending_find_data(u16 opcode,
						  struct hci_dev *hdev,
						  const void *data)
{
	return mgmt_pending_find_data(HCI_CHANNEL_CONTROL, opcode, hdev, data);
}

739
u8 mgmt_get_adv_discov_flags(struct hci_dev *hdev)
740
{
741
	struct mgmt_pending_cmd *cmd;
742 743 744 745

	/* If there's a pending mgmt command the flags will not yet have
	 * their final values, so check for this first.
	 */
746
	cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
747 748 749 750 751 752 753
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
		if (cp->val == 0x01)
			return LE_AD_GENERAL;
		else if (cp->val == 0x02)
			return LE_AD_LIMITED;
	} else {
754
		if (hci_dev_test_flag(hdev, HCI_LIMITED_DISCOVERABLE))
755
			return LE_AD_LIMITED;
756
		else if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE))
757 758 759 760 761 762
			return LE_AD_GENERAL;
	}

	return 0;
}

763
bool mgmt_get_connectable(struct hci_dev *hdev)
764 765
{
	struct mgmt_pending_cmd *cmd;
766

767 768 769 770 771 772
	/* If there's a pending mgmt command the flag will not yet have
	 * it's final value, so check for this first.
	 */
	cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
773

774
		return cp->val;
775 776
	}

777 778
	return hci_dev_test_flag(hdev, HCI_CONNECTABLE);
}
779

780 781 782
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
783
					    service_cache.work);
784
	struct hci_request req;
785

786
	if (!hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE))
787 788
		return;

789 790
	hci_req_init(&req, hdev);

791 792
	hci_dev_lock(hdev);

793
	__hci_req_update_eir(&req);
794
	__hci_req_update_class(&req);
795 796

	hci_dev_unlock(hdev);
797 798

	hci_req_run(&req, NULL);
799 800
}

801 802 803 804 805 806 807 808
static void rpa_expired(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
					    rpa_expired.work);
	struct hci_request req;

	BT_DBG("");

809
	hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
810

811
	if (!hci_dev_test_flag(hdev, HCI_ADVERTISING))
812 813 814
		return;

	/* The generation of a new RPA and programming it into the
815 816
	 * controller happens in the hci_req_enable_advertising()
	 * function.
817 818
	 */
	hci_req_init(&req, hdev);
819
	__hci_req_enable_advertising(&req);
820 821 822
	hci_req_run(&req, NULL);
}

823
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
824
{
825
	if (hci_dev_test_and_set_flag(hdev, HCI_MGMT))
826 827
		return;

828
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
829
	INIT_DELAYED_WORK(&hdev->rpa_expired, rpa_expired);
830

831 832 833 834 835
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
836
	hci_dev_clear_flag(hdev, HCI_BONDABLE);
837 838
}

839
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
840
				void *data, u16 data_len)
841
{
842
	struct mgmt_rp_read_info rp;
843

844
	BT_DBG("sock %p %s", sk, hdev->name);
845

846
	hci_dev_lock(hdev);
847

848 849
	memset(&rp, 0, sizeof(rp));

850
	bacpy(&rp.bdaddr, &hdev->bdaddr);
851

852
	rp.version = hdev->hci_ver;
853
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
854 855 856

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
857

858
	memcpy(rp.dev_class, hdev->dev_class, 3);
859

860
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
861
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
862

863
	hci_dev_unlock(hdev);
864

865 866
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
				 sizeof(rp));
867 868
}

869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914
static int read_ext_controller_info(struct sock *sk, struct hci_dev *hdev,
				    void *data, u16 data_len)
{
	struct mgmt_rp_read_ext_info rp;

	BT_DBG("sock %p %s", sk, hdev->name);

	hci_dev_lock(hdev);

	memset(&rp, 0, sizeof(rp));

	bacpy(&rp.bdaddr, &hdev->bdaddr);

	rp.version = hdev->hci_ver;
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));

	rp.eir_len = cpu_to_le16(0);

	hci_dev_unlock(hdev);

	/* If this command is called at least once, then the events
	 * for class of device and local name changes are disabled
	 * and only the new extended controller information event
	 * is used.
	 */
	hci_sock_set_flag(sk, HCI_MGMT_EXT_INFO_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_DEV_CLASS_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_LOCAL_NAME_EVENTS);

	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_EXT_INFO, 0, &rp,
				 sizeof(rp));
}

static int ext_info_changed(struct hci_dev *hdev, struct sock *skip)
{
	struct mgmt_ev_ext_info_changed ev;

	ev.eir_len = cpu_to_le16(0);

	return mgmt_limited_event(MGMT_EV_EXT_INFO_CHANGED, hdev, &ev,
				  sizeof(ev), HCI_MGMT_EXT_INFO_EVENTS, skip);
}

915
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
916
{
917
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
918

919 920
	return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &settings,
				 sizeof(settings));
921 922
}

923
static void clean_up_hci_complete(struct hci_dev *hdev, u8 status, u16 opcode)
924 925 926
{
	BT_DBG("%s status 0x%02x", hdev->name, status);

927 928
	if (hci_conn_count(hdev) == 0) {
		cancel_delayed_work(&hdev->power_off);
929
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
930
	}
931 932
}

933
void mgmt_advertising_added(struct sock *sk, struct hci_dev *hdev, u8 instance)
934 935 936 937 938 939 940 941
{
	struct mgmt_ev_advertising_added ev;

	ev.instance = instance;

	mgmt_event(MGMT_EV_ADVERTISING_ADDED, hdev, &ev, sizeof(ev), sk);
}

942 943
void mgmt_advertising_removed(struct sock *sk, struct hci_dev *hdev,
			      u8 instance)
944 945 946 947 948 949 950 951
{
	struct mgmt_ev_advertising_removed ev;

	ev.instance = instance;

	mgmt_event(MGMT_EV_ADVERTISING_REMOVED, hdev, &ev, sizeof(ev), sk);
}

952 953 954 955 956 957 958 959
static void cancel_adv_timeout(struct hci_dev *hdev)
{
	if (hdev->adv_instance_timeout) {
		hdev->adv_instance_timeout = 0;
		cancel_delayed_work(&hdev->adv_instance_expire);
	}
}

960 961 962 963
static int clean_up_hci_state(struct hci_dev *hdev)
{
	struct hci_request req;
	struct hci_conn *conn;
964 965
	bool discov_stopped;
	int err;
966 967 968 969 970 971 972 973 974

	hci_req_init(&req, hdev);

	if (test_bit(HCI_ISCAN, &hdev->flags) ||
	    test_bit(HCI_PSCAN, &hdev->flags)) {
		u8 scan = 0x00;
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	}

975
	hci_req_clear_adv_instance(hdev, NULL, NULL, 0x00, false);
976

977
	if (hci_dev_test_flag(hdev, HCI_LE_ADV))
978
		__hci_req_disable_advertising(&req);
979

980
	discov_stopped = hci_req_stop_discovery(&req);
981 982

	list_for_each_entry(conn, &hdev->conn_hash.list, list) {
983 984
		/* 0x15 == Terminated due to Power Off */
		__hci_abort_conn(&req, conn, 0x15);
985 986
	}

987 988 989 990 991
	err = hci_req_run(&req, clean_up_hci_complete);
	if (!err && discov_stopped)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);

	return err;
992 993
}

994
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
995
		       u16 len)
996
{
997
	struct mgmt_mode *cp = data;
998
	struct mgmt_pending_cmd *cmd;
999
	int err;
1000

1001
	BT_DBG("request for %s", hdev->name);
1002

1003
	if (cp->val != 0x00 && cp->val != 0x01)
1004 1005
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				       MGMT_STATUS_INVALID_PARAMS);
1006

1007
	hci_dev_lock(hdev);
1008

1009
	if (pending_find(MGMT_OP_SET_POWERED, hdev)) {
1010 1011
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				      MGMT_STATUS_BUSY);
1012 1013 1014
		goto failed;
	}

1015
	if (!!cp->val == hdev_is_powered(hdev)) {
1016
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
1017 1018 1019
		goto failed;
	}

1020
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
1021 1022
	if (!cmd) {
		err = -ENOMEM;
1023
		goto failed;
1024
	}
1025

1026
	if (cp->val) {
1027
		queue_work(hdev->req_workqueue, &hdev->power_on);
1028 1029 1030 1031
		err = 0;
	} else {
		/* Disconnect connections, stop scans, etc */
		err = clean_up_hci_state(hdev);
1032 1033 1034
		if (!err)
			queue_delayed_work(hdev->req_workqueue, &hdev->power_off,
					   HCI_POWER_OFF_TIMEOUT);
1035

1036 1037
		/* ENODATA means there were no HCI commands queued */
		if (err == -ENODATA) {
1038
			cancel_delayed_work(&hdev->power_off);
1039 1040 1041 1042
			queue_work(hdev->req_workqueue, &hdev->power_off.work);
			err = 0;
		}
	}
1043 1044

failed:
1045
	hci_dev_unlock(hdev);
1046
	return err;
1047 1048
}

1049 1050
static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
1051
	__le32 ev = cpu_to_le32(get_current_settings(hdev));
1052

1053 1054
	return mgmt_limited_event(MGMT_EV_NEW_SETTINGS, hdev, &ev,
				  sizeof(ev), HCI_MGMT_SETTING_EVENTS, skip);
1055 1056
}

1057 1058 1059 1060 1061
int mgmt_new_settings(struct hci_dev *hdev)
{
	return new_settings(hdev, NULL);
}

1062 1063 1064 1065 1066 1067
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

1068
static void settings_rsp(struct mgmt_pending_cmd *cmd, void *data)
1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

1084
static void cmd_status_rsp(struct mgmt_pending_cmd *cmd, void *data)
1085 1086 1087
{
	u8 *status = data;

1088
	mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
1089 1090 1091
	mgmt_pending_remove(cmd);
}

1092
static void cmd_complete_rsp(struct mgmt_pending_cmd *cmd, void *data)
1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105
{
	if (cmd->cmd_complete) {
		u8 *status = data;

		cmd->cmd_complete(cmd, *status);
		mgmt_pending_remove(cmd);

		return;
	}

	cmd_status_rsp(cmd, data);
}

1106
static int generic_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
1107
{
1108 1109
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, cmd->param_len);
1110 1111
}

1112
static int addr_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
1113
{
1114 1115
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, sizeof(struct mgmt_addr_info));
1116 1117
}

1118 1119 1120 1121
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
1122
	else if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1123 1124 1125 1126 1127 1128 1129 1130 1131
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
1132
	else if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED))
1133 1134 1135 1136 1137
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

1138
void mgmt_set_discoverable_complete(struct hci_dev *hdev, u8 status)
1139
{
1140
	struct mgmt_pending_cmd *cmd;
1141 1142 1143 1144 1145

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

1146
	cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
1147 1148 1149 1150 1151
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
1152
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1153
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1154 1155 1156
		goto remove_cmd;
	}

1157 1158 1159 1160
	if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
	    hdev->discov_timeout > 0) {
		int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
		queue_delayed_work(hdev->req_workqueue, &hdev->discov_off, to);
1161
	}
1162 1163

	send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1164
	new_settings(hdev, cmd->sk);
1165

1166 1167 1168 1169 1170 1171 1172
remove_cmd:
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1173
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
1174
			    u16 len)
1175
{
1176
	struct mgmt_cp_set_discoverable *cp = data;
1177
	struct mgmt_pending_cmd *cmd;
1178
	u16 timeout;
1179 1180
	int err;

1181
	BT_DBG("request for %s", hdev->name);
1182

1183 1184
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) &&
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1185 1186
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_REJECTED);
1187

1188
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
1189 1190
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1191

1192
	timeout = __le16_to_cpu(cp->timeout);
1193 1194 1195 1196 1197 1198

	/* Disabling discoverable requires that no timeout is set,
	 * and enabling limited discoverable requires a timeout.
	 */
	if ((cp->val == 0x00 && timeout > 0) ||
	    (cp->val == 0x02 && timeout == 0))
1199 1200
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1201

1202
	hci_dev_lock(hdev);
1203

1204
	if (!hdev_is_powered(hdev) && timeout > 0) {
1205 1206
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_NOT_POWERED);
1207 1208 1209
		goto failed;
	}

1210 1211
	if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
	    pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1212 1213
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_BUSY);
1214 1215 1216
		goto failed;
	}

1217
	if (!hci_dev_test_flag(hdev, HCI_CONNECTABLE)) {
1218 1219
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_REJECTED);
1220 1221 1222 1223
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
1224 1225
		bool changed = false;

1226 1227 1228 1229
		/* Setting limited discoverable when powered off is
		 * not a valid operation since it requires a timeout
		 * and so no need to check HCI_LIMITED_DISCOVERABLE.
		 */
1230
		if (!!cp->val != hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) {
1231
			hci_dev_change_flag(hdev, HCI_DISCOVERABLE);
1232 1233 1234
			changed = true;
		}

1235
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1236 1237 1238 1239 1240 1241
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1242 1243 1244
		goto failed;
	}

1245 1246 1247 1248
	/* If the current mode is the same, then just update the timeout
	 * value with the new value. And if only the timeout gets updated,
	 * then no need for any HCI transactions.
	 */
1249 1250 1251
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
	    (cp->val == 0x02) == hci_dev_test_flag(hdev,
						   HCI_LIMITED_DISCOVERABLE)) {
1252 1253
		cancel_delayed_work(&hdev->discov_off);
		hdev->discov_timeout = timeout;
1254

1255 1256
		if (cp->val && hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
1257 1258
			queue_delayed_work(hdev->req_workqueue,
					   &hdev->discov_off, to);
1259 1260
		}

1261
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1262 1263 1264
		goto failed;
	}

1265
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1266 1267
	if (!cmd) {
		err = -ENOMEM;
1268
		goto failed;
1269
	}
1270

1271 1272 1273 1274 1275 1276 1277
	/* Cancel any potential discoverable timeout that might be
	 * still active and store new timeout value. The arming of
	 * the timeout happens in the complete handler.
	 */
	cancel_delayed_work(&hdev->discov_off);
	hdev->discov_timeout = timeout;

1278 1279 1280 1281 1282
	if (cp->val)
		hci_dev_set_flag(hdev, HCI_DISCOVERABLE);
	else
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);

1283 1284
	/* Limited discoverable mode */
	if (cp->val == 0x02)
1285
		hci_dev_set_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1286
	else
1287
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1288

1289 1290
	queue_work(hdev->req_workqueue, &hdev->discoverable_update);
	err = 0;
1291 1292

failed:
1293
	hci_dev_unlock(hdev);
1294 1295 1296
	return err;
}

1297
void mgmt_set_connectable_complete(struct hci_dev *hdev, u8 status)
1298
{
1299
	struct mgmt_pending_cmd *cmd;
1300 1301 1302 1303 1304

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

1305
	cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
1306 1307 1308
	if (!cmd)
		goto unlock;

1309 1310
	if (status) {
		u8 mgmt_err = mgmt_status(status);
1311
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1312 1313 1314
		goto remove_cmd;
	}

1315
	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);
1316
	new_settings(hdev, cmd->sk);
1317

1318
remove_cmd:
1319 1320 1321 1322 1323 1324
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1325 1326 1327 1328 1329 1330
static int set_connectable_update_settings(struct hci_dev *hdev,
					   struct sock *sk, u8 val)
{
	bool changed = false;
	int err;

1331
	if (!!val != hci_dev_test_flag(hdev, HCI_CONNECTABLE))
1332 1333 1334
		changed = true;

	if (val) {
1335
		hci_dev_set_flag(hdev, HCI_CONNECTABLE);
1336
	} else {
1337 1338
		hci_dev_clear_flag(hdev, HCI_CONNECTABLE);
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
1339 1340 1341 1342 1343 1344
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
	if (err < 0)
		return err;

1345
	if (changed) {
1346
		hci_req_update_scan(hdev);
1347
		hci_update_background_scan(hdev);
1348
		return new_settings(hdev, sk);
1349
	}
1350 1351 1352 1353

	return 0;
}

1354
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1355
			   u16 len)
1356
{
1357
	struct mgmt_mode *cp = data;
1358
	struct mgmt_pending_cmd *cmd;
1359 1360
	int err;

1361
	BT_DBG("request for %s", hdev->name);
1362

1363 1364
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) &&
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1365 1366
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				       MGMT_STATUS_REJECTED);
1367

1368
	if (cp->val != 0x00 && cp->val != 0x01)
1369 1370
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1371

1372
	hci_dev_lock(hdev);
1373

1374
	if (!hdev_is_powered(hdev)) {
1375
		err = set_connectable_update_settings(hdev, sk, cp->val);
1376 1377 1378
		goto failed;
	}

1379 1380
	if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
	    pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1381 1382
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				      MGMT_STATUS_BUSY);
1383 1384 1385
		goto failed;
	}

1386
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1387 1388
	if (!cmd) {
		err = -ENOMEM;
1389
		goto failed;
1390
	}
1391

1392 1393 1394 1395 1396
	if (cp->val) {
		hci_dev_set_flag(hdev, HCI_CONNECTABLE);
	} else {
		if (hdev->discov_timeout > 0)
			cancel_delayed_work(&hdev->discov_off);
1397

1398 1399 1400
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
		hci_dev_clear_flag(hdev, HCI_CONNECTABLE);
1401
	}
1402

1403 1404
	queue_work(hdev->req_workqueue, &hdev->connectable_update);
	err = 0;
1405 1406

failed:
1407
	hci_dev_unlock(hdev);
1408 1409 1410
	return err;
}

1411
static int set_bondable(struct sock *sk, struct hci_dev *hdev, void *data,
1412
			u16 len)
1413
{
1414
	struct mgmt_mode *cp = data;
1415
	bool changed;
1416 1417
	int err;

1418
	BT_DBG("request for %s", hdev->name);
1419

1420
	if (cp->val != 0x00 && cp->val != 0x01)
1421 1422
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BONDABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1423

1424
	hci_dev_lock(hdev);
1425 1426

	if (cp->val)
1427
		changed = !hci_dev_test_and_set_flag(hdev, HCI_BONDABLE);
1428
	else
1429
		changed = hci_dev_test_and_clear_flag(hdev, HCI_BONDABLE);
1430

1431
	err = send_settings_rsp(sk, MGMT_OP_SET_BONDABLE, hdev);
1432
	if (err < 0)
1433
		goto unlock;
1434

1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445
	if (changed) {
		/* In limited privacy mode the change of bondable mode
		 * may affect the local advertising address.
		 */
		if (hdev_is_powered(hdev) &&
		    hci_dev_test_flag(hdev, HCI_ADVERTISING) &&
		    hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
		    hci_dev_test_flag(hdev, HCI_LIMITED_PRIVACY))
			queue_work(hdev->req_workqueue,
				   &hdev->discoverable_update);

1446
		err = new_settings(hdev, sk);
1447
	}
1448

1449
unlock:
1450
	hci_dev_unlock(hdev);
1451 1452 1453
	return err;
}

1454 1455
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1456 1457
{
	struct mgmt_mode *cp = data;
1458
	struct mgmt_pending_cmd *cmd;
1459
	u8 val, status;
1460 1461
	int err;

1462
	BT_DBG("request for %s", hdev->name);
1463

1464 1465
	status = mgmt_bredr_support(hdev);
	if (status)
1466 1467
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				       status);
1468

1469
	if (cp->val != 0x00 && cp->val != 0x01)
1470 1471
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				       MGMT_STATUS_INVALID_PARAMS);
1472

1473 1474
	hci_dev_lock(hdev);

1475
	if (!hdev_is_powered(hdev)) {
1476 1477
		bool changed = false;

1478
		if (!!cp->val != hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) {
1479
			hci_dev_change_flag(hdev, HCI_LINK_SECURITY);
1480 1481 1482 1483 1484 1485 1486 1487 1488 1489
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1490 1491 1492
		goto failed;
	}

1493
	if (pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1494 1495
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				      MGMT_STATUS_BUSY);
1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1523
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1524 1525
{
	struct mgmt_mode *cp = data;
1526
	struct mgmt_pending_cmd *cmd;
1527
	u8 status;
1528 1529
	int err;

1530
	BT_DBG("request for %s", hdev->name);
1531

1532 1533
	status = mgmt_bredr_support(hdev);
	if (status)
1534
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);
1535

1536
	if (!lmp_ssp_capable(hdev))
1537 1538
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				       MGMT_STATUS_NOT_SUPPORTED);
1539

1540
	if (cp->val != 0x00 && cp->val != 0x01)
1541 1542
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				       MGMT_STATUS_INVALID_PARAMS);
1543

1544
	hci_dev_lock(hdev);
1545

1546
	if (!hdev_is_powered(hdev)) {
1547
		bool changed;
1548

1549
		if (cp->val) {
1550 1551
			changed = !hci_dev_test_and_set_flag(hdev,
							     HCI_SSP_ENABLED);
1552
		} else {
1553 1554
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_SSP_ENABLED);
1555
			if (!changed)
1556 1557
				changed = hci_dev_test_and_clear_flag(hdev,
								      HCI_HS_ENABLED);
1558
			else
1559
				hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
1560 1561 1562 1563 1564 1565 1566 1567 1568
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1569 1570 1571
		goto failed;
	}

1572
	if (pending_find(MGMT_OP_SET_SSP, hdev)) {
1573 1574
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				      MGMT_STATUS_BUSY);
1575 1576 1577
		goto failed;
	}

1578
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
1579 1580 1581 1582 1583 1584 1585 1586 1587 1588
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1589
	if (!cp->val && hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS))
1590 1591 1592
		hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE,
			     sizeof(cp->val), &cp->val);

1593
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val);
1594 1595 1596 1597 1598 1599 1600 1601 1602 1603
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1604
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1605 1606
{
	struct mgmt_mode *cp = data;
1607
	bool changed;
1608
	u8 status;
1609
	int err;
1610

1611
	BT_DBG("request for %s", hdev->name);
1612

1613 1614
	status = mgmt_bredr_support(hdev);
	if (status)
1615
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1616

1617
	if (!lmp_ssp_capable(hdev))
1618 1619
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_NOT_SUPPORTED);
1620

1621
	if (!hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
1622 1623
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_REJECTED);
1624

1625
	if (cp->val != 0x00 && cp->val != 0x01)
1626 1627
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_INVALID_PARAMS);
1628

1629 1630
	hci_dev_lock(hdev);

1631
	if (pending_find(MGMT_OP_SET_SSP, hdev)) {
1632 1633
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				      MGMT_STATUS_BUSY);
1634 1635 1636
		goto unlock;
	}

1637
	if (cp->val) {
1638
		changed = !hci_dev_test_and_set_flag(hdev, HCI_HS_ENABLED);
1639 1640
	} else {
		if (hdev_is_powered(hdev)) {
1641 1642
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					      MGMT_STATUS_REJECTED);
1643 1644 1645
			goto unlock;
		}

1646
		changed = hci_dev_test_and_clear_flag(hdev, HCI_HS_ENABLED);
1647
	}
1648 1649 1650 1651 1652 1653 1654

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1655

1656 1657 1658
unlock:
	hci_dev_unlock(hdev);
	return err;
1659 1660
}

1661
static void le_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1662 1663 1664
{
	struct cmd_lookup match = { NULL, hdev };

1665 1666
	hci_dev_lock(hdev);

