mgmt.c 181.5 KB
Newer Older
1 2
/*
   BlueZ - Bluetooth protocol stack for Linux
3

4
   Copyright (C) 2010  Nokia Corporation
5
   Copyright (C) 2011-2012 Intel Corporation
6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License version 2 as
   published by the Free Software Foundation;

   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
   FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS.
   IN NO EVENT SHALL THE COPYRIGHT HOLDER(S) AND AUTHOR(S) BE LIABLE FOR ANY
   CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES
   WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
   ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
   OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

   ALL LIABILITY, INCLUDING LIABILITY FOR INFRINGEMENT OF ANY PATENTS,
   COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS, RELATING TO USE OF THIS
   SOFTWARE IS DISCLAIMED.
*/

/* Bluetooth HCI Management interface */

27
#include <linux/module.h>
28 29 30 31
#include <asm/unaligned.h>

#include <net/bluetooth/bluetooth.h>
#include <net/bluetooth/hci_core.h>
32
#include <net/bluetooth/hci_sock.h>
33
#include <net/bluetooth/l2cap.h>
34
#include <net/bluetooth/mgmt.h>
35

36
#include "hci_request.h"
37
#include "smp.h"
38
#include "mgmt_util.h"
39

40
#define MGMT_VERSION	1
41
#define MGMT_REVISION	13
42

43 44 45 46 47 48 49
static const u16 mgmt_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_SET_POWERED,
	MGMT_OP_SET_DISCOVERABLE,
	MGMT_OP_SET_CONNECTABLE,
	MGMT_OP_SET_FAST_CONNECTABLE,
50
	MGMT_OP_SET_BONDABLE,
51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80
	MGMT_OP_SET_LINK_SECURITY,
	MGMT_OP_SET_SSP,
	MGMT_OP_SET_HS,
	MGMT_OP_SET_LE,
	MGMT_OP_SET_DEV_CLASS,
	MGMT_OP_SET_LOCAL_NAME,
	MGMT_OP_ADD_UUID,
	MGMT_OP_REMOVE_UUID,
	MGMT_OP_LOAD_LINK_KEYS,
	MGMT_OP_LOAD_LONG_TERM_KEYS,
	MGMT_OP_DISCONNECT,
	MGMT_OP_GET_CONNECTIONS,
	MGMT_OP_PIN_CODE_REPLY,
	MGMT_OP_PIN_CODE_NEG_REPLY,
	MGMT_OP_SET_IO_CAPABILITY,
	MGMT_OP_PAIR_DEVICE,
	MGMT_OP_CANCEL_PAIR_DEVICE,
	MGMT_OP_UNPAIR_DEVICE,
	MGMT_OP_USER_CONFIRM_REPLY,
	MGMT_OP_USER_CONFIRM_NEG_REPLY,
	MGMT_OP_USER_PASSKEY_REPLY,
	MGMT_OP_USER_PASSKEY_NEG_REPLY,
	MGMT_OP_READ_LOCAL_OOB_DATA,
	MGMT_OP_ADD_REMOTE_OOB_DATA,
	MGMT_OP_REMOVE_REMOTE_OOB_DATA,
	MGMT_OP_START_DISCOVERY,
	MGMT_OP_STOP_DISCOVERY,
	MGMT_OP_CONFIRM_NAME,
	MGMT_OP_BLOCK_DEVICE,
	MGMT_OP_UNBLOCK_DEVICE,
81
	MGMT_OP_SET_DEVICE_ID,
82
	MGMT_OP_SET_ADVERTISING,
83
	MGMT_OP_SET_BREDR,
84
	MGMT_OP_SET_STATIC_ADDRESS,
85
	MGMT_OP_SET_SCAN_PARAMS,
86
	MGMT_OP_SET_SECURE_CONN,
87
	MGMT_OP_SET_DEBUG_KEYS,
88
	MGMT_OP_SET_PRIVACY,
89
	MGMT_OP_LOAD_IRKS,
90
	MGMT_OP_GET_CONN_INFO,
91
	MGMT_OP_GET_CLOCK_INFO,
92 93
	MGMT_OP_ADD_DEVICE,
	MGMT_OP_REMOVE_DEVICE,
94
	MGMT_OP_LOAD_CONN_PARAM,
95
	MGMT_OP_READ_UNCONF_INDEX_LIST,
96
	MGMT_OP_READ_CONFIG_INFO,
97
	MGMT_OP_SET_EXTERNAL_CONFIG,
98
	MGMT_OP_SET_PUBLIC_ADDRESS,
99
	MGMT_OP_START_SERVICE_DISCOVERY,
100
	MGMT_OP_READ_LOCAL_OOB_EXT_DATA,
101
	MGMT_OP_READ_EXT_INDEX_LIST,
102
	MGMT_OP_READ_ADV_FEATURES,
103
	MGMT_OP_ADD_ADVERTISING,
104
	MGMT_OP_REMOVE_ADVERTISING,
105
	MGMT_OP_GET_ADV_SIZE_INFO,
106
	MGMT_OP_START_LIMITED_DISCOVERY,
107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
};

static const u16 mgmt_events[] = {
	MGMT_EV_CONTROLLER_ERROR,
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_NEW_LINK_KEY,
	MGMT_EV_NEW_LONG_TERM_KEY,
	MGMT_EV_DEVICE_CONNECTED,
	MGMT_EV_DEVICE_DISCONNECTED,
	MGMT_EV_CONNECT_FAILED,
	MGMT_EV_PIN_CODE_REQUEST,
	MGMT_EV_USER_CONFIRM_REQUEST,
	MGMT_EV_USER_PASSKEY_REQUEST,
	MGMT_EV_AUTH_FAILED,
	MGMT_EV_DEVICE_FOUND,
	MGMT_EV_DISCOVERING,
	MGMT_EV_DEVICE_BLOCKED,
	MGMT_EV_DEVICE_UNBLOCKED,
	MGMT_EV_DEVICE_UNPAIRED,
130
	MGMT_EV_PASSKEY_NOTIFY,
131
	MGMT_EV_NEW_IRK,
132
	MGMT_EV_NEW_CSRK,
133 134
	MGMT_EV_DEVICE_ADDED,
	MGMT_EV_DEVICE_REMOVED,
135
	MGMT_EV_NEW_CONN_PARAM,
136
	MGMT_EV_UNCONF_INDEX_ADDED,
137
	MGMT_EV_UNCONF_INDEX_REMOVED,
138
	MGMT_EV_NEW_CONFIG_OPTIONS,
139 140
	MGMT_EV_EXT_INDEX_ADDED,
	MGMT_EV_EXT_INDEX_REMOVED,
141
	MGMT_EV_LOCAL_OOB_DATA_UPDATED,
142 143
	MGMT_EV_ADVERTISING_ADDED,
	MGMT_EV_ADVERTISING_REMOVED,
144 145
};

146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166
static const u16 mgmt_untrusted_commands[] = {
	MGMT_OP_READ_INDEX_LIST,
	MGMT_OP_READ_INFO,
	MGMT_OP_READ_UNCONF_INDEX_LIST,
	MGMT_OP_READ_CONFIG_INFO,
	MGMT_OP_READ_EXT_INDEX_LIST,
};

static const u16 mgmt_untrusted_events[] = {
	MGMT_EV_INDEX_ADDED,
	MGMT_EV_INDEX_REMOVED,
	MGMT_EV_NEW_SETTINGS,
	MGMT_EV_CLASS_OF_DEV_CHANGED,
	MGMT_EV_LOCAL_NAME_CHANGED,
	MGMT_EV_UNCONF_INDEX_ADDED,
	MGMT_EV_UNCONF_INDEX_REMOVED,
	MGMT_EV_NEW_CONFIG_OPTIONS,
	MGMT_EV_EXT_INDEX_ADDED,
	MGMT_EV_EXT_INDEX_REMOVED,
};

167
#define CACHE_TIMEOUT	msecs_to_jiffies(2 * 1000)
168

169 170 171
#define ZERO_KEY "\x00\x00\x00\x00\x00\x00\x00\x00" \
		 "\x00\x00\x00\x00\x00\x00\x00\x00"

172 173 174 175 176 177 178 179
/* HCI to MGMT error code conversion table */
static u8 mgmt_status_table[] = {
	MGMT_STATUS_SUCCESS,
	MGMT_STATUS_UNKNOWN_COMMAND,	/* Unknown Command */
	MGMT_STATUS_NOT_CONNECTED,	/* No Connection */
	MGMT_STATUS_FAILED,		/* Hardware Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Page Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Authentication Failed */
180
	MGMT_STATUS_AUTH_FAILED,	/* PIN or Key Missing */
181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
	MGMT_STATUS_NO_RESOURCES,	/* Memory Full */
	MGMT_STATUS_TIMEOUT,		/* Connection Timeout */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of Connections */
	MGMT_STATUS_NO_RESOURCES,	/* Max Number of SCO Connections */
	MGMT_STATUS_ALREADY_CONNECTED,	/* ACL Connection Exists */
	MGMT_STATUS_BUSY,		/* Command Disallowed */
	MGMT_STATUS_NO_RESOURCES,	/* Rejected Limited Resources */
	MGMT_STATUS_REJECTED,		/* Rejected Security */
	MGMT_STATUS_REJECTED,		/* Rejected Personal */
	MGMT_STATUS_TIMEOUT,		/* Host Timeout */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Feature */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid Parameters */
	MGMT_STATUS_DISCONNECTED,	/* OE User Ended Connection */
	MGMT_STATUS_NO_RESOURCES,	/* OE Low Resources */
	MGMT_STATUS_DISCONNECTED,	/* OE Power Off */
	MGMT_STATUS_DISCONNECTED,	/* Connection Terminated */
	MGMT_STATUS_BUSY,		/* Repeated Attempts */
	MGMT_STATUS_REJECTED,		/* Pairing Not Allowed */
	MGMT_STATUS_FAILED,		/* Unknown LMP PDU */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported Remote Feature */
	MGMT_STATUS_REJECTED,		/* SCO Offset Rejected */
	MGMT_STATUS_REJECTED,		/* SCO Interval Rejected */
	MGMT_STATUS_REJECTED,		/* Air Mode Rejected */
	MGMT_STATUS_INVALID_PARAMS,	/* Invalid LMP Parameters */
	MGMT_STATUS_FAILED,		/* Unspecified Error */
	MGMT_STATUS_NOT_SUPPORTED,	/* Unsupported LMP Parameter Value */
	MGMT_STATUS_FAILED,		/* Role Change Not Allowed */
	MGMT_STATUS_TIMEOUT,		/* LMP Response Timeout */
	MGMT_STATUS_FAILED,		/* LMP Error Transaction Collision */
	MGMT_STATUS_FAILED,		/* LMP PDU Not Allowed */
	MGMT_STATUS_REJECTED,		/* Encryption Mode Not Accepted */
	MGMT_STATUS_FAILED,		/* Unit Link Key Used */
	MGMT_STATUS_NOT_SUPPORTED,	/* QoS Not Supported */
	MGMT_STATUS_TIMEOUT,		/* Instant Passed */
	MGMT_STATUS_NOT_SUPPORTED,	/* Pairing Not Supported */
	MGMT_STATUS_FAILED,		/* Transaction Collision */
	MGMT_STATUS_INVALID_PARAMS,	/* Unacceptable Parameter */
	MGMT_STATUS_REJECTED,		/* QoS Rejected */
	MGMT_STATUS_NOT_SUPPORTED,	/* Classification Not Supported */
	MGMT_STATUS_REJECTED,		/* Insufficient Security */
	MGMT_STATUS_INVALID_PARAMS,	/* Parameter Out Of Range */
	MGMT_STATUS_BUSY,		/* Role Switch Pending */
	MGMT_STATUS_FAILED,		/* Slot Violation */
	MGMT_STATUS_FAILED,		/* Role Switch Failed */
	MGMT_STATUS_INVALID_PARAMS,	/* EIR Too Large */
	MGMT_STATUS_NOT_SUPPORTED,	/* Simple Pairing Not Supported */
	MGMT_STATUS_BUSY,		/* Host Busy Pairing */
	MGMT_STATUS_REJECTED,		/* Rejected, No Suitable Channel */
	MGMT_STATUS_BUSY,		/* Controller Busy */
	MGMT_STATUS_INVALID_PARAMS,	/* Unsuitable Connection Interval */
	MGMT_STATUS_TIMEOUT,		/* Directed Advertising Timeout */
	MGMT_STATUS_AUTH_FAILED,	/* Terminated Due to MIC Failure */
	MGMT_STATUS_CONNECT_FAILED,	/* Connection Establishment Failed */
	MGMT_STATUS_CONNECT_FAILED,	/* MAC Connection Failed */
};

static u8 mgmt_status(u8 hci_status)
{
	if (hci_status < ARRAY_SIZE(mgmt_status_table))
		return mgmt_status_table[hci_status];

	return MGMT_STATUS_FAILED;
}

245 246
static int mgmt_index_event(u16 event, struct hci_dev *hdev, void *data,
			    u16 len, int flag)
247
{
248 249
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
			       flag, NULL);
250 251
}

252 253 254 255 256 257 258
static int mgmt_limited_event(u16 event, struct hci_dev *hdev, void *data,
			      u16 len, int flag, struct sock *skip_sk)
{
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
			       flag, skip_sk);
}

259 260 261 262 263 264 265
static int mgmt_generic_event(u16 event, struct hci_dev *hdev, void *data,
			      u16 len, struct sock *skip_sk)
{
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
			       HCI_MGMT_GENERIC_EVENTS, skip_sk);
}

266 267 268 269
static int mgmt_event(u16 event, struct hci_dev *hdev, void *data, u16 len,
		      struct sock *skip_sk)
{
	return mgmt_send_event(event, hdev, HCI_CHANNEL_CONTROL, data, len,
270
			       HCI_SOCK_TRUSTED, skip_sk);
271 272
}

273 274 275 276 277 278 279 280
static u8 le_addr_type(u8 mgmt_addr_type)
{
	if (mgmt_addr_type == BDADDR_LE_PUBLIC)
		return ADDR_LE_DEV_PUBLIC;
	else
		return ADDR_LE_DEV_RANDOM;
}

281 282 283 284 285 286 287 288
void mgmt_fill_version_info(void *ver)
{
	struct mgmt_rp_read_version *rp = ver;

	rp->version = MGMT_VERSION;
	rp->revision = cpu_to_le16(MGMT_REVISION);
}

289 290
static int read_version(struct sock *sk, struct hci_dev *hdev, void *data,
			u16 data_len)
291 292 293 294 295
{
	struct mgmt_rp_read_version rp;

	BT_DBG("sock %p", sk);

296
	mgmt_fill_version_info(&rp);
297

298 299
	return mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_VERSION, 0,
				 &rp, sizeof(rp));
300 301
}

302 303
static int read_commands(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 data_len)
304 305
{
	struct mgmt_rp_read_commands *rp;
306
	u16 num_commands, num_events;
307 308 309 310 311
	size_t rp_size;
	int i, err;

	BT_DBG("sock %p", sk);

312 313 314 315 316 317 318 319
	if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) {
		num_commands = ARRAY_SIZE(mgmt_commands);
		num_events = ARRAY_SIZE(mgmt_events);
	} else {
		num_commands = ARRAY_SIZE(mgmt_untrusted_commands);
		num_events = ARRAY_SIZE(mgmt_untrusted_events);
	}

320 321 322 323 324 325
	rp_size = sizeof(*rp) + ((num_commands + num_events) * sizeof(u16));

	rp = kmalloc(rp_size, GFP_KERNEL);
	if (!rp)
		return -ENOMEM;

326 327
	rp->num_commands = cpu_to_le16(num_commands);
	rp->num_events = cpu_to_le16(num_events);
328

329 330 331 332 333
	if (hci_sock_test_flag(sk, HCI_SOCK_TRUSTED)) {
		__le16 *opcode = rp->opcodes;

		for (i = 0; i < num_commands; i++, opcode++)
			put_unaligned_le16(mgmt_commands[i], opcode);
334

335 336 337 338 339 340 341 342 343 344 345
		for (i = 0; i < num_events; i++, opcode++)
			put_unaligned_le16(mgmt_events[i], opcode);
	} else {
		__le16 *opcode = rp->opcodes;

		for (i = 0; i < num_commands; i++, opcode++)
			put_unaligned_le16(mgmt_untrusted_commands[i], opcode);

		for (i = 0; i < num_events; i++, opcode++)
			put_unaligned_le16(mgmt_untrusted_events[i], opcode);
	}
346

347 348
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_COMMANDS, 0,
				rp, rp_size);
349 350 351 352 353
	kfree(rp);

	return err;
}

354 355
static int read_index_list(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
356 357
{
	struct mgmt_rp_read_index_list *rp;
358
	struct hci_dev *d;
359
	size_t rp_len;
360
	u16 count;
361
	int err;
362 363 364 365 366 367

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
368
	list_for_each_entry(d, &hci_dev_list, list) {
369
		if (d->dev_type == HCI_PRIMARY &&
370
		    !hci_dev_test_flag(d, HCI_UNCONFIGURED))
371
			count++;
372 373
	}

374 375 376
	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
377
		read_unlock(&hci_dev_list_lock);
378
		return -ENOMEM;
379
	}
380

381
	count = 0;
382
	list_for_each_entry(d, &hci_dev_list, list) {
383 384 385
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
386 387
			continue;

388 389 390 391
		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
392 393
			continue;

394
		if (d->dev_type == HCI_PRIMARY &&
395
		    !hci_dev_test_flag(d, HCI_UNCONFIGURED)) {
396 397 398
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
399 400
	}

401 402 403
	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

404 405
	read_unlock(&hci_dev_list_lock);

406 407
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE, MGMT_OP_READ_INDEX_LIST,
				0, rp, rp_len);
408

409 410 411
	kfree(rp);

	return err;
412 413
}

414 415 416 417 418 419 420 421 422 423 424 425 426 427 428
static int read_unconf_index_list(struct sock *sk, struct hci_dev *hdev,
				  void *data, u16 data_len)
{
	struct mgmt_rp_read_unconf_index_list *rp;
	struct hci_dev *d;
	size_t rp_len;
	u16 count;
	int err;

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
429
		if (d->dev_type == HCI_PRIMARY &&
430
		    hci_dev_test_flag(d, HCI_UNCONFIGURED))
431 432 433 434 435 436 437 438 439 440 441 442
			count++;
	}

	rp_len = sizeof(*rp) + (2 * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		read_unlock(&hci_dev_list_lock);
		return -ENOMEM;
	}

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
443 444 445
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
446 447 448 449 450 451 452 453
			continue;

		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
			continue;

454
		if (d->dev_type == HCI_PRIMARY &&
455
		    hci_dev_test_flag(d, HCI_UNCONFIGURED)) {
456 457 458 459 460 461 462 463 464 465
			rp->index[count++] = cpu_to_le16(d->id);
			BT_DBG("Added hci%u", d->id);
		}
	}

	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (2 * count);

	read_unlock(&hci_dev_list_lock);

466 467
	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE,
				MGMT_OP_READ_UNCONF_INDEX_LIST, 0, rp, rp_len);
468 469 470 471 472 473

	kfree(rp);

	return err;
}

474 475 476 477 478 479 480 481 482 483 484 485 486 487 488
static int read_ext_index_list(struct sock *sk, struct hci_dev *hdev,
			       void *data, u16 data_len)
{
	struct mgmt_rp_read_ext_index_list *rp;
	struct hci_dev *d;
	size_t rp_len;
	u16 count;
	int err;

	BT_DBG("sock %p", sk);

	read_lock(&hci_dev_list_lock);

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
489
		if (d->dev_type == HCI_PRIMARY || d->dev_type == HCI_AMP)
490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512
			count++;
	}

	rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count);
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		read_unlock(&hci_dev_list_lock);
		return -ENOMEM;
	}

	count = 0;
	list_for_each_entry(d, &hci_dev_list, list) {
		if (hci_dev_test_flag(d, HCI_SETUP) ||
		    hci_dev_test_flag(d, HCI_CONFIG) ||
		    hci_dev_test_flag(d, HCI_USER_CHANNEL))
			continue;

		/* Devices marked as raw-only are neither configured
		 * nor unconfigured controllers.
		 */
		if (test_bit(HCI_QUIRK_RAW_DEVICE, &d->quirks))
			continue;

513
		if (d->dev_type == HCI_PRIMARY) {
514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
			if (hci_dev_test_flag(d, HCI_UNCONFIGURED))
				rp->entry[count].type = 0x01;
			else
				rp->entry[count].type = 0x00;
		} else if (d->dev_type == HCI_AMP) {
			rp->entry[count].type = 0x02;
		} else {
			continue;
		}

		rp->entry[count].bus = d->bus;
		rp->entry[count++].index = cpu_to_le16(d->id);
		BT_DBG("Added hci%u", d->id);
	}

	rp->num_controllers = cpu_to_le16(count);
	rp_len = sizeof(*rp) + (sizeof(rp->entry[0]) * count);

	read_unlock(&hci_dev_list_lock);

	/* If this command is called at least once, then all the
	 * default index and unconfigured index events are disabled
	 * and from now on only extended index events are used.
	 */
	hci_sock_set_flag(sk, HCI_MGMT_EXT_INDEX_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_INDEX_EVENTS);
	hci_sock_clear_flag(sk, HCI_MGMT_UNCONF_INDEX_EVENTS);

	err = mgmt_cmd_complete(sk, MGMT_INDEX_NONE,
				MGMT_OP_READ_EXT_INDEX_LIST, 0, rp, rp_len);

	kfree(rp);

	return err;
}

550 551 552
static bool is_configured(struct hci_dev *hdev)
{
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) &&
553
	    !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED))
554 555 556 557 558 559 560 561 562
		return false;

	if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) &&
	    !bacmp(&hdev->public_addr, BDADDR_ANY))
		return false;

	return true;
}

563 564 565 566
static __le32 get_missing_options(struct hci_dev *hdev)
{
	u32 options = 0;

567
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) &&
568
	    !hci_dev_test_flag(hdev, HCI_EXT_CONFIGURED))
569 570
		options |= MGMT_OPTION_EXTERNAL_CONFIG;

571 572 573 574 575 576 577
	if (test_bit(HCI_QUIRK_INVALID_BDADDR, &hdev->quirks) &&
	    !bacmp(&hdev->public_addr, BDADDR_ANY))
		options |= MGMT_OPTION_PUBLIC_ADDRESS;

	return cpu_to_le32(options);
}

578 579 580 581
static int new_options(struct hci_dev *hdev, struct sock *skip)
{
	__le32 options = get_missing_options(hdev);

582 583
	return mgmt_generic_event(MGMT_EV_NEW_CONFIG_OPTIONS, hdev, &options,
				  sizeof(options), skip);
584 585
}

586 587 588 589
static int send_options_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
{
	__le32 options = get_missing_options(hdev);

590 591
	return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &options,
				 sizeof(options));
592 593
}

594 595 596 597
static int read_config_info(struct sock *sk, struct hci_dev *hdev,
			    void *data, u16 data_len)
{
	struct mgmt_rp_read_config_info rp;
598
	u32 options = 0;
599 600 601 602 603 604 605

	BT_DBG("sock %p %s", sk, hdev->name);

	hci_dev_lock(hdev);

	memset(&rp, 0, sizeof(rp));
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
606

607 608 609
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks))
		options |= MGMT_OPTION_EXTERNAL_CONFIG;

610
	if (hdev->set_bdaddr)
611 612 613 614
		options |= MGMT_OPTION_PUBLIC_ADDRESS;

	rp.supported_options = cpu_to_le32(options);
	rp.missing_options = get_missing_options(hdev);
615 616 617

	hci_dev_unlock(hdev);

618 619
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_CONFIG_INFO, 0,
				 &rp, sizeof(rp));
620 621
}

622 623 624 625 626
static u32 get_supported_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

	settings |= MGMT_SETTING_POWERED;
627
	settings |= MGMT_SETTING_BONDABLE;
628
	settings |= MGMT_SETTING_DEBUG_KEYS;
629 630
	settings |= MGMT_SETTING_CONNECTABLE;
	settings |= MGMT_SETTING_DISCOVERABLE;
631

632
	if (lmp_bredr_capable(hdev)) {
633 634
		if (hdev->hci_ver >= BLUETOOTH_VER_1_2)
			settings |= MGMT_SETTING_FAST_CONNECTABLE;
635 636
		settings |= MGMT_SETTING_BREDR;
		settings |= MGMT_SETTING_LINK_SECURITY;
637 638 639 640 641

		if (lmp_ssp_capable(hdev)) {
			settings |= MGMT_SETTING_SSP;
			settings |= MGMT_SETTING_HS;
		}
642

643
		if (lmp_sc_capable(hdev))
644
			settings |= MGMT_SETTING_SECURE_CONN;
645
	}
646

647
	if (lmp_le_capable(hdev)) {
648
		settings |= MGMT_SETTING_LE;
649
		settings |= MGMT_SETTING_ADVERTISING;
650
		settings |= MGMT_SETTING_SECURE_CONN;
651
		settings |= MGMT_SETTING_PRIVACY;
652
		settings |= MGMT_SETTING_STATIC_ADDRESS;
653
	}
654

655 656
	if (test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks) ||
	    hdev->set_bdaddr)
657 658
		settings |= MGMT_SETTING_CONFIGURATION;

659 660 661 662 663 664 665
	return settings;
}

static u32 get_current_settings(struct hci_dev *hdev)
{
	u32 settings = 0;

666
	if (hdev_is_powered(hdev))
667 668
		settings |= MGMT_SETTING_POWERED;

669
	if (hci_dev_test_flag(hdev, HCI_CONNECTABLE))
670 671
		settings |= MGMT_SETTING_CONNECTABLE;

672
	if (hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE))
673 674
		settings |= MGMT_SETTING_FAST_CONNECTABLE;

675
	if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE))
676 677
		settings |= MGMT_SETTING_DISCOVERABLE;

678
	if (hci_dev_test_flag(hdev, HCI_BONDABLE))
679
		settings |= MGMT_SETTING_BONDABLE;
680

681
	if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
682 683
		settings |= MGMT_SETTING_BREDR;

684
	if (hci_dev_test_flag(hdev, HCI_LE_ENABLED))
685 686
		settings |= MGMT_SETTING_LE;

687
	if (hci_dev_test_flag(hdev, HCI_LINK_SECURITY))
688 689
		settings |= MGMT_SETTING_LINK_SECURITY;

690
	if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
691 692
		settings |= MGMT_SETTING_SSP;

693
	if (hci_dev_test_flag(hdev, HCI_HS_ENABLED))
694 695
		settings |= MGMT_SETTING_HS;

696
	if (hci_dev_test_flag(hdev, HCI_ADVERTISING))
697 698
		settings |= MGMT_SETTING_ADVERTISING;

699
	if (hci_dev_test_flag(hdev, HCI_SC_ENABLED))
700 701
		settings |= MGMT_SETTING_SECURE_CONN;

702
	if (hci_dev_test_flag(hdev, HCI_KEEP_DEBUG_KEYS))
703 704
		settings |= MGMT_SETTING_DEBUG_KEYS;

705
	if (hci_dev_test_flag(hdev, HCI_PRIVACY))
706 707
		settings |= MGMT_SETTING_PRIVACY;

708 709 710 711 712
	/* The current setting for static address has two purposes. The
	 * first is to indicate if the static address will be used and
	 * the second is to indicate if it is actually set.
	 *
	 * This means if the static address is not configured, this flag
713
	 * will never be set. If the address is configured, then if the
714 715 716 717 718 719
	 * address is actually used decides if the flag is set or not.
	 *
	 * For single mode LE only controllers and dual-mode controllers
	 * with BR/EDR disabled, the existence of the static address will
	 * be evaluated.
	 */
720
	if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) ||
721
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) ||
722 723 724 725 726
	    !bacmp(&hdev->bdaddr, BDADDR_ANY)) {
		if (bacmp(&hdev->static_addr, BDADDR_ANY))
			settings |= MGMT_SETTING_STATIC_ADDRESS;
	}

727 728 729
	return settings;
}

730 731 732 733 734 735 736 737 738 739 740 741
static struct mgmt_pending_cmd *pending_find(u16 opcode, struct hci_dev *hdev)
{
	return mgmt_pending_find(HCI_CHANNEL_CONTROL, opcode, hdev);
}

static struct mgmt_pending_cmd *pending_find_data(u16 opcode,
						  struct hci_dev *hdev,
						  const void *data)
{
	return mgmt_pending_find_data(HCI_CHANNEL_CONTROL, opcode, hdev, data);
}

742
u8 mgmt_get_adv_discov_flags(struct hci_dev *hdev)
743
{
744
	struct mgmt_pending_cmd *cmd;
745 746 747 748

	/* If there's a pending mgmt command the flags will not yet have
	 * their final values, so check for this first.
	 */
749
	cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
750 751 752 753 754 755 756
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
		if (cp->val == 0x01)
			return LE_AD_GENERAL;
		else if (cp->val == 0x02)
			return LE_AD_LIMITED;
	} else {
757
		if (hci_dev_test_flag(hdev, HCI_LIMITED_DISCOVERABLE))
758
			return LE_AD_LIMITED;
759
		else if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE))
760 761 762 763 764 765
			return LE_AD_GENERAL;
	}

	return 0;
}

766
bool mgmt_get_connectable(struct hci_dev *hdev)
767 768
{
	struct mgmt_pending_cmd *cmd;
769

770 771 772 773 774 775
	/* If there's a pending mgmt command the flag will not yet have
	 * it's final value, so check for this first.
	 */
	cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
	if (cmd) {
		struct mgmt_mode *cp = cmd->param;
776

777
		return cp->val;
778 779
	}

780 781
	return hci_dev_test_flag(hdev, HCI_CONNECTABLE);
}
782

783 784 785
static void service_cache_off(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
786
					    service_cache.work);
787
	struct hci_request req;
788

789
	if (!hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE))
790 791
		return;

792 793
	hci_req_init(&req, hdev);

794 795
	hci_dev_lock(hdev);

796
	__hci_req_update_eir(&req);
797
	__hci_req_update_class(&req);
798 799

	hci_dev_unlock(hdev);
800 801

	hci_req_run(&req, NULL);
802 803
}

804 805 806 807 808 809 810 811
static void rpa_expired(struct work_struct *work)
{
	struct hci_dev *hdev = container_of(work, struct hci_dev,
					    rpa_expired.work);
	struct hci_request req;

	BT_DBG("");

812
	hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
813

814
	if (!hci_dev_test_flag(hdev, HCI_ADVERTISING))
815 816 817
		return;

	/* The generation of a new RPA and programming it into the
818 819
	 * controller happens in the hci_req_enable_advertising()
	 * function.
820 821
	 */
	hci_req_init(&req, hdev);
822
	__hci_req_enable_advertising(&req);
823 824 825
	hci_req_run(&req, NULL);
}

826
static void mgmt_init_hdev(struct sock *sk, struct hci_dev *hdev)
827
{
828
	if (hci_dev_test_and_set_flag(hdev, HCI_MGMT))
829 830
		return;

831
	INIT_DELAYED_WORK(&hdev->service_cache, service_cache_off);
832
	INIT_DELAYED_WORK(&hdev->rpa_expired, rpa_expired);
833

834 835 836 837 838
	/* Non-mgmt controlled devices get this bit set
	 * implicitly so that pairing works for them, however
	 * for mgmt we require user-space to explicitly enable
	 * it
	 */
839
	hci_dev_clear_flag(hdev, HCI_BONDABLE);
840 841
}

842
static int read_controller_info(struct sock *sk, struct hci_dev *hdev,
843
				void *data, u16 data_len)
844
{
845
	struct mgmt_rp_read_info rp;
846

847
	BT_DBG("sock %p %s", sk, hdev->name);
848

849
	hci_dev_lock(hdev);
850

851 852
	memset(&rp, 0, sizeof(rp));

853
	bacpy(&rp.bdaddr, &hdev->bdaddr);
854

855
	rp.version = hdev->hci_ver;
856
	rp.manufacturer = cpu_to_le16(hdev->manufacturer);
857 858 859

	rp.supported_settings = cpu_to_le32(get_supported_settings(hdev));
	rp.current_settings = cpu_to_le32(get_current_settings(hdev));
860