1667 1668 1669 1670 1671
	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
1672
		goto unlock;
1673 1674 1675 1676 1677 1678 1679 1680
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
1681 1682 1683 1684 1685 1686

	/* Make sure the controller has a good default for
	 * advertising data. Restrict the update to when LE
	 * has actually been enabled. During power on, the
	 * update in powered_update_hci will take care of it.
	 */
1687
	if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
1688 1689 1690
		struct hci_request req;

		hci_req_init(&req, hdev);
1691 1692
		__hci_req_update_adv_data(&req, 0x00);
		__hci_req_update_scan_rsp_data(&req, 0x00);
1693
		hci_req_run(&req, NULL);
1694
		hci_update_background_scan(hdev);
1695
	}
1696 1697 1698

unlock:
	hci_dev_unlock(hdev);
1699 1700
}

1701
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1702 1703 1704
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
1705
	struct mgmt_pending_cmd *cmd;
1706
	struct hci_request req;
1707
	int err;
1708
	u8 val, enabled;
1709

1710
	BT_DBG("request for %s", hdev->name);
1711

1712
	if (!lmp_le_capable(hdev))
1713 1714
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_NOT_SUPPORTED);
1715

1716
	if (cp->val != 0x00 && cp->val != 0x01)
1717 1718
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_INVALID_PARAMS);
1719

1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732
	/* Bluetooth single mode LE only controllers or dual-mode
	 * controllers configured as LE only devices, do not allow
	 * switching LE off. These have either LE enabled explicitly
	 * or BR/EDR has been previously switched off.
	 *
	 * When trying to enable an already enabled LE, then gracefully
	 * send a positive response. Trying to disable it however will
	 * result into rejection.
	 */
	if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
		if (cp->val == 0x01)
			return send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);

1733 1734
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_REJECTED);
1735
	}
1736

1737
	hci_dev_lock(hdev);
1738 1739

	val = !!cp->val;
1740
	enabled = lmp_host_le_capable(hdev);
1741

1742
	if (!val)
1743
		hci_req_clear_adv_instance(hdev, NULL, NULL, 0x00, true);
1744

1745
	if (!hdev_is_powered(hdev) || val == enabled) {
1746 1747
		bool changed = false;

1748
		if (val != hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
1749
			hci_dev_change_flag(hdev, HCI_LE_ENABLED);
1750 1751 1752
			changed = true;
		}

1753
		if (!val && hci_dev_test_flag(hdev, HCI_ADVERTISING)) {
1754
			hci_dev_clear_flag(hdev, HCI_ADVERTISING);
1755 1756 1757
			changed = true;
		}

1758 1759
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1760
			goto unlock;
1761 1762 1763 1764

		if (changed)
			err = new_settings(hdev, sk);

1765
		goto unlock;
1766 1767
	}

1768 1769
	if (pending_find(MGMT_OP_SET_LE, hdev) ||
	    pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1770 1771
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				      MGMT_STATUS_BUSY);
1772
		goto unlock;
1773 1774 1775 1776 1777
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1778
		goto unlock;
1779 1780
	}

1781 1782
	hci_req_init(&req, hdev);

1783 1784 1785 1786
	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1787
		hci_cp.simul = 0x00;
1788
	} else {
1789
		if (hci_dev_test_flag(hdev, HCI_LE_ADV))
1790
			__hci_req_disable_advertising(&req);
1791 1792
	}

1793 1794 1795 1796
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1797
	if (err < 0)
1798 1799
		mgmt_pending_remove(cmd);

1800 1801
unlock:
	hci_dev_unlock(hdev);
1802 1803 1804
	return err;
}

1805 1806 1807 1808 1809 1810 1811 1812
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
1813
	struct mgmt_pending_cmd *cmd;
1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1847 1848
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
1849
	struct mgmt_pending_cmd *cmd;
1850 1851 1852

	hci_dev_lock(hdev);

1853
	cmd = pending_find(mgmt_op, hdev);
1854 1855 1856
	if (!cmd)
		goto unlock;

1857 1858
	mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode,
			  mgmt_status(status), hdev->dev_class, 3);
1859 1860 1861 1862 1863 1864 1865

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1866
static void add_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1867 1868 1869 1870 1871 1872
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1873
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1874
{
1875
	struct mgmt_cp_add_uuid *cp = data;
1876
	struct mgmt_pending_cmd *cmd;
1877
	struct hci_request req;
1878 1879 1880
	struct bt_uuid *uuid;
	int err;

1881
	BT_DBG("request for %s", hdev->name);
1882

1883
	hci_dev_lock(hdev);
1884

1885
	if (pending_eir_or_class(hdev)) {
1886 1887
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
				      MGMT_STATUS_BUSY);
1888 1889 1890
		goto failed;
	}

1891
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1892 1893 1894 1895 1896 1897
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1898
	uuid->svc_hint = cp->svc_hint;
1899
	uuid->size = get_uuid_size(cp->uuid);
1900

1901
	list_add_tail(&uuid->list, &hdev->uuids);
1902

1903
	hci_req_init(&req, hdev);
1904

1905
	__hci_req_update_class(&req);
1906
	__hci_req_update_eir(&req);
1907

1908 1909 1910 1911
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1912

1913 1914
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
					hdev->dev_class, 3);
1915 1916 1917 1918
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1919
	if (!cmd) {
1920
		err = -ENOMEM;
1921 1922 1923 1924
		goto failed;
	}

	err = 0;
1925 1926

failed:
1927
	hci_dev_unlock(hdev);
1928 1929 1930
	return err;
}

1931 1932 1933 1934 1935
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

1936
	if (!hci_dev_test_and_set_flag(hdev, HCI_SERVICE_CACHE)) {
1937 1938
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1939 1940 1941 1942 1943 1944
		return true;
	}

	return false;
}

1945
static void remove_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1946 1947 1948 1949 1950 1951
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1952
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1953
		       u16 len)
1954
{
1955
	struct mgmt_cp_remove_uuid *cp = data;
1956
	struct mgmt_pending_cmd *cmd;
1957
	struct bt_uuid *match, *tmp;
1958
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1959
	struct hci_request req;
1960 1961
	int err, found;

1962
	BT_DBG("request for %s", hdev->name);
1963

1964
	hci_dev_lock(hdev);
1965

1966
	if (pending_eir_or_class(hdev)) {
1967 1968
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
				      MGMT_STATUS_BUSY);
1969 1970 1971
		goto unlock;
	}

1972
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
1973
		hci_uuids_clear(hdev);
1974

1975
		if (enable_service_cache(hdev)) {
1976 1977 1978
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_UUID,
						0, hdev->dev_class, 3);
1979 1980
			goto unlock;
		}
1981

1982
		goto update_class;
1983 1984 1985 1986
	}

	found = 0;

1987
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1988 1989 1990 1991
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1992
		kfree(match);
1993 1994 1995 1996
		found++;
	}

	if (found == 0) {
1997 1998
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
				      MGMT_STATUS_INVALID_PARAMS);
1999 2000 2001
		goto unlock;
	}

2002
update_class:
2003
	hci_req_init(&req, hdev);
2004

2005
	__hci_req_update_class(&req);
2006
	__hci_req_update_eir(&req);
2007

2008 2009 2010 2011
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2012

2013 2014
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
					hdev->dev_class, 3);
2015 2016 2017 2018
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
2019
	if (!cmd) {
2020
		err = -ENOMEM;
2021 2022 2023 2024
		goto unlock;
	}

	err = 0;
2025 2026

unlock:
2027
	hci_dev_unlock(hdev);
2028 2029 2030
	return err;
}

2031
static void set_class_complete(struct hci_dev *hdev, u8 status, u16 opcode)
2032 2033 2034 2035 2036 2037
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

2038
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
2039
			 u16 len)
2040
{
2041
	struct mgmt_cp_set_dev_class *cp = data;
2042
	struct mgmt_pending_cmd *cmd;
2043
	struct hci_request req;
2044 2045
	int err;

2046
	BT_DBG("request for %s", hdev->name);
2047

2048
	if (!lmp_bredr_capable(hdev))
2049 2050
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				       MGMT_STATUS_NOT_SUPPORTED);
2051

2052
	hci_dev_lock(hdev);
2053

2054
	if (pending_eir_or_class(hdev)) {
2055 2056
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				      MGMT_STATUS_BUSY);
2057 2058
		goto unlock;
	}
2059

2060
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
2061 2062
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				      MGMT_STATUS_INVALID_PARAMS);
2063 2064
		goto unlock;
	}
2065

2066 2067 2068
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

2069
	if (!hdev_is_powered(hdev)) {
2070 2071
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
					hdev->dev_class, 3);
2072 2073 2074
		goto unlock;
	}

2075 2076
	hci_req_init(&req, hdev);

2077
	if (hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) {
2078 2079 2080
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
2081
		__hci_req_update_eir(&req);
2082
	}
2083

2084
	__hci_req_update_class(&req);
2085

2086 2087 2088 2089
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2090

2091 2092
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
					hdev->dev_class, 3);
2093 2094 2095 2096
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
2097
	if (!cmd) {
2098
		err = -ENOMEM;
2099 2100 2101 2102
		goto unlock;
	}

	err = 0;
2103

2104
unlock:
2105
	hci_dev_unlock(hdev);
2106 2107 2108
	return err;
}

2109
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
2110
			  u16 len)
2111
{
2112
	struct mgmt_cp_load_link_keys *cp = data;
2113 2114
	const u16 max_key_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_link_key_info));
2115
	u16 key_count, expected_len;
2116
	bool changed;
2117
	int i;
2118

2119 2120 2121
	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev))
2122 2123
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_NOT_SUPPORTED);
2124

2125
	key_count = __le16_to_cpu(cp->key_count);
2126 2127 2128
	if (key_count > max_key_count) {
		BT_ERR("load_link_keys: too big key_count value %u",
		       key_count);
2129 2130
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2131
	}
2132

2133 2134
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
2135
	if (expected_len != len) {
2136
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
2137
		       expected_len, len);
2138 2139
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2140 2141
	}

2142
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
2143 2144
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2145

2146
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
2147
	       key_count);
2148

2149 2150 2151
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

2152
		if (key->addr.type != BDADDR_BREDR || key->type > 0x08)
2153 2154 2155
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_LINK_KEYS,
					       MGMT_STATUS_INVALID_PARAMS);
2156 2157
	}

2158
	hci_dev_lock(hdev);
2159 2160 2161 2162

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
2163
		changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS);
2164
	else
2165 2166
		changed = hci_dev_test_and_clear_flag(hdev,
						      HCI_KEEP_DEBUG_KEYS);
2167 2168 2169

	if (changed)
		new_settings(hdev, NULL);
2170

2171
	for (i = 0; i < key_count; i++) {
2172
		struct mgmt_link_key_info *key = &cp->keys[i];
2173

2174 2175 2176 2177 2178 2179
		/* Always ignore debug keys and require a new pairing if
		 * the user wants to use them.
		 */
		if (key->type == HCI_LK_DEBUG_COMBINATION)
			continue;

2180 2181
		hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val,
				 key->type, key->pin_len, NULL);
2182 2183
	}

2184
	mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
2185

2186
	hci_dev_unlock(hdev);
2187

2188
	return 0;
2189 2190
}

2191
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
2192
			   u8 addr_type, struct sock *skip_sk)
2193 2194 2195 2196 2197 2198 2199
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
2200
			  skip_sk);
2201 2202
}

2203
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2204
			 u16 len)
2205
{
2206 2207
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
2208
	struct hci_conn_params *params;
2209
	struct mgmt_pending_cmd *cmd;
2210
	struct hci_conn *conn;
2211
	u8 addr_type;
2212 2213
	int err;

2214
	memset(&rp, 0, sizeof(rp));
2215 2216
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2217

2218
	if (!bdaddr_type_is_valid(cp->addr.type))
2219 2220 2221
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2222

2223
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
2224 2225 2226
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2227

2228 2229
	hci_dev_lock(hdev);

2230
	if (!hdev_is_powered(hdev)) {
2231 2232 2233
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2234 2235 2236
		goto unlock;
	}

2237
	if (cp->addr.type == BDADDR_BREDR) {
2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250
		/* If disconnection is requested, then look up the
		 * connection. If the remote device is connected, it
		 * will be later used to terminate the link.
		 *
		 * Setting it to NULL explicitly will cause no
		 * termination of the link.
		 */
		if (cp->disconnect)
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
						       &cp->addr.bdaddr);
		else
			conn = NULL;

2251
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
2252 2253 2254 2255 2256 2257
		if (err < 0) {
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_UNPAIR_DEVICE,
						MGMT_STATUS_NOT_PAIRED, &rp,
						sizeof(rp));
			goto unlock;
2258 2259
		}

2260
		goto done;
2261
	}
2262

2263 2264 2265 2266 2267 2268
	/* LE address type */
	addr_type = le_addr_type(cp->addr.type);

	hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type);

	err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type);
2269
	if (err < 0) {
2270 2271 2272
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					MGMT_STATUS_NOT_PAIRED, &rp,
					sizeof(rp));
2273 2274 2275
		goto unlock;
	}

2276 2277 2278 2279 2280 2281
	conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, addr_type);
	if (!conn) {
		hci_conn_params_del(hdev, &cp->addr.bdaddr, addr_type);
		goto done;
	}

2282 2283 2284
	/* Abort any ongoing SMP pairing */
	smp_cancel_pairing(conn);

2285 2286 2287 2288 2289
	/* Defer clearing up the connection parameters until closing to
	 * give a chance of keeping them if a repairing happens.
	 */
	set_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags);

2290 2291 2292 2293 2294 2295 2296 2297 2298
	/* Disable auto-connection parameters if present */
	params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, addr_type);
	if (params) {
		if (params->explicit_connect)
			params->auto_connect = HCI_AUTO_CONN_EXPLICIT;
		else
			params->auto_connect = HCI_AUTO_CONN_DISABLED;
	}

2299 2300 2301 2302 2303 2304 2305
	/* If disconnection is not requested, then clear the connection
	 * variable so that the link is not terminated.
	 */
	if (!cp->disconnect)
		conn = NULL;

done:
2306 2307 2308
	/* If the connection variable is set, then termination of the
	 * link is requested.
	 */
2309
	if (!conn) {
2310 2311
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
					&rp, sizeof(rp));
2312
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
2313 2314
		goto unlock;
	}
2315

2316
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
2317
			       sizeof(*cp));
2318 2319 2320
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
2321 2322
	}

2323 2324
	cmd->cmd_complete = addr_cmd_complete;

2325
	err = hci_abort_conn(conn, HCI_ERROR_REMOTE_USER_TERM);
2326 2327 2328
	if (err < 0)
		mgmt_pending_remove(cmd);

2329
unlock:
2330
	hci_dev_unlock(hdev);
2331 2332 2333
	return err;
}

2334
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
2335
		      u16 len)
2336
{
2337
	struct mgmt_cp_disconnect *cp = data;
2338
	struct mgmt_rp_disconnect rp;
2339
	struct mgmt_pending_cmd *cmd;
2340 2341 2342 2343 2344
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2345 2346 2347 2348
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2349
	if (!bdaddr_type_is_valid(cp->addr.type))
2350 2351 2352
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2353

2354
	hci_dev_lock(hdev);
2355 2356

	if (!test_bit(HCI_UP, &hdev->flags)) {
2357 2358 2359
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2360 2361 2362
		goto failed;
	}

2363
	if (pending_find(MGMT_OP_DISCONNECT, hdev)) {
2364 2365
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
2366 2367 2368
		goto failed;
	}

2369
	if (cp->addr.type == BDADDR_BREDR)
2370 2371
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2372
	else
2373 2374
		conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr,
					       le_addr_type(cp->addr.type));
2375

2376
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2377 2378 2379
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_NOT_CONNECTED, &rp,
					sizeof(rp));
2380 2381 2382
		goto failed;
	}

2383
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2384 2385
	if (!cmd) {
		err = -ENOMEM;
2386
		goto failed;
2387
	}
2388

2389 2390
	cmd->cmd_complete = generic_cmd_complete;

2391
	err = hci_disconnect(conn, HCI_ERROR_REMOTE_USER_TERM);
2392
	if (err < 0)
2393
		mgmt_pending_remove(cmd);
2394 2395

failed:
2396
	hci_dev_unlock(hdev);
2397 2398 2399
	return err;
}

2400
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2401 2402 2403
{
	switch (link_type) {
	case LE_LINK:
2404 2405
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2406
			return BDADDR_LE_PUBLIC;
2407

2408
		default:
2409
			/* Fallback to LE Random address type */
2410
			return BDADDR_LE_RANDOM;
2411
		}
2412

2413
	default:
2414
		/* Fallback to BR/EDR type */
2415
		return BDADDR_BREDR;
2416 2417 2418
	}
}

2419 2420
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2421 2422
{
	struct mgmt_rp_get_connections *rp;
2423
	struct hci_conn *c;
2424
	size_t rp_len;
2425 2426
	int err;
	u16 i;
2427 2428 2429

	BT_DBG("");

2430
	hci_dev_lock(hdev);
2431

2432
	if (!hdev_is_powered(hdev)) {
2433 2434
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
				      MGMT_STATUS_NOT_POWERED);
2435 2436 2437
		goto unlock;
	}

2438
	i = 0;
2439 2440
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2441
			i++;
2442 2443
	}

2444
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2445
	rp = kmalloc(rp_len, GFP_KERNEL);
2446
	if (!rp) {
2447 2448 2449 2450 2451
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2452
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2453 2454
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2455
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2456
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2457
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2458 2459 2460 2461
			continue;
		i++;
	}

2462
	rp->conn_count = cpu_to_le16(i);
2463

2464 2465
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2466

2467 2468
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
				rp_len);
2469

2470
	kfree(rp);
2471 2472

unlock:
2473
	hci_dev_unlock(hdev);
2474 2475 2476
	return err;
}

2477
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2478
				   struct mgmt_cp_pin_code_neg_reply *cp)
2479
{
2480
	struct mgmt_pending_cmd *cmd;
2481 2482
	int err;

2483
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2484
			       sizeof(*cp));
2485 2486 2487
	if (!cmd)
		return -ENOMEM;

2488
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2489
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2490 2491 2492 2493 2494 2495
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2496
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2497
			  u16 len)
2498
{
2499
	struct hci_conn *conn;
2500
	struct mgmt_cp_pin_code_reply *cp = data;
2501
	struct hci_cp_pin_code_reply reply;
2502
	struct mgmt_pending_cmd *cmd;
2503 2504 2505 2506
	int err;

	BT_DBG("");

2507
	hci_dev_lock(hdev);
2508

2509
	if (!hdev_is_powered(hdev)) {
2510 2511
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
				      MGMT_STATUS_NOT_POWERED);
2512 2513 2514
		goto failed;
	}

2515
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2516
	if (!conn) {
2517 2518
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
				      MGMT_STATUS_NOT_CONNECTED);
2519 2520 2521 2522
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2523 2524 2525
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2526 2527 2528

		BT_ERR("PIN code is not 16 bytes long");

2529
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2530
		if (err >= 0)
2531 2532
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
					      MGMT_STATUS_INVALID_PARAMS);
2533 2534 2535 2536

		goto failed;
	}

2537
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2538 2539
	if (!cmd) {
		err = -ENOMEM;
2540
		goto failed;
2541
	}
2542

2543 2544
	cmd->cmd_complete = addr_cmd_complete;

2545
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2546
	reply.pin_len = cp->pin_len;
2547
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2548 2549 2550

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2551
		mgmt_pending_remove(cmd);
2552 2553

failed:
2554
	hci_dev_unlock(hdev);
2555 2556 2557
	return err;
}

2558 2559
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2560
{
2561
	struct mgmt_cp_set_io_capability *cp = data;
2562 2563 2564

	BT_DBG("");

2565
	if (cp->io_capability > SMP_IO_KEYBOARD_DISPLAY)
2566 2567
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY,
				       MGMT_STATUS_INVALID_PARAMS);
2568

2569
	hci_dev_lock(hdev);
2570 2571 2572 2573

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2574
	       hdev->io_capability);
2575

2576
	hci_dev_unlock(hdev);
2577

2578 2579
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0,
				 NULL, 0);
2580 2581
}

2582
static struct mgmt_pending_cmd *find_pairing(struct hci_conn *conn)
2583 2584
{
	struct hci_dev *hdev = conn->hdev;
2585
	struct mgmt_pending_cmd *cmd;
2586

2587
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

2600
static int pairing_complete(struct mgmt_pending_cmd *cmd, u8 status)
2601 2602 2603
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;
2604
	int err;
2605

2606 2607
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2608

2609 2610
	err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE,
				status, &rp, sizeof(rp));
2611 2612 2613 2614 2615 2616

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2617
	hci_conn_drop(conn);
2618 2619 2620 2621 2622

	/* The device is paired so there is no need to remove
	 * its connection parameters anymore.
	 */
	clear_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags);
2623 2624

	hci_conn_put(conn);
2625 2626

	return err;
2627 2628
}

2629 2630 2631
void mgmt_smp_complete(struct hci_conn *conn, bool complete)
{
	u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED;
2632
	struct mgmt_pending_cmd *cmd;
2633 2634

	cmd = find_pairing(conn);
2635
	if (cmd) {
2636
		cmd->cmd_complete(cmd, status);
2637 2638
		mgmt_pending_remove(cmd);
	}
2639 2640
}

2641 2642
static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
2643
	struct mgmt_pending_cmd *cmd;
2644 2645 2646 2647

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2648
	if (!cmd) {
2649
		BT_DBG("Unable to find a pending command");
2650 2651 2652 2653 2654
		return;
	}

	cmd->cmd_complete(cmd, mgmt_status(status));
	mgmt_pending_remove(cmd);
2655 2656
}

2657
static void le_pairing_complete_cb(struct hci_conn *conn, u8 status)
2658
{
2659
	struct mgmt_pending_cmd *cmd;
2660 2661 2662 2663 2664 2665 2666

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
2667
	if (!cmd) {
2668
		BT_DBG("Unable to find a pending command");
2669 2670 2671 2672 2673
		return;
	}

	cmd->cmd_complete(cmd, mgmt_status(status));
	mgmt_pending_remove(cmd);
2674 2675
}

2676
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2677
		       u16 len)
2678
{
2679
	struct mgmt_cp_pair_device *cp = data;
2680
	struct mgmt_rp_pair_device rp;
2681
	struct mgmt_pending_cmd *cmd;
2682 2683 2684 2685 2686 2687
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2688 2689 2690 2691
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2692
	if (!bdaddr_type_is_valid(cp->addr.type))
2693 2694 2695
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2696

2697
	if (cp->io_cap > SMP_IO_KEYBOARD_DISPLAY)
2698 2699 2700
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2701

2702
	hci_dev_lock(hdev);
2703

2704
	if (!hdev_is_powered(hdev)) {
2705 2706 2707
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2708 2709 2710
		goto unlock;
	}

2711 2712 2713 2714 2715 2716 2717
	if (hci_bdaddr_is_paired(hdev, &cp->addr.bdaddr, cp->addr.type)) {
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_ALREADY_PAIRED, &rp,
					sizeof(rp));
		goto unlock;
	}

2718
	sec_level = BT_SECURITY_MEDIUM;
2719
	auth_type = HCI_AT_DEDICATED_BONDING;
2720