861
	memcpy(rp.dev_class, hdev->dev_class, 3);
862

863
	memcpy(rp.name, hdev->dev_name, sizeof(hdev->dev_name));
864
	memcpy(rp.short_name, hdev->short_name, sizeof(hdev->short_name));
865

866
	hci_dev_unlock(hdev);
867

868 869
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_INFO, 0, &rp,
				 sizeof(rp));
870 871
}

872
static int send_settings_rsp(struct sock *sk, u16 opcode, struct hci_dev *hdev)
873
{
874
	__le32 settings = cpu_to_le32(get_current_settings(hdev));
875

876 877
	return mgmt_cmd_complete(sk, hdev->id, opcode, 0, &settings,
				 sizeof(settings));
878 879
}

880
static void clean_up_hci_complete(struct hci_dev *hdev, u8 status, u16 opcode)
881 882 883
{
	BT_DBG("%s status 0x%02x", hdev->name, status);

884 885
	if (hci_conn_count(hdev) == 0) {
		cancel_delayed_work(&hdev->power_off);
886
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
887
	}
888 889
}

890
void mgmt_advertising_added(struct sock *sk, struct hci_dev *hdev, u8 instance)
891 892 893 894 895 896 897 898
{
	struct mgmt_ev_advertising_added ev;

	ev.instance = instance;

	mgmt_event(MGMT_EV_ADVERTISING_ADDED, hdev, &ev, sizeof(ev), sk);
}

899 900
void mgmt_advertising_removed(struct sock *sk, struct hci_dev *hdev,
			      u8 instance)
901 902 903 904 905 906 907 908
{
	struct mgmt_ev_advertising_removed ev;

	ev.instance = instance;

	mgmt_event(MGMT_EV_ADVERTISING_REMOVED, hdev, &ev, sizeof(ev), sk);
}

909 910 911 912 913 914 915 916
static void cancel_adv_timeout(struct hci_dev *hdev)
{
	if (hdev->adv_instance_timeout) {
		hdev->adv_instance_timeout = 0;
		cancel_delayed_work(&hdev->adv_instance_expire);
	}
}

917 918 919 920
static int clean_up_hci_state(struct hci_dev *hdev)
{
	struct hci_request req;
	struct hci_conn *conn;
921 922
	bool discov_stopped;
	int err;
923 924 925 926 927 928 929 930 931

	hci_req_init(&req, hdev);

	if (test_bit(HCI_ISCAN, &hdev->flags) ||
	    test_bit(HCI_PSCAN, &hdev->flags)) {
		u8 scan = 0x00;
		hci_req_add(&req, HCI_OP_WRITE_SCAN_ENABLE, 1, &scan);
	}

932
	hci_req_clear_adv_instance(hdev, NULL, 0x00, false);
933

934
	if (hci_dev_test_flag(hdev, HCI_LE_ADV))
935
		__hci_req_disable_advertising(&req);
936

937
	discov_stopped = hci_req_stop_discovery(&req);
938 939

	list_for_each_entry(conn, &hdev->conn_hash.list, list) {
940 941
		/* 0x15 == Terminated due to Power Off */
		__hci_abort_conn(&req, conn, 0x15);
942 943
	}

944 945 946 947 948
	err = hci_req_run(&req, clean_up_hci_complete);
	if (!err && discov_stopped)
		hci_discovery_set_state(hdev, DISCOVERY_STOPPING);

	return err;
949 950
}

951
static int set_powered(struct sock *sk, struct hci_dev *hdev, void *data,
952
		       u16 len)
953
{
954
	struct mgmt_mode *cp = data;
955
	struct mgmt_pending_cmd *cmd;
956
	int err;
957

958
	BT_DBG("request for %s", hdev->name);
959

960
	if (cp->val != 0x00 && cp->val != 0x01)
961 962
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				       MGMT_STATUS_INVALID_PARAMS);
963

964
	hci_dev_lock(hdev);
965

966
	if (pending_find(MGMT_OP_SET_POWERED, hdev)) {
967 968
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_POWERED,
				      MGMT_STATUS_BUSY);
969 970 971
		goto failed;
	}

972
	if (!!cp->val == hdev_is_powered(hdev)) {
973
		err = send_settings_rsp(sk, MGMT_OP_SET_POWERED, hdev);
974 975 976
		goto failed;
	}

977
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_POWERED, hdev, data, len);
978 979
	if (!cmd) {
		err = -ENOMEM;
980
		goto failed;
981
	}
982

983
	if (cp->val) {
984
		queue_work(hdev->req_workqueue, &hdev->power_on);
985 986 987 988
		err = 0;
	} else {
		/* Disconnect connections, stop scans, etc */
		err = clean_up_hci_state(hdev);
989 990 991
		if (!err)
			queue_delayed_work(hdev->req_workqueue, &hdev->power_off,
					   HCI_POWER_OFF_TIMEOUT);
992

993 994
		/* ENODATA means there were no HCI commands queued */
		if (err == -ENODATA) {
995
			cancel_delayed_work(&hdev->power_off);
996 997 998 999
			queue_work(hdev->req_workqueue, &hdev->power_off.work);
			err = 0;
		}
	}
1000 1001

failed:
1002
	hci_dev_unlock(hdev);
1003
	return err;
1004 1005
}

1006 1007
static int new_settings(struct hci_dev *hdev, struct sock *skip)
{
1008
	__le32 ev = cpu_to_le32(get_current_settings(hdev));
1009

1010 1011
	return mgmt_generic_event(MGMT_EV_NEW_SETTINGS, hdev, &ev,
				  sizeof(ev), skip);
1012 1013
}

1014 1015 1016 1017 1018
int mgmt_new_settings(struct hci_dev *hdev)
{
	return new_settings(hdev, NULL);
}

1019 1020 1021 1022 1023 1024
struct cmd_lookup {
	struct sock *sk;
	struct hci_dev *hdev;
	u8 mgmt_status;
};

1025
static void settings_rsp(struct mgmt_pending_cmd *cmd, void *data)
1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040
{
	struct cmd_lookup *match = data;

	send_settings_rsp(cmd->sk, cmd->opcode, match->hdev);

	list_del(&cmd->list);

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}

	mgmt_pending_free(cmd);
}

1041
static void cmd_status_rsp(struct mgmt_pending_cmd *cmd, void *data)
1042 1043 1044
{
	u8 *status = data;

1045
	mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, *status);
1046 1047 1048
	mgmt_pending_remove(cmd);
}

1049
static void cmd_complete_rsp(struct mgmt_pending_cmd *cmd, void *data)
1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062
{
	if (cmd->cmd_complete) {
		u8 *status = data;

		cmd->cmd_complete(cmd, *status);
		mgmt_pending_remove(cmd);

		return;
	}

	cmd_status_rsp(cmd, data);
}

1063
static int generic_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
1064
{
1065 1066
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, cmd->param_len);
1067 1068
}

1069
static int addr_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
1070
{
1071 1072
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, sizeof(struct mgmt_addr_info));
1073 1074
}

1075 1076 1077 1078
static u8 mgmt_bredr_support(struct hci_dev *hdev)
{
	if (!lmp_bredr_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
1079
	else if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1080 1081 1082 1083 1084 1085 1086 1087 1088
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

static u8 mgmt_le_support(struct hci_dev *hdev)
{
	if (!lmp_le_capable(hdev))
		return MGMT_STATUS_NOT_SUPPORTED;
1089
	else if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED))
1090 1091 1092 1093 1094
		return MGMT_STATUS_REJECTED;
	else
		return MGMT_STATUS_SUCCESS;
}

1095
void mgmt_set_discoverable_complete(struct hci_dev *hdev, u8 status)
1096
{
1097
	struct mgmt_pending_cmd *cmd;
1098 1099 1100 1101 1102

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

1103
	cmd = pending_find(MGMT_OP_SET_DISCOVERABLE, hdev);
1104 1105 1106 1107 1108
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);
1109
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1110
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1111 1112 1113
		goto remove_cmd;
	}

1114 1115 1116 1117
	if (hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
	    hdev->discov_timeout > 0) {
		int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
		queue_delayed_work(hdev->req_workqueue, &hdev->discov_off, to);
1118
	}
1119 1120

	send_settings_rsp(cmd->sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1121
	new_settings(hdev, cmd->sk);
1122

1123 1124 1125 1126 1127 1128 1129
remove_cmd:
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1130
static int set_discoverable(struct sock *sk, struct hci_dev *hdev, void *data,
1131
			    u16 len)
1132
{
1133
	struct mgmt_cp_set_discoverable *cp = data;
1134
	struct mgmt_pending_cmd *cmd;
1135
	u16 timeout;
1136 1137
	int err;

1138
	BT_DBG("request for %s", hdev->name);
1139

1140 1141
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) &&
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1142 1143
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_REJECTED);
1144

1145
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
1146 1147
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1148

1149
	timeout = __le16_to_cpu(cp->timeout);
1150 1151 1152 1153 1154 1155

	/* Disabling discoverable requires that no timeout is set,
	 * and enabling limited discoverable requires a timeout.
	 */
	if ((cp->val == 0x00 && timeout > 0) ||
	    (cp->val == 0x02 && timeout == 0))
1156 1157
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1158

1159
	hci_dev_lock(hdev);
1160

1161
	if (!hdev_is_powered(hdev) && timeout > 0) {
1162 1163
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_NOT_POWERED);
1164 1165 1166
		goto failed;
	}

1167 1168
	if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
	    pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1169 1170
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_BUSY);
1171 1172 1173
		goto failed;
	}

1174
	if (!hci_dev_test_flag(hdev, HCI_CONNECTABLE)) {
1175 1176
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DISCOVERABLE,
				      MGMT_STATUS_REJECTED);
1177 1178 1179 1180
		goto failed;
	}

	if (!hdev_is_powered(hdev)) {
1181 1182
		bool changed = false;

1183 1184 1185 1186
		/* Setting limited discoverable when powered off is
		 * not a valid operation since it requires a timeout
		 * and so no need to check HCI_LIMITED_DISCOVERABLE.
		 */
1187
		if (!!cp->val != hci_dev_test_flag(hdev, HCI_DISCOVERABLE)) {
1188
			hci_dev_change_flag(hdev, HCI_DISCOVERABLE);
1189 1190 1191
			changed = true;
		}

1192
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1193 1194 1195 1196 1197 1198
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1199 1200 1201
		goto failed;
	}

1202 1203 1204 1205
	/* If the current mode is the same, then just update the timeout
	 * value with the new value. And if only the timeout gets updated,
	 * then no need for any HCI transactions.
	 */
1206 1207 1208
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
	    (cp->val == 0x02) == hci_dev_test_flag(hdev,
						   HCI_LIMITED_DISCOVERABLE)) {
1209 1210
		cancel_delayed_work(&hdev->discov_off);
		hdev->discov_timeout = timeout;
1211

1212 1213
		if (cp->val && hdev->discov_timeout > 0) {
			int to = msecs_to_jiffies(hdev->discov_timeout * 1000);
1214 1215
			queue_delayed_work(hdev->req_workqueue,
					   &hdev->discov_off, to);
1216 1217
		}

1218
		err = send_settings_rsp(sk, MGMT_OP_SET_DISCOVERABLE, hdev);
1219 1220 1221
		goto failed;
	}

1222
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DISCOVERABLE, hdev, data, len);
1223 1224
	if (!cmd) {
		err = -ENOMEM;
1225
		goto failed;
1226
	}
1227

1228 1229 1230 1231 1232 1233 1234
	/* Cancel any potential discoverable timeout that might be
	 * still active and store new timeout value. The arming of
	 * the timeout happens in the complete handler.
	 */
	cancel_delayed_work(&hdev->discov_off);
	hdev->discov_timeout = timeout;

1235 1236 1237 1238 1239
	if (cp->val)
		hci_dev_set_flag(hdev, HCI_DISCOVERABLE);
	else
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);

1240 1241
	/* Limited discoverable mode */
	if (cp->val == 0x02)
1242
		hci_dev_set_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1243
	else
1244
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
1245

1246 1247
	queue_work(hdev->req_workqueue, &hdev->discoverable_update);
	err = 0;
1248 1249

failed:
1250
	hci_dev_unlock(hdev);
1251 1252 1253
	return err;
}

1254
void mgmt_set_connectable_complete(struct hci_dev *hdev, u8 status)
1255
{
1256
	struct mgmt_pending_cmd *cmd;
1257 1258 1259 1260 1261

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

1262
	cmd = pending_find(MGMT_OP_SET_CONNECTABLE, hdev);
1263 1264 1265
	if (!cmd)
		goto unlock;

1266 1267
	if (status) {
		u8 mgmt_err = mgmt_status(status);
1268
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
1269 1270 1271
		goto remove_cmd;
	}

1272
	send_settings_rsp(cmd->sk, MGMT_OP_SET_CONNECTABLE, hdev);
1273
	new_settings(hdev, cmd->sk);
1274

1275
remove_cmd:
1276 1277 1278 1279 1280 1281
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1282 1283 1284 1285 1286 1287
static int set_connectable_update_settings(struct hci_dev *hdev,
					   struct sock *sk, u8 val)
{
	bool changed = false;
	int err;

1288
	if (!!val != hci_dev_test_flag(hdev, HCI_CONNECTABLE))
1289 1290 1291
		changed = true;

	if (val) {
1292
		hci_dev_set_flag(hdev, HCI_CONNECTABLE);
1293
	} else {
1294 1295
		hci_dev_clear_flag(hdev, HCI_CONNECTABLE);
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
1296 1297 1298 1299 1300 1301
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_CONNECTABLE, hdev);
	if (err < 0)
		return err;

1302
	if (changed) {
1303
		hci_req_update_scan(hdev);
1304
		hci_update_background_scan(hdev);
1305
		return new_settings(hdev, sk);
1306
	}
1307 1308 1309 1310

	return 0;
}

1311
static int set_connectable(struct sock *sk, struct hci_dev *hdev, void *data,
1312
			   u16 len)
1313
{
1314
	struct mgmt_mode *cp = data;
1315
	struct mgmt_pending_cmd *cmd;
1316 1317
	int err;

1318
	BT_DBG("request for %s", hdev->name);
1319

1320 1321
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED) &&
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
1322 1323
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				       MGMT_STATUS_REJECTED);
1324

1325
	if (cp->val != 0x00 && cp->val != 0x01)
1326 1327
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1328

1329
	hci_dev_lock(hdev);
1330

1331
	if (!hdev_is_powered(hdev)) {
1332
		err = set_connectable_update_settings(hdev, sk, cp->val);
1333 1334 1335
		goto failed;
	}

1336 1337
	if (pending_find(MGMT_OP_SET_DISCOVERABLE, hdev) ||
	    pending_find(MGMT_OP_SET_CONNECTABLE, hdev)) {
1338 1339
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_CONNECTABLE,
				      MGMT_STATUS_BUSY);
1340 1341 1342
		goto failed;
	}

1343
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_CONNECTABLE, hdev, data, len);
1344 1345
	if (!cmd) {
		err = -ENOMEM;
1346
		goto failed;
1347
	}
1348

1349 1350 1351 1352 1353
	if (cp->val) {
		hci_dev_set_flag(hdev, HCI_CONNECTABLE);
	} else {
		if (hdev->discov_timeout > 0)
			cancel_delayed_work(&hdev->discov_off);
1354

1355 1356 1357
		hci_dev_clear_flag(hdev, HCI_LIMITED_DISCOVERABLE);
		hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
		hci_dev_clear_flag(hdev, HCI_CONNECTABLE);
1358
	}
1359

1360 1361
	queue_work(hdev->req_workqueue, &hdev->connectable_update);
	err = 0;
1362 1363

failed:
1364
	hci_dev_unlock(hdev);
1365 1366 1367
	return err;
}

1368
static int set_bondable(struct sock *sk, struct hci_dev *hdev, void *data,
1369
			u16 len)
1370
{
1371
	struct mgmt_mode *cp = data;
1372
	bool changed;
1373 1374
	int err;

1375
	BT_DBG("request for %s", hdev->name);
1376

1377
	if (cp->val != 0x00 && cp->val != 0x01)
1378 1379
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BONDABLE,
				       MGMT_STATUS_INVALID_PARAMS);
1380

1381
	hci_dev_lock(hdev);
1382 1383

	if (cp->val)
1384
		changed = !hci_dev_test_and_set_flag(hdev, HCI_BONDABLE);
1385
	else
1386
		changed = hci_dev_test_and_clear_flag(hdev, HCI_BONDABLE);
1387

1388
	err = send_settings_rsp(sk, MGMT_OP_SET_BONDABLE, hdev);
1389
	if (err < 0)
1390
		goto unlock;
1391

1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402
	if (changed) {
		/* In limited privacy mode the change of bondable mode
		 * may affect the local advertising address.
		 */
		if (hdev_is_powered(hdev) &&
		    hci_dev_test_flag(hdev, HCI_ADVERTISING) &&
		    hci_dev_test_flag(hdev, HCI_DISCOVERABLE) &&
		    hci_dev_test_flag(hdev, HCI_LIMITED_PRIVACY))
			queue_work(hdev->req_workqueue,
				   &hdev->discoverable_update);

1403
		err = new_settings(hdev, sk);
1404
	}
1405

1406
unlock:
1407
	hci_dev_unlock(hdev);
1408 1409 1410
	return err;
}

1411 1412
static int set_link_security(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
1413 1414
{
	struct mgmt_mode *cp = data;
1415
	struct mgmt_pending_cmd *cmd;
1416
	u8 val, status;
1417 1418
	int err;

1419
	BT_DBG("request for %s", hdev->name);
1420

1421 1422
	status = mgmt_bredr_support(hdev);
	if (status)
1423 1424
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				       status);
1425

1426
	if (cp->val != 0x00 && cp->val != 0x01)
1427 1428
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				       MGMT_STATUS_INVALID_PARAMS);
1429

1430 1431
	hci_dev_lock(hdev);

1432
	if (!hdev_is_powered(hdev)) {
1433 1434
		bool changed = false;

1435
		if (!!cp->val != hci_dev_test_flag(hdev, HCI_LINK_SECURITY)) {
1436
			hci_dev_change_flag(hdev, HCI_LINK_SECURITY);
1437 1438 1439 1440 1441 1442 1443 1444 1445 1446
			changed = true;
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1447 1448 1449
		goto failed;
	}

1450
	if (pending_find(MGMT_OP_SET_LINK_SECURITY, hdev)) {
1451 1452
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LINK_SECURITY,
				      MGMT_STATUS_BUSY);
1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479
		goto failed;
	}

	val = !!cp->val;

	if (test_bit(HCI_AUTH, &hdev->flags) == val) {
		err = send_settings_rsp(sk, MGMT_OP_SET_LINK_SECURITY, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LINK_SECURITY, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

	err = hci_send_cmd(hdev, HCI_OP_WRITE_AUTH_ENABLE, sizeof(val), &val);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1480
static int set_ssp(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1481 1482
{
	struct mgmt_mode *cp = data;
1483
	struct mgmt_pending_cmd *cmd;
1484
	u8 status;
1485 1486
	int err;

1487
	BT_DBG("request for %s", hdev->name);
1488

1489 1490
	status = mgmt_bredr_support(hdev);
	if (status)
1491
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP, status);
1492

1493
	if (!lmp_ssp_capable(hdev))
1494 1495
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				       MGMT_STATUS_NOT_SUPPORTED);
1496

1497
	if (cp->val != 0x00 && cp->val != 0x01)
1498 1499
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				       MGMT_STATUS_INVALID_PARAMS);
1500

1501
	hci_dev_lock(hdev);
1502

1503
	if (!hdev_is_powered(hdev)) {
1504
		bool changed;
1505

1506
		if (cp->val) {
1507 1508
			changed = !hci_dev_test_and_set_flag(hdev,
							     HCI_SSP_ENABLED);
1509
		} else {
1510 1511
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_SSP_ENABLED);
1512
			if (!changed)
1513 1514
				changed = hci_dev_test_and_clear_flag(hdev,
								      HCI_HS_ENABLED);
1515
			else
1516
				hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
1517 1518 1519 1520 1521 1522 1523 1524 1525
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

1526 1527 1528
		goto failed;
	}

1529
	if (pending_find(MGMT_OP_SET_SSP, hdev)) {
1530 1531
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SSP,
				      MGMT_STATUS_BUSY);
1532 1533 1534
		goto failed;
	}

1535
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
1536 1537 1538 1539 1540 1541 1542 1543 1544 1545
		err = send_settings_rsp(sk, MGMT_OP_SET_SSP, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SSP, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

1546
	if (!cp->val && hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS))
1547 1548 1549
		hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE,
			     sizeof(cp->val), &cp->val);

1550
	err = hci_send_cmd(hdev, HCI_OP_WRITE_SSP_MODE, 1, &cp->val);
1551 1552 1553 1554 1555 1556 1557 1558 1559 1560
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

1561
static int set_hs(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1562 1563
{
	struct mgmt_mode *cp = data;
1564
	bool changed;
1565
	u8 status;
1566
	int err;
1567

1568
	BT_DBG("request for %s", hdev->name);
1569

1570 1571
	status = mgmt_bredr_support(hdev);
	if (status)
1572
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS, status);
1573

1574
	if (!lmp_ssp_capable(hdev))
1575 1576
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_NOT_SUPPORTED);
1577

1578
	if (!hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
1579 1580
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_REJECTED);
1581

1582
	if (cp->val != 0x00 && cp->val != 0x01)
1583 1584
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				       MGMT_STATUS_INVALID_PARAMS);
1585

1586 1587
	hci_dev_lock(hdev);

1588
	if (pending_find(MGMT_OP_SET_SSP, hdev)) {
1589 1590
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
				      MGMT_STATUS_BUSY);
1591 1592 1593
		goto unlock;
	}

1594
	if (cp->val) {
1595
		changed = !hci_dev_test_and_set_flag(hdev, HCI_HS_ENABLED);
1596 1597
	} else {
		if (hdev_is_powered(hdev)) {
1598 1599
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_HS,
					      MGMT_STATUS_REJECTED);
1600 1601 1602
			goto unlock;
		}

1603
		changed = hci_dev_test_and_clear_flag(hdev, HCI_HS_ENABLED);
1604
	}
1605 1606 1607 1608 1609 1610 1611

	err = send_settings_rsp(sk, MGMT_OP_SET_HS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);
1612

1613 1614 1615
unlock:
	hci_dev_unlock(hdev);
	return err;
1616 1617
}

1618
static void le_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1619 1620 1621
{
	struct cmd_lookup match = { NULL, hdev };

1622 1623
	hci_dev_lock(hdev);

1624 1625 1626 1627 1628
	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, cmd_status_rsp,
				     &mgmt_err);
1629
		goto unlock;
1630 1631 1632 1633 1634 1635 1636 1637
	}

	mgmt_pending_foreach(MGMT_OP_SET_LE, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
1638 1639 1640 1641 1642 1643

	/* Make sure the controller has a good default for
	 * advertising data. Restrict the update to when LE
	 * has actually been enabled. During power on, the
	 * update in powered_update_hci will take care of it.
	 */
1644
	if (hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
1645 1646 1647
		struct hci_request req;

		hci_req_init(&req, hdev);
1648 1649
		__hci_req_update_adv_data(&req, 0x00);
		__hci_req_update_scan_rsp_data(&req, 0x00);
1650
		hci_req_run(&req, NULL);
1651
		hci_update_background_scan(hdev);
1652
	}
1653 1654 1655

unlock:
	hci_dev_unlock(hdev);
1656 1657
}

1658
static int set_le(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1659 1660 1661
{
	struct mgmt_mode *cp = data;
	struct hci_cp_write_le_host_supported hci_cp;
1662
	struct mgmt_pending_cmd *cmd;
1663
	struct hci_request req;
1664
	int err;
1665
	u8 val, enabled;
1666

1667
	BT_DBG("request for %s", hdev->name);
1668

1669
	if (!lmp_le_capable(hdev))
1670 1671
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_NOT_SUPPORTED);
1672

1673
	if (cp->val != 0x00 && cp->val != 0x01)
1674 1675
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_INVALID_PARAMS);
1676

1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689
	/* Bluetooth single mode LE only controllers or dual-mode
	 * controllers configured as LE only devices, do not allow
	 * switching LE off. These have either LE enabled explicitly
	 * or BR/EDR has been previously switched off.
	 *
	 * When trying to enable an already enabled LE, then gracefully
	 * send a positive response. Trying to disable it however will
	 * result into rejection.
	 */
	if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
		if (cp->val == 0x01)
			return send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);

1690 1691
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				       MGMT_STATUS_REJECTED);
1692
	}
1693

1694
	hci_dev_lock(hdev);
1695 1696

	val = !!cp->val;
1697
	enabled = lmp_host_le_capable(hdev);
1698

1699
	if (!val)
1700
		hci_req_clear_adv_instance(hdev, NULL, 0x00, true);
1701

1702
	if (!hdev_is_powered(hdev) || val == enabled) {
1703 1704
		bool changed = false;

1705
		if (val != hci_dev_test_flag(hdev, HCI_LE_ENABLED)) {
1706
			hci_dev_change_flag(hdev, HCI_LE_ENABLED);
1707 1708 1709
			changed = true;
		}

1710
		if (!val && hci_dev_test_flag(hdev, HCI_ADVERTISING)) {
1711
			hci_dev_clear_flag(hdev, HCI_ADVERTISING);
1712 1713 1714
			changed = true;
		}

1715 1716
		err = send_settings_rsp(sk, MGMT_OP_SET_LE, hdev);
		if (err < 0)
1717
			goto unlock;
1718 1719 1720 1721

		if (changed)
			err = new_settings(hdev, sk);

1722
		goto unlock;
1723 1724
	}

1725 1726
	if (pending_find(MGMT_OP_SET_LE, hdev) ||
	    pending_find(MGMT_OP_SET_ADVERTISING, hdev)) {
1727 1728
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_LE,
				      MGMT_STATUS_BUSY);
1729
		goto unlock;
1730 1731 1732 1733 1734
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LE, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
1735
		goto unlock;
1736 1737
	}

1738 1739
	hci_req_init(&req, hdev);

1740 1741 1742 1743
	memset(&hci_cp, 0, sizeof(hci_cp));

	if (val) {
		hci_cp.le = val;
1744
		hci_cp.simul = 0x00;
1745
	} else {
1746
		if (hci_dev_test_flag(hdev, HCI_LE_ADV))
1747
			__hci_req_disable_advertising(&req);
1748 1749
	}

1750 1751 1752 1753
	hci_req_add(&req, HCI_OP_WRITE_LE_HOST_SUPPORTED, sizeof(hci_cp),
		    &hci_cp);

	err = hci_req_run(&req, le_enable_complete);
1754
	if (err < 0)
1755 1756
		mgmt_pending_remove(cmd);

1757 1758
unlock:
	hci_dev_unlock(hdev);
1759 1760 1761
	return err;
}

1762 1763 1764 1765 1766 1767 1768 1769
/* This is a helper function to test for pending mgmt commands that can
 * cause CoD or EIR HCI commands. We can only allow one such pending
 * mgmt command at a time since otherwise we cannot easily track what
 * the current values are, will be, and based on that calculate if a new
 * HCI command needs to be sent and if yes with what value.
 */
static bool pending_eir_or_class(struct hci_dev *hdev)
{
1770
	struct mgmt_pending_cmd *cmd;
1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784

	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
		switch (cmd->opcode) {
		case MGMT_OP_ADD_UUID:
		case MGMT_OP_REMOVE_UUID:
		case MGMT_OP_SET_DEV_CLASS:
		case MGMT_OP_SET_POWERED:
			return true;
		}
	}

	return false;
}

1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803
static const u8 bluetooth_base_uuid[] = {
			0xfb, 0x34, 0x9b, 0x5f, 0x80, 0x00, 0x00, 0x80,
			0x00, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static u8 get_uuid_size(const u8 *uuid)
{
	u32 val;

	if (memcmp(uuid, bluetooth_base_uuid, 12))
		return 128;

	val = get_unaligned_le32(&uuid[12]);
	if (val > 0xffff)
		return 32;

	return 16;
}

1804 1805
static void mgmt_class_complete(struct hci_dev *hdev, u16 mgmt_op, u8 status)
{
1806
	struct mgmt_pending_cmd *cmd;
1807 1808 1809

	hci_dev_lock(hdev);

1810
	cmd = pending_find(mgmt_op, hdev);
1811 1812 1813
	if (!cmd)
		goto unlock;

1814 1815
	mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode,
			  mgmt_status(status), hdev->dev_class, 3);
1816 1817 1818 1819 1820 1821 1822

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

1823
static void add_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1824 1825 1826 1827 1828 1829
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_ADD_UUID, status);
}

1830
static int add_uuid(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
1831
{
1832
	struct mgmt_cp_add_uuid *cp = data;
1833
	struct mgmt_pending_cmd *cmd;
1834
	struct hci_request req;
1835 1836 1837
	struct bt_uuid *uuid;
	int err;

1838
	BT_DBG("request for %s", hdev->name);
1839

1840
	hci_dev_lock(hdev);
1841

1842
	if (pending_eir_or_class(hdev)) {
1843 1844
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_UUID,
				      MGMT_STATUS_BUSY);
1845 1846 1847
		goto failed;
	}

1848
	uuid = kmalloc(sizeof(*uuid), GFP_KERNEL);
1849 1850 1851 1852 1853 1854
	if (!uuid) {
		err = -ENOMEM;
		goto failed;
	}

	memcpy(uuid->uuid, cp->uuid, 16);
1855
	uuid->svc_hint = cp->svc_hint;
1856
	uuid->size = get_uuid_size(cp->uuid);
1857

1858
	list_add_tail(&uuid->list, &hdev->uuids);
1859

1860
	hci_req_init(&req, hdev);
1861

1862
	__hci_req_update_class(&req);
1863
	__hci_req_update_eir(&req);
1864

1865 1866 1867 1868
	err = hci_req_run(&req, add_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto failed;
1869

1870 1871
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_UUID, 0,
					hdev->dev_class, 3);
1872 1873 1874 1875
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_UUID, hdev, data, len);
1876
	if (!cmd) {
1877
		err = -ENOMEM;
1878 1879 1880 1881
		goto failed;
	}

	err = 0;
1882 1883

failed:
1884
	hci_dev_unlock(hdev);
1885 1886 1887
	return err;
}

1888 1889 1890 1891 1892
static bool enable_service_cache(struct hci_dev *hdev)
{
	if (!hdev_is_powered(hdev))
		return false;

1893
	if (!hci_dev_test_and_set_flag(hdev, HCI_SERVICE_CACHE)) {
1894 1895
		queue_delayed_work(hdev->workqueue, &hdev->service_cache,
				   CACHE_TIMEOUT);
1896 1897 1898 1899 1900 1901
		return true;
	}

	return false;
}

1902
static void remove_uuid_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1903 1904 1905 1906 1907 1908
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_REMOVE_UUID, status);
}

1909
static int remove_uuid(struct sock *sk, struct hci_dev *hdev, void *data,
1910
		       u16 len)
1911
{
1912
	struct mgmt_cp_remove_uuid *cp = data;
1913
	struct mgmt_pending_cmd *cmd;
1914
	struct bt_uuid *match, *tmp;
1915
	u8 bt_uuid_any[] = { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 };
1916
	struct hci_request req;
1917 1918
	int err, found;

1919
	BT_DBG("request for %s", hdev->name);
1920

1921
	hci_dev_lock(hdev);
1922

1923
	if (pending_eir_or_class(hdev)) {
1924 1925
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
				      MGMT_STATUS_BUSY);
1926 1927 1928
		goto unlock;
	}

1929
	if (memcmp(cp->uuid, bt_uuid_any, 16) == 0) {
1930
		hci_uuids_clear(hdev);
1931

1932
		if (enable_service_cache(hdev)) {
1933 1934 1935
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_UUID,
						0, hdev->dev_class, 3);
1936 1937
			goto unlock;
		}
1938

1939
		goto update_class;
1940 1941 1942 1943
	}

	found = 0;

1944
	list_for_each_entry_safe(match, tmp, &hdev->uuids, list) {
1945 1946 1947 1948
		if (memcmp(match->uuid, cp->uuid, 16) != 0)
			continue;

		list_del(&match->list);
1949
		kfree(match);
1950 1951 1952 1953
		found++;
	}

	if (found == 0) {
1954 1955
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_UUID,
				      MGMT_STATUS_INVALID_PARAMS);
1956 1957 1958
		goto unlock;
	}

1959
update_class:
1960
	hci_req_init(&req, hdev);
1961

1962
	__hci_req_update_class(&req);
1963
	__hci_req_update_eir(&req);
1964

1965 1966 1967 1968
	err = hci_req_run(&req, remove_uuid_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
1969

1970 1971
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_UUID, 0,
					hdev->dev_class, 3);
1972 1973 1974 1975
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_UUID, hdev, data, len);
1976
	if (!cmd) {
1977
		err = -ENOMEM;
1978 1979 1980 1981
		goto unlock;
	}

	err = 0;
1982 1983

unlock:
1984
	hci_dev_unlock(hdev);
1985 1986 1987
	return err;
}

1988
static void set_class_complete(struct hci_dev *hdev, u8 status, u16 opcode)
1989 1990 1991 1992 1993 1994
{
	BT_DBG("status 0x%02x", status);

	mgmt_class_complete(hdev, MGMT_OP_SET_DEV_CLASS, status);
}

1995
static int set_dev_class(struct sock *sk, struct hci_dev *hdev, void *data,
1996
			 u16 len)
1997
{
1998
	struct mgmt_cp_set_dev_class *cp = data;
1999
	struct mgmt_pending_cmd *cmd;
2000
	struct hci_request req;
2001 2002
	int err;

2003
	BT_DBG("request for %s", hdev->name);
2004

2005
	if (!lmp_bredr_capable(hdev))
2006 2007
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				       MGMT_STATUS_NOT_SUPPORTED);
2008

2009
	hci_dev_lock(hdev);
2010

2011
	if (pending_eir_or_class(hdev)) {
2012 2013
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				      MGMT_STATUS_BUSY);
2014 2015
		goto unlock;
	}
2016

2017
	if ((cp->minor & 0x03) != 0 || (cp->major & 0xe0) != 0) {
2018 2019
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEV_CLASS,
				      MGMT_STATUS_INVALID_PARAMS);
2020 2021
		goto unlock;
	}
2022

2023 2024 2025
	hdev->major_class = cp->major;
	hdev->minor_class = cp->minor;

2026
	if (!hdev_is_powered(hdev)) {
2027 2028
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
					hdev->dev_class, 3);
2029 2030 2031
		goto unlock;
	}

2032 2033
	hci_req_init(&req, hdev);

2034
	if (hci_dev_test_and_clear_flag(hdev, HCI_SERVICE_CACHE)) {
2035 2036 2037
		hci_dev_unlock(hdev);
		cancel_delayed_work_sync(&hdev->service_cache);
		hci_dev_lock(hdev);
2038
		__hci_req_update_eir(&req);
2039
	}
2040

2041
	__hci_req_update_class(&req);
2042

2043 2044 2045 2046
	err = hci_req_run(&req, set_class_complete);
	if (err < 0) {
		if (err != -ENODATA)
			goto unlock;
2047

2048 2049
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEV_CLASS, 0,
					hdev->dev_class, 3);
2050 2051 2052 2053
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_DEV_CLASS, hdev, data, len);
2054
	if (!cmd) {
2055
		err = -ENOMEM;
2056 2057 2058 2059
		goto unlock;
	}

	err = 0;
2060

2061
unlock:
2062
	hci_dev_unlock(hdev);
2063 2064 2065
	return err;
}

2066
static int load_link_keys(struct sock *sk, struct hci_dev *hdev, void *data,
2067
			  u16 len)
2068
{
2069
	struct mgmt_cp_load_link_keys *cp = data;
2070 2071
	const u16 max_key_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_link_key_info));
2072
	u16 key_count, expected_len;
2073
	bool changed;
2074
	int i;
2075

2076 2077 2078
	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev))
2079 2080
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_NOT_SUPPORTED);
2081

2082
	key_count = __le16_to_cpu(cp->key_count);
2083 2084 2085
	if (key_count > max_key_count) {
		BT_ERR("load_link_keys: too big key_count value %u",
		       key_count);
2086 2087
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2088
	}
2089

2090 2091
	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_link_key_info);
2092
	if (expected_len != len) {
2093
		BT_ERR("load_link_keys: expected %u bytes, got %u bytes",
2094
		       expected_len, len);
2095 2096
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2097 2098
	}

2099
	if (cp->debug_keys != 0x00 && cp->debug_keys != 0x01)
2100 2101
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
2102

2103
	BT_DBG("%s debug_keys %u key_count %u", hdev->name, cp->debug_keys,
2104
	       key_count);
2105

2106 2107 2108
	for (i = 0; i < key_count; i++) {
		struct mgmt_link_key_info *key = &cp->keys[i];

2109
		if (key->addr.type != BDADDR_BREDR || key->type > 0x08)
2110 2111 2112
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_LINK_KEYS,
					       MGMT_STATUS_INVALID_PARAMS);
2113 2114
	}

2115
	hci_dev_lock(hdev);
2116 2117 2118 2119

	hci_link_keys_clear(hdev);

	if (cp->debug_keys)
2120
		changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS);
2121
	else
2122 2123
		changed = hci_dev_test_and_clear_flag(hdev,
						      HCI_KEEP_DEBUG_KEYS);
2124 2125 2126

	if (changed)
		new_settings(hdev, NULL);
2127

2128
	for (i = 0; i < key_count; i++) {
2129
		struct mgmt_link_key_info *key = &cp->keys[i];
2130

2131 2132 2133 2134 2135 2136
		/* Always ignore debug keys and require a new pairing if
		 * the user wants to use them.
		 */
		if (key->type == HCI_LK_DEBUG_COMBINATION)
			continue;

2137 2138
		hci_add_link_key(hdev, NULL, &key->addr.bdaddr, key->val,
				 key->type, key->pin_len, NULL);
2139 2140
	}

2141
	mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LINK_KEYS, 0, NULL, 0);
2142

2143
	hci_dev_unlock(hdev);
2144

2145
	return 0;
2146 2147
}

2148
static int device_unpaired(struct hci_dev *hdev, bdaddr_t *bdaddr,
2149
			   u8 addr_type, struct sock *skip_sk)
2150 2151 2152 2153 2154 2155 2156
{
	struct mgmt_ev_device_unpaired ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = addr_type;

	return mgmt_event(MGMT_EV_DEVICE_UNPAIRED, hdev, &ev, sizeof(ev),
2157
			  skip_sk);
2158 2159
}

2160
static int unpair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2161
			 u16 len)
2162
{
2163 2164
	struct mgmt_cp_unpair_device *cp = data;
	struct mgmt_rp_unpair_device rp;
2165
	struct hci_conn_params *params;
2166
	struct mgmt_pending_cmd *cmd;
2167
	struct hci_conn *conn;
2168
	u8 addr_type;
2169 2170
	int err;

2171
	memset(&rp, 0, sizeof(rp));
2172 2173
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;
2174

2175
	if (!bdaddr_type_is_valid(cp->addr.type))
2176 2177 2178
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2179

2180
	if (cp->disconnect != 0x00 && cp->disconnect != 0x01)
2181 2182 2183
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2184

2185 2186
	hci_dev_lock(hdev);

2187
	if (!hdev_is_powered(hdev)) {
2188 2189 2190
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2191 2192 2193
		goto unlock;
	}

2194
	if (cp->addr.type == BDADDR_BREDR) {
2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207
		/* If disconnection is requested, then look up the
		 * connection. If the remote device is connected, it
		 * will be later used to terminate the link.
		 *
		 * Setting it to NULL explicitly will cause no
		 * termination of the link.
		 */
		if (cp->disconnect)
			conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
						       &cp->addr.bdaddr);
		else
			conn = NULL;

2208
		err = hci_remove_link_key(hdev, &cp->addr.bdaddr);
2209 2210 2211 2212 2213 2214
		if (err < 0) {
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_UNPAIR_DEVICE,
						MGMT_STATUS_NOT_PAIRED, &rp,
						sizeof(rp));
			goto unlock;
2215 2216
		}

2217
		goto done;
2218
	}
2219

2220 2221 2222 2223 2224 2225
	/* LE address type */
	addr_type = le_addr_type(cp->addr.type);

	hci_remove_irk(hdev, &cp->addr.bdaddr, addr_type);

	err = hci_remove_ltk(hdev, &cp->addr.bdaddr, addr_type);
2226
	if (err < 0) {
2227 2228 2229
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE,
					MGMT_STATUS_NOT_PAIRED, &rp,
					sizeof(rp));
2230 2231 2232
		goto unlock;
	}

2233 2234 2235 2236 2237 2238
	conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr, addr_type);
	if (!conn) {
		hci_conn_params_del(hdev, &cp->addr.bdaddr, addr_type);
		goto done;
	}

2239 2240 2241
	/* Abort any ongoing SMP pairing */
	smp_cancel_pairing(conn);

2242 2243 2244 2245 2246
	/* Defer clearing up the connection parameters until closing to
	 * give a chance of keeping them if a repairing happens.
	 */
	set_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags);

2247 2248 2249 2250 2251 2252 2253 2254 2255
	/* Disable auto-connection parameters if present */
	params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr, addr_type);
	if (params) {
		if (params->explicit_connect)
			params->auto_connect = HCI_AUTO_CONN_EXPLICIT;
		else
			params->auto_connect = HCI_AUTO_CONN_DISABLED;
	}

2256 2257 2258 2259 2260 2261 2262
	/* If disconnection is not requested, then clear the connection
	 * variable so that the link is not terminated.
	 */
	if (!cp->disconnect)
		conn = NULL;

done:
2263 2264 2265
	/* If the connection variable is set, then termination of the
	 * link is requested.
	 */
2266
	if (!conn) {
2267 2268
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNPAIR_DEVICE, 0,
					&rp, sizeof(rp));
2269
		device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, sk);
2270 2271
		goto unlock;
	}
2272

2273
	cmd = mgmt_pending_add(sk, MGMT_OP_UNPAIR_DEVICE, hdev, cp,
2274
			       sizeof(*cp));
2275 2276 2277
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
2278 2279
	}

2280 2281
	cmd->cmd_complete = addr_cmd_complete;

2282
	err = hci_abort_conn(conn, HCI_ERROR_REMOTE_USER_TERM);
2283 2284 2285
	if (err < 0)
		mgmt_pending_remove(cmd);

2286
unlock:
2287
	hci_dev_unlock(hdev);
2288 2289 2290
	return err;
}

2291
static int disconnect(struct sock *sk, struct hci_dev *hdev, void *data,
2292
		      u16 len)
2293
{
2294
	struct mgmt_cp_disconnect *cp = data;
2295
	struct mgmt_rp_disconnect rp;
2296
	struct mgmt_pending_cmd *cmd;
2297 2298 2299 2300 2301
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2302 2303 2304 2305
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2306
	if (!bdaddr_type_is_valid(cp->addr.type))
2307 2308 2309
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2310

2311
	hci_dev_lock(hdev);
2312 2313

	if (!test_bit(HCI_UP, &hdev->flags)) {
2314 2315 2316
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2317 2318 2319
		goto failed;
	}

2320
	if (pending_find(MGMT_OP_DISCONNECT, hdev)) {
2321 2322
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
2323 2324 2325
		goto failed;
	}

2326
	if (cp->addr.type == BDADDR_BREDR)
2327 2328
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
2329
	else
2330 2331
		conn = hci_conn_hash_lookup_le(hdev, &cp->addr.bdaddr,
					       le_addr_type(cp->addr.type));
2332

2333
	if (!conn || conn->state == BT_OPEN || conn->state == BT_CLOSED) {
2334 2335 2336
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_DISCONNECT,
					MGMT_STATUS_NOT_CONNECTED, &rp,
					sizeof(rp));
2337 2338 2339
		goto failed;
	}

2340
	cmd = mgmt_pending_add(sk, MGMT_OP_DISCONNECT, hdev, data, len);
2341 2342
	if (!cmd) {
		err = -ENOMEM;
2343
		goto failed;
2344
	}
2345

2346 2347
	cmd->cmd_complete = generic_cmd_complete;

2348
	err = hci_disconnect(conn, HCI_ERROR_REMOTE_USER_TERM);
2349
	if (err < 0)
2350
		mgmt_pending_remove(cmd);
2351 2352

failed:
2353
	hci_dev_unlock(hdev);
2354 2355 2356
	return err;
}

2357
static u8 link_to_bdaddr(u8 link_type, u8 addr_type)
2358 2359 2360
{
	switch (link_type) {
	case LE_LINK:
2361 2362
		switch (addr_type) {
		case ADDR_LE_DEV_PUBLIC:
2363
			return BDADDR_LE_PUBLIC;
2364

2365
		default:
2366
			/* Fallback to LE Random address type */
2367
			return BDADDR_LE_RANDOM;
2368
		}
2369

2370
	default:
2371
		/* Fallback to BR/EDR type */
2372
		return BDADDR_BREDR;
2373 2374 2375
	}
}

2376 2377
static int get_connections(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 data_len)
2378 2379
{
	struct mgmt_rp_get_connections *rp;
2380
	struct hci_conn *c;
2381
	size_t rp_len;
2382 2383
	int err;
	u16 i;
2384 2385 2386

	BT_DBG("");

2387
	hci_dev_lock(hdev);
2388

2389
	if (!hdev_is_powered(hdev)) {
2390 2391
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_CONNECTIONS,
				      MGMT_STATUS_NOT_POWERED);
2392 2393 2394
		goto unlock;
	}

2395
	i = 0;
2396 2397
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
		if (test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
2398
			i++;
2399 2400
	}

2401
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2402
	rp = kmalloc(rp_len, GFP_KERNEL);
2403
	if (!rp) {
2404 2405 2406 2407 2408
		err = -ENOMEM;
		goto unlock;
	}

	i = 0;
2409
	list_for_each_entry(c, &hdev->conn_hash.list, list) {
2410 2411
		if (!test_bit(HCI_CONN_MGMT_CONNECTED, &c->flags))
			continue;
2412
		bacpy(&rp->addr[i].bdaddr, &c->dst);
2413
		rp->addr[i].type = link_to_bdaddr(c->type, c->dst_type);
2414
		if (c->type == SCO_LINK || c->type == ESCO_LINK)
2415 2416 2417 2418
			continue;
		i++;
	}

2419
	rp->conn_count = cpu_to_le16(i);
2420

2421 2422
	/* Recalculate length in case of filtered SCO connections, etc */
	rp_len = sizeof(*rp) + (i * sizeof(struct mgmt_addr_info));
2423

2424 2425
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONNECTIONS, 0, rp,
				rp_len);
2426

2427
	kfree(rp);
2428 2429

unlock:
2430
	hci_dev_unlock(hdev);
2431 2432 2433
	return err;
}

2434
static int send_pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
2435
				   struct mgmt_cp_pin_code_neg_reply *cp)
2436
{
2437
	struct mgmt_pending_cmd *cmd;
2438 2439
	int err;

2440
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_NEG_REPLY, hdev, cp,
2441
			       sizeof(*cp));
2442 2443 2444
	if (!cmd)
		return -ENOMEM;

2445
	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_NEG_REPLY,
2446
			   sizeof(cp->addr.bdaddr), &cp->addr.bdaddr);
2447 2448 2449 2450 2451 2452
	if (err < 0)
		mgmt_pending_remove(cmd);

	return err;
}

2453
static int pin_code_reply(struct sock *sk, struct hci_dev *hdev, void *data,
2454
			  u16 len)
2455
{
2456
	struct hci_conn *conn;
2457
	struct mgmt_cp_pin_code_reply *cp = data;
2458
	struct hci_cp_pin_code_reply reply;
2459
	struct mgmt_pending_cmd *cmd;
2460 2461 2462 2463
	int err;

	BT_DBG("");

2464
	hci_dev_lock(hdev);
2465

2466
	if (!hdev_is_powered(hdev)) {
2467 2468
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
				      MGMT_STATUS_NOT_POWERED);
2469 2470 2471
		goto failed;
	}

2472
	conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &cp->addr.bdaddr);
2473
	if (!conn) {
2474 2475
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
				      MGMT_STATUS_NOT_CONNECTED);
2476 2477 2478 2479
		goto failed;
	}

	if (conn->pending_sec_level == BT_SECURITY_HIGH && cp->pin_len != 16) {
2480 2481 2482
		struct mgmt_cp_pin_code_neg_reply ncp;

		memcpy(&ncp.addr, &cp->addr, sizeof(ncp.addr));
2483 2484 2485

		BT_ERR("PIN code is not 16 bytes long");

2486
		err = send_pin_code_neg_reply(sk, hdev, &ncp);
2487
		if (err >= 0)
2488 2489
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_PIN_CODE_REPLY,
					      MGMT_STATUS_INVALID_PARAMS);
2490 2491 2492 2493

		goto failed;
	}

2494
	cmd = mgmt_pending_add(sk, MGMT_OP_PIN_CODE_REPLY, hdev, data, len);
2495 2496
	if (!cmd) {
		err = -ENOMEM;
2497
		goto failed;
2498
	}
2499

2500 2501
	cmd->cmd_complete = addr_cmd_complete;

2502
	bacpy(&reply.bdaddr, &cp->addr.bdaddr);
2503
	reply.pin_len = cp->pin_len;
2504
	memcpy(reply.pin_code, cp->pin_code, sizeof(reply.pin_code));
2505 2506 2507

	err = hci_send_cmd(hdev, HCI_OP_PIN_CODE_REPLY, sizeof(reply), &reply);
	if (err < 0)
2508
		mgmt_pending_remove(cmd);
2509 2510

failed:
2511
	hci_dev_unlock(hdev);
2512 2513 2514
	return err;
}

2515 2516
static int set_io_capability(struct sock *sk, struct hci_dev *hdev, void *data,
			     u16 len)
2517
{
2518
	struct mgmt_cp_set_io_capability *cp = data;
2519 2520 2521

	BT_DBG("");

2522
	if (cp->io_capability > SMP_IO_KEYBOARD_DISPLAY)
2523 2524
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY,
					 MGMT_STATUS_INVALID_PARAMS, NULL, 0);
2525

2526
	hci_dev_lock(hdev);
2527 2528 2529 2530

	hdev->io_capability = cp->io_capability;

	BT_DBG("%s IO capability set to 0x%02x", hdev->name,
2531
	       hdev->io_capability);
2532

2533
	hci_dev_unlock(hdev);
2534

2535 2536
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_IO_CAPABILITY, 0,
				 NULL, 0);
2537 2538
}

2539
static struct mgmt_pending_cmd *find_pairing(struct hci_conn *conn)
2540 2541
{
	struct hci_dev *hdev = conn->hdev;
2542
	struct mgmt_pending_cmd *cmd;
2543

2544
	list_for_each_entry(cmd, &hdev->mgmt_pending, list) {
2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556
		if (cmd->opcode != MGMT_OP_PAIR_DEVICE)
			continue;

		if (cmd->user_data != conn)
			continue;

		return cmd;
	}

	return NULL;
}

2557
static int pairing_complete(struct mgmt_pending_cmd *cmd, u8 status)
2558 2559 2560
{
	struct mgmt_rp_pair_device rp;
	struct hci_conn *conn = cmd->user_data;
2561
	int err;
2562

2563 2564
	bacpy(&rp.addr.bdaddr, &conn->dst);
	rp.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
2565

2566 2567
	err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_PAIR_DEVICE,
				status, &rp, sizeof(rp));
2568 2569 2570 2571 2572 2573

	/* So we don't get further callbacks for this connection */
	conn->connect_cfm_cb = NULL;
	conn->security_cfm_cb = NULL;
	conn->disconn_cfm_cb = NULL;

2574
	hci_conn_drop(conn);
2575 2576 2577 2578 2579

	/* The device is paired so there is no need to remove
	 * its connection parameters anymore.
	 */
	clear_bit(HCI_CONN_PARAM_REMOVAL_PEND, &conn->flags);
2580 2581

	hci_conn_put(conn);
2582 2583

	return err;
2584 2585
}

2586 2587 2588
void mgmt_smp_complete(struct hci_conn *conn, bool complete)
{
	u8 status = complete ? MGMT_STATUS_SUCCESS : MGMT_STATUS_FAILED;
2589
	struct mgmt_pending_cmd *cmd;
2590 2591

	cmd = find_pairing(conn);
2592
	if (cmd) {
2593
		cmd->cmd_complete(cmd, status);
2594 2595
		mgmt_pending_remove(cmd);
	}
2596 2597
}

2598 2599
static void pairing_complete_cb(struct hci_conn *conn, u8 status)
{
2600
	struct mgmt_pending_cmd *cmd;
2601 2602 2603 2604

	BT_DBG("status %u", status);

	cmd = find_pairing(conn);
2605
	if (!cmd) {
2606
		BT_DBG("Unable to find a pending command");
2607 2608 2609 2610 2611
		return;
	}

	cmd->cmd_complete(cmd, mgmt_status(status));
	mgmt_pending_remove(cmd);
2612 2613
}

2614
static void le_pairing_complete_cb(struct hci_conn *conn, u8 status)
2615
{
2616
	struct mgmt_pending_cmd *cmd;
2617 2618 2619 2620 2621 2622 2623

	BT_DBG("status %u", status);

	if (!status)
		return;

	cmd = find_pairing(conn);
2624
	if (!cmd) {
2625
		BT_DBG("Unable to find a pending command");
2626 2627 2628 2629 2630
		return;
	}

	cmd->cmd_complete(cmd, mgmt_status(status));
	mgmt_pending_remove(cmd);
2631 2632
}

2633
static int pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
2634
		       u16 len)
2635
{
2636
	struct mgmt_cp_pair_device *cp = data;
2637
	struct mgmt_rp_pair_device rp;
2638
	struct mgmt_pending_cmd *cmd;
2639 2640 2641 2642 2643 2644
	u8 sec_level, auth_type;
	struct hci_conn *conn;
	int err;

	BT_DBG("");

2645 2646 2647 2648
	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

2649
	if (!bdaddr_type_is_valid(cp->addr.type))
2650 2651 2652
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2653

2654
	if (cp->io_cap > SMP_IO_KEYBOARD_DISPLAY)
2655 2656 2657
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
2658

2659
	hci_dev_lock(hdev);
2660

2661
	if (!hdev_is_powered(hdev)) {
2662 2663 2664
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
2665 2666 2667
		goto unlock;
	}

2668 2669 2670 2671 2672 2673 2674
	if (hci_bdaddr_is_paired(hdev, &cp->addr.bdaddr, cp->addr.type)) {
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_ALREADY_PAIRED, &rp,
					sizeof(rp));
		goto unlock;
	}

2675
	sec_level = BT_SECURITY_MEDIUM;
2676
	auth_type = HCI_AT_DEDICATED_BONDING;
2677

2678
	if (cp->addr.type == BDADDR_BREDR) {
2679 2680
		conn = hci_connect_acl(hdev, &cp->addr.bdaddr, sec_level,
				       auth_type);
2681
	} else {
2682
		u8 addr_type = le_addr_type(cp->addr.type);
2683
		struct hci_conn_params *p;
2684

2685 2686 2687 2688 2689 2690 2691 2692 2693
		/* When pairing a new device, it is expected to remember
		 * this device for future connections. Adding the connection
		 * parameter information ahead of time allows tracking
		 * of the slave preferred values and will speed up any
		 * further connection establishment.
		 *
		 * If connection parameters already exist, then they
		 * will be kept and this function does nothing.
		 */
2694 2695 2696 2697
		p = hci_conn_params_add(hdev, &cp->addr.bdaddr, addr_type);

		if (p->auto_connect == HCI_AUTO_CONN_EXPLICIT)
			p->auto_connect = HCI_AUTO_CONN_DISABLED;
2698

2699 2700
		conn = hci_connect_le_scan(hdev, &cp->addr.bdaddr,
					   addr_type, sec_level,
2701
					   HCI_LE_CONN_TIMEOUT);
2702
	}
2703

2704
	if (IS_ERR(conn)) {
2705 2706 2707 2708
		int status;

		if (PTR_ERR(conn) == -EBUSY)
			status = MGMT_STATUS_BUSY;
2709 2710 2711 2712
		else if (PTR_ERR(conn) == -EOPNOTSUPP)
			status = MGMT_STATUS_NOT_SUPPORTED;
		else if (PTR_ERR(conn) == -ECONNREFUSED)
			status = MGMT_STATUS_REJECTED;
2713 2714 2715
		else
			status = MGMT_STATUS_CONNECT_FAILED;

2716 2717
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					status, &rp, sizeof(rp));
2718 2719 2720 2721
		goto unlock;
	}

	if (conn->connect_cfm_cb) {
2722
		hci_conn_drop(conn);
2723 2724
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_PAIR_DEVICE,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
2725 2726 2727
		goto unlock;
	}

2728
	cmd = mgmt_pending_add(sk, MGMT_OP_PAIR_DEVICE, hdev, data, len);
2729 2730
	if (!cmd) {
		err = -ENOMEM;
2731
		hci_conn_drop(conn);
2732 2733 2734
		goto unlock;
	}

2735 2736
	cmd->cmd_complete = pairing_complete;

2737
	/* For LE, just connecting isn't a proof that the pairing finished */
2738
	if (cp->addr.type == BDADDR_BREDR) {
2739
		conn->connect_cfm_cb = pairing_complete_cb;
2740 2741 2742 2743 2744 2745 2746
		conn->security_cfm_cb = pairing_complete_cb;
		conn->disconn_cfm_cb = pairing_complete_cb;
	} else {
		conn->connect_cfm_cb = le_pairing_complete_cb;
		conn->security_cfm_cb = le_pairing_complete_cb;
		conn->disconn_cfm_cb = le_pairing_complete_cb;
	}
2747

2748
	conn->io_capability = cp->io_cap;
2749
	cmd->user_data = hci_conn_get(conn);
2750

2751
	if ((conn->state == BT_CONNECTED || conn->state == BT_CONFIG) &&
2752 2753 2754 2755
	    hci_conn_security(conn, sec_level, auth_type, true)) {
		cmd->cmd_complete(cmd, 0);
		mgmt_pending_remove(cmd);
	}
2756 2757 2758 2759

	err = 0;

unlock:
2760
	hci_dev_unlock(hdev);
2761 2762 2763
	return err;
}

2764 2765
static int cancel_pair_device(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2766
{
2767
	struct mgmt_addr_info *addr = data;
2768
	struct mgmt_pending_cmd *cmd;
2769 2770 2771 2772 2773 2774 2775
	struct hci_conn *conn;
	int err;

	BT_DBG("");

	hci_dev_lock(hdev);

2776
	if (!hdev_is_powered(hdev)) {
2777 2778
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_NOT_POWERED);
2779 2780 2781
		goto unlock;
	}

2782
	cmd = pending_find(MGMT_OP_PAIR_DEVICE, hdev);
2783
	if (!cmd) {
2784 2785
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_INVALID_PARAMS);
2786 2787 2788 2789 2790 2791
		goto unlock;
	}

	conn = cmd->user_data;

	if (bacmp(&addr->bdaddr, &conn->dst) != 0) {
2792 2793
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE,
				      MGMT_STATUS_INVALID_PARAMS);
2794 2795 2796
		goto unlock;
	}

2797 2798
	cmd->cmd_complete(cmd, MGMT_STATUS_CANCELLED);
	mgmt_pending_remove(cmd);
2799

2800 2801
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CANCEL_PAIR_DEVICE, 0,
				addr, sizeof(*addr));
2802 2803 2804 2805 2806
unlock:
	hci_dev_unlock(hdev);
	return err;
}

2807
static int user_pairing_resp(struct sock *sk, struct hci_dev *hdev,
2808
			     struct mgmt_addr_info *addr, u16 mgmt_op,
2809
			     u16 hci_op, __le32 passkey)
2810
{
2811
	struct mgmt_pending_cmd *cmd;
2812
	struct hci_conn *conn;
2813 2814
	int err;

2815
	hci_dev_lock(hdev);
2816

2817
	if (!hdev_is_powered(hdev)) {
2818 2819 2820
		err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
					MGMT_STATUS_NOT_POWERED, addr,
					sizeof(*addr));
2821
		goto done;
2822 2823
	}

2824 2825
	if (addr->type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK, &addr->bdaddr);
2826
	else
2827 2828
		conn = hci_conn_hash_lookup_le(hdev, &addr->bdaddr,
					       le_addr_type(addr->type));
2829 2830

	if (!conn) {
2831 2832 2833
		err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
					MGMT_STATUS_NOT_CONNECTED, addr,
					sizeof(*addr));
2834 2835
		goto done;
	}
2836

2837
	if (addr->type == BDADDR_LE_PUBLIC || addr->type == BDADDR_LE_RANDOM) {
2838 2839
		err = smp_user_confirm_reply(conn, mgmt_op, passkey);
		if (!err)
2840 2841 2842
			err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
						MGMT_STATUS_SUCCESS, addr,
						sizeof(*addr));
2843
		else
2844 2845 2846
			err = mgmt_cmd_complete(sk, hdev->id, mgmt_op,
						MGMT_STATUS_FAILED, addr,
						sizeof(*addr));
2847 2848 2849 2850

		goto done;
	}

2851
	cmd = mgmt_pending_add(sk, mgmt_op, hdev, addr, sizeof(*addr));
2852 2853
	if (!cmd) {
		err = -ENOMEM;
2854
		goto done;
2855 2856
	}

2857 2858
	cmd->cmd_complete = addr_cmd_complete;

2859
	/* Continue with pairing via HCI */
2860 2861 2862
	if (hci_op == HCI_OP_USER_PASSKEY_REPLY) {
		struct hci_cp_user_passkey_reply cp;

2863
		bacpy(&cp.bdaddr, &addr->bdaddr);
2864 2865 2866
		cp.passkey = passkey;
		err = hci_send_cmd(hdev, hci_op, sizeof(cp), &cp);
	} else
2867 2868
		err = hci_send_cmd(hdev, hci_op, sizeof(addr->bdaddr),
				   &addr->bdaddr);
2869

2870 2871
	if (err < 0)
		mgmt_pending_remove(cmd);
2872

2873
done:
2874
	hci_dev_unlock(hdev);
2875 2876 2877
	return err;
}

2878 2879 2880 2881 2882 2883 2884
static int pin_code_neg_reply(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_pin_code_neg_reply *cp = data;

	BT_DBG("");

2885
	return user_pairing_resp(sk, hdev, &cp->addr,
2886 2887 2888 2889
				MGMT_OP_PIN_CODE_NEG_REPLY,
				HCI_OP_PIN_CODE_NEG_REPLY, 0);
}

2890 2891
static int user_confirm_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2892
{
2893
	struct mgmt_cp_user_confirm_reply *cp = data;
2894 2895 2896 2897

	BT_DBG("");

	if (len != sizeof(*cp))
2898 2899
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_USER_CONFIRM_REPLY,
				       MGMT_STATUS_INVALID_PARAMS);
2900

2901
	return user_pairing_resp(sk, hdev, &cp->addr,
2902 2903
				 MGMT_OP_USER_CONFIRM_REPLY,
				 HCI_OP_USER_CONFIRM_REPLY, 0);
2904 2905
}

2906
static int user_confirm_neg_reply(struct sock *sk, struct hci_dev *hdev,
2907
				  void *data, u16 len)
2908
{
2909
	struct mgmt_cp_user_confirm_neg_reply *cp = data;
2910 2911 2912

	BT_DBG("");

2913
	return user_pairing_resp(sk, hdev, &cp->addr,
2914 2915
				 MGMT_OP_USER_CONFIRM_NEG_REPLY,
				 HCI_OP_USER_CONFIRM_NEG_REPLY, 0);
2916 2917
}

2918 2919
static int user_passkey_reply(struct sock *sk, struct hci_dev *hdev, void *data,
			      u16 len)
2920
{
2921
	struct mgmt_cp_user_passkey_reply *cp = data;
2922 2923 2924

	BT_DBG("");

2925
	return user_pairing_resp(sk, hdev, &cp->addr,
2926 2927
				 MGMT_OP_USER_PASSKEY_REPLY,
				 HCI_OP_USER_PASSKEY_REPLY, cp->passkey);
2928 2929
}