2721
	if (cp->addr.type == BDADDR_BREDR) {
2722 2723
		conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level,
				       auth_type);
2724
	} else {
2725
		u8 addr_type = le_addr_type(cp->addr.type);
2726
		struct hci_conn_params *p;
2727

2728 2729 2730 2731 2732 2733 2734 2735 2736
		/* When pairing a new device, it is expected to remember
		 * this device for future connections. Adding the connection
		 * parameter information ahead of time allows tracking
		 * of the slave preferred values and will speed up any
		 * further connection establishment.
		 *
		 * If connection parameters already exist, then they
		 * will be kept and this function does nothing.
		 */
2737 2738 2739 2740
		p = hci_conn_params_add(hdev, &cp->addr.bdaddr, addr_type);

		if (p->auto_connect == HCI_AUTO_CONN_EXPLICIT)
			p->auto_connect = HCI_AUTO_CONN_DISABLED;
2741

2742 2743
		conn = hci_connect_le_scan(hdev, &cp->addr.bdaddr,
					   addr_type, sec_level,
2744
					   HCI_LE_CONN_TIMEOUT);
2745
	}
2746

2747
	if (IS_ERR(conn)) {
2748 2749 2750 2751
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
2752 2753 2754 2755
		else if (PTR_ERR(conn) == -EOPNOTSUPP)
			status = MGMT_STATUS_NOT_SUPPORTED;
		else if (PTR_ERR(conn) == -ECONNREFUSED)
			status = MGMT_STATUS_REJECTED;
2756 2757 2758
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2759 2760
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					status, &rp, sizeof(rp));
2761 2762 2763 2764
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2765
		hci_conn_drop(conn);
2766 2767
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
2768 2769 2770
		goto unlock;
	}

2771
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2772 2773
	if (!cmd) {
		err = -ENOMEM;
2774
		hci_conn_drop(conn);
2775 2776 2777
		goto unlock;
	}

2778 2779
	cmd->cmd_complete = pairing_complete;

2780
	/* For LE, just connecting isn't a proof that the pairing finished */
2781
	if (cp->addr.type == BDADDR_BREDR) {
2782
		conn->connect_cfm_cb = pairing_complete_cb;
2783 2784 2785 2786 2787 2788 2789
		conn->security_cfm_cb = pairing_complete_cb;
		conn->disconn_cfm_cb = pairing_complete_cb;
	} else {
		conn->connect_cfm_cb = le_pairing_complete_cb;
		conn->security_cfm_cb = le_pairing_complete_cb;
		conn->disconn_cfm_cb = le_pairing_complete_cb;
	}
2790

2791
	conn->io_capability = cp->io_cap;
2792
	cmd->user_data = hci_conn_get(conn);
2793

2794
	if ((conn->state == BT_CONNECTED || conn->state == BT_CONFIG) &&
2795 2796 2797 2798
	    hci_conn_security(conn, sec_level, auth_type, true)) {
		cmd->cmd_complete(cmd, 0);
		mgmt_pending_remove(cmd);
	}
2799 2800 2801 2802

	err = 0;

unlock:
2803
	hci_dev_unlock(hdev);
2804 2805 2806
	return err;
}

2807 2808
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2809
{
2810
	struct mgmt_addr_info *addr = data;
2811
	struct mgmt_pending_cmd *cmd;
2812 2813 2814 2815 2816 2817 2818
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2819
	if (!hdev_is_powered(hdev)) {
2820 2821
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_NOT_POWERED);
2822 2823 2824
		goto unlock;
	}

2825
	cmd = pending_find(MGMT_OP_PAIR_DEVICE, hdev);
2826
	if (!cmd) {
2827 2828
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_INVALID_PARAMS);
2829 2830 2831 2832 2833 2834
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2835 2836
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_INVALID_PARAMS);
2837 2838 2839
		goto unlock;
	}

2840 2841
	cmd->cmd_complete(cmd, MGMT_STATUS_CANCELLED);
	mgmt_pending_remove(cmd);
2842

2843 2844
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
				addr, sizeof(*addr));
2845 2846 2847 2848 2849
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2850
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2851
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2852
			     u16 hci_op, __le32 passkey)
2853
{
2854
	struct mgmt_pending_cmd *cmd;
2855
	struct hci_conn *conn;
2856 2857
	int err;

2858
	hci_dev_lock(hdev);
2859

2860
	if (!hdev_is_powered(hdev)) {
2861 2862 2863
		err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
					MGMT_STATUS_NOT_POWERED, addr,
					sizeof(*addr));
2864
		goto done;
2865 2866
	}

2867 2868
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2869
	else
2870 2871
		conn = hci_conn_hash_lookup_le(hdev, &addr->bdaddr,
					       le_addr_type(addr->type));
2872 2873

	if (!conn) {
2874 2875 2876
		err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
					MGMT_STATUS_NOT_CONNECTED, addr,
					sizeof(*addr));
2877 2878
		goto done;
	}
2879

2880
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2881 2882
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);
		if (!err)
2883 2884 2885
			err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
						MGMT_STATUS_SUCCESS, addr,
						sizeof(*addr));
2886
		else
2887 2888 2889
			err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
						MGMT_STATUS_FAILED, addr,
						sizeof(*addr));
2890 2891 2892 2893

		goto done;
	}

2894
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2895 2896
	if (!cmd) {
		err = -ENOMEM;
2897
		goto done;
2898 2899
	}

2900 2901
	cmd->cmd_complete = addr_cmd_complete;

2902
	/* Continue with pairing via HCI */
2903 2904 2905
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2906
		bacpy(&cp.bdaddr, &addr->bdaddr);
2907 2908 2909
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2910 2911
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2912

2913 2914
	if (err < 0)
		mgmt_pending_remove(cmd);
2915

2916
done:
2917
	hci_dev_unlock(hdev);
2918 2919 2920
	return err;
}

2921 2922 2923 2924 2925 2926 2927
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2928
	return user_pairing_resp(sk, hdev, &cp->addr,
2929 2930 2931 2932
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2933 2934
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2935
{
2936
	struct mgmt_cp_user_confirm_reply *cp = data;
2937 2938 2939 2940

	BT_DBG("");

	if (len != sizeof(*cp))
2941 2942
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
				       MGMT_STATUS_INVALID_PARAMS);
2943

2944
	return user_pairing_resp(sk, hdev, &cp->addr,
2945 2946
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2947 2948
}

2949
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2950
				  void *data, u16 len)
2951
{
2952
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2953 2954 2955

	BT_DBG("");

2956
	return user_pairing_resp(sk, hdev, &cp->addr,
2957 2958
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2959 2960
}

2961 2962
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2963
{
2964
	struct mgmt_cp_user_passkey_reply *cp = data;
2965 2966 2967

	BT_DBG("");

2968
	return user_pairing_resp(sk, hdev, &cp->addr,
2969 2970
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2971 2972
}

2973
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2974
				  void *data, u16 len)
2975
{
2976
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2977 2978 2979

	BT_DBG("");

2980
	return user_pairing_resp(sk, hdev, &cp->addr,
2981 2982
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2983 2984
}

2985
static void set_name_complete(struct hci_dev *hdev, u8 status, u16 opcode)
2986 2987
{
	struct mgmt_cp_set_local_name *cp;
2988
	struct mgmt_pending_cmd *cmd;
2989 2990 2991 2992 2993

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

2994
	cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2995 2996 2997 2998 2999 3000
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
3001 3002
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			        mgmt_status(status));
3003
	else
3004 3005
		mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				  cp, sizeof(*cp));
3006 3007 3008 3009 3010 3011 3012

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

3013
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
3014
			  u16 len)
3015
{
3016
	struct mgmt_cp_set_local_name *cp = data;
3017
	struct mgmt_pending_cmd *cmd;
3018
	struct hci_request req;
3019 3020 3021 3022
	int err;

	BT_DBG("");

3023
	hci_dev_lock(hdev);
3024

3025 3026 3027 3028 3029 3030
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
3031 3032
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
					data, len);
3033 3034 3035
		goto failed;
	}

3036
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
3037

3038
	if (!hdev_is_powered(hdev)) {
3039
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
3040

3041 3042
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
					data, len);
3043 3044 3045
		if (err < 0)
			goto failed;

3046 3047
		err = mgmt_limited_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, data,
					 len, HCI_MGMT_LOCAL_NAME_EVENTS, sk);
3048
		ext_info_changed(hdev, sk);
3049

3050 3051 3052
		goto failed;
	}

3053
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
3054 3055 3056 3057 3058
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3059 3060
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

3061
	hci_req_init(&req, hdev);
3062 3063

	if (lmp_bredr_capable(hdev)) {
3064
		__hci_req_update_name(&req);
3065
		__hci_req_update_eir(&req);
3066 3067
	}

3068 3069 3070
	/* The name is stored in the scan response data and so
	 * no need to udpate the advertising data here.
	 */
3071
	if (lmp_le_capable(hdev))
3072
		__hci_req_update_scan_rsp_data(&req, hdev->cur_adv_instance);
3073

3074
	err = hci_req_run(&req, set_name_complete);
3075 3076 3077 3078
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
3079
	hci_dev_unlock(hdev);
3080 3081 3082
	return err;
}

3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097 3098 3099 3100 3101 3102 3103 3104 3105 3106 3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123 3124 3125 3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137 3138 3139 3140 3141
static void read_local_oob_data_complete(struct hci_dev *hdev, u8 status,
				         u16 opcode, struct sk_buff *skb)
{
	struct mgmt_rp_read_local_oob_data mgmt_rp;
	size_t rp_size = sizeof(mgmt_rp);
	struct mgmt_pending_cmd *cmd;

	BT_DBG("%s status %u", hdev->name, status);

	cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
	if (!cmd)
		return;

	if (status || !skb) {
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				status ? mgmt_status(status) : MGMT_STATUS_FAILED);
		goto remove;
	}

	memset(&mgmt_rp, 0, sizeof(mgmt_rp));

	if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) {
		struct hci_rp_read_local_oob_data *rp = (void *) skb->data;

		if (skb->len < sizeof(*rp)) {
			mgmt_cmd_status(cmd->sk, hdev->id,
					MGMT_OP_READ_LOCAL_OOB_DATA,
					MGMT_STATUS_FAILED);
			goto remove;
		}

		memcpy(mgmt_rp.hash192, rp->hash, sizeof(rp->hash));
		memcpy(mgmt_rp.rand192, rp->rand, sizeof(rp->rand));

		rp_size -= sizeof(mgmt_rp.hash256) + sizeof(mgmt_rp.rand256);
	} else {
		struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data;

		if (skb->len < sizeof(*rp)) {
			mgmt_cmd_status(cmd->sk, hdev->id,
					MGMT_OP_READ_LOCAL_OOB_DATA,
					MGMT_STATUS_FAILED);
			goto remove;
		}

		memcpy(mgmt_rp.hash192, rp->hash192, sizeof(rp->hash192));
		memcpy(mgmt_rp.rand192, rp->rand192, sizeof(rp->rand192));

		memcpy(mgmt_rp.hash256, rp->hash256, sizeof(rp->hash256));
		memcpy(mgmt_rp.rand256, rp->rand256, sizeof(rp->rand256));
	}

	mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
			  MGMT_STATUS_SUCCESS, &mgmt_rp, rp_size);

remove:
	mgmt_pending_remove(cmd);
}

3142
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
3143
			       void *data, u16 data_len)
3144
{
3145
	struct mgmt_pending_cmd *cmd;
3146
	struct hci_request req;
3147 3148
	int err;

3149
	BT_DBG("%s", hdev->name);
3150

3151
	hci_dev_lock(hdev);
3152

3153
	if (!hdev_is_powered(hdev)) {
3154 3155
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_NOT_POWERED);
3156 3157 3158
		goto unlock;
	}

3159
	if (!lmp_ssp_capable(hdev)) {
3160 3161
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_NOT_SUPPORTED);
3162 3163 3164
		goto unlock;
	}

3165
	if (pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
3166 3167
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_BUSY);
3168 3169 3170
		goto unlock;
	}

3171
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
3172 3173 3174 3175 3176
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

3177 3178
	hci_req_init(&req, hdev);

3179
	if (bredr_sc_enabled(hdev))
3180
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL);
3181
	else
3182
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
3183

3184
	err = hci_req_run_skb(&req, read_local_oob_data_complete);
3185 3186 3187 3188
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
3189
	hci_dev_unlock(hdev);
3190 3191 3192
	return err;
}

3193
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3194
			       void *data, u16 len)
3195
{
3196
	struct mgmt_addr_info *addr = data;
3197 3198
	int err;

3199
	BT_DBG("%s ", hdev->name);
3200

3201
	if (!bdaddr_type_is_valid(addr->type))
3202 3203 3204 3205
		return mgmt_cmd_complete(sk, hdev->id,
					 MGMT_OP_ADD_REMOTE_OOB_DATA,
					 MGMT_STATUS_INVALID_PARAMS,
					 addr, sizeof(*addr));
3206

3207
	hci_dev_lock(hdev);
3208

3209 3210 3211
	if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_data *cp = data;
		u8 status;
3212

3213
		if (cp->addr.type != BDADDR_BREDR) {
3214 3215 3216 3217
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_ADD_REMOTE_OOB_DATA,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
3218 3219 3220
			goto unlock;
		}

3221
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
3222 3223
					      cp->addr.type, cp->hash,
					      cp->rand, NULL, NULL);
3224 3225 3226 3227 3228
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

3229 3230 3231
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_ADD_REMOTE_OOB_DATA, status,
					&cp->addr, sizeof(cp->addr));
3232 3233
	} else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_ext_data *cp = data;
3234
		u8 *rand192, *hash192, *rand256, *hash256;
3235 3236
		u8 status;

3237
		if (bdaddr_type_is_le(cp->addr.type)) {
3238 3239 3240 3241 3242
			/* Enforce zero-valued 192-bit parameters as
			 * long as legacy SMP OOB isn't implemented.
			 */
			if (memcmp(cp->rand192, ZERO_KEY, 16) ||
			    memcmp(cp->hash192, ZERO_KEY, 16)) {
3243 3244 3245 3246
				err = mgmt_cmd_complete(sk, hdev->id,
							MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_INVALID_PARAMS,
							addr, sizeof(*addr));
3247 3248 3249
				goto unlock;
			}

3250 3251 3252
			rand192 = NULL;
			hash192 = NULL;
		} else {
3253 3254 3255 3256 3257 3258 3259 3260 3261 3262 3263 3264 3265 3266 3267 3268 3269 3270 3271 3272 3273 3274 3275
			/* In case one of the P-192 values is set to zero,
			 * then just disable OOB data for P-192.
			 */
			if (!memcmp(cp->rand192, ZERO_KEY, 16) ||
			    !memcmp(cp->hash192, ZERO_KEY, 16)) {
				rand192 = NULL;
				hash192 = NULL;
			} else {
				rand192 = cp->rand192;
				hash192 = cp->hash192;
			}
		}

		/* In case one of the P-256 values is set to zero, then just
		 * disable OOB data for P-256.
		 */
		if (!memcmp(cp->rand256, ZERO_KEY, 16) ||
		    !memcmp(cp->hash256, ZERO_KEY, 16)) {
			rand256 = NULL;
			hash256 = NULL;
		} else {
			rand256 = cp->rand256;
			hash256 = cp->hash256;
3276 3277
		}

3278
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
3279
					      cp->addr.type, hash192, rand192,
3280
					      hash256, rand256);
3281 3282 3283 3284 3285
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

3286 3287 3288
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_ADD_REMOTE_OOB_DATA,
					status, &cp->addr, sizeof(cp->addr));
3289 3290
	} else {
		BT_ERR("add_remote_oob_data: invalid length of %u bytes", len);
3291 3292
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				      MGMT_STATUS_INVALID_PARAMS);
3293
	}
3294

3295
unlock:
3296
	hci_dev_unlock(hdev);
3297 3298 3299
	return err;
}

3300
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3301
				  void *data, u16 len)
3302
{
3303
	struct mgmt_cp_remove_remote_oob_data *cp = data;
3304
	u8 status;
3305 3306
	int err;

3307
	BT_DBG("%s", hdev->name);
3308

3309
	if (cp->addr.type != BDADDR_BREDR)
3310 3311 3312 3313
		return mgmt_cmd_complete(sk, hdev->id,
					 MGMT_OP_REMOVE_REMOTE_OOB_DATA,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3314

3315
	hci_dev_lock(hdev);
3316

3317 3318 3319 3320 3321 3322
	if (!bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
		hci_remote_oob_data_clear(hdev);
		status = MGMT_STATUS_SUCCESS;
		goto done;
	}

3323
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr, cp->addr.type);
3324
	if (err < 0)
3325
		status = MGMT_STATUS_INVALID_PARAMS;
3326
	else
3327
		status = MGMT_STATUS_SUCCESS;
3328

3329
done:
3330 3331
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
				status, &cp->addr, sizeof(cp->addr));
3332

3333
	hci_dev_unlock(hdev);
3334 3335 3336
	return err;
}

3337
void mgmt_start_discovery_complete(struct hci_dev *hdev, u8 status)
3338
{
3339
	struct mgmt_pending_cmd *cmd;
3340

3341 3342
	BT_DBG("status %d", status);

3343
	hci_dev_lock(hdev);
3344

3345
	cmd = pending_find(MGMT_OP_START_DISCOVERY, hdev);
3346
	if (!cmd)
3347
		cmd = pending_find(MGMT_OP_START_SERVICE_DISCOVERY, hdev);
3348

3349 3350 3351
	if (!cmd)
		cmd = pending_find(MGMT_OP_START_LIMITED_DISCOVERY, hdev);

3352
	if (cmd) {
3353
		cmd->cmd_complete(cmd, mgmt_status(status));
3354 3355
		mgmt_pending_remove(cmd);
	}
3356

3357
	hci_dev_unlock(hdev);
3358 3359
}

3360 3361 3362 3363 3364 3365 3366 3367 3368 3369 3370 3371 3372 3373 3374 3375 3376 3377 3378 3379 3380 3381 3382 3383 3384 3385 3386
static bool discovery_type_is_valid(struct hci_dev *hdev, uint8_t type,
				    uint8_t *mgmt_status)
{
	switch (type) {
	case DISCOV_TYPE_LE:
		*mgmt_status = mgmt_le_support(hdev);
		if (*mgmt_status)
			return false;
		break;
	case DISCOV_TYPE_INTERLEAVED:
		*mgmt_status = mgmt_le_support(hdev);
		if (*mgmt_status)
			return false;
		/* Intentional fall-through */
	case DISCOV_TYPE_BREDR:
		*mgmt_status = mgmt_bredr_support(hdev);
		if (*mgmt_status)
			return false;
		break;
	default:
		*mgmt_status = MGMT_STATUS_INVALID_PARAMS;
		return false;
	}

	return true;
}

3387 3388
static int start_discovery_internal(struct sock *sk, struct hci_dev *hdev,
				    u16 op, void *data, u16 len)
3389
{
3390
	struct mgmt_cp_start_discovery *cp = data;
3391
	struct mgmt_pending_cmd *cmd;
3392
	u8 status;
3393 3394
	int err;

3395
	BT_DBG("%s", hdev->name);
3396

3397
	hci_dev_lock(hdev);
3398

3399
	if (!hdev_is_powered(hdev)) {
3400
		err = mgmt_cmd_complete(sk, hdev->id, op,
3401 3402
					MGMT_STATUS_NOT_POWERED,
					&cp->type, sizeof(cp->type));
3403 3404 3405
		goto failed;
	}

3406
	if (hdev->discovery.state != DISCOVERY_STOPPED ||
3407
	    hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) {
3408 3409
		err = mgmt_cmd_complete(sk, hdev->id, op, MGMT_STATUS_BUSY,
					&cp->type, sizeof(cp->type));
3410 3411 3412
		goto failed;
	}

3413
	if (!discovery_type_is_valid(hdev, cp->type, &status)) {
3414 3415
		err = mgmt_cmd_complete(sk, hdev->id, op, status,
					&cp->type, sizeof(cp->type));
3416 3417 3418
		goto failed;
	}

3419 3420 3421 3422 3423
	/* Clear the discovery filter first to free any previously
	 * allocated memory for the UUID list.
	 */
	hci_discovery_filter_clear(hdev);

A
Andre Guedes 已提交
3424
	hdev->discovery.type = cp->type;
3425
	hdev->discovery.report_invalid_rssi = false;
3426 3427 3428 3429
	if (op == MGMT_OP_START_LIMITED_DISCOVERY)
		hdev->discovery.limited = true;
	else
		hdev->discovery.limited = false;
A
Andre Guedes 已提交
3430

3431
	cmd = mgmt_pending_add(sk, op, hdev, data, len);
3432 3433
	if (!cmd) {
		err = -ENOMEM;
3434
		goto failed;
3435
	}
3436

3437
	cmd->cmd_complete = generic_cmd_complete;
3438

3439
	hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3440 3441
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3442

3443
failed:
3444
	hci_dev_unlock(hdev);
3445 3446
	return err;
}
3447

3448 3449 3450 3451 3452 3453 3454 3455 3456 3457 3458 3459 3460 3461 3462
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	return start_discovery_internal(sk, hdev, MGMT_OP_START_DISCOVERY,
					data, len);
}

static int start_limited_discovery(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 len)
{
	return start_discovery_internal(sk, hdev,
					MGMT_OP_START_LIMITED_DISCOVERY,
					data, len);
}

3463 3464
static int service_discovery_cmd_complete(struct mgmt_pending_cmd *cmd,
					  u8 status)
3465
{
3466 3467
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, 1);
3468
}
3469

3470 3471 3472 3473
static int start_service_discovery(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 len)
{
	struct mgmt_cp_start_service_discovery *cp = data;
3474
	struct mgmt_pending_cmd *cmd;
3475 3476 3477 3478
	const u16 max_uuid_count = ((U16_MAX - sizeof(*cp)) / 16);
	u16 uuid_count, expected_len;
	u8 status;
	int err;
3479

3480
	BT_DBG("%s", hdev->name);
3481

3482
	hci_dev_lock(hdev);
3483

3484
	if (!hdev_is_powered(hdev)) {
3485 3486 3487 3488
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_NOT_POWERED,
					&cp->type, sizeof(cp->type));
3489 3490
		goto failed;
	}
3491

3492
	if (hdev->discovery.state != DISCOVERY_STOPPED ||
3493
	    hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) {
3494 3495 3496 3497
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_BUSY, &cp->type,
					sizeof(cp->type));
3498 3499
		goto failed;
	}
3500

3501 3502 3503 3504
	uuid_count = __le16_to_cpu(cp->uuid_count);
	if (uuid_count > max_uuid_count) {
		BT_ERR("service_discovery: too big uuid_count value %u",
		       uuid_count);
3505 3506 3507 3508
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS, &cp->type,
					sizeof(cp->type));
3509 3510 3511 3512 3513 3514 3515
		goto failed;
	}

	expected_len = sizeof(*cp) + uuid_count * 16;
	if (expected_len != len) {
		BT_ERR("service_discovery: expected %u bytes, got %u bytes",
		       expected_len, len);
3516 3517 3518 3519
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS, &cp->type,
					sizeof(cp->type));
3520 3521 3522
		goto failed;
	}

3523 3524 3525 3526 3527 3528 3529
	if (!discovery_type_is_valid(hdev, cp->type, &status)) {
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					status, &cp->type, sizeof(cp->type));
		goto failed;
	}

3530
	cmd = mgmt_pending_add(sk, MGMT_OP_START_SERVICE_DISCOVERY,
3531
			       hdev, data, len);
3532 3533 3534 3535 3536
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3537 3538
	cmd->cmd_complete = service_discovery_cmd_complete;

3539 3540 3541 3542 3543
	/* Clear the discovery filter first to free any previously
	 * allocated memory for the UUID list.
	 */
	hci_discovery_filter_clear(hdev);

3544
	hdev->discovery.result_filtering = true;
3545 3546 3547 3548 3549 3550 3551 3552
	hdev->discovery.type = cp->type;
	hdev->discovery.rssi = cp->rssi;
	hdev->discovery.uuid_count = uuid_count;

	if (uuid_count > 0) {
		hdev->discovery.uuids = kmemdup(cp->uuids, uuid_count * 16,
						GFP_KERNEL);
		if (!hdev->discovery.uuids) {
3553 3554 3555 3556
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_START_SERVICE_DISCOVERY,
						MGMT_STATUS_FAILED,
						&cp->type, sizeof(cp->type));
3557 3558 3559
			mgmt_pending_remove(cmd);
			goto failed;
		}
3560
	}
3561

3562
	hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3563 3564
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3565 3566

failed:
3567
	hci_dev_unlock(hdev);
3568 3569 3570
	return err;
}

3571
void mgmt_stop_discovery_complete(struct hci_dev *hdev, u8 status)
3572
{
3573
	struct mgmt_pending_cmd *cmd;
3574

3575 3576 3577 3578
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

3579
	cmd = pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3580
	if (cmd) {
3581
		cmd->cmd_complete(cmd, mgmt_status(status));
3582
		mgmt_pending_remove(cmd);
3583 3584 3585 3586 3587
	}

	hci_dev_unlock(hdev);
}

3588
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
3589
			  u16 len)
3590
{
3591
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
3592
	struct mgmt_pending_cmd *cmd;
3593 3594
	int err;

3595
	BT_DBG("%s", hdev->name);
3596

3597
	hci_dev_lock(hdev);
3598

3599
	if (!hci_discovery_active(hdev)) {
3600 3601 3602
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
					MGMT_STATUS_REJECTED, &mgmt_cp->type,
					sizeof(mgmt_cp->type));
3603 3604 3605 3606
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
3607 3608 3609
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS,
					&mgmt_cp->type, sizeof(mgmt_cp->type));
3610
		goto unlock;
3611 3612
	}

3613
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, data, len);
3614 3615
	if (!cmd) {
		err = -ENOMEM;
3616 3617 3618
		goto unlock;
	}

3619 3620
	cmd->cmd_complete = generic_cmd_complete;

3621 3622 3623
	hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3624

3625
unlock:
3626
	hci_dev_unlock(hdev);
3627 3628 3629
	return err;
}

3630
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3631
			u16 len)
3632
{
3633
	struct mgmt_cp_confirm_name *cp = data;
3634 3635 3636
	struct inquiry_entry *e;
	int err;

3637
	BT_DBG("%s", hdev->name);
3638 3639 3640

	hci_dev_lock(hdev);

3641
	if (!hci_discovery_active(hdev)) {
3642 3643 3644
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
					MGMT_STATUS_FAILED, &cp->addr,
					sizeof(cp->addr));
3645 3646 3647
		goto failed;
	}

3648
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3649
	if (!e) {
3650 3651 3652
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
					MGMT_STATUS_INVALID_PARAMS, &cp->addr,
					sizeof(cp->addr));
3653 3654 3655 3656 3657 3658 3659 3660
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3661
		hci_inquiry_cache_update_resolve(hdev, e);
3662 3663
	}

3664 3665
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0,
				&cp->addr, sizeof(cp->addr));
3666 3667 3668 3669 3670 3671

failed:
	hci_dev_unlock(hdev);
	return err;
}

3672
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3673
			u16 len)
3674
{
3675
	struct mgmt_cp_block_device *cp = data;
3676
	u8 status;
3677 3678
	int err;

3679
	BT_DBG("%s", hdev->name);
3680

3681
	if (!bdaddr_type_is_valid(cp->addr.type))
3682 3683 3684
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3685

3686
	hci_dev_lock(hdev);
3687

3688 3689
	err = hci_bdaddr_list_add(&hdev->blacklist, &cp->addr.bdaddr,
				  cp->addr.type);
3690
	if (err < 0) {
3691
		status = MGMT_STATUS_FAILED;
3692 3693 3694 3695 3696 3697
		goto done;
	}

	mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &cp->addr, sizeof(cp->addr),
		   sk);
	status = MGMT_STATUS_SUCCESS;
3698

3699
done:
3700 3701
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
				&cp->addr, sizeof(cp->addr));
3702

3703
	hci_dev_unlock(hdev);
3704 3705 3706 3707

	return err;
}

3708
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3709
			  u16 len)
3710
{
3711
	struct mgmt_cp_unblock_device *cp = data;
3712
	u8 status;
3713 3714
	int err;

3715
	BT_DBG("%s", hdev->name);
3716

3717
	if (!bdaddr_type_is_valid(cp->addr.type))
3718 3719 3720
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3721

3722
	hci_dev_lock(hdev);
3723

3724 3725
	err = hci_bdaddr_list_del(&hdev->blacklist, &cp->addr.bdaddr,
				  cp->addr.type);
3726
	if (err < 0) {
3727
		status = MGMT_STATUS_INVALID_PARAMS;
3728 3729 3730 3731 3732 3733
		goto done;
	}

	mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &cp->addr, sizeof(cp->addr),
		   sk);
	status = MGMT_STATUS_SUCCESS;
3734

3735
done:
3736 3737
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
				&cp->addr, sizeof(cp->addr));
3738

3739
	hci_dev_unlock(hdev);
3740 3741 3742 3743

	return err;
}

3744 3745 3746 3747
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3748
	struct hci_request req;
3749
	int err;
3750
	__u16 source;
3751 3752 3753

	BT_DBG("%s", hdev->name);

3754 3755 3756
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
3757 3758
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				       MGMT_STATUS_INVALID_PARAMS);
3759

3760 3761
	hci_dev_lock(hdev);

3762
	hdev->devid_source = source;
3763 3764 3765 3766
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

3767 3768
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0,
				NULL, 0);
3769

3770
	hci_req_init(&req, hdev);
3771
	__hci_req_update_eir(&req);
3772
	hci_req_run(&req, NULL);
3773 3774 3775 3776 3777 3778

	hci_dev_unlock(hdev);

	return err;
}

3779 3780 3781 3782 3783 3784
static void enable_advertising_instance(struct hci_dev *hdev, u8 status,
					u16 opcode)
{
	BT_DBG("status %d", status);
}

3785 3786
static void set_advertising_complete(struct hci_dev *hdev, u8 status,
				     u16 opcode)
3787 3788
{
	struct cmd_lookup match = { NULL, hdev };
3789
	struct hci_request req;
3790 3791 3792
	u8 instance;
	struct adv_info *adv_instance;
	int err;
3793

3794 3795
	hci_dev_lock(hdev);

3796 3797 3798 3799 3800
	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
3801
		goto unlock;
3802 3803
	}

3804
	if (hci_dev_test_flag(hdev, HCI_LE_ADV))
3805
		hci_dev_set_flag(hdev, HCI_ADVERTISING);
3806
	else
3807
		hci_dev_clear_flag(hdev, HCI_ADVERTISING);
3808

3809 3810 3811 3812 3813 3814 3815
	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
3816

3817
	/* If "Set Advertising" was just disabled and instance advertising was
3818
	 * set up earlier, then re-enable multi-instance advertising.
3819 3820
	 */
	if (hci_dev_test_flag(hdev, HCI_ADVERTISING) ||
3821
	    list_empty(&hdev->adv_instances))
3822 3823
		goto unlock;

3824 3825 3826 3827 3828 3829 3830 3831 3832 3833
	instance = hdev->cur_adv_instance;
	if (!instance) {
		adv_instance = list_first_entry_or_null(&hdev->adv_instances,
							struct adv_info, list);
		if (!adv_instance)
			goto unlock;

		instance = adv_instance->instance;
	}

3834 3835
	hci_req_init(&req, hdev);

3836
	err = __hci_req_schedule_adv_instance(&req, instance, true);
3837 3838 3839

	if (!err)
		err = hci_req_run(&req, enable_advertising_instance);
3840

3841
	if (err)
3842 3843
		BT_ERR("Failed to re-configure advertising");

3844 3845
unlock:
	hci_dev_unlock(hdev);
3846 3847
}

3848 3849
static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
3850 3851
{
	struct mgmt_mode *cp = data;
3852
	struct mgmt_pending_cmd *cmd;
3853
	struct hci_request req;
3854
	u8 val, status;
3855 3856 3857 3858
	int err;

	BT_DBG("request for %s", hdev->name);

3859 3860
	status = mgmt_le_support(hdev);
	if (status)
3861 3862
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				       status);
3863

3864
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
3865 3866
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);
3867 3868 3869 3870 3871

	hci_dev_lock(hdev);

	val = !!cp->val;

3872 3873 3874 3875 3876
	/* The following conditions are ones which mean that we should
	 * not do any HCI communication but directly send a mgmt
	 * response to user space (after toggling the flag if
	 * necessary).
	 */
3877
	if (!hdev_is_powered(hdev) ||
3878 3879
	    (val == hci_dev_test_flag(hdev, HCI_ADVERTISING) &&
	     (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_ADVERTISING_CONNECTABLE)) ||
3880
	    hci_conn_num(hdev, LE_LINK) > 0 ||
3881
	    (hci_dev_test_flag(hdev, HCI_LE_SCAN) &&
3882
	     hdev->le_scan_type == LE_SCAN_ACTIVE)) {
3883
		bool changed;
3884

3885
		if (cp->val) {
3886
			hdev->cur_adv_instance = 0x00;
3887
			changed = !hci_dev_test_and_set_flag(hdev, HCI_ADVERTISING);
3888
			if (cp->val == 0x02)
3889
				hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3890
			else
3891
				hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3892
		} else {
3893
			changed = hci_dev_test_and_clear_flag(hdev, HCI_ADVERTISING);
3894
			hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3895 3896 3897 3898 3899 3900 3901 3902 3903 3904 3905 3906
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

3907 3908
	if (pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_SET_LE, hdev)) {
3909 3910
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				      MGMT_STATUS_BUSY);
3911 3912 3913 3914 3915 3916 3917 3918 3919 3920 3921
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

3922
	if (cp->val == 0x02)
3923
		hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3924
	else
3925
		hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3926

3927 3928
	cancel_adv_timeout(hdev);

3929
	if (val) {
3930 3931 3932 3933
		/* Switch to instance "0" for the Set Advertising setting.
		 * We cannot use update_[adv|scan_rsp]_data() here as the
		 * HCI_ADVERTISING flag is not yet set.
		 */
3934
		hdev->cur_adv_instance = 0x00;
3935 3936 3937
		__hci_req_update_adv_data(&req, 0x00);
		__hci_req_update_scan_rsp_data(&req, 0x00);
		__hci_req_enable_advertising(&req);
3938
	} else {
3939
		__hci_req_disable_advertising(&req);
3940
	}
3941 3942 3943 3944 3945 3946 3947 3948 3949 3950

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3951 3952 3953 3954 3955 3956 3957 3958
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3959
	if (!lmp_le_capable(hdev))
3960 3961
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				       MGMT_STATUS_NOT_SUPPORTED);
3962 3963

	if (hdev_is_powered(hdev))
3964 3965
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				       MGMT_STATUS_REJECTED);
3966 3967 3968

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
3969 3970 3971
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_SET_STATIC_ADDRESS,
					       MGMT_STATUS_INVALID_PARAMS);
3972 3973 3974

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
3975 3976 3977
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_SET_STATIC_ADDRESS,
					       MGMT_STATUS_INVALID_PARAMS);
3978 3979 3980 3981 3982 3983
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

3984 3985 3986 3987 3988
	err = send_settings_rsp(sk, MGMT_OP_SET_STATIC_ADDRESS, hdev);
	if (err < 0)
		goto unlock;

	err = new_settings(hdev, sk);
3989

3990
unlock:
3991 3992 3993 3994
	hci_dev_unlock(hdev);
	return err;
}

3995 3996 3997 3998 3999 4000 4001 4002 4003 4004
static int set_scan_params(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_cp_set_scan_params *cp = data;
	__u16 interval, window;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
4005 4006
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_NOT_SUPPORTED);
4007 4008 4009 4010

	interval = __le16_to_cpu(cp->interval);

	if (interval < 0x0004 || interval > 0x4000)
4011 4012
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
4013 4014 4015 4016

	window = __le16_to_cpu(cp->window);

	if (window < 0x0004 || window > 0x4000)
4017 4018
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
4019

4020
	if (window > interval)
4021 4022
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
4023

4024 4025 4026 4027 4028
	hci_dev_lock(hdev);

	hdev->le_scan_interval = interval;
	hdev->le_scan_window = window;

4029 4030
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0,
				NULL, 0);
4031

4032 4033 4034
	/* If background scan is running, restart it so new parameters are
	 * loaded.
	 */
4035
	if (hci_dev_test_flag(hdev, HCI_LE_SCAN) &&
4036 4037 4038 4039 4040 4041 4042 4043 4044 4045 4046
	    hdev->discovery.state == DISCOVERY_STOPPED) {
		struct hci_request req;

		hci_req_init(&req, hdev);

		hci_req_add_le_scan_disable(&req);
		hci_req_add_le_passive_scan(&req);

		hci_req_run(&req, NULL);
	}

4047 4048 4049 4050 4051
	hci_dev_unlock(hdev);

	return err;
}

4052 4053
static void fast_connectable_complete(struct hci_dev *hdev, u8 status,
				      u16 opcode)
4054
{
4055
	struct mgmt_pending_cmd *cmd;
4056 4057 4058 4059 4060

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

4061
	cmd = pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
4062 4063 4064 4065
	if (!cmd)
		goto unlock;

	if (status) {
4066 4067
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			        mgmt_status(status));
4068
	} else {
4069 4070 4071
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
4072
			hci_dev_set_flag(hdev, HCI_FAST_CONNECTABLE);
4073
		else
4074
			hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE);
4075

4076 4077 4078 4079 4080 4081 4082 4083 4084 4085
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

4086
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
4087
				void *data, u16 len)
4088
{
4089
	struct mgmt_mode *cp = data;
4090
	struct mgmt_pending_cmd *cmd;
4091
	struct hci_request req;
4092 4093
	int err;

4094
	BT_DBG("%s", hdev->name);
4095

4096
	if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) ||
4097
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
4098 4099
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				       MGMT_STATUS_NOT_SUPPORTED);
4100

4101
	if (cp->val != 0x00 && cp->val != 0x01)
4102 4103
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				       MGMT_STATUS_INVALID_PARAMS);
4104

4105 4106
	hci_dev_lock(hdev);

4107
	if (pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
4108 4109
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				      MGMT_STATUS_BUSY);
4110 4111 4112
		goto unlock;
	}

4113
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) {
4114 4115 4116 4117 4118
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

4119
	if (!hdev_is_powered(hdev)) {
4120
		hci_dev_change_flag(hdev, HCI_FAST_CONNECTABLE);
4121 4122 4123 4124 4125 4126
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		new_settings(hdev, sk);
		goto unlock;
	}

4127 4128 4129 4130 4131
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
4132 4133
	}

4134 4135
	hci_req_init(&req, hdev);

4136
	__hci_req_write_fast_connectable(&req, cp->val);
4137 4138

	err = hci_req_run(&req, fast_connectable_complete);
4139
	if (err < 0) {
4140 4141
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				      MGMT_STATUS_FAILED);
4142
		mgmt_pending_remove(cmd);
4143 4144
	}

4145
unlock:
4146
	hci_dev_unlock(hdev);
4147

4148 4149 4150
	return err;
}

4151
static void set_bredr_complete(struct hci_dev *hdev, u8 status, u16 opcode)
4152
{
4153
	struct mgmt_pending_cmd *cmd;
4154 4155 4156 4157 4158

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

4159
	cmd = pending_find(MGMT_OP_SET_BREDR, hdev);
4160 4161 4162 4163 4164 4165 4166 4167 4168
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
4169
		hci_dev_clear_flag(hdev, HCI_BREDR_ENABLED);
4170

4171
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4186
	struct mgmt_pending_cmd *cmd;
4187 4188 4189 4190 4191 4192
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
4193 4194
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_NOT_SUPPORTED);
4195

4196
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED))
4197 4198
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_REJECTED);
4199 4200

	if (cp->val != 0x00 && cp->val != 0x01)
4201 4202
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_INVALID_PARAMS);
4203 4204 4205

	hci_dev_lock(hdev);

4206
	if (cp->val == hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
4207 4208 4209 4210 4211 4212
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
4213 4214 4215 4216 4217
			hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
			hci_dev_clear_flag(hdev, HCI_SSP_ENABLED);
			hci_dev_clear_flag(hdev, HCI_LINK_SECURITY);
			hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE);
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
4218 4219
		}

4220
		hci_dev_change_flag(hdev, HCI_BREDR_ENABLED);
4221 4222 4223 4224 4225 4226 4227 4228 4229 4230 4231

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
4232 4233
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				      MGMT_STATUS_REJECTED);
4234
		goto unlock;
4235 4236 4237 4238 4239 4240 4241 4242
	} else {
		/* When configuring a dual-mode controller to operate
		 * with LE only and using a static address, then switching
		 * BR/EDR back on is not allowed.
		 *
		 * Dual-mode controllers shall operate with the public
		 * address as its identity address for BR/EDR and LE. So
		 * reject the attempt to create an invalid configuration.
4243 4244 4245 4246 4247 4248
		 *
		 * The same restrictions applies when secure connections
		 * has been enabled. For BR/EDR this is a controller feature
		 * while for LE it is a host stack feature. This means that
		 * switching BR/EDR back on when secure connections has been
		 * enabled is not a supported transaction.
4249
		 */
4250
		if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
4251
		    (bacmp(&hdev->static_addr, BDADDR_ANY) ||
4252
		     hci_dev_test_flag(hdev, HCI_SC_ENABLED))) {
4253 4254
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
					      MGMT_STATUS_REJECTED);
4255 4256
			goto unlock;
		}
4257 4258
	}

4259
	if (pending_find(MGMT_OP_SET_BREDR, hdev)) {
4260 4261
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				      MGMT_STATUS_BUSY);
4262 4263 4264 4265 4266 4267 4268 4269 4270
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

4271 4272
	/* We need to flip the bit already here so that
	 * hci_req_update_adv_data generates the correct flags.
4273
	 */
4274
	hci_dev_set_flag(hdev, HCI_BREDR_ENABLED);
4275 4276

	hci_req_init(&req, hdev);
4277

4278
	__hci_req_write_fast_connectable(&req, false);
4279
	__hci_req_update_scan(&req);
4280

4281 4282 4283
	/* Since only the advertising data flags will change, there
	 * is no need to update the scan response data.
	 */
4284
	__hci_req_update_adv_data(&req, hdev->cur_adv_instance);
4285

4286 4287 4288 4289 4290 4291 4292 4293 4294
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4295 4296
static void sc_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode)
{
4297
	struct mgmt_pending_cmd *cmd;
4298 4299 4300 4301 4302 4303
	struct mgmt_mode *cp;

	BT_DBG("%s status %u", hdev->name, status);

	hci_dev_lock(hdev);

4304
	cmd = pending_find(MGMT_OP_SET_SECURE_CONN, hdev);
4305 4306 4307 4308
	if (!cmd)
		goto unlock;

	if (status) {
4309 4310
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode,
			        mgmt_status(status));
4311 4312 4313 4314 4315 4316 4317
		goto remove;
	}

	cp = cmd->param;

	switch (cp->val) {
	case 0x00:
4318 4319
		hci_dev_clear_flag(hdev, HCI_SC_ENABLED);
		hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4320 4321
		break;
	case 0x01:
4322
		hci_dev_set_flag(hdev, HCI_SC_ENABLED);
4323
		hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4324 4325
		break;
	case 0x02:
4326 4327
		hci_dev_set_flag(hdev, HCI_SC_ENABLED);
		hci_dev_set_flag(hdev, HCI_SC_ONLY);
4328 4329 4330 4331 4332 4333 4334 4335 4336 4337 4338 4339
		break;
	}

	send_settings_rsp(cmd->sk, MGMT_OP_SET_SECURE_CONN, hdev);
	new_settings(hdev, cmd->sk);

remove:
	mgmt_pending_remove(cmd);
unlock:
	hci_dev_unlock(hdev);
}

4340 4341 4342 4343
static int set_secure_conn(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4344
	struct mgmt_pending_cmd *cmd;
4345
	struct hci_request req;
4346
	u8 val;
4347 4348 4349 4350
	int err;

	BT_DBG("request for %s", hdev->name);

4351
	if (!lmp_sc_capable(hdev) &&
4352
	    !hci_dev_test_flag(hdev, HCI_LE_ENABLED))
4353 4354
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				       MGMT_STATUS_NOT_SUPPORTED);
4355

4356
	if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
4357
	    lmp_sc_capable(hdev) &&
4358
	    !hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
4359 4360
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				       MGMT_STATUS_REJECTED);
4361

4362
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4363
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4364 4365 4366 4367
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

4368
	if (!hdev_is_powered(hdev) || !lmp_sc_capable(hdev) ||
4369
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
4370 4371
		bool changed;

4372
		if (cp->val) {
4373 4374
			changed = !hci_dev_test_and_set_flag(hdev,
							     HCI_SC_ENABLED);
4375
			if (cp->val == 0x02)
4376
				hci_dev_set_flag(hdev, HCI_SC_ONLY);
4377
			else
4378
				hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4379
		} else {
4380 4381
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_SC_ENABLED);
4382
			hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4383
		}
4384 4385 4386 4387 4388 4389 4390 4391 4392 4393 4394

		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

		goto failed;
	}

4395
	if (pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) {
4396 4397
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				      MGMT_STATUS_BUSY);
4398 4399 4400
		goto failed;
	}

4401 4402
	val = !!cp->val;

4403 4404
	if (val == hci_dev_test_flag(hdev, HCI_SC_ENABLED) &&
	    (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
4405 4406 4407 4408 4409 4410 4411 4412 4413 4414
		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

4415 4416 4417
	hci_req_init(&req, hdev);
	hci_req_add(&req, HCI_OP_WRITE_SC_SUPPORT, 1, &val);
	err = hci_req_run(&req, sc_enable_complete);
4418 4419 4420 4421 4422 4423 4424 4425 4426 4427
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

4428 4429 4430 4431
static int set_debug_keys(struct sock *sk, struct hci_dev *hdev,
			  void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4432
	bool changed, use_changed;
4433 4434 4435 4436
	int err;

	BT_DBG("request for %s", hdev->name);

4437
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4438 4439
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4440 4441 4442 4443

	hci_dev_lock(hdev);

	if (cp->val)
4444
		changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS);
4445
	else
4446 4447
		changed = hci_dev_test_and_clear_flag(hdev,
						      HCI_KEEP_DEBUG_KEYS);
4448