2930
static int user_passkey_neg_reply(struct sock *sk, struct hci_dev *hdev,
2931
				  void *data, u16 len)
2932
{
2933
	struct mgmt_cp_user_passkey_neg_reply *cp = data;
2934 2935 2936

	BT_DBG("");

2937
	return user_pairing_resp(sk, hdev, &cp->addr,
2938 2939
				 MGMT_OP_USER_PASSKEY_NEG_REPLY,
				 HCI_OP_USER_PASSKEY_NEG_REPLY, 0);
2940 2941
}

2942
static void set_name_complete(struct hci_dev *hdev, u8 status, u16 opcode)
2943 2944
{
	struct mgmt_cp_set_local_name *cp;
2945
	struct mgmt_pending_cmd *cmd;
2946 2947 2948 2949 2950

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

2951
	cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
2952 2953 2954 2955 2956 2957
	if (!cmd)
		goto unlock;

	cp = cmd->param;

	if (status)
2958 2959
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME,
			        mgmt_status(status));
2960
	else
2961 2962
		mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
				  cp, sizeof(*cp));
2963 2964 2965 2966 2967 2968 2969

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

2970
static int set_local_name(struct sock *sk, struct hci_dev *hdev, void *data,
2971
			  u16 len)
2972
{
2973
	struct mgmt_cp_set_local_name *cp = data;
2974
	struct mgmt_pending_cmd *cmd;
2975
	struct hci_request req;
2976 2977 2978 2979
	int err;

	BT_DBG("");

2980
	hci_dev_lock(hdev);
2981

2982 2983 2984 2985 2986 2987
	/* If the old values are the same as the new ones just return a
	 * direct command complete event.
	 */
	if (!memcmp(hdev->dev_name, cp->name, sizeof(hdev->dev_name)) &&
	    !memcmp(hdev->short_name, cp->short_name,
		    sizeof(hdev->short_name))) {
2988 2989
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
					data, len);
2990 2991 2992
		goto failed;
	}

2993
	memcpy(hdev->short_name, cp->short_name, sizeof(hdev->short_name));
2994

2995
	if (!hdev_is_powered(hdev)) {
2996
		memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));
2997

2998 2999
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_LOCAL_NAME, 0,
					data, len);
3000 3001 3002
		if (err < 0)
			goto failed;

3003 3004
		err = mgmt_generic_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev,
					 data, len, sk);
3005

3006 3007 3008
		goto failed;
	}

3009
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_LOCAL_NAME, hdev, data, len);
3010 3011 3012 3013 3014
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3015 3016
	memcpy(hdev->dev_name, cp->name, sizeof(hdev->dev_name));

3017
	hci_req_init(&req, hdev);
3018 3019

	if (lmp_bredr_capable(hdev)) {
3020
		__hci_req_update_name(&req);
3021
		__hci_req_update_eir(&req);
3022 3023
	}

3024 3025 3026
	/* The name is stored in the scan response data and so
	 * no need to udpate the advertising data here.
	 */
3027
	if (lmp_le_capable(hdev))
3028
		__hci_req_update_scan_rsp_data(&req, hdev->cur_adv_instance);
3029

3030
	err = hci_req_run(&req, set_name_complete);
3031 3032 3033 3034
	if (err < 0)
		mgmt_pending_remove(cmd);

failed:
3035
	hci_dev_unlock(hdev);
3036 3037 3038
	return err;
}

3039 3040 3041 3042 3043 3044 3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094 3095 3096 3097
static void read_local_oob_data_complete(struct hci_dev *hdev, u8 status,
				         u16 opcode, struct sk_buff *skb)
{
	struct mgmt_rp_read_local_oob_data mgmt_rp;
	size_t rp_size = sizeof(mgmt_rp);
	struct mgmt_pending_cmd *cmd;

	BT_DBG("%s status %u", hdev->name, status);

	cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev);
	if (!cmd)
		return;

	if (status || !skb) {
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				status ? mgmt_status(status) : MGMT_STATUS_FAILED);
		goto remove;
	}

	memset(&mgmt_rp, 0, sizeof(mgmt_rp));

	if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) {
		struct hci_rp_read_local_oob_data *rp = (void *) skb->data;

		if (skb->len < sizeof(*rp)) {
			mgmt_cmd_status(cmd->sk, hdev->id,
					MGMT_OP_READ_LOCAL_OOB_DATA,
					MGMT_STATUS_FAILED);
			goto remove;
		}

		memcpy(mgmt_rp.hash192, rp->hash, sizeof(rp->hash));
		memcpy(mgmt_rp.rand192, rp->rand, sizeof(rp->rand));

		rp_size -= sizeof(mgmt_rp.hash256) + sizeof(mgmt_rp.rand256);
	} else {
		struct hci_rp_read_local_oob_ext_data *rp = (void *) skb->data;

		if (skb->len < sizeof(*rp)) {
			mgmt_cmd_status(cmd->sk, hdev->id,
					MGMT_OP_READ_LOCAL_OOB_DATA,
					MGMT_STATUS_FAILED);
			goto remove;
		}

		memcpy(mgmt_rp.hash192, rp->hash192, sizeof(rp->hash192));
		memcpy(mgmt_rp.rand192, rp->rand192, sizeof(rp->rand192));

		memcpy(mgmt_rp.hash256, rp->hash256, sizeof(rp->hash256));
		memcpy(mgmt_rp.rand256, rp->rand256, sizeof(rp->rand256));
	}

	mgmt_cmd_complete(cmd->sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
			  MGMT_STATUS_SUCCESS, &mgmt_rp, rp_size);

remove:
	mgmt_pending_remove(cmd);
}

3098
static int read_local_oob_data(struct sock *sk, struct hci_dev *hdev,
3099
			       void *data, u16 data_len)
3100
{
3101
	struct mgmt_pending_cmd *cmd;
3102
	struct hci_request req;
3103 3104
	int err;

3105
	BT_DBG("%s", hdev->name);
3106

3107
	hci_dev_lock(hdev);
3108

3109
	if (!hdev_is_powered(hdev)) {
3110 3111
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_NOT_POWERED);
3112 3113 3114
		goto unlock;
	}

3115
	if (!lmp_ssp_capable(hdev)) {
3116 3117
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_NOT_SUPPORTED);
3118 3119 3120
		goto unlock;
	}

3121
	if (pending_find(MGMT_OP_READ_LOCAL_OOB_DATA, hdev)) {
3122 3123
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_DATA,
				      MGMT_STATUS_BUSY);
3124 3125 3126
		goto unlock;
	}

3127
	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_DATA, hdev, NULL, 0);
3128 3129 3130 3131 3132
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

3133 3134
	hci_req_init(&req, hdev);

3135
	if (bredr_sc_enabled(hdev))
3136
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL);
3137
	else
3138
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);
3139

3140
	err = hci_req_run_skb(&req, read_local_oob_data_complete);
3141 3142 3143 3144
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
3145
	hci_dev_unlock(hdev);
3146 3147 3148
	return err;
}

3149
static int add_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3150
			       void *data, u16 len)
3151
{
3152
	struct mgmt_addr_info *addr = data;
3153 3154
	int err;

3155
	BT_DBG("%s ", hdev->name);
3156

3157
	if (!bdaddr_type_is_valid(addr->type))
3158 3159 3160 3161
		return mgmt_cmd_complete(sk, hdev->id,
					 MGMT_OP_ADD_REMOTE_OOB_DATA,
					 MGMT_STATUS_INVALID_PARAMS,
					 addr, sizeof(*addr));
3162

3163
	hci_dev_lock(hdev);
3164

3165 3166 3167
	if (len == MGMT_ADD_REMOTE_OOB_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_data *cp = data;
		u8 status;
3168

3169
		if (cp->addr.type != BDADDR_BREDR) {
3170 3171 3172 3173
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_ADD_REMOTE_OOB_DATA,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
3174 3175 3176
			goto unlock;
		}

3177
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
3178 3179
					      cp->addr.type, cp->hash,
					      cp->rand, NULL, NULL);
3180 3181 3182 3183 3184
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

3185 3186 3187
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_ADD_REMOTE_OOB_DATA, status,
					&cp->addr, sizeof(cp->addr));
3188 3189
	} else if (len == MGMT_ADD_REMOTE_OOB_EXT_DATA_SIZE) {
		struct mgmt_cp_add_remote_oob_ext_data *cp = data;
3190
		u8 *rand192, *hash192, *rand256, *hash256;
3191 3192
		u8 status;

3193
		if (bdaddr_type_is_le(cp->addr.type)) {
3194 3195 3196 3197 3198
			/* Enforce zero-valued 192-bit parameters as
			 * long as legacy SMP OOB isn't implemented.
			 */
			if (memcmp(cp->rand192, ZERO_KEY, 16) ||
			    memcmp(cp->hash192, ZERO_KEY, 16)) {
3199 3200 3201 3202
				err = mgmt_cmd_complete(sk, hdev->id,
							MGMT_OP_ADD_REMOTE_OOB_DATA,
							MGMT_STATUS_INVALID_PARAMS,
							addr, sizeof(*addr));
3203 3204 3205
				goto unlock;
			}

3206 3207 3208
			rand192 = NULL;
			hash192 = NULL;
		} else {
3209 3210 3211 3212 3213 3214 3215 3216 3217 3218 3219 3220 3221 3222 3223 3224 3225 3226 3227 3228 3229 3230 3231
			/* In case one of the P-192 values is set to zero,
			 * then just disable OOB data for P-192.
			 */
			if (!memcmp(cp->rand192, ZERO_KEY, 16) ||
			    !memcmp(cp->hash192, ZERO_KEY, 16)) {
				rand192 = NULL;
				hash192 = NULL;
			} else {
				rand192 = cp->rand192;
				hash192 = cp->hash192;
			}
		}

		/* In case one of the P-256 values is set to zero, then just
		 * disable OOB data for P-256.
		 */
		if (!memcmp(cp->rand256, ZERO_KEY, 16) ||
		    !memcmp(cp->hash256, ZERO_KEY, 16)) {
			rand256 = NULL;
			hash256 = NULL;
		} else {
			rand256 = cp->rand256;
			hash256 = cp->hash256;
3232 3233
		}

3234
		err = hci_add_remote_oob_data(hdev, &cp->addr.bdaddr,
3235
					      cp->addr.type, hash192, rand192,
3236
					      hash256, rand256);
3237 3238 3239 3240 3241
		if (err < 0)
			status = MGMT_STATUS_FAILED;
		else
			status = MGMT_STATUS_SUCCESS;

3242 3243 3244
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_ADD_REMOTE_OOB_DATA,
					status, &cp->addr, sizeof(cp->addr));
3245 3246
	} else {
		BT_ERR("add_remote_oob_data: invalid length of %u bytes", len);
3247 3248
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_REMOTE_OOB_DATA,
				      MGMT_STATUS_INVALID_PARAMS);
3249
	}
3250

3251
unlock:
3252
	hci_dev_unlock(hdev);
3253 3254 3255
	return err;
}

3256
static int remove_remote_oob_data(struct sock *sk, struct hci_dev *hdev,
3257
				  void *data, u16 len)
3258
{
3259
	struct mgmt_cp_remove_remote_oob_data *cp = data;
3260
	u8 status;
3261 3262
	int err;

3263
	BT_DBG("%s", hdev->name);
3264

3265
	if (cp->addr.type != BDADDR_BREDR)
3266 3267 3268 3269
		return mgmt_cmd_complete(sk, hdev->id,
					 MGMT_OP_REMOVE_REMOTE_OOB_DATA,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3270

3271
	hci_dev_lock(hdev);
3272

3273 3274 3275 3276 3277 3278
	if (!bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
		hci_remote_oob_data_clear(hdev);
		status = MGMT_STATUS_SUCCESS;
		goto done;
	}

3279
	err = hci_remove_remote_oob_data(hdev, &cp->addr.bdaddr, cp->addr.type);
3280
	if (err < 0)
3281
		status = MGMT_STATUS_INVALID_PARAMS;
3282
	else
3283
		status = MGMT_STATUS_SUCCESS;
3284

3285
done:
3286 3287
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_REMOTE_OOB_DATA,
				status, &cp->addr, sizeof(cp->addr));
3288

3289
	hci_dev_unlock(hdev);
3290 3291 3292
	return err;
}

3293
void mgmt_start_discovery_complete(struct hci_dev *hdev, u8 status)
3294
{
3295
	struct mgmt_pending_cmd *cmd;
3296

3297 3298
	BT_DBG("status %d", status);

3299
	hci_dev_lock(hdev);
3300

3301
	cmd = pending_find(MGMT_OP_START_DISCOVERY, hdev);
3302
	if (!cmd)
3303
		cmd = pending_find(MGMT_OP_START_SERVICE_DISCOVERY, hdev);
3304

3305 3306 3307
	if (!cmd)
		cmd = pending_find(MGMT_OP_START_LIMITED_DISCOVERY, hdev);

3308
	if (cmd) {
3309
		cmd->cmd_complete(cmd, mgmt_status(status));
3310 3311
		mgmt_pending_remove(cmd);
	}
3312

3313
	hci_dev_unlock(hdev);
3314 3315
}

3316 3317 3318 3319 3320 3321 3322 3323 3324 3325 3326 3327 3328 3329 3330 3331 3332 3333 3334 3335 3336 3337 3338 3339 3340 3341 3342
static bool discovery_type_is_valid(struct hci_dev *hdev, uint8_t type,
				    uint8_t *mgmt_status)
{
	switch (type) {
	case DISCOV_TYPE_LE:
		*mgmt_status = mgmt_le_support(hdev);
		if (*mgmt_status)
			return false;
		break;
	case DISCOV_TYPE_INTERLEAVED:
		*mgmt_status = mgmt_le_support(hdev);
		if (*mgmt_status)
			return false;
		/* Intentional fall-through */
	case DISCOV_TYPE_BREDR:
		*mgmt_status = mgmt_bredr_support(hdev);
		if (*mgmt_status)
			return false;
		break;
	default:
		*mgmt_status = MGMT_STATUS_INVALID_PARAMS;
		return false;
	}

	return true;
}

3343 3344
static int start_discovery_internal(struct sock *sk, struct hci_dev *hdev,
				    u16 op, void *data, u16 len)
3345
{
3346
	struct mgmt_cp_start_discovery *cp = data;
3347
	struct mgmt_pending_cmd *cmd;
3348
	u8 status;
3349 3350
	int err;

3351
	BT_DBG("%s", hdev->name);
3352

3353
	hci_dev_lock(hdev);
3354

3355
	if (!hdev_is_powered(hdev)) {
3356
		err = mgmt_cmd_complete(sk, hdev->id, op,
3357 3358
					MGMT_STATUS_NOT_POWERED,
					&cp->type, sizeof(cp->type));
3359 3360 3361
		goto failed;
	}

3362
	if (hdev->discovery.state != DISCOVERY_STOPPED ||
3363
	    hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) {
3364 3365
		err = mgmt_cmd_complete(sk, hdev->id, op, MGMT_STATUS_BUSY,
					&cp->type, sizeof(cp->type));
3366 3367 3368
		goto failed;
	}

3369
	if (!discovery_type_is_valid(hdev, cp->type, &status)) {
3370 3371
		err = mgmt_cmd_complete(sk, hdev->id, op, status,
					&cp->type, sizeof(cp->type));
3372 3373 3374
		goto failed;
	}

3375 3376 3377 3378 3379
	/* Clear the discovery filter first to free any previously
	 * allocated memory for the UUID list.
	 */
	hci_discovery_filter_clear(hdev);

A
Andre Guedes 已提交
3380
	hdev->discovery.type = cp->type;
3381
	hdev->discovery.report_invalid_rssi = false;
3382 3383 3384 3385
	if (op == MGMT_OP_START_LIMITED_DISCOVERY)
		hdev->discovery.limited = true;
	else
		hdev->discovery.limited = false;
A
Andre Guedes 已提交
3386

3387
	cmd = mgmt_pending_add(sk, op, hdev, data, len);
3388 3389
	if (!cmd) {
		err = -ENOMEM;
3390
		goto failed;
3391
	}
3392

3393
	cmd->cmd_complete = generic_cmd_complete;
3394

3395
	hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3396 3397
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3398

3399
failed:
3400
	hci_dev_unlock(hdev);
3401 3402
	return err;
}
3403

3404 3405 3406 3407 3408 3409 3410 3411 3412 3413 3414 3415 3416 3417 3418
static int start_discovery(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	return start_discovery_internal(sk, hdev, MGMT_OP_START_DISCOVERY,
					data, len);
}

static int start_limited_discovery(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 len)
{
	return start_discovery_internal(sk, hdev,
					MGMT_OP_START_LIMITED_DISCOVERY,
					data, len);
}

3419 3420
static int service_discovery_cmd_complete(struct mgmt_pending_cmd *cmd,
					  u8 status)
3421
{
3422 3423
	return mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status,
				 cmd->param, 1);
3424
}
3425

3426 3427 3428 3429
static int start_service_discovery(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 len)
{
	struct mgmt_cp_start_service_discovery *cp = data;
3430
	struct mgmt_pending_cmd *cmd;
3431 3432 3433 3434
	const u16 max_uuid_count = ((U16_MAX - sizeof(*cp)) / 16);
	u16 uuid_count, expected_len;
	u8 status;
	int err;
3435

3436
	BT_DBG("%s", hdev->name);
3437

3438
	hci_dev_lock(hdev);
3439

3440
	if (!hdev_is_powered(hdev)) {
3441 3442 3443 3444
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_NOT_POWERED,
					&cp->type, sizeof(cp->type));
3445 3446
		goto failed;
	}
3447

3448
	if (hdev->discovery.state != DISCOVERY_STOPPED ||
3449
	    hci_dev_test_flag(hdev, HCI_PERIODIC_INQ)) {
3450 3451 3452 3453
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_BUSY, &cp->type,
					sizeof(cp->type));
3454 3455
		goto failed;
	}
3456

3457 3458 3459 3460
	uuid_count = __le16_to_cpu(cp->uuid_count);
	if (uuid_count > max_uuid_count) {
		BT_ERR("service_discovery: too big uuid_count value %u",
		       uuid_count);
3461 3462 3463 3464
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS, &cp->type,
					sizeof(cp->type));
3465 3466 3467 3468 3469 3470 3471
		goto failed;
	}

	expected_len = sizeof(*cp) + uuid_count * 16;
	if (expected_len != len) {
		BT_ERR("service_discovery: expected %u bytes, got %u bytes",
		       expected_len, len);
3472 3473 3474 3475
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS, &cp->type,
					sizeof(cp->type));
3476 3477 3478
		goto failed;
	}

3479 3480 3481 3482 3483 3484 3485
	if (!discovery_type_is_valid(hdev, cp->type, &status)) {
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_START_SERVICE_DISCOVERY,
					status, &cp->type, sizeof(cp->type));
		goto failed;
	}

3486
	cmd = mgmt_pending_add(sk, MGMT_OP_START_SERVICE_DISCOVERY,
3487
			       hdev, data, len);
3488 3489 3490 3491 3492
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

3493 3494
	cmd->cmd_complete = service_discovery_cmd_complete;

3495 3496 3497 3498 3499
	/* Clear the discovery filter first to free any previously
	 * allocated memory for the UUID list.
	 */
	hci_discovery_filter_clear(hdev);

3500
	hdev->discovery.result_filtering = true;
3501 3502 3503 3504 3505 3506 3507 3508
	hdev->discovery.type = cp->type;
	hdev->discovery.rssi = cp->rssi;
	hdev->discovery.uuid_count = uuid_count;

	if (uuid_count > 0) {
		hdev->discovery.uuids = kmemdup(cp->uuids, uuid_count * 16,
						GFP_KERNEL);
		if (!hdev->discovery.uuids) {
3509 3510 3511 3512
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_START_SERVICE_DISCOVERY,
						MGMT_STATUS_FAILED,
						&cp->type, sizeof(cp->type));
3513 3514 3515
			mgmt_pending_remove(cmd);
			goto failed;
		}
3516
	}
3517

3518
	hci_discovery_set_state(hdev, DISCOVERY_STARTING);
3519 3520
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3521 3522

failed:
3523
	hci_dev_unlock(hdev);
3524 3525 3526
	return err;
}

3527
void mgmt_stop_discovery_complete(struct hci_dev *hdev, u8 status)
3528
{
3529
	struct mgmt_pending_cmd *cmd;
3530

3531 3532 3533 3534
	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

3535
	cmd = pending_find(MGMT_OP_STOP_DISCOVERY, hdev);
3536
	if (cmd) {
3537
		cmd->cmd_complete(cmd, mgmt_status(status));
3538
		mgmt_pending_remove(cmd);
3539 3540 3541 3542 3543
	}

	hci_dev_unlock(hdev);
}

3544
static int stop_discovery(struct sock *sk, struct hci_dev *hdev, void *data,
3545
			  u16 len)
3546
{
3547
	struct mgmt_cp_stop_discovery *mgmt_cp = data;
3548
	struct mgmt_pending_cmd *cmd;
3549 3550
	int err;

3551
	BT_DBG("%s", hdev->name);
3552

3553
	hci_dev_lock(hdev);
3554

3555
	if (!hci_discovery_active(hdev)) {
3556 3557 3558
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
					MGMT_STATUS_REJECTED, &mgmt_cp->type,
					sizeof(mgmt_cp->type));
3559 3560 3561 3562
		goto unlock;
	}

	if (hdev->discovery.type != mgmt_cp->type) {
3563 3564 3565
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_STOP_DISCOVERY,
					MGMT_STATUS_INVALID_PARAMS,
					&mgmt_cp->type, sizeof(mgmt_cp->type));
3566
		goto unlock;
3567 3568
	}

3569
	cmd = mgmt_pending_add(sk, MGMT_OP_STOP_DISCOVERY, hdev, data, len);
3570 3571
	if (!cmd) {
		err = -ENOMEM;
3572 3573 3574
		goto unlock;
	}

3575 3576
	cmd->cmd_complete = generic_cmd_complete;

3577 3578 3579
	hci_discovery_set_state(hdev, DISCOVERY_STOPPING);
	queue_work(hdev->req_workqueue, &hdev->discov_update);
	err = 0;
3580

3581
unlock:
3582
	hci_dev_unlock(hdev);
3583 3584 3585
	return err;
}

3586
static int confirm_name(struct sock *sk, struct hci_dev *hdev, void *data,
3587
			u16 len)
3588
{
3589
	struct mgmt_cp_confirm_name *cp = data;
3590 3591 3592
	struct inquiry_entry *e;
	int err;

3593
	BT_DBG("%s", hdev->name);
3594 3595 3596

	hci_dev_lock(hdev);

3597
	if (!hci_discovery_active(hdev)) {
3598 3599 3600
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
					MGMT_STATUS_FAILED, &cp->addr,
					sizeof(cp->addr));
3601 3602 3603
		goto failed;
	}

3604
	e = hci_inquiry_cache_lookup_unknown(hdev, &cp->addr.bdaddr);
3605
	if (!e) {
3606 3607 3608
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME,
					MGMT_STATUS_INVALID_PARAMS, &cp->addr,
					sizeof(cp->addr));
3609 3610 3611 3612 3613 3614 3615 3616
		goto failed;
	}

	if (cp->name_known) {
		e->name_state = NAME_KNOWN;
		list_del(&e->list);
	} else {
		e->name_state = NAME_NEEDED;
3617
		hci_inquiry_cache_update_resolve(hdev, e);
3618 3619
	}

3620 3621
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_CONFIRM_NAME, 0,
				&cp->addr, sizeof(cp->addr));
3622 3623 3624 3625 3626 3627

failed:
	hci_dev_unlock(hdev);
	return err;
}

3628
static int block_device(struct sock *sk, struct hci_dev *hdev, void *data,
3629
			u16 len)
3630
{
3631
	struct mgmt_cp_block_device *cp = data;
3632
	u8 status;
3633 3634
	int err;

3635
	BT_DBG("%s", hdev->name);
3636

3637
	if (!bdaddr_type_is_valid(cp->addr.type))
3638 3639 3640
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3641

3642
	hci_dev_lock(hdev);
3643

3644 3645
	err = hci_bdaddr_list_add(&hdev->blacklist, &cp->addr.bdaddr,
				  cp->addr.type);
3646
	if (err < 0) {
3647
		status = MGMT_STATUS_FAILED;
3648 3649 3650 3651 3652 3653
		goto done;
	}

	mgmt_event(MGMT_EV_DEVICE_BLOCKED, hdev, &cp->addr, sizeof(cp->addr),
		   sk);
	status = MGMT_STATUS_SUCCESS;
3654

3655
done:
3656 3657
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_BLOCK_DEVICE, status,
				&cp->addr, sizeof(cp->addr));
3658

3659
	hci_dev_unlock(hdev);
3660 3661 3662 3663

	return err;
}

3664
static int unblock_device(struct sock *sk, struct hci_dev *hdev, void *data,
3665
			  u16 len)
3666
{
3667
	struct mgmt_cp_unblock_device *cp = data;
3668
	u8 status;
3669 3670
	int err;

3671
	BT_DBG("%s", hdev->name);
3672

3673
	if (!bdaddr_type_is_valid(cp->addr.type))
3674 3675 3676
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
3677

3678
	hci_dev_lock(hdev);
3679

3680 3681
	err = hci_bdaddr_list_del(&hdev->blacklist, &cp->addr.bdaddr,
				  cp->addr.type);
3682
	if (err < 0) {
3683
		status = MGMT_STATUS_INVALID_PARAMS;
3684 3685 3686 3687 3688 3689
		goto done;
	}

	mgmt_event(MGMT_EV_DEVICE_UNBLOCKED, hdev, &cp->addr, sizeof(cp->addr),
		   sk);
	status = MGMT_STATUS_SUCCESS;
3690

3691
done:
3692 3693
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_UNBLOCK_DEVICE, status,
				&cp->addr, sizeof(cp->addr));
3694

3695
	hci_dev_unlock(hdev);
3696 3697 3698 3699

	return err;
}

3700 3701 3702 3703
static int set_device_id(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_set_device_id *cp = data;
3704
	struct hci_request req;
3705
	int err;
3706
	__u16 source;
3707 3708 3709

	BT_DBG("%s", hdev->name);

3710 3711 3712
	source = __le16_to_cpu(cp->source);

	if (source > 0x0002)
3713 3714
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEVICE_ID,
				       MGMT_STATUS_INVALID_PARAMS);
3715

3716 3717
	hci_dev_lock(hdev);

3718
	hdev->devid_source = source;
3719 3720 3721 3722
	hdev->devid_vendor = __le16_to_cpu(cp->vendor);
	hdev->devid_product = __le16_to_cpu(cp->product);
	hdev->devid_version = __le16_to_cpu(cp->version);

3723 3724
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_DEVICE_ID, 0,
				NULL, 0);
3725

3726
	hci_req_init(&req, hdev);
3727
	__hci_req_update_eir(&req);
3728
	hci_req_run(&req, NULL);
3729 3730 3731 3732 3733 3734

	hci_dev_unlock(hdev);

	return err;
}

3735 3736 3737 3738 3739 3740
static void enable_advertising_instance(struct hci_dev *hdev, u8 status,
					u16 opcode)
{
	BT_DBG("status %d", status);
}

3741 3742
static void set_advertising_complete(struct hci_dev *hdev, u8 status,
				     u16 opcode)
3743 3744
{
	struct cmd_lookup match = { NULL, hdev };
3745
	struct hci_request req;
3746 3747 3748
	u8 instance;
	struct adv_info *adv_instance;
	int err;
3749

3750 3751
	hci_dev_lock(hdev);

3752 3753 3754 3755 3756
	if (status) {
		u8 mgmt_err = mgmt_status(status);

		mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev,
				     cmd_status_rsp, &mgmt_err);
3757
		goto unlock;
3758 3759
	}

3760
	if (hci_dev_test_flag(hdev, HCI_LE_ADV))
3761
		hci_dev_set_flag(hdev, HCI_ADVERTISING);
3762
	else
3763
		hci_dev_clear_flag(hdev, HCI_ADVERTISING);
3764

3765 3766 3767 3768 3769 3770 3771
	mgmt_pending_foreach(MGMT_OP_SET_ADVERTISING, hdev, settings_rsp,
			     &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);
3772

3773
	/* If "Set Advertising" was just disabled and instance advertising was
3774
	 * set up earlier, then re-enable multi-instance advertising.
3775 3776
	 */
	if (hci_dev_test_flag(hdev, HCI_ADVERTISING) ||
3777
	    list_empty(&hdev->adv_instances))
3778 3779
		goto unlock;

3780 3781 3782 3783 3784 3785 3786 3787 3788 3789
	instance = hdev->cur_adv_instance;
	if (!instance) {
		adv_instance = list_first_entry_or_null(&hdev->adv_instances,
							struct adv_info, list);
		if (!adv_instance)
			goto unlock;

		instance = adv_instance->instance;
	}

3790 3791
	hci_req_init(&req, hdev);

3792
	err = __hci_req_schedule_adv_instance(&req, instance, true);
3793 3794 3795

	if (!err)
		err = hci_req_run(&req, enable_advertising_instance);
3796

3797
	if (err)
3798 3799
		BT_ERR("Failed to re-configure advertising");

3800 3801
unlock:
	hci_dev_unlock(hdev);
3802 3803
}

3804 3805
static int set_advertising(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
3806 3807
{
	struct mgmt_mode *cp = data;
3808
	struct mgmt_pending_cmd *cmd;
3809
	struct hci_request req;
3810
	u8 val, status;
3811 3812 3813 3814
	int err;

	BT_DBG("request for %s", hdev->name);

3815 3816
	status = mgmt_le_support(hdev);
	if (status)
3817 3818
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				       status);
3819

3820
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
3821 3822
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);
3823 3824 3825 3826 3827

	hci_dev_lock(hdev);

	val = !!cp->val;

3828 3829 3830 3831 3832
	/* The following conditions are ones which mean that we should
	 * not do any HCI communication but directly send a mgmt
	 * response to user space (after toggling the flag if
	 * necessary).
	 */
3833
	if (!hdev_is_powered(hdev) ||
3834 3835
	    (val == hci_dev_test_flag(hdev, HCI_ADVERTISING) &&
	     (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_ADVERTISING_CONNECTABLE)) ||
3836
	    hci_conn_num(hdev, LE_LINK) > 0 ||
3837
	    (hci_dev_test_flag(hdev, HCI_LE_SCAN) &&
3838
	     hdev->le_scan_type == LE_SCAN_ACTIVE)) {
3839
		bool changed;
3840

3841
		if (cp->val) {
3842
			hdev->cur_adv_instance = 0x00;
3843
			changed = !hci_dev_test_and_set_flag(hdev, HCI_ADVERTISING);
3844
			if (cp->val == 0x02)
3845
				hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3846
			else
3847
				hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3848
		} else {
3849
			changed = hci_dev_test_and_clear_flag(hdev, HCI_ADVERTISING);
3850
			hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3851 3852 3853 3854 3855 3856 3857 3858 3859 3860 3861 3862
		}

		err = send_settings_rsp(sk, MGMT_OP_SET_ADVERTISING, hdev);
		if (err < 0)
			goto unlock;

		if (changed)
			err = new_settings(hdev, sk);

		goto unlock;
	}

3863 3864
	if (pending_find(MGMT_OP_SET_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_SET_LE, hdev)) {
3865 3866
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_ADVERTISING,
				      MGMT_STATUS_BUSY);
3867 3868 3869 3870 3871 3872 3873 3874 3875 3876 3877
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_ADVERTISING, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

3878
	if (cp->val == 0x02)
3879
		hci_dev_set_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3880
	else
3881
		hci_dev_clear_flag(hdev, HCI_ADVERTISING_CONNECTABLE);
3882

3883 3884
	cancel_adv_timeout(hdev);

3885
	if (val) {
3886 3887 3888 3889
		/* Switch to instance "0" for the Set Advertising setting.
		 * We cannot use update_[adv|scan_rsp]_data() here as the
		 * HCI_ADVERTISING flag is not yet set.
		 */
3890
		hdev->cur_adv_instance = 0x00;
3891 3892 3893
		__hci_req_update_adv_data(&req, 0x00);
		__hci_req_update_scan_rsp_data(&req, 0x00);
		__hci_req_enable_advertising(&req);
3894
	} else {
3895
		__hci_req_disable_advertising(&req);
3896
	}
3897 3898 3899 3900 3901 3902 3903 3904 3905 3906

	err = hci_req_run(&req, set_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