4449
	if (cp->val == 0x02)
4450 4451
		use_changed = !hci_dev_test_and_set_flag(hdev,
							 HCI_USE_DEBUG_KEYS);
4452
	else
4453 4454
		use_changed = hci_dev_test_and_clear_flag(hdev,
							  HCI_USE_DEBUG_KEYS);
4455 4456

	if (hdev_is_powered(hdev) && use_changed &&
4457
	    hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
4458 4459 4460 4461 4462
		u8 mode = (cp->val == 0x02) ? 0x01 : 0x00;
		hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE,
			     sizeof(mode), &mode);
	}

4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474
	err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4475 4476 4477 4478 4479 4480 4481 4482 4483 4484
static int set_privacy(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		       u16 len)
{
	struct mgmt_cp_set_privacy *cp = cp_data;
	bool changed;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4485 4486
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_NOT_SUPPORTED);
4487

4488
	if (cp->privacy != 0x00 && cp->privacy != 0x01 && cp->privacy != 0x02)
4489 4490
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_INVALID_PARAMS);
4491 4492

	if (hdev_is_powered(hdev))
4493 4494
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_REJECTED);
4495 4496 4497

	hci_dev_lock(hdev);

4498 4499 4500
	/* If user space supports this command it is also expected to
	 * handle IRKs. Therefore, set the HCI_RPA_RESOLVING flag.
	 */
4501
	hci_dev_set_flag(hdev, HCI_RPA_RESOLVING);
4502

4503
	if (cp->privacy) {
4504
		changed = !hci_dev_test_and_set_flag(hdev, HCI_PRIVACY);
4505
		memcpy(hdev->irk, cp->irk, sizeof(hdev->irk));
4506
		hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
4507 4508 4509 4510
		if (cp->privacy == 0x02)
			hci_dev_set_flag(hdev, HCI_LIMITED_PRIVACY);
		else
			hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY);
4511
	} else {
4512
		changed = hci_dev_test_and_clear_flag(hdev, HCI_PRIVACY);
4513
		memset(hdev->irk, 0, sizeof(hdev->irk));
4514
		hci_dev_clear_flag(hdev, HCI_RPA_EXPIRED);
4515
		hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY);
4516 4517 4518 4519 4520 4521 4522 4523 4524 4525 4526 4527 4528 4529
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_PRIVACY, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4530 4531 4532 4533 4534 4535 4536 4537 4538 4539 4540 4541 4542 4543 4544 4545 4546 4547 4548 4549
static bool irk_is_valid(struct mgmt_irk_info *irk)
{
	switch (irk->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
}

static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		     u16 len)
{
	struct mgmt_cp_load_irks *cp = cp_data;
4550 4551
	const u16 max_irk_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_irk_info));
4552 4553 4554 4555 4556 4557
	u16 irk_count, expected_len;
	int i, err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4558 4559
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_NOT_SUPPORTED);
4560 4561

	irk_count = __le16_to_cpu(cp->irk_count);
4562 4563
	if (irk_count > max_irk_count) {
		BT_ERR("load_irks: too big irk_count value %u", irk_count);
4564 4565
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_INVALID_PARAMS);
4566
	}
4567 4568 4569 4570

	expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info);
	if (expected_len != len) {
		BT_ERR("load_irks: expected %u bytes, got %u bytes",
4571
		       expected_len, len);
4572 4573
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_INVALID_PARAMS);
4574 4575 4576 4577 4578 4579 4580 4581
	}

	BT_DBG("%s irk_count %u", hdev->name, irk_count);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *key = &cp->irks[i];

		if (!irk_is_valid(key))
4582 4583 4584
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_IRKS,
					       MGMT_STATUS_INVALID_PARAMS);
4585 4586 4587 4588 4589 4590 4591 4592 4593
	}

	hci_dev_lock(hdev);

	hci_smp_irks_clear(hdev);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *irk = &cp->irks[i];

4594 4595
		hci_add_irk(hdev, &irk->addr.bdaddr,
			    le_addr_type(irk->addr.type), irk->val,
4596 4597 4598
			    BDADDR_ANY);
	}

4599
	hci_dev_set_flag(hdev, HCI_RPA_RESOLVING);
4600

4601
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0);
4602 4603 4604 4605 4606 4607

	hci_dev_unlock(hdev);

	return err;
}

4608 4609 4610 4611
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
	if (key->master != 0x00 && key->master != 0x01)
		return false;
4612 4613 4614 4615 4616 4617 4618 4619 4620 4621 4622 4623 4624

	switch (key->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
4625 4626
}

4627
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
4628
			       void *cp_data, u16 len)
4629 4630
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
4631 4632
	const u16 max_key_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_ltk_info));
4633
	u16 key_count, expected_len;
4634
	int i, err;
4635

4636 4637 4638
	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4639 4640
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_NOT_SUPPORTED);
4641

4642
	key_count = __le16_to_cpu(cp->key_count);
4643 4644
	if (key_count > max_key_count) {
		BT_ERR("load_ltks: too big key_count value %u", key_count);
4645 4646
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4647
	}
4648 4649 4650 4651 4652

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
4653
		       expected_len, len);
4654 4655
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4656 4657
	}

4658
	BT_DBG("%s key_count %u", hdev->name, key_count);
4659

4660 4661 4662
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

4663
		if (!ltk_is_valid(key))
4664 4665 4666
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_LONG_TERM_KEYS,
					       MGMT_STATUS_INVALID_PARAMS);
4667 4668
	}

4669 4670 4671 4672 4673 4674
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
4675
		u8 type, authenticated;
4676

4677 4678
		switch (key->type) {
		case MGMT_LTK_UNAUTHENTICATED:
4679
			authenticated = 0x00;
4680
			type = key->master ? SMP_LTK : SMP_LTK_SLAVE;
4681 4682
			break;
		case MGMT_LTK_AUTHENTICATED:
4683
			authenticated = 0x01;
4684 4685 4686 4687 4688
			type = key->master ? SMP_LTK : SMP_LTK_SLAVE;
			break;
		case MGMT_LTK_P256_UNAUTH:
			authenticated = 0x00;
			type = SMP_LTK_P256;
4689
			break;
4690 4691 4692
		case MGMT_LTK_P256_AUTH:
			authenticated = 0x01;
			type = SMP_LTK_P256;
4693
			break;
4694 4695 4696
		case MGMT_LTK_P256_DEBUG:
			authenticated = 0x00;
			type = SMP_LTK_P256_DEBUG;
4697 4698 4699
		default:
			continue;
		}
4700

4701 4702 4703
		hci_add_ltk(hdev, &key->addr.bdaddr,
			    le_addr_type(key->addr.type), type, authenticated,
			    key->val, key->enc_size, key->ediv, key->rand);
4704 4705
	}

4706
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
4707 4708
			   NULL, 0);

4709 4710
	hci_dev_unlock(hdev);

4711
	return err;
4712 4713
}

4714
static int conn_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
4715 4716
{
	struct hci_conn *conn = cmd->user_data;
4717
	struct mgmt_rp_get_conn_info rp;
4718
	int err;
4719

4720
	memcpy(&rp.addr, cmd->param, sizeof(rp.addr));
4721

4722
	if (status == MGMT_STATUS_SUCCESS) {
4723
		rp.rssi = conn->rssi;
4724 4725 4726 4727 4728 4729
		rp.tx_power = conn->tx_power;
		rp.max_tx_power = conn->max_tx_power;
	} else {
		rp.rssi = HCI_RSSI_INVALID;
		rp.tx_power = HCI_TX_POWER_INVALID;
		rp.max_tx_power = HCI_TX_POWER_INVALID;
4730 4731
	}

4732 4733
	err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_GET_CONN_INFO,
				status, &rp, sizeof(rp));
4734 4735

	hci_conn_drop(conn);
4736
	hci_conn_put(conn);
4737 4738

	return err;
4739 4740
}

4741 4742
static void conn_info_refresh_complete(struct hci_dev *hdev, u8 hci_status,
				       u16 opcode)
4743 4744
{
	struct hci_cp_read_rssi *cp;
4745
	struct mgmt_pending_cmd *cmd;
4746 4747
	struct hci_conn *conn;
	u16 handle;
4748
	u8 status;
4749

4750
	BT_DBG("status 0x%02x", hci_status);
4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762 4763 4764 4765

	hci_dev_lock(hdev);

	/* Commands sent in request are either Read RSSI or Read Transmit Power
	 * Level so we check which one was last sent to retrieve connection
	 * handle.  Both commands have handle as first parameter so it's safe to
	 * cast data on the same command struct.
	 *
	 * First command sent is always Read RSSI and we fail only if it fails.
	 * In other case we simply override error to indicate success as we
	 * already remembered if TX power value is actually valid.
	 */
	cp = hci_sent_cmd_data(hdev, HCI_OP_READ_RSSI);
	if (!cp) {
		cp = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
4766 4767 4768
		status = MGMT_STATUS_SUCCESS;
	} else {
		status = mgmt_status(hci_status);
4769 4770 4771
	}

	if (!cp) {
4772
		BT_ERR("invalid sent_cmd in conn_info response");
4773 4774 4775 4776 4777 4778
		goto unlock;
	}

	handle = __le16_to_cpu(cp->handle);
	conn = hci_conn_hash_lookup_handle(hdev, handle);
	if (!conn) {
4779
		BT_ERR("unknown handle (%d) in conn_info response", handle);
4780 4781 4782
		goto unlock;
	}

4783
	cmd = pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn);
4784 4785
	if (!cmd)
		goto unlock;
4786

4787 4788
	cmd->cmd_complete(cmd, status);
	mgmt_pending_remove(cmd);
4789 4790 4791 4792 4793 4794 4795 4796 4797 4798 4799 4800 4801 4802 4803 4804 4805 4806 4807 4808 4809

unlock:
	hci_dev_unlock(hdev);
}

static int get_conn_info(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_get_conn_info *cp = data;
	struct mgmt_rp_get_conn_info rp;
	struct hci_conn *conn;
	unsigned long conn_info_age;
	int err = 0;

	BT_DBG("%s", hdev->name);

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (!bdaddr_type_is_valid(cp->addr.type))
4810 4811 4812
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
4813 4814 4815 4816

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
4817 4818 4819
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
4820 4821 4822 4823 4824 4825 4826 4827 4828 4829
		goto unlock;
	}

	if (cp->addr.type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);

	if (!conn || conn->state != BT_CONNECTED) {
4830 4831 4832
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_NOT_CONNECTED, &rp,
					sizeof(rp));
4833 4834 4835
		goto unlock;
	}

4836
	if (pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn)) {
4837 4838
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
4839 4840 4841
		goto unlock;
	}

4842 4843 4844 4845 4846 4847 4848 4849 4850 4851
	/* To avoid client trying to guess when to poll again for information we
	 * calculate conn info age as random value between min/max set in hdev.
	 */
	conn_info_age = hdev->conn_info_min_age +
			prandom_u32_max(hdev->conn_info_max_age -
					hdev->conn_info_min_age);

	/* Query controller to refresh cached values if they are too old or were
	 * never read.
	 */
4852 4853
	if (time_after(jiffies, conn->conn_info_timestamp +
		       msecs_to_jiffies(conn_info_age)) ||
4854 4855 4856 4857
	    !conn->conn_info_timestamp) {
		struct hci_request req;
		struct hci_cp_read_tx_power req_txp_cp;
		struct hci_cp_read_rssi req_rssi_cp;
4858
		struct mgmt_pending_cmd *cmd;
4859 4860 4861 4862 4863 4864

		hci_req_init(&req, hdev);
		req_rssi_cp.handle = cpu_to_le16(conn->handle);
		hci_req_add(&req, HCI_OP_READ_RSSI, sizeof(req_rssi_cp),
			    &req_rssi_cp);

4865 4866 4867 4868 4869 4870 4871 4872 4873 4874
		/* For LE links TX power does not change thus we don't need to
		 * query for it once value is known.
		 */
		if (!bdaddr_type_is_le(cp->addr.type) ||
		    conn->tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x00;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}
4875

4876 4877 4878 4879 4880 4881 4882 4883
		/* Max TX power needs to be read only once per connection */
		if (conn->max_tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x01;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}

4884 4885 4886 4887 4888 4889 4890 4891 4892 4893 4894 4895
		err = hci_req_run(&req, conn_info_refresh_complete);
		if (err < 0)
			goto unlock;

		cmd = mgmt_pending_add(sk, MGMT_OP_GET_CONN_INFO, hdev,
				       data, len);
		if (!cmd) {
			err = -ENOMEM;
			goto unlock;
		}

		hci_conn_hold(conn);
4896
		cmd->user_data = hci_conn_get(conn);
4897
		cmd->cmd_complete = conn_info_cmd_complete;
4898 4899 4900 4901 4902 4903

		conn->conn_info_timestamp = jiffies;
	} else {
		/* Cache is valid, just reply with values cached in hci_conn */
		rp.rssi = conn->rssi;
		rp.tx_power = conn->tx_power;
4904
		rp.max_tx_power = conn->max_tx_power;
4905

4906 4907
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
4908 4909 4910 4911 4912 4913 4914
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4915
static int clock_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
4916
{
4917
	struct hci_conn *conn = cmd->user_data;
4918
	struct mgmt_rp_get_clock_info rp;
4919
	struct hci_dev *hdev;
4920
	int err;
4921 4922

	memset(&rp, 0, sizeof(rp));
4923
	memcpy(&rp.addr, cmd->param, sizeof(rp.addr));
4924 4925 4926 4927 4928 4929 4930 4931 4932 4933 4934 4935 4936 4937 4938 4939

	if (status)
		goto complete;

	hdev = hci_dev_get(cmd->index);
	if (hdev) {
		rp.local_clock = cpu_to_le32(hdev->clock);
		hci_dev_put(hdev);
	}

	if (conn) {
		rp.piconet_clock = cpu_to_le32(conn->clock);
		rp.accuracy = cpu_to_le16(conn->clock_accuracy);
	}

complete:
4940 4941
	err = mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, &rp,
				sizeof(rp));
4942 4943 4944 4945 4946

	if (conn) {
		hci_conn_drop(conn);
		hci_conn_put(conn);
	}
4947 4948

	return err;
4949 4950
}

4951
static void get_clock_info_complete(struct hci_dev *hdev, u8 status, u16 opcode)
4952
{
4953
	struct hci_cp_read_clock *hci_cp;
4954
	struct mgmt_pending_cmd *cmd;
4955 4956 4957 4958 4959 4960 4961 4962 4963 4964 4965 4966 4967 4968 4969 4970 4971
	struct hci_conn *conn;

	BT_DBG("%s status %u", hdev->name, status);

	hci_dev_lock(hdev);

	hci_cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK);
	if (!hci_cp)
		goto unlock;

	if (hci_cp->which) {
		u16 handle = __le16_to_cpu(hci_cp->handle);
		conn = hci_conn_hash_lookup_handle(hdev, handle);
	} else {
		conn = NULL;
	}

4972
	cmd = pending_find_data(MGMT_OP_GET_CLOCK_INFO, hdev, conn);
4973 4974 4975
	if (!cmd)
		goto unlock;

4976
	cmd->cmd_complete(cmd, mgmt_status(status));
4977 4978 4979 4980 4981 4982 4983 4984 4985 4986 4987 4988
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int get_clock_info(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_get_clock_info *cp = data;
	struct mgmt_rp_get_clock_info rp;
	struct hci_cp_read_clock hci_cp;
4989
	struct mgmt_pending_cmd *cmd;
4990 4991 4992 4993 4994 4995 4996 4997 4998 4999 5000
	struct hci_request req;
	struct hci_conn *conn;
	int err;

	BT_DBG("%s", hdev->name);

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (cp->addr.type != BDADDR_BREDR)
5001 5002 5003
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
5004 5005 5006 5007

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
5008 5009 5010
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
5011 5012 5013 5014 5015 5016 5017
		goto unlock;
	}

	if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
		if (!conn || conn->state != BT_CONNECTED) {
5018 5019 5020 5021
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_GET_CLOCK_INFO,
						MGMT_STATUS_NOT_CONNECTED,
						&rp, sizeof(rp));
5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032 5033
			goto unlock;
		}
	} else {
		conn = NULL;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_GET_CLOCK_INFO, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

5034 5035
	cmd->cmd_complete = clock_info_cmd_complete;

5036 5037 5038 5039 5040 5041 5042
	hci_req_init(&req, hdev);

	memset(&hci_cp, 0, sizeof(hci_cp));
	hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp);

	if (conn) {
		hci_conn_hold(conn);
5043
		cmd->user_data = hci_conn_get(conn);
5044 5045 5046 5047 5048 5049 5050 5051 5052 5053 5054 5055 5056 5057 5058

		hci_cp.handle = cpu_to_le16(conn->handle);
		hci_cp.which = 0x01; /* Piconet clock */
		hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp);
	}

	err = hci_req_run(&req, get_clock_info_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5059 5060 5061 5062 5063 5064 5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076
static bool is_connected(struct hci_dev *hdev, bdaddr_t *addr, u8 type)
{
	struct hci_conn *conn;

	conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, addr);
	if (!conn)
		return false;

	if (conn->dst_type != type)
		return false;

	if (conn->state != BT_CONNECTED)
		return false;

	return true;
}

/* This function requires the caller holds hdev->lock */
5077
static int hci_conn_params_set(struct hci_dev *hdev, bdaddr_t *addr,
5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088 5089 5090 5091 5092 5093
			       u8 addr_type, u8 auto_connect)
{
	struct hci_conn_params *params;

	params = hci_conn_params_add(hdev, addr, addr_type);
	if (!params)
		return -EIO;

	if (params->auto_connect == auto_connect)
		return 0;

	list_del_init(&params->action);

	switch (auto_connect) {
	case HCI_AUTO_CONN_DISABLED:
	case HCI_AUTO_CONN_LINK_LOSS:
5094 5095 5096 5097 5098
		/* If auto connect is being disabled when we're trying to
		 * connect to device, keep connecting.
		 */
		if (params->explicit_connect)
			list_add(&params->action, &hdev->pend_le_conns);
5099 5100
		break;
	case HCI_AUTO_CONN_REPORT:
5101 5102 5103 5104
		if (params->explicit_connect)
			list_add(&params->action, &hdev->pend_le_conns);
		else
			list_add(&params->action, &hdev->pend_le_reports);
5105 5106 5107
		break;
	case HCI_AUTO_CONN_DIRECT:
	case HCI_AUTO_CONN_ALWAYS:
5108
		if (!is_connected(hdev, addr, addr_type))
5109 5110 5111 5112 5113 5114 5115 5116 5117 5118 5119 5120
			list_add(&params->action, &hdev->pend_le_conns);
		break;
	}

	params->auto_connect = auto_connect;

	BT_DBG("addr %pMR (type %u) auto_connect %u", addr, addr_type,
	       auto_connect);

	return 0;
}

5121 5122 5123 5124 5125 5126 5127 5128 5129 5130 5131 5132
static void device_added(struct sock *sk, struct hci_dev *hdev,
			 bdaddr_t *bdaddr, u8 type, u8 action)
{
	struct mgmt_ev_device_added ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
	ev.action = action;

	mgmt_event(MGMT_EV_DEVICE_ADDED, hdev, &ev, sizeof(ev), sk);
}

5133 5134 5135 5136 5137 5138 5139 5140 5141
static int add_device(struct sock *sk, struct hci_dev *hdev,
		      void *data, u16 len)
{
	struct mgmt_cp_add_device *cp = data;
	u8 auto_conn, addr_type;
	int err;

	BT_DBG("%s", hdev->name);

5142
	if (!bdaddr_type_is_valid(cp->addr.type) ||
5143
	    !bacmp(&cp->addr.bdaddr, BDADDR_ANY))
5144 5145 5146
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
5147

5148
	if (cp->action != 0x00 && cp->action != 0x01 && cp->action != 0x02)
5149 5150 5151
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
5152 5153 5154

	hci_dev_lock(hdev);

5155
	if (cp->addr.type == BDADDR_BREDR) {
5156
		/* Only incoming connections action is supported for now */
5157
		if (cp->action != 0x01) {
5158 5159 5160 5161
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_ADD_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5162 5163 5164 5165 5166 5167 5168
			goto unlock;
		}

		err = hci_bdaddr_list_add(&hdev->whitelist, &cp->addr.bdaddr,
					  cp->addr.type);
		if (err)
			goto unlock;
5169

5170
		hci_req_update_scan(hdev);
5171

5172 5173 5174
		goto added;
	}

5175
	addr_type = le_addr_type(cp->addr.type);
5176

5177
	if (cp->action == 0x02)
5178
		auto_conn = HCI_AUTO_CONN_ALWAYS;
5179 5180
	else if (cp->action == 0x01)
		auto_conn = HCI_AUTO_CONN_DIRECT;
5181
	else
5182
		auto_conn = HCI_AUTO_CONN_REPORT;
5183

5184 5185 5186 5187 5188 5189
	/* Kernel internally uses conn_params with resolvable private
	 * address, but Add Device allows only identity addresses.
	 * Make sure it is enforced before calling
	 * hci_conn_params_lookup.
	 */
	if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) {
5190 5191 5192
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					MGMT_STATUS_INVALID_PARAMS,
					&cp->addr, sizeof(cp->addr));
5193 5194 5195
		goto unlock;
	}

5196 5197 5198
	/* If the connection parameters don't exist for this device,
	 * they will be created and configured with defaults.
	 */
5199
	if (hci_conn_params_set(hdev, &cp->addr.bdaddr, addr_type,
5200
				auto_conn) < 0) {
5201 5202 5203
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					MGMT_STATUS_FAILED, &cp->addr,
					sizeof(cp->addr));
5204 5205 5206
		goto unlock;
	}

5207 5208
	hci_update_background_scan(hdev);

5209
added:
5210 5211
	device_added(sk, hdev, &cp->addr.bdaddr, cp->addr.type, cp->action);

5212 5213 5214
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
				MGMT_STATUS_SUCCESS, &cp->addr,
				sizeof(cp->addr));
5215 5216 5217 5218 5219 5220

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5221 5222 5223 5224 5225 5226 5227 5228 5229 5230 5231
static void device_removed(struct sock *sk, struct hci_dev *hdev,
			   bdaddr_t *bdaddr, u8 type)
{
	struct mgmt_ev_device_removed ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;

	mgmt_event(MGMT_EV_DEVICE_REMOVED, hdev, &ev, sizeof(ev), sk);
}

5232 5233 5234 5235 5236 5237 5238 5239 5240 5241 5242
static int remove_device(struct sock *sk, struct hci_dev *hdev,
			 void *data, u16 len)
{
	struct mgmt_cp_remove_device *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
5243
		struct hci_conn_params *params;
5244 5245
		u8 addr_type;

5246
		if (!bdaddr_type_is_valid(cp->addr.type)) {
5247 5248 5249 5250
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5251 5252 5253
			goto unlock;
		}

5254 5255 5256 5257 5258
		if (cp->addr.type == BDADDR_BREDR) {
			err = hci_bdaddr_list_del(&hdev->whitelist,
						  &cp->addr.bdaddr,
						  cp->addr.type);
			if (err) {
5259 5260 5261 5262 5263
				err = mgmt_cmd_complete(sk, hdev->id,
							MGMT_OP_REMOVE_DEVICE,
							MGMT_STATUS_INVALID_PARAMS,
							&cp->addr,
							sizeof(cp->addr));
5264 5265 5266
				goto unlock;
			}

5267
			hci_req_update_scan(hdev);
5268

5269 5270 5271 5272 5273
			device_removed(sk, hdev, &cp->addr.bdaddr,
				       cp->addr.type);
			goto complete;
		}

5274
		addr_type = le_addr_type(cp->addr.type);
5275

5276 5277 5278 5279 5280 5281
		/* Kernel internally uses conn_params with resolvable private
		 * address, but Remove Device allows only identity addresses.
		 * Make sure it is enforced before calling
		 * hci_conn_params_lookup.
		 */
		if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) {
5282 5283 5284 5285
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5286 5287 5288
			goto unlock;
		}

5289 5290 5291
		params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr,
						addr_type);
		if (!params) {
5292 5293 5294 5295
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5296 5297 5298
			goto unlock;
		}

5299 5300
		if (params->auto_connect == HCI_AUTO_CONN_DISABLED ||
		    params->auto_connect == HCI_AUTO_CONN_EXPLICIT) {
5301 5302 5303 5304
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5305 5306 5307
			goto unlock;
		}

5308
		list_del(&params->action);
5309 5310
		list_del(&params->list);
		kfree(params);
5311
		hci_update_background_scan(hdev);
5312 5313

		device_removed(sk, hdev, &cp->addr.bdaddr, cp->addr.type);
5314
	} else {
5315
		struct hci_conn_params *p, *tmp;
5316
		struct bdaddr_list *b, *btmp;
5317

5318
		if (cp->addr.type) {
5319 5320 5321 5322
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5323 5324 5325
			goto unlock;
		}

5326 5327 5328 5329 5330 5331
		list_for_each_entry_safe(b, btmp, &hdev->whitelist, list) {
			device_removed(sk, hdev, &b->bdaddr, b->bdaddr_type);
			list_del(&b->list);
			kfree(b);
		}

5332
		hci_req_update_scan(hdev);
5333

5334 5335 5336 5337
		list_for_each_entry_safe(p, tmp, &hdev->le_conn_params, list) {
			if (p->auto_connect == HCI_AUTO_CONN_DISABLED)
				continue;
			device_removed(sk, hdev, &p->addr, p->addr_type);
5338 5339 5340 5341
			if (p->explicit_connect) {
				p->auto_connect = HCI_AUTO_CONN_EXPLICIT;
				continue;
			}
5342 5343 5344 5345 5346 5347 5348
			list_del(&p->action);
			list_del(&p->list);
			kfree(p);
		}

		BT_DBG("All LE connection parameters were removed");

5349
		hci_update_background_scan(hdev);
5350 5351
	}

5352
complete:
5353 5354 5355
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_DEVICE,
				MGMT_STATUS_SUCCESS, &cp->addr,
				sizeof(cp->addr));
5356 5357 5358 5359 5360
unlock:
	hci_dev_unlock(hdev);
	return err;
}

5361 5362 5363 5364
static int load_conn_param(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
{
	struct mgmt_cp_load_conn_param *cp = data;
5365 5366
	const u16 max_param_count = ((U16_MAX - sizeof(*cp)) /
				     sizeof(struct mgmt_conn_param));
5367 5368 5369 5370
	u16 param_count, expected_len;
	int i;

	if (!lmp_le_capable(hdev))
5371 5372
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_NOT_SUPPORTED);
5373 5374

	param_count = __le16_to_cpu(cp->param_count);
5375 5376 5377
	if (param_count > max_param_count) {
		BT_ERR("load_conn_param: too big param_count value %u",
		       param_count);
5378 5379
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_INVALID_PARAMS);
5380
	}
5381 5382 5383 5384 5385 5386

	expected_len = sizeof(*cp) + param_count *
					sizeof(struct mgmt_conn_param);
	if (expected_len != len) {
		BT_ERR("load_conn_param: expected %u bytes, got %u bytes",
		       expected_len, len);
5387 5388
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_INVALID_PARAMS);
5389 5390 5391 5392 5393 5394 5395 5396 5397 5398 5399 5400 5401 5402 5403 5404 5405 5406 5407 5408 5409 5410 5411 5412 5413 5414 5415 5416 5417 5418 5419 5420 5421 5422 5423 5424 5425 5426 5427 5428 5429 5430 5431 5432 5433 5434 5435 5436 5437 5438 5439 5440 5441 5442
	}

	BT_DBG("%s param_count %u", hdev->name, param_count);

	hci_dev_lock(hdev);

	hci_conn_params_clear_disabled(hdev);

	for (i = 0; i < param_count; i++) {
		struct mgmt_conn_param *param = &cp->params[i];
		struct hci_conn_params *hci_param;
		u16 min, max, latency, timeout;
		u8 addr_type;

		BT_DBG("Adding %pMR (type %u)", &param->addr.bdaddr,
		       param->addr.type);

		if (param->addr.type == BDADDR_LE_PUBLIC) {
			addr_type = ADDR_LE_DEV_PUBLIC;
		} else if (param->addr.type == BDADDR_LE_RANDOM) {
			addr_type = ADDR_LE_DEV_RANDOM;
		} else {
			BT_ERR("Ignoring invalid connection parameters");
			continue;
		}

		min = le16_to_cpu(param->min_interval);
		max = le16_to_cpu(param->max_interval);
		latency = le16_to_cpu(param->latency);
		timeout = le16_to_cpu(param->timeout);

		BT_DBG("min 0x%04x max 0x%04x latency 0x%04x timeout 0x%04x",
		       min, max, latency, timeout);

		if (hci_check_conn_params(min, max, latency, timeout) < 0) {
			BT_ERR("Ignoring invalid connection parameters");
			continue;
		}

		hci_param = hci_conn_params_add(hdev, &param->addr.bdaddr,
						addr_type);
		if (!hci_param) {
			BT_ERR("Failed to add connection parameters");
			continue;
		}

		hci_param->conn_min_interval = min;
		hci_param->conn_max_interval = max;
		hci_param->conn_latency = latency;
		hci_param->supervision_timeout = timeout;
	}

	hci_dev_unlock(hdev);

5443 5444
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 0,
				 NULL, 0);
5445 5446
}

5447 5448 5449 5450 5451 5452 5453 5454 5455 5456
static int set_external_config(struct sock *sk, struct hci_dev *hdev,
			       void *data, u16 len)
{
	struct mgmt_cp_set_external_config *cp = data;
	bool changed;
	int err;

	BT_DBG("%s", hdev->name);

	if (hdev_is_powered(hdev))
5457 5458
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				       MGMT_STATUS_REJECTED);
5459 5460

	if (cp->config != 0x00 && cp->config != 0x01)
5461 5462
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				         MGMT_STATUS_INVALID_PARAMS);
5463 5464

	if (!test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks))
5465 5466
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				       MGMT_STATUS_NOT_SUPPORTED);
5467 5468 5469 5470

	hci_dev_lock(hdev);

	if (cp->config)
5471
		changed = !hci_dev_test_and_set_flag(hdev, HCI_EXT_CONFIGURED);
5472
	else
5473
		changed = hci_dev_test_and_clear_flag(hdev, HCI_EXT_CONFIGURED);
5474 5475 5476 5477 5478 5479 5480 5481

	err = send_options_rsp(sk, MGMT_OP_SET_EXTERNAL_CONFIG, hdev);
	if (err < 0)
		goto unlock;

	if (!changed)
		goto unlock;

5482 5483
	err = new_options(hdev, sk);

5484
	if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED) == is_configured(hdev)) {
5485
		mgmt_index_removed(hdev);
5486

5487
		if (hci_dev_test_and_change_flag(hdev, HCI_UNCONFIGURED)) {
5488 5489
			hci_dev_set_flag(hdev, HCI_CONFIG);
			hci_dev_set_flag(hdev, HCI_AUTO_OFF);
5490 5491 5492

			queue_work(hdev->req_workqueue, &hdev->power_on);
		} else {
5493
			set_bit(HCI_RAW, &hdev->flags);
5494 5495
			mgmt_index_added(hdev);
		}
5496 5497 5498 5499 5500 5501 5502
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5503 5504 5505 5506 5507 5508 5509 5510 5511 5512
static int set_public_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_public_address *cp = data;
	bool changed;
	int err;

	BT_DBG("%s", hdev->name);

	if (hdev_is_powered(hdev))
5513 5514
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_REJECTED);
5515 5516

	if (!bacmp(&cp->bdaddr, BDADDR_ANY))
5517 5518
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_INVALID_PARAMS);
5519 5520

	if (!hdev->set_bdaddr)
5521 5522
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_NOT_SUPPORTED);
5523 5524 5525 5526 5527 5528 5529 5530 5531 5532 5533 5534 5535

	hci_dev_lock(hdev);

	changed = !!bacmp(&hdev->public_addr, &cp->bdaddr);
	bacpy(&hdev->public_addr, &cp->bdaddr);

	err = send_options_rsp(sk, MGMT_OP_SET_PUBLIC_ADDRESS, hdev);
	if (err < 0)
		goto unlock;

	if (!changed)
		goto unlock;

5536
	if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED))
5537 5538 5539 5540 5541
		err = new_options(hdev, sk);

	if (is_configured(hdev)) {
		mgmt_index_removed(hdev);

5542
		hci_dev_clear_flag(hdev, HCI_UNCONFIGURED);
5543

5544 5545
		hci_dev_set_flag(hdev, HCI_CONFIG);
		hci_dev_set_flag(hdev, HCI_AUTO_OFF);
5546 5547 5548 5549 5550 5551 5552 5553 5554

		queue_work(hdev->req_workqueue, &hdev->power_on);
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565
static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data,
				  u8 data_len)
{
	eir[eir_len++] = sizeof(type) + data_len;
	eir[eir_len++] = type;
	memcpy(&eir[eir_len], data, data_len);
	eir_len += data_len;

	return eir_len;
}

5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603 5604 5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643 5644 5645 5646 5647 5648 5649 5650 5651 5652 5653 5654 5655 5656 5657 5658 5659 5660 5661 5662 5663 5664 5665 5666 5667 5668 5669 5670 5671 5672 5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696 5697 5698 5699 5700 5701 5702 5703 5704
static void read_local_oob_ext_data_complete(struct hci_dev *hdev, u8 status,
					     u16 opcode, struct sk_buff *skb)
{
	const struct mgmt_cp_read_local_oob_ext_data *mgmt_cp;
	struct mgmt_rp_read_local_oob_ext_data *mgmt_rp;
	u8 *h192, *r192, *h256, *r256;
	struct mgmt_pending_cmd *cmd;
	u16 eir_len;
	int err;

	BT_DBG("%s status %u", hdev->name, status);

	cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev);
	if (!cmd)
		return;

	mgmt_cp = cmd->param;

	if (status) {
		status = mgmt_status(status);
		eir_len = 0;

		h192 = NULL;
		r192 = NULL;
		h256 = NULL;
		r256 = NULL;
	} else if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) {
		struct hci_rp_read_local_oob_data *rp;

		if (skb->len != sizeof(*rp)) {
			status = MGMT_STATUS_FAILED;
			eir_len = 0;
		} else {
			status = MGMT_STATUS_SUCCESS;
			rp = (void *)skb->data;

			eir_len = 5 + 18 + 18;
			h192 = rp->hash;
			r192 = rp->rand;
			h256 = NULL;
			r256 = NULL;
		}
	} else {
		struct hci_rp_read_local_oob_ext_data *rp;

		if (skb->len != sizeof(*rp)) {
			status = MGMT_STATUS_FAILED;
			eir_len = 0;
		} else {
			status = MGMT_STATUS_SUCCESS;
			rp = (void *)skb->data;

			if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
				eir_len = 5 + 18 + 18;
				h192 = NULL;
				r192 = NULL;
			} else {
				eir_len = 5 + 18 + 18 + 18 + 18;
				h192 = rp->hash192;
				r192 = rp->rand192;
			}

			h256 = rp->hash256;
			r256 = rp->rand256;
		}
	}

	mgmt_rp = kmalloc(sizeof(*mgmt_rp) + eir_len, GFP_KERNEL);
	if (!mgmt_rp)
		goto done;

	if (status)
		goto send_rsp;

	eir_len = eir_append_data(mgmt_rp->eir, 0, EIR_CLASS_OF_DEV,
				  hdev->dev_class, 3);

	if (h192 && r192) {
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_HASH_C192, h192, 16);
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_RAND_R192, r192, 16);
	}

	if (h256 && r256) {
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_HASH_C256, h256, 16);
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_RAND_R256, r256, 16);
	}

send_rsp:
	mgmt_rp->type = mgmt_cp->type;
	mgmt_rp->eir_len = cpu_to_le16(eir_len);

	err = mgmt_cmd_complete(cmd->sk, hdev->id,
				MGMT_OP_READ_LOCAL_OOB_EXT_DATA, status,
				mgmt_rp, sizeof(*mgmt_rp) + eir_len);
	if (err < 0 || status)
		goto done;

	hci_sock_set_flag(cmd->sk, HCI_MGMT_OOB_DATA_EVENTS);

	err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev,
				 mgmt_rp, sizeof(*mgmt_rp) + eir_len,
				 HCI_MGMT_OOB_DATA_EVENTS, cmd->sk);
done:
	kfree(mgmt_rp);
	mgmt_pending_remove(cmd);
}

static int read_local_ssp_oob_req(struct hci_dev *hdev, struct sock *sk,
				  struct mgmt_cp_read_local_oob_ext_data *cp)
{
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;
	int err;

	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev,
			       cp, sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	hci_req_init(&req, hdev);

	if (bredr_sc_enabled(hdev))
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL);
	else
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);

	err = hci_req_run_skb(&req, read_local_oob_ext_data_complete);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		return err;
	}

	return 0;
}

5705 5706 5707 5708 5709 5710 5711
static int read_local_oob_ext_data(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 data_len)
{
	struct mgmt_cp_read_local_oob_ext_data *cp = data;
	struct mgmt_rp_read_local_oob_ext_data *rp;
	size_t rp_len;
	u16 eir_len;
5712
	u8 status, flags, role, addr[7], hash[16], rand[16];
5713 5714 5715 5716
	int err;

	BT_DBG("%s", hdev->name);

5717 5718 5719 5720 5721 5722 5723 5724 5725 5726 5727 5728 5729 5730 5731 5732 5733 5734 5735 5736 5737 5738 5739 5740
	if (hdev_is_powered(hdev)) {
		switch (cp->type) {
		case BIT(BDADDR_BREDR):
			status = mgmt_bredr_support(hdev);
			if (status)
				eir_len = 0;
			else
				eir_len = 5;
			break;
		case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)):
			status = mgmt_le_support(hdev);
			if (status)
				eir_len = 0;
			else
				eir_len = 9 + 3 + 18 + 18 + 3;
			break;
		default:
			status = MGMT_STATUS_INVALID_PARAMS;
			eir_len = 0;
			break;
		}
	} else {
		status = MGMT_STATUS_NOT_POWERED;
		eir_len = 0;
5741 5742 5743 5744
	}

	rp_len = sizeof(*rp) + eir_len;
	rp = kmalloc(rp_len, GFP_ATOMIC);
5745
	if (!rp)
5746
		return -ENOMEM;
5747

5748 5749 5750
	if (status)
		goto complete;

5751
	hci_dev_lock(hdev);
5752 5753 5754 5755

	eir_len = 0;
	switch (cp->type) {
	case BIT(BDADDR_BREDR):
5756 5757 5758 5759 5760 5761 5762 5763 5764 5765 5766 5767 5768
		if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
			err = read_local_ssp_oob_req(hdev, sk, cp);
			hci_dev_unlock(hdev);
			if (!err)
				goto done;

			status = MGMT_STATUS_FAILED;
			goto complete;
		} else {
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_CLASS_OF_DEV,
						  hdev->dev_class, 3);
		}
5769 5770
		break;
	case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)):
5771 5772
		if (hci_dev_test_flag(hdev, HCI_SC_ENABLED) &&
		    smp_generate_oob(hdev, hash, rand) < 0) {
5773
			hci_dev_unlock(hdev);
5774 5775
			status = MGMT_STATUS_FAILED;
			goto complete;
5776 5777
		}

5778 5779 5780 5781 5782 5783 5784 5785 5786 5787
		/* This should return the active RPA, but since the RPA
		 * is only programmed on demand, it is really hard to fill
		 * this in at the moment. For now disallow retrieving
		 * local out-of-band data when privacy is in use.
		 *
		 * Returning the identity address will not help here since
		 * pairing happens before the identity resolving key is
		 * known and thus the connection establishment happens
		 * based on the RPA and not the identity address.
		 */
5788
		if (hci_dev_test_flag(hdev, HCI_PRIVACY)) {
5789 5790 5791 5792 5793 5794 5795 5796 5797
			hci_dev_unlock(hdev);
			status = MGMT_STATUS_REJECTED;
			goto complete;
		}

		if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) ||
		   !bacmp(&hdev->bdaddr, BDADDR_ANY) ||
		   (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
		    bacmp(&hdev->static_addr, BDADDR_ANY))) {
5798 5799 5800 5801 5802 5803 5804 5805 5806 5807 5808 5809 5810 5811 5812 5813 5814 5815
			memcpy(addr, &hdev->static_addr, 6);
			addr[6] = 0x01;
		} else {
			memcpy(addr, &hdev->bdaddr, 6);
			addr[6] = 0x00;
		}

		eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_BDADDR,
					  addr, sizeof(addr));

		if (hci_dev_test_flag(hdev, HCI_ADVERTISING))
			role = 0x02;
		else
			role = 0x01;

		eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_ROLE,
					  &role, sizeof(role));

5816 5817 5818 5819
		if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) {
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_LE_SC_CONFIRM,
						  hash, sizeof(hash));
5820

5821 5822 5823 5824
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_LE_SC_RANDOM,
						  rand, sizeof(rand));
		}
5825

5826
		flags = mgmt_get_adv_discov_flags(hdev);
5827 5828 5829 5830 5831 5832 5833 5834 5835 5836 5837

		if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
			flags |= LE_AD_NO_BREDR;

		eir_len = eir_append_data(rp->eir, eir_len, EIR_FLAGS,
					  &flags, sizeof(flags));
		break;
	}

	hci_dev_unlock(hdev);

5838 5839
	hci_sock_set_flag(sk, HCI_MGMT_OOB_DATA_EVENTS);

5840 5841 5842
	status = MGMT_STATUS_SUCCESS;

complete:
5843 5844 5845
	rp->type = cp->type;
	rp->eir_len = cpu_to_le16(eir_len);

5846
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_EXT_DATA,
5847 5848
				status, rp, sizeof(*rp) + eir_len);
	if (err < 0 || status)
5849 5850 5851 5852 5853
		goto done;

	err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev,
				 rp, sizeof(*rp) + eir_len,
				 HCI_MGMT_OOB_DATA_EVENTS, sk);
5854

5855
done:
5856 5857 5858 5859 5860
	kfree(rp);

	return err;
}

5861 5862 5863 5864 5865 5866 5867 5868 5869 5870 5871 5872 5873 5874 5875
static u32 get_supported_adv_flags(struct hci_dev *hdev)
{
	u32 flags = 0;

	flags |= MGMT_ADV_FLAG_CONNECTABLE;
	flags |= MGMT_ADV_FLAG_DISCOV;
	flags |= MGMT_ADV_FLAG_LIMITED_DISCOV;
	flags |= MGMT_ADV_FLAG_MANAGED_FLAGS;

	if (hdev->adv_tx_power != HCI_TX_POWER_INVALID)
		flags |= MGMT_ADV_FLAG_TX_POWER;

	return flags;
}

5876 5877 5878 5879 5880
static int read_adv_features(struct sock *sk, struct hci_dev *hdev,
			     void *data, u16 data_len)
{
	struct mgmt_rp_read_adv_features *rp;
	size_t rp_len;
5881
	int err;
5882
	struct adv_info *adv_instance;
5883
	u32 supported_flags;
5884
	u8 *instance;
5885 5886 5887

	BT_DBG("%s", hdev->name);

5888 5889 5890 5891
	if (!lmp_le_capable(hdev))
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES,
				       MGMT_STATUS_REJECTED);

5892 5893
	hci_dev_lock(hdev);

5894
	rp_len = sizeof(*rp) + hdev->adv_instance_cnt;
5895 5896 5897 5898 5899 5900
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		hci_dev_unlock(hdev);
		return -ENOMEM;
	}

5901 5902 5903
	supported_flags = get_supported_adv_flags(hdev);

	rp->supported_flags = cpu_to_le32(supported_flags);
5904 5905
	rp->max_adv_data_len = HCI_MAX_AD_LENGTH;
	rp->max_scan_rsp_len = HCI_MAX_AD_LENGTH;
5906
	rp->max_instances = HCI_MAX_ADV_INSTANCES;
5907
	rp->num_instances = hdev->adv_instance_cnt;
5908

5909 5910 5911 5912
	instance = rp->instance;
	list_for_each_entry(adv_instance, &hdev->adv_instances, list) {
		*instance = adv_instance->instance;
		instance++;
5913
	}
5914 5915 5916 5917 5918 5919 5920 5921 5922 5923 5924

	hci_dev_unlock(hdev);

	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES,
				MGMT_STATUS_SUCCESS, rp, rp_len);

	kfree(rp);

	return err;
}

5925
static bool tlv_data_is_valid(struct hci_dev *hdev, u32 adv_flags, u8 *data,
5926
			      u8 len, bool is_adv_data)
5927
{
5928
	u8 max_len = HCI_MAX_AD_LENGTH;
5929
	int i, cur_len;
5930
	bool flags_managed = false;
5931
	bool tx_power_managed = false;
5932

5933 5934 5935 5936 5937 5938 5939
	if (is_adv_data) {
		if (adv_flags & (MGMT_ADV_FLAG_DISCOV |
				 MGMT_ADV_FLAG_LIMITED_DISCOV |
				 MGMT_ADV_FLAG_MANAGED_FLAGS)) {
			flags_managed = true;
			max_len -= 3;
		}
5940

5941 5942 5943 5944
		if (adv_flags & MGMT_ADV_FLAG_TX_POWER) {
			tx_power_managed = true;
			max_len -= 3;
		}
5945 5946
	}

5947
	if (len > max_len)
5948 5949
		return false;

5950 5951 5952
	/* Make sure that the data is correctly formatted. */
	for (i = 0, cur_len = 0; i < len; i += (cur_len + 1)) {
		cur_len = data[i];
5953

5954 5955 5956
		if (flags_managed && data[i + 1] == EIR_FLAGS)
			return false;

5957 5958 5959
		if (tx_power_managed && data[i + 1] == EIR_TX_POWER)
			return false;

5960 5961 5962
		/* If the current field length would exceed the total data
		 * length, then it's invalid.
		 */
5963
		if (i + cur_len >= len)
5964 5965 5966 5967 5968 5969 5970 5971 5972 5973
			return false;
	}

	return true;
}

static void add_advertising_complete(struct hci_dev *hdev, u8 status,
				     u16 opcode)
{
	struct mgmt_pending_cmd *cmd;
5974
	struct mgmt_cp_add_advertising *cp;
5975
	struct mgmt_rp_add_advertising rp;
5976 5977
	struct adv_info *adv_instance, *n;
	u8 instance;
5978 5979 5980 5981 5982 5983 5984