3907 3908 3909 3910 3911 3912 3913 3914
static int set_static_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_static_address *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

3915
	if (!lmp_le_capable(hdev))
3916 3917
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				       MGMT_STATUS_NOT_SUPPORTED);
3918 3919

	if (hdev_is_powered(hdev))
3920 3921
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_STATIC_ADDRESS,
				       MGMT_STATUS_REJECTED);
3922 3923 3924

	if (bacmp(&cp->bdaddr, BDADDR_ANY)) {
		if (!bacmp(&cp->bdaddr, BDADDR_NONE))
3925 3926 3927
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_SET_STATIC_ADDRESS,
					       MGMT_STATUS_INVALID_PARAMS);
3928 3929 3930

		/* Two most significant bits shall be set */
		if ((cp->bdaddr.b[5] & 0xc0) != 0xc0)
3931 3932 3933
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_SET_STATIC_ADDRESS,
					       MGMT_STATUS_INVALID_PARAMS);
3934 3935 3936 3937 3938 3939
	}

	hci_dev_lock(hdev);

	bacpy(&hdev->static_addr, &cp->bdaddr);

3940 3941 3942 3943 3944
	err = send_settings_rsp(sk, MGMT_OP_SET_STATIC_ADDRESS, hdev);
	if (err < 0)
		goto unlock;

	err = new_settings(hdev, sk);
3945

3946
unlock:
3947 3948 3949 3950
	hci_dev_unlock(hdev);
	return err;
}

3951 3952 3953 3954 3955 3956 3957 3958 3959 3960
static int set_scan_params(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_cp_set_scan_params *cp = data;
	__u16 interval, window;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
3961 3962
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_NOT_SUPPORTED);
3963 3964 3965 3966

	interval = __le16_to_cpu(cp->interval);

	if (interval < 0x0004 || interval > 0x4000)
3967 3968
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
3969 3970 3971 3972

	window = __le16_to_cpu(cp->window);

	if (window < 0x0004 || window > 0x4000)
3973 3974
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
3975

3976
	if (window > interval)
3977 3978
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS,
				       MGMT_STATUS_INVALID_PARAMS);
3979

3980 3981 3982 3983 3984
	hci_dev_lock(hdev);

	hdev->le_scan_interval = interval;
	hdev->le_scan_window = window;

3985 3986
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_SET_SCAN_PARAMS, 0,
				NULL, 0);
3987

3988 3989 3990
	/* If background scan is running, restart it so new parameters are
	 * loaded.
	 */
3991
	if (hci_dev_test_flag(hdev, HCI_LE_SCAN) &&
3992 3993 3994 3995 3996 3997 3998 3999 4000 4001 4002
	    hdev->discovery.state == DISCOVERY_STOPPED) {
		struct hci_request req;

		hci_req_init(&req, hdev);

		hci_req_add_le_scan_disable(&req);
		hci_req_add_le_passive_scan(&req);

		hci_req_run(&req, NULL);
	}

4003 4004 4005 4006 4007
	hci_dev_unlock(hdev);

	return err;
}

4008 4009
static void fast_connectable_complete(struct hci_dev *hdev, u8 status,
				      u16 opcode)
4010
{
4011
	struct mgmt_pending_cmd *cmd;
4012 4013 4014 4015 4016

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

4017
	cmd = pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev);
4018 4019 4020 4021
	if (!cmd)
		goto unlock;

	if (status) {
4022 4023
		mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
			        mgmt_status(status));
4024
	} else {
4025 4026 4027
		struct mgmt_mode *cp = cmd->param;

		if (cp->val)
4028
			hci_dev_set_flag(hdev, HCI_FAST_CONNECTABLE);
4029
		else
4030
			hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE);
4031

4032 4033 4034 4035 4036 4037 4038 4039 4040 4041
		send_settings_rsp(cmd->sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

4042
static int set_fast_connectable(struct sock *sk, struct hci_dev *hdev,
4043
				void *data, u16 len)
4044
{
4045
	struct mgmt_mode *cp = data;
4046
	struct mgmt_pending_cmd *cmd;
4047
	struct hci_request req;
4048 4049
	int err;

4050
	BT_DBG("%s", hdev->name);
4051

4052
	if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) ||
4053
	    hdev->hci_ver < BLUETOOTH_VER_1_2)
4054 4055
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				       MGMT_STATUS_NOT_SUPPORTED);
4056

4057
	if (cp->val != 0x00 && cp->val != 0x01)
4058 4059
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				       MGMT_STATUS_INVALID_PARAMS);
4060

4061 4062
	hci_dev_lock(hdev);

4063
	if (pending_find(MGMT_OP_SET_FAST_CONNECTABLE, hdev)) {
4064 4065
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				      MGMT_STATUS_BUSY);
4066 4067 4068
		goto unlock;
	}

4069
	if (!!cp->val == hci_dev_test_flag(hdev, HCI_FAST_CONNECTABLE)) {
4070 4071 4072 4073 4074
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		goto unlock;
	}

4075
	if (!hdev_is_powered(hdev)) {
4076
		hci_dev_change_flag(hdev, HCI_FAST_CONNECTABLE);
4077 4078 4079 4080 4081 4082
		err = send_settings_rsp(sk, MGMT_OP_SET_FAST_CONNECTABLE,
					hdev);
		new_settings(hdev, sk);
		goto unlock;
	}

4083 4084 4085 4086 4087
	cmd = mgmt_pending_add(sk, MGMT_OP_SET_FAST_CONNECTABLE, hdev,
			       data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
4088 4089
	}

4090 4091
	hci_req_init(&req, hdev);

4092
	__hci_req_write_fast_connectable(&req, cp->val);
4093 4094

	err = hci_req_run(&req, fast_connectable_complete);
4095
	if (err < 0) {
4096 4097
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_FAST_CONNECTABLE,
				      MGMT_STATUS_FAILED);
4098
		mgmt_pending_remove(cmd);
4099 4100
	}

4101
unlock:
4102
	hci_dev_unlock(hdev);
4103

4104 4105 4106
	return err;
}

4107
static void set_bredr_complete(struct hci_dev *hdev, u8 status, u16 opcode)
4108
{
4109
	struct mgmt_pending_cmd *cmd;
4110 4111 4112 4113 4114

	BT_DBG("status 0x%02x", status);

	hci_dev_lock(hdev);

4115
	cmd = pending_find(MGMT_OP_SET_BREDR, hdev);
4116 4117 4118 4119 4120 4121 4122 4123 4124
	if (!cmd)
		goto unlock;

	if (status) {
		u8 mgmt_err = mgmt_status(status);

		/* We need to restore the flag if related HCI commands
		 * failed.
		 */
4125
		hci_dev_clear_flag(hdev, HCI_BREDR_ENABLED);
4126

4127
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode, mgmt_err);
4128 4129 4130 4131 4132 4133 4134 4135 4136 4137 4138 4139 4140 4141
	} else {
		send_settings_rsp(cmd->sk, MGMT_OP_SET_BREDR, hdev);
		new_settings(hdev, cmd->sk);
	}

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int set_bredr(struct sock *sk, struct hci_dev *hdev, void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4142
	struct mgmt_pending_cmd *cmd;
4143 4144 4145 4146 4147 4148
	struct hci_request req;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_bredr_capable(hdev) || !lmp_le_capable(hdev))
4149 4150
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_NOT_SUPPORTED);
4151

4152
	if (!hci_dev_test_flag(hdev, HCI_LE_ENABLED))
4153 4154
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_REJECTED);
4155 4156

	if (cp->val != 0x00 && cp->val != 0x01)
4157 4158
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				       MGMT_STATUS_INVALID_PARAMS);
4159 4160 4161

	hci_dev_lock(hdev);

4162
	if (cp->val == hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
4163 4164 4165 4166 4167 4168
		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		goto unlock;
	}

	if (!hdev_is_powered(hdev)) {
		if (!cp->val) {
4169 4170 4171 4172 4173
			hci_dev_clear_flag(hdev, HCI_DISCOVERABLE);
			hci_dev_clear_flag(hdev, HCI_SSP_ENABLED);
			hci_dev_clear_flag(hdev, HCI_LINK_SECURITY);
			hci_dev_clear_flag(hdev, HCI_FAST_CONNECTABLE);
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
4174 4175
		}

4176
		hci_dev_change_flag(hdev, HCI_BREDR_ENABLED);
4177 4178 4179 4180 4181 4182 4183 4184 4185 4186 4187

		err = send_settings_rsp(sk, MGMT_OP_SET_BREDR, hdev);
		if (err < 0)
			goto unlock;

		err = new_settings(hdev, sk);
		goto unlock;
	}

	/* Reject disabling when powered on */
	if (!cp->val) {
4188 4189
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				      MGMT_STATUS_REJECTED);
4190
		goto unlock;
4191 4192 4193 4194 4195 4196 4197 4198
	} else {
		/* When configuring a dual-mode controller to operate
		 * with LE only and using a static address, then switching
		 * BR/EDR back on is not allowed.
		 *
		 * Dual-mode controllers shall operate with the public
		 * address as its identity address for BR/EDR and LE. So
		 * reject the attempt to create an invalid configuration.
4199 4200 4201 4202 4203 4204
		 *
		 * The same restrictions applies when secure connections
		 * has been enabled. For BR/EDR this is a controller feature
		 * while for LE it is a host stack feature. This means that
		 * switching BR/EDR back on when secure connections has been
		 * enabled is not a supported transaction.
4205
		 */
4206
		if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
4207
		    (bacmp(&hdev->static_addr, BDADDR_ANY) ||
4208
		     hci_dev_test_flag(hdev, HCI_SC_ENABLED))) {
4209 4210
			err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
					      MGMT_STATUS_REJECTED);
4211 4212
			goto unlock;
		}
4213 4214
	}

4215
	if (pending_find(MGMT_OP_SET_BREDR, hdev)) {
4216 4217
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_BREDR,
				      MGMT_STATUS_BUSY);
4218 4219 4220 4221 4222 4223 4224 4225 4226
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_BREDR, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

4227 4228
	/* We need to flip the bit already here so that
	 * hci_req_update_adv_data generates the correct flags.
4229
	 */
4230
	hci_dev_set_flag(hdev, HCI_BREDR_ENABLED);
4231 4232

	hci_req_init(&req, hdev);
4233

4234
	__hci_req_write_fast_connectable(&req, false);
4235
	__hci_req_update_scan(&req);
4236

4237 4238 4239
	/* Since only the advertising data flags will change, there
	 * is no need to update the scan response data.
	 */
4240
	__hci_req_update_adv_data(&req, hdev->cur_adv_instance);
4241

4242 4243 4244 4245 4246 4247 4248 4249 4250
	err = hci_req_run(&req, set_bredr_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4251 4252
static void sc_enable_complete(struct hci_dev *hdev, u8 status, u16 opcode)
{
4253
	struct mgmt_pending_cmd *cmd;
4254 4255 4256 4257 4258 4259
	struct mgmt_mode *cp;

	BT_DBG("%s status %u", hdev->name, status);

	hci_dev_lock(hdev);

4260
	cmd = pending_find(MGMT_OP_SET_SECURE_CONN, hdev);
4261 4262 4263 4264
	if (!cmd)
		goto unlock;

	if (status) {
4265 4266
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode,
			        mgmt_status(status));
4267 4268 4269 4270 4271 4272 4273
		goto remove;
	}

	cp = cmd->param;

	switch (cp->val) {
	case 0x00:
4274 4275
		hci_dev_clear_flag(hdev, HCI_SC_ENABLED);
		hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4276 4277
		break;
	case 0x01:
4278
		hci_dev_set_flag(hdev, HCI_SC_ENABLED);
4279
		hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4280 4281
		break;
	case 0x02:
4282 4283
		hci_dev_set_flag(hdev, HCI_SC_ENABLED);
		hci_dev_set_flag(hdev, HCI_SC_ONLY);
4284 4285 4286 4287 4288 4289 4290 4291 4292 4293 4294 4295
		break;
	}

	send_settings_rsp(cmd->sk, MGMT_OP_SET_SECURE_CONN, hdev);
	new_settings(hdev, cmd->sk);

remove:
	mgmt_pending_remove(cmd);
unlock:
	hci_dev_unlock(hdev);
}

4296 4297 4298 4299
static int set_secure_conn(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4300
	struct mgmt_pending_cmd *cmd;
4301
	struct hci_request req;
4302
	u8 val;
4303 4304 4305 4306
	int err;

	BT_DBG("request for %s", hdev->name);

4307
	if (!lmp_sc_capable(hdev) &&
4308
	    !hci_dev_test_flag(hdev, HCI_LE_ENABLED))
4309 4310
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				       MGMT_STATUS_NOT_SUPPORTED);
4311

4312
	if (hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
4313
	    lmp_sc_capable(hdev) &&
4314
	    !hci_dev_test_flag(hdev, HCI_SSP_ENABLED))
4315 4316
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				       MGMT_STATUS_REJECTED);
4317

4318
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4319
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
4320 4321 4322 4323
				  MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

4324
	if (!hdev_is_powered(hdev) || !lmp_sc_capable(hdev) ||
4325
	    !hci_dev_test_flag(hdev, HCI_BREDR_ENABLED)) {
4326 4327
		bool changed;

4328
		if (cp->val) {
4329 4330
			changed = !hci_dev_test_and_set_flag(hdev,
							     HCI_SC_ENABLED);
4331
			if (cp->val == 0x02)
4332
				hci_dev_set_flag(hdev, HCI_SC_ONLY);
4333
			else
4334
				hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4335
		} else {
4336 4337
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_SC_ENABLED);
4338
			hci_dev_clear_flag(hdev, HCI_SC_ONLY);
4339
		}
4340 4341 4342 4343 4344 4345 4346 4347 4348 4349 4350

		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		if (err < 0)
			goto failed;

		if (changed)
			err = new_settings(hdev, sk);

		goto failed;
	}

4351
	if (pending_find(MGMT_OP_SET_SECURE_CONN, hdev)) {
4352 4353
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_SECURE_CONN,
				      MGMT_STATUS_BUSY);
4354 4355 4356
		goto failed;
	}

4357 4358
	val = !!cp->val;

4359 4360
	if (val == hci_dev_test_flag(hdev, HCI_SC_ENABLED) &&
	    (cp->val == 0x02) == hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
4361 4362 4363 4364 4365 4366 4367 4368 4369 4370
		err = send_settings_rsp(sk, MGMT_OP_SET_SECURE_CONN, hdev);
		goto failed;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_SET_SECURE_CONN, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto failed;
	}

4371 4372 4373
	hci_req_init(&req, hdev);
	hci_req_add(&req, HCI_OP_WRITE_SC_SUPPORT, 1, &val);
	err = hci_req_run(&req, sc_enable_complete);
4374 4375 4376 4377 4378 4379 4380 4381 4382 4383
	if (err < 0) {
		mgmt_pending_remove(cmd);
		goto failed;
	}

failed:
	hci_dev_unlock(hdev);
	return err;
}

4384 4385 4386 4387
static int set_debug_keys(struct sock *sk, struct hci_dev *hdev,
			  void *data, u16 len)
{
	struct mgmt_mode *cp = data;
4388
	bool changed, use_changed;
4389 4390 4391 4392
	int err;

	BT_DBG("request for %s", hdev->name);

4393
	if (cp->val != 0x00 && cp->val != 0x01 && cp->val != 0x02)
4394 4395
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_DEBUG_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4396 4397 4398 4399

	hci_dev_lock(hdev);

	if (cp->val)
4400
		changed = !hci_dev_test_and_set_flag(hdev, HCI_KEEP_DEBUG_KEYS);
4401
	else
4402 4403
		changed = hci_dev_test_and_clear_flag(hdev,
						      HCI_KEEP_DEBUG_KEYS);
4404

4405
	if (cp->val == 0x02)
4406 4407
		use_changed = !hci_dev_test_and_set_flag(hdev,
							 HCI_USE_DEBUG_KEYS);
4408
	else
4409 4410
		use_changed = hci_dev_test_and_clear_flag(hdev,
							  HCI_USE_DEBUG_KEYS);
4411 4412

	if (hdev_is_powered(hdev) && use_changed &&
4413
	    hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
4414 4415 4416 4417 4418
		u8 mode = (cp->val == 0x02) ? 0x01 : 0x00;
		hci_send_cmd(hdev, HCI_OP_WRITE_SSP_DEBUG_MODE,
			     sizeof(mode), &mode);
	}

4419 4420 4421 4422 4423 4424 4425 4426 4427 4428 4429 4430
	err = send_settings_rsp(sk, MGMT_OP_SET_DEBUG_KEYS, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4431 4432 4433 4434 4435 4436 4437 4438 4439 4440
static int set_privacy(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		       u16 len)
{
	struct mgmt_cp_set_privacy *cp = cp_data;
	bool changed;
	int err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4441 4442
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_NOT_SUPPORTED);
4443

4444
	if (cp->privacy != 0x00 && cp->privacy != 0x01 && cp->privacy != 0x02)
4445 4446
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_INVALID_PARAMS);
4447 4448

	if (hdev_is_powered(hdev))
4449 4450
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PRIVACY,
				       MGMT_STATUS_REJECTED);
4451 4452 4453

	hci_dev_lock(hdev);

4454 4455 4456
	/* If user space supports this command it is also expected to
	 * handle IRKs. Therefore, set the HCI_RPA_RESOLVING flag.
	 */
4457
	hci_dev_set_flag(hdev, HCI_RPA_RESOLVING);
4458

4459
	if (cp->privacy) {
4460
		changed = !hci_dev_test_and_set_flag(hdev, HCI_PRIVACY);
4461
		memcpy(hdev->irk, cp->irk, sizeof(hdev->irk));
4462
		hci_dev_set_flag(hdev, HCI_RPA_EXPIRED);
4463 4464 4465 4466
		if (cp->privacy == 0x02)
			hci_dev_set_flag(hdev, HCI_LIMITED_PRIVACY);
		else
			hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY);
4467
	} else {
4468
		changed = hci_dev_test_and_clear_flag(hdev, HCI_PRIVACY);
4469
		memset(hdev->irk, 0, sizeof(hdev->irk));
4470
		hci_dev_clear_flag(hdev, HCI_RPA_EXPIRED);
4471
		hci_dev_clear_flag(hdev, HCI_LIMITED_PRIVACY);
4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485
	}

	err = send_settings_rsp(sk, MGMT_OP_SET_PRIVACY, hdev);
	if (err < 0)
		goto unlock;

	if (changed)
		err = new_settings(hdev, sk);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499 4500 4501 4502 4503 4504 4505
static bool irk_is_valid(struct mgmt_irk_info *irk)
{
	switch (irk->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((irk->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
}

static int load_irks(struct sock *sk, struct hci_dev *hdev, void *cp_data,
		     u16 len)
{
	struct mgmt_cp_load_irks *cp = cp_data;
4506 4507
	const u16 max_irk_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_irk_info));
4508 4509 4510 4511 4512 4513
	u16 irk_count, expected_len;
	int i, err;

	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4514 4515
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_NOT_SUPPORTED);
4516 4517

	irk_count = __le16_to_cpu(cp->irk_count);
4518 4519
	if (irk_count > max_irk_count) {
		BT_ERR("load_irks: too big irk_count value %u", irk_count);
4520 4521
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_INVALID_PARAMS);
4522
	}
4523 4524 4525 4526

	expected_len = sizeof(*cp) + irk_count * sizeof(struct mgmt_irk_info);
	if (expected_len != len) {
		BT_ERR("load_irks: expected %u bytes, got %u bytes",
4527
		       expected_len, len);
4528 4529
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_IRKS,
				       MGMT_STATUS_INVALID_PARAMS);
4530 4531 4532 4533 4534 4535 4536 4537
	}

	BT_DBG("%s irk_count %u", hdev->name, irk_count);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *key = &cp->irks[i];

		if (!irk_is_valid(key))
4538 4539 4540
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_IRKS,
					       MGMT_STATUS_INVALID_PARAMS);
4541 4542 4543 4544 4545 4546 4547 4548 4549
	}

	hci_dev_lock(hdev);

	hci_smp_irks_clear(hdev);

	for (i = 0; i < irk_count; i++) {
		struct mgmt_irk_info *irk = &cp->irks[i];

4550 4551
		hci_add_irk(hdev, &irk->addr.bdaddr,
			    le_addr_type(irk->addr.type), irk->val,
4552 4553 4554
			    BDADDR_ANY);
	}

4555
	hci_dev_set_flag(hdev, HCI_RPA_RESOLVING);
4556

4557
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_IRKS, 0, NULL, 0);
4558 4559 4560 4561 4562 4563

	hci_dev_unlock(hdev);

	return err;
}

4564 4565 4566 4567
static bool ltk_is_valid(struct mgmt_ltk_info *key)
{
	if (key->master != 0x00 && key->master != 0x01)
		return false;
4568 4569 4570 4571 4572 4573 4574 4575 4576 4577 4578 4579 4580

	switch (key->addr.type) {
	case BDADDR_LE_PUBLIC:
		return true;

	case BDADDR_LE_RANDOM:
		/* Two most significant bits shall be set */
		if ((key->addr.bdaddr.b[5] & 0xc0) != 0xc0)
			return false;
		return true;
	}

	return false;
4581 4582
}

4583
static int load_long_term_keys(struct sock *sk, struct hci_dev *hdev,
4584
			       void *cp_data, u16 len)
4585 4586
{
	struct mgmt_cp_load_long_term_keys *cp = cp_data;
4587 4588
	const u16 max_key_count = ((U16_MAX - sizeof(*cp)) /
				   sizeof(struct mgmt_ltk_info));
4589
	u16 key_count, expected_len;
4590
	int i, err;
4591

4592 4593 4594
	BT_DBG("request for %s", hdev->name);

	if (!lmp_le_capable(hdev))
4595 4596
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_NOT_SUPPORTED);
4597

4598
	key_count = __le16_to_cpu(cp->key_count);
4599 4600
	if (key_count > max_key_count) {
		BT_ERR("load_ltks: too big key_count value %u", key_count);
4601 4602
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4603
	}
4604 4605 4606 4607 4608

	expected_len = sizeof(*cp) + key_count *
					sizeof(struct mgmt_ltk_info);
	if (expected_len != len) {
		BT_ERR("load_keys: expected %u bytes, got %u bytes",
4609
		       expected_len, len);
4610 4611
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS,
				       MGMT_STATUS_INVALID_PARAMS);
4612 4613
	}

4614
	BT_DBG("%s key_count %u", hdev->name, key_count);
4615

4616 4617 4618
	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];

4619
		if (!ltk_is_valid(key))
4620 4621 4622
			return mgmt_cmd_status(sk, hdev->id,
					       MGMT_OP_LOAD_LONG_TERM_KEYS,
					       MGMT_STATUS_INVALID_PARAMS);
4623 4624
	}

4625 4626 4627 4628 4629 4630
	hci_dev_lock(hdev);

	hci_smp_ltks_clear(hdev);

	for (i = 0; i < key_count; i++) {
		struct mgmt_ltk_info *key = &cp->keys[i];
4631
		u8 type, authenticated;
4632

4633 4634
		switch (key->type) {
		case MGMT_LTK_UNAUTHENTICATED:
4635
			authenticated = 0x00;
4636
			type = key->master ? SMP_LTK : SMP_LTK_SLAVE;
4637 4638
			break;
		case MGMT_LTK_AUTHENTICATED:
4639
			authenticated = 0x01;
4640 4641 4642 4643 4644
			type = key->master ? SMP_LTK : SMP_LTK_SLAVE;
			break;
		case MGMT_LTK_P256_UNAUTH:
			authenticated = 0x00;
			type = SMP_LTK_P256;
4645
			break;
4646 4647 4648
		case MGMT_LTK_P256_AUTH:
			authenticated = 0x01;
			type = SMP_LTK_P256;
4649
			break;
4650 4651 4652
		case MGMT_LTK_P256_DEBUG:
			authenticated = 0x00;
			type = SMP_LTK_P256_DEBUG;
4653 4654 4655
		default:
			continue;
		}
4656

4657 4658 4659
		hci_add_ltk(hdev, &key->addr.bdaddr,
			    le_addr_type(key->addr.type), type, authenticated,
			    key->val, key->enc_size, key->ediv, key->rand);
4660 4661
	}

4662
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_LONG_TERM_KEYS, 0,
4663 4664
			   NULL, 0);

4665 4666
	hci_dev_unlock(hdev);

4667
	return err;
4668 4669
}

4670
static int conn_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
4671 4672
{
	struct hci_conn *conn = cmd->user_data;
4673
	struct mgmt_rp_get_conn_info rp;
4674
	int err;
4675

4676
	memcpy(&rp.addr, cmd->param, sizeof(rp.addr));
4677

4678
	if (status == MGMT_STATUS_SUCCESS) {
4679
		rp.rssi = conn->rssi;
4680 4681 4682 4683 4684 4685
		rp.tx_power = conn->tx_power;
		rp.max_tx_power = conn->max_tx_power;
	} else {
		rp.rssi = HCI_RSSI_INVALID;
		rp.tx_power = HCI_TX_POWER_INVALID;
		rp.max_tx_power = HCI_TX_POWER_INVALID;
4686 4687
	}

4688 4689
	err = mgmt_cmd_complete(cmd->sk, cmd->index, MGMT_OP_GET_CONN_INFO,
				status, &rp, sizeof(rp));
4690 4691

	hci_conn_drop(conn);
4692
	hci_conn_put(conn);
4693 4694

	return err;
4695 4696
}

4697 4698
static void conn_info_refresh_complete(struct hci_dev *hdev, u8 hci_status,
				       u16 opcode)
4699 4700
{
	struct hci_cp_read_rssi *cp;
4701
	struct mgmt_pending_cmd *cmd;
4702 4703
	struct hci_conn *conn;
	u16 handle;
4704
	u8 status;
4705

4706
	BT_DBG("status 0x%02x", hci_status);
4707 4708 4709 4710 4711 4712 4713 4714 4715 4716 4717 4718 4719 4720 4721

	hci_dev_lock(hdev);

	/* Commands sent in request are either Read RSSI or Read Transmit Power
	 * Level so we check which one was last sent to retrieve connection
	 * handle.  Both commands have handle as first parameter so it's safe to
	 * cast data on the same command struct.
	 *
	 * First command sent is always Read RSSI and we fail only if it fails.
	 * In other case we simply override error to indicate success as we
	 * already remembered if TX power value is actually valid.
	 */
	cp = hci_sent_cmd_data(hdev, HCI_OP_READ_RSSI);
	if (!cp) {
		cp = hci_sent_cmd_data(hdev, HCI_OP_READ_TX_POWER);
4722 4723 4724
		status = MGMT_STATUS_SUCCESS;
	} else {
		status = mgmt_status(hci_status);
4725 4726 4727
	}

	if (!cp) {
4728
		BT_ERR("invalid sent_cmd in conn_info response");
4729 4730 4731 4732 4733 4734
		goto unlock;
	}

	handle = __le16_to_cpu(cp->handle);
	conn = hci_conn_hash_lookup_handle(hdev, handle);
	if (!conn) {
4735
		BT_ERR("unknown handle (%d) in conn_info response", handle);
4736 4737 4738
		goto unlock;
	}

4739
	cmd = pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn);
4740 4741
	if (!cmd)
		goto unlock;
4742

4743 4744
	cmd->cmd_complete(cmd, status);
	mgmt_pending_remove(cmd);
4745 4746 4747 4748 4749 4750 4751 4752 4753 4754 4755 4756 4757 4758 4759 4760 4761 4762 4763 4764 4765

unlock:
	hci_dev_unlock(hdev);
}

static int get_conn_info(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_get_conn_info *cp = data;
	struct mgmt_rp_get_conn_info rp;
	struct hci_conn *conn;
	unsigned long conn_info_age;
	int err = 0;

	BT_DBG("%s", hdev->name);

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (!bdaddr_type_is_valid(cp->addr.type))
4766 4767 4768
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
4769 4770 4771 4772

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
4773 4774 4775
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
4776 4777 4778 4779 4780 4781 4782 4783 4784 4785
		goto unlock;
	}

	if (cp->addr.type == BDADDR_BREDR)
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
	else
		conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, &cp->addr.bdaddr);

	if (!conn || conn->state != BT_CONNECTED) {
4786 4787 4788
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_NOT_CONNECTED, &rp,
					sizeof(rp));
4789 4790 4791
		goto unlock;
	}

4792
	if (pending_find_data(MGMT_OP_GET_CONN_INFO, hdev, conn)) {
4793 4794
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_BUSY, &rp, sizeof(rp));
4795 4796 4797
		goto unlock;
	}

4798 4799 4800 4801 4802 4803 4804 4805 4806 4807
	/* To avoid client trying to guess when to poll again for information we
	 * calculate conn info age as random value between min/max set in hdev.
	 */
	conn_info_age = hdev->conn_info_min_age +
			prandom_u32_max(hdev->conn_info_max_age -
					hdev->conn_info_min_age);

	/* Query controller to refresh cached values if they are too old or were
	 * never read.
	 */
4808 4809
	if (time_after(jiffies, conn->conn_info_timestamp +
		       msecs_to_jiffies(conn_info_age)) ||
4810 4811 4812 4813
	    !conn->conn_info_timestamp) {
		struct hci_request req;
		struct hci_cp_read_tx_power req_txp_cp;
		struct hci_cp_read_rssi req_rssi_cp;
4814
		struct mgmt_pending_cmd *cmd;
4815 4816 4817 4818 4819 4820

		hci_req_init(&req, hdev);
		req_rssi_cp.handle = cpu_to_le16(conn->handle);
		hci_req_add(&req, HCI_OP_READ_RSSI, sizeof(req_rssi_cp),
			    &req_rssi_cp);

4821 4822 4823 4824 4825 4826 4827 4828 4829 4830
		/* For LE links TX power does not change thus we don't need to
		 * query for it once value is known.
		 */
		if (!bdaddr_type_is_le(cp->addr.type) ||
		    conn->tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x00;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}
4831

4832 4833 4834 4835 4836 4837 4838 4839
		/* Max TX power needs to be read only once per connection */
		if (conn->max_tx_power == HCI_TX_POWER_INVALID) {
			req_txp_cp.handle = cpu_to_le16(conn->handle);
			req_txp_cp.type = 0x01;
			hci_req_add(&req, HCI_OP_READ_TX_POWER,
				    sizeof(req_txp_cp), &req_txp_cp);
		}

4840 4841 4842 4843 4844 4845 4846 4847 4848 4849 4850 4851
		err = hci_req_run(&req, conn_info_refresh_complete);
		if (err < 0)
			goto unlock;

		cmd = mgmt_pending_add(sk, MGMT_OP_GET_CONN_INFO, hdev,
				       data, len);
		if (!cmd) {
			err = -ENOMEM;
			goto unlock;
		}

		hci_conn_hold(conn);
4852
		cmd->user_data = hci_conn_get(conn);
4853
		cmd->cmd_complete = conn_info_cmd_complete;
4854 4855 4856 4857 4858 4859

		conn->conn_info_timestamp = jiffies;
	} else {
		/* Cache is valid, just reply with values cached in hci_conn */
		rp.rssi = conn->rssi;
		rp.tx_power = conn->tx_power;
4860
		rp.max_tx_power = conn->max_tx_power;
4861

4862 4863
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CONN_INFO,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
4864 4865 4866 4867 4868 4869 4870
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