	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	cmd = pending_find(MGMT_OP_ADD_ADVERTISING, hdev);

5985 5986 5987 5988 5989 5990 5991 5992 5993 5994 5995 5996 5997 5998 5999
	list_for_each_entry_safe(adv_instance, n, &hdev->adv_instances, list) {
		if (!adv_instance->pending)
			continue;

		if (!status) {
			adv_instance->pending = false;
			continue;
		}

		instance = adv_instance->instance;

		if (hdev->cur_adv_instance == instance)
			cancel_adv_timeout(hdev);

		hci_remove_adv_instance(hdev, instance);
6000
		mgmt_advertising_removed(cmd ? cmd->sk : NULL, hdev, instance);
6001 6002 6003 6004 6005
	}

	if (!cmd)
		goto unlock;

6006 6007
	cp = cmd->param;
	rp.instance = cp->instance;
6008 6009 6010 6011 6012 6013 6014 6015 6016 6017 6018 6019 6020 6021 6022 6023 6024 6025 6026 6027

	if (status)
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode,
				mgmt_status(status));
	else
		mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode,
				  mgmt_status(status), &rp, sizeof(rp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int add_advertising(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 data_len)
{
	struct mgmt_cp_add_advertising *cp = data;
	struct mgmt_rp_add_advertising rp;
	u32 flags;
6028
	u32 supported_flags;
6029
	u8 status;
6030 6031 6032 6033
	u16 timeout, duration;
	unsigned int prev_instance_cnt = hdev->adv_instance_cnt;
	u8 schedule_instance = 0;
	struct adv_info *next_instance;
6034 6035 6036 6037 6038 6039 6040 6041 6042 6043 6044
	int err;
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;

	BT_DBG("%s", hdev->name);

	status = mgmt_le_support(hdev);
	if (status)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       status);

6045
	if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES)
6046 6047 6048 6049
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

	if (data_len != sizeof(*cp) + cp->adv_data_len + cp->scan_rsp_len)
6050 6051 6052
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

6053
	flags = __le32_to_cpu(cp->flags);
6054
	timeout = __le16_to_cpu(cp->timeout);
6055
	duration = __le16_to_cpu(cp->duration);
6056

6057 6058
	/* The current implementation only supports a subset of the specified
	 * flags.
6059 6060
	 */
	supported_flags = get_supported_adv_flags(hdev);
6061
	if (flags & ~supported_flags)
6062 6063 6064 6065 6066
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

6067 6068 6069 6070 6071 6072
	if (timeout && !hdev_is_powered(hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_REJECTED);
		goto unlock;
	}

6073
	if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) ||
6074
	    pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) ||
6075 6076 6077 6078 6079 6080
	    pending_find(MGMT_OP_SET_LE, hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_BUSY);
		goto unlock;
	}

6081
	if (!tlv_data_is_valid(hdev, flags, cp->data, cp->adv_data_len, true) ||
6082
	    !tlv_data_is_valid(hdev, flags, cp->data + cp->adv_data_len,
6083
			       cp->scan_rsp_len, false)) {
6084 6085 6086 6087 6088
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6089 6090 6091 6092 6093 6094 6095 6096 6097 6098
	err = hci_add_adv_instance(hdev, cp->instance, flags,
				   cp->adv_data_len, cp->data,
				   cp->scan_rsp_len,
				   cp->data + cp->adv_data_len,
				   timeout, duration);
	if (err < 0) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_FAILED);
		goto unlock;
	}
6099

6100 6101 6102 6103
	/* Only trigger an advertising added event if a new instance was
	 * actually added.
	 */
	if (hdev->adv_instance_cnt > prev_instance_cnt)
6104
		mgmt_advertising_added(sk, hdev, cp->instance);
6105

6106 6107 6108 6109 6110 6111 6112
	if (hdev->cur_adv_instance == cp->instance) {
		/* If the currently advertised instance is being changed then
		 * cancel the current advertising and schedule the next
		 * instance. If there is only one instance then the overridden
		 * advertising data will be visible right away.
		 */
		cancel_adv_timeout(hdev);
6113

6114 6115 6116 6117 6118 6119 6120 6121 6122
		next_instance = hci_get_next_instance(hdev, cp->instance);
		if (next_instance)
			schedule_instance = next_instance->instance;
	} else if (!hdev->adv_instance_timeout) {
		/* Immediately advertise the new instance if no other
		 * instance is currently being advertised.
		 */
		schedule_instance = cp->instance;
	}
6123

6124 6125 6126
	/* If the HCI_ADVERTISING flag is set or the device isn't powered or
	 * there is no instance to be advertised then we have no HCI
	 * communication to make. Simply return.
6127 6128
	 */
	if (!hdev_is_powered(hdev) ||
6129 6130 6131
	    hci_dev_test_flag(hdev, HCI_ADVERTISING) ||
	    !schedule_instance) {
		rp.instance = cp->instance;
6132 6133 6134 6135 6136 6137 6138 6139 6140 6141 6142 6143 6144 6145 6146 6147 6148
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
		goto unlock;
	}

	/* We're good to go, update advertising data, parameters, and start
	 * advertising.
	 */
	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_ADVERTISING, hdev, data,
			       data_len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

6149
	err = __hci_req_schedule_adv_instance(&req, schedule_instance, true);
6150 6151 6152

	if (!err)
		err = hci_req_run(&req, add_advertising_complete);
6153 6154 6155 6156 6157 6158 6159 6160 6161 6162

	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);

	return err;
}

6163 6164 6165 6166
static void remove_advertising_complete(struct hci_dev *hdev, u8 status,
					u16 opcode)
{
	struct mgmt_pending_cmd *cmd;
6167
	struct mgmt_cp_remove_advertising *cp;
6168 6169 6170 6171 6172 6173 6174 6175 6176 6177 6178 6179 6180 6181
	struct mgmt_rp_remove_advertising rp;

	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	/* A failure status here only means that we failed to disable
	 * advertising. Otherwise, the advertising instance has been removed,
	 * so report success.
	 */
	cmd = pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev);
	if (!cmd)
		goto unlock;

6182 6183
	cp = cmd->param;
	rp.instance = cp->instance;
6184 6185 6186 6187 6188 6189 6190 6191 6192 6193 6194 6195 6196 6197 6198 6199

	mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, MGMT_STATUS_SUCCESS,
			  &rp, sizeof(rp));
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int remove_advertising(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 data_len)
{
	struct mgmt_cp_remove_advertising *cp = data;
	struct mgmt_rp_remove_advertising rp;
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;
6200
	int err;
6201 6202 6203 6204 6205

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

6206
	if (cp->instance && !hci_find_adv_instance(hdev, cp->instance)) {
6207 6208 6209 6210 6211 6212
		err = mgmt_cmd_status(sk, hdev->id,
				      MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6213 6214 6215 6216 6217 6218 6219 6220
	if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_SET_LE, hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_BUSY);
		goto unlock;
	}

6221
	if (list_empty(&hdev->adv_instances)) {
6222 6223 6224 6225 6226
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6227
	hci_req_init(&req, hdev);
6228

6229
	hci_req_clear_adv_instance(hdev, sk, &req, cp->instance, true);
6230

6231
	if (list_empty(&hdev->adv_instances))
6232
		__hci_req_disable_advertising(&req);
6233

6234 6235 6236
	/* If no HCI commands have been collected so far or the HCI_ADVERTISING
	 * flag is set or the device isn't powered then we have no HCI
	 * communication to make. Simply return.
6237
	 */
6238 6239
	if (skb_queue_empty(&req.cmd_q) ||
	    !hdev_is_powered(hdev) ||
6240
	    hci_dev_test_flag(hdev, HCI_ADVERTISING)) {
6241
		rp.instance = cp->instance;
6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_REMOVE_ADVERTISING,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_ADVERTISING, hdev, data,
			       data_len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_req_run(&req, remove_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);

	return err;
}

6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276 6277 6278 6279 6280 6281 6282 6283 6284 6285 6286 6287 6288 6289 6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302 6303 6304 6305 6306 6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318 6319 6320
static u8 tlv_data_max_len(u32 adv_flags, bool is_adv_data)
{
	u8 max_len = HCI_MAX_AD_LENGTH;

	if (is_adv_data) {
		if (adv_flags & (MGMT_ADV_FLAG_DISCOV |
				 MGMT_ADV_FLAG_LIMITED_DISCOV |
				 MGMT_ADV_FLAG_MANAGED_FLAGS))
			max_len -= 3;

		if (adv_flags & MGMT_ADV_FLAG_TX_POWER)
			max_len -= 3;
	}

	return max_len;
}

static int get_adv_size_info(struct sock *sk, struct hci_dev *hdev,
			     void *data, u16 data_len)
{
	struct mgmt_cp_get_adv_size_info *cp = data;
	struct mgmt_rp_get_adv_size_info rp;
	u32 flags, supported_flags;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_REJECTED);

	if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_INVALID_PARAMS);

	flags = __le32_to_cpu(cp->flags);

	/* The current implementation only supports a subset of the specified
	 * flags.
	 */
	supported_flags = get_supported_adv_flags(hdev);
	if (flags & ~supported_flags)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_INVALID_PARAMS);

	rp.instance = cp->instance;
	rp.flags = cp->flags;
	rp.max_adv_data_len = tlv_data_max_len(flags, true);
	rp.max_scan_rsp_len = tlv_data_max_len(flags, false);

	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				MGMT_STATUS_SUCCESS, &rp, sizeof(rp));

	return err;
}

6321
static const struct hci_mgmt_handler mgmt_handlers[] = {
6322
	{ NULL }, /* 0x0000 (no command) */
6323
	{ read_version,            MGMT_READ_VERSION_SIZE,
6324 6325
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6326
	{ read_commands,           MGMT_READ_COMMANDS_SIZE,
6327 6328
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6329
	{ read_index_list,         MGMT_READ_INDEX_LIST_SIZE,
6330 6331 6332 6333
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
	{ read_controller_info,    MGMT_READ_INFO_SIZE,
						HCI_MGMT_UNTRUSTED },
6334 6335 6336 6337 6338 6339 6340 6341 6342 6343 6344 6345 6346
	{ set_powered,             MGMT_SETTING_SIZE },
	{ set_discoverable,        MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,         MGMT_SETTING_SIZE },
	{ set_fast_connectable,    MGMT_SETTING_SIZE },
	{ set_bondable,            MGMT_SETTING_SIZE },
	{ set_link_security,       MGMT_SETTING_SIZE },
	{ set_ssp,                 MGMT_SETTING_SIZE },
	{ set_hs,                  MGMT_SETTING_SIZE },
	{ set_le,                  MGMT_SETTING_SIZE },
	{ set_dev_class,           MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,          MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,                MGMT_ADD_UUID_SIZE },
	{ remove_uuid,             MGMT_REMOVE_UUID_SIZE },
6347 6348 6349 6350
	{ load_link_keys,          MGMT_LOAD_LINK_KEYS_SIZE,
						HCI_MGMT_VAR_LEN },
	{ load_long_term_keys,     MGMT_LOAD_LONG_TERM_KEYS_SIZE,
						HCI_MGMT_VAR_LEN },
6351 6352 6353 6354 6355 6356 6357 6358 6359 6360 6361 6362
	{ disconnect,              MGMT_DISCONNECT_SIZE },
	{ get_connections,         MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,          MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,      MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,       MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,             MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,      MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,           MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,      MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply,  MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,      MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply,  MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
6363 6364 6365
	{ read_local_oob_data,     MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,     MGMT_ADD_REMOTE_OOB_DATA_SIZE,
						HCI_MGMT_VAR_LEN },
6366 6367 6368 6369 6370 6371 6372 6373 6374 6375 6376 6377 6378 6379
	{ remove_remote_oob_data,  MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,         MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,          MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,            MGMT_CONFIRM_NAME_SIZE },
	{ block_device,            MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,          MGMT_UNBLOCK_DEVICE_SIZE },
	{ set_device_id,           MGMT_SET_DEVICE_ID_SIZE },
	{ set_advertising,         MGMT_SETTING_SIZE },
	{ set_bredr,               MGMT_SETTING_SIZE },
	{ set_static_address,      MGMT_SET_STATIC_ADDRESS_SIZE },
	{ set_scan_params,         MGMT_SET_SCAN_PARAMS_SIZE },
	{ set_secure_conn,         MGMT_SETTING_SIZE },
	{ set_debug_keys,          MGMT_SETTING_SIZE },
	{ set_privacy,             MGMT_SET_PRIVACY_SIZE },
6380 6381
	{ load_irks,               MGMT_LOAD_IRKS_SIZE,
						HCI_MGMT_VAR_LEN },
6382 6383 6384 6385
	{ get_conn_info,           MGMT_GET_CONN_INFO_SIZE },
	{ get_clock_info,          MGMT_GET_CLOCK_INFO_SIZE },
	{ add_device,              MGMT_ADD_DEVICE_SIZE },
	{ remove_device,           MGMT_REMOVE_DEVICE_SIZE },
6386 6387 6388
	{ load_conn_param,         MGMT_LOAD_CONN_PARAM_SIZE,
						HCI_MGMT_VAR_LEN },
	{ read_unconf_index_list,  MGMT_READ_UNCONF_INDEX_LIST_SIZE,
6389 6390
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6391
	{ read_config_info,        MGMT_READ_CONFIG_INFO_SIZE,
6392 6393
						HCI_MGMT_UNCONFIGURED |
						HCI_MGMT_UNTRUSTED },
6394 6395 6396 6397 6398 6399
	{ set_external_config,     MGMT_SET_EXTERNAL_CONFIG_SIZE,
						HCI_MGMT_UNCONFIGURED },
	{ set_public_address,      MGMT_SET_PUBLIC_ADDRESS_SIZE,
						HCI_MGMT_UNCONFIGURED },
	{ start_service_discovery, MGMT_START_SERVICE_DISCOVERY_SIZE,
						HCI_MGMT_VAR_LEN },
6400
	{ read_local_oob_ext_data, MGMT_READ_LOCAL_OOB_EXT_DATA_SIZE },
6401
	{ read_ext_index_list,     MGMT_READ_EXT_INDEX_LIST_SIZE,
6402 6403
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6404
	{ read_adv_features,       MGMT_READ_ADV_FEATURES_SIZE },
6405 6406
	{ add_advertising,	   MGMT_ADD_ADVERTISING_SIZE,
						HCI_MGMT_VAR_LEN },
6407
	{ remove_advertising,	   MGMT_REMOVE_ADVERTISING_SIZE },
6408
	{ get_adv_size_info,       MGMT_GET_ADV_SIZE_INFO_SIZE },
6409
	{ start_limited_discovery, MGMT_START_DISCOVERY_SIZE },
6410 6411
	{ read_ext_controller_info,MGMT_READ_EXT_INFO_SIZE,
						HCI_MGMT_UNTRUSTED },
6412 6413
};

6414
void mgmt_index_added(struct hci_dev *hdev)
6415
{
6416
	struct mgmt_ev_ext_index ev;
6417

6418 6419 6420
	if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
		return;

6421
	switch (hdev->dev_type) {
6422
	case HCI_PRIMARY:
6423 6424 6425
		if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) {
			mgmt_index_event(MGMT_EV_UNCONF_INDEX_ADDED, hdev,
					 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS);
6426
			ev.type = 0x01;
6427 6428 6429
		} else {
			mgmt_index_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0,
					 HCI_MGMT_INDEX_EVENTS);
6430
			ev.type = 0x00;
6431 6432
		}
		break;
6433 6434 6435 6436 6437
	case HCI_AMP:
		ev.type = 0x02;
		break;
	default:
		return;
6438
	}
6439 6440 6441 6442 6443

	ev.bus = hdev->bus;

	mgmt_index_event(MGMT_EV_EXT_INDEX_ADDED, hdev, &ev, sizeof(ev),
			 HCI_MGMT_EXT_INDEX_EVENTS);
6444 6445
}

6446
void mgmt_index_removed(struct hci_dev *hdev)
6447
{
6448
	struct mgmt_ev_ext_index ev;
6449
	u8 status = MGMT_STATUS_INVALID_INDEX;
6450

6451 6452 6453
	if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
		return;

6454
	switch (hdev->dev_type) {
6455
	case HCI_PRIMARY:
6456
		mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status);
6457

6458 6459 6460
		if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) {
			mgmt_index_event(MGMT_EV_UNCONF_INDEX_REMOVED, hdev,
					 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS);
6461
			ev.type = 0x01;
6462 6463 6464
		} else {
			mgmt_index_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0,
					 HCI_MGMT_INDEX_EVENTS);
6465
			ev.type = 0x00;
6466 6467
		}
		break;
6468 6469 6470 6471 6472
	case HCI_AMP:
		ev.type = 0x02;
		break;
	default:
		return;
6473
	}
6474 6475 6476 6477 6478

	ev.bus = hdev->bus;

	mgmt_index_event(MGMT_EV_EXT_INDEX_REMOVED, hdev, &ev, sizeof(ev),
			 HCI_MGMT_EXT_INDEX_EVENTS);
6479 6480
}

6481
/* This function requires the caller holds hdev->lock */
6482
static void restart_le_actions(struct hci_dev *hdev)
6483 6484 6485 6486
{
	struct hci_conn_params *p;

	list_for_each_entry(p, &hdev->le_conn_params, list) {
6487 6488 6489 6490 6491 6492
		/* Needed for AUTO_OFF case where might not "really"
		 * have been powered off.
		 */
		list_del_init(&p->action);

		switch (p->auto_connect) {
6493
		case HCI_AUTO_CONN_DIRECT:
6494 6495 6496 6497 6498 6499 6500 6501
		case HCI_AUTO_CONN_ALWAYS:
			list_add(&p->action, &hdev->pend_le_conns);
			break;
		case HCI_AUTO_CONN_REPORT:
			list_add(&p->action, &hdev->pend_le_reports);
			break;
		default:
			break;
6502
		}
6503 6504 6505
	}
}

6506
void mgmt_power_on(struct hci_dev *hdev, int err)
6507 6508 6509
{
	struct cmd_lookup match = { NULL, hdev };

6510
	BT_DBG("err %d", err);
6511

6512 6513 6514
	hci_dev_lock(hdev);

	if (!err) {
6515 6516
		restart_le_actions(hdev);
		hci_update_background_scan(hdev);
6517 6518
	}

6519 6520 6521 6522 6523 6524 6525
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

6526
	hci_dev_unlock(hdev);
6527
}
6528

6529
void __mgmt_power_off(struct hci_dev *hdev)
6530 6531
{
	struct cmd_lookup match = { NULL, hdev };
6532
	u8 status, zero_cod[] = { 0, 0, 0 };
6533

6534
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
6535 6536 6537 6538 6539 6540 6541 6542

	/* If the power off is because of hdev unregistration let
	 * use the appropriate INVALID_INDEX status. Otherwise use
	 * NOT_POWERED. We cover both scenarios here since later in
	 * mgmt_index_removed() any hci_conn callbacks will have already
	 * been triggered, potentially causing misleading DISCONNECTED
	 * status responses.
	 */
6543
	if (hci_dev_test_flag(hdev, HCI_UNREGISTER))
6544 6545 6546 6547 6548
		status = MGMT_STATUS_INVALID_INDEX;
	else
		status = MGMT_STATUS_NOT_POWERED;

	mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status);
6549

6550
	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0) {
6551 6552 6553
		mgmt_limited_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
				   zero_cod, sizeof(zero_cod),
				   HCI_MGMT_DEV_CLASS_EVENTS, NULL);
6554 6555
		ext_info_changed(hdev, NULL);
	}
6556

6557
	new_settings(hdev, match.sk);
6558 6559 6560

	if (match.sk)
		sock_put(match.sk);
6561
}
6562

6563
void mgmt_set_powered_failed(struct hci_dev *hdev, int err)
6564
{
6565
	struct mgmt_pending_cmd *cmd;
6566 6567
	u8 status;

6568
	cmd = pending_find(MGMT_OP_SET_POWERED, hdev);
6569
	if (!cmd)
6570
		return;
6571 6572 6573 6574 6575 6576

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

6577
	mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);
6578 6579 6580 6581

	mgmt_pending_remove(cmd);
}

6582 6583
void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		       bool persistent)
6584
{
6585
	struct mgmt_ev_new_link_key ev;
6586

6587
	memset(&ev, 0, sizeof(ev));
6588

6589
	ev.store_hint = persistent;
6590
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
6591
	ev.key.addr.type = BDADDR_BREDR;
6592
	ev.key.type = key->type;
6593
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
6594
	ev.key.pin_len = key->pin_len;
6595

6596
	mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
6597
}
6598

6599 6600
static u8 mgmt_ltk_type(struct smp_ltk *ltk)
{
6601 6602 6603 6604 6605 6606 6607 6608 6609 6610 6611 6612 6613
	switch (ltk->type) {
	case SMP_LTK:
	case SMP_LTK_SLAVE:
		if (ltk->authenticated)
			return MGMT_LTK_AUTHENTICATED;
		return MGMT_LTK_UNAUTHENTICATED;
	case SMP_LTK_P256:
		if (ltk->authenticated)
			return MGMT_LTK_P256_AUTH;
		return MGMT_LTK_P256_UNAUTH;
	case SMP_LTK_P256_DEBUG:
		return MGMT_LTK_P256_DEBUG;
	}
6614 6615 6616 6617

	return MGMT_LTK_UNAUTHENTICATED;
}

6618
void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent)
6619 6620 6621 6622 6623
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

6624
	/* Devices using resolvable or non-resolvable random addresses
F
Florian Grandel 已提交
6625
	 * without providing an identity resolving key don't require
6626 6627 6628 6629 6630 6631 6632 6633 6634
	 * to store long term keys. Their addresses will change the
	 * next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the long term key is stored. If the remote
	 * identity is known, the long term keys are internally
	 * mapped to the identity address. So allow static random
	 * and public addresses here.
	 */
6635 6636 6637 6638
	if (key->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (key->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
6639
		ev.store_hint = persistent;
6640

6641
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
6642
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
6643
	ev.key.type = mgmt_ltk_type(key);
6644 6645
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;
6646
	ev.key.rand = key->rand;
6647

6648
	if (key->type == SMP_LTK)
6649 6650
		ev.key.master = 1;

6651 6652 6653
	/* Make sure we copy only the significant bytes based on the
	 * encryption key size, and set the rest of the value to zeroes.
	 */
6654
	memcpy(ev.key.val, key->val, key->enc_size);
6655 6656
	memset(ev.key.val + key->enc_size, 0,
	       sizeof(ev.key.val) - key->enc_size);
6657

6658
	mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL);
6659 6660
}

6661
void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk, bool persistent)
6662 6663 6664 6665 6666
{
	struct mgmt_ev_new_irk ev;

	memset(&ev, 0, sizeof(ev));

6667
	ev.store_hint = persistent;
6668

6669 6670 6671 6672 6673 6674 6675 6676
	bacpy(&ev.rpa, &irk->rpa);
	bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr);
	ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type);
	memcpy(ev.irk.val, irk->val, sizeof(irk->val));

	mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL);
}

6677 6678
void mgmt_new_csrk(struct hci_dev *hdev, struct smp_csrk *csrk,
		   bool persistent)
6679 6680 6681 6682 6683 6684
{
	struct mgmt_ev_new_csrk ev;

	memset(&ev, 0, sizeof(ev));

	/* Devices using resolvable or non-resolvable random addresses
F
Florian Grandel 已提交
6685
	 * without providing an identity resolving key don't require
6686 6687 6688 6689 6690 6691 6692 6693 6694 6695 6696
	 * to store signature resolving keys. Their addresses will change
	 * the next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the signature resolving key is stored. So allow
	 * static random and public addresses here.
	 */
	if (csrk->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (csrk->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
6697
		ev.store_hint = persistent;
6698 6699 6700

	bacpy(&ev.key.addr.bdaddr, &csrk->bdaddr);
	ev.key.addr.type = link_to_bdaddr(LE_LINK, csrk->bdaddr_type);
6701
	ev.key.type = csrk->type;
6702 6703 6704 6705 6706
	memcpy(ev.key.val, csrk->val, sizeof(csrk->val));

	mgmt_event(MGMT_EV_NEW_CSRK, hdev, &ev, sizeof(ev), NULL);
}

6707
void mgmt_new_conn_param(struct hci_dev *hdev, bdaddr_t *bdaddr,
6708 6709
			 u8 bdaddr_type, u8 store_hint, u16 min_interval,
			 u16 max_interval, u16 latency, u16 timeout)
6710 6711 6712
{
	struct mgmt_ev_new_conn_param ev;

6713 6714 6715
	if (!hci_is_identity_address(bdaddr, bdaddr_type))
		return;

6716 6717 6718
	memset(&ev, 0, sizeof(ev));
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(LE_LINK, bdaddr_type);
6719
	ev.store_hint = store_hint;
6720 6721 6722 6723 6724 6725 6726 6727
	ev.min_interval = cpu_to_le16(min_interval);
	ev.max_interval = cpu_to_le16(max_interval);
	ev.latency = cpu_to_le16(latency);
	ev.timeout = cpu_to_le16(timeout);

	mgmt_event(MGMT_EV_NEW_CONN_PARAM, hdev, &ev, sizeof(ev), NULL);
}

6728 6729
void mgmt_device_connected(struct hci_dev *hdev, struct hci_conn *conn,
			   u32 flags, u8 *name, u8 name_len)
6730
{
6731 6732 6733
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
6734

6735 6736
	bacpy(&ev->addr.bdaddr, &conn->dst);
	ev->addr.type = link_to_bdaddr(conn->type, conn->dst_type);
6737

6738
	ev->flags = __cpu_to_le32(flags);
6739

6740 6741 6742 6743 6744 6745 6746 6747 6748 6749 6750 6751
	/* We must ensure that the EIR Data fields are ordered and
	 * unique. Keep it simple for now and avoid the problem by not
	 * adding any BR/EDR data to the LE adv.
	 */
	if (conn->le_adv_data_len > 0) {
		memcpy(&ev->eir[eir_len],
		       conn->le_adv_data, conn->le_adv_data_len);
		eir_len = conn->le_adv_data_len;
	} else {
		if (name_len > 0)
			eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
						  name, name_len);
6752

6753
		if (memcmp(conn->dev_class, "\0\0\0", 3) != 0)
6754 6755 6756 6757
			eir_len = eir_append_data(ev->eir, eir_len,
						  EIR_CLASS_OF_DEV,
						  conn->dev_class, 3);
	}
6758

6759
	ev->eir_len = cpu_to_le16(eir_len);
6760

6761 6762
	mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
		    sizeof(*ev) + eir_len, NULL);
6763 6764
}

6765
static void disconnect_rsp(struct mgmt_pending_cmd *cmd, void *data)
6766 6767 6768
{
	struct sock **sk = data;

6769
	cmd->cmd_complete(cmd, 0);
6770 6771 6772 6773

	*sk = cmd->sk;
	sock_hold(*sk);

6774
	mgmt_pending_remove(cmd);
6775 6776
}

6777
static void unpair_device_rsp(struct mgmt_pending_cmd *cmd, void *data)
6778
{
6779
	struct hci_dev *hdev = data;
6780
	struct mgmt_cp_unpair_device *cp = cmd->param;
6781

6782 6783
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

6784
	cmd->cmd_complete(cmd, 0);
6785 6786 6787
	mgmt_pending_remove(cmd);
}

6788 6789
bool mgmt_powering_down(struct hci_dev *hdev)
{
6790
	struct mgmt_pending_cmd *cmd;
6791 6792
	struct mgmt_mode *cp;

6793
	cmd = pending_find(MGMT_OP_SET_POWERED, hdev);
6794 6795 6796 6797 6798 6799 6800 6801 6802 6803
	if (!cmd)
		return false;

	cp = cmd->param;
	if (!cp->val)
		return true;

	return false;
}

6804
void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
6805 6806
			      u8 link_type, u8 addr_type, u8 reason,
			      bool mgmt_connected)
6807
{
6808
	struct mgmt_ev_device_disconnected ev;
6809 6810
	struct sock *sk = NULL;

6811 6812 6813 6814 6815 6816
	/* The connection is still in hci_conn_hash so test for 1
	 * instead of 0 to know if this is the last one.
	 */
	if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) {
		cancel_delayed_work(&hdev->power_off);
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
6817 6818
	}

6819 6820 6821
	if (!mgmt_connected)
		return;

6822 6823 6824
	if (link_type != ACL_LINK && link_type != LE_LINK)
		return;

6825
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
6826

6827 6828 6829
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
6830

6831
	mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
6832 6833

	if (sk)
6834
		sock_put(sk);
6835

6836
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
6837
			     hdev);
6838 6839
}

6840 6841
void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
			    u8 link_type, u8 addr_type, u8 status)
6842
{
6843 6844
	u8 bdaddr_type = link_to_bdaddr(link_type, addr_type);
	struct mgmt_cp_disconnect *cp;
6845
	struct mgmt_pending_cmd *cmd;
6846

6847 6848 6849
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

6850
	cmd = pending_find(MGMT_OP_DISCONNECT, hdev);
6851
	if (!cmd)
6852
		return;
6853

6854 6855 6856 6857 6858 6859 6860 6861
	cp = cmd->param;

	if (bacmp(bdaddr, &cp->addr.bdaddr))
		return;

	if (cp->addr.type != bdaddr_type)
		return;

6862
	cmd->cmd_complete(cmd, mgmt_status(status));
6863
	mgmt_pending_remove(cmd);
6864
}
6865

6866 6867
void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			 u8 addr_type, u8 status)
6868 6869
{
	struct mgmt_ev_connect_failed ev;
6870

6871 6872 6873 6874 6875 6876
	/* The connection is still in hci_conn_hash so test for 1
	 * instead of 0 to know if this is the last one.
	 */
	if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) {
		cancel_delayed_work(&hdev->power_off);
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
6877
	}
6878

6879
	bacpy(&ev.addr.bdaddr, bdaddr);
6880
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6881
	ev.status = mgmt_status(status);
6882

6883
	mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
6884
}
6885

6886
void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
6887 6888 6889
{
	struct mgmt_ev_pin_code_request ev;

6890
	bacpy(&ev.addr.bdaddr, bdaddr);
6891
	ev.addr.type = BDADDR_BREDR;
6892
	ev.secure = secure;
6893

6894
	mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL);
6895 6896
}

6897 6898
void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				  u8 status)
6899
{
6900
	struct mgmt_pending_cmd *cmd;
6901

6902
	cmd = pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
6903
	if (!cmd)
6904
		return;
6905

6906
	cmd->cmd_complete(cmd, mgmt_status(status));
6907
	mgmt_pending_remove(cmd);
6908 6909
}

6910 6911
void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				      u8 status)
6912
{
6913
	struct mgmt_pending_cmd *cmd;
6914

6915
	cmd = pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
6916
	if (!cmd)
6917
		return;
6918

6919
	cmd->cmd_complete(cmd, mgmt_status(status));
6920
	mgmt_pending_remove(cmd);
6921
}
6922

6923
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
6924
			      u8 link_type, u8 addr_type, u32 value,
6925
			      u8 confirm_hint)
6926 6927 6928
{
	struct mgmt_ev_user_confirm_request ev;

6929
	BT_DBG("%s", hdev->name);
6930

6931
	bacpy(&ev.addr.bdaddr, bdaddr);
6932
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6933
	ev.confirm_hint = confirm_hint;
6934
	ev.value = cpu_to_le32(value);
6935

6936
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
6937
			  NULL);
6938 6939
}

6940
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
6941
			      u8 link_type, u8 addr_type)
6942 6943 6944 6945 6946
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

6947
	bacpy(&ev.addr.bdaddr, bdaddr);
6948
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6949 6950

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
6951
			  NULL);
6952 6953
}

6954
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6955 6956
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
6957
{
6958
	struct mgmt_pending_cmd *cmd;
6959

6960
	cmd = pending_find(opcode, hdev);
6961 6962 6963
	if (!cmd)
		return -ENOENT;

6964
	cmd->cmd_complete(cmd, mgmt_status(status));
6965
	mgmt_pending_remove(cmd);
6966

6967
	return 0;
6968 6969
}

6970
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6971
				     u8 link_type, u8 addr_type, u8 status)
6972
{
6973
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6974
					  status, MGMT_OP_USER_CONFIRM_REPLY);
6975 6976
}

6977
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6978
					 u8 link_type, u8 addr_type, u8 status)
6979
{
6980
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6981 6982
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
6983
}
6984

6985
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6986
				     u8 link_type, u8 addr_type, u8 status)
6987
{
6988
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6989
					  status, MGMT_OP_USER_PASSKEY_REPLY);
6990 6991
}

6992
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6993
					 u8 link_type, u8 addr_type, u8 status)
6994
{
6995
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6996 6997
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
6998 6999
}

7000 7001 7002 7003 7004 7005 7006 7007 7008 7009 7010 7011 7012 7013 7014 7015
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

7016
void mgmt_auth_failed(struct hci_conn *conn, u8 hci_status)
7017 7018
{
	struct mgmt_ev_auth_failed ev;
7019
	struct mgmt_pending_cmd *cmd;
7020
	u8 status = mgmt_status(hci_status);
7021

7022 7023 7024
	bacpy(&ev.addr.bdaddr, &conn->dst);
	ev.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
	ev.status = status;
7025

7026 7027 7028 7029 7030
	cmd = find_pairing(conn);

	mgmt_event(MGMT_EV_AUTH_FAILED, conn->hdev, &ev, sizeof(ev),
		    cmd ? cmd->sk : NULL);

7031 7032 7033 7034
	if (cmd) {
		cmd->cmd_complete(cmd, status);
		mgmt_pending_remove(cmd);
	}
7035
}
7036

7037
void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
7038 7039
{
	struct cmd_lookup match = { NULL, hdev };
7040
	bool changed;
7041 7042 7043 7044

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
7045
				     cmd_status_rsp, &mgmt_err);
7046
		return;
7047 7048
	}

7049
	if (test_bit(HCI_AUTH, &hdev->flags))
7050
		changed = !hci_dev_test_and_set_flag(hdev, HCI_LINK_SECURITY);
7051
	else
7052
		changed = hci_dev_test_and_clear_flag(hdev, HCI_LINK_SECURITY);
7053

7054
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
7055
			     &match);
7056

7057
	if (changed)
7058
		new_settings(hdev, match.sk);
7059 7060 7061 7062 7063

	if (match.sk)
		sock_put(match.sk);
}

7064
static void clear_eir(struct hci_request *req)
7065
{
7066
	struct hci_dev *hdev = req->hdev;
7067 7068
	struct hci_cp_write_eir cp;

7069
	if (!lmp_ext_inq_capable(hdev))
7070
		return;
7071

7072 7073
	memset(hdev->eir, 0, sizeof(hdev->eir));

7074 7075
	memset(&cp, 0, sizeof(cp));

7076
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
7077 7078
}

7079
void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
7080 7081
{
	struct cmd_lookup match = { NULL, hdev };
7082
	struct hci_request req;
7083
	bool changed = false;
7084 7085 7086

	if (status) {
		u8 mgmt_err = mgmt_status(status);
7087

7088 7089
		if (enable && hci_dev_test_and_clear_flag(hdev,
							  HCI_SSP_ENABLED)) {
7090
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
7091
			new_settings(hdev, NULL);
7092
		}
7093

7094 7095
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
7096
		return;
7097 7098 7099
	}

	if (enable) {
7100
		changed = !hci_dev_test_and_set_flag(hdev, HCI_SSP_ENABLED);
7101
	} else {
7102
		changed = hci_dev_test_and_clear_flag(hdev, HCI_SSP_ENABLED);
7103
		if (!changed)
7104 7105
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_HS_ENABLED);
7106
		else
7107
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
7108 7109 7110 7111
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

7112
	if (changed)
7113
		new_settings(hdev, match.sk);
7114

7115
	if (match.sk)
7116 7117
		sock_put(match.sk);

7118 7119
	hci_req_init(&req, hdev);

7120 7121
	if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
		if (hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS))
7122 7123
			hci_req_add(&req, HCI_OP_WRITE_SSP_DEBUG_MODE,
				    sizeof(enable), &enable);
7124
		__hci_req_update_eir(&req);
7125
	} else {
7126
		clear_eir(&req);
7127
	}
7128 7129

	hci_req_run(&req, NULL);
7130 7131
}

7132
static void sk_lookup(struct mgmt_pending_cmd *cmd, void *data)
7133 7134 7135 7136 7137 7138 7139 7140 7141
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

7142 7143
void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
				    u8 status)
7144
{
7145
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
7146

7147 7148 7149
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
7150

7151
	if (!status) {
7152 7153
		mgmt_limited_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev, dev_class,
				   3, HCI_MGMT_DEV_CLASS_EVENTS, NULL);
7154 7155
		ext_info_changed(hdev, NULL);
	}
7156 7157 7158

	if (match.sk)
		sock_put(match.sk);
7159 7160
}

7161
void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
7162 7163
{
	struct mgmt_cp_set_local_name ev;
7164
	struct mgmt_pending_cmd *cmd;
7165

7166
	if (status)
7167
		return;
7168 7169 7170

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
7171
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
7172

7173
	cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
7174 7175
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
7176

7177 7178 7179
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
7180
		if (pending_find(MGMT_OP_SET_POWERED, hdev))
7181
			return;
7182
	}
7183

7184 7185
	mgmt_limited_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			   HCI_MGMT_LOCAL_NAME_EVENTS, cmd ? cmd->sk : NULL);
7186
	ext_info_changed(hdev, cmd ? cmd->sk : NULL);
7187
}
7188

7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200
static inline bool has_uuid(u8 *uuid, u16 uuid_count, u8 (*uuids)[16])
{
	int i;

	for (i = 0; i < uuid_count; i++) {
		if (!memcmp(uuid, uuids[i], 16))
			return true;
	}

	return false;
}

7201 7202
static bool eir_has_uuids(u8 *eir, u16 eir_len, u16 uuid_count, u8 (*uuids)[16])
{
7203 7204 7205 7206 7207 7208 7209 7210 7211 7212 7213 7214 7215 7216 7217 7218 7219
	u16 parsed = 0;

	while (parsed < eir_len) {
		u8 field_len = eir[0];
		u8 uuid[16];
		int i;

		if (field_len == 0)
			break;

		if (eir_len - parsed < field_len + 1)
			break;

		switch (eir[1]) {
		case EIR_UUID16_ALL:
		case EIR_UUID16_SOME:
			for (i = 0; i + 3 <= field_len; i += 2) {
7220
				memcpy(uuid, bluetooth_base_uuid, 16);
7221 7222 7223 7224 7225 7226 7227 7228 7229
				uuid[13] = eir[i + 3];
				uuid[12] = eir[i + 2];
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		case EIR_UUID32_ALL:
		case EIR_UUID32_SOME:
			for (i = 0; i + 5 <= field_len; i += 4) {
7230
				memcpy(uuid, bluetooth_base_uuid, 16);
7231 7232 7233 7234 7235 7236 7237 7238 7239 7240 7241 7242 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252
				uuid[15] = eir[i + 5];
				uuid[14] = eir[i + 4];
				uuid[13] = eir[i + 3];
				uuid[12] = eir[i + 2];
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		case EIR_UUID128_ALL:
		case EIR_UUID128_SOME:
			for (i = 0; i + 17 <= field_len; i += 16) {
				memcpy(uuid, eir + i + 2, 16);
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		}

		parsed += field_len + 1;
		eir += field_len + 1;
	}

7253 7254 7255
	return false;
}

7256 7257 7258
static void restart_le_scan(struct hci_dev *hdev)
{
	/* If controller is not scanning we are done. */
7259
	if (!hci_dev_test_flag(hdev, HCI_LE_SCAN))
7260 7261 7262 7263 7264 7265 7266
		return;

	if (time_after(jiffies + DISCOV_LE_RESTART_DELAY,
		       hdev->discovery.scan_start +
		       hdev->discovery.scan_duration))
		return;

7267
	queue_delayed_work(hdev->req_workqueue, &hdev->le_scan_restart,
7268 7269 7270
			   DISCOV_LE_RESTART_DELAY);
}

7271 7272
static bool is_filter_match(struct hci_dev *hdev, s8 rssi, u8 *eir,
			    u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len)
7273
{
7274 7275 7276 7277 7278
	/* If a RSSI threshold has been specified, and
	 * HCI_QUIRK_STRICT_DUPLICATE_FILTER is not set, then all results with
	 * a RSSI smaller than the RSSI threshold will be dropped. If the quirk
	 * is set, let it through for further processing, as we might need to
	 * restart the scan.
7279 7280 7281
	 *
	 * For BR/EDR devices (pre 1.2) providing no RSSI during inquiry,
	 * the results are also dropped.
7282 7283
	 */
	if (hdev->discovery.rssi != HCI_RSSI_INVALID &&
7284 7285 7286
	    (rssi == HCI_RSSI_INVALID ||
	    (rssi < hdev->discovery.rssi &&
	     !test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks))))
7287
		return  false;
7288

7289 7290 7291
	if (hdev->discovery.uuid_count != 0) {
		/* If a list of UUIDs is provided in filter, results with no
		 * matching UUID should be dropped.
7292
		 */
7293 7294 7295 7296 7297 7298
		if (!eir_has_uuids(eir, eir_len, hdev->discovery.uuid_count,
				   hdev->discovery.uuids) &&
		    !eir_has_uuids(scan_rsp, scan_rsp_len,
				   hdev->discovery.uuid_count,
				   hdev->discovery.uuids))
			return false;
7299
	}
7300

7301 7302
	/* If duplicate filtering does not report RSSI changes, then restart
	 * scanning to ensure updated result with updated RSSI values.
7303
	 */
7304 7305 7306 7307 7308 7309 7310 7311
	if (test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)) {
		restart_le_scan(hdev);

		/* Validate RSSI value against the RSSI threshold once more. */
		if (hdev->discovery.rssi != HCI_RSSI_INVALID &&
		    rssi < hdev->discovery.rssi)
			return false;
	}
7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330 7331 7332 7333 7334

	return true;
}

void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		       u8 addr_type, u8 *dev_class, s8 rssi, u32 flags,
		       u8 *eir, u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len)
{
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *)buf;
	size_t ev_size;

	/* Don't send events for a non-kernel initiated discovery. With
	 * LE one exception is if we have pend_le_reports > 0 in which
	 * case we're doing passive scanning and want these events.
	 */
	if (!hci_discovery_active(hdev)) {
		if (link_type == ACL_LINK)
			return;
		if (link_type == LE_LINK && list_empty(&hdev->pend_le_reports))
			return;
	}

7335
	if (hdev->discovery.result_filtering) {
7336 7337 7338 7339 7340 7341
		/* We are using service discovery */
		if (!is_filter_match(hdev, rssi, eir, eir_len, scan_rsp,
				     scan_rsp_len))
			return;
	}

7342 7343 7344 7345 7346 7347 7348 7349 7350 7351 7352 7353
	if (hdev->discovery.limited) {
		/* Check for limited discoverable bit */
		if (dev_class) {
			if (!(dev_class[1] & 0x20))
				return;
		} else {
			u8 *flags = eir_get_data(eir, eir_len, EIR_FLAGS, NULL);
			if (!flags || !(flags[0] & LE_AD_LIMITED))
				return;
		}
	}

7354 7355 7356 7357
	/* Make sure that the buffer is big enough. The 5 extra bytes
	 * are for the potential CoD field.
	 */
	if (sizeof(*ev) + eir_len + scan_rsp_len + 5 > sizeof(buf))
7358 7359
		return;

7360 7361 7362 7363 7364 7365 7366 7367 7368 7369 7370 7371 7372 7373 7374 7375 7376 7377 7378 7379 7380 7381 7382
	memset(buf, 0, sizeof(buf));

	/* In case of device discovery with BR/EDR devices (pre 1.2), the
	 * RSSI value was reported as 0 when not available. This behavior
	 * is kept when using device discovery. This is required for full
	 * backwards compatibility with the API.
	 *
	 * However when using service discovery, the value 127 will be
	 * returned when the RSSI is not available.
	 */
	if (rssi == HCI_RSSI_INVALID && !hdev->discovery.report_invalid_rssi &&
	    link_type == ACL_LINK)
		rssi = 0;

	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
	ev->rssi = rssi;
	ev->flags = cpu_to_le32(flags);

	if (eir_len > 0)
		/* Copy EIR or advertising data into event */
		memcpy(ev->eir, eir, eir_len);

7383 7384
	if (dev_class && !eir_get_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
				       NULL))
7385 7386 7387 7388 7389 7390 7391
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
					  dev_class, 3);

	if (scan_rsp_len > 0)
		/* Append scan response data to event */
		memcpy(ev->eir + eir_len, scan_rsp, scan_rsp_len);

7392 7393
	ev->eir_len = cpu_to_le16(eir_len + scan_rsp_len);
	ev_size = sizeof(*ev) + eir_len + scan_rsp_len;
7394

7395
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
7396
}
7397

7398 7399
void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, s8 rssi, u8 *name, u8 name_len)
7400
{
7401 7402 7403
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
7404

7405
	ev = (struct mgmt_ev_device_found *) buf;
7406

7407 7408 7409
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
7410
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
7411 7412 7413
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
7414
				  name_len);
7415

7416
	ev->eir_len = cpu_to_le16(eir_len);
7417

7418
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL);
7419
}
7420

7421
void mgmt_discovering(struct hci_dev *hdev, u8 discovering)
7422
{
7423
	struct mgmt_ev_discovering ev;
7424

7425 7426
	BT_DBG("%s discovering %u", hdev->name, discovering);

7427 7428 7429 7430
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

7431
	mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
7432
}
7433

7434 7435 7436 7437
static struct hci_mgmt_chan chan = {
	.channel	= HCI_CHANNEL_CONTROL,
	.handler_count	= ARRAY_SIZE(mgmt_handlers),
	.handlers	= mgmt_handlers,
7438
	.hdev_init	= mgmt_init_hdev,
7439 7440 7441 7442 7443 7444 7445 7446 7447 7448 7449
};

int mgmt_init(void)
{
	return hci_mgmt_chan_register(&chan);
}

void mgmt_exit(void)
{
	hci_mgmt_chan_unregister(&chan);
}