4871
static int clock_info_cmd_complete(struct mgmt_pending_cmd *cmd, u8 status)
4872
{
4873
	struct hci_conn *conn = cmd->user_data;
4874
	struct mgmt_rp_get_clock_info rp;
4875
	struct hci_dev *hdev;
4876
	int err;
4877 4878 4879 4880 4881 4882 4883 4884 4885 4886 4887 4888 4889 4890 4891 4892 4893 4894 4895

	memset(&rp, 0, sizeof(rp));
	memcpy(&rp.addr, &cmd->param, sizeof(rp.addr));

	if (status)
		goto complete;

	hdev = hci_dev_get(cmd->index);
	if (hdev) {
		rp.local_clock = cpu_to_le32(hdev->clock);
		hci_dev_put(hdev);
	}

	if (conn) {
		rp.piconet_clock = cpu_to_le32(conn->clock);
		rp.accuracy = cpu_to_le16(conn->clock_accuracy);
	}

complete:
4896 4897
	err = mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, status, &rp,
				sizeof(rp));
4898 4899 4900 4901 4902

	if (conn) {
		hci_conn_drop(conn);
		hci_conn_put(conn);
	}
4903 4904

	return err;
4905 4906
}

4907
static void get_clock_info_complete(struct hci_dev *hdev, u8 status, u16 opcode)
4908
{
4909
	struct hci_cp_read_clock *hci_cp;
4910
	struct mgmt_pending_cmd *cmd;
4911 4912 4913 4914 4915 4916 4917 4918 4919 4920 4921 4922 4923 4924 4925 4926 4927
	struct hci_conn *conn;

	BT_DBG("%s status %u", hdev->name, status);

	hci_dev_lock(hdev);

	hci_cp = hci_sent_cmd_data(hdev, HCI_OP_READ_CLOCK);
	if (!hci_cp)
		goto unlock;

	if (hci_cp->which) {
		u16 handle = __le16_to_cpu(hci_cp->handle);
		conn = hci_conn_hash_lookup_handle(hdev, handle);
	} else {
		conn = NULL;
	}

4928
	cmd = pending_find_data(MGMT_OP_GET_CLOCK_INFO, hdev, conn);
4929 4930 4931
	if (!cmd)
		goto unlock;

4932
	cmd->cmd_complete(cmd, mgmt_status(status));
4933 4934 4935 4936 4937 4938 4939 4940 4941 4942 4943 4944
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int get_clock_info(struct sock *sk, struct hci_dev *hdev, void *data,
			 u16 len)
{
	struct mgmt_cp_get_clock_info *cp = data;
	struct mgmt_rp_get_clock_info rp;
	struct hci_cp_read_clock hci_cp;
4945
	struct mgmt_pending_cmd *cmd;
4946 4947 4948 4949 4950 4951 4952 4953 4954 4955 4956
	struct hci_request req;
	struct hci_conn *conn;
	int err;

	BT_DBG("%s", hdev->name);

	memset(&rp, 0, sizeof(rp));
	bacpy(&rp.addr.bdaddr, &cp->addr.bdaddr);
	rp.addr.type = cp->addr.type;

	if (cp->addr.type != BDADDR_BREDR)
4957 4958 4959
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO,
					 MGMT_STATUS_INVALID_PARAMS,
					 &rp, sizeof(rp));
4960 4961 4962 4963

	hci_dev_lock(hdev);

	if (!hdev_is_powered(hdev)) {
4964 4965 4966
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_CLOCK_INFO,
					MGMT_STATUS_NOT_POWERED, &rp,
					sizeof(rp));
4967 4968 4969 4970 4971 4972 4973
		goto unlock;
	}

	if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
		conn = hci_conn_hash_lookup_ba(hdev, ACL_LINK,
					       &cp->addr.bdaddr);
		if (!conn || conn->state != BT_CONNECTED) {
4974 4975 4976 4977
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_GET_CLOCK_INFO,
						MGMT_STATUS_NOT_CONNECTED,
						&rp, sizeof(rp));
4978 4979 4980 4981 4982 4983 4984 4985 4986 4987 4988 4989
			goto unlock;
		}
	} else {
		conn = NULL;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_GET_CLOCK_INFO, hdev, data, len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

4990 4991
	cmd->cmd_complete = clock_info_cmd_complete;

4992 4993 4994 4995 4996 4997 4998
	hci_req_init(&req, hdev);

	memset(&hci_cp, 0, sizeof(hci_cp));
	hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp);

	if (conn) {
		hci_conn_hold(conn);
4999
		cmd->user_data = hci_conn_get(conn);
5000 5001 5002 5003 5004 5005 5006 5007 5008 5009 5010 5011 5012 5013 5014

		hci_cp.handle = cpu_to_le16(conn->handle);
		hci_cp.which = 0x01; /* Piconet clock */
		hci_req_add(&req, HCI_OP_READ_CLOCK, sizeof(hci_cp), &hci_cp);
	}

	err = hci_req_run(&req, get_clock_info_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5015 5016 5017 5018 5019 5020 5021 5022 5023 5024 5025 5026 5027 5028 5029 5030 5031 5032
static bool is_connected(struct hci_dev *hdev, bdaddr_t *addr, u8 type)
{
	struct hci_conn *conn;

	conn = hci_conn_hash_lookup_ba(hdev, LE_LINK, addr);
	if (!conn)
		return false;

	if (conn->dst_type != type)
		return false;

	if (conn->state != BT_CONNECTED)
		return false;

	return true;
}

/* This function requires the caller holds hdev->lock */
5033
static int hci_conn_params_set(struct hci_dev *hdev, bdaddr_t *addr,
5034 5035 5036 5037 5038 5039 5040 5041 5042 5043 5044 5045 5046 5047 5048 5049
			       u8 addr_type, u8 auto_connect)
{
	struct hci_conn_params *params;

	params = hci_conn_params_add(hdev, addr, addr_type);
	if (!params)
		return -EIO;

	if (params->auto_connect == auto_connect)
		return 0;

	list_del_init(&params->action);

	switch (auto_connect) {
	case HCI_AUTO_CONN_DISABLED:
	case HCI_AUTO_CONN_LINK_LOSS:
5050 5051 5052 5053 5054
		/* If auto connect is being disabled when we're trying to
		 * connect to device, keep connecting.
		 */
		if (params->explicit_connect)
			list_add(&params->action, &hdev->pend_le_conns);
5055 5056
		break;
	case HCI_AUTO_CONN_REPORT:
5057 5058 5059 5060
		if (params->explicit_connect)
			list_add(&params->action, &hdev->pend_le_conns);
		else
			list_add(&params->action, &hdev->pend_le_reports);
5061 5062 5063
		break;
	case HCI_AUTO_CONN_DIRECT:
	case HCI_AUTO_CONN_ALWAYS:
5064
		if (!is_connected(hdev, addr, addr_type))
5065 5066 5067 5068 5069 5070 5071 5072 5073 5074 5075 5076
			list_add(&params->action, &hdev->pend_le_conns);
		break;
	}

	params->auto_connect = auto_connect;

	BT_DBG("addr %pMR (type %u) auto_connect %u", addr, addr_type,
	       auto_connect);

	return 0;
}

5077 5078 5079 5080 5081 5082 5083 5084 5085 5086 5087 5088
static void device_added(struct sock *sk, struct hci_dev *hdev,
			 bdaddr_t *bdaddr, u8 type, u8 action)
{
	struct mgmt_ev_device_added ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;
	ev.action = action;

	mgmt_event(MGMT_EV_DEVICE_ADDED, hdev, &ev, sizeof(ev), sk);
}

5089 5090 5091 5092 5093 5094 5095 5096 5097
static int add_device(struct sock *sk, struct hci_dev *hdev,
		      void *data, u16 len)
{
	struct mgmt_cp_add_device *cp = data;
	u8 auto_conn, addr_type;
	int err;

	BT_DBG("%s", hdev->name);

5098
	if (!bdaddr_type_is_valid(cp->addr.type) ||
5099
	    !bacmp(&cp->addr.bdaddr, BDADDR_ANY))
5100 5101 5102
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
5103

5104
	if (cp->action != 0x00 && cp->action != 0x01 && cp->action != 0x02)
5105 5106 5107
		return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					 MGMT_STATUS_INVALID_PARAMS,
					 &cp->addr, sizeof(cp->addr));
5108 5109 5110

	hci_dev_lock(hdev);

5111
	if (cp->addr.type == BDADDR_BREDR) {
5112
		/* Only incoming connections action is supported for now */
5113
		if (cp->action != 0x01) {
5114 5115 5116 5117
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_ADD_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5118 5119 5120 5121 5122 5123 5124
			goto unlock;
		}

		err = hci_bdaddr_list_add(&hdev->whitelist, &cp->addr.bdaddr,
					  cp->addr.type);
		if (err)
			goto unlock;
5125

5126
		hci_req_update_scan(hdev);
5127

5128 5129 5130
		goto added;
	}

5131
	addr_type = le_addr_type(cp->addr.type);
5132

5133
	if (cp->action == 0x02)
5134
		auto_conn = HCI_AUTO_CONN_ALWAYS;
5135 5136
	else if (cp->action == 0x01)
		auto_conn = HCI_AUTO_CONN_DIRECT;
5137
	else
5138
		auto_conn = HCI_AUTO_CONN_REPORT;
5139

5140 5141 5142 5143 5144 5145
	/* Kernel internally uses conn_params with resolvable private
	 * address, but Add Device allows only identity addresses.
	 * Make sure it is enforced before calling
	 * hci_conn_params_lookup.
	 */
	if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) {
5146 5147 5148
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					MGMT_STATUS_INVALID_PARAMS,
					&cp->addr, sizeof(cp->addr));
5149 5150 5151
		goto unlock;
	}

5152 5153 5154
	/* If the connection parameters don't exist for this device,
	 * they will be created and configured with defaults.
	 */
5155
	if (hci_conn_params_set(hdev, &cp->addr.bdaddr, addr_type,
5156
				auto_conn) < 0) {
5157 5158 5159
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
					MGMT_STATUS_FAILED, &cp->addr,
					sizeof(cp->addr));
5160 5161 5162
		goto unlock;
	}

5163 5164
	hci_update_background_scan(hdev);

5165
added:
5166 5167
	device_added(sk, hdev, &cp->addr.bdaddr, cp->addr.type, cp->action);

5168 5169 5170
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_DEVICE,
				MGMT_STATUS_SUCCESS, &cp->addr,
				sizeof(cp->addr));
5171 5172 5173 5174 5175 5176

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5177 5178 5179 5180 5181 5182 5183 5184 5185 5186 5187
static void device_removed(struct sock *sk, struct hci_dev *hdev,
			   bdaddr_t *bdaddr, u8 type)
{
	struct mgmt_ev_device_removed ev;

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = type;

	mgmt_event(MGMT_EV_DEVICE_REMOVED, hdev, &ev, sizeof(ev), sk);
}

5188 5189 5190 5191 5192 5193 5194 5195 5196 5197 5198
static int remove_device(struct sock *sk, struct hci_dev *hdev,
			 void *data, u16 len)
{
	struct mgmt_cp_remove_device *cp = data;
	int err;

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

	if (bacmp(&cp->addr.bdaddr, BDADDR_ANY)) {
5199
		struct hci_conn_params *params;
5200 5201
		u8 addr_type;

5202
		if (!bdaddr_type_is_valid(cp->addr.type)) {
5203 5204 5205 5206
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5207 5208 5209
			goto unlock;
		}

5210 5211 5212 5213 5214
		if (cp->addr.type == BDADDR_BREDR) {
			err = hci_bdaddr_list_del(&hdev->whitelist,
						  &cp->addr.bdaddr,
						  cp->addr.type);
			if (err) {
5215 5216 5217 5218 5219
				err = mgmt_cmd_complete(sk, hdev->id,
							MGMT_OP_REMOVE_DEVICE,
							MGMT_STATUS_INVALID_PARAMS,
							&cp->addr,
							sizeof(cp->addr));
5220 5221 5222
				goto unlock;
			}

5223
			hci_req_update_scan(hdev);
5224

5225 5226 5227 5228 5229
			device_removed(sk, hdev, &cp->addr.bdaddr,
				       cp->addr.type);
			goto complete;
		}

5230
		addr_type = le_addr_type(cp->addr.type);
5231

5232 5233 5234 5235 5236 5237
		/* Kernel internally uses conn_params with resolvable private
		 * address, but Remove Device allows only identity addresses.
		 * Make sure it is enforced before calling
		 * hci_conn_params_lookup.
		 */
		if (!hci_is_identity_address(&cp->addr.bdaddr, addr_type)) {
5238 5239 5240 5241
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5242 5243 5244
			goto unlock;
		}

5245 5246 5247
		params = hci_conn_params_lookup(hdev, &cp->addr.bdaddr,
						addr_type);
		if (!params) {
5248 5249 5250 5251
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5252 5253 5254
			goto unlock;
		}

5255 5256
		if (params->auto_connect == HCI_AUTO_CONN_DISABLED ||
		    params->auto_connect == HCI_AUTO_CONN_EXPLICIT) {
5257 5258 5259 5260
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5261 5262 5263
			goto unlock;
		}

5264
		list_del(&params->action);
5265 5266
		list_del(&params->list);
		kfree(params);
5267
		hci_update_background_scan(hdev);
5268 5269

		device_removed(sk, hdev, &cp->addr.bdaddr, cp->addr.type);
5270
	} else {
5271
		struct hci_conn_params *p, *tmp;
5272
		struct bdaddr_list *b, *btmp;
5273

5274
		if (cp->addr.type) {
5275 5276 5277 5278
			err = mgmt_cmd_complete(sk, hdev->id,
						MGMT_OP_REMOVE_DEVICE,
						MGMT_STATUS_INVALID_PARAMS,
						&cp->addr, sizeof(cp->addr));
5279 5280 5281
			goto unlock;
		}

5282 5283 5284 5285 5286 5287
		list_for_each_entry_safe(b, btmp, &hdev->whitelist, list) {
			device_removed(sk, hdev, &b->bdaddr, b->bdaddr_type);
			list_del(&b->list);
			kfree(b);
		}

5288
		hci_req_update_scan(hdev);
5289

5290 5291 5292 5293
		list_for_each_entry_safe(p, tmp, &hdev->le_conn_params, list) {
			if (p->auto_connect == HCI_AUTO_CONN_DISABLED)
				continue;
			device_removed(sk, hdev, &p->addr, p->addr_type);
5294 5295 5296 5297
			if (p->explicit_connect) {
				p->auto_connect = HCI_AUTO_CONN_EXPLICIT;
				continue;
			}
5298 5299 5300 5301 5302 5303 5304
			list_del(&p->action);
			list_del(&p->list);
			kfree(p);
		}

		BT_DBG("All LE connection parameters were removed");

5305
		hci_update_background_scan(hdev);
5306 5307
	}

5308
complete:
5309 5310 5311
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_REMOVE_DEVICE,
				MGMT_STATUS_SUCCESS, &cp->addr,
				sizeof(cp->addr));
5312 5313 5314 5315 5316
unlock:
	hci_dev_unlock(hdev);
	return err;
}

5317 5318 5319 5320
static int load_conn_param(struct sock *sk, struct hci_dev *hdev, void *data,
			   u16 len)
{
	struct mgmt_cp_load_conn_param *cp = data;
5321 5322
	const u16 max_param_count = ((U16_MAX - sizeof(*cp)) /
				     sizeof(struct mgmt_conn_param));
5323 5324 5325 5326
	u16 param_count, expected_len;
	int i;

	if (!lmp_le_capable(hdev))
5327 5328
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_NOT_SUPPORTED);
5329 5330

	param_count = __le16_to_cpu(cp->param_count);
5331 5332 5333
	if (param_count > max_param_count) {
		BT_ERR("load_conn_param: too big param_count value %u",
		       param_count);
5334 5335
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_INVALID_PARAMS);
5336
	}
5337 5338 5339 5340 5341 5342

	expected_len = sizeof(*cp) + param_count *
					sizeof(struct mgmt_conn_param);
	if (expected_len != len) {
		BT_ERR("load_conn_param: expected %u bytes, got %u bytes",
		       expected_len, len);
5343 5344
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM,
				       MGMT_STATUS_INVALID_PARAMS);
5345 5346 5347 5348 5349 5350 5351 5352 5353 5354 5355 5356 5357 5358 5359 5360 5361 5362 5363 5364 5365 5366 5367 5368 5369 5370 5371 5372 5373 5374 5375 5376 5377 5378 5379 5380 5381 5382 5383 5384 5385 5386 5387 5388 5389 5390 5391 5392 5393 5394 5395 5396 5397 5398
	}

	BT_DBG("%s param_count %u", hdev->name, param_count);

	hci_dev_lock(hdev);

	hci_conn_params_clear_disabled(hdev);

	for (i = 0; i < param_count; i++) {
		struct mgmt_conn_param *param = &cp->params[i];
		struct hci_conn_params *hci_param;
		u16 min, max, latency, timeout;
		u8 addr_type;

		BT_DBG("Adding %pMR (type %u)", &param->addr.bdaddr,
		       param->addr.type);

		if (param->addr.type == BDADDR_LE_PUBLIC) {
			addr_type = ADDR_LE_DEV_PUBLIC;
		} else if (param->addr.type == BDADDR_LE_RANDOM) {
			addr_type = ADDR_LE_DEV_RANDOM;
		} else {
			BT_ERR("Ignoring invalid connection parameters");
			continue;
		}

		min = le16_to_cpu(param->min_interval);
		max = le16_to_cpu(param->max_interval);
		latency = le16_to_cpu(param->latency);
		timeout = le16_to_cpu(param->timeout);

		BT_DBG("min 0x%04x max 0x%04x latency 0x%04x timeout 0x%04x",
		       min, max, latency, timeout);

		if (hci_check_conn_params(min, max, latency, timeout) < 0) {
			BT_ERR("Ignoring invalid connection parameters");
			continue;
		}

		hci_param = hci_conn_params_add(hdev, &param->addr.bdaddr,
						addr_type);
		if (!hci_param) {
			BT_ERR("Failed to add connection parameters");
			continue;
		}

		hci_param->conn_min_interval = min;
		hci_param->conn_max_interval = max;
		hci_param->conn_latency = latency;
		hci_param->supervision_timeout = timeout;
	}

	hci_dev_unlock(hdev);

5399 5400
	return mgmt_cmd_complete(sk, hdev->id, MGMT_OP_LOAD_CONN_PARAM, 0,
				 NULL, 0);
5401 5402
}

5403 5404 5405 5406 5407 5408 5409 5410 5411 5412
static int set_external_config(struct sock *sk, struct hci_dev *hdev,
			       void *data, u16 len)
{
	struct mgmt_cp_set_external_config *cp = data;
	bool changed;
	int err;

	BT_DBG("%s", hdev->name);

	if (hdev_is_powered(hdev))
5413 5414
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				       MGMT_STATUS_REJECTED);
5415 5416

	if (cp->config != 0x00 && cp->config != 0x01)
5417 5418
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				         MGMT_STATUS_INVALID_PARAMS);
5419 5420

	if (!test_bit(HCI_QUIRK_EXTERNAL_CONFIG, &hdev->quirks))
5421 5422
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_EXTERNAL_CONFIG,
				       MGMT_STATUS_NOT_SUPPORTED);
5423 5424 5425 5426

	hci_dev_lock(hdev);

	if (cp->config)
5427
		changed = !hci_dev_test_and_set_flag(hdev, HCI_EXT_CONFIGURED);
5428
	else
5429
		changed = hci_dev_test_and_clear_flag(hdev, HCI_EXT_CONFIGURED);
5430 5431 5432 5433 5434 5435 5436 5437

	err = send_options_rsp(sk, MGMT_OP_SET_EXTERNAL_CONFIG, hdev);
	if (err < 0)
		goto unlock;

	if (!changed)
		goto unlock;

5438 5439
	err = new_options(hdev, sk);

5440
	if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED) == is_configured(hdev)) {
5441
		mgmt_index_removed(hdev);
5442

5443
		if (hci_dev_test_and_change_flag(hdev, HCI_UNCONFIGURED)) {
5444 5445
			hci_dev_set_flag(hdev, HCI_CONFIG);
			hci_dev_set_flag(hdev, HCI_AUTO_OFF);
5446 5447 5448

			queue_work(hdev->req_workqueue, &hdev->power_on);
		} else {
5449
			set_bit(HCI_RAW, &hdev->flags);
5450 5451
			mgmt_index_added(hdev);
		}
5452 5453 5454 5455 5456 5457 5458
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5459 5460 5461 5462 5463 5464 5465 5466 5467 5468
static int set_public_address(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 len)
{
	struct mgmt_cp_set_public_address *cp = data;
	bool changed;
	int err;

	BT_DBG("%s", hdev->name);

	if (hdev_is_powered(hdev))
5469 5470
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_REJECTED);
5471 5472

	if (!bacmp(&cp->bdaddr, BDADDR_ANY))
5473 5474
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_INVALID_PARAMS);
5475 5476

	if (!hdev->set_bdaddr)
5477 5478
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_SET_PUBLIC_ADDRESS,
				       MGMT_STATUS_NOT_SUPPORTED);
5479 5480 5481 5482 5483 5484 5485 5486 5487 5488 5489 5490 5491

	hci_dev_lock(hdev);

	changed = !!bacmp(&hdev->public_addr, &cp->bdaddr);
	bacpy(&hdev->public_addr, &cp->bdaddr);

	err = send_options_rsp(sk, MGMT_OP_SET_PUBLIC_ADDRESS, hdev);
	if (err < 0)
		goto unlock;

	if (!changed)
		goto unlock;

5492
	if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED))
5493 5494 5495 5496 5497
		err = new_options(hdev, sk);

	if (is_configured(hdev)) {
		mgmt_index_removed(hdev);

5498
		hci_dev_clear_flag(hdev, HCI_UNCONFIGURED);
5499

5500 5501
		hci_dev_set_flag(hdev, HCI_CONFIG);
		hci_dev_set_flag(hdev, HCI_AUTO_OFF);
5502 5503 5504 5505 5506 5507 5508 5509 5510

		queue_work(hdev->req_workqueue, &hdev->power_on);
	}

unlock:
	hci_dev_unlock(hdev);
	return err;
}

5511 5512 5513 5514 5515 5516 5517 5518 5519 5520 5521
static inline u16 eir_append_data(u8 *eir, u16 eir_len, u8 type, u8 *data,
				  u8 data_len)
{
	eir[eir_len++] = sizeof(type) + data_len;
	eir[eir_len++] = type;
	memcpy(&eir[eir_len], data, data_len);
	eir_len += data_len;

	return eir_len;
}

5522 5523 5524 5525 5526 5527 5528 5529 5530 5531 5532 5533 5534 5535 5536 5537 5538 5539 5540 5541 5542 5543 5544 5545 5546 5547 5548 5549 5550 5551 5552 5553 5554 5555 5556 5557 5558 5559 5560 5561 5562 5563 5564 5565 5566 5567 5568 5569 5570 5571 5572 5573 5574 5575 5576 5577 5578 5579 5580 5581 5582 5583 5584 5585 5586 5587 5588 5589 5590 5591 5592 5593 5594 5595 5596 5597 5598 5599 5600 5601 5602 5603 5604 5605 5606 5607 5608 5609 5610 5611 5612 5613 5614 5615 5616 5617 5618 5619 5620 5621 5622 5623 5624 5625 5626 5627 5628 5629 5630 5631 5632 5633 5634 5635 5636 5637 5638 5639 5640 5641 5642 5643 5644 5645 5646 5647 5648 5649 5650 5651 5652 5653 5654 5655 5656 5657 5658 5659 5660
static void read_local_oob_ext_data_complete(struct hci_dev *hdev, u8 status,
					     u16 opcode, struct sk_buff *skb)
{
	const struct mgmt_cp_read_local_oob_ext_data *mgmt_cp;
	struct mgmt_rp_read_local_oob_ext_data *mgmt_rp;
	u8 *h192, *r192, *h256, *r256;
	struct mgmt_pending_cmd *cmd;
	u16 eir_len;
	int err;

	BT_DBG("%s status %u", hdev->name, status);

	cmd = pending_find(MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev);
	if (!cmd)
		return;

	mgmt_cp = cmd->param;

	if (status) {
		status = mgmt_status(status);
		eir_len = 0;

		h192 = NULL;
		r192 = NULL;
		h256 = NULL;
		r256 = NULL;
	} else if (opcode == HCI_OP_READ_LOCAL_OOB_DATA) {
		struct hci_rp_read_local_oob_data *rp;

		if (skb->len != sizeof(*rp)) {
			status = MGMT_STATUS_FAILED;
			eir_len = 0;
		} else {
			status = MGMT_STATUS_SUCCESS;
			rp = (void *)skb->data;

			eir_len = 5 + 18 + 18;
			h192 = rp->hash;
			r192 = rp->rand;
			h256 = NULL;
			r256 = NULL;
		}
	} else {
		struct hci_rp_read_local_oob_ext_data *rp;

		if (skb->len != sizeof(*rp)) {
			status = MGMT_STATUS_FAILED;
			eir_len = 0;
		} else {
			status = MGMT_STATUS_SUCCESS;
			rp = (void *)skb->data;

			if (hci_dev_test_flag(hdev, HCI_SC_ONLY)) {
				eir_len = 5 + 18 + 18;
				h192 = NULL;
				r192 = NULL;
			} else {
				eir_len = 5 + 18 + 18 + 18 + 18;
				h192 = rp->hash192;
				r192 = rp->rand192;
			}

			h256 = rp->hash256;
			r256 = rp->rand256;
		}
	}

	mgmt_rp = kmalloc(sizeof(*mgmt_rp) + eir_len, GFP_KERNEL);
	if (!mgmt_rp)
		goto done;

	if (status)
		goto send_rsp;

	eir_len = eir_append_data(mgmt_rp->eir, 0, EIR_CLASS_OF_DEV,
				  hdev->dev_class, 3);

	if (h192 && r192) {
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_HASH_C192, h192, 16);
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_RAND_R192, r192, 16);
	}

	if (h256 && r256) {
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_HASH_C256, h256, 16);
		eir_len = eir_append_data(mgmt_rp->eir, eir_len,
					  EIR_SSP_RAND_R256, r256, 16);
	}

send_rsp:
	mgmt_rp->type = mgmt_cp->type;
	mgmt_rp->eir_len = cpu_to_le16(eir_len);

	err = mgmt_cmd_complete(cmd->sk, hdev->id,
				MGMT_OP_READ_LOCAL_OOB_EXT_DATA, status,
				mgmt_rp, sizeof(*mgmt_rp) + eir_len);
	if (err < 0 || status)
		goto done;

	hci_sock_set_flag(cmd->sk, HCI_MGMT_OOB_DATA_EVENTS);

	err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev,
				 mgmt_rp, sizeof(*mgmt_rp) + eir_len,
				 HCI_MGMT_OOB_DATA_EVENTS, cmd->sk);
done:
	kfree(mgmt_rp);
	mgmt_pending_remove(cmd);
}

static int read_local_ssp_oob_req(struct hci_dev *hdev, struct sock *sk,
				  struct mgmt_cp_read_local_oob_ext_data *cp)
{
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;
	int err;

	cmd = mgmt_pending_add(sk, MGMT_OP_READ_LOCAL_OOB_EXT_DATA, hdev,
			       cp, sizeof(*cp));
	if (!cmd)
		return -ENOMEM;

	hci_req_init(&req, hdev);

	if (bredr_sc_enabled(hdev))
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_EXT_DATA, 0, NULL);
	else
		hci_req_add(&req, HCI_OP_READ_LOCAL_OOB_DATA, 0, NULL);

	err = hci_req_run_skb(&req, read_local_oob_ext_data_complete);
	if (err < 0) {
		mgmt_pending_remove(cmd);
		return err;
	}

	return 0;
}

5661 5662 5663 5664 5665 5666 5667
static int read_local_oob_ext_data(struct sock *sk, struct hci_dev *hdev,
				   void *data, u16 data_len)
{
	struct mgmt_cp_read_local_oob_ext_data *cp = data;
	struct mgmt_rp_read_local_oob_ext_data *rp;
	size_t rp_len;
	u16 eir_len;
5668
	u8 status, flags, role, addr[7], hash[16], rand[16];
5669 5670 5671 5672
	int err;

	BT_DBG("%s", hdev->name);

5673 5674 5675 5676 5677 5678 5679 5680 5681 5682 5683 5684 5685 5686 5687 5688 5689 5690 5691 5692 5693 5694 5695 5696
	if (hdev_is_powered(hdev)) {
		switch (cp->type) {
		case BIT(BDADDR_BREDR):
			status = mgmt_bredr_support(hdev);
			if (status)
				eir_len = 0;
			else
				eir_len = 5;
			break;
		case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)):
			status = mgmt_le_support(hdev);
			if (status)
				eir_len = 0;
			else
				eir_len = 9 + 3 + 18 + 18 + 3;
			break;
		default:
			status = MGMT_STATUS_INVALID_PARAMS;
			eir_len = 0;
			break;
		}
	} else {
		status = MGMT_STATUS_NOT_POWERED;
		eir_len = 0;
5697 5698 5699 5700
	}

	rp_len = sizeof(*rp) + eir_len;
	rp = kmalloc(rp_len, GFP_ATOMIC);
5701
	if (!rp)
5702
		return -ENOMEM;
5703

5704 5705 5706
	if (status)
		goto complete;

5707
	hci_dev_lock(hdev);
5708 5709 5710 5711

	eir_len = 0;
	switch (cp->type) {
	case BIT(BDADDR_BREDR):
5712 5713 5714 5715 5716 5717 5718 5719 5720 5721 5722 5723 5724
		if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
			err = read_local_ssp_oob_req(hdev, sk, cp);
			hci_dev_unlock(hdev);
			if (!err)
				goto done;

			status = MGMT_STATUS_FAILED;
			goto complete;
		} else {
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_CLASS_OF_DEV,
						  hdev->dev_class, 3);
		}
5725 5726
		break;
	case (BIT(BDADDR_LE_PUBLIC) | BIT(BDADDR_LE_RANDOM)):
5727 5728
		if (hci_dev_test_flag(hdev, HCI_SC_ENABLED) &&
		    smp_generate_oob(hdev, hash, rand) < 0) {
5729
			hci_dev_unlock(hdev);
5730 5731
			status = MGMT_STATUS_FAILED;
			goto complete;
5732 5733
		}

5734 5735 5736 5737 5738 5739 5740 5741 5742 5743
		/* This should return the active RPA, but since the RPA
		 * is only programmed on demand, it is really hard to fill
		 * this in at the moment. For now disallow retrieving
		 * local out-of-band data when privacy is in use.
		 *
		 * Returning the identity address will not help here since
		 * pairing happens before the identity resolving key is
		 * known and thus the connection establishment happens
		 * based on the RPA and not the identity address.
		 */
5744
		if (hci_dev_test_flag(hdev, HCI_PRIVACY)) {
5745 5746 5747 5748 5749 5750 5751 5752 5753
			hci_dev_unlock(hdev);
			status = MGMT_STATUS_REJECTED;
			goto complete;
		}

		if (hci_dev_test_flag(hdev, HCI_FORCE_STATIC_ADDR) ||
		   !bacmp(&hdev->bdaddr, BDADDR_ANY) ||
		   (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED) &&
		    bacmp(&hdev->static_addr, BDADDR_ANY))) {
5754 5755 5756 5757 5758 5759 5760 5761 5762 5763 5764 5765 5766 5767 5768 5769 5770 5771
			memcpy(addr, &hdev->static_addr, 6);
			addr[6] = 0x01;
		} else {
			memcpy(addr, &hdev->bdaddr, 6);
			addr[6] = 0x00;
		}

		eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_BDADDR,
					  addr, sizeof(addr));

		if (hci_dev_test_flag(hdev, HCI_ADVERTISING))
			role = 0x02;
		else
			role = 0x01;

		eir_len = eir_append_data(rp->eir, eir_len, EIR_LE_ROLE,
					  &role, sizeof(role));

5772 5773 5774 5775
		if (hci_dev_test_flag(hdev, HCI_SC_ENABLED)) {
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_LE_SC_CONFIRM,
						  hash, sizeof(hash));
5776

5777 5778 5779 5780
			eir_len = eir_append_data(rp->eir, eir_len,
						  EIR_LE_SC_RANDOM,
						  rand, sizeof(rand));
		}
5781

5782
		flags = mgmt_get_adv_discov_flags(hdev);
5783 5784 5785 5786 5787 5788 5789 5790 5791 5792 5793

		if (!hci_dev_test_flag(hdev, HCI_BREDR_ENABLED))
			flags |= LE_AD_NO_BREDR;

		eir_len = eir_append_data(rp->eir, eir_len, EIR_FLAGS,
					  &flags, sizeof(flags));
		break;
	}

	hci_dev_unlock(hdev);

5794 5795
	hci_sock_set_flag(sk, HCI_MGMT_OOB_DATA_EVENTS);

5796 5797 5798
	status = MGMT_STATUS_SUCCESS;

complete:
5799 5800 5801
	rp->type = cp->type;
	rp->eir_len = cpu_to_le16(eir_len);

5802
	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_LOCAL_OOB_EXT_DATA,
5803 5804
				status, rp, sizeof(*rp) + eir_len);
	if (err < 0 || status)
5805 5806 5807 5808 5809
		goto done;

	err = mgmt_limited_event(MGMT_EV_LOCAL_OOB_DATA_UPDATED, hdev,
				 rp, sizeof(*rp) + eir_len,
				 HCI_MGMT_OOB_DATA_EVENTS, sk);
5810

5811
done:
5812 5813 5814 5815 5816
	kfree(rp);

	return err;
}

5817 5818 5819 5820 5821 5822 5823 5824 5825 5826 5827 5828 5829 5830 5831
static u32 get_supported_adv_flags(struct hci_dev *hdev)
{
	u32 flags = 0;

	flags |= MGMT_ADV_FLAG_CONNECTABLE;
	flags |= MGMT_ADV_FLAG_DISCOV;
	flags |= MGMT_ADV_FLAG_LIMITED_DISCOV;
	flags |= MGMT_ADV_FLAG_MANAGED_FLAGS;

	if (hdev->adv_tx_power != HCI_TX_POWER_INVALID)
		flags |= MGMT_ADV_FLAG_TX_POWER;

	return flags;
}

5832 5833 5834 5835 5836
static int read_adv_features(struct sock *sk, struct hci_dev *hdev,
			     void *data, u16 data_len)
{
	struct mgmt_rp_read_adv_features *rp;
	size_t rp_len;
5837
	int err;
5838
	struct adv_info *adv_instance;
5839
	u32 supported_flags;
5840
	u8 *instance;
5841 5842 5843

	BT_DBG("%s", hdev->name);

5844 5845 5846 5847
	if (!lmp_le_capable(hdev))
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES,
				       MGMT_STATUS_REJECTED);

5848 5849
	hci_dev_lock(hdev);

5850
	rp_len = sizeof(*rp) + hdev->adv_instance_cnt;
5851 5852 5853 5854 5855 5856
	rp = kmalloc(rp_len, GFP_ATOMIC);
	if (!rp) {
		hci_dev_unlock(hdev);
		return -ENOMEM;
	}

5857 5858 5859
	supported_flags = get_supported_adv_flags(hdev);

	rp->supported_flags = cpu_to_le32(supported_flags);
5860 5861
	rp->max_adv_data_len = HCI_MAX_AD_LENGTH;
	rp->max_scan_rsp_len = HCI_MAX_AD_LENGTH;
5862
	rp->max_instances = HCI_MAX_ADV_INSTANCES;
5863
	rp->num_instances = hdev->adv_instance_cnt;
5864

5865 5866 5867 5868
	instance = rp->instance;
	list_for_each_entry(adv_instance, &hdev->adv_instances, list) {
		*instance = adv_instance->instance;
		instance++;
5869
	}
5870 5871 5872 5873 5874 5875 5876 5877 5878 5879 5880

	hci_dev_unlock(hdev);

	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_READ_ADV_FEATURES,
				MGMT_STATUS_SUCCESS, rp, rp_len);

	kfree(rp);

	return err;
}

5881
static bool tlv_data_is_valid(struct hci_dev *hdev, u32 adv_flags, u8 *data,
5882
			      u8 len, bool is_adv_data)
5883
{
5884
	u8 max_len = HCI_MAX_AD_LENGTH;
5885
	int i, cur_len;
5886
	bool flags_managed = false;
5887
	bool tx_power_managed = false;
5888

5889 5890 5891 5892 5893 5894 5895
	if (is_adv_data) {
		if (adv_flags & (MGMT_ADV_FLAG_DISCOV |
				 MGMT_ADV_FLAG_LIMITED_DISCOV |
				 MGMT_ADV_FLAG_MANAGED_FLAGS)) {
			flags_managed = true;
			max_len -= 3;
		}
5896

5897 5898 5899 5900
		if (adv_flags & MGMT_ADV_FLAG_TX_POWER) {
			tx_power_managed = true;
			max_len -= 3;
		}
5901 5902
	}

5903
	if (len > max_len)
5904 5905
		return false;

5906 5907 5908
	/* Make sure that the data is correctly formatted. */
	for (i = 0, cur_len = 0; i < len; i += (cur_len + 1)) {
		cur_len = data[i];
5909

5910 5911 5912
		if (flags_managed && data[i + 1] == EIR_FLAGS)
			return false;

5913 5914 5915
		if (tx_power_managed && data[i + 1] == EIR_TX_POWER)
			return false;

5916 5917 5918
		/* If the current field length would exceed the total data
		 * length, then it's invalid.
		 */
5919
		if (i + cur_len >= len)
5920 5921 5922 5923 5924 5925 5926 5927 5928 5929
			return false;
	}

	return true;
}

static void add_advertising_complete(struct hci_dev *hdev, u8 status,
				     u16 opcode)
{
	struct mgmt_pending_cmd *cmd;
5930
	struct mgmt_cp_add_advertising *cp;
5931
	struct mgmt_rp_add_advertising rp;
5932 5933
	struct adv_info *adv_instance, *n;
	u8 instance;
5934 5935 5936 5937 5938 5939 5940

	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	cmd = pending_find(MGMT_OP_ADD_ADVERTISING, hdev);

5941 5942 5943 5944 5945 5946 5947 5948 5949 5950 5951 5952 5953 5954 5955
	list_for_each_entry_safe(adv_instance, n, &hdev->adv_instances, list) {
		if (!adv_instance->pending)
			continue;

		if (!status) {
			adv_instance->pending = false;
			continue;
		}

		instance = adv_instance->instance;

		if (hdev->cur_adv_instance == instance)
			cancel_adv_timeout(hdev);

		hci_remove_adv_instance(hdev, instance);
5956
		mgmt_advertising_removed(cmd ? cmd->sk : NULL, hdev, instance);
5957 5958 5959 5960 5961
	}

	if (!cmd)
		goto unlock;

5962 5963
	cp = cmd->param;
	rp.instance = cp->instance;
5964 5965 5966 5967 5968 5969 5970 5971 5972 5973 5974 5975 5976 5977 5978 5979 5980 5981 5982 5983

	if (status)
		mgmt_cmd_status(cmd->sk, cmd->index, cmd->opcode,
				mgmt_status(status));
	else
		mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode,
				  mgmt_status(status), &rp, sizeof(rp));

	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int add_advertising(struct sock *sk, struct hci_dev *hdev,
			   void *data, u16 data_len)
{
	struct mgmt_cp_add_advertising *cp = data;
	struct mgmt_rp_add_advertising rp;
	u32 flags;
5984
	u32 supported_flags;
5985
	u8 status;
5986 5987 5988 5989
	u16 timeout, duration;
	unsigned int prev_instance_cnt = hdev->adv_instance_cnt;
	u8 schedule_instance = 0;
	struct adv_info *next_instance;
5990 5991 5992 5993 5994 5995 5996 5997 5998 5999 6000
	int err;
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;

	BT_DBG("%s", hdev->name);

	status = mgmt_le_support(hdev);
	if (status)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       status);

6001
	if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES)
6002 6003 6004 6005
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

	if (data_len != sizeof(*cp) + cp->adv_data_len + cp->scan_rsp_len)
6006 6007 6008
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

6009
	flags = __le32_to_cpu(cp->flags);
6010
	timeout = __le16_to_cpu(cp->timeout);
6011
	duration = __le16_to_cpu(cp->duration);
6012

6013 6014
	/* The current implementation only supports a subset of the specified
	 * flags.
6015 6016
	 */
	supported_flags = get_supported_adv_flags(hdev);
6017
	if (flags & ~supported_flags)
6018 6019 6020 6021 6022
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				       MGMT_STATUS_INVALID_PARAMS);

	hci_dev_lock(hdev);

6023 6024 6025 6026 6027 6028
	if (timeout && !hdev_is_powered(hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_REJECTED);
		goto unlock;
	}

6029
	if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) ||
6030
	    pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) ||
6031 6032 6033 6034 6035 6036
	    pending_find(MGMT_OP_SET_LE, hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_BUSY);
		goto unlock;
	}

6037
	if (!tlv_data_is_valid(hdev, flags, cp->data, cp->adv_data_len, true) ||
6038
	    !tlv_data_is_valid(hdev, flags, cp->data + cp->adv_data_len,
6039
			       cp->scan_rsp_len, false)) {
6040 6041 6042 6043 6044
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6045 6046 6047 6048 6049 6050 6051 6052 6053 6054
	err = hci_add_adv_instance(hdev, cp->instance, flags,
				   cp->adv_data_len, cp->data,
				   cp->scan_rsp_len,
				   cp->data + cp->adv_data_len,
				   timeout, duration);
	if (err < 0) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
				      MGMT_STATUS_FAILED);
		goto unlock;
	}
6055

6056 6057 6058 6059
	/* Only trigger an advertising added event if a new instance was
	 * actually added.
	 */
	if (hdev->adv_instance_cnt > prev_instance_cnt)
6060
		mgmt_advertising_added(sk, hdev, cp->instance);
6061

6062 6063 6064 6065 6066 6067 6068
	if (hdev->cur_adv_instance == cp->instance) {
		/* If the currently advertised instance is being changed then
		 * cancel the current advertising and schedule the next
		 * instance. If there is only one instance then the overridden
		 * advertising data will be visible right away.
		 */
		cancel_adv_timeout(hdev);
6069

6070 6071 6072 6073 6074 6075 6076 6077 6078
		next_instance = hci_get_next_instance(hdev, cp->instance);
		if (next_instance)
			schedule_instance = next_instance->instance;
	} else if (!hdev->adv_instance_timeout) {
		/* Immediately advertise the new instance if no other
		 * instance is currently being advertised.
		 */
		schedule_instance = cp->instance;
	}
6079

6080 6081 6082
	/* If the HCI_ADVERTISING flag is set or the device isn't powered or
	 * there is no instance to be advertised then we have no HCI
	 * communication to make. Simply return.
6083 6084
	 */
	if (!hdev_is_powered(hdev) ||
6085 6086 6087
	    hci_dev_test_flag(hdev, HCI_ADVERTISING) ||
	    !schedule_instance) {
		rp.instance = cp->instance;
6088 6089 6090 6091 6092 6093 6094 6095 6096 6097 6098 6099 6100 6101 6102 6103 6104
		err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_ADD_ADVERTISING,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
		goto unlock;
	}

	/* We're good to go, update advertising data, parameters, and start
	 * advertising.
	 */
	cmd = mgmt_pending_add(sk, MGMT_OP_ADD_ADVERTISING, hdev, data,
			       data_len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	hci_req_init(&req, hdev);

6105
	err = __hci_req_schedule_adv_instance(&req, schedule_instance, true);
6106 6107 6108

	if (!err)
		err = hci_req_run(&req, add_advertising_complete);
6109 6110 6111 6112 6113 6114 6115 6116 6117 6118

	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);

	return err;
}

6119 6120 6121 6122
static void remove_advertising_complete(struct hci_dev *hdev, u8 status,
					u16 opcode)
{
	struct mgmt_pending_cmd *cmd;
6123
	struct mgmt_cp_remove_advertising *cp;
6124 6125 6126 6127 6128 6129 6130 6131 6132 6133 6134 6135 6136 6137
	struct mgmt_rp_remove_advertising rp;

	BT_DBG("status %d", status);

	hci_dev_lock(hdev);

	/* A failure status here only means that we failed to disable
	 * advertising. Otherwise, the advertising instance has been removed,
	 * so report success.
	 */
	cmd = pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev);
	if (!cmd)
		goto unlock;

6138 6139
	cp = cmd->param;
	rp.instance = cp->instance;
6140 6141 6142 6143 6144 6145 6146 6147 6148 6149 6150 6151 6152 6153 6154 6155

	mgmt_cmd_complete(cmd->sk, cmd->index, cmd->opcode, MGMT_STATUS_SUCCESS,
			  &rp, sizeof(rp));
	mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);
}

static int remove_advertising(struct sock *sk, struct hci_dev *hdev,
			      void *data, u16 data_len)
{
	struct mgmt_cp_remove_advertising *cp = data;
	struct mgmt_rp_remove_advertising rp;
	struct mgmt_pending_cmd *cmd;
	struct hci_request req;
6156
	int err;
6157 6158 6159 6160 6161

	BT_DBG("%s", hdev->name);

	hci_dev_lock(hdev);

6162
	if (cp->instance && !hci_find_adv_instance(hdev, cp->instance)) {
6163 6164 6165 6166 6167 6168
		err = mgmt_cmd_status(sk, hdev->id,
				      MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6169 6170 6171 6172 6173 6174 6175 6176
	if (pending_find(MGMT_OP_ADD_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_REMOVE_ADVERTISING, hdev) ||
	    pending_find(MGMT_OP_SET_LE, hdev)) {
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_BUSY);
		goto unlock;
	}

6177
	if (list_empty(&hdev->adv_instances)) {
6178 6179 6180 6181 6182
		err = mgmt_cmd_status(sk, hdev->id, MGMT_OP_REMOVE_ADVERTISING,
				      MGMT_STATUS_INVALID_PARAMS);
		goto unlock;
	}

6183
	hci_req_init(&req, hdev);
6184

6185
	hci_req_clear_adv_instance(hdev, &req, cp->instance, true);
6186

6187
	if (list_empty(&hdev->adv_instances))
6188
		__hci_req_disable_advertising(&req);
6189

6190 6191 6192
	/* If no HCI commands have been collected so far or the HCI_ADVERTISING
	 * flag is set or the device isn't powered then we have no HCI
	 * communication to make. Simply return.
6193
	 */
6194 6195
	if (skb_queue_empty(&req.cmd_q) ||
	    !hdev_is_powered(hdev) ||
6196
	    hci_dev_test_flag(hdev, HCI_ADVERTISING)) {
6197
		rp.instance = cp->instance;
6198 6199 6200 6201 6202 6203 6204 6205 6206 6207 6208 6209 6210 6211 6212 6213 6214 6215 6216 6217 6218 6219 6220
		err = mgmt_cmd_complete(sk, hdev->id,
					MGMT_OP_REMOVE_ADVERTISING,
					MGMT_STATUS_SUCCESS, &rp, sizeof(rp));
		goto unlock;
	}

	cmd = mgmt_pending_add(sk, MGMT_OP_REMOVE_ADVERTISING, hdev, data,
			       data_len);
	if (!cmd) {
		err = -ENOMEM;
		goto unlock;
	}

	err = hci_req_run(&req, remove_advertising_complete);
	if (err < 0)
		mgmt_pending_remove(cmd);

unlock:
	hci_dev_unlock(hdev);

	return err;
}

6221 6222 6223 6224 6225 6226 6227 6228 6229 6230 6231 6232 6233 6234 6235 6236 6237 6238 6239 6240 6241 6242 6243 6244 6245 6246 6247 6248 6249 6250 6251 6252 6253 6254 6255 6256 6257 6258 6259 6260 6261 6262 6263 6264 6265 6266 6267 6268 6269 6270 6271 6272 6273 6274 6275 6276
static u8 tlv_data_max_len(u32 adv_flags, bool is_adv_data)
{
	u8 max_len = HCI_MAX_AD_LENGTH;

	if (is_adv_data) {
		if (adv_flags & (MGMT_ADV_FLAG_DISCOV |
				 MGMT_ADV_FLAG_LIMITED_DISCOV |
				 MGMT_ADV_FLAG_MANAGED_FLAGS))
			max_len -= 3;

		if (adv_flags & MGMT_ADV_FLAG_TX_POWER)
			max_len -= 3;
	}

	return max_len;
}

static int get_adv_size_info(struct sock *sk, struct hci_dev *hdev,
			     void *data, u16 data_len)
{
	struct mgmt_cp_get_adv_size_info *cp = data;
	struct mgmt_rp_get_adv_size_info rp;
	u32 flags, supported_flags;
	int err;

	BT_DBG("%s", hdev->name);

	if (!lmp_le_capable(hdev))
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_REJECTED);

	if (cp->instance < 1 || cp->instance > HCI_MAX_ADV_INSTANCES)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_INVALID_PARAMS);

	flags = __le32_to_cpu(cp->flags);

	/* The current implementation only supports a subset of the specified
	 * flags.
	 */
	supported_flags = get_supported_adv_flags(hdev);
	if (flags & ~supported_flags)
		return mgmt_cmd_status(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				       MGMT_STATUS_INVALID_PARAMS);

	rp.instance = cp->instance;
	rp.flags = cp->flags;
	rp.max_adv_data_len = tlv_data_max_len(flags, true);
	rp.max_scan_rsp_len = tlv_data_max_len(flags, false);

	err = mgmt_cmd_complete(sk, hdev->id, MGMT_OP_GET_ADV_SIZE_INFO,
				MGMT_STATUS_SUCCESS, &rp, sizeof(rp));

	return err;
}

6277
static const struct hci_mgmt_handler mgmt_handlers[] = {
6278
	{ NULL }, /* 0x0000 (no command) */
6279
	{ read_version,            MGMT_READ_VERSION_SIZE,
6280 6281
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6282
	{ read_commands,           MGMT_READ_COMMANDS_SIZE,
6283 6284
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6285
	{ read_index_list,         MGMT_READ_INDEX_LIST_SIZE,
6286 6287 6288 6289
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
	{ read_controller_info,    MGMT_READ_INFO_SIZE,
						HCI_MGMT_UNTRUSTED },
6290 6291 6292 6293 6294 6295 6296 6297 6298 6299 6300 6301 6302
	{ set_powered,             MGMT_SETTING_SIZE },
	{ set_discoverable,        MGMT_SET_DISCOVERABLE_SIZE },
	{ set_connectable,         MGMT_SETTING_SIZE },
	{ set_fast_connectable,    MGMT_SETTING_SIZE },
	{ set_bondable,            MGMT_SETTING_SIZE },
	{ set_link_security,       MGMT_SETTING_SIZE },
	{ set_ssp,                 MGMT_SETTING_SIZE },
	{ set_hs,                  MGMT_SETTING_SIZE },
	{ set_le,                  MGMT_SETTING_SIZE },
	{ set_dev_class,           MGMT_SET_DEV_CLASS_SIZE },
	{ set_local_name,          MGMT_SET_LOCAL_NAME_SIZE },
	{ add_uuid,                MGMT_ADD_UUID_SIZE },
	{ remove_uuid,             MGMT_REMOVE_UUID_SIZE },
6303 6304 6305 6306
	{ load_link_keys,          MGMT_LOAD_LINK_KEYS_SIZE,
						HCI_MGMT_VAR_LEN },
	{ load_long_term_keys,     MGMT_LOAD_LONG_TERM_KEYS_SIZE,
						HCI_MGMT_VAR_LEN },
6307 6308 6309 6310 6311 6312 6313 6314 6315 6316 6317 6318
	{ disconnect,              MGMT_DISCONNECT_SIZE },
	{ get_connections,         MGMT_GET_CONNECTIONS_SIZE },
	{ pin_code_reply,          MGMT_PIN_CODE_REPLY_SIZE },
	{ pin_code_neg_reply,      MGMT_PIN_CODE_NEG_REPLY_SIZE },
	{ set_io_capability,       MGMT_SET_IO_CAPABILITY_SIZE },
	{ pair_device,             MGMT_PAIR_DEVICE_SIZE },
	{ cancel_pair_device,      MGMT_CANCEL_PAIR_DEVICE_SIZE },
	{ unpair_device,           MGMT_UNPAIR_DEVICE_SIZE },
	{ user_confirm_reply,      MGMT_USER_CONFIRM_REPLY_SIZE },
	{ user_confirm_neg_reply,  MGMT_USER_CONFIRM_NEG_REPLY_SIZE },
	{ user_passkey_reply,      MGMT_USER_PASSKEY_REPLY_SIZE },
	{ user_passkey_neg_reply,  MGMT_USER_PASSKEY_NEG_REPLY_SIZE },
6319 6320 6321
	{ read_local_oob_data,     MGMT_READ_LOCAL_OOB_DATA_SIZE },
	{ add_remote_oob_data,     MGMT_ADD_REMOTE_OOB_DATA_SIZE,
						HCI_MGMT_VAR_LEN },
6322 6323 6324 6325 6326 6327 6328 6329 6330 6331 6332 6333 6334 6335
	{ remove_remote_oob_data,  MGMT_REMOVE_REMOTE_OOB_DATA_SIZE },
	{ start_discovery,         MGMT_START_DISCOVERY_SIZE },
	{ stop_discovery,          MGMT_STOP_DISCOVERY_SIZE },
	{ confirm_name,            MGMT_CONFIRM_NAME_SIZE },
	{ block_device,            MGMT_BLOCK_DEVICE_SIZE },
	{ unblock_device,          MGMT_UNBLOCK_DEVICE_SIZE },
	{ set_device_id,           MGMT_SET_DEVICE_ID_SIZE },
	{ set_advertising,         MGMT_SETTING_SIZE },
	{ set_bredr,               MGMT_SETTING_SIZE },
	{ set_static_address,      MGMT_SET_STATIC_ADDRESS_SIZE },
	{ set_scan_params,         MGMT_SET_SCAN_PARAMS_SIZE },
	{ set_secure_conn,         MGMT_SETTING_SIZE },
	{ set_debug_keys,          MGMT_SETTING_SIZE },
	{ set_privacy,             MGMT_SET_PRIVACY_SIZE },
6336 6337
	{ load_irks,               MGMT_LOAD_IRKS_SIZE,
						HCI_MGMT_VAR_LEN },
6338 6339 6340 6341
	{ get_conn_info,           MGMT_GET_CONN_INFO_SIZE },
	{ get_clock_info,          MGMT_GET_CLOCK_INFO_SIZE },
	{ add_device,              MGMT_ADD_DEVICE_SIZE },
	{ remove_device,           MGMT_REMOVE_DEVICE_SIZE },
6342 6343 6344
	{ load_conn_param,         MGMT_LOAD_CONN_PARAM_SIZE,
						HCI_MGMT_VAR_LEN },
	{ read_unconf_index_list,  MGMT_READ_UNCONF_INDEX_LIST_SIZE,
6345 6346
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6347
	{ read_config_info,        MGMT_READ_CONFIG_INFO_SIZE,
6348 6349
						HCI_MGMT_UNCONFIGURED |
						HCI_MGMT_UNTRUSTED },
6350 6351 6352 6353 6354 6355
	{ set_external_config,     MGMT_SET_EXTERNAL_CONFIG_SIZE,
						HCI_MGMT_UNCONFIGURED },
	{ set_public_address,      MGMT_SET_PUBLIC_ADDRESS_SIZE,
						HCI_MGMT_UNCONFIGURED },
	{ start_service_discovery, MGMT_START_SERVICE_DISCOVERY_SIZE,
						HCI_MGMT_VAR_LEN },
6356
	{ read_local_oob_ext_data, MGMT_READ_LOCAL_OOB_EXT_DATA_SIZE },
6357
	{ read_ext_index_list,     MGMT_READ_EXT_INDEX_LIST_SIZE,
6358 6359
						HCI_MGMT_NO_HDEV |
						HCI_MGMT_UNTRUSTED },
6360
	{ read_adv_features,       MGMT_READ_ADV_FEATURES_SIZE },
6361 6362
	{ add_advertising,	   MGMT_ADD_ADVERTISING_SIZE,
						HCI_MGMT_VAR_LEN },
6363
	{ remove_advertising,	   MGMT_REMOVE_ADVERTISING_SIZE },
6364
	{ get_adv_size_info,       MGMT_GET_ADV_SIZE_INFO_SIZE },
6365
	{ start_limited_discovery, MGMT_START_DISCOVERY_SIZE },
6366 6367
};

6368
void mgmt_index_added(struct hci_dev *hdev)
6369
{
6370
	struct mgmt_ev_ext_index ev;
6371

6372 6373 6374
	if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
		return;

6375
	switch (hdev->dev_type) {
6376
	case HCI_PRIMARY:
6377 6378 6379
		if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) {
			mgmt_index_event(MGMT_EV_UNCONF_INDEX_ADDED, hdev,
					 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS);
6380
			ev.type = 0x01;
6381 6382 6383
		} else {
			mgmt_index_event(MGMT_EV_INDEX_ADDED, hdev, NULL, 0,
					 HCI_MGMT_INDEX_EVENTS);
6384
			ev.type = 0x00;
6385 6386
		}
		break;
6387 6388 6389 6390 6391
	case HCI_AMP:
		ev.type = 0x02;
		break;
	default:
		return;
6392
	}
6393 6394 6395 6396 6397

	ev.bus = hdev->bus;

	mgmt_index_event(MGMT_EV_EXT_INDEX_ADDED, hdev, &ev, sizeof(ev),
			 HCI_MGMT_EXT_INDEX_EVENTS);
6398 6399
}

6400
void mgmt_index_removed(struct hci_dev *hdev)
6401
{
6402
	struct mgmt_ev_ext_index ev;
6403
	u8 status = MGMT_STATUS_INVALID_INDEX;
6404

6405 6406 6407
	if (test_bit(HCI_QUIRK_RAW_DEVICE, &hdev->quirks))
		return;

6408
	switch (hdev->dev_type) {
6409
	case HCI_PRIMARY:
6410
		mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status);
6411

6412 6413 6414
		if (hci_dev_test_flag(hdev, HCI_UNCONFIGURED)) {
			mgmt_index_event(MGMT_EV_UNCONF_INDEX_REMOVED, hdev,
					 NULL, 0, HCI_MGMT_UNCONF_INDEX_EVENTS);
6415
			ev.type = 0x01;
6416 6417 6418
		} else {
			mgmt_index_event(MGMT_EV_INDEX_REMOVED, hdev, NULL, 0,
					 HCI_MGMT_INDEX_EVENTS);
6419
			ev.type = 0x00;
6420 6421
		}
		break;
6422 6423 6424 6425 6426
	case HCI_AMP:
		ev.type = 0x02;
		break;
	default:
		return;
6427
	}
6428 6429 6430 6431 6432

	ev.bus = hdev->bus;

	mgmt_index_event(MGMT_EV_EXT_INDEX_REMOVED, hdev, &ev, sizeof(ev),
			 HCI_MGMT_EXT_INDEX_EVENTS);
6433 6434
}

6435
/* This function requires the caller holds hdev->lock */
6436
static void restart_le_actions(struct hci_dev *hdev)
6437 6438 6439 6440
{
	struct hci_conn_params *p;

	list_for_each_entry(p, &hdev->le_conn_params, list) {
6441 6442 6443 6444 6445 6446
		/* Needed for AUTO_OFF case where might not "really"
		 * have been powered off.
		 */
		list_del_init(&p->action);

		switch (p->auto_connect) {
6447
		case HCI_AUTO_CONN_DIRECT:
6448 6449 6450 6451 6452 6453 6454 6455
		case HCI_AUTO_CONN_ALWAYS:
			list_add(&p->action, &hdev->pend_le_conns);
			break;
		case HCI_AUTO_CONN_REPORT:
			list_add(&p->action, &hdev->pend_le_reports);
			break;
		default:
			break;
6456
		}
6457 6458 6459
	}
}

6460
void mgmt_power_on(struct hci_dev *hdev, int err)
6461 6462 6463
{
	struct cmd_lookup match = { NULL, hdev };

6464
	BT_DBG("err %d", err);
6465

6466 6467 6468
	hci_dev_lock(hdev);

	if (!err) {
6469 6470
		restart_le_actions(hdev);
		hci_update_background_scan(hdev);
6471 6472
	}

6473 6474 6475 6476 6477 6478 6479
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);

	new_settings(hdev, match.sk);

	if (match.sk)
		sock_put(match.sk);

6480
	hci_dev_unlock(hdev);
6481
}
6482

6483
void __mgmt_power_off(struct hci_dev *hdev)
6484 6485
{
	struct cmd_lookup match = { NULL, hdev };
6486
	u8 status, zero_cod[] = { 0, 0, 0 };
6487

6488
	mgmt_pending_foreach(MGMT_OP_SET_POWERED, hdev, settings_rsp, &match);
6489 6490 6491 6492 6493 6494 6495 6496

	/* If the power off is because of hdev unregistration let
	 * use the appropriate INVALID_INDEX status. Otherwise use
	 * NOT_POWERED. We cover both scenarios here since later in
	 * mgmt_index_removed() any hci_conn callbacks will have already
	 * been triggered, potentially causing misleading DISCONNECTED
	 * status responses.
	 */
6497
	if (hci_dev_test_flag(hdev, HCI_UNREGISTER))
6498 6499 6500 6501 6502
		status = MGMT_STATUS_INVALID_INDEX;
	else
		status = MGMT_STATUS_NOT_POWERED;

	mgmt_pending_foreach(0, hdev, cmd_complete_rsp, &status);
6503 6504

	if (memcmp(hdev->dev_class, zero_cod, sizeof(zero_cod)) != 0)
6505 6506
		mgmt_generic_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
				   zero_cod, sizeof(zero_cod), NULL);
6507

6508
	new_settings(hdev, match.sk);
6509 6510 6511

	if (match.sk)
		sock_put(match.sk);
6512
}
6513

6514
void mgmt_set_powered_failed(struct hci_dev *hdev, int err)
6515
{
6516
	struct mgmt_pending_cmd *cmd;
6517 6518
	u8 status;

6519
	cmd = pending_find(MGMT_OP_SET_POWERED, hdev);
6520
	if (!cmd)
6521
		return;
6522 6523 6524 6525 6526 6527

	if (err == -ERFKILL)
		status = MGMT_STATUS_RFKILLED;
	else
		status = MGMT_STATUS_FAILED;

6528
	mgmt_cmd_status(cmd->sk, hdev->id, MGMT_OP_SET_POWERED, status);
6529 6530 6531 6532

	mgmt_pending_remove(cmd);
}

6533 6534
void mgmt_new_link_key(struct hci_dev *hdev, struct link_key *key,
		       bool persistent)
6535
{
6536
	struct mgmt_ev_new_link_key ev;
6537

6538
	memset(&ev, 0, sizeof(ev));
6539

6540
	ev.store_hint = persistent;
6541
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
6542
	ev.key.addr.type = BDADDR_BREDR;
6543
	ev.key.type = key->type;
6544
	memcpy(ev.key.val, key->val, HCI_LINK_KEY_SIZE);
6545
	ev.key.pin_len = key->pin_len;
6546

6547
	mgmt_event(MGMT_EV_NEW_LINK_KEY, hdev, &ev, sizeof(ev), NULL);
6548
}
6549

6550 6551
static u8 mgmt_ltk_type(struct smp_ltk *ltk)
{
6552 6553 6554 6555 6556 6557 6558 6559 6560 6561 6562 6563 6564
	switch (ltk->type) {
	case SMP_LTK:
	case SMP_LTK_SLAVE:
		if (ltk->authenticated)
			return MGMT_LTK_AUTHENTICATED;
		return MGMT_LTK_UNAUTHENTICATED;
	case SMP_LTK_P256:
		if (ltk->authenticated)
			return MGMT_LTK_P256_AUTH;
		return MGMT_LTK_P256_UNAUTH;
	case SMP_LTK_P256_DEBUG:
		return MGMT_LTK_P256_DEBUG;
	}
6565 6566 6567 6568

	return MGMT_LTK_UNAUTHENTICATED;
}

6569
void mgmt_new_ltk(struct hci_dev *hdev, struct smp_ltk *key, bool persistent)
6570 6571 6572 6573 6574
{
	struct mgmt_ev_new_long_term_key ev;

	memset(&ev, 0, sizeof(ev));

6575
	/* Devices using resolvable or non-resolvable random addresses
F
Florian Grandel 已提交
6576
	 * without providing an identity resolving key don't require
6577 6578 6579 6580 6581 6582 6583 6584 6585
	 * to store long term keys. Their addresses will change the
	 * next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the long term key is stored. If the remote
	 * identity is known, the long term keys are internally
	 * mapped to the identity address. So allow static random
	 * and public addresses here.
	 */
6586 6587 6588 6589
	if (key->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (key->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
6590
		ev.store_hint = persistent;
6591

6592
	bacpy(&ev.key.addr.bdaddr, &key->bdaddr);
6593
	ev.key.addr.type = link_to_bdaddr(LE_LINK, key->bdaddr_type);
6594
	ev.key.type = mgmt_ltk_type(key);
6595 6596
	ev.key.enc_size = key->enc_size;
	ev.key.ediv = key->ediv;
6597
	ev.key.rand = key->rand;
6598

6599
	if (key->type == SMP_LTK)
6600 6601
		ev.key.master = 1;

6602 6603 6604
	/* Make sure we copy only the significant bytes based on the
	 * encryption key size, and set the rest of the value to zeroes.
	 */
6605
	memcpy(ev.key.val, key->val, key->enc_size);
6606 6607
	memset(ev.key.val + key->enc_size, 0,
	       sizeof(ev.key.val) - key->enc_size);
6608

6609
	mgmt_event(MGMT_EV_NEW_LONG_TERM_KEY, hdev, &ev, sizeof(ev), NULL);
6610 6611
}

6612
void mgmt_new_irk(struct hci_dev *hdev, struct smp_irk *irk, bool persistent)
6613 6614 6615 6616 6617
{
	struct mgmt_ev_new_irk ev;

	memset(&ev, 0, sizeof(ev));

6618
	ev.store_hint = persistent;
6619

6620 6621 6622 6623 6624 6625 6626 6627
	bacpy(&ev.rpa, &irk->rpa);
	bacpy(&ev.irk.addr.bdaddr, &irk->bdaddr);
	ev.irk.addr.type = link_to_bdaddr(LE_LINK, irk->addr_type);
	memcpy(ev.irk.val, irk->val, sizeof(irk->val));

	mgmt_event(MGMT_EV_NEW_IRK, hdev, &ev, sizeof(ev), NULL);
}

6628 6629
void mgmt_new_csrk(struct hci_dev *hdev, struct smp_csrk *csrk,
		   bool persistent)
6630 6631 6632 6633 6634 6635
{
	struct mgmt_ev_new_csrk ev;

	memset(&ev, 0, sizeof(ev));

	/* Devices using resolvable or non-resolvable random addresses
F
Florian Grandel 已提交
6636
	 * without providing an identity resolving key don't require
6637 6638 6639 6640 6641 6642 6643 6644 6645 6646 6647
	 * to store signature resolving keys. Their addresses will change
	 * the next time around.
	 *
	 * Only when a remote device provides an identity address
	 * make sure the signature resolving key is stored. So allow
	 * static random and public addresses here.
	 */
	if (csrk->bdaddr_type == ADDR_LE_DEV_RANDOM &&
	    (csrk->bdaddr.b[5] & 0xc0) != 0xc0)
		ev.store_hint = 0x00;
	else
6648
		ev.store_hint = persistent;
6649 6650 6651

	bacpy(&ev.key.addr.bdaddr, &csrk->bdaddr);
	ev.key.addr.type = link_to_bdaddr(LE_LINK, csrk->bdaddr_type);
6652
	ev.key.type = csrk->type;
6653 6654 6655 6656 6657
	memcpy(ev.key.val, csrk->val, sizeof(csrk->val));

	mgmt_event(MGMT_EV_NEW_CSRK, hdev, &ev, sizeof(ev), NULL);
}

6658
void mgmt_new_conn_param(struct hci_dev *hdev, bdaddr_t *bdaddr,
6659 6660
			 u8 bdaddr_type, u8 store_hint, u16 min_interval,
			 u16 max_interval, u16 latency, u16 timeout)
6661 6662 6663
{
	struct mgmt_ev_new_conn_param ev;

6664 6665 6666
	if (!hci_is_identity_address(bdaddr, bdaddr_type))
		return;

6667 6668 6669
	memset(&ev, 0, sizeof(ev));
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(LE_LINK, bdaddr_type);
6670
	ev.store_hint = store_hint;
6671 6672 6673 6674 6675 6676 6677 6678
	ev.min_interval = cpu_to_le16(min_interval);
	ev.max_interval = cpu_to_le16(max_interval);
	ev.latency = cpu_to_le16(latency);
	ev.timeout = cpu_to_le16(timeout);

	mgmt_event(MGMT_EV_NEW_CONN_PARAM, hdev, &ev, sizeof(ev), NULL);
}

6679 6680
void mgmt_device_connected(struct hci_dev *hdev, struct hci_conn *conn,
			   u32 flags, u8 *name, u8 name_len)
6681
{
6682 6683 6684
	char buf[512];
	struct mgmt_ev_device_connected *ev = (void *) buf;
	u16 eir_len = 0;
6685

6686 6687
	bacpy(&ev->addr.bdaddr, &conn->dst);
	ev->addr.type = link_to_bdaddr(conn->type, conn->dst_type);
6688

6689
	ev->flags = __cpu_to_le32(flags);
6690

6691 6692 6693 6694 6695 6696 6697 6698 6699 6700 6701 6702
	/* We must ensure that the EIR Data fields are ordered and
	 * unique. Keep it simple for now and avoid the problem by not
	 * adding any BR/EDR data to the LE adv.
	 */
	if (conn->le_adv_data_len > 0) {
		memcpy(&ev->eir[eir_len],
		       conn->le_adv_data, conn->le_adv_data_len);
		eir_len = conn->le_adv_data_len;
	} else {
		if (name_len > 0)
			eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE,
						  name, name_len);
6703

6704
		if (memcmp(conn->dev_class, "\0\0\0", 3) != 0)
6705 6706 6707 6708
			eir_len = eir_append_data(ev->eir, eir_len,
						  EIR_CLASS_OF_DEV,
						  conn->dev_class, 3);
	}
6709

6710
	ev->eir_len = cpu_to_le16(eir_len);
6711

6712 6713
	mgmt_event(MGMT_EV_DEVICE_CONNECTED, hdev, buf,
		    sizeof(*ev) + eir_len, NULL);
6714 6715
}

6716
static void disconnect_rsp(struct mgmt_pending_cmd *cmd, void *data)
6717 6718 6719
{
	struct sock **sk = data;

6720
	cmd->cmd_complete(cmd, 0);
6721 6722 6723 6724

	*sk = cmd->sk;
	sock_hold(*sk);

6725
	mgmt_pending_remove(cmd);
6726 6727
}

6728
static void unpair_device_rsp(struct mgmt_pending_cmd *cmd, void *data)
6729
{
6730
	struct hci_dev *hdev = data;
6731
	struct mgmt_cp_unpair_device *cp = cmd->param;
6732

6733 6734
	device_unpaired(hdev, &cp->addr.bdaddr, cp->addr.type, cmd->sk);

6735
	cmd->cmd_complete(cmd, 0);
6736 6737 6738
	mgmt_pending_remove(cmd);
}

6739 6740
bool mgmt_powering_down(struct hci_dev *hdev)
{
6741
	struct mgmt_pending_cmd *cmd;
6742 6743
	struct mgmt_mode *cp;

6744
	cmd = pending_find(MGMT_OP_SET_POWERED, hdev);
6745 6746 6747 6748 6749 6750 6751 6752 6753 6754
	if (!cmd)
		return false;

	cp = cmd->param;
	if (!cp->val)
		return true;

	return false;
}

6755
void mgmt_device_disconnected(struct hci_dev *hdev, bdaddr_t *bdaddr,
6756 6757
			      u8 link_type, u8 addr_type, u8 reason,
			      bool mgmt_connected)
6758
{
6759
	struct mgmt_ev_device_disconnected ev;
6760 6761
	struct sock *sk = NULL;

6762 6763 6764 6765 6766 6767
	/* The connection is still in hci_conn_hash so test for 1
	 * instead of 0 to know if this is the last one.
	 */
	if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) {
		cancel_delayed_work(&hdev->power_off);
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
6768 6769
	}

6770 6771 6772
	if (!mgmt_connected)
		return;

6773 6774 6775
	if (link_type != ACL_LINK && link_type != LE_LINK)
		return;

6776
	mgmt_pending_foreach(MGMT_OP_DISCONNECT, hdev, disconnect_rsp, &sk);
6777

6778 6779 6780
	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.reason = reason;
6781

6782
	mgmt_event(MGMT_EV_DEVICE_DISCONNECTED, hdev, &ev, sizeof(ev), sk);
6783 6784

	if (sk)
6785
		sock_put(sk);
6786

6787
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
6788
			     hdev);
6789 6790
}

6791 6792
void mgmt_disconnect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr,
			    u8 link_type, u8 addr_type, u8 status)
6793
{
6794 6795
	u8 bdaddr_type = link_to_bdaddr(link_type, addr_type);
	struct mgmt_cp_disconnect *cp;
6796
	struct mgmt_pending_cmd *cmd;
6797

6798 6799 6800
	mgmt_pending_foreach(MGMT_OP_UNPAIR_DEVICE, hdev, unpair_device_rsp,
			     hdev);

6801
	cmd = pending_find(MGMT_OP_DISCONNECT, hdev);
6802
	if (!cmd)
6803
		return;
6804

6805 6806 6807 6808 6809 6810 6811 6812
	cp = cmd->param;

	if (bacmp(bdaddr, &cp->addr.bdaddr))
		return;

	if (cp->addr.type != bdaddr_type)
		return;

6813
	cmd->cmd_complete(cmd, mgmt_status(status));
6814
	mgmt_pending_remove(cmd);
6815
}
6816

6817 6818
void mgmt_connect_failed(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
			 u8 addr_type, u8 status)
6819 6820
{
	struct mgmt_ev_connect_failed ev;
6821

6822 6823 6824 6825 6826 6827
	/* The connection is still in hci_conn_hash so test for 1
	 * instead of 0 to know if this is the last one.
	 */
	if (mgmt_powering_down(hdev) && hci_conn_count(hdev) == 1) {
		cancel_delayed_work(&hdev->power_off);
		queue_work(hdev->req_workqueue, &hdev->power_off.work);
6828
	}
6829

6830
	bacpy(&ev.addr.bdaddr, bdaddr);
6831
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6832
	ev.status = mgmt_status(status);
6833

6834
	mgmt_event(MGMT_EV_CONNECT_FAILED, hdev, &ev, sizeof(ev), NULL);
6835
}
6836

6837
void mgmt_pin_code_request(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 secure)
6838 6839 6840
{
	struct mgmt_ev_pin_code_request ev;

6841
	bacpy(&ev.addr.bdaddr, bdaddr);
6842
	ev.addr.type = BDADDR_BREDR;
6843
	ev.secure = secure;
6844

6845
	mgmt_event(MGMT_EV_PIN_CODE_REQUEST, hdev, &ev, sizeof(ev), NULL);
6846 6847
}

6848 6849
void mgmt_pin_code_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				  u8 status)
6850
{
6851
	struct mgmt_pending_cmd *cmd;
6852

6853
	cmd = pending_find(MGMT_OP_PIN_CODE_REPLY, hdev);
6854
	if (!cmd)
6855
		return;
6856

6857
	cmd->cmd_complete(cmd, mgmt_status(status));
6858
	mgmt_pending_remove(cmd);
6859 6860
}

6861 6862
void mgmt_pin_code_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
				      u8 status)
6863
{
6864
	struct mgmt_pending_cmd *cmd;
6865

6866
	cmd = pending_find(MGMT_OP_PIN_CODE_NEG_REPLY, hdev);
6867
	if (!cmd)
6868
		return;
6869

6870
	cmd->cmd_complete(cmd, mgmt_status(status));
6871
	mgmt_pending_remove(cmd);
6872
}
6873

6874
int mgmt_user_confirm_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
6875
			      u8 link_type, u8 addr_type, u32 value,
6876
			      u8 confirm_hint)
6877 6878 6879
{
	struct mgmt_ev_user_confirm_request ev;

6880
	BT_DBG("%s", hdev->name);
6881

6882
	bacpy(&ev.addr.bdaddr, bdaddr);
6883
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6884
	ev.confirm_hint = confirm_hint;
6885
	ev.value = cpu_to_le32(value);
6886

6887
	return mgmt_event(MGMT_EV_USER_CONFIRM_REQUEST, hdev, &ev, sizeof(ev),
6888
			  NULL);
6889 6890
}

6891
int mgmt_user_passkey_request(struct hci_dev *hdev, bdaddr_t *bdaddr,
6892
			      u8 link_type, u8 addr_type)
6893 6894 6895 6896 6897
{
	struct mgmt_ev_user_passkey_request ev;

	BT_DBG("%s", hdev->name);

6898
	bacpy(&ev.addr.bdaddr, bdaddr);
6899
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
6900 6901

	return mgmt_event(MGMT_EV_USER_PASSKEY_REQUEST, hdev, &ev, sizeof(ev),
6902
			  NULL);
6903 6904
}

6905
static int user_pairing_resp_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6906 6907
				      u8 link_type, u8 addr_type, u8 status,
				      u8 opcode)
6908
{
6909
	struct mgmt_pending_cmd *cmd;
6910

6911
	cmd = pending_find(opcode, hdev);
6912 6913 6914
	if (!cmd)
		return -ENOENT;

6915
	cmd->cmd_complete(cmd, mgmt_status(status));
6916
	mgmt_pending_remove(cmd);
6917

6918
	return 0;
6919 6920
}

6921
int mgmt_user_confirm_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6922
				     u8 link_type, u8 addr_type, u8 status)
6923
{
6924
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6925
					  status, MGMT_OP_USER_CONFIRM_REPLY);
6926 6927
}

6928
int mgmt_user_confirm_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6929
					 u8 link_type, u8 addr_type, u8 status)
6930
{
6931
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6932 6933
					  status,
					  MGMT_OP_USER_CONFIRM_NEG_REPLY);
6934
}
6935

6936
int mgmt_user_passkey_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6937
				     u8 link_type, u8 addr_type, u8 status)
6938
{
6939
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6940
					  status, MGMT_OP_USER_PASSKEY_REPLY);
6941 6942
}

6943
int mgmt_user_passkey_neg_reply_complete(struct hci_dev *hdev, bdaddr_t *bdaddr,
6944
					 u8 link_type, u8 addr_type, u8 status)
6945
{
6946
	return user_pairing_resp_complete(hdev, bdaddr, link_type, addr_type,
6947 6948
					  status,
					  MGMT_OP_USER_PASSKEY_NEG_REPLY);
6949 6950
}

6951 6952 6953 6954 6955 6956 6957 6958 6959 6960 6961 6962 6963 6964 6965 6966
int mgmt_user_passkey_notify(struct hci_dev *hdev, bdaddr_t *bdaddr,
			     u8 link_type, u8 addr_type, u32 passkey,
			     u8 entered)
{
	struct mgmt_ev_passkey_notify ev;

	BT_DBG("%s", hdev->name);

	bacpy(&ev.addr.bdaddr, bdaddr);
	ev.addr.type = link_to_bdaddr(link_type, addr_type);
	ev.passkey = __cpu_to_le32(passkey);
	ev.entered = entered;

	return mgmt_event(MGMT_EV_PASSKEY_NOTIFY, hdev, &ev, sizeof(ev), NULL);
}

6967
void mgmt_auth_failed(struct hci_conn *conn, u8 hci_status)
6968 6969
{
	struct mgmt_ev_auth_failed ev;
6970
	struct mgmt_pending_cmd *cmd;
6971
	u8 status = mgmt_status(hci_status);
6972

6973 6974 6975
	bacpy(&ev.addr.bdaddr, &conn->dst);
	ev.addr.type = link_to_bdaddr(conn->type, conn->dst_type);
	ev.status = status;
6976

6977 6978 6979 6980 6981
	cmd = find_pairing(conn);

	mgmt_event(MGMT_EV_AUTH_FAILED, conn->hdev, &ev, sizeof(ev),
		    cmd ? cmd->sk : NULL);

6982 6983 6984 6985
	if (cmd) {
		cmd->cmd_complete(cmd, status);
		mgmt_pending_remove(cmd);
	}
6986
}
6987

6988
void mgmt_auth_enable_complete(struct hci_dev *hdev, u8 status)
6989 6990
{
	struct cmd_lookup match = { NULL, hdev };
6991
	bool changed;
6992 6993 6994 6995

	if (status) {
		u8 mgmt_err = mgmt_status(status);
		mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev,
6996
				     cmd_status_rsp, &mgmt_err);
6997
		return;
6998 6999
	}

7000
	if (test_bit(HCI_AUTH, &hdev->flags))
7001
		changed = !hci_dev_test_and_set_flag(hdev, HCI_LINK_SECURITY);
7002
	else
7003
		changed = hci_dev_test_and_clear_flag(hdev, HCI_LINK_SECURITY);
7004

7005
	mgmt_pending_foreach(MGMT_OP_SET_LINK_SECURITY, hdev, settings_rsp,
7006
			     &match);
7007

7008
	if (changed)
7009
		new_settings(hdev, match.sk);
7010 7011 7012 7013 7014

	if (match.sk)
		sock_put(match.sk);
}

7015
static void clear_eir(struct hci_request *req)
7016
{
7017
	struct hci_dev *hdev = req->hdev;
7018 7019
	struct hci_cp_write_eir cp;

7020
	if (!lmp_ext_inq_capable(hdev))
7021
		return;
7022

7023 7024
	memset(hdev->eir, 0, sizeof(hdev->eir));

7025 7026
	memset(&cp, 0, sizeof(cp));

7027
	hci_req_add(req, HCI_OP_WRITE_EIR, sizeof(cp), &cp);
7028 7029
}

7030
void mgmt_ssp_enable_complete(struct hci_dev *hdev, u8 enable, u8 status)
7031 7032
{
	struct cmd_lookup match = { NULL, hdev };
7033
	struct hci_request req;
7034
	bool changed = false;
7035 7036 7037

	if (status) {
		u8 mgmt_err = mgmt_status(status);
7038

7039 7040
		if (enable && hci_dev_test_and_clear_flag(hdev,
							  HCI_SSP_ENABLED)) {
7041
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
7042
			new_settings(hdev, NULL);
7043
		}
7044

7045 7046
		mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, cmd_status_rsp,
				     &mgmt_err);
7047
		return;
7048 7049 7050
	}

	if (enable) {
7051
		changed = !hci_dev_test_and_set_flag(hdev, HCI_SSP_ENABLED);
7052
	} else {
7053
		changed = hci_dev_test_and_clear_flag(hdev, HCI_SSP_ENABLED);
7054
		if (!changed)
7055 7056
			changed = hci_dev_test_and_clear_flag(hdev,
							      HCI_HS_ENABLED);
7057
		else
7058
			hci_dev_clear_flag(hdev, HCI_HS_ENABLED);
7059 7060 7061 7062
	}

	mgmt_pending_foreach(MGMT_OP_SET_SSP, hdev, settings_rsp, &match);

7063
	if (changed)
7064
		new_settings(hdev, match.sk);
7065

7066
	if (match.sk)
7067 7068
		sock_put(match.sk);

7069 7070
	hci_req_init(&req, hdev);

7071 7072
	if (hci_dev_test_flag(hdev, HCI_SSP_ENABLED)) {
		if (hci_dev_test_flag(hdev, HCI_USE_DEBUG_KEYS))
7073 7074
			hci_req_add(&req, HCI_OP_WRITE_SSP_DEBUG_MODE,
				    sizeof(enable), &enable);
7075
		__hci_req_update_eir(&req);
7076
	} else {
7077
		clear_eir(&req);
7078
	}
7079 7080

	hci_req_run(&req, NULL);
7081 7082
}

7083
static void sk_lookup(struct mgmt_pending_cmd *cmd, void *data)
7084 7085 7086 7087 7088 7089 7090 7091 7092
{
	struct cmd_lookup *match = data;

	if (match->sk == NULL) {
		match->sk = cmd->sk;
		sock_hold(match->sk);
	}
}

7093 7094
void mgmt_set_class_of_dev_complete(struct hci_dev *hdev, u8 *dev_class,
				    u8 status)
7095
{
7096
	struct cmd_lookup match = { NULL, hdev, mgmt_status(status) };
7097

7098 7099 7100
	mgmt_pending_foreach(MGMT_OP_SET_DEV_CLASS, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_ADD_UUID, hdev, sk_lookup, &match);
	mgmt_pending_foreach(MGMT_OP_REMOVE_UUID, hdev, sk_lookup, &match);
7101 7102

	if (!status)
7103 7104
		mgmt_generic_event(MGMT_EV_CLASS_OF_DEV_CHANGED, hdev,
				   dev_class, 3, NULL);
7105 7106 7107

	if (match.sk)
		sock_put(match.sk);
7108 7109
}

7110
void mgmt_set_local_name_complete(struct hci_dev *hdev, u8 *name, u8 status)
7111 7112
{
	struct mgmt_cp_set_local_name ev;
7113
	struct mgmt_pending_cmd *cmd;
7114

7115
	if (status)
7116
		return;
7117 7118 7119

	memset(&ev, 0, sizeof(ev));
	memcpy(ev.name, name, HCI_MAX_NAME_LENGTH);
7120
	memcpy(ev.short_name, hdev->short_name, HCI_MAX_SHORT_NAME_LENGTH);
7121

7122
	cmd = pending_find(MGMT_OP_SET_LOCAL_NAME, hdev);
7123 7124
	if (!cmd) {
		memcpy(hdev->dev_name, name, sizeof(hdev->dev_name));
7125

7126 7127 7128
		/* If this is a HCI command related to powering on the
		 * HCI dev don't send any mgmt signals.
		 */
7129
		if (pending_find(MGMT_OP_SET_POWERED, hdev))
7130
			return;
7131
	}
7132

7133 7134
	mgmt_generic_event(MGMT_EV_LOCAL_NAME_CHANGED, hdev, &ev, sizeof(ev),
			   cmd ? cmd->sk : NULL);
7135
}
7136

7137 7138 7139 7140 7141 7142 7143 7144 7145 7146 7147 7148
static inline bool has_uuid(u8 *uuid, u16 uuid_count, u8 (*uuids)[16])
{
	int i;

	for (i = 0; i < uuid_count; i++) {
		if (!memcmp(uuid, uuids[i], 16))
			return true;
	}

	return false;
}

7149 7150
static bool eir_has_uuids(u8 *eir, u16 eir_len, u16 uuid_count, u8 (*uuids)[16])
{
7151 7152 7153 7154 7155 7156 7157 7158 7159 7160 7161 7162 7163 7164 7165 7166 7167
	u16 parsed = 0;

	while (parsed < eir_len) {
		u8 field_len = eir[0];
		u8 uuid[16];
		int i;

		if (field_len == 0)
			break;

		if (eir_len - parsed < field_len + 1)
			break;

		switch (eir[1]) {
		case EIR_UUID16_ALL:
		case EIR_UUID16_SOME:
			for (i = 0; i + 3 <= field_len; i += 2) {
7168
				memcpy(uuid, bluetooth_base_uuid, 16);
7169 7170 7171 7172 7173 7174 7175 7176 7177
				uuid[13] = eir[i + 3];
				uuid[12] = eir[i + 2];
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		case EIR_UUID32_ALL:
		case EIR_UUID32_SOME:
			for (i = 0; i + 5 <= field_len; i += 4) {
7178
				memcpy(uuid, bluetooth_base_uuid, 16);
7179 7180 7181 7182 7183 7184 7185 7186 7187 7188 7189 7190 7191 7192 7193 7194 7195 7196 7197 7198 7199 7200
				uuid[15] = eir[i + 5];
				uuid[14] = eir[i + 4];
				uuid[13] = eir[i + 3];
				uuid[12] = eir[i + 2];
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		case EIR_UUID128_ALL:
		case EIR_UUID128_SOME:
			for (i = 0; i + 17 <= field_len; i += 16) {
				memcpy(uuid, eir + i + 2, 16);
				if (has_uuid(uuid, uuid_count, uuids))
					return true;
			}
			break;
		}

		parsed += field_len + 1;
		eir += field_len + 1;
	}

7201 7202 7203
	return false;
}

7204 7205 7206
static void restart_le_scan(struct hci_dev *hdev)
{
	/* If controller is not scanning we are done. */
7207
	if (!hci_dev_test_flag(hdev, HCI_LE_SCAN))
7208 7209 7210 7211 7212 7213 7214
		return;

	if (time_after(jiffies + DISCOV_LE_RESTART_DELAY,
		       hdev->discovery.scan_start +
		       hdev->discovery.scan_duration))
		return;

7215
	queue_delayed_work(hdev->req_workqueue, &hdev->le_scan_restart,
7216 7217 7218
			   DISCOV_LE_RESTART_DELAY);
}

7219 7220
static bool is_filter_match(struct hci_dev *hdev, s8 rssi, u8 *eir,
			    u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len)
7221
{
7222 7223 7224 7225 7226
	/* If a RSSI threshold has been specified, and
	 * HCI_QUIRK_STRICT_DUPLICATE_FILTER is not set, then all results with
	 * a RSSI smaller than the RSSI threshold will be dropped. If the quirk
	 * is set, let it through for further processing, as we might need to
	 * restart the scan.
7227 7228 7229
	 *
	 * For BR/EDR devices (pre 1.2) providing no RSSI during inquiry,
	 * the results are also dropped.
7230 7231
	 */
	if (hdev->discovery.rssi != HCI_RSSI_INVALID &&
7232 7233 7234
	    (rssi == HCI_RSSI_INVALID ||
	    (rssi < hdev->discovery.rssi &&
	     !test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks))))
7235
		return  false;
7236

7237 7238 7239
	if (hdev->discovery.uuid_count != 0) {
		/* If a list of UUIDs is provided in filter, results with no
		 * matching UUID should be dropped.
7240
		 */
7241 7242 7243 7244 7245 7246
		if (!eir_has_uuids(eir, eir_len, hdev->discovery.uuid_count,
				   hdev->discovery.uuids) &&
		    !eir_has_uuids(scan_rsp, scan_rsp_len,
				   hdev->discovery.uuid_count,
				   hdev->discovery.uuids))
			return false;
7247
	}
7248

7249 7250
	/* If duplicate filtering does not report RSSI changes, then restart
	 * scanning to ensure updated result with updated RSSI values.
7251
	 */
7252 7253 7254 7255 7256 7257 7258 7259
	if (test_bit(HCI_QUIRK_STRICT_DUPLICATE_FILTER, &hdev->quirks)) {
		restart_le_scan(hdev);

		/* Validate RSSI value against the RSSI threshold once more. */
		if (hdev->discovery.rssi != HCI_RSSI_INVALID &&
		    rssi < hdev->discovery.rssi)
			return false;
	}
7260 7261 7262 7263 7264 7265 7266 7267 7268 7269 7270 7271 7272 7273 7274 7275 7276 7277 7278 7279 7280 7281 7282

	return true;
}

void mgmt_device_found(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		       u8 addr_type, u8 *dev_class, s8 rssi, u32 flags,
		       u8 *eir, u16 eir_len, u8 *scan_rsp, u8 scan_rsp_len)
{
	char buf[512];
	struct mgmt_ev_device_found *ev = (void *)buf;
	size_t ev_size;

	/* Don't send events for a non-kernel initiated discovery. With
	 * LE one exception is if we have pend_le_reports > 0 in which
	 * case we're doing passive scanning and want these events.
	 */
	if (!hci_discovery_active(hdev)) {
		if (link_type == ACL_LINK)
			return;
		if (link_type == LE_LINK && list_empty(&hdev->pend_le_reports))
			return;
	}

7283
	if (hdev->discovery.result_filtering) {
7284 7285 7286 7287 7288 7289
		/* We are using service discovery */
		if (!is_filter_match(hdev, rssi, eir, eir_len, scan_rsp,
				     scan_rsp_len))
			return;
	}

7290 7291 7292 7293 7294 7295 7296 7297 7298 7299 7300 7301
	if (hdev->discovery.limited) {
		/* Check for limited discoverable bit */
		if (dev_class) {
			if (!(dev_class[1] & 0x20))
				return;
		} else {
			u8 *flags = eir_get_data(eir, eir_len, EIR_FLAGS, NULL);
			if (!flags || !(flags[0] & LE_AD_LIMITED))
				return;
		}
	}

7302 7303 7304 7305
	/* Make sure that the buffer is big enough. The 5 extra bytes
	 * are for the potential CoD field.
	 */
	if (sizeof(*ev) + eir_len + scan_rsp_len + 5 > sizeof(buf))
7306 7307
		return;

7308 7309 7310 7311 7312 7313 7314 7315 7316 7317 7318 7319 7320 7321 7322 7323 7324 7325 7326 7327 7328 7329 7330
	memset(buf, 0, sizeof(buf));

	/* In case of device discovery with BR/EDR devices (pre 1.2), the
	 * RSSI value was reported as 0 when not available. This behavior
	 * is kept when using device discovery. This is required for full
	 * backwards compatibility with the API.
	 *
	 * However when using service discovery, the value 127 will be
	 * returned when the RSSI is not available.
	 */
	if (rssi == HCI_RSSI_INVALID && !hdev->discovery.report_invalid_rssi &&
	    link_type == ACL_LINK)
		rssi = 0;

	bacpy(&ev->addr.bdaddr, bdaddr);
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
	ev->rssi = rssi;
	ev->flags = cpu_to_le32(flags);

	if (eir_len > 0)
		/* Copy EIR or advertising data into event */
		memcpy(ev->eir, eir, eir_len);

7331 7332
	if (dev_class && !eir_get_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
				       NULL))
7333 7334 7335 7336 7337 7338 7339
		eir_len = eir_append_data(ev->eir, eir_len, EIR_CLASS_OF_DEV,
					  dev_class, 3);

	if (scan_rsp_len > 0)
		/* Append scan response data to event */
		memcpy(ev->eir + eir_len, scan_rsp, scan_rsp_len);

7340 7341
	ev->eir_len = cpu_to_le16(eir_len + scan_rsp_len);
	ev_size = sizeof(*ev) + eir_len + scan_rsp_len;
7342

7343
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, ev_size, NULL);
7344
}
7345

7346 7347
void mgmt_remote_name(struct hci_dev *hdev, bdaddr_t *bdaddr, u8 link_type,
		      u8 addr_type, s8 rssi, u8 *name, u8 name_len)
7348
{
7349 7350 7351
	struct mgmt_ev_device_found *ev;
	char buf[sizeof(*ev) + HCI_MAX_NAME_LENGTH + 2];
	u16 eir_len;
7352

7353
	ev = (struct mgmt_ev_device_found *) buf;
7354

7355 7356 7357
	memset(buf, 0, sizeof(buf));

	bacpy(&ev->addr.bdaddr, bdaddr);
7358
	ev->addr.type = link_to_bdaddr(link_type, addr_type);
7359 7360 7361
	ev->rssi = rssi;

	eir_len = eir_append_data(ev->eir, 0, EIR_NAME_COMPLETE, name,
7362
				  name_len);
7363

7364
	ev->eir_len = cpu_to_le16(eir_len);
7365

7366
	mgmt_event(MGMT_EV_DEVICE_FOUND, hdev, ev, sizeof(*ev) + eir_len, NULL);
7367
}
7368

7369
void mgmt_discovering(struct hci_dev *hdev, u8 discovering)
7370
{
7371
	struct mgmt_ev_discovering ev;
7372

7373 7374
	BT_DBG("%s discovering %u", hdev->name, discovering);

7375 7376 7377 7378
	memset(&ev, 0, sizeof(ev));
	ev.type = hdev->discovery.type;
	ev.discovering = discovering;

7379
	mgmt_event(MGMT_EV_DISCOVERING, hdev, &ev, sizeof(ev), NULL);
7380
}
7381

7382 7383 7384 7385
static struct hci_mgmt_chan chan = {
	.channel	= HCI_CHANNEL_CONTROL,
	.handler_count	= ARRAY_SIZE(mgmt_handlers),
	.handlers	= mgmt_handlers,
7386
	.hdev_init	= mgmt_init_hdev,
7387 7388 7389 7390 7391 7392 7393 7394 7395 7396 7397
};

int mgmt_init(void)
{
	return hci_mgmt_chan_register(&chan);
}

void mgmt_exit(void)
{
	hci_mgmt_chan_unregister(&chan);
}